lol

Merge staging-next into staging

authored by

github-actions[bot] and committed by
GitHub
d930ff73 f4da8aac

+789 -519
+1
.github/labeler.yml
··· 345 345 # *developed in this repo*; 346 346 # - not individual tests 347 347 # - not packages for test frameworks 348 + - pkgs/build-support/testers/** 348 349 - nixos/lib/testing/** 349 350 - nixos/lib/test-driver/** 350 351 - nixos/tests/nixos-test-driver/**
+6
maintainers/maintainer-list.nix
··· 1085 1085 name = "alyaeanyx"; 1086 1086 keys = [ { fingerprint = "1F73 8879 5E5A 3DFC E2B3 FA32 87D1 AADC D25B 8DEE"; } ]; 1087 1087 }; 1088 + amadejkastelic = { 1089 + email = "amadejkastelic7@gmail.com"; 1090 + github = "amadejkastelic"; 1091 + githubId = 26391003; 1092 + name = "Amadej Kastelic"; 1093 + }; 1088 1094 aman9das = { 1089 1095 email = "amandas62640@gmail.com"; 1090 1096 github = "Aman9das";
+6 -3
nixos/modules/virtualisation/incus.nix
··· 44 44 qemu-utils 45 45 qemu_kvm 46 46 rsync 47 - skopeo 48 47 squashfs-tools-ng 49 48 squashfsTools 50 49 sshfs 51 50 swtpm 52 51 systemd 53 52 thin-provisioning-tools 54 - umoci 55 53 util-linux 56 54 virtiofsd 57 55 xdelta 58 56 xz 57 + ] 58 + ++ lib.optionals (lib.versionAtLeast cfg.package.version "6.3.0") [ 59 + skopeo 60 + umoci 59 61 ] 60 62 ++ lib.optionals config.security.apparmor.enable [ 61 63 apparmor-bin-utils ··· 111 113 environment = lib.mkMerge [ 112 114 { 113 115 INCUS_LXC_TEMPLATE_CONFIG = "${pkgs.lxcfs}/share/lxc/config"; 114 - INCUS_EDK2_PATH = ovmf; 115 116 INCUS_USBIDS_PATH = "${pkgs.hwdata}/share/hwdata/usb.ids"; 116 117 PATH = lib.mkForce serverBinPath; 117 118 } 119 + (lib.mkIf (lib.versionOlder cfg.package.version "6.3.0") { INCUS_OVMF_PATH = ovmf; }) 120 + (lib.mkIf (lib.versionAtLeast cfg.package.version "6.3.0") { INCUS_EDK2_PATH = ovmf; }) 118 121 (lib.mkIf (cfg.ui.enable) { "INCUS_UI" = cfg.ui.package; }) 119 122 ]; 120 123
+2 -2
pkgs/applications/blockchains/haven-cli/default.nix
··· 9 9 10 10 stdenv.mkDerivation rec { 11 11 pname = "haven-cli"; 12 - version = "4.0.0"; 12 + version = "4.0.2"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "haven-protocol-org"; 16 16 repo = "haven-main"; 17 17 rev = "v${version}"; 18 - hash = "sha256-craPgQtavSatoVzduIQCWuakIBeXWFWa9E0ALau4AcI="; 18 + hash = "sha256-XjRxpUW7NC12T5G7fol4avWLJDOOawxJbAHOp5eZ0Fk="; 19 19 fetchSubmodules = true; 20 20 }; 21 21
+4 -4
pkgs/applications/editors/emacs/elisp-packages/manual-packages/lspce/module.nix
··· 6 6 7 7 rustPlatform.buildRustPackage { 8 8 pname = "lspce-module"; 9 - version = "1.1.0-unstable-2024-07-13"; 9 + version = "1.1.0-unstable-2024-07-14"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "zbelial"; 13 13 repo = "lspce"; 14 - rev = "01b77a4f544a912409857083842db51a20bfdbf3"; 15 - hash = "sha256-oew5EujNYGjk/agBw3ECAVe7GZl8rw/4M5t32JM+1T8="; 14 + rev = "fd320476df89cfd5d10f1b70303c891d3b1e3c81"; 15 + hash = "sha256-KnERYq/CvJhJIdQkpH/m82t9KFMapPl+CyZkYyujslU="; 16 16 }; 17 17 18 - cargoHash = "sha256-YLcSaFHsm/Iw7Q3y/YkfdbYKUPW0DRmaZnZ1A9vKR14="; 18 + cargoHash = "sha256-I2OobRu1hc6xc4bRrIO1FImPYBbFy1jXPcTsivbbskk="; 19 19 20 20 checkFlags = [ 21 21 # flaky test
+4
pkgs/applications/editors/vim/plugins/overrides.nix
··· 226 226 ''; 227 227 }; 228 228 229 + cmake-tools-nvim = super.cmake-tools-nvim.overrideAttrs { 230 + dependencies = with self; [ plenary-nvim ]; 231 + }; 232 + 229 233 cmp-ai = super.cmp-ai.overrideAttrs { 230 234 dependencies = with self; [ nvim-cmp plenary-nvim ]; 231 235 };
+44
pkgs/applications/editors/vscode/extensions/charliermarsh.ruff/default.nix
··· 1 + { 2 + stdenvNoCC, 3 + lib, 4 + vscode-utils, 5 + }: 6 + 7 + vscode-utils.buildVscodeMarketplaceExtension { 8 + mktplcRef = 9 + let 10 + sources = { 11 + "x86_64-linux" = { 12 + arch = "linux-x64"; 13 + hash = "sha256-KiCTJbLDut0Az7BmcYPQbFweT94RWnsE+JYvqVZ2P7s="; 14 + }; 15 + "x86_64-darwin" = { 16 + arch = "darwin-x64"; 17 + hash = "sha256-Szy+bE/42cNzcEa2yKCyvxr5OBqH2dPVgJnCS57z3nY="; 18 + }; 19 + "aarch64-linux" = { 20 + arch = "linux-arm64"; 21 + hash = "sha256-Bw1gdrb40baSXdrIgM0tlCLa18aGpRv1q7YN5wJRjNs="; 22 + }; 23 + "aarch64-darwin" = { 24 + arch = "darwin-arm64"; 25 + hash = "sha256-xcHL/2dliPD69mNEsbEpbtn5QLV1P3gqu9ftDOn58qM="; 26 + }; 27 + }; 28 + in 29 + { 30 + name = "ruff"; 31 + publisher = "charliermarsh"; 32 + version = "2024.34.0"; 33 + } 34 + // sources.${stdenvNoCC.system} or (throw "Unsupported system ${stdenvNoCC.system}"); 35 + 36 + meta = { 37 + license = lib.licenses.mit; 38 + changelog = "https://marketplace.visualstudio.com/items/charliermarsh.ruff/changelog"; 39 + description = "Visual Studio Code extension with support for the Ruff linter"; 40 + downloadPage = "https://marketplace.visualstudio.com/items?itemName=charliermarsh.ruff"; 41 + homepage = "https://github.com/astral-sh/ruff-vscode"; 42 + maintainers = [ lib.maintainers.azd325 ]; 43 + }; 44 + }
+44 -42
pkgs/applications/editors/vscode/extensions/default.nix
··· 887 887 }; 888 888 }; 889 889 890 - charliermarsh.ruff = buildVscodeMarketplaceExtension { 891 - mktplcRef = 892 - let 893 - sources = { 894 - "x86_64-linux" = { 895 - arch = "linux-x64"; 896 - hash = "sha256-2c0tH/MlDOqeyffcV8ZCy4woogBTcf1GCuPPO8JXaWc="; 897 - }; 898 - "x86_64-darwin" = { 899 - arch = "darwin-x64"; 900 - hash = "sha256-euvGIlO7931N56R5BWKu3F9nSEoDgf+DXk7Hgl1qSUw="; 901 - }; 902 - "aarch64-linux" = { 903 - arch = "linux-arm64"; 904 - hash = "sha256-dGpIHChnfrQbxRZDuoAi4imgStyyPdxdvTQ3lknMYu0="; 905 - }; 906 - "aarch64-darwin" = { 907 - arch = "darwin-arm64"; 908 - hash = "sha256-tElX4C0I5AmpxSHMtqOsxSAUImD1tqArB5fnvhw4LFc="; 909 - }; 910 - }; 911 - in 912 - { 913 - name = "ruff"; 914 - publisher = "charliermarsh"; 915 - version = "2024.4.0"; 916 - } 917 - // sources.${stdenv.system} or (throw "Unsupported system ${stdenv.system}"); 918 - meta = { 919 - license = lib.licenses.mit; 920 - changelog = "https://marketplace.visualstudio.com/items/charliermarsh.ruff/changelog"; 921 - description = "Visual Studio Code extension with support for the Ruff linter"; 922 - downloadPage = "https://marketplace.visualstudio.com/items?itemName=charliermarsh.ruff"; 923 - homepage = "https://github.com/astral-sh/ruff-vscode"; 924 - maintainers = [ lib.maintainers.azd325 ]; 925 - }; 926 - }; 890 + charliermarsh.ruff = callPackage ./charliermarsh.ruff { }; 927 891 928 892 cameron.vscode-pytest = buildVscodeMarketplaceExtension { 929 893 mktplcRef = { ··· 3178 3142 mktplcRef = { 3179 3143 name = "black-formatter"; 3180 3144 publisher = "ms-python"; 3181 - version = "2023.4.1"; 3182 - hash = "sha256-IJaLke0WF1rlKTiuwJHAXDQB1SS39AoQhc4iyqqlTyY="; 3145 + version = "2024.2.0"; 3146 + hash = "sha256-qIO+YqTXjwgznzUlnPSts1R2BM6iN8B9vESkelGPgZM="; 3183 3147 }; 3184 - meta = with lib; { 3148 + meta = { 3149 + changelog = "https://marketplace.visualstudio.com/items/ms-python.black-formatter/changelog"; 3185 3150 description = "Formatter extension for Visual Studio Code using black"; 3186 3151 downloadPage = "https://marketplace.visualstudio.com/items?itemName=ms-python.black-formatter"; 3187 3152 homepage = "https://github.com/microsoft/vscode-black-formatter"; 3188 - license = licenses.mit; 3189 - maintainers = with maintainers; [ sikmir ]; 3153 + license = lib.licenses.mit; 3154 + maintainers = with lib.maintainers; [ 3155 + amadejkastelic 3156 + sikmir 3157 + ]; 3158 + }; 3159 + }; 3160 + 3161 + ms-python.flake8 = buildVscodeMarketplaceExtension { 3162 + mktplcRef = { 3163 + name = "flake8"; 3164 + publisher = "ms-python"; 3165 + version = "2023.10.0"; 3166 + hash = "sha256-4Vjw8yJPrxLg0hcoTw8AEBEcmQ9sEUNqFaHLxICks0E="; 3167 + }; 3168 + meta = { 3169 + changelog = "https://marketplace.visualstudio.com/items/ms-python.flake8/changelog"; 