diff --git a/third_party/nixpkgs/doc/builders/packages/kakoune.xml b/third_party/nixpkgs/doc/builders/packages/kakoune.xml
index 728d40dacc..045dbd0a65 100644
--- a/third_party/nixpkgs/doc/builders/packages/kakoune.xml
+++ b/third_party/nixpkgs/doc/builders/packages/kakoune.xml
@@ -6,9 +6,7 @@
Kakoune can be built to autoload plugins:
(kakoune.override {
- configure = {
- plugins = with pkgs.kakounePlugins; [ parinfer-rust ];
- };
+ plugins = with pkgs.kakounePlugins; [ parinfer-rust ];
})
diff --git a/third_party/nixpkgs/doc/contributing/coding-conventions.xml b/third_party/nixpkgs/doc/contributing/coding-conventions.xml
index fcb6501f61..e587275a63 100644
--- a/third_party/nixpkgs/doc/contributing/coding-conventions.xml
+++ b/third_party/nixpkgs/doc/contributing/coding-conventions.xml
@@ -522,6 +522,16 @@ args.stdenv.mkDerivation (args // {
+
+
+ If it’s a terminal emulator:
+
+
+
+ applications/terminal-emulators (e.g. alacritty or rxvt or termite)
+
+
+
If it’s for video playback / editing:
diff --git a/third_party/nixpkgs/doc/languages-frameworks/vim.section.md b/third_party/nixpkgs/doc/languages-frameworks/vim.section.md
index 8e4826232e..84ad567e8c 100644
--- a/third_party/nixpkgs/doc/languages-frameworks/vim.section.md
+++ b/third_party/nixpkgs/doc/languages-frameworks/vim.section.md
@@ -265,6 +265,20 @@ To add a new plugin, run `./update.py --add "[owner]/[name]"`. **NOTE**: This sc
Finally, there are some plugins that are also packaged in nodePackages because they have Javascript-related build steps, such as running webpack. Those plugins are not listed in `vim-plugin-names` or managed by `update.py` at all, and are included separately in `overrides.nix`. Currently, all these plugins are related to the `coc.nvim` ecosystem of Language Server Protocol integration with vim/neovim.
+## Updating plugins in nixpkgs
+
+Run the update script with a GitHub API token that has at least `public_repo` access. Running the script without the token is likely to result in rate-limiting (429 errors). For steps on creating an API token, please refer to [GitHub's token documentation](https://docs.github.com/en/free-pro-team@latest/github/authenticating-to-github/creating-a-personal-access-token).
+
+```sh
+GITHUB_API_TOKEN=my_token ./pkgs/misc/vim-plugins/update.py
+```
+
+Alternatively, set the number of processes to a lower count to avoid rate-limiting.
+
+```sh
+./pkgs/misc/vim-plugins/update.py --proc 1
+```
+
## Important repositories
- [vim-pi](https://bitbucket.org/vimcommunity/vim-pi) is a plugin repository
diff --git a/third_party/nixpkgs/lib/sources.nix b/third_party/nixpkgs/lib/sources.nix
index 702a0ef889..1a3afcae67 100644
--- a/third_party/nixpkgs/lib/sources.nix
+++ b/third_party/nixpkgs/lib/sources.nix
@@ -6,6 +6,7 @@ let
hasContext
match
readDir
+ split
storeDir
tryEval
;
@@ -15,7 +16,6 @@ let
isString
pathExists
readFile
- split
;
in
rec {
diff --git a/third_party/nixpkgs/maintainers/maintainer-list.nix b/third_party/nixpkgs/maintainers/maintainer-list.nix
index c0b1ae06ab..bacd3dab9a 100644
--- a/third_party/nixpkgs/maintainers/maintainer-list.nix
+++ b/third_party/nixpkgs/maintainers/maintainer-list.nix
@@ -1303,10 +1303,12 @@
name = "Vladimir Serov";
keys = [
# compare with https://keybase.io/cab404
- { longkeyid = "1BB96810926F4E715DEF567E6BA7C26C3FDF7BB3";
+ {
+ longkeyid = "1BB96810926F4E715DEF567E6BA7C26C3FDF7BB3";
fingerprint = "rsa3072/0xCBDECF658C38079E";
}
- { longkeyid = "1EBC648C64D6045463013B3EB7EFFC271D55DB8A";
+ {
+ longkeyid = "1EBC648C64D6045463013B3EB7EFFC271D55DB8A";
fingerprint = "ed25519/0xB7EFFC271D55DB8A";
}
];
@@ -1431,10 +1433,12 @@
githubId = 2054509;
name = "Constantine Evans";
keys = [
- { longkeyid = "rsa4096/0xB67DB1D20A93A9F9";
+ {
+ longkeyid = "rsa4096/0xB67DB1D20A93A9F9";
fingerprint = "32B1 6EE7 DBA5 16DE 526E 4C5A B67D B1D2 0A93 A9F9";
}
- { longkeyid = "rsa4096/0x1A1D58B86AE2AABD";
+ {
+ longkeyid = "rsa4096/0x1A1D58B86AE2AABD";
fingerprint = "669C 1D24 5A87 DB34 6BE4 3216 1A1D 58B8 6AE2 AABD";
}
];
@@ -4373,7 +4377,7 @@
name = "Jeff Zellner";
};
kaction = {
- name = "Dmitry Bogatov";
+ name = "Dmitry Bogatov";
email = "KAction@disroot.org";
github = "kaction";
githubId = 44864956;
@@ -5685,12 +5689,6 @@
githubId = 1387206;
name = "Mike Sperber";
};
- mildlyincompetent = {
- email = "nix@kch.dev";
- github = "mildlyincompetent";
- githubId = 19479662;
- name = "Kajetan Champlewski";
- };
millerjason = {
email = "mailings-github@millerjason.com";
github = "millerjason";
@@ -6615,6 +6613,12 @@
githubId = 131844;
name = "Igor Pashev";
};
+ pasqui23 = {
+ email = "p3dimaria@hotmail.it";
+ github = "pasqui23";
+ githubId = 6931743;
+ name = "pasqui23";
+ };
patryk27 = {
email = "wychowaniec.patryk@gmail.com";
github = "Patryk27";
@@ -7006,7 +7010,7 @@
purcell = {
email = "steve@sanityinc.com";
github = "purcell";
- githubId = 5636;
+ githubId = 5636;
name = "Steve Purcell";
};
puzzlewolf = {
@@ -7275,10 +7279,12 @@
github = "rissson";
githubId = 18313093;
keys = [
- { longkeyid = "rsa4096/0xF6FD87B15C263EC9";
+ {
+ longkeyid = "rsa4096/0xF6FD87B15C263EC9";
fingerprint = "8A0E 6A7C 08AB B9DE 67DE 2A13 F6FD 87B1 5C26 3EC9";
}
- { longkeyid = "ed25519/0xBBB7A6801DF1E03F";
+ {
+ longkeyid = "ed25519/0xBBB7A6801DF1E03F";
fingerprint = "C0A7 A9BB 115B C857 4D75 EA99 BBB7 A680 1DF1 E03F";
}
];
@@ -7401,6 +7407,12 @@
githubId = 1217934;
name = "José Romildo Malaquias";
};
+ ronanmacf = {
+ email = "macfhlar@tcd.ie";
+ github = "ronanmacf";
+ githubId = 25930627;
+ name = "Ronan Mac Fhlannchadha";
+ };
rongcuid = {
email = "rongcuid@outlook.com";
github = "rongcuid";
@@ -8358,7 +8370,7 @@
name = "Szczyp";
};
szlend = {
- email = "pub+nix@zlender.si";
+ email = "pub.nix@zlender.si";
github = "szlend";
githubId = 7301807;
name = "Simon Žlender";
@@ -9244,6 +9256,12 @@
email = "kirill.wedens@gmail.com";
name = "wedens";
};
+ wheelsandmetal = {
+ email = "jakob@schmutz.co.uk";
+ github = "wheelsandmetal";
+ githubId = 13031455;
+ name = "Jakob Schmutz";
+ };
WhittlesJr = {
email = "alex.joseph.whitt@gmail.com";
github = "WhittlesJr";
@@ -9328,7 +9346,7 @@
email = "worldofpeace@protonmail.ch";
github = "worldofpeace";
githubId = 28888242;
- name = "worldofpeace";
+ name = "WORLDofPEACE";
};
wscott = {
email = "wsc9tt@gmail.com";
@@ -9749,7 +9767,7 @@
name = "Asad Saeeduddin";
};
ngerstle = {
- name = "Nicholas Gerstle";
+ name = "Nicholas Gerstle";
email = "ngerstle@gmail.com";
github = "ngerstle";
githubId = 1023752;
@@ -9880,4 +9898,10 @@
github = "wilsonehusin";
githubId = 14004487;
};
+ bb2020 = {
+ email = "bb2020@users.noreply.github.com";
+ github = "bb2020";
+ githubId = 19290397;
+ name = "Tunc Uzlu";
+ };
}
diff --git a/third_party/nixpkgs/nixos/doc/manual/default.nix b/third_party/nixpkgs/nixos/doc/manual/default.nix
index 6ca75f869f..af7a2e0822 100644
--- a/third_party/nixpkgs/nixos/doc/manual/default.nix
+++ b/third_party/nixpkgs/nixos/doc/manual/default.nix
@@ -63,6 +63,7 @@ let
"--stringparam html.script './highlightjs/highlight.pack.js ./highlightjs/loader.js'"
"--param xref.with.number.and.title 1"
"--param toc.section.depth 0"
+ "--param generate.consistent.ids 1"
"--stringparam admon.style ''"
"--stringparam callout.graphics.extension .svg"
"--stringparam current.docid manual"
diff --git a/third_party/nixpkgs/nixos/doc/manual/man-nixos-install.xml b/third_party/nixpkgs/nixos/doc/manual/man-nixos-install.xml
index b205e23096..91542d37cb 100644
--- a/third_party/nixpkgs/nixos/doc/manual/man-nixos-install.xml
+++ b/third_party/nixpkgs/nixos/doc/manual/man-nixos-install.xml
@@ -49,6 +49,12 @@
flake-uri
+
+
+
+
+
+
@@ -100,6 +106,12 @@
+
+
+
+
+
+
@@ -295,6 +307,17 @@
+
+
+
+
+
+
+ Causes Nix to continue building derivations as far as possible
+ in the face of failed builds.
+
+
+
diff --git a/third_party/nixpkgs/nixos/doc/manual/release-notes/rl-2009.xml b/third_party/nixpkgs/nixos/doc/manual/release-notes/rl-2009.xml
index 89bdd12adf..01f113198e 100644
--- a/third_party/nixpkgs/nixos/doc/manual/release-notes/rl-2009.xml
+++ b/third_party/nixpkgs/nixos/doc/manual/release-notes/rl-2009.xml
@@ -3,7 +3,7 @@
xmlns:xi="http://www.w3.org/2001/XInclude"
version="5.0"
xml:id="sec-release-20.09">
- Release 20.09 (“Nightingale”, 2020.10/26)
+ Release 20.09 (“Nightingale”, 2020.10/27)
Support is planned until the end of April 2021, handing over to 21.03.
@@ -50,7 +50,7 @@
- Desktop Enironments:
+ Desktop Environments:
@@ -65,7 +65,7 @@
- gnome3: 3.34 -> 3.36, see its release notes.
+ gnome3: 3.34 -> 3.36, see its release notes
@@ -75,7 +75,7 @@
- NixOS now distributes an official GNOME ISO.
+ NixOS now distributes an official GNOME ISO
@@ -89,28 +89,28 @@
- Agda ecosystem was heavily reworked (see more details below).
+ Agda ecosystem was heavily reworked (see more details below)
- PHP now defaults to PHP 7.4, updated from 7.3.
+ PHP now defaults to PHP 7.4, updated from 7.3
- PHP 7.2 is no longer supported due to upstream not supporting this version for the entire lifecycle of the 20.09 release.
+ PHP 7.2 is no longer supported due to upstream not supporting this version for the entire lifecycle of the 20.09 release
- Python 3 now defaults to Python 3.8 instead of 3.7.
+ Python 3 now defaults to Python 3.8 instead of 3.7
- Python 3.5 has reached its upstream EOL at the end of September 2020: it
- has been removed from the list of available packages.
+ Python 3.5 reached its upstream EOL at the end of September 2020: it
+ has been removed from the list of available packages
@@ -156,7 +156,7 @@
- There is a new module for Podman(virtualisation.podman), a drop-in replacement for the Docker command line.
+ There is a new module for Podman (virtualisation.podman), a drop-in replacement for the Docker command line.
@@ -191,7 +191,7 @@
- Support for built-in LCDs in various pieces of Logitech hardware (keyboards and USB speakers). hardware.logitech.lcd.enable enables support for all hardware supported by the g15daemon project.
+ Support for built-in LCDs in various pieces of Logitech hardware (keyboards and USB speakers). hardware.logitech.lcd.enable enables support for all hardware supported by the g15daemon project.
@@ -200,7 +200,7 @@
allows to restrict non-default entries in the boot menu to one or more
users. The users and passwords are defined via the option
.
- Note: Password support is only avaiable in GRUB version 2.
+ Note: Password support is only available in GRUB version 2.
@@ -257,27 +257,27 @@
- adds easy support of system76 firmware.
+ adds easy support of system76 firmware
- loads uinput kernel module.
+ loads uinput kernel module
- enable good defaults for HiDPI displays.
+ enable good defaults for HiDPI displays
- support for Wooting keyboards.
+ support for Wooting keyboards
- xpadneo driver for Xbox One wireless controllers.
+ xpadneo driver for Xbox One wireless controllers
@@ -289,12 +289,12 @@
- enable hamster time tracking.
+ enable hamster time tracking
- adds easy enablement of steam and related system configuration.
+ adds easy enablement of steam and related system configuration
@@ -306,12 +306,12 @@
- alternative to sudo, allows non-root users to execute commands as root.
+ alternative to sudo, allows non-root users to execute commands as root
- add Trusted Platform Module 2 support.
+ add Trusted Platform Module 2 support
@@ -323,7 +323,7 @@
- Start an OpenVPN client during initrd boot.
+ start an OpenVPN client during initrd boot
@@ -335,17 +335,17 @@
- Use nixos-containers.
+ use nixos-containers
- Run OCI (Docker) containers.
+ run OCI (Docker) containers
- Daemonless container engine.
+ daemonless container engine
@@ -358,242 +358,237 @@
- Anki sync server.
+ Anki sync server
- subtitle manager for Sonarr and Radarr.
+ Subtitle manager for Sonarr and Radarr
- Biboumi XMPP gateway to IRC.
+ Biboumi XMPP gateway to IRC
- Blockbook-frontend, a service for the Trezor wallet.
+ Blockbook-frontend, a service for the Trezor wallet
- Wayland cage service.
+ Wayland cage service
- IRC daemon, which can be accessed throught the browser.
+ IRC daemon, which can be accessed throught the browser
- Tool for coordinating helpers and shifts on large events.
+ Tool for coordinating volunteers and shifts on large events
- text-expander written in rust.
+ text-expander written in rust
- Folding@home client.
+ Folding@home client
- Folding@home client.
+ Web-based team code collaboration tool
- Web-based team code collaboration tool.
+ Matrix bot
- Matrix bot.
+ xow as a systemd service
- xow as a systemd service.
+ Hercules CI build agent
- Hercules CI build agent.
+ Jitsi Conference Focus, component of Jitsi Meet
- Jitsi Conference Focus, component of Jitsi Meet.
+ A web file repository
- a web file repository.
+ Secure, simple and scalable video conferences
- secure, simple and scalable video conferences.
+ Jitsi Videobridge, a WebRTC compatible router
- Jitsi Videobridge, a WebRTC compatible router.
+ Jupyterhub development server
- Jupyterhub development server.
+ Lightweight Kubernetes distribution
- lightweight kubernetes distribution.
+ Magic Wormhole Mailbox Server
- Magic Wormhole Mailbox Server.
+ Parental Control support
- parental control support.
+ Matrix and Discord bridge
- Matrix and Discord bridge.
+ Matrix-Telegram puppeting/relaybot bridge
- Matrix-Telegram puppeting/relaybot bridge.
+ Japanese DTV Tuner Server Service
- Japanese DTV Tuner Server Service.
+ Molly-Brown Gemini server
- Molly-Brown Gemini server.
+ Mullvad VPN daemon
- Mullvad VPN daemon.
+ Namecoin to DNS bridge
- Namecoin to DNS bridge.
+ NextDNS to DoH Proxy service
- NextDNS to DoH Proxy service.
+ Google storage bucket to be used as a nix store
- Enable a Google storage bucket to be used as a nix store.
+ OneDrive sync service
- OneDrive sync service.
+ Pastebin-like service
- Pastebin-like service.
+ Manage network booting of machines
- manage network booting of machines.
+ Privacy authentication server
- Privacy authentication server.
+ Quorum blockchain daemon
- Quorum blockchain daemon.
+ RobustIRC bridge
- RobustIRC bridge.
+ Generate RSS and Atom feeds
- generate RSS and Atom feeds.
+ rTorrent service
- rTorrent service.
+ SmartDNS DNS server
- SmartDNS DNS server.
+ SOGo groupware
- SOGo groupware.
+ Teeworlds game server
- Teeworlds game server.
+ torque computing node
- torque computing node.
+ torque server
- enable torque server.
+ A total uptime service
- a total uptime service.
+ X11 remote server
- X11 remote server.
+ Wasabi backend service
- Wasabi backend service.
+ Yubikey agent
- Yubikey agent.
-
-
-
-
- Zigbee to MQTT bridge.
+ Zigbee to MQTT bridge
@@ -733,7 +728,7 @@ GRANT ALL PRIVILEGES ON *.* TO 'mysql'@'localhost' WITH GRANT OPTION;
It can still be enabled by providing phantomJsSupport = true to the package instantiation:
{
services.grafana.package = pkgs.grafana.overrideAttrs (oldAttrs: rec {
- phantomJsSupport = false;
+ phantomJsSupport = true;
});
}
@@ -1623,7 +1618,7 @@ services.transmission.settings.rpc-bind-address = "0.0.0.0";
nixpkgs. It was a work in progress to package the
Deepin Desktop Environment (DDE),
including libraries, tools and applications, and it was still
- missing a service to lauch the desktop environment. It has shown
+ missing a service to launch the desktop environment. It has shown
to no longer be a feasible goal due to reasons discussed in
issue #94870.
The package netease-cloud-music has also been
@@ -1668,4 +1663,131 @@ services.transmission.settings.rpc-bind-address = "0.0.0.0";
+
+
+ Contributions
+
+ I, Jonathan Ringer, would like to thank the following individuals for their work on nixpkgs. This release could not be done without the hard work of the NixOS community. There were 31282 contributions across 1313 contributors.
+
+
+
+ Top contributors to NixOS/Nixpkgs from the 20.03 release to the 20.09 release:
+
+
+
+ 2288 Mario Rodas
+
+
+
+
+ 1837 Frederik Rietdijk
+
+
+
+
+ 946 Jörg Thalheim
+
+
+
+
+ 925 Maximilian Bosch
+
+
+
+
+ 687 Jonathan Ringer
+
+
+
+
+ 651 Jan Tojnar
+
+
+
+
+ 622 Daniël de Kok
+
+
+
+
+ 605 WORLDofPEACE
+
+
+
+
+ 597 Florian Klink
+
+
+
+
+ 528 José Romildo Malaquias
+
+
+
+
+
+
+ Top contributors to stabilizing this release (Zero Hydra Failures period):
+
+
+
+ 281 volth
+
+
+
+
+ 101 Robert Scott
+
+
+
+
+ 86 Tim Steinbach
+
+
+
+
+ 76 WORLDofPEACE
+
+
+
+
+ 49 Maximilian Bosch
+
+
+
+
+ 42 Thomas Tuegel
+
+
+
+
+ 37 Doron Behar
+
+
+
+
+ 36 Vladimír Čunát
+
+
+
+
+ 27 Jonathan Ringer
+
+
+
+
+ 27 Maciej Krüger
+
+
+
+
+
+ I, Jonathan Ringer, would also like to personally thank @WORLDofPEACE for their help in mentoring me on the release process. Special thanks also goes to Thomas Tuegel for helping immensely with stabilizing Qt, KDE, and Plasma5; I would also like to thank Robert Scott for his numerous fixes and pull request reviews.
+
+
+
diff --git a/third_party/nixpkgs/nixos/doc/manual/release-notes/rl-2103.xml b/third_party/nixpkgs/nixos/doc/manual/release-notes/rl-2103.xml
index 374ea1cbd1..85eedfe0ec 100644
--- a/third_party/nixpkgs/nixos/doc/manual/release-notes/rl-2103.xml
+++ b/third_party/nixpkgs/nixos/doc/manual/release-notes/rl-2103.xml
@@ -132,6 +132,14 @@
to nextcloud20.
+
+
+ NixOS now emits a deprecation warning if systemd's StartLimitInterval setting is used in a serviceConfig section instead of in a unitConfig; that setting is deprecated and now undocumented for the service section by systemd upstream, but still effective and somewhat buggy there, which can be confusing. See #45785 for details.
+
+
+ All services should use or StartLimitIntervalSec in instead.
+
+
diff --git a/third_party/nixpkgs/nixos/lib/make-disk-image.nix b/third_party/nixpkgs/nixos/lib/make-disk-image.nix
index 8aa606a56a..a4a488a1b3 100644
--- a/third_party/nixpkgs/nixos/lib/make-disk-image.nix
+++ b/third_party/nixpkgs/nixos/lib/make-disk-image.nix
@@ -28,6 +28,9 @@
# partition of reasonable size is created in addition to the root partition.
# For "legacy", the msdos partition table is used and a single large root
# partition is created.
+ # For "legacy+gpt", the GPT partition table is used, a 1MiB no-fs partition for
+ # use by the bootloader is created, and a single large root partition is
+ # created.
# For "hybrid", the GPT partition table is used and a mandatory ESP
# partition of reasonable size is created in addition to the root partition.
# Also a legacy MBR will be present.
@@ -54,7 +57,7 @@
format ? "raw"
}:
-assert partitionTableType == "legacy" || partitionTableType == "efi" || partitionTableType == "hybrid" || partitionTableType == "none";
+assert partitionTableType == "legacy" || partitionTableType == "legacy+gpt" || partitionTableType == "efi" || partitionTableType == "hybrid" || partitionTableType == "none";
# We use -E offset=X below, which is only supported by e2fsprogs
assert partitionTableType != "none" -> fsType == "ext4";
@@ -75,6 +78,7 @@ let format' = format; in let
rootPartition = { # switch-case
legacy = "1";
+ "legacy+gpt" = "2";
efi = "2";
hybrid = "3";
}.${partitionTableType};
@@ -85,6 +89,16 @@ let format' = format; in let
mklabel msdos \
mkpart primary ext4 1MiB -1
'';
+ "legacy+gpt" = ''
+ parted --script $diskImage -- \
+ mklabel gpt \
+ mkpart no-fs 1MB 2MB \
+ set 1 bios_grub on \
+ align-check optimal 1 \
+ mkpart primary ext4 2MB -1 \
+ align-check optimal 2 \
+ print
+ '';
efi = ''
parted --script $diskImage -- \
mklabel gpt \
diff --git a/third_party/nixpkgs/nixos/maintainers/scripts/ec2/amazon-image.nix b/third_party/nixpkgs/nixos/maintainers/scripts/ec2/amazon-image.nix
index b09f4ca47a..0ecf07669a 100644
--- a/third_party/nixpkgs/nixos/maintainers/scripts/ec2/amazon-image.nix
+++ b/third_party/nixpkgs/nixos/maintainers/scripts/ec2/amazon-image.nix
@@ -57,7 +57,7 @@ in {
inherit (cfg) contents format name;
pkgs = import ../../../.. { inherit (pkgs) system; }; # ensure we use the regular qemu-kvm package
partitionTableType = if config.ec2.efi then "efi"
- else if config.ec2.hvm then "legacy"
+ else if config.ec2.hvm then "legacy+gpt"
else "none";
diskSize = cfg.sizeMB;
fsType = "ext4";
diff --git a/third_party/nixpkgs/nixos/maintainers/scripts/ec2/create-amis.sh b/third_party/nixpkgs/nixos/maintainers/scripts/ec2/create-amis.sh
index 89e24f2ccf..ec2eb53667 100755
--- a/third_party/nixpkgs/nixos/maintainers/scripts/ec2/create-amis.sh
+++ b/third_party/nixpkgs/nixos/maintainers/scripts/ec2/create-amis.sh
@@ -1,13 +1,15 @@
#!/usr/bin/env nix-shell
#!nix-shell -p awscli -p jq -p qemu -i bash
+# shellcheck shell=bash
# Uploads and registers NixOS images built from the
# amazonImage attribute. Images are uploaded and
# registered via a home region, and then copied to other regions.
-# The home region requires an s3 bucket, and a "vmimport" IAM role
-# with access to the S3 bucket. Configuration of the vmimport role is
-# documented in
+# The home region requires an s3 bucket, and an IAM role named "vmimport"
+# (by default) with access to the S3 bucket. The name can be
+# configured with the "service_role_name" variable. Configuration of the
+# vmimport role is documented in
# https://docs.aws.amazon.com/vm-import/latest/userguide/vmimport-image-import.html
# set -x
@@ -17,6 +19,7 @@ set -euo pipefail
state_dir=$HOME/amis/ec2-images
home_region=eu-west-1
bucket=nixos-amis
+service_role_name=vmimport
regions=(eu-west-1 eu-west-2 eu-west-3 eu-central-1 eu-north-1
us-east-1 us-east-2 us-west-1 us-west-2
@@ -64,7 +67,7 @@ image_logical_bytes=$(read_image_info .logical_bytes)
# Derived attributes
-image_logical_gigabytes=$((($image_logical_bytes-1)/1024/1024/1024+1)) # Round to the next GB
+image_logical_gigabytes=$(((image_logical_bytes-1)/1024/1024/1024+1)) # Round to the next GB
case "$image_system" in
aarch64-linux)
@@ -100,7 +103,7 @@ write_state() {
local type=$2
local val=$3
- mkdir -p $state_dir
+ mkdir -p "$state_dir"
echo "$val" > "$state_dir/$state_key.$type"
}
@@ -110,8 +113,8 @@ wait_for_import() {
local state snapshot_id
log "Waiting for import task $task_id to be completed"
while true; do
- read state progress snapshot_id < <(
- aws ec2 describe-import-snapshot-tasks --region $region --import-task-ids "$task_id" | \
+ read -r state progress snapshot_id < <(
+ aws ec2 describe-import-snapshot-tasks --region "$region" --import-task-ids "$task_id" | \
jq -r '.ImportSnapshotTasks[].SnapshotTaskDetail | "\(.Status) \(.Progress) \(.SnapshotId)"'
)
log " ... state=$state progress=$progress snapshot_id=$snapshot_id"
@@ -125,6 +128,8 @@ wait_for_import() {
;;
*)
log "Unexpected snapshot import state: '${state}'"
+ log "Full response: "
+ aws ec2 describe-import-snapshot-tasks --region "$region" --import-task-ids "$task_id" >&2
exit 1
;;
esac
@@ -138,8 +143,8 @@ wait_for_image() {
log "Waiting for image $ami_id to be available"
while true; do
- read state < <(
- aws ec2 describe-images --image-ids "$ami_id" --region $region | \
+ read -r state < <(
+ aws ec2 describe-images --image-ids "$ami_id" --region "$region" | \
jq -r ".Images[].State"
)
log " ... state=$state"
@@ -163,7 +168,7 @@ make_image_public() {
local region=$1
local ami_id=$2
- wait_for_image $region "$ami_id"
+ wait_for_image "$region" "$ami_id"
log "Making image $ami_id public"
@@ -177,27 +182,30 @@ upload_image() {
local aws_path=${image_file#/}
local state_key="$region.$image_label.$image_system"
- local task_id=$(read_state "$state_key" task_id)
- local snapshot_id=$(read_state "$state_key" snapshot_id)
- local ami_id=$(read_state "$state_key" ami_id)
+ local task_id
+ task_id=$(read_state "$state_key" task_id)
+ local snapshot_id
+ snapshot_id=$(read_state "$state_key" snapshot_id)
+ local ami_id
+ ami_id=$(read_state "$state_key" ami_id)
if [ -z "$task_id" ]; then
log "Checking for image on S3"
if ! aws s3 ls --region "$region" "s3://${bucket}/${aws_path}" >&2; then
log "Image missing from aws, uploading"
- aws s3 cp --region $region "$image_file" "s3://${bucket}/${aws_path}" >&2
+ aws s3 cp --region "$region" "$image_file" "s3://${bucket}/${aws_path}" >&2
fi
log "Importing image from S3 path s3://$bucket/$aws_path"
- task_id=$(aws ec2 import-snapshot --disk-container "{
+ task_id=$(aws ec2 import-snapshot --role-name "$service_role_name" --disk-container "{
\"Description\": \"nixos-image-${image_label}-${image_system}\",
\"Format\": \"vhd\",
\"UserBucket\": {
\"S3Bucket\": \"$bucket\",
\"S3Key\": \"$aws_path\"
}
- }" --region $region | jq -r '.ImportTaskId')
+ }" --region "$region" | jq -r '.ImportTaskId')
write_state "$state_key" task_id "$task_id"
fi
@@ -221,16 +229,16 @@ upload_image() {
--virtualization-type hvm
)
- block_device_mappings+=(DeviceName=/dev/sdb,VirtualName=ephemeral0)
- block_device_mappings+=(DeviceName=/dev/sdc,VirtualName=ephemeral1)
- block_device_mappings+=(DeviceName=/dev/sdd,VirtualName=ephemeral2)
- block_device_mappings+=(DeviceName=/dev/sde,VirtualName=ephemeral3)
+ block_device_mappings+=("DeviceName=/dev/sdb,VirtualName=ephemeral0")
+ block_device_mappings+=("DeviceName=/dev/sdc,VirtualName=ephemeral1")
+ block_device_mappings+=("DeviceName=/dev/sdd,VirtualName=ephemeral2")
+ block_device_mappings+=("DeviceName=/dev/sde,VirtualName=ephemeral3")
ami_id=$(
aws ec2 register-image \
--name "$image_name" \
--description "$image_description" \
- --region $region \
+ --region "$region" \
--architecture $amazon_arch \
--block-device-mappings "${block_device_mappings[@]}" \
"${extra_flags[@]}" \
@@ -240,7 +248,7 @@ upload_image() {
write_state "$state_key" ami_id "$ami_id"
fi
- make_image_public $region "$ami_id"
+ make_image_public "$region" "$ami_id"
echo "$ami_id"
}
@@ -268,7 +276,7 @@ copy_to_region() {
write_state "$state_key" ami_id "$ami_id"
fi
- make_image_public $region "$ami_id"
+ make_image_public "$region" "$ami_id"
echo "$ami_id"
}
diff --git a/third_party/nixpkgs/nixos/modules/config/fonts/fontdir.nix b/third_party/nixpkgs/nixos/modules/config/fonts/fontdir.nix
index 264d73ebaf..c4bd3a077d 100644
--- a/third_party/nixpkgs/nixos/modules/config/fonts/fontdir.nix
+++ b/third_party/nixpkgs/nixos/modules/config/fonts/fontdir.nix
@@ -8,7 +8,7 @@ let
x11Fonts = pkgs.runCommand "X11-fonts" { preferLocalBuild = true; } ''
mkdir -p "$out/share/X11/fonts"
- font_regexp='.*\.\(ttf\|otf\|pcf\|pfa\|pfb\|bdf\)\(\.gz\)?'
+ font_regexp='.*\.\(ttf\|ttc\|otf\|pcf\|pfa\|pfb\|bdf\)\(\.gz\)?'
find ${toString config.fonts.fonts} -regex "$font_regexp" \
-exec ln -sf -t "$out/share/X11/fonts" '{}' \;
cd "$out/share/X11/fonts"
diff --git a/third_party/nixpkgs/nixos/modules/installer/tools/nixos-install.sh b/third_party/nixpkgs/nixos/modules/installer/tools/nixos-install.sh
index 90555f1458..9d49d4055e 100644
--- a/third_party/nixpkgs/nixos/modules/installer/tools/nixos-install.sh
+++ b/third_party/nixpkgs/nixos/modules/installer/tools/nixos-install.sh
@@ -64,7 +64,7 @@ while [ "$#" -gt 0 ]; do
--no-bootloader)
noBootLoader=1
;;
- --show-trace)
+ --show-trace|--impure|--keep-going)
extraBuildFlags+=("$i")
;;
--help)
diff --git a/third_party/nixpkgs/nixos/modules/misc/ids.nix b/third_party/nixpkgs/nixos/modules/misc/ids.nix
index cd21a1609c..4e0f8ba718 100644
--- a/third_party/nixpkgs/nixos/modules/misc/ids.nix
+++ b/third_party/nixpkgs/nixos/modules/misc/ids.nix
@@ -468,7 +468,7 @@ in
#minecraft = 114; # unused
vault = 115;
#ripped = 116; # unused
- #murmur = 117; # unused
+ murmur = 117;
foundationdb = 118;
newrelic = 119;
starbound = 120;
diff --git a/third_party/nixpkgs/nixos/modules/module-list.nix b/third_party/nixpkgs/nixos/modules/module-list.nix
index cce4e8e74b..aa3b71a612 100644
--- a/third_party/nixpkgs/nixos/modules/module-list.nix
+++ b/third_party/nixpkgs/nixos/modules/module-list.nix
@@ -173,6 +173,7 @@
./programs/wavemon.nix
./programs/waybar.nix
./programs/wireshark.nix
+ ./programs/wshowkeys.nix
./programs/x2goserver.nix
./programs/xfs_quota.nix
./programs/xonsh.nix
diff --git a/third_party/nixpkgs/nixos/modules/programs/wshowkeys.nix b/third_party/nixpkgs/nixos/modules/programs/wshowkeys.nix
new file mode 100644
index 0000000000..09b008af1d
--- /dev/null
+++ b/third_party/nixpkgs/nixos/modules/programs/wshowkeys.nix
@@ -0,0 +1,22 @@
+{ config, lib, pkgs, ... }:
+
+with lib;
+
+let
+ cfg = config.programs.wshowkeys;
+in {
+ meta.maintainers = with maintainers; [ primeos ];
+
+ options = {
+ programs.wshowkeys = {
+ enable = mkEnableOption ''
+ wshowkeys (displays keypresses on screen on supported Wayland
+ compositors). It requires root permissions to read input events, but
+ these permissions are dropped after startup'';
+ };
+ };
+
+ config = mkIf cfg.enable {
+ security.wrappers.wshowkeys.source = "${pkgs.wshowkeys}/bin/wshowkeys";
+ };
+}
diff --git a/third_party/nixpkgs/nixos/modules/security/acme.nix b/third_party/nixpkgs/nixos/modules/security/acme.nix
index 5732620f29..47f6bead7c 100644
--- a/third_party/nixpkgs/nixos/modules/security/acme.nix
+++ b/third_party/nixpkgs/nixos/modules/security/acme.nix
@@ -63,7 +63,7 @@ let
script = with builtins; concatStringsSep "\n" (mapAttrsToList (cert: data: ''
for fixpath in /var/lib/acme/${escapeShellArg cert} /var/lib/acme/.lego/${escapeShellArg cert}; do
if [ -d "$fixpath" ]; then
- chmod -R 750 "$fixpath"
+ chmod -R u=rwX,g=rX,o= "$fixpath"
chown -R acme:${data.group} "$fixpath"
fi
done
@@ -271,7 +271,7 @@ let
mv domainhash.txt certificates/
chmod 640 certificates/*
- chmod -R 700 accounts/*
+ chmod -R u=rwX,g=,o= accounts/*
# Group might change between runs, re-apply it
chown 'acme:${data.group}' certificates/*
diff --git a/third_party/nixpkgs/nixos/modules/services/continuous-integration/hercules-ci-agent/default.nix b/third_party/nixpkgs/nixos/modules/services/continuous-integration/hercules-ci-agent/default.nix
index d2e7e8e18f..79d1ce5805 100644
--- a/third_party/nixpkgs/nixos/modules/services/continuous-integration/hercules-ci-agent/default.nix
+++ b/third_party/nixpkgs/nixos/modules/services/continuous-integration/hercules-ci-agent/default.nix
@@ -25,19 +25,18 @@ in
];
config = mkIf cfg.enable {
-
systemd.services.hercules-ci-agent = {
wantedBy = [ "multi-user.target" ];
after = [ "network-online.target" ];
wants = [ "network-online.target" ];
path = [ config.nix.package ];
+ startLimitBurst = 30 * 1000000; # practically infinite
serviceConfig = {
User = "hercules-ci-agent";
ExecStart = command;
ExecStartPre = testCommand;
Restart = "on-failure";
RestartSec = 120;
- StartLimitBurst = 30 * 1000000; # practically infinite
};
};
diff --git a/third_party/nixpkgs/nixos/modules/services/databases/postgresql.nix b/third_party/nixpkgs/nixos/modules/services/databases/postgresql.nix
index 5056d50153..f582b05927 100644
--- a/third_party/nixpkgs/nixos/modules/services/databases/postgresql.nix
+++ b/third_party/nixpkgs/nixos/modules/services/databases/postgresql.nix
@@ -69,11 +69,16 @@ in
type = types.lines;
default = "";
description = ''
- Defines how users authenticate themselves to the server. By
- default, "trust" access to local users will always be granted
- along with any other custom options. If you do not want this,
- set this option using "lib.mkForce" to override this
- behaviour.
+ Defines how users authenticate themselves to the server. See the
+
+ PostgreSQL documentation for pg_hba.conf
+ for details on the expected format of this option. By default,
+ peer based authentication will be used for users connecting
+ via the Unix socket, and md5 password authentication will be
+ used for users connecting via TCP. Any added rules will be
+ inserted above the default rules. If you'd like to replace the
+ default rules entirely, you can use lib.mkForce in your
+ module.
'';
};
diff --git a/third_party/nixpkgs/nixos/modules/services/databases/victoriametrics.nix b/third_party/nixpkgs/nixos/modules/services/databases/victoriametrics.nix
index 0af5d2adf3..5b09115bb2 100644
--- a/third_party/nixpkgs/nixos/modules/services/databases/victoriametrics.nix
+++ b/third_party/nixpkgs/nixos/modules/services/databases/victoriametrics.nix
@@ -40,10 +40,10 @@ let cfg = config.services.victoriametrics; in
systemd.services.victoriametrics = {
description = "VictoriaMetrics time series database";
after = [ "network.target" ];
+ startLimitBurst = 5;
serviceConfig = {
Restart = "on-failure";
RestartSec = 1;
- StartLimitBurst = 5;
StateDirectory = "victoriametrics";
DynamicUser = true;
ExecStart = ''
diff --git a/third_party/nixpkgs/nixos/modules/services/hardware/lcd.nix b/third_party/nixpkgs/nixos/modules/services/hardware/lcd.nix
index d78d742cd3..dc8595ea60 100644
--- a/third_party/nixpkgs/nixos/modules/services/hardware/lcd.nix
+++ b/third_party/nixpkgs/nixos/modules/services/hardware/lcd.nix
@@ -151,14 +151,13 @@ in with lib; {
description = "LCDproc - client";
after = [ "lcdd.service" ];
wantedBy = [ "lcd.target" ];
+ # Allow restarting for eternity
+ startLimitIntervalSec = lib.mkIf cfg.client.restartForever 0;
serviceConfig = serviceCfg // {
ExecStart = "${pkg}/bin/lcdproc -f -c ${clientCfg}";
# If the server is being restarted at the same time, the client will
# fail as it cannot connect, so space it out a bit.
RestartSec = "5";
- # Allow restarting for eternity
- StartLimitIntervalSec = lib.mkIf cfg.client.restartForever "0";
- StartLimitBurst = lib.mkIf cfg.client.restartForever "0";
};
};
};
diff --git a/third_party/nixpkgs/nixos/modules/services/hardware/tlp.nix b/third_party/nixpkgs/nixos/modules/services/hardware/tlp.nix
index 4230f2edd2..eb53f565a6 100644
--- a/third_party/nixpkgs/nixos/modules/services/hardware/tlp.nix
+++ b/third_party/nixpkgs/nixos/modules/services/hardware/tlp.nix
@@ -39,7 +39,7 @@ in
default = "";
description = ''
Verbatim additional configuration variables for TLP.
- DEPRECATED: use services.tlp.config instead.
+ DEPRECATED: use services.tlp.settings instead.
'';
};
};
diff --git a/third_party/nixpkgs/nixos/modules/services/hardware/undervolt.nix b/third_party/nixpkgs/nixos/modules/services/hardware/undervolt.nix
index 054ffa3505..9c2f78a755 100644
--- a/third_party/nixpkgs/nixos/modules/services/hardware/undervolt.nix
+++ b/third_party/nixpkgs/nixos/modules/services/hardware/undervolt.nix
@@ -3,7 +3,12 @@
with lib;
let
cfg = config.services.undervolt;
- cliArgs = lib.cli.toGNUCommandLineShell {} {
+
+ mkPLimit = limit: window:
+ if (isNull limit && isNull window) then null
+ else assert asserts.assertMsg (!isNull limit && !isNull window) "Both power limit and window must be set";
+ "${toString limit} ${toString window}";
+ cliArgs = lib.cli.toGNUCommandLine {} {
inherit (cfg)
verbose
temp
@@ -21,6 +26,9 @@ let
temp-bat = cfg.tempBat;
temp-ac = cfg.tempAc;
+
+ power-limit-long = mkPLimit cfg.p1.limit cfg.p1.window;
+ power-limit-short = mkPLimit cfg.p2.limit cfg.p2.window;
};
in
{
@@ -104,6 +112,40 @@ in
'';
};
+ p1.limit = mkOption {
+ type = with types; nullOr int;
+ default = null;
+ description = ''
+ The P1 Power Limit in Watts.
+ Both limit and window must be set.
+ '';
+ };
+ p1.window = mkOption {
+ type = with types; nullOr (oneOf [ float int ]);
+ default = null;
+ description = ''
+ The P1 Time Window in seconds.
+ Both limit and window must be set.
+ '';
+ };
+
+ p2.limit = mkOption {
+ type = with types; nullOr int;
+ default = null;
+ description = ''
+ The P2 Power Limit in Watts.
+ Both limit and window must be set.
+ '';
+ };
+ p2.window = mkOption {
+ type = with types; nullOr (oneOf [ float int ]);
+ default = null;
+ description = ''
+ The P2 Time Window in seconds.
+ Both limit and window must be set.
+ '';
+ };
+
useTimer = mkOption {
type = types.bool;
default = false;
@@ -133,7 +175,7 @@ in
serviceConfig = {
Type = "oneshot";
Restart = "no";
- ExecStart = "${pkgs.undervolt}/bin/undervolt ${cliArgs}";
+ ExecStart = "${pkgs.undervolt}/bin/undervolt ${toString cliArgs}";
};
};
diff --git a/third_party/nixpkgs/nixos/modules/services/mail/dovecot.nix b/third_party/nixpkgs/nixos/modules/services/mail/dovecot.nix
index f5c5f795dc..03e7e40e38 100644
--- a/third_party/nixpkgs/nixos/modules/services/mail/dovecot.nix
+++ b/third_party/nixpkgs/nixos/modules/services/mail/dovecot.nix
@@ -427,12 +427,12 @@ in
wantedBy = [ "multi-user.target" ];
restartTriggers = [ cfg.configFile modulesDir ];
+ startLimitIntervalSec = 60; # 1 min
serviceConfig = {
ExecStart = "${dovecotPkg}/sbin/dovecot -F";
ExecReload = "${dovecotPkg}/sbin/doveadm reload";
Restart = "on-failure";
RestartSec = "1s";
- StartLimitInterval = "1min";
RuntimeDirectory = [ "dovecot2" ];
};
diff --git a/third_party/nixpkgs/nixos/modules/services/misc/autorandr.nix b/third_party/nixpkgs/nixos/modules/services/misc/autorandr.nix
index cf7fb5f78d..dfb418af6e 100644
--- a/third_party/nixpkgs/nixos/modules/services/misc/autorandr.nix
+++ b/third_party/nixpkgs/nixos/modules/services/misc/autorandr.nix
@@ -37,9 +37,9 @@ in {
description = "Autorandr execution hook";
after = [ "sleep.target" ];
+ startLimitIntervalSec = 5;
+ startLimitBurst = 1;
serviceConfig = {
- StartLimitInterval = 5;
- StartLimitBurst = 1;
ExecStart = "${pkgs.autorandr}/bin/autorandr --batch --change --default ${cfg.defaultTarget}";
Type = "oneshot";
RemainAfterExit = false;
diff --git a/third_party/nixpkgs/nixos/modules/services/misc/cgminer.nix b/third_party/nixpkgs/nixos/modules/services/misc/cgminer.nix
index 7635c2a0f4..fa9c8c5450 100644
--- a/third_party/nixpkgs/nixos/modules/services/misc/cgminer.nix
+++ b/third_party/nixpkgs/nixos/modules/services/misc/cgminer.nix
@@ -126,12 +126,12 @@ in
GPU_USE_SYNC_OBJECTS = "1";
};
+ startLimitIntervalSec = 60; # 1 min
serviceConfig = {
ExecStart = "${pkgs.cgminer}/bin/cgminer --syslog --text-only --config ${cgminerConfig}";
User = cfg.user;
RestartSec = "30s";
Restart = "always";
- StartLimitInterval = "1m";
};
};
diff --git a/third_party/nixpkgs/nixos/modules/services/misc/safeeyes.nix b/third_party/nixpkgs/nixos/modules/services/misc/safeeyes.nix
index 6ecb0d1318..1e748195e4 100644
--- a/third_party/nixpkgs/nixos/modules/services/misc/safeeyes.nix
+++ b/third_party/nixpkgs/nixos/modules/services/misc/safeeyes.nix
@@ -32,14 +32,14 @@ in
wantedBy = [ "graphical-session.target" ];
partOf = [ "graphical-session.target" ];
+ startLimitIntervalSec = 350;
+ startLimitBurst = 10;
serviceConfig = {
ExecStart = ''
${pkgs.safeeyes}/bin/safeeyes
'';
Restart = "on-failure";
RestartSec = 3;
- StartLimitInterval = 350;
- StartLimitBurst = 10;
};
};
diff --git a/third_party/nixpkgs/nixos/modules/services/monitoring/prometheus/default.nix b/third_party/nixpkgs/nixos/modules/services/monitoring/prometheus/default.nix
index 98aaa9c0f0..7242895710 100644
--- a/third_party/nixpkgs/nixos/modules/services/monitoring/prometheus/default.nix
+++ b/third_party/nixpkgs/nixos/modules/services/monitoring/prometheus/default.nix
@@ -45,7 +45,7 @@ let
cmdlineArgs = cfg.extraFlags ++ [
"--storage.tsdb.path=${workingDir}/data/"
- "--config.file=${prometheusYml}"
+ "--config.file=/run/prometheus/prometheus-substituted.yaml"
"--web.listen-address=${cfg.listenAddress}:${builtins.toString cfg.port}"
"--alertmanager.notification-queue-capacity=${toString cfg.alertmanagerNotificationQueueCapacity}"
"--alertmanager.timeout=${toString cfg.alertmanagerTimeout}s"
@@ -522,6 +522,45 @@ in {
'';
};
+ environmentFile = mkOption {
+ type = types.nullOr types.path;
+ default = null;
+ example = "/root/prometheus.env";
+ description = ''
+ Environment file as defined in
+ systemd.exec5
+ .
+
+ Secrets may be passed to the service without adding them to the
+ world-readable Nix store, by specifying placeholder variables as
+ the option value in Nix and setting these variables accordingly in the
+ environment file.
+
+ Environment variables from this file will be interpolated into the
+ config file using envsubst with this syntax:
+ $ENVIRONMENT ''${VARIABLE}
+
+
+ # Example scrape config entry handling an OAuth bearer token
+ {
+ job_name = "home_assistant";
+ metrics_path = "/api/prometheus";
+ scheme = "https";
+ bearer_token = "\''${HOME_ASSISTANT_BEARER_TOKEN}";
+ [...]
+ }
+
+
+
+ # Content of the environment file
+ HOME_ASSISTANT_BEARER_TOKEN=someoauthbearertoken
+
+
+ Note that this file needs to be available on the host on which
+ Prometheus is running.
+ '';
+ };
+
configText = mkOption {
type = types.nullOr types.lines;
default = null;
@@ -662,12 +701,19 @@ in {
systemd.services.prometheus = {
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
+ preStart = ''
+ ${lib.getBin pkgs.envsubst}/bin/envsubst -o "/run/prometheus/prometheus-substituted.yaml" \
+ -i "${prometheusYml}"
+ '';
serviceConfig = {
ExecStart = "${cfg.package}/bin/prometheus" +
optionalString (length cmdlineArgs != 0) (" \\\n " +
concatStringsSep " \\\n " cmdlineArgs);
User = "prometheus";
Restart = "always";
+ EnvironmentFile = mkIf (cfg.environmentFile != null) [ cfg.environmentFile ];
+ RuntimeDirectory = "prometheus";
+ RuntimeDirectoryMode = "0700";
WorkingDirectory = workingDir;
StateDirectory = cfg.stateDir;
};
diff --git a/third_party/nixpkgs/nixos/modules/services/monitoring/teamviewer.nix b/third_party/nixpkgs/nixos/modules/services/monitoring/teamviewer.nix
index 8d781d82d0..ce9e57a187 100644
--- a/third_party/nixpkgs/nixos/modules/services/monitoring/teamviewer.nix
+++ b/third_party/nixpkgs/nixos/modules/services/monitoring/teamviewer.nix
@@ -31,14 +31,14 @@ in
after = [ "NetworkManager-wait-online.service" "network.target" ];
preStart = "mkdir -pv /var/lib/teamviewer /var/log/teamviewer";
+ startLimitIntervalSec = 60;
+ startLimitBurst = 10;
serviceConfig = {
Type = "forking";
ExecStart = "${pkgs.teamviewer}/bin/teamviewerd -d";
PIDFile = "/run/teamviewerd.pid";
ExecReload = "${pkgs.coreutils}/bin/kill -HUP $MAINPID";
Restart = "on-abort";
- StartLimitInterval = "60";
- StartLimitBurst = "10";
};
};
};
diff --git a/third_party/nixpkgs/nixos/modules/services/network-filesystems/ceph.nix b/third_party/nixpkgs/nixos/modules/services/network-filesystems/ceph.nix
index d17959a6a3..f2dc740fd8 100644
--- a/third_party/nixpkgs/nixos/modules/services/network-filesystems/ceph.nix
+++ b/third_party/nixpkgs/nixos/modules/services/network-filesystems/ceph.nix
@@ -28,6 +28,9 @@ let
# Don't start services that are not yet initialized
unitConfig.ConditionPathExists = "/var/lib/${stateDirectory}/keyring";
+ startLimitBurst =
+ if daemonType == "osd" then 30 else if lib.elem daemonType ["mgr" "mds"] then 3 else 5;
+ startLimitIntervalSec = 60 * 30; # 30 mins
serviceConfig = {
LimitNOFILE = 1048576;
@@ -39,8 +42,6 @@ let
ProtectHome = "true";
ProtectSystem = "full";
Restart = "on-failure";
- StartLimitBurst = "5";
- StartLimitInterval = "30min";
StateDirectory = stateDirectory;
User = "ceph";
Group = if daemonType == "osd" then "disk" else "ceph";
@@ -48,13 +49,10 @@ let
-f --cluster ${clusterName} --id ${daemonId}'';
} // optionalAttrs (daemonType == "osd") {
ExecStartPre = ''${ceph.lib}/libexec/ceph/ceph-osd-prestart.sh --id ${daemonId} --cluster ${clusterName}'';
- StartLimitBurst = "30";
RestartSec = "20s";
PrivateDevices = "no"; # osd needs disk access
} // optionalAttrs ( daemonType == "mon") {
RestartSec = "10";
- } // optionalAttrs (lib.elem daemonType ["mgr" "mds"]) {
- StartLimitBurst = "3";
};
});
diff --git a/third_party/nixpkgs/nixos/modules/services/networking/babeld.nix b/third_party/nixpkgs/nixos/modules/services/networking/babeld.nix
index e62c74d006..90395dbd3c 100644
--- a/third_party/nixpkgs/nixos/modules/services/networking/babeld.nix
+++ b/third_party/nixpkgs/nixos/modules/services/networking/babeld.nix
@@ -87,9 +87,37 @@ in
description = "Babel routing daemon";
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
- serviceConfig.ExecStart = "${pkgs.babeld}/bin/babeld -c ${configFile}";
+ serviceConfig = {
+ ExecStart = "${pkgs.babeld}/bin/babeld -c ${configFile} -I /run/babeld/babeld.pid -S /var/lib/babeld/state";
+ CapabilityBoundingSet = [ "CAP_NET_ADMIN" ];
+ IPAddressAllow = [ "fe80::/64" "ff00::/8" "::1/128" "127.0.0.0/8" ];
+ IPAddressDeny = "any";
+ LockPersonality = true;
+ NoNewPrivileges = true;
+ MemoryDenyWriteExecute = true;
+ ProtectSystem = "strict";
+ ProtectClock = true;
+ ProtectKernelTunables = false; # Couldn't write sysctl: Read-only file system
+ ProtectKernelModules = true;
+ ProtectKernelLogs = true;
+ ProtectControlGroups = true;
+ RestrictAddressFamilies = [ "AF_NETLINK" "AF_INET6" ];
+ RestrictNamespaces = true;
+ RestrictRealtime = true;
+ RestrictSUIDSGID = true;
+ RemoveIPC = true;
+ ProtectHome = true;
+ ProtectHostname = true;
+ PrivateMounts = true;
+ PrivateTmp = true;
+ PrivateDevices = true;
+ PrivateUsers = false; # kernel_route(ADD): Operation not permitted
+ SystemCallArchitectures = "native";
+ SystemCallFilter = [ "@system-service" ];
+ UMask = "0177";
+ RuntimeDirectory = "babeld";
+ StateDirectory = "babeld";
+ };
};
-
};
-
}
diff --git a/third_party/nixpkgs/nixos/modules/services/networking/blockbook-frontend.nix b/third_party/nixpkgs/nixos/modules/services/networking/blockbook-frontend.nix
index dde2452275..ca323e495e 100644
--- a/third_party/nixpkgs/nixos/modules/services/networking/blockbook-frontend.nix
+++ b/third_party/nixpkgs/nixos/modules/services/networking/blockbook-frontend.nix
@@ -158,15 +158,21 @@ let
type = types.attrs;
default = {};
example = literalExample '' {
- alternative_estimate_fee = "whatthefee-disabled";
- alternative_estimate_fee_params = "{\"url\": \"https://whatthefee.io/data.json\", \"periodSeconds\": 60}";
- fiat_rates = "coingecko";
- fiat_rates_params = "{\"url\": \"https://api.coingecko.com/api/v3\", \"coin\": \"bitcoin\", \"periodSeconds\": 60}";
- coin_shortcut = "BTC";
- coin_label = "Bitcoin";
- xpub_magic = 76067358;
- xpub_magic_segwit_p2sh = 77429938;
- xpub_magic_segwit_native = 78792518;
+ "alternative_estimate_fee" = "whatthefee-disabled";
+ "alternative_estimate_fee_params" = "{\"url\": \"https://whatthefee.io/data.json\", \"periodSeconds\": 60}";
+ "fiat_rates" = "coingecko";
+ "fiat_rates_params" = "{\"url\": \"https://api.coingecko.com/api/v3\", \"coin\": \"bitcoin\", \"periodSeconds\": 60}";
+ "coin_shortcut" = "BTC";
+ "coin_label" = "Bitcoin";
+ "parse" = true;
+ "subversion" = "";
+ "address_format" = "";
+ "xpub_magic" = 76067358;
+ "xpub_magic_segwit_p2sh" = 77429938;
+ "xpub_magic_segwit_native" = 78792518;
+ "mempool_workers" = 8;
+ "mempool_sub_workers" = 2;
+ "block_addresses_to_keep" = 300;
}'';
description = ''
Additional configurations to be appended to coin.conf.
diff --git a/third_party/nixpkgs/nixos/modules/services/networking/cjdns.nix b/third_party/nixpkgs/nixos/modules/services/networking/cjdns.nix
index 5f8ac96b22..f116d6392e 100644
--- a/third_party/nixpkgs/nixos/modules/services/networking/cjdns.nix
+++ b/third_party/nixpkgs/nixos/modules/services/networking/cjdns.nix
@@ -264,10 +264,10 @@ in
''
);
+ startLimitIntervalSec = 0;
serviceConfig = {
Type = "forking";
Restart = "always";
- StartLimitInterval = 0;
RestartSec = 1;
CapabilityBoundingSet = "CAP_NET_ADMIN CAP_NET_RAW CAP_SETUID";
ProtectSystem = true;
diff --git a/third_party/nixpkgs/nixos/modules/services/networking/dnsdist.nix b/third_party/nixpkgs/nixos/modules/services/networking/dnsdist.nix
index c48835e736..05c2bdef83 100644
--- a/third_party/nixpkgs/nixos/modules/services/networking/dnsdist.nix
+++ b/third_party/nixpkgs/nixos/modules/services/networking/dnsdist.nix
@@ -41,6 +41,7 @@ in {
systemd.services.dnsdist = {
wantedBy = [ "multi-user.target" ];
+ startLimitIntervalSec = 0;
serviceConfig = {
DynamicUser = true;
diff --git a/third_party/nixpkgs/nixos/modules/services/networking/mullvad-vpn.nix b/third_party/nixpkgs/nixos/modules/services/networking/mullvad-vpn.nix
index cc98414257..d9e6e57c92 100644
--- a/third_party/nixpkgs/nixos/modules/services/networking/mullvad-vpn.nix
+++ b/third_party/nixpkgs/nixos/modules/services/networking/mullvad-vpn.nix
@@ -29,9 +29,9 @@ with lib;
# Needed for ping
"/run/wrappers"
];
+ startLimitBurst = 5;
+ startLimitIntervalSec = 20;
serviceConfig = {
- StartLimitBurst = 5;
- StartLimitIntervalSec = 20;
ExecStart = "${pkgs.mullvad-vpn}/bin/mullvad-daemon -v --disable-stdout-timestamps";
Restart = "always";
RestartSec = 1;
diff --git a/third_party/nixpkgs/nixos/modules/services/networking/murmur.nix b/third_party/nixpkgs/nixos/modules/services/networking/murmur.nix
index b384f43686..c6e5649ec4 100644
--- a/third_party/nixpkgs/nixos/modules/services/networking/murmur.nix
+++ b/third_party/nixpkgs/nixos/modules/services/networking/murmur.nix
@@ -278,6 +278,10 @@ in
home = "/var/lib/murmur";
createHome = true;
uid = config.ids.uids.murmur;
+ group = "murmur";
+ };
+ users.groups.murmur = {
+ gid = config.ids.gids.murmur;
};
systemd.services.murmur = {
@@ -300,6 +304,7 @@ in
RuntimeDirectory = "murmur";
RuntimeDirectoryMode = "0700";
User = "murmur";
+ Group = "murmur";
};
};
};
diff --git a/third_party/nixpkgs/nixos/modules/services/networking/namecoind.nix b/third_party/nixpkgs/nixos/modules/services/networking/namecoind.nix
index 16f85df2e7..4966ed2cac 100644
--- a/third_party/nixpkgs/nixos/modules/services/networking/namecoind.nix
+++ b/third_party/nixpkgs/nixos/modules/services/networking/namecoind.nix
@@ -165,6 +165,8 @@ in
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
+ startLimitIntervalSec = 120;
+ startLimitBurst = 5;
serviceConfig = {
User = "namecoin";
Group = "namecoin";
@@ -176,8 +178,6 @@ in
TimeoutStopSec = "60s";
TimeoutStartSec = "2s";
Restart = "always";
- StartLimitInterval = "120s";
- StartLimitBurst = "5";
};
preStart = optionalString (cfg.wallet != "${dataDir}/wallet.dat") ''
diff --git a/third_party/nixpkgs/nixos/modules/services/networking/nextdns.nix b/third_party/nixpkgs/nixos/modules/services/networking/nextdns.nix
index a633bff62e..b070eeec89 100644
--- a/third_party/nixpkgs/nixos/modules/services/networking/nextdns.nix
+++ b/third_party/nixpkgs/nixos/modules/services/networking/nextdns.nix
@@ -28,9 +28,9 @@ in {
environment = {
SERVICE_RUN_MODE = "1";
};
+ startLimitIntervalSec = 5;
+ startLimitBurst = 10;
serviceConfig = {
- StartLimitInterval = 5;
- StartLimitBurst = 10;
ExecStart = "${pkgs.nextdns}/bin/nextdns run ${escapeShellArgs config.services.nextdns.arguments}";
RestartSec = 120;
LimitMEMLOCK = "infinity";
diff --git a/third_party/nixpkgs/nixos/modules/services/networking/nix-store-gcs-proxy.nix b/third_party/nixpkgs/nixos/modules/services/networking/nix-store-gcs-proxy.nix
index 3f2ce5bca4..0012302db2 100644
--- a/third_party/nixpkgs/nixos/modules/services/networking/nix-store-gcs-proxy.nix
+++ b/third_party/nixpkgs/nixos/modules/services/networking/nix-store-gcs-proxy.nix
@@ -42,9 +42,9 @@ in
description = "A HTTP nix store that proxies requests to Google Storage";
wantedBy = ["multi-user.target"];
+ startLimitIntervalSec = 10;
serviceConfig = {
RestartSec = 5;
- StartLimitInterval = 10;
ExecStart = ''
${pkgs.nix-store-gcs-proxy}/bin/nix-store-gcs-proxy \
--bucket-name ${cfg.bucketName} \
diff --git a/third_party/nixpkgs/nixos/modules/services/networking/nsd.nix b/third_party/nixpkgs/nixos/modules/services/networking/nsd.nix
index 3ecbd06ee4..f33c350a25 100644
--- a/third_party/nixpkgs/nixos/modules/services/networking/nsd.nix
+++ b/third_party/nixpkgs/nixos/modules/services/networking/nsd.nix
@@ -916,14 +916,14 @@ in
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
+ startLimitBurst = 4;
+ startLimitIntervalSec = 5 * 60; # 5 mins
serviceConfig = {
ExecStart = "${nsdPkg}/sbin/nsd -d -c ${nsdEnv}/nsd.conf";
StandardError = "null";
PIDFile = pidFile;
Restart = "always";
RestartSec = "4s";
- StartLimitBurst = 4;
- StartLimitInterval = "5min";
};
preStart = ''
diff --git a/third_party/nixpkgs/nixos/modules/services/networking/supybot.nix b/third_party/nixpkgs/nixos/modules/services/networking/supybot.nix
index dc9fb31ffd..7a62e04ec7 100644
--- a/third_party/nixpkgs/nixos/modules/services/networking/supybot.nix
+++ b/third_party/nixpkgs/nixos/modules/services/networking/supybot.nix
@@ -103,6 +103,8 @@ in
rm -f '${cfg.stateDir}/supybot.cfg.bak'
'';
+ startLimitIntervalSec = 5 * 60; # 5 min
+ startLimitBurst = 1;
serviceConfig = {
ExecStart = "${pyEnv}/bin/supybot ${cfg.stateDir}/supybot.cfg";
PIDFile = "/run/supybot.pid";
@@ -110,8 +112,6 @@ in
Group = "supybot";
UMask = "0007";
Restart = "on-abort";
- StartLimitInterval = "5m";
- StartLimitBurst = "1";
NoNewPrivileges = true;
PrivateDevices = true;
diff --git a/third_party/nixpkgs/nixos/modules/services/networking/tailscale.nix b/third_party/nixpkgs/nixos/modules/services/networking/tailscale.nix
index 4d6aeb75eb..4419c8a060 100644
--- a/third_party/nixpkgs/nixos/modules/services/networking/tailscale.nix
+++ b/third_party/nixpkgs/nixos/modules/services/networking/tailscale.nix
@@ -17,6 +17,7 @@ in {
};
config = mkIf cfg.enable {
+ environment.systemPackages = [ pkgs.tailscale ]; # for the CLI
systemd.services.tailscale = {
description = "Tailscale client daemon";
@@ -24,10 +25,7 @@ in {
wants = [ "network-pre.target" ];
wantedBy = [ "multi-user.target" ];
- unitConfig = {
- StartLimitIntervalSec = 0;
- StartLimitBurst = 0;
- };
+ startLimitIntervalSec = 0;
serviceConfig = {
ExecStart =
diff --git a/third_party/nixpkgs/nixos/modules/services/security/vault.nix b/third_party/nixpkgs/nixos/modules/services/security/vault.nix
index 6a8a3a9332..64622454b9 100644
--- a/third_party/nixpkgs/nixos/modules/services/security/vault.nix
+++ b/third_party/nixpkgs/nixos/modules/services/security/vault.nix
@@ -131,6 +131,8 @@ in
restartIfChanged = false; # do not restart on "nixos-rebuild switch". It would seal the storage and disrupt the clients.
+ startLimitIntervalSec = 60;
+ startLimitBurst = 3;
serviceConfig = {
User = "vault";
Group = "vault";
@@ -145,8 +147,6 @@ in
KillSignal = "SIGINT";
TimeoutStopSec = "30s";
Restart = "on-failure";
- StartLimitInterval = "60s";
- StartLimitBurst = 3;
};
unitConfig.RequiresMountsFor = optional (cfg.storagePath != null) cfg.storagePath;
diff --git a/third_party/nixpkgs/nixos/modules/services/torrent/transmission.nix b/third_party/nixpkgs/nixos/modules/services/torrent/transmission.nix
index 014a22bb5a..aeb58a7194 100644
--- a/third_party/nixpkgs/nixos/modules/services/torrent/transmission.nix
+++ b/third_party/nixpkgs/nixos/modules/services/torrent/transmission.nix
@@ -197,7 +197,7 @@ in
install -D -m 600 -o '${cfg.user}' -g '${cfg.group}' /dev/stdin \
'${cfg.home}/${settingsDir}/settings.json'
'')];
- ExecStart="${pkgs.transmission}/bin/transmission-daemon -f";
+ ExecStart="${pkgs.transmission}/bin/transmission-daemon -f -g ${cfg.home}/${settingsDir}";
ExecReload = "${pkgs.coreutils}/bin/kill -HUP $MAINPID";
User = cfg.user;
Group = cfg.group;
diff --git a/third_party/nixpkgs/nixos/modules/services/web-apps/engelsystem.nix b/third_party/nixpkgs/nixos/modules/services/web-apps/engelsystem.nix
index 899582a203..2e755ae9d5 100644
--- a/third_party/nixpkgs/nixos/modules/services/web-apps/engelsystem.nix
+++ b/third_party/nixpkgs/nixos/modules/services/web-apps/engelsystem.nix
@@ -10,7 +10,7 @@ in {
default = false;
example = true;
description = ''
- Whether to enable engelsystem, an online tool for coordinating helpers
+ Whether to enable engelsystem, an online tool for coordinating volunteers
and shifts on large events.
'';
type = lib.types.bool;
diff --git a/third_party/nixpkgs/nixos/modules/services/web-apps/moinmoin.nix b/third_party/nixpkgs/nixos/modules/services/web-apps/moinmoin.nix
index dc7abce2a5..3a876f75f4 100644
--- a/third_party/nixpkgs/nixos/modules/services/web-apps/moinmoin.nix
+++ b/third_party/nixpkgs/nixos/modules/services/web-apps/moinmoin.nix
@@ -224,6 +224,8 @@ in
chmod -R u+w ${dataDir}/${wikiIdent}/underlay
'';
+ startLimitIntervalSec = 30;
+
serviceConfig = {
User = user;
Group = group;
@@ -237,7 +239,6 @@ in
Restart = "on-failure";
RestartSec = "2s";
- StartLimitIntervalSec = "30s";
StateDirectory = "moin/${wikiIdent}";
StateDirectoryMode = "0750";
diff --git a/third_party/nixpkgs/nixos/modules/services/web-apps/nextcloud.nix b/third_party/nixpkgs/nixos/modules/services/web-apps/nextcloud.nix
index bad1bd9c76..53c2ab76fd 100644
--- a/third_party/nixpkgs/nixos/modules/services/web-apps/nextcloud.nix
+++ b/third_party/nixpkgs/nixos/modules/services/web-apps/nextcloud.nix
@@ -549,9 +549,7 @@ in {
};
"/" = {
priority = 900;
- extraConfig = if major < 20
- then "rewrite ^ /index.php;"
- else "try_files $uri $uri/ /index.php$request_uri;";
+ extraConfig = "rewrite ^ /index.php;";
};
"~ ^/store-apps" = {
priority = 201;
@@ -575,7 +573,7 @@ in {
"~ ^/(?:\\.|autotest|occ|issue|indie|db_|console)".extraConfig = ''
return 404;
'';
- ${if major < 20 then "~ ^\\/(?:index|remote|public|cron|core\\/ajax\\/update|status|ocs\\/v[12]|updater\\/.+|oc[ms]-provider\\/.+|.+\\/richdocumentscode\\/proxy)\\.php(?:$|\\/)" else "~ \\.php(?:$|/)"} = {
+ "~ ^\\/(?:index|remote|public|cron|core\\/ajax\\/update|status|ocs\\/v[12]|updater\\/.+|oc[ms]-provider\\/.+|.+\\/richdocumentscode\\/proxy)\\.php(?:$|\\/)" = {
priority = 500;
extraConfig = ''
include ${config.services.nginx.package}/conf/fastcgi.conf;
diff --git a/third_party/nixpkgs/nixos/modules/services/web-apps/shiori.nix b/third_party/nixpkgs/nixos/modules/services/web-apps/shiori.nix
index 1817a20393..9083ddfa22 100644
--- a/third_party/nixpkgs/nixos/modules/services/web-apps/shiori.nix
+++ b/third_party/nixpkgs/nixos/modules/services/web-apps/shiori.nix
@@ -37,11 +37,60 @@ in {
description = "Shiori simple bookmarks manager";
wantedBy = [ "multi-user.target" ];
+ environment.SHIORI_DIR = "/var/lib/shiori";
+
serviceConfig = {
ExecStart = "${package}/bin/shiori serve --address '${address}' --port '${toString port}'";
+
DynamicUser = true;
- Environment = "SHIORI_DIR=/var/lib/shiori";
StateDirectory = "shiori";
+ # As the RootDirectory
+ RuntimeDirectory = "shiori";
+
+ # Security options
+
+ BindReadOnlyPaths = [
+ "/nix/store"
+
+ # For SSL certificates, and the resolv.conf
+ "/etc"
+ ];
+
+ CapabilityBoundingSet = "";
+
+ DeviceAllow = "";
+
+ LockPersonality = true;
+
+ MemoryDenyWriteExecute = true;
+
+ PrivateDevices = true;
+ PrivateUsers = true;
+
+ ProtectClock = true;
+ ProtectControlGroups = true;
+ ProtectHome = true;
+ ProtectHostname = true;
+ ProtectKernelLogs = true;
+ ProtectKernelModules = true;
+ ProtectKernelTunables = true;
+
+ RestrictNamespaces = true;
+ RestrictAddressFamilies = [ "AF_INET" "AF_INET6" ];
+ RestrictRealtime = true;
+ RestrictSUIDSGID = true;
+
+ RootDirectory = "/run/shiori";
+
+ SystemCallArchitectures = "native";
+ SystemCallErrorNumber = "EPERM";
+ SystemCallFilter = [
+ "@system-service"
+
+ "~@chown" "~@cpu-emulation" "~@debug" "~@ipc" "~@keyring" "~@memlock"
+ "~@module" "~@obsolete" "~@privileged" "~@process" "~@raw-io"
+ "~@resources" "~@setuid"
+ ];
};
};
};
diff --git a/third_party/nixpkgs/nixos/modules/services/web-servers/caddy.nix b/third_party/nixpkgs/nixos/modules/services/web-servers/caddy.nix
index 72bf9a9a1f..297b732733 100644
--- a/third_party/nixpkgs/nixos/modules/services/web-servers/caddy.nix
+++ b/third_party/nixpkgs/nixos/modules/services/web-servers/caddy.nix
@@ -24,6 +24,10 @@ let
${pkgs.jq}/bin/jq -s '.[0] * .[1]' ${adaptedConfig} ${tlsJSON} > $out
'';
in {
+ imports = [
+ (mkRemovedOptionModule [ "services" "caddy" "agree" ] "this option is no longer necessary for Caddy 2")
+ ];
+
options.services.caddy = {
enable = mkEnableOption "Caddy web server";
@@ -66,12 +70,6 @@ in {
description = "Email address (for Let's Encrypt certificate)";
};
- agree = mkOption {
- default = false;
- type = types.bool;
- description = "Agree to Let's Encrypt Subscriber Agreement";
- };
-
dataDir = mkOption {
default = "/var/lib/caddy";
type = types.path;
@@ -103,6 +101,8 @@ in {
after = [ "network-online.target" ];
wants = [ "network-online.target" ]; # systemd-networkd-wait-online.service
wantedBy = [ "multi-user.target" ];
+ startLimitIntervalSec = 14400;
+ startLimitBurst = 10;
serviceConfig = {
ExecStart = "${cfg.package}/bin/caddy run --config ${configJSON}";
ExecReload = "${cfg.package}/bin/caddy reload --config ${configJSON}";
@@ -110,8 +110,6 @@ in {
User = "caddy";
Group = "caddy";
Restart = "on-abnormal";
- StartLimitIntervalSec = 14400;
- StartLimitBurst = 10;
AmbientCapabilities = "cap_net_bind_service";
CapabilityBoundingSet = "cap_net_bind_service";
NoNewPrivileges = true;
diff --git a/third_party/nixpkgs/nixos/modules/services/web-servers/nginx/default.nix b/third_party/nixpkgs/nixos/modules/services/web-servers/nginx/default.nix
index 631e92fd6e..e9630d379f 100644
--- a/third_party/nixpkgs/nixos/modules/services/web-servers/nginx/default.nix
+++ b/third_party/nixpkgs/nixos/modules/services/web-servers/nginx/default.nix
@@ -261,10 +261,7 @@ let
ssl_trusted_certificate ${vhost.sslTrustedCertificate};
''}
- ${optionalString (vhost.basicAuthFile != null || vhost.basicAuth != {}) ''
- auth_basic secured;
- auth_basic_user_file ${if vhost.basicAuthFile != null then vhost.basicAuthFile else mkHtpasswd vhostName vhost.basicAuth};
- ''}
+ ${mkBasicAuth vhostName vhost}
${mkLocations vhost.locations}
@@ -293,9 +290,19 @@ let
${optionalString (config.return != null) "return ${config.return};"}
${config.extraConfig}
${optionalString (config.proxyPass != null && cfg.recommendedProxySettings) "include ${recommendedProxyConfig};"}
+ ${mkBasicAuth "sublocation" config}
}
'') (sortProperties (mapAttrsToList (k: v: v // { location = k; }) locations)));
- mkHtpasswd = vhostName: authDef: pkgs.writeText "${vhostName}.htpasswd" (
+
+ mkBasicAuth = name: zone: optionalString (zone.basicAuthFile != null || zone.basicAuth != {}) (let
+ auth_file = if zone.basicAuthFile != null
+ then zone.basicAuthFile
+ else mkHtpasswd name zone.basicAuth;
+ in ''
+ auth_basic secured;
+ auth_basic_user_file ${auth_file};
+ '');
+ mkHtpasswd = name: authDef: pkgs.writeText "${name}.htpasswd" (
concatStringsSep "\n" (mapAttrsToList (user: password: ''
${user}:{PLAIN}${password}
'') authDef)
@@ -693,6 +700,8 @@ in
${cfg.preStart}
${execCommand} -t
'';
+
+ startLimitIntervalSec = 60;
serviceConfig = {
ExecStart = execCommand;
ExecReload = [
@@ -701,7 +710,6 @@ in
];
Restart = "always";
RestartSec = "10s";
- StartLimitInterval = "1min";
# User and group
User = cfg.user;
Group = cfg.group;
diff --git a/third_party/nixpkgs/nixos/modules/services/web-servers/nginx/location-options.nix b/third_party/nixpkgs/nixos/modules/services/web-servers/nginx/location-options.nix
index 3d9e391ecf..f2fc072557 100644
--- a/third_party/nixpkgs/nixos/modules/services/web-servers/nginx/location-options.nix
+++ b/third_party/nixpkgs/nixos/modules/services/web-servers/nginx/location-options.nix
@@ -9,6 +9,34 @@ with lib;
{
options = {
+ basicAuth = mkOption {
+ type = types.attrsOf types.str;
+ default = {};
+ example = literalExample ''
+ {
+ user = "password";
+ };
+ '';
+ description = ''
+ Basic Auth protection for a vhost.
+
+ WARNING: This is implemented to store the password in plain text in the
+ Nix store.
+ '';
+ };
+
+ basicAuthFile = mkOption {
+ type = types.nullOr types.path;
+ default = null;
+ description = ''
+ Basic Auth password file for a vhost.
+ Can be created via: htpasswd -c <filename> <username>.
+
+ WARNING: The generate file contains the users' passwords in a
+ non-cryptographically-securely hashed way.
