Merge master into staging-next

authored by github-actions[bot] and committed by GitHub fc1f757b 3e52e592

+243 -294
+5 -39
doc/stdenv/multiple-output.chapter.md
··· 1 # Multiple-output packages {#chap-multiple-output} 2 3 - ## Introduction {#sec-multiple-outputs-introduction} 4 - 5 The Nix language allows a derivation to produce multiple outputs, which is similar to what is utilized by other Linux distribution packaging systems. The outputs reside in separate Nix store paths, so they can be mostly handled independently of each other, including passing to build inputs, garbage collection or binary substitution. The exception is that building from source always produces all the outputs. 6 7 The main motivation is to save disk space by reducing runtime closure sizes; consequently also sizes of substituted binaries get reduced. Splitting can be used to have more granular runtime dependencies, for example the typical reduction is to split away development-only files, as those are typically not needed during runtime. As a result, closure sizes of many packages can get reduced to a half or even much less. ··· 10 The reduction effects could be instead achieved by building the parts in completely separate derivations. That would often additionally reduce build-time closures, but it tends to be much harder to write such derivations, as build systems typically assume all parts are being built at once. This compromise approach of single source package producing multiple binary packages is also utilized often by rpm and deb. 11 ::: 12 13 - A number of attributes can be used to work with a derivation with multiple outputs. The attribute `outputs` is a list of strings, which are the names of the outputs. For each of these names, an identically named attribute is created, corresponding to that output. The attribute `meta.outputsToInstall` is used to determine the default set of outputs to install when using the derivation name unqualified. 14 - 15 - ## Installing a split package {#sec-multiple-outputs-installing} 16 - 17 - When installing a package with multiple outputs, the package’s `meta.outputsToInstall` attribute determines which outputs are actually installed. `meta.outputsToInstall` is a list whose [default installs binaries and the associated man pages](https://github.com/NixOS/nixpkgs/blob/f1680774340d5443a1409c3421ced84ac1163ba9/pkgs/stdenv/generic/make-derivation.nix#L310-L320). The following sections describe ways to install different outputs. 18 - 19 - ### Selecting outputs to install via NixOS {#sec-multiple-outputs-installing-nixos} 20 - 21 - NixOS provides two ways to select the outputs to install for packages listed in `environment.systemPackages`: 22 - 23 - - The configuration option `environment.extraOutputsToInstall` is appended to each package’s `meta.outputsToInstall` attribute to determine the outputs to install. It can for example be used to install `info` documentation or debug symbols for all packages. 24 - 25 - - The outputs can be listed as packages in `environment.systemPackages`. For example, the `"out"` and `"info"` outputs for the `coreutils` package can be installed by including `coreutils` and `coreutils.info` in `environment.systemPackages`. 26 - 27 - ### Selecting outputs to install via `nix-env` {#sec-multiple-outputs-installing-nix-env} 28 - 29 - `nix-env` lacks an easy way to select the outputs to install. When installing a package, `nix-env` always installs the outputs listed in `meta.outputsToInstall`, even when the user explicitly selects an output. 30 - 31 - ::: {.warning} 32 - `nix-env` silently disregards the outputs selected by the user, and instead installs the outputs from `meta.outputsToInstall`. For example, 33 - 34 - ```ShellSession 35 - $ nix-env -iA nixpkgs.coreutils.info 36 - ``` 37 - 38 - installs the `"out"` output (`coreutils.meta.outputsToInstall` is `[ "out" ]`) instead of the requested `"info"`. 39 - ::: 40 - 41 - The only recourse to select an output with `nix-env` is to override the package’s `meta.outputsToInstall`, using the functions described in [](#chap-overrides). For example, the following overlay adds the `"info"` output for the `coreutils` package: 42 43 - ```nix 44 - self: super: 45 - { 46 - coreutils = super.coreutils.overrideAttrs (oldAttrs: { 47 - meta = oldAttrs.meta // { outputsToInstall = oldAttrs.meta.outputsToInstall or [ "out" ] ++ [ "info" ]; }; 48 - }); 49 - } 50 - ``` 51 52 ## Using a split package {#sec-multiple-outputs-using-split-packages} 53
··· 1 # Multiple-output packages {#chap-multiple-output} 2 3 The Nix language allows a derivation to produce multiple outputs, which is similar to what is utilized by other Linux distribution packaging systems. The outputs reside in separate Nix store paths, so they can be mostly handled independently of each other, including passing to build inputs, garbage collection or binary substitution. The exception is that building from source always produces all the outputs. 4 5 The main motivation is to save disk space by reducing runtime closure sizes; consequently also sizes of substituted binaries get reduced. Splitting can be used to have more granular runtime dependencies, for example the typical reduction is to split away development-only files, as those are typically not needed during runtime. As a result, closure sizes of many packages can get reduced to a half or even much less. ··· 8 The reduction effects could be instead achieved by building the parts in completely separate derivations. That would often additionally reduce build-time closures, but it tends to be much harder to write such derivations, as build systems typically assume all parts are being built at once. This compromise approach of single source package producing multiple binary packages is also utilized often by rpm and deb. 9 ::: 10 11 + A number of attributes can be used to work with a derivation with multiple outputs. 12 + The attribute `outputs` is a list of strings, which are the names of the outputs. 13 + For each of these names, an identically named attribute is created, corresponding to that output. 14 15 + The attribute `meta.outputsToInstall` is used to determine the [default set of outputs to install](https://github.com/NixOS/nixpkgs/blob/08c3198f1c6fd89a09f8f0ea09b425028a34de3e/pkgs/stdenv/generic/check-meta.nix#L411-L426) when using the derivation name unqualified: 16 + `bin`, or `out`, or the first specified output; as well as `man` if that is specified. 17 18 ## Using a split package {#sec-multiple-outputs-using-split-packages} 19
+9
maintainers/maintainer-list.nix
··· 2336 github = "blaggacao"; 2337 githubId = 7548295; 2338 }; 2339 blanky0230 = { 2340 email = "blanky0230@gmail.com"; 2341 github = "blanky0230";
