Merge master into staging-next

Changed files
+1468 -604
.github
workflows
maintainers
nixos
pkgs
applications
editors
vim
vscode
extensions
WakaTime.vscode-wakatime
dbaeumer.vscode-eslint
fstarlang.fstar-vscode-assistant
ndonfris.fish-lsp
oliver-ni.scheme-fmt
release-candidate.vscode-scheme-repl
rooveterinaryinc.roo-cline
tsyesika.guile-scheme-enhanced
ufo5260987423.magic-scheme
emulators
libretro
networking
cluster
helmfile
terraform-providers
science
math
mathematica
video
mpv
scripts
by-name
al
all-the-package-names
am
au
automatic-timezoned
ba
balena-cli
bazel-watcher
br
brutespray
ch
cht-sh
cl
clickhouse-backup
co
copybara
cu
cubeb
eg
eggnog-mapper
er
ev
fc
fcitx5-pinyin-moegirl
fcitx5-pinyin-zhwiki
fo
foxglove-cli
fx
gi
git-repo
github-backup
go
google-chrome
gose
ha
ho
holo-cli
home-manager
jd
jd-diff-patch
je
jellyfin-tui
kn
knowsmore
lo
local-content-share
ma
matrix-alertmanager-receiver
me
melange
ni
nixseparatedebuginfod2
oh
oh-my-zsh
ol
olivetin
om
omnisharp-roslyn
op
openhue-cli
pi
pistol
po
pocketbase
powerstation
ru
rustical
sd
sdl_gamecontrollerdb
sh
shadowenv
sn
st
stackit-cli
step-kms-plugin
sy
ta
tauno-monitor
tayga
tf
tfupdate
va
vacuum-go
valkey
vi
virtnbdbackup
wi
wiliwili
zo
zoom-us
development
python-modules
airos
fastai
publicsuffixlist
pybind11-stubgen
pyitachip2ir
pymiele
pypasser
pypjlink2
pytenable
pywmspro
sagemaker-core
storage3
tami4edgeapi
thingspeak
volvocarsapi
servers
home-assistant
custom-components
fellow
monitoring
prometheus
sql
postgresql
top-level
+1
.github/workflows/pr.yml
···
on:
pull_request:
paths:
+
- .github/actions/get-merge-commit/action.yml
- .github/workflows/build.yml
- .github/workflows/check.yml
- .github/workflows/eval.yml
-5
maintainers/maintainer-list.nix
···
githubId = 57819359;
name = "Binh Nguyen";
-
tuynia = {
-
github = "mivorasu";
-
githubId = 221005165;
-
name = "Qylia Vorlaque";
-
};
tv = {
email = "tv@krebsco.de";
github = "4z3";
+35 -8
nixos/modules/config/debug-info.nix
···
-
{ config, lib, ... }:
+
{
+
config,
+
lib,
+
pkgs,
+
...
+
}:
{
options = {
···
'';
};
+
environment.debuginfodServers = lib.mkOption {
+
type = lib.types.listOf lib.types.str;
+
default = [ ];
+
description = ''
+
List of urls of debuginfod servers for tools like {command}`gdb` and {command}`valgrind` to use.
+
+
Unrelated to {option}`environment.enableDebugInfo`.
+
'';
+
};
+
};
-
config = lib.mkIf config.environment.enableDebugInfo {
+
config = lib.mkMerge [
+
(lib.mkIf config.environment.enableDebugInfo {
+
+
# FIXME: currently disabled because /lib is already in
+
# environment.pathsToLink, and we can't have both.
+
#environment.pathsToLink = [ "/lib/debug/.build-id" ];
-
# FIXME: currently disabled because /lib is already in
-
# environment.pathsToLink, and we can't have both.
-
#environment.pathsToLink = [ "/lib/debug/.build-id" ];
+
environment.extraOutputsToInstall = [ "debug" ];
+
+
environment.variables.NIX_DEBUG_INFO_DIRS = [ "/run/current-system/sw/lib/debug" ];
-
environment.extraOutputsToInstall = [ "debug" ];
+
})
+
(lib.mkIf (config.environment.debuginfodServers != [ ]) {
+
environment.variables.DEBUGINFOD_URLS = lib.strings.concatStringsSep " " config.environment.debuginfodServers;
-
environment.variables.NIX_DEBUG_INFO_DIRS = [ "/run/current-system/sw/lib/debug" ];
+
environment.systemPackages = [
+
# valgrind support requires debuginfod-find on PATH
+
(lib.getBin pkgs.elfutils)
+
];
-
};
+
environment.etc."gdb/gdbinit.d/nixseparatedebuginfod2.gdb".text = "set debuginfod enabled on";
+
})
+
];
}
+65 -36
nixos/modules/config/system-path.nix
···
}:
let
-
requiredPackages =
-
map (pkg: lib.setPrio ((pkg.meta.priority or lib.meta.defaultPriority) + 3) pkg)
-
[
-
pkgs.acl
-
pkgs.attr
-
pkgs.bashInteractive # bash with ncurses support
-
pkgs.bzip2
-
pkgs.coreutils-full
-
pkgs.cpio
-
pkgs.curl
-
pkgs.diffutils
-
pkgs.findutils
-
pkgs.gawk
-
pkgs.stdenv.cc.libc
-
pkgs.getent
-
pkgs.getconf
-
pkgs.gnugrep
-
pkgs.gnupatch
-
pkgs.gnused
-
pkgs.gnutar
-
pkgs.gzip
-
pkgs.xz
-
pkgs.less
-
pkgs.libcap
-
pkgs.ncurses
-
pkgs.netcat
-
config.programs.ssh.package
-
pkgs.mkpasswd
-
pkgs.procps
-
pkgs.su
-
pkgs.time
-
pkgs.util-linux
-
pkgs.which
-
pkgs.zstd
-
];
+
corePackageNames = [
+
"acl"
+
"attr"
+
"bashInteractive" # bash with ncurses support
+
"bzip2"
+
"coreutils-full"
+
"cpio"
+
"curl"
+
"diffutils"
+
"findutils"
+
"gawk"
+
"getent"
+
"getconf"
+
"gnugrep"
+
"gnupatch"
+
"gnused"
+
"gnutar"
+
"gzip"
+
"xz"
+
"less"
+
"libcap"
+
"ncurses"
+
"netcat"
+
"mkpasswd"
+
"procps"
+
"su"
+
"time"
+
"util-linux"
+
"which"
+
"zstd"
+
];
+
corePackages =
+
(map (
+
n:
+
let
+
pkg = pkgs.${n};
+
in
+
lib.setPrio ((pkg.meta.priority or lib.meta.defaultPriority) + 3) pkg
+
) corePackageNames)
+
++ [ pkgs.stdenv.cc.libc ];
+
corePackagesText = "[ ${lib.concatMapStringsSep " " (n: "pkgs.${n}") corePackageNames} ]";
defaultPackageNames = [
"perl"
···
configuration. (The latter is the main difference with
installing them in the default profile,
{file}`/nix/var/nix/profiles/default`.
+
'';
+
};
+
+
corePackages = lib.mkOption {
+
type = lib.types.listOf lib.types.package;
+
default = corePackages;
+
defaultText = lib.literalMD ''
+
these packages, with their `meta.priority` numerically increased
+
(thus lowering their installation priority):
+
+
${corePackagesText}
+
'';
+
example = [ ];
+
description = ''
+
Set of core packages for a normal interactive system.
+
+
Only change this if you know what you're doing!
+
+
Like with systemPackages, packages are installed to
+
{file}`/run/current-system/sw`. They are
+
automatically available to all users, and are
+
automatically updated every time you rebuild the system
+
configuration.
'';
};
···
config = {
-
environment.systemPackages = requiredPackages ++ config.environment.defaultPackages;
+
environment.systemPackages = config.environment.corePackages ++ config.environment.defaultPackages;
environment.pathsToLink = [
"/bin"
+1
nixos/modules/module-list.nix
···
./services/development/jupyterhub/default.nix
./services/development/livebook.nix
./services/development/lorri.nix
+
./services/development/nixseparatedebuginfod2.nix
./services/development/nixseparatedebuginfod.nix
./services/development/rstudio-server/default.nix
./services/development/vsmartcard-vpcd.nix
+97 -103
nixos/modules/programs/bash/bash.nix
···
in
{
-
imports = [
-
(lib.mkRemovedOptionModule [ "programs" "bash" "enable" ] "")
-
];
options = {
programs.bash = {
-
/*
-
enable = lib.mkOption {
-
default = true;
-
description = ''
-
Whenever to configure Bash as an interactive shell.
-
Note that this tries to make Bash the default
-
{option}`users.defaultUserShell`,
-
which in turn means that you might need to explicitly
-
set this variable if you have another shell configured
-
with NixOS.
-
'';
-
type = lib.types.bool;
-
};
-
*/
+
enable = lib.mkOption {
+
default = true;
+
description = ''
+
Whenever to configure Bash as an interactive shell.
+
Note that this tries to make Bash the default
+
{option}`users.defaultUserShell`,
+
which in turn means that you might need to explicitly
+
set this variable if you have another shell configured
+
with NixOS.
+
'';
+
type = lib.types.bool;
+
};
shellAliases = lib.mkOption {
default = { };
···
};
-
config = # lib.mkIf cfg.enable
-
{
+
config = lib.mkIf cfg.enable {
-
programs.bash = {
+
programs.bash = {
-
shellAliases = builtins.mapAttrs (name: lib.mkDefault) cfge.shellAliases;
+
shellAliases = builtins.mapAttrs (name: lib.mkDefault) cfge.shellAliases;
-
shellInit = ''
-
if [ -z "$__NIXOS_SET_ENVIRONMENT_DONE" ]; then
-
. ${config.system.build.setEnvironment}
-
fi
+
shellInit = ''
+
if [ -z "$__NIXOS_SET_ENVIRONMENT_DONE" ]; then
+
. ${config.system.build.setEnvironment}
+
fi
-
${cfge.shellInit}
-
'';
+
${cfge.shellInit}
+
'';
-
loginShellInit = cfge.loginShellInit;
+
loginShellInit = cfge.loginShellInit;
-
interactiveShellInit = ''
-
# Check the window size after every command.
-
shopt -s checkwinsize
+
interactiveShellInit = ''
+
# Check the window size after every command.
+
shopt -s checkwinsize
-
# Disable hashing (i.e. caching) of command lookups.
-
set +h
+
# Disable hashing (i.e. caching) of command lookups.
+
set +h
-
${cfg.promptInit}
-
${cfg.promptPluginInit}
-
${bashAliases}
+
${cfg.promptInit}
+
${cfg.promptPluginInit}
+
${bashAliases}
-
${cfge.interactiveShellInit}
-
'';
+
${cfge.interactiveShellInit}
+
'';
-
};
+
};
-
environment.etc.profile.text = ''
-
# /etc/profile: DO NOT EDIT -- this file has been generated automatically.
-
# This file is read for login shells.
+
environment.etc.profile.text = ''
+
# /etc/profile: DO NOT EDIT -- this file has been generated automatically.
+
# This file is read for login shells.
-
# Only execute this file once per shell.
-
if [ -n "$__ETC_PROFILE_SOURCED" ]; then return; fi
-
__ETC_PROFILE_SOURCED=1
+
# Only execute this file once per shell.
+
if [ -n "$__ETC_PROFILE_SOURCED" ]; then return; fi
+
__ETC_PROFILE_SOURCED=1
-
# Prevent this file from being sourced by interactive non-login child shells.
-
export __ETC_PROFILE_DONE=1
+
# Prevent this file from being sourced by interactive non-login child shells.
+
export __ETC_PROFILE_DONE=1
-
${cfg.shellInit}
-
${cfg.loginShellInit}
+
${cfg.shellInit}
+
${cfg.loginShellInit}
-
# Read system-wide modifications.
-
if test -f /etc/profile.local; then
-
. /etc/profile.local
-
fi
+
# Read system-wide modifications.
+
if test -f /etc/profile.local; then
+
. /etc/profile.local
+
fi
-
if [ -n "''${BASH_VERSION:-}" ]; then
-
. /etc/bashrc
-
fi
-
'';
+
if [ -n "''${BASH_VERSION:-}" ]; then
+
. /etc/bashrc
+
fi
+
'';
-
environment.etc.bashrc.text = ''
-
# /etc/bashrc: DO NOT EDIT -- this file has been generated automatically.
+
environment.etc.bashrc.text = ''
+
# /etc/bashrc: DO NOT EDIT -- this file has been generated automatically.
-
# Only execute this file once per shell.
-
if [ -n "$__ETC_BASHRC_SOURCED" ] || [ -n "$NOSYSBASHRC" ]; then return; fi
-
__ETC_BASHRC_SOURCED=1
+
# Only execute this file once per shell.
+
if [ -n "$__ETC_BASHRC_SOURCED" ] || [ -n "$NOSYSBASHRC" ]; then return; fi
+
__ETC_BASHRC_SOURCED=1
-
# If the profile was not loaded in a parent process, source
-
# it. But otherwise don't do it because we don't want to
-
# clobber overridden values of $PATH, etc.
-
if [ -z "$__ETC_PROFILE_DONE" ]; then
-
. /etc/profile
-
fi
+
# If the profile was not loaded in a parent process, source
+
# it. But otherwise don't do it because we don't want to
+
# clobber overridden values of $PATH, etc.
+
if [ -z "$__ETC_PROFILE_DONE" ]; then
+
. /etc/profile
+
fi
-
# We are not always an interactive shell.
-
if [ -n "$PS1" ]; then
-
${cfg.interactiveShellInit}
-
fi
+
# We are not always an interactive shell.
+
if [ -n "$PS1" ]; then
+
${cfg.interactiveShellInit}
+
fi
-
# Read system-wide modifications.
-
if test -f /etc/bashrc.local; then
-
. /etc/bashrc.local
-
fi
-
'';
+
# Read system-wide modifications.
+
if test -f /etc/bashrc.local; then
+
. /etc/bashrc.local
+
fi
+
'';
-
environment.etc.bash_logout.text = ''
-
# /etc/bash_logout: DO NOT EDIT -- this file has been generated automatically.
+
environment.etc.bash_logout.text = ''
+
# /etc/bash_logout: DO NOT EDIT -- this file has been generated automatically.
-
# Only execute this file once per shell.
-
if [ -n "$__ETC_BASHLOGOUT_SOURCED" ] || [ -n "$NOSYSBASHLOGOUT" ]; then return; fi
-
__ETC_BASHLOGOUT_SOURCED=1
+
# Only execute this file once per shell.
+
if [ -n "$__ETC_BASHLOGOUT_SOURCED" ] || [ -n "$NOSYSBASHLOGOUT" ]; then return; fi
+
__ETC_BASHLOGOUT_SOURCED=1
-
${cfg.logout}
+
${cfg.logout}
-
# Read system-wide modifications.
-
if test -f /etc/bash_logout.local; then
-
. /etc/bash_logout.local
-
fi
-
'';
+
# Read system-wide modifications.
+
if test -f /etc/bash_logout.local; then
+
. /etc/bash_logout.local
+
fi
+
'';
-
# Configuration for readline in bash. We use "option default"
-
# priority to allow user override using both .text and .source.
-
environment.etc.inputrc.source = lib.mkOptionDefault ./inputrc;
+
# Configuration for readline in bash. We use "option default"
+
# priority to allow user override using both .text and .source.
+
environment.etc.inputrc.source = lib.mkOptionDefault ./inputrc;
-
users.defaultUserShell = lib.mkDefault pkgs.bashInteractive;
+
users.defaultUserShell = lib.mkDefault pkgs.bashInteractive;
-
environment.pathsToLink = lib.optionals cfg.completion.enable [
-
"/etc/bash_completion.d"
-
"/share/bash-completion"
-
];
+
environment.pathsToLink = lib.optionals cfg.completion.enable [
+
"/etc/bash_completion.d"
+
"/share/bash-completion"
+
];
-
environment.shells = [
-
"/run/current-system/sw/bin/bash"
-
"/run/current-system/sw/bin/sh"
-
"${pkgs.bashInteractive}/bin/bash"
-
"${pkgs.bashInteractive}/bin/sh"
-
];
+
environment.shells = [
+
"/run/current-system/sw/bin/bash"
+
"/run/current-system/sw/bin/sh"
+
"${pkgs.bashInteractive}/bin/bash"
+
"${pkgs.bashInteractive}/bin/sh"
+
];
-
};
+
};
}
+31 -2
nixos/modules/programs/fuse.nix
···
-
{ config, lib, ... }:
+
{
+
config,
+
lib,
+
pkgs,
+
...
+
}:
let
cfg = config.programs.fuse;
···
meta.maintainers = with lib.maintainers; [ ];
options.programs.fuse = {
+
enable = lib.mkEnableOption "fuse" // {
+
default = true;
+
};
+
mountMax = lib.mkOption {
# In the C code it's an "int" (i.e. signed and at least 16 bit), but
# negative numbers obviously make no sense:
···
};
};
-
config = {
+
config = lib.mkIf cfg.enable {
+
environment.systemPackages = [
+
pkgs.fuse
+
pkgs.fuse3
+
];
+
+
security.wrappers =
+
let
+
mkSetuidRoot = source: {
+
setuid = true;
+
owner = "root";
+
group = "root";
+
inherit source;
+
};
+
in
+
{
+
fusermount = mkSetuidRoot "${lib.getBin pkgs.fuse}/bin/fusermount";
+
fusermount3 = mkSetuidRoot "${lib.getBin pkgs.fuse3}/bin/fusermount3";
+
};
+
environment.etc."fuse.conf".text = ''
${lib.optionalString (!cfg.userAllowOther) "#"}user_allow_other
mount_max = ${builtins.toString cfg.mountMax}
'';
+
};
}
+2
nixos/modules/programs/ssh.nix
···
}
);
+
environment.corePackages = [ cfg.package ];
+
# SSH configuration. Slight duplication of the sshd_config
# generation in the sshd service.
environment.etc."ssh/ssh_config".text = ''
-2
nixos/modules/security/wrappers/default.nix
···
in
{
# These are mount related wrappers that require the +s permission.
-
fusermount = mkSetuidRoot "${lib.getBin pkgs.fuse}/bin/fusermount";
-
fusermount3 = mkSetuidRoot "${lib.getBin pkgs.fuse3}/bin/fusermount3";
mount = mkSetuidRoot "${lib.getBin pkgs.util-linux}/bin/mount";
umount = mkSetuidRoot "${lib.getBin pkgs.util-linux}/bin/umount";
};
+1 -9
nixos/modules/services/development/nixseparatedebuginfod.nix
···
extra-allowed-users = [ "nixseparatedebuginfod" ];
};
-
environment.variables.DEBUGINFOD_URLS = "http://${url}";
-
-
environment.systemPackages = [
-
# valgrind support requires debuginfod-find on PATH
-
(lib.getBin pkgs.elfutils)
-
];
-
-
environment.etc."gdb/gdbinit.d/nixseparatedebuginfod.gdb".text = "set debuginfod enabled on";
-
+
environment.debuginfodServers = [ "http://${url}" ];
};
}
+97
nixos/modules/services/development/nixseparatedebuginfod2.nix
···
+
{
+
pkgs,
+
lib,
+
config,
+
utils,
+
...
