Merge master into staging-next

This commit is contained in:
nixpkgs-ci[bot] 2025-07-06 00:19:50 +00:00 committed by GitHub
commit 0aa7b55674
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
89 changed files with 305 additions and 262 deletions

View File

@ -23,6 +23,7 @@ rec {
ppc64-elfv1 = {
config = "powerpc64-unknown-linux-gnuabielfv1";
rust.rustcTarget = "powerpc64-unknown-linux-gnu";
};
ppc64-elfv2 = {
config = "powerpc64-unknown-linux-gnuabielfv2";

View File

@ -20292,23 +20292,6 @@
githubId = 1304102;
name = "Pavan Rikhi";
};
primeos = {
email = "dev.primeos@gmail.com";
matrix = "@primeos:matrix.org";
github = "primeos";
githubId = 7537109;
name = "Michael Weiss";
keys = [
{
# Git only
fingerprint = "86A7 4A55 07D0 58D1 322E 37FD 1308 26A6 C2A3 89FD";
}
{
# Email, etc.
fingerprint = "AF85 991C C950 49A2 4205 1933 BCA9 943D D1DF 4C04";
}
];
};
prince213 = {
name = "Sizhe Zhao";
email = "prc.zhao@outlook.com";

View File

@ -4,7 +4,7 @@ let
cfg = config.programs.fuse;
in
{
meta.maintainers = with lib.maintainers; [ primeos ];
meta.maintainers = with lib.maintainers; [ ];
options.programs.fuse = {
mountMax = lib.mkOption {

View File

@ -205,7 +205,5 @@ in
]
);
meta.maintainers = with lib.maintainers; [
primeos
];
meta.maintainers = with lib.maintainers; [ ];
}

View File

@ -27,5 +27,5 @@ in
};
};
meta.maintainers = with lib.maintainers; [ primeos ];
meta.maintainers = with lib.maintainers; [ ];
}

View File

@ -692,67 +692,23 @@ in
environment.etc."dovecot/dovecot.conf".source = cfg.configFile;
systemd.services.dovecot = {
aliases = [ "dovecot2.service" ];
systemd.services.dovecot2 = {
description = "Dovecot IMAP/POP3 server";
documentation = [
"man:dovecot(1)"
"https://doc.dovecot.org"
];
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
restartTriggers = [ cfg.configFile ];
restartTriggers = [
cfg.configFile
];
startLimitIntervalSec = 60; # 1 min
serviceConfig = {
Type = "notify";
ExecStart = "${dovecotPkg}/sbin/dovecot -F";
ExecReload = "${dovecotPkg}/sbin/doveadm reload";
CapabilityBoundingSet = [
"CAP_CHOWN"
"CAP_DAC_OVERRIDE"
"CAP_FOWNER"
"CAP_NET_BIND_SERVICE"
"CAP_SETGID"
"CAP_SETUID"
"CAP_SYS_CHROOT"
"CAP_SYS_RESOURCE"
];
LockPersonality = true;
MemoryDenyWriteExecute = true;
NoNewPrivileges = true;
OOMPolicy = "continue";
PrivateTmp = true;
ProcSubset = "pid";
ProtectClock = true;
ProtectControlGroups = true;
ProtectHome = lib.mkDefault false;
ProtectHostname = true;
ProtectKernelLogs = true;
ProtectKernelModules = true;
ProtectKernelTunables = true;
ProtectProc = "invisible";
ProtectSystem = "full";
PrivateDevices = true;
Restart = "on-failure";
RestartSec = "1s";
RestrictAddressFamilies = [
"AF_INET"
"AF_INET6"
"AF_UNIX"
];
RestrictNamespaces = true;
RestrictRealtime = true;
RestrictSUIDSGID = false; # sets sgid on maildirs
RuntimeDirectory = [ "dovecot2" ];
SystemCallArchitectures = "native";
SystemCallFilter = [
"@system-service @resources"
"~@privileged"
"@chown @setuid capset chroot"
];
};
# When copying sieve scripts preserve the original time stamp

View File

@ -91,13 +91,27 @@ let
mkUnits =
prefix: name: fs:
let
mountUnit = "${utils.escapeSystemdPath (prefix + (lib.removeSuffix "/" fs.mountPoint))}.mount";
device = firstDevice fs;
parseTags =
device:
if lib.hasPrefix "LABEL=" device then
"/dev/disk/by-label/" + lib.removePrefix "LABEL=" device
else if lib.hasPrefix "UUID=" device then
"/dev/disk/by-uuid/" + lib.removePrefix "UUID=" device
else if lib.hasPrefix "PARTLABEL=" device then
"/dev/disk/by-partlabel/" + lib.removePrefix "PARTLABEL=" device
else if lib.hasPrefix "PARTUUID=" device then
"/dev/disk/by-partuuid/" + lib.removePrefix "PARTUUID=" device
else if lib.hasPrefix "ID=" device then
"/dev/disk/by-id/" + lib.removePrefix "ID=" device
else
device;
device = parseTags (firstDevice fs);
mkDeviceUnit = device: "${utils.escapeSystemdPath device}.device";
mkMountUnit = path: "${utils.escapeSystemdPath (lib.removeSuffix "/" path)}.mount";
deviceUnit = mkDeviceUnit device;
mountUnit = mkMountUnit (prefix + fs.mountPoint);
extractProperty =
prop: options: (map (lib.removePrefix "${prop}=") (builtins.filter (lib.hasPrefix prop) options));
mkMountUnit = path: "${utils.escapeSystemdPath path}.mount";
normalizeUnits =
unit:
if lib.hasPrefix "/dev/" unit then

View File

@ -47,7 +47,6 @@ mapAttrs (
{
maintainers = with maintainers; [
aszlig
primeos
];
}
// optionalAttrs (chromiumPkg.meta ? timeout) {

View File

@ -84,13 +84,11 @@
testScript = ''
machine.wait_for_unit("postfix.service")
machine.wait_for_unit("dovecot.service")
machine.wait_for_unit("dovecot2.service")
machine.succeed("send-testmail")
machine.succeed("send-lda")
machine.wait_until_fails('[ "$(postqueue -p)" != "Mail queue is empty" ]')
machine.succeed("test-imap")
machine.succeed("test-pop")
machine.log(machine.succeed("systemd-analyze security dovecot.service | grep -v "))
'';
}

