Merge branch 'master' into staging-next-2022-04-23

This commit is contained in:
Vladimír Čunát 2022-04-27 22:50:17 +02:00
commit 51554cbbdb
No known key found for this signature in database
GPG key ID: E747DF1F9575A3AA
201 changed files with 2493 additions and 1713 deletions

View file

@ -2272,6 +2272,7 @@
fingerprint = "539F 0655 4D35 38A5 429A E253 13E7 9449 C052 5215"; fingerprint = "539F 0655 4D35 38A5 429A E253 13E7 9449 C052 5215";
}]; }];
name = "ckie"; name = "ckie";
matrix = "@ckie:ckie.dev";
}; };
clkamp = { clkamp = {
email = "c@lkamp.de"; email = "c@lkamp.de";
@ -6834,12 +6835,6 @@
githubId = 99639; githubId = 99639;
name = "Pawel Kruszewski"; name = "Pawel Kruszewski";
}; };
ktosiek = {
email = "tomasz.kontusz@gmail.com";
github = "ktosiek";
githubId = 278013;
name = "Tomasz Kontusz";
};
kubukoz = { kubukoz = {
email = "kubukoz@gmail.com"; email = "kubukoz@gmail.com";
github = "kubukoz"; github = "kubukoz";

View file

@ -40,7 +40,7 @@ section for details on container networking.)
To disable the container, just remove it from `configuration.nix` and To disable the container, just remove it from `configuration.nix` and
run `nixos-rebuild run `nixos-rebuild
switch`. Note that this will not delete the root directory of the switch`. Note that this will not delete the root directory of the
container in `/var/lib/containers`. Containers can be destroyed using container in `/var/lib/nixos-containers`. Containers can be destroyed using
the imperative method: `nixos-container destroy foo`. the imperative method: `nixos-container destroy foo`.
Declarative containers can be started and stopped using the Declarative containers can be started and stopped using the

View file

@ -10,8 +10,8 @@ You create a container with identifier `foo` as follows:
# nixos-container create foo # nixos-container create foo
``` ```
This creates the container's root directory in `/var/lib/containers/foo` This creates the container's root directory in `/var/lib/nixos-containers/foo`
and a small configuration file in `/etc/containers/foo.conf`. It also and a small configuration file in `/etc/nixos-containers/foo.conf`. It also
builds the container's initial system configuration and stores it in builds the container's initial system configuration and stores it in
`/nix/var/nix/profiles/per-container/foo/system`. You can modify the `/nix/var/nix/profiles/per-container/foo/system`. You can modify the
initial configuration of the container on the command line. For initial configuration of the container on the command line. For

View file

@ -48,8 +48,8 @@ containers.database = {
<literal>configuration.nix</literal> and run <literal>configuration.nix</literal> and run
<literal>nixos-rebuild switch</literal>. Note that this will not <literal>nixos-rebuild switch</literal>. Note that this will not
delete the root directory of the container in delete the root directory of the container in
<literal>/var/lib/containers</literal>. Containers can be destroyed <literal>/var/lib/nixos-containers</literal>. Containers can be
using the imperative method: destroyed using the imperative method:
<literal>nixos-container destroy foo</literal>. <literal>nixos-container destroy foo</literal>.
</para> </para>
<para> <para>

View file

@ -14,8 +14,9 @@
</programlisting> </programlisting>
<para> <para>
This creates the containers root directory in This creates the containers root directory in
<literal>/var/lib/containers/foo</literal> and a small configuration <literal>/var/lib/nixos-containers/foo</literal> and a small
file in <literal>/etc/containers/foo.conf</literal>. It also builds configuration file in
<literal>/etc/nixos-containers/foo.conf</literal>. It also builds
the containers initial system configuration and stores it in the containers initial system configuration and stores it in
<literal>/nix/var/nix/profiles/per-container/foo/system</literal>. <literal>/nix/var/nix/profiles/per-container/foo/system</literal>.
You can modify the initial configuration of the container on the You can modify the initial configuration of the container on the

View file

@ -475,6 +475,28 @@ Existing 3rd party modules that provided similar functionality, like <literal>pu
new versions will release. new versions will release.
</para> </para>
</listitem> </listitem>
<listitem>
<para>
The configuration and state directories used by
<literal>nixos-containers</literal> have been moved from
<literal>/etc/containers</literal> and
<literal>/var/lib/containers</literal> to
<literal>/etc/nixos-containers</literal> and
<literal>/var/lib/nixos-containers</literal>.
</para>
<para>
If you are changing <literal>system.stateVersion</literal> to
<literal>&quot;22.05&quot;</literal> manually on an existing
system you are responsible for migrating these directories
yourself.
</para>
<para>
This is to improve compatibility with
<literal>libcontainer</literal> based software such as Podman
and Skopeo which assumes they have ownership over
<literal>/etc/containers</literal>.
</para>
</listitem>
<listitem> <listitem>
<para> <para>
<literal>security.klogd</literal> was removed. Logging of <literal>security.klogd</literal> was removed. Logging of

View file

@ -154,6 +154,16 @@ In addition to numerous new and upgraded packages, this release has the followin
org-contrib, refer to the ones in `pkgs.emacsPackages.elpaPackages` and org-contrib, refer to the ones in `pkgs.emacsPackages.elpaPackages` and
`pkgs.emacsPackages.nongnuPackages` where the new versions will release. `pkgs.emacsPackages.nongnuPackages` where the new versions will release.
- The configuration and state directories used by `nixos-containers` have been
moved from `/etc/containers` and `/var/lib/containers` to
`/etc/nixos-containers` and `/var/lib/nixos-containers`.
If you are changing `system.stateVersion` to `"22.05"` manually on an existing
system you are responsible for migrating these directories yourself.
This is to improve compatibility with `libcontainer` based software such as Podman and Skopeo
which assumes they have ownership over `/etc/containers`.
- `security.klogd` was removed. Logging of kernel messages is handled - `security.klogd` was removed. Logging of kernel messages is handled
by systemd since Linux 3.5. by systemd since Linux 3.5.

View file

@ -8,7 +8,10 @@ let
version = "2.40-13.0"; version = "2.40-13.0";
src = pkgs.fetchurl { src = pkgs.fetchurl {
url = "https://downloads.linux.hpe.com/SDR/downloads/MCP/Ubuntu/pool/non-free/${pname}-${version}_amd64.deb"; urls = [
"https://downloads.linux.hpe.com/SDR/downloads/MCP/Ubuntu/pool/non-free/${pname}-${version}_amd64.deb"
"http://apt.netangels.net/pool/main/h/hpssacli/${pname}-${version}_amd64.deb"
];
sha256 = "11w7fwk93lmfw0yya4jpjwdmgjimqxx6412sqa166g1pz4jil4sw"; sha256 = "11w7fwk93lmfw0yya4jpjwdmgjimqxx6412sqa166g1pz4jil4sw";
}; };

View file

@ -39,6 +39,12 @@
# Supported in newer board revisions # Supported in newer board revisions
arm_boost=1 arm_boost=1
[cm4]
# Enable host mode on the 2711 built-in XHCI USB controller.
# This line should be removed if the legacy DWC2 controller is required
# (e.g. for USB device mode) or if USB support is not required.
otg_mode=1
[all] [all]
# Boot in 64-bit mode. # Boot in 64-bit mode.
arm_64bit=1 arm_64bit=1
@ -65,6 +71,9 @@
cp ${pkgs.ubootRaspberryPi4_64bit}/u-boot.bin firmware/u-boot-rpi4.bin cp ${pkgs.ubootRaspberryPi4_64bit}/u-boot.bin firmware/u-boot-rpi4.bin
cp ${pkgs.raspberrypi-armstubs}/armstub8-gic.bin firmware/armstub8-gic.bin cp ${pkgs.raspberrypi-armstubs}/armstub8-gic.bin firmware/armstub8-gic.bin
cp ${pkgs.raspberrypifw}/share/raspberrypi/boot/bcm2711-rpi-4-b.dtb firmware/ cp ${pkgs.raspberrypifw}/share/raspberrypi/boot/bcm2711-rpi-4-b.dtb firmware/
cp ${pkgs.raspberrypifw}/share/raspberrypi/boot/bcm2711-rpi-400.dtb firmware/
cp ${pkgs.raspberrypifw}/share/raspberrypi/boot/bcm2711-rpi-cm4.dtb firmware/
cp ${pkgs.raspberrypifw}/share/raspberrypi/boot/bcm2711-rpi-cm4s.dtb firmware/
''; '';
populateRootCommands = '' populateRootCommands = ''
mkdir -p ./files/boot mkdir -p ./files/boot

View file

@ -40,6 +40,9 @@ in
# SD cards. # SD cards.
"sdhci_pci" "sdhci_pci"
# NVMe drives
"nvme"
# Firewire support. Not tested. # Firewire support. Not tested.
"ohci1394" "sbp2" "ohci1394" "sbp2"

View file

@ -36,12 +36,12 @@ let
# register new services # register new services
${concatStringsSep "\n" (mapAttrsToList (name: service: '' ${concatStringsSep "\n" (mapAttrsToList (name: service: ''
if echo "$NEW_SERVICES" | grep -xq ${name}; then if echo "$NEW_SERVICES" | grep -xq "${name}"; then
bash -c ${escapeShellArg (concatStringsSep " \\\n " ([ bash -c ${escapeShellArg (concatStringsSep " \\\n " ([
"set -a && source ${service.registrationConfigFile} &&" "set -a && source ${service.registrationConfigFile} &&"
"gitlab-runner register" "gitlab-runner register"
"--non-interactive" "--non-interactive"
"--name ${name}" (if service.description != null then "--description \"${service.description}\"" else "--name '${name}'")
"--executor ${service.executor}" "--executor ${service.executor}"
"--limit ${toString service.limit}" "--limit ${toString service.limit}"
"--request-concurrency ${toString service.requestConcurrency}" "--request-concurrency ${toString service.requestConcurrency}"
@ -365,6 +365,13 @@ in
with <literal>RUNNER_ENV</literal> variable set. with <literal>RUNNER_ENV</literal> variable set.
''; '';
}; };
description = mkOption {
type = types.nullOr types.str;
default = null;
description = ''
Name/description of the runner.
'';
};
executor = mkOption { executor = mkOption {
type = types.str; type = types.str;
default = "docker"; default = "docker";

View file

@ -43,7 +43,7 @@ let
path = [ pkgs.coreutils ]; path = [ pkgs.coreutils ];
preStart = '' preStart = ''
${optionalString (suppl.configFile.path!=null) '' ${optionalString (suppl.configFile.path!=null && suppl.configFile.writable) ''
(umask 077 && touch -a "${suppl.configFile.path}") (umask 077 && touch -a "${suppl.configFile.path}")
''} ''}
${optionalString suppl.userControlled.enable '' ${optionalString suppl.userControlled.enable ''

View file

@ -92,6 +92,7 @@ in
services.udisks2.enable = true; services.udisks2.enable = true;
services.upower.enable = config.powerManagement.enable; services.upower.enable = config.powerManagement.enable;
services.xserver.libinput.enable = mkDefault true;
services.dbus.packages = [ e.efl ]; services.dbus.packages = [ e.efl ];

View file

@ -62,6 +62,9 @@ in
services.gvfs.enable = true; services.gvfs.enable = true;
services.upower.enable = config.powerManagement.enable; services.upower.enable = config.powerManagement.enable;
xdg.portal.enable = true;
xdg.portal.extraPortals = [ pkgs.lxqt.xdg-desktop-portal-lxqt ];
}; };
} }

View file

@ -4,6 +4,11 @@ with lib;
let let
configurationPrefix = optionalString (versionAtLeast config.system.stateVersion "22.05") "nixos-";
configurationDirectoryName = "${configurationPrefix}containers";
configurationDirectory = "/etc/${configurationDirectoryName}";
stateDirectory = "/var/lib/${configurationPrefix}containers";
# The container's init script, a small wrapper around the regular # The container's init script, a small wrapper around the regular
# NixOS stage-2 init script. # NixOS stage-2 init script.
containerInit = (cfg: containerInit = (cfg:
@ -77,7 +82,7 @@ let
startScript = cfg: startScript = cfg:
'' ''
mkdir -p -m 0755 "$root/etc" "$root/var/lib" mkdir -p -m 0755 "$root/etc" "$root/var/lib"
mkdir -p -m 0700 "$root/var/lib/private" "$root/root" /run/containers mkdir -p -m 0700 "$root/var/lib/private" "$root/root" /run/nixos-containers
if ! [ -e "$root/etc/os-release" ]; then if ! [ -e "$root/etc/os-release" ]; then
touch "$root/etc/os-release" touch "$root/etc/os-release"
fi fi
@ -249,11 +254,11 @@ let
SyslogIdentifier = "container %i"; SyslogIdentifier = "container %i";
EnvironmentFile = "-/etc/containers/%i.conf"; EnvironmentFile = "-${configurationDirectory}/%i.conf";
Type = "notify"; Type = "notify";
RuntimeDirectory = lib.optional cfg.ephemeral "containers/%i"; RuntimeDirectory = lib.optional cfg.ephemeral "${configurationDirectoryName}/%i";
# Note that on reboot, systemd-nspawn returns 133, so this # Note that on reboot, systemd-nspawn returns 133, so this
# unit will be restarted. On poweroff, it returns 0, so the # unit will be restarted. On poweroff, it returns 0, so the
@ -737,15 +742,21 @@ in
config = mkIf (config.boot.enableContainers) (let config = mkIf (config.boot.enableContainers) (let
warnings = flatten [
(optional (config.virtualisation.containers.enable && versionOlder config.system.stateVersion "22.05") ''
Enabling both boot.enableContainers & virtualisation.containers on system.stateVersion < 22.05 is unsupported.
