Merge master into staging-next

Changed files
+509 -220
maintainers
nixos
doc
manual
release-notes
modules
config
services
display-managers
monitoring
prometheus
tests
pkgs
applications
science
math
mathematica
by-name
an
ansel
bl
bloaty
c2
c2ffi
ch
co
contour
copilot-language-server
cr
crosvm
da
darktable
fi
fittrackee
fl
flaresolverr
go
go-sendxmpp
h2
in
iv
km
kminion
lu
lunar-client
rs
rsstail-py
so
solanum
te
terra
tetragon
tr
tracee
development
beam-modules
compilers
flutter
engine
haskell-modules
libraries
mobile
androidenv
python-modules
accelerate
shiboken2
wasmer
tools
build-managers
wasmedge
os-specific
linux
servers
sql
postgresql
ext
tools
package-management
top-level
+6
maintainers/maintainer-list.nix
···
githubId = 51356;
name = "Mathieu Boespflug";
+
mBornand = {
+
email = "dev.mbornand@systemb.ch";
+
github = "mBornand";
+
githubId = 63592189;
+
name = "Marc Bornand";
+
};
mbprtpmnr = {
name = "mbprtpmnr";
email = "mbprtpmnr@pm.me";
+2
nixos/doc/manual/release-notes/rl-2511.section.md
···
- [conman](https://github.com/dun/conman), a serial console management program. Available as [services.conman](#opt-services.conman.enable).
+
- [KMinion](https://github.com/redpanda-data/kminion), feature-rich Prometheus exporter for Apache Kafka. Available as [services.prometheus.exporters.kafka](options.html#opt-services.prometheus.exporters.kafka).
+
## Backward Incompatibilities {#sec-release-25.11-incompatibilities}
<!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. -->
+1 -1
nixos/modules/config/malloc.nix
···
or (throw "scudo not supported on ${pkgs.stdenv.hostPlatform.system}");
in
{
-
libPath = "${pkgs.llvmPackages_14.compiler-rt}/lib/linux/libclang_rt.scudo-${systemPlatform}.so";
+
libPath = "${pkgs.llvmPackages.compiler-rt}/lib/linux/libclang_rt.scudo-${systemPlatform}.so";
description = ''
A user-mode allocator based on LLVM Sanitizer’s CombinedAllocator,
which aims at providing additional mitigations against heap based
+23 -1
nixos/modules/services/display-managers/greetd.nix
···
because every greetd restart will trigger the autologin again.
'';
};
+
+
useTextGreeter = lib.mkOption {
+
type = lib.types.bool;
+
default = false;
+
description = ''
+
Whether the greeter uses text-based user interfaces (For example, tuigreet).
+
+
When set to true, some systemd service configuration will be adjusted to avoid systemd boot messages interrupt TUI.
+
'';
+
};
};
config = lib.mkIf cfg.enable {
···
KeyringMode = "shared";
Type = "idle";
-
};
+
}
+
// (lib.optionalAttrs cfg.useTextGreeter {
+
StandardInput = "tty";
+
StandardOutput = "tty";
+
# Without this errors will spam on screen
+
StandardError = "journal";
+
+
# Without these bootlogs will spam on screen
+
TTYPath = "/dev/tty1";
+
TTYReset = true;
+
TTYVHangup = true;
+
TTYVTDisallocate = true;
+
});
# Don't kill a user session when using nixos-rebuild
restartIfChanged = false;
+1
nixos/modules/services/monitoring/prometheus/exporters.nix
···
"jitsi"
"json"
"junos-czerwonk"
+
"kafka"
"kea"
"keylight"
"klipper"
+56
nixos/modules/services/monitoring/prometheus/exporters/kafka.nix
···
+
{
+
config,
+
lib,
+
pkgs,
+
...
+
}:
+
+
let
+
cfg = config.services.prometheus.exporters.kafka;
+
inherit (lib)
+
mkIf
+
mkOption
+
mkMerge
+
types
+
concatStringsSep
+
;
+
in
+
{
+
port = 8080;
+
+
extraOpts = {
+
package = lib.mkPackageOption pkgs "kminion" { };
+
+
environmentFile = mkOption {
+
type = with types; nullOr path;
+
default = null;
+
description = ''
+
File containing the credentials to access the repository, in the
+
format of an EnvironmentFile as described by systemd.exec(5)
+
'';
+
};
+
};
+
serviceOpts = mkMerge (
+
[
+
{
+
serviceConfig = {
+
ExecStart = ''
+
${lib.getExe cfg.package}
+
'';
+
EnvironmentFile = mkIf (cfg.environmentFile != null) cfg.environmentFile;
+
RestartSec = "5s";
+
RestrictAddressFamilies = [
+
"AF_INET"
+
"AF_INET6"
+
];
+
};
+
}
+
]
+
++ [
+
(mkIf config.services.apache-kafka.enable {
+
after = [ "apache-kafka.service" ];
+
requires = [ "apache-kafka.service" ];
+
})
+
]
+
);
+
}
+1 -1
nixos/tests/all-tests.nix
···
privoxy = runTest ./privoxy.nix;
prometheus = import ./prometheus { inherit runTest; };
prometheus-exporters = handleTest ./prometheus-exporters.nix { };
-
prosody = handleTest ./xmpp/prosody.nix { };
+
prosody = runTest ./xmpp/prosody.nix;
prosody-mysql = handleTest ./xmpp/prosody-mysql.nix { };
proxy = runTest ./proxy.nix;
prowlarr = runTest ./prowlarr.nix;
+57
nixos/tests/prometheus-exporters.nix
···
'';
};
+
kafka = {
+
exporterConfig = {
+
enable = true;
+
environmentFile = pkgs.writeTextFile {
+
name = "/tmp/prometheus-kafka-exporter.env";
+
text = ''
+
KAFKA_BROKERS="localhost:9092"
+
'';
+
};
+
};
+
metricProvider = {
+