View File

@ -1,27 +1,85 @@
{ lib, ... }:
{
name = "drupal";
let
nodes = {
machine_default =
{ pkgs, ... }:
{
services.drupal = {
"drupal_nginx" = _: {
services.drupal.webserver = "nginx";
services.drupal.enable = true;
services.drupal.sites = {
"site1.local" = {
database.tablePrefix = "site1_";
enable = true;
};
"site2.local" = {
database.tablePrefix = "site2_";
enable = true;
};
};
networking.firewall.allowedTCPPorts = [ 80 ];
networking.hosts."127.0.0.1" = [
"site1.local"
"site2.local"
];
};
"drupal_caddy" = _: {
services.drupal.enable = true;
services.drupal.webserver = "caddy";
services.drupal.sites = {
"site1.local" = {
enable = true;
database.tablePrefix = "site1_";
};
"site2.local" = {
enable = true;
database.tablePrefix = "site2_";
};
};
networking.firewall.allowedTCPPorts = [
80
443
];
networking.hosts."127.0.0.1" = [
"site1.local"
"site2.local"
];
};
};
testScript = ''
machine_default.start()
machine_default.wait_for_unit("phpfpm-drupal-localhost.service")
machine_default.wait_for_unit("nginx.service")
machine_default.wait_for_unit("mysql.service")
'';
in
{
name = "drupal";
meta.maintainers = [
lib.maintainers.drupol
lib.maintainers.OulipianSummer
];
inherit nodes;
testScript = ''
start_all()
${lib.concatStrings (
lib.mapAttrsToList (name: value: ''
${name}.wait_for_unit("${(value null).services.drupal.webserver}")
'') nodes
)}
site_names = ["site1.local", "site2.local"]
for machine in (${lib.concatStringsSep ", " (builtins.attrNames nodes)}):
for site_name in site_names:
machine.wait_for_unit(f"phpfpm-drupal-{site_name}")
with subtest("website returns welcome screen"):
assert "Choose language" in machine.succeed(f"curl -k -L {site_name}")
with subtest("website is installable"):
assert "Database configuration" in machine.succeed(f"curl -k -L \"{site_name}/core/install.php?langcode=en&profile=standard\"")
with subtest("drupal-state-init went through"):
info = machine.get_unit_info(f"drupal-state-init-{site_name}")
assert info["Result"] == "success"
'';
}

View File

@ -23,7 +23,6 @@ let
name = "hostname-${fqdn}";
meta = with pkgs.lib.maintainers; {
maintainers = [
primeos
blitz
];
};

View File

@ -15,7 +15,6 @@ in
meta = with pkgs.lib.maintainers; {
maintainers = [
flokli
primeos
];
};

View File

@ -3,7 +3,6 @@
name = "sway";
meta = {
maintainers = with lib.maintainers; [
primeos
synthetica
];
};

View File

@ -3,7 +3,7 @@
{
name = "tinywl";
meta = {
maintainers = with lib.maintainers; [ primeos ];
maintainers = with lib.maintainers; [ ];
};
nodes.machine =

View File

@ -36,25 +36,15 @@
stdenv.mkDerivation (finalAttrs: {
pname = "musescore";
version = "4.5.2";
version = "4.5.2-unstable-2025-07-03";
src = fetchFromGitHub {
owner = "musescore";
repo = "MuseScore";
rev = "v${finalAttrs.version}";
sha256 = "sha256-9jafh9zyf+tuC+WU6nQIMBVm+Gqqcig8jS2R1h/YnIo=";
rev = "0ff2476af4e16286ee9f7cf2322715273a0117e0";
sha256 = "sha256-0ixQfAyAyRmuIrlPosCV/VucKJYYvxjL2o4pkVb5Sd8=";
};
# Backport + additional patch to fix build on Qt 6.9
# FIXME: remove when no longer required
patches = [
(fetchpatch {
url = "https://github.com/musescore/MuseScore/commit/05056ed19520060c3912a09a3adfa0927057f956.patch";
hash = "sha256-50Hytuu2lQRbAI2JEwlKeMUmJxTUtfqgwru6U760hAY=";
})
./qt-6.9.patch
];
cmakeFlags = [
"-DMUSE_APP_BUILD_MODE=release"
# Disable the build and usage of the `/bin/crashpad_handler` utility - it's

View File

@ -1,13 +0,0 @@
diff --git a/src/palette/view/widgets/specialcharactersdialog.cpp b/src/palette/view/widgets/specialcharactersdialog.cpp
index 2fe07bdb8f..dfcae1ded7 100644
--- a/src/palette/view/widgets/specialcharactersdialog.cpp
+++ b/src/palette/view/widgets/specialcharactersdialog.cpp
@@ -712,7 +712,7 @@ void SpecialCharactersDialog::populateUnicode()
std::shared_ptr<FSymbol> fs = std::make_shared<FSymbol>(gpaletteScore->dummy());
fs->setCode(code);
fs->setFont(m_font);
- m_pUnicode->appendElement(fs, QString("0x%1").arg(code, 5, 16, QLatin1Char('0')));
+ m_pUnicode->appendElement(fs, QString("0x%1").arg((uint32_t)code, 5, 16, QLatin1Char('0')));
}
}

View File

@ -25,13 +25,13 @@ let
in
mkLibretroCore {
core = "scummvm";
version = "0-unstable-2025-06-03";
version = "0-unstable-2025-07-03";
src = fetchFromGitHub {
owner = "libretro";
repo = "scummvm";
rev = "55fcf4050ac1102638cd7975677f81ae1a2c2070";
hash = "sha256-GJqh34l7qC59l5zFnGGBeVIvyUCB9AfHKioqtCmjN2s=";
rev = "686cdd13719b92554fa46b264c512ca7deec7a96";
hash = "sha256-3w1rYVPX7ENGUgKdrFRQShWoEXfagxdtzd98m1hKeYU=";
};
extraBuildInputs = [

View File

@ -7,6 +7,7 @@
SDL2_ttf,
copyDesktopItems,
expat,
fetchpatch,
fetchurl,
flac,
fontconfig,
@ -112,12 +113,23 @@ stdenv.mkDerivation rec {
wrapQtAppsHook
];
patches = [
# by default MAME assumes that paths with stock resources are relative and
# that you run MAME changing to install directory, so we add absolute paths
# here
./001-use-absolute-paths.diff
];
patches =
[
# by default MAME assumes that paths with stock resources are relative and
# that you run MAME changing to install directory, so we add absolute paths
# here
./001-use-absolute-paths.diff
]
++ lib.optionals stdenv.hostPlatform.isDarwin [
# coreaudio_sound.cpp compares __MAC_OS_X_VERSION_MIN_REQUIRED to 1200
# instead of 120000, causing it to try to use a constant that isn't
# actually defined yet when targeting macOS 11 like Nixpkgs does.
# Backport mamedev/mame#13890 until the next time we update MAME.
(fetchpatch {
url = "https://patch-diff.githubusercontent.com/raw/mamedev/mame/pull/13890.patch";
hash = "sha256-Fqpw4fHEMns4tSSIjc1p36ss+J9Tc/O0cnN3HI/ratM=";
})
];
# Since the bug described in https://github.com/NixOS/nixpkgs/issues/135438,
# it is not possible to use substituteAll

View File

@ -184,7 +184,7 @@ rec {
longDescription = "Gammastep" + lib.removePrefix "Redshift" redshift.meta.longDescription;
homepage = "https://gitlab.com/chinstrap/gammastep";
mainProgram = "gammastep";
maintainers = (with lib.maintainers; [ primeos ]) ++ redshift.meta.maintainers;
maintainers = (with lib.maintainers; [ ]) ++ redshift.meta.maintainers;
};
};
}

