diff --git a/maintainers/maintainer-list.nix b/maintainers/maintainer-list.nix index 05bb679373471..2d1903458b403 100644 --- a/maintainers/maintainer-list.nix +++ b/maintainers/maintainer-list.nix @@ -3533,6 +3533,12 @@ fingerprint = "5B08 313C 6853 E5BF FA91 A817 0176 0B4F 9F53 F154"; }]; }; + davisrichard437 = { + email = "davisrichard437@gmail.com"; + github = "davisrichard437"; + githubId = 85075437; + name = "Richard Davis"; + }; davorb = { email = "davor@davor.se"; github = "davorb"; @@ -8415,6 +8421,12 @@ githubId = 2422454; name = "Kai Wohlfahrt"; }; + kylehendricks = { + name = "Kyle Hendricks"; + email = "kyle-github@mail.hendricks.nu"; + github = "kylehendricks"; + githubId = 981958; + }; kyleondy = { email = "kyle@ondy.org"; github = "KyleOndy"; diff --git a/nixos/modules/installer/tools/nixos-generate-config.pl b/nixos/modules/installer/tools/nixos-generate-config.pl index 946e73dac5864..74972c0994bed 100644 --- a/nixos/modules/installer/tools/nixos-generate-config.pl +++ b/nixos/modules/installer/tools/nixos-generate-config.pl @@ -473,7 +473,7 @@ sub in { } # Don't emit tmpfs entry for /tmp, because it most likely comes from the - # boot.tmpOnTmpfs option in configuration.nix (managed declaratively). + # boot.tmp.useTmpfs option in configuration.nix (managed declaratively). next if ($mountPoint eq "/tmp" && $fsType eq "tmpfs"); # Emit the filesystem. diff --git a/nixos/modules/services/cluster/kubernetes/kubelet.nix b/nixos/modules/services/cluster/kubernetes/kubelet.nix index 8e935d621be4e..eebacb3f3ef39 100644 --- a/nixos/modules/services/cluster/kubernetes/kubelet.nix +++ b/nixos/modules/services/cluster/kubernetes/kubelet.nix @@ -63,6 +63,7 @@ in (mkRemovedOptionModule [ "services" "kubernetes" "kubelet" "cadvisorPort" ] "") (mkRemovedOptionModule [ "services" "kubernetes" "kubelet" "allowPrivileged" ] "") (mkRemovedOptionModule [ "services" "kubernetes" "kubelet" "networkPlugin" ] "") + (mkRemovedOptionModule [ "services" "kubernetes" "kubelet" "containerRuntime" ] "") ]; ###### interface @@ -134,12 +135,6 @@ in }; }; - containerRuntime = mkOption { - description = lib.mdDoc "Which container runtime type to use"; - type = enum ["docker" "remote"]; - default = "remote"; - }; - containerRuntimeEndpoint = mkOption { description = lib.mdDoc "Endpoint at which to find the container runtime api interface/socket"; type = str; @@ -331,7 +326,6 @@ in ${optionalString (cfg.tlsKeyFile != null) "--tls-private-key-file=${cfg.tlsKeyFile}"} \ ${optionalString (cfg.verbosity != null) "--v=${toString cfg.verbosity}"} \ - --container-runtime=${cfg.containerRuntime} \ --container-runtime-endpoint=${cfg.containerRuntimeEndpoint} \ --cgroup-driver=systemd \ ${cfg.extraOpts} diff --git a/nixos/modules/services/networking/go-neb.nix b/nixos/modules/services/networking/go-neb.nix index 8c04542c47cc1..b65bb5f548ee8 100644 --- a/nixos/modules/services/networking/go-neb.nix +++ b/nixos/modules/services/networking/go-neb.nix @@ -60,13 +60,12 @@ in { serviceConfig = { ExecStartPre = lib.optional (cfg.secretFile != null) - (pkgs.writeShellScript "pre-start" '' + ("+" + pkgs.writeShellScript "pre-start" '' umask 077 export $(xargs < ${cfg.secretFile}) ${pkgs.envsubst}/bin/envsubst -i "${configFile}" > ${finalConfigFile} chown go-neb ${finalConfigFile} ''); - PermissionsStartOnly = true; RuntimeDirectory = "go-neb"; ExecStart = "${pkgs.go-neb}/bin/go-neb"; User = "go-neb"; diff --git a/nixos/modules/services/web-apps/mastodon.nix b/nixos/modules/services/web-apps/mastodon.nix index 3e1286dc475d3..cf5329be489c1 100644 --- a/nixos/modules/services/web-apps/mastodon.nix +++ b/nixos/modules/services/web-apps/mastodon.nix @@ -587,6 +587,13 @@ in { is enabled. ''; } + { + assertion = 1 == builtins.length + (lib.mapAttrsToList + (_: v: builtins.elem "scheduler" v.jobClasses || v.jobClasses == [ ]) + cfg.sidekiqProcesses); + message = "There must be one and only one Sidekiq queue in services.mastodon.sidekiqProcesses with jobClass \"scheduler\"."; + } ]; environment.systemPackages = [ mastodonTootctl ]; diff --git a/nixos/modules/system/boot/tmp.nix b/nixos/modules/system/boot/tmp.nix index 1f9431710aec4..fd16cd3fba429 100644 --- a/nixos/modules/system/boot/tmp.nix +++ b/nixos/modules/system/boot/tmp.nix @@ -3,62 +3,67 @@ with lib; let - cfg = config.boot; + cfg = config.boot.tmp; in { - - ###### interface + imports = [ + (mkRenamedOptionModule [ "boot" "cleanTmpDir" ] [ "boot" "tmp" "cleanOnBoot" ]) + (mkRenamedOptionModule [ "boot" "tmpOnTmpfs" ] [ "boot" "tmp" "useTmpfs" ]) + (mkRenamedOptionModule [ "boot" "tmpOnTmpfsSize" ] [ "boot" "tmp" "tmpfsSize" ]) + ]; options = { + boot.tmp = { + cleanOnBoot = mkOption { + type = types.bool; + default = false; + description = lib.mdDoc '' + Whether to delete all files in {file}`/tmp` during boot. + ''; + }; - boot.cleanTmpDir = mkOption { - type = types.bool; - default = false; - description = lib.mdDoc '' - Whether to delete all files in {file}`/tmp` during boot. - ''; - }; + tmpfsSize = mkOption { + type = types.oneOf [ types.str types.types.ints.positive ]; + default = "50%"; + description = lib.mdDoc '' + Size of tmpfs in percentage. + Percentage is defined by systemd. + ''; + }; - boot.tmpOnTmpfs = mkOption { - type = types.bool; - default = false; - description = lib.mdDoc '' - Whether to mount a tmpfs on {file}`/tmp` during boot. - ''; - }; + useTmpfs = mkOption { + type = types.bool; + default = false; + description = lib.mdDoc '' + Whether to mount a tmpfs on {file}`/tmp` during boot. - boot.tmpOnTmpfsSize = mkOption { - type = types.oneOf [ types.str types.types.ints.positive ]; - default = "50%"; - description = lib.mdDoc '' - Size of tmpfs in percentage. - Percentage is defined by systemd. - ''; + ::: {.note} + Large Nix builds can fail if the mounted tmpfs is not large enough. + In such a case either increase the tmpfsSize or disable this option. + ::: + ''; + }; }; - }; - ###### implementation - config = { - # When changing remember to update /tmp mount in virtualisation/qemu-vm.nix - systemd.mounts = mkIf cfg.tmpOnTmpfs [ + systemd.mounts = mkIf cfg.useTmpfs [ { what = "tmpfs"; where = "/tmp"; type = "tmpfs"; - mountConfig.Options = concatStringsSep "," [ "mode=1777" - "strictatime" - "rw" - "nosuid" - "nodev" - "size=${toString cfg.tmpOnTmpfsSize}" ]; + mountConfig.Options = concatStringsSep "," [ + "mode=1777" + "strictatime" + "rw" + "nosuid" + "nodev" + "size=${toString cfg.tmpfsSize}" + ]; } ]; - systemd.tmpfiles.rules = optional config.boot.cleanTmpDir "D! /tmp 1777 root root"; - + systemd.tmpfiles.rules = optional cfg.cleanOnBoot "D! /tmp 1777 root root"; }; - } diff --git a/nixos/modules/virtualisation/qemu-vm.nix b/nixos/modules/virtualisation/qemu-vm.nix index a55a21a46a538..89772019284cb 100644 --- a/nixos/modules/virtualisation/qemu-vm.nix +++ b/nixos/modules/virtualisation/qemu-vm.nix @@ -1069,12 +1069,12 @@ in fsType = "ext4"; autoFormat = true; }); - "/tmp" = lib.mkIf config.boot.tmpOnTmpfs { + "/tmp" = lib.mkIf config.boot.tmp.useTmpfs { device = "tmpfs"; fsType = "tmpfs"; neededForBoot = true; # Sync with systemd's tmp.mount; - options = [ "mode=1777" "strictatime" "nosuid" "nodev" "size=${toString config.boot.tmpOnTmpfsSize}" ]; + options = [ "mode=1777" "strictatime" "nosuid" "nodev" "size=${toString config.boot.tmp.tmpfsSize}" ]; }; "/nix/${if cfg.writableStore then ".ro-store" else "store"}" = lib.mkIf cfg.useNixStoreImage { device = "${lookupDriveDeviceName "nix-store" cfg.qemu.drives}"; diff --git a/nixos/tests/ihatemoney/default.nix b/nixos/tests/ihatemoney/default.nix index 894a97d43d35e..d172bf79b8c60 100644 --- a/nixos/tests/ihatemoney/default.nix +++ b/nixos/tests/ihatemoney/default.nix @@ -17,7 +17,7 @@ let http = ":8000"; }; }; - boot.cleanTmpDir = true; + boot.tmp.cleanOnBoot = true; # for exchange rates security.pki.certificateFiles = [ ./server.crt ]; networking.extraHosts = "127.0.0.1 api.exchangerate.host"; diff --git a/pkgs/applications/editors/emacs/elisp-packages/manual-packages.nix b/pkgs/applications/editors/emacs/elisp-packages/manual-packages.nix index b58465e20ec33..4a718dd96d853 100644 --- a/pkgs/applications/editors/emacs/elisp-packages/manual-packages.nix +++ b/pkgs/applications/editors/emacs/elisp-packages/manual-packages.nix @@ -25,8 +25,6 @@ in emacspeak = callPackage ./manual-packages/emacspeak { }; - ement = callPackage ./manual-packages/ement { }; - ess-R-object-popup = callPackage ./manual-packages/ess-R-object-popup { }; evil-markdown = callPackage ./manual-packages/evil-markdown { }; diff --git a/pkgs/applications/editors/emacs/elisp-packages/manual-packages/ement/default.nix b/pkgs/applications/editors/emacs/elisp-packages/manual-packages/ement/default.nix deleted file mode 100644 index c43d0d7765443..0000000000000 --- a/pkgs/applications/editors/emacs/elisp-packages/manual-packages/ement/default.nix +++ /dev/null @@ -1,43 +0,0 @@ -{ trivialBuild -, lib -, fetchFromGitHub -, plz -, cl-lib -, ts -, magit-section -, taxy-magit-section -, taxy -, svg-lib -}: - -trivialBuild { - pname = "ement"; - version = "unstable-2022-09-01"; - - src = fetchFromGitHub { - owner = "alphapapa"; - repo = "ement.el"; - rev = "4ec2107e6a90ed962ddd3875d47caa523eb466b9"; - sha256 = "sha256-zKkBpaOj3qb/Oy89rt7BxmWZDZzDzMIJjjOm+1rrnnc="; - }; - - packageRequires = [ - plz - cl-lib - ts - magit-section - taxy-magit-section - taxy - svg-lib - ]; - - patches = [ - ./handle-nil-images.patch - ]; - - meta = { - description = "Ement.el is a Matrix client for Emacs"; - license = lib.licenses.gpl3Only; - platforms = lib.platforms.all; - }; -} diff --git a/pkgs/applications/editors/emacs/elisp-packages/manual-packages/ement/handle-nil-images.patch b/pkgs/applications/editors/emacs/elisp-packages/manual-packages/ement/handle-nil-images.patch deleted file mode 100644 index 271e1cd2dbac7..0000000000000 --- a/pkgs/applications/editors/emacs/elisp-packages/manual-packages/ement/handle-nil-images.patch +++ /dev/null @@ -1,28 +0,0 @@ -diff --git a/ement-lib.el b/ement-lib.el -index f0b2738..025a191 100644 ---- a/ement-lib.el -+++ b/ement-lib.el -@@ -644,14 +644,15 @@ can cause undesirable underlining." - "Return a copy of IMAGE set to MAX-WIDTH and MAX-HEIGHT. - IMAGE should be one as created by, e.g. `create-image'." - ;; It would be nice if the image library had some simple functions to do this sort of thing. -- (let ((new-image (cl-copy-list image))) -- (when (fboundp 'imagemagick-types) -- ;; Only do this when ImageMagick is supported. -- ;; FIXME: When requiring Emacs 27+, remove this (I guess?). -- (setf (image-property new-image :type) 'imagemagick)) -- (setf (image-property new-image :max-width) max-width -- (image-property new-image :max-height) max-height) -- new-image)) -+ (when image -+ (let ((new-image (cl-copy-list image))) -+ (when (fboundp 'imagemagick-types) -+ ;; Only do this when ImageMagick is supported. -+ ;; FIXME: When requiring Emacs 27+, remove this (I guess?). -+ (setf (image-property new-image :type) 'imagemagick)) -+ (setf (image-property new-image :max-width) max-width -+ (image-property new-image :max-height) max-height) -+ new-image))) - - (defun ement--room-alias (room) - "Return latest m.room.canonical_alias event in ROOM." diff --git a/pkgs/applications/graphics/gnome-decoder/default.nix b/pkgs/applications/graphics/gnome-decoder/default.nix index 47cd856c79ba3..f957a8c291e89 100644 --- a/pkgs/applications/graphics/gnome-decoder/default.nix +++ b/pkgs/applications/graphics/gnome-decoder/default.nix @@ -11,6 +11,7 @@ , libadwaita , zbar , sqlite +, openssl , pipewire , gstreamer , gst-plugins-base @@ -22,20 +23,20 @@ clangStdenv.mkDerivation rec { pname = "gnome-decoder"; - version = "0.3.1"; + version = "0.3.3"; src = fetchFromGitLab { domain = "gitlab.gnome.org"; owner = "World"; repo = "decoder"; rev = version; - hash = "sha256-WJIOaYSesvLmOzF1Q6o6aLr4KJanXVaNa+r+2LlpKHQ="; + hash = "sha256-eMyPN3UxptqavY9tEATW2AP+kpoWaLwUKCwhNQrarVc="; }; cargoDeps = rustPlatform.fetchCargoTarball { inherit src; name = "${pname}-${version}"; - hash = "sha256-RMHVrv/0q42qFUXyd5BSymzx+BxiyqTX0Jzmxnlhyr4="; + hash = "sha256-3j1hoFffQzWBy4IKtmoMkLBJmNbntpyn0sjv1K0MmDo="; }; nativeBuildInputs = [ @@ -57,6 +58,7 @@ clangStdenv.mkDerivation rec { libadwaita zbar sqlite + openssl pipewire gstreamer gst-plugins-base @@ -65,12 +67,6 @@ clangStdenv.mkDerivation rec { LIBCLANG_PATH = "${libclang.lib}/lib"; - # FIXME: workaround for Pipewire 0.3.64 deprecated API change, remove when fixed upstream - # https://gitlab.freedesktop.org/pipewire/pipewire-rs/-/issues/55 - preBuild = '' - export BINDGEN_EXTRA_CLANG_ARGS="$BINDGEN_EXTRA_CLANG_ARGS -DPW_ENABLE_DEPRECATED" - ''; - meta = with lib; { description = "Scan and Generate QR Codes"; homepage = "https://gitlab.gnome.org/World/decoder"; @@ -78,6 +74,5 @@ clangStdenv.mkDerivation rec { platforms = platforms.linux; mainProgram = "decoder"; maintainers = with maintainers; [ zendo ]; - broken = true; }; } diff --git a/pkgs/applications/graphics/gscreenshot/0001-Changing-paths-to-be-nix-compatible.patch b/pkgs/applications/graphics/gscreenshot/0001-Changing-paths-to-be-nix-compatible.patch new file mode 100644 index 0000000000000..187d4a0154ba2 --- /dev/null +++ b/pkgs/applications/graphics/gscreenshot/0001-Changing-paths-to-be-nix-compatible.patch @@ -0,0 +1,25 @@ +From a4822ee9e894f5f5b3110f41f65a698dd845a41d Mon Sep 17 00:00:00 2001 +From: Richard Davis +Date: Fri, 24 Mar 2023 11:45:23 -0400 +Subject: [PATCH] Changing paths to be nix-compatible. + +--- + dist/desktop/gscreenshot.desktop | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/dist/desktop/gscreenshot.desktop b/dist/desktop/gscreenshot.desktop +index a5d2bcd..9d289e2 100644 +--- a/dist/desktop/gscreenshot.desktop ++++ b/dist/desktop/gscreenshot.desktop +@@ -2,7 +2,7 @@ + Type=Application + Name=gscreenshot + Comment=A simple screenshot utility +-TryExec=/usr/bin/gscreenshot ++TryExec=gscreenshot + Exec=gscreenshot + Icon=gscreenshot + Categories=Graphics; +-- +2.39.2 + diff --git a/pkgs/applications/graphics/gscreenshot/default.nix b/pkgs/applications/graphics/gscreenshot/default.nix new file mode 100644 index 0000000000000..0847bc87cfd33 --- /dev/null +++ b/pkgs/applications/graphics/gscreenshot/default.nix @@ -0,0 +1,90 @@ +{ lib +, fetchFromGitHub +, python3Packages +, gettext +, gobject-introspection +, gtk3 +, wrapGAppsHook +, xdg-utils +, scrot +, slop +, xclip +, grim +, slurp +, wl-clipboard +, waylandSupport ? true +, x11Support ? true +}: + +python3Packages.buildPythonApplication rec { + pname = "gscreenshot"; + version = "3.4.0"; + + src = fetchFromGitHub { + owner = "thenaterhood"; + repo = "${pname}"; + rev = "v${version}"; + sha256 = "YuISiTUReX9IQpckIgbt03CY7klnog/IeOtfBoQ1DZM="; + }; + + # needed for wrapGAppsHook to function + strictDeps = false; + # tests require a display and fail + doCheck = false; + + nativeBuildInputs = [ wrapGAppsHook ]; + propagatedBuildInputs = [ + gettext + gobject-introspection + gtk3 + xdg-utils + ] ++ lib.optionals waylandSupport [ + # wayland deps + grim + slurp + wl-clipboard + ] ++ lib.optionals x11Support [ + # X11 deps + scrot + slop + xclip + python3Packages.xlib + ] ++ (with python3Packages; [ + pillow + pygobject3 + setuptools + ]); + + patches = [ ./0001-Changing-paths-to-be-nix-compatible.patch ]; + + meta = { + description = "A screenshot frontend (CLI and GUI) for a variety of screenshot