Merge branch 'staging-next' into staging

This commit is contained in:
Weijia Wang 2024-04-26 09:33:17 +02:00
commit cf68396112
61 changed files with 1999 additions and 1204 deletions

View File

@ -1,4 +1,9 @@
{ config, pkgs, lib, ... }:
{
config,
pkgs,
lib,
...
}:
with lib;
let
@ -12,9 +17,7 @@ in
Whether to install Singularity/Apptainer with system-level overriding such as SUID support.
'';
};
package = mkPackageOption pkgs "singularity" {
example = "apptainer";
};
package = mkPackageOption pkgs "singularity" { example = "apptainer"; };
packageOverriden = mkOption {
type = types.nullOr types.package;
default = null;
@ -75,17 +78,19 @@ in
};
config = mkIf cfg.enable {
programs.singularity.packageOverriden = (cfg.package.override (
optionalAttrs cfg.enableExternalLocalStateDir {
externalLocalStateDir = "/var/lib";
} // optionalAttrs cfg.enableFakeroot {
newuidmapPath = "/run/wrappers/bin/newuidmap";
newgidmapPath = "/run/wrappers/bin/newgidmap";
} // optionalAttrs cfg.enableSuid {
enableSuid = true;
starterSuidPath = "/run/wrappers/bin/${cfg.package.projectName}-suid";
}
));
programs.singularity.packageOverriden = (
cfg.package.override (
optionalAttrs cfg.enableExternalLocalStateDir { externalLocalStateDir = "/var/lib"; }
// optionalAttrs cfg.enableFakeroot {
newuidmapPath = "/run/wrappers/bin/newuidmap";
newgidmapPath = "/run/wrappers/bin/newgidmap";
}
// optionalAttrs cfg.enableSuid {
enableSuid = true;
starterSuidPath = "/run/wrappers/bin/${cfg.package.projectName}-suid";
}
)
);
environment.systemPackages = [ cfg.packageOverriden ];
security.wrappers."${cfg.packageOverriden.projectName}-suid" = mkIf cfg.enableSuid {
setuid = true;
@ -97,5 +102,4 @@ in
"d /var/lib/${cfg.packageOverriden.projectName}/mnt/session 0770 root root -"
];
};
}

View File

@ -817,11 +817,11 @@ in {
base_url = mkOption {
type = types.nullOr types.nonEmptyStr;
default = if lib.versionOlder config.system.stateVersion "24.05"
then "${httpConf.scheme}://${httpConf.host}:${builtins.toString httpConf.port}/media/"
then "${httpConf.scheme}://${httpConf.host}:${builtins.toString httpConf.port}"
else null;
defaultText = literalExpression ''
if lib.versionOlder config.system.stateVersion "24.05"
then "$\{httpConf.scheme}://$\{httpConf.host}:$\{builtins.toString httpConf.port}/media/"
then "$\{httpConf.scheme}://$\{httpConf.host}:$\{builtins.toString httpConf.port}"
else null;
'';
description = ''

View File

@ -23,13 +23,13 @@ with lib.strings;
let
version = "2.70.3";
version = "2.72.14";
src = fetchFromGitHub {
owner = "grame-cncm";
repo = "faust";
rev = version;
sha256 = "sha256-z6fW/T7wJZxugmvABlpvyMXvR4WkmC16INOKyyfKx8k=";
sha256 = "sha256-RdSXiOYwKsfyrfHEughCeSwa9VFM6/3pMg54yCMpzLU=";
fetchSubmodules = true;
};
@ -63,14 +63,6 @@ let
ncurses_static
];
patches = [
(fetchpatch {
name = "fix-CsigFFun-API-declaration.patch";
url = "https://github.com/grame-cncm/faust/commit/10ce960e91a6237c7bff14a338e770757076ce9e.patch";
hash = "sha256-WMFLpLGTZpG7ni3lhI5VJHsmJViWZf4pAFuhYmFVRCE=";
})
];
passthru = { inherit wrap wrapWithBuildEnv faust2ApplBase; };
preConfigure = ''

View File

@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "ssw";
version = "0.8";
version = "0.10";
src = fetchurl {
url = "https://alpha.gnu.org/gnu/ssw/spread-sheet-widget-${version}.tar.gz";
sha256 = "sha256-hYnYKY/PO1hQ0JaLBIAaT0D68FVVRPbMnZVLAWLplUs=";
sha256 = "sha256-gGkuw1AnGZXhR9x1mSnN1507ZF5rXvqmtX9NLQXoR+U=";
};
nativeBuildInputs = [ pkg-config ];

View File

@ -7,7 +7,7 @@
((buildMozillaMach rec {
pname = "floorp";
packageVersion = "11.12.0";
packageVersion = "11.12.2";
applicationName = "Floorp";
binaryName = "floorp";
branding = "browser/branding/official";
@ -22,7 +22,7 @@
repo = "Floorp";
fetchSubmodules = true;
rev = "v${packageVersion}";
hash = "sha256-9mJW8VFYClQ3D8/nPtlCVaVULvEICS+RQhz1dLujn6Q=";
hash = "sha256-KWUoR/0XOz4mCWBkTgDfvvrWukZMa3tQzQ+k5+BfzzY=";
};
extraConfigureFlags = [

View File

@ -87,10 +87,11 @@ in stdenv.mkDerivation (rec {
dontWrapGApps = true;
postFixup = ''
# make xdg-open overrideable at runtime
wrapProgram $out/opt/${name}/${pname} \
# make xdg-open overridable at runtime
wrapProgramShell $out/opt/${name}/${pname} \
--prefix LD_LIBRARY_PATH : "${lib.makeLibraryPath runtimeDependencies}" \
--suffix PATH : ${xdg-utils}/bin \
--add-flags "\''${NIXOS_OZONE_WL:+\''${WAYLAND_DISPLAY:+--ozone-platform-hint=auto --enable-features=WaylandWindowDecorations}}" \
"''${gappsWrapperArgs[@]}"
'';
} // cleanedArgs)

View File

@ -151,7 +151,9 @@ stdenv.mkDerivation rec {
runHook postInstall
'';
postFixup = lib.optionalString stdenv.isLinux ''
postFixup = lib.optionalString stdenv.isDarwin ''
makeWrapper $out/Applications/zoom.us.app/Contents/MacOS/zoom.us $out/bin/zoom
'' + lib.optionalString stdenv.isLinux ''
# Desktop File
substituteInPlace $out/share/applications/Zoom.desktop \
--replace "Exec=/usr/bin/zoom" "Exec=$out/bin/zoom"

View File

@ -8,6 +8,9 @@
, python3
, qtbase
, qtsvg
, qtwayland
, wayland
, waylandSupport ? stdenv.isLinux
, wrapGAppsHook
}:
@ -33,6 +36,9 @@ mkDerivationWith python3.pkgs.buildPythonApplication {
buildInputs = [
gtk3
] ++ lib.optionals waylandSupport [
qtwayland
wayland
];
propagatedBuildInputs = with python3.pkgs; [

