Merge remote-tracking branch 'origin/master' into haskell-updates

This commit is contained in:
sternenseemann 2021-06-26 14:47:34 +02:00
commit c1c6f4a0b9
1091 changed files with 19057 additions and 15067 deletions

View File

@ -70,6 +70,8 @@ Anything that does not cause user or downstream dependency regressions can be ba
## Generating 21.11 Release Notes ## Generating 21.11 Release Notes
(This section also applies to backporting 21.05 release notes: substitute "rl-2111" for "rl-2105".)
Documentation in nixpkgs is transitioning to a markdown-centric workflow. Release notes now require a translation step to convert from markdown to a compatible docbook document. Documentation in nixpkgs is transitioning to a markdown-centric workflow. Release notes now require a translation step to convert from markdown to a compatible docbook document.
Steps for updating 21.11 Release notes: Steps for updating 21.11 Release notes:

View File

@ -23,7 +23,7 @@ Reviewing guidelines: https://nixos.org/manual/nixpkgs/unstable/#chap-reviewing-
- [ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside [nixos/tests](https://github.com/NixOS/nixpkgs/blob/master/nixos/tests)) - [ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside [nixos/tests](https://github.com/NixOS/nixpkgs/blob/master/nixos/tests))
- [ ] Tested compilation of all pkgs that depend on this change using `nix-shell -p nixpkgs-review --run "nixpkgs-review wip"` - [ ] Tested compilation of all pkgs that depend on this change using `nix-shell -p nixpkgs-review --run "nixpkgs-review wip"`
- [ ] Tested execution of all binary files (usually in `./result/bin/`) - [ ] Tested execution of all binary files (usually in `./result/bin/`)
- [21.11 Release Notes](https://github.com/NixOS/nixpkgs/blob/master/.github/CONTRIBUTING.md#generating-2111-release-notes) - [21.11 Release Notes (or backporting 21.05 Relase notes)](https://github.com/NixOS/nixpkgs/blob/master/.github/CONTRIBUTING.md#generating-2111-release-notes)
- [ ] (Package updates) Added a release notes entry if the change is major or breaking - [ ] (Package updates) Added a release notes entry if the change is major or breaking
- [ ] (Module updates) Added a release notes entry if the change is significant - [ ] (Module updates) Added a release notes entry if the change is significant
- [ ] (Module addition) Added a release notes entry if adding a new NixOS module - [ ] (Module addition) Added a release notes entry if adding a new NixOS module

View File

@ -463,6 +463,12 @@ The prefix under which the package must be installed, passed via the `--prefix`
The key to use when specifying the prefix. By default, this is set to `--prefix=` as that is used by the majority of packages. The key to use when specifying the prefix. By default, this is set to `--prefix=` as that is used by the majority of packages.
##### `dontAddStaticConfigureFlags`
By default, when building statically, stdenv will try to add build system appropriate configure flags to try to enable static builds.
If this is undesirable, set this variable to true.
##### `dontAddDisableDepTrack` {#var-stdenv-dontAddDisableDepTrack} ##### `dontAddDisableDepTrack` {#var-stdenv-dontAddDisableDepTrack}
By default, the flag `--disable-dependency-tracking` is added to the configure flags to speed up Automake-based builds. If this is undesirable, set this variable to true. By default, the flag `--disable-dependency-tracking` is added to the configure flags to speed up Automake-based builds. If this is undesirable, set this variable to true.
@ -475,7 +481,7 @@ By default, the configure phase applies some special hackery to all files called
By default, when the configure script has `--enable-static`, the option `--disable-static` is added to the configure flags. By default, when the configure script has `--enable-static`, the option `--disable-static` is added to the configure flags.
If this is undesirable, set this variable to true. If this is undesirable, set this variable to true. It is automatically set to true when building statically, for example through `pkgsStatic`.
##### `configurePlatforms` {#var-stdenv-configurePlatforms} ##### `configurePlatforms` {#var-stdenv-configurePlatforms}

View File

@ -115,8 +115,8 @@ let
mergeModules' mergeOptionDecls evalOptionValue mergeDefinitions mergeModules' mergeOptionDecls evalOptionValue mergeDefinitions
pushDownProperties dischargeProperties filterOverrides pushDownProperties dischargeProperties filterOverrides
sortProperties fixupOptionType mkIf mkAssert mkMerge mkOverride sortProperties fixupOptionType mkIf mkAssert mkMerge mkOverride
mkOptionDefault mkDefault mkForce mkVMOverride mkStrict mkOptionDefault mkDefault mkForce mkVMOverride
mkFixStrictness mkOrder mkBefore mkAfter mkAliasDefinitions mkOrder mkBefore mkAfter mkAliasDefinitions
mkAliasAndWrapDefinitions fixMergeModules mkRemovedOptionModule mkAliasAndWrapDefinitions fixMergeModules mkRemovedOptionModule
mkRenamedOptionModule mkMergedOptionModule mkChangedOptionModule mkRenamedOptionModule mkMergedOptionModule mkChangedOptionModule
mkAliasOptionModule doRename; mkAliasOptionModule doRename;

View File

@ -713,10 +713,6 @@ rec {
mkForce = mkOverride 50; mkForce = mkOverride 50;
mkVMOverride = mkOverride 10; # used by nixos-rebuild build-vm mkVMOverride = mkOverride 10; # used by nixos-rebuild build-vm
mkStrict = builtins.trace "`mkStrict' is obsolete; use `mkOverride 0' instead." (mkOverride 0);
mkFixStrictness = id; # obsolete, no-op
mkOrder = priority: content: mkOrder = priority: content:
{ _type = "order"; { _type = "order";
inherit priority content; inherit priority content;

View File

@ -96,5 +96,5 @@ in {
embedded = filterDoubles predicates.isNone; embedded = filterDoubles predicates.isNone;
mesaPlatforms = ["i686-linux" "x86_64-linux" "x86_64-darwin" "armv5tel-linux" "armv6l-linux" "armv7l-linux" "armv7a-linux" "aarch64-linux" "powerpc64-linux" "powerpc64le-linux" "aarch64-darwin"]; mesaPlatforms = ["i686-linux" "x86_64-linux" "x86_64-darwin" "armv5tel-linux" "armv6l-linux" "armv7l-linux" "armv7a-linux" "aarch64-linux" "powerpc64-linux" "powerpc64le-linux" "aarch64-darwin" "riscv64-linux"];
} }

View File

@ -690,6 +690,12 @@
fingerprint = "AA4B 8EC3 F971 D350 482E 4E20 0299 AFF9 ECBB 5169"; fingerprint = "AA4B 8EC3 F971 D350 482E 4E20 0299 AFF9 ECBB 5169";
}]; }];
}; };
anhduy = {
email = "vo@anhduy.io";
github = "voanhduy1512";
githubId = 1771266;
name = "Vo Anh Duy";
};
ankhers = { ankhers = {
email = "me@ankhers.dev"; email = "me@ankhers.dev";
github = "ankhers"; github = "ankhers";
@ -1062,7 +1068,11 @@
email = "babathriviere@gmail.com"; email = "babathriviere@gmail.com";
github = "babariviere"; github = "babariviere";
githubId = 12128029; githubId = 12128029;
name = "babariviere"; name = "Bastien Rivière";
keys = [{
longkeyid = "rsa4096/0xF202AD3B6EDF4BD1";
fingerprint = "2F85 B362 B274 0012 37E2 81EE F202 AD3B 6EDF 4BD1";
}];
}; };
babbaj = { babbaj = {
name = "babbaj"; name = "babbaj";
@ -1202,6 +1212,12 @@
github = "beardhatcode"; github = "beardhatcode";
githubId = 662538; githubId = 662538;
}; };
beezow = {
name = "beezow";
email = "zbeezow@gmail.com";
github = "beezow";
githubId = 42082156;
};
bendlas = { bendlas = {
email = "herwig@bendlas.net"; email = "herwig@bendlas.net";
github = "bendlas"; github = "bendlas";
@ -1220,6 +1236,16 @@
github = "benneti"; github = "benneti";
githubId = 11725645; githubId = 11725645;
}; };
bertof = {
name = "Filippo Berto";
email = "berto.f@protonmail.com";
github = "bertof";
githubId = 9915675;
keys = [{
longkeyid = "rsa4096/0xFE98AE5EC52B1056";
fingerprint = "17C5 1EF9 C0FE 2EB2 FE56 BB53 FE98 AE5E C52B 1056";
}];
};
bennofs = { bennofs = {
email = "benno.fuenfstueck@gmail.com"; email = "benno.fuenfstueck@gmail.com";
github = "bennofs"; github = "bennofs";
@ -2269,6 +2295,12 @@
githubId = 1298344; githubId = 1298344;
name = "Daniel Fullmer"; name = "Daniel Fullmer";
}; };
dan4ik605743 = {
email = "6057430gu@gmail.com";
github = "dan4ik605743";
githubId = 86075850;
name = "Danil Danevich";
};
das-g = { das-g = {
email = "nixpkgs@raphael.dasgupta.ch"; email = "nixpkgs@raphael.dasgupta.ch";
github = "das-g"; github = "das-g";
@ -2529,6 +2561,12 @@
githubId = 8404455; githubId = 8404455;
name = "Diego Lelis"; name = "Diego Lelis";
}; };
diffumist = {
email = "diffumist@gmail.com";
github = "diffumist";
githubId = 32810399;
name = "Diffumist";
};
diogox = { diogox = {
name = "Diogo Xavier"; name = "Diogo Xavier";
email = "13244408+diogox@users.noreply.github.com"; email = "13244408+diogox@users.noreply.github.com";
@ -4253,6 +4291,12 @@
githubId = 1436960; githubId = 1436960;
name = "Christoph Hrdinka"; name = "Christoph Hrdinka";
}; };
hrhino = {
email = "hora.rhino@gmail.com";
github = "hrhino";
githubId = 28076058;
name = "Harrison Houghton";
};
hschaeidt = { hschaeidt = {
email = "he.schaeidt@gmail.com"; email = "he.schaeidt@gmail.com";
github = "hschaeidt"; github = "hschaeidt";
@ -5206,6 +5250,12 @@
email = "jwilberding@afiniate.com"; email = "jwilberding@afiniate.com";
name = "Jordan Wilberding"; name = "Jordan Wilberding";
}; };
jwoudenberg = {
email = "nixpkgs@jasperwoudenberg.com";
github = "jwoudenberg";
githubId = 1525551;
name = "Jasper Woudenberg";
};
jwygoda = { jwygoda = {
email = "jaroslaw@wygoda.me"; email = "jaroslaw@wygoda.me";
github = "jwygoda"; github = "jwygoda";
@ -9112,6 +9162,16 @@
githubId = 3280280; githubId = 3280280;
name = "Ryne Everett"; name = "Ryne Everett";
}; };
rytone = {
email = "max@ryt.one";
github = "rytone";
githubId = 8082305;
name = "Maxwell Beck";
keys = [{
longkeyid = "rsa2048/0xBB3EFA303760A0DB";
fingerprint = "D260 79E3 C2BC 2E43 905B D057 BB3E FA30 3760 A0DB";
}];
};
rzetterberg = { rzetterberg = {
email = "richard.zetterberg@gmail.com"; email = "richard.zetterberg@gmail.com";
github = "rzetterberg"; github = "rzetterberg";

View File

@ -161,6 +161,7 @@ with lib.maintainers; {
ekleog ekleog
ralith ralith
mjlbach mjlbach
dandellion
]; ];
scope = "Maintain the ecosystem around Matrix, a decentralized messenger."; scope = "Maintain the ecosystem around Matrix, a decentralized messenger.";
}; };

View File

@ -20,4 +20,14 @@
essential utilities. Now you can start <package>sway</package> from the TTY essential utilities. Now you can start <package>sway</package> from the TTY
console. console.
</para> </para>
<para>
If you are using a wlroots-based compositor, like sway, and want to be able to
share your screen, you might want to activate this option:
<programlisting>
<xref linkend="opt-xdg.portal.wlr.enable"/> = true;
</programlisting>
and configure Pipewire using <xref linkend="opt-services.pipewire.enable"/>
and related options.
</para>
</chapter> </chapter>

View File

@ -241,11 +241,11 @@ xkb_symbols &quot;us-greek&quot;
description = "US layout with alt-gr greek"; description = "US layout with alt-gr greek";
languages = [ "eng" ]; languages = [ "eng" ];
symbolsFile = /yourpath/symbols/us-greek; symbolsFile = /yourpath/symbols/us-greek;
} };
</programlisting> </programlisting>
<note> <note>
<para> <para>
The name should match the one given to the The name (after <literal>extraLayouts.</literal>) should match the one given to the
<literal>xkb_symbols</literal> block. <literal>xkb_symbols</literal> block.
</para> </para>
</note> </note>

File diff suppressed because it is too large Load Diff

View File

@ -79,6 +79,14 @@
<literal>fetchConfigured = false;</literal>. <literal>fetchConfigured = false;</literal>.
</para> </para>
</listitem> </listitem>
<listitem>
<para>
<literal>consul</literal> was upgraded to a new major release
with breaking changes, see
<link xlink:href="https://github.com/hashicorp/consul/releases/tag/v1.10.0">upstream
changelog</link>.
</para>
</listitem>
<listitem> <listitem>
<para> <para>
fsharp41 has been removed in preference to use the latest fsharp41 has been removed in preference to use the latest
@ -310,18 +318,54 @@
</itemizedlist> </itemizedlist>
</listitem> </listitem>
</itemizedlist> </itemizedlist>
<itemizedlist spacing="compact"> <itemizedlist>
<listitem> <listitem>
<para> <para>
The <literal>antlr</literal> package now defaults to the 4.x The <literal>antlr</literal> package now defaults to the 4.x
release instead of the old 2.7.7 version. release instead of the old 2.7.7 version.
</para> </para>
</listitem> </listitem>
<listitem>
<para>
The <literal>libwnck</literal> package now defaults to the 3.x
release instead of the old 2.31.0 version.
</para>
</listitem>
</itemizedlist> </itemizedlist>
</section> </section>
<section xml:id="sec-release-21.11-notable-changes"> <section xml:id="sec-release-21.11-notable-changes">
<title>Other Notable Changes</title> <title>Other Notable Changes</title>
<para> <itemizedlist>
</para> <listitem>
<para>
The setting
<link xlink:href="options.html#opt-services.openssh.logLevel"><literal>services.openssh.logLevel</literal></link>
<literal>&quot;VERBOSE&quot;</literal>
<literal>&quot;INFO&quot;</literal>. This brings NixOS in line
with upstream and other Linux distributions, and reduces log
spam on servers due to bruteforcing botnets.
</para>
<para>
However, if
<link xlink:href="options.html#opt-services.fail2ban.enable"><literal>services.fail2ban.enable</literal></link>
is <literal>true</literal>, the <literal>fail2ban</literal>
will override the verbosity to
<literal>&quot;VERBOSE&quot;</literal>, so that
<literal>fail2ban</literal> can observe the failed login
attempts from the SSH logs.
</para>
</listitem>
<listitem>
<para>
Sway: The terminal emulator <literal>rxvt-unicode</literal> is
no longer installed by default via
<literal>programs.sway.extraPackages</literal>. The current
default configuration uses <literal>alacritty</literal> (and
soon <literal>foot</literal>) so this is only an issue when
using a customized configuration and not installing
<literal>rxvt-unicode</literal> explicitly.
</para>
</listitem>
</itemizedlist>
</section> </section>
</section> </section>

View File

@ -9,7 +9,7 @@
current unstable revision. current unstable revision.
</para> </para>
<xi:include href="../from_md/release-notes/rl-2111.section.xml" /> <xi:include href="../from_md/release-notes/rl-2111.section.xml" />
<xi:include href="rl-2105.xml" /> <xi:include href="../from_md/release-notes/rl-2105.section.xml" />
<xi:include href="../from_md/release-notes/rl-2009.section.xml" /> <xi:include href="../from_md/release-notes/rl-2009.section.xml" />
<xi:include href="../from_md/release-notes/rl-2003.section.xml" /> <xi:include href="../from_md/release-notes/rl-2003.section.xml" />
<xi:include href="../from_md/release-notes/rl-1909.section.xml" /> <xi:include href="../from_md/release-notes/rl-1909.section.xml" />

