Merge master into haskell-updates

This commit is contained in:
github-actions[bot] 2024-07-10 00:14:40 +00:00 committed by GitHub
commit aa1ad6b8fd
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
330 changed files with 6967 additions and 5394 deletions

View File

@ -71,6 +71,12 @@
github = "0b11stan";
githubId = 27831931;
};
_0david0mp = {
email = "davidmrpr@proton.me";
github = "0david0mp";
githubId = 54892055;
name = "David mp";
};
_0nyr = {
email = "onyr.maintainer@gmail.com";
github = "0nyr";
@ -227,6 +233,12 @@
githubId = 12578560;
name = "Quinn Bohner";
};
_71zenith = {
email = "71zenith@proton.me";
github = "71zenith";
githubId = 92977828;
name = "Mori Zen";
};
_8aed = {
email = "8aed@riseup.net";
github = "8aed";
@ -5333,6 +5345,12 @@
githubId = 6199462;
name = "Dmytro Rets";
};
dretyuiop = {
email = "chewch03@gmail.com";
github = "dretyuiop";
githubId = 81854406;
name = "Chew Cheng Hong";
};
drewrisinger = {
email = "drisinger+nixpkgs@gmail.com";
github = "drewrisinger";
@ -15470,6 +15488,12 @@
githubId = 817039;
name = "Paulo Casaretto";
};
pcboy = {
email = "david@joynetiks.com";
github = "pcboy";
githubId = 943430;
name = "David Hagege";
};
pedrohlc = {
email = "root@pedrohlc.com";
github = "PedroHLC";
@ -18927,11 +18951,6 @@
githubId = 10437171;
keys = [ { fingerprint = "75F0 AB7C FE01 D077 AEE6 CAFD 353E 4A18 EE0F AB72"; } ];
};
spacefault = {
github = "spacefault";
githubId = 74156492;
name = "spacefault";
};
spacefrogg = {
email = "spacefrogg-nixos@meterriblecrew.net";
github = "spacefrogg";
@ -19933,6 +19952,14 @@
githubId = 34945377;
name = "John Smith";
};
theCapypara = {
name = "Marco Köpcke";
email = "hello@capypara.de";
matrix = "@capypara:matrix.org";
github = "theCapypara";
githubId = 3512122;
keys = [ { fingerprint = "5F29 132D EFA8 5DA0 B598 5BF2 5941 754C 1CDE 33BB"; } ];
};
thedavidmeister = {
email = "thedavidmeister@gmail.com";
github = "thedavidmeister";

View File

@ -6,6 +6,7 @@ argparse,,,,,,
basexx,,,,,,
binaryheap,,,,,,vcunat
busted,,,,,,
busted-htest,,,,,,mrcjkb
cassowary,,,,,,alerque
cldr,,,,,,alerque
compat53,,,,,,vcunat

1 name rockspec ref server version luaversion maintainers
6 basexx
7 binaryheap vcunat
8 busted
9 busted-htest mrcjkb
10 cassowary alerque
11 cldr alerque
12 compat53 vcunat

View File

@ -30,6 +30,8 @@
- [Playerctld](https://github.com/altdesktop/playerctl), a daemon to track media player activity. Available as [services.playerctld](option.html#opt-services.playerctld).
- [Glance](https://github.com/glanceapp/glance), a self-hosted dashboard that puts all your feeds in one place. Available as [services.glance](option.html#opt-services.glance).
## Backward Incompatibilities {#sec-release-24.11-incompatibilities}
- `transmission` package has been aliased with a `trace` warning to `transmission_3`. Since [Transmission 4 has been released last year](https://github.com/transmission/transmission/releases/tag/4.0.0), and Transmission 3 will eventually go away, it was decided perform this warning alias to make people aware of the new version. The `services.transmission.package` defaults to `transmission_3` as well because the upgrade can cause data loss in certain specific usage patterns (examples: [#5153](https://github.com/transmission/transmission/issues/5153), [#6796](https://github.com/transmission/transmission/issues/6796)). Please make sure to back up to your data directory per your usage:

View File

@ -234,7 +234,7 @@ foreach my $u (@{$spec->{users}}) {
# Ensure home directory incl. ownership and permissions.
if ($u->{createHome} and !$is_dry) {
make_path($u->{home}, { mode => oct($u->{homeMode}) }) if ! -e $u->{home};
make_path($u->{home}, { mode => 0755 }) if ! -e $u->{home};
chown $u->{uid}, $u->{gid}, $u->{home};
chmod oct($u->{homeMode}), $u->{home};
}

View File

@ -1380,6 +1380,7 @@
./services/web-apps/freshrss.nix
./services/web-apps/galene.nix
./services/web-apps/gerrit.nix
./services/web-apps/glance.nix
./services/web-apps/gotify-server.nix
./services/web-apps/gotosocial.nix
./services/web-apps/grocy.nix

View File

@ -5,5 +5,5 @@
{
boot.initrd.availableKernelModules = [ "virtio_net" "virtio_pci" "virtio_mmio" "virtio_blk" "virtio_scsi" "9p" "9pnet_virtio" ];
boot.initrd.kernelModules = [ "virtio_balloon" "virtio_console" "virtio_rng" ];
boot.initrd.kernelModules = [ "virtio_balloon" "virtio_console" "virtio_rng" "virtio_gpu" ];
}

View File

@ -42,6 +42,28 @@ in
'';
};
includeFileList = mkOption {
type = types.nullOr types.path;
default = null;
example = /path/to/fileList.txt;
description = ''
File containing newline-separated list of paths to include into the
backups. See the FILE SELECTION section in {manpage}`duplicity(1)` for
details on the syntax.
'';
};
excludeFileList = mkOption {
type = types.nullOr types.path;
default = null;
example = /path/to/fileList.txt;
description = ''
File containing newline-separated list of paths to exclude into the
backups. See the FILE SELECTION section in {manpage}`duplicity(1)` for
details on the syntax.
'';
};
targetUrl = mkOption {
type = types.str;
example = "s3://host:port/prefix";
@ -154,6 +176,8 @@ in
${lib.optionalString (cfg.cleanup.maxIncr != null) "${dup} remove-all-inc-of-but-n-full ${toString cfg.cleanup.maxIncr} ${target} --force ${extra}"}
exec ${dup} ${if cfg.fullIfOlderThan == "always" then "full" else "incr"} ${lib.escapeShellArgs (
[ cfg.root cfg.targetUrl ]
++ lib.optionals (cfg.includeFileList != null) [ "--include-filelist" cfg.includeFileList ]
++ lib.optionals (cfg.excludeFileList != null) [ "--exclude-filelist" cfg.excludeFileList ]
++ concatMap (p: [ "--include" p ]) cfg.include
++ concatMap (p: [ "--exclude" p ]) cfg.exclude
++ (lib.optionals (cfg.fullIfOlderThan != "never" && cfg.fullIfOlderThan != "always") [ "--full-if-older-than" cfg.fullIfOlderThan ])

View File

@ -38,7 +38,7 @@ in {
morph-browser
qtmir # not having its desktop file for Xwayland available causes any X11 application to crash the session
suru-icon-theme
# telephony-service # currently broken: https://github.com/NixOS/nixpkgs/pull/314043
telephony-service
]);
variables = {
# To override the keyboard layouts in Lomiri
@ -87,7 +87,7 @@ in {
] ++ lib.optionals (config.hardware.pulseaudio.enable || config.services.pipewire.pulse.enable) [
ayatana-indicator-sound
]) ++ (with pkgs.lomiri; [
# telephony-service # currently broken: https://github.com/NixOS/nixpkgs/pull/314043
telephony-service
] ++ lib.optionals config.networking.networkmanager.enable [
lomiri-indicator-network
]);

View File

@ -122,6 +122,7 @@ in
RuntimeDirectory = name;
RuntimeDirectoryMode = "0700";
StateDirectory = name;
SuccessExitStatus = [ 143 ];
WorkingDirectory = stateDir;
# For access to /dev/ttyACM0 (ConBee).
SupplementaryGroups = [ "dialout" ];

View File

@ -51,8 +51,8 @@ in
};
key = mkOption {
type = types.path;
description = "Path to the host key.";
type = types.oneOf [types.nonEmptyStr types.path];
description = "Path or reference to the host key.";
example = "/etc/nebula/host.key";
};
@ -241,7 +241,7 @@ in
ProtectKernelModules = true;
ProtectKernelTunables = true;
ProtectProc = "invisible";
ProtectSystem = "strict";
ProtectSystem = true;
RestrictNamespaces = true;
RestrictSUIDSGID = true;
User = networkId;
@ -269,4 +269,6 @@ in
${nameToId netName} = {};
}) enabledNetworks);
};
meta.maintainers = [ numinit ];
}

View File

@ -0,0 +1,39 @@
# Glance {#module-services-glance}
Glance is a self-hosted dashboard that puts all your feeds in one place.
Visit [the Glance project page](https://github.com/glanceapp/glance) to learn
more about it.
## Quickstart {#module-services-glance-quickstart}
Checkout the [configuration docs](https://github.com/glanceapp/glance/blob/main/docs/configuration.md) to learn more.
Use the following configuration to start a public instance of Glance locally:
```nix
{
services.glance = {
enable = true;
settings = {
pages = [
{
name = "Home";
columns = [
{
size = "full";
widgets = [
{ type = "calendar"; }
{
type = "weather";
location = "Nivelles, Belgium";
}
];
}
];
}
];
};
openFirewall = true;
};
}
```

View File

@ -0,0 +1,141 @@
{
config,
lib,
pkgs,
...
}:
let
cfg = config.services.glance;
inherit (lib)
mkEnableOption
mkPackageOption
mkOption
mkIf
getExe
types
;
settingsFormat = pkgs.formats.yaml { };
in
{
options.services.glance = {
enable = mkEnableOption "glance";
package = mkPackageOption pkgs "glance" { };
settings = mkOption {
type = types.submodule {
freeformType = settingsFormat.type;
options = {
server = {
host = mkOption {
description = "Glance bind address";
default = "127.0.0.1";
example = "0.0.0.0";
type = types.str;
};
port = mkOption {
description = "Glance port to listen on";
default = 8080;
example = 5678;
type = types.port;
};
};
pages = mkOption {
type = settingsFormat.type;
description = ''
List of pages to be present on the dashboard.
See <https://github.com/glanceapp/glance/blob/main/docs/configuration.md#pages--columns>
'';
default = [
{
name = "Calendar";
columns = [
{
size = "full";
widgets = [ { type = "calendar"; } ];
}
];
}
];
example = [
{
name = "Home";
columns = [
{
size = "full";
widgets = [
{ type = "calendar"; }
{
type = "weather";
location = "Nivelles, Belgium";
}
];
}
];
}
];
};
};
};
default = { };
description = ''
Configuration written to a yaml file that is read by glance. See
<https://github.com/glanceapp/glance/blob/main/docs/configuration.md>
for more.
'';
};
openFirewall = mkOption {
type = types.bool;
default = false;
description = ''
Whether to open the firewall for Glance.
This adds `services.glance.settings.server.port` to `networking.firewall.allowedTCPPorts`.
'';
};
};
config = mkIf cfg.enable {
systemd.services.glance = {
description = "Glance feed dashboard server";
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
serviceConfig = {
ExecStart =
let
glance-yaml = settingsFormat.generate "glance.yaml" cfg.settings;
in
"${getExe cfg.package} --config ${glance-yaml}";
WorkingDirectory = "/var/lib/glance";
StateDirectory = "glance";
RuntimeDirectory = "glance";
RuntimeDirectoryMode = "0755";
PrivateTmp = true;
DynamicUser = true;
DevicePolicy = "closed";
LockPersonality = true;
MemoryDenyWriteExecute = true;
PrivateUsers = true;
ProtectHome = true;
ProtectHostname = true;
ProtectKernelLogs = true;
ProtectKernelModules = true;
ProtectKernelTunables = true;
ProtectControlGroups = true;
ProcSubset = "pid";
RestrictNamespaces = true;
RestrictRealtime = true;
SystemCallArchitectures = "native";
UMask = "0077";
};
};
networking.firewall = mkIf cfg.openFirewall { allowedTCPPorts = [ cfg.settings.server.port ]; };
};
meta.doc = ./glance.md;
meta.maintainers = [ lib.maintainers.drupol ];
}

View File

@ -364,6 +364,7 @@ in {
gitlab = runTest ./gitlab.nix;
gitolite = handleTest ./gitolite.nix {};
gitolite-fcgiwrap = handleTest ./gitolite-fcgiwrap.nix {};
glance = runTest ./glance.nix;
glusterfs = handleTest ./glusterfs.nix {};
gnome = handleTest ./gnome.nix {};
gnome-extensions = handleTest ./gnome-extensions.nix {};

View File

@ -35,7 +35,7 @@ in {
ayatana-indicator-sound
] ++ (with pkgs.lomiri; [
lomiri-indicator-network
# telephony-service # currently broken: https://github.com/NixOS/nixpkgs/pull/314043
telephony-service
]);
};

36
nixos/tests/glance.nix Normal file
View File

@ -0,0 +1,36 @@
{ lib, ... }:
{
name = "glance";
nodes = {
machine_default =
{ pkgs, ... }:
{
services.glance = {
enable = true;
};
};
machine_custom_port =
{ pkgs, ... }:
{
services.glance = {
enable = true;
settings.server.port = 5678;
};
};
};
testScript = ''
machine_default.start()
machine_default.wait_for_unit("glance.service")
machine_default.wait_for_open_port(8080)
machine_custom_port.start()
machine_custom_port.wait_for_unit("glance.service")
machine_custom_port.wait_for_open_port(5678)
'';
meta.maintainers = [ lib.maintainers.drupol ];
}

View File

@ -239,7 +239,7 @@ in
memtest86 = makeTest {
name = "systemd-boot-memtest86";
meta.maintainers = with pkgs.lib.maintainers; [ Enzime julienmalka ];
meta.maintainers = with pkgs.lib.maintainers; [ julienmalka ];
nodes.machine = { pkgs, lib, ... }: {
imports = [ common ];
@ -254,7 +254,7 @@ in
netbootxyz = makeTest {
name = "systemd-boot-netbootxyz";
meta.maintainers = with pkgs.lib.maintainers; [ Enzime julienmalka ];
meta.maintainers = with pkgs.lib.maintainers; [ julienmalka ];
nodes.machine = { pkgs, lib, ... }: {
imports = [ common ];
@ -269,7 +269,7 @@ in
memtestSortKey = makeTest {
name = "systemd-boot-memtest-sortkey";
meta.maintainers = with pkgs.lib.maintainers; [ Enzime julienmalka ];
meta.maintainers = with pkgs.lib.maintainers; [ julienmalka ];
nodes.machine = { pkgs, lib, ... }: {
imports = [ common ];
@ -307,7 +307,7 @@ in
extraEntries = makeTest {
name = "systemd-boot-extra-entries";
meta.maintainers = with pkgs.lib.maintainers; [ Enzime julienmalka ];
meta.maintainers = with pkgs.lib.maintainers; [ julienmalka ];
nodes.machine = { pkgs, lib, ... }: {
imports = [ common ];
@ -326,7 +326,7 @@ in
extraFiles = makeTest {
name = "systemd-boot-extra-files";
meta.maintainers = with pkgs.lib.maintainers; [ Enzime julienmalka ];
meta.maintainers = with pkgs.lib.maintainers; [ julienmalka ];
nodes.machine = { pkgs, lib, ... }: {
imports = [ common ];
@ -343,7 +343,7 @@ in
switch-test = makeTest {
name = "systemd-boot-switch-test";
meta.maintainers = with pkgs.lib.maintainers; [ Enzime julienmalka ];
meta.maintainers = with pkgs.lib.maintainers; [ julienmalka ];
nodes = {
inherit common;

View File

@ -12,6 +12,12 @@ import ./make-test-python.nix ({ lib, ... }: {
isNormalUser = true;
homeMode = "750";
};
users.users.carol = {
initialPassword = "pass3";
isNormalUser = true;
createHome = true;
home = "/users/carol";
};
};
testScript = ''
@ -23,5 +29,7 @@ import ./make-test-python.nix ({ lib, ... }: {
machine.send_chars("pass1\n")
machine.succeed('[ "$(stat -c %a /home/alice)" == "700" ]')
machine.succeed('[ "$(stat -c %a /home/bob)" == "750" ]')
machine.succeed('[ "$(stat -c %a /users)" == "755" ]')
machine.succeed('[ "$(stat -c %a /users/carol)" == "700" ]')
'';
})

View File

@ -14,7 +14,7 @@ import ./make-test-python.nix ({ lib, ... }@args: let
inherit (pkgs.vscode.passthru) rev vscodeServer;
in {
name = "vscode-remote-ssh";
meta.maintainers = with lib.maintainers; [ Enzime ];
meta.maintainers = with lib.maintainers; [ ];
nodes = let
serverAddress = "192.168.0.2";