+
}:
+
let
+
cfg = config.services.nixseparatedebuginfod2;
+
url = "127.0.0.1:${toString cfg.port}";
+
in
+
{
+
options = {
+
services.nixseparatedebuginfod2 = {
+
enable = lib.mkEnableOption "nixseparatedebuginfod2, a debuginfod server providing source and debuginfo for nix packages";
+
port = lib.mkOption {
+
description = "port to listen";
+
default = 1950;
+
type = lib.types.port;
+
};
+
package = lib.mkPackageOption pkgs "nixseparatedebuginfod2" { };
+
substituter = lib.mkOption {
+
description = "nix substituter to fetch debuginfo from. Either http/https substituters, or `local:` to use debuginfo present in the local store.";
+
default = "https://cache.nixos.org";
+
example = "local:";
+
type = lib.types.str;
+
};
+
cacheExpirationDelay = lib.mkOption {
+
description = "keep unused cache entries for this long. A number followed by a unit";
+
default = "1d";
+
type = lib.types.str;
+
};
+
};
+
};
+
config = lib.mkIf cfg.enable {
+
systemd.services.nixseparatedebuginfod2 = {
+
wantedBy = [ "multi-user.target" ];
+
path = [ config.nix.package ];
+
serviceConfig = {
+
ExecStart = [
+
(utils.escapeSystemdExecArgs [
+
(lib.getExe cfg.package)
+
"--listen-address"
+
url
+
"--substituter"
+
cfg.substituter
+
"--expiration"
+
cfg.cacheExpirationDelay
+
])
+
];
+
Restart = "on-failure";
+
CacheDirectory = "nixseparatedebuginfod2";
+
DynamicUser = true;
+
+
# hardening
+
# Filesystem stuff
+
ProtectSystem = "strict"; # Prevent writing to most of /
+
ProtectHome = true; # Prevent accessing /home and /root
+
PrivateTmp = true; # Give an own directory under /tmp
+
PrivateDevices = true; # Deny access to most of /dev
+
ProtectKernelTunables = true; # Protect some parts of /sys
+
ProtectControlGroups = true; # Remount cgroups read-only
+
RestrictSUIDSGID = true; # Prevent creating SETUID/SETGID files
+
PrivateMounts = true; # Give an own mount namespace
+
RemoveIPC = true;
+
UMask = "0077";
+
+
# Capabilities
+
CapabilityBoundingSet = ""; # Allow no capabilities at all
+
NoNewPrivileges = true; # Disallow getting more capabilities. This is also implied by other options.
+
+
# Kernel stuff
+
ProtectKernelModules = true; # Prevent loading of kernel modules
+
SystemCallArchitectures = "native"; # Usually no need to disable this
+
SystemCallFilter = "@system-service";
+
ProtectKernelLogs = true; # Prevent access to kernel logs
+
ProtectClock = true; # Prevent setting the RTC
+
ProtectProc = "noaccess";
+
ProcSubset = "pid";
+
+
# Networking
+
RestrictAddressFamilies = "AF_UNIX AF_INET AF_INET6";
+
+
# Misc
+
LockPersonality = true; # Prevent change of the personality
+
ProtectHostname = true; # Give an own UTS namespace
+
RestrictRealtime = true; # Prevent switching to RT scheduling
+
MemoryDenyWriteExecute = true; # Maybe disable this for interpreters like python
+
RestrictNamespaces = true;
+
+
};
+
};
+
+
environment.debuginfodServers = [ "http://${url}" ];
+
+
};
+
}
+1 -1
nixos/modules/services/networking/netbird.nix
···
mkdir -p "$out/share/applications"
substitute ${cfg.ui.package}/share/applications/netbird.desktop \
"$out/share/applications/${mkBin "netbird"}.desktop" \
-
--replace-fail 'Name=NetBird' "Name=NetBird @ ${client.service.name}" \
+
--replace-fail 'Name=Netbird' "Name=NetBird @ ${client.service.name}" \
--replace-fail '${lib.getExe cfg.ui.package}' "$out/bin/${mkBin "netbird-ui"}"
'')
];
+1 -1
nixos/modules/services/networking/prosody.nix
···
${lib.concatMapStrings (muc: ''
Component ${toLua muc.domain} "muc"
-
modules_enabled = {${optionalString cfg.modules.mam ''" muc_mam",''}${optionalString muc.allowners_muc ''" muc_allowners",''} }
+
modules_enabled = {${optionalString cfg.modules.mam ''"muc_mam",''}${optionalString muc.allowners_muc ''"muc_allowners",''} }
name = ${toLua muc.name}
restrict_room_creation = ${toLua muc.restrictRoomCreation}
max_history_messages = ${toLua muc.maxHistoryMessages}
+25 -1
nixos/modules/services/networking/tayga.nix
···
data-dir ${cfg.dataDir}
${concatStringsSep "\n" (mapAttrsToList (ipv4: ipv6: "map " + ipv4 + " " + ipv6) cfg.mappings)}
+
+
${optionalString ((builtins.length cfg.log) > 0) ''
+
log ${concatStringsSep " " cfg.log}
+
''}
+
+
wkpf-strict ${if cfg.wkpfStrict then "yes" else "no"}
'';
addrOpts =
···
}
'';
};
+
+
log = mkOption {
+
type = types.listOf types.str;
+
default = [ ];
+
description = "Packet errors to log (drop, reject, icmp, self)";
+
example = literalExpression ''
+
[ "drop" "reject" "icmp" "self" ]
+
'';
+
};
+
+
wkpfStrict = mkOption {
+
type = types.bool;
+
default = true;
+
description = "Enable restrictions on the use of the well-known prefix (64:ff9b::/96) - prevents translation of non-global IPv4 ranges when using the well-known prefix. Must be enabled for RFC 6052 compatibility.";
+
};
};
};
···
};
};
+
environment.etc."tayga.conf".source = configFile;
+
systemd.services.tayga = {
description = "Stateless NAT64 implementation";
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
+
reloadTriggers = [ configFile ];
serviceConfig = {
-
ExecStart = "${cfg.package}/bin/tayga -d --nodetach --config ${configFile}";
+
ExecStart = "${cfg.package}/bin/tayga -d --nodetach --config /etc/tayga.conf";
ExecReload = "${pkgs.coreutils}/bin/kill -SIGHUP $MAINPID";
Restart = "always";
+39 -1
nixos/modules/services/video/frigate.nix
···
elem
filterAttrsRecursive
hasPrefix
+
literalExpression
makeLibraryPath
mkDefault
mkEnableOption
···
format = pkgs.formats.yaml { };
filteredConfig = converge (filterAttrsRecursive (_: v: !elem v [ null ])) cfg.settings;
+
+
configFileUnchecked = format.generate "frigate.yaml" filteredConfig;
+
configFileChecked =
+
pkgs.runCommand "frigate-config"
+
{
+
preferLocalBuilds = true;
+
}
+
''
+
function error() {
+
cat << 'HEREDOC'
+
+
Note that not all configurations can be reliably checked in the
+
build sandbox.
+
+
This check can be disabled using `services.frigate.checkConfig`.
+
HEREDOC
+
+
exit 1
+
}
+
+
cp ${configFileUnchecked} $out
+
export CONFIG_FILE=$out
+
export PYTHONPATH=${cfg.package.pythonPath}
+
${cfg.package.python.interpreter} -m frigate --validate-config || error
+
'';
+
configFile = if cfg.checkConfig then configFileChecked else configFileUnchecked;
cameraFormat =
with types;
···
- https://docs.frigate.video/configuration/hardware_acceleration
- https://docs.frigate.video/configuration/ffmpeg_presets#hwaccel-presets
+
'';
+
};
+
+
checkConfig = mkOption {
+
type = bool;
+
default = pkgs.stdenv.buildPlatform.canExecute pkgs.stdenv.hostPlatform;
+
defaultText = literalExpression ''
+
pkgs.stdenv.buildPlatform.canExecute pkgs.stdenv.hostPlatform
+
'';
+
description = ''
+
Whether to check the configuration at build time.
'';
};
···
rm --recursive --force /var/cache/frigate/!(model_cache)
'')
(pkgs.writeShellScript "frigate-create-writable-config" ''
-
cp --no-preserve=mode "${format.generate "frigate.yml" filteredConfig}" /run/frigate/frigate.yml
+
cp --no-preserve=mode ${configFile} /run/frigate/frigate.yml
'')
];
ExecStart = "${cfg.package.python.interpreter} -m frigate";
+1 -1
nixos/modules/system/activation/activation-script.nix
···
source ${config.system.build.earlyMountScript}
'';
-
systemd.user = {
+
systemd.user = lib.mkIf config.system.activatable {
services.nixos-activation = {
description = "Run user-specific NixOS activation";
script = config.system.userActivationScripts.script;
+3 -1
nixos/modules/system/boot/kernel.nix
···
ln -s ${initrdPath} $out/initrd
-
ln -s ${config.system.build.initialRamdiskSecretAppender}/bin/append-initrd-secrets $out
+
${optionalString (config.boot.initrd.secrets != { }) ''
+
ln -s ${config.system.build.initialRamdiskSecretAppender}/bin/append-initrd-secrets $out
+
''}
ln -s ${config.hardware.firmware}/lib/firmware $out/firmware
'';
+17 -2
nixos/modules/system/boot/kexec.nix
···
-
{ pkgs, lib, ... }:
+
{
+
config,
+
pkgs,
+
lib,
+
...
+
}:
+
let
+
cfg = config.boot.kexec;
+
in
{
-
config = lib.mkIf (lib.meta.availableOn pkgs.stdenv.hostPlatform pkgs.kexec-tools) {
+
options.boot.kexec = {
+
enable = lib.mkEnableOption "kexec" // {
+
default = lib.meta.availableOn pkgs.stdenv.hostPlatform pkgs.kexec-tools;
+
defaultText = lib.literalExpression ''lib.meta.availableOn pkgs.stdenv.hostPlatform pkgs.kexec-tools'';
+
};
+
};
+
+
config = lib.mkIf cfg.enable {
environment.systemPackages = [ pkgs.kexec-tools ];
systemd.services.prepare-kexec = {
+1 -7
nixos/modules/tasks/filesystems.nix
···
# Add the mount helpers to the system path so that `mount' can find them.
system.fsPackages = [ pkgs.dosfstools ];
-
environment.systemPackages =
-
with pkgs;
-
[
-
fuse3
-
fuse
-
]
-
++ config.system.fsPackages;
+
environment.systemPackages = config.system.fsPackages;
environment.etc.fstab.text =
let
+13 -11
nixos/modules/tasks/network-interfaces.nix
···
text = cfg.hostName + "\n";
};
-
environment.systemPackages = [
-
pkgs.host
-
pkgs.hostname-debian
-
pkgs.iproute2
-
pkgs.iputils
-
]
-
++ optionals config.networking.wireless.enable [
-
pkgs.wirelesstools # FIXME: obsolete?
-
pkgs.iw
-
]
-
++ bridgeStp;
+
environment.corePackages = lib.mkOptionDefault (
+
[
+
pkgs.host
+
pkgs.hostname-debian
+
pkgs.iproute2
+
pkgs.iputils
+
]
+
++ optionals config.networking.wireless.enable [
+
pkgs.wirelesstools # FIXME: obsolete?
+
pkgs.iw
+
]
+
++ bridgeStp
+
);
# Wake-on-LAN configuration is shared by the scripted and networkd backends.
systemd.network.links = pipe interfaces [
+1
nixos/tests/all-tests.nix
···
};
nixpkgs = pkgs.callPackage ../modules/misc/nixpkgs/test.nix { inherit evalMinimalConfig; };
nixseparatedebuginfod = runTest ./nixseparatedebuginfod.nix;
+
nixseparatedebuginfod2 = runTest ./nixseparatedebuginfod2.nix;
node-red = runTest ./node-red.nix;
nomad = runTest ./nomad.nix;
nominatim = runTest ./nominatim.nix;
+13 -12
nixos/tests/nixseparatedebuginfod.nix
···
in
{
name = "nixseparatedebuginfod";
-
# A binary cache with debug info and source for nix
+
# A binary cache with debug info and source for gnumake
nodes.cache =
{ pkgs, ... }:
{
···
openFirewall = true;
};
system.extraDependencies = [
-
pkgs.nix.debug
-
pkgs.nix.src
+
pkgs.gnumake.debug
+
pkgs.gnumake.src
pkgs.sl
];
};
···
environment.systemPackages = [
pkgs.valgrind
pkgs.gdb
+
pkgs.gnumake
(pkgs.writeShellScriptBin "wait_for_indexation" ''
set -x
-
while debuginfod-find debuginfo /run/current-system/sw/bin/nix |& grep 'File too large'; do
+
while debuginfod-find debuginfo /run/current-system/sw/bin/make |& grep 'File too large'; do
sleep 1;
done
'')
···
# nixseparatedebuginfod needs .drv to associate executable -> source
# on regular systems this would be provided by nixos-rebuild
-
machine.succeed("nix-instantiate '<nixpkgs>' -A nix")
+
machine.succeed("nix-instantiate '<nixpkgs>' -A gnumake")
machine.succeed("timeout 600 wait_for_indexation")
# test debuginfod-find
-
machine.succeed("debuginfod-find debuginfo /run/current-system/sw/bin/nix")
+
machine.succeed("debuginfod-find debuginfo /run/current-system/sw/bin/make")
# test that gdb can fetch source
-
out = machine.succeed("gdb /run/current-system/sw/bin/nix --batch -x ${builtins.toFile "commands" ''
+
out = machine.succeed("gdb /run/current-system/sw/bin/make --batch -x ${builtins.toFile "commands" ''
start
l
''}")
print(out)
-
assert 'int main(' in out
+
assert 'main (int argc, char **argv, char **envp)' in out
# test that valgrind can display location information
-
# this relies on the fact that valgrind complains about nix
-
# libgc helps in this regard, and we also ask valgrind to show leak kinds
+
# this relies on the fact that valgrind complains about gnumake
+
# because we also ask valgrind to show leak kinds
# which are usually false positives.
-
out = machine.succeed("valgrind --leak-check=full --show-leak-kinds=all nix-env --version 2>&1")
+
out = machine.succeed("valgrind --leak-check=full --show-leak-kinds=all make --version 2>&1")
print(out)
-
assert 'main.cc' in out
+
assert 'main.c' in out
'';
}
+72
nixos/tests/nixseparatedebuginfod2.nix
···
+
{ pkgs, lib, ... }:
+
{
+
name = "nixseparatedebuginfod2";
+
# A binary cache with debug info and source for gnumake
+
nodes.cache =
+
{ pkgs, ... }:
+
{
+
services.nginx = {
+
enable = true;
+
virtualHosts.default = {
+
default = true;
+
addSSL = false;
+
root = "/var/lib/thebinarycache";
+
};
+
};
+
networking.firewall.allowedTCPPorts = [ 80 ];
+
systemd.services.buildthebinarycache = {
+
before = [ "nginx.service" ];
+
wantedBy = [ "nginx.service" ];
+
script = ''
+
${pkgs.nix}/bin/nix --extra-experimental-features nix-command copy --to file:///var/lib/thebinarycache?index-debug-info=true ${pkgs.gnumake.debug} ${pkgs.gnumake} ${pkgs.gnumake.src} ${pkgs.sl}
+
'';
+
serviceConfig = {
+
User = "nginx";
+
Group = "nginx";
+
StateDirectory = "thebinarycache";
+
Type = "oneshot";
+
};
+
};
+
};
+
# the machine where we need the debuginfo
+
nodes.machine = {
+
services.nixseparatedebuginfod2 = {
+
enable = true;
+
substituter = "http://cache";
+
};
+
environment.systemPackages = [
+
pkgs.valgrind
+
pkgs.gdb
+
pkgs.gnumake
+
];
+
};
+
testScript = ''
+
start_all()
+
cache.wait_for_unit("nginx.service")
+
cache.wait_for_open_port(80)
+
machine.wait_for_unit("nixseparatedebuginfod2.service")
+
machine.wait_for_open_port(1950)
+
+
with subtest("check that the binary cache works"):
+
machine.succeed("nix-store --extra-substituters http://cache --option require-sigs false -r ${pkgs.sl}")
+
+
# test debuginfod-find
+
machine.succeed("debuginfod-find debuginfo /run/current-system/sw/bin/make")
+
+
# test that gdb can fetch source
+
out = machine.succeed("gdb /run/current-system/sw/bin/make --batch -x ${builtins.toFile "commands" ''
+
start
+
l
+
''}")
+
print(out)
+
assert 'main (int argc, char **argv, char **envp)' in out
+
+
# test that valgrind can display location information
+
# this relies on the fact that valgrind complains about gnumake
+
# because we also ask valgrind to show leak kinds
+
# which are usually false positives.
+
out = machine.succeed("valgrind --leak-check=full --show-leak-kinds=all make --version 2>&1")
+
print(out)
+
assert 'main.c' in out
+
'';
+
}
+24 -5
nixos/tests/tayga.nix
···
};
