Merge master into staging-next

authored by github-actions[bot] and committed by GitHub fc1f757b 3e52e592

+243 -294
+5 -39
doc/stdenv/multiple-output.chapter.md
··· 1 1 # Multiple-output packages {#chap-multiple-output} 2 2 3 - ## Introduction {#sec-multiple-outputs-introduction} 4 - 5 3 The Nix language allows a derivation to produce multiple outputs, which is similar to what is utilized by other Linux distribution packaging systems. The outputs reside in separate Nix store paths, so they can be mostly handled independently of each other, including passing to build inputs, garbage collection or binary substitution. The exception is that building from source always produces all the outputs. 6 4 7 5 The main motivation is to save disk space by reducing runtime closure sizes; consequently also sizes of substituted binaries get reduced. Splitting can be used to have more granular runtime dependencies, for example the typical reduction is to split away development-only files, as those are typically not needed during runtime. As a result, closure sizes of many packages can get reduced to a half or even much less. ··· 10 8 The reduction effects could be instead achieved by building the parts in completely separate derivations. That would often additionally reduce build-time closures, but it tends to be much harder to write such derivations, as build systems typically assume all parts are being built at once. This compromise approach of single source package producing multiple binary packages is also utilized often by rpm and deb. 11 9 ::: 12 10 13 - A number of attributes can be used to work with a derivation with multiple outputs. The attribute `outputs` is a list of strings, which are the names of the outputs. For each of these names, an identically named attribute is created, corresponding to that output. The attribute `meta.outputsToInstall` is used to determine the default set of outputs to install when using the derivation name unqualified. 14 - 15 - ## Installing a split package {#sec-multiple-outputs-installing} 16 - 17 - When installing a package with multiple outputs, the package’s `meta.outputsToInstall` attribute determines which outputs are actually installed. `meta.outputsToInstall` is a list whose [default installs binaries and the associated man pages](https://github.com/NixOS/nixpkgs/blob/f1680774340d5443a1409c3421ced84ac1163ba9/pkgs/stdenv/generic/make-derivation.nix#L310-L320). The following sections describe ways to install different outputs. 18 - 19 - ### Selecting outputs to install via NixOS {#sec-multiple-outputs-installing-nixos} 20 - 21 - NixOS provides two ways to select the outputs to install for packages listed in `environment.systemPackages`: 22 - 23 - - The configuration option `environment.extraOutputsToInstall` is appended to each package’s `meta.outputsToInstall` attribute to determine the outputs to install. It can for example be used to install `info` documentation or debug symbols for all packages. 24 - 25 - - The outputs can be listed as packages in `environment.systemPackages`. For example, the `"out"` and `"info"` outputs for the `coreutils` package can be installed by including `coreutils` and `coreutils.info` in `environment.systemPackages`. 26 - 27 - ### Selecting outputs to install via `nix-env` {#sec-multiple-outputs-installing-nix-env} 28 - 29 - `nix-env` lacks an easy way to select the outputs to install. When installing a package, `nix-env` always installs the outputs listed in `meta.outputsToInstall`, even when the user explicitly selects an output. 30 - 31 - ::: {.warning} 32 - `nix-env` silently disregards the outputs selected by the user, and instead installs the outputs from `meta.outputsToInstall`. For example, 33 - 34 - ```ShellSession 35 - $ nix-env -iA nixpkgs.coreutils.info 36 - ``` 37 - 38 - installs the `"out"` output (`coreutils.meta.outputsToInstall` is `[ "out" ]`) instead of the requested `"info"`. 39 - ::: 40 - 41 - The only recourse to select an output with `nix-env` is to override the package’s `meta.outputsToInstall`, using the functions described in [](#chap-overrides). For example, the following overlay adds the `"info"` output for the `coreutils` package: 11 + A number of attributes can be used to work with a derivation with multiple outputs. 12 + The attribute `outputs` is a list of strings, which are the names of the outputs. 13 + For each of these names, an identically named attribute is created, corresponding to that output. 42 14 43 - ```nix 44 - self: super: 45 - { 46 - coreutils = super.coreutils.overrideAttrs (oldAttrs: { 47 - meta = oldAttrs.meta // { outputsToInstall = oldAttrs.meta.outputsToInstall or [ "out" ] ++ [ "info" ]; }; 48 - }); 49 - } 50 - ``` 15 + The attribute `meta.outputsToInstall` is used to determine the [default set of outputs to install](https://github.com/NixOS/nixpkgs/blob/08c3198f1c6fd89a09f8f0ea09b425028a34de3e/pkgs/stdenv/generic/check-meta.nix#L411-L426) when using the derivation name unqualified: 16 + `bin`, or `out`, or the first specified output; as well as `man` if that is specified. 51 17 52 18 ## Using a split package {#sec-multiple-outputs-using-split-packages} 53 19