View File

@ -1,8 +1,10 @@
{ lib
, fetchFromGitHub
, python3
, mopidy
, extraPkgs ? pkgs: []
{
lib,
fetchFromGitHub,
python3,
mopidy,
yt-dlp,
extraPkgs ? pkgs: [ ],
}:
python3.pkgs.buildPythonApplication rec {
@ -17,22 +19,36 @@ python3.pkgs.buildPythonApplication rec {
hash = "sha256-iFt7r8Ljymc+grNJiOClTHkZOeo7AcYpcNc8tLMPROk=";
};
propagatedBuildInputs = with python3.pkgs; [
beautifulsoup4
cachetools
pykka
requests
youtube-dl
ytmusicapi
] ++ [
mopidy
] ++ extraPkgs pkgs;
propagatedBuildInputs =
with python3.pkgs;
[
beautifulsoup4
cachetools
pykka
requests
ytmusicapi
]
++ [
mopidy
yt-dlp
]
++ extraPkgs pkgs;
nativeCheckInputs = with python3.pkgs; [
vcrpy
pytestCheckHook
];
postPatch = ''
substituteInPlace mopidy_youtube/youtube.py \
--replace-fail 'youtube_dl_package = "youtube_dl"' 'youtube_dl_package = "yt_dlp"'
substituteInPlace tests/conftest.py \
--replace-fail 'import youtube_dl' 'import yt_dlp' \
--replace-fail 'patcher = mock.patch.object(youtube, "youtube_dl", spec=youtube_dl)' \
'patcher = mock.patch.object(youtube, "youtube_dl", spec=yt_dlp)' \
--replace-fail '"youtube_dl_package": "youtube_dl",' '"youtube_dl_package": "yt_dlp",'
'';
disabledTests = [
# Test requires a YouTube API key
"test_get_default_config"
@ -45,9 +61,7 @@ python3.pkgs.buildPythonApplication rec {
"tests/test_youtube.py"
];
pythonImportsCheck = [
"mopidy_youtube"
];
pythonImportsCheck = [ "mopidy_youtube" ];
meta = with lib; {
description = "Mopidy extension for playing music from YouTube";

View File

@ -1,94 +0,0 @@
{ asio
, cmake
, curl
, fetchFromGitHub
, ffmpeg
, gnutls
, lame
, lib
, libev
, game-music-emu
, libmicrohttpd
, libopenmpt
, mpg123
, ncurses
, pkg-config
, portaudio
, stdenv
, taglib
# Linux Dependencies
, alsa-lib
, pipewireSupport ? !stdenv.hostPlatform.isDarwin, pipewire
, pulseaudio
, sndioSupport ? true, sndio
, systemd
, systemdSupport ? lib.meta.availableOn stdenv.hostPlatform systemd
# Darwin Dependencies
, Cocoa
, SystemConfiguration
, coreaudioSupport ? stdenv.hostPlatform.isDarwin, CoreAudio
}:
stdenv.mkDerivation rec {
pname = "musikcube";
version = "3.0.2";
src = fetchFromGitHub {
owner = "clangen";
repo = pname;
rev = version;
hash = "sha512-IakZy6XsAE39awjzQI+R11JCPeQSaibx6+uX8Iea5WdlCundeovnPwSAi6RzzZl9dr2UftzzEiF4Aun8VMtqVA==";
};
outputs = [ "out" "dev" ];
nativeBuildInputs = [
cmake
pkg-config
];
buildInputs = [
asio
curl
ffmpeg
gnutls
lame
libev
game-music-emu
libmicrohttpd
libopenmpt
mpg123
ncurses
portaudio
taglib
] ++ lib.optionals systemdSupport [
systemd
] ++ lib.optionals stdenv.isLinux [
alsa-lib pulseaudio
] ++ lib.optionals stdenv.isDarwin [
Cocoa SystemConfiguration
] ++ lib.optionals coreaudioSupport [
CoreAudio
] ++ lib.optionals sndioSupport [
sndio
] ++ lib.optionals pipewireSupport [
pipewire
];
cmakeFlags = [
"-DDISABLE_STRIP=true"
];
postFixup = lib.optionalString stdenv.isDarwin ''
install_name_tool -add_rpath $out/share/${pname} $out/share/${pname}/${pname}
install_name_tool -add_rpath $out/share/${pname} $out/share/${pname}/${pname}d
'';
meta = {
description = "Terminal-based music player, library, and streaming audio server";
homepage = "https://musikcube.com/";
maintainers = with lib.maintainers; [ aanderse afh ];
license = lib.licenses.bsd3;
platforms = lib.platforms.all;
};
}

View File

@ -1,41 +1,29 @@
{ lib
, mkDerivation
, fetchFromGitHub
, fetchpatch
, cmake
, extra-cmake-modules
, qtbase
, qtquickcontrols2
, SDL
, python3
, catch2
, catch2_3
, callPackage
, nixosTests
}:
mkDerivation rec {
pname = "sfxr-qt";
version = "1.5.0";
version = "1.5.1";
src = fetchFromGitHub {
owner = "agateau";
repo = "sfxr-qt";
rev = version;
sha256 = "sha256-Ce5NJe1f+C4pPmtenHYvtkxste+nPuxJoB+N7K2nyRo=";
sha256 = "sha256-JAWDk7mGkPtQ5yaA6UT9hlAy770MHrTBhBP9G8UqFKg=";
fetchSubmodules = true;
};
postPatch = ''
cp ${catch2}/include/catch2/catch.hpp 3rdparty/catch2/single_include/catch2/catch.hpp
'';
# Remove on next release
patches = [(fetchpatch {
name = "sfxr-qr-missing-qpainterpath-include";
url = "https://github.com/agateau/sfxr-qt/commit/ef051f473654052112b647df987eb263e38faf47.patch";
sha256 = "sha256-bqMnxHUzdS5oG/2hfr5MvkpwrtZW+GTN5fS2WpV2W2c=";
})];
nativeBuildInputs = [
cmake
extra-cmake-modules
@ -48,6 +36,14 @@ mkDerivation rec {
SDL
];
checkInputs = [
catch2_3
];
cmakeFlags = [
(lib.cmakeBool "USE_SYSTEM_CATCH2" true)
];
doCheck = true;
passthru.tests = {

View File

@ -29,7 +29,7 @@ stdenvNoCC.mkDerivation (finalAttrs: {
homepage = "https://rogueamoeba.com/soundsource";
license = licenses.unfree;
sourceProvenance = with lib.sourceTypes; [ binaryNativeCode ];
maintainers = with maintainers; [ emilytrau Enzime ];
maintainers = with maintainers; [ emilytrau ];
platforms = platforms.darwin;
};
})

View File

@ -24,6 +24,7 @@
, withImage ? true
, withNotify ? true
, withSixel ? true
, withFuzzy ? true
, stdenv
, darwin
, makeBinaryWrapper
@ -33,16 +34,16 @@ assert lib.assertOneOf "withAudioBackend" withAudioBackend [ "" "alsa" "pulseaud
rustPlatform.buildRustPackage rec {
pname = "spotify-player";
version = "0.18.2";
version = "0.19.1";
src = fetchFromGitHub {
owner = "aome510";
repo = pname;
rev = "refs/tags/v${version}";
hash = "sha256-bLUPQgqSsE9tF5YiFj5B+Ylyy96DhWFNjwqXbQ9H8uc=";
hash = "sha256-R8F7s8FPnCe+shNUN/u0qcxFy3IbyfVo2xZ5/E/qwaw=";
};
cargoHash = "sha256-rptGA7J63rHdmxuPIguhZYYs8tZbpidJ0fXroBBoEIM=";
cargoHash = "sha256-7vximGisIIXBrwHXSWQjO08OraaweG7ZT6v+gVdYGVc=";
nativeBuildInputs = [
pkg-config
@ -83,7 +84,8 @@ rustPlatform.buildRustPackage rec {
++ lib.optionals withDaemon [ "daemon" ]
++ lib.optionals withNotify [ "notify" ]
++ lib.optionals withStreaming [ "streaming" ]
++ lib.optionals withSixel [ "sixel" ];
++ lib.optionals withSixel [ "sixel" ]
++ lib.optionals withFuzzy [ "fzf" ];
# sixel-sys is dynamically linked to libsixel
postInstall = lib.optionals (stdenv.isDarwin && withSixel) ''
@ -97,6 +99,6 @@ rustPlatform.buildRustPackage rec {
changelog = "https://github.com/aome510/spotify-player/releases/tag/v${version}";
mainProgram = "spotify_player";
license = lib.licenses.mit;
maintainers = with lib.maintainers; [ dit7ya xyven1 ];
maintainers = with lib.maintainers; [ dit7ya xyven1 _71zenith ];
};
}

View File

@ -36,6 +36,6 @@ stdenv.mkDerivation {
'';
meta = meta // {
maintainers = with lib.maintainers; [ Enzime ];
maintainers = with lib.maintainers; [ matteopacini ];
};
}

View File

@ -29,6 +29,7 @@ stdenv.mkDerivation rec {
postPatch = ''
substituteInPlace src/Core/Runner.cpp --replace-fail "/bin/bash" "${runtimeShell}"
substituteInPlace dist/linux/cpeditor.desktop --replace-fail 'Exec=/usr/bin/cpeditor' "Exec=cpeditor"
'';
meta = with lib; {

View File

@ -91627,11 +91627,11 @@
"repo": "ksqsf/org-xlatex",
"unstable": {
"version": [
20230820,
2133
20240707,
1343
],
"commit": "f3cac5ea904e78ae2b47723fdce96e8e87edbe7c",
"sha256": "06y7lapsp4s9h07hdsd8wigmy6r5l36qiqwmz7j1n8zp3r8xg0pw"
"commit": "8f25ba5e4784b3f12f5ac5c69b1a1d0695c53b8e",
"sha256": "1cg11gqisigpa9prkm05z7wlajffzmhjiymg7frbibhrskhfhrp0"
}
},
{

View File

@ -102,6 +102,6 @@ in stdenv.mkDerivation rec {
sourceProvenance = with sourceTypes; [ binaryNativeCode ];
license = licenses.unfree;
platforms = [ "x86_64-linux" ];
maintainers = with maintainers; [ kwohlfahrt ];
maintainers = with maintainers; [ bjornfor kwohlfahrt ];
};
}

View File

@ -2176,7 +2176,7 @@ let
downloadPage = "https://marketplace.visualstudio.com/items?itemName=GraphQL.vscode-graphql";
homepage = "https://github.com/graphql/graphiql/tree/main/packages/vscode-graphql";
license = lib.licenses.mit;
maintainers = [ lib.maintainers.Enzime ];
maintainers = [ ];
};
};
@ -2192,7 +2192,7 @@ let
downloadPage = "https://marketplace.visualstudio.com/items?itemName=GraphQL.vscode-graphql-syntax";
homepage = "https://github.com/graphql/graphiql/tree/main/packages/vscode-graphql-syntax";
license = lib.licenses.mit;
maintainers = [ lib.maintainers.Enzime ];
maintainers = [ ];
};
};

View File

@ -97,7 +97,7 @@ in
homepage = "https://code.visualstudio.com/";
downloadPage = "https://code.visualstudio.com/Updates";
license = licenses.unfree;
maintainers = with maintainers; [ eadwu synthetica bobby285271 Enzime ];
maintainers = with maintainers; [ eadwu synthetica bobby285271 johnrtitor ];
platforms = [ "x86_64-linux" "x86_64-darwin" "aarch64-darwin" "aarch64-linux" "armv7l-linux" ];
};
}

View File

@ -1,24 +0,0 @@
{lib, stdenv, fetchurl}:
stdenv.mkDerivation rec {
pname = "batik";
version = "1.17";
src = fetchurl {
url = "mirror://apache/xmlgraphics/batik/binaries/batik-bin-${version}.tar.gz";
sha256 = "sha256-sEJphF3grlwZCEt3gHHm4JF8RpvKKBLLvKXf2lu/dhA=";
};
meta = with lib; {
description = "Java based toolkit for handling SVG";
homepage = "https://xmlgraphics.apache.org/batik";
license = licenses.asl20;
platforms = platforms.unix;
sourceProvenance = with sourceTypes; [ binaryBytecode ];
};
installPhase = ''
mkdir $out
cp -r * $out/
'';
}

View File

@ -6,6 +6,7 @@
, enableSwftools ? false
, swftools
, python3Packages
, pythonOlder
, qtbase
, qtcharts
, makeDesktopItem
@ -14,14 +15,14 @@
python3Packages.buildPythonPackage rec {
pname = "hydrus";
version = "580";
version = "581";
format = "other";
src = fetchFromGitHub {
owner = "hydrusnetwork";
repo = "hydrus";
rev = "refs/tags/v${version}";
hash = "sha256-QdRItwbgVYgA6PU9Ybimk+/sBe1CHV79ssTrIturVpg=";
hash = "sha256-Q/EdqwIMCjeDtFAPlYd04NMpEgC6xUDGK5LwxDCiI9Y=";
};
nativeBuildInputs = [
@ -81,6 +82,9 @@ python3Packages.buildPythonPackage rec {
twisted
];
# tests rely on nose
doCheck = pythonOlder "3.12";
nativeCheckInputs = with python3Packages; [
nose
mock

View File

@ -29,7 +29,7 @@ stdenvNoCC.mkDerivation (finalAttrs: {
homepage = "https://freemacsoft.net/appcleaner";
license = licenses.unfree;
sourceProvenance = with lib.sourceTypes; [ binaryNativeCode ];
maintainers = with maintainers; [ emilytrau Enzime ];
maintainers = with maintainers; [ emilytrau ];
platforms = platforms.darwin;
};
})

View File

@ -33,11 +33,11 @@
stdenv.mkDerivation (finalAttrs: {
pname = "calibre";
version = "7.12.0";
version = "7.13.0";
src = fetchurl {
url = "https://download.calibre-ebook.com/${finalAttrs.version}/calibre-${finalAttrs.version}.tar.xz";
hash = "sha256-XHkORTUx3+O+i2vbTiZAHI/0hY3xPIXvvNAVuXy4wzk=";
hash = "sha256-t0nSLsT3X5MoYHhLjbRpqyKbV6NdAqNurSjbcik/n7Q=";
};
patches = [

View File

@ -8,16 +8,16 @@
rustPlatform.buildRustPackage rec {
pname = "cotp";
version = "1.7.1";
version = "1.7.2";
src = fetchFromGitHub {
owner = "replydev";
repo = "cotp";
rev = "v${version}";
hash = "sha256-6FriNAwxo+YnJWmCrScyafUEkJvEJz3O9Zoj9yerpSI=";
hash = "sha256-U+rOwBxT3on1hUlkb93sgdYIpPTOHb42x1cibueGDn0=";
};
cargoHash = "sha256-/CW0CGhPjKd5oU2LYW4lPWKMATn9aJdjIy44yZJyU/E=";
cargoHash = "sha256-mdcQSmTLU2bj+wEyzgqFJpjBEesD7zPDVHziNkTIR+s=";
buildInputs = lib.optionals stdenv.isLinux [ libxcb ]
++ lib.optionals stdenv.isDarwin [ AppKit ];

View File

@ -1,7 +1,7 @@
{ lib, stdenv, fetchurl, libX11, libXinerama, libXft, zlib, patches ? null
# update script dependencies
, gitUpdater
}:
{ lib, stdenv, fetchurl, libX11, libXinerama, libXft, zlib, writeText
, conf ? null, patches ? null
# update script dependencies
, gitUpdater }:
stdenv.mkDerivation rec {
pname = "dmenu";
@ -16,9 +16,15 @@ stdenv.mkDerivation rec {
inherit patches;
postPatch = ''
postPatch = let
configFile = if lib.isDerivation conf || builtins.isPath conf then
conf
else
writeText "config.def.h" conf;
in ''
sed -ri -e 's!\<(dmenu|dmenu_path|stest)\>!'"$out/bin"'/&!g' dmenu_run
sed -ri -e 's!\<stest\>!'"$out/bin"'/&!g' dmenu_path
${lib.optionalString (conf != null) "cp ${configFile} config.def.h"}
'';
preConfigure = ''
@ -27,15 +33,14 @@ stdenv.mkDerivation rec {
makeFlags = [ "CC:=$(CC)" ];
passthru.updateScript = gitUpdater {
url = "git://git.suckless.org/dmenu";
};
passthru.updateScript = gitUpdater { url = "git://git.suckless.org/dmenu"; };
meta = with lib; {
description = "Generic, highly customizable, and efficient menu for the X Window System";
description =
"Generic, highly customizable, and efficient menu for the X Window System";
homepage = "https://tools.suckless.org/dmenu";
license = licenses.mit;
maintainers = with maintainers; [ pSub globin qusic ];
maintainers = with maintainers; [ pSub globin qusic _0david0mp ];
platforms = platforms.all;
mainProgram = "dmenu";
};

View File

@ -29,7 +29,7 @@ stdenv.mkDerivation rec {
description = "Native Messaging Host for ff2mpv firefox addon";
homepage = "https://github.com/woodruffw/ff2mpv";
license = lib.licenses.mit;
maintainers = with lib.maintainers; [ Enzime ];
maintainers = with lib.maintainers; [ ];
mainProgram = "ff2mpv.py";
};
}

View File

@ -35,11 +35,11 @@ let
in
mkDerivation rec {
pname = "googleearth-pro";
version = "7.3.4.8248";
version = "7.3.6.9796";
src = fetchurl {
url = "https://dl.google.com/linux/earth/deb/pool/main/g/google-earth-pro-stable/google-earth-pro-stable_${version}-r0_${arch}.deb";
sha256 = "1pbapi267snlrjari5k93y6kbrjsqhqxgkxxqaqv4r25az00dx6d";
sha256 = "sha256-Wv2jPGN7LC5T32WdX3W1BfGYrcXTNWTI1Wv+PmD0gNM=";
};
nativeBuildInputs = [ dpkg makeWrapper autoPatchelfHook ];
@ -72,7 +72,7 @@ mkDerivation rec {
unpackPhase = ''
# deb file contains a setuid binary, so 'dpkg -x' doesn't work here
mkdir deb
dpkg --fsys-tarfile ${src} | tar --extract -C deb
dpkg --fsys-tarfile $src | tar --extract -C deb
'';
installPhase =''
@ -118,7 +118,7 @@ mkDerivation rec {
homepage = "https://www.google.com/earth/";
sourceProvenance = with sourceTypes; [ binaryNativeCode ];
license = licenses.unfree;
maintainers = with maintainers; [ shamilton ];
maintainers = with maintainers; [ shamilton xddxdd ];
platforms = platforms.linux;
knownVulnerabilities = [ "Includes vulnerable versions of bundled libraries: openssl, ffmpeg, gdal, and proj." ];
};

