Merge master into staging-next

This commit is contained in:
github-actions[bot] 2024-10-19 18:03:54 +00:00 committed by GitHub
commit d5c9b46499
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
50 changed files with 866 additions and 354 deletions

View File

@ -6529,6 +6529,13 @@
githubId = 46724898; githubId = 46724898;
name = "Erik Backman"; name = "Erik Backman";
}; };
erikeah = {
email = "erikeah@protonmail.com";
github = "erikeah";
githubId = 11900869;
keys = [ { fingerprint = "4142 0380 C7F8 BCDA CC9E 7ABA 0FF3 076B 71F2 5DEF"; } ];
name = "Erik Alonso";
};
erikryb = { erikryb = {
email = "erik.rybakken@math.ntnu.no"; email = "erik.rybakken@math.ntnu.no";
github = "erikryb"; github = "erikryb";
@ -7877,6 +7884,17 @@
githubId = 15957973; githubId = 15957973;
name = "Jeffry Molanus"; name = "Jeffry Molanus";
}; };
gileri = {
email = "s@linuxw.info";
github = "gileri";
githubId = 493438;
name = "Éric Gillet";
keys = [
{
fingerprint = "E478 85DC 8F33 FA86 D3FC 183D 80A8 14DB 8ED5 70BC";
}
];
};
gilice = { gilice = {
email = "gilice@proton.me"; email = "gilice@proton.me";
github = "gilice"; github = "gilice";

View File

@ -169,6 +169,9 @@
- [chromadb](https://www.trychroma.com/), an open-source AI application - [chromadb](https://www.trychroma.com/), an open-source AI application
database. Batteries included. Available as [services.chromadb](options.html#opt-services.chromadb.enable). database. Batteries included. Available as [services.chromadb](options.html#opt-services.chromadb.enable).
- [bitmagnet](https://bitmagnet.io/), A self-hosted BitTorrent indexer, DHT crawler, content classifier and torrent search engine with web UI, GraphQL API and Servarr stack integration.
Available as [services.bitmagnet](options.html#opt-services.bitmagnet.enable).
- [Wakapi](https://wakapi.dev/), a time tracking software for programmers. Available as [services.wakapi](#opt-services.wakapi.enable). - [Wakapi](https://wakapi.dev/), a time tracking software for programmers. Available as [services.wakapi](#opt-services.wakapi.enable).
- [foot](https://codeberg.org/dnkl/foot), a fast, lightweight and minimalistic Wayland terminal emulator. Available as [programs.foot](#opt-programs.foot.enable). - [foot](https://codeberg.org/dnkl/foot), a fast, lightweight and minimalistic Wayland terminal emulator. Available as [programs.foot](#opt-programs.foot.enable).

View File

@ -593,6 +593,7 @@
./services/hardware/irqbalance.nix ./services/hardware/irqbalance.nix
./services/hardware/joycond.nix ./services/hardware/joycond.nix
./services/hardware/kanata.nix ./services/hardware/kanata.nix
./services/hardware/kmonad.nix
./services/hardware/lcd.nix ./services/hardware/lcd.nix
./services/hardware/libinput.nix ./services/hardware/libinput.nix
./services/hardware/lirc.nix ./services/hardware/lirc.nix
@ -1359,6 +1360,7 @@
./services/system/uptimed.nix ./services/system/uptimed.nix
./services/system/userborn.nix ./services/system/userborn.nix
./services/system/zram-generator.nix ./services/system/zram-generator.nix
./services/torrent/bitmagnet.nix
./services/torrent/deluge.nix ./services/torrent/deluge.nix
./services/torrent/flexget.nix ./services/torrent/flexget.nix
./services/torrent/flood.nix ./services/torrent/flood.nix

View File

@ -0,0 +1,190 @@
{
config,
lib,
pkgs,
...
}:
let
cfg = config.services.kmonad;
# Per-keyboard options:
keyboard =
{ name, ... }:
{
options = {
name = lib.mkOption {
type = lib.types.str;
example = "laptop-internal";
description = "Keyboard name.";
};
device = lib.mkOption {
type = lib.types.path;
example = "/dev/input/by-id/some-dev";
description = "Path to the keyboard's device file.";
};
extraGroups = lib.mkOption {
type = lib.types.listOf lib.types.str;
default = [ ];
description = ''
Extra permission groups to attach to the KMonad instance for
this keyboard.
Since KMonad runs as an unprivileged user, it may sometimes
need extra permissions in order to read the keyboard device
file. If your keyboard's device file isn't in the input
group you'll need to list its group in this option.
'';
};
defcfg = {
enable = lib.mkEnableOption ''
Automatically generate the defcfg block.
When this is option is set to true the config option for
this keyboard should not include a defcfg block.
'';
compose = {
key = lib.mkOption {
type = lib.types.nullOr lib.types.str;
default = "ralt";
description = "The (optional) compose key to use.";
};
delay = lib.mkOption {
type = lib.types.int;
default = 5;
description = "The delay (in milliseconds) between compose key sequences.";
};
};
fallthrough = lib.mkEnableOption "Re-emit unhandled key events.";
allowCommands = lib.mkEnableOption "Allow keys to run shell commands.";
};
config = lib.mkOption {
type = lib.types.lines;
description = "Keyboard configuration.";
};
};
config = {
name = lib.mkDefault name;
};
};
# Create a complete KMonad configuration file:
mkCfg =
keyboard:
let
defcfg = ''
(defcfg
input (device-file "${keyboard.device}")
output (uinput-sink "kmonad-${keyboard.name}")
${
lib.optionalString (keyboard.defcfg.compose.key != null) ''
cmp-seq ${keyboard.defcfg.compose.key}
cmp-seq-delay ${toString keyboard.defcfg.compose.delay}
''
}
fallthrough ${lib.boolToString keyboard.defcfg.fallthrough}
allow-cmd ${lib.boolToString keyboard.defcfg.allowCommands}
)
'';
in
pkgs.writeTextFile {
name = "kmonad-${keyboard.name}.cfg";
text = lib.optionalString keyboard.defcfg.enable (defcfg + "\n") + keyboard.config;
checkPhase = "${cfg.package}/bin/kmonad -d $out";
};
# Build a systemd path config that starts the service below when a
# keyboard device appears:
mkPath =
keyboard:
let
name = "kmonad-${keyboard.name}";
in
lib.nameValuePair name {
description = "KMonad trigger for ${keyboard.device}";
wantedBy = [ "paths.target" ];
pathConfig = {
Unit = "${name}.service";
PathExists = keyboard.device;
};
};
# Build a systemd service that starts KMonad:
mkService =
keyboard:
let
cmd = [
(lib.getExe cfg.package)
"--input"
''device-file "${keyboard.device}"''
] ++ cfg.extraArgs ++ [ "${mkCfg keyboard}" ];
in
lib.nameValuePair "kmonad-${keyboard.name}" {
description = "KMonad for ${keyboard.device}";
script = lib.escapeShellArgs cmd;
unitConfig = {
# Control rate limiting.
# Stop the restart logic if we restart more than
# StartLimitBurst times in a period of StartLimitIntervalSec.
StartLimitIntervalSec = 2;
StartLimitBurst = 5;
};
serviceConfig = {
Restart = "always";
# Restart at increasing intervals from 2s to 1m
RestartSec = 2;
RestartSteps = 30;
RestartMaxDelaySec = "1min";
Nice = -20;
DynamicUser = true;
User = "kmonad";
Group = "kmonad";
SupplementaryGroups = [
# These ensure that our dynamic user has access to the device node
config.users.groups.input.name
config.users.groups.uinput.name
] ++ keyboard.extraGroups;
};
};
in
{
options.services.kmonad = {
enable = lib.mkEnableOption "KMonad: An advanced keyboard manager.";
package = lib.mkPackageOption pkgs "kmonad" { };
keyboards = lib.mkOption {
type = lib.types.attrsOf (lib.types.submodule keyboard);
default = { };
description = "Keyboard configuration.";
};
extraArgs = lib.mkOption {
type = lib.types.listOf lib.types.str;
default = [ ];
example = [
"--log-level"
"debug"
];
description = "Extra arguments to pass to KMonad.";
};
};
config = lib.mkIf cfg.enable {
hardware.uinput.enable = true;
systemd = {
paths = lib.mapAttrs' (_: mkPath) cfg.keyboards;
services = lib.mapAttrs' (_: mkService) cfg.keyboards;
};
};
}

