nixpkgs mirror (for testing) github.com/NixOS/nixpkgs
nix

Merge master into staging-next

authored by

github-actions[bot] and committed by
GitHub
237453e7 5d71fe0c

+645 -423
+1 -1
maintainers/maintainer-list.nix
··· 15811 15811 }; 15812 15812 portothree = { 15813 15813 name = "Gustavo Porto"; 15814 - email = "gustavoporto@ya.ru"; 15814 + email = "gus@p8s.co"; 15815 15815 github = "portothree"; 15816 15816 githubId = 3718120; 15817 15817 };
+10
nixos/doc/manual/from_md/release-notes/rl-2211.section.xml
··· 441 441 </listitem> 442 442 <listitem> 443 443 <para> 444 + <literal>services.sourcehut.dispatch</literal> and the 445 + corresponding package 446 + (<literal>sourcehut.dispatchsrht</literal>) have been removed 447 + due to 448 + <link xlink:href="https://sourcehut.org/blog/2022-08-01-dispatch-deprecation-plans/">upstream 449 + deprecation</link>. 450 + </para> 451 + </listitem> 452 + <listitem> 453 + <para> 444 454 The <literal>p4</literal> package now only includes the 445 455 open-source Perforce Helix Core command-line client and APIs. 446 456 It no longer installs the unfree Helix Core Server binaries
+7
nixos/doc/manual/from_md/release-notes/rl-2305.section.xml
··· 78 78 relying on this should provide their own implementation. 79 79 </para> 80 80 </listitem> 81 + <listitem> 82 + <para> 83 + The <literal>nix.readOnlyStore</literal> option has been 84 + renamed to <literal>boot.readOnlyNixStore</literal> to clarify 85 + that it configures the NixOS boot process, not the Nix daemon. 86 + </para> 87 + </listitem> 81 88 </itemizedlist> 82 89 </section> 83 90 <section xml:id="sec-release-23.05-notable-changes">
+2
nixos/doc/manual/release-notes/rl-2211.section.md
··· 124 124 - `services.hbase` has been renamed to `services.hbase-standalone`. 125 125 For production HBase clusters, use `services.hadoop.hbase` instead. 126 126 127 + - `services.sourcehut.dispatch` and the corresponding package (`sourcehut.dispatchsrht`) have been removed due to [upstream deprecation](https://sourcehut.org/blog/2022-08-01-dispatch-deprecation-plans/). 128 + 127 129 - The `p4` package now only includes the open-source Perforce Helix Core command-line client and APIs. It no longer installs the unfree Helix Core Server binaries `p4d`, `p4broker`, and `p4p`. To install the Helix Core Server binaries, use the `p4d` package instead. 128 130 129 131 - The OpenSSL extension for the PHP interpreter used by Nextcloud is built against OpenSSL 1.1 if
+2
nixos/doc/manual/release-notes/rl-2305.section.md
··· 29 29 30 30 - The EC2 image module previously detected and activated swap-formatted instance store devices and partitions in stage-1 (initramfs). This behaviour has been removed. Users relying on this should provide their own implementation. 31 31 32 + - The `nix.readOnlyStore` option has been renamed to `boot.readOnlyNixStore` to clarify that it configures the NixOS boot process, not the Nix daemon. 33 + 32 34 ## Other Notable Changes {#sec-release-23.05-notable-changes} 33 35 34 36 <!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. -->
+2 -2
nixos/modules/config/users-groups.nix
··· 618 618 # Install all the user shells 619 619 environment.systemPackages = systemShells; 620 620 621 - environment.etc = (mapAttrs' (_: { packages, name, ... }: { 621 + environment.etc = mapAttrs' (_: { packages, name, ... }: { 622 622 name = "profiles/per-user/${name}"; 623 623 value.source = pkgs.buildEnv { 624 624 name = "user-environment"; ··· 626 626 inherit (config.environment) pathsToLink extraOutputsToInstall; 627 627 inherit (config.system.path) ignoreCollisions postBuild; 628 628 }; 629 - }) (filterAttrs (_: u: u.packages != []) cfg.users)); 629 + }) (filterAttrs (_: u: u.packages != []) cfg.users); 630 630 631 631 environment.profiles = [ 632 632 "$HOME/.nix-profile"
+5 -1
nixos/modules/misc/man-db.nix
··· 52 52 environment.systemPackages = [ cfg.package ]; 53 53 environment.etc."man_db.conf".text = 54 54 let 55 + mandbForBuild = if pkgs.stdenv.hostPlatform == pkgs.stdenv.buildPlatform then 56 + cfg.package 57 + else 58 + pkgs.buildPackages.man-db; 55 59 manualCache = pkgs.runCommand "man-cache" { } '' 56 60 echo "MANDB_MAP ${cfg.manualPages}/share/man $out" > man.conf 57 - ${cfg.package}/bin/mandb -C man.conf -psc >/dev/null 2>&1 61 + ${mandbForBuild}/bin/mandb -C man.conf -psc >/dev/null 2>&1 58 62 ''; 59 63 in 60 64 ''
+2 -7
nixos/modules/misc/nixpkgs.nix
··· 23 23 optionalAttrs (lhs ? packageOverrides) { 24 24 packageOverrides = pkgs: 25 25 optCall lhs.packageOverrides pkgs // 26 - optCall (attrByPath ["packageOverrides"] ({}) rhs) pkgs; 26 + optCall (attrByPath [ "packageOverrides" ] { } rhs) pkgs; 27 27 } // 28 28 optionalAttrs (lhs ? perlPackageOverrides) { 29 29 perlPackageOverrides = pkgs: 30 30 optCall lhs.perlPackageOverrides pkgs // 31 - optCall (attrByPath ["perlPackageOverrides"] ({}) rhs) pkgs; 31 + optCall (attrByPath [ "perlPackageOverrides" ] { } rhs) pkgs; 32 32 }; 33 33 34 34 configType = mkOptionType { ··· 67 67 # Context for messages 68 68 hostPlatformLine = optionalString hasHostPlatform "${showOptionWithDefLocs opt.hostPlatform}"; 69 69 buildPlatformLine = optionalString hasBuildPlatform "${showOptionWithDefLocs opt.buildPlatform}"; 70 - platformLines = optionalString hasPlatform '' 71 - Your system configuration configures nixpkgs with platform parameters: 72 - ${hostPlatformLine 73 - }${buildPlatformLine 74 - }''; 75 70 76 71 legacyOptionsDefined = 77 72 optional (opt.localSystem.highestPrio < (mkDefault {}).priority) opt.system
+1
nixos/modules/module-list.nix
··· 46 46 ./hardware/brillo.nix 47 47 ./hardware/ckb-next.nix 48 48 ./hardware/cpu/amd-microcode.nix 49 + ./hardware/cpu/amd-sev.nix 49 50 ./hardware/cpu/intel-microcode.nix 50 51 ./hardware/cpu/intel-sgx.nix 51 52 ./hardware/corectrl.nix
+1 -1
nixos/modules/profiles/all-hardware.nix
··· 31 31 "pata_winbond" 32 32 33 33 # SCSI support (incomplete). 34 - "3w-9xxx" "3w-xxxx" "aic79xx" "aic7xxx" "arcmsr" 34 + "3w-9xxx" "3w-xxxx" "aic79xx" "aic7xxx" "arcmsr" "hpsa" 35 35 36 36 # USB support, especially for booting from USB CD-ROM 37 37 # drives.
+5 -6
nixos/modules/profiles/docker-container.nix
··· 1 1 { config, lib, pkgs, ... }: 2 2 3 - with lib; 4 - 5 - let inherit (pkgs) writeScript; in 6 - 7 3 let 8 - pkgs2storeContents = l : map (x: { object = x; symlink = "none"; }) l; 4 + inherit (pkgs) writeScript; 9 5 10 - in { 6 + pkgs2storeContents = map (x: { object = x; symlink = "none"; }); 7 + in 8 + 9 + { 11 10 # Docker image config. 12 11 imports = [ 13 12 ../installer/cd-dvd/channel.nix
+4 -4
nixos/modules/services/cluster/hadoop/hbase.nix
··· 141 141 142 142 services.hadoop.hbaseSiteInternal."hbase.rootdir" = cfg.hbase.rootdir; 143 143 144 - networking.firewall.allowedTCPPorts = (mkIf cfg.hbase.master.openFirewall [ 144 + networking.firewall.allowedTCPPorts = mkIf cfg.hbase.master.openFirewall [ 145 145 16000 16010 146 - ]); 146 + ]; 147 147 148 148 }) 149 149 ··· 168 168 services.hadoop.hbaseSiteInternal."hbase.rootdir" = cfg.hbase.rootdir; 169 169 170 170 networking = { 171 - firewall.allowedTCPPorts = (mkIf cfg.hbase.regionServer.openFirewall [ 171 + firewall.allowedTCPPorts = mkIf cfg.hbase.regionServer.openFirewall [ 172 172 16020 16030 173 - ]); 173 + ]; 174 174 hosts = mkIf cfg.hbase.regionServer.overrideHosts { 175 175 "127.0.0.2" = mkForce [ ]; 176 176 "::1" = mkForce [ ];
+2 -4
nixos/modules/services/continuous-integration/buildbot/master.nix
··· 10 10 11 11 python = cfg.package.pythonModule; 12 12 13 - escapeStr = s: escape ["'"] s; 13 + escapeStr = escape [ "'" ]; 14 14 15 15 defaultMasterCfg = pkgs.writeText "master.cfg" '' 16 16 from buildbot.plugins import * ··· 245 245 description = "Buildbot User."; 246 246 isNormalUser = true; 247 247 createHome = true; 248 - home = cfg.home; 249 - group = cfg.group; 250 - extraGroups = cfg.extraGroups; 248 + inherit (cfg) home group extraGroups; 251 249 useDefaultShell = true; 252 250 }; 253 251 };
+3 -7
nixos/modules/services/databases/redis.nix
··· 67 67 ''); 68 68 69 69 servers = mkOption { 70 - type = with types; attrsOf (submodule ({config, name, ...}@args: { 70 + type = with types; attrsOf (submodule ({ config, name, ... }: { 71 71 options = { 72 72 enable = mkEnableOption (lib.mdDoc '' 73 73 Redis server. ··· 271 271 }; 272 272 config.settings = mkMerge [ 273 273 { 274 - port = config.port; 274 + inherit (config) port logfile databases maxclients appendOnly; 275 275 daemonize = false; 276 276 supervised = "systemd"; 277 277 loglevel = config.logLevel; 278 - logfile = config.logfile; 279 278 syslog-enabled = config.syslog; 280 - databases = config.databases; 281 - maxclients = config.maxclients; 282 279 save = if config.save == [] 283 280 then ''""'' # Disable saving with `save = ""` 284 281 else map ··· 283 286 config.save; 284 287 dbfilename = "dump.rdb"; 285 288 dir = "/var/lib/${redisName name}"; 286 - appendOnly = config.appendOnly; 287 289 appendfsync = config.appendFsync; 288 290 slowlog-log-slower-than = config.slowLogLogSlowerThan; 289 291 slowlog-max-len = config.slowLogMaxLen; 290 292 } 291 - (mkIf (config.bind != null) { bind = config.bind; }) 293 + (mkIf (config.bind != null) { inherit (config) bind; }) 292 294 (mkIf (config.unixSocket != null) { 293 295 unixsocket = config.unixSocket; 294 296 unixsocketperm = toString config.unixSocketPerm;
+1 -1
nixos/modules/services/development/jupyter/default.nix
··· 119 119 120 120 kernels = mkOption { 121 121 type = types.nullOr (types.attrsOf(types.submodule (import ./kernel-options.nix { 122 - inherit lib; 122 + inherit lib pkgs; 123 123 }))); 124 124 125 125 default = null;
+12 -1
nixos/modules/services/development/jupyter/kernel-options.nix
··· 1 1 # Options that can be used for creating a jupyter kernel. 2 - {lib }: 2 + { lib, pkgs }: 3 3 4 4 with lib; 5 5 6 6 { 7 + freeformType = (pkgs.formats.json { }).type; 8 + 7 9 options = { 8 10 9 11 displayName = mkOption { ··· 39 37 example = "python"; 40 38 description = lib.mdDoc '' 41 39 Language of the environment. Typically the name of the binary. 40 + ''; 41 + }; 42 + 43 + env = mkOption { 44 + type = types.attrsOf types.str; 45 + default = { }; 46 + example = { OMP_NUM_THREADS = "1"; }; 47 + description = lib.mdDoc '' 48 + Environment variables to set for the kernel. 42 49 ''; 43 50 }; 44 51
+1 -1
nixos/modules/services/development/jupyterhub/default.nix
··· 119 119 120 120 kernels = mkOption { 121 121 type = types.nullOr (types.attrsOf(types.submodule (import ../jupyter/kernel-options.nix { 122 - inherit lib; 122 + inherit lib pkgs; 123 123 }))); 124 124 125 125 default = null;
+3 -3
nixos/modules/services/games/crossfire-server.nix
··· 131 131 exp_table = ""; 132 132 forbid = ""; 133 133 metaserver2 = ""; 134 - motd = (fileContents "${cfg.package}/etc/crossfire/motd"); 135 - news = (fileContents "${cfg.package}/etc/crossfire/news"); 136 - rules = (fileContents "${cfg.package}/etc/crossfire/rules"); 134 + motd = fileContents "${cfg.package}/etc/crossfire/motd"; 135 + news = fileContents "${cfg.package}/etc/crossfire/news"; 136 + rules = fileContents "${cfg.package}/etc/crossfire/rules"; 137 137 settings = ""; 138 138 stat_bonus = ""; 139 139 } // cfg.configFiles);
+10
nixos/modules/services/hardware/sane.nix