View File

@ -18,14 +18,14 @@
mkDerivation rec {
pname = "qcad";
version = "3.30.1.1";
version = "3.30.1.3";
src = fetchFromGitHub {
name = "qcad-${version}-src";
owner = "qcad";
repo = "qcad";
rev = "v${version}";
hash = "sha256-hZe1rTRkvdKC/row0Li6hsmOcLKkMULo9ScOvvjmWCA=";
hash = "sha256-bGSXFX1LuNZzs981t0GZxnMPzyJ+bddB4m/wkLMsfg0=";
};
patches = [

View File

@ -28,7 +28,7 @@ stdenv.mkDerivation rec {
description = "Adds a tray icon to the Spotify Linux client application";
license = licenses.gpl3Only;
platforms = platforms.linux;
maintainers = with maintainers; [ Enzime ];
maintainers = with maintainers; [ ];
mainProgram = "spotify-tray";
};
}

View File

@ -15,20 +15,21 @@
, libadwaita
, libpeas2
, libportal-gtk4
, pipewire
, pulseaudio
, sqlite
}:
stdenv.mkDerivation rec {
stdenv.mkDerivation (finalAttrs: {
pname = "valent";
version = "0-unstable-2024-02-12";
version = "1.0.0.alpha.45";
src = fetchFromGitHub {
owner = "andyholmes";
repo = "valent";
rev = "70ef1aa42eb2df5e9c3aa4faa014c8d539450018";
rev = "v${finalAttrs.version}";
hash = "sha256-hOVWvk4U6VoWAvXNHK1vTm/am69EFqDmSb0NofWVQj8=";
fetchSubmodules = true;
hash = "sha256-JdrkAtn21NoX+SI6PNWMdE8HLKhLc3HKFhwKydENkvg=";
};
nativeBuildInputs = [
@ -50,6 +51,7 @@ stdenv.mkDerivation rec {
libadwaita
libpeas2
libportal-gtk4
pipewire
pulseaudio
sqlite
];
@ -81,9 +83,9 @@ stdenv.mkDerivation rec {
```
'';
homepage = "https://valent.andyholmes.ca";
changelog = "https://github.com/andyholmes/valent/blob/${src.rev}/CHANGELOG.md";
changelog = "https://github.com/andyholmes/valent/blob/${finalAttrs.src.rev}/CHANGELOG.md";
license = with lib.licenses; [ gpl3Plus cc0 cc-by-sa-30 ];
maintainers = with lib.maintainers; [ aleksana ];
platforms = lib.platforms.linux;
};
}
})

View File

@ -1,14 +1,14 @@
{
k3sVersion = "1.30.1+k3s1";
k3sCommit = "80978b5b9a97908c5520c5ee51984e544e168859";
k3sRepoSha256 = "085dmq49iwvlxpj9c528nfrvd67snkgpm5drj8ahfjv1nkjp0yy1";
k3sVendorHash = "sha256-XtTahFaWnuHzKDI/U4d/j4C4gRxH163MCGEEM4hu/WM=";
k3sVersion = "1.30.2+k3s2";
k3sCommit = "faeaf1b01b2a708a46cae2a67c1b4d381ee1ba6b";
k3sRepoSha256 = "0hy0f44hj5n5nscr0p52dbklvj2ki2vs7k0cgh1r8xlg4p6fn1b0";
k3sVendorHash = "sha256-Mj9Q3TgqZoJluG4/nyuw2WHnB3OJ+/mlV7duzWt1B1A=";
chartVersions = import ./chart-versions.nix;
k3sRootVersion = "0.13.0";
k3sRootSha256 = "1jq5f0lm08abx5ikarf92z56fvx4kjpy2nmzaazblb34lajw87vj";
k3sCNIVersion = "1.4.0-k3s2";
k3sCNISha256 = "17dg6jgjx18nrlyfmkv14dhzxsljz4774zgwz5dchxcf38bvarqa";
containerdVersion = "1.7.15-k3s1";
containerdSha256 = "18hlj4ixjk7wvamfd66xyc0cax2hs9s7yjvlx52afxdc73194y0f";
containerdVersion = "1.7.17-k3s1";
containerdSha256 = "1j61mbgx346ydvnjd8b07wf7nmvvplx28wi5jjdzi1k688r2hxpf";
criCtlVersion = "1.29.0-k3s1";
}

View File

@ -2,17 +2,17 @@
buildGoModule rec {
pname = "ktop";
version = "0.3.5";
version = "0.3.6";
excludedPackages = [".ci"];
src = fetchFromGitHub {
owner = "vladimirvivien";
repo = pname;
rev = "v${version}";
hash = "sha256-nkIRVt2kqsE9QBYvvHmupohnzH+OBcwWwV16rMePw4I=";
hash = "sha256-nVZ1e/GKiJFTwuq5dPIzF4Jrv2DJ2wwWAiOn304hTA4=";
};
vendorHash = "sha256-IiAMmHOq69WMT2B1q9ZV2fGDnLr7AbRm1P7ACSde2FE=";
vendorHash = "sha256-MLIcTHWo7lsqtAqH8naSvpS013t8KBVPRbch+CfeUNk=";
ldflags = [ "-s" "-w" "-X github.com/vladimirvivien/ktop/buildinfo.Version=v${version}" ];
postInstall = ''

View File

@ -2,16 +2,16 @@
buildGoModule rec {
pname = "kubectl-ktop";
version = "0.3.5";
version = "0.3.6";
src = fetchFromGitHub {
owner = "vladimirvivien";
repo = "ktop";
rev = "v${version}";
sha256 = "sha256-nkIRVt2kqsE9QBYvvHmupohnzH+OBcwWwV16rMePw4I=";
sha256 = "sha256-nVZ1e/GKiJFTwuq5dPIzF4Jrv2DJ2wwWAiOn304hTA4=";
};
vendorHash = "sha256-IiAMmHOq69WMT2B1q9ZV2fGDnLr7AbRm1P7ACSde2FE=";
vendorHash = "sha256-MLIcTHWo7lsqtAqH8naSvpS013t8KBVPRbch+CfeUNk=";
subPackages = [ "." ];

View File

@ -1,21 +1,21 @@
{
"aci": {
"hash": "sha256-4EVSO/DCuKSI3CPlaXSDxuy0pqAMBHRDwGJTBdQd61w=",
"hash": "sha256-f4hgHFJgRUG+mhRgD7GMtkXoYkzAbkxxMIzvGLS0ums=",
"homepage": "https://registry.terraform.io/providers/CiscoDevNet/aci",
"owner": "CiscoDevNet",
"repo": "terraform-provider-aci",
"rev": "v2.14.0",
"rev": "v2.15.0",
"spdx": "MPL-2.0",
"vendorHash": null
},
"acme": {
"hash": "sha256-4H3isw9YRWJANez3qcJYnXO9yW2DoGUAoOPGI7mLXlI=",
"hash": "sha256-LlpPc3um4D2nNJFZRoXnw5ss0E0rrJN0wKKmuV0S6NU=",
"homepage": "https://registry.terraform.io/providers/vancluever/acme",
"owner": "vancluever",
"repo": "terraform-provider-acme",
"rev": "v2.23.2",
"rev": "v2.24.2",
"spdx": "MPL-2.0",
"vendorHash": "sha256-RZmT31fetR46vFQRoLkBjadD6ROqvElI/jOZnf6FWTU="
"vendorHash": "sha256-ptZ14WWarYeKT8gIcUDi4LmCFkpoTwAhSwMXmLPlWxs="
},
"age": {
"hash": "sha256-bJrzjvkrCX93bNqCA+FdRibHnAw6cb61StqtwUY5ok4=",
@ -27,13 +27,13 @@
"vendorHash": "sha256-jK7JuARpoxq7hvq5+vTtUwcYot0YqlOZdtDwq4IqKvk="
},
"aiven": {
"hash": "sha256-PCtWQP2FsYl5OITVCUp6OJub0uXDLJebWP310F4KWU8=",
"hash": "sha256-X3KtT4Thsf7bYeZJEUphRiXAlNamabFE0rjS636dJSY=",
"homepage": "https://registry.terraform.io/providers/aiven/aiven",
"owner": "aiven",
"repo": "terraform-provider-aiven",
"rev": "v4.19.1",
"rev": "v4.20.0",
"spdx": "MIT",
"vendorHash": "sha256-5Ljj3L7mhtvn5P9xw4W3AlHqRBGohKFGbiAmpN3dT0w="
"vendorHash": "sha256-QzbtTp78tROVj8kPYzjP5kBRHASlvqK6xpmRnJF6jsw="
},
"akamai": {
"hash": "sha256-jDCrNDJ6O9dXE6bG4GAMFytlVbEe/Z8mb6vx4DG355U=",
@ -45,11 +45,11 @@
"vendorHash": "sha256-QQaLUJJs/7hfLTIOIkG9WF7XmkLXsJP9MOQAvQoDQOw="
},
"alicloud": {
"hash": "sha256-x/hq45iqcKurjFeXsdycWqDlJ+O1/4f01+6ay6TDejY=",
"hash": "sha256-WaMvv/NqyblA2rrauZ7p4pHCND6S6/kfBKS/2xIrcjI=",
"homepage": "https://registry.terraform.io/providers/aliyun/alicloud",
"owner": "aliyun",
"repo": "terraform-provider-alicloud",
"rev": "v1.225.1",
"rev": "v1.226.0",
"spdx": "MPL-2.0",
"vendorHash": null
},
@ -81,13 +81,13 @@
"vendorHash": "sha256-yyTU+D4zMDcJPZ9j7a2ZuPjGBCHvED5R0rvevCEaoAI="
},
"artifactory": {
"hash": "sha256-4gE8+z4GZElmkVK9nVDriAolXJ95arNNKyIq88XAwp8=",
"hash": "sha256-j9TtO8dJltf7SZdlMZaiCWdJbcEPloPbDhYfWcCzgss=",
"homepage": "https://registry.terraform.io/providers/jfrog/artifactory",
"owner": "jfrog",
"repo": "terraform-provider-artifactory",
"rev": "v11.0.0",
"rev": "v11.1.0",
"spdx": "Apache-2.0",
"vendorHash": "sha256-5kdyDc3/jBvg6QNBivh8J4SrYgMd0dkiUHUx43wzepQ="
"vendorHash": "sha256-nPEN1ee0RmNpgKIlz0jHcHkG6oYZn7LV/Gmmdd9krq8="
},
"auth0": {
"hash": "sha256-Ay/EPlAxpEehbDsOeOyOViwT3jDsd3FmpHB5sxnAxAs=",
@ -117,29 +117,29 @@
"vendorHash": null
},
"aws": {
"hash": "sha256-YykNKCDFPQCtES2vAbCbqbHbkx1EmVM0bTEylr84bqs=",
"hash": "sha256-DJ0mfqcWIs1iLSEfhlYEgHr1PKz8HchlgvHfEwIAnlA=",
"homepage": "https://registry.terraform.io/providers/hashicorp/aws",
"owner": "hashicorp",
"repo": "terraform-provider-aws",
"rev": "v5.43.0",
"rev": "v5.57.0",
"spdx": "MPL-2.0",
"vendorHash": "sha256-2KQEX1QwPrN32gFMKF7QPnisLdBC/bn74wX1f8uiC+0="
"vendorHash": "sha256-NlFP7cRE+6PiGMSz2y/SDQas/TNWAJk/EBEqIeG2INY="
},
"azuread": {
"hash": "sha256-8uGSVvYygkR8WuKVGYVGN5dq2LoFQx8tbNYLYVBW4LE=",
"hash": "sha256-UOaEfmhGPrqQBkodNYybYb5rnB3X8wpXKHlpKqZnnXU=",
"homepage": "https://registry.terraform.io/providers/hashicorp/azuread",
"owner": "hashicorp",
"repo": "terraform-provider-azuread",
"rev": "v2.52.0",
"rev": "v2.53.1",
"spdx": "MPL-2.0",
"vendorHash": null
},
"azurerm": {
"hash": "sha256-ukfUXWT1Q8jziaSMpZl2awaid9GfByl3TniG63JxkuQ=",
"hash": "sha256-3EHm4fpeYJYzwrwaQLMdgFq1dgmV755WwAhKBG3f10M=",
"homepage": "https://registry.terraform.io/providers/hashicorp/azurerm",
"owner": "hashicorp",
"repo": "terraform-provider-azurerm",
"rev": "v3.109.0",
"rev": "v3.111.0",
"spdx": "MPL-2.0",
"vendorHash": null
},
@ -189,22 +189,22 @@
"vendorHash": "sha256-/dOiXO2aPkuZaFiwv/6AXJdIADgx8T7eOwvJfBBoqg8="
},
"buildkite": {
"hash": "sha256-/vyiQZ4UDe42sIxacgWDf+wktwd8ZXhW++gh+qF4C3c=",
"hash": "sha256-QS+JCFLYPvxwLIVzCS/gKZkBZQhOOxRfn7Vudgiox+E=",
"homepage": "https://registry.terraform.io/providers/buildkite/buildkite",
"owner": "buildkite",
"repo": "terraform-provider-buildkite",
"rev": "v1.10.0",
"rev": "v1.10.1",
"spdx": "MIT",
"vendorHash": "sha256-Vozfdh6LwIS0ISc28OGmEnpS9jjFth1i6bNUGY4mXKc="
"vendorHash": "sha256-gTJakGr9f9bzR5pbmgAMTJL54e2mS/h92TM4ft3ABdw="
},
"checkly": {
"hash": "sha256-xM3KJiWO1Lsw33talLR6gcalEm9gRffUOikdUQZ6AsM=",
"hash": "sha256-qPlXaw8J2J7DPKJvfiTLalgMIWpttqbdMg2UB3rvt14=",
"homepage": "https://registry.terraform.io/providers/checkly/checkly",
"owner": "checkly",
"repo": "terraform-provider-checkly",
"rev": "v1.7.8",
"rev": "v1.8.0",
"spdx": null,
"vendorHash": "sha256-TgoTz9kFLhikfQYt654nmoGPzjVLfUMnUrs3mVqrgJo="
"vendorHash": "sha256-+GirqFNV0eIC9CzpW53UOi9cDUzXs8ozSLX7dKQnOQ8="
},
"ciscoasa": {
"hash": "sha256-xzc44FEy2MPo51Faq/VFwg411JK9e0kQucpt0vdN8yg=",
@ -290,13 +290,13 @@
"vendorHash": "sha256-ZCMSmOCPEMxCSpl3DjIUGPj1W/KNJgyjtHpmQ19JquA="
},
"datadog": {
"hash": "sha256-L6GXoyjTd2n2n79gPvmQ0zLhW0iDS8ZcrY1gxPaQ61I=",
"hash": "sha256-sWcVMQiSRFyjwYIHUdKQm9sKX279pnA3FVLwUJ3kBKw=",
"homepage": "https://registry.terraform.io/providers/DataDog/datadog",
"owner": "DataDog",
"repo": "terraform-provider-datadog",
"rev": "v3.39.0",
"rev": "v3.40.0",
"spdx": "MPL-2.0",
"vendorHash": "sha256-jK6GI44o1FoJw9eZaCbWz1zw3dHqyaS5664h+Z27OXQ="
"vendorHash": "sha256-GEZmpCyqZCxsS5aFxEznNscs5CcgQiiPvJweA3mKkRY="
},
"dexidp": {
"hash": "sha256-XR8OI+Nf3PKNzZzM+jvylF8Itnapb9Xdztxq4OyXPVQ=",
@ -381,13 +381,13 @@
"vendorHash": "sha256-oVTanZpCWs05HwyIKW2ajiBPz1HXOFzBAt5Us+EtTRw="
},
"equinix": {
"hash": "sha256-jnV8dg9CJ38YKdEmc0hxDDbl/YUQgPTM6D5YYVjjWFc=",
"hash": "sha256-Ipl+POTZRKe9xKR08x/TPm2S7kv6w54im16pp56rWDE=",
"homepage": "https://registry.terraform.io/providers/equinix/equinix",
"owner": "equinix",
"repo": "terraform-provider-equinix",
"rev": "v1.38.1",
"rev": "v2.0.1",
"spdx": "MIT",
"vendorHash": "sha256-25kuUGbBCHOL3RzQcLDzzdfQ1j+XvqJSEyIowV0Od8A="
"vendorHash": "sha256-oxtFq1tejyqsY2uEkMjiub1CwdkFpuSVRb1Z2u3CebQ="
},
"exoscale": {
"hash": "sha256-d6vdYtEBD34SPHDAlkpTb/T8D7TaLbVwMYjSefuNdr0=",
@ -408,11 +408,11 @@
"vendorHash": "sha256-qeKXdjrDPJWO4xW8by6djJReeYbCjh8VzQmE5/65zII="
},
"fastly": {
"hash": "sha256-xoxxicu0bXoaISMNwZNM6G8bBz0GKv48ORpcABwSsg8=",
"hash": "sha256-FfdXMrGfz+JFEyWfZytIt1R0M/v7JUmkvu4VohF1vSA=",
"homepage": "https://registry.terraform.io/providers/fastly/fastly",
"owner": "fastly",
"repo": "terraform-provider-fastly",
"rev": "v5.10.0",
"rev": "v5.11.0",
"spdx": "MPL-2.0",
"vendorHash": null
},
@ -453,31 +453,31 @@
"vendorHash": null
},
"gitlab": {
"hash": "sha256-WquY33Dx5E+OgnAMZ6dhgwrixhHhAYRUa4l6TuzGzmw=",
"hash": "sha256-F73eY0m+KdzfAFCFPOZ0a29OOfgOm87WZvi8+mHwPek=",
"homepage": "https://registry.terraform.io/providers/gitlabhq/gitlab",
"owner": "gitlabhq",
"repo": "terraform-provider-gitlab",
"rev": "v16.10.0",
"rev": "v17.1.0",
"spdx": "MPL-2.0",
"vendorHash": "sha256-7hIThIq3uU803aK+paR5KdTdfVmSZu7Spf9UepaVgvc="
"vendorHash": "sha256-FrmQsuLinm5Z4+GHC1PV19lt1rfxv3TwQiEUxTvlTtk="
},
"google": {
"hash": "sha256-YonRToq/xdUy584hlzG+0/olYPhq3yxBUEahGz1ODkk=",
"hash": "sha256-RJ01+OA3BXMNThRk9aGkYa2jrj3SYgOh9eA5al5wR/Q=",
"homepage": "https://registry.terraform.io/providers/hashicorp/google",
"owner": "hashicorp",
"repo": "terraform-provider-google",
"rev": "v5.35.0",
"rev": "v5.36.0",
"spdx": "MPL-2.0",
"vendorHash": "sha256-cpxk3g3bKG+3s53WBJlX2O722qNeQICqaIqcMrpDJYs="
"vendorHash": "sha256-0SxftrOjmpYK4ud3RweYaW6qgdKwi43D1ZhN470rvVs="
},
"google-beta": {
"hash": "sha256-71eEmUUwSGM81kNwzvJ1QnkjMskdRx8BoETNSLIjYog=",
"hash": "sha256-r9ndcNxiocRHH++zvEtuIwJ8U2fE5cgndPcYjdhLpEA=",
"homepage": "https://registry.terraform.io/providers/hashicorp/google-beta",
"owner": "hashicorp",
"repo": "terraform-provider-google-beta",
"rev": "v5.35.0",
"rev": "v5.36.0",
"spdx": "MPL-2.0",
"vendorHash": "sha256-2sqUzK8yxNKdfvrToCQWK8Eyr2n4ch6/KrrIAYmLwcA="
"vendorHash": "sha256-XkpLgFB/974WEbZe34uKrLSEWjinrkmpOFOG7uYDHhg="
},
"googleworkspace": {
"hash": "sha256-dedYnsKHizxJZibuvJOMbJoux0W6zgKaK5fxIofKqCY=",
@ -570,11 +570,11 @@
"vendorHash": "sha256-3yrcTs0QV2I4CX1TZgY9FimXC2G/p1s+xNsurH0n8e8="
},
"huaweicloud": {
"hash": "sha256-04y0G3555aRnB3Zc9TgeYOMo1QyJ9ns4r85AikXSNE4=",
"hash": "sha256-p5vS7rnoBqE81Dhj35xeAs5ja/ekpeVEaNALtxw0/Tc=",