View File

@ -1,107 +1,111 @@
# Configurations that should only be overrided by
# overrideAttrs
{ pname
, version
, src
, projectName # "apptainer" or "singularity"
, vendorHash ? null
, deleteVendor ? false
, proxyVendor ? false
, extraConfigureFlags ? [ ]
, extraDescription ? ""
, extraMeta ? { }
{
pname,
version,
src,
projectName, # "apptainer" or "singularity"
vendorHash ? null,
deleteVendor ? false,
proxyVendor ? false,
extraConfigureFlags ? [ ],
extraDescription ? "",
extraMeta ? { },
}:
let
# Workaround for vendor-related attributes not overridable (#86349)
# should be removed when the issue is resolved
_defaultGoVendorArgs = {
inherit
vendorHash
deleteVendor
proxyVendor
;
inherit vendorHash deleteVendor proxyVendor;
};
in
{ lib
, buildGoModule
, runCommandLocal
{
lib,
buildGoModule,
runCommandLocal,
substituteAll,
# Native build inputs
, addDriverRunpath
, makeWrapper
, pkg-config
, util-linux
, which
addDriverRunpath,
makeWrapper,
pkg-config,
util-linux,
which,
# Build inputs
, bash
, callPackage
, conmon
, coreutils
, cryptsetup
, e2fsprogs
, fakeroot
, fuse2fs ? e2fsprogs.fuse2fs
, go
, gpgme
, libseccomp
, libuuid
bash,
callPackage,
conmon,
coreutils,
cryptsetup,
e2fsprogs,
fakeroot,
fuse2fs ? e2fsprogs.fuse2fs,
go,
gpgme,
libseccomp,
libuuid,
# This is for nvidia-container-cli
, nvidia-docker
, openssl
, squashfsTools
, squashfuse
nvidia-docker,
openssl,
squashfsTools,
squashfuse,
# Test dependencies
, singularity-tools
, cowsay
, hello
singularity-tools,
cowsay,
hello,
# Overridable configurations
, enableNvidiaContainerCli ? true
enableNvidiaContainerCli ? true,
# --nvccli currently requires extra privileges:
# https://github.com/apptainer/apptainer/issues/1893#issuecomment-1881240800
, forceNvcCli ? false
forceNvcCli ? false,
# Compile with seccomp support
# SingularityCE 3.10.0 and above requires explicit --without-seccomp when libseccomp is not available.
, enableSeccomp ? true
enableSeccomp ? true,
# Whether the configure script treat SUID support as default
# When equal to enableSuid, it supress the --with-suid / --without-suid build flag
# It can be set to `null` to always pass either --with-suid or --without-suided
# Type: null or boolean
, defaultToSuid ? true
defaultToSuid ? true,
# Whether to compile with SUID support
, enableSuid ? false
, starterSuidPath ? null
, substituteAll
enableSuid ? false,
starterSuidPath ? null,
# newuidmapPath and newgidmapPath are to support --fakeroot
# where those SUID-ed executables are unavailable from the FHS system PATH.
# Path to SUID-ed newuidmap executable
, newuidmapPath ? null
newuidmapPath ? null,
# Path to SUID-ed newgidmap executable
, newgidmapPath ? null
newgidmapPath ? null,
# External LOCALSTATEDIR
, externalLocalStateDir ? null
externalLocalStateDir ? null,
# Remove the symlinks to `singularity*` when projectName != "singularity"
, removeCompat ? false
removeCompat ? false,
# Workaround #86349
# should be removed when the issue is resolved
, vendorHash ? _defaultGoVendorArgs.vendorHash
, deleteVendor ? _defaultGoVendorArgs.deleteVendor
, proxyVendor ? _defaultGoVendorArgs.proxyVendor
vendorHash ? _defaultGoVendorArgs.vendorHash,
deleteVendor ? _defaultGoVendorArgs.deleteVendor,
proxyVendor ? _defaultGoVendorArgs.proxyVendor,
}:
let
defaultPathOriginal = "/bin:/usr/bin:/sbin:/usr/sbin:/usr/local/bin:/usr/local/sbin";
privileged-un-utils = if ((newuidmapPath == null) && (newgidmapPath == null)) then null else
(runCommandLocal "privileged-un-utils" { } ''
mkdir -p "$out/bin"
ln -s ${lib.escapeShellArg newuidmapPath} "$out/bin/newuidmap"
ln -s ${lib.escapeShellArg newgidmapPath} "$out/bin/newgidmap"
'');
privileged-un-utils =
if ((newuidmapPath == null) && (newgidmapPath == null)) then
null
else
(runCommandLocal "privileged-un-utils" { } ''
mkdir -p "$out/bin"
ln -s ${lib.escapeShellArg newuidmapPath} "$out/bin/newuidmap"
ln -s ${lib.escapeShellArg newgidmapPath} "$out/bin/newgidmap"
'');
in
(buildGoModule {
inherit pname version src;
patches = lib.optionals (projectName == "apptainer") [
(substituteAll { src = ./apptainer/0001-ldCache-patch-for-driverLink.patch; inherit (addDriverRunpath) driverLink; })
(substituteAll {
src = ./apptainer/0001-ldCache-patch-for-driverLink.patch;
inherit (addDriverRunpath) driverLink;
})
];
# Override vendorHash with the output got from
@ -138,29 +142,36 @@ in
# apptainer/apptainer: https://github.com/apptainer/apptainer/blob/main/dist/debian/control
# sylabs/singularity: https://github.com/sylabs/singularity/blob/main/debian/control
buildInputs = [
bash # To patch /bin/sh shebangs.
conmon
cryptsetup
gpgme
libuuid
openssl
squashfsTools # Required at build time by SingularityCE
]
++ lib.optional enableNvidiaContainerCli nvidia-docker
++ lib.optional enableSeccomp libseccomp
;
buildInputs =
[
bash # To patch /bin/sh shebangs.
conmon
cryptsetup
gpgme
libuuid
openssl
squashfsTools # Required at build time by SingularityCE
]
# Optional dependencies.
# Formatting: Optional dependencies are likely to increase.
# Don't squash them into the same line.
++ lib.optional enableNvidiaContainerCli nvidia-docker
++ lib.optional enableSeccomp libseccomp;
configureScript = "./mconfig";
configureFlags = [
"--localstatedir=${if externalLocalStateDir != null then externalLocalStateDir else "${placeholder "out"}/var/lib"}"
"--runstatedir=/var/run"
]
++ lib.optional (!enableSeccomp) "--without-seccomp"
++ lib.optional (enableSuid != defaultToSuid) (if enableSuid then "--with-suid" else "--without-suid")
++ extraConfigureFlags
;
configureFlags =
[
"--localstatedir=${
if externalLocalStateDir != null then externalLocalStateDir else "${placeholder "out"}/var/lib"
}"
"--runstatedir=/var/run"
]
++ lib.optional (!enableSeccomp) "--without-seccomp"
++ lib.optional (enableSuid != defaultToSuid) (
if enableSuid then "--with-suid" else "--without-suid"
)
++ extraConfigureFlags;
# causes redefinition of _FORTIFY_SOURCE
hardeningDisable = [ "fortify3" ];
@ -177,9 +188,7 @@ in
privileged-un-utils
squashfsTools # mksquashfs unsquashfs # Make / unpack squashfs image
squashfuse # squashfuse_ll squashfuse # Mount (without unpacking) a squashfs image without privileges
]
++ lib.optional enableNvidiaContainerCli nvidia-docker
;
] ++ lib.optional enableNvidiaContainerCli nvidia-docker;
postPatch = ''
if [[ ! -e .git || ! -e VERSION ]]; then
@ -249,70 +258,86 @@ in
rm "$file"
done
''}
${lib.optionalString enableSuid (lib.warnIf (starterSuidPath == null) "${projectName}: Null starterSuidPath when enableSuid produces non-SUID-ed starter-suid and run-time permission denial." ''
chmod +x $out/libexec/${projectName}/bin/starter-suid
'')}
${lib.optionalString enableSuid (
lib.warnIf (starterSuidPath == null)
"${projectName}: Null starterSuidPath when enableSuid produces non-SUID-ed starter-suid and run-time permission denial."
''
chmod +x $out/libexec/${projectName}/bin/starter-suid
''
)}
${lib.optionalString (enableSuid && (starterSuidPath != null)) ''
mv "$out"/libexec/${projectName}/bin/starter-suid{,.orig}
ln -s ${lib.escapeShellArg starterSuidPath} "$out/libexec/${projectName}/bin/starter-suid"
''}
'';
meta = with lib; {
description = "Application containers for linux" + extraDescription;
longDescription = ''
Singularity (the upstream) renamed themselves to Apptainer
to distinguish themselves from a fork made by Sylabs Inc.. See
meta =
with lib;
{
description = "Application containers for linux" + extraDescription;
longDescription = ''
Singularity (the upstream) renamed themselves to Apptainer
to distinguish themselves from a fork made by Sylabs Inc.. See
https://sylabs.io/2021/05/singularity-community-edition
https://apptainer.org/news/community-announcement-20211130
'';
license = licenses.bsd3;
platforms = platforms.linux;
maintainers = with maintainers; [ jbedo ShamrockLee ];
mainProgram = projectName;
} // extraMeta;
}).overrideAttrs (finalAttrs: prevAttrs: {
passthru = prevAttrs.passthru or { } // {
tests = {
image-hello-cowsay = singularity-tools.buildImage {
name = "hello-cowsay";
contents = [ hello cowsay ];
singularity = finalAttrs.finalPackage;
};
};
gpuChecks = lib.optionalAttrs (projectName == "apptainer") {
# Should be in tests, but Ofborg would skip image-hello-cowsay because
# saxpy is unfree.
image-saxpy = callPackage
({ singularity-tools, cudaPackages }:
singularity-tools.buildImage {
name = "saxpy";
contents = [ cudaPackages.saxpy ];
memSize = 2048;
diskSize = 2048;
https://sylabs.io/2021/05/singularity-community-edition
https://apptainer.org/news/community-announcement-20211130
'';
license = licenses.bsd3;
platforms = platforms.linux;
maintainers = with maintainers; [
jbedo
ShamrockLee
];
mainProgram = projectName;
}
// extraMeta;
}).overrideAttrs
(
finalAttrs: prevAttrs: {
passthru = prevAttrs.passthru or { } // {
tests = {
image-hello-cowsay = singularity-tools.buildImage {
name = "hello-cowsay";
contents = [
hello
cowsay
];
singularity = finalAttrs.finalPackage;
})
{ };
saxpy =
callPackage
({ runCommand, writeShellScriptBin }:
};
};
gpuChecks = lib.optionalAttrs (projectName == "apptainer") {
# Should be in tests, but Ofborg would skip image-hello-cowsay because
# saxpy is unfree.
image-saxpy = callPackage (
{ singularity-tools, cudaPackages }:
singularity-tools.buildImage {
name = "saxpy";
contents = [ cudaPackages.saxpy ];
memSize = 2048;
diskSize = 2048;
singularity = finalAttrs.finalPackage;
}
) { };
saxpy = callPackage (
{ runCommand, writeShellScriptBin }:
let
unwrapped = writeShellScriptBin "apptainer-cuda-saxpy"
''
${lib.getExe finalAttrs.finalPackage} exec --nv $@ ${finalAttrs.passthru.gpuChecks.image-saxpy} saxpy
'';
unwrapped = writeShellScriptBin "apptainer-cuda-saxpy" ''
${lib.getExe finalAttrs.finalPackage} exec --nv $@ ${finalAttrs.passthru.gpuChecks.image-saxpy} saxpy
'';
in
runCommand "run-apptainer-cuda-saxpy"
{
requiredSystemFeatures = [ "cuda" ];
nativeBuildInputs = [ unwrapped ];
passthru = { inherit unwrapped; };
passthru = {
inherit unwrapped;
};
}
''
apptainer-cuda-saxpy
'')
{ };
};
};
})
''
) { };
};
};
}
)

