Merge staging-next into staging

Changed files
+208 -101
maintainers
nixos
doc
manual
release-notes
modules
programs
services
desktops
tests
pkgs
applications
misc
oxker
seatd
networking
cluster
kubergrunt
maestral-qt
virtualization
singularity
build-support
singularity-tools
by-name
rq
rqbit
development
ocaml-modules
syslog
python-modules
bqscales
hahomematic
jupyter-server
pebble
plum-py
polars
publicsuffixlist
pytorch-lightning
rollbar
trimesh
types-appdirs
servers
home-assistant
sql
postgresql
tools
admin
awscli2
misc
parallel
virtualization
kubevirt
top-level
+7
maintainers/maintainer-list.nix
···
githubId = 2770647;
name = "Simon Vandel Sillesen";
};
sioodmy = {
name = "Antoni Sokołowski";
github = "sioodmy";
···
githubId = 2770647;
name = "Simon Vandel Sillesen";
};
+
sinanmohd = {
+
name = "Sinan Mohd";
+
email = "sinan@firemail.cc";
+
matrix = "@sinan:sinanmohd.com";
+
github = "sinanmohd";
+
githubId = 69694713;
+
};
sioodmy = {
name = "Antoni Sokołowski";
github = "sioodmy";
+6
nixos/doc/manual/release-notes/rl-2311.section.md
···
- [hddfancontrol](https://github.com/desbma/hddfancontrol), a service to regulate fan speeds based on hard drive temperature. Available as [services.hddfancontrol](#opt-services.hddfancontrol.enable).
- [GoToSocial](https://gotosocial.org/), an ActivityPub social network server, written in Golang. Available as [services.gotosocial](#opt-services.gotosocial.enable).
- [Castopod](https://castopod.org/), an open-source hosting platform made for podcasters who want to engage and interact with their audience. Available as [services.castopod](#opt-services.castopod.enable).
···
[v1.15](https://elixir-lang.org/blog/2023/06/19/elixir-v1-15-0-released/).
- A new option was added to the virtualisation module that enables specifying explicitly named network interfaces in QEMU VMs. The existing `virtualisation.vlans` is still supported for cases where the name of the network interface is irrelevant.
- DocBook option documentation is no longer supported, all module documentation now uses markdown.
···
- [hddfancontrol](https://github.com/desbma/hddfancontrol), a service to regulate fan speeds based on hard drive temperature. Available as [services.hddfancontrol](#opt-services.hddfancontrol.enable).
+
- [seatd](https://sr.ht/~kennylevinsen/seatd/), A minimal seat management daemon. Available as [services.seatd](#opt-services.seatd.enable).
+
- [GoToSocial](https://gotosocial.org/), an ActivityPub social network server, written in Golang. Available as [services.gotosocial](#opt-services.gotosocial.enable).
- [Castopod](https://castopod.org/), an open-source hosting platform made for podcasters who want to engage and interact with their audience. Available as [services.castopod](#opt-services.castopod.enable).
···
[v1.15](https://elixir-lang.org/blog/2023/06/19/elixir-v1-15-0-released/).
- A new option was added to the virtualisation module that enables specifying explicitly named network interfaces in QEMU VMs. The existing `virtualisation.vlans` is still supported for cases where the name of the network interface is irrelevant.
+
+
- Apptainer/Singularity now defaults to using `"$out/var/lib"` for the `LOCALSTATEDIR` configuration option instead of the top-level `"/var/lib"`. This change impacts the `SESSIONDIR` (container-run-time mount point) configuration, which is set to `$LOCALSTATEDIR/<apptainer or singularity>/mnt/session`. This detaches the packages from the top-level directory, rendering the NixOS module optional.
+
+
The default behavior of the NixOS module `programs.singularity` stays unchanged. We add a new option `programs.singularity.enableExternalSysConfDir` (default to `true`) to specify whether to set the top-level `"/var/lib"` as `LOCALSTATEDIR` or not.
- DocBook option documentation is no longer supported, all module documentation now uses markdown.
+1
nixos/modules/module-list.nix
···
./services/desktops/pipewire/pipewire.nix
./services/desktops/pipewire/wireplumber.nix
./services/desktops/profile-sync-daemon.nix
./services/desktops/system-config-printer.nix
./services/desktops/system76-scheduler.nix
./services/desktops/telepathy.nix
···
./services/desktops/pipewire/pipewire.nix
./services/desktops/pipewire/wireplumber.nix
./services/desktops/profile-sync-daemon.nix
+
./services/desktops/seatd.nix
./services/desktops/system-config-printer.nix
./services/desktops/system76-scheduler.nix
./services/desktops/telepathy.nix
+16 -6
nixos/modules/programs/singularity.nix
···
Use `lib.mkForce` to forcefully specify the overridden package.