View File

@ -55,11 +55,17 @@ in
systemd.packages = [ cfg.package ]; systemd.packages = [ cfg.package ];
systemd.services.sing-box = { systemd.services.sing-box = {
preStart = '' preStart = utils.genJqSecretsReplacementSnippet cfg.settings "/run/sing-box/config.json";
umask 0077 serviceConfig = {
mkdir -p /etc/sing-box StateDirectory = "sing-box";
${utils.genJqSecretsReplacementSnippet cfg.settings "/etc/sing-box/config.json"} StateDirectoryMode = "0700";
''; RuntimeDirectory = "sing-box";
RuntimeDirectoryMode = "0700";
ExecStart = [
""
"${lib.getExe cfg.package} -D \${STATE_DIRECTORY} -C \${RUNTIME_DIRECTORY} run"
];
};
wantedBy = [ "multi-user.target" ]; wantedBy = [ "multi-user.target" ];
}; };
}; };

View File

@ -0,0 +1,194 @@
{
pkgs,
config,
lib,
...
}:
let
cfg = config.services.bitmagnet;
inherit (lib)
mkEnableOption
mkIf
mkOption
mkPackageOption
optional
;
inherit (lib.types)
bool
int
port
str
submodule
;
inherit (lib.generators) toYAML;
freeformType = (pkgs.formats.yaml { }).type;
in
{
options.services.bitmagnet = {
enable = mkEnableOption "Bitmagnet service";
useLocalPostgresDB = mkOption {
description = "Use a local postgresql database, create user and database";
type = bool;
default = true;
};
settings = mkOption {
description = "Bitmagnet configuration (https://bitmagnet.io/setup/configuration.html).";
default = { };
type = submodule {
inherit freeformType;
options = {
http_server = mkOption {
default = { };
description = "HTTP server settings";
type = submodule {
inherit freeformType;
options = {
port = mkOption {
type = str;
default = ":3333";
description = "HTTP server listen port";
};
};
};
};
dht_server = mkOption {
default = { };
description = "DHT server settings";
type = submodule {
inherit freeformType;
options = {
port = mkOption {
type = port;
default = 3334;
description = "DHT listen port";
};
};
};
};
postgres = mkOption {
default = { };
description = "PostgreSQL database configuration";
type = submodule {
inherit freeformType;
options = {
host = mkOption {
type = str;
default = "";
description = "Address, hostname or Unix socket path of the database server";
};
name = mkOption {
type = str;
default = "bitmagnet";
description = "Database name to connect to";
};
user = mkOption {
type = str;
default = "";
description = "User to connect as";
};
password = mkOption {
type = str;
default = "";
description = "Password for database user";
};
};
};
};
};
};
};
package = mkPackageOption pkgs "bitmagnet" { };
user = mkOption {
description = "User running bitmagnet";
type = str;
default = "bitmagnet";
};
group = mkOption {
description = "Group of user running bitmagnet";
type = str;
default = "bitmagnet";
};
openFirewall = mkOption {
description = "Open DHT ports in firewall";
type = bool;
default = false;
};
};
config = mkIf cfg.enable {
environment.etc."xdg/bitmagnet/config.yml" = {
text = toYAML { } cfg.settings;
mode = "0440";
user = cfg.user;
group = cfg.group;
};
systemd.services.bitmagnet = {
enable = true;
wantedBy = [ "multi-user.target" ];
after = [
"network.target"
] ++ optional cfg.useLocalPostgresDB "postgresql.service";
requires = optional cfg.useLocalPostgresDB "postgresql.service";
serviceConfig = {
Type = "simple";
DynamicUser = true;
User = cfg.user;
Group = cfg.group;
ExecStart = "${cfg.package}/bin/bitmagnet worker run --all";
Restart = "on-failure";
WorkingDirectory = "/var/lib/bitmagnet";
StateDirectory = "bitmagnet";
# Sandboxing (sorted by occurrence in https://www.freedesktop.org/software/systemd/man/systemd.exec.html)
ProtectSystem = "strict";
ProtectHome = true;
PrivateTmp = true;
PrivateDevices = true;
ProtectHostname = true;
ProtectClock = true;
ProtectKernelTunables = true;
ProtectKernelModules = true;
ProtectKernelLogs = true;
ProtectControlGroups = true;
RestrictAddressFamilies = [
"AF_UNIX"
"AF_INET"
"AF_INET6"
];
RestrictNamespaces = true;
LockPersonality = true;
MemoryDenyWriteExecute = true;
RestrictRealtime = true;
RestrictSUIDSGID = true;
RemoveIPC = true;
PrivateMounts = true;
};
};
users.users = mkIf (cfg.user == "bitmagnet") {
bitmagnet = {
group = cfg.group;
isSystemUser = true;
};
};
users.groups = mkIf (cfg.group == "bitmagnet") { bitmagnet = { }; };
networking.firewall = mkIf cfg.openFirewall {
allowedTCPPorts = [ cfg.settings.dht_server.port ];
allowedUDPPorts = [ cfg.settings.dht_server.port ];
};
services.postgresql = mkIf cfg.useLocalPostgresDB {
enable = true;
ensureDatabases = [
cfg.settings.postgres.name
(if (cfg.settings.postgres.user == "") then cfg.user else cfg.settings.postgres.user)
];
ensureUsers = [
{
name = if (cfg.settings.postgres.user == "") then cfg.user else cfg.settings.postgres.user;
ensureDBOwnership = true;
}
];
};
};
meta.maintainers = with lib.maintainers; [ gileri ];
}

View File

@ -5015,6 +5015,18 @@ final: prev:
meta.homepage = "https://github.com/othree/html5.vim/"; meta.homepage = "https://github.com/othree/html5.vim/";
}; };
hunk-nvim = buildVimPlugin {
pname = "hunk.nvim";
version = "2024-09-19";
src = fetchFromGitHub {
owner = "julienvincent";
repo = "hunk.nvim";
rev = "eb89245a66bdfce10436d15923bf4deb43d23c96";
sha256 = "19j3gcv83gpqqpk39dd1q3wd7p3wrxgry57i3z21rchmd13dzfq9";
};
meta.homepage = "https://github.com/julienvincent/hunk.nvim/";
};
hydra-nvim = buildVimPlugin { hydra-nvim = buildVimPlugin {
pname = "hydra.nvim"; pname = "hydra.nvim";
version = "2024-09-05"; version = "2024-09-05";

View File

@ -419,6 +419,7 @@ https://github.com/smoka7/hop.nvim/,,
https://github.com/rktjmp/hotpot.nvim/,, https://github.com/rktjmp/hotpot.nvim/,,
https://github.com/lewis6991/hover.nvim/,HEAD, https://github.com/lewis6991/hover.nvim/,HEAD,
https://github.com/othree/html5.vim/,HEAD, https://github.com/othree/html5.vim/,HEAD,
https://github.com/julienvincent/hunk.nvim/,HEAD,
https://github.com/nvimtools/hydra.nvim/,HEAD, https://github.com/nvimtools/hydra.nvim/,HEAD,
https://github.com/mboughaba/i3config.vim/,, https://github.com/mboughaba/i3config.vim/,,
https://github.com/cocopon/iceberg.vim/,, https://github.com/cocopon/iceberg.vim/,,

View File

@ -26,14 +26,14 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "foxotron"; pname = "foxotron";
version = "2023-07-16"; version = "2024-09-23";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "Gargaj"; owner = "Gargaj";
repo = "Foxotron"; repo = "Foxotron";
rev = version; rev = version;
fetchSubmodules = true; fetchSubmodules = true;
hash = "sha256-s1eWZMVitVSP7nJJ5wXvnV8uI6yto7LmvlvocOwVAxw="; hash = "sha256-OnZWoiQ5ASKQV73/W6nl17B2ANwqCy/PlybHbNwrOyQ=";
}; };
patches = [ patches = [