+9
maintainers/maintainer-list.nix
··· 2336 2336 github = "blaggacao"; 2337 2337 githubId = 7548295; 2338 2338 }; 2339 + blankparticle = { 2340 + name = "BlankParticle"; 2341 + email = "blankparticle@gmail.com"; 2342 + github = "BlankParticle"; 2343 + githubId = 130567419; 2344 + keys = [{ 2345 + fingerprint = "1757 64C3 7065 AA8D 614D 41C9 0ACE 126D 7B35 9261"; 2346 + }]; 2347 + }; 2339 2348 blanky0230 = { 2340 2349 email = "blanky0230@gmail.com"; 2341 2350 github = "blanky0230";
+2 -2
nixos/doc/manual/release-notes/rl-2311.section.md
··· 132 132 133 133 - `himalaya` has been updated to `0.8.0`, which drops the native TLS support (in favor of Rustls) and add OAuth 2.0 support. See the [release note](https://github.com/soywod/himalaya/releases/tag/v0.8.0) for more details. 134 134 135 + - `nix-prefetch-git` now ignores global and user git config, to improve reproducibility. 136 + 135 137 - The [services.caddy.acmeCA](#opt-services.caddy.acmeCA) option now defaults to `null` instead of `"https://acme-v02.api.letsencrypt.org/directory"`, to use all of Caddy's default ACME CAs and enable Caddy's automatic issuer fallback feature by default, as recommended by upstream. 136 138 137 139 - The default priorities of [`services.nextcloud.phpOptions`](#opt-services.nextcloud.phpOptions) have changed. This means that e.g. ··· 276 278 - `services.matrix-synapse` has new options to configure worker processes for matrix-synapse using [`services.matrix-synapse.workers`](#opt-services.matrix-synapse.workers). It's also now possible to configure a local redis server using [`services.matrix-synapse.configureRedisLocally`](#opt-services.matrix-synapse.configureRedisLocally). 277 279 278 280 - `services.nginx` gained a `defaultListen` option at server-level with support for PROXY protocol listeners, also `proxyProtocol` is now exposed in `services.nginx.virtualHosts.<name>.listen` option. It is now possible to run PROXY listeners and non-PROXY listeners at a server-level, see [#213510](https://github.com/NixOS/nixpkgs/pull/213510/) for more details. 279 - 280 - - `generic-extlinux-compatible` bootloader (and raspberry pi with uboot) supports appending secrets to the initramfs 281 281 282 282 - `services.restic.backups` now adds wrapper scripts to your system path, which set the same environment variables as the service, so restic operations can easly be run from the command line. This behavior can be disabled by setting `createWrapper` to `false`, per backup configuration. 283 283
+8 -2
nixos/modules/config/system-path.nix
··· 116 116 extraOutputsToInstall = mkOption { 117 117 type = types.listOf types.str; 118 118 default = [ ]; 119 - example = [ "doc" "info" "devdoc" ]; 120 - description = lib.mdDoc "List of additional package outputs to be symlinked into {file}`/run/current-system/sw`."; 119 + example = [ "dev" "info" ]; 120 + description = lib.mdDoc '' 121 + Entries listed here will be appended to the `meta.outputsToInstall` attribute for each package in `environment.systemPackages`, and the files from the corresponding derivation outputs symlinked into {file}`/run/current-system/sw`. 122 + 123 + For example, this can be used to install the `dev` and `info` outputs for all packages in the system environment, if they are available. 124 + 125 + To use specific outputs instead of configuring them globally, select the corresponding attribute on the package derivation, e.g. `libxml2.dev` or `coreutils.info`. 126 + ''; 121 127 }; 122 128 123 129 extraSetup = mkOption {
+3 -25
nixos/modules/system/boot/loader/generic-extlinux-compatible/extlinux-conf-builder.sh
··· 70 70 addEntry() { 71 71 local path=$(readlink -f "$1") 72 72 local tag="$2" # Generation number or 'default' 73 - local current="$3" # whether this is the current/latest generation 74 73 75 74 if ! test -e $path/kernel -a -e $path/initrd; then 76 75 return 77 76 fi 78 77 79 - if test -e "$path/append-initrd-secrets"; then 80 - local initrd="$target/nixos/$(basename "$path")-initramfs-with-secrets" 81 - cp $(readlink -f "$path/initrd") "$initrd" 82 - chmod 600 "${initrd}" 83 - chown 0:0 "${initrd}" 84 - filesCopied[$initrd]=1 85 - 86 - "$path/append-initrd-secrets" "$initrd" || if test "${current}" = "1"; then 87 - echo "failed to create initrd secrets for the current generation." >&2 88 - echo "are your \`boot.initrd.secrets\` still in place?" >&2 89 - exit 1 90 - else 91 - echo "warning: failed to create initrd secrets for \"$path\", an older generation" >&2 92 - echo "note: this is normal after having removed or renamed a file in \`boot.initrd.secrets\`" >&2 93 - fi 94 - else 95 - copyToKernelsDir "$path/initrd"; initrd=$result 96 - fi 97 - 98 78 copyToKernelsDir "$path/kernel"; kernel=$result 99 - 79 + copyToKernelsDir "$path/initrd"; initrd=$result 100 80 dtbDir=$(readlink -m "$path/dtbs") 101 81 if [ -e "$dtbDir" ]; then 102 82 copyToKernelsDir "$dtbDir"; dtbs=$result ··· 150 130 TIMEOUT $timeout 151 131 EOF 152 132 153 - addEntry $default default 1 >> $tmpFile 133 + addEntry $default default >> $tmpFile 154 134 155 135 if [ "$numGenerations" -gt 0 ]; then 156 136 # Add up to $numGenerations generations of the system profile to the menu, 157 137 # in reverse (most recent to least recent) order. 158 - current=1 159 138 for generation in $( 160 139 (cd /nix/var/nix/profiles && ls -d system-*-link) \ 161 140 | sed 's/system-\([0-9]\+\)-link/\1/' \ 162 141 | sort -n -r \ 163 142 | head -n $numGenerations); do 164 143 link=/nix/var/nix/profiles/system-$generation-link 165 - addEntry $link $generation $current 166 - current=0 144 + addEntry $link $generation 167 145 done >> $tmpFile 168 146 fi 169 147
