Merge remote-tracking branch 'origin/master' into staging-next

Conflicts:
- pkgs/development/python-modules/aiohappyeyeballs/default.nix

+557 -395
+1 -1
nixos/modules/programs/partition-manager.nix
··· 14 14 config = mkIf config.programs.partition-manager.enable { 15 15 services.dbus.packages = [ pkgs.libsForQt5.kpmcore ]; 16 16 # `kpmcore` need to be installed to pull in polkit actions. 17 - environment.systemPackages = [ pkgs.libsForQt5.kpmcore pkgs.partition-manager ]; 17 + environment.systemPackages = [ pkgs.libsForQt5.kpmcore pkgs.libsForQt5.partitionmanager ]; 18 18 }; 19 19 }
+2 -2
nixos/modules/tasks/filesystems/bcachefs.nix
··· 123 123 inherit assertions; 124 124 # needed for systemd-remount-fs 125 125 system.fsPackages = [ pkgs.bcachefs-tools ]; 126 - # FIXME: Replace this with `linuxPackages_latest` when 6.7 is released, remove this line when the LTS version is at least 6.7 127 - boot.kernelPackages = lib.mkDefault pkgs.linuxPackages_testing; 126 + # FIXME: Remove this line when the default kernel has bcachefs 127 + boot.kernelPackages = lib.mkDefault pkgs.linuxPackages_latest; 128 128 systemd.services = lib.mapAttrs' (mkUnits "") (lib.filterAttrs (n: fs: (fs.fsType == "bcachefs") && (!utils.fsNeededForBoot fs)) config.fileSystems); 129 129 } 130 130
+2 -2
pkgs/applications/audio/tidal-hifi/default.nix
··· 36 36 37 37 stdenv.mkDerivation (finalAttrs: { 38 38 pname = "tidal-hifi"; 39 - version = "5.7.1"; 39 + version = "5.8.0"; 40 40 41 41 src = fetchurl { 42 42 url = "https://github.com/Mastermindzh/tidal-hifi/releases/download/${finalAttrs.version}/tidal-hifi_${finalAttrs.version}_amd64.deb"; 43 - sha256 = "sha256-7wBQgoglLS67aiQsF9iUeFoJDDqq0fJgu5BSyH+HI7M="; 43 + sha256 = "sha256-g3CDoFeXGLj/bG0WP8fCF/uphqEHfKA/wmfQfjk52aM="; 44 44 }; 45 45 46 46 nativeBuildInputs = [ autoPatchelfHook dpkg makeWrapper ];
+2 -2
pkgs/applications/editors/vscode/extensions/default.nix
··· 7 7 , nodePackages 8 8 , python3Packages 9 9 , jdk 10 - , llvmPackages_8 10 + , llvmPackages 11 11 , llvmPackages_14 12 12 , nixpkgs-fmt 13 13 , protobuf ··· 2162 2162 }; 2163 2163 }; 2164 2164 2165 - llvm-org.lldb-vscode = llvmPackages_8.lldb; 2165 + llvm-org.lldb-vscode = llvmPackages.lldb; 2166 2166 2167 2167 llvm-vs-code-extensions.vscode-clangd = buildVscodeMarketplaceExtension { 2168 2168 mktplcRef = {
+2
pkgs/applications/kde/default.nix
··· 187 187 kpat = callPackage ./kpat.nix {}; 188 188 kpimtextedit = callPackage ./kpimtextedit.nix {}; 189 189 kpkpass = callPackage ./kpkpass.nix {}; 190 + kpmcore = callPackage ./kpmcore {}; 190 191 kpublictransport = callPackage ./kpublictransport.nix {}; 191 192 kqtquickcharts = callPackage ./kqtquickcharts.nix {}; 192 193 krdc = callPackage ./krdc.nix {}; ··· 230 231 minuet = callPackage ./minuet.nix {}; 231 232 okular = callPackage ./okular.nix {}; 232 233 palapeli = callPackage ./palapeli.nix {}; 234 + partitionmanager = callPackage ./partitionmanager {}; 233 235 picmi = callPackage ./picmi.nix {}; 234 236 pim-data-exporter = callPackage ./pim-data-exporter.nix {}; 235 237 pim-sieve-editor = callPackage ./pim-sieve-editor.nix {};
+3 -3
pkgs/applications/terminal-emulators/rio/default.nix
··· 51 51 in 52 52 rustPlatform.buildRustPackage rec { 53 53 pname = "rio"; 54 - version = "0.0.33"; 54 + version = "0.0.34"; 55 55 56 56 src = fetchFromGitHub { 57 57 owner = "raphamorim"; 58 58 repo = "rio"; 59 59 rev = "v${version}"; 60 - hash = "sha256-/SpSOcxuEL2vsqbZAqbjTgnLhcyr0/ckfvcI1nwkWFg="; 60 + hash = "sha256-UHA2j7NOPBl7qrCu5bWLHjpVgWxlydtj0F7lfAlQZXg="; 61 61 }; 62 62 63 - cargoHash = "sha256-hXO/hdHmYjbwR3Ae5VV/HB1SVp/jhY05fIxi04n7X/Y="; 63 + cargoHash = "sha256-xqLticREnGxsuo2d7d3VaFWbGJ5A1L7GvDwV7qQ61xs="; 64 64 65 65 nativeBuildInputs = [ 66 66 ncurses
+1 -1
pkgs/applications/version-management/gittyup/default.nix
··· 71 71 description = "A graphical Git client designed to help you understand and manage your source code history"; 72 72 homepage = "https://murmele.github.io/Gittyup"; 73 73 license = with licenses; [ mit ]; 74 - maintainers = with maintainers; [ thiagokokada ]; 74 + maintainers = with maintainers; [ ]; 75 75 platforms = platforms.unix; 76 76 broken = stdenv.isDarwin; 77 77 };
+227 -202
pkgs/build-support/trivial-builders/default.nix
··· 9 9 10 10 rec { 11 11 12 - /* Run the shell command `buildCommand' to produce a store path named 13 - `name'. The attributes in `env' are added to the environment 14 - prior to running the command. By default `runCommand` runs in a 15 - stdenv with no compiler environment. `runCommandCC` uses the default 16 - stdenv, `pkgs.stdenv`. 12 + /* 13 + Run the shell command `buildCommand' to produce a store path named `name'. 17 14 18 - Example: 15 + The attributes in `env' are added to the environment prior to running the command. 16 + Environment variables set by `stdenv.mkDerivation` take precedence. 19 17 18 + By default `runCommand` runs in a stdenv with no compiler environment. 19 + `runCommandCC` uses the default stdenv, `pkgs.stdenv`. 20 20 21 - runCommand "name" {envVariable = true;} ''echo hello > $out'' 22 - runCommandCC "name" {} ''gcc -o myfile myfile.c; cp myfile $out''; 21 + Example: 23 22 23 + ```nix 24 + runCommand "name" {envVariable = true;} ''echo hello > $out''; 25 + ``` 24 26 25 - The `*Local` variants force a derivation to be built locally, 26 - it is not substituted. 27 + ```nix 28 + runCommandCC "name" {} ''gcc -o myfile myfile.c; cp myfile $out''; 29 + ``` 27 30 28 - This is intended for very cheap commands (<1s execution time). 29 - It saves on the network roundrip and can speed up a build. 31 + The `*Local` variants force a derivation to be built locally, 32 + it is not substituted. 30 33 31 - It is the same as adding the special fields 34 + This is intended for very cheap commands (<1s execution time). 35 + It saves on the network roundrip and can speed up a build. 32 36 33 - `preferLocalBuild = true;` 34 - `allowSubstitutes = false;` 37 + It is the same as adding the special fields 35 38 36 - to a derivation’s attributes. 39 + ```nix 40 + { 41 + preferLocalBuild = true; 42 + allowSubstitutes = false; 43 + } 44 + ``` 45 + 46 + to a derivation’s attributes. 37 47 */ 38 48 runCommand = name: env: runCommandWith { 39 49 stdenv = stdenvNoCC; ··· 57 67 # `runCommandCCLocal` left out on purpose. 58 68 # We shouldn’t force the user to have a cc in scope. 59 69 60 - /* Generalized version of the `runCommand`-variants 70 + /* 71 + Generalized version of the `runCommand`-variants 61 72 which does customized behavior via a single 62 73 attribute set passed as the first argument 63 74 instead of having a lot of variants like ··· 72 83 defaultStdenv = stdenv; 73 84 in 74 85 { 75 - # which stdenv to use, defaults to a stdenv with a C compiler, pkgs.stdenv 86 + # which stdenv to use, defaults to a stdenv with a C compiler, pkgs.stdenv 76 87 stdenv ? defaultStdenv 77 - # whether to build this derivation locally instead of substituting 88 + # whether to build this derivation locally instead of substituting 78 89 , runLocal ? false 79 - # extra arguments to pass to stdenv.mkDerivation 80 - , derivationArgs ? {} 81 - # name of the resulting derivation 90 + # extra arguments to pass to stdenv.mkDerivation 91 + , derivationArgs ? { } 92 + # name of the resulting derivation 82 93 , name 83 - # TODO(@Artturin): enable strictDeps always 94 + # TODO(@Artturin): enable strictDeps always 84 95 }: buildCommand: 85 - stdenv.mkDerivation ({ 86 - enableParallelBuilding = true; 87 - inherit buildCommand name; 88 - passAsFile = [ "buildCommand" ] 89 - ++ (derivationArgs.passAsFile or []); 90 - } 91 - // lib.optionalAttrs (! derivationArgs?meta) { 92 - pos = let args = builtins.attrNames derivationArgs; in 93 - if builtins.length args > 0 94 - then builtins.unsafeGetAttrPos (builtins.head args) derivationArgs 95 - else null; 96 - } 97 - // (lib.optionalAttrs runLocal { 98 - preferLocalBuild = true; 99 - allowSubstitutes = false; 100 - }) 101 - // builtins.removeAttrs derivationArgs [ "passAsFile" ]); 96 + stdenv.mkDerivation ({ 97 + enableParallelBuilding = true; 98 + inherit buildCommand name; 99 + passAsFile = [ "buildCommand" ] 100 + ++ (derivationArgs.passAsFile or [ ]); 101 + } 102 + // lib.optionalAttrs (! derivationArgs?meta) { 103 + pos = let args = builtins.attrNames derivationArgs; in 104 + if builtins.length args > 0 105 + then builtins.unsafeGetAttrPos (builtins.head args) derivationArgs 106 + else null; 107 + } 108 + // (lib.optionalAttrs runLocal { 109 + preferLocalBuild = true; 110 + allowSubstitutes = false; 111 + }) 112 + // builtins.removeAttrs derivationArgs [ "passAsFile" ]); 102 113 103 114 104 - /* Writes a text file to the nix store. 