Merge remote-tracking branch 'origin/master' into staging-next

Conflicts:
- pkgs/development/python-modules/aiohappyeyeballs/default.nix

+557 -395
+1 -1
nixos/modules/programs/partition-manager.nix
··· 14 config = mkIf config.programs.partition-manager.enable { 15 services.dbus.packages = [ pkgs.libsForQt5.kpmcore ]; 16 # `kpmcore` need to be installed to pull in polkit actions. 17 - environment.systemPackages = [ pkgs.libsForQt5.kpmcore pkgs.partition-manager ]; 18 }; 19 }
··· 14 config = mkIf config.programs.partition-manager.enable { 15 services.dbus.packages = [ pkgs.libsForQt5.kpmcore ]; 16 # `kpmcore` need to be installed to pull in polkit actions. 17 + environment.systemPackages = [ pkgs.libsForQt5.kpmcore pkgs.libsForQt5.partitionmanager ]; 18 }; 19 }
+2 -2
nixos/modules/tasks/filesystems/bcachefs.nix
··· 123 inherit assertions; 124 # needed for systemd-remount-fs 125 system.fsPackages = [ pkgs.bcachefs-tools ]; 126 - # FIXME: Replace this with `linuxPackages_latest` when 6.7 is released, remove this line when the LTS version is at least 6.7 127 - boot.kernelPackages = lib.mkDefault pkgs.linuxPackages_testing; 128 systemd.services = lib.mapAttrs' (mkUnits "") (lib.filterAttrs (n: fs: (fs.fsType == "bcachefs") && (!utils.fsNeededForBoot fs)) config.fileSystems); 129 } 130
··· 123 inherit assertions; 124 # needed for systemd-remount-fs 125 system.fsPackages = [ pkgs.bcachefs-tools ]; 126 + # FIXME: Remove this line when the default kernel has bcachefs 127 + boot.kernelPackages = lib.mkDefault pkgs.linuxPackages_latest; 128 systemd.services = lib.mapAttrs' (mkUnits "") (lib.filterAttrs (n: fs: (fs.fsType == "bcachefs") && (!utils.fsNeededForBoot fs)) config.fileSystems); 129 } 130
+2 -2
pkgs/applications/audio/tidal-hifi/default.nix
··· 36 37 stdenv.mkDerivation (finalAttrs: { 38 pname = "tidal-hifi"; 39 - version = "5.7.1"; 40 41 src = fetchurl { 42 url = "https://github.com/Mastermindzh/tidal-hifi/releases/download/${finalAttrs.version}/tidal-hifi_${finalAttrs.version}_amd64.deb"; 43 - sha256 = "sha256-7wBQgoglLS67aiQsF9iUeFoJDDqq0fJgu5BSyH+HI7M="; 44 }; 45 46 nativeBuildInputs = [ autoPatchelfHook dpkg makeWrapper ];
··· 36 37 stdenv.mkDerivation (finalAttrs: { 38 pname = "tidal-hifi"; 39 + version = "5.8.0"; 40 41 src = fetchurl { 42 url = "https://github.com/Mastermindzh/tidal-hifi/releases/download/${finalAttrs.version}/tidal-hifi_${finalAttrs.version}_amd64.deb"; 43 + sha256 = "sha256-g3CDoFeXGLj/bG0WP8fCF/uphqEHfKA/wmfQfjk52aM="; 44 }; 45 46 nativeBuildInputs = [ autoPatchelfHook dpkg makeWrapper ];
+2 -2
pkgs/applications/editors/vscode/extensions/default.nix
··· 7 , nodePackages 8 , python3Packages 9 , jdk 10 - , llvmPackages_8 11 , llvmPackages_14 12 , nixpkgs-fmt 13 , protobuf ··· 2162 }; 2163 }; 2164 2165 - llvm-org.lldb-vscode = llvmPackages_8.lldb; 2166 2167 llvm-vs-code-extensions.vscode-clangd = buildVscodeMarketplaceExtension { 2168 mktplcRef = {
··· 7 , nodePackages 8 , python3Packages 9 , jdk 10 + , llvmPackages 11 , llvmPackages_14 12 , nixpkgs-fmt 13 , protobuf ··· 2162 }; 2163 }; 2164 2165 + llvm-org.lldb-vscode = llvmPackages.lldb; 2166 2167 llvm-vs-code-extensions.vscode-clangd = buildVscodeMarketplaceExtension { 2168 mktplcRef = {
+2
pkgs/applications/kde/default.nix
··· 187 kpat = callPackage ./kpat.nix {}; 188 kpimtextedit = callPackage ./kpimtextedit.nix {}; 189 kpkpass = callPackage ./kpkpass.nix {}; 190 kpublictransport = callPackage ./kpublictransport.nix {}; 191 kqtquickcharts = callPackage ./kqtquickcharts.nix {}; 192 krdc = callPackage ./krdc.nix {}; ··· 230 minuet = callPackage ./minuet.nix {}; 231 okular = callPackage ./okular.nix {}; 232 palapeli = callPackage ./palapeli.nix {}; 233 picmi = callPackage ./picmi.nix {}; 234 pim-data-exporter = callPackage ./pim-data-exporter.nix {}; 235 pim-sieve-editor = callPackage ./pim-sieve-editor.nix {};
··· 187 kpat = callPackage ./kpat.nix {}; 188 kpimtextedit = callPackage ./kpimtextedit.nix {}; 189 kpkpass = callPackage ./kpkpass.nix {}; 190 + kpmcore = callPackage ./kpmcore {}; 191 kpublictransport = callPackage ./kpublictransport.nix {}; 192 kqtquickcharts = callPackage ./kqtquickcharts.nix {}; 193 krdc = callPackage ./krdc.nix {}; ··· 231 minuet = callPackage ./minuet.nix {}; 232 okular = callPackage ./okular.nix {}; 233 palapeli = callPackage ./palapeli.nix {}; 234 + partitionmanager = callPackage ./partitionmanager {}; 235 picmi = callPackage ./picmi.nix {}; 236 pim-data-exporter = callPackage ./pim-data-exporter.nix {}; 237 pim-sieve-editor = callPackage ./pim-sieve-editor.nix {};
+3 -3
pkgs/applications/terminal-emulators/rio/default.nix
··· 51 in 52 rustPlatform.buildRustPackage rec { 53 pname = "rio"; 54 - version = "0.0.33"; 55 56 src = fetchFromGitHub { 57 owner = "raphamorim"; 58 repo = "rio"; 59 rev = "v${version}"; 60 - hash = "sha256-/SpSOcxuEL2vsqbZAqbjTgnLhcyr0/ckfvcI1nwkWFg="; 61 }; 62 63 - cargoHash = "sha256-hXO/hdHmYjbwR3Ae5VV/HB1SVp/jhY05fIxi04n7X/Y="; 64 65 nativeBuildInputs = [ 66 ncurses
··· 51 in 52 rustPlatform.buildRustPackage rec { 53 pname = "rio"; 54 + version = "0.0.34"; 55 56 src = fetchFromGitHub { 57 owner = "raphamorim"; 58 repo = "rio"; 59 rev = "v${version}"; 60 + hash = "sha256-UHA2j7NOPBl7qrCu5bWLHjpVgWxlydtj0F7lfAlQZXg="; 61 }; 62 63 + cargoHash = "sha256-xqLticREnGxsuo2d7d3VaFWbGJ5A1L7GvDwV7qQ61xs="; 64 65 nativeBuildInputs = [ 66 ncurses
+1 -1
pkgs/applications/version-management/gittyup/default.nix
··· 71 description = "A graphical Git client designed to help you understand and manage your source code history"; 72 homepage = "https://murmele.github.io/Gittyup"; 73 license = with licenses; [ mit ]; 74 - maintainers = with maintainers; [ thiagokokada ]; 75 platforms = platforms.unix; 76 broken = stdenv.isDarwin; 77 };
··· 71 description = "A graphical Git client designed to help you understand and manage your source code history"; 72 homepage = "https://murmele.github.io/Gittyup"; 73 license = with licenses; [ mit ]; 74 + maintainers = with maintainers; [ ]; 75 platforms = platforms.unix; 76 broken = stdenv.isDarwin; 77 };
+227 -202
pkgs/build-support/trivial-builders/default.nix
··· 9 10 rec { 11 12 - /* Run the shell command `buildCommand' to produce a store path named 13 - `name'. The attributes in `env' are added to the environment 14 - prior to running the command. By default `runCommand` runs in a 15 - stdenv with no compiler environment. `runCommandCC` uses the default 16 - stdenv, `pkgs.stdenv`. 17 18 - Example: 19 20 21 - runCommand "name" {envVariable = true;} ''echo hello > $out'' 22 - runCommandCC "name" {} ''gcc -o myfile myfile.c; cp myfile $out''; 23 24 25 - The `*Local` variants force a derivation to be built locally, 26 - it is not substituted. 27 28 - This is intended for very cheap commands (<1s execution time). 29 - It saves on the network roundrip and can speed up a build. 30 31 - It is the same as adding the special fields 32 33 - `preferLocalBuild = true;` 34 - `allowSubstitutes = false;` 35 36 - to a derivation’s attributes. 37 */ 38 runCommand = name: env: runCommandWith { 39 stdenv = stdenvNoCC; ··· 57 # `runCommandCCLocal` left out on purpose. 58 # We shouldn’t force the user to have a cc in scope. 59 60 - /* Generalized version of the `runCommand`-variants 61 which does customized behavior via a single 62 attribute set passed as the first argument 63 instead of having a lot of variants like ··· 72 defaultStdenv = stdenv; 73 in 74 { 75 - # which stdenv to use, defaults to a stdenv with a C compiler, pkgs.stdenv 76 stdenv ? defaultStdenv 77 - # whether to build this derivation locally instead of substituting 78 , runLocal ? false 79 - # extra arguments to pass to stdenv.mkDerivation 80 - , derivationArgs ? {} 81 - # name of the resulting derivation 82 , name 83 - # TODO(@Artturin): enable strictDeps always 84 }: buildCommand: 85 - stdenv.mkDerivation ({ 86 - enableParallelBuilding = true; 87 - inherit buildCommand name; 88 - passAsFile = [ "buildCommand" ] 89 - ++ (derivationArgs.passAsFile or []); 90 - } 91 - // lib.optionalAttrs (! derivationArgs?meta) { 92 - pos = let args = builtins.attrNames derivationArgs; in 93 - if builtins.length args > 0 94 - then builtins.unsafeGetAttrPos (builtins.head args) derivationArgs 95 - else null; 96 - } 97 - // (lib.optionalAttrs runLocal { 98 - preferLocalBuild = true; 99 - allowSubstitutes = false; 100 - }) 101 - // builtins.removeAttrs derivationArgs [ "passAsFile" ]); 102 103 104 - /* Writes a text file to the nix store. 105 The contents of text is added to the file in the store. 106 107 Example: ··· 145 matches = builtins.match "/bin/([^/]+)" destination; 146 in 147 runCommand name 148 - { inherit text executable checkPhase allowSubstitutes preferLocalBuild; 149 passAsFile = [ "text" ]; 150 - meta = lib.optionalAttrs (executable && matches != null) { 151 - mainProgram = lib.head matches; 152 - } // meta; 153 } 154 '' 155 target=$out${lib.escapeShellArg destination} ··· 169 ''; 170 171 /* 172 - Writes a text file to nix store with no optional parameters available. 173 174 - Example: 175 176 177 - # Writes contents of file to /nix/store/<store path> 178 - writeText "my-file" 179 '' 180 Contents of File 181 ''; 182 183 184 */ 185 - writeText = name: text: writeTextFile {inherit name text;}; 186 187 /* 188 Writes a text file to nix store in a specific directory with no ··· 224 225 226 */ 227 - writeScript = name: text: writeTextFile {inherit name text; executable = true;}; 228 229 /* 230 Writes a text file to /nix/store/<store path>/bin/<name> and ··· 270 text = '' 271 #!${runtimeShell} 272 ${text} 273 - ''; 274 checkPhase = '' 275 ${stdenv.shellDryRun} "$target" 276 ''; ··· 292 293 294 */ 295 - writeShellScriptBin = name : text : 296 writeTextFile { 297 inherit name; 298 executable = true; ··· 300 text = '' 301 #!