Merge staging-next into staging

authored by github-actions[bot] and committed by GitHub d9159d2b a67efacc

+1291 -403
+5 -2
doc/module-system/module-system.chapter.md
··· 7 7 Compared to plain Nix, it adds documentation, type checking and composition or extensibility. 8 8 9 9 ::: {.note} 10 - This chapter is new and not complete yet. For a gentle introduction to the module system, in the context of NixOS, see [Writing NixOS Modules](https://nixos.org/manual/nixos/unstable/index.html#sec-writing-modules) in the NixOS manual. 10 + This chapter is new and not complete yet. 11 + 12 + See also: 13 + - Introduction to the module system, in the context of NixOS, see [Writing NixOS Modules](https://nixos.org/manual/nixos/unstable/index.html#sec-writing-modules) in the NixOS manual. 14 + - Generic guide to the module system on [nix.dev](https://nix.dev/tutorials/module-system/index.html). 11 15 ::: 12 - 13 16 14 17 ## `lib.evalModules` {#module-system-lib-evalModules} 15 18
+12
maintainers/maintainer-list.nix
··· 5988 5988 githubId = 57304299; 5989 5989 keys = [ { fingerprint = "33CD 5C0A 673C C54D 661E 5E4C 0DB5 361B EEE5 30AB"; } ]; 5990 5990 }; 5991 + dopplerian = { 5992 + name = "Dopplerian"; 5993 + github = "Dopplerian"; 5994 + githubId = 53937537; 5995 + keys = [ { fingerprint = "BBC4 C071 516B A147 8D07 F9DC D2FD E6EC 2E8C 2BF4"; } ]; 5996 + }; 5991 5997 doriath = { 5992 5998 email = "tomasz.zurkowski@gmail.com"; 5993 5999 github = "doriath"; ··· 22307 22313 name = "tea"; 22308 22314 github = "teatwig"; 22309 22315 githubId = 18734648; 22316 + }; 22317 + tebriel = { 22318 + email = "tebriel@frodux.in"; 22319 + name = "tebriel"; 22320 + github = "tebriel"; 22321 + githubId = 821688; 22310 22322 }; 22311 22323 techknowlogick = { 22312 22324 email = "techknowlogick@gitea.com";
+4
nixos/doc/manual/release-notes/rl-2505.section.md
··· 51 51 52 52 - [networking.modemmanager](options.html#opt-networking.modemmanager) has been split out of [networking.networkmanager](options.html#opt-networking.networkmanager). NetworkManager still enables ModemManager by default, but options exist now to run NetworkManager without ModemManager. 53 53 54 + - [ncps](https://github.com/kalbasit/ncps), a Nix binary cache proxy service implemented in Go using [go-nix](https://github.com/nix-community/go-nix). Available as [services.ncps](options.html#opt-services.ncps.enable). 55 + 54 56 - [Conduwuit](https://conduwuit.puppyirl.gay/), a federated chat server implementing the Matrix protocol, forked from Conduit. Available as [services.conduwuit](#opt-services.conduwuit.enable). 55 57 56 58 - [Traccar](https://www.traccar.org/), a modern GPS Tracking Platform. Available as [services.traccar](#opt-services.traccar.enable). ··· 305 307 - `services.avahi.ipv6` now defaults to true. 306 308 307 309 - For matrix homeserver Synapse we are now following the upstream recommendation to enable jemalloc as the memory allocator by default. 310 + 311 + - `services.kmonad` now creates a determinate symlink (in `/dev/input/by-id/`) to each of KMonad virtual devices. 308 312 309 313 - `bind.cacheNetworks` now only controls access for recursive queries, where it previously controlled access for all queries. 310 314
+1
nixos/modules/module-list.nix
··· 1160 1160 ./services/networking/nats.nix 1161 1161 ./services/networking/nbd.nix 1162 1162 ./services/networking/ncdns.nix 1163 + ./services/networking/ncps.nix 1163 1164 ./services/networking/ndppd.nix 1164 1165 ./services/networking/nebula.nix 1165 1166 ./services/networking/netbird.nix
+1 -1
nixos/modules/programs/tsm-client.nix
··· 75 75 { 76 76 freeformType = attrsOf (either scalarType (listOf scalarType)); 77 77 # Client system-options file directives are explained here: 78 - # https://www.ibm.com/docs/en/storage-protect/8.1.24?topic=commands-processing-options 78 + # https://www.ibm.com/docs/en/storage-protect/8.1.25?topic=commands-processing-options 79 79 options.servername = mkOption { 80 80 type = servernameType; 81 81 default = name;
+1 -1
nixos/modules/services/backup/tsm.nix
··· 89 89 environment.HOME = "/var/lib/tsm-backup"; 90 90 serviceConfig = { 91 91 # for exit status description see 92 - # https://www.ibm.com/docs/en/storage-protect/8.1.24?topic=clients-client-return-codes 92 + # https://www.ibm.com/docs/en/storage-protect/8.1.25?topic=clients-client-return-codes 93 93 SuccessExitStatus = "4 8"; 94 94 # The `-se` option must come after the command. 95 95 # The `-optfile` option suppresses a `dsm.opt`-not-found warning.
+7 -2
nixos/modules/services/cluster/kubernetes/kubelet.nix
··· 205 205 }; 206 206 207 207 extraConfig = mkOption { 208 - description = "Kubernetes kubelet extra configuration file entries."; 208 + description = '' 209 + Kubernetes kubelet extra configuration file entries. 210 + 211 + See also [Set Kubelet Parameters Via A Configuration File](https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/) 212 + and [Kubelet Configuration](https://kubernetes.io/docs/reference/config-api/kubelet-config.v1beta1/). 213 + ''; 209 214 default = { }; 210 - type = attrsOf attrs; 215 + type = attrsOf ((pkgs.formats.json { }).type); 211 216 }; 212 217 213 218 featureGates = mkOption {
+16 -11
nixos/modules/services/hardware/kmonad.nix
··· 2 2 config, 3 3 lib, 4 4 pkgs, 5 + utils, 5 6 ... 6 7 }: 7 8 ··· 118 119 # Build a systemd service that starts KMonad: 119 120 mkService = 120 121 keyboard: 121 - let 122 - cmd = 123 - [ 124 - (lib.getExe cfg.package) 125 - "--input" 126 - ''device-file "${keyboard.device}"'' 127 - ] 128 - ++ cfg.extraArgs 129 - ++ [ "${mkCfg keyboard}" ]; 130 - in 131 122 lib.nameValuePair (mkName keyboard.name) { 132 123 description = "KMonad for ${keyboard.device}"; 133 - script = lib.escapeShellArgs cmd; 134 124 unitConfig = { 135 125 # Control rate limiting. 136 126 # Stop the restart logic if we restart more than ··· 139 129 StartLimitBurst = 5; 140 130 }; 141 131 serviceConfig = { 132 + ExecStart = '' 133 + ${lib.getExe cfg.package} ${mkCfg keyboard} \ 134 + ${utils.escapeSystemdExecArgs cfg.extraArgs} 135 + ''; 142 136 Restart = "always"; 143 137 # Restart at increasing intervals from 2s to 1m 144 138 RestartSec = 2; ··· 194 188 195 189 config = lib.mkIf cfg.enable { 196 190 hardware.uinput.enable = true; 191 + 192 + services.udev.extraRules = 193 + let 194 + mkRule = name: '' 195 + ACTION=="add", KERNEL=="event*", SUBSYSTEM=="input", ATTRS{name}=="${name}", ATTRS{id/product}=="5679", ATTRS{id/vendor}=="1235", SYMLINK+="input/by-id/${name}" 196 + ''; 197 + in 198 + lib.foldlAttrs ( 199 + rules: _: keyboard: 200 + rules + "\n" + mkRule (mkName keyboard.name) 201 + ) "" cfg.keyboards; 197 202 198 203 systemd = { 199 204 paths = lib.mapAttrs' (_: mkPath) cfg.keyboards;
+326
nixos/modules/services/networking/ncps.nix
··· 1 + { 2 + config, 3 + pkgs, 4 + lib, 5 + ... 6 + }: 7 + let 8 + cfg = config.services.ncps; 9 + 10 + logLevels = [ 11 + "trace" 12 + "debug" 13 + "info" 14 + "warn" 15 + "error" 16 + "fatal" 17 + "panic" 18 + ]; 19 + 20 + globalFlags = lib.concatStringsSep " " ( 21 + [ "--log-level='${cfg.logLevel}'" ] 22 + ++ (lib.optionals cfg.openTelemetry.enable ( 23 + [ 24 + "--otel-enabled" 25 + ] 26 + ++ (lib.optional ( 27 + cfg.openTelemetry.grpcURL != null 28 + ) "--otel-grpc-url='${cfg.openTelemetry.grpcURL}'") 29 + )) 30 + ); 31 + 32 + serveFlags = lib.concatStringsSep " " ( 33 + [ 34 + "--cache-hostname='${cfg.cache.hostName}'" 35 + "--cache-data-path='${cfg.cache.dataPath}'" 36 + "--cache-database-url='${cfg.cache.databaseURL}'" 37 + "--server-addr='${cfg.server.addr}'" 38 + ] 39 + ++ (lib.optional cfg.cache.allowDeleteVerb "--cache-allow-delete-verb") 40 + ++ (lib.optional cfg.cache.allowPutVerb "--cache-allow-put-verb") 41 + ++ (lib.optional (cfg.cache.maxSize != null) "--cache-max-size='${cfg.cache.maxSize}'") 42 + ++ (lib.optionals (cfg.cache.lru.schedule != null) [ 43 + "--cache-lru-schedule='${cfg.cache.lru.schedule}'" 44 + "--cache-lru-schedule-timezone='${cfg.cache.lru.scheduleTimeZone}'" 45 + ]) 46 + ++ (lib.optional (cfg.cache.secretKeyPath != null) "--cache-secret-key-path='%d/secretKey'") 47 + ++ (lib.forEach cfg.upstream.caches (url: "--upstream-cache='${url}'")) 48 + ++ (lib.forEach cfg.upstream.publicKeys (pk: "--upstream-public-key='${pk}'")) 49 + ); 50 + 51 + isSqlite = lib.strings.hasPrefix "sqlite:" cfg.cache.databaseURL; 52 + 53 + dbPath = lib.removePrefix "sqlite:" cfg.cache.databaseURL; 54 + dbDir = dirOf dbPath; 55 + in 56 + { 57 + options = { 58 + services.ncps = { 59 + enable = lib.mkEnableOption "ncps: Nix binary cache proxy service implemented in Go"; 60 + 61 + package = lib.mkPackageOption pkgs "ncps" { }; 62 + 63 + dbmatePackage = lib.mkPackageOption pkgs "dbmate" { }; 64 + 65 + openTelemetry = { 66 + enable = lib.mkEnableOption "Enable OpenTelemetry logs, metrics, and tracing"; 67 + 68 + grpcURL = lib.mkOption { 69 + type = lib.types.nullOr lib.types.str; 70 + default = null; 71 + description = '' 72 + Configure OpenTelemetry gRPC URL. Missing or "https" scheme enables 73 + secure gRPC, "insecure" otherwise. Omit to emit telemetry to 74 + stdout. 75 + ''; 76 + }; 77 + }; 78 + 79 + logLevel = lib.mkOption { 80 + type = lib.types.enum logLevels; 81 + default = "info"; 82 + description = '' 83 + Set the level for logging. Refer to 84 + <https://pkg.go.dev/github.com/rs/zerolog#readme-leveled-logging> for 85 + more information. 86 + ''; 87 + }; 88 + 89 + cache = { 90 + allowDeleteVerb = lib.mkEnableOption '' 91 + Whether to allow the DELETE verb to delete narinfo and nar files from 92 + the cache. 93 + ''; 94 + 95 + allowPutVerb = lib.mkEnableOption '' 96 + Whether to allow the PUT verb to push narinfo and nar files directly 97 + to the cache. 98 + ''; 99 + 100 + hostName = lib.mkOption { 101 + type = lib.types.str; 102 + description = '' 103 + The hostname of the cache server. **This is used to generate the 104 + private key used for signing store paths (.narinfo)** 105 + ''; 106 + }; 107 + 108 + dataPath = lib.mkOption { 109 + type = lib.types.str; 110 + default = "/var/lib/ncps"; 111 + description = '' 112 + The local directory for storing configuration and cached store paths 113 + ''; 114 + }; 115 + 116 + databaseURL = lib.mkOption { 117 + type = lib.types.str; 118 + default = "sqlite:${cfg.cache.dataPath}/db/db.sqlite"; 119 + defaultText = "sqlite:/var/lib/ncps/db/db.sqlite"; 120 + description = '' 121 + The URL of the database (currently only SQLite is supported) 122 + ''; 123 + }; 124 + 125 + lru = { 126 + schedule = lib.mkOption { 127 + type = lib.types.nullOr lib.types.str; 128 + default = null; 129 + example = "0 2 * * *"; 130 + description = '' 131 + The cron spec for cleaning the store to keep it under 132 + config.ncps.cache.maxSize. Refer to 133 + https://pkg.go.dev/github.com/robfig/cron/v3#hdr-Usage for 134 + documentation. 