nodes = {
-
# The server is configured with static IPv4 addresses. RFC 6052 Section 3.1
-
# disallows the mapping of non-global IPv4 addresses like RFC 1918 into the
-
# Well-Known Prefix 64:ff9b::/96. TAYGA also does not allow the mapping of
-
# documentation space (RFC 5737). To circumvent this, 100.64.0.2/24 from
-
# RFC 6589 (Carrier Grade NAT) is used here.
+
# The server is configured with static IPv4 addresses. We have to disable the
+
# well-known prefix restrictions (as required by RFC 6052 Section 3.1) because
+
# we're using private space (TAYGA also considers documentation space non-global,
+
# unfortunately).
# To reach the IPv4 address pool of the NAT64 gateway, there is a static
# route configured. In normal cases, where the router would also source NAT
# the pool addresses to one IPv4 addresses, this would not be needed.
···
};
};
programs.mtr.enable = true;
+
environment.systemPackages = [ pkgs.tcpdump ];
};
# The router is configured with static IPv4 addresses towards the server
···
];
networking = {
+
hostName = "router-systemd";
useDHCP = false;
useNetworkd = true;
firewall.enable = false;
···
mappings = {
"192.0.2.42" = "2001:db8::2";
};
+
log = [
+
"drop"
+
"reject"
+
"icmp"
+
"self"
+
];
+
wkpfStrict = false;
};
+
environment.systemPackages = [ pkgs.tcpdump ];
};
router_nixos = {
···
];
networking = {
+
hostName = "router-nixos";
useDHCP = false;
firewall.enable = false;
interfaces.eth1 = lib.mkForce {
···
mappings = {
"192.0.2.42" = "2001:db8::2";
};
+
log = [
+
"drop"
+
"reject"
+
"icmp"
+
"self"
+
];
+
wkpfStrict = false;
};
+
environment.systemPackages = [ pkgs.tcpdump ];
};
# The client is configured with static IPv6 addresses. It has also a static
···
};
};
programs.mtr.enable = true;
+
environment.systemPackages = [ pkgs.tcpdump ];
};
};
+13
pkgs/applications/editors/vim/plugins/generated.nix
···
meta.hydraPlatforms = [ ];
+
workspaces-nvim = buildVimPlugin {
+
pname = "workspaces.nvim";
+
version = "2024-10-08";
+
src = fetchFromGitHub {
+
owner = "natecraddock";
+
repo = "workspaces.nvim";
+
rev = "55a1eb6f5b72e07ee8333898254e113e927180ca";
+
sha256 = "143xzg60yiw1aam7sc5rva9bzzmshfzpm2sacimwr8188qsz8xvb";
+
};
+
meta.homepage = "https://github.com/natecraddock/workspaces.nvim/";
+
meta.hydraPlatforms = [ ];
+
};
+
wrapping-nvim = buildVimPlugin {
pname = "wrapping.nvim";
version = "2025-01-16";
+1
pkgs/applications/editors/vim/plugins/vim-plugin-names
···
https://github.com/wannesm/wmgraphviz.vim/,,
https://github.com/vim-scripts/wombat256.vim/,,
https://github.com/lukaszkorecki/workflowish/,,
+
https://github.com/natecraddock/workspaces.nvim/,HEAD,
https://github.com/andrewferrier/wrapping.nvim/,HEAD,
https://github.com/tweekmonster/wstrip.vim/,,
https://github.com/piersolenski/wtf.nvim/,HEAD,
+2 -2
pkgs/applications/editors/vscode/extensions/WakaTime.vscode-wakatime/default.nix
···
mktplcRef = {
name = "vscode-wakatime";
publisher = "WakaTime";
-
version = "25.2.2";
-
hash = "sha256-9Ldb45tCgLaTdntmQlcIPe13ZTeIVGKrHYXLRgLlB0w=";
+
version = "25.3.0";
+
hash = "sha256-cw3wcMr8QKG75VofIsAmlD2RqN/0fGdqhugen/vmJlo=";
};
meta = {
+2 -2
pkgs/applications/editors/vscode/extensions/dbaeumer.vscode-eslint/default.nix
···
mktplcRef = {
name = "vscode-eslint";
publisher = "dbaeumer";
-
version = "3.0.15";
-
hash = "sha256-oeudNCBrHO3yvw3FrFA4EZk1yODcRRfF/y3U5tdEz4I=";
+
version = "3.0.16";
+
hash = "sha256-UxD07bouMK8nuysh5TAV7ZVhkLiOV6R1qfvVZcXB2Hc=";
};
meta = {
+12 -12
pkgs/applications/editors/vscode/extensions/default.nix
···
mktplcRef = {
publisher = "ban";
name = "spellright";
-
version = "3.0.144";
-
hash = "sha256-+JNvChnAi2p04X3VVWgBZQAsF5UpAQpG7fROYtjaHRo=";
+
version = "3.0.146";
+
hash = "sha256-gvj5vWA8VAy5Ohtkn9vsx7MswgVAcxYOLm+ifKhjLz0=";
};
meta = {
description = "Visual Studio Code extension for Spellchecker";
···
mktplcRef = {
publisher = "banacorn";
name = "agda-mode";
-
version = "0.6.2";
-
hash = "sha256-OQHNbzlTnpv2V5ICNTfAC1QM3bDnRgtJvgJKONxvU5M=";
+
version = "0.6.3";
+
hash = "sha256-ZyFY3pzNUUpdAB3lqys/z0NOUrQA/qmPquRPNFw/JAI=";
};
meta = {
changelog = "https://marketplace.visualstudio.com/items/banacorn.agda-mode/changelog";
···
mktplcRef = {
name = "vscode-tailwindcss";
publisher = "bradlc";
-
version = "0.14.25";
-
hash = "sha256-NXA7UDSo6G0Did6tzwgIYnjR+ymoY7V5aUtaFzqlVik=";
+
version = "0.14.26";
+
hash = "sha256-agntfMsLAYASviH7Wuw/W8JwfHRi6qAfuMkqmFWT0bg=";
};
meta = {
changelog = "https://marketplace.visualstudio.com/items/bradlc.vscode-tailwindcss/changelog";
···
mktplcRef = {
publisher = "DanielSanMedium";
name = "dscodegpt";
-
version = "3.13.40";
-
hash = "sha256-2O96Bey2VKj2FdK1nJSYSKE9fltciNbqD/UI7rKlFgY=";
+
version = "3.14.3";
+
hash = "sha256-B0FYMM7usSkQgq7jZfo3uEvERRQ6PrinO36KJGke/Yo=";
};
meta = {
changelog = "https://marketplace.visualstudio.com/items/DanielSanMedium.dscodegpt/changelog";
···
mktplcRef = {
name = "compare-folders";
publisher = "moshfeu";
-
version = "0.25.1";
-
hash = "sha256-axNTdnSkMkFs7LSZCc7VinjbrDncsRHlRtDG9+eh2qQ=";
+
version = "0.25.3";
+
hash = "sha256-QrSh8/AycC5nKbZ1+E3V/lJu/7Skket8b05yPnZg68s=";
};
meta = {
···
mktplcRef = {
name = "volar";
publisher = "Vue";
-
version = "3.0.4";
-
hash = "sha256-Eqg4+jX1dARryfb9Ueb2qng5xwhyaU6cDG089nlLNgc=";
+
version = "3.0.5";
+
hash = "sha256-Ja0zWCHHxd1XE2f2ZQvchqzCKv0pbcAU3uEh2f6+X3c=";
};
meta = {
changelog = "https://github.com/vuejs/language-tools/blob/master/CHANGELOG.md";
+2 -2
pkgs/applications/editors/vscode/extensions/fstarlang.fstar-vscode-assistant/default.nix
···
mktplcRef = {
name = "fstar-vscode-assistant";
publisher = "FStarLang";
-
version = "0.18.1";
-
hash = "sha256-uiw3EJbYoDG5r93NIxloiF7Co3gxcZT9+hlLZFnxkBE=";
+
version = "0.19.1";
+
hash = "sha256-bC9Kzhp4H9wykuitEKQUthYVhmVI/m8H0PloBqoFbvU=";
};
meta = {
description = "Interactive editing mode VS Code extension for F*";
-1
pkgs/applications/editors/vscode/extensions/ndonfris.fish-lsp/default.nix
···
downloadPage = "https://marketplace.visualstudio.com/items?itemName=ndonfris.fish-lsp";
homepage = "https://github.com/ndonfris/fish-lsp";
license = lib.licenses.mit;
-
maintainers = with lib.maintainers; [ tuynia ];
};
}
-1
pkgs/applications/editors/vscode/extensions/oliver-ni.scheme-fmt/default.nix
···
downloadPage = "https://marketplace.visualstudio.com/items?itemName=oliver-ni.scheme-fmt";
homepage = "https://github.com/oliver-ni/scheme-fmt";
license = lib.licenses.cc0;
-
maintainers = with lib.maintainers; [ tuynia ];
};
}
-1
pkgs/applications/editors/vscode/extensions/release-candidate.vscode-scheme-repl/default.nix
···
downloadPage = "https://marketplace.visualstudio.com/items?itemName=release-candidate.vscode-scheme-repl";
homepage = "https://github.com/Release-Candidate/vscode-scheme-repl";
license = lib.licenses.mit;
-
maintainers = with lib.maintainers; [ tuynia ];
};
}
+2 -2
pkgs/applications/editors/vscode/extensions/rooveterinaryinc.roo-cline/default.nix
···
mktplcRef = {
publisher = "RooVeterinaryInc";
name = "roo-cline";
-
version = "3.25.4";
-
hash = "sha256-uyI/VdBpkCxzlm1Ei2v/UjsenhyanDuVXLXk3Pkiw1s=";
+
version = "3.25.10";
+
hash = "sha256-j9ydB6hR+Qx4HvBDMrYGev2K/vsG6ASeOQHhhYheEuw=";
};
passthru.updateScript = vscode-extension-update-script { };
-1
pkgs/applications/editors/vscode/extensions/tsyesika.guile-scheme-enhanced/default.nix
···
downloadPage = "https://marketplace.visualstudio.com/items?itemName=tsyesika.guile-scheme-enhanced";
homepage = "https://codeberg.org/tsyesika/vscode-guile-scheme-enhanced";
license = lib.licenses.asl20;
-
maintainers = with lib.maintainers; [ tuynia ];
};
}
-1
pkgs/applications/editors/vscode/extensions/ufo5260987423.magic-scheme/default.nix
···
downloadPage = "https://marketplace.visualstudio.com/items?itemName=ufo5260987423.magic-scheme";
homepage = "https://github.com/ufo5260987423/magic-scheme";
license = lib.licenses.mit;
-
maintainers = with lib.maintainers; [ tuynia ];
};
}
+3 -3
pkgs/applications/emulators/libretro/cores/dolphin.nix
···
}:
mkLibretroCore {
core = "dolphin";
-
version = "0-unstable-2025-05-17";
+
version = "0-unstable-2025-08-05";
src = fetchFromGitHub {
owner = "libretro";
repo = "dolphin";
-
rev = "a09f78f735f0d2184f64ba5b134abe98ee99c65f";
-
hash = "sha256-NUnWNj47FmH8perfRwFFnaXeU58shUXqKFOzHf4ce5c=";
+
rev = "83438f9b1a2c832319876a1fda130a5e33d4ef87";
+
hash = "sha256-q4y+3uJ1tQ2OvlEvi/JNyIO/RfuWNIEKfVZ6xEWKFCg=";
};
extraNativeBuildInputs = [
+3 -3
pkgs/applications/emulators/libretro/cores/nestopia.nix
···
}:
mkLibretroCore {
core = "nestopia";
-
version = "0-unstable-2025-07-20";
+
version = "0-unstable-2025-08-09";
src = fetchFromGitHub {
owner = "libretro";
repo = "nestopia";
-
rev = "0e82a1642d4acafab4da9ce937954b85d846952b";
-
hash = "sha256-/r1EUb3Z6RaEycGnkU4RtYr0JjohgQmru99DG45OWKo=";
+
rev = "d33852f5efe89c87a06f8ce7d12b8b5451e9ae71";
+
hash = "sha256-v/jXoXgVEIXpxBgHZ/6oL+YGPDv9jefwdetiqLFBN9I=";
};
makefile = "Makefile";
+3 -3
pkgs/applications/networking/cluster/helmfile/default.nix
···
buildGoModule rec {
pname = "helmfile";
-
version = "1.1.3";
+
version = "1.1.4";
src = fetchFromGitHub {
owner = "helmfile";
repo = "helmfile";
rev = "v${version}";
-
hash = "sha256-Nsfqd54QNRkeqUxUA05+0gtcoopz090/wW+zdFsEii8=";
+
hash = "sha256-q0PIvTsl5wbzSNyrJbN6y8nB7yJB3NO2RAvWKr8hmNU=";
};
-
vendorHash = "sha256-fiwxmF91UCTNi3jgrJnWgPswWXQFLg70d+h3frnu7kU=";
+
vendorHash = "sha256-frwwqVmkiWtA6eg4rcd/KbG5CiEoF+rRO66/6WMxawI=";
proxyVendor = true; # darwin/linux hash mismatch
+11 -11
pkgs/applications/networking/cluster/terraform-providers/providers.json
···
"vendorHash": "sha256-ZCMSmOCPEMxCSpl3DjIUGPj1W/KNJgyjtHpmQ19JquA="
},
"datadog": {
-
"hash": "sha256-2BoazJ97yPtp627a5HpAVg9iD2OMIeXSmv5kkdxuTes=",
+
"hash": "sha256-Fi1Ip/Uy89s8XeX5yT55LKjMw/Bk/B/Vwvc0qXTaYbw=",
"homepage": "https://registry.terraform.io/providers/DataDog/datadog",
"owner": "DataDog",
"repo": "terraform-provider-datadog",
-
"rev": "v3.69.0",
+
"rev": "v3.70.0",
"spdx": "MPL-2.0",
-
"vendorHash": "sha256-AQ+/+NCBBj4ptBGHJmibH6QZo4560dRRbs55SqY9buE="
+
"vendorHash": "sha256-IW7v9w3/X+v+AF8eRE4n1KI7MnLWlxkXzTvAJtsQ4Ik="
},
"deno": {
"hash": "sha256-7IvJrhXMeAmf8e21QBdYNSJyVMEzLpat4Tm4zHWglW8=",
···
"vendorHash": "sha256-SsEWNIBkgcdTlSrB4hIvRmhMv2eJ2qQaPUmiN09A+NM="
},
"huaweicloud": {
-
"hash": "sha256-BzWYtn6KVVMq+wjqj3CMPKSzo9DzePIIdnRjJ53nJBI=",
+
"hash": "sha256-LLQFgUy3Hv3HlcL4gnZPdIEcR95fqroKIH4cLyb21Sk=",
"homepage": "https://registry.terraform.io/providers/huaweicloud/huaweicloud",
"owner": "huaweicloud",
"repo": "terraform-provider-huaweicloud",
-
"rev": "v1.77.1",
+
"rev": "v1.77.3",
"spdx": "MPL-2.0",
"vendorHash": null
},
···
"vendorHash": "sha256-QxbZv6YMa5/I4bTeQBNdmG3EKtLEmstnH7HMiZzFJrI="
},
"migadu": {
-
"hash": "sha256-3q9vhHt4VDqcIYHEZjJY0whvGPQWMDHkGsAQEES8EkE=",
+
"hash": "sha256-k7W/oaZeBY5/Wi1vRCD641DKc0KQbBa834WDmtBp5wY=",
"homepage": "https://registry.terraform.io/providers/metio/migadu",
"owner": "metio",
"repo": "terraform-provider-migadu",
-
"rev": "2025.7.17",
+
"rev": "2025.8.7",
"spdx": "0BSD",
-
"vendorHash": "sha256-oipY2hwgRrntCxxHPyH06e8p+0fKfAQwhh2iBI4RGHQ="
+
"vendorHash": "sha256-CokSZ4CgWBCb/MnGK410Lt9rwBq3luceoFAPLLrwT5U="
},
"minio": {
"hash": "sha256-TLWbbWYTjnvxT1LaV3FsL31xHHov8LpDYhA/nchMyMo=",
···
"vendorHash": "sha256-MIO0VHofPtKPtynbvjvEukMNr5NXHgk7BqwIhbc9+u0="
},
"signalfx": {
-
"hash": "sha256-EoehHn7j3nnXzpHEjX4FQSO1na9xSmVpnTiPnTqUrpE=",
+
"hash": "sha256-hNMZbrihV+xlfamXRaGszQRqO8Tn2829rd4+pH83lrU=",
"homepage": "https://registry.terraform.io/providers/splunk-terraform/signalfx",
"owner": "splunk-terraform",
"repo": "terraform-provider-signalfx",
-
"rev": "v9.17.0",
+
"rev": "v9.19.1",
"spdx": "MPL-2.0",
-
"vendorHash": "sha256-404/DlCtz0yAaM8zJ3ngJ2/DwoUJImjIqKYwdigHl4U="
+
"vendorHash": "sha256-wpm7J8kfkm4vDZhZ0koQsgpW5JwWY7DngSYXfaWh3FQ="
},
"skytap": {
"hash": "sha256-JII4czazo6Di2sad1uFHMKDO2gWgZlQE8l/+IRYHQHU=",
-1
pkgs/applications/science/math/mathematica/default.nix
···
license = licenses.unfree;
sourceProvenance = with sourceTypes; [ binaryNativeCode ];
maintainers = with maintainers; [
-
herberteuler
rafaelrc
];
platforms = [ "x86_64-linux" ];
+3 -3
pkgs/applications/video/mpv/scripts/skipsilence.nix
···
buildLua {
pname = "mpv-skipsilence";
-
version = "0-unstable-2024-05-06";
+
version = "0-unstable-2025-08-03";
src = fetchFromGitHub {
owner = "ferreum";
repo = "mpv-skipsilence";
-
rev = "5ae7c3b6f927e728c22fc13007265682d1ecf98c";
-
hash = "sha256-fg8vfeb68nr0bTBIvr0FnRnoB48/kV957pn22tWcz1g=";
+
rev = "42e511c52c68c1aa9678e18caea41e43eee9149b";
+
hash = "sha256-+sOMWFFumJUk5gFE1iCTvWub3PWzYOkulXJLCGS4fYA=";
};
passthru.updateScript = unstableGitUpdater { };
+3 -3
pkgs/by-name/al/all-the-package-names/package.nix
···
buildNpmPackage rec {
pname = "all-the-package-names";
-
version = "2.0.2159";
+
version = "2.0.2168";
src = fetchFromGitHub {
owner = "nice-registry";
repo = "all-the-package-names";
tag = "v${version}";
-
hash = "sha256-7c4cxGSBc60WTLjRptb8VbTf279BxDgVOiVaP4C7pKk=";
+
hash = "sha256-iHwmvrDIiBMoH1LBrAbYvI/qPebTJIlvaOl6KxXJ+O8=";
};
-
npmDepsHash = "sha256-fDQnEjPefRBbpCX21vZrJ3Y8y7d3PgM54IfPJbb44ao=";
+
npmDepsHash = "sha256-WxgcuQx/raixX4Y2diyDM5cAhsfFCUrNt+z02VC3Ng4=";
passthru.updateScript = nix-update-script { };
+69 -25
pkgs/by-name/am/amp-cli/package-lock.json
···
"packages": {
"": {
"dependencies": {
-
"@sourcegraph/amp": "^0.0.1754036264-ga0aa13"
+
"@sourcegraph/amp": "^0.0.1754827277-g1b1a5d"
}
},
"node_modules/@colors/colors": {
···
"kuler": "^2.0.0"
}
},
-
"node_modules/@luxass/strip-json-comments": {
-
"version": "1.4.0",
-
"resolved": "https://registry.npmjs.org/@luxass/strip-json-comments/-/strip-json-comments-1.4.0.tgz",
-
"integrity": "sha512-Zl343to4u/t8jz1q7R/1UY6hLX+344cwPLEXsIYthVwdU5zyjuVBGcpf2E24+QZkwFfRfmnHTcscreQzWn3hiA==",
-
"license": "MIT",
-
"engines": {
-
"node": ">=18"
-
}
-
},
"node_modules/@sourcegraph/amp": {
-
"version": "0.0.1754036264-ga0aa13",
-
"resolved": "https://registry.npmjs.org/@sourcegraph/amp/-/amp-0.0.1754036264-ga0aa13.tgz",
-
"integrity": "sha512-76U1LuEOPUuJcVyMvRkblfvQChJutVZcgCJ4DB/rwke2yxXp2rhdqAOd1bHc2qWrH/nlWX+2BBZY1wTZgAVxRg==",
+
"version": "0.0.1754827277-g1b1a5d",
+
"resolved": "https://registry.npmjs.org/@sourcegraph/amp/-/amp-0.0.1754827277-g1b1a5d.tgz",
+
"integrity": "sha512-P7PAvlEuRFz0dfpgErRe9brm00+1/I0xK2ym8QWt+hY6ITXtAFMbxJKELcsVpJwgSTJeFs3LUyj9glrJHdNMmw==",
"dependencies": {
"ansi-regex": "^6.1.0",
"commander": "^11.1.0",
"fuse.js": "^7.0.0",
-
"jsonc-parse": "^1.5.5",
+
"jsonc-parser": "^3.3.1",
"open": "^10.1.2",
"open-simplex-noise": "^2.5.0",
"runes": "^0.4.3",
"string-width": "^6.1.0",
"winston": "^3.17.0",
+
"wrap-ansi": "^9.0.0",
"xdg-basedir": "^5.1.0"
},
"bin": {
···
"url": "https://github.com/chalk/ansi-regex?sponsor=1"
}
},
+
"node_modules/ansi-styles": {
+
"version": "6.2.1",
+
"resolved": "https://registry.npmjs.org/ansi-styles/-/ansi-styles-6.2.1.tgz",
+
"integrity": "sha512-bN798gFfQX+viw3R7yrGWRqnrN2oRkEkUjjl4JNn4E8GxxbjtG3FbrEIIY3l8/hrwUwIeCZvi4QuOTP4MErVug==",
+
"license": "MIT",
+
"engines": {
+
"node": ">=12"
+
},
+
"funding": {
+
"url": "https://github.com/chalk/ansi-styles?sponsor=1"
+
}
+
},
"node_modules/async": {
"version": "3.2.6",
"resolved": "https://registry.npmjs.org/async/-/async-3.2.6.tgz",
···
"node": ">=10"
}
},
+
"node_modules/get-east-asian-width": {
+
"version": "1.3.0",
+
"resolved": "https://registry.npmjs.org/get-east-asian-width/-/get-east-asian-width-1.3.0.tgz",
+
"integrity": "sha512-vpeMIQKxczTD/0s2CdEWHcb0eeJe6TFjxb+J5xgX7hScxqrGuyjmv4c1D4A/gelKfyox0gJJwIHF+fLjeaM8kQ==",
+
"license": "MIT",
+
"engines": {
+
"node": ">=18"
+
},
+
"funding": {
+
"url": "https://github.com/sponsors/sindresorhus"
+
}
+
},
"node_modules/inherits": {
"version": "2.0.4",
"resolved": "https://registry.npmjs.org/inherits/-/inherits-2.0.4.tgz",
···
"url": "https://github.com/sponsors/sindresorhus"
}
},
-
"node_modules/jsonc-parse": {
-
"version": "1.5.5",
-
"resolved": "https://registry.npmjs.org/jsonc-parse/-/jsonc-parse-1.5.5.tgz",
-
"integrity": "sha512-6xSVqUb+VBwXSJoyDPzgK1toG+JoOcfjWrmZNBL5ZmKnokV9dLshqyLU8NkcLavKbT5tKEr+3T0d4/7d+wVdVw==",
-
"license": "MIT",
-
"dependencies": {
-
"@luxass/strip-json-comments": "^1.3.2"
-
},
-
"engines": {
-
"node": ">=18"
-
}
+
"node_modules/jsonc-parser": {
+
"version": "3.3.1",
+
"resolved": "https://registry.npmjs.org/jsonc-parser/-/jsonc-parser-3.3.1.tgz",
+