+ '';
+ };
+
proxyPass = mkOption {
type = types.nullOr types.str;
default = null;
diff --git a/third_party/nixpkgs/nixos/modules/services/web-servers/nginx/vhost-options.nix b/third_party/nixpkgs/nixos/modules/services/web-servers/nginx/vhost-options.nix
index 455854e2a9..cf211ea9a7 100644
--- a/third_party/nixpkgs/nixos/modules/services/web-servers/nginx/vhost-options.nix
+++ b/third_party/nixpkgs/nixos/modules/services/web-servers/nginx/vhost-options.nix
@@ -198,7 +198,7 @@ with lib;
Basic Auth protection for a vhost.
WARNING: This is implemented to store the password in plain text in the
- nix store.
+ Nix store.
'';
};
@@ -207,7 +207,10 @@ with lib;
default = null;
description = ''
Basic Auth password file for a vhost.
- Can be created via: htpasswd -c <filename> <username>
+ Can be created via: htpasswd -c <filename> <username>.
+
+ WARNING: The generate file contains the users' passwords in a
+ non-cryptographically-securely hashed way.
'';
};
diff --git a/third_party/nixpkgs/nixos/modules/services/web-servers/traefik.nix b/third_party/nixpkgs/nixos/modules/services/web-servers/traefik.nix
index 4ab7307c3b..3d29199dd4 100644
--- a/third_party/nixpkgs/nixos/modules/services/web-servers/traefik.nix
+++ b/third_party/nixpkgs/nixos/modules/services/web-servers/traefik.nix
@@ -136,6 +136,8 @@ in {
description = "Traefik web server";
after = [ "network-online.target" ];
wantedBy = [ "multi-user.target" ];
+ startLimitIntervalSec = 86400;
+ startLimitBurst = 5;
serviceConfig = {
ExecStart =
"${cfg.package}/bin/traefik --configfile=${staticConfigFile}";
@@ -143,8 +145,6 @@ in {
User = "traefik";
Group = cfg.group;
Restart = "on-failure";
- StartLimitInterval = 86400;
- StartLimitBurst = 5;
AmbientCapabilities = "cap_net_bind_service";
CapabilityBoundingSet = "cap_net_bind_service";
NoNewPrivileges = true;
diff --git a/third_party/nixpkgs/nixos/modules/services/x11/desktop-managers/plasma5.nix b/third_party/nixpkgs/nixos/modules/services/x11/desktop-managers/plasma5.nix
index ad0385ddee..b4f45a24ef 100644
--- a/third_party/nixpkgs/nixos/modules/services/x11/desktop-managers/plasma5.nix
+++ b/third_party/nixpkgs/nixos/modules/services/x11/desktop-managers/plasma5.nix
@@ -200,7 +200,7 @@ in
security.wrappers = {
kcheckpass.source = "${lib.getBin plasma5.kscreenlocker}/libexec/kcheckpass";
- start_kdeinit.source = "${lib.getBin pkgs.kinit}/libexec/kf5/start_kdeinit";
+ start_kdeinit.source = "${lib.getBin pkgs.kdeFrameworks.kinit}/libexec/kf5/start_kdeinit";
kwin_wayland = {
source = "${lib.getBin plasma5.kwin}/bin/kwin_wayland";
capabilities = "cap_sys_nice+ep";
diff --git a/third_party/nixpkgs/nixos/modules/services/x11/display-managers/sddm.nix b/third_party/nixpkgs/nixos/modules/services/x11/display-managers/sddm.nix
index 4040b90342..a39bb55b38 100644
--- a/third_party/nixpkgs/nixos/modules/services/x11/display-managers/sddm.nix
+++ b/third_party/nixpkgs/nixos/modules/services/x11/display-managers/sddm.nix
@@ -9,7 +9,12 @@ let
cfg = dmcfg.sddm;
xEnv = config.systemd.services.display-manager.environment;
- inherit (pkgs) sddm;
+ sddm = if config.services.xserver.desktopManager.lxqt.enable then
+ # TODO: Move lxqt to libsForQt515
+ pkgs.libsForQt514.sddm
+ else
+ pkgs.libsForQt5.sddm
+ ;
xserverWrapper = pkgs.writeScript "xserver-wrapper" ''
#!/bin/sh
diff --git a/third_party/nixpkgs/nixos/modules/services/x11/redshift.nix b/third_party/nixpkgs/nixos/modules/services/x11/redshift.nix
index 21b0b33553..60d80a2876 100644
--- a/third_party/nixpkgs/nixos/modules/services/x11/redshift.nix
+++ b/third_party/nixpkgs/nixos/modules/services/x11/redshift.nix
@@ -82,6 +82,15 @@ in {
'';
};
+ executable = mkOption {
+ type = types.str;
+ default = "/bin/redshift";
+ example = "/bin/redshift-gtk";
+ description = ''
+ Redshift executable to use within the package.
+ '';
+ };
+
extraOptions = mkOption {
type = types.listOf types.str;
default = [];
@@ -114,7 +123,7 @@ in {
partOf = [ "graphical-session.target" ];
serviceConfig = {
ExecStart = ''
- ${cfg.package}/bin/redshift \
+ ${cfg.package}${cfg.executable} \
-l ${providerString} \
-t ${toString cfg.temperature.day}:${toString cfg.temperature.night} \
-b ${toString cfg.brightness.day}:${toString cfg.brightness.night} \
diff --git a/third_party/nixpkgs/nixos/modules/services/x11/xserver.nix b/third_party/nixpkgs/nixos/modules/services/x11/xserver.nix
index 55d3e742ef..9e971671c4 100644
--- a/third_party/nixpkgs/nixos/modules/services/x11/xserver.nix
+++ b/third_party/nixpkgs/nixos/modules/services/x11/xserver.nix
@@ -678,14 +678,14 @@ in
script = "${cfg.displayManager.job.execCmd}";
+ # Stop restarting if the display manager stops (crashes) 2 times
+ # in one minute. Starting X typically takes 3-4s.
+ startLimitIntervalSec = 30;
+ startLimitBurst = 3;
serviceConfig = {
Restart = "always";
RestartSec = "200ms";
SyslogIdentifier = "display-manager";
- # Stop restarting if the display manager stops (crashes) 2 times
- # in one minute. Starting X typically takes 3-4s.
- StartLimitInterval = "30s";
- StartLimitBurst = "3";
};
};
diff --git a/third_party/nixpkgs/nixos/modules/system/boot/networkd.nix b/third_party/nixpkgs/nixos/modules/system/boot/networkd.nix
index 47689b2a47..3b01bc00ba 100644
--- a/third_party/nixpkgs/nixos/modules/system/boot/networkd.nix
+++ b/third_party/nixpkgs/nixos/modules/system/boot/networkd.nix
@@ -648,11 +648,13 @@ let
"RapidCommit"
"ForceDHCPv6PDOtherInformation"
"PrefixDelegationHint"
+ "RouteMetric"
])
(assertValueOneOf "UseDNS" boolValues)
(assertValueOneOf "UseNTP" boolValues)
(assertValueOneOf "RapidCommit" boolValues)
(assertValueOneOf "ForceDHCPv6PDOtherInformation" boolValues)
+ (assertInt "RouteMetric")
];
sectionDHCPServer = checkUnitConfig "DHCPServer" [
diff --git a/third_party/nixpkgs/nixos/modules/system/boot/stage-1-init.sh b/third_party/nixpkgs/nixos/modules/system/boot/stage-1-init.sh
index f7c2940049..e5cafe237c 100644
--- a/third_party/nixpkgs/nixos/modules/system/boot/stage-1-init.sh
+++ b/third_party/nixpkgs/nixos/modules/system/boot/stage-1-init.sh
@@ -120,7 +120,7 @@ eval "exec $logOutFd>&1 $logErrFd>&2"
if test -w /dev/kmsg; then
tee -i < /tmp/stage-1-init.log.fifo /proc/self/fd/"$logOutFd" | while read -r line; do
if test -n "$line"; then
- echo "<7>stage-1-init: $line" > /dev/kmsg
+ echo "<7>stage-1-init: [$(date)] $line" > /dev/kmsg
fi
done &
else
@@ -356,6 +356,7 @@ mountFS() {
case $options in
*x-nixos.autoresize*)
if [ "$fsType" = ext2 -o "$fsType" = ext3 -o "$fsType" = ext4 ]; then
+ modprobe "$fsType"
echo "resizing $device..."
e2fsck -fp "$device"
resize2fs "$device"
diff --git a/third_party/nixpkgs/nixos/modules/system/boot/systemd-unit-options.nix b/third_party/nixpkgs/nixos/modules/system/boot/systemd-unit-options.nix
index 5addc6f9ca..4154389b2c 100644
--- a/third_party/nixpkgs/nixos/modules/system/boot/systemd-unit-options.nix
+++ b/third_party/nixpkgs/nixos/modules/system/boot/systemd-unit-options.nix
@@ -210,12 +210,21 @@ in rec {
'';
};
+ startLimitBurst = mkOption {
+ type = types.int;
+ description = ''
+ Configure unit start rate limiting. Units which are started
+ more than startLimitBurst times within an interval time
+ interval are not permitted to start any more.
+ '';
+ };
+
startLimitIntervalSec = mkOption {
type = types.int;
description = ''
Configure unit start rate limiting. Units which are started
- more than burst times within an interval time interval are
- not permitted to start any more.
+ more than startLimitBurst times within an interval time
+ interval are not permitted to start any more.
'';
};
@@ -245,8 +254,7 @@ in rec {
serviceConfig = mkOption {
default = {};
example =
- { StartLimitInterval = 10;
- RestartSec = 5;
+ { RestartSec = 5;
};
type = types.addCheck (types.attrsOf unitOption) checkService;
description = ''
diff --git a/third_party/nixpkgs/nixos/modules/system/boot/systemd.nix b/third_party/nixpkgs/nixos/modules/system/boot/systemd.nix
index 74d6957678..c22264b3e9 100644
--- a/third_party/nixpkgs/nixos/modules/system/boot/systemd.nix
+++ b/third_party/nixpkgs/nixos/modules/system/boot/systemd.nix
@@ -243,6 +243,8 @@ let
OnFailure = toString config.onFailure; }
// optionalAttrs (options.startLimitIntervalSec.isDefined) {
StartLimitIntervalSec = toString config.startLimitIntervalSec;
+ } // optionalAttrs (options.startLimitBurst.isDefined) {
+ StartLimitBurst = toString config.startLimitBurst;
};
};
};
@@ -884,14 +886,25 @@ in
config = {
- warnings = concatLists (mapAttrsToList (name: service:
- let
- type = service.serviceConfig.Type or "";
- restart = service.serviceConfig.Restart or "no";
- in optional
- (type == "oneshot" && (restart == "always" || restart == "on-success"))
- "Service '${name}.service' with 'Type=oneshot' cannot have 'Restart=always' or 'Restart=on-success'")
- cfg.services);
+ warnings = concatLists (
+ mapAttrsToList
+ (name: service:
+ let
+ type = service.serviceConfig.Type or "";
+ restart = service.serviceConfig.Restart or "no";
+ hasDeprecated = builtins.hasAttr "StartLimitInterval" service.serviceConfig;
+ in
+ concatLists [
+ (optional (type == "oneshot" && (restart == "always" || restart == "on-success"))
+ "Service '${name}.service' with 'Type=oneshot' cannot have 'Restart=always' or 'Restart=on-success'"
+ )
+ (optional hasDeprecated
+ "Service '${name}.service' uses the attribute 'StartLimitInterval' in the Service section, which is deprecated. See https://github.com/NixOS/nixpkgs/issues/45786."
+ )
+ ]
+ )
+ cfg.services
+ );
system.build.units = cfg.units;
diff --git a/third_party/nixpkgs/nixos/modules/virtualisation/amazon-image.nix b/third_party/nixpkgs/nixos/modules/virtualisation/amazon-image.nix
index 20d48add71..44cb608094 100644
--- a/third_party/nixpkgs/nixos/modules/virtualisation/amazon-image.nix
+++ b/third_party/nixpkgs/nixos/modules/virtualisation/amazon-image.nix
@@ -48,7 +48,7 @@ in
];
boot.initrd.kernelModules = [ "xen-blkfront" "xen-netfront" ];
boot.initrd.availableKernelModules = [ "ixgbevf" "ena" "nvme" ];
- boot.kernelParams = mkIf cfg.hvm [ "console=ttyS0" ];
+ boot.kernelParams = mkIf cfg.hvm [ "console=ttyS0" "random.trust_cpu=on" ];
# Prevent the nouveau kernel module from being loaded, as it
# interferes with the nvidia/nvidia-uvm modules needed for CUDA.
diff --git a/third_party/nixpkgs/nixos/modules/virtualisation/ec2-amis.nix b/third_party/nixpkgs/nixos/modules/virtualisation/ec2-amis.nix
index 24de8cf1af..4d9c391e04 100644
--- a/third_party/nixpkgs/nixos/modules/virtualisation/ec2-amis.nix
+++ b/third_party/nixpkgs/nixos/modules/virtualisation/ec2-amis.nix
@@ -329,5 +329,24 @@ let self = {
"20.03".ap-east-1.hvm-ebs = "ami-0d18fdd309cdefa86";
"20.03".sa-east-1.hvm-ebs = "ami-09859378158ae971d";
- latest = self."20.03";
+ # 20.09.1465.9a0b14b097d
+ "20.09".eu-west-1.hvm-ebs = "ami-0d90f16418e3c364c";
+ "20.09".eu-west-2.hvm-ebs = "ami-0635ec0780ea57cfe";
+ "20.09".eu-west-3.hvm-ebs = "ami-0714e94352f2eabb9";
+ "20.09".eu-central-1.hvm-ebs = "ami-0979d39762a4d2a02";
+ "20.09".eu-north-1.hvm-ebs = "ami-0b14e273185c66e9b";
+ "20.09".us-east-1.hvm-ebs = "ami-0f8b063ac3f2d9645";
+ "20.09".us-east-2.hvm-ebs = "ami-0959202a0393fdd0c";
+ "20.09".us-west-1.hvm-ebs = "ami-096d50833b785478b";
+ "20.09".us-west-2.hvm-ebs = "ami-0fc31031df0df6104";
+ "20.09".ca-central-1.hvm-ebs = "ami-0787786a38cde3905";
+ "20.09".ap-southeast-1.hvm-ebs = "ami-0b3f693d3a2a0b9ae";
+ "20.09".ap-southeast-2.hvm-ebs = "ami-02471872bc876b610";
+ "20.09".ap-northeast-1.hvm-ebs = "ami-06505fd2bf44a59a7";
+ "20.09".ap-northeast-2.hvm-ebs = "ami-0754b4c014eea1e8a";
+ "20.09".ap-south-1.hvm-ebs = "ami-05100e32242ae65a6";
+ "20.09".ap-east-1.hvm-ebs = "ami-045288859a39de009";
+ "20.09".sa-east-1.hvm-ebs = "ami-0a937748db48fb00d";
+
+ latest = self."20.09";
}; in self
diff --git a/third_party/nixpkgs/nixos/tests/all-tests.nix b/third_party/nixpkgs/nixos/tests/all-tests.nix
index 9ffeba27a7..4e4d8b5e68 100644
--- a/third_party/nixpkgs/nixos/tests/all-tests.nix
+++ b/third_party/nixpkgs/nixos/tests/all-tests.nix
@@ -242,6 +242,7 @@ in
nfs4 = handleTest ./nfs { version = 4; };
nghttpx = handleTest ./nghttpx.nix {};
nginx = handleTest ./nginx.nix {};
+ nginx-auth = handleTest ./nginx-auth.nix {};
nginx-etag = handleTest ./nginx-etag.nix {};
nginx-pubhtml = handleTest ./nginx-pubhtml.nix {};
nginx-sandbox = handleTestOn ["x86_64-linux"] ./nginx-sandbox.nix {};
diff --git a/third_party/nixpkgs/nixos/tests/common/acme/server/README.md b/third_party/nixpkgs/nixos/tests/common/acme/server/README.md
new file mode 100644
index 0000000000..9de2b2c710
--- /dev/null
+++ b/third_party/nixpkgs/nixos/tests/common/acme/server/README.md
@@ -0,0 +1,21 @@
+# Fake Certificate Authority for ACME testing
+
+This will set up a test node running [pebble](https://github.com/letsencrypt/pebble)
+to serve ACME certificate requests.
+
+## "Snake oil" certs
+
+The snake oil certs are hard coded into the repo for reasons explained [here](https://github.com/NixOS/nixpkgs/pull/91121#discussion_r505410235).
+The root of the issue is that Nix will hash the derivation based on the arguments
+to mkDerivation, not the output. [Minica](https://github.com/jsha/minica) will
+always generate a random certificate even if the arguments are unchanged. As a
+result, it's possible to end up in a situation where the cached and local
+generated certs mismatch and cause issues with testing.
+
+To generate new certificates, run the following commands:
+
+```bash
+nix-build generate-certs.nix
+cp result/* .
+rm result
+```
diff --git a/third_party/nixpkgs/nixos/tests/common/acme/server/acme.test.cert.pem b/third_party/nixpkgs/nixos/tests/common/acme/server/acme.test.cert.pem
new file mode 100644
index 0000000000..76b0d916a8
--- /dev/null
+++ b/third_party/nixpkgs/nixos/tests/common/acme/server/acme.test.cert.pem
@@ -0,0 +1,19 @@
+-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
diff --git a/third_party/nixpkgs/nixos/tests/common/acme/server/acme.test.key.pem b/third_party/nixpkgs/nixos/tests/common/acme/server/acme.test.key.pem
new file mode 100644
index 0000000000..741df99a37
--- /dev/null
+++ b/third_party/nixpkgs/nixos/tests/common/acme/server/acme.test.key.pem
@@ -0,0 +1,27 @@
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
diff --git a/third_party/nixpkgs/nixos/tests/common/acme/server/ca.cert.pem b/third_party/nixpkgs/nixos/tests/common/acme/server/ca.cert.pem
new file mode 100644
index 0000000000..5c33e879b6
--- /dev/null
+++ b/third_party/nixpkgs/nixos/tests/common/acme/server/ca.cert.pem
@@ -0,0 +1,20 @@
+-----BEGIN CERTIFICATE-----
+MIIDSzCCAjOgAwIBAgIIeHRvRrNvbGQwDQYJKoZIhvcNAQELBQAwIDEeMBwGA1UE
+AxMVbWluaWNhIHJvb3QgY2EgNzg3NDZmMCAXDTIwMTAyMTEzMjgzNloYDzIxMjAx
+MDIxMTMyODM2WjAgMR4wHAYDVQQDExVtaW5pY2Egcm9vdCBjYSA3ODc0NmYwggEi
+MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCrNTzVLDJOKtGYGLU98EEcLKps
+tXHCLC6G54LKbEcU80fn+ArX8qsPSHyhdXQkcYjq6Vh/EDJ1TctyRSnvAjwyG4Aa
+1Zy1QFc/JnjMjvzimCkUc9lQ+wkLwHSM/KGwR1cGjmtQ/EMClZTA0NwulJsXMKVz
+bd5asXbq/yJTQ5Ww25HtdNjwRQXTvB7r3IKcY+DsED9CvFvC9oG/ZhtZqZuyyRdC
+kFUrrv8WNUDkWSN+lMR6xMx8v0583IN6f11IhX0b+svK98G81B2eswBdkzvVyv9M
+unZBO0JuJG8sdM502KhWLmzBC1ZbvgUBF9BumDRpMFH4DCj7+qQ2taWeGyc7AgMB
+AAGjgYYwgYMwDgYDVR0PAQH/BAQDAgKEMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggr
+BgEFBQcDAjASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBT7whmUtX9CnkJe
+qlcwu+3FaXFwnDAfBgNVHSMEGDAWgBT7whmUtX9CnkJeqlcwu+3FaXFwnDANBgkq
+hkiG9w0BAQsFAAOCAQEARMe1wKmF33GjEoLLw0oDDS4EdAv26BzCwtrlljsEtwQN
+95oSzUNd6o4Js7WCG2o543OX6cxzM+yju8TES3+vJKDgsbNMU0bWCv//tdrb0/G8
+OkU3Kfi5q4fOauZ1pqGv/pXdfYhZ5ieB/zwis3ykANe5JfB0XqwCb1Vd0C3UCIS2
+NPKngRwNSzphIsbzfvxGDkdM1enuGl5CVyDhrwTMqGaJGDSOv6U5jKFxKRvigqTN
+Ls9lPmT5NXYETduWLBR3yUIdH6kZXrcozZ02B9vjOB2Cv4RMDc+9eM30CLIWpf1I
+097e7JkhzxFhfC/bMMt3P1FeQc+fwH91wdBmNi7tQw==
+-----END CERTIFICATE-----
diff --git a/third_party/nixpkgs/nixos/tests/common/acme/server/ca.key.pem b/third_party/nixpkgs/nixos/tests/common/acme/server/ca.key.pem
new file mode 100644
index 0000000000..ed46f5dccf
--- /dev/null
+++ b/third_party/nixpkgs/nixos/tests/common/acme/server/ca.key.pem
@@ -0,0 +1,27 @@
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
diff --git a/third_party/nixpkgs/nixos/tests/common/acme/server/default.nix b/third_party/nixpkgs/nixos/tests/common/acme/server/default.nix
index cea10c1690..1c3bfdf76b 100644
--- a/third_party/nixpkgs/nixos/tests/common/acme/server/default.nix
+++ b/third_party/nixpkgs/nixos/tests/common/acme/server/default.nix
@@ -51,10 +51,7 @@
# that it has to be started _before_ the ACME service.
{ config, pkgs, lib, ... }:
let
- testCerts = import ./snakeoil-certs.nix {
- minica = pkgs.minica;
- mkDerivation = pkgs.stdenv.mkDerivation;
- };
+ testCerts = import ./snakeoil-certs.nix;
domain = testCerts.domain;
resolver = let
diff --git a/third_party/nixpkgs/nixos/tests/common/acme/server/generate-certs.nix b/third_party/nixpkgs/nixos/tests/common/acme/server/generate-certs.nix
new file mode 100644
index 0000000000..cd8fe0dffc
--- /dev/null
+++ b/third_party/nixpkgs/nixos/tests/common/acme/server/generate-certs.nix
@@ -0,0 +1,29 @@
+# Minica can provide a CA key and cert, plus a key
+# and cert for our fake CA server's Web Front End (WFE).
+{
+ pkgs ? import {},
+ minica ? pkgs.minica,
+ mkDerivation ? pkgs.stdenv.mkDerivation
+}:
+let
+ conf = import ./snakeoil-certs.nix;
+ domain = conf.domain;
+in mkDerivation {
+ name = "test-certs";
+ buildInputs = [ minica ];
+ phases = [ "buildPhase" "installPhase" ];
+
+ buildPhase = ''
+ minica \
+ --ca-key ca.key.pem \
+ --ca-cert ca.cert.pem \
+ --domains ${domain}
+ '';
+
+ installPhase = ''
+ mkdir -p $out
+ mv ca.*.pem $out/
+ mv ${domain}/key.pem $out/${domain}.key.pem
+ mv ${domain}/cert.pem $out/${domain}.cert.pem
+ '';
+}
diff --git a/third_party/nixpkgs/nixos/tests/common/acme/server/snakeoil-certs.nix b/third_party/nixpkgs/nixos/tests/common/acme/server/snakeoil-certs.nix
index 4b6a38b8fa..11c3f7fc92 100644
--- a/third_party/nixpkgs/nixos/tests/common/acme/server/snakeoil-certs.nix
+++ b/third_party/nixpkgs/nixos/tests/common/acme/server/snakeoil-certs.nix
@@ -1,37 +1,13 @@
-# Minica can provide a CA key and cert, plus a key
-# and cert for our fake CA server's Web Front End (WFE).
-{ minica, mkDerivation }:
let
domain = "acme.test";
-
- selfSignedCertData = mkDerivation {
- name = "test-certs";
- buildInputs = [ minica ];
- phases = [ "buildPhase" "installPhase" ];
-
- buildPhase = ''
- mkdir ca
- minica \
- --ca-key ca/key.pem \
- --ca-cert ca/cert.pem \
- --domains ${domain}
- chmod 600 ca/*
- chmod 640 ${domain}/*.pem
- '';
-
- installPhase = ''
- mkdir -p $out
- mv ${domain} ca $out/
- '';
- };
in {
inherit domain;
ca = {
- cert = "${selfSignedCertData}/ca/cert.pem";
- key = "${selfSignedCertData}/ca/key.pem";
+ cert = ./ca.cert.pem;
+ key = ./ca.key.pem;
};
"${domain}" = {
- cert = "${selfSignedCertData}/${domain}/cert.pem";
- key = "${selfSignedCertData}/${domain}/key.pem";
+ cert = ./. + "/${domain}.cert.pem";
+ key = ./. + "/${domain}.key.pem";
};
}
diff --git a/third_party/nixpkgs/nixos/tests/firefox.nix b/third_party/nixpkgs/nixos/tests/firefox.nix
index 7071baceba..07e25bd4ca 100644
--- a/third_party/nixpkgs/nixos/tests/firefox.nix
+++ b/third_party/nixpkgs/nixos/tests/firefox.nix
@@ -11,26 +11,105 @@ import ./make-test-python.nix ({ pkgs, esr ? false, ... }: {
environment.systemPackages =
(if esr then [ pkgs.firefox-esr ] else [ pkgs.firefox ])
++ [ pkgs.xdotool ];
+
+ # Need some more memory to record audio.
+ virtualisation.memorySize = "500";
+
+ # Create a virtual sound device, with mixing
+ # and all, for recording audio.
+ boot.kernelModules = [ "snd-aloop" ];
+ sound.enable = true;
+ sound.extraConfig = ''
+ pcm.!default {
+ type plug
+ slave.pcm pcm.dmixer
+ }
+ pcm.dmixer {
+ type dmix
+ ipc_key 1
+ slave {
+ pcm "hw:Loopback,0,0"
+ rate 48000
+ periods 128
+ period_time 0
+ period_size 1024
+ buffer_size 8192
+ }
+ }
+ pcm.recorder {
+ type hw
+ card "Loopback"
+ device 1
+ subdevice 0
+ }
+ '';
+
+ systemd.services.audio-recorder = {
+ description = "Record NixOS test audio to /tmp/record.wav";
+ script = "${pkgs.alsaUtils}/bin/arecord -D recorder -f S16_LE -r48000 /tmp/record.wav";
+ };
+
};
testScript = ''
+ from contextlib import contextmanager
+
+
+ @contextmanager
+ def audio_recording(machine: Machine) -> None:
+ """
+ Perform actions while recording the
+ machine audio output.
+ """
+ machine.systemctl("start audio-recorder")
+ yield
+ machine.systemctl("stop audio-recorder")
+
+
+ def wait_for_sound(machine: Machine) -> None:
+ """
+ Wait until any sound has been emitted.
+ """
+ machine.wait_for_file("/tmp/record.wav")
+ while True:
+ # Get at most 2M of the recording
+ machine.execute("tail -c 2M /tmp/record.wav > /tmp/last")
+ # Get the exact size
+ size = int(machine.succeed("stat -c '%s' /tmp/last").strip())
+ # Compare it against /dev/zero using `cmp` (skipping 50B of WAVE header).
+ # If some non-NULL bytes are found it returns 1.
+ status, output = machine.execute(
+ f"cmp -i 50 -n {size - 50} /tmp/last /dev/zero 2>&1"
+ )
+ if status == 1:
+ break
+ machine.sleep(2)
+
+
machine.wait_for_x()
- with subtest("wait until Firefox has finished loading the Valgrind docs page"):
+ with subtest("Wait until Firefox has finished loading the Valgrind docs page"):
machine.execute(
"xterm -e 'firefox file://${pkgs.valgrind.doc}/share/doc/valgrind/html/index.html' &"
)
machine.wait_for_window("Valgrind")
machine.sleep(40)
+ with subtest("Check whether Firefox can play sound"):
+ with audio_recording(machine):
+ machine.succeed(
+ "firefox file://${pkgs.sound-theme-freedesktop}/share/sounds/freedesktop/stereo/phone-incoming-call.oga &"
+ )
+ wait_for_sound(machine)
+ machine.copy_from_vm("/tmp/record.wav")
+
+ with subtest("Close sound test tab"):
+ machine.execute("xdotool key ctrl+w")
+
with subtest("Close default browser prompt"):
machine.execute("xdotool key space")
- with subtest("Hide default browser window"):
- machine.sleep(2)
- machine.execute("xdotool key F12")
-
- with subtest("wait until Firefox draws the developer tool panel"):
+ with subtest("Wait until Firefox draws the developer tool panel"):
machine.sleep(10)
machine.succeed("xwininfo -root -tree | grep Valgrind")
machine.screenshot("screen")
diff --git a/third_party/nixpkgs/nixos/tests/nginx-auth.nix b/third_party/nixpkgs/nixos/tests/nginx-auth.nix
new file mode 100644
index 0000000000..c0d24a20dd
--- /dev/null
+++ b/third_party/nixpkgs/nixos/tests/nginx-auth.nix
@@ -0,0 +1,47 @@
+import ./make-test-python.nix ({ pkgs, ... }: {
+ name = "nginx-auth";
+
+ nodes = {
+ webserver = { pkgs, lib, ... }: {
+ services.nginx = let
+ root = pkgs.runCommand "testdir" {} ''
+ mkdir "$out"
+ echo hello world > "$out/index.html"
+ '';
+ in {
+ enable = true;
+
+ virtualHosts.lockedroot = {
+ inherit root;
+ basicAuth.alice = "jane";
+ };
+
+ virtualHosts.lockedsubdir = {
+ inherit root;
+ locations."/sublocation/" = {
+ alias = "${root}/";
+ basicAuth.bob = "john";
+ };
+ };
+ };
+ };
+ };
+
+ testScript = ''
+ webserver.wait_for_unit("nginx")
+ webserver.wait_for_open_port(80)
+
+ webserver.fail("curl --fail --resolve lockedroot:80:127.0.0.1 http://lockedroot")
+ webserver.succeed(
+ "curl --fail --resolve lockedroot:80:127.0.0.1 http://alice:jane@lockedroot"
+ )
+
+ webserver.succeed("curl --fail --resolve lockedsubdir:80:127.0.0.1 http://lockedsubdir")
+ webserver.fail(
+ "curl --fail --resolve lockedsubdir:80:127.0.0.1 http://lockedsubdir/sublocation/index.html"
+ )
+ webserver.succeed(
+ "curl --fail --resolve lockedsubdir:80:127.0.0.1 http://bob:john@lockedsubdir/sublocation/index.html"
+ )
+ '';
+})
diff --git a/third_party/nixpkgs/nixos/tests/prometheus.nix b/third_party/nixpkgs/nixos/tests/prometheus.nix
index de1d10aa7c..6881c659e6 100644
--- a/third_party/nixpkgs/nixos/tests/prometheus.nix
+++ b/third_party/nixpkgs/nixos/tests/prometheus.nix
@@ -19,7 +19,6 @@ let
secret_key = s3.secretKey;
insecure = true;
signature_version2 = false;
- encrypt_sse = false;
put_user_metadata = {};
http_config = {
idle_conn_timeout = "0s";
diff --git a/third_party/nixpkgs/pkgs/applications/audio/bchoppr/default.nix b/third_party/nixpkgs/pkgs/applications/audio/bchoppr/default.nix
index 7d4d53408d..3382728771 100644
--- a/third_party/nixpkgs/pkgs/applications/audio/bchoppr/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/audio/bchoppr/default.nix
@@ -7,7 +7,7 @@ stdenv.mkDerivation rec {
src = fetchFromGitHub {
owner = "sjaehn";
repo = pname;
- rev = "${version}";
+ rev = version;
sha256 = "1nd6byy75f0rbz9dm9drhxmpsfhxhg0y7q3v2m3098llynhy9k2j";
};
diff --git a/third_party/nixpkgs/pkgs/applications/audio/bsequencer/default.nix b/third_party/nixpkgs/pkgs/applications/audio/bsequencer/default.nix
index 2c9217183e..093e9450de 100644
--- a/third_party/nixpkgs/pkgs/applications/audio/bsequencer/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/audio/bsequencer/default.nix
@@ -7,7 +7,7 @@ stdenv.mkDerivation rec {
src = fetchFromGitHub {
owner = "sjaehn";
repo = pname;
- rev = "${version}";
+ rev = version;
sha256 = "0hagnn104ybzdp13r95idw20fhmzif8p3kmiypnr20m6c64rdd29";
};
diff --git a/third_party/nixpkgs/pkgs/applications/audio/bslizr/default.nix b/third_party/nixpkgs/pkgs/applications/audio/bslizr/default.nix
index 5a2675187c..e239a89b89 100644
--- a/third_party/nixpkgs/pkgs/applications/audio/bslizr/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/audio/bslizr/default.nix
@@ -7,7 +7,7 @@ stdenv.mkDerivation rec {
src = fetchFromGitHub {
owner = "sjaehn";
repo = pname;
- rev = "${version}";
+ rev = version;
sha256 = "1f7xrljvsy7a1p8c7wln2zhwarl3ara7gbjxkpyh47wfdpigpdb0";
};
diff --git a/third_party/nixpkgs/pkgs/applications/audio/drumkv1/default.nix b/third_party/nixpkgs/pkgs/applications/audio/drumkv1/default.nix
index 7a6acb25e8..82a47b8173 100644
--- a/third_party/nixpkgs/pkgs/applications/audio/drumkv1/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/audio/drumkv1/default.nix
@@ -2,11 +2,11 @@
mkDerivation rec {
pname = "drumkv1";
- version = "0.9.16";
+ version = "0.9.18";
src = fetchurl {
url = "mirror://sourceforge/drumkv1/${pname}-${version}.tar.gz";
- sha256 = "1r55575w9r0ifysw9mgxjvv0fszvx8ykjgim3zczf3mb5s9ngavv";
+ sha256 = "1bzkaz7sqx1pvirja8zm7i2ckzl5ad6xspr4840389ik3l8qpnr5";
};
buildInputs = [ libjack2 alsaLib libsndfile liblo lv2 qt5.qtbase qt5.qttools ];
diff --git a/third_party/nixpkgs/pkgs/applications/audio/ecasound/default.nix b/third_party/nixpkgs/pkgs/applications/audio/ecasound/default.nix
index 13c48fc12a..adb6f6b742 100644
--- a/third_party/nixpkgs/pkgs/applications/audio/ecasound/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/audio/ecasound/default.nix
@@ -25,7 +25,7 @@ stdenv.mkDerivation rec {
buildInputs = [ alsaLib audiofile libjack2 liblo liboil libsamplerate libsndfile lilv lv2 ];
meta = {
- description = "Ecasound is a software package designed for multitrack audio processing";
+ description = "Software package designed for multitrack audio processing";
license = with stdenv.lib.licenses; [ gpl2 lgpl21 ];
homepage = "http://nosignal.fi/ecasound/";
};
diff --git a/third_party/nixpkgs/pkgs/applications/audio/eflite/default.nix b/third_party/nixpkgs/pkgs/applications/audio/eflite/default.nix
index f9a579512c..30a3550177 100644
--- a/third_party/nixpkgs/pkgs/applications/audio/eflite/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/audio/eflite/default.nix
@@ -37,7 +37,7 @@ stdenv.mkDerivation rec {
meta = {
homepage = "http://eflite.sourceforge.net";
- description = "EFlite is a speech server for screen readers";
+ description = "Speech server for screen readers";
longDescription = ''
EFlite is a speech server for Emacspeak and other screen
readers that allows them to interface with Festival Lite,
diff --git a/third_party/nixpkgs/pkgs/applications/audio/geonkick/default.nix b/third_party/nixpkgs/pkgs/applications/audio/geonkick/default.nix
index e32bef008d..8064c76074 100644
--- a/third_party/nixpkgs/pkgs/applications/audio/geonkick/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/audio/geonkick/default.nix
@@ -1,14 +1,15 @@
-{ stdenv, fetchFromGitLab, cmake, pkg-config, redkite, libsndfile, rapidjson, libjack2, lv2, libX11, cairo }:
+{ stdenv, fetchFromGitLab, cmake, pkg-config, redkite, libsndfile, rapidjson
+, libjack2, lv2, libX11, cairo }:
stdenv.mkDerivation rec {
pname = "geonkick";
- version = "2.3.8";
+ version = "2.5.0";
src = fetchFromGitLab {
owner = "iurie-sw";
repo = pname;
rev = "v${version}";
- sha256 = "07809yy2q7dd6fcp0yndlg1vw2ca2zisnsplb3xrxvzdvrqlw910";
+ sha256 = "19zbz4v2n5ph4af721xls7ignmis2q2yqyd0m97g9b3njrgnfy3n";
};
nativeBuildInputs = [ cmake pkg-config ];
@@ -16,13 +17,16 @@ stdenv.mkDerivation rec {
buildInputs = [ redkite libsndfile rapidjson libjack2 lv2 libX11 cairo ];
# https://github.com/iurie-sw/geonkick/issues/120
- cmakeFlags = [ "-DGKICK_REDKITE_SDK_PATH=${redkite}" "-DCMAKE_INSTALL_LIBDIR=lib" ];
+ cmakeFlags = [
+ "-DGKICK_REDKITE_SDK_PATH=${redkite}"
+ "-DCMAKE_INSTALL_LIBDIR=lib"
+ ];
- meta = {
+ meta = with stdenv.lib; {
homepage = "https://gitlab.com/iurie-sw/geonkick";
description = "A free software percussion synthesizer";
- license = stdenv.lib.licenses.gpl3Plus;
- platforms = stdenv.lib.platforms.linux;
- maintainers = [ stdenv.lib.maintainers.magnetophon ];
+ license = licenses.gpl3Plus;
+ platforms = platforms.linux;
+ maintainers = [ maintainers.magnetophon ];
};
}
diff --git a/third_party/nixpkgs/pkgs/applications/audio/jamulus/default.nix b/third_party/nixpkgs/pkgs/applications/audio/jamulus/default.nix
index 7a5887d4f9..1839aa9c7a 100644
--- a/third_party/nixpkgs/pkgs/applications/audio/jamulus/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/audio/jamulus/default.nix
@@ -3,12 +3,12 @@
mkDerivation rec {
pname = "jamulus";
- version = "3.5.10";
+ version = "3.6.0";
src = fetchFromGitHub {
owner = "corrados";
repo = "jamulus";
rev = "r${stdenv.lib.replaceStrings [ "." ] [ "_" ] version}";
- sha256 = "0bw2v40csjmlkvkhr3dh0g1a7mfqrs1xkqjsii61yfzy2ckbsi82";
+ sha256 = "06x9b2kjsgk8kddhif0x59nwzhnwjmq40x3w5nrphqaimqlrhlcf";
};
nativeBuildInputs = [ pkg-config qmake ];
diff --git a/third_party/nixpkgs/pkgs/applications/audio/musescore/default.nix b/third_party/nixpkgs/pkgs/applications/audio/musescore/default.nix
index 71c639ca40..c9a1f44ec6 100644
--- a/third_party/nixpkgs/pkgs/applications/audio/musescore/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/audio/musescore/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, mkDerivation, lib, fetchzip, cmake, pkgconfig
+{ stdenv, mkDerivation, lib, fetchFromGitHub, cmake, pkgconfig
, alsaLib, freetype, libjack2, lame, libogg, libpulseaudio, libsndfile, libvorbis
, portaudio, portmidi, qtbase, qtdeclarative, qtgraphicaleffects
, qtquickcontrols2, qtscript, qtsvg, qttools
@@ -7,12 +7,13 @@
mkDerivation rec {
pname = "musescore";
- version = "3.5.0";
+ version = "3.5.2";
- src = fetchzip {
- url = "https://github.com/musescore/MuseScore/releases/download/v3.5/MuseScore-${version}.zip";
- sha256 = "0m598xh0s4f5m4l2ymy7g44bbvc14bcfi4gifhjnrg091rsk57c9";
- stripRoot = false;
+ src = fetchFromGitHub {
+ owner = "musescore";
+ repo = "MuseScore";
+ rev = "v${version}";
+ sha256 = "VA0+npLUUXQJHalD01pmFTTum2Re7FiiyAwU1XvR93s=";
};
patches = [
diff --git a/third_party/nixpkgs/pkgs/applications/audio/ncspot/default.nix b/third_party/nixpkgs/pkgs/applications/audio/ncspot/default.nix
index 0f65438737..60fb40c5f7 100644
--- a/third_party/nixpkgs/pkgs/applications/audio/ncspot/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/audio/ncspot/default.nix
@@ -14,16 +14,16 @@ let
in
rustPlatform.buildRustPackage rec {
pname = "ncspot";
- version = "0.2.3";
+ version = "0.2.4";
src = fetchFromGitHub {
owner = "hrkfdn";
repo = "ncspot";
rev = "v${version}";
- sha256 = "08lxdd6biypxmzfc34cbrpsp9ajb157my4vc51ra5237b7jmy6vk";
+ sha256 = "0vdg1ybzfj7xg8nmrb8q9vr8bpwcs52730v9v0413wjyxb7hcll2";
};
- cargoSha256 = "110mqm1md8x7vjw3hsy4yz8nj38h6mwrr357awchq52inxj3jmbk";
+ cargoSha256 = "0afaxx8dv7jn48934ba0r8kd1h8l3k00sl83v07a1xqmfcmil2qf";
cargoBuildFlags = [ "--no-default-features" "--features" "${lib.concatStringsSep "," features}" ];
diff --git a/third_party/nixpkgs/pkgs/applications/audio/opustags/default.nix b/third_party/nixpkgs/pkgs/applications/audio/opustags/default.nix
index eb056c720d..8e5546aec8 100644
--- a/third_party/nixpkgs/pkgs/applications/audio/opustags/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/audio/opustags/default.nix
@@ -1,13 +1,13 @@
{ stdenv, lib, cmake, pkgconfig, libogg, fetchFromGitHub, libiconv }:
stdenv.mkDerivation rec {
pname = "opustags";
- version = "1.3.0";
+ version = "1.4.0";
src = fetchFromGitHub {
owner = "fmang";
repo = "opustags";
rev = version;
- sha256 = "09z0cdg20algaj2yyhfz3hxh1biwjjvzx1pc2vdc64n8lkswqsc1";
+ sha256 = "1y0czl72paawy342ff9ickaamkih43k59yfcdw7bnddypyfa7nbg";
};
buildInputs = [ libogg ];
diff --git a/third_party/nixpkgs/pkgs/applications/audio/picoloop/default.nix b/third_party/nixpkgs/pkgs/applications/audio/picoloop/default.nix
index 7f6773f5e5..69052988f2 100644
--- a/third_party/nixpkgs/pkgs/applications/audio/picoloop/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/audio/picoloop/default.nix
@@ -42,7 +42,7 @@ stdenv.mkDerivation rec {
'';
meta = with stdenv.lib; {
- description = "Picoloop is a synth and a stepsequencer (a clone of the famous nanoloop)";
+ description = "A synth and a stepsequencer (a clone of the famous nanoloop)";
homepage = "https://github.com/yoyz/picoloop";
platforms = platforms.linux;
license = licenses.bsd3;
diff --git a/third_party/nixpkgs/pkgs/applications/blockchains/ergo/default.nix b/third_party/nixpkgs/pkgs/applications/blockchains/ergo/default.nix
index 685a562f21..706acebba5 100644
--- a/third_party/nixpkgs/pkgs/applications/blockchains/ergo/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/blockchains/ergo/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "ergo";
- version = "3.3.4";
+ version = "3.3.5";
src = fetchurl {
url = "https://github.com/ergoplatform/ergo/releases/download/v${version}/ergo-${version}.jar";
- sha256 = "0psq0nxb4c0fsxjzjxb4sy6lh4kj4w8aizd81r92fdv8izbm25sk";
+ sha256 = "0bxzpwwb42bppqli3zggx3lah7g6kwmy6k6k6dinypj6x0bafqcg";
};
nativeBuildInputs = [ makeWrapper ];
diff --git a/third_party/nixpkgs/pkgs/applications/blockchains/exodus/default.nix b/third_party/nixpkgs/pkgs/applications/blockchains/exodus/default.nix
index 0c0b6a2430..c48cd7bb49 100644
--- a/third_party/nixpkgs/pkgs/applications/blockchains/exodus/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/blockchains/exodus/default.nix
@@ -4,11 +4,11 @@ cups, vivaldi-ffmpeg-codecs, libpulseaudio, at-spi2-core }:
stdenv.mkDerivation rec {
pname = "exodus";
- version = "20.8.28";
+ version = "20.10.23";
src = fetchurl {
url = "https://downloads.exodus.io/releases/${pname}-linux-x64-${version}.zip";
- sha256 = "fde9165f71f0d641f6892ddce3ec26d200e8095a383f2b4c8f924de4041d65ef";
+ sha256 = "083hcxljqg36ilpy6xa4j455ngpc775qgam0dbj26kg7sh33dz2c";
};
sourceRoot = ".";
diff --git a/third_party/nixpkgs/pkgs/applications/blockchains/ledger-live-desktop/default.nix b/third_party/nixpkgs/pkgs/applications/blockchains/ledger-live-desktop/default.nix
index 3bd379ce27..da0449f41d 100644
--- a/third_party/nixpkgs/pkgs/applications/blockchains/ledger-live-desktop/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/blockchains/ledger-live-desktop/default.nix
@@ -2,12 +2,12 @@
let
pname = "ledger-live-desktop";
- version = "2.14.0";
+ version = "2.15.0";
name = "${pname}-${version}";
src = fetchurl {
url = "https://github.com/LedgerHQ/${pname}/releases/download/v${version}/${pname}-${version}-linux-x86_64.AppImage";
- sha256 = "057g77nd8qxi8dw9sp7x068wsxmrpnsdfrca876f0bpw7lpb0bqq";
+ sha256 = "06sm4ah05j0f3bxb1sbdi8mazmxk166y2gaycll6p2xhd105ins3";
};
appimageContents = appimageTools.extractType2 {
diff --git a/third_party/nixpkgs/pkgs/applications/blockchains/monero-gui/default.nix b/third_party/nixpkgs/pkgs/applications/blockchains/monero-gui/default.nix
index c079fa88a7..8cd03f3428 100644
--- a/third_party/nixpkgs/pkgs/applications/blockchains/monero-gui/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/blockchains/monero-gui/default.nix
@@ -27,13 +27,13 @@ in
stdenv.mkDerivation rec {
pname = "monero-gui";
- version = "0.17.1.0";
+ version = "0.17.1.1";
src = fetchFromGitHub {
owner = "monero-project";
repo = "monero-gui";
rev = "v${version}";
- sha256 = "07r78ipv4g3i6z822kq380vi3qwlb958rccsy6lyybkhj9y0rx84";
+ sha256 = "0aqhp4rmqsgwjb875kgh6qwz0wyyiag1fksyic9cnhgg5j5y95nx";
};
nativeBuildInputs = [
@@ -75,11 +75,7 @@ stdenv.mkDerivation rec {
'add_subdirectory(monero EXCLUDE_FROM_ALL)'
'';
- preConfigure = ''
- # because $out needs to be expanded
- cmakeFlagsArray+=("-DCMAKE_INSTALL_PREFIX=$out/bin")
- cmakeFlagsArray+=("-DARCH=${arch}")
- '';
+ cmakeFlags = [ "-DARCH=${arch}" ];
desktopItem = makeDesktopItem {
name = "monero-wallet-gui";
diff --git a/third_party/nixpkgs/pkgs/applications/blockchains/monero/default.nix b/third_party/nixpkgs/pkgs/applications/blockchains/monero/default.nix
index 7d55a5f6f3..29acbd0f37 100644
--- a/third_party/nixpkgs/pkgs/applications/blockchains/monero/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/blockchains/monero/default.nix
@@ -17,13 +17,13 @@ assert trezorSupport -> all (x: x!=null) [ libusb1 protobuf python3 ];
stdenv.mkDerivation rec {
pname = "monero";
- version = "0.17.1.0";
+ version = "0.17.1.1";
src = fetchFromGitHub {
owner = "monero-project";
repo = "monero";
rev = "v${version}";
- sha256 = "1cngniv7sndy8r0fcfgk737640k53q3kwd36g891p5igcb985qdw";
+ sha256 = "18x27dm24k04vx0yz57zi02rk0wrmbn4wr8alqf48dq6z9wr0fhp";
fetchSubmodules = true;
};
diff --git a/third_party/nixpkgs/pkgs/applications/blockchains/sumokoin.nix b/third_party/nixpkgs/pkgs/applications/blockchains/sumokoin.nix
index ad65da057a..beb294d2df 100644
--- a/third_party/nixpkgs/pkgs/applications/blockchains/sumokoin.nix
+++ b/third_party/nixpkgs/pkgs/applications/blockchains/sumokoin.nix
@@ -26,7 +26,7 @@ stdenv.mkDerivation rec {
enableParallelBuilding = true;
meta = with lib; {
- description = "Sumokoin is a fork of Monero and a truely fungible cryptocurrency";
+ description = "A fork of Monero and a truely fungible cryptocurrency";
homepage = "https://www.sumokoin.org/";
license = licenses.bsd3;
maintainers = with maintainers; [ fpletz ];
diff --git a/third_party/nixpkgs/pkgs/applications/editors/android-studio/default.nix b/third_party/nixpkgs/pkgs/applications/editors/android-studio/default.nix
index e16464fb84..3a5bc63e1c 100644
--- a/third_party/nixpkgs/pkgs/applications/editors/android-studio/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/editors/android-studio/default.nix
@@ -19,9 +19,9 @@ let
sha256Hash = "sha256-qbxmR9g8DSKzcP09bJuc+am79BSXWG39UQxFEb1bZ88=";
};
latestVersion = { # canary & dev
- version = "4.2.0.14"; # "Android Studio 4.2 Canary 14"
- build = "202.6907010";
- sha256Hash = "sha256-A6nl4uN25CWOjpwBvOQG26EZnJP5tNvSrGtoF+IQmtY=";
+ version = "4.2.0.15"; # "Android Studio 4.2 Canary 15"
+ build = "202.6922807";
+ sha256Hash = "sha256-PXFNnPSJbdp9NtkMDR3Vq+vpWqd85Io2FmXPhRLRk/8=";
};
in {
# Attributes are named by their corresponding release channels
diff --git a/third_party/nixpkgs/pkgs/applications/editors/glow/default.nix b/third_party/nixpkgs/pkgs/applications/editors/glow/default.nix
index 0bb8b4eb18..1dc140f3e0 100644
--- a/third_party/nixpkgs/pkgs/applications/editors/glow/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/editors/glow/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "glow";
- version = "1.0.2";
+ version = "1.1.0";
src = fetchFromGitHub {
owner = "charmbracelet";
repo = "glow";
rev = "v${version}";
- sha256 ="0jyl5ln7c2naawmw7bljzrldr96xyb5rbis6y6blmyghr0vx07zb";
+ sha256 = "016psbm93ni81k87i9gx3cjr59j1fmpq5x8vz0ydabczzdshd1py";
};
- vendorSha256 = "0z3r8fvpy36ybgb18sr0lril1sg8z7s99xv1a6g1v3zdnj3zimav";
+ vendorSha256 = "0gvlbj8b5sqk93ahg4b2krwrmr8ljz7cah77fxaxcd98apap0pw6";
doCheck = false;
diff --git a/third_party/nixpkgs/pkgs/applications/editors/kakoune/default.nix b/third_party/nixpkgs/pkgs/applications/editors/kakoune/default.nix
index eec14f286b..f1f8110665 100644
--- a/third_party/nixpkgs/pkgs/applications/editors/kakoune/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/editors/kakoune/default.nix
@@ -30,6 +30,15 @@ stdenv.mkDerivation rec {
$out/bin/kak -ui json -E "kill 0"
'';
+ postInstall = ''
+ # make share/kak/autoload a directory, so we can use symlinkJoin with plugins
+ cd "$out/share/kak"
+ autoload_target=$(readlink autoload)
+ rm autoload
+ mkdir autoload
+ ln -s --relative "$autoload_target" autoload
+ '';
+
meta = {
homepage = "http://kakoune.org/";
description = "A vim inspired text editor";
diff --git a/third_party/nixpkgs/pkgs/applications/editors/kakoune/plugins/default.nix b/third_party/nixpkgs/pkgs/applications/editors/kakoune/plugins/default.nix
index 3926973f7e..93241b93b0 100644
--- a/third_party/nixpkgs/pkgs/applications/editors/kakoune/plugins/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/editors/kakoune/plugins/default.nix
@@ -1,7 +1,7 @@
-{ pkgs, parinfer-rust }:
+{ pkgs, parinfer-rust, rep }:
{
- inherit parinfer-rust;
+ inherit parinfer-rust rep;
case-kak = pkgs.callPackage ./case.kak.nix { };
kak-ansi = pkgs.callPackage ./kak-ansi.nix { };
diff --git a/third_party/nixpkgs/pkgs/applications/editors/kakoune/wrapper.nix b/third_party/nixpkgs/pkgs/applications/editors/kakoune/wrapper.nix
index b4cc823880..7ac56d9cb1 100644
--- a/third_party/nixpkgs/pkgs/applications/editors/kakoune/wrapper.nix
+++ b/third_party/nixpkgs/pkgs/applications/editors/kakoune/wrapper.nix
@@ -1,44 +1,31 @@
-{ stdenv, bash }:
-with stdenv.lib;
-
-kakoune:
+{ symlinkJoin, makeWrapper, kakoune, plugins ? [], configure ? {} }:
let
- getPlugins = { plugins ? [] }: plugins;
+ # "plugins" is the preferred way, but some configurations may be
+ # using "configure.plugins", so accept both
+ requestedPlugins = plugins ++ (configure.plugins or []);
- wrapper = { configure ? {} }:
- stdenv.mkDerivation rec {
- pname = "kakoune";
- version = getVersion kakoune;
+in
+ symlinkJoin {
+ name = "kakoune-${kakoune.version}";
- src = ./.;
- buildCommand = ''
- mkdir -p $out/share/kak
- for plugin in ${strings.escapeShellArgs (getPlugins configure)}; do
- if [[ -d $plugin/share/kak/autoload ]]; then
- find "$plugin/share/kak/autoload" -type f -name '*.kak'| while read rcfile; do
- printf 'source "%s"\n' "$rcfile"
- done
- fi
- done >>$out/share/kak/plugins.kak
+ buildInputs = [ makeWrapper ];
- mkdir -p $out/bin
- substitute ${src}/wrapper.sh $out/bin/kak \
- --subst-var-by bash "${bash}" \
- --subst-var-by kakoune "${kakoune}" \
- --subst-var-by out "$out"
- chmod +x $out/bin/kak
+ paths = [ kakoune ] ++ requestedPlugins;
+
+ postBuild = ''
+ # location of kak binary is used to find ../share/kak/autoload,
+ # unless explicitly overriden with KAKOUNE_RUNTIME
+ rm "$out/bin/kak"
+ makeWrapper "${kakoune}/bin/kak" "$out/bin/kak" --set KAKOUNE_RUNTIME "$out/share/kak"
+
+ # currently kakoune ignores doc files if they are symlinks, so workaround by
+ # copying doc files over, so they become regular files...
+ mkdir "$out/DELETE_ME"
+ mv "$out/share/kak/doc" "$out/DELETE_ME"
+ cp -r --dereference "$out/DELETE_ME/doc" "$out/share/kak"
+ rm -Rf "$out/DELETE_ME"
'';
- preferLocalBuild = true;
- buildInputs = [ bash kakoune ];
- passthru = { unwrapped = kakoune; };
-
- meta = kakoune.meta // {
- # prefer wrapper over the package
- priority = (kakoune.meta.priority or 0) - 1;
- hydraPlatforms = [];
- };
- };
-in
- makeOverridable wrapper
+ meta = kakoune.meta // { priority = (kakoune.meta.priority or 0) - 1; };
+ }
diff --git a/third_party/nixpkgs/pkgs/applications/editors/kakoune/wrapper.sh b/third_party/nixpkgs/pkgs/applications/editors/kakoune/wrapper.sh
deleted file mode 100644
index 48a971a10c..0000000000
--- a/third_party/nixpkgs/pkgs/applications/editors/kakoune/wrapper.sh
+++ /dev/null
@@ -1,30 +0,0 @@
-#!@bash@/bin/bash
-
-# We use the -E option to load plugins. This only makes sense when we are
-# starting a new session, so we detect that. Also, Kakoune can only handle
-# one -E option, so we prepend loading plugins to an existing one.
-args=( "$@" )
-loadPlugins=true
-EValueOffset=-1
-pluginScript='@out@/share/kak/plugins.kak'
-
-for (( i = 0; i < ${#args[@]}; i++ )); do
- case "${args[i]}" in
- -n|-c|-l|-p|-clear|-version) loadPlugins=false;;
- -E) EValueOffset=$(( i + 1 ));;
- --) break;;
- esac
- case "${args[i]}" in
- -E|-c|-e|-s|-p|-f|-i|-ui|-debug) i=$(( i + 1 ));;
- esac
-done
-
-if [[ $loadPlugins = true ]]; then
- if (( EValueOffset >= 0 )); then
- args[EValueOffset]="source '$pluginScript'"$'\n'"${args[EValueOffset]}"
- else
- args=( "-E" "source '$pluginScript'" "${args[@]}" )
- fi
-fi
-
-exec @kakoune@/bin/kak "${args[@]}"
diff --git a/third_party/nixpkgs/pkgs/applications/editors/kile/default.nix b/third_party/nixpkgs/pkgs/applications/editors/kile/default.nix
index fa25252fc6..6819c4337f 100644
--- a/third_party/nixpkgs/pkgs/applications/editors/kile/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/editors/kile/default.nix
@@ -29,14 +29,17 @@ mkDerivation rec {
sha256 = "BEmSEv/LJPs6aCkUmnyuTGrV15WYXwgIANbfcviMXfA=";
};
- nativeBuildInputs = [ extra-cmake-modules wrapGAppsHook ];
+ nativeBuildInputs = [
+ extra-cmake-modules
+ wrapGAppsHook
+ kdoctools
+ ];
- propagatedBuildInputs = [
+ buildInputs = [
kconfig
kcrash
kdbusaddons
kdelibs4support
- kdoctools
kguiaddons
kiconthemes
kinit
@@ -48,11 +51,15 @@ mkDerivation rec {
poppler
qtscript
];
+ dontWrapGApps = true;
+ preFixup = ''
+ makeWrapperArgs+=("''${gappsWrapperArgs[@]}")
+ '';
propagatedUserEnvPkgs = [ konsole ];
meta = {
- description = "Kile is a user friendly TeX/LaTeX authoring tool for the KDE desktop environment";
+ description = "User-friendly TeX/LaTeX authoring tool for the KDE desktop environment";
homepage = "https://www.kde.org/applications/office/kile/";
maintainers = with lib.maintainers; [ fridh ];
license = lib.licenses.gpl2Plus;
diff --git a/third_party/nixpkgs/pkgs/applications/editors/marker/default.nix b/third_party/nixpkgs/pkgs/applications/editors/marker/default.nix
new file mode 100644
index 0000000000..19ffdbd2c2
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/applications/editors/marker/default.nix
@@ -0,0 +1,49 @@
+{ stdenv
+, fetchFromGitHub
+, meson
+, ninja
+, pkg-config
+, wrapGAppsHook
+, gtk3
+, gtksourceview
+, gtkspell3
+, webkitgtk
+, pandoc
+}:
+
+stdenv.mkDerivation rec {
+ pname = "marker";
+ version = "2020.04.04";
+
+ src = fetchFromGitHub {
+ owner = "fabiocolacio";
+ repo = "Marker";
+ rev = version;
+ fetchSubmodules = true;
+ sha256 = "1iy7izyprf050bix8am1krqivgyxnhx3jm775v8f80cgbqxy7m5r";
+ };
+
+ nativeBuildInputs = [
+ meson
+ ninja
+ pkg-config
+ wrapGAppsHook
+ ];
+
+ buildInputs = [
+ gtk3
+ gtksourceview
+ gtkspell3
+ webkitgtk
+ pandoc
+ ];
+
+ meta = with stdenv.lib; {
+ homepage = "https://fabiocolacio.github.io/Marker/";
+ description = "Markdown editor for the Linux desktop";
+ maintainers = with maintainers; [ trepetti ];
+ license = licenses.gpl3Plus;
+ platforms = platforms.linux;
+ changelog = "https://github.com/fabiocolacio/Marker/releases/tag/${version}";
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/applications/editors/micro/default.nix b/third_party/nixpkgs/pkgs/applications/editors/micro/default.nix
index ffef5d5fdd..f3506b0cb9 100644
--- a/third_party/nixpkgs/pkgs/applications/editors/micro/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/editors/micro/default.nix
@@ -1,40 +1,33 @@
-{ stdenv, buildGoPackage, fetchFromGitHub, installShellFiles }:
+{ lib, buildGoModule, fetchFromGitHub, installShellFiles }:
-buildGoPackage rec {
+buildGoModule rec {
pname = "micro";
- version = "2.0.7";
-
- goPackagePath = "github.com/zyedidia/micro";
+ version = "2.0.8";
src = fetchFromGitHub {
owner = "zyedidia";
repo = pname;
rev = "v${version}";
- sha256 = "07ck1a9arklic3p0z50wcg608cvpba1kljvlfb4fljr6jhv5cmkb";
- fetchSubmodules = true;
+ sha256 = "1b51fvc9hrjfl8acr3yybp66xfll7d43412qwi76wxwarn06gkci";
};
nativeBuildInputs = [ installShellFiles ];
subPackages = [ "cmd/micro" ];
- buildFlagsArray = let t = "${goPackagePath}/internal/util"; in ''
- -ldflags=
- -X ${t}.Version=${version}
- -X ${t}.CommitHash=${src.rev}
- '';
+ vendorSha256 = "19iqvl63g9y6gkzfmv87rrgj4c4y6ngh467ss94rzrhaybj2b2d8";
- goDeps = ./deps.nix;
+ buildFlagsArray = [ "-ldflags=-s -w -X github.com/zyedidia/micro/v2/internal/util.Version=${version} -X github.com/zyedidia/micro/v2/internal/util.CommitHash=${src.rev}" ];
postInstall = ''
- installManPage $src/assets/packaging/micro.1
+ installManPage assets/packaging/micro.1
+ install -Dt $out/share/applications assets/packaging/micro.desktop
'';
- meta = with stdenv.lib; {
+ meta = with lib; {
homepage = "https://micro-editor.github.io";
description = "Modern and intuitive terminal-based text editor";
license = licenses.mit;
maintainers = with maintainers; [ dtzWill ];
};
}
-
diff --git a/third_party/nixpkgs/pkgs/applications/editors/micro/deps.nix b/third_party/nixpkgs/pkgs/applications/editors/micro/deps.nix
deleted file mode 100644
index d1cb91c295..0000000000
--- a/third_party/nixpkgs/pkgs/applications/editors/micro/deps.nix
+++ /dev/null
@@ -1,345 +0,0 @@
-# file generated from go.mod using vgo2nix (https://github.com/adisbladis/vgo2nix)
-[
- {
- goPackagePath = "github.com/blang/semver";
- fetch = {
- type = "git";
- url = "https://github.com/blang/semver";
- rev = "v3.5.1";
- sha256 = "13ws259bwcibkclbr82ilhk6zadm63kxklxhk12wayklj8ghhsmy";
- };
- }
- {
- goPackagePath = "github.com/chzyer/logex";
- fetch = {
- type = "git";
- url = "https://github.com/chzyer/logex";
- rev = "v1.1.10";
- sha256 = "08pbjj3wx9acavlwyr055isa8a5hnmllgdv5k6ra60l5y1brmlq4";
- };
- }
- {
- goPackagePath = "github.com/chzyer/readline";
- fetch = {
- type = "git";
- url = "https://github.com/chzyer/readline";
- rev = "2972be24d48e";
- sha256 = "104q8dazj8yf6b089jjr82fy9h1g80zyyzvp3g8b44a7d8ngjj6r";
- };
- }
- {
- goPackagePath = "github.com/chzyer/test";
- fetch = {
- type = "git";
- url = "https://github.com/chzyer/test";
- rev = "a1ea475d72b1";
- sha256 = "0rns2aqk22i9xsgyap0pq8wi4cfaxsri4d9q6xxhhyma8jjsnj2k";
- };
- }
- {
- goPackagePath = "github.com/davecgh/go-spew";
- fetch = {
- type = "git";
- url = "https://github.com/davecgh/go-spew";
- rev = "v1.1.1";
- sha256 = "0hka6hmyvp701adzag2g26cxdj47g21x6jz4sc6jjz1mn59d474y";
- };
- }
- {
- goPackagePath = "github.com/dustin/go-humanize";
- fetch = {
- type = "git";
- url = "https://github.com/dustin/go-humanize";
- rev = "v1.0.0";
- sha256 = "1kqf1kavdyvjk7f8kx62pnm7fbypn9z1vbf8v2qdh3y7z7a0cbl3";
- };
- }
- {
- goPackagePath = "github.com/gdamore/encoding";
- fetch = {
- type = "git";
- url = "https://github.com/gdamore/encoding";
- rev = "v1.0.0";
- sha256 = "1vmm5zll92i2fm4ajqx0gyx0p9j36496x5nabi3y0x7h0inv0pk9";
- };
- }
- {
- goPackagePath = "github.com/go-errors/errors";
- fetch = {
- type = "git";
- url = "https://github.com/go-errors/errors";
- rev = "v1.0.1";
- sha256 = "0rznpknk19rxkr7li6dqs52c26pjazp69lh493l4ny4sxn5922lp";
- };
- }
- {
- goPackagePath = "github.com/kballard/go-shellquote";
- fetch = {
- type = "git";
- url = "https://github.com/kballard/go-shellquote";
- rev = "95032a82bc51";
- sha256 = "1rspvmnsikdq95jmx3dykxd4k1rmgl98ryjrysvl0cf18hl1vq80";
- };
- }
- {
- goPackagePath = "github.com/kr/pretty";
- fetch = {
- type = "git";
- url = "https://github.com/kr/pretty";
- rev = "v0.1.0";
- sha256 = "18m4pwg2abd0j9cn5v3k2ksk9ig4vlwxmlw9rrglanziv9l967qp";
- };
- }
- {
- goPackagePath = "github.com/kr/pty";
- fetch = {
- type = "git";
- url = "https://github.com/kr/pty";
- rev = "v1.1.1";
- sha256 = "0383f0mb9kqjvncqrfpidsf8y6ns5zlrc91c6a74xpyxjwvzl2y6";
- };
- }
- {
- goPackagePath = "github.com/kr/text";
- fetch = {
- type = "git";
- url = "https://github.com/kr/text";
- rev = "v0.1.0";
- sha256 = "1gm5bsl01apvc84bw06hasawyqm4q84vx1pm32wr9jnd7a8vjgj1";
- };
- }
- {
- goPackagePath = "github.com/lucasb-eyer/go-colorful";
- fetch = {
- type = "git";
- url = "https://github.com/lucasb-eyer/go-colorful";
- rev = "v1.0.3";
- sha256 = "12bgz6dxbb2ki1g3x7fg9ipsjgfkd58fp7cdpv63h4kvlj2n7j69";
- };
- }
- {
- goPackagePath = "github.com/mattn/go-isatty";
- fetch = {
- type = "git";
- url = "https://github.com/mattn/go-isatty";
- rev = "v0.0.11";
- sha256 = "0h671sv7hfprja495kavazkalkx7xzaqksjh13brcnwq67ijrali";
- };
- }
- {
- goPackagePath = "github.com/mattn/go-runewidth";
- fetch = {
- type = "git";
- url = "https://github.com/mattn/go-runewidth";
- rev = "v0.0.7";
- sha256 = "1snr8mk63vz2h44knq26dm81p83887v7kb09iywqmx0nqzngih66";
- };
- }
- {
- goPackagePath = "github.com/mitchellh/go-homedir";
- fetch = {
- type = "git";
- url = "https://github.com/mitchellh/go-homedir";
- rev = "v1.1.0";
- sha256 = "0ydzkipf28hwj2bfxqmwlww47khyk6d152xax4bnyh60f4lq3nx1";
- };
- }
- {
- goPackagePath = "github.com/pmezard/go-difflib";
- fetch = {
- type = "git";
- url = "https://github.com/pmezard/go-difflib";
- rev = "v1.0.0";
- sha256 = "0c1cn55m4rypmscgf0rrb88pn58j3ysvc2d0432dp3c6fqg6cnzw";
- };
- }
- {
- goPackagePath = "github.com/robertkrimen/otto";
- fetch = {
- type = "git";
- url = "https://github.com/robertkrimen/otto";
- rev = "c382bd3c16ff";
- sha256 = "043y6l647snsz71mdy84s2d3kn22aj6rbqd6c1vd8absvamqhlxa";
- };
- }
- {
- goPackagePath = "github.com/sergi/go-diff";
- fetch = {
- type = "git";
- url = "https://github.com/sergi/go-diff";
- rev = "v1.1.0";
- sha256 = "0ir8ali2vx0j7pipmlfd6k8c973akyy2nmbjrf008fm800zcp7z2";
- };
- }
- {
- goPackagePath = "github.com/stretchr/objx";
- fetch = {
- type = "git";
- url = "https://github.com/stretchr/objx";
- rev = "v0.1.0";
- sha256 = "19ynspzjdynbi85xw06mh8ad5j0qa1vryvxjgvbnyrr8rbm4vd8w";
- };
- }
- {
- goPackagePath = "github.com/stretchr/testify";
- fetch = {
- type = "git";
- url = "https://github.com/stretchr/testify";
- rev = "v1.4.0";
- sha256 = "187i5g88sxfy4vxpm7dw1gwv29pa2qaq475lxrdh5livh69wqfjb";
- };
- }
- {
- goPackagePath = "github.com/xo/terminfo";
- fetch = {
- type = "git";
- url = "https://github.com/xo/terminfo";
- rev = "454e5b68f9e8";
- sha256 = "0xvjb09nwbanp7ja4560pwb6b2xr9h0axyr7f5clgncca2k4f1pd";
- };
- }
- {
- goPackagePath = "github.com/yuin/gopher-lua";
- fetch = {
- type = "git";
- url = "https://github.com/yuin/gopher-lua";
- rev = "ab39c6098bdb";
- sha256 = "13b0rrpv3988qw8rq6z7npajn1my059ybhafi5mxff9jw09k9sja";
- };
- }
- {
- goPackagePath = "github.com/zyedidia/clipboard";
- fetch = {
- type = "git";
- url = "https://github.com/zyedidia/clipboard";
- rev = "v1.0.3";
- sha256 = "134vnx0r51f08b37yaymlxlfl14qv6r8yzgqz7dxxn1zw9197b3q";
- };
- }
- {
- goPackagePath = "github.com/zyedidia/glob";
- fetch = {
- type = "git";
- url = "https://github.com/zyedidia/glob";
- rev = "dd4023a66dc3";
- sha256 = "1vqw4xbqq6j8p5m7mwxvb448w69vjvgzx0ndsfzdh2cxfirwp3y7";
- };
- }
- {
- goPackagePath = "github.com/zyedidia/highlight";
- fetch = {
- type = "git";
- url = "https://github.com/zyedidia/highlight";
- rev = "201131ce5cf5";
- sha256 = "0blaynf32swmqddx2hcrifrfssj9c04kwnbdy42h3kzxihrwz4ps";
- };
- }
- {
- goPackagePath = "github.com/zyedidia/json5";
- fetch = {
- type = "git";
- url = "https://github.com/zyedidia/json5";
- rev = "2da050b1a98d";
- sha256 = "1sgydazf3npr788b4w17ydmlh3fd1zmpriv9b69967ww90ckh2kz";
- };
- }
- {
- goPackagePath = "github.com/zyedidia/poller";
- fetch = {
- type = "git";
- url = "https://github.com/zyedidia/poller";
- rev = "v1.0.1";
- sha256 = "10cjrqfk1j0l55bdbpm7kv4mqc665pngc8avai0p9chq03y2654g";
- };
- }
- {
- goPackagePath = "github.com/zyedidia/pty";
- fetch = {
- type = "git";
- url = "https://github.com/zyedidia/pty";
- rev = "v2.0.0";
- sha256 = "1n946ld8y2v2wfbwsxv8rfaicxbw3w8pk11ryc8iybmw7hkmmf79";
- };
- }
- {
- goPackagePath = "github.com/zyedidia/tcell";
- fetch = {
- type = "git";
- url = "https://github.com/zyedidia/tcell";
- rev = "v2.0.2";
- sha256 = "0fr7zm6zcir2bjll5ycdxy9m98gjr3ins7mzmqpd46b3njzbl75z";
- };
- }
- {
- goPackagePath = "github.com/zyedidia/terminal";
- fetch = {
- type = "git";
- url = "https://github.com/zyedidia/terminal";
- rev = "533c623e2415";
- sha256 = "16l628f3zgl5yp9z5zkfy2hyl2sckw4d6mg3iqv2jjvh4i8yhrsm";
- };
- }
- {
- goPackagePath = "golang.org/x/sys";
- fetch = {
- type = "git";
- url = "https://go.googlesource.com/sys";
- rev = "33540a1f6037";
- sha256 = "0fjcv0vzvi6za0b4xmnk3932pr9f9gczzf03y0kgq3ry9rqg169y";
- };
- }
- {
- goPackagePath = "golang.org/x/text";
- fetch = {
- type = "git";
- url = "https://go.googlesource.com/text";
- rev = "v0.3.2";
- sha256 = "0flv9idw0jm5nm8lx25xqanbkqgfiym6619w575p7nrdh0riqwqh";
- };
- }
- {
- goPackagePath = "golang.org/x/tools";
- fetch = {
- type = "git";
- url = "https://go.googlesource.com/tools";
- rev = "90fa682c2a6e";
- sha256 = "03ic2xsy51jw9749wl7gszdbz99iijbd2bckgygl6cm9w5m364ak";
- };
- }
- {
- goPackagePath = "gopkg.in/check.v1";
- fetch = {
- type = "git";
- url = "https://gopkg.in/check.v1";
- rev = "41f04d3bba15";
- sha256 = "0vfk9czmlxmp6wndq8k17rhnjxal764mxfhrccza7nwlia760pjy";
- };
- }
- {
- goPackagePath = "gopkg.in/sourcemap.v1";
- fetch = {
- type = "git";
- url = "https://gopkg.in/sourcemap.v1";
- rev = "v1.0.5";
- sha256 = "08rf2dl13hbnm3fq2cm0nnsspy9fhf922ln23cz5463cv7h62as4";
- };
- }
- {
- goPackagePath = "gopkg.in/yaml.v2";
- fetch = {
- type = "git";
- url = "https://gopkg.in/yaml.v2";
- rev = "v2.2.7";
- sha256 = "0k5xcwkd3wmcx54isk7ck9cwp8fapfhyqdz3f13kxp77cxqizazj";
- };
- }
- {
- goPackagePath = "layeh.com/gopher-luar";
- fetch = {
- type = "git";
- url = "https://github.com/layeh/gopher-luar";
- rev = "v1.0.7";
- sha256 = "1rdbni3q7zajmiy62ccvbfgqjzppk5212wpwks2ba726hvyf85mj";
- };
- }
-]
diff --git a/third_party/nixpkgs/pkgs/applications/editors/neovim/utils.nix b/third_party/nixpkgs/pkgs/applications/editors/neovim/utils.nix
new file mode 100644
index 0000000000..906a726924
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/applications/editors/neovim/utils.nix
@@ -0,0 +1,161 @@
+{ lib
+, vimUtils
+, nodejs
+, neovim-unwrapped
+, bundlerEnv
+, ruby
+, pythonPackages
+, python3Packages
+, writeText
+, wrapNeovimUnstable
+}:
+let
+ # returns everything needed for the caller to wrap its own neovim:
+ # - the generated content of the future init.vim
+ # - the arguments to wrap neovim with
+ # The caller is responsible for writing the init.vim and adding it to the wrapped
+ # arguments (["-u" writeText "init.vim" GENERATEDRC)]).
+ # This makes it possible to write the config anywhere: on a per-project basis
+ # .nvimrc or in $XDG_CONFIG_HOME/nvim/init.vim to avoid sideeffects.
+ # Indeed, note that wrapping with `-u init.vim` has sideeffects like .nvimrc wont be loaded
+ # anymore, $MYVIMRC wont be set etc
+ makeNeovimConfig =
+ {
+ withPython2 ? false
+ /* the function you would have passed to python.withPackages */
+ , extraPython2Packages ? (_: [ ])
+ , withPython3 ? true
+ /* the function you would have passed to python3.withPackages */
+ , extraPython3Packages ? (_: [ ])
+ , withNodeJs ? false
+ , withRuby ? true
+
+ # same values as in vimUtils.vimrcContent
+ , configure ? { }
+
+ # for forward compability, when adding new environments, haskell etc.
+ , ...