${runtimeShell} 302 ${text} 303 - ''; 304 checkPhase = '' 305 ${stdenv.shellDryRun} "$target" 306 ''; ··· 340 , runtimeInputs ? [ ] 341 , meta ? { } 342 , checkPhase ? null 343 - , excludeShellChecks ? [ ] 344 }: 345 writeTextFile { 346 inherit name meta; ··· 366 # but we still want to use writeShellApplication on those platforms 367 let 368 shellcheckSupported = lib.meta.availableOn stdenv.buildPlatform shellcheck-minimal.compiler; 369 - excludeOption = lib.optionalString (excludeShellChecks != [ ]) "--exclude '${lib.concatStringsSep "," excludeShellChecks}'"; 370 shellcheckCommand = lib.optionalString shellcheckSupported '' 371 # use shellcheck which does not include docs 372 # pandoc takes long to build and documentation isn't needed for just running the cli ··· 385 # Create a C binary 386 writeCBin = pname: code: 387 runCommandCC pname 388 - { 389 - inherit pname code; 390 - executable = true; 391 - passAsFile = ["code"]; 392 - # Pointless to do this on a remote machine. 393 - preferLocalBuild = true; 394 - allowSubstitutes = false; 395 - meta = { 396 - mainProgram = pname; 397 - }; 398 - } 399 - '' 400 - n=$out/bin/${pname} 401 - mkdir -p "$(dirname "$n")" 402 - mv "$codePath" code.c 403 - $CC -x c code.c -o "$n" 404 - ''; 405 406 407 /* concat a list of files to the nix store. ··· 532 */ 533 symlinkJoin = 534 args_@{ name 535 - , paths 536 - , preferLocalBuild ? true 537 - , allowSubstitutes ? false 538 - , postBuild ? "" 539 - , ... 540 - }: 541 let 542 args = removeAttrs args_ [ "name" "postBuild" ] 543 // { 544 - inherit preferLocalBuild allowSubstitutes; 545 - passAsFile = [ "paths" ]; 546 - }; # pass the defaults 547 - in runCommand name args 548 '' 549 mkdir -p $out 550 for i in $(cat $pathsPath); do ··· 584 See the note on symlinkJoin for the difference between linkFarm and symlinkJoin. 585 */ 586 linkFarm = name: entries: 587 - let 588 - entries' = 589 - if (lib.isAttrs entries) then entries 590 - # We do this foldl to have last-wins semantics in case of repeated entries 591 - else if (lib.isList entries) then lib.foldl (a: b: a // { "${b.name}" = b.path; }) { } entries 592 - else throw "linkFarm entries must be either attrs or a list!"; 593 594 - linkCommands = lib.mapAttrsToList (name: path: '' 595 - mkdir -p "$(dirname ${lib.escapeShellArg "${name}"})" 596 - ln -s ${lib.escapeShellArg "${path}"} ${lib.escapeShellArg "${name}"} 597 - '') entries'; 598 - in 599 - runCommand name { 600 - preferLocalBuild = true; 601 - allowSubstitutes = false; 602 - passthru.entries = entries'; 603 - } '' 604 - mkdir -p $out 605 - cd $out 606 - ${lib.concatStrings linkCommands} 607 - ''; 608 609 /* 610 Easily create a linkFarm from a set of derivations. ··· 639 bin output and other contents of the package's output (e.g. setup 640 hooks) cause trouble when used in your environment. 641 */ 642 - onlyBin = drv: runCommand "${drv.name}-only-bin" {} '' 643 mkdir -p $out 644 ln -s ${lib.getBin drv}/bin $out/bin 645 ''; ··· 675 # TODO 2023-01, no backport: simplify to inherit passthru; 676 passthru = passthru 677 // optionalAttrs (substitutions?passthru) 678 - (warn "makeSetupHook (name = ${lib.strings.escapeNixString name}): `substitutions.passthru` is deprecated. Please set `passthru` directly." 679 - substitutions.passthru); 680 }) 681 ('' 682 mkdir -p $out/nix-support 683 cp ${script} $out/nix-support/setup-hook 684 recordPropagatedDependencies 685 - '' + lib.optionalString (substitutions != {}) '' 686 substituteAll ${script} $out/nix-support/setup-hook 687 ''); 688 ··· 691 692 writeReferencesToFile = path: runCommand "runtime-deps" 693 { 694 - exportReferencesGraph = ["graph" path]; 695 } 696 '' 697 touch $out ··· 710 */ 711 writeDirectReferencesToFile = path: runCommand "runtime-references" 712 { 713 - exportReferencesGraph = ["graph" path]; 714 inherit path; 715 } 716 '' ··· 744 */ 745 writeStringReferencesToFile = string: 746 /* 747 - The basic operation this performs is to copy the string context 748 - from `string' to a second string and wrap that string in a 749 - derivation. However, that alone is not enough, since nothing in the 750 - string refers to the output paths of the derivations/paths in its 751 - context, meaning they'll be considered build-time dependencies and 752 - removed from the wrapper derivation's closure. Putting the 753 - necessary output paths in the new string is however not very 754 - straightforward - the attrset returned by `getContext' contains 755 - only references to derivations' .drv-paths, not their output 756 - paths. In order to "convert" them, we try to extract the 757 - corresponding paths from the original string using regex. 758 */ 759 let 760 # Taken from https://github.com/NixOS/nix/blob/130284b8508dad3c70e8160b15f3d62042fc730a/src/libutil/hash.cc#L84 ··· 798 if lib.elem "out" value.outputs then 799 lib.filter 800 (x: lib.isList x && 801 - # If the matched path is in `namedOutputPaths`, 802 - # it's a partial match of an output path where 803 - # the output name isn't `out` 804 - lib.all (o: !lib.hasPrefix (lib.head x) o) namedOutputPaths) 805 (builtins.split "(${builtins.storeDir}/[${nixHashChars}]+-${name})" string) 806 else 807 - []) 808 packages); 809 allPaths = lib.concatStringsSep "\n" (lib.unique (sources ++ namedOutputPaths ++ outputPaths)); 810 allPathsWithContext = builtins.appendContext allPaths context; 811 in 812 - if builtins ? getContext then 813 - writeText "string-references" allPathsWithContext 814 - else 815 - writeDirectReferencesToFile (writeText "string-file" string); 816 817 818 /* Print an error message if the file with the specified name and ··· 830 } 831 832 */ 833 - requireFile = { name ? null 834 - , sha256 ? null 835 - , sha1 ? null 836 - , hash ? null 837 - , url ? null 838 - , message ? null 839 - , hashMode ? "flat" 840 - } : 841 - assert (message != null) || (url != null); 842 - assert (sha256 != null) || (sha1 != null) || (hash != null); 843 - assert (name != null) || (url != null); 844 - let msg = 845 - if message != null then message 846 - else '' 847 - Unfortunately, we cannot download file ${name_} automatically. 848 - Please go to ${url} to download it yourself, and add it to the Nix store 849 - using either 850 - nix-store --add-fixed ${hashAlgo} ${name_} 851 - or 852 - nix-prefetch-url --type ${hashAlgo} file:///path/to/${name_} 853 - ''; 854 - hashAlgo = if hash != null then (builtins.head (lib.strings.splitString "-" hash)) 855 - else if sha256 != null then "sha256" 856 - else "sha1"; 857 - hashAlgo_ = if hash != null then "" else hashAlgo; 858 - hash_ = if hash != null then hash 859 - else if sha256 != null then sha256 860 - else sha1; 861 - name_ = if name == null then baseNameOf (toString url) else name; 862 - in 863 - stdenvNoCC.mkDerivation { 864 - name = name_; 865 - outputHashMode = hashMode; 866 - outputHashAlgo = hashAlgo_; 867 - outputHash = hash_; 868 - preferLocalBuild = true; 869 - allowSubstitutes = false; 870 - builder = writeScript "restrict-message" '' 871 - source ${stdenvNoCC}/setup 872 - cat <<_EOF_ 873 874 - *** 875 - ${msg} 876 - *** 877 878 - _EOF_ 879 - exit 1 880 - ''; 881 - }; 882 883 884 /* ··· 915 applyPatches = 916 { src 917 , name ? (if builtins.typeOf src == "path" 918 - then builtins.baseNameOf src 919 - else 920 - if builtins.isAttrs src && builtins.hasAttr "name" src 921 - then src.name 922 - else throw "applyPatches: please supply a `name` argument because a default name can only be computed when the `src` is a path or is an attribute set with a `name` attribute." 923 - ) + "-patched" 924 - , patches ? [] 925 , postPatch ? "" 926 , ... 927 - }@args: stdenvNoCC.mkDerivation { 928 - inherit name src patches postPatch; 929 - preferLocalBuild = true; 930 - allowSubstitutes = false; 931 - phases = "unpackPhase patchPhase installPhase"; 932 - installPhase = "cp -R ./ $out"; 933 - } 934 # Carry `meta` information from the underlying `src` if present. 935 // (optionalAttrs (src?meta) { inherit (src) meta; }) 936 // (removeAttrs args [ "src" "name" "patches" "postPatch" ]); 937 938 /* An immutable file in the store with a length of 0 bytes. */ 939 - emptyFile = runCommand "empty-file" { 940 - outputHashAlgo = "sha256"; 941 - outputHashMode = "recursive"; 942 - outputHash = "0ip26j2h11n1kgkz36rl4akv694yz65hr72q4kv4b3lxcbi65b3p"; 943 - preferLocalBuild = true; 944 - } "touch $out"; 945 946 /* An immutable empty directory in the store. */ 947 - emptyDirectory = runCommand "empty-directory" { 948 - outputHashAlgo = "sha256"; 949 - outputHashMode = "recursive"; 950 - outputHash = "0sjjj9z1dhilhpc8pq4154czrb79z9cm044jvn75kxcjv6v5l2m5"; 951 - preferLocalBuild = true; 952 - } "mkdir $out"; 953 }