3170 + description = "Python linting support for VS Code using Flake8"; 3171 + downloadPage = "https://marketplace.visualstudio.com/items?itemName=ms-python.flake8"; 3172 + homepage = "https://github.com/microsoft/vscode-flake8"; 3173 + license = lib.licenses.mit; 3174 + maintainers = [ lib.maintainers.amadejkastelic ]; 3190 3175 }; 3191 3176 }; 3192 3177 ··· 3203 3188 homepage = "https://github.com/microsoft/vscode-isort"; 3204 3189 license = licenses.mit; 3205 3190 maintainers = with maintainers; [ sikmir ]; 3191 + }; 3192 + }; 3193 + 3194 + ms-python.pylint = buildVscodeMarketplaceExtension { 3195 + mktplcRef = { 3196 + name = "pylint"; 3197 + publisher = "ms-python"; 3198 + version = "2023.10.1"; 3199 + hash = "sha256-1tI5u33c5CHFQxkJZ/OxW3ZA5qPr4RoCIf6dqIMPykQ="; 3200 + }; 3201 + meta = { 3202 + changelog = "https://marketplace.visualstudio.com/items/ms-python.pylint/changelog"; 3203 + description = "Python linting support for VS Code using Pylint"; 3204 + downloadPage = "https://marketplace.visualstudio.com/items?itemName=ms-python.pylint"; 3205 + homepage = "https://github.com/microsoft/vscode-pylint"; 3206 + license = lib.licenses.mit; 3207 + maintainers = [ lib.maintainers.amadejkastelic ]; 3206 3208 }; 3207 3209 }; 3208 3210
+22 -11
pkgs/applications/finance/irpf/default.nix pkgs/by-name/ir/irpf/package.nix
··· 7 7 , makeWrapper 8 8 , unzip 9 9 , xdg-utils 10 + , writeScript 10 11 }: 11 12 12 - stdenvNoCC.mkDerivation rec { 13 + stdenvNoCC.mkDerivation (finalAttrs: { 13 14 pname = "irpf"; 14 - version = "2024-1.1"; 15 + version = "2024-1.2"; 15 16 16 17 # https://www.gov.br/receitafederal/pt-br/centrais-de-conteudo/download/pgd/dirpf 17 18 # Para outros sistemas operacionais -> Multi 18 19 src = let 19 - year = lib.head (lib.splitVersion version); 20 + year = lib.head (lib.splitVersion finalAttrs.version); 20 21 in fetchzip { 21 - url = "https://downloadirpf.receita.fazenda.gov.br/irpf/${year}/irpf/arquivos/IRPF${version}.zip"; 22 - hash = "sha256-7Eh5XhZKs2DAQC33ICUG+mgjEU7H3jdYZSeiHNJ6I6Q="; 22 + url = "https://downloadirpf.receita.fazenda.gov.br/irpf/${year}/irpf/arquivos/IRPF${finalAttrs.version}.zip"; 23 + hash = "sha256-gwYWNnvpGej9B1EyFswYGYXh4i4wiyOG67VN1PWX3A0="; 23 24 }; 24 25 26 + passthru.updateScript = writeScript "update-irpf" '' 27 + #!/usr/bin/env nix-shell 28 + #!nix-shell -i bash -p curl pup common-updater-scripts 29 + 30 + set -eu -o pipefail 31 + #parses the html with the install links for the containers that contain the instalation files of type 'file archive, gets the version number of each version, and sorts to get the latest one on the website 32 + version="$(curl -s https://www.gov.br/receitafederal/pt-br/centrais-de-conteudo/download/pgd/dirpf | pup '.rfb_container .rfb_ositem:parent-of(.fa-file-archive) attr{href}' | grep -oP "IRPF\K(\d+)-[\d.]+\d" | sort -r | head -1)" 33 + update-source-version irpf "$version" 34 + ''; 35 + 25 36 nativeBuildInputs = [ unzip makeWrapper copyDesktopItems ]; 26 37 27 38 desktopItems = [ 28 39 (makeDesktopItem { 29 - name = pname; 30 - exec = pname; 40 + name = finalAttrs.pname; 41 + exec = finalAttrs.pname; 31 42 icon = "rfb64"; 32 43 desktopName = "Imposto de Renda Pessoa Física"; 33 44 comment = "Programa Oficial da Receita para elaboração do IRPF"; ··· 38 49 installPhase = '' 39 50 runHook preInstall 40 51 41 - BASEDIR="$out/share/${pname}" 52 + BASEDIR="$out/share/${finalAttrs.pname}" 42 53 mkdir -p "$BASEDIR" 43 54 44 55 cp --no-preserve=mode -r help lib lib-modulos "$BASEDIR" ··· 46 57 install -Dm644 irpf.jar Leia-me.htm offline.png online.png pgd-updater.jar "$BASEDIR" 47 58 48 59 # make xdg-open overrideable at runtime 49 - makeWrapper ${jdk11}/bin/java $out/bin/${pname} \ 60 + makeWrapper ${jdk11}/bin/java $out/bin/${finalAttrs.pname} \ 50 61 --add-flags "-Dawt.useSystemAAFontSettings=on" \ 51 62 --add-flags "-Dswing.aatext=true" \ 52 - --add-flags "-jar $BASEDIR/${pname}.jar" \ 63 + --add-flags "-jar $BASEDIR/${finalAttrs.pname}.jar" \ 53 64 --suffix PATH : ${lib.makeBinPath [ xdg-utils ]} \ 54 65 --set _JAVA_AWT_WM_NONREPARENTING 1 \ 55 66 --set AWT_TOOLKIT MToolkit ··· 74 85 maintainers = with maintainers; [ atila bryanasdev000 ]; 75 86 mainProgram = "irpf"; 76 87 }; 77 - } 88 + })
+2 -2
pkgs/applications/misc/bemenu/default.nix
··· 7 7 8 8 stdenv.mkDerivation (finalAttrs: { 9 9 pname = "bemenu"; 10 - version = "0.6.22"; 10 + version = "0.6.23"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "Cloudef"; 14 14 repo = "bemenu"; 15 15 rev = finalAttrs.version; 16 - hash = "sha256-wdOrVX4AgGXySlwmqFRp9OWoSkEYBIZumBGTrFfyNpg="; 16 + hash = "sha256-0vpqJ2jydTt6aVni0ma0g+80PFz+C4xJ5M77sMODkSg="; 17 17 }; 18 18 19 19 strictDeps = true;
+3 -3
pkgs/applications/misc/tui-journal/default.nix
··· 11 11 12 12 rustPlatform.buildRustPackage rec { 13 13 pname = "tui-journal"; 14 - version = "0.9.0"; 14 + version = "0.9.1"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "AmmarAbouZor"; 18 18 repo = "tui-journal"; 19 19 rev = "v${version}"; 20 - hash = "sha256-FAN0F54cCEfqoSr1La+X+et5MGTzB2Wb466Xr8eyeiI="; 20 + hash = "sha256-GmLhBlNHVyO0oUvjOBpTEqQiPYZ68MdgwAqt9v2oMdU="; 21 21 }; 22 22 23 - cargoHash = "sha256-y6gAv4Xf0yxpbOAdYhp3nDBH8skiyAI10+Ylz/uxf7w="; 23 + cargoHash = "sha256-+5rWjq3/0xfJ5Nbq0kReombuaJkcFmHoqVzzQ4x68Hc="; 24 24 25 25 nativeBuildInputs = [ 26 26 pkg-config
+2 -2
pkgs/applications/networking/cluster/helm/plugins/helm-git.nix
··· 11 11 12 12 stdenv.mkDerivation rec { 13 13 pname = "helm-git"; 14 - version = "0.17.0"; 14 + version = "1.3.0"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "aslafy-z"; 18 18 repo = pname; 19 19 rev = "v${version}"; 20 - sha256 = "sha256-vzDSuWaq3ShKz1ckv3BxQtu8tR3QKl0xhcO5IZDbgps="; 20 + sha256 = "sha256-o9y1C4O1uG2Z7f3kCEoK1tSmSuQh1zJxB/CZBv/GPus="; 21 21 }; 22 22 23 23 nativeBuildInputs = [ makeWrapper ];
+40 -35
pkgs/applications/networking/pyload-ng/default.nix
··· 1 - { lib, fetchPypi, nixosTests, python3 }: 1 + { 2 + lib, 3 + fetchPypi, 4 + nixosTests, 5 + python3, 6 + }: 2 7 3 8 python3.pkgs.buildPythonApplication rec { 4 9 version = "0.5.0b3.dev85"; ··· 22 27 23 28 postPatch = '' 24 29 # relax version bounds 25 - sed -i 's/\([A-z0-9]*\)~=.*$/\1/' setup.cfg 30 + sed -i -E 's/([A-z0-9]*)~=[^;]*(.*)/\1\2/' setup.cfg 26 31 ''; 27 32 28 - propagatedBuildInputs = with python3.pkgs; [ 29 - bitmath 30 - certifi 31 - cheroot 32 - cryptography 33 - filetype 34 - flask 35 - flask-babel 36 - flask-caching 37 - flask-compress 38 - flask-session 39 - flask-themes2 40 - js2py 41 - pycurl 42 - semver 43 - setuptools 44 - ]; 33 + dependencies = 34 + with python3.pkgs; 35 + [ 36 + bitmath 37 + certifi 38 + cheroot 39 + cryptography 40 + filetype 41 + flask 42 + flask-babel 43 + flask-caching 44 + flask-compress 45 + flask-session 46 + flask-themes2 47 + pycurl 48 + semver 49 + setuptools 50 + ] 51 + ++ (if pythonOlder "3.12" then [ js2py ] else [ dukpy ]); 45 52 46 - passthru = { 47 - optional-dependencies = { 48 - plugins = with python3.pkgs; [ 49 - beautifulsoup4 # for some plugins 50 - colorlog # colorful console logging 51 - pillow # for some CAPTCHA plugin 52 - send2trash # send some files to trash instead of deleting them 53 - slixmpp # XMPP plugin 54 - ]; 55 - }; 53 + optional-dependencies = { 54 + plugins = with python3.pkgs; [ 55 + beautifulsoup4 # for some plugins 56 + colorlog # colorful console logging 57 + pillow # for some CAPTCHA plugin 58 + send2trash # send some files to trash instead of deleting them 59 + slixmpp # XMPP plugin 60 + ]; 61 + }; 56 62 57 - tests = { 58 - inherit (nixosTests) pyload; 59 - }; 63 + passthru.tests = { 64 + inherit (nixosTests) pyload; 60 65 }; 61 66 62 - meta = with lib; { 67 + meta = { 63 68 description = "Free and open-source download manager with support for 1-click-hosting sites"; 64 69 homepage = "https://github.com/pyload/pyload"; 65 - license = licenses.agpl3Plus; 66 - maintainers = with maintainers; [ ruby0b ]; 70 + license = lib.licenses.agpl3Plus; 71 + maintainers = with lib.maintainers; [ ruby0b ]; 67 72 mainProgram = "pyload"; 68 73 }; 69 74 }