+ }:
+ let
+ rubyEnv = bundlerEnv {
+ name = "neovim-ruby-env";
+ gemdir = ./ruby_provider;
+ postBuild = ''
+ ln -sf ${ruby}/bin/* $out/bin
+ '';
+ };
+
+ requiredPlugins = vimUtils.requiredPlugins configure;
+ getDeps = attrname: map (plugin: plugin.${attrname} or (_: [ ]));
+
+ pluginPython2Packages = getDeps "pythonDependencies" requiredPlugins;
+ python2Env = pythonPackages.python.withPackages (ps:
+ [ ps.pynvim ]
+ ++ (extraPython2Packages ps)
+ ++ (lib.concatMap (f: f ps) pluginPython2Packages));
+
+ pluginPython3Packages = getDeps "python3Dependencies" requiredPlugins;
+ python3Env = python3Packages.python.withPackages (ps:
+ [ ps.pynvim ]
+ ++ (extraPython3Packages ps)
+ ++ (lib.concatMap (f: f ps) pluginPython3Packages));
+
+
+ # Mapping a boolean argument to a key that tells us whether to add or not to
+ # add to nvim's 'embedded rc' this:
+ # let g:_host_prog=$out/bin/nvim-
+ # Or this:
+ # let g:loaded_${prog}_provider=1
+ # While the latter tells nvim that this provider is not available
+ hostprog_check_table = {
+ node = withNodeJs;
+ python = withPython2;
+ python3 = withPython3;
+ ruby = withRuby;
+ };
+ ## Here we calculate all of the arguments to the 1st call of `makeWrapper`
+ # We start with the executable itself NOTE we call this variable "initial"
+ # because if configure != {} we need to call makeWrapper twice, in order to
+ # avoid double wrapping, see comment near finalMakeWrapperArgs
+ makeWrapperArgs =
+ let
+ binPath = lib.makeBinPath (lib.optionals withRuby [ rubyEnv ] ++ lib.optionals withNodeJs [ nodejs ]);
+
+ flags = lib.concatLists (lib.mapAttrsToList (
+ prog: withProg: [
+ "--cmd" (genProviderSettings prog withProg)
+ ]
+ )
+ hostprog_check_table);
+ in
+ [
+ "--argv0" "$0" "--add-flags" (lib.escapeShellArgs flags)
+ ] ++ lib.optionals withRuby [
+ "--set" "GEM_HOME" "${rubyEnv}/${rubyEnv.ruby.gemPath}"
+ ] ++ lib.optionals (binPath != "") [
+ "--suffix" "PATH" ":" binPath
+ ];
+
+ manifestRc = vimUtils.vimrcContent (configure // { customRC = ""; });
+ neovimRcContent = vimUtils.vimrcContent configure;
+ in
+ {
+ wrapperArgs = makeWrapperArgs;
+ inherit neovimRcContent;
+ inherit manifestRc;
+ inherit python2Env;
+ inherit python3Env;
+ inherit withNodeJs;
+ } // lib.optionalAttrs withRuby {
+ inherit rubyEnv;
+ };
+
+ genProviderSettings = prog: withProg:
+ if withProg then
+ "let g:${prog}_host_prog='${placeholder "out"}/bin/nvim-${prog}'"
+ else
+ "let g:loaded_${prog}_provider=1"
+ ;
+
+ # to keep backwards compatibility
+ legacyWrapper = neovim: {
+ extraMakeWrapperArgs ? ""
+ , withPython ? true
+ /* the function you would have passed to python.withPackages */
+ , extraPythonPackages ? (_: [])
+ /* the function you would have passed to python.withPackages */
+ , withPython3 ? true, extraPython3Packages ? (_: [])
+ , withNodeJs ? false
+ , withRuby ? true
+ , vimAlias ? false
+ , viAlias ? false
+ , configure ? {}
+ }:
+ let
+ /* for compatibility with passing extraPythonPackages as a list; added 2018-07-11 */
+ compatFun = funOrList: (if builtins.isList funOrList then
+ (_: lib.warn "passing a list as extraPythonPackages to the neovim wrapper is deprecated, pass a function as to python.withPackages instead" funOrList)
+ else funOrList);
+
+ res = makeNeovimConfig {
+ withPython2 = withPython;
+ extraPythonPackages = compatFun extraPythonPackages;
+ inherit withPython3;
+ extraPython3Packages = compatFun extraPython3Packages;
+ inherit withNodeJs withRuby;
+
+ inherit configure;
+ };
+ in
+ wrapNeovimUnstable neovim (res // {
+ wrapperArgs = lib.escapeShellArgs (
+ res.wrapperArgs ++ lib.optionals (configure != {}) [
+ "--add-flags" "-u ${writeText "init.vim" res.neovimRcContent}"
+ ]) + " " + extraMakeWrapperArgs
+ ;
+ });
+in
+{
+ inherit makeNeovimConfig;
+ inherit legacyWrapper;
+}
diff --git a/third_party/nixpkgs/pkgs/applications/editors/neovim/wrapper.nix b/third_party/nixpkgs/pkgs/applications/editors/neovim/wrapper.nix
index cdc9a441dc..71bc38eadc 100644
--- a/third_party/nixpkgs/pkgs/applications/editors/neovim/wrapper.nix
+++ b/third_party/nixpkgs/pkgs/applications/editors/neovim/wrapper.nix
@@ -13,129 +13,46 @@ neovim:
let
wrapper = {
- extraMakeWrapperArgs ? ""
- , withPython ? true, extraPythonPackages ? (_: []) /* the function you would have passed to python.withPackages */
- , withPython3 ? true, extraPython3Packages ? (_: []) /* the function you would have passed to python.withPackages */
- , withNodeJs? false
- , withRuby ? true
+ # should contain all args but the binary
+ wrapperArgs ? ""
+ , manifestRc ? null
+ , withPython2 ? true, python2Env ? null
+ , withPython3 ? true, python3Env ? null
+ , withNodeJs ? false
+ , rubyEnv ? null
, vimAlias ? false
, viAlias ? false
- , configure ? {}
+ , ...
}:
let
- rubyEnv = bundlerEnv {
- name = "neovim-ruby-env";
- gemdir = ./ruby_provider;
- postBuild = ''
- ln -sf ${ruby}/bin/* $out/bin
- '';
- };
-
- /* for compatibility with passing extraPythonPackages as a list; added 2018-07-11 */
- compatFun = funOrList: (if builtins.isList funOrList then
- (_: lib.warn "passing a list as extraPythonPackages to the neovim wrapper is deprecated, pass a function as to python.withPackages instead" funOrList)
- else funOrList);
- extraPythonPackagesFun = compatFun extraPythonPackages;
- extraPython3PackagesFun = compatFun extraPython3Packages;
-
- requiredPlugins = vimUtils.requiredPlugins configure;
- getDeps = attrname: map (plugin: plugin.${attrname} or (_:[]));
-
- pluginPythonPackages = getDeps "pythonDependencies" requiredPlugins;
- pythonEnv = pythonPackages.python.withPackages(ps:
- [ ps.pynvim ]
- ++ (extraPythonPackagesFun ps)
- ++ (concatMap (f: f ps) pluginPythonPackages));
-
- pluginPython3Packages = getDeps "python3Dependencies" requiredPlugins;
- python3Env = python3Packages.python.withPackages (ps:
- [ ps.pynvim ]
- ++ (extraPython3PackagesFun ps)
- ++ (concatMap (f: f ps) pluginPython3Packages));
-
- binPath = makeBinPath (optionals withRuby [rubyEnv] ++ optionals withNodeJs [nodejs]);
-
- # Mapping a boolean argument to a key that tells us whether to add or not to
- # add to nvim's 'embedded rc' this:
- #
- # let g:_host_prog=$out/bin/nvim-
- #
- # Or this:
- #
- # let g:loaded_${prog}_provider=1
- #
- # While the later tells nvim that this provider is not available
- #
- hostprog_check_table = {
- node = withNodeJs;
- python = withPython;
- python3 = withPython3;
- ruby = withRuby;
- };
- ## Here we calculate all of the arguments to the 1st call of `makeWrapper`
- # We start with the executable itself NOTE we call this variable "initial"
- # because if configure != {} we need to call makeWrapper twice, in order to
- # avoid double wrapping, see comment near finalMakeWrapperArgs
- initialMakeWrapperArgs =
- let
- flags = lib.concatLists (lib.mapAttrsToList (
- prog:
- withProg:
- [
- "--cmd"
- (if withProg then
- "let g:${prog}_host_prog='${placeholder "out"}/bin/nvim-${prog}'"
- else
- "let g:loaded_${prog}_provider=1"
- )
- ]
- ) hostprog_check_table);
- in [
- "${neovim}/bin/nvim" "${placeholder "out"}/bin/nvim"
- "--argv0" "$0"
- "--add-flags" (lib.escapeShellArgs flags)
- ] ++ lib.optionals withRuby [
- "--set" "GEM_HOME" "${rubyEnv}/${rubyEnv.ruby.gemPath}"
- ] ++ lib.optionals (binPath != "") [
- "--suffix" "PATH" ":" binPath
- ];
# If configure != {}, we can't generate the rplugin.vim file with e.g
# NVIM_SYSTEM_RPLUGIN_MANIFEST *and* NVIM_RPLUGIN_MANIFEST env vars set in
# the wrapper. That's why only when configure != {} (tested both here and
# when postBuild is evaluated), we call makeWrapper once to generate a
# wrapper with most arguments we need, excluding those that cause problems to
# generate rplugin.vim, but still required for the final wrapper.
- finalMakeWrapperArgs = initialMakeWrapperArgs
- # this relies on a patched neovim, see
- # https://github.com/neovim/neovim/issues/9413
- ++ lib.optionals (configure != {}) [
- "--set" "NVIM_SYSTEM_RPLUGIN_MANIFEST" "${placeholder "out"}/rplugin.vim"
- "--add-flags" "-u ${configFile}"
- ];
- configFile = writeText "init.vim" "${vimUtils.vimrcContent configure}";
+ finalMakeWrapperArgs =
+ [ "${neovim}/bin/nvim" "${placeholder "out"}/bin/nvim" ] ++
+ [ "--set" "NVIM_SYSTEM_RPLUGIN_MANIFEST" "${placeholder "out"}/rplugin.vim" ];
in
symlinkJoin {
name = "neovim-${stdenv.lib.getVersion neovim}";
# Remove the symlinks created by symlinkJoin which we need to perform
# extra actions upon
- postBuild = ''
- rm $out/bin/nvim
- makeWrapper ${lib.escapeShellArgs initialMakeWrapperArgs} ${extraMakeWrapperArgs}
- ''
- + lib.optionalString stdenv.isLinux ''
+ postBuild = lib.optionalString stdenv.isLinux ''
rm $out/share/applications/nvim.desktop
substitute ${neovim}/share/applications/nvim.desktop $out/share/applications/nvim.desktop \
--replace 'TryExec=nvim' "TryExec=$out/bin/nvim" \
--replace 'Name=Neovim' 'Name=WrappedNeovim'
''
- + optionalString withPython ''
- makeWrapper ${pythonEnv}/bin/python $out/bin/nvim-python --unset PYTHONPATH
+ + optionalString withPython2 ''
+ makeWrapper ${python2Env}/bin/python $out/bin/nvim-python --unset PYTHONPATH
''
+ optionalString withPython3 ''
makeWrapper ${python3Env}/bin/python3 $out/bin/nvim-python3 --unset PYTHONPATH
''
- + optionalString withRuby ''
+ + optionalString (rubyEnv != null) ''
ln -s ${rubyEnv}/bin/neovim-ruby-host $out/bin/nvim-ruby
''
+ optionalString withNodeJs ''
@@ -147,9 +64,14 @@ let
+ optionalString viAlias ''
ln -s $out/bin/nvim $out/bin/vi
''
- + optionalString (configure != {}) ''
+ + optionalString (manifestRc != null) (let
+ manifestWrapperArgs =
+ [ "${neovim}/bin/nvim" "${placeholder "out"}/bin/nvim-wrapper" ];
+ in ''
echo "Generating remote plugin manifest"
export NVIM_RPLUGIN_MANIFEST=$out/rplugin.vim
+ makeWrapper ${lib.escapeShellArgs manifestWrapperArgs} ${wrapperArgs}
+
# Some plugins assume that the home directory is accessible for
# initializing caches, temporary files, etc. Even if the plugin isn't
# actively used, it may throw an error as soon as Neovim is launched
@@ -165,8 +87,8 @@ let
# (swap/viminfo) and redirect errors to stderr.
# Only display the log on error since it will contain a few normally
# irrelevant messages.
- if ! $out/bin/nvim \
- -u ${vimUtils.vimrcFile (configure // { customRC = ""; })} \
+ if ! $out/bin/nvim-wrapper \
+ -u ${writeText "manifest.vim" manifestRc} \
-i NONE -n \
-E -V1rplugins.log -s \
+UpdateRemotePlugins +quit! > outfile 2>&1; then
@@ -174,7 +96,11 @@ let
echo -e "\nGenerating rplugin.vim failed!"
exit 1
fi
- makeWrapper ${lib.escapeShellArgs finalMakeWrapperArgs} ${extraMakeWrapperArgs}
+ rm "${placeholder "out"}/bin/nvim-wrapper"
+ '')
+ + ''
+ rm $out/bin/nvim
+ makeWrapper ${lib.escapeShellArgs finalMakeWrapperArgs} ${wrapperArgs}
'';
paths = [ neovim ];
@@ -182,7 +108,7 @@ let
preferLocalBuild = true;
buildInputs = [makeWrapper];
- passthru = { unwrapped = neovim; inherit configFile; };
+ passthru = { unwrapped = neovim; };
meta = neovim.meta // {
# To prevent builds on hydra
diff --git a/third_party/nixpkgs/pkgs/applications/editors/textadept/default.nix b/third_party/nixpkgs/pkgs/applications/editors/textadept/default.nix
index bb771c8901..0456d013bb 100644
--- a/third_party/nixpkgs/pkgs/applications/editors/textadept/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/editors/textadept/default.nix
@@ -1,6 +1,7 @@
{ lib, stdenv, fetchhg, fetchurl, gtk2, glib, pkgconfig, unzip, ncurses, zip }:
+
stdenv.mkDerivation rec {
- version = "10.2";
+ version = "10.8";
pname = "textadept";
nativeBuildInputs = [ pkgconfig ];
@@ -11,7 +12,7 @@ stdenv.mkDerivation rec {
src = fetchhg {
url = "http://foicica.com/hg/textadept";
rev = "textadept_${version}";
- sha256 = "0fai8xqddkkprmbf0cf8wwgv7ccfdb1iyim30nppm2m16whkc8fl";
+ sha256 = "sha256-dEZSx2tuHTWYhk9q5iGlrWTAvDvKaM8HaHwXcFcv33s=";
};
preConfigure =
@@ -19,10 +20,6 @@ stdenv.mkDerivation rec {
"ln -s ${fetchurl params} $PWD/src/${name}"
) (import ./deps.nix)) + ''
- # work around trying to download stuff in `make deps`
- function wget() { true; }
- export -f wget
-
cd src
make deps
'';
@@ -31,12 +28,17 @@ stdenv.mkDerivation rec {
make curses
'';
+ preInstall = ''
+ mkdir -p $out/share/applications
+ mkdir -p $out/share/pixmaps
+ '';
+
postInstall = ''
make curses install PREFIX=$out MAKECMDGOALS=curses
'';
makeFlags = [
- "PREFIX=$(out)"
+ "PREFIX=$(out) WGET=true PIXMAPS_DIR=$(out)/share/pixmaps"
];
meta = with stdenv.lib; {
diff --git a/third_party/nixpkgs/pkgs/applications/editors/textadept/deps.nix b/third_party/nixpkgs/pkgs/applications/editors/textadept/deps.nix
index 80306191ff..3ab778dddb 100644
--- a/third_party/nixpkgs/pkgs/applications/editors/textadept/deps.nix
+++ b/third_party/nixpkgs/pkgs/applications/editors/textadept/deps.nix
@@ -1,23 +1,23 @@
{
- "542782a4df7d.zip" = {
- url = "http://foicica.com/hg/scintilla/archive/542782a4df7d.zip";
- sha256 = "1qwxxcj86z9y7ij05j60lcp1awy2c9ck0vnn9z6c732sqjza0zx5";
+ "99fa62b828ee.zip" = {
+ url = "http://foicica.com/hg/scintilla/archive/99fa62b828ee.zip";
+ sha256 = "sha256-QO4iGhx72CfB1/0Pp/Qab92qm98VZn/EkrHZGndoHVc=";
};
"lua-5.3.5.tar.gz" = {
url = "http://www.lua.org/ftp/lua-5.3.5.tar.gz";
sha256 = "1b2qn2rv96nmbm6zab4l877bd4zq7wpwm8drwjiy2ih4jqzysbhc";
};
- "lpeg-1.0.0.tar.gz" = {
- url = "http://www.inf.puc-rio.br/~roberto/lpeg/lpeg-1.0.0.tar.gz";
- sha256 = "13mz18s359wlkwm9d9iqlyyrrwjc6iqfpa99ai0icam2b3khl68h";
+ "lpeg-1.0.2.tar.gz" = {
+ url = "http://www.inf.puc-rio.br/~roberto/lpeg/lpeg-1.0.2.tar.gz";
+ sha256 = "sha256-SNZldgUbbHg4j6rQm3BJMJMmRYj80PJY3aqxzdShX/4=";
};
- "v_1_6_3.zip" = {
- url = "https://github.com/keplerproject/luafilesystem/archive/v_1_6_3.zip";
- sha256 = "044s125im2irb4i42nnc5shvjj25fp4vsdbzd6b0va5igj0f6h4y";
+ "v1_7_0_2.zip" = {
+ url = "https://github.com/keplerproject/luafilesystem/archive/v1_7_0_2.zip";
+ sha256 = "sha256-kXSriR8dOStCpYeyr7c3+VZez4qGDS5aK/9FeFj1hHg=";
};
- "6435a42450c7.zip" = {
- url = "http://foicica.com/hg/gtdialog/archive/6435a42450c7.zip";
- sha256 = "1vxn89sif3qccksb6x5iprysqhjg69g7nyxlgrg31q397dmsg1ym";
+ "db67f8a489e8.zip" = {
+ url = "http://foicica.com/hg/gtdialog/archive/db67f8a489e8.zip";
+ sha256 = "sha256-UIvjbDrg3jyz7t2tm4y1zzH/TG6Kqaz3LE5y2U6OHuM=";
};
"cdk-5.0-20150928.tgz" = {
url = "http://invisible-mirror.net/archives/cdk/cdk-5.0-20150928.tgz";
diff --git a/third_party/nixpkgs/pkgs/applications/editors/uemacs/default.nix b/third_party/nixpkgs/pkgs/applications/editors/uemacs/default.nix
deleted file mode 100644
index e14a07eb68..0000000000
--- a/third_party/nixpkgs/pkgs/applications/editors/uemacs/default.nix
+++ /dev/null
@@ -1,38 +0,0 @@
-{ stdenv, fetchgit, ncurses }:
-
-stdenv.mkDerivation {
- pname = "uemacs";
- version = "2014-12-08";
-
- src = fetchgit {
- url = "git://git.kernel.org/pub/scm/editors/uemacs/uemacs.git";
- rev = "8841922689769960fa074fbb053cb8507f2f3ed9";
- sha256 = "14yq7kpkax111cg6k7i3mnqk7sq7a65krq6qizzj7vvnm7bsj3sd";
- };
-
- postPatch = ''
- substituteInPlace Makefile \
- --replace "-lcurses" "-lncurses" \
- --replace "CFLAGS=-O2" "CFLAGS+=" \
- --replace "BINDIR=/usr/bin" "BINDIR=$out/bin" \
- --replace "LIBDIR=/usr/lib" "LIBDIR=$out/share/uemacs"
- substituteInPlace epath.h \
- --replace "/usr/global/lib/" "$out/share/uemacs/" \
- --replace "/usr/local/bin/" "$out/bin/" \
- --replace "/usr/local/lib/" "$out/share/uemacs/" \
- --replace "/usr/local/" "$out/bin/" \
- --replace "/usr/lib/" "$out/share/uemacs/"
- mkdir -p $out/bin $out/share/uemacs
- '';
-
- buildInputs = [ ncurses ];
-
- meta = with stdenv.lib; {
- homepage = "https://git.kernel.org/cgit/editors/uemacs/uemacs.git";
- description = "Torvalds Micro-emacs fork";
- longDescription = ''
- uEmacs/PK 4.0 is a full screen editor based on MicroEMACS 3.9e
- '';
- license = licenses.unfree;
- };
-}
diff --git a/third_party/nixpkgs/pkgs/applications/graphics/ImageMagick/7.0.nix b/third_party/nixpkgs/pkgs/applications/graphics/ImageMagick/7.0.nix
index bd4fa4b531..a1e39cfebe 100644
--- a/third_party/nixpkgs/pkgs/applications/graphics/ImageMagick/7.0.nix
+++ b/third_party/nixpkgs/pkgs/applications/graphics/ImageMagick/7.0.nix
@@ -14,8 +14,8 @@ let
else throw "ImageMagick is not supported on this platform.";
cfg = {
- version = "7.0.10-27";
- sha256 = "1fqwbg2ws6ix3bymx7ncb4k4f6bg8q44n9xnlvngjapflnrmhcph";
+ version = "7.0.10-35";
+ sha256 = "0hcqvn3n3ip2fia48d1nb1m4r5ir00vbaa62xqni30kglh3n2sfh";
patches = [];
};
in
diff --git a/third_party/nixpkgs/pkgs/applications/graphics/cloudcompare/default.nix b/third_party/nixpkgs/pkgs/applications/graphics/cloudcompare/default.nix
index 209a6a4753..26fabc364b 100644
--- a/third_party/nixpkgs/pkgs/applications/graphics/cloudcompare/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/graphics/cloudcompare/default.nix
@@ -18,17 +18,17 @@
mkDerivation rec {
pname = "cloudcompare";
- version = "2.11.0";
+ version = "2.11.2";
src = fetchFromGitHub {
owner = "CloudCompare";
repo = "CloudCompare";
rev = "v${version}";
- sha256 = "02ahhhivgb9k1aygw1m35wdvhaizag1r98mb0r6zzrs5p4y64wlb";
+ sha256 = "0sb2h08iaf6zrf54sg6ql6wm63q5vq0kpd3gffdm26z8w6j6wv3s";
# As of writing includes (https://github.com/CloudCompare/CloudCompare/blob/a1c589c006fc325e8b560c77340809b9c7e7247a/.gitmodules):
# * libE57Format
# * PoissonRecon
- # In > 2.11 it will also contain
+ # In a future version it will also contain
# * CCCoreLib
fetchSubmodules = true;
};
@@ -53,7 +53,7 @@ mkDerivation rec {
];
cmakeFlags = [
- # TODO: This will become -DCCCORELIB_USE_TBB=ON in > 2.11.0, see
+ # TODO: This will become -DCCCORELIB_USE_TBB=ON in a future version, see
# https://github.com/CloudCompare/CloudCompare/commit/f5a0c9fd788da26450f3fa488b2cf0e4a08d255f
"-DCOMPILE_CC_CORE_LIB_WITH_TBB=ON"
"-DOPTION_USE_DXF_LIB=ON"
diff --git a/third_party/nixpkgs/pkgs/applications/graphics/digikam/default.nix b/third_party/nixpkgs/pkgs/applications/graphics/digikam/default.nix
index 52de023e16..0654a2ed1a 100644
--- a/third_party/nixpkgs/pkgs/applications/graphics/digikam/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/graphics/digikam/default.nix
@@ -118,9 +118,12 @@ mkDerivation rec {
"-DENABLE_QWEBENGINE=on"
];
+ dontWrapGApps = true;
+
preFixup = ''
- gappsWrapperArgs+=(--prefix PATH : ${lib.makeBinPath [ gnumake hugin enblend-enfuse ]})
- gappsWrapperArgs+=(--suffix DK_PLUGIN_PATH : ${placeholder "out"}/${qtbase.qtPluginPrefix}/${pname})
+ qtWrapperArgs+=("''${gappsWrapperArgs[@]}")
+ qtWrapperArgs+=(--prefix PATH : ${lib.makeBinPath [ gnumake hugin enblend-enfuse ]})
+ qtWrapperArgs+=(--suffix DK_PLUGIN_PATH : ${placeholder "out"}/${qtbase.qtPluginPrefix}/${pname})
substituteInPlace $out/bin/digitaglinktree \
--replace "/usr/bin/perl" "${perl}/bin/perl" \
--replace "/usr/bin/sqlite3" "${sqlite}/bin/sqlite3"
diff --git a/third_party/nixpkgs/pkgs/applications/graphics/drawpile/default.nix b/third_party/nixpkgs/pkgs/applications/graphics/drawpile/default.nix
index e210d03406..cf37512ad9 100644
--- a/third_party/nixpkgs/pkgs/applications/graphics/drawpile/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/graphics/drawpile/default.nix
@@ -74,7 +74,7 @@ in mkDerivation rec {
src = fetchFromGitHub {
owner = "drawpile";
repo = "drawpile";
- rev = "${version}";
+ rev = version;
sha256 = "sha256-AFFY+FcY9ExAur13OoWR9285RZtBe6jnRIrwi5raiCM=";
};
diff --git a/third_party/nixpkgs/pkgs/applications/graphics/gnuclad/default.nix b/third_party/nixpkgs/pkgs/applications/graphics/gnuclad/default.nix
index d27c2636e2..c36d576cc8 100644
--- a/third_party/nixpkgs/pkgs/applications/graphics/gnuclad/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/graphics/gnuclad/default.nix
@@ -16,7 +16,7 @@ stdenv.mkDerivation rec {
meta = with stdenv.lib; {
homepage = "https://launchpad.net/gnuclad";
- description = "gnuclad tries to help the environment by creating trees. It's primary use will be generating cladogram trees for the GNU/Linux distro timeline project";
+ description = "gnuclad tries to help the environment by creating trees. Its primary use will be generating cladogram trees for the GNU/Linux distro timeline project";
license = licenses.gpl3Plus;
maintainers = with maintainers; [ mog ];
platforms = platforms.linux;
diff --git a/third_party/nixpkgs/pkgs/applications/graphics/lightburn/default.nix b/third_party/nixpkgs/pkgs/applications/graphics/lightburn/default.nix
index a5a255338e..da5caeff3a 100644
--- a/third_party/nixpkgs/pkgs/applications/graphics/lightburn/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/graphics/lightburn/default.nix
@@ -40,7 +40,7 @@ stdenv.mkDerivation rec {
'';
meta = {
- description = "LightBurn is layout, editing, and control software for your laser cutter";
+ description = "Layout, editing, and control software for your laser cutter";
homepage = "https://lightburnsoftware.com/";
license = stdenv.lib.licenses.unfree;
maintainers = with stdenv.lib.maintainers; [ q3k ];
diff --git a/third_party/nixpkgs/pkgs/applications/graphics/mandelbulber/default.nix b/third_party/nixpkgs/pkgs/applications/graphics/mandelbulber/default.nix
index a3ab52ba87..384ddac5b4 100644
--- a/third_party/nixpkgs/pkgs/applications/graphics/mandelbulber/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/graphics/mandelbulber/default.nix
@@ -19,13 +19,13 @@ assert withOpenCL -> ocl-icd != null;
mkDerivation rec {
pname = "mandelbulber";
- version = "2.22";
+ version = "2.23";
src = fetchFromGitHub {
owner = "buddhi1980";
repo = "mandelbulber2";
rev = version;
- sha256 = "011y2nl0jakf29cxprjmj1ifqc9iva61q5f4kk47b03gq7jw8sl4";
+ sha256 = "08izphj7jyk3wsq3qbzaf2fplys80vr39wliqc1i4c5cr90nrq1l";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/applications/kde/bomber.nix b/third_party/nixpkgs/pkgs/applications/kde/bomber.nix
index c3f4778025..f42a6a0187 100644
--- a/third_party/nixpkgs/pkgs/applications/kde/bomber.nix
+++ b/third_party/nixpkgs/pkgs/applications/kde/bomber.nix
@@ -7,7 +7,7 @@ mkDerivation {
name = "bomber";
meta = with lib; {
homepage = "https://kde.org/applications/en/games/org.kde.bomber";
- description = "Bomber is a single player arcade game";
+ description = "A single player arcade game";
longDescription = ''
Bomber is a single player arcade game. The player is invading various
cities in a plane that is decreasing in height.
diff --git a/third_party/nixpkgs/pkgs/applications/kde/default.nix b/third_party/nixpkgs/pkgs/applications/kde/default.nix
index 9622404c45..315a5b3588 100644
--- a/third_party/nixpkgs/pkgs/applications/kde/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/kde/default.nix
@@ -27,7 +27,6 @@ still shows most of the available features is in `./gwenview.nix`.
{
lib, libsForQt5, fetchurl,
- okteta
}:
let
@@ -107,6 +106,7 @@ let
kcharselect = callPackage ./kcharselect.nix {};
kcolorchooser = callPackage ./kcolorchooser.nix {};
kdebugsettings = callPackage ./kdebugsettings.nix {};
+ kdeconnect-kde = callPackage ./kdeconnect-kde.nix {};
kdegraphics-mobipocket = callPackage ./kdegraphics-mobipocket.nix {};
kdegraphics-thumbnailers = callPackage ./kdegraphics-thumbnailers.nix {};
kdenetwork-filesharing = callPackage ./kdenetwork-filesharing.nix {};
@@ -209,9 +209,6 @@ let
rocs = callPackage ./rocs.nix {};
spectacle = callPackage ./spectacle.nix {};
yakuake = callPackage ./yakuake.nix {};
- # Okteta was removed from kde applications and will now be released independently
- # Lets keep an alias for compatibility reasons
- inherit okteta;
};
in lib.makeScope libsForQt5.newScope packages
diff --git a/third_party/nixpkgs/pkgs/applications/kde/fetch.sh b/third_party/nixpkgs/pkgs/applications/kde/fetch.sh
index 90e1cf43f6..dc023c57a7 100644
--- a/third_party/nixpkgs/pkgs/applications/kde/fetch.sh
+++ b/third_party/nixpkgs/pkgs/applications/kde/fetch.sh
@@ -1 +1 @@
-WGET_ARGS=(http://download.kde.org/stable/release-service/20.08.1/src)
+WGET_ARGS=(http://download.kde.org/stable/release-service/20.08.2/src)
diff --git a/third_party/nixpkgs/pkgs/applications/kde/granatier.nix b/third_party/nixpkgs/pkgs/applications/kde/granatier.nix
index f0b7cde5b2..c02fa0fef2 100644
--- a/third_party/nixpkgs/pkgs/applications/kde/granatier.nix
+++ b/third_party/nixpkgs/pkgs/applications/kde/granatier.nix
@@ -7,7 +7,7 @@ mkDerivation {
name = "granatier";
meta = with lib; {
homepage = "https://kde.org/applications/en/games/org.kde.granatier";
- description = "Granatier is a clone of the classic Bomberman game";
+ description = "Clone of the classic Bomberman game";
maintainers = with maintainers; [ freezeboy ];
license = licenses.gpl2Plus;
platforms = platforms.linux;
diff --git a/third_party/nixpkgs/pkgs/applications/kde/kalzium.nix b/third_party/nixpkgs/pkgs/applications/kde/kalzium.nix
index 5bb51a6b4e..cf579caa9c 100644
--- a/third_party/nixpkgs/pkgs/applications/kde/kalzium.nix
+++ b/third_party/nixpkgs/pkgs/applications/kde/kalzium.nix
@@ -4,7 +4,7 @@ mkDerivation {
name = "kalzium";
meta = with lib; {
homepage = "https://kde.org/applications/en/utilities/org.kde.kalzium";
- description = "Kalzium is a program that shows you the Periodic Table of Elements";
+ description = "Program that shows you the Periodic Table of Elements";
maintainers = with maintainers; [ freezeboy ];
license = licenses.gpl2Plus;
platforms = platforms.linux;
diff --git a/third_party/nixpkgs/pkgs/applications/kde/kapman.nix b/third_party/nixpkgs/pkgs/applications/kde/kapman.nix
index 68af796dda..5f4cc40138 100644
--- a/third_party/nixpkgs/pkgs/applications/kde/kapman.nix
+++ b/third_party/nixpkgs/pkgs/applications/kde/kapman.nix
@@ -4,7 +4,7 @@ mkDerivation {
name = "kapman";
meta = with lib; {
homepage = "https://kde.org/applications/en/games/org.kde.kapman";
- description = "Kapman is a clone of the well known game Pac-Man";
+ description = "Clone of the well known game Pac-Man";
maintainers = with maintainers; [ freezeboy ];
license = licenses.gpl2Plus;
platforms = platforms.linux;
diff --git a/third_party/nixpkgs/pkgs/applications/kde/katomic.nix b/third_party/nixpkgs/pkgs/applications/kde/katomic.nix
index a1d0f12b6a..2690cfc058 100644
--- a/third_party/nixpkgs/pkgs/applications/kde/katomic.nix
+++ b/third_party/nixpkgs/pkgs/applications/kde/katomic.nix
@@ -4,7 +4,7 @@ mkDerivation {
name = "katomic";
meta = with lib; {
homepage = "https://kde.org/applications/en/games/org.kde.katomic";
- description = "KAtomic is a fun educational game built around molecular geometry";
+ description = "Fun educational game built around molecular geometry";
maintainers = with maintainers; [ freezeboy ];
license = licenses.gpl2Plus;
platforms = platforms.linux;
diff --git a/third_party/nixpkgs/pkgs/applications/kde/kblackbox.nix b/third_party/nixpkgs/pkgs/applications/kde/kblackbox.nix
index 669c089df8..ce0d8e36b9 100644
--- a/third_party/nixpkgs/pkgs/applications/kde/kblackbox.nix
+++ b/third_party/nixpkgs/pkgs/applications/kde/kblackbox.nix
@@ -4,7 +4,7 @@ mkDerivation {
name = "kblackbox";
meta = with lib; {
homepage = "https://kde.org/applications/en/games/org.kde.kblackbox";
- description = "KBlackbox is a game of hide and seek played on a grid of boxes";
+ description = "Game of hide and seek played on a grid of boxes";
maintainers = with maintainers; [ freezeboy ];
license = licenses.gpl2Plus;
platforms = platforms.linux;
diff --git a/third_party/nixpkgs/pkgs/applications/kde/kblocks.nix b/third_party/nixpkgs/pkgs/applications/kde/kblocks.nix
index 1dedabb2a0..a11a6e2574 100644
--- a/third_party/nixpkgs/pkgs/applications/kde/kblocks.nix
+++ b/third_party/nixpkgs/pkgs/applications/kde/kblocks.nix
@@ -4,7 +4,7 @@ mkDerivation {
name = "kblocks";
meta = with lib; {
homepage = "https://kde.org/applications/en/games/org.kde.kblocks";
- description = "KBlocks is the classic falling blocks game";
+ description = "Classic falling blocks game";
maintainers = with maintainers; [ freezeboy ];
license = licenses.gpl2Plus;
platforms = platforms.linux;
diff --git a/third_party/nixpkgs/pkgs/applications/kde/kbounce.nix b/third_party/nixpkgs/pkgs/applications/kde/kbounce.nix
index a24d215518..b67e3ce021 100644
--- a/third_party/nixpkgs/pkgs/applications/kde/kbounce.nix
+++ b/third_party/nixpkgs/pkgs/applications/kde/kbounce.nix
@@ -4,7 +4,7 @@ mkDerivation {
name = "kbounce";
meta = with lib; {
homepage = "https://kde.org/applications/en/games/org.kde.kbounce";
- description = "KBounce is a single player arcade game with the elements of puzzle";
+ description = "Single player arcade game with the elements of puzzle";
maintainers = with maintainers; [ freezeboy ];
license = licenses.gpl2Plus;
platforms = platforms.linux;
diff --git a/third_party/nixpkgs/pkgs/applications/misc/kdeconnect/default.nix b/third_party/nixpkgs/pkgs/applications/kde/kdeconnect-kde.nix
similarity index 64%
rename from third_party/nixpkgs/pkgs/applications/misc/kdeconnect/default.nix
rename to third_party/nixpkgs/pkgs/applications/kde/kdeconnect-kde.nix
index d042f011bb..83e54d1fa8 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/kdeconnect/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/kde/kdeconnect-kde.nix
@@ -1,39 +1,32 @@
{ mkDerivation
-, lib
-, fetchurl
-, fetchpatch
, extra-cmake-modules
+, fetchpatch
, kcmutils
, kconfigwidgets
, kdbusaddons
, kdoctools
-, kiconthemes
, ki18n
-, knotifications
-, qca-qt5
-, libfakekey
-, libXtst
-, qtx11extras
-, qtmultimedia
-, qtgraphicaleffects
-, sshfs
-, makeWrapper
-, kwayland
+, kiconthemes
, kio
-, kpeoplevcard
-, kpeople
, kirigami2
+, knotifications
+, kpeople
+, kpeoplevcard
+, kwayland
+, lib
+, libXtst
+, libfakekey
+, makeWrapper
, pulseaudio-qt
+, qca-qt5
+, qtgraphicaleffects
+, qtmultimedia
+, qtx11extras
+, sshfs
}:
-mkDerivation rec {
- pname = "kdeconnect";
- version = "20.08.2";
-
- src = fetchurl {
- url = "https://download.kde.org/stable/release-service/${version}/src/${pname}-kde-${version}.tar.xz";
- sha256 = "0rzfnkgkv759d4pa16qk0sw87wqzwgkd99yzrzfy2zcq423f6hvd";
- };
+mkDerivation {
+ name = "kdeconnect-kde";
patches = [
# https://invent.kde.org/network/kdeconnect-kde/-/merge_requests/328
@@ -44,39 +37,36 @@ mkDerivation rec {
];
buildInputs = [
- libfakekey
- libXtst
- qtmultimedia
- qtgraphicaleffects
- pulseaudio-qt
- kpeoplevcard
- kpeople
- kirigami2
- ki18n
- kiconthemes
kcmutils
kconfigwidgets
kdbusaddons
- knotifications
- qca-qt5
- qtx11extras
- makeWrapper
- kwayland
+ ki18n
+ kiconthemes
kio
+ kirigami2
+ knotifications
+ kpeople
+ kpeoplevcard
+ kwayland
+ libXtst
+ libfakekey
+ pulseaudio-qt
+ qca-qt5
+ qtgraphicaleffects
+ qtmultimedia
+ qtx11extras
];
- nativeBuildInputs = [ extra-cmake-modules kdoctools ];
+ nativeBuildInputs = [ extra-cmake-modules kdoctools makeWrapper ];
- postInstall = ''
- wrapProgram $out/libexec/kdeconnectd --prefix PATH : ${lib.makeBinPath [ sshfs ]}
- '';
-
- enableParallelBuilding = true;
+ qtWrapperArgs = [
+ "--prefix PATH : ${lib.makeBinPath [ sshfs ]}"
+ ];
meta = with lib; {
description = "KDE Connect provides several features to integrate your phone and your computer";
- homepage = "https://community.kde.org/KDEConnect";
- license = with licenses; [ gpl2 ];
+ homepage = "https://community.kde.org/KDEConnect";
+ license = with licenses; [ gpl2 ];
maintainers = with maintainers; [ fridh ];
};
}
diff --git a/third_party/nixpkgs/pkgs/applications/kde/kdenlive.nix b/third_party/nixpkgs/pkgs/applications/kde/kdenlive.nix
index 795ba87ad5..b2abee5793 100644
--- a/third_party/nixpkgs/pkgs/applications/kde/kdenlive.nix
+++ b/third_party/nixpkgs/pkgs/applications/kde/kdenlive.nix
@@ -25,9 +25,9 @@
, frei0r
, phonon-backend-gstreamer
, qtdeclarative
+, qtmultimedia
, qtquickcontrols2
, qtscript
-, qtwebkit
, rttr
, kpurpose
, kdeclarative
@@ -60,9 +60,9 @@ mkDerivation {
mlt
phonon-backend-gstreamer
qtdeclarative
+ qtmultimedia
qtquickcontrols2
qtscript
- qtwebkit
shared-mime-info
libv4l
ffmpeg-full
@@ -84,12 +84,20 @@ mkDerivation {
sed -i CMakeLists.txt -e '/find_package(Qt5 REQUIRED/ s|)| Concurrent)|'
substituteAllInPlace src/kdenlivesettings.kcfg
'';
+
+ dontWrapGApps = true;
+
# Frei0r path needs to be set too or Kdenlive will complain. See:
# https://github.com/NixOS/nixpkgs/issues/83885
# https://github.com/NixOS/nixpkgs/issues/29614#issuecomment-488849325
qtWrapperArgs = [
"--set FREI0R_PATH ${frei0r}/lib/frei0r-1"
];
+
+ preFixup = ''
+ qtWrapperArgs+=("''${gappsWrapperArgs[@]}")
+ '';
+
meta = {
license = with lib.licenses; [ gpl2Plus ];
};
diff --git a/third_party/nixpkgs/pkgs/applications/kde/kdiamond.nix b/third_party/nixpkgs/pkgs/applications/kde/kdiamond.nix
index 26cd731bea..6c124f9450 100644
--- a/third_party/nixpkgs/pkgs/applications/kde/kdiamond.nix
+++ b/third_party/nixpkgs/pkgs/applications/kde/kdiamond.nix
@@ -4,7 +4,7 @@ mkDerivation {
name = "kdiamond";
meta = with lib; {
homepage = "https://kde.org/applications/en/games/org.kde.kdiamond";
- description = "KDiamond is a single player puzzle game";
+ description = "A single player puzzle game";
maintainers = with maintainers; [ freezeboy ];
license = licenses.gpl2Plus;
platforms = platforms.linux;
diff --git a/third_party/nixpkgs/pkgs/applications/kde/kfloppy.nix b/third_party/nixpkgs/pkgs/applications/kde/kfloppy.nix
index 525520c159..a8747047f4 100644
--- a/third_party/nixpkgs/pkgs/applications/kde/kfloppy.nix
+++ b/third_party/nixpkgs/pkgs/applications/kde/kfloppy.nix
@@ -4,7 +4,7 @@ mkDerivation {
name = "kfloppy";
meta = with lib; {
homepage = "https://kde.org/applications/en/utilities/org.kde.kfloppy";
- description = "KFloppy is a utility to format 3.5\" and 5.25\" floppy disks";
+ description = "Utility to format 3.5\" and 5.25\" floppy disks";
maintainers = with maintainers; [ freezeboy ];
license = licenses.gpl2Plus;
platforms = platforms.linux;
diff --git a/third_party/nixpkgs/pkgs/applications/kde/klettres.nix b/third_party/nixpkgs/pkgs/applications/kde/klettres.nix
index e8e0a0aa59..aaddceb7bd 100644
--- a/third_party/nixpkgs/pkgs/applications/kde/klettres.nix
+++ b/third_party/nixpkgs/pkgs/applications/kde/klettres.nix
@@ -4,7 +4,7 @@ mkDerivation {
name = "klettres";
meta = with lib; {
homepage = "https://kde.org/applications/en/utilities/org.kde.klettres";
- description = "KLettres is an application specially designed to help the user to learn an alphabet";
+ description = "An application specially designed to help the user to learn an alphabet";
maintainers = with maintainers; [ freezeboy ];
license = licenses.gpl2Plus;
platforms = platforms.linux;
diff --git a/third_party/nixpkgs/pkgs/applications/kde/klines.nix b/third_party/nixpkgs/pkgs/applications/kde/klines.nix
index c6ad883dd6..7fadf409bd 100644
--- a/third_party/nixpkgs/pkgs/applications/kde/klines.nix
+++ b/third_party/nixpkgs/pkgs/applications/kde/klines.nix
@@ -4,7 +4,7 @@ mkDerivation {
name = "klines";
meta = with lib; {
homepage = "https://kde.org/applications/en/games/org.kde.klines";
- description = "KLines is a simple but highly addictive one player game";
+ description = "A simple but highly addictive one player game";
maintainers = with maintainers; [ freezeboy ];
license = licenses.gpl2Plus;
platforms = platforms.linux;
diff --git a/third_party/nixpkgs/pkgs/applications/kde/kmag.nix b/third_party/nixpkgs/pkgs/applications/kde/kmag.nix
index 701d8dbf13..fdac690cf2 100644
--- a/third_party/nixpkgs/pkgs/applications/kde/kmag.nix
+++ b/third_party/nixpkgs/pkgs/applications/kde/kmag.nix
@@ -4,7 +4,7 @@ mkDerivation {
name = "kmag";
meta = with lib; {
homepage = "https://kde.org/applications/en/utilities/org.kde.kmag";
- description = "KMag is a small utility for Linux to magnify a part of the screen";
+ description = "A small Linux utility to magnify a part of the screen";
maintainers = with maintainers; [ freezeboy ];
license = licenses.gpl2Plus;
platforms = platforms.linux;
diff --git a/third_party/nixpkgs/pkgs/applications/kde/kmines.nix b/third_party/nixpkgs/pkgs/applications/kde/kmines.nix
index 9314cca4a2..edf3114244 100644
--- a/third_party/nixpkgs/pkgs/applications/kde/kmines.nix
+++ b/third_party/nixpkgs/pkgs/applications/kde/kmines.nix
@@ -4,7 +4,7 @@ mkDerivation {
name = "kmines";
meta = with lib; {
homepage = "https://kde.org/applications/en/games/org.kde.kmines";
- description = "KMines is a classic Minesweeper game";
+ description = "A classic Minesweeper game";
maintainers = with maintainers; [ freezeboy ];
license = licenses.gpl2Plus;
platforms = platforms.linux;
diff --git a/third_party/nixpkgs/pkgs/applications/kde/knetwalk.nix b/third_party/nixpkgs/pkgs/applications/kde/knetwalk.nix
index 88d08b56bb..f34bb84f0a 100644
--- a/third_party/nixpkgs/pkgs/applications/kde/knetwalk.nix
+++ b/third_party/nixpkgs/pkgs/applications/kde/knetwalk.nix
@@ -4,7 +4,7 @@ mkDerivation {
name = "knetwalk";
meta = with lib; {
homepage = "https://kde.org/applications/en/games/org.kde.knetwalk";
- description = "KNetWalk is a single player logic game";
+ description = "A single player logic game";
maintainers = with maintainers; [ freezeboy ];
license = licenses.gpl2Plus;
platforms = platforms.linux;
diff --git a/third_party/nixpkgs/pkgs/applications/kde/knights.nix b/third_party/nixpkgs/pkgs/applications/kde/knights.nix
index ee5c37e2e9..8b71493ff1 100644
--- a/third_party/nixpkgs/pkgs/applications/kde/knights.nix
+++ b/third_party/nixpkgs/pkgs/applications/kde/knights.nix
@@ -4,7 +4,7 @@ mkDerivation {
name = "knights";
meta = with lib; {
homepage = "https://kde.org/applications/en/games/org.kde.knights";
- description = "KNights is a chess game";
+ description = "A chess game";
maintainers = with maintainers; [ freezeboy ];
license = licenses.gpl2Plus;
platforms = platforms.linux;
diff --git a/third_party/nixpkgs/pkgs/applications/kde/kollision.nix b/third_party/nixpkgs/pkgs/applications/kde/kollision.nix
index 3c0c814cd1..6cb9995459 100644
--- a/third_party/nixpkgs/pkgs/applications/kde/kollision.nix
+++ b/third_party/nixpkgs/pkgs/applications/kde/kollision.nix
@@ -4,7 +4,7 @@ mkDerivation {
name = "kollision";
meta = with lib; {
homepage = "https://kde.org/applications/en/games/org.kde.kollision";
- description = "Kollision is a casual game";
+ description = "A casual game";
maintainers = with maintainers; [ freezeboy ];
license = licenses.gpl2Plus;
platforms = platforms.linux;
diff --git a/third_party/nixpkgs/pkgs/applications/kde/kreversi.nix b/third_party/nixpkgs/pkgs/applications/kde/kreversi.nix
index 77ac4f05c8..9f4be46738 100644
--- a/third_party/nixpkgs/pkgs/applications/kde/kreversi.nix
+++ b/third_party/nixpkgs/pkgs/applications/kde/kreversi.nix
@@ -4,7 +4,7 @@ mkDerivation {
name = "kreversi";
meta = with lib; {
homepage = "https://kde.org/applications/en/games/org.kde.kreversi";
- description = "KReversi is a simple one player strategy game played against the computer";
+ description = "A simple one player strategy game played against the computer";
maintainers = with maintainers; [ freezeboy ];
license = licenses.gpl2Plus;
platforms = platforms.linux;
diff --git a/third_party/nixpkgs/pkgs/applications/kde/kshisen.nix b/third_party/nixpkgs/pkgs/applications/kde/kshisen.nix
index 7909ed8b2a..5be17bb8ee 100644
--- a/third_party/nixpkgs/pkgs/applications/kde/kshisen.nix
+++ b/third_party/nixpkgs/pkgs/applications/kde/kshisen.nix
@@ -4,7 +4,7 @@ mkDerivation {
name = "kshisen";
meta = with lib; {
homepage = "https://kde.org/applications/en/games/org.kde.kshisen";
- description = "KShisen is a solitaire-like game played using the standard set of Mahjong tiles";
+ description = "A solitaire-like game played using the standard set of Mahjong tiles";
maintainers = with maintainers; [ freezeboy ];
license = licenses.gpl2Plus;
platforms = platforms.linux;
diff --git a/third_party/nixpkgs/pkgs/applications/kde/ksquares.nix b/third_party/nixpkgs/pkgs/applications/kde/ksquares.nix
index 94a639a0d3..12d989befe 100644
--- a/third_party/nixpkgs/pkgs/applications/kde/ksquares.nix
+++ b/third_party/nixpkgs/pkgs/applications/kde/ksquares.nix
@@ -4,7 +4,7 @@ mkDerivation {
name = "ksquares";
meta = with lib; {
homepage = "https://kde.org/applications/en/games/org.kde.ksquares";
- description = "KSquares is a game of Dots and Boxes";
+ description = "A game of Dots and Boxes";
maintainers = with maintainers; [ freezeboy ];
license = licenses.gpl2Plus;
platforms = platforms.linux;
diff --git a/third_party/nixpkgs/pkgs/applications/kde/kteatime.nix b/third_party/nixpkgs/pkgs/applications/kde/kteatime.nix
index a69cb991ac..812a13aa11 100644
--- a/third_party/nixpkgs/pkgs/applications/kde/kteatime.nix
+++ b/third_party/nixpkgs/pkgs/applications/kde/kteatime.nix
@@ -4,7 +4,7 @@ mkDerivation {
name = "kteatime";
meta = with lib; {
homepage = "https://kde.org/applications/en/utilities/org.kde.kteatime";
- description = "KTeaTime is a handy timer for steeping tea";
+ description = "A handy timer for steeping tea";
maintainers = with maintainers; [ freezeboy ];
license = licenses.gpl2Plus;
platforms = platforms.linux;
diff --git a/third_party/nixpkgs/pkgs/applications/kde/ktimer.nix b/third_party/nixpkgs/pkgs/applications/kde/ktimer.nix
index aa755f35ce..bdb8f2c687 100644
--- a/third_party/nixpkgs/pkgs/applications/kde/ktimer.nix
+++ b/third_party/nixpkgs/pkgs/applications/kde/ktimer.nix
@@ -4,7 +4,7 @@ mkDerivation {
name = "ktimer";
meta = with lib; {
homepage = "https://kde.org/applications/en/utilities/org.kde.ktimer";
- description = "KTimer is a little tool to execute programs after some time";
+ description = "A little tool to execute programs after some time";
maintainers = with maintainers; [ freezeboy ];
license = licenses.gpl2Plus;
platforms = platforms.linux;
diff --git a/third_party/nixpkgs/pkgs/applications/kde/kturtle.nix b/third_party/nixpkgs/pkgs/applications/kde/kturtle.nix
index e16c86dc13..c495b16fef 100644
--- a/third_party/nixpkgs/pkgs/applications/kde/kturtle.nix
+++ b/third_party/nixpkgs/pkgs/applications/kde/kturtle.nix
@@ -4,7 +4,7 @@ mkDerivation {
name = "kturtle";
meta = with lib; {
homepage = "https://kde.org/applications/en/utilities/org.kde.kturtle";
- description = "KTurtle is an educational programming environment for learning how to program";
+ description = "An educational programming environment for learning how to program";
maintainers = with maintainers; [ freezeboy ];
license = licenses.gpl2Plus;
platforms = platforms.linux;
diff --git a/third_party/nixpkgs/pkgs/applications/kde/kwave.nix b/third_party/nixpkgs/pkgs/applications/kde/kwave.nix
index 349787d000..78a3d9ab4a 100644
--- a/third_party/nixpkgs/pkgs/applications/kde/kwave.nix
+++ b/third_party/nixpkgs/pkgs/applications/kde/kwave.nix
@@ -5,7 +5,7 @@ mkDerivation {
name = "kwave";
meta = with lib; {
homepage = "https://kde.org/applications/en/multimedia/org.kde.kwave";
- description = "KWave is a simple media player";
+ description = "A simple media player";
maintainers = with maintainers; [ freezeboy ];
license = licenses.gpl2Plus;
platforms = platforms.linux;
diff --git a/third_party/nixpkgs/pkgs/applications/kde/okular.nix b/third_party/nixpkgs/pkgs/applications/kde/okular.nix
index 3bcdb9ca84..288b2ceb80 100644
--- a/third_party/nixpkgs/pkgs/applications/kde/okular.nix
+++ b/third_party/nixpkgs/pkgs/applications/kde/okular.nix
@@ -4,7 +4,7 @@
breeze-icons, chmlib ? null, discount, djvulibre, ebook_tools, kactivities,
karchive, kbookmarks, kcompletion, kconfig, kconfigwidgets, kcoreaddons,
kdbusaddons, kdegraphics-mobipocket, kiconthemes, kjs, khtml, kio, kparts,
- kpty, kwallet, kwindowsystem, libkexiv2, libspectre, libzip, phonon, poppler,
+ kpty, kpurpose, kwallet, kwindowsystem, libkexiv2, libspectre, libzip, phonon, poppler,
qca-qt5, qtdeclarative, qtsvg, threadweaver, kcrash
}:
@@ -14,7 +14,7 @@ mkDerivation {
buildInputs = [
breeze-icons discount djvulibre ebook_tools kactivities karchive kbookmarks
kcompletion kconfig kconfigwidgets kcoreaddons kdbusaddons
- kdegraphics-mobipocket kiconthemes kjs khtml kio kparts kpty kwallet
+ kdegraphics-mobipocket kiconthemes kjs khtml kio kparts kpty kpurpose kwallet
kwindowsystem libkexiv2 libspectre libzip phonon poppler qca-qt5
qtdeclarative qtsvg threadweaver kcrash
] ++ lib.optional (!stdenv.isAarch64) chmlib;
diff --git a/third_party/nixpkgs/pkgs/applications/kde/srcs.nix b/third_party/nixpkgs/pkgs/applications/kde/srcs.nix
index 5bcb48acc1..6966c07ec0 100644
--- a/third_party/nixpkgs/pkgs/applications/kde/srcs.nix
+++ b/third_party/nixpkgs/pkgs/applications/kde/srcs.nix
@@ -4,1731 +4,1731 @@
{
akonadi = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/akonadi-20.08.1.tar.xz";
- sha256 = "f930de5fae376f138e87c6d67357ab799a3397d865b55c50f771b4427d85f495";
- name = "akonadi-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/akonadi-20.08.2.tar.xz";
+ sha256 = "d3a4b3b3f543734ad5428ca0e573b8dbf9e05f42d51e1aab39b5b5266c16be7d";
+ name = "akonadi-20.08.2.tar.xz";
};
};
akonadi-calendar = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/akonadi-calendar-20.08.1.tar.xz";
- sha256 = "896ec2523203022bf70e23897d59b64c8bfffad4ead5b6756555ab34a4047ef5";
- name = "akonadi-calendar-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/akonadi-calendar-20.08.2.tar.xz";
+ sha256 = "20173d00dc764f6a1e8e0b433d96b982ceadcb17e9bd067caf2967fd5440eb51";
+ name = "akonadi-calendar-20.08.2.tar.xz";
};
};
akonadi-calendar-tools = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/akonadi-calendar-tools-20.08.1.tar.xz";
- sha256 = "21ccc2e1090eeda1eba0c29ab51c3bae1e8f57aedead569c4ed7995f5ad6cffc";
- name = "akonadi-calendar-tools-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/akonadi-calendar-tools-20.08.2.tar.xz";
+ sha256 = "2069cc3a12f0da3f10181c13d19b1048d8f2e0c0f4a4e14309a7e6f08aa74ab9";
+ name = "akonadi-calendar-tools-20.08.2.tar.xz";
};
};
akonadiconsole = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/akonadiconsole-20.08.1.tar.xz";
- sha256 = "077ee646babbc4ca4075505d3dd830f4f5b8b1253617228e96f565fe23bcaad9";
- name = "akonadiconsole-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/akonadiconsole-20.08.2.tar.xz";
+ sha256 = "dc03a1986b6e7af0d26af927009d567da1e1835cc2bb5cc1b5732ffca3ecde9d";
+ name = "akonadiconsole-20.08.2.tar.xz";
};
};
akonadi-contacts = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/akonadi-contacts-20.08.1.tar.xz";
- sha256 = "eee775960345ec0ca13b0550bb56fb6875867921fa7b9412a2c4b0dfb8ab4366";
- name = "akonadi-contacts-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/akonadi-contacts-20.08.2.tar.xz";
+ sha256 = "e4a2696e0e0cf69926d34f160a4581131a1da8244355787564b75dec06db1b30";
+ name = "akonadi-contacts-20.08.2.tar.xz";
};
};
akonadi-import-wizard = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/akonadi-import-wizard-20.08.1.tar.xz";
- sha256 = "d895c866a05f0a55ca8f2d852ed0ae3fdc13aa160cbcbaf9f1017443458d9526";
- name = "akonadi-import-wizard-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/akonadi-import-wizard-20.08.2.tar.xz";
+ sha256 = "639d72ae3d32f681ddb046a87d625871b485785602cf35b817e89004def4dc5e";
+ name = "akonadi-import-wizard-20.08.2.tar.xz";
};
};
akonadi-mime = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/akonadi-mime-20.08.1.tar.xz";
- sha256 = "3c7a57f798a7db1e1aebc3162c20f58a0fb9ed9e703078344ef1de215c73ff0b";
- name = "akonadi-mime-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/akonadi-mime-20.08.2.tar.xz";
+ sha256 = "5699a1d44a9812c9530bc61af5822ff34a573b168d72230cd8261c05065c06e3";
+ name = "akonadi-mime-20.08.2.tar.xz";
};
};
akonadi-notes = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/akonadi-notes-20.08.1.tar.xz";
- sha256 = "afc0cdba349f0b2edece44221a7c3c532d07251ec51f05994e83a1d79c4f50fc";
- name = "akonadi-notes-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/akonadi-notes-20.08.2.tar.xz";
+ sha256 = "4897ca92d6b68f75254e1c419438275a94fa678c9f062dcd91c0267129886ca7";
+ name = "akonadi-notes-20.08.2.tar.xz";
};
};
akonadi-search = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/akonadi-search-20.08.1.tar.xz";
- sha256 = "db305bfc55535d8812d84a119e4dcf04e7b87c345e7ac3a884469cbf55abca83";
- name = "akonadi-search-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/akonadi-search-20.08.2.tar.xz";
+ sha256 = "618400950fa44f0c578ab51c3b311a47e0b2df47203f754e50bcc363201a9fc7";
+ name = "akonadi-search-20.08.2.tar.xz";
};
};
akregator = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/akregator-20.08.1.tar.xz";
- sha256 = "21751a5a14b188649caeeb19cbcef877dd00548a29c073f8694e227d951c7a00";
- name = "akregator-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/akregator-20.08.2.tar.xz";
+ sha256 = "4de4bd31dede5c09e0eb9e14d1da1d1979409eb1e28df5f95963086d4a49edc9";
+ name = "akregator-20.08.2.tar.xz";
};
};
analitza = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/analitza-20.08.1.tar.xz";
- sha256 = "91c691df8be52255db9387549c6392ad2c5358c12e805f3a96520e2aa0c147de";
- name = "analitza-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/analitza-20.08.2.tar.xz";
+ sha256 = "2fad01bf48199e3671559ec9a619f0d590af331922899c793f96fc90860ec487";
+ name = "analitza-20.08.2.tar.xz";
};
};
ark = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/ark-20.08.1.tar.xz";
- sha256 = "32e8546b186b88efc9d4688e02def0b6225d921f9b92cfcd328417f09ec0f725";
- name = "ark-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/ark-20.08.2.tar.xz";
+ sha256 = "ec061ac07687b5a3541af293e3bc2aa7bedcfe0ef38ba6e57e2704068a726ffc";
+ name = "ark-20.08.2.tar.xz";
};
};
artikulate = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/artikulate-20.08.1.tar.xz";
- sha256 = "b626a6a38f6eb50d64607032d5b100351c4242e40a4a13cdce4769e188ee361a";
- name = "artikulate-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/artikulate-20.08.2.tar.xz";
+ sha256 = "66545d85e25aa67816deea4b2b89b485181458a5bc117dad9588671d8b48b41c";
+ name = "artikulate-20.08.2.tar.xz";
};
};
audiocd-kio = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/audiocd-kio-20.08.1.tar.xz";
- sha256 = "7662849929c96d1745ce4ac7ddc931be2eff5e3cc755f2cd959b4d3f4b20b9b0";
- name = "audiocd-kio-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/audiocd-kio-20.08.2.tar.xz";
+ sha256 = "5f38c549fe8c3a4659ac8291c223327b765834e7668bc15a96047e20cdb11f01";
+ name = "audiocd-kio-20.08.2.tar.xz";
};
};
baloo-widgets = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/baloo-widgets-20.08.1.tar.xz";
- sha256 = "9f48cb2f1b45e46828b1656abaeb60e836650015c07277ec52bea053d0058958";
- name = "baloo-widgets-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/baloo-widgets-20.08.2.tar.xz";
+ sha256 = "e1d14b8dba911ebc1cee76dbcd44fa200418ba959d86ce567093b5fc3b700a07";
+ name = "baloo-widgets-20.08.2.tar.xz";
};
};
blinken = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/blinken-20.08.1.tar.xz";
- sha256 = "53b30435ea0d83f713ecb53219173aa55c0d11194830972734a4acc9a5a28c5a";
- name = "blinken-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/blinken-20.08.2.tar.xz";
+ sha256 = "c6e74033ab8ece83618c5cda0ab3cf327514b8e2e6b0e9daf484ce88f671a65e";
+ name = "blinken-20.08.2.tar.xz";
};
};
bomber = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/bomber-20.08.1.tar.xz";
- sha256 = "a4b2f5dcce7e125da30bef6bcc9746b67f8451d2040696714686dd618d80a96c";
- name = "bomber-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/bomber-20.08.2.tar.xz";
+ sha256 = "27c226b31bcdbbda0c9e304e428ca7451614c397a038e830f8052c381dae7215";
+ name = "bomber-20.08.2.tar.xz";
};
};
bovo = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/bovo-20.08.1.tar.xz";
- sha256 = "5d5ee817a73de0deef6b7c35a798bda02c6d15e9dd0e7379a13c23c0832fe0d1";
- name = "bovo-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/bovo-20.08.2.tar.xz";
+ sha256 = "936cab24a13900765f0c5a5afb6f155cb5a05bdb067f86b77e33af5f0e4c37d2";
+ name = "bovo-20.08.2.tar.xz";
};
};
calendarsupport = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/calendarsupport-20.08.1.tar.xz";
- sha256 = "38d6e695725c8484e1492d431144a0ecd1b66535bc07ac77e1f0eb1499d8fc32";
- name = "calendarsupport-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/calendarsupport-20.08.2.tar.xz";
+ sha256 = "83bcdd36689f762363a95b688b9377a3335b4fd58ad1d5efad36ad2b0cf7cc10";
+ name = "calendarsupport-20.08.2.tar.xz";
};
};
cantor = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/cantor-20.08.1.tar.xz";
- sha256 = "c44b96ac861302589923d144bf7b5d529b6eb2f91cea2d014944a0516de31a05";
- name = "cantor-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/cantor-20.08.2.tar.xz";
+ sha256 = "aca92b6e40a9e05282eae2b55f7cc6bf88612ffa9b3dde1a239648be8e5bdc59";
+ name = "cantor-20.08.2.tar.xz";
};
};
cervisia = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/cervisia-20.08.1.tar.xz";
- sha256 = "eedd3b3f00b97d513437fdbd2eeaa28cd6db29512983b82196bdededd8b701f2";
- name = "cervisia-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/cervisia-20.08.2.tar.xz";
+ sha256 = "b3444ecd1078b92fad9b00297496dd3d92366a9c0bb56cfa138f28cc15db1389";
+ name = "cervisia-20.08.2.tar.xz";
};
};
dolphin = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/dolphin-20.08.1.tar.xz";
- sha256 = "7d6ef04b866366a0ff3b199aac082ade41b3748b225ef7675ea42ccf48cbdc24";
- name = "dolphin-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/dolphin-20.08.2.tar.xz";
+ sha256 = "bd13574610fc2108b9b04249cff70ca99958fe57a42fbf260ed16e5e377071bc";
+ name = "dolphin-20.08.2.tar.xz";
};
};
dolphin-plugins = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/dolphin-plugins-20.08.1.tar.xz";
- sha256 = "a00cab6b30c9b5a4c0164704c9eab2cbb661928e775f83acb3691af77bf17427";
- name = "dolphin-plugins-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/dolphin-plugins-20.08.2.tar.xz";
+ sha256 = "7eabeb295ae2932958992bf7273afcb8164fbe90a2574064983fb2ecbc57eeaf";
+ name = "dolphin-plugins-20.08.2.tar.xz";
};
};
dragon = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/dragon-20.08.1.tar.xz";
- sha256 = "691bc338ca25e70e9a43cbcdf50f2e0aa92643bdad0329bdc3e09373ac287040";
- name = "dragon-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/dragon-20.08.2.tar.xz";
+ sha256 = "cf7cce288fdeb12a0c86739741c6b901859e9b36d8fc9e7478c46f53cc74dd6c";
+ name = "dragon-20.08.2.tar.xz";
};
};
elisa = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/elisa-20.08.1.tar.xz";
- sha256 = "1a0234a074a70bfcd4b2ccc14664b2cc7f88d2ccfd33c1716d35c27a31e258c0";
- name = "elisa-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/elisa-20.08.2.tar.xz";
+ sha256 = "6c04377dfd5e82b2b67b3a43cc3ffd3b206f24ab75c3fe18298ec80876dcc268";
+ name = "elisa-20.08.2.tar.xz";
};
};
eventviews = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/eventviews-20.08.1.tar.xz";
- sha256 = "b46e6ad32a503ce1dc1e5ade71e79f44011362fe569836ca1f2cd11c560a5a73";
- name = "eventviews-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/eventviews-20.08.2.tar.xz";
+ sha256 = "ecac9ac6e6a6ed835b28048d8bfc09bac9a1e7a57c5dd0eba6f4360301b32af9";
+ name = "eventviews-20.08.2.tar.xz";
};
};
ffmpegthumbs = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/ffmpegthumbs-20.08.1.tar.xz";
- sha256 = "8b7cd6bd27b29977d0406b08c2cf33988c651a2f59392be47f076e49eea5673b";
- name = "ffmpegthumbs-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/ffmpegthumbs-20.08.2.tar.xz";
+ sha256 = "af5b3de86487d3ddccda34c5165a34427ef97fe1090108781eb38babc101740f";
+ name = "ffmpegthumbs-20.08.2.tar.xz";
};
};
filelight = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/filelight-20.08.1.tar.xz";
- sha256 = "9677038781a1d66238da0e54f967c9c97cb44d593dbe164b8e26f38d0ac75330";
- name = "filelight-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/filelight-20.08.2.tar.xz";
+ sha256 = "65f5f90d56d3449722647286324f8aae54754ec2a46c9aaa2e3bad92bae3433e";
+ name = "filelight-20.08.2.tar.xz";
};
};
granatier = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/granatier-20.08.1.tar.xz";
- sha256 = "7b0d53fd50fdb56270f8fd53d45478c0f1be10bb67b901db08b0f413c4baeb3e";
- name = "granatier-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/granatier-20.08.2.tar.xz";
+ sha256 = "bb79b84b485bb194bf4edaa833e7705ec9fc0275301c70df78498b872de9ee57";
+ name = "granatier-20.08.2.tar.xz";
};
};
grantlee-editor = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/grantlee-editor-20.08.1.tar.xz";
- sha256 = "edeb994eab7001bcf8462834a61ae1a045e9122ae104d31bdeed2ac7497b6306";
- name = "grantlee-editor-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/grantlee-editor-20.08.2.tar.xz";
+ sha256 = "353b2c58d169e8b3c91367a7ce8939ede39c289036e3617da019ae1045a81c7b";
+ name = "grantlee-editor-20.08.2.tar.xz";
};
};
grantleetheme = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/grantleetheme-20.08.1.tar.xz";
- sha256 = "9a8f91ce63a3b143d47d8e3fbd1378732639cd3daf5b5789989164d8225fe54f";
- name = "grantleetheme-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/grantleetheme-20.08.2.tar.xz";
+ sha256 = "8cb4d2f698cf7f44bf70322669809f07900021f215175c8db120abc0f2debf62";
+ name = "grantleetheme-20.08.2.tar.xz";
};
};
gwenview = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/gwenview-20.08.1.tar.xz";
- sha256 = "df1c45317aff9aece8b023cd87aab62c9cd222520795922564e89fdc9df48995";
- name = "gwenview-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/gwenview-20.08.2.tar.xz";
+ sha256 = "580df49eb6852db4b1229f0326372dc7da7a08140d552da59a62ece08b03cc9d";
+ name = "gwenview-20.08.2.tar.xz";
};
};
incidenceeditor = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/incidenceeditor-20.08.1.tar.xz";
- sha256 = "eecc51eb405c473eb20449842dcdb3dac96712bbcf7aeedaa06614e1da3e0bbe";
- name = "incidenceeditor-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/incidenceeditor-20.08.2.tar.xz";
+ sha256 = "e9c24390b5951ef9f504a4dc432fea52ed7487288c424f073446e6c07e70c69a";
+ name = "incidenceeditor-20.08.2.tar.xz";
};
};
juk = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/juk-20.08.1.tar.xz";
- sha256 = "aa9a93a0befacf401cf41d8358b4987d8b370b4c153f3b66e05e922472e004a8";
- name = "juk-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/juk-20.08.2.tar.xz";
+ sha256 = "b19f59ad8c80c4c335469fbddde6db92112e286b1699964eab39a3d826c7ec60";
+ name = "juk-20.08.2.tar.xz";
};
};
k3b = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/k3b-20.08.1.tar.xz";
- sha256 = "66fad59f4e35c24dc8868c46ff45ffa66048501e0a6ac0c23a8b9e957033e50f";
- name = "k3b-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/k3b-20.08.2.tar.xz";
+ sha256 = "6370be558e93fed4605b7870b1d7ea324713c5a52370eab9c05d85fc3b76acd5";
+ name = "k3b-20.08.2.tar.xz";
};
};
kaccounts-integration = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kaccounts-integration-20.08.1.tar.xz";
- sha256 = "b65ec11be0c2b612222de382d24345f19be0cd264243f0d954da8a81b80034bc";
- name = "kaccounts-integration-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kaccounts-integration-20.08.2.tar.xz";
+ sha256 = "6678ee7d394b69a37e6a220a6cba3804f999997da5803da4bab1d8f329ff30fe";
+ name = "kaccounts-integration-20.08.2.tar.xz";
};
};
kaccounts-providers = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kaccounts-providers-20.08.1.tar.xz";
- sha256 = "481a2e2708773197b63937233ade6380c0b64e13a1610f27aa2751b6ee3624a4";
- name = "kaccounts-providers-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kaccounts-providers-20.08.2.tar.xz";
+ sha256 = "c719d7840ab118ff591e75e12869afc3118e5cdeb5c0415eba5b1f6993664c90";
+ name = "kaccounts-providers-20.08.2.tar.xz";
};
};
kaddressbook = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kaddressbook-20.08.1.tar.xz";
- sha256 = "f7fb72cbff43ae6dfb222e5b1c49947602086412b97634484eb3cc86ab773aa2";
- name = "kaddressbook-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kaddressbook-20.08.2.tar.xz";
+ sha256 = "8d2e5849dd8878806e8566ce43c139633c37f027f677603600c8acc0d0d41198";
+ name = "kaddressbook-20.08.2.tar.xz";
};
};
kajongg = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kajongg-20.08.1.tar.xz";
- sha256 = "801c0cc63767809ea4909ceb66dbbbb3e8ad400db7a24c80dc6ae8f3f5c9a6b9";
- name = "kajongg-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kajongg-20.08.2.tar.xz";
+ sha256 = "1eb534ac6d1d3ca14b73bd6e5b626b988acafc30b168f54d48a493adc715ecde";
+ name = "kajongg-20.08.2.tar.xz";
};
};
kalarm = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kalarm-20.08.1.tar.xz";
- sha256 = "22fea5be32c8db6b0903f216307f20dafc2ac69c620d9b4512e1034c0294c207";
- name = "kalarm-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kalarm-20.08.2.tar.xz";
+ sha256 = "e783c041ac4b162cf5254e37e53854835eda6c61ef3ae2358466000a8650a4da";
+ name = "kalarm-20.08.2.tar.xz";
};
};
kalarmcal = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kalarmcal-20.08.1.tar.xz";
- sha256 = "745515662c23154480e73f4a8d6e9ec760d01770383c1dd7f31d3f1463be7602";
- name = "kalarmcal-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kalarmcal-20.08.2.tar.xz";
+ sha256 = "0398a37f412eb03b5cbf2488ce7e0c38a069f1806bda4ea9bfce4fc67311a9a6";
+ name = "kalarmcal-20.08.2.tar.xz";
};
};
kalgebra = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kalgebra-20.08.1.tar.xz";
- sha256 = "a5ab916eba3bfd7535408768e6530e993bc1097ef1a2a0af5aa804aa1f713caf";
- name = "kalgebra-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kalgebra-20.08.2.tar.xz";
+ sha256 = "c934dc8d92917e31c17efa5b64dbec4795439a5f26762e2f214b49028bfe264d";
+ name = "kalgebra-20.08.2.tar.xz";
};
};
kalzium = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kalzium-20.08.1.tar.xz";
- sha256 = "c2c4a823525ab5927c39f29e2150f34fc03947fb852aea1bdb73390c5a709188";
- name = "kalzium-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kalzium-20.08.2.tar.xz";
+ sha256 = "474f74cbb478d3f5f69b5785711ed969ac15d5e92aee5308c6118a9d12611016";
+ name = "kalzium-20.08.2.tar.xz";
};
};
kamera = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kamera-20.08.1.tar.xz";
- sha256 = "f5b04ca46313de1bb0a57253650d1d1578f45796035888b759ad224b5866ee96";
- name = "kamera-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kamera-20.08.2.tar.xz";
+ sha256 = "ba28cab34267ce203b4b70f4a2c2b6a75849aec83dd2d73f6903894c5c125fdf";
+ name = "kamera-20.08.2.tar.xz";
};
};
kamoso = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kamoso-20.08.1.tar.xz";
- sha256 = "ed8fa6a6127a8bea5294534aa2552526af101f981de58512fbb9f7dfd78e8984";
- name = "kamoso-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kamoso-20.08.2.tar.xz";
+ sha256 = "e7d0af2781ff077261886a1683aff1d518a17f9b6d83f84fa95a7633a00f1516";
+ name = "kamoso-20.08.2.tar.xz";
};
};
kanagram = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kanagram-20.08.1.tar.xz";
- sha256 = "c810db58884e80d95baef149b8ced8fff7c5e48d6057478e81a5c8895ae67b42";
- name = "kanagram-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kanagram-20.08.2.tar.xz";
+ sha256 = "3f3f961aa847f26ac875104e82b8e7e73bbc049f20460117f849df91ba9b42e2";
+ name = "kanagram-20.08.2.tar.xz";
};
};
kapman = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kapman-20.08.1.tar.xz";
- sha256 = "934da85c5d9c99a0ed658fe4d99df258246716e04e13ceb3e18b11cc035c4f4c";
- name = "kapman-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kapman-20.08.2.tar.xz";
+ sha256 = "932bd697f2ca0e44af6be983dae3e13df9435642b91f0e1ebba7fd50291c2cbd";
+ name = "kapman-20.08.2.tar.xz";
};
};
kapptemplate = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kapptemplate-20.08.1.tar.xz";
- sha256 = "7b350467e14bc310a695ffa3481afa7857de2f6ec714915ee2d8a25a6511909b";
- name = "kapptemplate-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kapptemplate-20.08.2.tar.xz";
+ sha256 = "3bda6d9f6127e19357f071ca6f9f05890c35a6aaf86e54bce39381f0045b6b0c";
+ name = "kapptemplate-20.08.2.tar.xz";
};
};
kate = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kate-20.08.1.tar.xz";
- sha256 = "44607f6a1d5ca8bb7173bedbeabef65bb98dde0fd009987bd8139fbb53959146";
- name = "kate-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kate-20.08.2.tar.xz";
+ sha256 = "718e8230edfa16f93f54380c4e214a0f25f8a398fe74ad23f12b7dcffae419d0";
+ name = "kate-20.08.2.tar.xz";
};
};
katomic = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/katomic-20.08.1.tar.xz";
- sha256 = "1aa655857bb1708880b6fbf4e54acdfe1cb7f47a9494249978251d870b86f13a";
- name = "katomic-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/katomic-20.08.2.tar.xz";
+ sha256 = "bb94e81cb1122b57d2601f701bc51ff8fa27ac07a5de34e5c49928d50d46ed85";
+ name = "katomic-20.08.2.tar.xz";
};
};
kbackup = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kbackup-20.08.1.tar.xz";
- sha256 = "08b0c43fca2dba65e1173841343daf8e6e37e11101be7315011e8345ba9b1e72";
- name = "kbackup-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kbackup-20.08.2.tar.xz";
+ sha256 = "bb97dd10a64c42ae80c9c87442d3a06d3c18f4f5997bd3b6d1460dec655b3e0a";
+ name = "kbackup-20.08.2.tar.xz";
};
};
kblackbox = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kblackbox-20.08.1.tar.xz";
- sha256 = "3f09d483fa3a3013e685df9efd9cee8d9d1b9f0e017cc97d92636bae89fc469c";
- name = "kblackbox-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kblackbox-20.08.2.tar.xz";
+ sha256 = "714a8749a49d1a7938b74372138ae3e5bafef50de61207e63a6d2c60b6bfded2";
+ name = "kblackbox-20.08.2.tar.xz";
};
};
kblocks = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kblocks-20.08.1.tar.xz";
- sha256 = "e2b6e5b0727ca45d6b0f0e8b9f0aa029a0acb9bdebeac5bfd849455e560977ed";
- name = "kblocks-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kblocks-20.08.2.tar.xz";
+ sha256 = "c82f8b6e722308a236d0057028d644ebf8105c9c902d799bc2fb3e1c1ff7c188";
+ name = "kblocks-20.08.2.tar.xz";
};
};
kbounce = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kbounce-20.08.1.tar.xz";
- sha256 = "99af3bd297fcbecb9eaa4222bbb5122144beff9cb999420bf45339d61375f2a4";
- name = "kbounce-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kbounce-20.08.2.tar.xz";
+ sha256 = "371fbaf7c1faeacf1c74441ec1a58f1ced862f741e67123d2eb105f1d4f9b8e2";
+ name = "kbounce-20.08.2.tar.xz";
};
};
kbreakout = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kbreakout-20.08.1.tar.xz";
- sha256 = "0d57c105f2778b68c0b5ff8cb3e02d5c7ea2956b90d48d126ff1118b94d5f2fa";
- name = "kbreakout-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kbreakout-20.08.2.tar.xz";
+ sha256 = "b58b9dd26eff3960bc664076ddf4d0c81c7dfd5380be1d058b86de2d3f55d2ef";
