Merge staging-next into staging

This commit is contained in:
nixpkgs-ci[bot] 2025-07-04 06:07:14 +00:00 committed by GitHub
commit 04de8eaaf8
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
62 changed files with 517 additions and 369 deletions

View File

@ -14,8 +14,8 @@ NixOS manual is shown automatically on TTY 8, udisks is disabled.
Autologin is enabled as `nixos` user, while passwordless Autologin is enabled as `nixos` user, while passwordless
login as both `root` and `nixos` is possible. login as both `root` and `nixos` is possible.
Passwordless `sudo` is enabled too. Passwordless `sudo` is enabled too.
[wpa_supplicant](#opt-networking.wireless.enable) is [NetworkManager](#opt-networking.networkmanager.enable) is
enabled, but configured to not autostart. enabled and can be configured interactively with `nmtui`.
It is explained how to login, start the ssh server, and if available, It is explained how to login, start the ssh server, and if available,
how to start the display manager. how to start the display manager.

View File

@ -154,54 +154,13 @@ The boot process should have brought up networking (check `ip
a`). Networking is necessary for the installer, since it will a`). Networking is necessary for the installer, since it will
download lots of stuff (such as source tarballs or Nixpkgs channel download lots of stuff (such as source tarballs or Nixpkgs channel
binaries). It's best if you have a DHCP server on your network. binaries). It's best if you have a DHCP server on your network.
Otherwise configure networking manually using `ifconfig`. Otherwise configure networking manually using `ip`.
On the graphical installer, you can configure the network, wifi You can configure the network, Wi-Fi included, through NetworkManager.
included, through NetworkManager. Using the `nmtui` program, you can do Using the `nmtui` program, you can do so even in a non-graphical session.
so even in a non-graphical session. If you prefer to configure the If you prefer to configure the network manually, disable NetworkManager with
network manually, disable NetworkManager with
`systemctl stop NetworkManager`. `systemctl stop NetworkManager`.
On the minimal installer, NetworkManager is not available, so
configuration must be performed manually. To configure the wifi, first
start wpa_supplicant with `sudo systemctl start wpa_supplicant`, then
run `wpa_cli`. For most home networks, you need to type in the following
commands:
```plain
> add_network
0
> set_network 0 ssid "myhomenetwork"
OK
> set_network 0 psk "mypassword"
OK
> enable_network 0
OK
```
For enterprise networks, for example *eduroam*, instead do:
```plain
> add_network
0
> set_network 0 ssid "eduroam"
OK
> set_network 0 identity "myname@example.com"
OK
> set_network 0 password "mypassword"
OK
> enable_network 0
OK
```
When successfully connected, you should see a line such as this one
```plain
<3>CTRL-EVENT-CONNECTED - Connection to 32:85:ab:ef:24:5c completed [id=0 id_str=]
```
you can now leave `wpa_cli` by typing `quit`.
If you would like to continue the installation from a different machine If you would like to continue the installation from a different machine
you can use activated SSH daemon. You need to copy your ssh key to you can use activated SSH daemon. You need to copy your ssh key to
either `/home/nixos/.ssh/authorized_keys` or either `/home/nixos/.ssh/authorized_keys` or

View File

@ -10,6 +10,8 @@
- The default PostgreSQL version for new NixOS installations (i.e. with `system.stateVersion >= 25.11`) is v17. - The default PostgreSQL version for new NixOS installations (i.e. with `system.stateVersion >= 25.11`) is v17.
- The NetworkManager module does not ship with a default set of VPN plugins anymore. All required VPN plugins must now be explicitly configured in [`networking.networkmanager.plugins`](#opt-networking.networkmanager.plugins).
## New Modules {#sec-release-25.11-new-modules} ## New Modules {#sec-release-25.11-new-modules}
<!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. --> <!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. -->

View File

@ -20,10 +20,6 @@
services.xserver.enable = true; services.xserver.enable = true;
# Provide networkmanager for easy wireless configuration.
networking.networkmanager.enable = true;
networking.wireless.enable = lib.mkImageMediaOverride false;
# KDE complains if power management is disabled (to be precise, if # KDE complains if power management is disabled (to be precise, if
# there is no power management backend such as upower). # there is no power management backend such as upower).
powerManagement.enable = true; powerManagement.enable = true;

View File

@ -11,5 +11,5 @@
documentation.man.enable = lib.mkOverride 500 true; documentation.man.enable = lib.mkOverride 500 true;
hardware.enableRedistributableFirmware = lib.mkOverride 70 false; hardware.enableRedistributableFirmware = lib.mkOverride 70 false;
system.extraDependencies = lib.mkOverride 70 [ ]; system.extraDependencies = lib.mkOverride 70 [ ];
networking.wireless.enable = lib.mkOverride 500 false; networking.networkmanager.enable = lib.mkOverride 500 false;
} }

View File

@ -69,9 +69,7 @@ with lib;
with `passwd` (prefix with `sudo` for "root"), or add your public key to with `passwd` (prefix with `sudo` for "root"), or add your public key to
/home/nixos/.ssh/authorized_keys or /root/.ssh/authorized_keys. /home/nixos/.ssh/authorized_keys or /root/.ssh/authorized_keys.
If you need a wireless connection, type To set up a wireless connection, run `nmtui`.
`sudo systemctl start wpa_supplicant` and configure a
network using `wpa_cli`. See the NixOS manual for details.
'' ''
+ optionalString config.services.xserver.enable '' + optionalString config.services.xserver.enable ''
@ -89,10 +87,8 @@ with lib;
settings.PermitRootLogin = mkDefault "yes"; settings.PermitRootLogin = mkDefault "yes";
}; };
# Enable wpa_supplicant, but don't start it by default. # Provide networkmanager for easy network configuration.
networking.wireless.enable = mkDefault true; networking.networkmanager.enable = true;
networking.wireless.userControlled.enable = true;
systemd.services.wpa_supplicant.wantedBy = mkOverride 50 [ ];
# Tell the Nix evaluator to garbage collect more aggressively. # Tell the Nix evaluator to garbage collect more aggressively.
# This is desirable in memory-constrained environments that don't # This is desirable in memory-constrained environments that don't

View File

@ -127,15 +127,20 @@ let
''; '';
}; };
concatPluginAttrs = attr: lib.concatMap (plugin: plugin.${attr} or [ ]) cfg.plugins;
pluginRuntimeDeps = concatPluginAttrs "networkManagerRuntimeDeps";
pluginDbusDeps = concatPluginAttrs "networkManagerDbusDeps";
pluginTmpfilesRules = concatPluginAttrs "networkManagerTmpfilesRules";
packages = packages =
[ [
cfg.package cfg.package
] ]
++ cfg.plugins ++ cfg.plugins
++ pluginRuntimeDeps
++ lib.optionals (!delegateWireless && !enableIwd) [ ++ lib.optionals (!delegateWireless && !enableIwd) [
pkgs.wpa_supplicant pkgs.wpa_supplicant
]; ];
in in
{ {
@ -220,30 +225,37 @@ in
type = type =
let let
networkManagerPluginPackage = types.package // { networkManagerPluginPackage = types.package // {
description = "NetworkManager plug-in"; description = "NetworkManager plugin package";
check = check =
p: p:
lib.assertMsg lib.assertMsg
(types.package.check p && p ? networkManagerPlugin && lib.isString p.networkManagerPlugin) (types.package.check p && p ? networkManagerPlugin && lib.isString p.networkManagerPlugin)
'' ''
Package ${p.name}, is not a NetworkManager plug-in. Package ${p.name}, is not a NetworkManager plugin.
Those need to have a networkManagerPlugin attribute. Those need to have a networkManagerPlugin attribute.
''; '';
}; };
in in
types.listOf networkManagerPluginPackage; types.listOf networkManagerPluginPackage;
default = [ ]; default = [ ];
description = '' example = literalExpression ''
List of NetworkManager plug-ins to enable. [
Some plug-ins are enabled by the NetworkManager module by default. networkmanager-fortisslvpn
networkmanager-iodine
networkmanager-l2tp
networkmanager-openconnect
networkmanager-openvpn
networkmanager-sstp
networkmanager-strongswan
networkmanager-vpnc
]
''; '';
};
enableDefaultPlugins = mkOption {
type = types.bool;
default = true;
description = '' description = ''
Enable a set of recommended plugins. List of plugin packages to install.
See <https://search.nixos.org/packages?query=networkmanager-> for available plugin packages.
and <https://networkmanager.dev/docs/vpn/> for an overview over builtin and external plugins
and their support status.
''; '';
}; };
@ -390,19 +402,6 @@ in
''; '';
}; };
enableStrongSwan = mkOption {
type = types.bool;
default = false;
description = ''
Enable the StrongSwan plugin.
If you enable this option the
`networkmanager_strongswan` plugin will be added to
the {option}`networking.networkmanager.plugins` option
so you don't need to do that yourself.
'';
};
ensureProfiles = { ensureProfiles = {
profiles = profiles =
with lib.types; with lib.types;
@ -523,6 +522,16 @@ in
[ "networking" "networkmanager" "fccUnlockScripts" ] [ "networking" "networkmanager" "fccUnlockScripts" ]
[ "networking" "modemmanager" "fccUnlockScripts" ] [ "networking" "modemmanager" "fccUnlockScripts" ]
) )
(mkRemovedOptionModule [
"networking"
"networkmanager"
"enableStrongSwan"
] "Pass `pkgs.networkmanager-strongswan` into `networking.networkmanager.plugins` instead.")
(mkRemovedOptionModule [
"networking"
"networkmanager"
"enableDefaultPlugins"
] "Configure the required plugins explicitly in `networking.networkmanager.plugins`.")
]; ];
###### implementation ###### implementation
@ -597,13 +606,10 @@ in
systemd.tmpfiles.rules = [ systemd.tmpfiles.rules = [
"d /etc/NetworkManager/system-connections 0700 root root -" "d /etc/NetworkManager/system-connections 0700 root root -"
"d /etc/ipsec.d 0700 root root -"
"d /var/lib/NetworkManager-fortisslvpn 0700 root root -"
"d /var/lib/misc 0755 root root -" # for dnsmasq.leases "d /var/lib/misc 0755 root root -" # for dnsmasq.leases
# ppp isn't able to mkdir that directory at runtime # ppp isn't able to mkdir that directory at runtime
"d /run/pppd/lock 0700 root root -" "d /run/pppd/lock 0700 root root -"
]; ] ++ pluginTmpfilesRules;
systemd.services.NetworkManager = { systemd.services.NetworkManager = {
wantedBy = [ "multi-user.target" ]; wantedBy = [ "multi-user.target" ];
@ -642,6 +648,7 @@ in
wantedBy = [ "multi-user.target" ]; wantedBy = [ "multi-user.target" ];
before = [ "network-online.target" ]; before = [ "network-online.target" ];
after = [ "NetworkManager.service" ]; after = [ "NetworkManager.service" ];
path = pluginRuntimeDeps;
script = script =
let let
path = id: "/run/NetworkManager/system-connections/${id}.nmconnection"; path = id: "/run/NetworkManager/system-connections/${id}.nmconnection";
@ -668,22 +675,6 @@ in
useDHCP = false; useDHCP = false;
}) })
(mkIf cfg.enableDefaultPlugins {
networkmanager.plugins = with pkgs; [
networkmanager-fortisslvpn
networkmanager-iodine
networkmanager-l2tp
networkmanager-openconnect
networkmanager-openvpn
networkmanager-vpnc
networkmanager-sstp
];
})
(mkIf cfg.enableStrongSwan {
networkmanager.plugins = [ pkgs.networkmanager_strongswan ];
})
(mkIf enableIwd { (mkIf enableIwd {
wireless.iwd.enable = true; wireless.iwd.enable = true;
}) })
@ -710,11 +701,10 @@ in
security.polkit.enable = true; security.polkit.enable = true;
security.polkit.extraConfig = polkitConf; security.polkit.extraConfig = polkitConf;
services.dbus.packages = services.dbus.packages = packages ++ pluginDbusDeps ++ optional (cfg.dns == "dnsmasq") pkgs.dnsmasq;
packages
++ optional cfg.enableStrongSwan pkgs.strongswanNM
++ optional (cfg.dns == "dnsmasq") pkgs.dnsmasq;
services.udev.packages = packages; services.udev.packages = packages;
systemd.services.NetworkManager.path = pluginRuntimeDeps;
}; };
} }