'';
};
enableFakeroot = mkOption {
type = types.bool;
default = true;
···
config = mkIf cfg.enable {
programs.singularity.packageOverriden = (cfg.package.override (
-
optionalAttrs cfg.enableFakeroot {
newuidmapPath = "/run/wrappers/bin/newuidmap";
newgidmapPath = "/run/wrappers/bin/newgidmap";
} // optionalAttrs cfg.enableSuid {
···
group = "root";
source = "${cfg.packageOverriden}/libexec/${cfg.packageOverriden.projectName}/bin/starter-suid.orig";
};
-
systemd.tmpfiles.rules = [
"d /var/lib/${cfg.packageOverriden.projectName}/mnt/session 0770 root root -"
-
"d /var/lib/${cfg.packageOverriden.projectName}/mnt/final 0770 root root -"
-
"d /var/lib/${cfg.packageOverriden.projectName}/mnt/overlay 0770 root root -"
-
"d /var/lib/${cfg.packageOverriden.projectName}/mnt/container 0770 root root -"
-
"d /var/lib/${cfg.packageOverriden.projectName}/mnt/source 0770 root root -"
];
};
···
Use `lib.mkForce` to forcefully specify the overridden package.
'';
};
+
enableExternalLocalStateDir = mkOption {
+
type = types.bool;
+
default = true;
+
example = false;
+
description = mdDoc ''
+
Whether to use top-level directories as LOCALSTATEDIR
+
instead of the store path ones.
+
This affects the SESSIONDIR of Apptainer/Singularity.
+
If set to true, the SESSIONDIR will become
+
`/var/lib/''${projectName}/mnt/session`.
+
'';
+
};
enableFakeroot = mkOption {
type = types.bool;
default = true;
···
config = mkIf cfg.enable {
programs.singularity.packageOverriden = (cfg.package.override (
+
optionalAttrs cfg.enableExternalLocalStateDir {
+
externalLocalStateDir = "/var/lib";
+
} // optionalAttrs cfg.enableFakeroot {
newuidmapPath = "/run/wrappers/bin/newuidmap";
newgidmapPath = "/run/wrappers/bin/newgidmap";
} // optionalAttrs cfg.enableSuid {
···
group = "root";
source = "${cfg.packageOverriden}/libexec/${cfg.packageOverriden.projectName}/bin/starter-suid.orig";
};
+
systemd.tmpfiles.rules = mkIf cfg.enableExternalLocalStateDir [
"d /var/lib/${cfg.packageOverriden.projectName}/mnt/session 0770 root root -"
];
};
+51
nixos/modules/services/desktops/seatd.nix
···
···
+
{ config, lib, pkgs, ... }:
+
+
let
+
cfg = config.services.seatd;
+
inherit (lib) mkEnableOption mkOption mdDoc types;
+
in
+
{
+
meta.maintainers = with lib.maintainers; [ sinanmohd ];
+
+
options.services.seatd = {
+
enable = mkEnableOption (mdDoc "seatd");
+
+
user = mkOption {
+
type = types.str;
+
default = "root";
+
description = mdDoc "User to own the seatd socket";
+
};
+
group = mkOption {
+
type = types.str;
+
default = "seat";
+
description = mdDoc "Group to own the seatd socket";
+
};
+
logLevel = mkOption {
+
type = types.enum [ "debug" "info" "error" "silent" ];
+
default = "info";
+
description = mdDoc "Logging verbosity";
+
};
+
};
+
+
config = lib.mkIf cfg.enable {
+
environment.systemPackages = with pkgs; [ seatd sdnotify-wrapper ];
+
users.groups.seat = lib.mkIf (cfg.group == "seat") {};
+
+
systemd.services.seatd = {
+
description = "Seat management daemon";
+
documentation = [ "man:seatd(1)" ];
+
+
wantedBy = [ "multi-user.target" ];
+
restartIfChanged = false;
+
+
serviceConfig = {
+
Type = "notify";
+
NotifyAccess = "all";
+
SyslogIdentifier = "seatd";