··· 126 126 ''; 127 127 }; 128 128 129 + hardware.sane.openFirewall = mkOption { 130 + type = types.bool; 131 + default = false; 132 + description = lib.mdDoc '' 133 + Open ports needed for discovery of scanners on the local network, e.g. 134 + needed for Canon scanners (BJNP protocol). 135 + ''; 136 + }; 137 + 129 138 services.saned.enable = mkOption { 130 139 type = types.bool; 131 140 default = false; ··· 172 163 services.udev.packages = backends; 173 164 174 165 users.groups.scanner.gid = config.ids.gids.scanner; 166 + networking.firewall.allowedUDPPorts = mkIf config.hardware.sane.openFirewall [ 8612 ]; 175 167 }) 176 168 177 169 (mkIf config.services.saned.enable {
+2 -2
nixos/modules/services/misc/gammu-smsd.nix
··· 45 45 initDBDir = "share/doc/gammu/examples/sql"; 46 46 47 47 gammuPackage = with cfg.backend; (pkgs.gammu.override { 48 - dbiSupport = (service == "sql" && sql.driver == "sqlite"); 49 - postgresSupport = (service == "sql" && sql.driver == "native_pgsql"); 48 + dbiSupport = service == "sql" && sql.driver == "sqlite"; 49 + postgresSupport = service == "sql" && sql.driver == "native_pgsql"; 50 50 }); 51 51 52 52 in {
+1 -1
nixos/modules/services/misc/gitea.nix
··· 483 483 description = "gitea"; 484 484 after = [ "network.target" ] ++ lib.optional usePostgresql "postgresql.service" ++ lib.optional useMysql "mysql.service"; 485 485 wantedBy = [ "multi-user.target" ]; 486 - path = [ gitea pkgs.git ]; 486 + path = [ gitea pkgs.git pkgs.gnupg ]; 487 487 488 488 # In older versions the secret naming for JWT was kind of confusing. 489 489 # The file jwt_secret hold the value for LFS_JWT_SECRET and JWT_SECRET
+1 -11
nixos/modules/services/misc/nix-daemon.nix
··· 115 115 (mkRenamedOptionModuleWith { sinceRelease = 2003; from = [ "nix" "useChroot" ]; to = [ "nix" "useSandbox" ]; }) 116 116 (mkRenamedOptionModuleWith { sinceRelease = 2003; from = [ "nix" "chrootDirs" ]; to = [ "nix" "sandboxPaths" ]; }) 117 117 (mkRenamedOptionModuleWith { sinceRelease = 2205; from = [ "nix" "daemonIONiceLevel" ]; to = [ "nix" "daemonIOSchedPriority" ]; }) 118 + (mkRenamedOptionModuleWith { sinceRelease = 2211; from = [ "nix" "readOnlyStore" ]; to = [ "boot" "readOnlyNixStore" ]; }) 118 119 (mkRemovedOptionModule [ "nix" "daemonNiceLevel" ] "Consider nix.daemonCPUSchedPolicy instead.") 119 120 ] ++ mapAttrsToList (oldConf: newConf: mkRenamedOptionModuleWith { sinceRelease = 2205; from = [ "nix" oldConf ]; to = [ "nix" "settings" newConf ]; }) legacyConfMappings; 120 121 ··· 364 363 perform secure concurrent builds. If you receive an error 365 364 message saying that “all build users are currently in use”, 366 365 you should increase this value. 367 - ''; 368 - }; 369 - 370 - readOnlyStore = mkOption { 371 - type = types.bool; 372 - default = true; 373 - description = lib.mdDoc '' 374 - If set, NixOS will enforce the immutability of the Nix store 375 - by making {file}`/nix/store` a read-only bind 376 - mount. Nix will automatically make the store writable when 377 - needed. 378 366 ''; 379 367 }; 380 368
+71 -14
nixos/modules/services/misc/redmine.nix
··· 206 206 description = lib.mdDoc "Create the database and database user locally."; 207 207 }; 208 208 }; 209 + 210 + components = { 211 + subversion = mkOption { 212 + type = types.bool; 213 + default = false; 214 + description = lib.mdDoc "Subversion integration."; 215 + }; 216 + 217 + mercurial = mkOption { 218 + type = types.bool; 219 + default = false; 220 + description = lib.mdDoc "Mercurial integration."; 221 + }; 222 + 223 + git = mkOption { 224 + type = types.bool; 225 + default = false; 226 + description = lib.mdDoc "git integration."; 227 + }; 228 + 229 + cvs = mkOption { 230 + type = types.bool; 231 + default = false; 232 + description = lib.mdDoc "cvs integration."; 233 + }; 234 + 235 + breezy = mkOption { 236 + type = types.bool; 237 + default = false; 238 + description = lib.mdDoc "bazaar integration."; 239 + }; 240 + 241 + imagemagick = mkOption { 242 + type = types.bool; 243 + default = false; 244 + description = lib.mdDoc "Allows exporting Gant diagrams as PNG."; 245 + }; 246 + 247 + ghostscript = mkOption { 248 + type = types.bool; 249 + default = false; 250 + description = lib.mdDoc "Allows exporting Gant diagrams as PDF."; 251 + }; 252 + 253 + minimagick_font_path = mkOption { 254 + type = types.str; 255 + default = ""; 256 + description = lib.mdDoc "MiniMagick font path"; 257 + example = "/run/current-system/sw/share/X11/fonts/LiberationSans-Regular.ttf"; 258 + }; 259 + }; 209 260 }; 210 261 }; 211 262 ··· 276 225 { assertion = cfg.database.createLocally -> cfg.database.host == "localhost"; 277 226 message = "services.redmine.database.host must be set to localhost if services.redmine.database.createLocally is set to true"; 278 227 } 228 + { assertion = cfg.components.imagemagick -> cfg.components.minimagick_font_path != ""; 229 + message = "services.redmine.components.minimagick_font_path must be configured with a path to a font file if services.redmine.components.imagemagick is set to true."; 230 + } 279 231 ]; 280 232 281 233 services.redmine.settings = { 282 234 production = { 283 - scm_subversion_command = "${pkgs.subversion}/bin/svn"; 284 - scm_mercurial_command = "${pkgs.mercurial}/bin/hg"; 285 - scm_git_command = "${pkgs.git}/bin/git"; 286 - scm_cvs_command = "${pkgs.cvs}/bin/cvs"; 287 - scm_bazaar_command = "${pkgs.breezy}/bin/bzr"; 288 - scm_darcs_command = "${pkgs.darcs}/bin/darcs"; 235 + scm_subversion_command = if cfg.components.subversion then "${pkgs.subversion}/bin/svn" else ""; 236 + scm_mercurial_command = if cfg.components.mercurial then "${pkgs.mercurial}/bin/hg" else ""; 237 + scm_git_command = if cfg.components.git then "${pkgs.git}/bin/git" else ""; 238 + scm_cvs_command = if cfg.components.cvs then "${pkgs.cvs}/bin/cvs" else ""; 239 + scm_bazaar_command = if cfg.components.breezy then "${pkgs.breezy}/bin/bzr" else ""; 240 + imagemagick_convert_command = if cfg.components.imagemagick then "${pkgs.imagemagick}/bin/convert" else ""; 241 + gs_command = if cfg.components.ghostscript then "${pkgs.ghostscript}/bin/gs" else ""; 242 + minimagick_font_path = "${cfg.components.minimagick_font_path}"; 289 243 }; 290 244 }; 291 245 ··· 352 296 environment.REDMINE_LANG = "en"; 353 297 environment.SCHEMA = "${cfg.stateDir}/cache/schema.db"; 354 298 path = with pkgs; [ 355 - imagemagick 356 - breezy 357 - cvs 358 - darcs 359 - git 360 - mercurial 361 - subversion 362 - ]; 299 + ] 300 + ++ optional cfg.components.subversion subversion 301 + ++ optional cfg.components.mercurial mercurial 302 + ++ optional cfg.components.git git 303 + ++ optional cfg.components.cvs cvs 304 + ++ optional cfg.components.breezy breezy 305 + ++ optional cfg.components.imagemagick imagemagick 306 + ++ optional cfg.components.ghostscript ghostscript; 307 + 363 308 preStart = '' 364 309 rm -rf "${cfg.stateDir}/plugins/"* 365 310 rm -rf "${cfg.stateDir}/public/themes/"*
+7 -35
nixos/modules/services/misc/sourcehut/default.nix
··· 88 88 # Sourcehut services 89 89 srht 90 90 buildsrht 91 - dispatchsrht 92 91 gitsrht 93 92 hgsrht 94 93 hubsrht ··· 108 109 { 109 110 options.services.sourcehut = { 110 111 enable = mkEnableOption (lib.mdDoc '' 111 - sourcehut - git hosting, continuous integration, mailing list, ticket tracking, 112 - task dispatching, wiki and account management services 112 + sourcehut - git hosting, continuous integration, mailing list, ticket tracking, wiki 113 + and account management services 113 114 ''); 114 115 115 116 services = mkOption { 116 117 type = with types; listOf (enum 117 - [ "builds" "dispatch" "git" "hg" "hub" "lists" "man" "meta" "pages" "paste" "todo" ]); 118 + [ "builds" "git" "hg" "hub" "lists" "man" "meta" "pages" "paste" "todo" ]); 118 119 defaultText = "locally enabled services"; 119 120 description = lib.mdDoc '' 120 121 Services that may be displayed as links in the title bar of the Web interface. ··· 297 298 ''; 298 299 type = types.path; 299 300 apply = s: "<" + toString s; 300 - }; 301 - }; 302 - 303 - options."dispatch.sr.ht" = commonServiceSettings "dispatch" // { 304 - }; 305 - options."dispatch.sr.ht::github" = { 306 - oauth-client-id = mkOptionNullOrStr "OAuth client id."; 307 - oauth-client-secret = mkOptionNullOrStr "OAuth client secret."; 308 - }; 309 - options."dispatch.sr.ht::gitlab" = { 310 - enabled = mkEnableOption (lib.mdDoc "GitLab integration"); 311 - canonical-upstream = mkOption { 312 - type = types.str; 313 - description = lib.mdDoc "Canonical upstream."; 314 - default = "gitlab.com"; 315 - }; 316 - repo-cache = mkOption { 317 - type = types.str; 318 - description = lib.mdDoc "Repository cache directory."; 319 - default = "./repo-cache"; 320 - }; 321 - "gitlab.com" = mkOption { 322 - type = with types; nullOr str; 323 - description = lib.mdDoc "GitLab id and secret."; 324 - default = null; 325 - example = "GitLab:application id:secret"; 326 301 }; 327 302 }; 328 303 ··· 994 1021 ]; 995 1022 }) 996 1023 997 - (import ./service.nix "dispatch" { 998 - inherit configIniOfService; 999 - port = 5005; 1000 - }) 1001 - 1002 1024 (import ./service.nix "git" (let 1003 1025 baseService = { 1004 1026 path = [ cfg.git.package ]; ··· 1384 1416 (mkRenamedOptionModule [ "services" "sourcehut" "address" ] 1385 1417 [ "services" "sourcehut" "listenAddress" ]) 1386 1418 1419 + (mkRemovedOptionModule [ "services" "sourcehut" "dispatch" ] '' 1420 + dispatch is deprecated. See https://sourcehut.org/blog/2022-08-01-dispatch-deprecation-plans/ 1421 + for more information. 1422 + '') 1387 1423 ]; 1388 1424 1389 1425 meta.doc = ./sourcehut.xml;
+2 -4
nixos/modules/services/networking/keepalived/default.nix
··· 84 84 '' 85 85 ) vrrpInstances); 86 86 87 - virtualIpLine = (ip: 88 - ip.addr 87 + virtualIpLine = ip: ip.addr 89 88 + optionalString (notNullOrEmpty ip.brd) " brd ${ip.brd}" 90 89 + optionalString (notNullOrEmpty ip.dev) " dev ${ip.dev}" 91 90 + optionalString (notNullOrEmpty ip.scope) " scope ${ip.scope}" 92 - + optionalString (notNullOrEmpty ip.label) " label ${ip.label}" 93 - ); 91 + + optionalString (notNullOrEmpty ip.label) " label ${ip.label}"; 94 92 95 93 notNullOrEmpty = s: !(s == null || s == ""); 96 94
+1 -1
nixos/modules/services/networking/prosody.nix
··· 263 263 if builtins.isString x then ''"${x}"'' 264 264 else if builtins.isBool x then boolToString x 265 265 else if builtins.isInt x then toString x 266 - else if builtins.isList x then ''{ ${lib.concatStringsSep ", " (map (n: toLua n) x) } }'' 266 + else if builtins.isList x then "{ ${lib.concatMapStringsSep ", " toLua x} }" 267 267 else throw "Invalid Lua value"; 268 268 269 269 createSSLOptsStr = o: ''
+4 -4
nixos/modules/services/networking/softether.nix
··· 5 5 let 6 6 cfg = config.services.softether; 7 7 8 - package = cfg.package.override { dataDir = cfg.dataDir; }; 8 + package = cfg.package.override { inherit (cfg) dataDir; }; 9 9 10 10 in 11 11 { ··· 88 88 }; 89 89 } 90 90 91 - (mkIf (cfg.vpnserver.enable) { 91 + (mkIf cfg.vpnserver.enable { 92 92 systemd.services.vpnserver = { 93 93 description = "SoftEther VPN Server"; 94 94 after = [ "softether-init.service" ]; ··· 109 109 }; 110 110 }) 111 111 112 - (mkIf (cfg.vpnbridge.enable) { 112 + (mkIf cfg.vpnbridge.enable { 113 113 systemd.services.vpnbridge = { 114 114 description = "SoftEther VPN Bridge"; 115 115 after = [ "softether-init.service" ]; ··· 130 130 }; 131 131 }) 132 132 133 - (mkIf (cfg.vpnclient.enable) { 133 + (mkIf cfg.vpnclient.enable { 134 134 systemd.services.vpnclient = { 135 135 description = "SoftEther VPN Client"; 136 136 after = [ "softether-init.service" ];
+9 -1
nixos/modules/services/security/physlock.nix