115 + /* 116 + Writes a text file to the nix store. 105 117 The contents of text is added to the file in the store. 106 118 107 119 Example: ··· 145 157 matches = builtins.match "/bin/([^/]+)" destination; 146 158 in 147 159 runCommand name 148 - { inherit text executable checkPhase allowSubstitutes preferLocalBuild; 160 + { 161 + inherit text executable checkPhase allowSubstitutes preferLocalBuild; 149 162 passAsFile = [ "text" ]; 150 - meta = lib.optionalAttrs (executable && matches != null) { 151 - mainProgram = lib.head matches; 152 - } // meta; 163 + meta = lib.optionalAttrs (executable && matches != null) 164 + { 165 + mainProgram = lib.head matches; 166 + } // meta; 153 167 } 154 168 '' 155 169 target=$out${lib.escapeShellArg destination} ··· 169 183 ''; 170 184 171 185 /* 172 - Writes a text file to nix store with no optional parameters available. 186 + Writes a text file to nix store with no optional parameters available. 173 187 174 - Example: 188 + Example: 175 189 176 190 177 - # Writes contents of file to /nix/store/<store path> 178 - writeText "my-file" 191 + # Writes contents of file to /nix/store/<store path> 192 + writeText "my-file" 179 193 '' 180 194 Contents of File 181 195 ''; 182 196 183 197 184 198 */ 185 - writeText = name: text: writeTextFile {inherit name text;}; 199 + writeText = name: text: writeTextFile { inherit name text; }; 186 200 187 201 /* 188 202 Writes a text file to nix store in a specific directory with no ··· 224 238 225 239 226 240 */ 227 - writeScript = name: text: writeTextFile {inherit name text; executable = true;}; 241 + writeScript = name: text: writeTextFile { inherit name text; executable = true; }; 228 242 229 243 /* 230 244 Writes a text file to /nix/store/<store path>/bin/<name> and ··· 270 284 text = '' 271 285 #!${runtimeShell} 272 286 ${text} 273 - ''; 287 + ''; 274 288 checkPhase = '' 275 289 ${stdenv.shellDryRun} "$target" 276 290 ''; ··· 292 306 293 307 294 308 */ 295 - writeShellScriptBin = name : text : 309 + writeShellScriptBin = name: text: 296 310 writeTextFile { 297 311 inherit name; 298 312 executable = true; ··· 300 314 text = '' 301 315 #!${runtimeShell} 302 316 ${text} 303 - ''; 317 + ''; 304 318 checkPhase = '' 305 319 ${stdenv.shellDryRun} "$target" 306 320 ''; ··· 340 354 , runtimeInputs ? [ ] 341 355 , meta ? { } 342 356 , checkPhase ? null 343 - , excludeShellChecks ? [ ] 357 + , excludeShellChecks ? [ ] 344 358 }: 345 359 writeTextFile { 346 360 inherit name meta; ··· 366 380 # but we still want to use writeShellApplication on those platforms 367 381 let 368 382 shellcheckSupported = lib.meta.availableOn stdenv.buildPlatform shellcheck-minimal.compiler; 369 - excludeOption = lib.optionalString (excludeShellChecks != [ ]) "--exclude '${lib.concatStringsSep "," excludeShellChecks}'"; 383 + excludeOption = lib.optionalString (excludeShellChecks != [ ]) "--exclude '${lib.concatStringsSep "," excludeShellChecks}'"; 370 384 shellcheckCommand = lib.optionalString shellcheckSupported '' 371 385 # use shellcheck which does not include docs 372 386 # pandoc takes long to build and documentation isn't needed for just running the cli ··· 385 399 # Create a C binary 386 400 writeCBin = pname: code: 387 401 runCommandCC pname 388 - { 389 - inherit pname code; 390 - executable = true; 391 - passAsFile = ["code"]; 392 - # Pointless to do this on a remote machine. 393 - preferLocalBuild = true; 394 - allowSubstitutes = false; 395 - meta = { 396 - mainProgram = pname; 397 - }; 398 - } 399 - '' 400 - n=$out/bin/${pname} 401 - mkdir -p "$(dirname "$n")" 402 - mv "$codePath" code.c 403 - $CC -x c code.c -o "$n" 404 - ''; 402 + { 403 + inherit pname code; 404 + executable = true; 405 + passAsFile = [ "code" ]; 406 + # Pointless to do this on a remote machine. 407 + preferLocalBuild = true; 408 + allowSubstitutes = false; 409 + meta = { 410 + mainProgram = pname; 411 + }; 412 + } 413 + '' 414 + n=$out/bin/${pname} 415 + mkdir -p "$(dirname "$n")" 416 + mv "$codePath" code.c 417 + $CC -x c code.c -o "$n" 418 + ''; 405 419 406 420 407 421 /* concat a list of files to the nix store. ··· 532 546 */ 533 547 symlinkJoin = 534 548 args_@{ name 535 - , paths 536 - , preferLocalBuild ? true 537 - , allowSubstitutes ? false 538 - , postBuild ? "" 539 - , ... 540 - }: 549 + , paths 550 + , preferLocalBuild ? true 551 + , allowSubstitutes ? false 552 + , postBuild ? "" 553 + , ... 554 + }: 541 555 let 542 556 args = removeAttrs args_ [ "name" "postBuild" ] 543 557 // { 544 - inherit preferLocalBuild allowSubstitutes; 545 - passAsFile = [ "paths" ]; 546 - }; # pass the defaults 547 - in runCommand name args 558 + inherit preferLocalBuild allowSubstitutes; 559 + passAsFile = [ "paths" ]; 560 + }; # pass the defaults 561 + in 562 + runCommand name args 548 563 '' 549 564 mkdir -p $out 550 565 for i in $(cat $pathsPath); do ··· 584 599 See the note on symlinkJoin for the difference between linkFarm and symlinkJoin. 585 600 */ 586 601 linkFarm = name: entries: 587 - let 588 - entries' = 589 - if (lib.isAttrs entries) then entries 590 - # We do this foldl to have last-wins semantics in case of repeated entries 591 - else if (lib.isList entries) then lib.foldl (a: b: a // { "${b.name}" = b.path; }) { } entries 592 - else throw "linkFarm entries must be either attrs or a list!"; 602 + let 603 + entries' = 604 + if (lib.isAttrs entries) then entries 605 + # We do this foldl to have last-wins semantics in case of repeated entries 606 + else if (lib.isList entries) then lib.foldl (a: b: a // { "${b.name}" = b.path; }) { } entries 607 + else throw "linkFarm entries must be either attrs or a list!"; 593 608 594 - linkCommands = lib.mapAttrsToList (name: path: '' 595 - mkdir -p "$(dirname ${lib.escapeShellArg "${name}"})" 596 - ln -s ${lib.escapeShellArg "${path}"} ${lib.escapeShellArg "${name}"} 597 - '') entries'; 598 - in 599 - runCommand name { 600 - preferLocalBuild = true; 601 - allowSubstitutes = false; 602 - passthru.entries = entries'; 603 - } '' 604 - mkdir -p $out 605 - cd $out 606 - ${lib.concatStrings linkCommands} 607 - ''; 609 + linkCommands = lib.mapAttrsToList 610 + (name: path: '' 611 + mkdir -p "$(dirname ${lib.escapeShellArg "${name}"})" 612 + ln -s ${lib.escapeShellArg "${path}"} ${lib.escapeShellArg "${name}"} 613 + '') 614 + entries'; 615 + in 616 + runCommand name 617 + { 618 + preferLocalBuild = true; 619 + allowSubstitutes = false; 620 + passthru.entries = entries'; 621 + } '' 622 + mkdir -p $out 623 + cd $out 624 + ${lib.concatStrings linkCommands} 625 + ''; 608 626 609 627 /* 610 628 Easily create a linkFarm from a set of derivations. ··· 639 657 bin output and other contents of the package's output (e.g. setup 640 658 hooks) cause trouble when used in your environment. 