Merge master into staging-next

authored by nixpkgs-ci[bot] and committed by GitHub f2e2b181 fa53ef64

+912 -367
+1 -1
.github/workflows/codeowners-v2.yml
··· 47 47 steps: 48 48 - uses: cachix/install-nix-action@08dcb3a5e62fa31e2da3d490afc4176ef55ecd72 # v30 49 49 50 - - uses: cachix/cachix-action@ad2ddac53f961de1989924296a1f236fcfbaa4fc # v15 50 + - uses: cachix/cachix-action@0fc020193b5a1fa3ac4575aa3a7d3aa6a35435ad # v16 51 51 with: 52 52 # This cache is for the nixpkgs repo checks and should not be trusted or used elsewhere. 53 53 name: nixpkgs-ci
+1 -1
.github/workflows/manual-nixos-v2.yml
··· 26 26 with: 27 27 extra_nix_config: sandbox = true 28 28 29 - - uses: cachix/cachix-action@ad2ddac53f961de1989924296a1f236fcfbaa4fc # v15 29 + - uses: cachix/cachix-action@0fc020193b5a1fa3ac4575aa3a7d3aa6a35435ad # v16 30 30 if: github.repository_owner == 'NixOS' 31 31 with: 32 32 # This cache is for the nixpkgs repo checks and should not be trusted or used elsewhere.
+1 -1
.github/workflows/manual-nixpkgs-v2.yml
··· 24 24 with: 25 25 extra_nix_config: sandbox = true 26 26 27 - - uses: cachix/cachix-action@ad2ddac53f961de1989924296a1f236fcfbaa4fc # v15 27 + - uses: cachix/cachix-action@0fc020193b5a1fa3ac4575aa3a7d3aa6a35435ad # v16 28 28 if: github.repository_owner == 'NixOS' 29 29 with: 30 30 # This cache is for the nixpkgs repo checks and should not be trusted or used elsewhere.
+2
nixos/doc/manual/release-notes/rl-2505.section.md
··· 142 142 143 143 - [victorialogs][https://docs.victoriametrics.com/victorialogs/], log database from VictoriaMetrics. Available as [services.victorialogs](#opt-services.victorialogs.enable) 144 144 145 + - [gokapi](https://github.com/Forceu/Gokapi), Lightweight selfhosted Firefox Send alternative without public upload. AWS S3 supported. Available with [services.gokapi](options.html#opt-services.gokapi.enable) 146 + 145 147 - [nostr-rs-relay](https://git.sr.ht/~gheartsfield/nostr-rs-relay/), This is a nostr relay, written in Rust. Available as [services.nostr-rs-relay](options.html#opt-services.nostr-rs-relay.enable). 146 148 147 149 - [Prometheus Node Cert Exporter](https://github.com/amimof/node-cert-exporter), a prometheus exporter to check for SSL cert expiry. Available under [services.prometheus.exporters.node-cert](#opt-services.prometheus.exporters.node-cert.enable).
+1
nixos/modules/module-list.nix
··· 1118 1118 ./services/networking/go-neb.nix 1119 1119 ./services/networking/go-shadowsocks2.nix 1120 1120 ./services/networking/gobgpd.nix 1121 + ./services/networking/gokapi.nix 1121 1122 ./services/networking/gvpe.nix 1122 1123 ./services/networking/hans.nix 1123 1124 ./services/networking/harmonia.nix
+1 -6
nixos/modules/profiles/perlless.nix
··· 8 8 services.userborn.enable = lib.mkDefault true; 9 9 10 10 # Random perl remnants 11 - system.disableInstallerTools = lib.mkDefault true; 11 + system.tools.nixos-generate-config.enable = lib.mkDefault false; 12 12 programs.less.lessopen = lib.mkDefault null; 13 13 programs.command-not-found.enable = lib.mkDefault false; 14 14 boot.enableContainers = lib.mkDefault false; ··· 20 20 # Check that the system does not contain a Nix store path that contains the 21 21 # string "perl". 22 22 system.forbiddenDependenciesRegexes = [ "perl" ]; 23 - 24 - # Re-add nixos-rebuild to the systemPackages that was removed by the 25 - # `system.disableInstallerTools` option. 26 - environment.systemPackages = [ pkgs.nixos-rebuild ]; 27 - 28 23 }
+1 -1
nixos/modules/services/continuous-integration/hydra/default.nix
··· 520 520 elif [[ $compression == zstd ]]; then 521 521 compressionCmd=(zstd --rm) 522 522 fi 523 - find ${baseDir}/build-logs -type f -name "*.drv" -mtime +3 -size +0c -print0 | xargs -0 -r "''${compressionCmd[@]}" --force --quiet 523 + find ${baseDir}/build-logs -ignore_readdir_race -type f -name "*.drv" -mtime +3 -size +0c -print0 | xargs -0 -r "''${compressionCmd[@]}" --force --quiet 524 524 ''; 525 525 startAt = "Sun 01:45"; 526 526 serviceConfig.Slice = "system-hydra.slice";
+1 -1
nixos/modules/services/misc/jackett.nix
··· 86 86 ProtectProc = "invisible"; 87 87 ProtectSystem = "strict"; 88 88 ReadWritePaths = [ 89 - "${config.users.users.${cfg.user}.home}" 89 + cfg.dataDir 90 90 ]; 91 91 RemoveIPC = true; 92 92 RestrictAddressFamilies = [
+1 -1
nixos/modules/services/networking/birdwatcher.nix
··· 59 59 [bird] 60 60 listen = "0.0.0.0:29184" 61 61 config = "/etc/bird/bird.conf" 62 - birdc = "''${pkgs.bird}/bin/birdc" 62 + birdc = "''${pkgs.bird2}/bin/birdc" 63 63 ttl = 5 # time to live (in minutes) for caching of cli output 64 64 65 65 [parser]
+143
nixos/modules/services/networking/gokapi.nix
··· 1 + { 2 + config, 3 + lib, 4 + pkgs, 5 + ... 6 + }: 7 + 8 + let 9 + cfg = config.services.gokapi; 10 + settingsFormat = pkgs.formats.json { }; 11 + userSettingsFile = settingsFormat.generate "generated-config.json" cfg.settings; 12 + in 13 + { 14 + options.services.gokapi = { 15 + enable = lib.mkEnableOption "Lightweight selfhosted Firefox Send alternative without public upload"; 16 + 17 + mutableSettings = lib.mkOption { 18 + type = lib.types.bool; 19 + default = true; 20 + description = '' 21 + Allow changes to the program config made by the program to persist between restarts. 22 + If disabled all required values must be set using nix, and all changes to config format over application updates must be resolved by user. 23 + ''; 24 + }; 25 + 26 + package = lib.mkPackageOption pkgs "gokapi" { }; 27 + 28 + environment = lib.mkOption { 29 + type = lib.types.submodule { 30 + freeformType = lib.types.attrsOf (lib.types.either lib.types.str lib.types.int); 31 + options = { 32 + GOKAPI_CONFIG_DIR = lib.mkOption { 33 + type = lib.types.str; 34 + default = "%S/gokapi/config"; 35 + description = "Sets the directory for the config file."; 36 + }; 37 + GOKAPI_CONFIG_FILE = lib.mkOption { 38 + type = lib.types.str; 39 + default = "config.json"; 40 + description = "Sets the filename for the config file."; 41 + }; 42 + GOKAPI_DATA_DIR = lib.mkOption { 43 + type = lib.types.str; 44 + default = "%S/gokapi/data"; 45 + description = "Sets the directory for the data."; 46 + }; 47 + GOKAPI_PORT = lib.mkOption { 48 + type = lib.types.port; 49 + default = 53842; 50 + description = "Sets the port of the service."; 51 + }; 52 + }; 53 + }; 54 + default = { }; 55 + description = '' 56 + Environment variables to be set for the gokapi service. Can use systemd specifiers. 57 + For full list see <https://gokapi.readthedocs.io/en/latest/advanced.html#environment-variables>. 58 + ''; 59 + }; 60 + settings = lib.mkOption { 61 + type = lib.types.submodule { 62 + freeformType = settingsFormat.type; 63 + options = { }; 64 + }; 65 + default = { }; 66 + description = '' 67 + Configuration settings for the generated config json file. 68 + See <https://gokapi.readthedocs.io/en/latest/advanced.html#config-json> for more information 69 + ''; 70 + }; 71 + settingsFile = lib.mkOption { 72 + type = lib.types.nullOr lib.types.str; 73 + default = null; 74 + description = '' 75 + Path to config file to parse and append to settings. 76 + Largely useful for loading secrets from a file not in the nix store. Can use systemd specifiers. 77 + See <https://gokapi.readthedocs.io/en/latest/advanced.html#config-json> for more information 78 + ''; 79 + }; 80 + 81 + }; 82 + 83 + config = lib.mkIf cfg.enable { 84 + systemd.services.gokapi = { 85 + wantedBy = [ "default.target" ]; 86 + wants = [ "network-online.target" ]; 87 + after = [ "network-online.target" ]; 88 + environment = lib.mapAttrs (_: value: toString value) cfg.environment; 89 + unitConfig = { 90 + Description = "gokapi service"; 91 + }; 92 + serviceConfig = { 93 + ExecStartPre = 94 + let 95 + updateScript = lib.getExe ( 96 + pkgs.writeShellApplication { 97 + name = "merge-config"; 98 + runtimeInputs = with pkgs; [ jq ]; 99 + text = '' 100 + echo "Running merge-config" 101 + mutableSettings="$1" 102 + statefulSettingsFile="$2" 103 + settingsFile="$3" 104 + if [[ "$mutableSettings" == true ]]; then 105 + if [[ -f "$statefulSettingsFile" ]]; then 106 + echo "Updating stateful config file" 107 + merged="$(jq -s '.