Merge remote-tracking branch 'origin/master' into staging-next

Changed files
+1202 -522
maintainers
nixos
modules
services
backup
hardware
misc
networking
x11
desktop-managers
tests
pkgs
applications
audio
renoise
editors
vscode
extensions
emulators
misc
albert
networking
browsers
cluster
cmctl
opentofu
timoni
weave-gitops
instant-messengers
quaternion
tensor
webcord
office
portfolio
zotero
science
logic
video
virtualization
ecs-agent
window-managers
lesbar
build-support
fetchgit
node
build-npm-package
by-name
im
imhex
impression
le
lexmark-aex
desktops
gnome
misc
gnome-flashback
gnome-panel
development
compilers
cmdstan
gcc
stanc
yosys
libraries
SDL_compat
amdvlk
dqlite
exiv2
liblinphone
libmediainfo
libnbd
python-modules
anthemav
argh
atom
cmdstanpy
django-auth-ldap
django-redis
einops
flask-jwt-extended
flask-mysqldb
fschat
google-cloud-logging
imap-tools
influxdb-client
loqedapi
nsz
oci
pyecoforest
pyfronius
pypykatz
python_docs_theme
pywayland
pyyardian
slackclient
stanio
stanza
tcolorpy
tools
electron
binary
fq
initool
jbang
misc
supabase-cli
os-specific
servers
home-assistant
nosql
mongodb
sql
mariadb
galera
web-apps
mediawiki
tools
admin
awscli2
misc
goreleaser
moar
rshim-user-space
upterm
networking
grpcurl
openssh
sing-box
system
text
goawk
mdbook-i18n-helpers
video
recyclarr
top-level
+6
maintainers/maintainer-list.nix
···
githubId = 1918771;
name = "Joe Doyle";
};
jperras = {
email = "joel@nerderati.com";
github = "jperras";
···
githubId = 1918771;
name = "Joe Doyle";
};
+
jpentland = {
+
email = "joe.pentland@gmail.com";
+
github = "jpentland";
+
githubId = 1135582;
+
name = "Joe Pentland";
+
};
jperras = {
email = "joel@nerderati.com";
github = "jperras";
+7 -4
nixos/modules/services/backup/borgbackup.nix
···
backupScript = mkBackupScript backupJobName cfg;
in nameValuePair backupJobName {
description = "BorgBackup job ${name}";
-
path = with pkgs; [
-
borgbackup openssh
];
script = "exec " + optionalString cfg.inhibitsSleep ''\
${pkgs.systemd}/bin/systemd-inhibit \
···
'');
mkBorgWrapper = name: cfg: mkWrapperDrv {
-
original = "${pkgs.borgbackup}/bin/borg";
name = "borg-job-${name}";
set = { BORG_REPO = cfg.repo; } // (mkPassEnv cfg) // cfg.environment;
};
···
meta.doc = ./borgbackup.md;
###### interface
options.services.borgbackup.jobs = mkOption {
description = lib.mdDoc ''
···
users = mkMerge (mapAttrsToList mkUsersConfig repos);
-
environment.systemPackages = with pkgs; [ borgbackup ] ++ (mapAttrsToList mkBorgWrapper jobs);
});
}
···
backupScript = mkBackupScript backupJobName cfg;
in nameValuePair backupJobName {
description = "BorgBackup job ${name}";
+
path = [
+
config.services.borgbackup.package pkgs.openssh
];
script = "exec " + optionalString cfg.inhibitsSleep ''\
${pkgs.systemd}/bin/systemd-inhibit \
···
'');
mkBorgWrapper = name: cfg: mkWrapperDrv {
+
original = getExe config.services.borgbackup.package;
name = "borg-job-${name}";
set = { BORG_REPO = cfg.repo; } // (mkPassEnv cfg) // cfg.environment;
};
···
meta.doc = ./borgbackup.md;
###### interface
+
+
options.services.borgbackup.package = mkPackageOptionMD pkgs "borgbackup" { };
options.services.borgbackup.jobs = mkOption {
description = lib.mdDoc ''
···
users = mkMerge (mapAttrsToList mkUsersConfig repos);
+
environment.systemPackages =
+
[ config.services.borgbackup.package ] ++ (mapAttrsToList mkBorgWrapper jobs);
});
}
+21 -11
nixos/modules/services/hardware/keyd.nix
···
with lib;
let
cfg = config.services.keyd;
-
settingsFormat = pkgs.formats.ini { };
keyboardOptions = { ... }: {
options = {
···
};
settings = mkOption {
-
type = settingsFormat.type;
default = { };
example = {
main = {
···
See <https://github.com/rvaiya/keyd> how to configure.
'';
};
};
};
in
···
environment.etc = mapAttrs'
(name: options:
nameValuePair "keyd/${name}.conf" {
-
source = pkgs.runCommand "${name}.conf"
-
{
-
ids = ''
-
[ids]
-
${concatStringsSep "\n" options.ids}
-
'';
-
passAsFile = [ "ids" ];
-
} ''
-
cat $idsPath <(echo) ${settingsFormat.generate "keyd-${name}.conf" options.settings} >$out
'';
})
cfg.keyboards;
···
with lib;
let
cfg = config.services.keyd;
keyboardOptions = { ... }: {
options = {
···
};
settings = mkOption {
+
type = (pkgs.formats.ini { }).type;
default = { };
example = {
main = {
···
See <https://github.com/rvaiya/keyd> how to configure.
'';
};
+
+
extraConfig = mkOption {
+
type = types.lines;
+
default = "";
+
example = ''
+
[control+shift]
+
h = left
+
'';
+
description = lib.mdDoc ''
+
Extra configuration that is appended to the end of the file.
+
**Do not** write `ids` section here, use a separate option for it.
+
You can use this option to define compound layers that must always be defined after the layer they are comprised.
+
'';
+
};
};
};
in
···
environment.etc = mapAttrs'
(name: options:
nameValuePair "keyd/${name}.conf" {
+
text = ''
+
[ids]
+
${concatStringsSep "\n" options.ids}
+
+
${generators.toINI {} options.settings}
+
${options.extraConfig}
'';
})
cfg.keyboards;
+15
nixos/modules/services/misc/gitea.nix
···
description = lib.mdDoc "Path to a file containing the SMTP password.";
};
settings = mkOption {
default = {};
description = lib.mdDoc ''
···
PASSWD = "#mailerpass#";
};
oauth2 = {
JWT_SECRET = "#oauth2jwtsecret#";
};
···
${lib.optionalString (cfg.mailerPasswordFile != null) ''
${replaceSecretBin} '#mailerpass#' '${cfg.mailerPasswordFile}' '${runConfig}'
''}
chmod u-w '${runConfig}'
}
···
description = lib.mdDoc "Path to a file containing the SMTP password.";
};
+
metricsTokenFile = mkOption {
+
type = types.nullOr types.str;
+
default = null;
+
example = "/var/lib/secrets/gitea/metrics_token";
+
description = lib.mdDoc "Path to a file containing the metrics authentication token.";
+
};
+
settings = mkOption {
default = {};
description = lib.mdDoc ''
···
PASSWD = "#mailerpass#";
};
+
metrics = mkIf (cfg.metricsTokenFile != null) {
+
TOKEN = "#metricstoken#";
+
};
+
oauth2 = {
JWT_SECRET = "#oauth2jwtsecret#";
};
···
${lib.optionalString (cfg.mailerPasswordFile != null) ''
${replaceSecretBin} '#mailerpass#' '${cfg.mailerPasswordFile}' '${runConfig}'
+
''}
+
+
${lib.optionalString (cfg.metricsTokenFile != null) ''
+
${replaceSecretBin} '#metricstoken#' '${cfg.metricsTokenFile}' '${runConfig}'
''}
chmod u-w '${runConfig}'
}
+3 -1
nixos/modules/services/networking/dnsmasq.nix
···
let
cfg = config.services.dnsmasq;
-
dnsmasq = pkgs.dnsmasq;
stateDir = "/var/lib/dnsmasq";
# True values are just put as `name` instead of `name=true`, and false values
···
Whether to run dnsmasq.
'';
};
resolveLocalQueries = mkOption {
type = types.bool;
···
let
cfg = config.services.dnsmasq;
+
dnsmasq = cfg.package;
stateDir = "/var/lib/dnsmasq";
# True values are just put as `name` instead of `name=true`, and false values
···
Whether to run dnsmasq.
'';
};
+
+
package = mkPackageOptionMD pkgs "dnsmasq" {};
resolveLocalQueries = mkOption {
type = types.bool;
+10 -4
nixos/modules/services/x11/desktop-managers/gnome.nix
···
panelModulePackages = mkOption {
default = [ pkgs.gnome.gnome-applets ];
defaultText = literalExpression "[ pkgs.gnome.gnome-applets ]";
-
type = types.listOf types.path;
description = lib.mdDoc ''
Packages containing modules that should be made available to `gnome-panel` (usually for applets).
···
map
(wm:
pkgs.gnome.gnome-flashback.mkSessionForWm {
-
inherit (wm) wmName wmLabel wmCommand enableGnomePanel;
-
inherit (cfg.flashback) panelModulePackages;
}
) flashbackWms;
···
environment.systemPackages = with pkgs.gnome; [
gnome-flashback
-
];
})
(mkIf serviceCfg.core-os-services.enable {
···
panelModulePackages = mkOption {
default = [ pkgs.gnome.gnome-applets ];
defaultText = literalExpression "[ pkgs.gnome.gnome-applets ]";
+
type = types.listOf types.package;
description = lib.mdDoc ''
Packages containing modules that should be made available to `gnome-panel` (usually for applets).
···
map
(wm:
pkgs.gnome.gnome-flashback.mkSessionForWm {
+
inherit (wm) wmName wmLabel wmCommand;
}
) flashbackWms;
···
environment.systemPackages = with pkgs.gnome; [
gnome-flashback
+
(gnome-panel-with-modules.override {
+
panelModulePackages = cfg.flashback.panelModulePackages;
+
})
+
]
+
# For /share/applications/${wmName}.desktop
+
++ (map (wm: gnome-flashback.mkWmApplication { inherit (wm) wmName wmLabel wmCommand; }) flashbackWms)
+
# For /share/gnome-session/sessions/gnome-flashback-${wmName}.session
+
++ (map (wm: gnome-flashback.mkGnomeSession { inherit (wm) wmName wmLabel enableGnomePanel; }) flashbackWms);
})
(mkIf serviceCfg.core-os-services.enable {
+8
nixos/tests/gitea.nix
···
enable = true;
database = { inherit type; };
package = giteaPackage;
settings.service.DISABLE_REGISTRATION = true;
settings."repository.signing".SIGNING_KEY = signingPrivateKeyId;
settings.actions.ENABLED = true;
};
environment.systemPackages = [ giteaPackage pkgs.gnupg pkgs.jq ];
services.openssh.enable = true;
···
'test "$(curl http://localhost:3000/api/v1/repos/test/repo/commits '
+ '-H "Accept: application/json" | jq length)" = "1"'
)
with subtest("Testing runner registration"):
server.succeed(
···
enable = true;
database = { inherit type; };
package = giteaPackage;
+
metricsTokenFile = (pkgs.writeText "metrics_secret" "fakesecret").outPath;
settings.service.DISABLE_REGISTRATION = true;
settings."repository.signing".SIGNING_KEY = signingPrivateKeyId;
settings.actions.ENABLED = true;
+
settings.metrics.ENABLED = true;
};
environment.systemPackages = [ giteaPackage pkgs.gnupg pkgs.jq ];
services.openssh.enable = true;
···
'test "$(curl http://localhost:3000/api/v1/repos/test/repo/commits '
+ '-H "Accept: application/json" | jq length)" = "1"'
)
+
+
with subtest("Testing metrics endpoint"):
+
server.succeed('curl '
+
+ '-H "Authorization: Bearer fakesecret" '
+
+ 'http://localhost:3000/metrics '
+
+ '| grep gitea_accesses')
with subtest("Testing runner registration"):
server.succeed(
+1 -8
nixos/tests/gnome-flashback.nix
···
xauthority = "/run/user/${uid}/gdm/Xauthority";
in ''
with subtest("Login to GNOME Flashback with GDM"):
-
# wait_for_x() checks graphical-session.target, which is expected to be
-
# inactive on gnome-flashback before #228946 (i.e. systemd managed
-
# gnome-session) is done.
-
# https://github.com/NixOS/nixpkgs/pull/208060
-
#
-
# Previously this was unconditionally touched by xsessionWrapper but was
-
# changed in #233981 (we have GNOME-Flashback:GNOME in XDG_CURRENT_DESKTOP).
-
# machine.wait_for_x()
machine.wait_until_succeeds('journalctl -t gnome-session-binary --grep "Entering running state"')
# Wait for alice to be logged in"
machine.wait_for_unit("default.target", "${user.name}")
···
xauthority = "/run/user/${uid}/gdm/Xauthority";
in ''
with subtest("Login to GNOME Flashback with GDM"):
+
machine.wait_for_x()
machine.wait_until_succeeds('journalctl -t gnome-session-binary --grep "Entering running state"')
# Wait for alice to be logged in"
machine.wait_for_unit("default.target", "${user.name}")
+15 -8
nixos/tests/keyd.nix
···
'';
-
mkKeyboardTest = name: { settings, test }: with pkgs.lib; makeTest {
inherit name;
nodes.machine = {
services.keyd = {
enable = true;
-
keyboards.default = { inherit settings; };
};
};
···
in
pkgs.lib.mapAttrs mkKeyboardTest {
swap-ab_and_ctrl-as-shift = {
-
test.press = [ "a" "ctrl-b" "c" ];
-
test.expect = [ "b" "A" "c" ];
-
settings.main = {
-
"a" = "b";
-
"b" = "a";
-
"control" = "oneshot(shift)";
};
};
}
···
'';
+
mkKeyboardTest = name: { default, test }: with pkgs.lib; makeTest {
inherit name;
nodes.machine = {
services.keyd = {
enable = true;
+
keyboards = { inherit default; };
};
};
···
in
pkgs.lib.mapAttrs mkKeyboardTest {
swap-ab_and_ctrl-as-shift = {
+
test.press = [ "a" "ctrl-b" "c" "alt_r-h" ];
+
test.expect = [ "b" "A" "c" "q" ];
+
default = {
+
settings.main = {
+
"a" = "b";
+
"b" = "a";
+
"control" = "oneshot(shift)";
+
"rightalt" = "layer(rightalt)";
+
};
+
extraConfig = ''
+
[rightalt:G]
+
h = q
+
'';
};
};
}
+1 -1
pkgs/applications/audio/renoise/default.nix
···
}
else
releasePath
-
else throw "Platform is not supported. Use instalation native to your platform https://www.renoise.com/";
buildInputs = [ alsa-lib libjack2 libX11 libXcursor libXext libXrandr ];
···
}
else
releasePath
+
else throw "Platform is not supported. Use installation native to your platform https://www.renoise.com/";
buildInputs = [ alsa-lib libjack2 libX11 libXcursor libXext libXrandr ];
+8 -5
pkgs/applications/editors/imhex/default.nix pkgs/by-name/im/imhex/package.nix
···
}:
let
-
version = "1.30.1";
patterns_src = fetchFromGitHub {
owner = "WerWolv";
repo = "ImHex-Patterns";
-
rev = "ImHex-v${version}";
hash = "sha256-lTTXu9RxoD582lXWI789gNcWvJmxmBIlBRIiyY3DseM=";
};
···
fetchSubmodules = true;
owner = "WerWolv";
repo = pname;
-
rev = "v${version}";
-
hash = "sha256-3s9Dgdhl+k2KjMoSHNl59YOoCEwqK+37DOzKdGP88/4=";
};
nativeBuildInputs = [ cmake llvm python3 perl pkg-config rsync ];
···
description = "Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM";
homepage = "https://github.com/WerWolv/ImHex";
license = with licenses; [ gpl2Only ];
-
maintainers = with maintainers; [ luis kashw2 ];
platforms = platforms.linux;
};
}
···
}:
let
+
# FIXME: unstable, stable needs #252945 (details in #258964)
+
# Next version bump should be stabilized
+
version = "unstable-2023-10-01";
+
patterns_version = "1.31.0";
patterns_src = fetchFromGitHub {
owner = "WerWolv";
repo = "ImHex-Patterns";
+
rev = "ImHex-v${patterns_version}";
hash = "sha256-lTTXu9RxoD582lXWI789gNcWvJmxmBIlBRIiyY3DseM=";
};
···
fetchSubmodules = true;
owner = "WerWolv";
repo = pname;
+
rev = "a62ede784018f9d5aaf40587f71a1271429ab50b";
+
hash = "sha256-L3ncmM7Ro60DvOF/Y0fjo2Smlw2LL8cPa8H6yVGdGAk=";
};
nativeBuildInputs = [ cmake llvm python3 perl pkg-config rsync ];
···
description = "Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM";
homepage = "https://github.com/WerWolv/ImHex";
license = with licenses; [ gpl2Only ];
+
maintainers = with maintainers; [ luis kashw2 cafkafk ];
platforms = platforms.linux;
};
}
+25 -4
pkgs/applications/editors/vscode/extensions/default.nix
···
mktplcRef = {
name = "vscode-neovim";
publisher = "asvetliakov";
-
version = "0.0.97";
-
sha256 = "sha256-rNGW8WB3jBSjThiB0j4/ORKMRAaxFiMiBfaa+dbGu/w=";
};
meta = {
license = lib.licenses.mit;
};
};
···
mktplcRef = {
name = "vscode-markdownlint";
publisher = "DavidAnson";
-
version = "0.51.0";
-
sha256 = "sha256-Xtr8cqcPrcrKpJBxQcY1j9Gl4CC6U3ZazS4bdBtdzUk=";
};
meta = {
changelog = "https://marketplace.visualstudio.com/items/DavidAnson.vscode-markdownlint/changelog";
···
};
meta = {
license = lib.licenses.mit;
};
};
···
mktplcRef = {
name = "vscode-neovim";
publisher = "asvetliakov";
+
version = "0.8.2";
+
sha256 = "0kw9asv91s37ql61blbb8pr7wb6c2ba1klchal53chp6ib55v5kn";
};
meta = {
+
changelog = "https://marketplace.visualstudio.com/items/asvetliakov.vscode-neovim/changelog";
+
description = "Vim-mode for VS Code using embedded Neovim";
+
downloadPage = "https://marketplace.visualstudio.com/items?itemName=asvetliakov.vscode-neovim";
license = lib.licenses.mit;
+
homepage = "https://github.com/vscode-neovim/vscode-neovim";
+
maintainers = [ lib.maintainers.mikaelfangel ];
};
};
···
mktplcRef = {
name = "vscode-markdownlint";
publisher = "DavidAnson";
+
version = "0.52.0";
+
sha256 = "sha256-Y8qkcNEvJ/yzT8PDeErRzKGxYBNKKfbNNsJVaFDeIV4=";
};
meta = {
changelog = "https://marketplace.visualstudio.com/items/DavidAnson.vscode-markdownlint/changelog";
···
};
meta = {
license = lib.licenses.mit;
+
};
+
};
+
+
uiua-lang.uiua-vscode = buildVscodeMarketplaceExtension {
+
mktplcRef = {
+
name = "uiua-vscode";
+
publisher = "uiua-lang";
+
version = "0.0.12";
+
sha256 = "sha256-clVVRJihErAiZHcGImgFoxdD97o6S7NJm8BqfH41MFE=";
+
};
+
meta = {
+
description = "VSCode language extension for Uiua";
+
downloadPage = "https://marketplace.visualstudio.com/items?itemName=uiua-lang.uiua-vscode";
+
homepage = "https://github.com/uiua-lang/uiua-vscode";
+
license = lib.licenses.mit;
+
maintainers = [ lib.maintainers.wackbyte ];
};
};
+3 -3
pkgs/applications/emulators/wine/sources.nix
···
unstable = fetchurl rec {
# NOTE: Don't forget to change the hash for staging as well.
-
version = "8.14";
url = "https://dl.winehq.org/wine/source/8.x/wine-${version}.tar.xz";
-
hash = "sha256-4YNu9msYJfqdoEKDDASVsqw5SBVENkNGaXnuif3X+vQ=";
inherit (stable) patches;
## see http://wiki.winehq.org/Gecko
···
staging = fetchFromGitHub rec {
# https://github.com/wine-staging/wine-staging/releases
inherit (unstable) version;
-
hash = "sha256-ct/RGXt9B6F3PHbirX8K03AZ0Kunitd2HmI0N5k6VHI=";
owner = "wine-staging";
repo = "wine-staging";
rev = "v${version}";
···
unstable = fetchurl rec {
# NOTE: Don't forget to change the hash for staging as well.
+
version = "8.17";
url = "https://dl.winehq.org/wine/source/8.x/wine-${version}.tar.xz";
+
hash = "sha256-8BeFvTFix05l3rE6oK3XEeN8SERUcZvt0OjCsaNGm34=";
inherit (stable) patches;
## see http://wiki.winehq.org/Gecko
···
staging = fetchFromGitHub rec {
# https://github.com/wine-staging/wine-staging/releases
inherit (unstable) version;
+
hash = "sha256-8uxXyt3zu+LuFJbTQD+bv+Zmnzb18Dhlo3ign1lFT2s=";
owner = "wine-staging";
repo = "wine-staging";
rev = "v${version}";
