Merge staging-next into staging

authored by

nixpkgs-ci[bot] and committed by
GitHub
fbb3e5e3 77eae487

+839 -309
+4
doc/release-notes/rl-2511.section.md
··· 72 The binary name remains `webfontkitgenerator`. 73 The `webfontkitgenerator` package is an alias to `webfont-bundler`. 74 75 - `inspircd` has been updated to the v4 release series. Please refer to the upstream documentation for [general information](https://docs.inspircd.org/4/overview/#v4-overview) and a list of [breaking changes](https://docs.inspircd.org/4/breaking-changes/). 76 77 - `lima` package now only includes the guest agent for the host's architecture by default. If your guest VM's architecture differs from your Lima host's, you'll need to enable the `lima-additional-guestagents` package by setting `withAdditionalGuestAgents = true` when overriding lima with this input. ··· 94 make the required changes to your database, if needed, then upgrade by setting `services.netbox.package = pkgs.netbox_4_3;` in your configuration. 95 96 - `privatebin` has been updated to `2.0.0`. This release changes configuration defaults including switching the template and removing legacy features. See the [v2.0.0 changelog entry](https://github.com/PrivateBin/PrivateBin/releases/tag/2.0.0) for details on how to upgrade. 97 98 - `go-mockery` has been updated to v3. For migration instructions see the [upstream documentation](https://vektra.github.io/mockery/latest/v3/). If v2 is still required `go-mockery_v2` has been added but will be removed on or before 2029-12-31 in-line with it's [upstream support lifecycle](https://vektra.github.io/mockery/ 99
··· 72 The binary name remains `webfontkitgenerator`. 73 The `webfontkitgenerator` package is an alias to `webfont-bundler`. 74 75 + - `python3Packages.triton` no longer takes an `enableRocm` argument and supports ROCm in all build configurations via runtime binding. In most cases no action will be needed. If triton is unable to find the HIP SDK add `rocmPackages.clr` as a build input or set the environment variable `HIP_PATH="${rocmPackages.clr}"`. 76 + 77 - `inspircd` has been updated to the v4 release series. Please refer to the upstream documentation for [general information](https://docs.inspircd.org/4/overview/#v4-overview) and a list of [breaking changes](https://docs.inspircd.org/4/breaking-changes/). 78 79 - `lima` package now only includes the guest agent for the host's architecture by default. If your guest VM's architecture differs from your Lima host's, you'll need to enable the `lima-additional-guestagents` package by setting `withAdditionalGuestAgents = true` when overriding lima with this input. ··· 96 make the required changes to your database, if needed, then upgrade by setting `services.netbox.package = pkgs.netbox_4_3;` in your configuration. 97 98 - `privatebin` has been updated to `2.0.0`. This release changes configuration defaults including switching the template and removing legacy features. See the [v2.0.0 changelog entry](https://github.com/PrivateBin/PrivateBin/releases/tag/2.0.0) for details on how to upgrade. 99 + 100 + - `rocmPackages.triton` has been removed in favor of `python3Packages.triton`. 101 102 - `go-mockery` has been updated to v3. For migration instructions see the [upstream documentation](https://vektra.github.io/mockery/latest/v3/). If v2 is still required `go-mockery_v2` has been added but will be removed on or before 2029-12-31 in-line with it's [upstream support lifecycle](https://vektra.github.io/mockery/ 103
+1 -1
lib/lists.nix
··· 829 toList [ 1 2 ] 830 => [ 1 2 ] 831 toList "hi" 832 - => [ "hi "] 833 ``` 834 835 :::
··· 829 toList [ 1 2 ] 830 => [ 1 2 ] 831 toList "hi" 832 + => [ "hi" ] 833 ``` 834 835 :::
+5 -1
nixos/README-modular-services.md
··· 51 Provide it as the first attribute in the module: 52 53 ```nix 54 { lib, config, ... }: 55 { 56 _class = "service"; ··· 87 passthru = { 88 services = { 89 default = { 90 - imports = [ ./service.nix ]; 91 example.package = finalAttrs.finalPackage; 92 # ... 93 };
··· 51 Provide it as the first attribute in the module: 52 53 ```nix 54 + # Non-module dependencies (`importApply`) 55 + { writeScript, runtimeShell }: 56 + 57 + # Service module 58 { lib, config, ... }: 59 { 60 _class = "service"; ··· 91 passthru = { 92 services = { 93 default = { 94 + imports = [ (lib.modules.importApply ./service.nix { inherit pkgs; }) ]; 95 example.package = finalAttrs.finalPackage; 96 # ... 97 };
+11 -1
nixos/doc/manual/default.nix
··· 25 escapeShellArg 26 concatMapStringsSep 27 sourceFilesBySuffices 28 ; 29 30 common = import ./common.nix; ··· 129 ''; 130 131 portableServiceOptions = buildPackages.nixosOptionsDoc { 132 - inherit (evalModules { modules = [ ../../modules/system/service/portable/service.nix ]; }) options; 133 inherit revision warningsAreErrors; 134 transformOptions = 135 opt:
··· 25 escapeShellArg 26 concatMapStringsSep 27 sourceFilesBySuffices 28 + modules 29 ; 30 31 common = import ./common.nix; ··· 130 ''; 131 132 portableServiceOptions = buildPackages.nixosOptionsDoc { 133 + inherit 134 + (evalModules { 135 + modules = [ 136 + (modules.importApply ../../modules/system/service/portable/service.nix { 137 + pkgs = throw "nixos docs / portableServiceOptions: Do not reference pkgs in docs"; 138 + }) 139 + ]; 140 + }) 141 + options 142 + ; 143 inherit revision warningsAreErrors; 144 transformOptions = 145 opt:
+3 -1
nixos/doc/manual/development/modular-services.md
··· 85 86 ## Writing and Reviewing a Modular Service {#modular-service-review} 87 88 - Refer to the contributor documentation in [`nixos/README-modular-services.md`](https://github.com/NixOS/nixpkgs/blob/master/nixos/README-modular-services.md). 89 90 ## Portable Service Options {#modular-service-options-portable} 91
··· 85 86 ## Writing and Reviewing a Modular Service {#modular-service-review} 87 88 + A typical service module consists of the following: 89 + 90 + For more details, refer to the contributor documentation in [`nixos/README-modular-services.md`](https://github.com/NixOS/nixpkgs/blob/master/nixos/README-modular-services.md). 91 92 ## Portable Service Options {#modular-service-options-portable} 93
+90
nixos/modules/system/service/README.md
··· 53 54 - **Simple attribute structure**: Unlike `environment.etc`, `configData` uses a simpler structure with just `enable`, `name`, `text`, `source`, and `path` attributes. Complex ownership options were omitted for simplicity and portability. 55 Per-service user creation is still TBD.
··· 53 54 - **Simple attribute structure**: Unlike `environment.etc`, `configData` uses a simpler structure with just `enable`, `name`, `text`, `source`, and `path` attributes. Complex ownership options were omitted for simplicity and portability. 55 Per-service user creation is still TBD. 56 + 57 + ## No `pkgs` module argument 58 + 59 + The modular service infrastructure avoids exposing `pkgs` as a module argument to service modules. Instead, derivations and builder functions are provided through lexical closure, making dependency relationships explicit and avoiding uncertainty about where dependencies come from. 60 + 61 + ### Benefits 62 + 63 + - **Explicit dependencies**: Services declare what they need rather than implicitly depending on `pkgs` 64 + - **No interference**: Service modules can be reused in different contexts without assuming a specific `pkgs` instance. An unexpected `pkgs` version is not a failure mode anymore. 65 + - **Clarity**: With fewer ways to do things, there's no ambiguity about where dependencies come from (from the module, not the OS or service manager) 66 + 67 + ### Implementation 68 + 69 + - **Portable layer**: Service modules in `portable/` do not receive `pkgs` as a module argument. Any required derivations must be provided by the caller. 70 + 71 + - **Systemd integration**: The `systemd/system.nix` module imports `config-data.nix` as a function, providing `pkgs` in lexical closure: 72 + ```nix 73 + (import ../portable/config-data.nix { inherit pkgs; }) 74 + ``` 75 + 76 + - **Service modules**: 77 + 1. Should explicitly declare their package dependencies as options rather than using `pkgs` defaults: 78 + ```nix 79 + { 80 + # Bad: uses pkgs module argument 81 + foo.package = mkOption { 82 + default = pkgs.python3; 83 + # ... 84 + }; 85 + } 86 + ``` 87 + 88 + ```nix 89 + { 90 + # Good: caller provides the package 91 + foo.package = mkOption { 92 + type = types.package; 93 + description = "Python package to use"; 94 + defaultText = lib.literalMD "The package that provided this module."; 95 + }; 96 + } 97 + ``` 98 + 99 + 2. `passthru.services` can still provide a complete module using the package's lexical scope, making the module truly self-contained: 100 + 101 + **Package (`package.nix`):** 102 + ```nix 103 + { 104 + lib, 105 + writeScript, 106 + runtimeShell, 107 + # ... other dependencies 108 + }: 109 + stdenv.mkDerivation (finalAttrs: { 110 + # ... package definition 111 + 112 + passthru.services.default = { 113 + imports = [ 114 + (lib.modules.importApply ./service.nix { 115 + inherit writeScript runtimeShell; 116 + }) 117 + ]; 118 + someService.package = finalAttrs.finalPackage; 119 + }; 120 + }) 121 + ``` 122 + 123 + **Service module (`service.nix`):** 124 + ```nix 125 + # Non-module dependencies (importApply) 126 + { writeScript, runtimeShell }: 127 + 128 + # Service module 129 + { 130 + lib, 131 + config, 132 + options, 133 + ... 134 + }: 135 + { 136 + # Service definition using writeScript, runtimeShell from lexical scope 137 + process.argv = [ 138 + (writeScript "wrapper" '' 139 + #!${runtimeShell} 140 + # ... wrapper logic 141 + '') 142 + # ... other args 143 + ]; 144 + } 145 + ```
+4 -1
nixos/modules/system/service/portable/config-data.nix
··· 1 # Tests in: ../../../../tests/modular-service-etc/test.nix 2 # Configuration data support for portable services 3 # This module provides configData for services, enabling configuration reloading 4 # without terminating and restarting the service process. 5 { 6 lib, 7 - pkgs, 8 ... 9 }: 10 let