641 659 */ 642 - onlyBin = drv: runCommand "${drv.name}-only-bin" {} '' 660 + onlyBin = drv: runCommand "${drv.name}-only-bin" { } '' 643 661 mkdir -p $out 644 662 ln -s ${lib.getBin drv}/bin $out/bin 645 663 ''; ··· 675 693 # TODO 2023-01, no backport: simplify to inherit passthru; 676 694 passthru = passthru 677 695 // optionalAttrs (substitutions?passthru) 678 - (warn "makeSetupHook (name = ${lib.strings.escapeNixString name}): `substitutions.passthru` is deprecated. Please set `passthru` directly." 679 - substitutions.passthru); 696 + (warn "makeSetupHook (name = ${lib.strings.escapeNixString name}): `substitutions.passthru` is deprecated. Please set `passthru` directly." 697 + substitutions.passthru); 680 698 }) 681 699 ('' 682 700 mkdir -p $out/nix-support 683 701 cp ${script} $out/nix-support/setup-hook 684 702 recordPropagatedDependencies 685 - '' + lib.optionalString (substitutions != {}) '' 703 + '' + lib.optionalString (substitutions != { }) '' 686 704 substituteAll ${script} $out/nix-support/setup-hook 687 705 ''); 688 706 ··· 691 709 692 710 writeReferencesToFile = path: runCommand "runtime-deps" 693 711 { 694 - exportReferencesGraph = ["graph" path]; 712 + exportReferencesGraph = [ "graph" path ]; 695 713 } 696 714 '' 697 715 touch $out ··· 710 728 */ 711 729 writeDirectReferencesToFile = path: runCommand "runtime-references" 712 730 { 713 - exportReferencesGraph = ["graph" path]; 731 + exportReferencesGraph = [ "graph" path ]; 714 732 inherit path; 715 733 } 716 734 '' ··· 744 762 */ 745 763 writeStringReferencesToFile = string: 746 764 /* 747 - The basic operation this performs is to copy the string context 748 - from `string' to a second string and wrap that string in a 749 - derivation. However, that alone is not enough, since nothing in the 750 - string refers to the output paths of the derivations/paths in its 751 - context, meaning they'll be considered build-time dependencies and 752 - removed from the wrapper derivation's closure. Putting the 753 - necessary output paths in the new string is however not very 754 - straightforward - the attrset returned by `getContext' contains 755 - only references to derivations' .drv-paths, not their output 756 - paths. In order to "convert" them, we try to extract the 757 - corresponding paths from the original string using regex. 765 + The basic operation this performs is to copy the string context 766 + from `string' to a second string and wrap that string in a 767 + derivation. However, that alone is not enough, since nothing in the 768 + string refers to the output paths of the derivations/paths in its 769 + context, meaning they'll be considered build-time dependencies and 770 + removed from the wrapper derivation's closure. Putting the 771 + necessary output paths in the new string is however not very 772 + straightforward - the attrset returned by `getContext' contains 773 + only references to derivations' .drv-paths, not their output 774 + paths. In order to "convert" them, we try to extract the 775 + corresponding paths from the original string using regex. 758 776 */ 759 777 let 760 778 # Taken from https://github.com/NixOS/nix/blob/130284b8508dad3c70e8160b15f3d62042fc730a/src/libutil/hash.cc#L84 ··· 798 816 if lib.elem "out" value.outputs then 799 817 lib.filter 800 818 (x: lib.isList x && 801 - # If the matched path is in `namedOutputPaths`, 802 - # it's a partial match of an output path where 803 - # the output name isn't `out` 804 - lib.all (o: !lib.hasPrefix (lib.head x) o) namedOutputPaths) 819 + # If the matched path is in `namedOutputPaths`, 820 + # it's a partial match of an output path where 821 + # the output name isn't `out` 822 + lib.all (o: !lib.hasPrefix (lib.head x) o) namedOutputPaths) 805 823 (builtins.split "(${builtins.storeDir}/[${nixHashChars}]+-${name})" string) 806 824 else 807 - []) 825 + [ ]) 808 826 packages); 809 827 allPaths = lib.concatStringsSep "\n" (lib.unique (sources ++ namedOutputPaths ++ outputPaths)); 810 828 allPathsWithContext = builtins.appendContext allPaths context; 811 829 in 812 - if builtins ? getContext then 813 - writeText "string-references" allPathsWithContext 814 - else 815 - writeDirectReferencesToFile (writeText "string-file" string); 830 + if builtins ? getContext then 831 + writeText "string-references" allPathsWithContext 832 + else 833 + writeDirectReferencesToFile (writeText "string-file" string); 816 834 817 835 818 836 /* Print an error message if the file with the specified name and ··· 830 848 } 831 849 832 850 */ 833 - requireFile = { name ? null 834 - , sha256 ? null 835 - , sha1 ? null 836 - , hash ? null 837 - , url ? null 838 - , message ? null 839 - , hashMode ? "flat" 840 - } : 841 - assert (message != null) || (url != null); 842 - assert (sha256 != null) || (sha1 != null) || (hash != null); 843 - assert (name != null) || (url != null); 844 - let msg = 845 - if message != null then message 846 - else '' 847 - Unfortunately, we cannot download file ${name_} automatically. 848 - Please go to ${url} to download it yourself, and add it to the Nix store 849 - using either 850 - nix-store --add-fixed ${hashAlgo} ${name_} 851 - or 852 - nix-prefetch-url --type ${hashAlgo} file:///path/to/${name_} 853 - ''; 854 - hashAlgo = if hash != null then (builtins.head (lib.strings.splitString "-" hash)) 855 - else if sha256 != null then "sha256" 856 - else "sha1"; 857 - hashAlgo_ = if hash != null then "" else hashAlgo; 858 - hash_ = if hash != null then hash 859 - else if sha256 != null then sha256 860 - else sha1; 861 - name_ = if name == null then baseNameOf (toString url) else name; 862 - in 863 - stdenvNoCC.mkDerivation { 864 - name = name_; 865 - outputHashMode = hashMode; 866 - outputHashAlgo = hashAlgo_; 867 - outputHash = hash_; 868 - preferLocalBuild = true; 869 - allowSubstitutes = false; 870 - builder = writeScript "restrict-message" '' 871 - source ${stdenvNoCC}/setup 872 - cat <<_EOF_ 851 + requireFile = 852 + { name ? null 853 + , sha256 ? null 854 + , sha1 ? null 855 + , hash ? null 856 + , url ? null 857 + , message ? null 858 + , hashMode ? "flat" 859 + }: 860 + assert (message != null) || (url != null); 861 + assert (sha256 != null) || (sha1 != null) || (hash != null); 862 + assert (name != null) || (url != null); 863 + let 864 + msg = 865 + if message != null then message 866 + else '' 867 + Unfortunately, we cannot download file ${name_} automatically. 868 + Please go to ${url} to download it yourself, and add it to the Nix store 869 + using either 870 + nix-store --add-fixed ${hashAlgo} ${name_} 871 + or 872 + nix-prefetch-url --type ${hashAlgo} file:///path/to/${name_} 873 + ''; 874 + hashAlgo = 875 + if hash != null then (builtins.head (lib.strings.splitString "-" hash)) 876 + else if sha256 != null then "sha256" 877 + else "sha1"; 878 + hashAlgo_ = if hash != null then "" else hashAlgo; 879 + hash_ = 880 + if hash != null then hash 881 + else if sha256 != null then sha256 882 + else sha1; 883 + name_ = if name == null then baseNameOf (toString url) else name; 884 + in 885 + stdenvNoCC.mkDerivation { 886 + name = name_; 887 + outputHashMode = hashMode; 888 + outputHashAlgo = hashAlgo_; 889 + outputHash = hash_; 890 + preferLocalBuild = true; 891 + allowSubstitutes = false; 892 + builder = writeScript "restrict-message" '' 893 + source ${stdenvNoCC}/setup 894 + cat <<_EOF_ 873 895 874 - *** 875 - ${msg} 876 - *** 896 + *** 897 + ${msg} 898 + *** 877 899 878 - _EOF_ 879 - exit 1 880 - ''; 881 - }; 900 + _EOF_ 901 + exit 1 902 + ''; 903 + }; 882 904 883 905 884 906 /* ··· 915 937 applyPatches = 916 938 { src 917 939 , name ? (if builtins.typeOf src == "path" 918 - then builtins.baseNameOf src 919 - else 920 - if builtins.isAttrs src && builtins.hasAttr "name" src 921 - then src.name 922 - else throw "applyPatches: please supply a `name` argument because a default name can only be computed when the `src` is a path or is an attribute set with a `name` attribute." 