View File

@ -1,7 +1,7 @@
{ lib { lib
, stdenv , stdenv
, fetchurl , fetchurl
, fetchFromGitHub , protobuf
, wrapQtAppsHook , wrapQtAppsHook
, python3 , python3
, zbar , zbar
@ -9,28 +9,9 @@
, enableQt ? true , enableQt ? true
, callPackage , callPackage
, qtwayland , qtwayland
, fetchPypi
}: }:
let let
version = "4.5.5";
python = python3.override {
self = python;
packageOverrides = self: super: {
# Pin ledger-bitcoin to 0.2.1
ledger-bitcoin = super.ledger-bitcoin.overridePythonAttrs (oldAttrs: rec {
version = "0.2.1";
format = "pyproject";
src = fetchPypi {
pname = "ledger_bitcoin";
inherit version;
hash = "sha256-AWl/q2MzzspNIo6yf30S92PgM/Ygsb+1lJsg7Asztso=";
};
});
};
};
libsecp256k1_name = libsecp256k1_name =
if stdenv.hostPlatform.isLinux then "libsecp256k1.so.{v}" if stdenv.hostPlatform.isLinux then "libsecp256k1.so.{v}"
else if stdenv.hostPlatform.isDarwin then "libsecp256k1.{v}.dylib" else if stdenv.hostPlatform.isDarwin then "libsecp256k1.{v}.dylib"
@ -41,39 +22,21 @@ let
else if stdenv.hostPlatform.isDarwin then "libzbar.0.dylib" else if stdenv.hostPlatform.isDarwin then "libzbar.0.dylib"
else "libzbar${stdenv.hostPlatform.extensions.sharedLibrary}"; else "libzbar${stdenv.hostPlatform.extensions.sharedLibrary}";
# Not provided in official source releases, which are what upstream signs.
tests = fetchFromGitHub {
owner = "spesmilo";
repo = "electrum";
rev = version;
sha256 = "sha256-CbhI/q+zjk9odxuvdzpogi046FqkedJooiQwS+WAkJ8=";
postFetch = ''
mv $out ./all
mv ./all/tests $out
'';
};
in in
python.pkgs.buildPythonApplication { python3.pkgs.buildPythonApplication rec {
pname = "electrum"; pname = "electrum";
inherit version; version = "4.5.6";
src = fetchurl { src = fetchurl {
url = "https://download.electrum.org/${version}/Electrum-${version}.tar.gz"; url = "https://download.electrum.org/${version}/Electrum-${version}.tar.gz";
sha256 = "1jiagz9avkbd158pcip7p4wz0pdsxi94ndvg5p8afvshb32aqwav"; hash = "sha256-LO2ZUvbDJaIxrdgA+cM3sGgqJ+N+UlA9ObNINQcrorA=";
}; };
postUnpack = '' build-system = [ protobuf ] ++ lib.optionals enableQt [ wrapQtAppsHook ];
# can't symlink, tests get confused
cp -ar ${tests} $sourceRoot/tests
'';
nativeBuildInputs = lib.optionals enableQt [ wrapQtAppsHook ];
buildInputs = lib.optional (stdenv.hostPlatform.isLinux && enableQt) qtwayland; buildInputs = lib.optional (stdenv.hostPlatform.isLinux && enableQt) qtwayland;
propagatedBuildInputs = with python.pkgs; [ dependencies = with python3.pkgs; [
aiohttp aiohttp
aiohttp-socks aiohttp-socks
aiorpcx aiorpcx
@ -104,7 +67,7 @@ python.pkgs.buildPythonApplication {
qdarkstyle qdarkstyle
]; ];
checkInputs = with python.pkgs; lib.optionals enableQt [ checkInputs = with python3.pkgs; lib.optionals enableQt [
pyqt6 pyqt6
]; ];
@ -136,7 +99,7 @@ python.pkgs.buildPythonApplication {
wrapQtApp $out/bin/electrum wrapQtApp $out/bin/electrum
''; '';
nativeCheckInputs = with python.pkgs; [ pytestCheckHook pyaes pycryptodomex ]; nativeCheckInputs = with python3.pkgs; [ pytestCheckHook pyaes pycryptodomex ];
pytestFlagsArray = [ "tests" ]; pytestFlagsArray = [ "tests" ];

View File

@ -18,7 +18,7 @@
, extraBuildInputs ? [] , extraBuildInputs ? []
, extraMakeFlags ? [] , extraMakeFlags ? []
, extraPassthru ? {} , extraPassthru ? {}
, tests ? [] , tests ? {}
}: }:
let let

View File

@ -27,7 +27,7 @@
license = lib.licenses.mpl20; license = lib.licenses.mpl20;
mainProgram = "firefox"; mainProgram = "firefox";
}; };
tests = [ nixosTests.firefox ]; tests = { inherit (nixosTests) firefox; };
updateScript = callPackage ./update.nix { updateScript = callPackage ./update.nix {
attrPath = "firefox-unwrapped"; attrPath = "firefox-unwrapped";
}; };
@ -55,7 +55,7 @@
license = lib.licenses.mpl20; license = lib.licenses.mpl20;
mainProgram = "firefox"; mainProgram = "firefox";
}; };
tests = [ nixosTests.firefox-beta ]; tests = { inherit (nixosTests) firefox-beta; };
updateScript = callPackage ./update.nix { updateScript = callPackage ./update.nix {
attrPath = "firefox-beta-unwrapped"; attrPath = "firefox-beta-unwrapped";
versionSuffix = "b[0-9]*"; versionSuffix = "b[0-9]*";
@ -86,7 +86,7 @@
license = lib.licenses.mpl20; license = lib.licenses.mpl20;
mainProgram = "firefox"; mainProgram = "firefox";
}; };
tests = [ nixosTests.firefox-devedition ]; tests = { inherit (nixosTests) firefox-devedition; };
updateScript = callPackage ./update.nix { updateScript = callPackage ./update.nix {
attrPath = "firefox-devedition-unwrapped"; attrPath = "firefox-devedition-unwrapped";
versionSuffix = "b[0-9]*"; versionSuffix = "b[0-9]*";
@ -115,7 +115,7 @@
license = lib.licenses.mpl20; license = lib.licenses.mpl20;
mainProgram = "firefox"; mainProgram = "firefox";
}; };
tests = [ nixosTests.firefox-esr-128 ]; tests = { inherit (nixosTests) firefox-esr-128; };
updateScript = callPackage ./update.nix { updateScript = callPackage ./update.nix {
attrPath = "firefox-esr-128-unwrapped"; attrPath = "firefox-esr-128-unwrapped";
versionPrefix = "128"; versionPrefix = "128";

View File

@ -58,7 +58,9 @@
license = lib.licenses.mpl20; license = lib.licenses.mpl20;
mainProgram = "floorp"; mainProgram = "floorp";
}; };
tests = [ nixosTests.floorp ]; tests = {
inherit (nixosTests) floorp;
};
}).override }).override
{ {
# Upstream build configuration can be found at # Upstream build configuration can be found at

View File

@ -26,7 +26,7 @@ in
license = lib.licenses.mpl20; license = lib.licenses.mpl20;
mainProgram = "librewolf"; mainProgram = "librewolf";
}; };
tests = [ nixosTests.librewolf ]; tests = { inherit (nixosTests) librewolf; };
updateScript = callPackage ./update.nix { updateScript = callPackage ./update.nix {
attrPath = "librewolf-unwrapped"; attrPath = "librewolf-unwrapped";
}; };

View File

@ -2,13 +2,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "helm-secrets"; pname = "helm-secrets";
version = "4.6.1"; version = "4.6.2";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "jkroepke"; owner = "jkroepke";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
hash = "sha256-AAc680STuXiGEw9ibFRHMrOxGs/c5pS0iEoymNHu+c8="; hash = "sha256-s76XIB7s92zSzG8GGsJJuTG3cwbGHL7oc1x30k/WoOU=";
}; };
nativeBuildInputs = [ makeWrapper ]; nativeBuildInputs = [ makeWrapper ];

View File

@ -31,13 +31,13 @@ let
in in
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "firewalld"; pname = "firewalld";
version = "2.2.1"; version = "2.2.3";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "firewalld"; owner = "firewalld";
repo = "firewalld"; repo = "firewalld";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-VI1LyedohInmZb7heNoZ/4cvLz5IImEE2tyNylvr2mU="; sha256 = "sha256-ugDleco/Ep+10ku+5xcW4zq/RrhruZCRlX0zKeXzLhg=";
}; };
patches = [ patches = [

View File

@ -1,63 +0,0 @@
{ lib, stdenv, fetchFromGitHub
, avahi
, cups
, gnutls
, libjpeg
, libpng
, libusb1
, pkg-config
, withPAMSupport ? true, pam
, zlib
}:
stdenv.mkDerivation rec {
pname = "pappl";
version = "1.4.6";
src = fetchFromGitHub {
owner = "michaelrsweet";
repo = pname;
rev = "v${version}";
sha256 = "sha256-d7QD6Kz4tBVHGFPBYcvRSzW+EtsNgpfweFvCx3ovfWE=";
};
outputs = [ "out" "dev" ];
nativeBuildInputs = [
pkg-config
];
buildInputs = [
cups
libjpeg
libpng
libusb1
zlib
] ++ lib.optionals (!stdenv.hostPlatform.isDarwin) [
# upstream mentions these are not needed for Mac
# see: https://github.com/michaelrsweet/pappl#requirements
avahi
gnutls
] ++ lib.optionals withPAMSupport [
pam
];
# testing requires some networking
# doCheck = true;
doInstallCheck = true;
installCheckPhase = ''
$out/bin/pappl-makeresheader --help
'';
enableParallelBuilding = true;
meta = with lib; {
description = "C-based framework/library for developing CUPS Printer Applications";
mainProgram = "pappl-makeresheader";
homepage = "https://github.com/michaelrsweet/pappl";
license = licenses.asl20;
platforms = platforms.linux; # should also work for darwin, but requires additional work
maintainers = [ ];
};
}