"integrity": "sha512-HUgH65KyejrUFPvHFPbqOY0rsFip3Bo5wb4ngvdi1EpCYWUQDC5V+Y7mZws+DLkr4M//zQJoanu1SP+87Dv1oQ==",
+
"license": "MIT"
},
"node_modules/kuler": {
"version": "2.0.0",
···
},
"engines": {
"node": ">= 12.0.0"
+
}
+
},
+
"node_modules/wrap-ansi": {
+
"version": "9.0.0",
+
"resolved": "https://registry.npmjs.org/wrap-ansi/-/wrap-ansi-9.0.0.tgz",
+
"integrity": "sha512-G8ura3S+3Z2G+mkgNRq8dqaFZAuxfsxpBB8OCTGRTCtp+l/v9nbFNmCUP1BZMts3G1142MsZfn6eeUKrr4PD1Q==",
+
"license": "MIT",
+
"dependencies": {
+
"ansi-styles": "^6.2.1",
+
"string-width": "^7.0.0",
+
"strip-ansi": "^7.1.0"
+
},
+
"engines": {
+
"node": ">=18"
+
},
+
"funding": {
+
"url": "https://github.com/chalk/wrap-ansi?sponsor=1"
+
}
+
},
+
"node_modules/wrap-ansi/node_modules/string-width": {
+
"version": "7.2.0",
+
"resolved": "https://registry.npmjs.org/string-width/-/string-width-7.2.0.tgz",
+
"integrity": "sha512-tsaTIkKW9b4N+AEj+SVA+WhJzV7/zMhcSu78mLKWSk7cXMOSHsBKFWUs0fWwq8QyK3MgJBQRX6Gbi4kYbdvGkQ==",
+
"license": "MIT",
+
"dependencies": {
+
"emoji-regex": "^10.3.0",
+
"get-east-asian-width": "^1.0.0",
+
"strip-ansi": "^7.1.0"
+
},
+
"engines": {
+
"node": ">=18"
+
},
+
"funding": {
+
"url": "https://github.com/sponsors/sindresorhus"
}
},
"node_modules/xdg-basedir": {
+3 -3
pkgs/by-name/am/amp-cli/package.nix
···
buildNpmPackage (finalAttrs: {
pname = "amp-cli";
-
version = "0.0.1754036264-ga0aa13";
+
version = "0.0.1754827277-g1b1a5d";
src = fetchzip {
url = "https://registry.npmjs.org/@sourcegraph/amp/-/amp-${finalAttrs.version}.tgz";
-
hash = "sha256-+pvxRLoluRk6/XfPr5luW2oIAjWTCYMJo53wHzQh598=";
+
hash = "sha256-7LOp4/jpdxkeKi++vZGogobNiQpMqd5zMeCQywgc/wg=";
};
postPatch = ''
···
chmod +x bin/amp-wrapper.js
'';
-
npmDepsHash = "sha256-Xm/uZAf9bDasHGIhcS2G8JUo3GyTdnErjzU7clkFQW0=";
+
npmDepsHash = "sha256-6n+1fzet/JwLzaL9Z0ALIFY7Z0yaCwRCrv+73DxNkiY=";
propagatedBuildInputs = [
ripgrep
+3 -3
pkgs/by-name/au/automatic-timezoned/package.nix
···
rustPlatform.buildRustPackage rec {
pname = "automatic-timezoned";
-
version = "2.0.84";
+
version = "2.0.85";
src = fetchFromGitHub {
owner = "maxbrunet";
repo = "automatic-timezoned";
rev = "v${version}";
-
sha256 = "sha256-Ul9bzMC8MfbfE4PDi3O8mhsImbspOcBDqTZOoVVeP/0=";
+
sha256 = "sha256-1Fsc33ZIZsXCPe0WuhFEO6HjSqrvzYoR6QD/MMPxVjA=";
};
-
cargoHash = "sha256-GroKztTpPWTw/tyrPWfld1ix0BnkjphwHM3J/17byqM=";
+
cargoHash = "sha256-Gbb5+4RXZGebqGDcwVSXAipaQ3fA0Tu7jhQXnSyW9O0=";
meta = {
description = "Automatically update system timezone based on location";
+3 -3
pkgs/by-name/ba/balena-cli/package.nix
···
in
buildNpmPackage' rec {
pname = "balena-cli";
-
version = "22.1.5";
+
version = "22.2.4";
src = fetchFromGitHub {
owner = "balena-io";
repo = "balena-cli";
rev = "v${version}";
-
hash = "sha256-5ltVQHye4miXA7W201n4XakP1eVyfFWzzaP+I7iKwOg=";
+
hash = "sha256-d0buLOiCHBpGhzduOCfJk+hraqS/njz1PTOD8QZSt8k=";
};
-
npmDepsHash = "sha256-oYwysy/gBJZ3akTjkdZEaX3KfdBmoaXEPbdXZNs8Ds8=";
+
npmDepsHash = "sha256-7qecvPiJeV1rOLnI76WNwRGmx6PVCPHH5M/+OH+8l3I=";
postPatch = ''
ln -s npm-shrinkwrap.json package-lock.json
+3 -3
pkgs/by-name/ba/bazel-watcher/package.nix
···
buildGoModule rec {
pname = "bazel-watcher";
-
version = "0.26.8";
+
version = "0.26.10";
src = fetchFromGitHub {
owner = "bazelbuild";
repo = "bazel-watcher";
rev = "v${version}";
-
hash = "sha256-lAIIu6DWFQOwY6KFDaNVZg/H1pn2/eFmoqjtSGqBhMk=";
+
hash = "sha256-OrOJ24XdYASOgO8170M0huVGYubH8MJ0tbp0hvqmN/w=";
};
-
vendorHash = "sha256-wbQY493O2d/fa46/qvCzBpv9OY1YPQjTEqHtT0A9EV0=";
+
vendorHash = "sha256-JkEJyrBY70+XO9qjw/t2qCayhVQzRkTEp/NXFTr+pXY=";
# The dependency github.com/fsnotify/fsevents requires CGO
env.CGO_ENABLED = if stdenv.hostPlatform.isDarwin then "1" else "0";
+3 -3
pkgs/by-name/br/brutespray/package.nix
···
buildGoModule (finalAttrs: {
pname = "brutespray";
-
version = "2.3.1";
+
version = "2.4.0";
src = fetchFromGitHub {
owner = "x90skysn3k";
repo = "brutespray";
tag = "v${finalAttrs.version}";
-
hash = "sha256-oH7Gun/nKScv2buLwM6faiz9/3sl9l4JzkKbdTnGz0Q=";
+
hash = "sha256-tws3BvVQSlGcBgiJ8Ho7V/KJjzoq3TEOiChqTzrMbiU=";
};
-
vendorHash = "sha256-TBLjCXb1W5FHBrzxBI0/3NMuM9eCizLiz489jyZsEso=";
+
vendorHash = "sha256-Fe3W5rlKygw4z5bF+6xy5mv86wKcBuCf3nhtdtFWJPM=";
nativeBuildInputs = [ makeBinaryWrapper ];
+3 -3
pkgs/by-name/ch/cht-sh/package.nix
···
stdenv.mkDerivation {
pname = "cht.sh";
-
version = "0-unstable-2025-07-29";
+
version = "0-unstable-2025-08-08";
nativeBuildInputs = [ makeWrapper ];
src = fetchFromGitHub {
owner = "chubin";
repo = "cheat.sh";
-
rev = "bae856b96329e205967c74b3803023cb2b655df9";
-
sha256 = "7k/9DLSO1D+1BvTlRZBHOvz++LMw1DcpOL5LIb7VUXw=";
+
rev = "b714a5f0d56427924a7871f083fd05e7ede6b0e4";
+
sha256 = "JkqHxHgs7gUk511CSJ/sLEBWCAYig1lqfslhABDNMGI=";
};
# Fix ".cht.sh-wrapped" in the help message
+3 -3
pkgs/by-name/cl/clickhouse-backup/package.nix
···
buildGoModule rec {
pname = "clickhouse-backup";
-
version = "2.6.30";
+
version = "2.6.33";
src = fetchFromGitHub {
owner = "Altinity";
repo = "clickhouse-backup";
rev = "v${version}";
-
hash = "sha256-9CxmMCtrQlHO9Q7gGMN0mIKVERjdef9IB6YUXXuJxeg=";
+
hash = "sha256-H8LwinH9/J2QawzVggt9vA7/oqaTXy02xqqlGPNtZvc=";
};
-
vendorHash = "sha256-tv5UaHoZTEAjo0jgbHRZHN6xiCNaexED+NG7cBDtiWA=";
+
vendorHash = "sha256-LTljOVQI1fRXvo0cfsiT6SU4Q9t5dyaCuHBq/BiVe/w=";
ldflags = [
"-X main.version=${version}"
+2 -2
pkgs/by-name/co/copybara/package.nix
···
}:
stdenv.mkDerivation (finalAttrs: {
pname = "copybara";
-
version = "20250728";
+
version = "20250804";
src = fetchurl {
url = "https://github.com/google/copybara/releases/download/v${finalAttrs.version}/copybara_deploy.jar";
-
hash = "sha256-/ulX5Q+P6ViiDcdwRpd9zhJAQiFULzU2fSXvfOk36xo=";
+
hash = "sha256-lus3WEwpd9TIGy7IO11d8eZ3S6J/jHzWRFQ76gRiVXg=";
};
nativeBuildInputs = [
+3 -3
pkgs/by-name/cu/cubeb/package.nix
···
stdenv.mkDerivation (finalAttrs: {
pname = "cubeb";
-
version = "0-unstable-2025-07-10";
+
version = "0-unstable-2025-08-05";
src = fetchFromGitHub {
owner = "mozilla";
repo = "cubeb";
-
rev = "fa021607121360af7c171d881dc5bc8af7bb56eb";
-
hash = "sha256-6PUHUPybe3g5nexunAHsHLThFdvpnv+avks+C0oYih0=";
+
rev = "d78a19ba4a892abfdfd7eeeb19fa7ffe3d80938c";
+
hash = "sha256-sjv5XKZu9uX2y2HN+BFttOsb6bECEpl0oRneYxNOZgU=";
};
outputs = [
+2 -2
pkgs/by-name/eg/eggnog-mapper/package.nix
···
python3Packages.buildPythonApplication rec {
pname = "eggnog-mapper";
-
version = "2.1.12";
+
version = "2.1.13";
format = "setuptools";
src = fetchFromGitHub {
owner = "eggnogdb";
repo = "eggnog-mapper";
tag = version;
-
hash = "sha256-+luxXQmtGufYrA/9Ak3yKzbotOj2HM3vhIoOxE+Ty1U=";
+
hash = "sha256-Gu4D8DBvgCPlO+2MjeNZy6+lNqsIlksegWmmYvEZmUU=";
};
postPatch = ''
+2 -2
pkgs/by-name/er/ergo/package.nix
···
stdenv.mkDerivation rec {
pname = "ergo";
-
version = "6.0.0";
+
version = "6.0.1";
src = fetchurl {
url = "https://github.com/ergoplatform/ergo/releases/download/v${version}/ergo-${version}.jar";
-
sha256 = "sha256-gHDXMirYSXMpBISMDW+Wh3o7BZuWnBG8CXV/thMh/Ww=";
+
sha256 = "sha256-ByvHXgXFdoHbc+lWEK82I/I50Q1aoe3SSI2JeaTjEC4=";
};
nativeBuildInputs = [ makeWrapper ];
+4 -4
pkgs/by-name/ev/evcc/package.nix
···
}:
let
-
version = "0.207.0";
+
version = "0.207.2";
src = fetchFromGitHub {
owner = "evcc-io";
repo = "evcc";
tag = version;
-
hash = "sha256-gaTY+9MB3nPRD2bOnWYS+vALRR9eHkFNCrEEMspE5ck=";
+
hash = "sha256-bBW2HU2TijUC6pn3gH23JTTGy5BWSm+V6BBsiYqi6U0=";
};
-
vendorHash = "sha256-cn7zqhBJblDPl7H8BJtWZ2+ckTKVlqBIwwuXNGwrXdk=";
+
vendorHash = "sha256-VITdJ23xrO346EOlNe5uoOKcsQ76x+Yb7Vhl0/H+WTI=";
commonMeta = with lib; {
license = licenses.mit;
···
npmDeps = fetchNpmDeps {
inherit src;
-
hash = "sha256-yQ+MnXjixNQfWSVnRzmxRtQAvLecdLMDQSXyuIdzGnU=";
+
hash = "sha256-GB57pXfWo1lduVDPPw7TBM8qgCmTxPDxKQyD4ZZJnjE=";
};
nativeBuildInputs = [
+2 -2
pkgs/by-name/fc/fcitx5-pinyin-moegirl/package.nix
···
}:
stdenvNoCC.mkDerivation (finalAttrs: {
pname = "fcitx5-pinyin-moegirl";
-
version = "20250711";
+
version = "20250810";
src = fetchurl {
url = "https://github.com/outloudvi/mw2fcitx/releases/download/${finalAttrs.version}/moegirl.dict";
-
hash = "sha256-kjdgsq5n+7rjPBrXOjrb13+JLPLeXNQFv9uhl4NSszM=";
+
hash = "sha256-PuuW43+uu9Vasy33KW1IKb2uK2mh8M/V9fVCVp1QZl0=";
};
dontUnpack = true;
+2 -2
pkgs/by-name/fc/fcitx5-pinyin-zhwiki/package.nix
···
stdenvNoCC.mkDerivation (finalAttrs: {
pname = "fcitx5-pinyin-zhwiki";
version = "0.2.5";
-
date = "20250415";
+
date = "20250731";
src = fetchurl {
url = "https://github.com/felixonmars/fcitx5-pinyin-zhwiki/releases/download/${finalAttrs.version}/zhwiki-${finalAttrs.date}.dict";
-
hash = "sha256-8dFBoP3UcYCl6EYojn14Bp7aYe/Z9cf4drSmeheHbLw=";
+
hash = "sha256-pS2fVLfihJGgKA1XsW1x0VanfhjHgDGtsqedpmvdUnE=";
};
dontUnpack = true;
+2 -2
pkgs/by-name/fo/foxglove-cli/package.nix
···
}:
buildGoModule (finalAttrs: {
pname = "foxglove-cli";
-
version = "1.0.24";
+
version = "1.0.25";
src = fetchFromGitHub {
owner = "foxglove";
repo = "foxglove-cli";
tag = "v${finalAttrs.version}";
-
hash = "sha256-JYaBVXSKn4zgWHq+s/tMgHCpQ2z5ZYh/+e+ex4MaUmo=";
+
hash = "sha256-zmX3eCh5NYCbYlbx6bIxwF6Qktj+kwV4KpVsTI9ofZ8=";
};
vendorHash = "sha256-fL/eOGx81pdIPWHt14cf4VoIqmfUmbkKa8/y0QQKYko=";
+3 -3
pkgs/by-name/fx/fx/package.nix
···
buildGoModule (finalAttrs: {
pname = "fx";
-
version = "38.0.0";
+
version = "39.0.1";
src = fetchFromGitHub {
owner = "antonmedv";
repo = "fx";
tag = finalAttrs.version;
-
hash = "sha256-9g9xtnmM3ANsvfxqE8pMTxiiUj+uQadhBooRQYKQpTg=";
+
hash = "sha256-KVnPESE0Fp1liOZtpDgNpAggROnGHYdefAAECkbgZDE=";
};
-
vendorHash = "sha256-yVAoswClpf5+1nwLyrLKLYFt9Noh2HRemif1e1nWm7M=";
+
vendorHash = "sha256-7x0nbgMzEJznDH6Wf5iaTYXLh/2IGUSeSVvb0UKKTOQ=";
ldflags = [ "-s" ];
+2 -2
pkgs/by-name/gi/git-repo/package.nix
···
stdenv.mkDerivation rec {
pname = "git-repo";
-
version = "2.57.2";
+
version = "2.57.3";
src = fetchFromGitHub {
owner = "android";
repo = "tools_repo";
rev = "v${version}";
-
hash = "sha256-B8Z5qkjUrydjWTeAanDHMn7C2qVIIqb90zJ6WrI6fgI=";
+
hash = "sha256-QJr1srOHcCnIQZNz56+zBlKs5ZA0/yDfhILek7pBx1Q=";
};
# Fix 'NameError: name 'ssl' is not defined'
+2 -2
pkgs/by-name/gi/github-backup/package.nix
···
python3Packages.buildPythonApplication rec {
pname = "github-backup";
-
version = "0.50.2";
+
version = "0.50.3";
pyproject = true;
src = fetchFromGitHub {
owner = "josegonzalez";
repo = "python-github-backup";
tag = version;
-
hash = "sha256-MUPQa1L3HmAMn1pZSzQk8VKpcz2nDGuWZB8pVi7CyYs=";
+
hash = "sha256-MBKBY86qIM/rgvGMvE7K9x9n+zDVtoimkVGLBxCWRmI=";
};
build-system = with python3Packages; [
+5 -5
pkgs/by-name/go/google-chrome/package.nix
···
linux = stdenvNoCC.mkDerivation (finalAttrs: {
inherit pname meta passthru;
-
version = "138.0.7204.183";
+
version = "139.0.7258.66";
src = fetchurl {
url = "https://dl.google.com/linux/chrome/deb/pool/main/g/google-chrome-stable/google-chrome-stable_${finalAttrs.version}-1_amd64.deb";
-
hash = "sha256-GxdfHU6pskOL0i/rmN7kwGsuLYTotL1mEw6RV7qfl50=";
+
hash = "sha256-DY1hFlYKVSWRYuK1DGaqxr4x+kEmXnr/GsKBC39rCxk=";
};
# With strictDeps on, some shebangs were not being patched correctly
···
darwin = stdenvNoCC.mkDerivation (finalAttrs: {
inherit pname meta passthru;
-
version = "138.0.7204.184";
+
version = "139.0.7258.67";
src = fetchurl {
-
url = "http://dl.google.com/release2/chrome/acvbvqaeyyrjo6kygs27pc5y27ea_138.0.7204.184/GoogleChrome-138.0.7204.184.dmg";
-
hash = "sha256-KM9fK5zaXNCdVfCRN9b0RxIvH7VxCln4Eo9YgOEd8PY=";
+
url = "http://dl.google.com/release2/chrome/l4kjdkw5j5zarcsucmoo3n4idi_139.0.7258.67/GoogleChrome-139.0.7258.67.dmg";
+
hash = "sha256-IfJlHRpMZy1DFmOC6yZ5dphchdOSvUYf7s3+ngQ7pL4=";
};
dontPatch = true;
+3 -3
pkgs/by-name/go/gose/package.nix
···
lib,
}:
let
-
version = "0.11.1";
+
version = "0.11.2";
src = fetchFromGitHub {
repo = "gose";
owner = "stv0g";
tag = "v${version}";
-
hash = "sha256-Wz3gcx9/wrSfiHkOGnjAoUFfN0tiA1C+31GlnHqL3M0=";
+
hash = "sha256-AeGrnRnKThv29wFopx91BSep22WFkkKkUsTa7qFQOzs=";
};
frontend = buildNpmPackage {
···
inherit version;
inherit src;
-
vendorHash = "sha256-HsYF4v7RUzGDJvZEoq0qTo9iPGJoqK4YqTsXSv8SwKQ=";
+
vendorHash = "sha256-9qQXk8XyvVsussu5YfoSrjEul0E1301W019vTVSgnkk=";
env.CGO_ENABLED = 0;
+2 -2
pkgs/by-name/ha/halo/package.nix
···
}:
stdenv.mkDerivation rec {
pname = "halo";
-
version = "2.21.4";
+
version = "2.21.6";
src = fetchurl {
url = "https://github.com/halo-dev/halo/releases/download/v${version}/halo-${version}.jar";
-
hash = "sha256-RoisTthVRq6UGTE5jRdo6tL/3UVaOu1/3XPpwyLQV4g=";
+
hash = "sha256-kMz97dsWUbP4taRjxS84I+NWPyefVlP/WaY6pk7K6Q0=";
};
nativeBuildInputs = [
+3 -3
pkgs/by-name/ho/holo-cli/package.nix
···
rustPlatform.buildRustPackage (finalAttrs: {
pname = "holo-cli";
-
version = "0.5.0-unstable-2025-07-01";
+
version = "0.5.0-unstable-2025-08-07";
src = fetchFromGitHub {
owner = "holo-routing";
repo = "holo-cli";
-
rev = "f04c1d0dcd6d800e079f33b8431b17fa00afeeb1";
-
hash = "sha256-ZJeXGT5oajynk44550W4qz+OZEx7y52Wwy+DYzrHZig=";
+
rev = "e786bb16e5e6b78989dc3b4e3299b283432dfa26";
+
hash = "sha256-uqRgitI4D2H9igVdnwuNnc3frRiEZ85/DILp6FzGQ+0=";
};
cargoHash = "sha256-bsoxWjOMzRRtFGEaaqK0/adhGpDcejCIY0Pzw1HjQ5U=";
+3 -3
pkgs/by-name/ho/home-manager/package.nix
···
stdenvNoCC.mkDerivation (finalAttrs: {
pname = "home-manager";
-
version = "0-unstable-2025-07-28";
+
version = "0-unstable-2025-08-06";
src = fetchFromGitHub {
name = "home-manager-source";
owner = "nix-community";
repo = "home-manager";
-
rev = "f49e872f55e36e67ebcb906ff65f86c7a1538f7c";
-
hash = "sha256-vojVM0SgFP8crFh1LDDXkzaI9/er/1cuRfbNPhfBHyc=";
+
rev = "13461dec40bf03d9196ff79d1abe48408268cc35";
+
hash = "sha256-V0iiDcYvNeMOP2FyfgC4H8Esx+JodXEl80lD4hFD4SI=";
};
nativeBuildInputs = [
+2 -2
pkgs/by-name/jd/jd-diff-patch/package.nix
···
buildGoModule (finalAttrs: {
pname = "jd-diff-patch";
-
version = "2.2.3";
+
version = "2.2.5";
src = fetchFromGitHub {
owner = "josephburnett";
repo = "jd";
rev = "v${finalAttrs.version}";
-
hash = "sha256-ucSJfzkcOpLfI2IcsnKvjpR/hwHNne+liE1b/L/H96g=";
+
hash = "sha256-E11Hd2uvF5LrgrWpR8OzXqEjoUrBkBHDDuuCujznfbE=";
};
sourceRoot = "${finalAttrs.src.name}/v2";
+3 -3
pkgs/by-name/je/jellyfin-tui/package.nix
···
rustPlatform.buildRustPackage rec {
pname = "jellyfin-tui";
-
version = "1.2.3";
+
version = "1.2.4";
src = fetchFromGitHub {
owner = "dhonus";
repo = "jellyfin-tui";
tag = "v${version}";
-
hash = "sha256-gT6Zs32BhSfwH+JjwJcY9wK7WrqGuaWP+q/2rF8gp4M=";
+
hash = "sha256-fRlnfCHjUZWvp+pYxLUXFxW/nR7Glhhfm4YQKLR2XaY=";
};
-
cargoHash = "sha256-U298pYDYzaRdU5w3FWHMkgaCT15aUTZITroVcEJ1Q0w=";
+
cargoHash = "sha256-VUg96qyTF7XkZsl4wl70u5S9NqgRCGJ4od8Cj4dSoI8=";
nativeBuildInputs = [ pkg-config ];
buildInputs = [
+2 -2
pkgs/by-name/kn/knowsmore/package.nix
···
python3.pkgs.buildPythonApplication rec {
pname = "knowsmore";
-
version = "0.1.45";
+
version = "0.1.46";
pyproject = true;
src = fetchFromGitHub {
owner = "helviojunior";
repo = "knowsmore";
tag = "v${version}";
-
hash = "sha256-Z0N98P1vh9nhqOzlkL/BgqQrybeig5TrHsg1K4jqGxw=";
+
hash = "sha256-yY3BLouIUvSBeNlq4XcEHKLi00BWeGUXNOP2p5NIFXc=";
};
pythonRelaxDeps = [
+2 -2
pkgs/by-name/lo/local-content-share/package.nix
···
buildGoModule (finalAttrs: {
pname = "local-content-share";
-
version = "31";
+
version = "32";
src = fetchFromGitHub {
owner = "Tanq16";
repo = "local-content-share";
tag = "v${finalAttrs.version}";
-
hash = "sha256-BVO804Ndjbg4uEE1bufZcGZxEVdraV29LJ6yBWXTakA=";
+
hash = "sha256-2TgamuHDASwSKshPkNLAnwnnCU23SvdXWv6sU++yBII=";
};
vendorHash = null;
+3 -3
pkgs/by-name/ma/matrix-alertmanager-receiver/package.nix
···
buildGoModule (finalAttrs: {
pname = "matrix-alertmanager-receiver";
-
version = "2025.7.30";
+
version = "2025.8.6";
src = fetchFromGitHub {
owner = "metio";
repo = "matrix-alertmanager-receiver";
tag = finalAttrs.version;
-
hash = "sha256-2zTkRXXXMMphNyw/OeiIAmc4KP0LqN6M0vtpX/7fhoI=";
+
hash = "sha256-rnGKpJppR7NoOAx/jGt7vxr1EVok3tMzkr9ry/k57L8=";
};
-
vendorHash = "sha256-zOaAvPCAEQkJMogJ6ly0jkHfj+SAlFqk5m+eQdsaxK4=";
+
vendorHash = "sha256-JMjfrSdaN2zXgACkPddQ9h7SLV6jhpUvFTk56UfPWJg=";
env.CGO_ENABLED = "0";
+3 -3
pkgs/by-name/me/melange/package.nix
···
buildGoModule rec {
pname = "melange";
-
version = "0.30.1";
+
version = "0.30.5";
src = fetchFromGitHub {
owner = "chainguard-dev";
repo = "melange";
rev = "v${version}";
-
hash = "sha256-BHeWrT0naxHLgd91xLTDHdDCt7piItPJMyjrRWQb2cA=";
+
hash = "sha256-df8CHUVHvSK1nFpJIuVHmwbHsigwZLL5UwA0/V6NkxE=";