backends"; + + longDescription = '' + gscreenshot provides a common frontend and expanded functionality to a + number of X11 and Wayland screenshot and region selection utilties. + + In a nutshell, gscreenshot supports the following: + + - Capturing a full-screen screenshot + - Capturing a region of the screen interactively + - Capturing a window interactively + - Capturing the cursor + - Capturing the cursor, using an alternate cursor glyph + - Capturing a screenshot with a delay + - Showing a notification when a screenshot is taken + - Capturing a screenshot from the command line or a custom script + - Capturing a screenshot using a GUI + - Saving to a variety of image formats including 'bmp', 'eps', 'gif', 'jpeg', 'pcx', 'pdf', 'ppm', 'tiff', 'png', and 'webp'. + - Copying a screenshot to the system clipboard + - Opening a screenshot in the configured application after capture + + Other than region selection, gscreenshot's CLI is non-interactive and is suitable for use in scripts. + ''; + + homepage = "https://github.com/thenaterhood/gscreenshot"; + license = lib.licenses.gpl2Only; + platforms = lib.platforms.linux; + maintainers = [ lib.maintainers.davisrichard437 ]; + }; +} diff --git a/pkgs/applications/misc/notable/default.nix b/pkgs/applications/misc/notable/default.nix index 9e701cdb33f6b..e51e49fd89319 100644 --- a/pkgs/applications/misc/notable/default.nix +++ b/pkgs/applications/misc/notable/default.nix @@ -1,4 +1,4 @@ -{ appimageTools, fetchurl, lib }: +{ appimageTools, makeWrapper, fetchurl, lib }: let pname = "notable"; @@ -16,10 +16,11 @@ let inherit name src; }; + nativeBuildInputs = [ makeWrapper ]; in appimageTools.wrapType2 rec { - inherit name src; + inherit pname version src; profile = '' export LC_ALL=C.UTF-8 @@ -34,6 +35,9 @@ appimageTools.wrapType2 rec { $out/share/icons/hicolor/1024x1024/apps/notable.png substituteInPlace $out/share/applications/notable.desktop \ --replace 'Exec=AppRun' 'Exec=${pname}' + source "${makeWrapper}/nix-support/setup-hook" + wrapProgram "$out/bin/${pname}" \ + --add-flags "--disable-seccomp-filter-sandbox" ''; meta = with lib; { diff --git a/pkgs/applications/networking/cluster/kubernetes/default.nix b/pkgs/applications/networking/cluster/kubernetes/default.nix index da77a82bd8454..dd71b53584fc1 100644 --- a/pkgs/applications/networking/cluster/kubernetes/default.nix +++ b/pkgs/applications/networking/cluster/kubernetes/default.nix @@ -20,13 +20,13 @@ buildGoModule rec { pname = "kubernetes"; - version = "1.26.3"; + version = "1.27.0"; src = fetchFromGitHub { owner = "kubernetes"; repo = "kubernetes"; rev = "v${version}"; - hash = "sha256-dJMfnd82JIPxyVisr5o9s/bC3ZDiolF841pmV4c9LN8="; + hash = "sha256-9xRsC6QghmoH/+K6Gs8k4BFHQ8ltCtG8TZpAJGRC2e4="; }; vendorHash = null; diff --git a/pkgs/applications/networking/cluster/terraform/default.nix b/pkgs/applications/networking/cluster/terraform/default.nix index 0182a4ce50de4..a3d906cdf445e 100644 --- a/pkgs/applications/networking/cluster/terraform/default.nix +++ b/pkgs/applications/networking/cluster/terraform/default.nix @@ -166,8 +166,8 @@ rec { mkTerraform = attrs: pluggable (generic attrs); terraform_1 = mkTerraform { - version = "1.4.4"; - hash = "sha256-Fg9NDV063gWi9Na144jjkK7E8ysE2GR4IYT6qjTgnqw="; + version = "1.4.5"; + hash = "sha256-mnJ9d3UHAZxmz0i7PH0JF5gA3m3nJxM2NyAn0J0L6u8="; vendorHash = "sha256-3ZQcWatJlQ6NVoPL/7cKQO6+YCSM3Ld77iLEQK3jBDE="; patches = [ ./provider-path-0_15.patch ]; passthru = { diff --git a/pkgs/applications/networking/instant-messengers/teams-for-linux/default.nix b/pkgs/applications/networking/instant-messengers/teams-for-linux/default.nix index 705f1ffe66b03..2ea2de235bb2a 100644 --- a/pkgs/applications/networking/instant-messengers/teams-for-linux/default.nix +++ b/pkgs/applications/networking/instant-messengers/teams-for-linux/default.nix @@ -16,13 +16,13 @@ stdenv.mkDerivation rec { pname = "teams-for-linux"; - version = "1.0.53"; + version = "1.0.59"; src = fetchFromGitHub { owner = "IsmaelMartinez"; repo = pname; rev = "v${version}"; - sha256 = "sha256-zigcOshtRQuQxJBXPWVmTjj5+4AorR5WW8lHVInUKFg="; + sha256 = "sha256-82uRZEktKHMQhozG5Zpa2DFu1VZOEDBWpsbfgMzoXY8="; }; offlineCache = fetchYarnDeps { @@ -89,6 +89,8 @@ stdenv.mkDerivation rec { categories = [ "Network" "InstantMessaging" "Chat" ]; })]; + passthru.updateScript = ./update.sh; + meta = with lib; { description = "Unofficial Microsoft Teams client for Linux"; homepage = "https://github.com/IsmaelMartinez/teams-for-linux"; diff --git a/pkgs/applications/networking/instant-messengers/teams-for-linux/update.sh b/pkgs/applications/networking/instant-messengers/teams-for-linux/update.sh new file mode 100755 index 0000000000000..650edf188611f --- /dev/null +++ b/pkgs/applications/networking/instant-messengers/teams-for-linux/update.sh @@ -0,0 +1,50 @@ +#!/usr/bin/env nix-shell +#!nix-shell -i bash -p nix jq common-updater-scripts + +set -euo pipefail + +nixpkgs="$(git rev-parse --show-toplevel || (printf 'Could not find root of nixpkgs repo\nAre we running from within the nixpkgs git repo?\n' >&2; exit 1))" + +stripwhitespace() { + sed -e 's/^[[:space:]]*//' -e 's/[[:space:]]*$//' +} + +nixeval() { + nix --extra-experimental-features nix-command eval --json --impure -f "$nixpkgs" "$1" | jq -r . +} + +vendorhash() { + (nix --extra-experimental-features nix-command build --impure --argstr nixpkgs "$nixpkgs" --argstr attr "$1" --expr '{ nixpkgs, attr }: let pkgs = import nixpkgs {}; in with pkgs.lib; (getAttrFromPath (splitString "." attr) pkgs).overrideAttrs (attrs: { outputHash = fakeHash; })' --no-link 2>&1 >/dev/null | tail -n3 | grep -F got: | cut -d: -f2- | stripwhitespace) 2>/dev/null || true +} + +findpath() { + path="$(nix --extra-experimental-features nix-command eval --json --impure -f "$nixpkgs" "$1.meta.position" | jq -r . | cut -d: -f1)" + outpath="$(nix --extra-experimental-features nix-command eval --json --impure --expr "builtins.fetchGit \"$nixpkgs\"")" + + if [ -n "$outpath" ]; then + path="${path/$(echo "$outpath" | jq -r .)/$nixpkgs}" + fi + + echo "$path" +} + +attr="${UPDATE_NIX_ATTR_PATH:-teams-for-linux}" +version="$(cd "$nixpkgs" && list-git-tags --pname="$(nixeval "$attr".pname)" --attr-path="$attr" | grep '^v' | sed -e 's|^v||' | sort -V | tail -n1)" + +pkgpath="$(findpath "$attr")" + +updated="$(cd "$nixpkgs" && update-source-version "$attr" "$version" --file="$pkgpath" --print-changes | jq -r length)" + +if [ "$updated" -eq 0 ]; then + echo 'update.sh: Package version not updated, nothing to do.' + exit 0 +fi + +curhash="$(nixeval "$attr.offlineCache.outputHash")" +newhash="$(vendorhash "$attr.offlineCache")" + +if [ -n "$newhash" ] && [ "$curhash" != "$newhash" ]; then + sed -i -e "s|\"$curhash\"|\"$newhash\"|" "$pkgpath" +else + echo 'update.sh: New vendorHash same as old vendorHash, nothing to do.' +fi diff --git a/pkgs/applications/networking/remote/anydesk/default.nix b/pkgs/applications/networking/remote/anydesk/default.nix index 7d7009e02431f..f9668a9eeaef1 100644 --- a/pkgs/applications/networking/remote/anydesk/default.nix +++ b/pkgs/applications/networking/remote/anydesk/default.nix @@ -8,7 +8,7 @@ let desktopItem = makeDesktopItem { name = "AnyDesk"; - exec = "@out@/bin/anydesk"; + exec = "@out@/bin/anydesk %u"; icon = "anydesk"; desktopName = "AnyDesk"; genericName = description; @@ -18,14 +18,14 @@ let in stdenv.mkDerivation rec { pname = "anydesk"; - version = "6.2.0"; + version = "6.2.1"; src = fetchurl { urls = [ "https://download.anydesk.com/linux/${pname}-${version}-amd64.tar.gz" "https://download.anydesk.com/linux/generic-linux/${pname}-${version}-amd64.tar.gz" ]; - sha256 = "k85nQH2FWyEXDgB+Pd4yStfNCjkiIGE2vA/YTXLaK4o="; + hash = "sha256-lqfe0hROza/zgcNOSe7jJ1yqqsAIR+kav153g3BsmJw="; }; passthru = { @@ -86,6 +86,6 @@ in stdenv.mkDerivation rec { sourceProvenance = with sourceTypes; [ binaryNativeCode ]; license = licenses.unfree; platforms = [ "x86_64-linux" ]; - maintainers = with maintainers; [ shyim ]; + maintainers = with maintainers; [ shyim cheriimoya ]; }; } diff --git a/pkgs/applications/science/biology/samtools/default.nix b/pkgs/applications/science/biology/samtools/default.nix index c72dd1b19077d..5e18d5ead58a5 100644 --- a/pkgs/applications/science/biology/samtools/default.nix +++ b/pkgs/applications/science/biology/samtools/default.nix @@ -2,22 +2,13 @@ stdenv.mkDerivation rec { pname = "samtools"; - version = "1.13"; + version = "1.17"; src = fetchurl { url = "https://github.com/samtools/samtools/releases/download/${version}/${pname}-${version}.tar.bz2"; - sha256 = "sha256-YWyi4FHMgAmh6cAc/Yx8r4twkW3f9m87dpFAeUZfjGA="; + sha256 = "sha256-Ot85C2KCGf1kCPFGAqTEqpDmPhizldrXIqtRlDiipyk"; }; - patches = [ - # Pull upstream patch for ncurses-6.3 support - (fetchpatch { - name = "ncurses-6.3.patch"; - url = "https://github.com/samtools/samtools/commit/396ef20eb0854d6b223c3223b60bb7efe42301f7.patch"; - sha256 = "sha256-p0l9ymXK9nqL2w8EytbW+qeaI7dD86IQgIVxacBj838="; - }) - ]; - # tests require `bgzip` from the htslib package nativeCheckInputs = [ htslib ]; diff --git a/pkgs/build-support/rust/build-rust-crate/default.nix b/pkgs/build-support/rust/build-rust-crate/default.nix index c4d1ef7b209e5..17ce3f75fb1bb 100644 --- a/pkgs/build-support/rust/build-rust-crate/default.nix +++ b/pkgs/build-support/rust/build-rust-crate/default.nix @@ -352,6 +352,7 @@ crate_: lib.makeOverridable metadata hasCrateBin crateBin verbose colors extraRustcOpts buildTests codegenUnits; }; + dontStrip = !release; installPhase = installCrate crateName metadata buildTests; # depending on the test setting we are either producing something with bins diff --git a/pkgs/desktops/plasma-5/plasma-vault/0004-gocryptfs-path.patch b/pkgs/desktops/plasma-5/plasma-vault/0004-gocryptfs-path.patch new file mode 100644 index 0000000000000..8790f877ff07e --- /dev/null +++ b/pkgs/desktops/plasma-5/plasma-vault/0004-gocryptfs-path.patch @@ -0,0 +1,13 @@ +diff --git a/kded/engine/backends/gocryptfs/gocryptfsbackend.cpp b/kded/engine/backends/gocryptfs/gocryptfsbackend.cpp +index 2d6df94..3e8ec9a 100644 +--- a/kded/engine/backends/gocryptfs/gocryptfsbackend.cpp ++++ b/kded/engine/backends/gocryptfs/gocryptfsbackend.cpp +@@ -202,7 +202,7 @@ QProcess *GocryptfsBackend::gocryptfs(const QStringList &arguments) const + auto config = KSharedConfig::openConfig(PLASMAVAULT_CONFIG_FILE); + KConfigGroup backendConfig(config, "GocryptfsBackend"); + +- return process("gocryptfs", arguments + backendConfig.readEntry("extraMountOptions", QStringList{}), {}); ++ return process(NIXPKGS_GOCRYPTFS, arguments + backendConfig.readEntry("extraMountOptions", QStringList{}), {}); + } + + QString GocryptfsBackend::getConfigFilePath(const Device &device) const diff --git a/pkgs/desktops/plasma-5/plasma-vault/default.nix b/pkgs/desktops/plasma-5/plasma-vault/default.nix index ba1def5304762..3bc432b0d5095 100644 --- a/pkgs/desktops/plasma-5/plasma-vault/default.nix +++ b/pkgs/desktops/plasma-5/plasma-vault/default.nix @@ -9,6 +9,7 @@ , encfs , cryfs , fuse +, gocryptfs }: mkDerivation { @@ -19,6 +20,7 @@ mkDerivation { ./0001-encfs-path.patch ./0002-cryfs-path.patch ./0003-fusermount-path.patch + ./0004-gocryptfs-path.patch ]; buildInputs = [ @@ -32,10 +34,9 @@ mkDerivation { CXXFLAGS = [ ''-DNIXPKGS_ENCFS=\"${lib.getBin encfs}/bin/encfs\"'' ''-DNIXPKGS_ENCFSCTL=\"${lib.getBin encfs}/bin/encfsctl\"'' - ''-DNIXPKGS_CRYFS=\"${lib.getBin cryfs}/bin/cryfs\"'' - ''-DNIXPKGS_FUSERMOUNT=\"${lib.getBin fuse}/bin/fusermount\"'' + ''-DNIXPKGS_GOCRYPTFS=\"${lib.getBin gocryptfs}/bin/gocryptfs\"'' ]; } diff --git a/pkgs/development/libraries/luabind/0.9.1_boost_1.57_fix.patch b/pkgs/development/libraries/luabind/0.9.1_boost_1.57_fix.patch deleted file mode 100644 index 7ac495777b546..0000000000000 --- a/pkgs/development/libraries/luabind/0.9.1_boost_1.57_fix.patch +++ /dev/null @@ -1,23 +0,0 @@ -diff --git a/luabind/object.hpp b/luabind/object.hpp -index f7b7ca5..1c18e04 100644 ---- a/luabind/object.hpp -+++ b/luabind/object.hpp -@@ -536,6 +536,8 @@ namespace detail - handle m_key; - }; - -+#if BOOST_VERSION < 105700 -+ - // Needed because of some strange ADL issues. - - #define LUABIND_OPERATOR_ADL_WKND(op) \ -@@ -557,7 +559,8 @@ namespace detail - LUABIND_OPERATOR_ADL_WKND(!=) - - #undef LUABIND_OPERATOR_ADL_WKND -- -+ -+#endif // BOOST_VERSION < 105700 - } // namespace detail - - namespace adl diff --git a/pkgs/development/libraries/luabind/0.9.1_discover_luajit.patch b/pkgs/development/libraries/luabind/0.9.1_discover_luajit.patch deleted file mode 100644 index 6e5fe6aa6f82d..0000000000000 --- a/pkgs/development/libraries/luabind/0.9.1_discover_luajit.patch +++ /dev/null @@ -1,22 +0,0 @@ -diff --git a/Jamroot b/Jamroot -index 94494bf..83dfcbb 100755 ---- a/Jamroot -+++ b/Jamroot -@@ -64,7 +64,7 @@ else if [ os.name ] in LINUX MACOSX FREEBSD - $(LUA_PATH) $(HOME)/Library/Frameworks /Library/Frameworks /usr /usr/local /opt/local /opt ; - - local possible-suffixes = -- include/lua5.1 include/lua51 include/lua include ; -+ include/lua5.1 include/lua51 include/lua include include/luajit-2.0 ; - - local includes = [ GLOB $(possible-prefixes)/$(possible-suffixes) : lua.h ] ; - -@@ -83,7 +83,7 @@ else if [ os.name ] in LINUX MACOSX FREEBSD - - local lib = $(prefix)/lib ; - -- local names = liblua5.1 liblua51 liblua ; -+ local names = liblua5.1 liblua51 liblua libluajit-5.1 ; - local extensions = .a .so ; - - library = [ GLOB $(lib)/lua51 $(lib)/lua5.1 $(lib)/lua $(lib) : diff --git a/pkgs/development/libraries/luabind/0.9.1_modern_boost_fix.patch b/pkgs/development/libraries/luabind/0.9.1_modern_boost_fix.patch deleted file mode 100644 index 92e32828a03c6..0000000000000 --- a/pkgs/development/libraries/luabind/0.9.1_modern_boost_fix.patch +++ /dev/null @@ -1,59 +0,0 @@ -diff --git luabind-0.9.1/luabind/detail/call_function.hpp luabind-0.9.1-fixed/luabind/detail/call_function.hpp -index 1b45ec1..8f5afff 100644 ---- luabind-0.9.1/luabind/detail/call_function.hpp -+++ luabind-0.9.1-fixed/luabind/detail/call_function.hpp -@@ -323,7 +323,8 @@ namespace luabind - - #endif // LUABIND_CALL_FUNCTION_HPP_INCLUDED - --#elif BOOST_PP_ITERATION_FLAGS() == 1 -+#else -+#if BOOST_PP_ITERATION_FLAGS() == 1 - - #define LUABIND_TUPLE_PARAMS(z, n, data) const A##n * - #define LUABIND_OPERATOR_PARAMS(z, n, data) const A##n & a##n -@@ -440,4 +441,5 @@ namespace luabind - - - #endif -+#endif - -diff --git luabind-0.9.1/luabind/detail/call_member.hpp luabind-0.9.1-fixed/luabind/detail/call_member.hpp -index de8d563..e63555b 100644 ---- luabind-0.9.1/luabind/detail/call_member.hpp -+++ luabind-0.9.1-fixed/luabind/detail/call_member.hpp -@@ -316,7 +316,8 @@ namespace luabind - - #endif // LUABIND_CALL_MEMBER_HPP_INCLUDED - --#elif BOOST_PP_ITERATION_FLAGS() == 1 -+#else -+#if BOOST_PP_ITERATION_FLAGS() == 1 - - #define LUABIND_TUPLE_PARAMS(z, n, data) const A##n * - #define LUABIND_OPERATOR_PARAMS(z, n, data) const A##n & a##n -@@ -360,4 +361,5 @@ namespace luabind - #undef LUABIND_TUPLE_PARAMS - - #endif -+#endif - -diff --git luabind-0.9.1/luabind/wrapper_base.hpp luabind-0.9.1-fixed/luabind/wrapper_base.hpp -index d54c668..0f88cc5 100755 ---- luabind-0.9.1/luabind/wrapper_base.hpp -+++ luabind-0.9.1-fixed/luabind/wrapper_base.hpp -@@ -89,7 +89,8 @@ namespace luabind - - #endif // LUABIND_WRAPPER_BASE_HPP_INCLUDED - --#elif BOOST_PP_ITERATION_FLAGS() == 1 -+#else -+#if BOOST_PP_ITERATION_FLAGS() == 1 - - #define