View File

@ -8,13 +8,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "obs-source-record"; pname = "obs-source-record";
version = "0.3.4"; version = "0.3.5";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "exeldro"; owner = "exeldro";
repo = "obs-source-record"; repo = "obs-source-record";
rev = version; rev = version;
sha256 = "sha256-VgG9Fn75aKTkth4TC9rhfj/HIOO2lIO4n3ZYmemkzx8="; sha256 = "sha256-RodZjab3DKiJwYuspdpCsF0ah4u5JtDDYoZPUGk36H4=";
}; };
nativeBuildInputs = [ cmake ]; nativeBuildInputs = [ cmake ];

View File

@ -11,13 +11,13 @@
buildGoModule rec { buildGoModule rec {
pname = "containerd"; pname = "containerd";
version = "1.7.22"; version = "1.7.23";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "containerd"; owner = "containerd";
repo = "containerd"; repo = "containerd";
rev = "v${version}"; rev = "v${version}";
hash = "sha256-8IHBKai4PvvTuHPDTgx9wFEBzz4MM7Mwo8Q/bzFRzfk="; hash = "sha256-vuOefU1cZr1pKCYHKyDBx/ohghgPlXhK3a38PQKH0pc=";
}; };
vendorHash = null; vendorHash = null;

View File

@ -107,12 +107,12 @@ stdenv.mkDerivation (finalAttrs: {
}) })
]; ];
meta = with lib; { meta = {
description = "A graphical tool for developing on containers and Kubernetes"; description = "A graphical tool for developing on containers and Kubernetes";
homepage = "https://podman-desktop.io"; homepage = "https://podman-desktop.io";
changelog = "https://github.com/containers/podman-desktop/releases/tag/v${version}"; changelog = "https://github.com/containers/podman-desktop/releases/tag/v${finalAttrs.version}";
license = licenses.asl20; license = lib.licenses.asl20;
maintainers = with maintainers; [ booxter panda2134 ]; maintainers = with lib.maintainers; [ booxter panda2134 ];
inherit (electron.meta) platforms; inherit (electron.meta) platforms;
mainProgram = "podman-desktop"; mainProgram = "podman-desktop";
}; };

View File

@ -0,0 +1,43 @@
{
lib,
fetchurl,
appimageTools,
webkitgtk_4_0,
}:
let
pname = "bitcomet";
version = "2.10.0";
src = fetchurl {
url = "https://download.bitcomet.com/linux/x86_64/BitComet-${version}-x86_64.AppImage";
hash = "sha256-HC9kThRuDcc7oWXuMeWe9g6P/v6GZQ8ho5sc4bNzsYw=";
};
appimageContents = appimageTools.extractType2 { inherit pname version src; };
in
appimageTools.wrapType2 {
inherit pname version src;
extraPkgs =
pkgs: with pkgs; [
libxml2
libpng
webkitgtk_4_0
];
extraInstallCommands = ''
mkdir -p $out/share/applications
install -m 444 ${appimageContents}/com.bitcomet.linux.desktop $out/share/applications/bitcomet.desktop
substituteInPlace $out/share/applications/bitcomet.desktop \
--replace-fail 'Exec=usr/bin/BitComet' 'Exec=bitcomet'
cp -r ${appimageContents}/usr/share/icons $out/share
'';
meta = {
homepage = "https://www.bitcomet.com";
description = "Free BitTorrent download client";
mainProgram = "bitcomet";
sourceProvenance = with lib.sourceTypes; [ binaryNativeCode ];
license = lib.licenses.unfree;
platforms = [ "x86_64-linux" ];
maintainers = with lib.maintainers; [ aucub ];
};
}

View File

@ -1,10 +1,10 @@
{ lib { lib
, buildGoModule , buildGo122Module # builds, but does not start on 1.23
, fetchFromGitHub , fetchFromGitHub
, nix-update-script , nix-update-script
}: }:
buildGoModule rec { buildGo122Module rec {
pname = "bitmagnet"; pname = "bitmagnet";
version = "0.9.5"; version = "0.9.5";

View File

@ -1,5 +1,5 @@
{ lib, fetchFromGitHub, rustPlatform }: { lib, fetchFromGitHub, rustPlatform }:
let version = "2.5.0"; let version = "2.5.1";
in rustPlatform.buildRustPackage { in rustPlatform.buildRustPackage {
pname = "catppuccin-whiskers"; pname = "catppuccin-whiskers";
inherit version; inherit version;
@ -8,10 +8,10 @@ in rustPlatform.buildRustPackage {
owner = "catppuccin"; owner = "catppuccin";
repo = "whiskers"; repo = "whiskers";
rev = "refs/tags/v${version}"; rev = "refs/tags/v${version}";
hash = "sha256-HsHBMJPSoDhSNwjAR7LbFG4Za4H2H+7itqgiKRdb4M8="; hash = "sha256-OLEXy9MCrPQu1KWICsYhe/ayVqxkYIFwyJoJhgiNDz4=";
}; };
cargoHash = "sha256-FpBgXP4kXSzrYP+ad+KubUG4NSDpyoaJwyReS86ETy8="; cargoHash = "sha256-5FvW+ioeDi0kofDswyQpUC21wbEZM8TAeUEUemnNfnA=";
meta = { meta = {
homepage = "https://github.com/catppuccin/whiskers"; homepage = "https://github.com/catppuccin/whiskers";

View File

@ -2,24 +2,27 @@
lib, lib,
rustPlatform, rustPlatform,
fetchFromGitHub, fetchFromGitHub,
nix-update-script,
}: }:
rustPlatform.buildRustPackage { rustPlatform.buildRustPackage rec {
pname = "desed"; pname = "desed";
version = "1.2.1-unstable-2024-09-06"; version = "1.2.2";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "SoptikHa2"; owner = "SoptikHa2";
repo = "desed"; repo = "desed";
rev = "master"; rev = "refs/tags/v${version}";
hash = "sha256-iCpEfefXXognk4YI1LLb3mwgaqMw4m3haq/gdS1JbQU="; hash = "sha256-FL9w+XdClLBCRp+cLqDzTVj8j9LMUp8jZ6hiG4KvIds=";
}; };
cargoHash = "sha256-z2qv394C0GhQC21HuLyvlNjrM65KFEZh1XLj+Y/B9ZM="; cargoHash = "sha256-inH8fUpUR0WXYY2JX72evZqVp3GlnGKBBlrbai/fU6U=";
passthru.updateScript = nix-update-script { };
meta = { meta = {
changelog = "https://github.com/SoptikHa2/desed/releases/tag/v1.2.1"; changelog = "https://github.com/SoptikHa2/desed/releases/tag/v${version}";
description = "Debugger for Sed: demystify and debug your sed scripts, from comfort of your terminal. "; description = "Debugger for Sed: demystify and debug your sed scripts, from comfort of your terminal";
homepage = "https://github.com/SoptikHa2/desed"; homepage = "https://github.com/SoptikHa2/desed";
license = lib.licenses.gpl3Only; license = lib.licenses.gpl3Only;
maintainers = with lib.maintainers; [ vinylen ]; maintainers = with lib.maintainers; [ vinylen ];

View File

@ -0,0 +1,61 @@
diff --git a/src/Gui/PreferencePages/DlgSettingsEditor.cpp b/src/Gui/PreferencePages/DlgSettingsEditor.cpp
index 5f92058c18..b00104497b 100644
--- a/src/Gui/PreferencePages/DlgSettingsEditor.cpp
+++ b/src/Gui/PreferencePages/DlgSettingsEditor.cpp
@@ -56,27 +56,34 @@ namespace
*
* Based on
* https://stackoverflow.com/questions/18896933/qt-qfont-selection-of-a-monospace-font-doesnt-work
+ * Local fix to based on comment in
+ * https://github.com/FreeCAD/FreeCAD/issues/10514#issuecomment-1849176386
*/
+bool hasFixedPitch(const QFont& font)
+{
+ return QFontInfo(font).fixedPitch();
+}
+
QFont getMonospaceFont()
{
- QFont font(QString::fromLatin1("monospace"));
- if (font.fixedPitch()) {
- return font;
- }
- font.setStyleHint(QFont::Monospace);
- if (font.fixedPitch()) {
- return font;
+ if (QFont font = QFontDatabase::systemFont(QFontDatabase::FixedFont); hasFixedPitch(font)) {
+ return font; // should typically work.
}
- font.setStyleHint(QFont::TypeWriter);
- if (font.fixedPitch()) {
+
+ QFont font; // default QApplication font
+ font.setStyleHint(QFont::Courier); // may not work
+ if (hasFixedPitch(font)) {
return font;
}
- font.setFamily(QString::fromLatin1("courier"));
- if (font.fixedPitch()) {
- return font;
+ for (const char* family : {"Monospace", "Courier"}) {
+ font.setFamily(QString::fromLatin1(family));
+ if (hasFixedPitch(font)) {
+ return font;
+ }
}
- return font; // We failed, but return whatever we have anyway
+ return font;
}
+
} // namespace
/* TRANSLATOR Gui::Dialog::DlgSettingsEditor */
@@ -302,7 +309,7 @@ void DlgSettingsEditor::loadSettings()
ui->fontSize->setValue(10);
ui->fontSize->setValue(hGrp->GetInt("FontSize", ui->fontSize->value()));
- QByteArray defaultMonospaceFont = getMonospaceFont().family().toLatin1();
+ QByteArray defaultMonospaceFont = QFontInfo(getMonospaceFont()).family().toLatin1();
#if QT_VERSION < QT_VERSION_CHECK(6, 0, 0)
QStringList familyNames = QFontDatabase().families(QFontDatabase::Any);

