···8484 [ mathcomp.ssreflect mathcomp.algebra mathcomp-finmap mathcomp-bigenough ];
85858686 meta = {
8787- description = "A Coq/SSReflect Library for Monoidal Rings and Multinomials";
8787+ description = "Coq/SSReflect Library for Monoidal Rings and Multinomials";
8888 license = lib.licenses.cecill-c;
8989 };
9090}
+1-1
doc/languages-frameworks/javascript.section.md
···206206 NODE_OPTIONS = "--openssl-legacy-provider";
207207208208 meta = {
209209- description = "A modern web UI for various torrent clients with a Node.js backend and React frontend";
209209+ description = "Modern web UI for various torrent clients with a Node.js backend and React frontend";
210210 homepage = "https://flood.js.org";
211211 license = lib.licenses.gpl3Only;
212212 maintainers = with lib.maintainers; [ winter ];
+1-1
doc/languages-frameworks/ocaml.section.md
···113113114114 meta = {
115115 homepage = "https://github.com/flowtype/ocaml-wtf8";
116116- description = "WTF-8 is a superset of UTF-8 that allows unpaired surrogates.";
116116+ description = "WTF-8 is a superset of UTF-8 that allows unpaired surrogates";
117117 license = lib.licenses.mit;
118118 maintainers = [ lib.maintainers.eqyiel ];
119119 };
+1-1
doc/languages-frameworks/perl.section.md
···158158 };
159159 propagatedBuildInputs = [ XMLNamespaceSupport XMLSAX XMLSAXExpat ];
160160 meta = {
161161- description = "An API for simple XML files";
161161+ description = "API for simple XML files";
162162 license = with lib.licenses; [ artistic1 gpl1Plus ];
163163 };
164164 };
+2-2
doc/languages-frameworks/python.section.md
···993993 meta = {
994994 changelog = "https://github.com/blaze/datashape/releases/tag/${version}";
995995 homepage = "https://github.com/ContinuumIO/datashape";
996996- description = "A data description language";
996996+ description = "Data description language";
997997 license = lib.licenses.bsd2;
998998 };
999999}
···1118111811191119 meta = {
11201120 changelog = "https://github.com/pyFFTW/pyFFTW/releases/tag/v${version}";
11211121- description = "A pythonic wrapper around FFTW, the FFT library, presenting a unified interface for all the supported transforms";
11211121+ description = "Pythonic wrapper around FFTW, the FFT library, presenting a unified interface for all the supported transforms";
11221122 homepage = "http://hgomersall.github.com/pyFFTW";
11231123 license = with lib.licenses; [ bsd2 bsd3 ];
11241124 };
+2-2
doc/languages-frameworks/rust.section.md
···3838 cargoHash = "sha256-jtBw4ahSl88L0iuCXxQgZVm1EcboWRJMNtjxLVTtzts=";
39394040 meta = {
4141- description = "A fast line-oriented regex search tool, similar to ag and ack";
4141+ description = "Fast line-oriented regex search tool, similar to ag and ack";
4242 homepage = "https://github.com/BurntSushi/ripgrep";
4343 license = lib.licenses.unlicense;
4444 maintainers = [];
···997997 doCheck = false;
998998999999 meta = {
10001000- description = "A fast line-oriented regex search tool, similar to ag and ack";
10001000+ description = "Fast line-oriented regex search tool, similar to ag and ack";
10011001 homepage = "https://github.com/BurntSushi/ripgrep";
10021002 license = with lib.licenses; [ mit unlicense ];
10031003 maintainers = with lib.maintainers; [];
+1-1
doc/languages-frameworks/texlive.section.md
···183183 '';
184184185185 meta = {
186186- description = "A LaTeX2e class for overhead transparencies";
186186+ description = "LaTeX2e class for overhead transparencies";
187187 license = lib.licenses.unfreeRedistributable;
188188 maintainers = with lib.maintainers; [ veprbl ];
189189 platforms = lib.platforms.all;
+1-1
doc/stdenv/meta.chapter.md
···55```nix
66{
77 meta = {
88- description = "A program that produces a familiar, friendly greeting";
88+ description = "Program that produces a familiar, friendly greeting";
99 longDescription = ''
1010 GNU Hello is a program that prints "Hello, world!" when you run it.
1111 It is fully customizable.
···18181919## New Services {#sec-release-24.11-new-services}
20202121+- [FlareSolverr](https://github.com/FlareSolverr/FlareSolverr), proxy server to bypass Cloudflare protection. Available as [services.flaresolverr](#opt-services.flaresolverr.enable) service.