View File

@ -1,89 +1,98 @@
{ callPackage
, fetchFromGitHub
, nixos
, conmon
{
callPackage,
fetchFromGitHub,
nixos,
conmon,
}:
let
apptainer = callPackage
(import ./generic.nix rec {
pname = "apptainer";
version = "1.3.1";
projectName = "apptainer";
apptainer =
callPackage
(import ./generic.nix rec {
pname = "apptainer";
version = "1.3.1";
projectName = "apptainer";
src = fetchFromGitHub {
owner = "apptainer";
repo = "apptainer";
rev = "refs/tags/v${version}";
hash = "sha256-XhJecINx8jC6pRzIoM4nC6Aunj40xL8EmYIA4UizfAY=";
src = fetchFromGitHub {
owner = "apptainer";
repo = "apptainer";
rev = "refs/tags/v${version}";
hash = "sha256-XhJecINx8jC6pRzIoM4nC6Aunj40xL8EmYIA4UizfAY=";
};
# Update by running
# nix-prefetch -E "{ sha256 }: ((import ./. { }).apptainer.override { vendorHash = sha256; }).goModules"
# at the root directory of the Nixpkgs repository
vendorHash = "sha256-MXW1U13uDRAx4tqZvqsuJvoD22nEL2gcxiGaa/6zwU0=";
extraDescription = " (previously known as Singularity)";
extraMeta.homepage = "https://apptainer.org";
})
{
# Apptainer doesn't depend on conmon
conmon = null;
# Apptainer builders require explicit --with-suid / --without-suid flag
# when building on a system with disabled unprivileged namespace.
# See https://github.com/NixOS/nixpkgs/pull/215690#issuecomment-1426954601
defaultToSuid = null;
};
# Update by running
# nix-prefetch -E "{ sha256 }: ((import ./. { }).apptainer.override { vendorHash = sha256; }).goModules"
# at the root directory of the Nixpkgs repository
vendorHash = "sha256-MXW1U13uDRAx4tqZvqsuJvoD22nEL2gcxiGaa/6zwU0=";
singularity =
callPackage
(import ./generic.nix rec {
pname = "singularity-ce";
version = "4.1.2";
projectName = "singularity";
extraDescription = " (previously known as Singularity)";
extraMeta.homepage = "https://apptainer.org";
})
{
# Apptainer doesn't depend on conmon
conmon = null;
src = fetchFromGitHub {
owner = "sylabs";
repo = "singularity";
rev = "refs/tags/v${version}";
hash = "sha256-/KTDdkCMkZ5hO+VYHzw9vB8FDWxg7PS1yb2waRJQngY=";
};
# Apptainer builders require explicit --with-suid / --without-suid flag
# when building on a system with disabled unprivileged namespace.
# See https://github.com/NixOS/nixpkgs/pull/215690#issuecomment-1426954601
defaultToSuid = null;
};
# Update by running
# nix-prefetch -E "{ sha256 }: ((import ./. { }).singularity.override { vendorHash = sha256; }).goModules"
# at the root directory of the Nixpkgs repository
vendorHash = "sha256-4Nxj2PzZmFdvouWKyXLFDk8iuRhFuvyPW/+VRTw75Zw=";
singularity = callPackage
(import ./generic.nix rec {
pname = "singularity-ce";
version = "4.1.2";
projectName = "singularity";
# Do not build conmon and squashfuse from the Git submodule sources,
# Use Nixpkgs provided version
extraConfigureFlags = [
"--without-conmon"
"--without-squashfuse"
];
src = fetchFromGitHub {
owner = "sylabs";
repo = "singularity";
rev = "refs/tags/v${version}";
hash = "sha256-/KTDdkCMkZ5hO+VYHzw9vB8FDWxg7PS1yb2waRJQngY=";
extraDescription = " (Sylabs Inc's fork of Singularity, a.k.a. SingularityCE)";
extraMeta.homepage = "https://sylabs.io/";
})
{
# Sylabs SingularityCE builders defaults to set the SUID flag
# on UNIX-like platforms,
# and only have --without-suid but not --with-suid.
defaultToSuid = true;
};
# Update by running
# nix-prefetch -E "{ sha256 }: ((import ./. { }).singularity.override { vendorHash = sha256; }).goModules"
# at the root directory of the Nixpkgs repository
vendorHash = "sha256-4Nxj2PzZmFdvouWKyXLFDk8iuRhFuvyPW/+VRTw75Zw=";
genOverridenNixos =
package: packageName:
(nixos {
programs.singularity = {
enable = true;
inherit package;
};
}).config.programs.singularity.packageOverriden.overrideAttrs
(oldAttrs: {
meta = oldAttrs.meta // {
description = "";
longDescription = ''
This package produces identical store derivations to `pkgs.${packageName}`
overriden and installed by the NixOS module `programs.singularity`
with default configuration.
# Do not build conmon and squashfuse from the Git submodule sources,
# Use Nixpkgs provided version
extraConfigureFlags = [
"--without-conmon"
"--without-squashfuse"
];
extraDescription = " (Sylabs Inc's fork of Singularity, a.k.a. SingularityCE)";
extraMeta.homepage = "https://sylabs.io/";
})
{
defaultToSuid = true;
};
genOverridenNixos = package: packageName: (nixos {
programs.singularity = {
enable = true;
inherit package;
};
}).config.programs.singularity.packageOverriden.overrideAttrs (oldAttrs: {
meta = oldAttrs.meta // {
description = "";
longDescription = ''
This package produces identical store derivations to `pkgs.${packageName}`
overriden and installed by the NixOS module `programs.singularity`
with default configuration.
This is for binary substitutes only. Use pkgs.${packageName} instead.
'';
};
});
This is for binary substitutes only. Use pkgs.${packageName} instead.
'';
};
});
in
{
inherit apptainer singularity;

View File

@ -17,16 +17,16 @@
rustPlatform.buildRustPackage rec {
pname = "eza";
version = "0.18.11";
version = "0.18.13";
src = fetchFromGitHub {
owner = "eza-community";
repo = "eza";
rev = "v${version}";
hash = "sha256-jh1YmY3G3oL8HfgojGtrJLvgLT+gyTX0fsv/11UDIJ0=";
hash = "sha256-dUWkszQs/MMb6Pq0Ci4vPgHe6qz7X4GBkRxSxehMKiQ=";
};
cargoHash = "sha256-4ziEG7P7igCkN6UnVqaWXgqfW+XssUP4Rn867ELXYmU=";
cargoHash = "sha256-MSVneRJcY2XLb5A1/oOELm2FQj+7NDmINTYRrTVD4bI=";
nativeBuildInputs = [ cmake pkg-config installShellFiles pandoc ];
buildInputs = [ zlib ]

View File

@ -0,0 +1,48 @@
{
stdenv,
lib,
fetchsvn,
readline,
ncurses,
bison,
libtool,
gmp,
mpfr,
}:
stdenv.mkDerivation (finalAttrs: {
pname = "mathemagix";
version = "11126";
src = fetchsvn {
url = "https://subversion.renater.fr/anonscm/svn/mmx/";
rev = finalAttrs.version;
hash = "sha256-AFnYd5oFg/wgaHPjfZmqXNljEpoFW4h6f3UG+KZauEs=";
};
strictDeps = true;
buildInputs = [
gmp
libtool
mpfr
ncurses
readline
];
nativeBuildInputs = [
bison
];
preConfigure = ''
export HOME="$PWD"
'';
meta = {
description = "A free computer algebra and analysis system consisting of a high level language with a compiler and a series of mathematical libraries";
homepage = "http://www.mathemagix.org/";
license = lib.licenses.gpl3Only;
maintainers = with lib.maintainers; [ drupol ];
platforms = lib.platforms.linux;
};
})

View File

@ -3,19 +3,21 @@
buildNimPackage (finalAttrs: {
pname = "nimdow";
version = "0.7.37";
requiredNimVersion = 1;
version = "0.7.38";
src = fetchFromGitHub {
owner = "avahe-kellenberger";
repo = finalAttrs.pname;
rev = "v${finalAttrs.version}";
hash = "sha256-930wDS0UW65QzpUHHOuM25oi/OhFmG0Q7N05ftu7XlI=";
hash = "sha256-GPu3Z63rFBgCCV7bdBg9cJh5thv2xrv/nSMa5Q/zp48=";
};
lockFile = ./lock.json;
nimFlags = [
"--deepcopy:on"
];
postInstall = ''
install -D config.default.toml $out/share/nimdow/config.default.toml
install -D nimdow.desktop $out/share/applications/nimdow.desktop