"homepage": "https://registry.terraform.io/providers/huaweicloud/huaweicloud",
"owner": "huaweicloud",
"repo": "terraform-provider-huaweicloud",
"rev": "v1.65.2",
"rev": "v1.66.0",
"spdx": "MPL-2.0",
"vendorHash": null
},
@ -597,13 +597,13 @@
"vendorHash": null
},
"ibm": {
"hash": "sha256-5esd44JgaarCJK38QyYv+fxMz0+zzivMZD8rqyqrdbo=",
"hash": "sha256-91EXK/8Kovq2yqyF5lFgWV/AJMvU6eHCnIBnLpzsQws=",
"homepage": "https://registry.terraform.io/providers/IBM-Cloud/ibm",
"owner": "IBM-Cloud",
"repo": "terraform-provider-ibm",
"rev": "v1.64.0",
"rev": "v1.67.1",
"spdx": "MPL-2.0",
"vendorHash": "sha256-YFxD7hvKTXdaQ/+/Oiws/i6TipbFaAQ0Ah1arGK7JUo="
"vendorHash": "sha256-ioyfsNgXoQOtzU1eBJkjMw4hgIo5ryFPIFKqOdn4fuk="
},
"icinga2": {
"hash": "sha256-Y/Oq0aTzP+oSKPhHiHY9Leal4HJJm7TNDpcdqkUsCmk=",
@ -705,13 +705,13 @@
"vendorHash": "sha256-K/PH8DAi6Wj+isPx9xefQcLPKnrimfItZFSPfktTias="
},
"linode": {
"hash": "sha256-6q1x34SWBCDi1jGoyNoxMAtHqxqP3qAVk1MLMLIRbg8=",
"hash": "sha256-X7Uslu8HjJg/Ikz48hg1aIaDNNcr3Xz4gBTPB+y949k=",
"homepage": "https://registry.terraform.io/providers/linode/linode",
"owner": "linode",
"repo": "terraform-provider-linode",
"rev": "v2.23.0",
"rev": "v2.23.1",
"spdx": "MPL-2.0",
"vendorHash": "sha256-ZQkFp9UXhY61YgtPVaWOSoQIYNcaTs9V/iwZ+UDRluA="
"vendorHash": "sha256-lQ1+MVErv0g2Q7PSrO95Qzs0o/0hpL6JKK9E5J1EGic="
},
"linuxbox": {
"hash": "sha256-MzasMVtXO7ZeZ+qEx2Z+7881fOIA0SFzSvXVHeEROtg=",
@ -786,13 +786,13 @@
"vendorHash": "sha256-Gn4P4NIksv8S4DmnuYArxdSQDQsyCeayJJAIkmm/I6A="
},
"mongodbatlas": {
"hash": "sha256-TitX99F/jx2q2FOSmJAGLprhFSsG4CBdmKQhzNqxotk=",
"hash": "sha256-8A2csdDMS5W0SzVRy7QATWUEDEZqR7gLRDpVAeROsZk=",
"homepage": "https://registry.terraform.io/providers/mongodb/mongodbatlas",
"owner": "mongodb",
"repo": "terraform-provider-mongodbatlas",
"rev": "v1.17.2",
"rev": "v1.17.3",
"spdx": "MPL-2.0",
"vendorHash": "sha256-Te8Kd+1B3T3Ngo+xKgiqjnm5CZ2QRNXEQxPlaLPXNRY="
"vendorHash": "sha256-idXan9/OGEKY+VT2dwWwj+P1fFQIrIs2ghkthz53j/g="
},
"namecheap": {
"hash": "sha256-g3i7jZBOl2umsyRk1z7Radv8a9Ry6oQ8oorv3YbY7Xo=",
@ -813,13 +813,13 @@
"vendorHash": null
},
"newrelic": {
"hash": "sha256-UxSWEejkEH5VzPWXc2RZ5ho8rtvwH6zYUEP+W/r4ny0=",
"hash": "sha256-hJKYz95+i1j1KhDuh5Jcm8cZzBAD3cK5+a5B1vCYBXM=",
"homepage": "https://registry.terraform.io/providers/newrelic/newrelic",
"owner": "newrelic",
"repo": "terraform-provider-newrelic",
"rev": "v3.38.1",
"rev": "v3.39.1",
"spdx": "MPL-2.0",
"vendorHash": "sha256-wsIi0BwwSXiVhYg2h53UzqjbGpPYMHXcmmMXO20gbWw="
"vendorHash": "sha256-EHO78DEZ92WRDP8ZA0M9zdZ8KsPWMA2ljgFY6dX29YM="
},
"nomad": {
"hash": "sha256-42QZfbbugxV6USCz0Urnhfcsf+DZKpOepC44Z37dGkw=",
@ -831,13 +831,13 @@
"vendorHash": "sha256-+4JU2z56W/uT+DW4+LRf1hwK0nLK9WARTY31bqMpHNM="
},
"ns1": {
"hash": "sha256-KbtMwLgwCPHilzQ22oco99q6c5+0B/9OXoc0IZXLLVk=",
"hash": "sha256-96q68P+d7K4UycCZ0Z5w3HWIcKwsC4/UD6WPU6yyC7M=",
"homepage": "https://registry.terraform.io/providers/ns1-terraform/ns1",
"owner": "ns1-terraform",
"repo": "terraform-provider-ns1",
"rev": "v2.3.0",
"rev": "v2.3.1",
"spdx": "MPL-2.0",
"vendorHash": "sha256-kQFlW6G20x1OJNywb+KfJC1A7XSdgHlif7/szUOBuhs="
"vendorHash": "sha256-0RRZF7/NHo9y7SUKZbq8nNU+gFdCb0u4XJgsobNeWsk="
},
"null": {
"hash": "sha256-KOwJXGvMc9Xgq4Kbr72aW6RDwzldUrU1C3aDxpKO3qE=",
@ -859,11 +859,11 @@
"vendorHash": "sha256-LRIfxQGwG988HE5fftGl6JmBG7tTknvmgpm4Fu1NbWI="
},
"oci": {
"hash": "sha256-EcemPlqHB3Ggra0o1rzjxAGtcpBKpUp3/H8zS56COYA=",
"hash": "sha256-yiHBWcOE2QxyhzKqjSPvgqAFu0hL13idWXbwkhAhNeE=",
"homepage": "https://registry.terraform.io/providers/oracle/oci",
"owner": "oracle",
"repo": "terraform-provider-oci",
"rev": "v5.46.0",
"rev": "v6.1.0",
"spdx": "MPL-2.0",
"vendorHash": null
},
@ -940,11 +940,11 @@
"vendorHash": null
},
"pagerduty": {
"hash": "sha256-GB2U+JBMAj+ePay7CYHWv/daLzVm+V+5YoADJ6uQp+E=",
"hash": "sha256-sXFRN05mn5hMIqxhwIvYWlMgkrUGZqi+J29Sq9GRS90=",
"homepage": "https://registry.terraform.io/providers/PagerDuty/pagerduty",
"owner": "PagerDuty",
"repo": "terraform-provider-pagerduty",
"rev": "v3.14.3",
"rev": "v3.14.5",
"spdx": "MPL-2.0",
"vendorHash": null
},
@ -1138,13 +1138,13 @@
"vendorHash": "sha256-8W1PK4T98iK1N6EB6AVjvr1P9Ja51+kSOmYAEosxrh8="
},
"spotinst": {
"hash": "sha256-6bdOwmAKxP7EVdRV8vw6b/lewPm35zE9T0Dah6NL5FA=",
"hash": "sha256-SOzaTZIBEC9se942ofYHURH8btw38upJtnlDDWmLcTM=",
"homepage": "https://registry.terraform.io/providers/spotinst/spotinst",
"owner": "spotinst",
"repo": "terraform-provider-spotinst",
"rev": "v1.178.0",
"rev": "v1.180.2",
"spdx": "MPL-2.0",
"vendorHash": "sha256-c6vs7FypPQybAzFAsTnOGVjVLhhmj6v2/O0FU1z6X0A="
"vendorHash": "sha256-mgDWGimTq7AODC+ojipWUgCDKpC/EP/W8x8kbey05mQ="
},
"ssh": {
"hash": "sha256-1UN5QJyjCuxs2vQYlSuz2jsu/HgGTxOoWWRcv4qcwow=",
@ -1174,13 +1174,13 @@
"vendorHash": "sha256-9M1DsE/FPQK8TG7xCJWbU3HAJCK3p/7lxdzjO1oAfWs="
},
"sumologic": {
"hash": "sha256-ei5BxMyrx4CyVYl81DUDxLdbjGJBiTZWiFylhUFTr0s=",
"hash": "sha256-LPJwJ6j/eZzOliHH7Ci49c5CqDckaqSm7ikLKTVhuew=",
"homepage": "https://registry.terraform.io/providers/SumoLogic/sumologic",
"owner": "SumoLogic",
"repo": "terraform-provider-sumologic",
"rev": "v2.30.1",
"rev": "v2.31.1",
"spdx": "MPL-2.0",
"vendorHash": "sha256-ti0zBliq3DXVNWlqE0dO6T5UxN/p1fLMt4FK/0/j9oY="
"vendorHash": "sha256-YdWs2orKhbwAZSQYC73t4e/vvVxk8LrBPG9ZC38VcZE="
},
"tailscale": {
"hash": "sha256-hMcnHTdxxEfAU5cd0nlK2Bc+fxfrERk4wYaRidPM4mA=",
@ -1201,20 +1201,20 @@
"vendorHash": "sha256-939lQsdp0Ixj9FU7IqxbOAM93GwL+X6gC3kY5/0x+AE="
},
"temporalcloud": {
"hash": "sha256-ISx/kc3Mi/EBnzfrMojRTsZEG10iPqKMB8Ac8SzBZmY=",
"hash": "sha256-PIqsCdIaFob/C2b1Rem/JYl7bQVvdRecDQDkcAZutz0=",
"homepage": "https://registry.terraform.io/providers/temporalio/temporalcloud",
"owner": "temporalio",
"repo": "terraform-provider-temporalcloud",
"rev": "v0.0.8",
"rev": "v0.0.9",
"spdx": "MPL-2.0",
"vendorHash": "sha256-2rYaxDDIPH46gXNILnTcHRsChpEd406r4pzWdnHMLNM="
"vendorHash": "sha256-/yXPJgwpUCKRs3Sf2BbuHp3pfQiheTAh7Auxk3qkTFg="
},
"tencentcloud": {
"hash": "sha256-RR7F+sZl/btVEsybmKFxG3yrE7PkvdstMuDAJwx4Ggk=",
"hash": "sha256-PZWBVLUfWn13B7saz2XecMv6pWWqPMOfBzqr2pErnvs=",
"homepage": "https://registry.terraform.io/providers/tencentcloudstack/tencentcloud",
"owner": "tencentcloudstack",
"repo": "terraform-provider-tencentcloud",
"rev": "v1.81.105",
"rev": "v1.81.107",
"spdx": "MPL-2.0",
"vendorHash": null
},
@ -1301,13 +1301,13 @@
"vendorHash": "sha256-rS6tigtjTGG2c4FwSjn6dvblwqYtPQS/tl7qQ+P7uVM="
},
"vcd": {
"hash": "sha256-f5uoRyf8uW/hJ9MAbi9KdViWh8CMR/FlQyJtAY5pEvI=",
"hash": "sha256-4+7CblKeop9Uwpl7XxjmR33XE/mcmZfOuFJrJuqzZmw=",
"homepage": "https://registry.terraform.io/providers/vmware/vcd",
"owner": "vmware",
"repo": "terraform-provider-vcd",
"rev": "v3.12.1",
"rev": "v3.13.0",
"spdx": "MPL-2.0",
"vendorHash": "sha256-vKfHRTmTRxwDijEA1l4IyjBHS5kZx9LcGfprUntVg5w="
"vendorHash": "sha256-GKI3eXgXA92URJiwafcVchBcW7JQQ7hM14ThA6B6wKg="
},
"venafi": {
"hash": "sha256-0ea6ael4NQDHFOrXsMKE/KRRpARKjrxPBFykB8Bk1JA=",
@ -1346,13 +1346,13 @@
"vendorHash": null
},
"vsphere": {
"hash": "sha256-BCEUFIw47o7lFmOaQ/SBk2n1bPnvzAwdxeuuMNx4OgA=",
"hash": "sha256-rF7gtZUPse6ewcawmxlIfCmVRKKNJMUwqVVEBaLvLbE=",
"homepage": "https://registry.terraform.io/providers/hashicorp/vsphere",
"owner": "hashicorp",
"repo": "terraform-provider-vsphere",
"rev": "v2.8.1",
"rev": "v2.8.2",
"spdx": "MPL-2.0",
"vendorHash": "sha256-K7T4ZGz8Us/RRWoAmT5M++m6uJKl6tyPX7T+sS7NuLs="
"vendorHash": "sha256-TxaYIJtEIgy0Q56Gk1JXqIUuVyVJNVH0gKmdzzDWW/E="
},
"vultr": {
"hash": "sha256-gQwLGnYmB9bwpGrLNdbw+zY0MlPPrY/37rJPtindT1Q=",
@ -1373,12 +1373,12 @@
"vendorHash": "sha256-GRnVhGpVgFI83Lg34Zv1xgV5Kp8ioKTFV5uaqS80ATg="
},
"yandex": {
"hash": "sha256-PTlnXq30roG1ueLJM5aGSeuDJ5zukmU33T9Qf7cnxd8=",
"hash": "sha256-FwwjHWwUUtOwZZh0YeUbSnSLFH1Q80ALFHhd0tCAZNQ=",
"homepage": "https://registry.terraform.io/providers/yandex-cloud/yandex",
"owner": "yandex-cloud",
"repo": "terraform-provider-yandex",
"rev": "v0.122.0",
"rev": "v0.123.0",
"spdx": "MPL-2.0",
"vendorHash": "sha256-Lo847kKBWDFeN3t7T/akaQ8gkU7b+p1BSSi4ddLLDyc="
"vendorHash": "sha256-K6Khgg9sAG2S/onFUlVG5mZfMtvpvVJeU6YQOyA4Liw="
}
}

View File

@ -1,17 +1,18 @@
{ lib
, stdenvNoCC
, fetchurl
, unzip
{
lib,
stdenvNoCC,
fetchurl,
unzip,
}:
stdenvNoCC.mkDerivation (finalAttrs: {
pname = "cyberduck";
version = "8.6.0.39818";
version = "9.0.0.41777";
src = fetchurl {
url = "https://update.cyberduck.io/Cyberduck-${finalAttrs.version}.zip";
sha256 = "1iqq54n267lmmdlv8wmr9k461p49jindc1mn5wy742k08cqxc5ab";
hash = "sha256-oDTFkoX4uu+X5vLDHn+tGoNB/Pd9ncdFE8dGS6PT5wg=";
};
dontUnpack = true;
sourceRoot = ".";
nativeBuildInputs = [ unzip ];
@ -19,7 +20,7 @@ stdenvNoCC.mkDerivation (finalAttrs: {
runHook preInstall
mkdir -p $out/Applications
unzip -d $out/Applications $src
cp -r Cyberduck.app $out/Applications
runHook postInstall
'';
@ -29,7 +30,7 @@ stdenvNoCC.mkDerivation (finalAttrs: {
homepage = "https://cyberduck.io";
license = licenses.gpl3Plus;
sourceProvenance = with lib.sourceTypes; [ binaryNativeCode ];
maintainers = with maintainers; [ emilytrau Enzime ];
maintainers = with maintainers; [ emilytrau ];
platforms = platforms.darwin;
};
})

View File

@ -1,9 +1,9 @@
{
"version" = "1.11.69";
"version" = "1.11.70";
"hashes" = {
"desktopSrcHash" = "sha256-sSEWnvWZ6sfrHL3mqbq3T90At131C1W7N72Hb/BHKCk=";
"desktopYarnHash" = "0awz1dscksx4zvp99p08mdl2h6i7gbwjddanl3bhxkysxqdnwqb1";
"webSrcHash" = "sha256-oFSaKtig1z3jepLpwJW4i5VskMBhKUIbPsCfLQuCgMY=";
"webYarnHash" = "1rzq05dnkwjglira52wllsl5nqw1g8whvamjfxzgvp0nyby46nha";
"desktopSrcHash" = "sha256-BLRblkBcl7wGU/sJpvdvRFD0/qBaql0wqJBSZlDkXRw=";
"desktopYarnHash" = "1nrnqlvilgs7xzwn1xkx3yh3rwsca47r1rmbzhyylq00bqaym1wf";
"webSrcHash" = "sha256-kx6xQIuYSXkkBTYb+fZLL3cuHFcNj7RkC60o6Fyp8LI=";
"webYarnHash" = "1pqcdlgwrrjjmmd9ds8dxjb04b2bv0r230dicmbihs719yjrpwmb";
};
}

View File

@ -21,11 +21,11 @@
python3.pkgs.buildPythonApplication rec {
pname = "gajim";
version = "1.9.0";
version = "1.9.1";
src = fetchurl {
url = "https://gajim.org/downloads/${lib.versions.majorMinor version}/gajim-${version}.tar.gz";
hash = "sha256-eiRLQZr60BvjqqnoYEY+LswgW6e+S9mTLvBKVCXrCzI=";
hash = "sha256-VvXzGo8GLtkAJ/ZVOpYOboJeRqZkDbZDu9DMjaHqWus=";
};
format = "pyproject";

View File

@ -2,7 +2,7 @@
callPackage ./generic.nix { } rec {
pname = "signal-desktop";
dir = "Signal";
version = "7.14.0";
version = "7.15.0";
url = "https://updates.signal.org/desktop/apt/pool/s/signal-desktop/signal-desktop_${version}_amd64.deb";
hash = "sha256-nRvGpAKRIPgXStrVu4qSMoW01SACV/wW/c05lLncCW8=";
hash = "sha256-UgWVxLOqul/XsM++1Cai7+skjByQfGDO8gBVDJNv/tw=";
}

View File

@ -1,129 +0,0 @@
{ lib, stdenv, fetchurl, dpkg
, alsa-lib, atk, cairo, cups, curl, dbus, expat, fontconfig, freetype, gdk-pixbuf, glib, glibc, gnome-keyring
, gtk3, libappindicator-gtk3, libnotify, libpulseaudio, libsecret, libv4l, nspr, nss, pango, systemd, wrapGAppsHook3, xorg
, at-spi2-atk, libuuid, at-spi2-core, libdrm, mesa, libxkbcommon, libxshmfence }:
let
# Please keep the version x.y.0.z and do not update to x.y.76.z because the
# source of the latter disappears much faster.
version = "8.110.76.107";
rpath = lib.makeLibraryPath [
alsa-lib
atk
at-spi2-atk
at-spi2-core
cairo
cups
curl
dbus
expat
fontconfig
freetype
glib
glibc
libsecret
libuuid
gdk-pixbuf
gtk3
libappindicator-gtk3
gnome-keyring
libnotify
libpulseaudio
nspr
nss
pango
stdenv.cc.cc
systemd
libv4l
libdrm
mesa
libxkbcommon
libxshmfence
xorg.libxkbfile
xorg.libX11
xorg.libXcomposite
xorg.libXcursor
xorg.libXdamage
xorg.libXext
xorg.libXfixes
xorg.libXi
xorg.libXrandr
xorg.libXrender
xorg.libXtst
xorg.libXScrnSaver
xorg.libxcb
] + ":${stdenv.cc.cc.lib}/lib64";
src =
if stdenv.hostPlatform.system == "x86_64-linux" then
fetchurl {
urls = [
"https://repo.skype.com/deb/pool/main/s/skypeforlinux/skypeforlinux_${version}_amd64.deb"
"https://mirror.cs.uchicago.edu/skype/pool/main/s/skypeforlinux/skypeforlinux_${version}_amd64.deb"
"https://web.archive.org/web/https://repo.skype.com/deb/pool/main/s/skypeforlinux/skypeforlinux_${version}_amd64.deb"
];
sha256 = "sha256-ocXhISwEtwzPd1dOPjgIj5UQ/8sqq2gUtmZ8KZBAxKM=";
}
else
throw "Skype for linux is not supported on ${stdenv.hostPlatform.system}";
in stdenv.mkDerivation {
