diff --git a/.github/workflows/README.md b/.github/workflows/README.md index c2a16827ebd4..10b0276be144 100644 --- a/.github/workflows/README.md +++ b/.github/workflows/README.md @@ -61,3 +61,17 @@ This results in a key with the following semantics: ``` --- ``` + +## Required Status Checks + +The "Required Status Checks" branch ruleset is implemented in two top-level workflows: `pr.yml` and `merge-group.yml`. + +The PR workflow defines all checks that need to succeed to add a Pull Request to the Merge Queue. +If no Merge Queue is set up for a branch, the PR workflow defines the checks required to merge into the target branch. + +The Merge Group workflow defines all checks that are run as part of the Merge Queue. +Only when these pass, a Pull Request is finally merged into the target branch. +They don't apply when no Merge Queue is set up. + +Both workflows work with the same `no PR failures` status check. +This name can never be changed, because it's used in the branch ruleset for these rules. diff --git a/.github/workflows/merge-group.yml b/.github/workflows/merge-group.yml new file mode 100644 index 000000000000..72b8deeb2dbc --- /dev/null +++ b/.github/workflows/merge-group.yml @@ -0,0 +1,31 @@ +name: Merge Group + +on: + merge_group: + +permissions: {} + +jobs: + lint: + name: Lint + uses: ./.github/workflows/lint.yml + with: + mergedSha: ${{ github.event.merge_group.head_sha }} + targetSha: ${{ github.event.merge_group.base_sha }} + + # This job's only purpose is to serve as a target for the "Required Status Checks" branch ruleset. + # It "needs" all the jobs that should block the Merge Queue. + # If they pass, it is skipped — which counts as "success" for purposes of the branch ruleset. + # However, if any of them fail, this job will also fail — thus blocking the branch ruleset. + no-pr-failures: + # Modify this list to add or remove jobs from required status checks. + needs: + - lint + # WARNING: + # Do NOT change the name of this job, otherwise the rule will not catch it anymore. + # This would prevent all PRs from passing the merge queue. + name: no PR failures + if: ${{ failure() }} + runs-on: ubuntu-24.04-arm + steps: + - run: exit 1 diff --git a/doc/languages-frameworks/python.section.md b/doc/languages-frameworks/python.section.md index e79a324b236c..23db76baad97 100644 --- a/doc/languages-frameworks/python.section.md +++ b/doc/languages-frameworks/python.section.md @@ -2123,12 +2123,8 @@ The following rules are desired to be respected: It does not need to be set explicitly unless the package requires a specific platform. * The file is formatted with `nixfmt-rfc-style`. * Commit names of Python libraries must reflect that they are Python - libraries (e.g. `python313Packages.numpy: 1.11 -> 1.12` rather than `numpy: 1.11 -> 1.12`). -* The current default version of python should be included - in commit messages to enable automatic builds by ofborg. - For example `python313Packages.numpy: 1.11 -> 1.12` should be used rather - than `python3Packages.numpy: 1.11 -> 1.12`. - Note that `pythonPackages` is an alias for `python27Packages`. + libraries (e.g. `python3Packages.numpy: 1.11 -> 1.12` rather than `numpy: 1.11 -> 1.12`). + See also [`pkgs/README.md`](https://github.com/NixOS/nixpkgs/blob/master/pkgs/README.md#commit-conventions). * Attribute names in `python-packages.nix` as well as `pname`s should match the library's name on PyPI, but be normalized according to [PEP 0503](https://www.python.org/dev/peps/pep-0503/#normalized-names). This means diff --git a/nixos/doc/manual/redirects.json b/nixos/doc/manual/redirects.json index 5cdbbd8a2faf..cf54c4ce7982 100644 --- a/nixos/doc/manual/redirects.json +++ b/nixos/doc/manual/redirects.json @@ -1468,6 +1468,9 @@ "module-security-acme-fix-jws": [ "index.html#module-security-acme-fix-jws" ], + "module-security-acme-reload-dependencies": [ + "index.html#module-security-acme-reload-dependencies" + ], "module-programs-zsh-ohmyzsh": [ "index.html#module-programs-zsh-ohmyzsh" ], diff --git a/nixos/doc/manual/release-notes/rl-2511.section.md b/nixos/doc/manual/release-notes/rl-2511.section.md index 09fc627c3fb4..c804ee2438e3 100644 --- a/nixos/doc/manual/release-notes/rl-2511.section.md +++ b/nixos/doc/manual/release-notes/rl-2511.section.md @@ -173,6 +173,21 @@ - `services.gitea` supports sending notifications with sendmail again. To do this, activate the parameter `services.gitea.mailerUseSendmail` and configure SMTP server. +- Revamp of the ACME certificate acquisication and renewal process to help scale systems with lots (100+) of certificates. + + Units and targets have been reshaped to better support more specific dependency propagation and avoid + superfluously triggering unchanged units: + + If a service requires a syntactically valid certificate to start it should now depend on the `acme-{certname}.service` unit. + + We now always generate initial self-signed certificates as this drastically simplifies the dependency structure. As a result, the option `security.acme.preliminarySelfsigned` has been removed. + + Instead of the previous `acme-finished-{certname}.target`s there are now `acme-order-renew-{certname}.service`s that will be activated + in a delayed fashion to ensure that bootstrapping with servers like nginx that take part in the acquisition/renewal process works + smoothly. Dependencies on `acme-finished` units should move to `acme-order-renew`. + + Note that system activation will complete before all certificates may have been renewed or acquired. + - `libvirt` now supports using `nftables` backend. - The `virtualisation.libvirtd.firewallBackend` option can be used to configure the firewall backend used by libvirtd. diff --git a/nixos/modules/installer/sd-card/sd-image.nix b/nixos/modules/installer/sd-card/sd-image.nix index 988ab9ee003f..7a2e271c4dde 100644 --- a/nixos/modules/installer/sd-card/sd-image.nix +++ b/nixos/modules/installer/sd-card/sd-image.nix @@ -26,7 +26,7 @@ let inherit (config.sdImage) storePaths; compressImage = config.sdImage.compressImage; populateImageCommands = config.sdImage.populateRootCommands; - volumeLabel = "NIXOS_SD"; + volumeLabel = config.sdImage.rootVolumeLabel; } // optionalAttrs (config.sdImage.rootPartitionUUID != null) { uuid = config.sdImage.rootPartitionUUID; @@ -117,6 +117,17 @@ in ''; }; + rootVolumeLabel = mkOption { + type = types.str; + default = "NIXOS_SD"; + example = "NIXOS_PENDRIVE"; + description = '' + Label for the NixOS root volume. + Usually used when creating a recovery NixOS media installation + that avoids conflicting with previous instalation label. + ''; + }; + firmwareSize = mkOption { type = types.int; # As of 2019-08-18 the Raspberry pi firmware + u-boot takes ~18MiB @@ -197,7 +208,7 @@ in ]; }; "/" = { - device = "/dev/disk/by-label/NIXOS_SD"; + device = "/dev/disk/by-label/${config.sdImage.rootVolumeLabel}"; fsType = "ext4"; }; }; diff --git a/nixos/modules/security/acme/default.md b/nixos/modules/security/acme/default.md index b3a5f838f897..f976f28db552 100644 --- a/nixos/modules/security/acme/default.md +++ b/nixos/modules/security/acme/default.md @@ -318,7 +318,7 @@ can be applied to any service. # Now you must augment OpenSMTPD's systemd service to load # the certificate files. - systemd.services.opensmtpd.requires = [ "acme-finished-mail.example.com.target" ]; + systemd.services.opensmtpd.requires = [ "acme-mail.example.com.service" ]; systemd.services.opensmtpd.serviceConfig.LoadCredential = let certDir = config.security.acme.certs."mail.example.com".directory; @@ -376,3 +376,11 @@ systemd-tmpfiles --create # Note: Do this for all certs that share the same account email address systemctl start acme-example.com.service ``` + +## Ensuring dependencies for services that need to be reloaded when a certificate challenges {#module-security-acme-reload-dependencies} + +Services that depend on ACME certificates and need to be reloaded can use one of two approaches to reload upon successfull certificate acquisition or renewal: + +1. **Using the `security.acme.certs..reloadServices` option**: This will cause `systemctl try-reload-or-restart` to be run for the listed services. + +2. **Using a separate reload unit**: if you need perform more complex actions you can implement a separate reload unit but need to ensure that it lists the `acme-renew-.service` unit both as `wantedBy` AND `after`. See the nginx module implementation with its `nginx-config-reload` service. diff --git a/nixos/modules/security/acme/default.nix b/nixos/modules/security/acme/default.nix index 92c545797376..2c3c64eb4251 100644 --- a/nixos/modules/security/acme/default.nix +++ b/nixos/modules/security/acme/default.nix @@ -24,56 +24,32 @@ let # Since that service is a oneshot with RemainAfterExit, # the folder will exist during all renewal services. lockdir = "/run/acme/"; - concurrencyLockfiles = map (n: "${toString n}.lock") (lib.range 1 cfg.maxConcurrentRenewals); - # Assign elements of `baseList` to each element of `needAssignmentList`, until the latter is exhausted. - # returns: [{fst = "element of baseList"; snd = "element of needAssignmentList"}] - roundRobinAssign = - baseList: needAssignmentList: - if baseList == [ ] then [ ] else _rrCycler baseList baseList needAssignmentList; - _rrCycler = - with builtins; - origBaseList: workingBaseList: needAssignmentList: - if (workingBaseList == [ ] || needAssignmentList == [ ]) then - [ ] - else - [ - { - fst = head workingBaseList; - snd = head needAssignmentList; - } - ] - ++ _rrCycler origBaseList ( - if (tail workingBaseList == [ ]) then origBaseList else tail workingBaseList - ) (tail needAssignmentList); - attrsToList = lib.mapAttrsToList ( - attrname: attrval: { - name = attrname; - value = attrval; - } - ); - # for an AttrSet `funcsAttrs` having functions as values, apply single arguments from - # `argsList` to them in a round-robin manner. - # Returns an attribute set with the applied functions as values. - roundRobinApplyAttrs = - funcsAttrs: argsList: - lib.listToAttrs ( - map (x: { - inherit (x.snd) name; - value = x.snd.value x.fst; - }) (roundRobinAssign argsList (attrsToList funcsAttrs)) - ); + wrapInFlock = - lockfilePath: script: + script: # explainer: https://stackoverflow.com/a/60896531 '' - exec {LOCKFD}> ${lockfilePath} - echo "Waiting to acquire lock ${lockfilePath}" - ${pkgs.flock}/bin/flock ''${LOCKFD} || exit 1 - echo "Acquired lock ${lockfilePath}" + maxConcurrentRenewals=${toString cfg.maxConcurrentRenewals} + + acquireLock() { + echo "Waiting to acquire lock in ${lockdir}" + while true; do + for i in $(seq 1 $maxConcurrentRenewals); do + exec {LOCKFD}> "${lockdir}/$i.lock" + if ${pkgs.flock}/bin/flock -n ''${LOCKFD}; then + return 0 + fi + exec {LOCKFD}>&- + done + sleep 1; + done + } + + if [ "$maxConcurrentRenewals" -gt "0" ]; then + acquireLock + fi '' - + script - + "\n" - + ''echo "Releasing lock ${lockfilePath}" # only released after process exit''; + + script; # There are many services required to make cert renewals work. # They all follow a common structure: @@ -160,58 +136,49 @@ let ); # This is defined with lib.mkMerge so that we can separate the config per function. - setupService = lib.mkMerge [ - { - description = "Set up the ACME certificate renewal infrastructure"; - script = lib.mkBefore '' - ${lib.optionalString cfg.defaults.enableDebugLogs "set -x"} - set -euo pipefail - ''; - serviceConfig = commonServiceConfig // { - # This script runs with elevated privileges, denoted by the + - # ExecStartPre is used instead of ExecStart so that the `script` continues to work. - ExecStartPre = "+${lib.getExe privilegedSetupScript}"; + setupService = { + description = "Set up the ACME certificate renewal infrastructure"; + path = [ pkgs.minica ]; - # We don't want this to run every time a renewal happens - RemainAfterExit = true; + script = lib.mkBefore '' + ${lib.optionalString cfg.defaults.enableDebugLogs "set -x"} + set -euo pipefail + test -e ca/key.pem || minica \ + --ca-key ca/key.pem \ + --ca-cert ca/cert.pem \ + --domains selfsigned.local + ''; - # StateDirectory entries are a cleaner, service-level mechanism - # for dealing with persistent service data - StateDirectory = [ - "acme" - "acme/.lego" - "acme/.lego/accounts" - ]; - StateDirectoryMode = "0755"; + serviceConfig = commonServiceConfig // { + # This script runs with elevated privileges, denoted by the + + # ExecStartPre is used instead of ExecStart so that the `script` continues to work. + ExecStartPre = "+${lib.getExe privilegedSetupScript}"; - # Creates ${lockdir}. Earlier RemainAfterExit=true means - # it does not get deleted immediately. - RuntimeDirectory = "acme"; - RuntimeDirectoryMode = "0700"; + # We don't want this to run every time a renewal happens + RemainAfterExit = true; - # Generally, we don't write anything that should be group accessible. - # Group varies for most ACME units, and setup files are only used - # under the acme user. - UMask = "0077"; - }; - } + # StateDirectory entries are a cleaner, service-level mechanism + # for dealing with persistent service data + StateDirectory = [ + "acme" + "acme/.lego" + "acme/.lego/accounts" + "acme/.minica" + ]; + BindPaths = "/var/lib/acme/.minica:/tmp/ca"; + StateDirectoryMode = "0755"; - # Avoid race conditions creating the CA for selfsigned certs - (lib.mkIf cfg.preliminarySelfsigned { - path = [ pkgs.minica ]; - # Working directory will be /tmp - script = '' - test -e ca/key.pem || minica \ - --ca-key ca/key.pem \ - --ca-cert ca/cert.pem \ - --domains selfsigned.local - ''; - serviceConfig = { - StateDirectory = [ "acme/.minica" ]; - BindPaths = "/var/lib/acme/.minica:/tmp/ca"; - }; - }) - ]; + # Creates ${lockdir}. Earlier RemainAfterExit=true means + # it does not get deleted immediately. + RuntimeDirectory = "acme"; + RuntimeDirectoryMode = "0700"; + + # Generally, we don't write anything that should be group accessible. + # Group varies for most ACME units, and setup files are only used + # under the acme user. + UMask = "0077"; + }; + }; certToConfig = cert: data: @@ -219,7 +186,6 @@ let acmeServer = data.server; useDns = data.dnsProvider != null; destPath = "/var/lib/acme/${cert}"; - selfsignedDeps = lib.optionals (cfg.preliminarySelfsigned) [ "acme-selfsigned-${cert}.service" ]; # Minica and lego have a "feature" which replaces * with _. We need # to make this substitution to reference the output files from both programs. @@ -339,16 +305,18 @@ let certificateKey = if data.csrKey != null then "${data.csrKey}" else "certificates/${keyName}.key"; in { - inherit accountHash cert selfsignedDeps; + inherit accountHash cert; group = data.group; renewTimer = { description = "Renew ACME Certificate for ${cert}"; wantedBy = [ "timers.target" ]; + # Avoid triggering certificate renewals accidentally when running s-t-c. + unitConfig."X-OnlyManualStart" = true; timerConfig = { OnCalendar = data.renewInterval; - Unit = "acme-${cert}.service"; + Unit = "acme-order-renew-${cert}.service"; Persistent = "yes"; # Allow systemd to pick a convenient time within the day @@ -364,15 +332,29 @@ let }; }; - selfsignService = lockfileName: { - description = "Generate self-signed certificate for ${cert}"; + baseService = { + description = "Ensure certificate for ${cert}"; + + wantedBy = [ "multi-user.target" ]; + after = [ "acme-setup.service" ]; - requires = [ "acme-setup.service" ]; + + # Whenever this service starts (on boot, through dependencies, through + # changes) we trigger the acme-order-renew service to give it a chance + # to catch up with the potentially changed config. + wants = [ + "acme-setup.service" + "acme-order-renew-${cert}.service" + ]; + before = [ "acme-order-renew-${cert}.service" ]; + + restartTriggers = [ + config.systemd.services."acme-order-renew-${cert}".script + ]; path = [ pkgs.minica ]; unitConfig = { - ConditionPathExists = "!/var/lib/acme/${cert}/key.pem"; StartLimitIntervalSec = 0; }; @@ -380,52 +362,83 @@ let Group = data.group; UMask = "0027"; + RemainAfterExit = true; + StateDirectory = "acme/${cert}"; BindPaths = [ "/var/lib/acme/.minica:/tmp/ca" - "/var/lib/acme/${cert}:/tmp/${keyName}" + "/var/lib/acme/${cert}:/tmp/out" ]; }; # Working directory will be /tmp # minica will output to a folder sharing the name of the first domain # in the list, which will be ${data.domain} - script = (if (lockfileName == null) then lib.id else wrapInFlock "${lockdir}${lockfileName}") '' + script = wrapInFlock '' + set -ex + + # Regenerate self-signed certificates (in case the SANs change) until we + # have seen a succesfull ACME certificate at least once. + if [ -e out/acme-success ]; then + exit 0 + fi + minica \ --ca-key ca/key.pem \ --ca-cert ca/cert.pem \ --domains ${lib.escapeShellArg (builtins.concatStringsSep "," ([ data.domain ] ++ extraDomains))} # Create files to match directory layout for real certificates - cd '${keyName}' - cp ../ca/cert.pem chain.pem - cat cert.pem chain.pem > fullchain.pem - cat key.pem fullchain.pem > full.pem + ( + cd '${keyName}' + cp -vp cert.pem ../out/cert.pem + cp -vp key.pem ../out/key.pem + ) + cat out/cert.pem ca/cert.pem > out/fullchain.pem + cp ca/cert.pem out/chain.pem + cat out/key.pem out/fullchain.pem > out/full.pem - # Group might change between runs, re-apply it - chown '${user}:${data.group}' -- * + # Fix up the output files to adhere to the group and + # have consistent permissions. This needs to be kept + # consistent with the acme-setup script above. + for fixpath in out certificates; do + if [ -d "$fixpath" ]; then + chmod -R u=rwX,g=rX,o= "$fixpath" + chown -R ${user}:${data.group} "$fixpath" + fi + done - # Default permissions make the files unreadable by group + anon - # Need to be readable by group - chmod 640 -- * + ${lib.optionalString (data.webroot != null) '' + # Ensure the webroot exists. Fixing group is required in case configuration was changed between runs. + # Lego will fail if the webroot does not exist at all. + ( + mkdir -p '${data.webroot}/.well-known/acme-challenge' \ + && chgrp '${data.group}' ${data.webroot}/.well-known/acme-challenge + ) || ( + echo 'Please ensure ${data.webroot}/.well-known/acme-challenge exists and is writable by acme:${data.group}' \ + && exit 1 + ) + ''} ''; }; - renewService = lockfileName: { - description = "Renew ACME certificate for ${cert}"; + orderRenewService = { + description = "Order (and renew) ACME certificate for ${cert}"; after = [ "network.target" "network-online.target" "acme-setup.service" "nss-lookup.target" - ] - ++ selfsignedDeps; - wants = [ "network-online.target" ] ++ selfsignedDeps; - requires = [ "acme-setup.service" ]; - - # https://github.com/NixOS/nixpkgs/pull/81371#issuecomment-605526099 - wantedBy = lib.optionals (!config.boot.isContainer) [ "multi-user.target" ]; + "acme-${cert}.service" + ]; + wants = [ + "network-online.target" + "acme-setup.service" + "acme-${cert}.service" + ]; + # Ensure that certificates are generated if people use `security.acme.certs` + # without having/declaring other systemd units that depend on the cert. path = with pkgs; [ lego @@ -491,7 +504,7 @@ let }; # Working directory will be /tmp - script = (if (lockfileName == null) then lib.id else wrapInFlock "${lockdir}${lockfileName}") '' + script = wrapInFlock '' ${lib.optionalString data.enableDebugLogs "set -x"} set -euo pipefail @@ -523,25 +536,12 @@ let [[ $expiration_days -gt ${toString data.validMinDays} ]] } - ${lib.optionalString (data.webroot != null) '' - # Ensure the webroot exists. Fixing group is required in case configuration was changed between runs. - # Lego will fail if the webroot does not exist at all. - ( - mkdir -p '${data.webroot}/.well-known/acme-challenge' \ - && chgrp '${data.group}' ${data.webroot}/.well-known/acme-challenge - ) || ( - echo 'Please ensure ${data.webroot}/.well-known/acme-challenge exists and is writable by acme:${data.group}' \ - && exit 1 - ) - ''} - echo '${domainHash}' > domainhash.txt - # Check if we can renew. + # Check if a new order is needed # We can only renew if the list of domains has not changed. # We also need an account key. Avoids #190493 if cmp -s domainhash.txt certificates/domainhash.txt && [ -e '${certificateKey}' ] && [ -e 'certificates/${keyName}.crt' ] && [ -n "$(find accounts -name '${data.email}.key')" ]; then - # Even if a cert is not expired, it may be revoked by the CA. # Try to renew, and silently fail if the cert is not expired. # Avoids #85794 and resolves #129838 @@ -553,13 +553,12 @@ let exit 11 fi fi - - # Otherwise do a full run + # Do a full run elif ! lego ${runOpts}; then # Produce a nice error for those doing their first nixos-rebuild with these certs echo Failed to fetch certificates. \ This may mean your DNS records are set up incorrectly. \ - ${lib.optionalString (cfg.preliminarySelfsigned) "Selfsigned certs are in place and dependant services will still start."} + Self-signed certs are in place and dependant services will still start. # Exit 10 so that users can potentially amend SuccessExitStatus to ignore this error. # High number to avoid Systemd reserved codes. exit 10 @@ -567,10 +566,12 @@ let mv domainhash.txt certificates/ - # Group might change between runs, re-apply it - chown '${user}:${data.group}' certificates/* + touch out/acme-success # Copy all certs to the "real" certs directory + # lego has only an interesting subset of files available, + # construct reasonably compatible files that clients can consume + # as expected. if ! cmp -s 'certificates/${keyName}.crt' out/fullchain.pem; then touch out/renewed echo Installing new certificate @@ -581,10 +582,13 @@ let cat out/key.pem out/fullchain.pem > out/full.pem fi - # By default group will have no access to the cert files. - # This chmod will fix that. - chmod 640 out/* - + # Keep permissions consistent. Needs to be in sync with the other scripts. + for fixpath in out certificates; do + if [ -d "$fixpath" ]; then + chmod -R u=rwX,g=rX,o= "$fixpath" + chown -R ${user}:${data.group} "$fixpath" + fi + done # Also ensure safer permissions on the account directory. chmod -R u=rwX,g=,o= accounts/. ''; @@ -905,19 +909,6 @@ in options = { security.acme = { - preliminarySelfsigned = lib.mkOption { - type = lib.types.bool; - default = true; - description = '' - Whether a preliminary self-signed certificate should be generated before - doing ACME requests. This can be useful when certificates are required in - a webserver, but ACME needs the webserver to make its requests. - - With preliminary self-signed certificate the webserver can be started and - can later reload the correct ACME certificates. - ''; - }; - acceptTerms = lib.mkOption { type = lib.types.bool; default = false; @@ -1003,10 +994,13 @@ in "ACME Directory is now hardcoded to /var/lib/acme and its permissions are managed by systemd. See https://github.com/NixOS/nixpkgs/issues/53852 for more info." ) (lib.mkRemovedOptionModule [ "security" "acme" "preDelay" ] - "This option has been removed. If you want to make sure that something executes before certificates are provisioned, add a RequiredBy=acme-\${cert}.service to the service you want to execute before the cert renewal" + "This option has been removed. If you want to make sure that something executes before certificates are provisioned, add a RequiredBy=acme-\${cert}.service and Before=acme-\${cert}.service to the service you want to execute before the cert renewal" ) (lib.mkRemovedOptionModule [ "security" "acme" "activationDelay" ] - "This option has been removed. If you want to make sure that something executes before certificates are provisioned, add a RequiredBy=acme-\${cert}.service to the service you want to execute before the cert renewal" + "This option has been removed. If you want to make sure that something executes before certificates are provisioned, add a RequiredBy=acme-\${cert}.service and Before=acme-\${cert}.service to the service you want to execute before the cert renewal" + ) + (lib.mkRemovedOptionModule [ "security" "acme" "preliminarySelfsigned" ] + "This option has been removed. Preliminary self-signed certificates are now always generated to simplify the dependency structure." ) (lib.mkChangedOptionModule [ "security" "acme" "validMin" ] @@ -1161,45 +1155,25 @@ in systemd.services = let - renewServiceFunctions = lib.mapAttrs' ( - cert: conf: lib.nameValuePair "acme-${cert}" conf.renewService + orderRenewServices = lib.mapAttrs' ( + cert: conf: lib.nameValuePair "acme-order-renew-${cert}" conf.orderRenewService ) certConfigs; - renewServices = - if cfg.maxConcurrentRenewals > 0 then - roundRobinApplyAttrs renewServiceFunctions concurrencyLockfiles - else - lib.mapAttrs (_: f: f null) renewServiceFunctions; - selfsignServiceFunctions = lib.mapAttrs' ( - cert: conf: lib.nameValuePair "acme-selfsigned-${cert}" conf.selfsignService + baseServices = lib.mapAttrs' ( + cert: conf: lib.nameValuePair "acme-${cert}" conf.baseService ) certConfigs; - selfsignServices = - if cfg.maxConcurrentRenewals > 0 then - roundRobinApplyAttrs selfsignServiceFunctions concurrencyLockfiles - else - lib.mapAttrs (_: f: f null) selfsignServiceFunctions; in { acme-setup = setupService; } - // renewServices - // lib.optionalAttrs cfg.preliminarySelfsigned selfsignServices; + // baseServices + // orderRenewServices; systemd.timers = lib.mapAttrs' ( - cert: conf: lib.nameValuePair "acme-${cert}" conf.renewTimer + cert: conf: lib.nameValuePair "acme-renew-${cert}" conf.renewTimer ) certConfigs; systemd.targets = let - # Create some targets which can be depended on to be "active" after cert renewals - finishedTargets = lib.mapAttrs' ( - cert: conf: - lib.nameValuePair "acme-finished-${cert}" { - wantedBy = [ "default.target" ]; - requires = [ "acme-${cert}.service" ]; - after = [ "acme-${cert}.service" ]; - } - ) certConfigs; - # Create targets to limit the number of simultaneous account creations # How it works: # - Pick a "leader" cert service, which will be in charge of creating the account, @@ -1214,8 +1188,8 @@ in let dnsConfs = builtins.filter (conf: cfg.certs.