··· 9 10 rec { 11 12 + /* 13 + Run the shell command `buildCommand' to produce a store path named `name'. 14 15 + The attributes in `env' are added to the environment prior to running the command. 16 + Environment variables set by `stdenv.mkDerivation` take precedence. 17 18 + By default `runCommand` runs in a stdenv with no compiler environment. 19 + `runCommandCC` uses the default stdenv, `pkgs.stdenv`. 20 21 + Example: 22 23 + ```nix 24 + runCommand "name" {envVariable = true;} ''echo hello > $out''; 25 + ``` 26 27 + ```nix 28 + runCommandCC "name" {} ''gcc -o myfile myfile.c; cp myfile $out''; 29 + ``` 30 31 + The `*Local` variants force a derivation to be built locally, 32 + it is not substituted. 33 34 + This is intended for very cheap commands (<1s execution time). 35 + It saves on the network roundrip and can speed up a build. 36 37 + It is the same as adding the special fields 38 39 + ```nix 40 + { 41 + preferLocalBuild = true; 42 + allowSubstitutes = false; 43 + } 44 + ``` 45 + 46 + to a derivation’s attributes. 47 */ 48 runCommand = name: env: runCommandWith { 49 stdenv = stdenvNoCC; ··· 67 # `runCommandCCLocal` left out on purpose. 68 # We shouldn’t force the user to have a cc in scope. 69 70 + /* 71 + Generalized version of the `runCommand`-variants 72 which does customized behavior via a single 73 attribute set passed as the first argument 74 instead of having a lot of variants like ··· 83 defaultStdenv = stdenv; 84 in 85 { 86 + # which stdenv to use, defaults to a stdenv with a C compiler, pkgs.stdenv 87 stdenv ? defaultStdenv 88 + # whether to build this derivation locally instead of substituting 89 , runLocal ? false 90 + # extra arguments to pass to stdenv.mkDerivation 91 + , derivationArgs ? { } 92 + # name of the resulting derivation 93 , name 94 + # TODO(@Artturin): enable strictDeps always 95 }: buildCommand: 96 + stdenv.mkDerivation ({ 97 + enableParallelBuilding = true; 98 + inherit buildCommand name; 99 + passAsFile = [ "buildCommand" ] 100 + ++ (derivationArgs.passAsFile or [ ]); 101 + } 102 + // lib.optionalAttrs (! derivationArgs?meta) { 103 + pos = let args = builtins.attrNames derivationArgs; in 104 + if builtins.length args > 0 105 + then builtins.unsafeGetAttrPos (builtins.head args) derivationArgs 106 + else null; 107 + } 108 + // (lib.optionalAttrs runLocal { 109 + preferLocalBuild = true; 110 + allowSubstitutes = false; 111 + }) 112 + // builtins.removeAttrs derivationArgs [ "passAsFile" ]); 113 114 115 + /* 116 + Writes a text file to the nix store. 117 The contents of text is added to the file in the store. 118 119 Example: ··· 157 matches = builtins.match "/bin/([^/]+)" destination; 158 in 159 runCommand name 160 + { 161 + inherit text executable checkPhase allowSubstitutes preferLocalBuild; 162 passAsFile = [ "text" ]; 163 + meta = lib.optionalAttrs (executable && matches != null) 164 + { 165 + mainProgram = lib.head matches; 166 + } // meta; 167 } 168 '' 169 target=$out${lib.escapeShellArg destination} ··· 183 ''; 184 185 /* 186 + Writes a text file to nix store with no optional parameters available. 187 188 + Example: 189 190 191 + # Writes contents of file to /nix/store/<store path> 192 + writeText "my-file" 193 '' 194 Contents of File 195 ''; 196 197 198 */ 199 + writeText = name: text: writeTextFile { inherit name text; }; 200 201 /* 202 Writes a text file to nix store in a specific directory with no ··· 238 239 240 */ 241 + writeScript = name: text: writeTextFile { inherit name text; executable = true; }; 242 243 /* 244 Writes a text file to /nix/store/<store path>/bin/<name> and ··· 284 text = '' 285 #!${runtimeShell} 286 ${text} 287 + ''; 288 checkPhase = '' 289 ${stdenv.shellDryRun} "$target" 290 ''; ··· 306 307 308 */ 309 + writeShellScriptBin = name: text: 310 writeTextFile { 311 inherit name; 312 executable = true; ··· 314 text = '' 315 #!${runtimeShell} 316 ${text} 317 + ''; 318 checkPhase = '' 319 ${stdenv.shellDryRun} "$target" 320 ''; ··· 354 , runtimeInputs ? [ ] 355 , meta ? { } 356 , checkPhase ? null 357 + , excludeShellChecks ? [ ] 358 }: 359 writeTextFile { 360 inherit name meta; ··· 380 # but we still want to use writeShellApplication on those platforms 381 let 382 shellcheckSupported = lib.meta.availableOn stdenv.buildPlatform shellcheck-minimal.compiler; 383 + excludeOption = lib.optionalString (excludeShellChecks != [ ]) "--exclude '${lib.concatStringsSep "," excludeShellChecks}'"; 384 shellcheckCommand = lib.optionalString shellcheckSupported '' 385 # use shellcheck which does not include docs 386 # pandoc takes long to build and documentation isn't needed for just running the cli ··· 399 # Create a C binary 400 writeCBin = pname: code: 401 runCommandCC pname 402 + { 403 + inherit pname code; 404 + executable = true; 405 + passAsFile = [ "code" ]; 406 + # Pointless to do this on a remote machine. 407 + preferLocalBuild = true; 408 + allowSubstitutes = false; 409 + meta = { 410 + mainProgram = pname; 411 + }; 412 + } 413 + '' 414 + n=$out/bin/${pname} 415 + mkdir -p "$(dirname "$n")" 416 + mv "$codePath" code.c 417 + $CC -x c code.c -o "$n" 418 + ''; 419 420 421 /* concat a list of files to the nix store. ··· 546 */ 547 symlinkJoin = 548 args_@{ name 549 + , paths 550 + , preferLocalBuild ? true 551 + , allowSubstitutes ? false 552 + , postBuild ? "" 553 + , ... 554 + }: 555 let 556 args = removeAttrs args_ [ "name" "postBuild" ] 557 // { 558 + inherit preferLocalBuild allowSubstitutes; 559 + passAsFile = [ "paths" ]; 560 + }; # pass the defaults 561 + in 562 + runCommand name args 563 '' 564 mkdir -p $out 565 for i in $(cat $pathsPath); do ··· 599 See the note on symlinkJoin for the difference between linkFarm and symlinkJoin. 600 */ 601 linkFarm = name: entries: 602 + let 603 + entries' = 604 + if (lib.isAttrs entries) then entries 605 + # We do this foldl to have last-wins semantics in case of repeated entries 606 + else if (lib.isList entries) then lib.foldl (a: b: a // { "${b.name}" = b.path; }) { } entries 607 + else throw "linkFarm entries must be either attrs or a list!"; 608 609 + linkCommands = lib.mapAttrsToList 610 + (name: path: '' 611 + mkdir -p "$(dirname ${lib.escapeShellArg "${name}"})" 612 + ln -s ${lib.escapeShellArg "${path}"} ${lib.escapeShellArg "${name}"} 613 + '') 614 + entries'; 615 + in 616 + runCommand name 617 + { 618 + preferLocalBuild = true; 619 + allowSubstitutes = false; 620 + passthru.entries = entries'; 621 + } '' 622 + mkdir -p $out 623 + cd $out 624 + ${lib.concatStrings linkCommands} 625 + ''; 626 627 /* 628 Easily create a linkFarm from a set of derivations. ··· 657 bin output and other contents of the package's output (e.g. setup 658 hooks) cause trouble when used in your environment. 659 */ 660 + onlyBin = drv: runCommand "${drv.name}-only-bin" { } '' 661 mkdir -p $out 662 ln -s ${lib.getBin drv}/bin $out/bin 663 ''; ··· 693 # TODO 2023-01, no backport: simplify to inherit passthru; 694 passthru = passthru 695 // optionalAttrs (substitutions?passthru) 696 + (warn "makeSetupHook (name = ${lib.strings.escapeNixString name}): `substitutions.passthru` is deprecated. Please set `passthru` directly." 697 + substitutions.passthru); 698 }) 699 ('' 700 mkdir -p $out/nix-support 701 cp ${script} $out/nix-support/setup-hook 702 recordPropagatedDependencies 703 + '' + lib.optionalString (substitutions != { }) '' 704 substituteAll ${script} $out/nix-support/setup-hook 705 ''); 706 ··· 709 710 writeReferencesToFile = path: runCommand "runtime-deps" 711 { 712 + exportReferencesGraph = [ "graph" path ]; 713 } 714 '' 715 touch $out ··· 728 */ 729 writeDirectReferencesToFile = path: runCommand "runtime-references" 730 { 731 + exportReferencesGraph = [ "graph" path ]; 732 inherit path; 733 } 734 '' ··· 762 */ 763 writeStringReferencesToFile = string: 764 /* 765 + The basic operation this performs is to copy the string context 766 + from `string' to a second string and wrap that string in a 767 + derivation. However, that alone is not enough, since nothing in the 768 + string refers to the output paths of the derivations/paths in its 769 + context, meaning they'll be considered build-time dependencies and 770 + removed from the wrapper derivation's closure. Putting the 771 + necessary output paths in the new string is however not very 772 + straightforward - the attrset returned by `getContext' contains 773 + only references to derivations' .drv-paths, not their output 774 + paths. In order to "convert" them, we try to extract the 775 + corresponding paths from the original string using regex. 776 */ 777 let 778 # Taken from https://github.com/NixOS/nix/blob/130284b8508dad3c70e8160b15f3d62042fc730a/src/libutil/hash.cc#L84 ··· 816 if lib.elem "out" value.outputs then 817 lib.filter 818 (x: lib.isList x && 819 + # If the matched path is in `namedOutputPaths`, 820 + # it's a partial match of an output path where 821 + # the output name isn't `out` 822 + lib.all (o: !lib.hasPrefix (lib.head x) o) namedOutputPaths) 823 (builtins.split "(${builtins.storeDir}/[${nixHashChars}]+-${name})" string) 824 else 825 + [ ]) 826 packages); 827 allPaths = lib.concatStringsSep "\n" (lib.unique (sources ++ namedOutputPaths ++ outputPaths)); 828 allPathsWithContext = builtins.appendContext allPaths context; 829 in 830 + if builtins ? getContext then 831 + writeText "string-references" allPathsWithContext 832 + else 833 + writeDirectReferencesToFile (writeText "string-file" string); 834 835 836 /* Print an error message if the file with the specified name and ··· 848 } 849 850 */ 851 + requireFile = 852 + { name ? null 853 + , sha256 ? null 854 + , sha1 ? null 855 + , hash ? null 856 + , url ? null 857 + , message ? null 858 + , hashMode ? "flat" 859 + }: 860 + assert (message != null) || (url != null); 861 + assert (sha256 != null) || (sha1 != null) || (hash != null); 862 + assert (name != null) || (url != null); 863 + let 864 + msg = 865 + if message != null then message 866 + else '' 867 + Unfortunately, we cannot download file ${name_} automatically. 868 + Please go to ${url} to download it yourself, and add it to the Nix store 869 + using either 870 + nix-store --add-fixed ${hashAlgo} ${name_} 871 + or 872 + nix-prefetch-url --type ${hashAlgo} file:///path/to/${name_} 873 + ''; 874 + hashAlgo = 875 + if hash != null then (builtins.head (lib.strings.splitString "-" hash)) 876 + else if sha256 != null then "sha256" 877 + else "sha1"; 878 + hashAlgo_ = if hash != null then "" else hashAlgo; 879 + hash_ = 880 + if hash != null then hash 881 + else if sha256 != null then sha256 882 + else sha1; 883 + name_ = if name == null then baseNameOf (toString url) else name; 884 + in 885 + stdenvNoCC.mkDerivation { 886 + name = name_; 887 + outputHashMode = hashMode; 888 + outputHashAlgo = hashAlgo_; 889 + outputHash = hash_; 890 + preferLocalBuild = true; 891 + allowSubstitutes = false; 892 + builder = writeScript "restrict-message" '' 893 + source ${stdenvNoCC}/setup 894 + cat <<_EOF_ 895 896 + *** 897 + ${msg} 898 + *** 899 900 + _EOF_ 901 + exit 1 902 + ''; 903 + }; 904 905 906 /* ··· 937 applyPatches = 938 { src 939 , name ? (if builtins.typeOf src == "path" 940 + then builtins.baseNameOf src 941 + else 942 + if builtins.isAttrs src && builtins.hasAttr "name" src 943 + then src.name 944 + else throw "applyPatches: please supply a `name` argument because a default name can only be computed when the `src` is a path or is an attribute set with a `name` attribute." 