Merge staging-next into staging

This commit is contained in:
github-actions[bot] 2024-08-18 00:03:22 +00:00 committed by GitHub
commit 0f820c1c5a
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
211 changed files with 1193 additions and 723 deletions

2
.github/CODEOWNERS vendored
View File

@ -325,7 +325,7 @@ pkgs/development/python-modules/buildcatrust/ @ajs124 @lukegb @mweinelt
# Forgejo
nixos/modules/services/misc/forgejo.nix @adamcstephens @bendlas @emilylange
pkgs/by-name/fo/forgejo/package.nix @adamcstephens @bendlas @emilylange
pkgs/by-name/fo/forgejo/ @adamcstephens @bendlas @emilylange
# Dotnet
/pkgs/build-support/dotnet @corngood

View File

@ -7289,9 +7289,10 @@
name = "Gavin Rogers";
};
gaykitty = {
email = "sasha@noraa.gay";
github = "gaykitty";
githubId = 126119280;
name = "Kitty Pride";
name = "Sashanoraa";
};
gazally = {
email = "gazally@runbox.com";

View File

@ -180,6 +180,8 @@
`services.forgejo.secrets` is a small wrapper over systemd's `LoadCredential=`. It has the same structure (sections/keys) as
`services.forgejo.settings` but takes file paths that will be read before service startup instead of some plaintext value.
- `forgejo` and `forgejo-lts` no longer support the opt-in feature [PAM (Pluggable Authentication Module)](https://forgejo.org/docs/latest/user/authentication/#pam-pluggable-authentication-module).
- `services.ddclient.use` has been deprecated: `ddclient` now supports separate IPv4 and IPv6 configuration. Use `services.ddclient.usev4` and `services.ddclient.usev6` instead.
- `teleport` has been upgraded from major version 15 to major version 16.

View File

@ -10,6 +10,9 @@
, # Compression parameters.
# For zstd compression you can use "zstd -Xcompression-level 6".
comp ? "xz -Xdict-size 100%"
, # create hydra build product. will put image in directory instead
# of directly in the store
hydraBuildProduct ? false
}:
let
@ -17,7 +20,7 @@ let
compFlag = if comp == null then "-no-compression" else "-comp ${comp}";
in
stdenv.mkDerivation {
name = "${fileName}.img";
name = "${fileName}${lib.optionalString (!hydraBuildProduct) ".img"}";
__structuredAttrs = true;
nativeBuildInputs = [ squashfsTools ];
@ -30,7 +33,13 @@ stdenv.mkDerivation {
# for nix-store --load-db.
cp $closureInfo/registration nix-path-registration
imgPath="$out"
'' + lib.optionalString hydraBuildProduct ''
mkdir $out
imgPath="$out/${fileName}.squashfs"
'' + lib.optionalString stdenv.buildPlatform.is32bit ''
# 64 cores on i686 does not work
# fails with FATAL ERROR: mangle2:: xz compress failed with error code 5
if ((NIX_BUILD_CORES > 48)); then
@ -39,8 +48,12 @@ stdenv.mkDerivation {
'' + ''
# Generate the squashfs image.
mksquashfs nix-path-registration $(cat $closureInfo/store-paths) $out ${pseudoFilesArgs} \
mksquashfs nix-path-registration $(cat $closureInfo/store-paths) $imgPath ${pseudoFilesArgs} \
-no-hardlinks ${lib.optionalString noStrip "-no-strip"} -keep-as-directory -all-root -b 1048576 ${compFlag} \
-processors $NIX_BUILD_CORES
'' + lib.optionalString hydraBuildProduct ''
mkdir -p $out/nix-support
echo "file squashfs-image $out/${fileName}.squashfs" >> $out/nix-support/hydra-build-products
'';
}

View File

@ -48,6 +48,7 @@ in
type = lib.types.package;
# `yabar-stable` segfaults under certain conditions.
# remember to update yabar.passthru.tests if nixos switches back to it!
apply = x: if x == pkgs.yabar-unstable then x else lib.flip lib.warn x ''
It's not recommended to use `yabar' with `programs.yabar', the (old) stable release
tends to segfault under certain circumstances:

View File

@ -60,6 +60,7 @@
system.build.squashfs = pkgs.callPackage ../../lib/make-squashfs.nix {
fileName = "nixos-lxc-image-${pkgs.stdenv.hostPlatform.system}";
hydraBuildProduct = true;
noStrip = true; # keep directory structure
comp = "zstd -Xcompression-level 6";

View File

@ -33,6 +33,7 @@ import ./make-test-python.nix ({ pkgs, ... }:
nodes = {
node = {...}: {
environment.systemPackages = with pkgs; [
# remember to update mongodb.passthru.tests if you change this
mongodb-5_0
];
};

View File

@ -12,6 +12,7 @@
, gzip
, perl
, jq
, nixosTests
}:
stdenv.mkDerivation (finalAttrs: {
@ -57,6 +58,8 @@ stdenv.mkDerivation (finalAttrs: {
# 5 tests out of 23 fail, probably due to the sandbox...
doCheck = false;
passthru.tests = { inherit (nixosTests) mympd; };
meta = {
homepage = "https://jcorporation.github.io/myMPD";
description = "Standalone and mobile friendly web mpd client with a tiny footprint and advanced features";

View File

@ -1,4 +1,4 @@
{ lib, stdenv, fetchurl, makeWrapper, jre }:
{ lib, stdenv, fetchurl, makeWrapper, jre, nixosTests }:
stdenv.mkDerivation rec {
pname = "ergo";
@ -17,6 +17,8 @@ stdenv.mkDerivation rec {
makeWrapper ${jre}/bin/java $out/bin/ergo --add-flags "-jar $src"
'';
passthru.tests = { inherit (nixosTests) ergo; };
meta = with lib; {
description = "Open protocol that implements modern scientific ideas in the blockchain area";
homepage = "https://ergoplatform.org/en/";

View File

@ -1,4 +1,4 @@
{ lib, fetchFromGitHub, buildGoModule }:
{ lib, fetchFromGitHub, buildGoModule, nixosTests }:
buildGoModule rec {
pname = "quorum";
@ -20,6 +20,8 @@ buildGoModule rec {
ldflags = [ "-s" "-w" ];
passthru.tests = { inherit (nixosTests) quorum; };
meta = with lib; {
description = "Permissioned implementation of Ethereum supporting data privacy";
homepage = "https://consensys.net/quorum/";

View File

@ -6,6 +6,7 @@
dotnetCorePackages,
zlib,
openssl,
nixosTests,
}:
buildDotnetModule rec {
pname = "wasabibackend";
@ -38,6 +39,10 @@ buildDotnetModule rec {
mv $out/bin/WalletWasabi.Backend $out/bin/WasabiBackend
'';
passthru.tests = {
inherit (nixosTests) wasabibackend;
};
meta = with lib; {
description = "Backend for the Wasabi Wallet";
homepage = "https://wasabiwallet.io/";

View File

@ -28,6 +28,7 @@
, qtbase
, yelp-tools
, yelp-xsl
, nixosTests
}:
stdenv.mkDerivation rec {
@ -115,6 +116,7 @@ stdenv.mkDerivation rec {
passthru = {
updateScript = nix-update-script { };
tests = { inherit (nixosTests) lightdm; };
};

View File

@ -1,5 +1,5 @@
{ stdenv, lib, fetchFromGitHub, linux-pam, libxcb, makeBinaryWrapper, zig_0_12
, callPackage }:
, callPackage, nixosTests }:
stdenv.mkDerivation {
pname = "ly";
@ -19,6 +19,8 @@ stdenv.mkDerivation {
ln -s ${callPackage ./deps.nix { }} $ZIG_GLOBAL_CACHE_DIR/p
'';
passthru.tests = { inherit (nixosTests) ly; };
meta = with lib; {
description = "TUI display manager";
license = licenses.wtfpl;

View File

@ -16,6 +16,7 @@ runCommand "sddm-wrapped" {
passthru = {
inherit unwrapped;
inherit (unwrapped.passthru) tests;
};
meta = unwrapped.meta;

View File

@ -2,6 +2,7 @@
, cmake, pkg-config, qttools
, libxcb, libXau, pam, qtbase, qtdeclarative
, qtquickcontrols2 ? null, systemd, xkeyboardconfig
, nixosTests
}:
let
isQt6 = lib.versions.major qtbase.version == "6";
@ -76,6 +77,8 @@ in stdenv.mkDerivation(finalAttrs: {
done
'';
passthru.tests = { inherit (nixosTests) sddm; };
meta = with lib; {
description = "QML based X11 display manager";
homepage = "https://github.com/sddm/sddm";

View File

@ -1,4 +1,4 @@
{ lib, stdenv, fetchurl, swt, jre, makeWrapper, alsa-lib, jack2, fluidsynth, libpulseaudio }:
{ lib, stdenv, fetchurl, swt, jre, makeWrapper, alsa-lib, jack2, fluidsynth, libpulseaudio, nixosTests }:
let metadata = assert stdenv.hostPlatform.system == "i686-linux" || stdenv.hostPlatform.system == "x86_64-linux";
if stdenv.hostPlatform.system == "i686-linux" then
@ -31,6 +31,8 @@ in stdenv.mkDerivation rec {
--prefix CLASSPATH : "${swt}/jars/swt.jar:$out/lib/tuxguitar.jar:$out/lib/itext.jar"
'';
passthru.tests = { inherit (nixosTests) tuxguitar; };
meta = with lib; {
description = "Multitrack guitar tablature editor";
longDescription = ''