[0] * .[1]' "$statefulSettingsFile" ${userSettingsFile})" 108 + echo "$merged" > "$statefulSettingsFile" 109 + fi 110 + else 111 + echo "Overwriting stateful config file" 112 + mkdir -p "$(dirname "$statefulSettingsFile")" 113 + cat ${userSettingsFile} > "$statefulSettingsFile" 114 + fi 115 + if [ "$settingsFile" != "null" ]; then 116 + echo "Merging settings file into current stateful settings file" 117 + merged="$(jq -s '.[0] * .[1]' "$statefulSettingsFile" "$settingsFile")" 118 + echo "$merged" > "$statefulSettingsFile" 119 + fi 120 + ''; 121 + } 122 + ); 123 + in 124 + lib.strings.concatStringsSep " " [ 125 + updateScript 126 + (lib.boolToString cfg.mutableSettings) 127 + "${cfg.environment.GOKAPI_CONFIG_DIR}/${cfg.environment.GOKAPI_CONFIG_FILE}" 128 + (if (cfg.settingsFile == null) then "null" else cfg.settingsFile) 129 + ]; 130 + ExecStart = lib.getExe cfg.package; 131 + RestartSec = 30; 132 + DynamicUser = true; 133 + PrivateTmp = true; 134 + StateDirectory = "gokapi"; 135 + CacheDirectory = "gokapi"; 136 + Restart = "on-failure"; 137 + }; 138 + }; 139 + }; 140 + meta.maintainers = with lib.maintainers; [ 141 + delliott 142 + ]; 143 + }
+1
nixos/tests/all-tests.nix
··· 479 479 gobgpd = handleTest ./gobgpd.nix {}; 480 480 gocd-agent = handleTest ./gocd-agent.nix {}; 481 481 gocd-server = handleTest ./gocd-server.nix {}; 482 + gokapi = runTest ./gokapi.nix; 482 483 gollum = handleTest ./gollum.nix {}; 483 484 gonic = handleTest ./gonic.nix {}; 484 485 google-oslogin = handleTest ./google-oslogin {};
+1 -1
nixos/tests/birdwatcher.nix
··· 72 72 [bird] 73 73 listen = "0.0.0.0:29184" 74 74 config = "/etc/bird/bird.conf" 75 - birdc = "${pkgs.bird}/bin/birdc" 75 + birdc = "${pkgs.bird2}/bin/birdc" 76 76 ttl = 5 # time to live (in minutes) for caching of cli output 77 77 [parser] 78 78 filter_fields = []
+22
nixos/tests/gokapi.nix
··· 1 + { lib, ... }: 2 + let 3 + port = 6000; 4 + in 5 + { 6 + name = "gokapi"; 7 + 8 + meta.maintainers = with lib.maintainers; [ delliott ]; 9 + 10 + nodes.machine = { 11 + services.gokapi = { 12 + enable = true; 13 + environment.GOKAPI_PORT = port; 14 + }; 15 + }; 16 + 17 + testScript = '' 18 + machine.wait_for_unit("gokapi.service") 19 + machine.wait_for_open_port(${toString port}) 20 + machine.succeed("curl --fail http://localhost:${toString port}/") 21 + ''; 22 + }
+12 -5
pkgs/applications/editors/vim/plugins/default.nix
··· 24 24 inherit (neovimUtils) buildNeovimPlugin; 25 25 }; 26 26 27 + extras = callPackage ./extras.nix { 28 + inherit buildVimPlugin; 29 + inherit (neovimUtils) buildNeovimPlugin; 30 + }; 31 + 27 32 # TL;DR 28 33 # * Add your plugin to ./vim-plugin-names 29 34 # * run ./update.py ··· 36 41 }; 37 42 38 43 aliases = if config.allowAliases then (import ./aliases.nix lib) else final: prev: { }; 39 - 40 - extensible-self = lib.makeExtensible ( 41 - extends aliases (extends overrides (extends plugins initialPackages)) 42 - ); 43 44 in 44 - extensible-self 45 + lib.pipe initialPackages [ 46 + (extends plugins) 47 + (extends extras) 48 + (extends overrides) 49 + (extends aliases) 50 + lib.makeExtensible 51 + ]
+104
pkgs/applications/editors/vim/plugins/extras.nix
··· 1 + { 2 + lib, 3 + buildVimPlugin, 4 + buildNeovimPlugin, 5 + nodePackages, 6 + neovim-unwrapped, 7 + }: 8 + let 9 + luaPackages = neovim-unwrapped.lua.pkgs; 10 + in 11 + self: super: 12 + ( 13 + let 14 + nodePackageNames = [ 15 + "coc-cmake" 16 + "coc-docker" 17 + "coc-emmet" 18 + "coc-eslint" 19 + "coc-explorer" 20 + "coc-flutter" 21 + "coc-git" 22 + "coc-go" 23 + "coc-haxe" 24 + "coc-highlight" 25 + "coc-html" 26 + "coc-java" 27 + "coc-jest" 28 + "coc-json" 29 + "coc-lists" 30 + "coc-ltex" 31 + "coc-markdownlint" 32 + "coc-pairs" 33 + "coc-prettier" 34 + "coc-r-lsp" 35 + "coc-rls" 36 + "coc-rust-analyzer" 37 + "coc-sh" 38 + "coc-smartf" 39 + "coc-snippets" 40 + "coc-solargraph" 41 + "coc-spell-checker" 42 + "coc-sqlfluff" 43 + "coc-stylelint" 44 + "coc-sumneko-lua" 45 + "coc-tabnine" 46 + "coc-texlab" 47 + "coc-tsserver" 48 + "coc-ultisnips" 49 + "coc-vetur" 50 + "coc-vimlsp" 51 + "coc-vimtex" 52 + "coc-wxml" 53 + "coc-yaml" 54 + "coc-yank" 55 + ]; 56 + nodePackage2VimPackage = 57 + name: 58 + buildVimPlugin { 59 + pname = name; 60 + inherit (nodePackages.${name}) version meta; 61 + src = "${nodePackages.${name}}/lib/node_modules/${name}"; 62 + }; 63 + in 64 + lib.genAttrs nodePackageNames nodePackage2VimPackage 65 + ) 66 + // ( 67 + let 68 + luarocksPackageNames = [ 69 + "fidget-nvim" 70 + "gitsigns-nvim" 71 + "image-nvim" 72 + "lsp-progress-nvim" 73 + "lualine-nvim" 74 + "luasnip" 75 + "lush-nvim" 76 + "lz-n" 77 + "lze" 78 + "lzextras" 79 + "lzn-auto-require" 80 + "middleclass" 81 + "mini-test" 82 + "neorg" 83 + "neotest" 84 + "nui-nvim" 85 + "nvim-cmp" 86 + "nvim-nio" 87 + "nvim-web-devicons" 88 + "oil-nvim" 89 + "orgmode" 90 + "papis-nvim" 91 + "rest-nvim" 92 + "rocks-config-nvim" 93 + "rtp-nvim" 94 + "telescope-manix" 95 + "telescope-nvim" 96 + ]; 97 + toVimPackage = 98 + name: 99 + buildNeovimPlugin { 100 + luaAttr = luaPackages.${name}; 101 + }; 102 + in 103 + lib.genAttrs luarocksPackageNames toVimPackage 104 + )
+6 -95
pkgs/applications/editors/vim/plugins/overrides.nix
··· 1281 1281 dependencies = [ self.plenary-nvim ]; 1282 1282 }; 1283 1283 1284 + # NOTE: this overrides a luaPackages-based plugin 1284 1285 gitsigns-nvim = super.gitsigns-nvim.overrideAttrs { 1285 1286 dependencies = [ self.plenary-nvim ]; 1286 1287 }; ··· 1421 1422 doInstallCheck = true; 1422 1423 }; 1423 1424 1425 + # NOTE: this overrides a luaPackages-based plugin 1424 1426 image-nvim = super.image-nvim.overrideAttrs { 1425 1427 dependencies = with self; [ 1426 1428 nvim-treesitter ··· 1683 1685 dependencies = [ self.lualine-nvim ]; 1684 1686 }; 1685 1687 1688 + # NOTE: this overrides a luaPackages-based plugin 1686 1689 luasnip = super.luasnip.overrideAttrs { 1687 1690 dependencies = [ luaPackages.jsregexp ]; 1688 1691 }; ··· 1949 1952 ]; 1950 1953 }; 1951 1954 1955 + # NOTE: this overrides a luaPackages-based plugin 1952 1956 neotest = super.neotest.overrideAttrs { 1953 1957 dependencies = with self; [ 1954 1958 nvim-nio ··· 2838 2842 }; 2839 2843 2840 2844 # needs "http" and "json" treesitter grammars too 2845 + # NOTE: this overrides a luaPackages-based plugin 2841 2846 rest-nvim = super.rest-nvim.overrideAttrs { 2842 2847 dependencies = with self; [ 2843 2848 plenary-nvim ··· 3225 3230 dependencies = [ self.plenary-nvim ]; 3226 3231 }; 3227 3232 3233 + # NOTE: this overrides a luaPackages-based plugin 3228 3234 telescope-nvim = super.telescope-nvim.overrideAttrs { 3229 3235 dependencies = [ self.plenary-nvim ]; 3230 3236 }; ··· 3988 3994 ''; 3989 3995 3990 3996 }; 3991 - } 3992 - // ( 3993 - let 3994 - nodePackageNames = [ 3995 - "coc-cmake" 3996 - "coc-docker" 3997 - "coc-emmet" 3998 - "coc-eslint" 3999 - "coc-explorer" 4000 - "coc-flutter" 4001 - "coc-git" 4002 - "coc-go" 4003 - "coc-haxe" 4004 - "coc-highlight" 4005 - "coc-html" 4006 - "coc-java" 4007 - "coc-jest" 4008 - "coc-json" 4009 - "coc-lists" 4010 - "coc-ltex" 4011 - "coc-markdownlint" 4012 - "coc-pairs" 4013 - "coc-prettier" 4014 - "coc-r-lsp" 4015 - "coc-rls" 4016 - "coc-rust-analyzer" 4017 - "coc-sh" 4018 - "coc-smartf" 4019 - "coc-snippets" 4020 - "coc-solargraph" 4021 - "coc-spell-checker" 4022 - "coc-sqlfluff" 4023 - "coc-stylelint" 4024 - "coc-sumneko-lua" 4025 - "coc-tabnine" 4026 - "coc-texlab" 4027 - "coc-tsserver" 4028 - "coc-ultisnips" 4029 - "coc-vetur" 4030 - "coc-vimlsp" 4031 - "coc-vimtex" 4032 - "coc-wxml" 4033 - "coc-yaml" 4034 - "coc-yank" 4035 - ]; 4036 - nodePackage2VimPackage = 4037 - name: 4038 - buildVimPlugin { 4039 - pname = name; 4040 - inherit (nodePackages.${name}) version meta; 4041 - src = "${nodePackages.${name}}/lib/node_modules/${name}"; 4042 - }; 4043 - in 4044 - lib.genAttrs nodePackageNames nodePackage2VimPackage 4045 - ) 4046 - // ( 4047 - let 4048 - luarocksPackageNames = [ 4049 - "fidget-nvim" 4050 - "gitsigns-nvim" 4051 - "image-nvim" 4052 - "lsp-progress-nvim" 4053 - "lualine-nvim" 4054 - "luasnip" 4055 - "lush-nvim" 4056 - "lz-n" 4057 - "lze" 4058 - "lzextras" 4059 - "lzn-auto-require" 4060 - "middleclass" 4061 - "mini-test" 4062 - "neorg" 4063 - "neotest" 4064 - "nui-nvim" 4065 - "nvim-cmp" 4066 - "nvim-nio" 4067 - "nvim-web-devicons" 4068 - "oil-nvim" 4069 - "orgmode" 4070 - "papis-nvim" 4071 - "rest-nvim" 4072 - "rocks-config-nvim" 4073 - "rtp-nvim" 4074 - "telescope-manix" 4075 - "telescope-nvim" 4076 - ]; 4077 - toVimPackage = 4078 - name: 4079 - neovimUtils.buildNeovimPlugin { 4080 - luaAttr = luaPackages.${name}; 4081 - }; 4082 - in 4083 - lib.genAttrs luarocksPackageNames toVimPackage 4084 - ) 4085 - // { 4086 3997 4087 3998 rocks-nvim = 4088 3999 (neovimUtils.buildNeovimPlugin {