··· 2336 github = "blaggacao"; 2337 githubId = 7548295; 2338 }; 2339 + blankparticle = { 2340 + name = "BlankParticle"; 2341 + email = "blankparticle@gmail.com"; 2342 + github = "BlankParticle"; 2343 + githubId = 130567419; 2344 + keys = [{ 2345 + fingerprint = "1757 64C3 7065 AA8D 614D 41C9 0ACE 126D 7B35 9261"; 2346 + }]; 2347 + }; 2348 blanky0230 = { 2349 email = "blanky0230@gmail.com"; 2350 github = "blanky0230";
+2 -2
nixos/doc/manual/release-notes/rl-2311.section.md
··· 132 133 - `himalaya` has been updated to `0.8.0`, which drops the native TLS support (in favor of Rustls) and add OAuth 2.0 support. See the [release note](https://github.com/soywod/himalaya/releases/tag/v0.8.0) for more details. 134 135 - The [services.caddy.acmeCA](#opt-services.caddy.acmeCA) option now defaults to `null` instead of `"https://acme-v02.api.letsencrypt.org/directory"`, to use all of Caddy's default ACME CAs and enable Caddy's automatic issuer fallback feature by default, as recommended by upstream. 136 137 - The default priorities of [`services.nextcloud.phpOptions`](#opt-services.nextcloud.phpOptions) have changed. This means that e.g. ··· 276 - `services.matrix-synapse` has new options to configure worker processes for matrix-synapse using [`services.matrix-synapse.workers`](#opt-services.matrix-synapse.workers). It's also now possible to configure a local redis server using [`services.matrix-synapse.configureRedisLocally`](#opt-services.matrix-synapse.configureRedisLocally). 277 278 - `services.nginx` gained a `defaultListen` option at server-level with support for PROXY protocol listeners, also `proxyProtocol` is now exposed in `services.nginx.virtualHosts.<name>.listen` option. It is now possible to run PROXY listeners and non-PROXY listeners at a server-level, see [#213510](https://github.com/NixOS/nixpkgs/pull/213510/) for more details. 279 - 280 - - `generic-extlinux-compatible` bootloader (and raspberry pi with uboot) supports appending secrets to the initramfs 281 282 - `services.restic.backups` now adds wrapper scripts to your system path, which set the same environment variables as the service, so restic operations can easly be run from the command line. This behavior can be disabled by setting `createWrapper` to `false`, per backup configuration. 283
··· 132 133 - `himalaya` has been updated to `0.8.0`, which drops the native TLS support (in favor of Rustls) and add OAuth 2.0 support. See the [release note](https://github.com/soywod/himalaya/releases/tag/v0.8.0) for more details. 134 135 + - `nix-prefetch-git` now ignores global and user git config, to improve reproducibility. 136 + 137 - The [services.caddy.acmeCA](#opt-services.caddy.acmeCA) option now defaults to `null` instead of `"https://acme-v02.api.letsencrypt.org/directory"`, to use all of Caddy's default ACME CAs and enable Caddy's automatic issuer fallback feature by default, as recommended by upstream. 138 139 - The default priorities of [`services.nextcloud.phpOptions`](#opt-services.nextcloud.phpOptions) have changed. This means that e.g. ··· 278 - `services.matrix-synapse` has new options to configure worker processes for matrix-synapse using [`services.matrix-synapse.workers`](#opt-services.matrix-synapse.workers). It's also now possible to configure a local redis server using [`services.matrix-synapse.configureRedisLocally`](#opt-services.matrix-synapse.configureRedisLocally). 279 280 - `services.nginx` gained a `defaultListen` option at server-level with support for PROXY protocol listeners, also `proxyProtocol` is now exposed in `services.nginx.virtualHosts.<name>.listen` option. It is now possible to run PROXY listeners and non-PROXY listeners at a server-level, see [#213510](https://github.com/NixOS/nixpkgs/pull/213510/) for more details. 281 282 - `services.restic.backups` now adds wrapper scripts to your system path, which set the same environment variables as the service, so restic operations can easly be run from the command line. This behavior can be disabled by setting `createWrapper` to `false`, per backup configuration. 283
+8 -2
nixos/modules/config/system-path.nix
··· 116 extraOutputsToInstall = mkOption { 117 type = types.listOf types.str; 118 default = [ ]; 119 - example = [ "doc" "info" "devdoc" ]; 120 - description = lib.mdDoc "List of additional package outputs to be symlinked into {file}`/run/current-system/sw`."; 121 }; 122 123 extraSetup = mkOption {
··· 116 extraOutputsToInstall = mkOption { 117 type = types.listOf types.str; 118 default = [ ]; 119 + example = [ "dev" "info" ]; 120 + description = lib.mdDoc '' 121 + Entries listed here will be appended to the `meta.outputsToInstall` attribute for each package in `environment.systemPackages`, and the files from the corresponding derivation outputs symlinked into {file}`/run/current-system/sw`. 122 + 123 + For example, this can be used to install the `dev` and `info` outputs for all packages in the system environment, if they are available. 124 + 125 + To use specific outputs instead of configuring them globally, select the corresponding attribute on the package derivation, e.g. `libxml2.dev` or `coreutils.info`. 126 + ''; 127 }; 128 129 extraSetup = mkOption {
+3 -25
nixos/modules/system/boot/loader/generic-extlinux-compatible/extlinux-conf-builder.sh
··· 70 addEntry() { 71 local path=$(readlink -f "$1") 72 local tag="$2" # Generation number or 'default' 73 - local current="$3" # whether this is the current/latest generation 74 75 if ! test -e $path/kernel -a -e $path/initrd; then 76 return 77 fi 78 79 - if test -e "$path/append-initrd-secrets"; then 80 - local initrd="$target/nixos/$(basename "$path")-initramfs-with-secrets" 81 - cp $(readlink -f "$path/initrd") "$initrd" 82 - chmod 600 "${initrd}" 83 - chown 0:0 "${initrd}" 84 - filesCopied[$initrd]=1 85 - 86 - "$path/append-initrd-secrets" "$initrd" || if test "${current}" = "1"; then 87 - echo "failed to create initrd secrets for the current generation." >&2 88 - echo "are your \`boot.initrd.secrets\` still in place?" >&2 89 - exit 1 90 - else 91 - echo "warning: failed to create initrd secrets for \"$path\", an older generation" >&2 92 - echo "note: this is normal after having removed or renamed a file in \`boot.initrd.secrets\`" >&2 93 - fi 94 - else 95 - copyToKernelsDir "$path/initrd"; initrd=$result 96 - fi 97 - 98 copyToKernelsDir "$path/kernel"; kernel=$result 99 - 100 dtbDir=$(readlink -m "$path/dtbs") 101 if [ -e "$dtbDir" ]; then 102 copyToKernelsDir "$dtbDir"; dtbs=$result ··· 150 TIMEOUT $timeout 151 EOF 152 153 - addEntry $default default 1 >> $tmpFile 154 155 if [ "$numGenerations" -gt 0 ]; then 156 # Add up to $numGenerations generations of the system profile to the menu, 157 # in reverse (most recent to least recent) order. 158 - current=1 159 for generation in $( 160 (cd /nix/var/nix/profiles && ls -d system-*-link) \ 161 | sed 's/system-\([0-9]\+\)-link/\1/' \ 162 | sort -n -r \ 163 | head -n $numGenerations); do 164 link=/nix/var/nix/profiles/system-$generation-link 165 - addEntry $link $generation $current 166 - current=0 167 done >> $tmpFile 168 fi 169