View File

@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "ox";
version = "0.2.7";
version = "0.3.0";
src = fetchFromGitHub {
owner = "curlpipe";
repo = pname;
rev = version;
hash = "sha256-4I6RjSCfNyeSQwGn6zX9AhePkqr+uOuhXdV0tat1LqI=";
hash = "sha256-g5M/d6pts4Y17CpWJAsWFL5KCq1YFaACJq6n6BQw7mo=";
};
cargoHash = "sha256-VFrN58SRTRGH+RSc59RIdsysR3umnrU2KM5XVCp9u1Q=";
cargoHash = "sha256-6+W/guijsb9+ip1cvke8JLVa4h1nU2zQJCrLv64vsa0=";
meta = with lib; {
description = "Independent Rust text editor that runs in your terminal";

View File

@ -3106,6 +3106,8 @@ let
};
};
mongodb.mongodb-vscode = callPackage ./mongodb.mongodb-vscode { };
moshfeu.compare-folders = buildVscodeMarketplaceExtension {
mktplcRef = {
name = "compare-folders";
@ -4832,8 +4834,8 @@ let
mktplcRef = {
name = "uiua-vscode";
publisher = "uiua-lang";
version = "0.0.44";
hash = "sha256-lumK7gcj/NIhiZKT6F++ZsTFKWw7ZVaKZgIsQvZAGs4=";
version = "0.0.52";
hash = "sha256-zFtu3AYnDxb/aMtkpiaItQtwLpynTVbSRGuqKv3SueM=";
};
meta = {
description = "VSCode language extension for Uiua";

View File

@ -0,0 +1,19 @@
{ lib, vscode-utils }:
vscode-utils.buildVscodeMarketplaceExtension {
mktplcRef = {
name = "mongodb-vscode";
publisher = "mongodb";
version = "1.7.0";
hash = "sha256-EDU8kQLTQIe5D905ZVskFt/28Mzv1Zr7auqG4tksQ/o=";
};
meta = {
changelog = "https://github.com/mongodb-js/vscode/blob/main/CHANGELOG.md";
description = "An extension for VS Code that makes it easy to work with your data in MongoDB";
downloadPage = "https://marketplace.visualstudio.com/items?itemName=mongodb.mongodb-vscode";
homepage = "https://github.com/mongodb-js/vscode";
license = lib.licenses.asl20;
maintainers = with lib.maintainers; [ drupol ];
};
}

View File

@ -11,13 +11,13 @@
stdenv.mkDerivation rec {
pname = "clifm";
version = "1.19";
version = "1.20";
src = fetchFromGitHub {
owner = "leo-arch";
repo = pname;
rev = "v${version}";
hash = "sha256-QNxEvFZ5e4jQV2Tv2/D9KPRDoCoQlrqStFnbKVgcXxg=";
hash = "sha256-TKQxNl+RTPQAE7mMALugm3rg8mPZq3eD/uW23DLws8I=";
};
buildInputs = [

View File

@ -1,4 +1,4 @@
{ lib, stdenvNoCC, fetchurl, unzip }:
{ lib, stdenvNoCC, fetchurl, unzip, nixosTests }:
stdenvNoCC.mkDerivation rec {
pname = "fluidd";
@ -25,6 +25,8 @@ stdenvNoCC.mkDerivation rec {
cp -r fluidd $out/share/fluidd/htdocs
'';
passthru.tests = { inherit (nixosTests) fluidd; };
meta = with lib; {
description = "Klipper web interface";
homepage = "https://docs.fluidd.xyz";

View File

@ -1,4 +1,4 @@
{ lib, stdenv, fetchzip }:
{ lib, stdenv, fetchzip, nixosTests }:
let
arch = "amd64";
@ -23,6 +23,8 @@ stdenv.mkDerivation rec {
$out/bin/jotta-cli completion bash > $out/share/bash-completion/completions/jotta-cli.bash
'';
passthru.tests = { inherit (nixosTests) jotta-cli; };
meta = with lib; {
description = "Jottacloud CLI";
homepage = "https://www.jottacloud.com/";

View File

@ -8,13 +8,13 @@
buildGoModule rec {
pname = "nwg-dock";
version = "0.4.0";
version = "0.4.1";
src = fetchFromGitHub {
owner = "nwg-piotr";
repo = pname;
rev = "v${version}";
sha256 = "sha256-qmzCjbWmrDJBB2gnhR5hc0sYD3V0i/SKTavfMA2iLyc=";
sha256 = "sha256-ZR72QMftR6bWCieJHW3k46Ujdn/W5fulGxYKoNPiPfE=";
};
vendorHash = "sha256-paRcBQwg2uGouMRX5XF++OyN8Y0JyucXLN0G5O0j3qA=";

View File

@ -1,4 +1,4 @@
{ lib, buildGoModule, fetchFromGitHub }:
{ lib, buildGoModule, fetchFromGitHub, nixosTests }:
buildGoModule rec {
pname = "writefreely";
@ -23,6 +23,8 @@ buildGoModule rec {
subPackages = [ "cmd/writefreely" ];
passthru.tests = { inherit (nixosTests) writefreely; };
meta = with lib; {
description = "Build a digital writing community";
homepage = "https://github.com/writefreely/writefreely";

View File

@ -2,13 +2,13 @@
buildGoModule rec {
pname = "argocd";
version = "2.12.0";
version = "2.12.1";
src = fetchFromGitHub {
owner = "argoproj";
repo = "argo-cd";
rev = "v${version}";
hash = "sha256-l2J7inrV82ej8baoY3FTcGeusN5e6WNEZMtzOdE8/WY=";
hash = "sha256-mqFQdgzHjht3ipTdjE4IfG9wrV7GZtuvH8T2iosiHMs=";
};
proxyVendor = true; # darwin/linux hash mismatch

View File

@ -2,18 +2,18 @@
buildGoModule rec {
pname = "kubelogin";
version = "1.28.2";
version = "1.29.0";
src = fetchFromGitHub {
owner = "int128";
repo = pname;
rev = "v${version}";
sha256 = "sha256-hWGP3/WAS2+/jylytZWo7+N/bWmrkaJDHZ0tYbElLSs=";
sha256 = "sha256-fGCllV07YustUIX1XiSvsC42obDOgl2yV5ruQMT2R0c=";
};
subPackages = ["."];
vendorHash = "sha256-r9WaS3J0b2yerjOgVLu0g95fwETqOFWoUvSC30gDzH0=";
vendorHash = "sha256-wtxSoRSpmRwuIOdKGmCRR+QLwOvONiiltg6KL6t2cf8=";
# Rename the binary instead of symlinking to avoid conflict with the
# Azure version of kubelogin

View File

@ -22,16 +22,16 @@ let
nixops-aws = callPackage ./plugins/nixops-aws.nix { };
nixops-digitalocean = callPackage ./plugins/nixops-digitalocean.nix { };
nixops-encrypted-links = callPackage ./plugins/nixops-encrypted-links.nix { };
nixops-gce = callPackage ./plugins/nixops-gce.nix { };
nixops-hercules-ci = callPackage ./plugins/nixops-hercules-ci.nix { };
nixops-hetzner = callPackage ./plugins/nixops-hetzner.nix { };
nixops-hetznercloud = callPackage ./plugins/nixops-hetznercloud.nix { };
nixops-libvirtd = callPackage ./plugins/nixops-libvirtd.nix { };
nixops-vbox = callPackage ./plugins/nixops-vbox.nix { };
nixos-modules-contrib = callPackage ./plugins/nixos-modules-contrib.nix { };
nixops-gce = throw "nixops-gce was broken and was removed from nixpkgs";
nixops-libvirtd = throw "nixops-libvirtd was broken and was removed from nixpkgs";
nixops-hetzner = throw "nixops-hetzner was broken and was removed from nixpkgs";
nixops-hetznercloud = throw "nixops-hetznercloud was broken and was removed from nixpkgs";
# aliases for backwards compatibility
nixops-gcp = nixops-gce;
nixops-virtd = nixops-libvirtd;
nixopsvbox = nixops-vbox;
};
@ -109,14 +109,11 @@ in
# Not recommended; too fragile.
nixops_unstable_full = minimal.withPlugins (ps: [
ps.nixops-aws
# currently broken
# ps.nixops-aws
ps.nixops-digitalocean
ps.nixops-encrypted-links
ps.nixops-gce
ps.nixops-hercules-ci
ps.nixops-hetzner
ps.nixops-hetznercloud
ps.nixops-libvirtd
ps.nixops-vbox
]);
}

View File

@ -53,6 +53,7 @@ buildPythonPackage {
description = "AWS plugin for NixOps";
homepage = "https://github.com/NixOS/nixops-aws";
license = licenses.lgpl3Only;
broken = true; # fails with `nose-1.3.7 not supported for interpreter python3.12`
maintainers = nixops.meta.maintainers;
};
}

View File

@ -1,55 +0,0 @@
{ lib
, buildPythonPackage
, fetchFromGitHub
, unstableGitUpdater
, poetry-core
, cryptography
, libcloud
, nixops
, nixos-modules-contrib
}:
buildPythonPackage {
pname = "nixops-gce";
version = "0-unstable-2023-05-26";
pyproject = true;
src = fetchFromGitHub {
owner = "nix-community";
repo = "nixops-gce";
rev = "d13cb794aef763338f544010ceb1816fe31d7f42";
hash = "sha256-UkYf6CoUrr8yuQoe/ik6vu+UCi3ByJd0BdkS9SLEp0Q=";
};
postPatch = ''
substituteInPlace pyproject.toml \
--replace poetry.masonry.api poetry.core.masonry.api \
--replace "poetry>=" "poetry-core>="
'';
nativeBuildInputs = [
poetry-core
];
buildInputs = [
nixops
];
propagatedBuildInputs = [
cryptography
libcloud
nixos-modules-contrib
];
pythonImportsCheck = [ "nixops_gcp" ];
passthru.updateScript = unstableGitUpdater {};
meta = with lib; {
description = "NixOps Google Cloud Backend";
homepage = "https://github.com/nix-community/nixops-gce";
license = licenses.mit;
maintainers = nixops.meta.maintainers;
broken = true; # never built on Hydra
};
}

