···591591592592`stdenv.mkDerivation` sets the Nix [derivation](https://nixos.org/manual/nix/stable/expressions/derivations.html#derivations)'s builder to a script that loads the stdenv `setup.sh` bash library and calls `genericBuild`. Most packaging functions rely on this default builder.
593593594594-This generic command invokes a number of *phases*. Package builds are split into phases to make it easier to override specific parts of the build (e.g., unpacking the sources or installing the binaries).
594594+This generic command either invokes a script at *buildCommandPath*, or a *buildCommand*, or a number of *phases*. Package builds are split into phases to make it easier to override specific parts of the build (e.g., unpacking the sources or installing the binaries).
595595596596Each phase can be overridden in its entirety either by setting the environment variable `namePhase` to a string containing some shell commands to be executed, or by redefining the shell function `namePhase`. The former is convenient to override a phase from the derivation, while the latter is convenient from a build script. However, typically one only wants to *add* some commands to a phase, e.g. by defining `postInstall` or `preFixup`, as skipping some of the default actions may have unexpected consequences. The default script for each phase is defined in the file `pkgs/stdenv/generic/setup.sh`.
597597
···11{ config, lib, pkgs, ... }:
2233-with lib;
44-53let
6475 cfg = config.programs.mosh;
···97in
108{
119 options.programs.mosh = {
1212- enable = mkOption {
1313- description = lib.mdDoc ''
1414- Whether to enable mosh. Note, this will open ports in your firewall!
1515- '';
1616- default = false;
1717- type = lib.types.bool;
1010+ enable = lib.mkEnableOption "mosh";
1111+ openFirewall = lib.mkEnableOption "" // {
1212+ description = "Whether to automatically open the necessary ports in the firewall.";
1313+ default = true;
1814 };
1919- withUtempter = mkOption {
1515+ withUtempter = lib.mkEnableOption "" // {
2016 description = lib.mdDoc ''
2117 Whether to enable libutempter for mosh.
1818+2219 This is required so that mosh can write to /var/run/utmp (which can be queried with `who` to display currently connected user sessions).
2320 Note, this will add a guid wrapper for the group utmp!
2421 '';
2522 default = true;
2626- type = lib.types.bool;
2723 };
2824 };
29253030- config = mkIf cfg.enable {
3131- environment.systemPackages = with pkgs; [ mosh ];
3232- networking.firewall.allowedUDPPortRanges = [ { from = 60000; to = 61000; } ];
3333- security.wrappers = mkIf cfg.withUtempter {
2626+ config = lib.mkIf cfg.enable {
2727+ environment.systemPackages = [ pkgs.mosh ];
2828+ networking.firewall.allowedUDPPortRanges = lib.optional cfg.openFirewall { from = 60000; to = 61000; };
2929+ security.wrappers = lib.mkIf cfg.withUtempter {
3430 utempter = {
3531 source = "${pkgs.libutempter}/lib/utempter/utempter";
3632 owner = "root";
+21-3
nixos/modules/programs/starship.nix
···4444 config = mkIf cfg.enable {
4545 programs.bash.${initOption} = ''
4646 if [[ $TERM != "dumb" ]]; then
4747- export STARSHIP_CONFIG=${settingsFile}
4747+ # don't set STARSHIP_CONFIG automatically if there's a user-specified
4848+ # config file. starship appears to use a hardcoded config location
4949+ # rather than one inside an XDG folder:
5050+ # https://github.com/starship/starship/blob/686bda1706e5b409129e6694639477a0f8a3f01b/src/configure.rs#L651
5151+ if [[ ! -f "$HOME/.config/starship.toml" ]]; then
5252+ export STARSHIP_CONFIG=${settingsFile}
5353+ fi
