Merge master into staging-next

Changed files
+1089 -466
doc
release-notes
lib
maintainers
nixos
modules
services
networking
tests
pkgs
applications
editors
emacs
vscode
extensions
almenon.arepl
emulators
networking
browsers
chromium
cluster
helm
plugins
science
electronics
qucs-s
video
mpv
scripts
obs-studio
by-name
al
alioth
at
attic-client
ba
ce
centrifugo
ch
checkov
co
cosmic-applets
cosmic-applibrary
cosmic-bg
cosmic-comp
cosmic-edit
cosmic-files
cosmic-greeter
cosmic-idle
cosmic-launcher
cosmic-notifications
cosmic-osd
cosmic-panel
cosmic-player
cosmic-protocols
cosmic-randr
cosmic-screenshot
cosmic-session
cosmic-settings
cosmic-settings-daemon
cosmic-store
cosmic-term
cosmic-workspaces-epoch
el
elasticsearch-curator
ex
exploitdb
ff
ffizer
gi
gitlab-runner
go
go-toml
goconst
gr
greenmask
ht
hy
hydra
ir
jq
ko
li
libblake3
libdeltachat
ma
manga-tui
mo
mockgen
my
ne
necesse-server
ni
nickel
nix-heuristic-gc
nix-plugins
nu
nu_scripts
op
openfga
pg
pgroll
ph
phrase-cli
qu
qucsator-rf
re
remnote
sq
squashfuse
st
stackit-cli
stardust-xr-magnetar
tr
trunk
tu
turso-cli
uv
ve
vendir
vi
vi-mongo
wa
wasmi
xd
xdg-desktop-portal-cosmic
development
libraries
libvgm
python-modules
boto3-stubs
botocore-stubs
dirsearch
langgraph
langgraph-prebuilt
mcp
mcpadapt
mypy-boto3
private-gpt
publicsuffixlist
pyexploitdb
reptor
scikit-base
tencentcloud-sdk-python
torchmetrics
types-awscrt
uv-dynamic-versioning
tools
language-servers
servers
krill
web-apps
lemmy
tools
package-management
security
cosign
top-level
+3
doc/release-notes/rl-2505.section.md
···
- `pkgs.nextcloud28` has been removed since it's out of support upstream.
+
- `centrifugo` was updated to v6, which uses a new config format. See [upstream documentation](https://centrifugal.dev/docs/getting-started/migration_v6) for migration.
+
- `teleport` has been upgraded from major version 16 to major version 17.
Refer to [upstream upgrade instructions](https://goteleport.com/docs/upgrading/overview/)
and [release notes for v17](https://goteleport.com/docs/changelog/#1701-11152024).
···
- `docker_24` has been removed, as it was EOL with vulnerabilities since June 08, 2024.
- Emacs 28 and 29 have been removed.
+
- Emacs 28 Macport has been removed, while CVEs of Emacs 29 Macport are patched.
- `containerd` has been updated to v2, which contains breaking changes. See the [containerd
2.0](https://github.com/containerd/containerd/blob/main/docs/containerd-2.0.md) documentation for more
+1 -1
lib/tests/nix-for-tests.nix
···
builtins.mapAttrs (
attr: pkg:
-
if lib.versionAtLeast pkg.version "2.26" then
+
if lib.versionAtLeast pkg.version "2.29pre" then
pkg.overrideScope (finalScope: prevScope: { aws-sdk-cpp = null; })
else
pkg.override { withAWS = false; }
+6
maintainers/maintainer-list.nix
···
name = "Daniel McCarney";
keys = [ { fingerprint = "8026 D24A A966 BF9C D3CD CB3C 08FB 2BFC 470E 75B4"; } ];
};
+
cr0n = {
+
name = "cr0n";
+
github = "n0rc";
+
githubId = 355000;
+
email = "cr0n@cypherpunks.cc";
+
};
Crafter = {
email = "crafter@crafter.rocks";
github = "Craftzman7";
+8
nixos/modules/services/networking/centrifugo.nix
···
};
config = lib.mkIf cfg.enable {
+
assertions = [
+
{
+
assertion =
+
(lib.versionAtLeast cfg.package.version "6") -> (!(cfg.settings ? name) && !(cfg.settings ? port));
+
message = "`services.centrifugo.settings` is v5 config, must be compatible with centrifugo v6 config format";
+
}
+
];
+
systemd.services.centrifugo = {
description = "Centrifugo messaging server";
wantedBy = [ "multi-user.target" ];
+13 -9
nixos/tests/centrifugo.nix
···
{ lib, ... }:
{
name = "centrifugo";
-
meta.maintainers = [ lib.maintainers.tie ];
+
meta.maintainers = [
+
lib.maintainers.tie
+
lib.maintainers.valodim
+
];
nodes = lib.listToAttrs (
lib.imap0 (index: name: {
···
services.centrifugo = {
enable = true;
settings = {
-
inherit name;
-
port = centrifugoPort;
-
# See https://centrifugal.dev/docs/server/engines#redis-sharding
-
engine = "redis";
-
# Connect to local Redis shard via Unix socket.
-
redis_address =
+
node = {
+
inherit name;
+
};
+
http_server.port = centrifugoPort;
+
http_api.insecure = true;
+
usage_stats.disabled = true;
+
+
engine.type = "redis";
+
engine.redis.address =
let
toRedisAddresses = map (name: "${name}:${toString redisPort}");
in
···
"unix://${config.services.redis.servers.centrifugo.unixSocket}"
]
++ toRedisAddresses (lib.drop (index + 1) nodes);
-
usage_stats_disable = true;
-
api_insecure = true;
};
extraGroups = [
config.services.redis.servers.centrifugo.user
-2
pkgs/applications/editors/emacs/default.nix
···
withPgtk = true;
};
-
emacs28-macport = callPackage (self.sources.emacs28-macport) inheritedArgs;
-
emacs29-macport = callPackage (self.sources.emacs29-macport) inheritedArgs;
}
)
+2 -2
pkgs/applications/editors/emacs/make-emacs.nix
···
};
};
-
meta = meta // {
+
meta = {
broken = withNativeCompilation && !(stdenv.buildPlatform.canExecute stdenv.hostPlatform);
knownVulnerabilities = lib.optionals (lib.versionOlder version "30") [
"CVE-2024-53920 CVE-2025-1244, please use newer versions such as emacs30"
];
-
};
+
} // meta;
})
+13 -26
pkgs/applications/editors/emacs/sources.nix
···
patches ? _: [ ],
rev,
hash,
+
meta ? { },
}:
{
inherit
···
}
.${variant};
mainProgram = "emacs";
-
};
+
} // meta;
};
in
{
···
];
});
-
emacs28-macport = import ./make-emacs.nix (mkArgs {
+
emacs29-macport = import ./make-emacs.nix (mkArgs {
pname = "emacs-mac";
-
version = "28.2";
+
version = "29.4";
variant = "macport";
-
rev = "emacs-28.2-mac-9.1";
-
hash = "sha256-Ne2jQ2nVLNiQmnkkOXVc5AkLVkTpm8pFC7VNY2gQjPE=";
+
rev = "emacs-29.4-mac-10.1";
+
hash = "sha256-8OQ+fon9tclbh/eUJ09uqKfMaz9M77QnLIp2R8QB6Ic=";
patches = fetchpatch: [
-
# CVE-2022-45939
+
# CVE-2024-53920
(fetchpatch {
-
url = "https://git.savannah.gnu.org/cgit/emacs.git/patch/?id=d48bb4874bc6cd3e69c7a15fc3c91cc141025c51";
-
hash = "sha256-TiBQkexn/eb6+IqJNDqR/Rn7S7LVdHmL/21A5tGsyJs=";
+
url = "https://gitweb.gentoo.org/proj/emacs-patches.git/plain/emacs/29.4/07_all_trusted-content.patch?id=f24370de4de0a37304958ec1569d5c50c1745b7f";
+
hash = "sha256-zUWM2HDO5MHEB5fC5TCUxzmSafMvXO5usRzCyp9Q7P4=";
})
-
# https://lists.gnu.org/archive/html/emacs-devel/2024-03/msg00611.html
-
(fetchpatch {
-
url = "https://gitweb.gentoo.org/proj/emacs-patches.git/plain/emacs/28.2/10_all_org-macro-eval.patch?id=af40e12cb742510e5d40a06ffc6dfca97e340dd6";
-
hash = "sha256-OdGt4e9JGjWJPkfJhbYsmQQc6jart4BH5aIKPIbWKFs=";
-
})
+
# CVE-2025-1244
(fetchpatch {
-
url = "https://gitweb.gentoo.org/proj/emacs-patches.git/plain/emacs/28.2/11_all_untrusted-content.patch?id=af40e12cb742510e5d40a06ffc6dfca97e340dd6";
-
hash = "sha256-wa2bsnCt5yFx0+RAFZGBPI+OoKkbrfkkMer/KBEc/wA=";
-
})
-
(fetchpatch {
-
url = "https://gitweb.gentoo.org/proj/emacs-patches.git/plain/emacs/28.2/12_all_org-remote-unsafe.patch?id=af40e12cb742510e5d40a06ffc6dfca97e340dd6";
-
hash = "sha256-b6WU1o3PfDV/6BTPfPNUFny6oERJCNsDrvflxX3Yvek=";
+
url = "https://gitweb.gentoo.org/proj/emacs-patches.git/plain/emacs/29.4/06_all_man.patch?id=f24370de4de0a37304958ec1569d5c50c1745b7f";
+
hash = "sha256-Vdf6GF5YmGoHTkxiD9mdYH0hgvfovZwrqYN1NQ++U1w=";
})
];
-
});
-
emacs29-macport = import ./make-emacs.nix (mkArgs {
-
pname = "emacs-mac";
-
version = "29.1";
-
variant = "macport";
-
rev = "emacs-29.1-mac-10.0";
-
hash = "sha256-TE829qJdPjeOQ+kD0SfyO8d5YpJjBge/g+nScwj+XVU=";
+
meta.knownVulnerabilities = [ ];
});
}
+20
pkgs/applications/editors/vscode/extensions/almenon.arepl/default.nix
···
+
{
+
lib,
+
vscode-utils,
+
}:
+
vscode-utils.buildVscodeMarketplaceExtension {
+
mktplcRef = {
+
name = "arepl";
+
publisher = "almenon";
+
version = "3.0.0";
+
hash = "sha256-NadsB/6kUQ7/d9o3rUc7889jO+4MdvBhtyI4UUGpzqk=";
+
};
+
+
meta = {
+
description = "Preferred dark/light themes by John Papa";
+
downloadPage = "https://marketplace.visualstudio.com/items?itemName=almenon.arepl";
+
homepage = "https://github.com/Almenon/AREPL-vscode";
+
license = lib.licenses.mit;
+
maintainers = [ lib.maintainers.therobot2105 ];
+
};
+
}
+2
pkgs/applications/editors/vscode/extensions/default.nix
···
};
};
+
almenon.arepl = callPackage ./almenon.arepl { };
+
alygin.vscode-tlaplus = buildVscodeMarketplaceExtension {
mktplcRef = {
name = "vscode-tlaplus";
+3 -3
pkgs/applications/emulators/libretro/cores/beetle-psx.nix
···
}:
mkLibretroCore {
core = "mednafen-psx" + lib.optionalString withHw "-hw";
-
version = "0-unstable-2025-03-28";
+
version = "0-unstable-2025-04-04";
src = fetchFromGitHub {
owner = "libretro";
repo = "beetle-psx-libretro";
-
rev = "e2522914f72291ad7232d996e7eabdf167b1b414";
-
hash = "sha256-uxnRNP5BRpabHLjuI4IiLzqCfRobETEMnwJ9mw+ZdaE=";
+
rev = "90c09d4b8e6923a22538c35f68ace2d9fead134d";
+
hash = "sha256-eVoKmGE3N8uePcNpxWjAjgUjTIfEHZR3K2FLtQtLp+M=";
};
extraBuildInputs = lib.optionals withHw [
+3 -3
pkgs/applications/emulators/libretro/cores/fceumm.nix
···
}:
mkLibretroCore {
core = "fceumm";
-
version = "0-unstable-2025-02-12";
+
version = "0-unstable-2025-04-06";
src = fetchFromGitHub {
owner = "libretro";
repo = "libretro-fceumm";
-
rev = "26f92531a95a9a74f45a8bf13fc9f3f48cde2976";
-
hash = "sha256-XtSuZEfu03dFMQUX4VvpeFLzoWG3TeIBQG4cQkap+t8=";
+
rev = "b349f7f3e211bb7725f133d3818ab98da5059760";
+
hash = "sha256-MNYpuipjnDl9GUl5qWGi5W5cFhUCd/weCKuTRdttKJ4=";
};
meta = {
+3 -3
pkgs/applications/emulators/libretro/cores/gambatte.nix
···
}:
mkLibretroCore {
core = "gambatte";
-
version = "0-unstable-2025-03-07";
+
version = "0-unstable-2025-04-04";
src = fetchFromGitHub {
owner = "libretro";
repo = "gambatte-libretro";
-
rev = "4b3edb41d33e52b6d70c4e18bf0819a070991b66";
-
hash = "sha256-8RmNDvUd64FqEgduNMHgbunu92SqMi+Pn//Ou2EQUFs=";
+
rev = "2910240a4100ccad68f935082b8bbce194673cb5";
+
hash = "sha256-segz2SocZaNNgToNQOIEVIOD3CidyZIS81dStcdAsTs=";
};
meta = {
+3 -3
pkgs/applications/emulators/libretro/cores/genesis-plus-gx.nix
···
}:
mkLibretroCore {
core = "genesis-plus-gx";
-
version = "0-unstable-2025-03-08";
+
version = "0-unstable-2025-04-04";
src = fetchFromGitHub {
owner = "libretro";
repo = "Genesis-Plus-GX";
