Merge master into staging-next

authored by github-actions[bot] and committed by GitHub de4f02a6 ba9cb938

+182 -166
+4
nixos/doc/manual/release-notes/rl-2311.section.md
··· 28 29 - `util-linux` is now supported on Darwin and is no longer an alias to `unixtools`. Use the `unixtools.util-linux` package for access to the Apple variants of the utilities. 30 31 ## Other Notable Changes {#sec-release-23.11-notable-changes} 32 33 - The Cinnamon module now enables XDG desktop integration by default. If you are experiencing collisions related to xdg-desktop-portal-gtk you can safely remove `xdg.portal.extraPortals = [ pkgs.xdg-desktop-portal-gtk ];` from your NixOS configuration.
··· 28 29 - `util-linux` is now supported on Darwin and is no longer an alias to `unixtools`. Use the `unixtools.util-linux` package for access to the Apple variants of the utilities. 30 31 + - `fileSystems.<name>.autoFormat` now uses `systemd-makefs`, which does not accept formatting options. Therefore, `fileSystems.<name>.formatOptions` has been removed. 32 + 33 + - `fileSystems.<name>.autoResize` now uses `systemd-growfs` to resize the file system online in stage 2. This means that `f2fs` and `ext2` can no longer be auto resized, while `xfs` and `btrfs` now can be. 34 + 35 ## Other Notable Changes {#sec-release-23.11-notable-changes} 36 37 - The Cinnamon module now enables XDG desktop integration by default. If you are experiencing collisions related to xdg-desktop-portal-gtk you can safely remove `xdg.portal.extraPortals = [ pkgs.xdg-desktop-portal-gtk ];` from your NixOS configuration.
-16
nixos/modules/system/boot/stage-1-init.sh
··· 374 375 checkFS "$device" "$fsType" 376 377 - # Optionally resize the filesystem. 378 - case $options in 379 - *x-nixos.autoresize*) 380 - if [ "$fsType" = ext2 -o "$fsType" = ext3 -o "$fsType" = ext4 ]; then 381 - modprobe "$fsType" 382 - echo "resizing $device..." 383 - e2fsck -fp "$device" 384 - resize2fs "$device" 385 - elif [ "$fsType" = f2fs ]; then 386 - echo "resizing $device..." 387 - fsck.f2fs -fp "$device" 388 - resize.f2fs "$device" 389 - fi 390 - ;; 391 - esac 392 - 393 # Create backing directories for overlayfs 394 if [ "$fsType" = overlay ]; then 395 for i in upper work; do
··· 374 375 checkFS "$device" "$fsType" 376 377 # Create backing directories for overlayfs 378 if [ "$fsType" = overlay ]; then 379 for i in upper work; do
-6
nixos/modules/system/boot/stage-1.nix
··· 150 copy_bin_and_libs ${pkgs.kmod}/bin/kmod 151 ln -sf kmod $out/bin/modprobe 152 153 - # Copy resize2fs if any ext* filesystems are to be resized 154 - ${optionalString (any (fs: fs.autoResize && (lib.hasPrefix "ext" fs.fsType)) fileSystems) '' 155 - # We need mke2fs in the initrd. 156 - copy_bin_and_libs ${pkgs.e2fsprogs}/sbin/resize2fs 157 - ''} 158 - 159 # Copy multipath. 160 ${optionalString config.services.multipath.enable '' 161 copy_bin_and_libs ${config.services.multipath.package}/bin/multipath
··· 150 copy_bin_and_libs ${pkgs.kmod}/bin/kmod 151 ln -sf kmod $out/bin/modprobe 152 153 # Copy multipath. 154 ${optionalString config.services.multipath.enable '' 155 copy_bin_and_libs ${config.services.multipath.package}/bin/multipath
+9
nixos/modules/system/boot/systemd.nix
··· 588 systemd.services."systemd-backlight@".restartIfChanged = false; 589 systemd.services."systemd-fsck@".restartIfChanged = false; 590 systemd.services."systemd-fsck@".path = [ config.system.path ]; 591 systemd.services.systemd-random-seed.restartIfChanged = false; 592 systemd.services.systemd-remount-fs.restartIfChanged = false; 593 systemd.services.systemd-update-utmp.restartIfChanged = false;
··· 588 systemd.services."systemd-backlight@".restartIfChanged = false; 589 systemd.services."systemd-fsck@".restartIfChanged = false; 590 systemd.services."systemd-fsck@".path = [ config.system.path ]; 591 + systemd.services."systemd-makefs@" = { 592 + restartIfChanged = false; 593 + path = [ pkgs.util-linux ] ++ config.system.fsPackages; 594 + # Since there is no /etc/systemd/system/systemd-makefs@.service 595 + # file, the units generated in /run/systemd/generator would 596 + # override anything we put here. But by forcing the use of a 597 + # drop-in in /etc, it does apply. 598 + overrideStrategy = "asDropin"; 599 + }; 600 systemd.services.systemd-random-seed.restartIfChanged = false; 601 systemd.services.systemd-remount-fs.restartIfChanged = false; 602 systemd.services.systemd-update-utmp.restartIfChanged = false;
-3
nixos/modules/system/boot/systemd/initrd.nix
··· 56 "systemd-ask-password-console.path" 57 "systemd-ask-password-console.service" 58 "systemd-fsck@.service" 59 - "systemd-growfs@.service" 60 "systemd-halt.service" 61 "systemd-hibernate-resume@.service" 62 "systemd-journald-audit.socket" ··· 93 fileSystems = filter utils.fsNeededForBoot config.system.build.fileSystems; 94 95 needMakefs = lib.any (fs: fs.autoFormat) fileSystems; 96 - needGrowfs = lib.any (fs: fs.autoResize) fileSystems; 97 98 kernel-name = config.boot.kernelPackages.kernel.name or "kernel"; 99 modulesTree = config.system.modulesTree.override { name = kernel-name + "-modules"; }; ··· 400 storePaths = [ 401 # systemd tooling 402 "${cfg.package}/lib/systemd/systemd-fsck" 403 - (lib.mkIf needGrowfs "${cfg.package}/lib/systemd/systemd-growfs") 404 "${cfg.package}/lib/systemd/systemd-hibernate-resume" 405 "${cfg.package}/lib/systemd/systemd-journald" 406 (lib.mkIf needMakefs "${cfg.package}/lib/systemd/systemd-makefs")
