Merge branch 'master' into haskell-updates

This commit is contained in:
maralorn 2023-04-29 19:19:13 +02:00
commit 5e811b3a0b
125 changed files with 4997 additions and 3299 deletions

View file

@ -11044,6 +11044,16 @@
githubId = 34162313; githubId = 34162313;
name = "Jason Wing"; name = "Jason Wing";
}; };
netfox = {
name = "netfox";
email = "say-hi@netfox.rip";
matrix = "@netfox:catgirl.cloud";
github = "0xnetfox";
githubId = 97521402;
keys = [{
fingerprint = "E8E9 43D7 EB83 DB77 E41C D87F 9C77 CB70 F2E6 3EF7";
}];
};
netixx = { netixx = {
email = "dev.espinetfrancois@gmail.com"; email = "dev.espinetfrancois@gmail.com";
github = "netixx"; github = "netixx";

View file

@ -28,6 +28,8 @@ In addition to numerous new and upgraded packages, this release has the followin
- `libxcrypt`, the library providing the `crypt(3)` password hashing function, is now built without support for algorithms not flagged [`strong`](https://github.com/besser82/libxcrypt/blob/v4.4.33/lib/hashes.conf#L48). This affects the availability of password hashing algorithms used for system login (`login(1)`, `passwd(1)`), but also Apache2 Basic-Auth, Samba, OpenLDAP, Dovecot, and [many other packages](https://github.com/search?q=repo%3ANixOS%2Fnixpkgs%20libxcrypt&type=code). - `libxcrypt`, the library providing the `crypt(3)` password hashing function, is now built without support for algorithms not flagged [`strong`](https://github.com/besser82/libxcrypt/blob/v4.4.33/lib/hashes.conf#L48). This affects the availability of password hashing algorithms used for system login (`login(1)`, `passwd(1)`), but also Apache2 Basic-Auth, Samba, OpenLDAP, Dovecot, and [many other packages](https://github.com/search?q=repo%3ANixOS%2Fnixpkgs%20libxcrypt&type=code).
- `boot.bootspec.enable` (internal option) is now enabled by default because [RFC-0125](https://github.com/NixOS/rfcs/pull/125) was merged. This means you will have a bootspec document called `boot.json` generated for each system and specialisation in the top-level. This is useful to enable advanced boot usecases in NixOS such as SecureBoot.
## New Services {#sec-release-23.05-new-services} ## New Services {#sec-release-23.05-new-services}
<!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. --> <!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. -->
@ -282,7 +284,7 @@ In addition to numerous new and upgraded packages, this release has the followin
- `services.openssh.ciphers` to `services.openssh.settings.Ciphers` - `services.openssh.ciphers` to `services.openssh.settings.Ciphers`
- `services.openssh.gatewayPorts` to `services.openssh.settings.GatewayPorts` - `services.openssh.gatewayPorts` to `services.openssh.settings.GatewayPorts`
- `netbox` was updated to 3.4. NixOS' `services.netbox.package` still defaults to 3.3 if `stateVersion` is earlier than 23.05. Please review upstream's [breaking changes](https://github.com/netbox-community/netbox/releases/tag/v3.4.0), and upgrade NetBox by changing `services.netbox.package`. Database migrations will be run automatically. - `netbox` was updated to 3.5. NixOS' `services.netbox.package` still defaults to 3.3 if `stateVersion` is earlier than 23.05. Please review upstream's breaking changes [for 3.4.0](https://github.com/netbox-community/netbox/releases/tag/v3.4.0) and [for 3.5.0](https://github.com/netbox-community/netbox/releases/tag/v3.5.0), and upgrade NetBox by changing `services.netbox.package`. Database migrations will be run automatically.
- `services.netbox` now support RFC42-style options, through `services.netbox.settings`. - `services.netbox` now support RFC42-style options, through `services.netbox.settings`.

View file

@ -37,7 +37,7 @@ in {
serviceConfig.ExecStart = [ serviceConfig.ExecStart = [
"" ""
"${lib.getExe pkgs.auto-cpufreq} --config ${cfgFile}" "${lib.getExe pkgs.auto-cpufreq} --daemon --config ${cfgFile}"
]; ];
}; };
}; };

View file

@ -1,4 +1,6 @@
#V1: { import "struct"
#BootspecV1: {
system: string system: string
init: string init: string
initrd?: string initrd?: string
@ -7,12 +9,23 @@
kernelParams: [...string] kernelParams: [...string]
label: string label: string
toplevel: string toplevel: string
specialisation?: {
[=~"^"]: #V1
}
extensions?: {...}
} }
Document: { // A restricted document does not allow any official specialisation
v1: #V1 // information in it to avoid "recursive specialisations".
#RestrictedDocument: struct.MinFields(1) & {
"org.nixos.bootspec.v1": #BootspecV1
[=~"^"]: #BootspecExtension
}
// Specialisations are a hashmap of strings
#BootspecSpecialisationV1: [string]: #RestrictedDocument
// Bootspec extensions are defined by the extension author.
#BootspecExtension: {...}
// A "full" document allows official specialisation information
// in the top-level with a reserved namespaced key.
Document: #RestrictedDocument & {
"org.nixos.specialisation.v1"?: #BootspecSpecialisationV1
} }

View file

@ -16,20 +16,20 @@ let
filename = "boot.json"; filename = "boot.json";
json = json =
pkgs.writeText filename pkgs.writeText filename
(builtins.toJSON (builtins.toJSON
# Merge extensions first to not let them shadow NixOS bootspec data.
(cfg.extensions //
{ {
v1 = { "org.nixos.bootspec.v1" = {
system = config.boot.kernelPackages.stdenv.hostPlatform.system; system = config.boot.kernelPackages.stdenv.hostPlatform.system;
kernel = "${config.boot.kernelPackages.kernel}/${config.system.boot.loader.kernelFile}"; kernel = "${config.boot.kernelPackages.kernel}/${config.system.boot.loader.kernelFile}";
kernelParams = config.boot.kernelParams; kernelParams = config.boot.kernelParams;
label = "${config.system.nixos.distroName} ${config.system.nixos.codeName} ${config.system.nixos.label} (Linux ${config.boot.kernelPackages.kernel.modDirVersion})"; label = "${config.system.nixos.distroName} ${config.system.nixos.codeName} ${config.system.nixos.label} (Linux ${config.boot.kernelPackages.kernel.modDirVersion})";
inherit (cfg) extensions;
} // lib.optionalAttrs config.boot.initrd.enable { } // lib.optionalAttrs config.boot.initrd.enable {
initrd = "${config.system.build.initialRamdisk}/${config.system.boot.loader.initrdFile}"; initrd = "${config.system.build.initialRamdisk}/${config.system.boot.loader.initrdFile}";
initrdSecrets = "${config.system.build.initialRamdiskSecretAppender}/bin/append-initrd-secrets"; initrdSecrets = "${config.system.build.initialRamdiskSecretAppender}/bin/append-initrd-secrets";
}; };
}); }));
generator = generator =
let let
@ -42,8 +42,8 @@ let
toplevelInjector = lib.escapeShellArgs [ toplevelInjector = lib.escapeShellArgs [
"${pkgs.jq}/bin/jq" "${pkgs.jq}/bin/jq"
'' ''
.v1.toplevel = $toplevel | ."org.nixos.bootspec.v1".toplevel = $toplevel |
.v1.init = $init ."org.nixos.bootspec.v1".init = $init
'' ''
"--sort-keys" "--sort-keys"
"--arg" "toplevel" "${placeholder "out"}" "--arg" "toplevel" "${placeholder "out"}"
@ -62,14 +62,10 @@ let
lib.escapeShellArgs [ lib.escapeShellArgs [
"${pkgs.jq}/bin/jq" "${pkgs.jq}/bin/jq"
"--sort-keys" "--sort-keys"
".v1.specialisation = ($ARGS.named | map_values(. | first | .v1))" ''."org.nixos.specialisation.v1" = ($ARGS.named | map_values(. | first))''
] + " ${lib.concatStringsSep " " specialisationLoader}"; ] + " ${lib.concatStringsSep " " specialisationLoader}";
in in
'' "${toplevelInjector} | ${specialisationInjector} > $out/${filename}";
mkdir -p $out/bootspec
${toplevelInjector} | ${specialisationInjector} > $out/${filename}
'';
validator = pkgs.writeCueValidator ./bootspec.cue { validator = pkgs.writeCueValidator ./bootspec.cue {
document = "Document"; # Universal validator for any version as long the schema is correctly set. document = "Document"; # Universal validator for any version as long the schema is correctly set.
@ -79,10 +75,17 @@ let
in in
{ {
options.boot.bootspec = { options.boot.bootspec = {
enable = lib.mkEnableOption (lib.mdDoc "Enable generation of RFC-0125 bootspec in $system/bootspec, e.g. /run/current-system/bootspec"); enable = lib.mkEnableOption (lib.mdDoc "the generation of RFC-0125 bootspec in $system/boot.json, e.g. /run/current-system/boot.json")
// { default = true; internal = true; };
enableValidation = lib.mkEnableOption (lib.mdDoc ''the validation of bootspec documents for each build.
This will introduce Go in the build-time closure as we are relying on [Cuelang](https://cuelang.org/) for schema validation.
Enable this option if you want to ascertain that your documents are correct.
''
);
extensions = lib.mkOption { extensions = lib.mkOption {
type = lib.types.attrsOf lib.types.attrs; # <namespace>: { ...namespace-specific fields } # NOTE(RaitoBezarius): this is not enough to validate: extensions."osRelease" = drv; those are picked up by cue validation.
type = lib.types.attrsOf lib.types.anything; # <namespace>: { ...namespace-specific fields }
default = { }; default = { };
description = lib.mdDoc '' description = lib.mdDoc ''
User-defined data that extends the bootspec document. User-defined data that extends the bootspec document.
@ -112,15 +115,4 @@ in
default = schemas.v1.filename; default = schemas.v1.filename;
}; };
}; };
config = lib.mkIf (cfg.enable) {
warnings = [
''RFC-0125 is not merged yet, this is a feature preview of bootspec.
The schema is not definitive and features are not guaranteed to be stable until RFC-0125 is merged.
See:
- https://github.com/NixOS/nixpkgs/pull/172237 to track merge status in nixpkgs.
- https://github.com/NixOS/rfcs/pull/125 to track RFC status.
''
];
};
} }

View file

@ -82,7 +82,8 @@ let
${optionalString (!config.boot.isContainer && config.boot.bootspec.enable) '' ${optionalString (!config.boot.isContainer && config.boot.bootspec.enable) ''
${config.boot.bootspec.writer} ${config.boot.bootspec.writer}
${config.boot.bootspec.validator} "$out/${config.boot.bootspec.filename}" ${optionalString config.boot.bootspec.enableValidation
''${config.boot.bootspec.validator} "$out/${config.boot.bootspec.filename}"''}
''} ''}
${config.system.extraSystemBuilderCmds} ${config.system.extraSystemBuilderCmds}

View file

@ -110,7 +110,7 @@ in
machine.succeed("test -e /run/current-system/boot.json") machine.succeed("test -e /run/current-system/boot.json")
bootspec = json.loads(machine.succeed("jq -r '.v1' /run/current-system/boot.json")) bootspec = json.loads(machine.succeed("jq -r '.\"org.nixos.bootspec.v1\"' /run/current-system/boot.json"))
assert all(key in bootspec for key in ('initrd', 'initrdSecrets')), "Bootspec should contain initrd or initrdSecrets field when initrd is enabled" assert all(key in bootspec for key in ('initrd', 'initrdSecrets')), "Bootspec should contain initrd or initrdSecrets field when initrd is enabled"
''; '';
@ -136,10 +136,10 @@ in
machine.succeed("test -e /run/current-system/boot.json") machine.succeed("test -e /run/current-system/boot.json")
machine.succeed("test -e /run/current-system/specialisation/something/boot.json") machine.succeed("test -e /run/current-system/specialisation/something/boot.json")
sp_in_parent = json.loads(machine.succeed("jq -r '.v1.specialisation.something' /run/current-system/boot.json")) sp_in_parent = json.loads(machine.succeed("jq -r '.\"org.nixos.specialisation.v1\".something' /run/current-system/boot.json"))
sp_in_fs = json.loads(machine.succeed("cat /run/current-system/specialisation/something/boot.json")) sp_in_fs = json.loads(machine.succeed("cat /run/current-system/specialisation/something/boot.json"))
assert sp_in_parent == sp_in_fs['v1'], "Bootspecs of the same specialisation are different!" assert sp_in_parent['org.nixos.bootspec.v1'] == sp_in_fs['org.nixos.bootspec.v1'], "Bootspecs of the same specialisation are different!"
''; '';
}; };
@ -152,7 +152,9 @@ in
imports = [ standard ]; imports = [ standard ];
environment.systemPackages = [ pkgs.jq ]; environment.systemPackages = [ pkgs.jq ];
boot.bootspec.extensions = { boot.bootspec.extensions = {
osRelease = config.environment.etc."os-release".source; "org.nix-tests.product" = {
osRelease = config.environment.etc."os-release".source;
};
}; };
}; };
@ -161,7 +163,7 @@ in
machine.wait_for_unit("multi-user.target") machine.wait_for_unit("multi-user.target")
current_os_release = machine.succeed("cat /etc/os-release") current_os_release = machine.succeed("cat /etc/os-release")
bootspec_os_release = machine.succeed("cat $(jq -r '.v1.extensions.osRelease' /run/current-system/boot.json)") bootspec_os_release = machine.succeed("cat $(jq -r '.\"org.nix-tests.product\".osRelease' /run/current-system/boot.json)")
assert current_os_release == bootspec_os_release, "Filename referenced by extension has unexpected contents" assert current_os_release == bootspec_os_release, "Filename referenced by extension has unexpected contents"
''; '';

View file

@ -1,14 +1,12 @@
{ lib { lib
, fetchFromGitHub
, buildGoModule , buildGoModule
, clangStdenv , fetchFromGitHub
, pkg-config , pkg-config
, alsa-lib , alsa-lib
, flac , flac
}: }:
# gcc only supports objc on darwin buildGoModule rec {
buildGoModule.override { stdenv = clangStdenv; } rec {
pname = "go-musicfox"; pname = "go-musicfox";
version = "4.0.5"; version = "4.0.5";
@ -45,6 +43,6 @@ buildGoModule.override { stdenv = clangStdenv; } rec {
homepage = "https://github.com/anhoder/go-musicfox"; homepage = "https://github.com/anhoder/go-musicfox";
license = licenses.mit; license = licenses.mit;
mainProgram = "musicfox"; mainProgram = "musicfox";
maintainers = with maintainers; [ zendo Ruixi-rebirth ]; maintainers = with maintainers; [ zendo Ruixi-rebirth aleksana ];
}; };
} }

View file

@ -26,11 +26,11 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "qmmp"; pname = "qmmp";
version = "2.1.2"; version = "2.1.3";
src = fetchurl { src = fetchurl {
url = "https://qmmp.ylsoftware.com/files/qmmp/2.1/${pname}-${version}.tar.bz2"; url = "https://qmmp.ylsoftware.com/files/qmmp/2.1/${pname}-${version}.tar.bz2";
hash = "sha256-U86LoAkg6mBFVa/cgB8kpCa5KwdkR0PMQmAGvf/KAXo="; hash = "sha256-+bHnvwXUmdBbQcO3Unybqou/MZgcf6CXhlAcBjNFCNQ=";
}; };
nativeBuildInputs = [ cmake pkg-config wrapQtAppsHook ]; nativeBuildInputs = [ cmake pkg-config wrapQtAppsHook ];