··· 1 # Tests in: ../../../../tests/modular-service-etc/test.nix 2 + 3 + # Non-modular context provided by the modular services integration. 4 + { pkgs }: 5 + 6 # Configuration data support for portable services 7 # This module provides configData for services, enabling configuration reloading 8 # without terminating and restarting the service process. 9 { 10 lib, 11 ... 12 }: 13 let
+45 -1
nixos/modules/system/service/portable/lib.nix
··· 1 { lib, ... }: 2 let 3 - inherit (lib) concatLists mapAttrsToList showOption; 4 in 5 rec { 6 flattenMapServicesConfigToList = ··· 30 assertion = ass.assertion; 31 }) config.assertions 32 ); 33 }
··· 1 { lib, ... }: 2 let 3 + inherit (lib) 4 + concatLists 5 + mapAttrsToList 6 + showOption 7 + types 8 + ; 9 in 10 rec { 11 flattenMapServicesConfigToList = ··· 35 assertion = ass.assertion; 36 }) config.assertions 37 ); 38 + 39 + /** 40 + This is the entrypoint for the portable part of modular services. 41 + 42 + It provides the various options that are consumed by service manager implementations. 43 + 44 + # Inputs 45 + 46 + `serviceManagerPkgs`: A Nixpkgs instance which will be used for built-in logic such as converting `configData.<path>.text` to a store path. 47 + 48 + `extraRootModules`: Modules to be loaded into the "root" service submodule, but not into its sub-`services`. That's the modules' own responsibility. 49 + 50 + `extraRootSpecialArgs`: Fixed module arguments that are provided in a similar manner to `extraRootModules`. 51 + 52 + # Output 53 + 54 + An attribute set. 55 + 56 + `serviceSubmodule`: a Module System option type which is a `submodule` with the portable modules and this function's inputs loaded into it. 57 + */ 58 + configure = 59 + { 60 + serviceManagerPkgs, 61 + extraRootModules ? [ ], 62 + extraRootSpecialArgs ? { }, 63 + }: 64 + let 65 + modules = [ 66 + (lib.modules.importApply ./service.nix { pkgs = serviceManagerPkgs; }) 67 + ]; 68 + serviceSubmodule = types.submoduleWith { 69 + class = "service"; 70 + modules = modules ++ extraRootModules; 71 + specialArgs = extraRootSpecialArgs; 72 + }; 73 + in 74 + { 75 + inherit serviceSubmodule; 76 + }; 77 }
+8 -2
nixos/modules/system/service/portable/service.nix
··· 1 { 2 lib, 3 ... ··· 12 imports = [ 13 ../../../../../modules/generic/meta-maintainers.nix 14 ../../../misc/assertions.nix 15 - ./config-data.nix 16 ]; 17 options = { 18 services = mkOption { 19 type = types.attrsOf ( 20 types.submoduleWith { 21 modules = [ 22 - ./service.nix 23 ]; 24 } 25 );
··· 1 + # Non-module arguments 2 + # These are separate from the module arguments to avoid implicit dependencies. 3 + # This makes service modules self-contains, allowing mixing of Nixpkgs versions. 4 + { pkgs }: 5 + 6 + # The module 7 { 8 lib, 9 ... ··· 18 imports = [ 19 ../../../../../modules/generic/meta-maintainers.nix 20 ../../../misc/assertions.nix 21 + (lib.modules.importApply ./config-data.nix { inherit pkgs; }) 22 ]; 23 options = { 24 services = mkOption { 25 type = types.attrsOf ( 26 types.submoduleWith { 27 modules = [ 28 + (lib.modules.importApply ./service.nix { inherit pkgs; }) 29 ]; 30 } 31 );
+17 -9
nixos/modules/system/service/portable/test.nix
··· 7 8 portable-lib = import ./lib.nix { inherit lib; }; 9 10 dummyPkg = 11 name: 12 derivation { ··· 79 modules = [ 80 { 81 options.services = mkOption { 82 - type = types.attrsOf ( 83 - types.submoduleWith { 84 - class = "service"; 85 - modules = [ 86 - ./service.nix 87 - ]; 88 - } 89 - ); 90 }; 91 } 92 exampleConfig 93 ]; 94 }; 95 96 test = 97 assert 98 - exampleEval.config == { 99 services = { 100 service1 = { 101 process = {
··· 7 8 portable-lib = import ./lib.nix { inherit lib; }; 9 10 + configured = portable-lib.configure { 11 + serviceManagerPkgs = throw "do not use pkgs in this test"; 12 + extraRootModules = [ ]; 13 + extraRootSpecialArgs = { }; 14 + }; 15 + 16 dummyPkg = 17 name: 18 derivation { ··· 85 modules = [ 86 { 87 options.services = mkOption { 88 + type = types.attrsOf configured.serviceSubmodule; 89 }; 90 } 91 exampleConfig 92 ]; 93 }; 94 95 + filterEval = 96 + config: 97 + lib.optionalAttrs (config ? process) { 98 + inherit (config) assertions warnings process; 99 + } 100 + // { 101 + services = lib.mapAttrs (k: filterEval) config.services; 102 + }; 103 + 104 test = 105 assert 106 + filterEval exampleEval.config == { 107 services = { 108 service1 = { 109 process = {
+3 -1
nixos/modules/system/service/systemd/service.nix
··· 52 53 in 54 { 55 imports = [ 56 - ../portable/service.nix 57 (lib.mkAliasOptionModule [ "systemd" "service" ] [ "systemd" "services" "" ]) 58 (lib.mkAliasOptionModule [ "systemd" "socket" ] [ "systemd" "sockets" "" ]) 59 ]; ··· 101 }; 102 } 103 ); 104 }; 105 }; 106 config = {
··· 52 53 in 54 { 55 + _class = "service"; 56 imports = [ 57 (lib.mkAliasOptionModule [ "systemd" "service" ] [ "systemd" "services" "" ]) 58 (lib.mkAliasOptionModule [ "systemd" "socket" ] [ "systemd" "sockets" "" ]) 59 ]; ··· 101 }; 102 } 103 ); 104 + # Rendered by the portable docs instead. 105 + visible = false; 106 }; 107 }; 108 config = {
+14 -30
nixos/modules/system/service/systemd/system.nix
··· 59 // concatMapAttrs ( 60 subServiceName: subService: makeUnits unitType (dash prefix subServiceName) subService 61 ) service.services; 62 in 63 { 64 # First half of the magic: mix systemd logic into the otherwise abstract services 65 options = { 66 system.services = mkOption { 67 description = '' 68 A collection of NixOS [modular services](https://nixos.org/manual/nixos/unstable/#modular-services) that are configured as systemd services. 69 ''; 70 - type = types.attrsOf ( 71 - types.submoduleWith { 72 - class = "service"; 73 - modules = [ 74 - ./service.nix 75 - ./config-data-path.nix 76 - 77 - # TODO: Consider removing pkgs. Service modules can provide their own 78 - # dependencies. 79 - { 80 - # Extend portable services option 81 - options.services = lib.mkOption { 82 - type = types.attrsOf ( 83 - types.submoduleWith { 84 - specialArgs.pkgs = pkgs; 85 - modules = [ ]; 86 - } 87 - ); 88 - }; 89 - } 90 - ]; 91 - specialArgs = { 92 - # perhaps: features."systemd" = { }; 93 - # TODO: Consider removing pkgs. Service modules can provide their own 94 - # dependencies. 95 - inherit pkgs; 96 - systemdPackage = config.systemd.package; 97 - }; 98 - } 99 - ); 100 default = { }; 101 visible = "shallow"; 102 };
··· 59 // concatMapAttrs ( 60 subServiceName: subService: makeUnits unitType (dash prefix subServiceName) subService 61 ) service.services; 62 + 63 + modularServiceConfiguration = portable-lib.configure { 64 + serviceManagerPkgs = pkgs; 65 + extraRootModules = [ 66 + ./service.nix 67 + ./config-data-path.nix 68 + ]; 69 + extraRootSpecialArgs = { 70 + systemdPackage = config.systemd.package; 71 + }; 72 + }; 73 in 74 { 75 + _class = "nixos"; 76 + 77 # First half of the magic: mix systemd logic into the otherwise abstract services 78 options = { 79 system.services = mkOption { 80 description = '' 81 A collection of NixOS [modular services](https://nixos.org/manual/nixos/unstable/#modular-services) that are configured as systemd services. 82 ''; 83 + type = types.attrsOf modularServiceConfiguration.serviceSubmodule; 84 default = { }; 85 visible = "shallow"; 86 };
+3 -17
nixos/tests/modular-service-etc/python-http-server.nix
··· 3 { 4 config, 5 lib, 6 - pkgs, 7 ... 8 }: 9 let ··· 16 python-http-server = { 17 package = mkOption { 18 type = types.package; 19 - default = pkgs.python3; 20 description = "Python package to use for the web server"; 21 }; 22 ··· 46 ]; 47 48 configData = { 49 - # This should probably just be {} if we were to put this module in production. 50 - "webroot" = lib.mkDefault { 51 - source = pkgs.runCommand "default-webroot" { } '' 52 - mkdir -p $out 53 - cat > $out/index.html << 'EOF' 54 - <!DOCTYPE html> 55 - <html> 56 - <head><title>Python Web Server</title></head> 57 - <body> 58 - <h1>Welcome to the Python Web Server</h1> 59 - <p>Serving from port ${toString config.python-http-server.port}</p> 60 - </body> 61 - </html> 62 - EOF 63 - ''; 64 }; 65 }; 66 };
··· 3 { 4 config, 5 lib, 6 ... 7 }: 8 let ··· 15 python-http-server = { 16 package = mkOption { 17 type = types.package; 18 description = "Python package to use for the web server"; 19 }; 20 ··· 44 ]; 45 46 configData = { 47 + "webroot" = { 48 + # Enable only if directory is set to use this path 49 + enable = lib.mkDefault (config.python-http-server.directory == config.configData."webroot".path); 50 }; 51 }; 52 };
+31 -4
nixos/tests/modular-service-etc/test.nix
··· 12 nodes = { 13 server = 14 { pkgs, ... }: 15 { 16 system.services.webserver = { 17 # The python web server is simple enough that it doesn't need a reload signal. 18 # Other services may need to receive a signal in order to re-read what's in `configData`. 19 - imports = [ ./python-http-server.nix ]; 20 python-http-server = { 21 port = 8080; 22 }; 23 24 # Add a sub-service 25 services.api = { 26 - imports = [ ./python-http-server.nix ]; 27 python-http-server = { 28 port = 8081; 29 }; ··· 147 print(f"Before switch - webserver PID: {webserver_pid}, api PID: {api_pid}") 148 149 # Switch to the specialisation with updated content 150 - switch_output = server.succeed("/run/current-system/specialisation/updated/bin/switch-to-configuration test") 151 - print(f"Switch output: {switch_output}") 152 153 # Verify services are not mentioned in the switch output (indicating they weren't touched) 154 assert "webserver.service" not in switch_output, f"webserver.service was mentioned in switch output: {switch_output}"