'')
];
unit = { unit = {
description = "Container '%i'"; description = "Container '%i'";
unitConfig.RequiresMountsFor = "/var/lib/containers/%i"; unitConfig.RequiresMountsFor = "${stateDirectory}/%i";
path = [ pkgs.iproute2 ]; path = [ pkgs.iproute2 ];
environment = { environment = {
root = "/var/lib/containers/%i"; root = "${stateDirectory}/%i";
INSTANCE = "%i"; INSTANCE = "%i";
}; };
@ -782,8 +793,8 @@ in
script = startScript containerConfig; script = startScript containerConfig;
postStart = postStartScript containerConfig; postStart = postStartScript containerConfig;
serviceConfig = serviceDirectives containerConfig; serviceConfig = serviceDirectives containerConfig;
unitConfig.RequiresMountsFor = lib.optional (!containerConfig.ephemeral) "/var/lib/containers/%i"; unitConfig.RequiresMountsFor = lib.optional (!containerConfig.ephemeral) "${stateDirectory}/%i";
environment.root = if containerConfig.ephemeral then "/run/containers/%i" else "/var/lib/containers/%i"; environment.root = if containerConfig.ephemeral then "/run/nixos-containers/%i" else "${stateDirectory}/%i";
} // ( } // (
if containerConfig.autoStart then if containerConfig.autoStart then
{ {
@ -792,7 +803,7 @@ in
after = [ "network.target" ]; after = [ "network.target" ];
restartTriggers = [ restartTriggers = [
containerConfig.path containerConfig.path
config.environment.etc."containers/${name}.conf".source config.environment.etc."${configurationDirectoryName}/${name}.conf".source
]; ];
restartIfChanged = true; restartIfChanged = true;
} }
@ -800,12 +811,12 @@ in
)) config.containers) )) config.containers)
)); ));
# Generate a configuration file in /etc/containers for each # Generate a configuration file in /etc/nixos-containers for each
# container so that container@.target can get the container # container so that container@.target can get the container
# configuration. # configuration.
environment.etc = environment.etc =
let mkPortStr = p: p.protocol + ":" + (toString p.hostPort) + ":" + (if p.containerPort == null then toString p.hostPort else toString p.containerPort); let mkPortStr = p: p.protocol + ":" + (toString p.hostPort) + ":" + (if p.containerPort == null then toString p.hostPort else toString p.containerPort);
in mapAttrs' (name: cfg: nameValuePair "containers/${name}.conf" in mapAttrs' (name: cfg: nameValuePair "${configurationDirectoryName}/${name}.conf"
{ text = { text =
'' ''
SYSTEM_PATH=${cfg.path} SYSTEM_PATH=${cfg.path}
@ -854,7 +865,11 @@ in
ENV{INTERFACE}=="v[eb]-*", ENV{NM_UNMANAGED}="1" ENV{INTERFACE}=="v[eb]-*", ENV{NM_UNMANAGED}="1"
''; '';
environment.systemPackages = [ pkgs.nixos-container ]; environment.systemPackages = [
(pkgs.nixos-container.override {
inherit stateDirectory configurationDirectory;
})
];
boot.kernelModules = [ boot.kernelModules = [
"bridge" "bridge"

View file

@ -33,10 +33,10 @@ import ./make-test-python.nix ({ pkgs, lib, ... }: {
machine.succeed("nixos-container start webserver") machine.succeed("nixos-container start webserver")
with subtest("Container got its own root folder"): with subtest("Container got its own root folder"):
machine.succeed("ls /run/containers/webserver") machine.succeed("ls /run/nixos-containers/webserver")
with subtest("Container persistent directory is not created"): with subtest("Container persistent directory is not created"):
machine.fail("ls /var/lib/containers/webserver") machine.fail("ls /var/lib/nixos-containers/webserver")
# Since "start" returns after the container has reached # Since "start" returns after the container has reached
# multi-user.target, we should now be able to access it. # multi-user.target, we should now be able to access it.
@ -49,6 +49,6 @@ import ./make-test-python.nix ({ pkgs, lib, ... }: {
machine.fail(f"curl --fail --connect-timeout 2 http://{ip}/ > /dev/null") machine.fail(f"curl --fail --connect-timeout 2 http://{ip}/ > /dev/null")
with subtest("Container's root folder was removed"): with subtest("Container's root folder was removed"):
machine.fail("ls /run/containers/webserver") machine.fail("ls /run/nixos-containers/webserver")
''; '';
}) })

View file

@ -69,8 +69,8 @@ import ./make-test-python.nix ({ pkgs, lib, ... }: {
with subtest(f"Put the root of {id2} into a bind mount"): with subtest(f"Put the root of {id2} into a bind mount"):
machine.succeed( machine.succeed(
f"mv /var/lib/containers/{id2} /id2-bindmount", f"mv /var/lib/nixos-containers/{id2} /id2-bindmount",
f"mount --bind /id2-bindmount /var/lib/containers/{id1}", f"mount --bind /id2-bindmount /var/lib/nixos-containers/{id1}",
) )
ip1 = machine.succeed(f"nixos-container show-ip {id1}").rstrip() ip1 = machine.succeed(f"nixos-container show-ip {id1}").rstrip()
@ -88,7 +88,7 @@ import ./make-test-python.nix ({ pkgs, lib, ... }: {
"Create a directory with a dummy file and bind-mount it into both containers." "Create a directory with a dummy file and bind-mount it into both containers."
): ):
for id in id1, id2: for id in id1, id2:
important_path = f"/var/lib/containers/{id}/very/important/data" important_path = f"/var/lib/nixos-containers/{id}/very/important/data"
machine.succeed( machine.succeed(
f"mkdir -p {important_path}", f"mkdir -p {important_path}",
f"mount --bind /nested-bindmount {important_path}", f"mount --bind /nested-bindmount {important_path}",
@ -154,13 +154,13 @@ import ./make-test-python.nix ({ pkgs, lib, ... }: {
machine.succeed("grep -qF 'important data' /nested-bindmount/dummy") machine.succeed("grep -qF 'important data' /nested-bindmount/dummy")
with subtest("Ensure that the container path is gone"): with subtest("Ensure that the container path is gone"):
print(machine.succeed("ls -lsa /var/lib/containers")) print(machine.succeed("ls -lsa /var/lib/nixos-containers"))
machine.succeed(f"test ! -e /var/lib/containers/{id1}") machine.succeed(f"test ! -e /var/lib/nixos-containers/{id1}")
with subtest("Ensure that a failed container creation doesn'leave any state"): with subtest("Ensure that a failed container creation doesn'leave any state"):
machine.fail( machine.fail(
"nixos-container create b0rk --config-file ${brokenCfg}" "nixos-container create b0rk --config-file ${brokenCfg}"
) )
machine.succeed("test ! -e /var/lib/containers/b0rk") machine.succeed("test ! -e /var/lib/nixos-containers/b0rk")
''; '';
}) })

View file

@ -62,7 +62,7 @@ import ./make-test-python.nix ({ pkgs, lib, ... }: {
machine.succeed( machine.succeed(
tmpfs_cmd("touch /root/test.file"), tmpfs_cmd("touch /root/test.file"),
tmpfs_cmd("ls -l /root | grep -q test.file"), tmpfs_cmd("ls -l /root | grep -q test.file"),
"test -e /var/lib/containers/tmpfs/root/test.file", "test -e /var/lib/nixos-containers/tmpfs/root/test.file",
) )
with subtest( with subtest(
@ -73,7 +73,7 @@ import ./make-test-python.nix ({ pkgs, lib, ... }: {
tmpfs_cmd("touch /some/random/path/test.file"), tmpfs_cmd("touch /some/random/path/test.file"),
tmpfs_cmd("test -e /some/random/path/test.file"), tmpfs_cmd("test -e /some/random/path/test.file"),
) )
machine.fail("test -e /var/lib/containers/tmpfs/some/random/path/test.file") machine.fail("test -e /var/lib/nixos-containers/tmpfs/some/random/path/test.file")
with subtest( with subtest(
"files created in the hosts container dir in a path where a tmpfs " "files created in the hosts container dir in a path where a tmpfs "
@ -81,9 +81,9 @@ import ./make-test-python.nix ({ pkgs, lib, ... }: {
+ "the do not exist in the tmpfs" + "the do not exist in the tmpfs"
): ):
machine.succeed( machine.succeed(
"touch /var/lib/containers/tmpfs/var/test.file", "touch /var/lib/nixos-containers/tmpfs/var/test.file",
"test -e /var/lib/containers/tmpfs/var/test.file", "test -e /var/lib/nixos-containers/tmpfs/var/test.file",
"ls -l /var/lib/containers/tmpfs/var/ | grep -q test.file 2>/dev/null", "ls -l /var/lib/nixos-containers/tmpfs/var/ | grep -q test.file 2>/dev/null",
) )
machine.fail(tmpfs_cmd("ls -l /var | grep -q test.file")) machine.fail(tmpfs_cmd("ls -l /var | grep -q test.file"))
''; '';

View file

@ -18,20 +18,20 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "amberol"; pname = "amberol";
version = "0.3.0"; version = "0.4.3";
src = fetchFromGitLab { src = fetchFromGitLab {
domain = "gitlab.gnome.org"; domain = "gitlab.gnome.org";
owner = "World"; owner = "World";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "sha256-+9lrSkjk7V+ZnIhmhw7lEiEywDp5adoAW+5PEAlhpSI="; sha256 = "sha256-4yW7rVlP9Zskyt4l/VQoX+9q3TUdEuLZrNQuQvziIf4=";
}; };
cargoDeps = rustPlatform.fetchCargoTarball { cargoDeps = rustPlatform.fetchCargoTarball {
inherit src; inherit src;
name = "${pname}-${version}"; name = "${pname}-${version}";
sha256 = "sha256-ZJiD6RshEjZ7h+/KYcY+ZjL5fHRb5+RKgIdgbD6LdkA="; sha256 = "sha256-1ahEWLBmkT+B8qD0Qd1skXqk1wvP6yuFNAQBRdispC4=";
}; };
postPatch = '' postPatch = ''

View file

@ -40,6 +40,11 @@ in
