Merge staging-next into staging

This commit is contained in:
github-actions[bot] 2024-02-14 00:02:43 +00:00 committed by GitHub
commit 8bbfcea60e
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
64 changed files with 549 additions and 1882 deletions

View File

@ -1,11 +1,17 @@
{ config, lib, pkgs, ... }: { config, lib, pkgs, ... }:
with lib;
let let
cfg = config.services.ttyd; cfg = config.services.ttyd;
inherit (lib)
optionals
types
concatLists
mapAttrsToList
mkOption
;
# Command line arguments for the ttyd daemon # Command line arguments for the ttyd daemon
args = [ "--port" (toString cfg.port) ] args = [ "--port" (toString cfg.port) ]
++ optionals (cfg.socket != null) [ "--interface" cfg.socket ] ++ optionals (cfg.socket != null) [ "--interface" cfg.socket ]
@ -14,6 +20,7 @@ let
++ (concatLists (mapAttrsToList (_k: _v: [ "--client-option" "${_k}=${_v}" ]) cfg.clientOptions)) ++ (concatLists (mapAttrsToList (_k: _v: [ "--client-option" "${_k}=${_v}" ]) cfg.clientOptions))
++ [ "--terminal-type" cfg.terminalType ] ++ [ "--terminal-type" cfg.terminalType ]
++ optionals cfg.checkOrigin [ "--check-origin" ] ++ optionals cfg.checkOrigin [ "--check-origin" ]
++ optionals cfg.writeable [ "--writable" ] # the typo is correct
++ [ "--max-clients" (toString cfg.maxClients) ] ++ [ "--max-clients" (toString cfg.maxClients) ]
++ optionals (cfg.indexFile != null) [ "--index" cfg.indexFile ] ++ optionals (cfg.indexFile != null) [ "--index" cfg.indexFile ]
++ optionals cfg.enableIPv6 [ "--ipv6" ] ++ optionals cfg.enableIPv6 [ "--ipv6" ]
@ -30,40 +37,40 @@ in
options = { options = {
services.ttyd = { services.ttyd = {
enable = mkEnableOption (lib.mdDoc "ttyd daemon"); enable = lib.mkEnableOption ("ttyd daemon");
port = mkOption { port = mkOption {
type = types.port; type = types.port;
default = 7681; default = 7681;
description = lib.mdDoc "Port to listen on (use 0 for random port)"; description = "Port to listen on (use 0 for random port)";
}; };
socket = mkOption { socket = mkOption {
type = types.nullOr types.path; type = types.nullOr types.path;
default = null; default = null;
example = "/var/run/ttyd.sock"; example = "/var/run/ttyd.sock";
description = lib.mdDoc "UNIX domain socket path to bind."; description = "UNIX domain socket path to bind.";
}; };
interface = mkOption { interface = mkOption {
type = types.nullOr types.str; type = types.nullOr types.str;
default = null; default = null;
example = "eth0"; example = "eth0";
description = lib.mdDoc "Network interface to bind."; description = "Network interface to bind.";
}; };
username = mkOption { username = mkOption {
type = types.nullOr types.str; type = types.nullOr types.str;
default = null; default = null;
description = lib.mdDoc "Username for basic authentication."; description = "Username for basic http authentication.";
}; };
passwordFile = mkOption { passwordFile = mkOption {
type = types.nullOr types.path; type = types.nullOr types.path;
default = null; default = null;
apply = value: if value == null then null else toString value; apply = value: if value == null then null else toString value;
description = lib.mdDoc '' description = ''
File containing the password to use for basic authentication. File containing the password to use for basic http authentication.
For insecurely putting the password in the globally readable store use For insecurely putting the password in the globally readable store use
`pkgs.writeText "ttydpw" "MyPassword"`. `pkgs.writeText "ttydpw" "MyPassword"`.
''; '';
@ -72,19 +79,46 @@ in
signal = mkOption { signal = mkOption {
type = types.ints.u8; type = types.ints.u8;
default = 1; default = 1;
description = lib.mdDoc "Signal to send to the command on session close."; description = "Signal to send to the command on session close.";
};
entrypoint = mkOption {
type = types.listOf types.str;
default = [ "${pkgs.shadow}/bin/login" ];
defaultText = lib.literalExpression ''
[ "''${pkgs.shadow}/bin/login" ]
'';
example = lib.literalExpression ''
[ (lib.getExe pkgs.htop) ]
'';
description = "Which command ttyd runs.";
apply = lib.escapeShellArgs;
};
user = mkOption {
type = types.str;
# `login` needs to be run as root
default = "root";
description = "Which unix user ttyd should run as.";
};
writeable = mkOption {
type = types.nullOr types.bool;
default = null; # null causes an eval error, forcing the user to consider attack surface
example = true;
description = "Allow clients to write to the TTY.";
}; };
clientOptions = mkOption { clientOptions = mkOption {
type = types.attrsOf types.str; type = types.attrsOf types.str;
default = {}; default = {};
example = literalExpression '' example = lib.literalExpression ''
{ {
fontSize = "16"; fontSize = "16";
fontFamily = "Fira Code"; fontFamily = "Fira Code";
} }
''; '';
description = lib.mdDoc '' description = ''
Attribute set of client options for xtermjs. Attribute set of client options for xtermjs.
<https://xtermjs.org/docs/api/terminal/interfaces/iterminaloptions/> <https://xtermjs.org/docs/api/terminal/interfaces/iterminaloptions/>
''; '';
@ -93,50 +127,50 @@ in
terminalType = mkOption { terminalType = mkOption {
type = types.str; type = types.str;
default = "xterm-256color"; default = "xterm-256color";
description = lib.mdDoc "Terminal type to report."; description = "Terminal type to report.";
}; };
checkOrigin = mkOption { checkOrigin = mkOption {
type = types.bool; type = types.bool;
default = false; default = false;
description = lib.mdDoc "Whether to allow a websocket connection from a different origin."; description = "Whether to allow a websocket connection from a different origin.";
}; };
maxClients = mkOption { maxClients = mkOption {
type = types.int; type = types.int;
default = 0; default = 0;
description = lib.mdDoc "Maximum clients to support (0, no limit)"; description = "Maximum clients to support (0, no limit)";
}; };
indexFile = mkOption { indexFile = mkOption {
type = types.nullOr types.path; type = types.nullOr types.path;
default = null; default = null;
description = lib.mdDoc "Custom index.html path"; description = "Custom index.html path";
}; };
enableIPv6 = mkOption { enableIPv6 = mkOption {
type = types.bool; type = types.bool;
default = false; default = false;
description = lib.mdDoc "Whether or not to enable IPv6 support."; description = "Whether or not to enable IPv6 support.";
}; };
enableSSL = mkOption { enableSSL = mkOption {
type = types.bool; type = types.bool;
default = false; default = false;
description = lib.mdDoc "Whether or not to enable SSL (https) support."; description = "Whether or not to enable SSL (https) support.";
}; };
certFile = mkOption { certFile = mkOption {
type = types.nullOr types.path; type = types.nullOr types.path;
default = null; default = null;
description = lib.mdDoc "SSL certificate file path."; description = "SSL certificate file path.";
}; };
keyFile = mkOption { keyFile = mkOption {
type = types.nullOr types.path; type = types.nullOr types.path;
default = null; default = null;
apply = value: if value == null then null else toString value; apply = value: if value == null then null else toString value;
description = lib.mdDoc '' description = ''
SSL key file path. SSL key file path.
For insecurely putting the keyFile in the globally readable store use For insecurely putting the keyFile in the globally readable store use
`pkgs.writeText "ttydKeyFile" "SSLKEY"`. `pkgs.writeText "ttydKeyFile" "SSLKEY"`.
@ -146,25 +180,27 @@ in
caFile = mkOption { caFile = mkOption {
type = types.nullOr types.path; type = types.nullOr types.path;
default = null; default = null;
description = lib.mdDoc "SSL CA file path for client certificate verification."; description = "SSL CA file path for client certificate verification.";
}; };
logLevel = mkOption { logLevel = mkOption {
type = types.int; type = types.int;
default = 7; default = 7;
description = lib.mdDoc "Set log level."; description = "Set log level.";
}; };
}; };
}; };
###### implementation ###### implementation
config = mkIf cfg.enable { config = lib.mkIf cfg.enable {
assertions = assertions =
[ { assertion = cfg.enableSSL [ { assertion = cfg.enableSSL
-> cfg.certFile != null && cfg.keyFile != null && cfg.caFile != null; -> cfg.certFile != null && cfg.keyFile != null && cfg.caFile != null;
message = "SSL is enabled for ttyd, but no certFile, keyFile or caFile has been specified."; } message = "SSL is enabled for ttyd, but no certFile, keyFile or caFile has been specified."; }
{ assertion = cfg.writeable != null;
message = "services.ttyd.writeable must be set"; }
{ assertion = ! (cfg.interface != null && cfg.socket != null); { assertion = ! (cfg.interface != null && cfg.socket != null);
message = "Cannot set both interface and socket for ttyd."; } message = "Cannot set both interface and socket for ttyd."; }
{ assertion = (cfg.username != null) == (cfg.passwordFile != null); { assertion = (cfg.username != null) == (cfg.passwordFile != null);
@ -177,21 +213,19 @@ in
wantedBy = [ "multi-user.target" ]; wantedBy = [ "multi-user.target" ];
serviceConfig = { serviceConfig = {
# Runs login which needs to be run as root User = cfg.user;
# login: Cannot possibly work without effective root
User = "root";
LoadCredential = lib.optionalString (cfg.passwordFile != null) "TTYD_PASSWORD_FILE:${cfg.passwordFile}"; LoadCredential = lib.optionalString (cfg.passwordFile != null) "TTYD_PASSWORD_FILE:${cfg.passwordFile}";
}; };
script = if cfg.passwordFile != null then '' script = if cfg.passwordFile != null then ''
PASSWORD=$(cat "$CREDENTIALS_DIRECTORY/TTYD_PASSWORD_FILE") PASSWORD=$(cat "$CREDENTIALS_DIRECTORY/TTYD_PASSWORD_FILE")
${pkgs.ttyd}/bin/ttyd ${lib.escapeShellArgs args} \ ${pkgs.ttyd}/bin/ttyd ${lib.escapeShellArgs args} \
--credential ${escapeShellArg cfg.username}:"$PASSWORD" \ --credential ${lib.escapeShellArg cfg.username}:"$PASSWORD" \
${pkgs.shadow}/bin/login ${cfg.entrypoint}
'' ''
else '' else ''
${pkgs.ttyd}/bin/ttyd ${lib.escapeShellArgs args} \ ${pkgs.ttyd}/bin/ttyd ${lib.escapeShellArgs args} \
${pkgs.shadow}/bin/login ${cfg.entrypoint}
''; '';
}; };
}; };

