diff options
Diffstat (limited to 'nixpkgs/pkgs/by-name')
30 files changed, 1004 insertions, 47 deletions
diff --git a/nixpkgs/pkgs/by-name/ab/aba/package.nix b/nixpkgs/pkgs/by-name/ab/aba/package.nix new file mode 100644 index 000000000000..4e62d4da8d0c --- /dev/null +++ b/nixpkgs/pkgs/by-name/ab/aba/package.nix @@ -0,0 +1,53 @@ +{ fetchFromSourcehut +, just +, lib +, nix-update-script +, rustPlatform +, scdoc +}: +let + version = "0.7.0"; +in +rustPlatform.buildRustPackage { + pname = "aba"; + inherit version; + + src = fetchFromSourcehut { + owner = "~onemoresuza"; + repo = "aba"; + rev = version; + hash = "sha256-YPE5HYa90BcNy5jdYbzkT81KavJcbSeGrsWRILnIiEE="; + domain = "sr.ht"; + }; + + cargoSha256 = "sha256-wzI+UMcVeFQNFlWDkyxk8tjpU7beNRKoPYbid8b15/Q="; + + nativeBuildInputs = [ + just + scdoc + ]; + + # There are no tests + doCheck = false; + + dontUseJustBuild = true; + dontUseJustCheck = true; + dontUseJustInstall = true; + + postInstall = '' + just --set PREFIX $out install-doc + ''; + + passthru.updateScript = nix-update-script { }; + + meta = { + description = "An address book for aerc"; + homepage = "https://sr.ht/~onemoresuza/aba/"; + changelog = "https://git.sr.ht/~onemoresuza/aba/tree/main/item/CHANGELOG.md"; + downloadPage = "https://git.sr.ht/~onemoresuza/aba/refs/${version}"; + maintainers = with lib.maintainers; [ onemoresuza ]; + license = lib.licenses.isc; + platforms = lib.platforms.unix; + mainProgram = "aba"; + }; +} diff --git a/nixpkgs/pkgs/by-name/c2/c2fmzq/package.nix b/nixpkgs/pkgs/by-name/c2/c2fmzq/package.nix new file mode 100644 index 000000000000..ae21cc0e5007 --- /dev/null +++ b/nixpkgs/pkgs/by-name/c2/c2fmzq/package.nix @@ -0,0 +1,36 @@ +{ lib +, buildGoModule +, fetchFromGitHub +, nixosTests +}: + +buildGoModule rec { + pname = "c2FmZQ"; + version = "0.4.9"; + + src = fetchFromGitHub { + owner = "c2FmZQ"; + repo = "c2FmZQ"; + rev = "v${version}"; + hash = "sha256-xrQBL/Xjzsg0jZ7cFuDfjCQhmt/dTD8FoCSlw0sX5MQ="; + }; + + ldflags = [ "-s" "-w" ]; + + sourceRoot = "source/c2FmZQ"; + + vendorHash = "sha256-Hz6P+ptn1i+8Ek3pp8j+iB8NN5Xks50jyZuT8Ullxbo="; + + subPackages = [ "c2FmZQ-client" "c2FmZQ-server" ]; + + passthru.tests = { inherit (nixosTests) c2fmzq; }; + + meta = with lib; { + description = "Securely encrypt, store, and share files, including but not limited to pictures and videos"; + homepage = "https://github.com/c2FmZQ/c2FmZQ"; + license = licenses.gpl3Only; + mainProgram = "c2FmZQ-server"; + maintainers = with maintainers; [ hmenke ]; + platforms = platforms.linux; + }; +} diff --git a/nixpkgs/pkgs/by-name/ca/cardboard/package.nix b/nixpkgs/pkgs/by-name/ca/cardboard/package.nix new file mode 100644 index 000000000000..4bed07f0bc57 --- /dev/null +++ b/nixpkgs/pkgs/by-name/ca/cardboard/package.nix @@ -0,0 +1,137 @@ +{ lib +, stdenv +, fetchFromGitLab +, fetchurl +, fetchgit +, ffmpeg +, libGL +, libX11 +, libcap +, libdrm +, libinput +, libpng +, libxcb +, libxkbcommon +, mesa +, meson +, ninja +, pandoc +, pixman +, pkg-config +, unzip +, wayland +, wayland-protocols +, xcbutilerrors +, xcbutilimage +, xcbutilwm +}: + +let + allSources = { + # cereal.wrap + cereal-wrap = fetchurl { + name = "cereal-1.3.0.tar.gz"; + url = "https://github.com/USCiLab/cereal/archive/v1.3.0.tar.gz"; + hash = "sha256-Mp6j4xMLAmwDpKzFDhaOfa/05uZhvGp9/sDXe1cIUdU="; + }; + cereal-wrapdb = fetchurl { + name = "cereal-1.3.0-1-wrap.zip"; + url = "https://wrapdb.mesonbuild.com/v1/projects/cereal/1.3.0/1/get_zip"; + hash = "sha256-QYck5UT7fPLqtLDb1iOSX4Hnnns48Jj23Ae/LCfLSKY="; + }; + + # expected.wrap + expected-wrap = fetchgit { + name = "expected"; + url = "https://gitlab.com/cardboardwm/expected"; + rev = "0ee13cb2b058809aa9708c45ca18d494e72a759e"; + sha256 = "sha256-gYr4/pjuLlr3k6Jcrg2/SzJLtbgyA+ZN2oMHkHXANDo="; + }; + + # wlroots.wrap + wlroots-wrap = fetchgit { + name = "wlroots"; + url = "https://github.com/swaywm/wlroots"; + rev = "0.12.0"; + sha256 = "sha256-1rE3D+kQprjcjobc95/mQkUa5y1noY0MdoYJ/SpFQwY="; + }; + + # the source itself + cardboard = fetchFromGitLab { + owner = "cardboardwm"; + repo = "cardboard"; + rev = "b54758d85164fb19468f5ca52588ebea576cd027"; + hash = "sha256-Kn5NyQSDyX7/nn2bKZPnsuepkoppi5XIkdu7IDy5r4w="; + }; + }; +in +stdenv.mkDerivation { + pname = "cardboard"; + version = "unstable-2021-05-10"; + + src = allSources.cardboard; + + outputs = [ "out" "dev" "lib" "man" ]; + + nativeBuildInputs = [ + meson + ninja + pandoc + pkg-config + unzip + ]; + + buildInputs = [ + ffmpeg + libGL + libX11 + libcap + libdrm + libinput + libpng + libxcb + libxkbcommon + mesa + pixman + wayland + wayland-protocols + xcbutilerrors + xcbutilimage + xcbutilwm + ]; + + postPatch = '' + pushd subprojects + tar xvf ${allSources.cereal-wrap} + unzip ${allSources.cereal-wrapdb} + cp -r ${allSources.expected-wrap} ${allSources.expected-wrap.name} + cp -r ${allSources.wlroots-wrap} ${allSources.wlroots-wrap.name} + popd + + # gcc12 + sed '1i#include <functional>' -i cardboard/ViewAnimation.h + ''; + + # "Inherited" from Nixpkgs expression for wlroots + mesonFlags = [ + (lib.mesonBool "man" true) + (lib.mesonOption "wlroots:logind-provider" "systemd") + (lib.mesonEnable "wlroots:libseat" false) + ]; + + # gcc12 + env.NIX_CFLAGS_COMPILE = toString [ "-Wno-error=array-bounds" ]; + + passthru = { + providedSessions = [ "cardboard" ]; + }; + + meta = { + homepage = "https://gitlab.com/cardboardwm/cardboard"; + description = "A scrollable, tiling Wayland compositor inspired on PaperWM"; + license = lib.licenses.gpl3Only; + mainProgram = "cardboard"; + maintainers = with lib.maintainers; [ AndersonTorres ]; + inherit (wayland.meta) platforms; + }; +} diff --git a/nixpkgs/pkgs/by-name/ce/certspotter/package.nix b/nixpkgs/pkgs/by-name/ce/certspotter/package.nix new file mode 100644 index 000000000000..53909d61786f --- /dev/null +++ b/nixpkgs/pkgs/by-name/ce/certspotter/package.nix @@ -0,0 +1,39 @@ +{ lib +, fetchFromGitHub +, buildGoModule +, lowdown +}: + +buildGoModule rec { + pname = "certspotter"; + version = "0.17.0"; + + src = fetchFromGitHub { + owner = "SSLMate"; + repo = "certspotter"; + rev = "v${version}"; + hash = "sha256-6ghS+9b8FZiYdiTk54XRHP46lOq98sN1RDYvRYTt6eU="; + }; + + vendorHash = "sha256-6dV9FoPV8UfS0z5RuuopE99fHcT3RAWCdDi7jpHzVRE="; + + ldflags = [ "-s" "-w" ]; + + nativeBuildInputs = [ lowdown ]; + + postInstall = '' + cd man + make + mkdir -p $out/share/man/man8 + mv *.8 $out/share/man/man8 + ''; + + meta = with lib; { + description = "Certificate Transparency Log Monitor"; + homepage = "https://github.com/SSLMate/certspotter"; + changelog = "https://github.com/SSLMate/certspotter/blob/${src.rev}/CHANGELOG.md"; + license = licenses.mpl20; + mainProgram = "certspotter"; + maintainers = with maintainers; [ chayleaf ]; + }; +} diff --git a/nixpkgs/pkgs/by-name/gu/guile-disarchive/package.nix b/nixpkgs/pkgs/by-name/di/disarchive/package.nix index a81157db614e..9bc24e531552 100644 --- a/nixpkgs/pkgs/by-name/gu/guile-disarchive/package.nix +++ b/nixpkgs/pkgs/by-name/di/disarchive/package.nix @@ -6,12 +6,13 @@ , guile-gcrypt , guile-lzma , guile-quickcheck +, makeWrapper , pkg-config , zlib }: stdenv.mkDerivation rec { - pname = "guile-disarchive"; + pname = "disarchive"; version = "0.5.0"; src = fetchurl { @@ -24,6 +25,9 @@ stdenv.mkDerivation rec { nativeBuildInputs = [ autoreconfHook guile + guile-gcrypt + guile-lzma + makeWrapper pkg-config ]; @@ -37,14 +41,23 @@ stdenv.mkDerivation rec { guile-lzma ]; - nativeCheckInputs = [ guile-quickcheck ]; - doCheck = !stdenv.isDarwin; + nativeCheckInputs = [ + guile-quickcheck + ]; + + postInstall = '' + wrapProgram $out/bin/disarchive \ + --prefix GUILE_LOAD_PATH : "$out/${guile.siteDir}:$GUILE_LOAD_PATH" \ + --prefix GUILE_LOAD_COMPILED_PATH : "$out/${guile.siteCcacheDir}:$GUILE_LOAD_COMPILED_PATH" + ''; + meta = with lib; { description = "Disassemble software into data and metadata"; homepage = "https://ngyro.com/software/disarchive.html"; license = licenses.gpl3Plus; + mainProgram = "disarchive"; maintainers = with maintainers; [ foo-dogsquared ]; platforms = guile.meta.platforms; }; diff --git a/nixpkgs/pkgs/by-name/ek/eksctl/package.nix b/nixpkgs/pkgs/by-name/ek/eksctl/package.nix index 91f98463a85c..a670490ef0ad 100644 --- a/nixpkgs/pkgs/by-name/ek/eksctl/package.nix +++ b/nixpkgs/pkgs/by-name/ek/eksctl/package.nix @@ -6,16 +6,16 @@ buildGoModule rec { pname = "eksctl"; - version = "0.161.0"; + version = "0.163.0"; src = fetchFromGitHub { owner = "weaveworks"; repo = pname; rev = version; - hash = "sha256-hlHwzZ0U3G6IGJjeHZPlO2+thJ1UKxHhRb28EQ39pZk="; + hash = "sha256-rpyLjoHMSgEHTILeEQpUKD7BOJHn/uT3GK6Fquirzdk="; }; - vendorHash = "sha256-9rT2zkgwxDQlxTWF1zHpYOOI7uK5Q/GYFWIrKgP2GaQ="; + vendorHash = "sha256-NOhssVWEkvoXpmnsCVVT7Li0ePGWDSGIlB2MyFtMnpI="; doCheck = false; diff --git a/nixpkgs/pkgs/by-name/ez/eza/package.nix b/nixpkgs/pkgs/by-name/ez/eza/package.nix index 804446d6fe7a..5b7817330cb7 100644 --- a/nixpkgs/pkgs/by-name/ez/eza/package.nix +++ b/nixpkgs/pkgs/by-name/ez/eza/package.nix @@ -17,16 +17,16 @@ rustPlatform.buildRustPackage rec { pname = "eza"; - version = "0.15.0"; + version = "0.15.1"; src = fetchFromGitHub { owner = "eza-community"; repo = "eza"; rev = "v${version}"; - hash = "sha256-52vBN/EdO0R2Lt/Iv33Odl437I8kgUhxXwtUuiaAcAU="; + hash = "sha256-GovkmMjxHWP9nl0z1LwQrIgT6TkMaYY1wEwAABAYNK0="; }; - cargoHash = "sha256-j6FsI6FpBXtaNcVDY84UBcqifXuJxBRW5Gdln8pq7Iw="; + cargoHash = "sha256-7mhGAXfrHfOKdcnCPtYNbNGRVCfVHni80zEAUATPRLk="; nativeBuildInputs = [ cmake pkg-config installShellFiles pandoc ]; buildInputs = [ zlib ] diff --git a/nixpkgs/pkgs/by-name/fo/fortune-kind/package.nix b/nixpkgs/pkgs/by-name/fo/fortune-kind/package.nix index c3e76a5f0c61..a5aee58a2861 100644 --- a/nixpkgs/pkgs/by-name/fo/fortune-kind/package.nix +++ b/nixpkgs/pkgs/by-name/fo/fortune-kind/package.nix @@ -11,16 +11,16 @@ rustPlatform.buildRustPackage rec { pname = "fortune-kind"; - version = "0.1.5"; + version = "0.1.6"; src = fetchFromGitHub { owner = "cafkafk"; repo = "fortune-kind"; rev = "v${version}"; - hash = "sha256-bpQ1cPsgKgOU3stnUwGrMnY9RZGZnuoR6B05LyARtVY="; + hash = "sha256-GWsDauFPyiZA6gY7yuEkAeIZrmrvZyJQnP6+ZkdaQSw="; }; - cargoHash = "sha256-2hL4vbbfvzJk73cvMU+eau+UHDFtokt4v8GBXyNkjbw="; + cargoHash = "sha256-1swDHofUuVQx5J7jwmEyRC9REgv4Jg0r0BHBKmkt5Wc="; nativeBuildInputs = [ makeBinaryWrapper installShellFiles ]; buildInputs = lib.optionals stdenv.isDarwin [ libiconv darwin.apple_sdk.frameworks.Security ]; diff --git a/nixpkgs/pkgs/by-name/gu/guile-avahi/package.nix b/nixpkgs/pkgs/by-name/gu/guile-avahi/package.nix index 3ad6ff9dd2c3..c75d4ee0f079 100644 --- a/nixpkgs/pkgs/by-name/gu/guile-avahi/package.nix +++ b/nixpkgs/pkgs/by-name/gu/guile-avahi/package.nix @@ -3,6 +3,7 @@ , fetchgit , avahi , gmp +, buildPackages , autoreconfHook , pkg-config , texinfo @@ -20,6 +21,7 @@ stdenv.mkDerivation rec { }; strictDeps = true; + depsBuildBuild = [ buildPackages.stdenv.cc ]; nativeBuildInputs = [ autoreconfHook guile pkg-config texinfo ]; buildInputs = [ guile ]; propagatedBuildInputs = [ avahi gmp ]; diff --git a/nixpkgs/pkgs/by-name/gu/guix/package.nix b/nixpkgs/pkgs/by-name/gu/guix/package.nix new file mode 100644 index 000000000000..e20a969f8347 --- /dev/null +++ b/nixpkgs/pkgs/by-name/gu/guix/package.nix @@ -0,0 +1,138 @@ +{ lib +, stdenv +, fetchurl +, autoreconfHook +, disarchive +, git +, glibcLocales +, guile +, guile-avahi +, guile-gcrypt +, guile-git +, guile-gnutls +, guile-json +, guile-lib +, guile-lzlib +, guile-lzma +, guile-semver +, guile-ssh +, guile-sqlite3 +, guile-zlib +, guile-zstd +, help2man +, makeWrapper +, pkg-config +, po4a +, scheme-bytestructures +, texinfo +, bzip2 +, libgcrypt +, sqlite +}: + +stdenv.mkDerivation rec { + pname = "guix"; + version = "1.4.0"; + + src = fetchurl { + url = "mirror://gnu/guix/guix-${version}.tar.gz"; + hash = "sha256-Q8dpy/Yy7wVEmsH6SMG6FSwzSUxqvH5HE3u6eyFJ+KQ="; + }; + + postPatch = '' + sed nix/local.mk -i -E \ + -e "s|^sysvinitservicedir = .*$|sysvinitservicedir = $out/etc/init.d|" \ + -e "s|^openrcservicedir = .*$|openrcservicedir = $out/etc/openrc|" + ''; + + strictDeps = true; + + nativeBuildInputs = [ + autoreconfHook + disarchive + git + glibcLocales + guile + guile-avahi + guile-gcrypt + guile-git + guile-gnutls + guile-json + guile-lib + guile-lzlib + guile-lzma + guile-semver + guile-ssh + guile-sqlite3 + guile-zlib + guile-zstd + help2man + makeWrapper + pkg-config + po4a + scheme-bytestructures + texinfo + ]; + + buildInputs = [ + bzip2 + guile + libgcrypt + sqlite + ]; + + propagatedBuildInputs = [ + disarchive + guile-avahi + guile-gcrypt + guile-git + guile-gnutls + guile-json + guile-lib + guile-lzlib + guile-lzma + guile-semver + guile-ssh + guile-sqlite3 + guile-zlib + guile-zstd + scheme-bytestructures + ]; + + configureFlags = [ + "--localstatedir=/var" + "--sysconfdir=/etc" + "--with-bash-completion-dir=$(out)/etc/bash_completion.d" + ]; + + enableParallelBuilding = true; + + postInstall = '' + for f in $out/bin/*; do + wrapProgram $f \ + --prefix GUILE_LOAD_PATH : "$out/${guile.siteDir}:$GUILE_LOAD_PATH" \ + --prefix GUILE_LOAD_COMPILED_PATH : "$out/${guile.siteCcacheDir}:$GUILE_LOAD_COMPILED_PATH" + done + ''; + + meta = with lib; { + description = "Functional package manager with a Scheme interface"; + longDescription = '' + GNU Guix is a purely functional package manager for the GNU system, and a distribution thereof. + In addition to standard package management features, Guix supports + transactional upgrades and roll-backs, unprivileged package management, + per-user profiles, and garbage collection. + It provides Guile Scheme APIs, including high-level embedded + domain-specific languages (EDSLs), to describe how packages are built + and composed. + A user-land free software distribution for