+7 -7
pkgs/applications/emulators/yuzu/sources.nix
···
# Generated by ./update.sh - do not update manually!
-
# Last updated: 2023-09-27
{
compatList = {
-
rev = "0e93552d7d65a8eb5149d69488281e4abeeba396";
hash = "sha256:1hdsza3wf9a0yvj6h55gsl7xqvhafvbz1i8paz9kg7l49b0gnlh1";
};
mainline = {
-
version = "1569";
-
hash = "sha256:17qs5fn75zqxz0c325zyj46z79pvm2j536afyg96glq6av2kql2b";
};
ea = {
-
version = "3897";
-
distHash = "sha256:1kxn7hcrn7kkdjgkxpxjw2pdrg73jhlbv3gvhc6z8358bav7xcbs";
-
fullHash = "sha256:1zc1k90f4jzbm8l8fjfsnd77hljh4nqa78l7cczcc3yv2jwrgrz6";
};
}
···
# Generated by ./update.sh - do not update manually!
+
# Last updated: 2023-10-07
{
compatList = {
+
rev = "156a0a80efc47069ba3360f8a1b268a1c6f2f505";
hash = "sha256:1hdsza3wf9a0yvj6h55gsl7xqvhafvbz1i8paz9kg7l49b0gnlh1";
};
mainline = {
+
version = "1579";
+
hash = "sha256:0689w42as1di8xbh8kq2p0cws8gdwq64zdj3i8wq612nkw0q5s60";
};
ea = {
+
version = "3911";
+
distHash = "sha256:0xj642kjhj0gp9l15b3ysj3gmyy47rcvzw9amghsfl13bg5ffnwh";
+
fullHash = "sha256:13rd6kwnhpvjzp67k6pqgl9fsqzwy5d8043hv6kd93gg8jbxkp38";
};
}
+2 -2
pkgs/applications/misc/albert/default.nix
···
stdenv.mkDerivation (finalAttrs: {
pname = "albert";
-
version = "0.22.9";
src = fetchFromGitHub {
owner = "albertlauncher";
repo = "albert";
rev = "v${finalAttrs.version}";
-
sha256 = "sha256-MhZHklb//VH2GkAzK46P7EwCIa50l5y+2VssrgpTlWA=";
fetchSubmodules = true;
};
···
stdenv.mkDerivation (finalAttrs: {
pname = "albert";
+
version = "0.22.13";
src = fetchFromGitHub {
owner = "albertlauncher";
repo = "albert";
rev = "v${finalAttrs.version}";
+
sha256 = "sha256-IZpIgU/cf25XxH8J0xQJLASu0YmTmcHY5RxUcbKrtvA=";
fetchSubmodules = true;
};
+12 -12
pkgs/applications/networking/browsers/chromium/upstream-info.nix
···
};
stable = {
chromedriver = {
-
sha256_darwin = "138mw5p6r0n0531fs6322yxsjgj9hia5plw4mj0b3mclykzy5l37";
sha256_darwin_aarch64 =
-
"1cym94av2gw2zwj3rdqbjcqkigpzf0zk2bam2hw9n2hiabb4rm0p";
-
sha256_linux = "1q1vyhmcx6b5criz5bn1c3x3z2dzqdgsmwcvlb0rzqlzpla9q26m";
-
version = "117.0.5938.92";
};
deps = {
gn = {
···
version = "2023-08-01";
};
};
-
sha256 = "1bdfvcywj6ggrn6fz6g7hqhikg0cjdj8llgcm4wji52i7897gw18";
-
sha256bin64 = "05a2sggxm76kc6m5wcpb4gibnxa07j291m7292zdvyg32kffqxjr";
-
version = "117.0.5938.132";
};
ungoogled-chromium = {
deps = {
···
version = "2023-08-01";
};
ungoogled-patches = {
-
rev = "117.0.5938.132-1";
-
sha256 = "11bg7j5838nhkwpv7blvpijjhqrisvx032bjmkng1cpy2d0kmfcx";
};
};
-
sha256 = "1bdfvcywj6ggrn6fz6g7hqhikg0cjdj8llgcm4wji52i7897gw18";
-
sha256bin64 = "05a2sggxm76kc6m5wcpb4gibnxa07j291m7292zdvyg32kffqxjr";
-
version = "117.0.5938.132";
};
}
···
};
stable = {
chromedriver = {
+
sha256_darwin = "06yhmapflj5m40952zcrq97qlj3crbbffaspiz87w0syxnw9avq1";
sha256_darwin_aarch64 =
+
"07dkpaqildzsrwbgjgxw5imbbz2pjvyq3n1wiw94lfjqbd9jrkbz";
+
sha256_linux = "0lqng6g722apxa9k596f42f6bw323q4b29vrkcs1lh86skgikdgj";
+
version = "117.0.5938.149";
};
deps = {
gn = {
···
version = "2023-08-01";
};
};
+
sha256 = "1pyrqxzxxibz0yp218kw6z186x8y6kd5a1l0mcbhj70rpm9cimyx";
+
sha256bin64 = "1zly8dpxmhyqdsqd381r0yzjrf8nkfigfjhabm3dbf1ih7qma40z";
+
version = "117.0.5938.149";
};
ungoogled-chromium = {
deps = {
···
version = "2023-08-01";
};
ungoogled-patches = {
+
rev = "117.0.5938.149-1";
+
sha256 = "0kzbnymbp7snxmg3adpl16anyhs2rxk0iqy5dda8dx5rv9s8i0x0";
};
};
+
sha256 = "1pyrqxzxxibz0yp218kw6z186x8y6kd5a1l0mcbhj70rpm9cimyx";
+
sha256bin64 = "1zly8dpxmhyqdsqd381r0yzjrf8nkfigfjhabm3dbf1ih7qma40z";
+
version = "117.0.5938.149";
};
}
+3 -3
pkgs/applications/networking/cluster/cmctl/default.nix
···
buildGoModule rec {
pname = "cmctl";
-
version = "1.13.0";
src = fetchFromGitHub {
owner = "cert-manager";
repo = "cert-manager";
rev = "v${version}";
-
hash = "sha256-o51CIwZeBq3XrNvu6n6dVCsmXH2pU7l3igw61KjI0cw=";
};
sourceRoot = "${src.name}/cmd/ctl";
-
vendorHash = "sha256-szDFQ5zxZ4IUMaIe/eyQAouomR6kpQXn/LZ3MEBbx0Y=";
ldflags = [
"-s"
···
buildGoModule rec {
pname = "cmctl";
+
version = "1.13.1";
src = fetchFromGitHub {
owner = "cert-manager";
repo = "cert-manager";
rev = "v${version}";
+
hash = "sha256-l0D7uVoYTwiVI+b8yYpsJk/eAG5XYidR9CaQ595aTjw=";
};
sourceRoot = "${src.name}/cmd/ctl";
+
vendorHash = "sha256-3Ws2ObyBVYog7oVqHeEgIeWeRQpV1Z+Clilp8wI/PUA=";
ldflags = [
"-s"
+11 -3
pkgs/applications/networking/cluster/opentofu/default.nix
···
let
package = buildGoModule rec {
pname = "opentofu";
-
version = "1.6.0-alpha1";
src = fetchFromGitHub {
owner = "opentofu";
repo = "opentofu";
rev = "v${version}";
-
hash = "sha256-0FO55H1nOyhAd+ex1zA0XycH6x/HKkLlxzuIJNoaI9g=";
};
-
vendorHash = "sha256-3jQfIIZOgOmNHQ06rXz+3QTZ37WcuCc7A7/MhC7udrg=";
ldflags = [ "-s" "-w" ];
postConfigure = ''
···
opentofu_plugins_test = let
mainTf = writeText "main.tf" ''
resource "random_id" "test" {}
'';
opentofu = package.withPlugins (p: [ p.random ]);
···
let
package = buildGoModule rec {
pname = "opentofu";
+
version = "1.6.0-alpha2";
src = fetchFromGitHub {
owner = "opentofu";
repo = "opentofu";
rev = "v${version}";
+
hash = "sha256-29vF5vWCPxJJHsQ1dkLcIaqEQVYxp2YjZ4LK5r4/dlo=";
};
+
vendorHash = "sha256-qhnQ47K9N7HoTMUXhX2RlUuQaCgeAB/Sshh56A5rhpk=";
ldflags = [ "-s" "-w" ];
postConfigure = ''
···
opentofu_plugins_test = let
mainTf = writeText "main.tf" ''
+
terraform {
+
required_providers {
+
random = {
+
source = "registry.terraform.io/hashicorp/random"
+
}
+
}
+
}
+
resource "random_id" "test" {}
'';
opentofu = package.withPlugins (p: [ p.random ]);
+3 -3
pkgs/applications/networking/cluster/timoni/default.nix
···
buildGo121Module rec {
pname = "timoni";
-
version = "0.14.0";
src = fetchFromGitHub {
owner = "stefanprodan";
repo = "timoni";
rev = "v${version}";
-
hash = "sha256-UYHb469x4VnFffjO9CfSyn0ZzLLaAee2WpWGFAQjBpA=";
};
-
vendorHash = "sha256-JDaQL+ferkYI74OUqgfopny8uFEg0J84JX1VtO5URpE=";
subPackages = [ "cmd/timoni" ];
nativeBuildInputs = [ installShellFiles ];
···
buildGo121Module rec {
pname = "timoni";
+
version = "0.14.1";
src = fetchFromGitHub {
owner = "stefanprodan";
repo = "timoni";
rev = "v${version}";
+
hash = "sha256-DzJNNikvODP3v1jgQLbFcXEhcFfTeIYR6qHhUzEP/Ns=";
};
+
vendorHash = "sha256-lRZFRnft8vEntVxiLOBcR00FP8AXexLyo3h2LCNWN00=";
subPackages = [ "cmd/timoni" ];
nativeBuildInputs = [ installShellFiles ];
+2 -2
pkgs/applications/networking/cluster/weave-gitops/default.nix
···
buildGoModule rec {
pname = "weave-gitops";
-
version = "0.31.2";
src = fetchFromGitHub {
owner = "weaveworks";
repo = pname;
rev = "v${version}";
-
sha256 = "sha256-bzYvyqLMdVdgp8C71mnykzB9HEIPDXQ+SpBOScKybJ8=";
};
ldflags = [ "-s" "-w" "-X github.com/weaveworks/weave-gitops/cmd/gitops/version.Version=${version}" ];
···
buildGoModule rec {
pname = "weave-gitops";
+
version = "0.33.0";
src = fetchFromGitHub {
owner = "weaveworks";
repo = pname;
rev = "v${version}";
+
sha256 = "sha256-MJX9OrfvzGwrJria1Ki6QHprvoDLxBRPCnKRqPdnbUw=";
};
ldflags = [ "-s" "-w" "-X github.com/weaveworks/weave-gitops/cmd/gitops/version.Version=${version}" ];
+1 -1
pkgs/applications/networking/instant-messengers/quaternion/default.nix
···
meta = with lib; {
description = "Cross-platform desktop IM client for the Matrix protocol";
-
homepage = "https://matrix.org/docs/projects/client/quaternion.html";
license = licenses.gpl3;
maintainers = with maintainers; [ peterhoeg ];
inherit (qtquickcontrols2.meta) platforms;
···
meta = with lib; {
description = "Cross-platform desktop IM client for the Matrix protocol";
+
homepage = "https://matrix.org/ecosystem/clients/quaternion/";
license = licenses.gpl3;
maintainers = with maintainers; [ peterhoeg ];
inherit (qtquickcontrols2.meta) platforms;
+1 -1
pkgs/applications/networking/instant-messengers/tensor/default.nix
···
'';
meta = with lib; {
-
homepage = "https://matrix.org/docs/projects/client/tensor.html";
description = "Cross-platform Qt5/QML-based Matrix client";
license = licenses.gpl3;
maintainers = with maintainers; [ peterhoeg ];
···
'';
meta = with lib; {
+
homepage = "https://github.com/davidar/tensor";
description = "Cross-platform Qt5/QML-based Matrix client";
license = licenses.gpl3;
maintainers = with maintainers; [ peterhoeg ];
+4 -4
pkgs/applications/networking/instant-messengers/webcord/default.nix
···
buildNpmPackage rec {
pname = "webcord";
-
version = "4.4.1";
src = fetchFromGitHub {
owner = "SpacingBat3";
repo = "WebCord";
rev = "v${version}";
-
hash = "sha256-g9UJANYs5IlKAeRc27oNOfdD3uD3nrG5Ecp+AbbsXLE=";
};
-
npmDepsHash = "sha256-SSlSLZs97LDtL7OyfCtEGZjDVfsn5KKUgRNyL8J5M5g=";
nativeBuildInputs = [
copyDesktopItems
···
passthru.updateScript = nix-update-script { };
meta = with lib; {
-
description = "A Discord and Fosscord electron-based client implemented without Discord API";
homepage = "https://github.com/SpacingBat3/WebCord";
downloadPage = "https://github.com/SpacingBat3/WebCord/releases";
changelog = "https://github.com/SpacingBat3/WebCord/releases/tag/v${version}";
···
buildNpmPackage rec {
pname = "webcord";
+
version = "4.4.2";
src = fetchFromGitHub {
owner = "SpacingBat3";
repo = "WebCord";
rev = "v${version}";
+
hash = "sha256-23YmyRU+xBXpC7bZtBY3RZeVpLFQ3I/Ag5Tvi3m9cIs=";
};
+
npmDepsHash = "sha256-gHX5ZdcC46BwMu22G05Q8UhvZ6CtQ1HSf6KLLlN2iX0=";
nativeBuildInputs = [
copyDesktopItems
···
passthru.updateScript = nix-update-script { };
meta = with lib; {
+
description = "A Discord and SpaceBar electron-based client implemented without Discord API";
homepage = "https://github.com/SpacingBat3/WebCord";
downloadPage = "https://github.com/SpacingBat3/WebCord/releases";
changelog = "https://github.com/SpacingBat3/WebCord/releases/tag/v${version}";
+2 -2
pkgs/applications/office/portfolio/default.nix
···
in
stdenv.mkDerivation rec {
pname = "PortfolioPerformance";
-
version = "0.65.3";
src = fetchurl {
url = "https://github.com/buchen/portfolio/releases/download/${version}/PortfolioPerformance-${version}-linux.gtk.x86_64.tar.gz";
-
hash = "sha256-xAbfyjQ0MPNDC6UJthCLtu8nfI/AdtludvejA32/dIQ=";
};
nativeBuildInputs = [
···
in
stdenv.mkDerivation rec {
pname = "PortfolioPerformance";
+
version = "0.65.4";
src = fetchurl {
url = "https://github.com/buchen/portfolio/releases/download/${version}/PortfolioPerformance-${version}-linux.gtk.x86_64.tar.gz";
+
hash = "sha256-2+1lwaO2+kq/EjJoA4EvGCMLH6iErR9KtWINLoO17+w=";
};
nativeBuildInputs = [
+2 -2
pkgs/applications/office/zotero/default.nix
···
stdenv.mkDerivation rec {
pname = "zotero";
-
version = "6.0.26";
src = fetchurl {
url =
"https://download.zotero.org/client/release/${version}/Zotero-${version}_linux-x86_64.tar.bz2";
-
hash = "sha256-Btrzv9trUFjCrQ+OEc7MUOzq7x3XW7jtgUJMitmPK0A=";
};
nativeBuildInputs = [ wrapGAppsHook ];
···
stdenv.mkDerivation rec {
pname = "zotero";
+
version = "6.0.27";
src = fetchurl {
url =
"https://download.zotero.org/client/release/${version}/Zotero-${version}_linux-x86_64.tar.bz2";
+
hash = "sha256-+nCPLVVBkEu0g2Kxt/XYAt6sYxYm05nPcmPNS2OejRs=";
};
nativeBuildInputs = [ wrapGAppsHook ];
+3 -3
pkgs/applications/science/logic/abc/default.nix
···
stdenv.mkDerivation rec {
pname = "abc-verifier";
-
version = "unstable-2023-06-28";
src = fetchFromGitHub {
owner = "yosyshq";
repo = "abc";
-
rev = "bb64142b07794ee685494564471e67365a093710";
-
hash = "sha256-Qkk61Lh84ervtehWskSB9GKh+JPB7mI1IuG32OSZMdg=";
};
nativeBuildInputs = [ cmake ];
···
stdenv.mkDerivation rec {
pname = "abc-verifier";
+
version = "unstable-2023-09-13";
src = fetchFromGitHub {
owner = "yosyshq";
repo = "abc";
+
rev = "daad9ede0137dc58487a0abc126253e671a85b14";
+
hash = "sha256-5XeFYvdqT08xduFUDC5yK1jEOV1fYzyQD7N9ZmG3mpQ=";
};
nativeBuildInputs = [ cmake ];
pkgs/applications/video/anilibria-winmaclinux/0001-fix-instalation-paths.patch pkgs/applications/video/anilibria-winmaclinux/0001-fix-installation-paths.patch
+1 -1
pkgs/applications/video/anilibria-winmaclinux/default.nix
···
qmakeFlags = [ "PREFIX=${placeholder "out"}" ];
patches = [
-
./0001-fix-instalation-paths.patch
./0002-disable-version-check.patch
];
···
qmakeFlags = [ "PREFIX=${placeholder "out"}" ];
patches = [
+
./0001-fix-installation-paths.patch
./0002-disable-version-check.patch
];
+2 -2
pkgs/applications/virtualization/ecs-agent/default.nix
···
buildGoModule rec {
pname = "amazon-ecs-agent";
-
version = "1.75.3";
src = fetchFromGitHub {
rev = "v${version}";
owner = "aws";
repo = pname;
-
hash = "sha256-30KDmbT46K5/jE2aSFkX2TZZvWDtzudazTyqFiyLTds=";
};
vendorHash = null;
···
buildGoModule rec {
pname = "amazon-ecs-agent";
+
version = "1.76.0";
src = fetchFromGitHub {
rev = "v${version}";
owner = "aws";
repo = pname;
+
hash = "sha256-Ex+vYbOdD/AyCMgYF0xBKSxEM3lhBSRR80bx35t6tSA=";
};
vendorHash = null;
+35
pkgs/applications/window-managers/lesbar/default.nix
···
···
+
{ lib
+
, stdenv
+
, fetchFromSourcehut
+
, pkg-config
+
, scdoc
+
, libX11
+
, cairo
+
, pango
+
}:
+
+
stdenv.mkDerivation (finalAttrs: {
+
pname = "lesbar";
+
version = "1.1.0";
+
+
src = fetchFromSourcehut {
+
owner = "~salmiak";
+
repo = "lesbar";
+
rev = "v${finalAttrs.version}";
+
hash = "sha256-uggIoO6rgotkLi6lSJTR4d3NtidXsAC1Kjay9YsT9ps=";
+
};
+
+
nativeBuildInputs = [ pkg-config scdoc ];
+
+
buildInputs = [ libX11 cairo pango ];
+
+
installFlags = [ "PREFIX=$(out)" ];
+
+
meta = with lib; {
+
description = "A programming language agnostic view layer for creating desktop widgets and status bars";
+
homepage = "https://git.sr.ht/~salmiak/lesbar";
+
license = licenses.mit;
+
maintainers = with maintainers; [ jpentland ];
+
platforms = platforms.linux;
+
};
+
})
+1 -1
pkgs/build-support/fetchgit/nix-prefetch-git
···
tmpHomePath="$(mktemp -d "${TMPDIR:-/tmp}/nix-prefetch-git-tmp-home-XXXXXXXXXX")"
exit_handlers+=(remove_tmpHomePath)
HOME="$tmpHomePath"
-
ln -s /build/.netrc "$HOME/"
unset XDG_CONFIG_HOME
export GIT_CONFIG_NOSYSTEM=1
···
tmpHomePath="$(mktemp -d "${TMPDIR:-/tmp}/nix-prefetch-git-tmp-home-XXXXXXXXXX")"
exit_handlers+=(remove_tmpHomePath)
HOME="$tmpHomePath"
+
ln -s "$NIX_BUILD_TOP/.netrc" "$HOME/"
unset XDG_CONFIG_HOME
export GIT_CONFIG_NOSYSTEM=1
+10 -1
pkgs/build-support/node/build-npm-package/hooks/npm-install-hook.sh
···
if [ ! -d "$nodeModulesPath" ]; then
if [ -z "${dontNpmPrune-}" ]; then
-
npm prune --omit=dev --no-save ${npmWorkspace+--workspace=$npmWorkspace} $npmPruneFlags "${npmPruneFlagsArray[@]}" $npmFlags "${npmFlagsArray[@]}"
fi
find node_modules -maxdepth 1 -type d -empty -delete
···
if [ ! -d "$nodeModulesPath" ]; then
if [ -z "${dontNpmPrune-}" ]; then
+
if ! npm prune --omit=dev --no-save ${npmWorkspace+--workspace=$npmWorkspace} $npmPruneFlags "${npmPruneFlagsArray[@]}" $npmFlags "${npmFlagsArray[@]}"; then
+
echo
+
echo
+
echo "ERROR: npm prune step failed"
+
echo
+
echo 'If npm tried to download additional dependencies above, try setting `dontNpmPrune = true`.'