View File

@ -2,18 +2,28 @@ import ../make-test-python.nix ({ lib, pkgs, ... }: {
name = "ttyd"; name = "ttyd";
meta.maintainers = with lib.maintainers; [ stunkymonkey ]; meta.maintainers = with lib.maintainers; [ stunkymonkey ];
nodes.machine = { pkgs, ... }: { nodes.readonly = { pkgs, ... }: {
services.ttyd = {
enable = true;
entrypoint = [ (lib.getExe pkgs.htop) ];
writeable = false;
};
};
nodes.writeable = { pkgs, ... }: {
services.ttyd = { services.ttyd = {
enable = true; enable = true;
username = "foo"; username = "foo";
passwordFile = pkgs.writeText "password" "bar"; passwordFile = pkgs.writeText "password" "bar";
writeable = true;
}; };
}; };
testScript = '' testScript = ''
machine.wait_for_unit("ttyd.service") for machine in [readonly, writeable]:
machine.wait_for_open_port(7681) machine.wait_for_unit("ttyd.service")
response = machine.succeed("curl -vvv -u foo:bar -s -H 'Host: ttyd' http://127.0.0.1:7681/") machine.wait_for_open_port(7681)
assert '<title>ttyd - Terminal</title>' in response, "Page didn't load successfully" response = machine.succeed("curl -vvv -u foo:bar -s -H 'Host: ttyd' http://127.0.0.1:7681/")
assert '<title>ttyd - Terminal</title>' in response, "Page didn't load successfully"
''; '';
}) })

View File

@ -57,7 +57,7 @@ stdenv.mkDerivation (finalAttrs: {
aarch64-linux = "sha256-6nXemaGiQjp2stjjKItPJ62VcH5Q5pRf63qKtl2haXI="; aarch64-linux = "sha256-6nXemaGiQjp2stjjKItPJ62VcH5Q5pRf63qKtl2haXI=";
x86_64-darwin = "sha256-jSMAw+AMD63vqPckZjblw4EDngA4E8h0WlsZu3hUShY="; x86_64-darwin = "sha256-jSMAw+AMD63vqPckZjblw4EDngA4E8h0WlsZu3hUShY=";
aarch64-darwin = "sha256-zujXURpIcw7IOw63AW167h6cywYXydhHZMzA2apGZAs="; aarch64-darwin = "sha256-zujXURpIcw7IOw63AW167h6cywYXydhHZMzA2apGZAs=";
}.${stdenv.system} or (throw "Unsupported platform"); }.${stdenv.system} or (throw "Unsupported system: ${stdenv.system}");
}; };
nativeBuildInputs = nativeBuildInputs =

View File

@ -5,7 +5,7 @@ let
arch = arch =
if stdenv.isLinux then "linux" if stdenv.isLinux then "linux"
else if stdenv.isDarwin then "darwin" else if stdenv.isDarwin then "darwin"
else throw "Unsupported platform"; else throw "Unsupported system: ${stdenv.system}";
analysisDir = "server/analysis_binaries/${arch}"; analysisDir = "server/analysis_binaries/${arch}";
in in
vscode-utils.buildVscodeMarketplaceExtension rec { vscode-utils.buildVscodeMarketplaceExtension rec {

View File

@ -206,8 +206,8 @@
"flycast": { "flycast": {
"owner": "flyinghead", "owner": "flyinghead",
"repo": "flycast", "repo": "flycast",
"rev": "7029e1615a215bc43e51f8eac605f31dd01ba8cd", "rev": "44fa364f36c43bed19b055096600f075c656f78c",
"hash": "sha256-JUXKlUNIg+1vvOfUQpysxUMYIRJqIzj9UNIwb+8HRPo=", "hash": "sha256-UfASq8OXtsfubMUfke7P6HTygM/9fP421IoLQeJvPgY=",
"fetchSubmodules": true, "fetchSubmodules": true,
"date": "unstable-2024-02-09" "date": "unstable-2024-02-09"
}, },
@ -249,9 +249,9 @@
"gpsp": { "gpsp": {
"owner": "libretro", "owner": "libretro",
"repo": "gpsp", "repo": "gpsp",
"rev": "85a2ac6c911ffcc77cf1bab418c78fe5218c0b1a", "rev": "4caf7a167d159866479ea94d6b2d13c26ceb3e72",
"hash": "sha256-iHfdsI6E2LQTC9HjqVRBHihVUpagtB8326M8Crll2iY=", "hash": "sha256-1hkxeTjY52YuphQuDMCITn/dIcNx/8w4FkhQjL8DWz8=",
"date": "unstable-2024-02-04" "date": "unstable-2024-02-10"
}, },
"gw": { "gw": {
"owner": "libretro", "owner": "libretro",
@ -277,9 +277,9 @@
"mame": { "mame": {
"owner": "libretro", "owner": "libretro",
"repo": "mame", "repo": "mame",
"rev": "f55fe47b0997d24048700898195cb66bc0bccfb6", "rev": "8ebaec4073703f5050dac3f6c8da408943e15938",
"hash": "sha256-JUL4ha7UL+hNG5oi178nLT1aUuxqfev0/bRU6y/Mg7A=", "hash": "sha256-CFCem9MiaHW2flEZyJkcC9JEGzx7Ox/uqrTY3jue+Pk=",
"date": "unstable-2024-02-05" "date": "unstable-2024-02-13"
}, },
"mame2000": { "mame2000": {
"owner": "libretro", "owner": "libretro",
@ -298,9 +298,9 @@
"mame2003-plus": { "mame2003-plus": {
"owner": "libretro", "owner": "libretro",
"repo": "mame2003-plus-libretro", "repo": "mame2003-plus-libretro",
"rev": "debcb547ea7ae197433142810e99e1313c58cb14", "rev": "a4d62997d332acc709c9644641863c5498e01eb0",
"hash": "sha256-l9YmDiUJ+CQP4i8O8W+E9uTLPZZgLqLR9v7e5hFgJhE=", "hash": "sha256-9+pxx/fhNsvAMYDqalkkdljaR8/XxuMMSrrz7KeJtDU=",
"date": "unstable-2024-02-09" "date": "unstable-2024-02-13"
}, },
"mame2010": { "mame2010": {
"owner": "libretro", "owner": "libretro",
@ -361,10 +361,10 @@
"mrboom": { "mrboom": {
"owner": "Javanaise", "owner": "Javanaise",
"repo": "mrboom-libretro", "repo": "mrboom-libretro",
"rev": "865be65118ef70e9a486f872948f4fc805edf643", "rev": "f688664f024723e00c0d2926e51b45754a25e2da",
"hash": "sha256-jdOthryC1QvVvuPZUh/YyZhJeFWk1XhBuCm4hmAy8+Q=", "hash": "sha256-t6ArMkyGvHJ9hLc+FFoH2wTk0wRFn5etzdLipTQnGyc=",
"fetchSubmodules": true, "fetchSubmodules": true,
"date": "unstable-2024-02-05" "date": "unstable-2024-02-09"
}, },
"mupen64plus": { "mupen64plus": {
"owner": "libretro", "owner": "libretro",
@ -383,9 +383,9 @@
"nestopia": { "nestopia": {
"owner": "libretro", "owner": "libretro",
"repo": "nestopia", "repo": "nestopia",
"rev": "8050c38e5a1db6927b03510651809e8ef932b888", "rev": "407df997b65cddbff9b25abae0510e6645205677",
"hash": "sha256-Vlz69ZpXwawdE+bfjlKNrQNmFHhB53FOKhfMgq4viE0=", "hash": "sha256-Vlz69ZpXwawdE+bfjlKNrQNmFHhB53FOKhfMgq4viE0=",
"date": "unstable-2024-02-03" "date": "unstable-2024-02-13"
}, },
"np2kai": { "np2kai": {
"owner": "AZO234", "owner": "AZO234",
@ -456,10 +456,10 @@
"ppsspp": { "ppsspp": {
"owner": "hrydgard", "owner": "hrydgard",
"repo": "ppsspp", "repo": "ppsspp",
"rev": "25689c36d9c2f3f1b7aa612d89b86caf1809e376", "rev": "d832f96010fa378ef0a7f7980524a61803110ad7",
"hash": "sha256-hXknMyBNo1vJ49gJsuNef+sccolAovg1I8Wzuw/BnE8=", "hash": "sha256-LkngiwjRoYw+N+DCdbbWnTokDAYXbqOMJX+DQGAUl2g=",
"fetchSubmodules": true, "fetchSubmodules": true,
"date": "unstable-2024-02-09" "date": "unstable-2024-02-13"
}, },
"prboom": { "prboom": {
"owner": "libretro", "owner": "libretro",
@ -605,9 +605,9 @@
"vecx": { "vecx": {
"owner": "libretro", "owner": "libretro",
"repo": "libretro-vecx", "repo": "libretro-vecx",
"rev": "a401c268e425dc8ae6a301e7fdb9a9e96f39b8ea", "rev": "56a99fa08a7601b304d752188ca573febf26faeb",
"hash": "sha256-24/bcQ5mgLl7zKvpnnSYr5SoLG02al6dP27KoOtnua4=", "hash": "sha256-9/d6qzsUJZYZewAbFI4LU2FVpv09uby/5mxCZU7rVzo=",
"date": "unstable-2023-06-01" "date": "unstable-2024-02-10"
}, },
"virtualjaguar": { "virtualjaguar": {
"owner": "libretro", "owner": "libretro",