url = "https://github.com/Audio4Linux/JDSP4Linux/commit/003c9e9fc426f83e269aed6e05be3ed55273931a.patch"; url = "https://github.com/Audio4Linux/JDSP4Linux/commit/003c9e9fc426f83e269aed6e05be3ed55273931a.patch";
hash = "sha256-crll/a7C9pUq9eL5diq8/YgC5bNC6SrdijZEBxZpJ8E="; hash = "sha256-crll/a7C9pUq9eL5diq8/YgC5bNC6SrdijZEBxZpJ8E=";
}) })
# compatibility fix for PipeWire 0.3.44+, remove on version bump
(fetchpatch {
url = "https://github.com/Audio4Linux/JDSP4Linux/commit/e04c55735cc20fc3c3ce042c5681ec80f7df3c96.patch";
hash = "sha256-o6AUtQzugykALSdkM3i3lYqRmzJX3FzmALSi0TrWuRA=";
})
]; ];
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -0,0 +1,82 @@
{ lib
, stdenv
, fetchFromGitHub
, copyDesktopItems
, pkg-config
, qtbase
, qtsvg
, qtmultimedia
, qmake
, gst_all_1
, libpulseaudio
, makeDesktopItem
, viper4linux
, wrapQtAppsHook
}:
let
gstPluginPath = lib.makeSearchPathOutput "lib" "lib/gstreamer-1.0" (with gst_all_1; [ gstreamer gst-plugins-viperfx gst-plugins-base gst-plugins-good ]);
in
stdenv.mkDerivation rec {
pname = "viper4linux-gui";
version = "unstable-2022-04-23";
src = fetchFromGitHub {
owner = "Audio4Linux";
repo = "Viper4Linux-GUI";
rev = "2d0c84d7dda76c59e31c850e38120002eb779b7a";
sha256 = "sha256-5YlLCF598i/sldczPEgCB+1KJDA7jqM964QDSNjgTKM=";
};
desktopItems = [
(makeDesktopItem {
name = pname;
exec = "viper-gui";
icon = "viper";
desktopName = "viper4linux";
genericName = "Equalizer";
comment = meta.description;
categories = [ "AudioVideo" "Audio" ];
startupNotify = false;
})
];
nativeBuildInputs = [
qmake
pkg-config
wrapQtAppsHook
copyDesktopItems
];
buildInputs = [
qtbase
qtmultimedia
qtsvg
gst_all_1.gstreamer
gst_all_1.gst-plugins-bad
gst_all_1.gst-plugins-viperfx
libpulseaudio
viper4linux
];
qmakeFlags = [ "V4L_Frontend.pro" ];
qtWrapperArgs = [
"--prefix PATH : ${lib.makeBinPath [ viper4linux gst_all_1.gstreamer ]}"
"--prefix GST_PLUGIN_SYSTEM_PATH_1_0 : ${gstPluginPath}"
];
installPhase = ''
runHook preInstalli
install -D V4L_Frontend $out/bin/viper-gui
install -D icons/viper.png $out/share/icons/viper.png
runHook postInstall
'';
meta = with lib; {
description = "Official UI for Viper4Linux2";
homepage = "https://github.com/Audio4Linux/Viper4Linux-GUI";
license = licenses.gpl3Plus;
platforms = [ "x86_64-linux" ];
maintainers = with maintainers; [ rewine ];
};
}

View file

@ -0,0 +1,61 @@
{ lib
, stdenv
, fetchFromGitHub
, pkg-config
, gst_all_1
, libviperfx
, makeWrapper
}:
let
gstPluginPath = lib.makeSearchPathOutput "lib" "lib/gstreamer-1.0" (with gst_all_1; [ gstreamer gst-plugins-viperfx gst-plugins-base gst-plugins-good ]);
in
stdenv.mkDerivation rec {
pname = "viper4linux";
version = "unstable-2022-03-13";
src = fetchFromGitHub {
owner = "Audio4Linux";
repo = "Viper4Linux";
rev = "5da25644824f88cf0db24378d2c84770ba4f6816";
sha256 = "sha256-CJNVr/1ehJzX45mxunXcRAypBBGEBdswOzAVG2H+ayg=";
};
nativeBuildInputs = [ makeWrapper ];
buildInputs = [
gst_all_1.gstreamer
gst_all_1.gst-plugins-base
gst_all_1.gst-plugins-good
gst_all_1.gst-plugins-viperfx
libviperfx
];
dontBuild = true;
postPatch = ''
substituteInPlace viper --replace "/etc/viper4linux" "$out/etc/viper4linux"
'';
installPhase = ''
runHook preInstall
install -D viper -t $out/bin
mkdir -p $out/etc/viper4linux
cp -r viper4linux/* $out/etc/viper4linux
runHook postInstall
'';
postFixup = ''
wrapProgram "$out/bin/viper" \
--prefix PATH : $out/bin:${lib.makeBinPath [ gst_all_1.gstreamer ]} \
--prefix GST_PLUGIN_SYSTEM_PATH_1_0 : ${gstPluginPath} \
--prefix LD_LIBRARY_PATH : ${lib.makeLibraryPath [ libviperfx ]}
'';
meta = with lib; {
description = "An Adaptive Digital Sound Processor";
homepage = "https://github.com/Audio4Linux/Viper4Linux";
license = licenses.gpl3Plus;
platforms = [ "x86_64-linux" ];
maintainers = with maintainers; [ rewine ];
};
}

View file

@ -25,7 +25,7 @@
with lib; with lib;
let let
version = "22.0"; version = "23.0";
majorVersion = versions.major version; majorVersion = versions.major version;
desktop = fetchurl { desktop = fetchurl {
url = "https://raw.githubusercontent.com/bitcoin-core/packaging/${majorVersion}.x/debian/bitcoin-qt.desktop"; url = "https://raw.githubusercontent.com/bitcoin-core/packaging/${majorVersion}.x/debian/bitcoin-qt.desktop";
@ -41,7 +41,7 @@ stdenv.mkDerivation rec {
"https://bitcoincore.org/bin/bitcoin-core-${version}/bitcoin-${version}.tar.gz" "https://bitcoincore.org/bin/bitcoin-core-${version}/bitcoin-${version}.tar.gz"
"https://bitcoin.org/bin/bitcoin-core-${version}/bitcoin-${version}.tar.gz" "https://bitcoin.org/bin/bitcoin-core-${version}/bitcoin-${version}.tar.gz"
]; ];
sha256 = "d0e9d089b57048b1555efa7cd5a63a7ed042482045f6f33402b1df425bf9613b"; sha256 = "26748bf49d6d6b4014d0fedccac46bf2bcca42e9d34b3acfd9e3467c415acc05";
}; };
nativeBuildInputs = nativeBuildInputs =

View file

@ -21,11 +21,11 @@ let
in in
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "clightning"; pname = "clightning";
version = "0.10.2"; version = "0.11.0.1";
src = fetchurl { src = fetchurl {
url = "https://github.com/ElementsProject/lightning/releases/download/v${version}/clightning-v${version}.zip"; url = "https://github.com/ElementsProject/lightning/releases/download/v${version}/clightning-v${version}.zip";
sha256 = "3c9dcb686217b2efe0e988e90b95777c4591e3335e259e01a94af87e0bf01809"; sha256 = "e2ad6eead19a0cd8869e291c27d318cf553bb015339c1f0e8d8b30e7bc0910d8";
}; };
# when building on darwin we need dawin.cctools to provide the correct libtool # when building on darwin we need dawin.cctools to provide the correct libtool

View file

@ -26,6 +26,8 @@ mkDerivation rec {
kcrash kcrash
]; ];
outputs = [ "out" "dev" ];
meta = with lib; { meta = with lib; {
license = licenses.gpl2; license = licenses.gpl2;
description = "A hex editor"; description = "A hex editor";

View file

@ -1,4 +1,4 @@
{ mkDerivation, lib, fetchurl, cmake, doxygen, extra-cmake-modules, wrapGAppsHook { mkDerivation, lib, fetchurl, fetchpatch, cmake, doxygen, extra-cmake-modules, wrapGAppsHook
# For `digitaglinktree` # For `digitaglinktree`
, perl, sqlite , perl, sqlite
@ -43,6 +43,7 @@
, pcre , pcre
, threadweaver , threadweaver
, x265 , x265
, jasper
# For panorama and focus stacking # For panorama and focus stacking
, enblend-enfuse , enblend-enfuse
@ -55,13 +56,21 @@
mkDerivation rec { mkDerivation rec {
pname = "digikam"; pname = "digikam";
version = "7.4.0"; version = "7.6.0";
src = fetchurl { src = fetchurl {
url = "mirror://kde/stable/${pname}/${version}/digiKam-${version}.tar.xz"; url = "mirror://kde/stable/${pname}/${version}/digiKam-${version}.tar.xz";
sha256 = "sha256-0Iq2bacyu0SbwQEG7BHdne+ls1Yt7TdBsEHbuqcVUEo="; sha256 = "sha256-2OHucyHT/DE5FvUVdW4wKaxBh9xFO2kzhI1N5TFLZkE=";
}; };
patches = [
(fetchpatch {
name = "akonadi-22.04.patch";
url = "https://github.com/archlinux/svntogit-packages/raw/1b3c76a4482055524120f598325d90545ff9c020/trunk/akonadi-22.04.patch";
sha256 = "sha256-ittgkl2t/nAD0ci2fNYoAd4E2M6Gg0vqqjxqZugBuko=";
})
];
nativeBuildInputs = [ cmake doxygen extra-cmake-modules kdoctools wrapGAppsHook ]; nativeBuildInputs = [ cmake doxygen extra-cmake-modules kdoctools wrapGAppsHook ];
buildInputs = [ buildInputs = [
@ -86,6 +95,7 @@ mkDerivation rec {
opencv opencv
pcre pcre
x265 x265
jasper
qtbase qtbase
qtxmlpatterns qtxmlpatterns
@ -115,6 +125,7 @@ mkDerivation rec {
"-DENABLE_MEDIAPLAYER=1" "-DENABLE_MEDIAPLAYER=1"
"-DENABLE_QWEBENGINE=on" "-DENABLE_QWEBENGINE=on"
"-DENABLE_APPSTYLES=on" "-DENABLE_APPSTYLES=on"
"-DCMAKE_CXX_FLAGS=-I${libksane}/include/KF5" # fix `#include <ksane_version.h>`
]; ];
dontWrapGApps = true; dontWrapGApps = true;

View file

@ -86,6 +86,7 @@ let
dragon = callPackage ./dragon.nix {}; dragon = callPackage ./dragon.nix {};
elisa = callPackage ./elisa.nix {}; elisa = callPackage ./elisa.nix {};
eventviews = callPackage ./eventviews.nix {}; eventviews = callPackage ./eventviews.nix {};
falkon = callPackage ./falkon.nix {};
ffmpegthumbs = callPackage ./ffmpegthumbs.nix { }; ffmpegthumbs = callPackage ./ffmpegthumbs.nix { };
filelight = callPackage ./filelight.nix {}; filelight = callPackage ./filelight.nix {};
granatier = callPackage ./granatier.nix {}; granatier = callPackage ./granatier.nix {};
@ -97,7 +98,7 @@ let
kaccounts-providers = callPackage ./kaccounts-providers.nix {}; kaccounts-providers = callPackage ./kaccounts-providers.nix {};
kaddressbook = callPackage ./kaddressbook.nix {}; kaddressbook = callPackage ./kaddressbook.nix {};
kalarm = callPackage ./kalarm.nix {}; kalarm = callPackage ./kalarm.nix {};
kalarmcal = callPackage ./kalarmcal.nix {}; kalendar = callPackage ./kalendar.nix {};
kalzium = callPackage ./kalzium.nix {}; kalzium = callPackage ./kalzium.nix {};
kamoso = callPackage ./kamoso.nix {}; kamoso = callPackage ./kamoso.nix {};
kapman = callPackage ./kapman.nix {}; kapman = callPackage ./kapman.nix {};
@ -219,6 +220,7 @@ let
print-manager = callPackage ./print-manager.nix {}; print-manager = callPackage ./print-manager.nix {};