+10 -9
pkgs/applications/science/biology/dcm2niix/default.nix
··· 21 21 sha256 = "sha256-8HNFUGx2uuEb8UrGUiqkN+uVDX83YIisT2uO1Z7GCxc="; 22 22 }; 23 23 in 24 - stdenv.mkDerivation rec { 25 - version = "1.0.20230411"; 24 + stdenv.mkDerivation (finalAttrs: { 25 + version = "1.0.20240202"; 26 26 pname = "dcm2niix"; 27 27 28 28 src = fetchFromGitHub { 29 29 owner = "rordenlab"; 30 30 repo = "dcm2niix"; 31 - rev = "v${version}"; 32 - sha256 = "sha256-kOVEoqrk4l6sH8iDVx1QmOYP5tCufxsWnCnn9BibZ08="; 31 + rev = "v${finalAttrs.version}"; 32 + sha256 = "sha256-vJUPv/6KNCsU8UjwfktHdTlsweG7+UGgAEZeESfBkD8="; 33 33 }; 34 34 35 35 patches = lib.optionals withCloudflareZlib [ ··· 55 55 "-DZLIB_IMPLEMENTATION=Cloudflare" 56 56 ]; 57 57 58 - meta = with lib; { 58 + meta = { 59 59 description = "DICOM to NIfTI converter"; 60 60 mainProgram = "dcm2niix"; 61 61 longDescription = '' 62 62 dcm2niix is designed to convert neuroimaging data from the DICOM format to the NIfTI format. 63 63 ''; 64 64 homepage = "https://www.nitrc.org/projects/dcm2nii"; 65 - license = licenses.bsd3; 66 - maintainers = with maintainers; [ ashgillman rbreslow ]; 67 - platforms = platforms.all; 65 + changelog = "https://github.com/rordenlab/dcm2niix/releases/tag/v${finalAttrs.version}"; 66 + license = lib.licenses.bsd3; 67 + maintainers = with lib.maintainers; [ ashgillman rbreslow ]; 68 + platforms = lib.platforms.all; 68 69 }; 69 - } 70 + })
+8 -19
pkgs/build-support/testers/default.nix
··· 1 - { pkgs, pkgsLinux, buildPackages, lib, callPackage, runCommand, stdenv, substituteAll, testers }: 1 + { pkgs, pkgsLinux, buildPackages, diffoscopeMinimal, lib, callPackage, runCommand, stdenv, substituteAll, testers }: 2 2 # Documentation is in doc/build-helpers/testers.chapter.md 3 3 { 4 4 # See https://nixos.org/manual/nixpkgs/unstable/#tester-lycheeLinkCheck ··· 27 27 expected, 28 28 }: runCommand "equal-contents-${lib.strings.toLower assertion}" { 29 29 inherit assertion actual expected; 30 + nativeBuildInputs = [ diffoscopeMinimal ]; 30 31 } '' 31 32 echo "Checking:" 32 - echo "$assertion" 33 - if ! diff -U5 -r "$actual" "$expected" --color=always 33 + printf '%s\n' "$assertion" 34 + if ! diffoscope --no-progress --text-color=always --exclude-directory-metadata=no -- "$actual" "$expected" 34 35 then 35 36 echo 36 37 echo 'Contents must be equal, but were not!' 37 38 echo 38 39 echo "+: expected, at $expected" 39 40 echo "-: unexpected, at $actual" 40 - exit 1 41 + false 41 42 else 42 - find "$expected" -type f -executable > expected-executables | sort 43 - find "$actual" -type f -executable > actual-executables | sort 44 - if ! diff -U0 actual-executables expected-executables --color=always 45 - then 46 - echo 47 - echo "Contents must be equal, but some files' executable bits don't match" 48 - echo 49 - echo "+: make this file executable in the actual contents" 50 - echo "-: make this file non-executable in the actual contents" 51 - exit 1 52 - else 53 - echo "expected $expected and actual $actual match." 54 - echo 'OK' 55 - touch $out 56 - fi 43 + echo "expected $expected and actual $actual match." 44 + echo OK 45 + touch -- "$out" 57 46 fi 58 47 ''; 59 48
+116 -98
pkgs/build-support/testers/test/default.nix
··· 1 - { testers, lib, pkgs, hello, runCommand, ... }: 1 + { testers, lib, pkgs, hello, runCommand, emptyFile, emptyDirectory, ... }: 2 2 let 3 3 pkgs-with-overlay = pkgs.extend(final: prev: { 4 4 proof-of-overlay-hello = prev.hello; ··· 99 99 }; 100 100 101 101 testEqualContents = lib.recurseIntoAttrs { 102 - happy = testers.testEqualContents { 102 + equalDir = testers.testEqualContents { 103 103 assertion = "The same directory contents at different paths are recognized as equal"; 104 - expected = runCommand "expected" {} '' 105 - mkdir -p $out/c 106 - echo a >$out/a 107 - echo b >$out/b 108 - echo d >$out/c/d 104 + expected = runCommand "expected" { } '' 105 + mkdir -p -- "$out/c" 106 + echo a >"$out/a" 107 + echo b >"$out/b" 108 + echo d >"$out/c/d" 109 + echo e >"$out/e" 110 + chmod a+x -- "$out/e" 109 111 ''; 110 - actual = runCommand "actual" {} '' 111 - mkdir -p $out/c 112 - echo a >$out/a 113 - echo b >$out/b 114 - echo d >$out/c/d 112 + actual = runCommand "actual" { } '' 113 + mkdir -p -- "$out/c" 114 + echo a >"$out/a" 115 + echo b >"$out/b" 116 + echo d >"$out/c/d" 117 + echo e >"$out/e" 118 + chmod a+x -- "$out/e" 115 119 ''; 116 120 }; 117 121 118 - unequalExe = 119 - runCommand "testEqualContents-unequalExe" { 120 - log = testers.testBuildFailure (testers.testEqualContents { 121 - assertion = "The same directory contents at different paths are recognized as equal"; 122 - expected = runCommand "expected" {} '' 123 - mkdir -p $out/c 124 - echo a >$out/a 125 - chmod a+x $out/a 126 - echo b >$out/b 127 - echo d >$out/c/d 128 - ''; 129 - actual = runCommand "actual" {} '' 130 - mkdir -p $out/c 131 - echo a >$out/a 132 - echo b >$out/b 133 - chmod a+x $out/b 134 - echo d >$out/c/d 135 - ''; 136 - }); 137 - } '' 138 - ( 139 - set -x 140 - grep -F -- "executable bits don't match" $log/testBuildFailure.log 141 - grep -E -- '+.*-actual/a' $log/testBuildFailure.log 142 - grep -E -- '-.*-actual/b' $log/testBuildFailure.log 143 - grep -F -- "--- actual-executables" $log/testBuildFailure.log 144 - grep -F -- "+++ expected-executables" $log/testBuildFailure.log 145 - ) || { 146 - echo "Test failed: could not find pattern in build log $log" 147 - exit 1 148 - } 149 - echo 'All good.' 150 - touch $out 151 - ''; 122 + fileMissing = testers.testBuildFailure ( 123 + testers.testEqualContents { 124 + assertion = "Directories with different file list are not recognized as equal"; 125 + expected = runCommand "expected" { } '' 126 + mkdir -p -- "$out/c" 127 + echo a >"$out/a" 128 + echo b >"$out/b" 129 + echo d >"$out/c/d" 130 + ''; 131 + actual = runCommand "actual" { } '' 132 + mkdir -p -- "$out/c" 133 + echo a >"$out/a" 134 + echo d >"$out/c/d" 135 + ''; 136 + } 137 + ); 152 138 153 - fileDiff = 154 - runCommand "testEqualContents-fileDiff" { 155 - log = testers.testBuildFailure (testers.testEqualContents { 156 - assertion = "The same directory contents at different paths are recognized as equal"; 157 - expected = runCommand "expected" {} '' 158 - mkdir -p $out/c 159 - echo a >$out/a 160 - echo b >$out/b 161 - echo d >$out/c/d 162 - ''; 163 - actual = runCommand "actual" {} '' 164 - mkdir -p $out/c 165 - echo a >$out/a 166 - echo B >$out/b 167 - echo d >$out/c/d 168 - ''; 169 - }); 170 - } '' 171 - ( 172 - set -x 173 - grep -F -- "Contents must be equal but were not" $log/testBuildFailure.log 174 - grep -E -- '+++ .*-actual/b' $log/testBuildFailure.log 175 - grep -E -- '--- .