View File

@ -40,5 +40,6 @@ stdenv.mkDerivation rec {
description = "An efficient dynamic menu for wayland (wlroots)"; description = "An efficient dynamic menu for wayland (wlroots)";
homepage = "https://github.com/nyyManni/dmenu-wayland"; homepage = "https://github.com/nyyManni/dmenu-wayland";
maintainers = with maintainers; [ rewine ]; maintainers = with maintainers; [ rewine ];
mainProgram = "dmenu-wl";
}; };
} }

View File

@ -93,11 +93,11 @@ in
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "brave"; pname = "brave";
version = "1.62.156"; version = "1.62.162";
src = fetchurl { src = fetchurl {
url = "https://github.com/brave/brave-browser/releases/download/v${version}/brave-browser_${version}_amd64.deb"; url = "https://github.com/brave/brave-browser/releases/download/v${version}/brave-browser_${version}_amd64.deb";
hash = "sha256-U+MjXuF3rv5N4juKeIzUfnSNVLx1LGn+Ws+b5p252Qk="; hash = "sha256-hQG6LHYPhqzfgR0Z7R+hXB1vEVDd6VEyIttSae15Mpo=";
}; };
dontConfigure = true; dontConfigure = true;

View File

@ -80,7 +80,7 @@ let
outputHash = { outputHash = {
x86_64-linux = "sha256-9DHykkvazVBN2kfw1Pbejizk/R18v5w8lRBHZ4aXL5Q="; x86_64-linux = "sha256-9DHykkvazVBN2kfw1Pbejizk/R18v5w8lRBHZ4aXL5Q=";
aarch64-linux = "sha256-RgAiRbUojBc+9RN/HpAzzpTjkjZ6q+jebDsqvah5XBw="; aarch64-linux = "sha256-RgAiRbUojBc+9RN/HpAzzpTjkjZ6q+jebDsqvah5XBw=";
}.${stdenv.system} or (throw "Unsupported platform"); }.${stdenv.system} or (throw "Unsupported system: ${stdenv.system}");
}; };
in stdenv.mkDerivation { in stdenv.mkDerivation {

View File

@ -38,13 +38,13 @@
let let
pname = "pcloud"; pname = "pcloud";
version = "1.14.3"; version = "1.14.4";
code = "XZ7IM70ZtWFon9pgEbk4XuvzJsTduQUyGFwV"; code = "XZDh750ZBgJa45xqQ8H1ztdMFX2wVhOCTOFk";
# Archive link's codes: https://www.pcloud.com/release-notes/linux.html # Archive link's codes: https://www.pcloud.com/release-notes/linux.html
src = fetchzip { src = fetchzip {
url = "https://api.pcloud.com/getpubzip?code=${code}&filename=${pname}-${version}.zip"; url = "https://api.pcloud.com/getpubzip?code=${code}&filename=pcloud-${version}.zip";
hash = "sha256-huv1XXghWwh/oTtOsukffZP3nnHS2K5VcsuVs6CjFYc="; hash = "sha256-1KF3tF62lkT6tfeP/dMaZITXp4Vyegp3lFYdLJ49OR8=";
}; };
appimageContents = appimageTools.extractType2 { appimageContents = appimageTools.extractType2 {

View File

@ -27,14 +27,14 @@
buildPythonApplication rec { buildPythonApplication rec {
pname = "protonvpn-gui"; pname = "protonvpn-gui";
version = "4.1.0-unstable-2023-10-25"; version = "4.1.10";
pyproject = true; pyproject = true;
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "ProtonVPN"; owner = "ProtonVPN";
repo = "proton-vpn-gtk-app"; repo = "proton-vpn-gtk-app";
rev = "713324e9e4ee9f030c8115072cae379eb3340c42"; rev = "refs/tags/v${version}";
hash = "sha256-DfuM4b2cSIA8j9Ux3TzInRCvzQGb9LvJDSwRhfadBPY="; hash = "sha256-D06dMMjzFE7gIGFpIH/+0xmVCckqAWLkb3lc2ZmxNZs=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [
@ -71,7 +71,7 @@ buildPythonApplication rec {
postPatch = '' postPatch = ''
substituteInPlace setup.cfg \ substituteInPlace setup.cfg \
--replace "--cov=proton --cov-report=html --cov-report=term" "" --replace-fail "--cov=proton --cov-report=html --cov-report=term" ""
''; '';
postInstall = '' postInstall = ''

View File

@ -2,15 +2,15 @@
buildGoModule rec { buildGoModule rec {
pname = "gitsign"; pname = "gitsign";
version = "0.8.0"; version = "0.8.1";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "sigstore"; owner = "sigstore";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
hash = "sha256-COgoj5MrX7VBwjgfH+Ud7gp0gE7gpsYoyd0Jv4uXoec="; hash = "sha256-+oJBpERU2WbfmS7MyBbJKrh4kzY+rgSw4uKAU1y5kR4=";
}; };
vendorHash = "sha256-btvFro0K0+9potwForIj/7h41l+LbUE0Gym9aHaWtEE="; vendorHash = "sha256-Z46eDqUc8Mdq9lEMx1YOuSh5zPIMQrSkbto33AmgANU=";
subPackages = [ subPackages = [
"." "."

View File

@ -8,6 +8,7 @@
, libdrm , libdrm
, libev , libev
, libGL , libGL
, libepoxy
, libX11 , libX11
, libxcb , libxcb
, libxdg_basedir , libxdg_basedir
@ -32,13 +33,13 @@
stdenv.mkDerivation (finalAttrs: { stdenv.mkDerivation (finalAttrs: {
pname = "picom"; pname = "picom";
version = "11.1"; version = "11.2";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "yshui"; owner = "yshui";
repo = "picom"; repo = "picom";
rev = "v${finalAttrs.version}"; rev = "v${finalAttrs.version}";
hash = "sha256-vdR3HzBZxtth3zJD3vMSlrnBTbopidw7FGKOk69S0R0="; hash = "sha256-7ohtI890CutwprPEY5njqWou0fD6T9eu51EBSQ2/lWs=";
fetchSubmodules = true; fetchSubmodules = true;
}; };
@ -59,6 +60,7 @@ stdenv.mkDerivation (finalAttrs: {
libdrm libdrm
libev libev
libGL libGL
libepoxy
libX11 libX11
libxcb libxcb
libxdg_basedir libxdg_basedir

View File

@ -0,0 +1,126 @@
{ lib
, stdenvNoCC
, fetchFromGitHub
, themeVariants ? []
, catppuccinColorVariants ? []
, draculaColorVariants ? []
, gruvboxColorVariants ? []
, originalColorVariants ? []
}:
let
pname = "afterglow-cursors-recolored";
availableThemeVariants = [
"Catppuccin"
"Dracula"
"Gruvbox"
"Original"
];
availableColorVariants = {
Catppuccin = [
"Blue"
"Flamingo"
"Green"
"Macchiato"
"Maroon"
"Mauve"
"Peach"
"Pink"
"Red"
"Rosewater"
"Sapphire"
"Sky"
"Teal"
"Yellow"
];
Dracula = [
"Cyan"
"Green"
"Orange"
"Pink"
"Purple"
"Red"
"Teddy"
"Yellow"
];
Gruvbox = [
"Aqua"
"Black"
"Blue"
"Gray"
"Green"
"Mojas84"
"Orange"
"Purple"
"White"
];
Original = [
"Blue"
"Purple"
"joris"
"joris2"
"joris3"
"joris4"
];
};
in
lib.checkListOfEnum "${pname}: theme variants" availableThemeVariants themeVariants
lib.checkListOfEnum "${pname}: catppuccin color variants" availableColorVariants.Catppuccin catppuccinColorVariants
lib.checkListOfEnum "${pname}: dracula color variants" availableColorVariants.Dracula draculaColorVariants
lib.checkListOfEnum "${pname}: gruvbox color variants" availableColorVariants.Gruvbox gruvboxColorVariants
lib.checkListOfEnum "${pname}: original color variants" availableColorVariants.Original originalColorVariants
stdenvNoCC.mkDerivation {
inherit pname;
version = "0-unstable-2023-10-04";
src = fetchFromGitHub {
owner = "TeddyBearKilla";
repo = "Afterglow-Cursors-Recolored";
rev = "940a5d30e52f8c827fa249d2bbcc4af889534888";
hash = "sha256-GR+d+jrbeIGpqal5krx83PxuQto2PQTO3unQ+jaJf6s=";
};
installPhase = let
dist = {
Catppuccin = "cat";
Dracula = "dracula";
Gruvbox = "gruvbox";
};
withAlternate = xs: xs': if xs != [ ] then xs else xs';
themeVariants' = withAlternate themeVariants availableThemeVariants;
colorVariants = {
Catppuccin = withAlternate catppuccinColorVariants availableColorVariants.Catppuccin;
Dracula = withAlternate draculaColorVariants availableColorVariants.Dracula;
Gruvbox = withAlternate gruvboxColorVariants availableColorVariants.Gruvbox;
Original = withAlternate originalColorVariants availableColorVariants.Original;
};
in ''
runHook preInstall
mkdir -p $out/share/icons
${
lib.concatMapStringsSep "\n" (theme:
lib.concatMapStringsSep "\n" (color: ''
ln -s \
"$src/colors/${theme}/${color}/dist-${lib.optionalString (theme != "Original") (dist.${theme} + "-")}${lib.toLower color}" \
"$out/share/icons/Afterglow-Recolored-${theme}-${color}"
'') colorVariants.${theme}
) themeVariants'
}
runHook postInstall
'';
meta = with lib; {
description = "A recoloring of the Afterglow Cursors x-cursor theme";
homepage = "https://github.com/TeddyBearKilla/Afterglow-Cursors-Recolored";
maintainers = with maintainers; [ d3vil0p3r ];
platforms = platforms.all;
license = licenses.gpl3Plus;
};
}