rocs = callPackage ./rocs.nix {}; rocs = callPackage ./rocs.nix {};
skanlite = callPackage ./skanlite.nix {}; skanlite = callPackage ./skanlite.nix {};
skanpage = callPackage ./skanpage.nix {};
spectacle = callPackage ./spectacle.nix {}; spectacle = callPackage ./spectacle.nix {};
yakuake = callPackage ./yakuake.nix {}; yakuake = callPackage ./yakuake.nix {};
zanshin = callPackage ./zanshin.nix {}; zanshin = callPackage ./zanshin.nix {};

View file

@ -1,21 +1,13 @@
{ stdenv, mkDerivation, lib, fetchFromGitHub, fetchpatch { stdenv, mkDerivation, lib, fetchFromGitHub, fetchpatch
, cmake, extra-cmake-modules, pkg-config, qmake , cmake, extra-cmake-modules, pkg-config
, libpthreadstubs, libxcb, libXdmcp , libpthreadstubs, libxcb, libXdmcp
, qtsvg, qttools, qtwebengine, qtx11extras , qtsvg, qttools, qtwebengine, qtx11extras
, qtwayland, wrapQtAppsHook , qtwayland, wrapQtAppsHook
, kwallet , kwallet, kpurpose, karchive, kio
}: }:
mkDerivation rec { mkDerivation rec {
pname = "falkon"; pname = "falkon";
version = "3.2.0";
src = fetchFromGitHub {
owner = "KDE";
repo = "falkon";
rev = "v${version}";
sha256 = "sha256-esi9YWd1PtQpDBhI1NtWEjZIoMoNUpAF+kQad67mLzE=";
};
preConfigure = '' preConfigure = ''
export NONBLOCK_JS_DIALOGS=true export NONBLOCK_JS_DIALOGS=true
@ -27,21 +19,20 @@ mkDerivation rec {
buildInputs = [ buildInputs = [
libpthreadstubs libxcb libXdmcp libpthreadstubs libxcb libXdmcp
qtsvg qttools qtwebengine qtx11extras qtsvg qttools qtwebengine qtx11extras
kwallet kwallet kpurpose karchive kio
] ++ lib.optionals stdenv.isLinux [ qtwayland ]; ] ++ lib.optionals stdenv.isLinux [ qtwayland ];
nativeBuildInputs = [ nativeBuildInputs = [
cmake cmake
extra-cmake-modules extra-cmake-modules
pkg-config pkg-config
qmake
qttools qttools
wrapQtAppsHook wrapQtAppsHook
]; ];
meta = with lib; { meta = with lib; {
description = "QtWebEngine based cross-platform web browser"; description = "QtWebEngine based cross-platform web browser";
homepage = "https://community.kde.org/Incubator/Projects/Falkon"; homepage = "https://www.falkon.org";
license = licenses.gpl3; license = licenses.gpl3;
maintainers = with maintainers; [ peterhoeg ]; maintainers = with maintainers; [ peterhoeg ];
platforms = platforms.unix; platforms = platforms.unix;

View file

@ -1 +1 @@
WGET_ARGS=( https://download.kde.org/stable/release-service/21.12.3/src -A '*.tar.xz' ) WGET_ARGS=( https://download.kde.org/stable/release-service/22.04.0/src -A '*.tar.xz' )

View file

@ -21,4 +21,8 @@ mkDerivation {
kdbusaddons ki18n kontactinterface kparts kpimtextedit kdbusaddons ki18n kontactinterface kparts kpimtextedit
kxmlgui libkdepim libkleo mailcommon pimcommon prison qgpgme qtbase kxmlgui libkdepim libkleo mailcommon pimcommon prison qgpgme qtbase
]; ];
postInstall = ''
# added as an include directory by cmake files and fails to compile if it's missing
mkdir -p "$out/include/KF5"
'';
} }

View file

@ -7,7 +7,7 @@
kio, knotifications, knotifyconfig, kservice, kwidgetsaddons, kio, knotifications, knotifyconfig, kservice, kwidgetsaddons,
kwindowsystem, kxmlgui, phonon, kwindowsystem, kxmlgui, phonon,
kimap, akonadi, akonadi-contacts, akonadi-mime, kalarmcal, kcalendarcore, kcalutils, kimap, akonadi, akonadi-contacts, akonadi-mime, kcalendarcore, kcalutils,
kholidays, kidentitymanagement, libkdepim, mailcommon, kmailtransport, kmime, kholidays, kidentitymanagement, libkdepim, mailcommon, kmailtransport, kmime,
pimcommon, kpimtextedit, messagelib, pimcommon, kpimtextedit, messagelib,
@ -31,7 +31,7 @@ mkDerivation {
kio knotifications knotifyconfig kservice kwidgetsaddons kwindowsystem kio knotifications knotifyconfig kservice kwidgetsaddons kwindowsystem
kxmlgui phonon kxmlgui phonon
kimap akonadi akonadi-contacts akonadi-mime kalarmcal kcalendarcore kimap akonadi akonadi-contacts akonadi-mime kcalendarcore
kcalutils kholidays kidentitymanagement libkdepim mailcommon kmailtransport kcalutils kholidays kidentitymanagement libkdepim mailcommon kmailtransport
kmime pimcommon kpimtextedit messagelib kmime pimcommon kpimtextedit messagelib

View file

@ -1,19 +0,0 @@
{
mkDerivation, lib, kdepimTeam,
extra-cmake-modules, kdoctools,
akonadi, kcalendarcore, kholidays, kidentitymanagement,
kpimtextedit, kcalutils
}:
mkDerivation {
pname = "kalarmcal";
meta = {
license = with lib.licenses; [ gpl2 lgpl21 fdl12 ];
maintainers = kdepimTeam;
};
nativeBuildInputs = [ extra-cmake-modules kdoctools ];
propagatedBuildInputs = [
akonadi kcalendarcore kholidays kidentitymanagement kpimtextedit kcalutils
];
outputs = [ "out" "dev" ];
}

View file

@ -39,15 +39,6 @@
mkDerivation rec { mkDerivation rec {
pname = "kalendar"; pname = "kalendar";
version = "1.0.0";
src = fetchFromGitLab {
domain = "invent.kde.org";
owner = "pim";
repo = pname;
rev = "v${version}";
sha256 = "sha256-kjtLVU+8wbIa7R6J1XOjuvS3AnJNngxNBCx24Dy1QzM=";
};
nativeBuildInputs = [ nativeBuildInputs = [
cmake cmake
@ -95,7 +86,7 @@ mkDerivation rec {
meta = with lib; { meta = with lib; {
description = "A calendar application using Akonadi to sync with external services (Nextcloud, GMail, ...)"; description = "A calendar application using Akonadi to sync with external services (Nextcloud, GMail, ...)";
homepage = "https://invent.kde.org/pim/kalendar/"; homepage = "https://apps.kde.org/kalendar/";
license = licenses.gpl3Plus; license = licenses.gpl3Plus;
maintainers = with maintainers; [ chuangzhu ]; maintainers = with maintainers; [ chuangzhu ];
platforms = platforms.linux; platforms = platforms.linux;

View file

@ -1,6 +1,6 @@
{ {
mkDerivation, lib, fetchpatch, mkDerivation, lib, fetchpatch,
extra-cmake-modules, karchive, kio, libkexiv2, libkdcraw extra-cmake-modules, karchive, kio, libkexiv2, libkdcraw, kdegraphics-mobipocket
}: }:
mkDerivation { mkDerivation {
@ -10,5 +10,5 @@ mkDerivation {
maintainers = [ lib.maintainers.ttuegel ]; maintainers = [ lib.maintainers.ttuegel ];
}; };
nativeBuildInputs = [ extra-cmake-modules ]; nativeBuildInputs = [ extra-cmake-modules ];
buildInputs = [ karchive kio libkexiv2 libkdcraw ]; buildInputs = [ karchive kio libkexiv2 libkdcraw kdegraphics-mobipocket ];
} }

View file

@ -5,7 +5,7 @@
incidenceeditor, kcalendarcore, kcalutils, kconfig, kdbusaddons, kdeclarative, incidenceeditor, kcalendarcore, kcalutils, kconfig, kdbusaddons, kdeclarative,
kholidays, ki18n, kmime, ktexteditor, ktnef, libgravatar, kholidays, ki18n, kmime, ktexteditor, ktnef, libgravatar,
libksieve, mailcommon, mailimporter, messagelib, poppler, prison, kpkpass, libksieve, mailcommon, mailimporter, messagelib, poppler, prison, kpkpass,
kitinerary, kontactinterface kitinerary, kontactinterface, kaddressbook, discount
}: }:
mkDerivation { mkDerivation {
@ -20,6 +20,6 @@ mkDerivation {
incidenceeditor kcalendarcore kcalutils kconfig kdbusaddons kdeclarative incidenceeditor kcalendarcore kcalutils kconfig kdbusaddons kdeclarative
kholidays ki18n kmime ktexteditor ktnef libgravatar kholidays ki18n kmime ktexteditor ktnef libgravatar
libksieve mailcommon mailimporter messagelib poppler prison kpkpass libksieve mailcommon mailimporter messagelib poppler prison kpkpass
kitinerary kontactinterface kitinerary kontactinterface kaddressbook discount
]; ];
} }

View file

@ -3,7 +3,7 @@
extra-cmake-modules, kdoctools, extra-cmake-modules, kdoctools,
shared-mime-info, shared-mime-info,
akonadi, akonadi-calendar, akonadi-contacts, akonadi-mime, akonadi-notes, akonadi, akonadi-calendar, akonadi-contacts, akonadi-mime, akonadi-notes,
kalarmcal, kcalutils, kcontacts, kdav, kidentitymanagement, kholidays, kcalutils, kcontacts, kdav, kidentitymanagement,
kimap, kldap, kmailtransport, kmbox, kmime, knotifications, knotifyconfig, kimap, kldap, kmailtransport, kmbox, kmime, knotifications, knotifyconfig,
pimcommon, libkgapi, libsecret, pimcommon, libkgapi, libsecret,
qca-qt5, qtkeychain, qtnetworkauth, qtspeech, qtwebengine, qtxmlpatterns, qca-qt5, qtkeychain, qtnetworkauth, qtspeech, qtwebengine, qtxmlpatterns,
@ -18,7 +18,7 @@ mkDerivation {
nativeBuildInputs = [ extra-cmake-modules kdoctools shared-mime-info ]; nativeBuildInputs = [ extra-cmake-modules kdoctools shared-mime-info ];
buildInputs = [ buildInputs = [
akonadi akonadi-calendar akonadi-contacts akonadi-mime akonadi-notes akonadi akonadi-calendar akonadi-contacts akonadi-mime akonadi-notes
kalarmcal kcalutils kcontacts kdav kidentitymanagement kimap kholidays kcalutils kcontacts kdav kidentitymanagement kimap
kldap kmailtransport kmbox kmime knotifications knotifyconfig qtwebengine kldap kmailtransport kmbox kmime knotifications knotifyconfig qtwebengine
pimcommon libkgapi libsecret pimcommon libkgapi libsecret
qca-qt5 qtkeychain qtnetworkauth qtspeech qtxmlpatterns qca-qt5 qtkeychain qtnetworkauth qtspeech qtxmlpatterns

View file

@ -1,4 +1,4 @@
{ mkDerivation, lib, fetchpatch { mkDerivation, lib