${conf.cert}.dnsProvider != null) confs; leaderConf = if dnsConfs != [ ] then builtins.head dnsConfs else builtins.head confs; - leader = "acme-${leaderConf.cert}.service"; - followers = map (conf: "acme-${conf.cert}.service") ( + leader = "acme-order-renew-${leaderConf.cert}.service"; + followers = map (conf: "acme-order-renew-${conf.cert}.service") ( builtins.filter (conf: conf != leaderConf) confs ); in @@ -1224,10 +1198,11 @@ in before = followers; requires = [ leader ]; after = [ leader ]; + unitConfig.RefuseManualStart = true; } ) (lib.groupBy (conf: conf.accountHash) (lib.attrValues certConfigs)); in - finishedTargets // accountTargets; + accountTargets; }) ]; diff --git a/nixos/modules/services/networking/doh-server.nix b/nixos/modules/services/networking/doh-server.nix index 834179ef9001..ab81e299390d 100644 --- a/nixos/modules/services/networking/doh-server.nix +++ b/nixos/modules/services/networking/doh-server.nix @@ -156,7 +156,7 @@ in "network.target" ] ++ lib.optional (cfg.useACMEHost != null) "acme-${cfg.useACMEHost}.service"; - wants = lib.optional (cfg.useACMEHost != null) "acme-finished-${cfg.useACMEHost}.target"; + wants = lib.optional (cfg.useACMEHost != null) "acme-${cfg.useACMEHost}.service"; wantedBy = [ "multi-user.target" ]; serviceConfig = { AmbientCapabilities = "CAP_NET_BIND_SERVICE"; diff --git a/nixos/modules/services/networking/pptpd.nix b/nixos/modules/services/networking/pptpd.nix index a065709efe64..9adf9f58a206 100644 --- a/nixos/modules/services/networking/pptpd.nix +++ b/nixos/modules/services/networking/pptpd.nix @@ -87,9 +87,8 @@ with lib; ppp-pptpd-wrapped = pkgs.stdenv.mkDerivation { name = "ppp-pptpd-wrapped"; - phases = [ "installPhase" ]; nativeBuildInputs = with pkgs; [ makeWrapper ]; - installPhase = '' + buildCommand = '' mkdir -p $out/bin makeWrapper ${pkgs.ppp}/bin/pppd $out/bin/pppd \ --set LD_PRELOAD "${pkgs.libredirect}/lib/libredirect.so" \ diff --git a/nixos/modules/services/networking/xl2tpd.nix b/nixos/modules/services/networking/xl2tpd.nix index fd234cec03a6..21b70c9f16ac 100644 --- a/nixos/modules/services/networking/xl2tpd.nix +++ b/nixos/modules/services/networking/xl2tpd.nix @@ -89,9 +89,8 @@ with lib; xl2tpd-ppp-wrapped = pkgs.stdenv.mkDerivation { name = "xl2tpd-ppp-wrapped"; - phases = [ "installPhase" ]; nativeBuildInputs = with pkgs; [ makeWrapper ]; - installPhase = '' + buildCommand = '' mkdir -p $out/bin makeWrapper ${pkgs.ppp}/sbin/pppd $out/bin/pppd \ diff --git a/nixos/modules/services/security/kanidm.nix b/nixos/modules/services/security/kanidm.nix index f24e8c945d0d..adab048c5bf1 100644 --- a/nixos/modules/services/security/kanidm.nix +++ b/nixos/modules/services/security/kanidm.nix @@ -201,7 +201,7 @@ let echo "Tried for at least 30 seconds, giving up..." exit 1 fi - count=$((count++)) + count=$((++count)) done ${recoverIdmAdmin} diff --git a/nixos/modules/services/web-apps/onlyoffice.nix b/nixos/modules/services/web-apps/onlyoffice.nix index 004a5cc1781f..8392af4a4673 100644 --- a/nixos/modules/services/web-apps/onlyoffice.nix +++ b/nixos/modules/services/web-apps/onlyoffice.nix @@ -145,7 +145,7 @@ in ''; "~* ^(\\/cache\\/files.*)(\\/.*)".extraConfig = '' alias /var/lib/onlyoffice/documentserver/App_Data$1; - add_header Content-Disposition "attachment; filename*=UTF-8''$arg_filename"; + more_set_headers Content-Disposition "attachment; filename*=UTF-8''$arg_filename"; set $secure_link_secret verysecretstring; secure_link $arg_md5,$arg_expires; diff --git a/nixos/modules/services/web-servers/apache-httpd/default.nix b/nixos/modules/services/web-servers/apache-httpd/default.nix index aa3ae96896d6..07d4ad7fccfa 100644 --- a/nixos/modules/services/web-servers/apache-httpd/default.nix +++ b/nixos/modules/services/web-servers/apache-httpd/default.nix @@ -48,8 +48,6 @@ let ) (filter (hostOpts: hostOpts.enableACME || hostOpts.useACMEHost != null) vhosts); vhostCertNames = unique (map (hostOpts: hostOpts.certName) acmeEnabledVhosts); - dependentCertNames = filter (cert: certs.${cert}.dnsProvider == null) vhostCertNames; # those that might depend on the HTTP server - independentCertNames = filter (cert: certs.${cert}.dnsProvider != null) vhostCertNames; # those that don't depend on the HTTP server mkListenInfo = hostOpts: @@ -914,13 +912,14 @@ in systemd.services.httpd = { description = "Apache HTTPD"; wantedBy = [ "multi-user.target" ]; - wants = concatLists (map (certName: [ "acme-finished-${certName}.target" ]) vhostCertNames); + wants = concatLists (map (certName: [ "acme-${certName}.service" ]) vhostCertNames); after = [ "network.target" ] - ++ map (certName: "acme-selfsigned-${certName}.service") vhostCertNames - ++ map (certName: "acme-${certName}.service") independentCertNames; # avoid loading self-signed key w/ real cert, or vice-versa - before = map (certName: "acme-${certName}.service") dependentCertNames; + # Ensure httpd runs with baseline certificates in place. + ++ map (certName: "acme-${certName}.service") vhostCertNames; + # Ensure httpd runs (with current config) before the actual ACME jobs run + before = map (certName: "acme-order-renew-${certName}.service") vhostCertNames; restartTriggers = [ cfg.configFile ]; path = [ @@ -960,19 +959,17 @@ in # postRun hooks on cert renew can't be used to restart Apache since renewal # runs as the unprivileged acme user. sslTargets are added to wantedBy + before - # which allows the acme-finished-$cert.target to signify the successful updating + # which allows the acme-order-renew-$cert.service to signify the successful updating # of certs end-to-end. systemd.services.httpd-config-reload = let - sslServices = map (certName: "acme-${certName}.service") vhostCertNames; - sslTargets = map (certName: "acme-finished-${certName}.target") vhostCertNames; + sslServices = map (certName: "acme-order-renew-${certName}.service") vhostCertNames; in mkIf (vhostCertNames != [ ]) { wantedBy = sslServices ++ [ "multi-user.target" ]; # Before the finished targets, after the renew services. # This service might be needed for HTTP-01 challenges, but we only want to confirm # certs are updated _after_ config has been reloaded. - before = sslTargets; after = sslServices; restartTriggers = [ cfg.configFile ]; # Block reloading if not all certs exist yet. diff --git a/nixos/modules/services/web-servers/caddy/default.nix b/nixos/modules/services/web-servers/caddy/default.nix index 73da17d5a050..2277105069f8 100644 --- a/nixos/modules/services/web-servers/caddy/default.nix +++ b/nixos/modules/services/web-servers/caddy/default.nix @@ -14,13 +14,11 @@ let virtualHosts = attrValues cfg.virtualHosts; acmeEnabledVhosts = filter (hostOpts: hostOpts.useACMEHost != null) virtualHosts; vhostCertNames = unique (map (hostOpts: hostOpts.useACMEHost) acmeEnabledVhosts); - dependentCertNames = filter (cert: certs.${cert}.dnsProvider == null) vhostCertNames; # those that might depend on the HTTP server - independentCertNames = filter (cert: certs.${cert}.dnsProvider != null) vhostCertNames; # those that don't depend on the HTTP server mkVHostConf = hostOpts: let - sslCertDir = config.security.acme.certs.${hostOpts.useACMEHost}.directory; + sslCertDir = certs.${hostOpts.useACMEHost}.directory; in '' ${hostOpts.hostName} ${concatStringsSep " " hostOpts.serverAliases} { @@ -392,7 +390,7 @@ in ++ map ( name: mkCertOwnershipAssertion { - cert = config.security.acme.certs.${name}; + cert = certs.${name}; groups = config.users.groups; services = [ config.systemd.services.caddy ]; } @@ -412,11 +410,8 @@ in systemd.packages = [ cfg.package ]; systemd.services.caddy = { - wants = map (certName: "acme-finished-${certName}.target") vhostCertNames; - after = - map (certName: "acme-selfsigned-${certName}.service") vhostCertNames - ++ map (certName: "acme-${certName}.service") independentCertNames; # avoid loading self-signed key w/ real cert, or vice-versa - before = map (certName: "acme-${certName}.service") dependentCertNames; + wants = map (certName: "acme-${certName}.service") vhostCertNames; + after = map (certName: "acme-${certName}.service") vhostCertNames; wantedBy = [ "multi-user.target" ]; startLimitIntervalSec = 14400; diff --git a/nixos/modules/services/web-servers/h2o/default.nix b/nixos/modules/services/web-servers/h2o/default.nix index bd3b615ec9c8..331c31fefc9b 100644 --- a/nixos/modules/services/web-servers/h2o/default.nix +++ b/nixos/modules/services/web-servers/h2o/default.nix @@ -434,14 +434,13 @@ in systemd.services.h2o = { description = "H2O HTTP server"; wantedBy = [ "multi-user.target" ]; - wants = lib.concatLists (map (certName: [ "acme-finished-${certName}.target" ]) acmeCertNames.all); + wants = lib.concatLists (map (certName: [ "acme-${certName}.service" ]) acmeCertNames.all); # Since H2O will be hosting the challenges, H2O must be started - before = builtins.map (certName: "acme-${certName}.service") acmeCertNames.dependent; + before = builtins.map (certName: "acme-order-renew-${certName}.service") acmeCertNames.all; after = [ "network.target" ] - ++ builtins.map (certName: "acme-selfsigned-${certName}.service") acmeCertNames.all - ++ builtins.map (certName: "acme-${certName}.service") acmeCertNames.independent; # avoid loading self-signed key w/ real cert, or vice-versa + ++ builtins.map (certName: "acme-${certName}.service") acmeCertNames.all; serviceConfig = { ExecStart = "${h2oExe} --mode 'master'"; @@ -490,16 +489,14 @@ in # This service waits for all certificates to be available before reloading # H2O configuration. `tlsTargets` are added to `wantedBy` + `before` which - # allows the `acme-finished-$cert.target` to signify the successful updating + # allows the `acme-order-renew-$cert.service` to signify the successful updating # of certs end-to-end. systemd.services.h2o-config-reload = let - tlsTargets = map (certName: "acme-${certName}.target") acmeCertNames.all; - tlsServices = map (certName: "acme-${certName}.service") acmeCertNames.all; + tlsServices = map (certName: "acme-order-renew-${certName}.service") acmeCertNames.all; in mkIf (acmeCertNames.all != [ ]) { wantedBy = tlsServices ++ [ "multi-user.target" ]; - before = tlsTargets; after = tlsServices; unitConfig = { ConditionPathExists = map ( diff --git a/nixos/modules/services/web-servers/nginx/default.nix b/nixos/modules/services/web-servers/nginx/default.nix index 553f1f1148a5..267c0abcd44e 100644 --- a/nixos/modules/services/web-servers/nginx/default.nix +++ b/nixos/modules/services/web-servers/nginx/default.nix @@ -15,8 +15,6 @@ let vhostConfig: vhostConfig.enableACME || vhostConfig.useACMEHost != null ) vhostsConfigs; vhostCertNames = unique (map (hostOpts: hostOpts.certName) acmeEnabledVhosts); - dependentCertNames = filter (cert: certs.${cert}.dnsProvider == null) vhostCertNames; # those that might depend on the HTTP server - independentCertNames = filter (cert: certs.${cert}.dnsProvider != null) vhostCertNames; # those that don't depend on the HTTP server virtualHosts = mapAttrs ( vhostName: vhostConfig: let @@ -442,6 +440,7 @@ let auth_basic off; auth_request off; proxy_pass http://${vhost.acmeFallbackHost}; + proxy_set_header Host $host; } ''} ''; @@ -1481,16 +1480,14 @@ in systemd.services.nginx = { description = "Nginx Web Server"; wantedBy = [ "multi-user.target" ]; - wants = concatLists (map (certName: [ "acme-finished-${certName}.target" ]) vhostCertNames); + wants = concatLists (map (certName: [ "acme-${certName}.service" ]) vhostCertNames); after = [ "network.target" ] - ++ map (certName: "acme-selfsigned-${certName}.service") vhostCertNames - ++ map (certName: "acme-${certName}.service") independentCertNames; # avoid loading self-signed key w/ real cert, or vice-versa - # Nginx needs to be started in order to be able to request certificates - # (it's hosting the acme challenge after all) - # This fixes https://github.com/NixOS/nixpkgs/issues/81842 - before = map (certName: "acme-${certName}.service") dependentCertNames; + # Ensure nginx runs with baseline certificates in place. + ++ map (certName: "acme-${certName}.service") vhostCertNames; + # Ensure nginx runs (with current config) before the actual ACME jobs run + before = map (certName: "acme-order-renew-${certName}.service") vhostCertNames; stopIfChanged = false; preStart = '' ${cfg.preStart} @@ -1585,26 +1582,24 @@ in # This service waits for all certificates to be available # before reloading nginx configuration. # sslTargets are added to wantedBy + before - # which allows the acme-finished-$cert.target to signify the successful updating + # which allows the acme-order-renew-$cert.service to signify the successful updating # of certs end-to-end. systemd.services.nginx-config-reload = let - sslServices = map (certName: "acme-${certName}.service") vhostCertNames; - sslTargets = map (certName: "acme-finished-${certName}.target") vhostCertNames; + sslOrderRenewServices = map (certName: "acme-order-renew-${certName}.service") vhostCertNames; in mkIf (cfg.enableReload || vhostCertNames != [ ]) { wants = optionals cfg.enableReload [ "nginx.service" ]; - wantedBy = sslServices ++ [ "multi-user.target" ]; - # Before the finished targets, after the renew services. + wantedBy = sslOrderRenewServices ++ [ "multi-user.target" ]; + # XXX Before the finished targets, after the renew services. # This service might be needed for HTTP-01 challenges, but we only want to confirm # certs are updated _after_ config has been reloaded. - before = sslTargets; - after = sslServices; + after = sslOrderRenewServices; restartTriggers = optionals cfg.enableReload [ configFile ]; # Block reloading if not all certs exist yet. # Happens when config changes add new vhosts/certs. unitConfig = { - ConditionPathExists = optionals (sslServices != [ ]) ( + ConditionPathExists = optionals (vhostCertNames != [ ]) ( map (certName: certs.${certName}.directory + "/fullchain.pem") vhostCertNames ); # Disable rate limiting for this, because it may be triggered quickly a bunch of times diff --git a/nixos/modules/services/web-servers/pomerium.nix b/nixos/modules/services/web-servers/pomerium.nix index 93b04425435d..e4e9bc2e17a8 100644 --- a/nixos/modules/services/web-servers/pomerium.nix +++ b/nixos/modules/services/web-servers/pomerium.nix @@ -72,11 +72,11 @@ in wants = [ "network.target" ] - ++ (optional (cfg.useACMEHost != null) "acme-finished-${cfg.useACMEHost}.target"); + ++ (optional (cfg.useACMEHost != null) "acme-${cfg.useACMEHost}.service"); after = [ "network.target" ] - ++ (optional (cfg.useACMEHost != null) "acme-finished-${cfg.useACMEHost}.target"); + ++ (optional (cfg.useACMEHost != null) "acme-${cfg.useACMEHost}.service"); wantedBy = [ "multi-user.target" ]; environment = optionalAttrs (cfg.useACMEHost != null) { CERTIFICATE_FILE = "fullchain.pem"; @@ -127,18 +127,16 @@ in # postRun hooks on cert renew can't be used to restart Nginx since renewal # runs as the unprivileged acme user. sslTargets are added to wantedBy + before - # which allows the acme-finished-$cert.target to signify the successful updating + # which allows the acme-order-renew-$cert.target to signify the successful updating # of certs end-to-end. systemd.services.pomerium-config-reload = mkIf (cfg.useACMEHost != null) { # TODO(lukegb): figure out how to make config reloading work with credentials. wantedBy = [ - "acme-finished-${cfg.useACMEHost}.target" + "acme-order-renew-${cfg.useACMEHost}.service" "multi-user.target" ]; - # Before the finished targets, after the renew services. - before = [ "acme-finished-${cfg.useACMEHost}.target" ]; - after = [ "acme-${cfg.useACMEHost}.service" ]; + after = [ "acme-order-renew-${cfg.useACMEHost}.service" ]; # Block reloading if not all certs exist yet. unitConfig.ConditionPathExists = [ "${config.security.acme.certs.${cfg.useACMEHost}.directory}/fullchain.pem" diff --git a/nixos/tests/acme/caddy.nix b/nixos/tests/acme/caddy.nix index 96c86086d50a..0a3af2614bdf 100644 --- a/nixos/tests/acme/caddy.nix +++ b/nixos/tests/acme/caddy.nix @@ -85,33 +85,24 @@ in ca_domain = "${nodes.acme.test-support.acme.caDomain}" fqdn = "${nodes.caddy.networking.fqdn}" + with subtest("Boot and start with selfsigned certificates"): + caddy.start() + caddy.wait_for_unit("caddy.service") + check_issuer(caddy, fqdn, "minica") + # Check that the web server has picked up the selfsigned cert + check_connection(caddy, fqdn, minica=True) + acme.start() wait_for_running(acme) acme.wait_for_open_port(443) - with subtest("Boot and acquire a new cert"): - caddy.start() - wait_for_running(caddy) - + with subtest("Acquire a new cert"): + caddy.succeed(f"systemctl restart acme-{fqdn}.service") check_issuer(caddy, fqdn, "pebble") check_domain(caddy, fqdn, fqdn) - download_ca_certs(caddy, ca_domain) check_connection(caddy, fqdn) - with subtest("Can run on selfsigned certificates"): - # Switch to selfsigned first - caddy.succeed(f"systemctl clean acme-{fqdn}.service --what=state") - caddy.succeed(f"systemctl start acme-selfsigned-{fqdn}.service") - check_issuer(caddy, fqdn, "minica") - caddy.succeed("systemctl restart caddy.service") - # Check that the web server has picked up the selfsigned cert - check_connection(caddy, fqdn, minica=True) - caddy.succeed(f"systemctl start acme-{fqdn}.service") - # This may fail a couple of times before caddy is restarted - check_issuer(caddy, fqdn, "pebble") - check_connection(caddy, fqdn) - with subtest("security.acme changes reflect on caddy"): check_connection(caddy, f"caddy-alt.{domain}", fail=True) switch_to(caddy, "add_domain") diff --git a/nixos/tests/acme/default.nix b/nixos/tests/acme/default.nix index 7f861be2a027..2faca3a0b842 100644 --- a/nixos/tests/acme/default.nix +++ b/nixos/tests/acme/default.nix @@ -1,10 +1,14 @@ { runTest }: +let + domain = "example.test"; +in { http01-builtin = runTest ./http01-builtin.nix; dns01 = runTest ./dns01.nix; caddy = runTest ./caddy.nix; nginx = runTest ( import ./webserver.nix { + inherit domain; serverName = "nginx"; group = "nginx"; baseModule = { @@ -22,17 +26,17 @@ addSSL = true; useACMEHost = "proxied.example.test"; acmeFallbackHost = "localhost:8080"; - # lego will refuse the request if the host header is not correct - extraConfig = '' - proxy_set_header Host $host; - ''; }; }; + specialisation.nullroot.configuration = { + services.nginx.virtualHosts."nullroot.${domain}".acmeFallbackHost = "localhost:8081"; + }; }; } ); httpd = runTest ( import ./webserver.nix { + inherit domain; serverName = "httpd"; group = "wwwrun"; baseModule = { @@ -50,6 +54,16 @@ }; }; }; + specialisation.nullroot.configuration = { + services.httpd.virtualHosts."nullroot.${domain}" = { + locations."/.well-known/acme-challenge" = { + proxyPass = "http://localhost:8081/.well-known/acme-challenge"; + extraConfig = '' + ProxyPreserveHost On + ''; + }; + }; + }; }; } ); diff --git a/nixos/tests/acme/http01-builtin.nix b/nixos/tests/acme/http01-builtin.nix index 8589190a2667..d92737ed6fb1 100644 --- a/nixos/tests/acme/http01-builtin.nix +++ b/nixos/tests/acme/http01-builtin.nix @@ -37,6 +37,12 @@ in listenHTTP = ":80"; }; + systemd.targets."renew-triggered" = { + wantedBy = [ "acme-order-renew-${config.networking.fqdn}.service" ]; + after = [ "acme-order-renew-${config.networking.fqdn}.service" ]; + unitConfig.RefuseManualStart = true; + }; + specialisation = { renew.configuration = { # Pebble provides 5 year long certs, @@ -177,17 +183,29 @@ in # old_hash will be used in the preservation tests later old_hash = hash builtin.succeed(f"systemctl start acme-{cert}.service") + builtin.succeed(f"systemctl start acme-order-renew-{cert}.service") + builtin.wait_for_unit("renew-triggered.target") + hash_after = builtin.succeed(f"sha256sum /var/lib/acme/{cert}/cert.pem") assert hash == hash_after, "Certificate was unexpectedly changed" + builtin.succeed("systemctl stop renew-triggered.target") switch_to(builtin, "renew") + builtin.wait_for_unit("renew-triggered.target") + check_issuer(builtin, cert, "pebble") hash_after = builtin.succeed(f"sha256sum /var/lib/acme/{cert}/cert.pem | tee /dev/stderr") assert hash != hash_after, "Certificate was not renewed" + check_permissions(builtin, cert, "acme") + with subtest("Handles email change correctly"): hash = builtin.succeed(f"sha256sum /var/lib/acme/{cert}/cert.pem") + + builtin.succeed("systemctl stop renew-triggered.target") switch_to(builtin, "accountchange") + builtin.wait_for_unit("renew-triggered.target") + check_issuer(builtin, cert, "pebble") # Check that there are now 2 account directories builtin.succeed("test $(ls -1 /var/lib/acme/.lego/accounts | tee /dev/stderr | wc -l) -eq 2") @@ -202,58 +220,101 @@ in # old_hash will be used in the preservation tests later old_hash = hash_after + check_permissions(builtin, cert, "acme") + with subtest("Correctly implements OCSP stapling"): check_stapling(builtin, cert, "${caDomain}", fail=True) + + builtin.succeed("systemctl stop renew-triggered.target") switch_to(builtin, "ocsp_stapling") + builtin.wait_for_unit("renew-triggered.target") + check_stapling(builtin, cert, "${caDomain}") + check_permissions(builtin, cert, "acme") with subtest("Handles keyType change correctly"): check_key_bits(builtin, cert, 256) + + builtin.succeed("systemctl stop renew-triggered.target") switch_to(builtin, "keytype") + builtin.wait_for_unit("renew-triggered.target") + check_key_bits(builtin, cert, 384) # keyType is part of the accountHash, thus a new account will be created builtin.succeed("test $(ls -1 /var/lib/acme/.lego/accounts | tee /dev/stderr | wc -l) -eq 2") + check_permissions(builtin, cert, "acme") with subtest("Reuses generated, valid certs from previous configurations"): # Right now, the hash should not match due to the previous test hash = builtin.succeed(f"sha256sum /var/lib/acme/{cert}/cert.pem | tee /dev/stderr") assert hash != old_hash, "Expected certificate to differ" + + builtin.succeed("systemctl stop renew-triggered.target") switch_to(builtin, "preservation") + builtin.wait_for_unit("renew-triggered.target") + hash = builtin.succeed(f"sha256sum /var/lib/acme/{cert}/cert.pem | tee /dev/stderr") assert hash == old_hash, "Expected certificate to match from older configuration" + check_permissions(builtin, cert, "acme") with subtest("Add a new cert, extend existing cert domains"): check_domain(builtin, cert, f"builtin-alt.{domain}", fail=True) + + builtin.succeed("systemctl stop renew-triggered.target") switch_to(builtin, "add_cert_and_domain") + builtin.wait_for_unit("renew-triggered.target") + check_issuer(builtin, cert, "pebble") check_domain(builtin, cert, f"builtin-alt.{domain}") check_issuer(builtin, cert2, "pebble") check_domain(builtin, cert2, cert2) # There should not be a new account folder created builtin.succeed("test $(ls -1 /var/lib/acme/.lego/accounts | tee /dev/stderr | wc -l) -eq 2") + check_permissions(builtin, cert, "acme") + check_permissions(builtin, cert2, "acme") with subtest("Check account hashing compatibility with pre-24.05 settings"): - switch_to(builtin, "legacy_account_hash", fail=True) - builtin.succeed(f"stat {legacy_account_dir} > /dev/stderr && rm -rf {legacy_account_dir}") + builtin.succeed("systemctl stop renew-triggered.target") + switch_to(builtin, "legacy_account_hash" + ) + builtin.wait_for_unit("renew-triggered.target") - with subtest("Ensure Concurrency limits work"): + builtin.succeed(f"stat {legacy_account_dir} > /dev/stderr && rm -rf {legacy_account_dir}") + check_permissions(builtin, cert, "acme") + + with subtest("Ensure concurrency limits work"): + builtin.succeed("systemctl stop renew-triggered.target") switch_to(builtin, "concurrency") + builtin.wait_for_unit("renew-triggered.target") + check_issuer(builtin, cert3, "pebble") check_domain(builtin, cert3, cert3) + check_permissions(builtin, cert, "acme") + + with subtest("Can renew using a CSR"): + builtin.succeed(f"systemctl stop acme-{cert}.service") + builtin.succeed(f"systemctl clean acme-{cert}.service --what=state") + + builtin.succeed("systemctl stop renew-triggered.target") + switch_to(builtin, "csr") + builtin.wait_for_unit("renew-triggered.target") + + check_issuer(builtin, cert, "pebble") with subtest("Generate self-signed certs"): + acme.shutdown() + check_issuer(builtin, cert, "pebble") + + builtin.succeed(f"systemctl stop acme-{cert}.service") builtin.succeed(f"systemctl clean acme-{cert}.service --what=state") - builtin.succeed(f"systemctl start acme-selfsigned-{cert}.service") + builtin.succeed(f"systemctl start acme-{cert}.service") + check_issuer(builtin, cert, "minica") check_domain(builtin, cert, cert) with subtest("Validate permissions (self-signed)"): check_permissions(builtin, cert, "acme") - with subtest("Can renew using a CSR"): - builtin.succeed(f"systemctl clean acme-{cert}.service --what=state") - switch_to(builtin, "csr") - check_issuer(builtin, cert, "pebble") ''; } diff --git a/nixos/tests/acme/python-utils.py b/nixos/tests/acme/python-utils.py index 77e7066e0349..d542324084aa 100644 --- a/nixos/tests/acme/python-utils.py +++ b/nixos/tests/acme/python-utils.py @@ -3,6 +3,36 @@ import time TOTAL_RETRIES = 20 +# BackoffTracker provides a robust system for handling test retries +class BackoffTracker: + delay = 1 + increment = 1 + + def handle_fail(self, retries, message) -> int: + assert retries < TOTAL_RETRIES, message + + print(f"Retrying in {self.delay}s, {retries + 1}/{TOTAL_RETRIES}") + time.sleep(self.delay) + + # Only increment after the first try + if retries == 0: + self.delay += self.increment + self.increment *= 2 + + return retries + 1 + + def protect(self, func): + def wrapper(*args, retries: int = 0, **kwargs): + try: + return func(*args, **kwargs) + except Exception as err: + retries = self.handle_fail(retries, err.args) + return wrapper(*args, retries=retries, **kwargs) + + return wrapper + + +backoff = BackoffTracker() def run(node, cmd, fail=False): if fail: @@ -39,6 +69,7 @@ def switch_to(node, name, fail=False) -> None: # and matches the issuer we expect it to be. # It's a good validation to ensure the cert.pem and fullchain.pem # are not still selfsigned after verification +@backoff.protect def check_issuer(node, cert_name, issuer) -> None: for fname in ("cert.pem", "fullchain.pem"): actual_issuer = node.succeed( @@ -102,9 +133,10 @@ def check_permissions(node, cert_name, group): f"test $({stat} /var/lib/acme/{cert_name}/*.pem" f" | tee /dev/stderr | grep -v '640 acme {group}' | wc -l) -eq 0" ) + node.execute(f"ls -lahR /var/lib/acme/.lego/{cert_name}/* > /dev/stderr") node.succeed( f"test $({stat} /var/lib/acme/.lego/{cert_name}/*/{cert_name}*" - f" | tee /dev/stderr | grep -v '600 acme {group}' | wc -l) -eq 0" + f" | tee /dev/stderr | grep -v '640 acme {group}' | wc -l) -eq 0" ) node.succeed( f"test $({stat} /var/lib/acme/{cert_name}" @@ -115,37 +147,6 @@ def check_permissions(node, cert_name, group): f" | tee /dev/stderr | grep -v '600 acme {group}' | wc -l) -eq 0" ) -# BackoffTracker provides a robust system for handling test retries -class BackoffTracker: - delay = 1 - increment = 1 - - def handle_fail(self, retries, message) -> int: - assert retries < TOTAL_RETRIES, message - - print(f"Retrying in {self.delay}s, {retries + 1}/{TOTAL_RETRIES}") - time.sleep(self.delay) - - # Only increment after the first try - if retries == 0: - self.delay += self.increment - self.increment *= 2 - - return retries + 1 - - def protect(self, func): - def wrapper(*args, retries: int = 0, **kwargs): - try: - return func(*args, **kwargs) - except Exception as err: - retries = self.handle_fail(retries, err.args) - return wrapper(*args, retries=retries, **kwargs) - - return wrapper - - -backoff = BackoffTracker() - @backoff.protect def download_ca_certs(node, ca_domain): diff --git a/nixos/tests/acme/webserver.nix b/nixos/tests/acme/webserver.nix index a19f82edc76f..5dcd8857e8d2 100644 --- a/nixos/tests/acme/webserver.nix +++ b/nixos/tests/acme/webserver.nix @@ -2,7 +2,7 @@ serverName, group, baseModule, - domain ? "example.test", + domain, }: { config, @@ -18,6 +18,8 @@ timeout = 300; }; + interactive.sshBackdoor.enable = true; + nodes = { # The fake ACME server which will respond to client requests acme = @@ -45,6 +47,7 @@ "certchange.