945 + ) + "-patched" 946 + , patches ? [ ] 947 , postPatch ? "" 948 , ... 949 + }@args: stdenvNoCC.mkDerivation 950 + { 951 + inherit name src patches postPatch; 952 + preferLocalBuild = true; 953 + allowSubstitutes = false; 954 + phases = "unpackPhase patchPhase installPhase"; 955 + installPhase = "cp -R ./ $out"; 956 + } 957 # Carry `meta` information from the underlying `src` if present. 958 // (optionalAttrs (src?meta) { inherit (src) meta; }) 959 // (removeAttrs args [ "src" "name" "patches" "postPatch" ]); 960 961 /* An immutable file in the store with a length of 0 bytes. */ 962 + emptyFile = runCommand "empty-file" 963 + { 964 + outputHashAlgo = "sha256"; 965 + outputHashMode = "recursive"; 966 + outputHash = "0ip26j2h11n1kgkz36rl4akv694yz65hr72q4kv4b3lxcbi65b3p"; 967 + preferLocalBuild = true; 968 + } "touch $out"; 969 970 /* An immutable empty directory in the store. */ 971 + emptyDirectory = runCommand "empty-directory" 972 + { 973 + outputHashAlgo = "sha256"; 974 + outputHashMode = "recursive"; 975 + outputHash = "0sjjj9z1dhilhpc8pq4154czrb79z9cm044jvn75kxcjv6v5l2m5"; 976 + preferLocalBuild = true; 977 + } "mkdir $out"; 978 }
+39
pkgs/by-name/di/disko/package.nix
···
··· 1 + { stdenvNoCC 2 + , makeWrapper 3 + , lib 4 + , fetchFromGitHub 5 + , bash 6 + , nix 7 + }: 8 + 9 + stdenvNoCC.mkDerivation (finalAttrs: { 10 + name = "disko"; 11 + version = "1.3.0"; 12 + src = fetchFromGitHub { 13 + owner = "nix-community"; 14 + repo = "disko"; 15 + rev = "v${finalAttrs.version}"; 16 + hash = "sha256-wOIJwAsnZhM0NlFRwYJRgO4Lldh8j9viyzwQXtrbNtM="; 17 + }; 18 + nativeBuildInputs = [ makeWrapper ]; 19 + buildInputs = [ bash ]; 20 + installPhase = '' 21 + mkdir -p $out/bin $out/share/disko 22 + cp -r cli.nix default.nix disk-deactivate lib $out/share/disko 23 + sed -e "s|libexec_dir=\".*\"|libexec_dir=\"$out/share/disko\"|" disko > $out/bin/disko 24 + chmod 755 $out/bin/disko 25 + wrapProgram $out/bin/disko --prefix PATH : ${lib.makeBinPath [ nix ]} 26 + ''; 27 + doInstallCheck = true; 28 + installCheckPhase = '' 29 + $out/bin/disko --help 30 + ''; 31 + meta = { 32 + homepage = "https://github.com/nix-community/disko"; 33 + description = "Declarative disk partitioning and formatting using nix"; 34 + license = lib.licenses.mit; 35 + mainProgram = "disko"; 36 + maintainers = with lib.maintainers; [ mic92 lassulus ]; 37 + platforms = lib.platforms.linux; 38 + }; 39 + })
+2 -2
pkgs/desktops/pantheon/third-party/pantheon-tweaks/default.nix
··· 14 15 stdenv.mkDerivation rec { 16 pname = "pantheon-tweaks"; 17 - version = "1.1.1"; 18 19 src = fetchFromGitHub { 20 owner = "pantheon-tweaks"; 21 repo = pname; 22 rev = version; 23 - sha256 = "sha256-KYnrQnh/Zz3EjMAqasdk2CZMXzw15txKtPm/K5+FzhI="; 24 }; 25 26 patches = [
··· 14 15 stdenv.mkDerivation rec { 16 pname = "pantheon-tweaks"; 17 + version = "1.1.2"; 18 19 src = fetchFromGitHub { 20 owner = "pantheon-tweaks"; 21 repo = pname; 22 rev = version; 23 + sha256 = "sha256-E9YSRfh9bLAHn2y4p3aKwR5NOtexKokLWj3RwtDnLsQ="; 24 }; 25 26 patches = [
+4
pkgs/development/compilers/llvm/common/lldb.nix
··· 159 ln -s $out/bin/*-vscode $out/share/vscode/extensions/llvm-org.lldb-vscode-0.1.0/bin 160 ''; 161 162 meta = llvm_meta // { 163 homepage = "https://lldb.llvm.org/"; 164 description = "A next-generation high-performance debugger";
··· 159 ln -s $out/bin/*-vscode $out/share/vscode/extensions/llvm-org.lldb-vscode-0.1.0/bin 160 ''; 161 162 + passthru.vscodeExtName = "lldb-vscode"; 163 + passthru.vscodeExtPublisher = "llvm"; 164 + passthru.vscodeExtUniqueId = "llvm-org.lldb-vscode-0.1.0"; 165 + 166 meta = llvm_meta // { 167 homepage = "https://lldb.llvm.org/"; 168 description = "A next-generation high-performance debugger";
-16
pkgs/development/compilers/pakcs/curry-base.nix
··· 1 - { mkDerivation, base, Cabal, containers, directory, extra, filepath 2 - , mtl, parsec, pretty, lib, time, transformers 3 - }: 4 - mkDerivation { 5 - pname = "curry-base"; 6 - version = "1.1.0"; 7 - src = ./.; 8 - libraryHaskellDepends = [ 9 - base containers directory extra filepath mtl parsec pretty time 10 - transformers 11 - ]; 12 - testHaskellDepends = [ base Cabal filepath mtl ]; 13 - homepage = "http://curry-language.org"; 14 - description = "Functions for manipulating Curry programs"; 15 - license = lib.licenses.bsd3; 16 - }
···
+12 -10
pkgs/development/compilers/pakcs/curry-frontend.nix
··· 1 - { mkDerivation, base, bytestring, Cabal, containers, curry-base 2 - , directory, extra, file-embed, filepath, mtl, network-uri, pretty 3 - , process, set-extra, lib, template-haskell, transformers 4 }: 5 mkDerivation { 6 pname = "curry-frontend"; 7 - version = "1.0.4"; 8 src = ./.; 9 isLibrary = true; 10 isExecutable = true; 11 enableSeparateDataOutput = true; 12 libraryHaskellDepends = [ 13 - base bytestring containers curry-base directory extra file-embed 14 - filepath mtl network-uri pretty process set-extra template-haskell 15 - transformers 16 ]; 17 - executableHaskellDepends = [ 18 - base bytestring containers curry-base directory extra file-embed 19 filepath mtl network-uri pretty process set-extra template-haskell 20 transformers 21 ]; 22 - testHaskellDepends = [ base Cabal curry-base filepath ]; 23 homepage = "http://curry-language.org"; 24 description = "Compile the functional logic language Curry to several intermediate formats"; 25 license = lib.licenses.bsd3; 26 }
··· 1 + { mkDerivation, base, binary, bytestring, Cabal, containers 2 + , directory, extra, file-embed, filepath, lib, mtl, network-uri 3 + , parsec, pretty, process, set-extra, template-haskell, time 4 + , transformers 5 }: 6 mkDerivation { 7 pname = "curry-frontend"; 8 + version = "2.1.0"; 9 src = ./.; 10 isLibrary = true; 11 isExecutable = true; 12 enableSeparateDataOutput = true; 13 libraryHaskellDepends = [ 14 + base binary bytestring containers directory extra file-embed 15 + filepath mtl network-uri parsec pretty process set-extra 16 + template-haskell time transformers 17 ]; 18 + executableHaskellDepends = [ base ]; 19 + testHaskellDepends = [ 20 + base bytestring Cabal containers directory extra file-embed 21 filepath mtl network-uri pretty process set-extra template-haskell 22 transformers 23 ]; 24 homepage = "http://curry-language.org"; 25 description = "Compile the functional logic language Curry to several intermediate formats"; 26 license = lib.licenses.bsd3; 27 + mainProgram = "curry-frontend"; 28 }
+17 -22
pkgs/development/compilers/pakcs/default.nix
··· 5 6 let 7 pname = "pakcs"; 8 - version = "2.2.1"; 9 10 # Don't switch to "Current release" without a reason, because its 11 # source updates without version bump. Prefer last from "Older releases" instead. 12 src = fetchurl { 13 url = "https://www.informatik.uni-kiel.de/~pakcs/download/pakcs-${version}-src.tar.gz"; 14 - sha256 = "1jyg29j8r8pgcin7ixdya6c3zzfjdi66rghpwrfnkk133fz4iz7s"; 15 }; 16 17 curry-frontend = (haskellPackages.override { 18 overrides = self: super: { 19 - curry-base = haskell.lib.compose.overrideCabal (drv: { 20 - inherit src; 21 - postUnpack = "sourceRoot+=/frontend/curry-base"; 22 - }) (super.callPackage ./curry-base.nix {}); 23 curry-frontend = haskell.lib.compose.overrideCabal (drv: { 24 inherit src; 25 - postUnpack = "sourceRoot+=/frontend/curry-frontend"; 26 - }) (super.callPackage ./curry-frontend.nix {}); 27 }; 28 }).curry-frontend; 29 in stdenv.mkDerivation { 30 inherit pname version src; 31 ··· 41 ]; 42 43 preConfigure = '' 44 - # Since we can't expand $out in `makeFlags` 45 - #makeFlags="$makeFlags PAKCSINSTALLDIR=$out/pakcs" 46 - 47 - for file in currytools/cpm/src/CPM/Repository.curry \ 48 - currytools/cpm/src/CPM/Repository/CacheDB.curry \ 49 - scripts/compile-all-libs.sh \ 50 - scripts/cleancurry.sh \ 51 - examples/test.sh testsuite/test.sh lib/test.sh; do 52 substituteInPlace $file --replace "/bin/rm" "rm" 53 done 54 '' ; 55 56 - # cypm new: EXISTENCE ERROR: source_sink 57 - # "/tmp/nix-build-pakcs-2.0.2.drv-0/pakcs-2.0.2/currytools/cpm/templates/LICENSE" 58 - # does not exist 59 - buildPhase = '' 60 mkdir -p $out/pakcs 61 cp -r * $out/pakcs 62 - (cd $out/pakcs ; make -j$NIX_BUILD_CORES $makeFlags) 63 ''; 64 65 installPhase = '' 66 ln -s $out/pakcs/bin $out 67 68 mkdir -p $out/share/emacs/site-lisp ··· 75 # List of dependencies from currytools/cpm/src/CPM/Main.curry 76 wrapProgram $out/pakcs/bin/cypm \ 77 --prefix PATH ":" "${lib.makeBinPath [ curl git unzip gnutar coreutils sqlite ]}" 78 ''; 79 80 meta = with lib; { ··· 94 with dynamic web pages, prototyping embedded systems). 95 ''; 96 97 - maintainers = with maintainers; [ ]; 98 platforms = platforms.linux; 99 }; 100 }