+4 -39
pkgs/applications/misc/1password-gui/default.nix
··· 10 10 11 11 let 12 12 pname = "1password"; 13 - version = if channel == "stable" then "8.10.60" else "8.10.68-12.BETA"; 14 13 15 - sources = { 16 - stable = { 17 - x86_64-linux = { 18 - url = "https://downloads.1password.com/linux/tar/stable/x86_64/1password-${version}.x64.tar.gz"; 19 - hash = "sha256-QCoV66LvGo6vA5fjuE3fG+LwehKVMPmgaDghh9YEvmA="; 20 - }; 21 - aarch64-linux = { 22 - url = "https://downloads.1password.com/linux/tar/stable/aarch64/1password-${version}.arm64.tar.gz"; 23 - hash = "sha256-E5TniXur9ATJ3ER/zTFc6EiBrH/kbNvIao0ADLyBZZE="; 24 - }; 25 - x86_64-darwin = { 26 - url = "https://downloads.1password.com/mac/1Password-${version}-x86_64.zip"; 27 - hash = "sha256-2Nv4CHKLgCFbU1TeJQhIq8YdkJSQJXtUw2S17B8cS4s="; 28 - }; 29 - aarch64-darwin = { 30 - url = "https://downloads.1password.com/mac/1Password-${version}-aarch64.zip"; 31 - hash = "sha256-drJiM8EiUM3M54+KPQdLvAmSfBH5YPqQk14yjHzoBtM="; 32 - }; 33 - }; 34 - beta = { 35 - x86_64-linux = { 36 - url = "https://downloads.1password.com/linux/tar/beta/x86_64/1password-${version}.x64.tar.gz"; 37 - hash = "sha256-/0Y1qnCI/gXGKTHk9EIaUVbHTwRkOvwOOiMif6sRkqw="; 38 - }; 39 - aarch64-linux = { 40 - url = "https://downloads.1password.com/linux/tar/beta/aarch64/1password-${version}.arm64.tar.gz"; 41 - hash = "sha256-4J6a10r5n8ffqC5Y2pjO/GJLXY5AQDkQWmFNLYeK/Xw="; 42 - }; 43 - x86_64-darwin = { 44 - url = "https://downloads.1password.com/mac/1Password-${version}-x86_64.zip"; 45 - hash = "sha256-XvflRqqUI59ekuSiQXyACzS94VIrl8wJjemi0xAznZU="; 46 - }; 47 - aarch64-darwin = { 48 - url = "https://downloads.1password.com/mac/1Password-${version}-aarch64.zip"; 49 - hash = "sha256-UErp3pcSXz/C5s3JraLoBN89tL8ghgJ3XLpg7KtU8Sc="; 50 - }; 51 - }; 52 - }; 14 + versions = builtins.fromJSON (builtins.readFile ./versions.json); 15 + inherit (versions.${channel} or (throw "unknown channel ${channel}")) version; 16 + 17 + sources = builtins.fromJSON (builtins.readFile ./sources.json); 53 18 54 19 src = fetchurl { 55 20 inherit
+38
pkgs/applications/misc/1password-gui/sources.json
··· 1 + { 2 + "stable": { 3 + "x86_64-linux": { 4 + "url": "https://downloads.1password.com/linux/tar/stable/x86_64/1password-8.10.60.x64.tar.gz", 5 + "hash": "sha256-QCoV66LvGo6vA5fjuE3fG+LwehKVMPmgaDghh9YEvmA=" 6 + }, 7 + "aarch64-linux": { 8 + "url": "https://downloads.1password.com/linux/tar/stable/aarch64/1password-8.10.60.arm64.tar.gz", 9 + "hash": "sha256-E5TniXur9ATJ3ER/zTFc6EiBrH/kbNvIao0ADLyBZZE=" 10 + }, 11 + "x86_64-darwin": { 12 + "url": "https://downloads.1password.com/mac/1Password-8.10.60-x86_64.zip", 13 + "hash": "sha256-2Nv4CHKLgCFbU1TeJQhIq8YdkJSQJXtUw2S17B8cS4s=" 14 + }, 15 + "aarch64-darwin": { 16 + "url": "https://downloads.1password.com/mac/1Password-8.10.60-aarch64.zip", 17 + "hash": "sha256-drJiM8EiUM3M54+KPQdLvAmSfBH5YPqQk14yjHzoBtM=" 18 + } 19 + }, 20 + "beta": { 21 + "x86_64-linux": { 22 + "url": "https://downloads.1password.com/linux/tar/beta/x86_64/1password-8.10.68-12.BETA.x64.tar.gz", 23 + "hash": "sha256-/0Y1qnCI/gXGKTHk9EIaUVbHTwRkOvwOOiMif6sRkqw=" 24 + }, 25 + "aarch64-linux": { 26 + "url": "https://downloads.1password.com/linux/tar/beta/aarch64/1password-8.10.68-12.BETA.arm64.tar.gz", 27 + "hash": "sha256-4J6a10r5n8ffqC5Y2pjO/GJLXY5AQDkQWmFNLYeK/Xw=" 28 + }, 29 + "x86_64-darwin": { 30 + "url": "https://downloads.1password.com/mac/1Password-8.10.68-12.BETA-x86_64.zip", 31 + "hash": "sha256-XvflRqqUI59ekuSiQXyACzS94VIrl8wJjemi0xAznZU=" 32 + }, 33 + "aarch64-darwin": { 34 + "url": "https://downloads.1password.com/mac/1Password-8.10.68-12.BETA-aarch64.zip", 35 + "hash": "sha256-UErp3pcSXz/C5s3JraLoBN89tL8ghgJ3XLpg7KtU8Sc=" 36 + } 37 + } 38 + }
+68 -43
pkgs/applications/misc/1password-gui/update.sh
··· 1 1 #!/usr/bin/env nix-shell 2 - #!nix-shell -i bash -p jq 2 + #!nix-shell -i bash -p jq gnupg 3 3 #shellcheck shell=bash 4 4 5 - CURRENT_HASH="" 5 + set -euo pipefail 6 6 7 - print_hash() { 8 - OS="$1" 9 - CHANNEL="$2" 10 - ARCH="$3" 11 - VERSION="$4" 7 + cd -- "$(dirname "${BASH_SOURCE[0]}")" 12 8 13 - if [[ "$OS" == "linux" ]]; then 14 - if [[ "$ARCH" == "x86_64" ]]; then 15 - EXT="x64.tar.gz" 16 - else 17 - EXT="arm64.tar.gz" 18 - fi 19 - URL="https://downloads.1password.com/${OS}/tar/${CHANNEL}/${ARCH}/1password-${VERSION}.${EXT}" 9 + mk_url() { 10 + local \ 11 + base_url="https://downloads.1password.com" \ 12 + os="$1" \ 13 + channel="$2" \ 14 + arch="$3" \ 15 + version="$4" 16 + 17 + if [[ ${os} == "linux" ]]; then 18 + if [[ ${arch} == "x86_64" ]]; then 19 + ext="x64.tar.gz" 20 20 else 21 - EXT="$ARCH.zip" 22 - URL="https://downloads.1password.com/${OS}/1Password-${VERSION}-${EXT}" 21 + ext="arm64.tar.gz" 23 22 fi 23 + url="${base_url}/${os}/tar/${channel}/${arch}/1password-${version}.${ext}" 24 + else 25 + ext="${arch}.zip" 26 + url="${base_url}/mac/1Password-${version}-${ext}" 27 + fi 24 28 25 - CURRENT_HASH=$(nix store prefetch-file "$URL" --json | jq -r '.hash') 29 + echo "${url}" 30 + } 26 31 27 - echo "$CHANNEL ${ARCH}-${OS}: $CURRENT_HASH" 32 + cleanup() { 33 + if [[ -f ${GPG_KEYRING-} ]]; then 34 + rm "${GPG_KEYRING}" 35 + fi 36 + 37 + if [[ -f ${JSON_HEAP-} ]]; then 38 + rm "${JSON_HEAP}" 39 + fi 28 40 } 29 41 30 - if [[ -z "$STABLE_VER" && -n "$1" ]]; then 31 - STABLE_VER="$1" 32 - fi 42 + trap cleanup EXIT 43 + 44 + # Get channel versions from versions.json 45 + declare -A version=( 46 + ["stable"]=$(jq -r '.stable.version' versions.json) 47 + ["beta"]=$(jq -r '.beta.version' versions.json) 48 + ) 33 49 34 - if [[ -z "$BETA_VER" && -n "$2" ]]; then 35 - BETA_VER="$2" 36 - fi 50 + # 51 + GPG_KEYRING=$(mktemp -t 1password.kbx.XXXXXX) 52 + gpg --no-default-keyring --keyring "${GPG_KEYRING}" \ 53 + --keyserver keyserver.ubuntu.com \ 54 + --receive-keys 3FEF9748469ADBE15DA7CA80AC2D62742012EA22 37 55 38 - if [[ "${BETA_VER: -4}" != "BETA" ]]; then 39 - BETA_VER="$BETA_VER.BETA" 40 - fi 56 + JSON_HEAP=$(mktemp -t 1password-gui.jsonheap.XXXXXX) 57 + for channel in stable beta; do 58 + for os in linux darwin; do 59 + for arch in x86_64 aarch64; do 60 + url=$(mk_url ${os} ${channel} ${arch} "${version[${channel}]}") 61 + nix store prefetch-file --json "${url}" | jq " 62 + { 63 + \"${channel}\": { 64 + \"${arch}-${os}\": { 65 + \"url\": \"${url}\", 66 + \"hash\": .hash, 67 + \"storePath\": .storePath 68 + } 69 + } 70 + }" >> "${JSON_HEAP}" 41 71 42 - if [[ -z "$STABLE_VER" ]]; then 43 - echo "No 'STABLE_VER' environment variable provided, skipping" 44 - else 45 - print_hash "linux" "stable" "x86_64" "$STABLE_VER" 46 - print_hash "linux" "stable" "aarch64" "$STABLE_VER" 47 - print_hash "mac" "stable" "x86_64" "$STABLE_VER" 48 - print_hash "mac" "stable" "aarch64" "$STABLE_VER" 49 - fi 72 + # For some reason 1Password PGP signs only Linux binaries. 73 + if [[ ${os} == "linux" ]]; then 74 + gpgv --keyring "${GPG_KEYRING}" \ 75 + $(nix store prefetch-file --json "${url}.sig" | jq -r .storePath) \ 76 + $(jq -r --slurp ".[-1].[].[].storePath" "${JSON_HEAP}") 77 + fi 78 + done 79 + done 80 + done 50 81 51 - if [[ -z "$BETA_VER" ]]; then 52 - echo "No 'BETA_VER' environment variable provided, skipping" 53 - else 54 - print_hash "linux" "beta" "x86_64" "$BETA_VER" 55 - print_hash "linux" "beta" "aarch64" "$BETA_VER" 56 - print_hash "mac" "beta" "x86_64" "$BETA_VER" 57 - print_hash "mac" "beta" "aarch64" "$BETA_VER" 58 - fi 82 + # Combine heap of hash+url objects into a single JSON object. 83 + jq --slurp 'reduce .[] as $x ({}; . * $x) | del (.[].[].storePath)' "${JSON_HEAP}" > sources.json