··· 56 "systemd-ask-password-console.path" 57 "systemd-ask-password-console.service" 58 "systemd-fsck@.service" 59 "systemd-halt.service" 60 "systemd-hibernate-resume@.service" 61 "systemd-journald-audit.socket" ··· 92 fileSystems = filter utils.fsNeededForBoot config.system.build.fileSystems; 93 94 needMakefs = lib.any (fs: fs.autoFormat) fileSystems; 95 96 kernel-name = config.boot.kernelPackages.kernel.name or "kernel"; 97 modulesTree = config.system.modulesTree.override { name = kernel-name + "-modules"; }; ··· 398 storePaths = [ 399 # systemd tooling 400 "${cfg.package}/lib/systemd/systemd-fsck" 401 "${cfg.package}/lib/systemd/systemd-hibernate-resume" 402 "${cfg.package}/lib/systemd/systemd-journald" 403 (lib.mkIf needMakefs "${cfg.package}/lib/systemd/systemd-makefs")
+33 -61
nixos/modules/tasks/filesystems.nix
··· 112 }; 113 114 formatOptions = mkOption { 115 - default = ""; 116 - type = types.str; 117 - description = lib.mdDoc '' 118 - If {option}`autoFormat` option is set specifies 119 - extra options passed to mkfs. 120 - ''; 121 }; 122 123 autoResize = mkOption { ··· 139 140 }; 141 142 - config = let 143 - defaultFormatOptions = 144 - # -F needed to allow bare block device without partitions 145 - if (builtins.substring 0 3 config.fsType) == "ext" then "-F" 146 - # -q needed for non-interactive operations 147 - else if config.fsType == "jfs" then "-q" 148 - # (same here) 149 - else if config.fsType == "reiserfs" then "-q" 150 - else null; 151 - in { 152 - options = mkMerge [ 153 - (mkIf config.autoResize [ "x-nixos.autoresize" ]) 154 - (mkIf (utils.fsNeededForBoot config) [ "x-initrd.mount" ]) 155 - ]; 156 - formatOptions = mkIf (defaultFormatOptions != null) (mkDefault defaultFormatOptions); 157 - }; 158 159 }; 160 ··· 201 skipCheck = fs: fs.noCheck || fs.device == "none" || builtins.elem fs.fsType fsToSkipCheck || isBindMount fs; 202 # https://wiki.archlinux.org/index.php/fstab#Filepath_spaces 203 escape = string: builtins.replaceStrings [ " " "\t" ] [ "\\040" "\\011" ] string; 204 - in fstabFileSystems: { rootPrefix ? "", extraOpts ? (fs: []) }: concatMapStrings (fs: 205 (optionalString (isBindMount fs) (escape rootPrefix)) 206 + (if fs.device != null then escape fs.device 207 else if fs.label != null then "/dev/disk/by-label/${escape fs.label}" 208 else throw "No device specified for mount point ‘${fs.mountPoint}’.") 209 + " " + escape fs.mountPoint 210 + " " + fs.fsType 211 - + " " + escape (builtins.concatStringsSep "," (fs.options ++ (extraOpts fs))) 212 + " 0 " + (if skipCheck fs then "0" else if fs.mountPoint == "/" then "1" else "2") 213 + "\n" 214 ) fstabFileSystems; 215 216 initrdFstab = pkgs.writeText "initrd-fstab" (makeFstabEntries (filter utils.fsNeededForBoot fileSystems) { 217 rootPrefix = "/sysroot"; 218 - extraOpts = fs: 219 - (optional fs.autoResize "x-systemd.growfs") 220 - ++ (optional fs.autoFormat "x-systemd.makefs"); 221 }); 222 223 in ··· 319 320 assertions = let 321 ls = sep: concatMapStringsSep sep (x: x.mountPoint); 322 - notAutoResizable = fs: fs.autoResize && !(hasPrefix "ext" fs.fsType || fs.fsType == "f2fs"); 323 in [ 324 { assertion = ! (fileSystems' ? cycle); 325 message = "The ‘fileSystems’ option can't be topologically sorted: mountpoint dependency path ${ls " -> " fileSystems'.cycle} loops to ${ls ", " fileSystems'.loops}"; ··· 327 { assertion = ! (any notAutoResizable fileSystems); 328 message = let 329 fs = head (filter notAutoResizable fileSystems); 330 - in 331 - "Mountpoint '${fs.mountPoint}': 'autoResize = true' is not supported for 'fsType = \"${fs.fsType}\"':${optionalString (fs.fsType == "auto") " fsType has to be explicitly set and"} only the ext filesystems and f2fs support it."; 332 } 333 ]; 334 ··· 377 wants = [ "local-fs.target" "remote-fs.target" ]; 378 }; 379 380 - systemd.services = 381 - 382 - # Emit systemd services to format requested filesystems. 383 - let 384 - formatDevice = fs: 385 - let 386 - mountPoint' = "${escapeSystemdPath fs.mountPoint}.mount"; 387 - device' = escapeSystemdPath fs.device; 388 - device'' = "${device'}.device"; 389 - in nameValuePair "mkfs-${device'}" 390 - { description = "Initialisation of Filesystem ${fs.device}"; 391 - wantedBy = [ mountPoint' ]; 392 - before = [ mountPoint' "systemd-fsck@${device'}.service" ]; 393 - requires = [ device'' ]; 394 - after = [ device'' ]; 395 - path = [ pkgs.util-linux ] ++ config.system.fsPackages; 396 - script = 397 - '' 398 - if ! [ -e "${fs.device}" ]; then exit 1; fi 399 - # FIXME: this is scary. The test could be more robust. 400 - type=$(blkid -p -s TYPE -o value "${fs.device}" || true) 401 - if [ -z "$type" ]; then 402 - echo "creating ${fs.fsType} filesystem on ${fs.device}..." 403 - mkfs.${fs.fsType} ${fs.formatOptions} "${fs.device}" 404 - fi 405 - ''; 406 - unitConfig.RequiresMountsFor = [ "${dirOf fs.device}" ]; 407 - unitConfig.DefaultDependencies = false; # needed to prevent a cycle 408 - serviceConfig.Type = "oneshot"; 409 - }; 410 - in listToAttrs (map formatDevice (filter (fs: fs.autoFormat && !(utils.fsNeededForBoot fs)) fileSystems)) // { 411 # Mount /sys/fs/pstore for evacuating panic logs and crashdumps from persistent storage onto the disk using systemd-pstore. 412 # This cannot be done with the other special filesystems because the pstore module (which creates the mount point) is not loaded then. 413 "mount-pstore" = {