View File

@ -1,57 +0,0 @@
{ lib
, buildPythonPackage
, fetchFromGitHub
, unstableGitUpdater
, poetry-core
, hetzner
, nixops
, nixos-modules-contrib
, typing-extensions
}:
buildPythonPackage {
pname = "nixops-hetzner";
version = "1.0.1-unstable-2022-04-24";
pyproject = true;
src = fetchFromGitHub {
owner = "NixOS";
repo = "nixops-hetzner";
rev = "bc7a68070c7371468bcc8bf6e36baebc6bd2da35";
hash = "sha256-duK1Ui4VpbGSgGvfjTOddHSqHZ1FSy4L9Egg+FvZv04=";
};
postPatch = ''
substituteInPlace pyproject.toml \
--replace poetry.masonry.api poetry.core.masonry.api \
--replace "poetry>=" "poetry-core>="
'';
nativeBuildInputs = [
poetry-core
];
buildInputs = [
nixops
];
propagatedBuildInputs = [
hetzner
nixos-modules-contrib
typing-extensions
];
pythonImportsCheck = [ "nixops_hetzner" ];
passthru.updateScript = unstableGitUpdater {
tagPrefix = "v";
};
meta = with lib; {
description = "Hetzner bare metal NixOps plugin";
homepage = "https://github.com/NixOS/nixops-hetzner";
license = licenses.mit;
maintainers = nixops.meta.maintainers;
broken = true; # never built on Hydra
};
}

View File

@ -1,53 +0,0 @@
{ lib
, buildPythonPackage
, fetchFromGitHub
, unstableGitUpdater
, poetry-core
, hcloud
, nixops
, typing-extensions
}:
buildPythonPackage {
pname = "nixops-hetznercloud";
version = "0-unstable-2023-02-19";
pyproject = true;
src = fetchFromGitHub {
owner = "lukebfox";
repo = "nixops-hetznercloud";
rev = "e14f340f7ffe9e2aa7ffbaac0b8a2e3b4cc116b3";
hash = "sha256-IsRJUUAfN6YXcue80qlcunkawUtgMiMU8mM6DP+7Cm4=";
};
postPatch = ''
substituteInPlace pyproject.toml \
--replace poetry.masonry.api poetry.core.masonry.api \
--replace "poetry>=" "poetry-core>="
'';
nativeBuildInputs = [
poetry-core
];
buildInputs = [
nixops
];
propagatedBuildInputs = [
hcloud
typing-extensions
];
pythonImportsCheck = [ "nixops_hetznercloud" ];
passthru.updateScript = unstableGitUpdater {};
meta = with lib; {
description = "NixOps plugin supporting Hetzner Cloud deployments";
homepage = "https://github.com/lukebfox/nixops-hetznercloud";
license = licenses.lgpl3Only;
maintainers = with maintainers; [ lukebfox ];
broken = true; # never built on Hydra
};
}

View File

@ -1,53 +0,0 @@
{ lib
, buildPythonPackage
, fetchFromGitHub
, unstableGitUpdater
, poetry-core
, libvirt
, nixops
}:
buildPythonPackage {
pname = "nixops-libvirtd";
version = "1.0.0-unstable-2023-09-01";
pyproject = true;
src = fetchFromGitHub {
owner = "nix-community";
repo = "nixops-libvirtd";
rev = "b59424bf53e74200d684a4bce1ae64d276e793a0";
hash = "sha256-HxJu8/hOPI5aCddTpna0mf+emESYN3ZxpTkitfKcfVQ=";
};
postPatch = ''
substituteInPlace pyproject.toml \
--replace poetry.masonry.api poetry.core.masonry.api \
--replace "poetry>=" "poetry-core>="
'';
nativeBuildInputs = [
poetry-core
];
buildInputs = [
nixops
];
propagatedBuildInputs = [
libvirt
];
pythonImportsCheck = [ "nixops_virtd" ];
passthru.updateScript = unstableGitUpdater {
tagPrefix = "v";
};
meta = with lib; {
description = "NixOps libvirtd backend plugin";
homepage = "https://github.com/nix-community/nixops-libvirtd";
license = licenses.lgpl3Only;
maintainers = with maintainers; [ aminechikhaoui ];
broken = true; # never built on Hydra
};
}

View File

@ -5,16 +5,19 @@
buildGoModule rec {
pname = "tfautomv";
version = "0.5.4";
version = "0.6.2";
src = fetchFromGitHub {
owner = "busser";
repo = pname;
rev = "v${version}";
hash = "sha256-irB0Kfd8eqIKq0ooJRxB0X4t2/1aFCNYRwaG6lAw3ic=";
hash = "sha256-qUeIbHJqxGkt2esMm4w6fM52ZE16jWnxugVXxqBh1Qc=";
};
vendorHash = "sha256-Wc5hpiHL5I01IodcHX0IzeKfthkFS7SuUxmaxOU6WkA=";
# checks require unfree programs like terraform/terragrunt
doCheck = false;
vendorHash = "sha256-BZ8IhVPxZTPQXBotFBrxV3dfwvst0te8R84I/urq3gY=";
ldflags = [ "-s" "-w" ];

View File

@ -1,4 +1,4 @@
{ lib, stdenv, fetchFromGitHub, gzip }:
{ lib, stdenv, fetchFromGitHub, gzip, nixosTests }:
stdenv.mkDerivation rec {
pname = "ndppd";
@ -26,6 +26,8 @@ stdenv.mkDerivation rec {
cp ndppd.conf-dist $out/etc/ndppd.conf
'';
passthru.tests = { inherit (nixosTests) ndppd; };
meta = with lib; {
description = "Daemon that proxies NDP (Neighbor Discovery Protocol) messages between interfaces";
homepage = "https://github.com/DanielAdolfsson/ndppd";

View File

@ -8,6 +8,7 @@
, gobject-introspection
, librsvg
, wrapGAppsHook3
, nixosTests
}:
let
@ -87,6 +88,8 @@ let
done
'';
passthru.tests = { inherit (nixosTests) deluge; };
meta = with lib; {
description = "Torrent client";
homepage = "https://deluge-torrent.org";

View File

@ -21,6 +21,7 @@
, libjpeg_turbo
, _experimental-update-script-combinators
, gitUpdater
, nixosTests
}:
let
@ -159,6 +160,9 @@ let
{ command = ["rm" "update-git-commits.txt"]; }
(gitUpdater { rev-prefix = "v"; attrPath = "xrdp.xorgxrdp"; })
]);
tests = {
inherit (nixosTests) xrdp;
};
};
meta = with lib; {

View File

@ -1,22 +1,22 @@
{ fetchurl }:
let
pname = "roam-research";
version = "0.0.19";
version = "0.0.22";
in
{
inherit pname version;
sources = {
x86_64-darwin = fetchurl {
url = "https://roam-electron-deploy.s3.us-east-2.amazonaws.com/Roam+Research-${version}.dmg";
hash = "sha256-pIH4p7dnmyOgGyruSJ39xB8iJ45wtxcIQmfUeBLlDes=";
hash = "sha256-GA9m4z+3Dy87Dz/YPG5MYbREQ1cEAdX/MJvkAJ/fe34=";
};
aarch64-darwin = fetchurl {
url = "https://roam-electron-deploy.s3.us-east-2.amazonaws.com/Roam+Research-${version}-arm64.dmg";
hash = "sha256-iQRaaSU033t3WVWZSKuXCPJbMoNpwLnDHBz5QURu6Gw=";
hash = "sha256-+lgV5TpTzN7mJvvVEpBbmq+aBOBKy1CpYkMNhfoxhK0=";
};
x86_64-linux = fetchurl {
url = "https://roam-electron-deploy.s3.us-east-2.amazonaws.com/${pname}_${version}_amd64.deb";
hash = "sha256-eDN+hrAc+ePRELcXAs5WypzPlJ+Wtg3kUarf8rq5CnA=";
hash = "sha256-HVGytdP5fkQQABeL9y869GZioutvnBHrwPprAjfBbFg=";
};
};
}

View File

@ -1,4 +1,4 @@
{ lib, stdenv, undmg, fetchurl }:
{ lib, stdenv, _7zz, fetchurl }:
let
common = import ./common.nix { inherit fetchurl; };
inherit (stdenv.hostPlatform) system;
@ -11,7 +11,7 @@ stdenv.mkDerivation rec {
sourceRoot = ".";
nativeBuildInputs = [ undmg ];
nativeBuildInputs = [ _7zz ];
installPhase = ''
runHook preInstall

View File

@ -1,5 +1,6 @@
{ pname, version, src, gitSrc, buildInputs ? []
, homepage, description, maintainers
, passthru ? {}
}:
{ lib, stdenv, openssl, zlib, asciidoc, libxml2, libxslt
@ -10,7 +11,7 @@
}:
stdenv.mkDerivation {
inherit pname version src gitSrc;
inherit pname version src gitSrc passthru;
separateDebugInfo = true;

View File

@ -1,4 +1,4 @@
{ lib, fetchurl, callPackage, luajit }:
{ lib, fetchurl, callPackage, luajit, nixosTests }:
callPackage (import ./common.nix rec {
pname = "cgit";
@ -19,6 +19,8 @@ callPackage (import ./common.nix rec {
buildInputs = [ luajit ];
passthru.tests = { inherit (nixosTests) cgit; };
homepage = "https://git.zx2c4.com/cgit/about/";
description = "Web frontend for git repositories";
maintainers = with lib.maintainers; [ bjornfor ];

View File

@ -2,16 +2,16 @@
buildGoModule rec {
pname = "glab";
version = "1.41.0";
version = "1.45.0";
src = fetchFromGitLab {
owner = "gitlab-org";
repo = "cli";
rev = "v${version}";
hash = "sha256-DvIp7eMBWKWQ5VW9MW391xnUz8o1KNz1mkJtu7YVILo=";
hash = "sha256-jTpddpS+FYSQg2aRxQiVlG+bitiIqmZ4kxOJLPZkICo=";
};
vendorHash = "sha256-WM19Kx2b31e4/iA92U9FUuF8R1DMvbKotE2D9HpLQpQ=";
vendorHash = "sha256-o0sYObTeDgG+3X3YEnDbk1h4DkEiMwEgYMF7hGjCL3Q=";
ldflags = [
"-s"