··· 70 addEntry() { 71 local path=$(readlink -f "$1") 72 local tag="$2" # Generation number or 'default' 73 74 if ! test -e $path/kernel -a -e $path/initrd; then 75 return 76 fi 77 78 copyToKernelsDir "$path/kernel"; kernel=$result 79 + copyToKernelsDir "$path/initrd"; initrd=$result 80 dtbDir=$(readlink -m "$path/dtbs") 81 if [ -e "$dtbDir" ]; then 82 copyToKernelsDir "$dtbDir"; dtbs=$result ··· 130 TIMEOUT $timeout 131 EOF 132 133 + addEntry $default default >> $tmpFile 134 135 if [ "$numGenerations" -gt 0 ]; then 136 # Add up to $numGenerations generations of the system profile to the menu, 137 # in reverse (most recent to least recent) order. 138 for generation in $( 139 (cd /nix/var/nix/profiles && ls -d system-*-link) \ 140 | sed 's/system-\([0-9]\+\)-link/\1/' \ 141 | sort -n -r \ 142 | head -n $numGenerations); do 143 link=/nix/var/nix/profiles/system-$generation-link 144 + addEntry $link $generation 145 done >> $tmpFile 146 fi 147
-1
nixos/modules/system/boot/loader/raspberrypi/raspberrypi.nix
··· 142 assertion = !pkgs.stdenv.hostPlatform.isAarch64 || cfg.version >= 3; 143 message = "Only Raspberry Pi >= 3 supports aarch64."; 144 }; 145 - boot.loader.supportsInitrdSecrets = cfg.uboot.enable; 146 147 system.build.installBootLoader = builder; 148 system.boot.loader.id = "raspberrypi";
··· 142 assertion = !pkgs.stdenv.hostPlatform.isAarch64 || cfg.version >= 3; 143 message = "Only Raspberry Pi >= 3 supports aarch64."; 144 }; 145 146 system.build.installBootLoader = builder; 147 system.boot.loader.id = "raspberrypi";
-7
nixos/modules/system/boot/stage-1.nix
··· 610 path the secret should have inside the initrd, the value 611 is the path it should be copied from (or null for the same 612 path inside and out). 613 - 614 - The loader `generic-extlinux-compatible` supports this. Because 615 - it is not well know how different implementations react to 616 - concatenated cpio archives, this is disabled by default. It can be 617 - enabled by setting {option}`boot.loader.supportsInitrdSecrets` 618 - to true. If this works for you, please report your findings at 619 - https://github.com/NixOS/nixpkgs/issues/247145 . 620 ''; 621 example = literalExpression 622 ''
··· 610 path the secret should have inside the initrd, the value 611 is the path it should be copied from (or null for the same 612 path inside and out). 613 ''; 614 example = literalExpression 615 ''
+1
pkgs/applications/editors/mg/default.nix
··· 31 description = "Micro GNU/emacs, a portable version of the mg maintained by the OpenBSD team"; 32 homepage = "https://man.openbsd.org/OpenBSD-current/man1/mg.1"; 33 license = licenses.publicDomain; 34 platforms = platforms.all; 35 }; 36 }
··· 31 description = "Micro GNU/emacs, a portable version of the mg maintained by the OpenBSD team"; 32 homepage = "https://man.openbsd.org/OpenBSD-current/man1/mg.1"; 33 license = licenses.publicDomain; 34 + mainProgram = "mg"; 35 platforms = platforms.all; 36 }; 37 }
+1 -1
pkgs/applications/kde/default.nix
··· 120 kdebugsettings = callPackage ./kdebugsettings.nix {}; 121 kdeconnect-kde = callPackage ./kdeconnect-kde.nix {}; 122 kdegraphics-mobipocket = callPackage ./kdegraphics-mobipocket.nix {}; 123 - kdegraphics-thumbnailers = callPackage ./kdegraphics-thumbnailers.nix {}; 124 kdenetwork-filesharing = callPackage ./kdenetwork-filesharing.nix {}; 125 kdenlive = callPackage ./kdenlive {}; 126 kdepim-addons = callPackage ./kdepim-addons.nix {};
··· 120 kdebugsettings = callPackage ./kdebugsettings.nix {}; 121 kdeconnect-kde = callPackage ./kdeconnect-kde.nix {}; 122 kdegraphics-mobipocket = callPackage ./kdegraphics-mobipocket.nix {}; 123 + kdegraphics-thumbnailers = callPackage ./kdegraphics-thumbnailers {}; 124 kdenetwork-filesharing = callPackage ./kdenetwork-filesharing.nix {}; 125 kdenlive = callPackage ./kdenlive {}; 126 kdepim-addons = callPackage ./kdepim-addons.nix {};
-14
pkgs/applications/kde/kdegraphics-thumbnailers.nix
··· 1 - { 2 - mkDerivation, lib, fetchpatch, 3 - extra-cmake-modules, karchive, kio, libkexiv2, libkdcraw, kdegraphics-mobipocket 4 - }: 5 - 6 - mkDerivation { 7 - pname = "kdegraphics-thumbnailers"; 8 - meta = { 9 - license = [ lib.licenses.lgpl21 ]; 10 - maintainers = [ lib.maintainers.ttuegel ]; 11 - }; 12 - nativeBuildInputs = [ extra-cmake-modules ]; 13 - buildInputs = [ karchive kio libkexiv2 libkdcraw kdegraphics-mobipocket ]; 14 - }
···
+23
pkgs/applications/kde/kdegraphics-thumbnailers/default.nix
···
··· 1 + { 2 + mkDerivation, lib, ghostscript, substituteAll, 3 + extra-cmake-modules, karchive, kio, libkexiv2, libkdcraw, kdegraphics-mobipocket 4 + }: 5 + 6 + mkDerivation { 7 + pname = "kdegraphics-thumbnailers"; 8 + meta = { 9 + license = [ lib.licenses.lgpl21 ]; 10 + maintainers = [ lib.maintainers.ttuegel ]; 11 + }; 12 + nativeBuildInputs = [ extra-cmake-modules ]; 13 + buildInputs = [ karchive kio libkexiv2 libkdcraw kdegraphics-mobipocket ]; 14 + 15 + patches = [ 16 + # Hardcode patches to Ghostscript so PDF thumbnails work OOTB. 17 + # Intentionally not doing the same for dvips because TeX is big. 18 + (substituteAll { 19 + gs = "${ghostscript}/bin/gs"; 20 + src = ./gs-paths.patch; 21 + }) 22 + ]; 23 + }
+22
pkgs/applications/kde/kdegraphics-thumbnailers/gs-paths.patch
···
··· 1 + diff --git a/ps/gscreator.cpp b/ps/gscreator.cpp 2 + index 5b84e49..cbb7c25 100644 3 + --- a/ps/gscreator.cpp 4 + +++ b/ps/gscreator.cpp 5 + @@ -101,7 +101,7 @@ static const char *epsprolog = 6 + "[ ] 0 setdash newpath false setoverprint false setstrokeadjust\n"; 7 + 8 + static const char * gsargs_ps[] = { 9 + - "gs", 10 + + "@gs@", 11 + "-sDEVICE=png16m", 12 + "-sOutputFile=-", 13 + "-dSAFER", 14 + @@ -120,7 +120,7 @@ static const char * gsargs_ps[] = { 15 + }; 16 + 17 + static const char * gsargs_eps[] = { 18 + - "gs", 19 + + "@gs@", 20 + "-sDEVICE=png16m", 21 + "-sOutputFile=-", 22 + "-dSAFER",
+3 -3
pkgs/applications/misc/keepassxc/default.nix
··· 40 41 stdenv.mkDerivation rec { 42 pname = "keepassxc"; 43 - version = "2.7.5"; 44 45 src = fetchFromGitHub { 46 owner = "keepassxreboot"; 47 repo = "keepassxc"; 48 rev = version; 49 - sha256 = "sha256-OBEjczUIkY3pQXJfsuNj9Bm2TIbVWEHqMSolQnSfvLE="; 50 }; 51 52 env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.cc.isClang (toString [ ··· 129 ''; 130 homepage = "https://keepassxc.org/"; 131 license = licenses.gpl2Plus; 132 - maintainers = with maintainers; [ jonafato srapenne ]; 133 platforms = platforms.linux ++ platforms.darwin; 134 }; 135 }