View File

@ -18,13 +18,13 @@
"vendorHash": null
},
"acme": {
"hash": "sha256-GpuIh2wRLv95EIF6Jhw43DZEqtECeVD3XZxMq9Ro3+s=",
"hash": "sha256-/EY9I0o8vlc+J2KvMwCXApFwDfJuA0NqYraugnJ7tcM=",
"homepage": "https://registry.terraform.io/providers/vancluever/acme",
"owner": "vancluever",
"repo": "terraform-provider-acme",
"rev": "v2.32.0",
"rev": "v2.32.1",
"spdx": "MPL-2.0",
"vendorHash": "sha256-fttldhDW9/MeWe7MVQqz8mFI2EuOkxMZg1CZ/+8ySFU="
"vendorHash": "sha256-eaDEZyweUL9D1e2BhOQJy4ewSWJry7DmXiYzQgBqEes="
},
"age": {
"hash": "sha256-bJrzjvkrCX93bNqCA+FdRibHnAw6cb61StqtwUY5ok4=",
@ -216,13 +216,13 @@
"vendorHash": "sha256-JXziajQcCKckcCPSxElgQ7DAtoDlNIVgMce9brcgGDw="
},
"buildkite": {
"hash": "sha256-g26NUMbi2h6Igm39kpcJP+ZpynOoFsiwQikyfu59K88=",
"hash": "sha256-oc6zIV2czDE1rPjCAFLxJ0OJ9ChNi7rd2cfT1NEDwfk=",
"homepage": "https://registry.terraform.io/providers/buildkite/buildkite",
"owner": "buildkite",
"repo": "terraform-provider-buildkite",
"rev": "v1.20.0",
"rev": "v1.21.0",
"spdx": "MIT",
"vendorHash": "sha256-m0ephwJ7+yode77GPHszJwhxtAZwDX5ZXLAYlSRaSjk="
"vendorHash": "sha256-PzKn6QxmsD7p1WjKsXnETipDMs1QdbmWyrIV05JSNlo="
},
"ccloud": {
"hash": "sha256-Dpx0eugcHCJV8GNPqjxx4P9ohgJgB10DTnHr+CeN/iQ=",
@ -308,13 +308,13 @@
"vendorHash": "sha256-UJHDX/vx3n/RTuQ50Y6TAhpEEFk9yBoaz8yK02E8Fhw="
},
"consul": {
"hash": "sha256-QiVE1ezwViOjCNhTAfeR5G8hXAHCi19PqwWnBlwhPCc=",
"hash": "sha256-kLoJKnqbjsrzBqFNPpG59UOYlp2UKYsS7b6cu5xImp8=",
"homepage": "https://registry.terraform.io/providers/hashicorp/consul",
"owner": "hashicorp",
"repo": "terraform-provider-consul",
"rev": "v2.21.0",
"rev": "v2.22.0",
"spdx": "MPL-2.0",
"vendorHash": "sha256-hR20+dRvS3tZ6aoTKCHs4zkyE5jWHEh62uLBkVJPA4M="
"vendorHash": "sha256-ODAqEy04jptTR2dggCm9Vs2xxVt02SVVgGAUa06+9YY="
},
"ct": {
"hash": "sha256-c1cqTfMlZ5fXDNMYLsk4447X0p/qIQYvRTqVY8cSs+E=",
@ -372,11 +372,11 @@
"vendorHash": null
},
"dme": {
"hash": "sha256-u7mCQtz6Z7X34nbYKaRNPrbD7IuDe1tH67noAeTWH6Q=",
"hash": "sha256-JH9YcM9Fvd1x0BJpLUZCm6a9hZZxySrkFVLP89FO3fU=",
"homepage": "https://registry.terraform.io/providers/DNSMadeEasy/dme",
"owner": "DNSMadeEasy",
"repo": "terraform-provider-dme",
"rev": "v1.0.7",
"rev": "v1.0.8",
"spdx": "MPL-2.0",
"vendorHash": null
},
@ -435,11 +435,11 @@
"vendorHash": "sha256-kwrRbuMP57knT38w9SmrIs8bPmTaMeflqWb+4cFphew="
},
"exoscale": {
"hash": "sha256-RUO4Ge2z4e4N2FWiLtSNv/w2ivgOJVNYQCJvT8hN/8g=",
"hash": "sha256-V/+7qjE1r49cbF1+N5E7/jWFTSvqjhO8jxjneTJjjmQ=",
"homepage": "https://registry.terraform.io/providers/exoscale/exoscale",
"owner": "exoscale",
"repo": "terraform-provider-exoscale",
"rev": "v0.64.1",
"rev": "v0.64.3",
"spdx": "MPL-2.0",
"vendorHash": null
},
@ -831,22 +831,22 @@
"vendorHash": "sha256-eAPRtvpaVBirZ5WwmUi53S8oCKCrZyZNHiak76whLuQ="
},
"minio": {
"hash": "sha256-Eo9lps73bvyJIpRWRCQYz+Ck7IMk4nfK2jismILnaKo=",
"hash": "sha256-q5qpzrkQpT8dkcir7UdadbiLSf2bJry1HjQzMUp6xGw=",
"homepage": "https://registry.terraform.io/providers/aminueza/minio",
"owner": "aminueza",
"repo": "terraform-provider-minio",
"rev": "v3.5.3",
"rev": "v3.5.4",
"spdx": "AGPL-3.0",
"vendorHash": "sha256-QWBzQXx/dzWZr9dn3LHy8RIvZL1EA9xYqi7Ppzvju7g="
},
"mongodbatlas": {
"hash": "sha256-bLz/tYvOXe2MPa1WY4CZmm8Pcjv9C67oEHl/7TIuBRE=",
"hash": "sha256-qoGhHEWhkznrC2G0Rv0/6dPLSjJzME6bz8Ffc3zXDII=",
"homepage": "https://registry.terraform.io/providers/mongodb/mongodbatlas",
"owner": "mongodb",
"repo": "terraform-provider-mongodbatlas",
"rev": "v1.36.0",
"rev": "v1.37.0",
"spdx": "MPL-2.0",
"vendorHash": "sha256-0te8WmbzRbuU3t2YmgEd4Emhu4nUhI78V9F/QLKMXzk="
"vendorHash": "sha256-fCor4fuOnOmxvAgejaQyH44FyuQULdXm0GBlffVZxok="
},
"namecheap": {
"hash": "sha256-fHH9sHI1mqQ9q9nX9DHJ0qfEfmDB4/2uzyVvUuIAF18=",
@ -931,13 +931,13 @@
"vendorHash": null
},
"okta": {
"hash": "sha256-nHeFvCquh+xEAJZxuUmmPYacDpK+uwStGRHCCLhlUm8=",
"hash": "sha256-JbhL4QP+c8TtTyaUcsmiOESNdKFLml/4H+Ar8VbA/O8=",
"homepage": "https://registry.terraform.io/providers/okta/okta",
"owner": "okta",
"repo": "terraform-provider-okta",
"rev": "v4.20.0",
"rev": "v5.0.0",
"spdx": "MPL-2.0",
"vendorHash": "sha256-XmTIyHZOWgoE3+9KVgv8CY//rc62PSddn2iRTBUdkSs="
"vendorHash": "sha256-PoANgzaVtd59xBjt02L6bV7Vi6gyT2XgGuWOm8rr+Ng="
},
"oktaasa": {
"hash": "sha256-2LhxgowqKvDDDOwdznusL52p2DKP+UiXALHcs9ZQd0U=",
@ -1012,11 +1012,11 @@
"vendorHash": null
},
"pagerduty": {
"hash": "sha256-pU6IUnruM2Pi3nbRJpQ5Y8HuqFixRs8DTmTOxToVgWY=",
"hash": "sha256-X2u/JSm1JhIxvW5F/8QQqhlVdmAUvP/2Ux5QxmfKejI=",
"homepage": "https://registry.terraform.io/providers/PagerDuty/pagerduty",
"owner": "PagerDuty",
"repo": "terraform-provider-pagerduty",
"rev": "v3.26.2",
"rev": "v3.26.3",
"spdx": "MPL-2.0",
"vendorHash": null
},
@ -1111,11 +1111,11 @@
"vendorHash": "sha256-xo0alLK3fccbKRG5bN1G7orDsP47I3ySAzpZ9O0f2Fg="
},
"rootly": {
"hash": "sha256-wJ65YKJnFT1l9DkqtuvA9cwkt06OTCYYu9FolU5UosQ=",
"hash": "sha256-H9+9HPLmhis7UDq4Jizh+0d+tdj0PT57uv/mjymmizQ=",
"homepage": "https://registry.terraform.io/providers/rootlyhq/rootly",
"owner": "rootlyhq",
"repo": "terraform-provider-rootly",
"rev": "v3.2.0",
"rev": "v3.4.0",
"spdx": "MPL-2.0",
"vendorHash": "sha256-EZbYkyeQdroVJj3a7T7MICU4MSimB+ZqI2Yg9PNUcV0="
},
@ -1147,13 +1147,13 @@
"vendorHash": "sha256-hJmMNxlhyzcnguLFJih/K1CSZHIOspTgCJ8nyVjT7mg="
},
"scaleway": {
"hash": "sha256-rAbCLMA4u+bOXbmGDdM5wHIzPytwuX8HTOUgYQwLAdg=",
"hash": "sha256-3MLtSOcMCIl3pFJH/xKK/fPQcRrW2Nx4b2jCZiUE2aw=",
"homepage": "https://registry.terraform.io/providers/scaleway/scaleway",
"owner": "scaleway",
"repo": "terraform-provider-scaleway",
"rev": "v2.55.0",
"rev": "v2.56.0",
"spdx": "MPL-2.0",
"vendorHash": "sha256-SP92c/UhVpkThVWL4N2tTZjhwHjEo73/IJa0roXZKlE="
"vendorHash": "sha256-EmLIBIyZ52iWua3c69m8JCQKsj8qykuGjo6Tf8Y+sM8="
},
"secret": {
"hash": "sha256-MmAnA/4SAPqLY/gYcJSTnEttQTsDd2kEdkQjQj6Bb+A=",
@ -1327,20 +1327,20 @@
"vendorHash": "sha256-Sqi4MLQTF5n3AZyEkaI03KhFvgy34ROqbd8Rx1N6/oY="
},
"tencentcloud": {
"hash": "sha256-VoXdT/ZZp3CGxYg9xjyvnt2TLLWUwCkCzI9i6NWlTQg=",
"hash": "sha256-MMmBhzhD5SPvTJPzuxAPEmE2ydcwVH4cYAx21ze/umk=",
"homepage": "https://registry.terraform.io/providers/tencentcloudstack/tencentcloud",
"owner": "tencentcloudstack",
"repo": "terraform-provider-tencentcloud",
"rev": "v1.82.2",
"rev": "v1.82.5",
"spdx": "MPL-2.0",
"vendorHash": null
},
"tfe": {
"hash": "sha256-8QYTVM9vxWg4jKlm7bUeeD7NjmkZZRu5KxK/7/+wN50=",
"hash": "sha256-O8QNI4lUsw+lY5MThGVR7hwci3XvjvjSN/bzhh9c3mc=",
"homepage": "https://registry.terraform.io/providers/hashicorp/tfe",
"owner": "hashicorp",
"repo": "terraform-provider-tfe",
"rev": "v0.67.0",
"rev": "v0.67.1",
"spdx": "MPL-2.0",
"vendorHash": "sha256-fw92xhRF60f3QRLBtSvdSwOtXY4QzgJlwb6zgi0OGjw="
},
@ -1382,11 +1382,11 @@
"vendorHash": "sha256-UuLHaOEG6jmOAgfdNOtLyUimlAr3g6K8n3Ehu64sKqk="
},
"turbot": {
"hash": "sha256-YjB4pNyApGDppsozRrwhze3nWmmn1uWez3WiRPyLa4A=",
"hash": "sha256-B3zUTsxFnyhIsxI9K07V+gP/C22nMm6bonEpQIPCMp0=",
"homepage": "https://registry.terraform.io/providers/turbot/turbot",
"owner": "turbot",
"repo": "terraform-provider-turbot",
"rev": "v1.12.2",
"rev": "v1.12.3",
"spdx": "MPL-2.0",
"vendorHash": null
},

