Merge staging-next into staging

Changed files
+466 -399
lib
systems
nixos
doc
manual
release-notes
modules
i18n
input-method
services
video
tests
pkgs
applications
editors
vscode
extensions
contextmapper.context-mapper-vscode-extension
emulators
retroarch
graphics
misc
networking
cluster
argocd
video
window-managers
hyprwm
hyprland-plugins
wayfire
by-name
bo
boxbuddy
c2
c2patool
ca
cargo-expand
cargo-make
cy
dw
jr
jreleaser-cli
ko
komac
me
pi
picocrypt-cli
ro
rofimoji
se
serie
sp
spicetify-cli
st
stats
sy
syshud
wa
walker
wl
wl-restart
data
themes
whitesur-kde
development
interpreters
php
python-modules
aiortm
coffea
cohere
dbt-core
django-webpack-loader
json-schema-for-humans
jsonschema-spec
lacuscore
llfuse
mox3
svg2tikz
wikipedia-api
os-specific
darwin
bartender
linux
ima-evm-utils
nvidia-x11
servers
http
nginx
tools
text
jotdown
top-level
+1
lib/systems/doubles.nix
···
arm = filterDoubles predicates.isAarch32;
armv7 = filterDoubles predicates.isArmv7;
+
aarch = filterDoubles predicates.isAarch;
aarch64 = filterDoubles predicates.isAarch64;
x86 = filterDoubles predicates.isx86;
i686 = filterDoubles predicates.isi686;
+5 -1
nixos/doc/manual/release-notes/rl-2411.section.md
···
Users can use it by `services.displayManager.ly.enable` and config it by
`services.displayManager.ly.settings` to generate `/etc/ly/config.ini`
-
## New Services {#sec-release-24.11-new-services}
+
## New Modules {#sec-release-24.11-new-modules}
- [TaskChampion Sync-Server](https://github.com/GothenburgBitFactory/taskchampion-sync-server), a [Taskwariror 3](https://taskwarrior.org/docs/upgrade-3/) sync server, replacing Taskwarrior 2's sync server named [`taskserver`](https://github.com/GothenburgBitFactory/taskserver).
···
```
- `pkgs.nextcloud27` has been removed since it's EOL.
+
+
- `frigate` was updated past 0.14.0. This release includes various breaking changes, so please go read the [release notes](https://github.com/blakeblackshear/frigate/releases/tag/v0.14.0).
+
Most prominently access to the webinterface and API are now protected by authentication. Retrieve the auto-created
+
admin account from the `frigate.service` journal after upgrading.
- `services.forgejo.mailerPasswordFile` has been deprecated by the drop-in replacement `services.forgejo.secrets.mailer.PASSWD`,
which is part of the new free-form `services.forgejo.secrets` option.
+4 -4
nixos/modules/i18n/input-method/fcitx5.nix
···
];
environment.etc =
let
-
lib.optionalFile = p: f: v: lib.optionalAttrs (v != { }) {
+
optionalFile = p: f: v: lib.optionalAttrs (v != { }) {
"xdg/fcitx5/${p}".text = f v;
};
in
lib.attrsets.mergeAttrsList [
-
(lib.optionalFile "config" (lib.generators.toINI { }) cfg.settings.globalOptions)
-
(lib.optionalFile "profile" (lib.generators.toINI { }) cfg.settings.inputMethod)
+
(optionalFile "config" (lib.generators.toINI { }) cfg.settings.globalOptions)
+
(optionalFile "profile" (lib.generators.toINI { }) cfg.settings.inputMethod)
(lib.concatMapAttrs
-
(name: value: lib.optionalFile
+
(name: value: optionalFile
"conf/${name}.conf"
(lib.generators.toINIWithGlobalSection { })
value)
+195 -81
nixos/modules/services/video/frigate.nix
···
'';
};
roles = mkOption {
-
type = listOf (enum [ "detect" "record" "rtmp" ]);
-
example = literalExpression ''
-
[ "detect" "rtmp" ]
-
'';
+
type = listOf (enum [ "audio" "detect" "record" ]);
+
example = [ "detect" "record" ];
description = ''
List of roles for this stream
'';
···
};
};
+
# auth_request.conf
+
nginxAuthRequest = ''
+
# Send a subrequest to verify if the user is authenticated and has permission to access the resource.
+
auth_request /auth;
+
+
# Save the upstream metadata response headers from Authelia to variables.
+
auth_request_set $user $upstream_http_remote_user;
+
auth_request_set $groups $upstream_http_remote_groups;
+
auth_request_set $name $upstream_http_remote_name;
+
auth_request_set $email $upstream_http_remote_email;
+
+
# Inject the metadata response headers from the variables into the request made to the backend.
+
proxy_set_header Remote-User $user;
+
proxy_set_header Remote-Groups $groups;
+
proxy_set_header Remote-Email $email;
+
proxy_set_header Remote-Name $name;
+
+
# Refresh the cookie as needed
+
auth_request_set $auth_cookie $upstream_http_set_cookie;
+
add_header Set-Cookie $auth_cookie;
+
+
# Pass the location header back up if it exists
+
auth_request_set $redirection_url $upstream_http_location;
+
add_header Location $redirection_url;
+
'';
+
+
nginxProxySettings = ''
+
# Basic Proxy Configuration
+
client_body_buffer_size 128k;
+
proxy_next_upstream error timeout invalid_header http_500 http_502 http_503; ## Timeout if the real server is dead.
+
proxy_redirect http:// $scheme://;
+
proxy_cache_bypass $cookie_session;
+
proxy_no_cache $cookie_session;
+
proxy_buffers 64 256k;
+
+
# Advanced Proxy Configuration
+
send_timeout 5m;
+
proxy_read_timeout 360;
+
proxy_send_timeout 360;
+
proxy_connect_timeout 360;
+
'';
+
in
{
···
services.nginx = {
enable = true;
additionalModules = with pkgs.nginxModules; [
+
develkit
secure-token
-
rtmp
+
set-misc
vod
];
recommendedProxySettings = mkDefault true;
···
# Based on https://github.com/blakeblackshear/frigate/blob/v0.13.1/docker/main/rootfs/usr/local/nginx/conf/nginx.conf
virtualHosts."${cfg.hostname}" = {
locations = {
-
"/api/" = {
-
proxyPass = "http://frigate-api/";
+
# auth_location.conf
+
"/auth" = {
+
proxyPass = "http://frigate-api/auth";
extraConfig = ''
-
proxy_cache frigate_api_cache;
-
proxy_cache_lock on;
-
proxy_cache_use_stale updating;
-
proxy_cache_valid 200 5s;
-
proxy_cache_bypass $http_x_cache_bypass;
-
proxy_no_cache $should_not_cache;
-
add_header X-Cache-Status $upstream_cache_status;
+
internal;
-
location /api/vod/ {
-
proxy_pass http://frigate-api/vod/;
-
proxy_cache off;
-
}
+
# Strip all request headers
+
proxy_pass_request_headers off;
-
location /api/stats {
-
access_log off;
-
rewrite ^/api/(.*)$ $1 break;
-
proxy_pass http://frigate-api;
-
}
+
# Pass info about the request
+
proxy_set_header X-Original-Method $request_method;
+
proxy_set_header X-Original-URL $scheme://$http_host$request_uri;
+
proxy_set_header X-Server-Port $server_port;
+
proxy_set_header Content-Length "";
+
+
# Pass along auth related info
+
proxy_set_header Authorization $http_authorization;
+
proxy_set_header Cookie $http_cookie;
+
proxy_set_header X-CSRF-TOKEN "1";
+
+
# Pass headers for common auth proxies
+
proxy_set_header Remote-User $http_remote_user;
+
proxy_set_header Remote-Groups $http_remote_groups;
+
proxy_set_header Remote-Email $http_remote_email;
+
proxy_set_header Remote-Name $http_remote_name;
+
proxy_set_header X-Forwarded-User $http_x_forwarded_user;
+
proxy_set_header X-Forwarded-Groups $http_x_forwarded_groups;
+
proxy_set_header X-Forwarded-Email $http_x_forwarded_email;
+
proxy_set_header X-Forwarded-Preferred-Username $http_x_forwarded_preferred_username;
+
proxy_set_header X-authentik-username $http_x_authentik_username;
+
proxy_set_header X-authentik-groups $http_x_authentik_groups;
+
proxy_set_header X-authentik-email $http_x_authentik_email;
+
proxy_set_header X-authentik-name $http_x_authentik_name;
+
proxy_set_header X-authentik-uid $http_x_authentik_uid;
-
location /api/version {
-
access_log off;
-
rewrite ^/api/(.*)$ $1 break;
-