View file

@ -25,13 +25,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "tauon"; pname = "tauon";
version = "7.6.3"; version = "7.6.4";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "Taiko2k"; owner = "Taiko2k";
repo = "TauonMusicBox"; repo = "TauonMusicBox";
rev = "v${version}"; rev = "v${version}";
hash = "sha256-cNR4Ffn9HvgL5KV4FUSnbzEh6VfoKaIbfpb18/qKEns="; hash = "sha256-xMUQ2LabxuvCdd7dsoXPN3tjkDxfXIQ8UrJcsGQ+EEU=";
}; };
postUnpack = '' postUnpack = ''

View file

@ -2,22 +2,54 @@
, fetchFromGitHub , fetchFromGitHub
, lib , lib
, rustPlatform , rustPlatform
, IOKit , darwin
, Security
, AppKit
, pkg-config
, udev , udev
, zlib
, protobuf , protobuf
, libcxx
, rocksdb
, pkg-config
, openssl
, nix-update-script
# Taken from https://github.com/solana-labs/solana/blob/master/scripts/cargo-install-all.sh#L84
, solanaPkgs ? [
"solana"
"solana-bench-tps"
"solana-faucet"
"solana-gossip"
"solana-install"
"solana-keygen"
"solana-log-analyzer"
"solana-net-shaper"
"solana-sys-tuner"
"rbpf-cli"
"solana-validator"
"solana-ledger-tool"
"cargo-build-bpf"
"cargo-test-bpf"
"solana-dos"
"solana-install-init"
"solana-stake-accounts"
"solana-test-validator"
"solana-tokens"
"solana-watchtower"
"cargo-test-sbf"
"cargo-build-sbf"
] ++ [
# XXX: Ensure `solana-genesis` is built LAST!
# See https://github.com/solana-labs/solana/issues/5826
"solana-genesis"
]
}: }:
let let
pinData = lib.importJSON ./pin.json; version = "1.14.17";
version = pinData.version; sha256 = "sha256-pYbnEF8MgF7fCBf/MOPT//UCeOQj9tuIkDj8UIVFz3E=";
sha256 = pinData.sha256; cargoSha256 = "sha256-n9nuBiKV3FCgq5fJ5BuqIIAp1yZ6IO+zHjrMaUBfgzs=";
cargoSha256 = pinData.cargoSha256;
inherit (darwin.apple_sdk_11_0) Libsystem;
inherit (darwin.apple_sdk_11_0.frameworks) System IOKit AppKit Security;
in in
rustPlatform.buildRustPackage rec { rustPlatform.buildRustPackage rec {
pname = "solana-testnet-cli"; pname = "solana-cli";
inherit version cargoSha256; inherit version cargoSha256;
src = fetchFromGitHub { src = fetchFromGitHub {
@ -27,35 +59,52 @@ rustPlatform.buildRustPackage rec {
inherit sha256; inherit sha256;
}; };
buildAndTestSubdir = "cli"; strictDeps = true;
verifyCargoDeps = true;
cargoBuildFlags = builtins.map (n: "--bin=${n}") solanaPkgs;
nativeBuildInputs = lib.optionals stdenv.isLinux [ protobuf pkg-config ]; # Even tho the tests work, a shit ton of them try to connect to a local RPC
buildInputs = lib.optionals stdenv.isLinux [ udev zlib ] ++ lib.optionals stdenv.isDarwin [ IOKit Security AppKit ]; # or access internet in other ways, eventually failing due to Nix sandbox.
# Maybe we could restrict the check to the tests that don't require an RPC,
# check phase fails # but judging by the quantity of tests, that seems like a lengthty work and
# on darwin with missing framework System. This framework is not available in nixpkgs # I'm not in the mood ((ΦωΦ))
# on linux with some librocksdb-sys compilation error
doCheck = false; doCheck = false;
# all the following are needed for the checkphase nativeBuildInputs = [ protobuf pkg-config ];
# nativeCheckInputs = lib.optionals stdenv.isDarwin [ pkg-config rustfmt ]; buildInputs = [ openssl rustPlatform.bindgenHook ]
# Needed to get openssl-sys to use pkg-config. ++ lib.optionals stdenv.isLinux [ udev ]
# OPENSSL_NO_VENDOR = 1; ++ lib.optionals stdenv.isDarwin [
# OPENSSL_LIB_DIR = "${lib.getLib openssl}/lib"; libcxx
# OPENSSL_DIR="${lib.getDev openssl}"; IOKit
# LLVM_CONFIG_PATH="${llvm}/bin/llvm-config"; Security
# LIBCLANG_PATH="${llvmPackages.libclang.lib}/lib"; AppKit
System
Libsystem ];
postInstall = ''
mkdir -p $out/bin/sdk/bpf
cp -a ./sdk/bpf/* $out/bin/sdk/bpf/
'';
# Used by build.rs in the rocksdb-sys crate. If we don't set these, it would # Used by build.rs in the rocksdb-sys crate. If we don't set these, it would
# try to build RocksDB from source. # try to build RocksDB from source.
# ROCKSDB_INCLUDE_DIR="${rocksdb}/include"; ROCKSDB_LIB_DIR="${rocksdb}/lib";
# ROCKSDB_LIB_DIR="${rocksdb}/lib";
# Require this on darwin otherwise the compiler starts rambling about missing
# cmath functions
CPPFLAGS=lib.optionals stdenv.isDarwin "-isystem ${lib.getDev libcxx}/include/c++/v1";
LDFLAGS=lib.optionals stdenv.isDarwin "-L${lib.getLib libcxx}/lib";
# If set, always finds OpenSSL in the system, even if the vendored feature is enabled.
OPENSSL_NO_VENDOR = 1;
meta = with lib; { meta = with lib; {
description = "Web-Scale Blockchain for fast, secure, scalable, decentralized apps and marketplaces. "; description = "Web-Scale Blockchain for fast, secure, scalable, decentralized apps and marketplaces. ";
homepage = "https://solana.com"; homepage = "https://solana.com";
license = licenses.asl20; license = licenses.asl20;
maintainers = with maintainers; [ happysalada ]; maintainers = with maintainers; [ netfox happysalada ];
platforms = platforms.unix; platforms = platforms.unix;
}; };
passthru.updateScript = ./update.sh;
passthru.updateScript = nix-update-script { };
} }

View file

@ -1,5 +0,0 @@
{
"version": "1.10.9",
"sha256": "sha256-y7+ogMJ5E9E/+ZaTCHWOQWG7iR+BGuVqvlNUDT++Ghc=",
"cargoSha256": "sha256-7EULmmztt+INvSdluvvX5xbE2hWKAmHiW0MEYIPNPw4="
}

View file

@ -1,33 +0,0 @@
#!/usr/bin/env nix-shell
#! nix-shell -i oil -p jq sd nix-prefetch-github ripgrep
# TODO set to `verbose` or `extdebug` once implemented in oil
shopt --set xtrace
# we need failures inside of command subs to get the correct cargoSha256
shopt --unset inherit_errexit
const directory = $(dirname $0 | xargs realpath)
const owner = "solana-labs"
const repo = "solana"
const latest_rev = $(curl -q https://api.github.com/repos/${owner}/${repo}/releases/latest | \
jq -r '.tag_name')
const latest_version = $(echo $latest_rev | sd 'v' '')
const current_version = $(jq -r '.version' $directory/pin.json)
if ("$latest_version" === "$current_version") {
echo "solana is already up-to-date"
return 0
} else {
const tarball_meta = $(nix-prefetch-github $owner $repo --rev "$latest_rev")
const tarball_hash = "sha256-$(echo $tarball_meta | jq -r '.sha256')"
jq ".version = \"$latest_version\" | \
.\"sha256\" = \"$tarball_hash\" | \
.\"cargoSha256\" = \"\"" $directory/pin.json | sponge $directory/pin.json
const new_cargo_sha256 = $(nix-build -A solana-testnet 2>&1 | \
tail -n 2 | \
head -n 1 | \
sd '\s+got:\s+' '')
jq ".cargoSha256 = \"$new_cargo_sha256\"" $directory/pin.json | sponge $directory/pin.json
}

View file

@ -3,6 +3,7 @@
, fetchFromGitHub , fetchFromGitHub
, cmake , cmake
, git , git
, pkg-config
, gperf , gperf
, libmicrohttpd , libmicrohttpd
, openssl , openssl
@ -12,25 +13,22 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "ton"; pname = "ton";
version = "2023.01"; version = "2023.04";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "ton-blockchain"; owner = "ton-blockchain";
repo = "ton"; repo = "ton";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-wb96vh0YcTBFE8EzBItdTf88cvRMLW2XxcGJpNetOi8="; sha256 = "sha256-3HQF0wKk0iRV5fKzuCTv7X7MC+snMDrodgqScCZQVY4=";
fetchSubmodules = true; fetchSubmodules = true;
}; };
postPatch = '' outputs = [ "out" "dev" ];
# without this fails on aarch64-darwin with clang-11: error: the clang compiler does not support '-mcpu=apple-m1'
substituteInPlace CMakeLists.txt \
--replace 'set(TON_ARCH "apple-m1")' ""
'';
nativeBuildInputs = [ nativeBuildInputs = [
cmake cmake
git git
pkg-config
]; ];
buildInputs = [ buildInputs = [
@ -44,6 +42,7 @@ stdenv.mkDerivation rec {
meta = with lib; { meta = with lib; {
description = "A fully decentralized layer-1 blockchain designed by Telegram"; description = "A fully decentralized layer-1 blockchain designed by Telegram";
homepage = "https://ton.org/"; homepage = "https://ton.org/";
changelog = "https://github.com/ton-blockchain/ton/blob/v${version}/Changelog.md";
license = licenses.lgpl2Only; license = licenses.lgpl2Only;
platforms = platforms.all; platforms = platforms.all;
maintainers = with maintainers; [ misuzu ]; maintainers = with maintainers; [ misuzu ];

View file

@ -2975,14 +2975,14 @@ final: prev:
feline-nvim = buildVimPluginFrom2Nix { feline-nvim = buildVimPluginFrom2Nix {
pname = "feline.nvim"; pname = "feline.nvim";
version = "2022-12-22"; version = "2023-03-29";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "famiu"; owner = "freddiehaddad";
repo = "feline.nvim"; repo = "feline.nvim";
rev = "d48b6f92c6ccdd6654c956f437be49ea160b5b0c"; rev = "a02bcdde649cdfca0e25d2dd693ba140233b5c3e";
sha256 = "1d3sj499mj63djy2bjp7yx5qyrzsq8gphzy3wl9fnfnni1bzwg4g"; sha256 = "0s646hd3pbzv5i8vpsk019hwgyqnrd3qhm6lzilqlydrz3yx3b87";
}; };
meta.homepage = "https://github.com/famiu/feline.nvim/"; meta.homepage = "https://github.com/freddiehaddad/feline.nvim/";
}; };
fennel-vim = buildVimPluginFrom2Nix { fennel-vim = buildVimPluginFrom2Nix {
@ -14315,6 +14315,18 @@ final: prev:
meta.homepage = "https://github.com/mattn/webapi-vim/"; meta.homepage = "https://github.com/mattn/webapi-vim/";
}; };
wgsl-vim = buildVimPluginFrom2Nix {
pname = "wgsl.vim";
version = "2023-04-12";
src = fetchFromGitHub {
owner = "DingDean";
repo = "wgsl.vim";
rev = "b72cb2c28ec9554be240113bceb34198f88484e6";
sha256 = "1l1y9dwp33g5gp5mvyq4vkw8q8369r493i0qfn81nmwnmc09rsbn";
};
meta.homepage = "https://github.com/DingDean/wgsl.vim/";
};
which-key-nvim = buildVimPluginFrom2Nix { which-key-nvim = buildVimPluginFrom2Nix {
pname = "which-key.nvim"; pname = "which-key.nvim";
version = "2023-04-18"; version = "2023-04-18";

View file

@ -248,7 +248,7 @@ https://github.com/fenetikm/falcon/,,
https://github.com/brooth/far.vim/,, https://github.com/brooth/far.vim/,,
https://github.com/konfekt/fastfold/,, https://github.com/konfekt/fastfold/,,
https://github.com/lilydjwg/fcitx.vim/,fcitx5, https://github.com/lilydjwg/fcitx.vim/,fcitx5,
https://github.com/feline-nvim/feline.nvim/,, https://github.com/freddiehaddad/feline.nvim/,,
https://github.com/bakpakin/fennel.vim/,, https://github.com/bakpakin/fennel.vim/,,
https://github.com/lambdalisue/fern.vim/,, https://github.com/lambdalisue/fern.vim/,,
https://github.com/wincent/ferret/,, https://github.com/wincent/ferret/,,
@ -1202,6 +1202,7 @@ https://github.com/navicore/vissort.vim/,,
https://github.com/liuchengxu/vista.vim/,, https://github.com/liuchengxu/vista.vim/,,
https://github.com/dylanaraps/wal.vim/,, https://github.com/dylanaraps/wal.vim/,,
https://github.com/mattn/webapi-vim/,, https://github.com/mattn/webapi-vim/,,
https://github.com/DingDean/wgsl.vim/,HEAD,
https://github.com/folke/which-key.nvim/,, https://github.com/folke/which-key.nvim/,,
https://github.com/johnfrankmorgan/whitespace.nvim/,HEAD, https://github.com/johnfrankmorgan/whitespace.nvim/,HEAD,
https://github.com/gelguy/wilder.nvim/,, https://github.com/gelguy/wilder.nvim/,,

View file

@ -59,6 +59,10 @@ stdenv.mkDerivation rec {
dontUseCmakeConfigure = true; dontUseCmakeConfigure = true;
mesonFlags = [
(lib.mesonBool "cli" true)
];
buildInputs = [ buildInputs = [
glib glib
gstreamer gstreamer

View file

@ -32,11 +32,11 @@
stdenv.mkDerivation (finalAttrs: { stdenv.mkDerivation (finalAttrs: {
pname = "calibre"; pname = "calibre";
version = "6.16.0"; version = "6.17.0";
src = fetchurl { src = fetchurl {
url = "https://download.calibre-ebook.com/${finalAttrs.version}/calibre-${finalAttrs.version}.tar.xz"; url = "https://download.calibre-ebook.com/${finalAttrs.version}/calibre-${finalAttrs.version}.tar.xz";
hash = "sha256-2Lhp9PBZ19svq26PoldJ1H8tmt95MwY0l7+g6mPUvFI="; hash = "sha256-HKSruKXYUMH1lj43CA3Rp3lXNlONXE1P9gFLaH16No4=";
}; };
# https://sources.debian.org/patches/calibre/${finalAttrs.version}+dfsg-1 # https://sources.debian.org/patches/calibre/${finalAttrs.version}+dfsg-1

View file

@ -5,16 +5,16 @@
rustPlatform.buildRustPackage rec { rustPlatform.buildRustPackage rec {
pname = "elfx86exts"; pname = "elfx86exts";
version = "0.5.0"; version = "unstable-2023-04-20";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "pkgw"; owner = "pkgw";
repo = pname; repo = pname;
rev = "${pname}@${version}"; rev = "26bf98cf1fc773196e594c48bfe808d7151076f6";
sha256 = "sha256-SDBs5/jEvoKEVKCHQLz2z+CZSSmESP7LoIITRN4qJWA="; hash = "sha256-xNmaKGbMN92CPIQQRbdmeePk5Wt9XcIsB/2vbk5NJzg=";
}; };
cargoSha256 = "sha256-fYtFRdH6U8uWshdD1Pb1baE8slo6qajx10tDK3Ukknw="; cargoHash = "sha256-NH7QK8a+ndhZGlLa3gWlnQdBQil1pi2AAi5TtFgkVf0=";
meta = with lib; { meta = with lib; {
description = "Decode x86 binaries and print out which instruction set extensions they use."; description = "Decode x86 binaries and print out which instruction set extensions they use.";