-1
nixos/modules/system/boot/loader/raspberrypi/raspberrypi.nix
··· 142 142 assertion = !pkgs.stdenv.hostPlatform.isAarch64 || cfg.version >= 3; 143 143 message = "Only Raspberry Pi >= 3 supports aarch64."; 144 144 }; 145 - boot.loader.supportsInitrdSecrets = cfg.uboot.enable; 146 145 147 146 system.build.installBootLoader = builder; 148 147 system.boot.loader.id = "raspberrypi";
-7
nixos/modules/system/boot/stage-1.nix
··· 610 610 path the secret should have inside the initrd, the value 611 611 is the path it should be copied from (or null for the same 612 612 path inside and out). 613 - 614 - The loader `generic-extlinux-compatible` supports this. Because 615 - it is not well know how different implementations react to 616 - concatenated cpio archives, this is disabled by default. It can be 617 - enabled by setting {option}`boot.loader.supportsInitrdSecrets` 618 - to true. If this works for you, please report your findings at 619 - https://github.com/NixOS/nixpkgs/issues/247145 . 620 613 ''; 621 614 example = literalExpression 622 615 ''
+1
pkgs/applications/editors/mg/default.nix
··· 31 31 description = "Micro GNU/emacs, a portable version of the mg maintained by the OpenBSD team"; 32 32 homepage = "https://man.openbsd.org/OpenBSD-current/man1/mg.1"; 33 33 license = licenses.publicDomain; 34 + mainProgram = "mg"; 34 35 platforms = platforms.all; 35 36 }; 36 37 }
+1 -1
pkgs/applications/kde/default.nix
··· 120 120 kdebugsettings = callPackage ./kdebugsettings.nix {}; 121 121 kdeconnect-kde = callPackage ./kdeconnect-kde.nix {}; 122 122 kdegraphics-mobipocket = callPackage ./kdegraphics-mobipocket.nix {}; 123 - kdegraphics-thumbnailers = callPackage ./kdegraphics-thumbnailers.nix {}; 123 + kdegraphics-thumbnailers = callPackage ./kdegraphics-thumbnailers {}; 124 124 kdenetwork-filesharing = callPackage ./kdenetwork-filesharing.nix {}; 125 125 kdenlive = callPackage ./kdenlive {}; 126 126 kdepim-addons = callPackage ./kdepim-addons.nix {};
-14
pkgs/applications/kde/kdegraphics-thumbnailers.nix
··· 1 - { 2 - mkDerivation, lib, fetchpatch, 3 - extra-cmake-modules, karchive, kio, libkexiv2, libkdcraw, kdegraphics-mobipocket 4 - }: 5 - 6 - mkDerivation { 7 - pname = "kdegraphics-thumbnailers"; 8 - meta = { 9 - license = [ lib.licenses.lgpl21 ]; 10 - maintainers = [ lib.maintainers.ttuegel ]; 11 - }; 12 - nativeBuildInputs = [ extra-cmake-modules ]; 13 - buildInputs = [ karchive kio libkexiv2 libkdcraw kdegraphics-mobipocket ]; 14 - }
+23
pkgs/applications/kde/kdegraphics-thumbnailers/default.nix
··· 1 + { 2 + mkDerivation, lib, ghostscript, substituteAll, 3 + extra-cmake-modules, karchive, kio, libkexiv2, libkdcraw, kdegraphics-mobipocket 4 + }: 5 + 6 + mkDerivation { 7 + pname = "kdegraphics-thumbnailers"; 8 + meta = { 9 + license = [ lib.licenses.lgpl21 ]; 10 + maintainers = [ lib.maintainers.ttuegel ]; 11 + }; 12 + nativeBuildInputs = [ extra-cmake-modules ]; 13 + buildInputs = [ karchive kio libkexiv2 libkdcraw kdegraphics-mobipocket ]; 14 + 15 + patches = [ 16 + # Hardcode patches to Ghostscript so PDF thumbnails work OOTB. 17 + # Intentionally not doing the same for dvips because TeX is big. 18 + (substituteAll { 19 + gs = "${ghostscript}/bin/gs"; 20 + src = ./gs-paths.patch; 21 + }) 22 + ]; 23 + }
+22
pkgs/applications/kde/kdegraphics-thumbnailers/gs-paths.patch
··· 1 + diff --git a/ps/gscreator.cpp b/ps/gscreator.cpp 2 + index 5b84e49..cbb7c25 100644 3 + --- a/ps/gscreator.cpp 4 + +++ b/ps/gscreator.cpp 5 + @@ -101,7 +101,7 @@ static const char *epsprolog = 6 + "[ ] 0 setdash newpath false setoverprint false setstrokeadjust\n"; 7 + 8 + static const char * gsargs_ps[] = { 9 + - "gs", 10 + + "@gs@", 11 + "-sDEVICE=png16m", 12 + "-sOutputFile=-", 13 + "-dSAFER", 14 + @@ -120,7 +120,7 @@ static const char * gsargs_ps[] = { 15 + }; 16 + 17 + static const char * gsargs_eps[] = { 18 + - "gs", 19 + + "@gs@", 20 + "-sDEVICE=png16m", 21 + "-sOutputFile=-", 22 + "-dSAFER",
+3 -3
pkgs/applications/misc/keepassxc/default.nix
··· 40 40 41 41 stdenv.mkDerivation rec { 42 42 pname = "keepassxc"; 43 - version = "2.7.5"; 43 + version = "2.7.6"; 44 44 45 45 src = fetchFromGitHub { 46 46 owner = "keepassxreboot"; 47 47 repo = "keepassxc"; 48 48 rev = version; 49 - sha256 = "sha256-OBEjczUIkY3pQXJfsuNj9Bm2TIbVWEHqMSolQnSfvLE="; 49 + hash = "sha256-xgrkMz7BCBxjfxHsAz/CFLv1d175LnrAJIOZMM3GmU0="; 50 50 }; 51 51 52 52 env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.cc.isClang (toString [ ··· 129 129 ''; 130 130 homepage = "https://keepassxc.org/"; 131 131 license = licenses.gpl2Plus; 132 - maintainers = with maintainers; [ jonafato srapenne ]; 132 + maintainers = with maintainers; [ jonafato srapenne blankparticle ]; 133 133 platforms = platforms.linux ++ platforms.darwin; 134 134 }; 135 135 }