+
ExecStart = "${pkgs.sdnotify-wrapper}/bin/sdnotify-wrapper ${pkgs.seatd.bin}/bin/seatd -n 1 -u ${cfg.user} -g ${cfg.group} -l ${cfg.logLevel}";
+
RestartSec = 1;
+
Restart = "always";
+
};
+
};
+
};
+
}
+1
nixos/tests/all-tests.nix
···
sddm = handleTest ./sddm.nix {};
seafile = handleTest ./seafile.nix {};
searx = handleTest ./searx.nix {};
service-runner = handleTest ./service-runner.nix {};
sftpgo = runTest ./sftpgo.nix;
sfxr-qt = handleTest ./sfxr-qt.nix {};
···
sddm = handleTest ./sddm.nix {};
seafile = handleTest ./seafile.nix {};
searx = handleTest ./searx.nix {};
+
seatd = handleTest ./seatd.nix {};
service-runner = handleTest ./service-runner.nix {};
sftpgo = runTest ./sftpgo.nix;
sfxr-qt = handleTest ./sfxr-qt.nix {};
+51
nixos/tests/seatd.nix
···
···
+
import ./make-test-python.nix ({ pkgs, lib, ... }:
+
+
let
+
seatd-test = pkgs.writeShellApplication {
+
name = "seatd-client-pid";
+
text = ''
+
journalctl -u seatd --no-pager -b | while read -r line; do
+
case "$line" in
+
*"New client connected"*)
+
line="''${line##*pid: }"
+
pid="''${line%%,*}"
+
;;
+
*"Opened client"*)
+
echo "$pid"
+
exit
+
esac
+
done;
+
'';
+
};
+
in
+
{
+
name = "seatd";
+
meta.maintainers = with lib.maintainers; [ sinanmohd ];
+
+
nodes.machine = { ... }: {
+
imports = [ ./common/user-account.nix ];
+
services.getty.autologinUser = "alice";
+
users.users.alice.extraGroups = [ "seat" "wheel" ];
+
+
fonts.enableDefaultPackages = true;
+
environment.systemPackages = with pkgs; [
+
dwl
+
foot
+
seatd-test
+
];
+
+
programs.bash.loginShellInit = ''
+
[ "$(tty)" = "/dev/tty1" ] &&
+
dwl -s 'foot touch /tmp/foot_started'
+
'';
+
+
hardware.opengl.enable = true;
+
virtualisation.qemu.options = [ "-vga none -device virtio-gpu-pci" ];
+
services.seatd.enable = true;
+
};
+
+
testScript = ''
+
machine.wait_for_file("/tmp/foot_started")
+
machine.succeed("test $(seatd-client-pid) = $(pgrep dwl)")
+
'';
+
})
+3 -3
pkgs/applications/misc/oxker/default.nix
···
rustPlatform.buildRustPackage rec {
pname = "oxker";
-
version = "0.3.3";
src = fetchCrate {
inherit pname version;
-
sha256 = "sha256-2zdsVItGZYQydpC9E/uCbzOE9Xoh7zTqa9DpxA5qNCc=";
};
-
cargoHash = "sha256-FXYFQpiK2BGUz9GjsUPS9LWPeezbBQ3A33juoVCl71g=";
meta = with lib; {
description = "A simple tui to view & control docker containers";
···
rustPlatform.buildRustPackage rec {
pname = "oxker";
+
version = "0.4.0";
src = fetchCrate {
inherit pname version;
+
sha256 = "sha256-zre4ccMmv1NWcokLvEFRIf+kornAnge/a3c3b6IO03o=";
};
+
cargoHash = "sha256-xdfaTVRt5h4q0kfAE1l6pOXCfk0Cb8TnKNMZeeGvciY=";
meta = with lib; {
description = "A simple tui to view & control docker containers";
+4 -1
pkgs/applications/misc/seatd/default.nix
···
, scdoc
, stdenv
, systemdSupport ? lib.meta.availableOn stdenv.hostPlatform systemd, systemd
}:
stdenv.mkDerivation (finalAttrs: {
···
"-Dserver=enabled"
];
meta = {
-
description = "A universal seat management library";
changelog = "https://git.sr.ht/~kennylevinsen/seatd/refs/${finalAttrs.version}";
homepage = "https://sr.ht/~kennylevinsen/seatd/";
license = lib.licenses.mit;
···
, scdoc
, stdenv
, systemdSupport ? lib.meta.availableOn stdenv.hostPlatform systemd, systemd