··· 57 57 ''; 58 58 }; 59 59 60 + muteKernelMessages = mkOption { 61 + type = types.bool; 62 + default = false; 63 + description = lib.mdDoc '' 64 + Disable kernel messages on console while physlock is running. 65 + ''; 66 + }; 67 + 60 68 lockOn = { 61 69 62 70 suspend = mkOption { ··· 124 116 ++ cfg.lockOn.extraTargets; 125 117 serviceConfig = { 126 118 Type = "forking"; 127 - ExecStart = "${pkgs.physlock}/bin/physlock -d${optionalString cfg.disableSysRq "s"}${optionalString (cfg.lockMessage != "") " -p \"${cfg.lockMessage}\""}"; 119 + ExecStart = "${pkgs.physlock}/bin/physlock -d${optionalString cfg.muteKernelMessages "m"}${optionalString cfg.disableSysRq "s"}${optionalString (cfg.lockMessage != "") " -p \"${cfg.lockMessage}\""}"; 128 120 }; 129 121 }; 130 122
+2 -2
nixos/modules/services/web-apps/discourse.nix
··· 19 19 # We only want to create a database if we're actually going to connect to it. 20 20 databaseActuallyCreateLocally = cfg.database.createLocally && cfg.database.host == null; 21 21 22 - tlsEnabled = (cfg.enableACME 22 + tlsEnabled = cfg.enableACME 23 23 || cfg.sslCertificate != null 24 - || cfg.sslCertificateKey != null); 24 + || cfg.sslCertificateKey != null; 25 25 in 26 26 { 27 27 options = {
+2 -2
nixos/modules/services/web-apps/invoiceplane.nix
··· 327 327 )) eachSite; 328 328 329 329 systemd.services = 330 - (mapAttrs' (hostName: cfg: ( 330 + mapAttrs' (hostName: cfg: ( 331 331 nameValuePair "invoiceplane-cron-${hostName}" (mkIf cfg.cron.enable { 332 332 serviceConfig = { 333 333 Type = "oneshot"; ··· 335 335 ExecStart = "${pkgs.curl}/bin/curl --header 'Host: ${hostName}' http://localhost/invoices/cron/recur/${cfg.cron.key}"; 336 336 }; 337 337 }) 338 - )) eachSite); 338 + )) eachSite; 339 339 340 340 } 341 341
+22
nixos/modules/services/web-apps/isso.nix
··· 63 63 64 64 Restart = "on-failure"; 65 65 RestartSec = 1; 66 + 67 + # Hardening 68 + CapabilityBoundingSet = [ "" ]; 69 + DeviceAllow = [ "" ]; 70 + LockPersonality = true; 71 + PrivateDevices = true; 72 + PrivateUsers = true; 73 + ProcSubset = "pid"; 74 + ProtectClock = true; 75 + ProtectControlGroups = true; 76 + ProtectHome = true; 77 + ProtectHostname = true; 78 + ProtectKernelLogs = true; 79 + ProtectKernelModules = true; 80 + ProtectKernelTunables = true; 81 + ProtectProc = "invisible"; 82 + RestrictAddressFamilies = [ "AF_INET" "AF_INET6" ]; 83 + RestrictNamespaces = true; 84 + RestrictRealtime = true; 85 + SystemCallArchitectures = "native"; 86 + SystemCallFilter = [ "@system-service" "~@privileged" "~@resources" ]; 87 + UMask = "0077"; 66 88 }; 67 89 }; 68 90 };
+1 -1
nixos/modules/system/boot/stage-2-init.sh
··· 68 68 # like squashfs. 69 69 chown -f 0:30000 /nix/store 70 70 chmod -f 1775 /nix/store 71 - if [ -n "@readOnlyStore@" ]; then 71 + if [ -n "@readOnlyNixStore@" ]; then 72 72 if ! [[ "$(findmnt --noheadings --output OPTIONS /nix/store)" =~ ro(,|$) ]]; then 73 73 if [ -z "$container" ]; then 74 74 mount --bind /nix/store /nix/store
+12 -2
nixos/modules/system/boot/stage-2.nix
··· 10 10 src = ./stage-2-init.sh; 11 11 shellDebug = "${pkgs.bashInteractive}/bin/bash"; 12 12 shell = "${pkgs.bash}/bin/bash"; 13 - inherit (config.boot) systemdExecutable extraSystemdUnitPaths; 13 + inherit (config.boot) readOnlyNixStore systemdExecutable extraSystemdUnitPaths; 14 14 isExecutable = true; 15 - inherit (config.nix) readOnlyStore; 16 15 inherit useHostResolvConf; 17 16 inherit (config.system.build) earlyMountScript; 18 17 path = lib.makeBinPath ([ ··· 38 39 type = types.lines; 39 40 description = lib.mdDoc '' 40 41 Shell commands to be executed just before systemd is started. 42 + ''; 43 + }; 44 + 45 + readOnlyNixStore = mkOption { 46 + type = types.bool; 47 + default = true; 48 + description = lib.mdDoc '' 49 + If set, NixOS will enforce the immutability of the Nix store 50 + by making {file}`/nix/store` a read-only bind 51 + mount. Nix will automatically make the store writable when 52 + needed. 41 53 ''; 42 54 }; 43 55
+4 -3
nixos/modules/tasks/network-interfaces.nix
··· 1411 1411 # Set the host and domain names in the activation script. Don't 1412 1412 # clear it if it's not configured in the NixOS configuration, 1413 1413 # since it may have been set by dhcpcd in the meantime. 1414 - system.activationScripts.hostname = 1415 - optionalString (cfg.hostName != "") '' 1416 - hostname "${cfg.hostName}" 1414 + system.activationScripts.hostname = let 1415 + effectiveHostname = config.boot.kernel.sysctl."kernel.hostname" or cfg.hostName; 1416 + in optionalString (effectiveHostname != "") '' 1417 + hostname "${effectiveHostname}" 1417 1418 ''; 1418 1419 system.activationScripts.domain = 1419 1420 optionalString (cfg.domain != null) ''
+2 -1
nixos/modules/virtualisation/qemu-vm.nix
··· 858 858 # If the disk image appears to be empty, run mke2fs to 859 859 # initialise. 860 860 FSTYPE=$(blkid -o value -s TYPE ${cfg.bootDevice} || true) 861 - if test -z "$FSTYPE"; then 861 + PARTTYPE=$(blkid -o value -s PTTYPE ${cfg.bootDevice} || true) 862 + if test -z "$FSTYPE" -a -z "$PARTTYPE"; then 862 863 mke2fs -t ext4 ${cfg.bootDevice} 863 864 fi 864 865 '';
+2
pkgs/applications/audio/hqplayer-desktop/default.nix
··· 89 89 sourceProvenance = with sourceTypes; [ binaryNativeCode ]; 90 90 platforms = [ "x86_64-linux" ]; 91 91 maintainers = with maintainers; [ lovesegfault ]; 92 + # src link returns 403 93 + broken = true; 92 94 }; 93 95 }
+135 -123
pkgs/applications/editors/vim/plugins/generated.nix
··· 57 57 src = fetchFromGitHub { 58 58 owner = "whonore"; 59 59 repo = "Coqtail"; 60 - rev = "157c43397c2dca382f7560c7f00ed930de5be186"; 61 - sha256 = "0pfv07j5ryr4i654w015ly73hzg4mb9xrnxnbm8l6s7dcd3zvdkp"; 60 + rev = "1704623395dbd6b42d999d378f14887aa6a8e704"; 61 + sha256 = "0bkvrhpbisrn5bvpy7aknzr0b8c4hppszv82iiqmag9y380gkxqp"; 62 62 }; 63 63 meta.homepage = "https://github.com/whonore/Coqtail/"; 64 64 }; ··· 281 281 282 282 SchemaStore-nvim = buildVimPluginFrom2Nix { 283 283 pname = "SchemaStore.nvim"; 284 - version = "2022-11-25"; 284 + version = "2022-11-30"; 285 285 src = fetchFromGitHub { 286 286 owner = "b0o"; 287 287 repo = "SchemaStore.nvim"; 288 - rev = "c9824c37bef4ded4fea68ac5735aac69e02e393a"; 289 - sha256 = "02wzb31mixa2lvii9f7kq045yrksrjmdrk42kqh4n9cfalyhydsm"; 288 + rev = "39260e77f7471da2a14182f83ac58e1d2b1ff5be"; 289 + sha256 = "07jqpm7vhm10pjni0i4q0bjzf5mahi9rvz698cj66idzkmz2i89k"; 290 290 }; 291 291 meta.homepage = "https://github.com/b0o/SchemaStore.nvim/"; 292 292 }; ··· 490 490 src = fetchFromGitHub { 491 491 owner = "stevearc"; 492 492 repo = "aerial.nvim"; 493 - rev = "e0f744c9c3c2b230a717ad9036a03a776c492be6"; 494 - sha256 = "0i5nsyb224cqifqpyd063z4ls6jni3jz7sm3hw5mlgsvf0wmpg7a"; 493 + rev = "38c6fe1c199b8f35918f7efc09cae3f8af56fd68"; 494 + sha256 = "0p5b05psbhm5aig4106vc6cd795zqwnc0blnngi3jb1snvzb22a5"; 495 495 fetchSubmodules = true; 496 496 }; 497 497 meta.homepage = "https://github.com/stevearc/aerial.nvim/"; ··· 811 811 812 812 barbecue-nvim = buildVimPluginFrom2Nix { 813 813 pname = "barbecue.nvim"; 814 - version = "2022-11-27"; 814 + version = "2022-11-30"; 815 815 src = fetchFromGitHub { 816 816 owner = "utilyre"; 817 817 repo = "barbecue.nvim"; 818 - rev = "8249ba25471384b74b1eacbfdfb735c73a7fe077"; 819 - sha256 = "0bf88bgpf5wcq2dddf2ppihf832fpk0a8zpsvrnzx3rmmxarzchm"; 818 + rev = "2a8bff5c47ae7ef3ee2d362634be2d143948dc38"; 819 + sha256 = "0ncqyb5a5mxhzj3mpsn11342mbl0m54jfqga90ds5430d02mm6fb"; 820 820 }; 821 821 meta.homepage = "https://github.com/utilyre/barbecue.nvim/"; 822 822 }; ··· 1075 1075 1076 1076 clang_complete = buildVimPluginFrom2Nix { 1077 1077 pname = "clang_complete"; 1078 - version = "2022-09-01"; 1078 + version = "2022-11-30"; 1079 1079 src = fetchFromGitHub { 1080 1080 owner = "xavierd"; 1081 1081 repo = "clang_complete"; 1082 - rev = "e25b6a54e5cf648eb36d5be5b82c1bbb22260fde"; 1083 - sha256 = "0ik55akiyivq70a0jds35f8jqvs78mzxq3b302vhyq07w44mk7vx"; 1082 + rev = "d866f31a6b1cfc725dd015293e0a275a6ae9beb0"; 1083 + sha256 = "1fz1mjk049b2f31ymk4ph287km8q3yan9xm5ipj41mjwaavdmzi3"; 1084 1084 }; 1085 1085 meta.homepage = "https://github.com/xavierd/clang_complete/"; 1086 1086 }; ··· 1687 1687 1688 1688 coc-lua = buildVimPluginFrom2Nix { 1689 1689 pname = "coc-lua"; 1690 - version = "2022-11-08"; 1690 + version = "2022-11-30"; 1691 1691 src = fetchFromGitHub { 1692 1692 owner = "josa42"; 1693 1693 repo = "coc-lua"; 1694 - rev = "cdb82f176b13d4be5bed05c586ac1f141306a09a"; 1695 - sha256 = "1cfxzrir827wa3mnbg3gjv4n0afk220r0v55ajqqy8r5aycd68w7"; 1694 + rev = "13da36309878d1f3199877a33badeca0fdf7543e"; 1695 + sha256 = "12p7qbqvqm3pj2pbvm3vg1q84kd15n1qhw720gd1nfxm0ybfxgfc"; 1696 1696 }; 1697 1697 meta.homepage = "https://github.com/josa42/coc-lua/"; 1698 1698 }; ··· 1735 1735 1736 1736 coc-nvim = buildVimPluginFrom2Nix { 1737 1737 pname = "coc.nvim"; 1738 - version = "2022-11-28"; 1738 + version = "2022-11-30"; 1739 1739 src = fetchFromGitHub { 1740 1740 owner = "neoclide"; 1741 1741 repo = "coc.nvim"; 1742 - rev = "d436220bd70346221b590419fbe2f2564c4bbb7f"; 1743 - sha256 = "18v3z2vrgn09jwyaffcigx7g4bzx2ff8j6lwkvzyxqxbfrdzv0vq"; 1742 + rev = "2c4d06e9fc712b259ae2320020818fbf4c533273"; 1743 + sha256 = "0b5fq7p5ddydxk1zy1s2b93x019n5mxn7vma3ij4ry9lhc1sqxi3"; 1744 1744 }; 1745 1745 meta.homepage = "https://github.com/neoclide/coc.nvim/"; 1746 1746 }; ··· 2023 2023 2024 2024 coq-artifacts = buildVimPluginFrom2Nix { 2025 2025 pname = "coq.artifacts"; 2026 - version = "2022-11-29"; 2026 + version = "2022-12-01"; 2027 2027 src = fetchFromGitHub { 2028 2028 owner = "ms-jpq"; 2029 2029 repo = "coq.artifacts"; 2030 - rev = "4a002ca2e61ef58f70677c661ecbf461cda79b71"; 2031 - sha256 = "0wj5vgkf5yyl5qp5029m9xl5pwldllb1r40mpgk9wkqip4pnlckm"; 2030 + rev = "eea760e43c5800bbcb8d6053f5502ada3774b860"; 2031 + sha256 = "0n853wbpg02lw41lzs3c8yyq7ag363li0sslgrmli5h3fsd8d3j4"; 2032 2032 }; 2033 2033 meta.homepage = "https://github.com/ms-jpq/coq.artifacts/"; 2034 2034 }; 2035 2035 2036 2036 coq-thirdparty = buildVimPluginFrom2Nix { 2037 2037 pname = "coq.thirdparty"; 2038 - version = "2022-11-29"; 2038 + version = "2022-12-01"; 2039 2039 src = fetchFromGitHub { 2040 2040 owner = "ms-jpq"; 2041 2041 repo = "coq.thirdparty"; 2042 - rev = "f204bc46f7db08e66a156d8c36799dd64aa69855"; 2043 - sha256 = "0mlc546hy3fx45f2llgf4qh94gl7n9c123kg1xzgdrl3p9ch5hn9"; 2042 + rev = "ed621364ec22289e912f680b9e5adc17be5af817"; 2043 + sha256 = "1xwnv4agszdqj7izspgzy8qsyhdzg8ydamrpn51611aafxzz74vm"; 2044 2044 }; 2045 2045 meta.homepage = "https://github.com/ms-jpq/coq.thirdparty/"; 2046 2046 }; ··· 2059 2059 2060 2060 coq_nvim = buildVimPluginFrom2Nix { 2061 2061 pname = "coq_nvim"; 2062 - version = "2022-11-29"; 2062 + version = "2022-12-01"; 2063 2063 src = fetchFromGitHub { 2064 2064 owner = "ms-jpq"; 2065 2065 repo = "coq_nvim"; 2066 - rev = "980daf72ee0c9999e88973733c5152d03dcf5171"; 2067 - sha256 = "04z11xsi7jnji3psdznxrscmygf5f4wms3p4ps2n6zj65b4j6czb"; 2066 + rev = "61ba300a71bf274af5c7a5069ab102729af79297"; 2067 + sha256 = "0718b7fpl10hpsaw09c4ylkxw8dflb0s2b449q8b8dcwqpgssm51"; 2068 2068 }; 2069 2069 meta.homepage = "https://github.com/ms-jpq/coq_nvim/"; 2070 2070 }; ··· 2976 2976 2977 2977 friendly-snippets = buildVimPluginFrom2Nix { 2978 2978 pname = "friendly-snippets"; 2979 - version = "2022-11-29"; 2979 + version = "2022-11-30"; 2980 2980 src = fetchFromGitHub { 2981 2981 owner = "rafamadriz"; 2982 2982 repo = "friendly-snippets"; 2983 - rev = "3e2a7d7f29b18d2bb29eedea3663856db55e752e"; 2984 - sha256 = "04yn59c7f5553cvh04ybh5m2jk26aj1jwavk65jlkmbslw3wbcih"; 2983 + rev = "b4f857a1d94d05e747951b1e8cb1a6c567396898"; 