+12 -12
pkgs/applications/networking/browsers/chromium/upstream-info.nix
··· 27 27 }; 28 28 stable = { 29 29 chromedriver = { 30 - sha256_darwin = "0phhcqid7wjw923qdi65zql3fid25swwszksgnw3b8fgz67jn955"; 30 + sha256_darwin = "138mw5p6r0n0531fs6322yxsjgj9hia5plw4mj0b3mclykzy5l37"; 31 31 sha256_darwin_aarch64 = 32 - "00fwq8slvjm6c7krgwjd4mxhkkrp23n4icb63qlvi2hy06gfj4l6"; 33 - sha256_linux = "0ws8ch1j2hzp483vr0acvam1zxmzg9d37x6gqdwiqwgrk6x5pvkh"; 34 - version = "117.0.5938.88"; 32 + "1cym94av2gw2zwj3rdqbjcqkigpzf0zk2bam2hw9n2hiabb4rm0p"; 33 + sha256_linux = "1q1vyhmcx6b5criz5bn1c3x3z2dzqdgsmwcvlb0rzqlzpla9q26m"; 34 + version = "117.0.5938.92"; 35 35 }; 36 36 deps = { 37 37 gn = { ··· 41 41 version = "2023-08-01"; 42 42 }; 43 43 }; 44 - sha256 = "01n9aqnilsjrbpv5kkx3c6nxs9p5l5lfwxj67hd5s5g4740di4a6"; 45 - sha256bin64 = "1dhgagphdzbd19gkc7vpl1hxc9vn0l7sxny346qjlmrwafqlhbgi"; 46 - version = "117.0.5938.88"; 44 + sha256 = "0b1l8gjhqbsyqi30rsn8dyq2hdvwasdqfk1qzk55f9ch4wclkjk5"; 45 + sha256bin64 = "047w7y4c8k076yzrjc50lvwncbk8b3lyqnd1si9nrsl7c66j2h0q"; 46 + version = "117.0.5938.92"; 47 47 }; 48 48 ungoogled-chromium = { 49 49 deps = { ··· 54 54 version = "2023-08-01"; 55 55 }; 56 56 ungoogled-patches = { 57 - rev = "117.0.5938.88-1"; 58 - sha256 = "1wz15ib56j8c84bgrbf0djk5wli49b1lvaqbg18pdclkp1mqy5w9"; 57 + rev = "117.0.5938.92-1"; 58 + sha256 = "0ix0vaki9r305js61qraiah3vqjaj3dyycabi6grfavdgjpjkasb"; 59 59 }; 60 60 }; 61 - sha256 = "01n9aqnilsjrbpv5kkx3c6nxs9p5l5lfwxj67hd5s5g4740di4a6"; 62 - sha256bin64 = "1dhgagphdzbd19gkc7vpl1hxc9vn0l7sxny346qjlmrwafqlhbgi"; 63 - version = "117.0.5938.88"; 61 + sha256 = "0b1l8gjhqbsyqi30rsn8dyq2hdvwasdqfk1qzk55f9ch4wclkjk5"; 62 + sha256bin64 = "047w7y4c8k076yzrjc50lvwncbk8b3lyqnd1si9nrsl7c66j2h0q"; 63 + version = "117.0.5938.92"; 64 64 }; 65 65 }
+43 -134
pkgs/applications/networking/browsers/firefox-bin/default.nix
··· 1 - { lib, stdenv, fetchurl, config, wrapGAppsHook 1 + { lib, stdenv, fetchurl, config, wrapGAppsHook, autoPatchelfHook 2 2 , alsa-lib 3 - , atk 4 - , cairo 5 3 , curl 6 - , cups 7 4 , dbus-glib 8 - , dbus 9 - , fontconfig 10 - , freetype 11 - , gdk-pixbuf 12 - , glib 13 - , glibc 14 5 , gtk3 15 - , libkrb5 16 - , libX11 17 - , libXScrnSaver 18 - , libxcb 19 - , libXcomposite 20 - , libXcursor 21 - , libXdamage 22 - , libXext 23 - , libXfixes 24 - , libXi 25 - , libXinerama 26 - , libXrender 27 - , libXrandr 28 - , libXt 29 6 , libXtst 30 - , libcanberra 31 - , libnotify 32 - , adwaita-icon-theme 33 - , libGLU, libGL 34 - , nspr 35 - , nss 36 - , pango 37 - , pipewire 7 + , libva 38 8 , pciutils 39 - , heimdal 40 - , libpulseaudio 41 - , systemd 9 + , pipewire 10 + , adwaita-icon-theme 42 11 , channel 43 12 , generated 44 13 , writeScript ··· 48 17 , gnused 49 18 , gnugrep 50 19 , gnupg 51 - , ffmpeg 52 20 , runtimeShell 53 - , mesa # firefox wants gbm for drm+dmabuf 54 21 , systemLocale ? config.i18n.defaultLocale or "en_US" 55 22 }: 56 23 57 24 let 58 25 59 26 inherit (generated) version sources; 27 + 28 + binaryName = if channel == "release" then "firefox" else "firefox-${channel}"; 60 29 61 30 mozillaPlatforms = { 62 31 i686-linux = "linux-i686"; ··· 95 64 96 65 src = fetchurl { inherit (source) url sha256; }; 97 66 98 - libPath = lib.makeLibraryPath 99 - [ stdenv.cc.cc 100 - alsa-lib 101 - atk 102 - cairo 103 - curl 104 - cups 105 - dbus-glib 106 - dbus 107 - fontconfig 108 - freetype 109 - gdk-pixbuf 110 - glib 111 - glibc 112 - gtk3 113 - libkrb5 114 - mesa 115 - libX11 116 - libXScrnSaver 117 - libXcomposite 118 - libXcursor 119 - libxcb 120 - libXdamage 121 - libXext 122 - libXfixes 123 - libXi 124 - libXinerama 125 - libXrender 126 - libXrandr 127 - libXt 128 - libXtst 129 - libcanberra 130 - libnotify 131 - libGLU libGL 132 - nspr 133 - nss 134 - pango 135 - pipewire 136 - pciutils 137 - heimdal 138 - libpulseaudio 139 - systemd 140 - ffmpeg 141 - ] + ":" + lib.makeSearchPathOutput "lib" "lib64" [ 142 - stdenv.cc.cc 143 - ]; 144 - 145 - inherit gtk3; 146 - 147 - nativeBuildInputs = [ wrapGAppsHook ]; 148 - buildInputs = [ gtk3 adwaita-icon-theme ]; 149 - 150 - # "strip" after "patchelf" may break binaries. 