+ name = "kbreakout-20.08.2.tar.xz";
};
};
kbruch = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kbruch-20.08.1.tar.xz";
- sha256 = "f04bf902a31b68d18c69afff511a591817a35f5ad866de4f84aa1b664b35a41e";
- name = "kbruch-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kbruch-20.08.2.tar.xz";
+ sha256 = "54c5997a8d6405439448dd929bf16017c9e5db052b30c9bf144c656c6d8b9e0b";
+ name = "kbruch-20.08.2.tar.xz";
};
};
kcachegrind = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kcachegrind-20.08.1.tar.xz";
- sha256 = "59c43296aaa7d8a5dbf782ba9248ee8bb6308e7bd7bdfc0b99e1c912529337f2";
- name = "kcachegrind-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kcachegrind-20.08.2.tar.xz";
+ sha256 = "e6b84a323a21ae7975ccc07154bcdc6eef1bc92818b800cfc5d546ada7f0387c";
+ name = "kcachegrind-20.08.2.tar.xz";
};
};
kcalc = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kcalc-20.08.1.tar.xz";
- sha256 = "46702fe8eca8b604e15f3f2eb4d1f17b8601b6ad0b03bb9cd0a0dd7ed7a13c49";
- name = "kcalc-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kcalc-20.08.2.tar.xz";
+ sha256 = "76b6c8e44c789090c0155f79878df8f27c96d2df4273443b0f05a42ec81902cf";
+ name = "kcalc-20.08.2.tar.xz";
};
};
kcalutils = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kcalutils-20.08.1.tar.xz";
- sha256 = "ae6a8ca02722f8f593a8d248ab3d043cc68be23d18f820e150af000a902601c2";
- name = "kcalutils-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kcalutils-20.08.2.tar.xz";
+ sha256 = "fccae5166b627f654412344d0090000ecd270af54b0cedb8648e35af26369cae";
+ name = "kcalutils-20.08.2.tar.xz";
};
};
kcharselect = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kcharselect-20.08.1.tar.xz";
- sha256 = "36575e9fd0a93fb3ddaf6a75a213786351bdd3ab8c167dc1a3e2824a23a6655b";
- name = "kcharselect-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kcharselect-20.08.2.tar.xz";
+ sha256 = "9438e723469b6bf0d87b23965c6d925800ff35b2cc2214a7eeb5fb41009489e0";
+ name = "kcharselect-20.08.2.tar.xz";
};
};
kcolorchooser = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kcolorchooser-20.08.1.tar.xz";
- sha256 = "20cae01bd5e8c824f8e7900badd0d66464c363a749a1ce9fe6fe3a1e31c99ade";
- name = "kcolorchooser-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kcolorchooser-20.08.2.tar.xz";
+ sha256 = "f314c31932704e7136b5fff89efe95e84e4215f3902089f9d838411f0fbc0c72";
+ name = "kcolorchooser-20.08.2.tar.xz";
};
};
kcron = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kcron-20.08.1.tar.xz";
- sha256 = "24ee9aee48bef951d6ac1fff32271417c4eb2239f0ec1de8388f2bae55ce83f5";
- name = "kcron-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kcron-20.08.2.tar.xz";
+ sha256 = "ce72bb7c48606b0611cfe46a545224cca131d34a4b678c86d9ac473071833f83";
+ name = "kcron-20.08.2.tar.xz";
};
};
kdebugsettings = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kdebugsettings-20.08.1.tar.xz";
- sha256 = "cac50d34c8a31805924aa75755475a754109fc643e95fe50188477522d113a55";
- name = "kdebugsettings-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kdebugsettings-20.08.2.tar.xz";
+ sha256 = "78502b1a52f9f81ff848e5b210b37a3a74da7c0032de2513f23c1d25cf801283";
+ name = "kdebugsettings-20.08.2.tar.xz";
};
};
kdeconnect-kde = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kdeconnect-kde-20.08.1.tar.xz";
- sha256 = "8ebfe36b4d08b36881082a3748f63a7c645b51e8f3b094607512817e9f6ce668";
- name = "kdeconnect-kde-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kdeconnect-kde-20.08.2.tar.xz";
+ sha256 = "6d43e38620987de1ddcfdfa7d4e6e31ff383b806139ba02e69a99c3ddfb4ee67";
+ name = "kdeconnect-kde-20.08.2.tar.xz";
};
};
kde-dev-scripts = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kde-dev-scripts-20.08.1.tar.xz";
- sha256 = "f7f99a199fea69019738e6d2147e5f6e4419835aa2c39e6d60f4d2e5d629ba96";
- name = "kde-dev-scripts-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kde-dev-scripts-20.08.2.tar.xz";
+ sha256 = "ff1a819991903b09bef3637b579d215e087310e39b98a1a6928e15f193aec056";
+ name = "kde-dev-scripts-20.08.2.tar.xz";
};
};
kde-dev-utils = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kde-dev-utils-20.08.1.tar.xz";
- sha256 = "8105a5b911643dca1f0c476c9247282f80e4ea17bae06dcca63ba9638bf5d21d";
- name = "kde-dev-utils-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kde-dev-utils-20.08.2.tar.xz";
+ sha256 = "21a4a11e102cbbd9fed955720966d7be2f7a615f57c9bf1dfc94ce973d25ffc3";
+ name = "kde-dev-utils-20.08.2.tar.xz";
};
};
kdeedu-data = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kdeedu-data-20.08.1.tar.xz";
- sha256 = "d9c10c849f94b8cff7f79747a0594b8050f19d5477799b03f803c4241a9d12b6";
- name = "kdeedu-data-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kdeedu-data-20.08.2.tar.xz";
+ sha256 = "9030c39b92a7500254e8303ce246d2535cd66a203bb96b2670defd5288294ad1";
+ name = "kdeedu-data-20.08.2.tar.xz";
};
};
kdegraphics-mobipocket = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kdegraphics-mobipocket-20.08.1.tar.xz";
- sha256 = "9974c36d90fc23d9a3a7172cf1526dc3671bf90f01f608effe92f64fce53c372";
- name = "kdegraphics-mobipocket-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kdegraphics-mobipocket-20.08.2.tar.xz";
+ sha256 = "8972079756633abe8cbfaa39cdff9d56f89958861e6e418738311bcdc52771a5";
+ name = "kdegraphics-mobipocket-20.08.2.tar.xz";
};
};
kdegraphics-thumbnailers = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kdegraphics-thumbnailers-20.08.1.tar.xz";
- sha256 = "8303231f2fc44c071b3f6a477ae5335f2657dbfaba52362529aaba20973a5995";
- name = "kdegraphics-thumbnailers-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kdegraphics-thumbnailers-20.08.2.tar.xz";
+ sha256 = "977cf6c40ba00a8a391a951aab80c55d9615927a1ef4a7bb5eea2f6a83373532";
+ name = "kdegraphics-thumbnailers-20.08.2.tar.xz";
};
};
kdenetwork-filesharing = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kdenetwork-filesharing-20.08.1.tar.xz";
- sha256 = "e88f4a2f6d7b8a61ebd491eb112f51d50f9949d729022fab01223d6ea36b8a01";
- name = "kdenetwork-filesharing-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kdenetwork-filesharing-20.08.2.tar.xz";
+ sha256 = "f909ee8433baf906b6c23af4747d83ae3e151e213585abe01282213012228b3a";
+ name = "kdenetwork-filesharing-20.08.2.tar.xz";
};
};
kdenlive = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kdenlive-20.08.1.tar.xz";
- sha256 = "f99e3f22c3d5e41a3ca251299d010ac2bc44933091c25d360104d562a1090873";
- name = "kdenlive-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kdenlive-20.08.2.tar.xz";
+ sha256 = "535df45a148f0f94271e045ef0c93575fded83da7a2b727aeaf90e61e1d7c418";
+ name = "kdenlive-20.08.2.tar.xz";
};
};
kdepim-addons = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kdepim-addons-20.08.1.tar.xz";
- sha256 = "a0bddcbe8f8f6d8c878a6b5634578522a8d485e424cf37d35bc17df9a1ffc7c2";
- name = "kdepim-addons-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kdepim-addons-20.08.2.tar.xz";
+ sha256 = "f7ab0d9ee2b9351959199f8903c447c6cb82fd58d642b7039cd2b8e324038b01";
+ name = "kdepim-addons-20.08.2.tar.xz";
};
};
kdepim-apps-libs = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kdepim-apps-libs-20.08.1.tar.xz";
- sha256 = "a0664933b3b5ff20747bf2adec9fbbecf22935129349208430d53e8c9bf5b5bb";
- name = "kdepim-apps-libs-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kdepim-apps-libs-20.08.2.tar.xz";
+ sha256 = "8c3ebdf7072d3a5a6ea2921697b28aa27e51ba43db152ea83a07b4b13c282434";
+ name = "kdepim-apps-libs-20.08.2.tar.xz";
};
};
kdepim-runtime = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kdepim-runtime-20.08.1.tar.xz";
- sha256 = "27a4c04dcf2eac4108a43acbdd57e3a8aa1da92443a3e7977329d0218da05c24";
- name = "kdepim-runtime-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kdepim-runtime-20.08.2.tar.xz";
+ sha256 = "3b475dfd394d5c09991eb4e1f0ddb3e2aa1f586ed75aa7961b159ef712d80132";
+ name = "kdepim-runtime-20.08.2.tar.xz";
};
};
kdesdk-kioslaves = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kdesdk-kioslaves-20.08.1.tar.xz";
- sha256 = "528cce0ea4c7c9fd53a604591eae4a70d39421ebbe62ed59bcbc80072f95c19f";
- name = "kdesdk-kioslaves-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kdesdk-kioslaves-20.08.2.tar.xz";
+ sha256 = "5e79532675d717d906f6b43eea1cac20fe1513bcf497696251c00fe74e2f0f58";
+ name = "kdesdk-kioslaves-20.08.2.tar.xz";
};
};
kdesdk-thumbnailers = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kdesdk-thumbnailers-20.08.1.tar.xz";
- sha256 = "5b189182f2a734f82e67e23d3293e694c51f97c0a9acd1ec5498442a3d2a3804";
- name = "kdesdk-thumbnailers-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kdesdk-thumbnailers-20.08.2.tar.xz";
+ sha256 = "0b6809e2469d7057b6d674d5950fd4f6243a1d3d185452212522880c714c1c63";
+ name = "kdesdk-thumbnailers-20.08.2.tar.xz";
};
};
kdf = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kdf-20.08.1.tar.xz";
- sha256 = "c100c87e9dbfcf7c12ce78d743f4ce3a2ec2bf3c1b0d969af1285255071195a5";
- name = "kdf-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kdf-20.08.2.tar.xz";
+ sha256 = "b33c043c18ae7b80b40e73c0a34759540724fa81815a6afa1e91e3ad44aec27e";
+ name = "kdf-20.08.2.tar.xz";
};
};
kdialog = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kdialog-20.08.1.tar.xz";
- sha256 = "089e8a8e85a9021b830e9b8a19ecb1999781915a716c9c2b3c99894a5d1c8dcf";
- name = "kdialog-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kdialog-20.08.2.tar.xz";
+ sha256 = "1bb808c2d01680e2396f282b798d9e22d2c1722f992c672eaf7451bf83a5d459";
+ name = "kdialog-20.08.2.tar.xz";
};
};
kdiamond = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kdiamond-20.08.1.tar.xz";
- sha256 = "1629dc6f70873b42081bd75dbf858da56d380c32925ddd49bd2110d458cb4b23";
- name = "kdiamond-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kdiamond-20.08.2.tar.xz";
+ sha256 = "7bfc2b24d86c663bff719156ba20cd36017f1df647ee6769b5101aa6ab3e3e21";
+ name = "kdiamond-20.08.2.tar.xz";
};
};
keditbookmarks = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/keditbookmarks-20.08.1.tar.xz";
- sha256 = "8bfedffae0332dbfb611d25f3178ab7babe374155cce7c44e1aaa841934c3123";
- name = "keditbookmarks-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/keditbookmarks-20.08.2.tar.xz";
+ sha256 = "87d72e78c907e7829a642364f3a49dd0f0dea0c76e7a5c524a67f957dca94b9b";
+ name = "keditbookmarks-20.08.2.tar.xz";
};
};
kfind = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kfind-20.08.1.tar.xz";
- sha256 = "e49412d0eae6f77369b96ee7fa5902252294d03da1e8782460d4bba5be6bb149";
- name = "kfind-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kfind-20.08.2.tar.xz";
+ sha256 = "2381bbe7793a666fa9463aead1246dc4244409f68375f6d75e1423be15b42d74";
+ name = "kfind-20.08.2.tar.xz";
};
};
kfloppy = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kfloppy-20.08.1.tar.xz";
- sha256 = "cfbe396c252acc23a929d05fe1a71099bc19ee3ab55f4f40e47780cf871852c5";
- name = "kfloppy-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kfloppy-20.08.2.tar.xz";
+ sha256 = "7f624d03dc3dc5099ac1479148800043195fa6c0e3bb6d7efcb452a76e99e191";
+ name = "kfloppy-20.08.2.tar.xz";
};
};
kfourinline = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kfourinline-20.08.1.tar.xz";
- sha256 = "2c65dcc685d7e46da73e53ac3ab250ef4d1738bb85aa6f1b09160ff2ece364a2";
- name = "kfourinline-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kfourinline-20.08.2.tar.xz";
+ sha256 = "aed2ecdb40b2e3d5452b183a1817216373d32a0aab4eff02f6c823a6f8d801eb";
+ name = "kfourinline-20.08.2.tar.xz";
};
};
kgeography = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kgeography-20.08.1.tar.xz";
- sha256 = "f7ce4c6a00f18558aa04f4af0b71e45efc10c67f0b3454c5f0b2527a43133d30";
- name = "kgeography-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kgeography-20.08.2.tar.xz";
+ sha256 = "82c4798f3184c77d0be63aeb5e86c84240c9cb0aa0e66ff57f92c0b5c3748f19";
+ name = "kgeography-20.08.2.tar.xz";
};
};
kget = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kget-20.08.1.tar.xz";
- sha256 = "efbfc08a5a4ed3974bbdab20c5eae07cdb70f7f42e9de1c75651a57511d7e576";
- name = "kget-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kget-20.08.2.tar.xz";
+ sha256 = "42993095d6325e921b6ed36f4b0a2153ffd5d68cfa3e6d3ced2db09e2a6aabb8";
+ name = "kget-20.08.2.tar.xz";
};
};
kgoldrunner = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kgoldrunner-20.08.1.tar.xz";
- sha256 = "40380c0d3b65e06cdb9d9ca3791c10e0d2d300856cc49a7b3da0145b7651274b";
- name = "kgoldrunner-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kgoldrunner-20.08.2.tar.xz";
+ sha256 = "4bbcfcf5cf810e0b1f78e1a88d222631c07401187fb327deaa5ab6658483d351";
+ name = "kgoldrunner-20.08.2.tar.xz";
};
};
kgpg = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kgpg-20.08.1.tar.xz";
- sha256 = "6b926c2adf896c3f68402ec10faf8db1e5f7c7b9fa8c1c26f9021d1fb0c975b0";
- name = "kgpg-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kgpg-20.08.2.tar.xz";
+ sha256 = "fc4ec5c38c3bdb02a399f0eb1e75da356a523ada369d5410c2f4e7f5f14a508f";
+ name = "kgpg-20.08.2.tar.xz";
};
};
khangman = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/khangman-20.08.1.tar.xz";
- sha256 = "fe94116ea833295a46c59a7420676925bb1038e7da86f6369d452087add40868";
- name = "khangman-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/khangman-20.08.2.tar.xz";
+ sha256 = "7ff30ecbab7c9e8f44b7e8c3887ec78a918c919ce902005aeb7fb969ac995b28";
+ name = "khangman-20.08.2.tar.xz";
};
};
khelpcenter = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/khelpcenter-20.08.1.tar.xz";
- sha256 = "217b433c1a5da966ad5dab1e89e2e719632f1e035ab92cce094c5f0848bb6e39";
- name = "khelpcenter-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/khelpcenter-20.08.2.tar.xz";
+ sha256 = "36051a4352a05dd9b74b4e325c0e16e30d6bd8b48d6c3d13980b39a77aab4e2d";
+ name = "khelpcenter-20.08.2.tar.xz";
};
};
kidentitymanagement = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kidentitymanagement-20.08.1.tar.xz";
- sha256 = "3b34e029e99647d6742825633682ab8a5eecbe102e34ea2472cb53afb853840d";
- name = "kidentitymanagement-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kidentitymanagement-20.08.2.tar.xz";
+ sha256 = "17a1fd47d91289519cafb12c0d917b4775496ada447cb6f4ba56dc42446152ec";
+ name = "kidentitymanagement-20.08.2.tar.xz";
};
};
kig = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kig-20.08.1.tar.xz";
- sha256 = "f318d346cd152e62ae892ade31a784f0b7b823c56fdfd64e05a330072ad95745";
- name = "kig-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kig-20.08.2.tar.xz";
+ sha256 = "401832d384e47ea6daf310f7e823ae6b8a55bc117b7570bd4bf36261d01587f5";
+ name = "kig-20.08.2.tar.xz";
};
};
kigo = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kigo-20.08.1.tar.xz";
- sha256 = "58fa166a487c855d300c8a33758928131fc4db80cbda19a08e3de918335d2bdb";
- name = "kigo-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kigo-20.08.2.tar.xz";
+ sha256 = "b9e6edd2e35e57edb3d89bb76f1d7e4a9e7f8fb64644b58012543a367834aa60";
+ name = "kigo-20.08.2.tar.xz";
};
};
killbots = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/killbots-20.08.1.tar.xz";
- sha256 = "252636f4df2af0e087f4d604f76c5d8702c38392d821281a0f6283be4e429af9";
- name = "killbots-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/killbots-20.08.2.tar.xz";
+ sha256 = "332ebd24be6ea62c8621aeaa5b200d6ebf03ae0198a06693b36b2c80cac89d95";
+ name = "killbots-20.08.2.tar.xz";
};
};
kimagemapeditor = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kimagemapeditor-20.08.1.tar.xz";
- sha256 = "bf391d0812e0f2dce6a11481972cf9d04f14d0bf92cad7210fa35a1fa0edf230";
- name = "kimagemapeditor-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kimagemapeditor-20.08.2.tar.xz";
+ sha256 = "fd8272978a7c3a1d95b20a5ec57ccf00d740a8d6eb483f0a204d03669215309c";
+ name = "kimagemapeditor-20.08.2.tar.xz";
};
};
kimap = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kimap-20.08.1.tar.xz";
- sha256 = "eae645ae2535c2612556e8938011cc478054c032126bb55683b95127d1b94741";
- name = "kimap-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kimap-20.08.2.tar.xz";
+ sha256 = "bda4f4b4e94481b70cec270655c0fd2888da51106d80c0388ae5c0dc5d36e092";
+ name = "kimap-20.08.2.tar.xz";
};
};
kio-extras = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kio-extras-20.08.1.tar.xz";
- sha256 = "1122635926052f34fd35d8aeef9c3c1d892690d8372f2b7d902e6449cdab988a";
- name = "kio-extras-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kio-extras-20.08.2.tar.xz";
+ sha256 = "9d4b9cb5a4002ad2127c5c5c4d25ff95d53de32ea08348e8dc40fe83d950076e";
+ name = "kio-extras-20.08.2.tar.xz";
};
};
kio-gdrive = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kio-gdrive-20.08.1.tar.xz";
- sha256 = "5104136948ee60cd527109bb9e8830e6a12f6062a29f34bc995b2625b0280825";
- name = "kio-gdrive-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kio-gdrive-20.08.2.tar.xz";
+ sha256 = "71047e9f8e5ad9317cc3dbf1de2d121f322b5d968d3685351ef0d2aabe2f46ca";
+ name = "kio-gdrive-20.08.2.tar.xz";
};
};
kipi-plugins = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kipi-plugins-20.08.1.tar.xz";
- sha256 = "b7d8f1aa087006a48d9bd7ec036ab4779e898e3b02692c91342439747cad6c5c";
- name = "kipi-plugins-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kipi-plugins-20.08.2.tar.xz";
+ sha256 = "89de8f75dd01e2130c1e651bd04717ce4d35768202ae3e825c93c75c8312e583";
+ name = "kipi-plugins-20.08.2.tar.xz";
};
};
kirigami-gallery = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kirigami-gallery-20.08.1.tar.xz";
- sha256 = "497886cc5a8483f068a642ce19df19f69fd105a4fb583f1a9898c885659c9df5";
- name = "kirigami-gallery-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kirigami-gallery-20.08.2.tar.xz";
+ sha256 = "0b4a5cec32bdfaef42b790f1d249d227c9daf56e0f3c1e302d33ccaa485c28e5";
+ name = "kirigami-gallery-20.08.2.tar.xz";
};
};
kiriki = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kiriki-20.08.1.tar.xz";
- sha256 = "51e77cbbf6a0c60487d72b03b28c08409d0b6134c983d9e420fbc4d7f73223e8";
- name = "kiriki-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kiriki-20.08.2.tar.xz";
+ sha256 = "42081e39c045bd830c6a79938a83690ea5641aa9e5437645234441da2d29b053";
+ name = "kiriki-20.08.2.tar.xz";
};
};
kiten = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kiten-20.08.1.tar.xz";
- sha256 = "f3764d090db8027746e83c326e833680fd669dca66dd6af095ba120e66de2901";
- name = "kiten-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kiten-20.08.2.tar.xz";
+ sha256 = "a7285d5880611da2202d0e3f8f2bf860f275932d3da54ff7aecc793225f7ad7d";
+ name = "kiten-20.08.2.tar.xz";
};
};
kitinerary = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kitinerary-20.08.1.tar.xz";
- sha256 = "d3e0b6130b5c603bc1494404fa91ed1995e9142d66e4c3ddd5d2c79fdea856e4";
- name = "kitinerary-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kitinerary-20.08.2.tar.xz";
+ sha256 = "69d8b5f64774860e5098c1dbfb06d274da4379c04383c4f0f0e412481c48fa27";
+ name = "kitinerary-20.08.2.tar.xz";
};
};
kjumpingcube = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kjumpingcube-20.08.1.tar.xz";
- sha256 = "226424cd21f75c499eedd15460a466988b179312467ed16437df87be494d9fbc";
- name = "kjumpingcube-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kjumpingcube-20.08.2.tar.xz";
+ sha256 = "0edba227e24b8aeda4e75bc6c25ad25b50ac624b5319a64ce20d6c3f7691a48a";
+ name = "kjumpingcube-20.08.2.tar.xz";
};
};
kldap = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kldap-20.08.1.tar.xz";
- sha256 = "098fb07b280ef25dcf04b18f627223014257f6c0874b2959f2a8e68cacdb74a7";
- name = "kldap-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kldap-20.08.2.tar.xz";
+ sha256 = "dfc8bd59d837766e741b33cf8486256b7bd5ffc33ff2aab240d47b4766ec8489";
+ name = "kldap-20.08.2.tar.xz";
};
};
kleopatra = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kleopatra-20.08.1.tar.xz";
- sha256 = "e7bc3ce03ad5431e4289360ba6b701e38d53b60de58fd1ed358480cec48657a6";
- name = "kleopatra-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kleopatra-20.08.2.tar.xz";
+ sha256 = "70ffa2d1549b6b4674a9cd92052174002d81fb236cfbf872187c6e3616191ba2";
+ name = "kleopatra-20.08.2.tar.xz";
};
};
klettres = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/klettres-20.08.1.tar.xz";
- sha256 = "f29d6df1de3562731f246a892caaa493b9bccc9d1317a948e03ad12cb8c80c06";
- name = "klettres-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/klettres-20.08.2.tar.xz";
+ sha256 = "9cef7dea479d27644e4812157d4cf3993dc3ee84b847377a17cec305a03a3156";
+ name = "klettres-20.08.2.tar.xz";
};
};
klickety = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/klickety-20.08.1.tar.xz";
- sha256 = "a9b63b3e944faba25498e981c06981dc354f9acd34b77f46fe2bebef388bf2cb";
- name = "klickety-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/klickety-20.08.2.tar.xz";
+ sha256 = "90665c5aeda52f55af8dcf3936e557ba431d9e48c6be361eaeb82117b6213a33";
+ name = "klickety-20.08.2.tar.xz";
};
};
klines = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/klines-20.08.1.tar.xz";
- sha256 = "d16650d7d44f48f47700dcb8fe97519dd28fe7213052636363d281c24f46a2b9";
- name = "klines-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/klines-20.08.2.tar.xz";
+ sha256 = "8e8b897cdc3c31fada1dd2635da211def507f47c8062c6458f559283ae470edb";
+ name = "klines-20.08.2.tar.xz";
};
};
kmag = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kmag-20.08.1.tar.xz";
- sha256 = "0aaaf19af2c943ae460dbcc1984bae167b79be287802e8a6faa6aaaed11718f3";
- name = "kmag-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kmag-20.08.2.tar.xz";
+ sha256 = "8e933e8ebbf0ab956e2a251312e3d4e027848dc2f2b4e8a7c7250b8fdf10ca05";
+ name = "kmag-20.08.2.tar.xz";
};
};
kmahjongg = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kmahjongg-20.08.1.tar.xz";
- sha256 = "842b3d2e9c60b6a8e6bb6d09f26db49d988889ec3962ac40aea0e79434c2eb43";
- name = "kmahjongg-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kmahjongg-20.08.2.tar.xz";
+ sha256 = "98e34794560a062bd22950acc583b77a6f8d1d28aceb863604f5a6c98c6cc80d";
+ name = "kmahjongg-20.08.2.tar.xz";
};
};
kmail = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kmail-20.08.1.tar.xz";
- sha256 = "7ba5854e36e2ed752baa3a1ac15d1a6227699da6f5bdca3c250f22226b4d902b";
- name = "kmail-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kmail-20.08.2.tar.xz";
+ sha256 = "ff179b89836236174cd587ce4ea2a4320e58345d45582cb157186cfbb01e58f2";
+ name = "kmail-20.08.2.tar.xz";
};
};
kmail-account-wizard = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kmail-account-wizard-20.08.1.tar.xz";
- sha256 = "7a1dc9ad542c0e54b80e955a162888c7d4b6bababcf02681d54af4480c03bd8d";
- name = "kmail-account-wizard-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kmail-account-wizard-20.08.2.tar.xz";
+ sha256 = "7cdb9b60b1a646f0c5c0d0e7dfbe357a9f66bb305afbccbb4b421ee6f6941df8";
+ name = "kmail-account-wizard-20.08.2.tar.xz";
};
};
kmailtransport = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kmailtransport-20.08.1.tar.xz";
- sha256 = "4cabad74e141891546b0f47f44030eeb59fb63257a5c0d1c12124815ebf710c1";
- name = "kmailtransport-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kmailtransport-20.08.2.tar.xz";
+ sha256 = "8b12836b1ca0243819680cba73c809c491c5e7a8d1ea9d9dc23e7338aed69a0c";
+ name = "kmailtransport-20.08.2.tar.xz";
};
};
kmbox = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kmbox-20.08.1.tar.xz";
- sha256 = "df77b2bf448d1ce21ff4a816f1164297519b48cd60200cea0edae6e72a81a19b";
- name = "kmbox-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kmbox-20.08.2.tar.xz";
+ sha256 = "4fa1ad98368130dcdc8ad71dba3084c489130b1e8fc4a2b119ffc6f56595ba73";
+ name = "kmbox-20.08.2.tar.xz";
};
};
kmime = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kmime-20.08.1.tar.xz";
- sha256 = "cd0beaa46040d571b505d07853be76f099289e22d99ce4884695d4d645dfbe8c";
- name = "kmime-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kmime-20.08.2.tar.xz";
+ sha256 = "9f23e2814e62ae6c4a67fd3223315ef875776f9d098b4d11c7d06a726a725435";
+ name = "kmime-20.08.2.tar.xz";
};
};
kmines = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kmines-20.08.1.tar.xz";
- sha256 = "eeb58941c94330f3ffdca60c0ca84d8ebcc9c6c355737217b521c54e50c650cd";
- name = "kmines-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kmines-20.08.2.tar.xz";
+ sha256 = "6b07a812497a665505b6b1e3a84ac0818f1a5e5757146cdbceec55e94bb41753";
+ name = "kmines-20.08.2.tar.xz";
};
};
kmix = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kmix-20.08.1.tar.xz";
- sha256 = "012d14adbb200a7e66ddbc9ebc8e18c4e5082ae24dea6ab22284b6c730a1b472";
- name = "kmix-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kmix-20.08.2.tar.xz";
+ sha256 = "73453f02a72384382fd7449215189e22b5e1600e9ef0c9cc910f3fddd09beb85";
+ name = "kmix-20.08.2.tar.xz";
};
};
kmousetool = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kmousetool-20.08.1.tar.xz";
- sha256 = "c1d769efdd318eb1e29905122c579c72a41da74b45a076b79cf177b1800e1464";
- name = "kmousetool-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kmousetool-20.08.2.tar.xz";
+ sha256 = "c1f70c172dc2ad7d937db5e6355522082f924ba45e7aac1bbb1c04e230f1d406";
+ name = "kmousetool-20.08.2.tar.xz";
};
};
kmouth = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kmouth-20.08.1.tar.xz";
- sha256 = "d87fb47fa00c54f13cdaef33d15cc74f31d7009d4a8d988902b62c698d1e2c2c";
- name = "kmouth-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kmouth-20.08.2.tar.xz";
+ sha256 = "d206afecdbe5f063dfbf805956f475e95c7b0fd548fd5f1b4fd7376ea6747e96";
+ name = "kmouth-20.08.2.tar.xz";
};
};
kmplot = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kmplot-20.08.1.tar.xz";
- sha256 = "6d294a89f9e0fc42262ada6d71ba5abaeb756beb194e71f1852e18ae2b85456e";
- name = "kmplot-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kmplot-20.08.2.tar.xz";
+ sha256 = "c3bc34a2d1bf4620745009b49b6541a16ac64eb3d1e6cf1ba936b14aa5d02e2b";
+ name = "kmplot-20.08.2.tar.xz";
};
};
knavalbattle = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/knavalbattle-20.08.1.tar.xz";
- sha256 = "e0cbffc5643aac302c53cfd957eefa7f89486fdd0d9c55b74f39d733a0ac3b65";
- name = "knavalbattle-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/knavalbattle-20.08.2.tar.xz";
+ sha256 = "2cd91ee61193810eee62e47f38f590e81b03287083f31564e0ebfd893d339ac9";
+ name = "knavalbattle-20.08.2.tar.xz";
};
};
knetwalk = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/knetwalk-20.08.1.tar.xz";
- sha256 = "30cbf7bdf5f875ce172a382ef7da8e74803015017c6cd525cb6c288defac020d";
- name = "knetwalk-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/knetwalk-20.08.2.tar.xz";
+ sha256 = "4a97f4b1af463e5e50698e8ac089cf6933fb66f25dd9b0fae3f1b1a51cbca3c0";
+ name = "knetwalk-20.08.2.tar.xz";
};
};
knights = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/knights-20.08.1.tar.xz";
- sha256 = "58518d8ecce5744fdf68c18e0803f48cb912fa29c5ea93ed6ccd2d4d320f722d";
- name = "knights-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/knights-20.08.2.tar.xz";
+ sha256 = "b62dda6e8b5bb85cc814f7244e39806e38c266be1bf3090eb6de59c8141fc1d4";
+ name = "knights-20.08.2.tar.xz";
};
};
knotes = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/knotes-20.08.1.tar.xz";
- sha256 = "7d066a34d46684f258481466875d18f99a9000d66dec36f7dcab92790f6c57bb";
- name = "knotes-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/knotes-20.08.2.tar.xz";
+ sha256 = "1e61f2c8b5fe9075f07be16543e3a7310bf533b6c2446f162f7196b41e3e6ecb";
+ name = "knotes-20.08.2.tar.xz";
};
};
kolf = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kolf-20.08.1.tar.xz";
- sha256 = "04d117895a6504d6138d1e3cd3157dd3318ba93eefd749182556344650f6a2f8";
- name = "kolf-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kolf-20.08.2.tar.xz";
+ sha256 = "834c1c6cdc62e650c7b0d36db26387cc4ebe2bb4b2e8fa06c0bf461e3a1e8c64";
+ name = "kolf-20.08.2.tar.xz";
};
};
kollision = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kollision-20.08.1.tar.xz";
- sha256 = "858d69131951734181b449ce48498b3b843634eb8c069c932042b3c0f862f98c";
- name = "kollision-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kollision-20.08.2.tar.xz";
+ sha256 = "9b6829f49d9baa89596ef8649996724db72c3c8eb793b9b6afc80dc0d07c0421";
+ name = "kollision-20.08.2.tar.xz";
};
};
kolourpaint = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kolourpaint-20.08.1.tar.xz";
- sha256 = "7de98e081f13fb9f8a73932d5e8ce6f1cfd73e345fa28d03f515cad69f1b8bae";
- name = "kolourpaint-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kolourpaint-20.08.2.tar.xz";
+ sha256 = "fbcd875a4a407d9b1e5a637d4947bacfb50f39e10af3327f30fdbb953528aae0";
+ name = "kolourpaint-20.08.2.tar.xz";
};
};
kompare = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kompare-20.08.1.tar.xz";
- sha256 = "6e9109f1b24b3d79dec3d70c75357a67d16ab35081bcf7e4b842981b84796aa2";
- name = "kompare-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kompare-20.08.2.tar.xz";
+ sha256 = "4e52cb2c9e35e90fe77bfb23bd10c1931c56b11e3fec06c215730d60c47e8550";
+ name = "kompare-20.08.2.tar.xz";
};
};
konqueror = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/konqueror-20.08.1.tar.xz";
- sha256 = "e3aac062d9e431e63a861ecf5a1d577b11a154faaed5bd95ef6b69b4fc8a34e9";
- name = "konqueror-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/konqueror-20.08.2.tar.xz";
+ sha256 = "f0622aa67ad0028e28bd6129688aab8946fb49492f0b335f6624ab7d4ef239d7";
+ name = "konqueror-20.08.2.tar.xz";
};
};
konquest = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/konquest-20.08.1.tar.xz";
- sha256 = "cad87dd698bd1ebc0279216614f7fa7c3d3f36d545683a69f1ceafe9e279bbfe";
- name = "konquest-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/konquest-20.08.2.tar.xz";
+ sha256 = "cf97a6961b15b39f5bcdf541e52c137f1d67d0fa5ee259922b4e762edc4491eb";
+ name = "konquest-20.08.2.tar.xz";
};
};
konsole = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/konsole-20.08.1.tar.xz";
- sha256 = "bdd82f9104b2f76c53bdbdef613391719b70719a132d24f12e5f620e1c9313d1";
- name = "konsole-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/konsole-20.08.2.tar.xz";
+ sha256 = "af08ac7666f1ba7c407205f32aaaf015329621247502e80d8df4abe103148951";
+ name = "konsole-20.08.2.tar.xz";
};
};
kontact = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kontact-20.08.1.tar.xz";
- sha256 = "36c33eb5685c22f94257e86ff760d1aa225ae6e2d69402a2b653c54627c7cbde";
- name = "kontact-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kontact-20.08.2.tar.xz";
+ sha256 = "232d9880df74ce0c7697f08b53ef9512ac9c11c3b04142ba7ba4b95091cb5396";
+ name = "kontact-20.08.2.tar.xz";
};
};
kontactinterface = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kontactinterface-20.08.1.tar.xz";
- sha256 = "8272d0c17423a15e56e9e6d3979ee3017fd02ed996b8b6902c47312276ffeb51";
- name = "kontactinterface-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kontactinterface-20.08.2.tar.xz";
+ sha256 = "72d53dbea9db0b1f5654e13c18b4da3d256c6b9d08dfe4581cdf73e3552d2a07";
+ name = "kontactinterface-20.08.2.tar.xz";
};
};
kopete = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kopete-20.08.1.tar.xz";
- sha256 = "9846baae28d723963927d231716e2a8bc19795bac920958b688b48394ef5bc05";
- name = "kopete-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kopete-20.08.2.tar.xz";
+ sha256 = "05f5d6236d4c96b9ce7ba5f24f4e06d7263a78cac27368a7e6b3e5075d42fbb1";
+ name = "kopete-20.08.2.tar.xz";
};
};
korganizer = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/korganizer-20.08.1.tar.xz";
- sha256 = "e693d895b36575f2a73c36ceaafadf81465bbf9b03c74da27f5273a2e7e3670e";
- name = "korganizer-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/korganizer-20.08.2.tar.xz";
+ sha256 = "4f719ec12c52fc313997a187439dc6888fd030a4a1b2357db000abc0a19527b2";
+ name = "korganizer-20.08.2.tar.xz";
};
};
kpat = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kpat-20.08.1.tar.xz";
- sha256 = "2c23ee028c03c5c210b110a2ad253aa7d91c5a0abcb101eb2b3f4c640092463c";
- name = "kpat-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kpat-20.08.2.tar.xz";
+ sha256 = "e4aaed4e876212a926a05d252dab9d01f240d829e383c6072e168a4f78e6d446";
+ name = "kpat-20.08.2.tar.xz";
};
};
kpimtextedit = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kpimtextedit-20.08.1.tar.xz";
- sha256 = "2664e6cbe520fa345e18db071dd5b8a5b4cf9b0fc7317eb04849005228666189";
- name = "kpimtextedit-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kpimtextedit-20.08.2.tar.xz";
+ sha256 = "2dfbcdd53669c812234346b4d31b61af9c510bb4cb0b9912decea8d3c4d406a6";
+ name = "kpimtextedit-20.08.2.tar.xz";
};
};
kpkpass = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kpkpass-20.08.1.tar.xz";
- sha256 = "76012e5bdd4cc434313a0f311acec8f7c798542008cd8efa71fcdf04fb77e55b";
- name = "kpkpass-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kpkpass-20.08.2.tar.xz";
+ sha256 = "ed699c75128ef299f06d699c80c69ac9529fa044db6f18a39d54a5e70d85108c";
+ name = "kpkpass-20.08.2.tar.xz";
};
};
kqtquickcharts = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kqtquickcharts-20.08.1.tar.xz";
- sha256 = "ea931bfefcc04bee03bff2498b92ca1a390967bbc5366c739d1a7cde6bb75820";
- name = "kqtquickcharts-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kqtquickcharts-20.08.2.tar.xz";
+ sha256 = "2ba593a65c143cb56a3030f7ee0cced2df7c7e9431cebf1ae93be51c68b4c3b4";
+ name = "kqtquickcharts-20.08.2.tar.xz";
};
};
krdc = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/krdc-20.08.1.tar.xz";
- sha256 = "7b1fa57be31a3534099e7f203ef9afde23c86c4bbed1072a9d1164a3cf5e1e20";
- name = "krdc-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/krdc-20.08.2.tar.xz";
+ sha256 = "52ddd68bdb1b356be341cf3bc5405cb965f4e4f3da8bf4b28bfb62c7db21ac5f";
+ name = "krdc-20.08.2.tar.xz";
};
};
kreversi = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kreversi-20.08.1.tar.xz";
- sha256 = "5da68ddd37f5dbd4e1c94d1641c69f0e9b4e99eff3cdafcdcbac1139ca517315";
- name = "kreversi-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kreversi-20.08.2.tar.xz";
+ sha256 = "22824dca9c8f07145a6fd9b7386867d8a8efff0fda6752f377230381a1cc71c2";
+ name = "kreversi-20.08.2.tar.xz";
};
};
krfb = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/krfb-20.08.1.tar.xz";
- sha256 = "a80b9bab47f2a7299e33b0e2a10b117605ec1cc572ca72e914c7f01dde383eda";
- name = "krfb-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/krfb-20.08.2.tar.xz";
+ sha256 = "5e90fb4f3bcf2c48b15ec33634d61464323ab5ce1c156a499f089d862dd041d4";
+ name = "krfb-20.08.2.tar.xz";
};
};
kross-interpreters = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kross-interpreters-20.08.1.tar.xz";
- sha256 = "1fb7d75d83e63d1a7147468dd25eeb6aeb06b4679f126c658a8b40ef257f9a4e";
- name = "kross-interpreters-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kross-interpreters-20.08.2.tar.xz";
+ sha256 = "82da0302d2d292e86fa924c8bd1d4effb21f763c42c57affaddeff4777c43951";
+ name = "kross-interpreters-20.08.2.tar.xz";
};
};
kruler = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kruler-20.08.1.tar.xz";
- sha256 = "a9a1f3bd7b02416a393826f7bb810211ef2e14a3628706de735cb88e791d72d1";
- name = "kruler-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kruler-20.08.2.tar.xz";
+ sha256 = "ede45d9cdf1b514fb20ed3a97877689ec75904438b94735706eb638ba01ca778";
+ name = "kruler-20.08.2.tar.xz";
};
};
kshisen = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kshisen-20.08.1.tar.xz";
- sha256 = "d53af415ed2f4d202f5a6f965408e39062e39f43acf83b9550b6cf2ecc1f7641";
- name = "kshisen-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kshisen-20.08.2.tar.xz";
+ sha256 = "d11030b101a409324661adf664d4298f34cc320abff80dba72d112cc3ae2d25d";
+ name = "kshisen-20.08.2.tar.xz";
};
};
ksirk = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/ksirk-20.08.1.tar.xz";
- sha256 = "763d3a8f518365391d2a04943f6efa9c73c388b7701deff300e9e42e4efe848f";
- name = "ksirk-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/ksirk-20.08.2.tar.xz";
+ sha256 = "b7766f0976b3cc112d4c599d91c07d321829c9b1e8ef34d3d21ec4964026854a";
+ name = "ksirk-20.08.2.tar.xz";
};
};
ksmtp = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/ksmtp-20.08.1.tar.xz";
- sha256 = "608d395cd1a046810ebd00f990d6f7c63d66677e7293ef06948ab9d336d2f08f";
- name = "ksmtp-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/ksmtp-20.08.2.tar.xz";
+ sha256 = "5f51e0c025b192719709ae763feeac94df893007b62b5a69b7b95ae9f2fdd8ee";
+ name = "ksmtp-20.08.2.tar.xz";
};
};
ksnakeduel = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/ksnakeduel-20.08.1.tar.xz";
- sha256 = "25bb5cfe2ed480b8ee31d9fe2e62272d77e7b8667748eb4f2c855901f718784f";
- name = "ksnakeduel-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/ksnakeduel-20.08.2.tar.xz";
+ sha256 = "b6f0f51f8fad795cd134f9426b1f1ba8ccceb72e304e8ba55e60af471ad282cc";
+ name = "ksnakeduel-20.08.2.tar.xz";
};
};
kspaceduel = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kspaceduel-20.08.1.tar.xz";
- sha256 = "382def18d1ce6a4333fb47bcd87aed6837382a2b0da2cb8b835d0b34eaed9e38";
- name = "kspaceduel-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kspaceduel-20.08.2.tar.xz";
+ sha256 = "62b9526c031662c049aa90b06ed3e5e2ce8ae774f271e1f29430f23c1f6cd787";
+ name = "kspaceduel-20.08.2.tar.xz";
};
};
ksquares = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/ksquares-20.08.1.tar.xz";
- sha256 = "163c5c070643e31594ada4e812433eb5f615ef425dddafd515e6c445d821f319";
- name = "ksquares-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/ksquares-20.08.2.tar.xz";
+ sha256 = "e1f9fdfa9a4a8348a65e66d48b7389784a1db6c8799cea453d6da3a2a57aca59";
+ name = "ksquares-20.08.2.tar.xz";
};
};
ksudoku = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/ksudoku-20.08.1.tar.xz";
- sha256 = "e53b694b340f812cd3bdf5126a32a1e71efe0785897c5d15f9e28c68fd794840";
- name = "ksudoku-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/ksudoku-20.08.2.tar.xz";
+ sha256 = "6fed393f734eb27d6c36ad7516bf29ff648d319f08d9f8bdc17a8030842d8e33";
+ name = "ksudoku-20.08.2.tar.xz";
};
};
ksystemlog = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/ksystemlog-20.08.1.tar.xz";
- sha256 = "e0e8bc1cf8ee229206c8a65e30979ba8b72426c8dc2f737f6fecb0dfb36ed21a";
- name = "ksystemlog-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/ksystemlog-20.08.2.tar.xz";
+ sha256 = "63c6a520b63f148de2e3996250a2fef22e1a3ce18e744a699ae21de96a2c4e53";
+ name = "ksystemlog-20.08.2.tar.xz";
};
};
kteatime = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kteatime-20.08.1.tar.xz";
- sha256 = "23cc14f587e4ae4e3b56f1fb7a2093301df740328e35b25d7fca55d35f012ce5";
- name = "kteatime-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kteatime-20.08.2.tar.xz";
+ sha256 = "d8e69fdb124e8689c72e4b9fe39226cc49b1ca990478fbb68e02b37f0cd861ac";
+ name = "kteatime-20.08.2.tar.xz";
};
};
ktimer = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/ktimer-20.08.1.tar.xz";
- sha256 = "9c7062f9ee64ff49a7c7773fe41cee0899e30f1f47368af73da067e51db6714b";
- name = "ktimer-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/ktimer-20.08.2.tar.xz";
+ sha256 = "69293b7296643c6543d0646d14f9c75479f29f129924258957a407b77539a4c2";
+ name = "ktimer-20.08.2.tar.xz";
};
};
ktnef = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/ktnef-20.08.1.tar.xz";
- sha256 = "433b232a0c835e7f27c06e6d19856e4f8690c3e3b5c5d63f85172897b2448c81";
- name = "ktnef-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/ktnef-20.08.2.tar.xz";
+ sha256 = "ab73736e386c2b52a14fb56f1184479ed1c83c0571e9e8518d2b94b1dcd2e47d";
+ name = "ktnef-20.08.2.tar.xz";
};
};
ktouch = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/ktouch-20.08.1.tar.xz";
- sha256 = "e098ebbccca743f678103a9adf54fc388fa4379cc6f667e48259d0b50f56b5fb";
- name = "ktouch-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/ktouch-20.08.2.tar.xz";
+ sha256 = "1b073a92343c9a2c772cfaac4e9fa7b6e85750586e3a57da413e33cdba34b5f4";
+ name = "ktouch-20.08.2.tar.xz";
};
};
ktp-accounts-kcm = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/ktp-accounts-kcm-20.08.1.tar.xz";
- sha256 = "b71f2f654c3cf48e4b4b037a0ae8f6fef5bac9c3483458c0eadf7b3253577504";
- name = "ktp-accounts-kcm-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/ktp-accounts-kcm-20.08.2.tar.xz";
+ sha256 = "df709ee612ff4c71a43197762b8a9d296b5a43f6e0afe4d9c8d0bd88eef81465";
+ name = "ktp-accounts-kcm-20.08.2.tar.xz";
};
};
ktp-approver = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/ktp-approver-20.08.1.tar.xz";
- sha256 = "51296f4d84585ba63d4c72cdbdee6e2b436a1aff8ce6b475a8c9a81766856b39";
- name = "ktp-approver-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/ktp-approver-20.08.2.tar.xz";
+ sha256 = "054db02db679d0a4600632700cdd57cae539159a0a8f01f479ea337d33d8a6bd";
+ name = "ktp-approver-20.08.2.tar.xz";
};
};
ktp-auth-handler = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/ktp-auth-handler-20.08.1.tar.xz";
- sha256 = "6c1c006a3381caeebdfc37886b91b598153f3778567303d8a031e84599c9d582";
- name = "ktp-auth-handler-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/ktp-auth-handler-20.08.2.tar.xz";
+ sha256 = "a61557efa800d42fd8ed14efdb09d43310212976d737a4fd5272f502bacbc371";
+ name = "ktp-auth-handler-20.08.2.tar.xz";
};
};
ktp-call-ui = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/ktp-call-ui-20.08.1.tar.xz";
- sha256 = "feb783be10b0792cb0c59456a00607b2d595e8bef90f0b4ec79dd070596d413c";
- name = "ktp-call-ui-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/ktp-call-ui-20.08.2.tar.xz";
+ sha256 = "ecd38d8b9f24cf620b8c9c1935328af3142199c6aa87e69c734e43096e492ac5";
+ name = "ktp-call-ui-20.08.2.tar.xz";
};
};
ktp-common-internals = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/ktp-common-internals-20.08.1.tar.xz";
- sha256 = "5750bde4950fbe26f06a306aa642c9c501d4f0e1b41b57234d9e36b189a91d1b";
- name = "ktp-common-internals-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/ktp-common-internals-20.08.2.tar.xz";
+ sha256 = "807fcd6f9c415a0799057435f997e143e9584a94577f9afaa7fcc6a4197e7cb0";
+ name = "ktp-common-internals-20.08.2.tar.xz";
};
};
ktp-contact-list = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/ktp-contact-list-20.08.1.tar.xz";
- sha256 = "809db5ff05c1ec632109be408cef987532193b1b0bea69d6a9286c12ccfe19a1";
- name = "ktp-contact-list-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/ktp-contact-list-20.08.2.tar.xz";
+ sha256 = "214d73532dc855a8a4b68730adf5cbd046aae89f2ee2ad5d9a4c25b4eff6acb0";
+ name = "ktp-contact-list-20.08.2.tar.xz";
};
};
ktp-contact-runner = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/ktp-contact-runner-20.08.1.tar.xz";
- sha256 = "a9e761fd35545cfffade088e33f4358e2743416f61e9ba490f21f3b04193158f";
- name = "ktp-contact-runner-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/ktp-contact-runner-20.08.2.tar.xz";
+ sha256 = "8e40e4ab7ce2c1c382b109a15f88f5e1c7d147c76ed36ca05ef6d9f3f58d3d45";
+ name = "ktp-contact-runner-20.08.2.tar.xz";
};
};
ktp-desktop-applets = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/ktp-desktop-applets-20.08.1.tar.xz";
- sha256 = "d6ffd4b29c4fb977937cb47d55d023012be1a9b3602dd1f1628eba7d8c9167cd";
- name = "ktp-desktop-applets-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/ktp-desktop-applets-20.08.2.tar.xz";
+ sha256 = "b0884360be80f89dee3852b023055220e3cdab2f422cc3812eda31169fba6298";
+ name = "ktp-desktop-applets-20.08.2.tar.xz";
};
};
ktp-filetransfer-handler = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/ktp-filetransfer-handler-20.08.1.tar.xz";
- sha256 = "35495c1d18a7b65496fcf17cade4a81e4795b1603c380c036dda0a7626f66312";
- name = "ktp-filetransfer-handler-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/ktp-filetransfer-handler-20.08.2.tar.xz";
+ sha256 = "c2ec5fd2a5746dd8ce1371c503c51feee206d8dfe7ca8cdaa71b8e925636a97c";
+ name = "ktp-filetransfer-handler-20.08.2.tar.xz";
};
};
ktp-kded-module = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/ktp-kded-module-20.08.1.tar.xz";
- sha256 = "247e4047e3955e21066ec461a5374d1b3d925bb92b42adc46d3711e542ad7e04";
- name = "ktp-kded-module-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/ktp-kded-module-20.08.2.tar.xz";
+ sha256 = "307285b2d4e04c244691a6f2a285aec8ada26e0b01eb1fdbf2bc1da57b05828a";
+ name = "ktp-kded-module-20.08.2.tar.xz";
};
};
ktp-send-file = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/ktp-send-file-20.08.1.tar.xz";
- sha256 = "b3786c6e6f09ea086c2d94d2a6dd653e45bab8f984c6287c39f5e0134d6ffee1";
- name = "ktp-send-file-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/ktp-send-file-20.08.2.tar.xz";
+ sha256 = "6c3fb09112d439ce2f0db3acdbc766e8a914d4dc7cbb6ab709922f8e95f2f0e1";
+ name = "ktp-send-file-20.08.2.tar.xz";
};
};
ktp-text-ui = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/ktp-text-ui-20.08.1.tar.xz";
- sha256 = "5cdb88f55b6ca1a1053b8d5b2604eff681c5f3558f0c8037034c264793de8c02";
- name = "ktp-text-ui-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/ktp-text-ui-20.08.2.tar.xz";
+ sha256 = "0f10612e08bc1ee04fb0a538337d760d7b79b5dac37bb58275998d16dbb5415c";
+ name = "ktp-text-ui-20.08.2.tar.xz";
};
};
ktuberling = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/ktuberling-20.08.1.tar.xz";
- sha256 = "62d3d8db7b1db7f9d58df44acf61342ce42fb081038fc48f8f6e45d9167ceaa6";
- name = "ktuberling-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/ktuberling-20.08.2.tar.xz";
+ sha256 = "f9e4a0de3b92d015f8e7b862badf4bbf11b3ce2727aa607384a009247e7b7fad";
+ name = "ktuberling-20.08.2.tar.xz";
};
};
kturtle = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kturtle-20.08.1.tar.xz";
- sha256 = "c261fdf44b36aaa278b4b9752a0d989facec3768853606e5c0b8a86d9d01edb3";
- name = "kturtle-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kturtle-20.08.2.tar.xz";
+ sha256 = "ca9bf47b2ec34744492f218c922b10d613b19fbbd2c75b6ddba157eef21337c7";
+ name = "kturtle-20.08.2.tar.xz";
};
};
kubrick = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kubrick-20.08.1.tar.xz";
- sha256 = "c0c017f6913f94224e18df7d96ba9ad92f51522a331b77f5722f2d2c953c342c";
- name = "kubrick-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kubrick-20.08.2.tar.xz";
+ sha256 = "02fed26a7246feffd668fbda939893295557c0571da64fdf195db93474653224";
+ name = "kubrick-20.08.2.tar.xz";
};
};
kwalletmanager = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kwalletmanager-20.08.1.tar.xz";
- sha256 = "b5a134db6b6bceb802c6c45915636bcd95fea5b6846cfd022917405f48cc92c5";
- name = "kwalletmanager-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kwalletmanager-20.08.2.tar.xz";
+ sha256 = "7950e250c5351a9b8e3b36165fa2003baa044bb2d3553a32360000a322bddad8";
+ name = "kwalletmanager-20.08.2.tar.xz";
};
};
kwave = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kwave-20.08.1.tar.xz";
- sha256 = "3791f9401271c23d3ababd14e4c1e6acfe58df2100331e31ba61453feaf9fa32";
- name = "kwave-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kwave-20.08.2.tar.xz";
+ sha256 = "6e15a67022ef96f07b9825139cc7aaacbc6f60729570c31ce6cb25184602b434";
+ name = "kwave-20.08.2.tar.xz";
};
};
kwordquiz = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/kwordquiz-20.08.1.tar.xz";
- sha256 = "77d2d30abcb37ee6a8e0b121ed1969f2fa61eb32814f49a0186043a4e8f1a71c";
- name = "kwordquiz-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/kwordquiz-20.08.2.tar.xz";
+ sha256 = "57aa012f3aad128579f067668db1344306e2e23d6a89b47d413d6eee0da0e238";
+ name = "kwordquiz-20.08.2.tar.xz";
};
};
libgravatar = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/libgravatar-20.08.1.tar.xz";
- sha256 = "dfe95055869944b79b1f4120f013b547225b02b69c7e410fd09d52469a892263";
- name = "libgravatar-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/libgravatar-20.08.2.tar.xz";
+ sha256 = "4c0a2eb073ef42a26813b93bd76aaa9e26a040a966329e6e3cf371d7de1e55f7";
+ name = "libgravatar-20.08.2.tar.xz";
};
};
libkcddb = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/libkcddb-20.08.1.tar.xz";
- sha256 = "1519c9248b46d95d8761a8ed22b0805964a5fef5aa665710b08851c753f70590";
- name = "libkcddb-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/libkcddb-20.08.2.tar.xz";
+ sha256 = "545cf54ac454845c524ba7cd7ec289ac952fa1ce2bbae01411ba71c66a5ed08a";
+ name = "libkcddb-20.08.2.tar.xz";
};
};
libkcompactdisc = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/libkcompactdisc-20.08.1.tar.xz";
- sha256 = "f43b8129a0083686dbc939387931867d9d65e14936f2a86be0a7286e01cf1974";
- name = "libkcompactdisc-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/libkcompactdisc-20.08.2.tar.xz";
+ sha256 = "37534f67af69775d6f786917920d2810a5d20f28df57e1a17aee9a7b30bbe302";
+ name = "libkcompactdisc-20.08.2.tar.xz";
};
};
libkdcraw = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/libkdcraw-20.08.1.tar.xz";
- sha256 = "3431810972d886635ba6249ac86a9442a9c3a3333eb0b27533fc459e757e9eb1";
- name = "libkdcraw-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/libkdcraw-20.08.2.tar.xz";
+ sha256 = "6fbf1a5ca5a439fabb01648cde4b57e1f3de2372b7f3b56ccae03f653490f1b2";
+ name = "libkdcraw-20.08.2.tar.xz";
};
};
libkdegames = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/libkdegames-20.08.1.tar.xz";
- sha256 = "6ab0b143dcba2d935dd0182c9154657ebbfb205c28bc86e2e13875b58e23737d";
- name = "libkdegames-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/libkdegames-20.08.2.tar.xz";
+ sha256 = "d9f0ab87dc4671a55ad8d2b7d3a54cbc444201c11ebae436e0107fe7067fb983";
+ name = "libkdegames-20.08.2.tar.xz";
};
};
libkdepim = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/libkdepim-20.08.1.tar.xz";
- sha256 = "a2fb769239283e7f536d4779089ad8664d1498cf7520f057589bf0285630fb4b";
- name = "libkdepim-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/libkdepim-20.08.2.tar.xz";
+ sha256 = "3558c9af95c22bb4ce0ceeec483fada9e8e9f27de4ac34ffe44a4eb3b6d21101";
+ name = "libkdepim-20.08.2.tar.xz";
};
};
libkeduvocdocument = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/libkeduvocdocument-20.08.1.tar.xz";
- sha256 = "ecd158beb7fcc1a5d540d956669c6fdce6172f4b282755170d2791076d75ad84";
- name = "libkeduvocdocument-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/libkeduvocdocument-20.08.2.tar.xz";
+ sha256 = "ef8e0b359e3cf1b3303da3795add1ced405d230f51895abe10d5a7989be03923";
+ name = "libkeduvocdocument-20.08.2.tar.xz";
};
};
libkexiv2 = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/libkexiv2-20.08.1.tar.xz";
- sha256 = "67310ae90d89f26d2ae98ede8fa973e27ea1ce3d15c389954d391cd058543979";
- name = "libkexiv2-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/libkexiv2-20.08.2.tar.xz";
+ sha256 = "793c4d11bb1b60beca7b25a2427650b3f358364c55be022dfd4a7ccfd889578d";
+ name = "libkexiv2-20.08.2.tar.xz";
};
};
libkgapi = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/libkgapi-20.08.1.tar.xz";
- sha256 = "dfa9003556a01ef19eda186973f87356d32ea8f82f8d653803b2cc935f077127";
- name = "libkgapi-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/libkgapi-20.08.2.tar.xz";
+ sha256 = "f3fb015e8b8ac92c138e8a59e8e8b9333500e0ea314180cc1ad14e31248312df";
+ name = "libkgapi-20.08.2.tar.xz";
};
};
libkgeomap = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/libkgeomap-20.08.1.tar.xz";
- sha256 = "a210945b6807efca3390173233269aa31f27a23b5f36670b88f66b3b28df846f";
- name = "libkgeomap-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/libkgeomap-20.08.2.tar.xz";
+ sha256 = "7149095aa0df4e3a184bb2a6fb8322e27e3a34eb3bc40cf370a09b21fb2a6ea0";
+ name = "libkgeomap-20.08.2.tar.xz";
};
};
libkipi = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/libkipi-20.08.1.tar.xz";
- sha256 = "4722ab563c1350042920d1937b84fdd38b5779449a2d9b689328cd82241cb5d2";
- name = "libkipi-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/libkipi-20.08.2.tar.xz";
+ sha256 = "87ffa30b23779313a94953afe57d1b19515c3a2f311a2dea6449c9d96b09e5b1";
+ name = "libkipi-20.08.2.tar.xz";
};
};
libkleo = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/libkleo-20.08.1.tar.xz";
- sha256 = "78c1dc2e4d7177aaf37cb1c706d9c21b08fac7d130ac1da3d3f2a6f083117ffb";
- name = "libkleo-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/libkleo-20.08.2.tar.xz";
+ sha256 = "34537b35e22cef85650ae6f9bf197518bb5a59e9614d6d86ba86f085fddd97c4";
+ name = "libkleo-20.08.2.tar.xz";
};
};
libkmahjongg = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/libkmahjongg-20.08.1.tar.xz";
- sha256 = "5a8674921e39b38655d1f95340831b1bc746047cbad8501706436f5dacf47fc2";
- name = "libkmahjongg-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/libkmahjongg-20.08.2.tar.xz";
+ sha256 = "032ac6d9e96cd9156f5153c01f881d0e442fda9de90398df320846095ba2c40a";
+ name = "libkmahjongg-20.08.2.tar.xz";
};
};
libkomparediff2 = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/libkomparediff2-20.08.1.tar.xz";
- sha256 = "9d109dfea1433602cdabc89ffa5f522147befc9b1d6d9760549aba7db5dbd399";
- name = "libkomparediff2-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/libkomparediff2-20.08.2.tar.xz";
+ sha256 = "91b0b72d5c4e2ddd863636cca299660bfbb5b7a55773cbc51000fe9c1ca91a98";
+ name = "libkomparediff2-20.08.2.tar.xz";
};
};
libksane = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/libksane-20.08.1.tar.xz";
- sha256 = "0d8717ad004a2480aea232d9a2317b4d1cc4678d53f0176bdaeb411eedd19dbe";
- name = "libksane-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/libksane-20.08.2.tar.xz";
+ sha256 = "21bb577d78e020281dfc6c993ab7fe286d648e72c851e45463a32969fbb35aa6";
+ name = "libksane-20.08.2.tar.xz";
};
};
libksieve = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/libksieve-20.08.1.tar.xz";
- sha256 = "a1defe888c6c5a3c16ef6fad39d9eb94bc784031079763f004048951820acec0";
- name = "libksieve-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/libksieve-20.08.2.tar.xz";
+ sha256 = "589e4dc27d1d91d8c16879fa99aab45f3847a74e3e9357e3e037503e5515ee2e";
+ name = "libksieve-20.08.2.tar.xz";
};
};
lokalize = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/lokalize-20.08.1.tar.xz";
- sha256 = "a4a3e5703d39ae8fe12d2ff832e99b3339ba1c8ec8d2439abeb348e687f1eae9";
- name = "lokalize-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/lokalize-20.08.2.tar.xz";
+ sha256 = "c11616bc02763fb1f3b1abf0b2ba70d0c6c550435c94ff25c5096f9a90375e23";
+ name = "lokalize-20.08.2.tar.xz";
};
};
lskat = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/lskat-20.08.1.tar.xz";
- sha256 = "319d611468b969b3bb62731a0aa04c5672bb689c41adf5545dfa8b9742668775";
- name = "lskat-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/lskat-20.08.2.tar.xz";
+ sha256 = "78f152f7af46345f65c3800f9c591fb204e917595c1f803c9c15148ef39c42b8";
+ name = "lskat-20.08.2.tar.xz";
};
};
mailcommon = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/mailcommon-20.08.1.tar.xz";
- sha256 = "d4ee996f74a749ad626ca5029821546da82dbfc1c81864ff39b5f51d6dcf1d88";
- name = "mailcommon-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/mailcommon-20.08.2.tar.xz";
+ sha256 = "a4170ab9ff7680fb26c61474f42d5424716f4e91c1a5e9275cc1222491c9564d";
+ name = "mailcommon-20.08.2.tar.xz";
};
};
mailimporter = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/mailimporter-20.08.1.tar.xz";
- sha256 = "dcf2b94d4f66be2b339b31dfebef7af373e0cf59f09e4cfb664eb828e1d4f73f";
- name = "mailimporter-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/mailimporter-20.08.2.tar.xz";
+ sha256 = "a255b60378c1cf77e517919d072cb44bd8c25e8ed8f07429763bb7915b3cc711";
+ name = "mailimporter-20.08.2.tar.xz";
};
};
marble = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/marble-20.08.1.tar.xz";
- sha256 = "96b019a41ae4e0aaab59950b6be040bd2145f130190b8c0dea436c791e3192ed";
- name = "marble-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/marble-20.08.2.tar.xz";
+ sha256 = "f44ac10de33dc31ce1cb99635131fe2c7bf3f60f09204b2061f81042a725475c";
+ name = "marble-20.08.2.tar.xz";
};
};
mbox-importer = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/mbox-importer-20.08.1.tar.xz";
- sha256 = "262c8805539b7c766099c6287d1dbf88161afe6d32c1c6821ebe63cff4fe3b71";
- name = "mbox-importer-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/mbox-importer-20.08.2.tar.xz";
+ sha256 = "3b3bee33683c534974255616f3b2f3baebf85363b2c24bbee9cc195ddf35ca9a";
+ name = "mbox-importer-20.08.2.tar.xz";
};
};
messagelib = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/messagelib-20.08.1.tar.xz";
- sha256 = "fc41124e905456a3c5227ca6154dc3e77620e307458fbb19f5421cbfb04523b3";
- name = "messagelib-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/messagelib-20.08.2.tar.xz";
+ sha256 = "5cf3a3f2b6473e60a7c2af10aa4eb1cfba25a4786132ee87b657b0dafb9f5028";
+ name = "messagelib-20.08.2.tar.xz";
};
};
minuet = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/minuet-20.08.1.tar.xz";
- sha256 = "a640025550337f415f7bfaaad7f6ef7de667dd054131be2c313d894c3f6703ea";
- name = "minuet-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/minuet-20.08.2.tar.xz";
+ sha256 = "24383168e2a0b7b319ecb37e2b1f3b039ad790a7e0f49385657f049565f1ef84";
+ name = "minuet-20.08.2.tar.xz";
};
};
okular = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/okular-20.08.1.tar.xz";
- sha256 = "77b5d8e410a2a008ea63f60a561f99053ec07d92da6ee3afaeefd977aadebd83";
- name = "okular-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/okular-20.08.2.tar.xz";
+ sha256 = "6f1885ed8050a55bb2cbf05089b452f555852e003ec7fe89fe472c0dbc92e65b";
+ name = "okular-20.08.2.tar.xz";
};
};
palapeli = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/palapeli-20.08.1.tar.xz";
- sha256 = "31b847caa89b998dfa580553d96c656b05f2d85fdd88f0ba71e953762cefac90";
- name = "palapeli-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/palapeli-20.08.2.tar.xz";
+ sha256 = "a31b0db2f3e77eac8f527d26f8ed0400fe5bcdb3a3970b925f14886bd1bcd63e";
+ name = "palapeli-20.08.2.tar.xz";
};
};
parley = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/parley-20.08.1.tar.xz";
- sha256 = "9617a90c2d4f9ab5d928febc6bcd10c9023dcc10e9f1202bfb97b77019948f0c";
- name = "parley-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/parley-20.08.2.tar.xz";
+ sha256 = "cf2f00925730d8baec66d422f058e4b3e979678e79c57898ceffd8650720bda6";
+ name = "parley-20.08.2.tar.xz";
};
};
picmi = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/picmi-20.08.1.tar.xz";
- sha256 = "027e37a2c9dcf828684a0f8ffdcfc6451a2bd62976c10d990e471fa0f5ba97c3";
- name = "picmi-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/picmi-20.08.2.tar.xz";
+ sha256 = "35f2bf3d8375618f97aee01c8f2421521b2cd5c11d7b14fc9a376026d74c82a5";
+ name = "picmi-20.08.2.tar.xz";
};
};
pimcommon = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/pimcommon-20.08.1.tar.xz";
- sha256 = "58a33349bf932076f6be343ae64e23f146e2a6a96e3af8ce68dbd752f2c80dd9";
- name = "pimcommon-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/pimcommon-20.08.2.tar.xz";
+ sha256 = "cba9e66153d36debe3f046363af7ff40a4ba263f33bfe20c7ec10b5bf9183deb";
+ name = "pimcommon-20.08.2.tar.xz";
};
};
pim-data-exporter = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/pim-data-exporter-20.08.1.tar.xz";
- sha256 = "54092763e4b951f4e90a217c876107900e0706da68ca5517184e5da258ae95ec";
- name = "pim-data-exporter-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/pim-data-exporter-20.08.2.tar.xz";
+ sha256 = "54b09a3f763004c805cc0dce8ab2e665116b7ef29419f22ad413aa250dcb4ac0";
+ name = "pim-data-exporter-20.08.2.tar.xz";
};
};
pim-sieve-editor = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/pim-sieve-editor-20.08.1.tar.xz";
- sha256 = "f788038796f226bfe426835fc6f186e23f2c7f9fda8316dfa6af307d6936d4ad";
- name = "pim-sieve-editor-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/pim-sieve-editor-20.08.2.tar.xz";
+ sha256 = "e8c590a0fddc5292172115b11fb75c5f847347079100617dbf321875642d7098";
+ name = "pim-sieve-editor-20.08.2.tar.xz";
};
};
poxml = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/poxml-20.08.1.tar.xz";
- sha256 = "9f4bcafc664532706fe634ce8b0f410619d5e3c285526a7b61969155d75bbad2";
- name = "poxml-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/poxml-20.08.2.tar.xz";
+ sha256 = "67d260349489e92ebce20253f9a3ccde5bb75eb13eb4d1a08a86c18c82e4a2a9";
+ name = "poxml-20.08.2.tar.xz";
};
};
print-manager = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/print-manager-20.08.1.tar.xz";
- sha256 = "52d41ca3ae69e6e8e1eb4ddf1d516868dc436e81779053efdea5e3819545ca5b";
- name = "print-manager-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/print-manager-20.08.2.tar.xz";
+ sha256 = "de21f8c428198b906f4ae438d6ced8d707b12c15578409c2aa2f7b2f73feb990";
+ name = "print-manager-20.08.2.tar.xz";
};
};
rocs = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/rocs-20.08.1.tar.xz";
- sha256 = "3c5f764f06f6f5b7c68523be4fdd37e75b2249e0b15001bc39e55051d9e271ef";
- name = "rocs-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/rocs-20.08.2.tar.xz";
+ sha256 = "2d8efd62b89dd36033bb3d818c82fee67e6efa2d2bb98dda0d4eab13baaee485";
+ name = "rocs-20.08.2.tar.xz";
};
};
signon-kwallet-extension = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/signon-kwallet-extension-20.08.1.tar.xz";
- sha256 = "10a0ea806dc63cbf6c6d4794fe596c68355bccb3e08370d70ce7a8e95af448a5";
- name = "signon-kwallet-extension-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/signon-kwallet-extension-20.08.2.tar.xz";
+ sha256 = "a271f4d09511171dcf1ebcdaf0b7205f9ee6a75b20ef0801f36d136f7b4a70dd";
+ name = "signon-kwallet-extension-20.08.2.tar.xz";
};
};
spectacle = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/spectacle-20.08.1.tar.xz";
- sha256 = "4a01b5ef41901ff2e83bb517c2e96a978188b98cb62243eb541a317f57a2bd69";
- name = "spectacle-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/spectacle-20.08.2.tar.xz";
+ sha256 = "9a467ea3b05981d588d39573cca375636b825ad8cab8a36ce48dbbc12425ab0d";
+ name = "spectacle-20.08.2.tar.xz";
};
};
step = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/step-20.08.1.tar.xz";
- sha256 = "6e04930963676b1bfa55ee095914c7491a61bf3963c45ed4157f868175ee6605";
- name = "step-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/step-20.08.2.tar.xz";
+ sha256 = "a52e4b6f281ba1a7afd4ab3ac7307080464147c4052ee222399135fe61ac7958";
+ name = "step-20.08.2.tar.xz";
};
};
svgpart = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/svgpart-20.08.1.tar.xz";
- sha256 = "206c3741464f959ffbaea09bc918fc3e88f32fcf12928cd8c399ab44d4b1f228";
- name = "svgpart-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/svgpart-20.08.2.tar.xz";
+ sha256 = "3a46b5bd9acf5372f73b602d155517f0dff47f3337bd8a46a580aae7480dd771";
+ name = "svgpart-20.08.2.tar.xz";
};
};
sweeper = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/sweeper-20.08.1.tar.xz";
- sha256 = "722c25de8cc74fe7e8310d47a7e794f32e935331f89d4f5249fd045a83ce0431";
- name = "sweeper-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/sweeper-20.08.2.tar.xz";
+ sha256 = "0c255ef15c1e32eb561b26f5b73a6c154730be583efbc5ee713aaed17de14091";
+ name = "sweeper-20.08.2.tar.xz";
};
};
umbrello = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/umbrello-20.08.1.tar.xz";
- sha256 = "d980d67f8a878e01cd3af5499aa843df703f20cdecca8a14b59d87d13c747328";
- name = "umbrello-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/umbrello-20.08.2.tar.xz";
+ sha256 = "0357b44646c750253e3e7ee323b9e49e854c4c8cdf340eb5a11b2d42edfc4cd7";
+ name = "umbrello-20.08.2.tar.xz";
};
};
yakuake = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/yakuake-20.08.1.tar.xz";
- sha256 = "6768a360a3d79080e6e53821460ed27f6c2e47fa11077bbec3213d85385d6fac";
- name = "yakuake-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/yakuake-20.08.2.tar.xz";
+ sha256 = "8a0aa3a97a9fdc781887a6cb6480cba5079cf8aacd3345b63f5eb6be4d91665a";
+ name = "yakuake-20.08.2.tar.xz";
};
};
zeroconf-ioslave = {
- version = "20.08.1";
+ version = "20.08.2";
src = fetchurl {
- url = "${mirror}/stable/release-service/20.08.1/src/zeroconf-ioslave-20.08.1.tar.xz";
- sha256 = "ca1685a22922057ba89510d71a11218bf47db0d0313aec2b55aca21932564866";
- name = "zeroconf-ioslave-20.08.1.tar.xz";
+ url = "${mirror}/stable/release-service/20.08.2/src/zeroconf-ioslave-20.08.2.tar.xz";
+ sha256 = "0ad34f8361ee3ecd669e396265135b534239994d3bec5e9e6a43b7b7bf5c04e4";
+ name = "zeroconf-ioslave-20.08.2.tar.xz";
};
};
}
diff --git a/third_party/nixpkgs/pkgs/applications/misc/OSCAR/default.nix b/third_party/nixpkgs/pkgs/applications/misc/OSCAR/default.nix
new file mode 100644
index 0000000000..e619ad8c69
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/applications/misc/OSCAR/default.nix
@@ -0,0 +1,46 @@
+{ stdenv, mkDerivation, fetchFromGitLab, qmake, qtbase, qttools, qtserialport, libGLU }:
+mkDerivation rec {
+ pname = "OSCAR";
+ version = "1.2.0";
+
+ src = fetchFromGitLab {
+ owner = "pholy";
+ repo = "OSCAR-code";
+ rev = "v${version}";
+ sha256 = "10r37d8c2avr167n2s9lhld1c9hmckm444fq163z1jsy9jpid6mg";
+ };
+
+ buildInputs = [ qtbase qttools qtserialport libGLU ];
+ nativeBuildInputs = [ qmake ];
+ postPatch = ''
+ substituteInPlace oscar/oscar.pro --replace "/bin/bash" "${stdenv.shell}"
+ '';
+
+ qmakeFlags = [ "OSCAR_QT.pro" ];
+
+ installPhase = ''
+ install -d $out/bin
+ install -d $out/share/OSCAR/Help
+ install -d $out/share/OSCAR/Html
+ install -d $out/share/OSCAR/Translations
+ install -d $out/share/icons/OSCAR
+ install -d $out/share/applications
+ install -T oscar/OSCAR $out/bin/OSCAR
+ # help browser was removed 'temporarily' in https://gitlab.com/pholy/OSCAR-code/-/commit/57c3e4c33ccdd2d0eddedbc24c0e4f2969da3841
+ # install oscar/Help/* $out/share/OSCAR/Help
+ install oscar/Html/* $out/share/OSCAR/Html
+ install oscar/Translations/* $out/share/OSCAR/Translations
+ install -T Building/Linux/OSCAR.png $out/share/icons/OSCAR/OSCAR.png
+ install -T Building/Linux/OSCAR.desktop $out/share/applications/OSCAR.desktop
+ '';
+
+ meta = with stdenv.lib; {
+ homepage = "https://www.sleepfiles.com/OSCAR/";
+ description = "Software for reviewing and exploring data produced by CPAP and related machines used in the treatment of sleep apnea";
+ license = licenses.gpl3;
+ maintainers = [ maintainers.roconnor ];
+ # Someone needs to create a suitable installPhase for Darwin and Windows.