*-actual/b' $log/testBuildFailure.log 176 - grep -F -- "-B" $log/testBuildFailure.log 177 - grep -F -- "+b" $log/testBuildFailure.log 178 - ) || { 179 - echo "Test failed: could not find pattern in build log $log" 180 - exit 1 181 - } 182 - echo 'All good.' 183 - touch $out 139 + equalExe = testers.testEqualContents { 140 + assertion = "The same executable file contents at different paths are recognized as equal"; 141 + expected = runCommand "expected" { } '' 142 + echo test >"$out" 143 + chmod a+x -- "$out" 184 144 ''; 145 + actual = runCommand "actual" { } '' 146 + echo test >"$out" 147 + chmod a+x -- "$out" 148 + ''; 149 + }; 185 150 186 - fileMissing = 187 - runCommand "testEqualContents-fileMissing" { 188 - log = testers.testBuildFailure (testers.testEqualContents { 189 - assertion = "The same directory contents at different paths are recognized as equal"; 190 - expected = runCommand "expected" {} '' 191 - mkdir -p $out/c 192 - echo a >$out/a 193 - echo b >$out/b 194 - echo d >$out/c/d 195 - ''; 196 - actual = runCommand "actual" {} '' 197 - mkdir -p $out/c 198 - echo a >$out/a 199 - echo d >$out/c/d 200 - ''; 201 - }); 202 - } '' 151 + unequalExe = testers.testBuildFailure ( 152 + testers.testEqualContents { 153 + assertion = "Different file mode bits are not recognized as equal"; 154 + expected = runCommand "expected" { } '' 155 + touch -- "$out" 156 + chmod a+x -- "$out" 157 + ''; 158 + actual = runCommand "actual" { } '' 159 + touch -- "$out" 160 + ''; 161 + } 162 + ); 163 + 164 + unequalExeInDir = testers.testBuildFailure ( 165 + testers.testEqualContents { 166 + assertion = "Different file mode bits are not recognized as equal in directory"; 167 + expected = runCommand "expected" { } '' 168 + mkdir -p -- "$out/a" 169 + echo b >"$out/b" 170 + chmod a+x -- "$out/b" 171 + ''; 172 + actual = runCommand "actual" { } '' 173 + mkdir -p -- "$out/a" 174 + echo b >"$out/b" 175 + ''; 176 + } 177 + ); 178 + 179 + nonExistentPath = testers.testBuildFailure ( 180 + testers.testEqualContents { 181 + assertion = "Non existent paths are not recognized as equal"; 182 + expected = "${emptyDirectory}/foo"; 183 + actual = "${emptyDirectory}/bar"; 184 + } 185 + ); 186 + 187 + emptyFileAndDir = testers.testBuildFailure ( 188 + testers.testEqualContents { 189 + assertion = "Empty file and directory are not recognized as equal"; 190 + expected = emptyFile; 191 + actual = emptyDirectory; 192 + } 193 + ); 194 + 195 + fileDiff = 196 + let 197 + log = testers.testBuildFailure ( 198 + testers.testEqualContents { 199 + assertion = "Different files are not recognized as equal in subdirectories"; 200 + expected = runCommand "expected" { } '' 201 + mkdir -p -- "$out/b" 202 + echo a >"$out/a" 203 + echo EXPECTED >"$out/b/c" 204 + ''; 205 + actual = runCommand "actual" { } '' 206 + mkdir -p "$out/b" 207 + echo a >"$out/a" 208 + echo ACTUAL >"$out/b/c" 209 + ''; 210 + } 211 + ); 212 + in 213 + runCommand "testEqualContents-fileDiff" { inherit log; } '' 203 214 ( 204 215 set -x 205 - grep -F -- "Contents must be equal but were not" $log/testBuildFailure.log 206 - grep -E -- 'Only in .*-expected: b' $log/testBuildFailure.log 216 + # Note: use `&&` operator to chain commands because errexit (set -e) 217 + # does not work in this context (even when set explicitly and with 218 + # inherit_errexit), otherwise the subshell exits with the status of 219 + # the last run command and ignores preceding failures. 220 + grep -F -- 'Contents must be equal, but were not!' "$log/testBuildFailure.log" && 221 + grep -E -- '\+\+\+ .*-expected/b/c' "$log/testBuildFailure.log" && 222 + grep -E -- '--- .*-actual/b/c' "$log/testBuildFailure.log" && 223 + grep -F -- -ACTUAL "$log/testBuildFailure.log" && 224 + grep -F -- +EXPECTED "$log/testBuildFailure.log" 207 225 ) || { 208 226 echo "Test failed: could not find pattern in build log $log" 209 - exit 1 227 + false 210 228 } 211 229 echo 'All good.' 212 - touch $out 230 + touch -- "$out" 213 231 ''; 214 232 }; 215 233 }
+3 -3
pkgs/by-name/af/affine/package.nix
··· 18 18 }; 19 19 in { 20 20 pname = "affine"; 21 - version = "0.15.2"; 21 + version = "0.15.6"; 22 22 src = fetchurl { 23 23 url = "https://github.com/toeverything/AFFiNE/releases/download/v${finalAttrs.version}/affine-${finalAttrs.version}-stable-linux-x64.zip"; 24 - hash = "sha256-Nu5s/0sP4exRtfjd058tD5jzDezPHnHjm5CJxOLJvVE="; 24 + hash = "sha256-0XlKmjL9rYUYIMgpJ9knM+RbtLlzB1P5Rk62naTmznw="; 25 25 }; 26 26 nativeBuildInputs = [ 27 27 copyDesktopItems ··· 61 61 homepage = "https://affine.pro/"; 62 62 downloadPage = "https://affine.pro/download"; 63 63 license = licenses.mit; 64 - maintainers = with maintainers; [richar]; 64 + maintainers = with maintainers; [richar redyf]; 65 65 mainProgram = "affine"; 66 66 platforms = ["x86_64-linux"]; 67 67 };
+56
pkgs/by-name/an/android-studio-tools/package.nix
··· 1 + { 2 + lib, 3 + stdenvNoCC, 4 + fetchzip, 5 + makeWrapper, 6 + openjdk, 7 + }: 8 + 9 + stdenvNoCC.mkDerivation { 10 + pname = "android-studio-tools"; 11 + version = "11076708"; 12 + 13 + src = fetchzip { 14 + # The only difference between the Linux and Mac versions is a single comment at the top of all the scripts 15 + # Therefore, we will use the Linux version and just patch the comment 16 + url = "https://dl.google.com/android/repository/commandlinetools-linux-11076708_latest.zip"; 17 + hash = "sha256-NjxJzHRT2/zZ9YzzjqaMVxpOELkDneQgc1/y1GUnZow="; 18 + }; 19 + 20 + postPatch = '' 21 + find . -type f -not -path "./bin/*" -exec chmod -x {} \; 22 + '' + lib.optionalString stdenvNoCC.isDarwin '' 23 + for f in cmdline-tools/bin/*; do 24 + sed -i 's|start up script for Linux|start up script for Mac|' $f 25 + done 26 + ''; 27 + 28 + nativeBuildInputs = [ makeWrapper ]; 29 + 30 + dontConfigure = true; 31 + dontBuild = true; 32 + 33 + installPhase = '' 34 + runHook preInstall 35 + 36 + mkdir -p $out 37 + cp -r . $out 38 + 39 + for f in $out/bin/*; do 40 + wrapProgram $f --set JAVA_HOME "${openjdk}" 41 + done 42 + 43 + runHook postInstall 44 + ''; 45 + 46 + meta = { 47 + description = "Android Studio CLI Tools"; 48 + homepage = "https://developer.android.com/studio"; 49 + downloadPage = "https://developer.android.com/studio"; 50 + changelog = "https://developer.android.com/studio/releases"; 51 + license = lib.licenses.unfree; 52 + maintainers = with lib.maintainers; [ pandapip1 ]; 53 + platforms = lib.platforms.all; 54 + sourceProvenance = with lib.sourceTypes; [ fromSource ]; # The 'binaries' are actually shell scripts 55 + }; 56 + }
+51
pkgs/by-name/an/any-nix-shell/package.nix
··· 1 + { 2 + lib, 3 + stdenv, 4 + fetchFromGitHub, 5 + makeWrapper, 6 + bash, 7 + gnused, 8 + which, 9 + }: 10 + 11 + stdenv.mkDerivation rec { 12 + pname = "any-nix-shell"; 13 + version = "2.0.0"; 14 + 15 + src = fetchFromGitHub { 16 + owner = "haslersn"; 17 + repo = "any-nix-shell"; 18 + rev = "v${version}"; 19 + hash = "sha256-n4+aokW5o3EuXKqyc12vRsn5Mlkvdso27AdpahhySYw="; 20 + }; 21 + 22 + strictDeps = true; 23 + 24 + nativeBuildInputs = [ makeWrapper ]; 25 + 26 + buildInputs = [ bash ]; 27 + 28 + installPhase = '' 29 + runHook preInstall 30 + 31 + mkdir -p $out/bin 32 + cp -r bin $out 33 + wrapProgram $out/bin/any-nix-shell --prefix PATH ":" ${ 34 + lib.makeBinPath [ 35 + (placeholder "out") 36 + gnused 37 + which 38 + ] 39 + } 40 + 41 + runHook postInstall 42 + ''; 43 + 44 + meta = { 45 + description = "fish, xonsh and zsh support for nix-shell"; 46 + license = lib.licenses.mit; 47 + homepage = "https://github.com/haslersn/any-nix-shell"; 48 + maintainers = with lib.maintainers; [ haslersn ]; 49 + mainProgram = "any-nix-shell"; 50 + }; 51 + }
+189 -162
pkgs/by-name/ar/arrow-cpp/package.nix