proxy_pass http://frigate-api;
-
}
-
'';
-
};
-
"~* /api/.*\.(jpg|jpeg|png)$" = {
-
proxyPass = "http://frigate-api";
-
extraConfig = ''
-
rewrite ^/api/(.*)$ $1 break;
+
${nginxProxySettings}
'';
};
"/vod/" = {
-
extraConfig = ''
+
extraConfig = nginxAuthRequest + ''
aio threads;
vod hls;
···
'';
};
"/stream/" = {
-
# TODO
+
alias = "/var/cache/frigate/stream/";
+
extraConfig = nginxAuthRequest + ''
+
add_header Cache-Control "no-store";
+
expires off;
+
+
types {
+
application/dash+xml mpd;
+
application/vnd.apple.mpegurl m3u8;
+
video/mp2t ts;
+
image/jpeg jpg;
+
}
+
'';
+
};
+
"/clips/" = {
+
root = "/var/lib/frigate";
+
extraConfig = nginxAuthRequest + ''
+
types {
+
video/mp4 mp4;
+
image/jpeg jpg;
+
}
+
+
expires 7d;
+
add_header Cache-Control "public";
+
autoindex on;
+
'';
+
};
+
"/cache/" = {
+
alias = "/var/cache/frigate/";
+
extraConfig = ''
+
internal;
+
'';
+
};
+
"/recordings/" = {
+
root = "/var/lib/frigate";
+
extraConfig = nginxAuthRequest + ''
+
types {
+
video/mp4 mp4;
+
}
+
+
autoindex on;
+
autoindex_format json;
+
'';
+
};
+
"/exports/" = {
+
root = "/var/lib/frigate";
+
extraConfig = nginxAuthRequest + ''
+
types {
+
video/mp4 mp4;
+
}
+
+
autoindex on;
+
autoindex_format json;
+
'';
};
"/ws" = {
proxyPass = "http://frigate-mqtt-ws/";
proxyWebsockets = true;
+
extraConfig = nginxAuthRequest + nginxProxySettings;
};
"/live/jsmpeg" = {
proxyPass = "http://frigate-jsmpeg/";
proxyWebsockets = true;
-
};
-
"/live/mse/" = {
-
proxyPass = "http://frigate-go2rtc/";
-
proxyWebsockets = true;
+
extraConfig = nginxAuthRequest + nginxProxySettings;
};
# frigate lovelace card uses this path
"/live/mse/api/ws" = {
proxyPass = "http://frigate-go2rtc/api/ws";
proxyWebsockets = true;
-
extraConfig = ''
+
extraConfig = nginxAuthRequest + nginxProxySettings + ''
limit_except GET {
deny all;
}
'';
};
-
"/live/webrtc/" = {
-
proxyPass = "http://frigate-go2rtc/";
-
proxyWebsockets = true;
-
};
"/live/webrtc/api/ws" = {
proxyPass = "http://frigate-go2rtc/api/ws";
proxyWebsockets = true;
-
extraConfig = ''
+
extraConfig = nginxAuthRequest + nginxProxySettings + ''
limit_except GET {
deny all;
}
···
# pass through go2rtc player
"/live/webrtc/webrtc.html" = {
proxyPass = "http://frigate-go2rtc/webrtc.html";
-
proxyWebsockets = true;
-
extraConfig = ''
+
extraConfig = nginxAuthRequest + nginxProxySettings + ''
limit_except GET {
deny all;
}
'';
};
+
# frontend uses this to fetch the version
"/api/go2rtc/api" = {
proxyPass = "http://frigate-go2rtc/api";
-
proxyWebsockets = true;
-
extraConfig = ''
+
extraConfig = nginxAuthRequest + nginxProxySettings + ''
limit_except GET {
deny all;
}
···
"/api/go2rtc/webrtc" = {
proxyPass = "http://frigate-go2rtc/api/webrtc";
proxyWebsockets = true;
-
extraConfig = ''
+
extraConfig = nginxAuthRequest + nginxProxySettings + ''
limit_except GET {
deny all;
}
'';
};
-
"/cache/" = {
-
alias = "/var/cache/frigate/";
+
"~* /api/.*\.(jpg|jpeg|png|webp|gif)$" = {
+
proxyPass = "http://frigate-api";
+
extraConfig = nginxAuthRequest + nginxProxySettings + ''
+
rewrite ^/api/(.*)$ $1 break;
+
'';
};
-
"/clips/" = {
-
root = "/var/lib/frigate";
-
extraConfig = ''
-
types {
-
video/mp4 mp4;
-
image/jpeg jpg;
+
"/api/" = {
+
proxyPass = "http://frigate-api/";
+
extraConfig = nginxAuthRequest + nginxProxySettings + ''
+
add_header Cache-Control "no-store";
+
expires off;
+
+
proxy_cache frigate_api_cache;
+
proxy_cache_lock on;
+
proxy_cache_use_stale updating;
+
proxy_cache_valid 200 5s;
+
proxy_cache_bypass $http_x_cache_bypass;
+
proxy_no_cache $should_not_cache;
+
add_header X-Cache-Status $upstream_cache_status;
+
+
location /api/vod/ {
+
${nginxAuthRequest}
+
proxy_pass http://frigate-api/vod/;
+
proxy_cache off;
+
add_header Cache-Control "no-store";
+
${nginxProxySettings}
}
-
autoindex on;
-
'';
-
};
-
"/recordings/" = {
-
root = "/var/lib/frigate";
-
extraConfig = ''
-
types {
-
video/mp4 mp4;
+
location /api/login {
+
auth_request off;
+
rewrite ^/api(/.*)$ $1 break;
+
proxy_pass http://frigate-api;
+
${nginxProxySettings}
+
}
+
+
location /api/stats {
+
${nginxAuthRequest}
+
access_log off;
+
rewrite ^/api/(.*)$ $1 break;
+
add_header Cache-Control "no-store";
+
proxy_pass http://frigate-api;
+
${nginxProxySettings}
}
-
autoindex on;
-
autoindex_format json;
+
location /api/version {
+
${nginxAuthRequest}
+
access_log off;
+
rewrite ^/api/(.*)$ $1 break;
+
add_header Cache-Control "no-store";
+
proxy_pass http://frigate-api;
+
${nginxProxySettings}
+
}
'';
};
"/assets/" = {
···
};
"/" = {
root = cfg.package.web;
-
tryFiles = "$uri $uri/ /index.html";
+
tryFiles = "$uri $uri.html $uri/ /index.html";
extraConfig = ''
add_header Cache-Control "no-store";
expires off;
-
-
sub_filter 'href="/BASE_PATH/' 'href="$http_x_ingress_path/';
-
sub_filter 'url(/BASE_PATH/' 'url($http_x_ingress_path/';
-
sub_filter '"/BASE_PATH/dist/' '"$http_x_ingress_path/dist/';
-
sub_filter '"/BASE_PATH/js/' '"$http_x_ingress_path/js/';
-
sub_filter '"/BASE_PATH/assets/' '"$http_x_ingress_path/assets/';
-
sub_filter '"/BASE_PATH/monacoeditorwork/' '"$http_x_ingress_path/assets/';
-
sub_filter 'return"/BASE_PATH/"' 'return window.baseUrl';
-
sub_filter '<body>' '<body><script>window.baseUrl="$http_x_ingress_path/";</script>';
-
sub_filter_types text/css application/javascript;
-
sub_filter_once off;
'';
};
};
···
vod_segment_duration 10000;
vod_hls_mpegts_align_frames off;
vod_hls_mpegts_interleave_frames on;
+
# file handle caching / aio
open_file_cache max=1000 inactive=5m;
open_file_cache_valid 2m;
open_file_cache_min_uses 1;
open_file_cache_errors on;
aio on;
+
# https://github.com/kaltura/nginx-vod-module#vod_open_file_thread_pool
vod_open_file_thread_pool default;
+
# vod caches
vod_metadata_cache metadata_cache 512m;
vod_mapping_cache mapping_cache 5m 10m;
+
# gzip manifest
gzip_types application/vnd.apple.mpegurl;
'';
···
PrivateTmp = true;
CacheDirectory = "frigate";
CacheDirectoryMode = "0750";
+
+
# Sockets/IPC
+
RuntimeDirectory = "frigate";
};
};
};
+1 -1
nixos/tests/ceph-single-node-bluestore-dmcrypt.nix
···
{
name = "basic-single-node-ceph-cluster-bluestore-dmcrypt";
meta = with pkgs.lib.maintainers; {
-
maintainers = [ benaryorg nh2 ];
+
maintainers = [ nh2 ];
};
nodes = {
+8 -10
nixos/tests/fcitx5/default.nix
···
pkgs.alacritty
];
-
services.xserver = {
+
services.displayManager.autoLogin = {
enable = true;
-
-
displayManager = {
-
lightdm.enable = true;
-
autoLogin = {
-
enable = true;
-
user = "alice";
-
};
-
};
+
user = "alice";
+
};
+
services.xserver = {
+
enable = true;
+
displayManager.lightdm.enable = true;
desktopManager.xfce.enable = true;
};
i18n.inputMethod = {
-
enabled = "fcitx5";
+
enable = true;
+
type = "fcitx5";
fcitx5.addons = [
pkgs.fcitx5-chinese-addons
pkgs.fcitx5-hangul
+14 -7
nixos/tests/frigate.nix
···
meta.maintainers = with lib.maintainers; [ hexa ];
nodes = {
-
machine = { config, ... }: {
+
machine = {
services.frigate = {
enable = true;
···
];
serviceConfig = {
DynamicUser = true;
-
ExecStart = "${lib.getBin pkgs.ffmpeg-headless}/bin/ffmpeg -re -f lavfi -i smptebars=size=800x600:rate=10 -f mpegts -listen 1 http://0.0.0.0:8080";
+
ExecStart = "${lib.getExe pkgs.ffmpeg-headless} -re -f lavfi -i smptebars=size=1280x720:rate=5 -f mpegts -listen 1 http://0.0.0.0:8080";
Restart = "always";
};
};
+
+
environment.systemPackages = with pkgs; [ httpie ];