+
echo
+
+
exit 1
+
fi
fi
find node_modules -maxdepth 1 -type d -empty -delete
+69
pkgs/by-name/im/impression/package.nix
···
···
+
{ lib
+
, stdenv
+
, fetchFromGitLab
+
, blueprint-compiler
+
, cargo
+
, desktop-file-utils
+
, meson
+
, ninja
+
, pkg-config
+
, rustPlatform
+
, rustc
+
, wrapGAppsHook4
+
, cairo
+
, dbus
+
, gdk-pixbuf
+
, glib
+
, gtk4
+
, libadwaita
+
, pango
+
}:
+
+
stdenv.mkDerivation rec {
+
pname = "impression";
+
version = "2.1";
+
+
src = fetchFromGitLab {
+
owner = "adhami3310";
+
repo = "Impression";
+
rev = "v${version}";
+
hash = "sha256-Pq1Pz/uNBsk4UdtCwA5gmZoS+kiDrCbpum4ABW7oocA=";
+
};
+
+
cargoDeps = rustPlatform.fetchCargoTarball {
+
inherit src;
+
name = "${pname}-${version}";
+
hash = "sha256-eIfDuz4ewTzmLDKShro3VkoXAZEUOKu133eD/z75jjY=";
+
};
+
+
nativeBuildInputs = [
+
blueprint-compiler
+
cargo
+
desktop-file-utils
+
meson
+
ninja
+
pkg-config
+
rustPlatform.cargoSetupHook
+
rustc
+
wrapGAppsHook4
+
];
+
+
buildInputs = [
+
cairo
+
dbus
+
gdk-pixbuf
+
glib
+
gtk4
+
libadwaita
+
pango
+
];
+
+
meta = {
+
description = "Straight-forward and modern application to create bootable drives";
+
homepage = "https://gitlab.com/adhami3310/Impression";
+
license = lib.licenses.gpl3Only;
+
mainProgram = "impression";
+
maintainers = with lib.maintainers; [ dotlambda ];
+
platforms = lib.platforms.linux;
+
};
+
}
+78
pkgs/by-name/le/lexmark-aex/package.nix
···
···
+
{ lib
+
, stdenv
+
, cups
+
, fetchurl
+
, patchPpdFilesHook
+
, autoPatchelfHook
+
, dpkg
+
, perl
+
, avahi
+
}:
+
+
stdenv.mkDerivation {
+
pname = "lexmark-aex";
+
version = "1.0";
+
+
dontPatchELF = true;
+
dontStrip = true;
+
+
src = fetchurl {
+
url = "https://downloads.lexmark.com/downloads/drivers/Lexmark-AEX-PPD-Files-1.0-01242019.amd64.deb";
+
hash = "sha256-igrJEeFLArGbncOwk/WttnWfPjOokD0/IzpJ4VSOtHk=";
+
};
+
+
strictDeps = true;
+
+
nativeBuildInputs = [
+
autoPatchelfHook
+
patchPpdFilesHook
+
dpkg
+
];
+
+
buildInputs = [
+
# Needed for autoPatchelfHook.
+
avahi
+
cups
+
# Needed for patchShebangs.
+
perl
+
];
+
+
# Needed for autoPatchelfHook.
+
runtimeDependencies = [ (lib.getLib cups) ];
+
+
ppdFileCommands = [ "CommandFileFilterG2" "rerouteprintoption" ];
+
+
installPhase = let
+
libdir =
+
if stdenv.system == "x86_64-linux" then "lib64"
+
else if stdenv.system == "i686_linux" then "lib"
+
else throw "other platforms than i686_linux and x86_64-linux are not yet supported";
+
in ''
+
runHook preInstall
+
+
prefix=usr/local/Lexmark/ppd/Lexmark-AEX-PPD-Files/GlobalPPD_1.4
+
+
# Install raster image filter.
+
install -Dm755 "$prefix/rerouteprintoption" "$out/lib/cups/filter/rerouteprintoption"
+
patchShebangs "$out/lib/cups/filter/rerouteprintoption"
+
+
# Install additional binary filters.
+
for i in CommandFileFilterG2 LexHBPFilter; do
+
install -Dm755 "$prefix/${libdir}/$i" "$out/lib/cups/filter/$i"
+
done
+
+
# Install PPD.
+
install -Dm 0644 -t "$out/share/cups/model/Lexmark" "$prefix"/*.ppd
+
+
runHook postInstall
+
'';
+
+
meta = with lib; {
+
description = "CUPS drivers for Lexmark B2200 and MB2200 Series printers";
+
homepage = "https://support.lexmark.com/en_xm/drivers-downloads.html";
+
sourceProvenance = with sourceTypes; [ binaryNativeCode ];
+
license = licenses.unfree;
+
maintainers = [ maintainers.tobim ];
+
platforms = [ "x86_64-linux" "i686-linux" ];
+
};
+
}
+3 -3
pkgs/desktops/gnome/default.nix
···
gnome-flashback = callPackage ./misc/gnome-flashback { };
-
gnome-panel = callPackage ./misc/gnome-panel {
-
autoreconfHook = pkgs.autoreconfHook269;
-
};
gnome-tweaks = callPackage ./misc/gnome-tweaks { };
···
gnome-flashback = callPackage ./misc/gnome-flashback { };
+
gnome-panel = callPackage ./misc/gnome-panel { };
+
+
gnome-panel-with-modules = callPackage ./misc/gnome-panel/wrapper.nix { };
gnome-tweaks = callPackage ./misc/gnome-tweaks { };
+30 -66
pkgs/desktops/gnome/misc/gnome-flashback/default.nix
···
versionPolicy = "odd-unstable";
};
-
mkSessionForWm = { wmName, wmLabel, wmCommand, enableGnomePanel, panelModulePackages }:
-
let
-
wmApplication = writeTextFile {
-
name = "gnome-flashback-${wmName}-wm";
-
destination = "/share/applications/${wmName}.desktop";
-
text = ''
-
[Desktop Entry]
-
Type=Application
-
Encoding=UTF-8
-
Name=${wmLabel}
-
Exec=${wmCommand}
-
NoDisplay=true
-
X-GNOME-WMName=${wmLabel}
-
X-GNOME-Autostart-Phase=WindowManager
-
X-GNOME-Provides=windowmanager
-
X-GNOME-Autostart-Notify=false
-
'';
-
};
-
-
gnomeSession = writeTextFile {
-
name = "gnome-flashback-${wmName}-gnome-session";
-
destination = "/share/gnome-session/sessions/gnome-flashback-${wmName}.session";
-
text = ''
-
[GNOME Session]
-
Name=GNOME Flashback (${wmLabel})
-
${requiredComponents wmName enableGnomePanel}
-
'';
-
};
-
-
# gnome-panel will only look for applets in a single directory so symlink them into here.
-
panelModulesEnv = buildEnv {
-
name = "gnome-panel-modules-env";
-
# We always want to find the built-in panel applets.
-
paths = [ gnome-panel gnome-flashback ] ++ panelModulePackages;
-
pathsToLink = [ "/lib/gnome-panel/modules" ];
-
};
-
-
executable = stdenv.mkDerivation {
-
name = "gnome-flashback-${wmName}";
-
nativeBuildInputs = [ glib wrapGAppsHook ];
-
buildInputs = [ gnome-flashback ] ++ lib.optionals enableGnomePanel ([ gnome-panel ] ++ panelModulePackages);
-
-
# We want to use the wrapGAppsHook mechanism to wrap gnome-session
-
# with the environment that gnome-flashback and gnome-panel need to
-
# run, including the configured applet packages. This is only possible
-
# in the fixup phase, so turn everything else off.
-
dontUnpack = true;
-
dontConfigure = true;
-
dontBuild = true;
-
dontInstall = true;
-
dontWrapGApps = true; # We want to do the wrapping ourselves.
-
# gnome-flashback and gnome-panel need to be added to XDG_DATA_DIRS so that their .desktop files can be found by gnome-session.
-
# We need to pass the --builtin flag so that gnome-session invokes gnome-session-binary instead of systemd.
-
# If systemd is used, it doesn't use the environment we set up here and so it can't find the .desktop files.
-
preFixup = ''
-
makeWrapper ${gnome-session}/bin/gnome-session $out \
-
--add-flags "--session=gnome-flashback-${wmName} --builtin" \
-
--set-default XDG_CURRENT_DESKTOP 'GNOME-Flashback:GNOME' \
-
--prefix XDG_DATA_DIRS : '${lib.makeSearchPath "share" ([ wmApplication gnomeSession gnome-flashback ] ++ lib.optional enableGnomePanel gnome-panel)}' \
-
"''${gappsWrapperArgs[@]}" \
-
${lib.optionalString enableGnomePanel "--set NIX_GNOME_PANEL_MODULESDIR '${panelModulesEnv}/lib/gnome-panel/modules'"}
-
'';
-
};
-
in
writeTextFile
{
name = "gnome-flashback-${wmName}-xsession";
···
[Desktop Entry]
Name=GNOME Flashback (${wmLabel})
Comment=This session logs you into GNOME Flashback with ${wmLabel}
-
Exec=${executable}
TryExec=${wmCommand}
Type=Application
DesktopNames=GNOME-Flashback;GNOME;
···
};
mkSystemdTargetForWm = { wmName, wmLabel, wmCommand, enableGnomePanel }:
-
runCommand "gnome-flashback-${wmName}.target" {} ''
mkdir -p $out/lib/systemd/user
cp -r "${gnome-flashback}/lib/systemd/user/gnome-session@gnome-flashback-metacity.target.d" \
"$out/lib/systemd/user/gnome-session@gnome-flashback-${wmName}.target.d"
···
versionPolicy = "odd-unstable";
};
+
mkWmApplication = { wmName, wmLabel, wmCommand }:
+
writeTextFile {
+
name = "gnome-flashback-${wmName}-wm";
+
destination = "/share/applications/${wmName}.desktop";
+
text = ''
+
[Desktop Entry]
+
Type=Application
+
Encoding=UTF-8
+
Name=${wmLabel}
+
Exec=${wmCommand}
+
NoDisplay=true
+
X-GNOME-WMName=${wmLabel}
+
X-GNOME-Autostart-Phase=WindowManager
+
X-GNOME-Provides=windowmanager
+
X-GNOME-Autostart-Notify=false
+
'';
+
};
+
mkGnomeSession = { wmName, wmLabel, enableGnomePanel }:
+
writeTextFile {
+
name = "gnome-flashback-${wmName}-gnome-session";
+
destination = "/share/gnome-session/sessions/gnome-flashback-${wmName}.session";
+
text = ''
+
[GNOME Session]
+
Name=GNOME Flashback (${wmLabel})
+
${requiredComponents wmName enableGnomePanel}
+
'';
+
};
+
mkSessionForWm = { wmName, wmLabel, wmCommand }:
writeTextFile
{
name = "gnome-flashback-${wmName}-xsession";
···
[Desktop Entry]
Name=GNOME Flashback (${wmLabel})
Comment=This session logs you into GNOME Flashback with ${wmLabel}
+
Exec=${gnome-session}/bin/gnome-session --session=gnome-flashback-${wmName}
TryExec=${wmCommand}
Type=Application
DesktopNames=GNOME-Flashback;GNOME;
···
};
mkSystemdTargetForWm = { wmName, wmLabel, wmCommand, enableGnomePanel }:
+
runCommand "gnome-flashback-${wmName}.target" { } ''
mkdir -p $out/lib/systemd/user
cp -r "${gnome-flashback}/lib/systemd/user/gnome-session@gnome-flashback-metacity.target.d" \
"$out/lib/systemd/user/gnome-session@gnome-flashback-${wmName}.target.d"
+66
pkgs/desktops/gnome/misc/gnome-panel/wrapper.nix
···
···
+
{ stdenv
+
, lib
+
, buildEnv
+
, gnome-panel
+
, gnome-flashback
+
, xorg
+
, glib
+
, wrapGAppsHook
+
, panelModulePackages ? [ ]
+
}:
+
+
let
+
# We always want to find the built-in panel applets.
+
selectedPanelModulePackages = [ gnome-panel gnome-flashback ] ++ panelModulePackages;
+
+
panelModulesEnv = buildEnv {
+
name = "gnome-panel-modules-env";
+
paths = selectedPanelModulePackages;
+
pathsToLink = [ "/lib/gnome-panel/modules" ];
+
};
+
in
+
stdenv.mkDerivation {
+
pname = "${gnome-panel.pname}-with-modules";
+
inherit (gnome-panel) version;
+
+
nativeBuildInputs = [
+
glib
+
wrapGAppsHook
+
];
+
+
buildInputs = selectedPanelModulePackages ++
+
lib.forEach selectedPanelModulePackages (x: x.buildInputs or [ ]);
+
+
dontUnpack = true;
+
dontConfigure = true;
+
dontBuild = true;
+
+
preferLocalBuild = true;
+
allowSubstitutes = false;
+
+
installPhase = ''
+
runHook preInstall
+
+
mkdir -p $out
+
${xorg.lndir}/bin/lndir -silent ${gnome-panel} $out
+
+
rm -r $out/lib/gnome-panel/modules
+
${xorg.lndir}/bin/lndir -silent ${panelModulesEnv} $out
+
+
rm $out/share/applications/gnome-panel.desktop
+
+
substitute ${gnome-panel}/share/applications/gnome-panel.desktop \
+
$out/share/applications/gnome-panel.desktop --replace \
+
"Exec=${gnome-panel}/bin/gnome-panel" "Exec=$out/bin/gnome-panel"
+
+
runHook postInstall
+
'';
+
+
preFixup = ''
+
gappsWrapperArgs+=(
+
--set NIX_GNOME_PANEL_MODULESDIR "$out/lib/gnome-panel/modules"
+
)
+
'';
+
+
meta = gnome-panel.meta // { outputsToInstall = [ "out" ]; };
+
}
+2 -2
pkgs/development/compilers/cmdstan/default.nix
···
stdenv.mkDerivation rec {
pname = "cmdstan";
-
version = "2.32.2";
src = fetchFromGitHub {
owner = "stan-dev";
repo = pname;
rev = "v${version}";
fetchSubmodules = true;
-
hash = "sha256-obV+R1ZjBgunXndCNry+MEne1nQawo81IV2DWwYbbIQ=";
};
nativeBuildInputs = [ stanc ];
···
stdenv.mkDerivation rec {
pname = "cmdstan";
+
version = "2.33.1";
src = fetchFromGitHub {
owner = "stan-dev";
repo = pname;
rev = "v${version}";
fetchSubmodules = true;
+
hash = "sha256-c+L/6PjW7YgmXHuKhKjiRofBRAhKYCzFCZ6BOX5AmC4=";
};
nativeBuildInputs = [ stanc ];
+1 -1
pkgs/development/compilers/gcc/common/pre-configure.nix
···
+ lib.optionalString (targetPlatform != hostPlatform &&
withoutTargetLibc &&
targetPlatform.config == hostPlatform.config &&
-
(stdenv.cc.isClang || stdenv.targetPlatform.useLLVM)) ''
export inhibit_libc=true
''
···
+ lib.optionalString (targetPlatform != hostPlatform &&
withoutTargetLibc &&
targetPlatform.config == hostPlatform.config &&
+
(stdenv.cc.isClang || stdenv.targetPlatform.useLLVM or false)) ''
export inhibit_libc=true
''
+2 -2
pkgs/development/compilers/stanc/default.nix
···
ocamlPackages.buildDunePackage rec {
pname = "stanc";
-
version = "2.32.2";
minimalOCamlVersion = "4.12";
duneVersion = "3";
···
owner = "stan-dev";
repo = "stanc3";
rev = "v${version}";
-
hash = "sha256-dngmZXVb59uV7EugYIZAqE1gk66em7iuzllbbPWK2xk=";
};
# Error: This expression has type [ `Use_Sys_unix ]
···
ocamlPackages.buildDunePackage rec {
pname = "stanc";
+
version = "2.33.1";
minimalOCamlVersion = "4.12";
duneVersion = "3";
···
owner = "stan-dev";
repo = "stanc3";
rev = "v${version}";
+
hash = "sha256-DeQOiYJ5OHIMXcYHTYlObJnxM2Rqf6pSN4T7sAGw+wg=";
};
# Error: This expression has type [ `Use_Sys_unix ]
+3 -3
pkgs/development/compilers/yosys/default.nix
···
in stdenv.mkDerivation rec {
pname = "yosys";
-
version = "0.33";
src = fetchFromGitHub {
owner = "YosysHQ";
repo = "yosys";
-
rev = "${pname}-${version}";
-
hash = "sha256-3MsWF161pqqeAbmeTlkQY6UpU4pq1WT0XXK9yciwt0M=";
};
enableParallelBuilding = true;
···
in stdenv.mkDerivation rec {
pname = "yosys";
+
version = "0.34";
src = fetchFromGitHub {
owner = "YosysHQ";
repo = "yosys";
+
rev = "refs/tags/${pname}-${version}";
+
hash = "sha256-GHDsMBj7DRb9ffESgzd1HzDAA6Cyft5PomidvIMzn9g=";
};
enableParallelBuilding = true;
+2 -2
pkgs/development/libraries/SDL_compat/default.nix
···
in
stdenv.mkDerivation rec {
pname = "SDL_compat";
-
version = "1.2.64";
src = fetchFromGitHub {
owner = "libsdl-org";
repo = "sdl12-compat";
rev = "release-" + version;
-
hash = "sha256-Ctl7RElRWaB4IpBZD5Sm0rYOcv5zaIag78VTKoFlbVs=";
};
nativeBuildInputs = [ cmake pkg-config ]
···
in
stdenv.mkDerivation rec {
pname = "SDL_compat";
+
version = "1.2.68";
src = fetchFromGitHub {
owner = "libsdl-org";
repo = "sdl12-compat";
rev = "release-" + version;
+
hash = "sha256-f2dl3L7/qoYNl4sjik1npcW/W09zsEumiV9jHuKnUmM=";
};
nativeBuildInputs = [ cmake pkg-config ]
+2 -2
pkgs/development/libraries/amdvlk/default.nix
···
in stdenv.mkDerivation rec {
pname = "amdvlk";
-
version = "2023.Q3.2";
src = fetchRepoProject {
name = "${pname}-src";
manifest = "https://github.com/GPUOpen-Drivers/AMDVLK.git";
rev = "refs/tags/v-${version}";
-
sha256 = "/1D2BbT1gnMLvIHfpkxLkeo1pjbG9LkTx9Zl5+gGU/M=";
};
buildInputs = [
···
in stdenv.mkDerivation rec {
pname = "amdvlk";
+
version = "2023.Q3.3";
src = fetchRepoProject {
name = "${pname}-src";
manifest = "https://github.com/GPUOpen-Drivers/AMDVLK.git";
rev = "refs/tags/v-${version}";
+
sha256 = "HHnMiU6mzhUSicXev53PP8y9ealtDMavJLp2F/JAWhI=";
};
buildInputs = [
+2 -2
pkgs/development/libraries/dqlite/default.nix
···
stdenv.mkDerivation rec {
pname = "dqlite";
-
version = "1.15.1";
src = fetchFromGitHub {
owner = "canonical";
repo = pname;
rev = "refs/tags/v${version}";
-
hash = "sha256-GmteQy+nYQFspLvdw44TjuQQeTRQ24OtDeAA+TQJKiU=";
};
nativeBuildInputs = [ autoreconfHook file pkg-config ];
···
stdenv.mkDerivation rec {
pname = "dqlite";
+
version = "1.16.0";
src = fetchFromGitHub {
owner = "canonical";
repo = pname;
rev = "refs/tags/v${version}";
+
hash = "sha256-8MPAyCqqjDpDHSyiZ1cvvgflaOLNzPGswZSsSjSffvw=";
};
nativeBuildInputs = [ autoreconfHook file pkg-config ];
+36 -63
pkgs/development/libraries/exiv2/default.nix
···
-
{ lib, stdenv
, fetchFromGitHub
-
, zlib
-
, expat
, cmake
-
, which
-
, libxml2
-
, python3
, gettext
-
, doxygen
, graphviz
, libxslt
, libiconv
-
, removeReferencesTo
}:
stdenv.mkDerivation rec {
pname = "exiv2";
-
version = "0.27.7";
-
outputs = [ "out" "lib" "dev" "doc" "man" "static" ];
src = fetchFromGitHub {
owner = "exiv2";
-
repo = "exiv2";
rev = "v${version}";
-
sha256 = "sha256-xytVGrLDS22n2/yydFTT6CsDESmhO9mFbPGX4yk+b6g=";
};
nativeBuildInputs = [
···
removeReferencesTo
];
-
buildInputs = lib.optional stdenv.isDarwin libiconv;
propagatedBuildInputs = [
expat
zlib
];
···
"doc"
];
-
doCheck = true;
preCheck = ''
patchShebangs ../test/
mkdir ../test/tmp
-
${lib.optionalString stdenv.hostPlatform.isAarch ''
-
# Fix tests on arm
-
# https://github.com/Exiv2/exiv2/issues/933
-
rm -f ../tests/bugfixes/github/test_CVE_2018_12265.py
-
''}
-
-
${lib.optionalString stdenv.isDarwin ''
-
export DYLD_LIBRARY_PATH=$DYLD_LIBRARY_PATH''${DYLD_LIBRARY_PATH:+:}$PWD/lib
-
# Removing tests depending on charset conversion
-
substituteInPlace ../test/Makefile --replace "conversions.sh" ""
-
rm -f ../tests/bugfixes/redmine/test_issue_460.py
-
rm -f ../tests/bugfixes/redmine/test_issue_662.py
-
rm -f ../tests/bugfixes/github/test_issue_1046.py
-
-
rm ../tests/bugfixes/redmine/test_issue_683.py
-
-
# disable tests that requires loopback networking
-
substituteInPlace ../tests/bash_tests/testcases.py \
-
--replace "def io_test(self):" "def io_disabled(self):"
-
''}
-
'' + lib.optionalString (stdenv.isDarwin && stdenv.isAarch64) ''
-
export LC_ALL=C
-
'' + lib.optionalString stdenv.isAarch32 ''
-
# these tests are fixed in 0.28, remove when updating to 0.28
-
rm -f ../tests/bugfixes/github/test_issue_1503.py
-
rm -f ../tests/bugfixes/github/test_pr1475_AVIF.py
-
rm -f ../tests/bugfixes/github/test_pr1475_HEIC.py
-
rm -f ../tests/bugfixes/github/test_pr1475_HIF.py
'';