+
, nixosTests
}:
stdenv.mkDerivation (finalAttrs: {
···
"-Dserver=enabled"
];
+
passthru.tests.basic = nixosTests.seatd;
+
meta = {
+
description = "A minimal seat management daemon, and a universal seat management library";
changelog = "https://git.sr.ht/~kennylevinsen/seatd/refs/${finalAttrs.version}";
homepage = "https://sr.ht/~kennylevinsen/seatd/";
license = lib.licenses.mit;
+2 -2
pkgs/applications/networking/cluster/kubergrunt/default.nix
···
buildGoModule rec {
pname = "kubergrunt";
-
version = "0.12.1";
src = fetchFromGitHub {
owner = "gruntwork-io";
repo = "kubergrunt";
rev = "v${version}";
-
sha256 = "sha256-qd+7tYvRpRMg8Y83L/K8g8fWrfO4rAQj72EpunqfSsc=";
};
vendorHash = "sha256-AUw1wJNWjpNVsjw/Hr1ZCePYWQkf1SqRVnQgi8tOFG0=";
···
buildGoModule rec {
pname = "kubergrunt";
+
version = "0.13.0";
src = fetchFromGitHub {
owner = "gruntwork-io";
repo = "kubergrunt";
rev = "v${version}";
+
sha256 = "sha256-ZUuMQ0y6qXM9g/snJchqGPf7z+5skE/OPqC3rvRenXo=";
};
vendorHash = "sha256-AUw1wJNWjpNVsjw/Hr1ZCePYWQkf1SqRVnQgi8tOFG0=";
+8 -4
pkgs/applications/networking/maestral-qt/default.nix
···
{ lib
, fetchFromGitHub
, python3
-
, qt6
, nixosTests
}:
python3.pkgs.buildPythonApplication rec {
···
];
buildInputs = [
-
qt6.qtbase
-
qt6.qtsvg # Needed for the systray icon
];
nativeBuildInputs = [
-
qt6.wrapQtAppsHook
];
dontWrapQtApps = true;
···
{ lib
, fetchFromGitHub
, python3
+
, qtbase
+
, qtsvg
+
, qtwayland
, nixosTests
+
, wrapQtAppsHook
}:
python3.pkgs.buildPythonApplication rec {
···
];
buildInputs = [
+
qtwayland
+
qtbase
+
qtsvg # Needed for the systray icon
];
nativeBuildInputs = [
+
wrapQtAppsHook
];
dontWrapQtApps = true;
+4 -1
pkgs/applications/virtualization/singularity/generic.nix
···
, newuidmapPath ? null
# Path to SUID-ed newgidmap executable
, newgidmapPath ? null
# Remove the symlinks to `singularity*` when projectName != "singularity"
, removeCompat ? false
# Workaround #86349
···
inherit
enableSeccomp
enableSuid
projectName
removeCompat
starterSuidPath
···
configureScript = "./mconfig";
configureFlags = [
-
"--localstatedir=/var/lib"
"--runstatedir=/var/run"
]
++ lib.optional (!enableSeccomp) "--without-seccomp"
···
, newuidmapPath ? null
# Path to SUID-ed newgidmap executable
, newgidmapPath ? null
+
# External LOCALSTATEDIR
+
, externalLocalStateDir ? null
# Remove the symlinks to `singularity*` when projectName != "singularity"
, removeCompat ? false
# Workaround #86349
···
inherit
enableSeccomp
enableSuid
+
externalLocalStateDir
projectName
removeCompat
starterSuidPath
···
configureScript = "./mconfig";
configureFlags = [
+
"--localstatedir=${if externalLocalStateDir != null then externalLocalStateDir else "${placeholder "out"}/var/lib"}"
"--runstatedir=/var/run"
]
++ lib.optional (!enableSeccomp) "--without-seccomp"
+1 -1
pkgs/build-support/singularity-tools/default.nix
···
touch .${projectName}.d/env/94-appsbase.sh
cd ..
-
mkdir -p /var/lib/${projectName}/mnt/{container,final,overlay,session,source}
echo "root:x:0:0:System administrator:/root:/bin/sh" > /etc/passwd
echo > /etc/resolv.conf
TMPDIR=$(pwd -P) ${projectName} build $out ./img
···
touch .${projectName}.d/env/94-appsbase.sh
cd ..