};
};
testScript = ''
start_all()
+
# wait until frigate is up
machine.wait_for_unit("frigate.service")
+
machine.wait_for_open_port(5001)
-
# Frigate startup
-
machine.wait_for_open_port(5001)
+
# extract admin password from logs
+
machine.wait_until_succeeds("journalctl -u frigate.service -o cat | grep -q 'Password: '")
+
password = machine.execute("journalctl -u frigate.service -o cat | grep -oP '([a-f0-9]{32})'")[1]
-
# nginx startup
-
machine.wait_for_open_port(80)
+
# login and store session
+
machine.log(machine.succeed(f"http --check-status --session=frigate post http://localhost/api/login user=admin password={password}"))
-
machine.succeed("curl http://localhost")
+
# make authenticated api requested
+
machine.log(machine.succeed("http --check-status --session=frigate get http://localhost/api/version"))
+
# wait for a recording to appear
machine.wait_for_file("/var/cache/frigate/test@*.mp4")
'';
})
+2 -2
pkgs/applications/editors/vscode/extensions/contextmapper.context-mapper-vscode-extension/default.nix
···
mktplcRef = {
name = "context-mapper-vscode-extension";
publisher = "contextmapper";
-
version = "6.11.0";
-
hash = "sha256-TvApcBBI+Egu7t4tJuEYTs6mhvABOY2eXVb57O4gWfs=";
+
version = "6.12.0";
+
hash = "sha256-iGaVipNvx6J3NgZ2KbBJOSVCwG+lr25u7mfMCY4yB18=";
};
nativeBuildInputs = [ makeWrapper ];
+2 -2
pkgs/applications/editors/vscode/extensions/default.nix
···
mktplcRef = {
name = "vscode-intelephense-client";
publisher = "bmewburn";
-
version = "1.10.4";
-
hash = "sha256-bD7AL4x0yL5S+MzQXMBrSZs1pVclfvsTfUbImP1oQok=";
+
version = "1.12.5";
+
hash = "sha256-2Tamwag4KovIOKTe/g4qePVDFxm0mgsLtPNdWcKzigI=";
};
meta = {
description = "PHP code intelligence for Visual Studio Code";
+45 -45
pkgs/applications/emulators/retroarch/hashes.json
···
"src": {
"owner": "libretro",
"repo": "beetle-pce-libretro",
-
"rev": "f6613f4b26e04e9769a0c872cdac13f9dfaa61c8",
-
"hash": "sha256-ugJDgzpH1cvLgK3boLe502vwkY4clA5IeU3jxeG5vqM="
+
"rev": "3260947537deb14c4b464fd80a132dc9d3f80a4f",
+
"hash": "sha256-2RJnXdkcyCrNK6Y2sT9PHfXtNXB4KUdsWh43G3yZrGU="
},
-
"version": "unstable-2024-08-23"
+
"version": "unstable-2024-08-30"
},
"beetle-pce-fast": {
"fetcher": "fetchFromGitHub",
"src": {
"owner": "libretro",
"repo": "beetle-pce-fast-libretro",
-
"rev": "1c7342061ec00bc9f4253f3bfa4d1d7cfd1be769",
-
"hash": "sha256-gXp3jBszow0pwkP1iIFyFuHIJa65IjxAxW16tF4s1bQ="
+
"rev": "f2b4d9b24175348ca48bffd6fd4bb203d08e01d9",
+
"hash": "sha256-ulGGr215WJIb1uF1G8sGsu/693KKLDpjBuMNRLKQMZI="
},
-
"version": "unstable-2024-08-16"
+
"version": "unstable-2024-08-30"
},
"beetle-pcfx": {
"fetcher": "fetchFromGitHub",
···
"src": {
"owner": "libretro",
"repo": "beetle-psx-libretro",
-
"rev": "208ba3fe105835ac4ce1d12e728a4a1579e8f955",
-
"hash": "sha256-nT+MsN1NQOkBIUiuxP+pos/MhgOrkkDDQPvpjmMMYP4="
+
"rev": "3b6aa830f1345a588c6217f0bf8f5da2f8e08c29",
+
"hash": "sha256-XrE9Ms6yypZWy1M0dfUD2O2zXR409or5VKLCVsiZW7U="
},
-
"version": "unstable-2024-08-23"
+
"version": "unstable-2024-08-30"
},
"beetle-saturn": {
"fetcher": "fetchFromGitHub",
···
"src": {
"owner": "libretro",
"repo": "beetle-supergrafx-libretro",
-
"rev": "178fcb2759ee8eb461bfff199ada559e71cdc74f",
-
"hash": "sha256-JR/yOMqjbgblpAx06RkZFhwnuiCNYJ7YJfKm+7bjTQo="
+
"rev": "4376f838433134dbeaa14f4a7e926d68d6f89457",
+
"hash": "sha256-gKVx9EBVQXiR6z9hhA+6DYm7zbHsoKMDG+v/tAK3c+I="
},
-
"version": "unstable-2024-08-23"
+
"version": "unstable-2024-08-30"
},
"beetle-vb": {
"fetcher": "fetchFromGitHub",
···
"src": {
"owner": "libretro",
"repo": "bsnes-libretro",
-
"rev": "c7ccdb0942df48c88ec763613d343b069f72f96d",
-
"hash": "sha256-NkI9G1e8nqPjZ/MQjsn/de/EVV5lEC7CBnIE/kTi8KE="
+
"rev": "d47f5d162e879fddf117583e7cc391989359c009",
+
"hash": "sha256-0tVXa+valyBbHFqXGG8jmargBdqgJafLrFuZ4ym7i8I="
},
-
"version": "unstable-2024-08-23"
+
"version": "unstable-2024-08-30"
},
"bsnes-hd": {
"fetcher": "fetchFromGitHub",
···
"src": {
"owner": "libretro",
"repo": "fbneo",
-
"rev": "1c76e0b0aa8103b9306e4526f6de1437a85e7fab",
-
"hash": "sha256-2N8Eurp511MXIX/oPam/iCGySiFfPgLPzNXch2Lad1s="
+
"rev": "5ea732a897919b9d4059a09146f45f4e91f5fe0d",
+
"hash": "sha256-w8XTOQlffUKDvZSEQXQYsHDhE4/2bRHNwfJRHSfpnf4="
},
-
"version": "unstable-2024-08-21"
+
"version": "unstable-2024-08-29"
},
"fceumm": {
"fetcher": "fetchFromGitHub",
···
"src": {
"owner": "flyinghead",
"repo": "flycast",
-
"rev": "308d9fc1acee55a58be5a21471680d4694ba983c",
-
"hash": "sha256-DAIxXY2ffTTv/KJ7N+raXbjB/gbDj/cej3f5CooLAS0=",
+
"rev": "9691fe962228ab0c08f3a4801e6fa0a3c47218ef",
+
"hash": "sha256-pRrc5EAZQ6fz9JAzOa2mPVByplQ66On2KMqGPVhmA4A=",
"fetchSubmodules": true
},
-
"version": "unstable-2024-08-24"
+
"version": "unstable-2024-08-30"
},
"fmsx": {
"fetcher": "fetchFromGitHub",
···
"src": {
"owner": "libretro",
"repo": "gambatte-libretro",
-
"rev": "cdfdb9bd307b14da7255e001388af58ca95647a7",
-
"hash": "sha256-kzbGpEIdaVs3vm0IE5dkzVLb+IDSSbe59ahahRYo+hs="
+
"rev": "1fbeee0a46b12d3ab28c4795172929ebb31808ea",
+
"hash": "sha256-EusFBTtJheGNfbA3lXHGt1IlSbvT6uAY/J/XkIaLJag="
},
-
"version": "unstable-2024-08-23"
+
"version": "unstable-2024-08-30"
},
"genesis-plus-gx": {
"fetcher": "fetchFromGitHub",
"src": {
"owner": "libretro",
"repo": "Genesis-Plus-GX",
-
"rev": "0ef7121e43670559f2d0de6ccaa33fae45b205f9",
-
"hash": "sha256-8keyk2XF6QS163YRX94uRmTYjZR5xiRL6o1Tk91DNUw="
+
"rev": "f0a21a7b30e033cef8e4870f7ab3781dad3606db",
+
"hash": "sha256-h9QJVlAoztlObYKqOWWRxxJ18+VhgmpMRUQOE+/PCI0="
},
-
"version": "unstable-2024-08-23"
+
"version": "unstable-2024-08-30"
},
"gpsp": {
"fetcher": "fetchFromGitHub",
···
"src": {
"owner": "libretro",
"repo": "mame",
-
"rev": "e1fa727f7c3f6363e50c71ae9b24d3d6c6b8b8ea",
-
"hash": "sha256-c7mbq0+GUQ/5gHf1byOeDX8cFuegE1AWmzO+34A+v8Q=",
+
"rev": "dc299d16818b40f123ad9507e0244f608224f621",
+
"hash": "sha256-XiZTL3umGKg4CbVCX6q4wA26JEvEPS5FyXJw6l0kDFQ=",
"fetchSubmodules": true
},
-
"version": "unstable-2024-08-19"
+
"version": "unstable-2024-08-29"
},
"mame2000": {
"fetcher": "fetchFromGitHub",
···
"src": {
"owner": "libretro",
"repo": "mame2003-plus-libretro",
-
"rev": "77808fade3b4a0df04c96b115631470df0d4ac12",
-
"hash": "sha256-iq9QMhCmk6F2WBM5rtVEwqRFEpdCJkOQikNvA/jaXX0="
+
"rev": "7d4e2ccc0143451969e0efbcb207acc690249d4c",
+
"hash": "sha256-YMbCJNP//PKUsONfNMn80nGW+lTMHXpwBybdphWCaKU="
},
-
"version": "unstable-2024-08-24"
+
"version": "unstable-2024-08-28"
},
"mame2010": {
"fetcher": "fetchFromGitHub",
···
"src": {
"owner": "jpd002",
"repo": "Play-",
-
"rev": "fa204246a09b28adc0fbf6b414e50c8e443322ba",
-
"hash": "sha256-xFpT8Vx4I1DiEITaYahLfBxkC2lFLcxBB8zdQSfVDxg=",
+
"rev": "663a1d9a75f72c34befc304901ad6063f34dc9d3",
+
"hash": "sha256-j3lqwp2qKkt2ytHQvs4IuzpFfA++uVwgz1mupOuCzH8=",
"fetchSubmodules": true
},
-
"version": "unstable-2024-08-23"
+
"version": "unstable-2024-08-27"
},
"ppsspp": {
"fetcher": "fetchFromGitHub",
"src": {
"owner": "hrydgard",
"repo": "ppsspp",
-
"rev": "6f5374b8aa457d78ee8e5fc579ad0787433ac7e3",
-
"hash": "sha256-rkOXhaPBGUoK7MhTbrAEEU1bj5Ko83UMkbwX0s7umcY=",
+
"rev": "5fd8fae8b5bedafc97487d7bc004533d9612a6c7",
+
"hash": "sha256-bSbe9qVdrXU778fheqZuXENlJRBYD/k24BC2ZT2UnwM=",
"fetchSubmodules": true
},
-
"version": "unstable-2024-08-24"
+
"version": "unstable-2024-08-27"
},
"prboom": {
"fetcher": "fetchFromGitHub",
···
"src": {