View File

@ -14,7 +14,6 @@ in
meta = with pkgs.lib.maintainers; { meta = with pkgs.lib.maintainers; {
maintainers = [ maintainers = [
kampfschlaefer kampfschlaefer
schmittlauch
]; ];
}; };

View File

@ -218,7 +218,6 @@ let
ktimer = callPackage ./ktimer.nix { }; ktimer = callPackage ./ktimer.nix { };
ktnef = callPackage ./ktnef.nix { }; ktnef = callPackage ./ktnef.nix { };
ktorrent = callPackage ./ktorrent.nix { }; ktorrent = callPackage ./ktorrent.nix { };
ktouch = callPackage ./ktouch.nix { };
kturtle = callPackage ./kturtle.nix { }; kturtle = callPackage ./kturtle.nix { };
kwalletmanager = callPackage ./kwalletmanager.nix { }; kwalletmanager = callPackage ./kwalletmanager.nix { };
kwave = callPackage ./kwave.nix { }; kwave = callPackage ./kwave.nix { };
@ -280,6 +279,7 @@ let
} }
// lib.optionalAttrs config.allowAliases { // lib.optionalAttrs config.allowAliases {
k3b = throw "libsForQt5.k3b has been dropped in favor of kdePackages.k3b"; k3b = throw "libsForQt5.k3b has been dropped in favor of kdePackages.k3b";
ktouch = throw "ktouch has been dropped due keyboard layout issues";
}; };
in in

View File

@ -1,69 +0,0 @@
{
mkDerivation,
lib,
extra-cmake-modules,
kdoctools,
kconfig,
kconfigwidgets,
kcoreaddons,
kdeclarative,
ki18n,
kitemviews,
kcmutils,
kio,
knewstuff,
ktexteditor,
kwidgetsaddons,
kwindowsystem,
kxmlgui,
qtscript,
qtdeclarative,
kqtquickcharts,
qtx11extras,
qtgraphicaleffects,
qtxmlpatterns,
qtquickcontrols2,
xorg,
}:
mkDerivation {
pname = "ktouch";
meta = {
homepage = "https://apps.kde.org/ktouch/";
license = lib.licenses.gpl2;
maintainers = [ lib.maintainers.schmittlauch ];
description = "Touch typing tutor from the KDE software collection";
mainProgram = "ktouch";
};
nativeBuildInputs = [
extra-cmake-modules
kdoctools
qtdeclarative
];
buildInputs = [
kconfig
kconfigwidgets
kcoreaddons
kdeclarative
ki18n
kitemviews
kcmutils
kio
knewstuff
ktexteditor
kwidgetsaddons
kwindowsystem
kxmlgui
qtscript
qtdeclarative
kqtquickcharts
qtx11extras
qtgraphicaleffects
qtxmlpatterns
qtquickcontrols2
xorg.libxkbfile
xorg.libxcb
];
enableParallelBuilding = true;
}

View File

@ -37,6 +37,14 @@ let
"amd64" "amd64"
else else
throw "Unsupported system ${stdenv.hostPlatform.system} "; throw "Unsupported system ${stdenv.hostPlatform.system} ";
libxml2' = libxml2.overrideAttrs rec {
version = "2.13.8";
src = fetchurl {
url = "mirror://gnome/sources/libxml2/${lib.versions.majorMinor version}/libxml2-${version}.tar.xz";
hash = "sha256-J3KUyzMRmrcbK8gfL0Rem8lDW4k60VuyzSsOhZoO6Eo=";
};
};
in in
mkDerivation rec { mkDerivation rec {
pname = "googleearth-pro"; pname = "googleearth-pro";
@ -70,7 +78,7 @@ mkDerivation rec {
libXrender libXrender
libproxy libproxy
libxcb libxcb
libxml2 libxml2'
sqlite sqlite
zlib zlib
alsa-lib alsa-lib
@ -81,9 +89,13 @@ mkDerivation rec {
dontBuild = true; dontBuild = true;
unpackPhase = '' unpackPhase = ''
runHook preUnpack
# deb file contains a setuid binary, so 'dpkg -x' doesn't work here # deb file contains a setuid binary, so 'dpkg -x' doesn't work here
mkdir deb mkdir deb
dpkg --fsys-tarfile $src | tar --extract -C deb dpkg --fsys-tarfile $src | tar --extract -C deb
runHook postUnpack
''; '';
installPhase = '' installPhase = ''

View File

@ -40,13 +40,13 @@ let
in in
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "svxlink"; pname = "svxlink";
version = "25.05"; version = "25.05.1";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "sm0svx"; owner = "sm0svx";
repo = "svxlink"; repo = "svxlink";
tag = version; tag = version;
hash = "sha256-xFtfHkLnStG730o5tGATLLZvcqYYpR+7ATUdib7B2rw="; hash = "sha256-OyAR/6heGX6J53p6x+ZPXY6nzSv22umMTg0ISlWcjp8=";
}; };
cmakeFlags = [ cmakeFlags = [

View File

@ -0,0 +1,105 @@
{
lib,
stdenvNoCC,
fetchFromGitHub,
jdk,
jre,
zip,
makeWrapper,
desktop-file-utils,
spleen,
nix-update-script,
}:
stdenvNoCC.mkDerivation (finalAttrs: {
pname = "bitsnpicas";
version = "2.1";
src = fetchFromGitHub {
owner = "kreativekorp";
repo = "bitsnpicas";
tag = "v${finalAttrs.version}";
hash = "sha256-hw7UuzesqpmnTjgpfikAIYyY70ni7BxjaUtHAPEdkXI=";
};
nativeBuildInputs =
[
jdk
zip
makeWrapper
]
++ lib.optionals stdenvNoCC.hostPlatform.isLinux [
desktop-file-utils
];
sourceRoot = "${finalAttrs.src.name}/main/java/BitsNPicas";
installPhase =
''
runHook preInstall
install -Dm444 BitsNPicas.jar "$out/share/java/bitsnpicas.jar"
install -Dm444 MapEdit.jar "$out/share/java/mapedit.jar"
install -Dm444 KeyEdit.jar "$out/share/java/keyedit.jar"
makeWrapper "${jre}/bin/java" "$out/bin/bitsnpicas" \
--add-flags "-jar $out/share/java/bitsnpicas.jar"
makeWrapper "${jre}/bin/java" "$out/bin/mapedit" \
--add-flags "-jar $out/share/java/mapedit.jar"
makeWrapper "${jre}/bin/java" "$out/bin/keyedit" \
--add-flags "-jar $out/share/java/keyedit.jar"
install -Dm444 dep/bitsnpicas.png "$out/share/icons/hicolor/128x128/apps/bitsnpicas.png"
install -Dm444 dep/kbnp-icon.png "$out/share/icons/hicolor/512x512/apps/bitsnpicas.png"
install -Dm444 dep/mapedit-icon.png "$out/share/icons/hicolor/512x512/apps/mapedit.png"
install -Dm444 dep/keyedit-icon.png "$out/share/icons/hicolor/256x256/apps/keyedit.png"
''
+ lib.optionalString stdenvNoCC.hostPlatform.isLinux ''
mkdir -p "$out/share/applications/"
cp dep/*.desktop "$out/share/applications/"
''
+ ''
runHook postInstall
'';
postFixup = lib.optionalString stdenvNoCC.hostPlatform.isLinux ''
desktop-file-edit "$out/share/applications/bitsnpicas.desktop" \
--set-key='Exec' --set-value='bitsnpicas edit %F' \
--set-key='Icon' --set-value='bitsnpicas' \
--set-key='StartupWMClass' --set-value='com-kreative-bitsnpicas-main-Main'
desktop-file-edit "$out/share/applications/mapedit.desktop" \
--set-key='Exec' --set-value='mapedit %F' \
--set-key='Icon' --set-value='mapedit' \
--set-key='StartupWMClass' --set-value='com-kreative-mapedit-Main'
desktop-file-edit "$out/share/applications/keyedit.desktop" \
--set-key='Exec' --set-value='keyedit %F' \
--set-key='Icon' --set-value='keyedit' \
--set-key='StartupWMClass' --set-value='com-kreative-keyedit-Main'
'';
doInstallCheck = true;
installCheckPhase = ''
runHook preInstallCheck
"$out/bin/bitsnpicas" convertbitmap -f psf "${spleen}/share/fonts/misc/spleen-8x16.bdf"
[[ -f Spleen.psf ]]
runHook postInstallCheck
'';
passthru = {
updateScript = nix-update-script { };
};
meta = {
description = "Bitmap and emoji font creation and conversion tools";
homepage = "https://github.com/kreativekorp/bitsnpicas";
# Written in https://github.com/kreativekorp/bitsnpicas/blob/v2.1/main/java/BitsNPicas/LICENSE
license = lib.licenses.mpl11;
mainProgram = "bitsnpicas";
maintainers = with lib.maintainers; [
kachick
];
platforms = lib.lists.unique (jdk.meta.platforms ++ lib.platforms.windows);
};
})