151 - # See: https://github.com/NixOS/patchelf/issues/10 152 - dontStrip = true; 153 - dontPatchELF = true; 154 - 155 - postPatch = '' 156 - # Don't download updates from Mozilla directly 157 - echo 'pref("app.update.auto", "false");' >> defaults/pref/channel-prefs.js 158 - ''; 67 + nativeBuildInputs = [ wrapGAppsHook autoPatchelfHook ]; 68 + buildInputs = [ 69 + gtk3 70 + adwaita-icon-theme 71 + alsa-lib 72 + dbus-glib 73 + libXtst 74 + ]; 75 + runtimeDependencies = [ 76 + curl 77 + libva.out 78 + pciutils 79 + ]; 80 + appendRunpaths = [ 81 + "${pipewire.lib}/lib" 82 + ]; 159 83 160 84 installPhase = 161 85 '' 162 - mkdir -p "$prefix/usr/lib/firefox-bin-${version}" 163 - cp -r * "$prefix/usr/lib/firefox-bin-${version}" 86 + mkdir -p "$prefix/lib/firefox-bin-${version}" 87 + cp -r * "$prefix/lib/firefox-bin-${version}" 164 88 165 89 mkdir -p "$out/bin" 166 - ln -s "$prefix/usr/lib/firefox-bin-${version}/firefox" "$out/bin/" 167 - 168 - for executable in \ 169 - firefox firefox-bin plugin-container \ 170 - updater crashreporter webapprt-stub \ 171 - glxtest vaapitest 172 - do 173 - if [ -e "$out/usr/lib/firefox-bin-${version}/$executable" ]; then 174 - patchelf --interpreter "$(cat $NIX_CC/nix-support/dynamic-linker)" \ 175 - "$out/usr/lib/firefox-bin-${version}/$executable" 176 - fi 177 - done 178 - 179 - find . -executable -type f -exec \ 180 - patchelf --set-rpath "$libPath" \ 181 - "$out/usr/lib/firefox-bin-${version}/{}" \; 182 - 183 - # wrapFirefox expects "$out/lib" instead of "$out/usr/lib" 184 - ln -s "$out/usr/lib" "$out/lib" 185 - 186 - gappsWrapperArgs+=(--argv0 "$out/bin/.firefox-wrapped") 90 + ln -s "$prefix/lib/firefox-bin-${version}/firefox" "$out/bin/${binaryName}" 187 91 188 92 # See: https://github.com/mozilla/policy-templates/blob/master/README.md 189 93 mkdir -p "$out/lib/firefox-bin-${version}/distribution"; 190 94 ln -s ${policiesJson} "$out/lib/firefox-bin-${version}/distribution/policies.json"; 191 95 ''; 192 96 193 - passthru.binaryName = "firefox"; 194 - passthru.libName = "firefox-bin-${version}"; 195 - passthru.execdir = "/bin"; 196 - passthru.ffmpegSupport = true; 197 - passthru.gssSupport = true; 198 - # update with: 199 - # $ nix-shell maintainers/scripts/update.nix --argstr package firefox-bin-unwrapped 200 - passthru.updateScript = import ./update.nix { 201 - inherit pname channel lib writeScript xidel coreutils gnused gnugrep gnupg curl runtimeShell; 202 - baseUrl = 203 - if channel == "devedition" 204 - then "https://archive.mozilla.org/pub/devedition/releases/" 205 - else "https://archive.mozilla.org/pub/firefox/releases/"; 97 + passthru = { 98 + inherit binaryName; 99 + libName = "firefox-bin-${version}"; 100 + ffmpegSupport = true; 101 + gssSupport = true; 102 + gtk3 = gtk3; 103 + 104 + # update with: 105 + # $ nix-shell maintainers/scripts/update.nix --argstr package firefox-bin-unwrapped 106 + updateScript = import ./update.nix { 107 + inherit pname channel lib writeScript xidel coreutils gnused gnugrep gnupg curl runtimeShell; 108 + baseUrl = 109 + if channel == "devedition" 110 + then "https://archive.mozilla.org/pub/devedition/releases/" 111 + else "https://archive.mozilla.org/pub/firefox/releases/"; 112 + }; 206 113 }; 114 + 207 115 meta = with lib; { 208 116 changelog = "https://www.mozilla.org/en-US/firefox/${version}/releasenotes/"; 209 117 description = "Mozilla Firefox, free web browser (binary package)"; ··· 213 121 platforms = builtins.attrNames mozillaPlatforms; 214 122 hydraPlatforms = []; 215 123 maintainers = with maintainers; [ taku0 lovesegfault ]; 124 + mainProgram = binaryName; 216 125 }; 217 126 }
+1
pkgs/applications/networking/browsers/lynx/default.nix
··· 58 58 meta = with lib; { 59 59 description = "A text-mode web browser"; 60 60 homepage = "https://lynx.invisible-island.net/"; 61 + mainProgram = "lynx"; 61 62 maintainers = with maintainers; [ ]; 62 63 license = licenses.gpl2Plus; 63 64 platforms = platforms.unix;
-6
pkgs/applications/networking/instant-messengers/slack/update.sh
··· 6 6 latest_linux_version=$(curl -L --silent https://slack.com/downloads/linux | sed -n 's/.*Version \([0-9\.]\+\).*/\1/p') 7 7 latest_mac_version=$(curl -L --silent https://slack.com/downloads/mac | sed -n 's/.*Version \([0-9\.]\+\).*/\1/p') 8 8 9 - # Double check that the latest mac and linux versions are in sync. 10 - if [[ "$latest_linux_version" != "$latest_mac_version" ]]; then 11 - echo "the latest linux ($latest_linux_version) and mac ($latest_mac_version) versions are not the same" 12 - exit 1 13 - fi 14 - 15 9 nixpkgs="$(git rev-parse --show-toplevel)" 16 10 slack_nix="$nixpkgs/pkgs/applications/networking/instant-messengers/slack/default.nix" 17 11 nixpkgs_linux_version=$(cat "$slack_nix" | sed -n 's/.*x86_64-linux-version = \"\([0-9\.]\+\)\";.*/\1/p')
+1
pkgs/applications/networking/irc/catgirl/default.nix
··· 30 30 license = licenses.gpl3Plus; 31 31 description = "A TLS-only terminal IRC client"; 32 32 platforms = platforms.unix; 33 + mainProgram = "catgirl"; 33 34 maintainers = with maintainers; [ xfnw ]; 34 35 }; 35 36 }
+1
pkgs/applications/virtualization/cloud-hypervisor/default.nix
··· 45 45 description = "Open source Virtual Machine Monitor (VMM) that runs on top of KVM"; 46 46 changelog = "https://github.com/cloud-hypervisor/cloud-hypervisor/releases/tag/v${version}"; 47 47 license = with licenses; [ asl20 bsd3 ]; 48 + mainProgram = "cloud-hypervisor"; 48 49 maintainers = with maintainers; [ offline qyliss ]; 49 50 platforms = [ "aarch64-linux" "x86_64-linux" ]; 50 51 };
+1
pkgs/applications/virtualization/crosvm/default.nix