GNU/Linux comes as part of + Guix. + Guix is based on the Nix package manager. + ''; + homepage = "http://www.gnu.org/software/guix"; + license = licenses.gpl3Plus; + mainProgram = "guix"; + maintainers = with maintainers; [ cafkafk ]; + platforms = platforms.linux; + }; +} diff --git a/nixpkgs/pkgs/by-name/in/incus-unwrapped/package.nix b/nixpkgs/pkgs/by-name/in/incus-unwrapped/package.nix index dd23b6c0a3b8..051527357ca6 100644 --- a/nixpkgs/pkgs/by-name/in/incus-unwrapped/package.nix +++ b/nixpkgs/pkgs/by-name/in/incus-unwrapped/package.nix @@ -10,21 +10,21 @@ , sqlite , udev , installShellFiles -, gitUpdater +, nix-update-script }: buildGoModule rec { pname = "incus-unwrapped"; - version = "0.1"; + version = "0.2"; src = fetchFromGitHub { owner = "lxc"; repo = "incus"; rev = "refs/tags/incus-${version}"; - hash = "sha256-DCNMhfSzIpu5Pdg2TiFQ7GgLEScqt/Xqm2X+VSdeaME="; + hash = "sha256-WhprzGzTeB8sEMMTYN5j1Zrwg0GiGLlXTqCkcPq0XVo="; }; - vendorHash = "sha256-Pk0/SfGCqXdXvNHbokSV8ajFHeOv0+Et0JytRCoBLU4="; + vendorHash = "sha256-4fxQHtvRULTyKJTGdo42qwWQUSIWqbqOO1Wf8daBP/s="; postPatch = '' substituteInPlace internal/usbid/load.go \ @@ -54,10 +54,8 @@ buildGoModule rec { ldflags = [ "-s" "-w" ]; tags = [ "libsqlite3" ]; - preBuild = '' - # required for go-cowsql. - export CGO_LDFLAGS_ALLOW="(-Wl,-wrap,pthread_create)|(-Wl,-z,now)" - ''; + # required for go-cowsql. + CGO_LDFLAGS_ALLOW = "(-Wl,-wrap,pthread_create)|(-Wl,-z,now)"; postBuild = '' make incus-agent incus-migrate @@ -81,9 +79,11 @@ buildGoModule rec { ''; passthru = { - updateScript = gitUpdater { - rev-prefix = "incus-"; - }; + updateScript = nix-update-script { + extraArgs = [ + "-vr" "incus-\(.*\)" + ]; + }; }; meta = { diff --git a/nixpkgs/pkgs/by-name/kd/kdsingleapplication/package.nix b/nixpkgs/pkgs/by-name/kd/kdsingleapplication/package.nix new file mode 100644 index 000000000000..22522dd6dc97 --- /dev/null +++ b/nixpkgs/pkgs/by-name/kd/kdsingleapplication/package.nix @@ -0,0 +1,33 @@ +{ lib +, stdenv +, fetchFromGitHub +, cmake +, qt6 +}: + +stdenv.mkDerivation rec { + pname = "KDSingleApplication"; + version = "1.0.0"; + + src = fetchFromGitHub { + owner = "KDAB"; + repo = pname; + rev = "refs/tags/v${version}"; + hash = "sha256-5YprRbfiFI2UGMJqDf+3VDwXV904USEpMEpoNm0g7KY="; + }; + + nativeBuildInputs = [ cmake ]; + buildInputs = [ qt6.qtbase ]; + + cmakeFlags = [ "-DKDSingleApplication_QT6=true" ]; + dontWrapQtApps = true; + + meta = with lib; { + description = "KDAB's helper class for single-instance policy applications"; + homepage = "https://www.kdab.com/"; + maintainers = with maintainers; [ hellwolf ]; + platforms = platforms.unix; + license = licenses.mit; + changelog = "https://github.com/KDAB/KDSingleApplication/releases/tag/v${version}"; + }; +} diff --git a/nixpkgs/pkgs/by-name/la/lanzaboote-tool/package.nix b/nixpkgs/pkgs/by-name/la/lanzaboote-tool/package.nix new file mode 100644 index 000000000000..919ab7d68f2c --- /dev/null +++ b/nixpkgs/pkgs/by-name/la/lanzaboote-tool/package.nix @@ -0,0 +1,55 @@ +{ systemd +, stdenv +, makeWrapper +, binutils-unwrapped +, sbsigntool +, rustPlatform +, fetchFromGitHub +, lib +}: +rustPlatform.buildRustPackage rec { + pname = "lanzaboote-tool"; + version = "0.3.0"; + + src = fetchFromGitHub { + owner = "nix-community"; + repo = "lanzaboote"; + rev = "v${version}"; + hash = "sha256-Fb5TeRTdvUlo/5Yi2d+FC8a6KoRLk2h1VE0/peMhWPs="; + }; + + sourceRoot = "source/rust/tool"; + cargoHash = "sha256-g4WzqfH6DZVUuNb0jV3MFdm3h7zy2bQ6d3agrXesWgc="; + + env.TEST_SYSTEMD = systemd; + doCheck = lib.meta.availableOn stdenv.hostPlatform systemd; + + nativeBuildInputs = [ + makeWrapper + ]; + + postInstall = '' + # Clean PATH to only contain what we need to do objcopy. + # This is still an unwrapped lanzaboote tool lacking of the + # UEFI stub location. + mv $out/bin/lzbt $out/bin/lzbt-unwrapped + wrapProgram $out/bin/lzbt-unwrapped \ + --set PATH ${lib.makeBinPath [ binutils-unwrapped sbsigntool ]} + ''; + + nativeCheckInputs = [ + binutils-unwrapped + sbsigntool + ]; + + meta = with lib; { + description = "Lanzaboote UEFI tooling for SecureBoot enablement on NixOS systems"; + homepage = "https://github.com/nix-community/lanzaboote"; + license = licenses.gpl3Only; + mainProgram = "lzbt"; + maintainers = with maintainers; [ raitobezarius nikstur ]; + # Broken on aarch64-linux and any other architecture for now. + # Wait for 0.4.0. + platforms = [ "x86_64-linux" "i686-linux" ]; + }; +} diff --git a/nixpkgs/pkgs/by-name/li/libre-graph-api-cpp-qt-client/package.nix b/nixpkgs/pkgs/by-name/li/libre-graph-api-cpp-qt-client/package.nix new