pname = "skypeforlinux";
inherit version;
system = "x86_64-linux";
inherit src;
nativeBuildInputs = [
wrapGAppsHook3
glib # For setup hook populating GSETTINGS_SCHEMA_PATH
];
buildInputs = [ dpkg ];
dontUnpack = true;
installPhase = ''
mkdir -p $out
dpkg -x $src $out
cp -av $out/usr/* $out
rm -rf $out/opt $out/usr
rm $out/bin/skypeforlinux
ln -s "$out/share/skypeforlinux/skypeforlinux" "$out/bin/skypeforlinux"
# Otherwise it looks "suspicious"
chmod -R g-w $out
'';
postFixup = ''
for file in $(find $out -type f \( -perm /0111 -o -name \*.so\* -or -name \*.node\* \) ); do
patchelf --set-interpreter "$(cat $NIX_CC/nix-support/dynamic-linker)" "$file" || true
patchelf --set-rpath ${rpath}:$out/share/skypeforlinux $file || true
done
# Fix the desktop link
substituteInPlace $out/share/applications/skypeforlinux.desktop \
--replace /usr/bin/ ""
substituteInPlace $out/share/applications/skypeforlinux-share.desktop \
--replace /usr/bin/ ""
substituteInPlace $out/share/kservices5/ServiceMenus/skypeforlinux.desktop \
--replace /usr/bin/ ""
'';
meta = with lib; {
description = "Linux client for skype";
homepage = "https://www.skype.com";
sourceProvenance = with sourceTypes; [ binaryNativeCode ];
license = licenses.unfree;
maintainers = with maintainers; [ panaeon jraygauthier ];
platforms = [ "x86_64-linux" ];
mainProgram = "skypeforlinux";
};
}

View File

@ -1,4 +1,4 @@
{ lib, fetchFromGitHub, buildGoModule, installShellFiles }:
{ lib, stdenv, fetchFromGitHub, buildGoModule, installShellFiles }:
buildGoModule rec {
pname = "nali";
@ -19,11 +19,13 @@ buildGoModule rec {
CGO_ENABLED = 0;
ldflags = [ "-s" "-w" "-X github.com/zu1k/nali/internal/constant.Version=${version}" ];
postInstall = ''
installShellCompletion --cmd nali \
--bash <($out/bin/nali completion bash) \
--fish <($out/bin/nali completion fish) \
--zsh <($out/bin/nali completion zsh)
postInstall = lib.optionalString (stdenv.buildPlatform.canExecute stdenv.hostPlatform) ''
export HOME="$TMPDIR"
# write to temp files to avoid race condition in config loading
$out/bin/nali completion bash > nali.bash
$out/bin/nali completion fish > nali.fish
$out/bin/nali completion zsh > nali.zsh
installShellCompletion --cmd nali nali.{bash,fish,zsh}
'';
meta = with lib; {

View File

@ -46,6 +46,6 @@ buildPythonApplication rec {
description = "Free software that synchronises media players";
license = licenses.asl20;
platforms = platforms.linux ++ platforms.darwin;
maintainers = with maintainers; [ assistant Enzime ];
maintainers = with maintainers; [ assistant ];
};
}

View File

@ -11,16 +11,16 @@
buildGoModule rec {
pname = "trayscale";
version = "0.12.5";
version = "0.12.6";
src = fetchFromGitHub {
owner = "DeedleFake";
repo = "trayscale";
rev = "v${version}";
hash = "sha256-EwfICUKlDnlkD1vxR1jpNybvUG4mOHfRRgk8VB9T+hs=";
hash = "sha256-4zjT5GrGOYaKD61EWG7gxAMwf2ZQivWlzaKH0h4jLGU=";
};
vendorHash = "sha256-lEGFOBR0d8IfqBYdrC8awRhGcPqt0y4oOWU+xu4ClfE=";
vendorHash = "sha256-h5FdXlDvvorP9iOsKXxc6q3HwyB44faZGvw/Ew3LkkQ=";
subPackages = [ "cmd/trayscale" ];

View File

@ -50,9 +50,13 @@ let
# Add dictionaries from all NIX_PROFILES
"--run" (lib.escapeShellArg ''
for PROFILE in $NIX_PROFILES; do
HDIR="$PROFILE/share/hunspell"
if [ -d "$HDIR" ]; then
export DICPATH=$DICPATH''${DICPATH:+:}$HDIR
HU_DIR="$PROFILE/share/hunspell"
HY_DIR="$PROFILE/share/hyphen"
if [ -d "$HU_DIR" ]; then
export DICPATH=$DICPATH''${DICPATH:+:}$HU_DIR
fi
if [ -d "$HY_DIR" ]; then
export DICPATH=$DICPATH''${DICPATH:+:}$HY_DIR
fi
done
'')

View File

@ -2,13 +2,13 @@
stdenv.mkDerivation (finalAttrs: {
pname = "qalculate-qt";
version = "5.2.0";
version = "5.2.0.1";
src = fetchFromGitHub {
owner = "qalculate";
repo = "qalculate-qt";
rev = "v${finalAttrs.version}";
hash = "sha256-suJUPeWLX+da0lQdvsDgSBRCBYmog+s4+n/w0PnPijs=";
hash = "sha256-kzOxOCZmu4mYYgegRBU8SMAkTiE4p1AugVAeZa8yDDE=";
};
nativeBuildInputs = [ qmake intltool pkg-config qttools wrapQtAppsHook ];

View File

@ -39,7 +39,7 @@ stdenvNoCC.mkDerivation (finalAttrs: {
description = "macOS VMs on Apple Silicon to use in CI and other automations";
homepage = "https://tart.run";
license = licenses.fairsource09;
maintainers = with maintainers; [ emilytrau Enzime aduh95 ];
maintainers = with maintainers; [ emilytrau aduh95 ];
mainProgram = finalAttrs.pname;
platforms = [ "aarch64-darwin" ];
sourceProvenance = with sourceTypes; [ binaryNativeCode ];

View File

@ -26,7 +26,10 @@ let
plugins = lib.mergeAttrsList [
{ hy3 = import ./hy3.nix; }
{ hypr-dynamic-cursors = import ./hypr-dynamic-cursors.nix; }
{ hyprfocus = import ./hyprfocus.nix; }
{ hyprscroller = import ./hyprscroller.nix; }
{ hyprspace = import ./hyprspace.nix; }
(import ./hyprland-plugins.nix)
];
in

View File

@ -0,0 +1,37 @@
{
lib,
mkHyprlandPlugin,
fetchFromGitHub,
hyprland,
}:
mkHyprlandPlugin hyprland {
pluginName = "hypr-dynamic-cursors";
version = "0-unstable-2024-07-06";
src = fetchFromGitHub {
owner = "VirtCode";
repo = "hypr-dynamic-cursors";
rev = "85423b074e112f28e84f6276d31d1548906a625e";
hash = "sha256-lCAZ/7xtOE6P7uPIX2uQgC0nDOBZefWYO3O3izRx19E=";
};
dontUseCmakeConfigure = true;
installPhase = ''
runHook preInstall
mkdir -p $out/lib
mv out/dynamic-cursors.so $out/lib/libdynamic-cursors.so
runHook postInstall
'';
meta = {
description = "Plugin to make your Hyprland cursor more realistic";
homepage = "https://github.com/VirtCode/hypr-dynamic-cursors";
license = lib.licenses.mit;
maintainers = with lib.maintainers; [ donovanglover ];
platforms = lib.platforms.linux;
};
}

View File

@ -0,0 +1,41 @@
{
lib,
mkHyprlandPlugin,
hyprland,
cmake,
fetchFromGitHub,
unstableGitUpdater,
}:
mkHyprlandPlugin hyprland {
pluginName = "hyprscroller";
version = "0-unstable-2024-07-04";
src = fetchFromGitHub {
owner = "dawsers";
repo = "hyprscroller";
rev = "bef840b3f0fd3d37b5c1c9f2704b2efb60173184";
hash = "sha256-vkpGSseA7n0/Y+83snbEe7Z++2akdDbvv7eZzM9V3wI=";
};
nativeBuildInputs = [ cmake ];
installPhase = ''
runHook preInstall
mkdir -p $out/lib
mv hyprscroller.so $out/lib/libhyprscroller.so
runHook postInstall
'';
passthru.updateScript = unstableGitUpdater { };
meta = {
homepage = "https://github.com/dawsers/hyprscroller";
description = "Hyprland layout plugin providing a scrolling layout like PaperWM";
license = lib.licenses.mit;
maintainers = with lib.maintainers; [ donovanglover ];
platforms = lib.platforms.linux;
};
}

View File

@ -0,0 +1,44 @@
{
lib,
fetchFromGitHub,
fetchpatch,
hyprland,
mkHyprlandPlugin,
}:
mkHyprlandPlugin hyprland {
pluginName = "hyprspace";
version = "0-unstable-2024-06-17";
src = fetchFromGitHub {
owner = "KZDKM";
repo = "hyprspace";
rev = "2f3edb68f47a8f5d99d10b322e9a85a285f53cc7";
hash = "sha256-iyj4D6c77uROAH9QdZjPd9SKnS/DuACMESqaEKnBgI8=";
};
# Fix build for Hyprland v0.41.2+
patches = fetchpatch {
url = "https://github.com/KZDKM/Hyprspace/commit/edad6cf735097b7cb4406d3fc8daddd09dfa458a.patch";
hash = "sha256-EVabjPymGAMPtC3Uf6lMJOInvccJhu4t09NXhXhq4RY=";
};
dontUseCmakeConfigure = true;
installPhase = ''
runHook preInstall
mkdir -p $out/lib
mv Hyprspace.so $out/lib/libhyprspace.so
runHook postInstall
'';
meta = {
homepage = "https://github.com/KZDKM/Hyprspace";
description = "Workspace overview plugin for Hyprland";
license = lib.licenses.gpl2Only;
platforms = lib.platforms.linux;
maintainers = with lib.maintainers; [ donovanglover ];
};
}

View File

@ -36,6 +36,6 @@ buildPythonApplication rec {
description = "Kitty drop-down service for sway & i3wm";
mainProgram = "kitti3";
license = licenses.bsd3;
maintainers = with maintainers; [ Enzime ];
maintainers = with maintainers; [ ];
};
}

View File

@ -70,6 +70,7 @@ for package in *; do
break
else
if hash=$(nix-prefetch-url "$url" 2>"$tmp"/error); then
hash="$(nix-hash --to-sri --type sha256 "$hash")"
# If multiple remote sources are enabled, nuget will try them all
# concurrently and use the one that responds first. We always use the
# first source that has the package.

View File

@ -84,6 +84,7 @@ let
preBuild = args.preBuild or "";
postBuild = args.modPostBuild or "";
sourceRoot = args.sourceRoot or "";
setSourceRoot = args.setSourceRoot or "";
env = args.env or { };
impureEnvVars = lib.fetchers.proxyImpureEnvVars ++ [

View File

@ -0,0 +1,25 @@
{ lib
, buildGoModule
, fetchFromGitHub
}:
buildGoModule rec {
pname = "adif-multitool";
version = "0.1.12-rc1";
vendorHash = "sha256-h7Gr8qRz6K0xCvR8tGWTeEkwgMQOTZnbEEsda4aJpbc=";
src = fetchFromGitHub {
owner = "flwyd";
repo = "adif-multitool";
rev = "v${version}";
hash = "sha256-R0Hu/yWiLUpH9qkVQuJw4bRvDeISjg67rZJLeUBPBbM=";
};
meta = with lib; {
description = "Command-line program for working with ham logfiles.";
homepage = "https://github.com/flwyd/adif-multitool";
license = licenses.asl20;
maintainers = with maintainers; [ mafo ];
mainProgram = "adifmt";
};
}

View File

@ -34,11 +34,7 @@ stdenvNoCC.mkDerivation (finalAttrs: {
description = "Windows alt-tab on macOS";
homepage = "https://alt-tab-macos.netlify.app";
license = lib.licenses.gpl3Plus;
maintainers = with lib.maintainers; [
donteatoreo
emilytrau
Enzime
];
maintainers = with lib.maintainers; [ donteatoreo emilytrau ];
platforms = lib.platforms.darwin;
sourceProvenance = with lib.sourceTypes; [ binaryNativeCode ];
};

View File

@ -6,13 +6,13 @@
stdenv.mkDerivation (finalAttrs: {
pname = "application-title-bar";
version = "0.6.3";
version = "0.6.5";
src = fetchFromGitHub {
owner = "antroids";
repo = "application-title-bar";
rev = "v${finalAttrs.version}";
hash = "sha256-r15wZCioWrTr5mA0WARFd4j8zwWIWU4wEv899RSURa4=";
hash = "sha256-hA8aK2rd53VyYQnR0SG4KfwycCqT1EYB7iAJvkDGvYs=";
};
propagatedUserEnvPkgs = with kdePackages; [ kconfig ];

View File

@ -5,7 +5,6 @@
runCommand,
buildNpmPackage,
nodejs_18,
tone,
ffmpeg-full,
util-linux,
python3,
@ -42,7 +41,7 @@ let
};
wrapper = import ./wrapper.nix {
inherit stdenv ffmpeg-full tone pname nodejs getopt;
inherit stdenv ffmpeg-full pname nodejs getopt;
};
in buildNpmPackage {

View File

@ -1,9 +1,9 @@
{
"owner": "advplyr",
"repo": "audiobookshelf",
"rev": "964ef910b670f90456d8405a2f1bc9c97cd59cae",
"hash": "sha256-BWMs+SUaPg0Bi5eyD9sV8pLFO0ZGbUFO+B6GXUsPj7k=",
"version": "2.10.1",
"depsHash": "sha256-MAHkvrUztztkhSc8Gjr2YIuHKonuLO6T0YziNOyzVTM=",
"clientDepsHash": "sha256-rd6pes/08qwEM90YkFDY53koQbbjrftNmTJIRKJ3tGw="
"rev": "93114b2181d1ee5f0026fcf04c0a2946e3e96641",
"hash": "sha256-WrXbckMCysHgCl+ji0vCYoGu2DcjRf9wfSxzPYu7uZ8=",
"version": "2.11.0",
"depsHash": "sha256-B9ADqBGFfgNvWUgm6P+Tpg3N/tyBmeL5pyYXFTiBYpc=",
"clientDepsHash": "sha256-EvTUvynnukEzgC/y8v7BHj3oV5U9SeLjF+lAueS36D0="
}

View File

@ -1,4 +1,4 @@
{ stdenv, ffmpeg-full, tone, pname, nodejs, getopt }: ''
{ stdenv, ffmpeg-full, pname, nodejs, getopt }: ''
#!${stdenv.shell}
port=8000
@ -54,7 +54,6 @@
SOURCE=nixpkgs \
FFMPEG_PATH=${ffmpeg-full}/bin/ffmpeg \
FFPROBE_PATH=${ffmpeg-full}/bin/ffprobe \
TONE_PATH=${tone}/bin/tone \
CONFIG_PATH="$config" \
METADATA_PATH="$metadata" \
PORT="$port" \

View File

@ -4,14 +4,14 @@ buildGoModule {
pname = "authentik-ldap-outpost";
inherit (authentik) version src;
vendorHash = "sha256-UIJBCTq7AJGUDIlZtJaWCovyxlMPzj2BCJQqthybEz4=";
vendorHash = "sha256-hxtyXyCfVemsjYQeo//gd68x4QO/4Vcww8i2ocsUVW8=";
CGO_ENABLED = 0;
subPackages = [ "cmd/ldap" ];
meta = authentik.meta // {
description = "Authentik ldap outpost. Needed for the extendal ldap API";
description = "The authentik ldap outpost. Needed for the external ldap API.";
homepage = "https://goauthentik.io/docs/providers/ldap/";
mainProgram = "ldap";
};

View File

@ -1,5 +1,4 @@
{ callPackage }:
{
{ callPackage }: {
ldap = callPackage ./ldap.nix { };
radius = callPackage ./radius.nix { };
}

View File

@ -1,23 +1,25 @@
{ lib
, stdenvNoCC
, callPackages
, fetchFromGitHub
, fetchzip
, buildNpmPackage
, buildGoModule
, runCommand
, openapi-generator-cli
, nodejs
, python3
, python312
, codespell
, makeWrapper }:
let
version = "2024.2.2";
version = "2024.6.0";
src = fetchFromGitHub {
owner = "goauthentik";
repo = "authentik";
rev = "version/${version}";
hash = "sha256-2B1RgKY5tpDBdzguEyWqzg15w5x/dLS2ffjbnxbpINs=";
hash = "sha256-eYxabUUQVeURrVAaF/Ecohzw9LJj0LZyCSM43gNvajY=";
};
meta = with lib; {
@ -32,7 +34,7 @@ let
website = buildNpmPackage {