··· 1 - { stdenv 2 - , lib 3 - , fetchurl 4 - , fetchFromGitHub 5 - , fixDarwinDylibNames 6 - , autoconf 7 - , aws-sdk-cpp 8 - , aws-sdk-cpp-arrow ? aws-sdk-cpp.override { 1 + { 2 + stdenv, 3 + lib, 4 + fetchurl, 5 + fetchFromGitHub, 6 + fixDarwinDylibNames, 7 + autoconf, 8 + aws-sdk-cpp, 9 + aws-sdk-cpp-arrow ? aws-sdk-cpp.override { 9 10 apis = [ 10 11 "cognito-identity" 11 12 "config" ··· 14 15 "sts" 15 16 "transfer" 16 17 ]; 17 - } 18 - , boost 19 - , brotli 20 - , bzip2 21 - , c-ares 22 - , cmake 23 - , crc32c 24 - , curl 25 - , flatbuffers 26 - , gflags 27 - , glog 28 - , google-cloud-cpp 29 - , grpc 30 - , gtest 31 - , libbacktrace 32 - , lz4 33 - , minio 34 - , ninja 35 - , nlohmann_json 36 - , openssl 37 - , perl 38 - , protobuf 39 - , python3 40 - , rapidjson 41 - , re2 42 - , snappy 43 - , sqlite 44 - , thrift 45 - , tzdata 46 - , utf8proc 47 - , which 48 - , zlib 49 - , zstd 50 - , testers 51 - , enableShared ? !stdenv.hostPlatform.isStatic 52 - , enableFlight ? true 53 - , enableJemalloc ? !stdenv.isDarwin 54 - , enableS3 ? true 55 - , enableGcs ? !stdenv.isDarwin 18 + }, 19 + boost, 20 + brotli, 21 + bzip2, 22 + cmake, 23 + crc32c, 24 + curl, 25 + flatbuffers, 26 + gflags, 27 + glog, 28 + google-cloud-cpp, 29 + grpc, 30 + gtest, 31 + libbacktrace, 32 + lz4, 33 + minio, 34 + ninja, 35 + nlohmann_json, 36 + openssl, 37 + perl, 38 + protobuf, 39 + python3, 40 + rapidjson, 41 + re2, 42 + snappy, 43 + sqlite, 44 + thrift, 45 + tzdata, 46 + utf8proc, 47 + which, 48 + zlib, 49 + zstd, 50 + testers, 51 + enableShared ? !stdenv.hostPlatform.isStatic, 52 + enableFlight ? true, 53 + enableJemalloc ? !stdenv.isDarwin, 54 + enableS3 ? true, 55 + enableGcs ? !stdenv.isDarwin, 56 56 }: 57 57 58 - assert lib.asserts.assertMsg 59 - ((enableS3 && stdenv.isDarwin) -> (lib.versionOlder boost.version "1.69" || lib.versionAtLeast boost.version "1.70")) 60 - "S3 on Darwin requires Boost != 1.69"; 58 + assert lib.asserts.assertMsg ( 59 + (enableS3 && stdenv.isDarwin) 60 + -> (lib.versionOlder boost.version "1.69" || lib.versionAtLeast boost.version "1.70") 61 + ) "S3 on Darwin requires Boost != 1.69"; 61 62 62 63 let 63 64 arrow-testing = fetchFromGitHub { 64 65 name = "arrow-testing"; 65 66 owner = "apache"; 66 67 repo = "arrow-testing"; 67 - rev = "25d16511e8d42c2744a1d94d90169e3a36e92631"; 68 - hash = "sha256-fXeWM/8jBfJY7KL6PVfRbzB8i4sp6PHsnMSHCX5kzfI="; 68 + rev = "735ae7128d571398dd798d7ff004adebeb342883"; 69 + hash = "sha256-67KwnSt+EeEDvk+9kxR51tErL2wJqEPRITKb/dN+HMQ="; 69 70 }; 70 71 71 72 parquet-testing = fetchFromGitHub { ··· 79 80 in 80 81 stdenv.mkDerivation (finalAttrs: { 81 82 pname = "arrow-cpp"; 82 - version = "16.0.0"; 83 + version = "17.0.0"; 83 84 84 - src = fetchurl { 85 - url = "mirror://apache/arrow/arrow-${finalAttrs.version}/apache-arrow-${finalAttrs.version}.tar.gz"; 86 - hash = "sha256-n0BRrpRzyXmR2a+AHi+UrjRVBncZyn+QuBN/nppwC40="; 85 + src = fetchFromGitHub { 86 + owner = "apache"; 87 + repo = "arrow"; 88 + rev = "apache-arrow-17.0.0"; 89 + hash = "sha256-ZQqi1RFb4Ey0A0UVCThuIxM7DoFfkLwaeRAc2z8u9so="; 87 90 }; 88 91 89 - sourceRoot = "apache-arrow-${finalAttrs.version}/cpp"; 92 + sourceRoot = "source/cpp"; 90 93 91 94 # versions are all taken from 92 95 # https://github.com/apache/arrow/blob/apache-arrow-${version}/cpp/thirdparty/versions.txt ··· 109 112 ARROW_XSIMD_URL = fetchFromGitHub { 110 113 owner = "xtensor-stack"; 111 114 repo = "xsimd"; 112 - rev = "9.0.1"; 113 - hash = "sha256-onALN6agtrHWigtFlCeefD9CiRZI4Y690XTzy2UDnrk="; 115 + rev = "13.0.0"; 116 + hash = "sha256-qElJYW5QDj3s59L3NgZj5zkhnUMzIP2mBa1sPks3/CE="; 114 117 }; 115 118 116 119 ARROW_SUBSTRAIT_URL = fetchFromGitHub { ··· 126 129 autoconf # for vendored jemalloc 127 130 flatbuffers 128 131 ] ++ lib.optional stdenv.isDarwin fixDarwinDylibNames; 129 - buildInputs = [ 130 - boost 131 - brotli 132 - bzip2 133 - flatbuffers 134 - gflags 135 - glog 136 - gtest 137 - libbacktrace 138 - lz4 139 - nlohmann_json # alternative JSON parser to rapidjson 140 - protobuf # substrait requires protobuf 141 - rapidjson 142 - re2 143 - snappy 144 - thrift 145 - utf8proc 146 - zlib 147 - zstd 148 - ] ++ lib.optionals enableFlight [ 149 - grpc 150 - openssl 151 - protobuf 152 - sqlite 153 - ] ++ lib.optionals enableS3 [ aws-sdk-cpp-arrow openssl ] 154 - ++ lib.optionals enableGcs [ 155 - crc32c 156 - curl 157 - google-cloud-cpp 158 - grpc 159 - nlohmann_json 160 - ]; 132 + buildInputs = 133 + [ 134 + boost 135 + brotli 136 + bzip2 137 + flatbuffers 138 + gflags 139 + glog 140 + gtest 141 + libbacktrace 142 + lz4 143 + nlohmann_json # alternative JSON parser to rapidjson 144 + protobuf # substrait requires protobuf 145 + rapidjson 146 + re2 147 + snappy 148 + thrift 149 + utf8proc 150 + zlib 151 + zstd 152 + ] 153 + ++ lib.optionals enableFlight [ 154 + grpc 155 + openssl 156 + protobuf 157 + sqlite 158 + ] 159 + ++ lib.optionals enableS3 [ 160 + aws-sdk-cpp-arrow 161 + openssl 162 + ] 163 + ++ lib.optionals enableGcs [ 164 + crc32c 165 + curl 166 + google-cloud-cpp 167 + grpc 168 + nlohmann_json 169 + ]; 161 170 162 171 preConfigure = '' 163 172 patchShebangs build-support/ ··· 165 174 --replace 'discover_tz_dir();' '"${tzdata}/share/zoneinfo";' 166 175 ''; 167 176 168 - cmakeFlags = [ 169 - "-DCMAKE_FIND_PACKAGE_PREFER_CONFIG=ON" 170 - "-DARROW_BUILD_SHARED=${if enableShared then "ON" else "OFF"}" 171 - "-DARROW_BUILD_STATIC=${if enableShared then "OFF" else "ON"}" 172 - "-DARROW_BUILD_TESTS=ON" 173 - "-DARROW_BUILD_INTEGRATION=ON" 174 - "-DARROW_BUILD_UTILITIES=ON" 175 - "-DARROW_EXTRA_ERROR_CONTEXT=ON" 176 - "-DARROW_VERBOSE_THIRDPARTY_BUILD=ON" 177 - "-DARROW_DEPENDENCY_SOURCE=SYSTEM" 178 - "-Dxsimd_SOURCE=AUTO" 179 - "-DARROW_DEPENDENCY_USE_SHARED=${if enableShared then "ON" else "OFF"}" 180 - "-DARROW_COMPUTE=ON" 181 - "-DARROW_CSV=ON" 182 - "-DARROW_DATASET=ON" 183 - "-DARROW_FILESYSTEM=ON" 184 - "-DARROW_FLIGHT_SQL=${if enableFlight then "ON" else "OFF"}" 185 - "-DARROW_HDFS=ON" 186 - "-DARROW_IPC=ON" 187 - "-DARROW_JEMALLOC=${if enableJemalloc then "ON" else "OFF"}" 188 - "-DARROW_JSON=ON" 189 - "-DARROW_USE_GLOG=ON" 190 - "-DARROW_WITH_BACKTRACE=ON" 191 - "-DARROW_WITH_BROTLI=ON" 192 - "-DARROW_WITH_BZ2=ON" 193 - "-DARROW_WITH_LZ4=ON" 194 - "-DARROW_WITH_NLOHMANN_JSON=ON" 195 - "-DARROW_WITH_SNAPPY=ON" 196 - "-DARROW_WITH_UTF8PROC=ON" 197 - "-DARROW_WITH_ZLIB=ON" 198 - "-DARROW_WITH_ZSTD=ON" 199 - "-DARROW_MIMALLOC=ON" 200 - "-DARROW_SUBSTRAIT=ON" 201 - "-DARROW_FLIGHT=${if enableFlight then "ON" else "OFF"}" 202 - "-DARROW_FLIGHT_TESTING=${if enableFlight then "ON" else "OFF"}" 203 - "-DARROW_S3=${if enableS3 then "ON" else "OFF"}" 204 - "-DARROW_GCS=${if enableGcs then "ON" else "OFF"}" 205 - # Parquet options: 206 - "-DARROW_PARQUET=ON" 207 - "-DPARQUET_BUILD_EXECUTABLES=ON" 208 - "-DPARQUET_REQUIRE_ENCRYPTION=ON" 209 - ] ++ lib.optionals (!enableShared) [ 210 - "-DARROW_TEST_LINKAGE=static" 211 - ] ++ lib.optionals stdenv.isDarwin [ 212 - "-DCMAKE_INSTALL_RPATH=@loader_path/../lib" # needed for tools executables 213 - ] ++ lib.optionals (!stdenv.isx86_64) [ "-DARROW_USE_SIMD=OFF" ] 214 - ++ lib.optionals enableS3 [ "-DAWSSDK_CORE_HEADER_FILE=${aws-sdk-cpp-arrow}/include/aws/core/Aws.h" ]; 177 + cmakeFlags = 178 + [ 179 + "-DCMAKE_FIND_PACKAGE_PREFER_CONFIG=ON" 180 + "-DARROW_BUILD_SHARED=${if enableShared then "ON" else "OFF"}" 181 + "-DARROW_BUILD_STATIC=${if enableShared then "OFF" else "ON"}" 182 + "-DARROW_BUILD_TESTS=ON" 183 + "-DARROW_BUILD_INTEGRATION=ON" 184 + "-DARROW_BUILD_UTILITIES=ON" 185 + "-DARROW_EXTRA_ERROR_CONTEXT=ON" 186 + "-DARROW_VERBOSE_THIRDPARTY_BUILD=ON" 187 + "-DARROW_DEPENDENCY_SOURCE=SYSTEM" 188 + "-Dxsimd_SOURCE=AUTO" 189 + "-DARROW_DEPENDENCY_USE_SHARED=${if enableShared then "ON" else "OFF"}" 190 + "-DARROW_COMPUTE=ON" 191 + "-DARROW_CSV=ON" 192 + "-DARROW_DATASET=ON" 193 + "-DARROW_FILESYSTEM=ON" 194 + "-DARROW_FLIGHT_SQL=${if enableFlight then "ON" else "OFF"}" 195 + "-DARROW_HDFS=ON" 196 + "-DARROW_IPC=ON" 197 + "-DARROW_JEMALLOC=${if enableJemalloc then "ON" else "OFF"}" 198 + "-DARROW_JSON=ON" 199 + "-DARROW_USE_GLOG=ON" 200 + "-DARROW_WITH_BACKTRACE=ON" 201 + "-DARROW_WITH_BROTLI=ON" 202 + "-DARROW_WITH_BZ2=ON" 203 + "-DARROW_WITH_LZ4=ON" 204 + "-DARROW_WITH_NLOHMANN_JSON=ON" 205 + "-DARROW_WITH_SNAPPY=ON" 206 + "-DARROW_WITH_UTF8PROC=ON" 207 + "-DARROW_WITH_ZLIB=ON" 208 + "-DARROW_WITH_ZSTD=ON" 209 + "-DARROW_MIMALLOC=ON" 210 + "-DARROW_SUBSTRAIT=ON" 211 + "-DARROW_FLIGHT=${if enableFlight then "ON" else "OFF"}" 212 + "-DARROW_FLIGHT_TESTING=${if enableFlight then "ON" else "OFF"}" 213 + "-DARROW_S3=${if enableS3 then "ON" else "OFF"}" 214 + "-DARROW_GCS=${if enableGcs then "ON" else "OFF"}" 215 + # Parquet options: 216 + "-DARROW_PARQUET=ON" 217 + "-DPARQUET_BUILD_EXECUTABLES=ON" 218 + "-DPARQUET_REQUIRE_ENCRYPTION=ON" 219 + ] 220 + ++ lib.optionals (!enableShared) [ "-DARROW_TEST_LINKAGE=static" ] 221 + ++ lib.optionals stdenv.isDarwin [ 222 + "-DCMAKE_INSTALL_RPATH=@loader_path/../lib" # needed for tools executables 223 + ] 224 + ++ lib.optionals (!stdenv.isx86_64) [ "-DARROW_USE_SIMD=OFF" ] 225 + ++ lib.optionals enableS3 [ 226 + "-DAWSSDK_CORE_HEADER_FILE=${aws-sdk-cpp-arrow}/include/aws/core/Aws.h" 227 + ]; 215 228 216 229 doInstallCheck = true; 217 230 ARROW_TEST_DATA = lib.optionalString finalAttrs.doInstallCheck "${arrow-testing}/data"; ··· 219 232 GTEST_FILTER = 220 233 let 221 234 # Upstream Issue: https://issues.apache.org/jira/browse/ARROW-11398 222 - filteredTests = lib.optionals stdenv.hostPlatform.isAarch64 [ 223 - "TestFilterKernelWithNumeric/3.CompareArrayAndFilterRandomNumeric" 224 - "TestFilterKernelWithNumeric/7.CompareArrayAndFilterRandomNumeric" 225 - "TestCompareKernel.PrimitiveRandomTests" 226 - ] ++ lib.optionals enableS3 [ 227 - "S3OptionsTest.FromUri" 228 - "S3RegionResolutionTest.NonExistentBucket" 229 - "S3RegionResolutionTest.PublicBucket" 230 - "S3RegionResolutionTest.RestrictedBucket" 231 - "TestMinioServer.Connect" 232 - "TestS3FS.*" 233 - "TestS3FSGeneric.*" 234 - ] ++ lib.optionals stdenv.isDarwin [ 235 - # TODO: revisit at 12.0.0 or when 236 - # https://github.com/apache/arrow/commit/295c6644ca6b67c95a662410b2c7faea0920c989 237 - # is available, see 238 - # https://github.com/apache/arrow/pull/15288#discussion_r1071244661 239 - "ExecPlanExecution.StressSourceSinkStopped" 240 - ]; 235 + filteredTests = 236 + lib.optionals stdenv.hostPlatform.isAarch64 [ 237 + "TestFilterKernelWithNumeric/3.CompareArrayAndFilterRandomNumeric" 238 + "TestFilterKernelWithNumeric/7.CompareArrayAndFilterRandomNumeric" 239 + "TestCompareKernel.PrimitiveRandomTests" 240 + ] 241 + ++ lib.optionals enableS3 [ 242 + "S3OptionsTest.FromUri" 243 + "S3RegionResolutionTest.NonExistentBucket" 244 + "S3RegionResolutionTest.PublicBucket" 245 + "S3RegionResolutionTest.RestrictedBucket" 246 + "TestMinioServer.Connect" 247 + "TestS3FS.*" 248 + "TestS3FSGeneric.*" 249 + ] 250 + ++ lib.optionals stdenv.isDarwin [ 251 + # TODO: revisit at 12.0.0 or when 252 + # https://github.com/apache/arrow/commit/295c6644ca6b67c95a662410b2c7faea0920c989 253 + # is available, see 254 + # https://github.com/apache/arrow/pull/15288#discussion_r1071244661 255 + "ExecPlanExecution.StressSourceSinkStopped" 256 + ]; 241 257 in 242 258 lib.optionalString finalAttrs.doInstallCheck "-${lib.concatStringsSep ":" filteredTests}"; 243 259 244 260 __darwinAllowLocalNetworking = true; 245 261 246 - nativeInstallCheckInputs = [ perl which sqlite ] 247 - ++ lib.optionals enableS3 [ minio ] 248 - ++ lib.optionals enableFlight [ python3 ]; 262 + nativeInstallCheckInputs = [ 263 + perl 264 + which 265 + sqlite 266 + ] ++ lib.optionals enableS3 [ minio ] ++ lib.optionals enableFlight [ python3 ]; 249 267 250 268 installCheckPhase = 251 269 let ··· 270 288 homepage = "https://arrow.apache.org/docs/cpp/"; 271 289 license = licenses.asl20; 272 290 platforms = platforms.unix; 273 - maintainers = with maintainers; [ tobim veprbl cpcloud ]; 291 + maintainers = with maintainers; [ 292 + tobim 293 + veprbl 294 + cpcloud 295 + ]; 274 296 pkgConfigModules = [ 275 297 "arrow" 276 298 "arrow-acero" ··· 288 310 ]; 289 311 }; 290 312 passthru = { 291 - inherit enableFlight enableJemalloc enableS3 enableGcs; 313 + inherit 314 + enableFlight 315 + enableJemalloc 316 + enableS3 317 + enableGcs 318 + ; 292 319 tests.pkg-config = testers.testMetaPkgConfig finalAttrs.finalPackage; 293 320 }; 294 321 })
+1 -1
pkgs/by-name/sp/spice-autorandr/package.nix
··· 46 46 maintainers = with lib.maintainers; [ 47 47 dmytrokyrychuk 48 48 ]; 49 - platforms = [ "x86_64-linux" ]; 49 + platforms = lib.platforms.linux; 50 50 }; 51 51 }
+2 -2
pkgs/by-name/sr/srm-cuarzo/package.nix
··· 14 14 }: 15 15 stdenv.mkDerivation (self: { 16 16 pname = "srm-cuarzo"; 17 - version = "0.6.1-1"; 17 + version = "0.6.3-1"; 18 18 rev = "v${self.version}"; 19 - hash = "sha256-jc5JnVNaVw3nBlBUss4IjBnPGVSkImKPfLb/XMsKOg8="; 19 + hash = "sha256-nQucfh/Eri2BM70NFYqJQnBgVlHO/5eNHVFX/6RYoZA="; 20 20 21 21 src = fetchFromGitHub { 22 22 inherit (self) rev hash;
+2 -2
pkgs/by-name/st/strictdoc/package.nix
··· 5 5 6 6 python3.pkgs.buildPythonApplication rec { 7 7 pname = "strictdoc"; 8 - version = "0.0.57"; 8 + version = "0.0.58"; 9 9 pyproject = true; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "strictdoc-project"; 13 13 repo = "strictdoc"; 14 14 rev = "refs/tags/${version}"; 15 - hash = "sha256-1zURXE3y6um1wYu4Di7G4mrU5sl9QIY1HKEQlni+aEg="; 15 + hash = "sha256-0X74Lv25pUdOUgQzqQU6p+fjuxhC/JqfKEFI7c5t67U="; 16 16 }; 17 17 18 18 nativeBuildInputs = [
+8 -3
pkgs/by-name/sy/syshud/package.nix
··· 12 12 13 13 stdenv.mkDerivation (finalAttrs: { 14 14 pname = "syshud"; 15 - version = "0-unstable-2024-07-08"; 15 + version = "0-unstable-2024-07-16"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "System64fumo"; 19 19 repo = "syshud"; 20 - rev = "602d3b3062dfe589a00b0debd07c3aaae9b98390"; 21 - hash = "sha256-rEigWAkzR5ZclsLg/rFMBM0AuSOCVr2/lsPtKk46FYo="; 20 + rev = "d60c3bb6c8eefba743478fe7c183055fa057e69e"; 21 + hash = "sha256-2aVqCXUZYGtv6xIqbZ1yk3SZK45igZVgPl0byxTXu8E="; 22 22 }; 23 23 24 24 postPatch = '' ··· 49 49 echo '#define GIT_COMMIT_DATE "${lib.removePrefix "0-unstable-" finalAttrs.version}"' >> src/git_info.hpp 50 50 51 51 runHook postConfigure 52 + ''; 53 + 54 + # syshud manually `dlopen`'s its library component 55 + postInstall = '' 56 + wrapProgram $out/bin/syshud --prefix LD_LIBRARY_PATH : $out/lib 52 57 ''; 53 58 54 59 passthru.updateScript = nix-update-script {
+61
pkgs/by-name/un/unhide-gui/package.nix
··· 1 + { 2 + fetchFromGitHub, 3 + lib, 4 + python3Packages, 5 + python3, 6 + unhide, 7 + }: 8 + 9 + python3Packages.buildPythonApplication rec { 10 + pname = "unhide-gui"; 11 + version = "20220611"; 12 + format = "other"; 13 + 14 + src = fetchFromGitHub { 15 + owner = "YJesus"; 16 + repo = "Unhide"; 17 + rev = "v${version}"; 18 + hash = "sha256-v4otbDhKKRLywH6aP+mbMR0olHbW+jk4TXTBY+iaxdo="; 19 + }; 20 + 21 + propagatedBuildInputs = with python3Packages; [ tkinter ]; 22 + 23 + buildInputs = [ unhide ]; 24 + 25 + postPatch = '' 26 + substituteInPlace unhideGui.py \ 27 + --replace-fail "\This" "This" \ 28 + --replace-fail "__credits__" "#__credits__" \ 29 + --replace-fail "./unhide-linux" "${unhide}/bin/unhide-linux" \ 30 + --replace-fail "./unhide-tcp" "${unhide}/bin/unhide-tcp" 31 + ''; 32 + 33 + installPhase = '' 34 + runHook preInstall 35 + 36 + mkdir -p $out/{bin,share/unhideGui} 37 + cp -R *.py $out/share/unhideGui 38 + 39 + runHook postInstall 40 + ''; 41 + 42 + fixupPhase = '' 43 + runHook preFixup 44 + 45 + makeWrapper "${python3Packages.python.interpreter}" "$out/bin/unhideGui" \ 46 + --set PYTHONPATH "$PYTHONPATH" \ 47 + --add-flags "$out/share/unhideGui/unhideGui.py" 48 + 49 + runHook postFixup 50 + ''; 51 + 52 + meta = { 53 + description = "Forensic tool to find hidden processes and TCP/UDP ports by rootkits, LKMs or other hiding technique"; 54 + homepage = "https://github.com/YJesus/Unhide"; 55 + changelog = "https://github.com/YJesus/Unhide/blob/${src.rev}/NEWS"; 56 + license = lib.licenses.gpl3Only; 57 + maintainers = with lib.maintainers; [ tochiaha ]; 58 + mainProgram = "unhide-gui"; 59 + platforms = lib.platforms.all; 60 + }; 61 + }