+9
pkgs/applications/misc/1password-gui/versions.json
··· 1 + { 2 + "stable": { 3 + "version": "8.10.60" 4 + }, 5 + 6 + "beta": { 7 + "version": "8.10.68-12.BETA" 8 + } 9 + }
+45
pkgs/by-name/al/altus/package.nix
··· 1 + { 2 + lib, 3 + fetchurl, 4 + appimageTools, 5 + makeWrapper, 6 + }: 7 + 8 + let 9 + pname = "altus"; 10 + version = "5.6.0"; 11 + 12 + src = fetchurl { 13 + name = "altus-${version}.AppImage"; 14 + url = "https://github.com/amanharwara/altus/releases/download/${version}/Altus-${version}.AppImage"; 15 + hash = "sha512-u4eBTboFJaU5qLFURXFchOmFV7GzlDbUokrBpxx8QeAJO6B0IwX1gJU0C69BKinIdO4Q93SAcjsvUkvSI+blrw=="; 16 + }; 17 + 18 + appimageContents = appimageTools.extractType2 { 19 + inherit pname version src; 20 + }; 21 + in 22 + appimageTools.wrapType2 { 23 + inherit pname version src; 24 + 25 + nativeBuildInputs = [ makeWrapper ]; 26 + 27 + extraInstallCommands = '' 28 + install -m 444 -D ${appimageContents}/Altus.desktop $out/share/applications/altus.desktop 29 + install -m 444 -D ${appimageContents}/Altus.png \ 30 + $out/share/icons/hicolor/scalable/apps/altus.png 31 + substituteInPlace $out/share/applications/altus.desktop \ 32 + --replace-fail 'Exec=AppRun' 'Exec=altus' 33 + wrapProgram "$out/bin/altus" \ 34 + --add-flags "\''${NIXOS_OZONE_WL:+\''${WAYLAND_DISPLAY:+--ozone-platform-hint=auto --enable-features=WaylandWindowDecorations --enable-wayland-ime=true}}" 35 + ''; 36 + 37 + meta = { 38 + description = "Client for WhatsApp Web with themes, notifications and multiple accounts support"; 39 + homepage = "https://github.com/amanharwara/altus"; 40 + changelog = "https://github.com/amanharwara/altus/releases/tag/v${version}"; 41 + license = lib.licenses.gpl3Only; 42 + maintainers = with lib.maintainers; [ johnrtitor ]; 43 + platforms = [ "x86_64-linux" ]; 44 + }; 45 + }
+2 -2
pkgs/by-name/am/amnezia-vpn/package.nix
··· 56 56 in 57 57 stdenv.mkDerivation (finalAttrs: { 58 58 pname = "amnezia-vpn"; 59 - version = "4.8.4.1"; 59 + version = "4.8.4.4"; 60 60 61 61 src = fetchFromGitHub { 62 62 owner = "amnezia-vpn"; 63 63 repo = "amnezia-client"; 64 64 tag = finalAttrs.version; 65 - hash = "sha256-iZKmwbSvyLTW9xWi/6WIwB1BeZai326e0Ut7x1RmKFw="; 65 + hash = "sha256-uWO38eK4pJ7pkViyBh3QSVWPIMXn1tcMSS4Bt1M1bpk="; 66 66 fetchSubmodules = true; 67 67 }; 68 68
+46 -15
pkgs/by-name/ba/bark/package.nix
··· 1 - { lib 2 - , rustPlatform 3 - , fetchFromGitHub 4 - , pkg-config 5 - , alsa-lib 6 - , speexdsp 1 + { 2 + lib, 3 + rustPlatform, 4 + fetchFromGitHub, 5 + fetchpatch, 6 + alsa-lib, 7 + libopus, 8 + soxr, 9 + cmake, 10 + pkg-config, 11 + versionCheckHook, 12 + nix-update-script, 7 13 }: 8 - rustPlatform.buildRustPackage { 14 + rustPlatform.buildRustPackage (final: { 9 15 pname = "bark"; 10 - version = "unstable-2023-08-22"; 16 + version = "0.6.0"; 11 17 src = fetchFromGitHub { 12 18 owner = "haileys"; 13 19 repo = "bark"; 14 - rev = "2586b9fb58b496f8ef06f516c9cd3aace77521f7"; 15 - hash = "sha256-sGroae6uJhB9UIpFmvt520Zs9k0ir7H8pGkhKJmVWek="; 20 + tag = "v${final.version}"; 21 + hash = "sha256-JaUIWGCYhasM0DgqL+DiG2rE1OWVg/N66my/4RWDN1E="; 16 22 }; 23 + 17 24 useFetchCargoVendor = true; 18 - cargoHash = "sha256-WqJZoYpOQQGJGvND2R1o2nvK5P24z7YeJ9i26mai45M="; 19 - buildInputs = [ alsa-lib speexdsp ]; 20 - nativeBuildInputs = [ pkg-config ]; 25 + cargoHash = "sha256-LcmX8LbK8UHDDeqwLTFEUuRBv9GgDiCpXP4bmIR3gME="; 26 + 27 + # Broken rustdoc comment 28 + patches = [ 29 + (fetchpatch { 30 + url = "https://patch-diff.githubusercontent.com/raw/haileys/bark/pull/13.patch"; 31 + hash = "sha256-cA1bqc7XhJ2cxOYvjIJ9oopzBZ9I4rGERkiwDAUh3V4"; 32 + }) 33 + ]; 34 + 35 + buildInputs = [ 36 + alsa-lib 37 + libopus 38 + soxr 39 + ]; 40 + 41 + nativeBuildInputs = [ 42 + cmake 43 + pkg-config 44 + ]; 45 + 46 + nativeInstallCheckInputs = [ 47 + versionCheckHook 48 + ]; 49 + versionCheckProgramArg = "--version"; 50 + doInstallCheck = true; 51 + 52 + passthru.updateScript = nix-update-script { }; 21 53 22 54 meta = { 23 55 description = "Live sync audio streaming for local networks"; ··· 27 59 platforms = lib.platforms.linux; 28 60 mainProgram = "bark"; 29 61 }; 30 - } 31 - 62 + })
+5 -5
pkgs/by-name/be/beszel/package.nix
··· 1 1 { 2 - buildGo124Module, 2 + buildGoModule, 3 3 lib, 4 4 fetchFromGitHub, 5 5 nix-update-script, 6 6 buildNpmPackage, 7 7 }: 8 8 9 - buildGo124Module rec { 9 + buildGoModule rec { 10 10 pname = "beszel"; 11 - version = "0.10.1"; 11 + version = "0.10.2"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "henrygd"; 15 15 repo = "beszel"; 16 16 tag = "v${version}"; 17 - hash = "sha256-4RuYZcBR7X9Ug6l91N/FtyfT38HlW2guputzo4kF8YU="; 17 + hash = "sha256-yYSX58qA4vE7Bp3ADc6rIMf9yaeU7Zw7D5rmES6x6oA="; 18 18 }; 19 19 20 20 webui = buildNpmPackage { ··· 48 48 49 49 sourceRoot = "${src.name}/beszel/site"; 50 50 51 - npmDepsHash = "sha256-UKOS7QyGsdKosjhxVhZErFkXhnfrFxdX0ozBUJGsNII="; 51 + npmDepsHash = "sha256-27NUV23dNHFSwOHiB/wGSAWkp6eZMnw/6Pd3Fwn98+s="; 52 52 }; 53 53 54 54 sourceRoot = "${src.name}/beszel";
+3 -3
pkgs/by-name/ca/cargo-bundle-licenses/package.nix
··· 6 6 7 7 rustPlatform.buildRustPackage rec { 8 8 pname = "cargo-bundle-licenses"; 9 - version = "3.1.0"; 9 + version = "4.0.0"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "sstadick"; 13 13 repo = "cargo-bundle-licenses"; 14 14 rev = "v${version}"; 15 - hash = "sha256-leSHjl/B76Z4JM1wO9IBKbdfMgHtY/pGut1hnDd8/L0="; 15 + hash = "sha256-pTxZ9s8ZccylMfEiifYmJuBB+riZ37QJSAMpVuSgLzs="; 16 16 }; 17 17 18 18 useFetchCargoVendor = true; 19 - cargoHash = "sha256-I5zIrMZ9GnlAUfWaaFP6yr+pv8wWtxguxSL0zho3BRs="; 19 + cargoHash = "sha256-4zolwQzK6dnFIcS2NwuxYZRS2AGcUGHh+KQzDkI0J6c="; 20 20 21 21 meta = with lib; { 22 22 description = "Generate a THIRDPARTY file with all licenses in a cargo project";
+3 -3
pkgs/by-name/co/consul/package.nix
··· 8 8 9 9 buildGoModule rec { 10 10 pname = "consul"; 11 - version = "1.20.4"; 11 + version = "1.20.5"; 12 12 13 13 # Note: Currently only release tags are supported, because they have the Consul UI 14 14 # vendored. See ··· 22 22 owner = "hashicorp"; 23 23 repo = pname; 24 24 tag = "v${version}"; 25 - hash = "sha256-pvTHrFrnRSprsbIPenVPVnnmU59OQCZc9DF+8wcWJ3A="; 25 + hash = "sha256-dBx/WHi+qFrOyA0lIjvARcAZ96WvHCjVs94XicSL5L0="; 26 26 }; 27 27 28 28 # This corresponds to paths with package main - normally unneeded but consul ··· 32 32 "connect/certgen" 33 33 ]; 34 34 35 - vendorHash = "sha256-hAnIKuFtS6l4nhq8bTcHkvW43FT6K8+0FglRRNfDtPg="; 35 + vendorHash = "sha256-rQDVXMLXI2/D4SNLfs3CT4chDnzhh1aU5xuMMBDMhLI="; 36 36 37 37 doCheck = false; 38 38
+48
pkgs/by-name/co/countryguess/package.nix