··· 12 nodes = { 13 server = 14 { pkgs, ... }: 15 + let 16 + # Normally the package services.default attribute combines this, but we 17 + # don't have that, because this is not a production service. Should it be? 18 + python-http-server = { 19 + imports = [ ./python-http-server.nix ]; 20 + python-http-server.package = pkgs.python3; 21 + }; 22 + in 23 { 24 system.services.webserver = { 25 # The python web server is simple enough that it doesn't need a reload signal. 26 # Other services may need to receive a signal in order to re-read what's in `configData`. 27 + imports = [ python-http-server ]; 28 python-http-server = { 29 port = 8080; 30 }; 31 32 + configData = { 33 + "webroot" = { 34 + source = pkgs.runCommand "webroot" { } '' 35 + mkdir -p $out 36 + cat > $out/index.html << 'EOF' 37 + <!DOCTYPE html> 38 + <html> 39 + <head><title>Python Web Server</title></head> 40 + <body> 41 + <h1>Welcome to the Python Web Server</h1> 42 + <p>Serving from port 8080</p> 43 + </body> 44 + </html> 45 + EOF 46 + ''; 47 + }; 48 + }; 49 + 50 # Add a sub-service 51 services.api = { 52 + imports = [ python-http-server ]; 53 python-http-server = { 54 port = 8081; 55 }; ··· 173 print(f"Before switch - webserver PID: {webserver_pid}, api PID: {api_pid}") 174 175 # Switch to the specialisation with updated content 176 + # Capture both stdout and stderr, and show stderr in real-time for debugging 177 + switch_output = server.succeed("/run/current-system/specialisation/updated/bin/switch-to-configuration test 2>&1 | tee /dev/stderr") 178 + print(f"Switch output (stdout+stderr): {switch_output}") 179 180 # Verify services are not mentioned in the switch output (indicating they weren't touched) 181 assert "webserver.service" not in switch_output, f"webserver.service was mentioned in switch output: {switch_output}"
+2
nixos/tests/php/fpm-modular.nix
··· 1 { lib, php, ... }: 2 { 3 name = "php-${php.version}-fpm-modular-nginx-test";
··· 1 + # Run with: 2 + # nix-build -A nixosTests.php.fpm-modular 3 { lib, php, ... }: 4 { 5 name = "php-${php.version}-fpm-modular-nginx-test";
+13
pkgs/applications/editors/vim/plugins/generated.nix
··· 7496 meta.hydraPlatforms = [ ]; 7497 }; 7498 7499 live-rename-nvim = buildVimPlugin { 7500 pname = "live-rename.nvim"; 7501 version = "2025-06-23";
··· 7496 meta.hydraPlatforms = [ ]; 7497 }; 7498 7499 + live-preview-nvim = buildVimPlugin { 7500 + pname = "live-preview.nvim"; 7501 + version = "2025-08-17"; 7502 + src = fetchFromGitHub { 7503 + owner = "brianhuster"; 7504 + repo = "live-preview.nvim"; 7505 + rev = "5890c4f7cb81a432fd5f3b960167757f1b4d4702"; 7506 + sha256 = "0gr68xmx9ph74pqnlpbfx9kj5bh7yg3qh0jni98z2nmkzfvg4qcx"; 7507 + }; 7508 + meta.homepage = "https://github.com/brianhuster/live-preview.nvim/"; 7509 + meta.hydraPlatforms = [ ]; 7510 + }; 7511 + 7512 live-rename-nvim = buildVimPlugin { 7513 pname = "live-rename.nvim"; 7514 version = "2025-06-23";
+16
pkgs/applications/editors/vim/plugins/overrides.nix
··· 1794 dependencies = [ self.litee-nvim ]; 1795 }; 1796 1797 lspcontainers-nvim = super.lspcontainers-nvim.overrideAttrs { 1798 dependencies = [ self.nvim-lspconfig ]; 1799 };
··· 1794 dependencies = [ self.litee-nvim ]; 1795 }; 1796 1797 + live-preview-nvim = super.live-preview-nvim.overrideAttrs { 1798 + checkInputs = with self; [ 1799 + fzf-lua 1800 + mini-pick 1801 + snacks-nvim 1802 + telescope-nvim 1803 + ]; 1804 + 1805 + nvimSkipModules = [ 1806 + # Ignore livepreview._spec as it fails nvimRequireCheck. 1807 + # This file runs tests on require which unfortunately fails as it attempts to require the base plugin. See https://github.com/brianhuster/live-preview.nvim/blob/5890c4f7cb81a432fd5f3b960167757f1b4d4702/lua/livepreview/_spec.lua#L25 1808 + "livepreview._spec" 1809 + ]; 1810 + meta.license = lib.licenses.gpl3Only; 1811 + }; 1812 + 1813 lspcontainers-nvim = super.lspcontainers-nvim.overrideAttrs { 1814 dependencies = [ self.nvim-lspconfig ]; 1815 };
+1
pkgs/applications/editors/vim/plugins/vim-plugin-names
··· 575 https://github.com/ldelossa/litee-symboltree.nvim/,, 576 https://github.com/ldelossa/litee.nvim/,, 577 https://github.com/smjonas/live-command.nvim/,HEAD, 578 https://github.com/saecki/live-rename.nvim/,HEAD, 579 https://github.com/azratul/live-share.nvim/,HEAD, 580 https://github.com/ggml-org/llama.vim/,HEAD,
··· 575 https://github.com/ldelossa/litee-symboltree.nvim/,, 576 https://github.com/ldelossa/litee.nvim/,, 577 https://github.com/smjonas/live-command.nvim/,HEAD, 578 + https://github.com/brianhuster/live-preview.nvim/,HEAD, 579 https://github.com/saecki/live-rename.nvim/,HEAD, 580 https://github.com/azratul/live-share.nvim/,HEAD, 581 https://github.com/ggml-org/llama.vim/,HEAD,
+3 -3
pkgs/applications/emulators/libretro/cores/mupen64plus.nix
··· 12 }: 13 mkLibretroCore { 14 core = "mupen64plus-next"; 15 - version = "0-unstable-2025-07-29"; 16 17 src = fetchFromGitHub { 18 owner = "libretro"; 19 repo = "mupen64plus-libretro-nx"; 20 - rev = "2d923939db32aad01e633010fac71f860c943a6d"; 21 - hash = "sha256-HNhGVXTeCECqOdyluPq6aYWuA612H+PCJ65XoN9WJXU="; 22 }; 23 24 # Fix for GCC 14
··· 12 }: 13 mkLibretroCore { 14 core = "mupen64plus-next"; 15 + version = "0-unstable-2025-08-20"; 16 17 src = fetchFromGitHub { 18 owner = "libretro"; 19 repo = "mupen64plus-libretro-nx"; 20 + rev = "222acbd3f98391458a047874d0372fe78e14fe94"; 21 + hash = "sha256-esssh/0nxNUDW/eMDQbWEdcSPuqLjnKLkK4mKN17HjQ="; 22 }; 23 24 # Fix for GCC 14
+2 -2
pkgs/applications/gis/qgis/unwrapped.nix
··· 82 ]; 83 in 84 mkDerivation rec { 85 - version = "3.44.1"; 86 pname = "qgis-unwrapped"; 87 88 src = fetchFromGitHub { 89 owner = "qgis"; 90 repo = "QGIS"; 91 rev = "final-${lib.replaceStrings [ "." ] [ "_" ] version}"; 92 - hash = "sha256-WUXYjMCq95S5GHcn3pR45kpP3Us1HG4sS+EmjCBYOrM="; 93 }; 94 95 passthru = {
··· 82 ]; 83 in 84 mkDerivation rec { 85 + version = "3.44.2"; 86 pname = "qgis-unwrapped"; 87 88 src = fetchFromGitHub { 89 owner = "qgis"; 90 repo = "QGIS"; 91 rev = "final-${lib.replaceStrings [ "." ] [ "_" ] version}"; 92 + hash = "sha256-ERaox5jqB7E/W0W6NnipHx1qfY2+FTHYf3r2l1KRkC0="; 93 }; 94 95 passthru = {
+9
pkgs/applications/networking/cluster/terraform-providers/providers.json
··· 866 "spdx": "Apache-2.0", 867 "vendorHash": null 868 }, 869 "netlify": { 870 "hash": "sha256-7U+hHN/6GqcbI1gX7L01YqVjlUgvdfhgpXvLF2lwbkA=", 871 "homepage": "https://registry.terraform.io/providers/AegirHealth/netlify",
··· 866 "spdx": "Apache-2.0", 867 "vendorHash": null 868 }, 869 + "neon": { 870 + "hash": "sha256-D1KWC2D4OLMUSWKzQmiZaDrATCv4SEUWwk6SK/o1U5M=", 871 + "homepage": "https://registry.terraform.io/providers/kislerdm/neon", 872 + "owner": "kislerdm", 873 + "repo": "terraform-provider-neon", 874 + "rev": "v0.9.0", 875 + "spdx": "MPL-2.0", 876 + "vendorHash": "sha256-8WY2iEOFOwx7zDMps5cctxzv1stRseS/OUaHkMDuBYs=" 877 + }, 878 "netlify": { 879 "hash": "sha256-7U+hHN/6GqcbI1gX7L01YqVjlUgvdfhgpXvLF2lwbkA=", 880 "homepage": "https://registry.terraform.io/providers/AegirHealth/netlify",
+5 -1
pkgs/by-name/_8/_86Box/package.nix
··· 28 libvorbis, 29 libopus, 30 libmpg123, 31 32 enableDynarec ? with stdenv.hostPlatform; isx86 || isAarch, 33 enableNewDynarec ? enableDynarec && stdenv.hostPlatform.isAarch, ··· 87 ] 88 ++ lib.optional stdenv.hostPlatform.isLinux alsa-lib 89 ++ lib.optional enableWayland wayland 90 - ++ lib.optional enableVncRenderer libvncserver; 91 92 cmakeFlags = 93 lib.optional stdenv.hostPlatform.isDarwin "-DCMAKE_MACOSX_BUNDLE=OFF"
··· 28 libvorbis, 29 libopus, 30 libmpg123, 31 + libgcrypt, 32 33 enableDynarec ? with stdenv.hostPlatform; isx86 || isAarch, 34 enableNewDynarec ? enableDynarec && stdenv.hostPlatform.isAarch, ··· 88 ] 89 ++ lib.optional stdenv.hostPlatform.isLinux alsa-lib 90 ++ lib.optional enableWayland wayland 91 + ++ lib.optionals enableVncRenderer [ 92 + libvncserver 93 + libgcrypt 94 + ]; 95 96 cmakeFlags = 97 lib.optional stdenv.hostPlatform.isDarwin "-DCMAKE_MACOSX_BUNDLE=OFF"
+6 -3
pkgs/by-name/bo/bootspec/package.nix
··· 2 lib, 3 rustPlatform, 4 fetchFromGitHub, 5 }: 6 rustPlatform.buildRustPackage rec { 7 pname = "bootspec"; 8 - version = "1.0.1"; 9 10 src = fetchFromGitHub { 11 owner = "DeterminateSystems"; 12 repo = "bootspec"; 13 rev = "v${version}"; 14 - hash = "sha256-0MO+SqG7Gjq+fmMJkIFvaKsfTmC7z3lGfi7bbBv7iBE="; 15 }; 16 17 - cargoHash = "sha256-fKbF5SyI0UlZTWsygdE8BGWuOoNSU4jx+CGdJoJFhZs="; 18 19 meta = with lib; { 20 description = "Implementation of RFC-0125's datatype and synthesis tooling";
··· 2 lib, 3 rustPlatform, 4 fetchFromGitHub, 5 + nix-update-script, 6 }: 7 rustPlatform.buildRustPackage rec { 8 pname = "bootspec"; 9 + version = "1.1.0"; 10 11 src = fetchFromGitHub { 12 owner = "DeterminateSystems"; 13 repo = "bootspec"; 14 rev = "v${version}"; 15 + hash = "sha256-WDEaTxj5iT8tvasd6gnMhRgNoEdDi9Wi4ke8sVtNpt8="; 16 }; 17 18 + cargoHash = "sha256-ZJKoL1vYfAG1rpCcE1jRm7Yj2dhooJ6iQ91c6EGF83E="; 19 + 20 + passthru.updateScript = nix-update-script { }; 21 22 meta = with lib; { 23 description = "Implementation of RFC-0125's datatype and synthesis tooling";
+4 -4
pkgs/by-name/cl/claude-code/package-lock.json
··· 6 "packages": { 7 "": { 8 "dependencies": { 9 - "@anthropic-ai/claude-code": "^1.0.92" 10 } 11 }, 12 "node_modules/@anthropic-ai/claude-code": { 13 - "version": "1.0.92", 14 - "resolved": "https://registry.npmjs.org/@anthropic-ai/claude-code/-/claude-code-1.0.92.tgz", 15 - "integrity": "sha512-/XuwJqAvXwIGf9WeZOxHI6qQsAGzxhrRc3hyQdvwW6cU5iviTmrxWasksPbJMvFt6KQoAUU6XHs78XyYmBpOXQ==", 16 "license": "SEE LICENSE IN README.md", 17 "bin": { 18 "claude": "cli.js"
··· 6 "packages": { 7 "": { 8 "dependencies": { 9 + "@anthropic-ai/claude-code": "^1.0.93" 10 } 11 }, 12 "node_modules/@anthropic-ai/claude-code": { 13 + "version": "1.0.93", 14 + "resolved": "https://registry.npmjs.org/@anthropic-ai/claude-code/-/claude-code-1.0.93.tgz", 15 + "integrity": "sha512-HSrbuYVu4k1dwoj/IYsXEVSoMWDPujy2D4zl9BMt4Zt0kwUwZch0nHpTyQ0C+YeHMN7hHbViz0bw6spg0a5GgQ==", 16 "license": "SEE LICENSE IN README.md", 17 "bin": { 18 "claude": "cli.js"
+3 -3
pkgs/by-name/cl/claude-code/package.nix