+ # See https://gitlab.com/pholy/OSCAR-code/-/tree/master/Building.
+ broken = !stdenv.hostPlatform.isLinux;
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/applications/misc/archiver/default.nix b/third_party/nixpkgs/pkgs/applications/misc/archiver/default.nix
index fed1dc4847..aec0b9d511 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/archiver/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/archiver/default.nix
@@ -5,16 +5,16 @@
buildGoModule rec {
pname = "archiver";
- version = "3.3.2";
+ version = "3.4.0";
src = fetchFromGitHub {
owner = "mholt";
repo = pname;
rev = "v${version}";
- sha256 = "1fi86g27c660g3mv9c5rfm0mmvh5q08704c19xnvrpwlg65glqrz";
+ sha256 = "16jawybywqfkp68035bnf206a2w4khjw239saa429a21lxrfyk4a";
};
- vendorSha256 = "1rqhra3rfarq8f750zszkrm0jcsxa4sjbfpmcdlj5z000df699zq";
+ vendorSha256 = "0m89ibj3dm58j49d99dhkn0ryivnianxz7lkpkvhs0cdbzzc02az";
buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version} -X main.commit=${src.rev} -X main.date=unknown" ];
diff --git a/third_party/nixpkgs/pkgs/applications/misc/ausweisapp2/default.nix b/third_party/nixpkgs/pkgs/applications/misc/ausweisapp2/default.nix
index 9f157798a7..911a30ccf6 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/ausweisapp2/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/ausweisapp2/default.nix
@@ -8,7 +8,7 @@ mkDerivation rec {
src = fetchFromGitHub {
owner = "Governikus";
repo = "AusweisApp2";
- rev = "${version}";
+ rev = version;
sha256 = "1vibk3wmn54qr2mwz537hrr959y0r1zabp0gsijhzj2mk68g9pnb";
};
diff --git a/third_party/nixpkgs/pkgs/applications/misc/batsignal/default.nix b/third_party/nixpkgs/pkgs/applications/misc/batsignal/default.nix
index 56c508eaca..18dbcc9ce2 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/batsignal/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/batsignal/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "batsignal";
- version = "1.1.2";
+ version = "1.1.3";
src = fetchFromGitHub {
owner = "electrickite";
repo = "batsignal";
- rev = "${version}";
- sha256 = "0ss5dw7wpqsf96dig6r7x4fhf6brmjdy54jyyf5nk1h9kzw4d69r";
+ rev = version;
+ sha256 = "12hj0j18db34x0xzgj6xmhvxm966d05z0rl3d9rlrcd2q96lilwf";
};
buildInputs = [ libnotify glib ];
diff --git a/third_party/nixpkgs/pkgs/applications/misc/chewing-editor/default.nix b/third_party/nixpkgs/pkgs/applications/misc/chewing-editor/default.nix
index b70f9a2e7d..3a89773b85 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/chewing-editor/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/chewing-editor/default.nix
@@ -7,8 +7,8 @@ mkDerivation rec {
src = fetchFromGitHub {
owner = "chewing";
- repo = "${pname}";
- rev = "${version}";
+ repo = pname;
+ rev = version;
sha256 = "0kc2hjx1gplm3s3p1r5sn0cyxw3k1q4gyv08q9r6rs4sg7xh2w7w";
};
diff --git a/third_party/nixpkgs/pkgs/applications/misc/clipcat/default.nix b/third_party/nixpkgs/pkgs/applications/misc/clipcat/default.nix
new file mode 100644
index 0000000000..244770e138
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/applications/misc/clipcat/default.nix
@@ -0,0 +1,64 @@
+{ lib, fetchFromGitHub, installShellFiles, rustPlatform, rustfmt, xorg
+, pkgconfig, llvmPackages, clang, protobuf, python3 }:
+
+rustPlatform.buildRustPackage rec {
+ pname = "clipcat";
+ version = "0.4.19";
+
+ src = fetchFromGitHub {
+ owner = "xrelkd";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "1lhnm521qqy3aw2iyk1dv4yc5ms0c5x5iipx96bz6v6y0cnmf4kw";
+ };
+
+ cargoSha256 = "04iflyvz8g53z658rkxafiyi2m9kzxwl3p1xgkjq7vacmz5jk15c";
+
+ LIBCLANG_PATH = "${llvmPackages.libclang}/lib";
+
+ # needed for internal protobuf c wrapper library
+ PROTOC = "${protobuf}/bin/protoc";
+ PROTOC_INCLUDE = "${protobuf}/include";
+
+ nativeBuildInputs = [
+ pkgconfig
+
+ clang
+ llvmPackages.libclang
+
+ rustfmt
+ protobuf
+
+ python3
+
+ installShellFiles
+ ];
+ buildInputs = [ xorg.libxcb ];
+
+ cargoBuildFlags = [ "--features=all" ];
+
+ postInstall = ''
+ installShellCompletion --bash --name clipcatd completions/bash-completion/completions/clipcatd
+ installShellCompletion --fish --name clipcatd.fish completions/fish/completions/clipcatd.fish
+ installShellCompletion --zsh --name _clipcatd completions/zsh/site-functions/_clipcatd
+
+ installShellCompletion --bash --name clipcatctl completions/bash-completion/completions/clipcatctl
+ installShellCompletion --fish --name clipcatctl.fish completions/fish/completions/clipcatctl.fish
+ installShellCompletion --zsh --name _clipcatctl completions/zsh/site-functions/_clipcatctl
+
+ installShellCompletion --bash --name clipcat-menu completions/bash-completion/completions/clipcat-menu
+ installShellCompletion --fish --name clipcat-menu.fish completions/fish/completions/clipcat-menu.fish
+ installShellCompletion --zsh --name _clipcat-menu completions/zsh/site-functions/_clipcat-menu
+
+ installShellCompletion --bash --name clipcat-notify completions/bash-completion/completions/clipcat-notify
+ installShellCompletion --fish --name clipcat-notify.fish completions/fish/completions/clipcat-notify.fish
+ installShellCompletion --zsh --name _clipcat-notify completions/zsh/site-functions/_clipcat-notify
+ '';
+
+ meta = with lib; {
+ description = "Clipboard Manager written in Rust Programming Language";
+ license = licenses.gpl3;
+ platforms = platforms.linux;
+ maintainers = with maintainers; [ xrelkd ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/applications/misc/dockbarx/default.nix b/third_party/nixpkgs/pkgs/applications/misc/dockbarx/default.nix
index 97510bc3b4..463f7db6b0 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/dockbarx/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/dockbarx/default.nix
@@ -30,7 +30,7 @@ pythonPackages.buildPythonApplication rec {
meta = with stdenv.lib; {
homepage = "https://launchpad.net/dockbar/";
- description = "DockBarX is a lightweight taskbar / panel replacement for Linux which works as a stand-alone dock";
+ description = "Lightweight taskbar / panel replacement for Linux which works as a stand-alone dock";
license = licenses.gpl3;
platforms = platforms.linux;
maintainers = [ maintainers.volth ];
diff --git a/third_party/nixpkgs/pkgs/applications/misc/dstask/default.nix b/third_party/nixpkgs/pkgs/applications/misc/dstask/default.nix
index c9b3e2dd89..0eeb0d9cab 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/dstask/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/dstask/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "dstask";
- version = "0.22";
+ version = "0.23";
src = fetchFromGitHub {
owner = "naggie";
repo = pname;
rev = "v${version}";
- sha256 = "0vwkar827ncwmva091q37gq8fvs9jz1765zdxrcvhczlj5a0qdgi";
+ sha256 = "15hr0ivwvm2lzpi8l5y5a3hya3i7r85pxna961m24gd4f8gs4cjl";
};
# Set vendorSha256 to null because dstask vendors its dependencies (meaning
diff --git a/third_party/nixpkgs/pkgs/applications/misc/dupeguru/default.nix b/third_party/nixpkgs/pkgs/applications/misc/dupeguru/default.nix
index 41bfdb3fc5..51e1b77096 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/dupeguru/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/dupeguru/default.nix
@@ -9,7 +9,7 @@ python3Packages.buildPythonApplication rec {
src = fetchFromGitHub {
owner = "arsenetar";
repo = "dupeguru";
- rev = "${version}";
+ rev = version;
sha256 = "0ma4f1c6vmpz8gi4sdy43x1ik7wh42wayvk1iq520d3i714kfcpy";
fetchSubmodules = true;
};
diff --git a/third_party/nixpkgs/pkgs/applications/misc/effitask/default.nix b/third_party/nixpkgs/pkgs/applications/misc/effitask/default.nix
index 4f3255551c..26008c133b 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/effitask/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/effitask/default.nix
@@ -13,8 +13,8 @@ rustPlatform.buildRustPackage rec {
src = fetchFromGitHub {
owner = "sanpii";
- repo = "${pname}";
- rev = "${version}";
+ repo = pname;
+ rev = version;
sha256 = "09bffxdp43s8b1rpmsgqr2kyz3i4jbd2yrwbxw21fj3sf3mwb9ig";
};
diff --git a/third_party/nixpkgs/pkgs/applications/misc/electron-cash/default.nix b/third_party/nixpkgs/pkgs/applications/misc/electron-cash/default.nix
index 12362823cc..fe263dd669 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/electron-cash/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/electron-cash/default.nix
@@ -3,13 +3,13 @@
python3Packages.buildPythonApplication rec {
pname = "electron-cash";
- version = "4.1.1";
+ version = "4.2.0";
src = fetchFromGitHub {
owner = "Electron-Cash";
repo = "Electron-Cash";
rev = version;
- sha256 = "1fllz2s20lg4hrppzmnlgjy9mrq7gaq66l2apb3vz1avzvsjw3gm";
+ sha256 = "0ixsx4224jilc5zis6wbsbxqxv10mm5sksrzq15xp30zz0bzb6md";
};
propagatedBuildInputs = with python3Packages; [
@@ -48,7 +48,7 @@ python3Packages.buildPythonApplication rec {
checkPhase = ''
unset HOME
- pytest lib/tests
+ pytest electroncash/tests
'';
postInstall = ''
diff --git a/third_party/nixpkgs/pkgs/applications/misc/electrum/ltc.nix b/third_party/nixpkgs/pkgs/applications/misc/electrum/ltc.nix
index 2c6fb39fa4..7d6480b469 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/electrum/ltc.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/electrum/ltc.nix
@@ -27,6 +27,8 @@ python3Packages.buildPythonApplication rec {
dnspython
jsonrpclib-pelix
pysocks
+ trezor
+ btchip
];
preBuild = ''
diff --git a/third_party/nixpkgs/pkgs/applications/misc/fetchmail/default.nix b/third_party/nixpkgs/pkgs/applications/misc/fetchmail/default.nix
index fab83b75e7..83d4103bc0 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/fetchmail/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/fetchmail/default.nix
@@ -1,7 +1,7 @@
{ stdenv, fetchurl, openssl }:
let
- version = "6.4.12";
+ version = "6.4.13";
in
stdenv.mkDerivation {
pname = "fetchmail";
@@ -9,7 +9,7 @@ stdenv.mkDerivation {
src = fetchurl {
url = "mirror://sourceforge/fetchmail/fetchmail-${version}.tar.xz";
- sha256 = "11s83af63gs9nnrjb66yq58xriyvi8hzj4ykxp3kws5z3nby111b";
+ sha256 = "1qablzgwx3a516vdhckx3pv716x9r7nyfyr6fbncif861c3cya3x";
};
buildInputs = [ openssl ];
diff --git a/third_party/nixpkgs/pkgs/applications/misc/fsv/default.nix b/third_party/nixpkgs/pkgs/applications/misc/fsv/default.nix
index 8b6898958d..ff556621f9 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/fsv/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/fsv/default.nix
@@ -20,7 +20,7 @@ in stdenv.mkDerivation rec {
version = "0.9-1";
src = fetchFromGitHub {
- owner = "mcuelenaere";
+ owner = "mcuelenaere";
repo = "fsv";
rev = "${pname}-${version}";
sha256 = "0n09jd7yqj18mx6zqbg7kab4idg5llr15g6avafj74fpg1h7iimj";
@@ -35,7 +35,7 @@ in stdenv.mkDerivation rec {
buildInputs = [ file gtk2 libGLU gtkglarea ];
meta = with stdenv.lib; {
- description = "fsv is a file system visualizer in cyberspace";
+ description = "File system visualizer in cyberspace";
longDescription = ''
fsv (pronounced eff-ess-vee) is a file system visualizer in cyberspace.
It lays out files and directories in three dimensions, geometrically
diff --git a/third_party/nixpkgs/pkgs/applications/misc/fuzzel/default.nix b/third_party/nixpkgs/pkgs/applications/misc/fuzzel/default.nix
index 717d4a3aab..337d68b4b2 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/fuzzel/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/fuzzel/default.nix
@@ -6,7 +6,7 @@ stdenv.mkDerivation rec {
src = fetchgit {
url = "https://codeberg.org/dnkl/fuzzel";
- rev = "${version}";
+ rev = version;
sha256 = "0c0p9spklzmy9f7abz3mvw0vp6zgnk3ns1i6ks95ljjb3kqy9vs2";
};
diff --git a/third_party/nixpkgs/pkgs/applications/misc/gallery-dl/default.nix b/third_party/nixpkgs/pkgs/applications/misc/gallery-dl/default.nix
index ffe7d4ec47..8135dce4d7 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/gallery-dl/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/gallery-dl/default.nix
@@ -2,11 +2,11 @@
python3Packages.buildPythonApplication rec {
pname = "gallery_dl";
- version = "1.15.1";
+ version = "1.15.2";
src = python3Packages.fetchPypi {
inherit pname version;
- sha256 = "1pysh0gz3f3dxk5bfkzaii4myrgik396mf6vlks50inpbnslmqsl";
+ sha256 = "0f2d1ixg0ir7ispxxggv378dc0m55k9y19075swf893maxf07f35";
};
propagatedBuildInputs = with python3Packages; [ requests ];
@@ -15,6 +15,7 @@ python3Packages.buildPythonApplication rec {
pytestFlagsArray = [
# requires network access
"--ignore=test/test_results.py"
+ "--ignore=test/test_downloader.py"
];
meta = {
diff --git a/third_party/nixpkgs/pkgs/applications/misc/geoipupdate/default.nix b/third_party/nixpkgs/pkgs/applications/misc/geoipupdate/default.nix
index ee6ed27ddd..1f2c275b13 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/geoipupdate/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/geoipupdate/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "geoipupdate";
- version = "4.3.0";
+ version = "4.5.0";
src = fetchFromGitHub {
owner = "maxmind";
repo = "geoipupdate";
rev = "v${version}";
- sha256 = "08h14bf4z2gx9sy34jpi2pvxv3i8g9ypl222hzdjsp2ixhl0jia9";
+ sha256 = "0lhz7i4lprsik3s41y19vphsyc29vz6cbxikmvkmy6xjn40khjfr";
};
- vendorSha256 = "0q4byhvs1c1xm4qjvs2vyf98vdv121qn0z51arcf7k4ayrys5xcx";
+ vendorSha256 = "1f858k8cl0dgiw124jv0p9jhi9aqxnc3nmc7hksw70fla2nzjrv0";
doCheck = false;
diff --git a/third_party/nixpkgs/pkgs/applications/misc/gphoto2/default.nix b/third_party/nixpkgs/pkgs/applications/misc/gphoto2/default.nix
index 1235a41ffc..cdfbe3f6dc 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/gphoto2/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/gphoto2/default.nix
@@ -3,11 +3,11 @@
}:
stdenv.mkDerivation rec {
- name = "gphoto2-2.5.23";
+ name = "gphoto2-2.5.26";
src = fetchurl {
url = "mirror://sourceforge/gphoto/${name}.tar.bz2";
- sha256 = "1laqwhxr0xhbykmp0dhd3j4rr2lhj5y228s31afnqxp700hhk1yz";
+ sha256 = "0bxbcn31xalsvjp8fra324hf2105y3ps7zlyfz11v71j0lxj2lvn";
};
nativeBuildInputs = [ pkgconfig gettext libtool ];
diff --git a/third_party/nixpkgs/pkgs/applications/misc/grsync/default.nix b/third_party/nixpkgs/pkgs/applications/misc/grsync/default.nix
index 8d17ff0920..e1c9902c6a 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/grsync/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/grsync/default.nix
@@ -23,7 +23,7 @@ stdenv.mkDerivation rec {
];
meta = with stdenv.lib; {
- description = "Grsync is used to synchronize folders, files and make backups";
+ description = "Synchronize folders, files and make backups";
homepage = "http://www.opbyte.it/grsync/";
license = licenses.gpl1;
platforms = platforms.linux;
diff --git a/third_party/nixpkgs/pkgs/applications/misc/hr/default.nix b/third_party/nixpkgs/pkgs/applications/misc/hr/default.nix
index 91a66bc737..a0555f9032 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/hr/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/hr/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "hr";
- version = "1.2";
+ version = "1.3";
src = fetchFromGitHub {
owner = "LuRsT";
repo = "hr";
rev = version;
- sha256 = "162vkip2772jl59lschpinimpg4ssiyg7fq0va5cx4d7wldpqmks";
+ sha256 = "068kq37lbqfjzh28rlvkprni38ii991naawylwvq6d43y9dpzs2b";
};
dontBuild = true;
diff --git a/third_party/nixpkgs/pkgs/applications/misc/hugo/default.nix b/third_party/nixpkgs/pkgs/applications/misc/hugo/default.nix
index 72ebefb98e..4b2a4c4645 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/hugo/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/hugo/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "hugo";
- version = "0.76.5";
+ version = "0.77.0";
src = fetchFromGitHub {
owner = "gohugoio";
repo = pname;
rev = "v${version}";
- sha256 = "0p7zz9cif1vihhs21nvh4n3y1p2cwpga59rilpam7yvza4nzx7ay";
+ sha256 = "1vjqddcbk8afqkjzrj9wwvz697bxhv9vz0rk2vj2ji6lz1slhc56";
};
- vendorSha256 = "0kiqy8n2df52gsgsbmr96rph8lpnw06g622123hlwk7kqg0z9ifh";
+ vendorSha256 = "03xv188jw5scqd6a8xd2s13vkn721d37bgs6a6rik7pgqmjh46c6";
doCheck = false;
diff --git a/third_party/nixpkgs/pkgs/applications/misc/icesl/default.nix b/third_party/nixpkgs/pkgs/applications/misc/icesl/default.nix
index edcc5a58ad..b3e7e53774 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/icesl/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/icesl/default.nix
@@ -30,7 +30,7 @@ stdenv.mkDerivation rec {
'';
meta = with lib; {
- description = "IceSL is a GPU-accelerated procedural modeler and slicer for 3D printing";
+ description = "GPU-accelerated procedural modeler and slicer for 3D printing";
homepage = "http://shapeforge.loria.fr/icesl/index.html";
license = licenses.inria-icesl;
platforms = [ "i686-linux" "x86_64-linux" ];
diff --git a/third_party/nixpkgs/pkgs/applications/misc/jotta-cli/default.nix b/third_party/nixpkgs/pkgs/applications/misc/jotta-cli/default.nix
index 70ca28b467..a924bd181c 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/jotta-cli/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/jotta-cli/default.nix
@@ -5,10 +5,10 @@ let
in
stdenv.mkDerivation rec {
pname = "jotta-cli";
- version = "0.6.24251";
+ version = "0.7.33634";
src = fetchzip {
url = "https://repo.jotta.us/archives/linux/${arch}/jotta-cli-${version}_linux_${arch}.tar.gz";
- sha256 = "0f26fg5fqpz0f6jxp72cj5f2kf76jah5iaqlqsl87250y0hm330g";
+ sha256 = "0apbdk4fvmn52w9qyh6hvpk3k0sa810jvvndpsbysnlmi7gv5w62";
stripRoot = false;
};
diff --git a/third_party/nixpkgs/pkgs/applications/misc/keepass-plugins/keepasshttp/default.nix b/third_party/nixpkgs/pkgs/applications/misc/keepass-plugins/keepasshttp/default.nix
index f9dbf14624..10e6996873 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/keepass-plugins/keepasshttp/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/keepass-plugins/keepasshttp/default.nix
@@ -8,7 +8,7 @@ let
src = fetchFromGitHub {
owner = "pfn";
repo = "keepasshttp";
- #rev = "${version}";
+ # rev = version;
# for 1.8.4.2 the tag is at the wrong commit (they fixed stuff
# afterwards and didn't move the tag), hence reference by commitid
rev = "c2c4eb5388a02169400cba7a67be325caabdcc37";
diff --git a/third_party/nixpkgs/pkgs/applications/misc/keepass/default.nix b/third_party/nixpkgs/pkgs/applications/misc/keepass/default.nix
index 23f80eaa9c..6164a60d6a 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/keepass/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/keepass/default.nix
@@ -3,11 +3,11 @@
with builtins; buildDotnetPackage rec {
baseName = "keepass";
- version = "2.45";
+ version = "2.46";
src = fetchurl {
url = "mirror://sourceforge/keepass/KeePass-${version}-Source.zip";
- sha256 = "07wyp3k2kiprr47mc4vxb7vmh7g5kshcqw0gq3qr87gi78c9i66m";
+ sha256 = "0zyclydgyg8nhwxrzw7x4f82975cqdmp12py33k6sballx6jhgiy";
};
sourceRoot = ".";
diff --git a/third_party/nixpkgs/pkgs/applications/misc/libosmocore/default.nix b/third_party/nixpkgs/pkgs/applications/misc/libosmocore/default.nix
index 2bd8bfa99b..8b36d384e1 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/libosmocore/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/libosmocore/default.nix
@@ -28,7 +28,7 @@ stdenv.mkDerivation rec {
enableParallelBuilding = true;
meta = with stdenv.lib; {
- description = "libosmocore";
+ description = "Set of Osmocom core libraries";
homepage = "https://github.com/osmocom/libosmocore";
license = licenses.gpl2Plus;
platforms = platforms.linux;
diff --git a/third_party/nixpkgs/pkgs/applications/misc/mapproxy/default.nix b/third_party/nixpkgs/pkgs/applications/misc/mapproxy/default.nix
index 5676aef236..41ae683548 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/mapproxy/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/mapproxy/default.nix
@@ -56,7 +56,7 @@ buildPythonApplication rec {
# https://github.com/NixOS/nixpkgs/pull/56480
doCheck = false;
meta = with lib; {
- description = "MapProxy is an open source proxy for geospatial data";
+ description = "Open source proxy for geospatial data";
homepage = "https://mapproxy.org/";
license = licenses.asl20;
maintainers = with maintainers; [ rakesh4g ];
diff --git a/third_party/nixpkgs/pkgs/applications/misc/minder/default.nix b/third_party/nixpkgs/pkgs/applications/misc/minder/default.nix
index 14b9ebfe4c..bf94ac4299 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/minder/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/minder/default.nix
@@ -8,13 +8,13 @@
stdenv.mkDerivation rec {
pname = "minder";
- version = "1.9.2";
+ version = "1.11.3";
src = fetchFromGitHub {
owner = "phase1geo";
repo = pname;
rev = version;
- sha256 = "0lhwwx515f0ycpinkhgbjnik7dj2c7fckikbgzwkzzs25xqp9ayj";
+ sha256 = "137kyf82n5a2v0cm9q02rhv8rmbjgnj60h64prq90h0d42prj3gd";
};
nativeBuildInputs = [ pkgconfig meson ninja python3 wrapGAppsHook vala shared-mime-info ];
diff --git a/third_party/nixpkgs/pkgs/applications/misc/obsidian/default.nix b/third_party/nixpkgs/pkgs/applications/misc/obsidian/default.nix
index 0f929439e4..8d6669917e 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/obsidian/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/obsidian/default.nix
@@ -65,7 +65,7 @@ in stdenv.mkDerivation rec {
meta = with lib; {
description =
- "Obsidian is a powerful knowledge base that works on top of a local folder of plain text Markdown files";
+ "A powerful knowledge base that works on top of a local folder of plain text Markdown files";
homepage = "https://obsidian.md";
license = licenses.obsidian;
maintainers = with maintainers; [ conradmearns zaninime ];
diff --git a/third_party/nixpkgs/pkgs/applications/misc/peaclock/default.nix b/third_party/nixpkgs/pkgs/applications/misc/peaclock/default.nix
new file mode 100644
index 0000000000..e824bbaf58
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/applications/misc/peaclock/default.nix
@@ -0,0 +1,24 @@
+{ stdenv, fetchFromGitHub, cmake, libpthreadstubs, icu }:
+
+stdenv.mkDerivation rec {
+ pname = "peaclock";
+ version = "0.4.3";
+
+ src = fetchFromGitHub {
+ owner = "octobanana";
+ repo = pname;
+ rev = version;
+ sha256 = "1582vgslhpgbvcd7ipgf1d1razrvgpq1f93q069yr2bbk6xn8i16";
+ };
+
+ nativeBuildInputs = [ cmake ];
+ buildInputs = [ libpthreadstubs icu ];
+
+ meta = with stdenv.lib; {
+ description = "A clock, timer, and stopwatch for the terminal";
+ homepage = "https://octobanana.com/software/peaclock";
+ license = licenses.mit;
+ platforms = platforms.unix;
+ maintainers = with maintainers; [ djanatyn ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/applications/misc/prusa-slicer/super-slicer.nix b/third_party/nixpkgs/pkgs/applications/misc/prusa-slicer/super-slicer.nix
index 1e8f9fc995..2bc59e855a 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/prusa-slicer/super-slicer.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/prusa-slicer/super-slicer.nix
@@ -3,7 +3,7 @@
}:
let
appname = "SuperSlicer";
- version = "2.2.54.1";
+ version = "2.2.54.2";
pname = "super-slicer";
description = "PrusaSlicer fork with more features and faster development cycle";
override = super: {
@@ -12,7 +12,7 @@ let
src = fetchFromGitHub {
owner = "supermerill";
repo = "SuperSlicer";
- sha256 = "sha256-0NWrck9nqAlc8xX3nTrRlnzjso4MRRjJSW7bUvCX6Y4=";
+ sha256 = "sha256-ThmsxFXI1uReK+JwpHrIWzHpBdIOP77kDjv+QaK+Azk=";
rev = version;
};
diff --git a/third_party/nixpkgs/pkgs/applications/misc/pwsafe/default.nix b/third_party/nixpkgs/pkgs/applications/misc/pwsafe/default.nix
index 26bc6cc0a0..91f23f662a 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/pwsafe/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/pwsafe/default.nix
@@ -11,7 +11,7 @@ stdenv.mkDerivation rec {
src = fetchFromGitHub {
owner = pname;
repo = pname;
- rev = "${version}";
+ rev = version;
sha256 = "0nh5jnf5yls2qv5hpfhm6i854zsknyh7d93c987a0cg14sg820fv";
};
diff --git a/third_party/nixpkgs/pkgs/applications/misc/rsibreak/default.nix b/third_party/nixpkgs/pkgs/applications/misc/rsibreak/default.nix
index 432cbfb9b6..9f765793dc 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/rsibreak/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/rsibreak/default.nix
@@ -20,7 +20,7 @@ in mkDerivation rec {
propagatedBuildInputs = [ knotifyconfig kidletime kwindowsystem ktextwidgets kcrash ];
meta = with lib; {
- description = "RSIBreak takes care of your health and regularly breaks your work to avoid repetitive strain injury (RSI)";
+ description = "Takes care of your health and regularly breaks your work to avoid repetitive strain injury (RSI)";
license = licenses.gpl2;
homepage = "https://www.kde.org/applications/utilities/rsibreak/";
maintainers = with maintainers; [ vandenoever ];
diff --git a/third_party/nixpkgs/pkgs/applications/misc/sakura/default.nix b/third_party/nixpkgs/pkgs/applications/misc/sakura/default.nix
deleted file mode 100644
index 89a4cf25b8..0000000000
--- a/third_party/nixpkgs/pkgs/applications/misc/sakura/default.nix
+++ /dev/null
@@ -1,36 +0,0 @@
-{ stdenv, fetchurl, cmake, pkgconfig, gtk3, perl, vte, pcre2, glib , makeWrapper }:
-
-stdenv.mkDerivation rec {
- pname = "sakura";
- version = "3.7.0";
-
- src = fetchurl {
- url = "https://launchpad.net/sakura/trunk/${version}/+download/${pname}-${version}.tar.gz";
- sha256 = "15gskj5yv5qs3cj4ps43735kfx2nzjlhq4dk9ghirl8lvhhxsm5m";
- };
-
- nativeBuildInputs = [ cmake perl pkgconfig ];
-
- buildInputs = [ makeWrapper gtk3 vte pcre2 glib ];
-
- # Wrapper sets path to gsettings-schemata so sakura knows where to find colorchooser, fontchooser ...
- postInstall = "wrapProgram $out/bin/sakura --suffix XDG_DATA_DIRS : ${gtk3}/share/gsettings-schemas/${gtk3.name}/";
-
- meta = with stdenv.lib; {
- description = "A terminal emulator based on GTK and VTE";
- homepage = "https://www.pleyades.net/david/projects/sakura";
- license = licenses.gpl2;
- maintainers = with maintainers; [ astsmtl codyopel ];
- platforms = platforms.linux;
- longDescription = ''
- sakura is a terminal emulator based on GTK and VTE. It's a terminal
- emulator with few dependencies, so you don't need a full GNOME desktop
- installed to have a decent terminal emulator. Current terminal emulators
- based on VTE are gnome-terminal, XFCE Terminal, TermIt and a small
- sample program included in the vte sources. The differences between
- sakura and the last one are that it uses a notebook to provide several
- terminals in one window and adds a contextual menu with some basic
- options. No more no less.
- '';
- };
-}
diff --git a/third_party/nixpkgs/pkgs/applications/misc/solaar/default.nix b/third_party/nixpkgs/pkgs/applications/misc/solaar/default.nix
index 83a7e9d621..f92fe87b94 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/solaar/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/solaar/default.nix
@@ -7,7 +7,7 @@ python3Packages.buildPythonApplication rec {
src = fetchFromGitHub {
owner = "pwr-Solaar";
repo = "Solaar";
- rev = "${version}";
+ rev = version;
sha256 = "0k5z9dap6rawiafkg1x7zjx51ala7wra6j6lvc2nn0y8r79yp7a9";
};
diff --git a/third_party/nixpkgs/pkgs/applications/misc/ssw/default.nix b/third_party/nixpkgs/pkgs/applications/misc/ssw/default.nix
index 24b7953fe3..7e1e402581 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/ssw/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/ssw/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "ssw";
- version = "0.3";
+ version = "0.6";
src = fetchurl {
url = "https://alpha.gnu.org/gnu/ssw/spread-sheet-widget-${version}.tar.gz";
- sha256 = "1h93yyh2by6yrmkwqg38nd5knids05k5nqzcihc1hdwgzg3c4b8y";
+ sha256 = "08ck9l697xg8vpya5h07raq837i4pqxjqzx30vhscq4xpps2b8kj";
};
nativeBuildInputs = [ pkg-config ];
diff --git a/third_party/nixpkgs/pkgs/applications/misc/syncthingtray/default.nix b/third_party/nixpkgs/pkgs/applications/misc/syncthingtray/default.nix
index c45ea27c42..bb4b3ac90c 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/syncthingtray/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/syncthingtray/default.nix
@@ -20,14 +20,14 @@
}:
mkDerivation rec {
- version = "0.11.0";
+ version = "1.0.0";
pname = "syncthingtray";
src = fetchFromGitHub {
owner = "Martchus";
repo = "syncthingtray";
rev = "v${version}";
- sha256 = "1lpjrij6y8l738hd7bfig0piglqinnqbadidzw9k0nm53bh4pqrr";
+ sha256 = "sha256-mB23UOUrOfEmbFfVsAXyi3iod0NAfp/sl7Gkklqfmbo=";
};
buildInputs = [ qtbase cpp-utilities qtutilities ]
diff --git a/third_party/nixpkgs/pkgs/applications/misc/teleprompter/default.nix b/third_party/nixpkgs/pkgs/applications/misc/teleprompter/default.nix
index 37b3f10329..96265356ea 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/teleprompter/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/teleprompter/default.nix
@@ -1,15 +1,15 @@
-{ lib, stdenv, fetchurl, electron_4, makeDesktopItem, makeWrapper, nodePackages, autoPatchelfHook}:
+{ lib, stdenv, fetchurl, electron_10, makeDesktopItem, makeWrapper, nodePackages, autoPatchelfHook}:
let
- electron = electron_4;
+ electron = electron_10;
in
stdenv.mkDerivation rec {
pname = "teleprompter";
- version = "2.3.4";
+ version = "2.4.0";
src = fetchurl {
- url = "mirror://sourceforge/teleprompter-imaginary-films/imaginary-${pname}-${version}-64bit.tar.gz";
- sha256 = "084ml2l3qg46bsazaapyxdx4zavvxp0j4ycsdpdwk3f94g9xb120";
+ url = "https://github.com/ImaginarySense/Imaginary-Teleprompter-Electron/releases/download/${lib.versions.majorMinor version}/imaginary-teleprompter-${version}.tar.gz";
+ sha256 = "bgdtK8l5d26avv1WUw9cfOgZrIL1q/a9890Ams4yidQ=";
};
dontBuild = true;
@@ -36,7 +36,7 @@ stdenv.mkDerivation rec {
meta = with lib; {
description = "The most complete, free, teleprompter app on the web";
- license = [ licenses.gpl3 ];
+ license = [ licenses.gpl3Plus ];
homepage = "https://github.com/ImaginarySense/Teleprompter-Core";
platforms = platforms.linux;
maintainers = with maintainers; [ Scriptkiddi ];
diff --git a/third_party/nixpkgs/pkgs/applications/misc/tellico/default.nix b/third_party/nixpkgs/pkgs/applications/misc/tellico/default.nix
index 6425be0041..fa725ad9c9 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/tellico/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/tellico/default.nix
@@ -1,7 +1,7 @@
{ lib
, fetchurl
, mkDerivation
-, kdeApplications
+, libkcddb
, kinit
, kdelibs4support
, solid
@@ -46,7 +46,7 @@ mkDerivation rec {
exempi
extra-cmake-modules
karchive
- kdeApplications.libkcddb
+ libkcddb
kdelibs4support
kfilemetadata
khtml
diff --git a/third_party/nixpkgs/pkgs/applications/misc/xmenu/default.nix b/third_party/nixpkgs/pkgs/applications/misc/xmenu/default.nix
index 0904d1d048..ecbb205c98 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/xmenu/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/misc/xmenu/default.nix
@@ -16,7 +16,7 @@ stdenv.mkDerivation rec {
postPatch = "sed -i \"s:/usr/local:$out:\" config.mk";
meta = with stdenv.lib; {
- description = "XMenu is a menu utility for X";
+ description = "A menu utility for X";
homepage = "https://github.com/phillbush/xmenu";
license = licenses.publicDomain;
maintainers = with maintainers; [ neonfuz ];
diff --git a/third_party/nixpkgs/pkgs/applications/networking/browsers/chromium/default.nix b/third_party/nixpkgs/pkgs/applications/networking/browsers/chromium/default.nix
index 43e4717f82..f83cb1d209 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/browsers/chromium/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/browsers/chromium/default.nix
@@ -14,7 +14,6 @@
, proprietaryCodecs ? true
, enablePepperFlash ? false
, enableWideVine ? false
-, useVaapi ? false # Deprecated, use enableVaapi instead!
, enableVaapi ? false # Disabled by default due to unofficial support
, useOzone ? false
, cupsSupport ? true
@@ -148,13 +147,6 @@ let
''
else browser;
- optionalVaapiFlags = if useVaapi # TODO: Remove after 20.09:
- then throw ''
- Chromium's useVaapi was replaced by enableVaapi and you don't need to pass
- "--ignore-gpu-blacklist" anymore (also no rebuilds are required anymore).
- '' else lib.optionalString
- (enableVaapi)
- "--add-flags --enable-accelerated-video-decode";
in stdenv.mkDerivation {
name = "chromium${suffix}-${version}";
inherit version;
@@ -181,7 +173,7 @@ in stdenv.mkDerivation {
eval makeWrapper "${browserBinary}" "$out/bin/chromium" \
--add-flags ${escapeShellArg (escapeShellArg commandLineArgs)} \
- ${optionalVaapiFlags} \
+ ${lib.optionalString enableVaapi "--add-flags --enable-accelerated-video-decode"} \
${concatMapStringsSep " " getWrapperFlags chromium.plugins.enabled}
ed -v -s "$out/bin/chromium" << EOF
diff --git a/third_party/nixpkgs/pkgs/applications/networking/browsers/firefox-bin/release_sources.nix b/third_party/nixpkgs/pkgs/applications/networking/browsers/firefox-bin/release_sources.nix
index 0ae220a75f..a69f288be5 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/browsers/firefox-bin/release_sources.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/browsers/firefox-bin/release_sources.nix
@@ -1,965 +1,965 @@
{
- version = "82.0";
+ version = "82.0.2";
sources = [
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/ach/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/ach/firefox-82.0.2.tar.bz2";
locale = "ach";
arch = "linux-x86_64";
- sha256 = "beebf265e84b2bd961dcedaf82ed0cb6b89ef9ea37a0ec7ce1e6abfb78c44b23";
+ sha256 = "7850a7cdf7f842d8ebac2d7d24f0823b1743b7fe139987554bc3f54af47c31f9";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/af/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/af/firefox-82.0.2.tar.bz2";
locale = "af";
arch = "linux-x86_64";
- sha256 = "c58bc5dab361ccc70a94268e1dcb444524145ab9f53a6aa3b186dd806ac111bf";
+ sha256 = "c43b0e976a553840da783139ecf2c8a59823da6a31a1d3b5588c496c270260e6";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/an/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/an/firefox-82.0.2.tar.bz2";
locale = "an";
arch = "linux-x86_64";
- sha256 = "75092675363111128ab808211747276c2cadae6a4ea5c8b28807acebb73cf733";
+ sha256 = "4f9103c6043e2fa7ceb0021e09e8616a4e4484d19641e6fc67cde0b60136d8aa";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/ar/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/ar/firefox-82.0.2.tar.bz2";
locale = "ar";
arch = "linux-x86_64";
- sha256 = "52adca504f18d6adfb02f346622a5b2b7e417cd6f243c566b79a01014efca53f";
+ sha256 = "7f8bddc573ca33cd48b6e29709c80d8dd617a46f1435303fa0931ecc413b69e2";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/ast/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/ast/firefox-82.0.2.tar.bz2";
locale = "ast";
arch = "linux-x86_64";
- sha256 = "fa4133422e8d1969c111e7d066f51710f3b53b7e5e3a88de5dd84b8e6faaea89";
+ sha256 = "d0bac8231fd4e9e777754378ff5b2e697379666b682c512d4d4d17a3bd82ad10";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/az/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/az/firefox-82.0.2.tar.bz2";
locale = "az";
arch = "linux-x86_64";
- sha256 = "0adc103451ac0d6671f62f3e1940d8d1fb5a6ed2544d015de9a02d75ffaca02c";
+ sha256 = "3d0a5facfdce39e798ef72d22e737860327a669f1752deee7192877a2635ce97";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/be/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/be/firefox-82.0.2.tar.bz2";
locale = "be";
arch = "linux-x86_64";
- sha256 = "df27f72cc733bac439ed3dba89443286dfb2ca3af4efa33db161964c84293223";
+ sha256 = "70606a5e490c3a0dcd1bf9b291c5d16525e044eca667166abbf1d75b58f3922b";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/bg/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/bg/firefox-82.0.2.tar.bz2";
locale = "bg";
arch = "linux-x86_64";
- sha256 = "34190a84296246c3aa159067a9d575be628963c5c2e193512b8754524fa94503";
+ sha256 = "501ba77092a68b32ba6048360f8695f52756593241f4a8d210a072260792cde2";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/bn/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/bn/firefox-82.0.2.tar.bz2";
locale = "bn";
arch = "linux-x86_64";
- sha256 = "5eadf29b34dad12f373e675d349f093562b7e38a817f7faa76fcad273ababe2d";
+ sha256 = "f465d794e887b6867bae0e9f768e468876ae7f31a78e91725ccc8f7d965ebfd2";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/br/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/br/firefox-82.0.2.tar.bz2";
locale = "br";
arch = "linux-x86_64";
- sha256 = "53c6f9a4c5185ebf62c087dbe78163dcd46fe8bd3bf764a133a37116dbdf96a0";
+ sha256 = "977beb4edf63e823087ce9e62ebb1c1d122991de4a350cfcfc93427b3f381608";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/bs/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/bs/firefox-82.0.2.tar.bz2";
locale = "bs";
arch = "linux-x86_64";
- sha256 = "260419497fa79e176558f0a5ee43e1bf717ec4782742969bbaaea39cba04c908";
+ sha256 = "3951d25f3f1eeadde330e0a68fd581595fa56fc5e98bb4baa3fa707879377674";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/ca-valencia/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/ca-valencia/firefox-82.0.2.tar.bz2";
locale = "ca-valencia";
arch = "linux-x86_64";
- sha256 = "b2de05d651de2096559b9c40c75212baeff759632aabe70fa9c82283b5ae02d2";
+ sha256 = "466fe1080eac737ed87cd83580f585fe5e685090b0d5b6a4c2c5a01ca33175bc";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/ca/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/ca/firefox-82.0.2.tar.bz2";
locale = "ca";
arch = "linux-x86_64";
- sha256 = "bb3ce2ca6c6d536bdabab8ad549623aaf287a6b7dc708a7888961d8aa72271a1";
+ sha256 = "6e13af5bdbbe50b8101e60a15d22f9f561d1846e67689a23a933f6fffa73b9ce";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/cak/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/cak/firefox-82.0.2.tar.bz2";
locale = "cak";
arch = "linux-x86_64";
- sha256 = "8c918ef50f2e1db8e5e51420e6dcf6fad0a4f3f4e7054b9f3292a98ee804cfe9";
+ sha256 = "a96ca82a2723e90595b76279b3b2a902cf4f121afa448784bf684cf26c514c8c";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/cs/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/cs/firefox-82.0.2.tar.bz2";
locale = "cs";
arch = "linux-x86_64";
- sha256 = "b8a4557ce44275e471e028c7fdac7259914cea670116991dfffb3a85fd111149";
+ sha256 = "bfeac431918060b210d35ac74e7333b0c0f851435275c81f2ae76af34e3a05e8";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/cy/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/cy/firefox-82.0.2.tar.bz2";
locale = "cy";
arch = "linux-x86_64";
- sha256 = "45f3438b6218655c26ef846923af9860b5957f0cd1f3f0407a2aa80c20b54519";
+ sha256 = "7f81dd91072ff34551394ef969c62baae625c648f5d880f5754862855f71dc74";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/da/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/da/firefox-82.0.2.tar.bz2";
locale = "da";
arch = "linux-x86_64";
- sha256 = "d015f6abed9728bdf06b922ba9edae3272950dc795cef120179ed21ed633b136";
+ sha256 = "b21dcd0ecd9f0010852a143a38d5d0a77dc9240a49d959b00f101491d3a01e10";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/de/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/de/firefox-82.0.2.tar.bz2";
locale = "de";
arch = "linux-x86_64";
- sha256 = "29748fa89f1b0995f23cddec986379c9ddd89fc158d56591288eedd3345e52ef";
+ sha256 = "56429f714fc1bb06efded1c601741ba3cc98788ed54ae345518328f9dcdf7f5d";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/dsb/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/dsb/firefox-82.0.2.tar.bz2";
locale = "dsb";
arch = "linux-x86_64";
- sha256 = "cae1494636a96530e01c58d8a8914c2f2866eee16f96356dc89dd4cf98b67fe6";
+ sha256 = "bafc42263929851718a7cf38163aa3c020b0631b0a0e5ce8fe238849f7cd76e2";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/el/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/el/firefox-82.0.2.tar.bz2";
locale = "el";
arch = "linux-x86_64";
- sha256 = "28b09aed5ae0f9d7454d4e43955675535b7bcaf6a79d157aec1f3dc3fd6b922f";
+ sha256 = "e1e8bb8cf866ea69465250a3f760a3cf9e9b06fe15ad03737c6739da5a5df2be";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/en-CA/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/en-CA/firefox-82.0.2.tar.bz2";
locale = "en-CA";
arch = "linux-x86_64";
- sha256 = "d9fd41938262b2b43f91898b6509e11095ff851e249f066de4728d1c53edc1e2";
+ sha256 = "f3a252002ceae09c56334010167861abb84840466c939fc87f0ce39aa1537566";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/en-GB/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/en-GB/firefox-82.0.2.tar.bz2";
locale = "en-GB";
arch = "linux-x86_64";
- sha256 = "45385629837dca1afd1d9e6cf24aa3a656c180350e86740a47896cea612af934";
+ sha256 = "2f384fdadb06254d12aa1c39b7cff6c26be4b7617d0b845a0efef2c92515cbf0";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/en-US/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/en-US/firefox-82.0.2.tar.bz2";
locale = "en-US";
arch = "linux-x86_64";
- sha256 = "4305f43e72aa46ae42882eaa4e436b22c5142a4c9b2dc9f9ccc3292e18a5e39a";
+ sha256 = "d95758297ac2db1a050e6431b637855c4a58222db7d9014c3a8322448083a4d2";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/eo/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/eo/firefox-82.0.2.tar.bz2";
locale = "eo";
arch = "linux-x86_64";
- sha256 = "a7a9c9b927b590e6140967dc8988e63534bcecd68cbed7262af77826d4dcb65f";
+ sha256 = "0591aa9225572cdce7036eff924dd3337b85625bdeb6d59aacdc7a06c5af1f71";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/es-AR/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/es-AR/firefox-82.0.2.tar.bz2";
locale = "es-AR";
arch = "linux-x86_64";
- sha256 = "e675a8d221812e8642f4d67449df2fed72412197c997acda804fa11aa3032ab6";
+ sha256 = "455b211bf85363089721803255829e4e7891cb43b2b6f35f85bf8a7242c360b3";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/es-CL/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/es-CL/firefox-82.0.2.tar.bz2";
locale = "es-CL";
arch = "linux-x86_64";
- sha256 = "63968f8e55e9bc24ef220546aaff53a6a2ee93f395e4af4543515fddfbb8d175";
+ sha256 = "b5d22bbd082eb5b6df2ab8002b465f64afdfb2c06b352a90c72e491aeab81336";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/es-ES/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/es-ES/firefox-82.0.2.tar.bz2";
locale = "es-ES";
arch = "linux-x86_64";
- sha256 = "fbc9948bf2e18ec24e1989592b755050177fc2e505610dfff23d775cbc8c394b";
+ sha256 = "678c9ecf360ad9231f31a8f761a48e793b6438b598d200619e5fd54a3296e1d5";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/es-MX/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/es-MX/firefox-82.0.2.tar.bz2";
locale = "es-MX";
arch = "linux-x86_64";
- sha256 = "e30cd73dafda4e54a27f6201738ed355fee2c4b7672765362d2d37dfd3aaf316";
+ sha256 = "daf28e88dacd3202c759caec279244aa9bf418420df9ea11896658e53c966061";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/et/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/et/firefox-82.0.2.tar.bz2";
locale = "et";
arch = "linux-x86_64";
- sha256 = "39b2575e2e8b6799b3d646c357aa119cefbcaaa0f8645437a1e5b9ced78d154b";
+ sha256 = "c42572576da4d6fd4cfbe5cc518b2c7dc68353141f952eaeadbd9b8679b98d95";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/eu/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/eu/firefox-82.0.2.tar.bz2";
locale = "eu";
arch = "linux-x86_64";
- sha256 = "b68837bea81a4018eb298ed2ea567f5367165a83e3233064c49b4d77bae30500";
+ sha256 = "5945c782ae8d23473ec1d4682d7fc5a0c524e494393e96c98e3202061fa6551a";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/fa/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/fa/firefox-82.0.2.tar.bz2";
locale = "fa";
arch = "linux-x86_64";
- sha256 = "28edeeef1bee9b87e7aad6fa76b10bb83eafd90933487389aa7e1c3ca268bb0c";
+ sha256 = "8b5f607d7726333fa9f012d5d9e74170350e205717f7ad0bd7aceec60620ab16";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/ff/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/ff/firefox-82.0.2.tar.bz2";
locale = "ff";
arch = "linux-x86_64";
- sha256 = "21651607d2b7555996292e31a9fb0245c44e557333eb16c4b8c63f895872e9a8";
+ sha256 = "996f0efe4c3eab9152a254077a53e994888fb20345302ed1718f8edba67a9bf0";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/fi/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/fi/firefox-82.0.2.tar.bz2";
locale = "fi";
arch = "linux-x86_64";
- sha256 = "2138da6e55db8fc9e90736b81fd0aec3f81a8b3882eb7aa78d816afd303f423e";
+ sha256 = "2830c7775e54f3adbda827b5fae13fdde7fb4b3c8b37644273a88da33db78f2a";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/fr/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/fr/firefox-82.0.2.tar.bz2";
locale = "fr";
arch = "linux-x86_64";
- sha256 = "ea18177416ca979820721b44cfc735ce7a47a6cdd0480d2f72c5b72dac559967";
+ sha256 = "bec556a28a30c478e36c3ea1463950039458d1a7442bd7a9807f31cc4ca003fb";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/fy-NL/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/fy-NL/firefox-82.0.2.tar.bz2";
locale = "fy-NL";
arch = "linux-x86_64";
- sha256 = "152f3f1cebd0d6b94348bdbab74676faa605155c2020c32aca26c8ef2004dea2";
+ sha256 = "b549eb7900d15f8606face90c521aac596230b25705f7dc459c039e8ef559698";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/ga-IE/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/ga-IE/firefox-82.0.2.tar.bz2";
locale = "ga-IE";
arch = "linux-x86_64";
- sha256 = "9e125c8c28854bd8ba25088b5b3b9b5aca3370dbb385200efe09c2d747cb78c5";
+ sha256 = "5a69d9bd67dbae5e8659bf3980d373c485bc67d5719c3b37948d2054f92ecdfe";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/gd/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/gd/firefox-82.0.2.tar.bz2";
locale = "gd";
arch = "linux-x86_64";
- sha256 = "3568f741bc94e1c600158fc37d699d2b3f72ea5b8dc78c804e734dbd0c8ebd06";
+ sha256 = "6d76b0659f3d0b0793cbc963dfbd6d20c7c91aa46aec1ab9cf9192d003eda3dc";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/gl/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/gl/firefox-82.0.2.tar.bz2";
locale = "gl";
arch = "linux-x86_64";
- sha256 = "f3b1437772a66728f999ed0827e6cd14f13b08773bab21aa530e04212867c6bc";
+ sha256 = "4cdfa36bd0d880135ff959a04eed53b958684253f99469c45aea39cb4a25d1ec";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/gn/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/gn/firefox-82.0.2.tar.bz2";
locale = "gn";
arch = "linux-x86_64";
- sha256 = "08b6c72f58d47e2442b6bd72c20025d2c23e9a4899a359ab48382e0088b68ac2";
+ sha256 = "3cd0ffe9756155181cf68d2fdbc858a93be41104cfbac408adc98b72bcbb215d";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/gu-IN/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/gu-IN/firefox-82.0.2.tar.bz2";
locale = "gu-IN";
arch = "linux-x86_64";
- sha256 = "cf8d0967d9b16bdb8b0ed4ab0f572187003e861fe544b4d258a8b757c68733c8";
+ sha256 = "083ee03240b7b1f4238a464844bfad31334a21a8dd025f1d12a252c2cca1049a";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/he/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/he/firefox-82.0.2.tar.bz2";
locale = "he";
arch = "linux-x86_64";
- sha256 = "42698b6833f395124fdd85307985827574a779ca00b71b4d9713e6f1348e93f3";
+ sha256 = "36f8951cb387fb733d689ff2a77b563e8315f76b434c283867aaedc264b227c5";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/hi-IN/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/hi-IN/firefox-82.0.2.tar.bz2";
locale = "hi-IN";
arch = "linux-x86_64";
- sha256 = "141c53b0ac4c9d14c3a8579be7dff6a194fa3926a388387fdf0fa82ae94ddf78";
+ sha256 = "6d041154437f97a0dc4b3ec3125f2cbebc10dd2089ed0f98df1c1a6a85b7a536";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/hr/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/hr/firefox-82.0.2.tar.bz2";
locale = "hr";
arch = "linux-x86_64";
- sha256 = "1159742531dc262a764a3bcaba7c15d4384846adc2df25b367dd3709dff3e2bc";
+ sha256 = "4c5b7921cba2d915240d6d9b0bf515f9299827e75a84eb089626561cc9042db3";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/hsb/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/hsb/firefox-82.0.2.tar.bz2";
locale = "hsb";
arch = "linux-x86_64";
- sha256 = "c412cb345c588af3f7d462bef0f28e9d47550eb341f667b21ddcd9de3970dbec";
+ sha256 = "4123ec9fda1e94d4433107999905d7cca0dc2b6cfa5c5c78d3a1d29983a5960b";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/hu/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/hu/firefox-82.0.2.tar.bz2";
locale = "hu";
arch = "linux-x86_64";
- sha256 = "1fa586fa875235e397479ec1a4f25e25a3b5abbec5ba524ce90caabd9c1d8b4b";
+ sha256 = "4c0afb928ad0b87a3efb26f09da8c5ef1ac415e14ac47b30463663ddb1955376";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/hy-AM/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/hy-AM/firefox-82.0.2.tar.bz2";
locale = "hy-AM";
arch = "linux-x86_64";
- sha256 = "f50e5258073bfe6f72918853e15c083c64f427aa858ca04a35d4b230ca496da0";
+ sha256 = "a2676e1450d88ab97b41cb4ee012da2a6240b739eca68e53d9607bbe0f7a313b";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/ia/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/ia/firefox-82.0.2.tar.bz2";
locale = "ia";
arch = "linux-x86_64";
- sha256 = "523a8c9d5b76efbf7b9525cb83a1ddb3f3b096ce442815a0fec632550a0d848f";
+ sha256 = "8494561d37a9d41d0c8683e793419d51ba3780b8229fe98a819ce675f8dc6aa3";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/id/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/id/firefox-82.0.2.tar.bz2";
locale = "id";
arch = "linux-x86_64";
- sha256 = "394966ef0c7d5d203f37cc41fd2bdbd3569921c17b6b0baeef2c93386f50409a";
+ sha256 = "3bbc1f1acba6fe029ef1a526e3e16f6000cac1ff226be21850e9e52348b5fe49";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/is/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/is/firefox-82.0.2.tar.bz2";
locale = "is";
arch = "linux-x86_64";
- sha256 = "8dccf799cdc1af733382d9a9f96f3dd4d774a8e481a0a465af788b646c964d81";
+ sha256 = "16fa5428d2a467bbe458c82544a3859386cfd8051de266d7af5656430a408535";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/it/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/it/firefox-82.0.2.tar.bz2";
locale = "it";
arch = "linux-x86_64";
- sha256 = "bd9cfba5a4006b8ab1b1c7fb75ea54d92c3e8f88fb33ea203655486c31d40078";
+ sha256 = "5b891f5a9bd4362c6b00cbcd846d724926f2862887c3db2d6fa55f968c7e0d3f";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/ja/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/ja/firefox-82.0.2.tar.bz2";
locale = "ja";
arch = "linux-x86_64";
- sha256 = "c2f4b1361bef84be0b4409147617f701cfe19741ce7d1b70ffff292ab4b4394b";
+ sha256 = "a3469c0b8fa55dd271768ddd491ddf1730d732d9abd697dbf779fa820f4b6d4b";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/ka/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/ka/firefox-82.0.2.tar.bz2";
locale = "ka";
arch = "linux-x86_64";
- sha256 = "956eea50eb32e150c95a1fad99ee4f9fa05d80919612ac7c276af7d830612594";
+ sha256 = "8115d086a7330139f03a25209384651209b0e998a3b754ba1f79f26beddd28ce";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/kab/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/kab/firefox-82.0.2.tar.bz2";
locale = "kab";
arch = "linux-x86_64";
- sha256 = "7d4b30c299083d0fc3b3c0f2efd9bee1d3bd05ca29b3b291de05816304b54e20";
+ sha256 = "c2a7cf201875831fad0eec3b558a4be41c847279f7a66fb8e1006084a385c5d8";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/kk/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/kk/firefox-82.0.2.tar.bz2";
locale = "kk";
arch = "linux-x86_64";
- sha256 = "8c781741557932663a68f0d3d52e1e5f1fd2a25617645ff8aca986c1ba638bb2";
+ sha256 = "33aecd099402158a1fd6dc47ccdddc1476f21e31a1f25c6cd8518226de7f5d23";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/km/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/km/firefox-82.0.2.tar.bz2";
locale = "km";
arch = "linux-x86_64";
- sha256 = "60e71694edf19046a2c0ac474daa40157d3ff9a974c9924b5278ba889e680c18";
+ sha256 = "060686475df4e47104229d02d42760e5762fc1a9d8d785a8116670a24b7cb897";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/kn/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/kn/firefox-82.0.2.tar.bz2";
locale = "kn";
arch = "linux-x86_64";
- sha256 = "2beabb264e3247a35e16a08d428799a62f9d50297e3824f31eb8f5341f85319a";
+ sha256 = "3b86716fd6da73f439593a3915d24710176d9be1aa3d19313c2554962e55dc51";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/ko/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/ko/firefox-82.0.2.tar.bz2";
locale = "ko";
arch = "linux-x86_64";
- sha256 = "d3bc2f79ee0e2a15a56d9c2a29d78daa1ba28abbd2fd7a2eb7f4a8810bdc61bb";
+ sha256 = "5fd1b0b428c57886552aabdaea3f691227f40cc19d18f851a2c880b1a1c8141f";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/lij/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/lij/firefox-82.0.2.tar.bz2";
locale = "lij";
arch = "linux-x86_64";
- sha256 = "4d723edcb08c066d4ff5eae520ad27aea85e6287bc37e656a7ccdf3f09d0722b";
+ sha256 = "227f8dfd5b861f9e8edf1037c8f374dcae3aceefc61effab0e51907603fc21d8";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/lt/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/lt/firefox-82.0.2.tar.bz2";
locale = "lt";
arch = "linux-x86_64";
- sha256 = "56282e57b79c0ed78fe839b4c5d444d6c8ccec001b3f16bd566ec8c2f9f0520c";
+ sha256 = "9ef7177b9fa3965a394dde8a39503fd8975829faca86e281d046f8fed50bdf27";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/lv/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/lv/firefox-82.0.2.tar.bz2";
locale = "lv";
arch = "linux-x86_64";
- sha256 = "6748371e3a52387dfde06d1a623528a117a686b7252199a63dc166348a0f219b";
+ sha256 = "ac98c34657aca401de5943724a7f8607d1370b78f80c211547010911a11be498";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/mk/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/mk/firefox-82.0.2.tar.bz2";
locale = "mk";
arch = "linux-x86_64";
- sha256 = "eaa8fde559b53b533d0b7275b5b79fba9cb42d31118a281f1b7fe17cc0f0e3c7";
+ sha256 = "457fd0ccb4d43e99f39c89db76dc5d4cd79c560a578d1ff3229cd1d49493356d";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/mr/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/mr/firefox-82.0.2.tar.bz2";
locale = "mr";
arch = "linux-x86_64";
- sha256 = "674ba4962bd455793b99f07a9f40709220d40a55e6ebd516bc15b54bf04655b7";
+ sha256 = "3bad6fb96f29a3fac72eef3f53b48e9ff10a273da069eda050fa24bdf3ee8ec1";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/ms/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/ms/firefox-82.0.2.tar.bz2";
locale = "ms";
arch = "linux-x86_64";
- sha256 = "91291fcff394f30b4f60968f183c3125961fb593eef5a9e839024d83d001cdab";
+ sha256 = "20573511691d2615c9095988cea73d7fbb522a0b4ae958da1749ae8ee1ff31d8";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/my/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/my/firefox-82.0.2.tar.bz2";
locale = "my";
arch = "linux-x86_64";
- sha256 = "1634f5d90130dfa27301588856c4f49bce0bb33c047d653bd46e255ce07e2414";
+ sha256 = "4f4a7abd9a1409ab49ad956cc1cad0adb9254b3203d9d19b7fc967284d051554";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/nb-NO/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/nb-NO/firefox-82.0.2.tar.bz2";
locale = "nb-NO";
arch = "linux-x86_64";
- sha256 = "e35752e9fe37cd3a8518b042f2e287f29aa91213be680b111948e9115e5da523";
+ sha256 = "c0480f74895deecbad2f58b1b4876fdfc2c920269f4c91143c9cac41d67162f1";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/ne-NP/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/ne-NP/firefox-82.0.2.tar.bz2";
locale = "ne-NP";
arch = "linux-x86_64";
- sha256 = "17c5d7c04727b775ea544b4e6203e181b4f26d7fd833900fd3dbae853a8dede9";
+ sha256 = "11fff99c2bf87ce9b5c315ffab4a305bed0d5170ffc4f65d00d5b5b380687214";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/nl/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/nl/firefox-82.0.2.tar.bz2";
locale = "nl";
arch = "linux-x86_64";
- sha256 = "d9ff2809b7d4b1fb30f0c61b5ab7c776bd4096940908afcc25472f4b4f78407c";
+ sha256 = "a19b8a18022f9317303e7aba19415f45133b19849fae440ec41ec5e9016a532c";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/nn-NO/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/nn-NO/firefox-82.0.2.tar.bz2";
locale = "nn-NO";
arch = "linux-x86_64";
- sha256 = "0da44925c235fb19bd823464046150a57ce710be8f8f2593612e97bd0bd3d591";
+ sha256 = "cc68e10b523681110a597c7583ede6ae08d20529bc001fa5059c9056287f3587";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/oc/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/oc/firefox-82.0.2.tar.bz2";
locale = "oc";
arch = "linux-x86_64";
- sha256 = "62a0679bfbdf27055924753661b20b2a022ba60e50bcbcca89ea7ec28394d3c0";
+ sha256 = "a54056be66f78421a7f70cd5860ad5e804abd35017b02ca600c459c86c82ef50";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/pa-IN/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/pa-IN/firefox-82.0.2.tar.bz2";
locale = "pa-IN";
arch = "linux-x86_64";
- sha256 = "f3f51aaeec650043cf70d2dccddd18ef8d184b61061a42b2d5ca4b06e891c8e1";
+ sha256 = "6a64174c90146c52b462a2e8b921880927774b6d9b6478df26ea194735c6eb6c";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/pl/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/pl/firefox-82.0.2.tar.bz2";
locale = "pl";
arch = "linux-x86_64";
- sha256 = "a1a6ec0eebab8905dc53e58d781369ebce792f1a34e8702c7d9bea082238a1ff";
+ sha256 = "558f08956b019d8046ac6c0e3a9922f79176d9997129e795901f40ce04651e55";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/pt-BR/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/pt-BR/firefox-82.0.2.tar.bz2";
locale = "pt-BR";
arch = "linux-x86_64";
- sha256 = "76a3ee37676ad9260dfe8d434fde3eafe4d9615568056164058344bfec11bcaa";
+ sha256 = "bcc8c4d9a55c8669cd378b2f89cfa61da82e54be360fb754be78289c2ab8434f";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/pt-PT/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/pt-PT/firefox-82.0.2.tar.bz2";
locale = "pt-PT";
arch = "linux-x86_64";
- sha256 = "6d0a39416ea8fa33b53f6aa886bff4cf35f0eeacd622c0572abf1b62ab067fb1";
+ sha256 = "29ef81f9675b589122d311dd0f3075d48c99fb34aee9f9906d490585bd407468";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/rm/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/rm/firefox-82.0.2.tar.bz2";
locale = "rm";
arch = "linux-x86_64";
- sha256 = "cf66f96c69b89879ec2ee51050640f5e18aabc3c1ef14f6ee8479f4f12ff2d96";
+ sha256 = "390bd332f1fae6f5a48cc7b8bdd285b282689446977d859e37d8a097920dec9e";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/ro/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/ro/firefox-82.0.2.tar.bz2";
locale = "ro";
arch = "linux-x86_64";
- sha256 = "d4a70b102a860cc7f1556eb63d03ad64bebc5e0f22be5fb1ac3d833527b38964";
+ sha256 = "1398529679e4220844a0b1880c0ff174fe2faa8b1c30c6041c1cd790d16a83fd";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/ru/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/ru/firefox-82.0.2.tar.bz2";
locale = "ru";
arch = "linux-x86_64";
- sha256 = "e57613ab5c57551721cad739b025a9c998fe79f3a354ec626dc9bc5f88943550";
+ sha256 = "a9ba4ded0a67ae842896aa75de3dda2b427d0748244649aa9c2db17dd35a9d02";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/si/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/si/firefox-82.0.2.tar.bz2";
locale = "si";
arch = "linux-x86_64";
- sha256 = "9565b8bfdf98c0e8b04c7fc6af23af2b04fee815ce6faab3188756e7b30985b5";
+ sha256 = "a95b03c4085c096207a895d3ad193be7823da4e894793c0378391da5faaf01e5";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/sk/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/sk/firefox-82.0.2.tar.bz2";
locale = "sk";
arch = "linux-x86_64";
- sha256 = "05e190e6ced4d275a93da20e9922a631628db467e4a5dcf7c94cb7d728ffcbef";
+ sha256 = "ce09728fc05f18a549c9083d383c58d4a62371d69a01d30f5aba782a60ec70b6";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/sl/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/sl/firefox-82.0.2.tar.bz2";
locale = "sl";
arch = "linux-x86_64";
- sha256 = "6fa4092cfa0d20f01a0e746a2adec4a31091579de08c5adaba186743cadaf04e";
+ sha256 = "c344aa40296d249f2c6c85718fd6a9b30be0407b7df7eb73f1810cc873f03477";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/son/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/son/firefox-82.0.2.tar.bz2";
locale = "son";
arch = "linux-x86_64";
- sha256 = "4ad179b62c19de8171299301a312c4b4aec4805c4d255308d8a2ec840cc3058b";
+ sha256 = "3356b16e9174c90cc8e1deee262b8381fbfc34e9cd03e6f7bd48072861de5be5";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/sq/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/sq/firefox-82.0.2.tar.bz2";
locale = "sq";
arch = "linux-x86_64";
- sha256 = "0dab51efdbb69e6cbb1aeca8fae9d82709238b54bc40141335ff790f7ca91ff6";
+ sha256 = "a90e1dada0ef38114f1a8ba7236d8bc97285dc46f81334c86ee7a9a03c8d2b0d";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/sr/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/sr/firefox-82.0.2.tar.bz2";
locale = "sr";
arch = "linux-x86_64";
- sha256 = "59523733a24aa0bab201560711a8a47cc684e8027eb5c06f814b0d59c6a985ad";
+ sha256 = "d44891e53c9a41770dffb2fa744e3cea0a655194e218b70881e1f070aef07d69";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/sv-SE/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/sv-SE/firefox-82.0.2.tar.bz2";
locale = "sv-SE";
arch = "linux-x86_64";
- sha256 = "53cbef7e2eba73d2ad27ec6ed717f1c69c71281d4e33a1d7e721ec30c372663b";
+ sha256 = "e53a4ca8a04d7858c30260999b6acc09b8146ae8a8f4e558d62cca1ce18e7689";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/ta/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/ta/firefox-82.0.2.tar.bz2";
locale = "ta";
arch = "linux-x86_64";
- sha256 = "7d866f79b6e80c76c2ddfdca477962f1b37dc3eeacd5270a90e4a0a0ee461cf2";
+ sha256 = "a89ab7047cbbabde8a03e301f8067b130d37eb0ad7ddaf750051175dd721b6d0";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/te/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/te/firefox-82.0.2.tar.bz2";
locale = "te";
arch = "linux-x86_64";
- sha256 = "846fadf4e10bc6f89db7b9a3ad06c17a85695779cd5f1c06414d6f4baef52921";
+ sha256 = "6f80b934ff3bf696b4753f2cbf146d9151f40def404d6d749cf8de022be194ff";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/th/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/th/firefox-82.0.2.tar.bz2";
locale = "th";
arch = "linux-x86_64";
- sha256 = "e2087d50eb61ba597a67af0cc3460ed3ac7e8af218b374e4c5294463aac8ce44";
+ sha256 = "c37a9708768ddf723a2423ba0999e88b09a51028d7736234ffcaf8a32f56df8b";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/tl/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/tl/firefox-82.0.2.tar.bz2";
locale = "tl";
arch = "linux-x86_64";
- sha256 = "60a05602462133f36d29942dc5123aa0c71b1aaf2ab142efff6f7abc9cadcad6";
+ sha256 = "5ab670b24e2ee1c4b4c7fe518e9d3967c85f0e27ea2c7a4ba82bbdaabc6c4fd9";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/tr/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/tr/firefox-82.0.2.tar.bz2";
locale = "tr";
arch = "linux-x86_64";
- sha256 = "5cfc8cc8945f4a177af80df37653a61f310f413cd4ab3e5df55ed4457d7318b8";
+ sha256 = "7e51ae3fca81e691675196b298a9b03de9e798f4fc032da8e5da295820a7d2c6";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/trs/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/trs/firefox-82.0.2.tar.bz2";
locale = "trs";
arch = "linux-x86_64";
- sha256 = "2cf90e62d2e1272aaa8d7acfb7ac51b35e9a3aef23f12aea2213146db324ac66";
+ sha256 = "60263ac369cdc9aa9a8ab0dcb60219f3e14563fed709b99d8352c1b0469e9433";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/uk/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/uk/firefox-82.0.2.tar.bz2";
locale = "uk";
arch = "linux-x86_64";
- sha256 = "bf0503793d0887754b2c4b87b92c4dcf111d8f5fcc27a288af3686fce2201366";
+ sha256 = "38f8e0ed748427991ee9c45694460d3eee28a5f94ee1ff59eafcf9eb93fab9c3";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/ur/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/ur/firefox-82.0.2.tar.bz2";
locale = "ur";
arch = "linux-x86_64";
- sha256 = "015e0e28477896710481a925c4bec0ceefd0c9f39179a13441b673031854ab1e";
+ sha256 = "65e19c2395ff45bff79beb1aa4d9c18faaceb5a7000c6de672f6c1d6964571e0";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/uz/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/uz/firefox-82.0.2.tar.bz2";
locale = "uz";
arch = "linux-x86_64";
- sha256 = "0c372b3f8d98f41f2a69a62ffefa6181bb9d7d1a74c7a60a2603ee3a8883d635";
+ sha256 = "d3967c3bbbd0ddd880a7cab3a359b946a7b99515c9b82bba044a33138822d864";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/vi/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/vi/firefox-82.0.2.tar.bz2";
locale = "vi";
arch = "linux-x86_64";
- sha256 = "96b1a4aa05e054a7ec78bf314d151385b2a7a6f6ea3225993242ba798772e100";
+ sha256 = "a142d7ddc06c688666811ace6a9c32f28e74006f29eff4aa4aaae105f64a34ac";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/xh/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/xh/firefox-82.0.2.tar.bz2";
locale = "xh";
arch = "linux-x86_64";
- sha256 = "68d69dc60b730b5ffe7a54943bc9404d0915b3730f840711a3c078bc8b71396a";
+ sha256 = "a696daecebfb59e8a798dcc6eb241ce10562438a013f243dd60ac8671091f585";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/zh-CN/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/zh-CN/firefox-82.0.2.tar.bz2";
locale = "zh-CN";
arch = "linux-x86_64";
- sha256 = "b21aedfb3eb7cb8fac85fa9d9f8741ff182ada6635bbb669ec95c0cefc0edb5a";
+ sha256 = "d1167e254dc6c16d5d4e38cd8b98bbc065e369d7bd7414e6871b028c601118a2";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-x86_64/zh-TW/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-x86_64/zh-TW/firefox-82.0.2.tar.bz2";
locale = "zh-TW";
arch = "linux-x86_64";
- sha256 = "81963acd1e8a92ab416fe4dae6f1c14f554d6d6a83fcd1d5021e5796bf5d7a98";
+ sha256 = "453ebd33173b2ae4a5120d73e3e0fdde57b480e3f66ef2fffaba27390ae945ae";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/ach/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/ach/firefox-82.0.2.tar.bz2";
locale = "ach";
arch = "linux-i686";
- sha256 = "12b85628724e5c5acc545ba462b7f916d775dedde3eeb4141799f0f3d65ba6c2";
+ sha256 = "c7840623cb65c9c28285d41694a85990e0bda181697e229ad4b71478dec8bf2c";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/af/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/af/firefox-82.0.2.tar.bz2";
locale = "af";
arch = "linux-i686";
- sha256 = "66f1e12cbabfcaa3c51e68d06b213dcdf29292e981b18ace9ce6df9bfe3f9dd8";
+ sha256 = "24915613ccc58840ccb1564ebacc906b96c7f171822f722265e02b8ee41b0dca";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/an/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/an/firefox-82.0.2.tar.bz2";
locale = "an";
arch = "linux-i686";
- sha256 = "6b61f6db8cd323371f8a4949ff455c79374a2efa0c327611128aaa397a02a025";
+ sha256 = "d7acf25c0fce89775827a1e8198fccd117b94dafe5fd9820f557cee88379da8b";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/ar/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/ar/firefox-82.0.2.tar.bz2";
locale = "ar";
arch = "linux-i686";
- sha256 = "180633af5e8cfd13d832c9268d4b0eb44b2292b549d3d1093364db9967fc3e82";
+ sha256 = "d24c74365c1b9384e8954f9b6ce4f2742bea269de7a20f448971a957f096ecf2";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/ast/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/ast/firefox-82.0.2.tar.bz2";
locale = "ast";
arch = "linux-i686";
- sha256 = "aa95f2894bbaf61fd74bcfb00218f73e77b83250c25b472e9938ce0e94403583";
+ sha256 = "0b858a243143f6afa68bb14f836fbf4a7245cb2856432004222422ceeb4c4d57";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/az/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/az/firefox-82.0.2.tar.bz2";
locale = "az";
arch = "linux-i686";
- sha256 = "3c42220f655d6d8785b0763d5d829744d0e579acff44cd146ec85378ef2800a9";
+ sha256 = "80ef7662e88c0fc1711bf385443917b325dfa46252b837f043f41fab0139967b";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/be/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/be/firefox-82.0.2.tar.bz2";
locale = "be";
arch = "linux-i686";
- sha256 = "02fd047e0808ccdcaf484ab6fcc6d306ce97c6a401be4a0071eb310f31ccd45c";
+ sha256 = "93c087192c67e074ab3b00fdf55d485f39c7b86cba4fd801e61d2f61e511a191";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/bg/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/bg/firefox-82.0.2.tar.bz2";
locale = "bg";
arch = "linux-i686";
- sha256 = "556fbaef8fac39cebf0152e0c5945c6179aa013a724c4903b5553c12518913ca";
+ sha256 = "19afb87d93e3a01305c24b725b8ed764f8ae2e31e72a8ce4132f1d6451589321";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/bn/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/bn/firefox-82.0.2.tar.bz2";
locale = "bn";
arch = "linux-i686";
- sha256 = "3a30215151a6e937a1555f28333b2763e5bcb825e4159267c4897f666206737f";
+ sha256 = "e607dd2195d4a19d366de1f084bcdc91d4832287752c4a449d445eb7aaaff463";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/br/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/br/firefox-82.0.2.tar.bz2";
locale = "br";
arch = "linux-i686";
- sha256 = "9db07dc18e3925f20d1cdd668eb26dc279f7ee38bd71e0085e47ca9400938974";
+ sha256 = "dbd5fa26f0b9b20933820005022af238a5f72c8688dc10a4aafa0318af67b342";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/bs/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/bs/firefox-82.0.2.tar.bz2";
locale = "bs";
arch = "linux-i686";
- sha256 = "7ad72fb89ac7ae6f453e5476759319b3e46a814a5ea3b74fa95350a20aeec2a1";
+ sha256 = "7d3d4e3bc630e69b655f4668365359996266d15864b776fbe2e6a8773e212410";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/ca-valencia/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/ca-valencia/firefox-82.0.2.tar.bz2";
locale = "ca-valencia";
arch = "linux-i686";
- sha256 = "73f45df139c85e6b583fe0f5c5e429631154d02c7de5832e85366fceccec2854";
+ sha256 = "a14d58cd78c72c29307887a91b534a7553ad2b4e81da5615bfb8a918d4abce60";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/ca/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/ca/firefox-82.0.2.tar.bz2";
locale = "ca";
arch = "linux-i686";
- sha256 = "53f64671ca7527147f91fe2ec72053420866ec15f7d8f6175d88cde75f574514";
+ sha256 = "2aac2aa56702b1269b5b5755da2663621da1603e6ad956afe07d86ff54d3e64e";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/cak/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/cak/firefox-82.0.2.tar.bz2";
locale = "cak";
arch = "linux-i686";
- sha256 = "93471086769bbdedf2a6a7a63ed2fecaa785c9c1f337bb1e726462976604dfff";
+ sha256 = "333cf7d04c22f644f0286102b498727dc448339de26fa1a1cfd353ad1b05a1ae";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/cs/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/cs/firefox-82.0.2.tar.bz2";
locale = "cs";
arch = "linux-i686";
- sha256 = "e9e1d7f0a0a5766d0ef1ec8f9eb747fcd28333425d139fa1f78891142f1aa91c";
+ sha256 = "3d3756f69b0acfc95abd5ab21b9b77cd2272afdcb7056fa4b961c1528e467447";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/cy/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/cy/firefox-82.0.2.tar.bz2";
locale = "cy";
arch = "linux-i686";
- sha256 = "60caa6cb482ff870572551605e1b644d79901f1852b0bcd7ba64f926eb923bfe";
+ sha256 = "97d16b2b8def95897751397a8f5293931e1620d2b17b6a6f036d47abc79ae822";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/da/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/da/firefox-82.0.2.tar.bz2";
locale = "da";
arch = "linux-i686";
- sha256 = "726f620abbf287fb03d68127a7985e52a8e4ee176994bc7b0e8d10e7f3dd42a1";
+ sha256 = "f97a2ded9c529e992df15b797afe0622a1d02cdf3e01fa46794b4ddddcfed0ac";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/de/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/de/firefox-82.0.2.tar.bz2";
locale = "de";
arch = "linux-i686";
- sha256 = "ebc0cffa8a0300165a39ee1fdfaf4c404d2204683117c6b5d7ae708a4a495053";
+ sha256 = "4d9aba854f86075d29772957d7f31804ecdc1bc465315afbf0bd807a40f39bc5";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/dsb/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/dsb/firefox-82.0.2.tar.bz2";
locale = "dsb";
arch = "linux-i686";
- sha256 = "e296964d066ab5799b0974c1841f36352040d9f6ad769e730f801a0b77eaaed8";
+ sha256 = "bdf18303c3e67f6bda97c709460214bcad60dc11c35fb996bb628f79bb7d0a9b";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/el/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/el/firefox-82.0.2.tar.bz2";