View File

@ -131,6 +131,7 @@ stdenv.mkDerivation (finalAttrs: {
patches = [ patches = [
./0001-NIXOS-don-t-ignore-PYTHONPATH.patch ./0001-NIXOS-don-t-ignore-PYTHONPATH.patch
./0002-FreeCad-OndselSolver-pkgconfig.patch ./0002-FreeCad-OndselSolver-pkgconfig.patch
./0003-freecad-font-issue-10514.patch
]; ];
cmakeFlags = [ cmakeFlags = [

View File

@ -0,0 +1,32 @@
{
lib,
rustPlatform,
fetchFromGitHub,
}:
rustPlatform.buildRustPackage rec {
pname = "kamp";
version = "0.2.1";
src = fetchFromGitHub {
owner = "vbauerster";
repo = pname;
rev = "v${version}";
hash = "sha256-9cakFhA9niMZ0jD0ilgCUztk4uL6wDp6zfHUJY/yLYw=";
};
cargoHash = "sha256-BnVV0UnXEebq1kbQvv8PkmntLK0BwrOcMxxIODpZrxc=";
postInstall = ''
install scripts/* -Dt $out/bin
'';
meta = {
description = "Tool to control Kakoune editor from the command line";
homepage = "https://github.com/vbauerster/kamp";
license = lib.licenses.unlicense;
maintainers = with lib.maintainers; [ erikeah ];
mainProgram = "kamp";
platforms = lib.platforms.linux;
};
}

View File

@ -6,13 +6,13 @@
buildGoModule rec { buildGoModule rec {
pname = "mactop"; pname = "mactop";
version = "0.1.8"; version = "0.1.9";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "context-labs"; owner = "context-labs";
repo = "mactop"; repo = "mactop";
rev = "refs/tags/v${version}"; rev = "refs/tags/v${version}";
hash = "sha256-BcBUOI5EE04ZTPoHGrNQjctsDFbMoe/6MZaLj/58c34="; hash = "sha256-r9je+oeedQJsFBWWbOUcUls/EX0JZveUkmsXXtC8O0Q=";
}; };
vendorHash = "sha256-/KecVx4Gp776t8gFSO29E1q9v29nwrKIWZYCpj7IlSo="; vendorHash = "sha256-/KecVx4Gp776t8gFSO29E1q9v29nwrKIWZYCpj7IlSo=";

View File

@ -6,13 +6,13 @@
stdenv.mkDerivation (finalAttrs: { stdenv.mkDerivation (finalAttrs: {
pname = "nstool"; pname = "nstool";
version = "1.9.1"; version = "1.9.2";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "jakcron"; owner = "jakcron";
repo = "nstool"; repo = "nstool";
rev = "refs/tags/v${finalAttrs.version}"; rev = "refs/tags/v${finalAttrs.version}";
hash = "sha256-FF+USFL5Y6MkAKvfR05D/+L/XJSmkiSp9WLbF7Gg2V8="; hash = "sha256-az6AkBCO7Ew5jK/9qKQ65adwAKYf+H7QEvVI6LCXFS0=";
fetchSubmodules = true; fetchSubmodules = true;
}; };

View File

@ -0,0 +1,74 @@
{
lib,
stdenv,
fetchFromGitHub,
avahi,
cups,
gnutls,
libjpeg,
libpng,
libusb1,
pkg-config,
withPAMSupport ? true,
pam,
zlib,
}:
stdenv.mkDerivation rec {
pname = "pappl";
version = "1.4.7";
src = fetchFromGitHub {
owner = "michaelrsweet";
repo = "pappl";
rev = "refs/tags/v${version}";
hash = "sha256-Npry3H+QbAH19hoqAZuOwjpZwCPhOLewD8uKZlo4gdQ=";
};
outputs = [
"out"
"dev"
];
nativeBuildInputs = [
pkg-config
];
buildInputs =
[
cups
libjpeg
libpng
libusb1
zlib
]
++ lib.optionals (!stdenv.hostPlatform.isDarwin) [
# upstream mentions these are not needed for Mac
# see: https://github.com/michaelrsweet/pappl#requirements
avahi
gnutls
]
++ lib.optionals withPAMSupport [
pam
];
# testing requires some networking
# doCheck = true;
doInstallCheck = true;
installCheckPhase = ''
$out/bin/pappl-makeresheader --help
'';
enableParallelBuilding = true;
meta = {
description = "C-based framework/library for developing CUPS Printer Applications";
changelog = "https://github.com/michaelrsweet/pappl/blob/v${version}/CHANGES.md";
mainProgram = "pappl-makeresheader";
homepage = "https://github.com/michaelrsweet/pappl";
license = lib.licenses.asl20;
platforms = lib.platforms.linux; # should also work for darwin, but requires additional work
maintainers = [ lib.maintainers.NotAShelf ];
};
}

View File

@ -0,0 +1,74 @@
{
stdenv,
lib,
fetchFromGitLab,
python3,
meson,
ninja,
cmake,
vala,
gettext,
desktop-file-utils,
appstream-glib,
glib,
pkg-config,
libadwaita,
nix-update-script,
gtksourceview5,
wrapGAppsHook4,
}:
stdenv.mkDerivation (finalAttrs: {
pname = "snoop";
version = "0.4";
src = fetchFromGitLab {
domain = "gitlab.gnome.org";
owner = "philippun1";
repo = "snoop";
rev = "refs/tags/${finalAttrs.version}";
hash = "sha256-JrSUGxhlr4wCGoh589AkPRhNmfsi7msv9EO2k1pHlKY=";
};
patchPhase = ''
runHook prePatch
substituteInPlace build-aux/meson/postinstall.py \
--replace-fail "/usr/bin/env python3" "${lib.getExe python3}"
sed -i '/gtk-update-icon-cache/d' build-aux/meson/postinstall.py
sed -i '/update-desktop-database/d' build-aux/meson/postinstall.py
runHook postPatch
'';
nativeBuildInputs = [
meson
ninja
cmake
gettext
vala
desktop-file-utils
appstream-glib
pkg-config
wrapGAppsHook4
];
buildInputs = [
glib
libadwaita
gtksourceview5
];
passthru.updateScript = nix-update-script { };
meta = {
homepage = "https://gitlab.gnome.org/philippun1/snoop";
changelog = "https://gitlab.gnome.org/philippun1/snoop/-/releases/${finalAttrs.version}";
description = "Search through file contents in a given folder";
maintainers = with lib.maintainers; [ bot-wxt1221 ];
license = lib.licenses.gpl3Plus;
mainProgram = "snoop";
platforms = lib.platforms.unix;
};
})

View File

@ -9,13 +9,13 @@
rustPlatform.buildRustPackage rec { rustPlatform.buildRustPackage rec {
pname = "speakersafetyd"; pname = "speakersafetyd";
version = "1.0.0"; version = "1.0.2";
src = fetchCrate { src = fetchCrate {
inherit pname version; inherit pname version;
hash = "sha256-I1RTtD5V4Z8R8zed/b4FitHyE7gFAja5YcA+z0VvSX0="; hash = "sha256-3DzBNebg1y/+psD2zOpDsnRJmabQLeO1UMxPq9M0CsU=";
}; };
cargoHash = "sha256-8Dmts6SCRrZqyI+pdfgqsXfJy9Hqspbdb6EpQChMKDA="; cargoHash = "sha256-InWaPybZbUbhIF1MEMeTUGa8LRUPwcTdw7uclZ1zBu4=";
nativeBuildInputs = [ pkg-config ]; nativeBuildInputs = [ pkg-config ];
buildInputs = [ alsa-lib ]; buildInputs = [ alsa-lib ];