··· 7 8 buildNpmPackage rec { 9 pname = "claude-code"; 10 - version = "1.0.92"; 11 12 nodejs = nodejs_20; # required for sandboxed Nix builds on Darwin 13 14 src = fetchzip { 15 url = "https://registry.npmjs.org/@anthropic-ai/claude-code/-/claude-code-${version}.tgz"; 16 - hash = "sha256-xW+oI91wL+DFaOHw5M84QJktuE9HXb031pGbrNcrpPQ="; 17 }; 18 19 - npmDepsHash = "sha256-rrMskQkWKz+B5dqJ8gHgBxO20OdgE3d53TJWDxeJGbo="; 20 21 postPatch = '' 22 cp ${./package-lock.json} package-lock.json
··· 7 8 buildNpmPackage rec { 9 pname = "claude-code"; 10 + version = "1.0.93"; 11 12 nodejs = nodejs_20; # required for sandboxed Nix builds on Darwin 13 14 src = fetchzip { 15 url = "https://registry.npmjs.org/@anthropic-ai/claude-code/-/claude-code-${version}.tgz"; 16 + hash = "sha256-vEUty4HRPSkFpT94bxMWcLj0nFe34AeQEZ0WsCXuy10="; 17 }; 18 19 + npmDepsHash = "sha256-JL0GPIhpyTQonKsyMR5zN8LaPfX3KkEfQbMR1Z7gTFE="; 20 21 postPatch = '' 22 cp ${./package-lock.json} package-lock.json
+2 -2
pkgs/by-name/fo/fosrl-pangolin/package.nix
··· 28 29 buildNpmPackage (finalAttrs: { 30 pname = "pangolin"; 31 - version = "1.9.0"; 32 33 src = fetchFromGitHub { 34 owner = "fosrl"; 35 repo = "pangolin"; 36 tag = finalAttrs.version; 37 - hash = "sha256-X8Jvk/1gDj4cqXP3vlsrhWEM5lR42FsQ0HaSNeNxTXg="; 38 }; 39 40 npmDepsHash = "sha256-OygskQhveT9CiymOOd5gx+aR9v3nMUZj72k/om3IF/c=";
··· 28 29 buildNpmPackage (finalAttrs: { 30 pname = "pangolin"; 31 + version = "1.9.1"; 32 33 src = fetchFromGitHub { 34 owner = "fosrl"; 35 repo = "pangolin"; 36 tag = finalAttrs.version; 37 + hash = "sha256-r0/HtRWdlDV749yT2pMnKqQKKYm6FPpcy3eul6M8iDQ="; 38 }; 39 40 npmDepsHash = "sha256-OygskQhveT9CiymOOd5gx+aR9v3nMUZj72k/om3IF/c=";
+7 -1
pkgs/by-name/gh/ghostunnel/package.nix
··· 7 ghostunnel, 8 apple-sdk_12, 9 darwinMinVersionHook, 10 }: 11 12 buildGoModule rec { ··· 41 }; 42 43 passthru.services.default = { 44 - imports = [ ./service.nix ]; 45 ghostunnel.package = ghostunnel; # FIXME: finalAttrs.finalPackage 46 }; 47
··· 7 ghostunnel, 8 apple-sdk_12, 9 darwinMinVersionHook, 10 + writeScript, 11 + runtimeShell, 12 }: 13 14 buildGoModule rec { ··· 43 }; 44 45 passthru.services.default = { 46 + imports = [ 47 + (lib.modules.importApply ./service.nix { 48 + inherit writeScript runtimeShell; 49 + }) 50 + ]; 51 ghostunnel.package = ghostunnel; # FIXME: finalAttrs.finalPackage 52 }; 53
+7 -3
pkgs/by-name/gh/ghostunnel/service.nix
··· 1 { 2 lib, 3 config, 4 options, 5 - pkgs, 6 ... 7 }: 8 let ··· 25 ghostunnel = { 26 package = mkOption { 27 description = "Package to use for ghostunnel"; 28 type = types.package; 29 }; 30 ··· 191 cfg.cacert 192 ]) 193 ( 194 - pkgs.writeScript "load-credentials" '' 195 - #!${pkgs.runtimeShell} 196 exec $@ ${ 197 concatStringsSep " " ( 198 optional (cfg.keystore != null) "--keystore=$CREDENTIALS_DIRECTORY/keystore"
··· 1 + # Non-module dependencies (`importApply`) 2 + { writeScript, runtimeShell }: 3 + 4 + # Service module 5 { 6 lib, 7 config, 8 options, 9 ... 10 }: 11 let ··· 28 ghostunnel = { 29 package = mkOption { 30 description = "Package to use for ghostunnel"; 31 + defaultText = "The ghostunnel package that provided this module."; 32 type = types.package; 33 }; 34 ··· 195 cfg.cacert 196 ]) 197 ( 198 + writeScript "load-credentials" '' 199 + #!${runtimeShell} 200 exec $@ ${ 201 concatStringsSep " " ( 202 optional (cfg.keystore != null) "--keystore=$CREDENTIALS_DIRECTORY/keystore"
+72
pkgs/by-name/ka/kawa/package.nix
···
··· 1 + { 2 + lib, 3 + stdenv, 4 + fetchurl, 5 + jdk11, 6 + ant, 7 + makeWrapper, 8 + }: 9 + 10 + stdenv.mkDerivation (finalAttrs: { 11 + pname = "kawa"; 12 + version = "3.1.1"; 13 + 14 + src = fetchurl { 15 + url = "mirror://gnu/kawa/kawa-${finalAttrs.version}.tar.gz"; 16 + hash = "sha256-jJpQzWsQAVTJAb0ZCzrNL7g1PzNiLEos6Po5Kn8J4Bk="; 17 + }; 18 + 19 + nativeBuildInputs = [ 20 + jdk11 21 + ant 22 + makeWrapper 23 + ]; 24 + 25 + buildPhase = '' 26 + runHook preBuild 27 + 28 + ant -Denable-java-frontend=yes 29 + 30 + runHook postBuild 31 + ''; 32 + 33 + installPhase = '' 34 + runHook preInstall 35 + 36 + mkdir -p $out/share/java 37 + cp lib/kawa.jar $out/share/java/kawa.jar 38 + 39 + # Install info files 40 + mkdir -p $out/share/info 41 + cp doc/*.info* $out/share/info/ 42 + 43 + # Install man pages 44 + mkdir -p $out/share/man/man1 45 + cp doc/kawa.man $out/share/man/man1/kawa.1 46 + cp doc/qexo.man $out/share/man/man1/qexo.1 47 + 48 + mkdir -p $out/bin 49 + makeWrapper ${jdk11}/bin/java $out/bin/kawa \ 50 + --add-flags "-Dkawa.home=$out -jar $out/share/java/kawa.jar" 51 + 52 + runHook postInstall 53 + ''; 54 + 55 + meta = { 56 + description = "Scheme implementation running on the Java platform"; 57 + longDescription = '' 58 + Kawa is a general-purpose programming language that runs on the Java platform. 59 + It aims to combine the benefits of dynamic scripting languages (less boiler-plate 60 + code, fast and easy start-up, a REPL, no required compilation step) with the 61 + benefits of traditional compiled languages (fast execution, static error detection, 62 + modularity, zero-overhead Java platform integration). 63 + ''; 64 + homepage = "https://www.gnu.org/software/kawa"; 65 + license = [ 66 + lib.licenses.mit 67 + lib.licenses.gpl2Plus 68 + ]; 69 + maintainers = with lib.maintainers; [ siraben ]; 70 + platforms = lib.platforms.unix; 71 + }; 72 + })
+52
pkgs/by-name/li/libopaque/package.nix
···
··· 1 + { 2 + lib, 3 + stdenv, 4 + fetchFromGitHub, 5 + libsodium, 6 + liboprf, 7 + testers, 8 + nix-update-script, 9 + }: 10 + 11 + stdenv.mkDerivation (finalAttrs: { 12 + pname = "libopaque"; 13 + version = "1.0.1"; 14 + 15 + src = fetchFromGitHub { 16 + owner = "stef"; 17 + repo = "libopaque"; 18 + tag = "v${finalAttrs.version}"; 19 + hash = "sha256-VVD4489yWAJTWLGrpXYe8or5QjDnAuQ9/tzlNJJu/lo="; 20 + }; 21 + 22 + sourceRoot = "${finalAttrs.src.name}/src"; 23 + 24 + strictDeps = true; 25 + 26 + buildInputs = [ 27 + libsodium 28 + liboprf 29 + ]; 30 + 31 + postInstall = '' 32 + mkdir -p ${placeholder "out"}/lib/pkgconfig 33 + cp ../libopaque.pc ${placeholder "out"}/lib/pkgconfig/ 34 + ''; 35 + 36 + makeFlags = [ "PREFIX=$(out)" ]; 37 + 38 + passthru = { 39 + tests.pkg-config = testers.testMetaPkgConfig finalAttrs.finalPackage; 40 + updateScript = nix-update-script { }; 41 + }; 42 + 43 + meta = { 44 + description = "Implementation of the OPAQUE protocol with support for threshold variants"; 45 + homepage = "https://github.com/stef/libopaque/"; 46 + changelog = "https://github.com/stef/libopaque/releases/tag/v${finalAttrs.version}"; 47 + license = lib.licenses.lgpl3Plus; 48 + teams = [ lib.teams.ngi ]; 49 + platforms = lib.platforms.unix; 50 + pkgConfigModules = [ "libopaque" ]; 51 + }; 52 + })
+3 -3
pkgs/by-name/mi/mise/package.nix
··· 21 22 rustPlatform.buildRustPackage rec { 23 pname = "mise"; 24 - version = "2025.8.10"; 25 26 src = fetchFromGitHub { 27 owner = "jdx"; 28 repo = "mise"; 29 rev = "v${version}"; 30 - hash = "sha256-ycYB/XuaTwGmXzh59cxt5KC1v0gqoTB67MMmpCsR6o8="; 31 }; 32 33 - cargoHash = "sha256-9YHW8jO+K1YZjmfN+KxctConrvp6yYODnRoSwIFxryU="; 34 35 nativeBuildInputs = [ 36 installShellFiles
··· 21 22 rustPlatform.buildRustPackage rec { 23 pname = "mise"; 24 + version = "2025.8.20"; 25 26 src = fetchFromGitHub { 27 owner = "jdx"; 28 repo = "mise"; 29 rev = "v${version}"; 30 + hash = "sha256-zjb0ND6U/fe/1h+0LdTDYLIpsSPTvGhWOhFOb4vmiT0="; 31 }; 32 33 + cargoHash = "sha256-kebXsDAtQjEtAVCD76n5/A9hB1Sj+ww9MoHcfm/ucBs="; 34 35 nativeBuildInputs = [ 36 installShellFiles
+3 -3
pkgs/by-name/op/open-webui/package.nix
··· 9 }: 10 let 11 pname = "open-webui"; 12 - version = "0.6.22"; 13 14 src = fetchFromGitHub { 15 owner = "open-webui"; 16 repo = "open-webui"; 17 tag = "v${version}"; 18 - hash = "sha256-SX2uLmDZu1TW45A6F5mSXVtSqv5rbNKuVw8sWj8tEb4="; 19 }; 20 21 frontend = buildNpmPackage rec { ··· 32 url = "https://github.com/pyodide/pyodide/releases/download/${pyodideVersion}/pyodide-${pyodideVersion}.tar.bz2"; 33 }; 34 35 - npmDepsHash = "sha256-mMnDYMy1/7gW6XVaWVct9BuxDP78XX5u46lGBWjUvOQ="; 36 37 # See https://github.com/open-webui/open-webui/issues/15880 38 npmFlags = [
··· 9 }: 10 let 11 pname = "open-webui"; 12 + version = "0.6.25"; 13 14 src = fetchFromGitHub { 15 owner = "open-webui"; 16 repo = "open-webui"; 17 tag = "v${version}"; 18 + hash = "sha256-XB3cwxtcOVoAwGJroZuPT8XwaCo3wpkn2KIEuuXMeu4="; 19 }; 20 21 frontend = buildNpmPackage rec { ··· 32 url = "https://github.com/pyodide/pyodide/releases/download/${pyodideVersion}/pyodide-${pyodideVersion}.tar.bz2"; 33 }; 34 35 + npmDepsHash = "sha256-WL1kdXn7uAaBEwWiIJzzisMZ1uiaOVtFViWK/kW6lsY="; 36 37 # See https://github.com/open-webui/open-webui/issues/15880 38 npmFlags = [
+4
pkgs/by-name/os/osm-gps-map/package.nix
··· 7 gnome-common, 8 gtk3, 9 gobject-introspection, 10 pkg-config, 11 lib, 12 stdenv, ··· 50 ]; 51 52 nativeBuildInputs = [ 53 pkg-config 54 gobject-introspection 55 gnome-common
··· 7 gnome-common, 8 gtk3, 9 gobject-introspection, 10 + autoreconfHook, 11 + gtk-doc, 12 pkg-config, 13 lib, 14 stdenv, ··· 52 ]; 53 54 nativeBuildInputs = [ 55 + autoreconfHook 56 + gtk-doc 57 pkg-config 58 gobject-introspection 59 gnome-common
+3 -3
pkgs/by-name/pa/pay-respects/package.nix
··· 6 }: 7 rustPlatform.buildRustPackage (finalAttrs: { 8 pname = "pay-respects"; 9 - version = "0.7.8"; 10 11 src = fetchFromGitea { 12 domain = "codeberg.org"; 13 owner = "iff"; 14 repo = "pay-respects"; 15 tag = "v${finalAttrs.version}"; 16 - hash = "sha256-73uGxcJCWUVwr1ddNjZTRJwx8OfnAPwtp80v1xpUEhA="; 17 }; 18 19 - cargoHash = "sha256-VSv0BpIICkYyCIfGDfK7wfKQssWF13hCh6IW375CI/c="; 20 21 nativeInstallCheckInputs = [ versionCheckHook ]; 22 doInstallCheck = true;
··· 6 }: 7 rustPlatform.buildRustPackage (finalAttrs: { 8 pname = "pay-respects"; 9 + version = "0.7.9"; 10 11 src = fetchFromGitea { 12 domain = "codeberg.org"; 13 owner = "iff"; 14 repo = "pay-respects"; 15 tag = "v${finalAttrs.version}"; 16 + hash = "sha256-qKej29kM0Kq5RRHo+lu9cGeTjnjUvpmIqSxq5yHuCKc="; 17 }; 18 19 + cargoHash = "sha256-2MEbUBTZ/zsPLhHTnQCrWQManqUQ3V3xta5NT9gu38A="; 20 21 nativeInstallCheckInputs = [ versionCheckHook ]; 22 doInstallCheck = true;