View File

@ -44,6 +44,6 @@ stdenv.mkDerivation rec {
changelog = "https://github.com/QuiteRSS/quiterss/blob/${version}/CHANGELOG";
license = lib.licenses.gpl3;
platforms = lib.platforms.linux;
maintainers = with lib.maintainers; [ primeos ];
maintainers = with lib.maintainers; [ ];
};
}

View File

@ -91,7 +91,6 @@ buildPythonApplication rec {
changelog = "https://github.com/nicolargo/glances/blob/${src.tag}/NEWS.rst";
license = lib.licenses.lgpl3Only;
maintainers = with lib.maintainers; [
primeos
koral
];
};

View File

@ -564,7 +564,6 @@ stdenv.mkDerivation (finalAttrs: {
platforms = lib.platforms.all;
maintainers = with lib.maintainers; [
primeos
wmertens
globin
kashw2

View File

@ -29,7 +29,7 @@ stdenv.mkDerivation rec {
inherit (src.meta) homepage;
license = licenses.isc;
platforms = platforms.unix;
maintainers = with maintainers; [ primeos ];
maintainers = with maintainers; [ ];
broken = stdenv.hostPlatform.isDarwin;
};
}

View File

@ -8,13 +8,13 @@
buildNpmPackage rec {
pname = "better-commits";
version = "1.17.0";
version = "1.17.1";
src = fetchFromGitHub {
owner = "Everduin94";
repo = "better-commits";
tag = "v${version}";
hash = "sha256-77wjS/BvJLDV+48xYE7XkC6A2GkCefWFydxOU53rXME=";
hash = "sha256-dalCpupefZT1VDOo+U2MvqeWh1whi8w/697VOFJyuDw=";
};
npmDepsHash = "sha256-g34UutgT5315BpsQSuGGLIU6Ga+hpEz74HNLKKOB+ec=";