View File

@ -1,6 +1,7 @@
{ lib
, buildGoModule
, fetchFromGitHub
, nixosTests
}:
buildGoModule rec {
@ -24,6 +25,8 @@ buildGoModule rec {
cp -r $src/static/* $out/lib/legit/static
'';
passthru.tests = { inherit (nixosTests) legit; };
meta = {
description = "Web frontend for git";
homepage = "https://github.com/icyphox/legit";

View File

@ -1,46 +0,0 @@
{ fetchFromGitHub, lib, python3Packages, meld, subversion, gvfs, xdg-utils, gtk3 }:
python3Packages.buildPythonApplication rec {
pname = "rabbitvcs";
version = "0.18";
namePrefix = "";
src = fetchFromGitHub {
owner = "rabbitvcs";
repo = "rabbitvcs";
rev = "v${version}";
hash = "sha256-gVrdf8vQWAGORZqlTS/axs4U7aZlS8OAgPM3iKgqAtM=";
};
buildInputs = [ gtk3 ];
pythonPath = with python3Packages; [ configobj pygobject3 pysvn dulwich tkinter gvfs xdg-utils ];
prePatch = ''
sed -ie 's|if sys\.argv\[1\] == "install":|if False:|' ./setup.py
sed -ie "s|PREFIX = sys.prefix|PREFIX = \"$out\"|" ./setup.py
sed -ie 's|/usr/bin/meld|${meld}/bin/meld|' ./rabbitvcs/util/configspec/configspec.ini
sed -ie 's|/usr/bin/svnadmin|${subversion.out}/bin/svnadmin|' ./rabbitvcs/ui/create.py
sed -ie "s|/usr/share/doc|$out/share/doc|" ./rabbitvcs/ui/about.py
sed -ie "s|gnome-open|xdg-open|" ./rabbitvcs/util/helper.py
'';
outputs = [ "out" "cli" ];
postInstall = ''
mkdir -p $cli/bin
cp clients/cli/rabbitvcs $cli/bin
wrapPythonProgramsIn $cli "$out $pythonPath"
'';
doCheck = false;
meta = {
description = "Graphical tools for working with version control systems";
homepage = "http://rabbitvcs.org/";
license = lib.licenses.gpl2Plus;
platforms = lib.platforms.linux;
maintainers = [ lib.maintainers.mathnerd314 ];
# ModuleNotFoundError: No module named 'rabbitvcs'
broken = true; # Added 2024-01-28
};
}

View File

@ -12,6 +12,7 @@
, speex
, jansson
, libopus
, nixosTests
, withJanus ? true
}:
stdenv.mkDerivation rec {
@ -53,6 +54,8 @@ stdenv.mkDerivation rec {
enableParallelBuilding = true;
passthru.tests = { inherit (nixosTests) ustreamer; };
meta = with lib; {
homepage = "https://github.com/pikvm/ustreamer";
description = "Lightweight and fast MJPG-HTTP streamer";

View File

@ -3,6 +3,7 @@
, yajl, xcb-util-cursor, perl, pango, perlPackages, libxkbcommon
, xorgserver, xvfb-run, xdotool, xorg, which
, asciidoc, xmlto, docbook_xml_dtd_45, docbook_xsl, findXMLCatalogs
, nixosTests
}:
stdenv.mkDerivation rec {
@ -78,6 +79,9 @@ stdenv.mkDerivation rec {
separateDebugInfo = true;
passthru.tests = { inherit (nixosTests) i3wm; };
meta = with lib; {
description = "Tiling window manager";
homepage = "https://i3wm.org";

View File

@ -1,5 +1,6 @@
{ lib, stdenv, wlroots, pkg-config, wayland-scanner
, libxkbcommon, pixman, udev, wayland, wayland-protocols
, nixosTests
}:
stdenv.mkDerivation {
@ -18,6 +19,8 @@ stdenv.mkDerivation {
runHook postInstall
'';
passthru.tests = { inherit (nixosTests) tinywl; };
meta = {
homepage = "https://gitlab.freedesktop.org/wlroots/wlroots/tree/master/tinywl";
description = ''A "minimum viable product" Wayland compositor based on wlroots'';

View File

@ -62,6 +62,8 @@ stdenv.mkDerivation {
}
'';
#passthru.tests = { inherit (nixosTests) yabar; }; # nixos currently uses yabar-unstable
meta = with lib; {
description = "Modern and lightweight status bar for X window managers";
homepage = "https://github.com/geommer/yabar";

View File

@ -1,4 +1,4 @@
{ fetchpatch, playerctl, libxkbcommon, callPackage, attrs ? {} }:
{ fetchpatch, playerctl, libxkbcommon, callPackage, nixosTests, attrs ? {} }:
let
pkg = callPackage ./build.nix ({
@ -22,4 +22,11 @@ in pkg.overrideAttrs (o: {
sha256 = "1q7nd66ai6nr2m6iqxn55gvbr4r5gjc00c8wyjc3riv31qcbqbhv";
})
];
passthru = (o.passthru or {}) // {
tests = (o.passthru.tests or {}) // {
inherit (nixosTests) yabar;
};
};
})

View File

@ -77,7 +77,7 @@ let
rev = "v${version}";
hash = "sha256-HTi2FKzKCbRaP13XERUmHkJgw8IfKaRJvsK3+YxFFdc=";
};
buildInputs = prev.buildInputs ++ [ pkg-config ];
nativeBuildInputs = prev.nativeBuildInputs ++ [ pkg-config ];
patches = (prev.patches or [ ]) ++ [
(fetchpatch {
name = "stormlib-optimizations.patch";

View File

@ -14,16 +14,16 @@ let
in
rustPlatform.buildRustPackage rec {
pname = "argc";
version = "1.20.0";
version = "1.20.1";
src = fetchFromGitHub {
owner = "sigoden";
repo = "argc";
rev = "v${version}";
hash = "sha256-Oh2vV4Dr4suVEGrwGNyzVlKrOh+lXwdEwDPNzFzqmOo=";
hash = "sha256-pOkZmk7boFPqHHBDet/on6Y8V2Ik+hpqN0cUtY0BiR0=";
};
cargoHash = "sha256-3zVO0ZAL+npijGg6/Idb7MD80WW5vi1qxbZqCwwhmIU=";
cargoHash = "sha256-FxhDnTy/KAeN0Zd5I12EUgXRc0VhHN0lRm5DQyCinyw=";
nativeBuildInputs = [ installShellFiles ] ++ lib.optional (!canExecuteHost) buildPackages.argc;

View File

@ -7,6 +7,7 @@
installShellFiles,
stdenv,
testers,
nixosTests,
}:
buildGoModule rec {
pname = "artalk";
@ -56,6 +57,7 @@ buildGoModule rec {
passthru.tests = {
version = testers.testVersion { package = artalk; };
inherit (nixosTests) artalk;
};
meta = {

View File

@ -0,0 +1,42 @@
diff --git a/src/main.c b/src/main.c
index 993a76f..de5b2c5 100644
--- a/src/main.c
+++ b/src/main.c
@@ -6,12 +6,8 @@ _Static_assert(sizeof(string_modes)/sizeof(*string_modes) == MODE_COUNT, "Number
char *get_help_page(char *page) {
if (page == NULL) return NULL;
- char *env = getenv("HOME");
- if(env == NULL) CRASH("could not get HOME");
-
- char *help_page = calloc(128, sizeof(char));
- if (help_page == NULL) CRASH("could not calloc memory for help page");
- snprintf(help_page, 128, "%s/.local/share/cano/help/%s", env, page);
+ char *help_page;
+ asprintf(&help_page, "@help@/%s", page);
// check if file exists
struct stat st;
diff --git a/src/tools.c b/src/tools.c
index 220d7a1..4ce211e 100644
--- a/src/tools.c
+++ b/src/tools.c
@@ -63,6 +63,9 @@ void free_undo_stack(Undo_Stack *undo) {
void handle_save(Buffer *buffer) {
FILE *file = fopen(buffer->filename, "w");
+
+ if (file == NULL)
+ return;
fwrite(buffer->data.data, buffer->data.count, sizeof(char), file);
fclose(file);
}
@@ -72,7 +75,7 @@ Buffer *load_buffer_from_file(char *filename) {
size_t filename_s = strlen(filename)+1;
buffer->filename = calloc(filename_s, sizeof(char));
strncpy(buffer->filename, filename, filename_s);
- FILE *file = fopen(filename, "a+");
+ FILE *file = fopen(filename, "r");
if(file == NULL) CRASH("Could not open file");
fseek(file, 0, SEEK_END);
size_t length = ftell(file);