View File

@ -0,0 +1,47 @@
{ lib
, stdenv
, fetchFromGitHub
, qt6
}:
stdenv.mkDerivation rec {
pname = "dsda-launcher";
version = "1.3.1-hotfix";
src = fetchFromGitHub {
owner = "Pedro-Beirao";
repo = "dsda-launcher";
rev = "v${version}";
hash = "sha256-V6VLUl148L47LjKnPe5MZCuhZSMtI0wd18i8b+7jCvk=";
};
nativeBuildInputs = [ qt6.wrapQtAppsHook ];
buildInputs = [ qt6.qtbase qt6.qtwayland ];
buildPhase = ''
runHook preBuild
mkdir -p "./dsda-launcher/build"
cd "./dsda-launcher/build"
qmake6 ..
make
runHook postBuild
'';
installPhase = ''
runHook preInstall
mkdir -p $out/bin
cp ./dsda-launcher $out/bin
install -Dm444 ../icons/dsda-Launcher.desktop $out/share/applications/dsda-Launcher.desktop
install -Dm444 ../icons/dsda-launcher.png $out/share/pixmaps/dsda-launcher.png
runHook postInstall
'';
meta = with lib; {
homepage = "https://github.com/Pedro-Beirao/dsda-launcher";
description = "This is a launcher GUI for the dsda-doom source port";
license = licenses.gpl3;
platforms = platforms.linux;
maintainers = [ maintainers.Gliczy ];
};
}

View File

@ -0,0 +1,16 @@
diff --git a/libcurl/curl_wrap.cpp b/libcurl/curl_wrap.cpp
index 11ac9dd..93edd44 100644
--- a/libcurl/curl_wrap.cpp
+++ b/libcurl/curl_wrap.cpp
@@ -401,9 +401,10 @@ std::wstring zen::formatCurlStatusCode(CURLcode sc)
ZEN_CHECK_CASE_FOR_CONSTANT(CURLE_PROXY);
ZEN_CHECK_CASE_FOR_CONSTANT(CURLE_SSL_CLIENTCERT);
ZEN_CHECK_CASE_FOR_CONSTANT(CURLE_UNRECOVERABLE_POLL);
+ ZEN_CHECK_CASE_FOR_CONSTANT(CURLE_TOO_LARGE);
ZEN_CHECK_CASE_FOR_CONSTANT(CURL_LAST);
}
- static_assert(CURL_LAST == CURLE_UNRECOVERABLE_POLL + 1);
+ static_assert(CURL_LAST == CURLE_TOO_LARGE + 1);
return replaceCpy<std::wstring>(L"Curl status %x", L"%x", numberTo<std::wstring>(static_cast<int>(sc)));
}

View File

@ -72,6 +72,8 @@ stdenv.mkDerivation (finalAttrs: {
patch = "ffs_no_check_updates.patch"; patch = "ffs_no_check_updates.patch";
hash = "sha256-lPyHpxhZz8BSnDI8QfAzKpKwVkp2jiF49RWjKNuZGII="; hash = "sha256-lPyHpxhZz8BSnDI8QfAzKpKwVkp2jiF49RWjKNuZGII=";
}) })
# Fix build with curl 8.6.0
./curl-8.6.0.patch
]; ];
nativeBuildInputs = [ nativeBuildInputs = [

View File

@ -14,7 +14,7 @@
, munge , munge
, voms , voms
, perl , perl
, scitoken-cpp , scitokens-cpp
, openssl , openssl
}: }:
@ -45,7 +45,7 @@ stdenv.mkDerivation rec {
munge munge
voms voms
perl perl
scitoken-cpp scitokens-cpp
]; ];

View File

@ -70,7 +70,7 @@ stdenv.mkDerivation rec {
i686-linux = "sha256-/Q7VZahYhLdKVFB25CanROYxD2etQOcRg+4bXZUMqTc="; i686-linux = "sha256-/Q7VZahYhLdKVFB25CanROYxD2etQOcRg+4bXZUMqTc=";
x86_64-darwin = "sha256-9biFAbFD7Bva7KPKztgCvcaoX8E6AlJBKkjlDQdP6Zw="; x86_64-darwin = "sha256-9biFAbFD7Bva7KPKztgCvcaoX8E6AlJBKkjlDQdP6Zw=";
aarch64-darwin = "sha256-to5Y0R9tm9b7jUQAK3eBylLhpu+w5oDd63FbBCBAvd8="; aarch64-darwin = "sha256-to5Y0R9tm9b7jUQAK3eBylLhpu+w5oDd63FbBCBAvd8=";
}.${stdenv.system} or (throw "Unsupported platform"); }.${stdenv.system} or (throw "Unsupported system: ${stdenv.system}");
}; };
cargoDeps = rustPlatform.importCargoLock { cargoDeps = rustPlatform.importCargoLock {

View File

@ -7,10 +7,10 @@
inherit buildUnstable; inherit buildUnstable;
}).overrideAttrs (finalAttrs: _: { }).overrideAttrs (finalAttrs: _: {
pname = "renode-unstable"; pname = "renode-unstable";
version = "1.14.0+20240130git6e173a1bb"; version = "1.14.0+20240212git8eb88bb9c";
src = fetchurl { src = fetchurl {
url = "https://builds.renode.io/renode-${finalAttrs.version}.linux-portable.tar.gz"; url = "https://builds.renode.io/renode-${finalAttrs.version}.linux-portable.tar.gz";
hash = "sha256-D4DjZYsvtlJXgoAHkYb7qPqbNfpidXHmEozEj6nPPqA="; hash = "sha256-WwsIiyKF6hskv6NSTPiyY80nE3q97xzH359wFmN0OkU=";
}; };
}) })

View File

@ -0,0 +1,102 @@
{
lib,
stdenv,
fetchFromGitHub,
fetchpatch,
cmake,
asio,
boost,
expected-lite,
fmt,
llhttp,
openssl,
pcre2,
zlib,
catch2_3,
# Build with the asio library bundled in boost instead of the standalone asio package.
with_boost_asio ? false,
}:
assert with_boost_asio -> boost != null;
assert !with_boost_asio -> asio != null;
stdenv.mkDerivation (finalAttrs: {
pname = "restinio";
version = "0.7.1";
src = fetchFromGitHub {
owner = "Stiffstream";
repo = "restinio";
rev = "v.${finalAttrs.version}";
hash = "sha256-XodG+dVW4iBgFx0Aq0+/pZyCLyqTBtW7e9r69y176Ro=";
};
patches = let
useCommit = {id, name, hash}:
fetchpatch {
inherit name hash;
url = "https://github.com/Stiffstream/restinio/commit/${id}.patch";
};
in [
(useCommit {
id = "57e6ae3f73a03a5120feb80a7bb5dca27179fa38";
name = "restinio-unvendor-catch2_part1.patch";
hash = "sha256-2Htt9WTP6nrh+1y7y2xleFj568IpnSEn9Qhb1ObLam8=";
})
(useCommit {
id = "0060e493b99f03c38dda519763f6d6701bc18112";
name = "restinio-unvendor-catch2_part2.patch";
hash = "sha256-Eg/VNxPwNtEYmalP5myn+QvqwU6wln9v0vxbRelRHA8=";
})
(useCommit {
id = "05bea25f82917602a49b72b8ea10eeb43984762f";
name = "restinio-unvendor-catch2_part3.patch";
hash = "sha256-fA+U/Y7FyrxDRiWSVXCy9dMF4gmfDLag7gBWoY74In0=";
})
];
strictDeps = true;
nativeBuildInputs = [ cmake ];
propagatedBuildInputs = [
expected-lite
fmt
llhttp
openssl
pcre2
zlib
] ++ (if with_boost_asio then [
boost
] else [
asio
]);
checkInputs = [
catch2_3
];
cmakeDir = "../dev";
cmakeFlags = [
"-DRESTINIO_TEST=ON"
"-DRESTINIO_SAMPLE=OFF"
"-DRESTINIO_BENCHMARK=OFF"
"-DRESTINIO_WITH_SOBJECTIZER=OFF"
"-DRESTINIO_ASIO_SOURCE=${if with_boost_asio then "boost" else "standalone"}"
"-DRESTINIO_DEP_EXPECTED_LITE=find"
"-DRESTINIO_DEP_FMT=find"
"-DRESTINIO_DEP_LLHTTP=find"
"-DRESTINIO_DEP_CATCH2=find"
];
doCheck = true;
enableParallelChecking = false;
meta = with lib; {
description = "Cross-platform, efficient, customizable, and robust asynchronous HTTP(S)/WebSocket server C++ library";
homepage = "https://github.com/Stiffstream/restinio";
license = licenses.bsd3;
platforms = platforms.all;
maintainers = with maintainers; [ tobim ];
};
})

View File

@ -16,16 +16,16 @@
rustPlatform.buildRustPackage rec { rustPlatform.buildRustPackage rec {
pname = "satty"; pname = "satty";
version = "0.8.3"; version = "0.9.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "gabm"; owner = "gabm";
repo = "Satty"; repo = "Satty";
rev = "v${version}"; rev = "v${version}";
hash = "sha256-KCHKR6DP8scd9xdWi0bLw3wObrEi0tOsflXHa9f4Z5k="; hash = "sha256-640npBvOO4SZfQI5Tq1FY+B7Bg75YsaoGd/XhWAy9Zs=";
}; };
cargoHash = "sha256-pUBtUC+WOuiypLUpXCPR1pu0fRrMVTxg7FE2JSaszNw="; cargoHash = "sha256-H+PnZWNaxdNaPLZmKJIcnEBTnpeXCxGC9cXnzR2hfoc=";
nativeBuildInputs = [ nativeBuildInputs = [
copyDesktopItems copyDesktopItems

View File

@ -1,7 +1,7 @@
{ lib, stdenv, fetchFromGitHub, cmake, pkg-config, libuuid, curl, sqlite, openssl }: { lib, stdenv, fetchFromGitHub, cmake, pkg-config, libuuid, curl, sqlite, openssl }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "scitoken-cpp"; pname = "scitokens-cpp";
version = "1.1.0"; version = "1.1.0";
src = fetchFromGitHub { src = fetchFromGitHub {