··· 5 6 let 7 pname = "pakcs"; 8 + version = "3.6.0"; 9 10 # Don't switch to "Current release" without a reason, because its 11 # source updates without version bump. Prefer last from "Older releases" instead. 12 src = fetchurl { 13 url = "https://www.informatik.uni-kiel.de/~pakcs/download/pakcs-${version}-src.tar.gz"; 14 + hash = "sha256-1r6jEY3eEGESKcAepiziVbxpIvQLtCS6l0trBU3SGGo="; 15 }; 16 17 curry-frontend = (haskellPackages.override { 18 overrides = self: super: { 19 curry-frontend = haskell.lib.compose.overrideCabal (drv: { 20 inherit src; 21 + postUnpack = "sourceRoot+=/frontend"; 22 + }) (super.callPackage ./curry-frontend.nix { }); 23 }; 24 }).curry-frontend; 25 + 26 in stdenv.mkDerivation { 27 inherit pname version src; 28 ··· 38 ]; 39 40 preConfigure = '' 41 + for file in examples/test.sh \ 42 + currytools/optimize/Makefile \ 43 + testsuite/test.sh \ 44 + scripts/cleancurry.sh \ 45 + scripts/compile-all-libs.sh; do 46 substituteInPlace $file --replace "/bin/rm" "rm" 47 done 48 '' ; 49 50 + preBuild = '' 51 mkdir -p $out/pakcs 52 cp -r * $out/pakcs 53 + cd $out/pakcs 54 ''; 55 56 installPhase = '' 57 + runHook preInstall 58 + 59 ln -s $out/pakcs/bin $out 60 61 mkdir -p $out/share/emacs/site-lisp ··· 68 # List of dependencies from currytools/cpm/src/CPM/Main.curry 69 wrapProgram $out/pakcs/bin/cypm \ 70 --prefix PATH ":" "${lib.makeBinPath [ curl git unzip gnutar coreutils sqlite ]}" 71 + 72 + runHook postInstall 73 ''; 74 75 meta = with lib; { ··· 89 with dynamic web pages, prototyping embedded systems). 90 ''; 91 92 + maintainers = with maintainers; [ t4ccer ]; 93 platforms = platforms.linux; 94 }; 95 }
+3 -3
pkgs/development/interpreters/expr/default.nix
··· 5 6 buildGoModule rec { 7 pname = "expr"; 8 - version = "1.15.7"; 9 10 src = fetchFromGitHub { 11 owner = "antonmedv"; 12 repo = "expr"; 13 rev = "v${version}"; 14 - hash = "sha256-dSZVReKQqQMKjVocqz6eoh8/+Yyf37egDf1tJ/JePJ0="; 15 }; 16 17 sourceRoot = "${src.name}/repl"; 18 19 - vendorHash = "sha256-ioNXzEQLLpBWhVw4tnDnL/umkEoExHBTSj2WBjIl3PQ="; 20 21 ldflags = [ "-s" "-w" ]; 22
··· 5 6 buildGoModule rec { 7 pname = "expr"; 8 + version = "1.15.8"; 9 10 src = fetchFromGitHub { 11 owner = "antonmedv"; 12 repo = "expr"; 13 rev = "v${version}"; 14 + hash = "sha256-leZEP6RJv136z/bNc1S74tw+JQ3QD7NCMbo/Wo7q0ek="; 15 }; 16 17 sourceRoot = "${src.name}/repl"; 18 19 + vendorHash = "sha256-Rs2tlno0vJo8FSdnnk3cxQCCxdByQD1jRzmePzMMfvs="; 20 21 ldflags = [ "-s" "-w" ]; 22
+1 -1
pkgs/development/interpreters/python/cpython/2.7/default.nix
··· 344 ''; 345 license = lib.licenses.psfl; 346 platforms = lib.platforms.all; 347 - maintainers = with lib.maintainers; [ fridh thiagokokada ]; 348 knownVulnerabilities = [ 349 "Python 2.7 has reached its end of life after 2020-01-01. See https://www.python.org/doc/sunset-python-2/." 350 # Quote: That means that we will not improve it anymore after that day,
··· 344 ''; 345 license = lib.licenses.psfl; 346 platforms = lib.platforms.all; 347 + maintainers = with lib.maintainers; [ fridh ]; 348 knownVulnerabilities = [ 349 "Python 2.7 has reached its end of life after 2020-01-01. See https://www.python.org/doc/sunset-python-2/." 350 # Quote: That means that we will not improve it anymore after that day,
+2 -10
pkgs/development/libraries/kpmcore/default.nix pkgs/applications/kde/kpmcore/default.nix
··· 1 - { stdenv 2 , lib 3 - , fetchurl 4 , extra-cmake-modules 5 , qca-qt5 6 , kauth ··· 9 , util-linux 10 }: 11 12 - stdenv.mkDerivation rec { 13 pname = "kpmcore"; 14 - # NOTE: When changing this version, also change the version of `partition-manager`. 15 - version = "23.04.1"; 16 - 17 - src = fetchurl { 18 - url = "mirror://kde/stable/release-service/${version}/src/${pname}-${version}.tar.xz"; 19 - hash = "sha256-NFIq8CZwYvpqDOOYLlBqoGdgfNPsyf15FkB3dToDCB8="; 20 - }; 21 22 patches = [ 23 ./nixostrustedprefix.patch
··· 1 + { mkDerivation 2 , lib 3 , extra-cmake-modules 4 , qca-qt5 5 , kauth ··· 8 , util-linux 9 }: 10 11 + mkDerivation rec { 12 pname = "kpmcore"; 13 14 patches = [ 15 ./nixostrustedprefix.patch
pkgs/development/libraries/kpmcore/nixostrustedprefix.patch pkgs/applications/kde/kpmcore/nixostrustedprefix.patch
+1 -1
pkgs/development/libraries/libsodium/default.nix
··· 21 url = "https://github.com/jedisct1/libsodium/commit/ffd1e374989197b44d815ac8b5d8f0b43b6ce534.patch"; 22 hash = "sha256-jG0VirIoFBwYmRx6zHSu2xe6pXYwbeqNVhPJxO6eJEY="; 23 }) 24 - ] ++ lib.optional stdenv.hostPlatform.isMinGW ./mingw-no-fortify.patch; 25 26 nativeBuildInputs = [ autoreconfHook ]; 27
··· 21 url = "https://github.com/jedisct1/libsodium/commit/ffd1e374989197b44d815ac8b5d8f0b43b6ce534.patch"; 22 hash = "sha256-jG0VirIoFBwYmRx6zHSu2xe6pXYwbeqNVhPJxO6eJEY="; 23 }) 24 + ]; 25 26 nativeBuildInputs = [ autoreconfHook ]; 27
-15
pkgs/development/libraries/libsodium/mingw-no-fortify.patch
··· 1 - diff -Naur libsodium-1.0.18-orig/configure.ac libsodium-1.0.18/configure.ac 2 - --- libsodium-1.0.18-orig/configure.ac 2019-05-30 16:20:24.000000000 -0400 3 - +++ libsodium-1.0.18/configure.ac 2021-08-11 08:09:54.653907245 -0400 4 - @@ -217,11 +217,6 @@ 5 - 6 - AC_CHECK_DEFINE([__wasi__], [WASI="yes"], []) 7 - 8 - -AC_CHECK_DEFINE([_FORTIFY_SOURCE], [], [ 9 - - AX_CHECK_COMPILE_FLAG([-D_FORTIFY_SOURCE=2], 10 - - [CPPFLAGS="$CPPFLAGS -D_FORTIFY_SOURCE=2"]) 11 - -]) 12 - - 13 - AX_CHECK_COMPILE_FLAG([-fvisibility=hidden], 14 - [CFLAGS="$CFLAGS -fvisibility=hidden"]) 15 -
···
+56 -9
pkgs/development/libraries/pdal/default.nix
··· 1 - { lib, stdenv 2 , fetchFromGitHub 3 - , fetchpatch 4 , cmake 5 - , pkg-config 6 - , openscenegraph 7 , curl 8 , gdal 9 , hdf5-cpp 10 , LASzip 11 - , enableE57 ? lib.meta.availableOn stdenv.hostPlatform libe57format 12 , libe57format 13 , libgeotiff 14 , libtiff 15 , libxml2 16 , postgresql 17 , tiledb 18 , xercesc ··· 20 , zstd 21 }: 22 23 - stdenv.mkDerivation rec { 24 pname = "pdal"; 25 version = "2.5.6"; 26 27 src = fetchFromGitHub { 28 owner = "PDAL"; 29 repo = "PDAL"; 30 - rev = version; 31 sha256 = "sha256-JKwa89c05EfZ/FxOkj8lYmw0o2EgSqafRDIV2mTpZ5E="; 32 }; 33 ··· 37 ]; 38 39 buildInputs = [ 40 - openscenegraph 41 curl 42 gdal 43 hdf5-cpp ··· 45 libgeotiff 46 libtiff 47 libxml2 48 postgresql 49 tiledb 50 xercesc ··· 59 "-DBUILD_PLUGIN_HDF=ON" 60 "-DBUILD_PLUGIN_PGPOINTCLOUD=ON" 61 "-DBUILD_PLUGIN_TILEDB=ON" 62 63 # Plugins can probably not be made work easily: 64 "-DBUILD_PLUGIN_CPD=OFF" ··· 75 "-DBUILD_PLUGIN_RIVLIB=OFF" 76 ]; 77 78 meta = with lib; { 79 description = "PDAL is Point Data Abstraction Library. GDAL for point cloud data"; 80 homepage = "https://pdal.io"; 81 license = licenses.bsd3; 82 maintainers = teams.geospatial.members; 83 platforms = platforms.all; 84 }; 85 - }
··· 1 + { lib 2 + , stdenv 3 + , callPackage 4 , fetchFromGitHub 5 + , testers 6 + 7 + , enableE57 ? lib.meta.availableOn stdenv.hostPlatform libe57format 8 + 9 , cmake 10 , curl 11 , gdal 12 , hdf5-cpp 13 , LASzip 14 , libe57format 15 , libgeotiff 16 , libtiff 17 , libxml2 18 + , openscenegraph 19 + , pkg-config 20 , postgresql 21 , tiledb 22 , xercesc ··· 24 , zstd 25 }: 26 27 + stdenv.mkDerivation (finalAttrs: { 28 pname = "pdal"; 29 version = "2.5.6"; 30 31 src = fetchFromGitHub { 32 owner = "PDAL"; 33 repo = "PDAL"; 34 + rev = finalAttrs.version; 35 sha256 = "sha256-JKwa89c05EfZ/FxOkj8lYmw0o2EgSqafRDIV2mTpZ5E="; 36 }; 37 ··· 41 ]; 42 43 buildInputs = [ 44 curl 45 gdal 46 hdf5-cpp ··· 48 libgeotiff 49 libtiff 50 libxml2 51 + openscenegraph 52 postgresql 53 tiledb 54 xercesc ··· 63 "-DBUILD_PLUGIN_HDF=ON" 64 "-DBUILD_PLUGIN_PGPOINTCLOUD=ON" 65 "-DBUILD_PLUGIN_TILEDB=ON" 66 + "-DWITH_TESTS=ON" 67 + "-DBUILD_PGPOINTCLOUD_TESTS=OFF" 68 69 # Plugins can probably not be made work easily: 70 "-DBUILD_PLUGIN_CPD=OFF" ··· 81 "-DBUILD_PLUGIN_RIVLIB=OFF" 82 ]; 83 84 + doCheck = true; 85 + 86 + disabledTests = [ 87 + # Tests failing due to TileDB library implementation, disabled also 88 + # by upstream CI. 89 + # See: https://github.com/PDAL/PDAL/blob/bc46bc77f595add4a6d568a1ff923d7fe20f7e74/.github/workflows/linux.yml#L81 90 + "pdal_io_tiledb_writer_test" 91 + "pdal_io_tiledb_reader_test" 92 + "pdal_io_tiledb_time_writer_test" 93 + "pdal_io_tiledb_time_reader_test" 94 + "pdal_io_tiledb_bit_fields_test" 95 + "pdal_io_e57_read_test" 96 + "pdal_io_e57_write_test" 97 + "pdal_io_stac_reader_test" 98 + 99 + # Segfault 100 + "pdal_io_hdf_reader_test" 101 + 102 + # Failure 103 + "pdal_app_plugin_test" 104 + ]; 105 + 106 + checkPhase = '' 107 + runHook preCheck 108 + # tests are flaky and they seem to fail less often when they don't run in 109 + # parallel 110 + ctest -j 1 --output-on-failure -E '^${lib.concatStringsSep "|" finalAttrs.disabledTests}$' 111 + runHook postCheck 112 + ''; 113 + 114 + passthru.tests = { 115 + version = testers.testVersion { 116 + package = finalAttrs.finalPackage; 117 + command = "pdal --version"; 118 + version = "pdal ${finalAttrs.finalPackage.version}"; 119 + }; 120 + pdal = callPackage ./tests.nix { pdal = finalAttrs.finalPackage; }; 121 + pkg-config = testers.testMetaPkgConfig finalAttrs.finalPackage; 122 + }; 123 + 124 meta = with lib; { 125 description = "PDAL is Point Data Abstraction Library. GDAL for point cloud data"; 126 homepage = "https://pdal.io"; 127 license = licenses.bsd3; 128 maintainers = teams.geospatial.members; 129 platforms = platforms.all; 130 + pkgConfigModules = [ "pdal" ]; 131 }; 132 + })
+10
pkgs/development/libraries/pdal/tests.nix
···
··· 1 + { runCommand, pdal }: 2 + 3 + let 4 + inherit (pdal) pname; 5 + in 6 + runCommand "${pname}-tests" { meta.timeout = 60; } 7 + '' 8 + ${pdal}/bin/pdal --drivers 9 + touch $out 10 + ''
+3 -3
pkgs/development/python-modules/aiohappyeyeballs/default.nix
··· 19 20 buildPythonPackage rec { 21 pname = "aiohappyeyeballs"; 22 - version = "2.3.0"; 23 pyproject = true; 24 25 disabled = pythonOlder "3.10"; ··· 28 owner = "bdraco"; 29 repo = "aiohappyeyeballs"; 30 rev = "refs/tags/v${version}"; 31 - hash = "sha256-LMvELnN6Sy6DssXfH6fQ84N2rhdjqB8AlikTMidrjT4="; 32 }; 33 34 outputs = [ ··· 71 meta = with lib; { 72 description = "Happy Eyeballs for pre-resolved hosts"; 73 homepage = "https://github.com/bdraco/aiohappyeyeballs"; 74 - changelog = "https://github.com/bdraco/aiohappyeyeballs/blob/${src.rev}/CHANGELOG.md"; 75 license = licenses.psfl; 76 maintainers = with maintainers; [ fab hexa ]; 77 };