··· 40 41 stdenv.mkDerivation rec { 42 pname = "keepassxc"; 43 + version = "2.7.6"; 44 45 src = fetchFromGitHub { 46 owner = "keepassxreboot"; 47 repo = "keepassxc"; 48 rev = version; 49 + hash = "sha256-xgrkMz7BCBxjfxHsAz/CFLv1d175LnrAJIOZMM3GmU0="; 50 }; 51 52 env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.cc.isClang (toString [ ··· 129 ''; 130 homepage = "https://keepassxc.org/"; 131 license = licenses.gpl2Plus; 132 + maintainers = with maintainers; [ jonafato srapenne blankparticle ]; 133 platforms = platforms.linux ++ platforms.darwin; 134 }; 135 }
+12 -12
pkgs/applications/networking/browsers/chromium/upstream-info.nix
··· 27 }; 28 stable = { 29 chromedriver = { 30 - sha256_darwin = "0phhcqid7wjw923qdi65zql3fid25swwszksgnw3b8fgz67jn955"; 31 sha256_darwin_aarch64 = 32 - "00fwq8slvjm6c7krgwjd4mxhkkrp23n4icb63qlvi2hy06gfj4l6"; 33 - sha256_linux = "0ws8ch1j2hzp483vr0acvam1zxmzg9d37x6gqdwiqwgrk6x5pvkh"; 34 - version = "117.0.5938.88"; 35 }; 36 deps = { 37 gn = { ··· 41 version = "2023-08-01"; 42 }; 43 }; 44 - sha256 = "01n9aqnilsjrbpv5kkx3c6nxs9p5l5lfwxj67hd5s5g4740di4a6"; 45 - sha256bin64 = "1dhgagphdzbd19gkc7vpl1hxc9vn0l7sxny346qjlmrwafqlhbgi"; 46 - version = "117.0.5938.88"; 47 }; 48 ungoogled-chromium = { 49 deps = { ··· 54 version = "2023-08-01"; 55 }; 56 ungoogled-patches = { 57 - rev = "117.0.5938.88-1"; 58 - sha256 = "1wz15ib56j8c84bgrbf0djk5wli49b1lvaqbg18pdclkp1mqy5w9"; 59 }; 60 }; 61 - sha256 = "01n9aqnilsjrbpv5kkx3c6nxs9p5l5lfwxj67hd5s5g4740di4a6"; 62 - sha256bin64 = "1dhgagphdzbd19gkc7vpl1hxc9vn0l7sxny346qjlmrwafqlhbgi"; 63 - version = "117.0.5938.88"; 64 }; 65 }
··· 27 }; 28 stable = { 29 chromedriver = { 30 + sha256_darwin = "138mw5p6r0n0531fs6322yxsjgj9hia5plw4mj0b3mclykzy5l37"; 31 sha256_darwin_aarch64 = 32 + "1cym94av2gw2zwj3rdqbjcqkigpzf0zk2bam2hw9n2hiabb4rm0p"; 33 + sha256_linux = "1q1vyhmcx6b5criz5bn1c3x3z2dzqdgsmwcvlb0rzqlzpla9q26m"; 34 + version = "117.0.5938.92"; 35 }; 36 deps = { 37 gn = { ··· 41 version = "2023-08-01"; 42 }; 43 }; 44 + sha256 = "0b1l8gjhqbsyqi30rsn8dyq2hdvwasdqfk1qzk55f9ch4wclkjk5"; 45 + sha256bin64 = "047w7y4c8k076yzrjc50lvwncbk8b3lyqnd1si9nrsl7c66j2h0q"; 46 + version = "117.0.5938.92"; 47 }; 48 ungoogled-chromium = { 49 deps = { ··· 54 version = "2023-08-01"; 55 }; 56 ungoogled-patches = { 57 + rev = "117.0.5938.92-1"; 58 + sha256 = "0ix0vaki9r305js61qraiah3vqjaj3dyycabi6grfavdgjpjkasb"; 59 }; 60 }; 61 + sha256 = "0b1l8gjhqbsyqi30rsn8dyq2hdvwasdqfk1qzk55f9ch4wclkjk5"; 62 + sha256bin64 = "047w7y4c8k076yzrjc50lvwncbk8b3lyqnd1si9nrsl7c66j2h0q"; 63 + version = "117.0.5938.92"; 64 }; 65 }
+43 -134
pkgs/applications/networking/browsers/firefox-bin/default.nix
··· 1 - { lib, stdenv, fetchurl, config, wrapGAppsHook 2 , alsa-lib 3 - , atk 4 - , cairo 5 , curl 6 - , cups 7 , dbus-glib 8 - , dbus 9 - , fontconfig 10 - , freetype 11 - , gdk-pixbuf 12 - , glib 13 - , glibc 14 , gtk3 15 - , libkrb5 16 - , libX11 17 - , libXScrnSaver 18 - , libxcb 19 - , libXcomposite 20 - , libXcursor 21 - , libXdamage 22 - , libXext 23 - , libXfixes 24 - , libXi 25 - , libXinerama 26 - , libXrender 27 - , libXrandr 28 - , libXt 29 , libXtst 30 - , libcanberra 31 - , libnotify 32 - , adwaita-icon-theme 33 - , libGLU, libGL 34 - , nspr 35 - , nss 36 - , pango 37 - , pipewire 38 , pciutils 39 - , heimdal 40 - , libpulseaudio 41 - , systemd 42 , channel 43 , generated 44 , writeScript ··· 48 , gnused 49 , gnugrep 50 , gnupg 51 - , ffmpeg 52 , runtimeShell 53 - , mesa # firefox wants gbm for drm+dmabuf 54 , systemLocale ? config.i18n.defaultLocale or "en_US" 55 }: 56 57 let 58 59 inherit (generated) version sources; 60 61 mozillaPlatforms = { 62 i686-linux = "linux-i686"; ··· 95 96 src = fetchurl { inherit (source) url sha256; }; 97 98 - libPath = lib.makeLibraryPath 99 - [ stdenv.cc.cc 100 - alsa-lib 101 - atk 102 - cairo 103 - curl 104 - cups 105 - dbus-glib 106 - dbus 107 - fontconfig 108 - freetype 109 - gdk-pixbuf 110 - glib 111 - glibc 112 - gtk3 113 - libkrb5 114 - mesa 115 - libX11 116 - libXScrnSaver 117 - libXcomposite 118 - libXcursor 119 - libxcb 120 - libXdamage 121 - libXext 122 - libXfixes 123 - libXi 124 - libXinerama 125 - libXrender 126 - libXrandr 127 - libXt 128 - libXtst 129 - libcanberra 130 - libnotify 131 - libGLU libGL 132 - nspr 133 - nss 134 - pango 135 - pipewire 136 - pciutils 137 - heimdal 138 - libpulseaudio 139 - systemd 140 - ffmpeg 141 - ] + ":" + lib.makeSearchPathOutput "lib" "lib64" [ 142 - stdenv.cc.cc 143 - ]; 144 - 145 - inherit gtk3; 146 - 147 - nativeBuildInputs = [ wrapGAppsHook ]; 148 - buildInputs = [ gtk3 adwaita-icon-theme ]; 149 - 150 - # "strip" after "patchelf" may break binaries. 151 - # See: https://github.com/NixOS/patchelf/issues/10 152 - dontStrip = true; 153 - dontPatchELF = true; 154 - 155 - postPatch = '' 156 - # Don't download updates from Mozilla directly 157 - echo 'pref("app.update.auto", "false");' >> defaults/pref/channel-prefs.js 158 - ''; 159 160 installPhase = 161 '' 162 - mkdir -p "$prefix/usr/lib/firefox-bin-${version}" 163 - cp -r * "$prefix/usr/lib/firefox-bin-${version}" 164 165 mkdir -p "$out/bin" 166 - ln -s "$prefix/usr/lib/firefox-bin-${version}/firefox" "$out/bin/" 167 - 168 - for executable in \ 169 - firefox firefox-bin plugin-container \ 170 - updater crashreporter webapprt-stub \ 171 - glxtest vaapitest 172 - do 173 - if [ -e "$out/usr/lib/firefox-bin-${version}/$executable" ]; then 174 - patchelf --interpreter "$(cat $NIX_CC/nix-support/dynamic-linker)" \ 175 - "$out/usr/lib/firefox-bin-${version}/$executable" 176 - fi 177 - done 178 - 179 - find . -executable -type f -exec \ 180 - patchelf --set-rpath "$libPath" \ 181 - "$out/usr/lib/firefox-bin-${version}/{}" \; 182 - 183 - # wrapFirefox expects "$out/lib" instead of "$out/usr/lib" 184 - ln -s "$out/usr/lib" "$out/lib" 185 - 186 - gappsWrapperArgs+=(--argv0 "$out/bin/.firefox-wrapped") 187 188 # See: https://github.com/mozilla/policy-templates/blob/master/README.md 189 mkdir -p "$out/lib/firefox-bin-${version}/distribution"; 190 ln -s ${policiesJson} "$out/lib/firefox-bin-${version}/distribution/policies.json"; 191 ''; 192 193 - passthru.binaryName = "firefox"; 194 - passthru.libName = "firefox-bin-${version}"; 195 - passthru.execdir = "/bin"; 196 - passthru.ffmpegSupport = true; 197 - passthru.gssSupport = true; 198 - # update with: 199 - # $ nix-shell maintainers/scripts/update.nix --argstr package firefox-bin-unwrapped 200 - passthru.updateScript = import ./update.nix { 201 - inherit pname channel lib writeScript xidel coreutils gnused gnugrep gnupg curl runtimeShell; 202 - baseUrl = 203 - if channel == "devedition" 204 - then "https://archive.mozilla.org/pub/devedition/releases/" 205 - else "https://archive.mozilla.org/pub/firefox/releases/"; 206 }; 207 meta = with lib; { 208 changelog = "https://www.mozilla.org/en-US/firefox/${version}/releasenotes/"; 209 description = "Mozilla Firefox, free web browser (binary package)"; ··· 213 platforms = builtins.attrNames mozillaPlatforms; 214 hydraPlatforms = []; 215 maintainers = with maintainers; [ taku0 lovesegfault ]; 216 }; 217 }