View File

@ -69,7 +69,7 @@ stdenv.mkDerivation (finalAttrs: {
homepage = "https://www.hjdskes.nl/projects/cage/";
license = lib.licenses.mit;
platforms = lib.platforms.linux;
maintainers = with lib.maintainers; [ primeos ];
maintainers = with lib.maintainers; [ ];
mainProgram = "cage";
};
})

View File

@ -19,6 +19,7 @@
sqlite,
zlib,
jq,
libpq,
}:
let
py3 = python3.withPackages (p: [
@ -50,6 +51,7 @@ stdenv.mkDerivation rec {
py3
unzip
which
libpq.pg_config
]
++ lib.optionals stdenv.hostPlatform.isDarwin [
cctools

View File

@ -87,6 +87,6 @@ stdenv.mkDerivation rec {
# More technical: https://code.videolan.org/videolan/dav1d/blob/${version}/NEWS
license = lib.licenses.bsd2;
platforms = lib.platforms.unix ++ lib.platforms.windows;
maintainers = with lib.maintainers; [ primeos ];
maintainers = with lib.maintainers; [ ];
};
}

View File

@ -45,7 +45,6 @@ stdenv.mkDerivation rec {
license = lib.licenses.gpl2Plus;
mainProgram = "dynamips";
maintainers = with lib.maintainers; [
primeos
anthonyroussel
];
platforms = lib.platforms.linux ++ lib.platforms.darwin;

View File

@ -27,14 +27,14 @@ let
in
stdenv.mkDerivation (finalAttrs: {
pname = "eduke32";
version = "0-unstable-2025-04-11";
version = "0-unstable-2025-07-04";
src = fetchFromGitLab {
domain = "voidpoint.io";
owner = "terminx";
repo = "eduke32";
rev = "b8759847124c2c53a165a02efef4a0c778674baf";
hash = "sha256-+XaIoCP6TA5QMzs/VxXIv1NP8X4i9rIm6iw+pFH8Q6Q=";
rev = "388752735c68456b89d8acffcb836e6802308007";
hash = "sha256-QQ0qKY/ZK0SwxMkZ76792w7iCO+ZpGWGJutHJW1e5+Q=";
deepClone = true;
leaveDotGit = true;
postFetch = ''

View File

@ -98,6 +98,6 @@ stdenv.mkDerivation rec {
homepage = "https://www.nongnu.org/fbi-improved/";
license = licenses.gpl2Plus;
platforms = platforms.linux;
maintainers = with maintainers; [ primeos ];
maintainers = with maintainers; [ ];
};
}

View File

@ -57,6 +57,6 @@ buildGoModule rec {
changelog = "https://github.com/google/fscrypt/releases/tag/v${version}";
license = lib.licenses.asl20;
platforms = lib.platforms.linux;
maintainers = with lib.maintainers; [ primeos ];
maintainers = with lib.maintainers; [ ];
};
}

View File

@ -43,6 +43,6 @@ stdenv.mkDerivation (finalAttrs: {
changelog = "https://github.com/google/fscryptctl/blob/master/NEWS.md";
license = lib.licenses.asl20;
platforms = lib.platforms.linux;
maintainers = with lib.maintainers; [ primeos ];
maintainers = with lib.maintainers; [ ];
};
})

View File

@ -75,6 +75,6 @@ stdenv.mkDerivation rec {
homepage = "https://www.cipherdyne.org/fwknop/";
license = licenses.gpl2Plus;
platforms = platforms.linux;
maintainers = with maintainers; [ primeos ];
maintainers = with maintainers; [ ];
};
}

View File

@ -74,7 +74,6 @@ stdenv.mkDerivation {
maintainers = with maintainers; [
stesie
matthewbauer
primeos
];
};
}

View File

@ -62,6 +62,6 @@ python3Packages.buildPythonApplication rec {
homepage = "https://gitlab.com/goobook/goobook";
changelog = "https://gitlab.com/goobook/goobook/-/blob/${src.tag}/CHANGES.rst";
license = lib.licenses.gpl3Only;
maintainers = with lib.maintainers; [ primeos ];
maintainers = with lib.maintainers; [ ];
};
}

View File

@ -6,14 +6,13 @@
installShellFiles,
nixosTests,
}:
buildGoModule rec {
buildGoModule (finalAttrs: {
pname = "honk";
version = "1.5.1";
version = "1.5.2";
src = fetchurl {
url = "https://humungus.tedunangst.com/r/honk/d/honk-${version}.tgz";
hash = "sha256-VOeA2oQNmcEVfvWrKnWWUz6n+WjMuxYQnbqPfWaHGLM=";
url = "https://humungus.tedunangst.com/r/honk/d/honk-${finalAttrs.version}.tgz";
hash = "sha256-7dIui+VMHn916yMdhqN6Pk2P/s0vvXzVKFsTZ5wp12A=";
};
vendorHash = null;
@ -37,8 +36,8 @@ buildGoModule rec {
'';
postInstall = ''
mkdir -p $out/share/${pname}
mkdir -p $out/share/doc/${pname}
mkdir -p $out/share/honk
mkdir -p $out/share/doc/honk
mv docs/{,honk-}intro.1
mv docs/{,honk-}hfcs.1
@ -47,8 +46,8 @@ buildGoModule rec {
installManPage docs/honk.1 docs/honk.3 docs/honk.5 docs/honk.8 \
docs/honk-intro.1 docs/honk-hfcs.1 docs/honk-vim.3 docs/honk-activitypub.7
mv docs/{*.html,*.txt,*.jpg,*.png} $out/share/doc/${pname}
mv views $out/share/${pname}
mv docs/{*.html,*.txt,*.jpg,*.png} $out/share/doc/honk
mv views $out/share/honk
'';
passthru.tests = {
@ -56,11 +55,11 @@ buildGoModule rec {
};
meta = {
changelog = "https://humungus.tedunangst.com/r/honk/v/v${version}/f/docs/changelog.txt";
changelog = "https://humungus.tedunangst.com/r/honk/v/v${finalAttrs.version}/f/docs/changelog.txt";
description = "ActivityPub server with minimal setup and support costs";
homepage = "https://humungus.tedunangst.com/r/honk";
license = lib.licenses.isc;
mainProgram = "honk";
maintainers = with lib.maintainers; [ huyngo ];
};
}
})

View File

@ -70,6 +70,6 @@ stdenv.mkDerivation (finalAttrs: {
license = licenses.mit;
platforms = platforms.unix;
pkgConfigModules = [ "iniparser" ];
maintainers = [ maintainers.primeos ];
maintainers = [ ];
};
})

View File

@ -110,7 +110,6 @@ stdenv.mkDerivation rec {
platforms = platforms.linux;
license = licenses.gpl2Only;
maintainers = with maintainers; [
primeos
fpletz
globin
];