135 + ''; 136 + }; 137 + 138 + scheduleTimeZone = lib.mkOption { 139 + type = lib.types.str; 140 + default = "Local"; 141 + example = "America/Los_Angeles"; 142 + description = '' 143 + The name of the timezone to use for the cron schedule. See 144 + <https://en.wikipedia.org/wiki/List_of_tz_database_time_zones> 145 + for a comprehensive list of possible values for this setting. 146 + ''; 147 + }; 148 + }; 149 + 150 + maxSize = lib.mkOption { 151 + type = lib.types.nullOr lib.types.str; 152 + default = null; 153 + example = "100G"; 154 + description = '' 155 + The maximum size of the store. It can be given with units such as 156 + 5K, 10G etc. Supported units: B, K, M, G, T. 157 + ''; 158 + }; 159 + 160 + secretKeyPath = lib.mkOption { 161 + type = lib.types.nullOr lib.types.str; 162 + default = null; 163 + description = '' 164 + The path to load the secretKey for signing narinfos. Leave this 165 + empty to automatically generate a private/public key. 166 + ''; 167 + }; 168 + }; 169 + 170 + server = { 171 + addr = lib.mkOption { 172 + type = lib.types.str; 173 + default = ":8501"; 174 + description = '' 175 + The address and port the server listens on. 176 + ''; 177 + }; 178 + }; 179 + 180 + upstream = { 181 + caches = lib.mkOption { 182 + type = lib.types.listOf lib.types.str; 183 + example = [ "https://cache.nixos.org" ]; 184 + description = '' 185 + A list of URLs of upstream binary caches. 186 + ''; 187 + }; 188 + 189 + publicKeys = lib.mkOption { 190 + type = lib.types.listOf lib.types.str; 191 + default = [ ]; 192 + example = [ "cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=" ]; 193 + description = '' 194 + A list of public keys of upstream caches in the format 195 + `host[-[0-9]*]:public-key`. This flag is used to verify the 196 + signatures of store paths downloaded from upstream caches. 197 + ''; 198 + }; 199 + }; 200 + }; 201 + }; 202 + 203 + config = lib.mkIf cfg.enable { 204 + assertions = [ 205 + { 206 + assertion = cfg.cache.lru.schedule == null || cfg.cache.maxSize != null; 207 + message = "You must specify config.ncps.cache.lru.schedule when config.ncps.cache.maxSize is set"; 208 + } 209 + 210 + { 211 + assertion = cfg.cache.secretKeyPath == null || (builtins.pathExists cfg.cache.secretKeyPath); 212 + message = "config.ncps.cache.secresecretKeyPath=${cfg.cache.secretKeyPath} must exist but does not"; 213 + } 214 + ]; 215 + 216 + users.users.ncps = { 217 + isSystemUser = true; 218 + group = "ncps"; 219 + }; 220 + users.groups.ncps = { }; 221 + 222 + systemd.services.ncps-create-datadirs = { 223 + description = "Created required directories by ncps"; 224 + serviceConfig = { 225 + Type = "oneshot"; 226 + UMask = "0066"; 227 + }; 228 + script = 229 + (lib.optionalString (cfg.cache.dataPath != "/var/lib/ncps") '' 230 + if ! test -d ${cfg.cache.dataPath}; then 231 + mkdir -p ${cfg.cache.dataPath} 232 + chown ncps:ncps ${cfg.cache.dataPath} 233 + fi 234 + '') 235 + + (lib.optionalString isSqlite '' 236 + if ! test -d ${dbDir}; then 237 + mkdir -p ${dbDir} 238 + chown ncps:ncps ${dbDir} 239 + fi 240 + ''); 241 + wantedBy = [ "ncps.service" ]; 242 + before = [ "ncps.service" ]; 243 + }; 244 + 245 + systemd.services.ncps = { 246 + description = "ncps binary cache proxy service"; 247 + 248 + after = [ "network.target" ]; 249 + wantedBy = [ "multi-user.target" ]; 250 + 251 + preStart = '' 252 + ${lib.getExe cfg.dbmatePackage} --migrations-dir=${cfg.package}/share/ncps/db/migrations --url=${cfg.cache.databaseURL} up 253 + ''; 254 + 255 + serviceConfig = lib.mkMerge [ 256 + { 257 + ExecStart = "${lib.getExe cfg.package} ${globalFlags} serve ${serveFlags}"; 258 + User = "ncps"; 259 + Group = "ncps"; 260 + Restart = "on-failure"; 261 + RuntimeDirectory = "ncps"; 262 + } 263 + 264 + # credentials 265 + (lib.mkIf (cfg.cache.secretKeyPath != null) { 266 + LoadCredential = "secretKey:${cfg.cache.secretKeyPath}"; 267 + }) 268 + 269 + # ensure permissions on required directories 270 + (lib.mkIf (cfg.cache.dataPath != "/var/lib/ncps") { 271 + ReadWritePaths = [ cfg.cache.dataPath ]; 272 + }) 273 + (lib.mkIf (cfg.cache.dataPath == "/var/lib/ncps") { 274 + StateDirectory = "ncps"; 275 + StateDirectoryMode = "0700"; 276 + }) 277 + (lib.mkIf (isSqlite && !lib.strings.hasPrefix "/var/lib/ncps" dbDir) { 278 + ReadWritePaths = [ dbDir ]; 279 + }) 280 + 281 + # Hardening 282 + { 283 + SystemCallFilter = [ 284 + "@system-service" 285 + "~@privileged" 286 + "~@resources" 287 + ]; 288 + CapabilityBoundingSet = ""; 289 + PrivateUsers = true; 290 + DevicePolicy = "closed"; 291 + DeviceAllow = [ "" ]; 292 + ProtectKernelModules = true; 293 + ProtectKernelTunables = true; 294 + ProtectControlGroups = true; 295 + ProtectKernelLogs = true; 296 + ProtectHostname = true; 297 + ProtectClock = true; 298 + ProtectProc = "invisible"; 299 + ProtectSystem = "strict"; 300 + ProtectHome = true; 301 + RestrictSUIDSGID = true; 302 + RestrictRealtime = true; 303 + MemoryDenyWriteExecute = true; 304 + ProcSubset = "pid"; 305 + RestrictNamespaces = true; 306 + SystemCallArchitectures = "native"; 307 + PrivateNetwork = false; 308 + PrivateTmp = true; 309 + PrivateDevices = true; 310 + PrivateMounts = true; 311 + NoNewPrivileges = true; 312 + LockPersonality = true; 313 + RestrictAddressFamilies = "AF_UNIX AF_INET AF_INET6"; 314 + LimitNOFILE = 65536; 315 + UMask = "0066"; 316 + } 317 + ]; 318 + 319 + unitConfig.RequiresMountsFor = lib.concatStringsSep " " ( 320 + [ "${cfg.cache.dataPath}" ] ++ lib.optional (isSqlite) dbDir 321 + ); 322 + }; 323 + }; 324 + 325 + meta.maintainers = with lib.maintainers; [ kalbasit ]; 326 + }
+54 -8
nixos/modules/services/web-apps/komga.nix
··· 9 9 cfg = config.services.komga; 10 10 inherit (lib) mkOption mkEnableOption maintainers; 11 11 inherit (lib.types) port str bool; 12 + 13 + settingsFormat = pkgs.formats.yaml { }; 12 14 in 13 15 { 16 + imports = [ 17 + (lib.mkRenamedOptionModule 18 + [ 19 + "services" 20 + "komga" 21 + "port" 22 + ] 23 + [ 24 + "services" 25 + "komga" 26 + "settings" 27 + "server" 28 + "port" 29 + ] 30 + ) 31 + ]; 32 + 14 33 options = { 15 34 services.komga = { 16 35 enable = mkEnableOption "Komga, a free and open source comics/mangas media server"; 17 - 18 - port = mkOption { 19 - type = port; 20 - default = 8080; 21 - description = "The port that Komga will listen on."; 22 - }; 23 36 24 37 user = mkOption { 25 38 type = str; ··· 39 52 description = "State and configuration directory Komga will use."; 40 53 }; 41 54 55 + settings = lib.mkOption { 56 + inherit (settingsFormat) type; 57 + default = { }; 58 + defaultText = lib.literalExpression '' 59 + { 60 + server.port = 8080; 61 + } 62 + ''; 63 + description = '' 64 + Komga configuration. 65 + 66 + See [documentation](https://komga.org/docs/installation/configuration). 67 + ''; 68 + }; 69 + 42 70 openFirewall = mkOption { 43 71 type = bool; 44 72 default = false; 45 - description = "Whether to open the firewall for the port in {option}`services.komga.port`."; 73 + description = "Whether to open the firewall for the port in {option}`services.komga.settings.server.port`."; 46 74 }; 47 75 }; 48 76 }; ··· 52 80 inherit (lib) mkIf getExe; 53 81 in 54 82 mkIf cfg.enable { 83 + assertions = [ 84 + { 85 + assertion = (cfg.settings.komga.config-dir or cfg.stateDir) == cfg.stateDir; 86 + message = "You must use the `services.komga.stateDir` option to properly configure `komga.config-dir`."; 87 + } 88 + ]; 89 + 90 + services.komga.settings = { 91 + server.port = lib.mkDefault 8080; 92 + }; 55 93 56 94 networking.firewall.allowedTCPPorts = mkIf cfg.openFirewall [ cfg.port ]; 57 95 ··· 66 104 }; 67 105 }; 68 106 107 + systemd.tmpfiles.settings."10-komga" = { 108 + ${cfg.stateDir}.d = { 109 + inherit (cfg) user group; 110 + }; 111 + "${cfg.stateDir}/application.yml"."L+" = { 112 + argument = builtins.toString (settingsFormat.generate "application.yml" cfg.settings); 113 + }; 114 + }; 115 + 69 116 systemd.services.komga = { 70 117 environment = { 71 - SERVER_PORT = builtins.toString cfg.port; 72 118 KOMGA_CONFIGDIR = cfg.stateDir; 73 119 }; 74 120
+6 -2
nixos/modules/virtualisation/google-compute-image.nix
··· 88 88 ] 89 89 } 90 90 pushd $out 91 - tar -Sc $diskImage | gzip -${toString cfg.compressionLevel} > \ 91 + # RTFM: 92 + # https://cloud.google.com/compute/docs/images/create-custom 93 + # https://cloud.google.com/compute/docs/import/import-existing-image 94 + mv $diskImage disk.raw 95 + tar -Sc disk.raw | gzip -${toString cfg.compressionLevel} > \ 92 96 ${config.image.fileName} 93 - rm $diskImage 97 + rm disk.raw 94 98 popd 95 99 ''; 96 100 format = "raw";
+5
nixos/tests/all-tests.nix
··· 660 660 navidrome = handleTest ./navidrome.nix {}; 661 661 nbd = handleTest ./nbd.nix {}; 662 662 ncdns = handleTest ./ncdns.nix {}; 663 + ncps = runTest ./ncps.nix; 664 + ncps-custom-cache-datapath = runTest { 665 + imports = [ ./ncps.nix ]; 666 + defaults.services.ncps.cache.dataPath = "/path/to/ncps"; 667 + }; 663 668 ndppd = handleTest ./ndppd.nix {}; 664 669 nix-channel = pkgs.callPackage ../modules/config/nix-channel/test.nix { }; 665 670 nebula = handleTest ./nebula.nix {};
+5
nixos/tests/kmonad.nix
··· 11 11 machine = { 12 12 services.kmonad = { 13 13 enable = true; 14 + extraArgs = [ 15 + "--log-level=debug" 16 + ]; 14 17 keyboards = { 15 18 defaultKbd = { 16 19 device = "/dev/input/by-id/vm-default-kbd"; ··· 43 46 44 47 with subtest("kmonad is running"): 45 48 machine.succeed(f"systemctl status {service_name}") 49 + with subtest("kmonad symlink is created"): 50 + machine.wait_for_file(f"/dev/input/by-id/{service_name}", timeout=5) 46 51 ''; 47 52 }
+1 -1
nixos/tests/komga.nix
··· 8 8 { pkgs, ... }: 9 9 { services.komga = { 10 10 enable = true; 11 - port = 1234; 11 + settings.server.port = 1234; 12 12 }; 13 13 }; 14 14
+89
nixos/tests/ncps.nix
··· 1 + { 2 + lib, 3 + pkgs, 4 + ... 5 + }: 6 + 7 + { 8 + name = "ncps"; 9 + 10 + nodes = { 11 + harmonia = { 12 + services.harmonia = { 13 + enable = true; 14 + signKeyPaths = [ 15 + (pkgs.writeText "cache-key" "cache.example.com-1:9FhO0w+7HjZrhvmzT1VlAZw4OSAlFGTgC24Seg3tmPl4gZBdwZClzTTHr9cVzJpwsRSYLTu7hEAQe3ljy92CWg==") 16 + ]; 17 + settings.priority = 35; 18 + }; 19 + 20 + networking.firewall.allowedTCPPorts = [ 5000 ]; 21 + system.extraDependencies = [ pkgs.emptyFile ]; 22 + }; 23 + 24 + ncps = { 25 + services.ncps = { 26 + enable = true; 27 + 28 + cache = { 29 + hostName = "ncps"; 30 + secretKeyPath = builtins.toString ( 31 + pkgs.writeText "ncps-cache-key" "ncps:dcrGsrku0KvltFhrR5lVIMqyloAdo0y8vYZOeIFUSLJS2IToL7dPHSSCk/fi+PJf8EorpBn8PU7MNhfvZoI8mA==" 32 + ); 33 + }; 34 + 35 + upstream = { 36 + caches = [ "http://harmonia:5000" ]; 37 + publicKeys = [ 38 + "cache.example.com-1:eIGQXcGQpc00x6/XFcyacLEUmC07u4RAEHt5Y8vdglo=" 39 + ]; 40 + }; 41 + }; 42 + 43 + networking.firewall.allowedTCPPorts = [ 8501 ]; 44 + }; 45 + 46 + client01 = { 47 + nix.settings = { 48 + substituters = lib.mkForce [ "http://ncps:8501" ]; 49 + trusted-public-keys = lib.mkForce [ 50 + "ncps:UtiE6C+3Tx0kgpP34vjyX/BKK6QZ/D1OzDYX72aCPJg=" 51 + ]; 52 + }; 53 + }; 54 + }; 55 + 56 + testScript = 57 + { nodes, ... }: 58 + let 59 + narinfoName = 60 + (lib.strings.removePrefix "/nix/store/" ( 61 + lib.strings.removeSuffix "-empty-file" pkgs.emptyFile.outPath 62 + )) 63 + + ".narinfo"; 64 + 65 + narinfoNameChars = lib.strings.stringToCharacters narinfoName; 66 + 67 + narinfoPath = lib.concatStringsSep "/" [ 68 + nodes.ncps.services.ncps.cache.dataPath 69 + "store/narinfo" 70 + (lib.lists.elemAt narinfoNameChars 0) 71 + ((lib.lists.elemAt narinfoNameChars 0) + (lib.lists.elemAt narinfoNameChars 1)) 72 + narinfoName 73 + ]; 74 + in 75 + '' 76 + start_all() 77 + 78 + harmonia.wait_for_unit("harmonia.service") 79 + 80 + ncps.wait_for_unit("ncps.service") 81 + 82 + client01.wait_until_succeeds("curl -f http://ncps:8501/ | grep '\"hostname\":\"${toString nodes.ncps.services.ncps.cache.hostName}\"' >&2") 83 + 84 + client01.succeed("cat /etc/nix/nix.conf >&2") 85 + client01.succeed("nix-store --realise ${pkgs.emptyFile}") 86 + 87 + ncps.succeed("cat ${narinfoPath} >&2") 88 + ''; 89 + }
+3
pkgs/applications/editors/emacs/elisp-packages/melpa-packages.nix
··· 761 761 # Optimizer error: too much on the stack 762 762 ack-menu = ignoreCompilationError super.ack-menu; 763 763 764 + # https://github.com/skeeto/emacs-aio/issues/31 765 + aio = ignoreCompilationError super.aio; 766 + 764 767 # https://github.com/gongo/airplay-el/issues/2 765 768 airplay = addPackageRequires super.airplay [ self.request-deferred ]; 766 769
+12
pkgs/applications/editors/vim/plugins/generated.nix
··· 9785 9785 meta.homepage = "https://github.com/RRethy/nvim-treesitter-textsubjects/"; 9786 9786 }; 9787 9787 9788 + nvim-trevJ-lua = buildVimPlugin { 9789 + pname = "nvim-trevJ.lua"; 9790 + version = "2024-12-23"; 9791 + src = fetchFromGitHub { 9792 + owner = "AckslD"; 9793 + repo = "nvim-trevJ.lua"; 9794 + rev = "86445d0143d47aede944b6daa5c0a463e9d3e730"; 9795 + sha256 = "0wrmzk7wyr4mk8y0c7hq0qqk19ngdwvvd80690vqs3vby89a5zkj"; 9796 + }; 9797 + meta.homepage = "https://github.com/AckslD/nvim-trevJ.lua/"; 9798 + }; 9799 + 9788 9800 nvim-ts-autotag = buildVimPlugin { 9789 9801 pname = "nvim-ts-autotag"; 9790 9802 version = "2024-12-02";
+5
pkgs/applications/editors/vim/plugins/overrides.nix
··· 2308 2308 dependencies = [ self.nvim-treesitter ]; 2309 2309 }; 2310 2310 2311 + nvim-trevJ-lua = super.nvim-trevJ-lua.overrideAttrs { 2312 + dependencies = [ self.nvim-treesitter ]; 2313 + nvimRequireCheck = "trevj"; 2314 + }; 2315 + 2311 2316 nvim-ufo = super.nvim-ufo.overrideAttrs { 2312 2317 dependencies = [ self.promise-async ]; 2313 2318 nvimRequireCheck = "ufo";
+1
pkgs/applications/editors/vim/plugins/vim-plugin-names
··· 812 812 https://github.com/PaterJason/nvim-treesitter-sexp/,HEAD, 813 813 https://github.com/nvim-treesitter/nvim-treesitter-textobjects/,, 814 814 https://github.com/RRethy/nvim-treesitter-textsubjects/,HEAD, 815 + https://github.com/AckslD/nvim-trevJ.lua/,HEAD, 815 816 https://github.com/windwp/nvim-ts-autotag/,, 816 817 https://github.com/joosepalviste/nvim-ts-context-commentstring/,, 817 818 https://github.com/kevinhwang91/nvim-ufo/,HEAD,
+1 -1
pkgs/applications/editors/vscode/extensions/vadimcn.vscode-lldb/default.nix
··· 199 199 description = "Native debugger extension for VSCode based on LLDB"; 200 200 homepage = "https://github.com/vadimcn/vscode-lldb"; 201 201 license = [ lib.licenses.mit ]; 202 - maintainers = [ lib.maintainers.nigelgbanks ]; 202 + maintainers = [ ]; 203 203 platforms = lib.platforms.all; 204 204 }; 205 205 }
+2 -2
pkgs/applications/science/electronics/openroad/default.nix
··· 9 9 git, 10 10 python3, 11 11 swig, 12 - boost180, 12 + boost, 13 13 cbc, # for clp 14 14 cimg, 15 15 clp, # for or-tools ··· 70 70 ]; 71 71 72 72 buildInputs = [ 73 - boost180 73 + boost 74 74 cbc 75 75 cimg 76 76 clp
+2 -2
pkgs/by-name/ab/abracadabra/package.nix
··· 15 15 16 16 stdenv.mkDerivation rec { 17 17 pname = "abracadabra"; 18 - version = "2.8.0"; 18 + version = "2.9.0"; 19 19 20 20 src = fetchFromGitHub { 21 21 owner = "KejPi"; 22 22 repo = "AbracaDABra"; 23 23 rev = "v${version}"; 24 - hash = "sha256-bzRXGxSWoiBqvx8r2coNVPQKilOAKFoqBcB4F0uAV8g="; 24 + hash = "sha256-PPG71W5HeLr4R8je88K4VXPiSbJn5T7dP3M05C+bkv0="; 25 25 }; 26 26 27 27 nativeBuildInputs = [
+3 -12
pkgs/by-name/ae/aerogramme/package.nix
··· 12 12 13 13 src = fetchgit { 14 14 url = "https://git.deuxfleurs.fr/Deuxfleurs/aerogramme/"; 15 - rev = "refs/tags/${version}"; 15 + tag = version; 16 16 hash = "sha256-ER+P/XGqNzTLwDLK5EBZq/Dl29ZZKl2FdxDb+oLEJ8Y="; 17 17 }; 18 18 ··· 20 20 ./0001-update-time-rs.patch 21 21 ]; 22 22 23 - # must use our own Cargo.lock due to git dependencies 24 - cargoLock = { 25 - lockFile = ./Cargo.lock; 26 - outputHashes = { 27 - "imap-codec-2.0.0" = "sha256-o64Q74Q84xLRfU4K4JtcjyS0J8mfoApvUs9siscd0RA="; 28 - "imap-flow-0.1.0" = "sha256-IopxybuVt5OW6vFiw/4MxojzaNZrKu2xyfaX6F8IYlA="; 29 - "k2v-client-0.0.4" = "sha256-V71FCIsgK3VStFOzVntm8P0vXRobF5rQ74qar+cKyik="; 30 - "smtp-message-0.1.0" = "sha256-FoSakm3D1xg1vefLf/zkyvzsij1G0QstK3CRo+LbByE="; 31 - }; 32 - }; 23 + useFetchCargoVendor = true; 24 + cargoHash = "sha256-GPj8qhfKgfAadQD9DJafN4ec8L6oY62PS/w/ljkPHpw="; 33 25 34 26 # disable network tests as Nix sandbox breaks them 35 27 doCheck = false; ··· 50 42 maintainers = with lib.maintainers; [ supinie ]; 51 43 mainProgram = "aerogramme"; 52 44 platforms = lib.platforms.linux; 53 - broken = true; # https://github.com/rust-lang/rust/issues/129811 54 45 }; 55 46 }
+90
pkgs/by-name/ba/bashrun2/package.nix
··· 1 + { 2 + fetchFromGitHub, 3 + lib, 4 + stdenv, 5 + makeWrapper, 6 + xorg, 7 + ncurses, 8 + coreutils, 9 + bashInteractive, 10 + gnused, 11 + gnugrep, 12 + glibc, 13 + xterm, 14 + util-linux, 15 + }: 16 + 17 + stdenv.mkDerivation rec { 18 + pname = "bashrun2"; 19 + version = "0.2.6"; 20 + 21 + src = fetchFromGitHub { 22 + owner = "hbekel"; 23 + repo = "bashrun2"; 24 + tag = "v${version}"; 25 + hash = "sha256-U2ntplhyv8KAkaMd2D6wRsUIYkhJzxdgHo2xsbNRfqM="; 26 + }; 27 + 28 + nativeBuildInputs = [ 29 + makeWrapper 30 + ]; 31 + 32 + buildInputs = [ 33 + xorg.libX11 34 + ]; 35 + 36 + patches = [ 37 + ./remote-permissions.patch 38 + ]; 39 + 40 + postPatch = '' 41 + substituteInPlace \ 42 + man/bashrun2.1 \ 43 + --replace-fail '/usr/bin/brwctl' "$out/bin/brwctl" 44 + 45 + substituteInPlace \ 46 + src/bindings \ 47 + src/registry \ 48 + src/utils \ 49 + src/bashrun2 \ 50 + src/frontend \ 51 + src/remote \ 52 + src/plugin \ 53 + src/engine \ 54 + src/bookmarks \ 55 + --replace-fail '/bin/rm' '${coreutils}/bin/rm' 56 + 57 + substituteInPlace \ 58 + src/bashrun2 \ 59 + --replace-fail '#!/usr/bin/env bash' '#!${lib.getExe bashInteractive}' 60 + 61 + substituteInPlace \ 62 + src/remote \ 63 + --replace-fail '/bin/cp' '${coreutils}/bin/cp' 64 + ''; 65 + 66 + postFixup = '' 67 + wrapProgram $out/bin/bashrun2 \ 68 + --prefix PATH : "$out/bin:${ 69 + lib.makeBinPath [ 70 + ncurses 71 + coreutils 72 + gnused 73 + gnugrep 74 + glibc 75 + bashInteractive 76 + xterm 77 + util-linux 78 + ] 79 + }" \ 80 + --prefix XDG_CONFIG_DIRS : "$out/etc/xdg" 81 + ''; 82 + 83 + meta = { 84 + maintainers = with lib.maintainers; [ dopplerian ]; 85 + mainProgram = "bashrun2"; 86 + homepage = "http://henning-liebenau.de/bashrun2/"; 87 + license = lib.licenses.gpl2Plus; 88 + description = "Application launcher based on a modified bash session in a small terminal window"; 89 + }; 90 + }
+12
pkgs/by-name/ba/bashrun2/remote-permissions.patch
··· 1 + diff --git a/src/remote b/src/remote 2 + index 07674ca..07a6b25 100644 3 + --- a/src/remote 4 + +++ b/src/remote 5 + @@ -97,6 +97,7 @@ function §remote.interface.create { 6 + local bookmarks="$bashrun_cache_home/remote-bookmarks.bash" 7 + 8 + /bin/cp "$bashrun_site/interface" "$interface" 9 + + chmod +w "$interface" 10 + printf '%s\n' "$bashrun_remote_interface" >> "$interface" 11 + 12 + printf '%s\n' "source $bindings" >> "$interface"
+3 -3
pkgs/by-name/ch/chirp/package.nix
··· 11 11 12 12 python3Packages.buildPythonApplication { 13 13 pname = "chirp"; 14 - version = "0.4.0-unstable-2024-12-17"; 14 + version = "0.4.0-unstable-2024-12-26"; 15 15 pyproject = true; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "kk7ds"; 19 19 repo = "chirp"; 20 - rev = "605037deb68994bbb3114c2a35db7a7a7e4755a6"; 21 - hash = "sha256-5AwoXX5Qa4ROjt5wSdcElLJ7ZVguKK3urn0ygVDJiGQ="; 20 + rev = "43449629fb3c2ae0b71e8b7cb7d49e8e97a00c64"; 21 + hash = "sha256-zn9pInfJ/QbwgvBqkqzdW7txVGZVU1EPDo4I4ZQDdLY="; 22 22 }; 23 23 24 24 nativeBuildInputs = [
+58
pkgs/by-name/cv/cve-prioritizer/package.nix
··· 1 + { 2 + lib, 3 + fetchFromGitHub, 4 + fetchpatch, 5 + python3, 6 + }: 7 + 8 + python3.pkgs.buildPythonApplication rec { 9 + pname = "cve-prioritizer"; 10 + version = "1.8.0"; 11 + pyproject = true; 12 + 13 + src = fetchFromGitHub { 14 + owner = "TURROKS"; 15 + repo = "CVE_Prioritizer"; 16 + rev = "refs/tags/v${version}"; 17 + hash = "sha256-ade/gcRrdvVsp5F61ZndsNL3s3gq8TDk/dZvPc55S/8="; 18 + }; 19 + 20 + patches = [ 21 + # Add script, https://github.com/TURROKS/CVE_Prioritizer/pull/33 22 + (fetchpatch { 23 + name = "add-script.patch"; 24 + url = "https://github.com/TURROKS/CVE_Prioritizer/commit/c29f2332cde7d79e0c9f34c0a1811611a8fb73c9.patch"; 25 + hash = "sha256-/hnS+YKO4zNGVGTG+KsugJH7Bt2OE8Q2F+7ZX+uhFlU="; 26 + }) 27 + ]; 28 + 29 + postPatch = '' 30 + # https://github.com/TURROKS/CVE_Prioritizer/pull/32 31 + substituteInPlace pyproject.toml \ 32 + --replace-fail "CVE Prioritizer" "cve-prioritizer" 33 + ''; 34 + 35 + build-system = with python3.pkgs; [ setuptools ]; 36 + 37 + dependencies = with python3.pkgs; [ 38 + click 39 + pandas 40 + python-dotenv 41 + requests 42 + termcolor 43 + ]; 44 + 45 + # Project has no tests 46 + doCheck = false; 47 + 48 + pythonImportsCheck = [ "cve_prioritizer" ]; 49 + 50 + meta = { 51 + description = "Vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities"; 52 + homepage = "https://github.com/TURROKS/CVE_Prioritizer"; 53 + changelog = "https://github.com/TURROKS/CVE_Prioritizer/releases/tag/v${version}"; 54 + license = lib.licenses.bsd3; 55 + maintainers = with lib.maintainers; [ fab ]; 56 + mainProgram = "cve-prioritizer"; 57 + }; 58 + }
