Merge staging-next into staging

Changed files
+813 -296
nixos
pkgs
applications
audio
ledfx
networking
browsers
mullvad-browser
tor-browser
cluster
cloudfoundry-cli
fluxcd
pluto
flexget
version-management
git-hound
video
virtualization
cntr
podman-tui
by-name
do
doublecmd
hi
hifile
ov
overskride
ra
raspberrypi-eeprom
sp
spacedrive
data
fonts
sketchybar-app-font
desktops
lomiri
services
mate
mate-control-center
development
libraries
frozen
glfw
libsidplayfp
pdfhummus
uthenticode
node-packages
python-modules
aioairzone-cloud
aioskybell
apprise
borb
django-filter
elgato
google-generativeai
hvplot
internetarchive
losant-rest
ptpython
pyatmo
youtube-transcript-api
zha-quirks
skaware-packages
s6
s6-dns
s6-networking
skalibs
tipidee
tools
analysis
checkov
svlint
github-copilot-intellij-agent
language-servers
rust
cargo-mobile2
sea-orm-cli
games
0verkill
fheroes2
katago
os-specific
linux
servers
home-assistant
http
lighttpd
nosql
ferretdb
web-apps
pict-rs
tools
admin
qovery-cli
filesystems
dwarfs
graphics
unpaper
misc
ipxe
rpi-imager
rtx
sqlite3-to-mysql
networking
ooniprobe-cli
package-management
security
cnquery
fwknop
goverview
text
amber
top-level
+1
nixos/release-combined.nix
···
(onSystems ["x86_64-linux"] "nixos.tests.installer.btrfsSubvols")
(onSystems ["x86_64-linux"] "nixos.tests.installer.luksroot")
(onSystems ["x86_64-linux"] "nixos.tests.installer.lvm")
+
(onSystems ["x86_64-linux"] "nixos.tests.installer.separateBootZfs")
(onSystems ["x86_64-linux"] "nixos.tests.installer.separateBootFat")
(onSystems ["x86_64-linux"] "nixos.tests.installer.separateBoot")
(onSystems ["x86_64-linux"] "nixos.tests.installer.simpleLabels")
+1 -3
nixos/tests/ft2-clone.nix
···
maintainers = [ fgaz ];
};
-
nodes.machine = { config, pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
imports = [
./common/x11.nix
];
-
services.xserver.enable = true;
sound.enable = true;
environment.systemPackages = [ pkgs.ft2-clone ];
};
···
machine.screenshot("screen")
'';
})
-
+1
nixos/tests/installer-systemd-stage-1.nix
···
# lvm
separateBoot
separateBootFat
+
separateBootZfs
simple
simpleLabels
simpleProvided
+75 -11
nixos/tests/installer.nix
···
'';
};
+
# Same as the previous, but with ZFS /boot.
+
separateBootZfs = makeInstallerTest "separateBootZfs" {
+
extraInstallerConfig = {
+
boot.supportedFilesystems = [ "zfs" ];
+
};
+
+
extraConfig = ''
+
# Using by-uuid overrides the default of by-id, and is unique
+
# to the qemu disks, as they don't produce by-id paths for
+
# some reason.
+
boot.zfs.devNodes = "/dev/disk/by-uuid/";
+
networking.hostId = "00000000";
+
'';
+
+
createPartitions = ''
+
machine.succeed(
+
"flock /dev/vda parted --script /dev/vda -- mklabel msdos"
+
+ " mkpart primary ext2 1M 256MB" # /boot
+
+ " mkpart primary linux-swap 256MB 1280M"
+
+ " mkpart primary ext2 1280M -1s", # /
+
"udevadm settle",
+
+
"mkswap /dev/vda2 -L swap",
+
"swapon -L swap",
+
+
"mkfs.ext4 -L nixos /dev/vda3",
+
"mount LABEL=nixos /mnt",
+
+
# Use as many ZFS features as possible to verify that GRUB can handle them
+
"zpool create"
+
" -o compatibility=grub2"
+
" -O utf8only=on"
+
" -O normalization=formD"
+
" -O compression=lz4" # Activate the lz4_compress feature
+
" -O xattr=sa"
+
" -O acltype=posixacl"
+
" bpool /dev/vda1",
+
"zfs create"
+
" -o recordsize=1M" # Prepare activating the large_blocks feature
+
" -o mountpoint=legacy"
+
" -o relatime=on"
+
" -o quota=1G"
+
" -o filesystem_limit=100" # Activate the filesystem_limits features
+
" bpool/boot",
+
+
# Snapshotting the top-level dataset would trigger a bug in GRUB2: https://github.com/openzfs/zfs/issues/13873
+
"zfs snapshot bpool/boot@snap-1", # Prepare activating the livelist and bookmarks features
+
"zfs clone bpool/boot@snap-1 bpool/test", # Activate the livelist feature
+
"zfs bookmark bpool/boot@snap-1 bpool/boot#bookmark", # Activate the bookmarks feature
+
"zpool checkpoint bpool", # Activate the zpool_checkpoint feature
+
"mkdir -p /mnt/boot",
+
"mount -t zfs bpool/boot /mnt/boot",
+
"touch /mnt/boot/empty", # Activate zilsaxattr feature
+
"dd if=/dev/urandom of=/mnt/boot/test bs=1M count=1", # Activate the large_blocks feature
+
+
# Print out all enabled and active ZFS features (and some other stuff)
+
"sync /mnt/boot",
+
"zpool get all bpool >&2",
+
+
# Abort early if GRUB2 doesn't like the disks
+
"grub-probe --target=device /mnt/boot >&2",
+
)
+
'';
+
+
# umount & export bpool before shutdown
+
# this is a fix for "cannot import 'bpool': pool was previously in use from another system."
+
postInstallCommands = ''
+
machine.succeed("umount /mnt/boot")
+
machine.succeed("zpool export bpool")
+
'';
+
};
+
# zfs on / with swap
zfsroot = makeInstallerTest "zfs-root" {
extraInstallerConfig = {
···
createPartitions = ''
machine.succeed(
"flock /dev/vda parted --script /dev/vda -- mklabel msdos"
-
+ " mkpart primary 1M 100MB" # bpool
+
+ " mkpart primary 1M 100MB" # /boot
+ " mkpart primary linux-swap 100M 1024M"
+ " mkpart primary 1024M -1s", # rpool
"udevadm settle",
···
"zfs create -o mountpoint=legacy rpool/root/usr",
"mkdir /mnt/usr",
"mount -t zfs rpool/root/usr /mnt/usr",
-
"zpool create -o compatibility=grub2 bpool /dev/vda1",
-
"zfs create -o mountpoint=legacy bpool/boot",
+
"mkfs.vfat -n BOOT /dev/vda1",
"mkdir /mnt/boot",
-
"mount -t zfs bpool/boot /mnt/boot",
+
"mount LABEL=BOOT /mnt/boot",
"udevadm settle",
)
-
'';
-
-
# umount & export bpool before shutdown
-
# this is a fix for "cannot import 'bpool': pool was previously in use from another system."
-
postInstallCommands = ''
-
machine.succeed("umount /mnt/boot")
-
machine.succeed("zpool export bpool")
'';
};
+25 -2
nixos/tests/mate.nix
···
hardware.pulseaudio.enable = true;
};
+
enableOCR = true;
+
testScript = { nodes, ... }:
let
user = nodes.machine.users.users.alice;
+
env = "DISPLAY=:0.0 DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/${toString user.uid}/bus";
in
''
with subtest("Wait for login"):
···
machine.wait_for_window("Bottom Panel")
machine.wait_until_succeeds("pgrep caja")
machine.wait_for_window("Caja")
+
machine.wait_for_text('(Applications|Places|System)')
+
machine.wait_for_text('(Computer|Home|Trash)')
+
+
with subtest("Lock the screen"):
+
machine.wait_until_succeeds("su - ${user.name} -c '${env} mate-screensaver-command -q' | grep 'The screensaver is inactive'")
+
machine.succeed("su - ${user.name} -c '${env} mate-screensaver-command -l >&2 &'")
+
machine.wait_until_succeeds("su - ${user.name} -c '${env} mate-screensaver-command -q' | grep 'The screensaver is active'")
+
machine.sleep(2)
+
machine.send_chars("${user.password}", delay=0.2)
+
machine.wait_for_text("${user.description}")
+
machine.screenshot("screensaver")
+
machine.send_chars("\n")
+
machine.wait_until_succeeds("su - ${user.name} -c '${env} mate-screensaver-command -q' | grep 'The screensaver is inactive'")
+
+
with subtest("Open MATE control center"):
+
machine.succeed("su - ${user.name} -c '${env} mate-control-center >&2 &'")
+
machine.wait_for_window("Control Center")
+
machine.wait_for_text('(Groups|Administration|Hardware)')
with subtest("Open MATE terminal"):
-
machine.succeed("su - ${user.name} -c 'DISPLAY=:0.0 mate-terminal >&2 &'")
+
machine.succeed("su - ${user.name} -c '${env} mate-terminal >&2 &'")
machine.wait_for_window("Terminal")
-
machine.sleep(20)
+
+
with subtest("Check if MATE has ever coredumped"):
+
machine.fail("coredumpctl --json=short | grep -E 'mate|marco|caja'")
machine.screenshot("screen")
'';
})
+1
nixos/tests/zfs.nix
···
enableSystemdStage1 = true;
};
+
installerBoot = (import ./installer.nix { }).separateBootZfs;
installer = (import ./installer.nix { }).zfsroot;
expand-partitions = makeTest {
+5 -3
pkgs/applications/audio/ledfx/default.nix
···
python3.pkgs.buildPythonPackage rec {
pname = "ledfx";
-
version = "2.0.80";
+
version = "2.0.86";
pyproject= true;
src = fetchPypi {
inherit pname version;
-
hash = "sha256-vwLk3EpXqUSAwzY2oX0ZpXrmH2cT0GdYdL/Mifav6mU=";
+
hash = "sha256-miOGMsrvK3A3SYnd+i/lqB+9GOHtO4F3RW8NkxDgFqU=";
};
postPatch = ''
substituteInPlace setup.py \
--replace "'rpi-ws281x>=4.3.0; platform_system == \"Linux\"'," "" \
-
--replace "sentry-sdk==1.14.0" "sentry-sdk" \
+
--replace "sentry-sdk==1.38.0" "sentry-sdk" \
--replace "~=" ">="
'';
···
cython
flux-led
icmplib
+
mss
multidict
numpy
openrgb-python
paho-mqtt
pillow
psutil
+
pybase64
pyserial
pystray
python-mbedtls
+2 -2
pkgs/applications/networking/browsers/mullvad-browser/default.nix
···
++ lib.optionals mediaSupport [ ffmpeg ]
);
-
version = "13.0.6";
+
version = "13.0.7";
sources = {
x86_64-linux = fetchurl {
···
"https://tor.eff.org/dist/mullvadbrowser/${version}/mullvad-browser-linux-x86_64-${version}.tar.xz"