View file

@ -17,13 +17,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "flowtime"; pname = "flowtime";
version = "3.0"; version = "3.1";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "Diego-Ivan"; owner = "Diego-Ivan";
repo = "Flowtime"; repo = "Flowtime";
rev = "v${version}"; rev = "v${version}";
hash = "sha256-op643yU7KdkTO9hT0iYTIqBP4oPe0MT1R5I3FAtN0/I="; hash = "sha256-aXGdHFj9P8+33VuR8YBi+YYN/vBn94drmtKzNDc4SAY=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -10,11 +10,11 @@
}: }:
let let
pname = "jetbrains-toolbox"; pname = "jetbrains-toolbox";
version = "1.27.3.14493"; version = "1.28.0.15158";
src = fetchzip { src = fetchzip {
url = "https://download.jetbrains.com/toolbox/jetbrains-toolbox-${version}.tar.gz"; url = "https://download.jetbrains.com/toolbox/jetbrains-toolbox-${version}.tar.gz";
sha256 = "sha256-aK5T95Yg8Us8vkznWlDHnPiPAKiUtlU0Eswl9rD01VY="; sha256 = "sha256-IHs3tQtFXGS9xa5lKwSEWvp8aNffrCjNcoVE4tGX9ak=";
stripRoot = false; stripRoot = false;
}; };

View file

@ -1,4 +1,4 @@
{ lib, buildPythonApplication, fetchFromGitHub, configargparse, setuptools, poetry-core }: { lib, buildPythonApplication, fetchFromGitHub, configargparse, setuptools, poetry-core, rbw }:
buildPythonApplication rec { buildPythonApplication rec {
pname = "rofi-rbw"; pname = "rofi-rbw";
@ -21,6 +21,10 @@ buildPythonApplication rec {
pythonImportsCheck = [ "rofi_rbw" ]; pythonImportsCheck = [ "rofi_rbw" ];
preFixup = ''
makeWrapperArgs+=(--prefix PATH : ${lib.makeBinPath [ rbw ]})
'';
meta = with lib; { meta = with lib; {
description = "Rofi frontend for Bitwarden"; description = "Rofi frontend for Bitwarden";
homepage = "https://github.com/fdw/rofi-rbw"; homepage = "https://github.com/fdw/rofi-rbw";

View file

@ -19,9 +19,9 @@
} }
}, },
"beta": { "beta": {
"version": "113.0.5672.53", "version": "113.0.5672.63",
"sha256": "0k91xx3fm0kywjn00s9b7p776882b1mfajf2ig0iz3jac6rprh56", "sha256": "07pf28yy5c4xw1xkycgzq53zbj14zvhh00sv601nggisq4fw3kkn",
"sha256bin64": "1pzpigz8l6hsddb7v2g9m5d32hlq979l1cpj2yfnc6dixjs8x053", "sha256bin64": "1n1bcim5wfafa3bl9grp3ckmnbi1mzhdxz8pim408wz892da34zl",
"deps": { "deps": {
"gn": { "gn": {
"version": "2023-03-18", "version": "2023-03-18",
@ -32,15 +32,15 @@
} }
}, },
"dev": { "dev": {
"version": "114.0.5720.4", "version": "114.0.5735.6",
"sha256": "1q9r4m1gda1mq0nwi00yfpxsqdghd0qb3k7a0xa9py8l6jcv8ifa", "sha256": "0wxlfqxrawk77yzm00hb1fbssrycl4mha53wm4y5mlb8warqs5jk",
"sha256bin64": "15ss5xix773yn4g24ww9bw38g7wxgwhdqbgmwy44yvp0yl824czb", "sha256bin64": "0vlb6zr50kn7i0rfvy3yvwzcffpg5ki7is8i3ck43b1gr1bsmgmb",
"deps": { "deps": {
"gn": { "gn": {
"version": "2023-04-07", "version": "2023-04-19",
"url": "https://gn.googlesource.com/gn", "url": "https://gn.googlesource.com/gn",
"rev": "ffeea1b1fd070cb6a8d47154a03f8523486b50a7", "rev": "5a004f9427a050c6c393c07ddb85cba8ff3849fa",
"sha256": "0xpwh06a82nb4j9ifr878rij97dikfcjfbc08cnkmxrx7hs1sjdw" "sha256": "01xrh9m9m6x8lz0vxwdw2mrhrvnw93zpg09hwdhqakj06agf4jjk"
} }
} }
}, },

View file

@ -2,13 +2,13 @@
buildGoModule rec { buildGoModule rec {
pname = "cilium-cli"; pname = "cilium-cli";
version = "0.13.2"; version = "0.14.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "cilium"; owner = "cilium";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-K/RUEr9WJU1tocESvBF48F890vMgCRANM0lqn644eeg="; sha256 = "sha256-E/14YYX4EFakzBsaUxy1SZAaBCIKmgpWlY/9EazWWFI=";
}; };
vendorHash = null; vendorHash = null;

View file

@ -2,16 +2,16 @@
buildGoModule rec { buildGoModule rec {
pname = "kn"; pname = "kn";
version = "1.7.0"; version = "1.10.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "knative"; owner = "knative";
repo = "client"; repo = "client";
rev = "knative-v${version}"; rev = "knative-v${version}";
sha256 = "sha256-rcjAdujiK6urn14eG27Lnq/6g+O0n2KmrL7k8A5ONjg="; sha256 = "sha256-LkjE3GMHoD+PmB4J09xf71nBrY1KPvh13l2O3QN9EH0=";
}; };
vendorSha256 = null; vendorHash = null;
subPackages = [ "cmd/kn" ]; subPackages = [ "cmd/kn" ];

View file

@ -2,7 +2,7 @@
(callPackage ./generic.nix { }) { (callPackage ./generic.nix { }) {
channel = "stable"; channel = "stable";
version = "2.13.1"; version = "2.13.2";
sha256 = "1qsf2d4haqs93qf88f2vvjsgm5a5gnmivkdpdbvpwy0q8bd8rfnj"; sha256 = "0pcb4f8s8l156y0zd9g9f0pyydvp52n02krjy2giajp00gaqx3s3";
vendorSha256 = "sha256-6KuXEKuQJvRNUM+6Uo+J9D3eHI+1tt62C5XZsEDwkTc="; vendorSha256 = "sha256-6KuXEKuQJvRNUM+6Uo+J9D3eHI+1tt62C5XZsEDwkTc=";
} }

View file

@ -2,13 +2,13 @@
buildGoModule rec { buildGoModule rec {
pname = "rke"; pname = "rke";
version = "1.4.4"; version = "1.4.5";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "rancher"; owner = "rancher";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
hash = "sha256-2qqEpH3Lkd7Ok+KBcRpRWiaUp0kN6j0YGURsX/qe3No="; hash = "sha256-ldN0Fqh0V6JziTy5ml/i/un4/1o8MSeIAvrH5EyOeiw=";
}; };
vendorHash = "sha256-wuEsG2VKU4F/phSqpzUN3wChD93V4AE7poVLJu6kpF0="; vendorHash = "sha256-wuEsG2VKU4F/phSqpzUN3wChD93V4AE7poVLJu6kpF0=";

View file

@ -46,11 +46,11 @@
"vendorHash": "sha256-nwl8GvS/hc07xSzM+wEwOAkT9oQcAuguHaEcM1nWjwg=" "vendorHash": "sha256-nwl8GvS/hc07xSzM+wEwOAkT9oQcAuguHaEcM1nWjwg="
}, },
"alicloud": { "alicloud": {
"hash": "sha256-6PStzU5YBhFDGtQOWUZ8Iyo9miRCTMgDsuJX0rNCYMQ=", "hash": "sha256-8jtZ+uhCpktt1e99j2I1C/sE69uOv911qbuaKTjv2DM=",
"homepage": "https://registry.terraform.io/providers/aliyun/alicloud", "homepage": "https://registry.terraform.io/providers/aliyun/alicloud",
"owner": "aliyun", "owner": "aliyun",
"repo": "terraform-provider-alicloud", "repo": "terraform-provider-alicloud",
"rev": "v1.203.0", "rev": "v1.204.0",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": null "vendorHash": null
}, },
@ -128,11 +128,11 @@
"vendorHash": null "vendorHash": null
}, },
"azurerm": { "azurerm": {
"hash": "sha256-tStlnMSlkkL+X/DP0SBmnm7xL6dH8HfyiaKY/McuMQE=", "hash": "sha256-1K+uM8uRpFigr9scvBL/FDoqc7TKh4ZnppEHnl8i8EA=",
"homepage": "https://registry.terraform.io/providers/hashicorp/azurerm", "homepage": "https://registry.terraform.io/providers/hashicorp/azurerm",
"owner": "hashicorp", "owner": "hashicorp",
"repo": "terraform-provider-azurerm", "repo": "terraform-provider-azurerm",
"rev": "v3.53.0", "rev": "v3.54.0",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": null "vendorHash": null
}, },
@ -164,22 +164,22 @@
"vendorHash": null "vendorHash": null
}, },
"bitbucket": { "bitbucket": {
"hash": "sha256-2JTJF+zYuf9ZKaEMSOxxjODbmIBXnhpwE8LJUdRIkYY=", "hash": "sha256-lm/BNxfB5ZosyFYihJ6kh8oro+tCP6pRFNnWrvzeKgk=",
"homepage": "https://registry.terraform.io/providers/DrFaust92/bitbucket", "homepage": "https://registry.terraform.io/providers/DrFaust92/bitbucket",
"owner": "DrFaust92", "owner": "DrFaust92",
"repo": "terraform-provider-bitbucket", "repo": "terraform-provider-bitbucket",
"rev": "v2.31.0", "rev": "v2.32.0",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": "sha256-mnG2CZ/ko4p4CTs0YskJP41sQD9lmEz4dRQLiklim34=" "vendorHash": "sha256-mnG2CZ/ko4p4CTs0YskJP41sQD9lmEz4dRQLiklim34="
}, },
"brightbox": { "brightbox": {
"hash": "sha256-e4WvQKtf6zVEZ74c+lE3ZkbX24rPazp8MrJCNQDTz2c=", "hash": "sha256-yKoYjrZs6EOX1pdDuF+LOu/jZ3fidZJBU7yhSp6qSFU=",
"homepage": "https://registry.terraform.io/providers/brightbox/brightbox", "homepage": "https://registry.terraform.io/providers/brightbox/brightbox",
"owner": "brightbox", "owner": "brightbox",
"repo": "terraform-provider-brightbox", "repo": "terraform-provider-brightbox",
"rev": "v3.3.0", "rev": "v3.4.1",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": "sha256-dm+2SseBeS49/QoepRwJ1VFwPCtU+6VymvyEH/sLkvI=" "vendorHash": "sha256-jOscYbwZ8m4smGiAy2vNhPMTAUnINkpuVRQ8E6LpWVw="
}, },
"buildkite": { "buildkite": {
"hash": "sha256-/LTUDnE5XB8Gwbs+CroJW+3pM7opNSVQFWvRQWQjFqc=", "hash": "sha256-/LTUDnE5XB8Gwbs+CroJW+3pM7opNSVQFWvRQWQjFqc=",
@ -539,11 +539,11 @@
"vendorHash": "sha256-73Hpp4OLJyFmbiczVmFzCi++W0te6G9LSb8LhNwSDUg=" "vendorHash": "sha256-73Hpp4OLJyFmbiczVmFzCi++W0te6G9LSb8LhNwSDUg="
}, },
"huaweicloud": { "huaweicloud": {
"hash": "sha256-VK/b74pGB8vjaWmUi8Zz4K5utIUYlfeYk18YZF8J1jI=", "hash": "sha256-8ilj+9aCZAlNhQ3OMF6uWFfAAVtISfS6eahywmPAb98=",
"homepage": "https://registry.terraform.io/providers/huaweicloud/huaweicloud", "homepage": "https://registry.terraform.io/providers/huaweicloud/huaweicloud",
"owner": "huaweicloud", "owner": "huaweicloud",
"repo": "terraform-provider-huaweicloud", "repo": "terraform-provider-huaweicloud",
"rev": "v1.47.1", "rev": "v1.48.0",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": null "vendorHash": null
}, },
@ -737,13 +737,13 @@
"vendorHash": "sha256-Mdy9uXYb7MH9XHqSNkG0QqTVzjvTy4+/Mr6VHXJBEZE=" "vendorHash": "sha256-Mdy9uXYb7MH9XHqSNkG0QqTVzjvTy4+/Mr6VHXJBEZE="
}, },
"mongodbatlas": { "mongodbatlas": {
"hash": "sha256-Ek7dIKWlyyAoEoMMTHx3DOBNuCoOtXP0CJHAsC04xy0=", "hash": "sha256-NvKthj+rVT23v/V1C8w8CMTfOy3yNsMjg2knXECzay4=",
"homepage": "https://registry.terraform.io/providers/mongodb/mongodbatlas", "homepage": "https://registry.terraform.io/providers/mongodb/mongodbatlas",
"owner": "mongodb", "owner": "mongodb",
"repo": "terraform-provider-mongodbatlas", "repo": "terraform-provider-mongodbatlas",
"rev": "v1.8.2", "rev": "v1.9.0",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": "sha256-Eq5qsGKJnP+NOJKinDjHUeTLoeQc/BnK+e9d/O7ie7U=" "vendorHash": "sha256-E/1w1FVLHV5X3We3NxKG7INwQtME9FCgFW1uM/6eE38="
}, },
"namecheap": { "namecheap": {
"hash": "sha256-cms8YUL+SjTeYyIOQibksi8ZHEBYq2JlgTEpOO1uMZE=", "hash": "sha256-cms8YUL+SjTeYyIOQibksi8ZHEBYq2JlgTEpOO1uMZE=",
@ -764,13 +764,13 @@
"vendorHash": null "vendorHash": null
}, },
"newrelic": { "newrelic": {
"hash": "sha256-/q1kKXdeVjxliE1HeGiusscLM4pYylgik88nxk5gPcs=", "hash": "sha256-+awQtvyJBLSm+WYH2gp+VM2uNbWeEfIbwqw7VsikQEA=",
"homepage": "https://registry.terraform.io/providers/newrelic/newrelic", "homepage": "https://registry.terraform.io/providers/newrelic/newrelic",
"owner": "newrelic", "owner": "newrelic",
"repo": "terraform-provider-newrelic", "repo": "terraform-provider-newrelic",
"rev": "v3.20.2", "rev": "v3.21.3",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": "sha256-WF4AdTu6lxoNSCsFKLMeQbHgH6j+hM0VNBRsue+azJA=" "vendorHash": "sha256-fqO3hlDUPY8/9SSMpNVD81pyaQE12zwNKDLSI54UF3M="
}, },
"nomad": { "nomad": {
"hash": "sha256-1TmcFS+ul7xpSGqQohcCdeQ2zuDD429xGI0X2Add5HQ=", "hash": "sha256-1TmcFS+ul7xpSGqQohcCdeQ2zuDD429xGI0X2Add5HQ=",
@ -1235,11 +1235,11 @@
"vendorHash": "sha256-guUjkk7oW+Gvu015LUAxGqUwZF4H+4xmmOaMqKixZaI=" "vendorHash": "sha256-guUjkk7oW+Gvu015LUAxGqUwZF4H+4xmmOaMqKixZaI="
}, },
"vultr": { "vultr": {
"hash": "sha256-cHMD4/jlXTIQ9ppTFJsUTHVQ3R9Qoe0I3me7zz2bxus=", "hash": "sha256-QZYuxtY89ldGUPNz/DJlFU6HWUJgeJC2TM6cSDoeaYc=",
"homepage": "https://registry.terraform.io/providers/vultr/vultr", "homepage": "https://registry.terraform.io/providers/vultr/vultr",
"owner": "vultr", "owner": "vultr",
"repo": "terraform-provider-vultr", "repo": "terraform-provider-vultr",
"rev": "v2.14.0", "rev": "v2.14.1",
"spdx": "MPL-2.0", "spdx": "MPL-2.0",
"vendorHash": null "vendorHash": null
}, },