"owner": "libretro",
"repo": "libretro-uae",
-
"rev": "4493a194dd42e593914c26952ee8cb4ba750f596",
-
"hash": "sha256-uSnxx85+AX/15UvyOOiVApKT5I9SjKITfi5Osd4nBSE="
+
"rev": "3ef950be5b45b89d09e05bdc1f8f2f4a794dd7a6",
+
"hash": "sha256-364KIt7LoJqW3nsdy30CDwctWgqH+tgtWUjsmf8AswA="
},
-
"version": "unstable-2024-05-25"
+
"version": "unstable-2024-08-26"
},
"quicknes": {
"fetcher": "fetchFromGitHub",
···
"src": {
"owner": "stella-emu",
"repo": "stella",
-
"rev": "e89cf0b15b4a53064f542bb7a8315ad5137febe0",
-
"hash": "sha256-YST/9us1+oz4EwNtOtUyhO/1XPVGHD717Il+26JZzAk="
+
"rev": "59f82b1fe159a508528a0b40e541d2abdb15d67c",
+
"hash": "sha256-GIkxwon6qnzQzy0TE2w0j5KAQmuEoRr7OvtFrcutuSo="
},
-
"version": "unstable-2024-08-24"
+
"version": "unstable-2024-08-29"
},
"stella2014": {
"fetcher": "fetchFromGitHub",
+1
pkgs/applications/graphics/imv/default.nix
···
maintainers = with maintainers; [ rnhmjoj markus1189 ];
platforms = platforms.all;
badPlatforms = platforms.darwin;
+
mainProgram = "imv";
};
}
+3 -3
pkgs/applications/misc/cotp/default.nix
···
rustPlatform.buildRustPackage rec {
pname = "cotp";
-
version = "1.8.0";
+
version = "1.9.0";
src = fetchFromGitHub {
owner = "replydev";
repo = "cotp";
rev = "v${version}";
-
hash = "sha256-ey5JIlvCGmkXDGP0jol5cy/eC7grTmgNoqWecyY8DDk=";
+
hash = "sha256-Of4stKrk3zQX2gxXaM9YrZf1SVjzIVUU+7JraKHk180=";
};
-
cargoHash = "sha256-O7GqYPwbVrvU0wElUtkVVeX+4QKb6zg9Gfw+tZ78SDw=";
+
cargoHash = "sha256-DLq8w65UlfAdPsJ96mNZ+dJtm/VMPzlIYqsEJtkLKzI=";
buildInputs = lib.optionals stdenv.isLinux [ libxcb ]
++ lib.optionals stdenv.isDarwin [ AppKit ];
+2 -2
pkgs/applications/misc/mob/default.nix
···
buildGoModule rec {
pname = "mob";
-
version = "5.1.0";
+
version = "5.1.1";
src = fetchFromGitHub {
owner = "remotemobprogramming";
repo = "mob";
rev = "v${version}";
-
hash = "sha256-C8EWiInjDxo82Y8QH1d95C8CU/qEKQmPDxp3VKL8TRQ=";
+
hash = "sha256-+v48znHCfu2qBFB0JhYT1vnce0wSHMULTlwaLv0237Q=";
};
vendorHash = null;
+3 -3
pkgs/applications/networking/cluster/argocd/default.nix
···
buildGoModule rec {
pname = "argocd";
-
version = "2.12.2";
+
version = "2.12.3";
src = fetchFromGitHub {
owner = "argoproj";
repo = "argo-cd";
rev = "v${version}";
-
hash = "sha256-dQ9YLqj+voovhZShgCz46cmjSDd5qLCjIcL/3YwwP0A=";
+
hash = "sha256-XD/+alC0OZUDExXpAnxmN6zcGPrsYGxaWGU9KgdoCgM=";
};
proxyVendor = true; # darwin/linux hash mismatch
-
vendorHash = "sha256-abhoGqxM+2wiWPjZaGMDQnD9r60+E0aXTrH7J5r5prk=";
+
vendorHash = "sha256-8BX0QErfe2mxTbIToNgZ3U9OtpIy887936U68Qr+3W0=";
# Set target as ./cmd per cli-local
# https://github.com/argoproj/argo-cd/blob/master/Makefile#L227
+28 -50
pkgs/applications/video/frigate/default.nix
···
{ lib
, callPackage
-
, python311
+
, python312
, fetchFromGitHub
, fetchurl
-
, fetchpatch2
, frigate
, nixosTests
}:
let
-
version = "0.13.2";
+
version = "0.14.1";
src = fetchFromGitHub {
-
#name = "frigate-${version}-source";
+
name = "frigate-${version}-source";
owner = "blakeblackshear";
repo = "frigate";
rev = "refs/tags/v${version}";
-
hash = "sha256-NVT7yaJkVA7b7GL0S0fHjNneBzhjCru56qY1Q4sTVcE=";
+
hash = "sha256-PfUlo9ua4SVcQJTfmSVoEXHH1MUJ8A/w3kJHFpEzll8=";
};
frigate-web = callPackage ./web.nix {
inherit version src;
};
-
python = python311.override {
+
python = python312.override {
self = python;
packageOverrides = self: super: {
-
pydantic = super.pydantic_1;
-
-
versioningit = super.versioningit.overridePythonAttrs {
-
# checkPhase requires pydantic>=2
-
doCheck = false;
-
};
+
paho-mqtt = super.paho-mqtt_2;
};
};
···
inherit src;
-
patches = [
-
(fetchpatch2 {
-
name = "frigate-flask3.0-compat.patch";
-
url = "https://github.com/blakeblackshear/frigate/commit/56bdacc1c661eff8a323e033520e75e2ba0a3842.patch";
-
hash = "sha256-s/goUJxIbjq/woCEOEZECdcZoJDoWc1eM63sd60cxeY=";
-
})
-
(fetchpatch2 {
-
# https://github.com/blakeblackshear/frigate/pull/10967
-
name = "frigate-wsdl-path.patch";
-
url = "https://github.com/blakeblackshear/frigate/commit/b65656fa8733c1c2f3d944f716d2e9493ae7c99f.patch";
-
hash = "sha256-taPWFV4PldBGUKAwFMKag4W/3TLMSGdKLYG8bj1Y5mU=";
-
})
-
(fetchpatch2 {
-
# https://github.com/blakeblackshear/frigate/pull/10097
-
name = "frigate-secrets-permissionerror.patch";
-
url = "https://github.com/blakeblackshear/frigate/commit/a1424bad6c0163e790129ade7a9784514d0bf89d.patch";
-
hash = "sha256-/kIy4aW9o5AKHJQfCDVY46si+DKaUb+CsZsCGIbXvUQ=";
-
})
-
# https://github.com/blakeblackshear/frigate/pull/12324
-
./mpl-3.9.0.patch
-
];
-
postPatch = ''
echo 'VERSION = "${version}"' > frigate/version.py
substituteInPlace frigate/app.py \
-
--replace "Router(migrate_db)" 'Router(migrate_db, "${placeholder "out"}/share/frigate/migrations")'
+
--replace-fail "Router(migrate_db)" 'Router(migrate_db, "${placeholder "out"}/share/frigate/migrations")'
substituteInPlace frigate/const.py \
-
--replace "/media/frigate" "/var/lib/frigate" \
-
--replace "/tmp/cache" "/var/cache/frigate" \
-
--replace "/config" "/var/lib/frigate" \
-
--replace "{CONFIG_DIR}/model_cache" "/var/cache/frigate/model_cache"
+
--replace-fail "/media/frigate" "/var/lib/frigate" \
+
--replace-fail "/tmp/cache" "/var/cache/frigate" \
+
--replace-fail "/config" "/var/lib/frigate" \
+
--replace-fail "{CONFIG_DIR}/model_cache" "/var/cache/frigate/model_cache"
-
substituteInPlace frigate/http.py \
-
--replace "/opt/frigate" "${placeholder "out"}/${python.sitePackages}"
+
substituteInPlace frigate/comms/{config,detections,events}_updater.py frigate/comms/inter_process.py \
+
--replace-fail "ipc:///tmp/cache" "ipc:///run/frigate"
-
substituteInPlace frigate/output.py \
-
--replace "/opt/frigate" "${placeholder "out"}/${python.sitePackages}"
+
substituteInPlace frigate/detectors/detector_config.py \
+
--replace-fail "/labelmap.txt" "${placeholder "out"}/share/frigate/labelmap.txt"
-
substituteInPlace frigate/detectors/detector_config.py \
-
--replace "/labelmap.txt" "${placeholder "out"}/share/frigate/labelmap.txt"
+
# work around onvif-zeep idiosyncrasy
+
substituteInPlace frigate/ptz/onvif.py \
+
--replace-fail dist-packages site-packages
substituteInPlace frigate/config.py \
-
--replace "/cpu_model.tflite" "${tflite_cpu_model}" \
-
--replace "/edgetpu_model.tflite" "${tflite_edgetpu_model}"
+
--replace-fail "/cpu_model.tflite" "${tflite_cpu_model}" \
+
--replace-fail "/edgetpu_model.tflite" "${tflite_edgetpu_model}"
substituteInPlace frigate/test/test_config.py \
-
--replace "(MODEL_CACHE_DIR" "('/build/model_cache'" \
-
--replace "/config/model_cache" "/build/model_cache"
+
--replace-fail "(MODEL_CACHE_DIR" "('/build/model_cache'" \
+
--replace-fail "/config/model_cache" "/build/model_cache"
'';
dontBuild = true;
···
scikit-build
# docker/main/requirements-wheel.txt
click
+
distutils
flask
+
flask-limiter
imutils
+
joserfc
markupsafe
matplotlib
norfair
···
onvif-zeep
opencv4
openvino
+
pandas
paho-mqtt
peewee
peewee-migrate
···
pydantic
pytz
pyyaml
+
pyzmq
requests
ruamel-yaml
scipy
setproctitle
-
tensorflow
+
tensorflow-bin
tzlocal
unidecode
ws4py
-42
pkgs/applications/video/frigate/mpl-3.9.0.patch
···
-
From fba8cff13186bd80ceaa06806392957598139deb Mon Sep 17 00:00:00 2001
-
From: Martin Weinelt <hexa@darmstadt.ccc.de>
-
Date: Sun, 7 Jul 2024 14:23:29 +0200
-
Subject: [PATCH] Fix colormap usage with matplotlib 3.9.0
-
-
The mpl.cm toplevel registration has been removed.