··· 1 + { lib, stdenv, fetchurl, config, wrapGAppsHook, autoPatchelfHook 2 , alsa-lib 3 , curl 4 , dbus-glib 5 , gtk3 6 , libXtst 7 + , libva 8 , pciutils 9 + , pipewire 10 + , adwaita-icon-theme 11 , channel 12 , generated 13 , writeScript ··· 17 , gnused 18 , gnugrep 19 , gnupg 20 , runtimeShell 21 , systemLocale ? config.i18n.defaultLocale or "en_US" 22 }: 23 24 let 25 26 inherit (generated) version sources; 27 + 28 + binaryName = if channel == "release" then "firefox" else "firefox-${channel}"; 29 30 mozillaPlatforms = { 31 i686-linux = "linux-i686"; ··· 64 65 src = fetchurl { inherit (source) url sha256; }; 66 67 + nativeBuildInputs = [ wrapGAppsHook autoPatchelfHook ]; 68 + buildInputs = [ 69 + gtk3 70 + adwaita-icon-theme 71 + alsa-lib 72 + dbus-glib 73 + libXtst 74 + ]; 75 + runtimeDependencies = [ 76 + curl 77 + libva.out 78 + pciutils 79 + ]; 80 + appendRunpaths = [ 81 + "${pipewire.lib}/lib" 82 + ]; 83 84 installPhase = 85 '' 86 + mkdir -p "$prefix/lib/firefox-bin-${version}" 87 + cp -r * "$prefix/lib/firefox-bin-${version}" 88 89 mkdir -p "$out/bin" 90 + ln -s "$prefix/lib/firefox-bin-${version}/firefox" "$out/bin/${binaryName}" 91 92 # See: https://github.com/mozilla/policy-templates/blob/master/README.md 93 mkdir -p "$out/lib/firefox-bin-${version}/distribution"; 94 ln -s ${policiesJson} "$out/lib/firefox-bin-${version}/distribution/policies.json"; 95 ''; 96 97 + passthru = { 98 + inherit binaryName; 99 + libName = "firefox-bin-${version}"; 100 + ffmpegSupport = true; 101 + gssSupport = true; 102 + gtk3 = gtk3; 103 + 104 + # update with: 105 + # $ nix-shell maintainers/scripts/update.nix --argstr package firefox-bin-unwrapped 106 + updateScript = import ./update.nix { 107 + inherit pname channel lib writeScript xidel coreutils gnused gnugrep gnupg curl runtimeShell; 108 + baseUrl = 109 + if channel == "devedition" 110 + then "https://archive.mozilla.org/pub/devedition/releases/" 111 + else "https://archive.mozilla.org/pub/firefox/releases/"; 112 + }; 113 }; 114 + 115 meta = with lib; { 116 changelog = "https://www.mozilla.org/en-US/firefox/${version}/releasenotes/"; 117 description = "Mozilla Firefox, free web browser (binary package)"; ··· 121 platforms = builtins.attrNames mozillaPlatforms; 122 hydraPlatforms = []; 123 maintainers = with maintainers; [ taku0 lovesegfault ]; 124 + mainProgram = binaryName; 125 }; 126 }
+1
pkgs/applications/networking/browsers/lynx/default.nix
··· 58 meta = with lib; { 59 description = "A text-mode web browser"; 60 homepage = "https://lynx.invisible-island.net/"; 61 maintainers = with maintainers; [ ]; 62 license = licenses.gpl2Plus; 63 platforms = platforms.unix;
··· 58 meta = with lib; { 59 description = "A text-mode web browser"; 60 homepage = "https://lynx.invisible-island.net/"; 61 + mainProgram = "lynx"; 62 maintainers = with maintainers; [ ]; 63 license = licenses.gpl2Plus; 64 platforms = platforms.unix;
-6
pkgs/applications/networking/instant-messengers/slack/update.sh
··· 6 latest_linux_version=$(curl -L --silent https://slack.com/downloads/linux | sed -n 's/.*Version \([0-9\.]\+\).*/\1/p') 7 latest_mac_version=$(curl -L --silent https://slack.com/downloads/mac | sed -n 's/.*Version \([0-9\.]\+\).*/\1/p') 8 9 - # Double check that the latest mac and linux versions are in sync. 10 - if [[ "$latest_linux_version" != "$latest_mac_version" ]]; then 11 - echo "the latest linux ($latest_linux_version) and mac ($latest_mac_version) versions are not the same" 12 - exit 1 13 - fi 14 - 15 nixpkgs="$(git rev-parse --show-toplevel)" 16 slack_nix="$nixpkgs/pkgs/applications/networking/instant-messengers/slack/default.nix" 17 nixpkgs_linux_version=$(cat "$slack_nix" | sed -n 's/.*x86_64-linux-version = \"\([0-9\.]\+\)\";.*/\1/p')
··· 6 latest_linux_version=$(curl -L --silent https://slack.com/downloads/linux | sed -n 's/.*Version \([0-9\.]\+\).*/\1/p') 7 latest_mac_version=$(curl -L --silent https://slack.com/downloads/mac | sed -n 's/.*Version \([0-9\.]\+\).*/\1/p') 8 9 nixpkgs="$(git rev-parse --show-toplevel)" 10 slack_nix="$nixpkgs/pkgs/applications/networking/instant-messengers/slack/default.nix" 11 nixpkgs_linux_version=$(cat "$slack_nix" | sed -n 's/.*x86_64-linux-version = \"\([0-9\.]\+\)\";.*/\1/p')
+1
pkgs/applications/networking/irc/catgirl/default.nix
··· 30 license = licenses.gpl3Plus; 31 description = "A TLS-only terminal IRC client"; 32 platforms = platforms.unix; 33 maintainers = with maintainers; [ xfnw ]; 34 }; 35 }
··· 30 license = licenses.gpl3Plus; 31 description = "A TLS-only terminal IRC client"; 32 platforms = platforms.unix; 33 + mainProgram = "catgirl"; 34 maintainers = with maintainers; [ xfnw ]; 35 }; 36 }
+1
pkgs/applications/virtualization/cloud-hypervisor/default.nix
··· 45 description = "Open source Virtual Machine Monitor (VMM) that runs on top of KVM"; 46 changelog = "https://github.com/cloud-hypervisor/cloud-hypervisor/releases/tag/v${version}"; 47 license = with licenses; [ asl20 bsd3 ]; 48 maintainers = with maintainers; [ offline qyliss ]; 49 platforms = [ "aarch64-linux" "x86_64-linux" ]; 50 };
··· 45 description = "Open source Virtual Machine Monitor (VMM) that runs on top of KVM"; 46 changelog = "https://github.com/cloud-hypervisor/cloud-hypervisor/releases/tag/v${version}"; 47 license = with licenses; [ asl20 bsd3 ]; 48 + mainProgram = "cloud-hypervisor"; 49 maintainers = with maintainers; [ offline qyliss ]; 50 platforms = [ "aarch64-linux" "x86_64-linux" ]; 51 };
+1
pkgs/applications/virtualization/crosvm/default.nix
··· 38 meta = with lib; { 39 description = "A secure virtual machine monitor for KVM"; 40 homepage = "https://chromium.googlesource.com/crosvm/crosvm/"; 41 maintainers = with maintainers; [ qyliss ]; 42 license = licenses.bsd3; 43 platforms = [ "aarch64-linux" "x86_64-linux" ];
··· 38 meta = with lib; { 39 description = "A secure virtual machine monitor for KVM"; 40 homepage = "https://chromium.googlesource.com/crosvm/crosvm/"; 41 + mainProgram = "crosvm"; 42 maintainers = with maintainers; [ qyliss ]; 43 license = licenses.bsd3; 44 platforms = [ "aarch64-linux" "x86_64-linux" ];
+1
pkgs/applications/window-managers/weston/default.nix
··· 78 homepage = "https://gitlab.freedesktop.org/wayland/weston"; 79 license = licenses.mit; # Expat version 80 platforms = platforms.linux; 81 maintainers = with maintainers; [ primeos qyliss ]; 82 }; 83 }