# populate values that require us to use git. By doing this in postFetch we
# can delete .git afterwards and maintain better reproducibility of the src.
leaveDotGit = true;
···
'';
};
-
vendorHash = "sha256-K2i9cQIcRkLbGIcGtEMo/PHO6pV2UXo/JgKdndWI7KM=";
+
vendorHash = "sha256-hyE/5P2EabICjueTln2zBmdIK73OqteWwmT5mSf7vXE=";
subPackages = [ "." ];
+52
pkgs/by-name/ni/nixseparatedebuginfod2/package.nix
···
+
{
+
lib,
+
fetchFromGitHub,
+
rustPlatform,
+
libarchive,
+
openssl,
+
pkg-config,
+
bubblewrap,
+
elfutils,
+
nix,
+
nixosTests,
+
}:
+
+
rustPlatform.buildRustPackage rec {
+
pname = "nixseparatedebuginfod2";
+
version = "0.1.0";
+
+
src = fetchFromGitHub {
+
owner = "symphorien";
+
repo = "nixseparatedebuginfod2";
+
tag = "v${version}";
+
hash = "sha256-bk+l/oWAPuWV6mnh9Pr/mru3BZjos08IfzEGUEFSW1E=";
+
};
+
+
cargoHash = "sha256-HmtFso6uF2GsjIA0FPVL4S3S+lwQUrg7N576UaekXpU=";
+
+
buildInputs = [
+
libarchive
+
openssl
+
];
+
+
nativeBuildInputs = [ pkg-config ];
+
+
nativeCheckInputs = [
+
bubblewrap
+
elfutils
+
nix
+
];
+
+
env.OPENSSL_NO_VENDOR = "1";
+
+
passthru.tests = { inherit (nixosTests) nixseparatedebuginfod2; };
+
+
meta = {
+
description = "Downloads and provides debug symbols and source code for nix derivations to gdb and other debuginfod-capable debuggers as needed";
+
homepage = "https://github.com/symphorien/nixseparatedebuginfod2";
+
license = lib.licenses.gpl3Only;
+
maintainers = [ lib.maintainers.symphorien ];
+
platforms = lib.platforms.linux;
+
mainProgram = "nixseparatedebuginfod2";
+
};
+
}
+3 -3
pkgs/by-name/oh/oh-my-zsh/package.nix
···
}:
stdenv.mkDerivation rec {
-
version = "2025-07-28";
+
version = "2025-08-08";
pname = "oh-my-zsh";
src = fetchFromGitHub {
owner = "ohmyzsh";
repo = "ohmyzsh";
-
rev = "5c804257ceb5b3062b876afae290adf72c474aad";
-
sha256 = "sha256-LSyabJIVuLdocx2fy5mVGFVX45gDxzm4hGDyF8yihZ4=";
+
rev = "9d8d4cf41482a95127ca41faecc0a7ee0781ca2e";
+
sha256 = "sha256-u98vvBhGYfvfYmo/J8hBc6bDui5HVlgM3hY32LwJGio=";
};
strictDeps = true;
+1 -1
pkgs/by-name/ol/olivetin/package.nix
···
'';
outputHashMode = "recursive";
-
outputHash = "sha256-4mmpiI2GhjMBp662/+DiM7SjEd1cPhF/A4YpyU04/Fs=";
+
outputHash = "sha256-o+Zt3rmTK7NmBQ9hDlbxZySUlCx6Ks7yQTtdm9+pJac=";
};
webui = buildNpmPackage {
+145 -145
pkgs/by-name/om/omnisharp-roslyn/deps.json
···
},
{
"pname": "ICSharpCode.Decompiler",
-
"version": "8.2.0.7535",
-
"hash": "sha256-4BWs04Va9pc/SLeMA/vKoBydhw+Bu6s9MDtoo/Ucft8="
+
"version": "9.1.0.7988",
+
"hash": "sha256-zPLgLNO4cCrtN9BR9x6X+W0MNkQ71nADIopOC1VBhAQ="
},
{
"pname": "McMaster.Extensions.CommandLineUtils",
···
"pname": "Microsoft.Bcl.AsyncInterfaces",
"version": "8.0.0",
"hash": "sha256-9aWmiwMJKrKr9ohD1KSuol37y+jdDxPGJct3m2/Bknw="
+
},
+
{
+
"pname": "Microsoft.Bcl.AsyncInterfaces",
+
"version": "9.0.0",
+
"hash": "sha256-BsXNOWEgfFq3Yz7VTtK6m/ov4/erRqyBzieWSIpmc1U="
},
{
"pname": "Microsoft.Build",
···
},
{
"pname": "Microsoft.CodeAnalysis.Common",
-
"version": "4.13.0-3.24620.4",
-
"hash": "sha256-VSPRpTzEXnTNQAxXDOOi6YVS2C6/S2zTKgQR4aNkxME=",
-
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.common/4.13.0-3.24620.4/microsoft.codeanalysis.common.4.13.0-3.24620.4.nupkg"
+
"version": "4.14.0-3.25168.13",
+
"hash": "sha256-iQUNxmc2oGFqADDfNXj8A1O1nea6nxobBcYwBgqq8oY=",
+
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.common/4.14.0-3.25168.13/microsoft.codeanalysis.common.4.14.0-3.25168.13.nupkg"
},
{
"pname": "Microsoft.CodeAnalysis.CSharp",
-
"version": "4.13.0-3.24620.4",
-
"hash": "sha256-YGxCN8J3BjSZ9hXYQF0nCL3Welv3UVASeSTkwwFPchc=",
-
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.csharp/4.13.0-3.24620.4/microsoft.codeanalysis.csharp.4.13.0-3.24620.4.nupkg"
+
"version": "4.14.0-3.25168.13",
+
"hash": "sha256-XicPFcDtJis8WS3nkMsxbmE+A20K9x6qE3EWeJEBjh8=",
+
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.csharp/4.14.0-3.25168.13/microsoft.codeanalysis.csharp.4.14.0-3.25168.13.nupkg"
},
{
"pname": "Microsoft.CodeAnalysis.CSharp.Features",
-
"version": "4.13.0-3.24620.4",
-
"hash": "sha256-qpNsw5OtTAQFnN6g6tIh6+nsr+zc+/Na+oETR/GWxeM=",
-
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.csharp.features/4.13.0-3.24620.4/microsoft.codeanalysis.csharp.features.4.13.0-3.24620.4.nupkg"
+
"version": "4.14.0-3.25168.13",
+
"hash": "sha256-vI0G7XR92aVD6r5rYIEF+pZ+bpyznnfHVhQvWF3Eu4Q=",
+
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.csharp.features/4.14.0-3.25168.13/microsoft.codeanalysis.csharp.features.4.14.0-3.25168.13.nupkg"
},
{
"pname": "Microsoft.CodeAnalysis.CSharp.Scripting",
-
"version": "4.13.0-3.24620.4",
-
"hash": "sha256-1D+TjiljZQQJEYIzhdLAbLq8DIvW30vgSDYnDlPoGoU=",
-
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.csharp.scripting/4.13.0-3.24620.4/microsoft.codeanalysis.csharp.scripting.4.13.0-3.24620.4.nupkg"
+
"version": "4.14.0-3.25168.13",
+
"hash": "sha256-zy8otm38p285W08GGy0M//1ZTOxiCxrC3tBcWKIg4Ps=",
+
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.csharp.scripting/4.14.0-3.25168.13/microsoft.codeanalysis.csharp.scripting.4.14.0-3.25168.13.nupkg"
},
{
"pname": "Microsoft.CodeAnalysis.CSharp.Workspaces",
-
"version": "4.13.0-3.24620.4",
-
"hash": "sha256-NT7yDEq4fW8c71xHC3YPsP5vl8AZ9PdKASzxROwhccs=",
-
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.csharp.workspaces/4.13.0-3.24620.4/microsoft.codeanalysis.csharp.workspaces.4.13.0-3.24620.4.nupkg"
+
"version": "4.14.0-3.25168.13",
+
"hash": "sha256-wuttOafOufLuc1DFlp2r8zdfkOrD5eFRRN2/pt/MWtE=",
+
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.csharp.workspaces/4.14.0-3.25168.13/microsoft.codeanalysis.csharp.workspaces.4.14.0-3.25168.13.nupkg"
},
{
"pname": "Microsoft.CodeAnalysis.Elfie",
···
},
{
"pname": "Microsoft.CodeAnalysis.ExternalAccess.AspNetCore",
-
"version": "4.13.0-3.24620.4",
-
"hash": "sha256-91ZFqiu4MlteCir6p7YrOtbUMuRNIpNr6jX5qLdmZgM=",
-
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.externalaccess.aspnetcore/4.13.0-3.24620.4/microsoft.codeanalysis.externalaccess.aspnetcore.4.13.0-3.24620.4.nupkg"
+
"version": "4.14.0-3.25168.13",
+
"hash": "sha256-zhvnYOrXZvm0+YoVu1mG/X6IK9eIv+Fik9Y4cSBStdc=",
+
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.externalaccess.aspnetcore/4.14.0-3.25168.13/microsoft.codeanalysis.externalaccess.aspnetcore.4.14.0-3.25168.13.nupkg"
},
{
"pname": "Microsoft.CodeAnalysis.ExternalAccess.OmniSharp",
-
"version": "4.13.0-3.24620.4",
-
"hash": "sha256-o2+DeY/p5AxMkMnYIiNMyMtrAnazzgfC6cVY8lImz4E=",
-
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.externalaccess.omnisharp/4.13.0-3.24620.4/microsoft.codeanalysis.externalaccess.omnisharp.4.13.0-3.24620.4.nupkg"
+
"version": "4.14.0-3.25168.13",
+
"hash": "sha256-MbPehGBs4q3zJ0gZf6Ab85IUBSyjRPO3nXfXxHus4v4=",
+
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.externalaccess.omnisharp/4.14.0-3.25168.13/microsoft.codeanalysis.externalaccess.omnisharp.4.14.0-3.25168.13.nupkg"
},
{
"pname": "Microsoft.CodeAnalysis.ExternalAccess.OmniSharp.CSharp",
-
"version": "4.13.0-3.24620.4",
-
"hash": "sha256-LfIgqc7lDoyxbOsGmF4Ji488iXaT1f2ecjZz1662WlM=",
-
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.externalaccess.omnisharp.csharp/4.13.0-3.24620.4/microsoft.codeanalysis.externalaccess.omnisharp.csharp.4.13.0-3.24620.4.nupkg"
+
"version": "4.14.0-3.25168.13",
+
"hash": "sha256-Hpomx3SEqAFilwaA7yJV60iLXGpWSJAC+7XANxjIpng=",
+
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.externalaccess.omnisharp.csharp/4.14.0-3.25168.13/microsoft.codeanalysis.externalaccess.omnisharp.csharp.4.14.0-3.25168.13.nupkg"
},
{
"pname": "Microsoft.CodeAnalysis.Features",
-
"version": "4.13.0-3.24620.4",
-
"hash": "sha256-ITkMz+1b9Q9I5UZk4N5+qKD7FPTBMohLDOqx3e2hShI=",
-
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.features/4.13.0-3.24620.4/microsoft.codeanalysis.features.4.13.0-3.24620.4.nupkg"
+
"version": "4.14.0-3.25168.13",
+
"hash": "sha256-GDrT8bMIzWy6O1MSTXcBIooKNnKDrR4Q5RJnyikRGRI=",
+
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.features/4.14.0-3.25168.13/microsoft.codeanalysis.features.4.14.0-3.25168.13.nupkg"
},
{
"pname": "Microsoft.CodeAnalysis.Scripting.Common",
-
"version": "4.13.0-3.24620.4",
-
"hash": "sha256-9Pch1BIrhsEwoI3ahgQM4BQBhw1wH9d8X9WB6deM3Sk=",
-
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.scripting.common/4.13.0-3.24620.4/microsoft.codeanalysis.scripting.common.4.13.0-3.24620.4.nupkg"
+
"version": "4.14.0-3.25168.13",
+
"hash": "sha256-k2M3MfdbTG30PtcNHLHzVimaU8nKsv80XYt0DE6jZAI=",
+
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.scripting.common/4.14.0-3.25168.13/microsoft.codeanalysis.scripting.common.4.14.0-3.25168.13.nupkg"
},
{
"pname": "Microsoft.CodeAnalysis.Workspaces.Common",
-
"version": "4.13.0-3.24620.4",
-
"hash": "sha256-Ex39ayopBTApxMCjevqn1qVFgjEvbst9sf7twW6+osI=",
-
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.workspaces.common/4.13.0-3.24620.4/microsoft.codeanalysis.workspaces.common.4.13.0-3.24620.4.nupkg"
+
"version": "4.14.0-3.25168.13",
+
"hash": "sha256-eKk8/Ezlnm+d2XFyfgY8HkyVxASvGisJoppswwqtew8=",
+
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/microsoft.codeanalysis.workspaces.common/4.14.0-3.25168.13/microsoft.codeanalysis.workspaces.common.4.14.0-3.25168.13.nupkg"
},
{
"pname": "Microsoft.CSharp",
···
},
{
"pname": "Microsoft.Extensions.Caching.Abstractions",
-
"version": "8.0.0",
-
"hash": "sha256-xGpKrywQvU1Wm/WolYIxgHYEFfgkNGeJ+GGc5DT3phI="
+
"version": "9.0.0",
+
"hash": "sha256-hDau5OMVGIg4sc5+ofe14ROqwt63T0NSbzm/Cv0pDrY="
},
{
"pname": "Microsoft.Extensions.Caching.Memory",
-
"version": "8.0.1",
-
"hash": "sha256-5Q0vzHo3ZvGs4nPBc/XlBF4wAwYO8pxq6EGdYjjXZps="
+
"version": "9.0.0",
+
"hash": "sha256-OZVOVGZOyv9uk5XGJrz6irBkPNjxnBxjfSyW30MnU0s="
},
{
"pname": "Microsoft.Extensions.Configuration",
-
"version": "8.0.0",
-
"hash": "sha256-9BPsASlxrV8ilmMCjdb3TiUcm5vFZxkBnAI/fNBSEyA="
+
"version": "9.0.0",
+
"hash": "sha256-uBLeb4z60y8z7NelHs9uT3cLD6wODkdwyfJm6/YZLDM="
},
{
"pname": "Microsoft.Extensions.Configuration.Abstractions",
-
"version": "8.0.0",
-
"hash": "sha256-4eBpDkf7MJozTZnOwQvwcfgRKQGcNXe0K/kF+h5Rl8o="
+
"version": "9.0.0",
+
"hash": "sha256-xtG2USC9Qm0f2Nn6jkcklpyEDT3hcEZOxOwTc0ep7uc="
},
{
"pname": "Microsoft.Extensions.Configuration.Binder",
-
"version": "8.0.0",
-
"hash": "sha256-GanfInGzzoN2bKeNwON8/Hnamr6l7RTpYLA49CNXD9Q="
+
"version": "9.0.0",
+
"hash": "sha256-6ajYWcNOQX2WqftgnoUmVtyvC1kkPOtTCif4AiKEffU="
},
{
"pname": "Microsoft.Extensions.Configuration.CommandLine",
-
"version": "8.0.0",
-
"hash": "sha256-fmPC/o8S+weTtQJWykpnGHm6AKVU21xYE/CaHYU7zgg="
+
"version": "9.0.0",
+
"hash": "sha256-RE6DotU1FM1sy5p3hukT+WOFsDYJRsKX6jx5vhlPceM="
},
{
"pname": "Microsoft.Extensions.Configuration.EnvironmentVariables",
-
"version": "8.0.0",
-
"hash": "sha256-+bjFZvqCsMf2FRM2olqx/fub+QwfM1kBhjGVOT5HC48="
+
"version": "9.0.0",
+
"hash": "sha256-tDJx2prYZpr0RKSwmJfsK9FlUGwaDmyuSz2kqQxsWoI="
},
{
"pname": "Microsoft.Extensions.Configuration.FileExtensions",
-
"version": "8.0.0",
-
"hash": "sha256-BCxcjVP+kvrDDB0nzsFCJfU74UK4VBvct2JA4r+jNcs="
+
"version": "9.0.0",
+
"hash": "sha256-PsLo6mrLGYfbi96rfCG8YS1APXkUXBG4hLstpT60I4s="
},
{
"pname": "Microsoft.Extensions.Configuration.Json",
-
"version": "8.0.0",
-
"hash": "sha256-Fi/ijcG5l0BOu7i96xHu96aN5/g7zO6SWQbTsI3Qetg="
+
"version": "9.0.0",
+
"hash": "sha256-qQn7Ol0CvPYuyecYWYBkPpTMdocO7I6n+jXQI2udzLI="
},
{
"pname": "Microsoft.Extensions.DependencyInjection",