-
-
https://matplotlib.org/stable/api/prev_api_changes/api_changes_3.9.0.html#top-level-cmap-registration-and-access-functions-in-mpl-cm
-
---
-
frigate/config.py | 2 +-
-
frigate/detectors/detector_config.py | 2 +-
-
2 files changed, 2 insertions(+), 2 deletions(-)
-
-
diff --git a/frigate/config.py b/frigate/config.py
-
index 2e8b2570..af4f3263 100644
-
--- a/frigate/config.py
-
+++ b/frigate/config.py
-
@@ -807,7 +807,7 @@ class CameraConfig(FrigateBaseModel):
-
def __init__(self, **config):
-
# Set zone colors
-
if "zones" in config:
-
- colors = plt.cm.get_cmap("tab10", len(config["zones"]))
-
+ colors = plt.colormaps["tab10"].resampled(len(config["zones"]))
-
config["zones"] = {
-
name: {**z, "color": tuple(round(255 * c) for c in colors(idx)[:3])}
-
for idx, (name, z) in enumerate(config["zones"].items())
-
diff --git a/frigate/detectors/detector_config.py b/frigate/detectors/detector_config.py
-
index 7fc958a3..b65631eb 100644
-
--- a/frigate/detectors/detector_config.py
-
+++ b/frigate/detectors/detector_config.py
-
@@ -125,7 +125,7 @@ class ModelConfig(BaseModel):
-
-
def create_colormap(self, enabled_labels: set[str]) -> None:
-
"""Get a list of colors for enabled labels."""
-
- cmap = plt.cm.get_cmap("tab10", len(enabled_labels))
-
+ cmap = plt.colormaps["tab10"].resampled(len(enabled_labels))
-
-
for key, val in enumerate(enabled_labels):
-
self._colormap[val] = tuple(int(round(255 * c)) for c in cmap(key)[:3])
-
--
-
2.45.1
-
+9 -2
pkgs/applications/video/frigate/web.nix
···
substituteInPlace package.json \
--replace-fail "--base=/BASE_PATH/" ""
-
substituteInPlace src/routes/Storage.jsx \
+
substituteInPlace \
+
src/views/system/StorageMetrics.tsx \
+
src/components/card/{AnimatedEvent,Export,Review}Card.tsx \
+
src/components/timeline/EventSegment.tsx \
+
src/pages/Exports.tsx \
+
src/components/player/PreviewThumbnailPlayer.tsx \
--replace-fail "/media/frigate" "/var/lib/frigate" \
+
+
substituteInPlace src/views/system/StorageMetrics.tsx \
--replace-fail "/tmp/cache" "/var/cache/frigate"
'';
-
npmDepsHash = "sha256-+36quezGArqIM9dM+UihwcIgmE3EVmJQThuicLgDW4A=";
+
npmDepsHash = "sha256-PLs3oCWQjK38eHgdQt2Qkj7YqkfanC8JnLMpzMjNfxU=";
installPhase = ''
cp -rv dist/ $out
+2 -2
pkgs/applications/video/obs-studio/plugins/obs-vertical-canvas.nix
···
stdenv.mkDerivation rec {
pname = "obs-vertical-canvas";
-
version = "1.4.8";
+
version = "1.4.9";
src = fetchFromGitHub {
owner = "Aitum";
repo = "obs-vertical-canvas";
rev = version;
-
sha256 = "sha256-AeN2Nr8HExdDMOiAwaIcnEVsbhOuiPJ+R2z6/qEnu/8=";
+
sha256 = "sha256-DFSwcN7XadHa1SGEHUdtRqPJMtS23y4dU4e/F8QmUUo=";
};
nativeBuildInputs = [ cmake ];
+2 -2
pkgs/applications/window-managers/hyprwm/hyprland-plugins/hyprgrass.nix
···
mkHyprlandPlugin hyprland rec {
pluginName = "hyprgrass";
-
version = "0.7.0";
+
version = "0.8.1";
src = fetchFromGitHub {
owner = "horriblename";
repo = "hyprgrass";
rev = "v${version}";
-
hash = "sha256-DfM2BqnFW48NlHkBfC7ErHgK7WHlOgiiE+aFetN/yJ4=";
+
hash = "sha256-3CN9ZioI5XBtp6WF61hH2EyASHUIPJQCTXiW1rt9n5w=";
};
nativeBuildInputs = [
+3 -3
pkgs/applications/window-managers/wayfire/wayfire-shadows.nix
···
stdenv.mkDerivation (finalAttrs: {
pname = "wayfire-shadows";
-
version = "unstable-2024-03-28";
+
version = "0-unstable-2024-08-30";
src = fetchFromGitHub {
owner = "timgott";
repo = "wayfire-shadows";
-
rev = "81699f6e4be65dcf3f7ad5155dfb4247b37b7997";
-
hash = "sha256-H9pqpHoeDfNBrtVLax57CUXVhU2XT+syAUZTYSJizxw=";
+
rev = "11c8ab63c1cde663a38502c6ecaeec980920c4d1";
+
hash = "sha256-/utqJevG7fn/kX81eDIN/SDvVa3rzNBe1crkHfMx8qo=";
};
nativeBuildInputs = [
+3 -3
pkgs/by-name/bo/boxbuddy/package.nix
···
rustPlatform.buildRustPackage rec {
pname = "boxbuddy";
-
version = "2.2.9";
+
version = "2.2.10";
src = fetchFromGitHub {
owner = "Dvlv";
repo = "BoxBuddyRS";
rev = version;
-
hash = "sha256-u5roZFpeVsqO/4kNdwnD2BCMSM8C0jVG98p/IdlHA8o=";
+
hash = "sha256-q09yrFO/qBXr/O3tK7seqWyBEraQ7VJB39RukS6v+ys=";
};
-
cargoHash = "sha256-LjHPIQoC/Nldfgl5sjbd+sxjtjY2ZeUd5rVaEEELQq4=";
+
cargoHash = "sha256-Ow16RxhauuisQ+GiJ5TdFa0D9FcgmAjwnk7WenXoQYo=";
# The software assumes it is installed either in flatpak or in the home directory
# so the xdg data path needs to be patched here
+3 -3
pkgs/by-name/c2/c2patool/package.nix
···
}:
rustPlatform.buildRustPackage rec {
pname = "c2patool";
-
version = "0.9.7";
+
version = "0.9.8";
src = fetchFromGitHub {
owner = "contentauth";
repo = pname;
rev = "v${version}";
-
sha256 = "sha256-5zHjPjWwYiUz+ebDoZkuEdZ+mbPTC3AnX6dTrhvjtPI=";
+
sha256 = "sha256-f1Ec2dJGVjk9Jp5nmcVYwTyIlmnZmERj1pV9weVO3lI=";
};
-
cargoHash = "sha256-lPCaR3s4Tfy0n6xGxK+eLAObRhmzXc57CI0JnVrF8sg=";
+
cargoHash = "sha256-wUGOabFTKLCEmg4zNPUklK3YddIIM4N3pev2TtlVthM=";
# use the non-vendored openssl
OPENSSL_NO_VENDOR = 1;
+3 -3
pkgs/by-name/ca/cargo-expand/package.nix
···
rustPlatform.buildRustPackage rec {
pname = "cargo-expand";
-
version = "1.0.89";
+
version = "1.0.90";
src = fetchFromGitHub {
owner = "dtolnay";
repo = pname;
rev = version;
-
hash = "sha256-oFc3hcTEZW0qgk8m4dl3NThz10ogWEMn+3BMUXmpehI=";
+
hash = "sha256-8Ls7Wklb5cnYo6acmGtjTHV1ZhSPVEQ9BsbR78a2LG0=";
};
-
cargoHash = "sha256-ce+yu3UbWbpB4UOyAAJR8MKmbJhfCHmaGHEhs5GpFeU=";
+
cargoHash = "sha256-8IKKK0xBgl5FiEoPrwO1uL/S+fOLv4Rof8KjquHJ6DI=";
meta = with lib; {
description = "Cargo subcommand to show result of macro expansion";
+3 -3
pkgs/by-name/ca/cargo-make/package.nix
···
rustPlatform.buildRustPackage rec {
pname = "cargo-make";
-
version = "0.37.15";
+
version = "0.37.16";
src = fetchFromGitHub {
owner = "sagiegurari";
repo = "cargo-make";
rev = version;
-
hash = "sha256-sIiRlqUn59BxrvOs7N1es3vJVQRerV0EhNntuXXgPJA=";
+
hash = "sha256-OC1HzoEb9OyusYGC5jmEC4qW4U3oGApYvpy5XkZttSg=";
};
-
cargoHash = "sha256-MvCGdlEevHND7buW+JuAyH6gRck5ppSAq9xylXSgm5w=";
+
cargoHash = "sha256-voa456NCuOVEcLlJeUD1G3phzLufqfE0R88aYxcd3ew=";
nativeBuildInputs = [ pkg-config ];
+3 -3
pkgs/by-name/cy/cyme/package.nix
···
rustPlatform.buildRustPackage rec {
pname = "cyme";
-
version = "1.8.1";
+
version = "1.8.2";
src = fetchFromGitHub {
owner = "tuna-f1sh";
repo = "cyme";