View File

@ -0,0 +1,37 @@
{
lib,
buildGoModule,
fetchFromGitHub,
}:
buildGoModule rec {
pname = "nray";
version = "1.1.0";
src = fetchFromGitHub {
owner = "nray-scanner";
repo = "nray";
rev = "refs/tags/v${version}";
hash = "sha256-N78Bm/Le+pbA8hvDaUbjQpcdRlM0RKXnXyjOB8Nz3AE=";
};
vendorHash = "sha256-hCFFMSaT73Wx54KayuFc2xJRGp0p10Pn93N8t4Xad8g=";
ldflags = [
"-s"
"-w"
];
env = {
CGO_CFLAGS = "-Wno-undef-prefix";
};
meta = with lib; {
description = "Distributed port scanner";
homepage = "https://github.com/nray-scanner/nray";
changelog = "https://github.com/nray-scanner/nray/releases/tag/v${version}";
license = licenses.gpl3Only;
maintainers = with maintainers; [ fab ];
mainProgram = "nray";
};
}

View File

@ -77,13 +77,13 @@ let
in
stdenv.mkDerivation (finalAttrs: {
pname = "waybar";
version = "0.10.1";
version = "0.10.2";
src = fetchFromGitHub {
owner = "Alexays";
repo = "Waybar";
rev = finalAttrs.version;
hash = "sha256-xDeY0Bnwr+jCS0IpseWNgryQ3yV7RJ1VNNbOkT/xl5c=";
hash = "sha256-xinTLjZJhL4048jpAbN3i6nSxKAqnbesbK/GBX+1CkE=";
};
postUnpack = lib.optional cavaSupport ''

View File

@ -0,0 +1,36 @@
{
lib,
stdenv,
rustPlatform,
fetchFromGitHub,
pkg-config,
wayland,
}:
rustPlatform.buildRustPackage rec {
pname = "wl-clip-persist";
version = "0.4.0";
src = fetchFromGitHub {
owner = "Linus789";
repo = "wl-clip-persist";
rev = "v${version}";
hash = "sha256-uu9R+/8483YyuvMeot2sRs8ihSN1AEPeDjzRxB1P8kc=";
};
cargoHash = "sha256-XpNpHi9vl89sbec6DXh50t8s328Uw4PpzFVvGp1TP6o=";
nativeBuildInputs = [ pkg-config ];
buildInputs = [ wayland ];
meta = with lib; {
broken = stdenv.isDarwin;
description = "Keep Wayland clipboard even after programs close";
homepage = "https://github.com/Linus789/wl-clip-persist";
inherit (wayland.meta) platforms;
license = licenses.mit;
mainProgram = "wl-clip-persist";
maintainers = with maintainers; [ name-snrl ];
};
}

View File

@ -20,8 +20,8 @@ stdenv.mkDerivation rec {
] ++ lib.optionals stdenv.hostPlatform.isMinGW [
# Build dll libraries.
(fetchurl {
url = "https://aur.archlinux.org/cgit/aur.git/plain/001-mingw-build.patch?h=mingw-w64-giflib&id=4cf1e519bcf51338dc607d23388fca47d71790c0";
sha256 = "KyJi3eqH/Ae+guEK6znraZI5+IPImaoYoW5NTkCvjsg=";
url = "https://aur.archlinux.org/cgit/aur.git/plain/001-mingw-build.patch?h=mingw-w64-giflib";
hash = "sha256-bBx7lw7FWtxZJ+E9AAbKIpCGcJnS5lrGpjYcv/zBtKk=";
})
# Install executables.

View File

@ -8,13 +8,13 @@
buildDunePackage rec {
pname = "awa";
version = "0.3.0";
version = "0.3.1";
minimalOCamlVersion = "4.10";
src = fetchurl {
url = "https://github.com/mirage/awa-ssh/releases/download/v${version}/awa-${version}.tbz";
hash = "sha256-BtbReSnnAN+u1Vy63afO1yheoDqsIRU2rig0y1QDtuw=";
hash = "sha256-VejHFn07B/zoEG4LjLaen24ig9kAXtERl/pRo6UZCQk=";
};
propagatedBuildInputs = [

View File

@ -0,0 +1,23 @@
{ lib
, buildDunePackage
, fetchurl
}:
buildDunePackage rec {
pname = "binning";
version = "0.0.0";
minimalOCamlVersion = "4.08";
src = fetchurl {
url = "https://github.com/pveber/binning/releases/download/v${version}/binning-v${version}.tbz";
hash = "sha256-eG+xctsbc7lQ5pFOUtJ8rjNW/06gygwLADq7yc8Yf/c=";
};
meta = {
description = "A datastructure to accumulate values in bins";
license = lib.licenses.cecill-b;
homepage = "https://github.com/pveber/binning/";
maintainers = [ lib.maintainers.vbgl ];
};
}

View File

@ -0,0 +1,56 @@
{ lib
, buildDunePackage
, fetchurl
, angstrom-unix
, binning
, ocaml-crunch
, camlzip
, core_kernel
, core_unix
, csvfields
, fmt
, gsl
, ppx_csv_conv
, ppx_deriving
, rresult
, tyxml
, uri
, vg
}:
buildDunePackage rec {
pname = "biotk";
version = "0.2.0";
minimalOCamlVersion = "4.13";
src = fetchurl {
url = "https://github.com/pveber/biotk/releases/download/v${version}/biotk-${version}.tbz";
hash = "sha256-FQvbVj5MmraSN6AmOckKgJ/LB14E/pCsPvPvNppcv7A=";
};
nativeBuildInputs = [ ocaml-crunch ];
buildInputs = [ ppx_csv_conv ];
propagatedBuildInputs = [
angstrom-unix
binning
camlzip
core_kernel
core_unix
csvfields
fmt
gsl
ppx_deriving
rresult
tyxml
uri
vg
];
meta = {
description = "Toolkit for bioinformatics in OCaml";
license = lib.licenses.cecill-c;
};
}

View File

@ -2,7 +2,7 @@
buildDunePackage rec {
pname = "bwd";
version = "2.2.0";
version = "2.3.0";
minimalOCamlVersion = "4.12";
duneVersion = "3";
@ -11,7 +11,7 @@ buildDunePackage rec {
owner = "RedPRL";
repo = "ocaml-bwd";
rev = version;
hash = "sha256-4DttkEPI9yJtMsqzTNSnoDajcvMQPIiJAHk0kJl540Y=";
hash = "sha256-rzn0U/D6kPNsH5hBTElc3d1jfKbgKbjA2JHicpaJtu4=";
};
doCheck = true;

View File

@ -10,13 +10,13 @@
buildDunePackage rec {
pname = "gen_js_api";
version = "1.1.1";
version = "1.1.2";
src = fetchFromGitHub {
owner = "LexiFi";
repo = pname;
rev = "v${version}";
sha256 = "sha256-0FKKYPbSBza/Q6oZniq/UHi5zBjD/i7j5ds3ZDWkBTs=";
sha256 = "sha256-tplbnQ/1dzZq8m/ibMAkGqY8RHQRmBPHOwh0dGuZCJM=";
};
minimalOCamlVersion = "4.11";

View File

@ -582,6 +582,13 @@ with self;
propagatedBuildInputs = [ ppxlib base ];
};
ppx_conv_func = janePackage {
pname = "ppx_conv_func";
hash = "sha256-61jX8yHZYOnMx1Jlqaq9zSOz25HLOa0Wv/iG6Hu82zI=";
meta.description = "Part of the Jane Street's PPX rewriters collection";
propagatedBuildInputs = [ ppxlib base ];
};
ppx_custom_printf = janePackage {
pname = "ppx_custom_printf";
hash = "1k8nmq6kwqz2wpkm9ymq749dz1vd8lxrjc711knp1wyz5935hnsv";
@ -597,6 +604,13 @@ with self;
propagatedBuildInputs = [ core_kernel ppxlib js_of_ocaml js_of_ocaml-ppx sedlex ];
};
ppx_csv_conv = janePackage {
pname = "ppx_csv_conv";
hash = "sha256-ctwgUs1buBZiNqac4760LhWd2/PMZRuxx8SE5T7yZ+g=";
meta.description = "Generate functions to read/write records in csv format";
propagatedBuildInputs = [ csvfields ppx_conv_func ];
};
ppx_disable_unused_warnings = janePackage {
pname = "ppx_disable_unused_warnings";
hash = "0sb5i4v7p9df2bxk66rjs30k9fqdrwsq1jgykjv6wyrx2d9bv955";