+3 -3
pkgs/by-name/te/telepresence2/package.nix
··· 31 in 32 buildGoModule rec { 33 pname = "telepresence2"; 34 - version = "2.23.6"; 35 36 src = fetchFromGitHub { 37 owner = "telepresenceio"; 38 repo = "telepresence"; 39 rev = "v${version}"; 40 - hash = "sha256-bo98R5uWOg219JF5czUd3XPznyXpphQMJtsgF5xJFqE="; 41 }; 42 43 propagatedBuildInputs = [ ··· 51 export CGO_ENABLED=0 52 ''; 53 54 - vendorHash = "sha256-DAbPgLt0CGdbfDmMXZDyjStyeb4A1dPCNiJMH1NUAUg="; 55 56 ldflags = [ 57 "-s"
··· 31 in 32 buildGoModule rec { 33 pname = "telepresence2"; 34 + version = "2.24.0"; 35 36 src = fetchFromGitHub { 37 owner = "telepresenceio"; 38 repo = "telepresence"; 39 rev = "v${version}"; 40 + hash = "sha256-aqL2AjDscN6o9WKur3ed5SU3XQJy6hAu/QUD7Fh/0pE="; 41 }; 42 43 propagatedBuildInputs = [ ··· 51 export CGO_ENABLED=0 52 ''; 53 54 + vendorHash = "sha256-ncMquDrlkcf71voCbxadOM+EKO/7olMEAf5FOFoxrvA="; 55 56 ldflags = [ 57 "-s"
+46 -37
pkgs/by-name/vi/virglrenderer/package.nix
··· 1 { 2 lib, 3 stdenv, 4 - fetchurl, 5 meson, 6 ninja, 7 pkg-config, ··· 11 libX11, 12 libdrm, 13 libgbm, 14 - nativeContextSupport ? stdenv.hostPlatform.isLinux, 15 - vaapiSupport ? !stdenv.hostPlatform.isDarwin, 16 libva, 17 - vulkanSupport ? stdenv.hostPlatform.isLinux, 18 vulkan-headers, 19 vulkan-loader, 20 - gitUpdater, 21 }: 22 23 - stdenv.mkDerivation rec { 24 pname = "virglrenderer"; 25 version = "1.1.1"; 26 27 - src = fetchurl { 28 - url = "https://gitlab.freedesktop.org/virgl/virglrenderer/-/archive/${version}/virglrenderer-${version}.tar.bz2"; 29 - hash = "sha256-D+SJqBL76z1nGBmcJ7Dzb41RvFxU2Ak6rVOwDRB94rM="; 30 }; 31 32 separateDebugInfo = true; 33 34 buildInputs = [ 35 libepoxy 36 ] 37 - ++ lib.optionals vaapiSupport [ libva ] 38 - ++ lib.optionals vulkanSupport [ 39 - vulkan-headers 40 - vulkan-loader 41 - ] 42 ++ lib.optionals stdenv.hostPlatform.isLinux [ 43 libGLU 44 libX11 45 libdrm 46 libgbm 47 - ]; 48 - 49 - nativeBuildInputs = [ 50 - meson 51 - ninja 52 - pkg-config 53 - (buildPackages.python3.withPackages (ps: [ 54 - ps.pyyaml 55 - ])) 56 ]; 57 58 mesonFlags = [ 59 (lib.mesonBool "video" vaapiSupport) 60 (lib.mesonBool "venus" vulkanSupport) 61 - ] 62 - ++ lib.optionals nativeContextSupport [ 63 - (lib.mesonOption "drm-renderers" "amdgpu-experimental,msm") 64 ]; 65 66 passthru = { 67 - updateScript = gitUpdater { 68 - url = "https://gitlab.freedesktop.org/virgl/virglrenderer.git"; 69 - rev-prefix = "virglrenderer-"; 70 - }; 71 }; 72 73 - meta = with lib; { 74 - description = "Virtual 3D GPU library that allows a qemu guest to use the host GPU for accelerated 3D rendering"; 75 mainProgram = "virgl_test_server"; 76 - homepage = "https://virgil3d.github.io/"; 77 - license = licenses.mit; 78 - platforms = platforms.unix; 79 - maintainers = [ maintainers.xeji ]; 80 }; 81 - }
··· 1 { 2 lib, 3 stdenv, 4 + fetchFromGitLab, 5 meson, 6 ninja, 7 pkg-config, ··· 11 libX11, 12 libdrm, 13 libgbm, 14 libva, 15 vulkan-headers, 16 vulkan-loader, 17 + nix-update-script, 18 + vulkanSupport ? stdenv.hostPlatform.isLinux, 19 + nativeContextSupport ? stdenv.hostPlatform.isLinux, 20 + vaapiSupport ? !stdenv.hostPlatform.isDarwin, 21 }: 22 23 + stdenv.mkDerivation (finalAttrs: { 24 pname = "virglrenderer"; 25 version = "1.1.1"; 26 27 + src = fetchFromGitLab { 28 + domain = "gitlab.freedesktop.org"; 29 + owner = "virgl"; 30 + repo = "virglrenderer"; 31 + tag = finalAttrs.version; 32 + hash = "sha256-ah6+AAf7B15rPMb4uO873wieT3+gf/5iGH+ZFoZKAAI="; 33 }; 34 35 separateDebugInfo = true; 36 37 + nativeBuildInputs = [ 38 + meson 39 + ninja 40 + pkg-config 41 + (buildPackages.python3.withPackages (ps: [ 42 + ps.pyyaml 43 + ])) 44 + ]; 45 + 46 buildInputs = [ 47 libepoxy 48 ] 49 ++ lib.optionals stdenv.hostPlatform.isLinux [ 50 libGLU 51 libX11 52 libdrm 53 libgbm 54 + ] 55 + ++ lib.optionals vaapiSupport [ 56 + libva 57 + ] 58 + ++ lib.optionals vulkanSupport [ 59 + vulkan-headers 60 + vulkan-loader 61 ]; 62 63 mesonFlags = [ 64 (lib.mesonBool "video" vaapiSupport) 65 (lib.mesonBool "venus" vulkanSupport) 66 + (lib.mesonOption "drm-renderers" ( 67 + lib.optionalString nativeContextSupport ( 68 + lib.concatStringsSep "," [ 69 + "amdgpu-experimental" 70 + "msm" 71 + ] 72 + ) 73 + )) 74 ]; 75 76 passthru = { 77 + updateScript = nix-update-script { }; 78 }; 79 80 + meta = { 81 + description = "Virtual 3D GPU for use inside QEMU virtual machines"; 82 + homepage = "https://docs.mesa3d.org/drivers/virgl"; 83 + license = lib.licenses.mit; 84 + maintainers = with lib.maintainers; [ 85 + normalcea 86 + ]; 87 mainProgram = "virgl_test_server"; 88 + platforms = lib.platforms.unix; 89 }; 90 + })
+2 -2
pkgs/by-name/xe/xed-editor/package.nix
··· 21 22 stdenv.mkDerivation rec { 23 pname = "xed-editor"; 24 - version = "3.8.3"; 25 26 src = fetchFromGitHub { 27 owner = "linuxmint"; 28 repo = "xed"; 29 rev = version; 30 - hash = "sha256-bNnxQOYDBS/pNaBwvmrt/VAya/m7t5H40lJkFevufUE="; 31 }; 32 33 patches = [
··· 21 22 stdenv.mkDerivation rec { 23 pname = "xed-editor"; 24 + version = "3.8.4"; 25 26 src = fetchFromGitHub { 27 owner = "linuxmint"; 28 repo = "xed"; 29 rev = version; 30 + hash = "sha256-pI9gjAA5dn0QwZKGungQ1xpQJmnfCxmqWR0VBEQ5v84="; 31 }; 32 33 patches = [
+2 -2
pkgs/by-name/xv/xviewer/package.nix
··· 28 29 stdenv.mkDerivation rec { 30 pname = "xviewer"; 31 - version = "3.4.11"; 32 33 src = fetchFromGitHub { 34 owner = "linuxmint"; 35 repo = "xviewer"; 36 rev = version; 37 - hash = "sha256-fW+hhHJ4i3u0vtbvaQWliIZSLI1WCFhR5CvVZL6Vy8U="; 38 }; 39 40 nativeBuildInputs = [
··· 28 29 stdenv.mkDerivation rec { 30 pname = "xviewer"; 31 + version = "3.4.12"; 32 33 src = fetchFromGitHub { 34 owner = "linuxmint"; 35 repo = "xviewer"; 36 rev = version; 37 + hash = "sha256-WvA8T6r9DtlpOZLMEOILO6/0Am3bhCLM8FnwXvALjS8="; 38 }; 39 40 nativeBuildInputs = [
-2
pkgs/development/haskell-modules/configuration-hackage2nix/main.yaml
··· 437 - hercules-ci-cnix-store 438 - inline-c 439 - inline-c-cpp 440 - roosemberth: 441 - - git-annex 442 rvl: 443 - taffybar 444 - arbtt
··· 437 - hercules-ci-cnix-store 438 - inline-c 439 - inline-c-cpp 440 rvl: 441 - taffybar 442 - arbtt
+7 -1
pkgs/development/interpreters/php/generic.nix
··· 32 common-updater-scripts, 33 curl, 34 jq, 35 36 version, 37 phpSrc ? null, ··· 390 inherit ztsSupport; 391 392 services.default = { 393 - imports = [ ./service.nix ]; 394 php-fpm.package = lib.mkDefault finalAttrs.finalPackage; 395 }; 396 };
··· 32 common-updater-scripts, 33 curl, 34 jq, 35 + coreutils, 36 + formats, 37 38 version, 39 phpSrc ? null, ··· 392 inherit ztsSupport; 393 394 services.default = { 395 + imports = [ 396 + (lib.modules.importApply ./service.nix { 397 + inherit formats coreutils; 398 + }) 399 + ]; 400 php-fpm.package = lib.mkDefault finalAttrs.finalPackage; 401 }; 402 };
+14 -6
pkgs/development/interpreters/php/service.nix
··· 1 { 2 options, 3 config, 4 - pkgs, 5 lib, 6 ... 7 }: 8 let 9 cfg = config.php-fpm; 10 - format = pkgs.formats.iniWithGlobalSection { }; 11 configFile = format.generate "php-fpm.conf" { 12 globalSection = lib.filterAttrs (_: v: !lib.isAttrs v) cfg.settings; 13 sections = lib.filterAttrs (_: lib.isAttrs) cfg.settings; ··· 76 _class = "service"; 77 78 options.php-fpm = { 79 - package = lib.mkPackageOption pkgs "php" { 80 - example = '' 81 php.buildEnv { 82 extensions = 83 { all, ... }: ··· 163 164 serviceConfig = { 165 Type = "notify"; 166 - ExecReload = "${pkgs.coreutils}/bin/kill -USR2 $MAINPID"; 167 RuntimeDirectory = "php-fpm"; 168 RuntimeDirectoryPreserve = true; 169 Restart = "always"; ··· 175 176 finit.service = { 177 conditions = [ "service/syslogd/ready" ]; 178 - reload = "${pkgs.coreutils}/bin/kill -USR2 $MAINPID"; 179 notify = "systemd"; 180 }; 181 };
··· 1 + # Tests in: nixos/tests/php/fpm-modular.nix 2 + 3 + # Non-module dependencies (importApply) 4 + { formats, coreutils }: 5 + 6 + # Service module 7 { 8 options, 9 config, 10 lib, 11 ... 12 }: 13 let 14 cfg = config.php-fpm; 15 + format = formats.iniWithGlobalSection { }; 16 configFile = format.generate "php-fpm.conf" { 17 globalSection = lib.filterAttrs (_: v: !lib.isAttrs v) cfg.settings; 18 sections = lib.filterAttrs (_: lib.isAttrs) cfg.settings; ··· 81 _class = "service"; 82 83 options.php-fpm = { 84 + package = lib.mkOption { 85 + type = lib.types.package; 86 + description = "PHP package to use for php-fpm"; 87 + defaultText = lib.literalMD ''The PHP package that provided this module.''; 88 + example = lib.literalExpression '' 89 php.buildEnv { 90 extensions = 91 { all, ... }: ··· 171 172 serviceConfig = { 173 Type = "notify"; 174 + ExecReload = "${coreutils}/bin/kill -USR2 $MAINPID"; 175 RuntimeDirectory = "php-fpm"; 176 RuntimeDirectoryPreserve = true; 177 Restart = "always"; ··· 183 184 finit.service = { 185 conditions = [ "service/syslogd/ready" ]; 186 + reload = "${coreutils}/bin/kill -USR2 $MAINPID"; 187 notify = "systemd"; 188 }; 189 };
+2 -2
pkgs/development/ocaml-modules/dune-rpc/default.nix
··· 4 dune_3, 5 csexp, 6 stdune, 7 ordering, 8 - pp, 9 xdg, 10 dyn, 11 }: ··· 21 propagatedBuildInputs = [ 22 csexp 23 stdune 24 ordering 25 - pp 26 xdg 27 dyn 28 ];
··· 4 dune_3, 5 csexp, 6 stdune, 7 + ocamlc-loc, 8 ordering, 9 xdg, 10 dyn, 11 }: ··· 21 propagatedBuildInputs = [ 22 csexp 23 stdune 24 + ocamlc-loc 25 ordering 26 xdg 27 dyn 28 ];
+17 -6
pkgs/development/python-modules/fastmcp/default.nix