View File

@ -0,0 +1,428 @@
# Release 21.05 ("Okapi", 2021.05/31) {#sec-release-21.05}
Support is planned until the end of December 2021, handing over to 21.11.
## Highlights {#sec-release-21.05-highlights}
In addition to numerous new and upgraded packages, this release has the following highlights:
- Core version changes:
- gcc: 9.3.0 -\> 10.3.0
- glibc: 2.30 -\> 2.32
- default linux: 5.4 -\> 5.10, all supported kernels available
- mesa: 20.1.7 -\> 21.0.1
- Desktop Environments:
- GNOME: 3.36 -\> 40, see its [release notes](https://help.gnome.org/misc/release-notes/40.0/)
- Plasma5: 5.18.5 -\> 5.21.3
- kdeApplications: 20.08.1 -\> 20.12.3
- cinnamon: 4.6 -\> 4.8.1
- Programming Languages and Frameworks:
- Python optimizations were disabled again. Builds with optimizations enabled are not reproducible. Optimizations can now be enabled with an option.
- The linux_latest kernel was updated to the 5.12 series. It currently is not officially supported for use with the zfs filesystem. If you use zfs, you should use a different kernel version (either the LTS kernel, or track a specific one).
## New Services {#sec-release-21.05-new-services}
The following new services were added since the last release:
- [GNURadio](https://www.gnuradio.org/) 3.8 was [finally](https://github.com/NixOS/nixpkgs/issues/82263) packaged, along with a rewrite to the Nix expressions, allowing users to override the features upstream supports selecting to compile or not to. Additionally, the attribute `gnuradio` and `gnuradio3_7` now point to an externally wrapped by default derivations, that allow you to also add \`extraPythonPackages\` to the Python interpreter used by GNURadio. Missing environmental variables needed for operational GUI were also added ([\#75478](https://github.com/NixOS/nixpkgs/issues/75478)).
- [Keycloak](https://www.keycloak.org/), an open source identity and access management server with support for [OpenID Connect](https://openid.net/connect/), [OAUTH 2.0](https://oauth.net/2/) and [SAML 2.0](https://en.wikipedia.org/wiki/SAML_2.0).
See the [Keycloak section of the NixOS manual](#module-services-keycloak) for more information.
- [services.samba-wsdd.enable](options.html#opt-services.samba-wsdd.enable) Web Services Dynamic Discovery host daemon
- [Discourse](https://www.discourse.org/), a modern and open source discussion platform.
See the [Discourse section of the NixOS manual](#module-services-discourse) for more information.
- [services.nebula.networks](options.html#opt-services.nebula.networks) [Nebula VPN](https://github.com/slackhq/nebula)
## Backward Incompatibilities {#sec-release-21.05-incompatibilities}
When upgrading from a previous release, please be aware of the following incompatible changes:
- GNOME desktop environment was upgraded to 40, see the release notes for [40.0](https://help.gnome.org/misc/release-notes/40.0/) and [3.38](https://help.gnome.org/misc/release-notes/3.38/). The `gnome3` attribute set has been renamed to `gnome` and so have been the NixOS options.
- If you are using `services.udev.extraRules` to assign custom names to network interfaces, this may stop working due to a change in the initialisation of dhcpcd and systemd networkd. To avoid this, either move them to `services.udev.initrdRules` or see the new [Assigning custom names](#sec-custom-ifnames) section of the NixOS manual for an example using networkd links.
- The `security.hideProcessInformation` module has been removed. It was broken since the switch to cgroups-v2.
- The `linuxPackages.ati_drivers_x11` kernel modules have been removed. The drivers only supported kernels prior to 4.2, and thus have become obsolete.
- The `systemConfig` kernel parameter is no longer added to boot loader entries. It has been unused since September 2010, but if do have a system generation from that era, you will now be unable to boot into them.
- `systemd-journal2gelf` no longer parses json and expects the receiving system to handle it. How to achieve this with Graylog is described in this [GitHub issue](https://github.com/parse-nl/SystemdJournal2Gelf/issues/10).
- If the `services.dbus` module is enabled, then the user D-Bus session is now always socket activated. The associated options `services.dbus.socketActivated` and `services.xserver.startDbusSession` have therefore been removed and you will receive a warning if they are present in your configuration. This change makes the user D-Bus session available also for non-graphical logins.
- The `networking.wireless.iwd` module now installs the upstream-provided 80-iwd.link file, which sets the NamePolicy= for all wlan devices to \"keep kernel\", to avoid race conditions between iwd and networkd. If you don\'t want this, you can set `systemd.network.links."80-iwd" = lib.mkForce {}`.
- `rubyMinimal` was removed due to being unused and unusable. The default ruby interpreter includes JIT support, which makes it reference it\'s compiler. Since JIT support is probably needed by some Gems, it was decided to enable this feature with all cc references by default, and allow to build a Ruby derivation without references to cc, by setting `jitSupport = false;` in an overlay. See [\#90151](https://github.com/NixOS/nixpkgs/pull/90151) for more info.
- Setting `services.openssh.authorizedKeysFiles` now also affects which keys `security.pam.enableSSHAgentAuth` will use. WARNING: If you are using these options in combination do make sure that any key paths you use are present in `services.openssh.authorizedKeysFiles`!
- The option `fonts.enableFontDir` has been renamed to [fonts.fontDir.enable](options.html#opt-fonts.fontDir.enable). The path of font directory has also been changed to `/run/current-system/sw/share/X11/fonts`, for consistency with other X11 resources.
- A number of options have been renamed in the kicad interface. `oceSupport` has been renamed to `withOCE`, `withOCCT` has been renamed to `withOCC`, `ngspiceSupport` has been renamed to `withNgspice`, and `scriptingSupport` has been renamed to `withScripting`. Additionally, `kicad/base.nix` no longer provides default argument values since these are provided by `kicad/default.nix`.
- The socket for the `pdns-recursor` module was moved from `/var/lib/pdns-recursor` to `/run/pdns-recursor` to match upstream.
- Paperwork was updated to version 2. The on-disk format slightly changed, and it is not possible to downgrade from Paperwork 2 back to Paperwork 1.3. Back your documents up before upgrading. See [this thread](https://forum.openpaper.work/t/paperwork-2-0/112/5) for more details.
- PowerDNS has been updated from `4.2.x` to `4.3.x`. Please be sure to review the [Upgrade Notes](https://doc.powerdns.com/authoritative/upgrading.html#x-to-4-3-0) provided by upstream before upgrading. Worth specifically noting is that the service now runs entirely as a dedicated `pdns` user, instead of starting as `root` and dropping privileges, as well as the default `socket-dir` location changing from `/var/lib/powerdns` to `/run/pdns`.
- The `mediatomb` service is now using by default the new and maintained fork `gerbera` package instead of the unmaintained `mediatomb` package. If you want to keep the old behavior, you must declare it with:
```nix
{
services.mediatomb.package = pkgs.mediatomb;
}
```
One new option `openFirewall` has been introduced which defaults to false. If you relied on the service declaration to add the firewall rules itself before, you should now declare it with:
```nix
{
services.mediatomb.openFirewall = true;
}
```
- xfsprogs was update from 4.19 to 5.11. It now enables reflink support by default on filesystem creation. Support for reflinks was added with an experimental status to kernel 4.9 and deemed stable in kernel 4.16. If you want to be able to mount XFS filesystems created with this release of xfsprogs on kernel releases older than those, you need to format them with `mkfs.xfs -m reflink=0`.
- The uWSGI server is now built with POSIX capabilities. As a consequence, root is no longer required in emperor mode and the service defaults to running as the unprivileged `uwsgi` user. Any additional capability can be added via the new option [services.uwsgi.capabilities](options.html#opt-services.uwsgi.capabilities). The previous behaviour can be restored by setting:
```nix
{
services.uwsgi.user = "root";
services.uwsgi.group = "root";
services.uwsgi.instance =
{
uid = "uwsgi";
gid = "uwsgi";
};
}
```
Another incompatibility from the previous release is that vassals running under a different user or group need to use `immediate-{uid,gid}` instead of the usual `uid,gid` options.
- btc1 has been abandoned upstream, and removed.
- cpp_ethereum (aleth) has been abandoned upstream, and removed.
- riak-cs package removed along with `services.riak-cs` module.
- stanchion package removed along with `services.stanchion` module.
- mutt has been updated to a new major version (2.x), which comes with some backward incompatible changes that are described in the [release notes for Mutt 2.0](http://www.mutt.org/relnotes/2.0/).
- `vim` and `neovim` switched to Python 3, dropping all Python 2 support.
- [networking.wireguard.interfaces.\<name\>.generatePrivateKeyFile](options.html#opt-networking.wireguard.interfaces), which is off by default, had a `chmod` race condition fixed. As an aside, the parent directory\'s permissions were widened, and the key files were made owner-writable. This only affects newly created keys. However, if the exact permissions are important for your setup, read [\#121294](https://github.com/NixOS/nixpkgs/pull/121294).
- [boot.zfs.forceImportAll](options.html#opt-boot.zfs.forceImportAll) previously did nothing, but has been fixed. However its default has been changed to `false` to preserve the existing default behaviour. If you have this explicitly set to `true`, please note that your non-root pools will now be forcibly imported.
- openafs now points to openafs_1_8, which is the new stable release. OpenAFS 1.6 was removed.
- The WireGuard module gained a new option `networking.wireguard.interfaces.<name>.peers.*.dynamicEndpointRefreshSeconds` that implements refreshing the IP of DNS-based endpoints periodically (which WireGuard itself [cannot do](https://lists.zx2c4.com/pipermail/wireguard/2017-November/002028.html)).
- MariaDB has been updated to 10.5. Before you upgrade, it would be best to take a backup of your database and read [ Incompatible Changes Between 10.4 and 10.5](https://mariadb.com/kb/en/upgrading-from-mariadb-104-to-mariadb-105/#incompatible-changes-between-104-and-105). After the upgrade you will need to run `mysql_upgrade`.
- The TokuDB storage engine dropped in mariadb 10.5 and removed in mariadb 10.6. It is recommended to switch to RocksDB. See also [TokuDB](https://mariadb.com/kb/en/tokudb/) and [MDEV-19780: Remove the TokuDB storage engine](https://jira.mariadb.org/browse/MDEV-19780).
- The `openldap` module now has support for OLC-style configuration, users of the `configDir` option may wish to migrate. If you continue to use `configDir`, ensure that `olcPidFile` is set to `/run/slapd/slapd.pid`.
As a result, `extraConfig` and `extraDatabaseConfig` are removed. To help with migration, you can convert your `slapd.conf` file to OLC configuration with the following script (find the location of this configuration file by running `systemctl status openldap`, it is the `-f` option.
```ShellSession
$ TMPDIR=$(mktemp -d)
$ slaptest -f /path/to/slapd.conf -F $TMPDIR
$ slapcat -F $TMPDIR -n0 -H 'ldap:///???(!(objectClass=olcSchemaConfig))'
```
This will dump your current configuration in LDIF format, which should be straightforward to convert into Nix settings. This does not show your schema configuration, as this is unnecessarily verbose for users of the default schemas and `slaptest` is buggy with schemas directly in the config file.
- Amazon EC2 and OpenStack Compute (nova) images now re-fetch instance meta data and user data from the instance metadata service (IMDS) on each boot. For example: stopping an EC2 instance, changing its user data, and restarting the instance will now cause it to fetch and apply the new user data.
::: {.warning}
Specifically, `/etc/ec2-metadata` is re-populated on each boot. Some NixOS scripts that read from this directory are guarded to only run if the files they want to manipulate do not already exist, and so will not re-apply their changes if the IMDS response changes. Examples: `root`\'s SSH key is only added if `/root/.ssh/authorized_keys` does not exist, and SSH host keys are only set from user data if they do not exist in `/etc/ssh`.
:::
- The `rspamd` services is now sandboxed. It is run as a dynamic user instead of root, so secrets and other files may have to be moved or their permissions may have to be fixed. The sockets are now located in `/run/rspamd` instead of `/run`.
- Enabling the Tor client no longer silently also enables and configures Privoxy, and the `services.tor.client.privoxy.enable` option has been removed. To enable Privoxy, and to configure it to use Tor\'s faster port, use the following configuration:
```nix
{
opt-services.privoxy.enable = true;
opt-services.privoxy.enableTor = true;
}
```
- The `services.tor` module has a new exhaustively typed [services.tor.settings](options.html#opt-services.tor.settings) option following RFC 0042; backward compatibility with old options has been preserved when aliasing was possible. The corresponding systemd service has been hardened, but there is a chance that the service still requires more permissions, so please report any related trouble on the bugtracker. Onion services v3 are now supported in [services.tor.relay.onionServices](options.html#opt-services.tor.relay.onionServices). A new [services.tor.openFirewall](options.html#opt-services.tor.openFirewall) option as been introduced for allowing connections on all the TCP ports configured.
- The options `services.slurm.dbdserver.storagePass` and `services.slurm.dbdserver.configFile` have been removed. Use `services.slurm.dbdserver.storagePassFile` instead to provide the database password. Extra config options can be given via the option `services.slurm.dbdserver.extraConfig`. The actual configuration file is created on the fly on startup of the service. This avoids that the password gets exposed in the nix store.
- The `wafHook` hook does not wrap Python anymore. Packages depending on `wafHook` need to include any Python into their `nativeBuildInputs`.
- Starting with version 1.7.0, the project formerly named `CodiMD` is now named `HedgeDoc`. New installations will no longer use the old name for users, state directories and such, this needs to be considered when moving state to a more recent NixOS installation. Based on [system.stateVersion](options.html#opt-system.stateVersion), existing installations will continue to work.
- The fish-foreign-env package has been replaced with fishPlugins.foreign-env, in which the fish functions have been relocated to the `vendor_functions.d` directory to be loaded automatically.
- The prometheus json exporter is now managed by the prometheus community. Together with additional features some backwards incompatibilities were introduced. Most importantly the exporter no longer accepts a fixed command-line parameter to specify the URL of the endpoint serving JSON. It now expects this URL to be passed as an URL parameter, when scraping the exporter\'s `/probe` endpoint. In the prometheus scrape configuration the scrape target might look like this:
```
http://some.json-exporter.host:7979/probe?target=https://example.com/some/json/endpoint
```
Existing configuration for the exporter needs to be updated, but can partially be re-used. Documentation is available in the upstream repository and a small example for NixOS is available in the corresponding NixOS test.
These changes also affect [services.prometheus.exporters.rspamd.enable](options.html#opt-services.prometheus.exporters.rspamd.enable), which is just a preconfigured instance of the json exporter.
For more information, take a look at the [ official documentation](https://github.com/prometheus-community/json_exporter) of the json_exporter.
- Androidenv was updated, removing the `includeDocs` and `lldbVersions` arguments. Docs only covered a single version of the Android SDK, LLDB is now bundled with the NDK, and both are no longer available to download from the Android package repositories. Additionally, since the package lists have been updated, some older versions of Android packages may not be bundled. If you depend on older versions of Android packages, we recommend overriding the repo.
Android packages are now loaded from a repo.json file created by parsing Android repo XML files. The arguments `repoJson` and `repoXmls` have been added to allow overriding the built-in androidenv repo.json with your own. Additionally, license files are now written to allow compatibility with Gradle-based tools, and the `extraLicenses` argument has been added to accept more SDK licenses if your project requires it. See the androidenv documentation for more details.
- The attribute `mpi` is now consistently used to provide a default, system-wide MPI implementation. The default implementation is openmpi, which has been used before by all derivations affects by this change. Note that all packages that have used `mpi ? null` in the input for optional MPI builds, have been changed to the boolean input paramater `useMpi` to enable building with MPI. Building all packages with `mpich` instead of the default `openmpi` can now be achived like this:
```nix
self: super:
{
mpi = super.mpich;
}
```
- The Searx module has been updated with the ability to configure the service declaratively and uWSGI integration. The option `services.searx.configFile` has been renamed to [services.searx.settingsFile](options.html#opt-services.searx.settingsFile) for consistency with the new [services.searx.settings](options.html#opt-services.searx.settings). In addition, the `searx` uid and gid reservations have been removed since they were not necessary: the service is now running with a dynamically allocated uid.
- The libinput module has been updated with the ability to configure mouse and touchpad settings separately. The options in `services.xserver.libinput` have been renamed to `services.xserver.libinput.touchpad`, while there is a new `services.xserver.libinput.mouse` for mouse related configuration.
Since touchpad options no longer apply to all devices, you may want to replicate your touchpad configuration in mouse section.
- ALSA OSS emulation (`sound.enableOSSEmulation`) is now disabled by default.
- Thinkfan as been updated to `1.2.x`, which comes with a new YAML based configuration format. For this reason, several NixOS options of the thinkfan module have been changed to non-backward compatible types. In addition, a new [services.thinkfan.settings](options.html#opt-services.thinkfan.settings) option has been added.
Please read the [ thinkfan documentation](https://github.com/vmatare/thinkfan#readme) before updating.
- Adobe Flash Player support has been dropped from the tree. In particular, the following packages no longer support it:
- chromium
- firefox
- qt48
- qt5.qtwebkit
Additionally, packages flashplayer and hal-flash were removed along with the `services.flashpolicyd` module.
- The `security.rngd` module has been removed. It was disabled by default in 20.09 as it was functionally redundant with krngd in the linux kernel. It is not necessary for any device that the kernel recognises as an hardware RNG, as it will automatically run the krngd task to periodically collect random data from the device and mix it into the kernel\'s RNG.
The default SMTP port for GitLab has been changed to `25` from its previous default of `465`. If you depended on this default, you should now set the [services.gitlab.smtp.port](options.html#opt-services.gitlab.smtp.port) option.
- The default version of ImageMagick has been updated from 6 to 7. You can use imagemagick6, imagemagick6_light, and imagemagick6Big if you need the older version.
- [services.xserver.videoDrivers](options.html#opt-services.xserver.videoDrivers) no longer uses the deprecated `cirrus` and `vesa` device dependent X drivers by default. It also enables both `amdgpu` and `nouveau` drivers by default now.
- The `kindlegen` package is gone, because it is no longer supported or hosted by Amazon. Sadly, its replacement, Kindle Previewer, has no Linux support. However, there are other ways to generate MOBI files. See [the discussion](https://github.com/NixOS/nixpkgs/issues/96439) for more info.
- The apacheKafka packages are now built with version-matched JREs. Versions 2.6 and above, the ones that recommend it, use jdk11, while versions below remain on jdk8. The NixOS service has been adjusted to start the service using the same version as the package, adjustable with the new [services.apache-kafka.jre](options.html#opt-services.apache-kafka.jre) option. Furthermore, the default list of [services.apache-kafka.jvmOptions](options.html#opt-services.apache-kafka.jvmOptions) have been removed. You should set your own according to the [upstream documentation](https://kafka.apache.org/documentation/#java) for your Kafka version.
- The kodi package has been modified to allow concise addon management. Consider the following configuration from previous releases of NixOS to install kodi, including the kodiPackages.inputstream-adaptive and kodiPackages.vfs-sftp addons:
```nix
{
environment.systemPackages = [
pkgs.kodi
];
nixpkgs.config.kodi = {
enableInputStreamAdaptive = true;
enableVFSSFTP = true;
};
}
```
All Kodi `config` flags have been removed, and as a result the above configuration should now be written as:
```nix
{
environment.systemPackages = [
(pkgs.kodi.withPackages (p: with p; [
inputstream-adaptive
vfs-sftp
]))
];
}
```
- `environment.defaultPackages` now includes the nano package. If pkgs.nano is not added to the list, make sure another editor is installed and the `EDITOR` environment variable is set to it. Environment variables can be set using `environment.variables`.
- `services.minio.dataDir` changed type to a list of paths, required for specifiyng multiple data directories for using with erasure coding. Currently, the service doesn\'t enforce nor checks the correct number of paths to correspond to minio requirements.
- All CUDA toolkit versions prior to CUDA 10 have been removed.
- The kbdKeymaps package was removed since dvp and neo are now included in kbd. If you want to use the Programmer Dvorak Keyboard Layout, you have to use `dvorak-programmer` in `console.keyMap` now instead of `dvp`. In `services.xserver.xkbVariant` it\'s still `dvp`.
- The babeld service is now being run as an unprivileged user. To achieve that the module configures `skip-kernel-setup true` and takes care of setting forwarding and rp_filter sysctls by itself as well as for each interface in `services.babeld.interfaces`.
- The `services.zigbee2mqtt.config` option has been renamed to `services.zigbee2mqtt.settings` and now follows [RFC 0042](https://github.com/NixOS/rfcs/blob/master/rfcs/0042-config-option.md).
The yadm dotfile manager has been updated from 2.x to 3.x, which has new (XDG) default locations for some data/state files. Most yadm commands will fail and print a legacy path warning (which describes how to upgrade/migrate your repository). If you have scripts, daemons, scheduled jobs, shell profiles, etc. that invoke yadm, expect them to fail or misbehave until you perform this migration and prepare accordingly.
- Instead of determining `services.radicale.package` automatically based on `system.stateVersion`, the latest version is always used because old versions are not officially supported.
Furthermore, Radicale\'s systemd unit was hardened which might break some deployments. In particular, a non-default `filesystem_folder` has to be added to `systemd.services.radicale.serviceConfig.ReadWritePaths` if the deprecated `services.radicale.config` is used.
- In the `security.acme` module, use of `--reuse-key` parameter for Lego has been removed. It was introduced for HKPK, but this security feature is now deprecated. It is a better security practice to rotate key pairs instead of always keeping the same. If you need to keep this parameter, you can add it back using `extraLegoRenewFlags` as an option for the appropriate certificate.
## Other Notable Changes {#sec-release-21.05-notable-changes}
- `stdenv.lib` has been deprecated and will break eval in 21.11. Please use `pkgs.lib` instead. See [\#108938](https://github.com/NixOS/nixpkgs/issues/108938) for details.
- [GNURadio](https://www.gnuradio.org/) has a `pkgs` attribute set, and there\'s a `gnuradio.callPackage` function that extends `pkgs` with a `mkDerivation`, and a `mkDerivationWith`, like Qt5. Now all `gnuradio.pkgs` are defined with `gnuradio.callPackage` and some packages that depend on gnuradio are defined with this as well.
- [Privoxy](https://www.privoxy.org/) has been updated to version 3.0.32 (See [announcement](https://lists.privoxy.org/pipermail/privoxy-announce/2021-February/000007.html)). Compared to the previous release, Privoxy has gained support for HTTPS inspection (still experimental), Brotli decompression, several new filters and lots of bug fixes, including security ones. In addition, the package is now built with compression and external filters support, which were previously disabled.
Regarding the NixOS module, new options for HTTPS inspection have been added and `services.privoxy.extraConfig` has been replaced by the new [services.privoxy.settings](options.html#opt-services.privoxy.settings) (See [RFC 0042](https://github.com/NixOS/rfcs/blob/master/rfcs/0042-config-option.md) for the motivation).
- [Kodi](https://kodi.tv/) has been updated to version 19.1 \"Matrix\". See the [announcement](https://kodi.tv/article/kodi-190-matrix-release) for further details.
- The `services.packagekit.backend` option has been removed as it only supported a single setting which would always be the default. Instead new [RFC 0042](https://github.com/NixOS/rfcs/blob/master/rfcs/0042-config-option.md) compliant [services.packagekit.settings](options.html#opt-services.packagekit.settings) and [services.packagekit.vendorSettings](options.html#opt-services.packagekit.vendorSettings) options have been introduced.
- [Nginx](https://nginx.org) has been updated to stable version 1.20.0. Now nginx uses the zlib-ng library by default.
- KDE Gear (formerly KDE Applications) is upgraded to 21.04, see its [release notes](https://kde.org/announcements/gear/21.04/) for details.
The `kdeApplications` package set is now `kdeGear`, in keeping with the new name. The old name remains for compatibility, but it is deprecated.
- [Libreswan](https://libreswan.org/) has been updated to version 4.4. The package now includes example configurations and manual pages by default. The NixOS module has been changed to use the upstream systemd units and write the configuration in the `/etc/ipsec.d/ ` directory. In addition, two new options have been added to specify connection policies ([services.libreswan.policies](options.html#opt-services.libreswan.policies)) and disable send/receive redirects ([services.libreswan.disableRedirects](options.html#opt-services.libreswan.disableRedirects)).
- The Mailman NixOS module (`services.mailman`) has a new option [services.mailman.enablePostfix](options.html#opt-services.mailman.enablePostfix), defaulting to true, that controls integration with Postfix.
If this option is disabled, default MTA config becomes not set and you should set the options in `services.mailman.settings.mta` according to the desired configuration as described in [Mailman documentation](https://mailman.readthedocs.io/en/latest/src/mailman/docs/mta.html).
- The default-version of `nextcloud` is nextcloud21. Please note that it\'s _not_ possible to upgrade `nextcloud` across multiple major versions! This means that it\'s e.g. not possible to upgrade from nextcloud18 to nextcloud20 in a single deploy and most `20.09` users will have to upgrade to nextcloud20 first.
The package can be manually upgraded by setting [services.nextcloud.package](options.html#opt-services.nextcloud.package) to nextcloud21.
- The setting [services.redis.bind](options.html#opt-services.redis.bind) defaults to `127.0.0.1` now, making Redis listen on the loopback interface only, and not all public network interfaces.
- NixOS now emits a deprecation warning if systemd\'s `StartLimitInterval` setting is used in a `serviceConfig` section instead of in a `unitConfig`; that setting is deprecated and now undocumented for the service section by systemd upstream, but still effective and somewhat buggy there, which can be confusing. See [\#45785](https://github.com/NixOS/nixpkgs/issues/45785) for details.
All services should use [systemd.services._name_.startLimitIntervalSec](options.html#opt-systemd.services._name_.startLimitIntervalSec) or `StartLimitIntervalSec` in [systemd.services._name_.unitConfig](options.html#opt-systemd.services._name_.unitConfig) instead.
- The `mediatomb` service declares new options. It also adapts existing options so the configuration generation is now lazy. The existing option `customCfg` (defaults to false), when enabled, stops the service configuration generation completely. It then expects the users to provide their own correct configuration at the right location (whereas the configuration was generated and not used at all before). The new option `transcodingOption` (defaults to no) allows a generated configuration. It makes the mediatomb service pulls the necessary runtime dependencies in the nix store (whereas it was generated with hardcoded values before). The new option `mediaDirectories` allows the users to declare autoscan media directories from their nixos configuration:
```nix
{
services.mediatomb.mediaDirectories = [
{ path = "/var/lib/mediatomb/pictures"; recursive = false; hidden-files = false; }
{ path = "/var/lib/mediatomb/audio"; recursive = true; hidden-files = false; }
];
}
```
- The Unbound DNS resolver service (`services.unbound`) has been refactored to allow reloading, control sockets and to fix startup ordering issues.
It is now possible to enable a local UNIX control socket for unbound by setting the [services.unbound.localControlSocketPath](options.html#opt-services.unbound.localControlSocketPath) option.
Previously we just applied a very minimal set of restrictions and trusted unbound to properly drop root privs and capabilities.
As of this we are (for the most part) just using the upstream example unit file for unbound. The main difference is that we start unbound as `unbound` user with the required capabilities instead of letting unbound do the chroot & uid/gid changes.
The upstream unit configuration this is based on is a lot stricter with all kinds of permissions then our previous variant. It also came with the default of having the `Type` set to `notify`, therefore we are now also using the `unbound-with-systemd` package here. Unbound will start up, read the configuration files and start listening on the configured ports before systemd will declare the unit `active (running)`. This will likely help with startup order and the occasional race condition during system activation where the DNS service is started but not yet ready to answer queries. Services depending on `nss-lookup.target` or `unbound.service` are now be able to use unbound when those targets have been reached.
Additionally to the much stricter runtime environment the `/dev/urandom` mount lines we previously had in the code (that randomly failed during the stop-phase) have been removed as systemd will take care of those for us.
The `preStart` script is now only required if we enabled the trust anchor updates (which are still enabled by default).
Another benefit of the refactoring is that we can now issue reloads via either `pkill -HUP unbound` and `systemctl reload unbound` to reload the running configuration without taking the daemon offline. A prerequisite of this was that unbound configuration is available on a well known path on the file system. We are using the path `/etc/unbound/unbound.conf` as that is the default in the CLI tooling which in turn enables us to use `unbound-control` without passing a custom configuration location.
The module has also been reworked to be [RFC 0042](https://github.com/NixOS/rfcs/blob/master/rfcs/0042-config-option.md) compliant. As such, `sevices.unbound.extraConfig` has been removed and replaced by [services.unbound.settings](options.html#opt-services.unbound.settings). `services.unbound.interfaces` has been renamed to `services.unbound.settings.server.interface`.
`services.unbound.forwardAddresses` and `services.unbound.allowedAccess` have also been changed to use the new settings interface. You can follow the instructions when executing `nixos-rebuild` to upgrade your configuration to use the new interface.
- The `services.dnscrypt-proxy2` module now takes the upstream\'s example configuration and updates it with the user\'s settings. An option has been added to restore the old behaviour if you prefer to declare the configuration from scratch.
- NixOS now defaults to the unified cgroup hierarchy (cgroupsv2). See the [Fedora Article for 31](https://www.redhat.com/sysadmin/fedora-31-control-group-v2) for details on why this is desirable, and how it impacts containers.
If you want to run containers with a runtime that does not yet support cgroupsv2, you can switch back to the old behaviour by setting [systemd.enableUnifiedCgroupHierarchy](options.html#opt-systemd.enableUnifiedCgroupHierarchy) = `false`; and rebooting.
- PulseAudio was upgraded to 14.0, with changes to the handling of default sinks. See its [release notes](https://www.freedesktop.org/wiki/Software/PulseAudio/Notes/14.0/).
- GNOME users may wish to delete their `~/.config/pulse` due to the changes to stream routing logic. See [PulseAudio bug 832](https://gitlab.freedesktop.org/pulseaudio/pulseaudio/-/issues/832) for more information.
- The zookeeper package does not provide `zooInspector.sh` anymore, as that \"contrib\" has been dropped from upstream releases.
- In the ACME module, the data used to build the hash for the account directory has changed to accomodate new features to reduce account rate limit issues. This will trigger new account creation on the first rebuild following this update. No issues are expected to arise from this, thanks to the new account creation handling.
- [users.users._name_.createHome](options.html#opt-users.users._name_.createHome) now always ensures home directory permissions to be `0700`. Permissions had previously been ignored for already existing home directories, possibly leaving them readable by others. The option\'s description was incorrect regarding ownership management and has been simplified greatly.
- When defining a new user, one of [users.users._name_.isNormalUser](options.html#opt-users.users._name_.isNormalUser) and [users.users._name_.isSystemUser](options.html#opt-users.users._name_.isSystemUser) is now required. This is to prevent accidentally giving a UID above 1000 to system users, which could have unexpected consequences, like running user activation scripts for system users. Note that users defined with an explicit UID below 500 are exempted from this check, as [users.users._name_.isSystemUser](options.html#opt-users.users._name_.isSystemUser) has no effect for those.
- The `security.apparmor` module, for the [AppArmor](https://gitlab.com/apparmor/apparmor/-/wikis/Documentation) Mandatory Access Control system, has been substantialy improved along with related tools, so that module maintainers can now more easily write AppArmor profiles for NixOS. The most notable change on the user-side is the new option [security.apparmor.policies](options.html#opt-security.apparmor.policies), replacing the previous `profiles` option to provide a way to disable a profile and to select whether to confine in enforce mode (default) or in complain mode (see `journalctl -b --grep apparmor`). Security-minded users may also want to enable [security.apparmor.killUnconfinedConfinables](options.html#opt-security.apparmor.killUnconfinedConfinables), at the cost of having some of their processes killed when updating to a NixOS version introducing new AppArmor profiles.
- The GNOME desktop manager once again installs gnome.epiphany by default.
- NixOS now generates empty `/etc/netgroup`. `/etc/netgroup` defines network-wide groups and may affect to setups using NIS.
- Platforms, like `stdenv.hostPlatform`, no longer have a `platform` attribute. It has been (mostly) flattened away:
- `platform.gcc` is now `gcc`
- `platform.kernel*` is now `linux-kernel.*`
Additionally, `platform.kernelArch` moved to the top level as `linuxArch` to match the other `*Arch` variables.
The `platform` grouping of these things never meant anything, and was just a historial/implementation artifact that was overdue removal.
- `services.restic` now uses a dedicated cache directory for every backup defined in `services.restic.backups`. The old global cache directory, `/root/.cache/restic`, is now unused and can be removed to free up disk space.
- `isync`: The `isync` compatibility wrapper was removed and the Master/Slave terminology has been deprecated and should be replaced with Far/Near in the configuration file.
- The nix-gc service now accepts randomizedDelaySec (default: 0) and persistent (default: true) parameters. By default nix-gc will now run immediately if it would have been triggered at least once during the time when the timer was inactive.
- The `rustPlatform.buildRustPackage` function is split into several hooks: cargoSetupHook to set up vendoring for Cargo-based projects, cargoBuildHook to build a project using Cargo, cargoInstallHook to install a project using Cargo, and cargoCheckHook to run tests in Cargo-based projects. With this change, mixed-language projects can use the relevant hooks within builders other than `buildRustPackage`. However, these changes also required several API changes to `buildRustPackage` itself:
- The `target` argument was removed. Instead, `buildRustPackage` will always use the same target as the C/C++ compiler that is used.
- The `cargoParallelTestThreads` argument was removed. Parallel tests are now disabled through `dontUseCargoParallelTests`.
- The `rustPlatform.maturinBuildHook` hook was added. This hook can be used with `buildPythonPackage` to build Python packages that are written in Rust and use Maturin as their build tool.
- Kubernetes has [deprecated docker](https://kubernetes.io/blog/2020/12/02/dont-panic-kubernetes-and-docker/) as container runtime. As a consequence, the Kubernetes module now has support for configuration of custom remote container runtimes and enables containerd by default. Note that containerd is more strict regarding container image OCI-compliance. As an example, images with CMD or ENTRYPOINT defined as strings (not lists) will fail on containerd, while working fine on docker. Please test your setup and container images with containerd prior to upgrading.
- The GitLab module now has support for automatic backups. A schedule can be set with the [services.gitlab.backup.startAt](options.html#opt-services.gitlab.backup.startAt) option.
- Prior to this release, systemd would also read system units from an undocumented `/etc/systemd-mutable/system` path. This path has been dropped from the defaults. That path (or others) can be re-enabled by adding it to the [boot.extraSystemdUnitPaths](options.html#opt-boot.extraSystemdUnitPaths) list.
- PostgreSQL 9.5 is scheduled EOL during the 21.05 life cycle and has been removed.
- [Xfce4](https://www.xfce.org/) relies on GIO/GVfs for userspace virtual filesystem access in applications like [thunar](https://docs.xfce.org/xfce/thunar/) and [gigolo](https://docs.xfce.org/apps/gigolo/). For that to work, the gvfs nixos service is enabled by default, and it can be configured with the specific package that provides GVfs. Until now Xfce4 was setting it to use a lighter version of GVfs (without support for samba). To avoid conflicts with other desktop environments this setting has been dropped. Users that still want it should add the following to their system configuration:
```nix
{
services.gvfs.package = pkgs.gvfs.override { samba = null; };
}
```
- The newly enabled `systemd-pstore.service` now automatically evacuates crashdumps and panic logs from the persistent storage to `/var/lib/systemd/pstore`. This prevents NVRAM from filling up, which ensures the latest diagnostic data is always stored and alleviates problems with writing new boot configurations.
- Nixpkgs now contains [automatically packaged GNOME Shell extensions](https://github.com/NixOS/nixpkgs/pull/118232) from the [GNOME Extensions](https://extensions.gnome.org/) portal. You can find them, filed by their UUID, under `gnome38Extensions` attribute for GNOME 3.38 and under `gnome40Extensions` for GNOME 40. Finally, the `gnomeExtensions` attribute contains extensions for the latest GNOME Shell version in Nixpkgs, listed under a more human-friendly name. The unqualified attribute scope also contains manually packaged extensions. Note that the automatically packaged extensions are provided for convenience and are not checked or guaranteed to work.
- Erlang/OTP versions older than R21 got dropped. We also dropped the cuter package, as it was purely an example of how to build a package. We also dropped `lfe_1_2` as it could not build with R21+. Moving forward, we expect to only support 3 yearly releases of OTP.