, libkdegames, extra-cmake-modules , libkdegames, extra-cmake-modules
, kdeclarative, knewstuff , kdeclarative, knewstuff
}: }:
@ -16,16 +16,6 @@ mkDerivation {
platforms = platforms.linux; platforms = platforms.linux;
}; };
patches = [
# fix compile error due to usage of deprecated things
# probably can be removed with the next kde bump
(fetchpatch {
url = "https://invent.kde.org/games/picmi/-/commit/99639fb499fe35eb463621efca1c0e4ff2a52bad.patch";
revert = true;
sha256 = "sha256-rRhTvUB1Hpc3bLv9b5yIf/G7uJy2/OgBfXToZwV4jrg=";
})
];
nativeBuildInputs = [ nativeBuildInputs = [
extra-cmake-modules extra-cmake-modules
]; ];

View file

@ -16,11 +16,11 @@ mkDerivation {
nativeBuildInputs = [ extra-cmake-modules kdoctools ]; nativeBuildInputs = [ extra-cmake-modules kdoctools ];
buildInputs = [ buildInputs = [
akonadi-mime grantlee karchive kcmutils kcodecs kcompletion kconfigwidgets akonadi-mime grantlee karchive kcmutils kcodecs kcompletion kconfigwidgets
kdbusaddons kiconthemes kio kitemmodels kjobwidgets knewstuff kldap kpimtextedit kdbusaddons kiconthemes kio kitemmodels kjobwidgets knewstuff kldap
kpurpose kwallet kwindowsystem libkdepim qtwebengine kpurpose kwallet kwindowsystem libkdepim qtwebengine
]; ];
propagatedBuildInputs = [ propagatedBuildInputs = [
akonadi akonadi-contacts akonadi-search kconfig kcontacts kimap akonadi akonadi-contacts akonadi-search kconfig kcontacts kimap kpimtextedit
]; ];
outputs = [ "out" "dev" ]; outputs = [ "out" "dev" ];
} }

View file

@ -6,16 +6,11 @@
, ktextwidgets , ktextwidgets
, libksane , libksane
, qtquickcontrols2 , qtquickcontrols2
, kpurpose
}: }:
mkDerivation rec { mkDerivation rec {
pname = "skanpage"; pname = "skanpage";
version = "1.0.0";
src = fetchurl {
url = "mirror://kde/stable/skanpage/${version}/${pname}-${version}.tar.xz";
hash = "sha256-kPVAG64oPkKF3ztHB4V7M2xc1AcvwiHnYpMMLMQNYGA=";
};
nativeBuildInputs = [ extra-cmake-modules ]; nativeBuildInputs = [ extra-cmake-modules ];
@ -24,6 +19,7 @@ mkDerivation rec {
ktextwidgets ktextwidgets
libksane libksane
qtquickcontrols2 qtquickcontrols2
kpurpose
]; ];
meta = with lib; { meta = with lib; {

File diff suppressed because it is too large Load diff

View file

@ -23,6 +23,8 @@ mkDerivation {
extra-cmake-modules kdoctools extra-cmake-modules kdoctools
]; ];
outputs = [ "out" "dev" ];
meta = { meta = {
homepage = "https://yakuake.kde.org"; homepage = "https://yakuake.kde.org";
description = "Quad-style terminal emulator for KDE"; description = "Quad-style terminal emulator for KDE";

View file

@ -0,0 +1,51 @@
{ lib
, buildPythonPackage
, fetchFromGitHub
, fetchpatch
, gettext
, pexpect
}:
buildPythonPackage rec {
pname = "sosreport";
version = "4.3";
src = fetchFromGitHub {
owner = "sosreport";
repo = "sos";
rev = version;
sha256 = "sha256-fLEYRRQap7xqSyUU9MAV8cxxYKydHjn8J147VTXSf78=";
};
patches = [
(fetchpatch {
# fix sos --help
url = "https://github.com/sosreport/sos/commit/ac4eb48fa35c13b99ada41540831412480babf8d.patch";
sha256 = "sha256-6ZRoDDZN2KkHTXOKuHTAquB/HTIUppodmx83WxxYFP0=";
})
];
nativeBuildInputs = [
gettext
];
propagatedBuildInputs = [
pexpect
];
# requires avocado-framework 94.0, latest version as of writing is 96.0
doCheck = false;
preCheck = ''
export PYTHONPATH=$PWD/tests:$PYTHONPATH
'';
pythonImportsCheck = [ "sos" ];
meta = with lib; {
description = "Unified tool for collecting system logs and other debug information";
homepage = "https://github.com/sosreport/sos";
license = licenses.gpl2Only;
maintainers = with maintainers; [ SuperSandro2000 ];
};
}

View file

@ -12,12 +12,12 @@ let
if extension == "zip" then fetchzip args else fetchurl args; if extension == "zip" then fetchzip args else fetchurl args;
pname = "1password-cli"; pname = "1password-cli";
version = "2.0.2"; version = "2.1.0";
sources = rec { sources = rec {
aarch64-linux = fetch "linux_arm64" "sha256-DhKxY4Ry1IpT16UC3HbbUSKWzhGm/0R7rYrvqupg/Zo=" "zip"; aarch64-linux = fetch "linux_arm64" "sha256-DTYWqhawyAQBIxMUksZheyN8WSVPyhCghZC8orxKsBk=" "zip";
i686-linux = fetch "linux_386" "sha256-ANoOYjG4+mci6TdF4HC9fP8e5eAckrbZITRuA1fqtCA=" "zip"; i686-linux = fetch "linux_386" "sha256-JBjiKxbJnFILSOVnOUIcY3GpbOT2UOJlasTSPRyYz4I=" "zip";
x86_64-linux = fetch "linux_amd64" "sha256-uPudElKu30smsupSIvGAmrF/f9TXoTzyUfSrUAvTDWw=" "zip"; x86_64-linux = fetch "linux_amd64" "sha256-PfVOvUF8Rls29VzfIj1U6/VFv1H6lj2K3Dz6DWmh2fs=" "zip";
aarch64-darwin = fetch "apple_universal" "sha256-P5qsy4kiE/DMJnJr3EUHMcb0KoUZyO2BQ5PIosPbnI8=" "pkg"; aarch64-darwin = fetch "apple_universal" "sha256-Cn3/+Dvk5hW9rvxu4I9ghHSS1yWSAeQq3gx+6dvFiIk=" "pkg";
x86_64-darwin = aarch64-darwin; x86_64-darwin = aarch64-darwin;
}; };
platforms = builtins.attrNames sources; platforms = builtins.attrNames sources;

View file

@ -23,13 +23,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "megacmd"; pname = "megacmd";
version = "1.5.0"; version = "1.5.0c";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "meganz"; owner = "meganz";
repo = "MEGAcmd"; repo = "MEGAcmd";
rev = "${version}_Linux"; rev = "${version}_Linux";
sha256 = "Y/FkbN9mTuBpcKCSQg0M+3/IPzJ58X4iZhX2kMVDv7A="; sha256 = "sha256-JHuGkf6TBOZMvoP7Izm5/T9AWxyjaqrxR99x4bm7tVE=";
fetchSubmodules = true; fetchSubmodules = true;
}; };

View file

@ -20,13 +20,13 @@ assert withNerdIcons -> withIcons == false;
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "nnn"; pname = "nnn";
version = "4.4"; version = "4.5";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "jarun"; owner = "jarun";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-g9GaCc/IWKtih0/A2AZEPImjj7ymJIdYwC5I/6GUh5c="; sha256 = "sha256-uToAgWpGaTPTMYJh1D0xgvE23GSIshv1OBlWxXI07Mk=";
}; };
configFile = lib.optionalString (conf != null) (builtins.toFile "nnn.h" conf); configFile = lib.optionalString (conf != null) (builtins.toFile "nnn.h" conf);

View file

@ -12,20 +12,20 @@
let let
inherit (stdenv.hostPlatform) system; inherit (stdenv.hostPlatform) system;
pname = "obsidian"; pname = "obsidian";
version = "0.14.2"; version = "0.14.6";
appname = "Obsidian"; appname = "Obsidian";
meta = with lib; { meta = with lib; {
description = "A powerful knowledge base that works on top of a local folder of plain text Markdown files"; description = "A powerful knowledge base that works on top of a local folder of plain text Markdown files";
homepage = "https://obsidian.md"; homepage = "https://obsidian.md";
downloadPage = "https://github.com/obsidianmd/obsidian-releases/releases"; downloadPage = "https://github.com/obsidianmd/obsidian-releases/releases";
license = licenses.obsidian; license = licenses.obsidian;
maintainers = with maintainers; [ conradmearns zaninime opeik ]; maintainers = with maintainers; [ atila conradmearns zaninime opeik ];
}; };
filename = if stdenv.isDarwin then "Obsidian-${version}-universal.dmg" else "obsidian-${version}.tar.gz"; filename = if stdenv.isDarwin then "Obsidian-${version}-universal.dmg" else "obsidian-${version}.tar.gz";
src = fetchurl { src = fetchurl {
url = "https://github.com/obsidianmd/obsidian-releases/releases/download/v${version}/${filename}"; url = "https://github.com/obsidianmd/obsidian-releases/releases/download/v${version}/${filename}";
sha256 = if stdenv.isDarwin then "128kgqkf54ljkglwqa6i0qnfqhhmsv7hwbaqnml95n5dzyxrbm4s" else "00gip6pvkbywywlx71j87sxyh8yhkd36i1ydncbpnhsplr6smsq3"; sha256 = if stdenv.isDarwin then "1zzccwlim3gi6f5czzyddqjzy1xsk6ayx1hljhw6bmnid72km3q2" else "sha256-KieAE13SIYHDoXTqzk1QY+TPjwF9LRzlfm1yFg9hsTc=";
}; };
icon = fetchurl { icon = fetchurl {

View file

@ -20,13 +20,13 @@
mkDerivation rec { mkDerivation rec {
pname = "organicmaps"; pname = "organicmaps";
version = "2022.03.23-4-android"; version = "2022.04.27-2";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "organicmaps"; owner = "organicmaps";
repo = "organicmaps"; repo = "organicmaps";
rev = version; rev = "${version}-android";
sha256 = "sha256-4VBsHq8z/odD7Nrk9e0sYMEBBLeTAHsWsdgPIN1KVZo="; sha256 = "sha256-HsskddXne5xClBZoT3aXP+51VRQQJhlUPda/M20SrH0=";
fetchSubmodules = true; fetchSubmodules = true;
}; };
@ -35,7 +35,7 @@ mkDerivation rec {
echo "exit 0" > tools/unix/check_cert.sh echo "exit 0" > tools/unix/check_cert.sh
# crude fix for https://github.com/organicmaps/organicmaps/issues/1862 # crude fix for https://github.com/organicmaps/organicmaps/issues/1862
echo "echo ${lib.replaceStrings ["." "-" "android"] ["" "" ""] version}" > tools/unix/version.sh echo "echo ${lib.replaceStrings ["." "-"] ["" ""] version}" > tools/unix/version.sh
''; '';
nativeBuildInputs = [ nativeBuildInputs = [
@ -64,19 +64,14 @@ mkDerivation rec {
bash ./configure.sh bash ./configure.sh
''; '';
# Tell the program that the read-only and the read-write data locations
# are different, and create the read-write one.
# https://github.com/organicmaps/organicmaps/issues/2387
postInstall = '' postInstall = ''