View File

@ -9,20 +9,20 @@
}: }:
let let
version = "2025.6.1"; version = "2025.6.2";
product = product =
if proEdition then if proEdition then
{ {
productName = "pro"; productName = "pro";
productDesktop = "Burp Suite Professional Edition"; productDesktop = "Burp Suite Professional Edition";
hash = "sha256-At3+tScMbNrZI2qF+kwt41khou8aP5Qn33v6IT7n9HI="; hash = "sha256-+MUbED8pDAPReH2KEYn/l6LlforeHPlVitI0VhPDUDw=";
} }
else else
{ {
productName = "community"; productName = "community";
productDesktop = "Burp Suite Community Edition"; productDesktop = "Burp Suite Community Edition";
hash = "sha256-1reZGan6hmXTg7RUjaian6Q5VAsR5iuye4kGWkpREM4="; hash = "sha256-Jelsti5BSp4uwCRqwfaKWW15/tbINNNZwJO3lbAdVmY=";
}; };
src = fetchurl { src = fetchurl {

View File

@ -6,13 +6,13 @@
"packages": { "packages": {
"": { "": {
"dependencies": { "dependencies": {
"@anthropic-ai/claude-code": "^1.0.38" "@anthropic-ai/claude-code": "^1.0.41"
} }
}, },
"node_modules/@anthropic-ai/claude-code": { "node_modules/@anthropic-ai/claude-code": {
"version": "1.0.38", "version": "1.0.41",
"resolved": "https://registry.npmjs.org/@anthropic-ai/claude-code/-/claude-code-1.0.38.tgz", "resolved": "https://registry.npmjs.org/@anthropic-ai/claude-code/-/claude-code-1.0.41.tgz",
"integrity": "sha512-hPZbJCt7O8T872wbCXGiwF210DzMBo/k3EVKB6EZQB10b73ZQIEflAWGTC2ZvBcMp79qAR4F6c82V0+Cc6o0sg==", "integrity": "sha512-6E5SCb1I/pC4WCEFGwmyo4M4bL9vBuk7qkC78v9ZFX9PAxmKX94SEj422igdLeucBYX99ZqKSMYfsJEqTeIo2Q==",
"hasInstallScript": true, "hasInstallScript": true,
"license": "SEE LICENSE IN README.md", "license": "SEE LICENSE IN README.md",
"bin": { "bin": {

View File

@ -7,16 +7,16 @@
buildNpmPackage rec { buildNpmPackage rec {
pname = "claude-code"; pname = "claude-code";
version = "1.0.38"; version = "1.0.41";
nodejs = nodejs_20; # required for sandboxed Nix builds on Darwin nodejs = nodejs_20; # required for sandboxed Nix builds on Darwin
src = fetchzip { src = fetchzip {
url = "https://registry.npmjs.org/@anthropic-ai/claude-code/-/claude-code-${version}.tgz"; url = "https://registry.npmjs.org/@anthropic-ai/claude-code/-/claude-code-${version}.tgz";
hash = "sha256-flG9VlnQfMfGFBbs6RdQKSbceD/Tke19Euo8znR5OG0="; hash = "sha256-x8Bxh0iKqf8AsMQ+7zutSh53DbCRzM9s6s6BQkdbyXc=";
}; };
npmDepsHash = "sha256-IOk/dPi43WqFb1mWC/48JMK5a8PeSHE2uKz+4qA3AYA="; npmDepsHash = "sha256-LiCN8swT4ba+F1aMjHQqCsZUqcAW0qc4AiYL90Burk8=";
postPatch = '' postPatch = ''
cp ${./package-lock.json} package-lock.json cp ${./package-lock.json} package-lock.json

View File

@ -16,20 +16,20 @@ let
sources = { sources = {
x86_64-linux = fetchurl { x86_64-linux = fetchurl {
url = "https://downloads.cursor.com/production/979ba33804ac150108481c14e0b5cb970bda3266/linux/x64/Cursor-1.1.3-x86_64.AppImage"; url = "https://downloads.cursor.com/production/031e7e0ff1e2eda9c1a0f5df67d44053b059c5df/linux/x64/Cursor-1.2.1-x86_64.AppImage";
hash = "sha256-mOwWNbKKykMaLFxfjaoGGrxfyhLX++fqJ0TXQtKVD8c="; hash = "sha256-2rOs5+85crKO/N9dCQLFfUXTfP9JVVR1s/g0bK2E78s=";
}; };
aarch64-linux = fetchurl { aarch64-linux = fetchurl {
url = "https://downloads.cursor.com/production/979ba33804ac150108481c14e0b5cb970bda3266/linux/arm64/Cursor-1.1.3-aarch64.AppImage"; url = "https://downloads.cursor.com/production/031e7e0ff1e2eda9c1a0f5df67d44053b059c5df/linux/arm64/Cursor-1.2.1-aarch64.AppImage";
hash = "sha256-1uWfTOrBcCX6QWTwB9C45RsjLqu2C89DQkqKFTHsKxg="; hash = "sha256-Otg+NyW1DmrqIb0xqZCfJ4ys61/DBOQNgaAR8PMOCfg=";
}; };
x86_64-darwin = fetchurl { x86_64-darwin = fetchurl {
url = "https://downloads.cursor.com/production/979ba33804ac150108481c14e0b5cb970bda3266/darwin/x64/Cursor-darwin-x64.dmg"; url = "https://downloads.cursor.com/production/031e7e0ff1e2eda9c1a0f5df67d44053b059c5df/darwin/x64/Cursor-darwin-x64.dmg";
hash = "sha256-q5/bmv+QDAkuMOUcaCspJrkaxrz9dBRJKf1eFhk9M04="; hash = "sha256-Rh1erFG7UtGwO1NaM5+tq17mI5WdIX750pIzeO9AK+Q=";
}; };
aarch64-darwin = fetchurl { aarch64-darwin = fetchurl {
url = "https://downloads.cursor.com/production/979ba33804ac150108481c14e0b5cb970bda3266/darwin/arm64/Cursor-darwin-arm64.dmg"; url = "https://downloads.cursor.com/production/031e7e0ff1e2eda9c1a0f5df67d44053b059c5df/darwin/arm64/Cursor-darwin-arm64.dmg";
hash = "sha256-vgcPwbRXFRtxIAUqbozFD9b21/XUAAojMv9/UnEYvb8="; hash = "sha256-k/j3hJnHIdtfK9+T0aq2gFkRM+JulDt4FpU7n4HGEYM=";
}; };
}; };
@ -39,7 +39,7 @@ in
inherit useVSCodeRipgrep; inherit useVSCodeRipgrep;
commandLineArgs = finalCommandLineArgs; commandLineArgs = finalCommandLineArgs;
version = "1.1.3"; version = "1.2.1";
pname = "cursor"; pname = "cursor";
# You can find the current VSCode version in the About dialog: # You can find the current VSCode version in the About dialog:

View File

@ -18,6 +18,7 @@ python3Packages.buildPythonApplication rec {
pythonRelaxDeps = [ pythonRelaxDeps = [
"rich" "rich"
"argcomplete"
]; ];
dependencies = dependencies =

View File

@ -15,17 +15,17 @@
rustPlatform.buildRustPackage (finalAttrs: { rustPlatform.buildRustPackage (finalAttrs: {
pname = "eza"; pname = "eza";
version = "0.21.6"; version = "0.22.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "eza-community"; owner = "eza-community";
repo = "eza"; repo = "eza";
tag = "v${finalAttrs.version}"; tag = "v${finalAttrs.version}";
hash = "sha256-9Q66xaQzRwpc/fRvAQsbzBDpXhm0goCNiW/sUjGmUEM="; hash = "sha256-/mk8UMWiw+YrEcZK+C/2AkHXekvxTwWGBsJG7lWbz38=";
}; };
useFetchCargoVendor = true; useFetchCargoVendor = true;
cargoHash = "sha256-Asb6V0R49ZprabXQOi95zBpqc855CLwXUstKVq7+rXs="; cargoHash = "sha256-6I7Enwp95u2d3xtnBykVCBE1tBm1OeAyQtxvGCDJPdc=";
nativeBuildInputs = [ nativeBuildInputs = [
cmake cmake