"https://tor.calyxinstitute.org/dist/mullvadbrowser/${version}/mullvad-browser-linux-x86_64-${version}.tar.xz"
];
-
hash = "sha256-+CLMAXdyqp0HLe68lzp7p54n2HGZQPwZGckwVxOg4Pw=";
+
hash = "sha256-8x0Qa+NasMq1JdrVnCWlCyPb+5UpJXK1VLFoY9lx+8Q=";
};
};
+3 -3
pkgs/applications/networking/browsers/tor-browser/default.nix
···
++ lib.optionals mediaSupport [ ffmpeg ]
);
-
version = "13.0.6";
+
version = "13.0.8";
sources = {
x86_64-linux = fetchurl {
···
"https://tor.eff.org/dist/torbrowser/${version}/tor-browser-linux-x86_64-${version}.tar.xz"
"https://tor.calyxinstitute.org/dist/torbrowser/${version}/tor-browser-linux-x86_64-${version}.tar.xz"
];
-
hash = "sha256-7T+PJEsGIge+JJOz6GiG8971lnnbQL2jdHfldNmT4jQ=";
+
hash = "sha256-eD+c4ACgWajmfMiqqk5HC30uJiqfNqvASepVoO7ox2w=";
};
i686-linux = fetchurl {
···
"https://tor.eff.org/dist/torbrowser/${version}/tor-browser-linux-i686-${version}.tar.xz"
"https://tor.calyxinstitute.org/dist/torbrowser/${version}/tor-browser-linux-i686-${version}.tar.xz"
];
-
hash = "sha256-nPhzUu1BYNij3toNRUFFxNVLZ2JnzDBFVlzo4cyskjY=";
+
hash = "sha256-ZQ0tSPyfzBWy27lX5+zI3Nuqqz5ZUv1T6lzapvYHc7A=";
};
};
+3 -3
pkgs/applications/networking/cluster/cloudfoundry-cli/default.nix
···
buildGoModule rec {
pname = "cloudfoundry-cli";
-
version = "8.7.6";
+
version = "8.7.7";
src = fetchFromGitHub {
owner = "cloudfoundry";
repo = "cli";
rev = "v${version}";
-
sha256 = "sha256-QvQqFl8RcVO+oNKhAeKkX0bmjv8qrtiR2gQ5ufpfMBo=";
+
sha256 = "sha256-WPZLINtjH+VuWlXX1XNeSuasxn+UI89Klrehg806kvI=";
};
-
vendorHash = "sha256-MBV8GIxgAHFEturqlQgBuzGUQcRdMsYU7c1kcTlZf9I=";
+
vendorHash = "sha256-ZQSbupcY+Uc8tYWZY/hYBaeaNxYuSOOIo0v9e5Ax0m0=";
subPackages = [ "." ];
+4 -4
pkgs/applications/networking/cluster/fluxcd/default.nix
···
}:
let
-
version = "2.2.1";
-
sha256 = "12zhg5j77jhn8v0c5mz6232bcx8dqn4dg32x89kqx8znkygd5a42";
-
manifestsSha256 = "1hwcy64i6fg0qq0gzsxba6k7hak0ngqgi627680pk1daykfic7wv";
+
version = "2.2.2";
+
sha256 = "0d4sf1b0dddcarngr4dllhbbyjajpf1byv9cf7nx9040i80vk56p";
+
manifestsSha256 = "1ixdzgaw3mrkwbazfbx0vc04z4rsyyyj5dsck15dv5kkvhi304lg";
manifests = fetchzip {
url =
···
inherit sha256;
};
-
vendorHash = "sha256-QElnhoWNp17SdRJJFZ+FpLS1NzGjIXaP0dYefzwBNkI=";
+
vendorHash = "sha256-jbhxSeLjgNmj2wCZao4DkQ57GvpYKlUyy7xdNKN1nWc=";
postUnpack = ''
cp -r ${manifests} source/cmd/flux/manifests
+2 -2
pkgs/applications/networking/cluster/pluto/default.nix
···
buildGoModule rec {
pname = "pluto";
-
version = "5.19.0";
+
version = "5.19.1";
src = fetchFromGitHub {
owner = "FairwindsOps";
repo = "pluto";
rev = "v${version}";
-
hash = "sha256-sudq7HILNZSGTwQgggSovrXAaY7VSTw6IJn+mIYwjv8=";
+
hash = "sha256-6TOHDjR5sFaIeR6Zuf4azQAIgUyev7vdlAKB7YNk8R0=";
};
vendorHash = "sha256-8ZOYp/vM16PugmE+3QK7ZRDwIwRCMEwD0NRyiOBlh14=";
+4 -3
pkgs/applications/networking/flexget/default.nix
···
in
python.pkgs.buildPythonApplication rec {
pname = "flexget";
-
version = "3.10.6";
-
format = "pyproject";
+
version = "3.11.2";
+
pyproject = true;
# Fetch from GitHub in order to use `requirements.in`
src = fetchFromGitHub {
owner = "Flexget";
repo = "Flexget";
rev = "refs/tags/v${version}";
-
hash = "sha256-cDfeSCG+L8ALCC2CdfKIPzqMrWtwwN6KSvZS5n8rdXQ=";
+
hash = "sha256-IM3qVn+XAv0EvRYc7ujMU4NPly5IaxF0efHAgI/lyms=";
};
postPatch = ''
···
loguru
more-itertools
packaging
+
pendulum
psutil
pynzb
pyrsistent
+16 -4
pkgs/applications/version-management/git-hound/default.nix
···
{ buildGoModule
, fetchFromGitHub
+
, fetchpatch
, lib
}:
buildGoModule rec {
pname = "git-hound";
-
version = "1.4";
+
version = "1.7.2";
src = fetchFromGitHub {
owner = "tillson";
repo = pname;
rev = "v${version}";
-
sha256 = "sha256-HD5OK8HjnLDbyC/TmVI2HfBRIUCyyHTbA3JvKoeXV5E=";
+
hash = "sha256-W+rYDyRIw4jWWO4UZkUHFq/D/7ZXM+y5vdbclk6S0ro=";
};
-
vendorHash = null;
+
patches = [
+
# https://github.com/tillson/git-hound/pull/66
+
(fetchpatch {
+
url = "https://github.com/tillson/git-hound/commit/cd8aa19401cfdec9e4d76c1f6eb4d85928ec4b03.patch";
+
hash = "sha256-EkdR2KkxxlMLNtKFGpxsQ/msJT5NcMF7irIUcU2WWJY=";
+
})
+
];
+
+
# tests fail outside of nix
+
doCheck = false;
+
+
vendorHash = "sha256-8teIa083oMXm0SjzMP+mGOVAel1Hbsp3TSMhdvqVbQs=";
meta = with lib; {
description = "Reconnaissance tool for GitHub code search";
···
homepage = "https://github.com/tillson/git-hound";
license = with licenses; [ mit ];
maintainers = with maintainers; [ fab ];
-
broken = true; # vendor isn't reproducible with go > 1.17: nix-build -A $name.goModules --check
+
mainProgram = "git-hound";
};
}
-17
pkgs/applications/video/mpv/scripts/acompressor.nix
···
-
{ lib
-
, buildLua
-
, mpv-unwrapped
-
}:
-
-
buildLua {
-
inherit (mpv-unwrapped) src version;
-
pname = "mpv-acompressor";
-
scriptPath = "TOOLS/lua/acompressor.lua";
-
-
meta = with lib; {
-
inherit (mpv-unwrapped.meta) license;
-
description = "Script to toggle and control ffmpeg's dynamic range compression filter.";
-
homepage = "https://github.com/mpv-player/mpv/blob/master/TOOLS/lua/acompressor.lua";
-
maintainers = with maintainers; [ nicoo ];
-
};
-
}
-19
pkgs/applications/video/mpv/scripts/autocrop.nix
···
-
{ stdenvNoCC, mpv-unwrapped, lib }:
-
-
stdenvNoCC.mkDerivation rec {
-
pname = "mpv-autocrop";
-
version = mpv-unwrapped.version;
-
src = "${mpv-unwrapped.src.outPath}/TOOLS/lua/autocrop.lua";
-
dontBuild = true;
-
dontUnpack = true;
-
installPhase = ''
-
install -Dm644 ${src} $out/share/mpv/scripts/autocrop.lua
-
'';
-
passthru.scriptName = "autocrop.lua";
-
-
meta = {
-
description = "This script uses the lavfi cropdetect filter to automatically insert a crop filter with appropriate parameters for the currently playing video.";
-
homepage = "https://github.com/mpv-player/mpv/blob/master/TOOLS/lua/autocrop.lua";
-
license = lib.licenses.gpl2Plus;
-
};
-
}
-19
pkgs/applications/video/mpv/scripts/autodeint.nix
···
-
{ stdenvNoCC, mpv-unwrapped, lib }:
-
-
stdenvNoCC.mkDerivation rec {
-
pname = "mpv-autodeint";
-
version = mpv-unwrapped.version;
-
src = "${mpv-unwrapped.src.outPath}/TOOLS/lua/autodeint.lua";
-
dontBuild = true;
-
dontUnpack = true;
-
installPhase = ''
-
install -Dm644 ${src} $out/share/mpv/scripts/autodeint.lua
-
'';
-
passthru.scriptName = "autodeint.lua";
-
-
meta = {
-
description = "This script uses the lavfi idet filter to automatically insert the appropriate deinterlacing filter based on a short section of the currently playing video.";
-
homepage = "https://github.com/mpv-player/mpv/blob/master/TOOLS/lua/autodeint.lua";
-
license = lib.licenses.gpl2Plus;
-
};
-
}
-20
pkgs/applications/video/mpv/scripts/autoload.nix
···
-
{ stdenvNoCC, mpv-unwrapped, lib }:
-
-
stdenvNoCC.mkDerivation rec {
-
pname = "mpv-autoload";
-
version = mpv-unwrapped.version;
-
src = "${mpv-unwrapped.src.outPath}/TOOLS/lua/autoload.lua";
-
dontBuild = true;
-
dontUnpack = true;
-
installPhase = ''
-
install -Dm644 ${src} $out/share/mpv/scripts/autoload.lua
-
'';
-
passthru.scriptName = "autoload.lua";
-
-
meta = {
-
description = "This script automatically loads playlist entries before and after the currently played file";
-
homepage = "https://github.com/mpv-player/mpv/blob/master/TOOLS/lua/autoload.lua";
-
maintainers = [ lib.maintainers.dawidsowa ];
-
license = lib.licenses.gpl2Plus;
-
};
-
}
+1 -4
pkgs/applications/video/mpv/scripts/default.nix
···
lib.recurseIntoAttrs
(lib.mapAttrs addTests ({
-
acompressor = callPackage ./acompressor.nix { inherit buildLua; };
-
autocrop = callPackage ./autocrop.nix { };
-
autodeint = callPackage ./autodeint.nix { };
-
autoload = callPackage ./autoload.nix { };
chapterskip = callPackage ./chapterskip.nix { inherit buildLua; };
convert = callPackage ./convert.nix { inherit buildLua; };
cutter = callPackage ./cutter.nix { inherit buildLua; };
···
vr-reversal = callPackage ./vr-reversal.nix { };
webtorrent-mpv-hook = callPackage ./webtorrent-mpv-hook.nix { };
}
+
// (callPackage ./mpv.nix { inherit buildLua; })
// (callPackage ./occivink.nix { inherit buildLua; })))
// lib.optionalAttrs config.allowAliases {
youtube-quality = throw "'youtube-quality' is no longer maintained, use 'quality-menu' instead"; # added 2023-07-14
+35
pkgs/applications/video/mpv/scripts/mpv.nix
···
+
{ lib
+
, buildLua
+
, mpv-unwrapped
+
}:
+
+
let mkBuiltin = name: args:
+
let srcPath = "TOOLS/lua/${name}.lua";
+
in buildLua (lib.attrsets.recursiveUpdate rec {
+
inherit (mpv-unwrapped) src version;
+
pname = "mpv-${name}";
+
+
dontUnpack = true;
+
scriptPath = "${src}/${srcPath}";
+
+
meta = with lib; {
+
inherit (mpv-unwrapped.meta) license;
+
homepage = "https://github.com/mpv-player/mpv/blob/v${version}/${srcPath}";
+
};
+
} args);
+
+
in lib.mapAttrs (name: lib.makeOverridable (mkBuiltin name)) {