locale = "el";
arch = "linux-i686";
- sha256 = "f1282eff07c147d33b114a76335cb4c6bfddc66518d2749d65d5613899a3cda3";
+ sha256 = "29e9a29e97fea8cb4eb03c8ad67c8fb37e534199073202f381c6a9c50a9d6572";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/en-CA/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/en-CA/firefox-82.0.2.tar.bz2";
locale = "en-CA";
arch = "linux-i686";
- sha256 = "51ab497caf7a529e8b430280b8015ab3b8a5df3486ef81f3ffe721d1f0c2d752";
+ sha256 = "7fd41cc61c01491048cd37db223007a568a8470eea693e76e3f3394901b1af5b";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/en-GB/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/en-GB/firefox-82.0.2.tar.bz2";
locale = "en-GB";
arch = "linux-i686";
- sha256 = "1a4f64d190155f3b090828261ec2ce0f61e4b3b2662a3f445291ee201c0fdfe0";
+ sha256 = "818d44931c9ed4b4c258de26b33040409ebfe9a4856eb1f80715d15687ea9fdb";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/en-US/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/en-US/firefox-82.0.2.tar.bz2";
locale = "en-US";
arch = "linux-i686";
- sha256 = "2039a8e94fcda9bcad97d62059579d64744da522c7d65beac0edcbd2e128a06f";
+ sha256 = "54a64c8fbb263df7e05b8532f0d6f50bd34f6b3cf3080ffc99c123b6b7009210";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/eo/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/eo/firefox-82.0.2.tar.bz2";
locale = "eo";
arch = "linux-i686";
- sha256 = "1abf7e1a14264220bf83b998c71ae8d1cb7e5187c09a9ae2be1424761760955b";
+ sha256 = "87e497515f1a90d315e58f592d9360baef382bb986cc17a1a20e9ea9013550fc";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/es-AR/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/es-AR/firefox-82.0.2.tar.bz2";
locale = "es-AR";
arch = "linux-i686";
- sha256 = "83bc86693bbb7dfaeae244c1120f5426b85b13f56756f299e3e3c902a0700851";
+ sha256 = "3306113b2e5249c9bef8cbe3ee30a76855402f39385ef730725fe19c650248fe";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/es-CL/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/es-CL/firefox-82.0.2.tar.bz2";
locale = "es-CL";
arch = "linux-i686";
- sha256 = "b2ff29fe620aaa62e9b20ae1576574b2e4c7893eb664fb7c6f722a80093d81bf";
+ sha256 = "72fc2f9c4269255c5c9b6c65f11ce8613dd68a1b382c53cab159c56af91d4f12";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/es-ES/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/es-ES/firefox-82.0.2.tar.bz2";
locale = "es-ES";
arch = "linux-i686";
- sha256 = "47f526244e2d7426d7a9d2faa1e114032bd43309c480a21523645c415ac54a17";
+ sha256 = "720687e90a863bc08a79e7b98f52439efbf655cc170397095dcf2212839eeb77";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/es-MX/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/es-MX/firefox-82.0.2.tar.bz2";
locale = "es-MX";
arch = "linux-i686";
- sha256 = "f2f7f4e251574d11ea69854d0f5a9f7b078aa220d5fb1ef8275e25e4e75389a6";
+ sha256 = "32db50431886cf3e181a440eb40e4d9e93ebb0dd6c7e9eb3f6bb4cb203530d37";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/et/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/et/firefox-82.0.2.tar.bz2";
locale = "et";
arch = "linux-i686";
- sha256 = "88ac5af23fa85690fe992ff457f79c991d4802e54a5a3a73682b3b1c6d444856";
+ sha256 = "21c2de424dad554b4e74509df0b40a49c23b77c406d44c611ea0e08eb98d1886";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/eu/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/eu/firefox-82.0.2.tar.bz2";
locale = "eu";
arch = "linux-i686";
- sha256 = "2fa7483b6be6503a5aa584895d6b177b51f94c344e0869638f6dc065437d69ff";
+ sha256 = "96e3609f488fc8bdf899f07333121893dc5f74f520856536facb1a5b376773f0";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/fa/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/fa/firefox-82.0.2.tar.bz2";
locale = "fa";
arch = "linux-i686";
- sha256 = "f9cf6f19e3faf9c206a4286224089855aa2fad94bb99250855925e167aa65943";
+ sha256 = "572a6fe2bc5c0751077344e327ff11d434eeb26eade478dd79578822bc8ea167";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/ff/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/ff/firefox-82.0.2.tar.bz2";
locale = "ff";
arch = "linux-i686";
- sha256 = "b6171880f459eed455cab78fbf9a695168f23bb26c361099cd23f682a99704c6";
+ sha256 = "08daf54db1c3927ff10c38ae462c806b0968abe89509e2a7251b39e2f3e3e43d";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/fi/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/fi/firefox-82.0.2.tar.bz2";
locale = "fi";
arch = "linux-i686";
- sha256 = "6f5d5eaa2e4a60122a18b998932645f6abe7542e04298d13cf5004804de12bb8";
+ sha256 = "c2bfa5646d0f39262c79dbae82f2a443e145b0b318d4213e42f265dd378a0a73";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/fr/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/fr/firefox-82.0.2.tar.bz2";
locale = "fr";
arch = "linux-i686";
- sha256 = "1d239e0c59c17c3e8de5f88df643a2b59b55a1816f8d2779c115311c6729bf89";
+ sha256 = "3e8ae367878e625b796e68fdc413ed4fa32a06260db7ecb000f3c089f7755a6d";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/fy-NL/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/fy-NL/firefox-82.0.2.tar.bz2";
locale = "fy-NL";
arch = "linux-i686";
- sha256 = "7307baffe92d133f2b3b957c8592d7ef18e1129aebadb9c1a26b8f462ecb9b84";
+ sha256 = "29dcf0040b32d2a183cc79f220ff37c6b8059a399fd111b9c4ab8f851b638acc";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/ga-IE/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/ga-IE/firefox-82.0.2.tar.bz2";
locale = "ga-IE";
arch = "linux-i686";
- sha256 = "1ae40826795c01e45921cee1293990a227f219ed20398b77cb8cf382207ed0d2";
+ sha256 = "d2f0c91780ef7dd353d58e41e539b917e6c957231579517d1d75cef89769a5b8";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/gd/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/gd/firefox-82.0.2.tar.bz2";
locale = "gd";
arch = "linux-i686";
- sha256 = "108f11cade989829a103e67090f03dec890b371004fe047215fe2feda8217a7b";
+ sha256 = "1c305c577072a792aee284559202b4ca8108df8f96b1ef17c20d6918498b3599";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/gl/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/gl/firefox-82.0.2.tar.bz2";
locale = "gl";
arch = "linux-i686";
- sha256 = "3be9987167773e448d194bcde682242576968ca04cdba2b3728e454b965a9b21";
+ sha256 = "86c829c97c30e5c49081283cc8ff5073d357ab09520194c56df63ab56858b083";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/gn/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/gn/firefox-82.0.2.tar.bz2";
locale = "gn";
arch = "linux-i686";
- sha256 = "be87dc9ecfe75423c59fd189896a508040f5f962828855f50a01fb4a46a6beb1";
+ sha256 = "11a41052cb779cd11fa2e9c1f2f4367a190e78e36dce900f2fd84c451a6001be";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/gu-IN/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/gu-IN/firefox-82.0.2.tar.bz2";
locale = "gu-IN";
arch = "linux-i686";
- sha256 = "c2b1290375af17d0d63dfa90b006025dd8f9e7b35628caa782c849826df2fb53";
+ sha256 = "6dfb8e60f2225a8db6a2b1ce31b23b51803d5fe9642cb85ff9f440e53c887616";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/he/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/he/firefox-82.0.2.tar.bz2";
locale = "he";
arch = "linux-i686";
- sha256 = "9579aa350b3cc6c0814c24361a5b7a7b3ec75245f050ad994ab20e850b520f41";
+ sha256 = "8d2f9ed875b38e6d19776c0bfb3a66fe030215d43ee247c9f1a5b85c7dcf0105";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/hi-IN/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/hi-IN/firefox-82.0.2.tar.bz2";
locale = "hi-IN";
arch = "linux-i686";
- sha256 = "25a037775d64ceaa137fde2367e26f846e755f98edaf0fd04526b4afc80b17cb";
+ sha256 = "cf160dc3ff74855a206882e045395dc1ddd69d545184d7f02acb20289465842a";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/hr/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/hr/firefox-82.0.2.tar.bz2";
locale = "hr";
arch = "linux-i686";
- sha256 = "c84de35ed70512cd608de909ce887f0bbf79d5894a82facd94af478b1cc54764";
+ sha256 = "e62b04dba13d6d8dfada3976f23715cd221d5a9f0c9d2ea9a0b828c87222b8db";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/hsb/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/hsb/firefox-82.0.2.tar.bz2";
locale = "hsb";
arch = "linux-i686";
- sha256 = "2d5ce7160c14b3770d19c3d32a068c1a08623ac2c3b0036d5f18ba7645463fbb";
+ sha256 = "fbf8420109b4b7470bf8e5b889cbb51b5a9d827b9cedb2aeb5089f31e74b0211";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/hu/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/hu/firefox-82.0.2.tar.bz2";
locale = "hu";
arch = "linux-i686";
- sha256 = "bf0fa325c588eacb758697ed13a4aba6416ce35f6cae31891ff4b5ea0296e094";
+ sha256 = "161c7f91df6806310a10631f6d338cf86138f5056d265e4dfcc2823634a1cc79";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/hy-AM/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/hy-AM/firefox-82.0.2.tar.bz2";
locale = "hy-AM";
arch = "linux-i686";
- sha256 = "f45b28645f8dc656d291cbea9e969cca090014f1c4d508f2a0d8f500ce949066";
+ sha256 = "a35885c431f6b160716355766c5e8f60ac94dc86675e91905c4781071de6c2a4";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/ia/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/ia/firefox-82.0.2.tar.bz2";
locale = "ia";
arch = "linux-i686";
- sha256 = "ac1ee6f6450f62fd4e0de61366b83a0fc8d7b7be5731591e83c4393ba2a6e9f6";
+ sha256 = "e162f166587a94aaaf9a6419fdd9da21f949c7db0d1ad223016d470841e124cc";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/id/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/id/firefox-82.0.2.tar.bz2";
locale = "id";
arch = "linux-i686";
- sha256 = "8117c5e493362fba30de0cb27cd5a8ef7ab9b31655701b44c9ab06a6b73af60a";
+ sha256 = "bee0a6a4a0a9fa3c13650bcb4fefaaa07cce21211d2d4fc0030f4f9133781eab";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/is/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/is/firefox-82.0.2.tar.bz2";
locale = "is";
arch = "linux-i686";
- sha256 = "118b2dac91511e0e68a7dee939f586a9d9b31cc117d6295053a6125fe7e3bf57";
+ sha256 = "8994bc2da81e1b17ac112e7ca7a43be9f578c049e879651a4014730937c83283";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/it/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/it/firefox-82.0.2.tar.bz2";
locale = "it";
arch = "linux-i686";
- sha256 = "8680148fda005fd63ce5af1230060f7510a4b7b096da1f5dd864b9824990faff";
+ sha256 = "7fa77ed489b07954543ba117dc3cf67fc70341a5e486d35596cc8f80f630482f";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/ja/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/ja/firefox-82.0.2.tar.bz2";
locale = "ja";
arch = "linux-i686";
- sha256 = "eedf01ce82bce136c03a62de3437b42e52280e87c8491133116926ec7481b7a0";
+ sha256 = "76d299e4d71a82e72bc2e446bcafcc1b1d63b54c57e9aeb7ff11e7bff8611811";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/ka/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/ka/firefox-82.0.2.tar.bz2";
locale = "ka";
arch = "linux-i686";
- sha256 = "63c060cb338ee1a0bec05fa8b3749f21503dd3d78548b5673fa4b44b64ef0536";
+ sha256 = "6c027f7dbdff43c097a73ecad83aec6c7d623cfc8cdd77049d4dcab70984b403";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/kab/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/kab/firefox-82.0.2.tar.bz2";
locale = "kab";
arch = "linux-i686";
- sha256 = "ba10887d808f197cffa458ba50d3cc7696be176dd088747a50adf676a0d1d666";
+ sha256 = "ebd32284e83a0df7228f34263ea03b5b3f418fa5db193e01d20ef15f7ccc393d";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/kk/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/kk/firefox-82.0.2.tar.bz2";
locale = "kk";
arch = "linux-i686";
- sha256 = "c93f19c29f0a47854ec1b90e8e4e5e77a08f5c2a3589fd3753c9aa6ceb6d515e";
+ sha256 = "39dcaefc6135f51157802878702debd14950a82a32b57862c9428236425de620";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/km/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/km/firefox-82.0.2.tar.bz2";
locale = "km";
arch = "linux-i686";
- sha256 = "7066bcd6a37faaf5db2ff5eca5c1049cdd4a9a1c034133de866b7d9d97913c03";
+ sha256 = "30b0fc4885498d9453dd3179a82d7fd12bcdb5a2b1f3d6227d7a7a68123544eb";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/kn/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/kn/firefox-82.0.2.tar.bz2";
locale = "kn";
arch = "linux-i686";
- sha256 = "04d941f96c92525298e391a38ef24ee2d31411bd9f3d36ca2f667e3d400513e3";
+ sha256 = "ab0f33c172a47fd5fe1e3caa014938647dc870a97e9db0d1ed7e9b09a3fc920b";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/ko/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/ko/firefox-82.0.2.tar.bz2";
locale = "ko";
arch = "linux-i686";
- sha256 = "b8fbf8316f2a3d93303ce52f63a08d7604ba8143d7bfbed6782912ab19609436";
+ sha256 = "7e20d1d2c16e6278e1e8290c18b39833e23b12cc9bbcfcf3135e52d3c155118d";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/lij/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/lij/firefox-82.0.2.tar.bz2";
locale = "lij";
arch = "linux-i686";
- sha256 = "a655f743a2397f808fe514e0e86f6297c3a8ff113bdd360249309d449ff5444c";
+ sha256 = "5da50a6a54b1ce15af8ca26bdb2756449622f6d441593bae4f558c079ef732ce";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/lt/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/lt/firefox-82.0.2.tar.bz2";
locale = "lt";
arch = "linux-i686";
- sha256 = "dd4f654d1c8dfaf0a318c5633865649a8298fa92fb71b7c66ed9369710df2ea8";
+ sha256 = "a4bf43fd06f915720f3050750f226629a602aed690b74df728cfd616f8d1d063";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/lv/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/lv/firefox-82.0.2.tar.bz2";
locale = "lv";
arch = "linux-i686";
- sha256 = "820f1c5d3da3ae84b0a0c80dca3210ee61024a23141fb2111b5e609843aeb55d";
+ sha256 = "8f8eaf80606a140616cfa17fb69bc611ac631a8ec1e4d204fb0de1c073b767aa";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/mk/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/mk/firefox-82.0.2.tar.bz2";
locale = "mk";
arch = "linux-i686";
- sha256 = "51991978ac9db66b157b6921941219ed6f2be3ed2ec9a1fd74933117a5708743";
+ sha256 = "869715dd3d72c48db3007557aabc96fee78b73ecdc747ec0f361365eb1072111";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/mr/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/mr/firefox-82.0.2.tar.bz2";
locale = "mr";
arch = "linux-i686";
- sha256 = "1012cc8a38bb7a3250d2328af5c3afef05b8316137ecea20e3941bb1428a4d4f";
+ sha256 = "ae921995425812eb2b70a479dc1d6bc319d397c7c16e020460d2d1f65cdc9305";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/ms/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/ms/firefox-82.0.2.tar.bz2";
locale = "ms";
arch = "linux-i686";
- sha256 = "584504c48e0f0f28ba8b6dc5341743293b7f1795ea5c1c9a31c348c76cc62313";
+ sha256 = "55fc6ca427864cd885fa8da786f50f4e88ef2d9adf331e55a6f8e781fe5f7838";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/my/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/my/firefox-82.0.2.tar.bz2";
locale = "my";
arch = "linux-i686";
- sha256 = "5c4aa84945631ddb576f1a75120d5ccba9ec6d37f2ca7fa74fd673bfd3d4bd5b";
+ sha256 = "26377b5108cd1208d111792dad61cf521fda0f4c4206d17e4907b06e4ab5e7d8";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/nb-NO/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/nb-NO/firefox-82.0.2.tar.bz2";
locale = "nb-NO";
arch = "linux-i686";
- sha256 = "d35d5cdf2b5ebb145c1c54a5e0d95501a38783a207d47e01eec4cf85a64541b5";
+ sha256 = "19bcb61803f6d6bbecfd94eb769b3d302a951ac5d7f337b6937f9282cbb8222a";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/ne-NP/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/ne-NP/firefox-82.0.2.tar.bz2";
locale = "ne-NP";
arch = "linux-i686";
- sha256 = "af2f8135a7913914752a0f759c98a078823c6824a76625a6be4077563dafd3f2";
+ sha256 = "4575f7730e5964fa5be7ec351907d97794c06bf101bea5a98785238304d1fea9";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/nl/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/nl/firefox-82.0.2.tar.bz2";
locale = "nl";
arch = "linux-i686";
- sha256 = "beac8d7493bca8319c04f36d8e60985ebefa8af716db9aedf253d7b1bca496d2";
+ sha256 = "f22f33b1a1127a4dc91781031c0112b05e8cd5fbbb8c732a6e18b5beeb5627ec";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/nn-NO/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/nn-NO/firefox-82.0.2.tar.bz2";
locale = "nn-NO";
arch = "linux-i686";
- sha256 = "62e2abdda830a869247220edc5d623dd40d463d96458980f2b1aa70352f45dc8";
+ sha256 = "d59e605d47601c18d12e6a2a57cfb8c8752fea2711e8cb0d822b18a4f7a2c049";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/oc/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/oc/firefox-82.0.2.tar.bz2";
locale = "oc";
arch = "linux-i686";
- sha256 = "d670d46d4641e4b89b3e9fd09e226ebc9822d43c8611020e410c0a239ee6d3d6";
+ sha256 = "859b0b3b7317a4b94292edcb8f159d4c42404efcf67a170f435131b0b2331422";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/pa-IN/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/pa-IN/firefox-82.0.2.tar.bz2";
locale = "pa-IN";
arch = "linux-i686";
- sha256 = "244fd49efcb7579813b493904e63a889eaa832fa326b2da3fd4e5988bcee0294";
+ sha256 = "b8553bcc65ce5a075875849508876f34478a0d8166b048b4b8d0b37aacad359e";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/pl/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/pl/firefox-82.0.2.tar.bz2";
locale = "pl";
arch = "linux-i686";
- sha256 = "31c4cbc76456d9e0d76ab98c997049d17940cc5f461941c72ba85e07b0859516";
+ sha256 = "8428f5438edadd7f3e531aeb905bd46f52a3a624e1a36706b3e0e79d29366b94";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/pt-BR/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/pt-BR/firefox-82.0.2.tar.bz2";
locale = "pt-BR";
arch = "linux-i686";
- sha256 = "8c73c44493d265291f253ae7e739613a1cec1e82678021f3ee1738990eb101bd";
+ sha256 = "021cb4431781ef19cf7be1f987b6859c2c8b7db67f1428cec475d4de82d38118";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/pt-PT/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/pt-PT/firefox-82.0.2.tar.bz2";
locale = "pt-PT";
arch = "linux-i686";
- sha256 = "934e69f1c07b69c59c3e680ec7ab6d5e8bcf54e5a1e4bc32ef5782c15222544c";
+ sha256 = "e55fe5ebb512e184e2c67dc6b866a0f727fa89bda6fb2ed763195761b67bc79c";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/rm/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/rm/firefox-82.0.2.tar.bz2";
locale = "rm";
arch = "linux-i686";
- sha256 = "a825c9319954997f285370b4f13e20fe1b0eda62621b71570b2d7606e5a5668c";
+ sha256 = "30bc0d66c940ddaeaff516e900f85c652a3dee07d2ede81710efd31c5858e72e";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/ro/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/ro/firefox-82.0.2.tar.bz2";
locale = "ro";
arch = "linux-i686";
- sha256 = "df1de4c7dd186bd8b6558c6c4e902a1721ad3f73a40dd5163b82e98323931436";
+ sha256 = "e467c27dafce634f4e507ba5520ea4dfc3d3fca2f751a8ae55fb3fb26a073b3f";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/ru/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/ru/firefox-82.0.2.tar.bz2";
locale = "ru";
arch = "linux-i686";
- sha256 = "4c02fa376103c6fb69f2610045a5f922a6a305b11f92899e9d7f42725cfe9ad2";
+ sha256 = "d0ea589f932e1dd4a1f6d12a758210e22213794f5d45ec5bb85621aa1ba206d2";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/si/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/si/firefox-82.0.2.tar.bz2";
locale = "si";
arch = "linux-i686";
- sha256 = "bc429d437ede468610dfb4f807d7107a6a0f60b32c425d61cf13cbfb4f1aceed";
+ sha256 = "6a22d47d1c193a2a048c7535ec49f2198bd2616e123353af0391272db9decd3b";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/sk/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/sk/firefox-82.0.2.tar.bz2";
locale = "sk";
arch = "linux-i686";
- sha256 = "6e6620e108c4e6c0acafec1921ec4d99912dd0ca4d36d62cc5bef6127ca04c33";
+ sha256 = "c38f8f2f172c0de6d526be926c874a765116f14af5f50cb65cd7771a46cdcfe0";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/sl/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/sl/firefox-82.0.2.tar.bz2";
locale = "sl";
arch = "linux-i686";
- sha256 = "7aa6392e83496ebfba7b5ea4576aab2d28088c88558d88af74a588954bc5af20";
+ sha256 = "f39c27bb7d334f20e09fed97c3589db6aae988d3e538d7e2dbae690ab4b4e521";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/son/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/son/firefox-82.0.2.tar.bz2";
locale = "son";
arch = "linux-i686";
- sha256 = "3134725ede0ba297dc895b3682cc6ecf73931c0779a0fc979166f2ed652b6d4e";
+ sha256 = "7edcdcb248e6cb9a78fd4061a2ab54e03692834f87c6d565ed9b777c952ba5fa";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/sq/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/sq/firefox-82.0.2.tar.bz2";
locale = "sq";
arch = "linux-i686";
- sha256 = "33d3a6bcdcfb199360770c677849e064d3727f3629b34f9913faccd5f173c6bb";
+ sha256 = "db3a6edc2a4008c09ba931e965e9853404dd272455ec8d6b20bf86e14a095bea";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/sr/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/sr/firefox-82.0.2.tar.bz2";
locale = "sr";
arch = "linux-i686";
- sha256 = "b9ea179cc648bfb7688e5b21a0a5d128bd0247171b9e9114459a4ed7fe352281";
+ sha256 = "aa6bf3ed3402813f56b6d6c53a70da8c7decad3f9d3c3af66336aadc632e334c";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/sv-SE/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/sv-SE/firefox-82.0.2.tar.bz2";
locale = "sv-SE";
arch = "linux-i686";
- sha256 = "18227f53b7317262270f4ed973b080649d3011ea52ab434d56a09e91d750c8e3";
+ sha256 = "8ffe039f7ed159150c6ad804e980c597741439dcc339841e464589ebd535eb38";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/ta/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/ta/firefox-82.0.2.tar.bz2";
locale = "ta";
arch = "linux-i686";
- sha256 = "8c70c66802d6966e04462f934bfe16c94007209b4b6ecccbfe1cc044cd3c19d0";
+ sha256 = "a46c944cc5b22fefe8503cf079be32cc5aeb2cd1b78e5642f5ec55f8baf28586";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/te/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/te/firefox-82.0.2.tar.bz2";
locale = "te";
arch = "linux-i686";
- sha256 = "c36cd994a88688e3af5360f24bdc6a69960723bc2dd196f3d42ab8d6099abbfb";
+ sha256 = "a7ce32a838d4add3123116628301fb6642311fd3f6fffe0ca4ed6cb314c162fe";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/th/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/th/firefox-82.0.2.tar.bz2";
locale = "th";
arch = "linux-i686";
- sha256 = "2ded98d2d5957ee42c665a1789ae4fbc549af60a08adf1e51baf7022db5f03cb";
+ sha256 = "3ed82ac4d015d397cb53149f30e2842614092413d84dd6add365428b80c40cdd";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/tl/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/tl/firefox-82.0.2.tar.bz2";
locale = "tl";
arch = "linux-i686";
- sha256 = "14135d1ae961084d7979bb3ee13fa50bb2f59d8ea9fe18400084aedcd6ca5388";
+ sha256 = "cdd9b16ad2fefdccbdea8bad3863e3177bd166fb595609f74b1afb7d279c4390";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/tr/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/tr/firefox-82.0.2.tar.bz2";
locale = "tr";
arch = "linux-i686";
- sha256 = "4ac2f0a8729427e508f9aaf3c6606145b84ea47009724a1d07c3182fbeb4678b";
+ sha256 = "4b75d68d159ee4463854b53d0f68364648c2b36e6c0fc8937573cf2a1262ad0b";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/trs/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/trs/firefox-82.0.2.tar.bz2";
locale = "trs";
arch = "linux-i686";
- sha256 = "c7bf44d74cead7b7a5d44bb16331a113d8fb630c0bfa9740045ecc5d6858a099";
+ sha256 = "b0947e9e8f45d848093805ff34a59d6c74a5559df91da5bf2255e2a24d386f95";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/uk/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/uk/firefox-82.0.2.tar.bz2";
locale = "uk";
arch = "linux-i686";
- sha256 = "7a796554c241f21c16573f20b2b1907a4f7af4cccf441739b9826e2140f640cf";
+ sha256 = "a4ff8ded991f00825e10ebe69be7183899d8bca0692eae4e2c60049e80d6710d";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/ur/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/ur/firefox-82.0.2.tar.bz2";
locale = "ur";
arch = "linux-i686";
- sha256 = "8d5bdda725bad1479c32a18504fb584ac290f94e994b4c00a0686bb09bfb6913";
+ sha256 = "ee50b6ac2818824211c5fb871f19eb0582a5f50c3873139d6aed613d9a853197";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/uz/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/uz/firefox-82.0.2.tar.bz2";
locale = "uz";
arch = "linux-i686";
- sha256 = "699bf3bd19bc7f4f213791ef2bd7ce8db0693928be611b952c6c8b34861efae1";
+ sha256 = "6c530bd3bb2d1a3072513b203afd44affadd4cd3e8f9136f2b7e4e942d7cbd27";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/vi/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/vi/firefox-82.0.2.tar.bz2";
locale = "vi";
arch = "linux-i686";
- sha256 = "731e97ab6e96cf3da549b1cd954fbd4c48112ba12792bf1b94f9ce5628505c47";
+ sha256 = "ebfba78fe1778b0e724822adf1f448f005f4575c4c47eaf4d7347c808d2fe5a2";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/xh/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/xh/firefox-82.0.2.tar.bz2";
locale = "xh";
arch = "linux-i686";
- sha256 = "0078f3303b80aa63b1f664c49255077632729a5461b74a875e8cfb0ce3a23bb9";
+ sha256 = "e9e9b4b5cf377ab18c857242d1915ec0198393d35fd93c4ead4ac1d790db4d97";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/zh-CN/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/zh-CN/firefox-82.0.2.tar.bz2";
locale = "zh-CN";
arch = "linux-i686";
- sha256 = "fe9cb3a43e12c64aa12e40e8f52651e1c4ef09a52bbb51a3492acf8a535172c1";
+ sha256 = "c7d8459ff0eaaac129f168c54454af90f9618c8515f9df2a35de578611700372";
}
- { url = "http://archive.mozilla.org/pub/firefox/releases/82.0/linux-i686/zh-TW/firefox-82.0.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/firefox/releases/82.0.2/linux-i686/zh-TW/firefox-82.0.2.tar.bz2";
locale = "zh-TW";
arch = "linux-i686";
- sha256 = "020b7887120b134c127d444b59a5ce052fffd7653fffacaec9b0e4902e86158a";
+ sha256 = "b9a3074700de458cd43721b683597f95f2ad81834a15d5ebde22dfc324d92fb3";
}
];
}
diff --git a/third_party/nixpkgs/pkgs/applications/networking/browsers/firefox/common.nix b/third_party/nixpkgs/pkgs/applications/networking/browsers/firefox/common.nix
index c787fb5754..03cf35e1a6 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/browsers/firefox/common.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/browsers/firefox/common.nix
@@ -333,6 +333,7 @@ buildStdenv.mkDerivation ({
version = ffversion;
isFirefox3Like = true;
gtk = gtk2;
+ inherit alsaSupport;
inherit nspr;
inherit ffmpegSupport;
inherit gssSupport;
diff --git a/third_party/nixpkgs/pkgs/applications/networking/browsers/firefox/packages.nix b/third_party/nixpkgs/pkgs/applications/networking/browsers/firefox/packages.nix
index 7939188760..e7dd034a8a 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/browsers/firefox/packages.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/browsers/firefox/packages.nix
@@ -7,10 +7,10 @@ in
rec {
firefox = common rec {
pname = "firefox";
- ffversion = "82.0";
+ ffversion = "82.0.2";
src = fetchurl {
url = "mirror://mozilla/firefox/releases/${ffversion}/source/firefox-${ffversion}.source.tar.xz";
- sha512 = "3lbvlb6yggd5v0pkr0x6j350jc5dpclqz7bv4i06r97a5ijdgfc7c6y605966hvw24v17byxr120xc7a39ikl1wnls7a9gyzyqcwyw8";
+ sha512 = "25wkgsqnafmq30m1kd1axkm454dhl2bmz6100i3ccqnn31vw3nyy6k3k1apsn62siqswpm55iclzcb10y4dfyyqcszvflim47c8i37k";
};
patches = [
diff --git a/third_party/nixpkgs/pkgs/applications/networking/browsers/firefox/wrapper.nix b/third_party/nixpkgs/pkgs/applications/networking/browsers/firefox/wrapper.nix
index 424c45d305..cc6cc72e27 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/browsers/firefox/wrapper.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/browsers/firefox/wrapper.nix
@@ -2,9 +2,9 @@
## various stuff that can be plugged in
, flashplayer, hal-flash
-, ffmpeg, xorg, libpulseaudio, libcanberra-gtk2, libglvnd
+, ffmpeg, xorg, alsaLib, libpulseaudio, libcanberra-gtk2, libglvnd
, gnome3/*.gnome-shell*/
-, browserpass, chrome-gnome-shell, uget-integrator, plasma-browser-integration, bukubrow
+, browserpass, chrome-gnome-shell, uget-integrator, plasma5, bukubrow
, tridactyl-native
, fx_cast_bridge
, udev
@@ -39,6 +39,7 @@ let
enableAdobeFlash = cfg.enableAdobeFlash or false;
ffmpegSupport = browser.ffmpegSupport or false;
gssSupport = browser.gssSupport or false;
+ alsaSupport = browser.alsaSupport or false;
plugins =
let
@@ -64,7 +65,7 @@ let
++ lib.optional (cfg.enableTridactylNative or false) tridactyl-native
++ lib.optional (cfg.enableGnomeExtensions or false) chrome-gnome-shell
++ lib.optional (cfg.enableUgetIntegrator or false) uget-integrator
- ++ lib.optional (cfg.enablePlasmaBrowserIntegration or false) plasma-browser-integration
+ ++ lib.optional (cfg.enablePlasmaBrowserIntegration or false) plasma5.plasma-browser-integration
++ lib.optional (cfg.enableFXCastBridge or false) fx_cast_bridge
++ extraNativeMessagingHosts
);
@@ -76,6 +77,7 @@ let
(with xorg; [ stdenv.cc libX11 libXxf86dga libXxf86vm libXext libXt alsaLib zlib ])
++ lib.optional (enableAdobeFlash && (cfg.enableAdobeFlashDRM or false)) hal-flash
++ lib.optional (config.pulseaudio or true) libpulseaudio
+ ++ lib.optional alsaSupport alsaLib
++ pkcs11Modules;
gtk_modules = [ libcanberra-gtk2 ];
diff --git a/third_party/nixpkgs/pkgs/applications/networking/browsers/google-chrome/default.nix b/third_party/nixpkgs/pkgs/applications/networking/browsers/google-chrome/default.nix
index fb261c2860..727090a4c5 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/browsers/google-chrome/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/browsers/google-chrome/default.nix
@@ -150,7 +150,10 @@ in stdenv.mkDerivation {
description = "A freeware web browser developed by Google";
homepage = "https://www.google.com/chrome/browser/";
license = licenses.unfree;
- maintainers = [ maintainers.msteen ];
+ maintainers = with maintainers; [ primeos msteen ];
+ # Note from primeos: By updating Chromium I also update Google Chrome and
+ # will try to merge PRs and respond to issues but I'm not actually using
+ # Google Chrome. msteen is the actual user/maintainer.
platforms = [ "x86_64-linux" ];
};
}
diff --git a/third_party/nixpkgs/pkgs/applications/networking/cloudflared/default.nix b/third_party/nixpkgs/pkgs/applications/networking/cloudflared/default.nix
index 47e2cc04b3..d61d32e40e 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/cloudflared/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/cloudflared/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "cloudflared";
- version = "2020.10.0";
+ version = "2020.10.2";
src = fetchFromGitHub {
owner = "cloudflare";
repo = "cloudflared";
rev = version;
- sha256 = "1ssmyll13pf19fxq34iw4x7ps8p4mcg9nwlx00hp5sahhwx4iz01";
+ sha256 = "0ppl74gb46r2x65hl7z1hjdqlr8la0pvhy8af8isk11sbxmprqjj";
};
vendorSha256 = null;
diff --git a/third_party/nixpkgs/pkgs/applications/networking/cluster/atlantis/default.nix b/third_party/nixpkgs/pkgs/applications/networking/cluster/atlantis/default.nix
index d3e18ce691..15c5f0e97c 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/cluster/atlantis/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/cluster/atlantis/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "atlantis";
- version = "0.15.0";
+ version = "0.15.1";
src = fetchFromGitHub {
owner = "runatlantis";
repo = "atlantis";
rev = "v${version}";
- sha256 = "0nb0dm4yn6f5pw7clgb2d1khcwcxiidqyc0sdh38wwqg0zyil0cz";
+ sha256 = "0xxg48f28ac7x6kap6w1hgsimdc604ivkck4dx7p5p7xd3s7gld5";
};
vendorSha256 = null;
diff --git a/third_party/nixpkgs/pkgs/applications/networking/cluster/helm/default.nix b/third_party/nixpkgs/pkgs/applications/networking/cluster/helm/default.nix
index 7a5ecc5c80..a0daba8d8f 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/cluster/helm/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/cluster/helm/default.nix
@@ -2,15 +2,15 @@
buildGoModule rec {
pname = "helm";
- version = "3.3.4";
+ version = "3.4.0";
src = fetchFromGitHub {
owner = "helm";
repo = "helm";
rev = "v${version}";
- sha256 = "1b719kzchgis4imscgf6i7dvc1mq3ymgh5ganpb89kcs88qw3szj";
+ sha256 = "1z5s8c6yrc1v2y54lx2mbyz31schzpaz2r304m0wwxhn06p43sl0";
};
- vendorSha256 = "0f8a0psvic923rh13f5041p7hr6w8dy9qxdw3l195yky5cf3fj6w";
+ vendorSha256 = "0vcvmbvfmj0bi5msjhy9qcqabiscjpfqpnb1lxy49mshs902qc14";
doCheck = false;
diff --git a/third_party/nixpkgs/pkgs/applications/networking/cluster/helmfile/default.nix b/third_party/nixpkgs/pkgs/applications/networking/cluster/helmfile/default.nix
index 8cd9a230be..f8c7ce2254 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/cluster/helmfile/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/cluster/helmfile/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "helmfile";
- version = "0.131.0";
+ version = "0.132.1";
src = fetchFromGitHub {
owner = "roboll";
repo = "helmfile";
rev = "v${version}";
- sha256 = "1jhmw916acf0i3wji0i1srni90n2rxax95y09h1zszpccw60x4bf";
+ sha256 = "03i9pl3iwqk5az73qm9rxdq8c5nd9l4w3c28yk55bfgpwpnxcwjc";
};
- vendorSha256 = "1r94yc9b57jvpa2mhnla32nxa01rh9s7zf8qjgcpw63hm20mbbgc";
+ vendorSha256 = "0r4p4nwhmxg06qyf86gd2g61l4r1mlpblh4vhsc1shbz9iigykzi";
doCheck = false;
diff --git a/third_party/nixpkgs/pkgs/applications/networking/cluster/istioctl/default.nix b/third_party/nixpkgs/pkgs/applications/networking/cluster/istioctl/default.nix
index f6619c9f19..053035e629 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/cluster/istioctl/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/cluster/istioctl/default.nix
@@ -2,15 +2,15 @@
buildGoModule rec {
pname = "istioctl";
- version = "1.7.3";
+ version = "1.7.4";
src = fetchFromGitHub {
owner = "istio";
repo = "istio";
rev = version;
- sha256 = "1w0ddz2am053bpi0jrn5v3b76jf2z4nl7zv0i1z2v9xcx59bxkac";
+ sha256 = "1vy6y6gk7ljnrb7cxxaa60i4ycylsrd2yszbly1aaz5vnh1vsfz9";
};
- vendorSha256 = "02l13hzk5aikpylalsm35v27cljcl4z0qka9a4m125bc4rj2kp7k";
+ vendorSha256 = "0f2n8mwnj9i4qifs0f63jrgr61mjs3c1arxnny723i5pialj3zdl";
doCheck = false;
diff --git a/third_party/nixpkgs/pkgs/applications/networking/cluster/jx/default.nix b/third_party/nixpkgs/pkgs/applications/networking/cluster/jx/default.nix
index 6fbec33180..1f1eb3e854 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/cluster/jx/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/cluster/jx/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "jx";
- version = "2.1.138";
+ version = "2.1.149";
src = fetchFromGitHub {
owner = "jenkins-x";
repo = "jx";
rev = "v${version}";
- sha256 = "1i45gzaql6rfplliky56lrzwjnm2qzv25kgyq7gvn9c7hjaaq65b";
+ sha256 = "0jgny09wpfab8mkxkhv9swp1baqx3lxsx75a5i78cypkj6xadc69";
};
- vendorSha256 = "1wvggarakshpw7m8h0x2zvd6bshd2kzbrjynfa113z90pgksvjng";
+ vendorSha256 = "1fswrf14nwjm0z8qqgdx236w7w1m451lyfinhx9pyp89fw2h5mv6";
doCheck = false;
@@ -35,7 +35,7 @@ buildGoModule rec {
'';
meta = with lib; {
- description = "JX is a command line tool for installing and using Jenkins X";
+ description = "Command line tool for installing and using Jenkins X";
homepage = "https://jenkins-x.io";
longDescription = ''
Jenkins X provides automated CI+CD for Kubernetes with Preview
diff --git a/third_party/nixpkgs/pkgs/applications/networking/cluster/k3s/default.nix b/third_party/nixpkgs/pkgs/applications/networking/cluster/k3s/default.nix
index ca0da973f2..ae98fbbcc2 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/cluster/k3s/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/cluster/k3s/default.nix
@@ -9,6 +9,7 @@
, buildGoPackage
, git
, runc
+, kmod
, libseccomp
, pkgconfig
, ethtool
@@ -226,6 +227,7 @@ stdenv.mkDerivation rec {
# https://github.com/kubernetes/kubernetes/issues/26093#issuecomment-237202494
# Note the list in that issue is stale and some aren't relevant for k3s.
k3sRuntimeDeps = [
+ kmod
socat
iptables
iproute
diff --git a/third_party/nixpkgs/pkgs/applications/networking/cluster/k9s/default.nix b/third_party/nixpkgs/pkgs/applications/networking/cluster/k9s/default.nix
index 575bc5a506..f26697f056 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/cluster/k9s/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/cluster/k9s/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "k9s";
- version = "0.22.1";
+ version = "0.23.3";
src = fetchFromGitHub {
owner = "derailed";
repo = "k9s";
rev = "v${version}";
- sha256 = "1qyibpvfbd8yahfmci431qd0zy4wwz03gwj1ak8rn3qxpv1cdbmk";
+ sha256 = "0jdrjsv6miprw0bj964rgkbci4xdwfi536z3px93i2n9zrhhawpn";
};
buildFlagsArray = ''
@@ -18,7 +18,7 @@ buildGoModule rec {
-X github.com/derailed/k9s/cmd.commit=${src.rev}
'';
- vendorSha256 = "1432ppgd3lc0h83i6vzklfhp95s2xwaf41mv4xfryzzszjfndmvl";
+ vendorSha256 = "105vmy8agl3ppgi28wg7djx0jrfam7nxfvvlps9ycgyrv2qpjh2n";
doCheck = false;
diff --git a/third_party/nixpkgs/pkgs/applications/networking/cluster/kpt/default.nix b/third_party/nixpkgs/pkgs/applications/networking/cluster/kpt/default.nix
index 9b43f143bd..e50f6e3462 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/cluster/kpt/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/cluster/kpt/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "kpt";
- version = "0.35.0";
+ version = "0.36.1";
src = fetchFromGitHub {
owner = "GoogleContainerTools";
repo = pname;
rev = "v${version}";
- sha256 = "0pk4j809hh4hkr58wx42vyzcn2g7l2lb60f4j1837hkk3rwrxkpm";
+ sha256 = "0j9a7lxspgw63xzz1f8r5fb67jxm5isdvfi5450v20virxch9afi";
};
- vendorSha256 = "0c5ycyjhzz18ny544ddrag39la0fl0d3zrbbv8szb5jx87jx67jj";
+ vendorSha256 = "06kx85bf8mjmyhz5gp0la4fr8psnfz6i2rchc22sz2pgmsng1dfr";
subPackages = [ "." ];
diff --git a/third_party/nixpkgs/pkgs/applications/networking/cluster/kubeseal/default.nix b/third_party/nixpkgs/pkgs/applications/networking/cluster/kubeseal/default.nix
index 51b53ed8fa..51ae1202a3 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/cluster/kubeseal/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/cluster/kubeseal/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "kubeseal";
- version = "0.12.6";
+ version = "0.13.1";
src = fetchFromGitHub {
owner = "bitnami-labs";
repo = "sealed-secrets";
rev = "v${version}";
- sha256 = "0h8v751jf8hws8zcai6vfsk5vmq6f9kwz2dg79l6xa0dfc2rv4zf";
+ sha256 = "1hlj7i7pjyvrf9cpx6s41sdn7wjwfk7c0akx45kw662vrxcqcgf2";
};
vendorSha256 = null;
diff --git a/third_party/nixpkgs/pkgs/applications/networking/cluster/kubeval/default.nix b/third_party/nixpkgs/pkgs/applications/networking/cluster/kubeval/default.nix
index 72dfe3ecc3..d26f8ed5dc 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/cluster/kubeval/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/cluster/kubeval/default.nix
@@ -7,7 +7,7 @@ buildGoModule rec {
src = fetchFromGitHub {
owner = "instrumenta";
repo = "kubeval";
- rev = "${version}";
+ rev = version;
sha256 = "05li0qv4q7fy2lr50r6c1r8dhx00jb1g01qmgc72a9zqp378yiq0";
};
diff --git a/third_party/nixpkgs/pkgs/applications/networking/cluster/popeye/default.nix b/third_party/nixpkgs/pkgs/applications/networking/cluster/popeye/default.nix
index ff180bdc9b..6e7eccac20 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/cluster/popeye/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/cluster/popeye/default.nix
@@ -2,24 +2,24 @@
buildGoModule rec {
pname = "popeye";
- version = "0.8.10";
+ version = "0.9.0";
src = fetchFromGitHub {
rev = "v${version}";
owner = "derailed";
repo = "popeye";
- sha256 = "1cx39xipvvhb12nhvg7kfssnqafajni662b070ynlw8p870bj0sn";
+ sha256 = "1rslmcdjs53zvv0xaf00vxqsfc3jh2p584j3q6nfgrghc978xmpf";
};
buildFlagsArray = ''
-ldflags=
-s -w
-X github.com/derailed/popeye/cmd.version=${version}
- -X github.com/derailed/popeye/cmd.commit=b7a876eafd4f7ec5683808d8d6880c41c805056a
- -X github.com/derailed/popeye/cmd.date=2020-08-25T23:02:30Z
+ -X github.com/derailed/popeye/cmd.commit=022c3104b642aab6bdb287468fb79068a33e1b0d
+ -X github.com/derailed/popeye/cmd.date=2020-10-31T16:44:45Z
'';
- vendorSha256 = "0b2bawc9wnqwgvrv614rq5y4ns9di65zqcbb199y2ijpsaw5d9a7";
+ vendorSha256 = "08195dnka7rs38py3kjii9zh9nifg2fnbi1wzjl0pc38i2bbrz0k";
doCheck = false;
diff --git a/third_party/nixpkgs/pkgs/applications/networking/cluster/prow/default.nix b/third_party/nixpkgs/pkgs/applications/networking/cluster/prow/default.nix
index 60e79ed669..b1ea88a11a 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/cluster/prow/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/cluster/prow/default.nix
@@ -52,7 +52,7 @@ buildGoModule rec {
];
meta = with lib; {
- description = "Prow is a Kubernetes based CI/CD system";
+ description = "A Kubernetes based CI/CD system";
longDescription = ''
Prow is a Kubernetes based CI/CD system. Jobs can be triggered by various
types of events and report their status to many different services. In
diff --git a/third_party/nixpkgs/pkgs/applications/networking/cluster/terraform-providers/cloudfoundry/default.nix b/third_party/nixpkgs/pkgs/applications/networking/cluster/terraform-providers/cloudfoundry/default.nix
new file mode 100644
index 0000000000..7e807d2ed5
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/applications/networking/cluster/terraform-providers/cloudfoundry/default.nix
@@ -0,0 +1,29 @@
+{ stdenv, buildGoModule, fetchFromGitHub }:
+
+buildGoModule rec {
+ pname = "terraform-provider-cloudfoundry";
+ version = "0.12.6";
+
+ src = fetchFromGitHub {
+ owner = "cloudfoundry-community";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "0n5ybpzk6zkrnd9vpmbjlkm8fdp7nbfr046wih0jk72pmiyrcygi";
+ };
+
+ vendorSha256 = "01lfsd9aw9w3kr1a2a5b7ac6d8jaij83lhxl4y4qsnjlqk86fbxq";
+
+ # needs a running cloudfoundry
+ doCheck = false;
+
+ postInstall = "mv $out/bin/terraform-provider-cloudfoundry{,_v${version}}";
+
+ passthru = { provider-source-address = "registry.terraform.io/cloudfoundry-community/cloudfoundry"; };
+
+ meta = with stdenv.lib; {
+ homepage = "https://github.com/cloudfoundry-community/terraform-provider-cloudfoundry";
+ description = "Terraform provider for cloudfoundry";
+ license = licenses.mpl20;
+ maintainers = with maintainers; [ ris ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/applications/networking/cluster/terraform-providers/default.nix b/third_party/nixpkgs/pkgs/applications/networking/cluster/terraform-providers/default.nix
index 24c6dd21cd..a75500c8eb 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/cluster/terraform-providers/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/cluster/terraform-providers/default.nix
@@ -161,6 +161,7 @@ let
# Packages that don't fit the default model
ansible = callPackage ./ansible {};
+ cloudfoundry = callPackage ./cloudfoundry {};
elasticsearch = callPackage ./elasticsearch {};
gandi = callPackage ./gandi {};
keycloak = callPackage ./keycloak {};
diff --git a/third_party/nixpkgs/pkgs/applications/networking/cluster/terraform-providers/providers.json b/third_party/nixpkgs/pkgs/applications/networking/cluster/terraform-providers/providers.json
index bd7c50dba2..29bbac6f70 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/cluster/terraform-providers/providers.json
+++ b/third_party/nixpkgs/pkgs/applications/networking/cluster/terraform-providers/providers.json
@@ -934,6 +934,14 @@
"sha256": "1cl83afm00fflsd3skynjvncid3r74fkxfznrs1v8qypcg1j79g1",
"version": "0.18.0"
},
+ "time": {
+ "owner": "hashicorp",
+ "provider-source-address": "registry.terraform.io/hashicorp/time",
+ "repo": "terraform-provider-time",
+ "rev": "v0.6.0",
+ "sha256": "0fb81hisjicib9rzbn51jqfrchyjd3hzq98adnf22cbra8wlnxlm",
+ "version": "0.6.0"
+ },
"tls": {
"owner": "hashicorp",
"provider-source-address": "registry.terraform.io/hashicorp/tls",
diff --git a/third_party/nixpkgs/pkgs/applications/networking/compactor/default.nix b/third_party/nixpkgs/pkgs/applications/networking/compactor/default.nix
index 5d9a658972..97a2f6992f 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/compactor/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/compactor/default.nix
@@ -4,13 +4,13 @@
stdenv.mkDerivation rec {
pname = "compactor";
- version = "0.12.2";
+ version = "1.0.0";
src = fetchFromGitHub {
owner = "dns-stats";
repo = pname;
rev = version;
- sha256 = "17p9wsslsh6ifnadvyygr0cgir4q4iirxfz9zpkpbhh76cx2qnay";
+ sha256 = "0x5rwbv0ndf9zcvnsbd78ic6shh9hd0bh3gh0lzz9wlb99lslbkk";
};
# cbor-diag, cddl and wireshark-cli are only used for tests.
diff --git a/third_party/nixpkgs/pkgs/applications/networking/datovka/default.nix b/third_party/nixpkgs/pkgs/applications/networking/datovka/default.nix
index f004a807aa..2e598b1a76 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/datovka/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/datovka/default.nix
@@ -11,11 +11,11 @@
mkDerivation rec {
pname = "datovka";
- version = "4.15.2";
+ version = "4.15.5";
src = fetchurl {
url = "https://secure.nic.cz/files/datove_schranky/${version}/${pname}-${version}.tar.xz";
- sha256 = "0vna3vaivi6w7nlkwpqhwmyly0s1d5y2yg51br2f918pjhp2cp7q";
+ sha256 = "1mnw1m3wjkw8rfh6fwwrhfmkna6j19pza9cs7kyp8qj1fzzqi8my";
};
buildInputs = [ libisds qmake qtbase qtsvg libxml2 ];
diff --git a/third_party/nixpkgs/pkgs/applications/networking/google-drive-ocamlfuse/default.nix b/third_party/nixpkgs/pkgs/applications/networking/google-drive-ocamlfuse/default.nix
index b9b1c1f54a..72ff8bd8b4 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/google-drive-ocamlfuse/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/google-drive-ocamlfuse/default.nix
@@ -8,6 +8,8 @@ buildDunePackage rec {
useDune2 = true;
+ minimumOCamlVersion = "4.06";
+
src = fetchFromGitHub {
owner = "astrada";
repo = "google-drive-ocamlfuse";
diff --git a/third_party/nixpkgs/pkgs/applications/networking/ids/zeek/default.nix b/third_party/nixpkgs/pkgs/applications/networking/ids/zeek/default.nix
index a6189da7ee..713156a662 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/ids/zeek/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/ids/zeek/default.nix
@@ -21,11 +21,11 @@ let
in
stdenv.mkDerivation rec {
pname = "zeek";
- version = "3.2.1";
+ version = "3.2.2";
src = fetchurl {
url = "https://download.zeek.org/zeek-${version}.tar.gz";
- sha256 = "0rybs79h0sq12vsayah8dixqac404z84rlvqynvzf3dh2lwcgg0y";
+ sha256 = "00cxz7ad7p62s2glcagzcvwbnsivrv4bmz6rl1vij907jb24hmvc";
};
nativeBuildInputs = [ cmake flex bison file ];
diff --git a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/bluejeans/default.nix b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/bluejeans/default.nix
index f8bcdc4bef..8b63483405 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/bluejeans/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/bluejeans/default.nix
@@ -39,11 +39,12 @@
stdenv.mkDerivation rec {
pname = "bluejeans";
- version = "2.4.0";
+ version = "2.17.0";
+ buildNumber = "11";
src = fetchurl {
- url = "https://swdl.bluejeans.com/desktop-app/linux/${version}/BlueJeans.rpm";
- sha256 = "180hc854ngwfn6y6nsrfn74rv78cxhq6sgshrca5zqv6wq3l98g0";
+ url = "https://swdl.bluejeans.com/desktop-app/linux/${version}/BlueJeans_${version}.${buildNumber}.rpm";
+ sha256 = "1h5jbnp5bwy6bpma9a1ia08v7bpz09fm66jsip470k1r7vjjwa68";
};
nativeBuildInputs = [ rpmextract makeWrapper ];
diff --git a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/cordless/default.nix b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/cordless/default.nix
index a262b04874..1b475bdee8 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/cordless/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/cordless/default.nix
@@ -2,18 +2,18 @@
buildGoModule rec {
pname = "cordless";
- version = "2020-08-30";
+ version = "2020-10-24";
src = fetchFromGitHub {
owner = "Bios-Marcel";
repo = pname;
rev = version;
- sha256 = "sha256-CwOI7Ah4+sxD9We+Va5a6jYat5mjOeBk2EsOfwskz6k=";
+ sha256 = "18j8yrnipiivc49jwbb0ipgqwdi249fs9zxxz8qx8jfq77imvwbq";
};
subPackages = [ "." ];
- vendorSha256 = "sha256-01I7GrZkaskuz20kVK2YwqvP7ViPMlQ3BFaoLHwgvOE=";
+ vendorSha256 = "1h47aqf8bmyqvaayfj16br1402qzy7kf8rk96f3vnsyvsnkg5gw5";
meta = with stdenv.lib; {
homepage = "https://github.com/Bios-Marcel/cordless";
diff --git a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/element/element-desktop-package.json b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/element/element-desktop-package.json
index 05f7af3324..364f5a25d0 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/element/element-desktop-package.json
+++ b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/element/element-desktop-package.json
@@ -2,7 +2,7 @@
"name": "element-desktop",
"productName": "Element",
"main": "src/electron-main.js",
- "version": "1.7.10",
+ "version": "1.7.12",
"description": "A feature-rich client for Matrix.org",
"author": "Element",
"repository": {
@@ -62,7 +62,7 @@
},
"build": {
"appId": "im.riot.app",
- "electronVersion": "10.1.1",
+ "electronVersion": "10.1.3",
"files": [
"package.json",
{
diff --git a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/element/element-desktop-yarndeps.nix b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/element/element-desktop-yarndeps.nix
index 2a611aa630..21374014c8 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/element/element-desktop-yarndeps.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/element/element-desktop-yarndeps.nix
@@ -4394,11 +4394,11 @@
};
}
{
- name = "npm_user_validate___npm_user_validate_1.0.0.tgz";
+ name = "npm_user_validate___npm_user_validate_1.0.1.tgz";
path = fetchurl {
- name = "npm_user_validate___npm_user_validate_1.0.0.tgz";
- url = "https://registry.yarnpkg.com/npm-user-validate/-/npm-user-validate-1.0.0.tgz";
- sha1 = "8ceca0f5cea04d4e93519ef72d0557a75122e951";
+ name = "npm_user_validate___npm_user_validate_1.0.1.tgz";
+ url = "https://registry.yarnpkg.com/npm-user-validate/-/npm-user-validate-1.0.1.tgz";
+ sha1 = "31428fc5475fe8416023f178c0ab47935ad8c561";
};
}
{
diff --git a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/element/element-desktop.nix b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/element/element-desktop.nix
index cb5e598c12..b31841c5e7 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/element/element-desktop.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/element/element-desktop.nix
@@ -8,12 +8,12 @@
let
executableName = "element-desktop";
- version = "1.7.10";
+ version = "1.7.12";
src = fetchFromGitHub {
owner = "vector-im";
repo = "riot-desktop";
rev = "v${version}";
- sha256 = "06ygqfhbsld4s274kakb6a5nx75jki44r8lwk3n0pi5mnkn626gl";
+ sha256 = "08d9llrglap5bbicdkbdl9l71wba2kkyhdyd0a4iqdz3l2jvv698";
};
electron = electron_9;
diff --git a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/element/element-web.nix b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/element/element-web.nix
index a71bc08637..0d3e771630 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/element/element-web.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/element/element-web.nix
@@ -12,11 +12,11 @@ let
in stdenv.mkDerivation rec {
pname = "element-web";
- version = "1.7.10";
+ version = "1.7.12";
src = fetchurl {
url = "https://github.com/vector-im/riot-web/releases/download/v${version}/riot-v${version}.tar.gz";
- sha256 = "1xcvydjpdp6cy5g0da5yaa49gjxsmf4hsyi2q4l3p8qvs4qajn0r";
+ sha256 = "173hdg09cw13vqh0lvz6kl0mq4i3rsacjxhspkpydh2qd1g3hjrs";
};
installPhase = ''
diff --git a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/ferdi/default.nix b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/ferdi/default.nix
index e0f56e2783..190050d832 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/ferdi/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/ferdi/default.nix
@@ -9,7 +9,7 @@ mkFranzDerivation rec {
sha256 = "0i24vcnq4iz5amqmn2fgk92ff9x9y7fg8jhc3g6ksvmcfly7af3k";
};
meta = with stdenv.lib; {
- description = "Ferdi allows you to combine your favorite messaging services into one application";
+ description = "Combine your favorite messaging services into one application";
homepage = "https://getferdi.com/";
license = licenses.free;
maintainers = [ maintainers.davidtwco ];
diff --git a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/gajim/default.nix b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/gajim/default.nix
index 2ee017dfdb..eef24f75f1 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/gajim/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/gajim/default.nix
@@ -60,6 +60,9 @@ python3.pkgs.buildPythonApplication rec {
${python3.interpreter} setup.py test
'';
+ # necessary for wrapGAppsHook
+ strictDeps = false;
+
meta = {
homepage = "http://gajim.org/";
description = "Jabber client written in PyGTK";
diff --git a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/gomuks/default.nix b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/gomuks/default.nix
index c98fd9e804..00134e2597 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/gomuks/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/gomuks/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "gomuks";
- version = "0.2.0";
+ version = "0.2.1";
src = fetchFromGitHub {
owner = "tulir";
repo = pname;
rev = "v" + version;
- sha256 = "0sf1nqwimxqql8wm6763jyc5rclhd4zxgg9gfi0qvg5ccm1r1z5q";
+ sha256 = "0xa4ch4p48w6sd0f4s1sp0hl1w4fvzhff7w2ar19ki0ydy5g368n";
};
- vendorSha256 = "sha256:0n9mwbzjkvlljlns7sby8nb9gm4vj0v4idp1zxv5xssqr5qalihf";
+ vendorSha256 = "1rhvwk8bdbbffhx2d03a8p9jc5c8v3pi7kw1dmyyngz6p7wq1g0x";
doCheck = false;
diff --git a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/psi/default.nix b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/psi/default.nix
index c1984a218c..9f841f50da 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/psi/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/psi/default.nix
@@ -22,7 +22,7 @@ stdenv.mkDerivation rec {
];
enableParallelBuilding = true;
meta = with stdenv.lib; {
- description = "Psi, an XMPP (Jabber) client";
+ description = "An XMPP (Jabber) client";
maintainers = [ maintainers.raskin ];
license = licenses.gpl2;
platforms = stdenv.lib.platforms.linux;
diff --git a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/quaternion/default.nix b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/quaternion/default.nix
index b1577a3784..c031615a90 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/quaternion/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/quaternion/default.nix
@@ -10,7 +10,7 @@ mkDerivation rec {
src = fetchFromGitHub {
owner = "QMatrixClient";
repo = "Quaternion";
- rev = "${version}";
+ rev = version;
sha256 = "0hqhg7l6wpkdbzrdjvrbqymmahziri07ba0hvbii7dd2p0h248fv";
};
diff --git a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/skype-call-recorder/conference.patch b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/skype-call-recorder/conference.patch
deleted file mode 100644
index 8b8ce8fd7b..0000000000
--- a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/skype-call-recorder/conference.patch
+++ /dev/null
@@ -1,148 +0,0 @@
-From abd67f1d44eef81baf2e9729f95e002c4ecc7350 Mon Sep 17 00:00:00 2001
-From: jlh
-Date: Fri, 16 Oct 2009 17:40:54 +0200
-Subject: [PATCH] Rudimentary support for recording hosted conference calls
-
----
- call.cpp | 37 +++++++++++++++++++++++++++++++++++--
- call.h | 11 ++++++++++-
- 2 files changed, 45 insertions(+), 3 deletions(-)
-
-diff --git a/call.cpp b/call.cpp
-index c2b02f2..663c1c1 100644
---- a/call.cpp
-+++ b/call.cpp
-@@ -90,9 +90,10 @@ void AutoSync::reset() {
-
- // Call class
-
--Call::Call(QObject *p, Skype *sk, CallID i) :
-- QObject(p),
-+Call::Call(CallHandler *h, Skype *sk, CallID i) :
-+ QObject(h),
- skype(sk),
-+ handler(h),
- id(i),
- status("UNKNOWN"),
- writer(NULL),
-@@ -119,6 +120,13 @@ Call::Call(QObject *p, Skype *sk, CallID i) :
- debug(QString("Call %1: cannot get partner display name").arg(id));
- displayName = "Unnamed Caller";
- }
-+
-+ // Skype does not properly send updates when the CONF_ID property
-+ // changes. since we need this information, check it now on all calls
-+ handler->updateConfIDs();
-+ // this call isn't yet in the list of calls, thus we need to
-+ // explicitely check its CONF_ID
-+ updateConfID();
- }
-
- Call::~Call() {
-@@ -134,6 +142,10 @@ Call::~Call() {
- // QT takes care of deleting servers and sockets
- }
-
-+void Call::updateConfID() {
-+ confID = skype->getObject(QString("CALL %1 CONF_ID").arg(id)).toLong();
-+}
-+
- bool Call::okToDelete() const {
- // this is used for checking whether past calls may now be deleted.
- // when a past call hasn't been decided yet whether it should have been
-@@ -270,6 +282,11 @@ void Call::startRecording(bool force) {
- if (isRecording)
- return;
-
-+ if (handler->isConferenceRecording(confID)) {
-+ debug(QString("Call %1: call is part of a conference that is already being recorded").arg(id));
-+ return;
-+ }
-+
- if (force) {
- emit showLegalInformation();
- } else {
-@@ -589,6 +606,22 @@ CallHandler::~CallHandler() {
- delete legalInformationDialog;
- }
-
-+void CallHandler::updateConfIDs() {
-+ QList list = calls.values();
-+ for (int i = 0; i < list.size(); i++)
-+ list.at(i)->updateConfID();
-+}
-+
-+bool CallHandler::isConferenceRecording(CallID id) const {
-+ QList list = calls.values();
-+ for (int i = 0; i < list.size(); i++) {
-+ Call *c = list.at(i);
-+ if (c->getConfID() == id && c->getIsRecording())
-+ return true;
-+ }
-+ return false;
-+}
-+
- void CallHandler::callCmd(const QStringList &args) {
- CallID id = args.at(0).toInt();
-
-diff --git a/call.h b/call.h
-index cb8396d..b746f46 100644
---- a/call.h
-+++ b/call.h
-@@ -43,6 +43,8 @@ class QTcpServer;
- class QTcpSocket;
- class LegalInformationDialog;
-
-+class CallHandler;
-+
- typedef int CallID;
-
- class AutoSync {
-@@ -68,18 +70,21 @@ private:
- class Call : public QObject {
- Q_OBJECT
- public:
-- Call(QObject *, Skype *, CallID);
-+ Call(CallHandler *, Skype *, CallID);
- ~Call();
- void startRecording(bool = false);
- void stopRecording(bool = true);
-+ void updateConfID();
- bool okToDelete() const;
- void setStatus(const QString &);
- QString getStatus() const { return status; }
- bool statusDone() const;
- bool statusActive() const;
- CallID getID() const { return id; }
-+ CallID getConfID() const { return confID; }
- void removeFile();
- void hideConfirmation(int);
-+ bool getIsRecording() const { return isRecording; }
-
- signals:
- void startedCall(int, const QString &);
-@@ -99,10 +104,12 @@ private:
-
- private:
- Skype *skype;
-+ CallHandler *handler;
- CallID id;
- QString status;
- QString skypeName;
- QString displayName;
-+ CallID confID;
- AudioFileWriter *writer;
- bool isRecording;
- int stereo;
-@@ -140,6 +147,8 @@ class CallHandler : public QObject {
- public:
- CallHandler(QObject *, Skype *);
- ~CallHandler();
-+ void updateConfIDs();
-+ bool isConferenceRecording(CallID) const;
- void callCmd(const QStringList &);
-
- signals:
---
-1.6.5.GIT
-
diff --git a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/skype-call-recorder/default.nix b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/skype-call-recorder/default.nix
deleted file mode 100644
index 57d1ffece7..0000000000
--- a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/skype-call-recorder/default.nix
+++ /dev/null
@@ -1,28 +0,0 @@
-{ stdenv, fetchurl, cmake, lame, id3lib, libvorbis, qt4, libogg }:
-
-stdenv.mkDerivation {
- name = "skype-call-recorder-0.8";
- src = fetchurl {
- url = "https://atdot.ch/scr/files/0.8/skype-call-recorder-0.8.tar.gz";
- sha256 = "1iijkhq3aj9gr3bx6zl8ryvzkqcdhsm9yisimakwq0lnw0lgf5di";
- };
-
- # Keep an rpath reference to the used libogg
- prePatch = ''
- sed -i -e '/ADD_EXECUTABLE/aSET(LIBRARIES ''${LIBRARIES} ogg)' CMakeLists.txt
- '';
-
- # Better support for hosted conferences
- patches = [ ./conference.patch ];
-
- buildInputs = [ cmake lame id3lib libvorbis qt4 libogg ];
- NIX_LDFLAGS = "-lvorbis";
-
- meta = {
- homepage = "http://atdot.ch/scr/";
- description = "Open source tool to record your Skype calls on Linux";
- license = stdenv.lib.licenses.gpl2Plus;
- platforms = with stdenv.lib.platforms; linux;
- maintainers = with stdenv.lib.maintainers; [viric];
- };
-}
diff --git a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/slack/default.nix b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/slack/default.nix
index 2edccd8c01..bd41fc562b 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/slack/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/slack/default.nix
@@ -40,8 +40,8 @@ let
pname = "slack";
version = {
- x86_64-darwin = "4.9.0";
- x86_64-linux = "4.9.1";
+ x86_64-darwin = "4.10.3";
+ x86_64-linux = "4.10.3";
}.${system} or throwSystem;
src = let
@@ -49,11 +49,11 @@ let
in {
x86_64-darwin = fetchurl {
url = "${base}/releases/macos/${version}/prod/x64/Slack-${version}-macOS.dmg";
- sha256 = "007fflncvvclj4agb6g5hc5k9j5hhz1rpvlcfd8w31rn1vad4abk";
+ sha256 = "0r77l57vr603xamich4h4gbdd5vdcj0sjs6yjpymfx9s0f98v8bb";
};
x86_64-linux = fetchurl {
url = "${base}/linux_releases/slack-desktop-${version}-amd64.deb";
- sha256 = "1n8br5vlcnf13b8m6727hy4bkmd6wayss96ck4ba9zsjiyj7v74i";
+ sha256 = "1gnjj2iyk8cwjajg8h9qpmzx10j4qjxjzciq8csg45qfzwkr3drf";
};
}.${system} or throwSystem;
diff --git a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/teams/default.nix b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/teams/default.nix
index f116bf1e86..f1a2c137ad 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/teams/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/teams/default.nix
@@ -50,6 +50,10 @@ stdenv.mkDerivation rec {
--replace /usr/bin/ $out/bin/
ln -s $out/opt/teams/teams $out/bin/
+
+ # Work-around screen sharing bug
+ # https://docs.microsoft.com/en-us/answers/questions/42095/sharing-screen-not-working-anymore-bug.html
+ rm $out/opt/teams/resources/app.asar.unpacked/node_modules/slimcore/bin/rect-overlay
'';
dontAutoPatchelf = true;
diff --git a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/telegram/tdesktop/default.nix b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/telegram/tdesktop/default.nix
index 379922ee58..a754e544bc 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/telegram/tdesktop/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/telegram/tdesktop/default.nix
@@ -22,12 +22,12 @@ let
in mkDerivation rec {
pname = "telegram-desktop";
- version = "2.4.4";
+ version = "2.4.6";
# Telegram-Desktop with submodules
src = fetchurl {
url = "https://github.com/telegramdesktop/tdesktop/releases/download/v${version}/tdesktop-${version}-full.tar.gz";
- sha256 = "09lhikaybf57rki62miqcaxxrdg1ni2rj9aj4w9mrbzdv849fyc8";
+ sha256 = "190k9ik678br5k892gj26bx4rbj5rn5ks4qgf2nrlgww0z59fvrc";
};
postPatch = ''
diff --git a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/telegram/tdesktop/tg_owt-install.patch b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/telegram/tdesktop/tg_owt-install.patch
deleted file mode 100644
index bc8a23eb31..0000000000
--- a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/telegram/tdesktop/tg_owt-install.patch
+++ /dev/null
@@ -1,159 +0,0 @@
-diff --git a/CMakeLists.txt b/CMakeLists.txt
-index 6fbc0da..6cbff3c 100644
---- a/CMakeLists.txt
-+++ b/CMakeLists.txt
-@@ -1856,3 +1856,41 @@ configure_file(
- "${CMAKE_CURRENT_BINARY_DIR}/tg_owtConfig.cmake"
- COPYONLY
- )
-+
-+install(
-+TARGETS
-+ tg_owt
-+ libabsl
-+ libopenh264
-+ libpffft
-+ librnnoise
-+ libsrtp
-+ libusrsctp
-+ libvpx
-+ ${vpx_export}
-+ libwebrtcbuild
-+ libyuv
-+ ${platform_export}
-+EXPORT tg_owtTargets
-+RUNTIME DESTINATION ${CMAKE_INSTALL_BINDIR}
-+ARCHIVE DESTINATION ${CMAKE_INSTALL_LIBDIR}
-+LIBRARY DESTINATION ${CMAKE_INSTALL_LIBDIR}
-+INCLUDES DESTINATION ${CMAKE_INSTALL_INCLUDEDIR}
-+)
-+
-+install(
-+ DIRECTORY ${CMAKE_CURRENT_LIST_DIR}/src/
-+ DESTINATION ${CMAKE_INSTALL_INCLUDEDIR}
-+ FILES_MATCHING PATTERN "*.h"
-+)
-+
-+install(
-+ EXPORT tg_owtTargets
-+ NAMESPACE tg_owt::
-+ DESTINATION ${CMAKE_INSTALL_LIBDIR}/cmake/tg_owt
-+)
-+
-+install(
-+ FILES ${CMAKE_CURRENT_BINARY_DIR}/tg_owtConfig.cmake
-+ DESTINATION ${CMAKE_INSTALL_LIBDIR}/cmake/tg_owt
-+)
-diff --git a/cmake/libabsl.cmake b/cmake/libabsl.cmake
-index 2fb3b8c..4a4f85b 100644
---- a/cmake/libabsl.cmake
-+++ b/cmake/libabsl.cmake
-@@ -123,5 +123,6 @@ PRIVATE
-
- target_include_directories(libabsl
- PUBLIC
-- ${libabsl_loc}
-+ $
-+ $
- )
-diff --git a/cmake/libpffft.cmake b/cmake/libpffft.cmake
-index a6ceb3e..435d3a3 100644
---- a/cmake/libpffft.cmake
-+++ b/cmake/libpffft.cmake
-@@ -24,5 +24,6 @@ endif()
-
- target_include_directories(libpffft
- PUBLIC
-- ${libpffft_loc}
-+ $
-+ $
- )
-diff --git a/cmake/libsrtp.cmake b/cmake/libsrtp.cmake
-index 57c54b5..26b3466 100644
---- a/cmake/libsrtp.cmake
-+++ b/cmake/libsrtp.cmake
-@@ -30,6 +30,8 @@ PRIVATE
-
- target_include_directories(libsrtp
- PUBLIC
-- ${libsrtp_loc}/include
-- ${libsrtp_loc}/crypto/include
-+ $
-+ $
-+ $
-+ $
- )
-diff --git a/cmake/libusrsctp.cmake b/cmake/libusrsctp.cmake
-index caa0529..38d2ef6 100644
---- a/cmake/libusrsctp.cmake
-+++ b/cmake/libusrsctp.cmake
-@@ -67,6 +67,8 @@ endif()
-
- target_include_directories(libusrsctp
- PUBLIC
-- ${third_party_loc}/usrsctp/usrsctplib
-- ${libusrsctp_loc}
-+ $
-+ $
-+ $
-+ $
- )
-diff --git a/cmake/libvpx.cmake b/cmake/libvpx.cmake
-index e192e7e..78cf25b 100644
---- a/cmake/libvpx.cmake
-+++ b/cmake/libvpx.cmake
-@@ -68,6 +68,11 @@ else()
- set(ASM_SUFFIX ".asm.S")
- endif()
-
-+foreach(dir ${include_directories})
-+ string(REPLACE ${libvpx_loc} include/third_party/libvpx install_include_dir ${dir})
-+ list(APPEND install_include_directories ${install_include_dir})
-+endforeach()
-+
- function(add_sublibrary postfix)
- add_library(libvpx_${postfix} OBJECT)
- init_feature_target(libvpx_${postfix} ${postfix})
-@@ -75,6 +80,8 @@ function(add_sublibrary postfix)
- target_include_directories(libvpx_${postfix}
- PRIVATE
- ${include_directories}
-+ "$"
-+ "$"
- )
- set(sources_list ${ARGV})
- list(REMOVE_AT sources_list 0)
-@@ -725,5 +732,6 @@ endif()
-
- target_include_directories(libvpx
- PUBLIC
-- ${include_directories}
-+ "$"
-+ "$"
- )
-diff --git a/cmake/libwebrtcbuild.cmake b/cmake/libwebrtcbuild.cmake
-index c3520b8..9b4b543 100644
---- a/cmake/libwebrtcbuild.cmake
-+++ b/cmake/libwebrtcbuild.cmake
-@@ -44,5 +44,6 @@ endif()
-
- target_include_directories(libwebrtcbuild
- INTERFACE
-- ${webrtc_loc}
-+ $
-+ $
- )
-diff --git a/cmake/libyuv.cmake b/cmake/libyuv.cmake
-index ebfc6f0..18e70ef 100644
---- a/cmake/libyuv.cmake
-+++ b/cmake/libyuv.cmake
-@@ -126,7 +126,8 @@ endif()
-
- target_include_directories(libyuv
- PUBLIC
-- ${libyuv_loc}/include
-+ $
-+ $
- )
-
- target_compile_definitions(libyuv
diff --git a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/telegram/tdesktop/tg_owt.nix b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/telegram/tdesktop/tg_owt.nix
index 47e9b6787e..48499bf9f2 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/telegram/tdesktop/tg_owt.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/telegram/tdesktop/tg_owt.nix
@@ -3,8 +3,8 @@
}:
let
- rev = "c73a4718cbff7048373a63db32068482e5fd11ef";
- sha256 = "0nr20mvvmmg8ii8f2rljd7iv2szplcfjn40rpy6llkmf705mwr1k";
+ rev = "e8fcae73947445db3d418fb7c20b964b59e14706";
+ sha256 = "0s2dd41r71aixhvympiqfks1liv7x78y60n0i87vmyxyfx449b5h";
in stdenv.mkDerivation {
pname = "tg_owt";
@@ -16,8 +16,6 @@ in stdenv.mkDerivation {
inherit rev sha256;
};
- patches = [ ./tg_owt-install.patch ];
-
nativeBuildInputs = [ pkg-config cmake ninja yasm ];
buildInputs = [ libjpeg openssl libopus ffmpeg alsaLib libpulseaudio ];
diff --git a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/zoom-us/default.nix b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/zoom-us/default.nix
index 3109db89ff..6c072118bc 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/zoom-us/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/instant-messengers/zoom-us/default.nix
@@ -15,11 +15,11 @@ assert pulseaudioSupport -> libpulseaudio != null;
let
inherit (stdenv.lib) concatStringsSep makeBinPath optional;
- version = "5.3.469451.0927";
+ version = "5.4.53350.1027";
srcs = {
x86_64-linux = fetchurl {
url = "https://zoom.us/client/${version}/zoom_x86_64.tar.xz";
- sha256 = "0qb9jx2zd5p6jk1g0xmh1f6xlf4gfl38ns6ixpc653qfimy8b0av";
+ sha256 = "11va3px42y81bwy10mxm7mk0kf2sni9gwb422pq9djck2dgchw5x";
};
};
diff --git a/third_party/nixpkgs/pkgs/applications/networking/irc/ircdog/default.nix b/third_party/nixpkgs/pkgs/applications/networking/irc/ircdog/default.nix
new file mode 100644
index 0000000000..5badc69a3a
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/applications/networking/irc/ircdog/default.nix
@@ -0,0 +1,28 @@
+{ lib
+, buildGoPackage
+, fetchFromGitHub
+}:
+
+buildGoPackage rec {
+ pname = "ircdog";
+ version = "0.2.1";
+
+ goPackagePath = "github.com/goshuirc/ircdog";
+
+ src = fetchFromGitHub {
+ owner = "goshuirc";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "1ppbznlkv7vajfbimxbyiq5y6pkfhm6ylhl408rwq1bawl28hpkl";
+ fetchSubmodules = true;
+ };
+
+ meta = with lib; {
+ description = "ircdog is a simple wrapper over the raw IRC protocol that can respond to pings, and interprets formatting codes";
+ homepage = "https://github.com/goshuirc/ircdog";
+ license = licenses.isc;
+ maintainers = with maintainers; [ hexa ];
+ };
+}
+
+
diff --git a/third_party/nixpkgs/pkgs/applications/networking/mailreaders/aerc/default.nix b/third_party/nixpkgs/pkgs/applications/networking/mailreaders/aerc/default.nix
index 9a607b54b9..45d41839a1 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/mailreaders/aerc/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/mailreaders/aerc/default.nix
@@ -54,7 +54,7 @@ buildGoModule rec {
'';
meta = with stdenv.lib; {
- description = "aerc is an email client for your terminal";
+ description = "An email client for your terminal";
homepage = "https://aerc-mail.org/";
maintainers = with maintainers; [ tadeokondrak ];
license = licenses.mit;
diff --git a/third_party/nixpkgs/pkgs/applications/networking/mullvad-vpn/default.nix b/third_party/nixpkgs/pkgs/applications/networking/mullvad-vpn/default.nix
index aa7aaab29a..52adbca18b 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/mullvad-vpn/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/mullvad-vpn/default.nix
@@ -41,11 +41,11 @@ in
stdenv.mkDerivation rec {
pname = "mullvad-vpn";
- version = "2020.5";
+ version = "2020.6";
src = fetchurl {
url = "https://www.mullvad.net/media/app/MullvadVPN-${version}_amd64.deb";
- sha256 = "131z6qlpjwxcn5a62f1f147f2z1xg185jmr0vbin8h0dwa1182vn";
+ sha256 = "0d9rv874avx86jppl1dky0nfq1633as0z8yz3h3f69nhmcbwhlr3";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/applications/networking/nym/default.nix b/third_party/nixpkgs/pkgs/applications/networking/nym/default.nix
index 4dfe1dc549..d85266f68d 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/nym/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/nym/default.nix
@@ -9,16 +9,25 @@
rustPlatform.buildRustPackage rec {
pname = "nym";
- version = "0.7.0";
+ version = "0.8.1";
src = fetchFromGitHub {
owner = "nymtech";
repo = "nym";
rev = "v${version}";
- sha256 = "05bxrpqwwf9spydac0q8sly65q8f1nk13i5fy3p5adr1phzxdnr8";
+ sha256 = "0wzk9qzjyax73lfjbbag412vw1fgk2wmhhry5hdlvdbkim42m5bn";
};
- cargoSha256 = "0mh8cwia86bm68b0wcrmnsq1af5cp6kj1j81nwxb03awnqpxc34n";
+ # fix outdated Cargo.lock
+ cargoPatches = [ (writeText "fix-nym-cargo-lock.patch" ''
+ --- a/Cargo.lock
+ +++ b/Cargo.lock
+ @@ -1826 +1826 @@
+ -version = "0.8.0"
+ +version = "0.8.1"
+ '') ];
+
+ cargoSha256 = "0zr5nzmglmvn6xfqgvipbzy8nw5cl3nf7zjmghkqdwi6zj9p9272";
nativeBuildInputs = [ pkgconfig ];
@@ -26,20 +35,6 @@ rustPlatform.buildRustPackage rec {
checkType = "debug";
- /*
- Nym's test presence::converting_mixnode_presence_into_topology_mixnode::it_returns_resolved_ip_on_resolvable_hostname tries to resolve nymtech.net.