+
mkdir -p /var/lib/${projectName}/mnt/session
echo "root:x:0:0:System administrator:/root:/bin/sh" > /etc/passwd
echo > /etc/resolv.conf
TMPDIR=$(pwd -P) ${projectName} build $out ./img
+3 -3
pkgs/by-name/rq/rqbit/package.nix
···
rustPlatform.buildRustPackage rec {
pname = "rqbit";
-
version = "2.2.2";
src = fetchFromGitHub {
owner = "ikatson";
repo = "rqbit";
rev = "v${version}";
-
hash = "sha256-9yYHxlvRlO8iJ3SPi0+4lEgBgAaqaDffKChqAe4OsYU=";
};
-
cargoHash = "sha256-dUQiW6J3Wycp5D3mAwGwruU6CkQ534OyP1GdsY7jzEw=";
nativeBuildInputs = lib.optionals stdenv.isLinux [ pkg-config ];
···
rustPlatform.buildRustPackage rec {
pname = "rqbit";
+
version = "3.2.0";
src = fetchFromGitHub {
owner = "ikatson";
repo = "rqbit";
rev = "v${version}";
+
hash = "sha256-c0JYFr2yy1lcaJ+xOZnFsGzPVGPoFgCiFTGDlDaHdZk=";
};
+
cargoHash = "sha256-VnkAokOC5xSqO7MVASssKs0EqQ+re5EsEar4eLspTSA=";
nativeBuildInputs = lib.optionals stdenv.isLinux [ pkg-config ];
+8 -16
pkgs/development/ocaml-modules/syslog/default.nix
···
-
{ lib, stdenv, fetchFromGitHub, ocaml, findlib }:
-
assert lib.versionAtLeast (lib.getVersion ocaml) "4.03.0";
-
stdenv.mkDerivation rec {
-
pname = "ocaml${ocaml.version}-syslog";
-
version = "1.5";
src = fetchFromGitHub {
-
owner = "rixed";
repo = "ocaml-syslog";
rev = "v${version}";
-
sha256 = "1kqpc55ppzv9n555qgqpda49n7nvkqimzisyjx2a7338r7q4r5bw";
};
-
nativeBuildInputs = [ ocaml findlib ];
-
strictDeps = true;
-
-
buildFlags = [ "all" "opt" ];
-
-
createFindlibDestdir = true;
-
meta = with lib; {
-
homepage = "https://github.com/rixed/ocaml-syslog";
description = "Simple wrapper to access the system logger from OCaml";
license = licenses.lgpl21Plus;
-
inherit (ocaml.meta) platforms;
maintainers = [ maintainers.rixed ];
};
}
···
+
{ lib, fetchFromGitHub, buildDunePackage }:
+
buildDunePackage rec {
+
pname = "syslog";
+
version = "2.0.2";
+
minimalOCamlVersion = "4.03";
src = fetchFromGitHub {
+
owner = "geneanet";
repo = "ocaml-syslog";
rev = "v${version}";
+
hash = "sha256-WybNZBPhv4fhjzzb95E+6ZHcZUnfROLlNF3PMBGO9ys=";
};
meta = with lib; {
+
homepage = "https://github.com/geneanet/ocaml-syslog";
description = "Simple wrapper to access the system logger from OCaml";
license = licenses.lgpl21Plus;
maintainers = [ maintainers.rixed ];
};
}
+3 -16
pkgs/development/python-modules/bqscales/default.nix
···
, hatchling
, hatch-jupyter-builder
, jupyterlab
-
, jupyter-packaging
, ipywidgets
, numpy
, traitlets
···
buildPythonPackage rec {
pname = "bqscales";
version = "0.3.3";
-
format = "pyproject";
disabled = pythonOlder "3.6";
src = fetchPypi {
···
hash = "sha256-SlnNw4dWOzRedwIN3kCyl95qVqkY92QGOMS3Eyoqk0I=";
};
-
# We relax dependencies here instead of pulling in a patch because upstream
-
# has released a new version using hatch-jupyter-builder, but it is not yet
-
# trivial to upgrade to that.
-
#
-
# Per https://github.com/bqplot/bqscales/issues/76, jupyterlab is not needed
-
# as a build dependency right now.
-
#
-
postPatch = ''
-
substituteInPlace pyproject.toml \
-
--replace '"jupyterlab==3.*",' "" \
-
--replace 'jupyter_packaging~=' 'jupyter_packaging>='
-
'';
-
nativeBuildInputs = [
hatch-jupyter-builder
hatchling
jupyterlab
-
jupyter-packaging
];
propagatedBuildInputs = [
···
traitlets
traittypes
];
# no tests in PyPI dist
doCheck = false;
···
, hatchling
, hatch-jupyter-builder
, jupyterlab
, ipywidgets
, numpy
, traitlets
···
buildPythonPackage rec {
pname = "bqscales";
version = "0.3.3";
+
pyproject = true;
disabled = pythonOlder "3.6";
src = fetchPypi {
···
hash = "sha256-SlnNw4dWOzRedwIN3kCyl95qVqkY92QGOMS3Eyoqk0I=";
};
nativeBuildInputs = [
hatch-jupyter-builder
hatchling
jupyterlab
];
propagatedBuildInputs = [
···
traitlets
traittypes
];
+
+
env.SKIP_JUPYTER_BUILDER = 1;
# no tests in PyPI dist
doCheck = false;
+2 -2