View File

@ -30,13 +30,13 @@
python3.pkgs.buildPythonApplication rec { python3.pkgs.buildPythonApplication rec {
pname = "gnome-music"; pname = "gnome-music";
version = "45.0"; version = "45.1";
format = "other"; format = "other";
src = fetchurl { src = fetchurl {
url = "mirror://gnome/sources/${pname}/${lib.versions.major version}/${pname}-${version}.tar.xz"; url = "mirror://gnome/sources/${pname}/${lib.versions.major version}/${pname}-${version}.tar.xz";
sha256 = "M+dwFmImp0U31MELFTjvqIQklP/pvyyQoWyrmKuZe98="; sha256 = "lZWc24AkRASNUKGpHELbiyUWWgpoUzvAOJXrNyxN3gs=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View File

@ -68,11 +68,11 @@
stdenv.mkDerivation (finalAttrs: { stdenv.mkDerivation (finalAttrs: {
pname = "gnome-control-center"; pname = "gnome-control-center";
version = "45.2"; version = "45.3";
src = fetchurl { src = fetchurl {
url = "mirror://gnome/sources/gnome-control-center/${lib.versions.major finalAttrs.version}/gnome-control-center-${finalAttrs.version}.tar.xz"; url = "mirror://gnome/sources/gnome-control-center/${lib.versions.major finalAttrs.version}/gnome-control-center-${finalAttrs.version}.tar.xz";
sha256 = "sha256-DPo8My1u2stz0GxrJv/KEHjob/WerIGbKTHglndT33A="; sha256 = "sha256-selJxOhsBiTsam7Q3wnJ+uKyKYPB3KYO2GrsjvCyQAQ=";
}; };
patches = [ patches = [

View File

@ -39,11 +39,11 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "gnome-initial-setup"; pname = "gnome-initial-setup";
version = "45.0"; version = "45.4.1";
src = fetchurl { src = fetchurl {
url = "mirror://gnome/sources/${pname}/${lib.versions.major version}/${pname}-${version}.tar.xz"; url = "mirror://gnome/sources/${pname}/${lib.versions.major version}/${pname}-${version}.tar.xz";
sha256 = "sa/nZHmPiUi+25XHqzG9eFKaxctIHEH3p3d/Jk3lS9g="; sha256 = "Nj4JqjMI5/QHTgZiU6AYKzIqtgN2dD3heLu0AOVLqO4=";
}; };
patches = [ patches = [

View File

@ -67,13 +67,13 @@ let
in in
stdenv.mkDerivation (finalAttrs: { stdenv.mkDerivation (finalAttrs: {
pname = "gnome-shell"; pname = "gnome-shell";
version = "45.3"; version = "45.4";
outputs = [ "out" "devdoc" ]; outputs = [ "out" "devdoc" ];
src = fetchurl { src = fetchurl {
url = "mirror://gnome/sources/gnome-shell/${lib.versions.major finalAttrs.version}/gnome-shell-${finalAttrs.version}.tar.xz"; url = "mirror://gnome/sources/gnome-shell/${lib.versions.major finalAttrs.version}/gnome-shell-${finalAttrs.version}.tar.xz";
sha256 = "OhlyRyDYJ03GvO1o4N1fx2aKBM15l4y7uCI0dMzdqas="; sha256 = "W/6jeeEgscfyN/PsNprSfvXC9ZMMffFjs5J4LYWCCQ0=";
}; };
patches = [ patches = [

View File

@ -67,13 +67,13 @@
stdenv.mkDerivation (finalAttrs: { stdenv.mkDerivation (finalAttrs: {
pname = "mutter"; pname = "mutter";
version = "45.3"; version = "45.4";
outputs = [ "out" "dev" "man" "devdoc" ]; outputs = [ "out" "dev" "man" "devdoc" ];
src = fetchurl { src = fetchurl {
url = "mirror://gnome/sources/mutter/${lib.versions.major finalAttrs.version}/mutter-${finalAttrs.version}.tar.xz"; url = "mirror://gnome/sources/mutter/${lib.versions.major finalAttrs.version}/mutter-${finalAttrs.version}.tar.xz";
sha256 = "t4rqfz4r7IMioq8EBHFr4iaZBcfVDASwsqcaOIFPzQE="; sha256 = "kRQIN74VWC8sdTvmYauOQtrVXUobDwZQvQssk/Ar16s=";
}; };
mesonFlags = [ mesonFlags = [

View File

@ -20,12 +20,12 @@
python3Packages.buildPythonApplication rec { python3Packages.buildPythonApplication rec {
pname = "gnome-tweaks"; pname = "gnome-tweaks";
version = "45.0"; version = "45.1";
format = "other"; format = "other";
src = fetchurl { src = fetchurl {
url = "mirror://gnome/sources/${pname}/${lib.versions.major version}/${pname}-${version}.tar.xz"; url = "mirror://gnome/sources/${pname}/${lib.versions.major version}/${pname}-${version}.tar.xz";
sha256 = "JTmUZYroYXlNDG4OD0dd/hyvJ342dLh5J5AjjzTP1u4="; sha256 = "lf+n842bHf1eTOvvt1JBn+ohzUBwITla3J8RKFRBbU8=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View File

@ -53,6 +53,7 @@ stdenv.mkDerivation rec {
passthru.updateScript = gnome.updateScript { passthru.updateScript = gnome.updateScript {
packageName = "libdex"; packageName = "libdex";
versionPolicy = "odd-unstable";
}; };
meta = with lib; { meta = with lib; {

View File

@ -14,20 +14,15 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "mongoc"; pname = "mongoc";
version = "1.24.4"; version = "1.25.4";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "mongodb"; owner = "mongodb";
repo = "mongo-c-driver"; repo = "mongo-c-driver";
rev = "refs/tags/${version}"; rev = "refs/tags/${version}";
hash = "sha256-cOPZ4o9q/cOBtGXFv6mOenTSyU/L2U6DZB4UmMnhtes="; hash = "sha256-4Bz6sftXSZDDV8PlTQG8ndOwwp+QHXtzacJ1BXfJAkQ=";
}; };
postPatch = ''
substituteInPlace src/libbson/CMakeLists.txt src/libmongoc/CMakeLists.txt \
--replace "\\\''${prefix}/" ""
'';
nativeBuildInputs = [ nativeBuildInputs = [
cmake cmake
pkg-config pkg-config
@ -48,6 +43,7 @@ stdenv.mkDerivation rec {
"-DBUILD_VERSION=${version}" "-DBUILD_VERSION=${version}"
"-DENABLE_UNINSTALL=OFF" "-DENABLE_UNINSTALL=OFF"
"-DENABLE_AUTOMATIC_INIT_AND_CLEANUP=OFF" "-DENABLE_AUTOMATIC_INIT_AND_CLEANUP=OFF"
"-DCMAKE_INSTALL_LIBDIR=lib"
]; ];
# remove forbidden reference to $TMPDIR # remove forbidden reference to $TMPDIR

View File

@ -2,6 +2,8 @@
, stdenv , stdenv
, fetchFromGitHub , fetchFromGitHub
, mongoc , mongoc
, openssl
, cyrus_sasl
, cmake , cmake
, validatePkgConfig , validatePkgConfig
, testers , testers
@ -31,6 +33,8 @@ stdenv.mkDerivation (finalAttrs: {
buildInputs = [ buildInputs = [
mongoc mongoc
openssl
cyrus_sasl
]; ];
cmakeFlags = [ cmakeFlags = [

View File

@ -1,29 +0,0 @@
{ lib, stdenvNoCC, fetchurl }:
stdenvNoCC.mkDerivation rec {
pname = "restinio";
version = "0.6.19";
src = fetchurl {
url = "https://github.com/Stiffstream/restinio/releases/download/v.${version}/${pname}-${version}.tar.bz2";
hash = "sha256-fyHuvrlm4XDWq1TpsZiskn1DkJASFzngN8D6O7NnskA=";
};
sourceRoot = ".";
installPhase = ''
runHook preInstall
mkdir -p $out/include
mv restinio-*/dev/restinio $out/include
runHook postInstall
'';
meta = with lib; {
description = "Cross-platform, efficient, customizable, and robust asynchronous HTTP/WebSocket server C++14 library";
homepage = "https://github.com/Stiffstream/restinio";
license = licenses.bsd3;
platforms = platforms.all;
};
}

View File

@ -221,13 +221,13 @@
aarch64-linux = "https://packages.microsoft.com/debian/11/prod/pool/main/m/${finalAttrs.pname}/${finalAttrs.pname}_${finalAttrs.version}_arm64.deb"; aarch64-linux = "https://packages.microsoft.com/debian/11/prod/pool/main/m/${finalAttrs.pname}/${finalAttrs.pname}_${finalAttrs.version}_arm64.deb";
x86_64-darwin = "https://download.microsoft.com/download/6/4/0/64006503-51e3-44f0-a6cd-a9b757d0d61b/${finalAttrs.pname}-${finalAttrs.version}-amd64.tar.gz"; x86_64-darwin = "https://download.microsoft.com/download/6/4/0/64006503-51e3-44f0-a6cd-a9b757d0d61b/${finalAttrs.pname}-${finalAttrs.version}-amd64.tar.gz";
aarch64-darwin = "https://download.microsoft.com/download/6/4/0/64006503-51e3-44f0-a6cd-a9b757d0d61b/${finalAttrs.pname}-${finalAttrs.version}-arm64.tar.gz"; aarch64-darwin = "https://download.microsoft.com/download/6/4/0/64006503-51e3-44f0-a6cd-a9b757d0d61b/${finalAttrs.pname}-${finalAttrs.version}-arm64.tar.gz";
}.${stdenv.system} or (throw "Unsupported platform"); }.${stdenv.system} or (throw "Unsupported system: ${stdenv.system}");
hash = { hash = {
x86_64-linux = "sha256:1f0rmh1aynf1sqmjclbsyh2wz5jby0fixrwz71zp6impxpwvil52"; x86_64-linux = "sha256:1f0rmh1aynf1sqmjclbsyh2wz5jby0fixrwz71zp6impxpwvil52";
aarch64-linux = "sha256:0zphnbvkqdbkcv6lvv63p7pyl68h5bs2dy6vv44wm6bi89svms4a"; aarch64-linux = "sha256:0zphnbvkqdbkcv6lvv63p7pyl68h5bs2dy6vv44wm6bi89svms4a";
x86_64-darwin = "sha256:1fn80byn1yihflznxcm9cpj42mpllnz54apnk9n46vzm2ng2lj6d"; x86_64-darwin = "sha256:1fn80byn1yihflznxcm9cpj42mpllnz54apnk9n46vzm2ng2lj6d";
aarch64-darwin = "sha256:116xl8r2apr5b48jnq6myj9fwqs88yccw5176yfyzh4534fznj5x"; aarch64-darwin = "sha256:116xl8r2apr5b48jnq6myj9fwqs88yccw5176yfyzh4534fznj5x";
}.${stdenv.system} or (throw "Unsupported platform"); }.${stdenv.system} or (throw "Unsupported system: ${stdenv.system}");
}; };
nativeBuildInputs = nativeBuildInputs =