View file

@ -5,16 +5,16 @@
buildGoModule rec { buildGoModule rec {
pname = "terragrunt"; pname = "terragrunt";
version = "0.45.4"; version = "0.45.5";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "gruntwork-io"; owner = "gruntwork-io";
repo = pname; repo = pname;
rev = "refs/tags/v${version}"; rev = "refs/tags/v${version}";
hash = "sha256-rqMi+rBWOWoJeoOBpBPKp1lFKzZlWQJfShN5Uyxb5eM="; hash = "sha256-Azf9A/ZHb8wFRsd7iv9Y4jr9xs8R7vNUffz9ky07SVk=";
}; };
vendorHash = "sha256-eY9YwXSIOrXbVWUIfVrUIRso1F5weBGKbPFv43k8t2Y="; vendorHash = "sha256-V7+N+vEOS4DXHglErD5YoUzu6EN4YRljV581kFnjK2M=";
doCheck = false; doCheck = false;

View file

@ -1,19 +1,28 @@
{ lib, fetchFromGitHub, buildGoModule }: { lib, fetchFromGitHub, buildGoModule, installShellFiles }:
buildGoModule rec { buildGoModule rec {
pname = "nali"; pname = "nali";
version = "0.7.1"; version = "0.7.2";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "zu1k"; owner = "zu1k";
repo = "nali"; repo = "nali";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-ZJnQiTcfvxHFgRNytQANs/lF4hy0S0cXOy8IuGECYi0="; sha256 = "sha256-tIn5ty7faM9BBmUWCvok94QOAMVtz5daCPpZkDGOJfo=";
}; };
vendorHash = "sha256-TLij88IksL0+pARKVhEhPg6qUPAXMlL2DWJk4ynahUs="; vendorHash = "sha256-l3Fs1Hd0kXI56uotic1407tb4ltkCSMzqqozFpvobH8=";
subPackages = [ "." ]; subPackages = [ "." ];
nativeBuildInputs = [ installShellFiles ];
postInstall = ''
installShellCompletion --cmd nali \
--bash <($out/bin/nali completion bash) \
--fish <($out/bin/nali completion fish) \
--zsh <($out/bin/nali completion zsh)
'';
meta = with lib; { meta = with lib; {
description = "An offline tool for querying IP geographic information and CDN provider"; description = "An offline tool for querying IP geographic information and CDN provider";
homepage = "https://github.com/zu1k/nali"; homepage = "https://github.com/zu1k/nali";

View file

@ -17,13 +17,13 @@
}: }:
let let
version = "1.14.0"; version = "1.14.2";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "paperless-ngx"; owner = "paperless-ngx";
repo = "paperless-ngx"; repo = "paperless-ngx";
rev = "refs/tags/v${version}"; rev = "refs/tags/v${version}";
hash = "sha256-O1Miy0GV34YbE1UrLUWZsatpWyfzFLGvX6fQUJnwbuE="; hash = "sha256-QpSp+8gsFApp4i4PajAQHHYZgwej/gusAw4J3Zetk4M=";
}; };
# Use specific package versions required by paperless-ngx # Use specific package versions required by paperless-ngx

View file

@ -2,13 +2,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "bedtools"; pname = "bedtools";
version = "2.30.0"; version = "2.31.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "arq5x"; owner = "arq5x";
repo = "bedtools2"; repo = "bedtools2";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-NqKldF7ePJn3pT+AkESIQghBKSFFOEBBsTaKEbU+oaQ="; sha256 = "sha256-LBD3z0+zGbQJ67oyPRFPgbiMY9EP17vSk1EKz3DrkEc=";
}; };
strictDeps = true; strictDeps = true;

View file

@ -39,17 +39,17 @@ let
in in
buildGoModule rec { buildGoModule rec {
pname = "forgejo"; pname = "forgejo";
version = "1.19.1-0"; version = "1.19.2-0";
src = fetchFromGitea { src = fetchFromGitea {
domain = "codeberg.org"; domain = "codeberg.org";
owner = "forgejo"; owner = "forgejo";
repo = "forgejo"; repo = "forgejo";
rev = "v${version}"; rev = "v${version}";
hash = "sha256-0FmqLxQvr3bbgdzKFeAhRMvJp/xdRPW40WLH6eKNY9s="; hash = "sha256-JRCEHaqRzJNRTu5OS43UmCg+vW8G/1Xwweuo5vuFO+s=";
}; };
vendorHash = "sha256-g8QJSewQFfyE/34A2JxrVnwk5vmiIRSbwrVE9LqYJrM="; vendorHash = "sha256-bnLcHmwOh/fw6ecgsndX2BmVf11hJWllE+f2J8YSzec=";
subPackages = [ "." ]; subPackages = [ "." ];

View file

@ -4,13 +4,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "git-cinnabar"; pname = "git-cinnabar";
version = "0.6.0"; version = "0.6.1";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "glandium"; owner = "glandium";
repo = "git-cinnabar"; repo = "git-cinnabar";
rev = version; rev = version;
sha256 = "IV7K/49IN2HMek247GWr5ybZRozHsnCm8RItC9sqFXc="; sha256 = "VvfoMypiFT68YJuGpEyPCxGOjdbDoF6FXtzLWlw0uxY=";
fetchSubmodules = true; fetchSubmodules = true;
}; };
@ -23,7 +23,7 @@ stdenv.mkDerivation rec {
cargoDeps = rustPlatform.fetchCargoTarball { cargoDeps = rustPlatform.fetchCargoTarball {
inherit src; inherit src;
sha256 = "YWhGAp64GAlySgUvDrD6qaNlc09swe1xCkvEpFR1ytg="; sha256 = "GApYgE7AezKmcGWNY+dF1Yp1TZmEeUdq3CsjvMvo/Rw=";
}; };
ZSTD_SYS_USE_PKG_CONFIG = true; ZSTD_SYS_USE_PKG_CONFIG = true;

View file

@ -13,16 +13,16 @@
rustPlatform.buildRustPackage rec { rustPlatform.buildRustPackage rec {
pname = "gitoxide"; pname = "gitoxide";
version = "0.22.1"; version = "0.23.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "Byron"; owner = "Byron";
repo = "gitoxide"; repo = "gitoxide";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-PetU/cUWFZWl1OoSObI7wwqJLexWPTP6ynNSyPXjvMc="; sha256 = "sha256-HmynsnlTj08vwYwckFdq+0u1nquC7bDOGcq2vCeqdhA=";
}; };
cargoHash = "sha256-A7gwC9EQ+5GVciGsL9uPbZ6nThPfku3ZNH8qQwfI0QQ="; cargoHash = "sha256-5JvDqp3dZ9rcOS17YzwgNwJYQGQ021cpd0ClrR+1+5Y=";
nativeBuildInputs = [ cmake pkg-config ]; nativeBuildInputs = [ cmake pkg-config ];
buildInputs = [ curl ] ++ (if stdenv.isDarwin buildInputs = [ curl ] ++ (if stdenv.isDarwin

View file

@ -28,13 +28,13 @@
mkDerivation rec { mkDerivation rec {
pname = "jellyfin-media-player"; pname = "jellyfin-media-player";
version = "1.9.0"; version = "1.9.1";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "jellyfin"; owner = "jellyfin";
repo = "jellyfin-media-player"; repo = "jellyfin-media-player";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-PfzBxvGroHgjEz4OchnECSfcb1Ds8xbE28yxneaiPuo="; sha256 = "sha256-97/9UYXOsg8v7QoRqo5rh0UGhjjS85K9OvUwtlG249c=";
}; };
patches = [ patches = [

View file

@ -21,13 +21,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "libopenshot-audio"; pname = "libopenshot-audio";
version = "0.3.0"; version = "0.3.2";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "OpenShot"; owner = "OpenShot";
repo = "libopenshot-audio"; repo = "libopenshot-audio";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-b3BZ275oJTxWfBWtdZetUQw0t7QznL0Q0lP7cKy/avg="; sha256 = "sha256-PLpB9sy9xehipN5S9okCHm1mPm5MaZMVaFqCBvFUiTw=";
}; };
patches = [ patches = [

View file

@ -26,13 +26,13 @@
}: }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "deepin-screen-recorder"; pname = "deepin-screen-recorder";
version = "5.11.23"; version = "5.12.1";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "linuxdeepin"; owner = "linuxdeepin";
repo = pname; repo = pname;
rev = version; rev = version;
sha256 = "sha256-yKBF/MmhlgwO5GLwfGgs13ERuzOg8EYjc3bXZ8TvcBU="; sha256 = "sha256-43jqgiBa77UAes0ekMES6IqVOPVXfzfQQjePdxFkNDM=";
}; };
patches = [ ./dont_use_libPath.diff ]; patches = [ ./dont_use_libPath.diff ];
@ -80,7 +80,7 @@ stdenv.mkDerivation rec {
# qt5integration must be placed before qtsvg in QT_PLUGIN_PATH # qt5integration must be placed before qtsvg in QT_PLUGIN_PATH
qtWrapperArgs = [ qtWrapperArgs = [
"--prefix QT_PLUGIN_PATH : ${qt5integration}/${qtbase.qtPluginPrefix}" "--prefix QT_PLUGIN_PATH : ${qt5integration}/${qtbase.qtPluginPrefix}"
"--prefix LD_LIBRARY_PATH : ${lib.makeLibraryPath [ udev gst_all_1.gstreamer ]}" "--prefix LD_LIBRARY_PATH : ${lib.makeLibraryPath [ udev gst_all_1.gstreamer libv4l ]}"
]; ];
preFixup = '' preFixup = ''

View file

@ -5,13 +5,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "chez-scheme"; pname = "chez-scheme";
version = "9.5.8"; version = "9.5.8a";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "cisco"; owner = "cisco";
repo = "ChezScheme"; repo = "ChezScheme";
rev = "refs/tags/v${version}"; rev = "refs/tags/v${version}";
sha256 = "sha256-esCWEzny/I+Ors6+upKlt4h13oN0bRLWN9OTKuSqdl8="; sha256 = "sha256-d8DgHATZzZbOYODHFKTqg4oWg/wja8jQgcCVpj8j6yQ=";
fetchSubmodules = true; fetchSubmodules = true;
}; };

View file

@ -9,13 +9,13 @@
}: }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "nmrpflash"; pname = "nmrpflash";
version = "0.9.19"; version = "0.9.20";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "jclehner"; owner = "jclehner";
repo = "nmrpflash"; repo = "nmrpflash";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-bXxJiIbMk8JG0nbWOgINUAb8zaGBN3XUdA3JZev4Igs="; sha256 = "sha256-xfKZXaKzSTnCOC8qt6Zc/eidc1bnrKZOJPw/wwMoCaM=";
}; };
nativeBuildInputs = [ pkg-config ]; nativeBuildInputs = [ pkg-config ];

View file

@ -11,6 +11,9 @@ stdenv.mkDerivation rec {
sha256 = "sha256-5hVsFanTCT/uLLXrnb2kMvmL6qs9RXVkvxdWaT6m4mk="; sha256 = "sha256-5hVsFanTCT/uLLXrnb2kMvmL6qs9RXVkvxdWaT6m4mk=";
}; };
# fix reported version
patches = [ ./fix-version.patch ];
cmakeFlags = [ cmakeFlags = [
"-DCPP_JWT_USE_VENDORED_NLOHMANN_JSON=OFF" "-DCPP_JWT_USE_VENDORED_NLOHMANN_JSON=OFF"
"-DCPP_JWT_BUILD_EXAMPLES=OFF" "-DCPP_JWT_BUILD_EXAMPLES=OFF"

View file

@ -0,0 +1,12 @@
diff --git a/CMakeLists.txt b/CMakeLists.txt
index 2f35431..f08eb22 100644
--- a/CMakeLists.txt
+++ b/CMakeLists.txt
@@ -1,5 +1,5 @@
cmake_minimum_required(VERSION 3.5.0)
-project(cpp-jwt VERSION 1.2.0)
+project(cpp-jwt VERSION 1.4.0)
option(CPP_JWT_BUILD_EXAMPLES "build examples" ON)
option(CPP_JWT_BUILD_TESTS "build tests" ON)

View file

@ -16,13 +16,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "fb303"; pname = "fb303";
version = "2023.02.20.00"; version = "2023.04.24.00";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "facebook"; owner = "facebook";
repo = "fb303"; repo = "fb303";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-cGJz7ArifkB6c5ukU9hoTqngZDTLZfSpdQ2Vx1gWntw="; sha256 = "sha256-dhqHv+A4uak1FxKNqIsYlQl2WiP5+Y9I83pumpFbJDA=";
}; };
nativeBuildInputs = [ cmake ]; nativeBuildInputs = [ cmake ];

View file

@ -1,5 +1,6 @@
{ lib, stdenv, fetchFromGitHub, cmake, boost, eigen, libxml2, mpi, python3 { lib, stdenv, fetchFromGitHub, cmake, boost, eigen, libxml2, mpi, python3
, mklSupport ? true, mkl , mklSupport ? true, mkl
, substituteAll
}: }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
@ -14,13 +15,18 @@ stdenv.mkDerivation rec {
}; };
patches = [ patches = [
./fix-cmake.patch # cannot find mkl libraries without this (substituteAll {
src = ./fix-cmake.patch; # cannot find mkl libraries without this
so = stdenv.hostPlatform.extensions.sharedLibrary;
})
]; ];
cmakeFlags = lib.optional mklSupport "-DUSE_MKL=On" cmakeFlags = lib.optional mklSupport "-DUSE_MKL=On"
++ lib.optional mklSupport "-DMKLROOT=${mkl}" ++ lib.optional mklSupport "-DMKLROOT=${mkl}"
; ;
env.CXXFLAGS = lib.optionalString stdenv.isLinux "-include cstring";
installPhase = '' installPhase = ''
runHook preInstall runHook preInstall

View file

@ -5,7 +5,7 @@
PATHS ${${libDir}} NO_DEFAULT_PATH) PATHS ${${libDir}} NO_DEFAULT_PATH)
else() else()
- find_library(TEMP NAMES lib${libName}.a lib${ARGV3}.a lib${ARGV4}.a lib${ARGV5}.a lib${ARGV6}.a - find_library(TEMP NAMES lib${libName}.a lib${ARGV3}.a lib${ARGV4}.a lib${ARGV5}.a lib${ARGV6}.a
+ find_library(TEMP NAMES lib${libName}.a lib${ARGV3}.a lib${ARGV4}.a lib${ARGV5}.a lib${ARGV6}.a lib${libName}.so lib${ARGV3}.so lib${ARGV4}.so lib${ARGV5}.so lib${ARGV6}.so + find_library(TEMP NAMES lib${libName}.a lib${ARGV3}.a lib${ARGV4}.a lib${ARGV5}.a lib${ARGV6}.a lib${libName}@so@ lib${ARGV3}@so@ lib${ARGV4}@so@ lib${ARGV5}@so@ lib${ARGV6}@so@
PATHS ${${libDir}} NO_DEFAULT_PATH) PATHS ${${libDir}} NO_DEFAULT_PATH)
endif() endif()
@ -19,7 +19,7 @@ index 2d644005f..7261ba923 100644
find_library(MKL_OMP_LIB find_library(MKL_OMP_LIB
- NAMES iomp5 iomp5md libiomp5md.lib - NAMES iomp5 iomp5md libiomp5md.lib
- PATHS ${MKLROOT}/../lib ${MKLROOT}/../compiler/lib - PATHS ${MKLROOT}/../lib ${MKLROOT}/../compiler/lib
+ NAMES libiomp5.so libiomp5 iomp5 iomp5md libiomp5md.lib + NAMES libiomp5@so@ libiomp5 iomp5 iomp5md libiomp5md.lib
+ PATHS ${MKLROOT}/lib ${MKLROOT}/../lib ${MKLROOT}/../compiler/lib + PATHS ${MKLROOT}/lib ${MKLROOT}/../lib ${MKLROOT}/../compiler/lib
PATH_SUFFIXES "intel64" "intel32" PATH_SUFFIXES "intel64" "intel32"
NO_DEFAULT_PATH NO_DEFAULT_PATH