View File

@ -1,41 +1,42 @@
{ lib {
, makeWrapper lib,
, rustPlatform makeWrapper,
, pkg-config rustPlatform,
, fetchFromGitHub pkg-config,
, wayland fetchFromGitHub,
, wayland,
}: }:
rustPlatform.buildRustPackage rec { rustPlatform.buildRustPackage rec {
pname = "waycorner"; pname = "waycorner";
version = "0.2.3"; version = "0.2.3";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "AndreasBackx"; owner = "AndreasBackx";
repo = "waycorner"; repo = "waycorner";
rev = version; rev = "refs/tags/${version}";
hash = "sha256-b8juIhJ3kh+NJc8RUVVoatqjWISSW0ir/vk2Dz/428Y="; hash = "sha256-b8juIhJ3kh+NJc8RUVVoatqjWISSW0ir/vk2Dz/428Y=";
}; };
cargoHash = "sha256-LGxFRGzQ8jOfxT5di3+YGqfS5KM4+Br6KlTFpPbkJyU="; cargoHash = "sha256-LGxFRGzQ8jOfxT5di3+YGqfS5KM4+Br6KlTFpPbkJyU=";
buildInputs = [
wayland
];
nativeBuildInputs = [ nativeBuildInputs = [
pkg-config pkg-config
makeWrapper makeWrapper
]; ];
postFixup = '' postFixup = ''
# the program looks for libwayland-client.so at runtime # the program looks for libwayland-client.so at runtime
wrapProgram $out/bin/waycorner \ wrapProgram $out/bin/waycorner \
--prefix LD_LIBRARY_PATH : ${lib.makeLibraryPath [ wayland ]} --prefix LD_LIBRARY_PATH : ${lib.makeLibraryPath [ wayland ]}
''; '';
meta = with lib; { meta = {
description = "Hot corners for Wayland"; description = "Hot corners for Wayland";
mainProgram = "waycorner"; mainProgram = "waycorner";
changelog = "https://github.com/AndreasBackx/waycorner/blob/main/CHANGELOG.md"; changelog = "https://github.com/AndreasBackx/waycorner/blob/${version}/CHANGELOG.md";
homepage = "https://github.com/AndreasBackx/waycorner"; homepage = "https://github.com/AndreasBackx/waycorner";
platforms = platforms.linux; platforms = lib.platforms.linux;
license = licenses.mit; license = lib.licenses.mit;
maintainers = with maintainers; [ NotAShelf ]; maintainers = with lib.maintainers; [ NotAShelf ];
}; };
} }

View File

@ -12,13 +12,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "zziplib"; pname = "zziplib";
version = "0.13.74"; version = "0.13.78";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "gdraheim"; owner = "gdraheim";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
hash = "sha256-MjqGHzb+dsAq2PrcBhU3sv4eMX3afkgFWUbhDp+5o/s="; hash = "sha256-8QxQrxqYO4LtB8prMqgz5a0QqvSKL7KzTkgi+VdHp6A=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View File

@ -1,32 +0,0 @@
{ lib, stdenvNoCC, fetchurl, nix-update-script }:
stdenvNoCC.mkDerivation rec {
pname = "clash-geoip";
version = "20240912";
src = fetchurl {
url = "https://github.com/Dreamacro/maxmind-geoip/releases/download/${version}/Country.mmdb";
sha256 = "sha256-3Cxq5vA53g7+LUgvSneuq7UBjdKppvcVy3fh/cOwDI8=";
};
dontUnpack = true;
installPhase = ''
runHook preInstall
mkdir -p $out/etc/clash
install -Dm 0644 $src -D $out/etc/clash/Country.mmdb
runHook postInstall
'';
passthru = {
updateScript = nix-update-script { };
};
meta = with lib; {
description = "GeoLite2 data created by MaxMind";
homepage = "https://github.com/Dreamacro/maxmind-geoip";
license = licenses.unfree;
maintainers = [ ];
platforms = platforms.all;
};
}

View File

@ -9,13 +9,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "level-zero"; pname = "level-zero";
version = "1.17.45"; version = "1.18.3";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "oneapi-src"; owner = "oneapi-src";
repo = "level-zero"; repo = "level-zero";
rev = "refs/tags/v${version}"; rev = "refs/tags/v${version}";
hash = "sha256-2uWZsy8aIV/ToDVuVxpyXoI1GbwZ9IxeLh+1hgjlfEM="; hash = "sha256-ep9RYHnqmOEqfdFtYzOZnv0aWu4TA8JMyWOj0E2uSYk=";
}; };
nativeBuildInputs = [ cmake addDriverRunpath ]; nativeBuildInputs = [ cmake addDriverRunpath ];
@ -33,6 +33,7 @@ stdenv.mkDerivation rec {
homepage = "https://github.com/oneapi-src/level-zero"; homepage = "https://github.com/oneapi-src/level-zero";
changelog = "https://github.com/oneapi-src/level-zero/blob/v${version}/CHANGELOG.md"; changelog = "https://github.com/oneapi-src/level-zero/blob/v${version}/CHANGELOG.md";
license = licenses.mit; license = licenses.mit;
platforms = platforms.linux;
maintainers = [ maintainers.ziguana ]; maintainers = [ maintainers.ziguana ];
}; };
} }

View File

@ -4,6 +4,7 @@
pythonOlder, pythonOlder,
fetchFromGitHub, fetchFromGitHub,
setuptools, setuptools,
click,
watchdog, watchdog,
portalocker, portalocker,
pytestCheckHook, pytestCheckHook,
@ -17,7 +18,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "cachier"; pname = "cachier";
version = "3.0.1"; version = "3.1.0";
pyproject = true; pyproject = true;
disabled = pythonOlder "3.8"; disabled = pythonOlder "3.8";
@ -26,7 +27,7 @@ buildPythonPackage rec {
owner = "python-cachier"; owner = "python-cachier";
repo = "cachier"; repo = "cachier";
rev = "refs/tags/v${version}"; rev = "refs/tags/v${version}";
hash = "sha256-VApP1DRs+mjx+SELpdDOm2Sa7zBYHDqD/htFF/eNLu0="; hash = "sha256-LphmYL8Jmry8Jmd5Eps68wD113JMWwyBl18pqdtl+DQ=";
}; };
pythonRemoveDeps = [ "setuptools" ]; pythonRemoveDeps = [ "setuptools" ];
@ -38,6 +39,8 @@ buildPythonPackage rec {
dependencies = [ dependencies = [
watchdog watchdog
portalocker portalocker
# not listed as dep, but needed to run main script entrypoint
click
]; ];
nativeCheckInputs = [ nativeCheckInputs = [
@ -63,6 +66,10 @@ buildPythonPackage rec {
# don't test formatting # don't test formatting
"test_flake8" "test_flake8"
# timing sensitive
"test_being_calc_next_time"
"test_pickle_being_calculated"
]; ];
preBuild = '' preBuild = ''
@ -73,6 +80,7 @@ buildPythonPackage rec {
meta = { meta = {
homepage = "https://github.com/python-cachier/cachier"; homepage = "https://github.com/python-cachier/cachier";
changelog = "https://github.com/python-cachier/cachier/releases/tag/v${version}";
description = "Persistent, stale-free, local and cross-machine caching for functions"; description = "Persistent, stale-free, local and cross-machine caching for functions";
mainProgram = "cachier"; mainProgram = "cachier";
maintainers = with lib.maintainers; [ pbsds ]; maintainers = with lib.maintainers; [ pbsds ];

View File

@ -21,14 +21,14 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "equinox"; pname = "equinox";
version = "0.11.7"; version = "0.11.8";
pyproject = true; pyproject = true;
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "patrick-kidger"; owner = "patrick-kidger";
repo = "equinox"; repo = "equinox";
rev = "refs/tags/v${version}"; rev = "refs/tags/v${version}";
hash = "sha256-0waIpsVWoABtf4M0IOie9nJDk+e75ArTVmGqYg9AlnI="; hash = "sha256-lZb2NobSELz8kviPd4Z8PPEEaydaEC5Z6eb9pzC7Ki8=";
}; };
build-system = [ hatchling ]; build-system = [ hatchling ];

View File

@ -10,14 +10,14 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "lm-format-enforcer"; pname = "lm-format-enforcer";
version = "0.10.7"; version = "0.10.9";
pyproject = true; pyproject = true;
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "noamgat"; owner = "noamgat";
repo = pname; repo = pname;
rev = "refs/tags/v${version}"; rev = "refs/tags/v${version}";
hash = "sha256-25/qnSKBXbyAnasNYuv+LV2U2KLipKtH6B+wXlH6eRs="; hash = "sha256-8+hve/6YezM07+4BmmBEAPZ0B2d8xDguXoHf7FuQWP8=";
}; };
build-system = [ poetry-core ]; build-system = [ poetry-core ];

