···108109# postgresql: move packages.nix to ext/default.nix
110719034f6f6749d624faa28dff259309fc0e3e730
000
···108109# postgresql: move packages.nix to ext/default.nix
110719034f6f6749d624faa28dff259309fc0e3e730
111+112+# pkgs/os-specific/bsd: Reformat with nixfmt-rfc-style 2024-03-01
113+3fe3b055adfc020e6a923c466b6bcd978a13069a
+1
.github/workflows/check-nix-format.yml
···32 # Each environment variable beginning with NIX_FMT_PATHS_ is a list of
33 # paths to check with nixfmt.
34 env:
035 NIX_FMT_PATHS_MPVSCRIPTS: pkgs/applications/video/mpv/scripts
36 # Format paths related to the Nixpkgs CUDA ecosystem.
37 NIX_FMT_PATHS_CUDA: |
···32 # Each environment variable beginning with NIX_FMT_PATHS_ is a list of
33 # paths to check with nixfmt.
34 env:
35+ NIX_FMT_PATHS_BSD: pkgs/os-specific/bsd
36 NIX_FMT_PATHS_MPVSCRIPTS: pkgs/applications/video/mpv/scripts
37 # Format paths related to the Nixpkgs CUDA ecosystem.
38 NIX_FMT_PATHS_CUDA: |
+2
nixos/doc/manual/release-notes/rl-2405.section.md
···285 "mysecret"` becomes `services.aria2.rpcSecretFile = "/path/to/secret_file"`
286 where the file `secret_file` contains the string `mysecret`.
28700288- `openssh`, `openssh_hpn` and `openssh_gssapi` are now compiled without support for the DSA signature algorithm as it is being deprecated upstream. Users still relying on DSA keys should consider upgrading
289 to another signature algorithm. However, for the time being it is possible to restore DSA key support using `override` to set `dsaKeysSupport = true`.
290
···285 "mysecret"` becomes `services.aria2.rpcSecretFile = "/path/to/secret_file"`
286 where the file `secret_file` contains the string `mysecret`.
287288+- The `system.forbiddenDependenciesRegex` option has been renamed to `system.forbiddenDependenciesRegexes` and now has the type of `listOf string` instead of `string` to accept multiple regexes.
289+290- `openssh`, `openssh_hpn` and `openssh_gssapi` are now compiled without support for the DSA signature algorithm as it is being deprecated upstream. Users still relying on DSA keys should consider upgrading
291 to another signature algorithm. However, for the time being it is possible to restore DSA key support using `override` to set `dsaKeysSupport = true`.
292
+1-1
nixos/modules/profiles/perlless.nix
···2627 # Check that the system does not contain a Nix store path that contains the
28 # string "perl".
29- system.forbiddenDependenciesRegex = "perl";
3031}
···2627 # Check that the system does not contain a Nix store path that contains the
28 # string "perl".
29+ system.forbiddenDependenciesRegexes = ["perl"];
3031}
···360 serviceConfig = let
361 runOptions = ''--config ${configPath} ${optionalString (cfg.adapter != null) "--adapter ${cfg.adapter}"}'';
362 in {
0363 # https://www.freedesktop.org/software/systemd/man/systemd.service.html#ExecStart=
364 # If the empty string is assigned to this option, the list of commands to start is reset, prior assignments of this option will have no effect.
365 ExecStart = [ "" ''${cfg.package}/bin/caddy run ${runOptions} ${optionalString cfg.resume "--resume"}'' ];
···367 ExecReload = [ "" ''${cfg.package}/bin/caddy reload ${runOptions} --force'' ];
368 User = cfg.user;
369 Group = cfg.group;
370- ReadWriteDirectories = cfg.dataDir;
371 StateDirectory = mkIf (cfg.dataDir == "/var/lib/caddy") [ "caddy" ];
372 LogsDirectory = mkIf (cfg.logDir == "/var/log/caddy") [ "caddy" ];
373 Restart = "on-failure";
···360 serviceConfig = let
361 runOptions = ''--config ${configPath} ${optionalString (cfg.adapter != null) "--adapter ${cfg.adapter}"}'';
362 in {
363+ # Override the `ExecStart` line from upstream's systemd unit file by our own:
364 # https://www.freedesktop.org/software/systemd/man/systemd.service.html#ExecStart=
365 # If the empty string is assigned to this option, the list of commands to start is reset, prior assignments of this option will have no effect.