··· 112 }; 113 114 formatOptions = mkOption { 115 + visible = false; 116 + type = types.unspecified; 117 + default = null; 118 }; 119 120 autoResize = mkOption { ··· 136 137 }; 138 139 + config.options = mkMerge [ 140 + (mkIf config.autoResize [ "x-systemd.growfs" ]) 141 + (mkIf config.autoFormat [ "x-systemd.makefs" ]) 142 + (mkIf (utils.fsNeededForBoot config) [ "x-initrd.mount" ]) 143 + ]; 144 145 }; 146 ··· 187 skipCheck = fs: fs.noCheck || fs.device == "none" || builtins.elem fs.fsType fsToSkipCheck || isBindMount fs; 188 # https://wiki.archlinux.org/index.php/fstab#Filepath_spaces 189 escape = string: builtins.replaceStrings [ " " "\t" ] [ "\\040" "\\011" ] string; 190 + in fstabFileSystems: { rootPrefix ? "" }: concatMapStrings (fs: 191 (optionalString (isBindMount fs) (escape rootPrefix)) 192 + (if fs.device != null then escape fs.device 193 else if fs.label != null then "/dev/disk/by-label/${escape fs.label}" 194 else throw "No device specified for mount point ‘${fs.mountPoint}’.") 195 + " " + escape fs.mountPoint 196 + " " + fs.fsType 197 + + " " + escape (builtins.concatStringsSep "," fs.options) 198 + " 0 " + (if skipCheck fs then "0" else if fs.mountPoint == "/" then "1" else "2") 199 + "\n" 200 ) fstabFileSystems; 201 202 initrdFstab = pkgs.writeText "initrd-fstab" (makeFstabEntries (filter utils.fsNeededForBoot fileSystems) { 203 rootPrefix = "/sysroot"; 204 }); 205 206 in ··· 302 303 assertions = let 304 ls = sep: concatMapStringsSep sep (x: x.mountPoint); 305 + resizableFSes = [ 306 + "ext3" 307 + "ext4" 308 + "btrfs" 309 + "xfs" 310 + ]; 311 + notAutoResizable = fs: fs.autoResize && !(builtins.elem fs.fsType resizableFSes); 312 in [ 313 { assertion = ! (fileSystems' ? cycle); 314 message = "The ‘fileSystems’ option can't be topologically sorted: mountpoint dependency path ${ls " -> " fileSystems'.cycle} loops to ${ls ", " fileSystems'.loops}"; ··· 316 { assertion = ! (any notAutoResizable fileSystems); 317 message = let 318 fs = head (filter notAutoResizable fileSystems); 319 + in '' 320 + Mountpoint '${fs.mountPoint}': 'autoResize = true' is not supported for 'fsType = "${fs.fsType}"' 321 + ${optionalString (fs.fsType == "auto") "fsType has to be explicitly set and"} 322 + only the following support it: ${lib.concatStringsSep ", " resizableFSes}. 323 + ''; 324 + } 325 + { 326 + assertion = ! (any (fs: fs.formatOptions != null) fileSystems); 327 + message = let 328 + fs = head (filter (fs: fs.formatOptions != null) fileSystems); 329 + in '' 330 + 'fileSystems.<name>.formatOptions' has been removed, since 331 + systemd-makefs does not support any way to provide formatting 332 + options. 333 + ''; 334 } 335 ]; 336 ··· 379 wants = [ "local-fs.target" "remote-fs.target" ]; 380 }; 381 382 + systemd.services = { 383 # Mount /sys/fs/pstore for evacuating panic logs and crashdumps from persistent storage onto the disk using systemd-pstore. 384 # This cannot be done with the other special filesystems because the pstore module (which creates the mount point) is not loaded then. 385 "mount-pstore" = {
-5
nixos/modules/tasks/filesystems/f2fs.nix
··· 15 16 boot.initrd.extraUtilsCommands = mkIf (inInitrd && !config.boot.initrd.systemd.enable) '' 17 copy_bin_and_libs ${pkgs.f2fs-tools}/sbin/fsck.f2fs 18 - ${optionalString (any (fs: fs.autoResize) fileSystems) '' 19 - # We need f2fs-tools' tools to resize filesystems 20 - copy_bin_and_libs ${pkgs.f2fs-tools}/sbin/resize.f2fs 21 - ''} 22 - 23 ''; 24 }; 25 }
··· 15 16 boot.initrd.extraUtilsCommands = mkIf (inInitrd && !config.boot.initrd.systemd.enable) '' 17 copy_bin_and_libs ${pkgs.f2fs-tools}/sbin/fsck.f2fs 18 ''; 19 }; 20 }
+1 -1
nixos/tests/fsck.nix
··· 30 else "fsck.ext4.*/dev/vda"}'") 31 32 with subtest("mnt fs is fsckd"): 33 - machine.succeed("journalctl -b | grep 'fsck.*/dev/vdb.*clean'") 34 machine.succeed( 35 "grep 'Requires=systemd-fsck@dev-vdb.service' /run/systemd/generator/mnt.mount" 36 )
··· 30 else "fsck.ext4.*/dev/vda"}'") 31 32 with subtest("mnt fs is fsckd"): 33 + machine.succeed("journalctl -b | grep 'fsck.*vdb.*clean'") 34 machine.succeed( 35 "grep 'Requires=systemd-fsck@dev-vdb.service' /run/systemd/generator/mnt.mount" 36 )
+1
pkgs/applications/emulators/blink/default.nix
··· 29 homepage = "https://github.com/jart/blink"; 30 license = lib.licenses.isc; 31 maintainers = with lib.maintainers; [ t4ccer ]; 32 }; 33 })
··· 29 homepage = "https://github.com/jart/blink"; 30 license = lib.licenses.isc; 31 maintainers = with lib.maintainers; [ t4ccer ]; 32 + platforms = lib.platforms.all; 33 }; 34 })
+47
pkgs/applications/misc/comodoro/default.nix
···