-
rev = "1024afbcd77a7bf7c87972c7c86d3a7759877fc7";
-
hash = "sha256-9Y3uzWpiYIRGTFApVGdLIONpBpPaO1sRgaGj1EVI3M4=";
+
rev = "32a4853c5fd352cc3054e83ed375476cf023aa5f";
+
hash = "sha256-3r562/3WWWkibEKzPrA+lASY5Wpz8kuX5EQKqFKJdAA=";
};
meta = {
+3 -3
pkgs/applications/emulators/libretro/cores/mame.nix
···
}:
mkLibretroCore {
core = "mame";
-
version = "0-unstable-2025-03-06";
+
version = "0-unstable-2025-04-01";
src = fetchFromGitHub {
owner = "libretro";
repo = "mame";
-
rev = "40edadab2e445bfda9d206def9508b43b11fb96a";
-
hash = "sha256-TrDx77VCdtLuihwhlz+sYkUvegTxsG8eAn3h6KYO3z0=";
+
rev = "a638be8510d061f435e2abd46e514bb6c7e41262";
+
hash = "sha256-adMLJ3mm+02X07UwG3ojhdt1x5+FvCartxNc/EHz4CQ=";
fetchSubmodules = true;
};
+3 -3
pkgs/applications/emulators/libretro/cores/mame2003-plus.nix
···
}:
mkLibretroCore {
core = "mame2003-plus";
-
version = "0-unstable-2025-03-27";
+
version = "0-unstable-2025-04-07";
src = fetchFromGitHub {
owner = "libretro";
repo = "mame2003-plus-libretro";
-
rev = "4df08f409666e46a0a2d94c3cebcfbba72975ca9";
-
hash = "sha256-Dp4f3j9Zm3BLMftEJSDSYrqPy1zJ8miStiUTI9mFdLw=";
+
rev = "2b5fc26ee64d963021bc266aa45f19d90b282f92";
+
hash = "sha256-ZbebYUOUdaLVTh+VD8AQvAv/zQzr6tugJRl3iYSrUeo=";
};
makefile = "Makefile";
+14 -14
pkgs/applications/networking/browsers/chromium/info.json
···
{
"chromium": {
-
"version": "135.0.7049.52",
+
"version": "135.0.7049.84",
"chromedriver": {
-
"version": "135.0.7049.42",
-
"hash_darwin": "sha256-CixR0TvndAgxvXYbetIqKg6NRu/z3pJe+USCZ0pyQd4=",
-
"hash_darwin_aarch64": "sha256-WKDi97j1F9+I6RYOsdiXVrgVibZ3ZoVPljo1XAtw0o8="
+
"version": "135.0.7049.85",
+
"hash_darwin": "sha256-L4x/MSCbVt2UIQwbHREDV8br6DmdfuqTJ3//7opK2IU=",
+
"hash_darwin_aarch64": "sha256-vixXGqbc2UYpydg1RILhrtmr5DdbJ5I1sD8aNikejQU="
},
"deps": {
"depot_tools": {
···
"DEPS": {
"src": {
"url": "https://chromium.googlesource.com/chromium/src.git",
-
"rev": "9ba7e609d28c509a8ce9265c2247065d8d251173",
-
"hash": "sha256-PjvfckdlaMq9HWefGxFppgBumlqh7xoCoxYFwk/r630=",
+
"rev": "6c019e56001911b3fd467e03bf68c435924d62f4",
+
"hash": "sha256-BFw1o2cIHBeBudeigH6YTOuLGsp/+pTOeE1lXBO3aio=",
"recompress": true
},
"src/third_party/clang-format/script": {
···
},
"src/third_party/dawn": {
"url": "https://dawn.googlesource.com/dawn.git",
-
"rev": "bdc68b25b620d7302a955e2c38c548ebfe74ef31",
-
"hash": "sha256-R9SQiKUjLkLmPJwuWpw7fcibrWxSlXWkDsCra7Ci0UQ="
+
"rev": "53dfda5e9d07d58b43cea66b8153c55dd751ff88",
+
"hash": "sha256-zXxJZz2C4eDJ8beHDXJe0UCNesDw5R0ogFcsdiF8VIc="
},
"src/third_party/dawn/third_party/glfw": {
"url": "https://chromium.googlesource.com/external/github.com/glfw/glfw",
···
},
"src/third_party/skia": {
"url": "https://skia.googlesource.com/skia.git",
-
"rev": "b99f146a03d3c98049768fd91c2bbe6594b02b2c",
-
"hash": "sha256-tl1GDmcStkuKMmzzsYuRG6Nrk4xDqgYYBoa1VsQNOwY="
+
"rev": "6e445bdea696eb6b6a46681dfc1a63edaa517edb",
+
"hash": "sha256-mSup6nKsEPjJ/HBV7PwjBI4PP7/RdwFm/dnavKeRqzI="
},
"src/third_party/smhasher/src": {
"url": "https://chromium.googlesource.com/external/smhasher.git",
···
},
"src/third_party/wasm_tts_engine/src": {
"url": "https://chromium.googlesource.com/chromium/wasm-tts-engine",
-
"rev": "6ab3e63276a2d66ba3e7db4f87c5b7cb00e22130",
-
"hash": "sha256-ZcnKKnHsN1UyztAXClc2EUwfeX3yuLtMM2Zjwpnh62U="
+
"rev": "53d2aba6f0cf7db57e17edfc3ff6471871b0c125",
+
"hash": "sha256-t5eeehwspRLaowEMPLa8/lV5AHamXQBfH/un0DHLVAM="
},
"src/third_party/wayland/src": {
"url": "https://chromium.googlesource.com/external/anongit.freedesktop.org/git/wayland/wayland.git",
···
},
"src/third_party/webrtc": {
"url": "https://webrtc.googlesource.com/src.git",
-
"rev": "04413d62f754a7b1a3a2d8c3df23bcde040112b2",
-
"hash": "sha256-sFoBgpPeMJQNSjNp8dDEUlB/7lJUpIXTpu0eRq94cGk="
+
"rev": "9e5db68b15087eccd8d2493b4e8539c1657e0f75",
+
"hash": "sha256-gXdBDo+fzp6hJB8qyhscV7ajwSfCUeYvSxhL10g56rU="
},
"src/third_party/wuffs/src": {
"url": "https://skia.googlesource.com/external/github.com/google/wuffs-mirror-release-c.git",
+3 -3
pkgs/applications/networking/cluster/helm/plugins/helm-diff.nix
···
buildGoModule rec {
pname = "helm-diff";
-
version = "3.10.0";
+
version = "3.11.0";
src = fetchFromGitHub {
owner = "databus23";
repo = pname;
rev = "v${version}";
-
hash = "sha256-vRngZigXOyxdx9bG2uWpeQ0ASTW+4tKuQWZ1Vm47Y+k=";
+
hash = "sha256-wnroUILQKVW+aMPhI8MHyzRMox3MhpRMtvYWm6siJqQ=";
};
-
vendorHash = "sha256-kotV3GC2ilq258cLVGOzBTHb0koWfn92Acl0L8rRi5I=";
+
vendorHash = "sha256-B4o67yVp7u9N/HNEkF7pbHC33a8fZJvayoPL+qovDeY=";
ldflags = [
"-s"
+2 -2
pkgs/applications/science/electronics/qucs-s/default.nix
···
stdenv.mkDerivation rec {
pname = "qucs-s";
-
version = "25.1.1";
+
version = "25.1.2";
src = fetchFromGitHub {
owner = "ra3xdh";
repo = "qucs_s";
rev = version;
-
hash = "sha256-H/iLCCX1fMozs/G8erX7cia7wRLjvLxofuiu6pGVJ58=";
+
hash = "sha256-+xPhHmuogNuolmMFcUAP2hMfJh1D+O4DrPkcuR6+mR8=";
};
postPatch = ''
+3 -3
pkgs/applications/video/mpv/scripts/twitch-chat.nix
···
}:
buildLua {
pname = "twitch-chat";
-
version = "0-unstable-2024-06-23";
+
version = "0-unstable-2025-03-30";
src = fetchFromGitHub {
owner = "CrendKing";
repo = "mpv-twitch-chat";
-
rev = "bb0c2e84675f4f1e0c221c8e1d3516b60242b985";
-
hash = "sha256-lnWYcr49koI60Su85OWbcxrARWTfXW2zIvfCZ6c3GtI=";
+
rev = "97c94ae58b4a898067b9c63c477716280327d8e1";
+
hash = "sha256-KjlzVuj47zos2RQHbveijsyJoN2f7VGBboWolISom7M=";
postFetch = "rm $out/screenshot.webp";
};
+2 -2
pkgs/applications/video/obs-studio/plugins/obs-color-monitor.nix
···
stdenv.mkDerivation (finalAttrs: {
pname = "obs-color-monitor";
-
version = "0.9.0";
+
version = "0.9.1";
src = fetchFromGitHub {
owner = "norihiro";
repo = "obs-color-monitor";
tag = finalAttrs.version;
-
hash = "sha256-EIp1GQ5dKN43D7xodX/ucYcJm994eKsnidFlbLKWHuI=";
+
hash = "sha256-4Dagga9BgW1Fiaxqs9QlyTax+SgFyTiNiU3yP2GjIDs=";
};
nativeBuildInputs = [ cmake ];
+3 -3
pkgs/by-name/al/alioth/package.nix
···
rustPlatform.buildRustPackage rec {
pname = "alioth";
-
version = "0.6.0";
+
version = "0.7.0";
src = fetchFromGitHub {
owner = "google";
repo = "alioth";
tag = "v${version}";
-
hash = "sha256-CQYh/F7eGk94dsXP7j3udhhBReYBvV6D8nzK/3VicwU=";
+
hash = "sha256-xFNX2cxmaw2H8D21qs6mnTMuSidmJ0xJ/b4pxdLTvow=";
};
# Checks use `debug_assert_eq!`
checkType = "debug";
useFetchCargoVendor = true;
-
cargoHash = "sha256-kW76EBlpzeSmIhW5UsYjPYp5KeH2mPuf3aAiTSM06g4=";
+
cargoHash = "sha256-x2Abw/RVKpPx0EWyF3w0kywtd23A+NSNaHRVZ4oB1jI=";
separateDebugInfo = true;
+3 -3
pkgs/by-name/at/attic-client/package.nix
···
lib,
rustPlatform,
fetchFromGitHub,
-
nixForLinking,
+
nixVersions,
nixosTests,
boost,
pkg-config,
···
buildInputs =
[
-
nixForLinking
+
nixVersions.nix_2_24
boost
]
++ lib.optionals stdenv.hostPlatform.isDarwin (
···
useFetchCargoVendor = true;
ATTIC_DISTRIBUTOR = "nixpkgs";
-
NIX_INCLUDE_PATH = "${lib.getDev nixForLinking}/include";
+
NIX_INCLUDE_PATH = "${lib.getDev nixVersions.nix_2_24}/include";
# Attic interacts with Nix directly and its tests require trusted-user access
# to nix-daemon to import NARs, which is not possible in the build sandbox.
+3 -3
pkgs/by-name/ba/badger/package.nix
···
buildGoModule rec {
pname = "badger";
-
version = "4.6.0";
+
version = "4.7.0";
src = fetchFromGitHub {
owner = "dgraph-io";
repo = "badger";
rev = "v${version}";
-
hash = "sha256-W3vPTLGI7YT7dFklJnOcpfYqQ9aBCsel9L6q4WNincY=";
+
hash = "sha256-R4nahpUuCjPas1NBnWmQ/KBTY+/yPSyo8AmTvgwhYVI=";
};
-
vendorHash = "sha256-UVdOiaj1FN0etB9F0kt+THfO0Aa1kgdGYVeSVv4GpxY=";
+
vendorHash = "sha256-x4+CHLmQhu7Y6n1qx2CBY6KzRIRLD7Gn+pzXQy3/5rA=";
subPackages = [ "badger" ];
+3 -3
pkgs/by-name/ba/bao/package.nix
···
rustPlatform.buildRustPackage rec {
pname = "bao";
-
version = "0.13.0";
+
version = "0.13.1";
src = fetchCrate {
inherit version;
pname = "${pname}_bin";
-
hash = "sha256-MpMNhL1n8dNJJcJJiDXv/qWUgCNqQIvvcR8veH+abuI=";
+
hash = "sha256-8h5otpu3z2Hgy0jMCITJNr8Q4iVdlR5Lea2X+WuenWs=";
};
useFetchCargoVendor = true;
-
cargoHash = "sha256-Vw8T/pgGMjI8QklkQNuZSYmKcKhaR320q8ZBAT4HPZ8=";
+
cargoHash = "sha256-B0wvJTcIRJxBU0G1DONnKeQYrmsmMIorhTLc73o4/kE=";
meta = {
description = "Implementation of BLAKE3 verified streaming";
+10 -7
pkgs/by-name/ce/centrifugo/package.nix
···
in
buildGoModule rec {
pname = "centrifugo";
-
version = "5.4.9";
+
version = "6.1.0";
src = fetchFromGitHub {
owner = "centrifugal";
repo = "centrifugo";
rev = "v${version}";
-
hash = "sha256-FDtAkoN1bdqVUEP0obbXBfQfVRpZN5YXbU1KT1yXWuI=";
+
hash = "sha256-7hh9wcM9cMfQ2W2PlDitTdJD9ftZt/KO/B+wV/c588U=";
};
-
vendorHash = "sha256-WfYN7bhtOPDp2UeB/WqtN3dD3+WO9lIxnXe2iTqn000=";
+
vendorHash = "sha256-hl1BznajnaOXMrlSqksqPdJih29yRDYW9IsyV9mSN20=";
ldflags = [
"-s"
"-w"
-
"-X=github.com/centrifugal/centrifugo/v5/internal/build.Version=${version}"
-
"-X=github.com/centrifugal/centrifugo/v5/internal/build.UsageStatsEndpoint=${statsEndpoint}"
-
"-X=github.com/centrifugal/centrifugo/v5/internal/build.UsageStatsToken=${statsToken}"
+
"-X=github.com/centrifugal/centrifugo/v6/internal/build.Version=${version}"
+
"-X=github.com/centrifugal/centrifugo/v6/internal/build.UsageStatsEndpoint=${statsEndpoint}"
+
"-X=github.com/centrifugal/centrifugo/v6/internal/build.UsageStatsToken=${statsToken}"
];
excludedPackages = [
···
homepage = "https://centrifugal.dev";
changelog = "https://github.com/centrifugal/centrifugo/releases/tag/v${version}";
license = lib.licenses.asl20;
-
maintainers = [ lib.maintainers.tie ];
+
maintainers = [
+
lib.maintainers.tie
+
lib.maintainers.valodim
+
];
mainProgram = "centrifugo";
};
}
+2 -2
pkgs/by-name/ch/checkov/package.nix
···
python3.pkgs.buildPythonApplication rec {
pname = "checkov";
-
version = "3.2.399";
+
version = "3.2.400";
pyproject = true;
src = fetchFromGitHub {
owner = "bridgecrewio";
repo = "checkov";
tag = version;
-
hash = "sha256-/ssPTHHW3AeQRjIDdBBZe6Jnoj/UvQXiLYFhuOJZI5o=";
+
hash = "sha256-R0u1O0az4LMrE7m3PVyLmNf1ru90ym5lbpWAd3T+0QU=";
};
pythonRelaxDeps = [
+18 -7
pkgs/by-name/co/cosmic-applets/package.nix
···
udev,
xkeyboard_config,
nix-update-script,
+
nixosTests,
}:
rustPlatform.buildRustPackage (finalAttrs: {
···
)
'';
-
passthru.updateScript = nix-update-script {
-
extraArgs = [
-
"--version"
-
"unstable"
-
"--version-regex"
-
"epoch-(.*)"
-
];
+
passthru = {
+
tests = {
+
inherit (nixosTests)
+
cosmic
+
cosmic-autologin
+
cosmic-noxwayland
+
cosmic-autologin-noxwayland
+
;
+
};
+
updateScript = nix-update-script {
+
extraArgs = [
+
"--version"
+
"unstable"
+
"--version-regex"
+
"epoch-(.*)"
+
];
+
};
};
meta = {
+18 -7
pkgs/by-name/co/cosmic-applibrary/package.nix
···
libcosmicAppHook,
just,
nix-update-script,
+
nixosTests,
}:
rustPlatform.buildRustPackage (finalAttrs: {
···
substituteInPlace justfile --replace '#!/usr/bin/env' "#!$(command -v env)"
'';
-
passthru.updateScript = nix-update-script {
-
extraArgs = [
-
"--version"
-
"unstable"
-
"--version-regex"
-
"epoch-(.*)"
-
];
+
passthru = {
+
tests = {
+
inherit (nixosTests)
+
cosmic
+
cosmic-autologin
+
cosmic-noxwayland
+
cosmic-autologin-noxwayland
+
;
+
};
+
updateScript = nix-update-script {
+
extraArgs = [
+
"--version"
+
"unstable"
+
"--version-regex"
+
"epoch-(.*)"
+
];
+
};
};
meta = {
+18 -7
pkgs/by-name/co/cosmic-bg/package.nix
···
just,
nasm,
nix-update-script,
+
nixosTests,
}:
rustPlatform.buildRustPackage (finalAttrs: {
···
"target/${stdenv.hostPlatform.rust.cargoShortTarget}/release/cosmic-bg"
];
-
passthru.updateScript = nix-update-script {
-
extraArgs = [
-
"--version"
-
"unstable"
-
"--version-regex"
-
"epoch-(.*)"
-
];
+
passthru = {
+
tests = {
+
inherit (nixosTests)
+
cosmic
+
cosmic-autologin
+
cosmic-noxwayland
+
cosmic-autologin-noxwayland
+
;
+
};
+
updateScript = nix-update-script {
+
extraArgs = [
+
"--version"
+
"unstable"
+
"--version-regex"
+
"epoch-(.*)"
+
];
+
};
};
meta = {
+18 -7
pkgs/by-name/co/cosmic-comp/package.nix
···
udev,
systemd,
nix-update-script,
+
nixosTests,
useSystemd ? lib.meta.availableOn stdenv.hostPlatform systemd,
}:
···
dontCargoInstall = true;
-
passthru.updateScript = nix-update-script {
-
extraArgs = [
-
"--version"
-
"unstable"
-
"--version-regex"
-
"epoch-(.*)"
-
];
+
passthru = {
+
tests = {
+
inherit (nixosTests)
+
cosmic
+
cosmic-autologin
+
cosmic-noxwayland
+
cosmic-autologin-noxwayland
+
;
+
};
+
updateScript = nix-update-script {
+
extraArgs = [
+
"--version"
+
"unstable"
+
"--version-regex"
+
"epoch-(.*)"
+
];
+
};
};
meta = {
+10
pkgs/by-name/co/cosmic-edit/package.nix
···
wayland,
xorg,
vulkan-loader,
+
nixosTests,
}:
rustPlatform.buildRustPackage (finalAttrs: {
···
wrapProgram "$out/bin/cosmic-edit" \
--suffix XDG_DATA_DIRS : "${cosmic-icons}/share"
'';
+
+
passthru.tests = {
+
inherit (nixosTests)
+
cosmic
+
cosmic-autologin
+
cosmic-noxwayland
+
cosmic-autologin-noxwayland
+
;
+
};
meta = with lib; {
homepage = "https://github.com/pop-os/cosmic-edit";
+18 -7
pkgs/by-name/co/cosmic-files/package.nix
···
libcosmicAppHook,
glib,
nix-update-script,
+
nixosTests,
}:
rustPlatform.buildRustPackage (finalAttrs: {
···
runHook postCheck
'';
-
passthru.updateScript = nix-update-script {
-
extraArgs = [
-
"--version"
-
"unstable"
-
"--version-regex"
-
"epoch-(.*)"
-
];
+
passthru = {
+
tests = {
+
inherit (nixosTests)
+
cosmic
+
cosmic-autologin
+
cosmic-noxwayland
+
cosmic-autologin-noxwayland
+
;
+
};
+
updateScript = nix-update-script {
+
extraArgs = [
+
"--version"
+
"unstable"
+
"--version-regex"
+
"epoch-(.*)"
+
];
+
};
};
meta = {
+18 -7
pkgs/by-name/co/cosmic-greeter/package.nix
···
coreutils,
xkeyboard_config,
nix-update-script,
+
nixosTests,
}:
rustPlatform.buildRustPackage (finalAttrs: {
···
)
'';
-
passthru.updateScript = nix-update-script {
-
extraArgs = [
-
"--version"
-
"unstable"
-
"--version-regex"
-
"epoch-(.*)"
-
];
+
passthru = {
+
tests = {
+
inherit (nixosTests)
+
cosmic
+
cosmic-autologin
+
cosmic-noxwayland
+
cosmic-autologin-noxwayland
+
;
+
};
+
updateScript = nix-update-script {
+
extraArgs = [
+
"--version"
+
"unstable"
+
"--version-regex"
+
"epoch-(.*)"
+
];
+
};
};
meta = {
+18 -7
pkgs/by-name/co/cosmic-idle/package.nix
···
just,
bash,
nix-update-script,
+
nixosTests,
}:
rustPlatform.buildRustPackage (finalAttrs: {
···
substituteInPlace src/main.rs --replace-fail '"/bin/sh"' '"${lib.getExe' bash "sh"}"'
'';
-
passthru.updateScript = nix-update-script {
-
extraArgs = [
-
"--version"
-
"unstable"
-
"--version-regex"
-
"epoch-(.*)"
-
];
+
passthru = {
+
tests = {
+
inherit (nixosTests)
+
cosmic
+
cosmic-autologin
+
cosmic-noxwayland
+
cosmic-autologin-noxwayland
+
;
+
};
+
updateScript = nix-update-script {
+
extraArgs = [
+
"--version"
+
"unstable"
+
"--version-regex"
+
"epoch-(.*)"
+
];
+
};
};
meta = {
+18 -7
pkgs/by-name/co/cosmic-launcher/package.nix
···
just,
libcosmicAppHook,
nix-update-script,
+
nixosTests,
}:
rustPlatform.buildRustPackage (finalAttrs: {
···
env."CARGO_TARGET_${stdenv.hostPlatform.rust.cargoEnvVarTarget}_RUSTFLAGS" = "--cfg tokio_unstable";
-
passthru.updateScript = nix-update-script {
-
extraArgs = [
-
"--version"
-
"unstable"
-
"--version-regex"
-
"epoch-(.*)"
-
];
+
passthru = {
+
tests = {
+
inherit (nixosTests)
+
cosmic
+
cosmic-autologin
+
cosmic-noxwayland
+
cosmic-autologin-noxwayland
+
;
+
};
+
passthru.updateScript = nix-update-script {
+
extraArgs = [
+
"--version"
+
"unstable"
+
"--version-regex"
+
"epoch-(.*)"
+
];
+
};
};
meta = {
+10
pkgs/by-name/co/cosmic-notifications/package.nix
···
appstream-glib,
desktop-file-utils,
intltool,
+
nixosTests,
}:
rustPlatform.buildRustPackage (finalAttrs: {
···
wrapProgram $out/bin/cosmic-notifications \
--prefix LD_LIBRARY_PATH : "${lib.makeLibraryPath [ wayland ]}"
'';
+
+
passthru.tests = {
+
inherit (nixosTests)
+
cosmic
+
cosmic-autologin
+
cosmic-noxwayland
+
cosmic-autologin-noxwayland
+
;
+
};
meta = with lib; {
homepage = "https://github.com/pop-os/cosmic-notifications";
+18 -7
pkgs/by-name/co/cosmic-osd/package.nix
···
pulseaudio,
udev,
nix-update-script,
+
nixosTests,
}:
rustPlatform.buildRustPackage (finalAttrs: {
···
env.POLKIT_AGENT_HELPER_1 = "/run/wrappers/bin/polkit-agent-helper-1";
-
passthru.updateScript = nix-update-script {
-
extraArgs = [
-
"--version"
-
"unstable"
-
"--version-regex"
-
"epoch-(.*)"
-
];
+
passthru = {
+
tests = {
+
inherit (nixosTests)
+
cosmic
+
cosmic-autologin
+
cosmic-noxwayland
+
cosmic-autologin-noxwayland
+
;
+
};
+
updateScript = nix-update-script {
+
extraArgs = [
+
"--version"
+
"unstable"
+
"--version-regex"
+
"epoch-(.*)"
+
];
+
};
};
meta = {
+18 -7
pkgs/by-name/co/cosmic-panel/package.nix
···
libcosmicAppHook,
just,
nix-update-script,
+
nixosTests,
}:
rustPlatform.buildRustPackage (finalAttrs: {
···
"target/${stdenv.hostPlatform.rust.cargoShortTarget}/release/cosmic-panel"
];
-
passthru.updateScript = nix-update-script {
-
extraArgs = [
-
"--version"
-
"unstable"
-
"--version-regex"
-
"epoch-(.*)"
-
];
+
passthru = {
+
tests = {
+
inherit (nixosTests)
+
cosmic
+
cosmic-autologin
+
cosmic-noxwayland
+
cosmic-autologin-noxwayland
+
;
+
};
+
updateScript = nix-update-script {
+
extraArgs = [
+
"--version"
+
"unstable"
+
"--version-regex"
+
"epoch-(.*)"
+
];
+
};
};
meta = {
+18 -7
pkgs/by-name/co/cosmic-player/package.nix
···
libglvnd,
libgbm,
nix-update-script,
+
nixosTests,
}:
rustPlatform.buildRustPackage (finalAttrs: {
···
libcosmicAppWrapperArgs+=(--prefix GST_PLUGIN_SYSTEM_PATH_1_0 : "$GST_PLUGIN_SYSTEM_PATH_1_0")
'';
-
passthru.updateScript = nix-update-script {
-
extraArgs = [
-
"--version"
-
"unstable"
-
"--version-regex"
-
"epoch-(.*)"
-
];
+
passthru = {
+
tests = {
+
inherit (nixosTests)
+
cosmic
+
cosmic-autologin
+
cosmic-noxwayland
+
cosmic-autologin-noxwayland
+
;
+
};
+
updateScript = nix-update-script {
+
extraArgs = [
+
"--version"
+
"unstable"
+
"--version-regex"
+
"epoch-(.*)"
+
];
+
};
};
meta = {
+16 -5
pkgs/by-name/co/cosmic-protocols/package.nix
···
fetchFromGitHub,
wayland-scanner,
nix-update-script,
+
nixosTests,
}:
stdenv.mkDerivation {
···
makeFlags = [ "PREFIX=${placeholder "out"}" ];
nativeBuildInputs = [ wayland-scanner ];
-
passthru.updateScript = nix-update-script {
-
extraArgs = [
-
"--version"
-
"branch=HEAD"
-
];
+
passthru = {
+
tests = {
+
inherit (nixosTests)
+
cosmic
+
cosmic-autologin
+
cosmic-noxwayland
+
cosmic-autologin-noxwayland
+
;
+
};
+
updateScript = nix-update-script {
+
extraArgs = [
+
"--version"
+
"branch=HEAD"
+
];
+
};
};
meta = {
+18 -7
pkgs/by-name/co/cosmic-randr/package.nix
···
pkg-config,
wayland,
nix-update-script,
+
nixosTests,
}:
rustPlatform.buildRustPackage (finalAttrs: {
···
"target/${stdenv.hostPlatform.rust.cargoShortTarget}/release/cosmic-randr"
];
-
passthru.updateScript = nix-update-script {
-
extraArgs = [
-
"--version"
-
"unstable"
-
"--version-regex"
-
"epoch-(.*)"
-
];
+
passthru = {
+
tests = {
+
inherit (nixosTests)
+
cosmic
+
cosmic-autologin
+
cosmic-noxwayland
+
cosmic-autologin-noxwayland
+
;
+
};
+
updateScript = nix-update-script {
+
extraArgs = [
+
"--version"
+
"unstable"
+
"--version-regex"
+
"epoch-(.*)"
+
];
+
};
};
meta = {
+10
pkgs/by-name/co/cosmic-screenshot/package.nix
···
rustPlatform,
just,
pkg-config,
+
nixosTests,
}:
rustPlatform.buildRustPackage (finalAttrs: {
···
"bin-src"
"target/${stdenv.hostPlatform.rust.cargoShortTarget}/release/cosmic-screenshot"
];
+
+
passthru.tests = {
+
inherit (nixosTests)
+
cosmic
+
cosmic-autologin
+
cosmic-noxwayland
+
cosmic-autologin-noxwayland
+
;
+
};
meta = with lib; {
homepage = "https://github.com/pop-os/cosmic-screenshot";
+12 -1
pkgs/by-name/co/cosmic-session/package.nix
···
dbus,
stdenv,
xdg-desktop-portal-cosmic,
+
nixosTests,
}:
rustPlatform.buildRustPackage (finalAttrs: {
···
fi
'';
-
passthru.providedSessions = [ "cosmic" ];
+
passthru = {
+
providedSessions = [ "cosmic" ];
+
tests = {
+
inherit (nixosTests)
+
cosmic
+
cosmic-autologin
+
cosmic-noxwayland
+
cosmic-autologin-noxwayland
+
;
+
};
+
};
meta = {
homepage = "https://github.com/pop-os/cosmic-session";
+10
pkgs/by-name/co/cosmic-settings-daemon/package.nix
···
geoclue2-with-demo-agent,
libinput,
udev,
+
nixosTests,
}:
rustPlatform.buildRustPackage (finalAttrs: {
···
];
dontCargoInstall = true;
+
+
passthru.tests = {
+
inherit (nixosTests)