pname = "authentik-website";
inherit version src meta;
npmDepsHash = "sha256-paACBXG7hEQSLekxCvxNns2Tg9rN3DUgz6o3A/lAhA8=";
npmDepsHash = "sha256-JM+ae+zDsMdvovd2p4IJIH89KlMeDU7HOZjFbDCyehw=";
NODE_ENV = "production";
NODE_OPTIONS = "--openssl-legacy-provider";
@ -42,11 +44,12 @@ let
'';
installPhase = ''
cp -r help $out
mkdir $out
cp -r build $out/help
'';
npmInstallFlags = [ "--include=dev" ];
npmBuildScript = "build-docs-only";
npmBuildScript = "build-bundled";
npmFlags = [ "--ignore-scripts" ];
};
clientapi = stdenvNoCC.mkDerivation {
@ -79,10 +82,11 @@ let
src = runCommand "authentik-webui-source" {} ''
mkdir -p $out/web/node_modules/@goauthentik/
cp -r ${src}/web $out/
ln -s ${src}/package.json $out/
ln -s ${src}/website $out/
ln -s ${clientapi} $out/web/node_modules/@goauthentik/api
'';
npmDepsHash = "sha256-Xtzs91m+qu7jTwr0tMeS74gjlZs4vufGGlplPVf9yew=";
npmDepsHash = "sha256-LAy2o/gs9lwbZT4NqD2GSsx7PCipnkthwnX9ICVpAWU=";
postPatch = ''
cd web
@ -102,7 +106,7 @@ let
npmInstallFlags = [ "--include=dev" ];
};
python = python3.override {
python = python312.override {
self = python;
packageOverrides = final: prev: {
django-tenants = prev.buildPythonPackage rec {
@ -117,32 +121,105 @@ let
format = "setuptools";
doCheck = false; # Tests require postgres
propagatedBuildInputs = with prev; [
propagatedBuildInputs = with final; [
django
psycopg
gunicorn
];
};
django-cte = prev.buildPythonPackage rec {
pname = "django-cte";
version = "1.3.3";
src = fetchFromGitHub {
owner = "dimagi";
repo = pname;
rev = "v${version}";
hash = "sha256-OCENg94xHBeeE4A2838Cu3q2am2im2X4SkFSjc6DuhE=";
};
doCheck = false; # Tests require postgres
format = "setuptools";
};
django-pgactivity = prev.buildPythonPackage rec {
pname = "django-pgactivity";
version = "1.4.1";
src = fetchFromGitHub {
owner = "Opus10";
repo = pname;
rev = version;
hash = "sha256-VwH7fwLcoH2Z9D/OY9iieM0cRhyDKOpAzqQ+4YVE3vU=";
};
nativeBuildInputs = with prev; [
poetry-core
];
propagatedBuildInputs = with final; [
django
];
pyproject = true;
};
django-pglock = prev.buildPythonPackage rec {
pname = "django-pglock";
version = "1.5.1";
src = fetchFromGitHub {
owner = "Opus10";
repo = pname;
rev = version;
hash = "sha256-ZoEHDkGmrcNiMe/rbwXsEPZo3LD93cZp6zjftMKjLeg=";
};
nativeBuildInputs = with prev; [
poetry-core
];
propagatedBuildInputs = with final; [
django
django-pgactivity
];
pyproject = true;
};
tenant-schemas-celery = prev.buildPythonPackage rec {
pname = "tenant-schemas-celery";
version = "2.2.0";
version = "3.0.0";
src = fetchFromGitHub {
owner = "maciej-gol";
repo = pname;
rev = version;
hash = "sha256-OpIJobjWZE5GQGnHADioeoJo3A6DAKh0HdO10k4rsX4=";
hash = "sha256-3ZUXSAOBMtj72sk/VwPV24ysQK+E4l1HdwKa78xrDtg=";
};
format = "setuptools";
doCheck = false;
propagatedBuildInputs = with prev; [
propagatedBuildInputs = with final; [
freezegun
more-itertools
psycopg2
];
};
scim2-filter-parser = prev.buildPythonPackage rec {
pname = "scim2-filter-parser";
version = "0.5.1";
# For some reason the normal fetchPypi does not work
src = fetchzip {
url = "https://files.pythonhosted.org/packages/54/df/ad9718acce76e81a93c57327356eecd23701625f240fbe03d305250399e6/scim2_filter_parser-0.5.1.tar.gz";
hash = "sha256-DZAdRj6qyySggsvJZC47vdvXbHrB1ra3qiYBEUiceJ4=";
};
postPatch = ''
substituteInPlace pyproject.toml \
--replace-fail 'poetry>=0.12' 'poetry-core>=1.0.0' \
--replace-fail 'poetry.masonry.api' 'poetry.core.masonry.api'
'';
nativeBuildInputs = [ prev.poetry-core ];
pyproject = true;
propagatedBuildInputs = with final; [
sly
];
};
authentik-django = prev.buildPythonPackage {
pname = "authentik-django";
inherit version src meta;
@ -157,9 +234,8 @@ let
--replace-fail './media' '/var/lib/authentik/media'
substituteInPlace pyproject.toml \
--replace-fail 'dumb-init = "*"' "" \
--replace-fail 'djangorestframework-guardian' 'djangorestframework-guardian2' \
--replace-fail 'version = "4.9.4"' 'version = "*"' \
--replace-fail 'version = "<2"' 'version = "*"'
--replace-fail 'djangorestframework = "3.14.0"' 'djangorestframework = "*"' \
--replace-fail 'djangorestframework-guardian' 'djangorestframework-guardian2'
substituteInPlace authentik/stages/email/utils.py \
--replace-fail 'web/' '${webui}/'
'';
@ -177,9 +253,11 @@ let
deepmerge
defusedxml
django
django-cte
django-filter
django-guardian
django-model-utils
django-pglock
django-prometheus
django-redis
django-storages
@ -190,14 +268,16 @@ let
drf-spectacular
duo-client
facebook-sdk
fido2
flower
geoip2
google-api-python-client
gunicorn
httptools
jsonpatch
kubernetes
ldap3
lxml
jsonpatch
msgraph-sdk
opencontainers
packaging
paramiko
@ -208,8 +288,10 @@ let
pyjwt
pyyaml
requests-oauthlib
scim2-filter-parser
sentry-sdk
service-identity
setproctitle
structlog
swagger-spec-validator
tenant-schemas-celery
@ -218,7 +300,6 @@ let
ua-parser
urllib3
uvicorn
uvloop
watchdog
webauthn
websockets
@ -258,7 +339,7 @@ let
CGO_ENABLED = 0;
vendorHash = "sha256-UIJBCTq7AJGUDIlZtJaWCovyxlMPzj2BCJQqthybEz4=";
vendorHash = "sha256-hxtyXyCfVemsjYQeo//gd68x4QO/4Vcww8i2ocsUVW8=";
postInstall = ''
mv $out/bin/server $out/bin/authentik
@ -294,6 +375,8 @@ in stdenvNoCC.mkDerivation {
runHook postInstall
'';
passthru.outposts = callPackages ./outposts.nix { };
nativeBuildInputs = [ makeWrapper ];
meta = meta // {

View File

@ -0,0 +1,18 @@
{ lib, buildGoModule, authentik }:
buildGoModule {
pname = "authentik-radius-outpost";
inherit (authentik) version src;
vendorHash = "sha256-hxtyXyCfVemsjYQeo//gd68x4QO/4Vcww8i2ocsUVW8=";
CGO_ENABLED = 0;
subPackages = [ "cmd/radius" ];
meta = authentik.meta // {
description = "Authentik radius outpost which is used for the external radius API";
homepage = "https://goauthentik.io/docs/providers/radius/";
mainProgram = "radius";
};
}

View File

@ -0,0 +1,55 @@
{
lib,
stdenvNoCC,
fetchurl,
jre,
rhino,
stripJavaArchivesHook,
makeWrapper,
}:
stdenvNoCC.mkDerivation (finalAttrs: {
pname = "batik";
version = "1.17";
src = fetchurl {
url = "mirror://apache/xmlgraphics/batik/binaries/batik-bin-${finalAttrs.version}.tar.gz";
hash = "sha256-sEJphF3grlwZCEt3gHHm4JF8RpvKKBLLvKXf2lu/dhA=";
};
nativeBuildInputs = [
stripJavaArchivesHook
makeWrapper
];
buildInputs = [
jre
rhino
];
patchPhase = ''
# Vendored dependencies
rm lib/rhino-*.jar
'';
installPhase = ''
mkdir -p $out/bin $out/share/java
cp *.jar lib/*.jar $out/share/java
chmod +x $out/share/java/*.jar
classpath="$(find $out/share/java -name '*.jar' -printf '${rhino}/share/java/js.jar:%h/%f')"
for appName in rasterizer slideshow squiggle svgpp ttf2svg; do
makeWrapper ${lib.getExe jre} $out/bin/batik-$appName \
--add-flags "-jar $out/share/java/batik-all-${finalAttrs.version}.jar" \
--add-flags "-classpath $classpath" \
--add-flags "org.apache.batik.apps.$appName.Main"
done
'';
meta = with lib; {
description = "Java based toolkit for handling SVG";
homepage = "https://xmlgraphics.apache.org/batik";
license = licenses.asl20;
platforms = platforms.unix;
sourceProvenance = with sourceTypes; [ binaryBytecode ];
};
})

View File

@ -1,92 +0,0 @@
From f76ad4da12e6a65550d564bb626a1429ae75433a Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Thomas=20M=C3=BChlbacher?= <tmuehlbacher@posteo.net>
Date: Thu, 9 May 2024 23:52:47 +0200
Subject: [PATCH 1/2] `check_for_key` before `ask_for_passphrase`
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
let's always first check if there is already a key in the keyring
available before we try to get the key from some more involved means.
Fixes: #261
Signed-off-by: Thomas Mühlbacher <tmuehlbacher@posteo.net>
---
src/commands/mount.rs | 13 +++++++++++--
src/key.rs | 4 +++-
2 files changed, 14 insertions(+), 3 deletions(-)
diff --git a/src/commands/mount.rs b/src/commands/mount.rs
index 9414c77f..34a741cb 100644
--- a/src/commands/mount.rs
+++ b/src/commands/mount.rs
@@ -344,8 +344,17 @@ fn cmd_mount_inner(opt: Cli) -> anyhow::Result<()> {
if block_devices_to_mount.len() == 0 {
Err(anyhow::anyhow!("No device found from specified parameters"))?;
}
- // Check if the filesystem's master key is encrypted
- if unsafe { bcachefs::bch2_sb_is_encrypted_and_locked(block_devices_to_mount[0].sb) } {
+
+ let key_name = CString::new(format!(
+ "bcachefs:{}",
+ block_devices_to_mount[0].sb().uuid()
+ ))
+ .unwrap();
+
+ // Check if the filesystem's master key is encrypted and we don't have a key
+ if unsafe { bcachefs::bch2_sb_is_encrypted_and_locked(block_devices_to_mount[0].sb) }
+ && !key::check_for_key(&key_name)?
+ {
// First by password_file, if available
let fallback_to_unlock_policy = if let Some(passphrase_file) = &opt.passphrase_file {
match key::read_from_passphrase_file(&block_devices_to_mount[0], passphrase_file.as_path()) {
diff --git a/src/key.rs b/src/key.rs
index d0018805..568b3cdb 100644
--- a/src/key.rs
+++ b/src/key.rs
@@ -58,7 +58,7 @@ impl fmt::Display for UnlockPolicy {
}
}
-fn check_for_key(key_name: &std::ffi::CStr) -> anyhow::Result<bool> {
+pub fn check_for_key(key_name: &std::ffi::CStr) -> anyhow::Result<bool> {
use bch_bindgen::keyutils::{self, keyctl_search};
let key_name = key_name.to_bytes_with_nul().as_ptr() as *const _;
let key_type = c_str!("user");
@@ -86,10 +86,12 @@ fn wait_for_unlock(uuid: &uuid::Uuid) -> anyhow::Result<()> {
}
}
+// blocks indefinitely if no input is available on stdin
fn ask_for_passphrase(sb: &bch_sb_handle) -> anyhow::Result<()> {
let passphrase = if stdin().is_terminal() {
rpassword::prompt_password("Enter passphrase: ")?
} else {
+ info!("Trying to read passphrase from stdin...");
let mut line = String::new();
stdin().read_line(&mut line)?;
line
From 734ccc58f42c3cccb0960bdd84808839e2b62ca9 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Thomas=20M=C3=BChlbacher?= <tmuehlbacher@posteo.net>
Date: Sun, 12 May 2024 19:39:19 +0200
Subject: [PATCH 2/2] fix unfortunate typo
causes mounting encrypted devices to become stuck in a busy loop.
---
include/crypto/skcipher.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/include/crypto/skcipher.h b/include/crypto/skcipher.h
index 70905a5a..833729dc 100644
--- a/include/crypto/skcipher.h
+++ b/include/crypto/skcipher.h
@@ -112,7 +112,7 @@ static inline void skcipher_request_set_sync_tfm(struct skcipher_request *req,
skcipher_request_set_tfm(req, &tfm->base);
}
-#define skcipher_request_set_callback(...) do {} while (9)
+#define skcipher_request_set_callback(...) do {} while (0)
static inline void skcipher_request_set_crypt(
struct skcipher_request *req,

View File

@ -27,15 +27,13 @@
stdenv.mkDerivation (finalAttrs: {
pname = "bcachefs-tools";
version = "1.7.0-unstable-2024-05-09";
version = "1.9.2";
src = fetchFromGitHub {
owner = "koverstreet";
repo = "bcachefs-tools";
# FIXME: switch to a tagged release once available > 1.7.0
# Fix for https://github.com/NixOS/nixpkgs/issues/313350
rev = "3ac510f6a41feb1b695381fa30869d557c00b822";
hash = "sha256-ZmkeYPiCy7vkXnMFbtUF4761K+I+Ef7UbmSY7dJG09U=";
rev = "refs/tags/v${finalAttrs.version}";
hash = "sha256-1GsRBAVAfD0SAM1gk8W+bX7MtxunGKOLtXweL4rrf9Q=";
};
nativeBuildInputs = [
@ -63,7 +61,7 @@ stdenv.mkDerivation (finalAttrs: {
cargoDeps = rustPlatform.fetchCargoTarball {
src = finalAttrs.src;
hash = "sha256-RsRz/nb8L+pL1U4l6RnvqeDFddPvcBFH4wdV7G60pxA=";
hash = "sha256-rabiNqw4hg0Js8VadxfkhNLIsrKfMuoKa5lFIfSMNPY=";
};
makeFlags = [
@ -80,18 +78,6 @@ stdenv.mkDerivation (finalAttrs: {
# FIXME: Try enabling this once the default linux kernel is at least 6.7
doCheck = false; # needs bcachefs module loaded on builder
patches = [
# code refactoring of bcachefs-tools broke reading passphrases from stdin (vs. terminal)
# upstream issue https://github.com/koverstreet/bcachefs-tools/issues/261
./fix-encrypted-boot.patch
# https://github.com/koverstreet/bcachefs-tools/pull/305
(fetchpatch {
name = "use-ar-var-in-makefile.patch";
url = "https://github.com/koverstreet/bcachefs-tools/commit/91e67ab2bd48fa135a1f5109b23899a4f1019a03.patch";
sha256 = "sha256-nB4Tgcwa8eeasIDQ4rrYORie/X8LMuCSRi+WJNw+R/U=";
})
];
postPatch = ''
substituteInPlace Makefile \
--replace-fail "target/release/bcachefs" "target/${stdenv.hostPlatform.rust.rustcTargetSpec}/release/bcachefs"

View File

@ -139,7 +139,7 @@ in buildNpmPackage rec {
pushd ${cargoRoot}
export HOME=$(mktemp -d)