+
acompressor.meta = {
+
description = "Script to toggle and control ffmpeg's dynamic range compression filter.";
+
maintainers = with lib.maintainers; [ nicoo ];
+
};
+
+
autocrop.meta.description = "This script uses the lavfi cropdetect filter to automatically insert a crop filter with appropriate parameters for the currently playing video.";
+
+
autodeint.meta.description = "This script uses the lavfi idet filter to automatically insert the appropriate deinterlacing filter based on a short section of the currently playing video.";
+
+
autoload.meta = {
+
description = "This script automatically loads playlist entries before and after the currently played file";
+
maintainers = [ lib.maintainers.dawidsowa ];
+
};
+
}
+3 -3
pkgs/applications/virtualization/cntr/default.nix
···
rustPlatform.buildRustPackage rec {
pname = "cntr";
-
version = "1.5.2";
+
version = "1.5.3";
src = fetchFromGitHub {
owner = "Mic92";
repo = "cntr";
rev = version;
-
sha256 = "sha256-eDozoYN2iOFUY/w7Gjki4nnASyZo4V/YGPjdX2xjNGY=";
+
sha256 = "sha256-spa4qPEhpNSZIk16jeH9YEr4g9JcVmpetHz72A/ZAPY=";
};
-
cargoHash = "sha256-UZrVZBdaiIrMajePKWXDZI+Z+nXTGadNKmoa3gdfzp4=";
+
cargoHash = "sha256-YN8EtUXKtT8Xc0RnW7QqL+awyWy5xFKWhYMxgYG28I4=";
passthru.tests = nixosTests.cntr;
+2 -2
pkgs/applications/virtualization/podman-tui/default.nix
···
buildGoModule rec {
pname = "podman-tui";
-
version = "0.14.0";
+
version = "0.15.0";
src = fetchFromGitHub {
owner = "containers";
repo = "podman-tui";
rev = "v${version}";
-
hash = "sha256-RSQcpodippp4B4FM0yr+YFseoofas1M6xBqqtFD1BB0=";
+
hash = "sha256-DXodgpa/oWDBlJYTXcJb8cBkG1DCjFv8vKEzLhu0pN4=";
};
vendorHash = null;
+2 -2
pkgs/by-name/do/doublecmd/package.nix
···
stdenv.mkDerivation (finalAttrs: {
pname = "doublecmd";
-
version = "1.1.7";
+
version = "1.1.8";
src = fetchFromGitHub {
owner = "doublecmd";
repo = "doublecmd";
rev = "v${finalAttrs.version}";
-
hash = "sha256-eY8hYstNJ5RMiz3TUfgPFpvKycxTMVaZ6PE69Glxa0I=";
+
hash = "sha256-gUYn1b5X1uP1Ig2u/XiEP6MRhWs2ID64GSdBUSP5YEQ=";
};
nativeBuildInputs = [
+3 -4
pkgs/by-name/hi/hifile/package.nix
···
{ lib, appimageTools, fetchurl }:
let
-
version = "0.9.9.6";
+
version = "0.9.9.7";
pname = "hifile";
src = fetchurl {
url = "https://www.hifile.app/files/HiFile-${version}.AppImage";
-
hash = "sha256-qfBV4w4nChH2wUAHdcUFwVs+3OeqcKqMJ8WUucn31q4=";
+
hash = "sha256-/vFW+jHmtCEioJt0B5TnNDsaIyFlDuVABnHNccm6iEw=";
};
appimageContents = appimageTools.extractType2 {
inherit pname version src;
};
-
in
-
appimageTools.wrapType2 rec {
+
in appimageTools.wrapType2 rec {
inherit pname version src;
extraInstallCommands = ''
+66
pkgs/by-name/ov/overskride/package.nix
···
+
{ lib, fetchFromGitHub, rustPlatform, cargo, rustc, meson, ninja
+
, pkg-config, wrapGAppsHook4, desktop-file-utils, appstream-glib
+
, blueprint-compiler, dbus, gtk4, libadwaita, bluez, libpulseaudio }: let
+
+
owner = "kaii-lb";
+
name = "overskride";
+
version = "0.5.6";
+
+
in rustPlatform.buildRustPackage {
+
+
pname = name;
+
inherit version;
+
+
src = fetchFromGitHub {
+
inherit owner;
+
repo = name;
+
rev = "v${version}";
+
hash = "sha256-syQzHHT0s15oj8Yl2vhgyXlPI8UxOqIXGDqFeUc/dJQ=";
+
};
+
+
cargoHash = "sha256-NEsqVfKZqXSLieRO0BvQGdggmXXYO15qVhbfgAFATPc=";
+
+
nativeBuildInputs = [
+
pkg-config
+
wrapGAppsHook4
+
desktop-file-utils
+
appstream-glib
+
blueprint-compiler
+
meson
+
ninja
+
cargo
+
rustc
+
];
+
+
buildInputs = [ dbus gtk4 libadwaita bluez libpulseaudio ];
+
+
buildPhase = ''
+
runHook preBuild
+
+
meson setup build --prefix $out && cd build
+
meson compile && meson devenv
+
+
runHook postBuild
+
'';
+
+
# The "Validate appstream file" test fails.
+
# TODO: This appears to have been fixed upstream
+
# so checks should be enabled with the next version.
+
doCheck = false;
+
+
preFixup = ''
+
glib-compile-schemas $out/share/gsettings-schemas/${name}-${version}/glib-2.0/schemas
+
'';
+
+
meta = with lib; {
+
description =
+
"A Bluetooth and Obex client that is straight to the point, DE/WM agnostic, and beautiful";
+
homepage = "https://github.com/${owner}/${name}";
+
changelog = "https://github.com/${owner}/${name}/blob/v${version}/CHANGELOG.md";
+
license = licenses.gpl3Only;
+
mainProgram = name;
+
maintainers = with maintainers; [ mrcjkb ];
+
platforms = platforms.linux;
+
};
+
+
}
+63 -25
pkgs/by-name/sp/spacedrive/package.nix
···
-
{ lib, appimageTools, fetchurl, pkgs }:
+
{ lib
+
, pkgs
+
, stdenv
+
, fetchurl
+
, appimageTools
+
, undmg
+
, nix-update-script
+
}:
let
pname = "spacedrive";
version = "0.1.4";
src = fetchurl {
-
url = "https://github.com/spacedriveapp/spacedrive/releases/download/${version}/Spacedrive-linux-x86_64.AppImage";
-
hash = "sha256-iBdW8iPuvztP0L5xLyVs7/K8yFe7kD7QwdTuKJLhB+c=";
+
aarch64-darwin = {
+
url = "https://github.com/spacedriveapp/spacedrive/releases/download/${version}/Spacedrive-darwin-aarch64.dmg";
+
hash = "sha256-gKboB5W0vW6ssZHRRivqbVPE0d0FCUdiNCsP0rKKtNo=";
+
};
+
x86_64-darwin = {
+
url = "https://github.com/spacedriveapp/spacedrive/releases/download/${version}/Spacedrive-darwin-x86_64.dmg";
+
hash = "sha256-KD1hw6aDyqCsXLYM8WrOTI2AfFx7t++UWV7SaCmtypI=";
+
};
+
x86_64-linux = {
+
url = "https://github.com/spacedriveapp/spacedrive/releases/download/${version}/Spacedrive-linux-x86_64.AppImage";
+
hash = "sha256-iBdW8iPuvztP0L5xLyVs7/K8yFe7kD7QwdTuKJLhB+c=";
+
};
+
}.${stdenv.system} or (throw "${pname}-${version}: ${stdenv.system} is unsupported.");
+
+
meta = {
+
description = "An open source file manager, powered by a virtual distributed filesystem";
+
homepage = "https://www.spacedrive.com";
+
changelog = "https://github.com/spacedriveapp/spacedrive/releases/tag/${version}";
+
platforms = [ "aarch64-darwin" "x86_64-darwin" "x86_64-linux" ];
+
license = lib.licenses.agpl3Plus;
+
sourceProvenance = with lib.sourceTypes; [ binaryNativeCode ];
+
maintainers = with lib.maintainers; [ heisfer mikaelfangel stepbrobd ];
+
mainProgram = "spacedrive";
};
-
appimageContents = appimageTools.extractType2 { inherit pname version src; };
-
in appimageTools.wrapType2 {
-
inherit pname version src;
+
passthru.updateScript = nix-update-script { };
+
in
+
if stdenv.isDarwin then stdenv.mkDerivation
+
{
+
inherit pname version src meta passthru;
-
extraPkgs = pkgs:
-
(appimageTools.defaultFhsEnvArgs.multiPkgs pkgs) ++ [ pkgs.libthai ];
+
sourceRoot = "Spacedrive.app";
-
extraInstallCommands = ''
-
# Remove version from entrypoint
-
mv $out/bin/spacedrive-"${version}" $out/bin/spacedrive
+
nativeBuildInputs = [ undmg ];
-
# Install .desktop files
-
install -Dm444 ${appimageContents}/spacedrive.desktop -t $out/share/applications
-
install -Dm444 ${appimageContents}/spacedrive.png -t $out/share/pixmaps
-
substituteInPlace $out/share/applications/spacedrive.desktop \
-
--replace 'Exec=AppRun --no-sandbox %U' 'Exec=spacedrive'
+
installPhase = ''
+
mkdir -p "$out/Applications/Spacedrive.app"
+
cp -r . "$out/Applications/Spacedrive.app"
+
mkdir -p "$out/bin"
+
ln -s "$out/Applications/Spacedrive.app/Contents/MacOS/Spacedrive" "$out/bin/spacedrive"
'';
+
}
+
else appimageTools.wrapType2 {
+
inherit pname version src meta passthru;
-
meta = with lib; {
-
description = "An open source file manager, powered by a virtual distributed filesystem";
-
homepage = "https://www.spacedrive.com/";
-
platforms = [ "x86_64-linux" ];
-
license = licenses.agpl3Plus;
-
sourceProvenance = with sourceTypes; [ binaryNativeCode ];
-
maintainers = with maintainers; [ mikaelfangel heisfer ];
-
mainProgram = "spacedrive";
-
};
+
extraPkgs = pkgs:
+
(appimageTools.defaultFhsEnvArgs.multiPkgs pkgs) ++ [ pkgs.libthai ];
+
+
extraInstallCommands =
+
let
+
appimageContents = appimageTools.extractType2 { inherit pname version src; };
+
in
+
''
+
# Remove version from entrypoint
+
mv $out/bin/spacedrive-"${version}" $out/bin/spacedrive
+
+
# Install .desktop files
+
install -Dm444 ${appimageContents}/spacedrive.desktop -t $out/share/applications
+
install -Dm444 ${appimageContents}/spacedrive.png -t $out/share/pixmaps
+
substituteInPlace $out/share/applications/spacedrive.desktop \
+
--replace 'Exec=AppRun --no-sandbox %U' 'Exec=spacedrive'
+
'';
}
+2 -2
pkgs/data/fonts/sketchybar-app-font/default.nix
···
stdenvNoCC.mkDerivation (finalAttrs: {
pname = "sketchybar-app-font";
-
version = "1.0.20";
+
version = "1.0.21";
src = fetchurl {
url = "https://github.com/kvndrsslr/sketchybar-app-font/releases/download/v${finalAttrs.version}/sketchybar-app-font.ttf";
-
hash = "sha256-pf3SSxzlNIdbXXHfRauFCnrVUMOd5J9sSUE9MsfWrwo=";
+
hash = "sha256-k3Ok5qizXQvRCzW0oRilLWNJelYI0BGQ6qLbjhxosTA=";
};
dontUnpack = true;
+1
pkgs/desktops/lomiri/default.nix
···
#### Services
biometryd = callPackage ./services/biometryd { };