${domain}" "zeroconf.${domain}" "zeroconf2.${domain}" + "zeroconf3.${domain}" "nullroot.${domain}" ]; @@ -57,6 +60,7 @@ systemd.targets."renew-triggered" = { wantedBy = [ "${serverName}-config-reload.service" ]; after = [ "${serverName}-config-reload.service" ]; + unitConfig.RefuseManualStart = true; }; security.acme.certs."proxied.${domain}" = { @@ -101,13 +105,42 @@ # Test that "acmeRoot = null" still results in # valid cert generation by inheriting defaults. nullroot.configuration = { - security.acme.defaults.listenHTTP = ":8080"; + # The default.nix has the server-type dependent config statements + # to properly set up the proxying. We need a separate port here to + # avoid hostname issues with the proxy already running on :8080 + security.acme.defaults.listenHTTP = ":8081"; services.${serverName}.virtualHosts."nullroot.${domain}" = { - onlySSL = true; + addSSL = true; enableACME = true; acmeRoot = null; }; }; + + # Test that a adding a second virtual host will not trigger + # other units (account and renewal service for first) + zeroconf3.configuration = { + services.${serverName}.virtualHosts = { + "zeroconf.${domain}" = { + addSSL = true; + enableACME = true; + serverAliases = [ "zeroconf2.${domain}" ]; + }; + "zeroconf3.${domain}" = { + addSSL = true; + enableACME = true; + }; + }; + # We're doing something risky with the combination of the service unit being persistent + # that could end up that the timers do not trigger properly. Show that timers have the + # desired effect. + systemd.timers."acme-renew-zeroconf3.${domain}".timerConfig = { + OnCalendar = lib.mkForce "*-*-* *:*:0/5"; + AccuracySec = lib.mkForce 0; + # Skew randomly within the day, per https://letsencrypt.org/docs/integration-guide/. + RandomizedDelaySec = lib.mkForce 0; + FixedRandomDelay = lib.mkForce 0; + }; + }; }; }; }; @@ -121,30 +154,24 @@ ca_domain = "${nodes.acme.test-support.acme.caDomain}" fqdn = f"proxied.{domain}" + webserver.start() + webserver.wait_for_unit("${serverName}.service") + + with subtest("Can run on self-signed certificates"): + check_issuer(webserver, fqdn, "minica") + # Check that the web server has picked up the selfsigned cert + check_connection(webserver, fqdn, minica=True) + acme.start() wait_for_running(acme) acme.wait_for_open_port(443) with subtest("Acquire a cert through a proxied lego"): - webserver.start() - webserver.succeed("systemctl is-system-running --wait") - wait_for_running(webserver) - download_ca_certs(webserver, ca_domain) - check_connection(webserver, fqdn) - - with subtest("Can run on selfsigned certificates"): - # Switch to selfsigned first - webserver.succeed(f"systemctl clean acme-{fqdn}.service --what=state") - webserver.succeed(f"systemctl start acme-selfsigned-{fqdn}.service") - check_issuer(webserver, fqdn, "minica") - webserver.succeed("systemctl restart ${serverName}-config-reload.service") - # Check that the web server has picked up the selfsigned cert - check_connection(webserver, fqdn, minica=True) - webserver.succeed("systemctl stop renew-triggered.target") - webserver.succeed(f"systemctl start acme-{fqdn}.service") - webserver.wait_for_unit("renew-triggered.target") - check_issuer(webserver, fqdn, "pebble") - check_connection(webserver, fqdn) + webserver.succeed(f"systemctl start acme-order-renew-{fqdn}.service") + webserver.wait_for_unit("renew-triggered.target") + download_ca_certs(webserver, ca_domain) + check_issuer(webserver, fqdn, "pebble") + check_connection(webserver, fqdn) with subtest("security.acme changes reflect on web server part 1"): check_connection(webserver, f"certchange.{domain}", fail=True) @@ -181,5 +208,23 @@ switch_to(webserver, "nullroot") webserver.wait_for_unit("renew-triggered.target") check_connection(webserver, f"nullroot.{domain}") + + with subtest("Ensure that adding a second vhost does not trigger first vhost acme units"): + switch_to(webserver, "zeroconf") + webserver.wait_for_unit("renew-triggered.target") + webserver.succeed("journalctl --cursor-file=/tmp/cursor | grep acme") + switch_to(webserver, "zeroconf3") + webserver.wait_for_unit("renew-triggered.target") + output = webserver.succeed("journalctl --cursor-file=/tmp/cursor | grep acme") + # The new certificate unit gets triggered: + t.assertIn(f"acme-zeroconf3.{domain}-start", output) + # The account generation should not be triggered again: + t.assertNotIn("acme-account-d590213ed52603e9128d.target", output) + # The other certificates should also not be triggered: + t.assertNotIn(f"acme-zeroconf.{domain}-start", output) + t.assertNotIn(f"acme-proxied.{domain}-start", output) + # Ensure the timer works, due to our shenanigans with + # RemainAfterExit=true + webserver.wait_until_succeeds(f"journalctl --cursor-file=/tmp/cursor | grep 'Starting Order (and renew) ACME certificate for zeroconf3.{domain}...'") ''; } diff --git a/nixos/tests/step-ca.nix b/nixos/tests/step-ca.nix index 69b22bfd424a..ebd64dbda297 100644 --- a/nixos/tests/step-ca.nix +++ b/nixos/tests/step-ca.nix @@ -137,17 +137,18 @@ import ./make-test-python.nix ( caserver.wait_for_unit("step-ca.service") caserver.wait_until_succeeds("journalctl -o cat -u step-ca.service | grep '${pkgs.step-ca.version}'") - caclient.wait_for_unit("acme-finished-caclient.target") - catester.succeed("curl https://caclient/ | grep \"Welcome to nginx!\"") + caclient.wait_for_unit("acme-caclient.service") + # The order is run asynchonously, keep trying. + catester.wait_until_succeeds("curl https://caclient/ | grep \"Welcome to nginx!\"") caclientcaddy.wait_for_unit("caddy.service") # It’s hard to know when Caddy has finished the ACME dance with # step-ca, so we keep trying cURL until success. catester.wait_until_succeeds("curl https://caclientcaddy/ | grep \"Welcome to Caddy!\"") - caclienth2o.wait_for_unit("acme-finished-caclienth2o.target") + caclienth2o.wait_for_unit("acme-caclienth2o.service") caclienth2o.wait_for_unit("h2o.service") - catester.succeed("curl https://caclienth2o/ | grep \"Welcome to H2O!\"") + catester.wait_until_succeeds("curl https://caclienth2o/ | grep \"Welcome to H2O!\"") ''; } ) diff --git a/pkgs/applications/editors/okteta/default.nix b/pkgs/applications/editors/okteta/default.nix index 2d3e52da3b63..546b6e2600b3 100644 --- a/pkgs/applications/editors/okteta/default.nix +++ b/pkgs/applications/editors/okteta/default.nix @@ -19,11 +19,11 @@ mkDerivation rec { pname = "okteta"; - version = "0.26.22"; + version = "0.26.23"; src = fetchurl { url = "mirror://kde/stable/okteta/${version}/src/${pname}-${version}.tar.xz"; - sha256 = "sha256-vi7XhMj/PaMeK4V6FxU7Yi7XyWMaOBUenafZPpaP+n0="; + sha256 = "sha256-sExQmI6sJsUHaKtb1A9bNaNIxE1uDmqNVgVjzw6xo7E="; }; nativeBuildInputs = [ diff --git a/pkgs/applications/editors/vim/plugins/generated.nix b/pkgs/applications/editors/vim/plugins/generated.nix index 01d4f3ec8adf..4da02ef2c8be 100644 --- a/pkgs/applications/editors/vim/plugins/generated.nix +++ b/pkgs/applications/editors/vim/plugins/generated.nix @@ -4968,6 +4968,19 @@ final: prev: { meta.hydraPlatforms = [ ]; }; + fine-cmdline-nvim = buildVimPlugin { + pname = "fine-cmdline.nvim"; + version = "2025-06-15"; + src = fetchFromGitHub { + owner = "VonHeikemen"; + repo = "fine-cmdline.nvim"; + rev = "7db181d1cb294581b12a036eadffffde762a118f"; + sha256 = "0991l33f37vpc5plw3c5rwm92sn08gfrlzqy8y1cn06f4p6ll78b"; + }; + meta.homepage = "https://github.com/VonHeikemen/fine-cmdline.nvim/"; + meta.hydraPlatforms = [ ]; + }; + firenvim = buildVimPlugin { pname = "firenvim"; version = "2025-07-22"; diff --git a/pkgs/applications/editors/vim/plugins/vim-plugin-names b/pkgs/applications/editors/vim/plugins/vim-plugin-names index ca7c4ead54e4..7d40d88509d8 100644 --- a/pkgs/applications/editors/vim/plugins/vim-plugin-names +++ b/pkgs/applications/editors/vim/plugins/vim-plugin-names @@ -380,6 +380,7 @@ https://github.com/bakpakin/fennel.vim/,, https://github.com/wincent/ferret/,, https://github.com/bogado/file-line/,, https://github.com/lewis6991/fileline.nvim/,, +https://github.com/VonHeikemen/fine-cmdline.nvim/,HEAD, https://github.com/glacambre/firenvim/,HEAD, https://github.com/andviro/flake8-vim/,, https://github.com/folke/flash.nvim/,HEAD, diff --git a/pkgs/applications/editors/vscode/extensions/default.nix b/pkgs/applications/editors/vscode/extensions/default.nix index fd54a68ace90..8b439517c520 100644 --- a/pkgs/applications/editors/vscode/extensions/default.nix +++ b/pkgs/applications/editors/vscode/extensions/default.nix @@ -89,8 +89,8 @@ let mktplcRef = { publisher = "42Crunch"; name = "vscode-openapi"; - version = "4.37.2"; - hash = "sha256-XUD5lXybUdUavbiqCqv561NAPAbZ0Q9oLsQkrSRUmsU="; + version = "4.38.0"; + hash = "sha256-J9hZhPrHkJEFkiyD8eACiJwbsPfYGMK42FkcwkTQ0RE="; }; meta = { changelog = "https://marketplace.visualstudio.com/items/42Crunch.vscode-openapi/changelog"; @@ -4853,8 +4853,8 @@ let mktplcRef = { name = "emacs-mcx"; publisher = "tuttieee"; - version = "0.82.0"; - hash = "sha256-JpqHwQksZ/NsgiZ7EqHxT1FG9DLeInhDg6B+UWOFkeM="; + version = "0.88.10"; + hash = "sha256-Umfe+V3BzHsEow6nOvtvg9EN1T0O6SbVwt5g2YHkaSU="; }; meta = { changelog = "https://github.com/whitphx/vscode-emacs-mcx/blob/main/CHANGELOG.md"; diff --git a/pkgs/applications/editors/vscode/extensions/ms-azuretools.vscode-bicep/default.nix b/pkgs/applications/editors/vscode/extensions/ms-azuretools.vscode-bicep/default.nix index fe4664ade4b1..eda3e894cd86 100644 --- a/pkgs/applications/editors/vscode/extensions/ms-azuretools.vscode-bicep/default.nix +++ b/pkgs/applications/editors/vscode/extensions/ms-azuretools.vscode-bicep/default.nix @@ -10,8 +10,8 @@ vscode-utils.buildVscodeMarketplaceExtension { mktplcRef = { publisher = "ms-azuretools"; name = "vscode-bicep"; - version = "0.36.1"; - hash = "sha256-yrSIHTGHZ1m6fLGrtVlT4UHyWpKuzGKdywBDsMepd4g="; + version = "0.37.4"; + hash = "sha256-RBoScMaYWKfA9SONCLkFEcGwj8ffQ3ZlAOiyQY9LtVw="; }; buildInputs = [ diff --git a/pkgs/applications/emulators/libretro/cores/beetle-psx.nix b/pkgs/applications/emulators/libretro/cores/beetle-psx.nix index cbbcb4b8c0ca..000bf36786c7 100644 --- a/pkgs/applications/emulators/libretro/cores/beetle-psx.nix +++ b/pkgs/applications/emulators/libretro/cores/beetle-psx.nix @@ -8,13 +8,13 @@ }: mkLibretroCore { core = "mednafen-psx" + lib.optionalString withHw "-hw"; - version = "0-unstable-2025-08-01"; + version = "0-unstable-2025-08-06"; src = fetchFromGitHub { owner = "libretro"; repo = "beetle-psx-libretro"; - rev = "6eafe85d672ace484bd6b29eeb94eb84f0b41ee1"; - hash = "sha256-+gja4vMD+o78BxCR1SY4wLks6zOjKfU7M3a7cYg+2lc="; + rev = "1e42a9076ab1ec5756d3f72e6d61923080fb2128"; + hash = "sha256-3k2qgAgyo3o/qwNQZsc0J1dKueZqM7jYvm9gzNkEShw="; }; extraBuildInputs = lib.optionals withHw [ diff --git a/pkgs/applications/misc/pdfsam-basic/default.nix b/pkgs/applications/misc/pdfsam-basic/default.nix index 8276f0cb2993..2d73912750a6 100644 --- a/pkgs/applications/misc/pdfsam-basic/default.nix +++ b/pkgs/applications/misc/pdfsam-basic/default.nix @@ -11,11 +11,11 @@ stdenv.mkDerivation rec { pname = "pdfsam-basic"; - version = "5.3.1"; + version = "5.3.2"; src = fetchurl { url = "https://github.com/torakiki/pdfsam/releases/download/v${version}/pdfsam-basic_${version}-1_amd64.deb"; - hash = "sha256-Fhj/MJnnm8nsuJmSb6PigJT6Qm+CkGg8lV0NaUMfur0="; + hash = "sha256-Y0Q9uT6cyxIYTX0JxoS0r3TamPT1iLXr94Zex30AeWo="; }; unpackPhase = '' diff --git a/pkgs/applications/networking/cluster/helm/default.nix b/pkgs/applications/networking/cluster/helm/default.nix index d3f9f85c6bc5..06da7b5a8d2e 100644 --- a/pkgs/applications/networking/cluster/helm/default.nix +++ b/pkgs/applications/networking/cluster/helm/default.nix @@ -9,15 +9,15 @@ buildGoModule (finalAttrs: { pname = "kubernetes-helm"; - version = "3.18.4"; + version = "3.18.5"; src = fetchFromGitHub { owner = "helm"; repo = "helm"; rev = "v${finalAttrs.version}"; - sha256 = "sha256-2xOrTguenFzX7rvwm1ojSqV6ARCUSPUs07y3ut9Teec="; + sha256 = "sha256-SVaNuTIBnM9TFk+xy7yvUXX+8BEbfQdbHPTWUuimVw4="; }; - vendorHash = "sha256-Z3OAbuoeAtChd9Sk4bbzgwIxmFrw+/1c4zyxpNP0xXg="; + vendorHash = "sha256-Gn2h7a4bu9nWPEiqW9uN8SnKSZ7NRfchfRoFfpp49+M="; subPackages = [ "cmd/helm" ]; ldflags = [ diff --git a/pkgs/applications/science/electronics/kicad/versions.nix b/pkgs/applications/science/electronics/kicad/versions.nix index 515e6f750c4f..d592ffe03741 100644 --- a/pkgs/applications/science/electronics/kicad/versions.nix +++ b/pkgs/applications/science/electronics/kicad/versions.nix @@ -3,23 +3,23 @@ { "kicad" = { kicadVersion = { - version = "9.0.2"; + version = "9.0.3"; src = { - rev = "bf9b9242aea7832d140dc25ff897fe01e2f36e41"; - sha256 = "1v3nvp5ifa36hx3iw3whlp3j7hiy91fzihc0jc1daw0hnps7qy24"; + rev = "08e2e9df692929a2087bbf1340a915aa2365c622"; + sha256 = "19rij2hz79rsmikdbygxzll2l7im5qi3i6phz4sdiagkc5k8b3rb"; }; }; libVersion = { - version = "9.0.2"; + version = "9.0.3"; libSources = { - symbols.rev = "9eab1c9c90a8aa84b0f7eec73076329d91764583"; - symbols.sha256 = "134x4d5w89aahl4k9zai6vwcazibz17gsgzy04l9xn4zcf6v11qp"; - templates.rev = "f93acff0f8c8c8e215ea125db060c86bf4b1f5d3"; + symbols.rev = "77ee421d180de82fce2d8c00f1b13a9456b43526"; + symbols.sha256 = "0r9aimyrv7p4ykqnwb9ac3fd0dv11zmv2ll6qkmm5s875s35hhfl"; + templates.rev = "6e651a795134380ac0dc3df1417d11cfab228033"; templates.sha256 = "0zs29zn8qjgxv0w1vyr8yxmj02m8752zagn4vcraqgik46dwg2id"; - footprints.rev = "855079c1514bbdf38565fedcacee7fb05ffad5aa"; - footprints.sha256 = "0w44b7dzx6d3xw2vbw37k34zxy25bq46rsnv21x10227313vr2wm"; - packages3d.rev = "26e8886b3049a07e8b2b0bed82634ff755783352"; - packages3d.sha256 = "18cxlp5grvv5m63c3sb6m9l9cmijqqcjmxrkdzg63d5jp7w73smn"; + footprints.rev = "3ef8a3e0691599c633864118a3241e1cbeb873f1"; + footprints.sha256 = "1ysnj0973y05nn016hxrghccfv65cas772i369xflay0sns8anqf"; + packages3d.rev = "4c91925fde1402cc6da61d97cfb30a3de08d5bb6"; + packages3d.sha256 = "0njv4y31k62qhcx0xxcl94p34jgna8z4bs3hwjwzjfmp7ddl2dyx"; }; }; }; diff --git a/pkgs/applications/version-management/sublime-merge/default.nix b/pkgs/applications/version-management/sublime-merge/default.nix index c9b46606421f..d62c8b0993b7 100644 --- a/pkgs/applications/version-management/sublime-merge/default.nix +++ b/pkgs/applications/version-management/sublime-merge/default.nix @@ -5,9 +5,9 @@ let in { sublime-merge = common { - buildVersion = "2102"; - aarch64sha256 = "E//XrWlfvMeRWYfBXVTSSUPlDFY/rzSynJ4aP1WyZ0Y="; - x64sha256 = "Odb3ZvJCo4HTvJ7z31J/5wlyhSUpZRFBXP3f/Wkb7tU="; + buildVersion = "2110"; + aarch64sha256 = "lG95VgRsicSRjve7ESTamU9dp/xBjR6yyLL+1wh6BXg="; + x64sha256 = "v5CFqS+bB0Oe0fZ+vP0zxrJ2SUctNXKqODmB8M9XMIY="; } { }; sublime-merge-dev = common { diff --git a/pkgs/applications/video/tartube/default.nix b/pkgs/applications/video/tartube/default.nix index 2037aad1bd37..198fd276d777 100644 --- a/pkgs/applications/video/tartube/default.nix +++ b/pkgs/applications/video/tartube/default.nix @@ -16,14 +16,14 @@ python3Packages.buildPythonApplication rec { pname = "tartube"; - version = "2.5.156"; + version = "2.5.164"; format = "setuptools"; src = fetchFromGitHub { owner = "axcore"; repo = "tartube"; tag = "v${version}"; - sha256 = "sha256-4M1tYq8nVC1/+SQMtt0D0YfLW1uYWPcGx7XjuvbBxFw="; + sha256 = "sha256-PPvbdxxGUYUKL+5exO5+iO5ObJgjzFejZIIDA17hvYo="; }; nativeBuildInputs = [ diff --git a/pkgs/by-name/_3/_3cpio/package.nix b/pkgs/by-name/_3/_3cpio/package.nix index a708c12ff018..2174debee533 100644 --- a/pkgs/by-name/_3/_3cpio/package.nix +++ b/pkgs/by-name/_3/_3cpio/package.nix @@ -9,16 +9,16 @@ rustPlatform.buildRustPackage rec { pname = "3cpio"; - version = "0.8.0"; + version = "0.10.2"; src = fetchFromGitHub { owner = "bdrung"; repo = "3cpio"; tag = version; - hash = "sha256-1kdJSwe9v7ojdukj04/G/RDeEk0NVCXmiNoVaelqt4Y="; + hash = "sha256-UtXyJ4PDzi4BJ0nd9w/hygcJVfNd3H5WAIV+f23dtpk="; }; - cargoHash = "sha256-axPghG1T5NZYzGRZBwtdBJ5tQh+h8/vep/EmL5ADCjE="; + cargoHash = "sha256-XGTa5Ui4yPHmuC4tTWGMTKN/erHSaiJVmxHglbt+udg="; # Tests attempt to access arbitrary filepaths doCheck = false; diff --git a/pkgs/by-name/ab/abiword/package.nix b/pkgs/by-name/ab/abiword/package.nix index 08a8ced24788..4dba895b52bf 100644 --- a/pkgs/by-name/ab/abiword/package.nix +++ b/pkgs/by-name/ab/abiword/package.nix @@ -25,14 +25,14 @@ stdenv.mkDerivation rec { pname = "abiword"; - version = "3.0.6"; + version = "3.0.7"; src = fetchFromGitLab { domain = "gitlab.gnome.org"; owner = "World"; repo = "AbiWord"; rev = "refs/tags/release-${version}"; - hash = "sha256-PPK4O+NKXdl7DKPOgGlVyCFTol8hhmtq0wdTTtwKQ/4="; + hash = "sha256-dYbJ726Zuxs7+VTTCWHYQLsVZ/86hRUBQRac6toO4UI="; }; nativeBuildInputs = [ diff --git a/pkgs/by-name/af/affine/package.nix b/pkgs/by-name/af/affine/package.nix index 1eb908495d04..c9ba11704880 100644 --- a/pkgs/by-name/af/affine/package.nix +++ b/pkgs/by-name/af/affine/package.nix @@ -37,12 +37,12 @@ in stdenv.mkDerivation (finalAttrs: { pname = binName; - version = "0.23.2"; + version = "0.24.0"; src = fetchFromGitHub { owner = "toeverything"; repo = "AFFiNE"; tag = "v${finalAttrs.version}"; - hash = "sha256-4WPnS+ZaiNgtib70ii/XfWkn2tNg2OsSAglD+mpnDvg="; + hash = "sha256-vI4lCucwNdrbmst78NUkHXtluZvrc7aHymzm1Zbls78="; }; cargoDeps = rustPlatform.fetchCargoVendor { @@ -92,7 +92,7 @@ stdenv.mkDerivation (finalAttrs: { ''; dontInstall = true; outputHashMode = "recursive"; - outputHash = "sha256-tpn+TlSrGIABmSM9B3iQc39nZmGEf5MliKyaKOsM7yM="; + outputHash = "sha256-wSEAxOSLS0ul5vQDTj/bVXH8ViqDFsq6jHTaXJFAm/U="; }; buildInputs = lib.optionals hostPlatform.isDarwin [ diff --git a/pkgs/by-name/af/afterburn/package.nix b/pkgs/by-name/af/afterburn/package.nix index b38536a702fa..7dcaf8c0b2a8 100644 --- a/pkgs/by-name/af/afterburn/package.nix +++ b/pkgs/by-name/af/afterburn/package.nix @@ -8,16 +8,16 @@ rustPlatform.buildRustPackage rec { pname = "afterburn"; - version = "5.8.2"; + version = "5.9.0"; src = fetchFromGitHub { owner = "coreos"; repo = "afterburn"; tag = "v${version}"; - sha256 = "sha256-hlcUtEc0uWFolCt+mZd7f68PJPa+i/mv+2aJh4Vhmsw="; + sha256 = "sha256-kMq3yoqIp2j5DRQFarEK9kss9DoVgAEkjUYJX5Ogu0g="; }; - cargoHash = "sha256-Wn4Np1rwHh2sL1sqKalJrIDgMffxJgD1C2QOAR8bDRo="; + cargoHash = "sha256-pWt2+SptdTiP4/oROw38qc6ekfbVWOf86BR18QC+ZPU="; nativeBuildInputs = [ pkg-config ]; buildInputs = [ openssl ]; diff --git a/pkgs/by-name/ap/app2unit/package.nix b/pkgs/by-name/ap/app2unit/package.nix index 860f1af9a2cf..0689a92a89e0 100644 --- a/pkgs/by-name/ap/app2unit/package.nix +++ b/pkgs/by-name/ap/app2unit/package.nix @@ -7,13 +7,13 @@ }: stdenvNoCC.mkDerivation rec { pname = "app2unit"; - version = "1.0.0"; + version = "1.0.3"; src = fetchFromGitHub { owner = "Vladimir-csp"; repo = "app2unit"; tag = "v${version}"; - sha256 = "sha256-xHqPCA9ycPcImmyMrJZEfnfrFZ3sKfP/mhJ86CHLTQ8="; + sha256 = "sha256-7eEVjgs+8k+/NLteSBKgn4gPaPLHC+3Uzlmz6XB0930="; }; nativeBuildInputs = [ scdoc ]; diff --git a/pkgs/by-name/ar/arkenfox-userjs/package.nix b/pkgs/by-name/ar/arkenfox-userjs/package.nix index 185f56af5b0b..cb9b12a48148 100644 --- a/pkgs/by-name/ar/arkenfox-userjs/package.nix +++ b/pkgs/by-name/ar/arkenfox-userjs/package.nix @@ -6,11 +6,11 @@ }: stdenvNoCC.mkDerivation (finalAttrs: { pname = "arkenfox-userjs"; - version = "133.0"; + version = "140.0"; src = fetchurl { url = "https://raw.githubusercontent.com/arkenfox/user.js/${finalAttrs.version}/user.js"; - hash = "sha256-rPcH24YqEBOzoPB9yxMlke/3tqpi9L7GVMsZ3MUP8WY="; + hash = "sha256-/cz0dnQXKa3c/DqUTAEwBV0I9Tc3x6uzU6rtYijg3Zo="; }; dontUnpack = true; diff --git a/pkgs/by-name/au/audiobookshelf/package.nix b/pkgs/by-name/au/audiobookshelf/package.nix index 40f8fc78c837..44dcf2e39fde 100644 --- a/pkgs/by-name/au/audiobookshelf/package.nix +++ b/pkgs/by-name/au/audiobookshelf/package.nix @@ -15,10 +15,10 @@ let source = { - version = "2.27.0"; - hash = "sha256-FKWK/yYMNBrGgfWtdUC9DpQ2y8mBn3/5G+buQNzzot4="; - npmDepsHash = "sha256-FpRO7lhgQNZ5wHQwHFIxkrYfmivgTopXKFcrQ48B20w="; - clientNpmDepsHash = "sha256-GHN49bo7m9pzvwNvkVtA0cwTv+rWSAKpBHG7jqXm/vo="; + version = "2.28.0"; + hash = "sha256-bbsiaSGIaD5oFnhk3e+SWzYxv4dsRXrgMVbe1lsj4pw="; + npmDepsHash = "sha256-JC2uOXV+EwS6CGwyOUTXcymFwLSz/KUqIoB4ccSGgbw="; + clientNpmDepsHash = "sha256-6l8apOd3R259+SlcD6P6rx1FkRnB80keoBGcfbQNhGU="; }; src = fetchFromGitHub { diff --git a/pkgs/by-name/au/audiobookshelf/update.sh b/pkgs/by-name/au/audiobookshelf/update.sh index f881fed2932c..5495f310b7b8 100755 --- a/pkgs/by-name/au/audiobookshelf/update.sh +++ b/pkgs/by-name/au/audiobookshelf/update.sh @@ -1,5 +1,5 @@ #!/usr/bin/env nix-shell -#!nix-shell -i bash -p curl gnused gawk nix-prefetch common-updater-scripts jq prefetch-npm-deps +#!nix-shell -i bash -p curl gnused gawk nix-prefetch nix-prefetch-git common-updater-scripts jq prefetch-npm-deps set -euo pipefail diff --git a/pkgs/by-name/bo/bootc/package.nix b/pkgs/by-name/bo/bootc/package.nix index 29a547412368..347a4d1d5df6 100644 --- a/pkgs/by-name/bo/bootc/package.nix +++ b/pkgs/by-name/bo/bootc/package.nix @@ -13,16 +13,16 @@ rustPlatform.buildRustPackage rec { pname = "bootc"; - version = "1.5.1"; + version = "1.6.0"; - cargoHash = "sha256-+FxydTK0Dmcj+doHMSoTgiues7Rrwxv/D+BOq4siKCk="; + cargoHash = "sha256-KGwXQ6+/w3uHuPqSADsqJSip+SMdC104dfW7tNxGwnc="; doInstallCheck = true; src = fetchFromGitHub { owner = "bootc-dev"; repo = "bootc"; rev = "v${version}"; - hash = "sha256-LmhgCiVFbhrePV/A/FaNjD7VytUZqSm9VDU+1z0O98U="; + hash = "sha256-TztsiC+DwD9yEAmjTuiuOi+Kf8WEYMsOVVnMKpSM3/g="; }; nativeBuildInputs = [ pkg-config ]; diff --git a/pkgs/by-name/ca/calibre/package.nix b/pkgs/by-name/ca/calibre/package.nix index 26d7b529d766..4a38e656b0ef 100644 --- a/pkgs/by-name/ca/calibre/package.nix +++ b/pkgs/by-name/ca/calibre/package.nix @@ -36,11 +36,11 @@ stdenv.mkDerivation (finalAttrs: { pname = "calibre"; - version = "8.6.0"; + version = "8.7.0"; src = fetchurl { url = "https://download.calibre-ebook.com/${finalAttrs.version}/calibre-${finalAttrs.version}.tar.xz"; - hash = "sha256-FYWeUS78jvFV9nj/9RSRxPFYKYxSF04dIXZINSbn7WA="; + hash = "sha256-LP5Yfjdz2GB/6LvvvNd7XPuBYSTKyJ5JE1PeuPL6kyQ="; }; patches = [ diff --git a/pkgs/by-name/ca/cargo-semver-checks/package.nix b/pkgs/by-name/ca/cargo-semver-checks/package.nix index e4d53bfac75c..e19b9afe50a6 100644 --- a/pkgs/by-name/ca/cargo-semver-checks/package.nix +++ b/pkgs/by-name/ca/cargo-semver-checks/package.nix @@ -34,6 +34,10 @@ rustPlatform.buildRustPackage rec { # requires internet access "--skip=detects_target_dependencies" "--skip=query::tests_lints::feature_missing" + # platform specific snapshots + "--skip=query::tests_lints::trait_method_target_feature_removed" + "--skip=query::tests_lints::unsafe_trait_method_requires_more_target_features" + "--skip=query::tests_lints::unsafe_trait_method_target_feature_added" ]; preCheck = '' diff --git a/pkgs/by-name/cd/cdogs-sdl/package.nix b/pkgs/by-name/cd/cdogs-sdl/package.nix index 0fe49ca587a6..df833a46a863 100644 --- a/pkgs/by-name/cd/cdogs-sdl/package.nix +++ b/pkgs/by-name/cd/cdogs-sdl/package.nix @@ -14,13 +14,13 @@ stdenv.mkDerivation rec { pname = "cdogs-sdl"; - version = "2.3.0"; + version = "2.3.1"; src = fetchFromGitHub { repo = "cdogs-sdl"; owner = "cxong"; rev = version; - sha256 = "sha256-I4v13CPdA2KYwhlIJjz+qgKe2EoXUtV6iWeadrg4Usc="; + sha256 = "sha256-jdrmtI/FADZ0vJDtX4Kq0A9RJ1ELjsQZjO2nMDf/fT8="; }; postPatch = '' diff --git a/pkgs/by-name/ch/chirpstack-concentratord/package.nix b/pkgs/by-name/ch/chirpstack-concentratord/package.nix index 23682df03d70..bcb62f4f0436 100644 --- a/pkgs/by-name/ch/chirpstack-concentratord/package.nix +++ b/pkgs/by-name/ch/chirpstack-concentratord/package.nix @@ -10,16 +10,16 @@ }: rustPlatform.buildRustPackage rec { pname = "chirpstack-concentratord"; - version = "4.5.0"; + version = "4.5.1"; src = fetchFromGitHub { owner = "chirpstack"; repo = "chirpstack-concentratord"; rev = "v${version}"; - hash = "sha256-UlliScDD1OEH4hLzKVr0z74iI48TTQTDfSsTwHzk8kw="; + hash = "sha256-sqAroYaiDbVbl0Yqdc+Yl1rhYLjUv/Go+//nX4t7S0U="; }; - cargoHash = "sha256-NkP3sMSw/iEkzqdX7rR6qMRq7MyZNyF9HcjrVuVRBEk="; + cargoHash = "sha256-cg/icdN0ntbVdnEs6I0AJWVYkawsyV1gPYjDMhzzDBY="; buildInputs = [ libloragw-2g4 diff --git a/pkgs/by-name/cl/clapgrep/package.nix b/pkgs/by-name/cl/clapgrep/package.nix index e9875dd4b9ed..e97bef974edd 100644 --- a/pkgs/by-name/cl/clapgrep/package.nix +++ b/pkgs/by-name/cl/clapgrep/package.nix @@ -24,18 +24,18 @@ stdenv.mkDerivation (finalAttrs: { pname = "clapgrep"; - version = "25.05+1"; + version = "25.07"; src = fetchFromGitHub { owner = "luleyleo"; repo = "clapgrep"; tag = "v${finalAttrs.version}"; - hash = "sha256-DL3voYSsNGjPb1CnPuJGg+7UgWYZO7cH5T2Z37BuDSE="; + hash = "sha256-XH0ei0x4QeCaVLDpRrHFgI6ExR5CSX7Pzg1PCrTyBec="; }; cargoDeps = rustPlatform.fetchCargoVendor { inherit (finalAttrs) src; - hash = "sha256-hTejIaXIAi8opZdE2X3vEi+VYoSti8RNB41ikVOWGPk="; + hash = "sha256-tKC3YgLECV3EMMzBLBPj0GntHk2oavXGpTwWG9EjH1U="; }; nativeBuildInputs = [ diff --git a/pkgs/by-name/cl/claude-code/package-lock.json b/pkgs/by-name/cl/claude-code/package-lock.json index 8ee2e3234e67..42f51ee7611e 100644 --- a/pkgs/by-name/cl/claude-code/package-lock.json +++ b/pkgs/by-name/cl/claude-code/package-lock.json @@ -6,13 +6,13 @@ "packages": { "": { "dependencies": { - "@anthropic-ai/claude-code": "^1.0.74" + "@anthropic-ai/claude-code": "^1.0.80" } }, "node_modules/@anthropic-ai/claude-code": { - "version": "1.0.74", - "resolved": "https://registry.npmjs.org/@anthropic-ai/claude-code/-/claude-code-1.0.74.tgz", - "integrity": "sha512-Iahs887b3Zdk6xWkb+qDgz178nOWqfse35Ten2l+oOQqeS1A7Ct14BPZuQmLiWtkoSZxqFAsee3Gp+ITfPicrw==", + "version": "1.0.80", + "resolved": "https://registry.npmjs.org/@anthropic-ai/claude-code/-/claude-code-1.0.80.tgz", + "integrity": "sha512-OpJb8LZBYuQ21lmT71c65NwUKGtQiva8dyKmCIPWnRIXHDaZ/31zzpDqcxgONUKUiZrnHqoMXwEwWyPyhD0+dA==", "license": "SEE LICENSE IN README.md", "bin": { "claude": "cli.js" diff --git a/pkgs/by-name/cl/claude-code/package.nix b/pkgs/by-name/cl/claude-code/package.nix index b78a3659b38d..3a809b328a25 100644 --- a/pkgs/by-name/cl/claude-code/package.nix +++ b/pkgs/by-name/cl/claude-code/package.nix @@ -7,16 +7,16 @@ buildNpmPackage rec { pname = "claude-code"; - version = "1.0.74"; + version = "1.0.80"; nodejs = nodejs_20; # required for sandboxed Nix builds on Darwin src = fetchzip { url = "https://registry.npmjs.org/@anthropic-ai/claude-code/-/claude-code-${version}.tgz"; - hash = "sha256-cjiW39n74BV+s1ZKf/kgZVAg02XGWsoVfdzwPxuwe3g="; + hash = "sha256-o7fG0LnTR7fGxq4VP5393tcQZi0JtPOF8Gb2cUAsevA="; }; - npmDepsHash = "sha256-z+ZU8rT0rKcWxG4fZut7rA2rChVdyOyCw62+CNNObZU="; + npmDepsHash = "sha256-9eVpQfcdiLyL6LWcBuVrd6XHQC5caZS9m8sNy9kaRyQ="; postPatch = '' cp ${./package-lock.json} package-lock.json diff --git a/pkgs/by-name/cl/clusternet/package.nix b/pkgs/by-name/cl/clusternet/package.nix index 042177ed5366..6175595a2abc 100644 --- a/pkgs/by-name/cl/clusternet/package.nix +++ b/pkgs/by-name/cl/clusternet/package.nix @@ -1,31 +1,38 @@ { lib, fetchFromGitHub, - buildGo123Module, + buildGoModule, }: -buildGo123Module rec { +buildGoModule (finalAttrs: { pname = "clusternet"; - version = "0.17.3"; + version = "0.18.1"; src = fetchFromGitHub { owner = "clusternet"; repo = "clusternet"; - tag = "v${version}"; - hash = "sha256-uhRnJyUR7lbJvVxd3YNVxmTSTDksQsVcM5G8ZKO7Xbk="; + tag = "v${finalAttrs.version}"; + hash = "sha256-MtiQM2msHv2gLaVpYoSrzJMZWwA0vMBIklwAQi+lG4g="; }; - vendorHash = "sha256-hY4bgQXwKjL4UT3omDYuxy9xN9XOr00mMvGssKOSsG4="; + vendorHash = "sha256-vG+k9ttXp/QqhbVKgwn2uo5kEk8OD+LBvJi5lBQfUk4="; ldFlags = [ "-s" "-w" ]; + # Clusternet hub is disabled due to panic: inlined function github.com/clusternet/clusternet/pkg/hub/apiserver/shadow.