View File

@ -71,7 +71,7 @@ stdenv.mkDerivation (finalAttrs: {
'';
license = lib.licenses.gpl2Plus;
platforms = lib.platforms.unix;
maintainers = with lib.maintainers; [ primeos ];
maintainers = with lib.maintainers; [ ];
mainProgram = "mbsync";
};
})

View File

@ -17,7 +17,7 @@
}:
stdenv.mkDerivation (finalAttrs: {
version = "2.6.0";
version = "2.7.1";
pname = "jacktrip";
src = fetchFromGitHub {
@ -25,7 +25,7 @@ stdenv.mkDerivation (finalAttrs: {
repo = "jacktrip";
tag = "v${finalAttrs.version}";
fetchSubmodules = true;
hash = "sha256-3Ae84x3QL+dfoJJJ0+XrBgo1wKwNYrR9AVQCnahS1sE=";
hash = "sha256-47CgvaNgAr3PP61vS28hU4jTljukFGbGkAYJVHNoR9U=";
};
preConfigure = ''

View File

@ -128,7 +128,6 @@ stdenv.mkDerivation rec {
homepage = "https://aomedia.org/av1-features/get-started/";
changelog = "https://aomedia.googlesource.com/aom/+/refs/tags/v${version}/CHANGELOG";
maintainers = with lib.maintainers; [
primeos
kiloreux
dandellion
];

View File

@ -83,6 +83,6 @@ stdenv.mkDerivation rec {
'';
license = licenses.mit;
platforms = lib.subtractLists platforms.darwin platforms.unix;
maintainers = with maintainers; [ primeos ];
maintainers = with maintainers; [ ];
};
}

View File

@ -112,6 +112,6 @@ stdenv.mkDerivation rec {
platforms = lib.platforms.unix;
# https://gitlab.freedesktop.org/glvnd/libglvnd/-/issues/212
badPlatforms = [ lib.systems.inspect.platformPatterns.isStatic ];
maintainers = with lib.maintainers; [ primeos ];
maintainers = with lib.maintainers; [ ];
};
}

View File

@ -35,7 +35,7 @@ stdenv.mkDerivation (finalAttrs: {
beerware
publicDomain
];
maintainers = with maintainers; [ primeos ];
maintainers = with maintainers; [ ];
platforms = platforms.unix;
};
})

View File

@ -85,7 +85,7 @@ stdenv.mkDerivation rec {
homepage = "https://code.videolan.org/videolan/libplacebo";
changelog = "https://code.videolan.org/videolan/libplacebo/-/tags/v${version}";
license = lib.licenses.lgpl21Plus;
maintainers = with lib.maintainers; [ primeos ];
maintainers = with lib.maintainers; [ ];
platforms = lib.platforms.all;
};
}

View File

@ -74,7 +74,7 @@ stdenv.mkDerivation rec {
homepage = "https://code.videolan.org/videolan/libplacebo";
changelog = "https://code.videolan.org/videolan/libplacebo/-/tags/v${version}";
license = lib.licenses.lgpl21Plus;
maintainers = with lib.maintainers; [ primeos ];
maintainers = with lib.maintainers; [ ];
platforms = lib.platforms.all;
};
}

View File

@ -96,7 +96,6 @@ stdenv.mkDerivation (finalAttrs: {
changelog = "https://github.com/xkbcommon/libxkbcommon/blob/xkbcommon-${finalAttrs.version}/NEWS.md";
license = licenses.mit;
maintainers = with maintainers; [
primeos
ttuegel
];
mainProgram = "xkbcli";

View File

@ -22,7 +22,7 @@ replaceVarsWith {
description = "Prints certain LSB (Linux Standard Base) and Distribution information";
mainProgram = "lsb_release";
license = [ licenses.mit ];
maintainers = with maintainers; [ primeos ];
maintainers = with maintainers; [ ];
platforms = platforms.linux;
};
}

View File

@ -1,21 +1,21 @@
{
"version": "3.146.0",
"version": "3.148.0",
"assets": {
"x86_64-linux": {
"url": "https://github.com/metalbear-co/mirrord/releases/download/3.146.0/mirrord_linux_x86_64",
"hash": "sha256-hyLB5r2YJ32jd64xueIFGET+FiGMCJInHcOu/YyHCbI="
"url": "https://github.com/metalbear-co/mirrord/releases/download/3.148.0/mirrord_linux_x86_64",
"hash": "sha256-nQtpilOmYqji0hswq5KfG4mP5Jvtll+WTr5vcd/x1m8="
},
"aarch64-linux": {
"url": "https://github.com/metalbear-co/mirrord/releases/download/3.146.0/mirrord_linux_aarch64",
"hash": "sha256-6Yi0FeXweDPbYI+c/XsCGetCkz1Ab4u4LAaGu6msJwc="
"url": "https://github.com/metalbear-co/mirrord/releases/download/3.148.0/mirrord_linux_aarch64",
"hash": "sha256-HOdX97d29VAiUy2W2bpnpvity+Kc3MD/+JwFgPCZfXI="
},
"aarch64-darwin": {
"url": "https://github.com/metalbear-co/mirrord/releases/download/3.146.0/mirrord_mac_universal",
"hash": "sha256-qvF6JTfeXvwNniNBn+/eGD6RBesbVeLgPo9HcDVBtKA="
"url": "https://github.com/metalbear-co/mirrord/releases/download/3.148.0/mirrord_mac_universal",
"hash": "sha256-fMlsuoqKv+9URHAfmhaCznHedknz9bFX4SCg3qU19JY="
},
"x86_64-darwin": {
"url": "https://github.com/metalbear-co/mirrord/releases/download/3.146.0/mirrord_mac_universal",
"hash": "sha256-qvF6JTfeXvwNniNBn+/eGD6RBesbVeLgPo9HcDVBtKA="
"url": "https://github.com/metalbear-co/mirrord/releases/download/3.148.0/mirrord_mac_universal",
"hash": "sha256-fMlsuoqKv+9URHAfmhaCznHedknz9bFX4SCg3qU19JY="
}
}
}

View File

@ -137,6 +137,6 @@ stdenv.mkDerivation rec {
'';
license = licenses.gpl3Plus;
platforms = platforms.linux;
maintainers = with maintainers; [ primeos ];
maintainers = with maintainers; [ ];
};
}

View File

@ -33,6 +33,6 @@ stdenv.mkDerivation rec {
homepage = "http://www.mew.org/~kazu/proj/pgpdump/en/";
license = licenses.bsd3;
platforms = platforms.unix;
maintainers = with maintainers; [ primeos ];
maintainers = with maintainers; [ ];
};
}

View File

@ -43,9 +43,7 @@ stdenv.mkDerivation (finalAttrs: {
changelog = "https://git.sr.ht/~sircmpwn/scdoc/refs/${finalAttrs.src.rev}";
license = lib.licenses.mit;
mainProgram = "scdoc";
maintainers = with lib.maintainers; [
primeos
];
maintainers = with lib.maintainers; [ ];
platforms = lib.platforms.unix;
};
})