export -f cargoCheckHook runHook _eval _callImplicitHook
export -f cargoCheckHook runHook _eval _callImplicitHook _logHook
export cargoCheckType=release
dbus-run-session \
--config-file=${dbus}/share/dbus-1/session.conf \

View File

@ -0,0 +1,39 @@
{
lib,
stdenv,
fetchFromGitHub,
cmake,
asmjit,
}:
stdenv.mkDerivation {
pname = "blend2d";
# Note: this is an outdated version for pdf4qt, but vcpkg also uses it
# See 'Commit Hashes' in https://blend2d.com/download.html for newest
# If the newest version is needed, we can rename this package.
version = "0.10";
src = fetchFromGitHub {
owner = "blend2d";
repo = "blend2d";
rev = "452d549751188b04367b5af46c040cb737f5f76c";
hash = "sha256-LDhnXsp/V1A3YqVyjBVaL7/V6Nhts/1E9hRhl2P293o=";
};
outputs = [
"out"
"dev"
];
nativeBuildInputs = [ cmake ];
cmakeFlags = [ (lib.cmakeFeature "ASMJIT_DIR" (toString asmjit.src)) ];
meta = {
description = "2D Vector Graphics Engine Powered by a JIT Compiler";
homepage = "https://blend2d.com";
license = lib.licenses.zlib;
maintainers = with lib.maintainers; [ aleksana ];
platforms = lib.platforms.all;
};
}

View File

@ -7,7 +7,7 @@
imagemagick,
copyDesktopItems,
makeDesktopItem,
electron
electron,
}:
let
@ -15,13 +15,13 @@ let
in
buildNpmPackage rec {
pname = "blockbench";
version = "4.10.2";
version = "4.10.4";
src = fetchFromGitHub {
owner = "JannisX11";
repo = "blockbench";
rev = "v${version}";
hash = "sha256-Ch+vPSvdqfJF2gNgZN2x5KSY1S1CYfHCyMyUf4W+Vn8=";
hash = "sha256-TjT93nx52PxuHuW4NONTfI3G7+Dl0NFX2aKpZDEF8+8=";
};
nativeBuildInputs =
@ -31,7 +31,7 @@ buildNpmPackage rec {
copyDesktopItems
];
npmDepsHash = "sha256-au6GzBTxPcYcqrPEnQ+yEhVRdAbiUa/Ocq7UCPdiox4=";
npmDepsHash = "sha256-WkOn1bLJ9xmJdQcY6ak+hs/YW+crIXhTWA6tjMSVq9I=";
env.ELECTRON_SKIP_BINARY_DOWNLOAD = 1;
@ -69,7 +69,7 @@ buildNpmPackage rec {
for size in 16 32 48 64 128 256 512; do
mkdir -p $out/share/icons/hicolor/"$size"x"$size"/apps
convert -resize "$size"x"$size" icon.png $out/share/icons/hicolor/"$size"x"$size"/apps/blockbench.png
magick convert -resize "$size"x"$size" icon.png $out/share/icons/hicolor/"$size"x"$size"/apps/blockbench.png
done
makeWrapper ${lib.getExe electron} $out/bin/blockbench \
@ -101,8 +101,6 @@ buildNpmPackage rec {
homepage = "https://blockbench.net/";
license = lib.licenses.gpl3Only;
mainProgram = "blockbench";
maintainers = with lib.maintainers; [
tomasajt
];
maintainers = with lib.maintainers; [ tomasajt ];
};
}

View File

@ -31,7 +31,7 @@ stdenvNoCC.mkDerivation (finalAttrs: {
homepage = "https://github.com/jnross/Bluetility";
license = licenses.mit;
sourceProvenance = with lib.sourceTypes; [ binaryNativeCode ];
maintainers = with maintainers; [ emilytrau Enzime ];
maintainers = with maintainers; [ emilytrau ];
platforms = platforms.darwin;
};
})

View File

@ -1,6 +1,7 @@
{ lib
, fetchFromGitHub
, nixosTests
, nix-update-script
, python3
}:
@ -13,28 +14,33 @@ let
in
python.pkgs.buildPythonApplication rec {
pname = "calibre-web";
version = "0.6.21";
version = "0.6.22";
src = fetchFromGitHub {
owner = "janeczku";
repo = "calibre-web";
rev = version;
hash = "sha256-tRrOquetn3P2NmrXq7DQHRGP1sWnLR7bV2Lw0W/lUPQ=";
hash = "sha256-nWZmDasBH+DW/+Cvw510mOv11CXorRnoBwNFpoKPErY=";
};
propagatedBuildInputs = with python.pkgs; [
apscheduler
advocate
apscheduler
babel
bleach
chardet
flask
flask-babel
flask-limiter
flask-login
flask-principal
flask-wtf
flask-limiter
iso-639
jsonschema
lxml
pypdf
python-magic
pytz
regex
requests
sqlalchemy
tornado
@ -54,36 +60,23 @@ python.pkgs.buildPythonApplication rec {
./db-migrations.patch
];
# calibre-web doesn't follow setuptools directory structure. The following is taken from the script
# that calibre-web's maintainer is using to package it:
# https://github.com/OzzieIsaacs/calibre-web-test/blob/master/build/make_release.py
# calibre-web doesn't follow setuptools directory structure.
postPatch = ''
mkdir -p src/calibreweb
mv cps.py src/calibreweb/__init__.py
mv cps src/calibreweb
sed -i "/backports_abc/d" setup.cfg
substituteInPlace setup.cfg \
--replace "cps = calibreweb:main" "calibre-web = calibreweb:main" \
--replace "APScheduler>=3.6.3,<3.10.0" "APScheduler>=3.6.3" \
--replace "chardet>=3.0.0,<4.1.0" "chardet>=3.0.0,<6" \
--replace "Flask>=1.0.2,<2.1.0" "Flask>=1.0.2" \
--replace "Flask-Babel>=0.11.1,<3.1.0" "Flask-Babel>=0.11.1" \
--replace "Flask-Login>=0.3.2,<0.6.2" "Flask-Login>=0.3.2" \
--replace "flask-wtf>=0.14.2,<1.1.0" "flask-wtf>=0.14.2" \
--replace "lxml>=3.8.0,<4.9.0" "lxml>=3.8.0" \
--replace "tornado>=4.1,<6.2" "tornado>=4.1,<7" \
--replace "PyPDF>=3.0.0,<3.6.0" "PyPDF>=3.0.0" \
--replace "requests>=2.11.1,<2.29.0" "requests" \
--replace "unidecode>=0.04.19,<1.4.0" "unidecode>=0.04.19" \
--replace "werkzeug<2.1.0" ""
--replace-fail "cps = calibreweb:main" "calibre-web = calibreweb:main"
'';
# Upstream repo doesn't provide any tests.
doCheck = false;
passthru.tests.calibre-web = nixosTests.calibre-web;
passthru = {
tests.calibre-web = nixosTests.calibre-web;
updateScript = nix-update-script { };
};
meta = with lib; {
description = "Web app for browsing, reading and downloading eBooks stored in a Calibre database";

View File

@ -20,13 +20,13 @@ let
in
stdenv.mkDerivation (finalAttrs: {
pname = "castxml";
version = "0.6.6";
version = "0.6.8";
src = fetchFromGitHub {
owner = "CastXML";
repo = "CastXML";
rev = "v${finalAttrs.version}";
hash = "sha256-icTos9HboZXvojQPX+pRkpBYiZ5SXSMb9XtvRnXNHuo=";
hash = "sha256-J4Z/NjCVOq4QS7ncCi87P5YPgqRwFyDAc14uS5T7s6M=";
};
nativeBuildInputs = [

View File

@ -12,7 +12,7 @@
stdenvNoCC.mkDerivation (finalAttrs: {
pname = "dbeaver-bin";
version = "24.1.1";
version = "24.1.2";
src =
let
@ -25,10 +25,10 @@ stdenvNoCC.mkDerivation (finalAttrs: {
aarch64-darwin = "macos-aarch64.dmg";
};
hash = selectSystem {
x86_64-linux = "sha256-33W7uDxzfAQ5gH10sI4IbzmHl8SxQLYj88C/BGOoRks=";
aarch64-linux = "sha256-ZAr9vymCdLFAYiXEXtT+97x1tY5mrbr2N6INj4Bp4Nk=";
x86_64-darwin = "sha256-dgOtufARRVmwtXl+csmr2sMBzDvq+5XRotOQrTz8jys=";
aarch64-darwin = "sha256-R5TQJq+sRUFHH8EuaXgeSJUOnhepbCJLTUmO0FMOgzE=";
x86_64-linux = "sha256-TQZl5TEAAEeC+/dK4F7nbyPOU3YuXheLwrFY/8eGtoA=";
aarch64-linux = "sha256-fnIRQsqg6WxD4ptxJT04jvaqDe7jPJ/zVnBL7k9ph38=";
x86_64-darwin = "sha256-gwkCsVdSiWCCd0B3FiSvVnZiPJfWtnAgrAVPZh+nko0=";
aarch64-darwin = "sha256-QXG/5AfEQNFDcQhV+oK117bKZnSZ32P4NB4p+qUKQIM=";
};
in
fetchurl {

View File

@ -142,7 +142,7 @@ stdenv.mkDerivation rec {
description = "Photo Management Program";
license = licenses.gpl2;
homepage = "https://www.digikam.org";
maintainers = with maintainers; [ spacefault ];
maintainers = with maintainers; [ ];
platforms = platforms.linux;
mainProgram = "digikam";
};

View File

@ -0,0 +1,74 @@
{
stdenv,
lib,
cmake,
glibc,
gfortran,
makeWrapper,
fetchFromGitHub,
fetchpatch,
dos2unix,
dataRepo ? fetchFromGitHub {
owner = "DSSAT";
repo = "dssat-csm-data";
rev = "v4.8.2.8";
hash = "sha256-hbSBKEvdSd1lfbemfp4Lk4/JcGMXGVjm1x7P7lmmuA0=";
},
}:
let
# Temporary patch to fix 80 chars limit on paths
# https://github.com/DSSAT/dssat-csm-os/pull/417/
charLimitPatch = fetchpatch {
url = "https://github.com/DSSAT/dssat-csm-os/pull/417/commits/9215012a297c074f392b5e7eb90b8c20495f13f7.patch";
hash = "sha256-WwJR5lnWtR3aYWZmk8pBC0/qaRqY0UrWHIaYp2ajImE=";
};
in
stdenv.mkDerivation (final: {
pname = "dssat";
version = "4.8.2.12";
src = fetchFromGitHub {
owner = "DSSAT";
repo = "dssat-csm-os";
rev = "refs/tags/v${final.version}";
sha256 = "sha256-8OaTM7IXFZjlelx5O4O+bVNQj4dIhGzIk2iCfpqI8uA=";
};
# maintainers are on windows and have CRLF endings in their files
# And github returns a patch file in unix format only.
patchPhase = ''
runHook prePatch
cp ${charLimitPatch} ./limit-path.patch
unix2dos ./limit-path.patch
patch --binary -p1 < ./limit-path.patch
runHook postPatch
'';
nativeBuildInputs = [
cmake
dos2unix
gfortran
makeWrapper
];
buildInputs = lib.optionals stdenv.isLinux [ glibc.static ];
cmakeFlags = [ "-DCMAKE_INSTALL_PREFIX=${placeholder "out"}/share/dssat/" ];
postInstall = ''
mkdir -p $out/share/dssat/Data
cp -r $src/Data/* $out/share/dssat/Data/
cp -r ${dataRepo}/* $out/share/dssat/Data/
makeWrapper $out/share/dssat/dscsm048 $out/bin/dscsm048
'';
meta = {
homepage = "https://github.com/DSSAT/dssat-csm-os";
description = "Cropping System Model";
mainProgram = "dscsm048";
license = lib.licenses.bsd3;
maintainers = with lib.maintainers; [ pcboy ];
platforms = lib.platforms.unix;
broken = stdenv.isAarch64 && stdenv.isLinux;
};
})

View File

@ -1,53 +1,59 @@
{ lib
, stdenv
, appstream-glib
, desktop-file-utils
, deepfilternet
, fetchFromGitHub
, calf
, fftw
, fftwFloat
, fmt_9
, glib
, gsl
, gtk4
, itstool
, ladspaH
, libadwaita
, libbs2b
, libebur128
, libportal-gtk4
, libsamplerate
, libsigcxx30
, libsndfile
, lilv
, lsp-plugins
, lv2
, mda_lv2
, meson
, ninja
, nlohmann_json
, pipewire
, pkg-config
, rnnoise
, rubberband
, speexdsp
, soundtouch
, tbb
, wrapGAppsHook4
, zam-plugins
, zita-convolver
{
lib,
stdenv,
fetchFromGitHub,
appstream-glib,
calf,
deepfilternet,
desktop-file-utils,
fftw,
fftwFloat,
fmt_9,
glib,
gsl,
gtk4,
itstool,
ladspaH,
libadwaita,
libbs2b,
libebur128,
libportal-gtk4,
libsamplerate,
libsigcxx30,
libsndfile,
lilv,
lsp-plugins,
lv2,
mda_lv2,
meson,
ninja,
nix-update-script,
nlohmann_json,
pipewire,
pkg-config,
rnnoise,
rubberband,
speexdsp,
soundtouch,
tbb,
wrapGAppsHook4,
zam-plugins,
zita-convolver,
}:
let
# Fix crashes with speexdsp effects
speexdsp' = speexdsp.override { withFftw3 = false; };
in
stdenv.mkDerivation rec {
pname = "easyeffects";
version = "7.1.6";
version = "7.1.7";
src = fetchFromGitHub {
owner = "wwmm";
repo = "easyeffects";
rev = "v${version}";
hash = "sha256-NViRZHNgsweoD1YbyWYrRTZPKTCkKk3fGDLLYDD7JfA=";
hash = "sha256-y7we7/MQWweAoZkM8SuHiOTVyWFj9/foufLYBum/KKc=";
};
nativeBuildInputs = [
@ -83,7 +89,7 @@ stdenv.mkDerivation rec {
rnnoise
rubberband
soundtouch
speexdsp
speexdsp'
tbb
zita-convolver
];
@ -110,13 +116,17 @@ stdenv.mkDerivation rec {
separateDebugInfo = true;
meta = with lib; {
changelog = "https://github.com/wwmm/easyeffects/blob/v${version}/CHANGELOG.md";
passthru = {
updateScript = nix-update-script { };
};
meta = {
description = "Audio effects for PipeWire applications";
homepage = "https://github.com/wwmm/easyeffects";
license = licenses.gpl3Plus;
maintainers = with maintainers; [ ];
platforms = platforms.linux;
changelog = "https://github.com/wwmm/easyeffects/blob/v${version}/CHANGELOG.md";
license = lib.licenses.gpl3Plus;
maintainers = with lib.maintainers; [ getchoo ];
mainProgram = "easyeffects";
platforms = lib.platforms.linux;
};
}

View File

@ -1,7 +1,9 @@
{ lib,
buildGoModule,
fetchFromGitHub,
nix-update-script
{
lib,
buildGoModule,
fetchFromGitHub,
nix-update-script,
nixosTests,
}:
buildGoModule rec {
@ -10,7 +12,7 @@ buildGoModule rec {
src = fetchFromGitHub {
owner = "glanceapp";
repo = pname;
repo = "glance";
rev = "v${version}";
hash = "sha256-37DmLZ8ESJwB2R8o5WjeypKsCQwarF3x8UYz1OQT/tM=";
};
@ -19,14 +21,19 @@ buildGoModule rec {
excludedPackages = [ "scripts/build-and-ship" ];
passthru.updateScript = nix-update-script { };
passthru = {
updateScript = nix-update-script { };
tests = {
service = nixosTests.glance;
};
};
meta = with lib; {
meta = {
homepage = "https://github.com/glanceapp/glance";
changelog = "https://github.com/glanceapp/glance/releases/tag/v${version}";
description = "Self-hosted dashboard that puts all your feeds in one place";
mainProgram = "glance";
license = licenses.agpl3Only;
maintainers = with maintainers; [ dvn0 ];
license = lib.licenses.agpl3Only;
maintainers = with lib.maintainers; [ dvn0 ];
};
}

View File

@ -1,37 +1,36 @@
{ lib
, stdenv
, fetchFromGitHub
, nix-update-script
, qt5
{
lib,
stdenv,
fetchFromGitHub,
nix-update-script,
qt5,
, cmake
cmake,
, cairo
, ffmpeg
, freetype
, ghostscript
, glfw
, libjpeg
, libtiff
, qhull
, xorg
, zeromq
cairo,
ffmpeg,
freetype,
ghostscript,
glfw,
libjpeg,
libtiff,
qhull,
xorg,
zeromq,
}:
stdenv.mkDerivation rec {
pname = "gr-framework";
version = "0.73.5";
version = "0.73.6";
src = fetchFromGitHub {
owner = "sciapp";
repo = "gr";
rev = "v${version}";
hash = "sha256-9Py2r774GaUXWhF3yO3ceT1rPi/uqMVZVAo0xs9n+I0=";