+3 -3
pkgs/by-name/ws/wstunnel/package.nix
··· 7 7 }: 8 8 9 9 let 10 - version = "9.7.2"; 10 + version = "9.7.4"; 11 11 in 12 12 13 13 rustPlatform.buildRustPackage { ··· 18 18 owner = "erebe"; 19 19 repo = "wstunnel"; 20 20 rev = "v${version}"; 21 - hash = "sha256-5hpkY8MoSo59KmhXsPuLCmWq4KaUzuHBpesQMtgn7hw="; 21 + hash = "sha256-OFm0Jk06Mxzr4F7KrMBGFqcDSuTtrMvBSK99bbOgua4="; 22 22 }; 23 23 24 - cargoHash = "sha256-kv+DX98SjI3m2CdM4RHoMMISZyrFmlhlSaBor0dFUSE="; 24 + cargoHash = "sha256-JMRcXuw6AKfwViOgYAgFdSwUeTo04rEkKj+t+W8wjGI="; 25 25 26 26 checkFlags = [ 27 27 # Tries to launch a test container
+2 -2
pkgs/development/python-modules/app-model/default.nix
··· 15 15 16 16 buildPythonPackage rec { 17 17 pname = "app-model"; 18 - version = "0.2.7"; 18 + version = "0.2.8"; 19 19 pyproject = true; 20 20 21 21 disabled = pythonOlder "3.8"; ··· 24 24 owner = "pyapp-kit"; 25 25 repo = "app-model"; 26 26 rev = "refs/tags/v${version}"; 27 - hash = "sha256-ISMSt7c8CoxffMhg7XC/ebKkgXFTBihDr1fGkqMCBoc="; 27 + hash = "sha256-vGSFo2ZckIDI3TjBSTKZagTEYdILt1/5Wyws3P7FNiQ="; 28 28 }; 29 29 30 30 build-system = [
+2 -2
pkgs/development/python-modules/beanhub-cli/default.nix
··· 25 25 26 26 buildPythonPackage rec { 27 27 pname = "beanhub-cli"; 28 - version = "1.2.2"; 28 + version = "1.2.3"; 29 29 pyproject = true; 30 30 31 31 disabled = pythonOlder "3.10"; ··· 34 34 owner = "LaunchPlatform"; 35 35 repo = "beanhub-cli"; 36 36 rev = "refs/tags/${version}"; 37 - hash = "sha256-ZN384KN6+pkDDsCk825sr+LsArQ5Vaf09ASLN8IemhM="; 37 + hash = "sha256-oHlI3hloquD86fHr3AgwW5SqKxUw2gphP76wi6mCy44="; 38 38 }; 39 39 40 40 build-system = [ poetry-core ];
+2 -2
pkgs/development/python-modules/boto3-stubs/default.nix
··· 366 366 367 367 buildPythonPackage rec { 368 368 pname = "boto3-stubs"; 369 - version = "1.34.144"; 369 + version = "1.34.145"; 370 370 pyproject = true; 371 371 372 372 disabled = pythonOlder "3.7"; ··· 374 374 src = fetchPypi { 375 375 pname = "boto3_stubs"; 376 376 inherit version; 377 - hash = "sha256-wZ0MQ4bsFg5sBlZ7lgtvfHZazE7UDwHzccjnoLUUUgs="; 377 + hash = "sha256-LRXM/ERAe6rol9OlMfnrCCbiB9cOkvUmjocDE5vsLbo="; 378 378 }; 379 379 380 380 build-system = [ setuptools ];
+2 -2
pkgs/development/python-modules/botocore-stubs/default.nix
··· 10 10 11 11 buildPythonPackage rec { 12 12 pname = "botocore-stubs"; 13 - version = "1.34.144"; 13 + version = "1.34.145"; 14 14 pyproject = true; 15 15 16 16 disabled = pythonOlder "3.7"; ··· 18 18 src = fetchPypi { 19 19 pname = "botocore_stubs"; 20 20 inherit version; 21 - hash = "sha256-PrMltLGG6NjknUhc/jg/R4q4wH4PRpDl7pvLb6zuxK8="; 21 + hash = "sha256-abz8DIHu4pTmgdyASbfKKkeo8FELiMBXEPB9um0Hhcc="; 22 22 }; 23 23 24 24 nativeBuildInputs = [ poetry-core ];
+2 -2
pkgs/development/python-modules/cohere/default.nix
··· 22 22 23 23 buildPythonPackage rec { 24 24 pname = "cohere"; 25 - version = "5.6.0"; 25 + version = "5.6.1"; 26 26 pyproject = true; 27 27 28 28 disabled = pythonOlder "3.8"; ··· 31 31 owner = "cohere-ai"; 32 32 repo = "cohere-python"; 33 33 rev = "refs/tags/${version}"; 34 - hash = "sha256-zv4zSUQzt2jjuKumaV5vI3GbhZWKEjALohfuxQp6i7Q="; 34 + hash = "sha256-uHUCU3vZAvP14+TJcuHffeclTRJ8hc+aqtOfvTRlfa4="; 35 35 }; 36 36 37 37 build-system = [ poetry-core ];
+2 -2
pkgs/development/python-modules/formulae/default.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "formulae"; 16 - version = "0.5.3"; 16 + version = "0.5.4"; 17 17 format = "pyproject"; 18 18 19 19 disabled = pythonOlder "3.7"; ··· 22 22 owner = "bambinos"; 23 23 repo = pname; 24 24 rev = "refs/tags/${version}"; 25 - hash = "sha256-A0CI0bpoRYFAcPiNAf5haQu9BEqmBgxF7HfIl4qcML0="; 25 + hash = "sha256-SSyQa7soIp+wSXX5wek9LG95q7J7K34mztzx01lPiWo="; 26 26 }; 27 27 28 28 nativeBuildInputs = [
+3 -3
pkgs/development/python-modules/gtts/default.nix
··· 17 17 18 18 buildPythonPackage rec { 19 19 pname = "gtts"; 20 - version = "2.5.1"; 21 - format = "pyproject"; 20 + version = "2.5.2"; 21 + pyproject = true; 22 22 23 23 src = fetchFromGitHub { 24 24 owner = "pndurette"; 25 25 repo = "gTTS"; 26 26 rev = "refs/tags/v${version}"; 27 - hash = "sha256-CCxD73fpHGsO4zSifWLQtgDkbPvPEnA2357umhOCNoI="; 27 + hash = "sha256-4GIrj5pIk27euo2gzSKpRQaXNyI6aH0E6HNAivJthCE="; 28 28 }; 29 29 30 30 build-system = [ setuptools ];
+2 -2
pkgs/development/python-modules/lmfit/default.nix
··· 16 16 17 17 buildPythonPackage rec { 18 18 pname = "lmfit"; 19 - version = "1.3.1"; 19 + version = "1.3.2"; 20 20 21 21 pyproject = true; 22 22 23 23 src = fetchPypi { 24 24 inherit pname version; 25 - hash = "sha256-vDhiRK29EO8aKixPnRez3vkFVSwKZK74VPCtRswwnMU="; 25 + hash = "sha256-Mb7q4fAnwbjBTc1/LoSIqAt1+zied/ymd1Sb3C/ll7s="; 26 26 }; 27 27 28 28 postPatch = ''
+1 -1
pkgs/development/python-modules/pyarrow/default.nix
··· 33 33 34 34 disabled = pythonOlder "3.7"; 35 35 36 - sourceRoot = "apache-arrow-${version}/python"; 36 + sourceRoot = "source/python"; 37 37 38 38 nativeBuildInputs = [ 39 39 cmake
+2 -2
pkgs/development/python-modules/python-smarttub/default.nix
··· 14 14 15 15 buildPythonPackage rec { 16 16 pname = "python-smarttub"; 17 - version = "0.0.36"; 17 + version = "0.0.37"; 18 18 format = "setuptools"; 19 19 20 20 disabled = pythonOlder "3.8"; ··· 23 23 owner = "mdz"; 24 24 repo = pname; 25 25 rev = "refs/tags/v${version}"; 26 - hash = "sha256-cng19NW5Eq3arysl0B3dfK2Hy6lQFBFh7g2hxvxeklU="; 26 + hash = "sha256-Dy7Nsq3qhVWb9W6ledD+Gq3fMQ/qLsxGmTBB+AQ5IZc="; 27 27 }; 28 28 29 29 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/quaternion/default.nix
··· 9 9 10 10 buildPythonPackage rec { 11 11 pname = "quaternion"; 12 - version = "2023.0.3"; 12 + version = "2023.0.4"; 13 13 format = "pyproject"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "moble"; 17 17 repo = pname; 18 18 rev = "refs/tags/v${version}"; 19 - hash = "sha256-vSkFHYXcT14aW3OTfqYymVQbpWnKFEVkhh3IQTi5xS4="; 19 + hash = "sha256-i+UPi+DrhItplfc6EvDhmr3CEH2/cHODoHVBElM7jY8="; 20 20 }; 21 21 22 22 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/tencentcloud-sdk-python/default.nix
··· 10 10 11 11 buildPythonPackage rec { 12 12 pname = "tencentcloud-sdk-python"; 13 - version = "3.0.1190"; 13 + version = "3.0.1193"; 14 14 pyproject = true; 15 15 16 16 disabled = pythonOlder "3.9"; ··· 19 19 owner = "TencentCloud"; 20 20 repo = "tencentcloud-sdk-python"; 21 21 rev = "refs/tags/${version}"; 22 - hash = "sha256-bf9WZauTily9V4fKNxQifxUzdbj51rH7LvAogiZmX6U="; 22 + hash = "sha256-14WFIGBGnZD8UpcGs9ArKSS3d3tOoOyjyqj/5N0APRU="; 23 23 }; 24 24 25 25 build-system = [ setuptools ];
+2 -2
pkgs/servers/keycloak/default.nix
··· 18 18 ''; 19 19 in stdenv.mkDerivation rec { 20 20 pname = "keycloak"; 21 - version = "25.0.1"; 21 + version = "25.0.2"; 22 22 23 23 src = fetchzip { 24 24 url = "https://github.com/keycloak/keycloak/releases/download/${version}/keycloak-${version}.zip"; 25 - hash = "sha256-gwnBCH65s8KGca2FNBxfBfNKox9OFTN3oEAPcYhSx9o="; 25 + hash = "sha256-DYuK1W8dXI/UUB+9HzMnjiJdpJulS3QuIpmr3AA4OLo="; 26 26 }; 27 27 28 28 nativeBuildInputs = [ makeWrapper jre ];
-30
pkgs/shells/any-nix-shell/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, makeWrapper, bash }: 2 - 3 - stdenv.mkDerivation rec { 4 - pname = "any-nix-shell"; 5 - version = "1.2.1"; 6 - 7 - src = fetchFromGitHub { 8 - owner = "haslersn"; 9 - repo = "any-nix-shell"; 10 - rev = "v${version}"; 11 - sha256 = "0q27rhjhh7k0qgcdcfm8ly5za6wm4rckh633d0sjz87faffkp90k"; 12 - }; 13 - 14 - strictDeps = true; 15 - nativeBuildInputs = [ makeWrapper ]; 16 - buildInputs = [ bash ]; 17 - installPhase = '' 18 - mkdir -p $out/bin 19 - cp -r bin $out 20 - wrapProgram $out/bin/any-nix-shell --prefix PATH ":" $out/bin 21 - ''; 22 - 23 - meta = with lib; { 24 - description = "fish and zsh support for nix-shell"; 25 - license = licenses.mit; 26 - homepage = "https://github.com/haslersn/any-nix-shell"; 27 - maintainers = with maintainers; [ haslersn ]; 28 - mainProgram = "any-nix-shell"; 29 - }; 30 - }