+3
pkgs/by-name/fa/fairymax/package.nix
··· 29 29 -DINI_FILE='"'"$out/share/fairymax/fmax.ini"'"' 30 30 ''; 31 31 32 + # errors by default in GCC 14 33 + NIX_CFLAGS_COMPILE = "-Wno-error=return-mismatch -Wno-error=implicit-int"; 34 + 32 35 installPhase = '' 33 36 mkdir -p "$out"/{bin,share/fairymax} 34 37 cp fairymax "$out/bin"
+2
pkgs/by-name/fr/freeplane/package.nix
··· 7 7 jdk17, 8 8 gradle_8, 9 9 which, 10 + copyDesktopItems, 10 11 }: 11 12 12 13 let ··· 31 32 makeBinaryWrapper 32 33 jdk 33 34 gradle 35 + copyDesktopItems 34 36 ]; 35 37 36 38 mitmCache = gradle.fetchDeps {
+10
pkgs/by-name/fs/fsg/package.nix
··· 25 25 26 26 patches = [ ./wxgtk-3.2.patch ]; 27 27 28 + # use correct wx-config for cross-compiling 29 + postPatch = '' 30 + substituteInPlace makefile \ 31 + --replace-fail 'wx-config' "${lib.getExe' wxGTK32 "wx-config"}" 32 + ''; 33 + 28 34 hardeningDisable = [ "format" ]; 29 35 30 36 nativeBuildInputs = [ pkg-config ]; ··· 44 50 ' -i MainFrame.cpp 45 51 sed -re '/ctrans_prob/s/energy\[center][+]energy\[other]/(int)(fmin(energy[center]+energy[other],99))/g' -i Canvas.cpp 46 52 ''; 53 + 54 + makeFlags = [ 55 + "CPP=${stdenv.cc.targetPrefix}c++" 56 + ]; 47 57 48 58 installPhase = '' 49 59 mkdir -p $out/bin $out/libexec
+3 -3
pkgs/by-name/gi/git-delete-merged-branches/package.nix
··· 7 7 8 8 python3Packages.buildPythonApplication rec { 9 9 pname = "git-delete-merged-branches"; 10 - version = "7.4.1"; 10 + version = "7.4.2"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "hartwork"; 14 14 repo = pname; 15 - rev = "refs/tags/${version}"; 16 - sha256 = "sha256-1CUwac2TPU5s1uLS1zPvtXZEGCWYwm1y935jqbI173Q="; 15 + tag = version; 16 + sha256 = "sha256-l+R4gINZJ8bJdhcK+U9jOuIoAm2/bd5P+w9AbwPZMrk="; 17 17 }; 18 18 19 19 propagatedBuildInputs = with python3Packages; [
+11 -10
pkgs/by-name/gr/gradm/package.nix
··· 7 7 pam, 8 8 }: 9 9 10 - stdenv.mkDerivation rec { 10 + stdenv.mkDerivation (finalAttrs: { 11 11 pname = "gradm"; 12 - version = "3.1-202102241600"; 12 + version = "3.1-202111052217"; 13 13 14 14 src = fetchurl { 15 - url = "https://grsecurity.net/stable/${pname}-${version}.tar.gz"; 16 - sha256 = "02ni34hpggv00140p9gvh0lqi173zdddd2qhfi96hyr1axd5pl50"; 15 + url = "https://grsecurity.net/stable/gradm-${finalAttrs.version}.tar.gz"; 16 + hash = "sha256-JFkpDzZ6R8ihzk6i7Ag1l5nqM9wV7UQ2Q5WWzogoT7k="; 17 17 }; 18 18 19 19 nativeBuildInputs = [ 20 20 bison 21 21 flex 22 22 ]; 23 + 23 24 buildInputs = [ pam ]; 24 25 25 26 enableParallelBuilding = true; 26 27 27 28 makeFlags = [ 28 - "DESTDIR=$(out)" 29 + "DESTDIR=${placeholder "out"}" 29 30 "LEX=${flex}/bin/flex" 30 31 "MANDIR=/share/man" 31 32 "MKNOD=true" ··· 48 49 49 50 postInstall = "rmdir $out/dev"; 50 51 51 - meta = with lib; { 52 + meta = { 52 53 description = "grsecurity RBAC administration and policy analysis utility"; 53 54 homepage = "https://grsecurity.net"; 54 - license = licenses.gpl2Only; 55 - platforms = platforms.linux; 56 - maintainers = with maintainers; [ 55 + license = lib.licenses.gpl2Only; 56 + platforms = lib.platforms.linux; 57 + maintainers = with lib.maintainers; [ 57 58 thoughtpolice 58 59 joachifm 59 60 ]; 60 61 }; 61 - } 62 + })
+10 -7
pkgs/by-name/ko/komga/package.nix
··· 3 3 stdenvNoCC, 4 4 fetchurl, 5 5 makeWrapper, 6 - jdk17_headless, 6 + jdk23_headless, 7 7 nixosTests, 8 8 }: 9 9 10 10 stdenvNoCC.mkDerivation rec { 11 11 pname = "komga"; 12 - version = "1.15.0"; 12 + version = "1.15.1"; 13 13 14 14 src = fetchurl { 15 15 url = "https://github.com/gotson/${pname}/releases/download/${version}/${pname}-${version}.jar"; 16 - sha256 = "sha256-mgPGhBdZ7FyxkVNPJkfFjQ6mJDbQ049PKzacTN6cajk="; 16 + sha256 = "sha256-Gv0AaW3aTjLjNAzC5FJMVfvZyIN23ezPpRk15OYyKKs="; 17 17 }; 18 18 19 19 nativeBuildInputs = [ ··· 21 21 ]; 22 22 23 23 buildCommand = '' 24 - makeWrapper ${jdk17_headless}/bin/java $out/bin/komga --add-flags "-jar $src" 24 + makeWrapper ${jdk23_headless}/bin/java $out/bin/komga --add-flags "-jar $src" 25 25 ''; 26 26 27 27 passthru.tests = { ··· 32 32 description = "Free and open source comics/mangas server"; 33 33 homepage = "https://komga.org/"; 34 34 license = lib.licenses.mit; 35 - platforms = jdk17_headless.meta.platforms; 36 - maintainers = with lib.maintainers; [ govanify ]; 35 + platforms = jdk23_headless.meta.platforms; 36 + maintainers = with lib.maintainers; [ 37 + tebriel 38 + govanify 39 + ]; 37 40 mainProgram = "komga"; 41 + sourceProvenance = with lib.sourceTypes; [ binaryBytecode ]; 38 42 }; 39 - 40 43 }
+3 -3
pkgs/by-name/le/legcord/package.nix
··· 12 12 }: 13 13 stdenv.mkDerivation rec { 14 14 pname = "legcord"; 15 - version = "1.0.5"; 15 + version = "1.0.6"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "Legcord"; 19 19 repo = "Legcord"; 20 20 rev = "v${version}"; 21 - hash = "sha256-9CicqDZDetxElD36OLizyVNxkqz3rQOjAtUNTGWVwss="; 21 + hash = "sha256-0dVuSqViMqhWBMEY36ZcXM1FYnMcDH5brp5gsMWg3Rc="; 22 22 }; 23 23 24 24 nativeBuildInputs = [ ··· 30 30 31 31 pnpmDeps = pnpm.fetchDeps { 32 32 inherit pname version src; 33 - hash = "sha256-5GE/I2xLmu2Wu9mjzZMk1YZvtS5PgpwgXnxuY+4nimQ="; 33 + hash = "sha256-QTePf/QE85OzXIcnwLJsCJJyRxwoV+FNef2Z9nAt35E="; 34 34 }; 35 35 36 36 ELECTRON_SKIP_BINARY_DOWNLOAD = "1";
+5
pkgs/by-name/li/libpoly/package.nix
··· 19 19 sha256 = "sha256-7aFz+6XJOVEA/Fmi0ywd6rZdTW8sHq8MoHqXR0Hc2o4="; 20 20 }; 21 21 22 + postPatch = '' 23 + substituteInPlace src/CMakeLists.txt \ 24 + --replace-warn " -Werror " " " 25 + ''; 26 + 22 27 nativeBuildInputs = [ cmake ]; 23 28 24 29 buildInputs = [
+14 -10
pkgs/by-name/li/livebook/package.nix
··· 7 7 erlang, 8 8 fetchFromGitHub, 9 9 nixosTests, 10 + nix-update-script, 10 11 }: 11 12 beamPackages.mixRelease rec { 12 13 pname = "livebook"; 13 - version = "0.14.4"; 14 + version = "0.14.5"; 14 15 15 16 inherit elixir; 16 17 ··· 21 22 src = fetchFromGitHub { 22 23 owner = "livebook-dev"; 23 24 repo = "livebook"; 24 - rev = "v${version}"; 25 - hash = "sha256-XpBJlPLr7E3OqTnLxnSmKCgDyiU1hT8WfOhWeRGYROA="; 25 + tag = "v${version}"; 26 + hash = "sha256-VSxW+X5zt6npV4tVVgTEvQhjA+jTramSX5h92BWWaQM="; 26 27 }; 27 28 28 29 mixFodDeps = beamPackages.fetchMixDeps { 29 30 pname = "mix-deps-${pname}"; 30 31 inherit src version; 31 - hash = "sha256-jB6IOBX3LwdrEtaWY3gglo1HO2OhdiK8j3BgzfZ1nAU="; 32 + hash = "sha256-FrkM82LO7GIFpKQfhlEUrAuKu33BzPBs6OrWW4C6pI0="; 32 33 }; 33 34 34 35 postInstall = '' ··· 42 43 --set MIX_REBAR3 ${rebar3}/bin/rebar3 43 44 ''; 44 45 45 - passthru.tests = { 46 - livebook-service = nixosTests.livebook-service; 46 + passthru = { 47 + updateScript = nix-update-script { }; 48 + tests = { 49 + livebook-service = nixosTests.livebook-service; 50 + }; 47 51 }; 48 52 49 - meta = with lib; { 50 - license = licenses.asl20; 53 + meta = { 54 + license = lib.licenses.asl20; 51 55 homepage = "https://livebook.dev/"; 52 56 description = "Automate code & data workflows with interactive Elixir notebooks"; 53 - maintainers = with maintainers; [ 57 + maintainers = with lib.maintainers; [ 54 58 munksgaard 55 59 scvalex 56 60 ]; 57 - platforms = platforms.unix; 61 + platforms = lib.platforms.unix; 58 62 }; 59 63 }
+2 -2
pkgs/by-name/lo/lock/package.nix
··· 19 19 20 20 stdenv.mkDerivation (finalAttrs: { 21 21 pname = "lock"; 22 - version = "1.3.6"; 22 + version = "1.3.7"; 23 23 24 24 src = fetchFromGitHub { 25 25 owner = "konstantintutsch"; 26 26 repo = "Lock"; 27 27 rev = "refs/tags/v${finalAttrs.version}"; 28 - hash = "sha256-Zd0fVCeE/QTvptoxbyDxcPiBrZ/qZMx/A0tB1wZbX6A="; 28 + hash = "sha256-UZt8SlkwhtVRLUMf1uYNLchzkWnL+6e7xLYZ81+YQsw="; 29 29 }; 30 30 31 31 strictDeps = true;
+2
pkgs/by-name/mo/mosml/package.nix
··· 20 20 "CC=${stdenv.cc.targetPrefix}cc" 21 21 ]; 22 22 23 + env.NIX_CFLAGS_COMPILE = "-fpermissive"; 24 + 23 25 src = fetchFromGitHub { 24 26 owner = "kfl"; 25 27 repo = "mosml";
+18 -73
pkgs/by-name/pm/pmbootstrap/package.nix
··· 9 9 sudo, 10 10 python3Packages, 11 11 gitUpdater, 12 + util-linux, 13 + versionCheckHook, 12 14 }: 13 15 14 16 python3Packages.buildPythonApplication rec { 15 17 pname = "pmbootstrap"; 16 - version = "3.0.0"; 18 + version = "3.1.0"; 17 19 pyproject = true; 18 20 19 21 src = fetchFromGitLab { 20 22 owner = "postmarketOS"; 21 23 repo = pname; 22 - rev = version; 23 - hash = "sha256-hUrWMU4V7tf/qVR4geR5FsCQ+BZA+zCPTdCZGN1PMKk="; 24 + tag = version; 25 + hash = "sha256-ijXyX+VJqiS0z5IOXGjeL2SGZ/4ledhnq/Zr1ZLW/Io="; 24 26 domain = "gitlab.postmarketos.org"; 25 27 }; 26 28 ··· 34 36 ]; 35 37 36 38 nativeCheckInputs = [ 37 - python3Packages.pytestCheckHook 38 39 git 40 + multipath-tools 39 41 openssl 40 42 ps 43 + python3Packages.pytestCheckHook 41 44 sudo 45 + util-linux 46 + versionCheckHook 42 47 ]; 43 48 44 49 # Add test dependency in PATH 45 - preCheck = "export PYTHONPATH=$PYTHONPATH:${pmb_test}"; 50 + preCheck = '' 51 + export PYTHONPATH=$PYTHONPATH:${pmb_test} 52 + ''; 46 53 47 54 # skip impure tests 48 55 disabledTests = [ 49 - "test_apk_static" 50 - "test_aportgen" 51 - "test_aportgen_device_wizard" 52 - "test_bootimg" 53 - "test_build_abuild_leftovers" 54 - "test_build_depends_binary_outdated" 55 - "test_build_depends_high_level" 56 - "test_build_depends_no_binary_error" 57 - "test_build_is_necessary" 58 - "test_build_local_source_high_level" 59 - "test_build_src_invalid_path" 60 - "test_check" 61 - "test_can_fast_forward" 62 - "test_check_build_for_arch" 63 - "test_check_config" 64 - "test_chroot_arguments" 65 - "test_chroot_interactive_shell" 66 - "test_chroot_interactive_shell_user" 67 - "test_chroot_mount" 68 - "test_clean_worktree" 69 - "test_config_user" 70 - "test_cross_compile_distcc" 71 - "test_crossdirect" 72 - "test_extract_arch" 73 - "test_extract_version" 74 - "test_file" 75 - "test_filter_aport_packages" 76 - "test_filter_missing_packages_binary_exists" 77 - "test_filter_missing_packages_invalid" 78 - "test_filter_missing_packages_pmaports" 79 - "test_finish" 80 - "test_folder_size" 81 - "test_get_all_component_names" 82 - "test_get_apkbuild" 83 - "test_get_depends" 84 - "test_get_upstream_remote" 85 - "test_helpers_lint" 86 - "test_helpers_package_get_apkindex" 87 - "test_helpers_repo" 88 - "test_helpers_ui" 89 - "test_init_buildenv" 90 - "test_kconfig_check" 91 - "test_keys" 92 - "test_newapkbuild" 93 - "test_package" 94 - "test_package_from_aports" 95 56 "test_pkgrepo_pmaports" 96 - "test_pkgrel_bump" 97 - "test_pmbootstrap_status" 98 - "test_print_checks_git_repo" 99 - "test_proxy" 100 - "test_pull" 101 - "test_qemu_running_processes" 102 - "test_questions_additional_options" 103 - "test_questions_bootimg" 104 - "test_questions_channel" 105 - "test_questions_keymaps" 106 - "test_questions_work_path" 107 - "test_read_config_channel" 108 - "test_recurse_invalid" 109 - "test_run_abuild" 110 - "test_run_core" 111 - "test_shell_escape" 112 - "test_skip_already_built" 113 - "test_switch_to_channel_branch" 114 - "test_version" 115 57 ]; 116 58 59 + versionCheckProgramArg = "--version"; 60 + 117 61 makeWrapperArgs = [ 118 62 "--prefix PATH : ${ 119 63 lib.makeBinPath [ 120 64 git 121 65 openssl 122 66 multipath-tools 67 + util-linux 123 68 ] 124 69 }" 125 70 ]; 126 71 127 72 passthru.updateScript = gitUpdater { }; 128 73 129 - meta = with lib; { 74 + meta = { 130 75 description = "Sophisticated chroot/build/flash tool to develop and install postmarketOS"; 131 76 homepage = "https://gitlab.com/postmarketOS/pmbootstrap"; 132 - license = licenses.gpl3Plus; 133 - maintainers = with maintainers; [ 77 + license = lib.licenses.gpl3Plus; 78 + maintainers = with lib.maintainers; [ 134 79 onny 135 80 lucasew 136 81 ];