··· 19 20 buildPythonPackage rec { 21 pname = "aiohappyeyeballs"; 22 + version = "2.3.2"; 23 pyproject = true; 24 25 disabled = pythonOlder "3.10"; ··· 28 owner = "bdraco"; 29 repo = "aiohappyeyeballs"; 30 rev = "refs/tags/v${version}"; 31 + hash = "sha256-3Lj1eUDPoVCElrxowBhhrS0GCjD5qeUCiSB/gHoqC3Q="; 32 }; 33 34 outputs = [ ··· 71 meta = with lib; { 72 description = "Happy Eyeballs for pre-resolved hosts"; 73 homepage = "https://github.com/bdraco/aiohappyeyeballs"; 74 + changelog = "https://github.com/bdraco/aiohappyeyeballs/blob/v${version}/CHANGELOG.md"; 75 license = licenses.psfl; 76 maintainers = with maintainers; [ fab hexa ]; 77 };
+4 -4
pkgs/development/python-modules/aiowithings/default.nix
··· 1 { lib 2 , aiohttp 3 - , aresponses 4 , buildPythonPackage 5 , fetchFromGitHub 6 , poetry-core ··· 13 14 buildPythonPackage rec { 15 pname = "aiowithings"; 16 - version = "2.0.0"; 17 pyproject = true; 18 19 disabled = pythonOlder "3.11"; ··· 22 owner = "joostlek"; 23 repo = "python-withings"; 24 rev = "refs/tags/v${version}"; 25 - hash = "sha256-wVLoM1Lq1fchyjOOmn+6wVzEAra8x2uK6qaiocVqzmw="; 26 }; 27 28 postPatch = '' ··· 40 ]; 41 42 nativeCheckInputs = [ 43 - aresponses 44 pytest-asyncio 45 pytestCheckHook 46 syrupy
··· 1 { lib 2 , aiohttp 3 + , aioresponses 4 , buildPythonPackage 5 , fetchFromGitHub 6 , poetry-core ··· 13 14 buildPythonPackage rec { 15 pname = "aiowithings"; 16 + version = "2.1.0"; 17 pyproject = true; 18 19 disabled = pythonOlder "3.11"; ··· 22 owner = "joostlek"; 23 repo = "python-withings"; 24 rev = "refs/tags/v${version}"; 25 + hash = "sha256-+pIIVCR+QsW9M3pH9Ss3dMvkeKM1OdhQ1y+s/T6pHtk="; 26 }; 27 28 postPatch = '' ··· 40 ]; 41 42 nativeCheckInputs = [ 43 + aioresponses 44 pytest-asyncio 45 pytestCheckHook 46 syrupy
+53
pkgs/development/python-modules/pystatgrab/default.nix
···
··· 1 + { lib 2 + , buildPythonPackage 3 + , cython 4 + , fetchFromGitHub 5 + , libstatgrab 6 + , pkg-config 7 + , pythonOlder 8 + , setuptools 9 + , unittestCheckHook 10 + , wheel 11 + }: 12 + 13 + buildPythonPackage rec { 14 + pname = "pystatgrab"; 15 + version = "0.7.2"; 16 + pyproject = true; 17 + 18 + disabled = pythonOlder "3.7"; 19 + 20 + src = fetchFromGitHub { 21 + owner = "libstatgrab"; 22 + repo = "pystatgrab"; 23 + rev = "PYSTATGRAB_${lib.replaceStrings ["."] ["_"] version}"; 24 + hash = "sha256-0FDhkIK8jy3/SFmCzrl9l4RTeIKDjO0o5UoODx6Wnfs="; 25 + }; 26 + 27 + nativeBuildInputs = [ 28 + cython 29 + pkg-config 30 + setuptools 31 + wheel 32 + ]; 33 + 34 + buildInputs = [ 35 + libstatgrab 36 + ]; 37 + 38 + nativeCheckInputs = [ 39 + unittestCheckHook 40 + ]; 41 + 42 + pythonImportsCheck = [ 43 + "statgrab" 44 + ]; 45 + 46 + meta = with lib; { 47 + description = "Python bindings for libstatgrab"; 48 + homepage = "https://github.com/libstatgrab/pystatgrab"; 49 + changelog = "https://github.com/libstatgrab/pystatgrab/blob/PYSTATGRAB_${lib.replaceStrings ["."] ["_"] version}/NEWS"; 50 + license = licenses.lgpl21Only; 51 + maintainers = with maintainers; [ fab ]; 52 + }; 53 + }
+1 -1
pkgs/development/tools/clj-kondo/default.nix
··· 29 license = licenses.epl10; 30 changelog = 31 "https://github.com/clj-kondo/clj-kondo/blob/v${version}/CHANGELOG.md"; 32 - maintainers = with maintainers; [ jlesquembre bandresen thiagokokada ]; 33 }; 34 }
··· 29 license = licenses.epl10; 30 changelog = 31 "https://github.com/clj-kondo/clj-kondo/blob/v${version}/CHANGELOG.md"; 32 + maintainers = with maintainers; [ jlesquembre bandresen ]; 33 }; 34 }
+5 -5
pkgs/development/tools/language-servers/lua-language-server/default.nix
··· 1 { lib, stdenv, fetchFromGitHub, ninja, makeWrapper, CoreFoundation, Foundation, ditto }: 2 3 - stdenv.mkDerivation rec { 4 pname = "lua-language-server"; 5 - version = "3.7.3"; 6 7 src = fetchFromGitHub { 8 owner = "luals"; 9 repo = "lua-language-server"; 10 - rev = version; 11 - hash = "sha256-iAxRGG7/zaUbJ/PWgmjxGS0UTq9/OXc8RWzlpUTUftc="; 12 fetchSubmodules = true; 13 }; 14 ··· 89 mainProgram = "lua-language-server"; 90 platforms = platforms.linux ++ platforms.darwin; 91 }; 92 - }
··· 1 { lib, stdenv, fetchFromGitHub, ninja, makeWrapper, CoreFoundation, Foundation, ditto }: 2 3 + stdenv.mkDerivation (finalAttrs: { 4 pname = "lua-language-server"; 5 + version = "3.7.4"; 6 7 src = fetchFromGitHub { 8 owner = "luals"; 9 repo = "lua-language-server"; 10 + rev = finalAttrs.version; 11 + hash = "sha256-wJOOzKM2pgxfRqx5WZjOcCyRapz0Sub3AYm51LRYpFU="; 12 fetchSubmodules = true; 13 }; 14 ··· 89 mainProgram = "lua-language-server"; 90 platforms = platforms.linux ++ platforms.darwin; 91 }; 92 + })
+19 -8
pkgs/development/tools/manifest-tool/default.nix
··· 9 10 buildGoModule rec { 11 pname = "manifest-tool"; 12 - version = "2.0.6"; 13 - gitCommit = "2ed9312726765567a84f2acc44a0c8a6e50f4b7a"; 14 modRoot = "v2"; 15 16 src = fetchFromGitHub { 17 owner = "estesp"; 18 repo = "manifest-tool"; 19 rev = "v${version}"; 20 - sha256 = "sha256-oopk++IdNF6msxOszT0fKxQABgWKbaQZ2aNH9chqWU0="; 21 leaveDotGit = true; 22 postFetch = '' 23 git -C $out rev-parse HEAD > $out/.git-revision ··· 29 30 nativeBuildInputs = [ git ]; 31 32 preConfigure = '' 33 - ldflags="-X main.gitCommit=$(cat .git-revision)" 34 ''; 35 36 - CGO_ENABLED = if stdenv.hostPlatform.isStatic then "0" else "1"; 37 - GO_EXTLINK_ENABLED = if stdenv.hostPlatform.isStatic then "0" else "1"; 38 - ldflags = lib.optionals stdenv.hostPlatform.isStatic [ "-w" "-extldflags" "-static" ]; 39 - tags = lib.optionals stdenv.hostPlatform.isStatic [ "netgo" ]; 40 41 passthru.tests.version = testers.testVersion { 42 package = manifest-tool;
··· 9 10 buildGoModule rec { 11 pname = "manifest-tool"; 12 + version = "2.1.5"; 13 modRoot = "v2"; 14 15 src = fetchFromGitHub { 16 owner = "estesp"; 17 repo = "manifest-tool"; 18 rev = "v${version}"; 19 + hash = "sha256-TCR8A35oETAZszrZFtNZulzCsh9UwGueTyHyYe+JQeI="; 20 leaveDotGit = true; 21 postFetch = '' 22 git -C $out rev-parse HEAD > $out/.git-revision ··· 28 29 nativeBuildInputs = [ git ]; 30 31 + ldflags = [ 32 + "-s" 33 + "-w" 34 + "-X main.version=${version}" 35 + ] ++ lib.optionals stdenv.hostPlatform.isStatic [ 36 + "-linkmode=external" 37 + "-extldflags" 38 + "-static" 39 + ]; 40 + 41 preConfigure = '' 42 + export ldflags+=" -X main.gitCommit=$(cat .git-revision)" 43 ''; 44 45 + tags = lib.optionals stdenv.hostPlatform.isStatic [ 46 + "cgo" 47 + "netgo" 48 + "osusergo" 49 + "static_build" 50 + ]; 51 52 passthru.tests.version = testers.testVersion { 53 package = manifest-tool;
+16 -16
pkgs/development/tools/misc/blackfire/php-probe.nix
··· 14 let 15 phpMajor = lib.versions.majorMinor php.version; 16 17 - version = "1.92.5"; 18 19 hashes = { 20 "x86_64-linux" = { 21 system = "amd64"; 22 hash = { 23 - "8.1" = "sha256-DT1ETsJGOebC0kt4zKiSMu/wF0TG2zUiNNh+Giokjz4="; 24 - "8.2" = "sha256-X/inhHAA34aQSycoSzT28jfntH3QTZgHPId5zYgcWT4="; 25 - "8.3" = "sha256-SHR+J+yFA2YxggdNPq2HtLkh9I3bG01TMk9EUKGkRM0="; 26 }; 27 }; 28 "i686-linux" = { 29 system = "i386"; 30 hash = { 31 - "8.1" = "sha256-7aDO6shHWIAgby8qCwpc7aICnWyYvferqjDgtnYZCeI="; 32 - "8.2" = "sha256-mpHS9zUjgJnxvi3np2sUS0GhtOjhDOzlepRByYbjUCk="; 33 - "8.3" = "sha256-75C9NwMuUTNuAfdPRgtq4XK6bqo/IRa/SXfM7Wz2y90="; 34 }; 35 }; 36 "aarch64-linux" = { 37 system = "arm64"; 38 hash = { 39 - "8.1" = "sha256-Vj2rnKik+Fy+9yfbUMSOoiXTGm84YNPo1cfh9hojr9c="; 40 - "8.2" = "sha256-lvWwwKJj3/ZxAQcnbcjv/0CLqDDRiOkFo2rJeMhZLHQ="; 41 - "8.3" = "sha256-yqa5GE/FBINR3oFNTP1IZGnhSDYCfluRiEFiTSySjns="; 42 }; 43 }; 44 "aarch64-darwin" = { 45 system = "arm64"; 46 hash = { 47 - "8.1" = "sha256-OcQtr16Qt6TsxPBG3OY/viGXqknKx5GdM/fcCJlFiaY="; 48 - "8.2" = "sha256-ay/6JwB959bT2f18LGMB5560dIPAPSAY5Nby44FGBMc="; 49 - "8.3" = "sha256-7yyhcusin7pLYZqjUgyIkDGmufIPX8cKWqplXetZzMU="; 50 }; 51 }; 52 "x86_64-darwin" = { 53 system = "amd64"; 54 hash = { 55 - "8.1" = "sha256-l0xgj0tAjYNI0EwoZhnGpRadg5EJtBlt5WhylmZaGDg="; 56 - "8.2" = "sha256-lD6lE6u9nzHhHPTPLoGKaDsZlvrpbshd+4fr4ua8H8c="; 57 - "8.3" = "sha256-CMPv+pDPJVwQ4gDAnQxyeJXp4YYkwAVoSdS3a+49fDU="; 58 }; 59 }; 60 };
··· 14 let 15 phpMajor = lib.versions.majorMinor php.version; 16 17 + version = "1.92.6"; 18 19 hashes = { 20 "x86_64-linux" = { 21 system = "amd64"; 22 hash = { 23 + "8.1" = "sha256-ygBgs6tGZyim69tCol+tTXV5Lt/JLuatmKAo9aomM1s="; 24 + "8.2" = "sha256-TrT7H2Tbu4ZrfeCUjpqlTMw9DAxS62aLvzTbpAdsZOc="; 25 + "8.3" = "sha256-AH/kYlpVjCwXxNa90Qe5XpzAdSyNn9jdeyYTLlXxfLI="; 26 }; 27 }; 28 "i686-linux" = { 29 system = "i386"; 30 hash = { 31 + "8.1" = "sha256-c1i6eq7l4LeUpuZCsYzS1N++IU4j0WydCxPokSJf6dI="; 32 + "8.2" = "sha256-gWhyUQ3QP13klusSv7KWdHatnjy/4k17VvHJUCtqF1g="; 33 + "8.3" = "sha256-kI3sVcI/bDVRMcjzPzlai1D2HvmBTXwQ3DF5zcp2GJk="; 34 }; 35 }; 36 "aarch64-linux" = { 37 system = "arm64"; 38 hash = { 39 + "8.1" = "sha256-1QPKTNOsJTrx+Q0MigiMBDCC7X3YlSDB33gy8DU9KBg="; 40 + "8.2" = "sha256-e3YUAOLWSmsiHczb44oRiOIafMSBWQaJY+m4OSUMzV8="; 41 + "8.3" = "sha256-h0/ZEy6IkIpAfeL0Al7a+FpPeX2KMSd7zD1i1ew5rUk="; 42 }; 43 }; 44 "aarch64-darwin" = { 45 system = "arm64"; 46 hash = { 47 + "8.1" = "sha256-gLCPTTCfoBgp3GgKzVisfGlxQsYa+4x2WDwvhwcf1R8="; 48 + "8.2" = "sha256-OtWUwkeLGfxkxjGSDMyv61UVoSwFo1puGjmwYOB51nI="; 49 + "8.3" = "sha256-M3lz0TnTuJVgD32RS3ffcZsKVJdyx75AjSKFkkODiSE="; 50 }; 51 }; 52 "x86_64-darwin" = { 53 system = "amd64"; 54 hash = { 55 + "8.1" = "sha256-dVau4kieQsj4m97Sepw1jMRtf1VCUnvZEJjVsO+hFWs="; 56 + "8.2" = "sha256-HRBVr4JTiZDRzIt6JfITD5N824Ivcag6DUyEhsc23co="; 57 + "8.3" = "sha256-nRRG42/Yhsupln4j7nWlKvfQ067fwQ17un1yXplPf14="; 58 }; 59 }; 60 };
+3 -3
pkgs/development/tools/rust/cargo-careful/default.nix
··· 5 6 rustPlatform.buildRustPackage rec { 7 pname = "cargo-careful"; 8 - version = "0.4.0"; 9 10 src = fetchFromGitHub { 11 owner = "RalfJung"; 12 repo = "cargo-careful"; 13 rev = "v${version}"; 14 - hash = "sha256-5FteKVlEx5NSj3lzRRj3qerkyK+UdJfTWtG6xEzI4t4="; 15 }; 16 17 - cargoHash = "sha256-gs8o+tWvC4cgIITpfvJqfTquyYaEbvNMeZEJKFzd83I="; 18 19 meta = with lib; { 20 description = "A tool to execute Rust code carefully, with extra checking along the way";