··· 78 homepage = "https://gitlab.freedesktop.org/wayland/weston"; 79 license = licenses.mit; # Expat version 80 platforms = platforms.linux; 81 + mainProgram = "weston"; 82 maintainers = with maintainers; [ primeos qyliss ]; 83 }; 84 }
+6 -3
pkgs/build-support/fetchgit/nix-prefetch-git
··· 293 local rev="${3:-HEAD}" 294 295 if [ -n "$fetchLFS" ]; then 296 - tmpHomePath="$(mktemp -d "${TMPDIR:-/tmp}/nix-prefetch-git-tmp-home-XXXXXXXXXX")" 297 - exit_handlers+=(remove_tmpHomePath) 298 - HOME="$tmpHomePath" 299 clean_git lfs install 300 fi 301 ··· 416 if test -z "$branchName"; then 417 branchName=fetchgit 418 fi 419 420 if test -n "$builder"; then 421 test -n "$out" -a -n "$url" -a -n "$rev" || usage
··· 293 local rev="${3:-HEAD}" 294 295 if [ -n "$fetchLFS" ]; then 296 clean_git lfs install 297 fi 298 ··· 413 if test -z "$branchName"; then 414 branchName=fetchgit 415 fi 416 + 417 + tmpHomePath="$(mktemp -d "${TMPDIR:-/tmp}/nix-prefetch-git-tmp-home-XXXXXXXXXX")" 418 + exit_handlers+=(remove_tmpHomePath) 419 + HOME="$tmpHomePath" 420 + unset XDG_CONFIG_HOME 421 + export GIT_CONFIG_NOSYSTEM=1 422 423 if test -n "$builder"; then 424 test -n "$out" -a -n "$url" -a -n "$rev" || usage
+2 -3
pkgs/build-support/php/build-pecl.nix
··· 8 , nativeBuildInputs ? [ ] 9 , postPhpize ? "" 10 , makeFlags ? [ ] 11 - , src ? fetchurl { 12 url = "https://pecl.php.net/get/${pname}-${version}.tgz"; 13 - inherit (args) sha256; 14 - } 15 , passthru ? { } 16 , ... 17 }@args:
··· 8 , nativeBuildInputs ? [ ] 9 , postPhpize ? "" 10 , makeFlags ? [ ] 11 + , src ? fetchurl ({ 12 url = "https://pecl.php.net/get/${pname}-${version}.tgz"; 13 + } // lib.filterAttrs (attrName: _: lib.elem attrName [ "sha256" "hash" ]) args) 14 , passthru ? { } 15 , ... 16 }@args:
+33
pkgs/by-name/ar/armbian-firmware/package.nix
···
··· 1 + { stdenvNoCC, lib, fetchFromGitHub }: 2 + stdenvNoCC.mkDerivation rec { 3 + pname = "armbian-firmware"; 4 + version = "unstable-2023-09-16"; 5 + 6 + src = fetchFromGitHub { 7 + owner = "armbian"; 8 + repo = "firmware"; 9 + rev = "01f9809bb0c4bd60c0c84b9438486b02d58b03f7"; 10 + hash = "sha256-ozKADff7lFjIT/Zf5dkNlCe8lOK+kwYb/60NaCJ8i2k="; 11 + }; 12 + 13 + installPhase = '' 14 + runHook preInstall 15 + 16 + mkdir -p $out/lib/firmware 17 + cp -a * $out/lib/firmware/ 18 + 19 + runHook postInstall 20 + ''; 21 + 22 + # Firmware blobs do not need fixing and should not be modified 23 + dontBuild = true; 24 + dontFixup = true; 25 + 26 + meta = with lib; { 27 + description = "Firmware from Armbian"; 28 + homepage = "https://github.com/armbian/firmware"; 29 + license = licenses.unfree; 30 + platforms = platforms.all; 31 + maintainers = with maintainers; [ zaldnoay ]; 32 + }; 33 + }
+2 -2
pkgs/desktops/pantheon/apps/appcenter/default.nix
··· 23 24 stdenv.mkDerivation rec { 25 pname = "appcenter"; 26 - version = "7.3.0"; 27 28 src = fetchFromGitHub { 29 owner = "elementary"; 30 repo = pname; 31 rev = version; 32 - sha256 = "sha256-Lj3j812XaCIN+TFSDAvIgtl49n5jG4fVlAFvrWqngpM="; 33 }; 34 35 nativeBuildInputs = [
··· 23 24 stdenv.mkDerivation rec { 25 pname = "appcenter"; 26 + version = "7.4.0"; 27 28 src = fetchFromGitHub { 29 owner = "elementary"; 30 repo = pname; 31 rev = version; 32 + sha256 = "sha256-L6MGbzzujr4tEB2Cpd7IU+3mOtSCt2hLPw4mOfZ4TkQ="; 33 }; 34 35 nativeBuildInputs = [
+2 -2
pkgs/development/libraries/amdvlk/default.nix
··· 25 26 in stdenv.mkDerivation rec { 27 pname = "amdvlk"; 28 - version = "2023.Q3.1"; 29 30 src = fetchRepoProject { 31 name = "${pname}-src"; 32 manifest = "https://github.com/GPUOpen-Drivers/AMDVLK.git"; 33 rev = "refs/tags/v-${version}"; 34 - sha256 = "W+igZbdQG1L62oGJa2Rz0n8YkTsZFqSm7w8VFfPu8k0="; 35 }; 36 37 buildInputs = [
··· 25 26 in stdenv.mkDerivation rec { 27 pname = "amdvlk"; 28 + version = "2023.Q3.2"; 29 30 src = fetchRepoProject { 31 name = "${pname}-src"; 32 manifest = "https://github.com/GPUOpen-Drivers/AMDVLK.git"; 33 rev = "refs/tags/v-${version}"; 34 + sha256 = "/1D2BbT1gnMLvIHfpkxLkeo1pjbG9LkTx9Zl5+gGU/M="; 35 }; 36 37 buildInputs = [
+1 -1
pkgs/development/libraries/libmongocrypt/default.nix
··· 34 mongoc 35 openssl 36 ] ++ lib.optionals stdenv.isDarwin [ 37 - darwin.apple_sdk.frameworks.Security 38 ]; 39 40 cmakeFlags = [
··· 34 mongoc 35 openssl 36 ] ++ lib.optionals stdenv.isDarwin [ 37 + darwin.apple_sdk_11_0.frameworks.Security 38 ]; 39 40 cmakeFlags = [
+17
pkgs/development/php-packages/rrd/default.nix
···
··· 1 + { buildPecl, lib, pkg-config, rrdtool }: 2 + 3 + buildPecl { 4 + pname = "rrd"; 5 + 6 + version = "2.0.3"; 7 + hash = "sha256-pCFh5YzcioU7cs/ymJidy96CsPdkVt1ZzgKFTJK3MPc="; 8 + 9 + nativeBuildInputs = [ pkg-config rrdtool ]; 10 + 11 + meta = { 12 + description = "PHP bindings to RRD tool system"; 13 + license = lib.licenses.bsd0; 14 + homepage = "https://github.com/php/pecl-processing-rrd"; 15 + maintainers = lib.teams.wdz.members; 16 + }; 17 + }
+2 -2
pkgs/development/python-modules/aiocomelit/default.nix
··· 9 10 buildPythonPackage rec { 11 pname = "aiocomelit"; 12 - version = "0.0.6"; 13 format = "pyproject"; 14 15 disabled = pythonOlder "3.10"; ··· 18 owner = "chemelli74"; 19 repo = "aiocomelit"; 20 rev = "refs/tags/v${version}"; 21 - hash = "sha256-u6CyqDFLgnIVak0UqN4JmL8ll/li3k9EhFs7iC5oZ9U="; 22 }; 23 24 postPatch = ''
··· 9 10 buildPythonPackage rec { 11 pname = "aiocomelit"; 12 + version = "0.0.8"; 13 format = "pyproject"; 14 15 disabled = pythonOlder "3.10"; ··· 18 owner = "chemelli74"; 19 repo = "aiocomelit"; 20 rev = "refs/tags/v${version}"; 21 + hash = "sha256-lPwkTWkzXe5c5+KJkLHr7/cydtnDOFGniNNeOk2UXdA="; 22 }; 23 24 postPatch = ''
+2 -2
pkgs/development/python-modules/aioesphomeapi/default.nix
··· 14 15 buildPythonPackage rec { 16 pname = "aioesphomeapi"; 17 - version = "16.0.5"; 18 format = "setuptools"; 19 20 disabled = pythonOlder "3.9"; ··· 23 owner = "esphome"; 24 repo = pname; 25 rev = "refs/tags/v${version}"; 26 - hash = "sha256-SueK59CZTKkQPsHThs7k9eCEmc1GwaRIrw3oSK4E80E="; 27 }; 28 29 propagatedBuildInputs = [
··· 14 15 buildPythonPackage rec { 16 pname = "aioesphomeapi"; 17 + version = "16.0.6"; 18 format = "setuptools"; 19 20 disabled = pythonOlder "3.9"; ··· 23 owner = "esphome"; 24 repo = pname; 25 rev = "refs/tags/v${version}"; 26 + hash = "sha256-BcFNxm4JpHaqKEhUTCXIrF18OMFxLbQHCQ9jfs+U0hc="; 27 }; 28 29 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/bellows/default.nix
··· 15 16 buildPythonPackage rec { 17 pname = "bellows"; 18 - version = "0.36.3"; 19 format = "setuptools"; 20 21 disabled = pythonOlder "3.8"; ··· 24 owner = "zigpy"; 25 repo = "bellows"; 26 rev = "refs/tags/${version}"; 27 - hash = "sha256-5s2I24gvHRXHm7ZTNZxc6ge9Kbe6UObcY29SvbIUWJg="; 28 }; 29 30 propagatedBuildInputs = [