-
# With CMake we have to enable samples or there won't be
-
# a tests target. This removes them.
-
postInstall = ''
-
( cd "$out/bin"
-
mv exiv2 .exiv2
-
rm *
-
mv .exiv2 exiv2
-
)
-
-
mkdir -p $static/lib
-
mv $lib/lib/*.a $static/lib/
-
remove-references-to -t ${stdenv.cc.cc} $lib/lib/*.so.*.*.* $out/bin/exiv2 $static/lib/*.a
'';
-
postFixup = ''
-
substituteInPlace "$dev"/lib/cmake/exiv2/exiv2Config.cmake --replace \
-
"set(_IMPORT_PREFIX \"$out\")" \
-
"set(_IMPORT_PREFIX \"$static\")"
-
substituteInPlace "$dev"/lib/cmake/exiv2/exiv2Config-*.cmake --replace \
-
"$lib/lib/libexiv2-xmp.a" \
-
"$static/lib/libexiv2-xmp.a"
-
'';
-
disallowedReferences = [ stdenv.cc.cc ];
meta = with lib; {
homepage = "https://exiv2.org";
···
+
{ lib
+
, stdenv
, fetchFromGitHub
, cmake
+
, doxygen
, gettext
, graphviz
, libxslt
+
, removeReferencesTo
, libiconv
+
, brotli
+
, expat
+
, inih
+
, zlib
+
, libxml2
+
, python3
+
, which
}:
stdenv.mkDerivation rec {
pname = "exiv2";
+
version = "0.28.0";
+
outputs = [ "out" "lib" "dev" "doc" "man" ];
src = fetchFromGitHub {
owner = "exiv2";
+
repo = "exiv2";
rev = "v${version}";
+
hash = "sha256-nEoLJWxSJmAonCbW/iZKjLrKMj09mwEaSUXUcUu8GxU=";
};
nativeBuildInputs = [
···
removeReferencesTo
];
+
buildInputs = lib.optionals stdenv.isDarwin [
+
libiconv
+
];
propagatedBuildInputs = [
+
brotli
expat
+
inih
zlib
];
···
"doc"
];
+
# https://github.com/Exiv2/exiv2/issues/2762
+
doCheck = lib.versionOlder brotli.version "1.1.0";
preCheck = ''
patchShebangs ../test/
mkdir ../test/tmp
+
'' + lib.optionalString stdenv.hostPlatform.isAarch32 ''
+
# Fix tests on arm
+
# https://github.com/Exiv2/exiv2/issues/933
+
rm -f ../tests/bugfixes/github/test_CVE_2018_12265.py
+
'' + lib.optionalString stdenv.isDarwin ''
+
export DYLD_LIBRARY_PATH=$DYLD_LIBRARY_PATH''${DYLD_LIBRARY_PATH:+:}$PWD/lib
+
export LC_ALL=C
+
# disable tests that requires loopback networking
+
substituteInPlace ../tests/bash_tests/testcases.py \
+
--replace "def io_test(self):" "def io_disabled(self):"
'';
+
preFixup = ''
remove-references-to -t ${stdenv.cc.cc} $lib/lib/*.so.*.*.* $out/bin/exiv2 $static/lib/*.a
'';
disallowedReferences = [ stdenv.cc.cc ];
+
+
# causes redefinition of _FORTIFY_SOURCE
+
hardeningDisable = [ "fortify3" ];
meta = with lib; {
homepage = "https://exiv2.org";
+3 -6
pkgs/development/libraries/liblinphone/default.nix
···
-
{ bctoolbox
, belcard
, belle-sip
-
, belr
, cmake
, doxygen
, fetchFromGitLab
···
, lime
, mediastreamer
, python3
-
, bc-soci
, sqlite
-
, lib
, stdenv
, xercesc
-
, zxing-cpp
}:
stdenv.mkDerivation rec {
···
"-DENABLE_STATIC=NO" # Do not build static libraries
"-DENABLE_UNIT_TESTS=NO" # Do not build test executables
"-DENABLE_STRICT=NO" # Do not build with -Werror
];
buildInputs = [
···
(python3.withPackages (ps: [ ps.pystache ps.six ]))
sqlite
xercesc
-
zxing-cpp
];
nativeBuildInputs = [
···
+
{ lib
+
, bc-soci
, belcard
, belle-sip
, cmake
, doxygen
, fetchFromGitLab
···
, lime
, mediastreamer
, python3
, sqlite
, stdenv
, xercesc
}:
stdenv.mkDerivation rec {
···
"-DENABLE_STATIC=NO" # Do not build static libraries
"-DENABLE_UNIT_TESTS=NO" # Do not build test executables
"-DENABLE_STRICT=NO" # Do not build with -Werror
+
"-DENABLE_QRCODE=NO" # Does not build with zxing-cpp 2
];
buildInputs = [
···
(python3.withPackages (ps: [ ps.pystache ps.six ]))
sqlite
xercesc
];
nativeBuildInputs = [
+2 -2
pkgs/development/libraries/libmediainfo/default.nix
···
stdenv.mkDerivation rec {
pname = "libmediainfo";
-
version = "23.07";
src = fetchurl {
url = "https://mediaarea.net/download/source/libmediainfo/${version}/libmediainfo_${version}.tar.xz";
-
hash = "sha256-YEVsiyq4dppggdlv176G20/jJSDkoCI5fLIsrPR86CA=";
};
nativeBuildInputs = [ autoreconfHook pkg-config ];
···
stdenv.mkDerivation rec {
pname = "libmediainfo";
+
version = "23.09";
src = fetchurl {
url = "https://mediaarea.net/download/source/libmediainfo/${version}/libmediainfo_${version}.tar.xz";
+
hash = "sha256-HDJvFmVyrGwsHIim1Tr35FE4iEDH7r7scdWrv9G7LtM=";
};
nativeBuildInputs = [ autoreconfHook pkg-config ];
+2 -2
pkgs/development/libraries/libnbd/default.nix
···
stdenv.mkDerivation rec {
pname = "libnbd";
-
version = "1.16.0";
src = fetchurl {
url = "https://download.libguestfs.org/libnbd/${lib.versions.majorMinor version}-stable/${pname}-${version}.tar.gz";
-
hash = "sha256-Tkd46NxLvGe+RpCSFdCsYrFWc3PAtXI1aCq8177jla0=";
};
nativeBuildInputs = [
···
stdenv.mkDerivation rec {
pname = "libnbd";
+
version = "1.18.0";
src = fetchurl {
url = "https://download.libguestfs.org/libnbd/${lib.versions.majorMinor version}-stable/${pname}-${version}.tar.gz";
+
hash = "sha256-srJyd32eCIthoncvM9JQEKCWEOZxxc3YntaV4Ay8kZ8=";
};
nativeBuildInputs = [
+46
pkgs/development/python-modules/anthemav/default.nix
···
···
+
{ lib
+
, buildPythonPackage
+
, fetchFromGitHub
+
, pytest-asyncio
+
, pytestCheckHook
+
, pythonOlder
+
, setuptools
+
, wheel
+
}:
+
+
buildPythonPackage rec {
+
pname = "anthemav";
+
version = "1.4.2";
+
pyproject = true;
+
+
disabled = pythonOlder "3.7";
+
+
src = fetchFromGitHub {
+
owner = "nugget";
+
repo = "python-anthemav";
+
rev = "refs/tags/v${version}";
+
hash = "sha256-ZjAt4oODx09Qij0PwBvLCplSjwdBx2fReiwjmKhdPa0=";
+
};
+
+
nativeBuildInputs = [
+
setuptools
+
wheel
+
];
+
+
nativeCheckInputs = [
+
pytest-asyncio
+
pytestCheckHook
+
];
+
+
pythonImportsCheck = [
+
"anthemav"
+
];
+
+
meta = with lib; {
+
description = "Python asyncio module to interface with Anthem AVM and MRX receivers";
+
homepage = "https://github.com/nugget/python-anthemav";
+
changelog = "https://github.com/nugget/python-anthemav/releases/tag/v${version}";
+
license = licenses.mit;
+
maintainers = with maintainers; [ fab ];
+
};
+
}
+2 -2
pkgs/development/python-modules/argh/default.nix
···
buildPythonPackage rec {
pname = "argh";
-
version = "0.29.3";
format = "pyproject";
src = fetchPypi {
inherit pname version;
-
hash = "sha256-WOQ4zpFpqqLm3hR+POs0zqz+JlVqIwb1Di1G9Sd5rLE=";
};
nativeBuildInputs = [
···
buildPythonPackage rec {
pname = "argh";
+
version = "0.29.4";
format = "pyproject";
src = fetchPypi {
inherit pname version;
+
hash = "sha256-aVwK5FNCcMriaXhBtKVvQ0qZBpSgAmTqEOu7zcAsE/c=";
};
nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/atom/default.nix
···
buildPythonPackage rec {
pname = "atom";
-
version = "0.10.0";
format = "pyproject";
disabled = pythonOlder "3.8";
···
owner = "nucleic";
repo = pname;
rev = "refs/tags/${version}";
-
hash = "sha256-l+4/bk3V5gMa7CXSHSo8aWmipur0xheL2FopHuiLcpQ=";
};
SETUPTOOLS_SCM_PRETEND_VERSION = version;
···
buildPythonPackage rec {
pname = "atom";
+
version = "0.10.3";
format = "pyproject";
disabled = pythonOlder "3.8";
···
owner = "nucleic";
repo = pname;
rev = "refs/tags/${version}";
+
hash = "sha256-NXjvRVYcWU9p7b8y2ICOzYe6TeMh1S70Edy/JvTG7a4=";
};
SETUPTOOLS_SCM_PRETEND_VERSION = version;
+4 -2
pkgs/development/python-modules/cmdstanpy/default.nix
···
, pandas
, numpy
, tqdm
, xarray
, pytestCheckHook
···
buildPythonPackage rec {
pname = "cmdstanpy";
-
version = "1.1.0";
format = "setuptools";
src = fetchFromGitHub {
owner = "stan-dev";
repo = "cmdstanpy";
rev = "refs/tags/v${version}";
-
hash = "sha256-9kAd3rbSctWEhAzB6RiQlbg5/uVxGIghYLus8hWzBFQ=";
};
patches = [
···
pandas
numpy
tqdm
];
passthru.optional-dependencies = {
···
, pandas
, numpy
, tqdm
+
, stanio
, xarray
, pytestCheckHook
···
buildPythonPackage rec {
pname = "cmdstanpy";
+
version = "1.2.0";
format = "setuptools";
src = fetchFromGitHub {
owner = "stan-dev";
repo = "cmdstanpy";
rev = "refs/tags/v${version}";
+
hash = "sha256-1/X5JDvCx21qLNamNQXpg+w3d3DdSRlB+liIv2fThs4=";
};
patches = [
···
pandas
numpy
tqdm
+
stanio
];
passthru.optional-dependencies = {
+2 -2
pkgs/development/python-modules/django-auth-ldap/default.nix
···
buildPythonPackage rec {
pname = "django-auth-ldap";
-
version = "4.5.0";
format = "pyproject";
disabled = isPy27;
src = fetchPypi {
inherit pname version;
-
hash = "sha256-B6L+NbQCUIluErjWLROW0eQ3AEYwNwN2BJPOzXkfqI8=";
};
nativeBuildInputs = [
···
buildPythonPackage rec {
pname = "django-auth-ldap";
+
version = "4.6.0";
format = "pyproject";
disabled = isPy27;
src = fetchPypi {
inherit pname version;
+
hash = "sha256-muK/h/m2Nnts/ZSgRRiWy8co5UAO2By/vVjOdDwJCaI=";
};
nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/django-redis/default.nix
···
let
pname = "django-redis";
-
version = "5.3.0";
in
buildPythonPackage {
inherit pname version;
···
owner = "jazzband";
repo = "django-redis";
rev = "refs/tags/${version}";
-
hash = "sha256-eX9rUUvpkRrkZ82YalWn8s9DTw6nsbGzi1A6ibRoQGw=";
};
postPatch = ''
···
let
pname = "django-redis";
+
version = "5.4.0";
in
buildPythonPackage {
inherit pname version;
···
owner = "jazzband";
repo = "django-redis";
rev = "refs/tags/${version}";
+
hash = "sha256-m7z3c7My24vrSSnyfDQ/LlWhy7pV4U0L8LATMvkfczc=";
};
postPatch = ''
-2
pkgs/development/python-modules/einops/default.nix
···
, hatchling
, jupyter
, nbconvert
-
, nbformat
, numpy
, parameterized
, pillow
···
chainer
jupyter
nbconvert
-
nbformat
numpy
parameterized
pillow
···
, hatchling
, jupyter
, nbconvert
, numpy
, parameterized
, pillow
···
chainer
jupyter
nbconvert
numpy
parameterized
pillow
+2 -2
pkgs/development/python-modules/flask-jwt-extended/default.nix
···
buildPythonPackage rec {
pname = "flask-jwt-extended";
-
version = "4.5.2";
format = "setuptools";
disabled = pythonOlder "3.7";
···
src = fetchPypi {
pname = "Flask-JWT-Extended";
inherit version;
-
hash = "sha256-ulYkW6Q7cciuk2eEuGdiXc6LmVb67t7ClTIi5XlC+ws=";
};
propagatedBuildInputs = [
···
buildPythonPackage rec {
pname = "flask-jwt-extended";
+
version = "4.5.3";
format = "setuptools";
disabled = pythonOlder "3.7";
···
src = fetchPypi {
pname = "Flask-JWT-Extended";
inherit version;
+
hash = "sha256-Bh7z0l7VdDur5JZKs4822HDm0v2KEmurXXfd74oBkys=";
};
propagatedBuildInputs = [
+49
pkgs/development/python-modules/flask-mysqldb/default.nix
···
···
+
{ lib
+
, buildPythonPackage
+
, pythonOlder
+
, fetchFromGitHub
+
, setuptools
+
, flask
+
, mysqlclient
+
, pytestCheckHook
+
}:
+
+
buildPythonPackage rec {
+
pname = "flask-mysqldb";
+
version = "2.0.0";
+
pyproject = true;
+
+
disabled = pythonOlder "3.8";
+
+
src = fetchFromGitHub {
+
owner = "alexferl";
+
repo = "flask-mysqldb";
+
rev = "v${version}";
+
hash = "sha256-RHAB9WGRzojH6eAOG61QguwF+4LssO9EcFjbWxoOtF4=";
+
};
+
+
nativeBuildInputs = [
+
setuptools
+
];
+
+
propagatedBuildInputs = [
+
flask
+
mysqlclient
+
];
+
+
pythonImportsCheck = [
+
"flask_mysqldb"
+
];
+
+
nativeCheckInputs = [
+
pytestCheckHook
+
];
+
+
meta = with lib; {
+
description = "MySQL connection support for Flask";
+
homepage = "https://github.com/alexferl/flask-mysqldb";
+
changelog = "https://github.com/alexferl/flask-mysqldb/releases/tag/v${version}";
+
license = licenses.mit;
+
maintainers = with maintainers; [ netali ];
+
};
+
}
+3 -3
pkgs/development/python-modules/fschat/default.nix
···
, protobuf
}:
let
-
version = "0.2.28";
in
buildPythonPackage {
pname = "fschat";
···
src = fetchFromGitHub {
owner = "lm-sys";
repo = "FastChat";
-
rev = "v${version}";
-
hash = "sha256-nTP4zY6mJykzKb6LBWosg77mwE33vq9eiYSpAlZU5NI=";
};
nativeBuildInputs = [
···
, protobuf
}:
let
+
version = "0.2.30";
in
buildPythonPackage {
pname = "fschat";
···
src = fetchFromGitHub {
owner = "lm-sys";
repo = "FastChat";
+
rev = "refs/tags/v${version}";
+
hash = "sha256-SkrdRpmbxnt/Xn8TTmozxhr3fPeAFPP7X0cM9vJC9Sc=";
};
nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/google-cloud-logging/default.nix
···
buildPythonPackage rec {
pname = "google-cloud-logging";
-
version = "3.7.0";
format = "setuptools";
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
-
hash = "sha256-0uroUD8Pb5SEhG34sIepU5zY0yo19n9QBTz9sCuYlh4=";
};
propagatedBuildInputs = [
···
buildPythonPackage rec {
pname = "google-cloud-logging";
+
version = "3.8.0";
format = "setuptools";
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
+
hash = "sha256-/dkW5ZqEqowC6BSNf907O2I8V7DB/3H0MpfOjlD8Hqs=";
};
propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/imap-tools/default.nix
···
buildPythonPackage rec {
pname = "imap-tools";
-
version = "1.2.0";
disabled = pythonOlder "3.5";
···
owner = "ikvk";
repo = "imap_tools";
rev = "refs/tags/v${version}";
-
hash = "sha256-FC4uvBqQ9Lqpvj94ByM7LYiqqjAQQljYduBxwum49lI=";
};
nativeCheckInputs = [
···
buildPythonPackage rec {
pname = "imap-tools";
+
version = "1.3.0";
disabled = pythonOlder "3.5";
···
owner = "ikvk";
repo = "imap_tools";
rev = "refs/tags/v${version}";
+
hash = "sha256-dlCPJQDkHW4zNIHwhyKkgk+rI2t+Xn+Fbf3xJPRtaiY=";
};
nativeCheckInputs = [
+2 -2
pkgs/development/python-modules/influxdb-client/default.nix
···
buildPythonPackage rec {
pname = "influxdb-client";
-
version = "1.37.0";
format = "setuptools";
disabled = pythonOlder "3.7";
···
owner = "influxdata";
repo = "influxdb-client-python";
rev = "refs/tags/v${version}";
-
hash = "sha256-paS+/miraJ9vRL1ZEAWJRSVd1hGvrYJe+0YD/F4sGDs=";
};
propagatedBuildInputs = [
···
buildPythonPackage rec {
pname = "influxdb-client";
+
version = "1.38.0";
format = "setuptools";
disabled = pythonOlder "3.7";
···
owner = "influxdata";
repo = "influxdb-client-python";
rev = "refs/tags/v${version}";
+
hash = "sha256-oE0RPryuUJcy6HN3V2XIxipGYU41xrYMC7b0sGRfay8=";
};
propagatedBuildInputs = [
+49
pkgs/development/python-modules/loqedapi/default.nix
···
···
+
{ lib
+
, aiohttp
+
, async-timeout
+
, buildPythonPackage
+
, fetchFromGitHub
+
, pythonOlder
+
, setuptools
+
, wheel
+
}:
+
+
buildPythonPackage rec {
+
pname = "loqedapi";
+
version = "2.1.8";
+
pyproject = true;
+
+
disabled = pythonOlder "3.7";
+
+
src = fetchFromGitHub {
+
owner = "cpolhout";
+
repo = "loqedAPI";
+
rev = "refs/tags/v${version}";
+
hash = "sha256-9ekZ98GazH1tna4JT5SEUETKR227UYRIBBghdj+TFB4=";
+
};
+
+
nativeBuildInputs = [
+
setuptools
+
wheel
+
];
+
+
propagatedBuildInputs = [
+
aiohttp
+
async-timeout
+
];
+
+
# Tests require network access
+
doCheck = false;
+
+
pythonImportsCheck = [
+
"loqedAPI"
+
];
+
+
meta = with lib; {
+
description = "Module to interact with the Loqed Smart Door Lock API";
+
homepage = "https://github.com/cpolhout/loqedAPI";
+
changelog = "https://github.com/cpolhout/loqedAPI/releases/tag/v${version}";