(*crdHandler).addStorage.func9.1 missing func info + subPackages = [ + "cmd/clusternet-agent" + "cmd/clusternet-controller-manager" + "cmd/clusternet-scheduler" + ]; + meta = { description = "CNCF Sandbox Project for managing your Kubernetes clusters"; homepage = "https://github.com/clusternet/clusternet"; license = lib.licenses.asl20; maintainers = with lib.maintainers; [ genga898 ]; }; -} +}) diff --git a/pkgs/by-name/co/codeql/package.nix b/pkgs/by-name/co/codeql/package.nix index 323c4e9545cf..2aa198e42e5d 100644 --- a/pkgs/by-name/co/codeql/package.nix +++ b/pkgs/by-name/co/codeql/package.nix @@ -11,7 +11,7 @@ stdenv.mkDerivation rec { pname = "codeql"; - version = "2.22.2"; + version = "2.22.3"; dontConfigure = true; dontBuild = true; @@ -19,7 +19,7 @@ stdenv.mkDerivation rec { src = fetchzip { url = "https://github.com/github/codeql-cli-binaries/releases/download/v${version}/codeql.zip"; - hash = "sha256-4GbvOtRm9YG0lqKnFv859UEsGb6cCkzjfx7Xazs5two="; + hash = "sha256-75ayL/TftTM1nfwIFsVOhfqFi//ts6o8GeK/mYez04k="; }; nativeBuildInputs = [ diff --git a/pkgs/by-name/co/conmon-rs/package.nix b/pkgs/by-name/co/conmon-rs/package.nix index a2afd871e51b..37cbadffbb68 100644 --- a/pkgs/by-name/co/conmon-rs/package.nix +++ b/pkgs/by-name/co/conmon-rs/package.nix @@ -8,13 +8,13 @@ rustPlatform.buildRustPackage rec { pname = "conmon-rs"; - version = "0.7.1"; + version = "0.7.2"; src = fetchFromGitHub { owner = "containers"; repo = "conmon-rs"; rev = "v${version}"; - hash = "sha256-NydA6IiIGX2Pc/49bstEGeA/X+zRIVNGbxhDfPwrWgM="; + hash = "sha256-FZwX9xihg2mKpHT11FCASyoJ5nDUkAa4Cqk5zRQOfeY="; }; nativeBuildInputs = [ @@ -23,7 +23,7 @@ rustPlatform.buildRustPackage rec { ]; doCheck = false; - cargoHash = "sha256-qP4AIPST1s6fiGq6FM2aXpEfkm4G/cOSYJyhtqF2k1E="; + cargoHash = "sha256-JVUckmOAJj4zNBe4yq/JzrPw+IqfhiZRB6s03ZxXFV4="; meta = with lib; { description = "OCI container runtime monitor written in Rust"; diff --git a/pkgs/by-name/co/corsix-th/package.nix b/pkgs/by-name/co/corsix-th/package.nix index 394d52233c85..caba7a48c1e6 100644 --- a/pkgs/by-name/co/corsix-th/package.nix +++ b/pkgs/by-name/co/corsix-th/package.nix @@ -18,13 +18,13 @@ stdenv.mkDerivation (finalAttrs: { pname = "corsix-th"; - version = "0.69.0"; + version = "0.69.1"; src = fetchFromGitHub { owner = "CorsixTH"; repo = "CorsixTH"; rev = "v${finalAttrs.version}"; - hash = "sha256-U8rl24EBjSRJrK2VmCI3YKeEM7U8ynaufEghgVfqrp0="; + hash = "sha256-Jrf3PhgnJUBGy+ZcSPjU5tQFyuTmnn5+8P6LujsoSAg="; }; patches = [ diff --git a/pkgs/by-name/co/cosmic-protocols/package.nix b/pkgs/by-name/co/cosmic-protocols/package.nix index 1c0bd6a5bfab..827aecfed218 100644 --- a/pkgs/by-name/co/cosmic-protocols/package.nix +++ b/pkgs/by-name/co/cosmic-protocols/package.nix @@ -9,13 +9,13 @@ stdenv.mkDerivation { pname = "cosmic-protocols"; - version = "0-unstable-2025-08-04"; + version = "0-unstable-2025-08-12"; src = fetchFromGitHub { owner = "pop-os"; repo = "cosmic-protocols"; - rev = "5035f8c810bf734401e21e0a9625c7b7e0c73325"; - hash = "sha256-FYfSVg7v7S8G1gHZ5puAqb2yZES81HK+KMu0819cQ8w="; + rev = "8e84152fedf350d2756a2c1c90e07313acb9cdf6"; + hash = "sha256-rFoSSc2wBNiW8wK3AIKxyv28FNTEiGk6UWjp5dQVxe8="; }; makeFlags = [ "PREFIX=${placeholder "out"}" ]; diff --git a/pkgs/by-name/co/cozette/package.nix b/pkgs/by-name/co/cozette/package.nix index f3c7b14c2545..63c193453a8a 100644 --- a/pkgs/by-name/co/cozette/package.nix +++ b/pkgs/by-name/co/cozette/package.nix @@ -12,13 +12,13 @@ let in stdenvNoCC.mkDerivation rec { pname = "cozette"; - version = "1.29.0"; + version = "1.30.0"; src = fetchzip { url = "https://github.com/slavfox/Cozette/releases/download/v.${version}/CozetteFonts-v-${ builtins.replaceStrings [ "." ] [ "-" ] version }.zip"; - hash = "sha256-DHUnCzp6c3d57cfkO2kH+czXRiqRWn6DBTo9NVTghQ0="; + hash = "sha256-Njh6V5wTBKM/1QKmPwG1qiOYyAJSVQXLTBLN03V6DaE="; }; nativeBuildInputs = [ bdf2psf ]; diff --git a/pkgs/by-name/dm/dmenu/package.nix b/pkgs/by-name/dm/dmenu/package.nix index 35820ea4dafa..33372ba1a093 100644 --- a/pkgs/by-name/dm/dmenu/package.nix +++ b/pkgs/by-name/dm/dmenu/package.nix @@ -18,11 +18,11 @@ stdenv.mkDerivation (finalAttrs: { pname = "dmenu"; - version = "5.3"; + version = "5.4"; src = fetchzip { url = "https://dl.suckless.org/tools/dmenu-${finalAttrs.version}.tar.gz"; - hash = "sha256-3lRLa3NIg+7bUSDnef/rVL3XwvWWHTIPQ8mcVaq/SVI="; + hash = "sha256-6bFq3Pj3cuZqLR0pkoJyfx3CDWmmSqkDoEVptMfej7g="; }; buildInputs = [ diff --git a/pkgs/by-name/do/doomretro/package.nix b/pkgs/by-name/do/doomretro/package.nix index ddc9ac5eb785..c9083cd30ce0 100644 --- a/pkgs/by-name/do/doomretro/package.nix +++ b/pkgs/by-name/do/doomretro/package.nix @@ -11,13 +11,13 @@ stdenv.mkDerivation (finalAttrs: { pname = "doomretro"; - version = "5.7.1"; + version = "5.7.2"; src = fetchFromGitHub { owner = "bradharding"; repo = "doomretro"; rev = "v${finalAttrs.version}"; - hash = "sha256-yBc7TLY0wAPMXeUo0u6EcidoJpdkw5XijyWDB6FsTgg="; + hash = "sha256-ShzZMmUwPB8IHhaA/7U4CEE7qcEjxfQDXVZkAVuEgtw="; }; nativeBuildInputs = [ diff --git a/pkgs/by-name/do/doublecmd/package.nix b/pkgs/by-name/do/doublecmd/package.nix index 5b0cb1a690fd..5d16685fafe1 100644 --- a/pkgs/by-name/do/doublecmd/package.nix +++ b/pkgs/by-name/do/doublecmd/package.nix @@ -14,13 +14,13 @@ stdenv.mkDerivation (finalAttrs: { pname = "doublecmd"; - version = "1.1.26"; + version = "1.1.27"; src = fetchFromGitHub { owner = "doublecmd"; repo = "doublecmd"; tag = "v${finalAttrs.version}"; - hash = "sha256-1rUAyI+Qe4I6F1T9KxMxHxedcARav6CE8W5qvWLu8Y0="; + hash = "sha256-YHaxynBIxoirFDKvGEECKIAJezuex3DBoU8snEdbhhg="; }; nativeBuildInputs = [ diff --git a/pkgs/by-name/dp/dpdk/package.nix b/pkgs/by-name/dp/dpdk/package.nix index dcc70b1815ae..502a87814de9 100644 --- a/pkgs/by-name/dp/dpdk/package.nix +++ b/pkgs/by-name/dp/dpdk/package.nix @@ -33,11 +33,11 @@ stdenv.mkDerivation rec { pname = "dpdk"; - version = "25.03"; + version = "25.07"; src = fetchurl { url = "https://fast.dpdk.org/rel/dpdk-${version}.tar.xz"; - sha256 = "sha256-akCnMTKChuvXloWxj/pZkua3cME4Q9Zf0NEVfPzP9j0="; + sha256 = "sha256-aIbL7cNQu4y+80fRA2fWJZ42Q1Yn+7J9V4rb3A07QQ0="; }; nativeBuildInputs = [ diff --git a/pkgs/by-name/dr/dracula-theme/package.nix b/pkgs/by-name/dr/dracula-theme/package.nix index 353c3ca0fd78..5f5f5dadfbf8 100644 --- a/pkgs/by-name/dr/dracula-theme/package.nix +++ b/pkgs/by-name/dr/dracula-theme/package.nix @@ -8,7 +8,7 @@ let themeName = "Dracula"; - version = "4.0.0-unstable-2025-07-17"; + version = "4.0.0-unstable-2025-08-04"; in stdenvNoCC.mkDerivation { pname = "dracula-theme"; @@ -17,8 +17,8 @@ stdenvNoCC.mkDerivation { src = fetchFromGitHub { owner = "dracula"; repo = "gtk"; - rev = "96948976d1d9013a4cba30c3879e7cc09e51d77c"; - hash = "sha256-MrlyZpZH6CajGuzQMD3HQX/58LRrVHNnbumDofa6GNs="; + rev = "646918e419c98747f4e6f8305c0ecaf6bbc860c6"; + hash = "sha256-8p9IS5aMZGP/VCuFTjQU+D3wfFIwfT/lcY7ujUv3SRc="; }; propagatedUserEnvPkgs = [ diff --git a/pkgs/by-name/ed/edl/package.nix b/pkgs/by-name/ed/edl/package.nix index b3c532d4564a..942f23467886 100644 --- a/pkgs/by-name/ed/edl/package.nix +++ b/pkgs/by-name/ed/edl/package.nix @@ -8,15 +8,15 @@ python3Packages.buildPythonPackage { pname = "edl"; - version = "3.52.1-unstable-2025-07-28"; + version = "3.52.1-unstable-2025-07-31"; format = "setuptools"; src = fetchFromGitHub { owner = "bkerler"; repo = "edl"; - rev = "a474b79f6456123e4ff30ce0c5f0d362c2c283ba"; + rev = "502db9c439b0d748ca38b86e02765290cae9873e"; fetchSubmodules = true; - hash = "sha256-wTd+P0xLTffKAwepUmT2nSQ9R34OkB7ENgbwpysAlRE="; + hash = "sha256-C4/cYGopg+d/gAT3k79Xu5tmkBiUO2Za0pE921wV+k4="; }; propagatedBuildInputs = with python3Packages; [ diff --git a/pkgs/by-name/et/etesync-dav/package.nix b/pkgs/by-name/et/etesync-dav/package.nix index 1044c47c1725..c9cb508296cc 100644 --- a/pkgs/by-name/et/etesync-dav/package.nix +++ b/pkgs/by-name/et/etesync-dav/package.nix @@ -8,14 +8,14 @@ }: python3Packages.buildPythonApplication rec { pname = "etesync-dav"; - version = "0.35.0"; + version = "0.35.1"; pyproject = true; src = fetchFromGitHub { owner = "etesync"; repo = "etesync-dav"; tag = "v${version}"; - hash = "sha256-CD02nuA9GD/oe7mjExUHIftkPxM1pZQKyDalXSoOhXY="; + hash = "sha256-y4BhU2kSn+RWqc5+pJQFhbwfat9cMWD0ED0EXJp25cY="; }; build-system = with python3Packages; [ setuptools ]; diff --git a/pkgs/by-name/fl/fly/package.nix b/pkgs/by-name/fl/fly/package.nix index fcafd2cc12a1..fe22077812fa 100644 --- a/pkgs/by-name/fl/fly/package.nix +++ b/pkgs/by-name/fl/fly/package.nix @@ -8,16 +8,16 @@ buildGoModule rec { pname = "fly"; - version = "7.13.2"; + version = "7.14.0"; src = fetchFromGitHub { owner = "concourse"; repo = "concourse"; rev = "v${version}"; - hash = "sha256-onowKvN8YLDWRRn3rGEMoMxc6XaAcBKJcFOHSVh9Yy8="; + hash = "sha256-7CXxaqfwFfxq6v0IKxkK08WkICBTLGf7ME1WuZzrG8w="; }; - vendorHash = "sha256-WC4uzTgvW15IumwmsWXXeiF5qagbeb5XWRaSjd1XLvA="; + vendorHash = "sha256-2busKAFaQYE82XKCAx8BGOMjjs8WzqIxdpz+J45maoc="; subPackages = [ "fly" ]; diff --git a/pkgs/by-name/fo/forgejo-runner/package.nix b/pkgs/by-name/fo/forgejo-runner/package.nix index 98079d59d0f6..f3112688e9d7 100644 --- a/pkgs/by-name/fo/forgejo-runner/package.nix +++ b/pkgs/by-name/fo/forgejo-runner/package.nix @@ -41,17 +41,17 @@ let in buildGoModule rec { pname = "forgejo-runner"; - version = "9.0.2"; + version = "9.0.3"; src = fetchFromGitea { domain = "code.forgejo.org"; owner = "forgejo"; repo = "runner"; rev = "v${version}"; - hash = "sha256-UjYi7+UAKvdz5FuElYGLfTYQD/E0vS1TJkUyPfUq7YA="; + hash = "sha256-Zanx6Hg05+mvxdga8zQoCv13/kdAMnyCBMfuihvQv3M="; }; - vendorHash = "sha256-7R42Aa04wCba90xLTX2p6oNX58OpfDDKegqwDw3Ycbk="; + vendorHash = "sha256-PvqG4ogIiFeDN7gwM+cECXFjo9FBkdzglf+nuLqAZhE="; # See upstream Makefile # https://code.forgejo.org/forgejo/runner/src/branch/main/Makefile diff --git a/pkgs/by-name/fo/fosrl-newt/package.nix b/pkgs/by-name/fo/fosrl-newt/package.nix index d821bf01ba71..f5d6ead99a37 100644 --- a/pkgs/by-name/fo/fosrl-newt/package.nix +++ b/pkgs/by-name/fo/fosrl-newt/package.nix @@ -7,16 +7,16 @@ buildGoModule rec { pname = "newt"; - version = "1.4.0"; + version = "1.4.1"; src = fetchFromGitHub { owner = "fosrl"; repo = "newt"; tag = version; - hash = "sha256-t1MqcrbYa5vojMOyn+iyExsUDQ1FQYlmZBFqyOkotyw="; + hash = "sha256-rRieo1olWwTSx5p7HpDE0eMY4d2/GcU0o0wIFyXetzI="; }; - vendorHash = "sha256-V8sq7XD/HJFKjhggrDWPdEEq3hjz0IHzpybQXA8Z/pg="; + vendorHash = "sha256-PENsCO2yFxLVZNPgx2OP+gWVNfjJAfXkwWS7tzlm490="; postPatch = '' substituteInPlace main.go \ diff --git a/pkgs/by-name/fo/fosrl-olm/package.nix b/pkgs/by-name/fo/fosrl-olm/package.nix index 97098e52826c..f398d2395cc9 100644 --- a/pkgs/by-name/fo/fosrl-olm/package.nix +++ b/pkgs/by-name/fo/fosrl-olm/package.nix @@ -6,16 +6,16 @@ buildGoModule rec { pname = "olm"; - version = "1.0.0"; + version = "1.1.0"; src = fetchFromGitHub { owner = "fosrl"; repo = "olm"; tag = version; - hash = "sha256-a0gkEo5EuJpHpZ5fKAPBXSTRvZaQo6KOJu4Abi1EztU="; + hash = "sha256-/sDWsWOMgDcBYerBbxKWMfWlOUaeQeKQ+OIcE7LJg00="; }; - vendorHash = "sha256-Ms8tLFKIa8GqmyFI7o+sQEpsZghNPIpq8BRCoY89Org="; + vendorHash = "sha256-DqZU64jwg2AHmze1oWOmDgltB+k1mLSHQyAxnovLaVo="; ldflags = [ "-s" diff --git a/pkgs/by-name/ga/galene/package.nix b/pkgs/by-name/ga/galene/package.nix index 4462e0b61321..c4fcffc2c263 100644 --- a/pkgs/by-name/ga/galene/package.nix +++ b/pkgs/by-name/ga/galene/package.nix @@ -8,16 +8,16 @@ buildGoModule (finalAttrs: { pname = "galene"; - version = "0.96.3"; + version = "1.0"; src = fetchFromGitHub { owner = "jech"; repo = "galene"; tag = "galene-${finalAttrs.version}"; - hash = "sha256-loAiPfwTyPi4BKn4TNgVVde2mO119h443A+HwlLvi4g="; + hash = "sha256-+ERoH2DsEMJNs3eGTBr4I+2+EdEKBfWnVRFKZ8igA6g="; }; - vendorHash = "sha256-LDLKjD4qYn/Aae6GUX6gZ57+MUfKc058H+YHM0bNZV0="; + vendorHash = "sha256-r9W/2Uead/EHKWnnJLL9bdA/MazLbe1UsgVXkPNFnxM="; ldflags = [ "-s" diff --git a/pkgs/by-name/gh/ghost-cli/package.nix b/pkgs/by-name/gh/ghost-cli/package.nix index e2b673498be9..8bb91e624f9a 100644 --- a/pkgs/by-name/gh/ghost-cli/package.nix +++ b/pkgs/by-name/gh/ghost-cli/package.nix @@ -11,18 +11,18 @@ stdenv.mkDerivation (finalAttrs: { pname = "ghost-cli"; - version = "1.28.1"; + version = "1.28.3"; src = fetchFromGitHub { owner = "TryGhost"; repo = "Ghost-CLI"; tag = "v${finalAttrs.version}"; - hash = "sha256-gpOaoR/UB8ermQCXlYgoVA3h+OdUGvP6ofjlFlMHA58="; + hash = "sha256-hmLEkYivIH3uNOz6umEYU+A843a7d1M31OE5RCQ9WRQ="; }; yarnOfflineCache = fetchYarnDeps { yarnLock = finalAttrs.src + "/yarn.lock"; - hash = "sha256-4GJ6I0Iynu+/lmiKat3p/MIivVjcyxxhpXKPSOheBls="; + hash = "sha256-ncZ5ULF1nE0vl+WISfEGZKtABT+pkJtWjHMkT1BjPCE="; }; nativeBuildInputs = [ diff --git a/pkgs/by-name/gi/git-town/package.nix b/pkgs/by-name/gi/git-town/package.nix index a3c44b5fc61d..81c4d0ed6d50 100644 --- a/pkgs/by-name/gi/git-town/package.nix +++ b/pkgs/by-name/gi/git-town/package.nix @@ -13,13 +13,13 @@ buildGoModule rec { pname = "git-town"; - version = "21.3.0"; + version = "21.4.1"; src = fetchFromGitHub { owner = "git-town"; repo = "git-town"; tag = "v${version}"; - hash = "sha256-G1xeMOKZ1EKCZXqC2fJEUa5PeWUGknv0zew7rjAXqkM="; + hash = "sha256-IBBnqwXx7q6QBk0Z5cHugXVeJHq85lCX7Y5U1tCXZmA="; }; vendorHash = null; diff --git a/pkgs/by-name/go/golangci-lint/package.nix b/pkgs/by-name/go/golangci-lint/package.nix index 483355957029..a877697568fb 100644 --- a/pkgs/by-name/go/golangci-lint/package.nix +++ b/pkgs/by-name/go/golangci-lint/package.nix @@ -9,16 +9,16 @@ buildGoModule (finalAttrs: { pname = "golangci-lint"; - version = "2.3.1"; + version = "2.4.0"; src = fetchFromGitHub { owner = "golangci"; repo = "golangci-lint"; tag = "v${finalAttrs.version}"; - hash = "sha256-TuMIDKs8g1oYT4nQoUjwW0wEMaGxN+3YyWsbWTGy+tE="; + hash = "sha256-JMFSYT9aiBdr/lOy+GYigbpMHETTQAomGZ7ehyr8U/M="; }; - vendorHash = "sha256-1jnunHTVtqeDoljOC6JVq1pOxtZ/njqIRyQHRzctxgI="; + vendorHash = "sha256-o01naYSkPpsXSvFlphGqJR14j3IBmTGBHpsu7DUE1Xg="; subPackages = [ "cmd/golangci-lint" ]; diff --git a/pkgs/by-name/go/gost/package.nix b/pkgs/by-name/go/gost/package.nix index d3d5cd33fed8..19c9260bdc57 100644 --- a/pkgs/by-name/go/gost/package.nix +++ b/pkgs/by-name/go/gost/package.nix @@ -9,16 +9,16 @@ buildGoModule (finalAttrs: { pname = "gost"; - version = "3.2.0"; + version = "3.2.3"; src = fetchFromGitHub { owner = "go-gost"; repo = "gost"; tag = "v${finalAttrs.version}"; - hash = "sha256-pdDCBknAXHIFD7vNkinsoq7Uec6g3VJsNNoE1lvKkW4="; + hash = "sha256-B2ffIGS0tURZI7uVALih7YM9thBWAjihdIdSHhQFnE8="; }; - vendorHash = "sha256-6oRw2tCiQFExWhF1l+vvbL1uoJNx+rzPz+LX2J5r4no="; + vendorHash = "sha256-WvCNvmH/KpFivKMBqBMgKi9VieOegGIrh463YC9WwAg="; # Based on ldflags in upstream's .goreleaser.yaml ldflags = [ diff --git a/pkgs/by-name/gr/gruvbox-plus-icons/package.nix b/pkgs/by-name/gr/gruvbox-plus-icons/package.nix index a0e610a6d52c..b0b8591bca1b 100644 --- a/pkgs/by-name/gr/gruvbox-plus-icons/package.nix +++ b/pkgs/by-name/gr/gruvbox-plus-icons/package.nix @@ -12,13 +12,13 @@ stdenvNoCC.mkDerivation (finalAttrs: { pname = "gruvbox-plus-icons"; - version = "6.2.0"; + version = "6.3.0"; src = fetchFromGitHub { owner = "SylEleuth"; repo = "gruvbox-plus-icon-pack"; tag = "v${finalAttrs.version}"; - hash = "sha256-MCof2CFQfh/ChFNlsxw9BmrFf1A804HzWoHJdNsrW74="; + hash = "sha256-4UJOiDdw5BxtOjLQjCpkQnUwQRs49GZTShpcElWjAU8="; }; patches = [ ./folder-color.patch ]; diff --git a/pkgs/by-name/gu/gui-for-clash/package.nix b/pkgs/by-name/gu/gui-for-clash/package.nix index a62b2a436281..ffa7591ef6d5 100644 --- a/pkgs/by-name/gu/gui-for-clash/package.nix +++ b/pkgs/by-name/gu/gui-for-clash/package.nix @@ -1,29 +1,28 @@ { lib, stdenv, - nodejs, - pnpm_9, - fetchFromGitHub, buildGoModule, - wails, - webkitgtk_4_0, - pkg-config, - libsoup_3, + fetchFromGitHub, autoPatchelfHook, - makeDesktopItem, copyDesktopItems, + nodejs, + pkg-config, + pnpm_10, + wails, + webkitgtk_4_1, + makeDesktopItem, nix-update-script, }: let pname = "gui-for-clash"; - version = "1.9.7"; + version = "1.9.8"; src = fetchFromGitHub { owner = "GUI-for-Cores"; repo = "GUI.for.Clash"; tag = "v${version}"; - hash = "sha256-Ij9zyBzYpAfDEjJXqOiPxun+5e1T5j3juYudpvraBcQ="; + hash = "sha256-YwolOIN4pQ9ykXruKAetUDMFkNnQppkzioDNlrPefL8="; }; metaCommon = { @@ -35,20 +34,24 @@ let frontend = stdenv.mkDerivation (finalAttrs: { inherit pname version src; + sourceRoot = "${finalAttrs.src.name}/frontend"; + nativeBuildInputs = [ nodejs - pnpm_9.configHook + pnpm_10.configHook ]; - pnpmDeps = pnpm_9.fetchDeps { - inherit (finalAttrs) pname version src; - sourceRoot = "${finalAttrs.src.name}/frontend"; - fetcherVersion = 1; - hash = "sha256-5tz1FItH9AvZhJjka8i5Kz22yf/tEmRPkDhz6iswZzc="; + pnpmDeps = pnpm_10.fetchDeps { + inherit (finalAttrs) + pname + version + src + sourceRoot + ; + fetcherVersion = 2; + hash = "sha256-iVD/9uTK3cUzKE20pJk67uk53UCtfj/YCpgwgxmmg8k="; }; - sourceRoot = "${finalAttrs.src.name}/frontend"; - buildPhase = '' runHook preBuild @@ -74,27 +77,24 @@ in buildGoModule { inherit pname version src; - patches = [ ./bridge.patch ]; + patches = [ ./xdg-path-and-restart-patch.patch ]; + # As we need the $out reference, we can't use `replaceVars` here. postPatch = '' - # As we need the $out reference, we can't use `replaceVars` here. substituteInPlace bridge/bridge.go \ - --replace-fail '@basepath@' "$out" + --subst-var out ''; - vendorHash = "sha256-Coq8GtaIS7ClmOTFw6PSgGDFW/CpGpKPvXgNw8qz3Hs="; + vendorHash = "sha256-7pFjfUFkpXyYEVjiXbfFUC7FQSlZubKJJ5MI8WY0IVA="; nativeBuildInputs = [ - wails - pkg-config autoPatchelfHook copyDesktopItems + pkg-config + wails ]; - buildInputs = [ - webkitgtk_4_0 - libsoup_3 - ]; + buildInputs = [ webkitgtk_4_1 ]; preBuild = '' cp -r ${frontend} frontend/dist @@ -103,7 +103,7 @@ buildGoModule { buildPhase = '' runHook preBuild - wails build -m -s -trimpath -skipbindings -devtools -tags webkit2_40 -o GUI.for.Clash + wails build -m -s -trimpath -skipbindings -devtools -tags webkit2_41 -o GUI.for.Clash runHook postBuild ''; @@ -124,7 +124,7 @@ buildGoModule { runHook preInstall install -Dm 0755 build/bin/GUI.for.Clash $out/bin/GUI.for.Clash - install -Dm 0644 build/appicon.png $out/share/pixmaps/gui-for-clash.png + install -Dm 0644 build/appicon.png $out/share/icons/hicolor/256x256/apps/gui-for-clash.png runHook postInstall ''; diff --git a/pkgs/by-name/gu/gui-for-clash/bridge.patch b/pkgs/by-name/gu/gui-for-clash/xdg-path-and-restart-patch.patch similarity index 77% rename from pkgs/by-name/gu/gui-for-clash/bridge.patch rename to pkgs/by-name/gu/gui-for-clash/xdg-path-and-restart-patch.patch index 47ca878a594f..bc37666aaf5c 100644 --- a/pkgs/by-name/gu/gui-for-clash/bridge.patch +++ b/pkgs/by-name/gu/gui-for-clash/xdg-path-and-restart-patch.patch @@ -1,5 +1,5 @@ ---- a/bridge/bridge.go 2024-12-25 20:53:45.504021585 +0000 -+++ b/bridge/bridge.go 2024-12-25 21:02:20.318422528 +0000 +--- a/bridge/bridge.go ++++ b/bridge/bridge.go @@ -41,13 +41,13 @@ } @@ -25,7 +25,7 @@ func (a *App) RestartApp() FlagResult { - exePath := Env.BasePath + "/" + Env.AppName -+ exePath := "@basepath@/bin" + "/" + Env.AppName ++ exePath := "@out@/bin" + "/" + Env.AppName cmd := exec.Command(exePath) - SetCmdWindowHidden(cmd) \ No newline at end of file + SetCmdWindowHidden(cmd) diff --git a/pkgs/by-name/ha/habitat/package.nix b/pkgs/by-name/ha/habitat/package.nix index afe502934062..d43f99862d36 100644 --- a/pkgs/by-name/ha/habitat/package.nix +++ b/pkgs/by-name/ha/habitat/package.nix @@ -13,16 +13,16 @@ rustPlatform.buildRustPackage rec { pname = "habitat"; - version = "1.6.1243"; + version = "1.6.1244"; src = fetchFromGitHub { owner = "habitat-sh"; repo = "habitat"; rev = version; - hash = "sha256-+5If4veDOGTTIhYxhAiq1cC4Sy6vAmjX5hrmUmpGlFU="; + hash = "sha256-BNrBhDNR8sIafC9mgfL+1Q8c6BbjpFgLBElusydY/2o="; }; - cargoHash = "sha256-AI7Ij9F/K/chjxQUC0SnBsQQPLlVS6esa5LJAGRS9YI="; + cargoHash = "sha256-U4m3KzlU7XambNdwsdFuI5QPv2Fkm7Dwe264SRdHLak="; nativeBuildInputs = [ pkg-config diff --git a/pkgs/by-name/ha/handheld-daemon/package.nix b/pkgs/by-name/ha/handheld-daemon/package.nix index ef1c8738dd2d..55571fd3c7fc 100644 --- a/pkgs/by-name/ha/handheld-daemon/package.nix +++ b/pkgs/by-name/ha/handheld-daemon/package.nix @@ -16,14 +16,14 @@ }: python3Packages.buildPythonApplication rec { pname = "handheld-daemon"; - version = "3.17.6"; + version = "3.18.2"; pyproject = true; src = fetchFromGitHub { owner = "hhd-dev"; repo = "hhd"; tag = "v${version}"; - hash = "sha256-JDTYqVzkdtMwMyMUyc+MABxzEKVsdRuQce9pMS2JnAE="; + hash = "sha256-tU5xDwqmeYFT+2byq2Qo/k29TncPfTQgYZF0JZUe/Iw="; }; # Handheld-daemon runs some selinux-related utils which are not in nixpkgs. diff --git a/pkgs/by-name/hc/hcxdumptool/package.nix b/pkgs/by-name/hc/hcxdumptool/package.nix index dda50597c05f..d304ce1f6005 100644 --- a/pkgs/by-name/hc/hcxdumptool/package.nix +++ b/pkgs/by-name/hc/hcxdumptool/package.nix @@ -8,13 +8,13 @@ stdenv.mkDerivation (finalAttrs: { pname = "hcxdumptool"; - version = "6.3.5"; + version = "7.0.0"; src = fetchFromGitHub { owner = "ZerBea"; repo = "hcxdumptool"; tag = finalAttrs.version; - hash = "sha256-PA4nbjg4ybWvZZ7wbsh+OR/wEEVm5qu5OfM9EO3HBYs="; + hash = "sha256-emSIUSE8r0PX1qhkuIQcyh9+rBB+jBA6pmt+n4WugWk="; }; buildInputs = [ diff --git a/pkgs/by-name/hc/hcxtools/package.nix b/pkgs/by-name/hc/hcxtools/package.nix index 76fda256617d..0511130b276a 100644 --- a/pkgs/by-name/hc/hcxtools/package.nix +++ b/pkgs/by-name/hc/hcxtools/package.nix @@ -10,13 +10,13 @@ stdenv.mkDerivation rec { pname = "hcxtools"; - version = "6.3.5"; + version = "7.0.0"; src = fetchFromGitHub { owner = "ZerBea"; repo = "hcxtools"; rev = version; - sha256 = "sha256-8VfGiIXl/F2wgCMuS3+lt9sT/re9YgoRKwzgSHCir04="; + sha256 = "sha256-gL1OnNtd6cqW0kM3w2wHc0UU3JvC6H2kQg1aBDaN11U="; }; nativeBuildInputs = [ pkg-config ]; diff --git a/pkgs/by-name/ho/hoppscotch/package.nix b/pkgs/by-name/ho/hoppscotch/package.nix index 3821da8433d9..a0f3b63889a4 100644 --- a/pkgs/by-name/ho/hoppscotch/package.nix +++ b/pkgs/by-name/ho/hoppscotch/package.nix @@ -8,22 +8,22 @@ let pname = "hoppscotch"; - version = "25.7.0-0"; + version = "25.7.1-0"; src = fetchurl { aarch64-darwin = { url = "https://github.com/hoppscotch/releases/releases/download/v${version}/Hoppscotch_mac_aarch64.dmg"; - hash = "sha256-oM/Gpl7Z8tlgPsujQc0RUlN8anWoiQfg+bSxg+oK2AE="; + hash = "sha256-Qr7xv3XyneA9RzvO7MqtblBF+oO4auYi5DX/F0n/I0c="; }; x86_64-darwin = { url = "https://github.com/hoppscotch/releases/releases/download/v${version}/Hoppscotch_mac_x64.dmg"; - hash = "sha256-yFzMMpJpBlMcV1NMqG2L8XOSyC2cT4+WMZwdphYPFF4="; + hash = "sha256-/5++4ifR2xcCmU7jg+qm4zsi8swSXTbU7Hdz80p+UCM="; }; x86_64-linux = { url = "https://github.com/hoppscotch/releases/releases/download/v${version}/Hoppscotch_linux_x64.AppImage"; - hash = "sha256-req782QlPw2ZDo5eqNAWVPoTPvBODTnAhvLYewd0b2E="; + hash = "sha256-EToScp/zKv4KAuVPJmhKmBtx3WeM+CH38jXinhnT0tE="; }; } .