923 - ) + "-patched" 924 - , patches ? [] 940 + then builtins.baseNameOf src 941 + else 942 + if builtins.isAttrs src && builtins.hasAttr "name" src 943 + then src.name 944 + else throw "applyPatches: please supply a `name` argument because a default name can only be computed when the `src` is a path or is an attribute set with a `name` attribute." 945 + ) + "-patched" 946 + , patches ? [ ] 925 947 , postPatch ? "" 926 948 , ... 927 - }@args: stdenvNoCC.mkDerivation { 928 - inherit name src patches postPatch; 929 - preferLocalBuild = true; 930 - allowSubstitutes = false; 931 - phases = "unpackPhase patchPhase installPhase"; 932 - installPhase = "cp -R ./ $out"; 933 - } 949 + }@args: stdenvNoCC.mkDerivation 950 + { 951 + inherit name src patches postPatch; 952 + preferLocalBuild = true; 953 + allowSubstitutes = false; 954 + phases = "unpackPhase patchPhase installPhase"; 955 + installPhase = "cp -R ./ $out"; 956 + } 934 957 # Carry `meta` information from the underlying `src` if present. 935 958 // (optionalAttrs (src?meta) { inherit (src) meta; }) 936 959 // (removeAttrs args [ "src" "name" "patches" "postPatch" ]); 937 960 938 961 /* An immutable file in the store with a length of 0 bytes. */ 939 - emptyFile = runCommand "empty-file" { 940 - outputHashAlgo = "sha256"; 941 - outputHashMode = "recursive"; 942 - outputHash = "0ip26j2h11n1kgkz36rl4akv694yz65hr72q4kv4b3lxcbi65b3p"; 943 - preferLocalBuild = true; 944 - } "touch $out"; 962 + emptyFile = runCommand "empty-file" 963 + { 964 + outputHashAlgo = "sha256"; 965 + outputHashMode = "recursive"; 966 + outputHash = "0ip26j2h11n1kgkz36rl4akv694yz65hr72q4kv4b3lxcbi65b3p"; 967 + preferLocalBuild = true; 968 + } "touch $out"; 945 969 946 970 /* An immutable empty directory in the store. */ 947 - emptyDirectory = runCommand "empty-directory" { 948 - outputHashAlgo = "sha256"; 949 - outputHashMode = "recursive"; 950 - outputHash = "0sjjj9z1dhilhpc8pq4154czrb79z9cm044jvn75kxcjv6v5l2m5"; 951 - preferLocalBuild = true; 952 - } "mkdir $out"; 971 + emptyDirectory = runCommand "empty-directory" 972 + { 973 + outputHashAlgo = "sha256"; 974 + outputHashMode = "recursive"; 975 + outputHash = "0sjjj9z1dhilhpc8pq4154czrb79z9cm044jvn75kxcjv6v5l2m5"; 976 + preferLocalBuild = true; 977 + } "mkdir $out"; 953 978 }
+39
pkgs/by-name/di/disko/package.nix
··· 1 + { stdenvNoCC 2 + , makeWrapper 3 + , lib 4 + , fetchFromGitHub 5 + , bash 6 + , nix 7 + }: 8 + 9 + stdenvNoCC.mkDerivation (finalAttrs: { 10 + name = "disko"; 11 + version = "1.3.0"; 12 + src = fetchFromGitHub { 13 + owner = "nix-community"; 14 + repo = "disko"; 15 + rev = "v${finalAttrs.version}"; 16 + hash = "sha256-wOIJwAsnZhM0NlFRwYJRgO4Lldh8j9viyzwQXtrbNtM="; 17 + }; 18 + nativeBuildInputs = [ makeWrapper ]; 19 + buildInputs = [ bash ]; 20 + installPhase = '' 21 + mkdir -p $out/bin $out/share/disko 22 + cp -r cli.nix default.nix disk-deactivate lib $out/share/disko 23 + sed -e "s|libexec_dir=\".*\"|libexec_dir=\"$out/share/disko\"|" disko > $out/bin/disko 24 + chmod 755 $out/bin/disko 25 + wrapProgram $out/bin/disko --prefix PATH : ${lib.makeBinPath [ nix ]} 26 + ''; 27 + doInstallCheck = true; 28 + installCheckPhase = '' 29 + $out/bin/disko --help 30 + ''; 31 + meta = { 32 + homepage = "https://github.com/nix-community/disko"; 33 + description = "Declarative disk partitioning and formatting using nix"; 34 + license = lib.licenses.mit; 35 + mainProgram = "disko"; 36 + maintainers = with lib.maintainers; [ mic92 lassulus ]; 37 + platforms = lib.platforms.linux; 38 + }; 39 + })
+2 -2
pkgs/desktops/pantheon/third-party/pantheon-tweaks/default.nix
··· 14 14 15 15 stdenv.mkDerivation rec { 16 16 pname = "pantheon-tweaks"; 17 - version = "1.1.1"; 17 + version = "1.1.2"; 18 18 19 19 src = fetchFromGitHub { 20 20 owner = "pantheon-tweaks"; 21 21 repo = pname; 22 22 rev = version; 23 - sha256 = "sha256-KYnrQnh/Zz3EjMAqasdk2CZMXzw15txKtPm/K5+FzhI="; 23 + sha256 = "sha256-E9YSRfh9bLAHn2y4p3aKwR5NOtexKokLWj3RwtDnLsQ="; 24 24 }; 25 25 26 26 patches = [
+4
pkgs/development/compilers/llvm/common/lldb.nix
··· 159 159 ln -s $out/bin/*-vscode $out/share/vscode/extensions/llvm-org.lldb-vscode-0.1.0/bin 160 160 ''; 161 161 162 + passthru.vscodeExtName = "lldb-vscode"; 163 + passthru.vscodeExtPublisher = "llvm"; 164 + passthru.vscodeExtUniqueId = "llvm-org.lldb-vscode-0.1.0"; 165 + 162 166 meta = llvm_meta // { 163 167 homepage = "https://lldb.llvm.org/"; 164 168 description = "A next-generation high-performance debugger";
-16
pkgs/development/compilers/pakcs/curry-base.nix
··· 1 - { mkDerivation, base, Cabal, containers, directory, extra, filepath 2 - , mtl, parsec, pretty, lib, time, transformers 3 - }: 4 - mkDerivation { 5 - pname = "curry-base"; 6 - version = "1.1.0"; 7 - src = ./.; 8 - libraryHaskellDepends = [ 9 - base containers directory extra filepath mtl parsec pretty time 10 - transformers 11 - ]; 12 - testHaskellDepends = [ base Cabal filepath mtl ]; 13 - homepage = "http://curry-language.org"; 14 - description = "Functions for manipulating Curry programs"; 15 - license = lib.licenses.bsd3; 16 - }
+12 -10
pkgs/development/compilers/pakcs/curry-frontend.nix
··· 1 - { mkDerivation, base, bytestring, Cabal, containers, curry-base 2 - , directory, extra, file-embed, filepath, mtl, network-uri, pretty 3 - , process, set-extra, lib, template-haskell, transformers 1 + { mkDerivation, base, binary, bytestring, Cabal, containers 2 + , directory, extra, file-embed, filepath, lib, mtl, network-uri 3 + , parsec, pretty, process, set-extra, template-haskell, time 4 + , transformers 4 5 }: 5 6 mkDerivation { 6 7 pname = "curry-frontend"; 7 - version = "1.0.4"; 8 + version = "2.1.0"; 8 9 src = ./.; 9 10 isLibrary = true; 10 11 isExecutable = true; 11 12 enableSeparateDataOutput = true; 12 13 libraryHaskellDepends = [ 13 - base bytestring containers curry-base directory extra file-embed 14 - filepath mtl network-uri pretty process set-extra template-haskell 15 - transformers 14 + base binary bytestring containers directory extra file-embed 15 + filepath mtl network-uri parsec pretty process set-extra 16 + template-haskell time transformers 16 17 ]; 17 - executableHaskellDepends = [ 18 - base bytestring containers curry-base directory extra file-embed 18 + executableHaskellDepends = [ base ]; 19 + testHaskellDepends = [ 20 + base bytestring Cabal containers directory extra file-embed 19 21 filepath mtl network-uri pretty process set-extra template-haskell 20 22 transformers 21 23 ]; 22 - testHaskellDepends = [ base Cabal curry-base filepath ]; 23 24 homepage = "http://curry-language.org"; 24 25 description = "Compile the functional logic language Curry to several intermediate formats"; 25 26 license = lib.licenses.bsd3; 27 + mainProgram = "curry-frontend"; 26 28 }
+17 -22
pkgs/development/compilers/pakcs/default.nix