File diff suppressed because it is too large Load Diff

View File

@ -26,6 +26,8 @@ In addition to numerous new and upgraded packages, this release has the followin
- Those making use of `buildBazelPackage` will need to regenerate the fetch hashes (preferred), or set `fetchConfigured = false;`. - Those making use of `buildBazelPackage` will need to regenerate the fetch hashes (preferred), or set `fetchConfigured = false;`.
- `consul` was upgraded to a new major release with breaking changes, see [upstream changelog](https://github.com/hashicorp/consul/releases/tag/v1.10.0).
- fsharp41 has been removed in preference to use the latest dotnet-sdk - fsharp41 has been removed in preference to use the latest dotnet-sdk
- The following F#-related packages have been removed for being unmaintaned. Please use `fetchNuGet` for specific packages. - The following F#-related packages have been removed for being unmaintaned. Please use `fetchNuGet` for specific packages.
@ -78,4 +80,13 @@ In addition to numerous new and upgraded packages, this release has the followin
* The `antlr` package now defaults to the 4.x release instead of the * The `antlr` package now defaults to the 4.x release instead of the
old 2.7.7 version. old 2.7.7 version.
* The `libwnck` package now defaults to the 3.x release instead of the
old 2.31.0 version.
## Other Notable Changes {#sec-release-21.11-notable-changes} ## Other Notable Changes {#sec-release-21.11-notable-changes}
- The setting [`services.openssh.logLevel`](options.html#opt-services.openssh.logLevel) `"VERBOSE"` `"INFO"`. This brings NixOS in line with upstream and other Linux distributions, and reduces log spam on servers due to bruteforcing botnets.
However, if [`services.fail2ban.enable`](options.html#opt-services.fail2ban.enable) is `true`, the `fail2ban` will override the verbosity to `"VERBOSE"`, so that `fail2ban` can observe the failed login attempts from the SSH logs.
- Sway: The terminal emulator `rxvt-unicode` is no longer installed by default via `programs.sway.extraPackages`. The current default configuration uses `alacritty` (and soon `foot`) so this is only an issue when using a customized configuration and not installing `rxvt-unicode` explicitly.

View File

@ -278,7 +278,7 @@ let format' = format; in let
additionalSpace=$(( $(numfmt --from=iec '${additionalSpace}') + reservedSpace )) additionalSpace=$(( $(numfmt --from=iec '${additionalSpace}') + reservedSpace ))
# Compute required space in filesystem blocks # Compute required space in filesystem blocks
diskUsage=$(find . ! -type d -exec 'du' '--apparent-size' '--block-size' "${blockSize}" '{}' ';' | cut -f1 | sum_lines) diskUsage=$(find . ! -type d -print0 | du --files0-from=- --apparent-size --block-size "${blockSize}" | cut -f1 | sum_lines)
# Each inode takes space! # Each inode takes space!
numInodes=$(find . | wc -l) numInodes=$(find . | wc -l)
# Convert to bytes, inodes take two blocks each! # Convert to bytes, inodes take two blocks each!

View File

@ -0,0 +1,67 @@
{ config, pkgs, lib, ... }:
with lib;
let
cfg = config.xdg.portal.wlr;
package = pkgs.xdg-desktop-portal-wlr;
settingsFormat = pkgs.formats.ini { };
configFile = settingsFormat.generate "xdg-desktop-portal-wlr.ini" cfg.settings;
in
{
meta = {
maintainers = with maintainers; [ minijackson ];
};
options.xdg.portal.wlr = {
enable = mkEnableOption ''
desktop portal for wlroots-based desktops
This will add the <package>xdg-desktop-portal-wlr</package> package into
the <option>xdg.portal.extraPortals</option> option, and provide the
configuration file
'';
settings = mkOption {
description = ''
Configuration for <package>xdg-desktop-portal-wlr</package>.
See <literal>xdg-desktop-portal-wlr(5)</literal> for supported
values.
'';
type = types.submodule {
freeformType = settingsFormat.type;
};
default = { };
# Example taken from the manpage
example = literalExample ''
{
screencast = {
output_name = "HDMI-A-1";
max_fps = 30;
exec_before = "disable_notifications.sh";
exec_after = "enable_notifications.sh";
chooser_type = "simple";
chooser_cmd = "''${pkgs.slurp}/bin/slurp -f %o -or";
};
}
'';
};
};
config = mkIf cfg.enable {
xdg.portal = {
enable = true;
extraPortals = [ package ];
};
systemd.user.services.xdg-desktop-portal-wlr.serviceConfig.ExecStart = [
# Empty ExecStart value to override the field
""
"${package}/libexec/xdg-desktop-portal-wlr --config=${configFile}"
];
};
}

View File

@ -34,6 +34,25 @@ let
wantedBy = [ "multi-user.target" ]; wantedBy = [ "multi-user.target" ];
}; };
}; };
power-pkg = pkgs.system76-power;
powerConfig = mkIf cfg.power-daemon.enable {
# Make system76-power usable by root from the command line.
environment.systemPackages = [ power-pkg ];
services.dbus.packages = [ power-pkg ];
systemd.services.system76-power = {
description = "System76 Power Daemon";
serviceConfig = {
ExecStart = "${power-pkg}/bin/system76-power daemon";
Restart = "on-failure";
Type = "dbus";
BusName = "com.system76.PowerDaemon";
};
wantedBy = [ "multi-user.target" ];
};
};
in { in {
options = { options = {
hardware.system76 = { hardware.system76 = {
@ -52,8 +71,15 @@ in {
description = "Whether to make the system76 out-of-tree kernel modules available"; description = "Whether to make the system76 out-of-tree kernel modules available";
type = types.bool; type = types.bool;
}; };
power-daemon.enable = mkOption {
default = cfg.enableAll;
example = true;
description = "Whether to enable the system76 power daemon";
type = types.bool;
};
}; };
}; };
config = mkMerge [ moduleConfig firmwareConfig ]; config = mkMerge [ moduleConfig firmwareConfig powerConfig ];
} }

View File

@ -55,6 +55,22 @@ in
''; '';
}; };
firmwarePartitionOffset = mkOption {
type = types.int;
default = 8;
description = ''
Gap in front of the /boot/firmware partition, in mebibytes (1024×1024
bytes).
Can be increased to make more space for boards requiring to dd u-boot
SPL before actual partitions.
Unless you are building your own images pre-configured with an
installed U-Boot, you can instead opt to delete the existing `FIRMWARE`
partition, which is used **only** for the Raspberry Pi family of
hardware.
'';
};
firmwarePartitionID = mkOption { firmwarePartitionID = mkOption {
type = types.str; type = types.str;
default = "0x2178694e"; default = "0x2178694e";
@ -177,7 +193,7 @@ in
zstd -d --no-progress "${rootfsImage}" -o ./root-fs.img zstd -d --no-progress "${rootfsImage}" -o ./root-fs.img
# Gap in front of the first partition, in MiB # Gap in front of the first partition, in MiB
gap=8 gap=${toString config.sdImage.firmwarePartitionOffset}
# Create the image file sized to fit /boot/firmware and /, plus slack for the gap. # Create the image file sized to fit /boot/firmware and /, plus slack for the gap.
rootSizeBlocks=$(du -B 512 --apparent-size ./root-fs.img | awk '{ print $1 }') rootSizeBlocks=$(du -B 512 --apparent-size ./root-fs.img | awk '{ print $1 }')

View File

@ -9,6 +9,7 @@
./config/xdg/menus.nix ./config/xdg/menus.nix
./config/xdg/mime.nix ./config/xdg/mime.nix
./config/xdg/portal.nix ./config/xdg/portal.nix
./config/xdg/portals/wlr.nix
./config/appstream.nix ./config/appstream.nix
./config/console.nix ./config/console.nix
./config/xdg/sounds.nix ./config/xdg/sounds.nix
@ -696,6 +697,7 @@
./services/networking/gdomap.nix ./services/networking/gdomap.nix
./services/networking/ghostunnel.nix ./services/networking/ghostunnel.nix
./services/networking/git-daemon.nix ./services/networking/git-daemon.nix
./services/networking/globalprotect-vpn.nix
./services/networking/gnunet.nix ./services/networking/gnunet.nix
./services/networking/go-neb.nix ./services/networking/go-neb.nix
./services/networking/go-shadowsocks2.nix ./services/networking/go-shadowsocks2.nix

View File

@ -91,10 +91,9 @@ in {
type = with types; listOf package; type = with types; listOf package;
default = with pkgs; [ default = with pkgs; [
swaylock swayidle alacritty dmenu swaylock swayidle alacritty dmenu
rxvt-unicode # For backward compatibility (old default terminal)
]; ];
defaultText = literalExample '' defaultText = literalExample ''
with pkgs; [ swaylock swayidle rxvt-unicode alacritty dmenu ]; with pkgs; [ swaylock swayidle alacritty dmenu ];
''; '';
example = literalExample '' example = literalExample ''
with pkgs; [ with pkgs; [

View File

@ -52,7 +52,7 @@ in {
}; };
port = mkOption { port = mkOption {
type = types.int; type = types.port;
default = 6379; default = 6379;
description = "The port for Redis to listen to."; description = "The port for Redis to listen to.";
}; };

View File

@ -42,7 +42,7 @@ in
}; };
port = mkOption { port = mkOption {
type = types.int; type = types.port;
default = 7777; default = 7777;
description = '' description = ''
Specifies the port to listen on. Specifies the port to listen on.
@ -50,7 +50,7 @@ in
}; };
maxPlayers = mkOption { maxPlayers = mkOption {
type = types.int; type = types.ints.u8;
default = 255; default = 255;
description = '' description = ''
Sets the max number of players (between 1 and 255). Sets the max number of players (between 1 and 255).