hfd-service = callPackage ./services/hfd-service { };
+
history-service = callPackage ./services/history-service { };
lomiri-download-manager = callPackage ./services/lomiri-download-manager { };
lomiri-url-dispatcher = callPackage ./services/lomiri-url-dispatcher { };
mediascanner2 = callPackage ./services/mediascanner2 { };
+203
pkgs/desktops/lomiri/services/history-service/default.nix
···
+
{ stdenv
+
, lib
+
, fetchFromGitLab
+
, fetchpatch
+
, gitUpdater
+
, testers
+
, cmake
+
, dbus
+
, dbus-test-runner
+
, dconf
+
, gnome
+
, libphonenumber
+
, libqtdbustest
+
, pkg-config
+
, protobuf
+
, qtbase
+
, qtdeclarative
+
, qtpim
+
, sqlite
+
, telepathy
+
, telepathy-mission-control
+
, wrapQtAppsHook
+
, xvfb-run
+
}:
+
+
let
+
replaceDbusService = pkg: name: "--replace \"\\\${DBUS_SERVICES_DIR}/${name}\" \"${pkg}/share/dbus-1/services/${name}\"";
+
in
+
stdenv.mkDerivation (finalAttrs: {
+
pname = "history-service";
+
version = "0.4";
+
+
src = fetchFromGitLab {
+
owner = "ubports";
+
repo = "development/core/history-service";
+
rev = finalAttrs.version;
+
hash = "sha256-oCX+moGQewzstbpddEYYp1kQdO2mVXpWJITfvzDzQDI=";
+
};
+
+
outputs = [
+
"out"
+
"dev"
+
];
+
+
patches = [
+
# Deprecation warnings with Qt5.15, allow disabling -Werror
+
# Remove when version > 0.4
+
(fetchpatch {
+
url = "https://gitlab.com/ubports/development/core/history-service/-/commit/1370777952c6a2efb85f582ff8ba085c2c0e290a.patch";
+
hash = "sha256-Z/dFrFo7WoPZlKto6wNGeWdopsi8iBjmd5ycbqMKgxo=";
+
})
+
+
# Drop deprecated qt5_use_modules usage
+
# Remove when https://gitlab.com/ubports/development/core/history-service/-/merge_requests/36 merged & in release
+
(fetchpatch {
+
url = "https://gitlab.com/OPNA2608/history-service/-/commit/b36ab377aca93555b29d1471d6eaa706b5c843ca.patch";
+
hash = "sha256-mOpXqqd4JI7lHtcWDm9LGCrtB8ERge04jMpHIagDM2k=";
+
})
+
+
# Add more / correct existing GNUInstallDirs usage
+
# Remove when https://gitlab.com/ubports/development/core/history-service/-/merge_requests/37 merged & in release
+
(fetchpatch {
+
url = "https://gitlab.com/OPNA2608/history-service/-/commit/bb4dbdd16e80dcd286d8edfb86b08f0b61bc7fec.patch";
+
hash = "sha256-C/XaygI663yaU06klQD9g0NnbqYxHSmzdbrRxcfiJkk=";
+
})
+
+
# Correct version information
+
# Remove when https://gitlab.com/ubports/development/core/history-service/-/merge_requests/38 merged & in release
+
(fetchpatch {
+
url = "https://gitlab.com/OPNA2608/history-service/-/commit/30d9fbee203205ec1ea8fd19c9b6eb54c080a9e2.patch";
+
hash = "sha256-vSZ1ii5Yhw7pB+Pd1pjWnW7JsQxKnn+LeuBKo6qZjQs=";
+
})
+
+
# Make tests optional
+
# Remove when https://gitlab.com/ubports/development/core/history-service/-/merge_requests/39 merged & in release
+
(fetchpatch {
+
url = "https://gitlab.com/OPNA2608/history-service/-/commit/cb5c80cffc35611657244e15a7eb10edcd598ccd.patch";
+
hash = "sha256-MFHGu4OMScdThq9htUgFMpezP7Ym6YTIZUHWol20wqw=";
+
})
+
];
+
+
postPatch = ''
+
# Upstream's way of generating their schema doesn't work for us, don't quite understand why.
+
# (gdb) bt
+
# #0 QSQLiteResult::prepare (this=0x4a4650, query=...) at qsql_sqlite.cpp:406
+
# #1 0x00007ffff344bcf4 in QSQLiteResult::reset (this=0x4a4650, query=...) at qsql_sqlite.cpp:378
+
# #2 0x00007ffff7f95f39 in QSqlQuery::exec (this=this@entry=0x7fffffffaad8, query=...) at kernel/qsqlquery.cpp:406
+
# #3 0x00000000004084cb in SQLiteDatabase::dumpSchema (this=<optimized out>) at /build/source/plugins/sqlite/sqlitedatabase.cpp:148
+
# #4 0x0000000000406d70 in main (argc=<optimized out>, argv=<optimized out>)
+
# at /build/source/plugins/sqlite/schema/generate_schema.cpp:56
+
# (gdb) p lastError().driverText().toStdString()
+
# $17 = {_M_dataplus = {<std::allocator<char>> = {<std::__new_allocator<char>> = {<No data fields>}, <No data fields>},
+
# _M_p = 0x4880d0 "Unable to execute statement"}, _M_string_length = 27, {
+
# _M_local_buf = "\033\000\000\000\000\000\000\000+\344\371\367\377\177\000", _M_allocated_capacity = 27}}
+
# (gdb) p lastError().databaseText().toStdString()
+
# $18 = {_M_dataplus = {<std::allocator<char>> = {<std::__new_allocator<char>> = {<No data fields>}, <No data fields>},
+
# _M_p = 0x48c480 "no such column: rowid"}, _M_string_length = 21, {
+
# _M_local_buf = "\025\000\000\000\000\000\000\000A\344\371\367\377\177\000", _M_allocated_capacity = 21}}
+
#
+
# This makes the tests stall indefinitely and breaks history-service usage.
+
# This replacement script should hopefully achieve the same / a similar-enough result with just sqlite
+
cp ${./update_schema.sh.in} plugins/sqlite/schema/update_schema.sh.in
+
+
# libphonenumber -> protobuf -> abseil-cpp demands C++14
+
# But uses std::string_view which is C++17?
+
substituteInPlace CMakeLists.txt \
+
--replace '-std=c++11' '-std=c++17'
+
+
# Uses pkg_get_variable, cannot substitute prefix with that
+
substituteInPlace daemon/CMakeLists.txt \
+
--replace 'pkg_get_variable(SYSTEMD_USER_UNIT_DIR systemd systemduserunitdir)' 'set(SYSTEMD_USER_UNIT_DIR "''${CMAKE_INSTALL_PREFIX}/lib/systemd/user")'
+
+
# Queries qmake for the QML installation path, which returns a reference to Qt5's build directory
+
substituteInPlace CMakeLists.txt \
+
--replace "\''${QMAKE_EXECUTABLE} -query QT_INSTALL_QML" "echo $out/${qtbase.qtQmlPrefix}"
+
'' + lib.optionalString finalAttrs.finalPackage.doCheck ''
+
# Tests launch these DBus services, fix paths related to them
+
substituteInPlace tests/common/dbus-services/CMakeLists.txt \
+
${replaceDbusService telepathy-mission-control "org.freedesktop.Telepathy.MissionControl5.service"} \
+
${replaceDbusService telepathy-mission-control "org.freedesktop.Telepathy.AccountManager.service"} \
+
${replaceDbusService dconf "ca.desrt.dconf.service"}
+
+
substituteInPlace cmake/modules/GenerateTest.cmake \
+
--replace '/usr/lib/dconf' '${lib.getLib dconf}/libexec' \
+
--replace '/usr/lib/telepathy' '${lib.getLib telepathy-mission-control}/libexec'
+
'';
+
+
strictDeps = true;
+
+
nativeBuildInputs = [
+
cmake
+
pkg-config
+
sqlite
+
wrapQtAppsHook
+
];
+
+
buildInputs = [
+
libphonenumber
+
protobuf
+
qtbase
+
qtdeclarative
+
qtpim
+
telepathy
+
];
+
+
nativeCheckInputs = [
+
dbus
+
dbus-test-runner
+
dconf
+
gnome.gnome-keyring
+
telepathy-mission-control
+
xvfb-run
+
];
+
+
cmakeFlags = [
+
# Many deprecation warnings with Qt 5.15
+
(lib.cmakeBool "ENABLE_WERROR" false)
+
(lib.cmakeFeature "CMAKE_CTEST_ARGUMENTS" (lib.concatStringsSep ";" [
+
# DaemonTest is flaky
+
# https://gitlab.com/ubports/development/core/history-service/-/issues/13
+
"-E" "^DaemonTest"
+
]))
+
];
+
+
preBuild = ''
+
# SQLiteDatabase is used on host to generate SQL schemas
+
# Tests also need this to use SQLiteDatabase for verifying correct behaviour
+
export QT_PLUGIN_PATH=${lib.getBin qtbase}/${qtbase.qtPluginPrefix}
+
'';
+
+
doCheck = stdenv.buildPlatform.canExecute stdenv.hostPlatform;
+
+
# Starts & talks to D-Bus services, breaks with parallelism
+
enableParallelChecking = false;
+
+
preCheck = ''
+
export QT_PLUGIN_PATH=${lib.getBin qtpim}/${qtbase.qtPluginPrefix}:$QT_PLUGIN_PATH
+
export HOME=$PWD
+
'';
+
+
passthru = {
+
tests.pkg-config = testers.testMetaPkgConfig finalAttrs.finalPackage;
+
updateScript = gitUpdater { };
+
};
+
+
meta = with lib; {
+
description = "Service that provides call log and conversation history";
+
longDescription = ''
+
History service provides the database and an API to store/retrieve the call log (used by dialer-app) and the sms/mms history (used by messaging-app).
+
+
See as well telepathy-ofono for incoming message events.
+
+
Database location: ~/.local/share/history-service/history.sqlite
+
'';
+
homepage = "https://gitlab.com/ubports/development/core/history-service";
+
license = licenses.gpl3Only;
+
maintainers = teams.lomiri.members;
+
platforms = platforms.linux;
+
pkgConfigModules = [
+
"history-service"
+
];
+
};
+
})
+34
pkgs/desktops/lomiri/services/history-service/update_schema.sh.in
···
+
#!/bin/sh
+
+
if [ $# -lt 3 ]; then
+
echo "Usage: $0 <source directory> <target file> <version info file>"
+
exit 1
+
fi
+
+
SOURCE_DIR=$1
+
TARGET_FILE=$2
+
VERSION_FILE=$3
+
+
VERSION="1"
+
LATEST_VERSION="1"
+
MERGED_COMMANDS="merged.sql"
+
+
[ -e $MERGED_COMMANDS ] && rm $MERGED_COMMANDS
+
SCHEMA_FILE="$SOURCE_DIR/v${VERSION}.sql"
+
while [ -e $SCHEMA_FILE ]; do
+
cat $SCHEMA_FILE >> $MERGED_COMMANDS
+
LATEST_VERSION=$VERSION
+
VERSION=$(($VERSION+1))
+
SCHEMA_FILE="$SOURCE_DIR/v${VERSION}.sql"
+
done
+
+
# To output the schema
+
echo ".fullschema" >> $MERGED_COMMANDS
+
+
# The schemas may use functions that history-service defines in C which don't affect the generated schema in a meaningful way.