View File

@ -1,34 +1,55 @@
{ stdenv
, lib
, fetchFromGitHub
, gnumake
, ncurses
{
stdenv,
lib,
fetchFromGitHub,
installShellFiles,
ncurses,
}:
stdenv.mkDerivation (finalAttrs: {
pname = "cano";
version = "0.1.0-alpha";
version = "0.2.0-alpha";
src = fetchFromGitHub {
owner = "CobbCoding1";
repo = "Cano";
rev = "v${finalAttrs.version}";
hash = "sha256-BKbBDN7xZwlNzw7UFgX+PD9UXbr9FtELo+PlbfSHyRY=";
hash = "sha256-OaWj0AKw3+sEhcAbIjgOLfxwCKRG6O1k+zSp0GnnFn8=";
};
buildInputs = [ gnumake ncurses ];
hardeningDisable = [ "format" "fortify" ];
patches = [ ./allow-read-only-store-help-page.patch ];
postPatch = ''
substituteInPlace src/main.c \
--replace-fail "@help@" "${placeholder "out"}/share/help"
'';
nativeBuildInputs = [ installShellFiles ];
buildInputs = [ ncurses ];
hardeningDisable = [
"format"
"fortify"
];
installPhase = ''
mkdir -p $out/bin
cp build/cano $out/bin
runHook preInstall
install -Dm755 build/cano -t $out/bin
mkdir -p $out/share
cp -r docs/help $out/share
installManPage docs/cano.1
runHook postInstall
'';
meta = {
description = "Text Editor Written In C Using ncurses";
homepage = "https://github.com/CobbCoding1/Cano";
license = lib.licenses.asl20;
mainProgram = "Cano";
maintainers = with lib.maintainers; [ sigmanificient ];
platforms = lib.platforms.linux;
description = "Text Editor Written In C Using ncurses";
homepage = "https://github.com/CobbCoding1/Cano";
license = lib.licenses.asl20;
mainProgram = "Cano";
maintainers = with lib.maintainers; [ sigmanificient ];
platforms = lib.platforms.linux;
};
})

View File

@ -1,6 +1,7 @@
{ lib
, buildGoModule
, fetchFromGitHub
, nixosTests
}:
buildGoModule rec {
@ -18,6 +19,9 @@ buildGoModule rec {
ldflags = [ "-s" "-w" ];
passthru.tests = { inherit (nixosTests) certmgr; };
meta = with lib; {
homepage = "https://cfssl.org/";
description = "Cloudflare's automated certificate management using a CFSSL CA";

View File

@ -17,13 +17,13 @@
}:
stdenv.mkDerivation (finalAttrs: {
pname = "clang-uml";
version = "0.5.3";
version = "0.5.4";
src = fetchFromGitHub {
owner = "bkryza";
repo = "clang-uml";
rev = finalAttrs.version;
hash = "sha256-ghnbOjVYw0zdFK/SDJ3sOObu6I7ROVNzYl1hovWju/Q=";
hash = "sha256-PEzTvwW/wUg8wgKjeNGbpgpP3SH2sVWRYc6o3gFjxx0=";
};
nativeBuildInputs = [

View File

@ -9,16 +9,16 @@
buildGoModule rec {
pname = "cue";
version = "0.9.2";
version = "0.10.0";
src = fetchFromGitHub {
owner = "cue-lang";
repo = "cue";
rev = "v${version}";
hash = "sha256-C3BvI43oo71y19ZRflqhKRQF7DwBBOV0yRlutv+W18g=";
hash = "sha256-GvReoBP8QCdrKxox8yPLZEk5YvTvwr7kflpS/jN8GTg=";
};
vendorHash = "sha256-FsFignBh669E60S8l8siQHLzeSfB5X/XOHBXPMDX3Cg=";
vendorHash = "sha256-sLTpra7JwgF4l1UCrUtzQA4xrP4OqxBcZ1qEssBdFtk=";
subPackages = [ "cmd/*" ];

View File

@ -2,6 +2,7 @@
lib,
fetchFromGitHub,
php,
nixosTests,
}:
php.buildComposerProject (finalAttrs: {
@ -25,6 +26,10 @@ php.buildComposerProject (finalAttrs: {
rm -rf "$out/share"
'';
passthru.tests = {
inherit (nixosTests) davis;
};
meta = {
changelog = "https://github.com/tchapi/davis/releases/tag/v${finalAttrs.version}";
homepage = "https://github.com/tchapi/davis";

View File

@ -7,21 +7,21 @@
}:
let
pname = "dbgate";
version = "5.3.1";
version = "5.3.4";
src =
fetchurl
{
aarch64-linux = {
url = "https://github.com/dbgate/dbgate/releases/download/v${version}/dbgate-${version}-linux_arm64.AppImage";
hash = "sha256-Qz0VA2pHT8muw9RdLg7Y3w3mJ3ubFnqf4dmfdZdnJHI=";
hash = "sha256-szG0orYBB1+DE9Vwjq0sluIaLDBlWOScKuruJR4iQKg=";
};
x86_64-linux = {
url = "https://github.com/dbgate/dbgate/releases/download/v${version}/dbgate-${version}-linux_x86_64.AppImage";
hash = "sha256-H/2Tb6ZnO6LJx+rv/ADdItaRMP95x4G3lPNK0sbZn9I=";
hash = "sha256-C0BJ3dydaeV8ypc8c0EDiMBhvByLAKuKTGHOozqbd+w=";
};
x86_64-darwin = {
url = "https://github.com/dbgate/dbgate/releases/download/v${version}/dbgate-${version}-mac_x64.dmg";
hash = "sha256-gZrfv9qe2arytVgiYtX9uwfwC4Z30SHEDiBUXcpF968=";
hash = "sha256-WwUpFFeZ9NmosHZqrHCbsz673fSbdQvwxhEvz/6JJtw=";
};
}
.${stdenv.system} or (throw "dbgate: ${stdenv.system} is unsupported.");

View File

@ -4,6 +4,7 @@
, fetchpatch
, python3
, installShellFiles
, nixosTests
}:
python3.pkgs.buildPythonApplication rec {
@ -87,6 +88,8 @@ python3.pkgs.buildPythonApplication rec {
rm -r "${sitePackages}/usr"
'';
passthru.tests = { inherit (nixosTests) fail2ban; };
meta = with lib; {
homepage = "https://www.fail2ban.org/";
description = "Program that scans log files for repeated failing login attempts and bans IP addresses";

View File

@ -1,14 +1,15 @@
{ lib
, fetchFromGitHub
, rustPlatform
, fetchurl
, runCommand
, lndir
{
lib,
fetchFromGitHub,
rustPlatform,
fetchurl,
runCommand,
lndir,
}:
rustPlatform.buildRustPackage rec {
pname = "flaca";
version = "2.4.6";
version = "3.1.6";
src =
let
@ -16,11 +17,11 @@ rustPlatform.buildRustPackage rec {
owner = "Blobfolio";
repo = pname;
rev = "v${version}";
hash = "sha256-uybEo098+Y92b2P9CniKFmaV8hQZFuOSthgQRGZ/ncc=";
hash = "sha256-mNCb9d7/nRWSkiir2bYkslw/F2GmjvE0cPi7HhzEN68=";
};
lockFile = fetchurl {
url = "https://github.com/Blobfolio/flaca/releases/download/v${version}/Cargo.lock";
hash = "sha256-xAjpw71HgS6fILg5zNuc43s0fIqYcoUMMbCH65xrlww=";
hash = "sha256-tyxTgYEGROCtoiKPX57pF32UcfpDCuMdFSttZu++ju8=";
};
in
runCommand "source-with-lock" { nativeBuildInputs = [ lndir ]; } ''
@ -29,7 +30,9 @@ rustPlatform.buildRustPackage rec {
lndir -silent ${source} $out
'';
cargoHash = "sha256-w+PeuH6VFIu3iH5EXF6gEwyYoGeqXX0yd5jJs2NqisQ=";
nativeBuildInputs = [ rustPlatform.bindgenHook ];
cargoHash = "sha256-YYNWCJT5ZT36v4u4P3gtW/osor6eIvR8leqlQHHZYMk=";
meta = with lib; {
description = "CLI tool to losslessly compress JPEG and PNG images";

View File

@ -5,7 +5,7 @@
python3.pkgs.buildPythonApplication rec {
pname = "flexget";
version = "3.11.42";
version = "3.11.43";
pyproject = true;
# Fetch from GitHub in order to use `requirements.in`
@ -13,7 +13,7 @@ python3.pkgs.buildPythonApplication rec {
owner = "Flexget";
repo = "Flexget";
rev = "refs/tags/v${version}";
hash = "sha256-wDZXSQlIE1qQz463roHp3jepSFMZGSJAPOhKpuXTmG8=";
hash = "sha256-KX7Bvu4rt+Q7x2XkBiZMngAgqRKYu90EVi2oQ21o5AI=";
};
postPatch = ''

View File

@ -17,8 +17,6 @@
, nix-update-script
, nixosTests
, openssh
, pam
, pamSupport ? true
, sqliteSupport ? true
, xorg
, runCommand
@ -68,8 +66,6 @@ buildGoModule rec {
makeWrapper
];
buildInputs = lib.optional pamSupport pam;
nativeCheckInputs = [
git
openssh
@ -83,8 +79,7 @@ buildGoModule rec {
substituteInPlace modules/setting/server.go --subst-var data
'';
tags = lib.optional pamSupport "pam"
++ lib.optionals sqliteSupport [ "sqlite" "sqlite_unlock_notify" ];
tags = lib.optionals sqliteSupport [ "sqlite" "sqlite_unlock_notify" ];
ldflags = [
"-s"
@ -115,7 +110,6 @@ buildGoModule rec {
skippedTests = [
"Test_SSHParsePublicKey/dsa-1024/SSHKeygen" # dsa-1024 is deprecated in openssh and requires opting-in at compile time
"Test_calcFingerprint/dsa-1024/SSHKeygen" # dsa-1024 is deprecated in openssh and requires opting-in at compile time
"TestPamAuth" # we don't have PAM set up in the build sandbox
"TestPassword" # requires network: api.pwnedpasswords.com
"TestCaptcha" # requires network: hcaptcha.com
"TestDNSUpdate" # requires network: release.forgejo.org

View File

@ -1,4 +1,4 @@
{ lib, stdenv, fetchurl }:
{ lib, stdenv, fetchurl, nixosTests }:
stdenv.mkDerivation rec {
pname = "gerrit";
@ -30,6 +30,9 @@ stdenv.mkDerivation rec {
"singleusergroup"
"webhooks"
];
tests = {
inherit (nixosTests) gerrit;
};
};
meta = with lib; {