-
"version": "8.0.0",
-
"hash": "sha256-+qIDR8hRzreCHNEDtUcPfVHQdurzWPo/mqviCH78+EQ="
+
"version": "9.0.0",
+
"hash": "sha256-dAH52PPlTLn7X+1aI/7npdrDzMEFPMXRv4isV1a+14k="
},
{
"pname": "Microsoft.Extensions.DependencyInjection.Abstractions",
···
},
{
"pname": "Microsoft.Extensions.DependencyInjection.Abstractions",
-
"version": "8.0.2",
-
"hash": "sha256-UfLfEQAkXxDaVPC7foE/J3FVEXd31Pu6uQIhTic3JgY="
+
"version": "9.0.0",
+
"hash": "sha256-CncVwkKZ5CsIG2O0+OM9qXuYXh3p6UGyueTHSLDVL+c="
},
{
"pname": "Microsoft.Extensions.DependencyModel",
-
"version": "8.0.0",
-
"hash": "sha256-qkCdwemqdZY/yIW5Xmh7Exv74XuE39T8aHGHCofoVgo="
+
"version": "9.0.0",
+
"hash": "sha256-xirwlMWM0hBqgTneQOGkZ8l45mHT08XuSSRIbprgq94="
},
{
"pname": "Microsoft.Extensions.FileProviders.Abstractions",
-
"version": "8.0.0",
-
"hash": "sha256-uQSXmt47X2HGoVniavjLICbPtD2ReQOYQMgy3l0xuMU="
+
"version": "9.0.0",
+
"hash": "sha256-mVfLjZ8VrnOQR/uQjv74P2uEG+rgW72jfiGdSZhIfDc="
},
{
"pname": "Microsoft.Extensions.FileProviders.Physical",
-
"version": "8.0.0",
-
"hash": "sha256-29y5ZRQ1ZgzVOxHktYxyiH40kVgm5un2yTGdvuSWnRc="
+
"version": "9.0.0",
+
"hash": "sha256-IzFpjKHmF1L3eVbFLUZa2N5aH3oJkJ7KE1duGIS7DP8="
},
{
"pname": "Microsoft.Extensions.FileSystemGlobbing",
-
"version": "8.0.0",
-
"hash": "sha256-+Oz41JR5jdcJlCJOSpQIL5OMBNi+1Hl2d0JUHfES7sU="
+
"version": "9.0.0",
+
"hash": "sha256-eBLa8pW/y/hRj+JbEr340zbHRABIeFlcdqE0jf5/Uhc="
},
{
"pname": "Microsoft.Extensions.Logging",
-
"version": "8.0.0",
-
"hash": "sha256-Meh0Z0X7KyOEG4l0RWBcuHHihcABcvCyfUXgasmQ91o="
+
"version": "9.0.0",
+
"hash": "sha256-kR16c+N8nQrWeYLajqnXPg7RiXjZMSFLnKLEs4VfjcM="
},
{
"pname": "Microsoft.Extensions.Logging.Abstractions",
···
},
{
"pname": "Microsoft.Extensions.Logging.Abstractions",
-
"version": "8.0.2",
-
"hash": "sha256-cHpe8X2BgYa5DzulZfq24rg8O2K5Lmq2OiLhoyAVgJc="
+
"version": "9.0.0",
+
"hash": "sha256-iBTs9twjWXFeERt4CErkIIcoJZU1jrd1RWCI8V5j7KU="
},
{
"pname": "Microsoft.Extensions.Logging.Configuration",
-
"version": "8.0.0",
-
"hash": "sha256-mzmstNsVjKT0EtQcdAukGRifD30T82BMGYlSu8k4K7U="
+
"version": "9.0.0",
+
"hash": "sha256-ysPjBq64p6JM4EmeVndryXnhLWHYYszzlVpPxRWkUkw="
},
{
"pname": "Microsoft.Extensions.Logging.Console",
-
"version": "8.0.0",
-
"hash": "sha256-bdb9YWWVn//AeySp7se87/tCN2E7e8Gx2GPMw28cd9c="
+
"version": "9.0.0",
+
"hash": "sha256-N2t9EUdlS6ippD4Z04qUUyBuQ4tKSR/8TpmKScb5zRw="
},
{
"pname": "Microsoft.Extensions.Options",
-
"version": "8.0.2",
-
"hash": "sha256-AjcldddddtN/9aH9pg7ClEZycWtFHLi9IPe1GGhNQys="
+
"version": "9.0.0",
+
"hash": "sha256-DT5euAQY/ItB5LPI8WIp6Dnd0lSvBRP35vFkOXC68ck="
},
{
"pname": "Microsoft.Extensions.Options.ConfigurationExtensions",
-
"version": "8.0.0",
-
"hash": "sha256-A5Bbzw1kiNkgirk5x8kyxwg9lLTcSngojeD+ocpG1RI="
+
"version": "9.0.0",
+
"hash": "sha256-r1Z3sEVSIjeH2UKj+KMj86har68g/zybSqoSjESBcoA="
},
{
"pname": "Microsoft.Extensions.Primitives",
-
"version": "8.0.0",
-
"hash": "sha256-FU8qj3DR8bDdc1c+WeGZx/PCZeqqndweZM9epcpXjSo="
+
"version": "9.0.0",
+
"hash": "sha256-ZNLusK1CRuq5BZYZMDqaz04PIKScE2Z7sS2tehU7EJs="
},
{
"pname": "Microsoft.IO.Redist",
···
},
{
"pname": "NuGet.Common",
-
"version": "6.13.0-rc.95",
-
"hash": "sha256-SeN5m2Wuwux9kO+S5qX6bvvYUA22BOZDz6rg2Gk0vQc=",
-
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.common/6.13.0-rc.95/nuget.common.6.13.0-rc.95.nupkg"
+
"version": "6.14.0-rc.116",
+
"hash": "sha256-9iueLk2eBzA1Qph0zz2eM9hSfKtwdlApcEXkcImYHow=",
+
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.common/6.14.0-rc.116/nuget.common.6.14.0-rc.116.nupkg"
},
{
"pname": "NuGet.Configuration",
-
"version": "6.13.0-rc.95",
-
"hash": "sha256-vrqUvp0Nse6zITKySrVgnPpkl2+ic8f0d/veYrUeRzM=",
-
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.configuration/6.13.0-rc.95/nuget.configuration.6.13.0-rc.95.nupkg"
+
"version": "6.14.0-rc.116",
+
"hash": "sha256-aZcINPKC6x773h/JW007YDPkj/jXZIBs/Y2gVp2jHKI=",
+
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.configuration/6.14.0-rc.116/nuget.configuration.6.14.0-rc.116.nupkg"
},
{
"pname": "NuGet.DependencyResolver.Core",
-
"version": "6.13.0-rc.95",
-
"hash": "sha256-ttllWdeTVn3JJECrqfCy9lVZKX7DQbgxjKMIBZH3GoI=",
-
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.dependencyresolver.core/6.13.0-rc.95/nuget.dependencyresolver.core.6.13.0-rc.95.nupkg"
+
"version": "6.14.0-rc.116",
+
"hash": "sha256-xn3ftpNI3xMblSwqQcgYzhZ1fDj/urbnnCLZrTLuNNk=",
+
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.dependencyresolver.core/6.14.0-rc.116/nuget.dependencyresolver.core.6.14.0-rc.116.nupkg"
},
{
"pname": "NuGet.Frameworks",
-
"version": "6.13.0-rc.95",
-
"hash": "sha256-Dq1YxucNDbrO8L2l8uV1SEOKuL4oVhUjlDeRLrg82Wo=",
-
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.frameworks/6.13.0-rc.95/nuget.frameworks.6.13.0-rc.95.nupkg"
+
"version": "6.14.0-rc.116",
+
"hash": "sha256-d9pZxwUrPcl/pizjC6j+Tns30muXUk2OVOAvkQ40TWk=",
+
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.frameworks/6.14.0-rc.116/nuget.frameworks.6.14.0-rc.116.nupkg"
},
{
"pname": "NuGet.LibraryModel",
-
"version": "6.13.0-rc.95",
-
"hash": "sha256-zuiuiT6NprcW/UEhndi6vO4J3ONeIGkmRMjkDqdf4QQ=",
-
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.librarymodel/6.13.0-rc.95/nuget.librarymodel.6.13.0-rc.95.nupkg"
+
"version": "6.14.0-rc.116",
+
"hash": "sha256-8MzoYPA6p9pd0NkVW3oImhy1t3szqjk/dqHbRb2UM9I=",
+
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.librarymodel/6.14.0-rc.116/nuget.librarymodel.6.14.0-rc.116.nupkg"
},
{
"pname": "NuGet.Packaging",
-
"version": "6.13.0-rc.95",
-
"hash": "sha256-gK0UtXawa2HtdYyug/vTihrj4ZLqCJ8w516kj9Gmq40=",
-
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.packaging/6.13.0-rc.95/nuget.packaging.6.13.0-rc.95.nupkg"
+
"version": "6.14.0-rc.116",
+
"hash": "sha256-0ck3KroeV+MSYBESHrqtZ7I4h10Wx5qfEYgikVk9lLE=",
+
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.packaging/6.14.0-rc.116/nuget.packaging.6.14.0-rc.116.nupkg"
},
{
"pname": "NuGet.ProjectModel",
-
"version": "6.13.0-rc.95",
-
"hash": "sha256-Y+3CNqRfoCTzVYgVpJ8Q2kIQcZIbdfit6uVOuqFaMy0=",
-
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.projectmodel/6.13.0-rc.95/nuget.projectmodel.6.13.0-rc.95.nupkg"
+
"version": "6.14.0-rc.116",
+
"hash": "sha256-w8xv1eWnCgTEMd7UoZkoxcQ2fiOhPTf6AgkcY6XFiXs=",
+
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.projectmodel/6.14.0-rc.116/nuget.projectmodel.6.14.0-rc.116.nupkg"
},
{
"pname": "NuGet.Protocol",
-
"version": "6.13.0-rc.95",
-
"hash": "sha256-HyzaY1PmpPGG6J8g+BYdS1ETYZMwahEu7OiyWyjXzu4=",
-
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.protocol/6.13.0-rc.95/nuget.protocol.6.13.0-rc.95.nupkg"
+
"version": "6.14.0-rc.116",
+
"hash": "sha256-vJH2Lp7eBq44+w6iDkgUItcy81qYG52E7NE5q10TJqc=",
+
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.protocol/6.14.0-rc.116/nuget.protocol.6.14.0-rc.116.nupkg"
},
{
"pname": "NuGet.Versioning",
-
"version": "6.13.0-rc.95",
-
"hash": "sha256-2em8SYwrFR7wDjBpoSDs3Gfdz7w90IUs8vnGCnxcgF8=",
-
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.versioning/6.13.0-rc.95/nuget.versioning.6.13.0-rc.95.nupkg"
+
"version": "6.14.0-rc.116",
+
"hash": "sha256-qSpNg8NdQDTxS+xXkz5j/LJNqhF8jUn/bAQyJWFP9vA=",
+
"url": "https://pkgs.dev.azure.com/dnceng/9ee6d478-d288-47f7-aacc-f6e6d082ae6d/_packaging/d1622942-d16f-48e5-bc83-96f4539e7601/nuget/v3/flat2/nuget.versioning/6.14.0-rc.116/nuget.versioning.6.14.0-rc.116.nupkg"
},
{
"pname": "OmniSharp.Extensions.JsonRpc",
···
},
{
"pname": "System.Collections.Immutable",
-
"version": "8.0.0",
-
"hash": "sha256-F7OVjKNwpqbUh8lTidbqJWYi476nsq9n+6k0+QVRo3w="
+
"version": "9.0.0",
+
"hash": "sha256-+6q5VMeoc5bm4WFsoV6nBXA9dV5pa/O4yW+gOdi8yac="
},
{
"pname": "System.ComponentModel.Annotations",
···
},
{
"pname": "System.ComponentModel.Composition",
-
"version": "8.0.0",
-
"hash": "sha256-MnKdjE/qIvAmEeRc3gOn5uJhT0TI3UnUJPjj3TLHFQo="
+
"version": "9.0.0",
+
"hash": "sha256-CsWwo/NLEAt36kE52cT4wud8uUjJ31vpHlAY6RkUbog="
},
{
"pname": "System.Composition",
-
"version": "8.0.0",
-
"hash": "sha256-rA118MFj6soKN++BvD3y9gXAJf0lZJAtGARuznG5+Xg="
+
"version": "9.0.0",
+
"hash": "sha256-FehOkQ2u1p8mQ0/wn3cZ+24HjhTLdck8VZYWA1CcgbM="
},
{
"pname": "System.Composition.AttributedModel",
-
"version": "8.0.0",
-
"hash": "sha256-n3aXiBAFIlQicSRLiNtLh++URSUxRBLggsjJ8OMNRpo="
+
"version": "9.0.0",
+
"hash": "sha256-a7y7H6zj+kmYkllNHA402DoVfY9IaqC3Ooys8Vzl24M="
},
{
"pname": "System.Composition.Convention",
-
"version": "8.0.0",
-
"hash": "sha256-Z9HOAnH1lt1qc38P3Y0qCf5gwBwiLXQD994okcy53IE="
+
"version": "9.0.0",
+
"hash": "sha256-tw4vE5JRQ60ubTZBbxoMPhtjOQCC3XoDFUH7NHO7o8U="
},
{
"pname": "System.Composition.Hosting",
-
"version": "8.0.0",
-
"hash": "sha256-axKJC71oKiNWKy66TVF/c3yoC81k03XHAWab3mGNbr0="
+
"version": "9.0.0",
+
"hash": "sha256-oOxU+DPEEfMCuNLgW6wSkZp0JY5gYt44FJNnWt+967s="
},
{
"pname": "System.Composition.Runtime",
-
"version": "8.0.0",
-
"hash": "sha256-AxwZ29+GY0E35Pa255q8AcMnJU52Txr5pBy86t6V1Go="
+
"version": "9.0.0",
+
"hash": "sha256-AyIe+di1TqwUBbSJ/sJ8Q8tzsnTN+VBdJw4K8xZz43s="
},
{
"pname": "System.Composition.TypedParts",
-
"version": "8.0.0",
-
"hash": "sha256-+ZJawThmiYEUNJ+cB9uJK+u/sCAVZarGd5ShZoSifGo="
+
"version": "9.0.0",
+
"hash": "sha256-F5fpTUs3Rr7yP/NyIzr+Xn5NdTXXp8rrjBnF9UBBUog="
},
{
"pname": "System.Configuration.ConfigurationManager",
-
"version": "8.0.0",
-
"hash": "sha256-xhljqSkNQk8DMkEOBSYnn9lzCSEDDq4yO910itptqiE="
+
"version": "9.0.0",
+
"hash": "sha256-+pLnTC0YDP6Kjw5DVBiFrV/Q3x5is/+6N6vAtjvhVWk="
},
{
"pname": "System.Data.DataSetExtensions",
···
},
{
"pname": "System.Diagnostics.DiagnosticSource",
-
"version": "8.0.0",
-
"hash": "sha256-+aODaDEQMqla5RYZeq0Lh66j+xkPYxykrVvSCmJQ+Vs="
-
},
-
{
-
"pname": "System.Diagnostics.DiagnosticSource",
-
"version": "8.0.1",
-
"hash": "sha256-zmwHjcJgKcbkkwepH038QhcnsWMJcHys+PEbFGC0Jgo="
+
"version": "9.0.0",
+
"hash": "sha256-1VzO9i8Uq2KlTw1wnCCrEdABPZuB2JBD5gBsMTFTSvE="
},
{
"pname": "System.Diagnostics.EventLog",
-
"version": "8.0.0",
-
"hash": "sha256-rt8xc3kddpQY4HEdghlBeOK4gdw5yIj4mcZhAVtk2/Y="
+
"version": "9.0.0",
+
"hash": "sha256-tPvt6yoAp56sK/fe+/ei8M65eavY2UUhRnbrREj/Ems="
},
{
"pname": "System.Drawing.Common",
···
},
{
"pname": "System.IO.Pipelines",
-
"version": "8.0.0",
-
"hash": "sha256-LdpB1s4vQzsOODaxiKstLks57X9DTD5D6cPx8DE1wwE="
+
"version": "9.0.0",
+
"hash": "sha256-vb0NrPjfEao3kfZ0tavp2J/29XnsQTJgXv3/qaAwwz0="
},
{
"pname": "System.Memory",
···
},
{
"pname": "System.Reflection.Metadata",
-
"version": "8.0.0",
-
"hash": "sha256-dQGC30JauIDWNWXMrSNOJncVa1umR1sijazYwUDdSIE="
+
"version": "9.0.0",
+
"hash": "sha256-avEWbcCh7XgpsSesnR3/SgxWi/6C5OxjR89Jf/SfRjQ="
},
{
"pname": "System.Reflection.MetadataLoadContext",
···
},
{
"pname": "System.Security.Cryptography.ProtectedData",
-
"version": "8.0.0",
-
"hash": "sha256-fb0pa9sQxN+mr0vnXg1Igbx49CaOqS+GDkTfWNboUvs="
+
"version": "9.0.0",
+
"hash": "sha256-gPgPU7k/InTqmXoRzQfUMEKL3QuTnOKowFqmXTnWaBQ="
},
{
"pname": "System.Security.Cryptography.Xml",
···
},
{
"pname": "System.Text.Encodings.Web",
-
"version": "8.0.0",
-
"hash": "sha256-IUQkQkV9po1LC0QsqrilqwNzPvnc+4eVvq+hCvq8fvE="
+
"version": "9.0.0",
+
"hash": "sha256-WGaUklQEJywoGR2jtCEs5bxdvYu5SHaQchd6s4RE5x0="
},
{
"pname": "System.Text.Json",
-
"version": "8.0.5",
-
"hash": "sha256-yKxo54w5odWT6nPruUVsaX53oPRe+gKzGvLnnxtwP68="
+
"version": "9.0.0",
+