View File

@ -8,16 +8,16 @@
buildGoModule rec { buildGoModule rec {
pname = "files-cli"; pname = "files-cli";
version = "2.15.32"; version = "2.15.38";
src = fetchFromGitHub { src = fetchFromGitHub {
repo = "files-cli"; repo = "files-cli";
owner = "files-com"; owner = "files-com";
rev = "v${version}"; rev = "v${version}";
hash = "sha256-etUcjmRZJvwEUHX87sPBoYsh9oVFm4fxdrJR6VJBvrE="; hash = "sha256-bf87pCosw41yqnPeQ38t++jedRYKEn22wwuTSrmPvCo=";
}; };
vendorHash = "sha256-8mEl9/ljAKkTHgcEgf+SjeVjFv/fxVlYnhOxKzEIxgM="; vendorHash = "sha256-p5Fcs7xVsDBfJQLNbEqsJY2jwgoKrBRCi6Qadwr1azY=";
ldflags = [ ldflags = [
"-s" "-s"

View File

@ -4,20 +4,27 @@
fetchFromGitHub, fetchFromGitHub,
buildGoModule, buildGoModule,
versionCheckHook, versionCheckHook,
nix-update-script,
}: }:
buildGoModule rec { buildGoModule (finalAttrs: {
pname = "gost"; pname = "gost";
version = "3.0.0"; version = "3.1.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "go-gost"; owner = "go-gost";
repo = "gost"; repo = "gost";
tag = "v${version}"; tag = "v${finalAttrs.version}";
hash = "sha256-ep3ZjD+eVKl3PuooDuYeur8xDAcyy6ww2I7f3cYG03o="; hash = "sha256-4ZfGxhXespaZNspvbwZ/Yz2ncqtY3wxJPQsqVILayao=";
}; };
vendorHash = "sha256-lzyr6Q8yXsuer6dRUlwHEeBewjwGxDslueuvIiZUW70="; vendorHash = "sha256-lWuLvYF9Sl+k8VnsujvRmj7xb9zst+g//Gkg7VwtWkg=";
# Based on ldflags in upstream's .goreleaser.yaml
ldflags = [
"-s"
"-X main.version=v${finalAttrs.version}"
];
__darwinAllowLocalNetworking = true; __darwinAllowLocalNetworking = true;
@ -30,6 +37,8 @@ buildGoModule rec {
versionCheckProgramArg = "-V"; versionCheckProgramArg = "-V";
passthru.updateScript = nix-update-script { };
meta = { meta = {
description = "Simple tunnel written in golang"; description = "Simple tunnel written in golang";
homepage = "https://github.com/go-gost/gost"; homepage = "https://github.com/go-gost/gost";
@ -37,7 +46,8 @@ buildGoModule rec {
maintainers = with lib.maintainers; [ maintainers = with lib.maintainers; [
pmy pmy
ramblurr ramblurr
moraxyc
]; ];
mainProgram = "gost"; mainProgram = "gost";
}; };
} })

View File

@ -1,12 +1,12 @@
{ {
"name": "@withgraphite/graphite-cli", "name": "@withgraphite/graphite-cli",
"version": "1.6.5", "version": "1.6.6",
"lockfileVersion": 3, "lockfileVersion": 3,
"requires": true, "requires": true,
"packages": { "packages": {
"": { "": {
"name": "@withgraphite/graphite-cli", "name": "@withgraphite/graphite-cli",
"version": "1.6.5", "version": "1.6.6",
"hasInstallScript": true, "hasInstallScript": true,
"license": "None", "license": "None",
"dependencies": { "dependencies": {

View File

@ -8,14 +8,14 @@
buildNpmPackage rec { buildNpmPackage rec {
pname = "graphite-cli"; pname = "graphite-cli";
version = "1.6.5"; version = "1.6.6";
src = fetchurl { src = fetchurl {
url = "https://registry.npmjs.org/@withgraphite/graphite-cli/-/graphite-cli-${version}.tgz"; url = "https://registry.npmjs.org/@withgraphite/graphite-cli/-/graphite-cli-${version}.tgz";
hash = "sha256-Z1lJUKe1fET4Xj2bmxCbH2abH/hX6BEtWFD+HC2w2iw="; hash = "sha256-WTgZjXMqxhN3XM6tmH4OMa0VgCPlY3KRX+hlqVMVVpk=";
}; };
npmDepsHash = "sha256-lN7mg2gNFXuQ39hbjG7kVvDhPF6mWg3E6dszywbKHZo="; npmDepsHash = "sha256-B9hd7IZ7bmOV9ZSiORWoFbhp+2Gj6WwUWZPGEvb9j5s=";
postPatch = '' postPatch = ''
ln -s ${./package-lock.json} package-lock.json ln -s ${./package-lock.json} package-lock.json

View File

@ -1,43 +1,49 @@
{ {
lib, lib,
python3, python3Packages,
fetchFromGitHub, fetchFromGitHub,
versionCheckHook,
}: }:
python3.pkgs.buildPythonApplication rec { python3Packages.buildPythonApplication rec {
pname = "ical2orgpy"; pname = "ical2orgpy";
version = "0.5"; version = "0.5";
pyproject = true;
format = "setuptools";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "ical2org-py"; owner = "ical2org-py";
repo = "ical2org.py"; repo = "ical2org.py";
rev = version; tag = version;
hash = "sha256-vBi1WYXMuDFS/PnwFQ/fqN5+gIvtylXidfZklyd6LcI="; hash = "sha256-vBi1WYXMuDFS/PnwFQ/fqN5+gIvtylXidfZklyd6LcI=";
}; };
propagatedBuildInputs = with python3.pkgs; [ build-system = [ python3Packages.setuptools ];
dependencies = with python3Packages; [
click click
future
icalendar icalendar
pytz pytz
tzlocal tzlocal
recurring-ical-events recurring-ical-events
]; ];
nativeCheckInputs = with python3.pkgs; [ pythonRemoveDeps = [ "future" ];
nativeCheckInputs = with python3Packages; [
freezegun freezegun
pytestCheckHook pytestCheckHook
pyyaml pyyaml
versionCheckHook
]; ];
meta = with lib; { pythonImportsCheck = [ "ical2orgpy" ];
changelog = "https://github.com/ical2org-py/ical2org.py/blob/${src.rev}/CHANGELOG.rst";
meta = {
changelog = "https://github.com/ical2org-py/ical2org.py/blob/${src.tag}/CHANGELOG.rst";
description = "Converting ICAL file into org-mode format"; description = "Converting ICAL file into org-mode format";
homepage = "https://github.com/ical2org-py/ical2org.py"; homepage = "https://github.com/ical2org-py/ical2org.py";
license = licenses.gpl3Only; license = lib.licenses.gpl3Only;
maintainers = with maintainers; [ StillerHarpo ]; maintainers = with lib.maintainers; [ StillerHarpo ];
mainProgram = "ical2orgpy"; mainProgram = "ical2orgpy";
}; };

View File

@ -0,0 +1,29 @@
{
lib,
rustPlatform,
fetchCrate,
}:
rustPlatform.buildRustPackage (finalAttrs: {
pname = "jsonkdl";
version = "1.0.0";
src = fetchCrate {
inherit (finalAttrs) pname version;
hash = "sha256-4k6gwThkS9OfdM412Mi/Scv+4wIKIXuCA5lVuJ7IRiY=";
};
cargoHash = "sha256-9dHS41ZyI9vna0w8N6/PXsmObKPHUi25JPFLsEaxG/A=";
meta = {
description = "JSON to KDL converter";
homepage = "https://github.com/joshprk/jsonkdl";
changelog = "https://github.com/joshprk/jsonkdl/releases/tag/v${finalAttrs.version}";
license = lib.licenses.mit;
maintainers = with lib.maintainers; [
joshprk
kiara
];
mainProgram = "jsonkdl";
};
})

View File

@ -39,7 +39,7 @@ appimageTools.wrapType2 {
install -Dm444 -t $out/share/applications ${desktopItem}/share/applications/* install -Dm444 -t $out/share/applications ${desktopItem}/share/applications/*
''; '';
buildInputs = [ extraLibraries = [
xorg.libxshmfence xorg.libxshmfence
]; ];

View File

@ -18,13 +18,13 @@
}: }:
stdenv.mkDerivation (finalAttrs: { stdenv.mkDerivation (finalAttrs: {
pname = "nero-umu"; pname = "nero-umu";
version = "1.1.2"; version = "1.1.3";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "SeongGino"; owner = "SeongGino";
repo = "Nero-umu"; repo = "Nero-umu";
tag = "v${finalAttrs.version}"; tag = "v${finalAttrs.version}";
hash = "sha256-7Wmha/WsSmbEgD2Dw2izSRzw8ldIrWcRIdUMp2okHWY="; hash = "sha256-w9sMBMtaop0lCwqvNf235cf0+ON91tMoqU1guyX6oVU=";
}; };
#Replace quazip git submodule with pre-packaged quazip #Replace quazip git submodule with pre-packaged quazip

View File

@ -82,6 +82,9 @@ stdenv.mkDerivation rec {
versionPolicy = "odd-unstable"; versionPolicy = "odd-unstable";
}; };
networkManagerPlugin = "VPN/nm-fortisslvpn-service.name"; networkManagerPlugin = "VPN/nm-fortisslvpn-service.name";
networkManagerTmpfilesRules = [
"d /var/lib/NetworkManager-fortisslvpn 0700 root root -"
];
}; };
meta = with lib; { meta = with lib; {

View File

@ -73,6 +73,7 @@ stdenv.mkDerivation rec {
versionPolicy = "odd-unstable"; versionPolicy = "odd-unstable";
}; };
networkManagerPlugin = "VPN/nm-openconnect-service.name"; networkManagerPlugin = "VPN/nm-openconnect-service.name";
networkManagerRuntimeDeps = [ openconnect ];
}; };
meta = with lib; { meta = with lib; {

View File

@ -49,6 +49,10 @@ stdenv.mkDerivation rec {
passthru = { passthru = {
networkManagerPlugin = "VPN/nm-strongswan-service.name"; networkManagerPlugin = "VPN/nm-strongswan-service.name";
networkManagerDbusDeps = [ strongswanNM ];
networkManagerTmpfilesRules = [
"d /etc/ipsec.d 0700 root root -"
];
}; };
meta = with lib; { meta = with lib; {