pkgs/development/python-modules/hahomematic/default.nix
···
buildPythonPackage rec {
pname = "hahomematic";
-
version = "2023.11.1";
format = "pyproject";
disabled = pythonOlder "3.11";
···
owner = "danielperna84";
repo = pname;
rev = "refs/tags/${version}";
-
hash = "sha256-C8KznmR3+G38MLQj6Sek7qW9R9yJr8gfcjgNjDyXG7I=";
};
postPatch = ''
···
buildPythonPackage rec {
pname = "hahomematic";
+
version = "2023.11.4";
format = "pyproject";
disabled = pythonOlder "3.11";
···
owner = "danielperna84";
repo = pname;
rev = "refs/tags/${version}";
+
hash = "sha256-LB0BGj/DWjHGAFkyACkkzGY1oYNc7hJ2BeT1lHlNjqU=";
};
postPatch = ''
+3 -3
pkgs/development/python-modules/jupyter-server/default.nix
···
buildPythonPackage rec {
pname = "jupyter-server";
-
version = "2.7.3";
format = "pyproject";
disabled = pythonOlder "3.8";
src = fetchPypi {
pname = "jupyter_server";
inherit version;
-
hash = "sha256-1JFshYHE67xTTOvaqOyiR42fO/3Yjq4p/KsBIOrFdkk=";
};
nativeBuildInputs = [
···
'';
disabledTests = [
-
"test_server_extension_list"
"test_cull_idle"
"test_server_extension_list"
] ++ lib.optionals stdenv.isDarwin [
# attempts to use trashcan, build env doesn't allow this
"test_delete"
···
buildPythonPackage rec {
pname = "jupyter-server";
+
version = "2.10.1";
format = "pyproject";
disabled = pythonOlder "3.8";
src = fetchPypi {
pname = "jupyter_server";
inherit version;
+
hash = "sha256-5tomV6lUp4ee7SjMCOCBewH/2B1+q4Y0ZgOXtV+SZHI=";
};
nativeBuildInputs = [
···
'';
disabledTests = [
"test_cull_idle"
"test_server_extension_list"
+
"test_subscribe_websocket"
] ++ lib.optionals stdenv.isDarwin [
# attempts to use trashcan, build env doesn't allow this
"test_delete"
+3 -2
pkgs/development/python-modules/pebble/default.nix
···
buildPythonPackage rec {
pname = "pebble";
-
version = "5.0.3";
format = "setuptools";
disabled = pythonOlder "3.7";
···
src = fetchPypi {
pname = "Pebble";
inherit version;
-
hash = "sha256-vc/Z6n4K7biVsgQXfBnm1lQ9mWL040AuurIXUASGPag=";
};
nativeCheckInputs = [
···
meta = with lib; {
description = "API to manage threads and processes within an application";
homepage = "https://github.com/noxdafox/pebble";
license = licenses.lgpl3Plus;
maintainers = with maintainers; [ orivej ];
};
···
buildPythonPackage rec {
pname = "pebble";
+
version = "5.0.4";
format = "setuptools";
disabled = pythonOlder "3.7";
···
src = fetchPypi {
pname = "Pebble";
inherit version;
+
hash = "sha256-b3rfK97UQUvdNWLV9NVnvZT/EB5yav+HimZXW8mcEis=";
};
nativeCheckInputs = [
···
meta = with lib; {
description = "API to manage threads and processes within an application";
homepage = "https://github.com/noxdafox/pebble";
+
changelog = "https://github.com/noxdafox/pebble/releases/tag/${version}";
license = licenses.lgpl3Plus;
maintainers = with maintainers; [ orivej ];
};
+6
pkgs/development/python-modules/plum-py/default.nix
···
"tests"
];
meta = with lib; {
description = "Classes and utilities for packing/unpacking bytes";
homepage = "https://plum-py.readthedocs.io/";
···
"tests"
];
+
disabledTestPaths = [
+
# tests enum.IntFlag behaviour which has been disallowed in python 3.11.6
+
# https://gitlab.com/dangass/plum/-/issues/150
+
"tests/flag/test_flag_invalid.py"
+
];
+
meta = with lib; {
description = "Classes and utilities for packing/unpacking bytes";
homepage = "https://plum-py.readthedocs.io/";
-13
pkgs/development/python-modules/polars/all_horizontal.patch
···
-
diff --git a/crates/polars-lazy/src/frame/mod.rs b/crates/polars-lazy/src/frame/mod.rs
-
index 2d2ede651..be24b8809 100644
-
--- a/crates/polars-lazy/src/frame/mod.rs
-
+++ b/crates/polars-lazy/src/frame/mod.rs
-
@@ -25,7 +25,7 @@ pub use parquet::*;
-
use polars_core::frame::explode::MeltArgs;
-
use polars_core::prelude::*;
-
use polars_io::RowCount;
-
-use polars_plan::dsl::all_horizontal;