2984 + sha256 = "1z4nkk846dh3c8rj7dliw42vz6fwhj7rf1gwjwa4s7nk8f6xq545"; 2985 2985 }; 2986 2986 meta.homepage = "https://github.com/rafamadriz/friendly-snippets/"; 2987 2987 }; ··· 3084 3084 3085 3085 fzf-lua = buildVimPluginFrom2Nix { 3086 3086 pname = "fzf-lua"; 3087 - version = "2022-11-29"; 3087 + version = "2022-11-30"; 3088 3088 src = fetchFromGitHub { 3089 3089 owner = "ibhagwan"; 3090 3090 repo = "fzf-lua"; 3091 - rev = "ff4abbf783875b64dd20aaaab1912ac917d23aa5"; 3092 - sha256 = "0j9l7jvf4v24ygf3s6rnnb1d8qrjn465pfq4fb0j2kwx1nfq0zvk"; 3091 + rev = "0c8b3389ec433089ebbe9d138c2ec20a6a542ce0"; 3092 + sha256 = "1x70d6k7z9q1dnif67359xm86k9fhb8lbycm5rywh1a39c5skbg8"; 3093 3093 }; 3094 3094 meta.homepage = "https://github.com/ibhagwan/fzf-lua/"; 3095 3095 }; ··· 3240 3240 3241 3241 gitsigns-nvim = buildNeovimPluginFrom2Nix { 3242 3242 pname = "gitsigns.nvim"; 3243 - version = "2022-11-09"; 3243 + version = "2022-11-30"; 3244 3244 src = fetchFromGitHub { 3245 3245 owner = "lewis6991"; 3246 3246 repo = "gitsigns.nvim"; 3247 - rev = "9ff7dfb051e5104088ff80556203634fc8f8546d"; 3248 - sha256 = "0cfssyyhcjndwr2xlk91rxzyir4ng5hk1f4fgij5hgrhhh3wgjdv"; 3247 + rev = "d076301a634198e0ae3efee3b298fc63c055a871"; 3248 + sha256 = "12990v2zcsas8575nf6ln1byw3zg473s5jpizk4g3v9ikfdvjbfr"; 3249 3249 }; 3250 3250 meta.homepage = "https://github.com/lewis6991/gitsigns.nvim/"; 3251 3251 }; ··· 3276 3276 3277 3277 glow-nvim = buildVimPluginFrom2Nix { 3278 3278 pname = "glow.nvim"; 3279 - version = "2022-10-07"; 3279 + version = "2022-11-30"; 3280 3280 src = fetchFromGitHub { 3281 3281 owner = "ellisonleao"; 3282 3282 repo = "glow.nvim"; 3283 - rev = "9038d7cdd76a930973b6158d800c8dbc02236a4b"; 3284 - sha256 = "0x49l7g84m1328fqad501f4iqqy3imbl8r8rh4rxsi1zam46f2ba"; 3283 + rev = "20d1cd087f8728f21a048a3b6259f6177237b39e"; 3284 + sha256 = "0zklzx2k85zyxn866xbhd6rnifc885rn68bnv1x945z34pj4m3xc"; 3285 3285 }; 3286 3286 meta.homepage = "https://github.com/ellisonleao/glow.nvim/"; 3287 3287 }; ··· 4007 4007 4008 4008 lean-nvim = buildVimPluginFrom2Nix { 4009 4009 pname = "lean.nvim"; 4010 - version = "2022-11-29"; 4010 + version = "2022-11-30"; 4011 4011 src = fetchFromGitHub { 4012 4012 owner = "Julian"; 4013 4013 repo = "lean.nvim"; 4014 - rev = "ae598191de9fa8ff90b897893590234b84702cab"; 4015 - sha256 = "17n108ipnajj9fvm3l15rndhxi3529w0g7pjrjpb6ljn0d73akvc"; 4014 + rev = "9fad72569b54f067b6ad0bdafd47ce7b23578b79"; 4015 + sha256 = "1cvj59v267av6lh2wzpmqd05pa7fjvfprbs2r7gql6gr992x2s59"; 4016 4016 }; 4017 4017 meta.homepage = "https://github.com/Julian/lean.nvim/"; 4018 4018 }; ··· 4235 4235 4236 4236 lir-nvim = buildVimPluginFrom2Nix { 4237 4237 pname = "lir.nvim"; 4238 - version = "2022-09-14"; 4238 + version = "2022-11-30"; 4239 4239 src = fetchFromGitHub { 4240 4240 owner = "tamago324"; 4241 4241 repo = "lir.nvim"; 4242 - rev = "c1aeb96fae55bb6cac3d01ce5123a843d7235396"; 4243 - sha256 = "03fia0m7w2q20m9jvm4wdm6w5bfh976fm0d7h4n055hbqgy73qf9"; 4242 + rev = "806651bc22cc1aa0053fba4385a18800f576cc6b"; 4243 + sha256 = "1xi2l412637vkp79338p65xb4zm0licyzrp188s2rijjqf3g2mzb"; 4244 4244 }; 4245 4245 meta.homepage = "https://github.com/tamago324/lir.nvim/"; 4246 4246 }; ··· 4414 4414 4415 4415 lsp_signature-nvim = buildVimPluginFrom2Nix { 4416 4416 pname = "lsp_signature.nvim"; 4417 - version = "2022-11-28"; 4417 + version = "2022-11-30"; 4418 4418 src = fetchFromGitHub { 4419 4419 owner = "ray-x"; 4420 4420 repo = "lsp_signature.nvim"; 4421 - rev = "136d0eb5956c5a874c506007606f3ad022df64e2"; 4422 - sha256 = "0hgf78gj252jxsrwpsc5gxy943k65x6l397win1jrcpkrmpmmq51"; 4421 + rev = "2f3e5745ee7a0610ffde2b4331460151d4707724"; 4422 + sha256 = "0c0ap6xkncbsvy08897ah4sw4f6s99q9m5jp0i3a0akvw3zpn21n"; 4423 4423 }; 4424 4424 meta.homepage = "https://github.com/ray-x/lsp_signature.nvim/"; 4425 4425 }; ··· 4967 4967 4968 4968 neoconf-nvim = buildVimPluginFrom2Nix { 4969 4969 pname = "neoconf.nvim"; 4970 - version = "2022-11-29"; 4970 + version = "2022-11-30"; 4971 4971 src = fetchFromGitHub { 4972 4972 owner = "folke"; 4973 4973 repo = "neoconf.nvim"; 4974 - rev = "875a412b17aa69ccf26a4c774b0300c06fc4c742"; 4975 - sha256 = "14i5vwqk8azxwjzijpv6kapzbh4hwpc8rcs71k32w8azkgj6g61r"; 4974 + rev = "681e89d58d46a7c63ee091fee32220373dda1072"; 4975 + sha256 = "000inylrbyyfc1lg1ajmi1rb2jrcisglgc44gk3cf9iv7v1515dd"; 4976 4976 }; 4977 4977 meta.homepage = "https://github.com/folke/neoconf.nvim/"; 4978 4978 }; ··· 5079 5079 src = fetchFromGitHub { 5080 5080 owner = "nvim-neorg"; 5081 5081 repo = "neorg"; 5082 - rev = "5613ff3f471d148c9824daeb359dfdc61ddaf992"; 5083 - sha256 = "0b0mrnvbmims22a4178vyj51s5m2qlgnf6z91389prjalzcnrhsc"; 5082 + rev = "5a536bc033d2ac1ef49ec4c875fd9811cceccb68"; 5083 + sha256 = "08gx5y34abpfmcmhhlmb44hi380cfyapbki32pv9xspq56ng8xpn"; 5084 5084 }; 5085 5085 meta.homepage = "https://github.com/nvim-neorg/neorg/"; 5086 5086 }; ··· 5135 5135 5136 5136 neotest = buildVimPluginFrom2Nix { 5137 5137 pname = "neotest"; 5138 - version = "2022-11-26"; 5138 + version = "2022-12-01"; 5139 5139 src = fetchFromGitHub { 5140 5140 owner = "nvim-neotest"; 5141 5141 repo = "neotest"; 5142 - rev = "b449394aa36b05eef6719162356c2ae531460bd9"; 5143 - sha256 = "12qmbkjivpf3yd3j8wsiw2s8rmdg9q8zqp4pdybgdqfywivf00km"; 5142 + rev = "a2559f07be901638d555c0d29d8ea22c81553653"; 5143 + sha256 = "177pf0ywxqmxr7472yvrmk579k5vgh5770d1j00r1d3k8yjsnqp4"; 5144 5144 }; 5145 5145 meta.homepage = "https://github.com/nvim-neotest/neotest/"; 5146 5146 }; ··· 5327 5327 5328 5328 noice-nvim = buildVimPluginFrom2Nix { 5329 5329 pname = "noice.nvim"; 5330 - version = "2022-11-24"; 5330 + version = "2022-11-29"; 5331 5331 src = fetchFromGitHub { 5332 5332 owner = "folke"; 5333 5333 repo = "noice.nvim"; 5334 - rev = "fa21685e23cbb72bb573eecf48dd3644bc1513ba"; 5335 - sha256 = "1vbm54fykn6xzndrrrb1bcymbwbmanifnsr693v5647k5hmsjc64"; 5334 + rev = "5ca31af06078d6188de7db1369c2b40d1b606d58"; 5335 + sha256 = "1a3n5341fcvjlkp3lv5x50a81z30zaxxw427dvkpjb7bp93rb8h4"; 5336 5336 }; 5337 5337 meta.homepage = "https://github.com/folke/noice.nvim/"; 5338 5338 }; ··· 5399 5399 5400 5400 null-ls-nvim = buildVimPluginFrom2Nix { 5401 5401 pname = "null-ls.nvim"; 5402 - version = "2022-11-23"; 5402 + version = "2022-11-30"; 5403 5403 src = fetchFromGitHub { 5404 5404 owner = "jose-elias-alvarez"; 5405 5405 repo = "null-ls.nvim"; 5406 - rev = "c51978f546a86a653f4a492b86313f4616412cec"; 5407 - sha256 = "0wkk5dxdmcgmgh7rak85x99n11w1pygryv66vki13f46wwnbm3m6"; 5406 + rev = "d4254b19e914e6278582d4555c57eb3d2abd9590"; 5407 + sha256 = "03f7m0v5mgpwwvy1qgijiiyvrfzk5n75a1nj5snl0vl8ivancmcs"; 5408 5408 }; 5409 5409 meta.homepage = "https://github.com/jose-elias-alvarez/null-ls.nvim/"; 5410 5410 }; ··· 5771 5771 5772 5772 nvim-hlslens = buildVimPluginFrom2Nix { 5773 5773 pname = "nvim-hlslens"; 5774 - version = "2022-11-19"; 5774 + version = "2022-11-30"; 5775 5775 src = fetchFromGitHub { 5776 5776 owner = "kevinhwang91"; 5777 5777 repo = "nvim-hlslens"; 5778 - rev = "a48ddd710c6daf9a2e90646978c99e5db500dfd3"; 5779 - sha256 = "0lk3gc8kicrz6xs57mpy1znxwi6wlc7zm44cg8q0yz7ka0f4520v"; 5778 + rev = "cad6ce2e0d4f9c26467712791a70fae9d0b0b6cf"; 5779 + sha256 = "122dkvvs7cgmba8l09vhnc6laabyv4qakm3931f4kscn6lb4kyzm"; 5780 5780 }; 5781 5781 meta.homepage = "https://github.com/kevinhwang91/nvim-hlslens/"; 5782 5782 }; ··· 5795 5795 5796 5796 nvim-jdtls = buildVimPluginFrom2Nix { 5797 5797 pname = "nvim-jdtls"; 5798 - version = "2022-11-01"; 5798 + version = "2022-11-30"; 5799 5799 src = fetchFromGitHub { 5800 5800 owner = "mfussenegger"; 5801 5801 repo = "nvim-jdtls"; 5802 - rev = "7bc572fc357d7dec8d3ca620b53e763776472582"; 5803 - sha256 = "10rm01cxc1xnw7m886ssnmb5ihlsfjhp6sqm9dhmrkg4ywkbhj9m"; 5802 + rev = "4ea8e66d61c9a7e40c40f4cc6051ebfbf4ce0d38"; 5803 + sha256 = "0wbfy0p7n7s8zp154p06n3nmqc5vxrmzz6abasvlisd8s2khk3g1"; 5804 5804 }; 5805 5805 meta.homepage = "https://github.com/mfussenegger/nvim-jdtls/"; 5806 5806 }; ··· 5855 5855 5856 5856 nvim-lint = buildVimPluginFrom2Nix { 5857 5857 pname = "nvim-lint"; 5858 - version = "2022-11-22"; 5858 + version = "2022-11-29"; 5859 5859 src = fetchFromGitHub { 5860 5860 owner = "mfussenegger"; 5861 5861 repo = "nvim-lint"; 5862 - rev = "ea8cae4a97b2127702d4b891c40c48d8230670e5"; 5863 - sha256 = "05qm8zgmh5q98hwmp0zc27wwmxnyady6v04kqd4b72cx00xnx0dw"; 5862 + rev = "2ef3b269546d751e4fc8c673ffddd6216421f4a1"; 5863 + sha256 = "03vdbxqa6z8471l0s65xa55n5hf1c1s59zvx1rn1kgy4h070022w"; 5864 5864 }; 5865 5865 meta.homepage = "https://github.com/mfussenegger/nvim-lint/"; 5866 5866 }; ··· 5879 5879 5880 5880 nvim-lspconfig = buildVimPluginFrom2Nix { 5881 5881 pname = "nvim-lspconfig"; 5882 - version = "2022-11-29"; 5882 + version = "2022-12-01"; 5883 5883 src = fetchFromGitHub { 5884 5884 owner = "neovim"; 5885 5885 repo = "nvim-lspconfig"; 5886 - rev = "faa011a24a6911332eeac6c253a0881c2e578628"; 5887 - sha256 = "0p95s77w41p2a4k2j6nqjjfn2kfjw23pa047lwj4byfdxmdykbj6"; 5886 + rev = "5e0bd39476d4e224dfe5ea6a6624ea3bb467a8bb"; 5887 + sha256 = "11lsa35v6qb1mvnac94i3acc428r6s2zk88i6qp3xz25slmd5773"; 5888 5888 }; 5889 5889 meta.homepage = "https://github.com/neovim/nvim-lspconfig/"; 5890 5890 }; ··· 6119 6119 6120 6120 nvim-treesitter = buildVimPluginFrom2Nix { 6121 6121 pname = "nvim-treesitter"; 6122 - version = "2022-11-29"; 6122 + version = "2022-12-01"; 6123 6123 src = fetchFromGitHub { 6124 6124 owner = "nvim-treesitter"; 6125 6125 repo = "nvim-treesitter"; 6126 - rev = "d05be3742e04601ac1219f575d7c44a21f671622"; 6127 - sha256 = "1ibr8g762v6qp44b068qd44sq9axnr0pmj73dadqhf3smma2g5l1"; 6126 + rev = "768532453ac30cbf792b492248a6c3be19b80af1"; 6127 + sha256 = "18lamsy039c90ycxh2gz1qi2ba4npkm1j4q2ibyzljml8kznhzg6"; 6128 6128 }; 6129 6129 meta.homepage = "https://github.com/nvim-treesitter/nvim-treesitter/"; 6130 6130 }; ··· 6419 6419 6420 6420 orgmode = buildVimPluginFrom2Nix { 6421 6421 pname = "orgmode"; 6422 - version = "2022-11-29"; 6422 + version = "2022-11-30"; 6423 6423 src = fetchFromGitHub { 6424 6424 owner = "nvim-orgmode"; 6425 6425 repo = "orgmode"; 6426 - rev = "bc1c96a00a931044b776dfba73710725231ab616"; 6427 - sha256 = "0lsanm40bwnn0va8ssl7jdjxx5s0g16dnq3r3mp660hwqdqlzv7w"; 6426 + rev = "fc9bb0f5823d01e4008e4b86663772d4148aa9ce"; 6427 + sha256 = "1vb0x89qr2kk5ma8syw4l56c6j2b7y2advyjykdli8psn6i7gsyf"; 6428 6428 }; 6429 6429 meta.homepage = "https://github.com/nvim-orgmode/orgmode/"; 6430 6430 }; ··· 6877 6877 6878 6878 rest-nvim = buildNeovimPluginFrom2Nix { 6879 6879 pname = "rest.nvim"; 6880 - version = "2022-11-25"; 6880 + version = "2022-11-29"; 6881 6881 src = fetchFromGitHub { 6882 6882 owner = "rest-nvim"; 6883 6883 repo = "rest.nvim"; 6884 - rev = "ce7aed035f0b82b72b00d33cff6ab3e445a06db8"; 6885 - sha256 = "1vcf9pf64gwinhqgha5vka939bigpa94vvghp5wx989lhs7l71gw"; 6884 + rev = "966b4a32f47475908b0fe88ea7b99042da7e2d86"; 6885 + sha256 = "1sv4zlmbrqxy04dm3v8x4xncz6kkgr51apcgv4lb16wj000bqvgp"; 6886 6886 }; 6887 6887 meta.homepage = "https://github.com/rest-nvim/rest.nvim/"; 6888 6888 }; ··· 7009 7009 7010 7010 satellite-nvim = buildVimPluginFrom2Nix { 7011 7011 pname = "satellite.nvim"; 7012 - version = "2022-11-27"; 7012 + version = "2022-11-30"; 7013 7013 src = fetchFromGitHub { 7014 7014 owner = "lewis6991"; 7015 7015 repo = "satellite.nvim"; 7016 - rev = "48cf0094018c0eb71c9a03c6b0a2bc46712f0526"; 7017 - sha256 = "0ql022slljcjhcly2zpfsxs33hv9ha0gmpij7zm8sqw6wchzigbm"; 7016 + rev = "3bcd90d5cf5e61b6f4a000aaad5b6aa79b9a8bc5"; 7017 + sha256 = "1s22ciz284za50yll9avghdfvnfmf7kgv4vrfpzh28qqy11vyj1s"; 7018 7018 }; 7019 7019 meta.homepage = "https://github.com/lewis6991/satellite.nvim/"; 7020 7020 }; ··· 7564 7564 7565 7565 tabby-nvim = buildVimPluginFrom2Nix { 7566 7566 pname = "tabby.nvim"; 7567 - version = "2022-11-22"; 7567 + version = "2022-11-30"; 7568 7568 src = fetchFromGitHub { 7569 7569 owner = "nanozuki"; 7570 7570 repo = "tabby.nvim"; 7571 - rev = "a7710f38ded0cda5b07e38f10c55ed1940b35b19"; 7572 - sha256 = "0vkh7v24j6fxc7v1fgk0xh3jlrcm8ps3zxms5lbsd2bgfbcm6p3n"; 7571 + rev = "ad80d32ba42b0c7f3a06b5754b7f669bf71eadf0"; 7572 + sha256 = "1pbbb8w164pzrlsglmc5pls8x1jp3zv97m74hxljpwkiqjzfzfjn"; 7573 7573 }; 7574 7574 meta.homepage = "https://github.com/nanozuki/tabby.nvim/"; 7575 7575 }; ··· 7661 7661 7662 7662 tagbar = buildVimPluginFrom2Nix { 7663 7663 pname = "tagbar"; 7664 - version = "2022-11-04"; 7664 + version = "2022-11-29"; 7665 7665 src = fetchFromGitHub { 7666 7666 owner = "preservim"; 7667 7667 repo = "tagbar"; 7668 - rev = "6c3e15ea4a1ef9619c248c2b1eced56a47b61a9e"; 7669 - sha256 = "1x47bxvxhw7c4g7ij86xs1zwmb61yr5wcrn3xm606x74c11ff650"; 7668 + rev = "af3ce7c3cec81f2852bdb0a0651d2485fcd01214"; 7669 + sha256 = "1r0vn0v74g8bgyz4ycc9z8clpkn6fdy5v65y7igizcrjzxd3nlpb"; 7670 7670 }; 7671 7671 meta.homepage = "https://github.com/preservim/tagbar/"; 7672 7672 }; ··· 7769 7769 7770 7770 telescope-file-browser-nvim = buildVimPluginFrom2Nix { 7771 7771 pname = "telescope-file-browser.nvim"; 7772 - version = "2022-10-16"; 7772 + version = "2022-11-30"; 7773 7773 src = fetchFromGitHub { 7774 7774 owner = "nvim-telescope"; 7775 7775 repo = "telescope-file-browser.nvim"; 7776 - rev = "2429ecfd2d76e3eb6c9f8d8ba2c6ce328975a95a"; 7777 - sha256 = "1rmxz31rbb4xiisnmgsmcmrx3r1cjhdrj82l99sdjp09cqavd2bw"; 7776 + rev = "8646e46b8545b9234e87083d124c0a4e4ed47735"; 7777 + sha256 = "01q34wrk00yxy4jcr666qmkdkpfib80rjbn921dkqqv2d1nalx9b"; 7778 7778 }; 7779 7779 meta.homepage = "https://github.com/nvim-telescope/telescope-file-browser.nvim/"; 7780 7780 }; ··· 7793 7793 7794 7794 telescope-fzf-native-nvim = buildVimPluginFrom2Nix { 7795 7795 pname = "telescope-fzf-native.nvim"; 7796 - version = "2022-09-06"; 7796 + version = "2022-11-30"; 7797 7797 src = fetchFromGitHub { 7798 7798 owner = "nvim-telescope"; 7799 7799 repo = "telescope-fzf-native.nvim"; 7800 - rev = "65c0ee3d4bb9cb696e262bca1ea5e9af3938fc90"; 7801 - sha256 = "0nyvhlalrgg6n793lp3yrxgszv5j0ln9sjbh45pxxg0wn15jxm45"; 7800 + rev = "7447fe780fed23402a3e0c3a227b549d7506ed38"; 7801 + sha256 = "101zcy6fjrpv19cghg464wrizh82b0ny7pc1mmqsfqw48hl37hwn"; 7802 7802 }; 7803 7803 meta.homepage = "https://github.com/nvim-telescope/telescope-fzf-native.nvim/"; 7804 7804 }; ··· 8235 8235 sha256 = "1pbv8c2wb6b2h9czx7c0c8v0q7v0wc4w9s6qgw7hcbqdl3jv1svh"; 8236 8236 }; 8237 8237 meta.homepage = "https://github.com/tjdevries/train.nvim/"; 8238 + }; 8239 + 8240 + treesj = buildVimPluginFrom2Nix { 8241 + pname = "treesj"; 8242 + version = "2022-12-01"; 8243 + src = fetchFromGitHub { 8244 + owner = "Wansmer"; 8245 + repo = "treesj"; 8246 + rev = "da296173b61330aebfd16129a5bf1263700014f1"; 8247 + sha256 = "1wbbxdf2k1vfrnfllms0g5mnsf5bhsipacfwa546sfnc41j360v9"; 8248 + }; 8249 + meta.homepage = "https://github.com/Wansmer/treesj/"; 8238 8250 }; 8239 8251 8240 8252 tremor-vim = buildVimPluginFrom2Nix { ··· 10123 10111 10124 10112 vim-go = buildVimPluginFrom2Nix { 10125 10113 pname = "vim-go"; 10126 - version = "2022-11-01"; 10114 + version = "2022-12-01"; 10127 10115 src = fetchFromGitHub { 10128 10116 owner = "fatih"; 10129 10117 repo = "vim-go"; 10130 - rev = "0550762a69a2ef13d9f723c9478155dbc6ad7ddb"; 10131 - sha256 = "185ysbbipqf6fivryi4pxjmdm4vfn319w1mgm3xpg2920scybwbq"; 10118 + rev = "8d7677947e0be1eecfa1bcf2c1148804963ec4f6"; 10119 + sha256 = "1f2xklijsxbc7f2y26ps6bwyhn5sxbmv8gwy66l7yhfbc0zvic0w"; 10132 10120 }; 10133 10121 meta.homepage = "https://github.com/fatih/vim-go/"; 10134 10122 }; ··· 12178 12166 12179 12167 vim-snippets = buildVimPluginFrom2Nix { 12180 12168 pname = "vim-snippets"; 12181 - version = "2022-11-22"; 12169 + version = "2022-12-01"; 12182 12170 src = fetchFromGitHub { 12183 12171 owner = "honza"; 12184 12172 repo = "vim-snippets"; 12185 - rev = "b904e5a68aeda29a0b6e09a6f61305a462ae2627"; 12186 - sha256 = "1dmfysd9vr2b6hf8nm95caw1fv16l1hvh0gb6a7nxnvvary1czs7"; 12173 + rev = "6173350127d56dcc5664f50320b3f522951f56e9"; 12174 + sha256 = "1a002y2pw76bh35q9z0rba3wnfcwgfmnii4gn3107wwfmfy50z55"; 12187 12175 }; 12188 12176 meta.homepage = "https://github.com/honza/vim-snippets/"; 12189 12177 }; ··· 12623 12611 12624 12612 vim-tridactyl = buildVimPluginFrom2Nix { 12625 12613 pname = "vim-tridactyl"; 12626 - version = "2022-02-10"; 12614 + version = "2022-11-30"; 12627 12615 src = fetchFromGitHub { 12628 12616 owner = "tridactyl"; 12629 12617 repo = "vim-tridactyl"; 12630 - rev = "f2eaa5d32614f6c35dad268dd4ed7ff33cae5070"; 12631 - sha256 = "139kl89k5alh8bpa4wywsmvjnxlxzsdbhxn2w8rvclhwgrhkzvgd"; 12618 + rev = "fdd069bde3a34c786abed4601b6d59a065590ad9"; 12619 + sha256 = "07km8yp0vsipw2amkxd0rjp9qz18g0b7bvsb2vj9vgkr8wc0d780"; 12632 12620 }; 12633 12621 meta.homepage = "https://github.com/tridactyl/vim-tridactyl/"; 12634 12622 }; ··· 12779 12767 12780 12768 vim-vsnip = buildVimPluginFrom2Nix { 12781 12769 pname = "vim-vsnip"; 12782 - version = "2022-11-14"; 12770 + version = "2022-11-30"; 12783 12771 src = fetchFromGitHub { 12784 12772 owner = "hrsh7th"; 12785 12773 repo = "vim-vsnip"; 12786 - rev = "6f873418c4dc601d8ad019a5906eddff5088de9b"; 12787 - sha256 = "0jw8580w0x515772gnyw6y922yp0hmxk84r67iw1mv50zbkmafgz"; 12774 + rev = "e44026b5394fd79aa0f2118aaf41627ef9c354ee"; 12775 + sha256 = "1a14msxri37xs29xq80fw9mh6g9ipmc9g4ik2p0x9r5h2pz2nsbq"; 12788 12776 }; 12789 12777 meta.homepage = "https://github.com/hrsh7th/vim-vsnip/"; 12790 12778 }; ··· 13188 13176 13189 13177 vista-vim = buildVimPluginFrom2Nix { 13190 13178 pname = "vista.vim"; 13191 - version = "2022-10-25"; 13179 + version = "2022-11-30"; 13192 13180 src = fetchFromGitHub { 13193 13181 owner = "liuchengxu"; 13194 13182 repo = "vista.vim"; 13195 - rev = "9ddb3707b066cb288aa1ac9c33477280e0ef95d3"; 13196 - sha256 = "03qls1ggnjqv38xg8sk2ssl02pibd2r2k36g0hxanx7zqq3nvgn0"; 13183 + rev = "33774aff5d8b224f24c2e4c6015c613c1a17bf74"; 13184 + sha256 = "0c3255id5wzgb1v5zsga7ig1b8mqmrbklmz40x98av4j5dqghfw7"; 13197 13185 }; 13198 13186 meta.homepage = "https://github.com/liuchengxu/vista.vim/"; 13199 13187 }; ··· 13489 13477 13490 13478 catppuccin-nvim = buildVimPluginFrom2Nix { 13491 13479 pname = "catppuccin-nvim"; 13492 - version = "2022-11-29"; 13480 + version = "2022-12-01"; 13493 13481 src = fetchFromGitHub { 13494 13482 owner = "catppuccin"; 13495 13483 repo = "nvim"; 13496 - rev = "0a166e60c41649596cc9831d31fcfc09b15f145a"; 13497 - sha256 = "1m5v6jbzgsj88mzsj5krmdjdz9s8xhpxxk7fr2lslb4g905bv9x3"; 13484 + rev = "4d2ed20bda0c07e9473c374826721ac16154698b"; 13485 + sha256 = "0xdxfpqlm68s6629h8j3pmpw4p7kfnsxlvbk5k3ii6f2yw0b8fd4"; 13498 13486 }; 13499 13487 meta.homepage = "https://github.com/catppuccin/nvim/"; 13500 13488 }; ··· 13513 13501 13514 13502 chad = buildVimPluginFrom2Nix { 13515 13503 pname = "chad"; 13516 - version = "2022-11-29"; 13504 + version = "2022-12-01"; 13517 13505 src = fetchFromGitHub { 13518 13506 owner = "ms-jpq"; 13519 13507 repo = "chadtree"; 13520 - rev = "c31f74ac908a07db943c683abaddbb01e4686ab3"; 13521 - sha256 = "0vmj02wyy8y1fsrql1zgj0c0csmqr4zwl4paa2zygzxc7mz6nncf"; 13508 + rev = "4c95882b5e3d67bf31f2b7ea996e0251966e43eb"; 13509 + sha256 = "002r53w9rq13lca4sw34631b526h2wvaf5x9l87kqq0ddm2nwslh"; 13522 13510 }; 13523 13511 meta.homepage = "https://github.com/ms-jpq/chadtree/"; 13524 13512 }; 13525 13513 13526 13514 dracula-vim = buildVimPluginFrom2Nix { 13527 13515 pname = "dracula-vim"; 13528 - version = "2022-11-07"; 13516 + version = "2022-11-30"; 13529 13517 src = fetchFromGitHub { 13530 13518 owner = "dracula"; 13531 13519 repo = "vim"; 13532 - rev = "b9f4f3a169266031d3744335595eee02a6e396c6"; 13533 - sha256 = "1a9vxpdh6ry9760m69762s5annq4k52k5bk9gy3v0lr4zyvfcfgf"; 13520 + rev = "947e5298766f30bdb813749bf867913b29a06eac"; 13521 + sha256 = "0yvahswdzqphay5wak2rlaqjaf44kylsvmx697slwp8h1846xchw"; 13534 13522 }; 13535 13523 meta.homepage = "https://github.com/dracula/vim/"; 13536 13524 };
+12 -12
pkgs/applications/editors/vim/plugins/nvim-treesitter/generated.nix
··· 670 670 }; 671 671 javascript = buildGrammar { 672 672 language = "javascript"; 673 - version = "cefdcea"; 673 + version = "7a29d06"; 674 674 source = fetchFromGitHub { 675 675 owner = "tree-sitter"; 676 676 repo = "tree-sitter-javascript"; 677 - rev = "cefdcea72a8cf86c1f10ca55e837397da07afdab"; 678 - hash = "sha256-o+th1Va11YtsHaA5IR9IAYRk3SDxTop0gxfSjR2u/o8="; 677 + rev = "7a29d06274b7cf87d643212a433d970b73969016"; 678 + hash = "sha256-fMPCHdfHHyg7yNi9LDA35z+WFfPRbctrh38dZV5qZt4="; 679 679 }; 680 680 meta.homepage = "https://github.com/tree-sitter/tree-sitter-javascript"; 681 681 }; ··· 1291 1291 }; 1292 1292 sql = buildGrammar { 1293 1293 language = "sql"; 1294 - version = "4f1b912"; 1294 + version = "41f1de2"; 1295 1295 source = fetchFromGitHub { 1296 1296 owner = "derekstride"; 1297 1297 repo = "tree-sitter-sql"; 1298 - rev = "4f1b91246b43190e34957d9de9a0f3625879ba33"; 1299 - hash = "sha256-g1dQ897JQwthConYMlGY25hsypr4weDsDCOWyafriw8="; 1298 + rev = "41f1de238b7b4a8cc9e118759881aad8585d36ad"; 1299 + hash = "sha256-LORSWO5Ui/Nq1SReERSWZ+BEtxKEJ545LPpA6HbY8Z4="; 1300 1300 }; 1301 1301 meta.homepage = "https://github.com/derekstride/tree-sitter-sql"; 1302 1302 }; ··· 1494 1494 }; 1495 1495 vhs = buildGrammar { 1496 1496 language = "vhs"; 1497 - version = "2f87b9d"; 1497 + version = "8a0df32"; 1498 1498 source = fetchFromGitHub { 1499 1499 owner = "charmbracelet"; 1500 1500 repo = "tree-sitter-vhs"; 1501 - rev = "2f87b9d973597e69552ecf6a4fe16470fbd8c44e"; 1502 - hash = "sha256-G1ytXVBeGN1606aFrPdNFp3Khlg/BTFq2VS176Knb7k="; 1501 + rev = "8a0df32b72a8cf8d3e3e84f16c19e9ba46d3dba5"; 1502 + hash = "sha256-bWI/MW7U5ht7jmL3BSm5HwD1BMDNGwkBShJIpRlhonI="; 1503 1503 }; 1504 1504 meta.homepage = "https://github.com/charmbracelet/tree-sitter-vhs"; 1505 1505 }; ··· 1527 1527 }; 1528 1528 wgsl = buildGrammar { 1529 1529 language = "wgsl"; 1530 - version = "af16e7d"; 1530 + version = "61d2604"; 1531 1531 source = fetchFromGitHub { 1532 1532 owner = "szebniok"; 1533 1533 repo = "tree-sitter-wgsl"; 1534 - rev = "af16e7d9e230004888fb52d33599ad38b4cf6052"; 1535 - hash = "sha256-rp6SqiGVAxlAbrYhNLhwqawjpFXZd2R4A4cNQx6qFZs="; 1534 + rev = "61d2604525d47238ecbce8aa38f10cb81ba68fd3"; 1535 + hash = "sha256-dSWQAJN9+EyqPbGZv9wTR8upsK56ZWu9jOpJkJtkabs="; 1536 1536 }; 1537 1537 meta.homepage = "https://github.com/szebniok/tree-sitter-wgsl"; 1538 1538 };
+1
pkgs/applications/editors/vim/plugins/vim-plugin-names
··· 690 690 https://github.com/folke/tokyonight.nvim/,, 691 691 https://github.com/markonm/traces.vim/,, 692 692 https://github.com/tjdevries/train.nvim/,, 693 + https://github.com/Wansmer/treesj/,main, 693 694 https://github.com/tremor-rs/tremor-vim/,, 694 695 https://github.com/cappyzawa/trim.nvim/,, 695 696 https://github.com/folke/trouble.nvim/,,
+16 -3
pkgs/applications/misc/visidata/default.nix