LUABIND_TUPLE_PARAMS(z, n, data) const A##n * - #define LUABIND_OPERATOR_PARAMS(z, n, data) const A##n & a##n -@@ -188,3 +189,4 @@ namespace luabind - #undef N - - #endif -+#endif diff --git a/pkgs/development/libraries/luabind/default.nix b/pkgs/development/libraries/luabind/default.nix index b36e6f34c8262..069e13ddde117 100644 --- a/pkgs/development/libraries/luabind/default.nix +++ b/pkgs/development/libraries/luabind/default.nix @@ -1,26 +1,22 @@ -{ lib, stdenv, fetchFromGitHub, boost-build, lua, boost }: +{ lib, stdenv, fetchFromGitHub, lua, boost, cmake }: stdenv.mkDerivation rec { pname = "luabind"; version = "0.9.1"; src = fetchFromGitHub { - owner = "luabind"; + owner = "Oberon00"; repo = "luabind"; - rev = "v${version}"; - sha256 = "sha256-sK1ca2Oj9yXdmxyXeDO3k8YZ1g+HxIXLhvdTWdPDdag="; + rev = "49814f6b47ed99e273edc5198a6ebd7fa19e813a"; + sha256 = "sha256-JcOsoQHRvdzF2rsZBW6egOwIy7+7C4wy0LiYmbV590Q"; }; - patches = [ ./0.9.1_modern_boost_fix.patch ./0.9.1_boost_1.57_fix.patch ./0.9.1_discover_luajit.patch ]; + nativeBuildInputs = [ cmake ]; - buildInputs = [ boost-build lua boost ]; + buildInputs = [ boost ]; propagatedBuildInputs = [ lua ]; - buildPhase = "LUA_PATH=${lua} bjam release"; - - installPhase = "LUA_PATH=${lua} bjam --prefix=$out release install"; - passthru = { inherit lua; }; @@ -29,6 +25,6 @@ stdenv.mkDerivation rec { homepage = "https://github.com/luabind/luabind"; description = "A library that helps you create bindings between C++ and Lua"; license = lib.licenses.mit; - platforms = lib.platforms.linux; + platforms = lib.platforms.unix; }; } diff --git a/pkgs/development/libraries/qt-5/5.15/default.nix b/pkgs/development/libraries/qt-5/5.15/default.nix index 46a60f5403f48..3b2979d3abcea 100644 --- a/pkgs/development/libraries/qt-5/5.15/default.nix +++ b/pkgs/development/libraries/qt-5/5.15/default.nix @@ -185,7 +185,7 @@ let inherit (darwin.apple_sdk_11_0.libs) sandbox; inherit (darwin.apple_sdk_11_0.frameworks) ApplicationServices AVFoundation Foundation ForceFeedback GameController AppKit ImageCaptureCore CoreBluetooth IOBluetooth CoreWLAN Quartz Cocoa LocalAuthentication - MediaPlayer MediaAccessibility SecurityInterface Vision CoreML; + MediaPlayer MediaAccessibility SecurityInterface Vision CoreML OpenDirectory Accelerate; libobjc = darwin.apple_sdk_11_0.objc4; }; qtwebglplugin = callPackage ../modules/qtwebglplugin.nix {}; diff --git a/pkgs/development/libraries/qt-5/modules/qtwebengine.nix b/pkgs/development/libraries/qt-5/modules/qtwebengine.nix index 60899e50535fa..d8d394444028e 100644 --- a/pkgs/development/libraries/qt-5/modules/qtwebengine.nix +++ b/pkgs/development/libraries/qt-5/modules/qtwebengine.nix @@ -17,7 +17,7 @@ , cctools, libobjc, libpm, libunwind, sandbox, xnu , ApplicationServices, AVFoundation, Foundation, ForceFeedback, GameController, AppKit , ImageCaptureCore, CoreBluetooth, IOBluetooth, CoreWLAN, Quartz, Cocoa, LocalAuthentication -, MediaPlayer, MediaAccessibility, SecurityInterface, Vision, CoreML +, MediaPlayer, MediaAccessibility, SecurityInterface, Vision, CoreML, OpenDirectory, Accelerate , cups, openbsm, runCommand, xcbuild, writeScriptBin , ffmpeg_4 ? null , lib, stdenv, fetchpatch @@ -186,6 +186,8 @@ qtModule { SecurityInterface Vision CoreML + OpenDirectory + Accelerate openbsm libunwind diff --git a/pkgs/development/libraries/science/biology/htslib/default.nix b/pkgs/development/libraries/science/biology/htslib/default.nix index 219c06ce57ad0..a3b35d55c9e8a 100644 --- a/pkgs/development/libraries/science/biology/htslib/default.nix +++ b/pkgs/development/libraries/science/biology/htslib/default.nix @@ -2,11 +2,11 @@ stdenv.mkDerivation rec { pname = "htslib"; - version = "1.16"; + version = "1.17"; src = fetchurl { url = "https://github.com/samtools/htslib/releases/download/${version}/${pname}-${version}.tar.bz2"; - sha256 = "sha256-YGt8ev9zc0zwM+zRVvQFKfpXkvVFJJUqKJOMoIkNeSQ="; + sha256 = "sha256-djd5KIxA8HZG7HrZi5bDeMc5Fx0WKtmDmIaHg7chg58"; }; # perl is only used during the check phase. diff --git a/pkgs/development/python-modules/django-allauth/default.nix b/pkgs/development/python-modules/django-allauth/default.nix index 0cc201169d80c..439c4c2cb564f 100644 --- a/pkgs/development/python-modules/django-allauth/default.nix +++ b/pkgs/development/python-modules/django-allauth/default.nix @@ -11,7 +11,7 @@ buildPythonPackage rec { pname = "django-allauth"; - version = "0.51.0"; + version = "0.54.0"; format = "setuptools"; disabled = pythonOlder "3.7"; @@ -20,7 +20,7 @@ buildPythonPackage rec { owner = "pennersr"; repo = pname; rev = version; - hash = "sha256-o8EoayMMwxoJTrUA3Jo1Dfu1XFgC+Mcpa8yMwXlKAKY="; + hash = "sha256-0yJsHJhYeiCHQg/QzFD/metb97rcUJ+LYlsl7fGYmuM="; }; postPatch = '' @@ -52,6 +52,6 @@ buildPythonPackage rec { description = "Integrated set of Django applications addressing authentication, registration, account management as well as 3rd party (social) account authentication"; homepage = "https://www.intenct.nl/projects/django-allauth"; license = licenses.mit; - maintainers = with maintainers; [ SuperSandro2000 ]; + maintainers = with maintainers; [ derdennisop ]; }; } diff --git a/pkgs/development/python-modules/espeak-phonemizer/cdll.patch b/pkgs/development/python-modules/espeak-phonemizer/cdll.patch index 3ce5df122d50e..48207c3f95d05 100644 --- a/pkgs/development/python-modules/espeak-phonemizer/cdll.patch +++ b/pkgs/development/python-modules/espeak-phonemizer/cdll.patch @@ -1,15 +1,11 @@ diff --git a/espeak_phonemizer/__init__.py b/espeak_phonemizer/__init__.py -index a09472e..730a7f9 100644 +index 44cd943..adeaeba 100644 --- a/espeak_phonemizer/__init__.py +++ b/espeak_phonemizer/__init__.py -@@ -163,14 +163,10 @@ class Phonemizer: +@@ -150,11 +150,7 @@ class Phonemizer: # Already initialized return -- self.libc = ctypes.cdll.LoadLibrary("libc.so.6") -+ self.libc = ctypes.cdll.LoadLibrary("@libc@") - self.libc.open_memstream.restype = ctypes.POINTER(ctypes.c_char) - - try: - self.lib_espeak = ctypes.cdll.LoadLibrary("libespeak-ng.so") - except OSError: diff --git a/pkgs/development/python-modules/espeak-phonemizer/default.nix b/pkgs/development/python-modules/espeak-phonemizer/default.nix index d8c5ba1bb6445..2398f421e0da3 100644 --- a/pkgs/development/python-modules/espeak-phonemizer/default.nix +++ b/pkgs/development/python-modules/espeak-phonemizer/default.nix @@ -2,27 +2,25 @@ , buildPythonPackage , fetchFromGitHub , substituteAll -, glibc , espeak-ng , pytestCheckHook }: buildPythonPackage rec { pname = "espeak-phonemizer"; - version = "1.1.0"; + version = "1.2.0"; format = "setuptools"; src = fetchFromGitHub { owner = "rhasspy"; repo = "espeak-phonemizer"; rev = "refs/tags/v${version}"; - hash = "sha256-qnJtS5iIARdg+umolzLHT3/nLon9syjxfTnMWHOmYPU="; + hash = "sha256-FiajWpxSDRxTiCj8xGHea4e0voqOvaX6oQYB72FkVbw="; }; patches = [ (substituteAll { src = ./cdll.patch; - libc = "${lib.getLib glibc}/lib/libc.so.6"; libespeak_ng = "${lib.getLib espeak-ng}/lib/libespeak-ng.so"; }) ]; diff --git a/pkgs/development/python-modules/pyngrok/default.nix b/pkgs/development/python-modules/pyngrok/default.nix index db4ec105d87c0..4e99c7e62ff8c 100644 --- a/pkgs/development/python-modules/pyngrok/default.nix +++ b/pkgs/development/python-modules/pyngrok/default.nix @@ -6,11 +6,11 @@ buildPythonPackage rec { pname = "pyngrok"; - version = "5.2.1"; + version = "5.2.2"; src = fetchPypi { inherit pname version; - hash = "sha256-dws4Z4LzgkkOGTS5LZn/MU8ZKr70n4PWocezsDhxeT4="; + hash = "sha256-MfpuafEUhFNtEegvihCLmsnHYFBu8kKghfPRp3oqlb8="; }; propagatedBuildInputs = [ diff --git a/pkgs/development/python-modules/pytest-describe/default.nix b/pkgs/development/python-modules/pytest-describe/default.nix