4854 eval "$(${pkgs.starship}/bin/starship init bash)"
4955 fi
5056 '';
51575258 programs.fish.${initOption} = ''
5359 if test "$TERM" != "dumb"
5454- set -x STARSHIP_CONFIG ${settingsFile}
6060+ # don't set STARSHIP_CONFIG automatically if there's a user-specified
6161+ # config file. starship appears to use a hardcoded config location
6262+ # rather than one inside an XDG folder:
6363+ # https://github.com/starship/starship/blob/686bda1706e5b409129e6694639477a0f8a3f01b/src/configure.rs#L651
6464+ if not test -f "$HOME/.config/starship.toml";
6565+ set -x STARSHIP_CONFIG ${settingsFile}
6666+ end
5567 eval (${pkgs.starship}/bin/starship init fish)
5668 end
5769 '';
58705971 programs.zsh.${initOption} = ''
6072 if [[ $TERM != "dumb" ]]; then
6161- export STARSHIP_CONFIG=${settingsFile}
7373+ # don't set STARSHIP_CONFIG automatically if there's a user-specified
7474+ # config file. starship appears to use a hardcoded config location
7575+ # rather than one inside an XDG folder:
7676+ # https://github.com/starship/starship/blob/686bda1706e5b409129e6694639477a0f8a3f01b/src/configure.rs#L651
7777+ if [[ ! -f "$HOME/.config/starship.toml" ]]; then
7878+ export STARSHIP_CONFIG=${settingsFile}
7979+ fi
6280 eval "$(${pkgs.starship}/bin/starship init zsh)"
6381 fi
6482 '';
···3737 license = licenses.asl20;
3838 description = "A web based code review and repository management for the git version control system";
3939 sourceProvenance = with sourceTypes; [ binaryBytecode ];
4040- maintainers = with maintainers; [ flokli jammerful zimbatm ];
4040+ maintainers = with maintainers; [ flokli zimbatm ];
4141 platforms = platforms.unix;
4242 };
4343}
···149149 done
150150 fi
151151152152+ # propagate /etc from the actual host if nested
153153+ if [[ -e /.host-etc ]]; then
154154+ ro_mounts+=(--ro-bind /.host-etc /.host-etc)
155155+ else
156156+ ro_mounts+=(--ro-bind /etc /.host-etc)
157157+ fi
158158+152159 for i in ${lib.escapeShellArgs etcBindEntries}; do
153160 if [[ "''${etc_ignored[@]}" =~ "$i" ]]; then
154161 continue
···193200 ${lib.optionalString unshareCgroup "--unshare-cgroup"}
194201 ${lib.optionalString dieWithParent "--die-with-parent"}
195202 --ro-bind /nix /nix
196196- --ro-bind /etc /.host-etc
197203 ${lib.optionalString privateTmp "--tmpfs /tmp"}
198204 # Our glibc will look for the cache in its own path in `/nix/store`.
199205 # As such, we need a cache to exist there, because pressure-vessel
···9696 workspace_manifest, crate_manifest["target"][key]
9797 )
98989999+ if (
100100+ "lints" in crate_manifest
101101+ and "workspace" in crate_manifest["lints"]
102102+ and crate_manifest["lints"]["workspace"] is True
103103+ ):
104104+ crate_manifest["lints"] = workspace_manifest["lints"]
105105+99106 if not changed:
100107 return
101108
···16161717 meta = with lib; {
1818 description = "A forked version of log4cpp that has been created for the Shibboleth project";
1919- maintainers = [ maintainers.jammerful ];
1919+ maintainers = [ ];
2020 license = licenses.lgpl21;
2121 homepage = "http://log4cpp.sf.net";
2222 };
···2828 description = "A low-level library written in C++ that provides support for producing and consuming SAML messages";
2929 platforms = platforms.unix;
3030 license = licenses.asl20;
3131- maintainers = [ maintainers.jammerful ];
3131+ maintainers = [ ];
3232 };
3333}
···1515 buildHashes = builtins.fromJSON (builtins.readFile ./hashes.json);
16161717 # the version of infisical
1818- version = "0.14.3";
1818+ version = "0.16.3";
19192020 # the platform-specific, statically linked binary
2121 src =