2222+2123- [Open-WebUI](https://github.com/open-webui/open-webui), a user-friendly WebUI
2224 for LLMs. Available as [services.open-webui](#opt-services.open-webui.enable)
2325 service.
···11-22-# Convert a list of strings to a regex that matches everything but those strings
33-# ... and it had to be a POSIX regex; no negative lookahead :(
44-# This is a workaround for erofs supporting only exclude regex, not an include list
55-66-import sys
77-import re
88-from collections import defaultdict
99-1010-# We can configure this script to match in different ways if we need to.
1111-# The regex got too long for the argument list, so we had to truncate the
1212-# hashes and use MATCH_STRING_PREFIX. That's less accurate, and might pick up some
1313-# garbage like .lock files, but only if the sandbox doesn't hide those. Even
1414-# then it should be harmless.
1515-1616-# Produce the negation of ^a$
1717-MATCH_EXACTLY = ".+"
1818-# Produce the negation of ^a
1919-MATCH_STRING_PREFIX = "//X" # //X should be epsilon regex instead. Not supported??
2020-# Produce the negation of ^a/?
2121-MATCH_SUBPATHS = "[^/].*$"
2222-2323-# match_end = MATCH_SUBPATHS
2424-match_end = MATCH_STRING_PREFIX
2525-# match_end = MATCH_EXACTLY
2626-2727-def chars_to_inverted_class(letters):
2828- assert len(letters) > 0
2929- letters = list(letters)
3030-3131- s = "[^"
3232-3333- if "]" in letters:
3434- s += "]"
3535- letters.remove("]")
3636-3737- final = ""
3838- if "-" in letters:
3939- final = "-"
4040- letters.remove("-")
4141-4242- s += "".join(letters)
4343-4444- s += final
4545-4646- s += "]"
4747-4848- return s
4949-5050-# There's probably at least one bug in here, but it seems to works well enough
5151-# for filtering store paths.
5252-def strings_to_inverted_regex(strings):
5353- s = "("
5454-5555- # Match anything that starts with the wrong character
5656-5757- chars = defaultdict(list)
5858-5959- for item in strings:
6060- if item != "":
6161- chars[item[0]].append(item[1:])
6262-6363- if len(chars) == 0:
6464- s += match_end
6565- else:
6666- s += chars_to_inverted_class(chars)
6767-6868- # Now match anything that starts with the right char, but then goes wrong
6969-7070- for char, sub in chars.items():
7171- s += "|(" + re.escape(char) + strings_to_inverted_regex(sub) + ")"
7272-7373- s += ")"
7474- return s
7575-7676-if __name__ == "__main__":
7777- stdin_lines = []
7878- for line in sys.stdin:
7979- if line.strip() != "":
8080- stdin_lines.append(line.strip())
8181-8282- print("^" + strings_to_inverted_regex(stdin_lines))
8383-8484-# Test:
8585-# (echo foo; echo fo/; echo foo/; echo foo/ba/r; echo b; echo az; echo az/; echo az/a; echo ab; echo ab/a; echo ab/; echo abc; echo abcde; echo abb; echo ac; echo b) | grep -vE "$((echo ab; echo az; echo foo;) | python includes-to-excludes.py | tee /dev/stderr )"
8686-# should print ab, az, foo and their subpaths
···134134 TMPDIR=$(mktemp -d nix-vm.XXXXXXXXXX --tmpdir)
135135 fi
136136137137- ${lib.optionalString (cfg.useNixStoreImage)
138138- (if cfg.writableStore
139139- then ''
140140- # Create a writable copy/snapshot of the store image.