index b659445267ca3..a7c389202ee9a 100644 --- a/pkgs/development/python-modules/pytest-describe/default.nix +++ b/pkgs/development/python-modules/pytest-describe/default.nix @@ -6,13 +6,12 @@ , pytest # tests -, py , pytestCheckHook }: let pname = "pytest-describe"; - version = "2.0.1"; + version = "2.1.0"; in buildPythonPackage { inherit pname version; @@ -20,7 +19,7 @@ buildPythonPackage { src = fetchPypi { inherit pname version; - hash = "sha256-5cuqMRafAGA0itXKAZECfl8fQfPyf97vIINl4JxV65o="; + hash = "sha256-BjDJWsSUKrjc2OdmI2+GQ2tJhIltsMBZ/CNP72b+lzI="; }; buildInputs = [ @@ -28,7 +27,6 @@ buildPythonPackage { ]; nativeCheckInputs = [ - py pytestCheckHook ]; diff --git a/pkgs/development/python-modules/torch/default.nix b/pkgs/development/python-modules/torch/default.nix index d9cf4e5760d88..576e6b1bfac9c 100644 --- a/pkgs/development/python-modules/torch/default.nix +++ b/pkgs/development/python-modules/torch/default.nix @@ -182,6 +182,13 @@ in buildPythonPackage rec { substituteInPlace cmake/public/LoadHIP.cmake \ --replace "set(ROCM_PATH \$ENV{ROCM_PATH})" \ "set(ROCM_PATH \$ENV{ROCM_PATH})''\nset(ROCM_VERSION ${lib.concatStrings (lib.intersperse "0" (lib.splitString "." hip.version))})" + '' + # error: no member named 'aligned_alloc' in the global namespace; did you mean simply 'aligned_alloc' + # This lib overrided aligned_alloc hence the error message. Tltr: his function is linkable but not in header. + + lib.optionalString (stdenv.isDarwin && lib.versionOlder stdenv.targetPlatform.darwinSdkVersion "11.0") '' + substituteInPlace third_party/pocketfft/pocketfft_hdronly.h --replace '#if __cplusplus >= 201703L + inline void *aligned_alloc(size_t align, size_t size)' '#if __cplusplus >= 201703L && 0 + inline void *aligned_alloc(size_t align, size_t size)' ''; preConfigure = lib.optionalString cudaSupport '' diff --git a/pkgs/development/tools/sca2d/default.nix b/pkgs/development/tools/sca2d/default.nix new file mode 100644 index 0000000000000..eb28e7acb026c --- /dev/null +++ b/pkgs/development/tools/sca2d/default.nix @@ -0,0 +1,48 @@ +{ lib +, python3 +, fetchFromGitLab +, fetchFromGitHub +}: +let + python = python3.override { + packageOverrides = self: super: { + lark010 = super.lark.overridePythonAttrs (old: rec { + version = "0.10.0"; + + src = fetchFromGitHub { + owner = "lark-parser"; + repo = "lark"; + rev = "refs/tags/${version}"; + sha256 = "sha256-ctdPPKPSD4weidyhyj7RCV89baIhmuxucF3/Ojx1Efo="; + }; + + disabledTestPaths = [ "tests/test_nearley/test_nearley.py" ]; + }); + }; + self = python; + }; +in +python.pkgs.buildPythonApplication rec { + pname = "sca2d"; + version = "0.2.0"; + format = "setuptools"; + + src = fetchFromGitLab { + owner = "bath_open_instrumentation_group"; + repo = "sca2d"; + rev = "v${version}"; + hash = "sha256-P+7g57AH8H7q0hBE2I9w8A+bN5M6MPbc9gA0b889aoQ="; + }; + + propagatedBuildInputs = with python.pkgs; [ lark010 colorama ]; + + pythonImportsCheck = [ "sca2d" ]; + + meta = with lib; { + description = "An experimental static code analyser for OpenSCAD"; + homepage = "https://gitlab.com/bath_open_instrumentation_group/sca2d"; + changelog = "https://gitlab.com/bath_open_instrumentation_group/sca2d/-/blob/${src.rev}/CHANGELOG.md"; + license = licenses.gpl3Only; + maintainers = with maintainers; [ traxys ]; + }; +} diff --git a/pkgs/games/papermc/default.nix b/pkgs/games/papermc/default.nix index 66754073db5cf..930b4462a7bd9 100644 --- a/pkgs/games/papermc/default.nix +++ b/pkgs/games/papermc/default.nix @@ -1,14 +1,16 @@ { lib, stdenv, fetchurl, bash, jre }: -let - mcVersion = "1.19.3"; - buildNum = "375"; - jar = fetchurl { + +stdenv.mkDerivation rec { + pname = "papermc"; + version = "1.19.3.375"; + + jar = let + mcVersion = lib.versions.pad 3 version; + buildNum = builtins.elemAt (lib.versions.splitVersion version) 3; + in fetchurl { url = "https://papermc.io/api/v2/projects/paper/versions/${mcVersion}/builds/${buildNum}/downloads/paper-${mcVersion}-${buildNum}.jar"; sha256 = "sha256-NAl4+mCkO6xQQpIx2pd9tYX2N8VQa+2dmFwyBNbDa10="; }; -in stdenv.mkDerivation { - pname = "papermc"; - version = "${mcVersion}r${buildNum}"; preferLocalBuild = true; diff --git a/pkgs/os-specific/linux/gasket/default.nix b/pkgs/os-specific/linux/gasket/default.nix new file mode 100644 index 0000000000000..1f9d60ad7b606 --- /dev/null +++ b/pkgs/os-specific/linux/gasket/default.nix @@ -0,0 +1,35 @@ +{ stdenv, lib, fetchFromGitHub, kernel }: + +stdenv.mkDerivation rec { + pname = "gasket"; + version = "1.0-18"; + + src = fetchFromGitHub { + owner = "google"; + repo = "gasket-driver"; + rev = "97aeba584efd18983850c36dcf7384b0185284b3"; + sha256 = "pJwrrI7jVKFts4+bl2xmPIAD01VKFta2SRuElerQnTo="; + }; + + makeFlags = [ + "-C" + "${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" + "M=$(PWD)" + ]; + buildFlags = [ "modules" ]; + + installFlags = [ "INSTALL_MOD_PATH=${placeholder "out"}" ]; + installTargets = [ "modules_install" ]; + + sourceRoot = "source/src"; + hardeningDisable = [ "pic" "format" ]; + nativeBuildInputs = kernel.moduleBuildDependencies; + + meta = with lib; { + description = "The Coral Gasket Driver allows usage of the Coral EdgeTPU on Linux systems."; + homepage = "https://github.com/google/gasket-driver"; + license = licenses.gpl2; + maintainers = [ lib.maintainers.kylehendricks ]; + platforms = platforms.linux; + }; +} diff --git a/pkgs/os-specific/linux/kernel/linux-testing.nix b/pkgs/os-specific/linux/kernel/linux-testing.nix index 7cb8108c45176..71a5d81351211 100644 --- a/pkgs/os-specific/linux/kernel/linux-testing.nix +++ b/pkgs/os-specific/linux/kernel/linux-testing.nix @@ -3,7 +3,7 @@ with lib; buildLinux (args // rec { - version = "6.3-rc5"; + version = "6.3-rc6"; extraMeta.branch = lib.versions.majorMinor version; # modDirVersion needs to be x.y.z, will always add .0 @@ -11,7 +11,7 @@ buildLinux (args // rec { src = fetchzip { url = "https://git.kernel.org/torvalds/t/linux-${version}.tar.gz"; - hash = "sha256-HKKDSOK45jT5vUaE3xd7nlxRgy1fw9xXBhqrICy/12Y="; + hash = "sha256-AXgHjWuGt2XQHVS7d/o9IbohfxHp9grtuYp5+EumlH4="; }; # Should the testing kernels ever be built on Hydra? diff --git a/pkgs/servers/matrix-synapse/matrix-appservice-irc/default.nix b/pkgs/servers/matrix-synapse/matrix-appservice-irc/default.nix index 8c6e8a1025ce2..69696cbf91957 100644 --- a/pkgs/servers/matrix-synapse/matrix-appservice-irc/default.nix +++ b/pkgs/servers/matrix-synapse/matrix-appservice-irc/default.nix @@ -9,16 +9,16 @@ buildNpmPackage rec { pname = "matrix-appservice-irc"; - version = "0.37.1"; + version = "0.38.0"; src = fetchFromGitHub { owner = "matrix-org"; repo = "matrix-appservice-irc"; rev = "refs/tags/${version}"; - hash = "sha256-d/CA27A0txnVnSCJeS/qeK90gOu1QjQaFBk+gblEdH8="; + hash = "sha256-rV4B9OQl1Ht26X4e7sqCe1PR5RpzIcjj4OvWG6udJWo="; }; - npmDepsHash = "sha256-s/b/G49HlDbYsSmwRYrm4Bcv/81tHLC8Ac1IMEwGFW8="; + npmDepsHash = "sha256-iZuPr3a1BPtRfkEoxOs4oRL/nCfy3PLx5T9dX49/B0s="; nativeBuildInputs = [ python3 diff --git a/pkgs/servers/osrm-backend/darwin.patch b/pkgs/servers/osrm-backend/darwin.patch new file mode 100644 index 0000000000000..0aa57e4e1b816 --- /dev/null +++ b/pkgs/servers/osrm-backend/darwin.patch @@ -0,0 +1,30 @@ +diff --git a/CMakeLists.txt b/CMakeLists.txt +index e49fac2..25e3302 100644 +--- a/CMakeLists.txt ++++ b/CMakeLists.txt +@@ -34,6 +34,14 @@ option(ENABLE_GLIBC_WORKAROUND "Workaround GLIBC symbol exports" OFF) + + list(APPEND CMAKE_MODULE_PATH "${CMAKE_CURRENT_SOURCE_DIR}/cmake") + ++IF(APPLE) ++ set(CMAKE_THREAD_LIBS_INIT "-lpthread") ++ set(CMAKE_HAVE_THREADS_LIBRARY 1) ++ set(CMAKE_USE_WIN32_THREADS_INIT 0) ++ set(CMAKE_USE_PTHREADS_INIT 1) ++ set(THREADS_PREFER_PTHREAD_FLAG ON) ++ENDIF() ++ + if(ENABLE_MASON) + # versions in use + set(MASON_BOOST_VERSION "1.65.1") +@@ -405,7 +413,8 @@ endif() + if(APPLE) + set(CMAKE_OSX_DEPLOYMENT_TARGET "10.10") + execute_process(COMMAND xcrun --sdk macosx --show-sdk-path OUTPUT_VARIABLE CMAKE_OSX_SYSROOT OUTPUT_STRIP_TRAILING_WHITESPACE) ++ execute_process(COMMAND uname -m OUTPUT_VARIABLE JAMBA_OSX_NATIVE_ARCHITECTURE OUTPUT_STRIP_TRAILING_WHITESPACE) +- set(CMAKE_OSX_ARCHITECTURES "x86_64") ++ set(CMAKE_OSX_ARCHITECTURES "${JAMBA_OSX_NATIVE_ARCHITECTURE}") ++ message(STATUS "Set Architecture to ${JAMBA_OSX_NATIVE_ARCHITECTURE} on OS X") +- message(STATUS "Set Architecture to x64 on OS X") + exec_program(uname ARGS -v OUTPUT_VARIABLE DARWIN_VERSION) + string(REGEX MATCH "[0-9]+" DARWIN_VERSION ${DARWIN_VERSION}) diff --git a/pkgs/servers/osrm-backend/default.nix b/pkgs/servers/osrm-backend/default.nix index 452163ee82cf0..b76db692a7830 100644 --- a/pkgs/servers/osrm-backend/default.nix +++ b/pkgs/servers/osrm-backend/default.nix @@ -15,6 +15,8 @@ stdenv.mkDerivation rec { buildInputs = [ bzip2 libxml2 libzip boost lua luabind tbb expat ]; + patches = [ ./darwin.patch ]; + env.NIX_CFLAGS_COMPILE = toString [ # Needed with GCC 12 "-Wno-error=stringop-overflow" @@ -28,6 +30,6 @@ stdenv.mkDerivation rec { description = "Open Source Routing Machine computes shortest paths in a graph. It was designed to run well with map data from the Openstreetmap Project"; license = lib.licenses.bsd2; maintainers = with lib.maintainers;[ erictapen ]; - platforms = lib.platforms.linux; + platforms = lib.platforms.unix; }; } diff --git a/pkgs/servers/redpanda/default.nix b/pkgs/servers/redpanda/default.nix index ef8335c56ccca..5292cfd715664 100644 --- a/pkgs/servers/redpanda/default.nix +++ b/pkgs/servers/redpanda/default.nix @@ -7,12 +7,12 @@ , stdenv }: let - version = "23.1.3"; + version = "23.1.6"; src = fetchFromGitHub { owner = "redpanda-data"; repo = "redpanda"; rev = "v${version}"; - sha256 = "sha256-tqQl7Elslcdw0hNjayYShj19KYmVskJG0qtaijGTzm0="; + sha256 = "sha256-ZZsZjOuHTwzhfKBd4VPNxfxrcvL6C5Uhv16xA0eUN60="; }; server = callPackage ./server.nix { inherit src version; }; in diff --git a/pkgs/servers/sunshine/default.nix b/pkgs/servers/sunshine/default.nix index 21ffb28a25cab..deb9e738b94b0 100644 --- a/pkgs/servers/sunshine/default.nix +++ b/pkgs/servers/sunshine/default.nix @@ -3,6 +3,7 @@ , callPackage , fetchFromGitHub , fetchurl +, fetchpatch , autoPatchelfHook , makeWrapper , buildNpmPackage @@ -29,6 +30,7 @@ , amf-headers , svt-av1 , vulkan-loader +, libappindicator , cudaSupport ? false , cudaPackages ? {} }: @@ -42,28 +44,35 @@ let in stdenv.mkDerivation rec { pname = "sunshine"; - version = "0.18.4"; + version = "0.19.1"; src = fetchFromGitHub { owner = "LizardByte"; repo = "Sunshine"; rev = "v${version}"; - sha256 = "sha256-nPUWBka/fl1oTB0vTv6qyL7EHh7ptFnxwfV/jYtloTc="; + sha256 = "sha256-fifwctVrSkAcMK8juAirIbIP64H7GKEwC+sUR/U6Q3Y="; fetchSubmodules = true; }; # remove pre-built ffmpeg; use ffmpeg from nixpkgs - patches = [ ./ffmpeg.diff ]; + patches = [ + ./ffmpeg.diff + # fix for X11 not being added to libraries unless prebuilt FFmpeg is used: https://github.com/LizardByte/Sunshine/pull/1166 + (fetchpatch { + url = "https://github.com/LizardByte/Sunshine/commit/a067da6cae72cf36f76acc06fcf1e814032af886.patch"; + sha256 = "sha256-HMxM7luiFBEmFkvQtkdAMMSjAaYPEFX3LL0T/ActUhM="; + }) + ]; # fetch node_modules needed for webui ui = buildNpmPackage { inherit src version; pname = "sunshine-ui"; - npmDepsHash = "sha256-k8Vfi/57AbGxYFPYSNh8bv4KqHnZjk3BDp8SJQHzuR8="; + npmDepsHash = "sha256-sdwvM/Irejo8DgMHJWWCxwOykOK9foqLFFd/tuzrkxI="; dontNpmBuild = true; - # use generated package-lock.json upstream does not provide one + # use generated package-lock.json as upstream does not provide one postPatch = '' cp ${./package-lock.json} ./package-lock.json ''; @@ -94,6 +103,7 @@ stdenv.mkDerivation rec { xorg.libXfixes xorg.libXrandr xorg.libXtst + xorg.libXi openssl libopus boost @@ -110,6 +120,7 @@ stdenv.mkDerivation rec { mesa amf-headers svt-av1 + libappindicator ] ++ lib.optionals cudaSupport [ cudaPackages.cudatoolkit ]; @@ -121,21 +132,18 @@ stdenv.mkDerivation rec { libxcb ]; - CXXFLAGS = [ - "-Wno-format-security" - ]; - CFLAGS = [ - "-Wno-format-security" - ]; - cmakeFlags = [ "-Wno-dev" ]; postPatch = '' - # fix hardcoded libevdev path + # fix hardcoded libevdev and icon path substituteInPlace CMakeLists.txt \ - --replace '/usr/include/libevdev-1.0' '${libevdev}/include/libevdev-1.0' + --replace '/usr/include/libevdev-1.0' '${libevdev}/include/libevdev-1.0' \ + --replace '/usr/share' "$out/share" + + substituteInPlace packaging/linux/sunshine.desktop \ + --replace '@PROJECT_NAME@' 'Sunshine' # add FindFFMPEG to source tree cp ${findFfmpeg} cmake/FindFFMPEG.cmake @@ -153,6 +161,12 @@ stdenv.mkDerivation rec { --set LD_LIBRARY_PATH ${lib.makeLibraryPath [ vulkan-loader ]} ''; + postInstall = '' + install -Dm644 ../packaging/linux/${pname}.desktop $out/share/applications/${pname}.desktop + ''; + + passthru.updateScript = ./updater.sh; + meta = with lib; { description = "Sunshine is a Game stream host for Moonlight."; homepage = "https://github.com/LizardByte/Sunshine"; diff --git a/pkgs/servers/sunshine/package-lock.json b/pkgs/servers/sunshine/package-lock.json index 41f61a5f0abd0..a4678e38f4cfb 100644 --- a/pkgs/servers/sunshine/package-lock.json +++ b/pkgs/servers/sunshine/package-lock.json @@ -1,28 +1,28 @@ { - "name": "Sunshine", - "lockfileVersion": 2, + "name": "sunshine", + "lockfileVersion": 3, "requires": true, "packages": { "": { "dependencies": { - "@fortawesome/fontawesome-free": "6.2.1", + "@fortawesome/fontawesome-free": "6.4.0", "bootstrap": "5.2.3", "vue": "2.6.12" } }, "node_modules/@fortawesome/fontawesome-free": { - "version": "6.2.1", - "resolved": "https://registry.npmjs.org/@fortawesome/fontawesome-free/-/fontawesome-free-6.2.1.tgz", - "integrity": "sha512-viouXhegu/TjkvYQoiRZK3aax69dGXxgEjpvZW81wIJdxm5Fnvp3VVIP4VHKqX4SvFw6qpmkILkD4RJWAdrt7A==", + "version": "6.4.0", + "resolved": "https://registry.npmjs.org/@fortawesome/fontawesome-free/-/fontawesome-free-6.4.0.tgz", + "integrity": "sha512-0NyytTlPJwB/BF5LtRV8rrABDbe3TdTXqNB3PdZ+UUUZAEIrdOJdmABqKjt4AXwIoJNaRVVZEXxpNrqvE1GAYQ==", "hasInstallScript": true, "engines": { "node": ">=6" } }, "node_modules/@popperjs/core": { - "version": "2.11.6", - "resolved": "https://registry.npmjs.org/@popperjs/core/-/core-2.11.6.tgz", - "integrity": "sha512-50/17A98tWUfQ176raKiOGXuYpLyyVMkxxG6oylzL3BPOlA6ADGdK7EYunSa4I064xerltq9TGXs8HmOk5E+vw==", + "version": "2.11.7", + "resolved": "https://registry.npmjs.org/@popperjs/core/-/core-2.11.7.tgz", + "integrity": "sha512-Cr4OjIkipTtcXKjAsm8agyleBuDHvxzeBoa1v543lbv1YaIwQjESsVcmjiWiPEbC1FIeHOG/Op9kdCmAmiS3Kw==", "peer": true, "funding": { "type": "opencollective", @@ -52,29 +52,5 @@ "resolved": "https://registry.npmjs.org/vue/-/vue-2.6.12.tgz", "integrity": "sha512-uhmLFETqPPNyuLLbsKz6ioJ4q7AZHzD8ZVFNATNyICSZouqP2Sz0rotWQC8UNBF6VGSCs5abnKJoStA6JbCbfg==" } - }, - "dependencies": { - "@fortawesome/fontawesome-free": { - "version": "6.2.1", - "resolved": "https://registry.npmjs.org/@fortawesome/fontawesome-free/-/fontawesome-free-6.2.1.tgz", - "integrity": "sha512-viouXhegu/TjkvYQoiRZK3aax69dGXxgEjpvZW81wIJdxm5Fnvp3VVIP4VHKqX4SvFw6qpmkILkD4RJWAdrt7A==" - }, - "@popperjs/core": { - "version": "2.11.6", - "resolved": "https://registry.npmjs.org/@popperjs/core/-/core-2.11.6.tgz", - "integrity": "sha512-50/17A98tWUfQ176raKiOGXuYpLyyVMkxxG6oylzL3BPOlA6ADGdK7EYunSa4I064xerltq9TGXs8HmOk5E+vw==", - "peer": true - }, - "bootstrap": { - "version": "5.2.3", - "resolved": "https://registry.npmjs.org/bootstrap/-/bootstrap-5.2.3.tgz", - "integrity": "sha512-cEKPM+fwb3cT8NzQZYEu4HilJ3anCrWqh3CHAok1p9jXqMPsPTBhU25fBckEJHJ/p+tTxTFTsFQGM+gaHpi3QQ==", - "requires": {} - }, - "vue": { - "version": "2.6.12", - "resolved": "https://registry.npmjs.org/vue/-/vue-2.6.12.tgz", - "integrity": "sha512-uhmLFETqPPNyuLLbsKz6ioJ4q7AZHzD8ZVFNATNyICSZouqP2Sz0rotWQC8UNBF6VGSCs5abnKJoStA6JbCbfg==" - } } } diff --git a/pkgs/servers/sunshine/updater.sh b/pkgs/servers/sunshine/updater.sh new file mode 100755 index 0000000000000..43ae46ab6f2f9 --- /dev/null +++ b/pkgs/servers/sunshine/updater.sh @@ -0,0 +1,23 @@ +#! /usr/bin/env nix-shell +#! nix-shell -i bash -p gnugrep gnused coreutils curl wget jq nix-update prefetch-npm-deps nodejs + +set -euo pipefail +pushd "$(dirname "${BASH_SOURCE[0]}")" + +version=$(curl -s "https://api.github.com/repos/LizardByte/sunshine/tags" | jq -r .