View File

@ -1,25 +1,27 @@
{ {
lib, lib,
attrs,
buildPythonPackage, buildPythonPackage,
fetchPypi, fetchPypi,
isPy27,
enum34,
attrs,
pytz,
pytestCheckHook, pytestCheckHook,
pythonOlder,
pytz,
setuptools,
}: }:
buildPythonPackage rec { buildPythonPackage rec {
pname = "serpent"; pname = "serpent";
version = "1.41"; version = "1.41";
format = "setuptools"; pyproject = true;
disabled = pythonOlder "3.9";
src = fetchPypi { src = fetchPypi {
inherit pname version; inherit pname version;
hash = "sha256-BAcDX+PGZEOH1Iz/FGfVqp/v+BTQc3K3hnftDuPtcJU="; hash = "sha256-BAcDX+PGZEOH1Iz/FGfVqp/v+BTQc3K3hnftDuPtcJU=";
}; };
propagatedBuildInputs = lib.optionals isPy27 [ enum34 ]; build-system = [ setuptools ];
nativeCheckInputs = [ nativeCheckInputs = [
attrs attrs
@ -27,9 +29,12 @@ buildPythonPackage rec {
pytestCheckHook pytestCheckHook
]; ];
pythonImportsCheck = [ "serpent" ];
meta = with lib; { meta = with lib; {
description = "Simple serialization library based on ast.literal_eval"; description = "Simple serialization library based on ast.literal_eval";
homepage = "https://github.com/irmen/Serpent"; homepage = "https://github.com/irmen/Serpent";
changelog = "https://github.com/irmen/Serpent/releases/tag/serpent-${version}";
license = licenses.mit; license = licenses.mit;
maintainers = with maintainers; [ prusnak ]; maintainers = with maintainers; [ prusnak ];
}; };

View File

@ -2,16 +2,16 @@
buildGoModule rec { buildGoModule rec {
pname = "go-swag"; pname = "go-swag";
version = "1.16.3"; version = "1.16.4";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "swaggo"; owner = "swaggo";
repo = "swag"; repo = "swag";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-wS5m3dBiILxmVb6P559fGcONdCWc/5hhLAVMC+G1QZs="; sha256 = "sha256-wqBT7uan5XL51HHDGINRH9NTb1tybF44d/rWRxl6Lak=";
}; };
vendorHash = "sha256-BxWmEcx5IIT/yI46CJGE0vE1BRm5zwngc0x1dVy/04s="; vendorHash = "sha256-6L5LzXtYjrA/YKmNEC/9dyiHpY/8gkH/CvW0JTo+Bwc=";
subPackages = [ "cmd/swag" ]; subPackages = [ "cmd/swag" ];

View File

@ -1,82 +0,0 @@
From 4ff06a845979bd65e672ff4ab09f5310c681e13b Mon Sep 17 00:00:00 2001
From: Arthur Kiyanovski <akiyano@amazon.com>
Date: Tue, 30 Jul 2024 05:06:14 +0000
Subject: [PATCH] workaround patch for kernel 6.10
Signed-off-by: Arthur Kiyanovski <akiyano@amazon.com>
---
kernel/linux/ena/config/test_defs.sh | 12 ++++++++++++
kernel/linux/ena/ena_xdp.c | 5 ++---
kernel/linux/ena/kcompat.h | 12 +++++++++++-
3 files changed, 25 insertions(+), 4 deletions(-)
diff --git a/kernel/linux/ena/config/test_defs.sh b/kernel/linux/ena/config/test_defs.sh
index f8951c3..0cf366b 100755
--- a/kernel/linux/ena/config/test_defs.sh
+++ b/kernel/linux/ena/config/test_defs.sh
@@ -60,3 +60,15 @@ try_compile_async "#include <linux/etherdevice.h>" \
"ENA_HAVE_ETH_HW_ADDR_SET" \
"" \
"5.15.0 <= LINUX_VERSION_CODE"
+
+try_compile_async "#include <net/xdp_sock_drv.h>" \
+ "xsk_buff_dma_sync_for_cpu(NULL);" \
+ "ENA_XSK_BUFF_DMA_SYNC_SINGLE_ARG" \
+ "" \
+ "6.10.0 <= LINUX_VERSION_CODE"
+
+try_compile_async "#include <linux/skbuff.h>" \
+ "__napi_alloc_skb(NULL, 0, 0);" \
+ "ENA_NAPI_ALLOC_SKB_EXPLICIT_GFP_MASK" \
+ "" \
+ "6.10.0 > LINUX_VERSION_CODE"
diff --git a/kernel/linux/ena/ena_xdp.c b/kernel/linux/ena/ena_xdp.c
index 204389f..ecbaa9f 100644
--- a/kernel/linux/ena/ena_xdp.c
+++ b/kernel/linux/ena/ena_xdp.c
@@ -746,9 +746,8 @@ static struct sk_buff *ena_xdp_rx_skb_zc(struct ena_ring *rx_ring, struct xdp_bu
data_addr = xdp->data;
/* allocate a skb to store the frags */
- skb = __napi_alloc_skb(rx_ring->napi,
- headroom + data_len,
- GFP_ATOMIC | __GFP_NOWARN);
+ skb = napi_alloc_skb(rx_ring->napi,
+ headroom + data_len);
if (unlikely(!skb)) {
ena_increase_stat(&rx_ring->rx_stats.skb_alloc_fail, 1,
&rx_ring->syncp);
diff --git a/kernel/linux/ena/kcompat.h b/kernel/linux/ena/kcompat.h
index 6d5a069..7511087 100644
--- a/kernel/linux/ena/kcompat.h
+++ b/kernel/linux/ena/kcompat.h
@@ -998,10 +998,11 @@ static inline bool ktime_after(const ktime_t cmp1, const ktime_t cmp2)
#if (LINUX_VERSION_CODE < KERNEL_VERSION(3, 19, 0)) && \
!(RHEL_RELEASE_CODE && \
(RHEL_RELEASE_CODE >= RHEL_RELEASE_VERSION(7, 2)))
+#define ENA_KCOMAPT_NAPI_ALLOC_SKB
static inline struct sk_buff *napi_alloc_skb(struct napi_struct *napi,
unsigned int length)
{
- return netdev_alloc_skb_ip_align(napi->dev, length);
+ return __netdev_alloc_skb_ip_align(napi->dev, length, GFP_ATOMIC | __GFP_NOWARN);
}
#endif
@@ -1150,4 +1151,13 @@ static inline int irq_update_affinity_hint(unsigned int irq, const struct cpumas
#define ethtool_puts ethtool_sprintf
#endif /* ENA_HAVE_ETHTOOL_PUTS */
+#ifdef ENA_XSK_BUFF_DMA_SYNC_SINGLE_ARG
+#include <net/xdp_sock_drv.h>
+#define xsk_buff_dma_sync_for_cpu(xdp, xsk_pool) xsk_buff_dma_sync_for_cpu(xdp)
+#endif /* ENA_XSK_BUFF_DMA_SYNC_SINGLE_ARG */
+
+#if defined(ENA_NAPI_ALLOC_SKB_EXPLICIT_GFP_MASK) && !defined(ENA_KCOMAPT_NAPI_ALLOC_SKB)
+#define napi_alloc_skb(napi, len) __napi_alloc_skb(napi, len, GFP_ATOMIC | __GFP_NOWARN)
+#endif /* ENA_NAPI_ALLOC_SKB_EXPLICIT_GFP_MASK && !ENA_KCOMAPT_NAPI_ALLOC_SKB*/
+
#endif /* _KCOMPAT_H_ */
--
2.40.1

View File

@ -6,14 +6,14 @@
}: }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
version = "2.12.3"; version = "2.13.0";
name = "ena-${version}-${kernel.version}"; name = "ena-${version}-${kernel.version}";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "amzn"; owner = "amzn";
repo = "amzn-drivers"; repo = "amzn-drivers";
rev = "ena_linux_${version}"; rev = "ena_linux_${version}";
hash = "sha256-F8vDPPwO0PnGXhqt0EeT4m/+d8w/rjMHWRV3RYC/wVQ="; hash = "sha256-uYWKu9M/5PcHV4WdMSi0f29S7KnQft67dgjdN0AS1d8=";
}; };
hardeningDisable = [ "pic" ]; hardeningDisable = [ "pic" ];
@ -23,11 +23,6 @@ stdenv.mkDerivation rec {
env.KERNEL_BUILD_DIR = "${kernel.dev}/lib/modules/${kernel.modDirVersion}/build"; env.KERNEL_BUILD_DIR = "${kernel.dev}/lib/modules/${kernel.modDirVersion}/build";
patches = [
# https://github.com/amzn/amzn-drivers/issues/313
./0001-workaround-patch-for-kernel-6.10.patch
];
configurePhase = '' configurePhase = ''
runHook preConfigure runHook preConfigure
cd kernel/linux/ena cd kernel/linux/ena