View File

@ -307,7 +307,7 @@ stdenv.mkDerivation rec {
gpl2Plus
gpl3Plus
];
maintainers = with maintainers; [ primeos ];
maintainers = with maintainers; [ ];
platforms = platforms.linux;
};
}

View File

@ -87,6 +87,6 @@ stdenv.mkDerivation rec {
homepage = "https://github.com/libfuse/sshfs";
license = licenses.gpl2Plus;
mainProgram = "sshfs";
maintainers = with maintainers; [ primeos ];
maintainers = with maintainers; [ ];
};
}

View File

@ -6,13 +6,13 @@
buildGoModule rec {
pname = "storj-uplink";
version = "1.131.4";
version = "1.131.7";
src = fetchFromGitHub {
owner = "storj";
repo = "storj";
rev = "v${version}";
hash = "sha256-jDZ7Y+3CnuL5vIVns+5PdmMjfqbP0K596HDivu++zyA=";
hash = "sha256-zZQOiYH2YN6pRwu2ddt+IEJ35RJ3rplbQ+T4/zKtv8w=";
};
subPackages = [ "cmd/uplink" ];

View File

@ -138,7 +138,6 @@ stdenv.mkDerivation (finalAttrs: {
license = lib.licenses.mit;
platforms = lib.platforms.linux;
maintainers = with lib.maintainers; [
primeos
synthetica
];
mainProgram = "sway";

View File

@ -61,7 +61,6 @@ stdenv.mkDerivation rec {
license = licenses.mit;
mainProgram = "swaybg";
maintainers = with maintainers; [
primeos
ryan4yin
];
platforms = platforms.linux;

View File

@ -58,7 +58,7 @@ stdenv.mkDerivation rec {
'';
license = licenses.mit;
mainProgram = "swayidle";
maintainers = with maintainers; [ primeos ];
maintainers = with maintainers; [ ];
platforms = platforms.linux;
};
}

View File

@ -66,6 +66,6 @@ stdenv.mkDerivation rec {
mainProgram = "swaylock";
license = licenses.mit;
platforms = platforms.linux;
maintainers = with maintainers; [ primeos ];
maintainers = with maintainers; [ ];
};
}

View File

@ -11,19 +11,19 @@
buildGo124Module rec {
pname = "trivy";
version = "0.63.0";
version = "0.64.1";
src = fetchFromGitHub {
owner = "aquasecurity";
repo = "trivy";
tag = "v${version}";
hash = "sha256-e1T4z0L1poPzZgq8ooBmXiA+d+aTaf9bE09Rx2yFk68=";
hash = "sha256-RNqbBh0PgpJruWIENAdjUDKsuConXxtSzKv4261rKmk=";
};
# Hash mismatch on across Linux and Darwin
proxyVendor = true;
vendorHash = "sha256-lp5rajoeGR+nLO8EOLPdRLz0r19nGq2YNSjba8Zpq9E=";
vendorHash = "sha256-e8742QO20n8hVtCXG5r+HOED8ccj/Pr3qbcndP94Nps=";
subPackages = [ "cmd/trivy" ];

View File

@ -7,13 +7,13 @@
buildGoModule {
pname = "txtpbfmt";
version = "0-unstable-2025-06-25";
version = "0-unstable-2025-06-27";
src = fetchFromGitHub {
owner = "protocolbuffers";
repo = "txtpbfmt";
rev = "c917e9664b93f5f7ba1890e9fe9db7390758f0e6";
hash = "sha256-iyzKPGoKid6gz6eaINpAcV7gYkwiiRY9bjjFYIinGjw=";
rev = "f293424e46b51a8dc295a0edf0fe7217ebda2660";
hash = "sha256-0fFQbzj4CZ78P7A3iTwNA6LHUDM0nwYM/mPwDOlV2Zo=";
};
vendorHash = "sha256-iWY0b6PAw9BhA8WrTEECnVAKWTGXuIiGvOi9uhJO4PI=";

View File

@ -56,7 +56,6 @@ stdenv.mkDerivation rec {
license = lib.licenses.gpl3Plus;
mainProgram = "ubridge";
maintainers = with lib.maintainers; [
primeos
anthonyroussel
];
platforms = lib.platforms.linux ++ lib.platforms.darwin;

View File

@ -44,7 +44,7 @@ stdenv.mkDerivation rec {
homepage = "https://gitlab.freedesktop.org/wayland/wayland-utils";
license = licenses.mit; # Expat version
platforms = platforms.linux;
maintainers = with maintainers; [ primeos ];
maintainers = with maintainers; [ ];
mainProgram = "wayland-info";
};
}

View File

@ -148,7 +148,6 @@ stdenv.mkDerivation rec {
platforms = platforms.linux;
mainProgram = "weston";
maintainers = with maintainers; [
primeos
qyliss
];
};

View File

@ -47,7 +47,7 @@ stdenv.mkDerivation {
X11 tool xev.
'';
license = licenses.mit;
maintainers = with maintainers; [ primeos ];
maintainers = with maintainers; [ ];
platforms = platforms.linux;
mainProgram = "wev";
};

View File

@ -48,7 +48,7 @@ stdenv.mkDerivation rec {
changelog = "https://git.sr.ht/~kennylevinsen/wlsunset/refs/${version}";
license = lib.licenses.mit;
platforms = lib.platforms.linux;
maintainers = with lib.maintainers; [ primeos ];
maintainers = with lib.maintainers; [ ];
mainProgram = "wlsunset";
};
}

View File

@ -54,7 +54,7 @@ stdenv.mkDerivation rec {
'';
changelog = "https://github.com/francma/wob/releases/tag/${version}";
license = lib.licenses.isc;
maintainers = with lib.maintainers; [ primeos ];
maintainers = with lib.maintainers; [ ];
platforms = lib.platforms.linux;
mainProgram = "wob";
};

View File

@ -59,7 +59,6 @@ stdenv.mkDerivation {
# TODO: gpl3Only or gpl3Plus (ask upstream)?
platforms = platforms.linux;
maintainers = with maintainers; [
primeos
berbiche
];
mainProgram = "wshowkeys";

View File

@ -34,7 +34,6 @@ stdenv.mkDerivation (finalAttrs: {
license = lib.licenses.mit;
platforms = lib.platforms.linux;
maintainers = with lib.maintainers; [
primeos
Scrumplex
];
};

View File

@ -32,7 +32,6 @@ rec {
platforms = lib.platforms.unix;
maintainers = with lib.maintainers; [
k900
primeos
vcunat
]; # Help is welcome :)
};

View File

@ -117,7 +117,6 @@ stdenv.mkDerivation (finalAttrs: {
license = licenses.mit; # Expat version
platforms = platforms.unix;
maintainers = with maintainers; [
primeos
codyopel
qyliss
];

View File

@ -59,7 +59,7 @@ stdenv.mkDerivation (finalAttrs: {
homepage = "https://gitlab.freedesktop.org/wayland/wayland-protocols";
license = lib.licenses.mit; # Expat version
platforms = lib.platforms.all;
maintainers = with lib.maintainers; [ primeos ];
maintainers = with lib.maintainers; [ ];
pkgConfigModules = [ "wayland-protocols" ];
};