··· 1 + { 2 + lib, 3 + python3Packages, 4 + fetchFromGitHub, 5 + makeWrapper, 6 + }: 7 + 8 + python3Packages.buildPythonApplication rec { 9 + pname = "countryguess"; 10 + version = "0-unstable-2025-03-04"; 11 + # upstream pyproject.toml is nonsense. Copied from another project 12 + # without customizing it for this project. 13 + format = "other"; 14 + 15 + src = fetchFromGitHub { 16 + owner = "swarbler"; 17 + repo = "countryguess"; 18 + rev = "28f45231bc3d8bedeb7d1b51d56ca1b56796ff8c"; 19 + hash = "sha256-S/fy94aRoVI2CvICrviQ2ZgVESWYLuREb5mwsfXL6Hc="; 20 + }; 21 + 22 + dependencies = with python3Packages; [ 23 + art 24 + colorama 25 + ]; 26 + 27 + # upstream python file lacks shebang 28 + postPatch = '' 29 + echo '#!/usr/bin/env python3' | cat - countryguess.py > temp && mv temp countryguess.py 30 + ''; 31 + 32 + installPhase = '' 33 + runHook preInstall 34 + 35 + install -Dm744 countryguess.py $out/bin/countryguess 36 + 37 + runHook postInstall 38 + ''; 39 + 40 + meta = { 41 + description = "Guess the 193 U.N. recognised countries"; 42 + homepage = "https://github.com/swarbler/countryguess"; 43 + license = lib.licenses.mit; 44 + platforms = lib.platforms.unix; 45 + maintainers = with lib.maintainers; [ ethancedwards8 ]; 46 + mainProgram = "countryguess"; 47 + }; 48 + }
+3 -3
pkgs/by-name/dn/dnscontrol/package.nix
··· 9 9 10 10 buildGoModule rec { 11 11 pname = "dnscontrol"; 12 - version = "4.16.0"; 12 + version = "4.17.0"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "StackExchange"; 16 16 repo = "dnscontrol"; 17 17 tag = "v${version}"; 18 - hash = "sha256-yFBKDb4XdCw5en/VN5IP8iCTdSRMqATVR8vV3G1gHJQ="; 18 + hash = "sha256-4h911E5iAfqfuF66PsW0+amKw9hneaV3LS5UFsPR690="; 19 19 }; 20 20 21 - vendorHash = "sha256-4LDH1mJE0SJFvHYT14uCcgzy5CQ61V2gj1SfyHLEQXY="; 21 + vendorHash = "sha256-158Rzie6fECkjDK18KE6WVSPlgTZAS++pSkv7KmdByk="; 22 22 23 23 nativeBuildInputs = [ installShellFiles ]; 24 24
+66
pkgs/by-name/go/gokapi/package.nix
··· 1 + { 2 + lib, 3 + buildGoModule, 4 + fetchFromGitHub, 5 + nixosTests, 6 + nix-update-script, 7 + versionCheckHook, 8 + }: 9 + 10 + buildGoModule rec { 11 + pname = "gokapi"; 12 + version = "1.9.6"; 13 + 14 + src = fetchFromGitHub { 15 + owner = "Forceu"; 16 + repo = "Gokapi"; 17 + tag = "v${version}"; 18 + hash = "sha256-RDEvKh3tUun7wt1nhtCim95wEN9V9RlztZ9zcw9nS1o="; 19 + }; 20 + 21 + vendorHash = "sha256-9GRAlgng+yq7q0VQz374jIOCjeDIIDD631BglM/FsQQ="; 22 + 23 + # This is the go generate is ran in the upstream builder, but we have to run the components separately for things to work. 24 + preBuild = '' 25 + cd ./cmd/gokapi/ 26 + go run ../../build/go-generate/updateVersionNumbers.go 27 + # Tries to download "golang.org/x/exp/slices" 28 + # go run ../../build/go-generate/updateProtectedUrls.go 29 + go run ../../build/go-generate/buildWasm.go 30 + # Must be specify go root to import wasm_exec.js 31 + GOROOT="$(go env GOROOT)" go run "../../build/go-generate/copyStaticFiles.go" 32 + cd ../.. 33 + ''; 34 + 35 + subPackages = [ 36 + "cmd/gokapi" 37 + ]; 38 + 39 + ldflags = [ 40 + "-s" 41 + "-w" 42 + ]; 43 + 44 + nativeInstallCheckInputs = [ versionCheckHook ]; 45 + versionCheckProgramArg = "--version"; 46 + doInstallCheck = true; 47 + 48 + passthru = { 49 + tests = { 50 + inherit (nixosTests) gokapi; 51 + }; 52 + updateScript = nix-update-script { }; 53 + }; 54 + 55 + meta = { 56 + description = "Lightweight selfhosted Firefox Send alternative without public upload"; 57 + homepage = "https://github.com/Forceu/Gokapi"; 58 + changelog = "https://github.com/Forceu/Gokapi/releases/tag/v${version}"; 59 + license = lib.licenses.agpl3Only; 60 + platforms = lib.platforms.linux; 61 + maintainers = with lib.maintainers; [ 62 + delliott 63 + ]; 64 + mainProgram = "gokapi"; 65 + }; 66 + }
+2 -2
pkgs/by-name/hy/hyprutils/package.nix
··· 10 10 11 11 stdenv.mkDerivation (finalAttrs: { 12 12 pname = "hyprutils"; 13 - version = "0.5.1"; 13 + version = "0.5.2"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "hyprwm"; 17 17 repo = "hyprutils"; 18 18 tag = "v${finalAttrs.version}"; 19 - hash = "sha256-h8HOCZ/rw2Buzku+GKF77VXxrGjCSOQkLhptiEKMYg0="; 19 + hash = "sha256-EV3945SnjOCuRVbGRghsWx/9D89FyshnSO1Q6/TuQ14="; 20 20 }; 21 21 22 22 nativeBuildInputs = [
+3 -3
pkgs/by-name/ju/just/package.nix
··· 19 19 20 20 rustPlatform.buildRustPackage rec { 21 21 pname = "just"; 22 - version = "1.39.0"; 22 + version = "1.40.0"; 23 23 outputs = 24 24 [ 25 25 "out" ··· 33 33 owner = "casey"; 34 34 repo = "just"; 35 35 tag = version; 36 - hash = "sha256-K2MUS6wo0qxJnnIWDdmxHRNwyzx1z7yscVwMzXKAwQA="; 36 + hash = "sha256-pmuwZoBIgUsKWFTXo8HYHVxrDWPMO8cumD/UHajFS6A="; 37 37 }; 38 38 39 39 useFetchCargoVendor = true; 40 - cargoHash = "sha256-nDwJgZPWw86qpaGaYWB/Qqbym0FR2EpEKAme5CKbMv0="; 40 + cargoHash = "sha256-mQQGxtSgNuRbz/83eWru+dmtWiLSKdVH+3z88BNugQE="; 41 41 42 42 nativeBuildInputs = 43 43 lib.optionals (installShellCompletions || installManPages) [ installShellFiles ]
+2 -2
pkgs/by-name/li/libgedit-amtk/package.nix
··· 18 18 19 19 stdenv.mkDerivation rec { 20 20 pname = "libgedit-amtk"; 21 - version = "5.9.0"; 21 + version = "5.9.1"; 22 22 23 23 outputs = [ 24 24 "out" ··· 32 32 owner = "gedit"; 33 33 repo = "libgedit-amtk"; 34 34 rev = version; 35 - hash = "sha256-D6jZmadUHDtxedw/tCsKHzcWXobs6Vb7dyhbVKqu2Zc="; 35 + hash = "sha256-myKpZtqtf40UByBUKVF0jv521kGAUA6KDmbDJy/Q1q8="; 36 36 }; 37 37 38 38 strictDeps = true;
+3 -3
pkgs/by-name/na/namespace-cli/package.nix
··· 6 6 7 7 buildGoModule rec { 8 8 pname = "namespace-cli"; 9 - version = "0.0.405"; 9 + version = "0.0.406"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "namespacelabs"; 13 13 repo = "foundation"; 14 14 rev = "v${version}"; 15 - hash = "sha256-a81ToAFJAay9KpVigVNknaaGbZeKN7FKYQ6XG1tzv+s="; 15 + hash = "sha256-uhLde8+5EmG+jb+Yn4F4SvDimXjH337OwR5rhdsREpM="; 16 16 }; 17 17 18 - vendorHash = "sha256-PoJy/tpjkUkxHiJZNFzl2UXj29iojwL9g6YrAEkSvKk="; 18 + vendorHash = "sha256-hLxUr99gnEz2pFM0Dc8XCGgzMuoqzTmtP4Xp7vHF69U="; 19 19 20 20 subPackages = [ 21 21 "cmd/nsc"
+2 -2
pkgs/by-name/ne/newsraft/package.nix
··· 14 14 15 15 stdenv.mkDerivation (finalAttrs: { 16 16 pname = "newsraft"; 17 - version = "0.28"; 17 + version = "0.29"; 18 18 19 19 src = fetchFromGitea { 20 20 domain = "codeberg.org"; 21 21 owner = "newsraft"; 22 22 repo = "newsraft"; 23 23 rev = "newsraft-${finalAttrs.version}"; 24 - hash = "sha256-iRoQLGmiAPpt9ZpvHpytIWHldkvV/5qVjurypCycJYI="; 24 + hash = "sha256-6rDnGVOApSURuXom+XxPPOG7lxMbHGTL+4Oqrx+Jq2w="; 25 25 }; 26 26 27 27 nativeBuildInputs = [ pkg-config ];
+3 -3
pkgs/by-name/oh/oh-my-zsh/package.nix
··· 19 19 }: 20 20 21 21 stdenv.mkDerivation rec { 22 - version = "2025-02-19"; 22 + version = "2025-03-11"; 23 23 pname = "oh-my-zsh"; 24 24 25 25 src = fetchFromGitHub { 26 26 owner = "ohmyzsh"; 27 27 repo = "ohmyzsh"; 28 - rev = "6e7ac0544e71c7b777746cb50f70de68c6495b86"; 29 - sha256 = "sha256-d4w15ja5qe4axOwNyIoXZdVcgUedAIgZQrhINmNNJFw="; 28 + rev = "f97e871c33da57d20e1b0411da6b1674126192a9"; 29 + sha256 = "sha256-L2g9kw5mFfIz+IwTSfdHN4O48tew6D807gJvrgtkjJM="; 30 30 }; 31 31 32 32 strictDeps = true;
+3 -3
pkgs/by-name/se/sequoia-sqv/package.nix
··· 10 10 11 11 rustPlatform.buildRustPackage rec { 12 12 pname = "sequoia-sqv"; 13 - version = "1.2.1"; 13 + version = "1.3.0"; 14 14 15 15 src = fetchFromGitLab { 16 16 owner = "sequoia-pgp"; 17 17 repo = "sequoia-sqv"; 18 18 rev = "v${version}"; 19 - hash = "sha256-frGukJDsxq+BWLPC/4imfc42lDKVF8BPIQQDazaLaQ0="; 19 + hash = "sha256-xkvCEHVyRf1tQ/oo6Hg4Nri2WxdmH0fZFX24CPwJpZQ="; 20 20 }; 21 21 22 22 useFetchCargoVendor = true; 23 - cargoHash = "sha256-WaLRBf+Umaa8LTQ97TsJJ7pUlmficIwuFV6d5QDT6SA="; 23 + cargoHash = "sha256-ZynvC4t9NBri5gc9lt2tHd/45V6QsKHbZb7HjHUQQUI="; 24 24 25 25 nativeBuildInputs = [ 26 26 pkg-config
+17 -14
pkgs/by-name/si/signal-desktop/generic.nix