-
+use polars_plan::dsl::functions::all_horizontal;
-
pub use polars_plan::frame::{AllowedOptimizations, OptState};
-
use polars_plan::global::FETCH_ROWS;
-
#[cfg(any(feature = "ipc", feature = "parquet", feature = "csv"))]
···
-7
pkgs/development/python-modules/polars/default.nix
···
disabled = pythonOlder "3.6";
src = rootSource;
-
patches = [
-
# workaround for apparent rustc bug
-
# remove when we're at Rust 1.73
-
# https://github.com/pola-rs/polars/issues/12050
-
./all_horizontal.patch
-
];
-
# Cargo.lock file is sometimes behind actual release which throws an error,
# thus the `sed` command
# Make sure to check that the right substitutions are made when updating the package
···
disabled = pythonOlder "3.6";
src = rootSource;
# Cargo.lock file is sometimes behind actual release which throws an error,
# thus the `sed` command
# Make sure to check that the right substitutions are made when updating the package
+2 -2
pkgs/development/python-modules/publicsuffixlist/default.nix
···
buildPythonPackage rec {
pname = "publicsuffixlist";
-
version = "0.10.0.20231121";
pyproject = true;
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
-
hash = "sha256-6Jc12xQchyjXfI0kvvCCBGPNpivsz51izgS/41JrVnQ=";
};
nativeBuildInputs = [
···
buildPythonPackage rec {
pname = "publicsuffixlist";
+
version = "0.10.0.20231122";
pyproject = true;
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
+
hash = "sha256-0CrHVPoQTS3I9ZPvf/4wWQX4vYn5vAeWUxNanjnbF60=";
};
nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/pytorch-lightning/default.nix
···
buildPythonPackage rec {
pname = "pytorch-lightning";
-
version = "2.1.1";
format = "pyproject";
src = fetchFromGitHub {
owner = "Lightning-AI";
repo = "pytorch-lightning";
rev = "refs/tags/${version}";
-
hash = "sha256-1psTa++qF5WPDVXeDGWfcQ4hGz98uW297QDUKrQyoRE=";
};
preConfigure = ''
···
buildPythonPackage rec {
pname = "pytorch-lightning";
+
version = "2.1.2";
format = "pyproject";
src = fetchFromGitHub {
owner = "Lightning-AI";
repo = "pytorch-lightning";
rev = "refs/tags/${version}";
+
hash = "sha256-d5DKAx67uuIPxtSgazIQnxLiHTBD0lwHaB6LD3R6vKA=";
};
preConfigure = ''
+2 -2
pkgs/development/python-modules/rollbar/default.nix
···
buildPythonPackage rec {
pname = "rollbar";
-
version = "0.16.3";
format = "setuptools";
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
-
hash = "sha256-AjE9/GBxDsc2qwM9D4yWnYV6i5kc1n4MGpFiDooE7eI=";
};
propagatedBuildInputs = [
···
buildPythonPackage rec {
pname = "rollbar";
+
version = "1.0.0";
format = "setuptools";
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
+
hash = "sha256-Y0e35J8i8ClvwoemrqddZCz2RJTS7hJwQqelk8l9868=";
};
propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/trimesh/default.nix
···
buildPythonPackage rec {
pname = "trimesh";
-
version = "4.0.1";
format = "pyproject";
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
-
hash = "sha256-jBVQqYNB8P7E0xkcTH6uYmbBZ/l5P9VLtyyRQxq/fOY=";
};
nativeBuildInputs = [ setuptools ];
···
buildPythonPackage rec {
pname = "trimesh";
+
version = "4.0.4";
format = "pyproject";
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
+
hash = "sha256-3XpncG6ISKQU+hqJpvck82s0BYgvYpNGn3zcdWkB5Ps=";
};
nativeBuildInputs = [ setuptools ];
+1 -1
pkgs/development/python-modules/types-appdirs/default.nix
···
meta = {
description = "This is a PEP 561 type stub package for the appdirs package. It can be used by type-checking tools like mypy, pyright, pytype, PyCharm, etc. to check code that uses appdirs. ";
-
homepage = "https://pypi.org/project/types-appdirss";
license = lib.licenses.asl20;
maintainers = with lib.maintainers; [ ];
};
···
meta = {
description = "This is a PEP 561 type stub package for the appdirs package. It can be used by type-checking tools like mypy, pyright, pytype, PyCharm, etc. to check code that uses appdirs. ";