View File

@ -130,7 +130,6 @@ let
license = lib.licenses.mit;
platforms = lib.platforms.linux;
maintainers = with lib.maintainers; [
primeos
synthetica
rewine
];

View File

@ -47,6 +47,6 @@ buildPythonPackage rec {
description = "CORS support for aiohttp";
homepage = "https://github.com/aio-libs/aiohttp-cors";
license = licenses.asl20;
maintainers = with maintainers; [ primeos ];
maintainers = with maintainers; [ ];
};
}

View File

@ -40,6 +40,6 @@ buildPythonPackage rec {
description = "Set of python bindings for keyutils";
homepage = "https://github.com/sassoftware/python-keyutils";
license = lib.licenses.asl20;
maintainers = with lib.maintainers; [ primeos ];
maintainers = with lib.maintainers; [ ];
};
}

View File

@ -110,6 +110,8 @@ buildPythonPackage rec {
"test_get_pareto_front_plot"
# too narrow time limit
"test_get_timeline_plot_with_killed_running_trials"
# times out under load
"test_optimize_with_progbar_timeout"
]
++ lib.optionals stdenv.hostPlatform.isDarwin [
# ValueError: Failed to start Kaleido subprocess. Error stream

View File

@ -0,0 +1,40 @@
{
lib,
buildPythonPackage,
fetchFromGitHub,
netaddr,
requests,
pythonOlder,
}:
buildPythonPackage rec {
pname = "pybbox";
version = "0.0.5-alpha";
format = "setuptools";
disabled = pythonOlder "3.6";
src = fetchFromGitHub {
owner = "HydrelioxGitHub";
repo = "pybbox";
rev = version;
hash = "sha256-xealTlH/rMlqEnENZXq0/EVDlF8lc/B8qeUmQPM6fUc=";
};
propagatedBuildInputs = [
netaddr
requests
];
# Tests are incomplete and contain failing tests
doCheck = false;
pythonImportsCheck = [ "pybbox" ];
meta = {
description = "Python library for the Bouygues BBox Routeur API";
homepage = "https://github.com/HydrelioxGitHub/pybbox";
license = lib.licenses.mit;
maintainers = [ lib.maintainers.jamiemagee ];
};
}

View File

@ -14,14 +14,14 @@
buildPythonPackage rec {
pname = "pyedflib";
version = "0.1.40";
version = "0.1.42";
pyproject = true;
src = fetchFromGitHub {
owner = "holgern";
repo = "pyedflib";
tag = "v${version}";
hash = "sha256-FWEd1Y883LPsPdzbjR6+emsYBMBrM33/jR8p1aIWmV4=";
hash = "sha256-KbySCsDjiS94U012KASRgHR2fuX090HlKUuPgsLC+xQ=";
};
build-system = [
@ -48,7 +48,7 @@ buildPythonPackage rec {
meta = {
description = "Python library to read/write EDF+/BDF+ files based on EDFlib";
homepage = "https://github.com/holgern/pyedflib";
changelog = "https://github.com/holgern/pyedflib/releases/tag/v${version}";
changelog = "https://github.com/holgern/pyedflib/releases/tag/${src.tag}";
license = lib.licenses.bsd3;
maintainers = with lib.maintainers; [ GaetanLepage ];
};

View File

@ -35,6 +35,6 @@ buildPythonPackage rec {
mainProgram = "raven";
homepage = "https://github.com/getsentry/raven-python";
license = [ lib.licenses.bsd3 ];
maintainers = with lib.maintainers; [ primeos ];
maintainers = with lib.maintainers; [ ];
};
}

View File

@ -125,7 +125,6 @@ buildPythonPackage rec {
license = licenses.gpl2Only;
platforms = platforms.unix;
maintainers = with maintainers; [
primeos
bjornfor
];
};

View File

@ -162,6 +162,31 @@ buildPythonPackage rec {
# AttributeError: type object 'Any' has no attribute '_name'
"test_type_repr"
# AttributeError: module 'torch.fx._symbolic_trace' has no attribute 'List'
"test_set_clear_mask"
"test_sequential_to_hetero"
"test_to_fixed_size"
"test_to_hetero_basic"
"test_to_hetero_with_gcn"
"test_to_hetero_with_basic_model"
"test_to_hetero_and_rgcn_equal_output"
"test_graph_level_to_hetero"
"test_hetero_transformer_self_loop_error"
"test_to_hetero_validate"
"test_to_hetero_on_static_graphs"
"test_to_hetero_with_bases"
"test_to_hetero_with_bases_and_rgcn_equal_output"
"test_to_hetero_with_bases_validate"
"test_to_hetero_with_bases_on_static_graphs"
"test_to_hetero_with_bases_save"
# Failed: DID NOT WARN.
"test_to_hetero_validate"
"test_to_hetero_with_bases_validate"
# Failed: DID NOT RAISE
"test_scatter_backward"
]
++ lib.optionals stdenv.hostPlatform.isDarwin [
# This test uses `torch.jit` which might not be working on darwin:

View File

@ -59,7 +59,7 @@ stdenv.mkDerivation {
'';
sourceProvenance = with sourceTypes; [ binaryNativeCode ];
license = licenses.bsd3;
maintainers = with maintainers; [ primeos ];
maintainers = with maintainers; [ ];
# Note from primeos: By updating Chromium I also update Google Chrome and
# ChromeDriver.
platforms = platforms.darwin;

View File

@ -141,7 +141,6 @@ stdenv.mkDerivation rec {
lgpl21Only
];
maintainers = with lib.maintainers; [
primeos
oxalica
];
outputsToInstall = [ "bin" ];

View File

@ -96,6 +96,6 @@ stdenv.mkDerivation rec {
bsd3
];
platforms = platforms.linux;
maintainers = with maintainers; [ primeos ];
maintainers = with maintainers; [ ];
};
}

View File

@ -549,7 +549,8 @@
];
"bbox" =
ps: with ps; [
]; # missing inputs: pybbox
pybbox
];
"beewi_smartclim" =
ps: with ps; [
]; # missing inputs: beewi-smartclim

View File

@ -79,7 +79,7 @@ stdenv.mkDerivation rec {
unicode-dfs-2015
];
platforms = platforms.unix;
maintainers = with maintainers; [ primeos ];
maintainers = with maintainers; [ ];
teams = [ teams.android ];
};
}

View File

@ -29,7 +29,6 @@ bundlerEnv rec {
changelog = "https://github.com/rubysec/bundler-audit/blob/v${version}/ChangeLog.md";
license = licenses.gpl3Plus;
maintainers = with maintainers; [
primeos
nicknovitski
];
platforms = platforms.unix;

View File

@ -12307,6 +12307,8 @@ self: super: with self; {
pybase64 = callPackage ../development/python-modules/pybase64 { };
pybbox = callPackage ../development/python-modules/pybbox { };
pybcj = callPackage ../development/python-modules/pybcj { };
pybids = callPackage ../development/python-modules/pybids { };