··· 14 exceptiongroup, 15 httpx, 16 mcp, 17 openapi-pydantic, 18 pydantic, 19 pyperclip, ··· 31 32 buildPythonPackage rec { 33 pname = "fastmcp"; 34 - version = "2.11.1"; 35 pyproject = true; 36 37 src = fetchFromGitHub { 38 owner = "jlowin"; 39 repo = "fastmcp"; 40 tag = "v${version}"; 41 - hash = "sha256-Y71AJdWcRBDbq63p+lcQplqutz2UTQ3f+pTyhcolpuw="; 42 }; 43 44 postPatch = '' ··· 57 exceptiongroup 58 httpx 59 mcp 60 openapi-pydantic 61 pyperclip 62 python-dotenv ··· 87 "test_keep_alive_starts_new_session_if_manually_closed" 88 "test_keep_alive_maintains_session_if_reentered" 89 "test_close_session_and_try_to_use_client_raises_error" 90 91 # RuntimeError: Client failed to connect: Timed out while waiting for response 92 "test_timeout" ··· 94 95 # assert 0 == 2 96 "test_multi_client" 97 98 # fastmcp.exceptions.ToolError: Unknown tool 99 "test_multi_client_with_logging" 100 "test_multi_client_with_elicitation" 101 ]; 102 103 disabledTestPaths = lib.optionals stdenv.hostPlatform.isDarwin [ 104 # RuntimeError: Server failed to start after 10 attempts 105 - "tests/auth/providers/test_bearer.py" 106 - "tests/auth/test_oauth_client.py" 107 - "tests/client/test_openapi.py" 108 "tests/client/test_sse.py" 109 "tests/client/test_streamable_http.py" 110 - "tests/server/http/test_http_dependencies.py" 111 "tests/server/http/test_http_dependencies.py" 112 ]; 113
··· 14 exceptiongroup, 15 httpx, 16 mcp, 17 + openapi-core, 18 openapi-pydantic, 19 pydantic, 20 pyperclip, ··· 32 33 buildPythonPackage rec { 34 pname = "fastmcp"; 35 + version = "2.11.3"; 36 pyproject = true; 37 38 src = fetchFromGitHub { 39 owner = "jlowin"; 40 repo = "fastmcp"; 41 tag = "v${version}"; 42 + hash = "sha256-jIXrMyNnyPE2DUgg+sxT6LD4dTmKQglh4cFuaw179Z0="; 43 }; 44 45 postPatch = '' ··· 58 exceptiongroup 59 httpx 60 mcp 61 + openapi-core 62 openapi-pydantic 63 pyperclip 64 python-dotenv ··· 89 "test_keep_alive_starts_new_session_if_manually_closed" 90 "test_keep_alive_maintains_session_if_reentered" 91 "test_close_session_and_try_to_use_client_raises_error" 92 + "test_run_mcp_config" 93 + "test_uv_transport" 94 + "test_uv_transport_module" 95 + "test_github_api_schema_performance" 96 97 # RuntimeError: Client failed to connect: Timed out while waiting for response 98 "test_timeout" ··· 100 101 # assert 0 == 2 102 "test_multi_client" 103 + "test_canonical_multi_client_with_transforms" 104 105 # fastmcp.exceptions.ToolError: Unknown tool 106 "test_multi_client_with_logging" 107 "test_multi_client_with_elicitation" 108 + ] 109 + ++ lib.optionals stdenv.hostPlatform.isDarwin [ 110 + # RuntimeError: Server failed to start after 10 attempts 111 + "test_unauthorized_access" 112 ]; 113 114 disabledTestPaths = lib.optionals stdenv.hostPlatform.isDarwin [ 115 # RuntimeError: Server failed to start after 10 attempts 116 + "tests/client/auth/test_oauth_client.py" 117 + "tests/client/test_openapi_experimental.py" 118 + "tests/client/test_openapi_legacy.py" 119 "tests/client/test_sse.py" 120 "tests/client/test_streamable_http.py" 121 + "tests/server/auth/test_jwt_provider.py" 122 "tests/server/http/test_http_dependencies.py" 123 ]; 124
+53
pkgs/development/python-modules/opaque/default.nix
···
··· 1 + { 2 + lib, 3 + stdenv, 4 + buildPythonPackage, 5 + libopaque, 6 + setuptools, 7 + pysodium, 8 + python, 9 + }: 10 + 11 + buildPythonPackage rec { 12 + pname = "opaque"; 13 + pyproject = true; 14 + 15 + inherit (libopaque) 16 + version 17 + src 18 + ; 19 + 20 + sourceRoot = "${src.name}/python"; 21 + 22 + postPatch = 23 + let 24 + soext = stdenv.hostPlatform.extensions.sharedLibrary; 25 + in 26 + '' 27 + substituteInPlace ./opaque/__init__.py --replace-fail \ 28 + "ctypes.util.find_library('opaque') or ctypes.util.find_library('libopaque')" "'${lib.getLib libopaque}/lib/libopaque${soext}'" 29 + ''; 30 + 31 + build-system = [ setuptools ]; 32 + 33 + dependencies = [ pysodium ]; 34 + 35 + pythonImportsCheck = [ "opaque" ]; 36 + 37 + checkPhase = '' 38 + runHook preCheck 39 + 40 + ${python.interpreter} test/simple.py 41 + 42 + runHook postCheck 43 + ''; 44 + 45 + meta = { 46 + inherit (libopaque.meta) 47 + description 48 + homepage 49 + license 50 + teams 51 + ; 52 + }; 53 + }
+39
pkgs/development/python-modules/opencc/default.nix
···
··· 1 + { 2 + lib, 3 + buildPythonPackage, 4 + fetchPypi, 5 + cmake, 6 + setuptools, 7 + wheel, 8 + }: 9 + 10 + buildPythonPackage rec { 11 + pname = "opencc"; 12 + version = "1.1.9"; 13 + format = "setuptools"; 14 + 15 + src = fetchPypi { 16 + pname = "opencc"; 17 + inherit version; 18 + hash = "sha256-itcig3MpUTAzkPrjOhztqYrJsDNoqPKRLtyTTXQHfko="; 19 + }; 20 + 21 + nativeBuildInputs = [ 22 + cmake 23 + setuptools 24 + wheel 25 + ]; 26 + 27 + dontUseCmakeConfigure = true; 28 + 29 + pythonImportsCheck = [ 30 + "opencc" 31 + ]; 32 + 33 + meta = { 34 + description = "Python bindings for OpenCC (Conversion between Traditional and Simplified Chinese)"; 35 + homepage = "https://github.com/BYVoid/OpenCC"; 36 + license = lib.licenses.asl20; 37 + maintainers = with lib.maintainers; [ siraben ]; 38 + }; 39 + }
+2 -2
pkgs/development/python-modules/osc/default.nix
··· 12 13 buildPythonPackage rec { 14 pname = "osc"; 15 - version = "1.9.1"; 16 format = "setuptools"; 17 18 src = fetchFromGitHub { 19 owner = "openSUSE"; 20 repo = "osc"; 21 rev = version; 22 - hash = "sha256-03EDarU7rmsiE96IYHXFuPtD8nWur0qwj8NDzSj8OX0="; 23 }; 24 25 buildInputs = [ bashInteractive ]; # needed for bash-completion helper
··· 12 13 buildPythonPackage rec { 14 pname = "osc"; 15 + version = "1.19.1"; 16 format = "setuptools"; 17 18 src = fetchFromGitHub { 19 owner = "openSUSE"; 20 repo = "osc"; 21 rev = version; 22 + hash = "sha256-klPO873FwQOf4DCTuDd86vmGLI4ep9xgS6c+HasJv0Q="; 23 }; 24 25 buildInputs = [ bashInteractive ]; # needed for bash-completion helper
+1
pkgs/development/python-modules/pyiceberg/default.nix
··· 84 env.CIBUILDWHEEL = "1"; 85 86 pythonRelaxDeps = [ 87 "rich" 88 ]; 89
··· 84 env.CIBUILDWHEEL = "1"; 85 86 pythonRelaxDeps = [ 87 + "cachetools" 88 "rich" 89 ]; 90
+11 -16
pkgs/development/python-modules/pyocd/default.nix
··· 1 { 2 lib, 3 buildPythonPackage, 4 fetchFromGitHub, 5 - fetchpatch, 6 capstone, 7 cmsis-pack-manager, 8 colorama, ··· 17 pylink-square, 18 pyusb, 19 pyyaml, 20 - setuptools-scm, 21 typing-extensions, 22 - stdenv, 23 hidapi, 24 pytestCheckHook, 25 }: 26 ··· 36 hash = "sha256-4fdVcTNH125e74S3mA/quuDun17ntGCazX6CV+obUGc="; 37 }; 38 39 - patches = [ 40 - # https://github.com/pyocd/pyOCD/pull/1332 41 - # merged into develop 42 - (fetchpatch { 43 - name = "libusb-package-optional.patch"; 44 - url = "https://github.com/pyocd/pyOCD/commit/0b980cf253e3714dd2eaf0bddeb7172d14089649.patch"; 45 - hash = "sha256-B2+50VntcQELeakJbCeJdgI1iBU+h2NkXqba+LRYa/0="; 46 - }) 47 - ]; 48 - 49 pythonRelaxDeps = [ "capstone" ]; 50 pythonRemoveDeps = [ "libusb-package" ]; 51 ··· 80 81 nativeCheckInputs = [ pytestCheckHook ]; 82 83 - meta = with lib; { 84 changelog = "https://github.com/pyocd/pyOCD/releases/tag/${src.tag}"; 85 description = "Python library for programming and debugging Arm Cortex-M microcontrollers"; 86 downloadPage = "https://github.com/pyocd/pyOCD"; 87 homepage = "https://pyocd.io"; 88 - license = licenses.asl20; 89 - maintainers = with maintainers; [ 90 frogamic 91 sbruder 92 ];
··· 1 { 2 lib, 3 + stdenv, 4 buildPythonPackage, 5 fetchFromGitHub, 6 + 7 + # build-system 8 + setuptools-scm, 9 + 10 + # dependencies 11 capstone, 12 cmsis-pack-manager, 13 colorama, ··· 22 pylink-square, 23 pyusb, 24 pyyaml, 25 typing-extensions, 26 hidapi, 27 + 28 + # tests 29 pytestCheckHook, 30 }: 31 ··· 41 hash = "sha256-4fdVcTNH125e74S3mA/quuDun17ntGCazX6CV+obUGc="; 42 }; 43 44 pythonRelaxDeps = [ "capstone" ]; 45 pythonRemoveDeps = [ "libusb-package" ]; 46 ··· 75 76 nativeCheckInputs = [ pytestCheckHook ]; 77 78 + meta = { 79 changelog = "https://github.com/pyocd/pyOCD/releases/tag/${src.tag}"; 80 description = "Python library for programming and debugging Arm Cortex-M microcontrollers"; 81 downloadPage = "https://github.com/pyocd/pyOCD"; 82 homepage = "https://pyocd.io"; 83 + license = lib.licenses.asl20; 84 + maintainers = with lib.maintainers; [ 85 frogamic 86 sbruder 87 ];
+2 -2
pkgs/development/python-modules/pytouchlinesl/default.nix
··· 12 13 buildPythonPackage rec { 14 pname = "pytouchlinesl"; 15 - version = "0.4.0"; 16 pyproject = true; 17 18 disabled = pythonOlder "3.10"; ··· 21 owner = "jnsgruk"; 22 repo = "pytouchlinesl"; 23 tag = version; 24 - hash = "sha256-hrC5cBtAU9P9VaRIoUKDx5x4KwUN6mO/JwEZrsnYB0s="; 25 }; 26 27 build-system = [ setuptools ];
··· 12 13 buildPythonPackage rec { 14 pname = "pytouchlinesl"; 15 + version = "0.5.0"; 16 pyproject = true; 17 18 disabled = pythonOlder "3.10"; ··· 21 owner = "jnsgruk"; 22 repo = "pytouchlinesl"; 23 tag = version; 24 + hash = "sha256-R5XgH8A9P5KcjQL/f+E189A+iRVUIbWsmyRrnfV43v4="; 25 }; 26 27 build-system = [ setuptools ];
+17 -17
pkgs/development/python-modules/ray/default.nix
··· 64 65 let 66 pname = "ray"; 67 - version = "2.48.0"; 68 in 69 buildPythonPackage rec { 70 inherit pname version; ··· 85 # Results are in ./ray-hashes.nix 86 hashes = { 87 x86_64-linux = { 88 - cp310 = "sha256-ZJ7ZRC3C05E1xZO2zww46DVRcLkmcjZat6PLyVjEJjQ="; 89 - cp311 = "sha256-RtS0KlhJLex5yq0tViNEaJpPmagoruqBGgzSzWU1U+8="; 90 - cp312 = "sha256-pC7TtkD0tZmj/IBnyD7mBJfA8D0HDXp98Co4j6F6VGs="; 91 - cp313 = "sha256-JeS3n8yPhJ1y2xrMTwPzcAjFwLdF32PYowzTVna2VF4="; 92 }; 93 aarch64-linux = { 94 - cp310 = "sha256-+CCVC8RNewAMIjNC9cgAycCOf9iVJCARJTiOohHKrRo="; 95 - cp311 = "sha256-JKcPQW7AvhS5dfFgBEgFzLSMxrxQ3mMpg+uPCo4WaCs="; 96 - cp312 = "sha256-8c8z0mAxb5L3dVgYXxw2/DVQbXbuf9/tn1tw+cS9un8="; 97 - cp313 = "sha256-Yi5rzbeNmAQNh76pTmXQu2zMCuG0MpTGvWn1Qr8o4JI="; 98 }; 99 x86_64-darwin = { 100 - cp310 = "sha256-M72kdTrQrNK1JMkVgInUNIbNRMxZ/pcEZkNbwpaP3i0="; 101 - cp311 = "sha256-uUUA/i0X5JH+LpvUo79i3yF+IajyhFAzw1PU0uokD3M="; 102 - cp312 = "sha256-Wm9XEm6sndMoYongfpHoewVHkvlpi298yriLYkgWtUI="; 103 - cp313 = "sha256-V0K3KlFK/l1g9BMwIAzVCDduFsZQ9pYuYjN6pILWoMY="; 104 }; 105 aarch64-darwin = { 106 - cp310 = "sha256-bKK5zkWtNgy+KZaYL7Imkez+ZVPsj5eiVIKV8PlqrHg="; 107 - cp311 = "sha256-S5uSrCljX1Ve80E0fZpj2/ArfZRjRyOa88CeNkvEXPg="; 108 - cp312 = "sha256-jeeZ87CJb0jTBtXkoE/GA3oIxJXUX5x5k1NE5Wk+PPg="; 109 - cp313 = "sha256-p6bYMNncWui7FW/N6aGtq39O2wBPA5GKck2IXs64Jk0="; 110 }; 111 }; 112 in