··· 5 5 6 6 let 7 7 pname = "pakcs"; 8 - version = "2.2.1"; 8 + version = "3.6.0"; 9 9 10 10 # Don't switch to "Current release" without a reason, because its 11 11 # source updates without version bump. Prefer last from "Older releases" instead. 12 12 src = fetchurl { 13 13 url = "https://www.informatik.uni-kiel.de/~pakcs/download/pakcs-${version}-src.tar.gz"; 14 - sha256 = "1jyg29j8r8pgcin7ixdya6c3zzfjdi66rghpwrfnkk133fz4iz7s"; 14 + hash = "sha256-1r6jEY3eEGESKcAepiziVbxpIvQLtCS6l0trBU3SGGo="; 15 15 }; 16 16 17 17 curry-frontend = (haskellPackages.override { 18 18 overrides = self: super: { 19 - curry-base = haskell.lib.compose.overrideCabal (drv: { 20 - inherit src; 21 - postUnpack = "sourceRoot+=/frontend/curry-base"; 22 - }) (super.callPackage ./curry-base.nix {}); 23 19 curry-frontend = haskell.lib.compose.overrideCabal (drv: { 24 20 inherit src; 25 - postUnpack = "sourceRoot+=/frontend/curry-frontend"; 26 - }) (super.callPackage ./curry-frontend.nix {}); 21 + postUnpack = "sourceRoot+=/frontend"; 22 + }) (super.callPackage ./curry-frontend.nix { }); 27 23 }; 28 24 }).curry-frontend; 25 + 29 26 in stdenv.mkDerivation { 30 27 inherit pname version src; 31 28 ··· 41 38 ]; 42 39 43 40 preConfigure = '' 44 - # Since we can't expand $out in `makeFlags` 45 - #makeFlags="$makeFlags PAKCSINSTALLDIR=$out/pakcs" 46 - 47 - for file in currytools/cpm/src/CPM/Repository.curry \ 48 - currytools/cpm/src/CPM/Repository/CacheDB.curry \ 49 - scripts/compile-all-libs.sh \ 50 - scripts/cleancurry.sh \ 51 - examples/test.sh testsuite/test.sh lib/test.sh; do 41 + for file in examples/test.sh \ 42 + currytools/optimize/Makefile \ 43 + testsuite/test.sh \ 44 + scripts/cleancurry.sh \ 45 + scripts/compile-all-libs.sh; do 52 46 substituteInPlace $file --replace "/bin/rm" "rm" 53 47 done 54 48 '' ; 55 49 56 - # cypm new: EXISTENCE ERROR: source_sink 57 - # "/tmp/nix-build-pakcs-2.0.2.drv-0/pakcs-2.0.2/currytools/cpm/templates/LICENSE" 58 - # does not exist 59 - buildPhase = '' 50 + preBuild = '' 60 51 mkdir -p $out/pakcs 61 52 cp -r * $out/pakcs 62 - (cd $out/pakcs ; make -j$NIX_BUILD_CORES $makeFlags) 53 + cd $out/pakcs 63 54 ''; 64 55 65 56 installPhase = '' 57 + runHook preInstall 58 + 66 59 ln -s $out/pakcs/bin $out 67 60 68 61 mkdir -p $out/share/emacs/site-lisp ··· 75 68 # List of dependencies from currytools/cpm/src/CPM/Main.curry 76 69 wrapProgram $out/pakcs/bin/cypm \ 77 70 --prefix PATH ":" "${lib.makeBinPath [ curl git unzip gnutar coreutils sqlite ]}" 71 + 72 + runHook postInstall 78 73 ''; 79 74 80 75 meta = with lib; { ··· 94 89 with dynamic web pages, prototyping embedded systems). 95 90 ''; 96 91 97 - maintainers = with maintainers; [ ]; 92 + maintainers = with maintainers; [ t4ccer ]; 98 93 platforms = platforms.linux; 99 94 }; 100 95 }
+3 -3
pkgs/development/interpreters/expr/default.nix
··· 5 5 6 6 buildGoModule rec { 7 7 pname = "expr"; 8 - version = "1.15.7"; 8 + version = "1.15.8"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "antonmedv"; 12 12 repo = "expr"; 13 13 rev = "v${version}"; 14 - hash = "sha256-dSZVReKQqQMKjVocqz6eoh8/+Yyf37egDf1tJ/JePJ0="; 14 + hash = "sha256-leZEP6RJv136z/bNc1S74tw+JQ3QD7NCMbo/Wo7q0ek="; 15 15 }; 16 16 17 17 sourceRoot = "${src.name}/repl"; 18 18 19 - vendorHash = "sha256-ioNXzEQLLpBWhVw4tnDnL/umkEoExHBTSj2WBjIl3PQ="; 19 + vendorHash = "sha256-Rs2tlno0vJo8FSdnnk3cxQCCxdByQD1jRzmePzMMfvs="; 20 20 21 21 ldflags = [ "-s" "-w" ]; 22 22
+1 -1
pkgs/development/interpreters/python/cpython/2.7/default.nix
··· 344 344 ''; 345 345 license = lib.licenses.psfl; 346 346 platforms = lib.platforms.all; 347 - maintainers = with lib.maintainers; [ fridh thiagokokada ]; 347 + maintainers = with lib.maintainers; [ fridh ]; 348 348 knownVulnerabilities = [ 349 349 "Python 2.7 has reached its end of life after 2020-01-01. See https://www.python.org/doc/sunset-python-2/." 350 350 # Quote: That means that we will not improve it anymore after that day,
+2 -10
pkgs/development/libraries/kpmcore/default.nix pkgs/applications/kde/kpmcore/default.nix
··· 1 - { stdenv 1 + { mkDerivation 2 2 , lib 3 - , fetchurl 4 3 , extra-cmake-modules 5 4 , qca-qt5 6 5 , kauth ··· 9 8 , util-linux 10 9 }: 11 10 12 - stdenv.mkDerivation rec { 11 + mkDerivation rec { 13 12 pname = "kpmcore"; 14 - # NOTE: When changing this version, also change the version of `partition-manager`. 15 - version = "23.04.1"; 16 - 17 - src = fetchurl { 18 - url = "mirror://kde/stable/release-service/${version}/src/${pname}-${version}.tar.xz"; 19 - hash = "sha256-NFIq8CZwYvpqDOOYLlBqoGdgfNPsyf15FkB3dToDCB8="; 20 - }; 21 13 22 14 patches = [ 23 15 ./nixostrustedprefix.patch
pkgs/development/libraries/kpmcore/nixostrustedprefix.patch pkgs/applications/kde/kpmcore/nixostrustedprefix.patch
+1 -1
pkgs/development/libraries/libsodium/default.nix
··· 21 21 url = "https://github.com/jedisct1/libsodium/commit/ffd1e374989197b44d815ac8b5d8f0b43b6ce534.patch"; 22 22 hash = "sha256-jG0VirIoFBwYmRx6zHSu2xe6pXYwbeqNVhPJxO6eJEY="; 23 23 }) 24 - ] ++ lib.optional stdenv.hostPlatform.isMinGW ./mingw-no-fortify.patch; 24 + ]; 25 25 26 26 nativeBuildInputs = [ autoreconfHook ]; 27 27
-15
pkgs/development/libraries/libsodium/mingw-no-fortify.patch
··· 1 - diff -Naur libsodium-1.0.18-orig/configure.ac libsodium-1.0.18/configure.ac 2 - --- libsodium-1.0.18-orig/configure.ac 2019-05-30 16:20:24.000000000 -0400 3 - +++ libsodium-1.0.18/configure.ac 2021-08-11 08:09:54.653907245 -0400 4 - @@ -217,11 +217,6 @@ 5 - 6 - AC_CHECK_DEFINE([__wasi__], [WASI="yes"], []) 7 - 8 - -AC_CHECK_DEFINE([_FORTIFY_SOURCE], [], [ 9 - - AX_CHECK_COMPILE_FLAG([-D_FORTIFY_SOURCE=2], 10 - - [CPPFLAGS="$CPPFLAGS -D_FORTIFY_SOURCE=2"]) 11 - -]) 12 - - 13 - AX_CHECK_COMPILE_FLAG([-fvisibility=hidden], 14 - [CFLAGS="$CFLAGS -fvisibility=hidden"]) 15 -
+56 -9
pkgs/development/libraries/pdal/default.nix
··· 1 - { lib, stdenv 1 + { lib 2 + , stdenv 3 + , callPackage 2 4 , fetchFromGitHub 3 - , fetchpatch 5 + , testers 6 + 7 + , enableE57 ? lib.meta.availableOn stdenv.hostPlatform libe57format 8 + 4 9 , cmake 5 - , pkg-config 6 - , openscenegraph 7 10 , curl 8 11 , gdal 9 12 , hdf5-cpp 10 13 , LASzip 11 - , enableE57 ? lib.meta.availableOn stdenv.hostPlatform libe57format 12 14 , libe57format 13 15 , libgeotiff 14 16 , libtiff 15 17 , libxml2 18 + , openscenegraph 19 + , pkg-config 16 20 , postgresql 17 21 , tiledb 18 22 , xercesc ··· 20 24 , zstd 21 25 }: 22 26 23 - stdenv.mkDerivation rec { 27 + stdenv.mkDerivation (finalAttrs: { 24 28 pname = "pdal"; 25 29 version = "2.5.6"; 26 30 27 31 src = fetchFromGitHub { 28 32 owner = "PDAL"; 29 33 repo = "PDAL"; 30 - rev = version; 34 + rev = finalAttrs.version; 31 35 sha256 = "sha256-JKwa89c05EfZ/FxOkj8lYmw0o2EgSqafRDIV2mTpZ5E="; 32 36 }; 33 37 ··· 37 41 ]; 38 42 39 43 buildInputs = [ 40 - openscenegraph 41 44 curl 42 45 gdal 43 46 hdf5-cpp ··· 45 48 libgeotiff 46 49 libtiff 47 50 libxml2 51 + openscenegraph 48 52 postgresql 49 53 tiledb 50 54 xercesc ··· 59 63 "-DBUILD_PLUGIN_HDF=ON" 60 64 "-DBUILD_PLUGIN_PGPOINTCLOUD=ON" 61 65 "-DBUILD_PLUGIN_TILEDB=ON" 66 + "-DWITH_TESTS=ON" 67 + "-DBUILD_PGPOINTCLOUD_TESTS=OFF" 62 68 63 69 # Plugins can probably not be made work easily: 64 70 "-DBUILD_PLUGIN_CPD=OFF" ··· 75 81 "-DBUILD_PLUGIN_RIVLIB=OFF" 76 82 ]; 77 83 84 + doCheck = true; 85 + 86 + disabledTests = [ 87 + # Tests failing due to TileDB library implementation, disabled also 88 + # by upstream CI. 89 + # See: https://github.com/PDAL/PDAL/blob/bc46bc77f595add4a6d568a1ff923d7fe20f7e74/.github/workflows/linux.yml#L81 90 + "pdal_io_tiledb_writer_test" 91 + "pdal_io_tiledb_reader_test" 92 + "pdal_io_tiledb_time_writer_test" 93 + "pdal_io_tiledb_time_reader_test" 94 + "pdal_io_tiledb_bit_fields_test" 95 + "pdal_io_e57_read_test" 96 + "pdal_io_e57_write_test" 97 + "pdal_io_stac_reader_test" 98 + 99 + # Segfault 100 + "pdal_io_hdf_reader_test" 101 + 102 + # Failure 103 + "pdal_app_plugin_test" 104 + ]; 105 + 106 + checkPhase = '' 107 + runHook preCheck 108 + # tests are flaky and they seem to fail less often when they don't run in 109 + # parallel 110 + ctest -j 1 --output-on-failure -E '^${lib.concatStringsSep "|" finalAttrs.disabledTests}$' 111 + runHook postCheck 112 + ''; 113 + 114 + passthru.tests = { 115 + version = testers.testVersion { 116 + package = finalAttrs.finalPackage; 117 + command = "pdal --version"; 118 + version = "pdal ${finalAttrs.finalPackage.version}"; 119 + }; 120 + pdal = callPackage ./tests.nix { pdal = finalAttrs.finalPackage; }; 121 + pkg-config = testers.testMetaPkgConfig finalAttrs.finalPackage; 122 + }; 123 + 78 124 meta = with lib; { 79 125 description = "PDAL is Point Data Abstraction Library. GDAL for point cloud data"; 80 126 homepage = "https://pdal.io"; 81 127 license = licenses.bsd3; 82 128 maintainers = teams.geospatial.members; 83 129 platforms = platforms.all; 130 + pkgConfigModules = [ "pdal" ]; 84 131 }; 85 - } 132 + })