services.apache-kafka = {
+
enable = true;
+
+
clusterId = "pHG8aWuXSfWAibHFDCnsCQ";
+
+
formatLogDirs = true;
+
+
settings = {
+
"node.id" = 1;
+
"process.roles" = [
+
"broker"
+
"controller"
+
];
+
"listeners" = [
+
"PLAINTEXT://:9092"
+
"CONTROLLER://:9093"
+
];
+
"listener.security.protocol.map" = [
+
"PLAINTEXT:PLAINTEXT"
+
"CONTROLLER:PLAINTEXT"
+
];
+
"controller.quorum.voters" = [
+
"1@localhost:9093"
+
];
+
"controller.listener.names" = [ "CONTROLLER" ];
+
"log.dirs" = [ "/var/lib/apache-kafka" ];
+
};
+
};
+
+
systemd.services.apache-kafka.serviceConfig.StateDirectory = "apache-kafka";
+
};
+
exporterTest = ''
+
wait_for_unit("apache-kafka")
+
wait_for_open_port(9092)
+
wait_for_open_port(9093)
+
wait_for_unit("prometheus-kafka-exporter.service")
+
wait_for_open_port(8080)
+
wait_until_succeeds(
+
"journalctl -o cat -u prometheus-kafka-exporter.service | grep '\"version\":\"${pkgs.kminion.version}\"'"
+
)
+
succeed(
+
"curl -sSf http://localhost:8080/metrics | grep 'kminion_exporter_up'"
+
)
+
'';
+
};
+
knot = {
exporterConfig = {
enable = true;
+26 -3
nixos/tests/xmpp/ejabberd.nix
···
cert =
pkgs:
pkgs.runCommand "selfSignedCerts" { buildInputs = [ pkgs.openssl ]; } ''
-
openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -nodes -subj '/CN=example.com/CN=muc.example.com/CN=matrix.example.com' -days 36500
+
openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -nodes -subj '/CN=example.com/CN=muc.example.com/CN=matrix.example.com' -addext "subjectAltName = DNS:example.com,DNS:muc.example.com,DNS:matrix.example.com" -days 36500
mkdir -p $out
cp key.pem cert.pem $out
'';
···
maintainers = [ ];
};
nodes = {
-
client =
+
client-a =
+
{ nodes, pkgs, ... }:
+
{
+
security.pki.certificateFiles = [ "${cert pkgs}/cert.pem" ];
+
networking.extraHosts = ''
+
${nodes.server.networking.primaryIPAddress} example.com
+
'';
+
+
imports = [ ./go-sendxmpp-listen.nix ];
+
};
+
+
client-b =
{ nodes, pkgs, ... }:
{
security.pki.certificateFiles = [ "${cert pkgs}/cert.pem" ];
···
})
];
};
+
server =
{ config, pkgs, ... }:
{
···
ejabberd_prefix + "register cthon98 example.com nothunter2",
)
server.fail(ejabberd_prefix + "register asdf wrong.domain")
-
client.succeed("send-message")
+
+
for machine in client_a, client_b:
+
machine.systemctl("start network-online.target")
+
machine.wait_for_unit("network-online.target")
+
+
client_a.wait_for_unit("go-sendxmpp-listen")
+
client_b.succeed("send-message")
+
+
client_a.wait_until_succeeds(
+
"journalctl -o cat -u go-sendxmpp-listen.service | grep 'cthon98@example.com: Hello, this is dog.'"
+
)
+
server.succeed(
ejabberd_prefix + "unregister cthon98 example.com",
ejabberd_prefix + "unregister azurediamond example.com",
+22
nixos/tests/xmpp/go-sendxmpp-listen.nix
···
+
{ lib, pkgs, ... }:
+
+
{
+
systemd.services.go-sendxmpp-listen = {
+
after = [ "network-online.target" ];
+
requires = [ "network-online.target" ];
+
wantedBy = [ "multi-user.target" ];
+
+
serviceConfig = {
+
ExecStart = ''
+
${lib.getExe pkgs.go-sendxmpp} --username azurediamond@example.com --password hunter2 --listen
+
'';
+
Environment = [
+
"HOME=/var/lib/go-sendxmpp/"
+
];
+
DynamicUser = true;
+
Restart = "on-failure";
+
RestartSec = "5s";
+
StateDirectory = "go-sendxmpp";
+
};
+
};
+
}
+28 -4
nixos/tests/xmpp/prosody.nix
···
+
{ ... }:
+
let
cert =
pkgs:
pkgs.runCommand "selfSignedCerts" { buildInputs = [ pkgs.openssl ]; } ''
openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -nodes -days 365 \
-
-subj '/C=GB/CN=example.com' -addext "subjectAltName = DNS:example.com,DNS:uploads.example.com,DNS:conference.example.com"
+
-subj '/C=GB/CN=example.com/CN=uploads.example.com/CN=conference.example.com' -addext "subjectAltName = DNS:example.com,DNS:uploads.example.com,DNS:conference.example.com"
mkdir -p $out
cp key.pem cert.pem $out
'';
···
prosodyctl deluser azurediamond@example.com
'';
in
-
import ../make-test-python.nix {
+
{
name = "prosody";
nodes = {
-
client =
+
client-a =
+
{ nodes, pkgs, ... }:
+
{
+
security.pki.certificateFiles = [ "${cert pkgs}/cert.pem" ];
+
networking.extraHosts = ''
+
${nodes.server.networking.primaryIPAddress} example.com
+
'';
+
+
imports = [ ./go-sendxmpp-listen.nix ];
+
};
+
+
client-b =
{
nodes,
pkgs,
···
server.succeed('prosodyctl status | grep "Prosody is running"')
server.succeed("create-prosody-users")
-
client.succeed("send-message")
+
+
for machine in client_a, client_b:
+
machine.systemctl("start network-online.target")
+
machine.wait_for_unit("network-online.target")
+
+
client_a.wait_for_unit("go-sendxmpp-listen")
+
client_b.succeed("send-message")
+
+
client_a.wait_until_succeeds(
+
"journalctl -o cat -u go-sendxmpp-listen.service | grep 'cthon98@example.com: Hello, this is dog.'"