+
license = licenses.bsd2;
+
maintainers = with maintainers; [ fab ];
+
};
+
}
+2 -2
pkgs/development/python-modules/nsz/default.nix
···
buildPythonPackage rec {
pname = "nsz";
-
version = "4.4.0";
format = "setuptools";
disabled = pythonOlder "3.7";
···
owner = "nicoboss";
repo = pname;
rev = "refs/tags/${version}";
-
hash = "sha256-glK4CK7D33FfLqHLxVr4kkb887/A9tqxPwWpcXYZu/0=";
};
propagatedBuildInputs = [
···
buildPythonPackage rec {
pname = "nsz";
+
version = "4.5.0";
format = "setuptools";
disabled = pythonOlder "3.7";
···
owner = "nicoboss";
repo = pname;
rev = "refs/tags/${version}";
+
hash = "sha256-/46qOQEuzSBmnFG0XW4z71HAHpuyqhia29KQkUlDsgg=";
};
propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/oci/default.nix
···
buildPythonPackage rec {
pname = "oci";
-
version = "2.112.2";
format = "setuptools";
disabled = pythonOlder "3.7";
···
owner = "oracle";
repo = "oci-python-sdk";
rev = "refs/tags/v${version}";
-
hash = "sha256-Khh1/lpgBtUb1pfV7wNkHA6dWiBpAS899zB4Elp1ULY=";
};
pythonRelaxDeps = [
···
buildPythonPackage rec {
pname = "oci";
+
version = "2.112.3";
format = "setuptools";
disabled = pythonOlder "3.7";
···
owner = "oracle";
repo = "oci-python-sdk";
rev = "refs/tags/v${version}";
+
hash = "sha256-MeqMaui3gBtEdYGZ5w557hfIOiPKRUdScEUBN9QQWwg=";
};
pythonRelaxDeps = [
+56
pkgs/development/python-modules/pyecoforest/default.nix
···
···
+
{ lib
+
, buildPythonPackage
+
, fetchFromGitHub
+
, httpx
+
, poetry-core
+
, pytest-asyncio
+
, pytestCheckHook
+
, pythonOlder
+
, respx
+
}:
+
+
buildPythonPackage rec {
+
pname = "pyecoforest";
+
version = "0.3.0";
+
pyproject = true;
+
+
disabled = pythonOlder "3.7";
+
+
src = fetchFromGitHub {
+
owner = "pjanuario";
+
repo = "pyecoforest";
+
rev = "refs/tags/v${version}";
+
hash = "sha256-GBt7uHppWLq5nIIVwYsOWmLjWjcwdvJwDE/Gu2KnSIA=";
+
};
+
+
postPatch = ''
+
substituteInPlace pyproject.toml \
+
--replace "--cov=pyecoforest --cov-report=term-missing:skip-covered" ""
+
'';
+
+
nativeBuildInputs = [
+
poetry-core
+
];
+
+
propagatedBuildInputs = [
+
httpx
+
];
+
+
nativeCheckInputs = [
+
pytest-asyncio
+
pytestCheckHook
+
respx
+
];
+
+
pythonImportsCheck = [
+
"pyecoforest"
+
];
+
+
meta = with lib; {
+
description = "Module for interacting with Ecoforest devices";
+
homepage = "https://github.com/pjanuario/pyecoforest";
+
changelog = "https://github.com/pjanuario/pyecoforest/blob/${version}/CHANGELOG.md";
+
license = licenses.mit;
+
maintainers = with maintainers; [ fab ];
+
};
+
}
+8 -13
pkgs/development/python-modules/pyfronius/default.nix
···
, aiohttp
, buildPythonPackage
, fetchFromGitHub
-
, fetchpatch
, pythonOlder
, pytestCheckHook
}:
buildPythonPackage rec {
pname = "pyfronius";
-
version = "0.7.1";
-
disabled = pythonOlder "3.6";
src = fetchFromGitHub {
owner = "nielstron";
repo = pname;
rev = "release-${version}";
-
sha256 = "1xwx0c1dp2374bwigzwhvcj4577vrxyhn6i5zv73k9ydc7w1xgyz";
};
-
patches = [
-
(fetchpatch {
-
# Python3.10 compatibility; https://github.com/nielstron/pyfronius/pull/7
-
url = "https://github.com/nielstron/pyfronius/commit/9deb209d4246ff575cd3c4c5373037bf11df6719.patch";
-
hash = "sha256-srXYCvp86kGYUYZIXMcu68hEbkTspD945J+hc/AhqSw=";
-
})
-
];
-
propagatedBuildInputs = [
aiohttp
];
···
pytestCheckHook
];
-
pythonImportsCheck = [ "pyfronius" ];
meta = with lib; {
description = "Python module to communicate with Fronius Symo";
homepage = "https://github.com/nielstron/pyfronius";
license = with licenses; [ mit ];
maintainers = with maintainers; [ fab ];
};
···
, aiohttp
, buildPythonPackage
, fetchFromGitHub
, pythonOlder
, pytestCheckHook
}:
buildPythonPackage rec {
pname = "pyfronius";
+
version = "0.7.2";
+
format = "setuptools";
+
disabled = pythonOlder "3.7";
src = fetchFromGitHub {
owner = "nielstron";
repo = pname;
rev = "release-${version}";
+
hash = "sha256-eWe4nXKW9oP9lqehy6BK7ABaIqP3dgRX6ymW1Okfd9g=";
};
propagatedBuildInputs = [
aiohttp
];
···
pytestCheckHook
];
+
pythonImportsCheck = [
+
"pyfronius"
+
];
meta = with lib; {
description = "Python module to communicate with Fronius Symo";
homepage = "https://github.com/nielstron/pyfronius";
+
changelog = "https://github.com/nielstron/pyfronius/releases/tag/release-${version}";
license = with licenses; [ mit ];
maintainers = with maintainers; [ fab ];
};
+2 -2
pkgs/development/python-modules/pypykatz/default.nix
···
buildPythonPackage rec {
pname = "pypykatz";
-
version = "0.6.8";
format = "setuptools";
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
-
hash = "sha256-uOOPDVlx8EKgkCJmZOQxIlI0UBMNzuh/ESoIoa2TmNM=";
};
propagatedBuildInputs = [
···
buildPythonPackage rec {
pname = "pypykatz";
+
version = "0.6.9";
format = "setuptools";
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
+
hash = "sha256-Xni2cYI+ByTFSDvuWHDU97KljwMe3aT7P+VIir6ktks=";
};
propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/python_docs_theme/default.nix
···
buildPythonPackage rec {
pname = "python_docs_theme";
-
version = "2023.7";
format = "pyproject";
src = fetchFromGitHub {
owner = "python";
repo = "python-docs-theme";
rev = "refs/tags/${version}";
-
sha256 = "sha256-43/TlgYm7Q4ZtY25MiLU9fd1atDmiDUeUK6AYfDfmag=";
};
nativeBuildInputs = [ flit-core ];
···
buildPythonPackage rec {
pname = "python_docs_theme";
+
version = "2023.9";
format = "pyproject";
src = fetchFromGitHub {
owner = "python";
repo = "python-docs-theme";
rev = "refs/tags/${version}";
+
sha256 = "sha256-XVwMEfprTNdNnaW38HMCAu4CswdVjBXYtNWBgqXfbno=";
};
nativeBuildInputs = [ flit-core ];
+2 -2
pkgs/development/python-modules/pywayland/default.nix
···
buildPythonPackage rec {
pname = "pywayland";
-
version = "0.4.16";
src = fetchPypi {
inherit pname version;
-
hash = "sha256-qqcMhwsKs2UhX45xUF9zaDxO0VsfNjhDOx3HNE/ltd0=";
};
nativeBuildInputs = [ pkg-config ];
···
buildPythonPackage rec {
pname = "pywayland";
+
version = "0.4.17";
src = fetchPypi {
inherit pname version;
+
hash = "sha256-9/0ZAmOML3oVrAfzGj72iV08FgyiYBSByoKyxhojxlc=";
};
nativeBuildInputs = [ pkg-config ];
+46
pkgs/development/python-modules/pyyardian/default.nix
···
···
+
{ lib
+
, aiohttp
+
, buildPythonPackage
+
, fetchFromGitHub
+
, setuptools
+
, pythonOlder
+
, wheel
+
}:
+
+
buildPythonPackage rec {
+
pname = "pyyardian";
+
version = "1.1.1";
+
pyproject = true;
+
+
disabled = pythonOlder "3.7";
+
+
src = fetchFromGitHub {
+
owner = "h3l1o5";
+
repo = "pyyardian";
+
rev = "refs/tags/${version}";
+
hash = "sha256-dnHHRGt3TsWJb6tzx+i1gb9hkLJYPVdCt92UGKuO6Mg=";
+
};
+
+
nativeBuildInputs = [
+
setuptools
+
wheel
+
];
+
+
propagatedBuildInputs = [
+
aiohttp
+
];
+
+
# Tests require network access
+
doCheck = false;
+
+
pythonImportsCheck = [
+
"pyyardian"
+
];
+
+
meta = with lib; {
+
description = "Module for interacting with the Yardian irrigation controller";
+
homepage = "https://github.com/h3l1o5/pyyardian";
+
license = licenses.mit;
+
maintainers = with maintainers; [ fab ];
+
};
+
}
+2 -2
pkgs/development/python-modules/slackclient/default.nix
···
buildPythonPackage rec {
pname = "slackclient";
-
version = "3.22.0";
format = "setuptools";
disabled = pythonOlder "3.6";
···
owner = "slackapi";
repo = "python-slack-sdk";
rev = "refs/tags/v${version}";
-
hash = "sha256-PRJgOAC1IJjQb1c4FAbpV8bxOPL9PTbAxNXo2MABRzc=";
};
propagatedBuildInputs = [
···
buildPythonPackage rec {
pname = "slackclient";
+
version = "3.23.0";
format = "setuptools";
disabled = pythonOlder "3.6";
···
owner = "slackapi";
repo = "python-slack-sdk";
rev = "refs/tags/v${version}";
+
hash = "sha256-OsPwLOnmN3kvPmbM6lOaiTWwWvy7b9pgn1X536dCkWk=";
};
propagatedBuildInputs = [
+37
pkgs/development/python-modules/stanio/default.nix
···
···
+
{ lib
+
, buildPythonPackage
+
, pythonOlder
+
, fetchPypi
+
, setuptools
+
, numpy
+
}:
+
+
buildPythonPackage rec {
+
pname = "stanio";
+
version = "0.3.0";
+
pyproject = true;
+
+
disabled = pythonOlder "3.8";
+
+
src = fetchPypi {
+
inherit pname version;
+
hash = "sha256-DFBK5nG41Sah2nEYWsAqJ3VQj/5tPbkfJC6shbz2BG8=";
+
};
+
+
nativeBuildInputs = [
+
setuptools
+
];
+
+
propagatedBuildInputs = [
+
numpy
+
];
+
+
pythonImportsCheck = [ "stanio" ];
+
+
meta = with lib; {
+
description = "Preparing inputs to and reading outputs from Stan";
+
homepage = "https://github.com/WardBrian/stanio";
+
license = licenses.bsd3;
+
maintainers = with maintainers; [ wegank ];
+
};
+
}
+2 -2
pkgs/development/python-modules/stanza/default.nix
···
buildPythonPackage rec {
pname = "stanza";
-
version = "1.5.1";
format = "setuptools";
disabled = pythonOlder "3.6";
···
owner = "stanfordnlp";
repo = pname;
rev = "refs/tags/v${version}";
-
hash = "sha256-c7FaqI/8h6loLJJ9xOaJCyepWp+bc6IcqQlpGlW7u6g=";
};
propagatedBuildInputs = [
···
buildPythonPackage rec {
pname = "stanza";
+
version = "1.6.0";
format = "setuptools";
disabled = pythonOlder "3.6";
···
owner = "stanfordnlp";
repo = pname;
rev = "refs/tags/v${version}";
+
hash = "sha256-AyO/BC5JpkxaXXjj8pAVa4WGnK/GTw4xrmUvGLbLt3U=";
};
propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/tcolorpy/default.nix
···
buildPythonPackage rec {
pname = "tcolorpy";
-
version = "0.1.3";
src = fetchFromGitHub {
owner = "thombashi";
repo = pname;
rev = "refs/tags/v${version}";
-
hash = "sha256-NUlDEMvd6l2GJ9tIXC3zo/8Ji7t0oV0GNVP9UF106yo=";
};
nativeCheckInputs = [ pytestCheckHook ];
···
buildPythonPackage rec {
pname = "tcolorpy";
+
version = "0.1.4";
src = fetchFromGitHub {
owner = "thombashi";
repo = pname;
rev = "refs/tags/v${version}";
+
hash = "sha256-cCdKeixRfXkvEGBqozMWw2RjliLdzhlMv8GE2Q40LZQ=";
};
nativeCheckInputs = [ pytestCheckHook ];
+28 -28
pkgs/development/tools/electron/binary/default.nix
···
headers = "03mb1v5xzn2lp317r0mik9dx2nnxc7m26imygk13dgmafydd6aah";
};
-
electron_22-bin = mkElectron "22.3.25" {
-
armv7l-linux = "d90184e22f9d57fa4f207d5e5006bbfb6df1b9e10760333c3f72353ffa5ef3d1";
-
aarch64-linux = "08c4e127d06d73ad91fa308c811ace9d4f8607fe15ba0b2694261d32a2127a8c";
-
x86_64-linux = "f1d0f66b13d5b7b9e3f7d9b22891bf0b5b6f87e45c46054cd3fa74636c19e921";
-
x86_64-darwin = "945839af7ad0656d6c3462f6b47d871ce3d3860c112b2f574f62624b5b67ca8a";
-
aarch64-darwin = "3b0d7cb9ca7dda2b178af0084814f82c331df6abac63f19c3c6d72759db1e826";
-
headers = "0dbwdfrrd3r2kkfq000gwx5q0w01ndgpglkjw7i2q8b3pr5b2n62";
};
electron_23-bin = mkElectron "23.3.13" {
···
headers = "04k25z0d6xs2ar5mbbnr0phcs97kvxg28df3njhaniws6wf6qcmg";
};
-
electron_24-bin = mkElectron "24.8.5" {
-
armv7l-linux = "12063cec367c7ec5b018eb308aaf34cfc73997f325cd37d19703caba842520e2";
-
aarch64-linux = "a36978af2296a9594035a8dd59c1f7199c68f3f530013a919fc10baec7471668";
-
x86_64-linux = "bdb2ecc81462018a69f105eb0d121deff48b54831af31b7da664fc193969f352";
-
x86_64-darwin = "5eb6f9f9f1860bb76267c85b0bc12cc0bd6158b3cc88a2b484e4896e80f6f693";
-
aarch64-darwin = "49f8a31e3863496d009740ecb4ce95c08870874c284de7a13e8d12c6056c1c48";
-
headers = "11909wjni9wvlinvp0d7gypmv4sqg7xv0bn5x2x8h4sfgqydzwr6";
};
-
electron_25-bin = mkElectron "25.8.4" {
-
armv7l-linux = "6301e6fde3e7c8149a5eca84c3817ba9ad3ffcb72e79318a355f025d7d3f8408";
-
aarch64-linux = "fbb6e06417b1741b94d59a6de5dcf3262bfb3fc98cffbcad475296c42d1cbe94";
-
x86_64-linux = "0cbbcaf90f3dc79dedec97d073ffe954530316523479c31b11781a141f8a87f6";
-
x86_64-darwin = "d4015cd251e58ef074d1f7f3e99bfbbe4cd6b690981f376fc642b2de955e8750";
-
aarch64-darwin = "5d83e2094a26bfe22e4c80e660ab088ec94ae3cc2d518c6efcac338f48cc0266";
-
headers = "10nbnjkmry1dn103jpc3p3jijq8l6zh3cm6k5fqk94nrbmjjdah9";
};
-
electron_26-bin = mkElectron "26.2.4" {
-
armv7l-linux = "300e1a3e84d81277f9ab7f5060b980b2b1387979d6f07ea9d78bce5139430420";
-
aarch64-linux = "a401d68820d1c87006b683d98cfb691ffac1218c815757a3c5a0a4c2f3f08888";
-
x86_64-linux = "d2226ee3fb8bcd17abfe9747ba6c8d6ae2719a6256896d4861e3cb670ec2beeb";
-
x86_64-darwin = "a1e33c66a13913306e80812a9051ce7e5632d7cc13ff76910cc8daa791580589";
-
aarch64-darwin = "dda224e19ff2d2c99624e1da7d20fa24b92a34b49fac8dcef15542e183bc89c6";
-
headers = "0019pwm7n8vwhdflh1yy0lrgfgg92p9l40iw4xxnhm6ppic1f5kk";
};
}
···
headers = "03mb1v5xzn2lp317r0mik9dx2nnxc7m26imygk13dgmafydd6aah";
};
+
electron_22-bin = mkElectron "22.3.26" {
+
armv7l-linux = "265ce4e53f92b1e23c3b6c3e5aa67bba556a6e42f87159aabd65d898b75037dd";
+
aarch64-linux = "9d085db80629418f1eb7ab214b746b6ce29bf578ac49642991a3b37fe46b3ae6";
+
x86_64-linux = "22e15f9bc467f6b67a2ecdb443b23a33e3b599d918e8933b5a6c652c1b73d324";
+
x86_64-darwin = "964ae05bcc8f4c81fbc86d6e2f1e0cd65fe1b1e47a715aba7a883ff6f6d02577";
+
aarch64-darwin = "2dd42d9b2ed6cd9649ef9fb9aadda04fbbb01de3a6ea6ac053d95aaaa80ed16e";
+
headers = "0nqz6g68m16155dmaydbca2z05pgs4qnkd8djba9zpqh7priv24n";
};
electron_23-bin = mkElectron "23.3.13" {
···
headers = "04k25z0d6xs2ar5mbbnr0phcs97kvxg28df3njhaniws6wf6qcmg";
};
+
electron_24-bin = mkElectron "24.8.6" {
+
armv7l-linux = "8f46901667a904a62df7043991f20dc1c2a00370a42159976855458562cda8fc";
+
aarch64-linux = "599e78a3a8127828ea3fa444927e7e51035dba9811ce0d81d59ad9b0bd02b4f6";
+
x86_64-linux = "61e87bbd361da101c6a8363cc9c1f8b8b51db61b076cf495d3f4424303265a96";
+
x86_64-darwin = "067ce05d628b44e1393369c506268915081ac9d96c0973d367262c71dcd91078";
+
aarch64-darwin = "d9093e6928b2247336b3f0811e4f66c4ae50a719ec9399c393ac9556c8e56cee";
+
headers = "009p1ffh2cyn98fcmprrjzq79jysp7h565v4f54wvjxjsq2nkr97";
};
+
electron_25-bin = mkElectron "25.9.0" {
+
armv7l-linux = "dab54628685fc08f9a060de6bb5c9a7910eb2f6d0118ceb257447ace42378b36";
+
aarch64-linux = "7f80fe6016aca69ded956cdd5b64f35a34c1a92a6c16d945465ba00708a4556c";
+
x86_64-linux = "c762b14eb72749b9b400f3b7fff565b6722e0974c1cfb4b6d71b9df9fa364d07";
+
x86_64-darwin = "9b676a67c6ae62b2b8972281934405861539e0c0f1dd5bf892e013d325927746";
+
aarch64-darwin = "098d3673fbca3421021477f0639cb40a54856b35b8af4fa979d0defa1ba75801";
+
headers = "0wcqz4vgkyz1zcd0ybx1ywzv9kz96hdxwk9an98v87nb1gfhk05c";
};
+
electron_26-bin = mkElectron "26.3.0" {
+
armv7l-linux = "c444d805381a8125eb16f24369bbc370751c1f6bfaa0d4613a7a94ad797f5059";
+
aarch64-linux = "740b779bf3a2032fedb6c1902e537f61e88c5e245a4e8815ec8cf471ff38aceb";
+
x86_64-linux = "38e2a68361566faa2e7f2a4639cfedee3a5889d5f64018b2ad055c8f40516312";
+
x86_64-darwin = "ea9434ad717f12771f8c508b664ed8d18179b397910ce81f4b6e21efce90b754";
+