··· 1 + { lib 2 + , rustPlatform 3 + , fetchFromGitHub 4 + , stdenv 5 + , installShellFiles 6 + , installShellCompletions ? stdenv.hostPlatform == stdenv.buildPlatform 7 + , installManPages ? stdenv.hostPlatform == stdenv.buildPlatform 8 + , withTcp ? true 9 + }: 10 + 11 + rustPlatform.buildRustPackage rec { 12 + pname = "comodoro"; 13 + version = "0.0.8"; 14 + 15 + src = fetchFromGitHub { 16 + owner = "soywod"; 17 + repo = "comodoro"; 18 + rev = "v${version}"; 19 + sha256 = "rGnVXyfWJkPHfpf1gRGbDJ6Y1ycKOOcCZ+Jx35fUo6M="; 20 + }; 21 + 22 + cargoSha256 = "jpshuavywCLN03xD/gFgQeGbKtmHq5pULbxd+RUbaDk="; 23 + 24 + nativeBuildInputs = lib.optional (installManPages || installShellCompletions) installShellFiles; 25 + 26 + buildNoDefaultFeatures = true; 27 + buildFeatures = lib.optional withTcp "tcp"; 28 + 29 + postInstall = lib.optionalString installManPages '' 30 + mkdir -p $out/man 31 + $out/bin/comodoro man $out/man 32 + installManPage $out/man/* 33 + '' + lib.optionalString installShellCompletions '' 34 + installShellCompletion --cmd comodoro \ 35 + --bash <($out/bin/comodoro completion bash) \ 36 + --fish <($out/bin/comodoro completion fish) \ 37 + --zsh <($out/bin/comodoro completion zsh) 38 + ''; 39 + 40 + meta = with lib; { 41 + description = "CLI to manage your time."; 42 + homepage = "https://pimalaya.org/comodoro/"; 43 + changelog = "https://github.com/soywod/comodoro/blob/v${version}/CHANGELOG.md"; 44 + license = licenses.mit; 45 + maintainers = with maintainers; [ soywod ]; 46 + }; 47 + }
+2 -5
pkgs/applications/misc/far2l/default.nix
··· 1 { lib, stdenv, fetchFromGitHub, makeWrapper, cmake, ninja, pkg-config, m4, bash 2 , xdg-utils, zip, unzip, gzip, bzip2, gnutar, p7zip, xz 3 - , IOKit, Carbon, Cocoa, AudioToolbox, OpenGL 4 , withTTYX ? true, libX11 5 , withGUI ? true, wxGTK32 6 , withUCD ? true, libuchardet ··· 35 ++ lib.optionals withNetRocks [ openssl libssh libnfs neon ] 36 ++ lib.optional (withNetRocks && !stdenv.isDarwin) samba # broken on darwin 37 ++ lib.optionals withPython (with python3Packages; [ python cffi debugpy pcpp ]) 38 - ++ lib.optionals stdenv.isDarwin [ IOKit Carbon Cocoa AudioToolbox OpenGL ]; 39 40 postPatch = '' 41 patchShebangs python/src/prebuild.sh ··· 43 --replace '"/bin/bash"' '"${bash}/bin/bash"' 44 substituteInPlace far2l/src/cfg/config.cpp \ 45 --replace '"/bin/bash"' '"${bash}/bin/bash"' 46 - '' + lib.optionalString stdenv.isDarwin '' 47 - substituteInPlace WinPort/src/Backend/WX/CMakeLists.txt \ 48 - --replace "-framework System" -lSystem 49 ''; 50 51 cmakeFlags = lib.mapAttrsToList (k: v: "-D${k}=${if v then "yes" else "no"}") {
··· 1 { lib, stdenv, fetchFromGitHub, makeWrapper, cmake, ninja, pkg-config, m4, bash 2 , xdg-utils, zip, unzip, gzip, bzip2, gnutar, p7zip, xz 3 + , IOKit, Carbon, Cocoa, AudioToolbox, OpenGL, System 4 , withTTYX ? true, libX11 5 , withGUI ? true, wxGTK32 6 , withUCD ? true, libuchardet ··· 35 ++ lib.optionals withNetRocks [ openssl libssh libnfs neon ] 36 ++ lib.optional (withNetRocks && !stdenv.isDarwin) samba # broken on darwin 37 ++ lib.optionals withPython (with python3Packages; [ python cffi debugpy pcpp ]) 38 + ++ lib.optionals stdenv.isDarwin [ IOKit Carbon Cocoa AudioToolbox OpenGL System ]; 39 40 postPatch = '' 41 patchShebangs python/src/prebuild.sh ··· 43 --replace '"/bin/bash"' '"${bash}/bin/bash"' 44 substituteInPlace far2l/src/cfg/config.cpp \ 45 --replace '"/bin/bash"' '"${bash}/bin/bash"' 46 ''; 47 48 cmakeFlags = lib.mapAttrsToList (k: v: "-D${k}=${if v then "yes" else "no"}") {
+2 -2
pkgs/data/icons/kora-icon-theme/default.nix
··· 10 11 stdenvNoCC.mkDerivation rec { 12 pname = "kora-icon-theme"; 13 - version = "1.5.6"; 14 15 src = fetchFromGitHub { 16 owner = "bikass"; 17 repo = "kora"; 18 rev = "v${version}"; 19 - sha256 = "sha256-vAeml+upESUVlJ95Rm0+vlZ+NQZWEZl00scDkb3W7Yo="; 20 }; 21 22 nativeBuildInputs = [
··· 10 11 stdenvNoCC.mkDerivation rec { 12 pname = "kora-icon-theme"; 13 + version = "1.5.7"; 14 15 src = fetchFromGitHub { 16 owner = "bikass"; 17 repo = "kora"; 18 rev = "v${version}"; 19 + sha256 = "sha256-VAlfrUWgxcG17ZTlA357gengXTilwuZOBscIzadAsaU="; 20 }; 21 22 nativeBuildInputs = [
+4 -9
pkgs/data/misc/sing-geoip/default.nix
··· 8 let 9 generator = buildGoModule rec { 10 pname = "sing-geoip"; 11 - version = "unstable-2022-07-05"; 12 13 src = fetchFromGitHub { 14 owner = "SagerNet"; 15 repo = pname; 16 - rev = "2ced72c94da4c9259c40353c375319d9d28a78f3"; 17 - hash = "sha256-z8aP+OfTuzQNwOT3EEnI9uze/vbHTJLEiCPqIrnNUHw="; 18 }; 19 20 - vendorHash = "sha256-lr0XMLFxJmLqIqCuGgmsFh324jmZVj71blmStMn41Rs="; 21 - 22 - postPatch = '' 23 - # The codes args should start from the third args 24 - substituteInPlace main.go --replace "os.Args[2:]" "os.Args[3:]" 25 - ''; 26 27 meta = with lib; { 28 description = "GeoIP data for sing-box";
··· 8 let 9 generator = buildGoModule rec { 10 pname = "sing-geoip"; 11 + version = "20230512"; 12 13 src = fetchFromGitHub { 14 owner = "SagerNet"; 15 repo = pname; 16 + rev = "refs/tags/${version}"; 17 + hash = "sha256-Zm+5N/37hoHpH/TLNJrHeaBXI8G1jEpM1jz6Um8edNE="; 18 }; 19 20 + vendorHash = "sha256-ejXAdsJwXhqet+Ca+pDLWwu0gex79VcIxW6rmhRnbTQ="; 21 22 meta = with lib; { 23 description = "GeoIP data for sing-box";
+3 -3
pkgs/development/interpreters/wasmtime/default.nix