+
)
+
server.succeed("delete-prosody-users")
'';
}
+2 -2
pkgs/applications/science/math/mathematica/generic.nix
···
libuuid,
libxkbcommon,
libxml2,
-
llvmPackages_13,
+
llvmPackages,
matio,
mpfr,
ncurses,
···
libuuid
libxkbcommon
libxml2
-
llvmPackages_13.libllvm.lib
+
llvmPackages.libllvm.lib
matio
mpfr
ncurses
+57 -57
pkgs/by-name/an/ansel/package.nix
···
{
-
libsepol,
-
libavif,
bash,
+
cmake,
+
colord,
+
colord-gtk,
curl,
-
librsvg,
-
libselinux,
-
util-linux,
-
libwebp,
-
libheif,
-
lib,
-
stdenv,
+
dav1d,
+
desktop-file-utils,
+
exiftool,
+
exiv2,
fetchFromGitHub,
-
libxslt,
-
libxml2,
-
cmake,
-
exiftool,
-
openexr,
glib,
-
python3Packages,
-
perlPackages,
-
lensfun,
+
gmic,
+
graphicsmagick,
+
gtk3,
+
icu,
intltool,
-
pkg-config,
-
desktop-file-utils,
-
libffi,
-
gtk3,
-
libjpeg,
-
pugixml,
-
pcre,
-
pcre2,
-
lcms,
-
sqlite,
-
json-glib,
+
isocodes,
jasper,
-
libsecret,
-
gmic,
-
icu,
-
colord,
-
colord-gtk,
+
json-glib,
+
lcms,
+
lensfun,
+
lerc,
+
lib,
libaom,
+
libavif,
libdatrie,
-
libsysprof-capture,
libde265,
-
isocodes,
-
libpsl,
libepoxy,
-
libsoup_2_4,
-
exiv2,
-
libXtst,
+
libffi,
+
libgcrypt,
+
libgpg-error,
+
libheif,
+
libjpeg,
+
libpsl,
+
librsvg,
+
libsecret,
+
libselinux,
+
libsepol,
+
libsoup_3,
+
libsysprof-capture,
libthai,
-
x265,
+
libwebp,
libXdmcp,
+
libxkbcommon,
+
libxml2,
+
libXtst,
+
llvmPackages,
+
openexr,
openjpeg,
-
libgpg-error,
-
libxkbcommon,
osm-gps-map,
-
wrapGAppsHook3,
+
pcre2,
+
perlPackages,
+
pkg-config,
+
pugixml,
+
python3Packages,
rav1e,
-
dav1d,
-
libgcrypt,
-
graphicsmagick,
+
saxon,
+
sqlite,
+
stdenv,
unstableGitUpdater,
+
util-linux,
+
wrapGAppsHook3,
+
x265,
}:
let
···
desktop-file-utils
exiftool
intltool
-
libxml2
+
llvmPackages.llvm
pkg-config
perlPackages.perl
python3Packages.jsonschema
wrapGAppsHook3
+
saxon
];
buildInputs = [
···
jasper
lcms
lensfun
+
lerc
libaom
-
libavif_0_11
+
libavif
libdatrie
libde265
libepoxy
···
libsecret
libselinux
libsepol
-
libsoup_2_4
+
libsoup_3
libsysprof-capture
libthai
libwebp
libXdmcp
libxkbcommon
-
libxslt
+
libxml2
libXtst
openexr
openjpeg
osm-gps-map
-
pcre
pcre2
perlPackages.Po4a
pugixml
···
--prefix LD_LIBRARY_PATH ":" "$out/lib/ansel"
)
'';
+
cmakeFlags = [
+
"-DBINARY_PACKAGE_BUILD=1"
+
];
passthru.updateScript = unstableGitUpdater {
# Tags inherited from Darktable, + a "nightly" 0.0.0 tag that new artefacts get attached to
hardcodeZeroVersion = true;
};
-
# cmake can't find the binary itself
-
cmakeFlags = [
-
(lib.cmakeFeature "Xsltproc_BIN" (lib.getExe' libxslt "xsltproc"))
-
];
-
meta = {
description = "Darktable fork minus the bloat plus some design vision";
homepage = "https://ansel.photos/";
license = lib.licenses.gpl3Plus;
-
maintainers = with lib.maintainers; [ ];
+
maintainers = with lib.maintainers; [ mBornand ];
mainProgram = "ansel";
platforms = lib.platforms.linux;
};
+4 -4
pkgs/by-name/bl/bloaty/package.nix
···
gtest,
pkg-config,
lit,
-
llvmPackages_16,
+
llvmPackages,
}:
let
# Old vendored package which has no other use than here, so not packaged in nixpkgs.
···
cmakeFlags = [
"-DLIT_EXECUTABLE=${lit}/bin/lit"
-
"-DFILECHECK_EXECUTABLE=${llvmPackages_16.libllvm}/bin/FileCheck"
-
"-DYAML2OBJ_EXECUTABLE=${llvmPackages_16.libllvm}/bin/yaml2obj"
+
"-DFILECHECK_EXECUTABLE=${llvmPackages.libllvm}/bin/FileCheck"
+
"-DYAML2OBJ_EXECUTABLE=${llvmPackages.libllvm}/bin/yaml2obj"
];
postPatch = ''
···
capstone
gtest
lit
-
llvmPackages_16.libllvm
+
llvmPackages.libllvm
];
doCheck = true;
+6 -6
pkgs/by-name/c2/c2ffi/package.nix
···
lib,
fetchFromGitHub,
cmake,
-
llvmPackages_16,
+
llvmPackages_18,
unstableGitUpdater,
}:
let
-
c2ffiBranch = "llvm-16.0.0";
-
llvmPackages = llvmPackages_16;
+
c2ffiBranch = "llvm-18.1.0";
+
llvmPackages = llvmPackages_18;
in
llvmPackages.stdenv.mkDerivation {
pname = "c2ffi-${c2ffiBranch}";
-
version = "0-unstable-2023-11-18";
+
version = "0-unstable-2024-04-20";
src = fetchFromGitHub {
owner = "rpav";
repo = "c2ffi";
-
rev = "097cbe61ca02dc79ea60859aa056975131a9d985";
-
hash = "sha256-pflolW5OoEkVDozy4cjCdUIVxgE/SfVKIhQyNBDhENc=";
+
rev = "0de81efb64acc82c08c5eee4a7108ddcb1b00d86";
+
hash = "sha256-q81Vxq/6h/5jgQ1Leq15klN/8L+UiavlxkARGo2SrJ0=";
};
passthru.updateScript = unstableGitUpdater {
-8
pkgs/by-name/ch/chez/package.nix
···
{
lib,
stdenv,
-
llvmPackages_17,
fetchurl,
coreutils,
cctools,
···
testers,
}@args:
-
let
-
# x64 darwin fails with invalid memory reference with clang-18 & 19.
-
# https://github.com/cisco/ChezScheme/issues/896
-
# aarch64 darwin fails to execute `system` calls with clang-18 & 19.
-
# https://github.com/cisco/ChezScheme/issues/928
-
stdenv = if args.stdenv.hostPlatform.isDarwin then llvmPackages_17.stdenv else args.stdenv;
-
in
stdenv.mkDerivation (finalAttrs: {
pname = "chez-scheme";
version = "10.2.0";
+3 -4
pkgs/by-name/co/contour/package.nix
···
yaml-cpp,
ncurses,
file,
-
libutil,
-
sigtool,
+
darwin,
nixosTests,
installShellFiles,
reflection-cpp,
···
qt6.wrapQtAppsHook
installShellFiles
]
-
++ lib.optionals stdenv.hostPlatform.isDarwin [ sigtool ];
+
++ lib.optionals stdenv.hostPlatform.isDarwin [ darwin.sigtool ];
buildInputs = [
boxed-cpp
···
]
++ lib.optionals stdenv.hostPlatform.isLinux [ libutempter ]
++ lib.optionals stdenv.hostPlatform.isDarwin [
-
libutil
+
darwin.libutil
];
cmakeFlags = [ "-DCONTOUR_QT_VERSION=6" ];
+2 -2
pkgs/by-name/co/copilot-language-server/package.nix
···
in
stdenvNoCC.mkDerivation (finalAttrs: {
pname = "copilot-language-server";
-
version = "1.351.0";
+
version = "1.357.0";
src = fetchzip {
url = "https://github.com/github/copilot-language-server-release/releases/download/${finalAttrs.version}/copilot-language-server-native-${finalAttrs.version}.zip";
-
hash = "sha256-/ohvUK5jNLpV3G+xGH2ZPsY44ZnIgsvgKp5KqSjk5VI=";
+
hash = "sha256-uVfQk26a/huFxsAtYKPfaJyYSWH17+8PqDh/HFecsdA=";
stripRoot = false;
};
+3 -3
pkgs/by-name/cr/crosvm/package.nix
···
rustPlatform.buildRustPackage {
pname = "crosvm";
-
version = "0-unstable-2025-08-01";
+
version = "0-unstable-2025-08-07";
src = fetchgit {
url = "https://chromium.googlesource.com/chromiumos/platform/crosvm";
-
rev = "1543b3e004a8d4b45c37d45a06e7221effd22a1d";
-
hash = "sha256-jIFjn9/WniMTvTibkdqra/mPOf7E+OFHj2xiUMyD6lY=";
+
rev = "d919101220206d300875464a623b220dddc45fb6";
+
hash = "sha256-2q8TwBwGsUC7if/lm9yhVJCxZiAqR6JHLZCvlpGqkZ0=";
fetchSubmodules = true;
};
+1 -13
pkgs/by-name/da/darktable/package.nix
···
lib,
stdenv,
fetchurl,
-
runCommand,
# nativeBuildInputs
cmake,
···
gitUpdater,
}:
-
let
-
# Create a wrapper for saxon to provide saxon-xslt command
-
saxon-xslt = runCommand "saxon-xslt" { } ''
-
mkdir -p $out/bin
-
cat > $out/bin/saxon-xslt << 'EOF'
-
#!/bin/sh
-
exec ${saxon}/bin/saxon "$@"
-
EOF
-
chmod +x $out/bin/saxon-xslt
-
'';
-
in
stdenv.mkDerivation rec {
version = "5.2.1";
pname = "darktable";
···
perl
pkg-config
wrapGAppsHook3
-
saxon-xslt # Use Saxon instead of libxslt to fix XSLT generate-id() consistency issues
+
saxon # Use Saxon instead of libxslt to fix XSLT generate-id() consistency issues
];
buildInputs = [
+2 -2
pkgs/by-name/fi/fittrackee/package.nix
···
}:
python3Packages.buildPythonApplication rec {
pname = "fittrackee";
-
version = "0.10.3";
+
version = "0.11.2";
pyproject = true;
src = fetchFromGitHub {
owner = "SamR1";
repo = "FitTrackee";
tag = "v${version}";
-
hash = "sha256-rJ3/JtbzYwsMRk5OZKczr/BDwfDU4NH48JdYWC5/fNk=";
+
hash = "sha256-A9gebHxNCpYUUIm7IjyySojIIyuTxfYCUeUufpUM1iA=";
};
build-system = [
+2 -2
pkgs/by-name/fl/flaresolverr/package.nix
···
in
stdenv.mkDerivation (finalAttrs: {
pname = "flaresolverr";
-
version = "3.3.24";
+
version = "3.3.25";
src = fetchFromGitHub {
owner = "FlareSolverr";
repo = "FlareSolverr";
rev = "v${finalAttrs.version}";
-
hash = "sha256-BIV5+yLTgVQJtxi/F9FwtZ4pYcE2vGHmEgwigMtqwD8=";
+
hash = "sha256-AGRqJOIIePaJH0j0eyMFJ6Kddul3yXF6uw6dPMnskmY=";
};
nativeBuildInputs = [ makeWrapper ];
+39
pkgs/by-name/go/go-sendxmpp/package.nix
···
+
{
+
buildGoModule,
+
fetchFromGitLab,
+
lib,
+
nix-update-script,
+
testers,
+
}:
+
+
buildGoModule (finalAttrs: {
+
pname = "go-sendxmpp";
+
version = "0.14.1";
+
+
src = fetchFromGitLab {
+
domain = "salsa.debian.org";
+
owner = "mdosch";
+
repo = "go-sendxmpp";
+
tag = "v${finalAttrs.version}";
+
hash = "sha256-nQ2URhkOp0mb4u4IG3wzGIdhP6svDVMctbu2CHQXj2Y=";
+
};
+
+
vendorHash = "sha256-aMhUsYsQvnhEVkWbjbh84bbStQ4b/0ZHEvzEhXSlFyw=";
+
+
passthru = {
+
tests.version = testers.testVersion {
+
package = finalAttrs.finalPackage;
+
};
+
updateScript = nix-update-script { };
+
};
+
+
meta = {
+
description = "Tool to send messages or files to an XMPP contact or MUC";
+
homepage = "https://salsa.debian.org/mdosch/go-sendxmpp";
+
license = lib.licenses.bsd2;
+
maintainers = with lib.maintainers; [
+
jpds
+
];
+
mainProgram = "go-sendxmpp";
+
};
+
})
+3 -3
pkgs/by-name/h2/h2o/package.nix
···
stdenv.mkDerivation (finalAttrs: {
pname = "h2o";
-
version = "2.3.0.20250717";
+
version = "2.3.0-untagged-2025-08-14";
src = fetchFromGitHub {
owner = "h2o";