··· 5 5 autoPatchelfHook, 6 6 noto-fonts-color-emoji, 7 7 dpkg, 8 + libarchive, 8 9 asar, 9 10 rsync, 10 11 python3, ··· 53 54 54 55 { 55 56 pname, 56 - dir, 57 + libdir, 58 + bindir, 59 + extractPkg, 57 60 version, 58 61 hash, 59 62 url, ··· 100 103 recursiveHash = true; 101 104 downloadToTemp = true; 102 105 nativeBuildInputs = [ 103 - dpkg 106 + (if ARCH == "x64" then dpkg else libarchive) 104 107 asar 105 108 ]; 106 109 # Signal ships the Apple emoji set without a licence via an npm ··· 117 120 # unlicensed emoji files, but the rest of the work is done in the 118 121 # main derivation. 119 122 postFetch = '' 120 - dpkg-deb -x $downloadedFile $out 121 - asar extract "$out/opt/${dir}/resources/app.asar" $out/asar-contents 123 + ${extractPkg} 124 + asar extract "$out/${libdir}/resources/app.asar" $out/asar-contents 122 125 rm -r \ 123 - "$out/opt/${dir}/resources/app.asar"{,.unpacked} \ 126 + "$out/${libdir}/resources/app.asar"{,.unpacked} \ 124 127 $out/asar-contents/node_modules/emoji-datasource-apple 125 128 ''; 126 129 }; ··· 196 199 mkdir -p $out/lib 197 200 198 201 mv usr/share $out/share 199 - mv "opt/${dir}" "$out/lib/${dir}" 202 + mv "${libdir}" "$out/lib/signal-desktop" 200 203 201 204 # Symlink to bin 202 205 mkdir -p $out/bin 203 - ln -s "$out/lib/${dir}/${pname}" $out/bin/${pname} 206 + ln -s "$out/lib/signal-desktop/signal-desktop" $out/bin/${meta.mainProgram} 204 207 205 208 # Create required symlinks: 206 - ln -s libGLESv2.so "$out/lib/${dir}/libGLESv2.so.2" 209 + ln -s libGLESv2.so "$out/lib/signal-desktop/libGLESv2.so.2" 207 210 208 211 # Copy the Noto Color Emoji PNGs into the ASAR contents. See `src` 209 212 # for the motivation, and the script for the technical details. ··· 218 221 substituteInPlace asar-contents/preload.bundle.js \ 219 222 --replace-fail \ 220 223 'emoji://jumbo?emoji=' \ 221 - "file://$out/lib/${lib.escapeURL dir}/resources/app.asar/$emojiPrefix/" 224 + "file://$out/lib/signal-desktop/resources/app.asar/$emojiPrefix/" 222 225 223 226 # `asar(1)` copies files from the corresponding `.unpacked` 224 227 # directory when extracting, and will put them back in the modified ··· 227 230 asar pack \ 228 231 --unpack '*.node' \ 229 232 asar-contents \ 230 - "$out/lib/${dir}/resources/app.asar" 233 + "$out/lib/signal-desktop/resources/app.asar" 231 234 232 235 runHook postInstall 233 236 ''; ··· 239 242 ) 240 243 241 244 # Fix the desktop link 242 - substituteInPlace $out/share/applications/${pname}.desktop \ 243 - --replace-fail "/opt/${dir}/${pname}" ${meta.mainProgram} \ 245 + substituteInPlace $out/share/applications/signal-desktop.desktop \ 246 + --replace-fail "/${bindir}/signal-desktop" ${meta.mainProgram} \ 244 247 --replace-fail "StartupWMClass=Signal" "StartupWMClass=signal" 245 248 246 249 # Note: The following path contains bundled libraries: 247 - # $out/lib/${dir}/resources/app.asar.unpacked/node_modules/ 248 - patchelf --add-needed ${libpulseaudio}/lib/libpulse.so "$out/lib/${dir}/resources/app.asar.unpacked/node_modules/@signalapp/ringrtc/build/linux/libringrtc-${ARCH}.node" 250 + # $out/lib/signal-desktop/resources/app.asar.unpacked/node_modules/ 251 + patchelf --add-needed ${libpulseaudio}/lib/libpulse.so "$out/lib/signal-desktop/resources/app.asar.unpacked/node_modules/@signalapp/ringrtc/build/linux/libringrtc-${ARCH}.node" 249 252 ''; 250 253 251 254 passthru = {
+12 -5
pkgs/by-name/si/signal-desktop/signal-desktop-aarch64.nix
··· 1 1 { callPackage }: 2 - callPackage ./generic.nix { } rec { 2 + callPackage ./generic.nix { } { 3 3 pname = "signal-desktop"; 4 - dir = "Signal"; 5 - version = "7.36.0"; 6 - url = "https://github.com/0mniteck/Signal-Desktop-Mobian/raw/${version}/builds/release/signal-desktop_${version}_arm64.deb"; 7 - hash = "sha256-nmAqFDw35pdZg5tiq9MUlqXnbRLRkSOX9SWhccnE2Xw="; 4 + version = "7.46.0-1"; 5 + 6 + libdir = "usr/lib64/signal-desktop"; 7 + bindir = "usr/bin"; 8 + extractPkg = '' 9 + mkdir -p $out 10 + bsdtar -xf $downloadedFile -C "$out" 11 + ''; 12 + 13 + url = "https://download.copr.fedorainfracloud.org/results/useidel/signal-desktop/fedora-42-aarch64/08759579-signal-desktop/signal-desktop-7.46.0-1.fc42.aarch64.rpm"; 14 + hash = "sha256-kiNwaB+jNOgkfkJ4V5Fj23RNILP3IOZfKWKAehMmtZ0="; 8 15 }
+5 -1
pkgs/by-name/si/signal-desktop/signal-desktop.nix
··· 1 1 { callPackage }: 2 2 callPackage ./generic.nix { } rec { 3 3 pname = "signal-desktop"; 4 - dir = "Signal"; 5 4 version = "7.46.0"; 5 + 6 + libdir = "opt/Signal"; 7 + bindir = libdir; 8 + extractPkg = "dpkg-deb -x $downloadedFile $out"; 9 + 6 10 url = "https://updates.signal.org/desktop/apt/pool/s/signal-desktop/signal-desktop_${version}_amd64.deb"; 7 11 hash = "sha256-HbmyivfhvZfXdtcL/Cjzl4v0Ck/fJCD517iTjIeidgc="; 8 12 }
+23 -29
pkgs/by-name/si/signal-desktop/update.sh
··· 1 1 #!/usr/bin/env nix-shell 2 - #!nix-shell -i bash -p bash nix-update curl coreutils jq 2 + #!nix-shell -i bash -p bash common-updater-scripts curl coreutils jq 3 3 4 4 set -ex 5 5 6 6 SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" &>/dev/null && pwd)" 7 7 8 - curl_github() { 9 - curl ${GITHUB_TOKEN:+" -u \":$GITHUB_TOKEN\""} "$@" 10 - } 8 + latestTag=$(curl ${GITHUB_TOKEN:+" -u \":$GITHUB_TOKEN\""} \ 9 + "https://api.github.com/repos/signalapp/Signal-Desktop/releases/latest" \ 10 + | jq -r ".tag_name") 11 + latestVersion="$(expr "$latestTag" : 'v\(.*\)')" 11 12 12 - case "$UPDATE_NIX_ATTR_PATH" in 13 - signal-desktop) 14 - latestTag=$(curl_github https://api.github.com/repos/signalapp/Signal-Desktop/releases/latest | jq -r ".tag_name") 15 - latestVersion="$(expr "$latestTag" : 'v\(.*\)')" 16 - latestVersionAarch64=$(curl_github "https://api.github.com/repos/0mniteck/Signal-Desktop-Mobian/releases/latest" | jq -r ".tag_name") 13 + latestBuildInfoAarch64=$(curl \ 14 + "https://copr.fedorainfracloud.org/api_3/package/?ownername=useidel&projectname=signal-desktop&packagename=signal-desktop&with_latest_succeeded_build=true" \ 15 + | jq '.builds.latest_succeeded') 16 + latestBuildAarch64=$(jq '.id' <<< $latestBuildInfoAarch64) 17 + latestVersionAarch64=$(jq -r '.source_package.version' <<< $latestBuildInfoAarch64) 17 18 18 - echo "Updating signal-desktop for x86_64-linux" 19 - nix-update --version "$latestVersion" \ 20 - --system x86_64-linux \ 21 - --override-filename "$SCRIPT_DIR/signal-desktop.nix" \ 22 - signal-desktop 19 + echo "Updating signal-desktop for x86_64-linux" 20 + update-source-version signal-desktop "$latestVersion" \ 21 + --system=x86_64-linux \ 22 + --file="$SCRIPT_DIR/signal-desktop.nix" 23 23 24 - echo "Updating signal-desktop for aarch64-linux" 25 - nix-update --version "$latestVersionAarch64" \ 26 - --system aarch64-linux \ 27 - --override-filename "$SCRIPT_DIR/signal-desktop-aarch64.nix" \ 28 - signal-desktop 24 + echo "Updating signal-desktop for aarch64-linux" 25 + update-source-version signal-desktop "$latestVersionAarch64" "" \ 26 + "https://download.copr.fedorainfracloud.org/results/useidel/signal-desktop/fedora-42-aarch64/$(printf "%08d" $latestBuildAarch64)-signal-desktop/signal-desktop-$latestVersionAarch64.fc42.aarch64.rpm" \ 27 + --system=aarch64-linux \ 28 + --file="$SCRIPT_DIR/signal-desktop-aarch64.nix" 29 29 30 - echo "Updating signal-desktop for darwin" 31 - nix-update --version "$latestVersion" \ 32 - --system aarch64-darwin \ 33 - --override-filename "$SCRIPT_DIR/signal-desktop-darwin.nix" \ 34 - signal-desktop 35 - ;; 36 - *) 37 - echo "Unknown attr path $UPDATE_NIX_ATTR_PATH" 38 - ;; 39 - esac 30 + echo "Updating signal-desktop for darwin" 31 + update-source-version signal-desktop "$latestVersion" \ 32 + --system=aarch64-darwin \ 33 + --file="$SCRIPT_DIR/signal-desktop-darwin.nix"
+3 -3
pkgs/by-name/st/storj-uplink/package.nix
··· 6 6 7 7 buildGoModule rec { 8 8 pname = "storj-uplink"; 9 - version = "1.123.4"; 9 + version = "1.124.4"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "storj"; 13 13 repo = "storj"; 14 14 rev = "v${version}"; 15 - hash = "sha256-H62QB/lS3rDUPDJMckRVhChgevyXfQzPBT+XI4/uDNE="; 15 + hash = "sha256-3VrmFSE5YdZYxcEoWtEgonQz7ZERLfF12zcPExNToVs="; 16 16 }; 17 17 18 18 subPackages = [ "cmd/uplink" ]; 19 19 20 - vendorHash = "sha256-s6UrM7Kj/w09EXLHeyzcE6YLzucUz/qEpXsghFETRig="; 20 + vendorHash = "sha256-d/ddvixerg30JZtQGNWycUR93Qeaha89W8unKUFPkDg="; 21 21 22 22 ldflags = [ 23 23 "-s"
+3 -3
pkgs/by-name/te/television/package.nix