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "wasmtime"; 5 - version = "9.0.2"; 6 7 src = fetchFromGitHub { 8 owner = "bytecodealliance"; 9 repo = pname; 10 rev = "v${version}"; 11 - hash = "sha256-Fnc3iepxHr7WjorFoabHE6ZM/zK1T5W/gkxL+AEcVgU="; 12 fetchSubmodules = true; 13 }; 14 15 - cargoHash = "sha256-7Q5aJU0sYzRLgjiSNLIrydYRJ3ozABjDo4VtmexS3po="; 16 17 cargoBuildFlags = [ "--package" "wasmtime-cli" "--package" "wasmtime-c-api" ]; 18
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "wasmtime"; 5 + version = "9.0.3"; 6 7 src = fetchFromGitHub { 8 owner = "bytecodealliance"; 9 repo = pname; 10 rev = "v${version}"; 11 + hash = "sha256-b/GioFixPpbCUiYfOLwJ1NCsLGqIm+v9ODuq6kD8JeE="; 12 fetchSubmodules = true; 13 }; 14 15 + cargoHash = "sha256-AYb6dbmvoFYbvgik9rdyOnxdHdnhR8thnrQShGxRLFA="; 16 17 cargoBuildFlags = [ "--package" "wasmtime-cli" "--package" "wasmtime-c-api" ]; 18
+2 -2
pkgs/development/libraries/faudio/default.nix
··· 4 5 stdenv.mkDerivation rec { 6 pname = "faudio"; 7 - version = "23.05"; 8 9 src = fetchFromGitHub { 10 owner = "FNA-XNA"; 11 repo = "FAudio"; 12 rev = version; 13 - sha256 = "sha256-uZSKbLQ36Kw6useAKyDoxLKD1xtKbigq/ejWErxvkcE="; 14 }; 15 16 nativeBuildInputs = [cmake];
··· 4 5 stdenv.mkDerivation rec { 6 pname = "faudio"; 7 + version = "23.06"; 8 9 src = fetchFromGitHub { 10 owner = "FNA-XNA"; 11 repo = "FAudio"; 12 rev = version; 13 + sha256 = "sha256-V5t9YliyXxoWNnKwp3TTOCyCIzpcyg1X4DaI0WFlfeQ="; 14 }; 15 16 nativeBuildInputs = [cmake];
+1 -1
pkgs/development/libraries/kde-frameworks/default.nix
··· 82 homepage = meta.homepage or "https://kde.org"; 83 license = meta.license or license; 84 maintainers = (meta.maintainers or []) ++ maintainers; 85 - platforms = meta.platforms or lib.platforms.linux; 86 }; 87 88 in mkDerivation (args // {
··· 82 homepage = meta.homepage or "https://kde.org"; 83 license = meta.license or license; 84 maintainers = (meta.maintainers or []) ++ maintainers; 85 + platforms = meta.platforms or lib.platforms.all; 86 }; 87 88 in mkDerivation (args // {
+2 -2
pkgs/development/libraries/kde-frameworks/kauth/default.nix
··· 1 { 2 - lib, mkDerivation, propagate, 3 extra-cmake-modules, kcoreaddons, qttools, 4 - enablePolkit ? true, polkit-qt 5 }: 6 7 mkDerivation {
··· 1 { 2 + lib, stdenv, mkDerivation, propagate, 3 extra-cmake-modules, kcoreaddons, qttools, 4 + enablePolkit ? stdenv.isLinux, polkit-qt 5 }: 6 7 mkDerivation {
+4 -1
pkgs/development/libraries/kde-frameworks/kcoreaddons.nix
··· 1 { 2 - mkDerivation, lib, 3 extra-cmake-modules, 4 qtbase, qttools, shared-mime-info 5 }: ··· 18 postInstall = '' 19 moveToOutput "mkspecs" "$dev" 20 ''; 21 })
··· 1 { 2 + mkDerivation, lib, stdenv, 3 extra-cmake-modules, 4 qtbase, qttools, shared-mime-info 5 }: ··· 18 postInstall = '' 19 moveToOutput "mkspecs" "$dev" 20 ''; 21 + } // lib.optionalAttrs stdenv.isDarwin { 22 + # https://invent.kde.org/frameworks/kcoreaddons/-/merge_requests/327 23 + env.NIX_CFLAGS_COMPILE = "-DSOCK_CLOEXEC=0"; 24 })
+10 -2
pkgs/development/libraries/kde-frameworks/kdoctools/default.nix
··· 1 { 2 - mkDerivation, 3 extra-cmake-modules, docbook_xml_dtd_45, docbook_xsl_ns, 4 karchive, ki18n, qtbase, 5 perl, perlPackages ··· 20 ]; 21 buildInputs = [ karchive ki18n ]; 22 outputs = [ "out" "dev" ]; 23 - patches = [ ./kdoctools-no-find-docbook-xml.patch ]; 24 cmakeFlags = [ 25 "-DDocBookXML4_DTD_DIR=${docbook_xml_dtd_45}/xml/dtd/docbook" 26 "-DDocBookXSL_DIR=${docbook_xsl_ns}/xml/xsl/docbook"
··· 1 { 2 + mkDerivation, lib, stdenv, fetchpatch, 3 extra-cmake-modules, docbook_xml_dtd_45, docbook_xsl_ns, 4 karchive, ki18n, qtbase, 5 perl, perlPackages ··· 20 ]; 21 buildInputs = [ karchive ki18n ]; 22 outputs = [ "out" "dev" ]; 23 + patches = [ ./kdoctools-no-find-docbook-xml.patch ] 24 + # kf.doctools.core: Error: Could not find kdoctools catalogs 25 + ++ lib.optionals stdenv.isDarwin [ 26 + (fetchpatch { 27 + name = "kdoctools-relocate-datapath.patch"; 28 + url = "https://github.com/msys2/MINGW-packages/raw/0900785a1f4e4146ab9561fb92a1c70fa70fcfc4/mingw-w64-kdoctools-qt5/0001-kdoctools-relocate-datapath.patch"; 29 + hash = "sha256-MlokdrabXavWHGXYmdz9zZDJQIwAdNxebJBSAH2Z3vI="; 30 + }) 31 + ]; 32 cmakeFlags = [ 33 "-DDocBookXML4_DTD_DIR=${docbook_xml_dtd_45}/xml/dtd/docbook" 34 "-DDocBookXSL_DIR=${docbook_xsl_ns}/xml/xsl/docbook"
+8 -3
pkgs/development/libraries/kde-frameworks/ktexteditor.nix
··· 1 { 2 - mkDerivation, 3 extra-cmake-modules, perl, 4 karchive, kconfig, kguiaddons, ki18n, kiconthemes, kio, kparts, libgit2, 5 qtscript, qtxmlpatterns, sonnet, syntax-highlighting, qtquickcontrols, 6 editorconfig-core-c 7 }: 8 9 - mkDerivation { 10 pname = "ktexteditor"; 11 nativeBuildInputs = [ extra-cmake-modules perl ]; 12 buildInputs = [ ··· 15 editorconfig-core-c 16 ]; 17 propagatedBuildInputs = [ kparts ]; 18 - }
··· 1 { 2 + mkDerivation, lib, stdenv, 3 extra-cmake-modules, perl, 4 karchive, kconfig, kguiaddons, ki18n, kiconthemes, kio, kparts, libgit2, 5 qtscript, qtxmlpatterns, sonnet, syntax-highlighting, qtquickcontrols, 6 editorconfig-core-c 7 }: 8 9 + mkDerivation ({ 10 pname = "ktexteditor"; 11 nativeBuildInputs = [ extra-cmake-modules perl ]; 12 buildInputs = [ ··· 15 editorconfig-core-c 16 ]; 17 propagatedBuildInputs = [ kparts ]; 18 + } // lib.optionalAttrs stdenv.isDarwin { 19 + postPatch = '' 20 + substituteInPlace src/part/CMakeLists.txt \ 21 + --replace "kpart.desktop" "${kparts}/share/kservicetypes5/kpart.desktop" 22 + ''; 23 + })