View File

@ -1,13 +1,15 @@
{ {
lib, lib,
stdenv,
rustPlatform, rustPlatform,
fetchFromGitHub, fetchFromGitHub,
boost, boost,
cmake, cmake,
git,
vectorscan, vectorscan,
openssl, openssl,
pkg-config, pkg-config,
installShellFiles,
versionCheckHook,
}: }:
rustPlatform.buildRustPackage rec { rustPlatform.buildRustPackage rec {
@ -24,10 +26,6 @@ rustPlatform.buildRustPackage rec {
useFetchCargoVendor = true; useFetchCargoVendor = true;
cargoHash = "sha256-hVBHIm/12WU6g45QMxxuGk41B0kwThk7A84fOxArvno="; cargoHash = "sha256-hVBHIm/12WU6g45QMxxuGk41B0kwThk7A84fOxArvno=";
nativeCheckInputs = [
git
];
checkFlags = [ checkFlags = [
# These tests expect access to network to clone and use GitHub API # These tests expect access to network to clone and use GitHub API
"--skip=github::github_repos_list_multiple_user_dedupe_jsonl_format" "--skip=github::github_repos_list_multiple_user_dedupe_jsonl_format"
@ -38,11 +36,20 @@ rustPlatform.buildRustPackage rec {
"--skip=github::github_repos_list_user_jsonl_format" "--skip=github::github_repos_list_user_jsonl_format"
"--skip=github::github_repos_list_user_repo_filter" "--skip=github::github_repos_list_user_repo_filter"
"--skip=scan::appmaker::scan_workflow_from_git_url" "--skip=scan::appmaker::scan_workflow_from_git_url"
# This caused a flaky result. See https://github.com/NixOS/nixpkgs/pull/422012#issuecomment-3031728181
"--skip=scan::git_url::git_binary_missing"
# Also skips all tests which depend on external git command to prevent unstable tests similar to git_binary_missing
# See https://github.com/NixOS/nixpkgs/pull/422012#discussion_r2182551619
"--skip=scan::git_url::https_nonexistent"
"--skip=scan::basic::scan_git_emptyrepo"
]; ];
nativeBuildInputs = [ nativeBuildInputs = [
cmake cmake
pkg-config pkg-config
installShellFiles
]; ];
buildInputs = [ buildInputs = [
boost boost
@ -52,6 +59,24 @@ rustPlatform.buildRustPackage rec {
OPENSSL_NO_VENDOR = 1; OPENSSL_NO_VENDOR = 1;
postInstall = lib.optionalString (stdenv.buildPlatform.canExecute stdenv.hostPlatform) ''
mkdir -p manpages
"$out/bin/noseyparker-cli" generate manpages
installManPage manpages/*
installShellCompletion --cmd noseyparker-cli \
--bash <("$out/bin/noseyparker-cli" generate shell-completions --shell bash) \
--zsh <("$out/bin/noseyparker-cli" generate shell-completions --shell zsh) \
--fish <("$out/bin/noseyparker-cli" generate shell-completions --shell fish)
'';
nativeInstallCheckInputs = [
versionCheckHook
];
doInstallCheck = true;
versionCheckProgram = "${placeholder "out"}/bin/noseyparker-cli";
versionCheckProgramArg = "--version";
meta = { meta = {
description = "Find secrets and sensitive information in textual data"; description = "Find secrets and sensitive information in textual data";
mainProgram = "noseyparker"; mainProgram = "noseyparker";

View File

@ -7,17 +7,18 @@
openssl, openssl,
pam, pam,
openssh, openssh,
nix-update-script,
}: }:
rustPlatform.buildRustPackage rec { rustPlatform.buildRustPackage rec {
pname = "pam_rssh"; pname = "pam_rssh";
version = "1.2.0-rc2"; version = "1.2.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "z4yx"; owner = "z4yx";
repo = "pam_rssh"; repo = "pam_rssh";
rev = "v${version}"; rev = "v${version}";
hash = "sha256-sXTSICVYSmwr12kRWuhVcag8kY6VAFdCqbe6LtYs4hU="; hash = "sha256-VxbaxqyIAwmjjbgfTajqwPQC3bp7g/JNVNx9yy/3tus=";
fetchSubmodules = true; fetchSubmodules = true;
}; };
@ -66,11 +67,16 @@ rustPlatform.buildRustPackage rec {
ssh-add $HOME/.ssh/id_rsa ssh-add $HOME/.ssh/id_rsa
''; '';
passthru.updateScript = nix-update-script { };
meta = with lib; { meta = with lib; {
description = "PAM module for authenticating via ssh-agent, written in Rust"; description = "PAM module for authenticating via ssh-agent, written in Rust";
homepage = "https://github.com/z4yx/pam_rssh"; homepage = "https://github.com/z4yx/pam_rssh";
license = licenses.mit; license = licenses.mit;
platforms = platforms.linux; platforms = platforms.linux;
maintainers = with maintainers; [ kranzes ]; maintainers = with maintainers; [
kranzes
xyenon
];
}; };
} }

View File

@ -7,6 +7,7 @@
curl, curl,
extra-cmake-modules, extra-cmake-modules,
ffmpeg, ffmpeg,
gtk3,
libXrandr, libXrandr,
libaio, libaio,
libbacktrace, libbacktrace,
@ -23,6 +24,7 @@
vulkan-headers, vulkan-headers,
vulkan-loader, vulkan-loader,
wayland, wayland,
wrapGAppsHook3,
zip, zip,
zstd, zstd,
plutovg, plutovg,
@ -76,6 +78,7 @@ llvmPackages.stdenv.mkDerivation (finalAttrs: {
extra-cmake-modules extra-cmake-modules
pkg-config pkg-config
strip-nondeterminism strip-nondeterminism
wrapGAppsHook3
wrapQtAppsHook wrapQtAppsHook
zip zip
]; ];
@ -83,6 +86,7 @@ llvmPackages.stdenv.mkDerivation (finalAttrs: {
buildInputs = [ buildInputs = [
curl curl
ffmpeg ffmpeg
gtk3
libaio libaio
libbacktrace libbacktrace
libpcap libpcap
@ -124,6 +128,12 @@ llvmPackages.stdenv.mkDerivation (finalAttrs: {
in in
[ "--prefix LD_LIBRARY_PATH : ${libs}" ]; [ "--prefix LD_LIBRARY_PATH : ${libs}" ];
dontWrapGApps = true;
preFixup = ''
qtWrapperArgs+=("''${gappsWrapperArgs[@]}")
'';
# https://github.com/PCSX2/pcsx2/pull/10200 # https://github.com/PCSX2/pcsx2/pull/10200
# Can't avoid the double wrapping, the binary wrapper from qtWrapperArgs doesn't support --run # Can't avoid the double wrapping, the binary wrapper from qtWrapperArgs doesn't support --run
postFixup = '' postFixup = ''
@ -155,6 +165,7 @@ llvmPackages.stdenv.mkDerivation (finalAttrs: {
]; ];
mainProgram = "pcsx2-qt"; mainProgram = "pcsx2-qt";
maintainers = with lib.maintainers; [ maintainers = with lib.maintainers; [
_0david0mp
hrdinka hrdinka
govanify govanify
matteopacini matteopacini

View File

@ -15,14 +15,14 @@
python3Packages.buildPythonApplication rec { python3Packages.buildPythonApplication rec {
pname = "pmbootstrap"; pname = "pmbootstrap";
version = "3.5.0"; version = "3.5.2";
pyproject = true; pyproject = true;
src = fetchFromGitLab { src = fetchFromGitLab {
owner = "postmarketOS"; owner = "postmarketOS";
repo = "pmbootstrap"; repo = "pmbootstrap";
tag = version; tag = version;
hash = "sha256-wdJl7DrSm1Jht0KEqZ9+qjqlkE+Y6oBdzEHTCgIGJ84="; hash = "sha256-fkzDVMO0huAuJDJIt0dyNGnRD6Go7XZ/YRv/JMtlbss=";
domain = "gitlab.postmarketos.org"; domain = "gitlab.postmarketos.org";
}; };

View File

@ -34,12 +34,15 @@ stdenv.mkDerivation (finalAttrs: {
buildInputs = [ libX11 ]; buildInputs = [ libX11 ];
makeFlags = [ "PREFIX=$(out)" ]; makeFlags = [
"PREFIX=$(out)"
"CC=${stdenv.cc.targetPrefix}cc" # fix darwin and cross-compiled builds
];
meta = { meta = {
homepage = "http://www.newbreedsoftware.com/3dpong/"; homepage = "http://www.newbreedsoftware.com/3dpong/";
description = "One or two player 3d sports game based on Pong from Atari"; description = "One or two player 3d sports game based on Pong from Atari";
license = lib.licenses.gpl2Plus; license = lib.licenses.gpl2Plus;
platforms = lib.platforms.linux; platforms = lib.platforms.unix;
}; };
}) })

