Skip to content

Commit

Permalink
Merge staging-next into staging
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] authored Dec 13, 2024
2 parents fb3449b + 96dd0fd commit c61af72
Show file tree
Hide file tree
Showing 81 changed files with 638 additions and 1,879 deletions.
6 changes: 6 additions & 0 deletions maintainers/maintainer-list.nix
Original file line number Diff line number Diff line change
Expand Up @@ -11865,6 +11865,12 @@
githubId = 148352;
name = "Jim Fowler";
};
Kitt3120 = {
email = "[email protected]";
github = "Kitt3120";
githubId = 10689811;
name = "Torben Schweren";
};
kittywitch = {
email = "[email protected]";
github = "kittywitch";
Expand Down
15 changes: 15 additions & 0 deletions nixos/modules/hardware/inputmodule.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
{
config,
lib,
pkgs,
...
}:

{
options.hardware.inputmodule.enable = lib.mkEnableOption ''Support for Framework input modules'';

config = lib.mkIf config.hardware.inputmodule.enable {
environment.systemPackages = [ pkgs.inputmodule-control ];
services.udev.packages = [ pkgs.inputmodule-control ];
};
}
1 change: 1 addition & 0 deletions nixos/modules/module-list.nix
Original file line number Diff line number Diff line change
Expand Up @@ -71,6 +71,7 @@
./hardware/hackrf.nix
./hardware/i2c.nix
./hardware/infiniband.nix
./hardware/inputmodule.nix
./hardware/keyboard/qmk.nix
./hardware/keyboard/teck.nix
./hardware/keyboard/uhk.nix
Expand Down
31 changes: 20 additions & 11 deletions pkgs/applications/audio/spotify-qt/default.nix
Original file line number Diff line number Diff line change
@@ -1,38 +1,47 @@
{
stdenvNoCC,
stdenv,
fetchFromGitHub,
lib,
cmake,
mkDerivation,
libxcb,
qtbase,
qtsvg,
wrapQtAppsHook,
procps,
}:

mkDerivation rec {
stdenv.mkDerivation (finalAttrs: {
pname = "spotify-qt";
version = "3.11";
version = "3.12";

src = fetchFromGitHub {
owner = "kraxarn";
repo = pname;
rev = "v${version}";
sha256 = "sha256-Dm+ELHtYZGSzJSrERtvpuuV5cVZ9ah9WQ0iTTJqGqVg=";
repo = "spotify-qt";
rev = "v${finalAttrs.version}";
hash = "sha256-j9g2fq12gsue0pc/fLoCAtDlwwlbCVJ65kxPiTJTqvk=";
};

postPatch = ''
substituteInPlace src/spotifyclient/helper.cpp \
--replace-fail /usr/bin/ps ${lib.getExe' procps "ps"}
'';

buildInputs = [
libxcb
qtbase
qtsvg
];

nativeBuildInputs = [ cmake ];
nativeBuildInputs = [
cmake
wrapQtAppsHook
];

cmakeFlags = [ "-DCMAKE_INSTALL_PREFIX=" ];
cmakeFlags = [ (lib.cmakeFeature "CMAKE_INSTALL_PREFIX" "") ];

installFlags = [ "DESTDIR=$(out)" ];

postInstall = lib.optionalString stdenvNoCC.hostPlatform.isDarwin ''
postInstall = lib.optionalString stdenv.hostPlatform.isDarwin ''
mkdir -p $out/Applications
mv $out/bin/spotify-qt.app $out/Applications
ln $out/Applications/spotify-qt.app/Contents/MacOS/spotify-qt $out/bin/spotify-qt
Expand All @@ -46,4 +55,4 @@ mkDerivation rec {
maintainers = with maintainers; [ iivusly ];
platforms = platforms.unix;
};
}
})
43 changes: 0 additions & 43 deletions pkgs/applications/misc/adobe-reader/builder.sh

This file was deleted.