View File

@ -12,6 +12,7 @@
makeFontsConf,
liberation_ttf_v2,
exiftool,
nixosTests,
nix-update-script,
}:
let
@ -81,6 +82,9 @@ buildGoModule rec {
'';
passthru.updateScript = nix-update-script { };
passthru.tests = {
inherit (nixosTests) gotenberg;
};
meta = {
description = "Converts numerous document formats into PDF files";

View File

@ -29,6 +29,7 @@
, bzip2
, libgcrypt
, sqlite
, nixosTests
, stateDir ? "/var"
, storeDir ? "/gnu/store"
@ -134,6 +135,10 @@ stdenv.mkDerivation rec {
done
'';
passthru.tests = {
inherit (nixosTests) guix;
};
meta = with lib; {
description = "Functional package manager with a Scheme interface";
longDescription = ''

View File

@ -8,14 +8,14 @@
}:
python3.pkgs.buildPythonApplication rec {
pname = "handheld-daemon";
version = "3.3.7";
version = "3.3.8";
pyproject = true;
src = fetchFromGitHub {
owner = "hhd-dev";
repo = "hhd";
rev = "refs/tags/v${version}";
hash = "sha256-nRI1YrKBg7J14PQbWLLNaCI9p3v6Yl+Q506EOlSqqVc=";
hash = "sha256-15vG+e509CEagZ+G9FcfRmsdD8Jex8xUfdvEKlY+FaI=";
};
propagatedBuildInputs = with python3.pkgs; [

View File

@ -0,0 +1,43 @@
{
lib,
stdenv,
fetchFromGitHub,
curl,
libnxml,
autoreconfHook,
pkg-config,
}:
stdenv.mkDerivation (finalAttrs: {
pname = "libmrss";
version = "0.19.4";
src = fetchFromGitHub {
owner = "bakulf";
repo = "libmrss";
rev = "refs/tags/${finalAttrs.version}";
hash = "sha256-sllY0Q8Ct7XJn4A3N8xQCUqaHXubPoB49gBZS1vURBs=";
};
postPatch = ''
touch NEWS # https://github.com/bakulf/libmrss/issues/3
'';
nativeBuildInputs = [
autoreconfHook
pkg-config
];
propagatedBuildInputs = [
curl
libnxml
];
meta = {
homepage = "https://github.com/bakulf/libmrss";
description = "C library for parsing, writing and creating RSS/ATOM files or streams";
license = lib.licenses.lgpl2;
platforms = lib.platforms.all;
maintainers = with lib.maintainers; [ sigmanificient ];
};
})

View File

@ -0,0 +1,30 @@
{
lib,
stdenv,
fetchFromGitHub,
autoreconfHook,
curl,
}:
stdenv.mkDerivation (finalAttrs: {
pname = "libnxml";
version = "0.18.5";
src = fetchFromGitHub {
owner = "bakulf";
repo = "libnxml";
rev = "refs/tags/${finalAttrs.version}";
hash = "sha256-6KI1bsfDgGJ4x8Wv7fcwCKm5AILa3jLnV53JY1g9B+M=";
};
nativeBuildInputs = [ autoreconfHook ];
buildInputs = [ curl ];
meta = {
homepage = "https://github.com/bakulf/libnxml";
description = "C library for parsing, writing and creating XML 1.0 and 1.1 files or streams";
license = lib.licenses.lgpl2;
platforms = lib.platforms.all;
maintainers = with lib.maintainers; [ sigmanificient ];
};
})

View File

@ -0,0 +1,60 @@
{
lib,
buildGoModule,
fetchFromGitHub,
installShellFiles,
}:
buildGoModule rec {
pname = "logdy";
version = "0.13.0";
src = fetchFromGitHub {
owner = "logdyhq";
repo = "logdy-core";
rev = "v${version}";
hash = "sha256-HlIl/4C1wheAxc0ReUN8xQrXJ0djoO7E0qhRwyFHEiE=";
};
vendorHash = "sha256-kFhcbBMymzlJ+2zw7l09LJfCdps26Id+VzOehqrLDWU=";
ldflags = [
"-s"
"-w"
];
nativeBuildInputs = [ installShellFiles ];
# After the build this derivation will generate two binaries.
# The first one is getting renamed based on the documentation
# The second one is just to launch a demo. This functionality could be achieved with the first one
postInstall = ''
mv $out/bin/logdy-core $out/bin/logdy
rm -f $out/bin/example-app
installShellCompletion --cmd logdy \
--bash <($out/bin/logdy completion bash) \
--fish <($out/bin/logdy completion fish) \
--zsh <($out/bin/logdy completion zsh)
'';
checkFlags = [
"-skip=^TestClientLoad$" # index out of range
];
meta = {
description = "Web based real-time log viewer";
longDescription = ''
Web based real-time log viewer.
Stream ANY content to a web UI with autogenerated filters.
Parse any format with TypeScript
'';
homepage = "https://github.com/logdyhq/logdy-core";
license = lib.licenses.asl20;
maintainers = with lib.maintainers; [
sigmanificient
ByteSudoer
];
mainProgram = "logdy";
};
}

View File

@ -7,7 +7,7 @@
CoreServices ? darwin.apple_sdk.frameworks.CoreServices,
}:
let
version = "0.6.2";
version = "0.6.3";
in
rustPlatform.buildRustPackage {
pname = "mdbook-alerts";
@ -17,10 +17,10 @@ rustPlatform.buildRustPackage {
owner = "lambdalisue";
repo = "rs-mdbook-alerts";
rev = "v${version}";
hash = "sha256-wbXBsLOxQPEOzPcTOpG28B8Or74WGiAhgaLwnHAwT0g=";
hash = "sha256-MoaV/JRhWKYEzUkzxRTgYjqBw+gb2h+Bjb4mEvWEkp8=";
};
cargoHash = "sha256-Q+mq6xu8fK6Jwee3x4hzHmC2zudV9IcGV0JfJRoKNMQ=";
cargoHash = "sha256-tHRbeDSK4aULz69jy5MeU4rANVuO2q3GUhDvBA4iQCM=";
buildInputs = lib.optionals stdenv.isDarwin [ CoreServices ];

View File

@ -0,0 +1,131 @@
{
stdenv,
lib,
fetchurl,
autoPatchelfHook,
curl,
openssl,
testers,
mongodb-ce,
writeShellApplication,
jq,
nix-update,
gitMinimal,
pup,
}:
let
version = "7.0.12";
srcs = version: {
"x86_64-linux" = {
url = "https://fastdl.mongodb.org/linux/mongodb-linux-x86_64-ubuntu2204-${version}.tgz";
hash = "sha256-Kgq66rOBKgNIVw6bvzNrpnGRxyoBCP0AWnfzs9ReVVk=";
};
"aarch64-linux" = {
url = "https://fastdl.mongodb.org/linux/mongodb-linux-aarch64-ubuntu2204-${version}.tgz";
hash = "sha256-OLxPpAYFicWrqRJo3cNIG5Y0S6MIMd2vW8bluQkqnyk=";
};
"x86_64-darwin" = {
url = "https://fastdl.mongodb.org/osx/mongodb-macos-x86_64-${version}.tgz";
hash = "sha256-sKfg1EpRQ7L2rgJArRHQLrawU8bh42liih5GR2/3jok=";
};
"aarch64-darwin" = {
url = "https://fastdl.mongodb.org/osx/mongodb-macos-arm64-${version}.tgz";
hash = "sha256-XkFSuKKxgSRoyzzrPYamE/44FV8ol125nqDOB9EnSMM=";
};
};
in
stdenv.mkDerivation (finalAttrs: {
pname = "mongodb-ce";
inherit version;
src = fetchurl (
(srcs version).${stdenv.hostPlatform.system}
or (throw "unsupported system: ${stdenv.hostPlatform.system}")
);
nativeBuildInputs = [ autoPatchelfHook ];
buildInputs = [
# This is to avoid the following error:
# ./result/bin/mongod: /nix/store/y6w7agm3aw5p96q7vsgzivba0dqq3rd0-curl-8.8.0/lib/libcurl.so.4: no version information available (required by ./result/bin/mongod)
# When running `mongod --version`
# See https://discourse.nixos.org/t/patchelf-and-libcurl-no-version-information-available/24453
(curl.overrideAttrs (old: {
configureFlags = old.configureFlags ++ [ "--enable-versioned-symbols" ];
})).dev
openssl.dev
stdenv.cc.cc.lib
];
installPhase = ''
runHook preInstall
install -Dm 755 bin/mongod $out/bin/mongod
install -Dm 755 bin/mongos $out/bin/mongos
runHook postInstall
'';
passthru = {
updateScript =
let
script = writeShellApplication {
name = "${finalAttrs.pname}-updateScript";
runtimeInputs = [
curl
jq
nix-update
gitMinimal
pup
];
text =
''
# Get latest version string from Github
NEW_VERSION=$(curl -s "https://api.github.com/repos/mongodb/mongo/tags?per_page=1000" | jq -r 'first(.[] | .name | select(startswith("r7.0")) | select(contains("rc") | not) | .[1:])')
# Check if the new version is available for download, if not, exit
AVAILABLE=$(curl -s https://www.mongodb.com/try/download/community-edition/releases | pup 'h3:not([id]) text{}' | grep "$NEW_VERSION")
if [[ "${version}" = "$NEW_VERSION" ]]; then
echo "The new version same as the old version."
exit 0
fi
''
+ lib.concatStrings (
map (system: ''
nix-update --system ${system} --version "$NEW_VERSION" ${finalAttrs.pname}
'') finalAttrs.meta.platforms
);
};
in
{
command = lib.getExe script;
};
tests.version = testers.testVersion {
package = mongodb-ce;
command = "mongod --version";
};
};
meta = {
changelog = "https://www.mongodb.com/docs/upcoming/release-notes/7.0/";
description = "MongoDB is a general purpose, document-based, distributed database.";
homepage = "https://www.mongodb.com/";
license = with lib.licenses; [ sspl ];
longDescription = ''
MongoDB CE (Community Edition) is a general purpose, document-based, distributed database.
It is designed to be flexible and easy to use, with the ability to store data of any structure.
This pre-compiled binary distribution package provides the MongoDB daemon (mongod) and the MongoDB Shard utility
(mongos).
'';
maintainers = with lib.maintainers; [ drupol ];
platforms = lib.attrNames (srcs version);
sourceProvenance = with lib.sourceTypes; [ binaryNativeCode ];
};
})