rev = "v${version}";
-
hash = "sha256-Rq7ykD6L+DrDNz+d++ztv+fmoSSNCoeC1YfXiIJiXzM=";
+
hash = "sha256-bmVgl6E+MdjzM4wfhKHdii+58srAStRTYU+IP/OTqdU=";
};
-
cargoHash = "sha256-XvU8r4bmI18qp+1O3nsJG3RTiiNxfKksRgkSBMsja5s=";
+
cargoHash = "sha256-dpdtjeejt+jfSlSN1NZeAWSMcDq8mOGAHTJlmBkp/4s=";
nativeBuildInputs = [
pkg-config
+2 -2
pkgs/by-name/dw/dwl/package.nix
···
assert withCustomConfigH -> (configH != null);
stdenv.mkDerivation (finalAttrs: {
pname = "dwl";
-
version = "0.6";
+
version = "0.7";
src = fetchFromGitea {
domain = "codeberg.org";
owner = "dwl";
repo = "dwl";
rev = "v${finalAttrs.version}";
-
hash = "sha256-fygUzEi4bgopesvHByfpatkLFYI98qozJOUBNM2t9Mg=";
+
hash = "sha256-7SoCITrbMrlfL4Z4hVyPpjB9RrrjLXHP9C5t1DVXBBA=";
};
nativeBuildInputs = [
+2 -2
pkgs/by-name/jr/jreleaser-cli/package.nix
···
}:
stdenv.mkDerivation rec {
pname = "jreleaser-cli";
-
version = "1.13.1";
+
version = "1.14.0";
src = fetchurl {
url = "https://github.com/jreleaser/jreleaser/releases/download/v${version}/jreleaser-tool-provider-${version}.jar";
-
hash = "sha256-aqpyEbu+UY0jToP09Wt5X9dRFs85+4uGnHu0IgdK1aM=";
+
hash = "sha256-LkkVxC3/0s468O84sgp7cNX53QRzdmUjCw+cgSWa5U0=";
};
nativeBuildInputs = [ makeWrapper ];
+3 -3
pkgs/by-name/ko/komac/package.nix
···
}:
let
-
version = "2.5.0";
+
version = "2.6.0";
src = fetchFromGitHub {
owner = "russellbanks";
repo = "Komac";
rev = "v${version}";
-
hash = "sha256-X+LZ6D7MTt/0k4hLvk7TVKiL174QDdxwPKu01MyREYw=";
+
hash = "sha256-YFaa2kU42NlhRivBEPV1mSr3j95P4NFwUKM0Xx8tpfg=";
};
in
rustPlatform.buildRustPackage {
···
pname = "komac";
-
cargoHash = "sha256-VBfXD1IF6D1z28dzXfKRz3/Hh2KRxcsYRRDV8e/Akww=";
+
cargoHash = "sha256-kb18phtY5rRNUw0ZaZu2tipAaOURSy+2duf/+cOj5Y8=";
nativeBuildInputs = [ pkg-config ];
+17 -7
pkgs/by-name/me/meli/package.nix
···
{ stdenv
, lib
, fetchzip
+
, fetchpatch
, rustPlatform
# native build inputs
···
rustPlatform.buildRustPackage rec {
pname = "meli";
-
version = "0.8.6";
+
version = "0.8.7";
src = fetchzip {
urls = [
···
"https://codeberg.org/meli/meli/archive/v${version}.tar.gz"
"https://github.com/meli/meli/archive/refs/tags/v${version}.tar.gz"
];
-
hash = "sha256-7lSxXv2i8B6vRWIJqMiXlMqHH6fmgACy9X5qNKuj+IU=";
+
hash = "sha256-2+JIehi2wuWdARbhFPvNPIJ9ucZKWjNSORszEG9lyjw=";
};
-
cargoHash = "sha256-vZkMfaALnRBK9ZwMB2uvvJgQq+BdUX7enNnr9t5H+MY=";
+
cargoHash = "sha256-ZVhUkpiiPKbWcf56cXFgn3Nyr63STHLlD7mpYEetNIY=";
+
+
cargoPatches = [
+
(fetchpatch {
+
# https://github.com/NixOS/nixpkgs/issues/332957#issuecomment-2278578811
+
name = "fix-rust-1.80-compat.patch";
+
url = "https://git.meli-email.org/meli/meli/commit/6b05279a0987315c401516cac8ff0b016a8e02a8.patch";
+
hash = "sha256-mh8H7wmHMXAe01UTvdY8vJeeLyH6ZFwylNLFFL+4LO0=";
+
})
+
];
# Needed to get openssl-sys to use pkg-config
OPENSSL_NO_VENDOR=1;
···
nativeCheckInputs = [
file
+
gnum4
];
postInstall = ''
···
'';
checkFlags = [
-
"--skip=conf::test_config_parse" # panicking due to sandbox
-
"--skip=smtp::test::test_smtp" # requiring network
-
"--skip=utils::xdg::query_default_app" # doesn't build
-
"--skip=utils::xdg::query_mime_info" # doesn't build
+
"--skip=conf::tests::test_config_parse" # panicking due to sandbox
+
"--skip=utils::tests::test_shellexpandtrait_impls" # panicking due to sandbox
+
"--skip=utils::tests::test_shellexpandtrait" # panicking due to sandbox
];
meta = with lib; {
+3 -3
pkgs/by-name/pi/picocrypt-cli/package.nix
···
buildGoModule rec {
pname = "picocrypt-cli";
-
version = "2.05";
+
version = "2.06";
src = fetchFromGitHub {
owner = "Picocrypt";
repo = "CLI";
rev = version;
-
hash = "sha256-9VvPgATij6WkOVaRDAmwjRshzPk6UCTlaiYJzceTHFQ=";
+
hash = "sha256-vxHYTgNVhTTN1yQkqjvlzqq7pV0XiQqTHI9HqIUVyR4=";
};
sourceRoot = "${src.name}/picocrypt";
-
vendorHash = "sha256-UNyBDWdl9G8Rt3BLWZyuh1bv4jd9TZ9sOfUAgDPzjlw=";
+
vendorHash = "sha256-Nuo4oIJxp+liNLNXRvbFTE1ElEIM1OBp5CTb0KEV/7g=";
ldflags = [
"-s"
+2 -2
pkgs/by-name/ro/rofimoji/package.nix
···
python3Packages.buildPythonApplication rec {
pname = "rofimoji";
-
version = "6.3.2";
+
version = "6.4.0";
pyproject = true;
src = fetchFromGitHub {
owner = "fdw";
repo = "rofimoji";
rev = "refs/tags/${version}";
-
hash = "sha256-LJJWHn3UnrCJaowHHuYksD2MHqClLc2MmYYXQfUxTgQ=";
+
hash = "sha256-QFwAlC3MwpslIOCvEAlS33tPFaz4T8G5+YCVznMhzes=";
};
nativeBuildInputs = [
+3 -3
pkgs/by-name/se/serie/package.nix
···
rustPlatform.buildRustPackage rec {
pname = "serie";
-
version = "0.1.2";
+
version = "0.2.0";
src = fetchFromGitHub {
owner = "lusingander";
repo = "serie";
rev = "v${version}";
-
hash = "sha256-sFxIGC9zg8D0qhHpT1fAzrU25AxBbJRPzD2c+H8Z/1Y=";
+
hash = "sha256-0NQ/csgAoD15fyuXCDgABF6eDEITwJk98qPL81IptJA=";
};
-
cargoHash = "sha256-JaR1BcKigMa27l8kdsRoClb3ifPtob3+sa2cqnpFeFs=";
+
cargoHash = "sha256-4Mic+hFBmId01k4AmOBA2matf28Py3mVOsVNWgqaMA0=";
buildInputs = lib.optionals stdenv.isDarwin (
with darwin.apple_sdk.frameworks;
+2 -2
pkgs/by-name/sp/spicetify-cli/package.nix
···
buildGoModule rec {
pname = "spicetify-cli";
-
version = "2.37.4";
+
version = "2.37.7";
src = fetchFromGitHub {
owner = "spicetify";
repo = "cli";
rev = "v${version}";
-
hash = "sha256-MiuQeyFNW0/RNYrJnVSi6Tyo1CSxciUnVytU3Wnug+g=";
+
hash = "sha256-Sfh2dvqCsV5rl6SmfqV6icJrTcsJy89RibCIRrf2p0k=";
};
vendorHash = "sha256-kv+bMyVOJTztn8mNNTK/kp4nvc5m1I5M041s3nPpob8=";
+2 -2
pkgs/by-name/st/stats/package.nix
···
stdenvNoCC.mkDerivation (finalAttrs: {
pname = "stats";
-
version = "2.11.4";
+
version = "2.11.7";
src = fetchurl {
url = "https://github.com/exelban/stats/releases/download/v${finalAttrs.version}/Stats.dmg";
-
hash = "sha256-Cm5gu+rL3eerAOnNcNUL2MlXsxV2jMiJLwgGtskIVP4=";
+
hash = "sha256-UppO7Cky+9xYg292t/78GPJ822kJ0RMG9yvetxRMVsU=";
};
sourceRoot = ".";
+3 -3
pkgs/by-name/sy/syshud/package.nix
···
stdenv.mkDerivation (finalAttrs: {
pname = "syshud";
-
version = "0-unstable-2024-08-24";
+
version = "0-unstable-2024-08-27";
src = fetchFromGitHub {
owner = "System64fumo";
repo = "syshud";
-
rev = "93f94c866b0ed6326ec7cc6da04221e1feaafeef";
-
hash = "sha256-+l7WDDrdKiFZAGrtARC86hDrNML8BMYIw0Z4yg/bKsU=";
+
rev = "aa2c153f6aa15962c6b97a77dbe8c45708155fe0";
+