+
# sqlite will return an error after processing queries with such function calls, so remove them.
+
sed -i -e '/normalizeId(/d' $MERGED_COMMANDS
+
+
sqlite3 <$MERGED_COMMANDS >$TARGET_FILE
+
+
echo $LATEST_VERSION > $VERSION_FILE
+1
pkgs/desktops/mate/mate-control-center/default.nix
···
mate.mate-desktop
mate.libmatekbd
mate.mate-menus
+
mate.mate-panel # for org.mate.panel schema, see m-c-c#678
mate.marco
mate.mate-settings-daemon
];
+3
pkgs/development/libraries/frozen/default.nix
···
# Since it has only two source files, the best course of action to support
# cross compilation is to create a small meson.build file.
# Relevant upstream issue: https://github.com/cesanta/frozen/pull/71
+
# We also remove the GN BUILD file to prevent conflicts on case-insesitive
+
# file systems.
preConfigure = ''
+
rm BUILD
cp ${./meson.build} meson.build
'';
+9
pkgs/development/libraries/glfw/3.x-wayland-minecraft.nix
···
substituteInPlace src/wl_init.c \
--replace "libdecor-0.so.0" "${lib.getLib libdecor}/lib/libdecor-0.so.0"
+
+
substituteInPlace src/wl_init.c \
+
--replace "libwayland-client.so.0" "${lib.getLib wayland}/lib/libwayland-client.so.0"
+
+
substituteInPlace src/wl_init.c \
+
--replace "libwayland-cursor.so.0" "${lib.getLib wayland}/lib/libwayland-cursor.so.0"
+
+
substituteInPlace src/wl_init.c \
+
--replace "libwayland-egl.so.1" "${lib.getLib wayland}/lib/libwayland-egl.so.1"
'';
meta = with lib; {
+11
pkgs/development/libraries/libsidplayfp/default.nix
···
{ stdenv
, lib
, fetchFromGitHub
+
, fetchpatch
, makeFontsConf
, nix-update-script
, autoreconfHook
···
fetchSubmodules = true;
sha256 = "sha256-KCp/8UjVl8e3+4s1FD4GvHP7AUAS+eIB7RWhmgm5GIA=";
};
+
+
patches = [
+
# Pull autoconf-2.72 compatibility fix:
+
# https://github.com/libsidplayfp/libsidplayfp/pull/103
+
(fetchpatch {
+
name = "autoconf-2.72";
+
url = "https://github.com/libsidplayfp/libsidplayfp/commit/b8fff55f6aaa005a3899b59e70cd8730f962641b.patch";
+
hash = "sha256-5Hk202IuHUBow7HnnPr2/ieWFjKDuHLQjQ9mJUML9q8=";
+
})
+
];
postPatch = ''
patchShebangs .
+2 -2
pkgs/development/libraries/pdfhummus/default.nix
···
stdenv.mkDerivation rec {
pname = "pdfhummus";
-
version = "4.6.1";
+
version = "4.6.2";
src = fetchFromGitHub {
owner = "galkahana";
repo = "PDF-Writer";
rev = "v${version}";
-
hash = "sha256-4QJxYxLELBDg5GZISdO2xKzJej8F21BY+GD+KkrGXws=";
+
hash = "sha256-PXiLP0lgqBdDbHHfvRT/d0M1jGjMVZZ3VDYnByzkKeI=";
};
nativeBuildInputs = [
+2 -2
pkgs/development/libraries/uthenticode/default.nix
···
stdenv.mkDerivation rec {
pname = "uthenticode";
-
version = "2.0.0";
+
version = "2.0.1";
src = fetchFromGitHub {
owner = "trailofbits";
repo = "uthenticode";
rev = "v${version}";
-
hash = "sha256-XGKROp+1AJWUjCwMOikh+yvNMGuENJGb/kzJsEOEFeY=";
+
hash = "sha256-NGVOGXMRlgpSRw56jr63rJc/5/qCmPjtAFa0D21ogd4=";
};
cmakeFlags = [ "-DBUILD_TESTS=1" "-DUSE_EXTERNAL_GTEST=1" ];
-1
pkgs/development/node-packages/main-programs.nix
···
# Packages that provide a single executable.
"@angular/cli" = "ng";
-
"@antora/cli" = "antora";
"@astrojs/language-server" = "astro-ls";
"@babel/cli" = "babel";
"@commitlint/cli" = "commitlint";
+2 -2
pkgs/development/python-modules/aioairzone-cloud/default.nix
···
buildPythonPackage rec {
pname = "aioairzone-cloud";
-
version = "0.3.6";
+
version = "0.3.7";
pyproject = true;
disabled = pythonOlder "3.7";
···
owner = "Noltari";
repo = "aioairzone-cloud";
rev = "refs/tags/${version}";
-
hash = "sha256-K2/q4JQV6GkNXJ6pKDPfhwKvftdezMp5VdOa5iabmvk=";
+
hash = "sha256-7QFtWAgLnVX9bS4u/2mV0pga/72G237AWxga6V3vLXY=";
};
nativeBuildInputs = [
+13 -4
pkgs/development/python-modules/aioskybell/default.nix
···
, aiohttp
, aresponses
, buildPythonPackage
+
, ciso8601
, fetchFromGitHub
, pytest-asyncio
+
, pytest-freezegun
, pytestCheckHook
, pythonOlder
+
, setuptools
}:
buildPythonPackage rec {
pname = "aioskybell";
-
version = "22.7.0";
-
format = "setuptools";
+
version = "23.12.0";
+
pyproject = true;
disabled = pythonOlder "3.9";
src = fetchFromGitHub {
owner = "tkdrob";
-
repo = pname;
+
repo = "aioskybell";
rev = "refs/tags/${version}";
-
hash = "sha256-aBT1fDFtq1vasTvCnAXKV2vmZ6LBLZqRCiepv1HDJ+Q=";
+
hash = "sha256-5F0B5z0pJLKJPzKIowE07vEgmNXnDVEeGFbPGnJ6H9I=";
};
postPatch = ''
···
--replace 'version="master",' 'version="${version}",'
'';
+
nativeBuildInputs = [
+
setuptools
+
];
+
propagatedBuildInputs = [
aiohttp
aiofiles
+
ciso8601
];
nativeCheckInputs = [
aresponses
pytest-asyncio
+
pytest-freezegun
pytestCheckHook
];
+2 -2
pkgs/development/python-modules/apprise/default.nix
···
buildPythonPackage rec {
pname = "apprise";
-
version = "1.6.0";
+
version = "1.7.0";
format = "setuptools";
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
-
hash = "sha256-Pu+rHF15eLDmXFCR0c2+kgaGXcPLXRnKXPvdt26Kr/4=";
+
hash = "sha256-2NVxDTyVJYbCz633zp6g/mC4DsqTlGSX4+8Y88wO7Bk=";
};
nativeBuildInputs = [
+50
pkgs/development/python-modules/borb/default.nix
···
+
{ lib
+
, buildPythonPackage
+
, cryptography
+
, fetchPypi
+
, fonttools
+
, lxml
+
, pillow
+
, python-barcode
+
, pythonOlder
+
, qrcode
+
, requests
+
, setuptools
+
}:
+
+
buildPythonPackage rec {
+
pname = "borb";
+
version = "2.1.20";
+
format = "setuptools";
+
+
disabled = pythonOlder "3.6";
+
+
src = fetchPypi {
+
inherit pname version;
+
hash = "sha256-HvPwFtqAPtJrG+O+t8OyQmYHVo6DC7StAjSfAxtuFe4=";
+
};
+
+
propagatedBuildInputs = [
+
cryptography
+
fonttools
+
lxml
+
pillow
+
python-barcode
+
qrcode
+
requests
+
setuptools
+
];
+
+
pythonImportsCheck = [
+
"borb.pdf"
+
];
+
+
doCheck = false;
+
+
meta = with lib; {
+
description = "Library for reading, creating and manipulating PDF files in Python";
+
homepage = "https://borbpdf.com/";
+
license = licenses.agpl3Only;
+
maintainers = with maintainers; [ marsam ];
+
};
+
}
+2 -2
pkgs/development/python-modules/django-filter/default.nix
···
buildPythonPackage rec {
pname = "django-filter";
-
version = "23.4";
+
version = "23.5";
format = "pyproject";
src = fetchPypi {
inherit pname version;
-
hash = "sha256-vtBws4NZ3OfS2+BXsWXVl3MFeYY1bLgJ3tmDs2x3qXY=";
+
hash = "sha256-Z1g6pDuR/oxJ90qDLZX02EQr5ij9TG1l6fgR9RU6Tlw=";
};
nativeBuildInputs = [ flit-core ];
+2 -2
pkgs/development/python-modules/elgato/default.nix
···
buildPythonPackage rec {
pname = "elgato";
-
version = "5.1.1";
+
version = "5.1.2";
format = "pyproject";
disabled = pythonOlder "3.11";
···
owner = "frenck";
repo = "python-elgato";
rev = "refs/tags/v${version}";
-
hash = "sha256-g0po3BtY2uiOmuyWVA+o08c3I86SE4zmvo1ps8HpNNw=";
+
hash = "sha256-NAU4tr0oaAPPrOUZYl9WoGOM68MlrBqGewHBIiIv2XY=";
};
postPatch = ''
+4 -2
pkgs/development/python-modules/google-generativeai/default.nix
···
, pythonOlder
, pythonRelaxDepsHook
, tqdm
+
, typing-extensions
}:
buildPythonPackage rec {
pname = "google-generativeai";
-
version = "0.2.2";
+
version = "0.3.2";
format = "setuptools";
disabled = pythonOlder "3.9";
···
owner = "google";
repo = "generative-ai-python";
rev = "refs/tags/v${version}";
-
hash = "sha256-WiDoeScro7TcW5nQBmLpVQriL6IzR9CAVqBj36nqivk=";
+
hash = "sha256-SL0jnuDHjeiqDq1VvWr4vQPFZ5yyea/OAGArmxztwB4=";
};
pythonRelaxDeps = [
···
google-api-core
protobuf
tqdm
+
typing-extensions
];
# Issue with the google.ai module. Check with the next release
+2 -2
pkgs/development/python-modules/hvplot/default.nix
···
buildPythonPackage rec {
pname = "hvplot";
-
version = "0.9.0";
+
version = "0.9.1";
format = "setuptools";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
-
hash = "sha256-BkxnV90QxJjQYqN0DdjGbjPmNDaDN9hUBjO7nQte7eg=";
+
hash = "sha256-KB0YmiEtJkGT9446k079oWqTwBZMSFTakzW0LuBlazo=";
};
propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/internetarchive/default.nix
···
buildPythonPackage rec {
pname = "internetarchive";
-
version = "3.5.0";
+
version = "3.6.0";
format = "pyproject";
···
owner = "jjjake";
repo = "internetarchive";
rev = "v${version}";
-