View File

@ -20,6 +20,7 @@
libvdpau,
libxkbcommon,
wayland,
libdrm,
nix-update-script,
}:
@ -80,6 +81,7 @@ stdenv'.mkDerivation rec {
libxkbcommon
qt6.qtwayland
wayland
libdrm
]
++ lib.optionals stdenv.isDarwin [
AVFoundation

View File

@ -4,6 +4,7 @@
, stdenv
, openssl
, darwin
, nixosTests
}:
rustPlatform.buildRustPackage rec {
@ -37,6 +38,8 @@ rustPlatform.buildRustPackage rec {
OPENSSL_DIR = "${lib.getDev openssl}";
};
passthru.tests = { inherit (nixosTests) mycelium; };
meta = with lib; {
description = "End-2-end encrypted IPv6 overlay network";
homepage = "https://github.com/threefoldtech/mycelium";

View File

@ -1,6 +1,7 @@
{ buildGoModule
, fetchFromGitHub
, lib
, nixosTests
}:
buildGoModule rec {
pname = "nar-serve";
@ -17,6 +18,8 @@ buildGoModule rec {
doCheck = false;
passthru.tests = { inherit (nixosTests) nar-serve; };
meta = with lib; {
description = "Serve NAR file contents via HTTP";
mainProgram = "nar-serve";

View File

@ -5,6 +5,7 @@
makeWrapper,
jre_headless,
gawk,
nixosTests,
}:
stdenv.mkDerivation rec {
@ -49,6 +50,10 @@ stdenv.mkDerivation rec {
runHook postInstall
'';
passthru.tests = {
inherit (nixosTests) nexus;
};
meta = {
description = "Repository manager for binary software components";
homepage = "https://www.sonatype.com/products/sonatype-nexus-oss";

View File

@ -2,6 +2,7 @@
, stdenvNoCC
, fetchFromGitHub
, gitUpdater
, nixosTests
, variants ? [ ]
, suffix ? ""
, longDescription ? ''
@ -62,6 +63,8 @@ stdenvNoCC.mkDerivation rec {
rev-prefix = "noto-monthly-release-";
};
passthru.tests = { inherit (nixosTests) noto-fonts; };
meta = {
description = "Beautiful and free fonts for many languages";
homepage = "https://www.google.com/get/noto/";

View File

@ -0,0 +1,3 @@
{
"depends": []
}

View File

@ -0,0 +1,36 @@
{
lib,
buildNimPackage,
fetchFromGitHub,
}:
buildNimPackage (finalAttrs: {
pname = "nph";
version = "0.6.0";
src = fetchFromGitHub {
owner = "arnetheduck";
repo = "nph";
rev = "v${finalAttrs.version}";
hash = "sha256-9t5VeGsxyytGdu7+Uv/J+x6bmeB5+eQapbyp30iPxqs=";
};
lockFile = ./lock.json;
checkPhase = ''
runHook preCheck
$out/bin/nph tests/before
diff tests/before tests/after -x "*.yaml"
runHook postCheck
'';
meta = {
description = "Opinionated code formatter for Nim";
homepage = "https://github.com/arnetheduck/nph";
license = lib.licenses.mit;
maintainers = with lib.maintainers; [ sigmanificient ];
mainProgram = "nph";
};
})

View File

@ -6,6 +6,7 @@
openjdk17,
python3,
unzip,
nixosTests,
}:
stdenv.mkDerivation rec {
pname = "nzbhydra2";
@ -37,6 +38,10 @@ stdenv.mkDerivation rec {
runHook postInstall
'';
passthru.tests = {
inherit (nixosTests) nzbhydra2;
};
meta = {
description = "Usenet meta search";
homepage = "https://github.com/theotherp/nzbhydra2";

View File

@ -7,7 +7,7 @@
let
pname = "openfga-cli";
version = "0.5.2";
version = "0.5.3";
in
buildGoModule {
@ -17,10 +17,10 @@ buildGoModule {
owner = "openfga";
repo = "cli";
rev = "v${version}";
hash = "sha256-tWGklsAsZ+kBTjpA2by3S0fSpUMNkh9dFKJ7DPzXNRA=";
hash = "sha256-74wHhVGhLiuszRZBjxGGk9jfN+D6T1eZg8OFEkE3gPE=";
};
vendorHash = "sha256-GDYj4KcRK9/J5BTuUsk4f+qBrkT3ofP141mmKIqZAWA=";
vendorHash = "sha256-TDjXy5zR5LJWVmIfAolHgzM7JElgyksHbv0NAS97QnU=";
nativeBuildInputs = [ installShellFiles ];

View File

@ -42,13 +42,13 @@
stdenv.mkDerivation (finalAttrs: {
pname = "polybar";
version = "3.7.1";
version = "3.7.2";
src = fetchFromGitHub {
owner = "polybar";
repo = "polybar";
rev = finalAttrs.version;
hash = "sha256-DX648jY1vewl3ImK84gF6/vtcSCg3wtgq6Ie3fCwZoA=";
hash = "sha256-5PYKl6Hi4EYEmUBwkV0rLiwxNqIyR5jwm495YnNs0gI=";
fetchSubmodules = true;
};

View File

@ -5,8 +5,10 @@
python3Packages.toPythonApplication (python3Packages.private-gpt.overrideAttrs (oldAttrs: {
nativeBuildInputs = oldAttrs.nativeBuildInputs ++ [ makeBinaryWrapper ];
passthru.cl100k_base = {
inherit (python3Packages.private-gpt.cl100k_base) tiktoken;
passthru = (oldAttrs.passthru or {}) // {
cl100k_base = {
inherit (python3Packages.private-gpt.cl100k_base) tiktoken;
};
};
postInstall = ''

View File

@ -8,13 +8,13 @@
stdenvNoCC.mkDerivation rec {
pname = "prometheus-restic-exporter";
version = "1.5.0";
version = "1.6.0";
src = fetchFromGitHub {
owner = "ngosang";
repo = "restic-exporter";
rev = version;
hash = "sha256-SC2ZCIQ33RaFI9+l/WI6edNzGEtsxJ2bBdeGNMHuyqY=";
hash = "sha256-gXiEts0EY9H01+rs+2o+cbVENotM33uhcQiGDtroSU4=";
};
buildInputs = [

View File

@ -12,16 +12,16 @@ let
in
rustPlatform.buildRustPackage rec {
pname = "railway";
version = "3.11.4";
version = "3.12.2";
src = fetchFromGitHub {
owner = "railwayapp";
repo = "cli";
rev = "v${version}";
hash = "sha256-b9koWJunBlbg92/n5Wdvri7TAn9sbscLXasX+isXMHA=";
hash = "sha256-G3sdwQ5SqCA5jEDMny7a446wSMrPmgs4q5u1mcNY7SU=";
};
cargoHash = "sha256-1N/5HNDN45Y+GSsrxMhVJAGbLUyLjDZaVNHS77x1SKw=";
cargoHash = "sha256-zyMXx1CITE0y7RyRirT3o5F8U/9ReXwlGr2nrobwmYI=";
nativeBuildInputs = [ pkg-config ];

View File

@ -4,6 +4,7 @@
, fetchFromGitLab
, fetchpatch
, rspamd
, nixosTests
}:
python3Packages.buildPythonApplication {
@ -48,6 +49,8 @@ python3Packages.buildPythonApplication {
imapclient
];
passthru.tests = { inherit (nixosTests) rspamd-trainer; };
meta = {
homepage = "https://gitlab.com/onlime/rspamd-trainer";
description = "Grabs messages from a spam mailbox via IMAP and feeds them to Rspamd for training";

View File

@ -55,7 +55,7 @@ let
];
buildInputs = glLibs ++ libs;
runpathPackages = glLibs ++ [ stdenv.cc.cc stdenv.cc.libc ];
version = "1.0.15";
version = "1.0.16";
in
stdenv.mkDerivation {
pname = "tana";
@ -63,7 +63,7 @@ stdenv.mkDerivation {
src = fetchurl {
url = "https://github.com/tanainc/tana-desktop-releases/releases/download/v${version}/tana_${version}_amd64.deb";
hash = "sha256-94AyAwNFN5FCol97US1Pv8IN1+WMRA3St9kL2w+9FJU=";
hash = "sha256-XLjzvMai5HyxEGK02DfBAKy5jva9wEGcf5A/38jzu+s=";
};
nativeBuildInputs = [

View File

@ -14,13 +14,13 @@
stdenv.mkDerivation rec {
pname = "telescope";
version = "0.10";
version = "0.10.1";
src = fetchFromGitHub {
owner = "omar-polo";
repo = pname;
rev = version;
hash = "sha256-hkXXM/I7sNFomWamT0q1JH62arX1hFbt68Axcijadug=";
hash = "sha256-MVZ/pvDAETacQiEMEXM0gYM20LXqNiHtMfFGqS1vipY=";
};
postPatch = ''

View File

@ -18,16 +18,16 @@ let
in
rustPlatform.buildRustPackage rec {
pname = "uiua";
version = "0.11.1";
version = "0.12.2";
src = fetchFromGitHub {
owner = "uiua-lang";
repo = "uiua";
rev = version;
hash = "sha256-bK5Z6aoyZti46GLulpdxGPxHM+EfEVQgeAUY6fRc7YY=";
hash = "sha256-w/eB9EN3IrEDdwbMqj2w5YAZK/BImA/Xq2k9oRng7Zk=";
};
cargoHash = "sha256-iq5V+FGOcK2opmA4ot0KF9ZToYWC82gRsRyVqftuFPA=";
cargoHash = "sha256-/DO/jkYaInoO0nMfflDuu7E08gk9D89m9ubeubHdvd8=";
nativeBuildInputs =
lib.optionals stdenv.isDarwin [ rustPlatform.bindgenHook ]