View file

@ -1,9 +1,11 @@
{ lib { lib
, stdenvNoCC , stdenv
, fetchFromGitHub , fetchFromGitHub
, cmake
, openssl
}: }:
stdenvNoCC.mkDerivation rec { stdenv.mkDerivation rec {
pname = "httplib"; pname = "httplib";
version = "0.12.2"; version = "0.12.2";
@ -14,13 +16,8 @@ stdenvNoCC.mkDerivation rec {
hash = "sha256-mpHw9fzGpYz04rgnfG/qTNrXIf6q+vFfIsjb56kJsLg="; hash = "sha256-mpHw9fzGpYz04rgnfG/qTNrXIf6q+vFfIsjb56kJsLg=";
}; };
# Header-only library. nativeBuildInputs = [ cmake ];
dontBuild = true; buildInputs = [ openssl ];
installPhase = ''
mkdir -p "$out/include"
cp -r httplib.h "$out/include"
'';
meta = with lib; { meta = with lib; {
description = "A C++ header-only HTTP/HTTPS server and client library"; description = "A C++ header-only HTTP/HTTPS server and client library";

View file

@ -16,13 +16,14 @@
, geocode-glib_2 , geocode-glib_2
, vala , vala
, gnome , gnome
, withIntrospection ? stdenv.buildPlatform == stdenv.hostPlatform
}: }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "libgweather"; pname = "libgweather";
version = "4.2.0"; version = "4.2.0";
outputs = [ "out" "dev" "devdoc" ]; outputs = [ "out" "dev" ] ++ lib.optional withIntrospection "devdoc";
src = fetchurl { src = fetchurl {
url = "mirror://gnome/sources/${pname}/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; url = "mirror://gnome/sources/${pname}/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
@ -45,10 +46,12 @@ stdenv.mkDerivation rec {
ninja ninja
pkg-config pkg-config
gettext gettext
vala glib
(python3.pythonForBuild.withPackages (ps: [ ps.pygobject3 ]))
] ++ lib.optionals withIntrospection [
gi-docgen gi-docgen
gobject-introspection gobject-introspection
(python3.pythonForBuild.withPackages (ps: [ ps.pygobject3 ])) vala
]; ];
buildInputs = [ buildInputs = [
@ -61,8 +64,7 @@ stdenv.mkDerivation rec {
mesonFlags = [ mesonFlags = [
"-Dzoneinfo_dir=${tzdata}/share/zoneinfo" "-Dzoneinfo_dir=${tzdata}/share/zoneinfo"
"-Denable_vala=true" (lib.mesonBool "introspection" withIntrospection)
"-Dgtk_doc=true"
]; ];
postPatch = '' postPatch = ''

View file

@ -14,13 +14,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "libmtp"; pname = "libmtp";
version = "1.1.20"; version = "1.1.21";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "libmtp"; owner = "libmtp";
repo = "libmtp"; repo = "libmtp";
rev = "libmtp-${builtins.replaceStrings [ "." ] [ "-" ] version}"; rev = "libmtp-${builtins.replaceStrings [ "." ] [ "-" ] version}";
sha256 = "sha256-/tyCoEW/rCLfZH2HhA3Nxuij9d/ZJgsfyP4fLlfyNRA="; sha256 = "sha256-m9QFVD8udQ3SdGwn276BnIKqGeATA5QuokOK29Ykc1k=";
}; };
patches = [ patches = [

View file

@ -4,7 +4,7 @@
, stdenvNoCC , stdenvNoCC
, fetchurl , fetchurl
, rpmextract , rpmextract
, undmg , _7zz
, darwin , darwin
, validatePkgConfig , validatePkgConfig
, enableStatic ? stdenv.hostPlatform.isStatic , enableStatic ? stdenv.hostPlatform.isStatic
@ -19,49 +19,47 @@ let
# https://registrationcenter.intel.com/en/products/ # https://registrationcenter.intel.com/en/products/
version = "${mklVersion}.${rel}"; version = "${mklVersion}.${rel}";
# Darwin is pinned to 2019.3 because the DMG does not unpack; see here for details: mklVersion = "2023.1.0";
# https://github.com/matthewbauer/undmg/issues/4 rel = if stdenvNoCC.isDarwin then "43558" else "46342";
mklVersion = if stdenvNoCC.isDarwin then "2019.3" else "2023.0.0";
rel = if stdenvNoCC.isDarwin then "199" else "25398";
# Intel openmp uses its own versioning. # Intel openmp uses its own versioning.
openmpVersion = if stdenvNoCC.isDarwin then "19.0.3" else "2023.0.0"; openmpVersion = "2023.1.0";
openmpRel = "25370"; openmpRel = "46305";
# Thread Building Blocks release. # Thread Building Blocks release.
tbbVersion = if stdenvNoCC.isDarwin then "2019.3" else "2021.8.0"; tbbVersion = "2021.9.0";
tbbRel = "25334"; tbbRel = "43484";
shlibExt = stdenvNoCC.hostPlatform.extensions.sharedLibrary; shlibExt = stdenvNoCC.hostPlatform.extensions.sharedLibrary;
oneapi-mkl = fetchurl { oneapi-mkl = fetchurl {
url = "https://yum.repos.intel.com/oneapi/intel-oneapi-mkl-${mklVersion}-${mklVersion}-${rel}.x86_64.rpm"; url = "https://yum.repos.intel.com/oneapi/intel-oneapi-mkl-${mklVersion}-${mklVersion}-${rel}.x86_64.rpm";
hash = "sha256-fiL5TDmQHB+OQb1ERcoDQFpUutpsPe+AqIbMoa85nEk="; hash = "sha256-BeI5zB0rrE6C21dezNc7/WSKmTWpjsZbpg0/y0Y87VQ=";
}; };
oneapi-mkl-common = fetchurl { oneapi-mkl-common = fetchurl {
url = "https://yum.repos.intel.com/oneapi/intel-oneapi-mkl-common-${mklVersion}-${mklVersion}-${rel}.noarch.rpm"; url = "https://yum.repos.intel.com/oneapi/intel-oneapi-mkl-common-${mklVersion}-${mklVersion}-${rel}.noarch.rpm";
hash = "sha256-AFayUxybi48SgR2mX6mxkNECconIXm1/TWelvE4aqX0="; hash = "sha256-NjIqTeFppwjXFlPYHPHfZa/bWBiHJru3atC4fIMXN0w=";
}; };
oneapi-mkl-common-devel = fetchurl { oneapi-mkl-common-devel = fetchurl {
url = "https://yum.repos.intel.com/oneapi/intel-oneapi-mkl-common-devel-${mklVersion}-${mklVersion}-${rel}.noarch.rpm"; url = "https://yum.repos.intel.com/oneapi/intel-oneapi-mkl-common-devel-${mklVersion}-${mklVersion}-${rel}.noarch.rpm";
hash = "sha256-riyIO2xWuvTSzfXgB+K6NSKqWLRmxKSnGZaH5nYTYPk="; hash = "sha256-GX19dlvBWRgwSOCmWcEOrnbmp4S2j0448fWpx+iPVWw=";
}; };
oneapi-mkl-devel = fetchurl { oneapi-mkl-devel = fetchurl {
url = "https://yum.repos.intel.com/oneapi/intel-oneapi-mkl-devel-${mklVersion}-${mklVersion}-${rel}.x86_64.rpm"; url = "https://yum.repos.intel.com/oneapi/intel-oneapi-mkl-devel-${mklVersion}-${mklVersion}-${rel}.x86_64.rpm";
hash = "sha256-2IK0t47FaPNp7Oq9LJ5ZdLmlFFjQluWrh+nhvi8MCd8="; hash = "sha256-F4XxtSPAjNaShEL/l44jJK+JdOOkYI19X/njRB6FkNw=";
}; };
oneapi-openmp = fetchurl { oneapi-openmp = fetchurl {
url = "https://yum.repos.intel.com/oneapi/intel-oneapi-openmp-${mklVersion}-${mklVersion}-${openmpRel}.x86_64.rpm"; url = "https://yum.repos.intel.com/oneapi/intel-oneapi-openmp-${mklVersion}-${mklVersion}-${openmpRel}.x86_64.rpm";
hash = "sha256-grzVFWqt3Vpwb5K3Bur+sJz8pdKxZ4ISJXF5YAPrwmk="; hash = "sha256-1SlkI01DxFvwGPBJ73phs86ka0SmCrniwiXQ9DJwIXw=";
}; };
oneapi-tbb = fetchurl { oneapi-tbb = fetchurl {
url = "https://yum.repos.intel.com/oneapi/intel-oneapi-tbb-${tbbVersion}-${tbbVersion}-${tbbRel}.x86_64.rpm"; url = "https://yum.repos.intel.com/oneapi/intel-oneapi-tbb-${tbbVersion}-${tbbVersion}-${tbbRel}.x86_64.rpm";
hash = "sha256-8hIoRfV36XVElKCqP9UmCkjLCs3l0ZKCHxg+yxNIHc0="; hash = "sha256-wIktdf1p1SS1KrnUlc8LPkm0r9dhZE6cQNr4ZKTWI6A=";
}; };
in stdenvNoCC.mkDerivation ({ in stdenvNoCC.mkDerivation ({
@ -70,16 +68,22 @@ in stdenvNoCC.mkDerivation ({
dontUnpack = stdenvNoCC.isLinux; dontUnpack = stdenvNoCC.isLinux;
unpackPhase = if stdenvNoCC.isDarwin then ''
7zz x $src
'' else null;
nativeBuildInputs = [ validatePkgConfig ] ++ (if stdenvNoCC.isDarwin nativeBuildInputs = [ validatePkgConfig ] ++ (if stdenvNoCC.isDarwin
then then
[ undmg darwin.cctools ] [ _7zz darwin.cctools ]
else else
[ rpmextract ]); [ rpmextract ]);
buildPhase = if stdenvNoCC.isDarwin then '' buildPhase = if stdenvNoCC.isDarwin then ''
for f in Contents/Resources/pkg/*.tgz; do for f in bootstrapper.app/Contents/Resources/packages/*/cupPayload.cup; do
tar xzvf $f tar -xf $f
done done
mkdir -p opt/intel
mv _installdir opt/intel/oneapi
'' else '' '' else ''
rpmextract ${oneapi-mkl} rpmextract ${oneapi-mkl}
rpmextract ${oneapi-mkl-common} rpmextract ${oneapi-mkl-common}
@ -89,32 +93,7 @@ in stdenvNoCC.mkDerivation ({
rpmextract ${oneapi-tbb} rpmextract ${oneapi-tbb}
''; '';
installPhase = if stdenvNoCC.isDarwin then '' installPhase = ''
for f in $(find . -name 'mkl*.pc') ; do
bn=$(basename $f)
substituteInPlace $f \
--replace "prefix=<INSTALLDIR>/mkl" "prefix=$out" \
--replace $\{MKLROOT} "$out" \
--replace "lib/intel64_lin" "lib" \
--replace "lib/intel64" "lib"
done
for f in $(find opt/intel -name 'mkl*iomp.pc') ; do
substituteInPlace $f \
--replace "../compiler/lib" "lib"
done
mkdir -p $out/lib
cp -r compilers_and_libraries_${version}/mac/mkl/include $out/
cp -r compilers_and_libraries_${version}/licensing/mkl/en/license.txt $out/lib/
cp -r compilers_and_libraries_${version}/mac/compiler/lib/* $out/lib/
cp -r compilers_and_libraries_${version}/mac/mkl/lib/* $out/lib/
cp -r compilers_and_libraries_${version}/mac/tbb/lib/* $out/lib/
mkdir -p $out/lib/pkgconfig
cp -r compilers_and_libraries_${version}/mac/mkl/bin/pkgconfig/* $out/lib/pkgconfig
'' else ''
for f in $(find . -name 'mkl*.pc') ; do for f in $(find . -name 'mkl*.pc') ; do
bn=$(basename $f) bn=$(basename $f)
substituteInPlace $f \ substituteInPlace $f \
@ -133,9 +112,9 @@ in stdenvNoCC.mkDerivation ({
# Dynamic libraries # Dynamic libraries
mkdir -p $out/lib mkdir -p $out/lib
cp -a opt/intel/oneapi/mkl/${mklVersion}/lib/intel64/*.so* $out/lib cp -a opt/intel/oneapi/mkl/${mklVersion}/lib/${lib.optionalString stdenvNoCC.isLinux "intel64"}/*${shlibExt}* $out/lib
cp -a opt/intel/oneapi/compiler/${mklVersion}/linux/compiler/lib/intel64_lin/*.so* $out/lib cp -a opt/intel/oneapi/compiler/${mklVersion}/${if stdenvNoCC.isDarwin then "mac" else "linux"}/compiler/lib/${lib.optionalString stdenvNoCC.isLinux "intel64_lin"}/*${shlibExt}* $out/lib
cp -a opt/intel/oneapi/tbb/${tbbVersion}/lib/intel64/gcc4.8/*.so* $out/lib cp -a opt/intel/oneapi/tbb/${tbbVersion}/lib/${lib.optionalString stdenvNoCC.isLinux "intel64/gcc4.8"}/*${shlibExt}* $out/lib
# Headers # Headers
cp -r opt/intel/oneapi/mkl/${mklVersion}/include $out/ cp -r opt/intel/oneapi/mkl/${mklVersion}/include $out/
@ -144,10 +123,10 @@ in stdenvNoCC.mkDerivation ({
cp -r opt/intel/oneapi/mkl/${mklVersion}/lib/cmake $out/lib cp -r opt/intel/oneapi/mkl/${mklVersion}/lib/cmake $out/lib
'' + '' +
(if enableStatic then '' (if enableStatic then ''
install -Dm0644 -t $out/lib opt/intel/oneapi/mkl/${mklVersion}/lib/intel64/*.a install -Dm0644 -t $out/lib opt/intel/oneapi/mkl/${mklVersion}/lib/${lib.optionalString stdenvNoCC.isLinux "intel64"}/*.a
install -Dm0644 -t $out/lib/pkgconfig opt/intel/oneapi/mkl/${mklVersion}/tools/pkgconfig/*.pc install -Dm0644 -t $out/lib/pkgconfig opt/intel/oneapi/mkl/${mklVersion}/tools/pkgconfig/*.pc
'' else '' '' else ''
cp opt/intel/oneapi/mkl/${mklVersion}/lib/intel64/*.so* $out/lib cp opt/intel/oneapi/mkl/${mklVersion}/lib/${lib.optionalString stdenvNoCC.isLinux "intel64"}/*${shlibExt}* $out/lib
install -Dm0644 -t $out/lib/pkgconfig opt/intel/oneapi/mkl/${mklVersion}/lib/pkgconfig/*dynamic*.pc install -Dm0644 -t $out/lib/pkgconfig opt/intel/oneapi/mkl/${mklVersion}/lib/pkgconfig/*dynamic*.pc
'') + '' '') + ''
# Setup symlinks for blas / lapack # Setup symlinks for blas / lapack
@ -170,8 +149,8 @@ in stdenvNoCC.mkDerivation ({
install_name_tool -id $out/lib/$(basename $f) $f || true install_name_tool -id $out/lib/$(basename $f) $f || true
done done
install_name_tool -change @rpath/libiomp5.dylib $out/lib/libiomp5.dylib $out/lib/libmkl_intel_thread.dylib install_name_tool -change @rpath/libiomp5.dylib $out/lib/libiomp5.dylib $out/lib/libmkl_intel_thread.dylib
install_name_tool -change @rpath/libtbb.dylib $out/lib/libtbb.dylib $out/lib/libmkl_tbb_thread.dylib install_name_tool -change @rpath/libtbb.12.dylib $out/lib/libtbb.12.dylib $out/lib/libmkl_tbb_thread.dylib
install_name_tool -change @rpath/libtbbmalloc.dylib $out/lib/libtbbmalloc.dylib $out/lib/libtbbmalloc_proxy.dylib install_name_tool -change @rpath/libtbbmalloc.2.dylib $out/lib/libtbbmalloc.2.dylib $out/lib/libtbbmalloc_proxy.dylib
''; '';
# Per license agreement, do not modify the binary # Per license agreement, do not modify the binary
@ -201,7 +180,7 @@ in stdenvNoCC.mkDerivation ({
}; };
} // lib.optionalAttrs stdenvNoCC.isDarwin { } // lib.optionalAttrs stdenvNoCC.isDarwin {
src = fetchurl { src = fetchurl {
url = "http://registrationcenter-download.intel.com/akdlm/irc_nas/tec/15235/m_mkl_${version}.dmg"; url = "https://registrationcenter-download.intel.com/akdlm/IRC_NAS/087a9190-9d96-4b8c-bd2f-79159572ed89/m_onemkl_p_${mklVersion}.${rel}_offline.dmg";
sha256 = "14b3ciz7995sqcd6jz7hc8g2x4zwvqxmgxgni46vrlb7n523l62f"; hash = "sha256-bUaaJPSaLr60fw0DzDCjPvY/UucHlLbCSLyQxyiAi04=";
}; };
}) })