··· 5 6 rustPlatform.buildRustPackage rec { 7 pname = "cargo-careful"; 8 + version = "0.4.1"; 9 10 src = fetchFromGitHub { 11 owner = "RalfJung"; 12 repo = "cargo-careful"; 13 rev = "v${version}"; 14 + hash = "sha256-oiwR6NgHHu9B1L6dSK6KZfgcSdwBPEzUZONwPHr0a4k="; 15 }; 16 17 + cargoHash = "sha256-sVIAY9eYlpyS/PU6kLInc4hMeD3qcewoMbTH+wTIBuI="; 18 19 meta = with lib; { 20 description = "A tool to execute Rust code carefully, with extra checking along the way";
+4 -4
pkgs/games/anki/bin.nix
··· 3 let 4 pname = "anki-bin"; 5 # Update hashes for both Linux and Darwin! 6 - version = "23.10.1"; 7 8 sources = { 9 linux = fetchurl { 10 url = "https://github.com/ankitects/anki/releases/download/${version}/anki-${version}-linux-qt6.tar.zst"; 11 - sha256 = "sha256-Kv0SH+bLnBSM/tYHe2kEJc4n7izZTBNWQs2nm/teLEU="; 12 }; 13 14 # For some reason anki distributes completely separate dmg-files for the aarch64 version and the x86_64 version 15 darwin-x86_64 = fetchurl { 16 url = "https://github.com/ankitects/anki/releases/download/${version}/anki-${version}-mac-intel-qt6.dmg"; 17 - sha256 = "sha256-MSlKsEv4N/H7G1bUOBlPBXerpHIW32P6Va02aRq1+54="; 18 }; 19 darwin-aarch64 = fetchurl { 20 url = "https://github.com/ankitects/anki/releases/download/${version}/anki-${version}-mac-apple-qt6.dmg"; 21 - sha256 = "sha256-jEm9WJBXx77KpldzBuxK1Pu6VGiARZPnRmMhEjZdm1I="; 22 }; 23 }; 24
··· 3 let 4 pname = "anki-bin"; 5 # Update hashes for both Linux and Darwin! 6 + version = "23.12.1"; 7 8 sources = { 9 linux = fetchurl { 10 url = "https://github.com/ankitects/anki/releases/download/${version}/anki-${version}-linux-qt6.tar.zst"; 11 + sha256 = "sha256-bFtAUqSoFS8CWESiepWXywndkijATbWp6CJdqlQecuk="; 12 }; 13 14 # For some reason anki distributes completely separate dmg-files for the aarch64 version and the x86_64 version 15 darwin-x86_64 = fetchurl { 16 url = "https://github.com/ankitects/anki/releases/download/${version}/anki-${version}-mac-intel-qt6.dmg"; 17 + sha256 = "sha256-z48REB14p7rb50ty9u/26wx0sY4QZb4pj6wOXsSBCdg="; 18 }; 19 darwin-aarch64 = fetchurl { 20 url = "https://github.com/ankitects/anki/releases/download/${version}/anki-${version}-mac-apple-qt6.dmg"; 21 + sha256 = "sha256-bdaCqSjje86wmVKIFZqzuFaEZ7SWQr7CAS/Hm1CpOMg="; 22 }; 23 }; 24
+1 -1
pkgs/os-specific/linux/amdctl/default.nix
··· 26 description = "Set P-State voltages and clock speeds on recent AMD CPUs on Linux."; 27 homepage = "https://github.com/kevinlekiller/amdctl"; 28 license = licenses.gpl3Plus; 29 - maintainers = with maintainers; [ thiagokokada ]; 30 platforms = [ "x86_64-linux" ]; 31 }; 32 }
··· 26 description = "Set P-State voltages and clock speeds on recent AMD CPUs on Linux."; 27 homepage = "https://github.com/kevinlekiller/amdctl"; 28 license = licenses.gpl3Plus; 29 + maintainers = with maintainers; [ ]; 30 platforms = [ "x86_64-linux" ]; 31 }; 32 }
+25 -11
pkgs/os-specific/linux/kernel/README.md
··· 4 5 2. Add the new kernel to the `kernels` attribute set in [`linux-kernels.nix`](./linux-kernels.nix) (e.g., create an attribute `kernel_2_6_22`). 6 7 - 3. Update the kernel configuration. First unpack the kernel. Then for each supported platform (`i686`, `x86_64`, `uml`) do the following: 8 9 - 1. Make a copy from the old config (e.g., `config-2.6.21-i686-smp`) to the new one (e.g., `config-2.6.22-i686-smp`). 10 11 - 2. Copy the config file for this platform (e.g., `config-2.6.22-i686-smp`) to `.config` in the kernel source tree. 12 13 - 3. Run `make oldconfig ARCH={i386,x86_64,um}` and answer all questions. (For the uml configuration, also add `SHELL=bash`.) Make sure to keep the configuration consistent between platforms (i.e., don’t enable some feature on `i686` and disable it on `x86_64`). 14 15 - 4. If needed, you can also run `make menuconfig`: 16 17 - ```ShellSession 18 - $ nix-env -f "<nixpkgs>" -iA ncurses 19 - $ export NIX_CFLAGS_LINK=-lncurses 20 - $ make menuconfig ARCH=arch 21 - ``` 22 23 - 5. Copy `.config` over the new config file (e.g., `config-2.6.22-i686-smp`). 24 25 4. Test building the kernel: 26
··· 4 5 2. Add the new kernel to the `kernels` attribute set in [`linux-kernels.nix`](./linux-kernels.nix) (e.g., create an attribute `kernel_2_6_22`). 6 7 + 3. Update the kernel configuration: 8 9 + 1. While in the Nixpkgs repository, enter the development shell for that kernel: 10 11 + ```console 12 + $ nix-shell -A linuxKernel.kernels.linux_2_6_22 13 + ``` 14 15 + 2. Unpack the kernel: 16 17 + ```console 18 + [nix-shell]$ pushd $(mktemp -d) 19 + [nix-shell]$ unpackPhase 20 + ``` 21 22 + 3. For each supported platform (`i686`, `x86_64`, `uml`) do the following: 23 + 24 + 1. Make a copy from the old config (e.g., `config-2.6.21-i686-smp`) to the new one (e.g., `config-2.6.22-i686-smp`). 25 + 26 + 2. Copy the config file for this platform (e.g., `config-2.6.22-i686-smp`) to `.config` in the unpacked kernel source tree. 27 28 + 3. Run `make oldconfig ARCH={i386,x86_64,um}` and answer all questions. (For the uml configuration, also add `SHELL=bash`.) Make sure to keep the configuration consistent between platforms (i.e., don’t enable some feature on `i686` and disable it on `x86_64`). 29 + 30 + 4. If needed, you can also run `make menuconfig`: 31 + 32 + ```ShellSession 33 + $ nix-shell -p ncurses pkg-config 34 + $ make menuconfig ARCH=arch 35 + ``` 36 + 37 + 5. Copy `.config` over the new config file (e.g., `config-2.6.22-i686-smp`). 38 39 4. Test building the kernel: 40
+4
pkgs/os-specific/linux/kernel/kernels-org.json
··· 30 "6.6": { 31 "version": "6.6.10", 32 "hash": "sha256:0v2l0l90w7scv7bxkxxjgqnay0fjh678k9gdlgycgbh9q7j2grly" 33 } 34 }
··· 30 "6.6": { 31 "version": "6.6.10", 32 "hash": "sha256:0v2l0l90w7scv7bxkxxjgqnay0fjh678k9gdlgycgbh9q7j2grly" 33 + }, 34 + "6.7": { 35 + "version": "6.7", 36 + "hash": "sha256:0s8hbcsg7fdvspqam8kzcxygjsznr4zfi60nqgc81l3n4m518cgg" 37 } 38 }
+2 -3
pkgs/os-specific/linux/kmod-blacklist-ubuntu/default.nix
··· 1 { lib, stdenv, fetchurl }: 2 3 let 4 - version = "28-1ubuntu4"; # impish 2021-06-24 5 6 in stdenv.mkDerivation { 7 pname = "kmod-blacklist"; ··· 9 10 src = fetchurl { 11 url = "https://launchpad.net/ubuntu/+archive/primary/+files/kmod_${version}.debian.tar.xz"; 12 - sha256 = "sha256-K8tWpaLmCm3Jcxw3OZ+D7Koiug7epooRn1YMfqjGAiw="; 13 }; 14 15 installPhase = '' ··· 22 done 23 24 substituteInPlace "$out"/modprobe.conf \ 25 - --replace "blacklist bochs-drm" "" \ 26 --replace /sbin/lsmod /run/booted-system/sw/bin/lsmod \ 27 --replace /sbin/rmmod /run/booted-system/sw/bin/rmmod \ 28 --replace /sbin/modprobe /run/booted-system/sw/bin/modprobe \
··· 1 { lib, stdenv, fetchurl }: 2 3 let 4 + version = "30+20230519-1ubuntu3"; # mantic 2023-08-26 5 6 in stdenv.mkDerivation { 7 pname = "kmod-blacklist"; ··· 9 10 src = fetchurl { 11 url = "https://launchpad.net/ubuntu/+archive/primary/+files/kmod_${version}.debian.tar.xz"; 12 + hash = "sha256-VGw1/rUjl9/j6026ut0dvC0/8maAAz8umb0D3YGf8p4="; 13 }; 14 15 installPhase = '' ··· 22 done 23 24 substituteInPlace "$out"/modprobe.conf \ 25 --replace /sbin/lsmod /run/booted-system/sw/bin/lsmod \ 26 --replace /sbin/rmmod /run/booted-system/sw/bin/rmmod \ 27 --replace /sbin/modprobe /run/booted-system/sw/bin/modprobe \
+4 -5
pkgs/os-specific/linux/kmod-debian-aliases/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "kmod-debian-aliases.conf"; 5 - version = "22-1.1"; 6 7 src = fetchurl { 8 - url = "https://snapshot.debian.org/archive/debian/20160404T220610Z/pool/main/k/kmod/kmod_${version}.debian.tar.xz"; 9 - sha256 = "0daap2n4bvjqcnksaayy6csmdb1px4r02w3xp36bcp6w3lbnqamh"; 10 }; 11 12 installPhase = '' 13 - patch -i patches/aliases_conf 14 - cp aliases.conf $out 15 ''; 16 17 meta = with lib; {
··· 2 3 stdenv.mkDerivation rec { 4 pname = "kmod-debian-aliases.conf"; 5 + version = "30+20230601-2"; 6 7 src = fetchurl { 8 + url = "https://snapshot.debian.org/archive/debian/20231117T085632Z/pool/main/k/kmod/kmod_${version}.debian.tar.xz"; 9 + hash = "sha256-xJMGKht8hu0aQjN9TER87Rv5EYkVMeDfX/jJ8+UjAqM="; 10 }; 11 12 installPhase = '' 13 + cp extra/aliases.conf $out 14 ''; 15 16 meta = with lib; {
+1 -1
pkgs/tools/archivers/unar/default.nix
··· 94 ADF, DMS, LZX, PowerPacker, LBR, Squeeze, Crunch, and other old formats. 95 ''; 96 license = licenses.lgpl21Plus; 97 - maintainers = with maintainers; [ peterhoeg thiagokokada ]; 98 platforms = platforms.unix; 99 }; 100 }
··· 94 ADF, DMS, LZX, PowerPacker, LBR, Squeeze, Crunch, and other old formats. 95 ''; 96 license = licenses.lgpl21Plus; 97 + maintainers = with maintainers; [ peterhoeg ]; 98 platforms = platforms.unix; 99 }; 100 }
+3 -3
pkgs/tools/misc/dua/default.nix
··· 7 8 rustPlatform.buildRustPackage rec { 9 pname = "dua"; 10 - version = "2.24.2"; 11 12 src = fetchFromGitHub { 13 owner = "Byron"; 14 repo = "dua-cli"; 15 rev = "v${version}"; 16 - hash = "sha256-1rGzgKusUKlkH/Ew8qDzq143mu+gvSlXTcqL+I+ypSY="; 17 # Remove unicode file names which leads to different checksums on HFS+ 18 # vs. other filesystems because of unicode normalisation. 19 postFetch = '' ··· 21 ''; 22 }; 23 24 - cargoHash = "sha256-+GHVZNuEpOxu29EuHOshrYyhg1HFcYJjC4MnFJgjw38="; 25 26 buildInputs = lib.optionals stdenv.isDarwin [ 27 darwin.apple_sdk.frameworks.Foundation
··· 7 8 rustPlatform.buildRustPackage rec { 9 pname = "dua"; 10 + version = "2.26.0"; 11 12 src = fetchFromGitHub { 13 owner = "Byron"; 14 repo = "dua-cli"; 15 rev = "v${version}"; 16 + hash = "sha256-+7pf87mmT5KB4KtKzZXYnV6GwMzb6ieXjBVZpvmQ3eU="; 17 # Remove unicode file names which leads to different checksums on HFS+ 18 # vs. other filesystems because of unicode normalisation. 19 postFetch = '' ··· 21 ''; 22 }; 23 24 + cargoHash = "sha256-5n6zjuoL5v3ieP8eOzvyJf/YDmQ+MuGMk3T/8rHKQVE="; 25 26 buildInputs = lib.optionals stdenv.isDarwin [ 27 darwin.apple_sdk.frameworks.Foundation