install -Dm755 OMaps $out/bin/OMaps
# Tell the program that the read-only and the read-write data locations
# are different, and create the read-write one.
wrapProgram $out/bin/OMaps \ wrapProgram $out/bin/OMaps \
--add-flags "-resources_path $out/share/organicmaps/data" \ --add-flags "-resources_path $out/share/organicmaps/data" \
--add-flags '-data_path "''${XDG_DATA_HOME:-''${HOME}/.local/share}/OMaps"' \ --add-flags '-data_path "''${XDG_DATA_HOME:-''${HOME}/.local/share}/OMaps"' \
--run 'mkdir -p "''${XDG_DATA_HOME:-''${HOME}/.local/share}/OMaps"' --run 'mkdir -p "''${XDG_DATA_HOME:-''${HOME}/.local/share}/OMaps"'
mkdir -p $out/share/organicmaps
cp -r ../data $out/share/organicmaps/data
install -Dm644 ../qt/res/logo.png $out/share/icons/hicolor/96x96/apps/organicmaps.png
install -Dm644 ../qt/res/OrganicMaps.desktop $out/share/applications/OrganicMaps.desktop
''; '';
meta = with lib; { meta = with lib; {

View file

@ -1,17 +1,19 @@
{ lib, python3Packages, ffmpeg }: { lib
, python3
, ffmpeg
}:
python3Packages.buildPythonApplication rec { python3.pkgs.buildPythonApplication rec {
version = "2.2"; pname = "sigal";
pname = "sigal"; version = "2.3";
format = "setuptools";
src = python3Packages.fetchPypi { src = python3.pkgs.fetchPypi {
inherit version pname; inherit version pname;
sha256 = "sha256-49XsNdZuicsiYJZuF1UdqMA4q33Ly/Ug/Hc4ybJKmPo="; hash = "sha256-4Zsb/OBtU/jV0gThEYe8bcrb+6hW+hnzQS19q1H409Q=";
}; };
disabled = !(python3Packages.pythonAtLeast "3.6"); propagatedBuildInputs = with python3.pkgs; [
propagatedBuildInputs = with python3Packages; [
# install_requires # install_requires
jinja2 jinja2
markdown markdown
@ -29,16 +31,18 @@ python3Packages.buildPythonApplication rec {
checkInputs = [ checkInputs = [
ffmpeg ffmpeg
] ++ (with python3Packages; [ ] ++ (with python3.pkgs; [
pytestCheckHook pytestCheckHook
]); ]);
makeWrapperArgs = [ "--prefix PATH : ${ffmpeg}/bin" ]; makeWrapperArgs = [
"--prefix PATH : ${lib.makeBinPath [ ffmpeg ]}"
];
meta = with lib; { meta = with lib; {
description = "Yet another simple static gallery generator"; description = "Yet another simple static gallery generator";
homepage = "http://sigal.saimon.org/en/latest/index.html"; homepage = "http://sigal.saimon.org/";
license = licenses.mit; license = licenses.mit;
maintainers = with maintainers; [ domenkozar matthiasbeyer ]; maintainers = with maintainers; [ domenkozar matthiasbeyer ];
}; };
} }

View file

@ -13,19 +13,20 @@
# logitech-udev-rules instead of adding this to services.udev.packages on NixOS # logitech-udev-rules instead of adding this to services.udev.packages on NixOS
python3Packages.buildPythonApplication rec { python3Packages.buildPythonApplication rec {
pname = "solaar"; pname = "solaar";
version = "1.1.1"; version = "1.1.3";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "pwr-Solaar"; owner = "pwr-Solaar";
repo = "Solaar"; repo = "Solaar";
rev = version; rev = version;
sha256 = "1yqxk6nfxc1xhk59qbz9m3wqkxv446g17pazvanpavriiysjzbrs"; hash = "sha256-6z22MnhUL9Da3G7UDmZsBAi2gHLNpiFEwe+pAtnP91s=";
}; };
nativeBuildInputs = [ wrapGAppsHook gdk-pixbuf ]; nativeBuildInputs = [ wrapGAppsHook gdk-pixbuf ];
buildInputs = [ libappindicator librsvg ]; buildInputs = [ libappindicator librsvg ];
propagatedBuildInputs = with python3Packages; [ propagatedBuildInputs = with python3Packages; [
evdev
gobject-introspection gobject-introspection
gtk3 gtk3
psutil psutil

View file

@ -191,6 +191,7 @@ let
--replace "/usr/bin/env -S make -f" "/usr/bin/make -f" --replace "/usr/bin/env -S make -f" "/usr/bin/make -f"
fi fi
chmod -x third_party/webgpu-cts/src/tools/run_deno chmod -x third_party/webgpu-cts/src/tools/run_deno
${lib.optionalString (chromiumVersionAtLeast "102") "chmod -x third_party/dawn/third_party/webgpu-cts/tools/run_deno"}
# We want to be able to specify where the sandbox is via CHROME_DEVEL_SANDBOX # We want to be able to specify where the sandbox is via CHROME_DEVEL_SANDBOX
substituteInPlace sandbox/linux/suid/client/setuid_sandbox_host.cc \ substituteInPlace sandbox/linux/suid/client/setuid_sandbox_host.cc \

View file

@ -1,21 +1,21 @@
{ {
"stable": { "stable": {
"version": "100.0.4896.127", "version": "101.0.4951.41",
"sha256": "0kgq38dy9mjyc44556i9gxhlsgd7dfvv1xi1ibk92b4p7i2y6427", "sha256": "0dzsbr309n70jg7fpq2qfnrgcm4553akvdmnzhss1fc85s467609",
"sha256bin64": "0mm6lix14bf4ca440dyccnq54z0qvn5c886ghfyzy2q0bqzbq4nh", "sha256bin64": "12nzzsp4040mwc7jah5w0p58ckv8s16wv6ylf6vlmfby06a4xlkq",
"deps": { "deps": {
"gn": { "gn": {
"version": "2022-01-21", "version": "2022-03-14",
"url": "https://gn.googlesource.com/gn", "url": "https://gn.googlesource.com/gn",
"rev": "0725d7827575b239594fbc8fd5192873a1d62f44", "rev": "bd99dbf98cbdefe18a4128189665c5761263bcfb",
"sha256": "1dzdvcn2r5c9giknvasf3y5y4901kav7igivjvrpww66ywsj8fzr" "sha256": "0nql15ckjqkm001xajq3qyn4h4q80i7x6dm9zinxxr1a8q5lppx3"
} }
}, },
"chromedriver": { "chromedriver": {
"version": "100.0.4896.60", "version": "101.0.4951.15",
"sha256_linux": "0q9ddwhccd0jmzi8jksxlfjavmm913c9bmb4lz1ahxplsnxd8z31", "sha256_linux": "1i8ay83gh1q6nd0v14qv7gjar9h4fccb50a8b6fg671pg0l6vn24",
"sha256_darwin": "0q0ikhf5pkbrqln91fklbbfmqi33nfcjdg5dm7zb66b4alxwwas9", "sha256_darwin": "0ldxy1dxb99xps0h1d1264njc55q4bd000bdnaaks9kyx2djn54b",
"sha256_darwin_aarch64": "1vf3s0gq61riqsv85pr6xj0c2afdnv1b2w4gp2bwlfq4ffkfq38y" "sha256_darwin_aarch64": "14awsldpqz2y187jwbcli8v7f1r6gsybk8yx8jqg26y8iyg3lrx9"
} }
}, },
"beta": { "beta": {
@ -32,9 +32,9 @@
} }
}, },
"dev": { "dev": {
"version": "102.0.5005.12", "version": "102.0.5005.22",
"sha256": "11n03hz3g8h7srywxrjwrdrxybdjvmdjrnigjlrwjkydprg1l7ab", "sha256": "12s4w8qs71a7r13mm28w6kld2q21srwalsy2yfcys4kjmfp4gqfa",
"sha256bin64": "0hc56a98ikkbgdw36dpz9k6r15jmjmnm7faml8z59vixxlvkrw7y", "sha256bin64": "07jj7nvgalzvxacx6srccc82ggckzj4x10w1k2zskcyxpblnd7fc",
"deps": { "deps": {
"gn": { "gn": {
"version": "2022-04-14", "version": "2022-04-14",

View file

@ -1,4 +1,4 @@
{ lib, buildGoModule, fetchFromGitHub, installShellFiles, testVersion, kompose }: { lib, buildGoModule, fetchFromGitHub, installShellFiles, testers, kompose }:
buildGoModule rec { buildGoModule rec {
pname = "kompose"; pname = "kompose";
@ -26,7 +26,7 @@ buildGoModule rec {
done done
''; '';
passthru.tests.version = testVersion { passthru.tests.version = testers.testVersion {
package = kompose; package = kompose;
command = "kompose version"; command = "kompose version";
}; };

View file

@ -10,16 +10,16 @@
buildGoModule rec { buildGoModule rec {
pname = "nerdctl"; pname = "nerdctl";
version = "0.18.0"; version = "0.19.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "containerd"; owner = "containerd";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-gkfy/tKzh6EO+nyjuiU3InSErKvGcJp/X7oqYk0Msr0="; sha256 = "sha256-FuWfHd4LfFHX5oRopDIDTi90cARi8cYjJBK0BgeCD/U=";
}; };
vendorSha256 = "sha256-hjhZYNpqt9yFNrDVpFlguESUAAqU+AhpUQTCvyMadPk="; vendorSha256 = "sha256-mHitGjOfSRlqORWFtB16buSSJrCf7Li9+oHX4rcO4ek=";
nativeBuildInputs = [ makeWrapper installShellFiles ]; nativeBuildInputs = [ makeWrapper installShellFiles ];

View file

@ -3,11 +3,11 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "evolution-ews"; pname = "evolution-ews";
version = "3.44.0"; version = "3.44.1";
src = fetchurl { src = fetchurl {
url = "mirror://gnome/sources/${pname}/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; url = "mirror://gnome/sources/${pname}/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
sha256 = "q4Cg6eLOdn+56EruBl0Ote9QLNebLiykUeyoQpIpeoA="; sha256 = "LJNidefwnQtOtWgMVb/4Xw2A0lU4R2Gm0Z3XfOaU/oM=";
}; };
nativeBuildInputs = [ cmake gettext intltool pkg-config ]; nativeBuildInputs = [ cmake gettext intltool pkg-config ];

View file

@ -30,7 +30,23 @@ mkDerivation rec {
sha256 = "11dzrp9q05dmvnwp4vk4ihcibqcf4xyr0ijscpi716cyy730flma"; sha256 = "11dzrp9q05dmvnwp4vk4ihcibqcf4xyr0ijscpi716cyy730flma";
excludes = [ "CMakeLists.txt" ]; excludes = [ "CMakeLists.txt" ];
}) })
# Fixes for building calligra with modern poppler[-qt5]
(fetchpatch {
name = "poppler-22.03.0.patch";
url = "https://github.com/archlinux/svntogit-packages/raw/8f328bef497a9e3bc628e4e294c1a70b0c8b0eab/trunk/poppler-22.03.0.patch";
sha256 = "sha256-bOTnQcavXF49LIshNgzhXhyoEjzLmQJC/U7hO5P0bfY=";
})
# Fixes for building calligra with gcc11/c++17
(fetchpatch {
name = "build_c++17_poppler.patch";
url = "https://github.com/archlinux/svntogit-packages/raw/bbbe35f97eb1033798f1cf95d427890168598199/trunk/068cd9ae.patch";
sha256 = "sha256-d9/ILwSeW+ov11DF191hzIaUafO/rjQrAeONwqDSKbA=";
})
]; ];
postPatch = ''
substituteInPlace CMakeLists.txt \
--replace 'CMAKE_CXX_STANDARD 11' 'CMAKE_CXX_STANDARD 17'
'';
nativeBuildInputs = [ extra-cmake-modules kdoctools ]; nativeBuildInputs = [ extra-cmake-modules kdoctools ];

View file

@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec { rustPlatform.buildRustPackage rec {
pname = "git-cliff"; pname = "git-cliff";
version = "0.6.1"; version = "0.7.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "orhun"; owner = "orhun";
repo = "git-cliff"; repo = "git-cliff";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-CJ/2Cv/XoLq9U7u5mexH8iCCHbGtV6xohP3FapqO3+g="; sha256 = "sha256-wVHL2+didmiN7UlEeIuSr+8LhkFKCOD3of4rKVg1i1o=";
}; };
cargoSha256 = "sha256-pYStKDgvvV/Z96TAonpDW7DIs1YSO6gAoiUCieVa9QY="; cargoSha256 = "sha256-5jhloUnaGXXDu2LCO86SMJo8ETIxLAivv3hx9gEqtJ4=";
# attempts to run the program on .git in src which is not deterministic # attempts to run the program on .git in src which is not deterministic
doCheck = false; doCheck = false;

View file

@ -4,13 +4,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "git-repo"; pname = "git-repo";
version = "2.24"; version = "2.24.1";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "android"; owner = "android";
repo = "tools_repo"; repo = "tools_repo";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-p5zAehhqOUlKay3/Oy8hbBo5nQRIyE7o4bnaX/TabYc="; sha256 = "sha256-mYCKmvI15a0ohQwxPIG8IuzNt4QvEs6Q35oMO+e5hbg=";
}; };
# Fix 'NameError: name 'ssl' is not defined' # Fix 'NameError: name 'ssl' is not defined'

View file

@ -16,7 +16,7 @@
, xkeyboard_config , xkeyboard_config
, glib , glib
, libarchive , libarchive
, python , python2
}: }:
let let
@ -155,7 +155,7 @@ buildFHSUserEnv {
glib glib
libarchive libarchive
xdg-utils # xdg-open needed to open URLs xdg-utils # xdg-open needed to open URLs
python python2
# currently they want python 3.6 which is EOL # currently they want python 3.6 which is EOL
#python3 #python3
]; ];

View file

@ -10,13 +10,13 @@
buildGoModule rec { buildGoModule rec {
pname = "containerd"; pname = "containerd";
version = "1.6.2"; version = "1.6.3";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "containerd"; owner = "containerd";
repo = "containerd"; repo = "containerd";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-l/9jOvZ4nn/wy+XPRoT1lojfGvPEXhPz2FJjLpZ/EE8="; sha256 = "sha256-mVnZsvhpKx/5dHMF0Z8BfuUSqwoIhOtPkA/1BSrVVqA=";
}; };
vendorSha256 = null; vendorSha256 = null;

View file

@ -38,13 +38,13 @@ let
in in
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "crun"; pname = "crun";