··· 15 16 buildPythonPackage rec { 17 pname = "bellows"; 18 + version = "0.36.4"; 19 format = "setuptools"; 20 21 disabled = pythonOlder "3.8"; ··· 24 owner = "zigpy"; 25 repo = "bellows"; 26 rev = "refs/tags/${version}"; 27 + hash = "sha256-iouGT3ZqCFW34ududrtCHL/NmKgB9SznLA8p313B12Y="; 28 }; 29 30 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/gspread/default.nix
··· 12 13 buildPythonPackage rec { 14 pname = "gspread"; 15 - version = "5.11.1"; 16 format = "pyproject"; 17 18 disabled = pythonOlder "3.7"; ··· 21 owner = "burnash"; 22 repo = "gspread"; 23 rev = "refs/tags/v${version}"; 24 - hash = "sha256-a8A47il9NrMdHkSX4YmQj4VIAYDXK5V+FUdwv+LGIfQ="; 25 }; 26 27 nativeBuildInputs = [
··· 12 13 buildPythonPackage rec { 14 pname = "gspread"; 15 + version = "5.11.2"; 16 format = "pyproject"; 17 18 disabled = pythonOlder "3.7"; ··· 21 owner = "burnash"; 22 repo = "gspread"; 23 rev = "refs/tags/v${version}"; 24 + hash = "sha256-geP01U34HzBSmA8FTTaTMlv508hzGBXFiASjGw3uUmQ="; 25 }; 26 27 nativeBuildInputs = [
+7 -2
pkgs/development/python-modules/python-roborock/default.nix
··· 20 21 buildPythonPackage rec { 22 pname = "python-roborock"; 23 - version = "0.33.2"; 24 format = "pyproject"; 25 26 disabled = pythonOlder "3.10"; ··· 29 owner = "humbertogontijo"; 30 repo = "python-roborock"; 31 rev = "refs/tags/v${version}"; 32 - hash = "sha256-UAQlKfh6oljeWtEGYx7JiT1z9yFCAXRSlI4Ot6JUnoQ="; 33 }; 34 35 pythonRelaxDeps = [ 36 "pycryptodome"
··· 20 21 buildPythonPackage rec { 22 pname = "python-roborock"; 23 + version = "0.34.0"; 24 format = "pyproject"; 25 26 disabled = pythonOlder "3.10"; ··· 29 owner = "humbertogontijo"; 30 repo = "python-roborock"; 31 rev = "refs/tags/v${version}"; 32 + hash = "sha256-WLnMc2UQyjHaHRms6SEdF/TSum3Cf5NC3SGXHtGj6d0="; 33 }; 34 + 35 + postPatch = '' 36 + substituteInPlace pyproject.toml \ 37 + --replace "poetry-core==1.6.1" "poetry-core" 38 + ''; 39 40 pythonRelaxDeps = [ 41 "pycryptodome"
+2 -2
pkgs/development/python-modules/softlayer/default.nix
··· 21 22 buildPythonPackage rec { 23 pname = "softlayer"; 24 - version = "6.1.8"; 25 format = "setuptools"; 26 27 disabled = pythonOlder "3.7"; ··· 30 owner = pname; 31 repo = "softlayer-python"; 32 rev = "refs/tags/v${version}"; 33 - hash = "sha256-6LZ2vy6nkyWA7xbUl4aNi2ygRWDJTj7J9Af0GTvNLd4="; 34 }; 35 36 postPatch = ''
··· 21 22 buildPythonPackage rec { 23 pname = "softlayer"; 24 + version = "6.1.9"; 25 format = "setuptools"; 26 27 disabled = pythonOlder "3.7"; ··· 30 owner = pname; 31 repo = "softlayer-python"; 32 rev = "refs/tags/v${version}"; 33 + hash = "sha256-mYezVJSBtZuNT6mG544dJhRFh26M4nN4nE3tUVB3cZQ="; 34 }; 35 36 postPatch = ''
+2 -2
pkgs/development/python-modules/universal-silabs-flasher/default.nix
··· 27 28 buildPythonPackage rec { 29 pname = "universal-silabs-flasher"; 30 - version = "0.0.13"; 31 format = "pyproject"; 32 33 src = fetchFromGitHub { 34 owner = "NabuCasa"; 35 repo = "universal-silabs-flasher"; 36 rev = "v${version}"; 37 - hash = "sha256-qiaDPCnVb6JQ2fZRFK+QF4o8K2UbIWGNKl5oo6MQUW0="; 38 }; 39 40 nativeBuildInputs = [
··· 27 28 buildPythonPackage rec { 29 pname = "universal-silabs-flasher"; 30 + version = "0.0.14"; 31 format = "pyproject"; 32 33 src = fetchFromGitHub { 34 owner = "NabuCasa"; 35 repo = "universal-silabs-flasher"; 36 rev = "v${version}"; 37 + hash = "sha256-0c9b571gJXFOAe5ct8O/qy7D6rDosmBHDYEv6odLQ2s="; 38 }; 39 40 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/uproot/default.nix
··· 18 19 buildPythonPackage rec { 20 pname = "uproot"; 21 - version = "5.0.11"; 22 format = "pyproject"; 23 24 disabled = pythonOlder "3.7"; ··· 27 owner = "scikit-hep"; 28 repo = "uproot5"; 29 rev = "refs/tags/v${version}"; 30 - hash = "sha256-qp1iffElJSAwqaycelnILBzeW8kG7Yy0R1bjMumW8UU="; 31 }; 32 33 nativeBuildInputs = [
··· 18 19 buildPythonPackage rec { 20 pname = "uproot"; 21 + version = "5.0.12"; 22 format = "pyproject"; 23 24 disabled = pythonOlder "3.7"; ··· 27 owner = "scikit-hep"; 28 repo = "uproot5"; 29 rev = "refs/tags/v${version}"; 30 + hash = "sha256-5RJPRrnPRRj1KXeyCqrGwaurXPx0aT6gso1o7gQ1aNs="; 31 }; 32 33 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/zigpy/default.nix
··· 19 20 buildPythonPackage rec { 21 pname = "zigpy"; 22 - version = "0.57.1"; 23 format = "pyproject"; 24 25 disabled = pythonOlder "3.8"; ··· 28 owner = "zigpy"; 29 repo = "zigpy"; 30 rev = "refs/tags/${version}"; 31 - hash = "sha256-aVrLiWPjc4xn2GvKmZCrRJGGbxP545PKqAH9rPq8IPo="; 32 }; 33 34 postPatch = ''
··· 19 20 buildPythonPackage rec { 21 pname = "zigpy"; 22 + version = "0.57.2"; 23 format = "pyproject"; 24 25 disabled = pythonOlder "3.8"; ··· 28 owner = "zigpy"; 29 repo = "zigpy"; 30 rev = "refs/tags/${version}"; 31 + hash = "sha256-v4H8syWbXqmfvOznRECgSjYi246+socPJTffb79MXK4="; 32 }; 33 34 postPatch = ''
+2 -2
pkgs/development/python-modules/zwave-js-server-python/default.nix
··· 10 11 buildPythonPackage rec { 12 pname = "zwave-js-server-python"; 13 - version = "0.51.2"; 14 format = "setuptools"; 15 16 disabled = pythonOlder "3.11"; ··· 19 owner = "home-assistant-libs"; 20 repo = pname; 21 rev = "refs/tags/${version}"; 22 - hash = "sha256-SRBH7HdsgS60Z8y6ef5/VCunzMGBEWw0u1jR7wSByNc="; 23 }; 24 25 propagatedBuildInputs = [
··· 10 11 buildPythonPackage rec { 12 pname = "zwave-js-server-python"; 13 + version = "0.51.3"; 14 format = "setuptools"; 15 16 disabled = pythonOlder "3.11"; ··· 19 owner = "home-assistant-libs"; 20 repo = pname; 21 rev = "refs/tags/${version}"; 22 + hash = "sha256-79INvk5WLuSki/kBU25hMHRxGk7FAznU89U+y3Eh+wI="; 23 }; 24 25 propagatedBuildInputs = [
+2 -2
pkgs/development/tools/gi-crystal/default.nix
··· 5 }: 6 crystal.buildCrystalPackage rec { 7 pname = "gi-crystal"; 8 - version = "0.17.0"; 9 10 src = fetchFromGitHub { 11 owner = "hugopl"; 12 repo = "gi-crystal"; 13 rev = "v${version}"; 14 - hash = "sha256-DIH8L8P8lkWzzVUj1Tbf9oTUvu9X7OT66APyUHiDkYk="; 15 }; 16 17 # Make sure gi-crystal picks up the name of the so or dylib and not the leading nix store path
··· 5 }: 6 crystal.buildCrystalPackage rec { 7 pname = "gi-crystal"; 8 + version = "0.18.0"; 9 10 src = fetchFromGitHub { 11 owner = "hugopl"; 12 repo = "gi-crystal"; 13 rev = "v${version}"; 14 + hash = "sha256-9px6JRdVzsUoU5wlO+blH1OBGKskozF3WvqLV/EYiiA="; 15 }; 16 17 # Make sure gi-crystal picks up the name of the so or dylib and not the leading nix store path
+1 -1
pkgs/servers/home-assistant/component-packages.nix
··· 2 # Do not edit! 3 4 { 5 - version = "2023.9.2"; 6 components = { 7 "3_day_blinds" = ps: with ps; [ 8 ];
··· 2 # Do not edit! 3 4 { 5 + version = "2023.9.3"; 6 components = { 7 "3_day_blinds" = ps: with ps; [ 8 ];
+3 -3
pkgs/servers/home-assistant/default.nix