View File

@ -184,7 +184,7 @@ in {
}; };
}; };
environment.systemPackages = [ pkgs.etcdctl ]; environment.systemPackages = [ pkgs.etcd ];
users.users.etcd = { users.users.etcd = {
uid = config.ids.uids.etcd; uid = config.ids.uids.etcd;

View File

@ -10,7 +10,7 @@ let
postgresqlPackage = if config.services.postgresql.enable then postgresqlPackage = if config.services.postgresql.enable then
config.services.postgresql.package config.services.postgresql.package
else else
pkgs.postgresql; pkgs.postgresql_12;
gitlabSocket = "${cfg.statePath}/tmp/sockets/gitlab.socket"; gitlabSocket = "${cfg.statePath}/tmp/sockets/gitlab.socket";
gitalySocket = "${cfg.statePath}/tmp/sockets/gitaly.socket"; gitalySocket = "${cfg.statePath}/tmp/sockets/gitaly.socket";
@ -462,7 +462,7 @@ in {
}; };
port = mkOption { port = mkOption {
type = types.int; type = types.port;
default = 8080; default = 8080;
description = '' description = ''
GitLab server port for copy-paste URLs, e.g. 80 or 443 if you're GitLab server port for copy-paste URLs, e.g. 80 or 443 if you're
@ -841,6 +841,10 @@ in {
assertion = cfg.secrets.jwsFile != null; assertion = cfg.secrets.jwsFile != null;
message = "services.gitlab.secrets.jwsFile must be set!"; message = "services.gitlab.secrets.jwsFile must be set!";
} }
{
assertion = versionAtLeast postgresqlPackage.version "12.0.0";
message = "PostgreSQL >=12 is required to run GitLab 14.";
}
]; ];
environment.systemPackages = [ pkgs.git gitlab-rake gitlab-rails cfg.packages.gitlab-shell ]; environment.systemPackages = [ pkgs.git gitlab-rake gitlab-rails cfg.packages.gitlab-shell ];

View File

@ -238,7 +238,7 @@ in {
type = types.listOf (types.submodule { type = types.listOf (types.submodule {
options = { options = {
port = mkOption { port = mkOption {
type = types.int; type = types.port;
example = 8448; example = 8448;
description = '' description = ''
The port to listen for HTTP(S) requests on. The port to listen for HTTP(S) requests on.

View File

@ -104,6 +104,7 @@ in
ExecStart = "${pkgs.babeld}/bin/babeld -c ${configFile} -I /run/babeld/babeld.pid -S /var/lib/babeld/state"; ExecStart = "${pkgs.babeld}/bin/babeld -c ${configFile} -I /run/babeld/babeld.pid -S /var/lib/babeld/state";
AmbientCapabilities = [ "CAP_NET_ADMIN" ]; AmbientCapabilities = [ "CAP_NET_ADMIN" ];
CapabilityBoundingSet = [ "CAP_NET_ADMIN" ]; CapabilityBoundingSet = [ "CAP_NET_ADMIN" ];
DevicePolicy = "closed";
DynamicUser = true; DynamicUser = true;
IPAddressAllow = [ "fe80::/64" "ff00::/8" "::1/128" "127.0.0.0/8" ]; IPAddressAllow = [ "fe80::/64" "ff00::/8" "::1/128" "127.0.0.0/8" ];
IPAddressDeny = "any"; IPAddressDeny = "any";
@ -123,12 +124,17 @@ in
RemoveIPC = true; RemoveIPC = true;
ProtectHome = true; ProtectHome = true;
ProtectHostname = true; ProtectHostname = true;
ProtectProc = "invisible";
PrivateMounts = true; PrivateMounts = true;
PrivateTmp = true; PrivateTmp = true;
PrivateDevices = true; PrivateDevices = true;
PrivateUsers = false; # kernel_route(ADD): Operation not permitted PrivateUsers = false; # kernel_route(ADD): Operation not permitted
ProcSubset = "pid";
SystemCallArchitectures = "native"; SystemCallArchitectures = "native";
SystemCallFilter = [ "@system-service" ]; SystemCallFilter = [
"@system-service"
"~@privileged @resources"
];
UMask = "0177"; UMask = "0177";
RuntimeDirectory = "babeld"; RuntimeDirectory = "babeld";
StateDirectory = "babeld"; StateDirectory = "babeld";

View File

@ -67,7 +67,7 @@ in
}; };
listen.port = mkOption { listen.port = mkOption {
type = types.int; type = types.port;
default = 5000; default = 5000;
description = '' description = ''
Port on which the sync server listen to. Port on which the sync server listen to.

View File

@ -74,7 +74,7 @@ in
}; };
port = mkOption { port = mkOption {
type = types.int; type = types.port;
default = 9418; default = 9418;
description = "Port to listen on."; description = "Port to listen on.";
}; };

View File

@ -0,0 +1,43 @@
{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.services.globalprotect;
execStart = if cfg.csdWrapper == null then
"${pkgs.globalprotect-openconnect}/bin/gpservice"
else
"${pkgs.globalprotect-openconnect}/bin/gpservice --csd-wrapper=${cfg.csdWrapper}";
in
{
options.services.globalprotect = {
enable = mkEnableOption "globalprotect";
csdWrapper = mkOption {
description = ''
A script that will produce a Host Integrity Protection (HIP) report,
as described at <link xlink:href="https://www.infradead.org/openconnect/hip.html" />
'';
default = null;
example = literalExample "\${pkgs.openconnect}/libexec/openconnect/hipreport.sh";
type = types.nullOr types.path;
};
};
config = {
services.dbus.packages = [ pkgs.globalprotect-openconnect ];
systemd.services.gpservice = {
description = "GlobalProtect openconnect DBus service";
serviceConfig = {
Type="dbus";
BusName="com.yuezk.qt.GPService";
ExecStart=execStart;
};
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
};
};
}

View File

@ -5,7 +5,8 @@ with lib;
let let
cfg = config.services.go-neb; cfg = config.services.go-neb;
configFile = pkgs.writeText "config.yml" (builtins.toJSON cfg.config); settingsFormat = pkgs.formats.yaml {};
configFile = settingsFormat.generate "config.yaml" cfg.config;
in { in {
options.services.go-neb = { options.services.go-neb = {
enable = mkEnableOption "Extensible matrix bot written in Go"; enable = mkEnableOption "Extensible matrix bot written in Go";
@ -16,13 +17,26 @@ in {
default = ":4050"; default = ":4050";
}; };
secretFile = mkOption {
type = types.nullOr types.path;
default = null;
example = "/run/keys/go-neb.env";
description = ''
Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: <literal>$ENVIRONMENT</literal>
or <literal>''${VARIABLE}</literal>.
The file should contain lines formatted as <literal>SECRET_VAR=SECRET_VALUE</literal>.
This is useful to avoid putting secrets into the nix store.
'';
};
baseUrl = mkOption { baseUrl = mkOption {
type = types.str; type = types.str;
description = "Public-facing endpoint that can receive webhooks."; description = "Public-facing endpoint that can receive webhooks.";
}; };
config = mkOption { config = mkOption {
type = types.uniq types.attrs; inherit (settingsFormat) type;
description = '' description = ''
Your <filename>config.yaml</filename> as a Nix attribute set. Your <filename>config.yaml</filename> as a Nix attribute set.
See <link xlink:href="https://github.com/matrix-org/go-neb/blob/master/config.sample.yaml">config.sample.yaml</link> See <link xlink:href="https://github.com/matrix-org/go-neb/blob/master/config.sample.yaml">config.sample.yaml</link>
@ -32,18 +46,30 @@ in {
}; };
config = mkIf cfg.enable { config = mkIf cfg.enable {
systemd.services.go-neb = { systemd.services.go-neb = let
finalConfigFile = if cfg.secretFile == null then configFile else "/var/run/go-neb/config.yaml";
in {
description = "Extensible matrix bot written in Go"; description = "Extensible matrix bot written in Go";
after = [ "network.target" ]; after = [ "network.target" ];
wantedBy = [ "multi-user.target" ]; wantedBy = [ "multi-user.target" ];
environment = { environment = {
BASE_URL = cfg.baseUrl; BASE_URL = cfg.baseUrl;
BIND_ADDRESS = cfg.bindAddress; BIND_ADDRESS = cfg.bindAddress;
CONFIG_FILE = configFile; CONFIG_FILE = finalConfigFile;
}; };
serviceConfig = { serviceConfig = {
ExecStartPre = lib.optional (cfg.secretFile != null)
(pkgs.writeShellScript "pre-start" ''
umask 077
export $(xargs < ${cfg.secretFile})
${pkgs.envsubst}/bin/envsubst -i "${configFile}" > ${finalConfigFile}
chown go-neb ${finalConfigFile}
'');
PermissionsStartOnly = true;
RuntimeDirectory = "go-neb";
ExecStart = "${pkgs.go-neb}/bin/go-neb"; ExecStart = "${pkgs.go-neb}/bin/go-neb";
User = "go-neb";
DynamicUser = true; DynamicUser = true;
}; };
}; };

View File

@ -110,7 +110,7 @@ in
}; };
rpc.port = mkOption { rpc.port = mkOption {
type = types.int; type = types.port;
default = 18081; default = 18081;
description = '' description = ''
Port the RPC server will bind to. Port the RPC server will bind to.

View File

@ -351,15 +351,12 @@ in
logLevel = mkOption { logLevel = mkOption {
type = types.enum [ "QUIET" "FATAL" "ERROR" "INFO" "VERBOSE" "DEBUG" "DEBUG1" "DEBUG2" "DEBUG3" ]; type = types.enum [ "QUIET" "FATAL" "ERROR" "INFO" "VERBOSE" "DEBUG" "DEBUG1" "DEBUG2" "DEBUG3" ];
default = "VERBOSE"; default = "INFO"; # upstream default
description = '' description = ''
Gives the verbosity level that is used when logging messages from sshd(8). The possible values are: Gives the verbosity level that is used when logging messages from sshd(8). The possible values are:
QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2, and DEBUG3. The default is VERBOSE. DEBUG and DEBUG1 QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2, and DEBUG3. The default is INFO. DEBUG and DEBUG1
are equivalent. DEBUG2 and DEBUG3 each specify higher levels of debugging output. Logging with a DEBUG level are equivalent. DEBUG2 and DEBUG3 each specify higher levels of debugging output. Logging with a DEBUG level
violates the privacy of users and is not recommended. violates the privacy of users and is not recommended.
LogLevel VERBOSE logs user's key fingerprint on login.
Needed to have a clear audit track of which key was used to log in.
''; '';
}; };

View File

@ -45,7 +45,12 @@ in
enable = mkOption { enable = mkOption {
default = false; default = false;
type = types.bool; type = types.bool;
description = "Whether to enable the fail2ban service."; description = ''
Whether to enable the fail2ban service.
See the documentation of <option>services.fail2ban.jails</option>
for what jails are enabled by default.
'';
}; };
package = mkOption { package = mkOption {
@ -221,6 +226,15 @@ in
defined in <filename>/etc/fail2ban/action.d</filename>, defined in <filename>/etc/fail2ban/action.d</filename>,
while filters are defined in while filters are defined in
<filename>/etc/fail2ban/filter.d</filename>. <filename>/etc/fail2ban/filter.d</filename>.
NixOS comes with a default <literal>sshd</literal> jail;
for it to work well,
<option>services.openssh.logLevel</option> should be set to
<literal>"VERBOSE"</literal> or higher so that fail2ban
can observe failed login attempts.
This module sets it to <literal>"VERBOSE"</literal> if
not set otherwise, so enabling fail2ban can make SSH logs
more verbose.
''; '';
}; };
@ -313,6 +327,9 @@ in
banaction_allports = ${cfg.banaction-allports} banaction_allports = ${cfg.banaction-allports}
''; '';
# Block SSH if there are too many failing connection attempts. # Block SSH if there are too many failing connection attempts.
# Benefits from verbose sshd logging to observe failed login attempts,
# so we set that here unless the user overrode it.
services.openssh.logLevel = lib.mkDefault "VERBOSE";
services.fail2ban.jails.sshd = mkDefault '' services.fail2ban.jails.sshd = mkDefault ''
enabled = true enabled = true
port = ${concatMapStringsSep "," (p: toString p) config.services.openssh.ports} port = ${concatMapStringsSep "," (p: toString p) config.services.openssh.ports}

View File

@ -118,7 +118,7 @@ in
let speeds = concatStringsSep "," (map toString config.services.getty.serialSpeed); in let speeds = concatStringsSep "," (map toString config.services.getty.serialSpeed); in
{ serviceConfig.ExecStart = [ { serviceConfig.ExecStart = [
"" # override upstream default with an empty ExecStart "" # override upstream default with an empty ExecStart
(gettyCmd "%I ${speeds} $TERM") (gettyCmd "%I --keep-baud ${speeds} $TERM")
]; ];
restartIfChanged = false; restartIfChanged = false;
}; };

View File

@ -356,7 +356,7 @@ in
}; };
port = lib.mkOption { port = lib.mkOption {
type = lib.types.int; type = lib.types.port;
default = 25; default = 25;
description = '' description = ''
The port of the SMTP server Discourse should use to The port of the SMTP server Discourse should use to

View File

@ -19,7 +19,7 @@ in {
port = mkOption { port = mkOption {
default = 80; default = 80;
type = ints.u16; type = types.port;
description = '' description = ''
Port to listen on. Port to listen on.
Pass 0 to let the system choose any free port for you. Pass 0 to let the system choose any free port for you.

View File

@ -134,7 +134,7 @@ in
port = mkOption { port = mkOption {
default = 80; default = 80;
type = types.int; type = types.port;
description = '' description = ''
TCP port number for lighttpd to bind to. TCP port number for lighttpd to bind to.
''; '';

View File

@ -188,27 +188,27 @@ let cfg = config.services.xserver.libinput;
}; };
mkX11ConfigForDevice = deviceType: matchIs: '' mkX11ConfigForDevice = deviceType: matchIs: ''
Identifier "libinput ${deviceType} configuration" Identifier "libinput ${deviceType} configuration"
MatchDriver "libinput" MatchDriver "libinput"
MatchIs${matchIs} "${xorgBool true}" MatchIs${matchIs} "${xorgBool true}"
${optionalString (cfg.${deviceType}.dev != null) ''MatchDevicePath "${cfg.${deviceType}.dev}"''} ${optionalString (cfg.${deviceType}.dev != null) ''MatchDevicePath "${cfg.${deviceType}.dev}"''}
Option "AccelProfile" "${cfg.${deviceType}.accelProfile}" Option "AccelProfile" "${cfg.${deviceType}.accelProfile}"
${optionalString (cfg.${deviceType}.accelSpeed != null) ''Option "AccelSpeed" "${cfg.${deviceType}.accelSpeed}"''} ${optionalString (cfg.${deviceType}.accelSpeed != null) ''Option "AccelSpeed" "${cfg.${deviceType}.accelSpeed}"''}
${optionalString (cfg.${deviceType}.buttonMapping != null) ''Option "ButtonMapping" "${cfg.${deviceType}.buttonMapping}"''} ${optionalString (cfg.${deviceType}.buttonMapping != null) ''Option "ButtonMapping" "${cfg.${deviceType}.buttonMapping}"''}
${optionalString (cfg.${deviceType}.calibrationMatrix != null) ''Option "CalibrationMatrix" "${cfg.${deviceType}.calibrationMatrix}"''} ${optionalString (cfg.${deviceType}.calibrationMatrix != null) ''Option "CalibrationMatrix" "${cfg.${deviceType}.calibrationMatrix}"''}
${optionalString (cfg.${deviceType}.clickMethod != null) ''Option "ClickMethod" "${cfg.${deviceType}.clickMethod}"''} ${optionalString (cfg.${deviceType}.clickMethod != null) ''Option "ClickMethod" "${cfg.${deviceType}.clickMethod}"''}
Option "LeftHanded" "${xorgBool cfg.${deviceType}.leftHanded}" Option "LeftHanded" "${xorgBool cfg.${deviceType}.leftHanded}"
Option "MiddleEmulation" "${xorgBool cfg.${deviceType}.middleEmulation}" Option "MiddleEmulation" "${xorgBool cfg.${deviceType}.middleEmulation}"
Option "NaturalScrolling" "${xorgBool cfg.${deviceType}.naturalScrolling}" Option "NaturalScrolling" "${xorgBool cfg.${deviceType}.naturalScrolling}"
${optionalString (cfg.${deviceType}.scrollButton != null) ''Option "ScrollButton" "${toString cfg.${deviceType}.scrollButton}"''} ${optionalString (cfg.${deviceType}.scrollButton != null) ''Option "ScrollButton" "${toString cfg.${deviceType}.scrollButton}"''}
Option "ScrollMethod" "${cfg.${deviceType}.scrollMethod}" Option "ScrollMethod" "${cfg.${deviceType}.scrollMethod}"
Option "HorizontalScrolling" "${xorgBool cfg.${deviceType}.horizontalScrolling}" Option "HorizontalScrolling" "${xorgBool cfg.${deviceType}.horizontalScrolling}"
Option "SendEventsMode" "${cfg.${deviceType}.sendEventsMode}" Option "SendEventsMode" "${cfg.${deviceType}.sendEventsMode}"
Option "Tapping" "${xorgBool cfg.${deviceType}.tapping}" Option "Tapping" "${xorgBool cfg.${deviceType}.tapping}"
Option "TappingDragLock" "${xorgBool cfg.${deviceType}.tappingDragLock}" Option "TappingDragLock" "${xorgBool cfg.${deviceType}.tappingDragLock}"
Option "DisableWhileTyping" "${xorgBool cfg.${deviceType}.disableWhileTyping}" Option "DisableWhileTyping" "${xorgBool cfg.${deviceType}.disableWhileTyping}"
${cfg.${deviceType}.additionalOptions} ${cfg.${deviceType}.additionalOptions}
''; '';
in { in {
imports = imports =