repo = "h2o";
-
rev = "db98b59ba7abfcd1dc9b43ea4b9ad1052aba775e";
-
sha256 = "sha256-vBA5TWyvtaaBZV4RmfAAA7F34fXNkROS0rbZRpEJgrc=";
+
rev = "ffab9c49c33b1f0e9aec9804028156aae9db8ef0";
+
hash = "sha256-kdU2p9oUhxGnw8JU9qGjV4mn2jMeSUL0rLgveMs6NiI=";
};
outputs = [
+4 -2
pkgs/by-name/in/inko/package.nix
···
lib,
rustPlatform,
fetchFromGitHub,
-
llvm_17,
+
llvm,
libffi,
libz,
libxml2,
···
];
nativeBuildInputs = [
-
llvm_17
+
llvm
makeWrapper
];
···
simple = callPackage ./test.nix { };
};
};
+
+
__darwinAllowLocalNetworking = true;
meta = {
description = "Language for building concurrent software with confidence";
+2 -2
pkgs/by-name/iv/ivm/package.nix
···
fetchFromGitHub,
makeWrapper,
cargo,
-
llvm_16,
+
llvm,
stdenv,
libffi,
libz,
···
--prefix PATH : ${
lib.makeBinPath [
cargo
-
llvm_16.dev
+
llvm.dev
stdenv.cc
]
} \
+20 -8
pkgs/by-name/km/kminion/package.nix
···
lib,
fetchFromGitHub,
buildGoModule,
+
nixosTests,
}:
-
buildGoModule {
+
buildGoModule (finalAttrs: {
pname = "kafka-minion";
-
version = "2.2.7";
+
version = "2.2.13";
src = fetchFromGitHub {
owner = "redpanda-data";
repo = "kminion";
-
rev = "0c90d4301ed4600d1aaf3345b6f16587d2f282fc";
-
hash = "sha256-CWjX46Sfc9Xj+R7+CZeMuTY0iUStzyZXI4FotwqR44M=";
+
rev = "v${finalAttrs.version}";
+
hash = "sha256-s7kHMMU/srqww/N5szTvX6hOFDV9k9hm+0EZUxIj9So=";
};
-
vendorHash = "sha256-6yfQVoY/bHMA4s0IN5ltnQdHWnE3kIKza36uEcGa11U=";
+
vendorHash = "sha256-vdbSKEWlFH4UkuBxu0LFs8+Rwa4aWTjE8gD4zKuvcs4=";
doCheck = false;
-
passthru.updateScript = ./update.sh;
+
ldflags = [
+
"-s"
+
"-w"
+
"-X main.version=${finalAttrs.version}"
+
"-X main.builtAt=unknown"
+
];
+
+
passthru = {
+
tests = {
+
inherit (nixosTests.prometheus-exporters) kafka;
+
};
+
updateScript = ./update.sh;
+
};
meta = with lib; {
description = "Feature-rich Prometheus exporter for Apache Kafka written in Go";
license = licenses.mit;
-
platforms = platforms.linux;
maintainers = with maintainers; [ cafkafk ];
mainProgram = "kminion";
};
-
}
+
})
+2 -2
pkgs/by-name/lu/lunar-client/package.nix
···
appimageTools.wrapType2 rec {
pname = "lunarclient";
-
version = "3.4.8";
+
version = "3.4.9";
src = fetchurl {
url = "https://launcherupdates.lunarclientcdn.com/Lunar%20Client-${version}.AppImage";
-
hash = "sha512-I8MTXm3HeAVwscCXuJYNOGILLzQ9oh6USRDcW92WgDsZZsibUZHOcE22h8UEUOAFlJjU4kHqowhSKbFBph9WZQ==";
+
hash = "sha512-lzJFzOpJDCp8G+dZEcfvORJTHI5tqpvOcXGwyrSN+raaZJcCYbqLJC30u8trsNV7vgjUzoJdnhLHhwsTQp4RpQ==";
};
nativeBuildInputs = [ makeWrapper ];
+29
pkgs/by-name/rs/rsstail-py/package.nix
···
+
{
+
lib,
+
python3,
+
fetchPypi,
+
}:
+
python3.pkgs.buildPythonApplication rec {
+
pname = "rsstail-py";
+
version = "0.6.0";
+
pyproject = true;
+
+
src = fetchPypi {
+
pname = "rsstail";
+
inherit version;
+
hash = "sha256-nAqk8qomG02SVq2cbQAO0MidGbxCHCk2kPNB+7YgGOQ=";
+
};
+
+
build-system = with python3.pkgs; [ setuptools ];
+
+
dependencies = with python3.pkgs; [ feedparser ];
+
+
meta = {
+
description = "Command-line syndication feed monitor";
+
mainProgram = "rsstail";
+
homepage = "https://github.com/gvalkov/rsstail.py";
+
changelog = "https://github.com/gvalkov/rsstail.py/releases/tag/v${version}";
+
license = lib.licenses.bsd3;
+
maintainers = with lib.maintainers; [ zoriya ];
+
};
+
}
+3 -3
pkgs/by-name/so/solanum/package.nix
···
stdenv.mkDerivation {
pname = "solanum";
-
version = "0-unstable-2025-07-20";
+
version = "0-unstable-2025-08-18";
src = fetchFromGitHub {
owner = "solanum-ircd";
repo = "solanum";
-
rev = "7feda92636c9d5b5e7decceee1273dd18b6cc31b";
-
hash = "sha256-cfDwdE2CA69dSg59Sn1TKk3OWxvoTIm/KCiKfgzokVU=";
+
rev = "f9381ed2e3da2ede96cb18d8ed80700f2ee0dc8e";
+
hash = "sha256-lwAzxMQZFxQtuDWPcn+OFG8HbXPK4MU9VKfn6eayYGg=";
};
patches = [
+8 -10
pkgs/by-name/te/terra/package.nix
···
lib,
stdenv,
fetchFromGitHub,
-
llvmPackages_16,
+
llvmPackages_18,
ncurses,
cmake,
libxml2,
···
}:
let
-
luajitRev = "50936d784474747b4569d988767f1b5bab8bb6d0";
+
luajitRev = "83954100dba9fc0cf5eeaf122f007df35ec9a604";
luajitBase = "LuaJIT-${luajitRev}";
luajitArchive = "${luajitBase}.tar.gz";
luajitSrc = fetchFromGitHub {
owner = "LuaJIT";
repo = "LuaJIT";
rev = luajitRev;
-
sha256 = "1g87pl014b5v6z2nnhiwn3wf405skawszfr5wdzyfbx00j3kgxd0";
+
hash = "sha256-L9T6lc32dDLAp9hPI5mKOzT0c4juW9JHA3FJCpm7HNQ=";
};
-
llvmPackages = llvmPackages_16;
+
llvmPackages = llvmPackages_18;
llvmMerged = symlinkJoin {
name = "llvmClangMerged";
paths = with llvmPackages; [
···
];
};
-
cuda = cudaPackages.cudatoolkit_11;
+
cuda = cudaPackages.cudatoolkit;
clangVersion = llvmPackages.clang-unwrapped.version;
in
stdenv.mkDerivation rec {
pname = "terra";
-
version = "1.1.0";