aarch64-darwin = "97cb2d00d06f331b4c028fa96373abdd7b5a71c2aa31b56cdf67d391f889f384";
+
headers = "00r11n0i0j7brkjbb8b0b4df6kgkwdplic4l50y9l4a7sbg6i43m";
};
}
+3 -3
pkgs/development/tools/fq/default.nix
···
buildGoModule rec {
pname = "fq";
-
version = "0.7.0";
src = fetchFromGitHub {
owner = "wader";
repo = "fq";
rev = "v${version}";
-
hash = "sha256-lXU2BX0197aqdXAApDM7Gp24XAsTfpv0NrrWUguVVx0=";
};
-
vendorHash = "sha256-sswb9K4y+G+C4esFM9/OVG/VGl34Fx3ma6/zI6V1DWU=";
ldflags = [
"-s"
···
buildGoModule rec {
pname = "fq";
+
version = "0.8.0";
src = fetchFromGitHub {
owner = "wader";
repo = "fq";
rev = "v${version}";
+
hash = "sha256-7q08fQUFy4qX3VqUHuvOZuVQdFeoeo5+7HUQ4WWMWYw=";
};
+
vendorHash = "sha256-7TGdbGVx7YTuYBmHYK0dqccxSTkLzUlBk21EREv9XBA=";
ldflags = [
"-s"
+2 -2
pkgs/development/tools/initool/default.nix
···
stdenv.mkDerivation rec {
pname = "initool";
-
version = "0.12.0";
src = fetchFromGitHub {
owner = "dbohdan";
repo = pname;
rev = "v${version}";
-
hash = "sha256-LV8Rv+7oUJ/4BX412WD1+Cs7N86OiXutN2ViAmo5jlE=";
};
nativeBuildInputs = [ mlton ];
···
stdenv.mkDerivation rec {
pname = "initool";
+
version = "0.13.0";
src = fetchFromGitHub {
owner = "dbohdan";
repo = pname;
rev = "v${version}";
+
hash = "sha256-99dkog0fr+IrMyrEBDf21tSGGREgAoHcU2+MJdGIvCM=";
};
nativeBuildInputs = [ mlton ];
+2 -2
pkgs/development/tools/jbang/default.nix
···
{ stdenv, lib, fetchzip, jdk, makeWrapper, coreutils, curl }:
stdenv.mkDerivation rec {
-
version = "0.110.1";
pname = "jbang";
src = fetchzip {
url = "https://github.com/jbangdev/jbang/releases/download/v${version}/${pname}-${version}.tar";
-
sha256 = "sha256-49Qwn41xQ0fbS/61S/Z9NLkmjyHxYa7ns3E7ziHcsxM=";
};
nativeBuildInputs = [ makeWrapper ];
···
{ stdenv, lib, fetchzip, jdk, makeWrapper, coreutils, curl }:
stdenv.mkDerivation rec {
+
version = "0.111.0";
pname = "jbang";
src = fetchzip {
url = "https://github.com/jbangdev/jbang/releases/download/v${version}/${pname}-${version}.tar";
+
sha256 = "sha256-kMknqwK0K0b7Wk18Wx0C4qHI6ZjzQtb73u2UL7CiPyY=";
};
nativeBuildInputs = [ makeWrapper ];
+6 -6
pkgs/development/tools/misc/blackfire/default.nix
···
stdenv.mkDerivation rec {
pname = "blackfire";
-
version = "2.21.0";
src = passthru.sources.${stdenv.hostPlatform.system} or (throw "Unsupported platform for blackfire: ${stdenv.hostPlatform.system}");
···
sources = {
"x86_64-linux" = fetchurl {
url = "https://packages.blackfire.io/debian/pool/any/main/b/blackfire/blackfire_${version}_amd64.deb";
-
sha256 = "k2KLrU/Oz3FjBS3ZRKiSDNBweauZSg02yY5Y286JIds=";
};
"i686-linux" = fetchurl {
url = "https://packages.blackfire.io/debian/pool/any/main/b/blackfire/blackfire_${version}_i386.deb";
-
sha256 = "IECKTvbDIA5yANm9n2Y9WxZorDqURac+iSCmBQ8ECHk=";
};
"aarch64-linux" = fetchurl {
url = "https://packages.blackfire.io/debian/pool/any/main/b/blackfire/blackfire_${version}_arm64.deb";
-
sha256 = "7tdXb1sPYncbbKsbSASlZsgzbcOB9EWI+XZ0JV05PUc=";
};
"aarch64-darwin" = fetchurl {
url = "https://packages.blackfire.io/blackfire/${version}/blackfire-darwin_arm64.pkg.tar.gz";
-
sha256 = "Ke55JS9kYkCX69hxOvnNR6FsMEufgvNf1dOaHnzlcp0=";
};
"x86_64-darwin" = fetchurl {
url = "https://packages.blackfire.io/blackfire/${version}/blackfire-darwin_amd64.pkg.tar.gz";
-
sha256 = "GAbN0GoWiw1AAwfo1BfFK0boo+QywfY0VC4SlSjADKo=";
};
};
···
stdenv.mkDerivation rec {
pname = "blackfire";
+
version = "2.22.0";
src = passthru.sources.${stdenv.hostPlatform.system} or (throw "Unsupported platform for blackfire: ${stdenv.hostPlatform.system}");
···
sources = {
"x86_64-linux" = fetchurl {
url = "https://packages.blackfire.io/debian/pool/any/main/b/blackfire/blackfire_${version}_amd64.deb";
+
sha256 = "HvNf6yB6+ljTVJXV3l5Jr1/HTR8tmofgJ4fDPbM2k3M=";
};
"i686-linux" = fetchurl {
url = "https://packages.blackfire.io/debian/pool/any/main/b/blackfire/blackfire_${version}_i386.deb";
+
sha256 = "LvEUPcArVJV1sFFgvflzCQPyhl/q7cXqdwdvN9AsBho=";
};
"aarch64-linux" = fetchurl {
url = "https://packages.blackfire.io/debian/pool/any/main/b/blackfire/blackfire_${version}_arm64.deb";
+
sha256 = "48Twr/zkJVS3uSiAX0/FL7EDtbE9ZHKoQ+otzRo1w9A=";
};
"aarch64-darwin" = fetchurl {
url = "https://packages.blackfire.io/blackfire/${version}/blackfire-darwin_arm64.pkg.tar.gz";
+
sha256 = "k8YnRzSc6RuwBcJcRpjwZevCh2Tc9/j7BetivrMc1mM=";
};
"x86_64-darwin" = fetchurl {
url = "https://packages.blackfire.io/blackfire/${version}/blackfire-darwin_amd64.pkg.tar.gz";
+
sha256 = "PTSggxBfWtIXj8DX2bLmKXlFXWBE7q8FfYww4SCvWh0=";
};
};
+3 -3
pkgs/development/tools/misc/circleci-cli/default.nix
···
buildGoModule rec {
pname = "circleci-cli";
-
version = "0.1.28995";
src = fetchFromGitHub {
owner = "CircleCI-Public";
repo = pname;
rev = "v${version}";
-
sha256 = "sha256-+Gyv3GO6nOueswPAriUm7QkQgEkYEilnBT7hqmiqDW8=";
};
-
vendorHash = "sha256-OWdJ7nFR5hrKQf2H763ezjXkEh0PvtBcjjeSNvH+ca4=";
nativeBuildInputs = [ installShellFiles ];
···
buildGoModule rec {
pname = "circleci-cli";
+
version = "0.1.29041";
src = fetchFromGitHub {
owner = "CircleCI-Public";
repo = pname;
rev = "v${version}";
+
sha256 = "sha256-MEprN5I9ZWz4xTVdl4qZQHfbLbp4Khh63m37ZBq8pgA=";
};
+
vendorHash = "sha256-EcQ5/zp041P4qi8nenrWuVItV3mFI3EHHRhKm/tqpfA=";
nativeBuildInputs = [ installShellFiles ];
+1 -1
pkgs/development/tools/misc/mdl/Gemfile.lock
···
rexml
kramdown-parser-gfm (1.1.0)
kramdown (~> 2.0)
-
mdl (0.12.0)
kramdown (~> 2.3)
kramdown-parser-gfm (~> 1.1)
mixlib-cli (~> 2.1, >= 2.1.1)
···
rexml
kramdown-parser-gfm (1.1.0)
kramdown (~> 2.0)
+
mdl (0.13.0)
kramdown (~> 2.3)
kramdown-parser-gfm (~> 1.1)
mixlib-cli (~> 2.1, >= 2.1.1)
+1 -1
pkgs/development/tools/misc/mdl/default.nix
···
description = "A tool to check markdown files and flag style issues";
homepage = "https://github.com/markdownlint/markdownlint";
license = licenses.mit;
-
maintainers = with maintainers; [ gerschtli manveru nicknovitski ];
platforms = platforms.all;
};
}
···
description = "A tool to check markdown files and flag style issues";
homepage = "https://github.com/markdownlint/markdownlint";
license = licenses.mit;
+
maintainers = with maintainers; [ gerschtli manveru nicknovitski totoroot ];
platforms = platforms.all;
};
}
+2 -2
pkgs/development/tools/misc/mdl/gemset.nix
···
platforms = [];
source = {
remotes = ["https://rubygems.org"];
-
sha256 = "1gk42gayn8d2084ak6wvdwch00wb0acvncglfdhi5n0ap93q6wb6";
type = "gem";
};
-
version = "0.12.0";
};
mixlib-cli = {
groups = ["default"];
···
platforms = [];
source = {
remotes = ["https://rubygems.org"];
+
sha256 = "1a463jx8v4a3lgmmfalq73c337d66hc21q4vnfar1qf4lhk5wyi0";
type = "gem";
};
+
version = "0.13.0";
};
mixlib-cli = {
groups = ["default"];
+3 -3
pkgs/development/tools/supabase-cli/default.nix
···
buildGoModule rec {
pname = "supabase-cli";
-
version = "1.97.1";
src = fetchFromGitHub {
owner = "supabase";
repo = "cli";
rev = "v${version}";
-
hash = "sha256-k1/6QAxQ3h5xG+2VBc/PillddYhrvsQrtJK5tXrb0sQ=";
};
-
vendorHash = "sha256-oEIRmkOCHIvIQJX7GQVJD/aURoEJ7V/LJFEg+oltWEY=";
ldflags = [
"-s"
···
buildGoModule rec {
pname = "supabase-cli";
+
version = "1.102.2";
src = fetchFromGitHub {
owner = "supabase";
repo = "cli";
rev = "v${version}";
+
hash = "sha256-EhGGqBJdAnlccUFDUqzbujaVnQ8VggjY6vlGjI80TN8=";
};
+
vendorHash = "sha256-AiYLSXDmTrswAd64PjF0OH0/z4blAP68HfWlwL48fww=";
ldflags = [
"-s"
+35 -35
pkgs/os-specific/linux/kernel/hardened/patches.json
···
"4.14": {
"patch": {
"extra": "-hardened1",
-
"name": "linux-hardened-4.14.325-hardened1.patch",
-
"sha256": "1mc1pyjjksg2f4189wyas55ax8czzhai2i3jc6n7l9jmfwj7xr9q",
-
"url": "https://github.com/anthraxx/linux-hardened/releases/download/4.14.325-hardened1/linux-hardened-4.14.325-hardened1.patch"
},
-
"sha256": "117p1mdha57f6d3kdwac9jrbmib7g77q4xhir8ghl6fmrs1f2sav",
-
"version": "4.14.325"
},
"4.19": {
"patch": {
"extra": "-hardened1",
-
"name": "linux-hardened-4.19.294-hardened1.patch",
-
"sha256": "1s70vz8rai1z440rmwzipwpq7wa7p2bvri43zmkbisrfggm1lz2r",
-
"url": "https://github.com/anthraxx/linux-hardened/releases/download/4.19.294-hardened1/linux-hardened-4.19.294-hardened1.patch"
},
-
"sha256": "03x0xsb8a369zdr81hg6xdl5n5v48k6iwnhj6r29725777lvvbfc",
-
"version": "4.19.294"
},
"5.10": {
"patch": {
"extra": "-hardened1",
-
"name": "linux-hardened-5.10.195-hardened1.patch",
-
"sha256": "15liin3i9wh7hwr97pyc8rl79ri7frsprssl50si9z810zvc9chb",
-
"url": "https://github.com/anthraxx/linux-hardened/releases/download/5.10.195-hardened1/linux-hardened-5.10.195-hardened1.patch"
},
-
"sha256": "0n4vg2i9sq89wnz85arlyvwysh9s83cgzs5bk2wh98bivi5fwfs1",
-
"version": "5.10.195"
},
"5.15": {
"patch": {
"extra": "-hardened1",
-
"name": "linux-hardened-5.15.132-hardened1.patch",
-
"sha256": "06wkcbhkdm8vnk1cqwngy9gdknqm4pb4za9lbh2q5j1f2nkcn7pq",
-
"url": "https://github.com/anthraxx/linux-hardened/releases/download/5.15.132-hardened1/linux-hardened-5.15.132-hardened1.patch"
},
-
"sha256": "1b0qjsaqjw2rk86shmmrj2aasblkn27acjmc761vnjg7sv2baxs1",
-
"version": "5.15.132"
},
"5.4": {
"patch": {
"extra": "-hardened1",
-
"name": "linux-hardened-5.4.256-hardened1.patch",
-
"sha256": "1rsp30g5xry5y95mz0i6walkcxj6abyrsaq3fwhz0ka6nq6g7w82",
-
"url": "https://github.com/anthraxx/linux-hardened/releases/download/5.4.256-hardened1/linux-hardened-5.4.256-hardened1.patch"
},
-
"sha256": "0fim5q9xakwnjfg48bpsic9r2r8dvrjlalqqkm9vh1rml9mhi967",
-
"version": "5.4.256"
},
"6.1": {
"patch": {
"extra": "-hardened1",
-
"name": "linux-hardened-6.1.54-hardened1.patch",
-
"sha256": "0c8dmgciwc02pzhnx2mj5xlhds7mmicm8r6668di2zfw772rjgr4",
-
"url": "https://github.com/anthraxx/linux-hardened/releases/download/6.1.54-hardened1/linux-hardened-6.1.54-hardened1.patch"
},
-
"sha256": "09sfrq2l8f777mx2n9mhb6bgz1064bl04921byqnmk87si31w653",
-
"version": "6.1.54"
},
"6.5": {
"patch": {
"extra": "-hardened1",
-
"name": "linux-hardened-6.5.4-hardened1.patch",
-
"sha256": "0r411dgp17am2bnfpk8lbzmymp6w9d5raz7hni0mw0kpcq6z996n",
-
"url": "https://github.com/anthraxx/linux-hardened/releases/download/6.5.4-hardened1/linux-hardened-6.5.4-hardened1.patch"
},
-
"sha256": "0s8nzd8yaq06bq8byk7aakbk95gh0rhlif26h1biw94v48anrxxx",
-
"version": "6.5.4"
}
}
···
"4.14": {
"patch": {
"extra": "-hardened1",
+
"name": "linux-hardened-4.14.326-hardened1.patch",
+
"sha256": "08jq0v7i5aghynscvhv3v3sgqbd2yyn6daqc9qg9cw02lxmvnjzz",
+
"url": "https://github.com/anthraxx/linux-hardened/releases/download/4.14.326-hardened1/linux-hardened-4.14.326-hardened1.patch"
},
+
"sha256": "0y0lvzidw775mgx211wnc1c6223iqv8amz5y9jkz9h7l3l7y8p2m",
+
"version": "4.14.326"
},
"4.19": {
"patch": {
"extra": "-hardened1",
+
"name": "linux-hardened-4.19.295-hardened1.patch",
+
"sha256": "0jfsbg8b3h1swb46p4lnsc0b5z8b5j9jjy2fi8fy0762v4g7ps7c",
+
"url": "https://github.com/anthraxx/linux-hardened/releases/download/4.19.295-hardened1/linux-hardened-4.19.295-hardened1.patch"
},
+
"sha256": "1b1qslpk1kka7nxam48s22xsqd9qmp716hmibgfsjxl5y3jc4cmp",
+
"version": "4.19.295"
},
"5.10": {
"patch": {
"extra": "-hardened1",
+
"name": "linux-hardened-5.10.197-hardened1.patch",
+
"sha256": "0h0yarjpc2syg2rdp7ipz0cr466mgm85ii8y5g0dbj9wkflrl54g",
+
"url": "https://github.com/anthraxx/linux-hardened/releases/download/5.10.197-hardened1/linux-hardened-5.10.197-hardened1.patch"
},
+
"sha256": "1awkm7lln5gf6kld9z5h4mg39bd778jsdswwlwb7iv7bn03lafhq",
+
"version": "5.10.197"
},
"5.15": {
"patch": {
"extra": "-hardened1",
+
"name": "linux-hardened-5.15.134-hardened1.patch",
+
"sha256": "1q8vfffiwp3zwrjh7r8q4yn9hybswfl41kz4s97jckf90x84xj8d",
+
"url": "https://github.com/anthraxx/linux-hardened/releases/download/5.15.134-hardened1/linux-hardened-5.15.134-hardened1.patch"
},
+
"sha256": "1lxra3h8pq41hdr1acazwcqk6r8alv9p840ys19nivaprfp84wgk",
+
"version": "5.15.134"
},
"5.4": {
"patch": {
"extra": "-hardened1",
+
"name": "linux-hardened-5.4.257-hardened1.patch",
+
"sha256": "0kf0s69yl9xwnmjk312gphj9fsz1jxcfivwhg10hdvw3cfhjq2dn",
+
"url": "https://github.com/anthraxx/linux-hardened/releases/download/5.4.257-hardened1/linux-hardened-5.4.257-hardened1.patch"
},
+
"sha256": "1w1x91slzg9ggakqhyxnmvz77v2cwfk8bz0knrpgz9qya9q5jxrf",
+
"version": "5.4.257"
},
"6.1": {
"patch": {
"extra": "-hardened1",
+
"name": "linux-hardened-6.1.56-hardened1.patch",
+
"sha256": "01j6qi94wr8bm1vnyw8108as94xiwa92vhh860b4gk71msz7carg",
+
"url": "https://github.com/anthraxx/linux-hardened/releases/download/6.1.56-hardened1/linux-hardened-6.1.56-hardened1.patch"
},
+
"sha256": "1327in80nl0ghbjignjsdw0w5crj4d06d5fivj4q6af26bggvply",
+
"version": "6.1.56"
},
"6.5": {
"patch": {
"extra": "-hardened1",
+
"name": "linux-hardened-6.5.6-hardened1.patch",
+
"sha256": "12xvphbs2i9a262117lfxs9gz0ckfspdv74y5jjkjbmw5gx26fgg",
+
"url": "https://github.com/anthraxx/linux-hardened/releases/download/6.5.6-hardened1/linux-hardened-6.5.6-hardened1.patch"
},
+
"sha256": "1xnjjm50ks18ifrp36md2p2xca4lw160y57j9p152w2l2i16vqvq",
+
"version": "6.5.6"
}
}
+8 -15
pkgs/os-specific/linux/kernel/hardened/update.py
···
# Get the set of currently packaged kernel versions.
kernel_versions = {}
-
for filename in os.listdir(NIXPKGS_KERNEL_PATH):
-
filename_match = re.fullmatch(r"linux-(\d+)\.(\d+)\.nix", filename)
-
if filename_match:
-
nix_version_expr = f"""
-
with import {NIXPKGS_PATH} {{}};
-
(callPackage {NIXPKGS_KERNEL_PATH / filename} {{}}).version
-
"""
-
kernel_version_json = run(
-
"nix-instantiate", "--eval", "--system", "x86_64-linux", "--json", "--expr", nix_version_expr,
-
).stdout
-
kernel_version = parse_version(json.loads(kernel_version_json))
-
if kernel_version < MIN_KERNEL_VERSION:
-
continue
-
kernel_key = major_kernel_version_key(kernel_version)
-
kernel_versions[kernel_key] = kernel_version
# Remove patches for unpackaged kernel versions.
for kernel_key in sorted(patches.keys() - kernel_versions.keys()):
···
# Get the set of currently packaged kernel versions.
kernel_versions = {}
+
with open(NIXPKGS_KERNEL_PATH / "kernels-org.json") as kernel_versions_json:
+
kernel_versions = json.load(kernel_versions_json)
+
for kernel_branch_str in kernel_versions:
+
if kernel_branch_str == "testing": continue
+
kernel_branch = [int(i) for i in kernel_branch_str.split(".")]
+
if kernel_branch < MIN_KERNEL_VERSION: continue
+
kernel_version = [int(i) for i in kernel_versions[kernel_branch_str]["version"].split(".")]