··· 38 38 meta = with lib; { 39 39 description = "A secure virtual machine monitor for KVM"; 40 40 homepage = "https://chromium.googlesource.com/crosvm/crosvm/"; 41 + mainProgram = "crosvm"; 41 42 maintainers = with maintainers; [ qyliss ]; 42 43 license = licenses.bsd3; 43 44 platforms = [ "aarch64-linux" "x86_64-linux" ];
+1
pkgs/applications/window-managers/weston/default.nix
··· 78 78 homepage = "https://gitlab.freedesktop.org/wayland/weston"; 79 79 license = licenses.mit; # Expat version 80 80 platforms = platforms.linux; 81 + mainProgram = "weston"; 81 82 maintainers = with maintainers; [ primeos qyliss ]; 82 83 }; 83 84 }
+6 -3
pkgs/build-support/fetchgit/nix-prefetch-git
··· 293 293 local rev="${3:-HEAD}" 294 294 295 295 if [ -n "$fetchLFS" ]; then 296 - tmpHomePath="$(mktemp -d "${TMPDIR:-/tmp}/nix-prefetch-git-tmp-home-XXXXXXXXXX")" 297 - exit_handlers+=(remove_tmpHomePath) 298 - HOME="$tmpHomePath" 299 296 clean_git lfs install 300 297 fi 301 298 ··· 416 413 if test -z "$branchName"; then 417 414 branchName=fetchgit 418 415 fi 416 + 417 + tmpHomePath="$(mktemp -d "${TMPDIR:-/tmp}/nix-prefetch-git-tmp-home-XXXXXXXXXX")" 418 + exit_handlers+=(remove_tmpHomePath) 419 + HOME="$tmpHomePath" 420 + unset XDG_CONFIG_HOME 421 + export GIT_CONFIG_NOSYSTEM=1 419 422 420 423 if test -n "$builder"; then 421 424 test -n "$out" -a -n "$url" -a -n "$rev" || usage
+2 -3
pkgs/build-support/php/build-pecl.nix
··· 8 8 , nativeBuildInputs ? [ ] 9 9 , postPhpize ? "" 10 10 , makeFlags ? [ ] 11 - , src ? fetchurl { 11 + , src ? fetchurl ({ 12 12 url = "https://pecl.php.net/get/${pname}-${version}.tgz"; 13 - inherit (args) sha256; 14 - } 13 + } // lib.filterAttrs (attrName: _: lib.elem attrName [ "sha256" "hash" ]) args) 15 14 , passthru ? { } 16 15 , ... 17 16 }@args:
+33
pkgs/by-name/ar/armbian-firmware/package.nix
··· 1 + { stdenvNoCC, lib, fetchFromGitHub }: 2 + stdenvNoCC.mkDerivation rec { 3 + pname = "armbian-firmware"; 4 + version = "unstable-2023-09-16"; 5 + 6 + src = fetchFromGitHub { 7 + owner = "armbian"; 8 + repo = "firmware"; 9 + rev = "01f9809bb0c4bd60c0c84b9438486b02d58b03f7"; 10 + hash = "sha256-ozKADff7lFjIT/Zf5dkNlCe8lOK+kwYb/60NaCJ8i2k="; 11 + }; 12 + 13 + installPhase = '' 14 + runHook preInstall 15 + 16 + mkdir -p $out/lib/firmware 17 + cp -a * $out/lib/firmware/ 18 + 19 + runHook postInstall 20 + ''; 21 + 22 + # Firmware blobs do not need fixing and should not be modified 23 + dontBuild = true; 24 + dontFixup = true; 25 + 26 + meta = with lib; { 27 + description = "Firmware from Armbian"; 28 + homepage = "https://github.com/armbian/firmware"; 29 + license = licenses.unfree; 30 + platforms = platforms.all; 31 + maintainers = with maintainers; [ zaldnoay ]; 32 + }; 33 + }
+2 -2
pkgs/desktops/pantheon/apps/appcenter/default.nix
··· 23 23 24 24 stdenv.mkDerivation rec { 25 25 pname = "appcenter"; 26 - version = "7.3.0"; 26 + version = "7.4.0"; 27 27 28 28 src = fetchFromGitHub { 29 29 owner = "elementary"; 30 30 repo = pname; 31 31 rev = version; 32 - sha256 = "sha256-Lj3j812XaCIN+TFSDAvIgtl49n5jG4fVlAFvrWqngpM="; 32 + sha256 = "sha256-L6MGbzzujr4tEB2Cpd7IU+3mOtSCt2hLPw4mOfZ4TkQ="; 33 33 }; 34 34 35 35 nativeBuildInputs = [
+2 -2
pkgs/development/libraries/amdvlk/default.nix
··· 25 25 26 26 in stdenv.mkDerivation rec { 27 27 pname = "amdvlk"; 28 - version = "2023.Q3.1"; 28 + version = "2023.Q3.2"; 29 29 30 30 src = fetchRepoProject { 31 31 name = "${pname}-src"; 32 32 manifest = "https://github.com/GPUOpen-Drivers/AMDVLK.git"; 33 33 rev = "refs/tags/v-${version}"; 34 - sha256 = "W+igZbdQG1L62oGJa2Rz0n8YkTsZFqSm7w8VFfPu8k0="; 34 + sha256 = "/1D2BbT1gnMLvIHfpkxLkeo1pjbG9LkTx9Zl5+gGU/M="; 35 35 }; 36 36 37 37 buildInputs = [
+1 -1
pkgs/development/libraries/libmongocrypt/default.nix
··· 34 34 mongoc 35 35 openssl 36 36 ] ++ lib.optionals stdenv.isDarwin [ 37 - darwin.apple_sdk.frameworks.Security 37 + darwin.apple_sdk_11_0.frameworks.Security 38 38 ]; 39 39 40 40 cmakeFlags = [
+17
pkgs/development/php-packages/rrd/default.nix
··· 1 + { buildPecl, lib, pkg-config, rrdtool }: 2 + 3 + buildPecl { 4 + pname = "rrd"; 5 + 6 + version = "2.0.3"; 7 + hash = "sha256-pCFh5YzcioU7cs/ymJidy96CsPdkVt1ZzgKFTJK3MPc="; 8 + 9 + nativeBuildInputs = [ pkg-config rrdtool ]; 10 + 11 + meta = { 12 + description = "PHP bindings to RRD tool system"; 13 + license = lib.licenses.bsd0; 14 + homepage = "https://github.com/php/pecl-processing-rrd"; 15 + maintainers = lib.teams.wdz.members; 16 + }; 17 + }
+2 -2
pkgs/development/python-modules/aiocomelit/default.nix
··· 9 9 10 10 buildPythonPackage rec { 11 11 pname = "aiocomelit"; 12 - version = "0.0.6"; 12 + version = "0.0.8"; 13 13 format = "pyproject"; 14 14 15 15 disabled = pythonOlder "3.10"; ··· 18 18 owner = "chemelli74"; 19 19 repo = "aiocomelit"; 20 20 rev = "refs/tags/v${version}"; 21 - hash = "sha256-u6CyqDFLgnIVak0UqN4JmL8ll/li3k9EhFs7iC5oZ9U="; 21 + hash = "sha256-lPwkTWkzXe5c5+KJkLHr7/cydtnDOFGniNNeOk2UXdA="; 22 22 }; 23 23 24 24 postPatch = ''
+2 -2
pkgs/development/python-modules/aioesphomeapi/default.nix