View File

@ -698,6 +698,13 @@ with self;
propagatedBuildInputs = [ ppxlib base ];
};
ppx_conv_func = janePackage {
pname = "ppx_conv_func";
hash = "sha256-HPHSZHdR9ll+7EbWc36shTdRPFYB0lkApidk+XL3clI=";
meta.description = "Part of the Jane Street's PPX rewriters collection";
propagatedBuildInputs = [ ppxlib base ];
};
ppx_custom_printf = janePackage {
pname = "ppx_custom_printf";
hash = "sha256-V30ijRgcma/rwysPxNAFnuJIb7XFrfi7mfjJxN+rSak=";
@ -712,6 +719,13 @@ with self;
propagatedBuildInputs = [ async async_unix core_kernel core_unix ppxlib js_of_ocaml js_of_ocaml-ppx sedlex virtual_dom ];
};
ppx_csv_conv = janePackage {
pname = "ppx_csv_conv";
hash = "sha256-RdPcDPLzoSf45Zeon3f4HcEvlwB6Q6sAINX3LHmjmj8=";
meta.description = "Generate functions to read/write records in csv format";
propagatedBuildInputs = [ csvfields ppx_conv_func ];
};
ppx_demo = janePackage {
pname = "ppx_demo";
hash = "sha256-t/jz94YpwmorhWlcuflIZe0l85cESE62L9I7NMASVWM=";

View File

@ -6,7 +6,7 @@ assert (!blas.isILP64) && (!lapack.isILP64);
buildDunePackage rec {
pname = "lacaml";
version = "11.0.8";
version = "11.0.10";
useDune2 = true;
@ -14,7 +14,7 @@ buildDunePackage rec {
src = fetchurl {
url = "https://github.com/mmottl/lacaml/releases/download/${version}/lacaml-${version}.tbz";
sha256 = "1i47wqnd9iy6ndbi9zfahpb592gahp6im26rgpwch13vgzk3kifd";
sha256 = "sha256-Vg6Hl31u1bvh0hfWU9eqoI8pGZt4YhpGRf3ul3h+SJk=";
};
buildInputs = [ dune-configurator ];

View File

@ -2,11 +2,11 @@
buildDunePackage rec {
pname = "ocaml-version";
version = "3.6.5";
version = "3.6.7";
src = fetchurl {
url = "https://github.com/ocurrent/ocaml-version/releases/download/v${version}/ocaml-version-${version}.tbz";
hash = "sha256-hHP2l0Jcz9YalxCY0wcgdH6zTz+OqRD6JOyjB+r539I=";
hash = "sha256-1Q/9W2adM+2w2InEdqcd5IiNkACNWDNgONIQztKPgQw=";
};
checkInputs = [ alcotest ];

View File

@ -1,32 +1,27 @@
{ lib
, ocaml
, buildDunePackage
, fetchFromGitHub
, fetchurl
, ppx_deriving
, bppsuite
, alcotest
, angstrom-unix
, biocaml
, biotk
, core
, gsl
, lacaml
, menhir
, menhirLib
, printbox-text
, yojson
}:
lib.throwIf (lib.versionAtLeast ocaml.version "5.0")
"phylogenetics is not compatible with OCaml ${ocaml.version}"
buildDunePackage rec {
pname = "phylogenetics";
version = "unstable-2022-05-06";
version = "0.2.0";
src = fetchFromGitHub {
owner = "biocaml";
repo = pname;
rev = "cd7c624d0f98e31b02933ca4511b9809b26d35b5";
sha256 = "sha256:0w0xyah3hj05hxg1rsa40hhma3dm1cyq0zvnjrihhf22laxap7ga";
src = fetchurl {
url = "https://github.com/biocaml/phylogenetics/releases/download/v${version}/phylogenetics-${version}.tbz";
hash = "sha256-JFpYp3pyW7PrBjqCwwDZxkJPA84dp6Qs8rOPvHPY92o=";
};
minimalOCamlVersion = "4.08";
@ -36,13 +31,14 @@ buildDunePackage rec {
nativeBuildInputs = [ menhir ];
propagatedBuildInputs = [
angstrom-unix
biocaml
biotk
core
gsl
lacaml
menhirLib
ppx_deriving
printbox-text
yojson
];
checkPhase = ''

View File

@ -0,0 +1,26 @@
{ lib
, buildDunePackage
, fetchurl
, stdlib-shims
}:
buildDunePackage rec {
pname = "streaming";
version = "0.8.0";
minimalOCamlVersion = "4.08";
src = fetchurl {
url = "https://github.com/odis-labs/streaming/releases/download/${version}/streaming-${version}.tbz";
hash = "sha256-W+3GYZpsLj1SnQhuSmjXdi/85fMajWpz4b7x5W0bnJs=";
};
propagatedBuildInputs = [ stdlib-shims ];
meta = {
homepage = "https://odis-labs.github.io/streaming";
license = lib.licenses.isc;
description = "Fast, safe and composable streaming abstractions";
maintainers = [ lib.maintainers.vbgl ];
};
}

View File

@ -4,20 +4,18 @@
buildDunePackage rec {
pname = "syslog-message";
version = "1.1.0";
version = "1.2.0";
minimalOCamlVersion = "4.08";
duneVersion = "3";
src = fetchurl {
url = "https://github.com/verbosemode/${pname}/releases/download/${version}/${pname}-${version}.tbz";
hash = "sha256:0vy4dkl2q2fa6rzyfsvjyc9r1b9ymfqd6j35z2kp5vdc4r87053g";
hash = "sha256-+eyiv6JvC0EKs3G1s5qoFtK0bU4Yg41AHg5Nc6xD9w0=";
};
propagatedBuildInputs = [
astring
ptime
rresult
];
doCheck = true;

View File

@ -2,11 +2,11 @@
buildDunePackage rec {
pname = "zmq";
version = "5.2.1";
version = "5.3.0";
src = fetchurl {
url = "https://github.com/issuu/ocaml-zmq/releases/download/${version}/zmq-${version}.tbz";
hash = "sha256-hVKfaTrUFqEBsv5hFB7JwsR630M0DKnqhB0QHpxcHKc=";
hash = "sha256-tetCmVg27/WHZ+HMwKZVHCrHTzWAlKwkAjNDibB1+6g=";
};
buildInputs = [ czmq dune-configurator ];

View File

@ -1,7 +1,7 @@
{ lib
, buildPythonPackage
, pythonOlder
, pythonAtLeast
, setuptools
, fetchPypi
, typing-extensions
, pytestCheckHook
@ -10,20 +10,29 @@
buildPythonPackage rec {
pname = "avro";
version = "1.11.3";
format = "setuptools";
pyproject = true;
# distutils usage: https://github.com/search?q=repo%3Aapache%2Favro%20distutils&type=code
disabled = pythonOlder "3.6" || pythonAtLeast "3.12";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
hash = "sha256-M5O7UTn5zweR0gV1bOHjmltYWGr1sVPWo7WhmWEOnRc=";
};
postPatch = lib.optionalString (!pythonOlder "3.12") ''
substituteInPlace avro/test/test_tether_word_count.py \
--replace-fail 'distutils' 'setuptools._distutils'
'';
propagatedBuildInputs = lib.optionals (pythonOlder "3.8") [
typing-extensions
];
nativeBuildInputs = [
setuptools
];
nativeCheckInputs = [
pytestCheckHook
];

View File

@ -1,49 +1,49 @@
{ lib
, azure-mgmt-common
, azure-mgmt-core
, buildPythonPackage
, fetchPypi
, isodate
, pythonOlder
, typing-extensions
{
lib,
azure-mgmt-common,
azure-mgmt-core,
buildPythonPackage,
fetchPypi,
isodate,
pythonOlder,
setuptools,
}:
buildPythonPackage rec {
pname = "azure-mgmt-compute";
version = "30.6.0";
format = "setuptools";
version = "31.0.0";
pyproject = true;
disabled = pythonOlder "3.7";
disabled = pythonOlder "3.8";
src = fetchPypi {
inherit pname version;
hash = "sha256-TYDXI+xtTLlYNhfr7AcW59dLJzKsuu0CPtLjzHBT0A4=";
hash = "sha256-WlscT8GhnssCKhLe0b6LGxVfaXnQP7nvwEZC9gZkS78=";
};
propagatedBuildInputs = [
build-system = [ setuptools ];
dependencies = [
azure-mgmt-common
azure-mgmt-core
isodate
] ++ lib.optionals (pythonOlder "3.8") [
typing-extensions
];
pythonNamespaces = [
"azure.mgmt"
];
pythonNamespaces = [ "azure.mgmt" ];
# Module has no tests
doCheck = false;
pythonImportsCheck = [
"azure.mgmt.compute"
];
pythonImportsCheck = [ "azure.mgmt.compute" ];
meta = with lib; {
description = "This is the Microsoft Azure Compute Management Client Library";
homepage = "https://github.com/Azure/azure-sdk-for-python";
homepage = "https://github.com/Azure/azure-sdk-for-python/tree/main/sdk/compute/azure-mgmt-compute";
changelog = "https://github.com/Azure/azure-sdk-for-python/blob/azure-mgmt-compute_${version}/sdk/compute/azure-mgmt-compute/CHANGELOG.md";
license = licenses.mit;
maintainers = with maintainers; [ olcai maxwilson ];
maintainers = with maintainers; [
olcai
maxwilson
];
};
}