··· 316 extraBuildInputs = extraPackages python.pkgs; 317 318 # Don't forget to run parse-requirements.py after updating 319 - hassVersion = "2023.9.2"; 320 321 in python.pkgs.buildPythonApplication rec { 322 pname = "homeassistant"; ··· 332 # Primary source is the pypi sdist, because it contains translations 333 src = fetchPypi { 334 inherit pname version; 335 - hash = "sha256-pVW9NQYEf2pmGCp342lCzEiWfAyFCiWeRMVbhPd8wxQ="; 336 }; 337 338 # Secondary source is git for tests ··· 340 owner = "home-assistant"; 341 repo = "core"; 342 rev = "refs/tags/${version}"; 343 - hash = "sha256-4sZBrGd5gz4W7c7Ok5Bj/47MaXAqAFC4qufcidbU5zA="; 344 }; 345 346 nativeBuildInputs = with python.pkgs; [
··· 316 extraBuildInputs = extraPackages python.pkgs; 317 318 # Don't forget to run parse-requirements.py after updating 319 + hassVersion = "2023.9.3"; 320 321 in python.pkgs.buildPythonApplication rec { 322 pname = "homeassistant"; ··· 332 # Primary source is the pypi sdist, because it contains translations 333 src = fetchPypi { 334 inherit pname version; 335 + hash = "sha256-tcIGYJ+r2+0jnf3xUxnFdwnLiOK9P0Y6sw0Mpd/YIT0="; 336 }; 337 338 # Secondary source is git for tests ··· 340 owner = "home-assistant"; 341 repo = "core"; 342 rev = "refs/tags/${version}"; 343 + hash = "sha256-zAUMevj2xvRkhZg4wuHDz0+X//cEU/D/HmokmX9oeCU="; 344 }; 345 346 nativeBuildInputs = with python.pkgs; [
+2 -2
pkgs/servers/home-assistant/intents.nix
··· 20 21 buildPythonPackage rec { 22 pname = "home-assistant-intents"; 23 - version = "2023.8.2"; 24 format = "pyproject"; 25 26 disabled = pythonOlder "3.9"; ··· 29 owner = "home-assistant"; 30 repo = "intents-package"; 31 rev = "refs/tags/${version}"; 32 - hash = "sha256-pNLH3GGfY8upKi7uYGZ466cIQkpdA16tR1tjwuiQ3JI="; 33 fetchSubmodules = true; 34 }; 35
··· 20 21 buildPythonPackage rec { 22 pname = "home-assistant-intents"; 23 + version = "2023.9.22"; 24 format = "pyproject"; 25 26 disabled = pythonOlder "3.9"; ··· 29 owner = "home-assistant"; 30 repo = "intents-package"; 31 rev = "refs/tags/${version}"; 32 + hash = "sha256-n0IIWS5edh4XD/W9Eo88pal2+zJQtrHg74FSGvPIlPg="; 33 fetchSubmodules = true; 34 }; 35
+2 -2
pkgs/servers/home-assistant/stubs.nix
··· 8 9 buildPythonPackage rec { 10 pname = "homeassistant-stubs"; 11 - version = "2023.9.2"; 12 format = "pyproject"; 13 14 disabled = python.version != home-assistant.python.version; ··· 17 owner = "KapJI"; 18 repo = "homeassistant-stubs"; 19 rev = "refs/tags/${version}"; 20 - hash = "sha256-cKBf7S6ZvLlRp0L23mDu1CvG7d1d34LaIev60JPD0TE="; 21 }; 22 23 nativeBuildInputs = [
··· 8 9 buildPythonPackage rec { 10 pname = "homeassistant-stubs"; 11 + version = "2023.9.3"; 12 format = "pyproject"; 13 14 disabled = python.version != home-assistant.python.version; ··· 17 owner = "KapJI"; 18 repo = "homeassistant-stubs"; 19 rev = "refs/tags/${version}"; 20 + hash = "sha256-dZOpfSfq47sGJJB6CvcBDlSLBG8EVAX8RMuNzbP7bTs="; 21 }; 22 23 nativeBuildInputs = [
+2 -2
pkgs/tools/misc/tlp/default.nix
··· 24 , networkmanager 25 }: stdenv.mkDerivation rec { 26 pname = "tlp"; 27 - version = "1.6.0"; 28 29 src = fetchFromGitHub { 30 owner = "linrunner"; 31 repo = "TLP"; 32 rev = version; 33 - hash = "sha256-XAyko2MxFyo5RyioaexhoFAR3E+I3t/8vD2K3WYNmsI="; 34 }; 35 36 # XXX: See patch files for relevant explanations.
··· 24 , networkmanager 25 }: stdenv.mkDerivation rec { 26 pname = "tlp"; 27 + version = "1.6.1"; 28 29 src = fetchFromGitHub { 30 owner = "linrunner"; 31 repo = "TLP"; 32 rev = version; 33 + hash = "sha256-CxO1KU7F6sT5D8vjKOmntjDxcieoRSHTvuSqXfplcHk="; 34 }; 35 36 # XXX: See patch files for relevant explanations.
+1
pkgs/tools/wayland/wayland-proxy-virtwl/default.nix
··· 42 homepage = "https://github.com/talex5/wayland-virtwl-proxy"; 43 description = "Proxy Wayland connections across a VM boundary"; 44 license = licenses.asl20; 45 maintainers = [ maintainers.qyliss maintainers.sternenseemann ]; 46 platforms = platforms.linux; 47 };
··· 42 homepage = "https://github.com/talex5/wayland-virtwl-proxy"; 43 description = "Proxy Wayland connections across a VM boundary"; 44 license = licenses.asl20; 45 + mainProgram = "wayland-proxy-virtwl"; 46 maintainers = [ maintainers.qyliss maintainers.sternenseemann ]; 47 platforms = platforms.linux; 48 };
+3 -5
pkgs/top-level/all-packages.nix
··· 10479 10480 libmbim = callPackage ../development/libraries/libmbim { }; 10481 10482 - libmongocrypt = callPackage ../development/libraries/libmongocrypt { }; 10483 10484 libmesode = callPackage ../development/libraries/libmesode { }; 10485 ··· 32116 firefox-beta-bin = res.wrapFirefox firefox-beta-bin-unwrapped { 32117 pname = "firefox-beta-bin"; 32118 desktopName = "Firefox Beta"; 32119 - wmClass = "firefox-beta"; 32120 }; 32121 32122 firefox-devedition-bin-unwrapped = callPackage ../applications/networking/browsers/firefox-bin { 32123 inherit (gnome) adwaita-icon-theme; 32124 - channel = "devedition"; 32125 generated = import ../applications/networking/browsers/firefox-bin/devedition_sources.nix; 32126 }; 32127 32128 firefox-devedition-bin = res.wrapFirefox firefox-devedition-bin-unwrapped { 32129 - nameSuffix = "-devedition"; 32130 pname = "firefox-devedition-bin"; 32131 desktopName = "Firefox DevEdition"; 32132 - wmClass = "firefox-devedition"; 32133 }; 32134 32135 librewolf-unwrapped = callPackage ../applications/networking/browsers/librewolf { };
··· 10479 10480 libmbim = callPackage ../development/libraries/libmbim { }; 10481 10482 + libmongocrypt = darwin.apple_sdk_11_0.callPackage ../development/libraries/libmongocrypt { }; 10483 10484 libmesode = callPackage ../development/libraries/libmesode { }; 10485 ··· 32116 firefox-beta-bin = res.wrapFirefox firefox-beta-bin-unwrapped { 32117 pname = "firefox-beta-bin"; 32118 desktopName = "Firefox Beta"; 32119 }; 32120 32121 firefox-devedition-bin-unwrapped = callPackage ../applications/networking/browsers/firefox-bin { 32122 inherit (gnome) adwaita-icon-theme; 32123 + channel = "developer-edition"; 32124 generated = import ../applications/networking/browsers/firefox-bin/devedition_sources.nix; 32125 }; 32126 32127 firefox-devedition-bin = res.wrapFirefox firefox-devedition-bin-unwrapped { 32128 pname = "firefox-devedition-bin"; 32129 desktopName = "Firefox DevEdition"; 32130 + wmClass = "firefox-aurora"; 32131 }; 32132 32133 librewolf-unwrapped = callPackage ../applications/networking/browsers/librewolf { };
+2
pkgs/top-level/php-packages.nix
··· 312 313 relay = callPackage ../development/php-packages/relay { inherit php; }; 314 315 smbclient = callPackage ../development/php-packages/smbclient { }; 316 317 snuffleupagus = callPackage ../development/php-packages/snuffleupagus {
··· 312 313 relay = callPackage ../development/php-packages/relay { inherit php; }; 314 315 + rrd = callPackage ../development/php-packages/rrd { }; 316 + 317 smbclient = callPackage ../development/php-packages/smbclient { }; 318 319 snuffleupagus = callPackage ../development/php-packages/snuffleupagus {