View File

@ -2,15 +2,20 @@
buildDunePackage rec { buildDunePackage rec {
pname = "ocamlfuse"; pname = "ocamlfuse";
version = "2.7.1_cvs8"; version = "2.7.1_cvs9";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "astrada"; owner = "astrada";
repo = "ocamlfuse"; repo = "ocamlfuse";
rev = "v${version}"; rev = "v${version}";
hash = "sha256-Cm9mdYzpKnYoNyAJvjJkiDBP/O4n1JiTkhXQO3w7+hA="; hash = "sha256-cOObHUAYiI2mN1qjsxcK6kHAmawuaGQOUNHqWioIvjM=";
}; };
postPatch = ''
substituteInPlace lib/Fuse_main.c \
--replace-warn "<fuse_lowlevel.h>" "<fuse/fuse_lowlevel.h>"
'';
nativeBuildInputs = [ camlidl ]; nativeBuildInputs = [ camlidl ];
buildInputs = [ dune-configurator ]; buildInputs = [ dune-configurator ];
propagatedBuildInputs = [ camlidl fuse ]; propagatedBuildInputs = [ camlidl fuse ];

View File

@ -1,13 +1,14 @@
{ lib { lib
, aiohttp , aiohttp
, aioresponses , aioresponses
, pydantic_1 , pydantic
, buildPythonPackage , buildPythonPackage
, fetchFromGitHub , fetchFromGitHub
, poetry-core , poetry-core
, pytest-aiohttp , pytest-aiohttp
, pytestCheckHook , pytestCheckHook
, pythonOlder , pythonOlder
, pythonRelaxDepsHook
}: }:
buildPythonPackage rec { buildPythonPackage rec {
@ -31,11 +32,16 @@ buildPythonPackage rec {
nativeBuildInputs = [ nativeBuildInputs = [
poetry-core poetry-core
pythonRelaxDepsHook
];
pythonRelaxDeps = [
"pydantic"
]; ];
propagatedBuildInputs = [ propagatedBuildInputs = [
aiohttp aiohttp
pydantic_1 pydantic
]; ];
nativeCheckInputs = [ nativeCheckInputs = [

View File

@ -27,18 +27,22 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "certbot"; pname = "certbot";
version = "2.7.4"; version = "2.9.0";
format = "setuptools"; pyproject = true;
src = fetchFromGitHub { src = fetchFromGitHub {
owner = pname; owner = "certbot";
repo = pname; repo = "certbot";
rev = "refs/tags/v${version}"; rev = "refs/tags/v${version}";
hash = "sha256-BZ7JqAciwbmkpbzR/qZHAraLJWWXNRN3Er4XvfU5kYs="; hash = "sha256-yYB9Y0wniRgzNk5XatkjKayIPj7ienXsqOboKPwzIfk=";
}; };
sourceRoot = "${src.name}/${pname}"; sourceRoot = "${src.name}/${pname}";
nativeBuildInputs = [
setuptools
];
propagatedBuildInputs = [ propagatedBuildInputs = [
configargparse configargparse
acme acme
@ -48,12 +52,7 @@ buildPythonPackage rec {
josepy josepy
parsedatetime parsedatetime
pyrfc3339 pyrfc3339
pyopenssl
pytz pytz
requests
six
zope-component
zope-interface
setuptools # for pkg_resources setuptools # for pkg_resources
]; ];
@ -67,13 +66,8 @@ buildPythonPackage rec {
pytestFlagsArray = [ pytestFlagsArray = [
"-o cache_dir=$(mktemp -d)" "-o cache_dir=$(mktemp -d)"
# See https://github.com/certbot/certbot/issues/8746
"-W ignore::ResourceWarning"
"-W ignore::DeprecationWarning"
]; ];
doCheck = true;
makeWrapperArgs = [ "--prefix PATH : ${dialog}/bin" ]; makeWrapperArgs = [ "--prefix PATH : ${dialog}/bin" ];
# certbot.withPlugins has a similar calling convention as python*.withPackages # certbot.withPlugins has a similar calling convention as python*.withPackages
@ -92,9 +86,11 @@ buildPythonPackage rec {
''; '';
meta = with lib; { meta = with lib; {
homepage = src.meta.homepage; homepage = "https://github.com/certbot/certbot";
changelog = "https://github.com/certbot/certbot/blob/${src.rev}/certbot/CHANGELOG.md";
description = "ACME client that can obtain certs and extensibly update server configurations"; description = "ACME client that can obtain certs and extensibly update server configurations";
platforms = platforms.unix; platforms = platforms.unix;
mainProgram = "certbot";
maintainers = with maintainers; [ domenkozar ]; maintainers = with maintainers; [ domenkozar ];
license = with licenses; [ asl20 ]; license = with licenses; [ asl20 ];
}; };

View File

@ -12,14 +12,14 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "cloudflare"; pname = "cloudflare";
version = "2.18.1"; version = "2.18.2";
pyproject = true; pyproject = true;
disabled = pythonOlder "3.7"; disabled = pythonOlder "3.7";
src = fetchPypi { src = fetchPypi {
inherit pname version; inherit pname version;
hash = "sha256-dTD9HO26elFdfNMJxlyK1jKf4xWcz98/XrKI3EpUSsc="; hash = "sha256-F8eNXUUEsTG/Qas9+UzmAtJaHrLxst9kQZV2C3LmTD8=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View File

@ -10,13 +10,13 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "gradio-pdf"; pname = "gradio-pdf";
version = "0.0.4"; version = "0.0.5";
format = "pyproject"; format = "pyproject";
src = fetchPypi { src = fetchPypi {
pname = "gradio_pdf"; pname = "gradio_pdf";
inherit version; inherit version;
hash = "sha256-lyZd8tH3SaTmE/7ooNaQJUYZRvjSOLx3+doWTCTXk9U="; hash = "sha256-yHISYpkZ5YgUBxCfu2rw3R+g9t4h1WogXXCuBiV92Vk=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View File

@ -43,7 +43,7 @@ buildPythonPackage rec {
name = "x86_64"; name = "x86_64";
hash = "sha256-/+gegUMd2n7MpJvdilS5VWefXc0tuRcLrXBBXSH35b0="; hash = "sha256-/+gegUMd2n7MpJvdilS5VWefXc0tuRcLrXBBXSH35b0=";
}; };
}.${stdenv.system} or (throw "Unsupported system"); }.${stdenv.system} or (throw "Unsupported system: ${stdenv.system}");
in fetchPypi { in fetchPypi {
pname = "home_assistant_chip_core"; pname = "home_assistant_chip_core";
inherit version format; inherit version format;

View File

@ -30,7 +30,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "ocrmypdf"; pname = "ocrmypdf";
version = "16.0.4"; version = "16.1.0";
disabled = pythonOlder "3.10"; disabled = pythonOlder "3.10";
@ -46,7 +46,7 @@ buildPythonPackage rec {
postFetch = '' postFetch = ''
rm "$out/.git_archival.txt" rm "$out/.git_archival.txt"
''; '';
hash = "sha256-1Bg1R8c5VtJsd8NHd+WWdJRA39Jjgv9JUMcijZm942o="; hash = "sha256-rKy1bPgQOqx+F5cpFg+KG0r70B0RWns03gwoiVbz35U=";
}; };
patches = [ patches = [

View File

@ -11,16 +11,16 @@
, pytestCheckHook , pytestCheckHook
}: }:
buildPythonPackage { buildPythonPackage rec {
pname = "proton-vpn-api-core"; pname = "proton-vpn-api-core";
version = "0.20.1-unstable-2023-10-10"; version = "0.20.3";
pyproject = true; pyproject = true;
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "ProtonVPN"; owner = "ProtonVPN";
repo = "python-proton-vpn-api-core"; repo = "python-proton-vpn-api-core";
rev = "9c03fc30d3ff08559cab3644eadde027b029375d"; rev = "refs/tags/v${version}";
hash = "sha256-vnz1+NazQceAs9KA3Jq0tsJditRoG/LoBR+0wuDzzHk="; hash = "sha256-acck0Nc/15soTJBC/4y83ID9fjF/q4vrYr6SsLAAVRY=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [
@ -38,7 +38,7 @@ buildPythonPackage {
postPatch = '' postPatch = ''
substituteInPlace setup.cfg \ substituteInPlace setup.cfg \
--replace "--cov=proton/vpn/core/ --cov-report html --cov-report term" "" --replace-fail "--cov=proton/vpn/core/ --cov-report html --cov-report term" ""
''; '';
pythonImportsCheck = [ "proton.vpn.core" ]; pythonImportsCheck = [ "proton.vpn.core" ];
@ -52,11 +52,6 @@ buildPythonPackage {
export HOME=$(mktemp -d) export HOME=$(mktemp -d)
''; '';
disabledTestPaths = [
# Has a single test failing with Permission denied: '/run'
"tests/test_session.py"
];
meta = with lib; { meta = with lib; {
description = "Acts as a facade to the other Proton VPN components, exposing a uniform API to the available Proton VPN services"; description = "Acts as a facade to the other Proton VPN components, exposing a uniform API to the available Proton VPN services";
homepage = "https://github.com/ProtonVPN/python-proton-vpn-api-core"; homepage = "https://github.com/ProtonVPN/python-proton-vpn-api-core";