View File

@ -25,7 +25,7 @@
buildPythonPackage rec {
pname = "cassandra-driver";
version = "3.28.0";
version = "3.29.1";
format = "setuptools";
disabled = pythonOlder "3.7";
@ -34,7 +34,7 @@ buildPythonPackage rec {
owner = "datastax";
repo = "python-driver";
rev = "refs/tags/${version}";
hash = "sha256-5JRbzYl7ftgK6GuvXWdvo52ZlS1th9JyLAYu/UCcPVc=";
hash = "sha256-pnNm5Pd5k4bt+s3GrUUDWRpSdqNSM89GiX8DZKYzW1E=";
};
postPatch = ''

View File

@ -15,7 +15,7 @@ buildPythonPackage rec {
doCheck = false;
meta = with lib; {
homepage = "https://bitbucket.org/bodhisnarkva/cbor";
homepage = "https://github.com/brianolson/cbor_py";
description = "Concise Binary Object Representation (CBOR) library";
license = licenses.asl20;
maintainers = with maintainers; [ oxzi ];

View File

@ -12,7 +12,7 @@
buildPythonPackage rec {
pname = "dirigera";
version = "1.1.4";
version = "1.1.5";
pyproject = true;
disabled = pythonOlder "3.7";
@ -21,7 +21,7 @@ buildPythonPackage rec {
owner = "Leggin";
repo = "dirigera";
rev = "refs/tags/v${version}";
hash = "sha256-60DLNp3mM4LpnmM98JVcKlOxj20jvtsBnYq7tL4WEW8=";
hash = "sha256-nR3L2Uwoxyr2TqzuaDoRqJlaVuunusOBV2B05cG6V8E=";
};
build-system = [ setuptools ];

View File

@ -11,7 +11,7 @@
buildPythonPackage rec {
pname = "garminconnect";
version = "0.2.16";
version = "0.2.17";
pyproject = true;
disabled = pythonOlder "3.10";
@ -20,7 +20,7 @@ buildPythonPackage rec {
owner = "cyberjunky";
repo = "python-garminconnect";
rev = "refs/tags/${version}";
hash = "sha256-mjFDM59fF9HpkO0a8fVW+dXYmjFxu7gn+rOrnTgN39s=";
hash = "sha256-F853wLzcqD+cQdPdvgGcItL+v8nBPoRYSyLgOJ5ld1A=";
};
build-system = [ pdm-backend ];

View File

@ -1,18 +1,19 @@
{ lib
, bluetooth-data-tools
, bluetooth-sensor-state-data
, buildPythonPackage
, fetchFromGitHub
, home-assistant-bluetooth
, poetry-core
, pytestCheckHook
, pythonOlder
, sensor-state-data
{
lib,
bluetooth-data-tools,
bluetooth-sensor-state-data,
buildPythonPackage,
fetchFromGitHub,
home-assistant-bluetooth,
poetry-core,
pytestCheckHook,
pythonOlder,
sensor-state-data,
}:
buildPythonPackage rec {
pname = "govee-ble";
version = "0.31.0";
version = "0.31.2";
pyproject = true;
disabled = pythonOlder "3.9";
@ -21,32 +22,26 @@ buildPythonPackage rec {
owner = "Bluetooth-Devices";
repo = "govee-ble";
rev = "refs/tags/v${version}";
hash = "sha256-g4tOu4nrJx1DVk2KLfF6HIEM7vTkfBg2fd7R1j+Xwrk=";
hash = "sha256-aWSf80WmVopkvqCzQKHEw9McrfepZcN+fhrUP90gf5U=";
};
postPatch = ''
substituteInPlace pyproject.toml \
--replace " --cov=govee_ble --cov-report=term-missing:skip-covered" ""
--replace-fail " --cov=govee_ble --cov-report=term-missing:skip-covered" ""
'';
nativeBuildInputs = [
poetry-core
];
build-system = [ poetry-core ];
propagatedBuildInputs = [
dependencies = [
bluetooth-data-tools
bluetooth-sensor-state-data
home-assistant-bluetooth
sensor-state-data
];
nativeCheckInputs = [
pytestCheckHook
];
nativeCheckInputs = [ pytestCheckHook ];
pythonImportsCheck = [
"govee_ble"
];
pythonImportsCheck = [ "govee_ble" ];
meta = with lib; {
description = "Library for Govee BLE devices";

View File

@ -11,7 +11,7 @@
buildPythonPackage rec {
pname = "llama-index-vector-stores-qdrant";
version = "0.2.5";
version = "0.2.7";
pyproject = true;
disabled = pythonOlder "3.8";
@ -19,7 +19,7 @@ buildPythonPackage rec {
src = fetchPypi {
pname = "llama_index_vector_stores_qdrant";
inherit version;
hash = "sha256-5lkQ0AZ15qx5v0PaaYYNElNUfjxY1i2rOKTSPVq5H9Y=";
hash = "sha256-jVkNFNKghukf1H6yRO5nEj3jWzrn51Xm1g5kS5Kd6m0=";
};
build-system = [ poetry-core ];

View File

@ -1,18 +1,20 @@
{ lib
, buildPythonPackage
, fetchFromGitHub
, pdm-backend
, future
, httplib2
, pythonOlder
, pytz
, pytestCheckHook
, six
{
lib,
buildPythonPackage,
fetchFromGitHub,
future,
httplib2,
httpx,
pdm-backend,
pytestCheckHook,
pythonOlder,
pytz,
six,
}:
buildPythonPackage rec {
pname = "nebula3-python";
version = "3.5.0";
version = "3.5.1";
pyproject = true;
disabled = pythonOlder "3.8";
@ -21,27 +23,22 @@ buildPythonPackage rec {
owner = "vesoft-inc";
repo = "nebula-python";
rev = "refs/tags/v${version}";
hash = "sha256-T9lZVYov6tQ8QRM2QtOGyolHk3O5FSb3xq70nS2Rr6c=";
hash = "sha256-9JpdCR8ewOJcvJ3fAg/AcMKtSz7NBIqWAuG9cofv0Ak=";
};
build-system = [
pdm-backend
];
build-system = [ pdm-backend ];
dependencies = [
future
httplib2
httpx
pytz
six
];
] ++ httpx.optional-dependencies.http2;
nativeCheckInputs = [
pytestCheckHook
];
nativeCheckInputs = [ pytestCheckHook ];
pythonImportsCheck = [
"nebula3"
];
pythonImportsCheck = [ "nebula3" ];
disabledTestPaths = [
# Tests require a running thrift instance

View File

@ -11,7 +11,7 @@
buildPythonPackage rec {
pname = "pyfibaro";
version = "0.7.7";
version = "0.7.8";
pyproject = true;
disabled = pythonOlder "3.9";
@ -20,7 +20,7 @@ buildPythonPackage rec {
owner = "rappenze";
repo = "pyfibaro";
rev = "refs/tags/${version}";
hash = "sha256-jsl2Xc6bzN7SVyMnFeCwMpFUEa6xUWGn/T96MrDXlCE=";
hash = "sha256-gid+qbl4RgT47zC5i1Usw2Zco+jb2LJeeMkKvni/aDM=";
};
build-system = [ setuptools ];

View File

@ -3,21 +3,26 @@
, fetchFromGitHub
, pyserial
, pytestCheckHook
, setuptools
}:
buildPythonPackage rec {
pname = "pyrfxtrx";
version = "0.31.0";
format = "setuptools";
version = "0.31.1";
pyproject = true;
src = fetchFromGitHub {
owner = "Danielhiversen";
repo = "pyRFXtrx";
rev = "refs/tags/${version}";
hash = "sha256-0t5pPBk8Mzdm6STGtqGMljPjDoW2DTT7x21MEnG512w=";
hash = "sha256-Y9UVJZxm5G5ywNLW8nm162cZTs3/mFeI+ZEUGoc9eAs=";
};
propagatedBuildInputs = [
build-system = [
setuptools
];
dependencies = [
pyserial
];
@ -25,14 +30,10 @@ buildPythonPackage rec {
pytestCheckHook
];
disabledTestPaths = [
# https://github.com/Danielhiversen/pyRFXtrx/issues/130
"tests/test_rollertrol.py"
];
meta = with lib; {
description = "Library to communicate with the RFXtrx family of devices";
homepage = "https://github.com/Danielhiversen/pyRFXtrx";
changelog = "https://github.com/Danielhiversen/pyRFXtrx/releases/tag/${version}";
license = licenses.lgpl3Plus;
maintainers = with maintainers; [ dotlambda ];
};

View File

@ -16,7 +16,7 @@
buildPythonPackage rec {
pname = "pysam";
version = "0.22.0";
version = "0.22.1";
pyproject = true;
# Fetching from GitHub instead of PyPi cause the 0.13 src release on PyPi is
@ -26,7 +26,7 @@ buildPythonPackage rec {
owner = "pysam-developers";
repo = "pysam";
rev = "refs/tags/v${version}";
hash = "sha256-TLqZF5NS9ROH8z7c2ZxfOYNRIe5pabMNBuhQ4azFmDU=";
hash = "sha256-1sivEf8xN4SJPtJiAcBZG1bbgy66yWXzQis1mPeU+sA=";
};
nativeBuildInputs = [