+
cosmic
+
cosmic-autologin
+
cosmic-noxwayland
+
cosmic-autologin-noxwayland
+
;
+
};
meta = with lib; {
homepage = "https://github.com/pop-os/cosmic-settings-daemon";
+18 -7
pkgs/by-name/co/cosmic-settings/package.nix
···
cosmic-randr,
xkeyboard_config,
nix-update-script,
+
nixosTests,
}:
let
libcosmicAppHook' = (libcosmicAppHook.__spliced.buildHost or libcosmicAppHook).override {
···
)
'';
-
passthru.updateScript = nix-update-script {
-
extraArgs = [
-
"--version"
-
"unstable"
-
"--version-regex"
-
"epoch-(.*)"
-
];
+
passthru = {
+
tests = {
+
inherit (nixosTests)
+
cosmic
+
cosmic-autologin
+
cosmic-noxwayland
+
cosmic-autologin-noxwayland
+
;
+
};
+
updateScript = nix-update-script {
+
extraArgs = [
+
"--version"
+
"unstable"
+
"--version-regex"
+
"epoch-(.*)"
+
];
+
};
};
meta = {
+9
pkgs/by-name/co/cosmic-store/package.nix
···
flatpak,
openssl,
nix-update-script,
+
nixosTests,
}:
rustPlatform.buildRustPackage (finalAttrs: {
···
];
passthru = {
+
tests = {
+
inherit (nixosTests)
+
cosmic
+
cosmic-autologin
+
cosmic-noxwayland
+
cosmic-autologin-noxwayland
+
;
+
};
updateScript = nix-update-script {
extraArgs = [
"--version"
+18 -7
pkgs/by-name/co/cosmic-term/package.nix
···
freetype,
libinput,
nix-update-script,
+
nixosTests,
}:
rustPlatform.buildRustPackage (finalAttrs: {
···
"target/${stdenv.hostPlatform.rust.cargoShortTarget}/release/cosmic-term"
];
-
passthru.updateScript = nix-update-script {
-
extraArgs = [
-
"--version"
-
"unstable"
-
"--version-regex"
-
"epoch-(.*)"
-
];
+
passthru = {
+
tests = {
+
inherit (nixosTests)
+
cosmic
+
cosmic-autologin
+
cosmic-noxwayland
+
cosmic-autologin-noxwayland
+
;
+
};
+
updateScript = nix-update-script {
+
extraArgs = [
+
"--version"
+
"unstable"
+
"--version-regex"
+
"epoch-(.*)"
+
];
+
};
};
meta = {
+18 -7
pkgs/by-name/co/cosmic-workspaces-epoch/package.nix
···
libgbm,
udev,
nix-update-script,
+
nixosTests,
}:
rustPlatform.buildRustPackage (finalAttrs: {
···
"CARGO_TARGET_DIR=target/${stdenv.hostPlatform.rust.cargoShortTarget}"
];
-
passthru.updateScript = nix-update-script {
-
extraArgs = [
-
"--version"
-
"unstable"
-
"--version-regex"
-
"epoch-(.*)"
-
];
+
passthru = {
+
tests = {
+
inherit (nixosTests)
+
cosmic
+
cosmic-autologin
+
cosmic-noxwayland
+
cosmic-autologin-noxwayland
+
;
+
};
+
updateScript = nix-update-script {
+
extraArgs = [
+
"--version"
+
"unstable"
+
"--version-regex"
+
"epoch-(.*)"
+
];
+
};
};
meta = {
+2 -2
pkgs/by-name/el/elasticsearch-curator/package.nix
···
python3.pkgs.buildPythonApplication rec {
pname = "elasticsearch-curator";
-
version = "8.0.20";
+
version = "8.0.21";
pyproject = true;
src = fetchFromGitHub {
owner = "elastic";
repo = "curator";
tag = "v${version}";
-
hash = "sha256-oeQ36CvR/v0Mvo+aGL+dYHTgEsq9TesZoBMdoePmgnI=";
+
hash = "sha256-yVOZBz4AJNjmpxRp3t03KwDzp/3W8uJiHwuSRJbfLvk=";
};
pythonRelaxDeps = [ "es-client" ];
+2 -2
pkgs/by-name/ex/exploitdb/package.nix
···
stdenv.mkDerivation rec {
pname = "exploitdb";
-
version = "2025-04-07";
+
version = "2025-04-08";
src = fetchFromGitLab {
owner = "exploit-database";
repo = "exploitdb";
rev = "refs/tags/${version}";
-
hash = "sha256-cuKfuxgHD6aFsYSbcmLSaqz5z1EyOCgjBxsrvJFfuoU=";
+
hash = "sha256-xo9DhcQyigfAOF/yn46U09YMr8jlbJZp93wwJ4btr6Y=";
};
nativeBuildInputs = [ makeWrapper ];
+3 -3
pkgs/by-name/ff/ffizer/package.nix
···
rustPlatform.buildRustPackage rec {
pname = "ffizer";
-
version = "2.13.1";
+
version = "2.13.2";
buildFeatures = [ "cli" ];
···
owner = "ffizer";
repo = "ffizer";
rev = version;
-
hash = "sha256-ZX6Zv6ioAO33Cc5WCVBgJWlOmNvbVgckMylRnphpOdw=";
+
hash = "sha256-GL1tdWOcbdybPayfShoGnxHsqYi8p+DZ6Eo/8bvWElE=";
};
useFetchCargoVendor = true;
-
cargoHash = "sha256-JbCRD2P2jt2f+c2BUnb512p5ulein0guzgx4gj3SeVU=";
+
cargoHash = "sha256-5hsJ6eMiUPOqAzW1bdXTGTP5tY6VM2tTdySpkJl6pAY=";
nativeBuildInputs = [
pkg-config
+24 -13
pkgs/by-name/gi/gitlab-runner/package.nix
···
buildGoModule (finalAttrs: {
pname = "gitlab-runner";
-
version = "17.2.0";
+
version = "17.10.1";
src = fetchFromGitLab {
owner = "gitlab-org";
repo = "gitlab-runner";
tag = "v${finalAttrs.version}";
-
hash = "sha256-a2Igy4DS3fYTvPW1vvDrH/DjMQ4lG9cm/P3mFr+y9s4=";
+
hash = "sha256-pLmDWZHxd9dNhmbcHJRBxPuY0IpcJoXz/fOJeP1lVlA=";
};
-
vendorHash = "sha256-1MwHss76apA9KoFhEU6lYiUACrPMGYzjhds6nTyNuJI=";
+
vendorHash = "sha256-1NteDxcGjsC0kT/9u7BT065EN/rBhaNznegdPHZUKxo=";
# For patchShebangs
nativeBuildInputs = [ bash ];
···
''
# Remove some tests that can't work during a nix build
-
# Requires to run in a git repo
+
# Needs the build directory to be a git repo
sed -i "s/func TestCacheArchiverAddingUntrackedFiles/func OFF_TestCacheArchiverAddingUntrackedFiles/" commands/helpers/file_archiver_test.go
sed -i "s/func TestCacheArchiverAddingUntrackedUnicodeFiles/func OFF_TestCacheArchiverAddingUntrackedUnicodeFiles/" commands/helpers/file_archiver_test.go
+
rm shells/abstract_test.go
# No writable developer environment
+
rm common/build_settings_test.go
rm common/build_test.go
-
rm common/build_settings_test.go
rm executors/custom/custom_test.go
-
# No docker during build
+
# No Docker during build
+
rm executors/docker/docker_test.go
+
rm executors/docker/services_test.go
rm executors/docker/terminal_test.go
-
rm executors/docker/docker_test.go
rm helpers/docker/auth/auth_test.go
-
rm executors/docker/services_test.go
+
+
# No Kubernetes during build
+
rm executors/kubernetes/feature_test.go
+
rm executors/kubernetes/kubernetes_test.go
+
rm executors/kubernetes/overwrites_test.go
''
+ lib.optionalString stdenv.buildPlatform.isDarwin ''
+
# Invalid bind arguments break Unix socket tests
+
sed -i "s/func TestRunnerWrapperCommand_createListener/func OFF_TestRunnerWrapperCommand_createListener/" commands/wrapper_test.go
+
# No keychain access during build breaks X.509 certificate tests
-
rm helpers/certificate/x509_test.go
-
rm network/client_test.go
+
sed -i "s/func TestCertificate/func OFF_TestCertificate/" helpers/certificate/x509_test.go
+
sed -i "s/func TestClientInvalidSSL/func OFF_TestClientInvalidSSL/" network/client_test.go
'';
excludedPackages = [
-
# CI helper script for pushing images to Docker and ECR registries
+
# Nested dependency Go module, used with go.mod replace directive
#
-
# https://gitlab.com/gitlab-org/gitlab-runner/-/merge_requests/4139
-
"./scripts/sync-docker-images"
+
# https://gitlab.com/gitlab-org/gitlab-runner/-/commit/57ea9df5d8a8deb78c8d1972930bbeaa80d05e78
+
"./helpers/runner_wrapper/api"
+
# Helper scripts for upstream Make targets, not intended for downstream consumers
+
"./scripts"
];
ldflags =
+3 -3
pkgs/by-name/go/go-toml/package.nix
···
fetchFromGitHub,
}:
let
-
version = "2.2.3";
+
version = "2.2.4";
in
buildGoModule {
pname = "go-toml";
···
owner = "pelletier";
repo = "go-toml";
rev = "v${version}";
-
sha256 = "sha256-+l89SvJ/4SxVItys1ROLOv2hZ5euU1MF21Yn0siQHUM=";
+
sha256 = "sha256-VKUrpSaGzkewNSyE0sB6PWVIQiraY7UxE5Wve+76UFk=";
};
-
vendorHash = "sha256-YkOcpzn5AKFMDWUYbKY8DzGMiIMSyaDfexFmXv5HNQI=";
+
vendorHash = null;
excludedPackages = [
"cmd/gotoml-test-decoder"
+2 -2
pkgs/by-name/go/goconst/package.nix
···
buildGoModule rec {
pname = "goconst";
-
version = "1.7.1";
+
version = "1.8.0";
excludedPackages = [ "tests" ];
···
owner = "jgautheron";
repo = "goconst";
rev = "v${version}";
-
sha256 = "sha256-GpOZJ5/5aNw1o8fk2RSAx200v6AZ+pbNu/25i8OSS1Y=";
+
sha256 = "sha256-pEkwEVnxZ7d10FE1CG5Ym9JBbzZl8mnabzdPg5gfKuo=";
};
vendorHash = null;
+3 -3
pkgs/by-name/gr/greenmask/package.nix
···
buildGoModule rec {
pname = "greenmask";
-
version = "0.2.9";
+
version = "0.2.11";
src = fetchFromGitHub {
owner = "GreenmaskIO";
repo = "greenmask";
tag = "v${version}";
-
hash = "sha256-ORyczdynAAr2hYzXove/IXRngkRIhKgXLQg5VbvvGS8=";
+
hash = "sha256-KHM/r4zDJrZMIC7+Kp+98xhV5r4zkpxc1ffqf0jgnLs=";
};
-
vendorHash = "sha256-UY79Fex8hwaXtFLefBUeyO7PxJevWWaQU5MEOAMLPkA=";
+
vendorHash = "sha256-g3/WuLDb4mAzklT+nxQ1U/l+JDzSubENMB5hWjIaIIU=";
subPackages = [ "cmd/greenmask/" ];
+3 -3
pkgs/by-name/ht/httm/package.nix
···
rustPlatform.buildRustPackage rec {
pname = "httm";
-
version = "0.46.6";
+
version = "0.46.7";
src = fetchFromGitHub {
owner = "kimono-koans";
repo = "httm";
rev = version;
-
hash = "sha256-QMw5FrI5GCaUrUPaxqGDBtz7RPcCFQn+jntmyertzhM=";
+
hash = "sha256-GSYkgDDDkvQnuW8zeLL703L8tlgklhB3OKulJdmrRoY=";
};
useFetchCargoVendor = true;
-
cargoHash = "sha256-dIF3Qi8rK+H07x4uhi8uXs1Pdr8p3KIkVUrXqEQpCsc=";
+
cargoHash = "sha256-UxOm6G0hQfi7L49YQEshfNkPMy7LPNX2VBg0F9uLMiY=";
nativeBuildInputs = [ installShellFiles ];
+8 -21
pkgs/by-name/hy/hydra/package.nix
···
fetchFromGitHub,
nixosTests,
unstableGitUpdater,
-
nixVersions,
}:
let
···
CryptRandPasswd
DBDPg
DBDSQLite
+
DBIxClassHelpers
DataDump
DateTime
DigestSHA1
···
UUID4Tiny
XMLSimple
YAML
-
nix.perl-bindings
+
(nix.libs.nix-perl-bindings or nix.perl-bindings)
git
];
};
-
nix-eval-jobs' =
-
(nix-eval-jobs.override {
-
nix = nixVersions.nix_2_25;
-
}).overrideAttrs
-
(_: {
-
version = "2.25.0-unstable-2025-02-13";
-
src = fetchFromGitHub {
-
owner = "nix-community";
-
repo = "nix-eval-jobs";
-
rev = "6d4fd5a93d7bc953ffa4dcd6d53ad7056a71eff7";
-
hash = "sha256-1dZLPw+nlFQzzswfyTxW+8VF1AJ4ZvoYvLTjlHiz1SA=";
-
};
-
});
in
stdenv.mkDerivation (finalAttrs: {
pname = "hydra";
-
version = "0-unstable-2025-02-12";
+
version = "0-unstable-2025-04-07";
src = fetchFromGitHub {
owner = "NixOS";
repo = "hydra";
-
rev = "c6f98202cd1b091475ae51b6a093d00b4c8060d4";
-
hash = "sha256-CEDUtkA005PiLt1wSo3sgmxfxUBikQSE74ZudyWNxfE=";
+
rev = "1c52c4c0ed596ea71de370562ed5af1604bd2183";
+
hash = "sha256-pcZA2SA7nskxsvDYp3nzF5V258b67YrZONv9G3PhLCE=";
};
outputs = [
···
subversion
openssh
nix
-
nix-eval-jobs'
+
nix-eval-jobs
coreutils
findutils
pixz
···
glibcLocales
python3
libressl.nc
-
nix-eval-jobs'
+
nix-eval-jobs
openldap
postgresql
];
···
--set-default HYDRA_RELEASE ${finalAttrs.version} \
--set HYDRA_HOME $out/libexec/hydra \
--set NIX_RELEASE ${nix.name or "unknown"} \
-
--set NIX_EVAL_JOBS_RELEASE ${nix-eval-jobs'.name or "unknown"}
+
--set NIX_EVAL_JOBS_RELEASE ${nix-eval-jobs.name or "unknown"}