··· 20 20 , wcwidth 21 21 , zstandard 22 22 , setuptools 23 + , importlib-metadata 23 24 , git 24 25 , withPcap ? true, dpkt, dnslib 25 26 , withXclip ? stdenv.isLinux, xclip 27 + , testers 28 + , visidata 26 29 }: 27 30 buildPythonApplication rec { 28 31 pname = "visidata"; 29 - version = "2.9.1"; 32 + version = "2.10.2"; 30 33 31 34 src = fetchFromGitHub { 32 35 owner = "saulpw"; 33 36 repo = "visidata"; 34 37 rev = "v${version}"; 35 - hash = "sha256-PKj+imTSAGMpF1tkN0WmE3l/4FmWkm/ktIDzF2ku48s="; 38 + hash = "sha256-OKCrlUWHgbaLZJPVvs9lnw4cD27pRoO7F9oel1NzT6A="; 36 39 }; 37 40 38 41 propagatedBuildInputs = [ ··· 67 64 zstandard 68 65 odfpy 69 66 setuptools 67 + importlib-metadata 70 68 ] ++ lib.optionals withPcap [ dpkt dnslib ] 71 69 ++ lib.optional withXclip xclip; 72 70 ··· 79 75 doCheck = stdenv.buildPlatform == stdenv.hostPlatform; 80 76 81 77 checkPhase = '' 78 + runHook preCheck 82 79 # disable some tests which require access to the network 83 80 rm tests/load-http.vd # http 84 81 rm tests/graph-cursor-nosave.vd # http ··· 92 87 93 88 substituteInPlace dev/test.sh --replace "bin/vd" "$out/bin/vd" 94 89 bash dev/test.sh 90 + runHook postCheck 95 91 ''; 92 + 93 + pythonImportsCheck = ["visidata"]; 94 + 95 + passthru.tests.version = testers.testVersion { 96 + package = visidata; 97 + version = "v${version}"; 98 + }; 96 99 97 100 meta = { 98 101 description = "Interactive terminal multitool for tabular data"; 99 102 license = lib.licenses.gpl3; 100 103 maintainers = with lib.maintainers; [ raskin markus1189 ]; 101 - homepage = "http://visidata.org/"; 104 + homepage = "https://visidata.org/"; 102 105 changelog = "https://github.com/saulpw/visidata/blob/v${version}/CHANGELOG.md"; 103 106 }; 104 107 }
+2 -2
pkgs/applications/misc/zathura/cb/default.nix
··· 3 3 4 4 stdenv.mkDerivation rec { 5 5 pname = "zathura-cb"; 6 - version = "0.1.8"; 6 + version = "0.1.10"; 7 7 8 8 src = fetchurl { 9 9 url = "https://pwmt.org/projects/${pname}/download/${pname}-${version}.tar.xz"; 10 - sha256 = "1i6cf0vks501cggwvfsl6qb7mdaf3sszdymphimfvnspw810faj5"; 10 + sha256 = "1j5v32f9ki35v1jc7a067anhlgqplzrp4fqvznlixfhcm0bwmc49"; 11 11 }; 12 12 13 13 nativeBuildInputs = [ meson ninja pkg-config gettext ];
+2 -3
pkgs/applications/misc/zathura/core/default.nix
··· 10 10 11 11 stdenv.mkDerivation rec { 12 12 pname = "zathura"; 13 - version = "0.4.9"; 13 + version = "0.5.2"; 14 14 15 15 src = fetchurl { 16 16 url = "https://pwmt.org/projects/${pname}/download/${pname}-${version}.tar.xz"; 17 - sha256 = "0msy7s57mlx0wya99qpia4fpcy40pbj253kmx2y97nb0sqnc8c7w"; 17 + sha256 = "15314m9chmh5jkrd9vk2h2gwcwkcffv2kjcxkd4v3wmckz5sfjy6"; 18 18 }; 19 19 20 20 outputs = [ "bin" "man" "dev" "out" ]; ··· 23 23 # https://github.com/pwmt/zathura/blob/master/meson_options.txt 24 24 mesonFlags = [ 25 25 "-Dsqlite=enabled" 26 - "-Dmagic=enabled" 27 26 "-Dmanpages=enabled" 28 27 "-Dconvert-icon=enabled" 29 28 "-Dsynctex=enabled"
+2 -4
pkgs/applications/misc/zathura/pdf-mupdf/default.nix
··· 14 14 }: 15 15 16 16 stdenv.mkDerivation rec { 17 - version = "0.3.8"; 17 + version = "0.4.0"; 18 18 pname = "zathura-pdf-mupdf"; 19 19 20 20 src = fetchurl { 21 21 url = "https://pwmt.org/projects/${pname}/download/${pname}-${version}.tar.xz"; 22 - sha256 = "sha256-wgW0z1ANjP6ezqreVOX6jUzRKYzYXxem9QxkclkRYhc="; 22 + sha256 = "0pcjxvlh4hls8mjhjghhhihyy2kza8l27wdx0yq4bkd1g1b5f74c"; 23 23 }; 24 - 25 - patches = [ ./fix-mupdf-1.20.patch ]; 26 24 27 25 nativeBuildInputs = [ meson ninja pkg-config ]; 28 26
-24
pkgs/applications/misc/zathura/pdf-mupdf/fix-mupdf-1.20.patch
··· 1 - From 5a5bb2634812f4c0530f5688a06269aaa4cd11dd Mon Sep 17 00:00:00 2001 2 - From: Osama Rebach <osamarebach@gmail.com> 3 - Date: Fri, 19 Aug 2022 13:39:49 +0100 4 - Subject: [PATCH] fix fz_search_stext_page 5 - 6 - --- 7 - zathura-pdf-mupdf/search.c | 2 +- 8 - 1 file changed, 1 insertion(+), 1 deletion(-) 9 - 10 - diff --git a/zathura-pdf-mupdf/search.c b/zathura-pdf-mupdf/search.c 11 - index f84dea0..419e5f4 100644 12 - --- a/zathura-pdf-mupdf/search.c 13 - +++ b/zathura-pdf-mupdf/search.c 14 - @@ -41,7 +41,7 @@ pdf_page_search_text(zathura_page_t* page, void* data, const char* text, zathura 15 - 16 - fz_quad* hit_bbox = fz_malloc_array(mupdf_page->ctx, N_SEARCH_RESULTS, fz_quad); 17 - int num_results = fz_search_stext_page(mupdf_page->ctx, mupdf_page->text, 18 - - text, hit_bbox, N_SEARCH_RESULTS); 19 - + text, NULL, hit_bbox, N_SEARCH_RESULTS); 20 - 21 - fz_rect r; 22 - for (int i = 0; i < num_results; i++) { 23 - -- 24 - 2.37.1
+2 -2
pkgs/applications/misc/zathura/pdf-poppler/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "zathura-pdf-poppler"; 5 - version = "0.3.0"; 5 + version = "0.3.1"; 6 6 7 7 src = fetchurl { 8 8 url = "https://pwmt.org/projects/${pname}/download/${pname}-${version}.tar.xz"; 9 - sha256 = "1vfl4vkyy3rf39r1sqaa7y8113bgkh2bkfq3nn2inis9mrykmk6m"; 9 + sha256 = "12qhkshpp1wjfpjmjccsyi6wscqyqvaa19j85prjpyf65i9jg0gf"; 10 10 }; 11 11 12 12 nativeBuildInputs = [ meson ninja pkg-config zathura_core ];
+2 -2
pkgs/applications/misc/zathura/ps/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "zathura-ps"; 5 - version = "0.2.6"; 5 + version = "0.2.7"; 6 6 7 7 src = fetchurl { 8 8 url = "https://pwmt.org/projects/${pname}/download/${pname}-${version}.tar.xz"; 9 - sha256 = "0wygq89nyjrjnsq7vbpidqdsirjm6iq4w2rijzwpk2f83ys8bc3y"; 9 + sha256 = "0ilf63wxn1yzis9m3qs8mxbk316yxdzwxrrv86wpiygm9hhgk5sq"; 10 10 }; 11 11 12 12 nativeBuildInputs = [ meson ninja pkg-config gettext ];
+3 -3
pkgs/applications/networking/cluster/clusterctl/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "clusterctl"; 5 - version = "1.2.7"; 5 + version = "1.3.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "kubernetes-sigs"; 9 9 repo = "cluster-api"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-h8VZCCl28Vd2VB+enLY28t8rNbzdZo3Y4ybElNAkvKU="; 11 + sha256 = "sha256-lqHHZtEtedU0Qtm6o6iy6JrQ1UiB9nSTZVyfq0cj0vI="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-hhs/q0x5Qd7S18jX4SPVFPo+fsDE9snJVkiqKD+Qp74="; 14 + vendorSha256 = "sha256-7e2ZJa6MfzznOoaBq0xQIXrdmDAzPzKh9QFlRfbxYMM="; 15 15 16 16 subPackages = [ "cmd/clusterctl" ]; 17 17
+6 -6
pkgs/applications/networking/instant-messengers/zoom-us/default.nix
··· 47 47 # and often with different versions. We write them on three lines 48 48 # like this (rather than using {}) so that the updater script can 49 49 # find where to edit them. 50 - versions.aarch64-darwin = "5.12.3.11845"; 51 - versions.x86_64-darwin = "5.12.3.11845"; 52 - versions.x86_64-linux = "5.12.2.4816"; 50 + versions.aarch64-darwin = "5.12.9.13190"; 51 + versions.x86_64-darwin = "5.12.9.13190"; 52 + versions.x86_64-linux = "5.12.9.367"; 53 53 54 54 srcs = { 55 55 aarch64-darwin = fetchurl { 56 56 url = "https://zoom.us/client/${versions.aarch64-darwin}/zoomusInstallerFull.pkg?archType=arm64"; 57 57 name = "zoomusInstallerFull.pkg"; 58 - hash = "sha256-iDLxqG7/cdo60V0mFE3tX/Msi0rRUjoM8X9yq2rlvf0="; 58 + hash = "sha256-Htug/hmp0OjysUY4q8RO1oqjSsa2sgpqiAERr6ahBuw="; 59 59 }; 60 60 x86_64-darwin = fetchurl { 61 61 url = "https://zoom.us/client/${versions.x86_64-darwin}/zoomusInstallerFull.pkg"; 62 - hash = "sha256-+YOtdoh8S50+GHRLb6TPYCqDtry7SnnNqo7USzkDc7c="; 62 + hash = "sha256-nl+hrAZECaC5uceK8OZ/em3rY9pK4VrtezT6qCNmbCA="; 63 63 }; 64 64 x86_64-linux = fetchurl { 65 65 url = "https://zoom.us/client/${versions.x86_64-linux}/zoom_x86_64.pkg.tar.xz"; 66 - hash = "sha256-kgjooMqeZurzqIn3ADcgFjlqaC58dQNuIAHLx4M0S9I="; 66 + hash = "sha256-7B9wS0myf6QkDq4ooqWen03s/36BeF7cSsOzjDdIw8g="; 67 67 }; 68 68 }; 69 69
+5 -5
pkgs/applications/version-management/gitlab/data.json
··· 1 1 { 2 - "version": "15.6.0", 3 - "repo_hash": "sha256-7Pjksu1l2QfhpYieEGB9coypSt/0iMfptCa69Iaoe3s=", 2 + "version": "15.6.1", 3 + "repo_hash": "sha256-cdwfljmJvApU2q0pmWSmcMnHkQH4hfN7+cld5oP880g=", 4 4 "yarn_hash": "0lgl8rs9mlrwpzq75rywdbjbiib17wxvzlv1jibnx66iw1ym2rvh", 5 5 "owner": "gitlab-org", 6 6 "repo": "gitlab", 7 - "rev": "v15.6.0-ee", 7 + "rev": "v15.6.1-ee", 8 8 "passthru": { 9 - "GITALY_SERVER_VERSION": "15.6.0", 9 + "GITALY_SERVER_VERSION": "15.6.1", 10 10 "GITLAB_PAGES_VERSION": "1.63.0", 11 11 "GITLAB_SHELL_VERSION": "14.13.0", 12 - "GITLAB_WORKHORSE_VERSION": "15.6.0" 12 + "GITLAB_WORKHORSE_VERSION": "15.6.1" 13 13 }, 14 14 "vendored_gems": [ 15 15 "bundler-checksum",
+2 -2
pkgs/applications/version-management/gitlab/gitaly/default.nix
··· 11 11 gemdir = ./.; 12 12 }; 13 13 14 - version = "15.6.0"; 14 + version = "15.6.1"; 15 15 package_version = "v${lib.versions.major version}"; 16 16 gitaly_package = "gitlab.com/gitlab-org/gitaly/${package_version}"; 17 17 ··· 22 22 owner = "gitlab-org"; 23 23 repo = "gitaly"; 24 24 rev = "v${version}"; 25 - sha256 = "sha256-MQFvDSQhmlCz+ox9TFFEd+q2beDUXYVhIyEWWnxn7r0="; 25 + sha256 = "sha256-mzX+6kMXqdrxqMaUwN2tG5kJgKSRv0/tNN8ibHqBbzU="; 26 26 }; 27 27 28 28 vendorSha256 = "sha256-SEPfso27PHHpvnQwdeMQYECw/CZIa/NdpMBSTRJEwIo=";
+1 -1
pkgs/applications/version-management/gitlab/gitlab-workhorse/default.nix
··· 5 5 buildGoModule rec { 6 6 pname = "gitlab-workhorse"; 7 7 8 - version = "15.6.0"; 8 + version = "15.6.1"; 9 9 10 10 src = fetchFromGitLab { 11 11 owner = data.owner;
+1 -1
pkgs/applications/version-management/gitlab/rubyEnv/Gemfile
··· 500 500 gem 'spamcheck', '~> 1.0.0' 501 501 502 502 # Gitaly GRPC protocol definitions 503 - gem 'gitaly', '~> 15.5.0' 503 + gem 'gitaly', '~> 15.5.2' 504 504 505 505 # KAS GRPC protocol definitions 506 506 gem 'kas-grpc', '~> 0.0.2'
+2 -2
pkgs/applications/version-management/gitlab/rubyEnv/Gemfile.lock
··· 554 554 rails (>= 3.2.0) 555 555 git (1.11.0) 556 556 rchardet (~> 1.8) 557 - gitaly (15.5.0) 557 + gitaly (15.5.2) 558 558 grpc (~> 1.0) 559 559 gitlab (4.16.1) 560 560 httparty (~> 0.14, >= 0.14.0) ··· 1663 1663 gettext (~> 3.3) 1664 1664 gettext_i18n_rails (~> 1.8.0) 1665 1665 gettext_i18n_rails_js (~> 1.3) 1666 - gitaly (~> 15.5.0) 1666 + gitaly (~> 15.5.2) 1667 1667 gitlab-chronic (~> 0.10.5) 1668 1668 gitlab-dangerfiles (~> 3.6.2) 1669 1669 gitlab-experiment (~> 0.7.1)
+2 -2
pkgs/applications/version-management/gitlab/rubyEnv/gemset.nix
··· 2018 2018 platforms = []; 2019 2019 source = { 2020 2020 remotes = ["https://rubygems.org"]; 2021 - sha256 = "0hpgljz05rhik15z081ghxw9pw83vz78p12wjdgxj3qz1a4x8pfq"; 2021 + sha256 = "10bq1l9445b9ff921kyayrn5w1b0f7qm1sjia3wmnl54jq2vxfk2"; 2022 2022 type = "gem"; 2023 2023 }; 2024 - version = "15.5.0"; 2024 + version = "15.5.2"; 2025 2025 }; 2026 2026 gitlab = { 2027 2027 dependencies = ["httparty" "terminal-table"];
+50 -6
pkgs/applications/version-management/sapling/default.nix