- Since there is no external DNS resolution available in the build sandbox, we point cargo and its children (that's what we remove the 'unsetenv' call for) to a hosts file in which we statically resolve nymtech.net.
- */
- preCheck = ''
- export LD_PRELOAD=${libredirect.overrideAttrs (drv: {
- postPatch = "sed -i -e /unsetenv/d libredirect.c";
- })}/lib/libredirect.so
- export NIX_REDIRECTS=/etc/hosts=${writeText "nym_resolve_test_hosts" "127.0.0.1 nymtech.net"}
- '';
-
- postCheck = "unset NIX_REDIRECTS LD_PRELOAD";
-
-
passthru.updateScript = ./update.sh;
meta = with lib; {
diff --git a/third_party/nixpkgs/pkgs/applications/networking/p2p/frostwire/frostwire-bin.nix b/third_party/nixpkgs/pkgs/applications/networking/p2p/frostwire/frostwire-bin.nix
index d38e9dc733..b9ee526bbe 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/p2p/frostwire/frostwire-bin.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/p2p/frostwire/frostwire-bin.nix
@@ -3,12 +3,12 @@
with stdenv.lib;
stdenv.mkDerivation rec {
- version = "6.8.5";
+ version = "6.8.7";
pname = "frostwire";
src = fetchurl {
url = "https://dl.frostwire.com/frostwire/${version}/frostwire-${version}.amd64.tar.gz";
- sha256 = "1zdas93w1yqg9yx8wlk7pxpdmwvg4ykg54ai7iyq9ir1zha8fyif";
+ sha256 = "1m9v4abm8jbyz46hin63vi6irs32n1xzg85bdyb48vpdxh6iwv04";
};
nativeBuildInputs = [ makeWrapper ];
diff --git a/third_party/nixpkgs/pkgs/applications/networking/remote/citrix-workspace/generic.nix b/third_party/nixpkgs/pkgs/applications/networking/remote/citrix-workspace/generic.nix
index a2ad8b8129..c0dc438daa 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/remote/citrix-workspace/generic.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/remote/citrix-workspace/generic.nix
@@ -3,6 +3,7 @@
, heimdal, krb5, libsoup, libvorbis, speex, openssl, zlib, xorg, pango, gtk2
, gnome2, nss, nspr, gtk_engines, freetype, dconf, libpng12, libxml2
, libjpeg, libredirect, tzdata, cacert, systemd, libcxxabi, libcxx, e2fsprogs, symlinkJoin
+, libpulseaudio, pcsclite
, homepage, version, prefix, hash
@@ -97,10 +98,12 @@ stdenv.mkDerivation rec {
xorg.libXScrnSaver
xorg.libXtst
zlib
- ] ++ lib.optional (lib.versionOlder version "20.04") e2fsprogs;
+ ] ++ lib.optional (lib.versionOlder version "20.04") e2fsprogs
+ ++ lib.optional (lib.versionAtLeast version "20.10") libpulseaudio;
runtimeDependencies = [
glib
+ pcsclite
xorg.libX11
xorg.libXScrnSaver
@@ -146,8 +149,8 @@ stdenv.mkDerivation rec {
export HOME=$(mktemp -d)
# Run upstream installer in the store-path.
- sed -i -e 's,^ANSWER="",ANSWER="$INSTALLER_YES",g' -e 's,/bin/true,true,g' ./linuxx64/hinst
- ${stdenv.shell} linuxx64/hinst CDROM "$(pwd)"
+ sed -i -e 's,^ANSWER="",ANSWER="$INSTALLER_YES",g' -e 's,/bin/true,true,g' ./${prefix}/hinst
+ ${stdenv.shell} ${prefix}/hinst CDROM "$(pwd)"
if [ -f "$ICAInstDir/util/setlog" ]; then
chmod +x "$ICAInstDir/util/setlog"
@@ -169,8 +172,8 @@ stdenv.mkDerivation rec {
# See https://developer-docs.citrix.com/projects/workspace-app-for-linux-oem-guide/en/latest/reference-information/#library-files
# Those files are fallbacks to support older libwekit.so and libjpeg.so
- rm $out/opt/citrix-icaclient/lib/ctxjpeg_fb_8.so
- rm $out/opt/citrix-icaclient/lib/UIDialogLibWebKit.so
+ rm $out/opt/citrix-icaclient/lib/ctxjpeg_fb_8.so || true
+ rm $out/opt/citrix-icaclient/lib/UIDialogLibWebKit.so || true
# We support only Gstreamer 1.0
rm $ICAInstDir/util/{gst_aud_{play,read},gst_*0.10,libgstflatstm0.10.so}
diff --git a/third_party/nixpkgs/pkgs/applications/networking/remote/citrix-workspace/sources.nix b/third_party/nixpkgs/pkgs/applications/networking/remote/citrix-workspace/sources.nix
index abdd54f4af..bbeed5b779 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/remote/citrix-workspace/sources.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/remote/citrix-workspace/sources.nix
@@ -43,6 +43,17 @@ let
x86hash = "1b4gdmnnpa61ydiv2fnmap8cnfhskrq6swcs6i1nqrp5zvvkqrv4";
x64suffix = "15";
x86suffix = "15";
+ homepage = "https://www.citrix.com/de-de/downloads/workspace-app/legacy-workspace-app-for-linux/workspace-app-for-linux-2009.html";
+ };
+
+ "20.10.0" = {
+ major = "20";
+ minor = "10";
+ patch = "0";
+ x64hash = "13g7r92mhwqwqkm6a4k4yn232ighkmxifs7j8wdi1yva0dvklqdf";
+ x86hash = "04cr2da25v8x098ccyjwa47d4krk3jpldqkyf4kk2j3hwzbqh9yx";
+ x64suffix = "6";
+ x86suffix = "6";
homepage = "https://www.citrix.com/de-de/downloads/workspace-app/linux/workspace-app-for-linux-latest.html";
};
};
@@ -52,7 +63,7 @@ let
#
# The lifespans of Citrix products can be found here:
# https://www.citrix.com/support/product-lifecycle/milestones/receiver.html
- unsupportedVersions = [ "19.6.0" "19.8.0" "19.10.0" "19.12.0" ];
+ unsupportedVersions = [ ];
in {
inherit supportedVersions unsupportedVersions;
}
diff --git a/third_party/nixpkgs/pkgs/applications/networking/sync/rclone/default.nix b/third_party/nixpkgs/pkgs/applications/networking/sync/rclone/default.nix
index bd68531db1..bf9be1b103 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/sync/rclone/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/sync/rclone/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "rclone";
- version = "1.53.1";
+ version = "1.53.2";
src = fetchFromGitHub {
owner = pname;
repo = pname;
rev = "v${version}";
- sha256 = "1yi6n5ip680ydqhz8fnd0igr8dy7zzhpx37mdgahsfac7cwf6k0q";
+ sha256 = "0ns55b6s4zdw94jlialps3knclghj9xqx84ff8hyrl9ksq02kd3w";
};
vendorSha256 = "1l4iz31k1pylvf0zrp4nhxna70s1ma4981x6q1s3dhszjxil5c88";
diff --git a/third_party/nixpkgs/pkgs/applications/networking/trebleshot/default.nix b/third_party/nixpkgs/pkgs/applications/networking/trebleshot/default.nix
index 56ebe1873a..82f91ddef8 100644
--- a/third_party/nixpkgs/pkgs/applications/networking/trebleshot/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/networking/trebleshot/default.nix
@@ -10,7 +10,7 @@ mkDerivation rec {
src = fetchFromGitHub {
owner = "genonbeta";
repo = "TrebleShot-Desktop";
- rev = "${version}";
+ rev = version;
sha256 = "1k8wagw6arsi1lqkhn1nl6j11mb122vi1qs0q2np6nznwfy7pn1k";
};
diff --git a/third_party/nixpkgs/pkgs/applications/office/calligra/default.nix b/third_party/nixpkgs/pkgs/applications/office/calligra/default.nix
index 40c4b77f1b..a8ca37df36 100644
--- a/third_party/nixpkgs/pkgs/applications/office/calligra/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/office/calligra/default.nix
@@ -15,11 +15,11 @@
mkDerivation rec {
pname = "calligra";
- version = "3.2.0";
+ version = "3.2.1";
src = fetchurl {
url = "mirror://kde/stable/${pname}/${version}/${pname}-${version}.tar.xz";
- sha256 = "sha256-flViKGZdeeZ8Bi/RFz1mdvCw187v3W4bC8+aeB6nCVE=";
+ sha256 = "0iqi6z6gkck2afgy200dacgcspq7i7887alcj0pklm08hbmsdy5i";
};
nativeBuildInputs = [ extra-cmake-modules kdoctools ];
diff --git a/third_party/nixpkgs/pkgs/applications/office/flexibee/default.nix b/third_party/nixpkgs/pkgs/applications/office/flexibee/default.nix
index f33eb98a48..52e58c5c9c 100644
--- a/third_party/nixpkgs/pkgs/applications/office/flexibee/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/office/flexibee/default.nix
@@ -1,7 +1,7 @@
{ stdenv, fetchurl, makeWrapper, jre }:
let
- version = "2020.2.3.1";
+ version = "2020.2.6";
majorVersion = builtins.substring 0 6 version;
in
@@ -11,7 +11,7 @@ stdenv.mkDerivation rec {
src = fetchurl {
url = "http://download.flexibee.eu/download/${majorVersion}/${version}/${pname}-${version}.tar.gz";
- sha256 = "05wzg7f6mzz7r6azzb8k2g5fakkqh6762y4q9qkmrzbixvxh4lz9";
+ sha256 = "0vscz24sabk9xafywnx41rqhq6300ddsw1x95ibc7ghsgbkq80ja";
};
nativeBuildInputs = [ makeWrapper ];
diff --git a/third_party/nixpkgs/pkgs/applications/office/portfolio/default.nix b/third_party/nixpkgs/pkgs/applications/office/portfolio/default.nix
index bb02c89486..e186b3e3ce 100644
--- a/third_party/nixpkgs/pkgs/applications/office/portfolio/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/office/portfolio/default.nix
@@ -24,11 +24,11 @@ let
in
stdenv.mkDerivation rec {
pname = "PortfolioPerformance";
- version = "0.48.1";
+ version = "0.49.0";
src = fetchurl {
url = "https://github.com/buchen/portfolio/releases/download/${version}/PortfolioPerformance-${version}-linux.gtk.x86_64.tar.gz";
- sha256 = "0xhxp4iglggv6rqwsg0xjn8z46v910rj372abkaviwa3cqzf7gdb";
+ sha256 = "1b3dll6ljkj2wyiy3ns9cgxqgjjr60dfrqrbbwdbndqj4pzfvbyf";
};
nativeBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/applications/office/zanshin/default.nix b/third_party/nixpkgs/pkgs/applications/office/zanshin/default.nix
index 18e7629749..e3b9408ed9 100644
--- a/third_party/nixpkgs/pkgs/applications/office/zanshin/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/office/zanshin/default.nix
@@ -1,10 +1,18 @@
-{
- mkDerivation, lib,
- fetchurl,
- extra-cmake-modules,
- qtbase, boost,
- akonadi-calendar, akonadi-notes, akonadi-search, kidentitymanagement, kontactinterface, kldap,
- krunner, kwallet, kcalendarcore
+{ mkDerivation
+, lib
+, fetchurl
+, extra-cmake-modules
+, qtbase
+, boost
+, akonadi-calendar
+, akonadi-notes
+, akonadi-search
+, kidentitymanagement
+, kontactinterface
+, kldap
+, krunner
+, kwallet
+, kcalendarcore
}:
mkDerivation rec {
@@ -21,9 +29,17 @@ mkDerivation rec {
];
buildInputs = [
- qtbase boost
- akonadi-calendar akonadi-notes akonadi-search kidentitymanagement kontactinterface kldap
- krunner kwallet kcalendarcore
+ qtbase
+ boost
+ akonadi-calendar
+ akonadi-notes
+ akonadi-search
+ kidentitymanagement
+ kontactinterface
+ kldap
+ krunner
+ kwallet
+ kcalendarcore
];
meta = with lib; {
@@ -32,5 +48,6 @@ mkDerivation rec {
maintainers = with maintainers; [ zraexy ];
platforms = platforms.linux;
license = licenses.gpl2Plus;
+ broken = true;
};
}
diff --git a/third_party/nixpkgs/pkgs/applications/radio/aldo/default.nix b/third_party/nixpkgs/pkgs/applications/radio/aldo/default.nix
index df52531a51..83bb520272 100644
--- a/third_party/nixpkgs/pkgs/applications/radio/aldo/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/radio/aldo/default.nix
@@ -1,14 +1,19 @@
-{ stdenv, fetchurl, libao }:
+{ stdenv, fetchgit, libao, autoreconfHook }:
-stdenv.mkDerivation rec {
+let
pname = "aldo";
- version = "0.7.7";
+ version = "0.7.8";
+in stdenv.mkDerivation {
+ inherit pname version;
- src = fetchurl {
- url = "mirror://savannah/${pname}/${pname}-${version}.tar.bz2";
- sha256 = "14lzgldqzbbzydsy1cai3wln3hpyj1yhj8ji3wygyzr616fq9f7i";
+ src = fetchgit {
+ url = "git://git.savannah.gnu.org/${pname}.git";
+ rev = "v${version}";
+ sha256 = "0swvdq0pw1msy40qkpn1ar9kacqjyrw2azvf2fy38y0svyac8z2i";
};
+ nativeBuildInputs = [ autoreconfHook ];
+
buildInputs = [ libao ];
meta = with stdenv.lib; {
diff --git a/third_party/nixpkgs/pkgs/applications/radio/fldigi/default.nix b/third_party/nixpkgs/pkgs/applications/radio/fldigi/default.nix
index af93b7ee65..3811c8fd6f 100644
--- a/third_party/nixpkgs/pkgs/applications/radio/fldigi/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/radio/fldigi/default.nix
@@ -2,12 +2,12 @@
libsamplerate, libpulseaudio, libXinerama, gettext, pkgconfig, alsaLib }:
stdenv.mkDerivation rec {
- version = "4.1.14";
+ version = "4.1.15";
pname = "fldigi";
src = fetchurl {
url = "mirror://sourceforge/${pname}/${pname}-${version}.tar.gz";
- sha256 = "0hr6xbv01xf7z4r2jxxhn8xjdmca2198q4m9glh4877dllvfq6xj";
+ sha256 = "1fzbcv2dgg6byb2l8m2d6i69yn0a44pq52mpmms756jdf6z622i6";
};
buildInputs = [ libXinerama gettext hamlib fltk14 libjpeg libpng portaudio
diff --git a/third_party/nixpkgs/pkgs/applications/radio/flmsg/default.nix b/third_party/nixpkgs/pkgs/applications/radio/flmsg/default.nix
index e437dffa48..fa3f175fcc 100644
--- a/third_party/nixpkgs/pkgs/applications/radio/flmsg/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/radio/flmsg/default.nix
@@ -6,12 +6,12 @@
}:
stdenv.mkDerivation rec {
- version = "4.0.14";
+ version = "4.0.17";
pname = "flmsg";
src = fetchurl {
url = "mirror://sourceforge/fldigi/${pname}-${version}.tar.gz";
- sha256 = "0s1prawkpvr7xr7h8w7r0ly90ya3n8h6qsii0x6laqrkgjn9w9iy";
+ sha256 = "09xf3f65d3qi69frznf4fdznbfbc7kmgxw716q2c7ccsmh9c5q44";
};
buildInputs = [
diff --git a/third_party/nixpkgs/pkgs/applications/radio/gqrx/default.nix b/third_party/nixpkgs/pkgs/applications/radio/gqrx/default.nix
index 413424a5b8..786e463686 100644
--- a/third_party/nixpkgs/pkgs/applications/radio/gqrx/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/radio/gqrx/default.nix
@@ -9,13 +9,13 @@ assert pulseaudioSupport -> libpulseaudio != null;
mkDerivation rec {
pname = "gqrx";
- version = "2.13";
+ version = "2.13.2";
src = fetchFromGitHub {
owner = "csete";
repo = "gqrx";
rev = "v${version}";
- sha256 = "034y8w2cwv35ibqnqb9bdgscsrcp6rr02fgscbfi3gky3n0qddcy";
+ sha256 = "1lcy9gqb1x9fwq550bywj7h66rdacq5893wsax1p7qvqa27d945b";
};
nativeBuildInputs = [ cmake ];
diff --git a/third_party/nixpkgs/pkgs/applications/radio/noaa-apt/default.nix b/third_party/nixpkgs/pkgs/applications/radio/noaa-apt/default.nix
index 5034d5fd93..a81f2ea8f7 100644
--- a/third_party/nixpkgs/pkgs/applications/radio/noaa-apt/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/radio/noaa-apt/default.nix
@@ -13,13 +13,13 @@
rustPlatform.buildRustPackage rec {
pname = "noaa-apt";
- version = "1.2.0";
+ version = "1.3.0";
src = fetchFromGitHub {
owner = "martinber";
repo = "noaa-apt";
rev = "v${version}";
- sha256 = "0fqki4a9c54rixdz5bpswvn433f9saw6yazgw4av3xdd7g2fdvvj";
+ sha256 = "0fmbg6lw7lmm402hzddpzgi7y9mc6kic14x8rif7fampk20mv3ms";
};
nativeBuildInputs = [
@@ -36,7 +36,7 @@ rustPlatform.buildRustPackage rec {
pango
];
- cargoSha256 = "1pzcq31inazmc9cz31fspzqkp0lpkjid8ai3g17sin1pfzby5jlh";
+ cargoSha256 = "0w4rbbz8lsh31xkgibzndiic47690nfcjrn1411dskf7ali6djy8";
preBuild = ''
# Used by macro pointing to resource location at compile time.
@@ -59,6 +59,7 @@ rustPlatform.buildRustPackage rec {
homepage = "http://noaa-apt.mbernardi.com.ar/";
license = licenses.gpl3Only;
maintainers = with maintainers; [ trepetti ];
+ platforms = platforms.all;
changelog = "https://github.com/martinber/noaa-apt/releases/tag/v${version}";
};
}
diff --git a/third_party/nixpkgs/pkgs/applications/science/biology/dcm2niix/default.nix b/third_party/nixpkgs/pkgs/applications/science/biology/dcm2niix/default.nix
index 59b173ac98..cfd1206f23 100644
--- a/third_party/nixpkgs/pkgs/applications/science/biology/dcm2niix/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/science/biology/dcm2niix/default.nix
@@ -21,7 +21,7 @@ stdenv.mkDerivation rec {
buildInputs = [ libyamlcpp ];
meta = with stdenv.lib; {
- description = "dcm2niix DICOM to NIfTI converter";
+ description = "DICOM to NIfTI converter";
longDescription = ''
dcm2niix is a designed to convert neuroimaging data from the
DICOM format to the NIfTI format.
diff --git a/third_party/nixpkgs/pkgs/applications/science/biology/igv/default.nix b/third_party/nixpkgs/pkgs/applications/science/biology/igv/default.nix
index bc4f1677fc..0b990dc541 100644
--- a/third_party/nixpkgs/pkgs/applications/science/biology/igv/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/science/biology/igv/default.nix
@@ -2,10 +2,10 @@
stdenv.mkDerivation rec {
pname = "igv";
- version = "2.8.9";
+ version = "2.8.11";
src = fetchzip {
url = "https://data.broadinstitute.org/igv/projects/downloads/2.8/IGV_${version}.zip";
- sha256 = "1874w1xprv91caz1ymfxilq6inhj36xzx8j9m0mcyp0qfvfvyjp7";
+ sha256 = "1hiwnrrh42qzc7kdc7bypgcgn488pz8g462xzchbhgx7jjdbbwhm";
};
installPhase = ''
diff --git a/third_party/nixpkgs/pkgs/applications/science/biology/kallisto/default.nix b/third_party/nixpkgs/pkgs/applications/science/biology/kallisto/default.nix
index 5a1bb18788..014ae14cc7 100644
--- a/third_party/nixpkgs/pkgs/applications/science/biology/kallisto/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/science/biology/kallisto/default.nix
@@ -21,7 +21,7 @@ stdenv.mkDerivation rec {
enableParallelBuilding = false;
meta = with stdenv.lib; {
- description = "Kallisto is a program for quantifying abundances of transcripts from RNA-Seq data";
+ description = "Program for quantifying abundances of transcripts from RNA-Seq data";
homepage = "https://pachterlab.github.io/kallisto";
license = licenses.bsd2;
platforms = platforms.linux;
diff --git a/third_party/nixpkgs/pkgs/applications/science/biology/last/default.nix b/third_party/nixpkgs/pkgs/applications/science/biology/last/default.nix
index 13f6a23913..7758529311 100644
--- a/third_party/nixpkgs/pkgs/applications/science/biology/last/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/science/biology/last/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "last";
- version = "1066";
+ version = "1133";
src = fetchurl {
url = "http://last.cbrc.jp/last-${version}.zip";
- sha256 = "098j3f3a80rmhd01ds7rnb9y1xykmll2yh5ivpnvskssd8z2vc4r";
+ sha256 = "0a600p1fymm1ylaxzjwg46zdwz6ilaaak1f4n8xr3hp3ir9rgfjq";
};
nativeBuildInputs = [ unzip ];
diff --git a/third_party/nixpkgs/pkgs/applications/science/biology/lumpy/default.nix b/third_party/nixpkgs/pkgs/applications/science/biology/lumpy/default.nix
index 04512e8e37..f6267a2e01 100644
--- a/third_party/nixpkgs/pkgs/applications/science/biology/lumpy/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/science/biology/lumpy/default.nix
@@ -7,13 +7,14 @@ let
in stdenv.mkDerivation rec {
pname = "lumpy";
- version = "0.3.0";
+ version = "0.3.1";
src = fetchFromGitHub {
owner = "arq5x";
repo = "lumpy-sv";
- rev = version;
- sha256 = "0azhzvmh9az9jcq0xprlzdz6w16azgszv4kshb903bwbnqirmk18";
+ rev = "v${version}";
+ sha256 = "0r71sg7qch8r6p6dw995znrqdj6q49hjdylhzbib2qmv8nvglhs9";
+ fetchSubmodules = true;
};
nativeBuildInputs = [ which ];
@@ -26,6 +27,8 @@ in stdenv.mkDerivation rec {
# Use Nix htslib over bundled version
sed -i 's/lumpy_filter: htslib/lumpy_filter:/' Makefile
sed -i 's|../../lib/htslib/libhts.a|-lhts|' src/filter/Makefile
+ # Also make sure we use the includes from Nix's htslib
+ sed -i 's|../../lib/htslib/|${htslib}|' src/filter/Makefile
'';
# Upstream's makefile doesn't have an install target
diff --git a/third_party/nixpkgs/pkgs/applications/science/biology/samtools/default.nix b/third_party/nixpkgs/pkgs/applications/science/biology/samtools/default.nix
index e750eea89a..27ed79a1f6 100644
--- a/third_party/nixpkgs/pkgs/applications/science/biology/samtools/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/science/biology/samtools/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "samtools";
- version = "1.10";
+ version = "1.11";
src = fetchurl {
url = "https://github.com/samtools/samtools/releases/download/${version}/${pname}-${version}.tar.bz2";
- sha256 = "119ms0dpydw8dkh3zc4yyw9zhdzgv12px4l2kayigv31bpqcb7kv";
+ sha256 = "1dp5wknak4arnw5ghhif9mmljlfnw5bgm91wib7z0j8wdjywx0z2";
};
nativeBuildInputs = [ perl ];
@@ -29,6 +29,6 @@ stdenv.mkDerivation rec {
license = licenses.mit;
homepage = "http://www.htslib.org/";
platforms = platforms.unix;
- maintainers = [ maintainers.mimame ];
+ maintainers = with maintainers; [ mimame unode ];
};
}
diff --git a/third_party/nixpkgs/pkgs/applications/science/chemistry/jmol/default.nix b/third_party/nixpkgs/pkgs/applications/science/chemistry/jmol/default.nix
index 6545472a52..cba3f1d094 100644
--- a/third_party/nixpkgs/pkgs/applications/science/chemistry/jmol/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/science/chemistry/jmol/default.nix
@@ -17,14 +17,14 @@ let
};
in
stdenv.mkDerivation rec {
- version = "14.31.3";
+ version = "14.31.14";
pname = "jmol";
src = let
baseVersion = "${lib.versions.major version}.${lib.versions.minor version}";
in fetchurl {
url = "mirror://sourceforge/jmol/Jmol/Version%20${baseVersion}/Jmol%20${version}/Jmol-${version}-binary.tar.gz";
- sha256 = "067051wp9kgkgcy3mvqwxhim0h1qfcf4jk8vrbzd3y9pwmjismzy";
+ sha256 = "1qmy4iqn5xgd4m9hs4w9cn9rzkwmpgdb5azd93cypp05s4nmjsnm";
};
patchPhase = ''
diff --git a/third_party/nixpkgs/pkgs/applications/science/electronics/flatcam/default.nix b/third_party/nixpkgs/pkgs/applications/science/electronics/flatcam/default.nix
index 360c6df7fe..b8a80c5e9c 100644
--- a/third_party/nixpkgs/pkgs/applications/science/electronics/flatcam/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/science/electronics/flatcam/default.nix
@@ -10,7 +10,7 @@ python3Packages.buildPythonApplication rec {
src = fetchFromBitbucket {
owner = "jpcgt";
- repo = "${pname}";
+ repo = pname;
rev = "533afd6a1772857cb633c011b5e0a15b60b1e92e"; # 8.5 with Red Hat packaging.
sha256 = "199kiiml18k34z1zhk2hbhibphmnv0kb11kxiajq52alps0mjb3m";
};
diff --git a/third_party/nixpkgs/pkgs/applications/science/electronics/gtkwave/default.nix b/third_party/nixpkgs/pkgs/applications/science/electronics/gtkwave/default.nix
index 36cc19142d..ad5e9e55c5 100644
--- a/third_party/nixpkgs/pkgs/applications/science/electronics/gtkwave/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/science/electronics/gtkwave/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "gtkwave";
- version = "3.3.106";
+ version = "3.3.107";
src = fetchurl {
url = "mirror://sourceforge/gtkwave/${pname}-gtk3-${version}.tar.gz";
- sha256 = "0ma53s27735x16dq5qi91kvlypkiwkxh2jhw0gziyccnk1mkdsji";
+ sha256 = "0ma30jyc94iid3v3m8aw4i2lyiqfxkpsdvdmmaibynk400cbzivl";
};
nativeBuildInputs = [ pkgconfig wrapGAppsHook ];
diff --git a/third_party/nixpkgs/pkgs/applications/science/logic/coq/default.nix b/third_party/nixpkgs/pkgs/applications/science/logic/coq/default.nix
index 9b7e007ce5..946cba41b1 100644
--- a/third_party/nixpkgs/pkgs/applications/science/logic/coq/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/science/logic/coq/default.nix
@@ -109,7 +109,7 @@ self = stdenv.mkDerivation {
nativeBuildInputs = [ pkgconfig ]
++ stdenv.lib.optional (!versionAtLeast "8.6") gnumake42
;
- buildInputs = [ ncurses ]
+ buildInputs = [ ncurses ocamlPackages.ocaml ocamlPackages.findlib ]
++ stdenv.lib.optional (!versionAtLeast "8.10") ocamlPackages.camlp5
++ stdenv.lib.optional (!versionAtLeast "8.12") ocamlPackages.num
++ stdenv.lib.optionals buildIde
@@ -117,10 +117,7 @@ self = stdenv.mkDerivation {
then [ ocamlPackages.lablgtk3-sourceview3 glib gnome3.defaultIconTheme wrapGAppsHook ]
else [ ocamlPackages.lablgtk ]);
- propagatedBuildInputs = [ ocamlPackages.ocaml ocamlPackages.findlib ]
- ++ stdenv.lib.optional (versionAtLeast "8.12") ocamlPackages.num;
-
- propagatedUserEnvPkgs = [ ocamlPackages.ocaml ocamlPackages.findlib ];
+ propagatedBuildInputs = stdenv.lib.optional (versionAtLeast "8.12") ocamlPackages.num;
postPatch = ''
UNAME=$(type -tp uname)
diff --git a/third_party/nixpkgs/pkgs/applications/science/logic/coq2html/default.nix b/third_party/nixpkgs/pkgs/applications/science/logic/coq2html/default.nix
index 2e56eda893..e53e8e7392 100644
--- a/third_party/nixpkgs/pkgs/applications/science/logic/coq2html/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/science/logic/coq2html/default.nix
@@ -1,6 +1,6 @@
{ stdenv, fetchgit, ocaml }:
-let
+let
version = "20170720";
in
@@ -22,7 +22,7 @@ stdenv.mkDerivation {
'';
meta = with stdenv.lib; {
- description = "coq2html is an HTML documentation generator for Coq source files";
+ description = "HTML documentation generator for Coq source files";
longDescription = ''
coq2html is an HTML documentation generator for Coq source files. It is
an alternative to the standard coqdoc documentation generator
diff --git a/third_party/nixpkgs/pkgs/applications/science/logic/ott/default.nix b/third_party/nixpkgs/pkgs/applications/science/logic/ott/default.nix
index ecc253a64d..48ad63eaa9 100644
--- a/third_party/nixpkgs/pkgs/applications/science/logic/ott/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/science/logic/ott/default.nix
@@ -19,7 +19,7 @@ stdenv.mkDerivation rec {
postInstall = "opaline -prefix $out";
meta = {
- description = "Ott: tool for the working semanticist";
+ description = "A tool for the working semanticist";
longDescription = ''
Ott is a tool for writing definitions of programming languages and
calculi. It takes as input a definition of a language syntax and
diff --git a/third_party/nixpkgs/pkgs/applications/science/logic/potassco/clingcon.nix b/third_party/nixpkgs/pkgs/applications/science/logic/potassco/clingcon.nix
index 1203822d86..b74583ca1a 100644
--- a/third_party/nixpkgs/pkgs/applications/science/logic/potassco/clingcon.nix
+++ b/third_party/nixpkgs/pkgs/applications/science/logic/potassco/clingcon.nix
@@ -11,7 +11,7 @@ stdenv.mkDerivation rec {
src = fetchFromGitHub {
owner = "potassco";
- repo = "${pname}";
+ repo = pname;
rev = "v${version}";
fetchSubmodules = true;
sha256 = "1q7517h10jfvjdk2czq8d6y57r8kr1j1jj2k2ip2qxkpyfigk4rs";
diff --git a/third_party/nixpkgs/pkgs/applications/science/machine-learning/labelimg/default.nix b/third_party/nixpkgs/pkgs/applications/science/machine-learning/labelimg/default.nix
index 05c56b0b09..18c304e831 100644
--- a/third_party/nixpkgs/pkgs/applications/science/machine-learning/labelimg/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/science/machine-learning/labelimg/default.nix
@@ -28,7 +28,7 @@
makeWrapperArgs+=("''${qtWrapperArgs[@]}")
'';
meta = with stdenv.lib; {
- description = "LabelImg is a graphical image annotation tool and label object bounding boxes in images";
+ description = "A graphical image annotation tool and label object bounding boxes in images";
homepage = "https://github.com/tzutalin/labelImg";
license = licenses.mit;
platforms = platforms.linux;
diff --git a/third_party/nixpkgs/pkgs/applications/science/math/bliss/default.nix b/third_party/nixpkgs/pkgs/applications/science/math/bliss/default.nix
index 52b05646a7..9ab90134aa 100644
--- a/third_party/nixpkgs/pkgs/applications/science/math/bliss/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/science/math/bliss/default.nix
@@ -29,7 +29,7 @@ stdenv.mkDerivation rec {
'';
meta = with stdenv.lib; {
- description = "bliss is an open source tool for computing automorphism groups and canonical forms of graphs. It has both a command line user interface as well as C++ and C programming language APIs";
+ description = "An open source tool for computing automorphism groups and canonical forms of graphs. It has both a command line user interface as well as C++ and C programming language APIs";
homepage = "http://www.tcs.hut.fi/Software/bliss/";
license = licenses.lgpl3;
platforms = [ "i686-linux" "x86_64-linux" ];
diff --git a/third_party/nixpkgs/pkgs/applications/science/math/geogebra/default.nix b/third_party/nixpkgs/pkgs/applications/science/math/geogebra/default.nix
index 5cebef83a4..a6950ad345 100644
--- a/third_party/nixpkgs/pkgs/applications/science/math/geogebra/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/science/math/geogebra/default.nix
@@ -1,18 +1,7 @@
-{ stdenv, fetchurl, jre, makeDesktopItem, makeWrapper, language ? "en_US" }:
-
-stdenv.mkDerivation rec {
+{ stdenv, fetchurl, jre, makeDesktopItem, makeWrapper, unzip, language ? "en_US" }:
+let
pname = "geogebra";
- version = "5-0-593-0";
-
- preferLocalBuild = true;
-
- src = fetchurl {
- urls = [
- "https://download.geogebra.org/installers/5.0/GeoGebra-Linux-Portable-${version}.tar.bz2"
- "http://web.archive.org/https://download.geogebra.org/installers/5.0/GeoGebra-Linux-Portable-${version}.tar.bz2"
- ];
- sha256 = "d84c27a3299e6df08881733d22215a18decedcba4c2d97a9e5424c39cd57db35";
- };
+ version = "5-0-609-0";
srcIcon = fetchurl {
url = "http://static.geogebra.org/images/geogebra-logo.svg";
@@ -30,23 +19,6 @@ stdenv.mkDerivation rec {
mimeType = "application/vnd.geogebra.file;application/vnd.geogebra.tool;";
};
- buildInputs = [ makeWrapper ];
-
- installPhase = ''
- install -D geogebra/* -t "$out/libexec/geogebra/"
-
- makeWrapper "$out/libexec/geogebra/geogebra" "$out/bin/geogebra" \
- --set JAVACMD "${jre}/bin/java" \
- --set GG_PATH "$out/libexec/geogebra" \
- --add-flags "--language=${language}"
-
- install -Dm644 "${desktopItem}/share/applications/"* \
- -t $out/share/applications/
-
- install -Dm644 "${srcIcon}" \
- "$out/share/icons/hicolor/scalable/apps/geogebra.svg"
- '';
-
meta = with stdenv.lib; {
description = "Dynamic mathematics software with graphics, algebra and spreadsheets";
longDescription = ''
@@ -57,7 +29,61 @@ stdenv.mkDerivation rec {
homepage = "https://www.geogebra.org/";
maintainers = with maintainers; [ ma27 ];
license = with licenses; [ gpl3 cc-by-nc-sa-30 geogebra ];
- platforms = platforms.all;
+ platforms = with platforms; linux ++ darwin;
hydraPlatforms = [];
};
-}
+
+ linuxPkg = stdenv.mkDerivation {
+ inherit pname version meta srcIcon desktopItem;
+
+ preferLocalBuild = true;
+
+ src = fetchurl {
+ urls = [
+ "https://download.geogebra.org/installers/5.0/GeoGebra-Linux-Portable-${version}.tar.bz2"
+ "http://web.archive.org/web/20201022200454/https://download.geogebra.org/installers/5.0/GeoGebra-Linux-Portable-${version}.tar.bz2"
+ ];
+ sha256 = "0xbhg8hm3dqm3qkraj48pqwslrnjyxpq9mcgylr2m8i1gmqw7xwf";
+ };
+
+ nativeBuildInputs = [ makeWrapper ];
+
+ installPhase = ''
+ install -D geogebra/* -t "$out/libexec/geogebra/"
+
+ makeWrapper "$out/libexec/geogebra/geogebra" "$out/bin/geogebra" \
+ --set JAVACMD "${jre}/bin/java" \
+ --set GG_PATH "$out/libexec/geogebra" \
+ --add-flags "--language=${language}"
+
+ install -Dm644 "${desktopItem}/share/applications/"* \
+ -t $out/share/applications/
+
+ install -Dm644 "${srcIcon}" \
+ "$out/share/icons/hicolor/scalable/apps/geogebra.svg"
+ '';
+ };
+
+ darwinPkg = stdenv.mkDerivation {
+ inherit pname version meta;
+
+ preferLocalBuild = true;
+
+ src = fetchurl {
+ url = "https://download.geogebra.org/installers/5.0/GeoGebra-MacOS-Installer-withJava-${version}.zip";
+ sha256 = "16fgqwxz31cfmia0pyzpk05aqzrqr11sjbw37q9zb3xfh3p1r4gz";
+ };
+
+ dontUnpack = true;
+
+ nativeBuildInputs = [ unzip ];
+
+ installPhase = ''
+ install -dm755 $out/Applications
+ unzip $src -d $out/Applications
+ '';
+ };
+in
+if stdenv.isDarwin
+then darwinPkg
+else linuxPkg
diff --git a/third_party/nixpkgs/pkgs/applications/science/math/geogebra/geogebra6.nix b/third_party/nixpkgs/pkgs/applications/science/math/geogebra/geogebra6.nix
index 65caff82ea..7bd5826489 100644
--- a/third_party/nixpkgs/pkgs/applications/science/math/geogebra/geogebra6.nix
+++ b/third_party/nixpkgs/pkgs/applications/science/math/geogebra/geogebra6.nix
@@ -1,46 +1,70 @@
{ stdenv, unzip, fetchurl, electron_6, makeWrapper, geogebra }:
-stdenv.mkDerivation rec{
-
- name = "geogebra-${version}";
- version = "6-0-600-0";
-
- src = fetchurl {
- urls = [
- "https://download.geogebra.org/installers/6.0/GeoGebra-Linux64-Portable-${version}.zip"
- "https://web.archive.org/web/20200904093945/https://download.geogebra.org/installers/6.0/GeoGebra-Linux64-Portable-${version}.zip"
- ];
- sha256 = "1l49rvfkil2cz6r7sa2mi0p6hvb6p66jv3x6xj8hjqls4l3sfhkm";
- };
-
- dontConfigure = true;
- dontBuild = true;
-
- nativeBuildInputs = [
- unzip
- makeWrapper
- ];
-
- unpackPhase = ''
- unzip $src
- '';
-
- installPhase = ''
- mkdir -p $out/libexec/geogebra/ $out/bin
- cp -r GeoGebra-linux-x64/{resources,locales} "$out/"
- makeWrapper ${stdenv.lib.getBin electron_6}/bin/electron $out/bin/geogebra --add-flags "$out/resources/app"
- install -Dm644 "${desktopItem}/share/applications/"* \
- -t $out/share/applications/
-
- install -Dm644 "${srcIcon}" \
- "$out/share/icons/hicolor/scalable/apps/geogebra.svg"
- '';
+let
+ pname = "geogebra";
+ version = "6-0-609-0";
srcIcon = geogebra.srcIcon;
-
desktopItem = geogebra.desktopItem;
+
meta = with stdenv.lib; geogebra.meta // {
license = licenses.geogebra;
maintainers = with maintainers; [ voidless ];
- platforms = platforms.linux;
+ platforms = with platforms; linux ++ darwin;
};
-}
+
+ linuxPkg = stdenv.mkDerivation {
+ inherit pname version meta;
+
+ src = fetchurl {
+ urls = [
+ "https://download.geogebra.org/installers/6.0/GeoGebra-Linux64-Portable-${version}.zip"
+ "https://web.archive.org/web/20201022200156/https://download.geogebra.org/installers/6.0/GeoGebra-Linux64-Portable-${version}.zip"
+ ];
+ sha256 = "0rzcbq587x8827g9v03awa9hz27vyfjc0cz45ymbchqp31lsx49b";
+ };
+
+ dontConfigure = true;
+ dontBuild = true;
+
+ nativeBuildInputs = [
+ unzip
+ makeWrapper
+ ];
+
+ unpackPhase = ''
+ unzip $src
+ '';
+
+ installPhase = ''
+ mkdir -p $out/libexec/geogebra/ $out/bin
+ cp -r GeoGebra-linux-x64/{resources,locales} "$out/"
+ makeWrapper ${stdenv.lib.getBin electron_6}/bin/electron $out/bin/geogebra --add-flags "$out/resources/app"
+ install -Dm644 "${desktopItem}/share/applications/"* \
+ -t $out/share/applications/
+
+ install -Dm644 "${srcIcon}" \
+ "$out/share/icons/hicolor/scalable/apps/geogebra.svg"
+ '';
+ };
+
+ darwinPkg = stdenv.mkDerivation {
+ inherit pname version meta;
+
+ src = fetchurl {
+ url = "https://download.geogebra.org/installers/6.0/GeoGebra-Classic-6-MacOS-Portable-${version}.zip";
+ sha256 = "0275869zgwbl1qjj593q6629hnxbwk9c15rkm29a3lh10pinb099";
+ };
+
+ dontUnpack = true;
+
+ nativeBuildInputs = [ unzip ];
+
+ installPhase = ''
+ install -dm755 $out/Applications
+ unzip $src -d $out/Applications
+ '';
+ };
+in
+if stdenv.isDarwin
+then darwinPkg
+else linuxPkg
diff --git a/third_party/nixpkgs/pkgs/applications/science/math/ginac/default.nix b/third_party/nixpkgs/pkgs/applications/science/math/ginac/default.nix
index 701445f901..3c129e8033 100644
--- a/third_party/nixpkgs/pkgs/applications/science/math/ginac/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/science/math/ginac/default.nix
@@ -1,11 +1,11 @@
{ stdenv, fetchurl, cln, pkgconfig, readline, gmp, python }:
stdenv.mkDerivation rec {
- name = "ginac-1.7.9";
+ name = "ginac-1.8.0";
src = fetchurl {
url = "${meta.homepage}/${name}.tar.bz2";
- sha256 = "08cqc87qq4w6z3l053x5gfqsa4zkgkicq8skxsbsj39nli1zzkb7";
+ sha256 = "0l9byzfxq3f9az5pcdldnl95ws8mpirkqky46f973mvxi5541d24";
};
propagatedBuildInputs = [ cln ];
diff --git a/third_party/nixpkgs/pkgs/applications/science/math/maxima/5.41.nix b/third_party/nixpkgs/pkgs/applications/science/math/maxima/5.41.nix
deleted file mode 100644
index 829dffc611..0000000000
--- a/third_party/nixpkgs/pkgs/applications/science/math/maxima/5.41.nix
+++ /dev/null
@@ -1,102 +0,0 @@
-{ stdenv, fetchurl, fetchpatch, sbcl, texinfo, perl, python, makeWrapper, rlwrap ? null
-, tk ? null, gnuplot ? null, ecl ? null, ecl-fasl ? false
-}:
-
-let
- name = "maxima";
- # old version temporarily kept for sage, see discussion at
- # https://github.com/NixOS/nixpkgs/commit/82254747af35f3e0e0d6f78023ded3a81e25331b
- version = "5.41.0";
-
- searchPath =
- stdenv.lib.makeBinPath
- (stdenv.lib.filter (x: x != null) [ sbcl ecl rlwrap tk gnuplot ]);
-in
-stdenv.mkDerivation ({
- inherit version;
- name = "${name}-${version}";
-
- src = fetchurl {
- url = "mirror://sourceforge/${name}/${name}-${version}.tar.gz";
- sha256 = "0x0n81z0s4pl8nwpf7ivlsbvsdphm9w42250g7qdkizl0132by6s";
- };
-
- buildInputs = stdenv.lib.filter (x: x != null) [
- sbcl ecl texinfo perl python makeWrapper
- ];
-
- postInstall = ''
- # Make sure that maxima can find its runtime dependencies.
- for prog in "$out/bin/"*; do
- wrapProgram "$prog" --prefix PATH ":" "$out/bin:${searchPath}"
- done
- # Move emacs modules and documentation into the right place.
- mkdir -p $out/share/emacs $out/share/doc
- ln -s ../maxima/${version}/emacs $out/share/emacs/site-lisp
- ln -s ../maxima/${version}/doc $out/share/doc/maxima
- ''
- + (stdenv.lib.optionalString ecl-fasl ''
- cp src/binary-ecl/maxima.fas* "$out/lib/maxima/${version}/binary-ecl/"
- '')
- ;
-
- patches = [
- # fix path to info dir (see https://trac.sagemath.org/ticket/11348)
- (fetchpatch {
- url = "https://git.sagemath.org/sage.git/plain/build/pkgs/maxima/patches/infodir.patch?id=07d6c37d18811e2b377a9689790a7c5e24da16ba";
- sha256 = "09v64n60f7i6frzryrj0zd056lvdpms3ajky4f9p6kankhbiv21x";
- })
-
- # fix https://sourceforge.net/p/maxima/bugs/2596/
- (fetchpatch {
- url = "https://git.sagemath.org/sage.git/plain/build/pkgs/maxima/patches/matrixexp.patch?id=07d6c37d18811e2b377a9689790a7c5e24da16ba";
- sha256 = "06961hn66rhjijfvyym21h39wk98sfxhp051da6gz0n9byhwc6zg";
- })
-
- # undo https://sourceforge.net/p/maxima/code/ci/f5e9b0f7eb122c4e48ea9df144dd57221e5ea0ca, see see https://trac.sagemath.org/ticket/13364#comment:93
- (fetchpatch {
- url = "https://git.sagemath.org/sage.git/plain/build/pkgs/maxima/patches/undoing_true_false_printing_patch.patch?id=07d6c37d18811e2b377a9689790a7c5e24da16ba";
- sha256 = "0fvi3rcjv6743sqsbgdzazy9jb6r1p1yq63zyj9fx42wd1hgf7yx";
- })
-
- # upstream bug https://sourceforge.net/p/maxima/bugs/2520/ (not fixed)
- # introduced in https://trac.sagemath.org/ticket/13364
- (fetchpatch {
- url = "https://git.sagemath.org/sage.git/plain/build/pkgs/maxima/patches/0001-taylor2-Avoid-blowing-the-stack-when-diff-expand-isn.patch?id=07d6c37d18811e2b377a9689790a7c5e24da16ba";
- sha256 = "0xa0b6cr458zp7lc7qi0flv5ar0r3ivsqhjl0c3clv86di2y522d";
- })
- ] ++ stdenv.lib.optionals ecl-fasl [
- # build fasl, needed for ECL support
- (fetchpatch {
- url = "https://git.sagemath.org/sage.git/plain/build/pkgs/maxima/patches/maxima.system.patch?id=07d6c37d18811e2b377a9689790a7c5e24da16ba";
- sha256 = "18zafig8vflhkr80jq2ivk46k92dkszqlyq8cfmj0b2vcfjwwbar";
- })
- # There are some transient test failures. I hope this disables all those tests.
- # If those test failures ever happen in the non-ecl version, that should be
- # reportetd upstream.
- ./known-ecl-failures.patch
- ];
-
- # Failures in the regression test suite won't abort the build process. We run
- # the suite only so that potential errors show up in the build log. See also:
- # https://sourceforge.net/tracker/?func=detail&aid=3365831&group_id=4933&atid=104933.
- doCheck = true;
-
- enableParallelBuilding = true;
-
- meta = {
- description = "Computer algebra system";
- homepage = "http://maxima.sourceforge.net";
- license = stdenv.lib.licenses.gpl2;
-
- longDescription = ''
- Maxima is a fairly complete computer algebra system written in
- lisp with an emphasis on symbolic computation. It is based on
- DOE-MACSYMA and licensed under the GPL. Its abilities include
- symbolic integration, 3D plotting, and an ODE solver.
- '';
-
- platforms = stdenv.lib.platforms.unix;
- maintainers = [ stdenv.lib.maintainers.peti ];
- };
-})
diff --git a/third_party/nixpkgs/pkgs/applications/science/math/maxima/known-ecl-failures.patch b/third_party/nixpkgs/pkgs/applications/science/math/maxima/known-ecl-failures.patch
deleted file mode 100644
index f1d612d993..0000000000
--- a/third_party/nixpkgs/pkgs/applications/science/math/maxima/known-ecl-failures.patch
+++ /dev/null
@@ -1,21 +0,0 @@
-diff --git a/tests/testsuite.lisp b/tests/testsuite.lisp
-index 45a81f4..36c35b8 100644
---- a/tests/testsuite.lisp
-+++ b/tests/testsuite.lisp
-@@ -25,13 +25,14 @@
- ((mlist simp) "rtest10" 24 25)
- ((mlist) "rtest11" #+(or gcl cmucl ccl64) 158 #+(or gcl cmucl ccl64) 174 #+gcl 175)
- "rtest13" "rtest13s"
-- "rtest14"
-+ ;; "rtest14" ;; some tests sometimes fail with ecl, hard to reproduce. Observed failing: 250, 267, 297, 307, 310, 312, 315, 319
- "rtest15"
- ;; ccl versions 1.11 and earlier fail test 50. Mark it as a
- ;; known failure. Presumably 1.12 will have this fixed.
- ((mlist simp) "rtest16" #+ccl 50)
- "rtestode" "rtestode_zp"
-- "rtest3" "rtest8"
-+ "rtest3"
-+ ((mlist simp) "rtest8" 104) ;; fails with ecl
- ((mlist simp) "rtest12" 76 78)
- "rexamples"
- ((mlist simp) "rtesthyp" 105 112 113 123 124 128)
diff --git a/third_party/nixpkgs/pkgs/applications/science/misc/cytoscape/default.nix b/third_party/nixpkgs/pkgs/applications/science/misc/cytoscape/default.nix
index 12cdeb453d..647492bbe3 100644
--- a/third_party/nixpkgs/pkgs/applications/science/misc/cytoscape/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/science/misc/cytoscape/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "cytoscape";
- version = "3.8.1";
+ version = "3.8.2";
src = fetchurl {
url = "https://github.com/cytoscape/cytoscape/releases/download/${version}/${pname}-unix-${version}.tar.gz";
- sha256 = "006g0w29sccg5h0zlrxdp3lx4vx1bfdhx2cms6aah85r5b82wgkf";
+ sha256 = "0zgsq9qnyvmq96pgf7372r16rm034fd0r4qa72xi9zbd4f2r7z8w";
};
patches = [
diff --git a/third_party/nixpkgs/pkgs/applications/science/misc/openmodelica/default.nix b/third_party/nixpkgs/pkgs/applications/science/misc/openmodelica/default.nix
index 50d4dcc1a9..268ae53401 100644
--- a/third_party/nixpkgs/pkgs/applications/science/misc/openmodelica/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/science/misc/openmodelica/default.nix
@@ -45,7 +45,7 @@ stdenv.mkDerivation {
'';
meta = with stdenv.lib; {
- description = "OpenModelica is an open-source Modelica-based modeling and simulation environment";
+ description = "An open-source Modelica-based modeling and simulation environment";
homepage = "https://openmodelica.org";
license = licenses.gpl3;
maintainers = with maintainers; [ smironov ];
diff --git a/third_party/nixpkgs/pkgs/applications/science/programming/scyther/default.nix b/third_party/nixpkgs/pkgs/applications/science/programming/scyther/default.nix
index d1e948fe18..ca6b57de61 100644
--- a/third_party/nixpkgs/pkgs/applications/science/programming/scyther/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/science/programming/scyther/default.nix
@@ -13,7 +13,7 @@ let
};
meta = with lib; {
- description = "Scyther is a tool for the automatic verification of security protocols";
+ description = "A tool for the automatic verification of security protocols";
homepage = "https://www.cs.ox.ac.uk/people/cas.cremers/scyther/";
license = licenses.gpl2;
maintainers = with maintainers; [ infinisil ];
diff --git a/third_party/nixpkgs/pkgs/applications/misc/alacritty/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/alacritty/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/alacritty/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/alacritty/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/aminal/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/aminal/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/aminal/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/aminal/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/cool-retro-term/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/cool-retro-term/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/cool-retro-term/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/cool-retro-term/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/eterm/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/eterm/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/eterm/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/eterm/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/evilvte/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/evilvte/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/evilvte/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/evilvte/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/foot/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/foot/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/foot/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/foot/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/guake/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/guake/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/guake/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/guake/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/havoc/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/havoc/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/havoc/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/havoc/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/hyper/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/hyper/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/hyper/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/hyper/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/iterm2/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/iterm2/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/iterm2/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/iterm2/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/iterm2/disable_updates.patch b/third_party/nixpkgs/pkgs/applications/terminal-emulators/iterm2/disable_updates.patch
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/iterm2/disable_updates.patch
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/iterm2/disable_updates.patch
diff --git a/third_party/nixpkgs/pkgs/applications/misc/kitty/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/kitty/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/kitty/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/kitty/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/kitty/fix-paths.patch b/third_party/nixpkgs/pkgs/applications/terminal-emulators/kitty/fix-paths.patch
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/kitty/fix-paths.patch
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/kitty/fix-paths.patch
diff --git a/third_party/nixpkgs/pkgs/applications/misc/lilyterm/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/lilyterm/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/lilyterm/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/lilyterm/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/lxterminal/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/lxterminal/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/lxterminal/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/lxterminal/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/lxterminal/respect-xml-catalog-files-var.patch b/third_party/nixpkgs/pkgs/applications/terminal-emulators/lxterminal/respect-xml-catalog-files-var.patch
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/lxterminal/respect-xml-catalog-files-var.patch
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/lxterminal/respect-xml-catalog-files-var.patch
diff --git a/third_party/nixpkgs/pkgs/applications/misc/microcom/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/microcom/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/microcom/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/microcom/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/mlterm/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/mlterm/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/mlterm/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/mlterm/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/mrxvt/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/mrxvt/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/mrxvt/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/mrxvt/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/nimmm/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/nimmm/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/nimmm/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/nimmm/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/roxterm/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/roxterm/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/roxterm/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/roxterm/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode-plugins/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode-plugins/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode-plugins/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode-plugins/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode-plugins/urxvt-autocomplete-all-the-things/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode-plugins/urxvt-autocomplete-all-the-things/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode-plugins/urxvt-autocomplete-all-the-things/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode-plugins/urxvt-autocomplete-all-the-things/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode-plugins/urxvt-bidi/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode-plugins/urxvt-bidi/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode-plugins/urxvt-bidi/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode-plugins/urxvt-bidi/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode-plugins/urxvt-font-size/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode-plugins/urxvt-font-size/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode-plugins/urxvt-font-size/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode-plugins/urxvt-font-size/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode-plugins/urxvt-perl/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode-plugins/urxvt-perl/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode-plugins/urxvt-perl/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode-plugins/urxvt-perl/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode-plugins/urxvt-perls/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode-plugins/urxvt-perls/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode-plugins/urxvt-perls/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode-plugins/urxvt-perls/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode-plugins/urxvt-resize-font/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode-plugins/urxvt-resize-font/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode-plugins/urxvt-resize-font/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode-plugins/urxvt-resize-font/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode-plugins/urxvt-tabbedex/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode-plugins/urxvt-tabbedex/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode-plugins/urxvt-tabbedex/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode-plugins/urxvt-tabbedex/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode-plugins/urxvt-theme-switch/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode-plugins/urxvt-theme-switch/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode-plugins/urxvt-theme-switch/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode-plugins/urxvt-theme-switch/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode-plugins/urxvt-vtwheel/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode-plugins/urxvt-vtwheel/default.nix
similarity index 99%
rename from third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode-plugins/urxvt-vtwheel/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode-plugins/urxvt-vtwheel/default.nix
index aebbedacef..eb520f38be 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode-plugins/urxvt-vtwheel/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode-plugins/urxvt-vtwheel/default.nix
@@ -9,7 +9,7 @@ stdenv.mkDerivation {
rev = "36d3e861664aeae36a45f96100f10f8fe2218035";
sha256 = "1h3vrsbli5q9kr84j5ijbivlhpwlh3l8cv233pg362v2zz4ja8i7";
};
-
+
installPhase = ''
sed -i 's|#! perl|#! ${perl}/bin/perl|g' vtwheel
mkdir -p $out/lib/urxvt/perl
@@ -23,5 +23,5 @@ stdenv.mkDerivation {
maintainers = with maintainers; [ danbst ];
platforms = with platforms; unix;
};
-
+
}
diff --git a/third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode/patches/256-color-resources.patch b/third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode/patches/256-color-resources.patch
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode/patches/256-color-resources.patch
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode/patches/256-color-resources.patch
diff --git a/third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode/patches/9.06-font-width.patch b/third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode/patches/9.06-font-width.patch
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode/patches/9.06-font-width.patch
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode/patches/9.06-font-width.patch
diff --git a/third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode/patches/makefile-phony.patch b/third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode/patches/makefile-phony.patch
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode/patches/makefile-phony.patch
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode/patches/makefile-phony.patch
diff --git a/third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode/wrapper.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode/wrapper.nix
similarity index 99%
rename from third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode/wrapper.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode/wrapper.nix
index 38978799b5..b03acb9953 100644
--- a/third_party/nixpkgs/pkgs/applications/misc/rxvt-unicode/wrapper.nix
+++ b/third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt-unicode/wrapper.nix
@@ -29,7 +29,7 @@ let
# This provides simple way to customize urxvt using
# the `.override` mechanism.
wrapper = { configure, ... }:
- let
+ let
config = configure { inherit availablePlugins; };
plugins = config.plugins or (builtins.attrValues availablePlugins);
extraDeps = config.extraDeps or [ ];
diff --git a/third_party/nixpkgs/pkgs/applications/misc/rxvt/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/rxvt/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/rxvt/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/terminal-emulators/sakura/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/sakura/default.nix
new file mode 100644
index 0000000000..7cccec3b72
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/applications/terminal-emulators/sakura/default.nix
@@ -0,0 +1,50 @@
+{ stdenv
+, fetchurl
+, cmake
+, pkgconfig
+, gtk3
+, perl
+, vte
+, pcre2
+, glib
+, makeWrapper
+}:
+
+stdenv.mkDerivation rec {
+ pname = "sakura";
+ version = "3.7.1";
+
+ src = fetchurl {
+ url = "https://launchpad.net/${pname}/trunk/${version}/+download/${pname}-${version}.tar.bz2";
+ sha256 = "sha256-cppODnUKQpS9kFkkOqxU3yqAElAVn8VQtQsP4Carkos=";
+ };
+
+ nativeBuildInputs = [ cmake perl pkgconfig makeWrapper ];
+
+ buildInputs = [ gtk3 vte pcre2 glib ];
+
+ # Set path to gsettings-schemata so sakura knows
+ # where to find colorchooser, fontchooser etc.
+ postInstall = ''
+ wrapProgram $out/bin/sakura \
+ --suffix XDG_DATA_DIRS : ${gtk3}/share/gsettings-schemas/${gtk3.name}/
+ '';
+
+ meta = with stdenv.lib; {
+ homepage = "https://www.pleyades.net/david/projects/sakura";
+ description = "A terminal emulator based on GTK and VTE";
+ longDescription = ''
+ sakura is a terminal emulator based on GTK and VTE. It's a terminal
+ emulator with few dependencies, so you don't need a full GNOME desktop
+ installed to have a decent terminal emulator. Current terminal emulators
+ based on VTE are gnome-terminal, XFCE Terminal, TermIt and a small
+ sample program included in the vte sources. The differences between
+ sakura and the last one are that it uses a notebook to provide several
+ terminals in one window and adds a contextual menu with some basic
+ options. No more no less.
+ '';
+ license = licenses.gpl2Only;
+ maintainers = with maintainers; [ astsmtl codyopel AndersonTorres ];
+ platforms = platforms.linux;
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/applications/misc/st/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/st/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/st/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/st/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/st/xst.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/st/xst.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/st/xst.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/st/xst.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/stupidterm/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/stupidterm/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/stupidterm/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/stupidterm/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/terminator/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/terminator/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/terminator/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/terminator/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/terminus/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/terminus/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/terminus/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/terminus/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/termite/add_errno_header.patch b/third_party/nixpkgs/pkgs/applications/terminal-emulators/termite/add_errno_header.patch
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/termite/add_errno_header.patch
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/termite/add_errno_header.patch
diff --git a/third_party/nixpkgs/pkgs/applications/misc/termite/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/termite/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/termite/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/termite/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/termite/remove_ldflags_macos.patch b/third_party/nixpkgs/pkgs/applications/terminal-emulators/termite/remove_ldflags_macos.patch
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/termite/remove_ldflags_macos.patch
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/termite/remove_ldflags_macos.patch
diff --git a/third_party/nixpkgs/pkgs/applications/misc/termite/url_regexp_trailing.patch b/third_party/nixpkgs/pkgs/applications/terminal-emulators/termite/url_regexp_trailing.patch
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/termite/url_regexp_trailing.patch
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/termite/url_regexp_trailing.patch
diff --git a/third_party/nixpkgs/pkgs/applications/misc/termite/wrapper.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/termite/wrapper.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/termite/wrapper.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/termite/wrapper.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/termonad/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/termonad/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/termonad/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/termonad/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/tilda/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/tilda/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/tilda/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/tilda/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/tilix/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/tilix/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/tilix/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/tilix/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/wayst/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/wayst/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/wayst/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/wayst/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/wayst/utf8proc.patch b/third_party/nixpkgs/pkgs/applications/terminal-emulators/wayst/utf8proc.patch
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/wayst/utf8proc.patch
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/wayst/utf8proc.patch
diff --git a/third_party/nixpkgs/pkgs/applications/misc/x3270/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/x3270/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/x3270/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/x3270/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/xterm/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/xterm/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/xterm/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/xterm/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/xterm/sixel-256.support.patch b/third_party/nixpkgs/pkgs/applications/terminal-emulators/xterm/sixel-256.support.patch
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/xterm/sixel-256.support.patch
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/xterm/sixel-256.support.patch
diff --git a/third_party/nixpkgs/pkgs/applications/misc/xtermcontrol/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/xtermcontrol/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/xtermcontrol/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/xtermcontrol/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/misc/yaft/default.nix b/third_party/nixpkgs/pkgs/applications/terminal-emulators/yaft/default.nix
similarity index 100%
rename from third_party/nixpkgs/pkgs/applications/misc/yaft/default.nix
rename to third_party/nixpkgs/pkgs/applications/terminal-emulators/yaft/default.nix
diff --git a/third_party/nixpkgs/pkgs/applications/version-management/cvs-fast-export/default.nix b/third_party/nixpkgs/pkgs/applications/version-management/cvs-fast-export/default.nix
index 0592f6e545..cbd630094f 100644
--- a/third_party/nixpkgs/pkgs/applications/version-management/cvs-fast-export/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/version-management/cvs-fast-export/default.nix
@@ -1,7 +1,7 @@
{stdenv, fetchurl, makeWrapper, flex, bison,
asciidoc, docbook_xml_dtd_45, docbook_xsl,
libxml2, libxslt,
- python27, rcs, cvs, git,
+ python3, rcs, cvs, git,
coreutils, rsync}:
with stdenv; with lib;
mkDerivation rec {
@@ -22,7 +22,7 @@ mkDerivation rec {
buildInputs = [
flex bison asciidoc docbook_xml_dtd_45 docbook_xsl libxml2 libxslt
- python27 rcs cvs git makeWrapper
+ python3 rcs cvs git makeWrapper
];
postPatch = "patchShebangs .";
diff --git a/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/bump2version/default.nix b/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/bump2version/default.nix
index 69b44625f9..eb44f6d412 100644
--- a/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/bump2version/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/bump2version/default.nix
@@ -7,7 +7,7 @@ buildPythonApplication rec {
src = fetchFromGitHub {
owner = "c4urself";
- repo = "${pname}";
+ repo = pname;
rev = "refs/tags/v${version}";
sha256 = "10p7rg569rk3qvzs5kjj17894bqlsg3ihhbln6ciwwfhkfq1kpja";
};
@@ -16,12 +16,12 @@ buildPythonApplication rec {
# X's in pytest are git tests which won't run in sandbox
checkPhase = ''
pytest tests/ -k 'not usage_string_fork'
- '';
+ '';
meta = with stdenv.lib; {
description = "Version-bump your software with a single command";
longDescription = ''
- A small command line tool to simplify releasing software by updating
+ A small command line tool to simplify releasing software by updating
all version strings in your source code by the correct increment.