version = "1.4.4"; version = "1.4.5";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "containers"; owner = "containers";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "sha256-ITUj905ZSdCH0mcw8tubyVKqI6p/oNcC4OW7/NbkR5o="; sha256 = "sha256-YXbyGUY/E8odjljDok+yYyU8yZSyUFc22zumrUuuXXQ=";
fetchSubmodules = true; fetchSubmodules = true;
}; };

View file

@ -8,19 +8,24 @@
buildGoModule rec { buildGoModule rec {
pname = "lima"; pname = "lima";
version = "0.9.2"; version = "0.10.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "lima-vm"; owner = "lima-vm";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-GS/mzBoVL78U7vMxkbnQfb89U640w8YdA8YhPH4Iwrc="; sha256 = "sha256-xlpNJjSBw1iL8CjbWE6v4u7Vq5PjkGv0tQKU5eRN13w=";
}; };
vendorSha256 = "sha256-funVyM0RhDzGQPyzsABzXu3ETPYJwRosqkQreGBADZc="; vendorSha256 = "sha256-uTkCi969RQ4K0ZJ2vOgqv3OJgzVVRX7b2sXNfmR6qoA=";
nativeBuildInputs = [ makeWrapper installShellFiles ]; nativeBuildInputs = [ makeWrapper installShellFiles ];
# clean fails with read only vendor dir
postPatch = ''
substituteInPlace Makefile --replace 'binaries: clean' 'binaries:'
'';
buildPhase = '' buildPhase = ''
runHook preBuild runHook preBuild
make "VERSION=v${version}" binaries make "VERSION=v${version}" binaries

View file

@ -5,17 +5,18 @@
, breeze-icons , breeze-icons
, hicolor-icon-theme , hicolor-icon-theme
, pantheon , pantheon
, gitUpdater
}: }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "luna-icons"; pname = "luna-icons";
version = "1.9.1"; version = "2.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "darkomarko42"; owner = "darkomarko42";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "sha256-ZUSG9lui07ICG/4M6LBEAhJo9KuKd+wMb2VoKu5Ifmg="; sha256 = "sha256-aNN7ZoD4hZTw39Rwef4HRHzNzCM6O8Ev+37jZOfzN7s=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [
@ -43,6 +44,8 @@ stdenv.mkDerivation rec {
runHook postInstall runHook postInstall
''; '';
passthru.updateScript = gitUpdater {inherit pname version; };
meta = with lib; { meta = with lib; {
description = "Icon pack based on marwaita and papirus icons"; description = "Icon pack based on marwaita and papirus icons";
homepage = "https://github.com/darkomarko42/Luna-Icons"; homepage = "https://github.com/darkomarko42/Luna-Icons";

View file

@ -20,13 +20,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "ghex"; pname = "ghex";
version = "42.1"; version = "42.2";
outputs = [ "out" "dev" "devdoc" ]; outputs = [ "out" "dev" "devdoc" ];
src = fetchurl { src = fetchurl {
url = "mirror://gnome/sources/ghex/${lib.versions.major version}/${pname}-${version}.tar.xz"; url = "mirror://gnome/sources/ghex/${lib.versions.major version}/${pname}-${version}.tar.xz";
sha256 = "8QMj08MvvRqDFU+/0qJ+yj7pDZwbJSNfGxX+3l+xE6M="; sha256 = "Rd6Oa4ofMd5amRC+GMB/CaMo2HU434BAOuxa+IF8ljE=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -22,11 +22,11 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "gnome-calendar"; pname = "gnome-calendar";
version = "42.0"; version = "42.1";
src = fetchurl { src = fetchurl {
url = "mirror://gnome/sources/${pname}/${lib.versions.major version}/${pname}-${version}.tar.xz"; url = "mirror://gnome/sources/${pname}/${lib.versions.major version}/${pname}-${version}.tar.xz";
sha256 = "tj9z9VAy/BOQRC+UzfazyrnJHHdN3S5cYez+ydLF6ao="; sha256 = "0SKBy78a+GxyN1/mrZNG7Q4sLziKHq6FjOzmQGCm66g=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -28,11 +28,11 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "gnome-remote-desktop"; pname = "gnome-remote-desktop";
version = "42.1"; version = "42.1.1";
src = fetchurl { src = fetchurl {
url = "mirror://gnome/sources/${pname}/${lib.versions.major version}/${pname}-${version}.tar.xz"; url = "mirror://gnome/sources/${pname}/${lib.versions.major version}/${pname}-${version}.tar.xz";
hash = "sha256-ATHuOY32n2tOZ9YU1pElatZJgihCRXQU64iaI7/rmfo="; hash = "sha256-pEZqYsL+7GLn9XLwkpxY24iyXWCVuv5LFZHpnPqaDuY=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -42,11 +42,11 @@ in
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "gnome-software"; pname = "gnome-software";
version = "42.0"; version = "42.1";
src = fetchurl { src = fetchurl {
url = "mirror://gnome/sources/gnome-software/${lib.versions.major version}/${pname}-${version}.tar.xz"; url = "mirror://gnome/sources/gnome-software/${lib.versions.major version}/${pname}-${version}.tar.xz";
sha256 = "QsaF4u95li6zCo6VjHA8mh899zFQQiOgYos7Yk733B4="; sha256 = "MtAFaYoAuK5er5Hk5/hlnvQwCnmPyuaiK3TC1/z2pIY=";
}; };
patches = [ patches = [

View file

@ -15,11 +15,11 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "zenity"; pname = "zenity";
version = "3.42.0"; version = "3.42.1";
src = fetchurl { src = fetchurl {
url = "mirror://gnome/sources/zenity/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; url = "mirror://gnome/sources/zenity/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
sha256 = "wkx/5rtDFjztit8jLVg7LgE9O6bCjetfz4B5hePete8="; sha256 = "oI4MjmJmFe4sI/90Yo66b4tIaHXdVDccp+LXYFtyqHw=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -49,6 +49,7 @@ let
screengrab = callPackage ./screengrab {}; screengrab = callPackage ./screengrab {};
qlipper = callPackage ./qlipper {}; qlipper = callPackage ./qlipper {};
lxqt-archiver = callPackage ./lxqt-archiver {}; lxqt-archiver = callPackage ./lxqt-archiver {};
xdg-desktop-portal-lxqt = callPackage ./xdg-desktop-portal-lxqt {};
preRequisitePackages = [ preRequisitePackages = [
libsForQt5.kwindowsystem # provides some QT5 plugins needed by lxqt-panel libsForQt5.kwindowsystem # provides some QT5 plugins needed by lxqt-panel
@ -92,7 +93,6 @@ let
optionalPackages = [ optionalPackages = [
### LXQt project ### LXQt project
qterminal qterminal
compton-conf
obconf-qt obconf-qt
lximage-qt lximage-qt
lxqt-archiver lxqt-archiver
@ -101,11 +101,8 @@ let
qps qps
screengrab screengrab
### Qlipper
qlipper
### Default icon theme ### Default icon theme
libsForQt5.oxygen-icons5 libsForQt5.breeze-icons
### Screen saver ### Screen saver
pkgs.xscreensaver pkgs.xscreensaver

View file

@ -16,13 +16,13 @@
mkDerivation rec { mkDerivation rec {
pname = "libfm-qt"; pname = "libfm-qt";
version = "1.0.0"; version = "1.1.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "lxqt"; owner = "lxqt";
repo = "libfm-qt"; repo = "libfm-qt";
rev = version; rev = version;
sha256 = "1kk2cv9cp2gdj2pzdgm72c009iyl3mhrvsiz05kdxd4v1kn38ci1"; sha256 = "kF3u1Eh45l/HvL5R0PazIfGIdOVYyB2VAI33NwRfLJk=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -15,13 +15,13 @@
mkDerivation rec { mkDerivation rec {
pname = "liblxqt"; pname = "liblxqt";
version = "1.0.0"; version = "1.1.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "lxqt"; owner = "lxqt";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "08cqvq99pvz8lz13273hlpv8160r6zyz4f7h4kl1g8xdga7m45gr"; sha256 = "vfqEB9Vh/BL47dlEvnyWwDBO0pRIUS1IuixW8A0PRds=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -10,13 +10,13 @@
mkDerivation rec { mkDerivation rec {
pname = "libqtxdg"; pname = "libqtxdg";
version = "3.8.0"; version = "3.9.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "lxqt"; owner = "lxqt";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "14jrzwdmhgn6bcggmhxx5rdapjzm93cfkjjls3nii1glnkwzncxz"; sha256 = "llE4OxI4I/n0P8Pv5tKT3tXM7IfD3VMQSxdaLkBJ4Gk=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -16,13 +16,13 @@
mkDerivation rec { mkDerivation rec {
pname = "lximage-qt"; pname = "lximage-qt";
version = "1.0.0"; version = "1.1.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "lxqt"; owner = "lxqt";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "1bf0smkawyibrabw7zcynwr2afpsv7pnnyxn4nqgh6mxnp7al157"; sha256 = "QvQ0LBGP9XD7vwuUD+A1x8oGDvqTeCkYyd2XyjU0fUo=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -14,13 +14,13 @@
mkDerivation rec { mkDerivation rec {
pname = "lxqt-about"; pname = "lxqt-about";
version = "1.0.0"; version = "1.1.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "lxqt"; owner = "lxqt";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "1fr2mx19ks4crh7cjc080vkrzldzgmghxvrzjqq7lspkzd5a0pjb"; sha256 = "GTnjmMVbkO5CeNLxNisD6XncqX32otaATZSka4YVNHo=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -15,13 +15,13 @@
mkDerivation rec { mkDerivation rec {
pname = "lxqt-admin"; pname = "lxqt-admin";
version = "1.0.0"; version = "1.1.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "lxqt"; owner = "lxqt";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "06l7vs8aqx37bhrxf9xa16g7rdmia8j73q78qfj6syw57f3ssjr9"; sha256 = "A5dpw/vG92tC4W1q1wpDyMdRn1ScEH7m287MCEGOp9w=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -14,13 +14,13 @@
mkDerivation rec { mkDerivation rec {
pname = "lxqt-archiver"; pname = "lxqt-archiver";
version = "0.5.0"; version = "0.6.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "lxqt"; owner = "lxqt";
repo = "lxqt-archiver"; repo = "lxqt-archiver";
rev = version; rev = version;
sha256 = "033lq7n34a5qk2zv8kr1633p5x2cjimv4w4n86w33xmcwya4yiji"; sha256 = "ay0nWCe/uMsJFFtBAQnsuxR6I/8q3xv6zK/qYr3BQyw=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -13,13 +13,13 @@
mkDerivation rec { mkDerivation rec {
pname = "lxqt-build-tools"; pname = "lxqt-build-tools";
version = "0.10.0"; version = "0.11.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "lxqt"; owner = "lxqt";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "1hb04zgpalxv6da3myf1dxsbjix15dczzfq8a24g5dg2zfhwpx21"; sha256 = "vzppKTDwADBG5pOaluT858cWCKFFRaSbHz2Qhe6799E=";
}; };
postPatch = '' postPatch = ''

View file

@ -20,13 +20,13 @@
mkDerivation rec { mkDerivation rec {
pname = "lxqt-config"; pname = "lxqt-config";
version = "1.0.0"; version = "1.1.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "lxqt"; owner = "lxqt";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "0yllqjmj4xbqi5681ffjxmlwlf9k9bpy3hgs7li6lnn90yy46qmr"; sha256 = "ncoJLpKzE1tqOV+KuUiGLDWiDvzJg0le4m4BMKFw6Mg=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -15,13 +15,13 @@
mkDerivation rec { mkDerivation rec {
pname = "lxqt-globalkeys"; pname = "lxqt-globalkeys";
version = "1.0.1"; version = "1.1.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "lxqt"; owner = "lxqt";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "ccvDcEstSUVvJ7gf0bsCxCPPMRXSkZh+tKOKWNnzMt4="; sha256 = "6io6gH+n7dodTDQjvCqxjvaafQ4E9H7kx+s2QiAm3mY=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -15,13 +15,13 @@
mkDerivation rec { mkDerivation rec {
pname = "lxqt-notificationd"; pname = "lxqt-notificationd";
version = "1.0.0"; version = "1.1.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "lxqt"; owner = "lxqt";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "06gb8k1p24gm5axy42npq7n4lmsxb03a9kvzqby44qmgwh8pn069"; sha256 = "YXwWqab6OW1KE7Zct92xdK/f/QaDVqEMVM+Cb9kNe7E=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -15,13 +15,13 @@
mkDerivation rec { mkDerivation rec {
pname = "lxqt-openssh-askpass"; pname = "lxqt-openssh-askpass";
version = "1.0.0"; version = "1.1.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "lxqt"; owner = "lxqt";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "0fp5jq3j34p81y200jbyp7wcz04r7jk07bfwrigjwcyj2xknkrgw"; sha256 = "s1ywmlcHsbeaRi5zrhFMPS0SJ1s8IYnDXWkFvB1kaI4=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -30,13 +30,13 @@