+2 -5
pkgs/development/python-modules/django-stubs-ext/default.nix
··· 9 10 buildPythonPackage rec { 11 pname = "django-stubs-ext"; 12 - version = "4.2.0"; 13 format = "setuptools"; 14 15 disabled = pythonOlder "3.8"; 16 17 src = fetchPypi { 18 inherit pname version; 19 - hash = "sha256-d4nwyuynFS/vB61rlN7HMQoF0Ljat395eeGdsAN7USc="; 20 }; 21 - 22 - # setup.cfg tries to pull in nonexistent LICENSE.txt file 23 - postPatch = "rm setup.cfg"; 24 25 propagatedBuildInputs = [ 26 django
··· 9 10 buildPythonPackage rec { 11 pname = "django-stubs-ext"; 12 + version = "4.2.1"; 13 format = "setuptools"; 14 15 disabled = pythonOlder "3.8"; 16 17 src = fetchPypi { 18 inherit pname version; 19 + hash = "sha256-JpbW99hTg0GwYM/6lWXHLqeX6GZofgQLhtKcrYeZ5f4="; 20 }; 21 22 propagatedBuildInputs = [ 23 django
+2 -2
pkgs/development/python-modules/pyipp/default.nix
··· 15 16 buildPythonPackage rec { 17 pname = "pyipp"; 18 - version = "0.13.0"; 19 format = "pyproject"; 20 21 disabled = pythonOlder "3.9"; ··· 24 owner = "ctalkington"; 25 repo = "python-ipp"; 26 rev = version; 27 - hash = "sha256-lVpXtPxZZCyWycmkXZTMo5WTPtlehNY5IX7tiyIb1uM="; 28 }; 29 30 postPatch = ''
··· 15 16 buildPythonPackage rec { 17 pname = "pyipp"; 18 + version = "0.14.1"; 19 format = "pyproject"; 20 21 disabled = pythonOlder "3.9"; ··· 24 owner = "ctalkington"; 25 repo = "python-ipp"; 26 rev = version; 27 + hash = "sha256-l8zDgqv8+9r15dt1YeuAYq2GCl9JsrtNRjPlQ9A7H9c="; 28 }; 29 30 postPatch = ''
+2 -2
pkgs/development/tools/renderdoc/default.nix
··· 32 in 33 mkDerivation rec { 34 pname = "renderdoc"; 35 - version = "1.26"; 36 37 src = fetchFromGitHub { 38 owner = "baldurk"; 39 repo = "renderdoc"; 40 rev = "v${version}"; 41 - sha256 = "sha256-z3qHW7hVde51TkRZO3Ld8DbUODa2Gbnh3zosW2O8eOQ="; 42 }; 43 44 buildInputs = [
··· 32 in 33 mkDerivation rec { 34 pname = "renderdoc"; 35 + version = "1.27"; 36 37 src = fetchFromGitHub { 38 owner = "baldurk"; 39 repo = "renderdoc"; 40 rev = "v${version}"; 41 + sha256 = "sha256-zkot9LbbZyzQ7CLSEVPsospAo9u7WR2VHjQdnpNiLR0="; 42 }; 43 44 buildInputs = [
+9
pkgs/os-specific/darwin/apple-sdk/default.nix
··· 320 ''; 321 }); 322 323 WebKit = lib.overrideDerivation super.WebKit (drv: { 324 extraTBDFiles = [ 325 "Versions/A/Frameworks/WebCore.framework/Versions/A/WebCore.tbd"
··· 320 ''; 321 }); 322 323 + System = lib.overrideDerivation super.System (drv: { 324 + installPhase = '' 325 + mkdir -p $out/Library/Frameworks/System.framework/Versions/B 326 + ln -s $out/Library/Frameworks/System.framework/Versions/{B,Current} 327 + ln -s ${pkgs.darwin.Libsystem}/lib/libSystem.B.tbd $out/Library/Frameworks/System.framework/Versions/B/System.tbd 328 + ln -s $out/Library/Frameworks/System.framework/{Versions/Current/,}System.tbd 329 + ''; 330 + }); 331 + 332 WebKit = lib.overrideDerivation super.WebKit (drv: { 333 extraTBDFiles = [ 334 "Versions/A/Frameworks/WebCore.framework/Versions/A/WebCore.tbd"
+1
pkgs/os-specific/darwin/apple-sdk/frameworks.nix
··· 104 SpriteKit = {}; 105 StoreKit = {}; 106 SyncServices = {}; 107 SystemConfiguration = { inherit Security; }; 108 TWAIN = { inherit Carbon; }; 109 Tcl = {};
··· 104 SpriteKit = {}; 105 StoreKit = {}; 106 SyncServices = {}; 107 + System = {}; 108 SystemConfiguration = { inherit Security; }; 109 TWAIN = { inherit Carbon; }; 110 Tcl = {};
+2 -2
pkgs/os-specific/linux/intel-cmt-cat/default.nix
··· 1 { lib, stdenv, fetchFromGitHub }: 2 3 stdenv.mkDerivation rec { 4 - version = "4.5.0"; 5 pname = "intel-cmt-cat"; 6 7 src = fetchFromGitHub { 8 owner = "intel"; 9 repo = "intel-cmt-cat"; 10 rev = "v${version}"; 11 - sha256 = "sha256-gjJtwEDvPW0JDwlIUXSmv1wm4TknKsE/BLKHiqIgjho="; 12 }; 13 14 enableParallelBuilding = true;
··· 1 { lib, stdenv, fetchFromGitHub }: 2 3 stdenv.mkDerivation rec { 4 + version = "4.6.0"; 5 pname = "intel-cmt-cat"; 6 7 src = fetchFromGitHub { 8 owner = "intel"; 9 repo = "intel-cmt-cat"; 10 rev = "v${version}"; 11 + sha256 = "sha256-Bw/WY30ytvwBo+OZ27WG2aY3YN9xczdjs4jcHR/Tv/w="; 12 }; 13 14 enableParallelBuilding = true;
+2 -2
pkgs/servers/amqp/rabbitmq-server/default.nix
··· 38 39 stdenv.mkDerivation rec { 40 pname = "rabbitmq-server"; 41 - version = "3.11.10"; 42 43 # when updating, consider bumping elixir version in all-packages.nix 44 src = fetchurl { 45 url = "https://github.com/rabbitmq/rabbitmq-server/releases/download/v${version}/${pname}-${version}.tar.xz"; 46 - hash = "sha256-gZcUWN8SnCb93zUTqWDYtxUrT5655gfEnMax1NLHh+M="; 47 }; 48 49 nativeBuildInputs = [ unzip xmlto docbook_xml_dtd_45 docbook_xsl zip rsync python3 ];
··· 38 39 stdenv.mkDerivation rec { 40 pname = "rabbitmq-server"; 41 + version = "3.12.0"; 42 43 # when updating, consider bumping elixir version in all-packages.nix 44 src = fetchurl { 45 url = "https://github.com/rabbitmq/rabbitmq-server/releases/download/v${version}/${pname}-${version}.tar.xz"; 46 + hash = "sha256-XHiFiKO4vi+gD2Cw6QnRCu5YHDKJviLETadmj1Vzr/Y="; 47 }; 48 49 nativeBuildInputs = [ unzip xmlto docbook_xml_dtd_45 docbook_xsl zip rsync python3 ];
+3 -3
pkgs/servers/http/dufs/default.nix