View File

@ -2,13 +2,17 @@
lib, lib,
stdenv, stdenv,
fetchurl, fetchurl,
makeWrapper, makeBinaryWrapper,
jdk11, jre11_minimal,
unzip, jdk11_headless,
versionCheckHook, versionCheckHook,
nix-update-script, nix-update-script,
}: }:
let
jre11_minimal_headless = jre11_minimal.override {
jdk = jdk11_headless;
};
in
stdenv.mkDerivation (finalAttrs: { stdenv.mkDerivation (finalAttrs: {
pname = "rundeck-cli"; pname = "rundeck-cli";
version = "2.0.9"; version = "2.0.9";
@ -18,8 +22,8 @@ stdenv.mkDerivation (finalAttrs: {
hash = "sha256-c6QAgwyRCtoOlS7DEmjyK3BwHV122bilL6H+Hzrv2dQ="; hash = "sha256-c6QAgwyRCtoOlS7DEmjyK3BwHV122bilL6H+Hzrv2dQ=";
}; };
nativeBuildInputs = [ makeWrapper ]; nativeBuildInputs = [ makeBinaryWrapper ];
buildInputs = [ jdk11 ]; buildInputs = [ jre11_minimal_headless ];
dontUnpack = true; dontUnpack = true;
@ -30,7 +34,7 @@ stdenv.mkDerivation (finalAttrs: {
cp $src $out/share/rundeck-cli/rundeck-cli.jar cp $src $out/share/rundeck-cli/rundeck-cli.jar
mkdir -p $out/bin mkdir -p $out/bin
makeWrapper ${lib.getExe jdk11} $out/bin/rd \ makeWrapper ${lib.getExe jre11_minimal_headless} $out/bin/rd \
--add-flags "-jar $out/share/rundeck-cli/rundeck-cli.jar" --add-flags "-jar $out/share/rundeck-cli/rundeck-cli.jar"
runHook postInstall runHook postInstall

View File

@ -94,7 +94,6 @@ stdenv.mkDerivation {
license = licenses.agpl3Plus; license = licenses.agpl3Plus;
platforms = platforms.linux; platforms = platforms.linux;
maintainers = with maintainers; [ maintainers = with maintainers; [
schmittlauch
melvyn2 melvyn2
]; ];
mainProgram = "seaf-server"; mainProgram = "seaf-server";

View File

@ -80,7 +80,6 @@ python3.pkgs.buildPythonApplication rec {
homepage = "https://github.com/haiwen/seahub"; homepage = "https://github.com/haiwen/seahub";
license = lib.licenses.asl20; license = lib.licenses.asl20;
maintainers = with lib.maintainers; [ maintainers = with lib.maintainers; [
schmittlauch
melvyn2 melvyn2
]; ];
platforms = lib.platforms.linux; platforms = lib.platforms.linux;

View File

@ -4,6 +4,10 @@
fetchFromGitHub, fetchFromGitHub,
xxd, xxd,
zlib, zlib,
llvmPackages,
star,
testers,
nix-update-script,
}: }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
@ -20,31 +24,48 @@ stdenv.mkDerivation rec {
sourceRoot = "${src.name}/source"; sourceRoot = "${src.name}/source";
postPatch = '' postPatch = ''
substituteInPlace Makefile --replace "/bin/rm" "rm" substituteInPlace Makefile --replace-fail "-std=c++11" "-std=c++14"
''; '';
nativeBuildInputs = [ xxd ]; nativeBuildInputs = [ xxd ];
buildInputs = [ zlib ]; buildInputs = [ zlib ] ++ lib.optionals stdenv.isDarwin [ llvmPackages.openmp ];
enableParallelBuilding = true;
makeFlags = lib.optionals stdenv.hostPlatform.isAarch64 [ "CXXFLAGS_SIMD=" ];
preBuild = lib.optionalString stdenv.isDarwin ''
export CXXFLAGS="$CXXFLAGS -DSHM_NORESERVE=0"
'';
buildFlags = [ buildFlags = [
"STAR" "STAR"
"STARlong" "STARlong"
]; ];
enableParallelBuilding = true;
installPhase = '' installPhase = ''
runHook preInstall runHook preInstall
install -D STAR STARlong -t $out/bin install -D STAR STARlong -t $out/bin
runHook postInstall runHook postInstall
''; '';
passthru.tests.version = testers.testVersion {
package = star;
command = "STAR --version";
};
passthru.updateScript = nix-update-script { };
meta = with lib; { meta = with lib; {
description = "Spliced Transcripts Alignment to a Reference"; description = "Spliced Transcripts Alignment to a Reference";
longDescription = ''
STAR (Spliced Transcripts Alignment to a Reference) is a fast RNA-seq
read mapper, with support for splice-junction and fusion read detection.
'';
homepage = "https://github.com/alexdobin/STAR"; homepage = "https://github.com/alexdobin/STAR";
license = licenses.gpl3Plus; license = licenses.gpl3Plus;
platforms = [ "x86_64-linux" ]; platforms = platforms.unix;
maintainers = [ maintainers.arcadio ]; maintainers = [ maintainers.arcadio ];
}; };
} }

View File

@ -39,7 +39,7 @@ stdenv.mkDerivation rec {
homepage = "http://www.newbreedsoftware.com/teetertorture/"; homepage = "http://www.newbreedsoftware.com/teetertorture/";
description = "Simple shooting game with your cannon is sitting atop a teeter totter"; description = "Simple shooting game with your cannon is sitting atop a teeter totter";
license = lib.licenses.gpl2Plus; license = lib.licenses.gpl2Plus;
platforms = lib.platforms.linux; inherit (SDL.meta) platforms;
mainProgram = "teetertorture"; mainProgram = "teetertorture";
}; };
} }

View File

@ -32,6 +32,6 @@ stdenv.mkDerivation rec {
description = "Clone of the classic arcade game Asteroids by Atari"; description = "Clone of the classic arcade game Asteroids by Atari";
mainProgram = "vectoroids"; mainProgram = "vectoroids";
license = lib.licenses.gpl2Plus; license = lib.licenses.gpl2Plus;
platforms = lib.platforms.linux; inherit (SDL.meta) platforms;
}; };
} }

View File

@ -7,17 +7,17 @@
rustPlatform.buildRustPackage rec { rustPlatform.buildRustPackage rec {
pname = "wttrbar"; pname = "wttrbar";
version = "0.12.0"; version = "0.12.1";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "bjesus"; owner = "bjesus";
repo = "wttrbar"; repo = "wttrbar";
rev = version; rev = version;
hash = "sha256-+M0s6v9ULf+D2pPOE8KlHoyV+jBMbPsAXpYxGjms5DY="; hash = "sha256-+EyjZZpDktkYbxy3YXAtuW3A0bEFKFa+UuRvIzUEISM=";
}; };
useFetchCargoVendor = true; useFetchCargoVendor = true;
cargoHash = "sha256-sv9hSTmq5J6s0PPBMJgaMUWBaRk0/NJV41nNDIj6MoY="; cargoHash = "sha256-AXyt5z1d26si7qLZgd7dWrHOOJBvK75B29/LJj7bpAo=";
passthru.updateScript = nix-update-script { }; passthru.updateScript = nix-update-script { };

View File

@ -35,11 +35,11 @@
stdenv.mkDerivation (finalAttrs: { stdenv.mkDerivation (finalAttrs: {
pname = "xscreensaver"; pname = "xscreensaver";
version = "6.10.1"; version = "6.11";
src = fetchurl { src = fetchurl {
url = "https://www.jwz.org/xscreensaver/xscreensaver-${finalAttrs.version}.tar.gz"; url = "https://www.jwz.org/xscreensaver/xscreensaver-${finalAttrs.version}.tar.gz";
hash = "sha256-/+WZ+c93r6Ru+427e1YejaDDFW3qZLY14Lfiwg9Ls+0="; hash = "sha256-lIi3ouZVkSh7lEMB8x+WjXcX/5vGswmJ46vtZiyH4eg=";
}; };
outputs = [ outputs = [

View File

@ -7,38 +7,43 @@
modules ? [ "java.base" ], modules ? [ "java.base" ],
}: }:
let stdenv.mkDerivation (finalAttrs: {
jre = stdenv.mkDerivation { pname = "${jdk.pname}-minimal-jre";
pname = "${jdk.pname}-minimal-jre"; version = jdk.version;
version = jdk.version;
nativeBuildInputs = [ jdkOnBuild ]; nativeBuildInputs = [ jdkOnBuild ];
buildInputs = [ jdk ]; buildInputs = [ jdk ];
strictDeps = true; strictDeps = true;
dontUnpack = true; dontUnpack = true;
# Strip more heavily than the default '-S', since if you're # Strip more heavily than the default '-S', since if you're
# using this derivation you probably care about this. # using this derivation you probably care about this.
stripDebugFlags = [ "--strip-unneeded" ]; stripDebugFlags = [ "--strip-unneeded" ];
buildPhase = '' buildPhase = ''
runHook preBuild runHook preBuild
jlink --module-path ${jdk}/lib/openjdk/jmods --add-modules ${lib.concatStringsSep "," modules} --output $out jlink --module-path ${jdk}/lib/openjdk/jmods --add-modules ${lib.concatStringsSep "," modules} --output $out
runHook postBuild runHook postBuild
''; '';
dontInstall = true; dontInstall = true;
passthru = { passthru = {
home = "${jre}"; home = "${finalAttrs.finalPackage}";
tests = { tests = {
jre_minimal-hello = callPackage ./tests/test_jre_minimal.nix { }; jre_minimal-hello = callPackage ./tests/test_jre_minimal.nix { };
jre_minimal-hello-logging = callPackage ./tests/test_jre_minimal_with_logging.nix { }; jre_minimal-hello-logging = callPackage ./tests/test_jre_minimal_with_logging.nix { };
};
}; };
}; };
in
jre meta = jdk.meta // {
description = "Minimal JRE for OpenJDK ${jdk.version}";
longDescription = ''
This is a minimal JRE built from OpenJDK, containing only the specified modules.
It is suitable for running Java applications that do not require the full JDK.
'';
};
})