mkDerivation rec { mkDerivation rec {
pname = "lxqt-panel"; pname = "lxqt-panel";
version = "1.0.0"; version = "1.1.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "lxqt"; owner = "lxqt";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "0i63jyjg31336davjdak7z3as34gazx1lri65fk2f07kka9dx1jl"; sha256 = "w5/uS8kRb5yFUXd1NImWMXxx40YtzxMZMS87e9syb6A=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [
@ -67,6 +67,7 @@ mkDerivation rec {
qtx11extras qtx11extras
solid solid
xorg.libXdmcp xorg.libXdmcp
xorg.libXtst
xorg.libpthreadstubs xorg.libpthreadstubs
]; ];

View file

@ -19,13 +19,13 @@
mkDerivation rec { mkDerivation rec {
pname = "lxqt-policykit"; pname = "lxqt-policykit";
version = "1.0.0"; version = "1.1.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "lxqt"; owner = "lxqt";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "0hmxzkkggnpci305xax9663cbjqdh6n0j0dawwcpwj4ks8mp7xh7"; sha256 = "Fs3N9r8RkawbXnX8jv8Fx63ijwAfy+OfrCpjeHDjKio=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -18,13 +18,13 @@
mkDerivation rec { mkDerivation rec {
pname = "lxqt-powermanagement"; pname = "lxqt-powermanagement";
version = "1.0.0"; version = "1.1.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "lxqt"; owner = "lxqt";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "0dwz8z3463dz49d5k5bh7splb1zdi617xc4xzlqxxrxbf3n8x4ix"; sha256 = "+FpJD5PEH2/HOSWDQEwMX2sV2JJH0kjcoohBolhSP1A=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -15,13 +15,13 @@
mkDerivation rec { mkDerivation rec {
pname = "lxqt-qtplugin"; pname = "lxqt-qtplugin";
version = "1.0.0"; version = "1.1.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "lxqt"; owner = "lxqt";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "1vr2hlv1q9xwkh9bapy29g9fi90d33xw7pr9zc1bfma6j152qs36"; sha256 = "mTA+3sXFWFYUEQhZOnAy6D/tYVAU+9AXbuLmLi7axlc=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -20,13 +20,13 @@
mkDerivation rec { mkDerivation rec {
pname = "lxqt-runner"; pname = "lxqt-runner";
version = "1.0.0"; version = "1.1.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "lxqt"; owner = "lxqt";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "06b7l2jkh0h4ikddh82nxkz7qhg5ap7l016klg3jl2x659z59hpj"; sha256 = "hnuzoHKXqM6xEzN0jvHVjVWUXRxuwdhD3BiBfFMmZSk=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -19,13 +19,13 @@
mkDerivation rec { mkDerivation rec {
pname = "lxqt-session"; pname = "lxqt-session";
version = "1.0.1"; version = "1.1.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "lxqt"; owner = "lxqt";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "6/HTCngjz0GpNAYf66CUiCZtEs5EsBbjDjcObIe3qSk="; sha256 = "urm4Ehd26fmssJwu/V9Uu/lZ0J8yDOtAA0DIihTPxng=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -16,13 +16,13 @@
mkDerivation rec { mkDerivation rec {
pname = "lxqt-sudo"; pname = "lxqt-sudo";
version = "1.0.0"; version = "1.1.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "lxqt"; owner = "lxqt";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "1y2vq3n5sv6cxqpnz79kl3dybfbw65z93cahdz8m6gplzpp24gn4"; sha256 = "Oa4OYIDXQUIQ96pEY7rGBq+spwVSU+kgDS7250tYNuc=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -8,13 +8,13 @@
mkDerivation rec { mkDerivation rec {
pname = "lxqt-themes"; pname = "lxqt-themes";
version = "1.0.0"; version = "1.1.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "lxqt"; owner = "lxqt";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "1viaqmcq4axwsq5vrr08j95swapbqnwmv064kaijm1jj9csadsvv"; sha256 = "OEl6ZfMKdqjONRA1LPZ69KyFjp1c21Uib/riYDWSRWE=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -13,13 +13,13 @@
mkDerivation rec { mkDerivation rec {
pname = "pavucontrol-qt"; pname = "pavucontrol-qt";
version = "1.0.0"; version = "1.1.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "lxqt"; owner = "lxqt";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "1n8h8flcm0na7n295lkjv49brj6razwml21wwrinwllw7s948qp0"; sha256 = "zHV9tR5gDjKDbfhnhVnCnw7whJDugMAGARA3UNs/6aA=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -15,13 +15,13 @@
mkDerivation rec { mkDerivation rec {
pname = "pcmanfm-qt"; pname = "pcmanfm-qt";
version = "1.0.0"; version = "1.1.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "lxqt"; owner = "lxqt";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "1g7pl9ygk4k72rsrcsfjnr7h2yzp3pfmlc5wq6bhyq9rqpr5yv7l"; sha256 = "AgNupKdjSigrgY2U9bnkQCV0BrRCw2X9WR4jUH6YmEU=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -14,13 +14,13 @@
mkDerivation rec { mkDerivation rec {
pname = "qps"; pname = "qps";
version = "2.4.0"; version = "2.5.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "lxqt"; owner = "lxqt";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "11mbzn4syfghb3zvdrw2011njagcw206ng6c8l9z9h3zlhmhcd57"; sha256 = "hkcl9bBQP994TGr4CQQlRZR88IZiRdcbUNOXXf4kXdg=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -13,13 +13,13 @@
mkDerivation rec { mkDerivation rec {
pname = "qterminal"; pname = "qterminal";
version = "1.0.0"; version = "1.1.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "lxqt"; owner = "lxqt";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "12p3fnbkpj6z0iplg75304l8kvnn145iq6bpw30n9bwflxrd6yhd"; sha256 = "x+rgDrijDsMMdpU7afkn0dsSQbuBbEI9agoaLVsR/q8=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -10,13 +10,13 @@
mkDerivation rec { mkDerivation rec {
pname = "qtermwidget"; pname = "qtermwidget";
version = "1.0.0"; version = "1.1.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "lxqt"; owner = "lxqt";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "0i1w5wgac7r4p0jjrrswlvvwivkwrp1b88xh5ijjw6k9irjc7zf6"; sha256 = "tb1Vlkv8HsNlFCFOYfPnJlhdJmhyDmLE9SaTXZT0gGs=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -17,13 +17,13 @@
mkDerivation rec { mkDerivation rec {
pname = "screengrab"; pname = "screengrab";
version = "2.3.0"; version = "2.4.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "lxqt"; owner = "lxqt";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "1ca5yyvcahabyrdjcsznz9j66yrdlvnfa3650iwlz6922c3dkn2k"; sha256 = "EWmEbXY2EEUW2Hq7JwLW/KDgQ8KHs4DZzuGgFjNthPQ=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -0,0 +1,41 @@
{ lib
, mkDerivation
, fetchFromGitHub
, cmake
, kwindowsystem
, libfm-qt
, qtx11extras
, lxqtUpdateScript
}:
mkDerivation rec {
pname = "xdg-desktop-portal-lxqt";
version = "0.2.0";
src = fetchFromGitHub {
owner = "lxqt";
repo = pname;
rev = version;
sha256 = "15wld2p07sbf2i2qv86ljm479q0nr9r65wavmabmn3fkzkz5vlgf";
};
nativeBuildInputs = [
cmake
];
buildInputs = [
kwindowsystem
libfm-qt
qtx11extras
];
passthru.updateScript = lxqtUpdateScript { inherit pname version src; };
meta = with lib; {
homepage = "https://github.com/lxqt/xdg-desktop-portal-lxqt";
description = "Backend implementation for xdg-desktop-portal that is using Qt/KF5/libfm-qt";
license = licenses.lgpl21Plus;
platforms = platforms.linux;
maintainers = with maintainers; [ romildo ];
};
}

View file

@ -3,9 +3,9 @@
mkXfceDerivation { mkXfceDerivation {
category = "apps"; category = "apps";
pname = "xfce4-terminal"; pname = "xfce4-terminal";
version = "1.0.1"; version = "1.0.2";
sha256 = "sha256-+tuJGA/g0ddDop5mTbRZGVGUKKZ87fmdVMOaaBhMpFQ="; sha256 = "sha256-d69SjV7dkiYmc0R5OyU5DV5RM3h51an4idWV872QoE4=";
nativeBuildInputs = [ libxslt docbook_xml_dtd_45 docbook_xsl ]; nativeBuildInputs = [ libxslt docbook_xml_dtd_45 docbook_xsl ];

View file

@ -1,7 +1,7 @@
{ fetchFromGitHub, fetchgit, fetchHex, rebar3Relx, buildRebar3, rebar3-proper { fetchFromGitHub, fetchgit, fetchHex, rebar3Relx, buildRebar3, rebar3-proper
, stdenv, writeScript, lib }: , stdenv, writeScript, lib }:
let let
version = "0.24.0"; version = "0.29.0";
owner = "erlang-ls"; owner = "erlang-ls";
repo = "erlang_ls"; repo = "erlang_ls";
deps = import ./rebar-deps.nix { deps = import ./rebar-deps.nix {
@ -19,7 +19,7 @@ rebar3Relx {
inherit version; inherit version;
src = fetchFromGitHub { src = fetchFromGitHub {
inherit owner repo; inherit owner repo;
sha256 = "sha256-fKe6vsY40lexnkUP4PEsc53WFaUAw5LGLEC/zJauogg="; sha256 = "sha256-BWI7H5HU5ZgXrMWFOZ7WpTfS6syrFpEVRInZW6hC5iE=";
rev = version; rev = version;
}; };
releaseType = "escript"; releaseType = "escript";

View file

@ -66,11 +66,12 @@ let
}; };
yamerl = builder { yamerl = builder {
name = "yamerl"; name = "yamerl";
version = "0.8.1"; version = "git";
src = fetchHex { src = fetchFromGitHub {
pkg = "yamerl"; owner = "erlang-ls";
version = "0.8.1"; repo = "yamerl";
sha256 = "sha256-lssw+dZDRP7Q74qS6fFvIH3mwE3/9PNmdSynn1vOsj8="; rev = "9a9f7a2e84554992f2e8e08a8060bfe97776a5b7";
sha256 = "1gb44v27paxwxm443m5f554wiziqi2kd300hgjjdg6fyvy3mvhss";
}; };
beamDeps = [ ]; beamDeps = [ ];
}; };
@ -130,8 +131,8 @@ let
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "josefs"; owner = "josefs";
repo = "gradualizer"; repo = "gradualizer";
rev = "e93db1c6725760def005c69d72f53b1a889b4c2f"; rev = "6e89b4e1cd489637a848cc5ca55058c8a241bf7d";
sha256 = "0i1mh0dw2qknrjwpbxhgpwspqv12bznylv17sznid3kbb31pslay"; sha256 = "1ix0xgd0267ibx6y68fx4pq8q3j0y7rjs7j3cv3v2gdiy190psy9";
}; };
beamDeps = [ ]; beamDeps = [ ];
}; };

View file

@ -0,0 +1,41 @@
{ stdenv, lib, fetchurl, ocamlPackages, mpfr, ppl }:
stdenv.mkDerivation rec {
pname = "jasmin-compiler";
version = "21.0";
src = fetchurl {
url = "https://github.com/jasmin-lang/jasmin/releases/download/v${version}/jasmin-compiler-v${version}.tar.bz2";
sha256 = "sha256:1px17fpc00gca5ayfcr4k008srkyw120c25rnyf7cgzfs1gpylj2";
};
sourceRoot = "jasmin-compiler-v${version}/compiler";
nativeBuildInputs = with ocamlPackages; [ ocaml findlib ocamlbuild menhir camlidl ];
buildInputs = [
mpfr
ppl
] ++ (with ocamlPackages; [
apron
batteries
menhirLib
yojson
zarith
]);
installPhase = ''
runHook preInstall
mkdir -p $out/bin
cp jasminc.native $out/bin/jasminc
runHook postInstall
'';
meta = {
description = "A workbench for high-assurance and high-speed cryptography";
homepage = "https://github.com/jasmin-lang/jasmin/";
platforms = lib.platforms.all;
license = lib.licenses.mit;
maintainers = [ lib.maintainers.vbgl ];
};
}

View file

@ -6,7 +6,12 @@ mkCoqDerivation {
pname = "coqtail-math"; pname = "coqtail-math";
owner = "coq-community"; owner = "coq-community";
inherit version; inherit version;
defaultVersion = if versions.range "8.11" "8.13" coq.coq-version then "20201124" else null; defaultVersion = with versions; switch coq.coq-version [
{ case = range "8.11" "8.15"; out = "8.14"; }
{ case = range "8.11" "8.13"; out = "20201124"; }
] null;
release."8.14".sha256 = "sha256:1k8f8idjnx0mf4z479vcx55iz42rjxrbplbznv80m2famxakq03c";
release."20201124".rev = "5c22c3d7dcd8cf4c47cf84a281780f5915488e9e"; release."20201124".rev = "5c22c3d7dcd8cf4c47cf84a281780f5915488e9e";
release."20201124".sha256 = "sha256-wd+Lh7dpAD4zfpyKuztDmSFEZo5ZiFrR8ti2jUCVvoQ="; release."20201124".sha256 = "sha256-wd+Lh7dpAD4zfpyKuztDmSFEZo5ZiFrR8ti2jUCVvoQ=";

Some files were not shown because too many files have changed in this diff Show more