+
homepage = "https://pypi.org/project/types-appdirs";
license = lib.licenses.asl20;
maintainers = with lib.maintainers; [ ];
};
+2 -2
pkgs/servers/home-assistant/stubs.nix
···
buildPythonPackage rec {
pname = "homeassistant-stubs";
-
version = "2023.11.2";
format = "pyproject";
disabled = python.version != home-assistant.python.version;
···
owner = "KapJI";
repo = "homeassistant-stubs";
rev = "refs/tags/${version}";
-
hash = "sha256-stVfFXb5QfC+wZUSk53+jt/hb8kO1gCcgeOnHHpNlWE=";
};
nativeBuildInputs = [
···
buildPythonPackage rec {
pname = "homeassistant-stubs";
+
version = "2023.11.3";
format = "pyproject";
disabled = python.version != home-assistant.python.version;
···
owner = "KapJI";
repo = "homeassistant-stubs";
rev = "refs/tags/${version}";
+
hash = "sha256-x3FcUmbUYAUKGAPb85SqJk1kTWFKxpJSX2J+rTRj1KY=";
};
nativeBuildInputs = [
+2 -2
pkgs/servers/sql/postgresql/ext/postgis.nix
···
}:
stdenv.mkDerivation rec {
pname = "postgis";
-
version = "3.4.0";
outputs = [ "out" "doc" ];
src = fetchurl {
url = "https://download.osgeo.org/postgis/source/postgis-${version}.tar.gz";
-
sha256 = "sha256-rum2CmyITTVBZLMJbEZX8yRFQYZgf4WdHOBdiZeYr50=";
};
buildInputs = [ libxml2 postgresql geos proj gdal json_c protobufc pcre2.dev ]
···
}:
stdenv.mkDerivation rec {
pname = "postgis";
+
version = "3.4.1";
outputs = [ "out" "doc" ];
src = fetchurl {
url = "https://download.osgeo.org/postgis/source/postgis-${version}.tar.gz";
+
sha256 = "sha256-/vahQSE9D/J79FszuEnMOWwi3bH/xv7UNUacnokfyB0=";
};
buildInputs = [ libxml2 postgresql geos proj gdal json_c protobufc pcre2.dev ]
+7 -3
pkgs/tools/admin/awscli2/default.nix
···
hash = "sha256-i3zml6LyEnUqNcGsQURx3BbEJMlXO+SSa1b/P10jt68=";
};
});
-
urllib3 = prev.urllib3.overridePythonAttrs (prev: {
-
format = "setuptools";
src = prev.src.override {
-
version = "1.26.18";
hash = "sha256-+OzBu6VmdBNFfFKauVW/jGe0XbeZ0VkGYmFxnjKFgKA=";
};
});
···
hash = "sha256-i3zml6LyEnUqNcGsQURx3BbEJMlXO+SSa1b/P10jt68=";
};
});
+
urllib3 = prev.urllib3.overridePythonAttrs (prev: rec {
+
pyproject = true;
+
version = "1.26.18";
+
nativeBuildInputs = with final; [
+
setuptools
+
];
src = prev.src.override {
+
inherit version;
hash = "sha256-+OzBu6VmdBNFfFKauVW/jGe0XbeZ0VkGYmFxnjKFgKA=";
};
});
+2 -2
pkgs/tools/misc/parallel/default.nix
···
stdenv.mkDerivation rec {
pname = "parallel";
-
version = "20230922";
src = fetchurl {
url = "mirror://gnu/parallel/${pname}-${version}.tar.bz2";
-
sha256 = "sha256-EUR0Ft1eXfZQE897RULhQJOKO/1fPzCVye2xaPy/4GM=";
};
outputs = [ "out" "man" "doc" ];
···
stdenv.mkDerivation rec {
pname = "parallel";
+
version = "20231022";
src = fetchurl {
url = "mirror://gnu/parallel/${pname}-${version}.tar.bz2";
+
sha256 = "sha256-k/K5TxhQeYpLXdoiva6G2ramVl41JYYOCORvJWPzJow=";
};
outputs = [ "out" "man" "doc" ];
+2 -2
pkgs/tools/virtualization/kubevirt/default.nix
···
buildGoModule rec {
pname = "kubevirt";
-
version = "1.0.1";
src = fetchFromGitHub {
owner = "kubevirt";
repo = "kubevirt";
rev = "v${version}";
-
sha256 = "sha256-L+spWtYuXq0bPYmE1eGnzTfCAh8Q3j5DUS+k6dNGdOU=";
};
vendorHash = null;
···
buildGoModule rec {
pname = "kubevirt";
+
version = "1.1.0";
src = fetchFromGitHub {
owner = "kubevirt";
repo = "kubevirt";
rev = "v${version}";
+
sha256 = "sha256-dW2rHW/37Jpk3vuu3O87nynK8Mp0IAqpkRvBDxT/++I=";
};
vendorHash = null;
+1 -1
pkgs/top-level/all-packages.nix
···
maestral = with python3Packages; toPythonApplication maestral;
-
maestral-gui = libsForQt5.callPackage ../applications/networking/maestral-qt { };
maestro = callPackage ../development/mobile/maestro { };
···
maestral = with python3Packages; toPythonApplication maestral;
+
maestral-gui = qt6.callPackage ../applications/networking/maestral-qt { };
maestro = callPackage ../development/mobile/maestro { };