hash = "sha256-SBpufr37K6LC4yc9ircUEBrzuRCKmJzD3C17N34qNGk=";
};
postPatch = ''
+2 -2
pkgs/by-name/wa/walker/package.nix
···
buildGoModule rec {
pname = "walker";
-
version = "0.7.6";
+
version = "0.7.7";
src = fetchFromGitHub {
owner = "abenz1267";
repo = "walker";
rev = "v${version}";
-
hash = "sha256-cVWBpe+quzZweZkklFgw10CN7/KrhvqPvFpzbuLILzw=";
+
hash = "sha256-UJxLVnKfMLPkzec3XwNHcHE1x5kPFMoyqed0VNgFJ4w=";
};
vendorHash = "sha256-xLhpHrggOGq5VLjQO7OvH/Ei5YivJJhTsy2ek2AudRs=";
+36
pkgs/by-name/wl/wl-restart/package.nix
···
+
{
+
stdenv,
+
lib,
+
fetchFromGitHub,
+
cmake,
+
scdoc,
+
}:
+
+
stdenv.mkDerivation (finalAttrs: {
+
pname = "wl-restart";
+
version = "0.2.0";
+
+
src = fetchFromGitHub {
+
owner = "Ferdi265";
+
repo = "wl-restart";
+
rev = "refs/tags/v${finalAttrs.version}";
+
hash = "sha256-pMsYLU9pjN2cgz7FxJJwkDHKJt1mIAuagJSBjrPUMAM=";
+
};
+
+
cmakeFlags = [ (lib.cmakeBool "INSTALL_DOCUMENTATION" true) ];
+
+
nativeBuildInputs = [
+
scdoc
+
cmake
+
];
+
+
meta = {
+
description = "Simple tool that restarts your compositor when it crashes";
+
homepage = "https://github.com/Ferdi265/wl-restart";
+
changelog = "https://github.com/Ferdi265/wl-restart/releases/tag/v${finalAttrs.version}";
+
license = lib.licenses.gpl3Plus;
+
mainProgram = "wl-restart";
+
maintainers = with lib.maintainers; [ bot-wxt1221 ];
+
platforms = lib.platforms.linux;
+
};
+
})
+3 -3
pkgs/data/themes/whitesur-kde/default.nix
···
stdenvNoCC.mkDerivation {
pname = "whitesur-kde";
-
version = "2022-05-01-unstable-2024-08-07";
+
version = "2022-05-01-unstable-2024-08-26";
src = fetchFromGitHub {
owner = "vinceliuice";
repo = "whitesur-kde";
-
rev = "a5c704224069a9e10fce82eec3c4ba482924d7ef";
-
hash = "sha256-GGrddhmYOp2qm1rHyBnSjQIyw0pU7CNJhxUt6da8ZpQ=";
+
rev = "ead6fd7308b3cae1b4634d00ddc685f9a88c59a9";
+
hash = "sha256-1YDy+g8r6NIceV1ygJK+w24g4ehzsPFMSWoLkuiNosU=";
};
# Propagate sddm theme dependencies to user env otherwise sddm does
+2 -2
pkgs/development/interpreters/php/8.3.nix
···
let
base = callPackage ./generic.nix (_args // {
-
version = "8.3.10";
-
hash = "sha256-5YQZnDULRjQ8NwabucwgrYk8sEx0fIme8bBercDuo7A=";
+
version = "8.3.11";
+
hash = "sha256-ZkDiRVCAqJrcQdTle7BPjCv7fuxif+GZr5c7/zTX8O4=";
});
in
base.withExtensions ({ all, ... }: with all; ([
+2 -2
pkgs/development/python-modules/aiortm/default.nix
···
buildPythonPackage rec {
pname = "aiortm";
-
version = "0.8.20";
+
version = "0.8.22";
pyproject = true;
disabled = pythonOlder "3.9";
···
owner = "MartinHjelmare";
repo = "aiortm";
rev = "refs/tags/v${version}";
-
hash = "sha256-W0o4RdaGExfTlTIndY3QUmqqeG2GA3pf3zeokY6xPvk=";
+
hash = "sha256-9owFyqkeCdOAb0erD8wNPAwF5qNPLpISNGjfMdUorPk=";
};
postPatch = ''
+2 -2
pkgs/development/python-modules/coffea/default.nix
···
buildPythonPackage rec {
pname = "coffea";
-
version = "2024.8.2";
+
version = "2024.8.3";
pyproject = true;
disabled = pythonOlder "3.8";
···
owner = "CoffeaTeam";
repo = "coffea";
rev = "refs/tags/v${version}";
-
hash = "sha256-Lgen4HNZpnd+IDXRHk3U0kFiFZh72RcqAOIg+eyd150=";
+
hash = "sha256-aOe1U0IWQIgTJgUAs6WZWQmYnOTzdS+hRlK9QgU3qqk=";
};
build-system = [
+2 -2
pkgs/development/python-modules/cohere/default.nix
···
buildPythonPackage rec {
pname = "cohere";
-
version = "5.8.1";
+
version = "5.9.0";
pyproject = true;
disabled = pythonOlder "3.8";
···
owner = "cohere-ai";
repo = "cohere-python";
rev = "refs/tags/${version}";
-
hash = "sha256-IU+6X2lyH+5SeWSfzogLLj0D5t1rRwkNbb8AyaaIxnA=";
+
hash = "sha256-lD/J21RfJ6iBLOr0lzYBJmbTdiZUV8z6IMhZFbfWixM=";
};
build-system = [ poetry-core ];
+2 -2
pkgs/development/python-modules/dbt-core/default.nix
···
buildPythonPackage rec {
pname = "dbt-core";
-
version = "1.8.2";
+
version = "1.8.6";
pyproject = true;
disabled = pythonOlder "3.8";
···
owner = "dbt-labs";
repo = "dbt-core";
rev = "refs/tags/v${version}";
-
hash = "sha256-W1bD/XUmBYKzx66/rO//lCG+LOwDSlOW/KQPs0+cKTI=";
+
hash = "sha256-Zd1qPTfJgoGpkrMSt0K1jAdYAxICdru9vIXXqbmZryo=";
};
sourceRoot = "${src.name}/core";
+2 -2
pkgs/development/python-modules/django-webpack-loader/default.nix
···
buildPythonPackage rec {
pname = "django-webpack-loader";
-
version = "3.1.0";
+
version = "3.1.1";
pyproject = true;
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit pname version;
-
hash = "sha256-sGuDyoGe1Lu4WKtXuNjLZ6JcSlftgi3t1On+5MCXr9U=";
+
hash = "sha256-8Rt5cA0b/BKZExvfS6R5wewgD4OhQA4aL+tcK6e2+MQ=";
};
build-system = [ setuptools-scm ];
+2 -2
pkgs/development/python-modules/json-schema-for-humans/default.nix
···
buildPythonPackage rec {
pname = "json-schema-for-humans";
-
version = "1.0.2";
+
version = "1.0.3";
pyproject = true;
disabled = pythonOlder "3.7";
···
owner = "coveooss";
repo = "json-schema-for-humans";
rev = "refs/tags/v${version}";
-
hash = "sha256-SSMUHC4IsMIIhmRrG0ZWNO2MNKKvoBSybmEEibAY5q0=";
+
hash = "sha256-QMDbuiHfL8JLYJwceyxGR3Zc8+ZBVlCGHOBeH5x4BmQ=";
};
pythonRelaxDeps = [ "dataclasses-json" ];
+2 -2
pkgs/development/python-modules/jsonschema-spec/default.nix
···
buildPythonPackage rec {
pname = "jsonschema-spec";
-
version = "0.2.4";
+
version = "0.3.3";
format = "pyproject";
disabled = pythonOlder "3.8";
···
owner = "p1c2u";
repo = pname;
rev = "refs/tags/${version}";
-
hash = "sha256-1Flb3XQCGhrAYzTvriSVhHDb/Z/uvCyZdbav2u7f3sg=";
+
hash = "sha256-oBzB6Ke19QDcMQm4MpnaS132/prrtnCekAXuPMloZx4=";
};
postPatch = ''
+2 -2
pkgs/development/python-modules/lacuscore/default.nix
···
buildPythonPackage rec {
pname = "lacuscore";
-
version = "1.10.11";
+
version = "1.10.12";
pyproject = true;
disabled = pythonOlder "3.8";
···
owner = "ail-project";
repo = "LacusCore";
rev = "refs/tags/v${version}";
-
hash = "sha256-WO0aAvSm0fE7AjgFxnLc5Sej0Ub7v8LruSgrwdFlUPE=";
+
hash = "sha256-A81zSdEpCNgPjSAGs/1Ja6MR2WcDf7Xx31Lm4SKkBtc=";
};
pythonRelaxDeps = [
+2 -2
pkgs/development/python-modules/llfuse/default.nix
···
buildPythonPackage rec {
pname = "llfuse";
-
version = "1.5.0";
+
version = "1.5.1";
format = "pyproject";
···
owner = "python-llfuse";
repo = "python-llfuse";
rev = "refs/tags/release-${version}";
-
hash = "sha256-6/iW5eHmX6ODVPLFkOo3bN9yW8ixqy2MHwQ2r9FA0iI=";
+
hash = "sha256-wni/b1hEn6/G0RszCJi+wmBHx6F0Ov1cZ/sRf8PLmps=";