'';
homepage = "https://github.com/c4urself/bump2version";
diff --git a/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/gh/default.nix b/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/gh/default.nix
index e59ca6ac89..4fe805f752 100644
--- a/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/gh/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/gh/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "gh";
- version = "1.1.0";
+ version = "1.2.0";
src = fetchFromGitHub {
owner = "cli";
repo = "cli";
rev = "v${version}";
- sha256 = "1jf1y6135p30dlr42fnl0w7782fczizq8yya4bsd6xf66bcq0zzn";
+ sha256 = "17hbgi1jh4p07r4p5mr7w7p01i6zzr28mn5i4jaki7p0jwfqbvvi";
};
- vendorSha256 = "12ka5x5m4h8dfpcdhfjc5lz6bm8pzfqkbhs9j3a8w08xsi93dvdz";
+ vendorSha256 = "0ybbwbw4vdsxdq4w75s1i0dqad844sfgs69b3vlscwfm6g3i9h51";
nativeBuildInputs = [ installShellFiles ];
diff --git a/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/ghorg/default.nix b/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/ghorg/default.nix
index fc2e660fa7..30049e8458 100644
--- a/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/ghorg/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/ghorg/default.nix
@@ -7,7 +7,7 @@ buildGoModule rec {
src = fetchFromGitHub {
owner = "gabrie30";
repo = "ghorg";
- rev = "${version}";
+ rev = version;
sha256 = "0diwndkckv6fga45j9zngizycn5m71r67cziv0zrx6c66ssbj49w";
};
diff --git a/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/git-extras/default.nix b/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/git-extras/default.nix
index ed9e1cd4bd..d322a141cd 100644
--- a/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/git-extras/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/git-extras/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "git-extras";
- version = "6.0.0";
+ version = "6.1.0";
src = fetchzip {
url = "https://github.com/tj/git-extras/archive/${version}.tar.gz";
- sha256 = "0mxb3c5lb5n7c76bp10bw7bid564vjxi5f7cvzaj2ss93v5rr11g";
+ sha256 = "12ff9rhgqd71xm72r385hx0h8g75hz0ag0adzqcwfa54k0lhrrrz";
};
nativeBuildInputs = [ unixtools.column which ];
diff --git a/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/git-filter-repo/default.nix b/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/git-filter-repo/default.nix
index 5a7e5bd32a..c642f062c7 100644
--- a/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/git-filter-repo/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/git-filter-repo/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "git-filter-repo";
- version = "2.28.0";
+ version = "2.29.0";
src = fetchurl {
url = "https://github.com/newren/git-filter-repo/releases/download/v${version}/${pname}-${version}.tar.xz";
- sha256 = "0sa6h6k1mnhx8p8w5d88gx7cqbnxaazfj1dv47c107fk70hqvvpx";
+ sha256 = "00nn7k9jqrybb762486fmigsnbcn9lbvimgpfvvarz4ikdp9y9pb";
};
buildInputs = [ pythonPackages.python ];
diff --git a/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/git-gone/default.nix b/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/git-gone/default.nix
index 46decaf3cc..13411ed4c4 100644
--- a/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/git-gone/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/git-gone/default.nix
@@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "git-gone";
- version = "0.3.6";
+ version = "0.3.7";
src = fetchFromGitHub {
owner = "lunaryorn";
repo = pname;
rev = "v${version}";
- sha256 = "0wpmabd5lshsga3dhv1hix7i99f1f82rpl6kjmpi315whg11kki3";
+ sha256 = "0hhy1yazda9r4n753a5m9jf31fbzmm4v8wvl3pksspj2syglmll8";
};
- cargoSha256 = "0ayqsrhy6hpi20gfryhnwl2c1na4nnmzxkp7him104cc07vsdllq";
+ cargoSha256 = "1g2jijx8y34lid9qwa26v4svab5v9ki6gn9vcfiy61dqa964c3l9";
nativeBuildInputs = [ pkgconfig makeWrapper installShellFiles ];
diff --git a/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/git-trim/default.nix b/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/git-trim/default.nix
index 137e6eb715..33534334be 100644
--- a/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/git-trim/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/version-management/git-and-tools/git-trim/default.nix
@@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "git-trim";
- version = "0.4.0";
+ version = "0.4.2";
src = fetchFromGitHub {
owner = "foriequal0";
repo = pname;
rev = "v${version}";
- sha256 = "0w6qrr53wal4p4jvz35f9mpqwz1vfcymj17sz418n9p9lw45f24n";
+ sha256 = "1rb9dhj7b7mjrhsvm9vw5gzjfxj10idnzv488jkfdz7sfhd3fcvz";
};
- cargoSha256 = "1mlvkvgcln59bi249z87v8i0ixq1a7walkzsjml6d219rmy5550h";
+ cargoSha256 = "1q62gqqhf78ljcvzp7yrnr0vk65rif2f7axzjq0b87prbcsr7ij4";
nativeBuildInputs = [ pkg-config ];
diff --git a/third_party/nixpkgs/pkgs/applications/version-management/git-review/default.nix b/third_party/nixpkgs/pkgs/applications/version-management/git-review/default.nix
index c7702cfa19..d0bbca15ea 100644
--- a/third_party/nixpkgs/pkgs/applications/version-management/git-review/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/version-management/git-review/default.nix
@@ -1,6 +1,6 @@
-{ stdenv, fetchFromGitHub, pythonPackages} :
+{ lib, fetchurl, buildPythonApplication, pbr, requests, setuptools }:
-pythonPackages.buildPythonApplication rec {
+buildPythonApplication rec {
pname = "git-review";
version = "1.28.0";
@@ -8,21 +8,20 @@ pythonPackages.buildPythonApplication rec {
# upstream repository (and we are installing from tarball instead)
PBR_VERSION = version;
- src = fetchFromGitHub {
- owner = "openstack-infra";
- repo = pname;
- rev = version;
- sha256 = "1hgw1dkl94m3idv4izc7wf2j7al2c7nnsqywy7g53nzkv9pfv47s";
+ src = fetchurl {
+ url = "https://opendev.org/opendev/${pname}/archive/${version}.tar.gz";
+ sha256 = "1y1jzb0hlprynwwr4q5y4x06641qrhj0k69mclabnmhfam9g8ygm";
};
- propagatedBuildInputs = with pythonPackages; [ pbr requests setuptools ];
+ propagatedBuildInputs = [ pbr requests setuptools ];
# Don't do tests because they require gerrit which is not packaged
doCheck = false;
- meta = {
- homepage = "https://github.com/openstack-infra/git-review";
+ meta = with lib; {
+ homepage = "https://opendev.org/opendev/git-review";
description = "Tool to submit code to Gerrit";
- license = stdenv.lib.licenses.asl20;
+ license = licenses.asl20;
+ maintainers = with maintainers; [ metadark ];
};
}
diff --git a/third_party/nixpkgs/pkgs/applications/video/bombono/default.nix b/third_party/nixpkgs/pkgs/applications/video/bombono/default.nix
index 2ae3722fff..05ba5ef19b 100644
--- a/third_party/nixpkgs/pkgs/applications/video/bombono/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/video/bombono/default.nix
@@ -1,54 +1,80 @@
-{ stdenv, fetchFromGitHub, wrapGAppsHook, gtk2, boost, gtkmm2, scons,
-mjpegtools, libdvdread, dvdauthor, gettext, dvdplusrwtools, libxmlxx, ffmpeg_3,
-enca, pkgconfig, fetchpatch }:
+{ stdenv
+, fetchFromGitHub
+, pkgconfig
+, fetchpatch
+, scons
+, boost
+, dvdauthor
+, dvdplusrwtools
+, enca
+, ffmpeg_3
+, gettext
+, gtk2
+, gtkmm2
+, libdvdread
+, libxmlxx
+, mjpegtools
+, wrapGAppsHook
+}:
-let fetchPatchFromAur = {name, sha256}:
-fetchpatch {
- inherit name sha256;
- url = "https://aur.archlinux.org/cgit/aur.git/plain/${name}?h=e6cc6bc80c672aaa1a2260abfe8823da299a192c";
-}; in
+let
+ fetchPatchFromAur = {name, sha256}:
+ fetchpatch {
+ inherit name sha256;
+ url = "https://aur.archlinux.org/cgit/aur.git/plain/${name}?h=e6cc6bc80c672aaa1a2260abfe8823da299a192c";
+ };
+in
stdenv.mkDerivation rec {
pname = "bombono";
version = "1.2.4";
+
src = fetchFromGitHub {
- owner = "muravjov";
+ owner = "bombono-dvd";
repo = "bombono-dvd";
rev = version;
- sha256 = "1lz1vik6abn1i1pvxhm55c9g47nxxv755wb2ijszwswwrwgvq5b9";
+ sha256 = "sha256-aRW8H8+ca/61jGLxUs7u3R7yEiulwr5viMEuZWbc4dM=";
};
patches = [
(fetchpatch {
name = "bombono-dvd-1.2.4-scons3.patch";
url = "https://svnweb.mageia.org/packages/cauldron/bombono-dvd/current/SOURCES/bombono-dvd-1.2.4-scons-python3.patch?revision=1447925&view=co&pathrev=1484457";
- sha256 = "081116d0if6s2r1rgqfr1n5gl3kpvzk01pf4v2k7gg2rnid83qp4";
+ sha256 = "sha256-5OKBWrRZvHem2MTdAObfdw76ig3Z4ZdDFtq4CJoJISA=";
})
] ++ (map fetchPatchFromAur [
- {name="fix_ffmpeg_codecid.patch"; sha256="1asfc0lqzk4gjssrvjmsi1xr53ygnsx2sh7c8yzp5r3j2bagxhp7";}
- {name="fix_ptr2bool_cast.patch"; sha256="0iqzrmbg38ikh4x9cmx0v0rnm7a9lcq0kd8sh1z9yfmnz71qqahg";}
- {name="fix_c++11_literal_warnings.patch"; sha256="1zbf12i77p0j0090pz5lzg4a7kyahahzqssybv7vi0xikwvw57w9";}
- {name="autoptr2uniqueptr.patch"; sha256="0a3wvwfplmqvi8fnj929y85z3h1iq7baaz2d4v08h1q2wbmakqdm";}
- {name="fix_deprecated_boost_api.patch"; sha256="184gdz3w95ihhsd8xscpwvq77xd4il47kvmv6wslax77xyw50gm8";}
- {name="fix_throw_specifications.patch"; sha256="1f5gi3qwm843hsxvijq7sjy0s62xm7rnr1vdp7f242fi0ldq6c1n";}
- {name="fix_operator_ambiguity.patch"; sha256="0r4scsbsqfg6wgzsbfxxpckamvgyrida0n1ypg1klx24pk5dc7n7";}
- {name="fix_ffmpeg30.patch"; sha256="1irva7a9bpbzs60ga8ypa3la9y84i5rz20jnd721qmfqp2yip8dw";}
+ {name="fix_ffmpeg_codecid.patch"; sha256="sha256-58L+1BJy5HK/R+xALbq2z4+Se4i6yp21lo/MjylgTqs=";}
+ {name="fix_ptr2bool_cast.patch"; sha256="sha256-DyqMw/m2Op9+gBq1CTCjSZ1qM9igV5Y6gTOi8VbNH0c=";}
+ {name="fix_c++11_literal_warnings.patch"; sha256="sha256-iZ/CN5+xg7jPXl5r/KGCys+jyPu0/AsSABLcc6IIbv0=";}
+ {name="autoptr2uniqueptr.patch"; sha256="sha256-teGp6uICB4jAJk18pdbBMcDxC/JJJGkdihtXeh3ffCg=";}
+ {name="fix_deprecated_boost_api.patch"; sha256="sha256-qD5QuO/ndEU1N7vueQiNpPVz8OaX6Y6ahjCWxMdvj6A=";}
+ {name="fix_throw_specifications.patch"; sha256="sha256-NjCDGwXRCSLcuW2HbPOpXRgNvNQHy7i7hoOgyvGIr7g=";}
+ {name="fix_operator_ambiguity.patch"; sha256="sha256-xx7WyrxEdDrDuz5YoFrM/u2qJru9u6X/4+Y5rJdmmmQ=";}
+ {name="fix_ffmpeg30.patch"; sha256="sha256-vKEbvbjYVRzEaVYC8XOJBPmk6FDXI/WA0X/dldRRO8c=";}
]);
nativeBuildInputs = [ wrapGAppsHook scons pkgconfig gettext ];
buildInputs = [
- gtk2 gtkmm2 mjpegtools libdvdread dvdauthor boost dvdplusrwtools
- libxmlxx ffmpeg_3 enca
- ];
+ boost
+ dvdauthor
+ dvdplusrwtools
+ enca
+ ffmpeg_3
+ gtk2
+ gtkmm2
+ libdvdread
+ libxmlxx
+ mjpegtools
+ ];
prefixKey = "PREFIX=";
enableParallelBuilding = true;
- meta = {
+ meta = with stdenv.lib; {
description = "a DVD authoring program for personal computers";
- homepage = "http://www.bombono.org/";
- license = stdenv.lib.licenses.gpl2;
- maintainers = with stdenv.lib.maintainers; [ symphorien ];
+ homepage = "https://www.bombono.org/";
+ license = licenses.gpl2Only;
+ maintainers = with maintainers; [ symphorien ];
};
}
diff --git a/third_party/nixpkgs/pkgs/applications/video/clipgrab/default.nix b/third_party/nixpkgs/pkgs/applications/video/clipgrab/default.nix
index f8b74a1754..d53c189986 100644
--- a/third_party/nixpkgs/pkgs/applications/video/clipgrab/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/video/clipgrab/default.nix
@@ -5,10 +5,10 @@
mkDerivation rec {
pname = "clipgrab";
- version = "3.8.14";
+ version = "3.8.15";
src = fetchurl {
- sha256 = "19337qjxwlkpdnnh6q0y4b8askk17a8zb88gifznllrk06a6pgyf";
+ sha256 = "1anp8hhwbkirsvc7mn11k272f0d85vzb5ppiw3gg9ss2hdai563n";
# The .tar.bz2 "Download" link is a binary blob, the source is the .tar.gz!
url = "https://download.clipgrab.org/${pname}-${version}.tar.gz";
};
diff --git a/third_party/nixpkgs/pkgs/applications/video/filebot/default.nix b/third_party/nixpkgs/pkgs/applications/video/filebot/default.nix
index cdd70b4c89..e9ae14e19a 100644
--- a/third_party/nixpkgs/pkgs/applications/video/filebot/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/video/filebot/default.nix
@@ -10,11 +10,11 @@ in
stdenv.mkDerivation rec {
pname = "filebot";
- version = "4.9.1";
+ version = "4.9.2";
src = fetchurl {
url = "https://get.filebot.net/filebot/FileBot_${version}/FileBot_${version}-portable.tar.xz";
- sha256 = "0l496cz703mjymjhgmyrkqbfld1bz53pdsbkx00h9a267j22fkms";
+ sha256 = "0hcyam8l0fzc9fnp1dpawk0s3rwhfph78w99y7zlcv5l4l4h04lz";
};
unpackPhase = "tar xvf $src";
@@ -30,7 +30,7 @@ stdenv.mkDerivation rec {
cp -r filebot.sh lib/ jar/ $out/opt/
# Filebot writes to $APP_DATA, which fails due to read-only filesystem. Using current user .local directory instead.
substituteInPlace $out/opt/filebot.sh \
- --replace 'APP_DATA="$FILEBOT_HOME/data/$USER"' 'APP_DATA=''${XDG_DATA_HOME:-$HOME/.local/share}/filebot/data' \
+ --replace 'APP_DATA="$FILEBOT_HOME/data/$(id -u)"' 'APP_DATA=''${XDG_DATA_HOME:-$HOME/.local/share}/filebot/data' \
--replace '$FILEBOT_HOME/data/.license' '$APP_DATA/.license'
wrapProgram $out/opt/filebot.sh \
--prefix PATH : ${stdenv.lib.makeBinPath [ openjdk11 ]}
diff --git a/third_party/nixpkgs/pkgs/applications/video/linuxstopmotion/default.nix b/third_party/nixpkgs/pkgs/applications/video/linuxstopmotion/default.nix
index 3a2d1b79e9..365fb1ea41 100644
--- a/third_party/nixpkgs/pkgs/applications/video/linuxstopmotion/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/video/linuxstopmotion/default.nix
@@ -1,32 +1,26 @@
-{ stdenv, fetchgit, pkgconfig, qt4, SDL, SDL_image, libvorbis, libtar, libxml2
-, gamin, qmake4Hook
-}:
+{ mkDerivation, lib, fetchgit, pkgconfig, qmake, qtbase, qttools, qtmultimedia, libvorbis, libtar, libxml2 }:
-stdenv.mkDerivation rec {
- version = "0.8";
+mkDerivation rec {
+ version = "0.8.5";
pname = "linuxstopmotion";
-
+
src = fetchgit {
- url = "git://git.code.sf.net/p/linuxstopmotion/code";
- rev = "refs/tags/${version}";
- sha256 = "19v9d0v3laiwi0f1n92lvj2s5s1mxsrfygna0xyw9pkcnk3b26q6";
+ url = "https://git.code.sf.net/p/linuxstopmotion/code";
+ rev = version;
+ sha256 = "1612lkwsfzc59wvdj2zbj5cwsyw66bwn31jrzjrxvygxdh4ab069";
};
- nativeBuildInputs = [ pkgconfig ];
- buildInputs = [ qt4 SDL SDL_image libvorbis libtar libxml2 gamin qmake4Hook ];
+ nativeBuildInputs = [ qmake pkgconfig ];
+ buildInputs = [ qtbase qttools qtmultimedia libvorbis libtar libxml2 ];
- patches = [ ./linuxstopmotion-fix-wrong-isProcess-logic.patch ];
-
- # Installation breaks without this
- preInstall = ''
- mkdir -p "$out/share/stopmotion/translations/"
- cp -v build/*.qm "$out/share/stopmotion/translations/"
+ postPatch = ''
+ substituteInPlace stopmotion.pro --replace '$$[QT_INSTALL_BINS]' '${lib.getDev qttools}/bin'
'';
- meta = with stdenv.lib; {
+ meta = with lib; {
description = "Create stop-motion animation movies";
homepage = "http://linuxstopmotion.org/";
- license = licenses.gpl2;
+ license = licenses.gpl2Plus;
platforms = platforms.linux;
maintainers = [ maintainers.bjornfor ];
};
diff --git a/third_party/nixpkgs/pkgs/applications/video/linuxstopmotion/linuxstopmotion-fix-wrong-isProcess-logic.patch b/third_party/nixpkgs/pkgs/applications/video/linuxstopmotion/linuxstopmotion-fix-wrong-isProcess-logic.patch
deleted file mode 100644
index caab48d0e2..0000000000
--- a/third_party/nixpkgs/pkgs/applications/video/linuxstopmotion/linuxstopmotion-fix-wrong-isProcess-logic.patch
+++ /dev/null
@@ -1,33 +0,0 @@
-From b23b7dab1d540b0710fcb9ded1c6256a49844906 Mon Sep 17 00:00:00 2001
-From: =?UTF-8?q?Bj=C3=B8rn=20Forsman?=
-Date: Wed, 20 Aug 2014 22:22:00 +0200
-Subject: [PATCH] Fix wrong "isProcess" logic
-
-Stopmotion wrongly thinks that uvccapture should be run as a daemon,
-even though configuration for uvccapture has no "daemon-like" command
-line to be run (according to "preferences"). The result is an error
-popup instead of video/image grabbing.
-
-This brings back the "isProcess" logic that was in stopmotion v0.7.2,
-because it seems to work, while the current logic (v0.8.0) seems to
-fail.
----
- src/presentation/frontends/qtfrontend/frameview.cpp | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/src/presentation/frontends/qtfrontend/frameview.cpp b/src/presentation/frontends/qtfrontend/frameview.cpp
-index e44dca7..d2c41fd 100644
---- a/src/presentation/frontends/qtfrontend/frameview.cpp
-+++ b/src/presentation/frontends/qtfrontend/frameview.cpp
-@@ -270,7 +270,7 @@ bool FrameView::on() {
- Preference device(QString("device%1")
- .arg(activeDev).toLatin1().constData(), "");
- QString pre = QString(prepoll.get()).replace("$VIDEODEVICE", device.get());
-- bool isProcess = startDaemon.get();
-+ bool isProcess = (strcmp(startDaemon.get(), "") == 0) ? false : true;
-
- bool isCameraReady = true;
- this->grabber = new CommandLineGrabber(capturedFile.path(), isProcess);
---
-2.0.2
-
diff --git a/third_party/nixpkgs/pkgs/applications/video/mjpg-streamer/default.nix b/third_party/nixpkgs/pkgs/applications/video/mjpg-streamer/default.nix
index d1efae4a92..b6856f1a18 100644
--- a/third_party/nixpkgs/pkgs/applications/video/mjpg-streamer/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/video/mjpg-streamer/default.nix
@@ -24,7 +24,7 @@ stdenv.mkDerivation {
meta = with stdenv.lib; {
homepage = "https://github.com/jacksonliam/mjpg-streamer";
- description = "MJPG-streamer takes JPGs from Linux-UVC compatible webcams, filesystem or other input plugins and streams them as M-JPEG via HTTP to webbrowsers, VLC and other software";
+ description = "Takes JPGs from Linux-UVC compatible webcams, filesystem or other input plugins and streams them as M-JPEG via HTTP to webbrowsers, VLC and other software";
platforms = platforms.linux;
license = licenses.gpl2;
maintainers = with maintainers; [ gebner ];
diff --git a/third_party/nixpkgs/pkgs/applications/video/mkclean/default.nix b/third_party/nixpkgs/pkgs/applications/video/mkclean/default.nix
index 6bb1bcc5d8..36cd220607 100644
--- a/third_party/nixpkgs/pkgs/applications/video/mkclean/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/video/mkclean/default.nix
@@ -28,7 +28,7 @@ stdenv.mkDerivation rec {
'';
meta = with stdenv.lib; {
- description = "mkclean is a command line tool to clean and optimize Matroska (.mkv / .mka / .mks / .mk3d) and WebM (.webm / .weba) files that have already been muxed";
+ description = "Command line tool to clean and optimize Matroska (.mkv / .mka / .mks / .mk3d) and WebM (.webm / .weba) files that have already been muxed";
homepage = "https://www.matroska.org";
license = licenses.bsdOriginal;
maintainers = with maintainers; [ chrisaw ];
diff --git a/third_party/nixpkgs/pkgs/applications/video/motion/default.nix b/third_party/nixpkgs/pkgs/applications/video/motion/default.nix
index 7f101c41ed..e251012504 100644
--- a/third_party/nixpkgs/pkgs/applications/video/motion/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/video/motion/default.nix
@@ -3,13 +3,13 @@
stdenv.mkDerivation rec {
pname = "motion";
- version = "4.3.1";
+ version = "4.3.2";
src = fetchFromGitHub {
owner = "Motion-Project";
repo = "motion";
rev = "release-${version}";
- sha256 = "01yy4pdgd4wa97bpw27zn5zik9iz719m1jiwkk9lb7m2a2951dhc";
+ sha256 = "09xs815jsivcilpmnrx2jkcxirj4lg5kp99fkr0p2sdxw03myi95";
};
nativeBuildInputs = [ autoreconfHook pkgconfig ];
diff --git a/third_party/nixpkgs/pkgs/applications/video/obs-studio/default.nix b/third_party/nixpkgs/pkgs/applications/video/obs-studio/default.nix
index c8d70c72fb..0d0fce279b 100644
--- a/third_party/nixpkgs/pkgs/applications/video/obs-studio/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/video/obs-studio/default.nix
@@ -39,13 +39,13 @@ let
in mkDerivation rec {
pname = "obs-studio";
- version = "26.0.0";
+ version = "26.0.2";
src = fetchFromGitHub {
owner = "obsproject";
repo = "obs-studio";
rev = version;
- sha256 = "09y57b3c88szl3wyx3cxq8jrm3pfnyg2n25hxl1ynkq3rgaavdq2";
+ sha256 = "1d502f80whh686mvq0yn6zpa5nvmnlzxwp5sjz43vpbbvhpbrdqj";
};
nativeBuildInputs = [ addOpenGLRunpath cmake pkgconfig ];
diff --git a/third_party/nixpkgs/pkgs/applications/video/plex-mpv-shim/default.nix b/third_party/nixpkgs/pkgs/applications/video/plex-mpv-shim/default.nix
index 16e6cd826e..e25c101b5d 100644
--- a/third_party/nixpkgs/pkgs/applications/video/plex-mpv-shim/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/video/plex-mpv-shim/default.nix
@@ -2,13 +2,13 @@
buildPythonApplication rec {
pname = "plex-mpv-shim";
- version = "1.8.0";
+ version = "1.9.0";
src = fetchFromGitHub {
owner = "iwalton3";
repo = pname;
rev = "v${version}";
- sha256 = "0fi0glnl7nr6754r9jk7d7dsnjbdm7civvhcj2l009yxiv2rxzj3";
+ sha256 = "06i6pp4jg0f9h6ash60fj1l5mbsdw3zyx7c6anbsrn86802i7paa";
};
propagatedBuildInputs = [ mpv requests python-mpv-jsonipc ];
diff --git a/third_party/nixpkgs/pkgs/applications/virtualization/charliecloud/default.nix b/third_party/nixpkgs/pkgs/applications/virtualization/charliecloud/default.nix
index a7e8260765..d6cbc25d88 100644
--- a/third_party/nixpkgs/pkgs/applications/virtualization/charliecloud/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/virtualization/charliecloud/default.nix
@@ -2,14 +2,14 @@
stdenv.mkDerivation rec {
- version = "0.19";
+ version = "0.20";
pname = "charliecloud";
src = fetchFromGitHub {
owner = "hpc";
repo = "charliecloud";
rev = "v${version}";
- sha256 = "1rmvm0s1jdpzfg32b3hwsbdkzws7gsy4xq227hmzv3n2dv64svm6";
+ sha256 = "15ihffwhpjnzgz0ir5vc9la4fwkqj91vmrcsb2r58ikq7h9sk45j";
};
nativeBuildInputs = [ autoreconfHook makeWrapper ];
diff --git a/third_party/nixpkgs/pkgs/applications/virtualization/docker/default.nix b/third_party/nixpkgs/pkgs/applications/virtualization/docker/default.nix
index 3dbfd8f5bb..4d6f53ceb5 100644
--- a/third_party/nixpkgs/pkgs/applications/virtualization/docker/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/virtualization/docker/default.nix
@@ -29,7 +29,9 @@ rec {
patches = [];
});
- docker-containerd = containerd.overrideAttrs (oldAttrs: {
+ docker-containerd = let
+ withlibseccomp = lib.versionAtLeast version "19.03";
+ in containerd.overrideAttrs (oldAttrs: {
name = "docker-containerd-${version}";
inherit version;
src = fetchFromGitHub {
@@ -38,6 +40,9 @@ rec {
rev = containerdRev;
sha256 = containerdSha256;
};
+ # This should be removed once Docker uses containerd >=1.4
+ nativeBuildInputs = oldAttrs.nativeBuildInputs ++ lib.optional withlibseccomp pkgconfig;
+ buildInputs = oldAttrs.buildInputs ++ lib.optional withlibseccomp libseccomp;
});
docker-tini = tini.overrideAttrs (oldAttrs: {
@@ -210,13 +215,14 @@ rec {
};
docker_19_03 = makeOverridable dockerGen rec {
- version = "19.03.12";
+ version = "19.03.13";
rev = "v${version}";
- sha256 = "0i5xr8q3yjrz5zsjcq63v4g1mzqpingjr1hbf9amk14484i2wkw7";
+ sha256 = "139qqy8jiz1phnngknpa7c1nk9iqwd3hcc9as8x50p1vnycwzr3f";
runcRev = "dc9208a3303feef5b3839f4323d9beb36df0a9dd"; # v1.0.0-rc10
runcSha256 = "0pi3rvj585997m4z9ljkxz2z9yxf9p2jr0pmqbqrc7bc95f5hagk";
- containerdRev = "7ad184331fa3e55e52b890ea95e65ba581ae3429"; # v1.2.13
- containerdSha256 = "1rac3iak3jpz57yarxc72bxgxvravwrl0j6s6w2nxrmh2m3kxqzn";
+ # Note: Once all packaged Docker versions use containerd <=1.2 or >=1.4 remove the libseccomp and pkgconfig inputs above
+ containerdRev = "8fba4e9a7d01810a393d5d25a3621dc101981175"; # v1.3.7
+ containerdSha256 = "10zy507ajslizicagb64dvbs7wmw0j4x3hdhygbdh4g2nv3mgjb7";
tiniRev = "fec3683b971d9c3ef73f284f176672c44b448662"; # v0.18.0
tiniSha256 = "1h20i3wwlbd8x4jr2gz68hgklh0lb0jj7y5xk1wvr8y58fip1rdn";
};
diff --git a/third_party/nixpkgs/pkgs/applications/virtualization/virtualbox/default.nix b/third_party/nixpkgs/pkgs/applications/virtualization/virtualbox/default.nix
index c320eca0bb..e80edf7267 100644
--- a/third_party/nixpkgs/pkgs/applications/virtualization/virtualbox/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/virtualization/virtualbox/default.nix
@@ -23,8 +23,7 @@ let
buildType = "release";
# Use maintainers/scripts/update.nix to update the version and all related hashes or
# change the hashes in extpack.nix and guest-additions/default.nix as well manually.
- version = "6.1.14";
- tarballVersion = "${version}a";
+ version = "6.1.16";
iasl' = iasl.overrideAttrs (old: rec {
inherit (old) pname;
@@ -40,8 +39,8 @@ in stdenv.mkDerivation {
inherit version;
src = fetchurl {
- url = "https://download.virtualbox.org/virtualbox/${version}/VirtualBox-${tarballVersion}.tar.bz2";
- sha256 = "16f3cb83ab3c4dacf2a9d3cc638cbd18db23767828bba6b8ba1c1b57abeb6aef";
+ url = "https://download.virtualbox.org/virtualbox/${version}/VirtualBox-${version}.tar.bz2";
+ sha256 = "49c1990da16d8a3d5bda8cdb961ec8195a901e67e4c79aea44c1521a5fc2f9f1";
};
outputs = [ "out" "modsrc" ];
diff --git a/third_party/nixpkgs/pkgs/applications/virtualization/virtualbox/extpack.nix b/third_party/nixpkgs/pkgs/applications/virtualization/virtualbox/extpack.nix
index 03b3be7e96..302f2b5945 100644
--- a/third_party/nixpkgs/pkgs/applications/virtualization/virtualbox/extpack.nix
+++ b/third_party/nixpkgs/pkgs/applications/virtualization/virtualbox/extpack.nix
@@ -12,7 +12,7 @@ fetchurl rec {
# Manually sha256sum the extensionPack file, must be hex!
# Thus do not use `nix-prefetch-url` but instead plain old `sha256sum`.
# Checksums can also be found at https://www.virtualbox.org/download/hashes/${version}/SHA256SUMS
- let value = "b224e796e886b19bce69f0aaedf6ca82bad0ca29c61fb0ed86166efb84356942";
+ let value = "9802482b77b95a954cb5111793da10d009009a4e9a9c4eaa4bd1ae5dafe9db46";
in assert (builtins.stringLength value) == 64; value;
meta = {
diff --git a/third_party/nixpkgs/pkgs/applications/virtualization/virtualbox/guest-additions/default.nix b/third_party/nixpkgs/pkgs/applications/virtualization/virtualbox/guest-additions/default.nix
index 3937d70e86..180970d51d 100644
--- a/third_party/nixpkgs/pkgs/applications/virtualization/virtualbox/guest-additions/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/virtualization/virtualbox/guest-additions/default.nix
@@ -27,7 +27,7 @@ in stdenv.mkDerivation rec {
src = fetchurl {
url = "http://download.virtualbox.org/virtualbox/${version}/VBoxGuestAdditions_${version}.iso";
- sha256 = "dd9f176abb89043c01cea7ec7e20130e76db71bd83beafeb2dc5858d4c9c86cd";
+ sha256 = "88db771a5efd7c048228e5c1e0b8fba56542e9d8c1b75f7af5b0c4cf334f0584";
};
KERN_DIR = "${kernel.dev}/lib/modules/${kernel.modDirVersion}/build";
diff --git a/third_party/nixpkgs/pkgs/applications/window-managers/hikari/default.nix b/third_party/nixpkgs/pkgs/applications/window-managers/hikari/default.nix
index 9bf68adaef..d23d6c07af 100644
--- a/third_party/nixpkgs/pkgs/applications/window-managers/hikari/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/window-managers/hikari/default.nix
@@ -12,7 +12,7 @@
let
pname = "hikari";
- version = "2.1.2";
+ version = "2.2.2";
in
stdenv.mkDerivation {
@@ -20,7 +20,7 @@ stdenv.mkDerivation {
src = fetchzip {
url = "https://hikari.acmelabs.space/releases/${pname}-${version}.tar.gz";
- sha256 = "1qzbwc8dgsvp5jb4faapcrg9npsl11gq8jvhbbk2h7hj52c5lgmv";
+ sha256 = "0sln1n5f67i3vxkybfi6xhzplb45djqyg272vqkv64m72rmm8875";
};
nativeBuildInputs = [ pkgconfig bmake ];
diff --git a/third_party/nixpkgs/pkgs/applications/window-managers/i3/gaps.nix b/third_party/nixpkgs/pkgs/applications/window-managers/i3/gaps.nix
index fa1c97c14c..755ceb4216 100644
--- a/third_party/nixpkgs/pkgs/applications/window-managers/i3/gaps.nix
+++ b/third_party/nixpkgs/pkgs/applications/window-managers/i3/gaps.nix
@@ -3,11 +3,11 @@
i3.overrideAttrs (oldAttrs : rec {
name = "i3-gaps-${version}";
- version = "4.18.2";
+ version = "4.18.3";
src = fetchurl {
url = "https://github.com/Airblader/i3/releases/download/${version}/i3-${version}.tar.bz2";
- sha256 = "0lz08wf4b0yprzqsmymn94kiyg885dcwmh0p64v2rnf52s165g2g";
+ sha256 = "1hcakwyz78lgp8mhqv7pw86jlb3m415pfql1q19rkijnhm3fn3ci";
};
nativeBuildInputs = oldAttrs.nativeBuildInputs ++ [ autoreconfHook ];
diff --git a/third_party/nixpkgs/pkgs/applications/window-managers/i3/lock.nix b/third_party/nixpkgs/pkgs/applications/window-managers/i3/lock.nix
index 2bca01eeef..7a2812c2cf 100644
--- a/third_party/nixpkgs/pkgs/applications/window-managers/i3/lock.nix
+++ b/third_party/nixpkgs/pkgs/applications/window-managers/i3/lock.nix
@@ -3,11 +3,11 @@
stdenv.mkDerivation rec {
pname = "i3lock";
- version = "2.12";
+ version = "2.13";
src = fetchurl {
url = "https://i3wm.org/i3lock/${pname}-${version}.tar.bz2";
- sha256 = "02dwaqxpclcwiwvpvq7zwz4sxcv9c15dbf17ifalj1p8djls3cnh";
+ sha256 = "02szjsaz7rqrdkd0r2nwgwa85c4hwfrcskxw7ryk695kmjcfhzv3";
};
nativeBuildInputs = [ pkgconfig ];
diff --git a/third_party/nixpkgs/pkgs/applications/window-managers/i3/status-rust.nix b/third_party/nixpkgs/pkgs/applications/window-managers/i3/status-rust.nix
index 8bd3d58143..f6acf5698f 100644
--- a/third_party/nixpkgs/pkgs/applications/window-managers/i3/status-rust.nix
+++ b/third_party/nixpkgs/pkgs/applications/window-managers/i3/status-rust.nix
@@ -2,16 +2,16 @@
rustPlatform.buildRustPackage rec {
pname = "i3status-rust";
- version = "0.14.1";
+ version = "0.14.2";
src = fetchFromGitHub {
owner = "greshake";
repo = pname;
rev = "v${version}";
- sha256 = "11qhzjml04njhfa033v98m4yd522zj91s6ffvrm0m6sk7m0wyjsc";
+ sha256 = "1f1gvgb1zk8gw596vaz9iihbpybwzs5shd25qq7bn2bhr4hqlbb9";
};
- cargoSha256 = "0jmmxld4rsjj6p5nazi3d8j1hh7r34q6kyfqq4wv0sjc77gcpaxd";
+ cargoSha256 = "1dcfclk8lbqvq2hywr80jm63p1i1kz3893zq99ipgryia46vd397";
nativeBuildInputs = [ pkgconfig ];
diff --git a/third_party/nixpkgs/pkgs/applications/window-managers/i3/wmfocus.nix b/third_party/nixpkgs/pkgs/applications/window-managers/i3/wmfocus.nix
index c4e22546d1..5c9f2b7795 100644
--- a/third_party/nixpkgs/pkgs/applications/window-managers/i3/wmfocus.nix
+++ b/third_party/nixpkgs/pkgs/applications/window-managers/i3/wmfocus.nix
@@ -3,16 +3,16 @@
rustPlatform.buildRustPackage rec {
pname = "wmfocus";
- version = "1.1.3";
+ version = "1.1.5";
src = fetchFromGitHub {
owner = "svenstaro";
repo = pname;
- rev = version;
- sha256 = "17qdsqp9072yr7rcm6g1h620rff95ldawr8ldpkbjmkh0rc86skn";
+ rev = "v${version}";
+ sha256 = "09xffklpz62h6yiksxdlv3a9s1z0wr3ax9syl399avwdmq3c0y49";
};
- cargoSha256 = "1nsdvzrsgprwq7lsvfpymqslhggdzfk3840y8x92qjb0l2g4jhw1";
+ cargoSha256 = "0rczas6sgcppacz48xx7sarkvc4s2sgcdz6c661d7vcry1y46xms";
nativeBuildInputs = [ python3 pkgconfig ];
buildInputs = [ cairo libxkbcommon xorg.xcbutilkeysyms ];
diff --git a/third_party/nixpkgs/pkgs/applications/window-managers/leftwm/default.nix b/third_party/nixpkgs/pkgs/applications/window-managers/leftwm/default.nix
index 06ebd7e0e9..e2b3e4a55a 100644
--- a/third_party/nixpkgs/pkgs/applications/window-managers/leftwm/default.nix
+++ b/third_party/nixpkgs/pkgs/applications/window-managers/leftwm/default.nix
@@ -26,7 +26,7 @@ rustPlatform.buildRustPackage rec {
'';
meta = with stdenv.lib; {
- description = "Leftwm - A tiling window manager for the adventurer";
+ description = "A tiling window manager for the adventurer";
homepage = "https://github.com/leftwm/leftwm";
license = licenses.mit;
platforms = platforms.linux;
diff --git a/third_party/nixpkgs/pkgs/build-support/build-bazel-package/default.nix b/third_party/nixpkgs/pkgs/build-support/build-bazel-package/default.nix
index 4d22a329e4..10a331bcc9 100644
--- a/third_party/nixpkgs/pkgs/build-support/build-bazel-package/default.nix
+++ b/third_party/nixpkgs/pkgs/build-support/build-bazel-package/default.nix
@@ -9,7 +9,7 @@ let
in
args@{
- name
+ name ? "${args.pname}-${args.version}"
, bazel ? bazelPkg
, bazelFlags ? []
, bazelBuildFlags ? []
diff --git a/third_party/nixpkgs/pkgs/build-support/build-fhs-userenv-bubblewrap/default.nix b/third_party/nixpkgs/pkgs/build-support/build-fhs-userenv-bubblewrap/default.nix
index c7cfd27d3f..83d5d371b3 100644
--- a/third_party/nixpkgs/pkgs/build-support/build-fhs-userenv-bubblewrap/default.nix
+++ b/third_party/nixpkgs/pkgs/build-support/build-fhs-userenv-bubblewrap/default.nix
@@ -77,13 +77,13 @@ let
done
fi
- auto_mounts=""
+ declare -a auto_mounts
# loop through all directories in the root
for dir in /*; do
# if it is a directory and it is not in the blacklist
if [[ -d "$dir" ]] && grep -v "$dir" <<< "$blacklist" >/dev/null; then
# add it to the mount list
- auto_mounts="$auto_mounts --bind $dir $dir"
+ auto_mounts+=(--bind "$dir" "$dir")
fi
done
@@ -97,7 +97,7 @@ let
--ro-bind /nix /nix \
${etcBindFlags} \
$ro_mounts \
- $auto_mounts \
+ "''${auto_mounts[@]}" \
${init runScript}/bin/${name}-init ${initArgs}
'';
diff --git a/third_party/nixpkgs/pkgs/build-support/cc-wrapper/default.nix b/third_party/nixpkgs/pkgs/build-support/cc-wrapper/default.nix
index 0e4e76d728..09cef8b867 100644
--- a/third_party/nixpkgs/pkgs/build-support/cc-wrapper/default.nix
+++ b/third_party/nixpkgs/pkgs/build-support/cc-wrapper/default.nix
@@ -57,7 +57,7 @@ let
suffixSalt = replaceStrings ["-" "."] ["_" "_"] targetPlatform.config;
expand-response-params =
- if buildPackages.stdenv.hasCC && buildPackages.stdenv.cc != "/dev/null"
+ if (buildPackages.stdenv.hasCC or false) && buildPackages.stdenv.cc != "/dev/null"
then import ../expand-response-params { inherit (buildPackages) stdenv; }
else "";
diff --git a/third_party/nixpkgs/pkgs/build-support/writers/default.nix b/third_party/nixpkgs/pkgs/build-support/writers/default.nix
index 495a56b419..9c709921d2 100644
--- a/third_party/nixpkgs/pkgs/build-support/writers/default.nix
+++ b/third_party/nixpkgs/pkgs/build-support/writers/default.nix
@@ -1,4 +1,4 @@
-{ pkgs, lib }:
+{ pkgs, lib, gawk, gnused, gixy }:
with lib;
rec {
@@ -219,10 +219,11 @@ rec {
writeNginxConfig = name: text: pkgs.runCommandLocal name {
inherit text;
passAsFile = [ "text" ];
+ nativeBuildInputs = [ gawk gnused gixy ];
} /* sh */ ''
# nginx-config-formatter has an error - https://github.com/1connect/nginx-config-formatter/issues/16
- ${pkgs.gawk}/bin/awk -f ${awkFormatNginx} "$textPath" | ${pkgs.gnused}/bin/sed '/^\s*$/d' > $out
- ${pkgs.gixy}/bin/gixy $out
+ awk -f ${awkFormatNginx} "$textPath" | sed '/^\s*$/d' > $out
+ gixy $out
'';
# writePerl takes a name an attributeset with libraries and some perl sourcecode and
diff --git a/third_party/nixpkgs/pkgs/common-updater/scripts/mark-broken b/third_party/nixpkgs/pkgs/common-updater/scripts/mark-broken
index d128d0d458..ee80616d0c 100755
--- a/third_party/nixpkgs/pkgs/common-updater/scripts/mark-broken
+++ b/third_party/nixpkgs/pkgs/common-updater/scripts/mark-broken
@@ -1,86 +1,106 @@
#!/usr/bin/env bash
-set -e
+
+# This script is meant to be used to mark failing hydra builds as broken in the meta attrs
+# To use the script, you should pass the list of failing attrs as arguments to the script.
+#
+# Example: `cat failing-attrs | xargs ./pkgs/common-update/scripts/mark-broken`
+#
+# Generating a list of failing attrs: (this should be improved at a later date)
+# - Go to the most recent hydra evaluation with all builds completed
+# - Select the "builds still failing" tab
+# - Highlight and select all packages, should be prefixed with `nixpkgs.`
+# - Use regex and editor foo to leave only the attr names
+# - Use the above example command to then execute the script
+#
+# OTHER NOTES:
+# - The `denyFileList` and `denyAttrList` will likely need to be updated slightly
+# to align with the conventions used in nixpkgs at execution time
+# - Any attrs which failed for any reason will be written to `failed-marks.txt`.
+# Those attrs will likely need manual attention as disablement will likely be conditional.
scriptName=mark-broken # do not use the .wrapped name
-die() {
- echo "$scriptName: error: $1" >&2
- exit 1
+failMark() {
+ local attr=$1
+ shift 1
+
+ echo "$attr: $@" >&2
+ echo $attr >> failed-marks.txt
}
usage() {
- echo "Usage: $scriptName [--new-value=]"
+ echo "Usage: $scriptName "
}
-args=()
-
-for arg in "$@"; do
- case $arg in
- --new-value=*)
- newValue="${arg#*=}"
- ;;
- --help)
- usage
- exit 0
- ;;
- --*)
- echo "$scriptName: Unknown argument: $arg"
- usage
- exit 1
- ;;
- *)
- args["${#args[*]}"]=$arg
- ;;
- esac
-done
-
-attr=${args[0]}
-
-if (( "${#args[*]}" < 1 )); then
+if (( "${#@}" < 1 )); then
echo "$scriptName: Too few arguments"
usage
exit 1
fi
-if (( "${#args[*]}" > 1 )); then
- echo "$scriptName: Too many arguments"
- usage
- exit 1
-fi
+# in case we resolve to an auto-generated file, just skip these entries
+denyFileList=(
+ node-packages.nix # node, it will mark all node packages as broken
+ generic-builder.nix # haskell, it will mark all haskell packages as broken
+)
-if [ -z $newValue ]; then
- newValue="true"
-fi
+# ignore older versions of parameterized packages sets, these likely need
+# to be conditionally disabled
+denyAttrList=(
+ python27Packages
+ python37Packages
+ libsForQt512
+ linuxPackages_
+ rubyPackages_
+)
-nixFile=$(nix-instantiate --eval --json -E "with import ./. {}; (builtins.unsafeGetAttrPos \"description\" $attr.meta).file" | jq -r .)
-if [[ ! -f "$nixFile" ]]; then
- die "Couldn't evaluate 'builtins.unsafeGetAttrPos \"description\" $attr.meta' to locate the .nix file!"
-fi
+function attemptToMarkBroken() {
+ local attr=$1
-# Insert broken attribute
-sed -i.bak "$nixFile" -r \
- -e "/^\s*broken\s*=.*$/d" \
- -e "s/(\s*)meta\s*=.*\{/&\n\1 broken = $newValue;/"
+ # skip likely to be noisy attrs
+ for badAttr in ${denyAttrList[@]};do
+ if [[ $attr =~ $badAttr ]]; then
+ failMark $attr "attr contained $badAttr, skipped."
+ return
+ fi
+ done
-if cmp -s "$nixFile" "$nixFile.bak"; then
- mv "$nixFile.bak" "$nixFile"
- die "Failed to mark the package as broken! Does it have a meta attribute?"
-fi
+ nixFile=$(nix-instantiate --eval --json -E "with import ./. {}; (builtins.unsafeGetAttrPos \"description\" $attr.meta).file" 2>/dev/null | jq -r .)
+ if [[ ! -f "$nixFile" ]]; then
+ failMark $attr "Couldn't locate correct file"
+ return
+ fi
-if [[ "$newValue" == "true" ]]; then
- # broken should evaluate to true in any case now
- markedSuccessfully=$(nix-instantiate --eval -E "with import ./. {}; $attr.meta.broken" || true)
- if [[ ! "$markedSuccessfully" == "true" ]]; then
- mv "$nixFile.bak" "$nixFile"
- die "Couldn't verify the broken attribute to be set correctly, restoring backup!"
- fi
-else
- # we can not check if broken evaluates to the correct value, but we can check that it does evaluate
- if ! nix-instantiate --eval -E "with import ./. {}; $attr.meta.broken" >/dev/null; then
- mv "$nixFile.bak" "$nixFile"
- die "Couldn't verify the broken attribute to be set correctly, restoring backup!"
- fi
-fi
+ # skip files which are auto-generated
+ for filename in ${denyFileList[@]};do
+ if [[ "$filename" == $(basename $nixFile) ]]; then
+ failMark $attr "filename matched $filename, skipped."
+ return
+ fi
+ done
-rm -f "$nixFile.bak"
-rm -f "$attr.fetchlog"
+ # Insert broken attribute
+ sed -i.bak "$nixFile" -r \
+ -e "/^\s*broken\s*=.*$/d" \
+ -e "s/(\s*)meta\s*=.*\{/&\n\1 broken = true;/"
+
+ if cmp -s "$nixFile" "$nixFile.bak"; then
+ mv "$nixFile.bak" "$nixFile"
+ failMark $attr "Does it have a meta attribute?"
+ return
+ fi
+
+ # broken should evaluate to true in any case now
+ markedSuccessfully=$(nix-instantiate --eval -E "with import ./. {}; $attr.meta.broken")
+ if [[ "$markedSuccessfully" != "true" ]]; then
+ mv "$nixFile.bak" "$nixFile"
+ failMark $attr "$attr.meta.broken doesn't evaluate to true."
+ return
+ fi
+
+ rm -f "$nixFile.bak"
+}
+
+for attr in $@; do
+ attemptToMarkBroken $attr
+done
diff --git a/third_party/nixpkgs/pkgs/data/fonts/agave/default.nix b/third_party/nixpkgs/pkgs/data/fonts/agave/default.nix
index 0c2cd1609f..ea64cf3457 100644
--- a/third_party/nixpkgs/pkgs/data/fonts/agave/default.nix
+++ b/third_party/nixpkgs/pkgs/data/fonts/agave/default.nix
@@ -2,7 +2,7 @@
let
pname = "agave";
- version = "22";
+ version = "30";
in fetchurl {
name = "${pname}-${version}";
url = "https://github.com/agarick/agave/releases/download/v${version}/Agave-Regular.ttf";
@@ -13,7 +13,7 @@ in fetchurl {
install -D $downloadedFile $out/share/fonts/truetype/Agave-Regular.ttf
'';
- sha256 = "1jb8f0xcv5z0l5nyx733b6zclswi82vrh2nwyyhbqzgqrl4y1h6s";
+ sha256 = "1f2f1fycwi8xbf8x03yfq78nv11b2msl4ll9flw8rkg023h9vwg7";
meta = with lib; {
description = "truetype monospaced typeface designed for X environments";
diff --git a/third_party/nixpkgs/pkgs/data/fonts/iosevka/bin.nix b/third_party/nixpkgs/pkgs/data/fonts/iosevka/bin.nix
index 0f88aa05e4..c3e77c1051 100644
--- a/third_party/nixpkgs/pkgs/data/fonts/iosevka/bin.nix
+++ b/third_party/nixpkgs/pkgs/data/fonts/iosevka/bin.nix
@@ -1,20 +1,35 @@
-{ stdenv, fetchzip }:
+{ stdenv, lib, fetchurl, unzip
+, variant ? ""
+}:
let
- version = "3.4.6";
-in fetchzip {
- name = "iosevka-bin-${version}";
+ name = "iosevka" + lib.optionalString (variant != "") "-" + variant;
- url = "https://github.com/be5invis/Iosevka/releases/download/v${version}/ttc-iosevka-${version}.zip";
+ variantHashes = import ./variants.nix;
+ validVariants = map (lib.removePrefix "iosevka-")
+ (builtins.attrNames (builtins.removeAttrs variantHashes [ "iosevka" ]));
+in stdenv.mkDerivation rec {
+ pname = "${name}-bin";
+ version = "3.7.1";
- postFetch = ''
+ src = fetchurl {
+ url = "https://github.com/be5invis/Iosevka/releases/download/v${version}/ttc-${name}-${version}.zip";
+ sha256 = variantHashes.${name} or (throw ''
+ No such variant "${variant}" for package iosevka-bin.
+ Valid variants are: ${lib.concatStringsSep ", " validVariants}.
+ '');
+ };
+
+ nativeBuildInputs = [ unzip ];
+
+ phases = [ "unpackPhase" ];
+
+ unpackPhase = ''
mkdir -p $out/share/fonts
- unzip -j $downloadedFile \*.ttc -d $out/share/fonts/truetype
+ unzip -d $out/share/fonts/truetype $src
'';
- sha256 = "1nab49gkpxahwvvw39xcc32q425qkccr7ffmz87jbcdv71qy7pp9";
-
- meta = with stdenv.lib; {
+ meta = with lib; {
homepage = "https://be5invis.github.io/Iosevka/";
downloadPage = "https://github.com/be5invis/Iosevka/releases";
description = ''
@@ -25,4 +40,6 @@ in fetchzip {
platforms = platforms.all;
maintainers = [ maintainers.cstrahan ];
};
+
+ passthru.updateScript = ./update.sh;
}
diff --git a/third_party/nixpkgs/pkgs/data/fonts/iosevka/update.sh b/third_party/nixpkgs/pkgs/data/fonts/iosevka/update.sh
new file mode 100755
index 0000000000..df78c62a6c
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/data/fonts/iosevka/update.sh
@@ -0,0 +1,28 @@
+#! /usr/bin/env nix-shell
+#! nix-shell -i bash -p curl jq
+
+set -e
+
+release=$(curl -s https://api.github.com/repos/be5invis/Iosevka/releases/latest)
+
+oldVersion=$(nix-instantiate --eval -E 'with import ./. {}; lib.getVersion iosevka-bin' | tr -d '"')
+version=$(echo "$release" | jq -r .tag_name | tr -d v)
+
+if test "$oldVersion" = "$version"; then
+ echo "New version same as old version, nothing to do." >&2
+ exit 0
+fi
+
+file=$(nix-instantiate --eval -A iosevka-bin.meta.position | sed -r 's/^"(.*):[0-9]+"$/\1/')
+sed -i "s/$oldVersion/$version/" "$file"
+
+{
+ echo '# This file was autogenerated. DO NOT EDIT!'
+ echo '{'
+ for asset in $(echo "$release" | jq -r '.assets[].name | select(startswith("ttc"))'); do
+ printf ' %s = "%s";\n' \
+ $(echo "$asset" | sed -r "s/^ttc-(.*)-$version.zip$/\1/") \
+ $(nix-prefetch-url "https://github.com/be5invis/Iosevka/releases/download/v$version/$asset")
+ done
+ echo '}'
+} >$(dirname "$file")/variants.nix
diff --git a/third_party/nixpkgs/pkgs/data/fonts/iosevka/variants.nix b/third_party/nixpkgs/pkgs/data/fonts/iosevka/variants.nix
new file mode 100644
index 0000000000..b3fd986c4c
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/data/fonts/iosevka/variants.nix
@@ -0,0 +1,24 @@
+# This file was autogenerated. DO NOT EDIT!
+{
+ iosevka = "0h226f32nwlqnsdc86bwk2wcdl2hsq5q1s2ln6dsf9m7w8ajn0nr";
+ iosevka-aile = "05k3h7n7mkpdsjcxha27vjj503b4129jd90wj8qyk5h0nrgy1rc6";
+ iosevka-curly = "0fxcc99n9ghkdjmfxba9mg4fc0dwlvnnxlmc618jv6s3k2xn7sza";
+ iosevka-curly-slab = "1qgxyw5v91l4cw3mvqzagk9amyy63iqh72bnsz63daxgss3fpsab";
+ iosevka-etoile = "184rjidnjayv5wsrxxxf39mvdcjafdwcvp0h4rfniy9s0ifrwjvf";
+ iosevka-slab = "1cbrv5pyhnvwrdaj8r011igw2yjgzzigd82g1r10d348lk64wja1";
+ iosevka-sparkle = "124jnjzffnfw58b78svw8rzgal10z5nspwc267pvq7q0f2ak1wpp";
+ iosevka-ss01 = "18ckb0ch4za4vgwqz8azx8vhg9v9a922ffbckrbmy8n5bi03dl7w";
+ iosevka-ss02 = "0cwm2jdni5m9z0xagpmq9vvjp3yvin7c7bnavsj15yfvpq8b8qsp";
+ iosevka-ss03 = "1yzbvkr726f8mm024qzy2hdd7nz4kymgjm0cj5208c57bln0byr2";
+ iosevka-ss04 = "1kpz84a1cb39rxc87whw0fh0k9ak2qbcq59hm425da2acf27a648";
+ iosevka-ss05 = "1xnnm96jnw90mhwylsw1ad6m8pr4r1bd02l7g82m5hmr7bc4b7dd";
+ iosevka-ss06 = "1raw01ijiawaqxfmj0m8z8jrb2ns7vzy68lak63mss8j35xzg1l5";
+ iosevka-ss07 = "0bjhjwjif7qw6wyyrzfg2pdvy1b070k053ndmjard6sh1rcln02d";
+ iosevka-ss08 = "1qwgk8riff57np4hlmd0kcl9bx511x9zmnlrjq3ilfn6abdwgm7i";
+ iosevka-ss09 = "0sfnhmcrsv1v7l756hx70y1mrp35fbs6wrsczw4vxfbbaigs767r";
+ iosevka-ss10 = "10n70z7588h8y2z274vjn6hvzc7lg87znibcmkk2brmx2g5bw2wl";
+ iosevka-ss11 = "0mnyd04vdqr8jm3syv6ddrn61f27k91kxkdy86pp34xaac2ipmm0";
+ iosevka-ss12 = "1f8pn2220s6r566b40ncnqrfmfdhnlr0nkvzj9swgvx66jr8mlhj";
+ iosevka-ss13 = "1py5qgfqm9wp9pzcxg83mydvf3r6nhrqi21d0fvmnk04ghk1psd6";
+ iosevka-ss14 = "0z47kqicd26x5v94zy97xyl277v0s6856pbllfn1gv92ax2dg5cy";
+}
diff --git a/third_party/nixpkgs/pkgs/data/fonts/merriweather/default.nix b/third_party/nixpkgs/pkgs/data/fonts/merriweather/default.nix
index 1768c44bc0..d1b3359df2 100644
--- a/third_party/nixpkgs/pkgs/data/fonts/merriweather/default.nix
+++ b/third_party/nixpkgs/pkgs/data/fonts/merriweather/default.nix
@@ -27,7 +27,7 @@ stdenvNoCC.mkDerivation rec {
meta = with lib; {
homepage = "https://github.com/SorkinType/Merriweather";
- description = "Merriweather was designed to be a text face that is pleasant to read on screens";
+ description = "A text face designed to be pleasant to read on screens";
license = licenses.ofl;
platforms = platforms.all;
maintainers = with maintainers; [ emily ];
diff --git a/third_party/nixpkgs/pkgs/data/fonts/sudo/default.nix b/third_party/nixpkgs/pkgs/data/fonts/sudo/default.nix
index fab252af45..f21fdb1841 100644
--- a/third_party/nixpkgs/pkgs/data/fonts/sudo/default.nix
+++ b/third_party/nixpkgs/pkgs/data/fonts/sudo/default.nix
@@ -1,11 +1,11 @@
{ lib, fetchzip }:
let
- version = "0.51";
+ version = "0.52";
in fetchzip {
name = "sudo-font-${version}";
url = "https://github.com/jenskutilek/sudo-font/releases/download/v${version}/sudo.zip";
- sha256 = "19m132183w5hrc5qvlb6cj38hir2302cqiljlfc72qdlb8al6fwi";
+ sha256 = "1j5p7apclyy5gfj2kklmgcncdsp5iik4gd6mdl29anzijknd0kja";
postFetch = ''
mkdir -p $out/share/fonts/
diff --git a/third_party/nixpkgs/pkgs/data/icons/maia-icon-theme/default.nix b/third_party/nixpkgs/pkgs/data/icons/maia-icon-theme/default.nix
index ee539981fb..2a6dbc512a 100644
--- a/third_party/nixpkgs/pkgs/data/icons/maia-icon-theme/default.nix
+++ b/third_party/nixpkgs/pkgs/data/icons/maia-icon-theme/default.nix
@@ -1,4 +1,12 @@
-{ stdenv, fetchFromGitLab, cmake, extra-cmake-modules, gtk3, kdeFrameworks, hicolor-icon-theme }:
+{ stdenv
+, fetchFromGitLab
+, cmake
+, extra-cmake-modules
+, gtk3
+, plasma-framework
+, kwindowsystem
+, hicolor-icon-theme
+}:
stdenv.mkDerivation {
pname = "maia-icon-theme";
@@ -17,8 +25,8 @@ stdenv.mkDerivation {
cmake
extra-cmake-modules
gtk3
- kdeFrameworks.plasma-framework
- kdeFrameworks.kwindowsystem
+ plasma-framework
+ kwindowsystem
];
propagatedBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/data/icons/zafiro-icons/default.nix b/third_party/nixpkgs/pkgs/data/icons/zafiro-icons/default.nix
index a8dc4539a7..d406ae50e1 100644
--- a/third_party/nixpkgs/pkgs/data/icons/zafiro-icons/default.nix
+++ b/third_party/nixpkgs/pkgs/data/icons/zafiro-icons/default.nix
@@ -7,7 +7,7 @@ stdenv.mkDerivation rec {
src = fetchFromGitHub {
owner = "zayronxio";
repo = pname;
- rev = "${version}";
+ rev = version;
sha256 = "05h8qm9izjbp8pnl9jpbw3y9sddhp0zmg94fm1k4d4hhdqnakqhv";
};
diff --git a/third_party/nixpkgs/pkgs/data/themes/orion/default.nix b/third_party/nixpkgs/pkgs/data/themes/orion/default.nix
index b44cc857c6..740b348892 100644
--- a/third_party/nixpkgs/pkgs/data/themes/orion/default.nix
+++ b/third_party/nixpkgs/pkgs/data/themes/orion/default.nix
@@ -1,11 +1,13 @@
-{ stdenv, fetchgit, gtk-engine-murrine }:
+{ stdenv, fetchFromGitHub, gtk-engine-murrine }:
-stdenv.mkDerivation {
- name = "orion-1.5";
+stdenv.mkDerivation rec {
+ pname = "orion";
+ version = "1.5";
- src = fetchgit {
- url = "https://github.com/shimmerproject/Orion.git";
- rev = "refs/tags/v1.5";
+ src = fetchFromGitHub {
+ owner = "shimmerproject";
+ repo = "Orion";
+ rev = "refs/tags/v${version}";
sha256 = "1116yawv3fspkiq1ykk2wj0gza3l04b5nhldy0bayzjaj0y6fd89";
};
diff --git a/third_party/nixpkgs/pkgs/desktops/cdesktopenv/default.nix b/third_party/nixpkgs/pkgs/desktops/cdesktopenv/default.nix
index 60ea33ca6b..7e6b49957b 100644
--- a/third_party/nixpkgs/pkgs/desktops/cdesktopenv/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/cdesktopenv/default.nix
@@ -74,5 +74,6 @@ EOF
license = licenses.lgpl2;
maintainers = [ maintainers.gnidorah ];
platforms = [ "i686-linux" "x86_64-linux" ];
+ broken = true; # not compatible with glibc 2.32
};
}
diff --git a/third_party/nixpkgs/pkgs/desktops/gnome-3/games/aisleriot/default.nix b/third_party/nixpkgs/pkgs/desktops/gnome-3/games/aisleriot/default.nix
index 9ea68b02ea..d58e608c95 100644
--- a/third_party/nixpkgs/pkgs/desktops/gnome-3/games/aisleriot/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/gnome-3/games/aisleriot/default.nix
@@ -22,10 +22,10 @@ stdenv.mkDerivation rec {
version = "3.22.11";
src = fetchFromGitLab {
+ domain = "gitlab.gnome.org";
owner = "GNOME";
repo = pname;
- domain = "gitlab.gnome.org";
- rev = "${version}";
+ rev = version;
sha256 = "1asm0y6485xqsysdg586y3hzz8bhxqwnc82k6vhfnxpxz7l62qa1";
};
diff --git a/third_party/nixpkgs/pkgs/desktops/lxde/core/lxrandr/default.nix b/third_party/nixpkgs/pkgs/desktops/lxde/core/lxrandr/default.nix
index 9df84b6b1e..ab109f3c6d 100644
--- a/third_party/nixpkgs/pkgs/desktops/lxde/core/lxrandr/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/lxde/core/lxrandr/default.nix
@@ -14,7 +14,7 @@ stdenv.mkDerivation rec {
buildInputs = [ libX11 (if withGtk3 then gtk3 else gtk2) xrandr ];
meta = with stdenv.lib; {
- description = "LXRandR is the standard screen manager of LXDE";
+ description = "Standard screen manager of LXDE";
homepage = "https://lxde.org/";
license = stdenv.lib.licenses.gpl2;
maintainers = with maintainers; [ rawkode ];
diff --git a/third_party/nixpkgs/pkgs/desktops/lxqt/default.nix b/third_party/nixpkgs/pkgs/desktops/lxqt/default.nix
index 90e466f747..1292da151a 100644
--- a/third_party/nixpkgs/pkgs/desktops/lxqt/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/lxqt/default.nix
@@ -43,7 +43,7 @@ let
### OPTIONAL
qterminal = callPackage ./qterminal {};
- compton-conf = pkgs.qt5.callPackage ./compton-conf {};
+ compton-conf = qt5.callPackage ./compton-conf {};
obconf-qt = callPackage ./obconf-qt {};
lximage-qt = callPackage ./lximage-qt {};
qps = callPackage ./qps {};
diff --git a/third_party/nixpkgs/pkgs/desktops/mate/default.nix b/third_party/nixpkgs/pkgs/desktops/mate/default.nix
index 3970b2b292..10c278c8bf 100644
--- a/third_party/nixpkgs/pkgs/desktops/mate/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/mate/default.nix
@@ -39,6 +39,7 @@ let
mate-system-monitor = callPackage ./mate-system-monitor { };
mate-terminal = callPackage ./mate-terminal { };
mate-themes = callPackage ./mate-themes { };
+ mate-tweak = callPackage ./mate-tweak { };
mate-user-guide = callPackage ./mate-user-guide { };
mate-user-share = callPackage ./mate-user-share { };
mate-utils = callPackage ./mate-utils { };
diff --git a/third_party/nixpkgs/pkgs/desktops/mate/mate-tweak/default.nix b/third_party/nixpkgs/pkgs/desktops/mate/mate-tweak/default.nix
new file mode 100644
index 0000000000..9609d832f6
--- /dev/null
+++ b/third_party/nixpkgs/pkgs/desktops/mate/mate-tweak/default.nix
@@ -0,0 +1,83 @@
+{ stdenv
+, fetchFromGitHub
+, python3Packages
+, intltool
+, mate
+, libnotify
+, gtk3
+, gdk-pixbuf
+, gobject-introspection
+, wrapGAppsHook
+, glib
+}:
+
+python3Packages.buildPythonApplication rec {
+ pname = "mate-tweak";
+ version = "20.10.0";
+
+ src = fetchFromGitHub {
+ owner = "ubuntu-mate";
+ repo = pname;
+ rev = version;
+ sha256 = "08gw5i5wjxmzn92h9fv6g7q9i00n8shv1wlpy6cb31xy9wbmjph6";
+ };
+
+ nativeBuildInputs = [
+ wrapGAppsHook
+ intltool
+ python3Packages.distutils_extra
+ gobject-introspection
+ ];
+
+ buildInputs = [
+ gtk3
+ gdk-pixbuf
+ libnotify
+ glib
+ mate.mate-applets
+ mate.mate-panel
+ mate.marco
+ mate.libmatekbd
+ mate.mate-session-manager
+ ];
+
+ propagatedBuildInputs = with python3Packages; [
+ distro
+ pygobject3
+ psutil
+ setproctitle
+ ];
+
+ strictDeps = false;
+
+ dontWrapGApps = true;
+
+ postPatch = ''
+ # mate-tweak hardcodes absolute paths everywhere. Nuke from orbit.
+ find . -type f -exec sed -i \
+ -e s,/usr/lib/mate-tweak,$out/lib/mate-tweak,g \
+ {} +
+
+ sed -i 's,{prefix}/,,g' setup.py
+ '';
+
+ # Arguments to be passed to `makeWrapper`, only used by buildPython*
+ preFixup = ''
+ makeWrapperArgs+=("''${gappsWrapperArgs[@]}")
+ '';
+
+ postFixup = ''
+ for i in bin/.mate-tweak-wrapped lib/mate-tweak/mate-tweak-helper; do
+ sed -i "s,usr,run/current-system/sw,g" $out/$i
+ done
+ '';
+
+ meta = with stdenv.lib; {
+ description = "Tweak tool for the MATE Desktop";
+ homepage = "https://github.com/ubuntu-mate/mate-tweak";
+ changelog = "https://github.com/ubuntu-mate/mate-tweak/releases/tag/${version}";
+ license = [ licenses.gpl2Plus ];
+ platforms = platforms.linux;
+ maintainers = with maintainers; [ luc65r ];
+ };
+}
diff --git a/third_party/nixpkgs/pkgs/desktops/plasma-5/default.nix b/third_party/nixpkgs/pkgs/desktops/plasma-5/default.nix
index 8ab4b60156..265c22b556 100644
--- a/third_party/nixpkgs/pkgs/desktops/plasma-5/default.nix
+++ b/third_party/nixpkgs/pkgs/desktops/plasma-5/default.nix
@@ -36,7 +36,6 @@ let
};
mkDerivation = libsForQt5.callPackage ({ mkDerivation }: mkDerivation) {};
- qtbase = libsForQt5.callPackage ({ qtbase }: qtbase) {};
packages = self: with self;
let
@@ -83,7 +82,6 @@ let
setupHook = args.setupHook or defaultSetupHook;
meta = {
- broken = lib.versionAtLeast qtbase.version "5.15";
license = with lib.licenses; [
lgpl21Plus lgpl3Plus bsd2 mit gpl2Plus gpl3Plus fdl12
];
diff --git a/third_party/nixpkgs/pkgs/development/arduino/platformio/chrootenv.nix b/third_party/nixpkgs/pkgs/development/arduino/platformio/chrootenv.nix
index 91300bda8f..81cc8f371f 100644
--- a/third_party/nixpkgs/pkgs/development/arduino/platformio/chrootenv.nix
+++ b/third_party/nixpkgs/pkgs/development/arduino/platformio/chrootenv.nix
@@ -22,8 +22,8 @@ let
src = fetchFromGitHub {
owner = "platformio";
repo = "platformio-core";
- rev = "v5.0.1";
- sha256 = "01xh61ldilg6fg95l1p870rld2xffhnl9f9ndvbi5jdn8q634pmw";
+ rev = "v5.0.2";
+ sha256 = "1hbw8nbllyj0xyx1rz2chx9vyqf9949dcdx4v9hnfbsjwwpcfi0a";
};
diff --git a/third_party/nixpkgs/pkgs/development/arduino/platformio/core.nix b/third_party/nixpkgs/pkgs/development/arduino/platformio/core.nix
index 835e0c692e..42e1e49b41 100644
--- a/third_party/nixpkgs/pkgs/development/arduino/platformio/core.nix
+++ b/third_party/nixpkgs/pkgs/development/arduino/platformio/core.nix
@@ -75,14 +75,14 @@ let
in buildPythonApplication rec {
pname = "platformio";
- version = "5.0.1";
+ version = "5.0.2";
# pypi tarballs don't contain tests - https://github.com/platformio/platformio-core/issues/1964
src = fetchFromGitHub {
owner = "platformio";
repo = "platformio-core";
rev = "v${version}";
- sha256 = "01xh61ldilg6fg95l1p870rld2xffhnl9f9ndvbi5jdn8q634pmw";
+ sha256 = "1hbw8nbllyj0xyx1rz2chx9vyqf9949dcdx4v9hnfbsjwwpcfi0a";
};
propagatedBuildInputs = [
diff --git a/third_party/nixpkgs/pkgs/development/compilers/abcl/default.nix b/third_party/nixpkgs/pkgs/development/compilers/abcl/default.nix
index edcf722f25..f27abda03d 100644
--- a/third_party/nixpkgs/pkgs/development/compilers/abcl/default.nix
+++ b/third_party/nixpkgs/pkgs/development/compilers/abcl/default.nix
@@ -1,11 +1,11 @@
{stdenv, fetchurl, ant, jre, jdk}:
stdenv.mkDerivation rec {
pname = "abcl";
- version = "1.7.1";
+ version = "1.8.0";
# or fetchFromGitHub(owner,repo,rev) or fetchgit(rev)
src = fetchurl {
url = "https://common-lisp.net/project/armedbear/releases/${version}/${pname}-src-${version}.tar.gz";
- sha256 = "09wjcjvriagml740krg9nva5v6bsc3sav86dmb55pjvfpsr1846m";
+ sha256 = "0wpfj7q9vq2k2mkp2wx2yvrcq0v8229ddyk8viiaizs7msn588ac";
};
configurePhase = ''
mkdir nix-tools
diff --git a/third_party/nixpkgs/pkgs/development/compilers/flutter/default.nix b/third_party/nixpkgs/pkgs/development/compilers/flutter/default.nix
index 9b9d1f7481..baab0583fb 100644
--- a/third_party/nixpkgs/pkgs/development/compilers/flutter/default.nix
+++ b/third_party/nixpkgs/pkgs/development/compilers/flutter/default.nix
@@ -1,6 +1,9 @@
-{ callPackage }:
+{ callPackage, dart }:
let
+ dart_stable = dart.override { version = "2.10.0"; };
+ dart_beta = dart.override { version = "2.10.0"; };
+ dart_dev = dart.override { version = "2.11.0-161.0.dev"; };
mkFlutter = opts: callPackage (import ./flutter.nix opts) { };
getPatches = dir:
let files = builtins.attrNames (builtins.readDir dir);
@@ -10,25 +13,28 @@ in {
stable = mkFlutter rec {
pname = "flutter";
channel = "stable";
- version = "1.17.5";
+ version = "1.22.0";
filename = "flutter_linux_${version}-${channel}.tar.xz";
- sha256Hash = "0kapja3nh7dfhjbn2np02wghijrjnpzsv4hz10fj54hs8hdx19di";
+ sha256Hash = "0ryrx458ss8ryhmspcfrhjvad2pl46bxh1qk5vzwzhxiqdc79vm8";
patches = getPatches ./patches/stable;
+ dart = dart_stable;
};
beta = mkFlutter rec {
- pname = "flutter-beta";
+ pname = "flutter";
channel = "beta";
- version = "1.20.0-7.2.pre";
+ version = "1.22.0-12.3.pre";
filename = "flutter_linux_${version}-${channel}.tar.xz";
- sha256Hash = "0w89ig5vi4spa95mf08r4vvwni7bzzdlyhvr9sy1a35qmf7j9s6f";
- patches = getPatches ./patches/beta;
+ sha256Hash = "1axzz137z4lgpa09h7bjf52i6dij6a9wmjbha1182db23r09plzh";
+ patches = getPatches ./patches/stable;
+ dart = dart_beta;
};
dev = mkFlutter rec {
- pname = "flutter-dev";
+ pname = "flutter";
channel = "dev";
- version = "1.21.0-1.0.pre";
+ version = "1.23.0-7.0.pre";
filename = "flutter_linux_${version}-${channel}.tar.xz";
- sha256Hash = "14rx89jp6ivk3ai7iwbznkr5q445ndh8fppzbxg520kq10s2208r";
- patches = getPatches ./patches/beta;
+ sha256Hash = "166qb4qbv051bc71yj7c0vrkamhvzz3fp3mz318qzm947mydwjj5";
+ patches = getPatches ./patches/dev;
+ dart = dart_dev;
};
}
diff --git a/third_party/nixpkgs/pkgs/development/compilers/flutter/flutter.nix b/third_party/nixpkgs/pkgs/development/compilers/flutter/flutter.nix
index e9b60253cd..7fda2d616f 100644
--- a/third_party/nixpkgs/pkgs/development/compilers/flutter/flutter.nix
+++ b/third_party/nixpkgs/pkgs/development/compilers/flutter/flutter.nix
@@ -1,5 +1,5 @@
-{ channel, pname, version, sha256Hash, patches
-, filename ? "flutter_linux_v${version}-${channel}.tar.xz" }:
+{ channel, pname, version, sha256Hash, patches, dart
+, filename ? "flutter_linux_${version}-${channel}.tar.xz"}:
{ bash, buildFHSUserEnv, cacert, coreutils, git, makeWrapper, runCommand, stdenv
, fetchurl, alsaLib, dbus, expat, libpulseaudio, libuuid, libX11, libxcb
@@ -72,6 +72,7 @@ let
with pkgs; [
bash
curl
+ dart
git
unzip
which
@@ -118,11 +119,15 @@ in runCommand drvName {
homepage = "https://flutter.dev";
license = licenses.bsd3;
platforms = [ "x86_64-linux" ];
- maintainers = with maintainers; [ babariviere ];
+ maintainers = with maintainers; [ babariviere ericdallo ];
};
} ''
mkdir -p $out/bin
echo -n "$startScript" > $out/bin/${pname}
chmod +x $out/bin/${pname}
+
+ mkdir -p $out/bin/cache/dart-sdk/
+ cp -r ${dart}/* $out/bin/cache/dart-sdk/
+ ln $out/bin/cache/dart-sdk/bin/dart $out/bin/dart
''
diff --git a/third_party/nixpkgs/pkgs/development/compilers/flutter/patches/beta/disable-auto-update.patch b/third_party/nixpkgs/pkgs/development/compilers/flutter/patches/dev/disable-auto-update.patch
similarity index 88%
rename from third_party/nixpkgs/pkgs/development/compilers/flutter/patches/beta/disable-auto-update.patch
rename to third_party/nixpkgs/pkgs/development/compilers/flutter/patches/dev/disable-auto-update.patch
index cd01577cc1..f9ac00d1d3 100644
--- a/third_party/nixpkgs/pkgs/development/compilers/flutter/patches/beta/disable-auto-update.patch
+++ b/third_party/nixpkgs/pkgs/development/compilers/flutter/patches/dev/disable-auto-update.patch
@@ -1,8 +1,8 @@
diff --git a/bin/internal/shared.sh b/bin/internal/shared.sh
-index 702bd9ed5..4d4dc94c6 100755
+index 22efe87443..c6954575c5 100644
--- a/bin/internal/shared.sh
+++ b/bin/internal/shared.sh
-@@ -204,8 +204,6 @@ function shared::execute() {
+@@ -212,8 +212,6 @@ function shared::execute() {
# FLUTTER_TOOL_ARGS="--enable-asserts $FLUTTER_TOOL_ARGS"
# FLUTTER_TOOL_ARGS="$FLUTTER_TOOL_ARGS --observe=65432"
@@ -12,10 +12,10 @@ index 702bd9ed5..4d4dc94c6 100755
case "$BIN_NAME" in
flutter*)
diff --git a/packages/flutter_tools/lib/src/runner/flutter_command_runner.dart b/packages/flutter_tools/lib/src/runner/flutter_command_runner.dart
-index 21be933e1..2ea73c4c0 100644
+index fb1616ba96..b973b3fd58 100644
--- a/packages/flutter_tools/lib/src/runner/flutter_command_runner.dart
+++ b/packages/flutter_tools/lib/src/runner/flutter_command_runner.dart
-@@ -294,13 +294,6 @@ class FlutterCommandRunner extends CommandRunner {
+@@ -291,13 +291,6 @@ class FlutterCommandRunner extends CommandRunner {
globals.flutterUsage.suppressAnalytics = true;
}
diff --git a/third_party/nixpkgs/pkgs/development/compilers/flutter/patches/beta/move-cache.patch b/third_party/nixpkgs/pkgs/development/compilers/flutter/patches/dev/move-cache.patch
similarity index 63%
rename from third_party/nixpkgs/pkgs/development/compilers/flutter/patches/beta/move-cache.patch
rename to third_party/nixpkgs/pkgs/development/compilers/flutter/patches/dev/move-cache.patch
index 64950d4476..eb6ff5cf58 100644
--- a/third_party/nixpkgs/pkgs/development/compilers/flutter/patches/beta/move-cache.patch
+++ b/third_party/nixpkgs/pkgs/development/compilers/flutter/patches/dev/move-cache.patch
@@ -1,21 +1,21 @@
diff --git a/dev/devicelab/lib/framework/runner.dart b/dev/devicelab/lib/framework/runner.dart
-index 8e511eefd..fef3cca8b 100644
+index a059a8e992..b664a7070c 100644
--- a/dev/devicelab/lib/framework/runner.dart
+++ b/dev/devicelab/lib/framework/runner.dart
-@@ -126,7 +126,7 @@ Future cleanupSystem() async {
- print('\nTelling Gradle to shut down (JAVA_HOME=$javaHome)');
- final String gradlewBinaryName = Platform.isWindows ? 'gradlew.bat' : 'gradlew';
- final Directory tempDir = Directory.systemTemp.createTempSync('flutter_devicelab_shutdown_gradle.');
-- recursiveCopy(Directory(path.join(flutterDirectory.path, 'bin', 'cache', 'artifacts', 'gradle_wrapper')), tempDir);
-+ recursiveCopy(Directory(path.join(globals.fsUtils.homeDirPath, '.cache', 'flutter', 'artifacts', 'gradle_wrapper')), tempDir);
- copy(File(path.join(path.join(flutterDirectory.path, 'packages', 'flutter_tools'), 'templates', 'app', 'android.tmpl', 'gradle', 'wrapper', 'gradle-wrapper.properties')), Directory(path.join(tempDir.path, 'gradle', 'wrapper')));
- if (!Platform.isWindows) {
- await exec(
+@@ -137,7 +137,7 @@ Future cleanupSystem() async {
+ print('\nTelling Gradle to shut down (JAVA_HOME=$javaHome)');
+ final String gradlewBinaryName = Platform.isWindows ? 'gradlew.bat' : 'gradlew';
+ final Directory tempDir = Directory.systemTemp.createTempSync('flutter_devicelab_shutdown_gradle.');
+- recursiveCopy(Directory(path.join(flutterDirectory.path, 'bin', 'cache', 'artifacts', 'gradle_wrapper')), tempDir);
++ recursiveCopy(Directory(path.join(globals.fsUtils.homeDirPath, '.cache', 'flutter', 'artifacts', 'gradle_wrapper')), tempDir);
+ copy(File(path.join(path.join(flutterDirectory.path, 'packages', 'flutter_tools'), 'templates', 'app', 'android.tmpl', 'gradle', 'wrapper', 'gradle-wrapper.properties')), Directory(path.join(tempDir.path, 'gradle', 'wrapper')));
+ if (!Platform.isWindows) {
+ await exec(
diff --git a/packages/flutter_tools/lib/src/asset.dart b/packages/flutter_tools/lib/src/asset.dart
-index c680de599..480abfb77 100644
+index 36714c5fb4..c0cc049ee1 100644
--- a/packages/flutter_tools/lib/src/asset.dart
+++ b/packages/flutter_tools/lib/src/asset.dart
-@@ -8,6 +8,7 @@ import 'package:meta/meta.dart';
+@@ -6,6 +6,7 @@ import 'package:meta/meta.dart';
import 'package:package_config/package_config.dart';
import 'package:yaml/yaml.dart';
@@ -23,20 +23,20 @@ index c680de599..480abfb77 100644
import 'base/context.dart';
import 'base/file_system.dart';
import 'base/utils.dart';
-@@ -392,7 +393,7 @@ List<_Asset> _getMaterialAssets(String fontSet) {
+@@ -397,7 +398,7 @@ List<_Asset> _getMaterialAssets(String fontSet) {
for (final Map font in (family['fonts'] as List).cast