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "dufs"; 5 - version = "0.33.0"; 6 7 src = fetchFromGitHub { 8 owner = "sigoden"; 9 repo = pname; 10 rev = "v${version}"; 11 - sha256 = "sha256-ZcKNpKlyGMFPNiWA28zG5gh0gWxI4IKGP6vs9OBhxQU="; 12 }; 13 14 - cargoHash = "sha256-Ihq00dfjsJX2rNclfyYKp8a0U120+0YLZyvMO1yvBYw="; 15 16 nativeBuildInputs = lib.optionals stdenv.isLinux [ 17 pkg-config
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "dufs"; 5 + version = "0.34.1"; 6 7 src = fetchFromGitHub { 8 owner = "sigoden"; 9 repo = pname; 10 rev = "v${version}"; 11 + sha256 = "sha256-WSTY9j7wfoAqovLb9reNe7LXTjy40QObJNfgiidOINQ="; 12 }; 13 14 + cargoHash = "sha256-sQQUpbvr5IpsUTTznAfUJ5MvGh8rZ0tuZQkxMVpI2wM="; 15 16 nativeBuildInputs = lib.optionals stdenv.isLinux [ 17 pkg-config
+2 -2
pkgs/servers/jackett/default.nix
··· 9 10 buildDotnetModule rec { 11 pname = "jackett"; 12 - version = "0.21.114"; 13 14 src = fetchFromGitHub { 15 owner = pname; 16 repo = pname; 17 rev = "v${version}"; 18 - hash = "sha512-CwK6nKsI9SrY9lE8THRVe+q0fMLxiLAdeCW7rewI2XtIeIDUy7kDYBujIlbxNdAjT+QgsN3E0oC/+nIyRqqFUg=="; 19 }; 20 21 projectFile = "src/Jackett.Server/Jackett.Server.csproj";
··· 9 10 buildDotnetModule rec { 11 pname = "jackett"; 12 + version = "0.21.128"; 13 14 src = fetchFromGitHub { 15 owner = pname; 16 repo = pname; 17 rev = "v${version}"; 18 + hash = "sha512-22OiSh/jStVsA7ghjM+P+eVkViBFyhzNwhZbEIhWRlmpOaIC3NUSwMTKuZlq5I6J8Zc6gVW6kCOaKZoAWWWYfA=="; 19 }; 20 21 projectFile = "src/Jackett.Server/Jackett.Server.csproj";
+1 -1
pkgs/servers/photoprism/backend.nix
··· 19 substituteInPlace internal/commands/passwd.go --replace '/bin/stty' "${coreutils}/bin/stty" 20 ''; 21 22 - vendorSha256 = "sha256-59ZwijPCcmhMPeh7v8EdqzraqRx+HhK6VnUk0JvAbbU="; 23 24 subPackages = [ "cmd/photoprism" ]; 25
··· 19 substituteInPlace internal/commands/passwd.go --replace '/bin/stty' "${coreutils}/bin/stty" 20 ''; 21 22 + vendorSha256 = "sha256-jkBGFO18m5OyyMr8M7qeQHcHc9koLudGU5t8vFUBjuE="; 23 24 subPackages = [ "cmd/photoprism" ]; 25
+5 -4
pkgs/servers/photoprism/default.nix
··· 1 - { pkgs, lib, stdenv, fetchFromGitHub, fetchzip, darktable, rawtherapee, ffmpeg, libheif, exiftool, makeWrapper, testers }: 2 3 let 4 - version = "221118-e58fee0fb"; 5 pname = "photoprism"; 6 7 src = fetchFromGitHub { 8 owner = pname; 9 repo = pname; 10 rev = version; 11 - sha256 = "sha256-Bx9SJLK97uZ/k09LIj8dHwmRetg6krI5iO7mtojV3PU="; 12 }; 13 14 libtensorflow = pkgs.callPackage ./libtensorflow.nix { }; ··· 62 --set PHOTOPRISM_RAWTHERAPEE_BIN ${rawtherapee}/bin/rawtherapee-cli \ 63 --set PHOTOPRISM_HEIFCONVERT_BIN ${libheif}/bin/heif-convert \ 64 --set PHOTOPRISM_FFMPEG_BIN ${ffmpeg}/bin/ffmpeg \ 65 - --set PHOTOPRISM_EXIFTOOL_BIN ${exiftool}/bin/exiftool 66 67 # install frontend 68 ln -s ${frontend}/assets/* ${assets_path}
··· 1 + { pkgs, lib, stdenv, fetchFromGitHub, fetchzip, darktable, rawtherapee, ffmpeg, libheif, exiftool, imagemagick, makeWrapper, testers }: 2 3 let 4 + version = "230603-378d4746a"; 5 pname = "photoprism"; 6 7 src = fetchFromGitHub { 8 owner = pname; 9 repo = pname; 10 rev = version; 11 + sha256 = "sha256-lywVP4Vvq88g+Yk4BuzOaB+9EbWrxGgIF4lOPW33E1U="; 12 }; 13 14 libtensorflow = pkgs.callPackage ./libtensorflow.nix { }; ··· 62 --set PHOTOPRISM_RAWTHERAPEE_BIN ${rawtherapee}/bin/rawtherapee-cli \ 63 --set PHOTOPRISM_HEIFCONVERT_BIN ${libheif}/bin/heif-convert \ 64 --set PHOTOPRISM_FFMPEG_BIN ${ffmpeg}/bin/ffmpeg \ 65 + --set PHOTOPRISM_EXIFTOOL_BIN ${exiftool}/bin/exiftool \ 66 + --set PHOTOPRISM_IMAGEMAGICK_BIN ${imagemagick}/bin/convert 67 68 # install frontend 69 ln -s ${frontend}/assets/* ${assets_path}
+1 -1
pkgs/servers/photoprism/frontend.nix
··· 8 cd frontend 9 ''; 10 11 - npmDepsHash = "sha256-NAtZ85WjiQn9w0B9Y78XL+tSsshHlaXS8+WtojFJmGg"; 12 13 installPhase = '' 14 runHook preInstall
··· 8 cd frontend 9 ''; 10 11 + npmDepsHash = "sha256-lZpgv3YFF+b9nPJlbG2KdGYC5UMy+VnYqRgz7JLj85g="; 12 13 installPhase = '' 14 runHook preInstall
+2 -2
pkgs/tools/bluetooth/bluez-alsa/default.nix
··· 11 12 stdenv.mkDerivation rec { 13 pname = "bluez-alsa"; 14 - version = "4.0.0"; 15 16 src = fetchFromGitHub { 17 owner = "Arkq"; 18 repo = "bluez-alsa"; 19 rev = "v${version}"; 20 - sha256 = "sha256-Dp3O41nzo7j5rqxDEkR4bFPv0CNGOO4kWXAf8iy+jDg="; 21 }; 22 23 nativeBuildInputs = [ pkg-config autoreconfHook ];
··· 11 12 stdenv.mkDerivation rec { 13 pname = "bluez-alsa"; 14 + version = "4.1.0"; 15 16 src = fetchFromGitHub { 17 owner = "Arkq"; 18 repo = "bluez-alsa"; 19 rev = "v${version}"; 20 + sha256 = "sha256-qoG1hTVuSFbccfct9DqSI0BBPJwSFlhPPtv87ThtSBk="; 21 }; 22 23 nativeBuildInputs = [ pkg-config autoreconfHook ];
+2 -2
pkgs/tools/networking/nebula/default.nix
··· 6 7 buildGoModule rec { 8 pname = "nebula"; 9 - version = "1.7.1"; 10 11 src = fetchFromGitHub { 12 owner = "slackhq"; 13 repo = pname; 14 rev = "refs/tags/v${version}"; 15 - hash = "sha256-2FQ/mX1Y2UBl9SiIBVkll0W7P9RWAWJpQwEGKTtplrU="; 16 }; 17 18 vendorHash = "sha256-VZzSdl8R1y7rCF2vz7e+5nAkb3wlJymNWCXwZZUvg4A=";
··· 6 7 buildGoModule rec { 8 pname = "nebula"; 9 + version = "1.7.2"; 10 11 src = fetchFromGitHub { 12 owner = "slackhq"; 13 repo = pname; 14 rev = "refs/tags/v${version}"; 15 + hash = "sha256-/kEXrcMFnrnnD+6754EDoOvn4czh0rJGEjlXkmCzb1w="; 16 }; 17 18 vendorHash = "sha256-VZzSdl8R1y7rCF2vz7e+5nAkb3wlJymNWCXwZZUvg4A=";