+17 -14
pkgs/by-name/re/regripper/package.nix
··· 2 2 lib, 3 3 stdenv, 4 4 fetchFromGitHub, 5 + makeWrapper, 5 6 perl, 6 7 perlPackages, 7 - runtimeShell, 8 8 }: 9 9 10 - stdenv.mkDerivation rec { 10 + let 11 + perlDeps = [ 12 + perlPackages.ParseWin32Registry 13 + ]; 14 + in 15 + stdenv.mkDerivation { 11 16 pname = "regripper"; 12 - version = "0-unstable-2024-11-02"; 17 + version = "0-unstable-2024-12-12"; 13 18 14 19 src = fetchFromGitHub { 15 20 owner = "keydet89"; 16 21 repo = "RegRipper3.0"; 17 - rev = "89f3cac57e10bce1a79627e6038353e8e8a0c378"; 18 - hash = "sha256-dW3Gr4HQH484i47Bg+CEnBYoGQQRMBJr88+YeuU+iV4="; 22 + rev = "bdf7ac2500a41319479846fe07202b7e8a61ca1f"; 23 + hash = "sha256-JEBwTpDck0w85l0q5WjF1d20NyU+GJ89yAzbkUVOsu0="; 19 24 }; 20 25 26 + nativeBuildInputs = [ makeWrapper ]; 27 + 21 28 propagatedBuildInputs = [ 22 29 perl 23 - perlPackages.ParseWin32Registry 24 - ]; 30 + ] ++ perlDeps; 25 31 26 32 installPhase = '' 27 33 runHook preInstall 28 34 29 35 mkdir -p $out/{bin,share} 30 36 31 - rm -r *.md *.exe *.bat *.dll 37 + rm -r *.md *.exe *.bat *.dll *.zip 32 38 33 39 cp -aR . "$out/share/regripper/" 34 40 35 - cat > "$out/bin/regripper" << EOF 36 - #!${runtimeShell} 37 - exec ${perl}/bin/perl $out/share/regripper/rip.pl "\$@" 38 - EOF 39 - 40 - chmod u+x "$out/bin/regripper" 41 + makeWrapper ${perl}/bin/perl $out/bin/regripper \ 42 + --add-flags "$out/share/regripper/rip.pl" \ 43 + --set PERL5LIB ${perlPackages.makeFullPerlPath perlDeps} 41 44 42 45 runHook postInstall 43 46 '';
+3 -3
pkgs/by-name/re/reindeer/package.nix
··· 9 9 10 10 rustPlatform.buildRustPackage rec { 11 11 pname = "reindeer"; 12 - version = "2024.12.16.00"; 12 + version = "2024.12.30.00"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "facebookincubator"; 16 16 repo = "reindeer"; 17 17 rev = "refs/tags/v${version}"; 18 - hash = "sha256-yM+iVX+5caiSW6K45EbkHgHEhceIvauCIYwlLTYpzbQ="; 18 + hash = "sha256-o8PHtGG3Ndz6Ei9ZBoAdeNmBb70m4c+jCvHCGOjaA+w="; 19 19 }; 20 20 21 - cargoHash = "sha256-TWu2p6d/jec7zZpFP8Gly4RdgkL18yU2VWsFHVZLDJY="; 21 + cargoHash = "sha256-guRi+kYLjPHFLm4eN3kJ2kHYIBZ5JXMb3ii8416e+IA="; 22 22 23 23 nativeBuildInputs = [ pkg-config ]; 24 24
+2 -2
pkgs/by-name/sa/sarasa-gothic/package.nix
··· 7 7 8 8 stdenvNoCC.mkDerivation (finalAttrs: { 9 9 pname = "sarasa-gothic"; 10 - version = "1.0.26"; 10 + version = "1.0.27"; 11 11 12 12 src = fetchurl { 13 13 # Use the 'ttc' files here for a smaller closure size. 14 14 # (Using 'ttf' files gives a closure size about 15x larger, as of November 2021.) 15 15 url = "https://github.com/be5invis/Sarasa-Gothic/releases/download/v${finalAttrs.version}/Sarasa-TTC-${finalAttrs.version}.zip"; 16 - hash = "sha256-Z2J8yW9yLnkGh+nNb57+xyz8uZFwePpuSlBdRxfPABA="; 16 + hash = "sha256-/pN3NIwkJZ4a5g87Z3kr71Xvef0TIbN2UzsfvXJryNk="; 17 17 }; 18 18 19 19 sourceRoot = ".";
+9 -15
pkgs/by-name/sb/sby/package.nix
··· 19 19 20 20 stdenv.mkDerivation rec { 21 21 pname = "sby"; 22 - version = "0.47"; 22 + version = "0.48"; 23 23 24 24 src = fetchFromGitHub { 25 25 owner = "YosysHQ"; 26 26 repo = "sby"; 27 - rev = "yosys-${version}"; 28 - hash = "sha256-Il2pXw2doaoZrVme2p0dSUUa8dCQtJJrmYitn1MkTD4="; 27 + tag = "v${version}"; 28 + hash = "sha256-icOlWutvajHMCi2YUIGU4v5S63YobXw4fYYUvPoSzo4="; 29 29 }; 30 30 31 - nativeBuildInputs = [ bash ]; 32 - buildInputs = [ 33 - pythonEnv 31 + nativeCheckInputs = [ 32 + python3 33 + python3.pkgs.xmlschema 34 34 yosys 35 35 boolector 36 36 yices ··· 40 40 ]; 41 41 42 42 postPatch = '' 43 - patchShebangs docs/source/conf.py \ 43 + patchShebangs --build \ 44 + docs/source/conf.py \ 44 45 docs/source/conf.diff \ 45 46 tests/autotune/*.sh \ 46 47 tests/keepgoing/*.sh \ ··· 64 65 --replace-fail '/usr/bin/env python3' '${pythonEnv}/bin/python' 65 66 substituteInPlace sbysrc/sby_autotune.py \ 66 67 --replace-fail '["btorsim", "--vcd"]' '["${btor2tools}/bin/btorsim", "--vcd"]' 67 - substituteInPlace tests/make/required_tools.py \ 68 - --replace-fail '["btorsim", "--vcd"]' '["${btor2tools}/bin/btorsim", "--vcd"]' 69 68 ''; 70 69 71 70 dontBuild = true; ··· 89 88 runHook postCheck 90 89 ''; 91 90 92 - passthru.updateScript = nix-update-script { 93 - extraArgs = [ 94 - "--version-regex" 95 - "yosys-([0-9].*)" 96 - ]; 97 - }; 91 + passthru.updateScript = nix-update-script { }; 98 92 99 93 meta = { 100 94 description = "SymbiYosys, a front-end for Yosys-based formal verification flows";
+4 -4
pkgs/by-name/si/siyuan/package.nix
··· 35 35 in 36 36 stdenv.mkDerivation (finalAttrs: { 37 37 pname = "siyuan"; 38 - version = "3.1.16"; 38 + version = "3.1.18"; 39 39 40 40 src = fetchFromGitHub { 41 41 owner = "siyuan-note"; 42 42 repo = "siyuan"; 43 43 rev = "v${finalAttrs.version}"; 44 - hash = "sha256-8+Gz9AuxmK2hOApRZ2b1+rROOG94EBJR3pyp8YwtgiA="; 44 + hash = "sha256-hUPHWVULyHQgGNTpLZKDk6hUlBIK1ouYAYecr0oUe/M="; 45 45 }; 46 46 47 47 kernel = buildGo123Module { 48 48 name = "${finalAttrs.pname}-${finalAttrs.version}-kernel"; 49 49 inherit (finalAttrs) src; 50 50 sourceRoot = "${finalAttrs.src.name}/kernel"; 51 - vendorHash = "sha256-B2pGXs0IN5WhNHoFgTufd46q60RNvWzNdwoCxpayYC8="; 51 + vendorHash = "sha256-1JwUQ/WhR1O3LTevI2kWk+FNpH4FBVgF46d+W6M7UBg="; 52 52 53 53 patches = [ 54 54 (replaceVars ./set-pandoc-path.patch { ··· 89 89 src 90 90 sourceRoot 91 91 ; 92 - hash = "sha256-LlQdfRGsBn3IZWKSUqH5tAljXnWanuFXO2x+Wi3on7E="; 92 + hash = "sha256-357iBgxevtXus0Dpa8+LHKsO42HoHibkhRSy+tpD8jo="; 93 93 }; 94 94 95 95 sourceRoot = "${finalAttrs.src.name}/app";
+3 -3
pkgs/by-name/td/tdlib/package.nix
··· 35 35 36 36 stdenv.mkDerivation { 37 37 pname = "tdlib"; 38 - version = "1.8.41"; 38 + version = "1.8.42"; 39 39 40 40 src = fetchFromGitHub { 41 41 owner = "tdlib"; ··· 44 44 # The tdlib authors do not set tags for minor versions, but 45 45 # external programs depending on tdlib constrain the minor 46 46 # version, hence we set a specific commit with a known version. 47 - rev = "5b974c298d4ed551d3ad2c061ad7b8280d137c7e"; 48 - hash = "sha256-1TyGv2yMjX75+ccZSox/2m6SMmwEZAkShIhLfCeNmZg="; 47 + rev = "ef580cd3dd0e5223c2be503342dc29e128be866e"; 48 + hash = "sha256-k1YQpQXYmEdoiyWeAcj2KRU+BcWuWbHpd4etxLspEoo="; 49 49 }; 50 50 51 51 buildInputs = [
+3 -3
pkgs/by-name/te/templ/package.nix
··· 6 6 7 7 buildGoModule rec { 8 8 pname = "templ"; 9 - version = "0.2.793"; 9 + version = "0.3.819"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "a-h"; 13 13 repo = "templ"; 14 14 rev = "v${version}"; 15 - hash = "sha256-0KGht5IMbJV8KkXgT5qJxA9bcmWevzXXAVPMQTm0ccw="; 15 + hash = "sha256-kTP/DLnou3KETZRtvHdeiMmRW6xldgZBAn9O9p9s/MA="; 16 16 }; 17 17 18 - vendorHash = "sha256-ZWY19f11+UI18jeHYIEZjdb9Ii74mD6w+dYRLPkdfBU="; 18 + vendorHash = "sha256-ipLn52MsgX7KQOJixYcwMR9TCeHz55kQQ7fgkIgnu7w="; 19 19 20 20 subPackages = [ "cmd/templ" ]; 21 21
+5 -18
pkgs/by-name/ts/tsm-client/package.nix
··· 23 23 24 24 # For an explanation of optional packages 25 25 # (features provided by them, version limits), see 26 - # https://www.ibm.com/support/pages/node/660813#Version%208.1 26 + # https://web.archive.org/web/20240118051918/https://www.ibm.com/support/pages/node/660813#Version%208.1 27 27 28 28 # IBM Tivoli Storage Manager Client uses a system-wide 29 29 # client system-options file `dsm.sys` and expects it ··· 44 44 # point to this derivations `/dsmi_dir` directory symlink. 45 45 # Other environment variables might be necessary, 46 46 # depending on local configuration or usage; see: 47 - # https://www.ibm.com/docs/en/storage-protect/8.1.24?topic=solaris-set-api-environment-variables 48 - 49 - # The newest version of TSM client should be discoverable by 50 - # going to the `downloadPage` (see `meta` below). 51 - # Find the "Backup-archive client" table on that page. 52 - # Look for "Download Documents" of the latest release. 53 - # Follow the "Download Information" link. 54 - # Look for the "Linux x86_64 ..." rows in the table at 55 - # the bottom of the page and follow their "HTTPS" links (one 56 - # link per row -- each link might point to the latest release). 57 - # In the directory listings to show up, 58 - # check the big `.tar` file. 59 - # 60 - # (as of 2023-07-01) 47 + # https://www.ibm.com/docs/en/storage-protect/8.1.25?topic=solaris-set-api-environment-variables 61 48 62 49 let 63 50 64 51 meta = { 65 52 homepage = "https://www.ibm.com/products/storage-protect"; 66 - downloadPage = "https://www.ibm.com/support/pages/ibm-storage-protect-downloads-latest-fix-packs-and-interim-fixes"; 53 + downloadPage = "https://www.ibm.com/support/fixcentral/swg/selectFixes?product=ibm/StorageSoftware/IBM+Spectrum+Protect"; 67 54 platforms = [ "x86_64-linux" ]; 68 55 mainProgram = "dsmc"; 69 56 sourceProvenance = with lib.sourceTypes; [ binaryNativeCode ]; ··· 104 91 105 92 unwrapped = stdenv.mkDerivation (finalAttrs: { 106 93 name = "tsm-client-${finalAttrs.version}-unwrapped"; 107 - version = "8.1.24.0"; 94 + version = "8.1.25.0"; 108 95 src = fetchurl { 109 96 url = mkSrcUrl finalAttrs.version; 110 - hash = "sha512-TqTDE2oJK/Wu/MNYUCqxmOE6asAqDLz4GtdcFZuKqvfT8pJUCYKz9yjRPIrM3u2XfLH0wDq+Q8ER4ui680mswA=="; 97 + hash = "sha512-OPNjSMnWJ/8Ogy9O0wG0H4cEbYiOwyCVzkWhpG00v/Vm0LDxLzPteMnMOyH8L1egIDhy7lmQYSzI/EC4WWUDDA=="; 111 98 }; 112 99 inherit meta passthru; 113 100
+33
pkgs/by-name/ur/urlfinder/package.nix