141141- ${qemu}/bin/qemu-img create -f qcow2 -F qcow2 -b ${storeImage}/nixos.qcow2 "$TMPDIR"/store.img
142142- ''
143143- else ''
144144- (
145145- cd ${builtins.storeDir}
146146- ${hostPkgs.erofs-utils}/bin/mkfs.erofs \
147147- --force-uid=0 \
148148- --force-gid=0 \
149149- -L ${nixStoreFilesystemLabel} \
150150- -U eb176051-bd15-49b7-9e6b-462e0b467019 \
151151- -T 0 \
152152- --exclude-regex="$(
153153- <${hostPkgs.closureInfo { rootPaths = [ config.system.build.toplevel regInfo ]; }}/store-paths \
154154- sed -e 's^.*/^^g' \
155155- | cut -c -10 \
156156- | ${hostPkgs.python3}/bin/python ${./includes-to-excludes.py} )" \
157157- "$TMPDIR"/store.img \
158158- . \
159159- </dev/null >/dev/null
160160- )
161161- ''
162162- )
137137+ ${lib.optionalString (cfg.useNixStoreImage) ''
138138+ echo "Creating Nix store image..."
139139+140140+ ${hostPkgs.gnutar}/bin/tar --create \
141141+ --absolute-names \
142142+ --verbatim-files-from \
143143+ --transform 'flags=rSh;s|/nix/store/||' \
144144+ --files-from ${hostPkgs.closureInfo { rootPaths = [ config.system.build.toplevel regInfo ]; }}/store-paths \
145145+ | ${hostPkgs.erofs-utils}/bin/mkfs.erofs \
146146+ --force-uid=0 \
147147+ --force-gid=0 \
148148+ -L ${nixStoreFilesystemLabel} \
149149+ -U eb176051-bd15-49b7-9e6b-462e0b467019 \
150150+ -T 0 \
151151+ --tar=f \
152152+ "$TMPDIR"/store.img
153153+154154+ echo "Created Nix store image."
155155+ ''
163156 }
164157165158 # Create a directory for exchanging data with the VM.
···298291 OVMF = cfg.efi.OVMF;
299292 };
300293301301- storeImage = import ../../lib/make-disk-image.nix {
302302- name = "nix-store-image";
303303- inherit pkgs config lib;
304304- additionalPaths = [ regInfo ];
305305- format = "qcow2";
306306- onlyNixStore = true;
307307- label = nixStoreFilesystemLabel;
308308- partitionTableType = "none";
309309- installBootLoader = false;
310310- touchEFIVars = false;
311311- diskSize = "auto";
312312- additionalSpace = "0M";
313313- copyChannel = false;
314314- };
315315-316294in
317295318296{
···788766 this can drastically improve performance, but at the cost of
789767 disk space and image build time.
790768791791- As an alternative, you can use a bootloader which will provide you
792792- with a full NixOS system image containing a Nix store and
793793- avoid mounting the host nix store through
794794- {option}`virtualisation.mountHostNixStore`.
769769+ The Nix store image is built just-in-time right before the VM is
770770+ started. Because it does not produce another derivation, the image is
771771+ not cached between invocations and never lands in the store or binary
772772+ cache.
773773+774774+ If you want a full disk image with a partition table and a root
775775+ filesystem instead of only a store image, enable
776776+ {option}`virtualisation.useBootLoader` instead.
795777 '';
796778 };
797779···10191001 ];
1020100210211003 warnings =
10221022- optional (
10231023- cfg.writableStore &&
10241024- cfg.useNixStoreImage &&
10251025- opt.writableStore.highestPrio > lib.modules.defaultOverridePriority)
10261026- ''
10271027- You have enabled ${opt.useNixStoreImage} = true,
10281028- without setting ${opt.writableStore} = false.
10291029-10301030- This causes a store image to be written to the store, which is
10311031- costly, especially for the binary cache, and because of the need
10321032- for more frequent garbage collection.