View File

@ -34,32 +34,17 @@ mkCoqDerivation {
repo = "VST"; repo = "VST";
inherit version; inherit version;
defaultVersion = defaultVersion =
let
case = case: out: { inherit case out; };
in
with lib.versions; with lib.versions;
lib.switch coq.coq-version [ lib.switch coq.coq-version [
{ (case (range "8.19" "8.20") "2.15")
case = range "8.19" "8.20"; (case (range "8.15" "8.19") "2.14")
out = "2.15"; (case (range "8.15" "8.17") "2.13")
} (case (range "8.14" "8.16") "2.10")
{ (case (range "8.13" "8.15") "2.9")
case = range "8.15" "8.19"; (case (range "8.12" "8.13") "2.8")
out = "2.14";
}
{
case = range "8.15" "8.17";
out = "2.13";
}
{
case = range "8.14" "8.16";
out = "2.10";
}
{
case = range "8.13" "8.15";
out = "2.9";
}
{
case = range "8.12" "8.13";
out = "2.8";
}
] null; ] null;
release."2.15".sha256 = "sha256-51k2W4efMaEO4nZ0rdkRT9rA8ZJLpot1YpFmd6RIAXw="; release."2.15".sha256 = "sha256-51k2W4efMaEO4nZ0rdkRT9rA8ZJLpot1YpFmd6RIAXw=";
release."2.14".sha256 = "sha256-NHc1ZQ2VmXZy4lK2+mtyeNz1Qr9Nhj2QLxkPhhQB7Iw="; release."2.14".sha256 = "sha256-NHc1ZQ2VmXZy4lK2+mtyeNz1Qr9Nhj2QLxkPhhQB7Iw=";
@ -73,19 +58,28 @@ mkCoqDerivation {
buildInputs = [ ITree ]; buildInputs = [ ITree ];
propagatedBuildInputs = [ compcert ]; propagatedBuildInputs = [ compcert ];
preConfigure = '' preConfigure =
patchShebangs util ''
substituteInPlace Makefile \ patchShebangs util
--replace 'COQVERSION= ' 'COQVERSION= 8.20.1 or-else 8.19.2 or-else 8.17.1 or-else 8.16.1 or-else 8.16.0 or-else 8.15.2 or-else 8.15.1 or-else '\ ''
--replace 'FLOYD_FILES=' 'FLOYD_FILES= ${toString extra_floyd_files}' +
''; lib.optionalString
(coq.coq-version != null && coq.coq-version != "dev" && lib.versions.isLe "8.20" coq.coq-version)
''
substituteInPlace Makefile \
--replace-fail 'COQVERSION= ' 'COQVERSION= 8.20.1 or-else 8.19.2 or-else 8.17.1 or-else 8.16.1 or-else 8.16.0 or-else 8.15.2 or-else 8.15.1 or-else '\
--replace-fail 'FLOYD_FILES=' 'FLOYD_FILES= ${toString extra_floyd_files}'
'';
makeFlags = [ makeFlags =
"BITSIZE=64" [
"COMPCERT=inst_dir" "BITSIZE=64"
"COMPCERT_INST_DIR=${compcert.lib}/lib/coq/${coq.coq-version}/user-contrib/compcert" "COMPCERT=inst_dir"
"INSTALLDIR=$(out)/lib/coq/${coq.coq-version}/user-contrib/VST" "COMPCERT_INST_DIR=${compcert.lib}/lib/coq/${coq.coq-version}/user-contrib/compcert"
]; "INSTALLDIR=$(out)/lib/coq/${coq.coq-version}/user-contrib/VST"
]
++ lib.optional (coq.coq-version == "dev") "IGNORECOQVERSION=true"
++ lib.optional (coq.coq-version == "dev") "IGNORECOMPCERTVERSION=true";
postInstall = '' postInstall = ''
for d in msl veric floyd sepcomp progs64 for d in msl veric floyd sepcomp progs64

View File

@ -91,7 +91,7 @@ stdenv.mkDerivation (finalAttrs: {
[ [
findXMLCatalogs findXMLCatalogs
] ]
++ lib.optionals stdenv.hostPlatform.isDarwin [ ++ lib.optionals (stdenv.hostPlatform.isDarwin || stdenv.hostPlatform.isMinGW) [
libiconv libiconv
] ]
++ lib.optionals icuSupport [ ++ lib.optionals icuSupport [

View File

@ -7,13 +7,13 @@
(php.withExtensions ({ enabled, all }: enabled ++ (with all; [ ast ]))).buildComposerProject (php.withExtensions ({ enabled, all }: enabled ++ (with all; [ ast ]))).buildComposerProject
(finalAttrs: { (finalAttrs: {
pname = "phan"; pname = "phan";
version = "5.4.6"; version = "5.5.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "phan"; owner = "phan";
repo = "phan"; repo = "phan";
rev = finalAttrs.version; rev = finalAttrs.version;
hash = "sha256-627Vc8jFrC2wifvGoZ18w72mp43myk4/adyJR28sFEw="; hash = "sha256-jWlxBCfkN5nTd3nEwRLobDuxnJirk53ChSw59rj4gq0=";
}; };
vendorHash = "sha256-Ake5/7IyoweC2ONDuWt9jJSbG0JbnU9lmCRu2p6uUQM="; vendorHash = "sha256-Ake5/7IyoweC2ONDuWt9jJSbG0JbnU9lmCRu2p6uUQM=";

View File

@ -359,7 +359,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "boto3-stubs"; pname = "boto3-stubs";
version = "1.38.46"; version = "1.39.2";
pyproject = true; pyproject = true;
disabled = pythonOlder "3.7"; disabled = pythonOlder "3.7";
@ -367,7 +367,7 @@ buildPythonPackage rec {
src = fetchPypi { src = fetchPypi {
pname = "boto3_stubs"; pname = "boto3_stubs";
inherit version; inherit version;
hash = "sha256-UmeJ/B9Kb4nzckJNyaQQkpb2vRivqxq/XSgalPXPt3A="; hash = "sha256-sfG67xZYvVdaKcqFzAh327Ot6zdv+oy/JCuHZxmuD5U=";
}; };
build-system = [ setuptools ]; build-system = [ setuptools ];

View File

@ -10,7 +10,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "botocore-stubs"; pname = "botocore-stubs";
version = "1.38.30"; version = "1.38.46";
pyproject = true; pyproject = true;
disabled = pythonOlder "3.7"; disabled = pythonOlder "3.7";
@ -18,7 +18,7 @@ buildPythonPackage rec {
src = fetchPypi { src = fetchPypi {
pname = "botocore_stubs"; pname = "botocore_stubs";
inherit version; inherit version;
hash = "sha256-KR1785oxbACopVtyVUibAsDOoaNDSC53hOjR4jW66ZU="; hash = "sha256-oE5pdmq4uuM4kRwYl0kviNBc1InNdfBubrTxNfnajHs=";
}; };
nativeBuildInputs = [ setuptools ]; nativeBuildInputs = [ setuptools ];

View File

@ -40,7 +40,6 @@ buildPythonPackage rec {
changelog = "https://github.com/jazzband/django-formtools/blob/master/docs/changelog.rst"; changelog = "https://github.com/jazzband/django-formtools/blob/master/docs/changelog.rst";
license = licenses.bsd3; license = licenses.bsd3;
maintainers = with maintainers; [ maintainers = with maintainers; [
schmittlauch
]; ];
}; };
} }

View File

@ -60,7 +60,6 @@ buildPythonPackage rec {
license = licenses.mit; license = licenses.mit;
maintainers = with maintainers; [ maintainers = with maintainers; [
mrmebelman mrmebelman
schmittlauch
]; ];
}; };
} }

View File

@ -48,7 +48,6 @@ buildPythonPackage rec {
homepage = "https://github.com/zyegfryed/django-statici18n"; homepage = "https://github.com/zyegfryed/django-statici18n";
license = licenses.bsd3; license = licenses.bsd3;
maintainers = with maintainers; [ maintainers = with maintainers; [
schmittlauch
]; ];
}; };
} }

View File

@ -0,0 +1,37 @@
{
lib,
buildPythonPackage,
fetchFromGitHub,
setuptools,
pytestCheckHook,
nix-update-script,
}:
buildPythonPackage rec {
pname = "dowhen";
version = "0.1.0";
pyproject = true;
src = fetchFromGitHub {
owner = "gaogaotiantian";
repo = "dowhen";
tag = version;
hash = "sha256-7eoNe9SvE39J4mwIOxvbU1oh/L7tr/QM1uuBDqWtQu0=";
};
build-system = [ setuptools ];
nativeCheckInputs = [ pytestCheckHook ];
pythonImportsCheck = [ "dowhen" ];
passthru.updateScript = nix-update-script { };
meta = {
description = "Intuitive and low-overhead instrumentation tool for Python";
homepage = "https://github.com/gaogaotiantian/dowhen";
changelog = "https://github.com/gaogaotiantian/dowhen/releases/tag/${version}";
license = lib.licenses.asl20;
maintainers = with lib.maintainers; [ moraxyc ];
};
}

View File

@ -14,7 +14,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "signxml"; pname = "signxml";
version = "4.0.5"; version = "4.1.0";
pyproject = true; pyproject = true;
disabled = pythonOlder "3.7"; disabled = pythonOlder "3.7";
@ -23,7 +23,7 @@ buildPythonPackage rec {
owner = "XML-Security"; owner = "XML-Security";
repo = "signxml"; repo = "signxml";
tag = "v${version}"; tag = "v${version}";
hash = "sha256-dO7erKXyX/3qwWVC1laABOb+0yAkCy51rrnG1opL6pY="; hash = "sha256-yNxqU5sg2xANCKLkaWYn1sr1SWQLPVfu9Jg3VF6Qf28=";
}; };
build-system = [ build-system = [
@ -47,7 +47,7 @@ buildPythonPackage rec {
meta = with lib; { meta = with lib; {
description = "Python XML Signature and XAdES library"; description = "Python XML Signature and XAdES library";
homepage = "https://github.com/XML-Security/signxml"; homepage = "https://github.com/XML-Security/signxml";
changelog = "https://github.com/XML-Security/signxml/blob/${src.rev}/Changes.rst"; changelog = "https://github.com/XML-Security/signxml/blob/${src.tag}/Changes.rst";
license = licenses.asl20; license = licenses.asl20;
maintainers = with maintainers; [ fab ]; maintainers = with maintainers; [ fab ];
}; };