View file

@ -0,0 +1,41 @@
{ lib, stdenv, fetchFromGitHub, meson, ninja, wine, glslang }:
let
# these are both embedded in the output files
rev = "83308675078e9ea263fa8c37af95afdd15b3ab71";
# git describe --tags
shortRev = builtins.substring 0 8 rev;
realVersion = "v2.8-302-g${shortRev}";
in
stdenv.mkDerivation rec {
pname = "vkd3d-proton";
version = "unstable-2023-04-21";
nativeBuildInputs = [ meson ninja wine glslang ];
src = fetchFromGitHub {
owner = "HansKristian-Work";
repo = pname;
inherit rev;
sha256 = "sha256-iLpVvYmWhqy0rbbyJoT+kxzIqp68Vsb/TkihGtQQucU=";
fetchSubmodules = true;
};
prePatch = ''
substituteInPlace meson.build \
--replace "vkd3d_build = vcs_tag(" \
"vkd3d_build = vcs_tag( fallback : '${shortRev}'", \
--replace "vkd3d_version = vcs_tag(" \
"vkd3d_version = vcs_tag( fallback : '${realVersion}'",
'';
meta = with lib; {
homepage = "https://github.com/HansKristian-Work/vkd3d-proton";
description =
"A fork of VKD3D, which aims to implement the full Direct3D 12 API on top of Vulkan";
license = licenses.lgpl21;
maintainers = with maintainers; [ expipiplus1 ];
platforms = platforms.all;
};
}

View file

@ -0,0 +1,26 @@
{ lib, stdenv, fetchFromGitLab, autoreconfHook, pkg-config, wine, flex, bison
, vulkan-headers, spirv-headers, vulkan-loader }:
stdenv.mkDerivation rec {
pname = "vkd3d";
version = "1.7";
nativeBuildInputs = [ autoreconfHook pkg-config wine flex bison ];
buildInputs = [ vulkan-loader vulkan-headers spirv-headers ];
src = fetchFromGitLab {
domain = "gitlab.winehq.org";
owner = "wine";
repo = pname;
rev = "${pname}-${version}";
sha256 = "sha256-s5YNA+CjWoYk1tkBYYGfOsI2eXtXPtd1oHVeFFJIWn8=";
};
meta = with lib; {
homepage = "https://gitlab.winehq.org/wine/vkd3d";
description = "A 3D graphics library with an API very similar, but not identical, to Direct3D 12";
license = licenses.lgpl21;
maintainers = with maintainers; [ expipiplus1 ];
platforms = platforms.all;
};
}

View file

@ -14,6 +14,7 @@
, "@microsoft/rush" , "@microsoft/rush"
, "@nerdwallet/shepherd" , "@nerdwallet/shepherd"
, "@nestjs/cli" , "@nestjs/cli"
, "@shopify/cli"
, "@squoosh/cli" , "@squoosh/cli"
, "@tailwindcss/aspect-ratio" , "@tailwindcss/aspect-ratio"
, "@tailwindcss/forms" , "@tailwindcss/forms"

File diff suppressed because it is too large Load diff

View file

@ -2,14 +2,14 @@
let let
pname = "psysh"; pname = "psysh";
version = "0.11.10"; version = "0.11.16";
in in
mkDerivation { mkDerivation {
inherit pname version; inherit pname version;
src = fetchurl { src = fetchurl {
url = "https://github.com/bobthecow/psysh/releases/download/v${version}/psysh-v${version}.tar.gz"; url = "https://github.com/bobthecow/psysh/releases/download/v${version}/psysh-v${version}.tar.gz";
sha256 = "sha256-2U9HMA3OAA9Nl9JVJjepB2vi0O483xGpr8nQUGhOrpI="; sha256 = "sha256-4FEjMtp7MRTjpdb1ZpKqCa0erxrW90JyGy1ZmMBVdZE=";
}; };
dontUnpack = true; dontUnpack = true;

View file

@ -10,6 +10,12 @@ buildPythonPackage rec {
sha256 = "15ahl0irwwj558s964abdxg4vp6iwlabri7klsm2am6q5r0ngsky"; sha256 = "15ahl0irwwj558s964abdxg4vp6iwlabri7klsm2am6q5r0ngsky";
}; };
# setuptools.extern.packaging.version.InvalidVersion: Invalid version: '1.7.7-SNAPSHOT'
postPatch = ''
substituteInPlace setup.py \
--replace "1.7.7-SNAPSHOT" "1.7.7"
'';
doCheck = false; # No such file or directory: './run_tests.py doCheck = false; # No such file or directory: './run_tests.py
meta = with lib; { meta = with lib; {

View file

@ -12,7 +12,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "bthome-ble"; pname = "bthome-ble";
version = "2.9.0"; version = "2.10.1";
format = "pyproject"; format = "pyproject";
disabled = pythonOlder "3.9"; disabled = pythonOlder "3.9";
@ -21,7 +21,7 @@ buildPythonPackage rec {
owner = "Bluetooth-Devices"; owner = "Bluetooth-Devices";
repo = pname; repo = pname;
rev = "refs/tags/v${version}"; rev = "refs/tags/v${version}";
hash = "sha256-qVPlrj6EVTPJ/HiwynIg6iuJzUGb6Lan/QKC29C2YNk="; hash = "sha256-pwhq8MAy2FueddEZgAYgsDs7eCrK/bStUhNDhfa+zqk=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -3,24 +3,39 @@
, fetchFromGitHub , fetchFromGitHub
, mac_alias , mac_alias
, pytestCheckHook , pytestCheckHook
, pythonOlder
, setuptools
}: }:
buildPythonPackage rec { buildPythonPackage rec {
pname = "ds_store"; pname = "ds-store";
version = "1.3.0"; version = "1.3.1";
format = "pyproject";
disabled = pythonOlder "3.7";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "al45tair"; owner = "al45tair";
repo = pname; repo = "ds_store";
rev = "v${version}"; rev = "refs/tags/v${version}";
sha256 = "1zmhnz110dvisydp5h6s0ry2v9qf4rgr60xhhlak0c66zpvlkkl0"; hash = "sha256-45lmkE61uXVCBUMyVVzowTJoALY1m9JI68s7Yb0vCks=";
}; };
propagatedBuildInputs = [ mac_alias ]; nativeBuildInputs = [
setuptools
];
nativeCheckInputs = [ pytestCheckHook ]; propagatedBuildInputs = [
mac_alias
];
pythonImportsCheck = [ "ds_store" ]; nativeCheckInputs = [
pytestCheckHook
];
pythonImportsCheck = [
"ds_store"
];
meta = with lib; { meta = with lib; {
homepage = "https://github.com/al45tair/ds_store"; homepage = "https://github.com/al45tair/ds_store";

View file

@ -11,7 +11,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "dtschema"; pname = "dtschema";
version = "2022.12"; version = "2023.04";
format = "setuptools"; format = "setuptools";
disabled = pythonOlder "3.7"; disabled = pythonOlder "3.7";
@ -20,7 +20,7 @@ buildPythonPackage rec {
owner = "devicetree-org"; owner = "devicetree-org";
repo = "dt-schema"; repo = "dt-schema";
rev = "refs/tags/v${version}"; rev = "refs/tags/v${version}";
sha256 = "sha256-+wF6WdonZrkZEnlq/P6QeT3X7CMinxbapLa7q0t2zUc="; sha256 = "sha256-w9TsRdiDTdExft7rdb2hYcvxP6hxOFZKI3hITiNSwgw=";
}; };
patches = [ patches = [

View file

@ -15,7 +15,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "env-canada"; pname = "env-canada";
version = "0.5.33"; version = "0.5.34";
format = "setuptools"; format = "setuptools";
disabled = pythonOlder "3.8"; disabled = pythonOlder "3.8";
@ -24,7 +24,7 @@ buildPythonPackage rec {
owner = "michaeldavie"; owner = "michaeldavie";
repo = "env_canada"; repo = "env_canada";
rev = "refs/tags/v${version}"; rev = "refs/tags/v${version}";
hash = "sha256-td4baHAtBuNqUpe11HBtsMl6fW9n5w12U+KUUc1SmIQ="; hash = "sha256-gnNncWhrqGTWq8cNVmNMzkgqW0hoglzVGrLjqyUvOIc=";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [

View file

@ -16,7 +16,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "hahomematic"; pname = "hahomematic";
version = "2023.4.4"; version = "2023.4.5";
format = "pyproject"; format = "pyproject";
disabled = pythonOlder "3.9"; disabled = pythonOlder "3.9";
@ -25,7 +25,7 @@ buildPythonPackage rec {
owner = "danielperna84"; owner = "danielperna84";
repo = pname; repo = pname;
rev = "refs/tags/${version}"; rev = "refs/tags/${version}";
hash = "sha256-5wUx0S3Wg30Kn6RAkybAOMQqRvVDt9HeIJyTPCVHqRc="; hash = "sha256-svXjBWiybJk3RzQtWGzFsvWJX0imhqQmPk9UmdeoIuY=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -7,14 +7,14 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "phonenumbers"; pname = "phonenumbers";
version = "8.13.8"; version = "8.13.11";
format = "setuptools"; format = "setuptools";
disabled = pythonOlder "3.7"; disabled = pythonOlder "3.7";
src = fetchPypi { src = fetchPypi {
inherit pname version; inherit pname version;
hash = "sha256-S6kqkX+49uP+M/0EudhCmYUs4jcokSnuTtpHoEOlxsQ="; hash = "sha256-PjJ02IyrNgm1X/W5NBcHXbyi0TBk8QP79WLg6h3aD5o=";
}; };
nativeCheckInputs = [ nativeCheckInputs = [

View file

@ -11,7 +11,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "py-synologydsm-api"; pname = "py-synologydsm-api";
version = "2.2.0"; version = "2.3.0";
format = "pyproject"; format = "pyproject";
disabled = pythonOlder "3.8"; disabled = pythonOlder "3.8";
@ -20,7 +20,7 @@ buildPythonPackage rec {
owner = "mib1185"; owner = "mib1185";
repo = "py-synologydsm-api"; repo = "py-synologydsm-api";
rev = "refs/tags/v${version}"; rev = "refs/tags/v${version}";
hash = "sha256-L+i6PpN+3CgPp1X/EUQTXz1IUW3S0BJuuPPT4LKBtWs="; hash = "sha256-lSNdwM+b91XWILKjGsi73Tu29spOdnFznuE7ELg+mhw=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -1,5 +1,6 @@
{ lib, stdenv { lib, stdenv
, fetchFromGitHub , fetchFromGitHub
, fetchpatch
, buildPythonPackage , buildPythonPackage
, isPyPy , isPyPy
, pkgs , pkgs
@ -32,6 +33,14 @@ buildPythonPackage rec {
patches = [ patches = [
./fix-test-pythonpath.patch ./fix-test-pythonpath.patch
(fetchpatch {
url = "https://github.com/dcantrell/pyparted/commit/07ba882d04fa2099b53d41370416b97957d2abcb.patch";
hash = "sha256-yYfLdy+TOKfN3gtTMgOWPebPTRYyaOYh/yFTowCbdjg=";
})
(fetchpatch {
url = "https://github.com/dcantrell/pyparted/commit/a01b4eeecf63b0580c192c7c2db7a5c406a7ad6d.patch";
hash = "sha256-M/8hYiKUBzaTOxPYDFK5BAvCm6WJGx+693qwj3HzdRA=";
})
]; ];
preConfigure = '' preConfigure = ''

View file

@ -83,6 +83,7 @@ buildPythonPackage rec {
-e test_finite_diff_uks_eph \ -e test_finite_diff_uks_eph \
-e test_pipek \ -e test_pipek \
-e test_n3_cis_ewald \ -e test_n3_cis_ewald \
-e test_veff \
-I test_kuccsd_supercell_vs_kpts\.py \ -I test_kuccsd_supercell_vs_kpts\.py \
-I test_kccsd_ghf\.py \ -I test_kccsd_ghf\.py \
-I test_h_.*\.py \ -I test_h_.*\.py \

View file

@ -20,7 +20,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "pytenable"; pname = "pytenable";
version = "1.4.12"; version = "1.4.13";
format = "setuptools"; format = "setuptools";
disabled = pythonOlder "3.7"; disabled = pythonOlder "3.7";
@ -29,7 +29,7 @@ buildPythonPackage rec {
owner = "tenable"; owner = "tenable";
repo = "pyTenable"; repo = "pyTenable";
rev = "refs/tags/${version}"; rev = "refs/tags/${version}";
hash = "sha256-vuwD9NVomxwG1IQioy6TzEHnibCdpg+VyCXjnjnmw54="; hash = "sha256-UY3AFnPplmU0jrV4LIKH4+2tcJEFkKMqO2GWVkgaHYE=";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [

View file

@ -0,0 +1,45 @@
{ lib
, pythonOlder
, buildPythonPackage
, fetchPypi
, ruff
, lsprotocol
, python-lsp-server
, tomli
}:
buildPythonPackage rec {
pname = "python-lsp-ruff";
version = "1.4.0";
format = "pyproject";
disabled = pythonOlder "3.7";
src = fetchPypi {
inherit version;
pname = "python-lsp-ruff";
sha256 = "sha256-TqTeQc/lT5DcPcJbZXbEiUGbYjFP8idpzdSZlXD59Y4=";
};
postPatch = ''
# ruff binary is used directly, the ruff python package is not needed
sed -i '/"ruff>=/d' pyproject.toml
sed -i 's|sys.executable, "-m", "ruff"|"${ruff}/bin/ruff"|' pylsp_ruff/plugin.py
'';
propagatedBuildInputs = [
lsprotocol
python-lsp-server
] ++ lib.optionals (pythonOlder "3.11") [
tomli
];
doCheck = true;
meta = with lib; {
homepage = "https://github.com/python-lsp/python-lsp-ruff";
description = "Ruff linting plugin for pylsp";
changelog = "https://github.com/python-lsp/python-lsp-ruff/releases/tag/v${version}";
license = licenses.mit;
maintainers = with maintainers; [ linsui ];
};
}

View file

@ -15,11 +15,11 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "skl2onnx"; pname = "skl2onnx";
version = "1.13"; version = "1.14.0";
src = fetchPypi { src = fetchPypi {
inherit pname version; inherit pname version;
hash = "sha256-XzUva5uFX/rGMFpwfwLH1Db0Nok47pBJCSqVo1ZcJz0="; hash = "sha256-gF+XOgAILSlM+hU1s3Xz+zD7nPtwW9a0mOHp8rxthnY=";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [

View file

@ -0,0 +1,47 @@
{ lib
, aiohttp
, async-timeout
, buildPythonPackage
, fetchFromGitHub
, pythonOlder
, setuptools
}:
buildPythonPackage rec {
pname = "sonos-websocket";
version = "0.1.0";
format = "pyproject";
disabled = pythonOlder "3.7";
src = fetchFromGitHub {
owner = "jjlawren";
repo = "sonos-websocket";
rev = "refs/tags/${version}";
hash = "sha256-Pb+L+823Clka0IjVMVEx4A0tJsI1IUhrFbx5Jy+xkgg=";
};
nativeBuildInputs = [
setuptools
];
propagatedBuildInputs = [
aiohttp
async-timeout
];
# Module has no tests
doCheck = false;
pythonImportsCheck = [
"sonos_websocket"
];
meta = with lib; {
description = "Library to communicate with Sonos devices over websockets";
homepage = "https://github.com/jjlawren/sonos-websocket";
changelog = "https://github.com/jjlawren/sonos-websocket/releases/tag/${version}";
license = with licenses; [ mit ];
maintainers = with maintainers; [ fab ];
};
}

View file

@ -6,14 +6,14 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "sphinx-inline-tabs"; pname = "sphinx-inline-tabs";
version = "2022.01.02.beta11"; version = "2023.04.21";
format = "flit"; format = "flit";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "pradyunsg"; owner = "pradyunsg";
repo = "sphinx-inline-tabs"; repo = "sphinx-inline-tabs";
rev = version; rev = version;
hash = "sha256-k2nOidUk87EZbFsqQ7zr/4eHk+T7wUOYimjbllfneUM="; hash = "sha256-1oZheHDNOQU0vWL3YClQrJe94WyUJ72bCAF1UKtjJ0w=";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [

View file

@ -34,13 +34,13 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "spsdk"; pname = "spsdk";
version = "1.9.0"; version = "1.10.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "NXPmicro"; owner = "NXPmicro";
repo = pname; repo = pname;
rev = "refs/tags/${version}"; rev = "refs/tags/${version}";
hash = "sha256-UBiylZB6/0n1FQMMg0coXkYh9S6gLz2LaoKk2HoWu7c="; hash = "sha256-KJUtAWENS3+VAs3Iai1aKYzMYtfetMeI0MHeQ6NraNY=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -14,14 +14,14 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "tldextract"; pname = "tldextract";
version = "3.4.0"; version = "3.4.1";
format = "setuptools"; format = "setuptools";
disabled = pythonOlder "3.7"; disabled = pythonOlder "3.7";
src = fetchPypi { src = fetchPypi {
inherit pname version; inherit pname version;
hash = "sha256-eK7xOsFFnVGbRXoD8fdMG/HCgIEiprzA5oQPgbpVrXM="; hash = "sha256-+p5QxKA77eKh2V3KYg1mFnhIRiaFjM84jPlnGg3Ul6Q=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -10,14 +10,14 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "yamllint"; pname = "yamllint";
version = "1.29.0"; version = "1.31.0";
format = "setuptools"; format = "setuptools";
disabled = pythonOlder "3.7"; disabled = pythonOlder "3.7";
src = fetchPypi { src = fetchPypi {
inherit pname version; inherit pname version;
hash = "sha256-ZqdV1fvLuIMfGpVoZ2MptbrILDeZW8ya/QSLZFn5+kg="; hash = "sha256-LYPx0S9zPhYqh+BrF2FJ17ucW65Knl/OHHcdf3A/emU=";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [

View file

@ -15,7 +15,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "zeroconf"; pname = "zeroconf";
version = "0.58.0"; version = "0.58.2";
format = "pyproject"; format = "pyproject";
disabled = pythonOlder "3.7"; disabled = pythonOlder "3.7";
@ -24,7 +24,7 @@ buildPythonPackage rec {
owner = "jstasiak"; owner = "jstasiak";
repo = "python-zeroconf"; repo = "python-zeroconf";
rev = "refs/tags/${version}"; rev = "refs/tags/${version}";
hash = "sha256-yUf5X124jtUip5hGbZrdbSQzO8WJp9BJ96/QtdMBFvM="; hash = "sha256-phwGnAosPuH9zj3lS8o78bQohGAllICpbn1cNgRmh0Y=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -2,13 +2,13 @@
buildGoModule rec { buildGoModule rec {
pname = "algolia-cli"; pname = "algolia-cli";
version = "1.3.5"; version = "1.3.6";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "algolia"; owner = "algolia";
repo = "cli"; repo = "cli";
rev = "v${version}"; rev = "v${version}";
hash = "sha256-tz05j2XkA3Dh1RlQf8KHuPSqGhbFc0fxSe0LC2d5FYU="; hash = "sha256-SNQhDmiRz0J3MlJbYUAQgiXeLv3oZVAMnavkAeRrnEA=";
}; };
vendorHash = "sha256-QgNL7pp0KH1RUV69BFVtHpaLHrPp4UQhEtOEiRmfAi0="; vendorHash = "sha256-QgNL7pp0KH1RUV69BFVtHpaLHrPp4UQhEtOEiRmfAi0=";

View file

@ -22,14 +22,14 @@ with py.pkgs;
buildPythonApplication rec { buildPythonApplication rec {
pname = "checkov"; pname = "checkov";
version = "2.3.202"; version = "2.3.205";
format = "setuptools"; format = "setuptools";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "bridgecrewio"; owner = "bridgecrewio";
repo = pname; repo = pname;
rev = "refs/tags/${version}"; rev = "refs/tags/${version}";
hash = "sha256-cJGHby6g4ndz031vxLFmQ9yUAB6lsyGff3eM8vjxUbc="; hash = "sha256-vs7gUYIw7n6PO5hjHFFtfM3gxjUxlmSOEJr8uJmeI6g=";
}; };
patches = [ patches = [
@ -116,7 +116,7 @@ buildPythonApplication rec {
# Tests are comparing console output # Tests are comparing console output
"cli" "cli"
"console" "console"
# Starting to fail after 2.3.202 # Starting to fail after 2.3.205
"test_non_multiline_pair" "test_non_multiline_pair"
]; ];

View file

@ -2,13 +2,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "flow"; pname = "flow";
version = "0.204.0"; version = "0.205.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "facebook"; owner = "facebook";
repo = "flow"; repo = "flow";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-263ZbEDGiZI/2dSLxs966+wtSHG2QMnTtzJ7hPQ4Ix8="; sha256 = "sha256-+F0NmE9BN8eSmyLnXkgdYy3qdyBvKfRM+hVgYmLvzOg=";
}; };
postPatch = '' postPatch = ''

View file

@ -1,5 +1,6 @@
{ lib, stdenv, fetchFromGitHub, fetchpatch { lib, stdenv, fetchFromGitHub, fetchpatch
, cmake, libpfm, zlib, pkg-config, python3Packages, which, procps, gdb, capnproto , cmake, pkg-config, which, makeWrapper
, libpfm, zlib, python3Packages, procps, gdb, capnproto
}: }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
@ -38,11 +39,11 @@ stdenv.mkDerivation rec {
# See also https://github.com/NixOS/nixpkgs/pull/110846 # See also https://github.com/NixOS/nixpkgs/pull/110846
preConfigure = ''substituteInPlace CMakeLists.txt --replace "-flto" ""''; preConfigure = ''substituteInPlace CMakeLists.txt --replace "-flto" ""'';
nativeBuildInputs = [ cmake pkg-config which ]; nativeBuildInputs = [ cmake pkg-config which makeWrapper ];
buildInputs = [ buildInputs = [
libpfm zlib python3Packages.python python3Packages.pexpect procps gdb capnproto libpfm zlib python3Packages.python python3Packages.pexpect procps gdb capnproto
libpfm zlib python3Packages.python python3Packages.pexpect procps capnproto
]; ];
propagatedBuildInputs = [ gdb ]; # needs GDB to replay programs at runtime
cmakeFlags = [ cmakeFlags = [
"-Ddisable32bit=ON" "-Ddisable32bit=ON"
]; ];
@ -57,6 +58,14 @@ stdenv.mkDerivation rec {
preCheck = "export HOME=$TMPDIR"; preCheck = "export HOME=$TMPDIR";
# needs GDB to replay programs at runtime
preFixup = ''
wrapProgram "$out/bin/rr" \
--prefix PATH ":" "${lib.makeBinPath [
gdb
]}";
'';
meta = { meta = {
homepage = "https://rr-project.org/"; homepage = "https://rr-project.org/";
description = "Records nondeterministic executions and debugs them deterministically"; description = "Records nondeterministic executions and debugs them deterministically";

View file

@ -16,14 +16,14 @@
buildPythonApplication rec { buildPythonApplication rec {
pname = "cvise"; pname = "cvise";
version = "2.7.0"; version = "2.8.0";
format = "other"; format = "other";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "marxin"; owner = "marxin";
repo = "cvise"; repo = "cvise";
rev = "refs/tags/v${version}"; rev = "refs/tags/v${version}";
sha256 = "sha256-j4s1xH0vO+/NNafQf1Jei7fgebSQ53WJKA+kYxuG2zQ="; hash = "sha256-9HFCFgpRXqefFJLulwvi6nx0fl0G6IXI9gSinekJXRU=";
}; };
patches = [ patches = [

View file

@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec { rustPlatform.buildRustPackage rec {
pname = "grcov"; pname = "grcov";
version = "0.8.13"; version = "0.8.18";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "mozilla"; owner = "mozilla";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-fyITsOlkBY1f9AjQqUII7G1Onm0i0FIqNspPi8J+eOM="; sha256 = "sha256-IC5ROi4kwZLCX7/kFb7VgOzQtsj74hujQ5IrrFneFTA=";
}; };
cargoSha256 = "sha256-qbxJJGwJ7hRNIujud10AYnM2NaNwjBB5zhOxXp/5z/k="; cargoHash = "sha256-DcPidu3WFyVWBS4EVavxFhy9wwqP4rGmaALKnfxua2E=";
# tests do not find grcov path correctly # tests do not find grcov path correctly
checkFlags = let checkFlags = let

View file

@ -6,16 +6,16 @@
buildGoModule rec { buildGoModule rec {
pname = "oh-my-posh"; pname = "oh-my-posh";
version = "14.27.0"; version = "15.4.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "jandedobbeleer"; owner = "jandedobbeleer";
repo = pname; repo = pname;
rev = "refs/tags/v${version}"; rev = "refs/tags/v${version}";
hash = "sha256-aOUhKETwrPJWPvxkuLdpmSbD38RxMeQywmKq6j617Dk="; hash = "sha256-xrSMR16KvS97/pfQPwOfETvVvTxqZMdNR7xG9QxuelA=";
}; };
vendorHash = "sha256-MM6WwEs2BMkfpTsDFIqwpIROMs8zbbT5OsP6FXwRvy8="; vendorHash = "sha256-4exLY24baDjgGIDS1P7BIK38O4b+KeqNTMzA6wap05k=";
sourceRoot = "source/src"; sourceRoot = "source/src";

View file

@ -2,16 +2,16 @@
buildGoModule rec { buildGoModule rec {
pname = "protoc-gen-entgrpc"; pname = "protoc-gen-entgrpc";
version = "0.3.0"; version = "0.4.3";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "ent"; owner = "ent";
repo = "contrib"; repo = "contrib";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-hK4I2LVvw7hkbUKRuDoaRuNX3nwlwipYucnXwzOCcXs="; sha256 = "sha256-5gFdfMSAb0DWCMCzG0nVGU+VWam6yC26QYUPF1YjekM=";
}; };
vendorSha256 = "sha256-bAM+NxD7mNd2fFxRDHCAzJTD7PVfT/9XHF88v9RHKwE="; vendorHash = "sha256-DgqCGXqEnLBxyLZJrTRZIeBIrHYA7TNMV4WTk/3IS8Y=";
subPackages = [ "entproto/cmd/protoc-gen-entgrpc" ]; subPackages = [ "entproto/cmd/protoc-gen-entgrpc" ];

View file

@ -6,13 +6,13 @@
rustPlatform.buildRustPackage rec { rustPlatform.buildRustPackage rec {
pname = "cargo-llvm-cov"; pname = "cargo-llvm-cov";
version = "0.5.17"; version = "0.5.19";
src = fetchCrate { src = fetchCrate {
inherit pname version; inherit pname version;
sha256 = "sha256-kU8Wq0BRE/Tajmi/PV6dja9HJy0lbZwzGuMIXDnFUw0="; sha256 = "sha256-5xHDjNFQDmi+SnhxfoCxoBdCqHpZEk/87r2sBKsT+W4=";
}; };
cargoSha256 = "sha256-Zv6CkUhMTMqGM8PH+ciDV20vq88tU5THSw0NByO1v70="; cargoSha256 = "sha256-0fj5GJ/gjVBAdfYPHnT33kbnXBIE5+VRONcNBgBSoPc=";
# skip tests which require llvm-tools-preview # skip tests which require llvm-tools-preview
checkFlags = [ checkFlags = [

View file

@ -2,11 +2,11 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "trunk-io"; pname = "trunk-io";
version = "1.2.3"; version = "1.2.4";
src = fetchurl { src = fetchurl {
url = "https://trunk.io/releases/launcher/${version}/trunk"; url = "https://trunk.io/releases/launcher/${version}/trunk";
hash = "sha256-arWege61fb7NiYSIL3ZaDQr75QEbDDJ7rVgdRUKqP4A="; hash = "sha256-ylQ4tcPVO367PtLtBkw+MKxoIY7b14Gse3IxnIxMtqc=";
}; };
dontUnpack = true; dontUnpack = true;

View file

@ -25,11 +25,11 @@ let
in in
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "unciv"; pname = "unciv";
version = "4.6.5"; version = "4.6.7";
src = fetchurl { src = fetchurl {
url = "https://github.com/yairm210/Unciv/releases/download/${version}/Unciv.jar"; url = "https://github.com/yairm210/Unciv/releases/download/${version}/Unciv.jar";
hash = "sha256-+PXRNVLGCJmxIZSwuuRA4f1v0AxxPYesxby/wEOWR8Q="; hash = "sha256-aaCGo/vogi5HV0hM0Lz4Gw/IRbLp5U7eqAhfL7ztDos=";
}; };
dontUnpack = true; dontUnpack = true;

View file

@ -5,13 +5,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "wesnoth"; pname = "wesnoth";
version = "1.16.8"; version = "1.16.9";
src = fetchFromGitHub { src = fetchFromGitHub {
rev = version; rev = version;
owner = "wesnoth"; owner = "wesnoth";
repo = "wesnoth"; repo = "wesnoth";
hash = "sha256-P7OUiKJxJZ0rGdesnxpQMbRBgCHsLpyt8+pRDh27JYQ="; hash = "sha256-KtAPc2nsqSoHNsLTLom/yaUECn+IWBdBFpiMclrUHxM=";
}; };
nativeBuildInputs = [ cmake pkg-config ]; nativeBuildInputs = [ cmake pkg-config ];