10331033-10341034- If you really need this combination, you can set ${opt.writableStore}
10351035- explicitly to true, incur the cost and make this warning go away.
10361036- Otherwise, we recommend
10371037-10381038- ${opt.writableStore} = false;
10391039- ''
10401040- ++ optional (cfg.directBoot.enable && cfg.useBootLoader)
10041004+ optional (cfg.directBoot.enable && cfg.useBootLoader)
10411005 ''
10421006 You enabled direct boot and a bootloader, QEMU will not boot your bootloader, rendering
10431007 `useBootLoader` useless. You might want to disable one of those options.
···10491013 # FIXME: make a sense of this mess wrt to multiple ESP present in the system, probably use boot.efiSysMountpoint?
10501014 boot.loader.grub.device = mkVMOverride (if cfg.useEFIBoot then "nodev" else cfg.bootLoaderDevice);
10511015 boot.loader.grub.gfxmodeBios = with cfg.resolution; "${toString x}x${toString y}";
10521052-10531053- boot.initrd.kernelModules = optionals (cfg.useNixStoreImage && !cfg.writableStore) [ "erofs" ];
1054101610551017 boot.loader.supportsInitrdSecrets = mkIf (!cfg.useBootLoader) (mkVMOverride false);
10561018···11711133 name = "nix-store";
11721134 file = ''"$TMPDIR"/store.img'';
11731135 deviceExtraOpts.bootindex = "2";
11741174- driveExtraOpts.format = if cfg.writableStore then "qcow2" else "raw";
11361136+ driveExtraOpts.format = "raw";
11751137 }])
11761138 (imap0 (idx: _: {
11771139 file = "$(pwd)/empty${toString idx}.qcow2";
···12261188 });
12271189 "/nix/.ro-store" = lib.mkIf cfg.useNixStoreImage {
12281190 device = "/dev/disk/by-label/${nixStoreFilesystemLabel}";
11911191+ fsType = "erofs";
12291192 neededForBoot = true;
12301193 options = [ "ro" ];
12311194 };
···1717 ladspaH liblo libsigcxx lrdf
1818 ];
19192020+ # NOTE: non provides its own waf script that is incompatible with new
2121+ # python versions. If the script is not present, wafHook will install
2222+ # a compatible version from nixpkgs.
2323+ prePatch = ''
2424+ rm waf
2525+ '';
2626+2027 env.CXXFLAGS = "-std=c++14";
21282229 meta = {
+1-1
pkgs/applications/audio/radiotray-ng/default.nix
···105105 description = "Internet radio player for linux";
106106 homepage = "https://github.com/ebruck/radiotray-ng";
107107 license = licenses.gpl3;
108108- maintainers = with maintainers; [ dtzWill ];
108108+ maintainers = with maintainers; [ ];
109109 platforms = platforms.linux;
110110 };
111111}
···4747 pygobject3
4848 dbus-python
4949 croniter
5050+ setuptools
5051 ];
51525253 # Prevent double wrapping, let the Python wrapper use the args in preFixup.
···2222 homepage = "https://github.com/SRI-CSL/gllvm";
2323 description = "Whole Program LLVM: wllvm ported to go";
2424 license = licenses.bsd3;
2525- maintainers = with maintainers; [ dtzWill ];
2525+ maintainers = with maintainers; [ ];
2626 };
2727}
+3-3
pkgs/development/tools/kustomize/default.nix
···2233buildGoModule rec {
44 pname = "kustomize";
55- version = "5.4.2";
55+ version = "5.4.3";
6677 ldflags = let t = "sigs.k8s.io/kustomize/api/provenance"; in
88 [
···1515 owner = "kubernetes-sigs";
1616 repo = pname;
1717 rev = "kustomize/v${version}";
1818- hash = "sha256-cNmDhKRi4pk26vADFMXN6SocdPF1EIYf4wT4fQYgPVc=";
1818+ hash = "sha256-DrdExiGDWBrlbNIY6R9SXD4cuVyLBOE3ePw1J3hymHA=";
1919 };
20202121 # avoid finding test and development commands
2222 modRoot = "kustomize";
2323 proxyVendor = true;
2424- vendorHash = "sha256-Nbc3zdVD8KIL80TqdcVNFMowfFsKKIPsEpkwq5fvWAI=";
2424+ vendorHash = "sha256-cyTZCa1kmNhomkNNnt2Waww4czOZ5YzDBUDx5gqLHtQ=";
25252626 nativeBuildInputs = [ installShellFiles ];
2727
+1-1
pkgs/development/tools/misc/creduce/default.nix
···7070 property. It is intended for use by people who discover and report
7171 bugs in compilers and other tools that process C/C++ code.