"hash": "sha256-aM5Dh4okLnDv940zmoFAzRmqZre83uQBtGOImJpoIqk="
},
{
"pname": "System.Threading.Channels",
···
},
{
"pname": "System.Threading.Tasks.Dataflow",
-
"version": "8.0.0",
-
"hash": "sha256-Q6fPtMPNW4+SDKCabJzNS+dw4B04Oxd9sHH505bFtQo="
+
"version": "9.0.0",
+
"hash": "sha256-nRzcFvLBpcOfyIJdCCZq5vDKZN0xHVuB8yCXoMrwZJA="
},
{
"pname": "System.Threading.Tasks.Extensions",
+2 -2
pkgs/by-name/om/omnisharp-roslyn/package.nix
···
let
finalPackage = buildDotnetModule rec {
pname = "omnisharp-roslyn";
-
version = "1.39.13";
+
version = "1.39.14";
src = fetchFromGitHub {
owner = "OmniSharp";
repo = "omnisharp-roslyn";
tag = "v${version}";
-
hash = "sha256-/U7zpx0jAnvZl7tshGV7wORD/wQUKYgX1kADpyCXHM4=";
+
hash = "sha256-yWrb+Ov1syKjeer7CxmGzkf9qUJxQ0IoIRfyIiO8eI8=";
};
projectFile = "src/OmniSharp.Stdio.Driver/OmniSharp.Stdio.Driver.csproj";
+3 -3
pkgs/by-name/op/openhue-cli/package.nix
···
buildGoModule (finalAttrs: {
pname = "openhue-cli";
-
version = "0.18";
+
version = "0.20";
src = fetchFromGitHub {
owner = "openhue";
repo = "openhue-cli";
tag = finalAttrs.version;
-
hash = "sha256-LSaHE3gdjpNea6o+D/JGvHtwvG13LbHv2pDcZhlIoEE=";
+
hash = "sha256-vUmJjuBcOjIhhtWrzq+y0fDlh+wQhgBwxnfuod27CBA=";
leaveDotGit = true;
postFetch = ''
cd "$out"
···
'';
};
-
vendorHash = "sha256-lqIzmtFtkfrJSrpic79Is0yGpnLUysPQLn2lp/Mh+u4=";
+
vendorHash = "sha256-DhTe0fSWoAwzoGr8rZMsbSE92jJFr4T7aVx/ULMfVFo=";
env.CGO_ENABLED = 0;
+3 -3
pkgs/by-name/pi/pistol/package.nix
···
buildGoModule rec {
pname = "pistol";
-
version = "0.5.2";
+
version = "0.5.3";
src = fetchFromGitHub {
owner = "doronbehar";
repo = "pistol";
rev = "v${version}";
-
sha256 = "sha256-/w2BenBIzhD0KHtELlFy7YGv0lykHrjrROZeW75gHis=";
+
sha256 = "sha256-cL9hHehajqMIpdD10KYIbNkBt2fiRQkx81m9H3Yd1UY=";
};
-
vendorHash = "sha256-+Q72DUKLqahgbLCaXOTAYZaMvNfv3XF+SpyqHyB065g=";
+
vendorHash = "sha256-+moQ3qZnWmmGpOXUxyBS3hIETK/ZtRwmvD2tXFf0A3o=";
doCheck = false;
+3 -3
pkgs/by-name/po/pocketbase/package.nix
···
buildGoModule rec {
pname = "pocketbase";
-
version = "0.29.0";
+
version = "0.29.2";
src = fetchFromGitHub {
owner = "pocketbase";
repo = "pocketbase";
rev = "v${version}";
-
hash = "sha256-yNz/bwjOPcj4N4yXi1pckz/rGNSJeCs8xeZHj+W/+2E=";
+
hash = "sha256-TWizSLWsQEK2BGaYVkqc/rrjiv/MZF0kKZAYGQAItJ4=";
};
-
vendorHash = "sha256-XfHU2E2VEcQEQtcGmZqEPjdy7wxvOEdcysSYYD5oLNM=";
+
vendorHash = "sha256-MWCx8v1/A0xjm8M9zgPXkMYsQlpAqDaASoqFTr7FG18=";
# This is the released subpackage from upstream repo
subPackages = [ "examples/base" ];
+3 -3
pkgs/by-name/po/powerstation/package.nix
···
rustPlatform.buildRustPackage rec {
pname = "powerstation";
-
version = "0.6.1";
+
version = "0.7.0";
src = fetchFromGitHub {
owner = "ShadowBlip";
repo = "PowerStation";
tag = "v${version}";
-
hash = "sha256-UB0NmP2UaQEYGrFR0f0nBLuGTjjTIhvz0bwx3eC2JE4=";
+
hash = "sha256-wm/O36AdBxfLVCM3NtzSVVHBM+GfH4ARZ/2ekJX5qsE=";
};
-
cargoHash = "sha256-32tz1cJ2G3GXB9j0lFyjsAOn/iQGxzrdfcqkA/Yh4UY=";
+
cargoHash = "sha256-P4NTzKKY/yB8ODPlsGWfihXTQD8MiOnp+tKCWFKtKxI=";
nativeBuildInputs = [
cmake
+3 -3
pkgs/by-name/ru/rustical/package.nix
···
rustPlatform.buildRustPackage (finalAttrs: {
pname = "rustical";
-
version = "0.8.1";
+
version = "0.8.4";
src = fetchFromGitHub {
owner = "lennart-k";
repo = "rustical";
tag = "v${finalAttrs.version}";
-
hash = "sha256-TkgkgPQEj0SA9MjfWtOUu6rHKYCIs5jVieYL1N+XLk8=";
+
hash = "sha256-y4t63lb14WdUjzhjv/mx90ThaTfE7KFyRkg+CG+66TE=";
};
-
cargoHash = "sha256-X+8G2H3wszKJmn7p8n0b6z3xZ/ylGzwc99oUnIGKpTA=";
+
cargoHash = "sha256-DK3es0GjKurCwGmr/6gAk+ccJc1dUP64kK+UzvS+Mi0=";
nativeBuildInputs = [ pkg-config ];
buildInputs = [ openssl ];
+3 -3
pkgs/by-name/sd/sdl_gamecontrollerdb/package.nix
···
stdenvNoCC.mkDerivation (finalAttrs: {
pname = "sdl_gamecontrollerdb";
-
version = "0-unstable-2025-07-28";
+
version = "0-unstable-2025-08-05";
src = fetchFromGitHub {
owner = "mdqinc";
repo = "SDL_GameControllerDB";
-
rev = "34765aa1de21323a873ab107a2a25e269e86b2e8";
-
hash = "sha256-K3XeSs6psR8RnDiYAKrVbx3KWQuJcD3RyZpOl+dn5Qw=";
+
rev = "7543fc8af09232396f7d57e19c2342965c53e94f";
+
hash = "sha256-y5QyrgT/ipal36jTJurvXMac6uRMt3XOg3Sm6SLe0sk=";
};
dontBuild = true;
+3 -3
pkgs/by-name/sh/shadowenv/package.nix
···
rustPlatform.buildRustPackage rec {
pname = "shadowenv";
-
version = "3.3.1";
+
version = "3.4.0";
src = fetchFromGitHub {
owner = "Shopify";
repo = "shadowenv";
rev = version;
-
hash = "sha256-s70tNeF0FnWYZ0xLGIL1lTM0LwJdhPPIHrNgrY1YNBs=";
+
hash = "sha256-WsUeqkuT4NhoaCJG1hqz+uWyvWQBfxtDheEkWkYmSWU=";
};
-
cargoHash = "sha256-Cg01yM3FbrYpZrv2dhGJnezugNhcuwDcXIU47/AWrC4=";
+
cargoHash = "sha256-vAMap35rpmEKSHJ9yW/PzPbEWtLw30DawDmI+QfcOsw=";
nativeBuildInputs = [ installShellFiles ];
+2 -2
pkgs/by-name/sn/snyk/package.nix
···
}:
let
-
version = "1.1298.1";
+
version = "1.1298.2";
in
buildNpmPackage {
pname = "snyk";
···
owner = "snyk";
repo = "cli";
tag = "v${version}";
-
hash = "sha256-oLkzEm7OMBNqT+EDrwujqQek4LWwKgYFUoMRWhpqY4o=";
+
hash = "sha256-8VnbXxvz5mWWMq6sjffshMbHBf2H6s/xmPbQZsZC/4A=";
};
npmDepsHash = "sha256-7fHehEKjNNRdRk9+kARzn75G0r1pse7ULn/Oz6mQRKM=";
+3 -3
pkgs/by-name/st/stackit-cli/package.nix
···
buildGoModule rec {
pname = "stackit-cli";
-
version = "0.37.3";
+
version = "0.38.0";
src = fetchFromGitHub {
owner = "stackitcloud";
repo = "stackit-cli";
rev = "v${version}";
-
hash = "sha256-nyNASYpZvao194rlKSyxNa74Ezo5CwiESNj54uBgUL4=";
+
hash = "sha256-i6UOgD3C0nq6Z3Gdki8YOZotU1CbC14Jx8d9B1LV7Hk=";
};
-
vendorHash = "sha256-iWGRFjCvXm03GRnmQlscP5Y5di9W4lW3jotyhDcE/x4=";
+
vendorHash = "sha256-qzNd1wn3N+EPjXO1gFYKtVNdGwd2D/jf6oJFvloR7HY=";
subPackages = [ "." ];
+3 -3
pkgs/by-name/st/step-kms-plugin/package.nix
···
buildGoModule rec {
pname = "step-kms-plugin";
-
version = "0.14.0";
+
version = "0.14.2";
src = fetchFromGitHub {
owner = "smallstep";
repo = "step-kms-plugin";
rev = "v${version}";
-
hash = "sha256-GP4ztKTkHIxBCK9Wx9oT8jehIFYCj3lnAt+RGgTMpHo=";
+
hash = "sha256-0RIAwZbk6DNlJHTmxUd/td94OlrjwcQ86ao7wt7PSdg=";
};
-
vendorHash = "sha256-beRLkYLAe3wx0CmCXcn5flWeg+qOK1JPYjAD/bhPkTc=";
+
vendorHash = "sha256-YvK3icanE8FoTeACfReVXmV143lcRTyXv8L6+hoFIaM=";
proxyVendor = true;
+3 -3
pkgs/by-name/sy/syft/package.nix
···
buildGoModule rec {
pname = "syft";
-
version = "1.29.1";
+
version = "1.30.0";
src = fetchFromGitHub {
owner = "anchore";
repo = "syft";
tag = "v${version}";
-
hash = "sha256-X+7X71M7nJKEAvAm0L9hh/zamJTGb+OyYNFWfiYlyew=";
+
hash = "sha256-7YnjkevF4Nmu8YDhpd/WqXzLM8cdVPDt5ss9bg8udow=";
# populate values that require us to use git. By doing this in postFetch we
# can delete .git afterwards and maintain better reproducibility of the src.
leaveDotGit = true;
···
# hash mismatch with darwin
proxyVendor = true;
-
vendorHash = "sha256-xgjnPTeSB+AWFLfXYLW3bveJowVje81lVvO30ZiCLxI=";
+
vendorHash = "sha256-ydXEquE12om67jouEHN5/MPI9+i69OALIQcPHRBD/YA=";
nativeBuildInputs = [ installShellFiles ];
+2 -2
pkgs/by-name/ta/tauno-monitor/package.nix
···
}:
python3Packages.buildPythonApplication rec {
pname = "tauno-monitor";
-
version = "0.2.11";
+
version = "0.2.14";
pyproject = false;
src = fetchFromGitHub {
owner = "taunoe";
repo = "tauno-monitor";
tag = "v${version}";
-
hash = "sha256-FoNn+A0zqFf/Nl0MrK9/X5mwaq8mJBRH0uGnemDC0is=";
+
hash = "sha256-1jXQZc2+Yufjo75KwHbAFPsGxdpxkdUP8LXyY2fj3Kw=";
};
nativeBuildInputs = [
+19 -10
pkgs/by-name/ta/tayga/package.nix
···
{
lib,
stdenv,
-
fetchurl,
+
fetchFromGitHub,
nixosTests,
}:
stdenv.mkDerivation (finalAttrs: {
-
version = "0.9.2";
+
version = "0.9.5";
pname = "tayga";
-
src = fetchurl {
-
url = "http://www.litech.org/tayga/tayga-${finalAttrs.version}.tar.bz2";
-
hash = "sha256-Kx95J6nS3P+Qla/zwnGSSwUsz9L6ypWIsndDGkTwAJw=";
+
src = fetchFromGitHub {
+
owner = "apalrd";
+
repo = "tayga";
+
tag = finalAttrs.version;
+
hash = "sha256-xOm4fetFq2UGuhOojrT8WOcX78c6MLTMVbDv+O62x2E=";
};
-
env.NIX_CFLAGS_COMPILE = toString [
-
"-Wno-address-of-packed-member"
-
"-Wno-implicit-function-declaration"
-
];
+
preBuild = ''
+
echo "#define TAYGA_VERSION \"${finalAttrs.version}\"" > version.h
+
'';
+
+
installPhase = ''
+
install -Dm755 tayga $out/bin/tayga
+
install -D tayga.conf.5 $out/share/man/man5/tayga.conf.5
+
install -D tayga.8 $out/share/man/man8/tayga.8
+
cp -R docs $out/share/
+
cp tayga.conf.example $out/share/docs/
+
'';
passthru.tests.tayga = nixosTests.tayga;
···
It is intended to provide production-quality NAT64 service
for networks where dedicated NAT64 hardware would be overkill.
'';
-
homepage = "http://www.litech.org/tayga";
+
homepage = "https://github.com/apalrd/tayga";
license = licenses.gpl2Plus;
maintainers = with maintainers; [ _0x4A6F ];
platforms = platforms.linux;
+3 -3
pkgs/by-name/tf/tfupdate/package.nix
···
buildGoModule rec {
pname = "tfupdate";
-
version = "0.9.1";
+
version = "0.9.2";
src = fetchFromGitHub {
owner = "minamijoyo";
repo = "tfupdate";
rev = "v${version}";
-
sha256 = "sha256-hxg/hAfUjygBgkfql2ZpiskKPqwVmo2MZ4n9eod5Kn4=";
+
sha256 = "sha256-izxvvR/wVNQlDWxJhUSAq2q0U0Y7fcFflEZRS2sfEIY=";
};
-
vendorHash = "sha256-dWp9onewCiemk3AUTgiaVwnLuVVMMTk/6hCWDS5NS88=";
+
vendorHash = "sha256-gmIh1xlOXLASzY9E5phS48Bdj1agH5LdUUW0p/g4I5w=";
# Tests start http servers which need to bind to local addresses:
# panic: httptest: failed to listen on a port: listen tcp6 [::1]:0: bind: operation not permitted
+3 -3
pkgs/by-name/va/vacuum-go/package.nix
···
buildGoModule (finalAttrs: {
pname = "vacuum-go";
-
version = "0.17.7";
+
version = "0.17.8";
src = fetchFromGitHub {
owner = "daveshanley";
repo = "vacuum";
# using refs/tags because simple version gives: 'the given path has multiple possibilities' error
tag = "v${finalAttrs.version}";
-
hash = "sha256-RkJOBiannG98bqc3GdBzRGvDATjX0gtgn8PCdIIBdBc=";
+
hash = "sha256-Vrvb4xLY7vxTaAlaPScBKmLfOgOzxGHpt4GJu8DnwUg=";
};
-
vendorHash = "sha256-6tBKlJa7fec0jc7/s1A6h86SwlZR7HzGes7hPEuwNmo=";
+
vendorHash = "sha256-IOlJHVzmBR4Re3VxAwLjpws3DTJSzG8JBya6L3WTeoQ=";
env.CGO_ENABLED = 0;
ldflags = [
+6 -1
pkgs/by-name/va/valkey/package.nix
···
sed -i '/^proc wait_load_handlers_disconnected/{n ; s/wait_for_condition 50 100/wait_for_condition 50 500/; }' \
tests/support/util.tcl
+
CLIENTS="$NIX_BUILD_CORES"
+
if (( $CLIENTS > 4)); then
+
CLIENTS=4
+
fi
+
# Skip some more flaky tests.
# Skip test requiring custom jemalloc (unit/memefficiency).
./runtest \
--no-latency \
--timeout 2000 \
-
--clients $NIX_BUILD_CORES \
+
--clients "$CLIENTS" \
--tags -leaks \
--skipunit unit/memefficiency \
--skipunit integration/failover \
+2 -2
pkgs/by-name/vi/virtnbdbackup/package.nix
···
python3Packages.buildPythonApplication rec {
pname = "virtnbdbackup";
-
version = "2.32";
+
version = "2.34";
pyproject = true;
src = fetchFromGitHub {
owner = "abbbi";
repo = "virtnbdbackup";
tag = "v${version}";
-
hash = "sha256-SCt+RvtY17wTGeCcMbmK7q7cLz17upTEgoKZM4pDh7s=";
+
hash = "sha256-3qB1y9iFt8GKDRzc6mvq8d4M6BczlmlAaColH4MssdI=";
};
build-system = with python3Packages; [
+2 -2
pkgs/by-name/wi/wiliwili/package.nix
···
stdenv.mkDerivation (finalAttrs: {
pname = "wiliwili";
-
version = "1.5.1";
+
version = "1.5.2";
src = fetchFromGitHub {
owner = "xfangfang";
repo = "wiliwili";
tag = "v${finalAttrs.version}";
fetchSubmodules = true;
-
hash = "sha256-37DQafP+PFjrfNXJt88oK0ghqQEVQjDdVbYsf1tHAN4=";
+
hash = "sha256-lcHKbEYlOznu9WhWX7ZoOCnxr6h/AJCLbjLmc2ZZTbg=";
};
nativeBuildInputs = [
+2 -2
pkgs/by-name/zo/zoom-us/package.nix
···
versions.x86_64-darwin = "6.5.7.60598";