366 ExecStart = [ "" ''${cfg.package}/bin/caddy run ${runOptions} ${optionalString cfg.resume "--resume"}'' ];
···368 ExecReload = [ "" ''${cfg.package}/bin/caddy reload ${runOptions} --force'' ];
369 User = cfg.user;
370 Group = cfg.group;
371+ ReadWritePaths = [ cfg.dataDir ];
372 StateDirectory = mkIf (cfg.dataDir == "/var/lib/caddy") [ "caddy" ];
373 LogsDirectory = mkIf (cfg.logDir == "/var/log/caddy") [ "caddy" ];
374 Restart = "on-failure";
···1{ lib
2, stdenv
3, fetchFromGitHub
4+, writeShellScript
5, cmake
6, ogre
7, freetype
···1415stdenv.mkDerivation {
16 pname = "cegui";
17+ version = "0-unstable-2023-03-18";
1819 src = fetchFromGitHub {
20 owner = "paroj";
···4849 passthru.updateScript = unstableGitUpdater {
50 branch = "v0";
51+ # The above branch is separate from the branch with the latest tags, so the updater doesn't pick them up
52+ # This is what would be used to handle upstream's format, if it was able to see the tags
53+ # tagConverter = writeShellScript "cegui-tag-converter.sh" ''
54+ # sed -e 's/^v//g' -e 's/-/./g'
55+ # '';
56+ hardcodeZeroVersion = true;
57 };
5859 meta = with lib; {
···1-{ makeSetupHook, writeText, stat }:
000023# stat isn't in POSIX, and NetBSD stat supports a completely
4# different range of flags than GNU stat, so including it in PATH
5# breaks stdenv. Work around that with a hook that will point
6# NetBSD's build system and NetBSD stat without including it in
7# PATH.
8-makeSetupHook {
9- name = "netbsd-stat-hook";
10-} (writeText "netbsd-stat-hook-impl" ''
11- makeFlagsArray+=(TOOL_STAT=${stat}/bin/stat)
12-'')
···1+{
2+ makeSetupHook,
3+ writeText,
4+ stat,
5+}:
67# stat isn't in POSIX, and NetBSD stat supports a completely
8# different range of flags than GNU stat, so including it in PATH
9# breaks stdenv. Work around that with a hook that will point
10# NetBSD's build system and NetBSD stat without including it in
11# PATH.
12+makeSetupHook { name = "netbsd-stat-hook"; } (
13+ writeText "netbsd-stat-hook-impl" ''
14+ makeFlagsArray+=(TOOL_STAT=${stat}/bin/stat)
15+ ''
16+)
···1-{ makeSetupHook, writeText, stat }:
000023# stat isn't in POSIX, and NetBSD stat supports a completely
4# different range of flags than GNU stat, so including it in PATH
···6# NetBSD's build system and NetBSD stat without including it in
7# PATH.
89-makeSetupHook {
10- name = "netbsd-stat-hook";
11-} (writeText "netbsd-stat-hook-impl" ''
12- makeFlagsArray+=(TOOL_STAT=${stat}/bin/stat)
13-'')
14-
···1+{
2+ makeSetupHook,
3+ writeText,
4+ stat,
5+}:
67# stat isn't in POSIX, and NetBSD stat supports a completely
8# different range of flags than GNU stat, so including it in PATH
···10# NetBSD's build system and NetBSD stat without including it in
11# PATH.
1213+makeSetupHook { name = "netbsd-stat-hook"; } (
14+ writeText "netbsd-stat-hook-impl" ''
15+ makeFlagsArray+=(TOOL_STAT=${stat}/bin/stat)
16+ ''
17+)
0
···4 # the frontend version corresponding to a specific home-assistant version can be found here
5 # https://github.com/home-assistant/home-assistant/blob/master/homeassistant/components/frontend/manifest.json
6 pname = "home-assistant-frontend";
7- version = "20240501.0";
8 format = "wheel";
910 src = fetchPypi {
···12 pname = "home_assistant_frontend";
13 dist = "py3";
14 python = "py3";
15- hash = "sha256-W3EiDkm/Se63/Ph4HUSRj2pY+y/pyCqecs4azYcxsaw=";
16 };
1718 # there is nothing to strip in this package
···4 # the frontend version corresponding to a specific home-assistant version can be found here
5 # https://github.com/home-assistant/home-assistant/blob/master/homeassistant/components/frontend/manifest.json
6 pname = "home-assistant-frontend";
7+ version = "20240501.1";
8 format = "wheel";
910 src = fetchPypi {
···12 pname = "home_assistant_frontend";
13 dist = "py3";
14 python = "py3";
15+ hash = "sha256-d/mlZfMri0E4lgMrIt3cRqpF3F12Xr7YuHqTogFON9E=";
16 };
1718 # there is nothing to strip in this package