··· 64 65 let 66 pname = "ray"; 67 + version = "2.49.0"; 68 in 69 buildPythonPackage rec { 70 inherit pname version; ··· 85 # Results are in ./ray-hashes.nix 86 hashes = { 87 x86_64-linux = { 88 + cp310 = "sha256-bFQKbfqOWC4HJQV8E3JFzNP6DWl7R2SFMxdvWoqzCjA="; 89 + cp311 = "sha256-Ja5MII3Hi0plPDEcsmuTx0QB5nYqGTztX6uqkQqBfYE="; 90 + cp312 = "sha256-lShdI6MDsXTQcKaz6ocj6dq/B6QUegHLkzHV6t+MoLI="; 91 + cp313 = "sha256-42mZ1Pgx8vIcqPtWnwWY+4DKjawPiDbErHXM2ltVi/s="; 92 }; 93 aarch64-linux = { 94 + cp310 = "sha256-jFWnpGKgzese1Y+jYQ9S46KEzk4MVVZjWb0RWKloP0Q="; 95 + cp311 = "sha256-KnXS/YvKsahQkeow5ZMsXiiXxxIq4j+SH0+v7sIsOCg="; 96 + cp312 = "sha256-NjVn9WES86FRjs2NDjoM5PBTcFzI9NQ+kzyvafs1lxw="; 97 + cp313 = "sha256-/Wu+DBhvHWpJ31NTKyGSH9Bf+ZPLVG9mW3GAmGIPY8U="; 98 }; 99 x86_64-darwin = { 100 + cp310 = "sha256-6Qjm97RkKdJvRZRXlFgpiETRpIXCiM/liRT6eilP06Q="; 101 + cp311 = "sha256-5CpBh6kOiXr7lVF8uKpPwMJHGL1Ci97AsmCqLRjs5sg="; 102 + cp312 = "sha256-FvsQ5YuuSDECZ16Cnq0afQpHjcVfmf8GuDKnicogi6k="; 103 + cp313 = "sha256-LhOphUj78ujX8JY8YK/1HZtT01naDO9QoHGpUMT85Uo="; 104 }; 105 aarch64-darwin = { 106 + cp310 = "sha256-seRUvxTQCGfaXslF4L4IfWhFfyQbqmClDLccBBosTfw="; 107 + cp311 = "sha256-VKipsP5qnLFagvNxwufWhCD540/+OKi+PD3UvlQFHGY="; 108 + cp312 = "sha256-+UOpwq4EljaxJqGUBH/fkQEGCpmF0dthSxeycGH46fM="; 109 + cp313 = "sha256-9CDvy2n6ZDAf8su3YR10rwEguu6OhAhtjzuV6BVTD5M="; 110 }; 111 }; 112 in
+4
pkgs/development/python-modules/spsdk-pyocd/default.nix
··· 35 setuptools 36 ]; 37 38 dependencies = [ 39 pyocd 40 ];
··· 35 setuptools 36 ]; 37 38 + pythonRelaxDeps = [ 39 + "pyocd" 40 + ]; 41 + 42 dependencies = [ 43 pyocd 44 ];
+6
pkgs/development/python-modules/spsdk/default.nix
··· 39 x690, 40 41 # tests 42 ipykernel, 43 pytest-notebook, 44 pytestCheckHook, ··· 95 click-command-tree 96 click-option-group 97 colorama 98 crcmod 99 cryptography 100 deepmerge ··· 122 pythonImportsCheck = [ "spsdk" ]; 123 124 nativeCheckInputs = [ 125 ipykernel 126 pytest-notebook 127 pytestCheckHook ··· 134 disabledTests = [ 135 # Missing rotk private key 136 "test_general_notebooks" 137 ]; 138 139 meta = {
··· 39 x690, 40 41 # tests 42 + cookiecutter, 43 ipykernel, 44 pytest-notebook, 45 pytestCheckHook, ··· 96 click-command-tree 97 click-option-group 98 colorama 99 + cookiecutter 100 crcmod 101 cryptography 102 deepmerge ··· 124 pythonImportsCheck = [ "spsdk" ]; 125 126 nativeCheckInputs = [ 127 + cookiecutter 128 ipykernel 129 pytest-notebook 130 pytestCheckHook ··· 137 disabledTests = [ 138 # Missing rotk private key 139 "test_general_notebooks" 140 + 141 + # Attempts to access /run 142 + "test_nxpimage_famode_export_cli" 143 ]; 144 145 meta = {
+1 -7
pkgs/development/python-modules/torch/source/default.nix
··· 72 # (dependencies without cuda support). 73 # Instead we should rely on overlays and nixpkgsFun. 74 # (@SomeoneSerge) 75 - _tritonEffective ? 76 - if cudaSupport then 77 - triton-cuda 78 - else if rocmSupport then 79 - rocmPackages.triton 80 - else 81 - triton, 82 triton-cuda, 83 84 # Disable MKLDNN on aarch64-darwin, it negatively impacts performance,
··· 72 # (dependencies without cuda support). 73 # Instead we should rely on overlays and nixpkgsFun. 74 # (@SomeoneSerge) 75 + _tritonEffective ? if cudaSupport then triton-cuda else triton, 76 triton-cuda, 77 78 # Disable MKLDNN on aarch64-darwin, it negatively impacts performance,
-28
pkgs/development/python-modules/triton/0002-nvidia-amd-driver-short-circuit-before-ldconfig.patch
··· 1 - diff --git a/third_party/amd/backend/driver.py b/third_party/amd/backend/driver.py 2 - index ca712f904..0961d2dda 100644 3 - --- a/third_party/amd/backend/driver.py 4 - +++ b/third_party/amd/backend/driver.py 5 - @@ -79,6 +79,9 @@ def _get_path_to_hip_runtime_dylib(): 6 - return mmapped_path 7 - raise RuntimeError(f"memory mapped '{mmapped_path}' in process does not point to a valid {lib_name}") 8 - 9 - + if os.path.isdir("@libhipDir@"): 10 - + return ["@libhipDir@"] 11 - + 12 - paths = [] 13 - 14 - import site 15 - diff --git a/third_party/nvidia/backend/driver.py b/third_party/nvidia/backend/driver.py 16 - index d088ec092..625de2db8 100644 17 - --- a/third_party/nvidia/backend/driver.py 18 - +++ b/third_party/nvidia/backend/driver.py 19 - @@ -23,6 +23,9 @@ def libcuda_dirs(): 20 - if env_libcuda_path: 21 - return [env_libcuda_path] 22 - 23 - + if os.path.exists("@libcudaStubsDir@"): 24 - + return ["@libcudaStubsDir@"] 25 - + 26 - libs = subprocess.check_output(["/sbin/ldconfig", "-p"]).decode() 27 - # each line looks like the following: 28 - # libcuda.so.1 (libc6,x86-64) => /lib/x86_64-linux-gnu/libcuda.so.1
···
+14
pkgs/development/python-modules/triton/0002-nvidia-driver-short-circuit-before-ldconfig.patch
···
··· 1 + diff --git a/third_party/nvidia/backend/driver.py b/third_party/nvidia/backend/driver.py 2 + index d088ec092..625de2db8 100644 3 + --- a/third_party/nvidia/backend/driver.py 4 + +++ b/third_party/nvidia/backend/driver.py 5 + @@ -23,6 +23,9 @@ def libcuda_dirs(): 6 + if env_libcuda_path: 7 + return [env_libcuda_path] 8 + 9 + + if os.path.exists("@libcudaStubsDir@"): 10 + + return ["@libcudaStubsDir@"] 11 + + 12 + libs = subprocess.check_output(["/sbin/ldconfig", "-p"]).decode() 13 + # each line looks like the following: 14 + # libcuda.so.1 (libc6,x86-64) => /lib/x86_64-linux-gnu/libcuda.so.1
+60
pkgs/development/python-modules/triton/0005-amd-search-env-paths.patch
···
··· 1 + From 9e4e58b647c17c5fa098c8a74e221f88d3cb1a43 Mon Sep 17 00:00:00 2001 2 + From: Luna Nova <git@lunnova.dev> 3 + Date: Sun, 24 Aug 2025 07:41:30 -0700 4 + Subject: [PATCH] [AMD] Search HIP_PATH, hipconfig, and ROCM_PATH for 5 + libamdhip64 6 + 7 + Search for libamdhip64 from HIP_PATH env var, hipconfig --path output, 8 + and ROCM_PATH before looking in system-wide ldconfig or /opt/rocm. 9 + 10 + The system-wide ROCm path isn't guaranteed to be where the ROCm 11 + install we're building against is located, so follow typical ROCm 12 + lib behavior and look under env paths first. 13 + 14 + This is especially important for non-FHS distros like NixOS 15 + where /opt/rocm never exists, but may be useful in more 16 + typical distros if multiple ROCm installs are present 17 + to ensure the right libamdhip64.so is picked up. 18 + --- 19 + third_party/amd/backend/driver.py | 28 ++++++++++++++++++++++++++++ 20 + 1 file changed, 28 insertions(+) 21 + 22 + diff --git a/third_party/amd/backend/driver.py b/third_party/amd/backend/driver.py 23 + index af8e1a5c8097..57b0f7388c60 100644 24 + --- a/third_party/amd/backend/driver.py 25 + +++ b/third_party/amd/backend/driver.py 26 + @@ -110,6 +110,34 @@ def _get_path_to_hip_runtime_dylib(): 27 + return f 28 + paths.append(f) 29 + 30 + + # HIP_PATH should point to HIP SDK root if set 31 + + env_hip_path = os.getenv("HIP_PATH") 32 + + if env_hip_path: 33 + + hip_lib_path = os.path.join(env_hip_path, "lib", lib_name) 34 + + if os.path.exists(hip_lib_path): 35 + + return hip_lib_path 36 + + paths.append(hip_lib_path) 37 + + 38 + + # if available, `hipconfig --path` prints the HIP SDK root 39 + + try: 40 + + hip_root = subprocess.check_output(["hipconfig", "--path"]).decode().strip() 41 + + if hip_root: 42 + + hip_lib_path = os.path.join(hip_root, "lib", lib_name) 43 + + if os.path.exists(hip_lib_path): 44 + + return hip_lib_path 45 + + paths.append(hip_lib_path) 46 + + except (subprocess.CalledProcessError, FileNotFoundError): 47 + + # hipconfig may not be available 48 + + pass 49 + + 50 + + # ROCm lib dir based on env var 51 + + env_rocm_path = os.getenv("ROCM_PATH") 52 + + if env_rocm_path: 53 + + rocm_lib_path = os.path.join(env_rocm_path, "lib", lib_name) 54 + + if os.path.exists(rocm_lib_path): 55 + + return rocm_lib_path 56 + + paths.append(rocm_lib_path) 57 + + 58 + # Afterwards try to search the loader dynamic library resolution paths. 59 + libs = subprocess.check_output(["/sbin/ldconfig", "-p"]).decode(errors="ignore") 60 + # each line looks like the following:
+52 -3
pkgs/development/python-modules/triton/default.nix
··· 23 torchWithRocm, 24 zlib, 25 cudaSupport ? config.cudaSupport, 26 - rocmSupport ? config.rocmSupport, 27 rocmPackages, 28 triton, 29 }: ··· 45 (replaceVars ./0001-_build-allow-extra-cc-flags.patch { 46 ccCmdExtraFlags = "-Wl,-rpath,${addDriverRunpath.driverLink}/lib"; 47 }) 48 - (replaceVars ./0002-nvidia-amd-driver-short-circuit-before-ldconfig.patch { 49 - libhipDir = if rocmSupport then "${lib.getLib rocmPackages.clr}/lib" else null; 50 libcudaStubsDir = 51 if cudaSupport then "${lib.getOutput "stubs" cudaPackages.cuda_cudart}/lib/stubs" else null; 52 }) 53 ] 54 ++ lib.optionals cudaSupport [ 55 (replaceVars ./0003-nvidia-cudart-a-systempath.patch { ··· 81 substituteInPlace cmake/AddTritonUnitTest.cmake \ 82 --replace-fail "include(\''${PROJECT_SOURCE_DIR}/unittest/googletest.cmake)" ""\ 83 --replace-fail "include(GoogleTest)" "find_package(GTest REQUIRED)" 84 ''; 85 86 build-system = [ setuptools ]; ··· 204 passthru.tests = { 205 # Ultimately, torch is our test suite: 206 inherit torchWithRocm; 207 208 # Test as `nix run -f "<nixpkgs>" python3Packages.triton.tests.axpy-cuda` 209 # or, using `programs.nix-required-mounts`, as `nix build -f "<nixpkgs>" python3Packages.triton.tests.axpy-cuda.gpuCheck`