done
'';
+3 -3
pkgs/by-name/ir/iroh/package.nix
···
rustPlatform.buildRustPackage rec {
pname = "iroh";
-
version = "0.34.0";
+
version = "0.34.1";
src = fetchFromGitHub {
owner = "n0-computer";
repo = "iroh";
rev = "v${version}";
-
hash = "sha256-uavWluu7rVY2lZXDRsKApcZMB7TJsGuhJzieZPMXdvE=";
+
hash = "sha256-kOqmkuKOP2dWrUVaGwHckWjaFVZkSoXqqUgn+2KaWkc=";
};
useFetchCargoVendor = true;
-
cargoHash = "sha256-7tQbfXVdgoxACF6qtesbUQ3AtVFAI2IbGO720PjwZCc=";
+
cargoHash = "sha256-O/j+/sRyMtqd4GaER2trn9SEFpZuSlc5q1MTXU+rwLg=";
buildInputs = lib.optionals stdenv.hostPlatform.isDarwin (
with darwin.apple_sdk.frameworks;
+3 -3
pkgs/by-name/jq/jql/package.nix
···
rustPlatform.buildRustPackage rec {
pname = "jql";
-
version = "8.0.4";
+
version = "8.0.5";
src = fetchFromGitHub {
owner = "yamafaktory";
repo = "jql";
rev = "jql-v${version}";
-
hash = "sha256-J+Zqmfev2DyD0SLFGaI0egVgmEC+a2nqBrNDGX4zNnE=";
+
hash = "sha256-0sQEC2kUnuuKp73DJsNBFB0VL0rkBkudmr7ZQpS1v04=";
};
useFetchCargoVendor = true;
-
cargoHash = "sha256-tMxy0bi3518VjzJuy4Agpq+UydMEyJRqavX5kIsBYjY=";
+
cargoHash = "sha256-10eM7tczFoQVYagyP1btsCp4PHm+zRoh2oAEVVxsROA=";
meta = with lib; {
description = "JSON Query Language CLI tool built with Rust";
+3 -3
pkgs/by-name/ko/kor/package.nix
···
buildGoModule rec {
pname = "kor";
-
version = "0.6.0";
+
version = "0.6.1";
src = fetchFromGitHub {
owner = "yonahd";
repo = pname;
rev = "v${version}";
-
hash = "sha256-VK5G8J851rsIEt2ljrTWFPCxhIBTgLkMlEMVb9kJcOs=";
+
hash = "sha256-jqP2GsqliltjabbHDcRseMz7TOWl9YofAG/4Y7ADub8=";
};
-
vendorHash = "sha256-iJtZ/t4VCVPqMKwV7jCKwqxitkZ/pTlP6mz9ElGcSsY=";
+
vendorHash = "sha256-HZS1PPlra1uGBuerGs5X9poRzn7EGhTopKaC9tkhjlo=";
preCheck = ''
HOME=$(mktemp -d)
+7 -1
pkgs/by-name/li/libblake3/package.nix
···
cmake,
fetchFromGitHub,
tbb_2021_11,
-
useTBB ? true,
+
+
# Until we have a release with
+
# https://github.com/BLAKE3-team/BLAKE3/pull/461 and similar, or those
+
# PRs are patched onto this current release. Even then, I think we
+
# still need to disable for MinGW build because
+
# https://github.com/BLAKE3-team/BLAKE3/issues/467
+
useTBB ? false,
}:
stdenv.mkDerivation (finalAttrs: {
+3 -3
pkgs/by-name/li/libdeltachat/package.nix
···
stdenv.mkDerivation rec {
pname = "libdeltachat";
-
version = "1.158.0";
+
version = "1.159.0";
src = fetchFromGitHub {
owner = "chatmail";
repo = "core";
tag = "v${version}";
-
hash = "sha256-0po4nPCunq9cBaVFSsS1uo18dv6Y6IHGzL1zC2zwXdI=";
+
hash = "sha256-Pdrb2A4OhW2+XsBuwTQfIjZms9byaMg/KV2fGWD35/w=";
};
patches = [
···
cargoDeps = rustPlatform.fetchCargoVendor {
pname = "deltachat-core-rust";
inherit version src;
-
hash = "sha256-k8TN6YtCVPR8RnFoiGX9APvKwpQzj7T53DlKMD9r/e0=";
+
hash = "sha256-5xihycfIdZ/DINoKZ7kiRB46xKyEB4aAQz2OkejoXJc=";
};
nativeBuildInputs =
+3 -3
pkgs/by-name/ma/manga-tui/package.nix
···
nix-update-script,
}:
let
-
version = "0.6.0";
+
version = "0.7.0";
in
rustPlatform.buildRustPackage {
pname = "manga-tui";
···
owner = "josueBarretogit";
repo = "manga-tui";
rev = "v${version}";
-
hash = "sha256-L5KZaBJDG0z6NUGPJfbOkKCp1xQEzqfJ9GREx189VqU=";
+
hash = "sha256-1WFg2hG3UnOO9+HpUcdPkZNhsNYa2QG1PhzLZ4bQiQM=";
};
useFetchCargoVendor = true;
-
cargoHash = "sha256-gmG/gDozYizwjcm3SGs2m8oLiuWp6oxJPOB3FlHfW+4=";
+
cargoHash = "sha256-1nERwIZCR/afgfGdronpy145GnDkbsB7YjF6XyDcfEY=";
nativeBuildInputs = [ pkg-config ];
+2 -2
pkgs/by-name/mo/mockgen/package.nix
···
buildGoModule rec {
pname = "mockgen";
-
version = "0.5.0";
+
version = "0.5.1";
src = fetchFromGitHub {
owner = "uber-go";
repo = "mock";
rev = "v${version}";
-
sha256 = "sha256-1UlaM3IvKlplBW1pg5l+IXwirlierjDKqKsVwFt7EAw=";
+
sha256 = "sha256-xzPuy+KH40FDnjir/aROYlgWzLBY8qKDbYmkFMzHVkc=";
};
vendorHash = "sha256-0OnK5/e0juEYrNJuVkr+tK66btRW/oaHpJSDakB32Bc=";
+3 -3
pkgs/by-name/my/myks/package.nix
···
buildGoModule rec {
pname = "myks";
-
version = "4.6.1";
+
version = "4.8.0";
src = fetchFromGitHub {
owner = "mykso";
repo = "myks";
tag = "v${version}";
-
hash = "sha256-xHWiE0SCv5LbObAa4Ha/U1uTFe9z11nhpB/eMj5qYoA=";
+
hash = "sha256-B2arJ7m7q/vf1YcaYquhkBU3anekZAwRd1ZIvwvYnmM=";
};
-
vendorHash = "sha256-tgshaSrh5o28uiSMF7sv4AP57xYkaHq6B8sQTrnteqQ=";
+
vendorHash = "sha256-/LpBb0wbK7OP8HmL2/uMVeilIs4P51Pf+sg23zbPqtI=";
subPackages = ".";
+51
pkgs/by-name/ne/necesse-server/package.nix
···
+
{
+
fetchzip,
+
jre,
+
lib,
+
stdenvNoCC,
+
}:
+
+
let
+
version = "0.31.1-17664948";
+
urlVersion = lib.replaceStrings [ "." ] [ "-" ] version;
+
+
in
+
stdenvNoCC.mkDerivation {
+
pname = "necesse-server";
+
inherit version;
+
+
src = fetchzip {
+
url = "https://necessegame.com/content/server/${urlVersion}/necesse-server-linux64-${urlVersion}.zip";
+
hash = "sha256-H7/fc3zkuEMuv9Uq00TLSLF4rT8+UWsofnuCFrmUtjU=";
+
};
+
+
# removing packaged jre since we use our own
+
postUnpack = ''
+
rm -rf "$sourceRoot/jre"
+
'';
+
+
installPhase = ''
+
runHook preInstall
+
+
mkdir -p $out/bin
+
cp -r . $out
+
params='-nogui "$@"'
+
cat >$out/bin/necesse-server <<EOF
+
#! $SHELL -e
+
exec ${lib.getExe jre} -jar $out/Server.jar $params
+
EOF
+
chmod +x $out/bin/necesse-server
+
+
runHook postInstall
+
'';
+
+
meta = {
+
homepage = "https://necessegame.com/server/";
+
description = "Dedicated server for Necesse";
+
sourceProvenance = with lib.sourceTypes; [ binaryBytecode ];
+
platforms = lib.platforms.linux;
+
license = lib.licenses.unfreeRedistributable;
+
mainProgram = "necesse-server";
+
maintainers = with lib.maintainers; [ cr0n ];
+
};
+
}
+2 -2
pkgs/by-name/ni/nickel/package.nix
···
python3,
versionCheckHook,
pkg-config,
-
nix,
+
nixVersions,
nix-update-script,
enableNixImport ? true,
}:
···
];
buildInputs = lib.optionals enableNixImport [
-
nix
+
nixVersions.nix_2_24
boost
];
+4 -4
pkgs/by-name/ni/nix-heuristic-gc/package.nix
···
{
lib,
fetchFromGitHub,
-
nix,
+
nixVersions,
boost,
python3Packages,
}:
···
# NIX_SYSTEM suggested at
# https://github.com/NixOS/nixpkgs/issues/386184#issuecomment-2692433531
-
NIX_SYSTEM = nix.stdenv.hostPlatform.system;
-
NIX_CFLAGS_COMPILE = [ "-I${lib.getDev nix}/include/nix" ];
+
NIX_SYSTEM = nixVersions.nix_2_24.stdenv.hostPlatform.system;
+
NIX_CFLAGS_COMPILE = [ "-I${lib.getDev nixVersions.nix_2_24}/include/nix" ];
buildInputs = [
boost
-
nix
+
nixVersions.nix_2_24
python3Packages.pybind11
python3Packages.setuptools
];
+2 -2
pkgs/by-name/ni/nix-plugins/package.nix
···
lib,
stdenv,
fetchFromGitHub,
-
nix,
+
nixVersions,
cmake,
pkg-config,
boost,
···
];
buildInputs = [
-
nix
+
nixVersions.nix_2_24
boost
];
+3 -3
pkgs/by-name/nu/nu_scripts/package.nix
···
stdenvNoCC.mkDerivation rec {
pname = "nu_scripts";
-
version = "0-unstable-2025-03-23";
+
version = "0-unstable-2025-04-07";
src = fetchFromGitHub {
owner = "nushell";
repo = pname;
-
rev = "e956708244820d2b98620ef0ed10e63cb7d42b3a";
-
hash = "sha256-fzQ8f6mB7cVRbwVOCxPD/4nFmI3s5mXzJagn8us6ngA=";
+
rev = "b7869a8f337dc64f4d1dbf8f2c7a5833bc3abfbf";
+
hash = "sha256-IoyClULiILl5wPwyf7zzTK5Rb0yEbkVpFRtUSHksrjc=";
};
installPhase = ''
+3 -3
pkgs/by-name/op/openfga/package.nix
···
let
pname = "openfga";
-
version = "1.8.8";
+
version = "1.8.9";
in
buildGoModule {
···
owner = "openfga";
repo = "openfga";
rev = "v${version}";
-
hash = "sha256-Hg6mtePtaZ2Yg3ohDVEDFsZKcBDY24K2lb+avZHfqD8=";
+
hash = "sha256-yrj59gZjYxYPVqizCm98INsWmMTTx9BkK++6Gr5mr/Y=";
};
-
vendorHash = "sha256-M14y4WZZTvXm6dOkJV16TFv2xHkInZCI9rEu9h7lQ1I=";
+
vendorHash = "sha256-6rC8de55fadBCE+15kN17Xm9UmkH/fwbndLI0FXO/Cc=";
nativeBuildInputs = [ installShellFiles ];
+3 -3
pkgs/by-name/pg/pgroll/package.nix
···
buildGoModule rec {
pname = "pgroll";
-
version = "0.10.0";
+
version = "0.11.0";
src = fetchFromGitHub {
owner = "xataio";
repo = "pgroll";
tag = "v${version}";
-
hash = "sha256-AJ0dTvywbwwSHOwSPrAgTE9M1AMvo/GRj6L1dZM9Hz8=";
+
hash = "sha256-XjjoyJZVy/Zjac35enaBRCWU92YA9xFzFRhlsR8G9Bg=";
};
proxyVendor = true;
-
vendorHash = "sha256-olblf/mi/M9Zo4C/fR/Z11C+bAEFOy7bz7EXfMn8Akw=";
+
vendorHash = "sha256-tPGqa2Sa1N+WY5iprryil1Yzx0FbbgSp4CcNc9dNWhY=";
excludedPackages = [ "dev" ];
+3 -3
pkgs/by-name/ph/phrase-cli/package.nix
···
buildGoModule rec {
pname = "phrase-cli";
-
version = "2.39.0";
+
version = "2.40.0";
src = fetchFromGitHub {
owner = "phrase";
repo = "phrase-cli";
rev = version;
-
sha256 = "sha256-85XgRml1D6J4HkxiUk0zLlC+q0ylmN68hL0z73HG/Lk=";
+
sha256 = "sha256-d/B5XzEAM1GlpQxshy0kEJexF01FlF99hnoctKDXhp0=";
};
-
vendorHash = "sha256-k7y0sJTulCf234oMCccw+bk0pzsebqD82kkVX7xZluE=";
+
vendorHash = "sha256-VV4ctHj9fPosAgqBOfkqOKETSeGJXFPPP+kBMgqV2nk=";
ldflags = [ "-X=github.com/phrase/phrase-cli/cmd.PHRASE_CLIENT_VERSION=${version}" ];
+2 -2
pkgs/by-name/qu/qucsator-rf/package.nix
···
stdenv.mkDerivation rec {
pname = "qucsator-rf";
-
version = "1.0.5";
+
version = "1.0.6";
src = fetchFromGitHub {
owner = "ra3xdh";
repo = "qucsator_rf";
rev = version;
-
hash = "sha256-Q1hpCt3SeXRzUFX4jPUu8ZsPTx2W28LQ3YwlYtOZhqg=";
+
hash = "sha256-c9deaY9eV1q+bx/k1tNpdVrJ8Q/L2G0lSQBYaOSfoDs=";
};
# Upstream forces NO_DEFAULT_PATH on APPLE
+2 -2
pkgs/by-name/re/remnote/package.nix
···
}:
let
pname = "remnote";
-
version = "1.19.8";
+
version = "1.19.11";
src = fetchurl {
url = "https://download2.remnote.io/remnote-desktop2/RemNote-${version}.AppImage";
-
hash = "sha256-xMr+UftIWxtlYzzdOtidCJWisSwJd+xEtaKyoZnyVXc=";
+
hash = "sha256-rKvbh4TihITP+M4znObUU+80YfG9gookilLpIBUxt9U=";
};
appimageContents = appimageTools.extractType2 { inherit pname version src; };
in
+2 -2
pkgs/by-name/sq/squashfuse/package.nix
···
fetchFromGitHub,
autoreconfHook,
libtool,
-
fuse,
+
fuse3,
pkg-config,
lz4,
xz,
···
zlib
lzo
zstd
-
fuse
+
fuse3
];
meta = {
+3 -3
pkgs/by-name/st/stackit-cli/package.nix
···
buildGoModule rec {
pname = "stackit-cli";
-
version = "0.29.0";
+
version = "0.30.0";
src = fetchFromGitHub {
owner = "stackitcloud";
repo = "stackit-cli";
rev = "v${version}";
-
hash = "sha256-EPjQrPt6m7yOFgYqHOaWAZN7CjlsOgl2jsEuRB8+1fE=";
+
hash = "sha256-S+lmNVZafa0BFN0rhmhBU2ez28ATDFDF2TApt32c9Z8=";
};
-
vendorHash = "sha256-NiaY0HKDerYqehZkYToAHazaJe0eMUuue+8h6QdQDHM=";
+