hash = "sha256-apBzx1qMHEA0wiWh82sS7I+AaiMEoAchhPsrtAgujbQ=";
+
hash = "sha256-hy5e6DEAwLKn0l2nJD7fyW5r4ZZiH+fuTEDLQen+dNk=";
};
propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/losant-rest/default.nix
···
buildPythonPackage rec {
pname = "losant-rest";
-
version = "1.19.2";
+
version = "1.19.3";
format = "setuptools";
disabled = pythonOlder "3.7";
···
owner = "Losant";
repo = "losant-rest-python";
rev = "v${version}";
-
hash = "sha256-JaXADzNxRqumjx6FZxJj6ioMVdUMR6S1FQQ6QcP8S5Q=";
+
hash = "sha256-Ppy7vOA7ix76nvzVEP+BkL8dsoN0oXNX/5IZyhXDoSw=";
};
propagatedBuildInputs = [
-3
pkgs/development/python-modules/ptpython/default.nix
···
, pythonOlder
, fetchPypi
, appdirs
-
, black
, importlib-metadata
-
, isPy3k
, jedi
, prompt-toolkit
, pygments
···
propagatedBuildInputs = [
appdirs
-
black # yes, this is in install_requires
jedi
prompt-toolkit
pygments
+2 -2
pkgs/development/python-modules/pyatmo/default.nix
···
buildPythonPackage rec {
pname = "pyatmo";
-
version = "8.0.1";
+
version = "8.0.2";
pyproject = true;
disabled = pythonOlder "3.10";
···
owner = "jabesq";
repo = "pyatmo";
rev = "refs/tags/v${version}";
-
hash = "sha256-ASjAmkM/BFWzZYnLeXATbZzSG6KBDcmy66/R1MgzAwQ=";
+
hash = "sha256-AKpDXfNF2t/3F4SmMWIgfkxHgcJobYs225gIeJ31l6k=";
};
postPatch = ''
+2 -2
pkgs/development/python-modules/youtube-transcript-api/default.nix
···
buildPythonPackage rec {
pname = "youtube-transcript-api";
-
version = "0.6.1";
+
version = "0.6.2";
format = "setuptools";
disabled = pythonOlder "3.7";
···
owner = "jdepoix";
repo = pname;
rev = "refs/tags/v${version}";
-
hash = "sha256-7s2qzmfYkaQ7xAi/U+skOEVTAj2gp+2WnODu9k1ojJY=";
+
hash = "sha256-xCB1XhXRq4jxyfst/n2wXj2k4dERm+/bVUJwP8b70gQ=";
};
propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/zha-quirks/default.nix
···
buildPythonPackage rec {
pname = "zha-quirks";
-
version = "0.0.108";
+
version = "0.0.109";
pyproject = true;
disabled = pythonOlder "3.8";
···
owner = "zigpy";
repo = "zha-device-handlers";
rev = "refs/tags/${version}";
-
hash = "sha256-tn6ZI8lanQhWallvi/NwAWYPuSea+SlJX/6D1VdXRxM=";
+
hash = "sha256-fkE44j+wXdIJekJJNoO67YzsghalTUpyNx9R/B2Vn1Y=";
};
postPatch = ''
+2 -3
pkgs/development/skaware-packages/s6-dns/default.nix
···
buildPackage {
pname = "s6-dns";
-
version = "2.3.7.0";
-
sha256 = "rusndssjTpA5enjGqjclkkqgcQwQNcpw3VYouExnAdE=";
+
version = "2.3.7.1";
+
sha256 = "zwJYV07H1itlTgwq14r0x9Z6xMnLN/eBSA9ZflSzD20=";
description = "A suite of DNS client programs and libraries for Unix systems";
···
rm $(find -type f -mindepth 1 -maxdepth 1 -executable)
rm libs6dns.*
rm libskadns.*
-
rm libdcache.*
mv doc $doc/share/doc/s6-dns/html
'';
+2 -2
pkgs/development/skaware-packages/s6-networking/default.nix
···
buildPackage {
pname = "s6-networking";
-
version = "2.7.0.0";
-
sha256 = "mf1uP5PW1qlb9+l4lVt9BTYpWReUsGjtogBKuLSQVVI=";
+
version = "2.7.0.1";
+
sha256 = "36SWTU8b2umrX8RQh2n9b+/DOlJ9UVOjd3xrBG7upWQ=";
description = "A suite of small networking utilities for Unix systems";
+2 -2
pkgs/development/skaware-packages/s6/default.nix
···
buildPackage {
pname = "s6";
-
version = "2.12.0.2";
-
sha256 = "qpF+/+Eq6XN5CQ91/aSfDV8PZ81lVDaEz/BtyIFyj4w=";
+
version = "2.12.0.3";
+
sha256 = "gA0xIm9sJc3T7AtlJA+AtWzl7BNzQdCo0VTndjjlgQM=";
description = "skarnet.org's small & secure supervision software suite";
+2 -2
pkgs/development/skaware-packages/skalibs/default.nix
···
buildPackage {
pname = "skalibs";
-
version = "2.14.0.1";
-
sha256 = "tD69s2+KjfQPGgjBOwg5O85J+vM05ioNuRmzrkr9FIg=";
+
version = "2.14.1.0";
+
sha256 = "24YTUWEngQ2N/thutCRaX/JCBPHhb6KOiqrTRtlqrug=";
description = "A set of general-purpose C programming libraries";
+2 -2
pkgs/development/skaware-packages/tipidee/default.nix
···
buildPackage {
pname = "tipidee";
-
version = "0.0.2.0";
-
sha256 = "5I+/gfvN8s4bf6Oi+5kzRndWeLV7movyRfznz0kNMoY=";
+
version = "0.0.3.0";
+
sha256 = "0dk6k86UKgJ2ioX5H2Xoga9S+SwMy9NFrK2KEKoNxCA=";
description = "A HTTP 1.1 webserver, serving static files and CGI/NPH";
+2 -2
pkgs/development/tools/analysis/checkov/default.nix
···
python3.pkgs.buildPythonApplication rec {
pname = "checkov";
-
version = "3.1.44";
+
version = "3.1.46";
pyproject = true;
src = fetchFromGitHub {
owner = "bridgecrewio";
repo = "checkov";
rev = "refs/tags/${version}";
-
hash = "sha256-dh52+MSaF3f0XWYQLeIzWrn29YUduplhXj2z+4yAOr4=";
+
hash = "sha256-scGZtqAdAjRD0bNq9pWp699I9rxPh2CFP4lCz+1yAZ8=";
};
patches = [
+3 -3
pkgs/development/tools/analysis/svlint/default.nix
···
rustPlatform.buildRustPackage rec {
pname = "svlint";
-
version = "0.9.1";
+
version = "0.9.2";
src = fetchCrate {
inherit pname version;
-
sha256 = "sha256-PfevtQpbJeo2U/qeYcJP4Et/HUASOZssRu2IXtOLWKw=";
+
sha256 = "sha256-5fPra4kgvykeQnvRtO3enbMIzbh5+nDJ2x0aHYMGiww=";
};
-
cargoHash = "sha256-1nPXyFzRmum1CvOFdcqNOQzFVcFFKwPdt2qzXxMssf0=";
+
cargoHash = "sha256-R7jqFgMj4YjUbEObdRxxvataYMXe9wq8B8k+t7+Dv30=";
cargoBuildFlags = [ "--bin" "svlint" ];
+3 -3
pkgs/development/tools/github-copilot-intellij-agent/default.nix
···
stdenv.mkDerivation rec {
pname = "github-copilot-intellij-agent";
-
version = "1.2.18.2908";
+
version = "1.4.5.4049";
src = fetchurl {
name = "${pname}-${version}-plugin.zip";
-
url = "https://plugins.jetbrains.com/plugin/download?updateId=373346";
-
hash = "sha256-ErSj4ckPSaEkOeGTRS27yFKDlj2iZfoPdjbZleSIL1s=";
+
url = "https://plugins.jetbrains.com/plugin/download?updateId=454005";
+
hash = "sha256-ibu3OcmtyLHuumhJQ6QipsNEIdEhvLUS7sb3xmnaR0U=";
};
nativeBuildInputs = [ unzip ];
+3 -3
pkgs/development/tools/language-servers/svls/default.nix
···
rustPlatform.buildRustPackage rec {
pname = "svls";
-
version = "0.2.10";
+
version = "0.2.11";
src = fetchFromGitHub {
owner = "dalance";
repo = "svls";
rev = "v${version}";
-
sha256 = "sha256-ylTiyqFVdT95a5DP4YYtoAIGThA+TacAE8ft0mcuolI=";
+
sha256 = "sha256-pvvtJOwb9N7CzCXoLG19iuLQjABABaOUe6wKfYizgQc=";
};
-
cargoHash = "sha256-+h2lxIbfHCGKCWX8ly9NXskMkeRGIpujkX3Zep1WhrE=";
+
cargoHash = "sha256-sMprdvBSfCIzoTHyUC447pyZWGgZkKa9t3A9BiGbQvY=";
meta = with lib; {
description = "SystemVerilog language server";
+3 -3
pkgs/development/tools/rust/cargo-mobile2/default.nix
···
let
inherit (darwin.apple_sdk.frameworks) CoreServices;
pname = "cargo-mobile2";
-
version = "0.9.0";
+
version = "0.9.1";
in
rustPlatform.buildRustPackage {
inherit pname version;
···
owner = "tauri-apps";
repo = pname;
rev = "cargo-mobile2-v${version}";
-
hash = "sha256-zLArfCUgBWx/xrcjvyhQbSxjH0JKI3JhoDVRX2/kBnQ=";
+
hash = "sha256-gyTA85eLVvDQKWo7D2zO6zFC8910AyNasXGjR1qkI6c=";
};
# Manually specify the sourceRoot since this crate depends on other crates in the workspace. Relevant info at
# https://discourse.nixos.org/t/difficulty-using-buildrustpackage-with-a-src-containing-multiple-cargo-workspaces/10202
# sourceRoot = "${src.name}/tooling/cli";
-
cargoHash = "sha256-13iCSd2BQ4fEeXSOfDBVgnzFSl1fUAPrbZZJ3qx7oHc=";
+
cargoHash = "sha256-Zcs+Sm2+xd7OSPXv+QDd7Jh8YvlmVrhWotjVNMqyE60=";
preBuild = ''
mkdir -p $out/share/
+3 -3
pkgs/development/tools/sea-orm-cli/default.nix
···
}:
rustPlatform.buildRustPackage rec {
pname = "sea-orm-cli";
-
version = "0.12.2";
+
version = "0.12.10";
src = fetchCrate {
inherit pname version;
-
hash = "sha256-mg0PkWxlfwo4eAtbU1ZOphEUBB1P6VsSpODyJZhvwQs=";
+
hash = "sha256-BVQbzP/+TJFqhnBeerYiLMpJJ8q9x582DR5X10K027U=";
};
nativeBuildInputs = [ pkg-config ];
···
buildInputs = [ openssl ]
++ lib.optionals stdenv.isDarwin [ darwin.apple_sdk.frameworks.SystemConfiguration ];
-
cargoHash = "sha256-6LXJtY844CyR6H0/IkEJrpSj4UNWcpO/XoTzUthcTUc=";
+
cargoHash = "sha256-qCcWReo72eHN9MoTVAmSHYVhpqw0kZ9VU/plYRcirVA=";
meta = with lib; {
homepage = "https://sea-ql.org/SeaORM";
+2 -2
pkgs/games/0verkill/default.nix
···
{ lib
, gccStdenv
, fetchFromGitHub
-
, autoreconfHook
+
, autoreconfHook269
, xorgproto
, libX11
, libXpm
···
sha256 = "WO7PN192HhcDl6iHIbVbH7MVMi1Tl2KyQbDa9DWRO6M=";
};
-
nativeBuildInputs = [ autoreconfHook ];