};
nativeBuildInputs = [
-46
pkgs/development/python-modules/mox3/default.nix
···
-
{
-
lib,
-
buildPythonPackage,
-
fetchPypi,
-
pythonOlder,
-
pythonAtLeast,
-
subunit,
-
testrepository,
-
testtools,
-
six,
-
pbr,
-
fixtures,
-
}:
-
-
buildPythonPackage rec {
-
pname = "mox3";
-
version = "1.1.0";
-
format = "setuptools";
-
disabled = pythonOlder "3.6" || pythonAtLeast "3.11";
-
-
src = fetchPypi {
-
inherit pname version;
-
sha256 = "8a526b7b9b6341f541a9aef3e08c93fd84a5373fe89d4cc51dd571f085b2363c";
-
};
-
-
buildInputs = [
-
subunit
-
testrepository
-
testtools
-
six
-
];
-
propagatedBuildInputs = [
-
pbr
-
fixtures
-
];
-
-
# Disabling as several tests dependencies are missing:
-
# https://opendev.org/openstack/mox3/src/branch/master/test-requirements.txt
-
doCheck = false;
-
-
meta = with lib; {
-
description = "Mock object framework for Python";
-
homepage = "https://docs.openstack.org/mox3/latest/";
-
license = licenses.asl20;
-
};
-
}
+2 -2
pkgs/development/python-modules/svg2tikz/default.nix
···
buildPythonPackage rec {
pname = "svg2tikz";
-
version = "3.1.0";
+
version = "3.2.0";
disabled = pythonOlder "3.7";
···
owner = "xyz2tex";
repo = "svg2tikz";
rev = "refs/tags/v${version}";
-
hash = "sha256-lL+CQGZMK+rxjw2kTNE6kK3FCt6ARsAD6ROMsXWwDCs=";
+
hash = "sha256-5SOUvrK83ff1x4MTVoJy68OaDmZUfrEwraEWmPMJKTA=";
};
build-system = [
+3 -3
pkgs/development/python-modules/wikipedia-api/default.nix
···
buildPythonPackage rec {
pname = "wikipedia-api";
-
version = "0.6.0";
+
version = "0.7.1";
format = "setuptools";
src = fetchFromGitHub {
owner = "martin-majlis";
repo = "Wikipedia-API";
-
rev = "v${version}";
-
hash = "sha256-cmwyQhKbkIpZXkKqqT0X2Lp8OFma2joeb4uxDRPiQe8=";
+
rev = "refs/tags/v${version}";
+
hash = "sha256-bjmvUZpwDJJrB2k13NMSMHNyiJFXCvo007PPHwBVeq8=";
};
propagatedBuildInputs = [ requests ];
+2 -2
pkgs/os-specific/darwin/bartender/default.nix
···
stdenvNoCC.mkDerivation (finalAttrs: {
pname = "bartender";
-
version = "5.1.0";
+
version = "5.1.1";
src = fetchurl {
name = "Bartender ${lib.versions.major finalAttrs.version}.dmg";
url = "https://www.macbartender.com/B2/updates/${builtins.replaceStrings [ "." ] [ "-" ] finalAttrs.version}/Bartender%20${lib.versions.major finalAttrs.version}.dmg";
-
hash = "sha256-rYHr0/ooBesi6AuCL4rw1neBkg1OSecubxhid6UyEr4=";
+
hash = "sha256-XxBnzHYX/S172rVEiymc3sLOmIeH7ttIxSHMsh1vR/s=";
};
dontPatch = true;
+2 -2
pkgs/os-specific/linux/ima-evm-utils/default.nix
···
stdenv.mkDerivation rec {
pname = "ima-evm-utils";
-
version = "1.6";
+
version = "1.6.2";
src = fetchFromGitHub {
owner = "linux-integrity";
repo = "ima-evm-utils";
rev = "refs/tags/v${version}";
-
hash = "sha256-rS2KChYKHnaR17VKYXyb28AsWnLZ8CRoHhLOUejO8Z8=";
+
hash = "sha256-vIu12Flc2DiEqUSKAfoUi7Zg6D25pURvlYKEQKHER4I=";
};
strictDeps = true;
+3 -3
pkgs/os-specific/linux/nvidia-x11/default.nix
···
# Vulkan developer beta driver
# See here for more information: https://developer.nvidia.com/vulkan-driver
vulkan_beta = generic rec {
-
version = "550.40.70";
+
version = "550.40.71";
persistencedVersion = "550.54.14";
settingsVersion = "550.54.14";
-
sha256_64bit = "sha256-tZhIf1TzbcRnEaJjB3ZvsiA0IkdjG/Ak412po14p+N8=";
-
openSha256 = "sha256-HyaBybZkQfuUvW8tmw09i/c8gOjMFAXEMhoyBohBrRo=";
+
sha256_64bit = "sha256-LDh3Kz7Iop+Y2rxXANuPPkDr6WKPuZ5KV9L3+RPa2d0=";
+
openSha256 = "sha256-0HGAE0SlQmEc75E0h7Oq7qu7rVfLhQoBqQF1OuHSa2Y=";
settingsSha256 = "sha256-m2rNASJp0i0Ez2OuqL+JpgEF0Yd8sYVCyrOoo/ln2a4=";
persistencedSha256 = "sha256-XaPN8jVTjdag9frLPgBtqvO/goB5zxeGzaTU0CdL6C4=";
url = "https://developer.nvidia.com/downloads/vulkan-beta-${lib.concatStrings (lib.splitVersion version)}-linux";
+2 -2
pkgs/servers/http/nginx/modules.nix
···
name = "develkit";
owner = "vision5";
repo = "ngx_devel_kit";
-
rev = "v0.3.1";
-
sha256 = "1c5zfpvm0hrd9lp8rasmw79dnr2aabh0i6y11wzb783bp8m3p2sq";
+
rev = "v0.3.3";
+
hash= "sha256-/RQUVHwIdNqm3UemQ/oNs2ksg8beziA4Pxejd5Yg0Pg=";
};
meta = with lib; {
+3 -3
pkgs/tools/text/jotdown/default.nix
···
rustPlatform.buildRustPackage rec {
pname = "jotdown";
-
version = "0.4.1";
+
version = "0.5.0";
src = fetchFromGitHub {
owner = "hellux";
repo = "jotdown";
rev = version;
-
hash = "sha256-qFx87AVGi42OCFCvksgiLh+NkXNgzfPxjcP0zDeC1is=";
+
hash = "sha256-lJnHdywxKf3CWgSB91MqQreyUhKArpT2lqQqSIpgnUY=";
};
-
cargoHash = "sha256-IsUlTSv2QcO67FpN0eAK1gKLJelr9sfX8DefcmzHbcc=";
+
cargoHash = "sha256-ESwo1J5OCJbmlZoTOPaeNIqRCTMAJtgkhrR0bcRqQwk=";
meta = with lib; {
description = "Minimal Djot CLI";
+1 -1
pkgs/top-level/all-packages.nix
···
dyff = callPackage ../development/tools/dyff { };
dwl = callPackage ../by-name/dw/dwl/package.nix {
-
wlroots = wlroots_0_17;
+
wlroots = wlroots_0_18;
dwm = callPackage ../applications/window-managers/dwm {
+1
pkgs/top-level/python-aliases.nix
···
mitmproxy-wireguard = throw "mitmproxy-wireguard has been removed because it was replaced by upstream with mitmproxy-rs"; # added 2023-11-06
mkdocs-minify = mkdocs-minify-plugin; # added 2023-11-28
mox = throw "mox was removed because it is unmaintained"; # added 2023-02-21
+
mox3 = throw "mox3 was removed because it is unmaintained"; # added 2024-08-30
mrkd = throw "mrkd has been promoted to a top-level attribute name: `pkgs.mrkd`"; # added 2023-08-01
multi_key_dict = multi-key-dict; # added 2023-11-05
mutmut = throw "mutmut has been promoted to a top-level attribute name: `pkgs.mutmut`"; # added 2022-10-02
-2
pkgs/top-level/python-packages.nix
···
moviepy = callPackage ../development/python-modules/moviepy { };
-
mox3 = callPackage ../development/python-modules/mox3 { };
-
mozart-api = callPackage ../development/python-modules/mozart-api { };
mozilla-django-oidc = callPackage ../development/python-modules/mozilla-django-oidc { };
+2 -2
pkgs/top-level/ruby-packages.nix
···
platforms = [];
source = {
remotes = ["https://rubygems.org"];
-
sha256 = "0428ady49qssmnmwnafzrjvyba8mzbridsgblv7c7kmd0vqgfn99";
+
sha256 = "1ik3in0957l9s6iwdm3nsk4za072cj27riiqgpx6zzcd22flbw3s";
type = "gem";
};
-
version = "3.3.0";
+
version = "3.3.6";
};
rmagick = {
dependencies = ["observer" "pkg-config"];