View File

@ -6336,9 +6336,9 @@ dependencies = [
[[package]]
name = "time"
version = "0.3.34"
version = "0.3.35"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "c8248b6521bb14bc45b4067159b9b6ad792e2d6d754d6c41fb50e29fefe38749"
checksum = "ef89ece63debf11bc32d1ed8d078ac870cbeb44da02afb02a9ff135ae7ca0582"
dependencies = [
"deranged",
"itoa",
@ -6357,9 +6357,9 @@ checksum = "ef927ca75afb808a4d64dd374f00a2adf8d0fcff8e7b184af886c3c87ec4a3f3"
[[package]]
name = "time-macros"
version = "0.2.17"
version = "0.2.18"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "7ba3a3ef41e6672a2f0f001392bb5dcd3ff0a9992d618ca761a11c3121547774"
checksum = "3f252a68540fde3a3877aeea552b832b40ab9a69e318efd078774a01ddee1ccf"
dependencies = [
"num-conv",
"time-core",

View File

@ -50,6 +50,9 @@ rustPlatform.buildRustPackage {
];
postPatch = ''
# Use our Cargo.lock
cp ${./Cargo.lock} Cargo.lock
# Force vek to build in unstable mode
cat <<'EOF' | tee "$cargoDepsCopy"/vek-*/build.rs
fn main() {

View File

@ -6,6 +6,7 @@
, zstd
, stdenv
, darwin
, nixosTests
}:
rustPlatform.buildRustPackage rec {
@ -36,6 +37,10 @@ rustPlatform.buildRustPackage rec {
ZSTD_SYS_USE_PKG_CONFIG = true;
};
passthru.tests = {
inherit (nixosTests) wastebin;
};
meta = with lib; {
description = "Wastebin is a pastebin";
homepage = "https://github.com/matze/wastebin";

View File

@ -6,6 +6,7 @@
, libite
, libuev
, libconfuse
, nixosTests
}:
stdenv.mkDerivation rec {
pname = "watchdogd";
@ -21,6 +22,8 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ pkg-config autoreconfHook ];
buildInputs = [ libite libuev libconfuse ];
passthru.tests = { inherit (nixosTests) watchdogd; };
meta = with lib; {
description = "Advanced system & process supervisor for Linux";
homepage = "https://troglobit.com/watchdogd.html";

View File

@ -3,6 +3,7 @@
buildGoModule,
fetchFromGitHub,
nix-update-script,
nixosTests,
...
}:
@ -21,6 +22,10 @@ buildGoModule rec {
passthru.updateScript = nix-update-script { };
passthru.tests = {
inherit (nixosTests) workout-tracker;
};
meta = {
changelog = "https://github.com/jovandeginste/workout-tracker/releases/tag/v${version}";
description = "Workout tracking web application for personal use";

View File

@ -1,25 +1,25 @@
{
"version": "0.130.0",
"version": "0.131.0",
"binaries": {
"aarch64-darwin": {
"url": "https://storage.yandexcloud.net/yandexcloud-yc/release/0.130.0/darwin/arm64/yc",
"hash": "sha256-nvEu2aV9ykG9j6p9+kW4bBGOoj5FzJD8eU1M9dFXF5I="
"url": "https://storage.yandexcloud.net/yandexcloud-yc/release/0.131.0/darwin/arm64/yc",
"hash": "sha256-qbixNy5zjnJRuKtqamCWD7L7SS637sFSkpM24Olle2w="
},
"aarch64-linux": {
"url": "https://storage.yandexcloud.net/yandexcloud-yc/release/0.130.0/linux/arm64/yc",
"hash": "sha256-qZajFYaDVV+XcxC28MoRtIPaCm2He58p+yRMOrFhQU4="
"url": "https://storage.yandexcloud.net/yandexcloud-yc/release/0.131.0/linux/arm64/yc",
"hash": "sha256-xW8lh/7L+rp7lBZS2EZGvop1r6Wy75W08Z3tpRJ6K80="
},
"i686-linux": {
"url": "https://storage.yandexcloud.net/yandexcloud-yc/release/0.130.0/linux/386/yc",
"hash": "sha256-RhDZ2VnmO+GrKQ0SIFwyCqPxnfUc5VoGlgg8uJncERY="
"url": "https://storage.yandexcloud.net/yandexcloud-yc/release/0.131.0/linux/386/yc",
"hash": "sha256-h4nO+qokC7yxgFWG/51NRqio0nVlc7y6O0NmpAK5hyE="
},
"x86_64-darwin": {
"url": "https://storage.yandexcloud.net/yandexcloud-yc/release/0.130.0/darwin/amd64/yc",
"hash": "sha256-hGdInZAo+LH6qzoQXDmfSzVb1SdN565XuRGByzJrrfI="
"url": "https://storage.yandexcloud.net/yandexcloud-yc/release/0.131.0/darwin/amd64/yc",
"hash": "sha256-DFF7XmC/YWxWjDdXpCkeMk7bVUYXSk8ncZF3T3Nf47w="
},
"x86_64-linux": {
"url": "https://storage.yandexcloud.net/yandexcloud-yc/release/0.130.0/linux/amd64/yc",
"hash": "sha256-0NwGi46WtOV/2oJJPiXIj0+39dKno2LlsVuWEFVycTI="
"url": "https://storage.yandexcloud.net/yandexcloud-yc/release/0.131.0/linux/amd64/yc",
"hash": "sha256-ZVsMrlCN4nV4LsgLtHvwOMUUKkNdZ654rjM6ixcS94o="
}
}
}

View File

@ -8,6 +8,7 @@
nodejs,
makeWrapper,
callPackage,
nixosTests,
}:
stdenv.mkDerivation (finalAttrs: {
@ -63,6 +64,9 @@ stdenv.mkDerivation (finalAttrs: {
client = callPackage ./client.nix {
inherit (finalAttrs) src version offlineCache meta;
};
tests = {
inherit (nixosTests) your_spotify;
};
};
meta = {

View File

@ -1,7 +1,7 @@
{ stdenvNoCC, lib, fetchurl }:
let
version = "3.0";
version = "4.0";
relArtifact = name: hash: fetchurl {
inherit name hash;
url = "https://github.com/IdreesInc/Monocraft/releases/download/v${version}/${name}";
@ -12,10 +12,9 @@ stdenvNoCC.mkDerivation {
inherit version;
srcs = [
(relArtifact "Monocraft.otf" "sha256-PA1W+gOUStGw7cDmtEbG+B6M+sAYr8cft+Ckxj5LciU=")
(relArtifact "Monocraft.ttf" "sha256-S4j5v2bTJbhujT3Bt8daNN1YGYYP8zVPf9XXjuR64+o=")
(relArtifact "Monocraft-no-ligatures.ttf" "sha256-MuHfoP+dsXe+ODN4vWFIj50jwOxYyIiS0dd1tzVxHts=")
(relArtifact "Monocraft-nerd-fonts-patched.ttf" "sha256-QxMp8UwcRjWySNHWoNeX2sX9teZ4+tCFj+DG41azsXw=")
(relArtifact "Monocraft.ttc" "sha256-SBzl/X2PQOq1cY4dlqO89BDwCrP+/LYwZ9X24p2LDCs=")
(relArtifact "Monocraft-no-ligatures.ttc" "sha256-jFZ5Fr/cBwGVsdy7lPqLiLlKtzjF5OIWVkwZI6gR3W4=")
(relArtifact "Monocraft-nerd-fonts-patched.ttc" "sha256-lYAb8hgmv4VyrzeHr4LnfuSN9L+4fpDEMX/P++fq8Dc=")
];
dontUnpack = true;
@ -24,8 +23,10 @@ stdenvNoCC.mkDerivation {
installPhase = ''
runHook preInstall
find $srcs -name '*.otf' -exec install -Dm644 --target $out/share/fonts/opentype {} +
find $srcs -name '*.ttf' -exec install -Dm644 --target $out/share/fonts/truetype {} +
for src in "''${srcs[@]}"
do
install -Dm644 --target $out/share/fonts/truetype $src
done
runHook postInstall
'';

View File

@ -26,6 +26,7 @@
, writeTextFile
, xkeyboard_config
, xorg
, nixosTests
, runCommand
, buildEnv
}:
@ -180,6 +181,8 @@ let
cp -r "${gnome-flashback}/lib/systemd/user/gnome-session@gnome-flashback-metacity.target.d" \
"$out/lib/systemd/user/gnome-session@gnome-flashback-${wmName}.target.d"
'';
tests = { inherit (nixosTests) gnome-flashback; };
};
meta = with lib; {

View File

@ -3,9 +3,6 @@
, fetchFromGitHub
, pkg-config
, openssl
, gmp
, libmpc
, mpfr
, stdenv
, darwin
}:
@ -25,7 +22,7 @@ rustPlatform.buildRustPackage rec {
nativeBuildInputs = [ pkg-config ];
buildInputs = [ openssl gmp libmpc mpfr ]
buildInputs = [ openssl ]
++ lib.optionals stdenv.isDarwin [
darwin.apple_sdk.frameworks.SystemConfiguration
];

View File

@ -14,6 +14,7 @@
, gtk-doc
, docbook-xsl-nons
, docbook_xml_dtd_42
, nixosTests
, withDocs ? true
}:
@ -73,6 +74,7 @@ stdenv.mkDerivation rec {
packageName = pname;
versionPolicy = "odd-unstable";
};
tests = { inherit (nixosTests) dconf; };
};
meta = with lib; {

Some files were not shown because too many files have changed in this diff Show More