View File

@ -10,7 +10,7 @@
buildPythonPackage rec {
pname = "tencentcloud-sdk-python";
version = "3.0.1135";
version = "3.0.1136";
pyproject = true;
disabled = pythonOlder "3.9";
@ -19,7 +19,7 @@ buildPythonPackage rec {
owner = "TencentCloud";
repo = "tencentcloud-sdk-python";
rev = "refs/tags/${version}";
hash = "sha256-qrD33e9mOmgi/y9YArxjuV+wbkx9+/Jy0mJBYdVG4Ws=";
hash = "sha256-bQjfbkfxlnZezk+ZCnXmDaWJqA7bHbxf2tnqq8Sp1tw=";
};
build-system = [ setuptools ];

View File

@ -12,6 +12,8 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ m4 makeWrapper ];
buildInputs = [ libbsd ] ++ (with perlPackages; [ perl SysCPU ]);
CXXFLAGS = "-std=c++98";
postInstall = ''
substituteInPlace $out/bin/compiler_test.pl \
--replace '$CSMITH_HOME/runtime' $out/include/${pname}-${version} \

View File

@ -2,13 +2,13 @@
buildGoModule rec {
pname = "pet";
version = "0.7.0";
version = "0.7.1";
src = fetchFromGitHub {
owner = "knqyf263";
repo = "pet";
rev = "v${version}";
sha256 = "sha256-2C87oqMyq85cbN2rq8aEkEyFC5IZCw75TMQSjzR+RrY=";
sha256 = "sha256-UN7UkwzMz5KGZZqfK+g3bja/dBO6oy682b8qqYgSfPU=";
};
vendorHash = "sha256-ebdPWKNL9i3sEGpfDCXIfOaFQjV5LXohug2qFXeWenk=";

View File

@ -3,16 +3,16 @@
rustPlatform.buildRustPackage rec {
pname = "railway";
version = "3.5.2";
version = "3.7.0";
src = fetchFromGitHub {
owner = "railwayapp";
repo = "cli";
rev = "v${version}";
hash = "sha256-QlynZgmDd7m7m17J5lUTmejkKdQlfjiqcXg4ZMFp0vc=";
hash = "sha256-a3d1FtcXSLL8peveBagTEF6EcNADNDhnLAmyCfTW4+4=";
};
cargoHash = "sha256-TOuxJL2UtMA9mZLHZVQDD6lyL9VWy/HBNfezhOGbSG8=";
cargoHash = "sha256-fwraQd7dOamhc3Tp3yLxASWCVhDOxj4vX7oTTOufkeY=";
nativeBuildInputs = [ pkg-config ];

View File

@ -60,7 +60,11 @@ stdenv.mkDerivation (finalAttrs: {
"-DLauncher_BUILD_PLATFORM=nixpkgs"
] ++ lib.optionals (msaClientID != null) [ "-DLauncher_MSA_CLIENT_ID=${msaClientID}" ]
++ lib.optionals (lib.versionOlder qtbase.version "6") [ "-DLauncher_QT_VERSION_MAJOR=5" ]
++ lib.optionals stdenv.isDarwin [ "-DINSTALL_BUNDLE=nodeps" "-DMACOSX_SPARKLE_UPDATE_FEED_URL=''" ];
++ lib.optionals stdenv.isDarwin [
"-DINSTALL_BUNDLE=nodeps"
"-DMACOSX_SPARKLE_UPDATE_FEED_URL=''"
"-DCMAKE_INSTALL_PREFIX=${placeholder "out"}/Applications/"
];
postUnpack = ''
rm -rf source/libraries/libnbtplusplus

View File

@ -72,7 +72,7 @@ symlinkJoin {
]
++ lib.optional (lib.versionAtLeast qtbase.version "6" && stdenv.isLinux) qtwayland;
waylandPreExec = ''
waylandPreExec = lib.optionalString withWaylandGLFW ''
if [ -n "$WAYLAND_DISPLAY" ]; then
export LD_LIBRARY_PATH=${lib.getLib glfw-wayland-minecraft}/lib:"$LD_LIBRARY_PATH"
fi

View File

@ -33,12 +33,12 @@ rec {
stable = if stdenv.hostPlatform.system == "i686-linux" then legacy_390 else latest;
production = generic {
version = "550.76";
sha256_64bit = "sha256-2/wAmBNiePhX74FsV7j21LnCaubxMC/kAYMmf8kQt1s=";
sha256_aarch64 = "sha256-LhiyYCUTFwqzUITK6CKIqxOQp62wG1RuKOuP0fTKoVk=";
openSha256 = "sha256-RWaUXIr/yCRmX4yIyUxvBxrKCLKRKSi4lQJAYvrd2Kg=";
settingsSha256 = "sha256-Lv95+0ahvU1+X/twzWWVqQH4nqq491ALigH9TVBn+YY=";
persistencedSha256 = "sha256-rbgI9kGdVzGlPNEvaoOq2zrAMx+H8D+XEBah2eqZzuI=";
version = "550.78";
sha256_64bit = "sha256-NAcENFJ+ydV1SD5/EcoHjkZ+c/be/FQ2bs+9z+Sjv3M=";
sha256_aarch64 = "sha256-2POG5RWT2H7Rhs0YNfTGHO64Q8u5lJD9l/sQCGVb+AA=";
openSha256 = "sha256-cF9omNvfHx6gHUj2u99k6OXrHGJRpDQDcBG3jryf41Y=";
settingsSha256 = "sha256-lZiNZw4dJw4DI/6CI0h0AHbreLm825jlufuK9EB08iw=";
persistencedSha256 = "sha256-qDGBAcZEN/ueHqWO2Y6UhhXJiW5625Kzo1m/oJhvbj4=";
};
latest = selectHighestVersion production (generic {

File diff suppressed because it is too large Load Diff

View File

@ -15,12 +15,12 @@
}:
let
version = "0.9.1";
version = "0.10.1";
src = fetchFromGitHub {
owner = "openobserve";
repo = "openobserve";
rev = "v${version}";
hash = "sha256-AQxSR2cMkNst5YEv4TqVNgdriMsg/0ed5YN4W8qZKxM=";
hash = "sha256-68fJYk/R1F7FHm4F+pyyA9BRVdV8S8p5uEM1hVbuArg=";
};
web = buildNpmPackage {
inherit src version;
@ -28,7 +28,7 @@ let
sourceRoot = "${src.name}/web";
npmDepsHash = "sha256-c82NLNLfqQrS/jv7ixpLCYDMEUtx6+Mm8cSwvVis2fc=";
npmDepsHash = "sha256-7l1tdgR/R7qaYBbBm9OnKDBETPkaIN8AUgc9WdYQuwI=";
preBuild = ''
# Patch vite config to not open the browser to visualize plugin composition
@ -65,6 +65,7 @@ rustPlatform.buildRustPackage {
cargoLock = {
lockFile = ./Cargo.lock;
outputHashes = {
"chromiumoxide-0.5.7" = "sha256-GHrm5u8FtXRUjSRGMU4PNU6AJZ5W2KcgfZY1c/CBVYA=";
"enrichment-0.1.0" = "sha256-FDPSCBkx+DPeWwTBz9+ORcbbiSBC2a8tJaay9Pxwz4w=";
};
};
@ -125,6 +126,7 @@ rustPlatform.buildRustPackage {
"--skip service::users::tests::test_post_user"
"--skip service::users::tests::test_user"
"--skip common::infra::cache::file_data::disk::tests::test_get_file_from_cache"
"--skip common::infra::cluster::tests::test_consistent_hashing"
"--skip common::infra::db::tests::test_get"
"--skip common::utils::auth::tests::test_is_root_user2"
"--skip tests::e2e_test"

View File

@ -5,17 +5,17 @@
buildGoModule rec {
pname = "node_exporter";
version = "1.7.0";
version = "1.8.0";
rev = "v${version}";
src = fetchFromGitHub {
inherit rev;
owner = "prometheus";
repo = "node_exporter";
sha256 = "sha256-+KY/YXEqT/40QzODOk8lKAo0zMcNuiMvj6ippbJE9ho=";
hash = "sha256-TC7F/LQnn6OIhvWLy75MQyVGS7DlgJLbbaAUZUZTvEo=";
};
vendorHash = "sha256-HrlzDupZP9+GxB58Lg62tvku1Sl2zo2iV0KnBNwkM58=";
vendorHash = "sha256-sly8AJk+jNZG8ijTBF1Pd5AOOUJJxIG8jHwBUdlt8fM=";
# FIXME: tests fail due to read-only nix store
doCheck = false;