47 changes: 44 additions & 3 deletions pkgs/applications/misc/adobe-reader/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -18,9 +18,6 @@ stdenv.mkDerivation rec {
pname = "adobe-reader";
version = "9.5.5";

# TODO: convert to phases
builder = ./builder.sh;

src = fetchurl {
url = "http://ardownload.adobe.com/pub/adobe/reader/unix/9.x/${version}/enu/AdbeRdr${version}-1_i486linux_enu.tar.bz2";
sha256 = "0h35misxrqkl5zlmmvray1bqf4ywczkm89n9qw7d9arqbg3aj3pf";
Expand All @@ -42,6 +39,48 @@ stdenv.mkDerivation rec {
gdk-pixbuf-xlib
];

installPhase = ''
p=$out/libexec/adobe-reader
mkdir -p $out/libexec
tar xvf COMMON.TAR -C $out
tar xvf ILINXR.TAR -C $out
mv $out/Adobe/Reader9 $p
rmdir $out/Adobe
# Disable this plugin for now (it needs LDAP).
rm $p/Reader/intellinux/plug_ins/PPKLite.api
# Remove unneeded files
rm $p/bin/UNINSTALL
'';

postFixup = ''
patchelf --interpreter "$(cat $NIX_CC/nix-support/dynamic-linker)" \
--set-rpath $libPath \
$p/Reader/intellinux/bin/acroread
# The "xargs -r" is to shut up a warning when Mozilla can't be found.
substituteInPlace $p/bin/acroread \
--replace-fail /bin/pwd $(type -P pwd) \
--replace-fail /bin/ls $(type -P ls) \
--replace-fail xargs "xargs -r"
mkdir -p $out/bin
ln -s $p/bin/acroread $out/bin/acroread
mkdir -p $out/share/applications
mv $p/Resource/Support/AdobeReader.desktop $out/share/applications/
icon=$p/Resource/Icons/128x128/AdobeReader9.png
[ -e $icon ]
sed -i $out/share/applications/AdobeReader.desktop \
-e "s|Icon=.*|Icon=$icon|"
mkdir -p $out/share/mimelnk/application
mv $p/Resource/Support/vnd*.desktop $out/share/mimelnk/application
'';

dontStrip = true;

passthru.mozillaPlugin = "/libexec/adobe-reader/Browser/intellinux";

meta = {
Expand All @@ -54,5 +93,7 @@ stdenv.mkDerivation rec {
"See: https://www.cvedetails.com/product/497/Adobe-Acrobat-Reader.html?vendor_id=53"
];
platforms = [ "i686-linux" ];
maintainers = with lib.maintainers; [ onny ];
mainProgram = "acroread";
};
}
4 changes: 2 additions & 2 deletions pkgs/applications/misc/organicmaps/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -31,13 +31,13 @@ let
};
in stdenv.mkDerivation rec {
pname = "organicmaps";
version = "2024.11.12-7";
version = "2024.11.27-12";

src = fetchFromGitHub {
owner = "organicmaps";
repo = "organicmaps";
rev = "${version}-android";
hash = "sha256-uA0KB9HGI0hXoD5YVOfWg3WblpGvWhgpnCVHWfLkrhs=";
hash = "sha256-lBEDPqxdnaajMHlf7G/d1TYYL9yPZo8AGekoKmF1ObM=";
fetchSubmodules = true;
};

Expand Down
9 changes: 9 additions & 0 deletions pkgs/applications/networking/browsers/firefox/wrapper.nix
Original file line number Diff line number Diff line change
Expand Up @@ -52,6 +52,7 @@ let
, extraPoliciesFiles ? []
, libName ? browser.libName or applicationName # Important for tor package or the like
, nixExtensions ? null
, hasMozSystemDirPatch ? (lib.hasPrefix "firefox" pname && !lib.hasSuffix "-bin" pname)
}:

let
Expand Down Expand Up @@ -320,12 +321,18 @@ let
${lib.optionalString (!xdg-utils.meta.broken) "--suffix PATH ':' \"${xdg-utils}/bin\""} \
--suffix PATH ':' "$out/bin" \
--set MOZ_APP_LAUNCHER "${launcherName}" \
'' + lib.optionalString hasMozSystemDirPatch ''
--set MOZ_SYSTEM_DIR "$out/lib/mozilla" \
'' + ''
--set MOZ_LEGACY_PROFILES 1 \
--set MOZ_ALLOW_DOWNGRADE 1 \
--prefix XDG_DATA_DIRS : "$GSETTINGS_SCHEMAS_PATH" \
--suffix XDG_DATA_DIRS : '${adwaita-icon-theme}/share' \
--set-default MOZ_ENABLE_WAYLAND 1 \
'' + lib.optionalString (!hasMozSystemDirPatch) ''
${lib.optionalString (allNativeMessagingHosts != []) "--run \"mkdir -p \\\${MOZ_HOME:-~/.mozilla}/native-messaging-hosts\""} \
${lib.concatMapStringsSep " " (ext: "--run \"ln -sfLt \\\${MOZ_HOME:-~/.mozilla}/native-messaging-hosts ${ext}/lib/mozilla/native-messaging-hosts/*\"") allNativeMessagingHosts} \
'' + ''
"''${oldWrapperArgs[@]}"
#############################
# #
Expand All @@ -348,10 +355,12 @@ let
install -D -t $out/share/applications $desktopItem/share/applications/*
'' + lib.optionalString hasMozSystemDirPatch ''
mkdir -p $out/lib/mozilla/native-messaging-hosts
for ext in ${toString allNativeMessagingHosts}; do
ln -sLt $out/lib/mozilla/native-messaging-hosts $ext/lib/mozilla/native-messaging-hosts/*
done
'' + ''
mkdir -p $out/lib/mozilla/pkcs11-modules
for ext in ${toString pkcs11Modules}; do
Expand Down
6 changes: 3 additions & 3 deletions pkgs/applications/networking/cluster/helmfile/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -9,16 +9,16 @@

buildGoModule rec {
pname = "helmfile";
version = "0.169.1";
version = "0.169.2";

src = fetchFromGitHub {
owner = "helmfile";
repo = "helmfile";
rev = "v${version}";
hash = "sha256-0tkUmLItw8VYApCVRwfzn4LN4kYcbQKDQd2QSafap1A=";
hash = "sha256-OoCLFhGeciCUC7Tb6+Md8tmamc/j0AeSlu5Krmkhxyc=";
};

vendorHash = "sha256-zWgza1eiO4UF/RL2Z4R4bvO+tgcN1KT8nBZor/plY+A=";
vendorHash = "sha256-VBgWnDi0jaZ+91kkYeX9QyNBrP9W+mSMjexwzZiKZWs=";