+
version = "1.2.0";
src = fetchFromGitHub {
owner = "terralang";
repo = "terra";
rev = "release-${version}";
-
sha256 = "0v9vpxcp9ybwnfljskqn41vjq7c0srdfv7qs890a6480pnk4kavd";
+
hash = "sha256-CukNCvTHZUhjdHyvDUSH0YCVNkThUFPaeyLepyEKodA=";
};
nativeBuildInputs = [ cmake ];
···
cmakeFlags =
let
-
resourceDir =
-
"${llvmMerged}/lib/clang/"
-
+ (if lib.versionOlder clangVersion "16" then clangVersion else lib.versions.major clangVersion);
+
resourceDir = "${llvmMerged}/lib/clang/${lib.versions.major clangVersion}";
in
[
"-DHAS_TERRA_VERSION=0"
+4 -4
pkgs/by-name/te/tetragon/package.nix
···
fetchFromGitHub,
pkg-config,
go,
-
llvm_16,
-
clang_16,
+
llvm,
+
clang,
bash,
writableTmpDirAsHomeHook,
gitMinimal,
···
];
buildInputs = [
-
clang_16
+
clang
go
-
llvm_16
+
llvm
pkg-config
];
+6 -3
pkgs/by-name/tr/tracee/package.nix
···
buildGoModule,
fetchFromGitHub,
-
clang_14,
+
clang,
pkg-config,
elfutils,
···
enableParallelBuilding = true;
# needed to build bpf libs
-
hardeningDisable = [ "stackprotector" ];
+
hardeningDisable = [
+
"stackprotector"
+
"zerocallusedregs"
+
];
nativeBuildInputs = [
-
clang_14
+
clang
pkg-config
];
buildInputs = [
+11 -3
pkgs/development/beam-modules/build-rebar3.nix
···
buildPhase ? null,
configurePhase ? null,
meta ? { },
-
enableDebugInfo ? false,
+
erlangCompilerOptions ? [ ],
+
# Deterministic Erlang builds remove full system paths from debug information
+
# among other things to keep builds more reproducible. See their docs for more:
+
# https://www.erlang.org/doc/man/compile
+
erlangDeterministicBuilds ? true,
...
}@attrs:
let
-
debugInfoFlag = lib.optionalString (enableDebugInfo || erlang.debugInfo) "debug-info";
-
rebar3 = rebar3WithPlugins {
plugins = buildPlugins;
};
···
propagatedBuildInputs = lib.unique beamDeps;
inherit src;
+
+
ERL_COMPILER_OPTIONS =
+
let
+
options = erlangCompilerOptions ++ lib.optionals erlangDeterministicBuilds [ "deterministic" ];
+
in
+
"[${lib.concatStringsSep "," options}]";
# stripping does not have any effect on beam files
# it is however needed for dependencies with NIFs
+1 -2
pkgs/development/compilers/flutter/engine/package.nix
···
fetchgit,
runCommand,
llvmPackages,
-
llvmPackages_15,
patchelf,
openbox,
xorg,
···
cp -pr --reflink=auto $swiftshader src/flutter/third_party/swiftshader
chmod -R u+w -- src/flutter/third_party/swiftshader
-
ln -s ${llvmPackages_15.llvm.monorepoSrc} src/flutter/third_party/swiftshader/third_party/llvm-project
+
ln -s ${llvmPackages.llvm.monorepoSrc} src/flutter/third_party/swiftshader/third_party/llvm-project
mkdir -p src/flutter/buildtools/${constants.alt-platform}
ln -s ${llvm} src/flutter/buildtools/${constants.alt-platform}/clang
+1 -1
pkgs/development/haskell-modules/configuration-nix.nix
···
# Doesn't declare LLVM dependency, needs llvm-config
llvm-codegen = addBuildTools [
-
pkgs.llvmPackages_17.llvm.dev # for native llvm-config
+
pkgs.llvmPackages.llvm.dev # for native llvm-config
] super.llvm-codegen;
# hledger* overrides
+4
pkgs/development/libraries/java/saxon/default.nix
···
mkdir -p $out/bin
makeWrapper ${lib.getExe jre} $out/bin/${mainProgram} \
--add-flags "-jar $out/share/java/${jar'}.jar"
+
+
# Other distributions like debian distribute it as saxon*-xslt,
+
# this makes compilling packages that target other distros easier.
+
ln -s $out/bin/${mainProgram} $out/bin/${mainProgram}-xslt
''
+ lib.optionalString (versionAtLeast finalAttrs.version "11") ''
mv lib $out/share/java
+4 -12
pkgs/development/libraries/qt-5/5.15/default.nix
···
gst-plugins-base,
gtk3,
dconf,
-
llvmPackages_15,
-
overrideLibcxx,
+
llvmPackages_19,
darwin,
# options
···
qtwayland = callPackage ../modules/qtwayland.nix { };
qtwebchannel = callPackage ../modules/qtwebchannel.nix { };
qtwebengine = callPackage ../modules/qtwebengine.nix {
-
# The version of Chromium used by Qt WebEngine 5.15.x does not build with clang 16 due
-
# to the following errors:
-
# * -Wenum-constexpr-conversion: This is a downgradable error in clang 16, but it is planned
-
# to be made into a hard error in a future version of clang. Patches are not available for
-
# the version of v8 used by Chromium in Qt WebEngine, and fixing the code is non-trivial.
-
# * -Wincompatible-function-pointer-types: This is also a downgradable error generated
-
# starting with clang 16. Patches are available upstream that can be backported.
-
# Because the first error is non-trivial to fix and suppressing it risks future breakage,
-
# clang is pinned to clang 15. That also makes fixing the second set of errors unnecessary.
-
stdenv = if stdenv.cc.isClang then overrideLibcxx llvmPackages_15.stdenv else stdenv;