View File

@ -6,16 +6,16 @@
buildGoModule rec {
pname = "spicedb";
version = "1.30.1";
version = "1.31.0";
src = fetchFromGitHub {
owner = "authzed";
repo = "spicedb";
rev = "v${version}";
hash = "sha256-4hxIDdmPXU+wnD6O7S/H30YIAroOWAQobAPimwwxxv0=";
hash = "sha256-xbYK+9wTsOIh8fpgbL63JmDzsXFmfPa0TKS06hmwLAg=";
};
vendorHash = "sha256-lMhfCkuLuA8aj3Q+I/v/Ohof/htBJjPRmQ3c9QXsioc=";
vendorHash = "sha256-RBQfrz74Fzse9Rjj6DGfMttbupfSFjP5KbxFHihwMKY=";
subPackages = [ "cmd/spicedb" ];

View File

@ -30,7 +30,6 @@ stdenv.mkDerivation rec {
})
];
# fix for case-sensitive filesystems
# https://github.com/MCredstoner2004/ImageLOL/issues/1
postPatch = ''
@ -46,7 +45,7 @@ stdenv.mkDerivation rec {
cp ./ImageLOL $out/bin
'';
cmakeFlags = lib.optional (stdenv.isDarwin && stdenv.isAarch64) "-DPNG_ARM_NEON=off";
cmakeFlags = [ (lib.cmakeFeature "CMAKE_C_FLAGS" "-std=gnu90") ] ++ lib.optional (stdenv.isDarwin && stdenv.isAarch64) "-DPNG_ARM_NEON=off";
meta = with lib; {
homepage = "https://github.com/MCredstoner2004/ImageLOL";

View File

@ -17,16 +17,22 @@
rustPlatform.buildRustPackage rec {
pname = "mise";
version = "2024.4.0";
version = "2024.4.5";
src = fetchFromGitHub {
owner = "jdx";
repo = "mise";
rev = "v${version}";
hash = "sha256-l+Em04q40R5iTm4lNjY6sRE7Vu7UBl7lPNU9yj/hKzk=";
hash = "sha256-JnPsP19c7oE6bRVOd3Afok0A0Sn/tUOoc1DCjurueW0=";
# registry is not needed for compilation nor for tests.
# contains files with the same name but different case, which cause problems with hash on darwin
postFetch = ''
rm -rf $out/registry
'';
};
cargoHash = "sha256-BPPjR0o+M5sTBWRgq3kOL+94qnRKnskLyFRUEPlPQtA=";
cargoHash = "sha256-trf4nJ2BmpzWvZb2YG/6i540k1xvLJVesc6g/AEgaVk=";
nativeBuildInputs = [ installShellFiles pkg-config ];
buildInputs = [ openssl ] ++ lib.optionals stdenv.isDarwin [ Security SystemConfiguration ];

View File

@ -2,24 +2,26 @@
buildGoModule rec {
pname = "otel-cli";
version = "0.4.4";
version = "0.4.5";
src = fetchFromGitHub {
owner = "equinix-labs";
repo = pname;
rev = "v${version}";
hash = "sha256-XVhnDtt2FhYgfGWDPFkneZTboeHGaIbiF5YdHoqB8N8=";
hash = "sha256-JYi9CbP4mUhX0zNjhi6QlBzLKcj2zdPwlyBSIYKp6vk=";
};
vendorHash = "sha256-HwbEqWtOqiTe5Z/MtMAs63Lzvll/vgmbCpMTREXgtXA=";
vendorHash = "sha256-fWQz7ZrU8gulhpOHSN8Prn4EMC0KXy942FZD/PMsLxc=";
preCheck = ''
ln -s $GOPATH/bin/otel-cli .
'' + lib.optionalString (!stdenv.isDarwin) ''
substituteInPlace main_test.go \
--replace 'const minimumPath = `/bin:/usr/bin`' 'const minimumPath = `${lib.makeBinPath [ getent coreutils ]}`'
--replace-fail 'const minimumPath = `/bin:/usr/bin`' 'const minimumPath = `${lib.makeBinPath [ getent coreutils ]}`'
'';
patches = [ ./patches/bin-echo-patch.patch ];
passthru.updateScript = nix-update-script {};
meta = with lib; {

View File

@ -0,0 +1,21 @@
diff --git a/data_for_test.go b/data_for_test.go
index c0b8980..691e270 100644
--- a/data_for_test.go
+++ b/data_for_test.go
@@ -555,14 +555,14 @@ var suites = []FixtureSuite{
"--endpoint", "{{endpoint}}",
"--verbose", "--fail",
"--attrs", "zy=ab", // ensure CLI args still propagate
- "--", "/bin/echo", "a", "z",
+ "--", "echo", "a", "z",
},
},
Expect: Results{
SpanCount: 1,
CliOutput: "a z\n",
SpanData: map[string]string{
- "attributes": "/^process.command=/bin/echo,process.command_args=/bin/echo,a,z,process.owner=\\w+,process.parent_pid=\\d+,process.pid=\\d+,zy=ab/",
+ "attributes": "/^process.command=echo,process.command_args=echo,a,z,process.owner=\\w+,process.parent_pid=\\d+,process.pid=\\d+,zy=ab/",
},
},
},

View File

@ -6,18 +6,18 @@
buildGoModule rec {
pname = "cnspec";
version = "11.1.0";
version = "11.1.1";
src = fetchFromGitHub {
owner = "mondoohq";
repo = "cnspec";
rev = "refs/tags/v${version}";
hash = "sha256-fmvjjakKvsXBhXAfHp9+3X4vbgOPkBD9P9o6/UEdlGo=";
hash = "sha256-oc/3YHTeZbUoqcG39ot3CSa77TvIRLJLKVxJAmlAmjs=";
};
proxyVendor = true;
vendorHash = "sha256-q31SCURhtAWqD8IsQXYHek6l7DbbTNKS6J//z3ckD3M=";
vendorHash = "sha256-AYHnNrn5RXmhYObUmR9AbgI0BXlONYlZchUT+6Yh5F0=";
subPackages = [ "apps/cnspec" ];

View File

@ -1,40 +0,0 @@
{ lib
, stdenv
, rustPlatform
, fetchFromGitHub
, pkg-config
, wayland
}:
rustPlatform.buildRustPackage {
pname = "wl-clip-persist";
version = "0.3.1";
src = fetchFromGitHub {
owner = "Linus789";
repo = "wl-clip-persist";
# upstream doesn't tag releases
rev = "6ba11a2aa295d780f0b2e8f005cf176601d153b0";
hash = "sha256-wg4xEXLAZpWflFejP7ob4cnmRvo9d/0dL9hceG+RUr0=";
};
cargoHash = "sha256-vNxNvJ5tA323EVArJ6glNslkq/Q6u7NsIpTYO1Q3GEw=";
nativeBuildInputs = [
pkg-config
];
buildInputs = [
wayland
];
meta = with lib; {
broken = stdenv.isDarwin;
description = "Keep Wayland clipboard even after programs close";
homepage = "https://github.com/Linus789/wl-clip-persist";
inherit (wayland.meta) platforms;
license = licenses.mit;
mainProgram = "wl-clip-persist";
maintainers = with maintainers; [ ];
};
}

View File

@ -4754,8 +4754,6 @@ with pkgs;
wlay = callPackage ../tools/wayland/wlay { };
wl-clip-persist = callPackage ../tools/wayland/wl-clip-persist { };
wl-clipboard = callPackage ../tools/wayland/wl-clipboard { };
wl-clipboard-x11 = callPackage ../tools/wayland/wl-clipboard-x11 { };

View File

@ -88,8 +88,12 @@ let
biniou = callPackage ../development/ocaml-modules/biniou { };
binning = callPackage ../development/ocaml-modules/binning { };
biocaml = janeStreet_0_15.biocaml;
biotk = janeStreet_0_15.biotk;
bisect_ppx = callPackage ../development/ocaml-modules/bisect_ppx { };
bistro = callPackage ../development/ocaml-modules/bistro { };
@ -819,10 +823,18 @@ let
cfstream = self.cfstream.override { inherit core_kernel; };
};
biotk = let
angstrom = self.angstrom.override { inherit ppx_let; };
in callPackage ../development/ocaml-modules/biotk {
angstrom-unix = self.angstrom-unix.override { inherit angstrom; };
ppx_deriving = self.ppx_deriving.override { inherit (jsDeps) ppxlib; };
uri = self.uri.override { inherit angstrom; };
vg = self.vg.override { htmlcBackend = false; };
};
phylogenetics = let
angstrom = self.angstrom.override { inherit ppx_let; };
in callPackage ../development/ocaml-modules/phylogenetics {
inherit biocaml;
ppx_deriving = self.ppx_deriving.override { inherit (jsDeps) ppxlib; };
angstrom-unix = self.angstrom-unix.override { inherit angstrom; };
};
@ -1715,6 +1727,8 @@ let
stog_asy = callPackage ../applications/misc/stog/asy.nix { };
stog_markdown = callPackage ../applications/misc/stog/markdown.nix { };
streaming = callPackage ../development/ocaml-modules/streaming { };
stringext = callPackage ../development/ocaml-modules/stringext { };
syslog = callPackage ../development/ocaml-modules/syslog { };