View File

@ -81,13 +81,7 @@ let
monitors = forEach xrandrHeads (h: '' monitors = forEach xrandrHeads (h: ''
Option "monitor-${h.config.output}" "${h.name}" Option "monitor-${h.config.output}" "${h.name}"
''); '');
# First option is indented through the space in the config but any in concatStrings monitors;
# subsequent options aren't so we need to apply indentation to
# them here
monitorsIndented = if length monitors > 1
then singleton (head monitors) ++ map (m: " " + m) (tail monitors)
else monitors;
in concatStrings monitorsIndented;
# Here we chain every monitor from the left to right, so we have: # Here we chain every monitor from the left to right, so we have:
# m4 right of m3 right of m2 right of m1 .----.----.----.----. # m4 right of m3 right of m2 right of m1 .----.----.----.----.
@ -138,10 +132,15 @@ let
echo '${cfg.filesSection}' >> $out echo '${cfg.filesSection}' >> $out
echo 'EndSection' >> $out echo 'EndSection' >> $out
echo >> $out
echo "$config" >> $out echo "$config" >> $out
''; # */ ''; # */
prefixStringLines = prefix: str:
concatMapStringsSep "\n" (line: prefix + line) (splitString "\n" str);
indent = prefixStringLines " ";
in in
{ {
@ -358,6 +357,13 @@ in
description = '' description = ''
The contents of the configuration file of the X server The contents of the configuration file of the X server
(<filename>xorg.conf</filename>). (<filename>xorg.conf</filename>).
This option is set by multiple modules, and the configs are
concatenated together.
In Xorg configs the last config entries take precedence,
so you may want to use <literal>lib.mkAfter</literal> on this option
to override NixOS's defaults.
''; '';
}; };
@ -736,29 +742,29 @@ in
Section "ServerFlags" Section "ServerFlags"
Option "AllowMouseOpenFail" "on" Option "AllowMouseOpenFail" "on"
Option "DontZap" "${if cfg.enableCtrlAltBackspace then "off" else "on"}" Option "DontZap" "${if cfg.enableCtrlAltBackspace then "off" else "on"}"
${cfg.serverFlagsSection} ${indent cfg.serverFlagsSection}
EndSection EndSection
Section "Module" Section "Module"
${cfg.moduleSection} ${indent cfg.moduleSection}
EndSection EndSection
Section "Monitor" Section "Monitor"
Identifier "Monitor[0]" Identifier "Monitor[0]"
${cfg.monitorSection} ${indent cfg.monitorSection}
EndSection EndSection
# Additional "InputClass" sections # Additional "InputClass" sections
${flip concatMapStrings cfg.inputClassSections (inputClassSection: '' ${flip (concatMapStringsSep "\n") cfg.inputClassSections (inputClassSection: ''
Section "InputClass" Section "InputClass"
${inputClassSection} ${indent inputClassSection}
EndSection EndSection
'')} '')}
Section "ServerLayout" Section "ServerLayout"
Identifier "Layout[all]" Identifier "Layout[all]"
${cfg.serverLayoutSection} ${indent cfg.serverLayoutSection}
# Reference the Screen sections for each driver. This will # Reference the Screen sections for each driver. This will
# cause the X server to try each in turn. # cause the X server to try each in turn.
${flip concatMapStrings (filter (d: d.display) cfg.drivers) (d: '' ${flip concatMapStrings (filter (d: d.display) cfg.drivers) (d: ''
@ -781,9 +787,9 @@ in
Identifier "Device-${driver.name}[0]" Identifier "Device-${driver.name}[0]"
Driver "${driver.driverName or driver.name}" Driver "${driver.driverName or driver.name}"
${if cfg.useGlamor then ''Option "AccelMethod" "glamor"'' else ""} ${if cfg.useGlamor then ''Option "AccelMethod" "glamor"'' else ""}
${cfg.deviceSection} ${indent cfg.deviceSection}
${driver.deviceSection or ""} ${indent (driver.deviceSection or "")}
${xrandrDeviceSection} ${indent xrandrDeviceSection}
EndSection EndSection
${optionalString driver.display '' ${optionalString driver.display ''
@ -794,18 +800,22 @@ in
Monitor "Monitor[0]" Monitor "Monitor[0]"
''} ''}
${cfg.screenSection} ${indent cfg.screenSection}
${driver.screenSection or ""} ${indent (driver.screenSection or "")}
${optionalString (cfg.defaultDepth != 0) '' ${optionalString (cfg.defaultDepth != 0) ''
DefaultDepth ${toString cfg.defaultDepth} DefaultDepth ${toString cfg.defaultDepth}
''} ''}
${optionalString ${optionalString
(driver.name != "virtualbox" && (
driver.name != "virtualbox"
&&
(cfg.resolutions != [] || (cfg.resolutions != [] ||
cfg.extraDisplaySettings != "" || cfg.extraDisplaySettings != "" ||
cfg.virtualScreen != null)) cfg.virtualScreen != null
)
)
(let (let
f = depth: f = depth:
'' ''
@ -813,7 +823,7 @@ in
Depth ${toString depth} Depth ${toString depth}
${optionalString (cfg.resolutions != []) ${optionalString (cfg.resolutions != [])
"Modes ${concatMapStrings (res: ''"${toString res.x}x${toString res.y}"'') cfg.resolutions}"} "Modes ${concatMapStrings (res: ''"${toString res.x}x${toString res.y}"'') cfg.resolutions}"}
${cfg.extraDisplaySettings} ${indent cfg.extraDisplaySettings}
${optionalString (cfg.virtualScreen != null) ${optionalString (cfg.virtualScreen != null)
"Virtual ${toString cfg.virtualScreen.x} ${toString cfg.virtualScreen.y}"} "Virtual ${toString cfg.virtualScreen.x} ${toString cfg.virtualScreen.y}"}
EndSubSection EndSubSection

View File

@ -87,9 +87,9 @@ with lib;
}) })
(mkIf (cfg.emulateWheel) { (mkIf (cfg.emulateWheel) {
services.xserver.inputClassSections = services.xserver.inputClassSections = [
['' ''
Identifier "Trackpoint Wheel Emulation" Identifier "Trackpoint Wheel Emulation"
MatchProduct "${if cfg.fakeButtons then "PS/2 Generic Mouse" else "ETPS/2 Elantech TrackPoint|Elantech PS/2 TrackPoint|TPPS/2 IBM TrackPoint|DualPoint Stick|Synaptics Inc. Composite TouchPad / TrackPoint|ThinkPad USB Keyboard with TrackPoint|USB Trackpoint pointing device|Composite TouchPad / TrackPoint|${cfg.device}"}" MatchProduct "${if cfg.fakeButtons then "PS/2 Generic Mouse" else "ETPS/2 Elantech TrackPoint|Elantech PS/2 TrackPoint|TPPS/2 IBM TrackPoint|DualPoint Stick|Synaptics Inc. Composite TouchPad / TrackPoint|ThinkPad USB Keyboard with TrackPoint|USB Trackpoint pointing device|Composite TouchPad / TrackPoint|${cfg.device}"}"
MatchDevicePath "/dev/input/event*" MatchDevicePath "/dev/input/event*"
Option "EmulateWheel" "true" Option "EmulateWheel" "true"
@ -97,7 +97,8 @@ with lib;
Option "Emulate3Buttons" "false" Option "Emulate3Buttons" "false"
Option "XAxisMapping" "6 7" Option "XAxisMapping" "6 7"
Option "YAxisMapping" "4 5" Option "YAxisMapping" "4 5"
'']; ''
];
}) })
(mkIf cfg.fakeButtons { (mkIf cfg.fakeButtons {

View File

@ -201,6 +201,7 @@ in
jitsi-meet = handleTest ./jitsi-meet.nix {}; jitsi-meet = handleTest ./jitsi-meet.nix {};
k3s = handleTest ./k3s.nix {}; k3s = handleTest ./k3s.nix {};
kafka = handleTest ./kafka.nix {}; kafka = handleTest ./kafka.nix {};
kbd-setfont-decompress = handleTest ./kbd-setfont-decompress.nix {};
keepalived = handleTest ./keepalived.nix {}; keepalived = handleTest ./keepalived.nix {};
keepassxc = handleTest ./keepassxc.nix {}; keepassxc = handleTest ./keepassxc.nix {};
kerberos = handleTest ./kerberos/default.nix {}; kerberos = handleTest ./kerberos/default.nix {};
@ -431,6 +432,7 @@ in
trezord = handleTest ./trezord.nix {}; trezord = handleTest ./trezord.nix {};
trickster = handleTest ./trickster.nix {}; trickster = handleTest ./trickster.nix {};
trilium-server = handleTestOn ["x86_64-linux"] ./trilium-server.nix {}; trilium-server = handleTestOn ["x86_64-linux"] ./trilium-server.nix {};
txredisapi = handleTest ./txredisapi.nix {};
tuptime = handleTest ./tuptime.nix {}; tuptime = handleTest ./tuptime.nix {};
turbovnc-headless-server = handleTest ./turbovnc-headless-server.nix {}; turbovnc-headless-server = handleTest ./turbovnc-headless-server.nix {};
ucarp = handleTest ./ucarp.nix {}; ucarp = handleTest ./ucarp.nix {};

View File

@ -10,10 +10,11 @@ import ./make-test-python.nix ({ pkgs, ... }:
services.go-neb = { services.go-neb = {
enable = true; enable = true;
baseUrl = "http://localhost"; baseUrl = "http://localhost";
secretFile = pkgs.writeText "secrets" "ACCESS_TOKEN=changeme";
config = { config = {
clients = [ { clients = [ {
UserId = "@test:localhost"; UserId = "@test:localhost";
AccessToken = "changeme"; AccessToken = "$ACCESS_TOKEN";
HomeServerUrl = "http://localhost"; HomeServerUrl = "http://localhost";
Sync = false; Sync = false;
AutoJoinRooms = false; AutoJoinRooms = false;
@ -33,11 +34,10 @@ import ./make-test-python.nix ({ pkgs, ... }:
testScript = '' testScript = ''
start_all() start_all()
server.wait_for_unit("go-neb.service") server.wait_for_unit("go-neb.service")
server.wait_until_succeeds( server.wait_until_succeeds("curl -fL http://localhost:4050/services/hooks/d2lraXBlZGlhX3NlcnZpY2U")
"curl -fL http://localhost:4050/services/hooks/d2lraXBlZGlhX3NlcnZpY2U" server.succeed(
) "journalctl -eu go-neb -o cat | grep -q service_id=wikipedia_service",
server.wait_until_succeeds( "grep -q changeme /var/run/go-neb/config.yaml",
"journalctl -eu go-neb -o cat | grep -q service_id=wikipedia_service"
) )
''; '';

View File

@ -0,0 +1,21 @@
import ./make-test-python.nix ({ lib, pkgs, ... }:
{
name = "kbd-setfont-decompress";
meta.maintainers = with lib.maintainers; [ oxalica ];
machine = { ... }: {};
testScript = ''
machine.succeed("gzip -cd ${pkgs.terminus_font}/share/consolefonts/ter-v16b.psf.gz >font.psf")
machine.succeed("gzip <font.psf >font.psf.gz")
machine.succeed("bzip2 <font.psf >font.psf.bz2")
machine.succeed("xz <font.psf >font.psf.xz")
machine.succeed("zstd <font.psf >font.psf.zst")
# setfont returns 0 even on error.
assert machine.succeed("PATH= ${pkgs.kbd}/bin/setfont font.psf.gz 2>&1") == ""
assert machine.succeed("PATH= ${pkgs.kbd}/bin/setfont font.psf.bz2 2>&1") == ""
assert machine.succeed("PATH= ${pkgs.kbd}/bin/setfont font.psf.xz 2>&1") == ""
assert machine.succeed("PATH= ${pkgs.kbd}/bin/setfont font.psf.zst 2>&1") == ""
'';
})

View File

@ -15,7 +15,10 @@ import ./make-test-python.nix ({ pkgs, lib, ...} :
# For glinfo and wayland-info: # For glinfo and wayland-info:
systemPackages = with pkgs; [ mesa-demos wayland-utils ]; systemPackages = with pkgs; [ mesa-demos wayland-utils ];
# Use a fixed SWAYSOCK path (for swaymsg): # Use a fixed SWAYSOCK path (for swaymsg):
variables."SWAYSOCK" = "/tmp/sway-ipc.sock"; variables = {
"SWAYSOCK" = "/tmp/sway-ipc.sock";
"WLR_RENDERER_ALLOW_SOFTWARE" = "1";
};
# For convenience: # For convenience:
shellAliases = { shellAliases = {
test-x11 = "glinfo | head -n 3 | tee /tmp/test-x11.out && touch /tmp/test-x11-exit-ok"; test-x11 = "glinfo | head -n 3 | tee /tmp/test-x11.out && touch /tmp/test-x11-exit-ok";
@ -101,6 +104,10 @@ import ./make-test-python.nix ({ pkgs, lib, ...} :
# Exit Sway and verify process exit status 0: # Exit Sway and verify process exit status 0:
machine.succeed("su - alice -c 'swaymsg exit || true'") machine.succeed("su - alice -c 'swaymsg exit || true'")
machine.wait_for_file("/tmp/sway-exit-ok") machine.wait_until_fails("pgrep -x sway")
# TODO: Sway currently segfaults after "swaymsg exit" but only in this VM test:
# machine # [ 104.090032] sway[921]: segfault at 3f800008 ip 00007f7dbdc25f10 sp 00007ffe282182f8 error 4 in libwayland-server.so.0.1.0[7f7dbdc1f000+8000]
# machine.wait_for_file("/tmp/sway-exit-ok")
''; '';
}) })

View File

@ -0,0 +1,27 @@
import ./make-test-python.nix ({ pkgs, ... }:
{
name = "txredisapi";
meta = with pkgs.lib.maintainers; {
maintainers = [ dandellion ];
};
nodes = {
machine =
{ pkgs, ... }:
{
services.redis.enable = true;
services.redis.unixSocket = "/run/redis/redis.sock";
environment.systemPackages = with pkgs; [ (python38.withPackages (ps: [ ps.twisted ps.txredisapi ps.mock ]))];
};
};
testScript = ''
start_all()
machine.wait_for_unit("redis")
machine.wait_for_open_port("6379")
tests = machine.succeed("PYTHONPATH=\"${pkgs.python3Packages.txredisapi.src}\" python -m twisted.trial ${pkgs.python3Packages.txredisapi.src}/tests")
'';
})

View File

@ -1,4 +1,4 @@
{ lib, stdenv, fetchurl, autoreconfHook, gnu-config, IOKit, Carbon }: { lib, stdenv, fetchurl, gnu-config, IOKit, Carbon }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
name = "cdparanoia-III-10.2"; name = "cdparanoia-III-10.2";
@ -20,8 +20,6 @@ stdenv.mkDerivation rec {
] ++ lib.optional stdenv.hostPlatform.isMusl ./utils.patch ] ++ lib.optional stdenv.hostPlatform.isMusl ./utils.patch
++ [./fix_private_keyword.patch]; ++ [./fix_private_keyword.patch];
nativeBuildInputs = lib.optional stdenv.isAarch64 autoreconfHook;
propagatedBuildInputs = lib.optionals stdenv.isDarwin [ propagatedBuildInputs = lib.optionals stdenv.isDarwin [
Carbon Carbon
IOKit IOKit
@ -29,7 +27,9 @@ stdenv.mkDerivation rec {
hardeningDisable = [ "format" ]; hardeningDisable = [ "format" ];
preConfigure = "unset CC" + lib.optionalString stdenv.isAarch64 ''; preConfigure = ''
unset CC
'' + lib.optionalString (!stdenv.hostPlatform.isx86) ''
cp ${gnu-config}/config.sub configure.sub cp ${gnu-config}/config.sub configure.sub
cp ${gnu-config}/config.guess configure.guess cp ${gnu-config}/config.guess configure.guess
''; '';

View File

@ -3,12 +3,12 @@
mkDerivation rec { mkDerivation rec {
pname = "jamulus"; pname = "jamulus";
version = "3.7.0"; version = "3.8.0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "jamulussoftware"; owner = "jamulussoftware";
repo = "jamulus"; repo = "jamulus";
rev = "r${lib.replaceStrings [ "." ] [ "_" ] version}"; rev = "r${lib.replaceStrings [ "." ] [ "_" ] version}";
sha256 = "sha256-8zCPT0jo4ExgmZWxGinumv3JauH4csM9DtuHmOiJQAM="; sha256 = "sha256-Ni6N7XW34OFNuEkqBEgMcYGmIqb+UZ0uhLt/shRkWRs=";
}; };
nativeBuildInputs = [ pkg-config qmake ]; nativeBuildInputs = [ pkg-config qmake ];

View File

@ -0,0 +1,60 @@
{ stdenv
, dpkg
, lib
, autoPatchelfHook
, fetchurl
, gtk3
, glib
, desktop-file-utils
, alsa-lib
, libjack2
, harfbuzz
, fribidi
, pango
, freetype
}:
stdenv.mkDerivation rec {
pname = "tonelib-gfx";
version = "4.6.6";
src = fetchurl {
url = "https://www.tonelib.net/download/0509/ToneLib-GFX-amd64.deb";
sha256 = "sha256-wdX3SQSr0IZHsTUl+1Y0iETme3gTyryexhZ/9XHkGeo=";
};
buildInputs = [
dpkg
gtk3
glib
desktop-file-utils
alsa-lib
libjack2
harfbuzz
fribidi
pango
freetype
];
nativeBuildInputs = [
autoPatchelfHook
];
unpackPhase = ''
mkdir -p $TMP/ $out/
dpkg -x $src $TMP
'';
installPhase = ''
cp -R $TMP/usr/* $out/
mv $out/bin/ToneLib-GFX $out/bin/tonelib-gfx
'';
meta = with lib; {
description = "Tonelib GFX is an amp and effects modeling software for electric guitar and bass.";
homepage = "https://tonelib.net/";
license = licenses.unfree;
maintainers = with maintainers; [ dan4ik605743 ];
platforms = platforms.linux;
};
}

View File

@ -1,6 +1,7 @@
{ lib { lib
, python3 , python3
, fetchFromGitHub , fetchFromGitHub
, fetchpatch
, libcdio-paranoia , libcdio-paranoia
, cdrdao , cdrdao
, libsndfile , libsndfile
@ -22,6 +23,15 @@ in python3.pkgs.buildPythonApplication rec {
sha256 = "00cq03cy5dyghmibsdsq5sdqv3bzkzhshsng74bpnb5lasxp3ia5"; sha256 = "00cq03cy5dyghmibsdsq5sdqv3bzkzhshsng74bpnb5lasxp3ia5";
}; };
patches = [
(fetchpatch {
# Use custom YAML subclass to be compatible with ruamel_yaml>=0.17
# https://github.com/whipper-team/whipper/pull/543
url = "https://github.com/whipper-team/whipper/commit/3ce5964dfe8be1e625c3e3b091360dd0bc34a384.patch";
sha256 = "0n9dmib884y8syvypsg88j0h71iy42n1qsrh0am8pwna63sl15ah";
})
];
nativeBuildInputs = with python3.pkgs; [ nativeBuildInputs = with python3.pkgs; [
setuptools-scm setuptools-scm
docutils docutils