+10
pkgs/development/libraries/pdal/tests.nix
··· 1 + { runCommand, pdal }: 2 + 3 + let 4 + inherit (pdal) pname; 5 + in 6 + runCommand "${pname}-tests" { meta.timeout = 60; } 7 + '' 8 + ${pdal}/bin/pdal --drivers 9 + touch $out 10 + ''
+3 -3
pkgs/development/python-modules/aiohappyeyeballs/default.nix
··· 19 19 20 20 buildPythonPackage rec { 21 21 pname = "aiohappyeyeballs"; 22 - version = "2.3.0"; 22 + version = "2.3.2"; 23 23 pyproject = true; 24 24 25 25 disabled = pythonOlder "3.10"; ··· 28 28 owner = "bdraco"; 29 29 repo = "aiohappyeyeballs"; 30 30 rev = "refs/tags/v${version}"; 31 - hash = "sha256-LMvELnN6Sy6DssXfH6fQ84N2rhdjqB8AlikTMidrjT4="; 31 + hash = "sha256-3Lj1eUDPoVCElrxowBhhrS0GCjD5qeUCiSB/gHoqC3Q="; 32 32 }; 33 33 34 34 outputs = [ ··· 71 71 meta = with lib; { 72 72 description = "Happy Eyeballs for pre-resolved hosts"; 73 73 homepage = "https://github.com/bdraco/aiohappyeyeballs"; 74 - changelog = "https://github.com/bdraco/aiohappyeyeballs/blob/${src.rev}/CHANGELOG.md"; 74 + changelog = "https://github.com/bdraco/aiohappyeyeballs/blob/v${version}/CHANGELOG.md"; 75 75 license = licenses.psfl; 76 76 maintainers = with maintainers; [ fab hexa ]; 77 77 };
+4 -4
pkgs/development/python-modules/aiowithings/default.nix
··· 1 1 { lib 2 2 , aiohttp 3 - , aresponses 3 + , aioresponses 4 4 , buildPythonPackage 5 5 , fetchFromGitHub 6 6 , poetry-core ··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "aiowithings"; 16 - version = "2.0.0"; 16 + version = "2.1.0"; 17 17 pyproject = true; 18 18 19 19 disabled = pythonOlder "3.11"; ··· 22 22 owner = "joostlek"; 23 23 repo = "python-withings"; 24 24 rev = "refs/tags/v${version}"; 25 - hash = "sha256-wVLoM1Lq1fchyjOOmn+6wVzEAra8x2uK6qaiocVqzmw="; 25 + hash = "sha256-+pIIVCR+QsW9M3pH9Ss3dMvkeKM1OdhQ1y+s/T6pHtk="; 26 26 }; 27 27 28 28 postPatch = '' ··· 40 40 ]; 41 41 42 42 nativeCheckInputs = [ 43 - aresponses 43 + aioresponses 44 44 pytest-asyncio 45 45 pytestCheckHook 46 46 syrupy
+53
pkgs/development/python-modules/pystatgrab/default.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , cython 4 + , fetchFromGitHub 5 + , libstatgrab 6 + , pkg-config 7 + , pythonOlder 8 + , setuptools 9 + , unittestCheckHook 10 + , wheel 11 + }: 12 + 13 + buildPythonPackage rec { 14 + pname = "pystatgrab"; 15 + version = "0.7.2"; 16 + pyproject = true; 17 + 18 + disabled = pythonOlder "3.7"; 19 + 20 + src = fetchFromGitHub { 21 + owner = "libstatgrab"; 22 + repo = "pystatgrab"; 23 + rev = "PYSTATGRAB_${lib.replaceStrings ["."] ["_"] version}"; 24 + hash = "sha256-0FDhkIK8jy3/SFmCzrl9l4RTeIKDjO0o5UoODx6Wnfs="; 25 + }; 26 + 27 + nativeBuildInputs = [ 28 + cython 29 + pkg-config 30 + setuptools 31 + wheel 32 + ]; 33 + 34 + buildInputs = [ 35 + libstatgrab 36 + ]; 37 + 38 + nativeCheckInputs = [ 39 + unittestCheckHook 40 + ]; 41 + 42 + pythonImportsCheck = [ 43 + "statgrab" 44 + ]; 45 + 46 + meta = with lib; { 47 + description = "Python bindings for libstatgrab"; 48 + homepage = "https://github.com/libstatgrab/pystatgrab"; 49 + changelog = "https://github.com/libstatgrab/pystatgrab/blob/PYSTATGRAB_${lib.replaceStrings ["."] ["_"] version}/NEWS"; 50 + license = licenses.lgpl21Only; 51 + maintainers = with maintainers; [ fab ]; 52 + }; 53 + }
+1 -1
pkgs/development/tools/clj-kondo/default.nix
··· 29 29 license = licenses.epl10; 30 30 changelog = 31 31 "https://github.com/clj-kondo/clj-kondo/blob/v${version}/CHANGELOG.md"; 32 - maintainers = with maintainers; [ jlesquembre bandresen thiagokokada ]; 32 + maintainers = with maintainers; [ jlesquembre bandresen ]; 33 33 }; 34 34 }
+5 -5
pkgs/development/tools/language-servers/lua-language-server/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, ninja, makeWrapper, CoreFoundation, Foundation, ditto }: 2 2 3 - stdenv.mkDerivation rec { 3 + stdenv.mkDerivation (finalAttrs: { 4 4 pname = "lua-language-server"; 5 - version = "3.7.3"; 5 + version = "3.7.4"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "luals"; 9 9 repo = "lua-language-server"; 10 - rev = version; 11 - hash = "sha256-iAxRGG7/zaUbJ/PWgmjxGS0UTq9/OXc8RWzlpUTUftc="; 10 + rev = finalAttrs.version; 11 + hash = "sha256-wJOOzKM2pgxfRqx5WZjOcCyRapz0Sub3AYm51LRYpFU="; 12 12 fetchSubmodules = true; 13 13 }; 14 14 ··· 89 89 mainProgram = "lua-language-server"; 90 90 platforms = platforms.linux ++ platforms.darwin; 91 91 }; 92 - } 92 + })
+19 -8
pkgs/development/tools/manifest-tool/default.nix
··· 9 9 10 10 buildGoModule rec { 11 11 pname = "manifest-tool"; 12 - version = "2.0.6"; 13 - gitCommit = "2ed9312726765567a84f2acc44a0c8a6e50f4b7a"; 12 + version = "2.1.5"; 14 13 modRoot = "v2"; 15 14 16 15 src = fetchFromGitHub { 17 16 owner = "estesp"; 18 17 repo = "manifest-tool"; 19 18 rev = "v${version}"; 20 - sha256 = "sha256-oopk++IdNF6msxOszT0fKxQABgWKbaQZ2aNH9chqWU0="; 19 + hash = "sha256-TCR8A35oETAZszrZFtNZulzCsh9UwGueTyHyYe+JQeI="; 21 20 leaveDotGit = true; 22 21 postFetch = '' 23 22 git -C $out rev-parse HEAD > $out/.git-revision ··· 29 28 30 29 nativeBuildInputs = [ git ]; 31 30 31 + ldflags = [ 32 + "-s" 33 + "-w" 34 + "-X main.version=${version}" 35 + ] ++ lib.optionals stdenv.hostPlatform.isStatic [ 36 + "-linkmode=external" 37 + "-extldflags" 38 + "-static" 39 + ]; 40 + 32 41 preConfigure = '' 33 - ldflags="-X main.gitCommit=$(cat .git-revision)" 42 + export ldflags+=" -X main.gitCommit=$(cat .git-revision)" 34 43 ''; 35 44 36 - CGO_ENABLED = if stdenv.hostPlatform.isStatic then "0" else "1"; 37 - GO_EXTLINK_ENABLED = if stdenv.hostPlatform.isStatic then "0" else "1"; 38 - ldflags = lib.optionals stdenv.hostPlatform.isStatic [ "-w" "-extldflags" "-static" ]; 39 - tags = lib.optionals stdenv.hostPlatform.isStatic [ "netgo" ]; 45 + tags = lib.optionals stdenv.hostPlatform.isStatic [ 46 + "cgo" 47 + "netgo" 48 + "osusergo" 49 + "static_build" 50 + ]; 40 51 41 52 passthru.tests.version = testers.testVersion { 42 53 package = manifest-tool;
+16 -16
pkgs/development/tools/misc/blackfire/php-probe.nix
··· 14 14 let 15 15 phpMajor = lib.versions.majorMinor php.version; 16 16 17 - version = "1.92.5"; 17 + version = "1.92.6"; 18 18 19 19 hashes = { 20 20 "x86_64-linux" = { 21 21 system = "amd64"; 22 22 hash = { 23 - "8.1" = "sha256-DT1ETsJGOebC0kt4zKiSMu/wF0TG2zUiNNh+Giokjz4="; 24 - "8.2" = "sha256-X/inhHAA34aQSycoSzT28jfntH3QTZgHPId5zYgcWT4="; 25 - "8.3" = "sha256-SHR+J+yFA2YxggdNPq2HtLkh9I3bG01TMk9EUKGkRM0="; 23 + "8.1" = "sha256-ygBgs6tGZyim69tCol+tTXV5Lt/JLuatmKAo9aomM1s="; 24 + "8.2" = "sha256-TrT7H2Tbu4ZrfeCUjpqlTMw9DAxS62aLvzTbpAdsZOc="; 25 + "8.3" = "sha256-AH/kYlpVjCwXxNa90Qe5XpzAdSyNn9jdeyYTLlXxfLI="; 26 26 }; 27 27 }; 28 28 "i686-linux" = { 29 29 system = "i386"; 30 30 hash = { 31 - "8.1" = "sha256-7aDO6shHWIAgby8qCwpc7aICnWyYvferqjDgtnYZCeI="; 32 - "8.2" = "sha256-mpHS9zUjgJnxvi3np2sUS0GhtOjhDOzlepRByYbjUCk="; 33 - "8.3" = "sha256-75C9NwMuUTNuAfdPRgtq4XK6bqo/IRa/SXfM7Wz2y90="; 31 + "8.1" = "sha256-c1i6eq7l4LeUpuZCsYzS1N++IU4j0WydCxPokSJf6dI="; 32 + "8.2" = "sha256-gWhyUQ3QP13klusSv7KWdHatnjy/4k17VvHJUCtqF1g="; 33 + "8.3" = "sha256-kI3sVcI/bDVRMcjzPzlai1D2HvmBTXwQ3DF5zcp2GJk="; 34 34 }; 35 35 }; 36 36 "aarch64-linux" = { 37 37 system = "arm64"; 38 38 hash = { 39 - "8.1" = "sha256-Vj2rnKik+Fy+9yfbUMSOoiXTGm84YNPo1cfh9hojr9c="; 40 - "8.2" = "sha256-lvWwwKJj3/ZxAQcnbcjv/0CLqDDRiOkFo2rJeMhZLHQ="; 41 - "8.3" = "sha256-yqa5GE/FBINR3oFNTP1IZGnhSDYCfluRiEFiTSySjns="; 39 + "8.1" = "sha256-1QPKTNOsJTrx+Q0MigiMBDCC7X3YlSDB33gy8DU9KBg="; 40 + "8.2" = "sha256-e3YUAOLWSmsiHczb44oRiOIafMSBWQaJY+m4OSUMzV8="; 41 + "8.3" = "sha256-h0/ZEy6IkIpAfeL0Al7a+FpPeX2KMSd7zD1i1ew5rUk="; 42 42 }; 43 43 }; 44 44 "aarch64-darwin" = { 45 45 system = "arm64"; 46 46 hash = { 47 - "8.1" = "sha256-OcQtr16Qt6TsxPBG3OY/viGXqknKx5GdM/fcCJlFiaY="; 48 - "8.2" = "sha256-ay/6JwB959bT2f18LGMB5560dIPAPSAY5Nby44FGBMc="; 49 - "8.3" = "sha256-7yyhcusin7pLYZqjUgyIkDGmufIPX8cKWqplXetZzMU="; 47 + "8.1" = "sha256-gLCPTTCfoBgp3GgKzVisfGlxQsYa+4x2WDwvhwcf1R8="; 48 + "8.2" = "sha256-OtWUwkeLGfxkxjGSDMyv61UVoSwFo1puGjmwYOB51nI="; 49 + "8.3" = "sha256-M3lz0TnTuJVgD32RS3ffcZsKVJdyx75AjSKFkkODiSE="; 50 50 }; 51 51 }; 52 52 "x86_64-darwin" = { 53 53 system = "amd64"; 54 54 hash = { 55 - "8.1" = "sha256-l0xgj0tAjYNI0EwoZhnGpRadg5EJtBlt5WhylmZaGDg="; 56 - "8.2" = "sha256-lD6lE6u9nzHhHPTPLoGKaDsZlvrpbshd+4fr4ua8H8c="; 57 - "8.3" = "sha256-CMPv+pDPJVwQ4gDAnQxyeJXp4YYkwAVoSdS3a+49fDU="; 55 + "8.1" = "sha256-dVau4kieQsj4m97Sepw1jMRtf1VCUnvZEJjVsO+hFWs="; 56 + "8.2" = "sha256-HRBVr4JTiZDRzIt6JfITD5N824Ivcag6DUyEhsc23co="; 57 + "8.3" = "sha256-nRRG42/Yhsupln4j7nWlKvfQ067fwQ17un1yXplPf14="; 58 58 }; 59 59 }; 60 60 };