··· 1 + { 2 + lib, 3 + buildGoModule, 4 + fetchFromGitHub, 5 + }: 6 + 7 + buildGoModule rec { 8 + pname = "urlfinder"; 9 + version = "0.0.2"; 10 + 11 + src = fetchFromGitHub { 12 + owner = "projectdiscovery"; 13 + repo = "urlfinder"; 14 + rev = "refs/tags/v${version}"; 15 + hash = "sha256-hORZzeGNcRTcFsvY8pfs8f1JNpdTJjMdO/lJHR83DfY="; 16 + }; 17 + 18 + vendorHash = "sha256-Wu9itQfcrwWuzRHtTKk+lF7n6eIzSfATWtI+8xLQQsI="; 19 + 20 + ldflags = [ 21 + "-s" 22 + "-w" 23 + ]; 24 + 25 + meta = { 26 + description = "Tool for passively gathering URLs without active scanning"; 27 + homepage = "https://github.com/projectdiscovery/urlfinder"; 28 + changelog = "https://github.com/projectdiscovery/urlfinder/releases/tag/v${version}"; 29 + license = lib.licenses.mit; 30 + maintainers = with lib.maintainers; [ fab ]; 31 + mainProgram = "urlfinder"; 32 + }; 33 + }
+41 -34
pkgs/by-name/vo/voicevox-core/package.nix
··· 1 1 { 2 2 lib, 3 3 stdenv, 4 - fetchzip, 4 + fetchurl, 5 + unzip, 5 6 autoPatchelfHook, 6 7 }: 7 8 8 - let 9 - platformInfoTable = { 10 - "x86_64-linux" = { 11 - id = "linux-x64"; 12 - hash = "sha256-/PD5e0bWgnIsIrvyOypoJw30VkgbOFWV1NJpPS2G0WM="; 13 - }; 14 - "aarch64-linux" = { 15 - id = "linux-arm64"; 16 - hash = "sha256-zfiorXZyIISZPXPwmcdYeHceDmQXkUhsvTkNZScg648="; 17 - }; 18 - "x86_64-darwin" = { 19 - id = "osx-x64"; 20 - hash = "sha256-cdNdV1fVPkz6B7vtKZiPsLQGqnIiDtYa9KTcwSkjdJg="; 21 - }; 22 - "aarch64-darwin" = { 23 - id = "osx-arm64"; 24 - hash = "sha256-Z1dq2t/HBQulbPF23ZCihOrcZHMpTXEQ6yXKORZaFPk="; 25 - }; 26 - }; 27 - 28 - platformInfo = 29 - platformInfoTable.${stdenv.hostPlatform.system} 30 - or (throw "Unsupported system: ${stdenv.hostPlatform.system}"); 31 - in 32 9 stdenv.mkDerivation (finalAttrs: { 33 10 pname = "voicevox-core"; 34 - version = "0.15.4"; 11 + version = "0.15.7"; 35 12 36 - # Note: Only the prebuilt binaries are able to decrypt the encrypted voice models 37 - src = fetchzip { 38 - url = "https://github.com/VOICEVOX/voicevox_core/releases/download/${finalAttrs.version}/voicevox_core-${platformInfo.id}-cpu-${finalAttrs.version}.zip"; 39 - inherit (platformInfo) hash; 40 - }; 13 + src = finalAttrs.passthru.sources.${stdenv.hostPlatform.system}; 41 14 42 - nativeBuildInputs = lib.optionals stdenv.hostPlatform.isLinux [ autoPatchelfHook ]; 15 + nativeBuildInputs = [ unzip ] ++ lib.optionals stdenv.hostPlatform.isLinux [ autoPatchelfHook ]; 43 16 44 17 buildInputs = [ stdenv.cc.cc.lib ]; 45 18 ··· 54 27 runHook postInstall 55 28 ''; 56 29 30 + # When updating, run the following command to fetch all FODs: 31 + # nix-build -A voicevox-core.sources --keep-going 32 + passthru.sources = 33 + let 34 + # Note: Only the prebuilt binaries are able to decrypt the encrypted voice models 35 + fetchCoreArtifact = 36 + { id, hash }: 37 + fetchurl { 38 + url = "https://github.com/VOICEVOX/voicevox_core/releases/download/${finalAttrs.version}/voicevox_core-${id}-cpu-${finalAttrs.version}.zip"; 39 + inherit hash; 40 + }; 41 + in 42 + { 43 + "x86_64-linux" = fetchCoreArtifact { 44 + id = "linux-x64"; 45 + hash = "sha256-7FgrJ1HlB8l5MHd2KM4lYRx2bYdxrD2+su1G33/ugUA="; 46 + }; 47 + "aarch64-linux" = fetchCoreArtifact { 48 + id = "linux-arm64"; 49 + hash = "sha256-fD7YMTo9jeB4vJibnVwX8VrukCUeAwS6VXGOr3VXG+c="; 50 + }; 51 + "x86_64-darwin" = fetchCoreArtifact { 52 + id = "osx-x64"; 53 + hash = "sha256-5h9qEKbdcvip50TLs3vf6lXkSv24VEjOrx6CTUo7Q4Q="; 54 + }; 55 + "aarch64-darwin" = fetchCoreArtifact { 56 + id = "osx-arm64"; 57 + hash = "sha256-0bFLhvP7LqDzuk3pyM9QZfc8eLMW0IgqVkaXsuS3qlY="; 58 + }; 59 + }; 60 + 57 61 meta = { 58 62 changelog = "https://github.com/VOICEVOX/voicevox_core/releases/tag/${finalAttrs.version}"; 59 63 description = "Core library for the VOICEVOX speech synthesis software"; ··· 67 71 redistributable = true; 68 72 }) 69 73 ]; 70 - maintainers = with lib.maintainers; [ tomasajt ]; 71 - platforms = lib.attrNames platformInfoTable; 74 + maintainers = with lib.maintainers; [ 75 + tomasajt 76 + eljamm 77 + ]; 78 + platforms = lib.attrNames finalAttrs.passthru.sources; 72 79 sourceProvenance = with lib.sourceTypes; [ binaryNativeCode ]; 73 80 }; 74 81 })
+15 -7
pkgs/by-name/vo/voicevox-engine/package.nix
··· 8 8 9 9 python3Packages.buildPythonApplication rec { 10 10 pname = "voicevox-engine"; 11 - version = "0.20.0"; 11 + version = "0.22.2"; 12 12 pyproject = true; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "VOICEVOX"; 16 16 repo = "voicevox_engine"; 17 - rev = "refs/tags/${version}"; 18 - hash = "sha256-Gib5R7oleg+XXyu2V65EqrflQ1oiAR7a09a0MFhSITc="; 17 + tag = version; 18 + hash = "sha256-TZycd3xX5d4dNk4ze2JozyO7zDpGAuO+O7xHAx7QXUI="; 19 19 }; 20 20 21 21 patches = [ ··· 95 95 # this test checks the behaviour of openapi 96 96 # one of the functions returns a slightly different output due to openapi version differences 97 97 "test_OpenAPIの形が変わっていないことを確認" 98 + 99 + # these tests fail due to some tiny floating point discrepancies 100 + "test_upspeak_voiced_last_mora" 101 + "test_upspeak_voiced_N_last_mora" 98 102 ]; 99 103 100 104 nativeCheckInputs = with python3Packages; [ ··· 105 109 106 110 passthru = { 107 111 resources = fetchFromGitHub { 112 + name = "voicevox-resource-${version}"; # this contains ${version} to invalidate the hash upon updating the package 108 113 owner = "VOICEVOX"; 109 114 repo = "voicevox_resource"; 110 - rev = "refs/tags/${version}"; 111 - hash = "sha256-m888DF9qgGbK30RSwNnAoT9D0tRJk6cD5QY72FRkatM="; 115 + tag = version; 116 + hash = "sha256-oeWJESm1v0wicAXXFAyZT8z4QRVv9c+3vsWksmuY5wY="; 112 117 }; 113 118 114 119 pyopenjtalk = python3Packages.callPackage ./pyopenjtalk.nix { }; 115 120 }; 116 121 117 122 meta = { 118 - changelog = "https://github.com/VOICEVOX/voicevox_engine/releases/tag/${version}"; 123 + changelog = "https://github.com/VOICEVOX/voicevox_engine/releases/tag/${src.tag}"; 119 124 description = "Engine for the VOICEVOX speech synthesis software"; 120 125 homepage = "https://github.com/VOICEVOX/voicevox_engine"; 121 126 license = lib.licenses.lgpl3Only; 122 127 mainProgram = "voicevox-engine"; 123 - maintainers = with lib.maintainers; [ tomasajt ]; 128 + maintainers = with lib.maintainers; [ 129 + tomasajt 130 + eljamm 131 + ]; 124 132 platforms = lib.platforms.linux ++ lib.platforms.darwin; 125 133 }; 126 134 }
+10 -11
pkgs/by-name/vo/voicevox/hardcode-paths.patch
··· 12 12 "host": "http://127.0.0.1:50021" 13 13 } 14 14 diff --git a/electron-builder.config.js b/electron-builder.config.js 15 - index 462e6f2..10a9bff 100644 15 + index 196a0d7..7e313c2 100644 16 16 --- a/electron-builder.config.js 17 17 +++ b/electron-builder.config.js 18 - @@ -35,19 +35,6 @@ const isMac = process.platform === "darwin"; 18 + @@ -37,18 +37,7 @@ const isArm64 = process.arch === "arm64"; 19 19 // cf: https://k-hyoda.hatenablog.com/entry/2021/10/23/000349#%E8%BF%BD%E5%8A%A0%E5%B1%95%E9%96%8B%E3%83%95%E3%82%A1%E3%82%A4%E3%83%AB%E5%85%88%E3%81%AE%E8%A8%AD%E5%AE%9A 20 20 const extraFilePrefix = isMac ? "MacOS/" : ""; 21 21 22 22 -const sevenZipFile = fs 23 - - .readdirSync(path.resolve(__dirname, "build", "vendored", "7z")) 23 + - .readdirSync(path.resolve(__dirname, "vendored", "7z")) 24 24 - .find( 25 25 - // Windows: 7za.exe, Linux: 7zzs, macOS: 7zz 26 26 - (fileName) => ["7za.exe", "7zzs", "7zz"].includes(fileName), 27 27 - ); 28 - - 28 + 29 29 -if (!sevenZipFile) { 30 30 - throw new Error( 31 - - "7z binary file not found. Run `node ./build/download7z.js` first.", 31 + - "7z binary file not found. Run `node ./tools/download7z.js` first.", 32 32 - ); 33 33 -} 34 - - 34 + 35 35 /** @type {import("electron-builder").Configuration} */ 36 36 const builderOptions = { 37 - beforeBuild: async () => { 38 - @@ -88,14 +75,6 @@ const builderOptions = { 37 + @@ -90,14 +79,6 @@ const builderOptions = { 39 38 from: "build/README.txt", 40 39 to: extraFilePrefix + "README.txt", 41 40 }, ··· 44 43 - to: path.join(extraFilePrefix, "vv-engine"), 45 44 - }, 46 45 - { 47 - - from: path.resolve(__dirname, "build", "vendored", "7z", sevenZipFile), 46 + - from: path.resolve(__dirname, "vendored", "7z", sevenZipFile), 48 47 - to: extraFilePrefix + sevenZipFile, 49 48 - }, 50 49 ], 51 50 // electron-builder installer 52 51 productName: "VOICEVOX", 53 52 diff --git a/src/backend/electron/manager/vvppManager.ts b/src/backend/electron/manager/vvppManager.ts 54 - index 6aa17b6..b8b52b7 100644 53 + index edd3177..22d0114 100644 55 54 --- a/src/backend/electron/manager/vvppManager.ts 56 55 +++ b/src/backend/electron/manager/vvppManager.ts 57 - @@ -196,16 +196,8 @@ export class VvppManager { 56 + @@ -184,16 +184,8 @@ export class VvppManager { 58 57 59 58 const args = ["x", "-o" + outputDir, archiveFile, "-t" + format]; 60 59
+17 -6
pkgs/by-name/vo/voicevox/package.nix
··· 10 10 electron, 11 11 _7zz, 12 12 voicevox-engine, 13 + dart-sass, 13 14 }: 14 15 15 16 buildNpmPackage rec { 16 17 pname = "voicevox"; 17 - version = "0.20.0"; 18 + version = "0.22.3"; 18 19 19 20 src = fetchFromGitHub { 20 21 owner = "VOICEVOX"; 21 22 repo = "voicevox"; 22 - rev = "refs/tags/${version}"; 23 - hash = "sha256-05WTecNc1xxe7SGDPZbLtRELNghFkMTqI4pkX4PsVWI="; 23 + tag = version; 24 + hash = "sha256-6z+A4bJIDfN/K8IjEdt2TqEa/EDt4uQpGh+zSWfP74I="; 24 25 }; 25 26 26 27 patches = [ ··· 36 37 --replace-fail "postinstall" "_postinstall" 37 38 ''; 38 39 39 - npmDepsHash = "sha256-g3avCj3S96qYPAyGXn4yvrZ4gteJld+g4eV4aRtv/3g="; 40 + npmDepsHash = "sha256-NuKFhDb/J6G3pFYHZedKnY2hDC5GCp70DpqrST4bJMA="; 41 + 42 + # unlock very specific node version bounds specified by upstream 43 + npmInstallFlags = [ "--engine-strict=false" ]; 40 44 41 45 nativeBuildInputs = 42 46 [ ··· 54 58 buildPhase = '' 55 59 runHook preBuild 56 60 61 + # force sass-embedded to use our own sass instead of the bundled one 62 + substituteInPlace node_modules/sass-embedded/dist/lib/src/compiler-path.js \ 63 + --replace-fail 'compilerCommand = (() => {' 'compilerCommand = (() => { return ["${lib.getExe dart-sass}"];' 64 + 57 65 # build command taken from the definition of the `electron:build` npm script 58 66 VITE_TARGET=electron npm exec vite build 59 67 ··· 105 113 ]; 106 114 107 115 meta = { 108 - changelog = "https://github.com/VOICEVOX/voicevox/releases/tag/${version}"; 116 + changelog = "https://github.com/VOICEVOX/voicevox/releases/tag/${src.tag}"; 109 117 description = "Editor for the VOICEVOX speech synthesis software"; 110 118 homepage = "https://github.com/VOICEVOX/voicevox"; 111 119 license = lib.licenses.lgpl3Only; 112 120 mainProgram = "voicevox"; 113 - maintainers = with lib.maintainers; [ tomasajt ]; 121 + maintainers = with lib.maintainers; [ 122 + tomasajt 123 + eljamm 124 + ]; 114 125 platforms = electron.meta.platforms; 115 126 }; 116 127 }
+38 -15
pkgs/by-name/zs/zsync/package.nix