7272 '';
7373- maintainers = [ maintainers.dtzWill ];
7373+ maintainers = [ ];
7474 platforms = platforms.all;
7575 };
7676}
+1-1
pkgs/development/tools/misc/csmith/default.nix
···4545 Csmith has found bugs in every tool that it has tested, and has been used
4646 to find and report more than 400 previously unknown compiler bugs.
4747 '';
4848- maintainers = [ maintainers.dtzWill ];
4848+ maintainers = [ ];
4949 platforms = platforms.all;
5050 };
5151}
···11+{ chromium, testers, chromedriver }:
22+chromium.mkDerivation (_: {
33+ name = "chromedriver";
44+ packageName = "chromedriver";
55+66+ # Build the unstripped target, because stripping in Chromium relies on a prebuilt strip binary
77+ # that doesn't run on NixOS, and we will strip everything ourselves later anyway.
88+ buildTargets = [ "chromedriver.unstripped" ];
99+1010+ installPhase = ''
1111+ install -Dm555 $buildPath/chromedriver.unstripped $out/bin/chromedriver
1212+ '';
1313+1414+ # Kill existing postFixup that tries to patchelf things
1515+ postFixup = null;
1616+1717+ passthru.tests.version = testers.testVersion { package = chromedriver; };
1818+1919+ meta = chromium.meta // {
2020+ homepage = "https://chromedriver.chromium.org/";
2121+ description = "WebDriver server for running Selenium tests on Chrome";
2222+ longDescription = ''
2323+ WebDriver is an open source tool for automated testing of webapps across
2424+ many browsers. It provides capabilities for navigating to web pages, user
2525+ input, JavaScript execution, and more. ChromeDriver is a standalone
2626+ server that implements the W3C WebDriver standard.
2727+ '';
2828+ mainProgram = "chromedriver";
2929+ };
3030+})
···416416 filesToInstall = ["u-boot-sunxi-with-spl.bin"];
417417 };
418418419419+ ubootOrangePiZero3 = buildUBoot {
420420+ defconfig = "orangepi_zero3_defconfig";
421421+ extraMeta.platforms = ["aarch64-linux"];
422422+ # According to https://linux-sunxi.org/H616 the H618 "is a minor update with a larger (1MB) L2 cache" (compared to the H616)
423423+ # but "does require extra support in U-Boot, TF-A and sunxi-fel. Support for that has been merged in mainline releases."
424424+ # But no extra support seems to be in TF-A.
425425+ BL31 = "${armTrustedFirmwareAllwinnerH616}/bl31.bin";
426426+ filesToInstall = ["u-boot-sunxi-with-spl.bin"];
427427+ };
428428+419429 ubootOrangePi3 = buildUBoot {
420430 defconfig = "orangepi_3_defconfig";
421431 extraMeta.platforms = ["aarch64-linux"];
···2222 fetchOptions = (lib.importJSON ./versions.json).${branch};
2323in
2424mkDerivation {
2525+ # this derivation is tricky; it is not an in-tree FreeBSD build but it is meant to be built
2626+ # at the same time as the in-tree FreeBSD code, so it expects the same environment. Therefore,
2727+ # it is appropriate to use the freebsd mkDerivation.
2528 pname = "drm-kmod";
2629 version = branch;
2730