+3 -3
pkgs/development/tools/rust/cargo-careful/default.nix
··· 5 5 6 6 rustPlatform.buildRustPackage rec { 7 7 pname = "cargo-careful"; 8 - version = "0.4.0"; 8 + version = "0.4.1"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "RalfJung"; 12 12 repo = "cargo-careful"; 13 13 rev = "v${version}"; 14 - hash = "sha256-5FteKVlEx5NSj3lzRRj3qerkyK+UdJfTWtG6xEzI4t4="; 14 + hash = "sha256-oiwR6NgHHu9B1L6dSK6KZfgcSdwBPEzUZONwPHr0a4k="; 15 15 }; 16 16 17 - cargoHash = "sha256-gs8o+tWvC4cgIITpfvJqfTquyYaEbvNMeZEJKFzd83I="; 17 + cargoHash = "sha256-sVIAY9eYlpyS/PU6kLInc4hMeD3qcewoMbTH+wTIBuI="; 18 18 19 19 meta = with lib; { 20 20 description = "A tool to execute Rust code carefully, with extra checking along the way";
+4 -4
pkgs/games/anki/bin.nix
··· 3 3 let 4 4 pname = "anki-bin"; 5 5 # Update hashes for both Linux and Darwin! 6 - version = "23.10.1"; 6 + version = "23.12.1"; 7 7 8 8 sources = { 9 9 linux = fetchurl { 10 10 url = "https://github.com/ankitects/anki/releases/download/${version}/anki-${version}-linux-qt6.tar.zst"; 11 - sha256 = "sha256-Kv0SH+bLnBSM/tYHe2kEJc4n7izZTBNWQs2nm/teLEU="; 11 + sha256 = "sha256-bFtAUqSoFS8CWESiepWXywndkijATbWp6CJdqlQecuk="; 12 12 }; 13 13 14 14 # For some reason anki distributes completely separate dmg-files for the aarch64 version and the x86_64 version 15 15 darwin-x86_64 = fetchurl { 16 16 url = "https://github.com/ankitects/anki/releases/download/${version}/anki-${version}-mac-intel-qt6.dmg"; 17 - sha256 = "sha256-MSlKsEv4N/H7G1bUOBlPBXerpHIW32P6Va02aRq1+54="; 17 + sha256 = "sha256-z48REB14p7rb50ty9u/26wx0sY4QZb4pj6wOXsSBCdg="; 18 18 }; 19 19 darwin-aarch64 = fetchurl { 20 20 url = "https://github.com/ankitects/anki/releases/download/${version}/anki-${version}-mac-apple-qt6.dmg"; 21 - sha256 = "sha256-jEm9WJBXx77KpldzBuxK1Pu6VGiARZPnRmMhEjZdm1I="; 21 + sha256 = "sha256-bdaCqSjje86wmVKIFZqzuFaEZ7SWQr7CAS/Hm1CpOMg="; 22 22 }; 23 23 }; 24 24
+1 -1
pkgs/os-specific/linux/amdctl/default.nix
··· 26 26 description = "Set P-State voltages and clock speeds on recent AMD CPUs on Linux."; 27 27 homepage = "https://github.com/kevinlekiller/amdctl"; 28 28 license = licenses.gpl3Plus; 29 - maintainers = with maintainers; [ thiagokokada ]; 29 + maintainers = with maintainers; [ ]; 30 30 platforms = [ "x86_64-linux" ]; 31 31 }; 32 32 }
+25 -11
pkgs/os-specific/linux/kernel/README.md
··· 4 4 5 5 2. Add the new kernel to the `kernels` attribute set in [`linux-kernels.nix`](./linux-kernels.nix) (e.g., create an attribute `kernel_2_6_22`). 6 6 7 - 3. Update the kernel configuration. First unpack the kernel. Then for each supported platform (`i686`, `x86_64`, `uml`) do the following: 7 + 3. Update the kernel configuration: 8 8 9 - 1. Make a copy from the old config (e.g., `config-2.6.21-i686-smp`) to the new one (e.g., `config-2.6.22-i686-smp`). 9 + 1. While in the Nixpkgs repository, enter the development shell for that kernel: 10 10 11 - 2. Copy the config file for this platform (e.g., `config-2.6.22-i686-smp`) to `.config` in the kernel source tree. 11 + ```console 12 + $ nix-shell -A linuxKernel.kernels.linux_2_6_22 13 + ``` 12 14 13 - 3. Run `make oldconfig ARCH={i386,x86_64,um}` and answer all questions. (For the uml configuration, also add `SHELL=bash`.) Make sure to keep the configuration consistent between platforms (i.e., don’t enable some feature on `i686` and disable it on `x86_64`). 15 + 2. Unpack the kernel: 14 16 15 - 4. If needed, you can also run `make menuconfig`: 17 + ```console 18 + [nix-shell]$ pushd $(mktemp -d) 19 + [nix-shell]$ unpackPhase 20 + ``` 16 21 17 - ```ShellSession 18 - $ nix-env -f "<nixpkgs>" -iA ncurses 19 - $ export NIX_CFLAGS_LINK=-lncurses 20 - $ make menuconfig ARCH=arch 21 - ``` 22 + 3. For each supported platform (`i686`, `x86_64`, `uml`) do the following: 23 + 24 + 1. Make a copy from the old config (e.g., `config-2.6.21-i686-smp`) to the new one (e.g., `config-2.6.22-i686-smp`). 25 + 26 + 2. Copy the config file for this platform (e.g., `config-2.6.22-i686-smp`) to `.config` in the unpacked kernel source tree. 22 27 23 - 5. Copy `.config` over the new config file (e.g., `config-2.6.22-i686-smp`). 28 + 3. Run `make oldconfig ARCH={i386,x86_64,um}` and answer all questions. (For the uml configuration, also add `SHELL=bash`.) Make sure to keep the configuration consistent between platforms (i.e., don’t enable some feature on `i686` and disable it on `x86_64`). 29 + 30 + 4. If needed, you can also run `make menuconfig`: 31 + 32 + ```ShellSession 33 + $ nix-shell -p ncurses pkg-config 34 + $ make menuconfig ARCH=arch 35 + ``` 36 + 37 + 5. Copy `.config` over the new config file (e.g., `config-2.6.22-i686-smp`). 24 38 25 39 4. Test building the kernel: 26 40
+4
pkgs/os-specific/linux/kernel/kernels-org.json
··· 30 30 "6.6": { 31 31 "version": "6.6.10", 32 32 "hash": "sha256:0v2l0l90w7scv7bxkxxjgqnay0fjh678k9gdlgycgbh9q7j2grly" 33 + }, 34 + "6.7": { 35 + "version": "6.7", 36 + "hash": "sha256:0s8hbcsg7fdvspqam8kzcxygjsznr4zfi60nqgc81l3n4m518cgg" 33 37 } 34 38 }
+2 -3
pkgs/os-specific/linux/kmod-blacklist-ubuntu/default.nix
··· 1 1 { lib, stdenv, fetchurl }: 2 2 3 3 let 4 - version = "28-1ubuntu4"; # impish 2021-06-24 4 + version = "30+20230519-1ubuntu3"; # mantic 2023-08-26 5 5 6 6 in stdenv.mkDerivation { 7 7 pname = "kmod-blacklist"; ··· 9 9 10 10 src = fetchurl { 11 11 url = "https://launchpad.net/ubuntu/+archive/primary/+files/kmod_${version}.debian.tar.xz"; 12 - sha256 = "sha256-K8tWpaLmCm3Jcxw3OZ+D7Koiug7epooRn1YMfqjGAiw="; 12 + hash = "sha256-VGw1/rUjl9/j6026ut0dvC0/8maAAz8umb0D3YGf8p4="; 13 13 }; 14 14 15 15 installPhase = '' ··· 22 22 done 23 23 24 24 substituteInPlace "$out"/modprobe.conf \ 25 - --replace "blacklist bochs-drm" "" \ 26 25 --replace /sbin/lsmod /run/booted-system/sw/bin/lsmod \ 27 26 --replace /sbin/rmmod /run/booted-system/sw/bin/rmmod \ 28 27 --replace /sbin/modprobe /run/booted-system/sw/bin/modprobe \
+4 -5
pkgs/os-specific/linux/kmod-debian-aliases/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "kmod-debian-aliases.conf"; 5 - version = "22-1.1"; 5 + version = "30+20230601-2"; 6 6 7 7 src = fetchurl { 8 - url = "https://snapshot.debian.org/archive/debian/20160404T220610Z/pool/main/k/kmod/kmod_${version}.debian.tar.xz"; 9 - sha256 = "0daap2n4bvjqcnksaayy6csmdb1px4r02w3xp36bcp6w3lbnqamh"; 8 + url = "https://snapshot.debian.org/archive/debian/20231117T085632Z/pool/main/k/kmod/kmod_${version}.debian.tar.xz"; 9 + hash = "sha256-xJMGKht8hu0aQjN9TER87Rv5EYkVMeDfX/jJ8+UjAqM="; 10 10 }; 11 11 12 12 installPhase = '' 13 - patch -i patches/aliases_conf 14 - cp aliases.conf $out 13 + cp extra/aliases.conf $out 15 14 ''; 16 15 17 16 meta = with lib; {