+2 -2
pkgs/tools/networking/ocserv/default.nix
··· 5 6 stdenv.mkDerivation rec { 7 pname = "ocserv"; 8 - version = "1.1.6"; 9 10 src = fetchFromGitLab { 11 owner = "openconnect"; 12 repo = "ocserv"; 13 rev = version; 14 - sha256 = "sha256-1grRt0F/myVzK+DMSeK5K0Ui8bJANEtE6/6IY+ZbPAw="; 15 }; 16 17 nativeBuildInputs = [ autoreconfHook gperf pkg-config ronn ];
··· 5 6 stdenv.mkDerivation rec { 7 pname = "ocserv"; 8 + version = "1.1.7"; 9 10 src = fetchFromGitLab { 11 owner = "openconnect"; 12 repo = "ocserv"; 13 rev = version; 14 + sha256 = "sha256-30S2puoL+5cBZ5nCKW2zvGPcnFvaKjRZVGKDC3E5XRk="; 15 }; 16 17 nativeBuildInputs = [ autoreconfHook gperf pkg-config ronn ];
+2 -2
pkgs/tools/security/exploitdb/default.nix
··· 6 7 stdenv.mkDerivation rec { 8 pname = "exploitdb"; 9 - version = "2023-06-03"; 10 11 src = fetchFromGitLab { 12 owner = "exploit-database"; 13 repo = pname; 14 rev = "refs/tags/${version}"; 15 - hash = "sha256-qyrQMNrCn6HaqMM1ikzx/KGquBOa71XNPHcu5aNnSYg="; 16 }; 17 18 nativeBuildInputs = [
··· 6 7 stdenv.mkDerivation rec { 8 pname = "exploitdb"; 9 + version = "2023-06-05"; 10 11 src = fetchFromGitLab { 12 owner = "exploit-database"; 13 repo = pname; 14 rev = "refs/tags/${version}"; 15 + hash = "sha256-OhcYBct+ADyEk3VszQr/A+igB4mI/1BBedNzAfuHQ+k="; 16 }; 17 18 nativeBuildInputs = [
+1 -4
pkgs/tools/system/monit/default.nix
··· 24 nativeBuildInputs = [ bison flex ] ++ 25 lib.optionals stdenv.hostPlatform.isDarwin [ 26 darwin.apple_sdk.frameworks.DiskArbitration 27 ]; 28 29 buildInputs = [ zlib.dev libxcrypt ] ++ 30 lib.optionals useSSL [ openssl ] ++ 31 lib.optionals usePAM [ pam ]; 32 - 33 - preConfigure = lib.optionalString stdenv.hostPlatform.isDarwin '' 34 - substituteInPlace configure --replace "-framework System" "-lSystem" 35 - ''; 36 37 configureFlags = [ 38 (lib.withFeature usePAM "pam")
··· 24 nativeBuildInputs = [ bison flex ] ++ 25 lib.optionals stdenv.hostPlatform.isDarwin [ 26 darwin.apple_sdk.frameworks.DiskArbitration 27 + darwin.apple_sdk.frameworks.System 28 ]; 29 30 buildInputs = [ zlib.dev libxcrypt ] ++ 31 lib.optionals useSSL [ openssl ] ++ 32 lib.optionals usePAM [ pam ]; 33 34 configureFlags = [ 35 (lib.withFeature usePAM "pam")
+3 -3
pkgs/tools/text/mdbook/default.nix
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "mdbook"; 5 - version = "0.4.29"; 6 7 src = fetchFromGitHub { 8 owner = "rust-lang"; 9 repo = "mdBook"; 10 rev = "refs/tags/v${version}"; 11 - sha256 = "sha256-81QU1FJ5f23OdS+bzMnHEMbwwzywU38Xoq3DEN0Kgpg="; 12 }; 13 14 - cargoHash = "sha256-SyDLC2x1hEyjt+GG50CblTGahJAkEZWkXSPyPvUJNgw="; 15 16 buildInputs = lib.optionals stdenv.isDarwin [ CoreServices ]; 17
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "mdbook"; 5 + version = "0.4.30"; 6 7 src = fetchFromGitHub { 8 owner = "rust-lang"; 9 repo = "mdBook"; 10 rev = "refs/tags/v${version}"; 11 + sha256 = "sha256-AKGvU8yEgUcLRaf+fPet1kv84m95qrO25P4izP1w9lg="; 12 }; 13 14 + cargoHash = "sha256-Jg/+LAxgyGlVcqUdiHnZpwmTrtApWLXFhy0bNcNs0hM="; 15 16 buildInputs = lib.optionals stdenv.isDarwin [ CoreServices ]; 17
+5 -5
pkgs/top-level/all-packages.nix
··· 481 482 commix = callPackage ../tools/security/commix { }; 483 484 compdb = callPackage ../tools/misc/compdb { }; 485 486 conserver = callPackage ../tools/misc/conserver { }; ··· 4022 4023 bless = callPackage ../applications/editors/bless { }; 4024 4025 - blink = callPackage ../applications/emulators/blink { }; 4026 4027 blink1-tool = callPackage ../tools/misc/blink1-tool { }; 4028 ··· 12453 12454 sing-geosite = callPackage ../data/misc/sing-geosite { }; 12455 12456 - sing-geoip = callPackage ../data/misc/sing-geoip { 12457 - buildGoModule = buildGo119Module; 12458 - }; 12459 12460 sipcalc = callPackage ../tools/networking/sipcalc { }; 12461 ··· 20361 20362 far2l = callPackage ../applications/misc/far2l { 20363 stdenv = if stdenv.cc.isClang then llvmPackages.stdenv else stdenv; 20364 - inherit (darwin.apple_sdk.frameworks) IOKit Carbon Cocoa AudioToolbox OpenGL; 20365 }; 20366 20367 farbfeld = callPackage ../development/libraries/farbfeld { };
··· 481 482 commix = callPackage ../tools/security/commix { }; 483 484 + comodoro = callPackage ../applications/misc/comodoro { }; 485 + 486 compdb = callPackage ../tools/misc/compdb { }; 487 488 conserver = callPackage ../tools/misc/conserver { }; ··· 4024 4025 bless = callPackage ../applications/editors/bless { }; 4026 4027 + blink = darwin.apple_sdk_11_0.callPackage ../applications/emulators/blink { }; 4028 4029 blink1-tool = callPackage ../tools/misc/blink1-tool { }; 4030 ··· 12455 12456 sing-geosite = callPackage ../data/misc/sing-geosite { }; 12457 12458 + sing-geoip = callPackage ../data/misc/sing-geoip { }; 12459 12460 sipcalc = callPackage ../tools/networking/sipcalc { }; 12461 ··· 20361 20362 far2l = callPackage ../applications/misc/far2l { 20363 stdenv = if stdenv.cc.isClang then llvmPackages.stdenv else stdenv; 20364 + inherit (darwin.apple_sdk.frameworks) IOKit Carbon Cocoa AudioToolbox OpenGL System; 20365 }; 20366 20367 farbfeld = callPackage ../development/libraries/farbfeld { };