··· 1 1 { 2 2 lib, 3 3 stdenv, 4 - fetchurl, 4 + fetchFromGitHub, 5 + autoreconfHook, 5 6 }: 6 7 7 8 stdenv.mkDerivation rec { 8 9 pname = "zsync"; 9 - version = "0.6.2"; 10 + version = "0.6.2-unstable-2017-04-25"; 10 11 11 - src = fetchurl { 12 - url = "http://zsync.moria.org.uk/download/zsync-${version}.tar.bz2"; 13 - hash = "sha256-C51TQzOHqk8EY0psY6XvqCAwcPIpivcqcF+b492mWvI="; 12 + src = fetchFromGitHub { 13 + owner = "cph6"; 14 + repo = "zsync"; 15 + rev = "6cfe374f8f2310cbd624664ca98e5bb28244ba7a"; 16 + hash = "sha256-SnCzNDMyhMx+2JmgsrjtYDa31Ki1EWix9iBfaduDnro="; 14 17 }; 15 18 16 - env = lib.optionalAttrs stdenv.cc.isClang { 17 - # Suppress error "call to undeclared library function 'strcasecmp'" during compilation. 18 - # The function is found by the linker correctly, so this doesn't introduce any issues. 19 - NIX_CFLAGS_COMPILE = " -Wno-implicit-function-declaration"; 20 - }; 19 + sourceRoot = "${src.name}/c"; 20 + 21 + patches = [ 22 + ./remove-inexisting-rsumtest.patch 23 + ./read-blocksums-declaration-fix.patch 24 + ]; 21 25 22 26 makeFlags = [ "AR=${stdenv.cc.bintools.targetPrefix}ar" ]; 23 27 24 - meta = with lib; { 25 - homepage = "http://zsync.moria.org.uk/"; 28 + # Suppress error "call to undeclared library function 'strcasecmp'" during compilation. 29 + # The function is found by the linker correctly, so this doesn't introduce any issues. 30 + # Also supress errors that come from incompatible pointer types due to GCC 14 changes. 31 + env.NIX_CFLAGS_COMPILE = toString ( 32 + lib.optionals stdenv.cc.isClang [ 33 + "-Wno-implicit-function-declaration" 34 + ] 35 + ++ lib.optionals stdenv.cc.isGNU [ 36 + "-Wno-error=incompatible-pointer-types" 37 + ] 38 + ); 39 + 40 + nativeBuildInputs = [ 41 + autoreconfHook 42 + ]; 43 + 44 + meta = { 45 + homepage = "https://github.com/cph6/zsync"; 26 46 description = "File distribution system using the rsync algorithm"; 27 - license = licenses.artistic2; 28 - maintainers = with maintainers; [ viric ]; 29 - platforms = with platforms; all; 47 + license = lib.licenses.artistic2; 48 + maintainers = with lib.maintainers; [ 49 + viric 50 + ryand56 51 + ]; 52 + platforms = with lib.platforms; all; 30 53 }; 31 54 }
+13
pkgs/by-name/zs/zsync/read-blocksums-declaration-fix.patch
··· 1 + diff --git a/libzsync/zsync.c b/libzsync/zsync.c 2 + index 793a426..783c349 100644 3 + --- a/libzsync/zsync.c 4 + +++ b/libzsync/zsync.c 5 + @@ -116,7 +116,7 @@ struct zsync_state { 6 + }; 7 + 8 + static int zsync_read_blocksums(struct zsync_state *zs, FILE * f, 9 + - int rsum_bytes, int checksum_bytes, 10 + + int rsum_bytes, unsigned int checksum_bytes, 11 + int seq_matches); 12 + static int zsync_sha1(struct zsync_state *zs, int fh); 13 + static int zsync_recompress(struct zsync_state *zs);
+17
pkgs/by-name/zs/zsync/remove-inexisting-rsumtest.patch
··· 1 + diff --git a/c/librcksum/Makefile.am b/c/librcksum/Makefile.am 2 + index 0216e49..f4fce72 100644 3 + --- a/librcksum/Makefile.am 4 + +++ b/librcksum/Makefile.am 5 + @@ -2,9 +2,8 @@ 6 + 7 + noinst_LIBRARIES = librcksum.a 8 + 9 + -TESTS = md4test rsumtest 10 + -noinst_PROGRAMS = md4test rsumtest 11 + +TESTS = md4test 12 + +noinst_PROGRAMS = md4test 13 + 14 + md4test_SOURCES = md4test.c md4.h md4.c 15 + -rsumtest_SOURCES = rsum.c rsumtest.c hash.c range.c state.c md4.c ../progress.c 16 + librcksum_a_SOURCES = internal.h rcksum.h md4.h rsum.c hash.c state.c range.c md4.c 17 +
+48
pkgs/development/compilers/dotnet/fix-clang19-build.patch
··· 1 + From 36354a7aca58753893148d62a889ca9e27381ac0 Mon Sep 17 00:00:00 2001 2 + From: David McFarland <corngood@gmail.com> 3 + Date: Thu, 2 Jan 2025 15:30:16 -0400 4 + Subject: [PATCH] fix clang19 build 5 + 6 + --- 7 + src/runtime/src/coreclr/vm/comreflectioncache.hpp | 4 ++++ 8 + 1 file changed, 4 insertions(+) 9 + 10 + diff --git a/src/runtime/src/coreclr/vm/comreflectioncache.hpp b/src/runtime/src/coreclr/vm/comreflectioncache.hpp 11 + index 08d173e616..12db55251d 100644 12 + --- a/src/runtime/src/coreclr/vm/comreflectioncache.hpp 13 + +++ b/src/runtime/src/coreclr/vm/comreflectioncache.hpp 14 + @@ -26,6 +26,7 @@ public: 15 + 16 + void Init(); 17 + 18 + +#ifndef DACCESS_COMPILE 19 + BOOL GetFromCache(Element *pElement, CacheType& rv) 20 + { 21 + CONTRACTL 22 + @@ -102,6 +103,7 @@ public: 23 + AdjustStamp(TRUE); 24 + this->LeaveWrite(); 25 + } 26 + +#endif // !DACCESS_COMPILE 27 + 28 + private: 29 + // Lock must have been taken before calling this. 30 + @@ -141,6 +143,7 @@ private: 31 + return CacheSize; 32 + } 33 + 34 + +#ifndef DACCESS_COMPILE 35 + void AdjustStamp(BOOL hasWriterLock) 36 + { 37 + CONTRACTL 38 + @@ -170,6 +173,7 @@ private: 39 + if (!hasWriterLock) 40 + this->LeaveWrite(); 41 + } 42 + +#endif // !DACCESS_COMPILE 43 + 44 + void UpdateHashTable(SIZE_T hash, int slot) 45 + { 46 + -- 47 + 2.47.0 48 +
+1
pkgs/development/compilers/dotnet/vmr.nix
··· 148 148 ] 149 149 ++ lib.optionals (lib.versionOlder version "9") [ 150 150 ./fix-aspnetcore-portable-build.patch 151 + ./fix-clang19-build.patch 151 152 ]; 152 153 153 154 postPatch =
+2 -2
pkgs/development/python-modules/croniter/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "croniter"; 15 - version = "3.0.3"; 15 + version = "6.0.0"; 16 16 pyproject = true; 17 17 18 18 disabled = pythonOlder "3.7"; 19 19 20 20 src = fetchPypi { 21 21 inherit pname version; 22 - hash = "sha256-NBF+wXQfEKe9DsOtfY8OuPpFei/rm+MuaiJQ4ViVdmg="; 22 + hash = "sha256-N8UEsxOVYRSpg+ziwrB3kLHxCU/p2BzJRzkhR0glVXc="; 23 23 }; 24 24 25 25 nativeBuildInputs = [ setuptools ];
+4 -4
pkgs/development/python-modules/gotenberg-client/default.nix
··· 9 9 }: 10 10 buildPythonPackage rec { 11 11 pname = "gotenberg-client"; 12 - version = "0.7.0"; 12 + version = "0.8.2"; 13 13 pyproject = true; 14 14 15 - disabled = pythonOlder "3.8"; 15 + disabled = pythonOlder "3.9"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "stumpylog"; 19 19 repo = "gotenberg-client"; 20 - rev = "refs/tags/${version}"; 21 - hash = "sha256-pkxu9WIsyHW2iTepv5B2naKkK+yw8lT+i3EwobE+u1M="; 20 + tag = version; 21 + hash = "sha256-EMukzSY8nfm1L1metGhiEc9VqnI/vaLz7ITgbZi0fBw="; 22 22 }; 23 23 24 24 nativeBuildInputs = [ hatchling ];
+3 -3
pkgs/development/python-modules/griffe/default.nix
··· 14 14 15 15 buildPythonPackage rec { 16 16 pname = "griffe"; 17 - version = "1.5.1"; 17 + version = "1.5.4"; 18 18 pyproject = true; 19 19 20 20 disabled = pythonOlder "3.8"; ··· 22 22 src = fetchFromGitHub { 23 23 owner = "mkdocstrings"; 24 24 repo = "griffe"; 25 - rev = "refs/tags/${version}"; 26 - hash = "sha256-DeXmKswapXPYGTiJLq2yvCwJywCNl79XYHSau0VCCIY="; 25 + tag = version; 26 + hash = "sha256-F1/SjWy32d/CU86ZR/PK0QPiRMEbUNNeomZOBP/3K/k="; 27 27 }; 28 28 29 29 build-system = [ pdm-backend ];
+2 -2
pkgs/development/python-modules/ipympl/default.nix
··· 14 14 15 15 buildPythonPackage rec { 16 16 pname = "ipympl"; 17 - version = "0.9.4"; 17 + version = "0.9.5"; 18 18 format = "wheel"; 19 19 20 20 disabled = pythonOlder "3.5"; 21 21 22 22 src = fetchPypi { 23 23 inherit pname version format; 24 - hash = "sha256-WwwIxvT26mVbpYI5NjRXwQ+5IVV/UDjBpG20RX1taw4="; 24 + hash = "sha256-/xSjV/Q1UuySWC64svdrhEtGmqL6doM/FerX+lhMGfw="; 25 25 dist = "py3"; 26 26 python = "py3"; 27 27 };
+3 -3
pkgs/development/python-modules/minio/default.nix
··· 22 22 23 23 buildPythonPackage rec { 24 24 pname = "minio"; 25 - version = "7.2.12"; 25 + version = "7.2.13"; 26 26 pyproject = true; 27 27 28 28 disabled = pythonOlder "3.8"; ··· 30 30 src = fetchFromGitHub { 31 31 owner = "minio"; 32 32 repo = "minio-py"; 33 - rev = "refs/tags/${version}"; 34 - hash = "sha256-8CthbR62TZ7MFC3OCwtbHtGwmlQeFLgBtkyRX1P5SYU="; 33 + tag = version; 34 + hash = "sha256-RauPMoqVp4xnS4CXLH0HVTjA8o/BstoEWKWFHvjVllA="; 35 35 }; 36 36 37 37 postPatch = ''
+4 -9
pkgs/development/python-modules/safetensors/default.nix
··· 10 10 rustc, 11 11 setuptools-rust, 12 12 13 - # buildInputs 14 - libiconv, 15 - 16 13 # tests 17 14 h5py, 18 15 numpy, ··· 22 19 23 20 buildPythonPackage rec { 24 21 pname = "safetensors"; 25 - version = "0.4.5"; 22 + version = "0.5.0"; 26 23 pyproject = true; 27 24 28 25 src = fetchFromGitHub { 29 26 owner = "huggingface"; 30 27 repo = "safetensors"; 31 - rev = "refs/tags/v${version}"; 32 - hash = "sha256-gr4hBbecaGHaoNhRQQXWfLfNB0/wQPKftSiTnGgngog="; 28 + tag = "v${version}"; 29 + hash = "sha256-rs9mYl/2KNdV9e+L/kZr59kLw7ckW9UQPZwkaGyl1Iw="; 33 30 }; 34 31 35 32 cargoDeps = rustPlatform.fetchCargoTarball { 36 33 inherit src; 37 34 sourceRoot = "${src.name}/bindings/python"; 38 - hash = "sha256-zDXzEVvmJF1dEVUFGBc3losr9U1q/qJCjNFkdJ/pCd4="; 35 + hash = "sha256-bQkLBiuhVm2dzrf6hq+S04+zoXUszA7be8iS0WJSoOU="; 39 36 }; 40 37 41 38 sourceRoot = "${src.name}/bindings/python"; ··· 47 44 rustPlatform.maturinBuildHook 48 45 setuptools-rust 49 46 ]; 50 - 51 - buildInputs = lib.optionals stdenv.hostPlatform.isDarwin [ libiconv ]; 52 47 53 48 nativeCheckInputs = [ 54 49 h5py
+3 -3
pkgs/development/python-modules/slixmpp/default.nix
··· 14 14 15 15 buildPythonPackage rec { 16 16 pname = "slixmpp"; 17 - version = "1.8.5"; 17 + version = "1.8.6"; 18 18 format = "setuptools"; 19 19 20 - disabled = pythonOlder "3.7"; 20 + disabled = pythonOlder "3.9"; 21 21 22 22 src = fetchPypi { 23 23 inherit pname version; 24 - hash = "sha256-dePwrUhVX39ckijnBmwdQ1izPWQLT753PsNLA7f66aM="; 24 + hash = "sha256-YK/Kp8laD7nn8RWctwRkpVWIBterrinNMeP8iD+biws="; 25 25 }; 26 26 27 27 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/tencentcloud-sdk-python/default.nix
··· 10 10 11 11 buildPythonPackage rec { 12 12 pname = "tencentcloud-sdk-python"; 13 - version = "3.0.1293"; 13 + version = "3.0.1294"; 14 14 pyproject = true; 15 15 16 16 disabled = pythonOlder "3.9"; ··· 19 19 owner = "TencentCloud"; 20 20 repo = "tencentcloud-sdk-python"; 21 21 rev = "refs/tags/${version}"; 22 - hash = "sha256-ho1RneF7xRO6Lc7i4BxAVjHA9UZiEZA2+olnasv4RSw="; 22 + hash = "sha256-6Xuih0E+i5dxTlkYzYa0J3T0aNpCoGnnBo1tpfuzWQM="; 23 23 }; 24 24 25 25 build-system = [ setuptools ];
+4 -4
pkgs/development/python-modules/tika-client/default.nix
··· 9 9 10 10 buildPythonPackage rec { 11 11 pname = "tika-client"; 12 - version = "0.7.0"; 12 + version = "0.8.1"; 13 13 pyproject = true; 14 14 15 - disabled = pythonOlder "3.8"; 15 + disabled = pythonOlder "3.9"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "stumpylog"; 19 19 repo = "tika-client"; 20 - rev = "refs/tags/${version}"; 21 - hash = "sha256-0cv2HaquIUQOb5CPkCxSYvXDzu3OV7WKIT80jI+pjpY="; 20 + tag = version; 21 + hash = "sha256-UXd6GnwwFVUbBXhskBXDQaYlURQyrhgvMsncOwaLT1o="; 22 22 }; 23 23 24 24 build-system = [ hatchling ];
+3 -51