+
kernel_versions[kernel_branch_str] = kernel_version
# Remove patches for unpackaged kernel versions.
for kernel_key in sorted(patches.keys() - kernel_versions.keys()):
+6 -6
pkgs/os-specific/linux/kernel/kernels-org.json
···
"hash": "sha256:0r7cfigh7rcrnzpdi40s6jnzhjgiamb6prixl4n2x8489n6zxfr9"
},
"6.5": {
-
"version": "6.5.5",
-
"hash": "sha256:15gg8sb6cfgk1afwj7fl7mj4nkj14w43vzwvw0qsg3nzyxwh7wcc"
},
"6.4": {
"version": "6.4.16",
"hash": "sha256:0zgj1z97jyx7wf12zrnlcp0mj4cl43ais9qsy6dh1jwylf2fq9ln"
},
"6.1": {
-
"version": "6.1.55",
-
"hash": "sha256:1h0mzx52q9pvdv7rhnvb8g68i7bnlc9rf8gy9qn4alsxq4g28zm8"
},
"5.15": {
-
"version": "5.15.133",
-
"hash": "sha256:1paxzzcagc7s8i491zjny43rxhfamafyly438kj8hyw96iwmx17g"
},
"5.10": {
"version": "5.10.197",
···
"hash": "sha256:0r7cfigh7rcrnzpdi40s6jnzhjgiamb6prixl4n2x8489n6zxfr9"
},
"6.5": {
+
"version": "6.5.6",
+
"hash": "sha256:1xnjjm50ks18ifrp36md2p2xca4lw160y57j9p152w2l2i16vqvq"
},
"6.4": {
"version": "6.4.16",
"hash": "sha256:0zgj1z97jyx7wf12zrnlcp0mj4cl43ais9qsy6dh1jwylf2fq9ln"
},
"6.1": {
+
"version": "6.1.56",
+
"hash": "sha256:1327in80nl0ghbjignjsdw0w5crj4d06d5fivj4q6af26bggvply"
},
"5.15": {
+
"version": "5.15.134",
+
"hash": "sha256:1lxra3h8pq41hdr1acazwcqk6r8alv9p840ys19nivaprfp84wgk"
},
"5.10": {
"version": "5.10.197",
+3 -6
pkgs/os-specific/linux/kernel/manual-config.nix
···
});
postPatch = ''
-
sed -i Makefile -e 's|= depmod|= ${buildPackages.kmod}/bin/depmod|'
# fixup for pre-5.4 kernels using the $(cd $foo && /bin/pwd) pattern
# FIXME: remove when no longer needed
···
# Delete empty directories
find -empty -type d -delete
-
-
# Remove reference to kmod
-
sed -i Makefile -e 's|= ${buildPackages.kmod}/bin/depmod|= depmod|'
'';
requiredSystemFeatures = [ "big-parallel" ];
···
enableParallelBuilding = true;
depsBuildBuild = [ buildPackages.stdenv.cc ];
-
nativeBuildInputs = [ perl bc nettools openssl rsync gmp libmpc mpfr zstd python3Minimal ]
++ optional (stdenv.hostPlatform.linux-kernel.target == "uImage") buildPackages.ubootTools
++ optional (lib.versionOlder version "5.8") libelf
++ optionals (lib.versionAtLeast version "4.16") [ bison flex ]
++ optionals (lib.versionAtLeast version "5.2") [ cpio pahole zlib ]
++ optional (lib.versionAtLeast version "5.8") elfutils
-
++ optional (lib.versionAtLeast version "6.6") kmod
;
hardeningDisable = [ "bindnow" "format" "fortify" "stackprotector" "pic" "pie" ];
···
});
postPatch = ''
+
# Ensure that depmod gets resolved through PATH
+
sed -i Makefile -e 's|= /sbin/depmod|= depmod|'
# fixup for pre-5.4 kernels using the $(cd $foo && /bin/pwd) pattern
# FIXME: remove when no longer needed
···
# Delete empty directories
find -empty -type d -delete
'';
requiredSystemFeatures = [ "big-parallel" ];
···
enableParallelBuilding = true;
depsBuildBuild = [ buildPackages.stdenv.cc ];
+
nativeBuildInputs = [ perl bc nettools openssl rsync gmp libmpc mpfr zstd python3Minimal kmod ]
++ optional (stdenv.hostPlatform.linux-kernel.target == "uImage") buildPackages.ubootTools
++ optional (lib.versionOlder version "5.8") libelf
++ optionals (lib.versionAtLeast version "4.16") [ bison flex ]
++ optionals (lib.versionAtLeast version "5.2") [ cpio pahole zlib ]
++ optional (lib.versionAtLeast version "5.8") elfutils
;
hardeningDisable = [ "bindnow" "format" "fortify" "stackprotector" "pic" "pie" ];
+8
pkgs/os-specific/linux/minimal-bootstrap/default.nix
···
# FIXME: not sure why new gawk doesn't work
gawk = gawk-mes;
};
inherit (callPackage ./glibc {
bash = bash_2_05;
···
echo ${gcc2.tests.get-version}
echo ${gcc2-mes.tests.get-version}
echo ${gcc46.tests.get-version}
echo ${gnugrep.tests.get-version}
echo ${gnused.tests.get-version}
echo ${gnused-mes.tests.get-version}
···
# FIXME: not sure why new gawk doesn't work
gawk = gawk-mes;
};
+
gcc46-cxx = callPackage ./gcc/4.6.cxx.nix {
+
gcc = gcc46;
+
gnumake = gnumake-musl;
+
gnutar = gnutar-musl;
+
# FIXME: not sure why new gawk doesn't work
+
gawk = gawk-mes;
+
};
inherit (callPackage ./glibc {
bash = bash_2_05;
···
echo ${gcc2.tests.get-version}
echo ${gcc2-mes.tests.get-version}
echo ${gcc46.tests.get-version}
+
echo ${gcc46-cxx.tests.hello-world}
echo ${gnugrep.tests.get-version}
echo ${gnused.tests.get-version}
echo ${gnused-mes.tests.get-version}
+140
pkgs/os-specific/linux/minimal-bootstrap/gcc/4.6.cxx.nix
···
···
+
{ lib
+
, buildPlatform
+
, hostPlatform
+
, fetchurl
+
, bash
+
, coreutils
+
, gcc
+
, musl
+
, binutils
+
, gnumake
+
, gnupatch
+
, gnused
+
, gnugrep
+
, gawk
+
, diffutils
+
, findutils
+
, gnutar
+
, gzip
+
}:
+
let
+
pname = "gcc-cxx";
+
version = "4.6.4";
+
+
src = fetchurl {
+
url = "mirror://gnu/gcc/gcc-${version}/gcc-core-${version}.tar.gz";
+
sha256 = "173kdb188qg79pcz073cj9967rs2vzanyjdjyxy9v0xb0p5sad75";
+
};
+
+
ccSrc = fetchurl {
+
url = "mirror://gnu/gcc/gcc-${version}/gcc-g++-${version}.tar.gz";
+
sha256 = "1fqqk5zkmdg4vmqzdmip9i42q6b82i3f6yc0n86n9021cr7ms2k9";
+
};
+
+
gmpVersion = "4.3.2";
+
gmp = fetchurl {
+
url = "mirror://gnu/gmp/gmp-${gmpVersion}.tar.gz";
+
sha256 = "15rwq54fi3s11izas6g985y9jklm3xprfsmym3v1g6xr84bavqvv";
+
};
+
+
mpfrVersion = "2.4.2";
+
mpfr = fetchurl {
+
url = "mirror://gnu/mpfr/mpfr-${mpfrVersion}.tar.gz";
+
sha256 = "0dxn4904dra50xa22hi047lj8kkpr41d6vb9sd4grca880c7wv94";
+
};
+
+
mpcVersion = "1.0.3";
+
mpc = fetchurl {
+
url = "mirror://gnu/mpc/mpc-${mpcVersion}.tar.gz";
+
sha256 = "1hzci2zrrd7v3g1jk35qindq05hbl0bhjcyyisq9z209xb3fqzb1";
+
};
+
+
patches = [
+
# Remove hardcoded NATIVE_SYSTEM_HEADER_DIR
+
./no-system-headers.patch
+
];
+
in
+
bash.runCommand "${pname}-${version}" {
+
inherit pname version;
+
+
nativeBuildInputs = [
+
gcc
+
binutils
+
gnumake
+
gnupatch
+
gnused
+
gnugrep
+
gawk
+
diffutils
+
findutils
+
gnutar
+
gzip
+
];
+
+
passthru.tests.hello-world = result:
+
bash.runCommand "${pname}-simple-program-${version}" {
+
nativeBuildInputs = [ binutils musl result ];
+
} ''
+
cat <<EOF >> test.c
+
#include <stdio.h>
+
int main() {
+
printf("Hello World!\n");
+
return 0;
+
}
+
EOF
+
musl-gcc -o test test.c
+
./test
+
mkdir $out
+
'';
+
+
meta = with lib; {
+
description = "GNU Compiler Collection, version ${version}";
+
homepage = "https://gcc.gnu.org";
+
license = licenses.gpl3Plus;
+
maintainers = teams.minimal-bootstrap.members;
+
platforms = platforms.unix;
+
};
+
} ''
+
# Unpack
+
tar xzf ${src}
+
tar xzf ${ccSrc}
+
tar xzf ${gmp}
+
tar xzf ${mpfr}
+
tar xzf ${mpc}
+
cd gcc-${version}
+
+
ln -s ../gmp-${gmpVersion} gmp
+
ln -s ../mpfr-${mpfrVersion} mpfr
+
ln -s ../mpc-${mpcVersion} mpc
+
+
# Patch
+
${lib.concatMapStringsSep "\n" (f: "patch -Np1 -i ${f}") patches}
+
# doesn't recognise musl
+
sed -i 's|"os/gnu-linux"|"os/generic"|' libstdc++-v3/configure.host
+
+
# Configure
+
export CC="gcc -Wl,-dynamic-linker -Wl,${musl}/lib/libc.so"
+
export CFLAGS_FOR_TARGET="-Wl,-dynamic-linker -Wl,${musl}/lib/libc.so"
+
export C_INCLUDE_PATH="${musl}/include"
+
export CPLUS_INCLUDE_PATH="$C_INCLUDE_PATH"
+
export LIBRARY_PATH="${musl}/lib"
+
+
bash ./configure \
+
--prefix=$out \
+
--build=${buildPlatform.config} \
+
--host=${hostPlatform.config} \
+
--with-native-system-header-dir=${musl}/include \
+
--with-build-sysroot=${musl} \
+
--enable-languages=c,c++ \
+
--disable-bootstrap \
+
--disable-libmudflap \
+
--disable-libstdcxx-pch \
+
--disable-lto \
+
--disable-multilib
+
+
# Build
+
make -j $NIX_BUILD_CORES
+
+
# Install
+
make -j $NIX_BUILD_CORES install
+
''
+5 -5
pkgs/os-specific/linux/minimal-bootstrap/gcc/4.6.nix
···
sha256 = "1fqqk5zkmdg4vmqzdmip9i42q6b82i3f6yc0n86n9021cr7ms2k9";
};
-
patches = [
-
# Remove hardcoded NATIVE_SYSTEM_HEADER_DIR
-
./no-system-headers.patch
-
];
-
gmpVersion = "4.3.2";
gmp = fetchurl {
url = "mirror://gnu/gmp/gmp-${gmpVersion}.tar.gz";
···
url = "mirror://gnu/mpc/mpc-${mpcVersion}.tar.gz";
sha256 = "1hzci2zrrd7v3g1jk35qindq05hbl0bhjcyyisq9z209xb3fqzb1";
};
in
bash.runCommand "${pname}-${version}" {
inherit pname version;
···
sha256 = "1fqqk5zkmdg4vmqzdmip9i42q6b82i3f6yc0n86n9021cr7ms2k9";
};
gmpVersion = "4.3.2";
gmp = fetchurl {
url = "mirror://gnu/gmp/gmp-${gmpVersion}.tar.gz";
···
url = "mirror://gnu/mpc/mpc-${mpcVersion}.tar.gz";
sha256 = "1hzci2zrrd7v3g1jk35qindq05hbl0bhjcyyisq9z209xb3fqzb1";
};
+
+
patches = [
+
# Remove hardcoded NATIVE_SYSTEM_HEADER_DIR
+
./no-system-headers.patch
+
];
in
bash.runCommand "${pname}-${version}" {
inherit pname version;
-32
pkgs/os-specific/linux/minimal-bootstrap/gcc/libstdc++-target.patch
···
-
Patch to make the target libraries 'configure' scripts find the proper CPP.
-
I noticed that building the mingw32 cross compiler.
-
Looking at the build script for mingw in archlinux, I think that only nixos
-
needs this patch. I don't know why.
-
diff --git a/Makefile.in b/Makefile.in
-
index 93f66b6..d691917 100644
-
--- a/Makefile.in
-
+++ b/Makefile.in
-
@@ -266,6 +266,7 @@ BASE_TARGET_EXPORTS = \
-
AR="$(AR_FOR_TARGET)"; export AR; \
-
AS="$(COMPILER_AS_FOR_TARGET)"; export AS; \
-
CC="$(CC_FOR_TARGET) $(XGCC_FLAGS_FOR_TARGET) $$TFLAGS"; export CC; \
-
+ CPP="$(CC_FOR_TARGET) $(XGCC_FLAGS_FOR_TARGET) $$TFLAGS -E"; export CC; \
-
CFLAGS="$(CFLAGS_FOR_TARGET)"; export CFLAGS; \
-
CONFIG_SHELL="$(SHELL)"; export CONFIG_SHELL; \
-
CPPFLAGS="$(CPPFLAGS_FOR_TARGET)"; export CPPFLAGS; \
-
@@ -291,11 +292,13 @@ BASE_TARGET_EXPORTS = \
-
RAW_CXX_TARGET_EXPORTS = \
-
$(BASE_TARGET_EXPORTS) \
-
CXX_FOR_TARGET="$(RAW_CXX_FOR_TARGET)"; export CXX_FOR_TARGET; \
-
- CXX="$(RAW_CXX_FOR_TARGET) $(XGCC_FLAGS_FOR_TARGET) $$TFLAGS"; export CXX;
-
+ CXX="$(RAW_CXX_FOR_TARGET) $(XGCC_FLAGS_FOR_TARGET) $$TFLAGS"; export CXX; \
-
+ CXXCPP="$(RAW_CXX_FOR_TARGET) $(XGCC_FLAGS_FOR_TARGET) $$TFLAGS -E"; export CXX;
-
-
NORMAL_TARGET_EXPORTS = \
-
$(BASE_TARGET_EXPORTS) \
-
- CXX="$(CXX_FOR_TARGET) $(XGCC_FLAGS_FOR_TARGET) $$TFLAGS"; export CXX;
-
+ CXX="$(CXX_FOR_TARGET) $(XGCC_FLAGS_FOR_TARGET) $$TFLAGS"; export CXX; \
-
+ CXXCPP="$(CXX_FOR_TARGET) $(XGCC_FLAGS_FOR_TARGET) $$TFLAGS -E"; export CXX;
-
-
# Where to find GMP
-
HOST_GMPLIBS = @gmplibs@
···
+7 -3
pkgs/os-specific/linux/minimal-bootstrap/musl/default.nix
···
passthru.tests.hello-world = result:
bash.runCommand "${pname}-simple-program-${version}" {
-
nativeBuildInputs = [ gcc binutils ];
} ''
cat <<EOF >> test.c
#include <stdio.h>
···
return 0;
}
EOF
-
gcc -static -B${result}/lib -I${result}/include -o test test.c
./test
mkdir $out
'';
···
bash ./configure \
--prefix=$out \
--build=${buildPlatform.config} \
-
--host=${hostPlatform.config}
# Build
make -j $NIX_BUILD_CORES
# Install
make -j $NIX_BUILD_CORES install
''
···
passthru.tests.hello-world = result:
bash.runCommand "${pname}-simple-program-${version}" {
+
nativeBuildInputs = [ gcc binutils result ];
} ''
cat <<EOF >> test.c
#include <stdio.h>
···
return 0;
}
EOF
+
musl-gcc -o test test.c
./test
mkdir $out
'';
···
bash ./configure \
--prefix=$out \
--build=${buildPlatform.config} \
+
--host=${hostPlatform.config} \
+
--syslibdir=$out/lib \
+
--enable-wrapper
# Build
make -j $NIX_BUILD_CORES
# Install
make -j $NIX_BUILD_CORES install
+
sed -i 's|/bin/sh|${bash}/bin/bash|' $out/bin/*
+
ln -s ../lib/libc.so $out/bin/ldd
''
+3 -3
pkgs/os-specific/linux/nvidia-x11/default.nix
···
# Vulkan developer beta driver
# See here for more information: https://developer.nvidia.com/vulkan-driver
vulkan_beta = generic rec {
-
version = "535.43.10";
persistencedVersion = "535.98";
settingsVersion = "535.98";
-
sha256_64bit = "sha256-J7lyBARBgJERS1tahJJ3Rm3+K2I1dJz7Keabfk52M1Q=";
-
openSha256 = "sha256-L9W0cvtTBweh6P0ikK+LzARnUUXWrPn33TLGzOqwTSU=";
settingsSha256 = "sha256-jCRfeB1w6/dA27gaz6t5/Qo7On0zbAPIi74LYLel34s=";
persistencedSha256 = "sha256-WviDU6B50YG8dO64CGvU3xK8WFUX8nvvVYm/fuGyroM=";
url = "https://developer.nvidia.com/downloads/vulkan-beta-${lib.concatStrings (lib.splitString "." version)}-linux";
···
# Vulkan developer beta driver
# See here for more information: https://developer.nvidia.com/vulkan-driver
vulkan_beta = generic rec {
+
version = "535.43.11";
persistencedVersion = "535.98";
settingsVersion = "535.98";
+
sha256_64bit = "sha256-cL/gnPNqjsj8ZYJP4WmybS2Fnh6EHsUbi4nGlt6Bt00=";
+
openSha256 = "sha256-QzNRwXk6c5iTJD0YGKAlW1swF/PBW/7LFnkllkBEhUU=";
settingsSha256 = "sha256-jCRfeB1w6/dA27gaz6t5/Qo7On0zbAPIi74LYLel34s=";
persistencedSha256 = "sha256-WviDU6B50YG8dO64CGvU3xK8WFUX8nvvVYm/fuGyroM=";
url = "https://developer.nvidia.com/downloads/vulkan-beta-${lib.concatStrings (lib.splitString "." version)}-linux";
+12 -4
pkgs/servers/home-assistant/component-packages.nix
···
"anova" = ps: with ps; [
]; # missing inputs: anova-wifi
"anthemav" = ps: with ps; [
-
]; # missing inputs: anthemav
"anwb_energie" = ps: with ps; [
];
"apache_kafka" = ps: with ps; [
···
python-ecobee-api
];
"ecoforest" = ps: with ps; [
-
]; # missing inputs: pyecoforest
"econet" = ps: with ps; [
pyeconet
];
···
hass-nabucasa
hassil
home-assistant-intents
mutagen
pyturbojpeg
webrtc-noise-gain
-
]; # missing inputs: loqedAPI
"lovelace" = ps: with ps; [
];
"luci" = ps: with ps; [
···
"yandextts" = ps: with ps; [
];
"yardian" = ps: with ps; [
-
]; # missing inputs: pyyardian
"yeelight" = ps: with ps; [
aiohttp-cors
async-upnp-client
···
"android_ip_webcam"
"androidtv"
"androidtv_remote"
"apache_kafka"
"apcupsd"
"api"
···
"eafm"
"easyenergy"
"ecobee"
"econet"
"ecowitt"
"edl21"
···
"logi_circle"
"london_air"
"lookin"
"lovelace"
"luftdaten"
"lutron_caseta"
···
"yamaha_musiccast"
"yandex_transport"
"yandextts"
"yeelight"
"yolink"
"youless"
···
"anova" = ps: with ps; [
]; # missing inputs: anova-wifi
"anthemav" = ps: with ps; [
+
anthemav
+
];
"anwb_energie" = ps: with ps; [
];
"apache_kafka" = ps: with ps; [
···
python-ecobee-api
];
"ecoforest" = ps: with ps; [
+
pyecoforest
+
];
"econet" = ps: with ps; [
pyeconet
];
···
hass-nabucasa
hassil
home-assistant-intents
+
loqedapi
mutagen
pyturbojpeg
webrtc-noise-gain
+
];
"lovelace" = ps: with ps; [
];
"luci" = ps: with ps; [
···
"yandextts" = ps: with ps; [
];
"yardian" = ps: with ps; [
+
pyyardian
+
];
"yeelight" = ps: with ps; [
aiohttp-cors
async-upnp-client
···
"android_ip_webcam"
"androidtv"
"androidtv_remote"
+
"anthemav"
"apache_kafka"
"apcupsd"
"api"
···
"eafm"
"easyenergy"
"ecobee"
+
"ecoforest"
"econet"
"ecowitt"
"edl21"
···
"logi_circle"
"london_air"
"lookin"
+
"loqed"
"lovelace"
"luftdaten"
"lutron_caseta"
···
"yamaha_musiccast"
"yandex_transport"
"yandextts"
+
"yardian"
"yeelight"
"yolink"
"youless"
+2 -2
pkgs/servers/nosql/mongodb/6.0.nix
···
};
in
buildMongoDB {
-
version = "6.0.8";
-
sha256 = "sha256-ZyTE/dZ86kJ+WRSDmc2it4SzAlwjNKhWUyYXpisNIS4=";
patches = [
(fetchpatch {
name = "mongodb-6.1.0-rc-more-specific-cache-alignment-types.patch";
···
};
in
buildMongoDB {
+
version = "6.0.10";
+
sha256 = "sha256-7YJ0Ndyl635ebDWuIGfC5DFIGUXr518ghC/0Qq42HEM=";
patches = [
(fetchpatch {
name = "mongodb-6.1.0-rc-more-specific-cache-alignment-types.patch";
+2 -2
pkgs/servers/sql/mariadb/galera/default.nix
···
stdenv.mkDerivation rec {
pname = "mariadb-galera";
-
version = "26.4.15";
src = fetchFromGitHub {
owner = "codership";
repo = "galera";
rev = "release_${version}";
-
hash = "sha256-9CjxtNvsj2qM65u+R0pJZVwEaTdqtqURrfOGbT+/5ks=";
fetchSubmodules = true;
};
···
stdenv.mkDerivation rec {
pname = "mariadb-galera";
+
version = "26.4.16";
src = fetchFromGitHub {
owner = "codership";
repo = "galera";
rev = "release_${version}";
+
hash = "sha256-bRkXux4vpnUGRYO4dYD6IuWsbMglsMf17tBw6qpvbDg=";
fetchSubmodules = true;
};
+2 -2
pkgs/servers/web-apps/mediawiki/default.nix
···
stdenvNoCC.mkDerivation rec {
pname = "mediawiki";
-
version = "1.40.0";
src = fetchurl {
url = "https://releases.wikimedia.org/mediawiki/${lib.versions.majorMinor version}/mediawiki-${version}.tar.gz";
-
hash = "sha256-6cSHdxhpjwgtgJbYqdFs2a6yHuGYKj2LRgOvfP0VitQ=";
};
postPatch = ''
···
stdenvNoCC.mkDerivation rec {
pname = "mediawiki";
+
version = "1.40.1";
src = fetchurl {
url = "https://releases.wikimedia.org/mediawiki/${lib.versions.majorMinor version}/mediawiki-${version}.tar.gz";
+
hash = "sha256-4F1BneQMatAxRaygfgjPmV0coWZ9l3k7tzlw4sEbCgQ=";
};
postPatch = ''
+2 -2
pkgs/tools/admin/awscli2/default.nix
···
in
with py.pkgs; buildPythonApplication rec {
pname = "awscli2";
-
version = "2.13.23"; # N.B: if you change this, check if overrides are still up-to-date
format = "pyproject";
src = fetchFromGitHub {
owner = "aws";
repo = "aws-cli";
rev = "refs/tags/${version}";
-
hash = "sha256-KFj+Z4Di14umlgzSg7Ip4jg7I6jP5fHTGG7c6+kXbRo=";
};
postPatch = ''
···
in
with py.pkgs; buildPythonApplication rec {
pname = "awscli2";
+
version = "2.13.25"; # N.B: if you change this, check if overrides are still up-to-date
format = "pyproject";
src = fetchFromGitHub {
owner = "aws";
repo = "aws-cli";
rev = "refs/tags/${version}";
+
hash = "sha256-8Euc2yOWv0TRz4SgjRAMdTogGQNE4J/XtadPNe5kKKI=";
};
postPatch = ''
+8
pkgs/tools/misc/goreleaser/default.nix
···
, fetchFromGitHub
, installShellFiles
, buildPackages
}:
buildGoModule rec {
pname = "goreleaser";
···
--fish <(${emulator} $out/bin/goreleaser completion fish) \
--zsh <(${emulator} $out/bin/goreleaser completion zsh)
'';
meta = with lib; {
description = "Deliver Go binaries as fast and easily as possible";
···
, fetchFromGitHub
, installShellFiles
, buildPackages
+
, testers
+
, goreleaser
}:
buildGoModule rec {
pname = "goreleaser";
···
--fish <(${emulator} $out/bin/goreleaser completion fish) \
--zsh <(${emulator} $out/bin/goreleaser completion zsh)
'';
+
+
passthru.tests.version = testers.testVersion {
+
package = goreleaser;
+
command = "goreleaser -v";
+
inherit version;
+
};
meta = with lib; {
description = "Deliver Go binaries as fast and easily as possible";
+3 -2
pkgs/tools/misc/moar/default.nix
···
buildGoModule rec {
pname = "moar";
-
version = "1.17.0";
src = fetchFromGitHub {
owner = "walles";
repo = pname;
rev = "v${version}";
-
hash = "sha256-nLXHAIR+4w6fDR69fSANBqlD0ZTc7emNIv5QTp+pdYo=";
};
vendorHash = "sha256-aFCv6VxHD1bOLhCHXhy4ubik8Z9uvU6AeqcMqIZI2Oo=";
···
description = "Nice-to-use pager for humans";
homepage = "https://github.com/walles/moar";
license = licenses.bsd2WithViews;
maintainers = with maintainers; [ foo-dogsquared ];
};
}
···
buildGoModule rec {
pname = "moar";
+
version = "1.17.1";
src = fetchFromGitHub {
owner = "walles";
repo = pname;
rev = "v${version}";
+
hash = "sha256-ifpPShDI0JNkFXrrZEsQ+bvHMe7AgaZm30dnvsj8vDA=";
};
vendorHash = "sha256-aFCv6VxHD1bOLhCHXhy4ubik8Z9uvU6AeqcMqIZI2Oo=";
···
description = "Nice-to-use pager for humans";
homepage = "https://github.com/walles/moar";
license = licenses.bsd2WithViews;
+
mainProgram = "moar";
maintainers = with maintainers; [ foo-dogsquared ];
};
}
+2 -2
pkgs/tools/misc/rshim-user-space/default.nix
···
stdenv.mkDerivation rec {
pname = "rshim-user-space";
-
version = "2.0.9";
src = fetchFromGitHub {
owner = "Mellanox";
repo = pname;
rev = "rshim-${version}";
-
hash = "sha256-B85nhZRzcvTqwjfnVAeLNYti4Y/mprJsxBAMd+MwH84=";
};
nativeBuildInputs = [
···
stdenv.mkDerivation rec {
pname = "rshim-user-space";
+
version = "2.0.11";
src = fetchFromGitHub {
owner = "Mellanox";
repo = pname;
rev = "rshim-${version}";
+
hash = "sha256-LbAs4IFfYT6OhrtwRXmuQR9rD7ulmmUB20Au5fO8j9w=";
};
nativeBuildInputs = [
+3 -3
pkgs/tools/misc/upterm/default.nix
···
buildGoModule rec {
pname = "upterm";
-
version = "0.10.0";
src = fetchFromGitHub {
owner = "owenthereal";
repo = "upterm";
rev = "v${version}";
-
hash = "sha256-wjbptcGy3wOZPm/11El7Xqz6NrR8G19V9zfU5pKFGuk=";
};
-
vendorHash = null;
subPackages = [ "cmd/upterm" "cmd/uptermd" ];
···
buildGoModule rec {
pname = "upterm";
+
version = "0.12.0";
src = fetchFromGitHub {
owner = "owenthereal";
repo = "upterm";
rev = "v${version}";
+
hash = "sha256-Ljiy23qZTe81qaRTgrpuAdZqdOT8t8+cTqXLpKo5yFc=";
};
+
vendorHash = "sha256-hXmcgLNzVkU3RC3rj9I+/GlXyxbvPFsoFvVSLJTUHMM=";
subPackages = [ "cmd/upterm" "cmd/uptermd" ];
+3 -3
pkgs/tools/networking/grpcurl/default.nix
···
buildGoModule rec {
pname = "grpcurl";
-
version = "1.8.7";
src = fetchFromGitHub {
owner = "fullstorydev";
repo = "grpcurl";
rev = "v${version}";
-
sha256 = "sha256-03Uo40kz9CNK3lC91J8smDlviRNQymP95DWmIMwZF/E=";
};
subPackages = [ "cmd/grpcurl" ];
-
vendorHash = "sha256-xe3xb1+qa53Xph+CLcUqxJYeD9d4kBaY6SJfc7bhjQY=";
ldflags = [ "-s" "-w" "-X main.version=${version}" ];
···
buildGoModule rec {
pname = "grpcurl";
+
version = "1.8.8";
src = fetchFromGitHub {
owner = "fullstorydev";
repo = "grpcurl";
rev = "v${version}";
+
sha256 = "sha256-/GPFUMN6NQAoKOYJ6j9j0GmyEcYtYdOB7B8v2gNpNm8=";
};
subPackages = [ "cmd/grpcurl" ];
+
vendorHash = "sha256-8mGlmWuWae/NQ1aR0KVj0XS7rqROCs0PBDUkMAKijYU=";
ldflags = [ "-s" "-w" "-X main.version=${version}" ];