vendorHash = "sha256-y3wztN/exexIwsAnQAlQu81rGTJZrgNmeVj45MVSxk0=";
subPackages = [ "." ];
+3 -3
pkgs/by-name/st/stardust-xr-magnetar/package.nix
···
rustPlatform.buildRustPackage {
pname = "stardust-xr-magnetar";
-
version = "0-unstable-2024-12-29";
+
version = "0-unstable-2025-04-03";
src = fetchFromGitHub {
owner = "stardustxr";
repo = "magnetar";
-
rev = "d00c5ecf0bcaf2b4382ec3b4f3373ea5b761ee7b";
-
hash = "sha256-2I6BRjw5t68OMc93cis4/qnyYT9OBYIr1S+ZF8LmFCc=";
+
rev = "63ff648bb64c23023a0047ea3ff2c0b6b1fd3caf";
+
hash = "sha256-LRI3HKuOUfUb93mHB8DUpp0hvES+GbzsKAxpkLCLzKQ=";
};
useFetchCargoVendor = true;
+3 -3
pkgs/by-name/tr/trunk/package.nix
···
rustPlatform.buildRustPackage rec {
pname = "trunk";
-
version = "0.21.12";
+
version = "0.21.13";
src = fetchFromGitHub {
owner = "trunk-rs";
repo = "trunk";
rev = "v${version}";
-
hash = "sha256-GFRNbrfI0sJ/GuvT924/gxmzbnf0s0QNf+Mpv1+5rbc=";
+
hash = "sha256-Kj0XUO8GSLBUwkvskOidA489cvcHdf9IKSVZ/OqlAnE=";
};
nativeBuildInputs = [ pkg-config ];
···
checkFlags = [ "--skip=tools::tests::download_and_install_binaries" ];
useFetchCargoVendor = true;
-
cargoHash = "sha256-XQyHGavGUnWCTim2jC+kKKNYaWzwXg0slXxABSrKqJg=";
+
cargoHash = "sha256-oXLB/Jbb/J8oXl0IyECIjjv4pdKz94pocD/iTBv4GRs=";
meta = with lib; {
homepage = "https://github.com/trunk-rs/trunk";
+2 -2
pkgs/by-name/tu/turso-cli/package.nix
···
}:
buildGoModule rec {
pname = "turso-cli";
-
version = "1.0.3";
+
version = "1.0.6";
src = fetchFromGitHub {
owner = "tursodatabase";
repo = "turso-cli";
rev = "v${version}";
-
hash = "sha256-94av3EW96qApCYWpo08QjrxoneuqGrE98aE7YXQEaT4=";
+
hash = "sha256-5XGcB003fYAQi8r+IjPxKVRtFgGFkfP2hOIxptlXn9E=";
};
vendorHash = "sha256-tBO21IgUczwMgrEyV7scV3YTY898lYHASaLeXqvBopU=";
+3 -3
pkgs/by-name/uv/uv/package.nix
···
rustPlatform.buildRustPackage (finalAttrs: {
pname = "uv";
-
version = "0.6.12";
+
version = "0.6.13";
src = fetchFromGitHub {
owner = "astral-sh";
repo = "uv";
tag = finalAttrs.version;
-
hash = "sha256-I7SRCw36xXkNnOe1+qDik3p9IeNo70DKMbJpqaoRhhQ=";
+
hash = "sha256-vJvF8ioEtiriWh120WhMxkYSody04PuXA6EISjWWvYA=";
};
useFetchCargoVendor = true;
-
cargoHash = "sha256-ZCdwyjGM9z3GBlwF6TunmNT7IKyn9pssUaBMyZJxLhE=";
+
cargoHash = "sha256-pwbqYe2zdQJQGoqrIwryBHmnS8spPgQ0qdpmxdT+9sk=";
buildInputs = [
rust-jemalloc-sys
+2 -2
pkgs/by-name/ve/vendir/package.nix
···
buildGoModule rec {
pname = "vendir";
-
version = "0.43.1";
+
version = "0.43.2";
src = fetchFromGitHub {
owner = "vmware-tanzu";
repo = "carvel-vendir";
rev = "v${version}";
-
sha256 = "sha256-VIP1NkSZMoTZfvl6xAAbs0sL9rBc6FDaZHgOmRViStY=";
+
sha256 = "sha256-OCFXgVMFEKh3ImKQy4m2HVycyvt9IWJKd5Ng6rjNuzA=";
};
vendorHash = null;
+2 -2
pkgs/by-name/vi/vi-mongo/package.nix
···
buildGoModule rec {
pname = "vi-mongo";
-
version = "0.1.22";
+
version = "0.1.23";
src = fetchFromGitHub {
owner = "kopecmaciej";
repo = "vi-mongo";
tag = "v${version}";
-
hash = "sha256-OKeflsr823Z9KBgymJG2Z9C4OFxdbW8LzVCWLahMJ0s=";
+
hash = "sha256-zQgGclK6iUtN1PMBSuYVYE8tS1qHTKcTDWDYqhVp3Hg=";
};
vendorHash = "sha256-rKXrmK0ns3FB6EGyCJ2nYrCUsQ7yPm8dmzJioiVzHIc=";
+3 -3
pkgs/by-name/wa/wasmi/package.nix
···
rustPlatform.buildRustPackage rec {
pname = "wasmi";
-
version = "0.43.0";
+
version = "0.44.0";
src = fetchFromGitHub {
owner = "paritytech";
repo = "wasmi";
tag = "v${version}";
-
hash = "sha256-h8eViInYiq0HhdYtqjurOOw93to+J5NsOdFXJYZsl8g=";
+
hash = "sha256-tKUkcuVT2945+pf7qdCgbUYbtiZmfE7tfzRlf8H/GkU=";
fetchSubmodules = true;
};
useFetchCargoVendor = true;
-
cargoHash = "sha256-f4oN82T/PepntbDsFTugZkYclaeQXMPAxoV7R7gtqf0=";
+
cargoHash = "sha256-1p/cibicoH39+/Xrf28W2jOWK23LVu7L0nnsVDgvIV8=";
passthru.updateScript = nix-update-script { };
meta = with lib; {
+18 -7
pkgs/by-name/xd/xdg-desktop-portal-cosmic/package.nix
···
gst_all_1,
coreutils,
nix-update-script,
+
nixosTests,
}:
rustPlatform.buildRustPackage (finalAttrs: {
···
"CARGO_TARGET_DIR=target/${stdenv.hostPlatform.rust.cargoShortTarget}"
];
-
passthru.updateScript = nix-update-script {
-
extraArgs = [
-
"--version"
-
"unstable"
-
"--version-regex"
-
"epoch-(.*)"
-
];
+
passthru = {
+
tests = {
+
inherit (nixosTests)
+
cosmic
+
cosmic-autologin
+
cosmic-noxwayland
+
cosmic-autologin-noxwayland
+
;
+
};
+
updateScript = nix-update-script {
+
extraArgs = [
+
"--version"
+
"unstable"
+
"--version-regex"
+
"epoch-(.*)"
+
];
+
};
};
meta = {
+3 -3
pkgs/development/libraries/libvgm/default.nix
···
stdenv.mkDerivation (finalAttrs: {
pname = "libvgm";
-
version = "0-unstable-2024-10-17";
+
version = "0-unstable-2025-04-05";
src = fetchFromGitHub {
owner = "ValleyBell";
repo = "libvgm";
-
rev = "7b694e53e42a75ce48b846c53d08e4a33f627842";
-
hash = "sha256-u+mBzmEixJT3rwuipITktFI4iVswnXftfF7syBw4t/w=";
+
rev = "4464b6d59f1afe99a0f7679dff50c5ada4a31654";
+
hash = "sha256-btKg65haGhuz+xh4eWlujzUIhjjdUg9RelLX/ouLx68=";
};
outputs = [
+2 -2
pkgs/development/python-modules/boto3-stubs/default.nix
···
buildPythonPackage rec {
pname = "boto3-stubs";
-
version = "1.37.28";
+
version = "1.37.29";
pyproject = true;
disabled = pythonOlder "3.7";
···
src = fetchPypi {
pname = "boto3_stubs";
inherit version;
-
hash = "sha256-+FkmPOdsszpMed6lRc1EdYjKI6H9CQg8FvjlhgX4lRU=";
+
hash = "sha256-NkRGBqfBwQyXAN3lkPevsTRUYGVVP3YfNiB8H+uEfgs=";
};
build-system = [ setuptools ];
+2 -2
pkgs/development/python-modules/botocore-stubs/default.nix
···
buildPythonPackage rec {
pname = "botocore-stubs";
-
version = "1.37.28";
+
version = "1.37.29";
pyproject = true;
disabled = pythonOlder "3.7";
···
src = fetchPypi {
pname = "botocore_stubs";
inherit version;
-
hash = "sha256-FsTll2y4O4Y4hHIDUOJF3d5zvTnP4slI1axXxwquyJ4=";
+
hash = "sha256-xZiYvx0Jv2qfSR9HBcVpbnS4MVa3ZqoXFoZ/EbigTqE=";
};
nativeBuildInputs = [ setuptools ];
+2 -2
pkgs/development/python-modules/dirsearch/default.nix
···
];
pythonRemoveDeps = [
# not available, see above
-
"ntlm-auth"
+
"ntlm_auth"
];
pythonRelaxDeps = [
# version checker doesn't recognize 0.8.0.rc2 as >=0.7.0
···
# probably not but we don't have old charset-normalizer versions in nixpkgs
# and requests also depends on it so we can't just override it with an
# older version due to package duplication
-
"charset-normalizer"
+
"charset_normalizer"
];
meta = {
+6 -7
pkgs/development/python-modules/langgraph-prebuilt/default.nix
···
langgraph-checkpoint-sqlite,
postgresql,
postgresqlTestHook,
-
psycopg-pool,
psycopg,
+
psycopg-pool,
pytest-asyncio,
pytest-mock,
pytestCheckHook,
+
xxhash,
# passthru
nix-update-script,
···
doCheck = !stdenv.hostPlatform.isDarwin;
nativeCheckInputs = [
-
pytestCheckHook
-
postgresql
-
postgresqlTestHook
-
];
-
-
checkInputs = [
langgraph-checkpoint
langgraph-checkpoint-postgres
langgraph-checkpoint-sqlite
+
postgresql
+
postgresqlTestHook
psycopg
psycopg-pool
pytest-asyncio
pytest-mock
+
pytestCheckHook
+
xxhash
];
preCheck = ''
+3 -3
pkgs/development/python-modules/langgraph/default.nix
···
langgraph-checkpoint-sqlite,
langsmith,
psycopg,
-
psycopg-pool,
pydantic,
pytest-asyncio,
pytest-mock,
···
disabledTestPaths = [
# psycopg.errors.InsufficientPrivilege: permission denied to create database
-
"tests/test_pregel_async.py"
-
"tests/test_pregel.py"
+
"tests/test_checkpoint_migration.py"
"tests/test_large_cases.py"
"tests/test_large_cases_async.py"
+
"tests/test_pregel.py"
+
"tests/test_pregel_async.py"
];
passthru = {
+3 -3
pkgs/development/python-modules/mcp/default.nix
···
buildPythonPackage rec {
pname = "mcp";
-
version = "1.5.0";
+
version = "1.6.0";
pyproject = true;
src = fetchFromGitHub {
owner = "modelcontextprotocol";
repo = "python-sdk";
tag = "v${version}";
-
hash = "sha256-Z2NN6k4mD6NixDON1MUOELpBZW9JvMvFErcCbFPdg2o=";
+
hash = "sha256-APm3x4tcDbp8D2ygW43wFyP0llJ6fXZiINHRYShp9ZY=";
};
postPatch = ''
···
description = "Official Python SDK for Model Context Protocol servers and clients";
homepage = "https://github.com/modelcontextprotocol/python-sdk";
license = lib.licenses.mit;
-
maintainers = with lib.maintainers; [ dotlambda ];
+
maintainers = with lib.maintainers; [ josh ];
};
}
+2 -2
pkgs/development/python-modules/mcpadapt/default.nix
···
buildPythonPackage rec {
pname = "mcpadapt";
-
version = "0.0.19";
+
version = "0.1.0";
pyproject = true;
src = fetchFromGitHub {
owner = "grll";
repo = "mcpadapt";
tag = "v${version}";
-
hash = "sha256-CQK9Nv12E3jBcHI/RwJOaD2E6DbTWwVvTZ31kpsNGXg=";
+
hash = "sha256-hSmE53LfpLAZosVWHqy3795UPqqLdknMVfWrIxAxWBM=";
};
build-system = [ hatchling ];
+10 -10
pkgs/development/python-modules/mypy-boto3/default.nix
···
"sha256-nVAeLXy2hjJZDjNTjFccKClY7DS0oLv9Q9QLlngkX6M=";
mypy-boto3-codebuild =
-
buildMypyBoto3Package "codebuild" "1.37.26"
-
"sha256-gHSdYTzGKq5U3L3kqNCtl6JW8zzIBTbQeHRmLsPIYGg=";
+
buildMypyBoto3Package "codebuild" "1.37.29"
+
"sha256-iUO4pxG9wJexwwnD3KUie9TeLP1D6Mu3RjP11zYxHp4=";
mypy-boto3-codecatalyst =
buildMypyBoto3Package "codecatalyst" "1.37.0"
···
"sha256-JSVZVCZ6P5A+EqjXHmbbDIdE1rKrdSwNcZvUbYxKpSA=";
mypy-boto3-glue =
-
buildMypyBoto3Package "glue" "1.37.13"
-
"sha256-FrJfuU55fUM3pxt4ey/KLmgXD3wTs6PlksCOBCQ1ibA=";
+
buildMypyBoto3Package "glue" "1.37.29"
+
"sha256-LL7zn9WjB7NyFYN2bs54X9v5i+ax2GpDDFzMcm6t5N0=";
mypy-boto3-grafana =
buildMypyBoto3Package "grafana" "1.37.0"
···
"sha256-Ltzv3h+NATTcKsyd1PfnUdjIhT3V0OS3woGsStyI/qA=";
mypy-boto3-medialive =
-
buildMypyBoto3Package "medialive" "1.37.26"
-
"sha256-fJHjUBVtXAeNth2fAzBdcLwaFNN6ma+3eQpwFnZU6B4=";
+
buildMypyBoto3Package "medialive" "1.37.29"
+
"sha256-X8jdJi7XRidW2DsyFRM+6jMUtu3jNJDNm0h7HMOxp/E=";
mypy-boto3-mediapackage =
buildMypyBoto3Package "mediapackage" "1.37.0"
···
"sha256-e9sP379VsbZeKUhLURtsMsSPxfIvCsYVNqZhUg67+MY=";
mypy-boto3-personalize =
-
buildMypyBoto3Package "personalize" "1.37.0"
-
"sha256-qUtv4DOn0Hle7QGBr3cgphQXDNj9iC0xwOhCGHaayW8=";
+
buildMypyBoto3Package "personalize" "1.37.29"
+
"sha256-A7TLIG3TYVkSAAIRcn6OLoNSUpiwIEItwk4JI+f0nAc=";
mypy-boto3-personalize-events =
buildMypyBoto3Package "personalize-events" "1.37.0"
···
"sha256-UW0b40n+M8za5guDPxhU5cRvtbkqzX6G7M2UaxNq5ws=";
mypy-boto3-transfer =
-
buildMypyBoto3Package "transfer" "1.37.24"
-