+
nativeBuildInputs = [ autoreconfHook269 ];
buildInputs = [ libX11 xorgproto libXpm ];
configureFlags = [ "--with-x" ];
+2 -2
pkgs/games/fheroes2/default.nix
···
stdenv.mkDerivation rec {
pname = "fheroes2";
-
version = "1.0.10";
+
version = "1.0.11";
src = fetchFromGitHub {
owner = "ihhub";
repo = "fheroes2";
rev = version;
-
hash = "sha256-bh27piX1/HIlbOmTpqQCV7NaHxOMtwMIGrjlXrFvHWE=";
+
hash = "sha256-R7hl5VzzdRcU9TF6WfiLYgUFpVixuppLobMsan0jKsQ=";
};
nativeBuildInputs = [ imagemagick ];
+3 -3
pkgs/games/katago/default.nix
···
# of gcc. If you need to use cuda10, please override stdenv with gcc8Stdenv
stdenv.mkDerivation rec {
pname = "katago";
-
version = "1.13.1";
-
githash = "3539a3d410b12f79658bb7a2cdaf1ecb6c95e6c1";
+
version = "1.14.0";
+
githash = "c6de1bbda837a0717eaeca46102f7326ed0da0d4";
src = fetchFromGitHub {
owner = "lightvector";
repo = "katago";
rev = "v${version}";
-
sha256 = "sha256-A2ZvFcklYQoxfqYrLrazksrJkfdELnn90aAbkm7pJg0=";
+
sha256 = "sha256-0WB/weQIJkLXedcOJO7D/N85oXTufvbmyfIp8XdrACg=";
};
fakegit = writeShellScriptBin "git" "echo ${githash}";
+3 -21
pkgs/os-specific/linux/criu/default.nix
···
-
{ stdenv, lib, fetchFromGitHub, fetchpatch, protobuf, protobufc, asciidoc, iptables
+
{ stdenv, lib, fetchFromGitHub, protobuf, protobufc, asciidoc, iptables
, xmlto, docbook_xsl, libpaper, libnl, libcap, libnet, pkg-config, iproute2, gzip
, which, python3, makeWrapper, docbook_xml_dtd_45, perl, nftables, libbsd, gnutar
, buildPackages
···
stdenv.mkDerivation rec {
pname = "criu";
-
version = "3.17.1";
+
version = "3.19";
src = fetchFromGitHub {
owner = "checkpoint-restore";
repo = pname;
rev = "v${version}";
-
hash = "sha256-0B0cdX5bemy4glF9iWjrQIXIqilyYcCcAN9x4Jjrwzk=";
+
hash = "sha256-S0nxBHfm7tWmW5PhSDhSAgy1uDa0RD5GTNpMDUHKqwY=";
};
-
-
patches = [
-
# Fixes redefinition of rseq headers
-
(fetchpatch {
-
url = "https://github.com/checkpoint-restore/criu/commit/1e6e826ffb7ac05f33fa123051c2fc2ddf0f68ea.patch";
-
hash = "sha256-LJjk0jQ5v5wqeprvBMpxhjLXn7v+lSPldEGgazGUM44=";
-
})
-
-
# compat fixes for glibc-2.36
-
(fetchpatch {
-
url = "https://github.com/checkpoint-restore/criu/commit/8cd5fccd6cf3d03afb5abe463134d31f54d42258.patch";
-
sha256 = "sha256-b65DdLmyIuZik0dNRuWJKUPcDFA6CKq0bi4Vd26zgS4=";
-
})
-
(fetchpatch {
-
url = "https://github.com/checkpoint-restore/criu/commit/517c0947050e63aac72f63a3bf373d76264723b9.patch";
-
sha256 = "sha256-MPZ6oILVoZ7BQEZFjUlp3RuMC7iKTKXAtrUDFqbN4T8=";
-
})
-
];
enableParallelBuilding = true;
depsBuildBuild = [ protobufc buildPackages.stdenv.cc ];
+17 -7
pkgs/os-specific/linux/raspberrypi-eeprom/default.nix pkgs/by-name/ra/raspberrypi-eeprom/package.nix
···
-
{ stdenvNoCC, lib, fetchFromGitHub, makeWrapper
-
, python3, binutils-unwrapped, findutils, gawk, kmod, pciutils, libraspberrypi
+
{ stdenvNoCC
+
, lib
+
, fetchFromGitHub
+
, makeWrapper
+
, python3
+
, binutils-unwrapped
+
, findutils
+
, gawk
+
, kmod
+
, pciutils
+
, libraspberrypi
}:
-
stdenvNoCC.mkDerivation rec {
+
stdenvNoCC.mkDerivation (finalAttrs: {
pname = "raspberrypi-eeprom";
-
version = "2023.10.30-2712";
+
version = "2023.12.06-2712";
src = fetchFromGitHub {
owner = "raspberrypi";
repo = "rpi-eeprom";
-
rev = "refs/tags/v${version}";
-
hash = "sha256-TKvby0qIXidM5Qk7q+ovLk0DpHsCbdQe7xndrgKrSXk=";
+
rev = "refs/tags/v${finalAttrs.version}";
+
hash = "sha256-bX+WSWj8Lk0S9GgauJsqElur+AAp5JB8LMEstB6aRGo=";
};
buildInputs = [ python3 ];
···
homepage = "https://www.raspberrypi.com/documentation/computers/raspberry-pi.html#raspberry-pi-4-boot-eeprom";
license = with licenses; [ bsd3 unfreeRedistributableFirmware ];
maintainers = with maintainers; [ das_j Luflosi ];
+
platforms = platforms.linux;
};
-
}
+
})
+2 -1
pkgs/servers/home-assistant/component-packages.nix
···
# Do not edit!
{
-
version = "2023.12.3";
+
version = "2023.12.4";
components = {
"3_day_blinds" = ps: with ps; [
];
···
"android_ip_webcam"
"androidtv"
"androidtv_remote"
+
"anova"
"anthemav"
"apache_kafka"
"apcupsd"
+23 -3
pkgs/servers/home-assistant/default.nix
···
};
});
+
aioairq = super.aioairq.overridePythonAttrs (oldAttrs: rec {
+
version = "0.3.1";
+
src = fetchFromGitHub {
+
owner = "CorantGmbH";
+
repo = "aioairq";
+
rev = "refs/tags/v${version}";
+
hash = "sha256-SRsDSHTZkkygaQZjHENKNLx3ZWMi/PubS1m/MonEKNk=";
+
};
+
});
+
aioesphomeapi = super.aioesphomeapi.overridePythonAttrs (oldAttrs: rec {
version = "19.2.1";
src = fetchFromGitHub {
···
repo = "aio-powerview-api";
rev = "refs/tags/v${version}";
hash = "sha256-cghfNi5T343/7GxNLDrE0iAewMlRMycQTP7SvDVpU2M=";
+
};
+
});
+
+
aiohttp-zlib-ng = super.aiohttp-zlib-ng.overridePythonAttrs (oldAttrs: rec {
+
version = "0.1.1";
+
src = fetchFromGitHub {
+
owner = "bdraco";
+
repo = "aiohttp-zlib-ng";
+
rev = "refs/tags/v${version}";
+
hash = "sha256-dTNwt4eX6ZQ8ySK2/9ziVbc3KFg2aL/EsiBWaJRC4x8=";
};
});
···
extraBuildInputs = extraPackages python.pkgs;
# Don't forget to run parse-requirements.py after updating
-
hassVersion = "2023.12.3";
+
hassVersion = "2023.12.4";
in python.pkgs.buildPythonApplication rec {
pname = "homeassistant";
···
owner = "home-assistant";
repo = "core";
rev = "refs/tags/${version}";
-
hash = "sha256-pTDYiy9Ux7Rgsf9rXXF3GbaiJkTX5FA/7K2hJtiNOkQ=";
+
hash = "sha256-XzjsSM0xKxLeuP30u8LReJtmJMbJq+yQ2Pp5xWmNLFw=";
};
# Secondary source is pypi sdist for translations
sdist = fetchPypi {
inherit pname version;
-
hash = "sha256-cvsYkuQG4i3GG8VGJ+HGSjdvpSBLzh0BFYQQpoVq4FY=";
+
hash = "sha256-dea0PacCzCWhMh2gw/kVJHwYCoT7zJ52qTQbHmqcwU8=";
};
nativeBuildInputs = with python.pkgs; [
+2 -2
pkgs/servers/home-assistant/stubs.nix
···
buildPythonPackage rec {
pname = "homeassistant-stubs";
-
version = "2023.12.3";
+
version = "2023.12.4";
format = "pyproject";
disabled = python.version != home-assistant.python.version;
···
owner = "KapJI";
repo = "homeassistant-stubs";
rev = "refs/tags/${version}";
-
hash = "sha256-PQZsesdGqeZgQUgO7DkKDcBrWRM/CY8giPx8cK3531s=";
+
hash = "sha256-a27PeLEArT87+DOrKZ5rLM5o2T3swzLwY+mBhOtd9dQ=";
};
nativeBuildInputs = [
+1
pkgs/servers/http/lighttpd/default.nix
···
license = lib.licenses.bsd3;
platforms = platforms.linux ++ platforms.darwin;
maintainers = with maintainers; [ bjornfor brecht ];
+
mainProgram = "lighttpd";
};
}
+5 -5
pkgs/servers/nosql/ferretdb/default.nix
···
{ lib
-
, buildGo121Module
+
, buildGoModule
, fetchFromGitHub
, nixosTests
}:
-
buildGo121Module rec {
+
buildGoModule rec {
pname = "ferretdb";
-
version = "1.16.0";
+
version = "1.17.0";
src = fetchFromGitHub {
owner = "FerretDB";
repo = "FerretDB";
rev = "v${version}";
-
hash = "sha256-Oh8VHWsV7jD2HgG2IVDV2krTBSCz4dyCENej1m6xnM4=";
+
hash = "sha256-GHUIr43rcA+H9FLQrrnTKLggyujGE0Is0VisLkL/EQI=";
};
postPatch = ''
···
echo nixpkgs > build/version/package.txt
'';
-
vendorHash = "sha256-iDPZ3DG/aWOHz61gVd56KhB7/RvsWOS+gfzk6Rx5c4o=";
+
vendorHash = "sha256-Mgc+TpK7XnRCT/CLDyW7fIs6jB2LbYlTceiytErIj+U=";
CGO_ENABLED = 0;
+3 -3
pkgs/servers/web-apps/pict-rs/default.nix
···
rustPlatform.buildRustPackage rec {
pname = "pict-rs";
-
version = "0.4.6";
+
version = "0.4.7";
src = fetchFromGitea {
domain = "git.asonix.dog";
owner = "asonix";
repo = pname;
rev = "v${version}";
-
sha256 = "sha256-nFfGyOxzJZ2U/1FpY64BorRd5yncipsaBbr/TsYnmjM=";
+
sha256 = "sha256-s870SjFFjjugqNDEAPMvwZ8Q1QT+9RKwujs4zDPVYGc=";
};
-
cargoHash = "sha256-11TyKs+JQiKBzFzGJe5sOllbPVEhchZrsryZp6L2JFo=";
+
cargoHash = "sha256-lLE8N3IuSEoohjtENNc0ixMq80cWIsy6Vd8/sEiwQFw=";
# needed for internal protobuf c wrapper library
PROTOC = "${protobuf}/bin/protoc";
+3 -3
pkgs/tools/admin/qovery-cli/default.nix
···
buildGoModule rec {
pname = "qovery-cli";
-
version = "0.76.0";
+
version = "0.77.0";
src = fetchFromGitHub {
owner = "Qovery";
repo = "qovery-cli";
rev = "refs/tags/v${version}";
-
hash = "sha256-Gf0wW+bv3+uvovsRa2AHn/N4sN8lc1ADK9t+jEVMA0c=";
+
hash = "sha256-247YXfZHxnH3IrCpM/BOmJclKdsC561R2m5seqEknaE=";
};
-