+
# Won’t build with Clang 20, as `-Wenum-constexpr-conversion`
+
# was made a hard error.
+
stdenv = if stdenv.cc.isClang then llvmPackages_19.stdenv else stdenv;
inherit (srcs.qtwebengine) version;
inherit (darwin) bootstrap_cmds;
python = python3;
+25
pkgs/development/libraries/qt-5/modules/qtwebengine-gperf-3.2.patch
···
+
Backported from: <https://github.com/chromium/chromium/commit/f8f21fb4aa01f75acbb12abf5ea8c263c6817141.patch>
+
Original author: Daniel Richard G <iskunk@gmail.com>
+
+
diff --git a/src/3rdparty/chromium/third_party/blink/renderer/build/scripts/gperf.py b/src/3rdparty/chromium/third_party/blink/renderer/build/scripts/gperf.py
+
index 5ee4905..6c500a0 100644
+
--- a/src/3rdparty/chromium/third_party/blink/renderer/build/scripts/gperf.py
+
+++ b/src/3rdparty/chromium/third_party/blink/renderer/build/scripts/gperf.py
+
@@ -36,10 +36,13 @@ def generate_gperf(gperf_path, gperf_input, gperf_args):
+
# https://savannah.gnu.org/bugs/index.php?53028
+
gperf_output = re.sub(r'\bregister ', '', gperf_output)
+
# -Wimplicit-fallthrough needs an explicit fallthrough statement,
+
- # so replace gperf's /*FALLTHROUGH*/ comment with the statement.
+
- # https://savannah.gnu.org/bugs/index.php?53029
+
- gperf_output = gperf_output.replace('/*FALLTHROUGH*/',
+
- ' FALLTHROUGH;')
+
+ # so replace gperf 3.1's /*FALLTHROUGH*/ comment with the statement.
+
+ # https://savannah.gnu.org/bugs/index.php?53029 (fixed in 3.2)
+
+ if re.search(
+
+ r'/\* C\+\+ code produced by gperf version 3\.[01](\.\d+)? \*/',
+
+ gperf_output):
+
+ gperf_output = gperf_output.replace('/*FALLTHROUGH*/',
+
+ ' [[fallthrough]];')
+
# -Wpointer-to-int-cast warns about casting pointers to smaller ints
+
# Replace {(int)(long)&(foo), bar} with
+
# {static_cast<int>(reinterpret_cast<uintptr_t>(&(foo)), bar}
+3
pkgs/development/libraries/qt-5/modules/qtwebengine.nix
···
hash = "sha256-DcAYOV9b30ogPCiedvQimEmiZpUJquk5j6WLjJxR54U=";
extraPrefix = "";
})
+
+
# Fix the build with gperf ≥ 3.2 and Clang 19.
+
./qtwebengine-gperf-3.2.patch
];
postPatch = ''
-5
pkgs/development/mobile/androidenv/emulator.nix
···
nss
nspr
alsa-lib
-
llvmPackages_15.libllvm.lib
waylandpp.lib
]
)
···
# This library is linked against a version of libtiff that nixpkgs doesn't have
for file in $out/libexec/android-sdk/emulator/*/qt/plugins/imageformats/libqtiffAndroidEmu.so; do
patchelf --replace-needed libtiff.so.5 libtiff.so "$file" || true
-
done
-
-
for file in $out/libexec/android-sdk/emulator/lib64/vulkan/libvulkan_lvp.so; do
-
patchelf --replace-needed libLLVM-15.so.1 libLLVM-15.so "$file" || true
done
autoPatchelf $out
+4
pkgs/development/python-modules/accelerate/default.nix
···
# Fails in nixpkgs-review due to a port conflict with simultaneous python builds
"test_config_compatibility"
+
+
# Fails with `sandbox=false` by mis-configuring the model it's using.
+
# AttributeError: 'DistributedDataParallel' object has no attribute '_ignored_modules'. Did you mean: 'named_modules'?
+
"test_ignored_modules_regex"
]
++ lib.optionals (stdenv.hostPlatform.isDarwin && stdenv.hostPlatform.isx86_64) [
# RuntimeError: torch_shm_manager: execl failed: Permission denied
+3 -3
pkgs/development/python-modules/shiboken2/default.nix
···
cmake,
qt5,
libxcrypt,
-
llvmPackages_15,
+
llvmPackages,
}:
stdenv.mkDerivation {
···
cd sources/shiboken2
'';
-
CLANG_INSTALL_DIR = llvmPackages_15.libclang.out;
+
CLANG_INSTALL_DIR = llvmPackages.libclang.out;
nativeBuildInputs = [
cmake
···
];
buildInputs = [
-
llvmPackages_15.libclang
+
llvmPackages.libclang
python.pkgs.setuptools
qt5.qtbase
qt5.qtxmlpatterns
+2 -2
pkgs/development/python-modules/wasmer/default.nix
···
libiconv,
libffi,
libxml2,
-
llvm_14,
+
llvm,
ncurses,
zlib,
}:
···
pname = "wasmer-compiler-llvm";
buildAndTestSubdir = "packages/compiler-llvm";
cargoHash = "sha256-oHyjzEqv88e2CHhWhKjUh6K0UflT9Y1JD//3oiE/UBQ=";
-
extraNativeBuildInputs = [ llvm_14 ];
+
extraNativeBuildInputs = [ llvm ];
extraBuildInputs = [
libffi
libxml2.out
+1 -1
pkgs/development/tools/build-managers/build2/bootstrap.nix
···
# Build2 needs to use lld on Darwin because it creates thin archives when it detects `llvm-ar`,
# which ld64 does not support.
-
(lib.getBin buildPackages.llvmPackages_16.lld)
+
(lib.getBin buildPackages.llvmPackages.lld)
];
doCheck = true;
+1 -1
pkgs/development/tools/build-managers/build2/default.nix
···
# Build2 needs to use lld on Darwin because it creates thin archives when it detects `llvm-ar`,
# which ld64 does not support.
-
(lib.getBin buildPackages.llvmPackages_16.lld)
+
(lib.getBin buildPackages.llvmPackages.lld)
];
postPatch = ''