View File

@ -1,11 +1,12 @@
{ lib { lib
, python3 , python3Packages
, fetchFromGitHub , fetchFromGitHub
, wrapQtAppsHook , wrapQtAppsHook
, borgbackup , borgbackup
, qt5
}: }:
python3.pkgs.buildPythonApplication rec { python3Packages.buildPythonApplication rec {
pname = "vorta"; pname = "vorta";
version = "0.7.7"; version = "0.7.7";
@ -16,19 +17,34 @@ python3.pkgs.buildPythonApplication rec {
sha256 = "sha256-AH9CvoWAaNLPLC+NL+VXtYq9CNCMt0AFtC1ZGXSlcHQ="; sha256 = "sha256-AH9CvoWAaNLPLC+NL+VXtYq9CNCMt0AFtC1ZGXSlcHQ=";
}; };
postPatch = ''
sed -i -e '/setuptools_git/d' -e '/pytest-runner/d' setup.cfg
'';
nativeBuildInputs = [ wrapQtAppsHook ]; nativeBuildInputs = [ wrapQtAppsHook ];
propagatedBuildInputs = with python3.pkgs; [ propagatedBuildInputs = with python3Packages; [
paramiko peewee pyqt5 python-dateutil APScheduler psutil qdarkstyle paramiko
secretstorage appdirs setuptools peewee
pyqt5
python-dateutil
APScheduler
psutil
qdarkstyle
secretstorage
appdirs
setuptools
]; ];
# QT setup in tests broken. postPatch = ''
doCheck = false; substituteInPlace setup.cfg \
--replace setuptools_git "" \
--replace pytest-runner ""
substituteInPlace src/vorta/assets/metadata/com.borgbase.Vorta.desktop \
--replace Exec=vorta "Exec=$out/bin/vorta" \
--replace com.borgbase.Vorta "com.borgbase.Vorta-symbolic"
'';
postInstall = ''
install -Dm644 src/vorta/assets/metadata/com.borgbase.Vorta.desktop $out/share/applications/com.borgbase.Vorta.desktop
'';
preFixup = '' preFixup = ''
makeWrapperArgs+=( makeWrapperArgs+=(
@ -37,6 +53,37 @@ python3.pkgs.buildPythonApplication rec {
) )
''; '';
checkInputs = with python3Packages; [
pytest-qt
pytest-mock
pytestCheckHook
];
preCheck = ''
export HOME=$(mktemp -d)
# For tests/test_misc.py::test_autostart
mkdir -p $HOME/.config/autostart
export QT_PLUGIN_PATH="${qt5.qtbase.bin}/${qt5.qtbase.qtPluginPrefix}"
export QT_QPA_PLATFORM=offscreen
'';
disabledTestPaths = [
"tests/test_archives.py"
"tests/test_borg.py"
"tests/test_lock.py"
"tests/test_notifications.py"
];
disabledTests = [
"diff_archives_dict_issue-Users"
"diff_archives-test"
"test_repo_unlink"
"test_repo_add_success"
"test_ssh_dialog"
"test_create"
"test_scheduler_create_backup"
];
meta = with lib; { meta = with lib; {
license = licenses.gpl3Only; license = licenses.gpl3Only;
homepage = "https://vorta.borgbase.com/"; homepage = "https://vorta.borgbase.com/";

View File

@ -7,16 +7,16 @@
}: }:
rustPlatform.buildRustPackage rec { rustPlatform.buildRustPackage rec {
pname = "polkadot"; pname = "polkadot";
version = "0.9.5"; version = "0.9.6";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "paritytech"; owner = "paritytech";
repo = "polkadot"; repo = "polkadot";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-fe6iCSp4TxKKsVVBrvbSMROXqigTfxFCOLN1gAqRTv0="; sha256 = "sha256-waoNCEGHFjY91ted4oBtwxW6/beqW/8IwRIE4rG+fKQ=";
}; };
cargoSha256 = "18pg09v14991aqq7cjg0w5x36526y6sx1hvxlqb20zvrgmv722cq"; cargoSha256 = "17c45xi1wr77jbkcl1mkxflc8f9hilil02c43fihvlh2lm8kcs5j";
nativeBuildInputs = [ clang ]; nativeBuildInputs = [ clang ];

File diff suppressed because it is too large Load Diff

View File

@ -9,65 +9,58 @@
, expat , expat
, openssl , openssl
, SDL2 , SDL2
, vulkan-loader
, fontconfig , fontconfig
, ninja , ninja
, gn , gn
, llvmPackages , llvmPackages
, makeFontsConf , makeFontsConf
, libglvnd
, libxkbcommon
, xorg
}: }:
rustPlatform.buildRustPackage rec { rustPlatform.buildRustPackage rec {
pname = "neovide"; pname = "neovide";
version = "20210515"; version = "unstable-2021-06-21";
src = src = fetchFromGitHub {
let owner = "Kethku";
repo = fetchFromGitHub { repo = "neovide";
owner = "Kethku"; rev = "4159c47ff4f30073b92b9d63fc6ab70e07b74b6d";
repo = "neovide"; sha256 = "sha256-XwirJGXMGxc/NkpSeHBUc16ppvJ+H4ECnrOVu030Qfg=";
rev = "0b976c3d28bbd24e6c83a2efc077aa96dde1e9eb"; };
sha256 = "sha256-asaOxcAenKdy/yJvch3HFfgnrBnQagL02UpWYnz7sa8=";
};
in
runCommand "source" { } ''
cp -R ${repo} $out
chmod -R +w $out
# Reasons for patching Cargo.toml:
# - I got neovide built with latest compatible skia-save version 0.35.1
# and I did not try to get it with 0.32.1 working. Changing the skia
# version is time consuming, because of manual dependecy tracking and
# long compilation runs.
sed -i $out/Cargo.toml \
-e '/skia-safe/s;0.32.1;0.35.1;'
cp ${./Cargo.lock} $out/Cargo.lock
'';
cargoSha256 = "sha256-XMPRM3BAfCleS0LXQv03A3lQhlUhAP8/9PdVbAUnfG0="; cargoSha256 = "sha256-WCk9kt81DtBwpEEdKH9gKQSVxAvH+vkyP2y24tU+vzY=";
SKIA_OFFLINE_SOURCE_DIR = SKIA_SOURCE_DIR =
let let
repo = fetchFromGitHub { repo = fetchFromGitHub {
owner = "rust-skia"; owner = "rust-skia";
repo = "skia"; repo = "skia";
# see rust-skia/Cargo.toml#package.metadata skia # see rust-skia:skia-bindings/Cargo.toml#package.metadata skia
rev = "m86-0.35.0"; rev = "m90-0.38.3";
sha256 = "sha256-uTSgtiEkbE9e08zYOkRZyiHkwOLr/FbBYkr2d+NZ8J0="; sha256 = "sha256-l8c4vfO1PELAT8bDyr/yQGZetZsaufAlJ6bBOXz7E1w=";
}; };
# The externals for skia are taken from skia/DEPS # The externals for skia are taken from skia/DEPS
externals = lib.mapAttrs (n: v: fetchgit v) (lib.importJSON ./skia-externals.json); externals = lib.mapAttrs (n: v: fetchgit v) (lib.importJSON ./skia-externals.json);
in in
runCommand "source" { } ('' runCommand "source" {} (
cp -R ${repo} $out ''
chmod -R +w $out cp -R ${repo} $out
chmod -R +w $out
mkdir -p $out/third_party/externals mkdir -p $out/third_party/externals
cd $out/third_party/externals cd $out/third_party/externals
'' + (builtins.concatStringsSep "\n" (lib.mapAttrsToList (name: value: "cp -ra ${value} ${name}") externals))); '' + (builtins.concatStringsSep "\n" (lib.mapAttrsToList (name: value: "cp -ra ${value} ${name}") externals))
);
SKIA_OFFLINE_NINJA_COMMAND = "${ninja}/bin/ninja"; SKIA_NINJA_COMMAND = "${ninja}/bin/ninja";
SKIA_OFFLINE_GN_COMMAND = "${gn}/bin/gn"; SKIA_GN_COMMAND = "${gn}/bin/gn";
LIBCLANG_PATH = "${llvmPackages.libclang.lib}/lib"; LIBCLANG_PATH = "${llvmPackages.libclang.lib}/lib";
preConfigure = ''
unset CC CXX
'';
# test needs a valid fontconfig file # test needs a valid fontconfig file
FONTCONFIG_FILE = makeFontsConf { fontDirectories = [ ]; }; FONTCONFIG_FILE = makeFontsConf { fontDirectories = [ ]; };
@ -92,9 +85,9 @@ rustPlatform.buildRustPackage rec {
]; ];
postFixup = '' postFixup = ''
wrapProgram $out/bin/neovide \ wrapProgram $out/bin/neovide \
--prefix LD_LIBRARY_PATH : ${vulkan-loader}/lib --prefix LD_LIBRARY_PATH : ${lib.makeLibraryPath [ libglvnd libxkbcommon xorg.libXcursor xorg.libXext xorg.libXrandr xorg.libXi ]}
''; '';
postInstall = '' postInstall = ''
for n in 16x16 32x32 48x48 256x256; do for n in 16x16 32x32 48x48 256x256; do

View File

@ -16,8 +16,8 @@
}, },
"zlib": { "zlib": {
"url": "https://chromium.googlesource.com/chromium/src/third_party/zlib", "url": "https://chromium.googlesource.com/chromium/src/third_party/zlib",
"rev": "eaf99a4e2009b0e5759e6070ad1760ac1dd75461", "rev": "c876c8f87101c5a75f6014b0f832499afeb65b73",
"sha256": "sha256-B4PgeSVBU/MSkPkXTu9jPIa37dNJPm2HpmiVf6XuOGE=" "sha256": "sha256-mwozVo8ymyrYN4tw+/ZnSI+xogSTZQ6PUBba/jQqRkE="
}, },
"harfbuzz": { "harfbuzz": {
"url": "https://chromium.googlesource.com/external/github.com/harfbuzz/harfbuzz.git", "url": "https://chromium.googlesource.com/external/github.com/harfbuzz/harfbuzz.git",
@ -31,7 +31,7 @@
}, },
"libgifcodec": { "libgifcodec": {
"url": "https://skia.googlesource.com/libgifcodec", "url": "https://skia.googlesource.com/libgifcodec",
"rev": "d06d2a6d42baf6c0c91cacc28df2542a911d05fe", "rev": "fd59fa92a0c86788dcdd84d091e1ce81eda06a77",
"sha256": "sha256-ke1X5iyj2ah2NqGVdFv8GuoRAzXg1aCeTdZwUM8wvCI=" "sha256": "sha256-spyZU4QhV2xrHcBRoYqYgCR0wEM5lgfhGh8pqJE5yXM="
} }
} }

View File

@ -18,13 +18,13 @@ in
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "imagemagick"; pname = "imagemagick";
version = "7.0.11-12"; version = "7.1.0-0";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "ImageMagick"; owner = "ImageMagick";
repo = "ImageMagick"; repo = "ImageMagick";
rev = version; rev = version;
sha256 = "sha256-vTCfpHcja0z/aplcunUDlg/90EbfrR/xQ9bzdG0n2RY="; sha256 = "sha256-TmyJMzj5tHMrVm6xRguZmXIg7c6mHmqusMMdJAHNqNg=";
}; };
outputs = [ "out" "dev" "doc" ]; # bin/ isn't really big outputs = [ "out" "dev" "doc" ]; # bin/ isn't really big

View File

@ -5,11 +5,11 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "avocode"; pname = "avocode";
version = "4.14.1"; version = "4.14.3";
src = fetchurl { src = fetchurl {
url = "https://media.avocode.com/download/avocode-app/${version}/avocode-${version}-linux.zip"; url = "https://media.avocode.com/download/avocode-app/${version}/avocode-${version}-linux.zip";
sha256 = "sha256-OXSxfNCwbZ1RjjoxDlsREtKtbzlQcuPylvD1/ehfgsI="; sha256 = "sha256-6OEgSnW96jufc/Z+B17ghtAbj9SLulue26ffKREGzbY=";
}; };
libPath = lib.makeLibraryPath (with xorg; [ libPath = lib.makeLibraryPath (with xorg; [

View File

@ -16,13 +16,17 @@ mkDerivationWith python3Packages.buildPythonApplication rec {
sha256 = "1970izjaa60r5cg9i35rzz9lk5c5d8q1vw1rh2skvfbf63z1hnzv"; sha256 = "1970izjaa60r5cg9i35rzz9lk5c5d8q1vw1rh2skvfbf63z1hnzv";
}; };
patches = [
./spyder4.patch
];
propagatedBuildInputs = with python3Packages; [ propagatedBuildInputs = with python3Packages; [
cadquery cadquery
Logbook Logbook
pyqt5 pyqt5
pyparsing pyparsing
pyqtgraph pyqtgraph
spyder_3 spyder
pathpy pathpy
qtconsole qtconsole
requests requests

View File

@ -0,0 +1,58 @@
diff --git a/cq_editor/widgets/debugger.py b/cq_editor/widgets/debugger.py
index b7398fb..d039db5 100644
--- a/cq_editor/widgets/debugger.py
+++ b/cq_editor/widgets/debugger.py
@@ -162,7 +162,7 @@ class Debugger(QObject,ComponentMixin):
def get_breakpoints(self):
- return self.parent().components['editor'].get_breakpoints()
+ return self.parent().components['editor'].debugger.get_breakpoints()
def compile_code(self,cq_script):
@@ -178,12 +178,14 @@ class Debugger(QObject,ComponentMixin):
def _exec(self, code, locals_dict, globals_dict):
with ExitStack() as stack:
- p = Path(self.parent().components['editor'].filename).dirname()
- if self.preferences['Add script dir to path'] and p:
+ fname = self.parent().components['editor'].filename
+ p = Path(fname if fname else '').abspath().dirname()
+ if self.preferences['Add script dir to path'] and p.exists():
sys.path.append(p)
stack.callback(sys.path.remove, p)
- if self.preferences['Change working dir to script dir'] and p:
+ if self.preferences['Change working dir to script dir'] and p.exists():
stack.enter_context(p)
+
exec(code, locals_dict, globals_dict)
def _inject_locals(self,module):
diff --git a/cq_editor/widgets/editor.py b/cq_editor/widgets/editor.py
index 45aa048..2763469 100644
--- a/cq_editor/widgets/editor.py
+++ b/cq_editor/widgets/editor.py
@@ -1,4 +1,4 @@
-from spyder.widgets.sourcecode.codeeditor import CodeEditor
+from spyder.plugins.editor.widgets.codeeditor import CodeEditor
from PyQt5.QtCore import pyqtSignal, QFileSystemWatcher, QTimer
from PyQt5.QtWidgets import QAction, QFileDialog
from PyQt5.QtGui import QFontDatabase
@@ -32,6 +32,8 @@ class Editor(CodeEditor,ComponentMixin):
def __init__(self,parent=None):
+ self._watched_file = None
+
super(Editor,self).__init__(parent)
ComponentMixin.__init__(self)
@@ -83,7 +85,6 @@ class Editor(CodeEditor,ComponentMixin):
# autoreload support
self._file_watcher = QFileSystemWatcher(self)
- self._watched_file = None
# we wait for 50ms after a file change for the file to be written completely
self._file_watch_timer = QTimer(self)
self._file_watch_timer.setInterval(50)

View File

@ -1,6 +1,6 @@
{ lib, stdenv, fetchurl, bzip2, freetype, graphviz, ghostscript { lib, stdenv, fetchurl, bzip2, freetype, graphviz, ghostscript
, libjpeg, libpng, libtiff, libxml2, zlib, libtool, xz, libX11 , libjpeg, libpng, libtiff, libxml2, zlib, libtool, xz, libX11
, libwebp, quantumdepth ? 8, fixDarwinDylibNames }: , libwebp, quantumdepth ? 8, fixDarwinDylibNames, nukeReferences }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "graphicsmagick"; pname = "graphicsmagick";
@ -27,8 +27,14 @@ stdenv.mkDerivation rec {
zlib libtool libwebp zlib libtool libwebp
]; ];
nativeBuildInputs = [ xz ] nativeBuildInputs = [ xz nukeReferences ]
++ lib.optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames; ++ lib.optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames;
# Remove CFLAGS from the binaries to avoid closure bloat.
# In the past we have had -dev packages in the closure of the binaries soley due to the string references.
postConfigure = ''
nuke-refs ./magick/magick_config.h
'';
postInstall = '' postInstall = ''
sed -i 's/-ltiff.*'\'/\'/ $out/bin/* sed -i 's/-ltiff.*'\'/\'/ $out/bin/*

View File

@ -4,6 +4,7 @@
, cairo , cairo
, cmake , cmake
, fetchurl , fetchurl
, fetchpatch
, gettext , gettext
, ghostscript , ghostscript
, glib , glib
@ -71,6 +72,15 @@ stdenv.mkDerivation rec {
# e.g., those from the "Effects" menu. # e.g., those from the "Effects" menu.
python3 = "${python3Env}/bin/python"; python3 = "${python3Env}/bin/python";
}) })
# Fix parsing paths by Python extensions.
# https://gitlab.com/inkscape/extensions/-/merge_requests/342
(fetchpatch {
url = "https://gitlab.com/inkscape/extensions/-/commit/a82c382c610d37837c8f3f5b13224bab8fd3667e.patch";
sha256 = "YWrgjCnQ9q6BUsxSLQojIXnDzPxM/SgrIfj1gxQ/JKM=";
stripLen = 1;
extraPrefix = "share/extensions/";
})
]; ];
postPatch = '' postPatch = ''

View File

@ -2,9 +2,12 @@
, fetchFromGitHub , fetchFromGitHub
, runCommand , runCommand
, inkcut , inkcut
, callPackage
}: }:
{ {
applytransforms = callPackage ./extensions/applytransforms { };
hexmap = stdenv.mkDerivation { hexmap = stdenv.mkDerivation {
name = "hexmap"; name = "hexmap";
version = "2020-06-06"; version = "2020-06-06";

View File

@ -0,0 +1,42 @@
{ lib
, stdenv
, fetchFromGitHub
, python3
}:
stdenv.mkDerivation {
pname = "inkscape-applytransforms";
version = "0.0.0+unstable=2021-05-11";
src = fetchFromGitHub {
owner = "Klowner";
repo = "inkscape-applytransforms";
rev = "5b3ed4af0fb66e399e686fc2b649b56db84f6042";
sha256 = "XWwkuw+Um/cflRWjIeIgQUxJLrk2DLDmx7K+pMWvIlI=";
};
checkInputs = [
python3.pkgs.inkex
python3.pkgs.pytestCheckHook
];
dontBuild = true;
doCheck = true;
installPhase = ''
runHook preInstall
install -Dt "$out/share/inkscape/extensions" *.inx *.py
runHook postInstall
'';
meta = with lib; {
description = "Inkscape extension which removes all matrix transforms by applying them recursively to shapes";
homepage = "https://github.com/Klowner/inkscape-applytransforms";
license = licenses.gpl2Only;
maintainers = with maintainers; [ jtojnar ];
platforms = platforms.all;
};
}

View File

@ -2,13 +2,19 @@
, inkscape , inkscape
, symlinkJoin , symlinkJoin
, makeWrapper , makeWrapper
, inkscapeExtensions ? [] , inkscapeExtensions ? [ ]
, inkscape-extensions
}: }:
let
allExtensions = lib.filter (pkg: lib.isDerivation pkg && !pkg.meta.broken or false) (lib.attrValues inkscape-extensions);
selectedExtensions = if inkscapeExtensions == null then allExtensions else inkscapeExtensions;
in
symlinkJoin { symlinkJoin {
name = "inkscape-with-extensions-${lib.getVersion inkscape}"; name = "inkscape-with-extensions-${lib.getVersion inkscape}";
paths = [ inkscape ] ++ inkscapeExtensions; paths = [ inkscape ] ++ selectedExtensions;
nativeBuildInputs = [ makeWrapper ]; nativeBuildInputs = [ makeWrapper ];