vendorHash = "sha256-R1CAB42moobsYuXNTtZXNLcCpSp8jfSt2FQi5fRnEdI=";
+
vendorHash = "sha256-uYmA6dYdCTf/oon202s6RBGNfOaXLllX+mPM8fRkCh0=";
nativeBuildInputs = [
installShellFiles
+2 -2
pkgs/tools/filesystems/dwarfs/default.nix
···
stdenv.mkDerivation rec {
pname = "dwarfs";
-
version = "0.7.3";
+
version = "0.7.4";
src = fetchFromGitHub {
owner = "mhx";
repo = "dwarfs";
rev = "v${version}";
fetchSubmodules = true;
-
hash = "sha256-lFJW9rmUhiHyu+unGuONcgbsJg9h9MSvNyECmarRF/M=";
+
hash = "sha256-wclUyATUZmF7EEkrK9nWASmfiB+MBrvEzc73ngOrhZ0=";
};
patches = [
+1
pkgs/tools/graphics/unpaper/default.nix
···
meta = with lib; {
homepage = "https://www.flameeyes.eu/projects/unpaper";
+
changelog = "https://github.com/unpaper/unpaper/blob/unpaper-${version}/NEWS";
description = "Post-processing tool for scanned sheets of paper";
license = licenses.gpl2;
platforms = platforms.all;
+3
pkgs/tools/misc/ipxe/default.nix
···
"bin-x86_64-efi/ipxe.efi" = null;
"bin-x86_64-efi/ipxe.efirom" = null;
"bin-x86_64-efi/ipxe.usb" = "ipxe-efi.usb";
+
"bin-x86_64-efi/snp.efi" = null;
} // lib.optionalAttrs stdenv.hostPlatform.isx86 {
"bin/ipxe.dsk" = null;
"bin/ipxe.usb" = null;
···
"bin-arm32-efi/ipxe.efi" = null;
"bin-arm32-efi/ipxe.efirom" = null;
"bin-arm32-efi/ipxe.usb" = "ipxe-efi.usb";
+
"bin-arm32-efi/snp.efi" = null;
} // lib.optionalAttrs stdenv.isAarch64 {
"bin-arm64-efi/ipxe.efi" = null;
"bin-arm64-efi/ipxe.efirom" = null;
"bin-arm64-efi/ipxe.usb" = "ipxe-efi.usb";
+
"bin-arm64-efi/snp.efi" = null;
};
in
+2 -3
pkgs/tools/misc/rpi-imager/default.nix
···
src = fetchFromGitHub {
owner = "raspberrypi";
-
repo = finalAttrs.pname;
+
repo = "rpi-imager";
rev = "refs/tags/v${finalAttrs.version}";
sha256 = "sha256-ZuS/fhPpVlLSdaD+t+qIw6fdEbi7c82X+BxcgWlPntg=";
};
···
meta = with lib; {
description = "Raspberry Pi Imaging Utility";
-
homepage = "https://www.raspberrypi.com/software/";
+
homepage = "https://github.com/raspberrypi/rpi-imager/";
changelog = "https://github.com/raspberrypi/rpi-imager/releases/tag/v${finalAttrs.version}";
-
downloadPage = "https://github.com/raspberrypi/rpi-imager/";
license = licenses.asl20;
mainProgram = "rpi-imager";
maintainers = with maintainers; [ ymarkus anthonyroussel ];
+3 -3
pkgs/tools/misc/rtx/default.nix
···
rustPlatform.buildRustPackage rec {
pname = "rtx";
-
version = "2023.12.18";
+
version = "2023.12.35";
src = fetchFromGitHub {
owner = "jdx";
repo = "rtx";
rev = "v${version}";
-
hash = "sha256-RjILdhH0Gg9VRvyVFukUrreYHnwtC+5MfXT+v4cT7/Y=";
+
hash = "sha256-vzMjC6qIPhZm80hzYQRpF3j+s85B0nwTcgSGRATQEIg=";
};
-
cargoHash = "sha256-1/Te4JfPDE0gbMysnQbF2SH/oMq+b3fyVgIHaQx1m5E=";
+
cargoHash = "sha256-LvW5xGVggzuXlFPhbrc93Dht3S9zaQyx9Nm+Mx/Mjh0=";
nativeBuildInputs = [ installShellFiles pkg-config ];
buildInputs = [ openssl ] ++ lib.optionals stdenv.isDarwin [ Security SystemConfiguration ];
+2 -3
pkgs/tools/misc/sqlite3-to-mysql/default.nix
···
, nixosTests
, testers
, sqlite3-to-mysql
-
, fetchPypi
, mysql80
}:
python3Packages.buildPythonApplication rec {
pname = "sqlite3-to-mysql";
-
version = "2.1.1";
+
version = "2.1.6";
format = "pyproject";
disabled = python3Packages.pythonOlder "3.8";
···
owner = "techouse";
repo = pname;
rev = "refs/tags/v${version}";
-
hash = "sha256-g3W6ts5Mk//l6E4Yg49rf9dmu+yzgH+mCjz+vPW9ZRQ=";
+
hash = "sha256-RIe4If7R8snbNN2yIPxAh39EQplVyhMF2c0G06Zipds=";
};
nativeBuildInputs = with python3Packages; [
+3 -3
pkgs/tools/networking/ooniprobe-cli/default.nix
···
buildGoModule rec {
pname = "ooniprobe-cli";
-
version = "3.20.0";
+
version = "3.20.1";
src = fetchFromGitHub {
owner = "ooni";
repo = "probe-cli";
rev = "v${version}";
-
hash = "sha256-kOARV3tnRyOAScc3Vn96TFQFgqvTgi6NFHWM7ZbpciU=";
+
hash = "sha256-XjIrae4HPFB1Rv8yIAUh6Xj9UVU55Wx7SuyKJ0BvmXY=";
};
-
vendorHash = "sha256-c922VpxtpNfua3Sx3vXKz4x1FsLMwbaSvRH4dyFrr9s=";
+
vendorHash = "sha256-HYU+oS+iqdl2jQJc3h9T+MSc/Hq2W6UqP+oPSEyfcOU=";
subPackages = [ "cmd/ooniprobe" ];
+2 -2
pkgs/tools/package-management/nfpm/default.nix
···
buildGoModule rec {
pname = "nfpm";
-
version = "2.35.0";
+
version = "2.35.1";
src = fetchFromGitHub {
owner = "goreleaser";
repo = pname;
rev = "v${version}";
-
hash = "sha256-WYLXhRoB8+a5zhTs1qxJVrDjor5orCw6UJrqEt+fBBQ=";
+
hash = "sha256-ew0iXtOKQIYxpyeNFBHD2F7KflTEQ7qHQMHYaL35Rvw=";
};
vendorHash = "sha256-P9jSQG6EyVGMZKtThy8Q7Y/pV7mbMl2eGrylea0VHRc=";
+3 -3
pkgs/tools/security/cnquery/default.nix
···
buildGoModule rec {
pname = "cnquery";
-
version = "9.12.0";
+
version = "9.12.1";
src = fetchFromGitHub {
owner = "mondoohq";
repo = "cnquery";
rev = "v${version}";
-
hash = "sha256-d2S9qEm0jvXvpU7IHpurDJ7A21bvjuM3HrdRPaujzTU=";
+
hash = "sha256-ezk9HgNf4FBW/PEaNUhsb3/l1ChTC42F3slXXa8ZJp4=";
};
subPackages = [ "apps/cnquery" ];
-
vendorHash = "sha256-vEJcdGgev9C/3vGx+SMmD9dLMau5Jyx2TjHiiQQ+16A=";
+
vendorHash = "sha256-iycKyidVpdWeccK4RxENUxEFUmQKkIyyW1c3JFZ3gx4=";
meta = with lib; {
description = "cloud-native, graph-based asset inventory";
+8
pkgs/tools/security/fwknop/default.nix
···
url = "https://github.com/mrash/fwknop/commit/a8214fd58bc46d23b64b3a55db023c7f5a5ea6af.patch";
sha256 = "0cp1350q66n455hpd3rdydb9anx66bcirza5gyyyy5232zgg58bi";
})
+
+
# Pull patch pending upstream inclusion for `autoconf-2.72` support:
+
# https://github.com/mrash/fwknop/pull/357
+
(fetchpatch {
+
name = "autoconf-2.72.patch";
+
url = "https://github.com/mrash/fwknop/commit/bee7958532338499e35c19e75937891c8113f7de.patch";
+
hash = "sha256-lrro5dSDR0Zz9aO3bV5vFFADNJjoDR9z6P5lFYWyLW8=";
+
})
];
nativeBuildInputs = [ autoreconfHook ];
+10
pkgs/tools/security/goverview/default.nix
···
{ lib
, buildGoModule
, fetchFromGitHub
+
, installShellFiles
}:
buildGoModule rec {
···
"-w"
"-s"
];
+
nativeBuildInputs = [
+
installShellFiles
+
];
+
postInstall = ''
+
installShellCompletion --cmd goverview \
+
--bash <($out/bin/goverview completion bash) \
+
--fish <($out/bin/goverview completion fish) \
+
--zsh <($out/bin/goverview completion zsh)
+
'';
# Tests require network access
doCheck = false;
+3 -3
pkgs/tools/text/amber/default.nix
···
rustPlatform.buildRustPackage rec {
pname = "amber";
-
version = "0.5.9";
+
version = "0.6.0";
src = fetchFromGitHub {
owner = "dalance";
repo = pname;
rev = "v${version}";
-
sha256 = "sha256-mmgJCD7kJjvpxyagsoe5CSzqIEZcIiYMAMP3axRphv4=";
+
sha256 = "sha256-q0o2PQngbDLumck27V0bIiB35zesn55Y+MwK2GjNVWo=";
};
-
cargoSha256 = "sha256-opRinhTmhZxpAwHNiVOLXL8boQf09Y1NXrWQ6HWQYQ0=";
+
cargoHash = "sha256-nBSgP30Izskq9RbhVIyqWzZgG5ZWHVdiukldw+Q0rco=";
buildInputs = lib.optionals stdenv.isDarwin [ libiconv Security ];
+3 -3
pkgs/top-level/all-packages.nix
···
libagar_test = callPackage ../development/libraries/libagar/libagar_test.nix { };
libao = callPackage ../development/libraries/libao {
-
usePulseAudio = config.pulseaudio or lib.meta.availableOn stdenv.hostPlatform libpulseaudio;
+
usePulseAudio = config.pulseaudio or (lib.meta.availableOn stdenv.hostPlatform libpulseaudio);
inherit (darwin.apple_sdk.frameworks) CoreAudio CoreServices AudioUnit;
···
raspberrypifw = callPackage ../os-specific/linux/firmware/raspberrypi { };
raspberrypiWirelessFirmware = callPackage ../os-specific/linux/firmware/raspberrypi-wireless { };
-
-
raspberrypi-eeprom = callPackage ../os-specific/linux/raspberrypi-eeprom { };
raspberrypi-armstubs = callPackage ../os-specific/linux/firmware/raspberrypi/armstubs.nix { };
···
katagoWithCuda = katago.override {
backend = "cuda";
+
cudaPackages = cudaPackages_12;
katagoCPU = katago.override {
···
katagoTensorRT = katago.override {
backend = "tensorrt";
+
cudaPackages = cudaPackages_12;
klavaro = callPackage ../games/klavaro { };
+2
pkgs/top-level/python-packages.nix
···
enablePython = true;
});
+
borb = callPackage ../development/python-modules/borb { };
+
bork = callPackage ../development/python-modules/bork { };
boschshcpy = callPackage ../development/python-modules/boschshcpy { };