hash = "sha256-XzOII13XwxkPZhtL4USkmUmJTL7dZImx4yVYJmhcn08=";
};
patches = [
./patches/use-the-module-mode-to-search-for-the-LibXml2-package.patch
];
patches = [ ./use-the-module-mode-to-search-for-the-LibXml2-package.patch ];
nativeBuildInputs = [
cmake
@ -64,7 +63,7 @@ stdenv.mkDerivation rec {
description = "GR framework is a graphics library for visualisation applications";
homepage = "https://gr-framework.org";
license = licenses.mit;
platforms = platforms.unix;
maintainers = with maintainers; [ paveloom ];
platforms = platforms.unix;
};
}

View File

@ -1,25 +0,0 @@
From 78a86da95c7227cbfd0f3073841df5409a576837 Mon Sep 17 00:00:00 2001
From: Pavel Sobolev <paveloomm@gmail.com>
Date: Wed, 31 Jan 2024 16:50:36 +0000
Subject: [PATCH] Use the module mode to search for the `LibXml2` package.
---
CMakeLists.txt | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/CMakeLists.txt b/CMakeLists.txt
index 5f865a5b..5550b493 100644
--- a/CMakeLists.txt
+++ b/CMakeLists.txt
@@ -117,7 +117,7 @@ if(GR_USE_BUNDLED_LIBRARIES)
# (`ONLY_CMAKE_FIND_ROOT_PATH` option is not inherited to `find_package` calls within the LibXml2 config file)
find_package(LibXml2 NO_MODULE ONLY_CMAKE_FIND_ROOT_PATH)
else()
- find_package(LibXml2 NO_MODULE)
+ find_package(LibXml2 MODULE)
endif()
# Find the following packages only in 3rdparty, if `GR_USE_BUNDLED_LIBRARIES` is set
--
2.42.0

View File

@ -0,0 +1,25 @@
From 47063bf00060dd6e8ccb384770a7c04dc534dce0 Mon Sep 17 00:00:00 2001
From: Pavel Sobolev <paveloomm@gmail.com>
Date: Wed, 19 Jun 2024 21:17:33 +0300
Subject: [PATCH] Use the module mode to search for the `LibXml2` package.
---
CMakeLists.txt | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/CMakeLists.txt b/CMakeLists.txt
index ed36d99d..6031dc77 100644
--- a/CMakeLists.txt
+++ b/CMakeLists.txt
@@ -123,7 +123,7 @@ else()
# Therefore, disable the inspection of the `PATH` variable by setting `NO_SYSTEM_ENVIRONMENT_PATH` option.
# See <https://cmake.org/cmake/help/v3.30/command/find_package.html#:~:text=Search the standard system environment
# variables> for more details.
- find_package(LibXml2 NO_MODULE NO_SYSTEM_ENVIRONMENT_PATH)
+ find_package(LibXml2 MODULE)
endif()
# Find the following packages only in 3rdparty, if `GR_USE_BUNDLED_LIBRARIES` is set
--
2.45.1

View File

@ -1,8 +1,24 @@
{ lib, stdenv, fetchFromGitHub, pkg-config, gtk2, lua, perl, python3Packages
, pciutils, dbus-glib, libcanberra-gtk2, libproxy
, enchant2, libnotify, openssl, isocodes
, desktop-file-utils
, meson, ninja, makeWrapper
{
dbus-glib,
desktop-file-utils,
enchant2,
fetchFromGitHub,
gtk2,
isocodes,
lib,
libcanberra-gtk2,
libnotify,
libproxy,
lua,
makeWrapper,
meson,
ninja,
openssl,
pciutils,
perl,
pkg-config,
python3Packages,
stdenv,
}:
stdenv.mkDerivation rec {
@ -13,17 +29,9 @@ stdenv.mkDerivation rec {
owner = "hexchat";
repo = "hexchat";
rev = "v${version}";
sha256 = "sha256-rgaXqXbBWlfSyz+CT0jRLyfGOR1cYYnRhEAu7AsaWus=";
hash = "sha256-rgaXqXbBWlfSyz+CT0jRLyfGOR1cYYnRhEAu7AsaWus=";
};
nativeBuildInputs = [ meson ninja pkg-config makeWrapper ];
buildInputs = [
gtk2 lua perl python3Packages.python python3Packages.cffi pciutils dbus-glib libcanberra-gtk2 libproxy
libnotify openssl desktop-file-utils
isocodes
];
#hexchat and hexchat-text loads enchant spell checking library at run time and so it needs to have route to the path
postPatch = ''
sed -i "s,libenchant-2.so.2,${enchant2}/lib/libenchant-2.so.2,g" src/fe-gtk/sexy-spell-entry.c
@ -39,17 +47,44 @@ stdenv.mkDerivation rec {
done
'';
mesonFlags = [ "-Dwith-lua=lua" "-Dtext-frontend=true" ];
mesonFlags = [
"-Dwith-lua=lua"
"-Dtext-frontend=true"
];
nativeBuildInputs = [
makeWrapper
meson
ninja
pkg-config
];
buildInputs = [
dbus-glib
desktop-file-utils
gtk2
isocodes
libcanberra-gtk2
libnotify
libproxy
lua
openssl
pciutils
perl
python3Packages.cffi
python3Packages.python
python3Packages.setuptools
];
postInstall = ''
wrapProgram $out/bin/hexchat --prefix PYTHONPATH : "$PYTHONPATH"
'';
meta = with lib; {
meta = {
description = "Popular and easy to use graphical IRC (chat) client";
homepage = "https://hexchat.github.io/";
license = licenses.gpl2;
platforms = platforms.linux;
maintainers = with maintainers; [ romildo ];
license = lib.licenses.gpl2;
platforms = lib.platforms.linux;
maintainers = with lib.maintainers; [ romildo ];
};
}

View File

@ -0,0 +1,47 @@
{
lib,
stdenv,
fetchFromGitHub,
mpi,
}:
stdenv.mkDerivation (finalAttrs: {
name = "hypre";
version = "2.31.0";
src = fetchFromGitHub {
owner = "hypre-space";
repo = "hypre";
rev = "refs/tags/v${finalAttrs.version}";
hash = "sha256-eFOyM3IzQUNm7cSnORA3NrKYotEBmLKC8mi+fcwPMQA=";
};
sourceRoot = "${finalAttrs.src.name}/src";
buildInputs = [ mpi ];
configureFlags = [
"--enable-mpi"
"--enable-shared"
];
preBuild = ''
makeFlagsArray+=(AR="ar -rcu")
'';
installPhase = ''
runHook preInstall
mkdir -p $out/{include,lib}
cp -r hypre/include/* $out/include
cp -r hypre/lib/* $out/lib
runHook postInstall
'';
meta = with lib; {
description = "Parallel solvers for sparse linear systems featuring multigrid methods.";
homepage = "https://computing.llnl.gov/projects/hypre-scalable-linear-solvers-multigrid-methods";
platforms = platforms.unix;
license = licenses.mit;
maintainers = with maintainers; [ mkez ];
};
})

View File

@ -7,6 +7,7 @@
libGL,
libxkbcommon,
hyprlang,
hyprutils,
pam,
wayland,
wayland-protocols,
@ -17,19 +18,18 @@
pango,
libdrm,
mesa,
unstableGitUpdater,
nix-update-script,
}:
stdenv.mkDerivation (finalAttrs: {
pname = "hyprlock";
version = "0.3.0-unstable-2024-04-24";
version = "0.4.0";
src = fetchFromGitHub {
owner = "hyprwm";
repo = "hyprlock";
# FIXME: Change to a stable release once available
rev = "415262065fff0a04b229cd00165f346a86a0a73a";
hash = "sha256-jla5Wo0Qt3NEnD0OjNj85BGw0pR4Zlz5uy8AqHH7tuE=";
rev = "v${finalAttrs.version}";
hash = "sha256-Dd/DK6FKiwVhr6PygCieEjzn7AFf6xijw6mdhquLnkw=";
};
strictDeps = true;
@ -43,6 +43,7 @@ stdenv.mkDerivation (finalAttrs: {
cairo
file
hyprlang
hyprutils
libdrm
libGL
libjpeg
@ -55,15 +56,13 @@ stdenv.mkDerivation (finalAttrs: {
wayland-protocols
];
passthru.updateScript = unstableGitUpdater {
tagPrefix = "v";
};
passthru.updateScript = nix-update-script { };
meta = {
description = "Hyprland's GPU-accelerated screen locking utility";
homepage = "https://github.com/hyprwm/hyprlock";
license = lib.licenses.bsd3;
maintainers = with lib.maintainers; [ ];
maintainers = with lib.maintainers; [ iynaix ];
mainProgram = "hyprlock";
platforms = [
"aarch64-linux"

View File

@ -75,6 +75,6 @@ python3Packages.buildPythonApplication rec {
description = "iCloud Photos Downloader";
license = licenses.mit;
mainProgram = "icloudpd";
maintainers = with maintainers; [ anpin Enzime jnsgruk ];
maintainers = with maintainers; [ anpin jnsgruk ];
};
}

View File

@ -3,15 +3,15 @@
}:
let
pname = "josm";
version = "19096";
version = "19128";
srcs = {
jar = fetchurl {
url = "https://josm.openstreetmap.de/download/josm-snapshot-${version}.jar";
hash = "sha256-oX9B98yj9WmTLGVnDO8hOJ/rYFMTLiTaz1dWufD1wqg=";
hash = "sha256-ndbU3QQ3EN3ufBT31+i/YsBsOGC8Bd4m2tAbWADD5Rk=";
};
macosx = fetchurl {
url = "https://josm.openstreetmap.de/download/macosx/josm-macos-${version}-java21.zip";
hash = "sha256-qOMSG2eAaMHCvJXYzG07Ngb6fR9MbFQI5+1xuxGbBVU=";
hash = "sha256-HhvOmlxzKtTt52kQJF8PLh6E/UIBgWpXxhkNeZrsH88=";
};
pkg = fetchsvn {
url = "https://josm.openstreetmap.de/svn/trunk/native/linux/tested";

View File

@ -7,7 +7,6 @@
libusb1,
libsoup_3,
webkitgtk_4_1,
writeShellScript,
makeDesktopItem,
copyDesktopItems,
}:
@ -26,11 +25,11 @@ let
in
stdenv.mkDerivation rec {
pname = "keymapp";
version = "1.2.1";
version = "1.3.0";
src = fetchurl {
url = "https://oryx.nyc3.cdn.digitaloceanspaces.com/keymapp/keymapp-${version}.tar.gz";
hash = "sha256-WiazQD40dG72B9tl4DwcMJgoVEl/Dgq55AHgeqK+sq8=";
hash = "sha256-kl/2faWbn1sF7AzgkyM6C9xzXTYh8HJf81xIY4Zf3IY=";
};
nativeBuildInputs = [

View File

@ -0,0 +1,52 @@
{
fetchFromGitHub,
gnome-themes-extra,
gtk-engine-murrine,
jdupes,
lib,
sassc,
stdenvNoCC,
}:
stdenvNoCC.mkDerivation rec {
pname = "lavanda-gtk-theme";
version = "2023-10-22";
src = fetchFromGitHub {
owner = "vinceliuice";
repo = "Lavanda-gtk-theme";
rev = version;
hash = "sha256-J243VVEqzg6o5dYLSCKPxWhUj5EKCnhvCHdia8EIfeQ=";
};
nativeBuildInputs = [
jdupes
sassc
];
buildInputs = [ gnome-themes-extra ];
propagatedUserEnvPkgs = [ gtk-engine-murrine ];
preInstall = ''
mkdir -p $out/share/themes
'';
installPhase = ''
runHook preInstall
bash install.sh -d $out/share/themes
jdupes --quiet --link-soft --recurse $out/share
runHook postInstall
'';
meta = with lib; {
description = "Lavanda gtk theme for linux desktops";
homepage = "https://github.com/vinceliuice/Lavanda-gtk-theme";
license = licenses.gpl3Plus;
platforms = platforms.linux;
maintainers = with maintainers; [ dretyuiop ];
};
}

View File

@ -97,21 +97,17 @@ let
llama-cpp-rpc = (llama-cpp-grpc.overrideAttrs (prev: {
name = "llama-cpp-rpc";
cmakeFlags = prev.cmakeFlags ++ [
(lib.cmakeBool "LLAMA_AVX" false)
(lib.cmakeBool "LLAMA_AVX2" false)
(lib.cmakeBool "LLAMA_AVX512" false)
(lib.cmakeBool "LLAMA_FMA" false)
(lib.cmakeBool "LLAMA_F16C" false)
(lib.cmakeBool "LLAMA_RPC" true)
(lib.cmakeBool "GGML_AVX" false)
(lib.cmakeBool "GGML_AVX2" false)
(lib.cmakeBool "GGML_AVX512" false)
(lib.cmakeBool "GGML_FMA" false)
(lib.cmakeBool "GGML_F16C" false)
];
postPatch = prev.postPatch + ''
sed -i examples/rpc/CMakeLists.txt \
-e '$a\install(TARGETS rpc-server RUNTIME)'
'';
})).override {
cudaSupport = false;
openclSupport = false;
blasSupport = false;
rpcSupport = true;
};
llama-cpp-grpc = (llama-cpp.overrideAttrs (final: prev: {
@ -119,8 +115,8 @@ let
src = fetchFromGitHub {
owner = "ggerganov";
repo = "llama.cpp";
rev = "37bef8943312d91183ff06d8f1214082a17344a5";
hash = "sha256-E3kCMDK5TXozBsprp4D581WHTVP9aljxB1KZUKug1pM=";
rev = "cb5fad4c6c2cbef92e9b8b63449e1cb7664e4846";
hash = "sha256-cIJuDC+MFLd5hkA1kUxuaw2dZagHqn5fi5Q2XKvDEII=";
fetchSubmodules = true;
};
postPatch = prev.postPatch + ''
@ -137,14 +133,12 @@ let
'';
cmakeFlags = prev.cmakeFlags ++ [
(lib.cmakeBool "BUILD_SHARED_LIBS" false)
(lib.cmakeBool "LLAMA_AVX" enable_avx)
(lib.cmakeBool "LLAMA_AVX2" enable_avx2)
(lib.cmakeBool "LLAMA_AVX512" enable_avx512)
(lib.cmakeBool "LLAMA_FMA" enable_fma)
(lib.cmakeBool "LLAMA_F16C" enable_f16c)
(lib.cmakeBool "GGML_AVX" enable_avx)
(lib.cmakeBool "GGML_AVX2" enable_avx2)
(lib.cmakeBool "GGML_AVX512" enable_avx512)
(lib.cmakeBool "GGML_FMA" enable_fma)
(lib.cmakeBool "GGML_F16C" enable_f16c)
];
postInstall = null;
buildInputs = prev.buildInputs ++ [
protobuf # provides also abseil_cpp as propagated build input
grpc
@ -394,18 +388,18 @@ let
stdenv;
pname = "local-ai";
version = "2.17.1";
version = "2.18.1";
src = fetchFromGitHub {
owner = "go-skynet";
repo = "LocalAI";
rev = "v${version}";
hash = "sha256-G9My4t3vJ1sWyD+vxUgON4ezXURVAAgu1nAtTjd3ZR8=";
hash = "sha256-hRrbGUUawQV4fqxAn3eFBvn4/lZ+NrKhxnGHqpljrec=";
};
self = buildGoModule.override { stdenv = effectiveStdenv; } {
inherit pname version src;
vendorHash = "sha256-Hu7aJFi40CKNWAxYOR47VBZI1A/9SlBIVQVcB8iqcxA=";
vendorHash = "sha256-uvko1PQWW5P+6cgmwVKocKBm5GndszqCsSbxlXANqJs=";
env.NIX_CFLAGS_COMPILE = lib.optionalString with_stablediffusion " -isystem ${opencv}/include/opencv4";
@ -441,7 +435,7 @@ let
cp ${llama-cpp-rpc}/bin/grpc-server backend-assets/grpc/llama-cpp-grpc
mkdir -p backend-assets/util
cp ${llama-cpp-rpc}/bin/rpc-server backend-assets/util/llama-cpp-rpc-server
cp ${llama-cpp-rpc}/bin/llama-rpc-server backend-assets/util/llama-cpp-rpc-server
'';
buildInputs = [ ]

View File

@ -12,18 +12,18 @@
stdenv.mkDerivation rec {
pname = "lxd-ui";
version = "0.9";
version = "0.10";
src = fetchFromGitHub {
owner = "canonical";
repo = "lxd-ui";
rev = "refs/tags/${version}";
hash = "sha256-4TIi/LPm35W86p+l5eYU0VETjno8TKmp43m2SReKElM=";
hash = "sha256-lXuPU1WWhrjst5ZbdLWPMovncHkUMYSUDNpsaWvdPgM=";
};
offlineCache = fetchYarnDeps {
yarnLock = "${src}/yarn.lock";
hash = "sha256-wExAVEl745X4O9hYhKYX2BjmW494Vr13X8bDmVxKMT4=";
hash = "sha256-X0xBYhoUKZe8GBqbRAfSE9o63FoAXIYTjzzDHMAygBI=";
};
nativeBuildInputs = [

Some files were not shown because too many files have changed in this diff Show More