proxyVendor = true; # darwin/linux hash mismatch

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -390,11 +390,11 @@
"vendorHash": "sha256-XxltOTtCgmJ9wZX8Yw39HkwVVZb58kZjAH7jfKPhjKM="
},
"doppler": {
"hash": "sha256-pqZKqy08PnXfm88eYzDIYqC4rnwUPehfRVMcSX0gaqc=",
"hash": "sha256-UHEBjo8UR2hQyJ+O7t46vyf0Zy0tfA7D7auGzxPKOpw=",
"homepage": "https://registry.terraform.io/providers/DopplerHQ/doppler",
"owner": "DopplerHQ",
"repo": "terraform-provider-doppler",
"rev": "v1.12.0",
"rev": "v1.13.0",
"spdx": "Apache-2.0",
"vendorHash": "sha256-UvpSfCelEsV9gjRWHxdYvVe3HAnYWWY5KYLVYiqc/So="
},
Expand Down Expand Up @@ -678,13 +678,13 @@
"vendorHash": "sha256-NEGjgtrn6ZowqSF6NAK1NnSjYVUvfWuH/4R5ZPdTZSs="
},
"kafka": {
"hash": "sha256-CIA+0BMVPOpsB83QD6QEVOhohzeEFjFYTQ5UE+9MMIY=",
"hash": "sha256-cY0B1kGjlak3REHi4k/sxyPdawX4gGJFtJMJkJgU/hI=",
"homepage": "https://registry.terraform.io/providers/Mongey/kafka",
"owner": "Mongey",
"repo": "terraform-provider-kafka",
"rev": "v0.8.1",
"rev": "v0.8.3",
"spdx": "MIT",
"vendorHash": "sha256-wfN5tgW/Pqm6PqHLnuON4SQwd7U6DFj7e8HiTSrTGbo="
"vendorHash": "sha256-DnE9tA8VYgtzJWN8j3IOsQs1SiA3NX1mDQzp/Fpqh/U="
},
"kafka-connect": {
"hash": "sha256-3EUTte3txaDRz3jh0h23+Bf1tdLeCvPN9x8mYWY5VjI=",
Expand Down Expand Up @@ -1264,13 +1264,13 @@
"vendorHash": null
},
"tfe": {
"hash": "sha256-gCgbov6Psb884CJjYBIQM0180gwEQIt3yjXlZpgODao=",
"hash": "sha256-cg/g/RM4e+0Afhm22sj18qgHUvei2b0ZZtjWBKKDUAM=",
"homepage": "https://registry.terraform.io/providers/hashicorp/tfe",
"owner": "hashicorp",
"repo": "terraform-provider-tfe",
"rev": "v0.60.1",
"rev": "v0.61.0",
"spdx": "MPL-2.0",
"vendorHash": "sha256-8k2t5oUBzA9qMtmkJiq4wNpKpUT+Y83vx/TiUDs+B68="
"vendorHash": "sha256-zDL3MOsOzMFh894xeqt+CIvKlQxDm3JLXsy2IK4ZMlE="
},
"thunder": {
"hash": "sha256-2i1DSOSt/vbFs0QCPogEBvADhLJFKbrQzwZ20ChCQMk=",
Expand Down Expand Up @@ -1346,13 +1346,13 @@
"vendorHash": "sha256-tg1LBq8K8loMkPUXPMEi9Y4Epg0ZfpaYADfWLaZ2k3U="
},
"vcd": {
"hash": "sha256-lWpJb2Dsx2wljQEignrbudFP/K2X8IfkY0IHLnO/Gtw=",
"hash": "sha256-W+ffIT70IaePg3xfOaQgCjPTWTN3iSAYwkf+s+zkB84=",
"homepage": "https://registry.terraform.io/providers/vmware/vcd",
"owner": "vmware",
"repo": "terraform-provider-vcd",
"rev": "v3.14.0",
"rev": "v3.14.1",
"spdx": "MPL-2.0",
"vendorHash": "sha256-xR0PkeeUjt49KlB7+zIJ2ELcTNS46pQnBrr76X5KneY="
"vendorHash": "sha256-eCIJ2w8DjmUCGp0VbliLaQ6C29mJhl6Spya06Xyiqd4="
},
"venafi": {
"hash": "sha256-9Nn2dFF9W8STQoRXFNiXYCrHEWiirNvOAAS1f1brutw=",
Expand Down Expand Up @@ -1427,12 +1427,12 @@
"vendorHash": "sha256-GRnVhGpVgFI83Lg34Zv1xgV5Kp8ioKTFV5uaqS80ATg="
},
"yandex": {
"hash": "sha256-prXoM9pZDbuWs99y7kXyv+D6pUghzbM6kbbl6L4tXT8=",
"hash": "sha256-aD5IcD4IDjB0+9cUJEUR9pRtWkLdzk4XVA8sTsBGx30=",
"homepage": "https://registry.terraform.io/providers/yandex-cloud/yandex",
"owner": "yandex-cloud",
"repo": "terraform-provider-yandex",
"rev": "v0.133.0",
"rev": "v0.134.0",
"spdx": "MPL-2.0",
"vendorHash": "sha256-Dl9h+6gVpCg6hwhC348LKjCK88BQk/rZR2I4yujrZFk="
"vendorHash": "sha256-zQ6iofCmWfeDhRPtlXCuE63dKpA832jX5AEtUssmA7g="
}
}
Loading

0 comments on commit c61af72

Please sign in to comment.