View File

@ -10,7 +10,7 @@
buildPythonPackage rec { buildPythonPackage rec {
pname = "tencentcloud-sdk-python"; pname = "tencentcloud-sdk-python";
version = "3.0.1410"; version = "3.0.1411";
pyproject = true; pyproject = true;
disabled = pythonOlder "3.9"; disabled = pythonOlder "3.9";
@ -19,7 +19,7 @@ buildPythonPackage rec {
owner = "TencentCloud"; owner = "TencentCloud";
repo = "tencentcloud-sdk-python"; repo = "tencentcloud-sdk-python";
tag = version; tag = version;
hash = "sha256-egpsFSYD5S+a3BcJ/4MElyJYyB5ziNY2CxvzbWGL7PM="; hash = "sha256-YFqv7BIl7sOpGaRyMUTqiiT6w0kb7G0Xe5c3R/jPgUA=";
}; };
build-system = [ setuptools ]; build-system = [ setuptools ];

View File

@ -2,25 +2,25 @@
lib, lib,
buildPythonPackage, buildPythonPackage,
fetchPypi, fetchPypi,
pythonOlder,
requests, requests,
setuptools,
}: }:
buildPythonPackage rec { buildPythonPackage rec {
pname = "wavinsentio"; pname = "wavinsentio";
version = "0.4.1"; version = "0.5.0";
format = "setuptools"; pyproject = true;
disabled = pythonOlder "3.8";
src = fetchPypi { src = fetchPypi {
inherit pname version; inherit pname version;
hash = "sha256-Oko3Ivj95vajNWjQTQK18i5B/DIBngjw2HLlzYqLv2Y="; hash = "sha256-YSofEjDehuNlenkAsQzLkX67Um4pkMSeZmVZgNA06vw=";
}; };
propagatedBuildInputs = [ requests ]; build-system = [ setuptools ];
# Project has no tests dependencies = [ requests ];
# Module has no tests
doCheck = false; doCheck = false;
pythonImportsCheck = [ "wavinsentio" ]; pythonImportsCheck = [ "wavinsentio" ];
@ -28,7 +28,7 @@ buildPythonPackage rec {
meta = with lib; { meta = with lib; {
description = "Python module to interact with the Wavin Sentio underfloor heating system"; description = "Python module to interact with the Wavin Sentio underfloor heating system";
homepage = "https://github.com/djerik/wavinsentio"; homepage = "https://github.com/djerik/wavinsentio";
license = with licenses; [ mit ]; license = licenses.mit;
maintainers = with maintainers; [ fab ]; maintainers = with maintainers; [ fab ];
}; };
} }

View File

@ -4,6 +4,7 @@
fetchFromGitHub, fetchFromGitHub,
aiofiles, aiofiles,
shapely, shapely,
paho-mqtt,
pytestCheckHook, pytestCheckHook,
pytest-homeassistant-custom-component, pytest-homeassistant-custom-component,
pytest-freezer, pytest-freezer,
@ -12,25 +13,23 @@
buildHomeAssistantComponent rec { buildHomeAssistantComponent rec {
owner = "amitfin"; owner = "amitfin";
domain = "oref_alert"; domain = "oref_alert";
version = "2.22.1"; version = "3.1.3";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "amitfin"; owner = "amitfin";
repo = "oref_alert"; repo = "oref_alert";
tag = "v${version}"; tag = "v${version}";
hash = "sha256-OO3My8U8SCmhaJQI7y0kxVKj/stvfp3pdqhFdTCcIWs="; hash = "sha256-Mr9zNq5KMuzwRAGoxi0P7ruYpKHoxy/DQWWjCisn7tA=";
}; };
postPatch = ''
substituteInPlace custom_components/oref_alert/manifest.json \
--replace-fail shapely==2.0.7 shapely
'';
dependencies = [ dependencies = [
aiofiles aiofiles
shapely shapely
paho-mqtt
]; ];
ignoreVersionRequirement = [ "shapely" ];
nativeCheckInputs = [ nativeCheckInputs = [
pytestCheckHook pytestCheckHook
pytest-homeassistant-custom-component pytest-homeassistant-custom-component

View File

@ -40,7 +40,6 @@
docbook_xml_dtd_412, docbook_xml_dtd_412,
docbook_xml_dtd_42, docbook_xml_dtd_42,
docbook_xml_dtd_43, docbook_xml_dtd_43,
openconnect,
curl, curl,
meson, meson,
mesonEmulatorHook, mesonEmulatorHook,
@ -130,7 +129,6 @@ stdenv.mkDerivation (finalAttrs: {
(replaceVars ./fix-paths.patch { (replaceVars ./fix-paths.patch {
inherit inherit
iputils iputils
openconnect
ethtool ethtool
gnused gnused
; ;

View File

@ -11,10 +11,10 @@ index 148acade5c..6395fbfbe5 100644
LABEL="nm_drivers_end" LABEL="nm_drivers_end"
diff --git a/src/core/devices/nm-device.c b/src/core/devices/nm-device.c diff --git a/src/core/devices/nm-device.c b/src/core/devices/nm-device.c
index f3441508ab..7cde8d7d39 100644 index e310a9c680..ed8d838e43 100644
--- a/src/core/devices/nm-device.c --- a/src/core/devices/nm-device.c
+++ b/src/core/devices/nm-device.c +++ b/src/core/devices/nm-device.c
@@ -14839,14 +14839,14 @@ nm_device_start_ip_check(NMDevice *self) @@ -15239,14 +15239,14 @@ nm_device_start_ip_check(NMDevice *self)
gw = nm_l3_config_data_get_best_default_route(l3cd, AF_INET); gw = nm_l3_config_data_get_best_default_route(l3cd, AF_INET);
if (gw) { if (gw) {
nm_inet4_ntop(NMP_OBJECT_CAST_IP4_ROUTE(gw)->gateway, buf); nm_inet4_ntop(NMP_OBJECT_CAST_IP4_ROUTE(gw)->gateway, buf);
@ -32,7 +32,7 @@ index f3441508ab..7cde8d7d39 100644
} }
} }
diff --git a/src/libnmc-base/nm-vpn-helpers.c b/src/libnmc-base/nm-vpn-helpers.c diff --git a/src/libnmc-base/nm-vpn-helpers.c b/src/libnmc-base/nm-vpn-helpers.c
index cbe76f5f1c..8515f94994 100644 index cbe76f5f1c..6ec684f9fe 100644
--- a/src/libnmc-base/nm-vpn-helpers.c --- a/src/libnmc-base/nm-vpn-helpers.c
+++ b/src/libnmc-base/nm-vpn-helpers.c +++ b/src/libnmc-base/nm-vpn-helpers.c
@@ -284,15 +284,6 @@ nm_vpn_openconnect_authenticate_helper(NMSettingVpn *s_vpn, GPtrArray *secrets, @@ -284,15 +284,6 @@ nm_vpn_openconnect_authenticate_helper(NMSettingVpn *s_vpn, GPtrArray *secrets,
@ -51,7 +51,7 @@ index cbe76f5f1c..8515f94994 100644
const char *oc_argv[(12 + 2 * G_N_ELEMENTS(oc_property_args))]; const char *oc_argv[(12 + 2 * G_N_ELEMENTS(oc_property_args))];
const char *gw; const char *gw;
int port; int port;
@@ -311,15 +302,7 @@ nm_vpn_openconnect_authenticate_helper(NMSettingVpn *s_vpn, GPtrArray *secrets, @@ -311,13 +302,8 @@ nm_vpn_openconnect_authenticate_helper(NMSettingVpn *s_vpn, GPtrArray *secrets,
port = extract_url_port(gw); port = extract_url_port(gw);
@ -62,9 +62,8 @@ index cbe76f5f1c..8515f94994 100644
- NULL, - NULL,
- NULL, - NULL,
- error); - error);
- if (!path) + path = g_find_program_in_path("openconnect");
- return FALSE; +
+ path = "@openconnect@/bin/openconnect"; if (!path)
return FALSE;
oc_argv[oc_argc++] = path;
oc_argv[oc_argc++] = "--authenticate";

View File

@ -1385,6 +1385,7 @@ mapAliases {
or for all fonts or for all fonts
fonts.packages = [ ... ] ++ builtins.filter lib.attrsets.isDerivation (builtins.attrValues pkgs.nerd-fonts) fonts.packages = [ ... ] ++ builtins.filter lib.attrsets.isDerivation (builtins.attrValues pkgs.nerd-fonts)
''; # Added 2024-11-09 ''; # Added 2024-11-09
networkmanager_strongswan = networkmanager-strongswan; # added 2025-06-29
newlibCross = newlib; # Added 2024-09-06 newlibCross = newlib; # Added 2024-09-06
newlib-nanoCross = newlib-nano; # Added 2024-09-06 newlib-nanoCross = newlib-nano; # Added 2024-09-06
nix-direnv-flakes = nix-direnv; nix-direnv-flakes = nix-direnv;

View File

@ -5668,6 +5668,10 @@ with pkgs;
jre = jdk; jre = jdk;
jre_headless = jdk_headless; jre_headless = jdk_headless;
jre11_minimal = callPackage ../development/compilers/openjdk/jre.nix {
jdk = jdk11;
jdkOnBuild = buildPackages.jdk11;
};
jre17_minimal = callPackage ../development/compilers/openjdk/jre.nix { jre17_minimal = callPackage ../development/compilers/openjdk/jre.nix {
jdk = jdk17; jdk = jdk17;
jdkOnBuild = buildPackages.jdk17; jdkOnBuild = buildPackages.jdk17;

View File

@ -4234,6 +4234,8 @@ self: super: with self; {
doubleratchet = callPackage ../development/python-modules/doubleratchet { }; doubleratchet = callPackage ../development/python-modules/doubleratchet { };
dowhen = callPackage ../development/python-modules/dowhen { };
downloader-cli = callPackage ../development/python-modules/downloader-cli { }; downloader-cli = callPackage ../development/python-modules/downloader-cli { };
doxmlparser = callPackage ../development/tools/documentation/doxygen/doxmlparser.nix { }; doxmlparser = callPackage ../development/tools/documentation/doxygen/doxmlparser.nix { };