View File

@ -9,16 +9,16 @@
, pytestCheckHook , pytestCheckHook
}: }:
buildPythonPackage { buildPythonPackage rec {
pname = "proton-vpn-connection"; pname = "proton-vpn-connection";
version = "0.11.0-unstable-2023-09-05"; version = "0.11.3";
pyproject = true; pyproject = true;
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "ProtonVPN"; owner = "ProtonVPN";
repo = "python-proton-vpn-connection"; repo = "python-proton-vpn-connection";
rev = "747ccacb5350ad59f2a09953b8d20c5c161aab54"; rev = "refs/tags/v${version}";
hash = "sha256-WyMG0kmwBKoWc0mHnaop9E0upPAYHFwS/A9I1//WwlY="; hash = "sha256-RuLnc/olI8S09WFG126N2xZgW4gf+DDpRstcelqMhs4=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [
@ -34,7 +34,7 @@ buildPythonPackage {
postPatch = '' postPatch = ''
substituteInPlace setup.cfg \ substituteInPlace setup.cfg \
--replace "--cov=proton.vpn.connection --cov-report html --cov-report term" "" --replace-fail "--cov=proton.vpn.connection --cov-report html --cov-report term" ""
''; '';
pythonImportsCheck = [ "proton.vpn.connection" ]; pythonImportsCheck = [ "proton.vpn.connection" ];

View File

@ -6,16 +6,16 @@
, pytestCheckHook , pytestCheckHook
}: }:
buildPythonPackage { buildPythonPackage rec {
pname = "proton-vpn-logger"; pname = "proton-vpn-logger";
version = "0.2.1-unstable-2023-05-10"; version = "0.2.1";
pyproject = true; pyproject = true;
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "ProtonVPN"; owner = "ProtonVPN";
repo = "python-proton-vpn-logger"; repo = "python-proton-vpn-logger";
rev = "0acbc1ab41a65cbc9ceb340e3db011e6f89eb65a"; rev = "refs/tags/v${version}";
hash = "sha256-VIggBKopAAKiNdQ5ypG1qI74E2WMDwDSriSuka/DBKA="; hash = "sha256-/LfMjyTs/EusgnKEQugsdJzqDZBvaAhbsTUVLDCRw0I=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [
@ -28,7 +28,7 @@ buildPythonPackage {
postPatch = '' postPatch = ''
substituteInPlace setup.cfg \ substituteInPlace setup.cfg \
--replace "--cov=proton/vpn/logging/ --cov-report html --cov-report term" "" --replace-fail "--cov=proton/vpn/logging/ --cov-report html --cov-report term" ""
''; '';
pythonImportsCheck = [ "proton.vpn.logging" ]; pythonImportsCheck = [ "proton.vpn.logging" ];

View File

@ -8,19 +8,20 @@
, proton-vpn-connection , proton-vpn-connection
, pycairo , pycairo
, pygobject3 , pygobject3
, pytest-asyncio
, pytestCheckHook , pytestCheckHook
}: }:
buildPythonPackage { buildPythonPackage rec {
pname = "proton-vpn-network-manager"; pname = "proton-vpn-network-manager";
version = "0.3.0-unstable-2023-09-05"; version = "0.3.3";
pyproject = true; pyproject = true;
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "ProtonVPN"; owner = "ProtonVPN";
repo = "python-proton-vpn-network-manager"; repo = "python-proton-vpn-network-manager";
rev = "6ffd04fa0ae88a89d2b733443317066ef23b3ccd"; rev = "refs/tags/v${version}";
hash = "sha256-Bqlwo7U/mwodQarl30n3/BNETqit1MVQUJT+mAhC6AI="; hash = "sha256-UEXoIFLB3/q3G3ASrgsXxF21iT5rCWm4knGezcmxmnk=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [
@ -40,12 +41,13 @@ buildPythonPackage {
postPatch = '' postPatch = ''
substituteInPlace setup.cfg \ substituteInPlace setup.cfg \
--replace "--cov=proton/vpn/backend/linux/networkmanager --cov-report html --cov-report term" "" --replace-fail "--cov=proton/vpn/backend/linux/networkmanager --cov-report html --cov-report term" ""
''; '';
pythonImportsCheck = [ "proton.vpn.backend.linux.networkmanager" ]; pythonImportsCheck = [ "proton.vpn.backend.linux.networkmanager" ];
nativeCheckInputs = [ nativeCheckInputs = [
pytest-asyncio
pytestCheckHook pytestCheckHook
]; ];

View File

@ -14,16 +14,16 @@
, pytestCheckHook , pytestCheckHook
}: }:
buildPythonPackage { buildPythonPackage rec {
pname = "proton-vpn-session"; pname = "proton-vpn-session";
version = "0.6.2-unstable-2023-10-24"; version = "0.6.5";
pyproject = true; pyproject = true;
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "ProtonVPN"; owner = "ProtonVPN";
repo = "python-proton-vpn-session"; repo = "python-proton-vpn-session";
rev = "419b25bd1823f78d1219dc4cc441eeaf37646068"; rev = "refs/tags/v${version}";
hash = "sha256-YPyNxbKxw+670bNQZ7U5nljyUjsNJ+k7eL+HpGiSCLk="; hash = "sha256-1oyCxBO9YqMopbw88UJF8k4BJFP4+m23NwSrqTYqcg8=";
}; };
nativeBuildInputs = [ nativeBuildInputs = [
@ -40,7 +40,7 @@ buildPythonPackage {
postPatch = '' postPatch = ''
substituteInPlace setup.cfg \ substituteInPlace setup.cfg \
--replace "--cov=proton.vpn.session --cov-report term" "" --replace-fail "--cov=proton.vpn.session --cov-report term" ""
''; '';
pythonImportsCheck = [ "proton.vpn.session" ]; pythonImportsCheck = [ "proton.vpn.session" ];

View File

@ -2,7 +2,7 @@
, buildPythonPackage , buildPythonPackage
, fetchFromGitHub , fetchFromGitHub
, httpx , httpx
, pydantic_1 , pydantic
, pytestCheckHook , pytestCheckHook
, pythonOlder , pythonOlder
, setuptools , setuptools
@ -27,7 +27,7 @@ buildPythonPackage rec {
]; ];
propagatedBuildInputs = [ propagatedBuildInputs = [
pydantic_1 pydantic
]; ];
nativeCheckInputs = [ nativeCheckInputs = [
@ -54,5 +54,6 @@ buildPythonPackage rec {
changelog = "https://github.com/Skyscanner/pycfmodel/releases/tag/v${version}"; changelog = "https://github.com/Skyscanner/pycfmodel/releases/tag/v${version}";
license = licenses.asl20; license = licenses.asl20;
maintainers = with maintainers; [ fab ]; maintainers = with maintainers; [ fab ];
broken = versionAtLeast pydantic.version "2";
}; };
} }

View File

@ -45,7 +45,6 @@ buildPythonPackage rec {
propagatedBuildInputs = [ propagatedBuildInputs = [
black black
ruff
]; ];
nativeCheckInputs = [ nativeCheckInputs = [

View File

@ -6,7 +6,7 @@
, httpx , httpx
, iso8601 , iso8601
, poetry-core , poetry-core
, pydantic_1 , pydantic
, pyjwt , pyjwt
, pytest-asyncio , pytest-asyncio
, pytestCheckHook , pytestCheckHook
@ -47,6 +47,7 @@ buildPythonPackage rec {
"attrs" "attrs"
"httpx" "httpx"
"iso8601" "iso8601"
"pydantic"
]; ];
nativeBuildInputs = [ nativeBuildInputs = [
@ -58,7 +59,7 @@ buildPythonPackage rec {
attrs attrs
httpx httpx
iso8601 iso8601
pydantic_1 pydantic
pyjwt pyjwt
python-dateutil python-dateutil
retrying retrying

View File

@ -9,18 +9,18 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "sphinx-book-theme"; pname = "sphinx-book-theme";
version = "1.1.0"; version = "1.1.1";
format = "wheel"; format = "wheel";
disabled = pythonOlder "3.7"; disabled = pythonOlder "3.9";
src = fetchPypi { src = fetchPypi {
inherit version format; inherit version format;
dist = "py3"; dist = "py3";
python = "py3"; python = "py3";
pname = "sphinx_book_theme"; pname = "sphinx_book_theme";
hash = "sha256-CIvGnWX6uERq24aR7WFof3G/dQTJdAr2i8eM+TaiYRI="; hash = "sha256-zk3xqqs4WjqWM/p5coGTfqEgpRcJaLbrgXsR8+CKvAc=";
}; };
propagatedBuildInputs = [ propagatedBuildInputs = [

View File

@ -3,7 +3,7 @@
, buildPythonPackage , buildPythonPackage
, fetchFromGitHub , fetchFromGitHub
, pint , pint
, pydantic_1 # use pydantic 2 on next release , pydantic
, pythonOlder , pythonOlder
, pytz , pytz
, requests , requests
@ -26,11 +26,6 @@ buildPythonPackage rec {
hash = "sha256-U+QlSrijvT77/m+yjhFxbcVTQe51J+PR4Kc8N+qG+wI="; hash = "sha256-U+QlSrijvT77/m+yjhFxbcVTQe51J+PR4Kc8N+qG+wI=";
}; };
postPatch = ''
# Remove on next release
sed -i 's/pydantic==1.10.9/pydantic/' pyproject.toml
'';
nativeBuildInputs = [ nativeBuildInputs = [
setuptools setuptools
setuptools-scm setuptools-scm
@ -39,7 +34,7 @@ buildPythonPackage rec {
propagatedBuildInputs = [ propagatedBuildInputs = [
arrow arrow
pint pint
pydantic_1 pydantic
pytz pytz
requests requests
responses responses
@ -58,5 +53,6 @@ buildPythonPackage rec {
changelog = "https://github.com/stravalib/stravalib/releases/tag/v${version}"; changelog = "https://github.com/stravalib/stravalib/releases/tag/v${version}";
license = licenses.asl20; license = licenses.asl20;
maintainers = with maintainers; [ sikmir ]; maintainers = with maintainers; [ sikmir ];
broken = lib.versionAtLeast pydantic.version "2";
}; };
} }