View File

@ -25,13 +25,13 @@ let
in in
effectiveStdenv.mkDerivation (finalAttrs: { effectiveStdenv.mkDerivation (finalAttrs: {
pname = "whisper-cpp"; pname = "whisper-cpp";
version = "1.7.0"; version = "1.7.1";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "ggerganov"; owner = "ggerganov";
repo = "whisper.cpp"; repo = "whisper.cpp";
rev = "refs/tags/v${finalAttrs.version}" ; rev = "refs/tags/v${finalAttrs.version}" ;
hash = "sha256-obAXqqQEs7lkv6v1vl3aN+Vh6wPSYSXXbI6mlee6/QM="; hash = "sha256-EDFUVjud79ZRCzGbOh9L9NcXfN3ikvsqkVSOME9F9oo=";
}; };
# The upstream download script tries to download the models to the # The upstream download script tries to download the models to the
@ -78,15 +78,18 @@ effectiveStdenv.mkDerivation (finalAttrs: {
GGML_CUDA = "1"; GGML_CUDA = "1";
}; };
makeFlags = [ "main" "stream" "command" ];
installPhase = '' installPhase = ''
runHook preInstall runHook preInstall
mkdir -p $out/bin mkdir -p $out/bin
cp ./main $out/bin/whisper-cpp cp ./main $out/bin/whisper-cpp
cp ./stream $out/bin/whisper-cpp-stream
cp ./command $out/bin/whisper-cpp-command for file in *; do
if [[ -x "$file" && -f "$file" && "$file" != "main" ]]; then
cp "$file" "$out/bin/whisper-cpp-$file"
fi
done
cp models/download-ggml-model.sh $out/bin/whisper-cpp-download-ggml-model cp models/download-ggml-model.sh $out/bin/whisper-cpp-download-ggml-model

View File

@ -1,27 +1,29 @@
{ lib {
, stdenv lib,
, fetchFromGitHub stdenv,
, cmake fetchFromGitHub,
, libffi cmake,
, pkg-config libffi,
, wayland-protocols pkg-config,
, wayland-scanner wayland-protocols,
, wayland wayland-scanner,
, xorg wayland,
, darwin xorg,
, nix-update-script darwin,
, alsa-lib nix-update-script,
alsa-lib,
openssl,
}: }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "clipboard-jh"; pname = "clipboard-jh";
version = "0.9.0.1"; version = "0.9.1";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "Slackadays"; owner = "Slackadays";
repo = "clipboard"; repo = "clipboard";
rev = version; rev = version;
hash = "sha256-iILtyURYCshicgAV3MWkgMQsXHe7Unj1A08W7tUMU2o="; hash = "sha256-1vGM9OUE7b4XVTm4Gf20CO80hjYAooeVt0REkY3xu3U=";
}; };
postPatch = '' postPatch = ''
@ -34,15 +36,18 @@ stdenv.mkDerivation rec {
wayland-scanner wayland-scanner
]; ];
buildInputs = lib.optionals stdenv.hostPlatform.isLinux [ buildInputs =
libffi [ openssl ]
wayland-protocols ++ lib.optionals stdenv.hostPlatform.isLinux [
wayland libffi
xorg.libX11 wayland-protocols
alsa-lib wayland
] ++ lib.optionals stdenv.hostPlatform.isDarwin [ xorg.libX11
darwin.apple_sdk.frameworks.AppKit alsa-lib
]; ]
++ lib.optionals stdenv.hostPlatform.isDarwin [
darwin.apple_sdk.frameworks.AppKit
];
cmakeBuildType = "MinSizeRel"; cmakeBuildType = "MinSizeRel";

View File

@ -146,10 +146,7 @@ stdenv.mkDerivation (finalAttrs: {
# For the 'urandom', maybe it should be a cross-system option # For the 'urandom', maybe it should be a cross-system option
++ lib.optional (stdenv.hostPlatform != stdenv.buildPlatform) ++ lib.optional (stdenv.hostPlatform != stdenv.buildPlatform)
"--with-random=/dev/urandom" "--with-random=/dev/urandom"
++ lib.optionals stdenv.hostPlatform.isWindows [ ++ lib.optionals stdenv.hostPlatform.isDarwin [
"--disable-shared"
"--enable-static"
] ++ lib.optionals stdenv.hostPlatform.isDarwin [
# Disable default CA bundle, use NIX_SSL_CERT_FILE or fallback to nss-cacert from the default profile. # Disable default CA bundle, use NIX_SSL_CERT_FILE or fallback to nss-cacert from the default profile.
# Without this curl might detect /etc/ssl/cert.pem at build time on macOS, causing curl to ignore NIX_SSL_CERT_FILE. # Without this curl might detect /etc/ssl/cert.pem at build time on macOS, causing curl to ignore NIX_SSL_CERT_FILE.
"--without-ca-bundle" "--without-ca-bundle"

View File

@ -5,16 +5,16 @@
buildGoModule rec { buildGoModule rec {
pname = "ddns-go"; pname = "ddns-go";
version = "6.7.0"; version = "6.7.2";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "jeessy2"; owner = "jeessy2";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
hash = "sha256-8NiJgvZ6Z1QGHX3LeNtipQDbntppE1WO2HbinlgKiNE="; hash = "sha256-kfQo86Kii9kL1K5L2vTjw9fo65f4H0ikwUGFaSL/Ck8=";
}; };
vendorHash = "sha256-XAAJ3XuT0OqUAhkkRRftbxYsiPg7OfRnpnWtoUytJ2o="; vendorHash = "sha256-IkwTi6szNf1Hh50z2jDZsJ2nncvJjnanCsQlrFELpc0=";
ldflags = [ ldflags = [
"-X main.version=${version}" "-X main.version=${version}"

View File

@ -2,13 +2,13 @@
buildGoModule rec { buildGoModule rec {
pname = "frp"; pname = "frp";
version = "0.60.0"; version = "0.61.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "fatedier"; owner = "fatedier";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
hash = "sha256-sVJvy2WFMlMEg4D4kU4ikw5tyikYVMdfw/GPptS83Iw="; hash = "sha256-ZanHYU7UEPsI/KAygxcTszUB4emnrrqxiuuLsCVk+cM=";
}; };
vendorHash = "sha256-ySONxi45Ckq0y4BNyTcm8s6KcnXW+k6thqL7qh6mbBc="; vendorHash = "sha256-ySONxi45Ckq0y4BNyTcm8s6KcnXW+k6thqL7qh6mbBc=";

View File

@ -280,6 +280,7 @@ mapAliases {
crossLibcStdenv = stdenvNoLibc; # Added 2024-09-06 crossLibcStdenv = stdenvNoLibc; # Added 2024-09-06
cryptowatch-desktop = throw "Cryptowatch Desktop was sunset on September 30th 2023 and has been removed from nixpkgs"; # Added 2023-12-22 cryptowatch-desktop = throw "Cryptowatch Desktop was sunset on September 30th 2023 and has been removed from nixpkgs"; # Added 2023-12-22
clash = throw "'clash' has been removed, upstream gone. Consider using 'mihomo' instead."; # added 2023-11-10 clash = throw "'clash' has been removed, upstream gone. Consider using 'mihomo' instead."; # added 2023-11-10
clash-geoip = throw "'clash-geoip' has been removed. Consider using 'dbip-country-lite' instead."; # added 2024-10-19
clash-verge = throw "'clash-verge' has been removed, as it was broken and unmaintained. Consider using 'clash-verge-rev' or 'clash-nyanpasu' instead"; # Added 2024-09-17 clash-verge = throw "'clash-verge' has been removed, as it was broken and unmaintained. Consider using 'clash-verge-rev' or 'clash-nyanpasu' instead"; # Added 2024-09-17
clasp = clingo; # added 2022-12-22 clasp = clingo; # added 2022-12-22
claws-mail-gtk3 = throw "'claws-mail-gtk3' has been renamed to/replaced by 'claws-mail'"; # Converted to throw 2024-10-17 claws-mail-gtk3 = throw "'claws-mail-gtk3' has been renamed to/replaced by 'claws-mail'"; # Converted to throw 2024-10-17

View File

@ -4300,8 +4300,6 @@ with pkgs;
map-cmd = callPackage ../tools/misc/map { }; map-cmd = callPackage ../tools/misc/map { };
clash-geoip = callPackage ../data/misc/clash-geoip { };
clevercsv = with python3Packages; toPythonApplication clevercsv; clevercsv = with python3Packages; toPythonApplication clevercsv;
cli53 = callPackage ../tools/admin/cli53 { }; cli53 = callPackage ../tools/admin/cli53 { };
@ -10945,8 +10943,6 @@ with pkgs;
papertrail = callPackage ../tools/text/papertrail { }; papertrail = callPackage ../tools/text/papertrail { };
pappl = callPackage ../applications/printing/pappl { };
par2cmdline = callPackage ../tools/networking/par2cmdline { }; par2cmdline = callPackage ../tools/networking/par2cmdline { };
parallel = callPackage ../tools/misc/parallel { }; parallel = callPackage ../tools/misc/parallel { };
@ -30024,8 +30020,6 @@ with pkgs;
remontoire = callPackage ../applications/misc/remontoire { }; remontoire = callPackage ../applications/misc/remontoire { };
waycorner = callPackage ../applications/misc/waycorner { };
wayshot = callPackage ../tools/misc/wayshot { }; wayshot = callPackage ../tools/misc/wayshot { };
waylevel = callPackage ../tools/misc/waylevel { }; waylevel = callPackage ../tools/misc/waylevel { };