pkgs/development/python-modules/torch/default.nix
··· 454 454 455 455 env = 456 456 { 457 - # Suppress a weird warning in mkl-dnn, part of ideep in pytorch 458 - # (upstream seems to have fixed this in the wrong place?) 459 - # https://github.com/intel/mkl-dnn/commit/8134d346cdb7fe1695a2aa55771071d455fae0bc 460 - # https://github.com/pytorch/pytorch/issues/22346 461 - # 457 + # disable warnings as errors as they break the build on every compiler 458 + # bump, among other things. 462 459 # Also of interest: pytorch ignores CXXFLAGS uses CFLAGS for both C and C++: 463 460 # https://github.com/pytorch/pytorch/blob/v1.11.0/setup.py#L17 464 - NIX_CFLAGS_COMPILE = toString ( 465 - ( 466 - lib.optionals (blas.implementation == "mkl") [ "-Wno-error=array-bounds" ] 467 - # Suppress gcc regression: avx512 math function raises uninitialized variable warning 468 - # https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105593 469 - # See also: Fails to compile with GCC 12.1.0 https://github.com/pytorch/pytorch/issues/77939 470 - ++ lib.optionals (stdenv.cc.isGNU && lib.versionAtLeast stdenv.cc.version "12.0.0") [ 471 - "-Wno-error=maybe-uninitialized" 472 - "-Wno-error=uninitialized" 473 - ] 474 - # Since pytorch 2.0: 475 - # gcc-12.2.0/include/c++/12.2.0/bits/new_allocator.h:158:33: error: ‘void operator delete(void*, std::size_t)’ 476 - # ... called on pointer ‘<unknown>’ with nonzero offset [1, 9223372036854775800] [-Werror=free-nonheap-object] 477 - ++ lib.optionals (stdenv.cc.isGNU && lib.versions.major stdenv.cc.version == "12") [ 478 - "-Wno-error=free-nonheap-object" 479 - ] 480 - # .../source/torch/csrc/autograd/generated/python_functions_0.cpp:85:3: 481 - # error: cast from ... to ... converts to incompatible function type [-Werror,-Wcast-function-type-strict] 482 - ++ lib.optionals (stdenv.cc.isClang && lib.versionAtLeast stdenv.cc.version "16") [ 483 - "-Wno-error=cast-function-type-strict" 484 - # Suppresses the most spammy warnings. 485 - # This is mainly to fix https://github.com/NixOS/nixpkgs/issues/266895. 486 - ] 487 - ++ lib.optionals rocmSupport [ 488 - "-Wno-#warnings" 489 - "-Wno-cpp" 490 - "-Wno-unknown-warning-option" 491 - "-Wno-ignored-attributes" 492 - "-Wno-deprecated-declarations" 493 - "-Wno-defaulted-function-deleted" 494 - "-Wno-pass-failed" 495 - ] 496 - ++ [ 497 - "-Wno-unused-command-line-argument" 498 - "-Wno-uninitialized" 499 - "-Wno-array-bounds" 500 - "-Wno-free-nonheap-object" 501 - "-Wno-unused-result" 502 - ] 503 - ++ lib.optionals stdenv.cc.isGNU [ 504 - "-Wno-maybe-uninitialized" 505 - "-Wno-stringop-overflow" 506 - ] 507 - ) 508 - ); 509 - 461 + NIX_CFLAGS_COMPILE = "-Wno-error"; 510 462 USE_VULKAN = setBool vulkanSupport; 511 463 } 512 464 // lib.optionalAttrs vulkanSupport {
+3 -3
pkgs/development/python-modules/wagtail-localize/default.nix
··· 18 18 19 19 buildPythonPackage rec { 20 20 pname = "wagtail-localize"; 21 - version = "1.10"; 21 + version = "1.11.1"; 22 22 pyproject = true; 23 23 24 24 disabled = pythonOlder "3.9"; ··· 26 26 src = fetchFromGitHub { 27 27 repo = "wagtail-localize"; 28 28 owner = "wagtail"; 29 - rev = "refs/tags/v${version}"; 30 - hash = "sha256-khGzJj7LBxz5WPU8l20CmQjC9p5umk6spSyMMHBBguc="; 29 + tag = "v${version}"; 30 + hash = "sha256-HBc5t74zA7kUE8pvaYRZtslVInWrTw0UkmrGd+xaW0Q="; 31 31 }; 32 32 33 33 build-system = [ flit-core ];
+3 -3
pkgs/development/python-modules/ytmusicapi/default.nix
··· 9 9 10 10 buildPythonPackage rec { 11 11 pname = "ytmusicapi"; 12 - version = "1.8.2"; 12 + version = "1.9.1"; 13 13 pyproject = true; 14 14 15 15 disabled = pythonOlder "3.9"; ··· 17 17 src = fetchFromGitHub { 18 18 owner = "sigma67"; 19 19 repo = "ytmusicapi"; 20 - rev = "refs/tags/${version}"; 21 - hash = "sha256-SZ5YsQNrE91ycSXy/NjtjXp0E6msVKlV0f+Td0AwYpQ="; 20 + tag = version; 21 + hash = "sha256-yg8wjJTbx6LaVrln+Qdfn7XKnnI2n4W56YQZRYXrtLI="; 22 22 }; 23 23 24 24 build-system = [ setuptools-scm ];
+40
pkgs/development/python-modules/zabbix-utils/default.nix
··· 1 + { 2 + lib, 3 + aiohttp, 4 + buildPythonPackage, 5 + fetchFromGitHub, 6 + pytestCheckHook, 7 + pythonOlder, 8 + setuptools, 9 + }: 10 + 11 + buildPythonPackage rec { 12 + pname = "zabbix-utils"; 13 + version = "2.0.2"; 14 + pyproject = true; 15 + 16 + disabled = pythonOlder "3.8"; 17 + 18 + src = fetchFromGitHub { 19 + owner = "zabbix"; 20 + repo = "python-zabbix-utils"; 21 + rev = "refs/tags/v${version}"; 22 + hash = "sha256-rRPen/FzWT0cCnXWiSdoybtXeP1pxYqnjq5b0QPVs1I="; 23 + }; 24 + 25 + build-system = [ setuptools ]; 26 + 27 + dependencies = [ aiohttp ]; 28 + 29 + nativeCheckInputs = [ pytestCheckHook ]; 30 + 31 + pythonImportsCheck = [ "zabbix_utils" ]; 32 + 33 + meta = { 34 + description = "Library for zabbix"; 35 + homepage = "https://github.com/zabbix/python-zabbix-utils"; 36 + changelog = "https://github.com/zabbix/python-zabbix-utils/blob/${src.rev}/CHANGELOG.md"; 37 + license = lib.licenses.mit; 38 + maintainers = with lib.maintainers; [ fab ]; 39 + }; 40 + }
+1
pkgs/development/ruby-modules/with-packages/Gemfile
··· 58 58 gem 'ffi-rzmq-core' 59 59 gem 'fog-dnsimple' 60 60 gem 'gdk_pixbuf2' 61 + gem 'gettext' 61 62 gem 'gio2' 62 63 gem 'git' 63 64 gem 'github-pages'
+13
pkgs/servers/mobilizon/0001-fix-version.patch
··· 1 + diff --git a/mix.exs b/mix.exs 2 + index 8338abf8..883e6987 100644 3 + --- a/mix.exs 4 + +++ b/mix.exs 5 + @@ -1,7 +1,7 @@ 6 + defmodule Mobilizon.Mixfile do 7 + use Mix.Project 8 + 9 + - @version "5.1.0" 10 + + @version "5.1.1" 11 + 12 + def project do 13 + [
+5
pkgs/servers/mobilizon/default.nix
··· 19 19 mixRelease rec { 20 20 inherit (common) pname version src; 21 21 22 + # Version 5.1.1 failed to bump their internal package version, 23 + # which causes issues with static file serving in the NixOS module. 24 + # See https://github.com/NixOS/nixpkgs/pull/370277 25 + patches = [ ./0001-fix-version.patch ]; 26 + 22 27 nativeBuildInputs = [ 23 28 git 24 29 cmake
+45 -23
pkgs/servers/sql/postgresql/generic.nix
··· 146 146 "lib" 147 147 "man" 148 148 ]; 149 - outputChecks.out = { 150 - disallowedReferences = [ 151 - "dev" 152 - "doc" 153 - "man" 154 - ]; 155 - disallowedRequisites = [ 156 - stdenv'.cc 157 - llvmPackages.llvm.out 158 - ] ++ (map lib.getDev (builtins.filter (drv: drv ? "dev") finalAttrs.buildInputs)); 159 - }; 160 - outputChecks.lib = { 161 - disallowedReferences = [ 162 - "out" 163 - "dev" 164 - "doc" 165 - "man" 166 - ]; 167 - disallowedRequisites = [ 168 - stdenv'.cc 169 - llvmPackages.llvm.out 170 - ] ++ (map lib.getDev (builtins.filter (drv: drv ? "dev") finalAttrs.buildInputs)); 171 - }; 149 + outputChecks = 150 + { 151 + out = { 152 + disallowedReferences = [ 153 + "dev" 154 + "doc" 155 + "man" 156 + ]; 157 + disallowedRequisites = [ 158 + stdenv'.cc 159 + llvmPackages.llvm.out 160 + ] ++ (map lib.getDev (builtins.filter (drv: drv ? "dev") finalAttrs.buildInputs)); 161 + }; 162 + 163 + lib = { 164 + disallowedReferences = [ 165 + "out" 166 + "dev" 167 + "doc" 168 + "man" 169 + ]; 170 + disallowedRequisites = [ 171 + stdenv'.cc 172 + llvmPackages.llvm.out 173 + ] ++ (map lib.getDev (builtins.filter (drv: drv ? "dev") finalAttrs.buildInputs)); 174 + }; 175 + } 176 + // lib.optionalAttrs (atLeast "14" && olderThan "15") { 177 + # TODO: Make this unconditional via staging because of number of rebuilds. 178 + doc = { 179 + disallowedReferences = [ 180 + "out" 181 + "dev" 182 + "man" 183 + ]; 184 + }; 185 + 186 + man = { 187 + disallowedReferences = [ 188 + "out" 189 + "dev" 190 + "doc" 191 + ]; 192 + }; 193 + }; 172 194 173 195 strictDeps = true; 174 196
+2
pkgs/top-level/python-packages.nix
··· 18367 18367 pname = "z3-solver"; 18368 18368 }))).python; 18369 18369 18370 + zabbix-utils = callPackage ../development/python-modules/zabbix-utils { }; 18371 + 18370 18372 zadnegoale = callPackage ../development/python-modules/zadnegoale { }; 18371 18373 18372 18374 zamg = callPackage ../development/python-modules/zamg { };
+62
pkgs/top-level/ruby-packages.nix
··· 1113 1113 }; 1114 1114 version = "1.1.0"; 1115 1115 }; 1116 + forwardable = { 1117 + groups = ["default"]; 1118 + platforms = []; 1119 + source = { 1120 + remotes = ["https://rubygems.org"]; 1121 + sha256 = "1b5g1i3xdvmxxpq4qp0z4v78ivqnazz26w110fh4cvzsdayz8zgi"; 1122 + type = "gem"; 1123 + }; 1124 + version = "1.3.3"; 1125 + }; 1116 1126 forwardable-extended = { 1117 1127 groups = ["default"]; 1118 1128 platforms = []; ··· 1154 1164 type = "gem"; 1155 1165 }; 1156 1166 version = "3.0.1"; 1167 + }; 1168 + gettext = { 1169 + dependencies = ["erubi" "locale" "prime" "racc" "text"]; 1170 + groups = ["default"]; 1171 + platforms = []; 1172 + source = { 1173 + remotes = ["https://rubygems.org"]; 1174 + sha256 = "16h0kda5z4s4zqygyk0f52xzs9mlz9r4lnhjwk729hhmdbz68a19"; 1175 + type = "gem"; 1176 + }; 1177 + version = "3.4.9"; 1157 1178 }; 1158 1179 gio2 = { 1159 1180 dependencies = ["fiddle" "gobject-introspection"]; ··· 2140 2161 type = "gem"; 2141 2162 }; 2142 2163 version = "0.5.0"; 2164 + }; 2165 + locale = { 2166 + groups = ["default"]; 2167 + platforms = []; 2168 + source = { 2169 + remotes = ["https://rubygems.org"]; 2170 + sha256 = "107pm4ccmla23z963kyjldgngfigvchnv85wr6m69viyxxrrjbsj"; 2171 + type = "gem"; 2172 + }; 2173 + version = "2.1.4"; 2143 2174 }; 2144 2175 loofah = { 2145 2176 dependencies = ["crass" "nokogiri"]; ··· 2748 2779 }; 2749 2780 version = "1.2.1"; 2750 2781 }; 2782 + prime = { 2783 + dependencies = ["forwardable" "singleton"]; 2784 + groups = ["default"]; 2785 + platforms = []; 2786 + source = { 2787 + remotes = ["https://rubygems.org"]; 2788 + sha256 = "1qsk9q2n4yb80f5mwslxzfzm2ckar25grghk95cj7sbc1p2k3w5s"; 2789 + type = "gem"; 2790 + }; 2791 + version = "0.1.3"; 2792 + }; 2751 2793 prism = { 2752 2794 groups = ["default"]; 2753 2795 platforms = []; ··· 3600 3642 }; 3601 3643 version = "4.0.0"; 3602 3644 }; 3645 + singleton = { 3646 + groups = ["default"]; 3647 + platforms = []; 3648 + source = { 3649 + remotes = ["https://rubygems.org"]; 3650 + sha256 = "0y2pc7lr979pab5n5lvk3jhsi99fhskl5f2s6004v8sabz51psl3"; 3651 + type = "gem"; 3652 + }; 3653 + version = "0.3.0"; 3654 + }; 3603 3655 slather = { 3604 3656 dependencies = ["clamp" "xcodeproj"]; 3605 3657 groups = ["default"]; ··· 3778 3830 type = "gem"; 3779 3831 }; 3780 3832 version = "1.6.0"; 3833 + }; 3834 + text = { 3835 + groups = ["default"]; 3836 + platforms = []; 3837 + source = { 3838 + remotes = ["https://rubygems.org"]; 3839 + sha256 = "1x6kkmsr49y3rnrin91rv8mpc3dhrf3ql08kbccw8yffq61brfrg"; 3840 + type = "gem"; 3841 + }; 3842 + version = "1.3.1"; 3781 3843 }; 3782 3844 thor = { 3783 3845 groups = ["default"];