+2 -2
pkgs/development/tools/wasmedge/default.nix
···
lib,
stdenv,
fetchFromGitHub,
-
llvmPackages_17,
+
llvmPackages_19,
boost,
cmake,
spdlog,
···
# ```
#
# > Where `.#` is the flake path were the repo `wasmedge` was cloned at the expected version.
-
llvmPackages = llvmPackages_17;
+
llvmPackages = llvmPackages_19;
in
llvmPackages.stdenv.mkDerivation (finalAttrs: {
pname = "wasmedge";
+4 -4
pkgs/os-specific/linux/kernel/xanmod-kernels.nix
···
variants = {
# ./update-xanmod.sh lts
lts = {
-
version = "6.12.41";
-
hash = "sha256-REi1cQBAYsfBLCkyhLQfbsREPMzvJHFbCUg1p8oNamA=";
+
version = "6.12.42";
+
hash = "sha256-q/a6ik5kKRKOcbmGxGBdCDW3dsgIDf/7tvEpcGjDrHI=";
};
# ./update-xanmod.sh main
main = {
-
version = "6.15.9";
-
hash = "sha256-43SaSDdOfz+aG2T2C9UFbbXYi/7YxbQfTYrKjeEMP+E=";
+
version = "6.15.10";
+
hash = "sha256-6ed820JXJr7QqOX3IiF50SFrYeVrx0xCh73zrlmMy5I=";
};
};
+8 -2
pkgs/os-specific/linux/sgx/sdk/ipp-crypto.nix
···
{
-
gcc11Stdenv,
+
stdenv,
fetchFromGitHub,
cmake,
nasm,
···
python3,
extraCmakeFlags ? [ ],
}:
-
gcc11Stdenv.mkDerivation rec {
+
stdenv.mkDerivation rec {
pname = "ipp-crypto";
version = "2021.11.1";
···
"-DIPPCP_FIPS_MODE=on"
]
++ extraCmakeFlags;
+
+
# Yes, it seems bad for a cryptography library to trigger this
+
# warning. We previously pinned an EOL GCC which avoided it, but this
+
# issue is present regardless of whether we use a compiler that flags
+
# it up or not; upstream just doesn’t test with modern compilers.
+
env.NIX_CFLAGS_COMPILE = "-Wno-error=stringop-overflow";
nativeBuildInputs = [
cmake
+3 -3
pkgs/servers/sql/postgresql/ext/omnigres.nix
···
in
postgresqlBuildExtension (finalAttrs: {
pname = "omnigres";
-
version = "0-unstable-2025-08-06";
+
version = "0-unstable-2025-08-15";
src = fetchFromGitHub {
owner = "omnigres";
repo = "omnigres";
-
rev = "dbfaeb18f4653b1263a61d7b937ec1392a7cfda2";
-
hash = "sha256-IjZ+U9p4qjhCrgPGLMkuVumGdeiWqYy80byCmUrNSvQ=";
+
rev = "d2cd8f8aef5b865367fd47bf46c59ede24bfd1ed";
+
hash = "sha256-PR5fK2prERTY+dDr+zoqXWfNzl5Vyv85Jh6RPNNtDtI=";
};
# This matches postInstall of PostgreSQL's generic.nix, which does this for the PGXS Makefile.
+2 -13
pkgs/servers/sql/postgresql/ext/pgvecto-rs/package.nix
···
{
buildPgrxExtension,
cargo-pgrx_0_12_0_alpha_1,
-
clang_16,
+
clang,
fetchFromGitHub,
lib,
nix-update-script,
···
postgresql,
postgresqlTestExtension,
replaceVars,
-
rustPlatform,
}:
-
let
-
# Upstream only works with clang 16, so we're pinning it here to
-
# avoid future incompatibility.
-
# See https://docs.vectorchord.ai/developers/development.html#set-up-development-environment, step 2
-
clang = clang_16;
-
rustPlatform' = rustPlatform // {
-
bindgenHook = rustPlatform.bindgenHook.override { inherit clang; };
-
};
-
-
in
-
(buildPgrxExtension.override { rustPlatform = rustPlatform'; }) (finalAttrs: {
+
buildPgrxExtension (finalAttrs: {
inherit postgresql;
cargo-pgrx = cargo-pgrx_0_12_0_alpha_1;
+1 -1
pkgs/tools/package-management/nix/common-meson.nix
···
export MANPATH=$man/share/man:$MANPATH
'';
-
separateDebugInfo = stdenv.hostPlatform.isLinux && enableStatic;
+
separateDebugInfo = stdenv.hostPlatform.isLinux && !enableStatic;
passthru = {
inherit aws-sdk-cpp boehmgc;
+2 -13
pkgs/top-level/all-packages.nix
···
### APPLICATIONS/TERMINAL-EMULATORS
-
contour = callPackage ../by-name/co/contour/package.nix {
-
inherit (darwin) libutil sigtool;
-
stdenv = if stdenv.hostPlatform.isDarwin then llvmPackages_17.stdenv else stdenv;
-
};
-
cool-retro-term = libsForQt5.callPackage ../applications/terminal-emulators/cool-retro-term { };
kitty = callPackage ../by-name/ki/kitty/package.nix {
···
ghdl-llvm = callPackage ../by-name/gh/ghdl/package.nix {
backend = "llvm";
-
inherit (llvmPackages_15) llvm;
+
inherit (llvmPackages) llvm;
};
gcc-arm-embedded = gcc-arm-embedded-14;
···
libusb-compat-0_1 = callPackage ../development/libraries/libusb-compat/0.1.nix { };
-
libunicode = callPackage ../by-name/li/libunicode/package.nix {
-
stdenv = if stdenv.hostPlatform.isDarwin then llvmPackages_17.stdenv else stdenv;
-
};
-
libunwind =
# Use the system unwinder in the SDK but provide a compatibility package to:
# 1. avoid evaluation errors with setting `unwind` to `null`; and
···
perl
gtk3
python3
-
llvmPackages_15
-
overrideLibcxx
+
llvmPackages_19
darwin
inherit (__splicedPackages.gst_all_1) gstreamer gst-plugins-base;
···
tclap_1_4 = callPackage ../development/libraries/tclap/1.4.nix { };
termbench-pro = callPackage ../by-name/te/termbench-pro/package.nix {
-
stdenv = if stdenv.hostPlatform.isDarwin then llvmPackages_17.stdenv else stdenv;
fmt = fmt_11;
};
+1 -1
pkgs/top-level/ocaml-packages.nix
···
backoff = callPackage ../development/ocaml-modules/backoff { };
bap = callPackage ../development/ocaml-modules/bap {
-
inherit (pkgs.llvmPackages_14) llvm;
+
inherit (pkgs.llvmPackages) llvm;
};
base64 = callPackage ../development/ocaml-modules/base64 { };
+1 -1
pkgs/top-level/python-packages.nix
···
shellingham = callPackage ../development/python-modules/shellingham { };
shiboken2 = toPythonModule (
-
callPackage ../development/python-modules/shiboken2 { inherit (pkgs) cmake llvmPackages_15 qt5; }
+
callPackage ../development/python-modules/shiboken2 { inherit (pkgs) cmake llvmPackages qt5; }
shiboken6 = toPythonModule (