View File

@ -3,7 +3,7 @@
, kguiaddons, ki18n, kitemmodels, kitemviews, kwindowsystem , kguiaddons, ki18n, kitemmodels, kitemviews, kwindowsystem
, kio, kcrash, breeze-icons , kio, kcrash, breeze-icons
, boost, libraw, fftw, eigen, exiv2, libheif, lcms2, gsl, openexr, giflib , boost, libraw, fftw, eigen, exiv2, libheif, lcms2, gsl, openexr, giflib
, openjpeg, opencolorio, vc, poppler, curl, ilmbase , openjpeg, opencolorio_1, vc, poppler, curl, ilmbase
, qtmultimedia, qtx11extras, quazip , qtmultimedia, qtx11extras, quazip
, python3Packages , python3Packages
}: }:
@ -23,7 +23,7 @@ mkDerivation rec {
karchive kconfig kwidgetsaddons kcompletion kcoreaddons kguiaddons karchive kconfig kwidgetsaddons kcompletion kcoreaddons kguiaddons
ki18n kitemmodels kitemviews kwindowsystem kio kcrash breeze-icons ki18n kitemmodels kitemviews kwindowsystem kio kcrash breeze-icons
boost libraw fftw eigen exiv2 lcms2 gsl openexr libheif giflib boost libraw fftw eigen exiv2 lcms2 gsl openexr libheif giflib
openjpeg opencolorio poppler curl ilmbase openjpeg opencolorio_1 poppler curl ilmbase
qtmultimedia qtx11extras quazip qtmultimedia qtx11extras quazip
python3Packages.pyqt5 python3Packages.pyqt5
] ++ lib.optional (stdenv.hostPlatform.isi686 || stdenv.hostPlatform.isx86_64) vc; ] ++ lib.optional (stdenv.hostPlatform.isi686 || stdenv.hostPlatform.isx86_64) vc;

View File

@ -26,13 +26,13 @@ let
in in
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "megapixels"; pname = "megapixels";
version = "1.0.1"; version = "1.1.0";
src = fetchFromSourcehut { src = fetchFromSourcehut {
owner = "~martijnbraam"; owner = "~martijnbraam";
repo = "megapixels"; repo = "megapixels";
rev = version; rev = version;
sha256 = "0k9a5dpr5z0g7ngbhk4j22sbs1ffxiwg8wmbzgggdc9xvwmkgppr"; sha256 = "0y56c6vchlzidfmp3a3bdc228vbhy7zaxvmhkyxchfb752yzr0n3";
}; };
nativeBuildInputs = [ meson ninja pkg-config wrapGAppsHook ]; nativeBuildInputs = [ meson ninja pkg-config wrapGAppsHook ];

View File

@ -7,7 +7,7 @@
, libjpeg , libjpeg
, libpng , libpng
, libtiff , libtiff
, opencolorio , opencolorio_1
, openexr , openexr
, robin-map , robin-map
, unzip , unzip
@ -39,7 +39,7 @@ stdenv.mkDerivation rec {
libjpeg libjpeg
libpng libpng
libtiff libtiff
opencolorio opencolorio_1
openexr openexr
robin-map robin-map
fmt fmt

View File

@ -1,5 +1,5 @@
{ lib, stdenv, fetchFromGitHub, boost, cmake, ilmbase, libjpeg, libpng, libtiff { lib, stdenv, fetchFromGitHub, boost, cmake, ilmbase, libjpeg, libpng, libtiff
, opencolorio, openexr, unzip , opencolorio_1, openexr, unzip
}: }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
@ -18,7 +18,7 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ cmake unzip ]; nativeBuildInputs = [ cmake unzip ];
buildInputs = [ buildInputs = [
boost ilmbase libjpeg libpng boost ilmbase libjpeg libpng
libtiff opencolorio openexr libtiff opencolorio_1 openexr
]; ];
cmakeFlags = [ cmakeFlags = [

View File

@ -1,4 +1,4 @@
{ lib, stdenv, fetchurl, intltool, pkg-config, glib, gtk, lua, libwnck3 }: { lib, stdenv, fetchurl, intltool, pkg-config, glib, gtk, lua, libwnck }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "devilspie2"; pname = "devilspie2";
@ -10,7 +10,7 @@ stdenv.mkDerivation rec {
}; };
nativeBuildInputs = [ intltool pkg-config ]; nativeBuildInputs = [ intltool pkg-config ];
buildInputs = [ glib gtk lua libwnck3 ]; buildInputs = [ glib gtk lua libwnck ];
installPhase = '' installPhase = ''
mkdir -p $out/bin $out/share/man/man1 mkdir -p $out/bin $out/share/man/man1

View File

@ -4,7 +4,7 @@
, gobject-introspection , gobject-introspection
, gtk3 , gtk3
, keybinder3 , keybinder3
, libwnck3 , libwnck
, python3Packages , python3Packages
, wrapGAppsHook , wrapGAppsHook
}: }:
@ -31,7 +31,7 @@ python3Packages.buildPythonApplication rec {
buildInputs = [ buildInputs = [
gobject-introspection gobject-introspection
gtk3 gtk3
libwnck3 libwnck
keybinder3 keybinder3
]; ];

View File

@ -2,11 +2,11 @@
buildPythonApplication rec { buildPythonApplication rec {
pname = "gallery_dl"; pname = "gallery_dl";
version = "1.17.5"; version = "1.18.0";
src = fetchPypi { src = fetchPypi {
inherit pname version; inherit pname version;
sha256 = "9d64bca2bf0cdecaff1336e0656917eb9028586fee4ac342761d6cb9a0cdb4f9"; sha256 = "a0658cd2b629ec5b24b9a893056ce7224088ee5eb760f30642131a8df0279131";
}; };
propagatedBuildInputs = [ requests ]; propagatedBuildInputs = [ requests ];

View File

@ -1,4 +1,4 @@
{ lib, stdenv, fetchFromGitHub, autoreconfHook, pkg-config, gtk3, libwnck3, libxklavier { lib, stdenv, fetchFromGitHub, autoreconfHook, pkg-config, gtk3, libwnck, libxklavier
, appindicatorSupport ? true, libayatana-appindicator-gtk3 , appindicatorSupport ? true, libayatana-appindicator-gtk3
}: }:
@ -14,7 +14,7 @@ stdenv.mkDerivation rec {
}; };
nativeBuildInputs = [ pkg-config autoreconfHook ]; nativeBuildInputs = [ pkg-config autoreconfHook ];
buildInputs = [ gtk3 libwnck3 libxklavier ] ++ lib.optional appindicatorSupport libayatana-appindicator-gtk3; buildInputs = [ gtk3 libwnck libxklavier ] ++ lib.optional appindicatorSupport libayatana-appindicator-gtk3;
configureFlags = lib.optional appindicatorSupport "--enable-appindicator=yes"; configureFlags = lib.optional appindicatorSupport "--enable-appindicator=yes";
outputs = [ "out" "man" ]; outputs = [ "out" "man" ];

View File

@ -2,13 +2,13 @@
buildGoModule rec { buildGoModule rec {
pname = "hugo"; pname = "hugo";
version = "0.84.0"; version = "0.84.1";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "gohugoio"; owner = "gohugoio";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-BRp4iboiaoB6zFwleFSJ7oVAd3o6OiR5BB4VRQilExc="; sha256 = "sha256-ULZa0tepq00v2VHDR3+aYYvRfbxYKcjcltRgRmbVmRA=";
}; };
vendorSha256 = "sha256-jY/g92ON5OxjuZzPHJNduXYMgPU8/0ioAYvp4iqjGnU="; vendorSha256 = "sha256-jY/g92ON5OxjuZzPHJNduXYMgPU8/0ioAYvp4iqjGnU=";

View File

@ -2,13 +2,13 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "kanboard"; pname = "kanboard";
version = "1.2.19"; version = "1.2.20";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "kanboard"; owner = "kanboard";
repo = "kanboard"; repo = "kanboard";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-48U3eRg6obRjgK06SKN2g1+0wocqm2aGyXO2yZw5fs8="; sha256 = "sha256-IB+GhUZvjngjf1UHKc7B/PkZHVXKYUTk6CVA5XSiF5Y=";
}; };
dontBuild = true; dontBuild = true;

View File

@ -2,10 +2,12 @@
, fetchurl , fetchurl
, makeWrapper , makeWrapper
, dpkg , dpkg
, luajit
, gtk3-x11
, SDL2
, glib , glib
, gnutar
, gtk3-x11
, luajit
, sdcv
, SDL2
, noto-fonts , noto-fonts
, nerdfonts }: , nerdfonts }:
let font-droid = nerdfonts.override { fonts = [ "DroidSansMono" ]; }; let font-droid = nerdfonts.override { fonts = [ "DroidSansMono" ]; };
@ -21,7 +23,14 @@ in stdenv.mkDerivation rec {
sourceRoot = "."; sourceRoot = ".";
nativeBuildInputs = [ makeWrapper dpkg ]; nativeBuildInputs = [ makeWrapper dpkg ];
buildInputs = [ luajit gtk3-x11 SDL2 glib ]; buildInputs = [
glib
gnutar
gtk3-x11
luajit
sdcv
SDL2
];
unpackCmd = "dpkg-deb -x ${src} ."; unpackCmd = "dpkg-deb -x ${src} .";
dontConfigure = true; dontConfigure = true;
@ -30,7 +39,9 @@ in stdenv.mkDerivation rec {
installPhase = '' installPhase = ''
mkdir -p $out mkdir -p $out
cp -R usr/* $out/ cp -R usr/* $out/
cp ${luajit}/bin/luajit $out/lib/koreader/luajit ln -sf ${luajit}/bin/luajit $out/lib/koreader/luajit
ln -sf ${sdcv}/bin/sdcv $out/lib/koreader/sdcv
ln -sf ${gnutar}/bin/tar $out/lib/koreader/tar
find $out -xtype l -delete find $out -xtype l -delete
for i in ${noto-fonts}/share/fonts/truetype/noto/*; do for i in ${noto-fonts}/share/fonts/truetype/noto/*; do
ln -s "$i" $out/lib/koreader/fonts/noto/ ln -s "$i" $out/lib/koreader/fonts/noto/

View File

@ -5,7 +5,7 @@
, gobject-introspection , gobject-introspection
, gtk3 , gtk3
, itstool , itstool
, libwnck3 , libwnck
, keybinder3 , keybinder3
, desktop-file-utils , desktop-file-utils
, shared-mime-info , shared-mime-info
@ -34,7 +34,7 @@ buildPythonApplication rec {
desktop-file-utils # for update-desktop-database desktop-file-utils # for update-desktop-database
shared-mime-info # for update-mime-info shared-mime-info # for update-mime-info
]; ];
buildInputs = [ docutils libwnck3 keybinder3 ]; buildInputs = [ docutils libwnck keybinder3 ];
propagatedBuildInputs = [ pygobject3 gtk3 pyxdg dbus-python pycairo ]; propagatedBuildInputs = [ pygobject3 gtk3 pyxdg dbus-python pycairo ];
# without strictDeps kupfer fails to build: Could not find the python module 'gi.repository.Gtk' # without strictDeps kupfer fails to build: Could not find the python module 'gi.repository.Gtk'

View File

@ -2,11 +2,11 @@
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "logseq"; pname = "logseq";
version = "0.1.8"; version = "0.2.0";
src = fetchurl { src = fetchurl {
url = "https://github.com/logseq/logseq/releases/download/${version}/logseq-linux-x64-${version}.AppImage"; url = "https://github.com/logseq/logseq/releases/download/${version}/logseq-linux-x64-${version}.AppImage";
sha256 = "0q8lci72rzzc04wnfqry31zav07srw0iymjlq5mxygsq4h9bcq01"; sha256 = "uFINB8WXFbtI/WMFvqirAygzwK7I/8+8YPeyCd+xQ5w=";
name = "${pname}-${version}.AppImage"; name = "${pname}-${version}.AppImage";
}; };

View File

@ -5,7 +5,7 @@
, gnome , gnome
, libnotify , libnotify
, libtool , libtool
, libwnck3 , libwnck
, makeWrapper , makeWrapper
, pkg-config , pkg-config
, gsettings-desktop-schemas , gsettings-desktop-schemas
@ -26,7 +26,7 @@ in stdenv.mkDerivation rec {
nativeBuildInputs = [ pkg-config ]; nativeBuildInputs = [ pkg-config ];
buildInputs = [ buildInputs = [
glib libwnck3 libnotify dbus-glib makeWrapper glib libwnck libnotify dbus-glib makeWrapper
gsettings-desktop-schemas gnome.gnome-common gsettings-desktop-schemas gnome.gnome-common
libtool libtool
]; ];

View File

@ -1,4 +1,4 @@
{ lib, stdenv, fetchurl, pkg-config, glib, libwnck3, libnotify, dbus-glib, makeWrapper, gsettings-desktop-schemas }: { lib, stdenv, fetchurl, pkg-config, glib, libwnck, libnotify, dbus-glib, makeWrapper, gsettings-desktop-schemas }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "notify-osd"; pname = "notify-osd";
@ -11,7 +11,7 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ pkg-config ]; nativeBuildInputs = [ pkg-config ];
buildInputs = [ buildInputs = [
glib libwnck3 libnotify dbus-glib makeWrapper glib libwnck libnotify dbus-glib makeWrapper
gsettings-desktop-schemas gsettings-desktop-schemas
]; ];

View File

@ -6,13 +6,13 @@
mkDerivation rec { mkDerivation rec {
pname = "opentx"; pname = "opentx";
version = "2.3.11"; version = "2.3.13";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "opentx"; owner = "opentx";
repo = "opentx"; repo = "opentx";
rev = "release/${version}"; rev = "release/${version}";
sha256 = "sha256-0B41TkTs4sNGYzpMGbsgCLT2ThkP6foeuwLUIzKKGkU="; sha256 = "sha256-Bi/Cz2T2NdtnJZHav8qvo+gErPsR8Ym7K3KcD5APt6Y=";
}; };
nativeBuildInputs = [ cmake gcc-arm-embedded python3Packages.pillow ]; nativeBuildInputs = [ cmake gcc-arm-embedded python3Packages.pillow ];

View File

@ -7,7 +7,7 @@
, glib , glib
, gnome , gnome
, gtk3 , gtk3
, libwnck3 , libwnck
, libX11 , libX11
, libXfixes , libXfixes
, libXi , libXi
@ -59,7 +59,7 @@ stdenv.mkDerivation rec {
libXi libXi
libdbusmenu-gtk3 libdbusmenu-gtk3
libgee libgee
libwnck3 libwnck
pango pango
]; ];

View File

@ -1,18 +1,28 @@
{ lib, buildPythonApplication, fetchFromGitHub, signal-cli, urwid { lib
, urwid-readline, dbus }: , python3
, fetchFromGitHub
, dbus
, signal-cli
, xclip
}:
buildPythonApplication rec { python3.pkgs.buildPythonApplication rec {
pname = "scli"; pname = "scli";
version = "0.6.1"; version = "0.6.3";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "isamert"; owner = "isamert";
repo = pname; repo = pname;
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-hWzpqj/sxPq/doxdmytnj5rh2qKQE71WMB0ugomWhHg"; sha256 = "sha256-QGVBJKTBo2RckGwW1deM2toRPT73PYDLvr7YVepkQvg=";
}; };
propagatedBuildInputs = [ signal-cli urwid urwid-readline dbus ]; propagatedBuildInputs = with python3.pkgs; [
pyqrcode
urwid
urwid-readline
];
dontBuild = true; dontBuild = true;
checkPhase = '' checkPhase = ''
@ -29,6 +39,10 @@ buildPythonApplication rec {
install -m755 -D scli $out/bin/scli install -m755 -D scli $out/bin/scli
''; '';
makeWrapperArgs = [
"--prefix" "PATH" ":" (lib.makeBinPath [ dbus signal-cli xclip ])
];
meta = with lib; { meta = with lib; {
description = "Simple terminal user interface for Signal"; description = "Simple terminal user interface for Signal";
homepage = "https://github.com/isamert/scli"; homepage = "https://github.com/isamert/scli";

View File

@ -3,12 +3,13 @@
, meson , meson
, ninja , ninja
, pkg-config , pkg-config
, scdoc
, stdenv , stdenv
, systemd , systemd
}: }:
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "libseat"; pname = "seatd";
version = "0.5.0"; version = "0.5.0";
src = fetchFromSourcehut { src = fetchFromSourcehut {
@ -18,13 +19,13 @@ stdenv.mkDerivation rec {
sha256 = "sha256-JwlJLHkRgSRqfQEhXbzuFTmhxfbwKVdLICPbTDbC9M0="; sha256 = "sha256-JwlJLHkRgSRqfQEhXbzuFTmhxfbwKVdLICPbTDbC9M0=";
}; };
nativeBuildInputs = [ meson ninja pkg-config ]; outputs = [ "bin" "out" "dev" "man" ];
buildInputs = [ nativeBuildInputs = [ meson ninja pkg-config scdoc ];
systemd
];
mesonFlags = [ "-Dserver=disabled" "-Dseatd=disabled" "-Dlogind=enabled"]; buildInputs = [ systemd ];
mesonFlags = [ "-Dlogind=enabled" "-Dbuiltin=enabled" ];
meta = with lib; { meta = with lib; {
description = "A universal seat management library"; description = "A universal seat management library";

View File

@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec { rustPlatform.buildRustPackage rec {
pname = "xplr"; pname = "xplr";
version = "0.14.2"; version = "0.14.3";
src = fetchCrate { src = fetchCrate {
inherit pname version; inherit pname version;
sha256 = "1bgylz2x44rjxpd6dvd44pr57f18di0nj5sbqh4my8lkanr7isli"; sha256 = "012wyl6qvwca5r8kqf8j7r50r1lbv802c90m13xb7rqyb6jjfv0m";
}; };
buildInputs = lib.optional stdenv.isDarwin libiconv; buildInputs = lib.optional stdenv.isDarwin libiconv;
cargoSha256 = "07rlmz4rkgdcvr0dvbrz56s5vacxcvy09rgz70kr692xlpym4jvq"; cargoSha256 = "1mgi7hxsn9wajxr78kr3n4g7fa0rwp4riah8dq06cqwjlh0pkfjd";
meta = with lib; { meta = with lib; {
description = "A hackable, minimal, fast TUI file explorer"; description = "A hackable, minimal, fast TUI file explorer";

View File

@ -1,5 +1,5 @@
{ lib, stdenv, fetchFromGitHub, cmake, makeWrapper, pkg-config { lib, stdenv, fetchFromGitHub, cmake, makeWrapper, pkg-config
, glib, libwnck3, procps }: , glib, libwnck, procps }:
with lib; with lib;
@ -17,7 +17,7 @@ stdenv.mkDerivation rec {
outputs = [ "out" "man" "doc" ]; outputs = [ "out" "man" "doc" ];
nativeBuildInputs = [ cmake pkg-config makeWrapper ]; nativeBuildInputs = [ cmake pkg-config makeWrapper ];
buildInputs = [ glib libwnck3 ]; buildInputs = [ glib libwnck ];
postInstall = '' postInstall = ''
wrapProgram $out/bin/xsuspender \ wrapProgram $out/bin/xsuspender \

View File

@ -90,11 +90,11 @@ in
stdenv.mkDerivation rec { stdenv.mkDerivation rec {
pname = "brave"; pname = "brave";
version = "1.25.73"; version = "1.26.67";
src = fetchurl { src = fetchurl {
url = "https://github.com/brave/brave-browser/releases/download/v${version}/brave-browser_${version}_amd64.deb"; url = "https://github.com/brave/brave-browser/releases/download/v${version}/brave-browser_${version}_amd64.deb";
sha256 = "mSK3hT0Rp03Bq0k+NCYo6S5w+eA9SXXxO3Lo7QWrc9U="; sha256 = "Kg6ExXZYdSkyBoivu9h4blytHN9hOc4bUSuFR+1YZOY=";
}; };
dontConfigure = true; dontConfigure = true;

View File

@ -175,12 +175,6 @@ let
sha256 = "1bxdhxmiy6h4acq26lq43x2mxx6rawmfmlgsh5j7w8kyhkw5af0c"; sha256 = "1bxdhxmiy6h4acq26lq43x2mxx6rawmfmlgsh5j7w8kyhkw5af0c";
revert = true; revert = true;
}) })
# To fix building from a release tarball (which we do):
(githubPatch {
# Revert back to generating chromium_git_revision.h via version.py
commit = "bd524d08f8465364d12d32a84fd1aa983aecc502";
sha256 = "1jsxidg5jzwkrcpx3lylx4gyg56zjyd7sc957kaaqqc853bn83b4";
})
]; ];
postPatch = '' postPatch = ''