View file

@ -1,49 +1,74 @@
{ lib { lib
, stdenvNoCC , stdenvNoCC
, fetchurl , fetchFromGitHub
, autoPatchelfHook , dart
, buf
, callPackage
, runtimeShell
}: }:
stdenvNoCC.mkDerivation rec { let
embedded-protocol = fetchFromGitHub {
owner = "sass";
repo = "embedded-protocol";
rev = "refs/tags/1.2.0";
hash = "sha256-OHOWotI+cXjDhEYUNXa36FpMEW7hSIu8gVX3gVRvw2Y=";
};
libExt = stdenvNoCC.hostPlatform.extensions.sharedLibrary;
in
stdenvNoCC.mkDerivation (finalAttrs: {
pname = "dart-sass-embedded"; pname = "dart-sass-embedded";
version = "1.62.1"; version = "1.62.1";
dontConfigure = true; src = fetchFromGitHub {
dontBuild = true; owner = "sass";
repo = "dart-sass-embedded";
rev = "refs/tags/${finalAttrs.version}";
hash = "sha256-GpSus5/QItbzCrOImMvrO6DTAQeODABRNiSYHJlLlIA=";
};
nativeBuildInputs = lib.optional stdenvNoCC.hostPlatform.isLinux autoPatchelfHook; nativeBuildInputs = [
buf
dart
(callPackage ../../build-support/dart/fetch-dart-deps { } {
buildDrvArgs = finalAttrs;
vendorHash = "sha256-aEBE+z8M5ivMR9zL7kleBJ8c9T+4PGXoec56iwHVT+c=";
})
];
src = let base = "https://github.com/sass/dart-sass-embedded/releases/download/${version}/sass_embedded-${version}"; in strictDeps = true;
fetchurl {
"x86_64-linux" = { configurePhase = ''
url = "${base}-linux-x64.tar.gz"; runHook preConfigure
hash = "sha256-NXTadacyKlOQNGSLj/hP8syhYuuSTXK2Y9cYzTk28HU="; dart pub get --offline
}; mkdir build
"aarch64-linux" = { ln -s ${embedded-protocol} build/embedded-protocol
url = "${base}-linux-arm64.tar.gz"; runHook postConfigure
hash = "sha256-DX29U1AjmqVhKFgzP+71vsdoMjQ13IS93PZ1JLOA7bA="; '';
};
"x86_64-darwin" = { buildPhase = ''
url = "${base}-macos-x64.tar.gz"; runHook preBuild
hash = "sha256-0oyb9YBKoPNaWFLbIUZOJc5yK11uDYyAKKW4urkmRJQ="; UPDATE_SASS_PROTOCOL=false HOME="$TMPDIR" dart run grinder protobuf
}; dart run grinder pkg-compile-native
"aarch64-darwin" = { runHook postBuild
url = "${base}-macos-arm64.tar.gz"; '';
hash = "sha256-dkBcdVbxolK8xXYaOHot0s9FxGmfhMNAEoZqo+2LRfk=";
};
}."${stdenvNoCC.hostPlatform.system}" or (throw "Unsupported system ${stdenvNoCC.hostPlatform.system}");
installPhase = '' installPhase = ''
mkdir -p $out/bin runHook preInstall
cp -r * $out mkdir -p "$out/lib" "$out/bin"
ln -s $out/dart-sass-embedded $out/bin/dart-sass-embedded cp build/dart-sass-embedded.native "$out/lib/dart-sass-embedded${libExt}"
echo '#!${runtimeShell}' > "$out/bin/dart-sass-embedded"
echo "exec ${dart}/bin/dartaotruntime $out/lib/dart-sass-embedded${libExt} \"\$@\"" >> "$out/bin/dart-sass-embedded"
chmod +x "$out/bin/dart-sass-embedded"
runHook postInstall
''; '';
meta = with lib; { meta = with lib; {
description = "A wrapper for Dart Sass that implements the compiler side of the Embedded Sass protocol"; description = "A wrapper for Dart Sass that implements the compiler side of the Embedded Sass protocol";
homepage = "https://github.com/sass/dart-sass-embedded"; homepage = "https://github.com/sass/dart-sass-embedded";
changelog = "https://github.com/sass/dart-sass-embedded/blob/${version}/CHANGELOG.md"; changelog = "https://github.com/sass/dart-sass-embedded/blob/${finalAttrs.version}/CHANGELOG.md";
license = licenses.mit; license = licenses.mit;
maintainers = with maintainers; [ shyim ]; maintainers = with maintainers; [ shyim ];
}; };
} })

View file

@ -421,13 +421,6 @@ in {
ubootQemuRiscv64Smode = buildUBoot { ubootQemuRiscv64Smode = buildUBoot {
defconfig = "qemu-riscv64_smode_defconfig"; defconfig = "qemu-riscv64_smode_defconfig";
extraPatches = [
# https://patchwork.ozlabs.org/project/uboot/patch/20220128134713.2322800-1-alexandre.ghiti@canonical.com/
(fetchpatch {
url = "https://patchwork.ozlabs.org/series/283391/mbox/";
sha256 = "sha256-V0jDpx6O4bFzuaOQejdrRnLiWb5LBTx47T0TZqNtMXk=";
})
];
extraMeta.platforms = ["riscv64-linux"]; extraMeta.platforms = ["riscv64-linux"];
filesToInstall = ["u-boot.bin"]; filesToInstall = ["u-boot.bin"];
}; };

View file

@ -1,31 +1,23 @@
{ lib, stdenv, fetchFromGitHub }: { lib, stdenv, fetchFromGitHub }:
stdenv.mkDerivation { stdenv.mkDerivation rec {
pname = "can-utils"; pname = "can-utils";
# There are no releases (source archives or git tags), so use the date of the version = "2023.03";
# latest commit in git master as version number.
version = "20170830";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "linux-can"; owner = "linux-can";
repo = "can-utils"; repo = "can-utils";
rev = "5b518a0a5fa56856f804372a6b99b518dedb5386"; rev = "v${version}";
sha256 = "1ygzp8rjr8f1gs48mb1pz7psdgbfhlvr6kjdnmzbsqcml06zvrpr"; hash = "sha256-FaopviBJOmO0lXoJcdKNdtsoaJ8JrFEJGyO1aNBv+Pg=";
}; };
# Fixup build with newer Linux headers. makeFlags = [ "PREFIX=$(out)" ];
postPatch = ''
sed '1i#include <linux/sockios.h>' -i \
slcanpty.c cansniffer.c canlogserver.c isotpdump.c isotpsniffer.c isotpperf.c
'';
preConfigure = ''makeFlagsArray+=(PREFIX="$out")'';
meta = with lib; { meta = with lib; {
description = "CAN userspace utilities and tools (for use with Linux SocketCAN)"; description = "CAN userspace utilities and tools (for use with Linux SocketCAN)";
homepage = "https://github.com/linux-can/can-utils"; homepage = "https://github.com/linux-can/can-utils";
license = licenses.gpl2Plus; license = licenses.gpl2Plus;
platforms = platforms.linux; platforms = platforms.linux;
maintainers = [ maintainers.bjornfor ]; maintainers = with maintainers; [ bjornfor Luflosi ];
}; };
} }

View file

@ -2,13 +2,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "pscircle"; pname = "pscircle";
version = "1.3.1"; version = "1.4.0";
src = fetchFromGitLab { src = fetchFromGitLab {
owner = "mildlyparallel"; owner = "mildlyparallel";
repo = "pscircle"; repo = "pscircle";
rev = "v${version}"; rev = "v${version}";
sha256 = "1sm99423hh90kr4wdjqi9sdrrpk65j2vz2hzj65zcxfxyr6khjci"; sha256 = "sha256-bqbQBNscNfoqXprhoFUnUQO88YQs9xDhD4d3KHamtG0=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -140,6 +140,7 @@ assert withImportd -> withCompression;
assert withCoredump -> withCompression; assert withCoredump -> withCompression;
assert withHomed -> withCryptsetup; assert withHomed -> withCryptsetup;
assert withHomed -> withPam; assert withHomed -> withPam;
assert withUkify -> withEfi;
let let
wantCurl = withRemote || withImportd; wantCurl = withRemote || withImportd;

View file

@ -1,25 +0,0 @@
From bf1f143455d1c8283d90964e0121b50c14a67bda Mon Sep 17 00:00:00 2001
From: Lana Black <lana@illuminati.industries>
Date: Sat, 11 Feb 2023 11:53:21 +0000
Subject: [PATCH] Fix test.
---
tests/tests.bats | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tests/tests.bats b/tests/tests.bats
index c542b7a..98520ee 100644
--- a/tests/tests.bats
+++ b/tests/tests.bats
@@ -196,7 +196,7 @@ xen_expect_abort() {
run test_hello/test_hello.hvt
case "${CONFIG_HOST}" in
Linux)
- [ "$status" -eq 127 ] && [[ "$output" == *"No such file or directory"* ]]
+ [ "$status" -eq 127 ] && ([[ "$output" == *"No such file or directory"* ]] || [[ "$output" == *"required file not found"* ]])
;;
FreeBSD)
# XXX: imgact_elf.c:load_interp() outputs the "ELF interpreter ... not
--
2.39.0

View file

@ -2,7 +2,7 @@
, pkg-config, qemu, syslinux, util-linux }: , pkg-config, qemu, syslinux, util-linux }:
let let
version = "0.7.5"; version = "0.8.0";
# list of all theoretically available targets # list of all theoretically available targets
targets = [ targets = [
"genode" "genode"
@ -21,11 +21,9 @@ in stdenv.mkDerivation {
src = fetchurl { src = fetchurl {
url = "https://github.com/Solo5/solo5/releases/download/v${version}/solo5-v${version}.tar.gz"; url = "https://github.com/Solo5/solo5/releases/download/v${version}/solo5-v${version}.tar.gz";
sha256 = "sha256-viwrS9lnaU8sTGuzK/+L/PlMM/xRRtgVuK5pixVeDEw="; sha256 = "sha256-t80VOZ8Tr1Dq+mJfRPVLGqYprCaqegcQtDqdoHaSXW0=";
}; };
patches = [ ./0001-Fix-test.patch ];
hardeningEnable = [ "pie" ]; hardeningEnable = [ "pie" ];
configurePhase = '' configurePhase = ''

View file

@ -32,13 +32,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "frr"; pname = "frr";
version = "8.5"; version = "8.5.1";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "FRRouting"; owner = "FRRouting";
repo = pname; repo = pname;
rev = "${pname}-${version}"; rev = "${pname}-${version}";
hash = "sha256-v3mmTkNQQLUmnkgcEV/hYLtc4FbhDFz/SW67w7C/zZA="; hash = "sha256-dK6eVYj9OIVChnR90FDTB7ow93nLLNRaOG8YEXxh8UQ=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View file

@ -13,11 +13,11 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "keycloak"; pname = "keycloak";
version = "20.0.3"; version = "20.0.5";
src = fetchzip { src = fetchzip {
url = "https://github.com/keycloak/keycloak/releases/download/${version}/keycloak-${version}.zip"; url = "https://github.com/keycloak/keycloak/releases/download/${version}/keycloak-${version}.zip";
sha256 = "sha256-dDB3jG3k3ZkAzsG4p3VHpMBM8nxvxQ2sxGeRXWI1Wm0="; hash = "sha256-4h3q9J1+KufMaSuzbX9qaBwXPR8zhVpxQAXDBY3uPjM=";
}; };
nativeBuildInputs = [ makeWrapper jre ]; nativeBuildInputs = [ makeWrapper jre ];

View file

@ -2,16 +2,16 @@
buildGoModule rec { buildGoModule rec {
pname = "prometheus-nats-exporter"; pname = "prometheus-nats-exporter";
version = "0.10.1"; version = "0.11.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "nats-io"; owner = "nats-io";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-+qMhHmsvlUWjDhmSXv2TytuOPmJcXdSGBd7c5PdE9xI="; sha256 = "sha256-v8Afdz1X1s5P/soXB+9M4C01HbvPNlEXo7Hdf1o9NdM=";
}; };
vendorSha256 = "sha256-hlC/s0pYhNHMv3i7Nmu4r6jnXGpc6raScv5dO32+tfQ="; vendorHash = "sha256-YpiwRkujjuqfNH1Mmv6mtm6nNXx6kp272+6fzsK97xw=";
preCheck = '' preCheck = ''
# Fix `insecure algorithm SHA1-RSA` problem # Fix `insecure algorithm SHA1-RSA` problem

View file

@ -2,7 +2,7 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "pg_cron"; pname = "pg_cron";
version = "1.5.1"; version = "1.5.2";
buildInputs = [ postgresql ]; buildInputs = [ postgresql ];
@ -10,7 +10,7 @@ stdenv.mkDerivation rec {
owner = "citusdata"; owner = "citusdata";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
hash = "sha256-EBmydzzT0GB1TaGpnxwj1Cq1vvnDlZ+wqJ5Dc3KDT38="; hash = "sha256-+quVWbKJy6wXpL/zwTk5FF7sYwHA7I97WhWmPO/HSZ4=";
}; };
installPhase = '' installPhase = ''

View file

@ -198,7 +198,7 @@ let
./rubyEnv/sass-embedded-static.patch ./rubyEnv/sass-embedded-static.patch
]; ];
postPatch = '' postPatch = ''
export SASS_EMBEDDED=${dart-sass-embedded} export SASS_EMBEDDED=${dart-sass-embedded}/bin
''; '';
}; };
}; };

View file

@ -23,8 +23,8 @@ in
}; };
netbox = callPackage generic { netbox = callPackage generic {
version = "3.4.7"; version = "3.5.0";
hash = "sha256-pWHGyzLc0tqfehWbCMF1l96L1pewb5FXBUkw9EqPtP8="; hash = "sha256-LsUitX/e+ec/9mRBw+cbGOG2Idl9ZQwf/vxIC3YS5LU=";
extraPatches = [ extraPatches = [
# Allow setting the STATIC_ROOT from within the configuration and setting a custom redis URL # Allow setting the STATIC_ROOT from within the configuration and setting a custom redis URL
./config.patch ./config.patch

View file

@ -1,5 +1,6 @@
{ lib { lib
, fetchFromGitHub , fetchFromGitHub
, fetchpatch
, python3 , python3
, version , version
, hash , hash
@ -13,6 +14,23 @@
py = python3 // { py = python3 // {
pkgs = python3.pkgs.overrideScope (self: super: { pkgs = python3.pkgs.overrideScope (self: super: {
django = super.django_4; django = super.django_4;
drf-nested-routers = super.drf-nested-routers.overridePythonAttrs (_oldAttrs: {
patches = [
# all for django 4 compat
(fetchpatch {
url = "https://github.com/alanjds/drf-nested-routers/commit/59764cc356f7f593422b26845a9dfac0ad196120.diff";
hash = "sha256-mq3vLHzQlGl2EReJ5mVVQMMcYgGIVt/T+qi1STtQ0aI=";
})
(fetchpatch {
url = "https://github.com/alanjds/drf-nested-routers/commit/723a5729dd2ffcb66fe315f229789ca454986fa4.diff";
hash = "sha256-UCbBjwlidqsJ9vEEWlGzfqqMOr0xuB2TAaUxHsLzFfU=";
})
(fetchpatch {
url = "https://github.com/alanjds/drf-nested-routers/commit/38e49eb73759bc7dcaaa9166169590f5315e1278.diff";
hash = "sha256-IW4BLhHHhXDUZqHaXg46qWoQ89pMXv0ZxKjOCTnDcI0=";
})
];
});
}); });
}; };
@ -35,6 +53,7 @@
propagatedBuildInputs = with py.pkgs; [ propagatedBuildInputs = with py.pkgs; [
bleach bleach
boto3
django_4 django_4
django-cors-headers django-cors-headers
django-debug-toolbar django-debug-toolbar
@ -49,8 +68,12 @@
django-taggit django-taggit
django-timezone-field django-timezone-field
djangorestframework djangorestframework
drf-spectacular
drf-spectacular-sidecar
drf-yasg drf-yasg
dulwich
swagger-spec-validator # from drf-yasg[validation] swagger-spec-validator # from drf-yasg[validation]
feedparser
graphene-django graphene-django
jinja2 jinja2
markdown markdown

View file

@ -2,16 +2,16 @@
buildGoModule rec { buildGoModule rec {
pname = "eksctl"; pname = "eksctl";
version = "0.138.0"; version = "0.139.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "weaveworks"; owner = "weaveworks";
repo = pname; repo = pname;
rev = version; rev = version;
hash = "sha256-hZnNb6tsgllJUo3lz+qF/d3MQJJ6IauqVl5nG5J3aok="; hash = "sha256-KIg5A1fR1AmdSPUrYXrWRNj1Vdi1LPbS1MwV77SRskA=";
}; };
vendorHash = "sha256-ZjA89x+B0pT5jShr1Iv/geBYtH/bYnk/TIQZWLObAck="; vendorHash = "sha256-ea1MXllg3i0UmikzVoFNuki+5QvJret2+cBcN3kekBY=";
doCheck = false; doCheck = false;

Some files were not shown because too many files have changed in this diff Show more