··· 23 torchWithRocm, 24 zlib, 25 cudaSupport ? config.cudaSupport, 26 + runCommand, 27 rocmPackages, 28 triton, 29 }: ··· 45 (replaceVars ./0001-_build-allow-extra-cc-flags.patch { 46 ccCmdExtraFlags = "-Wl,-rpath,${addDriverRunpath.driverLink}/lib"; 47 }) 48 + (replaceVars ./0002-nvidia-driver-short-circuit-before-ldconfig.patch { 49 libcudaStubsDir = 50 if cudaSupport then "${lib.getOutput "stubs" cudaPackages.cuda_cudart}/lib/stubs" else null; 51 }) 52 + # Upstream PR: https://github.com/triton-lang/triton/pull/7959 53 + ./0005-amd-search-env-paths.patch 54 ] 55 ++ lib.optionals cudaSupport [ 56 (replaceVars ./0003-nvidia-cudart-a-systempath.patch { ··· 82 substituteInPlace cmake/AddTritonUnitTest.cmake \ 83 --replace-fail "include(\''${PROJECT_SOURCE_DIR}/unittest/googletest.cmake)" ""\ 84 --replace-fail "include(GoogleTest)" "find_package(GTest REQUIRED)" 85 + '' 86 + # Don't use FHS path for ROCm LLD 87 + # Remove this after `[AMD] Use lld library API #7548` makes it into a release 88 + + '' 89 + substituteInPlace third_party/amd/backend/compiler.py \ 90 + --replace-fail 'lld = Path("/opt/rocm/llvm/bin/ld.lld")' \ 91 + "import os;lld = Path(os.getenv('HIP_PATH', '/opt/rocm/')"' + "/llvm/bin/ld.lld")' 92 ''; 93 94 build-system = [ setuptools ]; ··· 212 passthru.tests = { 213 # Ultimately, torch is our test suite: 214 inherit torchWithRocm; 215 + 216 + # Test that _get_path_to_hip_runtime_dylib works when ROCm is available at runtime 217 + rocm-libamdhip64-path = 218 + runCommand "triton-rocm-libamdhip64-path-test" 219 + { 220 + buildInputs = [ 221 + triton 222 + python 223 + rocmPackages.clr 224 + ]; 225 + } 226 + '' 227 + python -c " 228 + import os 229 + import triton 230 + path = triton.backends.amd.driver._get_path_to_hip_runtime_dylib() 231 + print(f'libamdhip64 path: {path}') 232 + assert os.path.exists(path) 233 + " && touch $out 234 + ''; 235 + 236 + # Test that path_to_rocm_lld works when ROCm is available at runtime 237 + # Remove this after `[AMD] Use lld library API #7548` makes it into a release 238 + rocm-lld-path = 239 + runCommand "triton-rocm-lld-test" 240 + { 241 + buildInputs = [ 242 + triton 243 + python 244 + rocmPackages.clr 245 + ]; 246 + } 247 + '' 248 + python -c " 249 + import os 250 + import triton 251 + path = triton.backends.backends['amd'].compiler.path_to_rocm_lld() 252 + print(f'ROCm LLD path: {path}') 253 + assert os.path.exists(path) 254 + " && touch $out 255 + ''; 256 257 # Test as `nix run -f "<nixpkgs>" python3Packages.triton.tests.axpy-cuda` 258 # or, using `programs.nix-required-mounts`, as `nix build -f "<nixpkgs>" python3Packages.triton.tests.axpy-cuda.gpuCheck`
+13
pkgs/development/python-modules/vdirsyncer/default.nix
··· 2 lib, 3 buildPythonPackage, 4 fetchPypi, 5 pythonOlder, 6 click, 7 click-log, ··· 37 inherit pname version; 38 hash = "sha256-5DeFH+uYXew1RGVPj5z23RCbCwP34ZlWCGYDCS/+so8="; 39 }; 40 41 nativeBuildInputs = [ 42 setuptools
··· 2 lib, 3 buildPythonPackage, 4 fetchPypi, 5 + fetchpatch, 6 pythonOlder, 7 click, 8 click-log, ··· 38 inherit pname version; 39 hash = "sha256-5DeFH+uYXew1RGVPj5z23RCbCwP34ZlWCGYDCS/+so8="; 40 }; 41 + 42 + patches = [ 43 + ( 44 + # Fix event_loop missing 45 + # TODO: remove it after vdirsyncer release 0.19.4 46 + fetchpatch { 47 + # https://github.com/pimutils/vdirsyncer/pull/1185 48 + url = "https://github.com/pimutils/vdirsyncer/commit/164559ad7a95ed795ce4ae8d9b287bd27704742d.patch"; 49 + hash = "sha256-nUGvkBnHr8nVPpBuhQ5GjaRs3QSxokdZUEIsOrQ+lpo="; 50 + } 51 + ) 52 + ]; 53 54 nativeBuildInputs = [ 55 setuptools
+4 -15
pkgs/development/rocm-modules/6/default.nix
··· 264 ); 265 mpi = self.openmpi; 266 267 - triton-llvm = triton-llvm.overrideAttrs { 268 - src = fetchFromGitHub { 269 - owner = "llvm"; 270 - repo = "llvm-project"; 271 - # make sure this matches triton llvm rel branch hash for now 272 - # https://github.com/triton-lang/triton/blob/release/3.2.x/cmake/llvm-hash.txt 273 - rev = "86b69c31642e98f8357df62c09d118ad1da4e16a"; 274 - hash = "sha256-W/mQwaLGx6/rIBjdzUTIbWrvGjdh7m4s15f70fQ1/hE="; 275 - }; 276 - pname = "triton-llvm-rocm"; 277 - patches = [ ]; # FIXME: https://github.com/llvm/llvm-project//commit/84837e3cc1cf17ed71580e3ea38299ed2bfaa5f6.patch doesn't apply, may need to rebase 278 - }; 279 - 280 - triton = pyPackages.callPackage ./triton { rocmPackages = self; }; 281 - 282 ## Meta ## 283 # Emulate common ROCm meta layout 284 # These are mainly for users. I strongly suggest NOT using these in nixpkgs derivations ··· 454 }; 455 } 456 // lib.optionalAttrs config.allowAliases { 457 rocm-thunk = throw '' 458 'rocm-thunk' has been removed. It's now part of the ROCm runtime. 459 ''; # Added 2025-3-16
··· 264 ); 265 mpi = self.openmpi; 266 267 ## Meta ## 268 # Emulate common ROCm meta layout 269 # These are mainly for users. I strongly suggest NOT using these in nixpkgs derivations ··· 439 }; 440 } 441 // lib.optionalAttrs config.allowAliases { 442 + triton = throw '' 443 + 'rocmPackages.triton' has been removed. Please use python3Packages.triton 444 + ''; # Added 2025-08-24 445 + 446 rocm-thunk = throw '' 447 'rocm-thunk' has been removed. It's now part of the ROCm runtime. 448 ''; # Added 2025-3-16
-56
pkgs/development/rocm-modules/6/triton/default.nix
··· 1 - { 2 - triton-no-cuda, 3 - rocmPackages, 4 - fetchFromGitHub, 5 - }: 6 - (triton-no-cuda.override (_old: { 7 - inherit rocmPackages; 8 - rocmSupport = true; 9 - stdenv = rocmPackages.llvm.rocmClangStdenv; 10 - llvm = rocmPackages.triton-llvm; 11 - })).overridePythonAttrs 12 - (old: { 13 - doCheck = false; 14 - stdenv = rocmPackages.llvm.rocmClangStdenv; 15 - version = "3.2.0"; 16 - src = fetchFromGitHub { 17 - owner = "triton-lang"; 18 - repo = "triton"; 19 - rev = "9641643da6c52000c807b5eeed05edaec4402a67"; # "release/3.2.x"; 20 - hash = "sha256-V1lpARwOLn28ZHfjiWR/JJWGw3MB34c+gz6Tq1GOVfo="; 21 - }; 22 - buildInputs = old.buildInputs ++ [ 23 - rocmPackages.clr 24 - ]; 25 - dontStrip = true; 26 - env = old.env // { 27 - CXXFLAGS = "-O3 -I${rocmPackages.clr}/include -I/build/source/third_party/triton/third_party/nvidia/backend/include"; 28 - TRITON_OFFLINE_BUILD = 1; 29 - }; 30 - patches = [ ]; 31 - postPatch = '' 32 - # Remove nvidia backend so we don't depend on unfree nvidia headers 33 - # when we only want to target ROCm 34 - rm -rf third_party/nvidia 35 - substituteInPlace CMakeLists.txt \ 36 - --replace-fail "add_subdirectory(test)" "" 37 - sed -i '/nvidia\|NVGPU\|registerConvertTritonGPUToLLVMPass\|mlir::test::/Id' bin/RegisterTritonDialects.h 38 - sed -i '/TritonTestAnalysis/Id' bin/CMakeLists.txt 39 - substituteInPlace python/setup.py \ 40 - --replace-fail 'backends = [*BackendInstaller.copy(["nvidia", "amd"]), *BackendInstaller.copy_externals()]' \ 41 - 'backends = [*BackendInstaller.copy(["amd"]), *BackendInstaller.copy_externals()]' 42 - find . -type f -exec sed -i 's|[<]cupti.h[>]|"cupti.h"|g' {} + 43 - find . -type f -exec sed -i 's|[<]cuda.h[>]|"cuda.h"|g' {} + 44 - # remove any downloads 45 - substituteInPlace python/setup.py \ 46 - --replace-fail "[get_json_package_info()]" "[]"\ 47 - --replace-fail "[get_llvm_package_info()]" "[]"\ 48 - --replace-fail "curr_version != version" "False" 49 - # Don't fetch googletest 50 - substituteInPlace cmake/AddTritonUnitTest.cmake \ 51 - --replace-fail 'include(''${PROJECT_SOURCE_DIR}/unittest/googletest.cmake)' "" \ 52 - --replace-fail "include(GoogleTest)" "find_package(GTest REQUIRED)" 53 - substituteInPlace third_party/amd/backend/compiler.py \ 54 - --replace-fail '"/opt/rocm/llvm/bin/ld.lld"' "os.environ['ROCM_PATH']"' + "/llvm/bin/ld.lld"' 55 - ''; 56 - })
···
+2 -2
pkgs/development/tools/ocaml/dune/3.nix
··· 14 15 stdenv.mkDerivation rec { 16 pname = "dune"; 17 - version = "3.19.1"; 18 19 src = fetchurl { 20 url = "https://github.com/ocaml/dune/releases/download/${version}/dune-${version}.tbz"; 21 - hash = "sha256-oQOG+YDNqUF9FGVGa+1Q3SrvnJO50GoPf+7tsKFUEVg="; 22 }; 23 24 nativeBuildInputs = [
··· 14 15 stdenv.mkDerivation rec { 16 pname = "dune"; 17 + version = "3.20.1"; 18 19 src = fetchurl { 20 url = "https://github.com/ocaml/dune/releases/download/${version}/dune-${version}.tbz"; 21 + hash = "sha256-8I6V3igo6JHWiQbkQwtRFwMihSB7W8aE/F1FZS6zDgo="; 22 }; 23 24 nativeBuildInputs = [
+4
pkgs/tools/compression/zstd/default.nix
··· 24 curl, 25 python3Packages, 26 haskellPackages, 27 }: 28 29 stdenv.mkDerivation rec { ··· 126 python-zstd = python3Packages.zstd; 127 haskell-zstd = haskellPackages.zstd; 128 haskell-hs-zstd = haskellPackages.hs-zstd; 129 }; 130 }; 131 ··· 146 mainProgram = "zstd"; 147 platforms = platforms.all; 148 maintainers = with maintainers; [ orivej ]; 149 }; 150 }
··· 24 curl, 25 python3Packages, 26 haskellPackages, 27 + testers, 28 + zstd, 29 }: 30 31 stdenv.mkDerivation rec { ··· 128 python-zstd = python3Packages.zstd; 129 haskell-zstd = haskellPackages.zstd; 130 haskell-hs-zstd = haskellPackages.hs-zstd; 131 + pkg-config = testers.hasPkgConfigModules { package = zstd; }; 132 }; 133 }; 134 ··· 149 mainProgram = "zstd"; 150 platforms = platforms.all; 151 maintainers = with maintainers; [ orivej ]; 152 + pkgConfigModules = [ "libzstd" ]; 153 }; 154 }
+1
pkgs/tools/inputmethods/ibus/default.nix
··· 196 libxkbcommon 197 wayland 198 wayland-protocols 199 ]; 200 201 enableParallelBuilding = true;
··· 196 libxkbcommon 197 wayland 198 wayland-protocols 199 + wayland-scanner # For cross, build uses $PKG_CONFIG to look for wayland-scanner 200 ]; 201 202 enableParallelBuilding = true;
+4
pkgs/top-level/python-packages.nix
··· 10775 10776 oocsi = callPackage ../development/python-modules/oocsi { }; 10777 10778 opcua-widgets = callPackage ../development/python-modules/opcua-widgets { }; 10779 10780 open-clip-torch = callPackage ../development/python-modules/open-clip-torch { }; ··· 10812 }; 10813 10814 opencamlib = callPackage ../development/python-modules/opencamlib { }; 10815 10816 opencensus = callPackage ../development/python-modules/opencensus { }; 10817
··· 10775 10776 oocsi = callPackage ../development/python-modules/oocsi { }; 10777 10778 + opaque = callPackage ../development/python-modules/opaque { }; 10779 + 10780 opcua-widgets = callPackage ../development/python-modules/opcua-widgets { }; 10781 10782 open-clip-torch = callPackage ../development/python-modules/open-clip-torch { }; ··· 10814 }; 10815 10816 opencamlib = callPackage ../development/python-modules/opencamlib { }; 10817 + 10818 + opencc = callPackage ../development/python-modules/opencc { }; 10819 10820 opencensus = callPackage ../development/python-modules/opencensus { }; 10821