··· 8 8 }: 9 9 rustPlatform.buildRustPackage rec { 10 10 pname = "television"; 11 - version = "0.10.7"; 11 + version = "0.10.8"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "alexpasmantier"; 15 15 repo = "television"; 16 16 tag = version; 17 - hash = "sha256-M3n644064cmg7PHmJqQpPZHl4SjshERh2gkKCWvOzcw="; 17 + hash = "sha256-2jUCRt0Ws0KHAClSsTAui8LOz6eGGpV7F7Z3DdzqORM="; 18 18 }; 19 19 20 20 useFetchCargoVendor = true; 21 - cargoHash = "sha256-TtLPH6k1oXAJRgbUXTvcOMOWmYCOCuhM+82yLBkwPXo="; 21 + cargoHash = "sha256-lwIUmJ/Hgl6Kycd+SVRCawwlF7UJ0pyE2r6iJInYWX8="; 22 22 23 23 passthru = { 24 24 tests.version = testers.testVersion {
+21 -23
pkgs/by-name/ts/tsukimi/package.nix
··· 11 11 libepoxy, 12 12 wrapGAppsHook4, 13 13 nix-update-script, 14 + stdenv, 15 + meson, 16 + ninja, 17 + rustc, 18 + cargo, 19 + dbus, 20 + desktop-file-utils, 14 21 }: 15 - rustPlatform.buildRustPackage rec { 22 + stdenv.mkDerivation rec { 16 23 pname = "tsukimi"; 17 - version = "0.19.3"; 24 + version = "0.19.4"; 18 25 19 26 src = fetchFromGitHub { 20 27 owner = "tsukinaha"; 21 28 repo = "tsukimi"; 22 29 tag = "v${version}"; 23 - hash = "sha256-MNPg3qg9wRRWKofH4NSRIa76+nA3IFoMfOt6s5+4y8A="; 24 - fetchSubmodules = true; 30 + hash = "sha256-7Us+mz0FHetka4uVDCWkAGyGMZRhQDotRsySljYZgCo="; 25 31 }; 26 32 27 - useFetchCargoVendor = true; 28 - cargoHash = "sha256-mS5qKEm3oCHiFP5i/XHnIOBmXzvlgfE2i/f0lLl4TN4="; 33 + cargoDeps = rustPlatform.fetchCargoVendor { 34 + inherit src; 35 + hash = "sha256-JaBFL7XHVjf4NP41n9qtb5oQyaP1bYQETPYMCR9XEvQ="; 36 + }; 29 37 30 38 nativeBuildInputs = [ 31 39 pkg-config 32 40 wrapGAppsHook4 41 + meson 42 + ninja 43 + rustPlatform.cargoSetupHook 44 + rustc 45 + cargo 46 + desktop-file-utils 33 47 ]; 34 48 35 49 buildInputs = ··· 39 53 libadwaita 40 54 openssl 41 55 libepoxy 56 + dbus 42 57 ] 43 58 ++ (with gst_all_1; [ 44 59 gstreamer ··· 50 65 ]); 51 66 52 67 doCheck = false; # tests require networking 53 - 54 - postPatch = '' 55 - substituteInPlace build.rs \ 56 - --replace-fail 'i18n/locale' "$out/share/locale" 57 - 58 - substituteInPlace src/lib.rs \ 59 - --replace-fail '/usr/share/locale' "$out/share/locale" 60 - ''; 61 - 62 - postInstall = '' 63 - install -Dm644 resources/moe.tsuna.tsukimi.gschema.xml -t $out/share/glib-2.0/schemas 64 - glib-compile-schemas $out/share/glib-2.0/schemas 65 - 66 - install -Dm644 resources/icons/tsukimi.png -t $out/share/pixmaps 67 - 68 - install -Dm644 resources/moe.tsuna.tsukimi.desktop.in $out/share/applications/moe.tsuna.tsukimi.desktop 69 - ''; 70 68 71 69 passthru.updateScript = nix-update-script { }; 72 70
+61
pkgs/development/libraries/qt-5/modules/qtwebengine.nix
··· 161 161 # Fix race condition exposed by missing dependency 162 162 # https://bugs.gentoo.org/933368 163 163 ./qtwebengine-fix_build_pdf_extension_util.patch 164 + 165 + # The latest version of Clang changed what macros it predefines on Apple 166 + # targets, causing errors about predefined macros in zlib. 167 + (fetchpatch2 { 168 + url = "https://github.com/chromium/chromium/commit/2f39ac8d0a414dd65c0e1d5aae38c8f97aa06ae9.patch"; 169 + hash = "sha256-3kA2os0IntxIiJwzS5nPd7QWYlOWOpoLKYsOQFYv0Sk="; 170 + stripLen = 1; 171 + extraPrefix = "src/3rdparty/chromium/"; 172 + }) 173 + 174 + # The latest version of Clang changed what macros it predefines on Apple 175 + # targets, causing errors about predefined macros in libpng. 176 + (fetchpatch2 { 177 + url = "https://github.com/chromium/chromium/commit/66defc14abe47c0494da9faebebfa0a5b6efcf38.patch"; 178 + hash = "sha256-ErS5Eycls5+xQLGYKz1r/tQC6IcRJWb/WoGsUyzO9WY="; 179 + stripLen = 1; 180 + extraPrefix = "src/3rdparty/chromium/"; 181 + }) 182 + 183 + # https://trac.macports.org/ticket/71563 184 + # src/3rdparty/chromium/third_party/freetype/src/src/gzip/ftzconf.h:228:12: error: unknown type name 'Byte' 185 + (fetchpatch2 { 186 + url = "https://github.com/macports/macports-ports/raw/f9a4136c48020b01ecc6dffa99b88333c360f056/aqua/qt5/files/patch-qtwebengine-chromium-freetype-gzip.diff"; 187 + hash = "sha256-NeLmMfYMo80u3h+5GTenMANWfWLPeS35cKg+h3vzW4g="; 188 + extraPrefix = ""; 189 + }) 190 + 191 + # src/3rdparty/chromium/base/process/process_metrics_mac.cc:303:17: error: static assertion expression is not an integral constant expression 192 + (fetchpatch2 { 193 + url = "https://github.com/macports/macports-ports/raw/f9a4136c48020b01ecc6dffa99b88333c360f056/aqua/qt5/files/patch-qtwebengine_chromium_static_page_size.diff"; 194 + hash = "sha256-8TFN5XU0SUvPJCFU6wvcKP5a8HCd0ygUnLT8BF4MZ/E="; 195 + extraPrefix = ""; 196 + }) 197 + 198 + # Add "-target-feature +aes" to the arm crc32c build flags 199 + (fetchpatch2 { 200 + url = "https://github.com/chromium/chromium/commit/9f43d823b6b4cdea62f0cc7563ff01f9239b8970.patch"; 201 + hash = "sha256-2WCx+ZOWA8ZyV2yiSQLx9uFZOoeWQHxLqwLEZsV41QU="; 202 + stripLen = 1; 203 + extraPrefix = "src/3rdparty/chromium/"; 204 + }) 205 + 206 + # Fix build with clang and libc++ 19 207 + # https://github.com/freebsd/freebsd-ports/commit/0ddd6468fb3cb9ba390973520517cb1ca2cd690d 208 + (fetchpatch2 { 209 + url = "https://github.com/freebsd/freebsd-ports/raw/0ddd6468fb3cb9ba390973520517cb1ca2cd690d/www/qt5-webengine/files/patch-libc++19"; 210 + hash = "sha256-pSVPnuEpjFHW60dbId5sZ3zHP709EWG4LSWoS+TkgcQ="; 211 + extraPrefix = ""; 212 + }) 213 + (fetchpatch2 { 214 + url = "https://github.com/freebsd/freebsd-ports/raw/0ddd6468fb3cb9ba390973520517cb1ca2cd690d/www/qt5-webengine/files/patch-src_3rdparty_chromium_third__party_blink_renderer_platform_wtf_hash__table.h"; 215 + hash = "sha256-+vyWC7Indd1oBhvL5fMTlIH4mM4INgISZFAbHsq32Lg="; 216 + extraPrefix = ""; 217 + }) 218 + (fetchpatch2 { 219 + url = "https://github.com/freebsd/freebsd-ports/raw/0ddd6468fb3cb9ba390973520517cb1ca2cd690d/www/qt5-webengine/files/patch-src_3rdparty_chromium_third__party_perfetto_include_perfetto_tracing_internal_track__event__data__source.h"; 220 + hash = "sha256-DcAYOV9b30ogPCiedvQimEmiZpUJquk5j6WLjJxR54U="; 221 + extraPrefix = ""; 222 + }) 164 223 ]; 165 224 166 225 postPatch = ··· 248 307 # https://trac.macports.org/ticket/70850 249 308 "-Wno-enum-constexpr-conversion" 250 309 "-Wno-unused-but-set-variable" 310 + # Clang 19 311 + "-Wno-error=missing-template-arg-list-after-template-kw" 251 312 ] 252 313 ); 253 314 }
-6
pkgs/development/python-modules/cliff/default.nix
··· 26 26 hash = "sha256-WzkhmCk8C5Il1Fm+i6cQz4JI8e4zAGves9kvsAElkrQ="; 27 27 }; 28 28 29 - postPatch = '' 30 - # only a small portion of the listed packages are actually needed for running the tests 31 - # so instead of removing them one by one remove everything 32 - rm test-requirements.txt 33 - ''; 34 - 35 29 build-system = [ 36 30 openstackdocstheme 37 31 setuptools
+2 -2
pkgs/development/python-modules/knx-frontend/default.nix
··· 7 7 8 8 buildPythonPackage rec { 9 9 pname = "knx-frontend"; 10 - version = "2025.1.30.194235"; 10 + version = "2025.3.8.214559"; 11 11 pyproject = true; 12 12 13 13 # TODO: source build, uses yarn.lock 14 14 src = fetchPypi { 15 15 pname = "knx_frontend"; 16 16 inherit version; 17 - hash = "sha256-P3KUpmltw7xX/6xq9RMFlP8UMDp2/ynvVCkK3rvwzk0="; 17 + hash = "sha256-ExAQPrvK6lQ+tmsgNNAvbsVWGuZyqjRecL/5fW0dLgY="; 18 18 }; 19 19 20 20 build-system = [ setuptools ];
+7 -3
pkgs/development/python-modules/lightning-utilities/default.nix
··· 18 18 19 19 buildPythonPackage rec { 20 20 pname = "lightning-utilities"; 21 - version = "0.14.0"; 21 + version = "0.14.1"; 22 22 pyproject = true; 23 23 24 24 src = fetchFromGitHub { 25 25 owner = "Lightning-AI"; 26 26 repo = "utilities"; 27 27 tag = "v${version}"; 28 - hash = "sha256-lRH1ZQQHnn18NxmLDHy/uSgzgXpLuDD5/08OIErEs7g="; 28 + hash = "sha256-QHE2ksoINQ0sfTSxXxM9ZVEIhEOncaq1i8ZNqznISJw="; 29 29 }; 30 30 31 31 postPatch = '' ··· 49 49 ]; 50 50 51 51 disabledTests = [ 52 - "lightning_utilities.core.enums.StrEnum" 52 + # DocTestFailure 53 53 "lightning_utilities.core.imports.RequirementCache" 54 + 55 + # NameError: name 'operator' is not defined. Did you forget to import 'operator' 54 56 "lightning_utilities.core.imports.compare_version" 57 + 58 + # importlib.metadata.PackageNotFoundError: No package metadata was found for pytorch-lightning==1.8.0 55 59 "lightning_utilities.core.imports.get_dependency_min_version_spec" 56 60 57 61 # weird doctests fail on imports, but providing the dependency