··· 14 14 15 15 buildPythonPackage rec { 16 16 pname = "aioesphomeapi"; 17 - version = "16.0.5"; 17 + version = "16.0.6"; 18 18 format = "setuptools"; 19 19 20 20 disabled = pythonOlder "3.9"; ··· 23 23 owner = "esphome"; 24 24 repo = pname; 25 25 rev = "refs/tags/v${version}"; 26 - hash = "sha256-SueK59CZTKkQPsHThs7k9eCEmc1GwaRIrw3oSK4E80E="; 26 + hash = "sha256-BcFNxm4JpHaqKEhUTCXIrF18OMFxLbQHCQ9jfs+U0hc="; 27 27 }; 28 28 29 29 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/bellows/default.nix
··· 15 15 16 16 buildPythonPackage rec { 17 17 pname = "bellows"; 18 - version = "0.36.3"; 18 + version = "0.36.4"; 19 19 format = "setuptools"; 20 20 21 21 disabled = pythonOlder "3.8"; ··· 24 24 owner = "zigpy"; 25 25 repo = "bellows"; 26 26 rev = "refs/tags/${version}"; 27 - hash = "sha256-5s2I24gvHRXHm7ZTNZxc6ge9Kbe6UObcY29SvbIUWJg="; 27 + hash = "sha256-iouGT3ZqCFW34ududrtCHL/NmKgB9SznLA8p313B12Y="; 28 28 }; 29 29 30 30 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/gspread/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "gspread"; 15 - version = "5.11.1"; 15 + version = "5.11.2"; 16 16 format = "pyproject"; 17 17 18 18 disabled = pythonOlder "3.7"; ··· 21 21 owner = "burnash"; 22 22 repo = "gspread"; 23 23 rev = "refs/tags/v${version}"; 24 - hash = "sha256-a8A47il9NrMdHkSX4YmQj4VIAYDXK5V+FUdwv+LGIfQ="; 24 + hash = "sha256-geP01U34HzBSmA8FTTaTMlv508hzGBXFiASjGw3uUmQ="; 25 25 }; 26 26 27 27 nativeBuildInputs = [
+7 -2
pkgs/development/python-modules/python-roborock/default.nix
··· 20 20 21 21 buildPythonPackage rec { 22 22 pname = "python-roborock"; 23 - version = "0.33.2"; 23 + version = "0.34.0"; 24 24 format = "pyproject"; 25 25 26 26 disabled = pythonOlder "3.10"; ··· 29 29 owner = "humbertogontijo"; 30 30 repo = "python-roborock"; 31 31 rev = "refs/tags/v${version}"; 32 - hash = "sha256-UAQlKfh6oljeWtEGYx7JiT1z9yFCAXRSlI4Ot6JUnoQ="; 32 + hash = "sha256-WLnMc2UQyjHaHRms6SEdF/TSum3Cf5NC3SGXHtGj6d0="; 33 33 }; 34 + 35 + postPatch = '' 36 + substituteInPlace pyproject.toml \ 37 + --replace "poetry-core==1.6.1" "poetry-core" 38 + ''; 34 39 35 40 pythonRelaxDeps = [ 36 41 "pycryptodome"
+2 -2
pkgs/development/python-modules/softlayer/default.nix
··· 21 21 22 22 buildPythonPackage rec { 23 23 pname = "softlayer"; 24 - version = "6.1.8"; 24 + version = "6.1.9"; 25 25 format = "setuptools"; 26 26 27 27 disabled = pythonOlder "3.7"; ··· 30 30 owner = pname; 31 31 repo = "softlayer-python"; 32 32 rev = "refs/tags/v${version}"; 33 - hash = "sha256-6LZ2vy6nkyWA7xbUl4aNi2ygRWDJTj7J9Af0GTvNLd4="; 33 + hash = "sha256-mYezVJSBtZuNT6mG544dJhRFh26M4nN4nE3tUVB3cZQ="; 34 34 }; 35 35 36 36 postPatch = ''
+2 -2
pkgs/development/python-modules/universal-silabs-flasher/default.nix
··· 27 27 28 28 buildPythonPackage rec { 29 29 pname = "universal-silabs-flasher"; 30 - version = "0.0.13"; 30 + version = "0.0.14"; 31 31 format = "pyproject"; 32 32 33 33 src = fetchFromGitHub { 34 34 owner = "NabuCasa"; 35 35 repo = "universal-silabs-flasher"; 36 36 rev = "v${version}"; 37 - hash = "sha256-qiaDPCnVb6JQ2fZRFK+QF4o8K2UbIWGNKl5oo6MQUW0="; 37 + hash = "sha256-0c9b571gJXFOAe5ct8O/qy7D6rDosmBHDYEv6odLQ2s="; 38 38 }; 39 39 40 40 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/uproot/default.nix
··· 18 18 19 19 buildPythonPackage rec { 20 20 pname = "uproot"; 21 - version = "5.0.11"; 21 + version = "5.0.12"; 22 22 format = "pyproject"; 23 23 24 24 disabled = pythonOlder "3.7"; ··· 27 27 owner = "scikit-hep"; 28 28 repo = "uproot5"; 29 29 rev = "refs/tags/v${version}"; 30 - hash = "sha256-qp1iffElJSAwqaycelnILBzeW8kG7Yy0R1bjMumW8UU="; 30 + hash = "sha256-5RJPRrnPRRj1KXeyCqrGwaurXPx0aT6gso1o7gQ1aNs="; 31 31 }; 32 32 33 33 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/zigpy/default.nix
··· 19 19 20 20 buildPythonPackage rec { 21 21 pname = "zigpy"; 22 - version = "0.57.1"; 22 + version = "0.57.2"; 23 23 format = "pyproject"; 24 24 25 25 disabled = pythonOlder "3.8"; ··· 28 28 owner = "zigpy"; 29 29 repo = "zigpy"; 30 30 rev = "refs/tags/${version}"; 31 - hash = "sha256-aVrLiWPjc4xn2GvKmZCrRJGGbxP545PKqAH9rPq8IPo="; 31 + hash = "sha256-v4H8syWbXqmfvOznRECgSjYi246+socPJTffb79MXK4="; 32 32 }; 33 33 34 34 postPatch = ''
+2 -2
pkgs/development/python-modules/zwave-js-server-python/default.nix
··· 10 10 11 11 buildPythonPackage rec { 12 12 pname = "zwave-js-server-python"; 13 - version = "0.51.2"; 13 + version = "0.51.3"; 14 14 format = "setuptools"; 15 15 16 16 disabled = pythonOlder "3.11"; ··· 19 19 owner = "home-assistant-libs"; 20 20 repo = pname; 21 21 rev = "refs/tags/${version}"; 22 - hash = "sha256-SRBH7HdsgS60Z8y6ef5/VCunzMGBEWw0u1jR7wSByNc="; 22 + hash = "sha256-79INvk5WLuSki/kBU25hMHRxGk7FAznU89U+y3Eh+wI="; 23 23 }; 24 24 25 25 propagatedBuildInputs = [
+2 -2
pkgs/development/tools/gi-crystal/default.nix
··· 5 5 }: 6 6 crystal.buildCrystalPackage rec { 7 7 pname = "gi-crystal"; 8 - version = "0.17.0"; 8 + version = "0.18.0"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "hugopl"; 12 12 repo = "gi-crystal"; 13 13 rev = "v${version}"; 14 - hash = "sha256-DIH8L8P8lkWzzVUj1Tbf9oTUvu9X7OT66APyUHiDkYk="; 14 + hash = "sha256-9px6JRdVzsUoU5wlO+blH1OBGKskozF3WvqLV/EYiiA="; 15 15 }; 16 16 17 17 # Make sure gi-crystal picks up the name of the so or dylib and not the leading nix store path