View File

@ -28,7 +28,7 @@ stdenv.mkDerivation {
pname = "StaticSitesClient-${versionFlavor}"; pname = "StaticSitesClient-${versionFlavor}";
version = flavor.buildId; version = flavor.buildId;
src = sources.${stdenv.hostPlatform.system} or (throw "Unsupported platform"); src = sources.${stdenv.hostPlatform.system} or (throw "Unsupported system: ${stdenv.hostPlatform.system}");
nativeBuildInputs = [ nativeBuildInputs = [
autoPatchelfHook autoPatchelfHook

View File

@ -2,16 +2,16 @@
buildGoModule rec { buildGoModule rec {
pname = "terraform-ls"; pname = "terraform-ls";
version = "0.32.6"; version = "0.32.7";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "hashicorp"; owner = "hashicorp";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
hash = "sha256-+1nmxjR1iVtQXjdsqXaYTh8kLGq9gqSDjt1drvR9KoY="; hash = "sha256-gH0wJRf64XloBfnvtNdZlONESjxG5mS5Ok9HTX1PJUA=";
}; };
vendorHash = "sha256-8taGEDJ+Qtw/4eOWYiWZmEbmCwqcFXYh3x/9wR3oBJ8="; vendorHash = "sha256-YvzUdcCjkCApufLk5CZv6L/mIlOuo9qEBoxHOxv2Ljc=";
ldflags = [ "-s" "-w" ]; ldflags = [ "-s" "-w" ];

View File

@ -1,5 +1,5 @@
#!/usr/bin/env nix-shell #!/usr/bin/env nix-shell
#!nix-shell -I nixpkgs=../../../. -i bash -p unzip curl jq common-updater-scripts #!nix-shell -I nixpkgs=./. -i bash -p unzip curl jq common-updater-scripts
set -eo pipefail set -eo pipefail
cd "$(dirname "${BASH_SOURCE[0]}")" cd "$(dirname "${BASH_SOURCE[0]}")"

View File

@ -1,5 +1,5 @@
#!/usr/bin/env nix-shell #!/usr/bin/env nix-shell
#!nix-shell -I nixpkgs=../../../. -i bash -p curl jq common-updater-scripts #!nix-shell -I nixpkgs=./. -i bash -p curl jq common-updater-scripts
set -eo pipefail set -eo pipefail
cd "$(dirname "${BASH_SOURCE[0]}")" cd "$(dirname "${BASH_SOURCE[0]}")"

View File

@ -18,11 +18,11 @@ lua = luajitPackages;
unwrapped = stdenv.mkDerivation rec { unwrapped = stdenv.mkDerivation rec {
pname = "knot-resolver"; pname = "knot-resolver";
version = "5.7.0"; version = "5.7.1";
src = fetchurl { src = fetchurl {
url = "https://secure.nic.cz/files/knot-resolver/${pname}-${version}.tar.xz"; url = "https://secure.nic.cz/files/knot-resolver/${pname}-${version}.tar.xz";
sha256 = "383ef6db1cccabd2dd788ea9385f05e98a2bafdfeb7f0eda57ff9d572f4fad71"; sha256 = "da14b415c61d53747a991f12d6209367ef826a13dc6bf4eeaf5d88760294c3a2";
}; };
outputs = [ "out" "dev" ]; outputs = [ "out" "dev" ];

View File

@ -7,13 +7,13 @@ let plat = stdenvNoCC.hostPlatform.system; in stdenvNoCC.mkDerivation ({
src = if lib.isAttrs zipHash then src = if lib.isAttrs zipHash then
fetchurl { fetchurl {
name = "${pname}-${version}-${plat}.zip"; name = "${pname}-${version}-${plat}.zip";
hash = zipHash.${plat} or (throw "unsupported system"); hash = zipHash.${plat} or (throw "Unsupported system: ${plat}");
url = "https://grafana.com/api/plugins/${pname}/versions/${version}/download" + { url = "https://grafana.com/api/plugins/${pname}/versions/${version}/download" + {
x86_64-linux = "?os=linux&arch=amd64"; x86_64-linux = "?os=linux&arch=amd64";
aarch64-linux = "?os=linux&arch=arm64"; aarch64-linux = "?os=linux&arch=arm64";
x86_64-darwin = "?os=darwin&arch=amd64"; x86_64-darwin = "?os=darwin&arch=amd64";
aarch64-darwin = "?os=darwin&arch=arm64"; aarch64-darwin = "?os=darwin&arch=arm64";
}.${plat} or (throw "unknown system"); }.${plat} or (throw "Unsupported system: ${plat}");
} }
else else
fetchurl { fetchurl {

View File

@ -2,11 +2,11 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "abcMIDI"; pname = "abcMIDI";
version = "2024.01.04"; version = "2024.02.11";
src = fetchzip { src = fetchzip {
url = "https://ifdo.ca/~seymour/runabc/${pname}-${version}.zip"; url = "https://ifdo.ca/~seymour/runabc/${pname}-${version}.zip";
hash = "sha256-IsQ+lAmQQGitKRlQUc7PgRKgwlEgYsR5q2XHp9k7tEM="; hash = "sha256-gFSwD/NUp/6cT53GKUQd+pthADOqNI0jT6yQo+/kgRY=";
}; };
meta = with lib; { meta = with lib; {

File diff suppressed because it is too large Load Diff

View File

@ -27,17 +27,18 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "stratisd"; pname = "stratisd";
version = "3.6.4"; version = "3.6.5";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "stratis-storage"; owner = "stratis-storage";
repo = pname; repo = pname;
rev = "refs/tags/stratisd-v${version}"; rev = "refs/tags/stratisd-v${version}";
hash = "sha256-0zSMFjAzTtTmpSCqlIq5GXk3/AhlhtECFZXmo6xcjWA="; hash = "sha256-qgf5Q2MAY8PAYlplvTX+YjYfDFLfddpyIG4S/IIYbsU=";
}; };
cargoDeps = rustPlatform.importCargoLock { cargoDeps = rustPlatform.fetchCargoTarball {
lockFile = ./Cargo.lock; inherit pname version src;
hash = "sha256-Bu87uHEcMKB+TX8gWHD1vRazOkqJSZKQcsPiaKXrGFE=";
}; };
postPatch = '' postPatch = ''

View File

@ -27,7 +27,7 @@ stdenv.mkDerivation rec {
url = "https://www.archimatetool.com/downloads/archi_5.php?/${version}/Archi-Mac-Silicon-${version}.dmg"; url = "https://www.archimatetool.com/downloads/archi_5.php?/${version}/Archi-Mac-Silicon-${version}.dmg";
hash = "sha256-Jg+tl902OWSm4GHxF7QXbRU5nxX4/5q6LTGubHWQ08E="; hash = "sha256-Jg+tl902OWSm4GHxF7QXbRU5nxX4/5q6LTGubHWQ08E=";
}; };
}.${stdenv.hostPlatform.system} or (throw "Unsupported system"); }.${stdenv.hostPlatform.system} or (throw "Unsupported system: ${stdenv.hostPlatform.system}");
buildInputs = [ buildInputs = [
libsecret libsecret

View File

@ -3,7 +3,14 @@
, python3 , python3
}: }:
python3.pkgs.buildPythonApplication rec {
let
python = python3.override {
packageOverrides = self: super: {
pydantic = self.pydantic_1;
};
};
in python.pkgs.buildPythonApplication rec {
pname = "cfripper"; pname = "cfripper";
version = "1.15.3"; version = "1.15.3";
pyproject = true; pyproject = true;
@ -20,11 +27,11 @@ python3.pkgs.buildPythonApplication rec {
--replace "pluggy~=0.13.1" "pluggy" \ --replace "pluggy~=0.13.1" "pluggy" \
''; '';
nativeBuildInputs = with python3.pkgs; [ nativeBuildInputs = with python.pkgs; [
setuptools setuptools
]; ];
propagatedBuildInputs = with python3.pkgs; [ propagatedBuildInputs = with python.pkgs; [
boto3 boto3
cfn-flip cfn-flip
click click
@ -35,7 +42,7 @@ python3.pkgs.buildPythonApplication rec {
setuptools setuptools
]; ];
nativeCheckInputs = with python3.pkgs; [ nativeCheckInputs = with python.pkgs; [
moto moto
pytestCheckHook pytestCheckHook
]; ];

View File

@ -12,7 +12,7 @@ let
x86_64-linux = "amd64"; x86_64-linux = "amd64";
}; };
data = all_data.${system_map.${stdenv.hostPlatform.system} or (throw "Unsupported platform")}; data = all_data.${system_map.${stdenv.hostPlatform.system} or (throw "Unsupported system: ${stdenv.hostPlatform.system}")};
baseUrl = "https://apt.enpass.io"; baseUrl = "https://apt.enpass.io";

View File

@ -978,6 +978,7 @@ mapAliases ({
https://github.com/SchildiChat/schildichat-desktop/issues/215''; # Added 2023-12-05 https://github.com/SchildiChat/schildichat-desktop/issues/215''; # Added 2023-12-05
schildichat-desktop = schildichat-web; schildichat-desktop = schildichat-web;
schildichat-desktop-wayland = schildichat-web; schildichat-desktop-wayland = schildichat-web;
scitoken-cpp = scitokens-cpp; # Added 2024-02-12
sdlmame = throw "'sdlmame' has been renamed to/replaced by 'mame'"; # Converted to throw 2023-09-10 sdlmame = throw "'sdlmame' has been renamed to/replaced by 'mame'"; # Converted to throw 2023-09-10
searx = throw "'searx' has been removed as it is unmaintained. Please switch to searxng"; # Added 2023-10-03 searx = throw "'searx' has been removed as it is unmaintained. Please switch to searxng"; # Added 2023-10-03
session-desktop-appimage = session-desktop; session-desktop-appimage = session-desktop;

View File

@ -24658,8 +24658,6 @@ with pkgs;
resolv_wrapper = callPackage ../development/libraries/resolv_wrapper { }; resolv_wrapper = callPackage ../development/libraries/resolv_wrapper { };
restinio = callPackage ../development/libraries/restinio { };
restish = callPackage ../tools/networking/restish { }; restish = callPackage ../tools/networking/restish { };
rhino = callPackage ../development/libraries/java/rhino { rhino = callPackage ../development/libraries/java/rhino {