"sha256-0+oRkebGHtwR7NXxXfdVMlF1+11+yFQyDBPJGuaz9k4=";
+
buildMypyBoto3Package "transfer" "1.37.29"
+
"sha256-sTjua+D1wGOa/8lod+/cafll9lk3NFI6vkE7NlGKmyU=";
mypy-boto3-translate =
buildMypyBoto3Package "translate" "1.37.0"
+1
pkgs/development/python-modules/private-gpt/default.nix
···
pythonRelaxDeps = [
"cryptography"
+
"docx2txt"
"fastapi"
"llama-index-core"
"llama-index-readers-file"
+2 -2
pkgs/development/python-modules/publicsuffixlist/default.nix
···
buildPythonPackage rec {
pname = "publicsuffixlist";
-
version = "1.0.2.20250329";
+
version = "1.0.2.20250408";
pyproject = true;
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
-
hash = "sha256-HinLmgjEHCmoW3tNTQF8vKWSh7IExxaGbdcztQsPuSk=";
+
hash = "sha256-LDbUgmHbow6IRI0I2s2eyRv9l/hUpH9ubMxcz1rp4uI=";
};
build-system = [ setuptools ];
+2 -2
pkgs/development/python-modules/pyexploitdb/default.nix
···
buildPythonPackage rec {
pname = "pyexploitdb";
-
version = "0.2.74";
+
version = "0.2.75";
pyproject = true;
disabled = pythonOlder "3.7";
···
src = fetchPypi {
pname = "pyExploitDb";
inherit version;
-
hash = "sha256-pQRyIv1wu78vNjxl5tt0kI34RvCEycEMMEtaOnlaa10=";
+
hash = "sha256-rQP9OuWK+kEyc5DipPo0tPagvHm1Rl1YVUiALL7OKvQ=";
};
build-system = [ setuptools ];
+2 -2
pkgs/development/python-modules/reptor/default.nix
···
buildPythonPackage rec {
pname = "reptor";
-
version = "0.27";
+
version = "0.28";
pyproject = true;
disabled = pythonOlder "3.9";
···
owner = "Syslifters";
repo = "reptor";
tag = version;
-
hash = "sha256-aba2f+7I/Lo3Vr7u9VCDRXQ5BRbQpJlQCCnib+Wp9Vs=";
+
hash = "sha256-hzdgG2/bTkzTUPK/Rnch4q12R5kY+qlr6gRwx54vbcE=";
};
pythonRelaxDeps = true;
+2 -2
pkgs/development/python-modules/scikit-base/default.nix
···
buildPythonPackage rec {
pname = "scikit-base";
-
version = "0.12.1";
+
version = "0.12.2";
pyproject = true;
src = fetchFromGitHub {
owner = "sktime";
repo = "skbase";
tag = "v${version}";
-
hash = "sha256-UGYkYhgo6LzlZTg6YDehJXd4D5p8FfUgWPdlW4PPOdI=";
+
hash = "sha256-Bkvk3x76DuLr7Q3NkD7z0ycXK6+K+24hawWeBrX6t1w=";
};
build-system = [ setuptools ];
+2 -2
pkgs/development/python-modules/tencentcloud-sdk-python/default.nix
···
buildPythonPackage rec {
pname = "tencentcloud-sdk-python";
-
version = "3.0.1355";
+
version = "3.0.1356";
pyproject = true;
disabled = pythonOlder "3.9";
···
owner = "TencentCloud";
repo = "tencentcloud-sdk-python";
tag = version;
-
hash = "sha256-Sg6RU4rvagvFV5oyyDiCp/atdUlkCRYXoctIRaukfic=";
+
hash = "sha256-sxmrymOkZCfvb1THOHNOz0PLv5MigcJeZsZ4UylgTG0=";
};
build-system = [ setuptools ];
+2 -2
pkgs/development/python-modules/torchmetrics/default.nix
···
buildPythonPackage rec {
pname = "torchmetrics";
-
version = "1.7.0";
+
version = "1.7.1";
pyproject = true;
src = fetchFromGitHub {
owner = "Lightning-AI";
repo = "torchmetrics";
tag = "v${version}";
-
hash = "sha256-OrNYkvaTU1Zm1634eaLQqESkmLmPGgIBN2mAd1xmMP0=";
+
hash = "sha256-pjUGv064xVOfXiLDMTaFu6Fu4kt/2tfg2l2YGKlhjfw=";
};
dependencies = [
+2 -2
pkgs/development/python-modules/types-awscrt/default.nix
···
buildPythonPackage rec {
pname = "types-awscrt";
-
version = "0.24.2";
+
version = "0.25.7";
pyproject = true;
disabled = pythonOlder "3.8";
···
src = fetchPypi {
pname = "types_awscrt";
inherit version;
-
hash = "sha256-WCa69prV0px2vkn8ffACIigfoxsU+Z6ftEktceyY/qU=";
+
hash = "sha256-4RKYdQyZZH9/O5jW1tZIeQCWzTLURf0NSaYEGmMzbJo=";
};
build-system = [ setuptools ];
+4 -2
pkgs/development/python-modules/uv-dynamic-versioning/default.nix
···
# dependencies
dunamai,
eval-type-backport,
+
jinja2,
pydantic,
returns,
tomlkit,
···
buildPythonPackage rec {
pname = "uv-dynamic-versioning";
-
version = "0.6.0";
+
version = "0.8.0";
pyproject = true;
src = fetchFromGitHub {
···
tag = "v${version}";
# Tests perform mock operations on the local repo
leaveDotGit = true;
-
hash = "sha256-rcvNQ6QrVu2pp1aWTalNK2R7CW/NfFGmu4Dea1EN2ZA=";
+
hash = "sha256-DO10OGij7koV5VYqywRR28pg0sEOAuGpqz1Ksf39MQo=";
};
build-system = [
···
dunamai
eval-type-backport
hatchling
+
jinja2
pydantic
returns
tomlkit
+5 -5
pkgs/development/tools/language-servers/nixd/default.nix
···
llvmPackages,
meson,
ninja,
-
nixForLinking,
+
nixVersions,
nix-update-script,
nixd,
nixf,
···
];
buildInputs = [
-
nixForLinking
+
nixVersions.nix_2_24
gtest
boost
];
-
env.CXXFLAGS = "-include ${nixForLinking.dev}/include/nix/config.h";
+
env.CXXFLAGS = "-include ${nixVersions.nix_2_24.dev}/include/nix/config.h";
passthru.tests.pkg-config = testers.hasPkgConfigModules {
package = nixt;
···
sourceRoot = "${common.src.name}/nixd";
buildInputs = [
-
nixForLinking
+
nixVersions.nix_2_24
nixf
nixt
llvmPackages.llvm
···
nativeBuildInputs = common.nativeBuildInputs ++ [ cmake ];
-
env.CXXFLAGS = "-include ${nixForLinking.dev}/include/nix/config.h";
+
env.CXXFLAGS = "-include ${nixVersions.nix_2_24.dev}/include/nix/config.h";
# See https://github.com/nix-community/nixd/issues/519
doCheck = false;
+3 -3
pkgs/servers/krill/default.nix
···
rustPlatform.buildRustPackage rec {
pname = "krill";
-
version = "0.14.5";
+
version = "0.14.6";
src = fetchFromGitHub {
owner = "NLnetLabs";
repo = pname;
rev = "v${version}";
-
hash = "sha256-3pkDu20vgzslJcK5KQH+GY+jnimEZgm+bQxy8QMUeCk=";
+
hash = "sha256-U7uanUE/xdmXqtpvnG6b+oDKamNZkCH04OCy3Y5UIhQ=";
};
useFetchCargoVendor = true;
-
cargoHash = "sha256-8K4Jn2A9OREwLRyFddHREcylapoFr+/AMT7Wq4o2Ue4=";
+
cargoHash = "sha256-PR8HoHroHp5nBbRwR8TZ5NeBH4eDXGV46HkDLeydmAk=";
buildInputs = [ openssl ] ++ lib.optional stdenv.hostPlatform.isDarwin Security;
nativeBuildInputs = [ pkg-config ];
+6 -6
pkgs/servers/web-apps/lemmy/pin.json
···
{
-
"serverVersion": "0.19.10",
-
"uiVersion": "0.19.10",
-
"serverHash": "sha256-RKXub6mpsDjm7kA/B+kMzLb/BZM4NuVRA3bPIPmc+vg=",
-
"serverCargoHash": "sha256-E+rml4PGJ3b/6Z22eZlhcudl2hfAS7OV2h7hqpsBoKQ=",
-
"uiHash": "sha256-QALxc4tKsflRcVJ99JYs7SSbgBWU9Y7SPIwxvLoVvM0=",
-
"uiPNPMDepsHash": "sha256-sEN8NUlXWuvfmuAaoy/Vx3X+xG/TbeAdYG2LfctcOGc="
+
"serverVersion": "0.19.11",
+
"uiVersion": "0.19.11",
+
"serverHash": "sha256-veF+fJTjsB543PyBnnBN4rmejTWrnlnLghnP6mLDP7U=",
+
"serverCargoHash": "sha256-H9Eu/nKxK27OXvzPi5ItTbKcHqISKAjN17MRWsw5xlc=",
+
"uiHash": "sha256-K8nNb/HQy/s5S5h9Ndt3t8F9/h1D2zOGrTEKhv+Z4Ks=",
+
"uiPNPMDepsHash": "sha256-SqU/kYadwszogaBErP2v1VXIMhJj9AHRKdrHLc99fMw="
}
+3 -3
pkgs/tools/package-management/nix-du/default.nix
···
stdenv,
fetchFromGitHub,
rustPlatform,
-
nixForLinking,
+
nixVersions,
nlohmann_json,
boost,
graphviz,
···
doCheck = true;
nativeCheckInputs = [
-
nixForLinking
+
nixVersions.nix_2_24
graphviz
];
buildInputs = [
boost
-
nixForLinking
+
nixVersions.nix_2_24
nlohmann_json
] ++ lib.optionals stdenv.hostPlatform.isDarwin [ Security ];
+3 -2
pkgs/tools/package-management/nix-eval-jobs/default.nix
···
stdenv.mkDerivation rec {
pname = "nix-eval-jobs";
version = "2.28.0";
+
src = fetchFromGitHub {
owner = "nix-community";
repo = pname;
rev = "v${version}";
hash = "sha256-v5n6t49X7MOpqS9j0FtI6TWOXvxuZMmGsp2OfUK5QfA=";
};
+
buildInputs = [
boost
nix
curl
nlohmann_json
];
+
nativeBuildInputs = [
meson
ninja
pkg-config
-
# nlohmann_json can be only discovered via cmake files
-
cmake
];
# Since this package is intimately tied to a specific Nix release, we
+287
pkgs/tools/package-management/nix/common-meson.nix
···
+
{
+
lib,
+
fetchFromGitHub,
+
version,
+
suffix ? "",
+
hash ? null,
+
src ? fetchFromGitHub {
+
owner = "NixOS";
+
repo = "nix";
+
rev = version;
+
inherit hash;
+
},
+
patches ? [ ],
+
maintainers ? lib.teams.nix.members ++ [
+
lib.maintainers.lovesegfault
+
lib.maintainers.artturin
+
],
+
self_attribute_name,
+
}@args:
+
assert (hash == null) -> (src != null);
+
{
+
stdenv,
+
bison,
+
boehmgc,
+
boost,
+
brotli,
+
busybox-sandbox-shell,
+
bzip2,
+
callPackage,
+
cmake,
+
curl,
+
darwin,
+
doxygen,
+
editline,
+
flex,
+
git,
+
gtest,
+
jq,
+
lib,
+
libarchive,
+
libblake3,
+
libcpuid,
+
libgit2,
+
libsodium,
+
lowdown,
+
lowdown-unsandboxed,
+
toml11,
+
man,
+
meson,
+
ninja,
+
mdbook,
+
mdbook-linkcheck,
+
nlohmann_json,
+
nixosTests,
+
openssl,
+
perl,
+
python3,
+
pkg-config,
+
rapidcheck,
+
rsync,
+
Security,
+
sqlite,
+
util-linuxMinimal,
+
xz,
+
enableDocumentation ? stdenv.buildPlatform.canExecute stdenv.hostPlatform,
+
enableStatic ? stdenv.hostPlatform.isStatic,
+
withAWS ? !enableStatic && (stdenv.hostPlatform.isLinux || stdenv.hostPlatform.isDarwin),
+
aws-sdk-cpp,
+
withLibseccomp ? lib.meta.availableOn stdenv.hostPlatform libseccomp,
+
libseccomp,
+
+
confDir,
+
stateDir,
+
storeDir,
+
+
# passthru tests
+
pkgsi686Linux,
+
pkgsStatic,
+
runCommand,
+
pkgs,
+
}:
+
+
stdenv.mkDerivation (finalAttrs: {
+
pname = "nix";
+
+
version = "${version}${suffix}";
+
VERSION_SUFFIX = suffix;
+
+
inherit src patches;
+
+
outputs =
+
[
+
"out"
+
"dev"
+
]
+
++ lib.optionals enableDocumentation [
+
"man"
+
"doc"
+
];
+
+
hardeningEnable = lib.optionals (!stdenv.hostPlatform.isDarwin) [ "pie" ];
+
+
hardeningDisable = [
+
"shadowstack"
+
] ++ lib.optional stdenv.hostPlatform.isMusl "fortify";
+
+
nativeCheckInputs = [
+
git
+
man
+
];
+
+
nativeBuildInputs =
+
[
+
bison
+
cmake
+
flex
+
jq
+
meson
+
ninja
+
pkg-config
+
rsync
+
]
+
++ lib.optionals enableDocumentation [
+
(lib.getBin lowdown-unsandboxed)
+
mdbook
+
mdbook-linkcheck
+
]
+
++ lib.optionals stdenv.hostPlatform.isLinux [
+
util-linuxMinimal
+
]
+
++ lib.optionals enableDocumentation [
+
python3
+
doxygen
+
];
+
+
buildInputs =
+
[
+
boost
+
brotli
+
bzip2
+
curl
+
editline
+
libgit2
+
libsodium
+
lowdown
+
openssl
+
sqlite
+
toml11
+
xz
+
]
+
++ lib.optionals (lib.versionAtLeast version "2.26") [
+
libblake3
+
]
+
++ lib.optionals stdenv.hostPlatform.isDarwin [
+
Security
+
]
+
++ lib.optionals stdenv.hostPlatform.isx86_64 [
+
libcpuid
+
]
+
++ lib.optionals withLibseccomp [
+
libseccomp
+
]
+
++ lib.optionals withAWS [
+
aws-sdk-cpp
+
]
+
++ lib.optionals (stdenv.hostPlatform.isDarwin) [
+
darwin.apple_sdk.libs.sandbox
+
];
+
+
propagatedBuildInputs = [
+
boehmgc
+
nlohmann_json
+
libarchive
+
];
+
+
checkInputs = [
+
gtest
+
rapidcheck
+
];
+
+
postPatch = ''
+
patchShebangs --build tests
+
'';