# This is the fallback version so that evaluation can produce a meaningful result.
-
versions.x86_64-linux = "6.5.7.3298";
+
versions.x86_64-linux = "6.5.8.3527";
srcs = {
aarch64-darwin = fetchurl {
···
};
x86_64-linux = fetchurl {
url = "https://zoom.us/client/${versions.x86_64-linux}/zoom_x86_64.pkg.tar.xz";
-
hash = "sha256-6gzgJmB+/cwcEToQpniVVZyQZcqzblQG/num0X+xUIE=";
+
hash = "sha256-qTehkDMyc28XHtta7taNYn8gPCYS/Qdr2VMUIDDC/68=";
};
};
+52
pkgs/development/python-modules/airos/default.nix
···
+
{
+
lib,
+
buildPythonPackage,
+
fetchFromGitHub,
+
pythonOlder,
+
setuptools,
+
aiohttp,
+
mashumaro,
+
aiofiles,
+
aioresponses,
+
pytest-asyncio,
+
pytestCheckHook,
+
}:
+
+
buildPythonPackage rec {
+
pname = "airos";
+
version = "0.2.4";
+
pyproject = true;
+
+
disabled = pythonOlder "3.13";
+
+
src = fetchFromGitHub {
+
owner = "CoMPaTech";
+
repo = "python-airos";
+
tag = "v${version}";
+
hash = "sha256-zY0XPucCXiJDo9C4GiDqs/lxQDTphs/mBXBqSYPvkoI=";
+
};
+
+
build-system = [ setuptools ];
+
+
dependencies = [
+
aiohttp
+
mashumaro
+
];
+
+
nativeCheckInputs = [
+
aiofiles
+
aioresponses
+
pytest-asyncio
+
pytestCheckHook
+
];
+
+
pythonImportsCheck = [ "airos" ];
+
+
meta = {
+
description = "Ubiquity airOS module(s) for Python 3";
+
homepage = "https://github.com/CoMPaTech/python-airos";
+
changelog = "https://github.com/CoMPaTech/python-airos/releases/tag/v${version}";
+
license = lib.licenses.mit;
+
maintainers = [ lib.maintainers.jamiemagee ];
+
};
+
}
+2 -2
pkgs/development/python-modules/fastai/default.nix
···
buildPythonPackage rec {
pname = "fastai";
-
version = "2.8.2";
+
version = "2.8.3";
format = "setuptools";
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
-
hash = "sha256-ix3Sp/IKj7BLmuuGd/763LB0llSUYAbMWJD8fvWe/u8=";
+
hash = "sha256-lgUBxf8vef9HnAWh2eNxtFRMeHxDjucJrZEcONq9DK8=";
};
propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/publicsuffixlist/default.nix
···
buildPythonPackage rec {
pname = "publicsuffixlist";
-
version = "1.0.2.20250802";
+
version = "1.0.2.20250809";
pyproject = true;
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
-
hash = "sha256-/Liz65F7Rk/TJr5xICfRsK10Flzgojw2m4otnh4+y5A=";
+
hash = "sha256-eTvYGTwuSjT7ban7B9xS+8HzJfiMHnEIZSXimjMykJE=";
};
build-system = [ setuptools ];
+2 -2
pkgs/development/python-modules/pybind11-stubgen/default.nix
···
buildPythonPackage rec {
pname = "pybind11-stubgen";
-
version = "2.5.4";
+
version = "2.5.5";
pyproject = true;
build-system = [ setuptools ];
···
owner = "sizmailov";
repo = "pybind11-stubgen";
tag = "v${version}";
-
hash = "sha256-xOvh5H2n7KOOvsRecwWlaWgFIHUPYxTEOTvM9RIpTTQ=";
+
hash = "sha256-J2LydgkiNQp+2/agwBCSTtr+Ci4zONLkHmnMLFBww24=";
};
# For testing purposes, the upstream source uses a shell script to build the pybind11
+31
pkgs/development/python-modules/pyitachip2ir/default.nix
···
+
{
+
lib,
+
buildPythonPackage,
+
fetchPypi,
+
setuptools,
+
}:
+
+
buildPythonPackage rec {
+
pname = "pyitachip2ir";
+
version = "0.0.7";
+
pyproject = true;
+
+
src = fetchPypi {
+
inherit pname version;
+
hash = "sha256-T/Q3tZTTwqlaHDR2l2nRLISC4LLrOPZZv14sRxYyqDQ=";
+
};
+
+
build-system = [ setuptools ];
+
+
# Package has no tests
+
doCheck = false;
+
+
pythonImportsCheck = [ "pyitachip2ir" ];
+
+
meta = {
+
description = "Library for sending IR commands to an ITach IP2IR gateway";
+
homepage = "https://github.com/alanfischer/itachip2ir";
+
license = lib.licenses.mit;
+
maintainers = [ lib.maintainers.jamiemagee ];
+
};
+
}
+2 -2
pkgs/development/python-modules/pymiele/default.nix
···
buildPythonPackage rec {
pname = "pymiele";
-
version = "0.5.2";
+
version = "0.5.3";
pyproject = true;
disabled = pythonOlder "3.13";
src = fetchPypi {
inherit pname version;
-
hash = "sha256-pU1PC1DXoXjZVkml3OFPhKgLVqhB9LbPPE1NzphyOSk=";
+
hash = "sha256-sz8yNyh8cmgmnElEhjw7yUUUiG6bpdB4LXze6ZWFjMo=";
};
build-system = [ setuptools ];
+59
pkgs/development/python-modules/pypasser/default.nix
···
+
{
+
lib,
+
buildPythonPackage,
+
fetchFromGitHub,
+
setuptools,
+
pythonRelaxDepsHook,
+
pydub,
+
pysocks,
+
requests,
+
selenium,
+
speechrecognition,
+
}:
+
+
buildPythonPackage rec {
+
pname = "pypasser";
+
version = "0.0.5";
+
pyproject = true;
+
+
src = fetchFromGitHub {
+
owner = "xHossein";
+
repo = "PyPasser";
+
tag = version;
+
hash = "sha256-vqa+Xap9dYvjJMiGNGNmegh7rmAqwf3//MH47xwr/T0=";
+
};
+
+
build-system = [ setuptools ];
+
+
nativeBuildInputs = [
+
pythonRelaxDepsHook
+
];
+
+
pythonRelaxDeps = [
+
"speechrecognition"
+
];
+
+
dependencies = [
+
pydub
+
pysocks
+
requests
+
selenium
+
speechrecognition
+
];
+
+
pythonImportsCheck = [
+
"pypasser"
+
"pypasser.reCaptchaV2"
+
"pypasser.reCaptchaV3"
+
];
+
+
# Package has no tests
+
doCheck = false;
+
+
meta = {
+
description = "Bypassing reCaptcha V3 by sending HTTP requests & solving reCaptcha V2 using speech to text";
+
homepage = "https://github.com/xHossein/PyPasser";
+
license = lib.licenses.mit;
+
maintainers = [ lib.maintainers.jamiemagee ];
+
};
+
}
+45
pkgs/development/python-modules/pypjlink2/default.nix
···
+
{
+
lib,
+
buildPythonPackage,
+
fetchFromGitHub,
+
appdirs,
+
pytestCheckHook,
+
setuptools,
+
}:
+
+
buildPythonPackage rec {
+
pname = "pypjlink2";
+
version = "1.2.1";
+
pyproject = true;
+
+
src = fetchFromGitHub {
+
owner = "benoitlouy";
+
repo = "pypjlink";
+
tag = "v${version}";
+
hash = "sha256-0RVI9DX5JaVWntSu5du5SU45NC70TZJyVrvMuVR7grA=";
+
};
+
+
build-system = [
+
setuptools
+
];
+
+
dependencies = [
+
appdirs
+
];
+
+
nativeCheckInputs = [
+
pytestCheckHook
+
];
+
+
pythonImportsCheck = [
+
"pypjlink"
+
];
+
+
meta = {
+
description = "Python implementation of the PJLink protocol for controlling digital projectors";
+
homepage = "https://github.com/benoitlouy/pypjlink";
+
changelog = "https://github.com/benoitlouy/pypjlink/releases/tag/v${version}";
+
license = lib.licenses.asl20;
+
maintainers = [ lib.maintainers.jamiemagee ];
+
};
+
}
+2 -2
pkgs/development/python-modules/pytenable/default.nix
···
buildPythonPackage rec {
pname = "pytenable";
-
version = "1.8.2";
+
version = "1.8.3";
pyproject = true;
disabled = pythonOlder "3.10";
···
owner = "tenable";
repo = "pyTenable";
tag = version;
-
hash = "sha256-21vKR9W2Bpi+9YfmMQ+vgQIGchb7cYA2Sx493/XuYU0=";
+
hash = "sha256-91V2R29M/+kiosfkl5t6Y8qT/E041Wl1jhXCw3eQ7us=";
};
pythonRelaxDeps = [
+40
pkgs/development/python-modules/pywmspro/default.nix
···
+
{
+
lib,
+
buildPythonPackage,
+
fetchFromGitHub,
+
hatchling,
+
hatch-vcs,
+
aiohttp,
+
}:
+
+
buildPythonPackage rec {
+
pname = "pywmspro";
+
version = "0.3.2";
+
pyproject = true;
+
+
src = fetchFromGitHub {
+
owner = "mback2k";
+
repo = "pywmspro";
+
tag = version;
+
hash = "sha256-o/+WjdU9+Vh1CnZYF2IsNpK5cubAFvsqANZ4GxrKFHI=";
+
};
+
+
build-system = [
+
hatchling
+
hatch-vcs
+
];
+
+
dependencies = [ aiohttp ];
+
+
# Package has no tests
+
doCheck = false;
+
+
pythonImportsCheck = [ "wmspro" ];
+
+
meta = {
+
description = "Python library for WMS WebControl pro API";
+
homepage = "https://github.com/mback2k/pywmspro";
+
license = lib.licenses.asl20;
+
maintainers = [ lib.maintainers.jamiemagee ];
+
};
+
}
+2 -2
pkgs/development/python-modules/sagemaker-core/default.nix
···
buildPythonPackage rec {
pname = "sagemaker-core";
-
version = "1.0.47";
+
version = "1.0.49";
pyproject = true;
src = fetchFromGitHub {
owner = "aws";
repo = "sagemaker-core";
tag = "v${version}";
-
hash = "sha256-PfAv4w+egB0fIkL6nexjtoqcXyvnx52RTQu6QwKjpNU=";
+
hash = "sha256-xDtBtsrromqfciVOxGTTWhTZG08qUjk9EJ9yMvYS7+Y=";
};
build-system = [
+3 -3
pkgs/development/python-modules/storage3/default.nix
···
buildPythonPackage rec {
pname = "storage3";
-
version = "0.12.0";
+
version = "0.12.1";
pyproject = true;
src = fetchFromGitHub {
owner = "supabase";
repo = "storage-py";
-
rev = "v${version}";
-
hash = "sha256-3Z+j9n/seL1ZuB1djOVpA6Qci/Ygi9g8g2lLQGKRUHM=";
+
tag = "v${version}";
+
hash = "sha256-Ef309CTnzbaqKAVMdvroUYAy9RImWZZqhsnwRdpGVkk=";
};
dependencies = [
+46
pkgs/development/python-modules/tami4edgeapi/default.nix
···
+
{
+
lib,
+
buildPythonPackage,
+
fetchFromGitHub,
+
setuptools,
+
pyjwt,
+
pypasser,
+
requests,
+
pythonOlder,
+
}:
+
+
buildPythonPackage rec {
+
pname = "tami4edgeapi";
+
version = "3.0";
+
pyproject = true;
+
+
disabled = pythonOlder "3.7";
+
+
src = fetchFromGitHub {
+
owner = "Guy293";
+
repo = "Tami4EdgeAPI";
+
tag = "v${version}";
+
hash = "sha256-rhJ8L6qLDnO50Xp2eqquRinDTQjMxWVSjNL5GQI1gvM=";
+
};
+
+
build-system = [ setuptools ];
+
+
dependencies = [
+
pyjwt
+
pypasser
+
requests
+
];
+
+
# Package has no tests
+
doCheck = false;
+
+
pythonImportsCheck = [ "Tami4EdgeAPI" ];
+
+
meta = {
+
description = "Python API client for Tami4 Edge / Edge+ devices";
+
homepage = "https://github.com/Guy293/Tami4EdgeAPI";
+
changelog = "https://github.com/Guy293/Tami4EdgeAPI/releases/tag/v${version}";
+
license = lib.licenses.mit;
+
maintainers = [ lib.maintainers.jamiemagee ];
+
};
+
}
+64
pkgs/development/python-modules/thingspeak/default.nix
···
+
{
+
lib,
+
buildPythonPackage,
+
docopt,
+
fetchFromGitHub,
+
poetry-core,
+
pytest-vcr,
+
pytestCheckHook,
+
requests,
+
setuptools,
+
vcrpy,
+
}:
+
+
buildPythonPackage rec {
+
pname = "thingspeak";
+
version = "1.0.0";
+
pyproject = true;
+
+
src = fetchFromGitHub {
+
owner = "mchwalisz";
+
repo = "thingspeak";
+
tag = "v${version}";
+
hash = "sha256-9YvudzksWp130hkG8WxiX9WHegAVH2TT1vwMbLJ13qE=";
+
};
+
+
postPatch = ''
+
substituteInPlace pyproject.toml \
+
--replace-fail "poetry.masonry.api" "poetry.core.masonry.api" \
+
--replace-fail 'requires = ["poetry>=0.12"]' 'requires = ["poetry-core"]'
+
'';
+
+
build-system = [
+
poetry-core
+
];
+
+
dependencies = [
+
docopt
+
requests
+
setuptools
+
];
+
+
nativeCheckInputs = [
+
pytest-vcr
+
pytestCheckHook
+
vcrpy
+
];
+
+
disabledTests = [
+
# VCR cassette conflicts with different API keys
+
"test_get_with_key"
+
];
+
+
pythonImportsCheck = [
+
"thingspeak"
+
];
+
+
meta = {
+
description = "Client library for the thingspeak.com API";
+
homepage = "https://github.com/mchwalisz/thingspeak";
+
changelog = "https://github.com/mchwalisz/thingspeak/releases/tag/v${version}";
+
license = lib.licenses.lgpl3Only;
+
maintainers = [ lib.maintainers.jamiemagee ];
+
};
+
}
+48
pkgs/development/python-modules/volvocarsapi/default.nix
···
+
{
+
lib,
+
buildPythonPackage,
+
fetchFromGitHub,
+
pythonOlder,
+
aiohttp,
+
yarl,
+
hatchling,
+
}:
+
+
buildPythonPackage rec {
+
pname = "volvocarsapi";
+
version = "0.4.1";
+
pyproject = true;
+
+
disabled = pythonOlder "3.12";
+
+
src = fetchFromGitHub {
+
owner = "thomasddn";
+
repo = "volvo-cars-api";
+
tag = "v${version}";
+
hash = "sha256-YMrhVxDm8Cp8vbMVtdq6yoaAu8nUB7L2YG+LSkvMdZs=";
+
};
+
+
build-system = [
+
hatchling
+
];
+
+
dependencies = [
+
aiohttp
+
yarl
+
];
+
+
# Package has no tests
+
doCheck = false;
+
+
pythonImportsCheck = [
+
"volvocarsapi"
+
];
+
+
meta = {
+
description = "Python client for the Volvo Cars API";
+
homepage = "https://github.com/thomasddn/volvo-cars-api";
+
changelog = "https://github.com/thomasddn/volvo-cars-api/releases/tag/v${version}";
+
license = lib.licenses.gpl3Only;
+
maintainers = [ lib.maintainers.jamiemagee ];
+
};
+
}
+19 -7
pkgs/servers/home-assistant/component-packages.nix
···
];
"airos" =
ps: with ps; [
-
]; # missing inputs: airos
+
airos
+
];
"airq" =
ps: with ps; [
aioairq
···
];
"itach" =
ps: with ps; [
-
]; # missing inputs: pyitachip2ir
+
pyitachip2ir
+
];
"itunes" =
ps: with ps; [
];
···
];
"pjlink" =
ps: with ps; [
-
]; # missing inputs: pypjlink2
+
pypjlink2
+
];
"plaato" =
ps: with ps; [
aiohasupervisor
···
];
"tami4" =
ps: with ps; [
-
]; # missing inputs: Tami4EdgeAPI
+
tami4edgeapi
+
];
"tank_utility" =
ps: with ps; [
tank-utility
···
];
"thingspeak" =
ps: with ps; [
-
]; # missing inputs: thingspeak
+
thingspeak
+
];
"thinkingcleaner" =
ps: with ps; [
]; # missing inputs: pythinkingcleaner
···
];
"volvo" =
ps: with ps; [
-
]; # missing inputs: volvocarsapi
+
volvocarsapi
+
];
"volvooncall" =
ps: with ps; [
volvooncall
···
];
"wmspro" =
ps: with ps; [
-
]; # missing inputs: pywmspro
+
pywmspro
+
];
"wolflink" =
ps: with ps; [
wolf-comm
···
"airgradient"
"airly"
"airnow"
+
"airos"
"airq"
"airthings"
"airthings_ble"
···
"pi_hole"
"picnic"
"ping"
+
"pjlink"
"plaato"
"plant"
"playstation_network"
···
"tag"
"tailscale"
"tailwind"
+
"tami4"
"tankerkoenig"
"tasmota"
"tautulli"
···
"voicerss"
"voip"
"volumio"
+
"volvo"
"volvooncall"
"vulcan"
"vultr"
···
"withings"
"wiz"
"wled"
+
"wmspro"
"wolflink"
"workday"
"worldclock"
+3 -3
pkgs/servers/home-assistant/custom-components/fellow/package.nix
···
buildHomeAssistantComponent {
owner = "NewsGuyTor";
domain = "fellow";
-
version = "0.3.2";
+
version = "0-unstable-2025-08-06";
src = fetchFromGitHub {
owner = "NewsGuyTor";
repo = "FellowAiden-HomeAssistant";
-
rev = "2268880c7727b1d2e488dcebbdc5b2675d664ddf";
-
hash = "sha256-Wg6EFUQNhlK2GQjC90c5lA3b/y40LhXdInba/iTtUWc=";
+
rev = "bb0f3042e974a149a3597d06312e6be9b8d265ff";
+
hash = "sha256-cplIiFt0CkeOXjypvG0MR/t7PWzeaa2G6uScWSLbEpo=";
};
passthru.updateScript = unstableGitUpdater { };
+3 -3
pkgs/servers/monitoring/prometheus/redis-exporter.nix
···
buildGoModule rec {
pname = "redis_exporter";
-
version = "1.74.0";
+
version = "1.75.0";
src = fetchFromGitHub {
owner = "oliver006";
repo = "redis_exporter";
rev = "v${version}";
-
sha256 = "sha256-TPMbRyz476ylo6OEYYtLQCNL01dLShnJu0ncVgzL5kY=";
+
sha256 = "sha256-Z74AB3loT6KJgJBXGh3q1v49ro0gXPvIwd3URRikUa0=";
};
-
vendorHash = "sha256-q/RMdGFwZuFnjE0txb7ShhHlxLpLNF5S6KmmAKKYnaE=";
+
vendorHash = "sha256-y1j7s8R8pd3sp9yOlG2aopQ+GNO2Z7OCO1a9i9L6KM4=";
ldflags = [
"-X main.BuildVersion=${version}"
+2 -2
pkgs/servers/sql/postgresql/ext/pg_net.nix
···
postgresqlBuildExtension (finalAttrs: {
pname = "pg_net";
-
version = "0.19.4";
+
version = "0.19.5";
src = fetchFromGitHub {
owner = "supabase";
repo = "pg_net";
tag = "v${finalAttrs.version}";
-
hash = "sha256-uHsfRQ5RKhTvqokF94s/RzTQ23BRTBV+yyIW41Djjgo=";
+
hash = "sha256-Cpi2iASi1QJoED0Qs1dANqg/BNZTsz5S+pw8iYyW03Y=";
};
buildInputs = [ curl ];
+3 -3
pkgs/servers/sql/postgresql/ext/timescaledb.nix
···
postgresqlBuildExtension (finalAttrs: {
pname = "timescaledb${lib.optionalString (!enableUnfree) "-apache"}";
-
version = "2.21.1";
+
version = "2.21.2";
src = fetchFromGitHub {
owner = "timescale";
repo = "timescaledb";
tag = finalAttrs.version;
-
hash = "sha256-oZaEUz6g/8oVdVyPCkAE0quzYBxO911MZcgd8rFFA3c=";
+
hash = "sha256-pNF75Wh8WMXqxjU19KBiH/jYzT/4uBYuUMH1vRilU94=";
};
nativeBuildInputs = [ cmake ];
···
||
# PostgreSQL 18 support issue upstream: https://github.com/timescale/timescaledb/issues/8233
# Check after next package update.
-
lib.warnIf (finalAttrs.version != "2.21.1") "Is postgresql18Packages.timescaledb still broken?" (
+
lib.warnIf (finalAttrs.version != "2.21.2") "Is postgresql18Packages.timescaledb still broken?" (
lib.versionAtLeast postgresql.version "18"
);
};
+16
pkgs/top-level/python-packages.nix
···
airly = callPackage ../development/python-modules/airly { };
+
airos = callPackage ../development/python-modules/airos { };
+
airportsdata = callPackage ../development/python-modules/airportsdata { };
airthings-ble = callPackage ../development/python-modules/airthings-ble { };
···
pyisy = callPackage ../development/python-modules/pyisy { };
+
pyitachip2ir = callPackage ../development/python-modules/pyitachip2ir { };
+
pyituran = callPackage ../development/python-modules/pyituran { };
pyixapi = callPackage ../development/python-modules/pyixapi { };
···
pypass = callPackage ../development/python-modules/pypass { };
+
pypasser = callPackage ../development/python-modules/pypasser { };
+
pypblib = callPackage ../development/python-modules/pypblib { };
pypca = callPackage ../development/python-modules/pypca { };
···
pypiserver = callPackage ../development/python-modules/pypiserver { };
pypitoken = callPackage ../development/python-modules/pypitoken { };
+
+
pypjlink2 = callPackage ../development/python-modules/pypjlink2 { };
pyplaato = callPackage ../development/python-modules/pyplaato { };
···
pywlroots = callPackage ../development/python-modules/pywlroots { wlroots = pkgs.wlroots_0_17; };
+
pywmspro = callPackage ../development/python-modules/pywmspro { };
+
pyworld = callPackage ../development/python-modules/pyworld { };
pyws66i = callPackage ../development/python-modules/pyws66i { };
···
takethetime = callPackage ../development/python-modules/takethetime { };
+
tami4edgeapi = callPackage ../development/python-modules/tami4edgeapi { };
+
tank-utility = callPackage ../development/python-modules/tank-utility { };
tappy = callPackage ../development/python-modules/tappy { };
···
thespian = callPackage ../development/python-modules/thespian { };
thinc = callPackage ../development/python-modules/thinc { };
+
+
thingspeak = callPackage ../development/python-modules/thingspeak { };
thinqconnect = callPackage ../development/python-modules/thinqconnect { };
···
voluptuous-serialize = callPackage ../development/python-modules/voluptuous-serialize { };
voluptuous-stubs = callPackage ../development/python-modules/voluptuous-stubs { };
+
+
volvocarsapi = callPackage ../development/python-modules/volvocarsapi { };
volvooncall = callPackage ../development/python-modules/volvooncall { };