file mode 100644 index 000000000000..5fc90574d40f --- /dev/null +++ b/nixpkgs/pkgs/by-name/li/libre-graph-api-cpp-qt-client/package.nix @@ -0,0 +1,33 @@ +{ lib +, stdenv +, fetchFromGitHub +, cmake +, qt6 +}: + +stdenv.mkDerivation rec { + pname = "libre-graph-api-cpp-qt-client"; + version = "1.0.4"; + + src = fetchFromGitHub { + owner = "owncloud"; + repo = pname; + rev = "refs/tags/v${version}"; + hash = "sha256-wbdamPi2XSLWeprrYZtBUDH1A2gdp6/5geFZv+ZqSWk="; + }; + + sourceRoot = "${src.name}/client"; + + nativeBuildInputs = [ cmake ]; + buildInputs = [ qt6.qtbase ]; + dontWrapQtApps = true; + + meta = with lib; { + description = "C++ Qt API for Libre Graph, a free API for cloud collaboration inspired by the MS Graph API"; + homepage = "https://owncloud.org"; + maintainers = with maintainers; [ hellwolf ]; + platforms = platforms.unix; + license = licenses.asl20; + changelog = "https://github.com/owncloud/libre-graph-api-cpp-qt-client/releases/tag/v${version}"; + }; +} diff --git a/nixpkgs/pkgs/by-name/lx/lxd-to-incus/d7f7ae55a54437616174f80fb8faa80ae4ffcda4.patch b/nixpkgs/pkgs/by-name/lx/lxd-to-incus/d7f7ae55a54437616174f80fb8faa80ae4ffcda4.patch new file mode 100644 index 000000000000..ea3d240da879 --- /dev/null +++ b/nixpkgs/pkgs/by-name/lx/lxd-to-incus/d7f7ae55a54437616174f80fb8faa80ae4ffcda4.patch @@ -0,0 +1,25 @@ +From d7f7ae55a54437616174f80fb8faa80ae4ffcda4 Mon Sep 17 00:00:00 2001 +From: Adam Stephens <adam@valkor.net> +Date: Fri, 27 Oct 2023 13:26:11 -0400 +Subject: [PATCH] lxd-to-incus: query systemd instead of assuming service file + path + +Signed-off-by: Adam Stephens <adam@valkor.net> +--- + cmd/lxd-to-incus/targets.go | 3 ++- + 1 file changed, 2 insertions(+), 1 deletion(-) + +diff --git a/cmd/lxd-to-incus/targets.go b/cmd/lxd-to-incus/targets.go +index f2b405e0e4..ed84d3ebce 100644 +--- a/cmd/lxd-to-incus/targets.go ++++ b/cmd/lxd-to-incus/targets.go +@@ -25,7 +25,8 @@ func (s *targetSystemd) Present() bool { + return false + } + +- if !util.PathExists("/lib/systemd/system/incus.service") { ++ _, err := subprocess.RunCommand("systemctl", "list-unit-files", "incus.service") ++ if err != nil { + return false + } + diff --git a/nixpkgs/pkgs/by-name/lx/lxd-to-incus/package.nix b/nixpkgs/pkgs/by-name/lx/lxd-to-incus/package.nix index 0b9c34fb046d..8e58ede27c00 100644 --- a/nixpkgs/pkgs/by-name/lx/lxd-to-incus/package.nix +++ b/nixpkgs/pkgs/by-name/lx/lxd-to-incus/package.nix @@ -1,32 +1,36 @@ { lib , buildGoModule , fetchFromGitHub -, gitUpdater +, nix-update-script }: buildGoModule rec { pname = "lxd-to-incus"; - version = "0.1"; + version = "0.2"; src = fetchFromGitHub { owner = "lxc"; repo = "incus"; - # use commit which fixes 0.1 versioning, use tags for > 0.1 - rev = "253a06bd8506bf42628d32ccbca6409d051465ec"; - hash = "sha256-LXCTrZEDnFTJpqVH+gnG9HaV1wcvTFsVv2tAWabWYmg="; + rev = "refs/tags/incus-${version}"; + hash = "sha256-WhprzGzTeB8sEMMTYN5j1Zrwg0GiGLlXTqCkcPq0XVo="; }; + patches = [ + ./d7f7ae55a54437616174f80fb8faa80ae4ffcda4.patch + ]; + modRoot = "cmd/lxd-to-incus"; - vendorHash = "sha256-Kk5sx8UYuip/qik5ez/pxi+DmzjkPIHNYUHVvBm9f9g="; + vendorHash = "sha256-J95b4fm+VwndoxS8RQF8V8ufI3RjclqzAskEd3ut4bU="; - # required for go-cowsql. - CGO_LDFLAGS_ALLOW="(-Wl,-wrap,pthread_create)|(-Wl,-z,now)"; + CGO_ENABLED = 0; passthru = { - updateScript = gitUpdater { - rev-prefix = "incus-"; - }; + updateScript = nix-update-script { + extraArgs = [ + "-vr" "incus-\(.*\)" + ]; + }; }; meta = { diff --git a/nixpkgs/pkgs/by-name/ne/net-news-wire/package.nix b/nixpkgs/pkgs/by-name/ne/net-news-wire/package.nix new file mode 100644 index 000000000000..95873d5da0c6 --- /dev/null +++ b/nixpkgs/pkgs/by-name/ne/net-news-wire/package.nix @@ -0,0 +1,42 @@ +{ lib +, stdenvNoCC +, fetchurl +, unzip +}: + +stdenvNoCC.mkDerivation rec { + pname = "net-news-wire"; + version = "6.1.4"; + + src = fetchurl { + url = "https://github.com/Ranchero-Software/NetNewsWire/releases/download/mac-${version}/NetNewsWire${version}.zip"; + hash = "sha256-dNdbniXGre8G2/Ac0GB3GHJ2k1dEiHmAlTX3dJOEC7s="; + }; + + sourceRoot = "."; + + nativeBuildInputs = [ + unzip + ]; + + installPhase = '' + runHook preInstall + mkdir -p $out/Applications + cp -R NetNewsWire.app $out/Applications/ + runHook postInstall + ''; + + meta = with lib; { + description = "RSS reader for macOS and iOS"; + longDescription = '' + It's like podcasts — but for reading. + NetNewsWire shows you articles from your favorite blogs and news sites and keeps track of what you've read. + ''; + homepage = "https://github.com/Ranchero-Software/NetNewsWire"; + changelog = + "https://github.com/Ranchero-Software/NetNewsWire/releases/tag/mac-${version}"; + license = licenses.mit; + platforms = platforms.darwin; + maintainers = with maintainers; [ jakuzure ]; + }; +} diff --git a/nixpkgs/pkgs/by-name/ne/netclient/package.nix b/nixpkgs/pkgs/by-name/ne/netclient/package.nix index 33d72747be66..029fd53cdc07 100644 --- a/nixpkgs/pkgs/by-name/ne/netclient/package.nix +++ b/nixpkgs/pkgs/by-name/ne/netclient/package.nix @@ -8,16 +8,16 @@ buildGoModule rec { pname = "netclient"; - version = "0.21.0"; + version = "0.21.1"; src = fetchFromGitHub { owner = "gravitl"; repo = "netclient"; rev = "v${version}"; - hash = "sha256-68/BmVoAFaIg4vgjzhedSBqm6H9VDu3M7JemfPEcpjQ="; + hash = "sha256-r5Du9Gwt+deeUe6AJDN85o4snybvzZIIsyt+cfgMq2Q="; }; - vendorHash = "sha256-CsW4tW6+INw93A7uXtHeVnxRrE5unHXhm2SOmQkJwYA="; + vendorHash = "sha256-/RNteV+Ys7TVTJtQsWcGK/1C6mf/sQUahIeEzefBe3A="; buildInputs = lib.optional stdenv.isDarwin darwin.apple_sdk.frameworks.Cocoa ++ lib.optional stdenv.isLinux libX11; diff --git a/nixpkgs/pkgs/by-name/ni/nix-health/package.nix b/nixpkgs/pkgs/by-name/ni/nix-health/package.nix new file mode 100644 index 000000000000..5a5179cfcd0a --- /dev/null +++ b/nixpkgs/pkgs/by-name/ni/nix-health/package.nix @@ -0,0 +1,38 @@ +{ lib, stdenv +, rustPlatform +, fetchCrate +, libiconv +, openssl +, pkg-config +, darwin +}: + +rustPlatform.buildRustPackage rec { + pname = "nix-health"; + version = "0.2.3"; + + src = fetchCrate { + inherit version; + pname = "nix_health"; + hash = "sha256-WdzzEFk9VPld6AFTNRsaQbMymw1+mNn/TViGO/Qv0so="; + }; + + cargoHash = "sha256-xmuosy9T/52D90uXMQAIxtaYDOlCekNCtzpu/3GyQXE="; + + nativeBuildInputs = [ pkg-config ]; + buildInputs = [ libiconv openssl ] + # Use a newer SDK for CoreFoundation, because the sysinfo crate requires + # it, https://github.com/GuillaumeGomez/sysinfo/issues/915 + ++ lib.optionals stdenv.isDarwin (with darwin.apple_sdk_11_0.frameworks; + [ IOKit + CoreFoundation + ]); + + meta = with lib; { + description = "Check the health of your Nix setup"; + homepage = "https://zero-to-flakes.com/health/"; + license = licenses.asl20; + maintainers = with maintainers; [ srid ]; + mainProgram = "nix-health"; + }; +} diff --git a/nixpkgs/pkgs/by-name/ni/nixops-dns/deps.nix b/nixpkgs/pkgs/by-name/ni/nixops-dns/deps.nix new file mode 100644 index 000000000000..7da38f83e7fe --- /dev/null +++ b/nixpkgs/pkgs/by-name/ni/nixops-dns/deps.nix @@ -0,0 +1,20 @@ +[ + { + goPackagePath = "github.com/mattn/go-sqlite3"; + fetch = { + type = "git"; + url = "https://github.com/mattn/go-sqlite3"; + rev = "b4142c444a8941d0d92b0b7103a24df9cd815e42"; + sha256 = "0xq2y4am8dz9w9aaq24s1npg1sn8pf2gn4nki73ylz2fpjwq9vla"; + }; + } + { + goPackagePath = "github.com/miekg/dns"; + fetch = { + type = "git"; + url = "https://github.com/miekg/dns"; + rev = "75229eecb7af00b2736e93b779a78429dcb19472"; + sha256 = "1vsjy07kkyx11iz4qsihhykac3ddq3ywdgv6bwrv407504f7x6wl"; + }; + } +] diff --git a/nixpkgs/pkgs/by-name/ni/nixops-dns/package.nix b/nixpkgs/pkgs/by-name/ni/nixops-dns/package.nix new file mode 100644 index 000000000000..cf633a65ca53 --- /dev/null +++ b/nixpkgs/pkgs/by-name/ni/nixops-dns/package.nix @@ -0,0 +1,25 @@ +{ lib +, buildGoPackage +, fetchFromGitHub }: + +buildGoPackage rec { + pname = "nixops-dns"; + version = "1.0"; + + goDeps = ./deps.nix; + goPackagePath = "github.com/kamilchm/nixops-dns"; + + src = fetchFromGitHub { + owner = "kamilchm"; + repo = "nixops-dns"; + rev = "v${version}"; + sha256 = "1fyqwk2knrv40zpf71a56bjyaycr3p6fzrqq7gaan056ydy83cai"; + }; + + meta = with lib; { + homepage = "https://github.com/kamilchm/nixops-dns/"; + description = "DNS server for resolving NixOps machines"; + license = licenses.mit; + maintainers = with maintainers; [ kamilchm sorki ]; + }; +} diff --git a/nixpkgs/pkgs/by-name/ow/owncloud-client/package.nix b/nixpkgs/pkgs/by-name/ow/owncloud-client/package.nix new file mode 100644 index 000000000000..5edbd5d0f6b8 --- /dev/null +++ b/nixpkgs/pkgs/by-name/ow/owncloud-client/package.nix @@ -0,0 +1,57 @@ +{ lib +, stdenv +, fetchFromGitHub +, pkg-config +, cmake +, extra-cmake-modules +, qt6 +, qt6Packages +, sqlite +, libsecret +, libre-graph-api-cpp-qt-client +, kdsingleapplication +# darwin only: +, libinotify-kqueue +, sparkleshare +}: + +stdenv.mkDerivation rec { + pname = "owncloud-client"; + version = "5.0.0"; + + src = fetchFromGitHub { + owner = "owncloud"; + repo = "client"; + rev = "refs/tags/v${version}"; + hash = "sha256-SSMNmWrCT1sGa38oY8P84QNedNkQPcIRWrV9B65B5X8="; + }; + + nativeBuildInputs = [ + pkg-config + cmake + extra-cmake-modules + qt6.qttools + qt6.wrapQtAppsHook + ]; + + buildInputs = [ + sqlite + libsecret + qt6.qtbase + qt6.qtsvg # Needed for the systray icon + qt6Packages.qtkeychain + libre-graph-api-cpp-qt-client + kdsingleapplication + ] ++ lib.optionals stdenv.isDarwin [ + libinotify-kqueue sparkleshare + ]; + + meta = with lib; { + description = "Synchronise your ownCloud with your computer using this desktop client"; + homepage = "https://owncloud.org"; + maintainers = with maintainers; [ qknight hellwolf ]; + platforms = platforms.unix; + license = licenses.gpl2Plus; + changelog = "https://github.com/owncloud/client/releases/tag/v${version}"; + }; +} diff --git a/nixpkgs/pkgs/by-name/ph/phel/package.nix b/nixpkgs/pkgs/by-name/ph/phel/package.nix new file mode 100644 index 000000000000..84fe0583f267 --- /dev/null +++ b/nixpkgs/pkgs/by-name/ph/phel/package.nix @@ -0,0 +1,27 @@ +{ lib +, fetchFromGitHub +, php +}: + +php.buildComposerProject (finalAttrs: { + pname = "phel"; + version = "0.11.0-dev"; + + src = fetchFromGitHub { + owner = "phel-lang"; + repo = "phel-lang"; + rev = "83d9d81b6c7daae361c0f1f68462083027b81581"; + hash = "sha256-B2IozL/nJE4C1Gq54/64TJEySC1STroG1poCBzd3j3I="; + }; + + vendorHash = "sha256-83GX/dxHa6w1E34wnJshg7yxlVyRkDT5jmAPCCqPdtA="; + + meta = { + changelog = "https://github.com/phel-lang/phel-lang/releases/tag/v${finalAttrs.version}"; + description = "Phel is a functional programming language that compiles to PHP. A Lisp dialect inspired by Clojure and Janet."; + homepage = "https://github.com/phel-lang/phel-lang"; + license = lib.licenses.mit; + mainProgram = "phel"; + maintainers = with lib.maintainers; [ drupol ]; + }; +}) diff --git a/nixpkgs/pkgs/by-name/pr/prox/package.nix b/nixpkgs/pkgs/by-name/pr/prox/package.nix new file mode 100644 index 000000000000..7c49551423f7 --- /dev/null +++ b/nixpkgs/pkgs/by-name/pr/prox/package.nix @@ -0,0 +1,31 @@ +{ buildGoModule +, fetchFromGitHub +, lib +}: + +buildGoModule rec { + pname = "prox"; + # While upstream did release a v1.0.0, v0.5.2 is actually newer: https://github.com/fgrosse/prox/releases/tag/v0.5.2 + version = "0.5.2"; + + src = fetchFromGitHub { + owner = "fgrosse"; + repo = pname; + rev = "v${version}"; + sha256 = "sha256-mqx8ICne0NnyW0N1Jeu+PJXWDBr12OASLxlePI6v6Bc="; + }; + + vendorHash = "sha256-4gZfEbyAzAzxtOR6FhP7eUSdln+fANn87+duCq1aq5A="; + + postPatch = '' + substituteInPlace cmd/prox/version.go \ + --replace '0.0.0-unknown' '${version}' + ''; + + meta = with lib; { + homepage = "https://github.com/fgrosse/prox"; + description = "A process runner for Procfile-based applications "; + license = licenses.bsd2; + maintainers = with maintainers; [ lucperkins ]; + }; +} diff --git a/nixpkgs/pkgs/by-name/py/pyprland/package.nix b/nixpkgs/pkgs/by-name/py/pyprland/package.nix new file mode 100644 index 000000000000..5af31a41de88 --- /dev/null +++ b/nixpkgs/pkgs/by-name/py/pyprland/package.nix @@ -0,0 +1,40 @@ +{ lib, fetchFromGitHub, python3Packages }: + +python3Packages.buildPythonApplication rec { + pname = "pyprland"; + version = "1.4.1"; + format = "pyproject"; + + disabled = python3Packages.pythonOlder "3.10"; + + src = fetchFromGitHub { + owner = "hyprland-community"; + repo = "pyprland"; + rev = version; + hash = "sha256-x/Rar80jwBX64pW+uv0edhlC44OP1b1e2vnJLFGlIms="; + }; + + nativeBuildInputs = with python3Packages; [ poetry-core ]; + + postInstall = '' + # file has shebang but cant be run due to a relative import, has proper entrypoint in /bin + chmod -x $out/${python3Packages.python.sitePackages}/pyprland/command.py + ''; + + pythonImportsCheck = [ + "pyprland" + "pyprland.common" + "pyprland.plugins" + "pyprland.plugins.interface" + "pyprland.plugins.ironbar" + ]; + + meta = with lib; { + mainProgram = "pypr"; + description = "An hyperland plugin system"; + homepage = "https://github.com/hyprland-community/pyprland"; + license = licenses.mit; + maintainers = with maintainers; [ iliayar ]; + platforms = platforms.linux; + }; +} diff --git a/nixpkgs/pkgs/by-name/pz/pzip/package.nix b/nixpkgs/pkgs/by-name/pz/pzip/package.nix new file mode 100644 index 000000000000..f2797c6791c8 --- /dev/null +++ b/nixpkgs/pkgs/by-name/pz/pzip/package.nix @@ -0,0 +1,34 @@ +{ lib +, buildGoModule +, fetchFromGitHub +, unzip +}: + +buildGoModule rec { + pname = "pzip"; + version = "0.2.0"; + + src = fetchFromGitHub { + owner = "ybirader"; + repo = "pzip"; + rev = "v${version}"; + hash = "sha256-bb2TSSyA7TwgoV53M/7WkNcTq8F0EjCA7ObHfnGL9l0="; + }; + + vendorHash = "sha256-MRZlv4eN1Qbu+QXr//YexTDYSK4pCXAPO7VvGqZhjho="; + + nativeBuildInputs = [ + unzip + ]; + + ldflags = [ "-s" "-w" ]; + + meta = with lib; { + description = "A fast concurrent zip archiver and extractor"; + homepage = "https://github.com/ybirader/pzip"; + changelog = "https://github.com/ybirader/pzip/releases/tag/${src.rev}"; + license = licenses.asl20; + maintainers = with maintainers; [ figsoda ]; + mainProgram = "pzip"; + }; +} diff --git a/nixpkgs/pkgs/by-name/tr/tradingview/package.nix b/nixpkgs/pkgs/by-name/tr/tradingview/package.nix index 7268b4386568..9c0086dfffcb 100644 --- a/nixpkgs/pkgs/by-name/tr/tradingview/package.nix +++ b/nixpkgs/pkgs/by-name/tr/tradingview/package.nix @@ -64,15 +64,18 @@ stdenv.mkDerivation rec { installPhase = '' runHook preInstall - mkdir -p $out - cp -r squashfs-root/* $out + mkdir -p $out/share + cp -r squashfs-root $out/share/tradingview + rm -rf $out/share/tradingview/meta - mkdir -p $out/share/applications - mv $out/meta/gui/tradingview.desktop $out/share/applications - substituteInPlace $out/share/applications/tradingview.desktop --replace \$\{SNAP} $out + install -Dm444 squashfs-root/meta/gui/tradingview.desktop -t $out/share/applications + substituteInPlace $out/share/applications/tradingview.desktop --replace \$\{SNAP}/meta/gui/icon.png tradingview + + mkdir $out/share/icons + cp squashfs-root/meta/gui/icon.png $out/share/icons/tradingview.png mkdir $out/bin - makeBinaryWrapper $out/tradingview $out/bin/tradingview --prefix LD_LIBRARY_PATH : ${ lib.makeLibraryPath buildInputs } + makeBinaryWrapper $out/share/tradingview/tradingview $out/bin/tradingview --prefix LD_LIBRARY_PATH : ${ lib.makeLibraryPath buildInputs } runHook postInstall ''; @@ -88,4 +91,3 @@ stdenv.mkDerivation rec { mainProgram = "tradingview"; }; } - diff --git a/nixpkgs/pkgs/by-name/ve/vesktop/package.nix b/nixpkgs/pkgs/by-name/ve/vesktop/package.nix index d528fec7563a..52c21e75f7b1 100644 --- a/nixpkgs/pkgs/by-name/ve/vesktop/package.nix +++ b/nixpkgs/pkgs/by-name/ve/vesktop/package.nix @@ -18,13 +18,13 @@ }: stdenv.mkDerivation rec { pname = "vesktop"; - version = "0.4.1"; + version = "0.4.2"; src = fetchFromGitHub { owner = "Vencord"; repo = "Vesktop"; rev = "v${version}"; - hash = "sha256-jSGad3qMhAdiGdwomQO6BIyHIbKrGLRGniGrJN97gN8="; + hash = "sha256-elgoX8z8q0+7uUia9gbcCmpDg+qYRWWUxdRuNV53Puw="; }; pnpm-deps = stdenvNoCC.mkDerivation { @@ -53,7 +53,7 @@ stdenv.mkDerivation rec { dontFixup = true; outputHashMode = "recursive"; - outputHash = "sha256-lTeL+8QujWzx4ys2T+G55NUP51c8i5lB1vAkUtzkJlA="; + outputHash = "sha256-KDJ8QmpwGb2lOdwWEl5y62pJiqEvpI59StfQZrN1PPE="; }; nativeBuildInputs = [ diff --git a/nixpkgs/pkgs/by-name/ws/wslay/package.nix b/nixpkgs/pkgs/by-name/ws/wslay/package.nix new file mode 100644 index 000000000000..ed6c0c9b6735 --- /dev/null +++ b/nixpkgs/pkgs/by-name/ws/wslay/package.nix @@ -0,0 +1,33 @@ +{ stdenv, lib, fetchFromGitHub, cmake, cunit }: + +stdenv.mkDerivation rec { + pname = "wslay"; + version = "1.1.1"; + + src = fetchFromGitHub { + owner = "tatsuhiro-t"; + repo = "wslay"; + rev = "release-${version}"; + hash = "sha256-xKQGZO5hNzMg+JYKeqOBsu73YO+ucBEOcNhG8iSNYvA="; + }; + + strictDeps = true; + + nativeBuildInputs = [ cmake ]; + + cmakeFlags = [ + (lib.cmakeBool "WSLAY_TESTS" true) + ]; + + doCheck = true; + + checkInputs = [ cunit ]; + + meta = with lib; { + homepage = "https://tatsuhiro-t.github.io/wslay/"; + description = "The WebSocket library in C"; + license = with licenses; [ mit ]; + maintainers = with maintainers; [ pingiun ]; + platforms = platforms.unix; + }; +} diff --git a/nixpkgs/pkgs/by-name/yu/yunfaavatar/package.nix b/nixpkgs/pkgs/by-name/yu/yunfaavatar/package.nix new file mode 100644 index 000000000000..369f89d7c888 --- /dev/null +++ b/nixpkgs/pkgs/by-name/yu/yunfaavatar/package.nix @@ -0,0 +1,40 @@ +{ + lib, + stdenvNoCC, + fetchFromGitHub, + bash, + imagemagick, + makeWrapper, +}: +stdenvNoCC.mkDerivation rec { + pname = "yunfaavatar"; + version = "0.2.0"; + + src = fetchFromGitHub { + owner = "yunfachi"; + repo = "yunfaAvatar"; + rev = version; + hash = "sha256-hCpbe+gW9hkiVOKq7a55n5s3bMpyCNGWiY3D2b4VYxg="; + }; + + strictDeps = true; + nativeBuildInputs = [makeWrapper]; + + makeFlags = [ + "PREFIX=${placeholder "out"}" + ]; + + postInstall = '' + wrapProgram "$out/bin/yunfaavatar" \ + --prefix PATH : "${lib.makeBinPath [imagemagick]}" + ''; + + meta = with lib; { + description = "Utility for automatic centralized changing of avatar in Github, Discord, Steam, Shikimori, and many more"; + homepage = "https://github.com/yunfachi/yunfaAvatar"; + license = licenses.mit; + platforms = platforms.all; + maintainers = with maintainers; [yunfachi]; + mainProgram = "yunfaavatar"; + }; +} |