··· 1 - { lib, stdenv, python3Packages, fetchFromGitHub, fetchurl, sd, curl, pkg-config, openssl, rustPlatform, fetchYarnDeps, yarn, nodejs, fixup_yarn_lock, glibcLocales }: 1 + { lib 2 + , stdenv 3 + , python38Packages 4 + , fetchFromGitHub 5 + , fetchurl 6 + , sd 7 + , curl 8 + , pkg-config 9 + , openssl 10 + , rustPlatform 11 + , fetchYarnDeps 12 + , yarn 13 + , nodejs 14 + , fixup_yarn_lock 15 + , glibcLocales 16 + , libiconv 17 + , CoreFoundation 18 + , CoreServices 19 + , Security 20 + }: 2 21 3 22 let 4 23 inherit (lib.importJSON ./deps.json) links version versionHash; 24 + # Sapling sets a Cargo config containing lines like so: 25 + # [target.aarch64-apple-darwin] 26 + # rustflags = ["-C", "link-args=-Wl,-undefined,dynamic_lookup"] 27 + # 28 + # The default cargo config that's set by the build hook will set 29 + # unstable.host-config and unstable.target-applies-to-host which seems to 30 + # result in the link arguments above being ignored and thus link failures. 31 + # All it is there to do anyway is just to do stuff with musl and cross 32 + # compilation, which doesn't work on macOS anyway so we can just stub it 33 + # on macOS. 34 + # 35 + # See https://github.com/NixOS/nixpkgs/pull/198311#issuecomment-1326894295 36 + myCargoSetupHook = rustPlatform.cargoSetupHook.overrideAttrs (old: { 37 + cargoConfig = if stdenv.isDarwin then "" else old.cargoConfig; 38 + }); 5 39 6 40 src = fetchFromGitHub { 7 41 owner = "facebook"; ··· 88 54 }; 89 55 90 56 # Builds the main `sl` binary and its Python extensions 91 - sapling = python3Packages.buildPythonPackage { 57 + # 58 + # FIXME(lf-): when next updating this package, delete the python 3.8 override 59 + # here, since the fix for https://github.com/facebook/sapling/issues/279 that 60 + # required it will be in the next release. 61 + sapling = python38Packages.buildPythonPackage { 92 62 pname = "sapling-main"; 93 63 inherit src version; 94 64 ··· 123 85 sed -i "s|https://files.pythonhosted.org/packages/[[:alnum:]]*/[[:alnum:]]*/[[:alnum:]]*/|file://$NIX_BUILD_TOP/$sourceRoot/hack_pydeps/|g" $sourceRoot/setup.py 124 86 ''; 125 87 126 - postFixup = '' 88 + postFixup = lib.optionalString stdenv.isLinux '' 127 89 wrapProgram $out/bin/sl \ 128 90 --set LOCALE_ARCHIVE "${glibcLocales}/lib/locale/locale-archive" 129 91 ''; ··· 132 94 curl 133 95 pkg-config 134 96 ] ++ (with rustPlatform; [ 135 - cargoSetupHook 97 + myCargoSetupHook 136 98 rust.cargo 137 99 rust.rustc 138 100 ]); 139 101 140 102 buildInputs = [ 103 + curl 141 104 openssl 105 + ] ++ lib.optionals stdenv.isDarwin [ 106 + libiconv 107 + CoreFoundation 108 + CoreServices 109 + Security 142 110 ]; 143 111 144 112 doCheck = false; ··· 168 124 169 125 cp -r ${sapling}/* $out 170 126 171 - sitepackages=$out/lib/${python3Packages.python.libPrefix}/site-packages 127 + sitepackages=$out/lib/${python38Packages.python.libPrefix}/site-packages 172 128 chmod +w $sitepackages 173 129 cp -r ${isl} $sitepackages/edenscm-isl 174 130 ··· 189 145 homepage = "https://sapling-scm.com"; 190 146 license = licenses.gpl2Only; 191 147 maintainers = with maintainers; [ pbar thoughtpolice ]; 192 - platforms = platforms.linux; 148 + platforms = platforms.unix; 193 149 mainProgram = "sl"; 194 150 }; 195 151 }
+2 -2
pkgs/applications/version-management/sourcehut/default.nix
··· 15 15 srht = self.callPackage ./core.nix { inherit fetchNodeModules; }; 16 16 17 17 buildsrht = self.callPackage ./builds.nix { }; 18 - dispatchsrht = self.callPackage ./dispatch.nix { }; 19 18 gitsrht = self.callPackage ./git.nix { }; 20 19 hgsrht = self.callPackage ./hg.nix { }; 21 20 hubsrht = self.callPackage ./hub.nix { }; ··· 32 33 inherit python; 33 34 coresrht = toPythonApplication srht; 34 35 buildsrht = toPythonApplication buildsrht; 35 - dispatchsrht = toPythonApplication dispatchsrht; 36 + # Added 2022-10-29 37 + dispatchsrht = throw "dispatch is deprecated. See https://sourcehut.org/blog/2022-08-01-dispatch-deprecation-plans/ for more information."; 36 38 gitsrht = toPythonApplication gitsrht; 37 39 hgsrht = toPythonApplication hgsrht; 38 40 hubsrht = toPythonApplication hubsrht;
-40
pkgs/applications/version-management/sourcehut/dispatch.nix
··· 1 - { lib 2 - , fetchFromSourcehut 3 - , buildPythonPackage 4 - , srht 5 - , pyyaml 6 - , PyGithub 7 - , python 8 - }: 9 - 10 - buildPythonPackage rec { 11 - pname = "dispatchsrht"; 12 - version = "0.15.34"; 13 - 14 - src = fetchFromSourcehut { 15 - owner = "~sircmpwn"; 16 - repo = "dispatch.sr.ht"; 17 - rev = version; 18 - sha256 = "sha256-bZ4ZKohMozZIyP0TUgxETOECib4XGUv29+Mg8ZsoMf8="; 19 - }; 20 - 21 - propagatedBuildInputs = [ 22 - srht 23 - pyyaml 24 - PyGithub 25 - ]; 26 - 27 - preBuild = '' 28 - export PKGVER=${version} 29 - export SRHT_PATH=${srht}/${python.sitePackages}/srht 30 - ''; 31 - 32 - pythonImportsCheck = [ "dispatchsrht" ]; 33 - 34 - meta = with lib; { 35 - homepage = "https://git.sr.ht/~sircmpwn/dispatch.sr.ht"; 36 - description = "Task dispatcher and service integration tool for the sr.ht network"; 37 - license = licenses.agpl3Only; 38 - maintainers = with maintainers; [ eadwu ]; 39 - }; 40 - }
+1 -1
pkgs/applications/version-management/sourcehut/update.sh
··· 67 67 # because the reported $oldHash to be changed 68 68 # may not actually be in $default_nix 69 69 # but in the file of one of its dependencies. 70 - services=( "srht" "scmsrht" "buildsrht" "dispatchsrht" "gitsrht" "hgsrht" "hubsrht" "listssrht" "mansrht" 70 + services=( "srht" "scmsrht" "buildsrht" "gitsrht" "hgsrht" "hubsrht" "listssrht" "mansrht" 71 71 "metasrht" "pagessrht" "pastesrht" "todosrht" ) 72 72 fi 73 73
+2 -2
pkgs/applications/video/obs-studio/plugins/obs-vkcapture.nix
··· 16 16 17 17 stdenv.mkDerivation rec { 18 18 pname = "obs-vkcapture"; 19 - version = "1.2.1"; 19 + version = "1.2.2"; 20 20 21 21 src = fetchFromGitHub { 22 22 owner = "nowrep"; 23 23 repo = pname; 24 24 rev = "v${version}"; 25 - hash = "sha256-FOyUgsHQlsjVGCct+ky189alVImoG+paqDKmGvnHoXo="; 25 + hash = "sha256-Ya4p0eXOTID1qmxokgSXdmBOd3nqzcOHM+pLqJi8LGg="; 26 26 }; 27 27 28 28 cmakeFlags = lib.optionals stdenv.isi686 [
+26
pkgs/development/compilers/gnostic/default.nix
··· 1 + { lib, buildGoModule, fetchFromGitHub }: 2 + 3 + buildGoModule rec { 4 + pname = "gnostic"; 5 + version = "0.6.8"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "google"; 9 + repo = pname; 10 + rev = "v${version}"; 11 + hash = "sha256-+/KZmwVV3pnbv3JNwNk9Q2gcTyDxV1tgsDzW5IYnnds="; 12 + }; 13 + 14 + vendorHash = "sha256-OoI1/OPBgAy4AysPPSCXGmf0S4opzxO7ZrwBsQYImwU="; 15 + 16 + # some tests are broken and others require network access 17 + doCheck = false; 18 + 19 + meta = with lib; { 20 + homepage = "https://github.com/google/gnostic"; 21 + description = "A compiler for APIs described by the OpenAPI Specification with plugins for code generation and other API support tasks"; 22 + changelog = "https://github.com/google/gnostic/releases/tag/v${version}"; 23 + license = licenses.asl20; 24 + maintainers = with maintainers; [ urandom ]; 25 + }; 26 + }
+8 -9
pkgs/development/compilers/mono/generic.nix
··· 1 - { lib, stdenv, fetchurl, bison, pkg-config, glib, gettext, perl, libgdiplus, libX11, callPackage, ncurses, zlib, withLLVM ? false, cacert, Foundation, libobjc, python3, version, sha256, autoconf, libtool, automake, cmake, which 1 + { lib, stdenv, fetchurl, bison, pkg-config, glib, gettext, perl, libgdiplus, libX11, callPackage, ncurses, zlib 2 + , withLLVM ? false, cacert, Foundation, libobjc, python3, version, sha256, autoconf, libtool, automake, cmake, which 2 3 , gnumake42 3 4 , enableParallelBuilding ? true 4 5 , srcArchiveSuffix ? "tar.bz2" ··· 7 6 }: 8 7 9 8 let 10 - llvm = callPackage ./llvm.nix { }; 9 + llvm = callPackage ./llvm.nix { }; 11 10 in 12 11 stdenv.mkDerivation rec { 13 12 pname = "mono"; ··· 19 18 }; 20 19 21 20 nativeBuildInputs = [ automake bison cmake pkg-config which gnumake42 ]; 22 - buildInputs = 23 - [ glib gettext perl libgdiplus libX11 ncurses zlib python3 autoconf libtool 24 - ] 25 - ++ (lib.optionals stdenv.isDarwin [ Foundation libobjc ]); 21 + buildInputs = [ 22 + glib gettext perl libgdiplus libX11 ncurses zlib python3 autoconf libtool 23 + ] ++ lib.optionals stdenv.isDarwin [ Foundation libobjc ]; 26 24 27 25 configureFlags = [ 28 26 "--x-includes=${libX11.dev}/include" 29 27 "--x-libraries=${libX11.out}/lib" 30 28 "--with-libgdiplus=${libgdiplus}/lib/libgdiplus.so" 31 - ] 32 - ++ lib.optionals withLLVM [ 29 + ] ++ lib.optionals withLLVM [ 33 30 "--enable-llvm" 34 31 "--with-llvm=${llvm}" 35 32 ]; 36 33 37 34 configurePhase = '' 38 - patchShebangs ./ 35 + patchShebangs autogen.sh mcs/build/start-compiler-server.sh 39 36 ./autogen.sh --prefix $out $configureFlags 40 37 ''; 41 38
+1 -1
pkgs/development/interpreters/python/manylinux/default.nix
··· 65 65 manylinux1Libs = getLibOutputs(manylinux2010Libs // (with pkgs; { 66 66 "libpanelw.so.5" = ncurses5; 67 67 "libncursesw.so.5" = ncurses5; 68 - "libcrypt.so.1" = glibc; 68 + "libcrypt.so.1" = libxcrypt; 69 69 })); 70 70 71 71 in {
+2 -2
pkgs/development/java-modules/postgresql_jdbc/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "postgresql-jdbc"; 5 - version = "42.5.0"; 5 + version = "42.5.1"; 6 6 7 7 src = fetchMavenArtifact { 8 8 artifactId = "postgresql"; 9 9 groupId = "org.postgresql"; 10 - sha256 = "sha256-pNGLWrGuuShaixezZfQk8mhEUinKv45BIRXbYVK33uM="; 10 + sha256 = "sha256-iei/+os3uUh5RgEsaQzwTzEDlTBRwcGT2I7ja2jTZa4="; 11 11 inherit version; 12 12 }; 13 13
+8 -7
pkgs/development/libraries/libdbi-drivers/default.nix
··· 1 1 { lib, stdenv, fetchurl, libdbi 2 + # TODO: migrate away from overriding packages to null 2 3 , libmysqlclient ? null 3 4 , sqlite ? null 4 5 , postgresql ? null 5 6 }: 6 7 7 - with lib; 8 8 stdenv.mkDerivation rec { 9 9 pname = "libdbi-drivers"; 10 10 version = "0.9.0"; ··· 14 14 sha256 = "0m680h8cc4428xin4p733azysamzgzcmv4psjvraykrsaz6ymlj3"; 15 15 }; 16 16 17 - buildInputs = [ libdbi sqlite postgresql ] ++ optional (libmysqlclient != null) libmysqlclient; 17 + buildInputs = [ libdbi sqlite postgresql ] ++ lib.optional (libmysqlclient != null) libmysqlclient; 18 18 19 19 postPatch = '' 20 20 sed -i '/SQLITE3_LIBS/ s/-lsqlite/-lsqlite3/' configure; ··· 27 27 "--enable-libdbi" 28 28 "--with-dbi-incdir=${libdbi}/include" 29 29 "--with-dbi-libdir=${libdbi}/lib" 30 - ] ++ optionals (libmysqlclient != null) [ 30 + ] ++ lib.optionals (libmysqlclient != null) [ 31 31 "--with-mysql" 32 - "--with-mysql-incdir=${getDev libmysqlclient}/include/mysql" 32 + "--with-mysql-incdir=${lib.getDev libmysqlclient}/include/mysql" 33 33 "--with-mysql-libdir=${libmysqlclient}/lib/mysql" 34 - ] ++ optionals (sqlite != null) [ 34 + ] ++ lib.optionals (sqlite != null) [ 35 35 "--with-sqlite3" 36 36 "--with-sqlite3-incdir=${sqlite.dev}/include/sqlite" 37 37 "--with-sqlite3-libdir=${sqlite.out}/lib/sqlite" 38 - ] ++ optionals (postgresql != null) [ 38 + ] ++ lib.optionals (postgresql != null) [ 39 39 "--with-pgsql" 40 40 "--with-pgsql_incdir=${postgresql}/include" 41 41 "--with-pgsql_libdir=${postgresql.lib}/lib" ··· 54 54 rm -rf $out/var 55 55 ''; 56 56 57 - meta = { 57 + meta = with lib; { 58 58 homepage = "http://libdbi-drivers.sourceforge.net/"; 59 59 description = "Database drivers for libdbi"; 60 60 platforms = platforms.all; 61 61 license = licenses.lgpl21; 62 + maintainers = with maintainers; [ ]; 62 63 }; 63 64 }
+1 -1
pkgs/development/libraries/spirv-headers/default.nix
··· 20 20 ''; 21 21 22 22 meta = with lib; { 23 - inherit (src.meta) homepage; 24 23 description = "Machine-readable components of the Khronos SPIR-V Registry"; 24 + homepage = "https://github.com/KhronosGroup/SPIRV-Headers"; 25 25 license = licenses.mit; 26 26 maintainers = [ maintainers.ralith ]; 27 27 };
+2 -2
pkgs/development/python-modules/openstacksdk/default.nix
··· 19 19 20 20 buildPythonPackage rec { 21 21 pname = "openstacksdk"; 22 - version = "0.102.0"; 22 + version = "0.103.0"; 23 23 format = "setuptools"; 24 24 25 25 disabled = pythonOlder "3.6"; 26 26 27 27 src = fetchPypi { 28 28 inherit pname version; 29 - hash = "sha256-sqGP66eerCrDRpyNr+AdQAjIrDC+OkxrUydbTxxroq0="; 29 + hash = "sha256-T58RiYZgOWdDXzl2s+BZlQpxvY5BqDFsyK+y2WaKB0E="; 30 30 }; 31 31 32 32 propagatedBuildInputs = [
+2 -1
pkgs/development/python-modules/openstacksdk/tests.nix
··· 13 13 , testscenarios 14 14 }: 15 15 16 - buildPythonPackage rec { 16 + buildPythonPackage { 17 17 pname = "openstacksdk-tests"; 18 18 inherit (openstacksdk) version; 19 + format = "other"; 19 20 20 21 src = openstacksdk.src; 21 22
+4 -3
pkgs/development/python-modules/pycfdns/default.nix