+1 -1
pkgs/tools/archivers/unar/default.nix
··· 94 94 ADF, DMS, LZX, PowerPacker, LBR, Squeeze, Crunch, and other old formats. 95 95 ''; 96 96 license = licenses.lgpl21Plus; 97 - maintainers = with maintainers; [ peterhoeg thiagokokada ]; 97 + maintainers = with maintainers; [ peterhoeg ]; 98 98 platforms = platforms.unix; 99 99 }; 100 100 }
+3 -3
pkgs/tools/misc/dua/default.nix
··· 7 7 8 8 rustPlatform.buildRustPackage rec { 9 9 pname = "dua"; 10 - version = "2.24.2"; 10 + version = "2.26.0"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "Byron"; 14 14 repo = "dua-cli"; 15 15 rev = "v${version}"; 16 - hash = "sha256-1rGzgKusUKlkH/Ew8qDzq143mu+gvSlXTcqL+I+ypSY="; 16 + hash = "sha256-+7pf87mmT5KB4KtKzZXYnV6GwMzb6ieXjBVZpvmQ3eU="; 17 17 # Remove unicode file names which leads to different checksums on HFS+ 18 18 # vs. other filesystems because of unicode normalisation. 19 19 postFetch = '' ··· 21 21 ''; 22 22 }; 23 23 24 - cargoHash = "sha256-+GHVZNuEpOxu29EuHOshrYyhg1HFcYJjC4MnFJgjw38="; 24 + cargoHash = "sha256-5n6zjuoL5v3ieP8eOzvyJf/YDmQ+MuGMk3T/8rHKQVE="; 25 25 26 26 buildInputs = lib.optionals stdenv.isDarwin [ 27 27 darwin.apple_sdk.frameworks.Foundation
+1 -8
pkgs/tools/misc/partition-manager/default.nix pkgs/applications/kde/partitionmanager/default.nix
··· 65 65 ]; 66 66 67 67 in 68 - mkDerivation rec { 68 + mkDerivation { 69 69 pname = "partitionmanager"; 70 - # NOTE: When changing this version, also change the version of `kpmcore`. 71 - version = "23.04.1"; 72 - 73 - src = fetchurl { 74 - url = "mirror://kde/stable/release-service/${version}/src/${pname}-${version}.tar.xz"; 75 - hash = "sha256-iMf6/QOJIDTKHAsCg3ey4GX0QHwrYl2LcCWxZsolMl8="; 76 - }; 77 70 78 71 nativeBuildInputs = [ extra-cmake-modules kdoctools wrapGAppsHook ]; 79 72
+2 -2
pkgs/tools/security/mitmproxy2swagger/default.nix
··· 5 5 6 6 python3.pkgs.buildPythonApplication rec { 7 7 pname = "mitmproxy2swagger"; 8 - version = "0.11.0"; 8 + version = "0.13.0"; 9 9 format = "pyproject"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "alufers"; 13 13 repo = pname; 14 14 rev = "refs/tags/${version}"; 15 - hash = "sha256-NwU3GtnWL90gSCbPbGnkbLX/o77NZJ4t4xME8dhWEbA="; 15 + hash = "sha256-VHxqxee5sQWRS13V4SfY4LWaN0oxxWsNVDOEqUyKHfg="; 16 16 }; 17 17 18 18 nativeBuildInputs = with python3.pkgs; [
+1 -2
pkgs/tools/text/difftastic/Cargo.lock
··· 253 253 254 254 [[package]] 255 255 name = "difftastic" 256 - version = "0.53.1" 256 + version = "0.54.0" 257 257 dependencies = [ 258 258 "aho-corasick", 259 259 "assert_cmd", ··· 266 266 "hashbrown 0.12.3", 267 267 "humansize", 268 268 "ignore", 269 - "is-terminal", 270 269 "itertools 0.11.0", 271 270 "lazy_static", 272 271 "libc",
+2 -2
pkgs/tools/text/difftastic/default.nix
··· 17 17 18 18 rustPlatform.buildRustPackage rec { 19 19 pname = "difftastic"; 20 - version = "0.53.1"; 20 + version = "0.54.0"; 21 21 22 22 src = fetchFromGitHub { 23 23 owner = "wilfred"; 24 24 repo = pname; 25 25 rev = version; 26 - hash = "sha256-D//LMfwk2n5jGOXhix2jZyoppYMxVkTkg4HuNHCtHNI="; 26 + hash = "sha256-1QnDBRhJGzKKMmvnwVoi8rTd6acBFO0hITF9d1HkizM="; 27 27 }; 28 28 29 29 cargoLock = {
+1 -1
pkgs/tools/virtualization/guestfs-tools/default.nix
··· 111 111 description = "Extra tools for accessing and modifying virtual machine disk images"; 112 112 license = with licenses; [ gpl2Plus lgpl21Plus ]; 113 113 homepage = "https://libguestfs.org/"; 114 - maintainers = with maintainers; [ thiagokokada ]; 114 + maintainers = with maintainers; [ ]; 115 115 platforms = platforms.linux; 116 116 }; 117 117 }
+1 -1
pkgs/tools/wayland/wl-clip-persist/default.nix
··· 35 35 inherit (wayland.meta) platforms; 36 36 license = licenses.mit; 37 37 mainProgram = "wl-clip-persist"; 38 - maintainers = with maintainers; [ thiagokokada ]; 38 + maintainers = with maintainers; [ ]; 39 39 }; 40 40 }
+1
pkgs/top-level/aliases.nix
··· 759 759 paperless-ng = paperless-ngx; # Added 2022-04-11 760 760 paper-note = throw "paper-note has been removed: abandoned by upstream"; # Added 2023-05-03 761 761 parity = openethereum; # Added 2020-08-01 762 + partition-manager = libsForQt5.partitionmanager; # Added 2024-01-08 762 763 pash = throw "'pash' has been removed: abandoned by upstream. Use 'powershell' instead"; # Added 2023-09-16 763 764 pcsctools = pcsc-tools; # Added 2023-12-07 764 765 pdf2xml = throw "'pdf2xml' was removed: abandoned for years."; # Added 2023-10-22
-2
pkgs/top-level/all-packages.nix
··· 9863 9863 9864 9864 krakenx = callPackage ../tools/system/krakenx { }; 9865 9865 9866 - partition-manager = libsForQt5.callPackage ../tools/misc/partition-manager { }; 9867 - 9868 9866 kpcli = callPackage ../tools/security/kpcli { }; 9869 9867 9870 9868 kphotoalbum = libsForQt5.callPackage ../applications/graphics/kphotoalbum { };
+10 -1
pkgs/top-level/linux-kernels.nix
··· 185 185 ]; 186 186 }; 187 187 188 + linux_6_7 = callPackage ../os-specific/linux/kernel/mainline.nix { 189 + branch = "6.7"; 190 + kernelPatches = [ 191 + kernelPatches.bridge_stp_helper 192 + kernelPatches.request_key_helper 193 + ]; 194 + }; 195 + 188 196 linux_testing = let 189 197 testing = callPackage ../os-specific/linux/kernel/mainline.nix { 190 198 # A special branch that tracks the kernel under the release process ··· 586 594 linux_6_1 = recurseIntoAttrs (packagesFor kernels.linux_6_1); 587 595 linux_6_5 = recurseIntoAttrs (packagesFor kernels.linux_6_5); 588 596 linux_6_6 = recurseIntoAttrs (packagesFor kernels.linux_6_6); 597 + linux_6_7 = recurseIntoAttrs (packagesFor kernels.linux_6_7); 589 598 __attrsFailEvaluation = true; 590 599 } // lib.optionalAttrs config.allowAliases { 591 600 linux_4_9 = throw "linux 4.9 was removed because it will reach its end of life within 22.11"; # Added 2022-11-08 ··· 650 659 packageAliases = { 651 660 linux_default = packages.linux_6_1; 652 661 # Update this when adding the newest kernel major version! 653 - linux_latest = packages.linux_6_6; 662 + linux_latest = packages.linux_6_7; 654 663 linux_mptcp = throw "'linux_mptcp' has been moved to https://github.com/teto/mptcp-flake"; 655 664 linux_rt_default = packages.linux_rt_5_4; 656 665 linux_rt_latest = packages.linux_rt_6_1;
+2
pkgs/top-level/python-packages.nix
··· 11321 11321 11322 11322 pystardict = callPackage ../development/python-modules/pystardict { }; 11323 11323 11324 + pystatgrab = callPackage ../development/python-modules/pystatgrab { }; 11325 + 11324 11326 pystemd = callPackage ../development/python-modules/pystemd { 11325 11327 inherit (pkgs) systemd; 11326 11328 };
-2
pkgs/top-level/qt5-packages.nix
··· 168 168 169 169 libqaccessibilityclient = callPackage ../development/libraries/libqaccessibilityclient { }; 170 170 171 - kpmcore = callPackage ../development/libraries/kpmcore { }; 172 - 173 171 mapbox-gl-native = libsForQt5.callPackage ../development/libraries/mapbox-gl-native { }; 174 172 175 173 mapbox-gl-qml = libsForQt5.callPackage ../development/libraries/mapbox-gl-qml { };
+1
pkgs/top-level/release-haskell.nix
··· 333 333 nota 334 334 nvfetcher 335 335 ormolu 336 + pakcs 336 337 pandoc 337 338 petrinizer 338 339 place-cursor-at
-4
pkgs/top-level/release.nix
··· 158 158 jobs.tests.cc-wrapper.llvmPackages.libcxx.x86_64-linux 159 159 jobs.tests.cc-wrapper.llvmPackages_6.clang.x86_64-linux 160 160 jobs.tests.cc-wrapper.llvmPackages_6.libcxx.x86_64-linux 161 - jobs.tests.cc-wrapper.llvmPackages_7.clang.x86_64-linux 162 - jobs.tests.cc-wrapper.llvmPackages_7.libcxx.x86_64-linux 163 - jobs.tests.cc-wrapper.llvmPackages_7.clang.x86_64-linux 164 - jobs.tests.cc-wrapper.llvmPackages_7.libcxx.x86_64-linux 165 161 jobs.tests.cc-multilib-gcc.x86_64-linux 166 162 jobs.tests.cc-multilib-clang.x86_64-linux 167 163 jobs.tests.stdenv-inputs.x86_64-linux