+1 -1
pkgs/servers/home-assistant/component-packages.nix
··· 2 2 # Do not edit! 3 3 4 4 { 5 - version = "2023.9.2"; 5 + version = "2023.9.3"; 6 6 components = { 7 7 "3_day_blinds" = ps: with ps; [ 8 8 ];
+3 -3
pkgs/servers/home-assistant/default.nix
··· 316 316 extraBuildInputs = extraPackages python.pkgs; 317 317 318 318 # Don't forget to run parse-requirements.py after updating 319 - hassVersion = "2023.9.2"; 319 + hassVersion = "2023.9.3"; 320 320 321 321 in python.pkgs.buildPythonApplication rec { 322 322 pname = "homeassistant"; ··· 332 332 # Primary source is the pypi sdist, because it contains translations 333 333 src = fetchPypi { 334 334 inherit pname version; 335 - hash = "sha256-pVW9NQYEf2pmGCp342lCzEiWfAyFCiWeRMVbhPd8wxQ="; 335 + hash = "sha256-tcIGYJ+r2+0jnf3xUxnFdwnLiOK9P0Y6sw0Mpd/YIT0="; 336 336 }; 337 337 338 338 # Secondary source is git for tests ··· 340 340 owner = "home-assistant"; 341 341 repo = "core"; 342 342 rev = "refs/tags/${version}"; 343 - hash = "sha256-4sZBrGd5gz4W7c7Ok5Bj/47MaXAqAFC4qufcidbU5zA="; 343 + hash = "sha256-zAUMevj2xvRkhZg4wuHDz0+X//cEU/D/HmokmX9oeCU="; 344 344 }; 345 345 346 346 nativeBuildInputs = with python.pkgs; [
+2 -2
pkgs/servers/home-assistant/intents.nix
··· 20 20 21 21 buildPythonPackage rec { 22 22 pname = "home-assistant-intents"; 23 - version = "2023.8.2"; 23 + version = "2023.9.22"; 24 24 format = "pyproject"; 25 25 26 26 disabled = pythonOlder "3.9"; ··· 29 29 owner = "home-assistant"; 30 30 repo = "intents-package"; 31 31 rev = "refs/tags/${version}"; 32 - hash = "sha256-pNLH3GGfY8upKi7uYGZ466cIQkpdA16tR1tjwuiQ3JI="; 32 + hash = "sha256-n0IIWS5edh4XD/W9Eo88pal2+zJQtrHg74FSGvPIlPg="; 33 33 fetchSubmodules = true; 34 34 }; 35 35
+2 -2
pkgs/servers/home-assistant/stubs.nix
··· 8 8 9 9 buildPythonPackage rec { 10 10 pname = "homeassistant-stubs"; 11 - version = "2023.9.2"; 11 + version = "2023.9.3"; 12 12 format = "pyproject"; 13 13 14 14 disabled = python.version != home-assistant.python.version; ··· 17 17 owner = "KapJI"; 18 18 repo = "homeassistant-stubs"; 19 19 rev = "refs/tags/${version}"; 20 - hash = "sha256-cKBf7S6ZvLlRp0L23mDu1CvG7d1d34LaIev60JPD0TE="; 20 + hash = "sha256-dZOpfSfq47sGJJB6CvcBDlSLBG8EVAX8RMuNzbP7bTs="; 21 21 }; 22 22 23 23 nativeBuildInputs = [
+2 -2
pkgs/tools/misc/tlp/default.nix
··· 24 24 , networkmanager 25 25 }: stdenv.mkDerivation rec { 26 26 pname = "tlp"; 27 - version = "1.6.0"; 27 + version = "1.6.1"; 28 28 29 29 src = fetchFromGitHub { 30 30 owner = "linrunner"; 31 31 repo = "TLP"; 32 32 rev = version; 33 - hash = "sha256-XAyko2MxFyo5RyioaexhoFAR3E+I3t/8vD2K3WYNmsI="; 33 + hash = "sha256-CxO1KU7F6sT5D8vjKOmntjDxcieoRSHTvuSqXfplcHk="; 34 34 }; 35 35 36 36 # XXX: See patch files for relevant explanations.
+1
pkgs/tools/wayland/wayland-proxy-virtwl/default.nix
··· 42 42 homepage = "https://github.com/talex5/wayland-virtwl-proxy"; 43 43 description = "Proxy Wayland connections across a VM boundary"; 44 44 license = licenses.asl20; 45 + mainProgram = "wayland-proxy-virtwl"; 45 46 maintainers = [ maintainers.qyliss maintainers.sternenseemann ]; 46 47 platforms = platforms.linux; 47 48 };
+3 -5
pkgs/top-level/all-packages.nix
··· 10479 10479 10480 10480 libmbim = callPackage ../development/libraries/libmbim { }; 10481 10481 10482 - libmongocrypt = callPackage ../development/libraries/libmongocrypt { }; 10482 + libmongocrypt = darwin.apple_sdk_11_0.callPackage ../development/libraries/libmongocrypt { }; 10483 10483 10484 10484 libmesode = callPackage ../development/libraries/libmesode { }; 10485 10485 ··· 32116 32116 firefox-beta-bin = res.wrapFirefox firefox-beta-bin-unwrapped { 32117 32117 pname = "firefox-beta-bin"; 32118 32118 desktopName = "Firefox Beta"; 32119 - wmClass = "firefox-beta"; 32120 32119 }; 32121 32120 32122 32121 firefox-devedition-bin-unwrapped = callPackage ../applications/networking/browsers/firefox-bin { 32123 32122 inherit (gnome) adwaita-icon-theme; 32124 - channel = "devedition"; 32123 + channel = "developer-edition"; 32125 32124 generated = import ../applications/networking/browsers/firefox-bin/devedition_sources.nix; 32126 32125 }; 32127 32126 32128 32127 firefox-devedition-bin = res.wrapFirefox firefox-devedition-bin-unwrapped { 32129 - nameSuffix = "-devedition"; 32130 32128 pname = "firefox-devedition-bin"; 32131 32129 desktopName = "Firefox DevEdition"; 32132 - wmClass = "firefox-devedition"; 32130 + wmClass = "firefox-aurora"; 32133 32131 }; 32134 32132 32135 32133 librewolf-unwrapped = callPackage ../applications/networking/browsers/librewolf { };
+2
pkgs/top-level/php-packages.nix
··· 312 312 313 313 relay = callPackage ../development/php-packages/relay { inherit php; }; 314 314 315 + rrd = callPackage ../development/php-packages/rrd { }; 316 + 315 317 smbclient = callPackage ../development/php-packages/smbclient { }; 316 318 317 319 snuffleupagus = callPackage ../development/php-packages/snuffleupagus {