+
+
preConfigure =
+
# Copy libboost_context so we don't get all of Boost in our closure.
+
# https://github.com/NixOS/nixpkgs/issues/45462
+
lib.optionalString (!enableStatic) ''
+
mkdir -p $out/lib
+
cp -pd ${boost}/lib/{libboost_context*,libboost_thread*,libboost_system*} $out/lib
+
rm -f $out/lib/*.a
+
${lib.optionalString stdenv.hostPlatform.isLinux ''
+
chmod u+w $out/lib/*.so.*
+
patchelf --set-rpath $out/lib:${lib.getLib stdenv.cc.cc}/lib $out/lib/libboost_thread.so.*
+
''}
+
'';
+
+
dontUseCmakeConfigure = true;
+
+
mesonFlags =
+
[
+
(lib.mesonBool "bindings" false)
+
(lib.mesonOption "libstore:store-dir" storeDir)
+
(lib.mesonOption "libstore:localstatedir" stateDir)
+
(lib.mesonOption "libstore:sysconfdir" confDir)
+
(lib.mesonEnable "libutil:cpuid" stdenv.hostPlatform.isx86_64)
+
(lib.mesonEnable "libstore:seccomp-sandboxing" withLibseccomp)
+
(lib.mesonBool "libstore:embedded-sandbox-shell" (
+
stdenv.hostPlatform.isLinux && stdenv.hostPlatform.isStatic
+
))
+
(lib.mesonBool "doc-gen" enableDocumentation)
+
]
+
++ lib.optionals stdenv.hostPlatform.isLinux [
+
(lib.mesonOption "libstore:sandbox-shell" "${busybox-sandbox-shell}/bin/busybox")
+
# RISC-V support in progress https://github.com/seccomp/libseccomp/pull/50
+
]
+
++ lib.optionals (stdenv.cc.isGNU && !enableStatic) [
+
# TODO: do we still need this?
+
# "--enable-lto"
+
];
+
+
doCheck = true;
+
+
# socket path becomes too long otherwise
+
preInstallCheck =
+
lib.optionalString stdenv.hostPlatform.isDarwin ''
+
export TMPDIR=$NIX_BUILD_TOP
+
''
+
# See https://github.com/NixOS/nix/issues/5687
+
+ lib.optionalString (stdenv.hostPlatform.system == "aarch64-linux") ''
+
echo "exit 0" > tests/functional/flakes/show.sh
+
''
+
+ ''
+
# nixStatic otherwise does not find its man pages in tests.
+
export MANPATH=$man/share/man:$MANPATH
+
'';
+
+
separateDebugInfo = stdenv.hostPlatform.isLinux && enableStatic;
+
+
passthru = {
+
inherit aws-sdk-cpp boehmgc;
+
+
# TODO:
+
perl-bindings = perl.pkgs.toPerlModule (
+
callPackage ./nix-perl.nix {
+
nix = finalAttrs.finalPackage;
+
inherit Security;
+
}
+
);
+
+
tests = import ./tests.nix {
+
inherit
+
runCommand
+
version
+
src
+
lib
+
stdenv
+
pkgs
+
pkgsi686Linux
+
pkgsStatic
+
nixosTests
+
self_attribute_name
+
;
+
nix = finalAttrs.finalPackage;
+
};
+
};
+
+
# point 'nix edit' and ofborg at the file that defines the attribute,
+
# not this common file.
+
pos = builtins.unsafeGetAttrPos "version" args;
+
meta = with lib; {
+
description = "Powerful package manager that makes package management reliable and reproducible";
+
longDescription = ''
+
Nix is a powerful package manager for Linux and other Unix systems that
+
makes package management reliable and reproducible. It provides atomic
+
upgrades and rollbacks, side-by-side installation of multiple versions of
+
a package, multi-user package management and easy setup of build
+
environments.
+
'';
+
homepage = "https://nixos.org/";
+
license = licenses.lgpl21Plus;
+
inherit maintainers;
+
platforms = platforms.unix;
+
outputsToInstall = [ "out" ] ++ optional enableDocumentation "man";
+
mainProgram = "nix";
+
};
+
})
pkgs/tools/package-management/nix/common.nix pkgs/tools/package-management/nix/common-autoconf.nix
+32 -35
pkgs/tools/package-management/nix/default.nix
···
let
# Called for Nix < 2.26
-
common =
+
commonAutoconf =
+
args:
+
nixDependencies.callPackage
+
(import ./common-autoconf.nix ({ inherit lib fetchFromGitHub; } // args))
+
{
+
inherit
+
Security
+
storeDir
+
stateDir
+
confDir
+
;
+
aws-sdk-cpp =
+
if lib.versionAtLeast args.version "2.12pre" then
+
nixDependencies.aws-sdk-cpp
+
else
+
nixDependencies.aws-sdk-cpp-old;
+
};
+
+
# Called for Nix == 2.28. Transitional until we always use
+
# per-component packages.
+
commonMeson =
args:
-
nixDependencies.callPackage (import ./common.nix ({ inherit lib fetchFromGitHub; } // args)) {
+
nixDependencies.callPackage (import ./common-meson.nix ({ inherit lib fetchFromGitHub; } // args)) {
inherit
Security
storeDir
stateDir
confDir
;
-
aws-sdk-cpp =
-
if lib.versionAtLeast args.version "2.12pre" then
-
nixDependencies.aws-sdk-cpp
-
else
-
nixDependencies.aws-sdk-cpp-old;
};
# https://github.com/NixOS/nix/pull/7585
···
(
{
nix_2_3 =
-
(common {
+
(commonAutoconf {
version = "2.3.18";
hash = "sha256-jBz2Ub65eFYG+aWgSI3AJYvLSghio77fWQiIW1svA9U=";
patches = [
···
enableParallelChecking = false;
};
-
nix_2_24 = common {
+
nix_2_24 = commonAutoconf {
version = "2.24.14";
hash = "sha256-SthMCsj6POjawLnJq9+lj/UzObX9skaeN1UGmMZiwTY=";
self_attribute_name = "nix_2_24";
};
-
nix_2_25 = common {
+
nix_2_25 = commonAutoconf {
version = "2.25.5";
hash = "sha256-9xrQhrqHCSqWsQveykZvG/ZMu0se66fUQw3xVSg6BpQ=";
self_attribute_name = "nix_2_25";
};
-
nixComponents_2_26 = nixDependencies.callPackage ./modular/packages.nix rec {
+
nix_2_26 = commonMeson {
version = "2.26.3";
-
inherit (self.nix_2_24.meta) maintainers;
-
otherSplices = generateSplicesForNixComponents "nixComponents_2_26";
-
src = fetchFromGitHub {
-
owner = "NixOS";
-
repo = "nix";
-
tag = version;
-
hash = "sha256-5ZV8YqU8mfFmoAMiUEuBqNwk0T3vUR//x1D12BiYCeY=";
-
};
+
hash = "sha256-R+HAPvD+AjiyRHZP/elkvka33G499EKT8ntyF/EPPRI=";
+
self_attribute_name = "nix_2_28";
};
-
# Note, this might eventually become an alias, as packages should
-
# depend on the components they need in `nixComponents_2_26`.
-
nix_2_26 = addTests "nix_2_26" self.nixComponents_2_26.nix-everything;
-
-
nixComponents_2_28 = nixDependencies.callPackage ./modular/packages.nix rec {
+
nix_2_28 = commonMeson {
version = "2.28.1";
-
inherit (self.nix_2_24.meta) maintainers;
-
otherSplices = generateSplicesForNixComponents "nixComponents_2_28";
-
src = fetchFromGitHub {
-
owner = "NixOS";
-
repo = "nix";
-
rev = version;
-
hash = "sha256-R+HAPvD+AjiyRHZP/elkvka33G499EKT8ntyF/EPPRI=";
-
};
+
hash = "sha256-R+HAPvD+AjiyRHZP/elkvka33G499EKT8ntyF/EPPRI=";
+
self_attribute_name = "nix_2_28";
};
-
-
nix_2_28 = addTests "nix_2_28" self.nixComponents_2_28.nix-everything;
nixComponents_git = nixDependencies.callPackage ./modular/packages.nix rec {
version = "2.29pre20250407_${lib.substring 0 8 src.rev}";
···
nix;
# Read ./README.md before bumping a major release
-
stable = addFallbackPathsCheck self.nix_2_24;
+
stable = addFallbackPathsCheck self.nix_2_28;
}
// lib.optionalAttrs config.allowAliases (
lib.listToAttrs (
+15 -10
pkgs/tools/package-management/nix/nix-perl.nix
···
meson,
ninja,
bzip2,
+
libarchive,
}:
let
atLeast223 = lib.versionAtLeast nix.version "2.23";
atLeast224 = lib.versionAtLeast nix.version "2.24";
+
atLeast226 = lib.versionAtLeast nix.version "2.26";
mkConfigureOption =
{
···
postUnpack = "sourceRoot=$sourceRoot/${lib.optionalString atLeast224 "src"}/perl";
# TODO: Remove this once the nix build also uses meson
-
postPatch = lib.optionalString atLeast224 ''
+
postPatch = lib.optionalString (atLeast224 && lib.versionOlder nix.version "2.27") ''
substituteInPlace lib/Nix/Store.xs \
--replace-fail 'config-util.hh' 'nix/config.h' \
--replace-fail 'config-store.hh' 'nix/config.h'
'';
-
buildInputs = [
-
boost
-
bzip2
-
curl
-
libsodium
-
nix
-
perl
-
xz
-
] ++ lib.optional (stdenv.hostPlatform.isDarwin) Security;
+
buildInputs =
+
[
+
boost
+
bzip2
+
curl
+
libsodium
+
nix
+
perl
+
xz
+
]
+
++ lib.optional (stdenv.hostPlatform.isDarwin) Security
+
++ lib.optional atLeast226 libarchive;
# Not cross-safe since Nix checks for curl/perl via
# NEED_PROG/find_program, but both seem to be needed at runtime
+3 -3
pkgs/tools/security/cosign/default.nix
···
}:
buildGoModule rec {
pname = "cosign";
-
version = "2.4.3";
+
version = "2.5.0";
src = fetchFromGitHub {
owner = "sigstore";
repo = pname;
rev = "v${version}";
-
hash = "sha256-9hUf6J3kTI0nvLExReUUovW8pZjlaoqgFmLd5mShZzU=";
+
hash = "sha256-QvU+JpIcE9EX+ehRWvs2bS2VGgGVekNX8f5+mITIwU0=";
};
buildInputs =
···
installShellFiles
];
-
vendorHash = "sha256-jNRNjAecf84XzkPLWHjCYPxh1igUs7Yd0MSAmRcPtlc=";
+
vendorHash = "sha256-qIi+Pp4XZg1GxOhM9fCyD9rPaIiQHhoQudB50gzWgrM=";
subPackages = [
"cmd/cosign"
+1
pkgs/top-level/aliases.nix
···
emacs28 = throw "Emacs 28 is removed due to CVEs which are fixed in Emacs 30"; # Added 2025-03-03
emacs28-gtk2 = throw "emacs28-gtk2 was removed because GTK2 is EOL; migrate to emacs28{,-gtk3,-nox} or to more recent versions of Emacs."; # Added 2024-09-20
emacs28-gtk3 = throw "Emacs 28 is removed due to CVEs which are fixed in Emacs 30"; # Added 2025-03-03
+
emacs28-macport = throw "Emacs 28 Macport is removed due to CVEs which are fixed in Emacs 30 and backported to Emacs 29 Macport"; # Added 2025-04-06
emacs28-nox = throw "Emacs 28 is removed due to CVEs which are fixed in Emacs 30"; # Added 2025-03-03
emacs28NativeComp = emacs28; # Added 2022-06-08
emacs28Packages = throw "'emacs28Packages' has been renamed to/replaced by 'emacs28.pkgs'"; # Converted to throw 2024-10-17
+2 -5
pkgs/top-level/all-packages.nix
···
defaultPkgConfigPackages =
# We don't want nix-env -q to enter this, because all of these are aliases.
-
dontRecurseIntoAttrs (import ./pkg-config/defaultPkgConfigPackages.nix pkgs) // {
-
__attrsFailEvaluation = true;
-
};
+
dontRecurseIntoAttrs (import ./pkg-config/defaultPkgConfigPackages.nix pkgs);
### Nixpkgs maintainer tools
···
hunspellWithDicts = dicts: callPackage ../by-name/hu/hunspell/wrapper.nix { inherit dicts; };
-
hydra = callPackage ../by-name/hy/hydra/package.nix { nix = nixVersions.nix_2_24; };
+
hydra = callPackage ../by-name/hy/hydra/package.nix { nix = nixVersions.nix_2_28; };
icu-versions = callPackages ../development/libraries/icu { };
inherit (icu-versions)
···
emacs30-nox
emacs30-pgtk
-
emacs28-macport
emacs29-macport
+3 -3
pkgs/top-level/pkg-config/pkg-config-data.json
···
},
"javascriptcoregtk-4.0": {
"attrPath": [
-
"webkitgtk"
+
"webkitgtk_4_0"
]
},
"lapack": {
···
},
"webkit2gtk-4.0": {
"attrPath": [
-
"webkitgtk"
+
"webkitgtk_4_0"
]
},
"webkit2gtk-web-extension-4.0": {
"attrPath": [
-
"webkitgtk"
+
"webkitgtk_4_0"
]
},
"x11": {