View File

@ -18,9 +18,9 @@
} }
}, },
"beta": { "beta": {
"version": "92.0.4515.59", "version": "92.0.4515.70",
"sha256": "0lpmd4sybr9qxqj7ab25xjliaw2dk9njnik51gdffrrwphv9qdxb", "sha256": "06yhpxr5bg0gx7hmrhc6zg4gr1d9s34y2rb98rpl4dilmc548i6q",
"sha256bin64": "0qq9a3pzyn5d6bagx3py86ksl8n488lmlrmadgam2gb7421jq71a", "sha256bin64": "1fkakh1r87pg5nr101m6v86y8iyyfba8vnzrg0229kcar7v8wzf7",
"deps": { "deps": {
"gn": { "gn": {
"version": "2021-05-07", "version": "2021-05-07",
@ -31,15 +31,15 @@
} }
}, },
"dev": { "dev": {
"version": "93.0.4542.2", "version": "93.0.4549.3",
"sha256": "0sfyi52kaxg5mllcvn61285fjnj72vglv9fjf36ri93v6gh34rgw", "sha256": "0bkr67n1d75ayd1d9sa57c99j85r83gadzfs8iw7kwiha9g0mjgp",
"sha256bin64": "0hk31b9nk834gykv977dv7f1hyl7jp527bx5ldxhwcy27333h1hr", "sha256bin64": "1hac6m668nrdzvfqx3vyc74pnx8lf973m1jxnm3cfy83g7wynphz",
"deps": { "deps": {
"gn": { "gn": {
"version": "2021-06-11", "version": "2021-06-18",
"url": "https://gn.googlesource.com/gn", "url": "https://gn.googlesource.com/gn",
"rev": "e0c476ffc83dc10897cb90b45c03ae2539352c5c", "rev": "170c2dba1e0c0299fe8c6a441caf2f2352a42ae0",
"sha256": "01p5w57kksihzg9nb5096a74cw2rp8zzgdjcjm1pgrqvd1mxpjm4" "sha256": "1ylx8a5fxq7aciqs0mx7fld763sqkqn39lb9k951w6gksm15lrn3"
} }
} }
}, },

View File

@ -2,18 +2,18 @@
buildGoModule rec { buildGoModule rec {
pname = "argocd"; pname = "argocd";
version = "2.0.1"; version = "2.0.4";
commit = "33eaf11e3abd8c761c726e815cbb4b6af7dcb030"; commit = "0842d448107eb1397b251e63ec4d4bc1b4efdd6e";
tag = "v${version}"; tag = "v${version}";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "argoproj"; owner = "argoproj";
repo = "argo-cd"; repo = "argo-cd";
rev = tag; rev = tag;
sha256 = "sha256-j/RdiMeaYxlmEvo5CKrGvkp25MrFsSYh+XNYWNcs0PE="; sha256 = "sha256-SKSAJtp20f6A+CvrsBEmbcNJAKI5b4Wm4K0cr/lGo64=";
}; };
vendorSha256 = "sha256-8j5v99wOHM/SndJwpmGWiCFEyw4K513HEEbkPrD8C90="; vendorSha256 = "sha256-RbEqivzTpXVQp4zl0zZWAh6qCr2KZSJ6Bj2pZaClQaQ=";
nativeBuildInputs = [ packr makeWrapper installShellFiles ]; nativeBuildInputs = [ packr makeWrapper installShellFiles ];
@ -66,8 +66,9 @@ buildGoModule rec {
''; '';
meta = with lib; { meta = with lib; {
description = "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes"; description = "Declarative continuous deployment for Kubernetes";
homepage = "https://github.com/argoproj/argo"; downloadPage = "https://github.com/argoproj/argo-cd";
homepage = "https://argoproj.github.io/projects/argo-cd";
license = licenses.asl20; license = licenses.asl20;
maintainers = with maintainers; [ shahrukh330 superherointj ]; maintainers = with maintainers; [ shahrukh330 superherointj ];
}; };

View File

@ -1,11 +1,11 @@
{ lib, buildGoModule, fetchFromGitHub, fetchzip, installShellFiles }: { lib, buildGoModule, fetchFromGitHub, fetchzip, installShellFiles }:
let let
version = "0.13.4"; version = "0.15.3";
manifests = fetchzip { manifests = fetchzip {
url = "https://github.com/fluxcd/flux2/releases/download/v${version}/manifests.tar.gz"; url = "https://github.com/fluxcd/flux2/releases/download/v${version}/manifests.tar.gz";
sha256 = "sha256-+2JvJFzH1CjU/WQ7MLtqd5Adfi/ktX9lPq4IyxPcUD8="; sha256 = "sha256-/uD0hxtTJSr+2tZcwzOIQcEbikHOshWukEBSaK3FiP4=";
stripRoot = false; stripRoot = false;
}; };
in in
@ -19,10 +19,10 @@ buildGoModule rec {
owner = "fluxcd"; owner = "fluxcd";
repo = "flux2"; repo = "flux2";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-edyqxVl8oIwKp/eqFIbu+qn9zhYEnKJKwUbYZ7uxx0I="; sha256 = "sha256-Pyt5BaOawBwyBz7ULzOZr0Fc6bqM5dKn775AylUjDVE=";
}; };
vendorSha256 = "sha256-keIzuqaLppu6+XK3MFiU0en+SVxWVLpfkKEKOAVOz7k="; vendorSha256 = "sha256-17Kbun6Mrip4/XHN5eMHxgnSoX1KuGHwtb8yLTf/Mks=";
nativeBuildInputs = [ installShellFiles ]; nativeBuildInputs = [ installShellFiles ];

View File

@ -2,16 +2,16 @@
buildGoModule rec { buildGoModule rec {
pname = "helmfile"; pname = "helmfile";
version = "0.139.8"; version = "0.139.9";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "roboll"; owner = "roboll";
repo = "helmfile"; repo = "helmfile";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-4QNtjVc2/diJO92xn4J2ZJO7JYDHmPgOE4kGndU5RW0="; sha256 = "sha256-MHvfDeN4r9jwnXANHTpMEQUIoAZ+uXAmDtl8wdcpjHI=";
}; };
vendorSha256 = "sha256-GY2+oecRbI5hEVI5lCsTuU3WYIfUGceINyXGPjorisE="; vendorSha256 = "sha256-QYI5HxEUNrZKSjk0LlbhjvxXlWCbbLup51Ht3HJDNC8=";
doCheck = false; doCheck = false;

View File

@ -2,13 +2,13 @@
buildGoModule rec { buildGoModule rec {
pname = "k9s"; pname = "k9s";
version = "0.24.9"; version = "0.24.10";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "derailed"; owner = "derailed";
repo = "k9s"; repo = "k9s";
rev = "v${version}"; rev = "v${version}";
sha256 = "sha256-9/P6OaSZDJ98EQ9DM4Oib0T1sC1K3WxUXh4IQU3qXbs="; sha256 = "sha256-ImWIR112q59hyKHXBmb9W6eVvu4xr+U4+uh2ZGcXv1g=";
}; };
buildFlagsArray = '' buildFlagsArray = ''
@ -18,7 +18,7 @@ buildGoModule rec {
-X github.com/derailed/k9s/cmd.commit=${src.rev} -X github.com/derailed/k9s/cmd.commit=${src.rev}
''; '';
vendorSha256 = "sha256-hqmymxP4zK8GVqOxzB6vRfFyo+VIeI1suBu64/oEVig="; vendorSha256 = "sha256-EEN3nKQBtAGG7MAa9h11KFPZ9g7xtNxhFB1i/2QS66g=";
doCheck = false; doCheck = false;

View File

@ -391,10 +391,10 @@
"owner": "grafana", "owner": "grafana",
"provider-source-address": "registry.terraform.io/grafana/grafana", "provider-source-address": "registry.terraform.io/grafana/grafana",
"repo": "terraform-provider-grafana", "repo": "terraform-provider-grafana",
"rev": "v1.10.0", "rev": "v1.12.0",
"sha256": "0q3j30q1zxpdm0fmda3ivnl754q2p61xn9l30l0a3n0r5b25w8pk", "sha256": "0jqm8ql8kams2rh90fwdmv9nnf4npzpxaagm9725nsf0iqn3qlhn",
"vendorSha256": null, "vendorSha256": "0pxd3sgpkry7gik6rgfl3cpgawhvgpb0sn1rkhdp9p11iwx7xxbi",
"version": "1.10.0" "version": "1.12.0"
}, },
"gridscale": { "gridscale": {
"owner": "terraform-providers", "owner": "terraform-providers",

View File

@ -194,9 +194,9 @@ rec {
}; };
terraform_1_0 = mkTerraform { terraform_1_0 = mkTerraform {
version = "1.0.0"; version = "1.0.1";
sha256 = "sha256-ddcT/I2Qn1pKFyhXgh+CcD3fSv2steSNmjyyiS2SE/o="; sha256 = "0sy33wf2wjhybr5smmyla7ci61w8irk0nrv3vv7h87yli1dd9yj0";
vendorSha256 = "sha256-oFvoEsDunJR4IULdGwS6nHBKWEgUehgT+nNM41W/GYo="; vendorSha256 = "0ai7h85f0xdlh7q04l4hb9m5wajyqbylhvpjanlhkzvc60silhmx";
patches = [ ./provider-path-0_15.patch ]; patches = [ ./provider-path-0_15.patch ];
passthru = { inherit plugins; }; passthru = { inherit plugins; };
}; };

View File

@ -3,16 +3,16 @@
rustPlatform.buildRustPackage rec { rustPlatform.buildRustPackage rec {
pname = "newsboat"; pname = "newsboat";
version = "2.23"; version = "2.24";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "newsboat"; owner = "newsboat";
repo = "newsboat"; repo = "newsboat";
rev = "r${version}"; rev = "r${version}";
sha256 = "0a0g9km515kipqmz6c09aj3lgy3nkzqwgnp87fh8f2vr098fn144"; sha256 = "0qb10w7pn9hiczjjpc0xanmc83p22ngcqcrkjwji5rl0sh8v9ii4";
}; };
cargoSha256 = "03g14npkisz159gibhfxj7l36vzm7cvg355hndzpxzvhf5r5yjqg"; cargoSha256 = "0vhr8qyw4f3lc208mgl1m3z42igkbwly6wcv7g7jrq3c6dcwyhjn";
# TODO: Check if that's still needed # TODO: Check if that's still needed
postPatch = lib.optionalString stdenv.isDarwin '' postPatch = lib.optionalString stdenv.isDarwin ''

View File

@ -1,20 +1,20 @@
{ lib, buildGoModule, fetchFromGitHub, nixosTests }: { lib, buildGoModule, fetchFromGitHub, nixosTests, olm }:
buildGoModule { buildGoModule {
pname = "go-neb"; pname = "go-neb";
version = "unstable-2020-04-09"; version = "unstable-2021-03-24";
src = fetchFromGitHub { src = fetchFromGitHub {
owner = "matrix-org"; owner = "matrix-org";
repo = "go-neb"; repo = "go-neb";
rev = "1e297c50ad2938e511a3c86f4b190fd3fc3559d6"; rev = "b6edd50d6e33de3bcdb35055fa6c5f0157f45321";
sha256 = "1azwy4s4kmypps1fjbz76flpi1b7sjzjj4qwx94cry0hn3qfnrc6"; sha256 = "sha256-wFqkN4C0rWzWxa6+/LiHMMS8i/g3Q57f5z4cG2XZQzs=";
}; };
subPackages = [ "." ]; subPackages = [ "." ];
patches = [ ./go-mod.patch ]; buildInputs = [ olm ];
vendorSha256 = "1k3980yf6zl00dkd1djwhm2f9nnffzrsbs3kq3alpw2gm0aln739"; vendorSha256 = "sha256-sWrLWjODf25Z8QqCDg4KyVWmTc3PRiYpRL88yxK0j/M";
doCheck = false; doCheck = false;

View File

@ -1,50 +0,0 @@
diff --git a/go.mod b/go.mod
index 8ed4e68..83526e7 100644
--- a/go.mod
+++ b/go.mod
@@ -4,24 +4,15 @@ go 1.14
require (
github.com/PuerkitoBio/goquery v1.5.1 // indirect
- github.com/alecthomas/template v0.0.0-20190718012654-fb15b899a751 // indirect
- github.com/alecthomas/units v0.0.0-20190717042225-c3de453c63f4 // indirect
github.com/andygrunwald/go-jira v1.11.0
github.com/beorn7/perks v1.0.1 // indirect
- github.com/cespare/xxhash/v2 v2.1.1 // indirect
github.com/dghubble/oauth1 v0.6.0
github.com/die-net/lrucache v0.0.0-20190707192454-883874fe3947
- github.com/go-kit/kit v0.9.0 // indirect
- github.com/go-logfmt/logfmt v0.4.0 // indirect
- github.com/go-stack/stack v1.8.0 // indirect
- github.com/gogo/protobuf v1.1.1 // indirect
github.com/golang/protobuf v1.3.2 // indirect
github.com/google/go-cmp v0.4.0 // indirect
github.com/google/go-github v2.0.1-0.20160719063544-b5e5babef39c+incompatible
github.com/gregjones/httpcache v0.0.0-20190611155906-901d90724c79
github.com/jaytaylor/html2text v0.0.0-20200220170450-61d9dc4d7195
- github.com/json-iterator/go v1.1.9 // indirect
- github.com/julienschmidt/httprouter v1.2.0 // indirect
github.com/kr/pretty v0.1.0 // indirect
github.com/lib/pq v1.3.0
github.com/matrix-org/dugong v0.0.0-20180820122854-51a565b5666b
@@ -32,9 +23,6 @@ require (
github.com/matttproud/golang_protobuf_extensions v1.0.1 // indirect
github.com/mmcdole/gofeed v1.0.0-beta2
github.com/mmcdole/goxpp v0.0.0-20181012175147-0068e33feabf // indirect
- github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd // indirect
- github.com/modern-go/reflect2 v1.0.1 // indirect
- github.com/mwitkow/go-conntrack v0.0.0-20161129095857-cc309e4a2223 // indirect
github.com/olekukonko/tablewriter v0.0.4 // indirect
github.com/pkg/errors v0.8.1 // indirect
github.com/prometheus/client_golang v0.8.1-0.20160916180340-5636dc67ae77
@@ -47,10 +35,7 @@ require (
github.com/stretchr/testify v1.4.0 // indirect
golang.org/x/net v0.0.0-20200301022130-244492dfa37a
golang.org/x/oauth2 v0.0.0-20200107190931-bf48bf16ab8d
- golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e // indirect
golang.org/x/sys v0.0.0-20200122134326-e047566fdf82 // indirect
- golang.org/x/tools v0.0.0-20200311090712-aafaee8bce8c // indirect
- gopkg.in/alecthomas/kingpin.v2 v2.2.6 // indirect
gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15 // indirect
gopkg.in/yaml.v2 v2.2.8
)

View File

@ -28,7 +28,7 @@ let
else ""); else "");
in stdenv.mkDerivation rec { in stdenv.mkDerivation rec {
pname = "signal-desktop"; pname = "signal-desktop";
version = "5.5.0"; # Please backport all updates to the stable channel. version = "5.6.2"; # Please backport all updates to the stable channel.
# All releases have a limited lifetime and "expire" 90 days after the release. # All releases have a limited lifetime and "expire" 90 days after the release.
# When releases "expire" the application becomes unusable until an update is # When releases "expire" the application becomes unusable until an update is
# applied. The expiration date for the current release can be extracted with: # applied. The expiration date for the current release can be extracted with:
@ -38,7 +38,7 @@ in stdenv.mkDerivation rec {
src = fetchurl { src = fetchurl {
url = "https://updates.signal.org/desktop/apt/pool/main/s/signal-desktop/signal-desktop_${version}_amd64.deb"; url = "https://updates.signal.org/desktop/apt/pool/main/s/signal-desktop/signal-desktop_${version}_amd64.deb";
sha256 = "0l12hwwv0ks2hgp1xc5nmn5rcqzwxdpjqhwysix550m26bz4jczp"; sha256 = "0cdzww741l4s95n5gq5zx5l3zvxinxbqa9y6wf8wjq7rzn6bwqx3";
}; };
nativeBuildInputs = [ nativeBuildInputs = [

View File

@ -1,4 +1,5 @@
{ lib, stdenv { lib
, stdenv
, fetchurl , fetchurl
, dpkg , dpkg
, undmg , undmg
@ -19,6 +20,7 @@
, glib , glib
, gnome2 , gnome2
, gtk3 , gtk3
, libGL
, libappindicator-gtk3 , libappindicator-gtk3
, libdrm , libdrm
, libnotify , libnotify
@ -53,18 +55,20 @@ let
x86_64-linux = x86_64-linux-version; x86_64-linux = x86_64-linux-version;
}.${system} or throwSystem; }.${system} or throwSystem;
src = let src =
base = "https://downloads.slack-edge.com"; let
in { base = "https://downloads.slack-edge.com";
x86_64-darwin = fetchurl { in
url = "${base}/releases/macos/${version}/prod/x64/Slack-${version}-macOS.dmg"; {
sha256 = x86_64-darwin-sha256; x86_64-darwin = fetchurl {
}; url = "${base}/releases/macos/${version}/prod/x64/Slack-${version}-macOS.dmg";
x86_64-linux = fetchurl { sha256 = x86_64-darwin-sha256;
url = "${base}/linux_releases/slack-desktop-${version}-amd64.deb"; };
sha256 = x86_64-linux-sha256; x86_64-linux = fetchurl {
}; url = "${base}/linux_releases/slack-desktop-${version}-amd64.deb";
}.${system} or throwSystem; sha256 = x86_64-linux-sha256;
};
}.${system} or throwSystem;
meta = with lib; { meta = with lib; {
description = "Desktop client for Slack"; description = "Desktop client for Slack";
@ -95,6 +99,7 @@ let
glib glib
gnome2.GConf gnome2.GConf
gtk3 gtk3
libGL
libappindicator-gtk3 libappindicator-gtk3
libdrm libdrm
libnotify libnotify
@ -118,13 +123,13 @@ let
xorg.libXi xorg.libXi
xorg.libXrandr xorg.libXrandr
xorg.libXrender xorg.libXrender
xorg.libxshmfence
xorg.libXtst xorg.libXtst
xorg.libxkbfile xorg.libxkbfile
xorg.libxshmfence
] + ":${stdenv.cc.cc.lib}/lib64"; ] + ":${stdenv.cc.cc.lib}/lib64";
buildInputs = [ buildInputs = [
gtk3 # needed for GSETTINGS_SCHEMAS_PATH gtk3 # needed for GSETTINGS_SCHEMAS_PATH
]; ];
nativeBuildInputs = [ dpkg makeWrapper nodePackages.asar ]; nativeBuildInputs = [ dpkg makeWrapper nodePackages.asar ];
@ -153,7 +158,7 @@ let
rm $out/bin/slack rm $out/bin/slack
makeWrapper $out/lib/slack/slack $out/bin/slack \ makeWrapper $out/lib/slack/slack $out/bin/slack \
--prefix XDG_DATA_DIRS : $GSETTINGS_SCHEMAS_PATH \ --prefix XDG_DATA_DIRS : $GSETTINGS_SCHEMAS_PATH \
--prefix PATH : ${xdg-utils}/bin --prefix PATH : ${lib.makeBinPath [xdg-utils]}
# Fix the desktop link # Fix the desktop link
substituteInPlace $out/share/applications/slack.desktop \ substituteInPlace $out/share/applications/slack.desktop \
@ -177,6 +182,7 @@ let
/usr/bin/defaults write com.tinyspeck.slackmacgap SlackNoAutoUpdates -bool YES /usr/bin/defaults write com.tinyspeck.slackmacgap SlackNoAutoUpdates -bool YES
''; '';
}; };
in if stdenv.isDarwin in
then darwin if stdenv.isDarwin
else linux then darwin
else linux

Some files were not shown because too many files have changed in this diff Show More