+70
pkgs/development/python-modules/pyoxigraph/default.nix
··· 1 + { 2 + stdenv, 3 + apple-sdk_15, 4 + buildPythonPackage, 5 + fetchFromGitHub, 6 + lib, 7 + pkg-config, 8 + pythonOlder, 9 + pytestCheckHook, 10 + rustPlatform, 11 + }: 12 + buildPythonPackage rec { 13 + pname = "pyoxigraph"; 14 + pyproject = true; 15 + version = "0.4.8"; 16 + 17 + src = fetchFromGitHub { 18 + owner = "oxigraph"; 19 + repo = "oxigraph"; 20 + tag = "v${version}"; 21 + fetchSubmodules = true; 22 + hash = "sha256-yMXNt7pGiwYDXjmHxKUQpqNrAmnFpg21Vc5R1DmwsHc="; 23 + }; 24 + 25 + cargoDeps = rustPlatform.fetchCargoVendor { 26 + inherit pname version src; 27 + hash = "sha256-qOGpM3SOAOMO5W3wj4ruXlymp9bV4sqOU75gMVSEyfk="; 28 + }; 29 + 30 + buildAndTestSubdir = "python"; 31 + 32 + dependencies = lib.optionals stdenv.hostPlatform.isDarwin [ 33 + apple-sdk_15 34 + ]; 35 + 36 + disabled = pythonOlder "3.8"; 37 + 38 + disabledTests = [ 39 + "test_update_load" 40 + ]; 41 + 42 + disabledTestPaths = [ 43 + # These require network access 44 + "lints/test_spec_links.py" 45 + "lints/test_debian_compatibility.py" 46 + "oxrocksdb-sys/rocksdb/tools/block_cache_analyzer/block_cache_pysim_test.py" 47 + "oxrocksdb-sys/rocksdb/tools" 48 + ]; 49 + 50 + nativeBuildInputs = [ 51 + pkg-config 52 + rustPlatform.bindgenHook 53 + rustPlatform.cargoSetupHook 54 + rustPlatform.maturinBuildHook 55 + ]; 56 + 57 + nativeCheckInputs = [ pytestCheckHook ]; 58 + pythonImportsCheck = [ "pyoxigraph" ]; 59 + 60 + meta = { 61 + homepage = "https://github.com/oxigraph/oxigraph"; 62 + description = "SPARQL graph database"; 63 + maintainers = with lib.maintainers; [ dadada ]; 64 + license = with lib.licenses; [ 65 + asl20 66 + mit 67 + ]; 68 + platforms = lib.platforms.unix; 69 + }; 70 + }
+3 -3
pkgs/development/python-modules/pyqt/sip.nix
··· 7 7 8 8 buildPythonPackage rec { 9 9 pname = "pyqt5-sip"; 10 - version = "12.15.0"; 10 + version = "12.17.0"; 11 11 12 12 src = fetchPypi { 13 - pname = "PyQt5_sip"; 13 + pname = "pyqt5_sip"; 14 14 inherit version; 15 - hash = "sha256-0j/fzzY7XO3Z05+KnFcQ59UoBPWwiljpHGOLNur8twI="; 15 + hash = "sha256-aC2tzb0iOa+f3AwGKOJ3a4IOEovsiLSbjWkv5oL5C08="; 16 16 }; 17 17 18 18 # There is no test code and the check phase fails with:
+10 -1
pkgs/development/python-modules/python-ironicclient/default.nix
··· 65 65 66 66 checkPhase = '' 67 67 runHook preCheck 68 - stestr run 68 + stestr run -e <(echo " 69 + ironicclient.tests.unit.osc.v1.test_baremetal_chassis.TestChassisCreate.test_chassis_create_no_options 70 + ironicclient.tests.unit.osc.v1.test_baremetal_chassis.TestChassisCreate.test_chassis_create_with_description 71 + ironicclient.tests.unit.osc.v1.test_baremetal_chassis.TestChassisCreate.test_chassis_create_with_extra 72 + ironicclient.tests.unit.osc.v1.test_baremetal_chassis.TestChassisCreate.test_chassis_create_with_uuid 73 + ironicclient.tests.unit.osc.v1.test_baremetal_conductor.TestBaremetalConductorShow.test_conductor_show 74 + ironicclient.tests.unit.osc.v1.test_baremetal_node.TestBaremetalCreate 75 + ironicclient.tests.unit.osc.v1.test_baremetal_node.TestBaremetalShow.test_baremetal_show 76 + ironicclient.tests.unit.osc.v1.test_baremetal_node.TestNodeHistoryEventGet.test_baremetal_node_history_list 77 + ") 69 78 runHook postCheck 70 79 ''; 71 80
+3 -2
pkgs/development/python-modules/tempest/default.nix
··· 36 36 version = "42.0.0"; 37 37 pyproject = true; 38 38 39 - disabled = pythonOlder "3.8"; 40 - 41 39 src = fetchPypi { 42 40 inherit pname version; 43 41 hash = "sha256-nW6cSOhC56YkyUQiXcJTqaojRseIf9q8YGSe4skhTA4="; ··· 86 84 chmod +x bin/* 87 85 88 86 stestr --test-path tempest/tests run -e <(echo " 87 + tempest.tests.cmd.test_cleanup.TestTempestCleanup.test_load_json_resource_list 88 + tempest.tests.cmd.test_cleanup.TestTempestCleanup.test_load_json_saved_state 89 + tempest.tests.cmd.test_cleanup.TestTempestCleanup.test_take_action_got_exception 89 90 tempest.tests.lib.cli.test_execute.TestExecute.test_execute_with_prefix 90 91 ") 91 92 '';
+9 -22
pkgs/development/tools/rust/cargo-outdated/default.nix
··· 1 1 { 2 2 lib, 3 3 rustPlatform, 4 - fetchCrate, 4 + fetchFromGitHub, 5 5 pkg-config, 6 6 openssl, 7 - stdenv, 8 - curl, 9 - CoreFoundation, 10 - CoreServices, 11 - Security, 12 - SystemConfiguration, 13 7 }: 14 - 15 8 rustPlatform.buildRustPackage rec { 16 9 pname = "cargo-outdated"; 17 - version = "0.16.0"; 10 + version = "0.17.0"; 18 11 19 - src = fetchCrate { 20 - inherit pname version; 21 - hash = "sha256-bAo3098QxepKbvBb9uF6iGNW0+RAKCCMyWfuG5WyREo="; 12 + src = fetchFromGitHub { 13 + owner = "kbknapp"; 14 + repo = "cargo-outdated"; 15 + rev = "v${version}"; 16 + hash = "sha256-ey11ANSflWGnCsn6M9GupgC4DE5mWww6vw5pK0CFdLo="; 22 17 }; 23 18 24 19 useFetchCargoVendor = true; 25 - cargoHash = "sha256-h+sxnTAJ1uhPUk5dRiYPgPoxvbpVggnCn0TQ6kRCzO4="; 20 + cargoHash = "sha256-PYlVXGfitsjEGiw07L5b+L8pfxvtkHshIjTXeuPUTdk="; 26 21 27 22 nativeBuildInputs = [ pkg-config ]; 28 23 29 - buildInputs = 30 - [ openssl ] 31 - ++ lib.optionals stdenv.hostPlatform.isDarwin [ 32 - curl 33 - CoreFoundation 34 - CoreServices 35 - Security 36 - SystemConfiguration 37 - ]; 24 + buildInputs = [ openssl ]; 38 25 39 26 meta = with lib; { 40 27 description = "Cargo subcommand for displaying when Rust dependencies are out of date";
+2 -2
pkgs/servers/home-assistant/custom-components/better_thermostat/package.nix
··· 8 8 buildHomeAssistantComponent rec { 9 9 owner = "KartoffelToby"; 10 10 domain = "better_thermostat"; 11 - version = "1.6.1"; 11 + version = "1.7.0"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "KartoffelToby"; 15 15 repo = "better_thermostat"; 16 16 tag = version; 17 - hash = "sha256-zXO2UDLhSTOemzsO9G5ZUzr50Zg8kDW/aObn6Y3j70k="; 17 + hash = "sha256-rE14iKAXo3hecK3bQ9MLcOtnZviwjOpYKGlIc4+uCfw="; 18 18 }; 19 19 20 20 passthru.updateScript = gitUpdater {
+1 -1
pkgs/top-level/aliases.nix
··· 213 213 bibata-extra-cursors = throw "bibata-cursors has been removed as it was broken"; # Added 2024-07-15 214 214 bitcoin-unlimited = throw "bitcoin-unlimited has been removed as it was broken and unmaintained"; # Added 2024-07-15 215 215 bitcoind-unlimited = throw "bitcoind-unlimited has been removed as it was broken and unmaintained"; # Added 2024-07-15 216 - bird = bird2; # Added 2025-01-11 216 + bird = throw "The bird alias was ambiguous and has been removed for the time being. Please explicitly choose bird2 or bird3."; # Added 2025-01-11 217 217 bisq-desktop = throw "bisq-desktop has been removed because OpenJFX 11 was removed"; # Added 2024-11-17 218 218 bitwarden = bitwarden-desktop; # Added 2024-02-25 219 219 blender-with-packages = args:
+1 -3
pkgs/top-level/all-packages.nix
··· 6583 6583 cargo-edit = callPackage ../development/tools/rust/cargo-edit { 6584 6584 inherit (darwin.apple_sdk.frameworks) Security; 6585 6585 }; 6586 - cargo-outdated = callPackage ../development/tools/rust/cargo-outdated { 6587 - inherit (darwin.apple_sdk.frameworks) CoreFoundation CoreServices Security SystemConfiguration; 6588 - }; 6586 + cargo-outdated = callPackage ../development/tools/rust/cargo-outdated { }; 6589 6587 inherit (callPackages ../development/tools/rust/cargo-pgrx { }) 6590 6588 cargo-pgrx_0_12_0_alpha_1 6591 6589 cargo-pgrx_0_12_5
+2
pkgs/top-level/python-packages.nix
··· 12641 12641 12642 12642 pyowm = callPackage ../development/python-modules/pyowm { }; 12643 12643 12644 + pyoxigraph = callPackage ../development/python-modules/pyoxigraph { }; 12645 + 12644 12646 pypager = callPackage ../development/python-modules/pypager { }; 12645 12647 12646 12648 pypamtest = toPythonModule (pkgs.libpam-wrapper.override {