[0].name | grep -oP "^v\K.*") +url="https://raw.githubusercontent.com/LizardByte/sunshine/v$version/" + +if [[ "$UPDATE_NIX_OLD_VERSION" == "$version" ]]; then + echo "Already up to date!" + exit 0 +fi + +rm -f package-lock.json package.json +wget "$url/package.json" +npm i --package-lock-only +npm_hash=$(prefetch-npm-deps package-lock.json) +sed -i 's#npmDepsHash = "[^"]*"#npmDepsHash = "'"$npm_hash"'"#' default.nix +rm -f package.json + +popd +nix-update sunshine --version $version diff --git a/pkgs/stdenv/adapters.nix b/pkgs/stdenv/adapters.nix index eaf497f335f58..0c5645e5a487f 100644 --- a/pkgs/stdenv/adapters.nix +++ b/pkgs/stdenv/adapters.nix @@ -176,7 +176,7 @@ rec { stdenv.override (old: { mkDerivationFromStdenv = extendMkDerivationArgs old (args: { dontStrip = true; - env = (args.env or {}) // { NIX_CFLAGS_COMPILE = toString (args.NIX_CFLAGS_COMPILE or "") + " -ggdb -Og"; }; + env = (args.env or {}) // { NIX_CFLAGS_COMPILE = toString (args.env.NIX_CFLAGS_COMPILE or "") + " -ggdb -Og"; }; }); }); @@ -219,7 +219,7 @@ rec { impureUseNativeOptimizations = stdenv: stdenv.override (old: { mkDerivationFromStdenv = extendMkDerivationArgs old (args: { - env = (args.env or {}) // { NIX_CFLAGS_COMPILE = toString (args.NIX_CFLAGS_COMPILE or "") + " -march=native"; }; + env = (args.env or {}) // { NIX_CFLAGS_COMPILE = toString (args.env.NIX_CFLAGS_COMPILE or "") + " -march=native"; }; NIX_ENFORCE_NO_NATIVE = false; @@ -245,7 +245,7 @@ rec { withCFlags = compilerFlags: stdenv: stdenv.override (old: { mkDerivationFromStdenv = extendMkDerivationArgs old (args: { - env = (args.env or {}) // { NIX_CFLAGS_COMPILE = toString (args.NIX_CFLAGS_COMPILE or "") + " ${toString compilerFlags}"; }; + env = (args.env or {}) // { NIX_CFLAGS_COMPILE = toString (args.env.NIX_CFLAGS_COMPILE or "") + " ${toString compilerFlags}"; }; }); }); } diff --git a/pkgs/tools/misc/esphome/default.nix b/pkgs/tools/misc/esphome/default.nix index 97ab9718b885e..783bf2b3f1826 100644 --- a/pkgs/tools/misc/esphome/default.nix +++ b/pkgs/tools/misc/esphome/default.nix @@ -16,14 +16,14 @@ let in python.pkgs.buildPythonApplication rec { pname = "esphome"; - version = "2023.3.1"; + version = "2023.3.2"; format = "setuptools"; src = fetchFromGitHub { owner = pname; repo = pname; rev = "refs/tags/${version}"; - hash = "sha256-h35V6tg6TewqJiZ4T5t6RNNaT2JEzqhbnJgH6xqqqzs="; + hash = "sha256-MfipnmBxCz8R0bNyJDRBP2R8JeOtgIm6Mu6SFPGkDc0="; }; postPatch = '' diff --git a/pkgs/tools/misc/shell_gpt/default.nix b/pkgs/tools/misc/shell_gpt/default.nix index b8b3fbb1af515..9e3000a3cf722 100644 --- a/pkgs/tools/misc/shell_gpt/default.nix +++ b/pkgs/tools/misc/shell_gpt/default.nix @@ -1,14 +1,15 @@ { lib , python3 +, nix-update-script }: python3.pkgs.buildPythonApplication rec { pname = "shell_gpt"; - version = "0.7.3"; + version = "0.8.8"; src = python3.pkgs.fetchPypi { inherit pname version; - sha256 = "sha256-lS8zLtsh8Uz782KJwHqifEQnWQswbCXRVIfXWAmWtvI="; + sha256 = "sha256-KuaSAiXlqWRhFtX4C6vibbUiq43L83pZX+yM9L7Ej68="; }; nativeBuildInputs = with python3.pkgs; [ @@ -27,6 +28,8 @@ python3.pkgs.buildPythonApplication rec { pythonRelaxDeps = [ "requests" "rich" "distro" "typer" ]; + passthru.updateScript = nix-update-script { }; + doCheck = false; meta = with lib; { diff --git a/pkgs/tools/networking/i2p/default.nix b/pkgs/tools/networking/i2p/default.nix index 6cc64a171d53c..e1b73f1b3e691 100644 --- a/pkgs/tools/networking/i2p/default.nix +++ b/pkgs/tools/networking/i2p/default.nix @@ -11,13 +11,17 @@ , java-service-wrapper }: -stdenv.mkDerivation rec { +stdenv.mkDerivation (finalAttrs: { pname = "i2p"; - version = "2.1.0"; + version = "2.2.0"; src = fetchurl { - url = "https://files.i2p-projekt.de/${version}/i2psource_${version}.tar.bz2"; - sha256 = "sha256-gwmMEncgTFVpKEsys37xN2VrJ7/hXvkD7KLafCaSiNE="; + urls = map (mirror: "${mirror}/${finalAttrs.version}/i2psource_${finalAttrs.version}.tar.bz2") [ + "https://download.i2p2.de/releases" + "https://files.i2p-projekt.de" + "https://download.i2p2.no/releases" + ]; + sha256 = "sha256-5LoGpuKTWheZDwV6crjXnkUqJVamzv5QEtXdY0Zv7r8="; }; buildInputs = [ jdk ant gettext which ]; @@ -64,4 +68,4 @@ stdenv.mkDerivation rec { platforms = [ "x86_64-linux" "i686-linux" ]; maintainers = with maintainers; [ joelmo ]; }; -} +}) diff --git a/pkgs/tools/security/feroxbuster/default.nix b/pkgs/tools/security/feroxbuster/default.nix index bc927a522aa75..8667064e153da 100644 --- a/pkgs/tools/security/feroxbuster/default.nix +++ b/pkgs/tools/security/feroxbuster/default.nix @@ -9,13 +9,13 @@ rustPlatform.buildRustPackage rec { pname = "feroxbuster"; - version = "2.9.2"; + version = "2.9.3"; src = fetchFromGitHub { owner = "epi052"; repo = pname; rev = "refs/tags/v${version}"; - hash = "sha256-HSZqqZngXs5ACsk9xzaqBWK5mUxPyGx3qJOtTURXPgg="; + hash = "sha256-Z97CAfGnNTQmJd2zMlvGfk5jW9zHAB/efqYoYgVRfMc="; }; # disable linker overrides on aarch64-linux @@ -23,7 +23,7 @@ rustPlatform.buildRustPackage rec { rm .cargo/config ''; - cargoHash = "sha256-pisMqSgW6uPlBXgTUqJBJya84dRmbOJbEYYezuut6Wo="; + cargoHash = "sha256-siLyPPSTBaZ4vpfzeKVlrqIdFMI5z3hRA8c2lRsBAGM="; OPENSSL_NO_VENDOR = true; diff --git a/pkgs/tools/security/vault/default.nix b/pkgs/tools/security/vault/default.nix index 266ed3f5c8837..42eca27fb5943 100644 --- a/pkgs/tools/security/vault/default.nix +++ b/pkgs/tools/security/vault/default.nix @@ -6,16 +6,16 @@ buildGoModule rec { pname = "vault"; - version = "1.13.0"; + version = "1.13.1"; src = fetchFromGitHub { owner = "hashicorp"; repo = "vault"; rev = "v${version}"; - sha256 = "sha256-F9Ki+3jMkJ+CI2yQmrnqT98xJqSSKQTtYHxQTYdfNbQ="; + sha256 = "sha256-bYZghlQi2p3XnKWH3H2sehds/XSMW8pbzBophNMa5q4="; }; - vendorHash = "sha256-Ny4TTa67x/mwTclZrtPoWU6nHu5q4KafP1s4rvk21Hs="; + vendorHash = "sha256-mNnStWxrSR455zGWkj4dLDFk/kdOXYgk8LKB0wy7K5M="; subPackages = [ "." ]; diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 2ac264a61347c..bda9ad0a47bf2 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -18811,6 +18811,8 @@ with pkgs; semantik = libsForQt5.callPackage ../applications/office/semantik { }; + sca2d = callPackage ../development/tools/sca2d { }; + sconsPackages = dontRecurseIntoAttrs (callPackage ../development/tools/build-managers/scons { }); scons = sconsPackages.scons_latest; @@ -26360,6 +26362,10 @@ with pkgs; fwts = callPackage ../os-specific/linux/fwts { }; + gasket = callPackage ../os-specific/linux/gasket { + inherit (linuxPackages) kernel; + }; + gobi_loader = callPackage ../os-specific/linux/gobi_loader { }; libossp_uuid = callPackage ../development/libraries/libossp-uuid { }; @@ -30621,6 +30627,8 @@ with pkgs; grisbi = callPackage ../applications/office/grisbi { gtk = gtk3; }; + gscreenshot = callPackage ../applications/graphics/gscreenshot { }; + gtkpod = callPackage ../applications/audio/gtkpod { }; q4wine = libsForQt5.callPackage ../applications/misc/q4wine { };