+42
pkgs/tools/graphics/quirc/0001-Don-t-build-demos.patch
··· 1 + From 7435b2e12c2004cb0c497ff313288902f2a6f39a Mon Sep 17 00:00:00 2001 2 + From: toonn <toonn@toonn.io> 3 + Date: Fri, 19 Jul 2024 21:53:58 +0200 4 + Subject: [PATCH] Don't build demos 5 + 6 + --- 7 + Makefile | 7 ++----- 8 + 1 file changed, 2 insertions(+), 5 deletions(-) 9 + 10 + diff --git a/Makefile b/Makefile 11 + index 8327b4e..7901cc5 100644 12 + --- a/Makefile 13 + +++ b/Makefile 14 + @@ -45,7 +45,7 @@ DEMO_UTIL_OBJ = \ 15 + 16 + OPENCV_CFLAGS := $(shell pkg-config --cflags opencv4 2>&1) 17 + OPENCV_LIBS = $(shell pkg-config --libs opencv4) 18 + -QUIRC_CXXFLAGS = $(QUIRC_CFLAGS) $(OPENCV_CFLAGS) --std=c++17 19 + +QUIRC_CXXFLAGS = $(QUIRC_CFLAGS) --std=c++17 20 + 21 + .PHONY: all v4l sdl opencv install uninstall clean 22 + 23 + @@ -93,15 +93,12 @@ libquirc.$(VERSIONED_LIB_SUFFIX): $(LIB_OBJ) 24 + .cxx.o: 25 + $(CXX) $(QUIRC_CXXFLAGS) -o $@ -c $< 26 + 27 + -install: libquirc.a libquirc.$(LIB_SUFFIX) quirc-demo quirc-scanner 28 + +install: libquirc.a libquirc.$(LIB_SUFFIX) 29 + install -o root -g root -m 0644 lib/quirc.h $(DESTDIR)$(PREFIX)/include 30 + install -o root -g root -m 0644 libquirc.a $(DESTDIR)$(PREFIX)/lib 31 + install -o root -g root -m 0755 libquirc.$(VERSIONED_LIB_SUFFIX) \ 32 + $(DESTDIR)$(PREFIX)/lib 33 + cp -d libquirc.$(LIB_SUFFIX) $(DESTDIR)$(PREFIX)/lib 34 + - install -o root -g root -m 0755 quirc-demo $(DESTDIR)$(PREFIX)/bin 35 + - # install -o root -g root -m 0755 quirc-demo-opencv $(DESTDIR)$(PREFIX)/bin 36 + - install -o root -g root -m 0755 quirc-scanner $(DESTDIR)$(PREFIX)/bin 37 + 38 + uninstall: 39 + rm -f $(DESTDIR)$(PREFIX)/include/quirc.h 40 + -- 41 + 2.42.2 42 +
-29
pkgs/tools/graphics/quirc/0001-dont-build-demos.patch
··· 1 - diff --git a/Makefile b/Makefile 2 - index 2d5b745..ecef988 100644 3 - --- a/Makefile 4 - +++ b/Makefile 5 - @@ -37,7 +37,7 @@ DEMO_UTIL_OBJ = \ 6 - 7 - OPENCV_CFLAGS := $(shell pkg-config --cflags opencv4 2>&1) 8 - OPENCV_LIBS = $(shell pkg-config --libs opencv4) 9 - -QUIRC_CXXFLAGS = $(QUIRC_CFLAGS) $(OPENCV_CFLAGS) --std=c++17 10 - +QUIRC_CXXFLAGS = $(QUIRC_CFLAGS) --std=c++17 11 - 12 - .PHONY: all v4l sdl opencv install uninstall clean 13 - 14 - @@ -85,14 +85,11 @@ libquirc.so.$(LIB_VERSION): $(LIB_OBJ) 15 - .cxx.o: 16 - $(CXX) $(QUIRC_CXXFLAGS) -o $@ -c $< 17 - 18 - -install: libquirc.a libquirc.so.$(LIB_VERSION) quirc-demo quirc-scanner 19 - +install: libquirc.a libquirc.so.$(LIB_VERSION) 20 - install -o root -g root -m 0644 lib/quirc.h $(DESTDIR)$(PREFIX)/include 21 - install -o root -g root -m 0644 libquirc.a $(DESTDIR)$(PREFIX)/lib 22 - install -o root -g root -m 0755 libquirc.so.$(LIB_VERSION) \ 23 - $(DESTDIR)$(PREFIX)/lib 24 - - install -o root -g root -m 0755 quirc-demo $(DESTDIR)$(PREFIX)/bin 25 - - # install -o root -g root -m 0755 quirc-demo-opencv $(DESTDIR)$(PREFIX)/bin 26 - - install -o root -g root -m 0755 quirc-scanner $(DESTDIR)$(PREFIX)/bin 27 - 28 - uninstall: 29 - rm -f $(DESTDIR)$(PREFIX)/include/quirc.h
+23 -14
pkgs/tools/graphics/quirc/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, SDL_gfx, SDL, libjpeg, libpng, opencv 2 - , pkg-config }: 1 + { lib, stdenv, fetchFromGitHub, fetchpatch2, SDL_gfx, SDL, libjpeg, libpng 2 + , opencv, pkg-config }: 3 3 4 4 stdenv.mkDerivation (finalAttrs: { 5 5 pname = "quirc"; ··· 25 25 makeFlags = [ "PREFIX=$(out)" ]; 26 26 env.NIX_CFLAGS_COMPILE = "-I${lib.getDev SDL}/include/SDL -I${SDL_gfx}/include/SDL"; 27 27 28 - # Disable building of linux-only demos on darwin systems 29 - patches = lib.optionals stdenv.isDarwin [ ./0001-dont-build-demos.patch ]; 30 - 31 - buildPhase = lib.optionalString stdenv.isDarwin '' 32 - runHook preBuild 33 - make libquirc.so 34 - make qrtest 35 - runHook postBuild 36 - ''; 28 + patches = [ 29 + (fetchpatch2 { 30 + url = "https://github.com/dlbeer/quirc/commit/2c350d8aaf37246e538a2c93b2cce8c78600d2fc.patch?full_index=1"; 31 + hash = "sha256-ZTcy/EoOBoyOjtXjmT+J/JcbX8lxGKmbWer23lymbWo="; 32 + }) 33 + (fetchpatch2 { 34 + url = "https://github.com/dlbeer/quirc/commit/257c6c94d99960819ecabf72199e5822f60a3bc5.patch?full_index=1"; 35 + hash = "sha256-WLQK7vy34VmgJzppTnRjAcZoSGWVaXQSaGq9An8W0rw="; 36 + }) 37 + ] ++ lib.optionals stdenv.isDarwin [ 38 + # Disable building of linux-only demos on darwin systems 39 + ./0001-Don-t-build-demos.patch 40 + ]; 37 41 38 42 preInstall = '' 39 43 mkdir -p "$out"/{bin,lib,include} 40 44 41 45 # install all binaries 42 - find -maxdepth 1 -type f -executable ! -name '*.so.*' | xargs cp -t "$out"/bin 46 + find -maxdepth 1 -type f -executable ! -name '*.so.*' ! -name '*.dylib' \ 47 + | xargs cp -t "$out"/bin 43 48 ''; 44 49 45 50 postInstall = '' 46 51 # don't install static library 47 52 rm $out/lib/libquirc.a 48 - 53 + '' + (if stdenv.isDarwin then '' 54 + # Set absolute install name to avoid the need for DYLD_LIBRARY_PATH 55 + dylib=$out/lib/libquirc.${finalAttrs.version}.dylib 56 + ${stdenv.cc.targetPrefix}install_name_tool -id "$dylib" "$dylib" 57 + '' else '' 49 58 ln -s $out/lib/libquirc.so.* $out/lib/libquirc.so 50 - ''; 59 + ''); 51 60 52 61 meta = { 53 62 description = "Small QR code decoding library";
+3 -5
pkgs/tools/misc/autorandr/default.nix
··· 9 9 10 10 python3.pkgs.buildPythonApplication rec { 11 11 pname = "autorandr"; 12 - version = "1.14"; 12 + version = "1.15"; 13 13 format = "other"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "phillipberndt"; 17 17 repo = "autorandr"; 18 18 rev = "refs/tags/${version}"; 19 - hash = "sha256-Ru3nQF0DB98rKSew6QtxAZQEB/9nVlIelNX3M7bNYHk="; 19 + hash = "sha256-8FMfy3GCN4z/TnfefU2DbKqV3W35I29/SuGGqeOrjNg"; 20 20 }; 21 21 22 22 nativeBuildInputs = [ installShellFiles desktop-file-utils ]; ··· 42 42 installShellCompletion --cmd autorandr \ 43 43 --bash contrib/bash_completion/autorandr \ 44 44 --zsh contrib/zsh_completion/_autorandr \ 45 - --fish contrib/fish_copletion/autorandr.fish 46 - # In the line above there's a typo that needs to be fixed in the next 47 - # release 45 + --fish contrib/fish_completion/autorandr.fish 48 46 49 47 make install TARGETS='autostart_config' PREFIX=$out DESTDIR=$out 50 48
+3 -3
pkgs/tools/text/mark/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "mark"; 5 - version = "9.12.0"; 5 + version = "9.13.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "kovetskiy"; 9 9 repo = "mark"; 10 10 rev = version; 11 - sha256 = "sha256-GbtwC361BI02mI1xzwdH9iqTIrY5ItiAKfZ7C3uk5ms="; 11 + sha256 = "sha256-Y3mvseVIvKFuHuY7bSRAzbiAfa6lGYk1PfdhSiG6Is8="; 12 12 }; 13 13 14 - vendorHash = "sha256-3OTHHhRgY9N6l6GXN6HCbmPAgpXyfyJ/3KAZWLltz24="; 14 + vendorHash = "sha256-DMjT4ja6yUaetTc+AHJBqf9hRU2KpE0+LGX36NgHzqU="; 15 15 16 16 ldflags = [ "-s" "-w" "-X main.version=${version}" ]; 17 17
-4
pkgs/top-level/all-packages.nix
··· 5501 5501 5502 5502 iotools = callPackage ../tools/misc/iotools { }; 5503 5503 5504 - irpf = callPackage ../applications/finance/irpf { }; 5505 - 5506 5504 jellycli = callPackage ../applications/audio/jellycli { }; 5507 5505 5508 5506 jellyfin-ffmpeg = callPackage ../development/libraries/jellyfin-ffmpeg { }; ··· 14776 14774 runtimeShellPackage = bash; 14777 14775 14778 14776 agdsn-zsh-config = callPackage ../shells/zsh/agdsn-zsh-config { }; 14779 - 14780 - any-nix-shell = callPackage ../shells/any-nix-shell { }; 14781 14777 14782 14778 nix-your-shell = callPackage ../shells/nix-your-shell { }; 14783 14779