-8
pkgs/tools/networking/openssh/common.nix
···
# See discussion in https://github.com/NixOS/nixpkgs/pull/16966
./dont_create_privsep_path.patch
-
-
# Pull upstream zlib-1.3 support.
-
# The patch changes configure.ac, uses autoreconfHook.
-
(fetchpatch {
-
name = "zlib-1.3.patch";
-
url = "https://github.com/openssh/openssh-portable/commit/cb4ed12ffc332d1f72d054ed92655b5f1c38f621.patch";
-
hash = "sha256-3Gx0/I2n9/XaWCIefVYtvk5f+VgH6MlhMBse+PMyf34=";
-
})
] ++ extraPatches;
postPatch =
···
# See discussion in https://github.com/NixOS/nixpkgs/pull/16966
./dont_create_privsep_path.patch
] ++ extraPatches;
postPatch =
+6 -6
pkgs/tools/networking/openssh/default.nix
···
{
openssh = common rec {
pname = "openssh";
-
version = "9.4p1";
src = fetchurl {
url = "mirror://openbsd/OpenSSH/portable/openssh-${version}.tar.gz";
-
hash = "sha256-Ngj9kIjbIWPOs+YAyFq3nQ3j0iHlkZLqGSPiMmOGaoU=";
};
extraPatches = [ ./ssh-keysign-8.5.patch ];
···
openssh_hpn = common rec {
pname = "openssh-with-hpn";
-
version = "9.4p1";
extraDesc = " with high performance networking patches";
src = fetchurl {
url = "mirror://openbsd/OpenSSH/portable/openssh-${version}.tar.gz";
-
hash = "sha256-Ngj9kIjbIWPOs+YAyFq3nQ3j0iHlkZLqGSPiMmOGaoU=";
};
extraPatches = let url = "https://raw.githubusercontent.com/freebsd/freebsd-ports/700625bcd86b74cf3fb9536aeea250d7f8cd1fd5/security/openssh-portable/files/extra-patch-hpn"; in
···
openssh_gssapi = common rec {
pname = "openssh-with-gssapi";
-
version = "9.4p1";
extraDesc = " with GSSAPI support";
src = fetchurl {
url = "mirror://openbsd/OpenSSH/portable/openssh-${version}.tar.gz";
-
sha256 = "sha256-Ngj9kIjbIWPOs+YAyFq3nQ3j0iHlkZLqGSPiMmOGaoU=";
};
extraPatches = [
···
{
openssh = common rec {
pname = "openssh";
+
version = "9.5p1";
src = fetchurl {
url = "mirror://openbsd/OpenSSH/portable/openssh-${version}.tar.gz";
+
hash = "sha256-8Cbnt5un+1QPdRgq+W3IqPHbOV+SK7yfbKYDZyaGCGs=";
};
extraPatches = [ ./ssh-keysign-8.5.patch ];
···
openssh_hpn = common rec {
pname = "openssh-with-hpn";
+
version = "9.5p1";
extraDesc = " with high performance networking patches";
src = fetchurl {
url = "mirror://openbsd/OpenSSH/portable/openssh-${version}.tar.gz";
+
hash = "sha256-8Cbnt5un+1QPdRgq+W3IqPHbOV+SK7yfbKYDZyaGCGs=";
};
extraPatches = let url = "https://raw.githubusercontent.com/freebsd/freebsd-ports/700625bcd86b74cf3fb9536aeea250d7f8cd1fd5/security/openssh-portable/files/extra-patch-hpn"; in
···
openssh_gssapi = common rec {
pname = "openssh-with-gssapi";
+
version = "9.5p1";
extraDesc = " with GSSAPI support";
src = fetchurl {
url = "mirror://openbsd/OpenSSH/portable/openssh-${version}.tar.gz";
+
hash = "sha256-8Cbnt5un+1QPdRgq+W3IqPHbOV+SK7yfbKYDZyaGCGs=";
};
extraPatches = [
+3 -3
pkgs/tools/networking/sing-box/default.nix
···
buildGoModule rec {
pname = "sing-box";
-
version = "1.5.1";
src = fetchFromGitHub {
owner = "SagerNet";
repo = pname;
rev = "v${version}";
-
hash = "sha256-Vc7TLkADOlMs4nMRCI2DAd4h40eYhcOP/EzM7uWqZ+A=";
};
-
vendorHash = "sha256-bcjhBAW4/NLQ/l7gmD9169DCYJwDH1j0vtEShJqKRiw=";
tags = [
"with_quic"
···
buildGoModule rec {
pname = "sing-box";
+
version = "1.5.2";
src = fetchFromGitHub {
owner = "SagerNet";
repo = pname;
rev = "v${version}";
+
hash = "sha256-ZDx9ZiYhqznDU4PvWWBxaK5/fRPW9cnLrzdg5fmTfSA=";
};
+
vendorHash = "sha256-MRGet2P1QLgrm649+if7ROhuPHhXKYp6ACK86LvbFN0=";
tags = [
"with_quic"
+3 -3
pkgs/tools/system/netdata/default.nix
···
stdenv.mkDerivation rec {
# Don't forget to update go.d.plugin.nix as well
-
version = "1.42.2";
pname = "netdata";
src = fetchFromGitHub {
···
repo = "netdata";
rev = "v${version}";
hash = if withCloudUi
-
then "sha256-8L8PhPgNIHvw+Dcx2D6OE8fp2+GEYOc9wEIoPJSqXME="
-
else "sha256-J/pKKxTNoSwvsyVaRsnazQQqu2C8zx1QEAkB+gkR5lU=";
fetchSubmodules = true;
# Remove v2 dashboard distributed under NCUL1. Make sure an empty
···
stdenv.mkDerivation rec {
# Don't forget to update go.d.plugin.nix as well
+
version = "1.42.4";
pname = "netdata";
src = fetchFromGitHub {
···
repo = "netdata";
rev = "v${version}";
hash = if withCloudUi
+
then "sha256-MaU9sOQD+Y03M+yoSWt1GuV+DrBlD7+r/Qm2JJ9s8EU="
+
else "sha256-41QntBt0MoO1hAsDb8LhHgvvNMzt9R1ZdgiPaR7NrPU=";
fetchSubmodules = true;
# Remove v2 dashboard distributed under NCUL1. Make sure an empty
+3 -3
pkgs/tools/system/netdata/go.d.plugin.nix
···
buildGoModule rec {
pname = "netdata-go-plugins";
-
version = "0.54.1";
src = fetchFromGitHub {
owner = "netdata";
repo = "go.d.plugin";
rev = "v${version}";
-
hash = "sha256-3cBgXkvXhSTwQ6qbUbH1nOba5QkjSKtzi2rb+OY06jE=";
};
-
vendorHash = "sha256-DLRcS8wqnwGRLEeMqWj5SfUvE3fz1hty9jItNfmCdRw=";
doCheck = false;
···
buildGoModule rec {
pname = "netdata-go-plugins";
+
version = "0.56.1";
src = fetchFromGitHub {
owner = "netdata";
repo = "go.d.plugin";
rev = "v${version}";
+
hash = "sha256-OA//50j7MWCNyQ85DzSkk0kI8XonBOMpEmsIJ7QLbHY=";
};
+
vendorHash = "sha256-1ir6paAz4NyJDPivBrHyiTrNwJMJ00Q4/sWBLBnwqPM=";
doCheck = false;
+2 -2
pkgs/tools/text/goawk/default.nix
···
buildGoModule rec {
pname = "goawk";
-
version = "1.24.0";
src = fetchFromGitHub {
owner = "benhoyt";
repo = "goawk";
rev = "v${version}";
-
hash = "sha256-pce7g0MI23244t5ZK4UDOfQNt1m3tRpCahne0s+NRRE=";
};
vendorHash = null;
···
buildGoModule rec {
pname = "goawk";
+
version = "1.25.0";
src = fetchFromGitHub {
owner = "benhoyt";
repo = "goawk";
rev = "v${version}";
+
hash = "sha256-vxDBtYrfSmYE2mCqhepeLr4u+zLfHxCrYSXGq05CEYQ=";
};
vendorHash = null;
+3 -3
pkgs/tools/text/mdbook-i18n-helpers/default.nix
···
rustPlatform.buildRustPackage rec {
pname = "mdbook-i18n-helpers";
-
version = "0.2.2";
src = fetchFromGitHub {
owner = "google";
repo = "mdbook-i18n-helpers";
rev = "refs/tags/${version}";
-
hash = "sha256-ea/z5+QAvQVacP2Yxz9hGh8REjsNbp/rfkDV0f9KyPg=";
};
-
cargoHash = "sha256-4Bf6R8sVwJCFiF+j+WePxWy43KuArIuMCzXKc58+TAw=";
meta = with lib; {
description = "Helpers for a mdbook i18n workflow based on Gettext";
···
rustPlatform.buildRustPackage rec {
pname = "mdbook-i18n-helpers";
+
version = "0.2.4";
src = fetchFromGitHub {
owner = "google";
repo = "mdbook-i18n-helpers";
rev = "refs/tags/${version}";
+
hash = "sha256-TxSALv/uqRFdv4JZ8BCiAlirMcizGRkw0YxMCBVkgo4=";
};
+
cargoHash = "sha256-BhaSK2A/z05a75dEx8c4RHKau1HRJabOcQ6/eLvcdio=";
meta = with lib; {
description = "Helpers for a mdbook i18n workflow based on Gettext";
+5 -5
pkgs/tools/video/recyclarr/default.nix
···
or (throw "Unsupported system: ${stdenv.hostPlatform.system}");
hash = {
-
x64-linux_hash = "sha256-vexo2zx6trv5Q8JifLQG93ZNaAY6ym0ShI81HjBUqTs=";
-
arm64-linux_hash = "sha256-oLtXFkE8b9dxmTwttjJbBSOhxkwInGLpD+WNjDy1ktM=";
-
x64-osx_hash = "sha256-fVIGBuOhwaWttmAGECVm3i4GPKer37mRq6cBz1BcsBc=";
-
arm64-osx_hash = "sha256-eD74AcnRxFgD9PvoPYTBqI0/7MGCqu1I2sq8L1XrmMQ=";
}."${arch}-${os}_hash";
libPath = {
···
in
stdenv.mkDerivation rec {
pname = "recyclarr";
-
version = "5.3.1";
src = fetchurl {
url = "https://github.com/recyclarr/recyclarr/releases/download/v${version}/recyclarr-${os}-${arch}.tar.xz";
···
or (throw "Unsupported system: ${stdenv.hostPlatform.system}");
hash = {
+
x64-linux_hash = "sha256-4xBT4IuonAQPSPKedecNd6YjoOh6pe3nCXMXpNBWP1g=";
+
arm64-linux_hash = "sha256-4s/W1Xz0M1L6xm79AJy836OhNmW0Z4YoRsc7Qd5EwaM=";
+
x64-osx_hash = "sha256-IQgKbZrINt6K3ezS+XjUEYoDIYtngvo++RTpCk+SeSc=";
+
arm64-osx_hash = "sha256-9vHzGAH+fbn+x3lm3/UuNfd0Fv8s2MPPGSe5VnaASeg=";
}."${arch}-${os}_hash";
libPath = {
···
in
stdenv.mkDerivation rec {
pname = "recyclarr";
+
version = "6.0.1";
src = fetchurl {
url = "https://github.com/recyclarr/recyclarr/releases/download/v${version}/recyclarr-${os}-${arch}.tar.xz";
+2 -2
pkgs/top-level/all-packages.nix
···
lensfun = callPackage ../development/libraries/lensfun { };
lesstif = callPackage ../development/libraries/lesstif { };
leveldb = callPackage ../development/libraries/leveldb { };
···
img-cat = callPackage ../applications/graphics/img-cat { };
imgp = python3Packages.callPackage ../applications/graphics/imgp { };
-
-
imhex = callPackage ../applications/editors/imhex { };
inframap = callPackage ../applications/networking/cluster/inframap { };
···
lensfun = callPackage ../development/libraries/lensfun { };
+
lesbar = callPackage ../applications/window-managers/lesbar { };
+
lesstif = callPackage ../development/libraries/lesstif { };
leveldb = callPackage ../development/libraries/leveldb { };
···
img-cat = callPackage ../applications/graphics/img-cat { };
imgp = python3Packages.callPackage ../applications/graphics/imgp { };
inframap = callPackage ../applications/networking/cluster/inframap { };
-2
pkgs/top-level/linux-kernels.nix
···
kernelPatches = [
kernelPatches.bridge_stp_helper
kernelPatches.request_key_helper
-
kernelPatches.dell_xps_regression
];
};
···
kernelPatches = [
kernelPatches.bridge_stp_helper
kernelPatches.request_key_helper
-
kernelPatches.dell_xps_regression
];
};
···
kernelPatches = [
kernelPatches.bridge_stp_helper
kernelPatches.request_key_helper
];
};
···
kernelPatches = [
kernelPatches.bridge_stp_helper
kernelPatches.request_key_helper
];
};
+12
pkgs/top-level/python-packages.nix
···
ansiwrap = callPackage ../development/python-modules/ansiwrap { };
anthropic = callPackage ../development/python-modules/anthropic { };
antlr4-python3-runtime = callPackage ../development/python-modules/antlr4-python3-runtime {
···
flask-mongoengine = callPackage ../development/python-modules/flask-mongoengine { };
flask-openid = callPackage ../development/python-modules/flask-openid { };
flask-paginate = callPackage ../development/python-modules/flask-paginate { };
···
loopy = callPackage ../development/python-modules/loopy { };
looseversion = callPackage ../development/python-modules/looseversion { };
losant-rest = callPackage ../development/python-modules/losant-rest { };
···
pyeclib = callPackage ../development/python-modules/pyeclib { };
pyeconet = callPackage ../development/python-modules/pyeconet { };
pyecowitt = callPackage ../development/python-modules/pyecowitt { };
···
pyyaml-include = callPackage ../development/python-modules/pyyaml-include { };
pyzerproc = callPackage ../development/python-modules/pyzerproc { };
pyzmq = callPackage ../development/python-modules/pyzmq { };
···
sslib = callPackage ../development/python-modules/sslib { };
stack-data = callPackage ../development/python-modules/stack-data { };
stanza = callPackage ../development/python-modules/stanza { };
···
ansiwrap = callPackage ../development/python-modules/ansiwrap { };
+
anthemav = callPackage ../development/python-modules/anthemav { };
+
anthropic = callPackage ../development/python-modules/anthropic { };
antlr4-python3-runtime = callPackage ../development/python-modules/antlr4-python3-runtime {
···
flask-mongoengine = callPackage ../development/python-modules/flask-mongoengine { };
+
flask-mysqldb = callPackage ../development/python-modules/flask-mysqldb { };
+
flask-openid = callPackage ../development/python-modules/flask-openid { };
flask-paginate = callPackage ../development/python-modules/flask-paginate { };
···
loopy = callPackage ../development/python-modules/loopy { };
looseversion = callPackage ../development/python-modules/looseversion { };
+
+
loqedapi = callPackage ../development/python-modules/loqedapi { };
losant-rest = callPackage ../development/python-modules/losant-rest { };
···
pyeclib = callPackage ../development/python-modules/pyeclib { };
+
pyecoforest = callPackage ../development/python-modules/pyecoforest { };
+
pyeconet = callPackage ../development/python-modules/pyeconet { };
pyecowitt = callPackage ../development/python-modules/pyecowitt { };
···
pyyaml-include = callPackage ../development/python-modules/pyyaml-include { };
+
pyyardian = callPackage ../development/python-modules/pyyardian { };
+
pyzerproc = callPackage ../development/python-modules/pyzerproc { };
pyzmq = callPackage ../development/python-modules/pyzmq { };
···
sslib = callPackage ../development/python-modules/sslib { };
stack-data = callPackage ../development/python-modules/stack-data { };
+
+
stanio = callPackage ../development/python-modules/stanio { };
stanza = callPackage ../development/python-modules/stanza { };