+1 -8
pkgs/tools/misc/partition-manager/default.nix pkgs/applications/kde/partitionmanager/default.nix
··· 65 ]; 66 67 in 68 - mkDerivation rec { 69 pname = "partitionmanager"; 70 - # NOTE: When changing this version, also change the version of `kpmcore`. 71 - version = "23.04.1"; 72 - 73 - src = fetchurl { 74 - url = "mirror://kde/stable/release-service/${version}/src/${pname}-${version}.tar.xz"; 75 - hash = "sha256-iMf6/QOJIDTKHAsCg3ey4GX0QHwrYl2LcCWxZsolMl8="; 76 - }; 77 78 nativeBuildInputs = [ extra-cmake-modules kdoctools wrapGAppsHook ]; 79
··· 65 ]; 66 67 in 68 + mkDerivation { 69 pname = "partitionmanager"; 70 71 nativeBuildInputs = [ extra-cmake-modules kdoctools wrapGAppsHook ]; 72
+2 -2
pkgs/tools/security/mitmproxy2swagger/default.nix
··· 5 6 python3.pkgs.buildPythonApplication rec { 7 pname = "mitmproxy2swagger"; 8 - version = "0.11.0"; 9 format = "pyproject"; 10 11 src = fetchFromGitHub { 12 owner = "alufers"; 13 repo = pname; 14 rev = "refs/tags/${version}"; 15 - hash = "sha256-NwU3GtnWL90gSCbPbGnkbLX/o77NZJ4t4xME8dhWEbA="; 16 }; 17 18 nativeBuildInputs = with python3.pkgs; [
··· 5 6 python3.pkgs.buildPythonApplication rec { 7 pname = "mitmproxy2swagger"; 8 + version = "0.13.0"; 9 format = "pyproject"; 10 11 src = fetchFromGitHub { 12 owner = "alufers"; 13 repo = pname; 14 rev = "refs/tags/${version}"; 15 + hash = "sha256-VHxqxee5sQWRS13V4SfY4LWaN0oxxWsNVDOEqUyKHfg="; 16 }; 17 18 nativeBuildInputs = with python3.pkgs; [
+1 -2
pkgs/tools/text/difftastic/Cargo.lock
··· 253 254 [[package]] 255 name = "difftastic" 256 - version = "0.53.1" 257 dependencies = [ 258 "aho-corasick", 259 "assert_cmd", ··· 266 "hashbrown 0.12.3", 267 "humansize", 268 "ignore", 269 - "is-terminal", 270 "itertools 0.11.0", 271 "lazy_static", 272 "libc",
··· 253 254 [[package]] 255 name = "difftastic" 256 + version = "0.54.0" 257 dependencies = [ 258 "aho-corasick", 259 "assert_cmd", ··· 266 "hashbrown 0.12.3", 267 "humansize", 268 "ignore", 269 "itertools 0.11.0", 270 "lazy_static", 271 "libc",
+2 -2
pkgs/tools/text/difftastic/default.nix
··· 17 18 rustPlatform.buildRustPackage rec { 19 pname = "difftastic"; 20 - version = "0.53.1"; 21 22 src = fetchFromGitHub { 23 owner = "wilfred"; 24 repo = pname; 25 rev = version; 26 - hash = "sha256-D//LMfwk2n5jGOXhix2jZyoppYMxVkTkg4HuNHCtHNI="; 27 }; 28 29 cargoLock = {
··· 17 18 rustPlatform.buildRustPackage rec { 19 pname = "difftastic"; 20 + version = "0.54.0"; 21 22 src = fetchFromGitHub { 23 owner = "wilfred"; 24 repo = pname; 25 rev = version; 26 + hash = "sha256-1QnDBRhJGzKKMmvnwVoi8rTd6acBFO0hITF9d1HkizM="; 27 }; 28 29 cargoLock = {
+1 -1
pkgs/tools/virtualization/guestfs-tools/default.nix
··· 111 description = "Extra tools for accessing and modifying virtual machine disk images"; 112 license = with licenses; [ gpl2Plus lgpl21Plus ]; 113 homepage = "https://libguestfs.org/"; 114 - maintainers = with maintainers; [ thiagokokada ]; 115 platforms = platforms.linux; 116 }; 117 }
··· 111 description = "Extra tools for accessing and modifying virtual machine disk images"; 112 license = with licenses; [ gpl2Plus lgpl21Plus ]; 113 homepage = "https://libguestfs.org/"; 114 + maintainers = with maintainers; [ ]; 115 platforms = platforms.linux; 116 }; 117 }
+1 -1
pkgs/tools/wayland/wl-clip-persist/default.nix
··· 35 inherit (wayland.meta) platforms; 36 license = licenses.mit; 37 mainProgram = "wl-clip-persist"; 38 - maintainers = with maintainers; [ thiagokokada ]; 39 }; 40 }
··· 35 inherit (wayland.meta) platforms; 36 license = licenses.mit; 37 mainProgram = "wl-clip-persist"; 38 + maintainers = with maintainers; [ ]; 39 }; 40 }
+1
pkgs/top-level/aliases.nix
··· 759 paperless-ng = paperless-ngx; # Added 2022-04-11 760 paper-note = throw "paper-note has been removed: abandoned by upstream"; # Added 2023-05-03 761 parity = openethereum; # Added 2020-08-01 762 pash = throw "'pash' has been removed: abandoned by upstream. Use 'powershell' instead"; # Added 2023-09-16 763 pcsctools = pcsc-tools; # Added 2023-12-07 764 pdf2xml = throw "'pdf2xml' was removed: abandoned for years."; # Added 2023-10-22
··· 759 paperless-ng = paperless-ngx; # Added 2022-04-11 760 paper-note = throw "paper-note has been removed: abandoned by upstream"; # Added 2023-05-03 761 parity = openethereum; # Added 2020-08-01 762 + partition-manager = libsForQt5.partitionmanager; # Added 2024-01-08 763 pash = throw "'pash' has been removed: abandoned by upstream. Use 'powershell' instead"; # Added 2023-09-16 764 pcsctools = pcsc-tools; # Added 2023-12-07 765 pdf2xml = throw "'pdf2xml' was removed: abandoned for years."; # Added 2023-10-22
-2
pkgs/top-level/all-packages.nix
··· 9863 9864 krakenx = callPackage ../tools/system/krakenx { }; 9865 9866 - partition-manager = libsForQt5.callPackage ../tools/misc/partition-manager { }; 9867 - 9868 kpcli = callPackage ../tools/security/kpcli { }; 9869 9870 kphotoalbum = libsForQt5.callPackage ../applications/graphics/kphotoalbum { };
··· 9863 9864 krakenx = callPackage ../tools/system/krakenx { }; 9865 9866 kpcli = callPackage ../tools/security/kpcli { }; 9867 9868 kphotoalbum = libsForQt5.callPackage ../applications/graphics/kphotoalbum { };
+10 -1
pkgs/top-level/linux-kernels.nix
··· 185 ]; 186 }; 187 188 linux_testing = let 189 testing = callPackage ../os-specific/linux/kernel/mainline.nix { 190 # A special branch that tracks the kernel under the release process ··· 586 linux_6_1 = recurseIntoAttrs (packagesFor kernels.linux_6_1); 587 linux_6_5 = recurseIntoAttrs (packagesFor kernels.linux_6_5); 588 linux_6_6 = recurseIntoAttrs (packagesFor kernels.linux_6_6); 589 __attrsFailEvaluation = true; 590 } // lib.optionalAttrs config.allowAliases { 591 linux_4_9 = throw "linux 4.9 was removed because it will reach its end of life within 22.11"; # Added 2022-11-08 ··· 650 packageAliases = { 651 linux_default = packages.linux_6_1; 652 # Update this when adding the newest kernel major version! 653 - linux_latest = packages.linux_6_6; 654 linux_mptcp = throw "'linux_mptcp' has been moved to https://github.com/teto/mptcp-flake"; 655 linux_rt_default = packages.linux_rt_5_4; 656 linux_rt_latest = packages.linux_rt_6_1;
··· 185 ]; 186 }; 187 188 + linux_6_7 = callPackage ../os-specific/linux/kernel/mainline.nix { 189 + branch = "6.7"; 190 + kernelPatches = [ 191 + kernelPatches.bridge_stp_helper 192 + kernelPatches.request_key_helper 193 + ]; 194 + }; 195 + 196 linux_testing = let 197 testing = callPackage ../os-specific/linux/kernel/mainline.nix { 198 # A special branch that tracks the kernel under the release process ··· 594 linux_6_1 = recurseIntoAttrs (packagesFor kernels.linux_6_1); 595 linux_6_5 = recurseIntoAttrs (packagesFor kernels.linux_6_5); 596 linux_6_6 = recurseIntoAttrs (packagesFor kernels.linux_6_6); 597 + linux_6_7 = recurseIntoAttrs (packagesFor kernels.linux_6_7); 598 __attrsFailEvaluation = true; 599 } // lib.optionalAttrs config.allowAliases { 600 linux_4_9 = throw "linux 4.9 was removed because it will reach its end of life within 22.11"; # Added 2022-11-08 ··· 659 packageAliases = { 660 linux_default = packages.linux_6_1; 661 # Update this when adding the newest kernel major version! 662 + linux_latest = packages.linux_6_7; 663 linux_mptcp = throw "'linux_mptcp' has been moved to https://github.com/teto/mptcp-flake"; 664 linux_rt_default = packages.linux_rt_5_4; 665 linux_rt_latest = packages.linux_rt_6_1;
+2
pkgs/top-level/python-packages.nix
··· 11321 11322 pystardict = callPackage ../development/python-modules/pystardict { }; 11323 11324 pystemd = callPackage ../development/python-modules/pystemd { 11325 inherit (pkgs) systemd; 11326 };
··· 11321 11322 pystardict = callPackage ../development/python-modules/pystardict { }; 11323 11324 + pystatgrab = callPackage ../development/python-modules/pystatgrab { }; 11325 + 11326 pystemd = callPackage ../development/python-modules/pystemd { 11327 inherit (pkgs) systemd; 11328 };
-2
pkgs/top-level/qt5-packages.nix
··· 168 169 libqaccessibilityclient = callPackage ../development/libraries/libqaccessibilityclient { }; 170 171 - kpmcore = callPackage ../development/libraries/kpmcore { }; 172 - 173 mapbox-gl-native = libsForQt5.callPackage ../development/libraries/mapbox-gl-native { }; 174 175 mapbox-gl-qml = libsForQt5.callPackage ../development/libraries/mapbox-gl-qml { };
··· 168 169 libqaccessibilityclient = callPackage ../development/libraries/libqaccessibilityclient { }; 170 171 mapbox-gl-native = libsForQt5.callPackage ../development/libraries/mapbox-gl-native { }; 172 173 mapbox-gl-qml = libsForQt5.callPackage ../development/libraries/mapbox-gl-qml { };
+1
pkgs/top-level/release-haskell.nix
··· 333 nota 334 nvfetcher 335 ormolu 336 pandoc 337 petrinizer 338 place-cursor-at
··· 333 nota 334 nvfetcher 335 ormolu 336 + pakcs 337 pandoc 338 petrinizer 339 place-cursor-at
-4
pkgs/top-level/release.nix
··· 158 jobs.tests.cc-wrapper.llvmPackages.libcxx.x86_64-linux 159 jobs.tests.cc-wrapper.llvmPackages_6.clang.x86_64-linux 160 jobs.tests.cc-wrapper.llvmPackages_6.libcxx.x86_64-linux 161 - jobs.tests.cc-wrapper.llvmPackages_7.clang.x86_64-linux 162 - jobs.tests.cc-wrapper.llvmPackages_7.libcxx.x86_64-linux 163 - jobs.tests.cc-wrapper.llvmPackages_7.clang.x86_64-linux 164 - jobs.tests.cc-wrapper.llvmPackages_7.libcxx.x86_64-linux 165 jobs.tests.cc-multilib-gcc.x86_64-linux 166 jobs.tests.cc-multilib-clang.x86_64-linux 167 jobs.tests.stdenv-inputs.x86_64-linux
··· 158 jobs.tests.cc-wrapper.llvmPackages.libcxx.x86_64-linux 159 jobs.tests.cc-wrapper.llvmPackages_6.clang.x86_64-linux 160 jobs.tests.cc-wrapper.llvmPackages_6.libcxx.x86_64-linux 161 jobs.tests.cc-multilib-gcc.x86_64-linux 162 jobs.tests.cc-multilib-clang.x86_64-linux 163 jobs.tests.stdenv-inputs.x86_64-linux