··· 7 7 8 8 buildPythonPackage rec { 9 9 pname = "pycfdns"; 10 - version = "2.0.0"; 10 + version = "2.0.1"; 11 11 format = "setuptools"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "ludeeus"; 15 15 repo = pname; 16 - rev = version; 17 - sha256 = "sha256-2vjeoI+IqvCIHb51BLkuTISbG0PxFGHlmpSiCaV+E0w="; 16 + rev = "refs/tags/${version}"; 17 + hash = "sha256-f6kxYX/dg16OWYpw29dH4Z26ncLZCYyHKGc4fzoCld0="; 18 18 }; 19 19 20 20 propagatedBuildInputs = [ ··· 32 32 meta = with lib; { 33 33 description = "Python module for updating Cloudflare DNS A records"; 34 34 homepage = "https://github.com/ludeeus/pycfdns"; 35 + changelog = "https://github.com/ludeeus/pycfdns/releases/tag/${version}"; 35 36 license = with licenses; [ mit ]; 36 37 maintainers = with maintainers; [ fab ]; 37 38 };
+3 -2
pkgs/development/python-modules/pyoctoprintapi/default.nix
··· 12 12 13 13 let 14 14 pname = "pyoctoprintapi"; 15 - version = "0.1.9"; 15 + version = "0.1.10"; 16 16 in 17 17 buildPythonPackage { 18 18 inherit pname version; ··· 22 22 owner = "rfleming71"; 23 23 repo = pname; 24 24 rev = "refs/tags/v${version}"; 25 - hash = "sha256-kZMTHw0S12aUn/DYQuyjQa48QtiwLGYyY4gYKA5063A="; 25 + hash = "sha256-aXT8BY7D7Tx3UG7Brfpk8yQv1opXQUsgJteNkBwHeYY="; 26 26 }; 27 27 28 28 propagatedBuildInputs = [ ··· 41 41 meta = with lib; { 42 42 description = "Simple async wrapper around the Octoprint API"; 43 43 homepage = "https://github.com/rfleming71/pyoctoprintapi"; 44 + changelog = "https://github.com/rfleming71/pyoctoprintapi/releases/tag/v${version}"; 44 45 license = licenses.mit; 45 46 maintainers= with maintainers; [ hexa ]; 46 47 };
+3 -3
pkgs/development/tools/nil/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "nil"; 5 - version = "2022-11-15"; 5 + version = "2022-12-01"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "oxalica"; 9 9 repo = pname; 10 10 rev = version; 11 - hash = "sha256-KzQmGCEaOACOqaE1LsVZsqn18XpjlUbGWztDEI+o++w="; 11 + hash = "sha256-E/QGmoL7Q3GDR2/I5o2CAMHMcmPQEJAySke1s+nOaho="; 12 12 }; 13 13 14 - cargoHash = "sha256-t5HfL7DKMcWJGod6x30NoHYYlAza++fEdEVvfvFWems="; 14 + cargoHash = "sha256-T3i86L6cF6uFbSs7xtKHGzB6XrE9jn2RZghxFzDleXU="; 15 15 16 16 CFG_DATE = version; 17 17 CFG_REV = "release";
+24
pkgs/development/tools/rust/cargo-apk/default.nix
··· 1 + { lib 2 + , stdenv 3 + , rustPlatform 4 + , fetchCrate 5 + }: 6 + 7 + rustPlatform.buildRustPackage rec { 8 + pname = "cargo-apk"; 9 + version = "0.9.6"; 10 + 11 + src = fetchCrate { 12 + inherit pname version; 13 + sha256 = "sha256-1vCrM+0SNefd7FrRXnSjLhM3/MSVJfcL4k1qAstX+/A="; 14 + }; 15 + 16 + cargoSha256 = "sha256-rGn3MKbqIRWayarsgedIOhuTTl8lyRsRxn7BN5Id97w="; 17 + 18 + meta = with lib; { 19 + description = "Tool for creating Android packages"; 20 + homepage = "https://github.com/rust-windowing/android-ndk-rs"; 21 + license = with licenses;[ mit asl20 ]; 22 + maintainers = with maintainers; [ nickcao ]; 23 + }; 24 + }
+1 -1
pkgs/development/tools/spirv-tools/default.nix
··· 38 38 ''; 39 39 40 40 meta = with lib; { 41 - inherit (src.meta) homepage; 42 41 description = "The SPIR-V Tools project provides an API and commands for processing SPIR-V modules"; 42 + homepage = "https://github.com/KhronosGroup/SPIRV-Tools"; 43 43 license = licenses.asl20; 44 44 platforms = platforms.unix; 45 45 maintainers = [ maintainers.ralith ];
+3 -3
pkgs/development/web/deno/default.nix
··· 17 17 18 18 rustPlatform.buildRustPackage rec { 19 19 pname = "deno"; 20 - version = "1.28.2"; 20 + version = "1.28.3"; 21 21 22 22 src = fetchFromGitHub { 23 23 owner = "denoland"; 24 24 repo = pname; 25 25 rev = "v${version}"; 26 - sha256 = "sha256-gmDR8KNpx+M66Rv8fooTQOY42ekYl+KwIQ/5jDvYQho="; 26 + sha256 = "sha256-Rkzr5Y50Z2A+TeWCrrC6GUvu8/x6IgDxvd8D6mKbIGE="; 27 27 }; 28 - cargoSha256 = "sha256-emf6Q3WQM8W0yPvuNXPeuRC7FOt8QJ/+b5kMzyd3ZCU="; 28 + cargoSha256 = "sha256-n2K0CghobLri69oMrs8nCNSwq/5eH3YlzLtC9JRriQ8="; 29 29 30 30 postPatch = '' 31 31 # upstream uses lld on aarch64-darwin for faster builds
+5 -5
pkgs/development/web/deno/librusty_v8.nix
··· 11 11 }; 12 12 in 13 13 fetch_librusty_v8 { 14 - version = "0.55.0"; 14 + version = "0.58.0"; 15 15 shas = { 16 - x86_64-linux = "sha256-HztOb1r/9tWh0w4zQveBLOh3d6OfnSwQZkIx6drXJ7M="; 17 - aarch64-linux = "sha256-rP0K875V4f4yHe7unUCpMCQbi7Fips6474gFZph73Ys="; 18 - x86_64-darwin = "sha256-iiYttjs9h84YqZG8prxudTTi588BuoqA3zc2LkEks5E="; 19 - aarch64-darwin = "sha256-RBA3fl3YdCqxb00xgl6KTYdbvl75U5Kgrux5N+dZg/g="; 16 + x86_64-linux = "sha256-x4KLjexiLobbrLBvrE99XsVIw2LcUuu2Huk7nRBLRM4="; 17 + aarch64-linux = "sha256-HSRLRF86nriU5ZkuZhQcqLFFMO4bstP8bR2tgF2XvbU="; 18 + x86_64-darwin = "sha256-dHrotM/my1DQYGvHHQm726JgaLbC64IvwJGKgw9kZMM="; 19 + aarch64-darwin = "sha256-QDBF/ssxXMIWEZHSv7e/E75XZVPx/MvGvGI/C45q2bE="; 20 20 }; 21 21 }
+1 -1
pkgs/games/blobby/blobby.sh
··· 7 7 ( cd ~/.blobby; for i in *.zip; do @unzip@/bin/unzip "$i"; done ) 8 8 } 9 9 10 - @out@/bin/blobby.bin 10 + exec @out@/bin/blobby.bin "$@"
+5 -2
pkgs/games/blobby/default.nix
··· 1 - { lib, stdenv, fetchurl, SDL2, SDL2_image, libGLU, libGL, cmake, physfs, boost, zip, zlib, pkg-config }: 1 + { lib, stdenv, fetchurl, SDL2, SDL2_image, libGLU, libGL, cmake, physfs, boost, zip, zlib, unzip, pkg-config }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "blobby-volley"; ··· 16 16 sed -e '1i#include <iostream>' -i src/NetworkMessage.cpp 17 17 ''; 18 18 19 + inherit unzip; 20 + 19 21 postInstall = '' 20 22 cp ../data/Icon.bmp "$out/share/blobby/" 21 23 mv "$out/bin"/blobby{,.bin} ··· 30 28 license = licenses.bsd3; 31 29 platforms = platforms.linux; 32 30 maintainers = with maintainers; [ raskin ]; 33 - homepage = "http://blobby.sourceforge.net/"; 31 + homepage = "https://blobbyvolley.de/"; 34 32 downloadPage = "https://sourceforge.net/projects/blobby/files/Blobby%20Volley%202%20%28Linux%29/"; 33 + mainProgram = "blobby"; 35 34 }; 36 35 }
+3 -3
pkgs/servers/libreddit/default.nix
··· 8 8 9 9 rustPlatform.buildRustPackage rec { 10 10 pname = "libreddit"; 11 - version = "0.24.1"; 11 + version = "0.24.2"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "libreddit"; 15 15 repo = pname; 16 16 rev = "refs/tags/v${version}"; 17 - hash = "sha256-LS9yUjKv0GxK6wGo0f5jHAn7vyo+tvgHd3NWLYpAQOs="; 17 + hash = "sha256-TT0DTD/X4cHIZGrwxyqOOFevAHwqYfmIJ13+oscQpws="; 18 18 }; 19 19 20 - cargoSha256 = "sha256-14tJLhWITCz/e+XuCww2GVZ+sXy08LQe+DpL4tkLUzE="; 20 + cargoSha256 = "sha256-RAToJZTaWVnxGdWSJdLSJ7JUPT+l5VfPzvNOhXgdneY="; 21 21 22 22 buildInputs = lib.optional stdenv.isDarwin [ 23 23 Security
+2 -2
pkgs/servers/mpd/default.nix
··· 116 116 117 117 in stdenv.mkDerivation rec { 118 118 pname = "mpd"; 119 - version = "0.23.9"; 119 + version = "0.23.11"; 120 120 121 121 src = fetchFromGitHub { 122 122 owner = "MusicPlayerDaemon"; 123 123 repo = "MPD"; 124 124 rev = "v${version}"; 125 - sha256 = "sha256-eYP4+WDYwAw7TboS9V8ncdQoAC0vbjSaZxmru1Unejw="; 125 + sha256 = "sha256-vgLH4kOluK9cOmTrvpBfR87Iunn0EzH9GmiUvsjsG4I="; 126 126 }; 127 127 128 128 buildInputs = [
+2 -2
pkgs/servers/web-apps/dolibarr/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "dolibarr"; 5 - version = "16.0.1"; 5 + version = "16.0.3"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "Dolibarr"; 9 9 repo = "dolibarr"; 10 10 rev = version; 11 - sha256 = "sha256-67Ox0DP4vfiz8GgD3nfa4FyB6Qrqkc2zt1iMS584CWs="; 11 + sha256 = "sha256-Zkjmm2DAaAGQc1IigMYDpE5b+YaYU8oFMHZSqBEBsRw="; 12 12 }; 13 13 14 14 dontBuild = true;
+1 -1
pkgs/servers/zoneminder/default.nix
··· 122 122 ''; 123 123 124 124 buildInputs = [ 125 - curl ffmpeg glib libjpeg libselinux libsepol mp4v2 libmysqlclient mariadb.client pcre perl polkit x264 zlib 125 + curl ffmpeg glib libjpeg libselinux libsepol mp4v2 libmysqlclient mariadb pcre perl polkit x264 zlib 126 126 util-linuxMinimal # for libmount 127 127 ] ++ (with perlPackages; [ 128 128 # build-time dependencies
+60
pkgs/tools/security/crowdsec/default.nix
··· 1 + { lib, buildGoModule, fetchFromGitHub, installShellFiles }: 2 + 3 + buildGoModule rec { 4 + pname = "crowdsec"; 5 + version = "1.4.2"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "crowdsecurity"; 9 + repo = pname; 10 + rev = "v${version}"; 11 + hash = "sha256-hL3+hTOuwcbxiVZeq9oZjfKI1TJJt64g+74NolA3Drc="; 12 + }; 13 + 14 + vendorHash = "sha256-FPsoufB9UDgBDIE3yUq4doBse3qgjP19ussYnMAxntk="; 15 + 16 + nativeBuildInputs = [ installShellFiles ]; 17 + 18 + subPackages = [ 19 + "cmd/crowdsec" 20 + "cmd/crowdsec-cli" 21 + ]; 22 + 23 + ldflags = [ 24 + "-s" 25 + "-w" 26 + "-X github.com/crowdsecurity/crowdsec/pkg/cwversion.Version=v${version}" 27 + "-X github.com/crowdsecurity/crowdsec/pkg/cwversion.BuildDate=1970-01-01_00:00:00" 28 + ]; 29 + 30 + postBuild = "mv $GOPATH/bin/{crowdsec-cli,cscli}"; 31 + 32 + postInstall = '' 33 + mkdir -p $out/share/crowdsec 34 + cp -r ./config $out/share/crowdsec/ 35 + 36 + installShellCompletion --cmd cscli \ 37 + --bash <($out/bin/cscli completion bash) \ 38 + --fish <($out/bin/cscli completion fish) \ 39 + --zsh <($out/bin/cscli completion zsh) 40 + ''; 41 + 42 + meta = with lib; { 43 + homepage = "https://crowdsec.net/"; 44 + changelog = "https://github.com/crowdsecurity/crowdsec/releases/tag/v${version}"; 45 + description = "CrowdSec is a free, open-source and collaborative IPS"; 46 + longDescription = '' 47 + CrowdSec is a free, modern & collaborative behavior detection engine, 48 + coupled with a global IP reputation network. It stacks on fail2ban's 49 + philosophy but is IPV6 compatible and 60x faster (Go vs Python), uses Grok 50 + patterns to parse logs and YAML scenario to identify behaviors. CrowdSec 51 + is engineered for modern Cloud/Containers/VM based infrastructures (by 52 + decoupling detection and remediation). Once detected you can remedy 53 + threats with various bouncers (firewall block, nginx http 403, Captchas, 54 + etc.) while the aggressive IP can be sent to CrowdSec for curation before 55 + being shared among all users to further improve everyone's security. 56 + ''; 57 + license = licenses.mit; 58 + maintainers = with maintainers; [ jk urandom ]; 59 + }; 60 + }
+8 -1
pkgs/top-level/all-packages.nix
··· 4049 4049 4050 4050 crossplane = with python3Packages; toPythonApplication crossplane; 4051 4051 4052 + crowdsec = callPackage ../tools/security/crowdsec { }; 4053 + 4052 4054 crunch = callPackage ../tools/security/crunch { }; 4053 4055 4054 4056 crudini = callPackage ../tools/misc/crudini { }; ··· 14529 14527 14530 14528 glslang = callPackage ../development/compilers/glslang { }; 14531 14529 14530 + gnostic = callPackage ../development/compilers/gnostic {}; 14531 + 14532 14532 go-junit-report = callPackage ../development/tools/go-junit-report { }; 14533 14533 14534 14534 gobang = callPackage ../development/tools/database/gobang { ··· 15185 15181 15186 15182 cargo-about = callPackage ../development/tools/rust/cargo-about { }; 15187 15183 cargo-all-features = callPackage ../development/tools/rust/cargo-all-features { }; 15184 + cargo-apk = callPackage ../development/tools/rust/cargo-apk { }; 15188 15185 cargo-audit = callPackage ../development/tools/rust/cargo-audit { 15189 15186 inherit (darwin.apple_sdk.frameworks) Security; 15190 15187 }; ··· 30438 30433 inherit (darwin.apple_sdk.frameworks) ApplicationServices; 30439 30434 }; 30440 30435 30441 - sapling = callPackage ../applications/version-management/sapling { }; 30436 + sapling = callPackage ../applications/version-management/sapling { 30437 + inherit (darwin.apple_sdk.frameworks) CoreFoundation CoreServices Security; 30438 + }; 30442 30439 30443 30440 mercurialFull = mercurial.override { fullBuild = true; }; 30444 30441