${stdenv.hostPlatform.system} or (throw "Unsupported system: ${stdenv.hostPlatform.system}"); diff --git a/pkgs/by-name/ic/icestorm/package.nix b/pkgs/by-name/ic/icestorm/package.nix index 2e443636247e..f0ebd58a71aa 100644 --- a/pkgs/by-name/ic/icestorm/package.nix +++ b/pkgs/by-name/ic/icestorm/package.nix @@ -1,6 +1,7 @@ { lib, stdenv, + callPackage, fetchFromGitHub, pkg-config, libftdi1, @@ -18,48 +19,50 @@ usePyPy ? stdenv.hostPlatform.system == "x86_64-linux", }: -stdenv.mkDerivation rec { +stdenv.mkDerivation (finalAttrs: { pname = "icestorm"; - version = "2020.12.04"; + version = "0-unstable-2025-06-03"; passthru = rec { pythonPkg = if (false && usePyPy) then pypy3 else python3; pythonInterp = pythonPkg.interpreter; + + tests.examples = callPackage ./tests.nix { + inherit (finalAttrs) pname src; + icestorm = finalAttrs.finalPackage; + }; }; src = fetchFromGitHub { owner = "YosysHQ"; repo = "icestorm"; - rev = "7afc64b480212c9ac2ce7cb1622731a69a7d212c"; - sha256 = "0vxhqs2fampglg3xlfwb35229iv96kvlwp1gyxrdrmlpznhkqdrk"; + rev = "f31c39cc2eadd0ab7f29f34becba1348ae9f8721"; + hash = "sha256-SLSxqgVsYMUxv8YjY1iRLnVFiIAhk/GKmZr4Ido0A3o="; }; nativeBuildInputs = [ pkg-config ]; buildInputs = [ - passthru.pythonPkg + finalAttrs.passthru.pythonPkg libftdi1 ]; - makeFlags = [ "PREFIX=$(out)" ]; + makeFlags = [ + "PREFIX=$(out)" + "PYTHON3=${finalAttrs.passthru.pythonInterp}" + ]; enableParallelBuilding = true; - # fix icebox_vlog chipdb path. icestorm issue: - # https://github.com/cliffordwolf/icestorm/issues/125 - # - # also, fix up the path to the chosen Python interpreter. for pypy-compatible + # fix up the path to the chosen Python interpreter. for pypy-compatible # platforms, it offers significant performance improvements. patchPhase = '' - substituteInPlace ./icebox/icebox_vlog.py \ - --replace /usr/local/share "$out/share" - - for x in icefuzz/Makefile icebox/Makefile icetime/Makefile; do - substituteInPlace "$x" --replace python3 "${passthru.pythonInterp}" - done - - for x in $(find . -type f -iname '*.py'); do + for x in $(find . -type f -iname '*.py' -executable); do substituteInPlace "$x" \ - --replace '/usr/bin/env python3' '${passthru.pythonInterp}' + --replace-fail '/usr/bin/env python3' '${finalAttrs.passthru.pythonInterp}' done + + # We use GNU sed on Darwin, while icebox/Makefile assumed BSD sed (which + # requires a (potentially empty) argument for the -i flag). + substituteInPlace icebox/Makefile --replace-fail "sed -i '''" "sed -i" ''; meta = { @@ -78,4 +81,4 @@ stdenv.mkDerivation rec { ]; platforms = lib.platforms.all; }; -} +}) diff --git a/pkgs/by-name/ic/icestorm/tests.nix b/pkgs/by-name/ic/icestorm/tests.nix new file mode 100644 index 000000000000..c7e89a87171e --- /dev/null +++ b/pkgs/by-name/ic/icestorm/tests.nix @@ -0,0 +1,29 @@ +# Run the examples from $src/examples/ as simple integration tests. They require +# yosys and nextpnr (which itself depends on this package), so they cannot be +# ran during the check phase. +{ + runCommand, + icestorm, + nextpnr, + yosys, + + pname, + src, +}: + +runCommand "${pname}-test-examples" + { + nativeBuildInputs = [ + icestorm + nextpnr + yosys + ]; + } + '' + cp -r ${src}/examples . + chmod -R +w examples + for example in examples/*; do + make -C $example + done + touch $out + '' diff --git a/pkgs/by-name/ja/jan/package.nix b/pkgs/by-name/ja/jan/package.nix index 59f65cd53053..0b42e3ef0163 100644 --- a/pkgs/by-name/ja/jan/package.nix +++ b/pkgs/by-name/ja/jan/package.nix @@ -6,10 +6,10 @@ let pname = "Jan"; - version = "0.6.5"; + version = "0.6.6"; src = fetchurl { url = "https://github.com/janhq/jan/releases/download/v${version}/Jan_${version}_amd64.AppImage"; - hash = "sha256-0JRaefi8mUGoy63BbPa2C8EE/7/TGSsP1VmmWh7Lsko="; + hash = "sha256-KTU7jSouFCv4ER6cOzNYQJxRpgGTV5AnLs4i0Ne4GYQ="; }; appimageContents = appimageTools.extractType2 { inherit pname version src; }; diff --git a/pkgs/by-name/jf/jfrog-cli/package.nix b/pkgs/by-name/jf/jfrog-cli/package.nix index 2f7cae6c6e36..981f09922aae 100644 --- a/pkgs/by-name/jf/jfrog-cli/package.nix +++ b/pkgs/by-name/jf/jfrog-cli/package.nix @@ -8,17 +8,17 @@ buildGoModule rec { pname = "jfrog-cli"; - version = "2.78.2"; + version = "2.78.3"; src = fetchFromGitHub { owner = "jfrog"; repo = "jfrog-cli"; tag = "v${version}"; - hash = "sha256-E6UjHtLJ8wgAM9CPtFLsBOKaIaF+exjegBBnP0aBcvA="; + hash = "sha256-sV8cj+H9l/Rm/INRmfMvTMYehYVmQhZHH7KxWGcEMXs="; }; proxyVendor = true; - vendorHash = "sha256-8Aaxwysbuzo2n2w4OPn7jooqrjEGwrZAlgec3j/pN2A="; + vendorHash = "sha256-SriBFQXKLYPDTqDmC4cXfV1fjwvUCUuujq5hb4w5Fgg="; checkFlags = "-skip=^TestReleaseBundle"; diff --git a/pkgs/by-name/ji/jicofo/package.nix b/pkgs/by-name/ji/jicofo/package.nix index 79f7b2df22ce..48aa5b031ac1 100644 --- a/pkgs/by-name/ji/jicofo/package.nix +++ b/pkgs/by-name/ji/jicofo/package.nix @@ -9,10 +9,10 @@ let pname = "jicofo"; - version = "1.0-1138"; + version = "1.0-1153"; src = fetchurl { url = "https://download.jitsi.org/stable/${pname}_${version}-1_all.deb"; - sha256 = "YLzWyeeWWgsqfGAKXPIKIkfIq3McFEjcZGYLhi2Otew="; + sha256 = "tBvaXyRqNg8VeIy3aI1HbrZNlelsYowLOVlsXyap+gA="; }; in stdenv.mkDerivation { diff --git a/pkgs/by-name/ji/jitsi-videobridge/package.nix b/pkgs/by-name/ji/jitsi-videobridge/package.nix index e3ad1ddf8d6f..fffdbd6b853e 100644 --- a/pkgs/by-name/ji/jitsi-videobridge/package.nix +++ b/pkgs/by-name/ji/jitsi-videobridge/package.nix @@ -11,10 +11,10 @@ let pname = "jitsi-videobridge2"; - version = "2.3-236-g95ef6210"; + version = "2.3-249-g9a2123ad4"; src = fetchurl { url = "https://download.jitsi.org/stable/${pname}_${version}-1_all.deb"; - sha256 = "GUihengE21ISqXozFwTsdiQurDi0ft/btj+DcbGH/Rg="; + sha256 = "b8hYuDyweRLAagaehHMzC2/XjZHNlxMchM8za8zPtj4="; }; in stdenv.mkDerivation { diff --git a/pkgs/by-name/ke/keyguard/deps.json b/pkgs/by-name/ke/keyguard/deps.json index 066ddff4aad2..8ab54e57333d 100644 --- a/pkgs/by-name/ke/keyguard/deps.json +++ b/pkgs/by-name/ke/keyguard/deps.json @@ -23,7 +23,6 @@ "pom": "sha256-/leyKEF/TXxneQPcYftKfPmT1gNJneJtjYET5HfMTxs=" }, "androidx/annotation#annotation-jvm/1.8.1": { - "jar": "sha256-mqsybZSSgAmRhUNgrCSPSTzn98MYNRkwm3is6eJA9vY=", "module": "sha256-yVnjsM3HXBXv4BYF+laqefAz45I44VBji4+r3mqhIaA=", "pom": "sha256-1JIDczqm+uBGw6PeTnlu7TR1lXVUhqZCc5iYRHWXULQ=" }, @@ -45,13 +44,13 @@ "module": "sha256-8gSwW3KKl1YXGLxxYkLkfGKcAIWoDudPylPU1ji8vj8=", "pom": "sha256-xzOIHC4X1ffIZhzAKpFZyxYLeyCUon1ZORbIfT4lBjY=" }, - "androidx/appcompat#appcompat-resources/1.7.0": { - "module": "sha256-18ygtVPsEJ7yCscK5kOPWE/Gu16yaaf1tAmOAsbWh/k=", - "pom": "sha256-u/Kluax4kEydp5LhZzF5MnT5X7SmEjBxkUCz4O9za6o=" + "androidx/appcompat#appcompat-resources/1.7.1": { + "module": "sha256-FjzF4PJJQz3bABb70BGrjeB88j4H5hjHRkRojibNGOg=", + "pom": "sha256-L6+SLow9cG8p2GKz+7OqE0dwXCHG6uGFhtK7H3Nm6gE=" }, - "androidx/appcompat#appcompat/1.7.0": { - "module": "sha256-OIQq8rlsmVQMx1Yzd1SzAw3giwKdS/OqBuTs90HaaL8=", - "pom": "sha256-pXtCj0KKkzfXtIOiFipXDU5nK87/QRpkZeU+h0dQasM=" + "androidx/appcompat#appcompat/1.7.1": { + "module": "sha256-i78WeSyBzC3Qg2gXg6U4L1cwB+7oFXGCky8bRU4rfwQ=", + "pom": "sha256-H3mRDMIN4Zis84Z7HpP57VndtkNYWy6cKO5VUYrxvAA=" }, "androidx/arch/core#core-common/2.2.0": { "jar": "sha256-ZTCKBrHADuGGy54ZMhOD8EO5k4E/FSLEf0o+MwO9ukE=", @@ -62,9 +61,9 @@ "module": "sha256-qLF1E5SeXbbJYBwwvhnflTdi3Yd1EvHiz8+ugdJECUQ=", "pom": "sha256-D5U3BlmBQNnYc1zdWusfo1kz9OLzHAvz64GgU6TIwaU=" }, - "androidx/autofill#autofill/1.3.0-rc01": { - "module": "sha256-Kf1Vl4YLp2IBn/uAQ5nCuP43honTghgIO5KoWz/Oc+k=", - "pom": "sha256-gPqyISYXJ1VT1TbAEeSiBMTM9ZSkcP/FT7DTn7JHsf8=" + "androidx/autofill#autofill/1.3.0": { + "module": "sha256-C64mXK/gLpU/E+hzo0ORHSJjIAyoljkSDf3XVihgYPk=", + "pom": "sha256-YpKjl17iu+BLlYGXrO5qHaD/bQzdutarv59K26+46sk=" }, "androidx/baselineprofile#androidx.baselineprofile.gradle.plugin/1.3.4": { "pom": "sha256-xBj45ynm/IWCFAZVAhOoPQ+UaK+GY6w+59jn2OFBSDo=" @@ -130,44 +129,44 @@ "androidx/compose#compose-bom/2023.10.01": { "pom": "sha256-brBsrckwx2qUp+PRzAYIkCdbYUJ7lpM9YFT09kHrGeE=" }, - "androidx/compose#compose-bom/2025.05.00": { - "pom": "sha256-DNik598qgWZajK9dyaTbEOEGwaOYnhAigqIMyCH1y/M=" + "androidx/compose#compose-bom/2025.06.00": { + "pom": "sha256-qLnBhsqgXse/J/wz2wwbSUp4tPmgw84fo8b2uXDdxew=" }, - "androidx/compose/animation#animation-android/1.8.1": { - "module": "sha256-mvkcZJfEhtZdZ09BDg01q83qhgys8IITC+uNmWCH4Nc=", - "pom": "sha256-pfhsQjeM5JpcEjf368TxlSSDkB8/64iHV+NPpkZwDyM=" + "androidx/compose/animation#animation-android/1.9.0-beta01": { + "module": "sha256-av0x2BqDlQcrX3GQfx2WI7Lwyz3zRFGkm/K5jqtsDjE=", + "pom": "sha256-TYGEk59wMQn9tEzWnL2LJFPPLMWlTYKpb4Irl0vYFns=" }, - "androidx/compose/animation#animation-core-android/1.8.1": { - "module": "sha256-4+TlVgdmACusQzgJvM8Oqu2PI1bt78ztrqPE8wBtzR0=", - "pom": "sha256-iaTLt3YinDdNYlurWwueqtzbgMj3nPvsl1WT+vssCHk=" + "androidx/compose/animation#animation-core-android/1.9.0-beta01": { + "module": "sha256-7Z6Q8IwuyMK7CN9omavlRTLEy3S9MIxXYcVg6Kotp/E=", + "pom": "sha256-t8814xUhd4NlG7/DadME9HXtIoaQfJaRiDzwHbqQqb4=" }, - "androidx/compose/animation#animation-core/1.8.1": { - "module": "sha256-IJv+DWvIpwBZd2LGlE66QB8a6SDdf2+Vlzi7zj9N0dI=", - "pom": "sha256-tqTK5KNYF5kNfjcW9Yg25z+t6We3b2KVNSeXJFSMYgM=" + "androidx/compose/animation#animation-core/1.9.0-beta01": { + "module": "sha256-TuexnfkIDUg65RQmW/f6i+v778yrD3GYPaQD7DnWVHo=", + "pom": "sha256-6H5YvygSZxYfnCQdRcYQYHQetUR9L3vpW+8ESZp8xAE=" }, - "androidx/compose/animation#animation/1.8.1": { - "module": "sha256-ynw/ptyzAZz4lTL6sy0NpbBhqXfOqmKxKRSr/kFbaxQ=", - "pom": "sha256-oX0kmsB5o5hgwpA+hgUkkSnTT0TZtVkNbDk89rpyxAU=" + "androidx/compose/animation#animation/1.9.0-beta01": { + "module": "sha256-iaLkdZHGLMDZKNFya0Gv/Cti4p0KsjTjKujhrG6yImI=", + "pom": "sha256-7RGXLsMloUBVtXGfbp+avOxoXxoNbiwiKSfGDpsaPLs=" }, - "androidx/compose/foundation#foundation-android/1.8.1": { - "module": "sha256-UwoJHsr8XZEf6AJbc3rhk1M522ycJYVNeTpZktKkdiQ=", - "pom": "sha256-uwuL33yoj0qfuLsWDh/WgYz85M6UWpK6oM7CTiC16eo=" + "androidx/compose/foundation#foundation-android/1.9.0-beta01": { + "module": "sha256-EnzrFC0ACcbMVeWxARJnXI/fI+B6vefzhZvNJJIV5EI=", + "pom": "sha256-6ANSWpM6cwWN/cCx+eovH2+9Zb+45calT0g3TasFF1I=" }, - "androidx/compose/foundation#foundation-layout-android/1.8.1": { - "module": "sha256-B73UZaFZ2EaDwdlF6sjoufMP5g8OM1KEpn8ptWFwoOI=", - "pom": "sha256-d69VcKicpmhgiokORH2sSUHtAIXby3+2FPdAWo6dHHM=" + "androidx/compose/foundation#foundation-layout-android/1.9.0-beta01": { + "module": "sha256-A75idtzEeMO1lVm5KoAUEp9zY9RtB6L1YhrJuw+BJiY=", + "pom": "sha256-HUdh4c/VPEQtjSXKHnRr0X8rKrW3LFfsZ7UH8V9pbac=" }, - "androidx/compose/foundation#foundation-layout/1.8.1": { - "module": "sha256-wkbH9NweLaFjvSy5kMqnqcECAstH0YmTZaFCm0qMmIw=", - "pom": "sha256-FGa4s3L2KRVLULaIWL5Wf9jfXG+0+n0ioVM7+F3ZRl0=" + "androidx/compose/foundation#foundation-layout/1.9.0-beta01": { + "module": "sha256-GNcrrkmiLKXbUZqHsrazct9Lt4PXLcqSMY98waKJhKs=", + "pom": "sha256-jV7oArCjkyrijdrvwIYStGOpInm2O+CHeZu1p51U1rQ=" }, - "androidx/compose/foundation#foundation/1.8.1": { - "module": "sha256-Cum5CZl5rvr6XY/WAH9NeV8EhH6l3vtmTFfItGgLUPI=", - "pom": "sha256-wO09OXudb8JGzKq6gRnajSny4FOzioXARDpks8yPPUg=" + "androidx/compose/foundation#foundation/1.9.0-beta01": { + "module": "sha256-kmHCLihAtdY0/68VW5bf3d2L7sFUswhN6CxSL3wT5h0=", + "pom": "sha256-ifK7tVYl/ORPF3wXJnE9uAm2QKulLpBb68y0E5VYMdk=" }, - "androidx/compose/material#material-android/1.8.1": { - "module": "sha256-wHYCCDQtRtK17givFURSHCSPcW+VXJpmzvc1P+n9+FY=", - "pom": "sha256-cQVlPmvApSRXcoO8jJejTtcF+HhuLUCwAKtUlq9VGPs=" + "androidx/compose/material#material-android/1.9.0-beta01": { + "module": "sha256-dAOv302MUhhPR0R40+ecJhPp/VqXYDGN6FbQ0hMTVEU=", + "pom": "sha256-CSzUGkAU35rb9f0IypPJ2uFQQkFxjwOZ6LV/NDf8DKI=" }, "androidx/compose/material#material-icons-core-android/1.7.6": { "module": "sha256-eietGojQmSEqfhomiis0BXeFUrAtAgvl8Gprn2o+yUI=", @@ -185,32 +184,49 @@ "module": "sha256-7NczNuE23rRe267g3qEPelSQHh54FcS9FicJeXmJN4M=", "pom": "sha256-rFSvA/qAXWNsC/pFi+Fqw1mL+7NtvsGA9loGGFA/o70=" }, - "androidx/compose/material#material-ripple-android/1.8.1": { - "module": "sha256-cpXHjlmhSJ8gvw/j/GhcSh+awgHJe0gVn+4TO/n0/aU=", - "pom": "sha256-gFyDUyw76XhnzKYYshudBp8TPr/2gWHgHYwAZFXl1SM=" + "androidx/compose/material#material-ripple-android/1.9.0-beta01": { + "module": "sha256-wONzJRwhgyckQEKPSA6evLSowqQID++UtXuoO+a9htw=", + "pom": "sha256-j6BOaC3wIDkn2hwqMGyiUxqG6dOjEGhb7J8JZBZ1zjk=" }, - "androidx/compose/material#material-ripple/1.8.1": { - "module": "sha256-RovmUvajmmzF8GUtVyfcFDshk5PuONZsjug2hZ50cRc=", - "pom": "sha256-lgWjaSYRn6BrVqA4UtV7x/tSAnI3y/CSjoUAq/t46PA=" + "androidx/compose/material#material-ripple/1.9.0-beta01": { + "module": "sha256-cPQkH3hLoitMw/IZMsbRr53LxpvpN84MVXdb97b9wqQ=", + "pom": "sha256-BCNAE/0N3h8mrRHeX2wke1QKJJXv/0crpdvMleiAvIY=" }, - "androidx/compose/material#material/1.8.1": { - "module": "sha256-Qo9cBdqs7stYiEW9eyCUsIj0Kv9GjEqL2exuUtC/w20=", - "pom": "sha256-8qy0B4jZEjrdl26ETPIqBYl/FrawW75ww6w+uV1YHZs=" + "androidx/compose/material#material/1.9.0-beta01": { + "module": "sha256-aHigDDmfQP4HGj/7sQkLfR60oz2WjxDkMsluWYOHgNY=", + "pom": "sha256-cgpaSjpHbrIrkM474yK7cBSB1dtlGfB5T4qrAkI74c4=" }, - "androidx/compose/material3#material3-android/1.3.2": { - "module": "sha256-AWEoDkG0K62SguZbUaertQmFUqjIJr5t620hIw/xtMs=", - "pom": "sha256-b3qi+W6XH6spY3wB4UJxFt7tTwG5vm/7RlpnUg2b33Q=" + "androidx/compose/material3#material3-android/1.4.0-alpha16": { + "module": "sha256-iXR94x2V8TG+JdGY0ruguEBN2j7tFg35jjUrxjr2y6s=", + "pom": "sha256-78t11VVrQPUnJ+mANOgxzbYJBvkRlisDkhCp5h6QqlQ=" }, - "androidx/compose/material3#material3/1.3.2": { - "module": "sha256-pE5ftIPSt1V/FIYLfD+S0o0ySalADLpzxqV7p1oB9BM=", - "pom": "sha256-LzOKGqOpwCm25lhxOH+qjpdUJvrvHG96ufdYw5VfWOc=" + "androidx/compose/material3#material3/1.4.0-alpha16": { + "module": "sha256-szHtYkvjEdV+FT+/jpBADK5KZQtoGG7S1K56e+Euaqk=", + "pom": "sha256-UjQXEgji++bnT83wTnR1XRo+tZYfL6p4lH+XIcUZ8jE=" }, - "androidx/compose/runtime#runtime-android/1.8.1": { - "module": "sha256-ShXz0V2NjtqmjeHrMkLcXMNRdhHOfT4EFdzqDy1Bqgs=", - "pom": "sha256-lP59qmnEiRVeJrAea9zaVeea9RXTvtw5D9kN2JslxB8=" + "androidx/compose/runtime#runtime-android/1.9.0-beta01": { + "module": "sha256-Ox0IYGpzxRniPQpeyUi7T9VdJkQlcmJehPZbzzTo7jE=", + "pom": "sha256-W2KV1sm4GvyCDhovn6Kwudl60/sa/qMndPLdkqWtPYA=" + }, + "androidx/compose/runtime#runtime-annotation-android/1.9.0-beta01": { + "module": "sha256-lpencItU3dcHIqC6aaobhIrO1gMYFhR16ja36i8xtok=", + "pom": "sha256-cQhKfgSais9+2mdjF6GmeTvZ+bTQsUiiMyiqdOAxAlA=" + }, + "androidx/compose/runtime#runtime-annotation-jvm/1.9.0-beta01": { + "jar": "sha256-mJstoov1unlmwIyi2z9IpgfmhOSrT/DegOnNXsZjwHY=", + "module": "sha256-xrfGoJQShS/uYiwiunDO39oGWDzttHw6pt1zhpp50uM=", + "pom": "sha256-rUt5CJtIsEUycRmzkrAZ1Z1FcKzf0HAqYMBDMNglQaQ=" + }, + "androidx/compose/runtime#runtime-annotation/1.9.0-beta01": { + "module": "sha256-vIUO9jyMf3IfEdDgG67o9YGN1Qo2E6PnwEfUolDIKIQ=", + "pom": "sha256-yIPzuGHdksj6aE3yXRBXeh3Tt1P89iiQpoWASU/YSeg=" + }, + "androidx/compose/runtime#runtime-desktop/1.9.0-beta01": { + "jar": "sha256-NLsUMFDXa6fonl9jFZxoF+5RxTgQ6Xb8xxRHz+50N44=", + "module": "sha256-nyV4vW1T7KMeNSiWWS2KKivEdVI8uYuDAP5KMMzUgiA=", + "pom": "sha256-GS/Ly+40+wKOpBPUNT6vmlpSSuU7cXycg33gAMTQyR0=" }, "androidx/compose/runtime#runtime-jvmstubs/1.7.1": { - "jar": "sha256-Hwg0fdVRX6enZNbJchpD450k2kbSe6VUupROVzzwVBI=", "module": "sha256-zsW2D1i/MZBXMJbnlAWFXEaAUYc4ref9JU0vcOEq3so=", "pom": "sha256-tJAG0Sq62RXTUN/ixO1D9X90xKHphaVOveVltI/rHv8=" }, @@ -218,9 +234,9 @@ "module": "sha256-FPU88sgBBcde61vxmQRDmtXfpDJ93ZRIKdy3KDraCWA=", "pom": "sha256-NB5w5ZLSQyjAvfAz9nk5Wz1r6Ps/T/hh2GBkvUrZw3E=" }, - "androidx/compose/runtime#runtime-saveable-android/1.8.1": { - "module": "sha256-puH0IzW9gkgmVEdEo330llEw6eZ8Ep2hTKZj8OFeOBQ=", - "pom": "sha256-+g8cEBJfz1GVMgf6HpJry+obL5Ud7q5cpT28MidXmxE=" + "androidx/compose/runtime#runtime-saveable-android/1.9.0-beta01": { + "module": "sha256-Sy6AnsDQP4KyDrRc7WzzsXP34eEIKeb7gefMAm5TWcQ=", + "pom": "sha256-qcBhstK3qhupa620PKfNXdzx2HWZJqzSNwPNY2+pIt0=" }, "androidx/compose/runtime#runtime-saveable/1.7.0": { "module": "sha256-V096AtKqST7Zo0pfOFZyJm6XS77qNQMnRU6gCL3S7Zc=", @@ -230,9 +246,9 @@ "module": "sha256-Oflyur/Hr6pqaiVKqqoMOh8NuG3tFtMuI2CYifXnyQQ=", "pom": "sha256-VaB8OTTVFOaIK4UBYwUnXf/1+8Bs1uG4JNK2pY0VuFI=" }, - "androidx/compose/runtime#runtime-saveable/1.8.1": { - "module": "sha256-Ykze0H3DJXTMVK0BFN97e7e8FxgnmHwOAAiaYNiBt74=", - "pom": "sha256-2vJEKDKK6MmhLcHxDTL0uhqJ3/cwNwh7QVe0f/ZB3UI=" + "androidx/compose/runtime#runtime-saveable/1.9.0-beta01": { + "module": "sha256-qK7KKUVPYSnx11mpmdHesKJbZg7bOK0E83VvSM4h83U=", + "pom": "sha256-SFTI3h0TFgEXqegSNg7AziASzZCQZsdwKEssfYqMiY8=" }, "androidx/compose/runtime#runtime/1.7.0": { "module": "sha256-e5NRsP9t+SdtAtQPEnZa5Vv1xt+4/430x338oTj7n8E=", @@ -243,77 +259,77 @@ "module": "sha256-vm5K+8Xjvo8ktfHWAsu9OvRt4mKT1ievVsQg+kQN0KM=", "pom": "sha256-AZRQeUquDM7bwmE95QF6n0Q/h2IjogGsSvDcU44bD58=" }, - "androidx/compose/runtime#runtime/1.8.1": { - "module": "sha256-kG6DgejMt4tztZVwU/ovFeMWnpG+m3rOlXp191a6tLo=", - "pom": "sha256-iaqjzw4s1OEEGJX7ZZCjv09dhs7CtwjzKYvvSdDOJoU=" + "androidx/compose/runtime#runtime/1.9.0-beta01": { + "module": "sha256-VXvZMsJCYYCCCpv/g6iQ0iU25Gm+3PHWzMZ75si2ss4=", + "pom": "sha256-Vb1NoKjc4l3XxlmfUjgrmvnRHV+L7E0M2YuPuo5W9BI=" }, - "androidx/compose/ui#ui-android/1.8.1": { - "module": "sha256-Dczwulj7MaJ1JmIqgsWXwEZp8ZgMkw+1MLZIbu0dLjg=", - "pom": "sha256-wKNHN4k+GKtxuuioifuAAjWuKFTlsXJg36MSt+JGc30=" + "androidx/compose/ui#ui-android/1.9.0-beta01": { + "module": "sha256-nD/rWyFI3D1mZzxaP61iWmfKtyDEHPbwNyzIHa6eW5k=", + "pom": "sha256-sd7KrKeGnZdjPjO8MGr48eRO3FIxG3uZ7eZ1kcuZJyU=" }, - "androidx/compose/ui#ui-geometry-android/1.8.1": { - "module": "sha256-Pm4Nhm51cMmluOlYiPdEqYUNOxB1K6NDbNFVgzmDxWU=", - "pom": "sha256-iJmRSsx1heJp5jJ6SpGXz2tyyd6iS3TvjRWbCjjLjbU=" + "androidx/compose/ui#ui-geometry-android/1.9.0-beta01": { + "module": "sha256-EZCYmufcOIbNSk1otExJtydLKIIh6EakK6lIiJ5lfP8=", + "pom": "sha256-dKjIN/M8XcJlSNeeujnJJsKkd3UfYgVYAEpFGrnMIXg=" }, "androidx/compose/ui#ui-geometry/1.0.1": { "module": "sha256-4v6ktWj/k+NAvEsYyKPCqbr98+EhDZ7TADbB2YiL42k=", "pom": "sha256-a8eueqmlaUSxbzq4pWXDMtMHt5ZHH2wPUepXvtq7wgg=" }, - "androidx/compose/ui#ui-geometry/1.8.1": { - "module": "sha256-HpHlj796hZcFSH50jO630CLlD9+aAkpENYYB0nGgITY=", - "pom": "sha256-Svlf7If74bn82IVsm72ieFrGJ511BKQcJ6JuodGaHuY=" + "androidx/compose/ui#ui-geometry/1.9.0-beta01": { + "module": "sha256-8s+uS8HmzvXoKYqntUWRtbN3RhqgOhxO8zzn/kDv7wg=", + "pom": "sha256-9hlFCOdWhxrNfXpb5rXxWBfz+CWOXer39er3rOcoOTo=" }, - "androidx/compose/ui#ui-graphics-android/1.8.1": { - "module": "sha256-NfIfk7LIZa/1rSNA1/Ofd54OeE+1tjmEe5vrFk3OF+w=", - "pom": "sha256-Wyn4SY5RQ8wmD/BSd7LzOFANpAZGhHM2uQ8fiHhUwMg=" + "androidx/compose/ui#ui-graphics-android/1.9.0-beta01": { + "module": "sha256-A921IVy0SRb1PMV2/vHh1zVpdPFYhu+aeTbkXRI04Ic=", + "pom": "sha256-bRBnMPTVIUSzS8swfe/blziasK98jRbM5voFcJq00Hg=" }, "androidx/compose/ui#ui-graphics/1.0.1": { "module": "sha256-rZzkDe7HIbiYjEOrhH2APQC+6Ixnz8g43uVlaR8125U=", "pom": "sha256-GONZWSUbahn/IUhSZDDJtpPpDm2Zv6ebCEm9lJ1e5VY=" }, - "androidx/compose/ui#ui-graphics/1.8.1": { - "module": "sha256-Ko5UORia/b058+2hJudVCUceTNXiLOucu6ptqxjBH+U=", - "pom": "sha256-QniDQccIvhgK/V1K5lcv2wE7b6OXq99iGwo7hUXng1E=" + "androidx/compose/ui#ui-graphics/1.9.0-beta01": { + "module": "sha256-SozvlW2lvOBZqthSDKCxiSbJp3pYN+37gbrzU65VLrM=", + "pom": "sha256-aCFDA3Wc6q+uWNDgBiJiJhPLxYfzFH8KulQMG5+Tabk=" }, - "androidx/compose/ui#ui-text-android/1.8.1": { - "module": "sha256-GcswKQZlNAqj05mdE0M9h1XEmLhY95jM8uyrY4tbUjo=", - "pom": "sha256-V0/dkCTmFidWzxEuwv9QxMqWCdj6nk27BWEE/BSGVP0=" + "androidx/compose/ui#ui-text-android/1.9.0-beta01": { + "module": "sha256-l5nbq9HsgQNplvpaqHNQ1MHP1xRTxQAUeqH1nTrZ/9w=", + "pom": "sha256-WH/k3hz7U8IiJZZvcIPpBhOqqEqMUoCqaEg5y0vfJvk=" }, "androidx/compose/ui#ui-text/1.0.1": { "module": "sha256-Q6HslNPOzF870g8cU1UasDoLpyivGHGnS/I5xBh5Xxs=", "pom": "sha256-sclCzOWe1DTUcgZ7yUk4f7XLxgJ/dAsCWQzrjggKgbw=" }, - "androidx/compose/ui#ui-text/1.8.1": { - "module": "sha256-AfjZMsPM9qLnRPVPjIqvMpjWSlhE9JtEKV/yTh0p+9o=", - "pom": "sha256-eDUA9Ggk/JhrNwngkzI/oaAPhZ/EjS3IvdupXzD/Vdk=" + "androidx/compose/ui#ui-text/1.9.0-beta01": { + "module": "sha256-nvzD0x3esUF415U9fxogMvWcyigqcGdDT5BeudpKpWo=", + "pom": "sha256-c0kU2qIs/YpKGo8SoDhCs634afYdSvTSsjI+lAhcsdA=" }, - "androidx/compose/ui#ui-unit-android/1.8.1": { - "module": "sha256-ncvx3rHsKajRqwMR+nqwruMqqLFIzyIw1F9SSCBOPhQ=", - "pom": "sha256-BBd2RX00bDG9ob7V7ZNFkcbcWII+W7PV5IGk+ubo6Z4=" + "androidx/compose/ui#ui-unit-android/1.9.0-beta01": { + "module": "sha256-Vcz9SJ/mlGxiVWlfdCXwCZgn2IA1KUmTgK/l43HhMXg=", + "pom": "sha256-bKd4emAxCnzKgm4qok52g7o4NdkKVo3jjGjS4Fino10=" }, "androidx/compose/ui#ui-unit/1.0.1": { "module": "sha256-PbEuW0fW9tqR7Ub+uQL+URKCyEbk7xr/u5FHefprEII=", "pom": "sha256-jrCYEDVgGvGhTFv4p/Ae99S0702VciEhxhF/o9CO7lk=" }, - "androidx/compose/ui#ui-unit/1.8.1": { - "module": "sha256-X02ItPWOsb/ZwkoguTyeVD/uLq45guw/gb1hyGynC/o=", - "pom": "sha256-bAjgg2dt3U2Z9NiZfdCljkwI4WZkRvtYFVL6sZzppNA=" + "androidx/compose/ui#ui-unit/1.9.0-beta01": { + "module": "sha256-63OKahA19p753KL2j4NfPlFwfz5fvcgBjIcahinoiT8=", + "pom": "sha256-pw0YF7LCiMSfbEHfCd6+aJ63jpmNBGtwSDQ1rJwbwpY=" }, - "androidx/compose/ui#ui-util-android/1.8.1": { - "module": "sha256-pqDE6dEt3fl+7GdGl3ajRzQRAYR51e/35Lj1XbruJCg=", - "pom": "sha256-Se0o21rzalTLO3E6Eb6DfFusLI8NlL8SeNw8R7VzXj4=" + "androidx/compose/ui#ui-util-android/1.9.0-beta01": { + "module": "sha256-Mg3CGRVG8inWNjdeghxl79gslQ097Cllh0YWih6dwgw=", + "pom": "sha256-a3HIf8w54y6mr3dvlGYHcm79fPOffjBePhj+pJK+F+c=" }, - "androidx/compose/ui#ui-util/1.8.1": { - "module": "sha256-f52/I5DNARP2fw6/tGBvacTx/GfYkSwckhyIBQrnY+I=", - "pom": "sha256-AgUVz4t0yO/BM4LAy0JVXgGKiLu/nYtUZ9xPsufQktg=" + "androidx/compose/ui#ui-util/1.9.0-beta01": { + "module": "sha256-gswYwyKvtka/fg1PLbDSqij+TwmshNaTJw5qb9TI1Qo=", + "pom": "sha256-f+anp1X+w2b6lswO8sa6ZVX1X2fkRkSLE131VDXa6AM=" }, "androidx/compose/ui#ui/1.0.1": { "module": "sha256-VwMaasm2DltWeS6/XN5uFoEv9WbtkZDL0YiwC0bBN3k=", "pom": "sha256-IfZaw0n3m8YNhGbQ64DNBj8YUvRMrKShyfN8GandvWY=" }, - "androidx/compose/ui#ui/1.8.1": { - "module": "sha256-tih/a0UYG8EBYoAFfME72S9h+e7KwDPjdnmVzPbA5ds=", - "pom": "sha256-srlRZYZwQPJo/GqcVnFMOiZUVe7/RJc4vdkB50u54+0=" + "androidx/compose/ui#ui/1.9.0-beta01": { + "module": "sha256-sf5+GWF53xXHoHKWBjU7KMzNKZzySQ1Ff94/bPYv4Os=", + "pom": "sha256-OK2WwgqyUCvm4VX+aXzKjtiHO7gMYhQjqg1GU0CyzLI=" }, "androidx/core#core-google-shortcuts/1.1.0": { "module": "sha256-UOPdyUI2kQ5hRYijrCmm/XZbg526DMWDmkmNMYKX+I8=", @@ -349,13 +365,13 @@ "androidx/customview#customview/1.0.0": { "pom": "sha256-zp5HuHGE9b1eE56b7NWyZHbULXjDG/L97cN6y0G5rUk=" }, - "androidx/databinding#databinding-common/8.10.0": { + "androidx/databinding#databinding-common/8.11.0": { "jar": "sha256-Zsq4JjnawPbCQzRkwJOwdNYIxLuIfsOKm4vErJgSZzI=", - "pom": "sha256-fYI9g4oIgVaDv0Jp6GCvGbyHtASNm2ySE5aEKmLXh64=" + "pom": "sha256-VWOkbqYQlA+qdik5TuquNnC1ZxXysAKUuQ/BIQ22fFM=" }, - "androidx/databinding#databinding-compiler-common/8.10.0": { - "jar": "sha256-LpKvJYp06HCnbB0siXD569+2MVbQ1RXXjmSHC/xD+uk=", - "pom": "sha256-8akwie4oXl2Pksq4tKVKj28KYI31S7FRjk6hAcBlmGU=" + "androidx/databinding#databinding-compiler-common/8.11.0": { + "jar": "sha256-CYr82ZDCpuvtKTcgUdThLyyNUAgg7ZB8yuOySg4e2aY=", + "pom": "sha256-uBul3n6tB9LSW77rDCWDxeZEYpnMzO39ZPDstZPJ+lY=" }, "androidx/datastore#datastore-android/1.1.7": { "module": "sha256-Zp8mla3Vm6tgTcUJCoeeQWPd/1UO91oSmMTsIlDIN/k=", @@ -419,111 +435,124 @@ "module": "sha256-bXthnLEipKiiCSCHHbaohvOIQ/adLqqVISccLAi2NqA=", "pom": "sha256-p7ITPxYF5+mMFRg27BYoyPBki4FWt3Yx8vIZbiTNOzA=" }, + "androidx/graphics#graphics-shapes-android/1.0.1": { + "module": "sha256-mlUIyvAtePzycpOU6X57J6Q3hic+F8y2W/jhsApZgyQ=", + "pom": "sha256-gd57zIVJCE0QTVrzOxIPk+ENRUJKFaRUz6HyQwSqTRE=" + }, + "androidx/graphics#graphics-shapes-desktop/1.0.1": { + "jar": "sha256-8wXB4aw+t9IOVFUPSOB7VqlpUUc90/57uJE+0M06XpE=", + "module": "sha256-0lI9c6u+Lx54cQatTh96zuMKfGI3D4W7TXgnAPD9BwE=", + "pom": "sha256-8cK2TcpMcwYnX0QhdnEnQOsCG3ivD4oxbFd75j3rxuc=" + }, + "androidx/graphics#graphics-shapes/1.0.1": { + "module": "sha256-LX9tVQQimfnE+EeKoJS8QJmjRpAnef8wkf7R38K2L1M=", + "pom": "sha256-drUM5mT6RKSxZUIIHgiJkc8xaubnI6pM0BpicZ8aiic=" + }, "androidx/interpolator#interpolator/1.0.0": { "pom": "sha256-DdwHzDlpn0js2eyJS1gwwPCeIugpWSlO3zchciTIi3s=" }, "androidx/legacy#legacy-support-core-utils/1.0.0": { "pom": "sha256-j9CTAIs+58BuUseNoq+YCntHtpuWf6kdrXr0ZvegCjg=" }, - "androidx/lifecycle#lifecycle-common-jvm/2.9.0": { + "androidx/lifecycle#lifecycle-common-jvm/2.9.1": { "jar": "sha256-N9ibIQHwdKxsJgkX2rsYVgdkXuIAqjAYx8W95w7c8YQ=", - "module": "sha256-c/rWwx2zuUYIrJCFRzYBLJwSzz9C+hQ4mXKAuqwFIKY=", - "pom": "sha256-VL6txi2pD74DjcMOrQYFUis2l7YdkfduSWm2AgJIPME=" + "module": "sha256-icBldDaUUcCDMqL6WSTkw9C1HZW/OcKrelOQVRaouyI=", + "pom": "sha256-g1dV7g7MaYX7gRopYfkY3A3SOf7DTfzifq9sbaRKW9k=" }, - "androidx/lifecycle#lifecycle-common/2.9.0": { + "androidx/lifecycle#lifecycle-common/2.9.1": { "jar": "sha256-DujhVMDU7wrKSBXEQBBD5Q0fbx9iOYI++Kvbadm17nk=", - "module": "sha256-Z6ie4WOJ1esxeS2M6szDzyAJAMFMILuUdTbjJsFs4K0=", - "pom": "sha256-aGNfrLQTSbBrhpzo+yxjDt0lpXyX5f8Ji7rRX/zzH/Y=" + "module": "sha256-CyU70u/MhikTdjtIL11uyGOh/J3t6Va6kvc4m+E4CYY=", + "pom": "sha256-4sN5m2npG+3MIJ5oRh/UYMxE6hT9Z8ISPjX2xbBURC4=" }, - "androidx/lifecycle#lifecycle-livedata-core-ktx/2.9.0": { - "module": "sha256-UYkUrKzxEV3yfIgHwrz6qsowxD6N+jvxIXB9L28N4KA=", - "pom": "sha256-I3fd0PRg6g/k0WZX6PKMtgBLNOVxMAT20LjWtFs2olk=" + "androidx/lifecycle#lifecycle-livedata-core-ktx/2.9.1": { + "module": "sha256-275OmJ69MnZ1wykwwSMawRO87L8hCoAZYYdJklo28zY=", + "pom": "sha256-rOky0RSFyjtzJ5mFobgmiuJtKLBKGRJHhTNy352Mulk=" }, - "androidx/lifecycle#lifecycle-livedata-core/2.9.0": { - "module": "sha256-DB+wsO3QB7AX6/XF3j9SFet3ReEnCJRVTr6Br0xLiZg=", - "pom": "sha256-IDY6yYfHY+SIcCNKDtj8f9mgWXWD58izuEFt73NUonE=" + "androidx/lifecycle#lifecycle-livedata-core/2.9.1": { + "module": "sha256-gvLILSTuZqjdyawG/+7oskLeq6YXWd9Xtraw8hIg2hw=", + "pom": "sha256-HEYMEB75VnC4kgrSGJ96pQxUOZgo1sgtEFVeZ+/WPuA=" }, - "androidx/lifecycle#lifecycle-livedata-ktx/2.9.0": { - "module": "sha256-8Yo/vdVj//rMpGSSQ9NLUIpNRnrNC459Z4p/ga+TBZE=", - "pom": "sha256-x4vtNhFKGlEvqXd9kC2yYRh/jnzE1kmNMIVbp/zYkZQ=" + "androidx/lifecycle#lifecycle-livedata-ktx/2.9.1": { + "module": "sha256-uf99OpHP8ZMDSoAc0mQKP9BisGxYCk/EH7fPVxTTF7M=", + "pom": "sha256-dEZ4YuQPKuKMEKG2Fpx4quQ/R9QlvYU15q1AIJ1z890=" }, - "androidx/lifecycle#lifecycle-livedata/2.9.0": { - "module": "sha256-88jLMU56MenleuXCj8LUxDAjc1CwgG6HFD8VhV5Kqik=", - "pom": "sha256-hwVtM8Ws3d3mG3tEWZhytbcnG+J+FAo5PKaI1Fau+Qg=" + "androidx/lifecycle#lifecycle-livedata/2.9.1": { + "module": "sha256-EGUpZf7Y+HDgbjIDXUk6s5VE0yIdWm05slsFSHr3vzs=", + "pom": "sha256-8PeBWHem/KdNDW2+of7IFsPjpTiqhHDVnV1uBp9+eh0=" }, - "androidx/lifecycle#lifecycle-process/2.9.0": { - "module": "sha256-su12d6LE+1c1sD8UHrseIrLw++E6ye7vzo6SYrB0vMw=", - "pom": "sha256-rYbwBkYVWFa4NFbtbwTDFlxPkgUIjVVbk8fn3q9WCRY=" + "androidx/lifecycle#lifecycle-process/2.9.1": { + "module": "sha256-wFvZz1YgI034xBH6P3S4o/dfsMZ8H12vPpkrKCOcuRw=", + "pom": "sha256-3PsOgdpA1eRsTNyI4dA8JPARJZPnwoLVAi1T8vnRSDo=" }, - "androidx/lifecycle#lifecycle-runtime-android/2.9.0": { - "module": "sha256-t+2aXMh+7Bqx8dIw89Xo3u4lB8mKAIjTSdw1dsBXKSc=", - "pom": "sha256-XbBYAs9UBRTcwupYGk9n+ZZUbLpWjZuxS/JzspzQIzw=" + "androidx/lifecycle#lifecycle-runtime-android/2.9.1": { + "module": "sha256-9wkyjm/XQMak+KPMWW46W+Ct6BRZjrgFFca7dMp9eq8=", + "pom": "sha256-krzyIi3U/LGBiWwDP+8iW8GRxenhdCrjEz+myVkHggk=" }, - "androidx/lifecycle#lifecycle-runtime-compose-android/2.9.0": { - "module": "sha256-f8bc7vUCwBMtjF9eyP8pAegO7EA4j31HPDwT+NBCfMs=", - "pom": "sha256-49vxHRanhy+pit1ZFlIvSxees9X0/B4EdI049ZEN8GA=" + "androidx/lifecycle#lifecycle-runtime-compose-android/2.9.1": { + "module": "sha256-5nV97rX7ALUTzxpKNlcy+lMH1REcJFQ0ulIJJTdJuGM=", + "pom": "sha256-jo2J0dCB1SoauCf/ACP+fiynw5zVDlK3B7QuCgdQgUg=" }, - "androidx/lifecycle#lifecycle-runtime-compose-jvmstubs/2.9.0": { + "androidx/lifecycle#lifecycle-runtime-compose-jvmstubs/2.9.1": { "jar": "sha256-lGc2Hy/d8Nzdw8HijjynmeecqjDzV5mDrElQNCH08zA=", - "module": "sha256-qq3uaeuqO66ZuntetGqn04vQvmNtY/QYy0PsMHqPMdo=", - "pom": "sha256-y1niL3HRETuBVsQK3AqSFKvocs45F4PoyvFY7GLT4Fk=" + "module": "sha256-EXIClXaJOfZx+kK18Dh4IG4WoXU5D8X86fgo/rt0hL8=", + "pom": "sha256-111RKv0i/grEXSmhaK1IKHWT1XM3wy55yaf5WRHHZJw=" }, - "androidx/lifecycle#lifecycle-runtime-compose/2.9.0": { + "androidx/lifecycle#lifecycle-runtime-compose/2.9.1": { "jar": "sha256-770QNjaJlQgSpcWb4bkhzydiPuZN8YmvBulINJCmkoU=", - "module": "sha256-U5dGGcqSmB9Mk1y9scRsDH9kEI5mrePNCFpt+yIDpFg=", - "pom": "sha256-XUi8bmLIB1s7MLyfEvwMN2ppqVOI9HpEIRe8axg5IJk=" + "module": "sha256-UrMW3V/5aYi85jpUcZR/m6D9GD1ngeqkn5pxMomGvF0=", + "pom": "sha256-7sSbzEWdgYne2WPk6Cih57GydarrJ2/HXzbnmt7Qih8=" }, - "androidx/lifecycle#lifecycle-runtime-desktop/2.9.0": { + "androidx/lifecycle#lifecycle-runtime-desktop/2.9.1": { "jar": "sha256-zdh7lJZK950FTH6iti2JGGVAfTMV2Z+oOoXQm6k4XOs=", - "module": "sha256-toVrOUqMT9R2tzAGHO2QkSDgqQORaFSiiN7HF96ZnIE=", - "pom": "sha256-jCSNH/BT1OHZRJsWImveyDf5JokT+oK5Ctw1Tw2+0e8=" + "module": "sha256-ejTIp6o2PFB4YGexxdakWgcT9z1LYpEx8yBhSClDNoc=", + "pom": "sha256-LyAORzZZCYSWs4P8X8wi5MdkH3aKvGnTcwQpfXNx76w=" }, - "androidx/lifecycle#lifecycle-runtime-ktx-android/2.9.0": { - "module": "sha256-D+G8lJMLyuH7fbbMXDV24CWjauMYc1LBLUj+/gXZ1oA=", - "pom": "sha256-jdgXqbZ2eyuek2mL2mtsndcjBqUwwCj4B7zfNrMcsRk=" + "androidx/lifecycle#lifecycle-runtime-ktx-android/2.9.1": { + "module": "sha256-eUhimMsZPVYg5O/CgVDP5t6zvIS0KbwHscMzhOWHf34=", + "pom": "sha256-ffSE/xG1YWBymO3TvIpvyGPGmvpJ2MkJrFoWtdLZqfw=" }, - "androidx/lifecycle#lifecycle-runtime-ktx/2.9.0": { - "module": "sha256-32ulbLm6LxgP4vl9aGOrrfn326Zer0JXV+C5uD2mFHk=", - "pom": "sha256-tFRUAdvQVf0EkD1GmGI9W7QG3eLjKADYCmHlgk9Hfak=" + "androidx/lifecycle#lifecycle-runtime-ktx/2.9.1": { + "module": "sha256-XaeKwudn95VIofREvR6/QLbR9/Tx6Oyu/HRibdGk084=", + "pom": "sha256-fV6h81Nws5/OgWP1JAF3eIzayOpiEYnaehjJQ5brjOc=" }, - "androidx/lifecycle#lifecycle-runtime/2.9.0": { + "androidx/lifecycle#lifecycle-runtime/2.9.1": { "jar": "sha256-mgBEhHz1aKEAm7RmxlRpxX84DHID1z4M3NdQvjIyMNw=", - "module": "sha256-8x4EZOddxzOZW6Utqns7FOrFlGzFy12HPIjxPZvabTM=", - "pom": "sha256-0BQhmBheRJkpJKoOjGeweVsScTkgOryHFZV8VnVpV/g=" + "module": "sha256-G+qrbumdUBVHYzl7pT798Z3aeo0S27ecgansrX9Zo34=", + "pom": "sha256-GjbZfhsPAyxtzKKI44C1pt8Gl75gu7vQ15ZYUo6D5wQ=" }, - "androidx/lifecycle#lifecycle-viewmodel-android/2.9.0": { - "module": "sha256-h0uhDHuxrNlmJGisFeJ/y/JVbxwoL4dcbAetY8hnKwM=", - "pom": "sha256-ddOo4UOqr0ibB0NMTjADCUKxqCppmyKb+Ic3e2A8P5E=" + "androidx/lifecycle#lifecycle-viewmodel-android/2.9.1": { + "module": "sha256-dZSRpWvwWo8lWQm+lUvxmSkxpmYjAhowu5aR5TzfhEc=", + "pom": "sha256-KDm3eGHCHUksHDudH3oj2s6mURcjJ7kjj4pdvoKHN5Y=" }, - "androidx/lifecycle#lifecycle-viewmodel-desktop/2.9.0": { + "androidx/lifecycle#lifecycle-viewmodel-desktop/2.9.1": { "jar": "sha256-PnnbKgO/W0qQ2O0kHxXp4jEdkQ55oVF8XDFCAiKCHmI=", - "module": "sha256-ebBXToHbwWNSimw+qdV1wG+toJSiFGjmNFPciKP3LaU=", - "pom": "sha256-LkCJfQWfcN9Lb0c05oOyC9DTd0qijqkE1hEIh7nGiy8=" + "module": "sha256-gUWxhrBkw8N1E8GMJ9wVPGFsESk3uCwdZGi6G+dm7nY=", + "pom": "sha256-RSLFdrqm5JktgA6Zs81xH7BDilLFpvS7DPsdIUSmVGI=" }, - "androidx/lifecycle#lifecycle-viewmodel-ktx/2.9.0": { - "module": "sha256-PQNYQrxASAeu22nWtqimvLQrqOwcVBf39XN3zQFOGAA=", - "pom": "sha256-mcSojVCfTEOmgdFNIJSBgmQWkbdPbdbE1plsqrvUxnc=" + "androidx/lifecycle#lifecycle-viewmodel-ktx/2.9.1": { + "module": "sha256-JMLH0QE+diWOODdZ2vRad7txRWlflqj5Id8wCgSpgx8=", + "pom": "sha256-W7IV8op5d11er5W+tibJSj6WcOta5rdoo8XPjru4jZk=" }, - "androidx/lifecycle#lifecycle-viewmodel-savedstate-android/2.9.0": { - "module": "sha256-Qng9QNSUI8qfUcGoJvTEc3GFaFTIrTLuLpoWjQxhu0M=", - "pom": "sha256-AvOD4UCt/CvVyU4V7JlNkGmk1FOKNwD1zzGyd08VZ2g=" + "androidx/lifecycle#lifecycle-viewmodel-savedstate-android/2.9.1": { + "module": "sha256-aGYHHN6f9JGJKe4rmH9s1hxzAZhGWB6Igp1yJORoUt8=", + "pom": "sha256-14PK/6bc0J6d/cwn2M5GWGu16MTDbwhB+tlDoqwzYC8=" }, - "androidx/lifecycle#lifecycle-viewmodel-savedstate-desktop/2.9.0": { - "jar": "sha256-H5fTzXwqsci5VcD631kpVMatL3rnZnox/j7hF2mXagY=", - "module": "sha256-bgBQYzfDRVkvJcayQLEzIyLzG9YSc1hq6m7JE8STBmk=", - "pom": "sha256-rMUoasMl9DVeUHhCjahgs1CwE2Zru7oE89iIFmvokYQ=" + "androidx/lifecycle#lifecycle-viewmodel-savedstate-desktop/2.9.1": { + "jar": "sha256-QXU2bZcSmCJyD3vCZQcTn89Fe5UswIlTS5ieNCzEoUw=", + "module": "sha256-EiatakejM+ZbUGXBoPaBZAAXne/ySGR639yk1RxFXM4=", + "pom": "sha256-FpG/axz91kQO2NM5zOic1u/7cz3hcyshEXDbEW4G7pM=" }, - "androidx/lifecycle#lifecycle-viewmodel-savedstate/2.9.0": { - "module": "sha256-nnJNqiBF/ejCqssLoYphoQbILDwYMhCRW59+syhyDvE=", - "pom": "sha256-dsqVnqEqM6PGCP0fJEikiQnTjpMNjzjFgDdOpg8aOMw=" + "androidx/lifecycle#lifecycle-viewmodel-savedstate/2.9.1": { + "module": "sha256-lleRtzD/9LPoVykVVlIoeRd5/Ssibz7E3RkH4qvhnuo=", + "pom": "sha256-WZ8n5zOnyXY3j9elfjAmgzHa25jh6OZVgyHF+1NrhOk=" }, "androidx/lifecycle#lifecycle-viewmodel/2.6.1": { "module": "sha256-K0BvrqXBLyuN9LemCTH4RmSPLh9NeDYeGY0RhPGaR5c=", "pom": "sha256-3C6OZdtT0hZZon7ZO5Zt7jNsHC6OhyhhZ3OJqZuLkTQ=" }, - "androidx/lifecycle#lifecycle-viewmodel/2.9.0": { - "module": "sha256-6KkPNkL3HW2wNFmMd7zfw/dufF9tsruYaWLdQsQM2Ig=", - "pom": "sha256-9J1LaLaFQRHk0ZPJDJpLdYQK0vNzsu0YQstWrFC2qEY=" + "androidx/lifecycle#lifecycle-viewmodel/2.9.1": { + "module": "sha256-vqFcam2Zbiub/SpzVsmHL7D4Enrp37ij8ygpS8fSiD0=", + "pom": "sha256-8UF1ZZ4aweo7WhGHSqYCyxxRtlQei8YFyzZ2ougNi+Q=" }, "androidx/loader#loader/1.0.0": { "pom": "sha256-yXjVUICLR0NKpJpjFkEQpQtVsLzGFgqTouN9URDfjF4=" @@ -546,39 +575,43 @@ "module": "sha256-bxHPZeS/hESZXMc+WqP4GwgtZucgwFkrxfyA0/c4UPc=", "pom": "sha256-bd5DgntAU15AU9HFLUsiekEVVsKJ5lQAyaHMYeK0HOM=" }, - "androidx/room#room-common-jvm/2.7.1": { - "module": "sha256-jM7UOynWvF0IWZxT1/R9hK3HV3oRc0m4/epGID2IhHk=", - "pom": "sha256-u8cvVVmRlceXcXKp3fGZ/d5OwxslhQITrCnutUMm4dw=" + "androidx/room#room-common-jvm/2.7.2": { + "module": "sha256-12TR77Nc3uUXFS8DEteDl9k6wVfuGueC4X9P77/2W7s=", + "pom": "sha256-DN+bNebfSZqgUnKa9P6vk6Iy+9n5qcd/b3ySLyoiA1g=" }, - "androidx/room#room-common/2.7.1": { - "module": "sha256-VYuFMAMujgA+oIldJ5ISHmdrGp46DDOu5GDQD5J1eNk=", - "pom": "sha256-Fv46v9l2e++3L1HU28+xWAMYpu1z8OMYQCoCP26KFQI=" + "androidx/room#room-common/2.7.2": { + "module": "sha256-niKYEu4zhQrZmiYh3KIAxiCFSI3cWfZeBjokSdeXQfA=", + "pom": "sha256-/oNiHhzORV/W/7jYv3JbVPwXwzmet+KTaAceJO6D044=" }, - "androidx/room#room-ktx/2.7.1": { - "module": "sha256-p+vr7imzWlJp502oaXvdc7ZPvpmwxivwjGYbD1bUIws=", - "pom": "sha256-UJudK2gVAOELii9CHCY2u8cvrJUbJ0KGqMo7cGi1FLY=" + "androidx/room#room-ktx/2.7.2": { + "module": "sha256-DZGY55rqSD+lZBWoLnsplfv7Om47mdpe3xKNpt4CHOQ=", + "pom": "sha256-OU+k0nWfFgmDtbBl5+jK2N8vu50iHVyHZHGe8nP2Azg=" }, - "androidx/room#room-runtime-android/2.7.1": { - "module": "sha256-hPhDCzkDPsf80Gf7ZgU5jV6I/c377GXl6t5o8VoCNj8=", - "pom": "sha256-VSwbRdkV5UK6rbPYQptpQoy4+BrPLfBhYOcLrxbxK4w=" + "androidx/room#room-runtime-android/2.7.2": { + "module": "sha256-IOfX9Hd3/zAV3hz3/tcfKYxjF1FkZV2MKyKQTZK7nsI=", + "pom": "sha256-mUaaAzqvTl98dESiWhG57QLQAx49Bi336D9JRvJghks=" }, - "androidx/room#room-runtime/2.7.1": { - "module": "sha256-t22KSPR2jqefWMhPLgIFjGzsgYFTjujHcswd7zpwWzA=", - "pom": "sha256-O/BknKjAsoPd3Z4glG8Cr8IZWoUkW31AdCC3ADhztrE=" + "androidx/room#room-runtime/2.7.2": { + "module": "sha256-4czL0QnkPBcNlFO693Jzg/IQPJ8yNWug3rPHbpKZgic=", + "pom": "sha256-Z01xo7k8jv4lLom7+8t2dzXOcz8uz0Zz3AgYIe0Fe7I=" }, "androidx/savedstate#savedstate-android/1.3.0": { "module": "sha256-sdbxCpRCrTJD7n1LoQdNSrcBnhnXIiKiZU6BWL98BuY=", "pom": "sha256-IuvT2LHiyL+g3tI/4vAXmWFoPaoltHbeuZE1DGypTDg=" }, + "androidx/savedstate#savedstate-compose-android/1.3.0": { + "module": "sha256-gjqVAGQT/B/XZ2JB3zpg4OcQLt47c6ChUU37grSm8Bg=", + "pom": "sha256-TaF/vR2zb6kx+9v4c62nk6FtdhOP1ERlF9gXKqIerzE=" + }, + "androidx/savedstate#savedstate-compose/1.3.0": { + "module": "sha256-FaB6D9uO1YpIyiHpgdOKtysrv9lkY8M6cFDfHCdpmnU=", + "pom": "sha256-3g1au6p2vBLitADSqFaxVl7mo8L/242umV5fDYgTIpY=" + }, "androidx/savedstate#savedstate-desktop/1.3.0": { "jar": "sha256-5420fy2C4PnfkNyagjo3Y2hKS4dpsw18U2Wtz1w36I8=", "module": "sha256-GAx5XOdUs0eN30Q9h0gYEb/JV9q8HMLoQyr57GNKMJs=", "pom": "sha256-1bqe/ug5kd8ezhILTFMVk0msWdOwwIZiYwMpBE0B08g=" }, - "androidx/savedstate#savedstate-desktop/1.3.0-beta01": { - "module": "sha256-XLg7G6NxNU+NSGiSNRsYbbDcQ1DoEVnMmT0OO3YrfMI=", - "pom": "sha256-c9NNJVYsYyHaYBcVizfLwQGM3KQi/cT4SrnfwWt5OeU=" - }, "androidx/savedstate#savedstate-ktx/1.2.1": { "module": "sha256-lDWRhLK6UcD0mKK5BV03s3IjHvm8xUpJcqyZ8DA6//E=", "pom": "sha256-0JVTIR9nA7Ga79YI1gB8dxMtJ6KBVWqOaJ2Sdk7CfTs=" @@ -595,42 +628,26 @@ "module": "sha256-GdJQHgRMYfIk4k/sWGnLydvyAQkg9kdlkF700ZQaXms=", "pom": "sha256-3FpsQvP07NN0f23+zgzfaLZ4QscJRWhq8Xx0Aw355RU=" }, - "androidx/savedstate#savedstate/1.3.0-beta01": { - "module": "sha256-cSXarKYzWh7ecm8TpMkpqTdKar88PLgUMk3/kBomPuM=", - "pom": "sha256-Ef9nMkmCADvCHHui44422EwMWI1R2wF3VjQvOL5G3gk=" + "androidx/security#security-crypto-ktx/1.1.0-beta01": { + "module": "sha256-+gpmWpePD2jcyK1wA3xbBwUPkii8fioqYaalAXFvuxI=", + "pom": "sha256-70LdTIkF/dLyFaPu9wleb/wGrD/A6kOgV+xygQ5xYYo=" }, - "androidx/security#security-crypto-ktx/1.1.0-alpha07": { - "module": "sha256-e+mXwBjVGQDlyAOC+DFpWacH6DhxjSdP0aoSIVgQlzA=", - "pom": "sha256-HhA9OWVapsLfRnd3uT9VVFWKXK9gWL2jVqNDt8nutqY=" - }, - "androidx/security#security-crypto/1.1.0-alpha07": { - "module": "sha256-HDx/xN+XhGcoprctxKUTb9OIsgReLXPkKW7zhtRzLfw=", - "pom": "sha256-fo5zmE9SFXJqOctnUT7JZgodkXFgcEkw334IJq/q9HA=" + "androidx/security#security-crypto/1.1.0-beta01": { + "module": "sha256-EMklI/+N0yhb7aNLjHXRF29lT4q1bt4t7kie24VJk8A=", + "pom": "sha256-Vjto/rizK9j1m4J5nqloxfKolp3U0R0vr45DdWq4boE=" }, "androidx/sqlite#sqlite-android/2.5.1": { "module": "sha256-xQPDagvPZuHfq0VnpeP2gC0tNko1FOJRjLEvW+PIkN4=", "pom": "sha256-nkDcIl/y5vKTpRWO6k5HdLE8eLOBF98eZJASU0pouic=" }, - "androidx/sqlite#sqlite-framework-android/2.5.0": { - "module": "sha256-Rno9DYYOC8sBatT8cat+iztgwTczY9uVtik+x060HMA=", - "pom": "sha256-jR8mVzR+BdcUWZC9yE0JGilqLOHszAB8Jeceuu8Czuw=" - }, "androidx/sqlite#sqlite-framework-android/2.5.1": { "module": "sha256-ZI1TN/XKPmc5AOkBruHqLO7urlXwqEj4paTqIRp7/n0=", "pom": "sha256-2WSBmYWTAX9wpb7mWvPZPlNw5zT1Di05wD+FQNysEPA=" }, - "androidx/sqlite#sqlite-framework/2.5.0": { - "module": "sha256-FW6lVi3zQaBj3L4+hANkFe6Bt8kCOlimk1iIfl3rBL8=", - "pom": "sha256-Ufzy9ZRxmPxzhScwHU1ImmU3+4lH7vR5mNmByeEF8Zc=" - }, "androidx/sqlite#sqlite-framework/2.5.1": { "module": "sha256-tdhtLN2FGEDzgD15ZZLmWmE+fFHiD/JNJv/RkspsIv0=", "pom": "sha256-BP5dtTQjaEm/2NrP97gzneiExQGsS9O6uA6LzSUP7Nw=" }, - "androidx/sqlite#sqlite/2.5.0": { - "module": "sha256-NplIHJ/Fh59CvG9fIv/8tuXSP3WGLmbwB+/2MdcWl3k=", - "pom": "sha256-rT9uj0qsJCjS/sbcmYdgBKmLeI0EEKj0sWmrV4JtVj8=" - }, "androidx/sqlite#sqlite/2.5.1": { "module": "sha256-xzNKsVReRLXpm1gtD9WeblkX5vPaBURS5d3kUILMgbk=", "pom": "sha256-/M1BJDQ9r/vVzcyQVmvEtk5Cpf0VBz6V9l79EWQvYSQ=" @@ -655,24 +672,24 @@ "androidx/viewpager#viewpager/1.0.0": { "pom": "sha256-H3L4NjOdA8brAT9lB152yocHWld1eOtPlfdKOl0lMSg=" }, - "androidx/work#work-runtime-ktx/2.10.1": { - "module": "sha256-u1MV6vn5zZPaPGq9QlRkAv+c/ZYK/inAa8y1BjaL/oc=", - "pom": "sha256-C5+3GU6moZjX2s1pIYu/LENppzN8BmpsbkM8Zp4V2o0=" + "androidx/work#work-runtime-ktx/2.10.2": { + "module": "sha256-ickTIBoWS4EJzMuTcwXUV+S1Df9lprlpU2EK3RzRP90=", + "pom": "sha256-wsxzCqzuMssdfhPNby6Sj9KFhay3IbeQOFTR+Q2UCTc=" }, - "androidx/work#work-runtime/2.10.1": { - "module": "sha256-t5w/kvv50/GUgkcq0sFu0bWQtULybFUmjkmR09G4J0o=", - "pom": "sha256-BcMAkG8TjKb4k7eaXVdHoXUJfR6zTLKDO+hiKInKRQ8=" + "androidx/work#work-runtime/2.10.2": { + "module": "sha256-JwysK08uAnmpL/EQLd6ecUnvhOuhzGvzYlzaCjN1V0E=", + "pom": "sha256-4kOzw3ucBn6hvehjOSdLdFA0hqIyH9cD53nF29PJQHI=" }, - "com/android#signflinger/8.10.0": { + "com/android#signflinger/8.11.0": { "jar": "sha256-wdyixoNjTuGilCmPnHF5V4r2qG4IC9xA+WGRW8XIFC8=", - "pom": "sha256-e+/8XwhqnGXn48JvQ/dw7GU1VVPGXPbvV1VmAcvo4Pg=" + "pom": "sha256-lVz97NSxN0en5/yRESQtxBrZkTz1T4agfY+9OT1s5rM=" }, - "com/android#zipflinger/8.10.0": { - "jar": "sha256-uh8yqiVavk2rZlcd2RlTBdMCfyYfn09GWJizDN/9CbM=", - "pom": "sha256-pqEGBQecuWf2EA0m8ti1gA1oPTL1H46cdsLHGIUb1Vc=" + "com/android#zipflinger/8.11.0": { + "jar": "sha256-pqaPA+jZ+JRGiMNsbRbCU+gaYlkwrx0OteWSvSstqeg=", + "pom": "sha256-WNm2+ukdPjXs4DY+aUSk6N5vi6m5rcCRR7A9hYcWVEM=" }, - "com/android/application#com.android.application.gradle.plugin/8.10.0": { - "pom": "sha256-2WPDIV9XhiE43r7pKNp+Q6xQ5PgjKymc0uhxwulBk34=" + "com/android/application#com.android.application.gradle.plugin/8.11.0": { + "pom": "sha256-wR/imjMuX+SuYmhoQLtdF3iapXPn5RH1ZniLoQ6TGH0=" }, "com/android/billingclient#billing-ktx/7.1.1": { "pom": "sha256-PMPwTqj+PMOAi75eG0Y/3jQzM1RDOqeRERHQzK6Dt9g=" @@ -680,112 +697,112 @@ "com/android/billingclient#billing/7.1.1": { "pom": "sha256-S+5D2uFUS1LoqOUCefEyBPcrve1/ECdDCbG4ekhLdgU=" }, - "com/android/databinding#baseLibrary/8.10.0": { + "com/android/databinding#baseLibrary/8.11.0": { "jar": "sha256-eUETcJ2rIbBsJis3lec8twj7rK5hcV80Nh4a9iN6GHA=", - "pom": "sha256-vXYoi2GF99OqTpiHAjNoB45X0I9NvmKLM8zbriPYNuY=" + "pom": "sha256-y/esFtP9pNnvsu29WRzmQPCBXlE/JcV7gYDGIK33GlY=" }, - "com/android/library#com.android.library.gradle.plugin/8.10.0": { - "pom": "sha256-MhJo8KivD3cHKrTILRo8RInL7jrjRtBTTJ2HgAuCNG4=" + "com/android/library#com.android.library.gradle.plugin/8.11.0": { + "pom": "sha256-wf5gq5QB86UxDrdEsLrTWC+MMzOu4huRnnVEP89h58I=" }, - "com/android/test#com.android.test.gradle.plugin/8.10.0": { - "pom": "sha256-Ox7VPNpDUH+V9/P/YkF24cFWcAMw6tWqtobHk6w8I5c=" + "com/android/test#com.android.test.gradle.plugin/8.11.0": { + "pom": "sha256-W7CsRDvGqrU6zVMIqS5CM4dZcbJCsmfKnNS8vYUyAGY=" }, - "com/android/tools#annotations/31.10.0": { - "jar": "sha256-slmV+nsiDTX7uOMl3wcfgpFpG/uv+XNMmOOPRewqc+4=", - "pom": "sha256-SatMBbsfoqgvuEnXgoJUgQ5u9HqxkAKLynxpqRXJzC4=" + "com/android/tools#annotations/31.11.0": { + "jar": "sha256-O0u5YgwX0Z5b2RrBmICAVTVztMO3Of3ZJBb0Ly2vPng=", + "pom": "sha256-r9OQGrTApjmfliLd7L5qZBoHyEXHUCkzKngbwlLN728=" }, - "com/android/tools#common/31.10.0": { - "jar": "sha256-3odQy6qwTW8g5Tc2wmkzRBcn119KeoHjOZHYNvipi28=", - "pom": "sha256-49LJlVIaL/MCZhBYlehj0kEeHuueBOgIAeRlBNZm7xw=" + "com/android/tools#common/31.11.0": { + "jar": "sha256-drHPLe9xlGSrIyYR3JgzVrYlwtUxUnesKDGZ0Vbq0Ms=", + "pom": "sha256-/S2zStVQbDPmril6YqhFftbTR7McLRkBbJUPMwNkVwM=" }, - "com/android/tools#dvlib/31.10.0": { + "com/android/tools#dvlib/31.11.0": { "jar": "sha256-488/3JR3iN7o1bqnbLcqZlcRdLxHQe3w47q5enypDhs=", - "pom": "sha256-3mSZOOhjPR2fP2Nk3C3hCeWhPWW8ktFyXS1XEeLk9UM=" + "pom": "sha256-vfevf/HM+ZS2TVm2LCpIybBMk6DubLho0pTqS2fkI3k=" }, - "com/android/tools#repository/31.10.0": { - "jar": "sha256-y5vLcVmzlde6lCggbQ+RTmcKKqRk98Uif1aYRBFV1EY=", - "pom": "sha256-0yfoqT9l/KkM0sGI2oOIPlDKPjaJ2n36/keXxxjJObY=" + "com/android/tools#repository/31.11.0": { + "jar": "sha256-CVvsthiTfR0qTXepIdcFY+yf/aBdYuwa/2qbrnAdOdo=", + "pom": "sha256-DvfKbaaNygrPmGMeI0yC0PR5Ra8fHVdnHGxeV9Vv7B4=" }, - "com/android/tools#sdk-common/31.10.0": { - "jar": "sha256-yECN914ESYqHjzSeqGYO2E0aTBXpcaAh1zgQ2SEnnBE=", - "pom": "sha256-c3a3yYeT4gwn6br1TtrisVHEND7Hnrd8JzQts61YrXI=" + "com/android/tools#sdk-common/31.11.0": { + "jar": "sha256-RvRkUiLTk8ETG+Hmb9wL4NpNfyqzxopygwg2f5nzvfI=", + "pom": "sha256-ekG4TV10Iad3e6OmNZMbMMV1lwV63bkrVkTHL6pTryE=" }, - "com/android/tools#sdklib/31.10.0": { - "jar": "sha256-rxU9dVAmS59570oCsPiRftTVonZkTOjeOdfs9meU3iQ=", - "pom": "sha256-4mtxyEPu65TyjVZuPJo6K6mBtyhZ93XvUSG6htGRtoo=" + "com/android/tools#sdklib/31.11.0": { + "jar": "sha256-0jYEUIEsWwp4XXykkn0CL+5VfEUTKiIOqH5t8kYMN5A=", + "pom": "sha256-6WAZeGqaj2+MTqC5uk8cVIKcH8UnMktfeqVVIr5wtTs=" }, - "com/android/tools/analytics-library#crash/31.10.0": { + "com/android/tools/analytics-library#crash/31.11.0": { "jar": "sha256-zKl6wpoTKb0xCj6DK25X9GIn5QGqUpwApj3yF8XX30E=", - "pom": "sha256-I9kcOXug70JwaOrZnkeRkvv8Of700F/WK3m64WxyzQ0=" + "pom": "sha256-r+kjvgiQWdWIqFCEnfMO3ZyBdAGn5JV84kbfDBtD6SI=" }, - "com/android/tools/analytics-library#protos/31.10.0": { - "jar": "sha256-TtHjA1QlvIebIjdWd5BrmHscYy9A8qg+quhO/9ZWyz4=", - "pom": "sha256-pQpGXJ5R7c3UAlbrR2YuFQtaISNFtlt1jY+Zi8K6JaE=" + "com/android/tools/analytics-library#protos/31.11.0": { + "jar": "sha256-Lnx006VCV+ThLDm4d5zHrjDb50ipwSw2SDXFiS+Sp/w=", + "pom": "sha256-7qeKlFiPfROgMqIRS/BmR6yCGBL1g0eF7BoJ1ZKHkVc=" }, - "com/android/tools/analytics-library#shared/31.10.0": { - "jar": "sha256-ONP9oaxMsPiXSkho2hNhoDz6uTDlLlcp2Zut5AOCRZw=", - "pom": "sha256-/0wrCA5O/KivxgcShoi3izbiLqrDANqDhBlhZgN4ucw=" + "com/android/tools/analytics-library#shared/31.11.0": { + "jar": "sha256-MGNVuvoHJ6sb/8q5S6S2B/jOe5U8m6INWNcrMlwajOc=", + "pom": "sha256-UanXMbz111Ny3fPCqe4Uy6Z0DBWIFMyA0y+WoYGAQes=" }, - "com/android/tools/analytics-library#tracker/31.10.0": { - "jar": "sha256-D8VeTSFfSwIdiBFyrO+CRkBh2WLf67EToFQNxwRZKOU=", - "pom": "sha256-kQgQX7LLk56mOeWB4DW4xBzsKLBDXzF9h0rAZCRdsTg=" + "com/android/tools/analytics-library#tracker/31.11.0": { + "jar": "sha256-oOL6G81oJbwcOVTgogbYgIP0a7FhxlD+fImA6xOvwII=", + "pom": "sha256-vMf/HCkG48GSeYTwl1aIhex3zemzes9idy9AgshV3jU=" }, - "com/android/tools/build#aapt2-proto/8.10.0-12782657": { - "jar": "sha256-673QOhSusBctjagiKcBO4iFSQsSDnpr0A1vmsNpXT7A=", - "module": "sha256-sv9o11C+gCwtcrbBh62+UiGPOxpHhLQ7MIUjVre39VM=", - "pom": "sha256-YmDIdQZjAJhzGdkAZ4bbemtrRvHEByrcWu3JxheEW7I=" + "com/android/tools/build#aapt2-proto/8.11.0-12782657": { + "jar": "sha256-gNgZ2tFr9IKRelfEemmtjYca1uN8z/4h3DCCATMxrBU=", + "module": "sha256-OQtaYe0x4z69dzUFvjhYtjYvSDos8LwY1pQ+63AaRt0=", + "pom": "sha256-ejgzq1F2zAJwbJS/DksTaVVF4QKBAW0+2DGmGHnGFcE=" }, - "com/android/tools/build#aaptcompiler/8.10.0": { - "jar": "sha256-9rxMjBRJ3xK/Xg//kzkwsdkyed0F7q25uHkBd7wWqeE=", - "module": "sha256-jtrtl/+VMnAUu4b5tiPVg9cYUTrHCnWslr0aNnUzQGM=", - "pom": "sha256-hLt+9ZD5a8CK4+F1ew3wWprmZIBBXRYOnIoZRoB0apU=" + "com/android/tools/build#aaptcompiler/8.11.0": { + "jar": "sha256-XXZ95Y+IcHXBEBYivNzeweoBXSXIQBHD9vifIQKC+mk=", + "module": "sha256-N/RpR/BmfCvi0yDAL1KieIgiNKfn+tpe6Y9wDE9StqM=", + "pom": "sha256-eLw7MO1eHRuGjwZSzLq0En2okVlx+b6oZe2ScVKU39E=" }, - "com/android/tools/build#apksig/8.10.0": { + "com/android/tools/build#apksig/8.11.0": { "jar": "sha256-wHDtE5RinXRkGqCQb2Cy/6Hud+Y2ah+TQ39ZcXsa64k=", - "pom": "sha256-EMF99CtEGyhmoIIsmWbYCmtL9TbDjf7UPfnUcsGnS1E=" + "pom": "sha256-BugrMzgqEkmfLRqZ63k+Q5xj6RhskQ/TY9zAekWpp20=" }, - "com/android/tools/build#apkzlib/8.10.0": { + "com/android/tools/build#apkzlib/8.11.0": { "jar": "sha256-KQkclFclL5l93+r7M91lo3OtRYQBKPlFgy2Or9kRhWE=", - "pom": "sha256-HnycqO1k5eIK6cDmKTivpYwQmCwhQdPD/GIHPxhlvoc=" + "pom": "sha256-8LFTw5o5EpPf/BUU7Rpcnz0odGFF3NyMPKkP0OI63j8=" }, - "com/android/tools/build#builder-model/8.10.0": { - "jar": "sha256-OcZc2etFY+LRJ4BA6DfOoxrRi5be65QQ6J+GdrpYeBM=", - "module": "sha256-yUpe2DpDDttd4wjfMWVa0WHSQ+RsO6ta78giS50SRRk=", - "pom": "sha256-9FYrg9Euwm/Ihi7QR3ww7xpJm1/Ieu6E8tVxIRcCqrc=" + "com/android/tools/build#builder-model/8.11.0": { + "jar": "sha256-kiGJm3j3GGikuRibF1wGYUzqOzXNqTuQ0hNAnzvTkbg=", + "module": "sha256-7s14ttJuclD2S2Zg/+2FFYTCxfaBuFrQYnRr20TcwwU=", + "pom": "sha256-g/1Km9OwhN1CIWdUoUESxSHfEWKzGhnRhtGSHFwpB2Y=" }, - "com/android/tools/build#builder-test-api/8.10.0": { - "jar": "sha256-fDqVa28mqOe/EgIw3Zzidc8+WZY2WH9WbfFkKXNBMEw=", - "module": "sha256-HyR4D2PHBsXohIEotxtavd/vSre/wejqMSPJnJZnGj8=", - "pom": "sha256-tjtLzvrUQMBzM81lYvGDDxl4HxYpoZMGBRKIahqG9vQ=" + "com/android/tools/build#builder-test-api/8.11.0": { + "jar": "sha256-Uo98QTkYdqCRPZQ2cv1qlPjag3RkoZ2hBIRYWr6tgmQ=", + "module": "sha256-TpKTKZPSa4TecJVACk4RXYDWGlPLNyF+g2F/L2uj9p4=", + "pom": "sha256-YjBBJGHHtI7t/8Wg4bwwZjQNXqExjXONIy0kXuPvbsM=" }, - "com/android/tools/build#builder/8.10.0": { - "jar": "sha256-iPC/F8Bcn6pXi16/Z2NRzwDr07HaU4JytdcgAHTWMkg=", - "module": "sha256-JdaN8hrJCBiwdVw/hKABKJR1erkdmoCHzNS34L13Vdo=", - "pom": "sha256-lfg6wyeBtU0PXlcKxLTFDI3PGKKrmkYVe+MSQ7VtJB8=" + "com/android/tools/build#builder/8.11.0": { + "jar": "sha256-zy3t1TBZfiK5H4NtkLLDxHHE4bU1hagbibK+PEFhTN8=", + "module": "sha256-puqtnS6yH5Q7Y4f1nr+0FzMp0eOLh7KY1wCa1CE77Vg=", + "pom": "sha256-P4DAqaxBmaRa7BNymW7FU9rKg50GxBe+jhYlrNLgB0Y=" }, - "com/android/tools/build#bundletool/1.18.0": { - "jar": "sha256-sH80Y4O6x9Xdu6J5Tdx3BWWoOuaR2AMyJk1C3Zv7RQc=", - "pom": "sha256-1yMMv3Zau+J7hTN9XHA6oBYkrVGZE+jdX3gqHbV78HE=" + "com/android/tools/build#bundletool/1.18.1": { + "jar": "sha256-pzNBp5RavLDmuJccexsoAb12UAZEfKDSQ3pCYNVyzqw=", + "pom": "sha256-XE33suMfF/IOS429YqK3hloJpJof0pMaNZ/TlOy5taU=" }, - "com/android/tools/build#gradle-api/8.10.0": { - "jar": "sha256-Dr5zvmoURpuWMzTUlycCXJQZUqcBuJ9T8ISdmXoiwZk=", - "module": "sha256-ybEmSWn74n0hb1zzAv53Zv1z91BY5ZvfrX48IFHrBY8=", - "pom": "sha256-X0S3nEtpkUoh1aBuFm5LPrRjdhLQ0o4xshreDKEoaR8=" + "com/android/tools/build#gradle-api/8.11.0": { + "jar": "sha256-PoGbctcxFbYqQEo0DHV0SQorbZ54oW6sfx3vS/wcSRg=", + "module": "sha256-7IMDLhw/7PZHyck3F9q+4e3XRtWFmwL4F0AEy0biMb0=", + "pom": "sha256-6ZHYIea3dJjpliHFG909fym5122rBq5roMulEwvvgyU=" }, - "com/android/tools/build#gradle-settings-api/8.10.0": { - "jar": "sha256-fOw5taiVzGoqEvf9rhXeAbwWAFSs0NsB59X+G0JUqKo=", - "module": "sha256-Bd5fgyiQlVwJWF9bwRCvebKc3sKvLhXvXcGw1oVZ2ng=", - "pom": "sha256-obGDjWtpaiWCiJMygOkgQYutkFp36ZqLDtVW5g8deSs=" + "com/android/tools/build#gradle-settings-api/8.11.0": { + "jar": "sha256-5LruQeH/ZxdWe75gQjTH12iBH02gfy65m46a6ME0+CM=", + "module": "sha256-OqBaD2nPi/Jowui5sbuX6X/DcZJVBhX0pvtwNwHFbp4=", + "pom": "sha256-gFbPEvAMn1nqOgYVssm3w3TC39X/oCN1ciUrvmFmj9U=" }, - "com/android/tools/build#gradle/8.10.0": { - "jar": "sha256-Y3t6fssgUzttLVQBvtB+IFSetwABnGJX8TfspzoMtBk=", - "module": "sha256-Iza6MByrOlsNoT+3r7VFaN2SwyNZP4rcdkcfvo1RGyA=", - "pom": "sha256-IG1jLK9ARC/2YsMUlRZj2fA/lEc3iIfkAaTuEfy5kLI=" + "com/android/tools/build#gradle/8.11.0": { + "jar": "sha256-Nk2Znm57SzNBPKYxyq3ISBWe0M1XH2twlEoFNrdBwQA=", + "module": "sha256-0txp+79xmaXFWAE0a13x/HaWJI9cvjRsWLxWBaMduU4=", + "pom": "sha256-Ze58jjjKcJ9KQwuxtm24BxBWPpZJzgCIlccApVfhaLE=" }, - "com/android/tools/build#manifest-merger/31.10.0": { - "jar": "sha256-/jUnvG/Gm5q8BGbv9axTCz5CO0k5U+qykZb4UbmiRyc=", - "module": "sha256-IoYaVdQDJczJ91YHAJXDhs4zURAa0igrelZmyKJt5cM=", - "pom": "sha256-MGmY7P5Ftz3pfColxU3/dIpSyCWjc3OcKJ2Mt+xFR2Y=" + "com/android/tools/build#manifest-merger/31.11.0": { + "jar": "sha256-mFivacd7q2qT2y7OPkTgjz9CIhGfFFDj9oL4pu6xWus=", + "module": "sha256-EjmWxyxmh9dH1aByyRgGxC6MPcH/Xvn8Ih5r7VSkZ2A=", + "pom": "sha256-WxfQdR8pczeHc2DjqshxCwrzhi19LY4JMb8K/ej/evs=" }, "com/android/tools/build#transform-api/2.0.0-deprecated-use-gradle-api": { "jar": "sha256-TeSj0F4cU0wtueRYi/NAgrsr0jLYq7lyfEMCkM4iV0A=", @@ -801,57 +818,57 @@ "module": "sha256-NsJVdrGZk982AXBSjMYrckbDd3bWFYFUpnzfj8LVjhM=", "pom": "sha256-M7F/OWmJQEpJF0dIVpvI7fTjmmKkKjXOk9ylwOS6CEI=" }, - "com/android/tools/ddms#ddmlib/31.10.0": { - "jar": "sha256-OHzoa8wSkvZh1+/xwtZhoAYVxYUV3th8Z5y4t4suczE=", - "pom": "sha256-+jiH6l1gUISVPHHV+mQnA93VAUmj6xtyveUl6OdBnyk=" + "com/android/tools/ddms#ddmlib/31.11.0": { + "jar": "sha256-g5lX+WEQBxPqDu1iioaEzDmqR5Yxw2JJeT5t9+DNY9g=", + "pom": "sha256-jj+6/3DmvZW4NQCm6F7A/JUlhweOBV/n1FsFl+fgP00=" }, - "com/android/tools/layoutlib#layoutlib-api/31.10.0": { - "jar": "sha256-mzyH721IzecYggffCFz3RIVh9XW3iMtKet25TSVRAaY=", - "pom": "sha256-HUNOeuKN1NHFlEmq20Hx01qp0Vvo43h5Daa3uHTIW1w=" + "com/android/tools/layoutlib#layoutlib-api/31.11.0": { + "jar": "sha256-0GvGUCR2MqSk5llrhzEgGfRekAJnxUdsR6W/puP9MTI=", + "pom": "sha256-wX1CRCI9RknIr0jaYSY7G+NYNv/idvf8gJuWIkZZvv4=" }, - "com/android/tools/lint#lint-model/31.10.0": { - "jar": "sha256-EzA9sIF+FVqeUfJ6tMgFoMqW8RrPhgk99CsIgIR80xM=", - "pom": "sha256-Yc6TRcNec4aR8CG2NYTCDfyTStlcx+nCrQxtLgs9DOA=" + "com/android/tools/lint#lint-model/31.11.0": { + "jar": "sha256-hDZKm/DyNFQdZo1CMYIhUW/Tpyc0Jb7i7huzZ0yOdyM=", + "pom": "sha256-gaR9PjmP+MBHLwpHlZRP6b8es+YLCG5/umqyhU5Nn84=" }, - "com/android/tools/lint#lint-typedef-remover/31.10.0": { + "com/android/tools/lint#lint-typedef-remover/31.11.0": { "jar": "sha256-Sjujur/Xnm/Ge872R/tOz+r1m0gbEI98LrpNHFxt6o4=", - "pom": "sha256-MeTFZeMqCISp8Z4MEIU2q/sSVQDcfkM1b1fQkuP5hvY=" + "pom": "sha256-Cbl8bxBvSywU9bbz079EXQzXwGlpXKNKNosc0NVQgus=" }, - "com/android/tools/utp#android-device-provider-ddmlib-proto/31.10.0": { + "com/android/tools/utp#android-device-provider-ddmlib-proto/31.11.0": { "jar": "sha256-BHrs3WbhBhN/d6UsRC8bg9t9boSWiZgAJR8gbH853mU=", - "pom": "sha256-fLjCQu9KIEFmAG09lV8q9O7EkffXy5+E+7opI/Q8N+c=" + "pom": "sha256-ci8k2qAx+nbp5EgHLPoZsEZAqS0jI5PdZTwiZAdlneA=" }, - "com/android/tools/utp#android-device-provider-gradle-proto/31.10.0": { + "com/android/tools/utp#android-device-provider-gradle-proto/31.11.0": { "jar": "sha256-ZagpFgS/3h9vdcqFMqOBQ57IH9lY8yeCqwBH+2HZp6E=", - "pom": "sha256-erUmufR5UzBVuETFKq4L9T7poqJ4gvKcTprPRvryXSk=" + "pom": "sha256-rUnay54jM4GngZov+eFjsmc+T+VHquEbeb6XdN8fqFQ=" }, - "com/android/tools/utp#android-device-provider-profile-proto/31.10.0": { + "com/android/tools/utp#android-device-provider-profile-proto/31.11.0": { "jar": "sha256-PnsJj24+yuMbb3kJw0O07AmqGNion0G/kgd7pLBW9FM=", - "pom": "sha256-Apf4AIlaA/P8M/dc30sjnjJRjH+PMiLVFGijf4AB5lA=" + "pom": "sha256-QmymPDj8CuvPEnzlfHaz4Wjmt3nwFgvR6VUzT09JOlk=" }, - "com/android/tools/utp#android-test-plugin-host-additional-test-output-proto/31.10.0": { + "com/android/tools/utp#android-test-plugin-host-additional-test-output-proto/31.11.0": { "jar": "sha256-a6fmrCII10wbtfHRRkq6/GpF2HELIEVaLcAq34cmvIM=", - "pom": "sha256-dKtJv0CWS57g/ZSuOpU6AADassFOq/S93HRTAy6Ywh8=" + "pom": "sha256-Oha8JbdkGb3JJr6FbZaTnjME22E7uSdPFOdgBhqdAVg=" }, - "com/android/tools/utp#android-test-plugin-host-apk-installer-proto/31.10.0": { + "com/android/tools/utp#android-test-plugin-host-apk-installer-proto/31.11.0": { "jar": "sha256-RXBdYbIQBuhTPmz4q3lYp95t7KzmjtbAnbit4SFthZw=", - "pom": "sha256-uwQdmnnENoQbdrUVGFhcOVnsgBuhMJ15od3hY5x+N8w=" + "pom": "sha256-LyoAyxc1piFEmm1+meU/CcaSA/8SM7wfCPYcAde11AA=" }, - "com/android/tools/utp#android-test-plugin-host-coverage-proto/31.10.0": { + "com/android/tools/utp#android-test-plugin-host-coverage-proto/31.11.0": { "jar": "sha256-+oZxmj3F3kZffgwCMYRBTCf4/VOjT9VXKJwL9t80AkQ=", - "pom": "sha256-B2wuVyWr3p/SauGRpaTHZwnn0AXzfszPywZNF46Gd+U=" + "pom": "sha256-JEuGq6thHpp6QVcan6WfzSF+PAqL2yP4CTeQi57ssRE=" }, - "com/android/tools/utp#android-test-plugin-host-emulator-control-proto/31.10.0": { + "com/android/tools/utp#android-test-plugin-host-emulator-control-proto/31.11.0": { "jar": "sha256-pPNKrg+f+gJtv3FRQ23XrlO+y3JiK0DyxHnKyJQ9kxk=", - "pom": "sha256-lEnG0PJTlHKGQegkQh3EGFRM332UMuJWSXWOWGs94c8=" + "pom": "sha256-LRnCJ9hVD1KyvA/3lFFcJYfu9bUV8x6QFx2E4qaKKPo=" }, - "com/android/tools/utp#android-test-plugin-host-logcat-proto/31.10.0": { + "com/android/tools/utp#android-test-plugin-host-logcat-proto/31.11.0": { "jar": "sha256-wfbrus2tVZtu/k6qKVYVUrMxVjlfBpzZcD/aCcRi3qY=", - "pom": "sha256-Ew0jb4v5p+FYMUs5CgjWgoaDcKEa/gbWfS3feKL5Dr0=" + "pom": "sha256-hXogYRjeW3HTJ4baEEFRVgQ6Y8s6J/ZnHQqx550miyU=" }, - "com/android/tools/utp#android-test-plugin-result-listener-gradle-proto/31.10.0": { + "com/android/tools/utp#android-test-plugin-result-listener-gradle-proto/31.11.0": { "jar": "sha256-1Cm5MS3/oFAzgdHuGxipmb2QHnRWYSsvtIxqXVosr4g=", - "pom": "sha256-oCstaVlTkDkLpYSVUiOH2tY0xsK/vTt2uVJdVS1656w=" + "pom": "sha256-sY7hGE3urySMtAyA3xu6+Z59QGOkwVepym9DQtvGZi4=" }, "com/google/android/datatransport#transport-api/3.0.0": { "pom": "sha256-FTe+vUTaLrfjvnP8QlnhEW8qaKUwX0/iPGzqmm+E95E=" @@ -877,23 +894,23 @@ "com/google/android/gms#play-services-location/19.0.0": { "pom": "sha256-zOYKDEJQ5b5tM/RlBbpyaQSKaNR4hiyHv3Ycae+E2j4=" }, - "com/google/android/gms#play-services-measurement-api/22.4.0": { - "pom": "sha256-IYChgin6X5HaU+0FQBhTH0X9OZKBeZoWKRNcwaa6mIw=" + "com/google/android/gms#play-services-measurement-api/22.5.0": { + "pom": "sha256-qtuWUqLgaMVw+khRkJ+VHprA9pZb0TDVtouQDwFVE00=" }, - "com/google/android/gms#play-services-measurement-base/22.4.0": { - "pom": "sha256-TbHX0gADHgScPgwAFzdhDskPyhhE7FAHmPvFvVMeUz0=" + "com/google/android/gms#play-services-measurement-base/22.5.0": { + "pom": "sha256-o5FaYtA8j6B0G5m1/sdQZY+ayqodgU43tXhk2N8REwI=" }, - "com/google/android/gms#play-services-measurement-impl/22.4.0": { - "pom": "sha256-x/7XVacw9PyrMIh4DuU3a5nuuW+tOGoUHVdnFfQMPaM=" + "com/google/android/gms#play-services-measurement-impl/22.5.0": { + "pom": "sha256-YuD/dmruQqbeDlvMr7HdcUx4spyjdW33oiJ4gKw7VFw=" }, - "com/google/android/gms#play-services-measurement-sdk-api/22.4.0": { - "pom": "sha256-4HIh+9Fp+/pWnRB0rgc5b/dhseWE48nB34NiJnkxceQ=" + "com/google/android/gms#play-services-measurement-sdk-api/22.5.0": { + "pom": "sha256-dT+ZbrBg2wu9eYXLx8ZcIS3wAAiDtNi+N+iQqX1D/KM=" }, - "com/google/android/gms#play-services-measurement-sdk/22.4.0": { - "pom": "sha256-ZYAeAD0zknf7+nVXhVloQ97mjb4lRMfzw3nm9IlpkaU=" + "com/google/android/gms#play-services-measurement-sdk/22.5.0": { + "pom": "sha256-GINY/gaRZHNBHCYeSxwxqIrwEldW5/CMsmjOHjs7vE0=" }, - "com/google/android/gms#play-services-measurement/22.4.0": { - "pom": "sha256-HRj6ILCMP74uryQIO1DYFdsgSAVk9+wKS1CxNsFlf8k=" + "com/google/android/gms#play-services-measurement/22.5.0": { + "pom": "sha256-uGy1w0LOQ3D8hfLlN/ztF+BXMDAVMWDK+Erm8R5RtC8=" }, "com/google/android/gms#play-services-mlkit-barcode-scanning/18.3.1": { "pom": "sha256-QbW2a8X1FAnADmJ/zDG1WSB2s09Xo2S9iaAcCtlpARE=" @@ -927,17 +944,17 @@ "com/google/android/play#review/2.0.2": { "pom": "sha256-308kkM3bZR/754TIxbl57GmZa8aHynzWeMfV9lsol+g=" }, - "com/google/firebase#firebase-analytics-ktx/22.4.0": { - "pom": "sha256-YlyMHo7RPjkLablVpWNFrIazxdHzWfBTtvFfE+h83ds=" + "com/google/firebase#firebase-analytics-ktx/22.5.0": { + "pom": "sha256-Ja0jCyb07RqrylXAVXLgDo+px2Hrjkz2aYyJI57YxzM=" }, - "com/google/firebase#firebase-analytics/22.4.0": { - "pom": "sha256-gIe2ygLGcTmM8hFKYf8ZkVfPhxg7Hk0FkN9N4lB7yWY=" + "com/google/firebase#firebase-analytics/22.5.0": { + "pom": "sha256-rbTmdQMtspL1TBiclAqnlu2DJgtcsZfVTWt/v6qvf2U=" }, "com/google/firebase#firebase-annotations/16.2.0": { "pom": "sha256-CFsRHeSXHLO5OP+QAMyAeQEE/WmlE0doTftybmnoUko=" }, - "com/google/firebase#firebase-bom/33.13.0": { - "pom": "sha256-twZwca4gjbKMl2S0B+6qZ8AmSL8EYRS5WjSoHj8OJPI=" + "com/google/firebase#firebase-bom/33.16.0": { + "pom": "sha256-C4HV/KMtU6f6xMV7WhE0Hcs1Wczqm7ECj1uiRQSdfH0=" }, "com/google/firebase#firebase-common-ktx/21.0.0": { "pom": "sha256-wn7MtIuViBFtb9MvRle8Wd+FUAJDIpNVjbuX6YeK3rg=" @@ -954,21 +971,21 @@ "com/google/firebase#firebase-config-interop/16.0.1": { "pom": "sha256-IhBbGLF3a2JCIqQUmw1LfnFAYePSh3gxfy15i/n1yHo=" }, - "com/google/firebase#firebase-crashlytics-buildtools/3.0.3": { - "jar": "sha256-lTtvOUIoP4MyzBelm8omSepJ0U4AcvLB8Bdi666981c=", - "module": "sha256-Vg0/SkmSvv7kiljgsGputgcIE8FDxmbCt/q37cMPwQc=", - "pom": "sha256-zycY4U+tJ2fL6JTfCetGZlsIMRY6ZqLz2Z4F//cIiMg=" + "com/google/firebase#firebase-crashlytics-buildtools/3.0.4": { + "jar": "sha256-vskyyWmCfVu9ZYd9BTGZ5Rbh9Vxk+k4NCrF+tMXspzI=", + "module": "sha256-jLnZXI8Ckns1HjT3TcKlUYk+3X+IDoueh2fQ/mis5NM=", + "pom": "sha256-pY0pC1XTprFkj08gkR7pVrzQtnPUdCu4vjlGMjgw4TY=" }, - "com/google/firebase#firebase-crashlytics-gradle/3.0.3": { - "jar": "sha256-hp3oxsIg3ZpeJ1qURvUzteY2KBMEQypmtBo9vWTaArc=", - "module": "sha256-ROCgO216mnM9PDsOdJImb3JFw0k+TB2QHi2GrattHIQ=", - "pom": "sha256-OAu863wJGTNBnGzVU9q9EQjm0PjhE/OoWXQSIOsURvU=" + "com/google/firebase#firebase-crashlytics-gradle/3.0.4": { + "jar": "sha256-nR2LYlEy7t8VIedW34+wL73yNSVdC95PSAHxyELFppo=", + "module": "sha256-8Bi2qxjl4bg4KPl89XWBXnHYeoiEhcFDK072wUSALEM=", + "pom": "sha256-iBVTk6QUfToPLIXAUVdcgg1ixlLcGHzbypkUMVbcv+g=" }, - "com/google/firebase#firebase-crashlytics-ktx/19.4.3": { - "pom": "sha256-Wk7KlwAQrf60xvmEMRBxCs3SRHyEJhOAv5Pt42KFaZE=" + "com/google/firebase#firebase-crashlytics-ktx/19.4.4": { + "pom": "sha256-ijdG06Oyk2vlpdKO7p4P0We2XKd/Gj5s9KkShC/Ci6w=" }, - "com/google/firebase#firebase-crashlytics/19.4.3": { - "pom": "sha256-6XvKPVmwVsEDUpDiKg2uMts07+wul9cypABBaalbs2A=" + "com/google/firebase#firebase-crashlytics/19.4.4": { + "pom": "sha256-91Rbhg1JC0N/PugTERpybi4kqoj7NZE/p0ayy3ZgEJM=" }, "com/google/firebase#firebase-encoders-json/17.1.0": { "pom": "sha256-yCPL7XoOdb8w/tu6Qv8cDIdS49wW7cz30PLl1stpx6g=" @@ -994,11 +1011,11 @@ "com/google/firebase#firebase-measurement-connector/20.0.1": { "pom": "sha256-exiY9N12nBHKu6lwJUbWiAEV6B191v8ra+JI7hVtyLw=" }, - "com/google/firebase#firebase-sessions/2.1.1": { - "pom": "sha256-zx//xlCnAedecd+9qSRfjoMc52zEcT7DfSnPAMWWdww=" + "com/google/firebase#firebase-sessions/2.1.2": { + "pom": "sha256-tvW0izoSECpVsrp7jVJQmnIgb82w13qiz3krMC042vU=" }, - "com/google/firebase/crashlytics#com.google.firebase.crashlytics.gradle.plugin/3.0.3": { - "pom": "sha256-+RoUEI3EikQQ3cppuvFBMnWH6L0MKUs89fxEjnegrX4=" + "com/google/firebase/crashlytics#com.google.firebase.crashlytics.gradle.plugin/3.0.4": { + "pom": "sha256-iFfEwc6gbfCcEwq06gHLE6aowrRuxKcrefPQuxk09OY=" }, "com/google/gms#google-services/4.4.2": { "jar": "sha256-M6xbjCDHycyB6JjZ9Ncvjl8Xo1UFGCaDzYFexpOS7I0=", @@ -1048,22 +1065,15 @@ "com/github/ben-manes/versions#com.github.ben-manes.versions.gradle.plugin/0.52.0": { "pom": "sha256-sLbWCz+UCuWgFAfwNJ6d86Ayph+FXkoXt9vakSprU3Y=" }, - "com/google/code/gson#gson-parent/2.10.1": { - "pom": "sha256-QkjgiCQmxhUYI4XWCGw+8yYudplXGJ4pMGKAuFSCuDM=" - }, "com/google/code/gson#gson-parent/2.8.9": { "pom": "sha256-sW4CbmNCfBlyrQ/GhwPsN5sVduQRuknDL6mjGrC7z/s=" }, - "com/google/code/gson#gson/2.10.1": { - "jar": "sha256-QkHBSncnw0/uplB+yAExij1KkPBw5FJWgQefuU7kxZM=", - "pom": "sha256-0rEVY09cCF20ucn/wmWOieIx/b++IkISGhzZXU2Ujdc=" - }, "com/google/code/gson#gson/2.8.9": { "jar": "sha256-05mSkYVd5JXJTHQ3YbirUXbP6r4oGlqw2OjUUyb9cD4=", "pom": "sha256-r97W5qaQ+/OtSuZa2jl/CpCl9jCzA9G3QbnJeSb91N4=" }, - "com/google/devtools/ksp#com.google.devtools.ksp.gradle.plugin/2.1.21-2.0.1": { - "pom": "sha256-uhlRo9qxiovCyTnXojCw2VO8auNi3VIKR3zfXLFHGOE=" + "com/google/devtools/ksp#com.google.devtools.ksp.gradle.plugin/2.2.0-2.0.2": { + "pom": "sha256-Awt8WJILvYtxsouoASiiJkzm2zBZbBR3uO3yqGagKdk=" }, "nl/littlerobots/version-catalog-update#nl.littlerobots.version-catalog-update.gradle.plugin/1.0.0": { "pom": "sha256-GYyQmAuNNhqUfOxCqqunYrNdonBkZ7QktyWucwiPhrY=" @@ -1076,20 +1086,20 @@ "org/gradle/kotlin/kotlin-dsl#org.gradle.kotlin.kotlin-dsl.gradle.plugin/5.2.0": { "pom": "sha256-pXu0ObpCYKJW8tYIRx1wgRiQd6Ck3fsCjdGBe+W8Ejc=" }, - "org/gradle/toolchains#foojay-resolver/0.10.0": { - "jar": "sha256-DNfKn57RuooyPxkCwFryHdYiOhMDRfvnj15I1YzNbUw=", - "module": "sha256-SduV7YEABA8dZfCWuied7msSeCSNL3k7z7itAg59HNA=", - "pom": "sha256-vndZUF4PPTTVzJzcaGwZxlIuhMzg+MEJ69LW9HsYqSU=" + "org/gradle/toolchains#foojay-resolver/1.0.0": { + "jar": "sha256-eLhqR9/fdpfJvRXaeJg/2A2nJH1uAvwQa98H4DiLYKg=", + "module": "sha256-YZDPDkLmZMEeGsCnhWmasCtUnOo0OSxnnzbYosVQ/Lk=", + "pom": "sha256-m8SLSeQi2e2rw5asGNiwQd/CIhLX+ujjVmfShdSBApo=" }, - "org/gradle/toolchains/foojay-resolver-convention#org.gradle.toolchains.foojay-resolver-convention.gradle.plugin/0.10.0": { - "pom": "sha256-OpLrFa3uBcGiaCT2SIcqVx6fk99koO3L4TTjjtLY4Q8=" + "org/gradle/toolchains/foojay-resolver-convention#org.gradle.toolchains.foojay-resolver-convention.gradle.plugin/1.0.0": { + "pom": "sha256-8TMkmhh1Suah0nAdANhJsa+6ewaD3bX8GxinAHHOwvo=" }, "org/jetbrains#annotations/13.0": { "jar": "sha256-rOKhDcji1f00kl7KwD5JiLLA+FFlDJS4zvSbob0RFHg=", "pom": "sha256-llrrK+3/NpgZvd4b96CzuJuCR91pyIuGN112Fju4w5c=" }, - "org/jetbrains/compose#org.jetbrains.compose.gradle.plugin/1.8.1": { - "pom": "sha256-GYH8Wx36jvXMEJwhdeX8TPQKWTyS8eYGa4IyvFuOi/k=" + "org/jetbrains/compose#org.jetbrains.compose.gradle.plugin/1.9.0-alpha03": { + "pom": "sha256-7yv4AbRLZ9pu2jJsRBHPByRxySJi1Du3YhJv/74Y6wk=" }, "org/jetbrains/intellij/deps#trove4j/1.0.20200330": { "jar": "sha256-xf1yW/+rUYRr88d9sTg8YKquv+G3/i8A0j/ht98KQ50=", @@ -1195,26 +1205,26 @@ "jar": "sha256-oTtziWVUtI5L702KRjDqfpQBSaxMrcysBpFGORRlSeo=", "pom": "sha256-724nWZiUO5b1imSWQIUyDxAxdNYJ7GakqUnmASPHmPU=" }, - "org/jetbrains/kotlin/android#org.jetbrains.kotlin.android.gradle.plugin/2.1.21": { - "pom": "sha256-yQJ8PFvvM+juTV1hVDoQQ+lVK3nw861EUldPgCOc2DI=" + "org/jetbrains/kotlin/android#org.jetbrains.kotlin.android.gradle.plugin/2.2.0": { + "pom": "sha256-/PjWqrmCUof4NLw2FtA08+36m4yxrhIr7pOZcPs4n8Y=" }, - "org/jetbrains/kotlin/jvm#org.jetbrains.kotlin.jvm.gradle.plugin/2.1.21": { - "pom": "sha256-FzBWEHNO+8hXMdwoGuk+Vfh1P596rNYd5CNnz+MabfA=" + "org/jetbrains/kotlin/jvm#org.jetbrains.kotlin.jvm.gradle.plugin/2.2.0": { + "pom": "sha256-kALsce2lmj+9LC/mUmCaz3lOCHEbETyXdeZHrzdyOqo=" }, - "org/jetbrains/kotlin/kapt#org.jetbrains.kotlin.kapt.gradle.plugin/2.1.21": { - "pom": "sha256-7aOTHx8thbup7TU/ZdRkqSlfSYRlrchOf8gt6yE5CPI=" + "org/jetbrains/kotlin/kapt#org.jetbrains.kotlin.kapt.gradle.plugin/2.2.0": { + "pom": "sha256-aLQJ3YH9kBMXhLcBP7gFB+tVkOWoYsra32AGU01n0ME=" }, - "org/jetbrains/kotlin/multiplatform#org.jetbrains.kotlin.multiplatform.gradle.plugin/2.1.21": { - "pom": "sha256-vDXLn0VjKnIjjB+5N+w+Ly4QAcDa1G46hMVV9+wNB+I=" + "org/jetbrains/kotlin/multiplatform#org.jetbrains.kotlin.multiplatform.gradle.plugin/2.2.0": { + "pom": "sha256-Mdrm+qWFL2BmZ5hJSZqeKPR24IXZrSwSEdwzQFlDhMY=" }, - "org/jetbrains/kotlin/plugin/compose#org.jetbrains.kotlin.plugin.compose.gradle.plugin/2.1.21": { - "pom": "sha256-+H67DOho+fBScE8F7lZGEWxu2t89KXGYukawKltjg1U=" + "org/jetbrains/kotlin/plugin/compose#org.jetbrains.kotlin.plugin.compose.gradle.plugin/2.2.0": { + "pom": "sha256-91hYRP+HSUQVgBJIhBVIr15JTORLi/I0ngJ0N0Gg6yo=" }, - "org/jetbrains/kotlin/plugin/parcelize#org.jetbrains.kotlin.plugin.parcelize.gradle.plugin/2.1.21": { - "pom": "sha256-BEY6tpSuhH14Tcpv5ygjp10psMfn89pDEkG+kvh8BMI=" + "org/jetbrains/kotlin/plugin/parcelize#org.jetbrains.kotlin.plugin.parcelize.gradle.plugin/2.2.0": { + "pom": "sha256-PJflge73mRMcPp0HA6r0gvBpCjN6tfGb4s82IA80RHE=" }, - "org/jetbrains/kotlin/plugin/serialization#org.jetbrains.kotlin.plugin.serialization.gradle.plugin/2.1.21": { - "pom": "sha256-X5lVwimv4qtP70Bnu1qdZdRHStTwBcqDk481HfSPCTY=" + "org/jetbrains/kotlin/plugin/serialization#org.jetbrains.kotlin.plugin.serialization.gradle.plugin/2.2.0": { + "pom": "sha256-8FlQFQfX64VZTgFOhnL4CYk7eDHDVgow0+GkStxC8OQ=" }, "org/jetbrains/kotlinx#kotlinx-coroutines-bom/1.6.4": { "pom": "sha256-qyYUhV+6ZqqKQlFNvj1aiEMV/+HtY/WTLnEKgAYkXOE=" @@ -1224,13 +1234,13 @@ "module": "sha256-DZTIpBSD58Jwfr1pPhsTV6hBUpmM6FVQ67xUykMho6c=", "pom": "sha256-Cdlg+FkikDwuUuEmsX6fpQILQlxGnsYZRLPAGDVUciQ=" }, - "org/jlleitschuh/gradle#ktlint-gradle/12.2.0": { - "jar": "sha256-7Ie8XQiag2FJMFM+hwVx8hYJB9zXbqUE/KlA7Wsji0w=", - "module": "sha256-xb5GVdm87pTDHwc3tDc8IYimk09sRtoqEP1Io3GK7Lg=", - "pom": "sha256-odmoVmUQz9ox8ex94Mb7ATYKjeYUkUhY2PINBBp2qYU=" + "org/jlleitschuh/gradle#ktlint-gradle/12.3.0": { + "jar": "sha256-alRfYdVA/Dn0v2HOhwzeoe+k5dIh0D+4Jxz2UZ8M8l4=", + "module": "sha256-FRP0XReCiy/3wZj3db489QqxUAlgYfBJzILy4LwDQLk=", + "pom": "sha256-eJGNQMkiaMUUJpmVFk2p5dUymjCnC8eLzlaR/kEPRAU=" }, - "org/jlleitschuh/gradle/ktlint#org.jlleitschuh.gradle.ktlint.gradle.plugin/12.2.0": { - "pom": "sha256-IzH3uRJILlhKTNZJ36dKV4vsSu3BXy2AuoCM6v2lNl0=" + "org/jlleitschuh/gradle/ktlint#org.jlleitschuh.gradle.ktlint.gradle.plugin/12.3.0": { + "pom": "sha256-yL4/A0jEnBKFMYuu2LM2Zw4+F82YJCDAf0wmLpf8zFk=" }, "org/sonatype/oss#oss-parent/7": { "pom": "sha256-tR+IZ8kranIkmVV/w6H96ne9+e9XRyL+kM5DailVlFQ=" @@ -1477,6 +1487,10 @@ "jar": "sha256-lNXLV7xl3OWIGstkISoYeEqE//xmzm6FiVDlhbUrTF8=", "pom": "sha256-Kub+oGSz+kWbGvMQzmzbeRaXLxflTyMcUUa8BMWWpqE=" }, + "com/github/hypfvieh#dbus-java-transport-native-unixsocket/5.1.1": { + "jar": "sha256-ke5p53OpJ9EQPGV/a8iKGF5mLrjA8bLwpuvPLhhhV7U=", + "pom": "sha256-SDR+djhSNOBsN1gDuqBQPL9Fkzlk/8KleG1xRAX8LNY=" + }, "com/github/jai-imageio#jai-imageio-core/1.4.0": { "jar": "sha256-itPGjp7/+xCsh/+LxYmt9ksEpynFGUwHnv0GQ2B/1yo=", "pom": "sha256-Ac0LjPRGoe4kVuyeg8Q11gRH0G6fVJBMTm/sCPfO8qw=" @@ -1516,25 +1530,25 @@ "jar": "sha256-OfNnW5EObpuTgl+ChL7J9K0wRM0gpvfI/54vhpXr8h4=", "pom": "sha256-6oYs472WzLjKNrjp57rvLaP7v73CVrrqqMioc5EQdOc=" }, - "com/github/skydoves#landscapist-android/2.4.8": { - "module": "sha256-VgzO/pPFtB07ph5Q5aqkzkrm3ytfAN/7c29KZpiTUNg=", - "pom": "sha256-iJS4lD+Xf6WCx3yFneU2Hc7Pc6jEnisNSIM+SVLlLq8=" + "com/github/skydoves#landscapist-android/2.5.0": { + "module": "sha256-DhZga6tpFXWFAk1WcfU4dGujWNFkbLesK0WRnnmkj98=", + "pom": "sha256-bMAPADEY3rhS8yyawqLmavBxmEzVmqMYaSxFnwCsHxU=" }, - "com/github/skydoves#landscapist-glide/2.4.8": { - "module": "sha256-dzMJ27K3PmLFgPvrxvAbfhjSmsExG7c1MSYhu2dmnkY=", - "pom": "sha256-SpAhnCz4bXWbXPR2XrfKr9eWkFILm08zeMxWi5F7jgo=" + "com/github/skydoves#landscapist-glide/2.5.0": { + "module": "sha256-xLYTbuIbYBYtoiNum7tKu8S8IlJhp+3scdksAz/5BjA=", + "pom": "sha256-G9+wMYnwTnci2u8Y4Amh40TFLvbKrpWiInhr2EhKwfM=" }, - "com/github/skydoves#landscapist-placeholder-android/2.4.8": { - "module": "sha256-IDYlRyNDIA5cWko6GkjbE0Jbx73Qrn6VRtuqeg+k+0w=", - "pom": "sha256-j38h8cOPP0lPAXW4TtedGLDOBGZj0bVnXijkDQakof8=" + "com/github/skydoves#landscapist-placeholder-android/2.5.0": { + "module": "sha256-oovGTiVvDqAUyqvum+XFEgUaKrBC8rvVEu0zQD5qzn0=", + "pom": "sha256-GS6mEziVG4D7YKzkluY4ZApsosCl31QzpInQCYnYoGs=" }, - "com/github/skydoves#landscapist-placeholder/2.4.8": { - "module": "sha256-Jh8Hk2qESuNUqKVJhR2/E5lFJ6q8ORcVSd6ukNdFC08=", - "pom": "sha256-tq5Nw1ry9w/eXfWQtM60xo9hGUqKY44GiTOcx/+7rqM=" + "com/github/skydoves#landscapist-placeholder/2.5.0": { + "module": "sha256-p3W1VB4eEdzFLcnZ7rfJMRdYO+STR0Y9xIa9O4vwU7w=", + "pom": "sha256-HfCcEARJb62SNpAy8+4eunNN3eGsbIsaQb0UlLaOkeU=" }, - "com/github/skydoves#landscapist/2.4.8": { - "module": "sha256-LJyNxKJ3J6DUGKbfxF5EW1TD3QKSoBTjHuaOz3INP7Q=", - "pom": "sha256-cKSNxWXuip3qKTga8S/H365Bb0S/Y5RKuCLrxWknMNU=" + "com/github/skydoves#landscapist/2.5.0": { + "module": "sha256-2o/Ks8xb6jx4R3SyCH03QcY8nW8JNyGwY304K9bP+zQ=", + "pom": "sha256-5vtcTi4VQQIJCWBci+1tzjc1JWdEItHzmsImZjzmEog=" }, "com/google/accompanist#accompanist-drawablepainter/0.37.3": { "module": "sha256-M/O1/0mKSsp0U3Nccx7zo+X3FBkdEjKijeg/dtNC1VY=", @@ -1588,31 +1602,36 @@ "jar": "sha256-8d0j+K40qOkTZnI5kerQ1kmdGj6RY85VDCALAtdqhys=", "pom": "sha256-JlupWajhPDoGEz8EtTkWnBAY2v/U0z9TxFOrTLOG9XA=" }, - "com/google/devtools/ksp#com.google.devtools.ksp.gradle.plugin/2.1.21-2.0.1": { - "pom": "sha256-uhlRo9qxiovCyTnXojCw2VO8auNi3VIKR3zfXLFHGOE=" + "com/google/devtools/ksp#com.google.devtools.ksp.gradle.plugin/2.2.0-2.0.2": { + "pom": "sha256-Awt8WJILvYtxsouoASiiJkzm2zBZbBR3uO3yqGagKdk=" }, - "com/google/devtools/ksp#symbol-processing-aa-embeddable/2.1.21-2.0.1": { - "jar": "sha256-SpNovAbJIUydH8EqHYQre1d9usBKuvFN53j7V1Gv/CM=", - "pom": "sha256-OtZIlhwvEESzL19qR/Jt8NSucbykDwD1zG12aJU8F8M=" + "com/google/devtools/ksp#symbol-processing-aa-embeddable/2.2.0-2.0.2": { + "jar": "sha256-9VDzX6F6GFKRazyAGvRFjM2SRINsWu/n9Dh4xAJTVz4=", + "pom": "sha256-qZFWUgLy+0+T8VGdRAmfo0TIPMx+ZfWzHupPCvZCl5w=" }, "com/google/devtools/ksp#symbol-processing-api/2.1.21-2.0.1": { "jar": "sha256-ayE0FIw7yenPnPI51FAxohzXiZVqIVktGjIx/orjCa8=", "module": "sha256-FOy0d2qAcehhKYMzGUMTmbKmnm6b/tyymSU4vaymz8A=", "pom": "sha256-ITlIj5MwvlkbT6pX4bgdH7qDaWi1HwBx8JRJ4+0J8sE=" }, - "com/google/devtools/ksp#symbol-processing-common-deps/2.1.21-2.0.1": { - "jar": "sha256-Ac31K1nT4gaqT6YngdFQWly9mHQ8BbBy+cjLnmqi4AM=", - "module": "sha256-m2jwFBX8A9ZB+C4uSzfemenf30pYX7gltGAbtyyqWUw=", - "pom": "sha256-342+OK5yUR4F6fUuqhYaBU/Q01S1SfVI4AiPL8cp1j0=" + "com/google/devtools/ksp#symbol-processing-api/2.2.0-2.0.2": { + "jar": "sha256-WI0XxOqYKxECjCyCyx1zANJpAjqAaACfmun7LJwgxtk=", + "module": "sha256-e1kc4hav87nvLcW6YaJILf2yCoCguHKqeBfiF6GUEto=", + "pom": "sha256-LpHIxMD1CeqgyvTHvGSQb4xThDGEtQ2vEZzhTmnDU50=" }, - "com/google/devtools/ksp#symbol-processing-gradle-plugin/2.1.21-2.0.1": { - "jar": "sha256-nkVMuS/UrcL/6tWaCaiDH+Bmpk3Z5IPaVdjRrzAHGCE=", - "module": "sha256-Ilxdo/6zKViDaPfOQs89ZeXfInXx79tucXTQNv/lZyk=", - "pom": "sha256-werAp7M/MlLNFpH01DQo2PFDUVsisahkBqTFaJOSFjg=" + "com/google/devtools/ksp#symbol-processing-common-deps/2.2.0-2.0.2": { + "jar": "sha256-PWQhgL4YRkbs6cbnGEkA2S+E+AgNq4OKbbacD4rN1uk=", + "module": "sha256-/rMB8m3ZJ3h6KFOGTCqhbBH58tKM8A7Nr5mLvZSpBHE=", + "pom": "sha256-5NfdClANTlkifctlfc6QkXuEqGOdLx/Ji77xxXre0wg=" }, - "com/google/devtools/ksp#symbol-processing/2.1.21-2.0.1": { - "jar": "sha256-nCAksg9sUsk+NoUfHHcKMg0EEsrqzu83wo1A5uP8KZA=", - "pom": "sha256-Xj39efqTlcfwIhJfrW4QJM7Nqsq/p65ecgAn3+hpHZ0=" + "com/google/devtools/ksp#symbol-processing-gradle-plugin/2.2.0-2.0.2": { + "jar": "sha256-DhsXnkmhJCdkulr/OJSjYBv9jQbFk8U/B4Tl6rfSgNQ=", + "module": "sha256-/sbV+uNusZSW6M9ByiD8rI6HrpKjfbubj8ed/5zrTik=", + "pom": "sha256-Bf3JBIew+Bk3iyS/iZ60AJfG0BXFq/jvipe13vujm8U=" + }, + "com/google/devtools/ksp#symbol-processing/2.2.0-2.0.2": { + "jar": "sha256-P3xAhFT7NGkcRjyhu/s9DLyuzjwWiaZf/7IHyzJj0s4=", + "pom": "sha256-2vLS9bGuonFklT+wUdZSZz0LoGEwM49oJjw450DRzV0=" }, "com/google/errorprone#error_prone_annotations/2.11.0": { "pom": "sha256-AmHKAfLS6awq4uznXULFYyOzhfspS2vJQ/Yu9Okt3wg=" @@ -1797,13 +1816,13 @@ "module": "sha256-X8dNSe1IImBLtiMbgqZoSnycSi5TAsB5SFbcnqL/4PA=", "pom": "sha256-WjUR8QbYW0UjQSY4346LURnS6EQCbRG1hzpqlenq8xA=" }, - "com/microsoft/signalr#signalr/9.0.5": { - "jar": "sha256-LMwvKbfrr/bNZwo0+ACU/CoBNoiq0y2wvQkJzNL4ncU=", - "pom": "sha256-5T5tyLVKysrKZ3mveNRUtqgXBdVknPNTm7QvXPyeQOM=" + "com/microsoft/signalr#signalr/9.0.6": { + "jar": "sha256-vV+s9zcEYAuOQJFf2TpHuMg5W8FSs+EVqOqlinNcehM=", + "pom": "sha256-7/Ag4At+CRU1hm5cs4zv2sSVgzrGeyUubkhoQKpzlVs=" }, - "com/microsoft/signalr/messagepack#signalr-messagepack/9.0.5": { - "jar": "sha256-CNU8jLa3BQ/V2DCz1A664sgsM1R3sg3DH9aVDkJDg9g=", - "pom": "sha256-Tdf9NLg1fgxGTl5d3ve2tjW7j6C2r9Ad8dyom2EkS90=" + "com/microsoft/signalr/messagepack#signalr-messagepack/9.0.6": { + "jar": "sha256-cMIAHyPKApLPIQQRDcsfkSMzQzarquRV3OUkMMN7MMA=", + "pom": "sha256-dY45cjor/BosAWsU+KOtpcVX20wBVi877hIVXoyGaDs=" }, "com/nulab-inc#zxcvbn/1.9.0": { "jar": "sha256-OO+uurCRROsfTUyf9lDnnfh1qNbEU5wQWweaYGu32zQ=", @@ -1866,10 +1885,10 @@ "module": "sha256-p4CkJMVx4odVASiuADMjVibf/iFsuNs7ICRkmWrZaPA=", "pom": "sha256-AP000Iv0YxNiofVSLKpXyuKMosfpOS76My72Vs/anUM=" }, - "com/squareup/okio#okio-jvm/3.11.0": { - "jar": "sha256-LSJUGhkvkBpFyVJ0Vn1pV6we1hPUnkHbTl5dhhOc8CI=", - "module": "sha256-AOYfaQETdeeCYvf1PnoKcfjro+ScCUHVI9tQfumvdQY=", - "pom": "sha256-GnMR4mRILliufUvE1wgIfIhIz+RGC3Zyv19Qs09RS6k=" + "com/squareup/okio#okio-jvm/3.12.0": { + "jar": "sha256-tfXygLtijp9Y+L0557zSsJGdxm2Q8FuA06qyLxuZy+o=", + "module": "sha256-uN1osQceSgX6MRt25UGlSstzlewqYumMORr0zXE4umE=", + "pom": "sha256-pAbwPoSUEoYrTDCfayOjrbSQPK6Hg2+A8I8hOCVYNGg=" }, "com/squareup/okio#okio-jvm/3.6.0": { "jar": "sha256-Z1Q/Bzb8QirpJ+0OUEuYvF4mn9oNNQBXkzfLcT2ihBI=", @@ -1880,9 +1899,9 @@ "module": "sha256-P94fn79yxsMm1eiktTL0/Z/aLdDLFEK8pODHl9FBI4c=", "pom": "sha256-7lbAIUoPqfER2nExxVDo3ICvDL9WCVbBzNosZtdQa0E=" }, - "com/squareup/okio#okio/3.11.0": { - "module": "sha256-lQBY+qz8BqADxPIBUt+FR0InnLNh4EJ1FNjE5DdA3ew=", - "pom": "sha256-ehJQ9xiWx+cJPIDhNvgl4dl4kjHyPaHHk8TirhKrjA0=" + "com/squareup/okio#okio/3.12.0": { + "module": "sha256-LNVdKix2ILnLJdBBuXHv9JUdC/gusaRYzkIwsXNuzBM=", + "pom": "sha256-3gtsdWazZJTDnl3+5OWjcHzAYCHyBqbYo4VRLfOYDNk=" }, "com/squareup/okio#okio/3.6.0": { "module": "sha256-akesUDZOZZhFlAH7hvm2z832N7mzowRbHMM8v0xAghg=", @@ -1924,13 +1943,13 @@ "com/sun/xml/fastinfoset#fastinfoset-project/1.2.16": { "pom": "sha256-kFgkJa3B9AtBNi2vuVFzkxIlrKpeeWINXmvVL2Rikro=" }, - "com/yubico/yubikit#android/2.8.0": { - "module": "sha256-SptS5bP/1ieAdxmTYO2Lr4Le8ssEghOuH2Uj7Ts64QA=", - "pom": "sha256-GRhZ49RMuNFrEpRXT77NHXpAnTz0H656yd7X/t2x980=" + "com/yubico/yubikit#android/2.8.1": { + "module": "sha256-lomBmHzR2icSn+QkYhpXymi5G1cfBrxvRgFZrH80NOE=", + "pom": "sha256-NIap5JG1+GFlUCtvwRRSRtmyTu/E76zmzHJ++fA35u8=" }, - "com/yubico/yubikit#core/2.8.0": { - "module": "sha256-wJ6AlEsG6VQyD7bf8zW4zdPtMh/QNqwCJGeDo6SdATY=", - "pom": "sha256-fxYmcf7YzJqfWm8++GqxwL7VqWrz0zD6GKGjbydWxR0=" + "com/yubico/yubikit#core/2.8.1": { + "module": "sha256-PUf3GNMRKSlAbaSiJqxW/Z5Jfh3OmWGPKfU7K9kwohk=", + "pom": "sha256-910eH20xQuzXG7SX8H5+L4hF7WiUEhY7uQRwZjvZEVg=" }, "commons-codec#commons-codec/1.11": { "jar": "sha256-5ZnVMY6Xqkj0ITaikn5t+k6Igd/w5sjjEJ3bv/Ude30=", @@ -2077,13 +2096,13 @@ "module": "sha256-jD8ePehOFcwUKb4ZlnBqMrMRs5GeINdZgxFQSQkyaPk=", "pom": "sha256-WMAz1/rb9gj20GhvBqOFmNTTR5uFnLUyBbMLK3bcAfA=" }, - "io/github/pdvrieze/xmlutil#core/0.91.0": { - "module": "sha256-iAYWns8ZPjAIdClaXd35E8JGtsfrx6EpMWCBU0Swtd0=", - "pom": "sha256-/FejigXcfEthnxfi0F22c2oconOznLX84aAVbdc9Mrs=" + "io/github/pdvrieze/xmlutil#core/0.91.1": { + "module": "sha256-ml0JULR4s+Hx+Pg4HKBt8u7P4mbIOh9sZFG1I+Z+tCI=", + "pom": "sha256-uiWQIiFBRKD/rLYsNqCQAs38gpzsQ8f2bRDFD1Ac0KY=" }, - "io/github/pdvrieze/xmlutil#serialization/0.91.0": { - "module": "sha256-KLmiTXkINUMzy9+rpkSADEnOz2jE9li1svwqVq4gPVA=", - "pom": "sha256-f7xPoiQGtT7aFomJ9UtQsgghxocIPP+/um1pU9dmPHs=" + "io/github/pdvrieze/xmlutil#serialization/0.91.1": { + "module": "sha256-Y2E+8kbACKXn7vIN5pTnupH3NvuyuPKrk5phJ3eeXBA=", + "pom": "sha256-F5plNVCk6MvEubBClLhtWdV0dptRHQaNDDAz8IR9mzw=" }, "io/github/reactivecircus/cache4k#cache4k-jvm/0.14.0": { "jar": "sha256-AFawtCFJsLOuEFDFCmqddyw+66sPyIs6AOgHsqGgBms=", @@ -2095,9 +2114,36 @@ "module": "sha256-0w1VvLHRtgjT13QBNIipFT8J4KUZpZzqiT2JWzRBtNM=", "pom": "sha256-0rcanG8PxQPNnr5u5KjxEFcQI3CQOHxH0/Fnc7xSXfo=" }, - "io/github/willena#sqlite-jdbc/3.49.1.0": { - "jar": "sha256-fy8mouSmysbTc8MSdygk2h8uh7j2stXK0gTzr7dDObc=", - "pom": "sha256-/jizgkm7BJvMTt0/jXnhXxbfm65wkcmZ22VsCXO46QY=" + "io/github/vinceglb#filekit-core-jvm/0.10.0-beta04": { + "jar": "sha256-GWZzGFGjSZ+Hkyn6OxQqNjc+0tlhicTua2R6PvaP6vU=", + "module": "sha256-qZki67wQ9Got5/APssrPmJs0NfUUKLY5FgRmYMh78AU=", + "pom": "sha256-n1PEG4Qvn7qI2uD6PxpmZ7+Pu5cx61P/0XBSrzEVjmQ=" + }, + "io/github/vinceglb#filekit-core/0.10.0-beta04": { + "module": "sha256-sp77ASP+po07qDky8cmhGKZOFjRjIOjd3PfqtOQMIvU=", + "pom": "sha256-h70rRCWMXJ9kW+kyODBxBxaQgjs7JGMioIdl+Cv59wc=" + }, + "io/github/vinceglb#filekit-dialogs-compose-jvm/0.10.0-beta04": { + "jar": "sha256-DiLQCkaVgQANwgm9TZXFUXYr5mwtXLfvInuEg7xomMs=", + "module": "sha256-Dz5FHaaal2XCw5DTFg/j3FCpX5fTc32CgnsjdZcuii4=", + "pom": "sha256-mtTfkuOKFGRvAOzWpQhG5pb5TAVBgfuAWjEk1e682eU=" + }, + "io/github/vinceglb#filekit-dialogs-compose/0.10.0-beta04": { + "module": "sha256-szIm9+FcbW4YWXYRfd6TZy0i4K7KJQbDA7P3HjoPV9s=", + "pom": "sha256-RaoeHArZewK6txlVJAIByOSMhCqDIa2YcJt+E2HrT6s=" + }, + "io/github/vinceglb#filekit-dialogs-jvm/0.10.0-beta04": { + "jar": "sha256-esZVgeBxbgIWJA828pqFDrWydodyEFZ6kpfOeOgskA8=", + "module": "sha256-th+oYNXh2n8R4dcwX03/CEl7My4iVe2GcuuuSXYJqG4=", + "pom": "sha256-uyf1cpos073hiDtP8c2m/JosczjluNx3mW8HEsqsv0k=" + }, + "io/github/vinceglb#filekit-dialogs/0.10.0-beta04": { + "module": "sha256-fTwlgEILLf42hrg4KL8imhrEVLL47F2JsurahgcVLig=", + "pom": "sha256-M9B4GUtHwJNcnSWwoss0wFbs6a1DOnDW+TywjvAei3E=" + }, + "io/github/willena#sqlite-jdbc/3.50.1.0": { + "jar": "sha256-OEuIC9rwojorMvIKrs3KrWiTiWK7Vf3PrLSVJl+g3IE=", + "pom": "sha256-nhL7KwHWwBv2Ef5YrA3fHe54wqvvWUyI6dAFDNuGGMI=" }, "io/grpc#grpc-api/1.69.1": { "jar": "sha256-qNPW3McfOrYT1miEIoK0iL3ZPT6ZoO9dyn7ub6c0woM=", @@ -2135,14 +2181,14 @@ "jar": "sha256-3Vl71nXqoELz41eGSNkFDIE8RZXF3mhp753btEkAYDE=", "pom": "sha256-0g00aMt01WvlXtPUb2PKOO5LygkY2arXJ3pEj24HpbQ=" }, - "io/ktor#ktor-client-cio-jvm/3.1.3": { - "jar": "sha256-moY0FYgFeiPTukVi/civzvb6zQcWeKDCCzsooZ7DXIg=", - "module": "sha256-Gf3FXgMKwvEjvNH/Ln9y5kMptpOp6liaI+6ScJrB2ow=", - "pom": "sha256-W5X6Bt5nhVLN/vkqmdzS6oaZSitRolVGfk3Arnq6chc=" + "io/ktor#ktor-client-cio-jvm/3.2.0": { + "jar": "sha256-+dUgVhqv6f/QU62e7Q/plRXQk8mZUMWpWfwizO4nGwU=", + "module": "sha256-jWtn/ywh22zUkQvedPKnhlTU9/cnixLG9HTRdGEtr88=", + "pom": "sha256-qji8ErU/tVgJOacNfWgM7adhAsfYnWyB016Ztpq6wTI=" }, - "io/ktor#ktor-client-cio/3.1.3": { - "module": "sha256-A8RHfiHmBpt1S5eqX8z4MJXGsK2XfBBo0Zyt2BlkL58=", - "pom": "sha256-w8t9kA77xuTM6nvxrJSb1jjJ2CyIQ6bUjq/OInMx/+M=" + "io/ktor#ktor-client-cio/3.2.0": { + "module": "sha256-+ZrF9L6Iyj3JtuKfbVpn6x4xxWWhf7FQzsttk7eELbo=", + "pom": "sha256-nJsHPzRaBLhSsCDD/oUycXzTjaTL7U24gX2WNJScpyY=" }, "io/ktor#ktor-client-content-negotiation-jvm/3.1.3": { "jar": "sha256-nL9ZFoZF9UqanCHBoPFc1igjSyC7/z7BvWRoDxCqd50=", @@ -2159,14 +2205,23 @@ "module": "sha256-5oB4ORvBuH88HMIDRRt9L5uAhHbtptx2RKhYVIkA07Q=", "pom": "sha256-vlfjAdm/W8CML/w7hstr+TRX4ubqpXtWQYb/KnjKTkM=" }, + "io/ktor#ktor-client-core-jvm/3.2.0": { + "jar": "sha256-pGOdN2ghoZskLhOnAhXAnbCOQ8x4HFhnxsRyGIe1lkI=", + "module": "sha256-o6s8rQRLasNf4uR81Mlw3DFQP0/suvohStC7zF/XHeY=", + "pom": "sha256-TWP+xichdt+jxCR5NoU/IomZoRlafP0x5Bk/ZWjwyMI=" + }, "io/ktor#ktor-client-core/3.1.3": { - "jar": "sha256-7n7a34hBaAPCwgDunledhgDxDkFTIbWOGwto5dn8FVA=", "module": "sha256-EvDAELJfjLyCEWrqFFw6Hw8RAJXPgJE/Ori2ZTij9o8=", "pom": "sha256-x2jprwXTbd2mJ6sk5p2TvM1Zv9MICg9ejvxzSxAPGA4=" }, - "io/ktor#ktor-client-darwin/3.1.3": { - "module": "sha256-Thh0e9D94F2D6QaOLumEpLaMSJOx99sTIKm1JUTOl+o=", - "pom": "sha256-aAthFeAGeA+f7gy5WmG9W8rrLAPRSeHwYanF2GeLMOg=" + "io/ktor#ktor-client-core/3.2.0": { + "jar": "sha256-pBRb81E5q2Vlx7e6xHpq2UTa2y5PFutXgVELGXAFuhs=", + "module": "sha256-qqFVvuYjX18n7ugOsW5dS9q8u+D65Ney5u5QvPtffqw=", + "pom": "sha256-KODMWQnWGIKu0GWvvyj6AMZW7U7uTdd1QZGva6NKkMM=" + }, + "io/ktor#ktor-client-darwin/3.2.0": { + "module": "sha256-YsDo7y19SRWLRWWlmUx0Sy1eclE6zDW0/FuW/yfuFNE=", + "pom": "sha256-hTETmkmUVC/QsnjH+GJW5EttnGP81+/UYj48QmzuWaQ=" }, "io/ktor#ktor-client-logging-jvm/3.1.3": { "jar": "sha256-7KvwE7E38aacOc/+rhup42Vlk1eyFojxh27mz1D9ALk=", @@ -2202,64 +2257,114 @@ "module": "sha256-OOQgRWP3P5t/373byAHAmMawHYfTECKQ8sajYuoTUdY=", "pom": "sha256-93csYlM0BJC0293doSvci7K6B+jFvLjAtxvy9rbVgVY=" }, + "io/ktor#ktor-events-jvm/3.2.0": { + "jar": "sha256-hf5mvDg6YUDSIYpu6y9FGuFSO/Mae2lW6hIFHlXda0c=", + "module": "sha256-arc+z5dYEl5LFADfvwW/A+uE8QDNDKzq9WnN+Tvphfg=", + "pom": "sha256-EE2Zc10Qg9s032HhOs0GzjAZt+uvt5bLJK0WJSvrjZ8=" + }, "io/ktor#ktor-events/3.1.3": { - "jar": "sha256-EOdojQWik+k9467ZuxEfmpV00K0IQ9QIzfE0DHncx1c=", "module": "sha256-SrtBkdOeN5QGiSqErN705lqyJiG+hBE5cFn01GIa/vk=", "pom": "sha256-XestkhWtgPoJtSCKhitHo2ydHL0Yo/lM+jgOPUp3GDY=" }, + "io/ktor#ktor-events/3.2.0": { + "jar": "sha256-rrBZDG3hvFDTcQK49m/f3Ti9YY5GpotPJqqCVAHUAmA=", + "module": "sha256-JxvGfDX8ZvGUQJHiTAOaOn0ygoQfV9E+Xgc224x6J/8=", + "pom": "sha256-CpkFNaTY8E0BO0WqGtZWA5CKswnOehw7xDF2wnZqiFk=" + }, "io/ktor#ktor-http-cio-jvm/3.1.3": { "jar": "sha256-sErt4Y6cAIFoCW3FOj/AFhd7YaXsMCSvv4ysoM1dv0I=", "module": "sha256-IX4QLGEQ/ocl/6oSUKN+f0t1teTeERcrnPKzOp+wfAg=", "pom": "sha256-gOmz2o6VeGObSyn/TBTP6/IOzNW5xHEz0U+CV5L+CDk=" }, + "io/ktor#ktor-http-cio-jvm/3.2.0": { + "jar": "sha256-l18zlsutoCY75qO6mZsQpbHvXvr7nnoUmKV2cGvSuQw=", + "module": "sha256-kAsuhsHpJuxugdKUTM4+/BC3wdqU9ZE6MnoBaBk/YBQ=", + "pom": "sha256-tkFwlPF87PBZLfeXdxdBWwB3ymoaqOBnWEpZZd5/ke4=" + }, "io/ktor#ktor-http-cio/3.1.3": { - "jar": "sha256-IzLwt1DKuYqOi/YqikkohFAp8Ai79EzF2wgk7qOU3uo=", "module": "sha256-iHbg5qXpx8u3jesES57d9zrGdhAvd86GrXIcm3TtOo0=", "pom": "sha256-GI7a2ilETzpIPqUM1yUDesrifyZuP2+dGycMW/pfWMY=" }, + "io/ktor#ktor-http-cio/3.2.0": { + "jar": "sha256-n0Kl72BAnCHzg6HE/ce2aKntWWGRr0Wcu2u/zGzCIzs=", + "module": "sha256-bqCHNPgwY0g+mDTaThaiZ7m8fQrXRqtwx4aL29AcHhA=", + "pom": "sha256-wuJa9Vk4UU8ZljrjtqGaFYoVCXZsDJFCVUEvTnFJ7so=" + }, "io/ktor#ktor-http-jvm/3.1.3": { "jar": "sha256-ilDZS0b5G9VlgLkWknLWzWNvRCAyugeKFB2nBBNGWUY=", "module": "sha256-TspOEQpq9l7faaAXoJJLizyO01cuHvboyhnSp+jOsdI=", "pom": "sha256-+NbU7DyYNRpjYjfuqGVLjC6l2ME9YZR+fbjo+WaOjKo=" }, + "io/ktor#ktor-http-jvm/3.2.0": { + "jar": "sha256-xBBAzXvKAMFRBC38pn94xgypmXyVBtall+T/SXMxO+g=", + "module": "sha256-evRpN8jgmSUCB5LnLbn5fiCoI5oQNcLGF7O/a0Q/gcM=", + "pom": "sha256-K674Stcr4Q6HYainjWJekuGd7J7QnO+mzPdz62zCaB0=" + }, "io/ktor#ktor-http/3.1.3": { - "jar": "sha256-rUgmpsG5/IZUZ+5jGRCpP7WnGX9wJflqNkwRVcPJRSk=", "module": "sha256-bBO1SCiBE6ubWCOidWV2CulpkWOJ04GgZXyjn7vTim4=", "pom": "sha256-7idNqX1di1SNU4b3fULG67fKrD79rWPRwstbHLDkfqs=" }, + "io/ktor#ktor-http/3.2.0": { + "jar": "sha256-gcr33Wbarrg3GSfpHw6KdW7f6uuExNavWqk5W0ZaxOw=", + "module": "sha256-SR+KhaIobe+G9JbvGQO58qQ/C3/pxGnCAP8bSWCUkcI=", + "pom": "sha256-DjixGl1n0hZlrEAmW6ixtHJjD7DKH8CGcQwenF+eeLU=" + }, "io/ktor#ktor-io-jvm/3.1.3": { "jar": "sha256-uy+2wAr6o0tTnLMOdYTTe/y6Fxwma725mQ4ANXncJME=", "module": "sha256-pUnfJeuyazKSWYP9oC41YPP++voCniJGncBpPNq7clE=", "pom": "sha256-mNkD8tAjCib7DVxoK61A2MlUq+e5d6FdyMFtENx0tcI=" }, + "io/ktor#ktor-io-jvm/3.2.0": { + "jar": "sha256-nudKCHSe46yiHRXRStZD9uwVy1dD3oxxpBPtCtO5Gk0=", + "module": "sha256-MTZwCuuI+OWNef3pmJ/FFw8zPIJnLWPSk4EklnCWUWU=", + "pom": "sha256-6U/dEZn4IIwfDE1EaQ8Q8lXj/0l3I0yar7qJXss5O80=" + }, "io/ktor#ktor-io/3.1.3": { - "jar": "sha256-1mdwNHtTpmLFy263VW23Ra0C/yaPZeBYL/SWg41gO5A=", "module": "sha256-YZ/tWS8/2Z8/x/U99YZuJSenDRzUitwSVxJqYxJ/nC8=", "pom": "sha256-7ktgsFmUplhPYYkmL7F/hTXWSW/IlKM16S7UiJogUk0=" }, + "io/ktor#ktor-io/3.2.0": { + "jar": "sha256-iJ00lkZO/l+f2cxqDcLlTx4x4JLHFapfSppnuRhxPmM=", + "module": "sha256-I/7VhPg+dVv1X6RtgOxt0IfIUeKDCdLjX81veKqgHzA=", + "pom": "sha256-sMol25cahBOaMt0A4cIynaCSC4wLflF/fzhe7g5fX1c=" + }, "io/ktor#ktor-network-jvm/3.1.3": { "jar": "sha256-+k5hZbWtS/XbM369Xxb5tZbcXkAfvqNDud6sthOCQK8=", "module": "sha256-Si6Qj4EHpZBwIUVoR9cHuGxQzp5tOaFrRO/WzPgvEAI=", "pom": "sha256-TFAXZfbtxft4UvcmvYFXJw2lCfKl58xWlR02Muwro9Y=" }, - "io/ktor#ktor-network-tls-jvm/3.1.3": { - "jar": "sha256-9nUHo+i/UqoI11NoLmzdoBlOOr51ARi5nJM2lT5Zi+k=", - "module": "sha256-R6w5Z4HWgpnnykgITN4N1ZNrh2FHNAH8wftced8TG7o=", - "pom": "sha256-x3zaqx/JtbTUdUvvzgAIbfXxCOn03cL2J4IqACeiFVU=" + "io/ktor#ktor-network-jvm/3.2.0": { + "jar": "sha256-F60Nw/8lRkCOMfsHbSEnJdkudcX0wKpq3BHhO5H58qU=", + "module": "sha256-9vXHFlbl7svKl7lcbsAqpR+yV9zS4rbGUrgVffVUmlE=", + "pom": "sha256-HJ7I6R90y7+Tar6N3IeTMkG6r7i3XKJUDmoNjhGFQhw=" }, - "io/ktor#ktor-network-tls/3.1.3": { - "module": "sha256-WfzehlGXLzN8L5kJEfakcCxaMcgsRVLnBQH0cFKq9Ok=", - "pom": "sha256-YCA6aPexaUd84QS42Y0YGf6p5yPYUSR419IdMcp/FUU=" + "io/ktor#ktor-network-tls-jvm/3.2.0": { + "jar": "sha256-9MbDDCTmogPdA9811t+2dIqiV2jg9LFpSXHfvW7V4/c=", + "module": "sha256-o32x+onYF78k49z/UEfagTDkn5GJKQ0ET0XmhvzgoCo=", + "pom": "sha256-lN4lQ/ggjPDQlanPnm1wgWF/ITwSiuO686LV7M1yWmE=" + }, + "io/ktor#ktor-network-tls/3.2.0": { + "module": "sha256-uMx5yZk+oI6yN1UEWTzRlLNRoDGUqoplT3Pp5ZGB9r4=", + "pom": "sha256-lHCneUsmRfgCcScixbITihhSr2rLaLBP928yWtpmQKc=" }, "io/ktor#ktor-network/3.1.3": { "module": "sha256-3TRbPopwzopilO5mDnAmO1v2Tkiz5hrJ50dlKpeeZxw=", "pom": "sha256-ilEKTIUHv+XJw7qLFA7eGPWCrBF1+mx46Siiv2XjyrI=" }, + "io/ktor#ktor-network/3.2.0": { + "module": "sha256-8MwP5FQIiKopVfyEBCR7GGzRdba/kKDhsTsnJPdDouE=", + "pom": "sha256-al9t+HeuujoThzRpQsZBNbo6BqNlatHSbnotLPySt/4=" + }, "io/ktor#ktor-serialization-jvm/3.1.3": { "jar": "sha256-DXBLwRSKj9mh8gBeC1GJza7TAw7+JLgjZFnEHDVvViA=", "module": "sha256-hrLAT4uo4LfDEL2gGGd1ra0iQbfx5Dru5CH6aHtD0bs=", "pom": "sha256-4ZshuXOBpTTKtMJCDaZBdTzYYMffWMvEgfrxfgw+LL0=" }, + "io/ktor#ktor-serialization-jvm/3.2.0": { + "jar": "sha256-wsRgZKU6GWBvhSI64lsYUv2FPlBgdjLYEjt8LRYjuRE=", + "module": "sha256-6dZR8GDqY1Atgo8WgLAESOb/MpSMYKKc9A3sivDxCFQ=", + "pom": "sha256-N+7xUPUNFlIagGnypc5+MK9HkZyFqUEPDXuNcAP6I94=" + }, "io/ktor#ktor-serialization-kotlinx-jvm/3.1.3": { "jar": "sha256-tNwvnU0d2o1IGgVNf4M7oZXwZPURX946sN/bi0L2H9o=", "module": "sha256-TQfjPiAej7Dz4Au8iPU6czUrNAARd3K6U8b1T03chLI=", @@ -2271,50 +2376,90 @@ "pom": "sha256-Apcaj2Ndohz/xUbuS2TLhUzxVSPNKO/Jax9BQOsEQ+o=" }, "io/ktor#ktor-serialization/3.1.3": { - "jar": "sha256-1usUAlHKWspctpxK1+8Yk1OiutpxL4Nog4RXCrJCzRA=", "module": "sha256-cEzCV/1TL86ynz3JxpmKhXw8JVuR5sAtlzXCi29Ywr4=", "pom": "sha256-hn199YlXfKzLAkrZuhD9YFZ8CfpoqsAU6QOZzuSEuck=" }, + "io/ktor#ktor-serialization/3.2.0": { + "jar": "sha256-PitxLP02z12azShNXSaWXtOaJ0E3ubgIJnabF5mmbH8=", + "module": "sha256-eNALGFWg2hKgKzrtJolTrYy0kMJj8/xM47gDpKnputc=", + "pom": "sha256-Or5R/gSKLU+XA5SEB+7XCj4xiKj6t1B8+xY3oGFpVJs=" + }, "io/ktor#ktor-sse-jvm/3.1.3": { "jar": "sha256-oq6KM4ux1EbRbc/qIYnvWlvjGogSOzh5Vit5VWZ6Vjk=", "module": "sha256-rdg6VuF2nwNnQhRnvrsHfPywrKIG5GKlJ9xYePU2K1M=", "pom": "sha256-QOpyqdXTF9TMFZl3/HvSlQED4m5/3C3sRKgxWNyzmxE=" }, + "io/ktor#ktor-sse-jvm/3.2.0": { + "jar": "sha256-c+xIcFv6jxPEnp8ehZ7Cy48Td52QrueIj6gt85oFL+g=", + "module": "sha256-LYICjTL1HMcKuKBiDyeFJBzObNF8DX4TYi2Ioa0sa6k=", + "pom": "sha256-vOu83SOYPEs9Dhl1wczVJZ3AvXab4cHsJ/oz7s+6rv8=" + }, "io/ktor#ktor-sse/3.1.3": { - "jar": "sha256-CZgN7Mg5zmR1e5ziCOTFcdyH/Iqx1JBq0bVWBfp5s8Q=", "module": "sha256-y6bUpfymP+8fbYEujnoYIC37tlUfFsrjPjM9aJ3xmmo=", "pom": "sha256-zm3mJKVfOZ/FzYOKH1e4NjEp6x5j851TbCQnpe2AZYw=" }, + "io/ktor#ktor-sse/3.2.0": { + "jar": "sha256-/RkfHhBqceA/o9hjMrIZ4TiTEn4gwqsEwQIVWMuj0So=", + "module": "sha256-niZmtRNf+NGLBEASWc1SS1gsOUIGw6fo3XGMbsIyQeM=", + "pom": "sha256-4QRK0xIdSQvCtY3oYq6gL59Rs604fQDNBVqvCh802C4=" + }, "io/ktor#ktor-utils-jvm/3.1.3": { "jar": "sha256-MzM5N7mPwMjpQ+5LELPqZrSXgt+1acRMFC2k8y2F3/w=", "module": "sha256-lWS9gapHoNIfgfAhNx2KfzP42nJXb42E5YTPe8KCZ7g=", "pom": "sha256-nkoVp9atlvtmX5kPM/TJDIUmPLkxUlDUmzEw3Bxx3Rs=" }, + "io/ktor#ktor-utils-jvm/3.2.0": { + "jar": "sha256-pqVaRmqDko/mmamWh14XZHXWmMIQFysWdSSTnfvTZic=", + "module": "sha256-DjcuPwEVZ9y/IxBGW8zCgfoR/hdxYoIecfOME7xh3JU=", + "pom": "sha256-JDo60kFa861QlOYAqDBxw16zd93hGbfBG/UMXpIDMb0=" + }, "io/ktor#ktor-utils/3.1.3": { - "jar": "sha256-8x9wURdB2HuriPQcJIu/q8Kokg/CsWr7iWvSkSQDyhk=", "module": "sha256-JZJhaENGuzO48fd5tY0RafZYNLa8SwOxzI6QOaVNFgw=", "pom": "sha256-i3GcmWpfQAiH+9aZyYfyQ59q3DGyS+I8UaOR+Yfinu0=" }, + "io/ktor#ktor-utils/3.2.0": { + "jar": "sha256-lxQWBCIsyh5lml1jdVLxYgV2cfCIBrgfbBgLn2rXf1U=", + "module": "sha256-zqOLD5vAMUKtBtMH/5kuVdmGQxCtx8n9eWsxjyivhnQ=", + "pom": "sha256-yP3bJ/sJjGNUv64EwCtZ3Huskw92qzscxWq1aaMCDQs=" + }, "io/ktor#ktor-websocket-serialization-jvm/3.1.3": { "jar": "sha256-Z/D1ZuLtUXF/btVfbStN7hyEvk6izZb8Y20L3w/UMGc=", "module": "sha256-u1PzbCOOIEp3AojhuUkEpyDqjMmCpBnr0NlthP/2Dpg=", "pom": "sha256-GE/EIEOdOTZc2yOAp9iqWCRQmuJ2WGYLrdUgiLTtRaY=" }, + "io/ktor#ktor-websocket-serialization-jvm/3.2.0": { + "jar": "sha256-t9qxpvzUHWG/tkindOgrVBDb3p9mY/ibLjS7pFQuT4s=", + "module": "sha256-DpjtsdkZrVh4lZxmS/lFfwcUDgvf2ijpdzpeNK7WVII=", + "pom": "sha256-wZ3vaimw48GBJ2gHpURtG0CZg8hHSKmFZNtNuyo9OZA=" + }, "io/ktor#ktor-websocket-serialization/3.1.3": { - "jar": "sha256-H4Kdk+9uqBnvMbwuO81vRj8f2/Zgrg6MngFGGSs1khE=", "module": "sha256-49SsMoW7+o4lNURzq9eVpX2Z28k5wL0+1ZjDH1JHSRs=", "pom": "sha256-ZrLLfZtUa9iXxCSSwsFvresrRhtWEK1tQbLwX9MAEeA=" }, + "io/ktor#ktor-websocket-serialization/3.2.0": { + "jar": "sha256-AvGnUHKPUjUy8UcnOKkcnlvnJX0vEEMYJl1CEAHUSIU=", + "module": "sha256-CBS0yGcS5Wc4uyQCWLU8DUS4oEvjtsQEK2T/mv/zM3U=", + "pom": "sha256-ZD36AJVAfOA1RXtwld5CDInZjzewacDwXeGW++JEf5k=" + }, "io/ktor#ktor-websockets-jvm/3.1.3": { "jar": "sha256-7yi08SBU7hJXZbcv4yMOIVpgtzsv8gcqXCgPzwkykHc=", "module": "sha256-0TNZF+t77kMTTSYVARydRRUdDN3+036GsoZN9N959ck=", "pom": "sha256-wpP8Ln5PBBczeWfnK4iFVsDICmv2vjSdzi9WBAVFl78=" }, + "io/ktor#ktor-websockets-jvm/3.2.0": { + "jar": "sha256-nB3Y3DLV40jzaY/nIdfmfYXsYhYrlAIA0BVMmVTg0oM=", + "module": "sha256-41Iz6Sol0uBSe0PwvHtDR91V7bAOq2kEPz2rxcrcqzE=", + "pom": "sha256-vebMXYTeFEb1FSXOopNBDRMebanIRj27X6Q6FButod0=" + }, "io/ktor#ktor-websockets/3.1.3": { - "jar": "sha256-+haBQSo9iI+FM+XkJwLzOOTgUmpr3dKhxOxk0WdTlMk=", "module": "sha256-la4yLJcPwcxRMttyqbkXOYd7eYEaHHAW4P02P4fTTlg=", "pom": "sha256-nfZPKimVknp58bfTOSkwi/8WWJ36VdYix6hSVIZMDWA=" }, + "io/ktor#ktor-websockets/3.2.0": { + "jar": "sha256-MHlCD81rVdgwyL7FkUIbFXsq1qWFg3FKkH0Hv0hU9ew=", + "module": "sha256-tE/49kz7lcs6fdk4KSXXcIcTxkPqnyz9dMr9u7USlY0=", + "pom": "sha256-GeZ8QawtKG9h7eldsHpDAreWzBZ3zdVrkouByhD3r+4=" + }, "io/netty#netty-buffer/4.1.110.Final": { "jar": "sha256-RtdOeRJarMBVwx8YFS/cXUpWmqjWAJEgPQuqgzlzrDw=", "pom": "sha256-cQrBnMAc2A32vpo/qtPCIrShoy9LVRN74HtgmdXaNWI=" @@ -2391,77 +2536,77 @@ "jar": "sha256-kcdwRKUMSBY2wy2Rb9ickRinIZU5BFLIEGUID5V95/8=", "pom": "sha256-lD4SsQBieARjj6KFgFoKt4imgCZlMeZQkh6/5GIai/o=" }, - "media/kamel#kamel-core-desktop/1.0.5": { - "jar": "sha256-m95Ec1kMqI54zowAfUfZIkOH2dAM5QCwbREes1jK3Ho=", - "module": "sha256-yeYv5ag1cY2PRF76XQkJAWLdojuH2c/tasPyYjK8LDA=", - "pom": "sha256-Rw4IeAxNPgNrTgxLzB9/a8ltkcCcgIuLy7BKdKzOrxc=" + "media/kamel#kamel-core-desktop/1.0.6": { + "jar": "sha256-wG4IrBw+CkpBIPcXferQDdUmtGfaxBfIZ8NSWOiZk8M=", + "module": "sha256-VU3MpwVYR+SNES3xh8zQIDnwhmxH4VzfdLwmVP3SGfI=", + "pom": "sha256-kXrYBmAYyQ5NhsQwPulfExtWbZzulBO3WGsGJ0bx0Kw=" }, - "media/kamel#kamel-core/1.0.5": { - "module": "sha256-wfbJq/THyXUfXbApy5yqxt6muwb8/+6Zboy6C+24FW4=", - "pom": "sha256-PE56RqFZCkQy9N35uq8g90QHRyYDoX5FvWt3kn1GES4=" + "media/kamel#kamel-core/1.0.6": { + "module": "sha256-DaLGNhTtGWftAZ/mjdvBBzSeLNEFHRvojL1j1eSt5dA=", + "pom": "sha256-ahgVUCdCeThwK8vNI6MV7kUPxO5rn7x9grKnesBhRFc=" }, - "media/kamel#kamel-decoder-animated-image-jvm/1.0.5": { + "media/kamel#kamel-decoder-animated-image-jvm/1.0.6": { "jar": "sha256-giSZznA98anVSB+1IvvIdrB+dJ5nPWILpMHe20V4rvE=", - "module": "sha256-VtkbHxaOcaDnNTBU59N7bJMS3C2y25wcty52cUZBkLM=", - "pom": "sha256-w30uWmufKCRwDHhFEYvysj8pmQrD4I2Th9vYmvSPq0Y=" + "module": "sha256-N+E4a4sIujiZntQ20G9HHUDIwHUvPL6pj6Tevdpk0a8=", + "pom": "sha256-dewkQjnaCed6CeXx/74cIFK4BYQoKC1XFhiwVsrb42A=" }, - "media/kamel#kamel-decoder-animated-image/1.0.5": { - "module": "sha256-jStUyQcQNnuNcjAZoKw0X9/pjIhImA4VazAETjSCERA=", - "pom": "sha256-Q9ny9AY5hPeiZOITShnIOu6engAbmmGRD9L+jbixAko=" + "media/kamel#kamel-decoder-animated-image/1.0.6": { + "module": "sha256-V6xa5gPkTBBMngoEBXa2td7tUNsvXWCEz9P4/95dqls=", + "pom": "sha256-hdtSPMrKRoeSBeYX/2hmYzS4Ld5RR6xbARjuOb3jQLM=" }, - "media/kamel#kamel-decoder-image-bitmap-jvm/1.0.5": { + "media/kamel#kamel-decoder-image-bitmap-jvm/1.0.6": { "jar": "sha256-ffbNwUGJzQci12Ist0EnDnNGkg3pBUOUCcy8iJxWaIM=", - "module": "sha256-zGn757litUMfe7kUqfI7JKi23unh1acap3TmXkQPK+M=", - "pom": "sha256-lGD9Tr0DqufyzIkC9IedxDjnvZm0dU4stx9Q0oRYBbo=" + "module": "sha256-3R0ghY51yny+QEjNXTg6wocSw9lTDBR/ypCSemvzTg0=", + "pom": "sha256-MYUhuWiAwmS+vHz6wndyiXYtrRpvJ5mZT31g5cxq87E=" }, - "media/kamel#kamel-decoder-image-bitmap/1.0.5": { - "module": "sha256-nJr/j635kWL619DgzLJ9rEQc2BWU/Np9JXSd28wrY2A=", - "pom": "sha256-p/H2TPeM5lwvCyra3RhnzDuJu8Xf8HT7G6cYDmCrsO0=" + "media/kamel#kamel-decoder-image-bitmap/1.0.6": { + "module": "sha256-taT4tHDPbUtpvhdMVJOzouGwa7ScvWMHs3LrNdvzqS4=", + "pom": "sha256-T+S0yX0oV/MpirfznMg0lsZLGnrBq4y+kaQAsQjeuNU=" }, - "media/kamel#kamel-decoder-image-vector-jvm/1.0.5": { + "media/kamel#kamel-decoder-image-vector-jvm/1.0.6": { "jar": "sha256-QDl8F6hdO+TV8Z1fkjzaWOorg4Co5A0SyGs1T6XaNQ4=", - "module": "sha256-altEa6yMBfKtj69iFMz1qqBnr2nvntPlrKVyRGkfW7k=", - "pom": "sha256-0NxFTL6Q8DDgUMS40wRBhBsamYWxyqa05BKzChjc7hA=" + "module": "sha256-pXz3e8u47T4qNXoG6kBxfBLo+fSlBK3EmmRMyHAbXpo=", + "pom": "sha256-yB5nwtxoScAx74mi7di0rasVlDgK8IadCNIubAFQ8sI=" }, - "media/kamel#kamel-decoder-image-vector/1.0.5": { - "module": "sha256-HUPdcB1GNBFylHELCD5A8UodhcxFltQNg3Gx11nw3FM=", - "pom": "sha256-pqNpz9O2ykyZuqHysjI7KOJChABniFe3Gxjsyftp2dQ=" + "media/kamel#kamel-decoder-image-vector/1.0.6": { + "module": "sha256-j2klK86bLaDiDONfHxADU/TuWmP/7YSph2nWKhgDMKo=", + "pom": "sha256-AQT12E5njjyg32cMra6T4dfUjsAgCyatBExBO2pjqIc=" }, - "media/kamel#kamel-decoder-svg-std-jvm/1.0.5": { + "media/kamel#kamel-decoder-svg-std-jvm/1.0.6": { "jar": "sha256-mJVQHQuB0g/IdMJc7jXk7jV/hgCqQq8GiDrIokcjufQ=", - "module": "sha256-7MAT2wcNoaeOeF8uxfE8phxV9Tji22IT9i8teEu4jbM=", - "pom": "sha256-SvZlMdDB7LVtVTDMvSAmyWUMKEXWoYFgy1MStj5mzXM=" + "module": "sha256-+k1g+pk+hl8qJ3bwPsMJP/X5t7ivumZhz99yCCYjnUE=", + "pom": "sha256-+QOIGeLL5OV8DHN14dzZ/7XBfD2ECW2d/H9g9Tz7Qdk=" }, - "media/kamel#kamel-decoder-svg-std/1.0.5": { - "module": "sha256-tnN/SyPpFEkjfqRLT5gIAPhnSDXczC01xb5aE4ORhIo=", - "pom": "sha256-G1qjfe4QOoaA1G/AqNQXRTHSas/5RN0dhCH5CZlWzoU=" + "media/kamel#kamel-decoder-svg-std/1.0.6": { + "module": "sha256-J44sHpthTT/+fBxxfTvzYFpYGRV+Tf+2cl2PX08Gkp0=", + "pom": "sha256-LsZWOB0SfQvNMj8n2Go7NOvmDyxP8oXztONU7pQz/5M=" }, - "media/kamel#kamel-fetcher-resources-jvm-jvm/1.0.5": { + "media/kamel#kamel-fetcher-resources-jvm-jvm/1.0.6": { "jar": "sha256-/3adsLLAdoG8GTfgnJIlybdk5tvg2Bl9HYOfp10VvXA=", - "module": "sha256-kBt0kEX0FEs/0+2iKckvGYxd+hN191lp4t+rEj/NtPo=", - "pom": "sha256-y9sbv8X+2060h8oqU4+xfBeeBj7MSeyFvpGiS2HtyT4=" + "module": "sha256-uDdBrTc2uYtoHJPeUdeksn7A7INCnicmvmKxxBYPHYU=", + "pom": "sha256-iV9UUY/VimW4AT2xKAG3MzoLqJZT2Y4mQFNSsSRYfMs=" }, - "media/kamel#kamel-fetcher-resources-jvm/1.0.5": { - "module": "sha256-r0Un5AhjgUTulvs3LK3UuMXgJu96ZExO6eVCUCwE0Wg=", - "pom": "sha256-fmA12VoklwTBtchPv4DBZUdGTJAho/zD1NVpOcLSyzw=" + "media/kamel#kamel-fetcher-resources-jvm/1.0.6": { + "module": "sha256-DsjkR1UZJc9g2VbOXSRHGfIPdh9itF0FxsvP/2pVyo0=", + "pom": "sha256-R70vqGd7vTAeYgSLcNNgRutJsBhNRd49+VH4j6a6/JI=" }, - "media/kamel#kamel-image-default-jvm/1.0.5": { + "media/kamel#kamel-image-default-jvm/1.0.6": { "jar": "sha256-Tifld5YlHAiEb3v826fMV5cZAxljoji4hENz/mkCxYk=", - "module": "sha256-7Arc2tdiP0Hd1wKZwIz2mStMlva+62QigISp9Hzg3LE=", - "pom": "sha256-2GgKnQcDIDbOZL9IlfmHb9v3MOWwv0yNAFt/ynMEt1A=" + "module": "sha256-asUCT+h96ZSOCLEjXtfGnKlUIj014A9pSVA84R4vssc=", + "pom": "sha256-Xk3ZX14k/qUfLV2d7lEhTs6BKXmLEHSKh6yuLHjUBYw=" }, - "media/kamel#kamel-image-default/1.0.5": { - "module": "sha256-AxxTzN14ROVEYw6+b1PeIh1sQ2aC6Jhb/LBnzCVTySc=", - "pom": "sha256-H5WGOjOFDf7MeSrEB09nJ8H3mSmCPNa4mUn9thoOWpU=" + "media/kamel#kamel-image-default/1.0.6": { + "module": "sha256-IuS2LmfZmrIGV9Fa0MCR0ch5kVAaNmANAyI/jcw5Rck=", + "pom": "sha256-+8VNbXDBeGHtMc796pwYjyBX+5ATim4v8SIqM12AxvU=" }, - "media/kamel#kamel-image-desktopjvm/1.0.5": { + "media/kamel#kamel-image-desktopjvm/1.0.6": { "jar": "sha256-4/p+EV9eWAl+cnYVz+N8ChJIS88fttFiAgt3lE1Lk+Y=", - "module": "sha256-uDovwll+5CXS0W/xSTZZroO53r3DsxFo0yJTb96nr7E=", - "pom": "sha256-HFcRo25YN1Exxnn7IRRmsb7I1/gEuJ7n2CUmD2FdZyg=" + "module": "sha256-/Zf+sUALQt24O8ORr3N/tVZm+F4LWW8UYXRiiLxebxQ=", + "pom": "sha256-IJieYj9byYcRnSvrIZW1/9fInjS/RipM0tq/qk28+qc=" }, - "media/kamel#kamel-image/1.0.5": { - "module": "sha256-xgQ/uhcLx42zt+rK1iq9xRwhpfhDWzFpcXcjunLSKz0=", - "pom": "sha256-wzD7yNQhnRizmUd/PUTzzRliHSJ/+NYrNtBxvca3dS8=" + "media/kamel#kamel-image/1.0.6": { + "module": "sha256-4kwxLZt9IGZUEnnRBhYJw+ALoflb9cp0rdC/mbAzZ/E=", + "pom": "sha256-axT5/CG3kg4nUH2pJHnj4cQ4USFv5rZ4rE+gduYwLKY=" }, "net/harawata#appdirs/1.4.0": { "jar": "sha256-5ImfxeiiZ9P4LUl+4BtIEKSxUCPnqBrwqlR5HFe8bBE=", @@ -2477,13 +2622,14 @@ "jar": "sha256-5aeVI5ZFCXV1VXgrtgKD5JAmEQE/EH5GANyTKY9z84I=", "pom": "sha256-R3eT3wLGgn3+Ab2wjwBqVXdeb6BS3ErN7aNMmTYopJY=" }, + "net/java/dev/jna#jna-platform/5.17.0": { + "jar": "sha256-t+PUbIe60utAmw5wSRa82BIGFo41cxLf3dDiU2ec2eA=", + "pom": "sha256-CjC3l622giFH75jLJJ7z+/SiQ1QqqGv59C+tnmgwWkQ=" + }, "net/java/dev/jna#jna-platform/5.6.0": { "jar": "sha256-ns6ovysbOZY5OdGLcEZO72DFCP7Ygg+dyroMNVGOq/c=", "pom": "sha256-G+s1y0GE5skGp+Murr2FLdPaCiY5YumRNKuUWDI5Tig=" }, - "net/java/dev/jna#jna/5.13.0": { - "pom": "sha256-9RXCV4F49FJH7Mp6nh2xCVMbHELyQk4lPO6w9rjUI3Q=" - }, "net/java/dev/jna#jna/5.16.0": { "jar": "sha256-P1IzWJp5nrZtwpaa+jQz+1aFnT14fFi5vH3Z6G8KJQw=", "pom": "sha256-9h/SxEqlg/Kiy8X8Z7DxmpIDyofV8OGNPVAwy+OQgIM=" @@ -2524,9 +2670,9 @@ "jar": "sha256-8ChUbXAya5MxSk9EjP0he1C4AewgMTzUYCipRgT0bWY=", "pom": "sha256-MgwRUMLF3ECTdCP56IjhDZ6LLU4TRsNJhkgWuir+Of8=" }, - "net/zetetic#sqlcipher-android/4.8.0": { - "module": "sha256-nMnnd8PBMitA+z02VBtKNnZlanDgWXgzVO/fxIw/JU8=", - "pom": "sha256-nmZ2h5cUFujueKDSJ8yjxVwWXGa1C1cmPd1Q0ojZHqk=" + "net/zetetic#sqlcipher-android/4.9.0": { + "module": "sha256-KI2zYC7myBnECW+3Saqb7imwCi55WR9+7jEm/0+Tnhw=", + "pom": "sha256-dC8AWva9vXMh/0e9Ql0Oc76OVzSsb00eUe70prT4SgA=" }, "nl/littlerobots/vcu#plugin/1.0.0": { "jar": "sha256-kNqd+zfMHidMTDImKE4AFIbPcz2XwNp7kvwiRlECT0M=", @@ -2647,29 +2793,29 @@ "jar": "sha256-NjmiTd+bpLfroGWbRHcOkeuoFkIYiOVx8oWq3v5TLNY=", "pom": "sha256-NeSfQTTeKsMmw6UKJXYsu021bzgC+j9zDMhbZTrQmHs=" }, - "org/bouncycastle#bcpkix-jdk18on/1.80": { - "jar": "sha256-T0umqSYX6hncGD8PpdtJLu5Cb93ioKLWyUd3/9GvZBM=", - "pom": "sha256-pKEiETRntyjhjyb7DP1X8LGg18SlO4Zxis5wv4uG7Uc=" + "org/bouncycastle#bcpkix-jdk18on/1.81": { + "jar": "sha256-s4xgSHHzaQEJo8AJgtkUVjQSXeM2WoF7oW65DYjiQsk=", + "pom": "sha256-gmKXCFw2VHLz1Fyx4sxzyl04h4vIQQjwVFl6+/WQPuI=" }, "org/bouncycastle#bcprov-jdk18on/1.79": { "jar": "sha256-DYHswxJFNrU5vOmqP+liG3+Eyc7jcbY1pbMceLeasdo=", "pom": "sha256-2PGgaxSddG6dmN5U4veqmy62E/s1ymfYrjls6qxmHuQ=" }, - "org/bouncycastle#bcprov-jdk18on/1.80": { - "jar": "sha256-6K0gn4xY0pGjfKl1Dp6frGBZaVbJg+Sd2Cgjgd2LMkk=", - "pom": "sha256-oKdcdtkcQh7qVtD2Bi+49j7ff6x+xyT9QgzNytcYHUM=" + "org/bouncycastle#bcprov-jdk18on/1.81": { + "jar": "sha256-JJ85ZBKwwM5n8lyBl9p1eyQbi+PsQZk4bABwSiRXRZs=", + "pom": "sha256-IDmQEivg/dNL8S0LeIwGVRYThqjoWLpD8G43CcLMdMw=" }, - "org/bouncycastle#bctls-jdk18on/1.80": { - "jar": "sha256-b4VsoT+L89geOVHARG8XWORCyxUpaObaf6qdFsxBoXo=", - "pom": "sha256-OS102D++dZke1/n/7tJX1XOU/3hj2vuomdlv0DnynJ8=" + "org/bouncycastle#bctls-jdk18on/1.81": { + "jar": "sha256-/mO+RId9x9SM+vmCEQNoj3/uaV7khMH2QN6TUM637fk=", + "pom": "sha256-zhkCC2u766Kr1skmvzbFQLcrHMa3dRLAl6Fo1CULimw=" }, "org/bouncycastle#bcutil-jdk18on/1.79": { "jar": "sha256-xwuIraWJOMvC8AXUAykFQHi8+hFJ5v/APpJC62qyGDY=", "pom": "sha256-4kwftM8WBUBaaYjp5NbksuH0OT/HOompRSrmJe4xHQI=" }, - "org/bouncycastle#bcutil-jdk18on/1.80": { - "jar": "sha256-Iuymh/eVVBH0Vq8z5uqOaPxzzYDLizKqX3qLGCfXxng=", - "pom": "sha256-Qhp95L/rnFs4sfxHxCagh9kIeJVdQQf1t6gusde3R7Y=" + "org/bouncycastle#bcutil-jdk18on/1.81": { + "jar": "sha256-MaX+OnukLjRXuDkw8P+NZ5+1t26q3ytR9XQMkqOUv1I=", + "pom": "sha256-ZUPundbFVOb9vvw5zHT0JY9FLRCyU6XWzXhUi/lJLdQ=" }, "org/bouncycastle/bcutil-jdk18on/maven-metadata": { "xml": { @@ -2769,29 +2915,34 @@ "jar": "sha256-ew8ZckCCy/y8ZuWr6iubySzwih6hHhkZM+1DgB6zzQU=", "pom": "sha256-yUkPZVEyMo3yz7z990P1P8ORbWwdEENxdabKbjpndxw=" }, - "org/jetbrains/androidx/lifecycle#lifecycle-common/2.8.4": { - "module": "sha256-o7yb3i/+/IFT1Sr8WAQms4rWV2yuE0a7jIPbzFBvAPQ=", - "pom": "sha256-BjXG8hQBtELWxoStOF6vEfzeJDv7dZbGk62+tZPwobM=" + "org/jetbrains/androidx/graphics#graphics-shapes/1.0.0-alpha09": { + "jar": "sha256-eeMfiHRZtrfRmoPBOHgjwtvxW6TLMX7EPOBTjnt9sVg=", + "module": "sha256-mb11vC32pOPtvAp3L9zJmy0vH8o8KmbELshoqeBYwIg=", + "pom": "sha256-jphmdV90HX4T29YFgCF0sTt0QImfDf2cBjOp61QObAU=" }, "org/jetbrains/androidx/lifecycle#lifecycle-common/2.9.0-alpha07": { - "jar": "sha256-YlNK0NFfmM0NkbEfJ2w/l/92/ILpy+ZVGW+t3w0q9tk=", "module": "sha256-JSQodP/N+XImI4vyCkkBbDugM+0nzr8hVTyx4r2VQqc=", "pom": "sha256-Eyk9XaBexAvYTGIVtKh/D3lpgv1ys3r2UoaaXx7P0kY=" }, - "org/jetbrains/androidx/lifecycle#lifecycle-runtime-compose-desktop/2.8.4": { - "jar": "sha256-weUaJG5p4jfofSib4Ivr2NQG/+n/YKEl6PIHLbYRmWY=", - "module": "sha256-x55RdgcihHN1i5WIkdcSS7CaFZRqXEof+5DvPP+xGfU=", - "pom": "sha256-R0gxXXQwmLRVFvSZdM4854w2efSmaOw5tTjBGmRa4Bg=" + "org/jetbrains/androidx/lifecycle#lifecycle-common/2.9.1": { + "jar": "sha256-0sTLm7NwHRv9Izy5jVK/zBztX5+qpOq/ForlxvJ02Dw=", + "module": "sha256-9neBOxw+XHHZZCkIDTkYVWCpyn+ZfjSBWM1ZrJWuZhI=", + "pom": "sha256-vBN1vjbDHQs01oBWkDwK3/mq9jSv5P7Q8qdJGX7OrLM=" }, - "org/jetbrains/androidx/lifecycle#lifecycle-runtime-compose/2.8.4": { - "jar": "sha256-vKChLI38r39zQPaueEeHVboKrLX9Amzaqu0ETR6i0dM=", - "module": "sha256-Q7eeNCcX8sx9rQzddNUawtwxbEhmj3jfJsIc8GleED4=", - "pom": "sha256-UofDvv5hVYWLH9njHp2UwCQHN3i/fY1Bs4dasp70Gsc=" + "org/jetbrains/androidx/lifecycle#lifecycle-runtime-compose-desktop/2.9.1": { + "jar": "sha256-LwSR0oCzdlHAxDeCM2lzo2MXkfd5sBChOUdfiUnTvuI=", + "module": "sha256-/NM5ff+LWLop5nPaDQexzZoITgqOK9mlx4y4KKwNJM0=", + "pom": "sha256-Cfj/T6vDe36+QR+1eSDfbspwZnBQs/9Iq3h2aoFxuCg=" }, - "org/jetbrains/androidx/lifecycle#lifecycle-runtime/2.8.4": { - "jar": "sha256-oFTwYuKeqeEbC/wOcjyMMmHxM61wv9e2SYvLVqakFxE=", - "module": "sha256-t/5oq5S4ncDF1wWltk3LDDyDpITimPNfA2x5cRZgHqQ=", - "pom": "sha256-DQ7wsV76yiXtdgT6FB0OjT+6iU0wl511DVBpZrZg0Dk=" + "org/jetbrains/androidx/lifecycle#lifecycle-runtime-compose/2.9.1": { + "jar": "sha256-0XHCh559LlG0DAQ/2lOYTE+YCCbYV/TqMRBbrOwdJoQ=", + "module": "sha256-Wm3gGfDp83OirTPFkrT04/Z0xj2H46NtHUeoK/qQGos=", + "pom": "sha256-jYivhvs6kPHMyv4POI9l/50esZttGFNdgXMoPZ4w8Mc=" + }, + "org/jetbrains/androidx/lifecycle#lifecycle-runtime/2.9.1": { + "jar": "sha256-vsAz0KgkwwKKrh2EAmYwNyjWGmoWbBVyjYXnd39YpFo=", + "module": "sha256-wVlaSfTDIGpuMAJVn9hJkulaOD0VI4h3DZnyQodeO60=", + "pom": "sha256-Yc3EJIHM1WVpql5dobIRZ96//qDNZO/egrYli07nwc4=" }, "org/jetbrains/androidx/lifecycle#lifecycle-viewmodel-compose-desktop/2.9.0-alpha07": { "jar": "sha256-vkeGqLdCblmyj1KvZPQ6diQpTVnLFYoM4t6DCxz5w2U=", @@ -2804,121 +2955,143 @@ "pom": "sha256-8qSUC7uXLJPgQd8sLYE9t6wcRoyO6Aqm4q5aXKIiDgs=" }, "org/jetbrains/androidx/lifecycle#lifecycle-viewmodel-savedstate/2.9.0-alpha07": { - "jar": "sha256-PMSzYZyo5yKS+OaRjZx+WyUYLVisqJb+UT8qs1TsXL8=", "module": "sha256-IhSBsiLN5Z8D/vG1BApj7DCAUCslM4XPY2kYc0egdLc=", "pom": "sha256-6PPn/FQM6/R0hW+mUl86X5ZLBafDgj1J3V6m0vVEBHY=" }, - "org/jetbrains/androidx/lifecycle#lifecycle-viewmodel/2.8.4": { - "module": "sha256-YdkxJsnivTyFp0+XrYFbxhi5A52bFIOz9OXp6Ayc+Bw=", - "pom": "sha256-7VnmgyoqJ4xsYcgDMqFxWJmewWE90Cvir6DZ/PMbvfY=" + "org/jetbrains/androidx/lifecycle#lifecycle-viewmodel-savedstate/2.9.1": { + "jar": "sha256-FVO1mFLR2dOSThWEq+4BePApbBT1QLKicq5TrD1A+Qg=", + "module": "sha256-9T5oUt0bJFkHvZRSHFF8EgqlOZ3wDw52ooezKTq916I=", + "pom": "sha256-icp4x+aBDQ7XeuTJs6bkxqkOxThbb7YSpdgf6MFDQdI=" }, "org/jetbrains/androidx/lifecycle#lifecycle-viewmodel/2.9.0-alpha07": { - "jar": "sha256-ZWvWnW9SmE/XiOw/0BQhF3+oGiTQzGYT0gyMtgVLQ+U=", "module": "sha256-ogKf+yqg35isaSjr4jAquLtMAyeECgVTs7tOzXScX+M=", "pom": "sha256-97MFxfdgLXWiNLhbl//+ybLpUOqzjOinW5x04tfA8ms=" }, + "org/jetbrains/androidx/lifecycle#lifecycle-viewmodel/2.9.1": { + "jar": "sha256-h8uDwbpEXCseWwok/3COvvZtDufwgrGnVzmKXgX3erM=", + "module": "sha256-8eJo0eHkdxwlNYlwIkIof7RxhW3kXbaTvS4wLkYrZxg=", + "pom": "sha256-CZ47yqhbe6b5LC46lUOuAgY23kUJQ/GpHRa3QMfakog=" + }, + "org/jetbrains/androidx/savedstate#savedstate-compose-desktop/1.3.0": { + "jar": "sha256-zd0rFznOPGXKigQft74f78XDnWvbNXy6Th4Jd7ZNHuE=", + "module": "sha256-cGzWO1cvg9ExZ/c3qqBK3l3NIEz/Iyr/EdGZIj6i/UE=", + "pom": "sha256-0JHFbSr12E3ejcXVIjEDKSuTdTJhv1KqvvlxCko2M/8=" + }, + "org/jetbrains/androidx/savedstate#savedstate-compose/1.3.0": { + "jar": "sha256-/7aXRfiP+9jDcD1+s1RTm1fy6PZHvUOld0ZoK60OHyE=", + "module": "sha256-gpPnTuhPMIgv5sBmqntF7n6nIXnYK0aqlCmm3Mw+Ox0=", + "pom": "sha256-gtXU7jI1Zj6tA0qTgR2fFmH+8uKg68b086+c+z9l0c4=" + }, + "org/jetbrains/androidx/savedstate#savedstate/1.3.0": { + "module": "sha256-Ket3goGrNRdUC9N7BY8fmULH9FxsLN/nrN0t4z4ACs4=", + "pom": "sha256-twZ8PcH2q2hj1Q1ATaRiMcDoQZhP6OluUtpjwAFOxBk=" + }, "org/jetbrains/androidx/savedstate#savedstate/1.3.0-alpha07": { - "jar": "sha256-hTRZmuwDXozRFY7mVjykZ8MaEHQ/iwOpf8xZsPR9mxg=", "module": "sha256-cpaL/Cb6AotpCQc5zbZUJ0mWdNz9PnugwwVtATp2Ad8=", "pom": "sha256-g97jMHoGE1PdIJ+2g9hEBdlDN5caUcik+AxskVJnjmY=" }, - "org/jetbrains/compose#compose-gradle-plugin/1.8.1": { - "jar": "sha256-BCCnw1vdbUtX4kb+4wZYYnV93VXF7U2pyvlTH7reAuA=", - "module": "sha256-KwmNE5XYqy8gbCCFEUhTqX0ExHjwGZSwGZcR07j2b+0=", - "pom": "sha256-D+oUq6raTx81whmRpigD34udoXWNBkpvCTqE+fRi0Iw=" + "org/jetbrains/androidx/savedstate#savedstate/1.3.1": { + "jar": "sha256-4E6yNhq2AcIMJE0lN4zmqD8I5pReKGTEh5M7D40pQSo=", + "module": "sha256-/dTQsApcRZbDUCNANv8P7F1Vf+v2KJIveyEJfHNd73w=", + "pom": "sha256-6b8ow0KDlRDGW0r429kqsMe+Ppl2u1ERq5Xzd6mhm8w=" }, - "org/jetbrains/compose#gradle-plugin-internal-jdk-version-probe/1.8.1": { - "jar": "sha256-3JoFJJ0xp36sg9uLv2uNTSlqfwQMGPKpVNMGpKPu42U=", - "module": "sha256-VdGdUlZfOb5gPXLJKnVD/Xs9jNIQ+gMub7Y6EZmMlIE=", - "pom": "sha256-YGhbH0c9Z9j8xZayo94NWv9yURCZZFHEqrup1ymp1cA=" + "org/jetbrains/compose#compose-gradle-plugin/1.9.0-alpha03": { + "jar": "sha256-jVzHR6cqnFo6m4yPLmvAG+K1wqDzw4bjN/3jacAjzdA=", + "module": "sha256-sLr8MXo86x0PlRk8JYXo1WRybngyiq+bHnjukRArAKU=", + "pom": "sha256-kUzLRPXTWRMnNg1pZ2egFTsvEPwCja7sLwqBnQPLz3s=" }, - "org/jetbrains/compose#org.jetbrains.compose.gradle.plugin/1.8.1": { - "pom": "sha256-Pa11obppULCQZsvwWdf/9n1kwWC6UcJFo4AjDuZGw8c=" + "org/jetbrains/compose#gradle-plugin-internal-jdk-version-probe/1.9.0-alpha03": { + "jar": "sha256-pxy4JmCpR6MKK6+88ErFn3MNZkmV9gMlIxdnWvZdw9A=", + "module": "sha256-nTl8MLYwk4y5BbsXo34SZt81FWj15XjohABh7ka2RNU=", + "pom": "sha256-EoBQ5LWrFwqJgDSoVbxI3dVsp7ogMeQz0NfFEKVqNpQ=" }, - "org/jetbrains/compose/animation#animation-core-desktop/1.8.1": { - "jar": "sha256-LVy2/25p7oysuNP+OuC0cnM+b3LQa3pmaH3dq7B4Vkc=", - "module": "sha256-5mlIJMh0tOomyjM9h3x0PZ7X5ChCwFD+i82dOAHbDQ4=", - "pom": "sha256-pI2LUEM55+n6GcrsPi77ZTjXzacYSD325Z+vBumFWUw=" + "org/jetbrains/compose#org.jetbrains.compose.gradle.plugin/1.9.0-alpha03": { + "pom": "sha256-SZbhs91nmOlHLPxXpX24Bs7ZcB1dGaEQmoSPmJq46yc=" }, - "org/jetbrains/compose/animation#animation-core/1.8.1": { - "jar": "sha256-72/0H71MB4RQIKrMvGtjPy/huvKt/VjqdPsKzRUiHqA=", - "module": "sha256-AHForgK722sqh0DTWr5WC07UqTt8ScbyEN8zJgHOxBk=", - "pom": "sha256-p5vNTFSOCZUeTbnqfdg2q9t4TyQVasTVgyPwTkY9AsI=" + "org/jetbrains/compose/animation#animation-core-desktop/1.9.0-alpha03": { + "jar": "sha256-fwA1UvOrLsgHyoXejmSBSICKIAL938SC9VHavtsgl9M=", + "module": "sha256-o0W3rLJWenjv3B1LS68EEtO4YjzjLLIUC2hJOTJbueo=", + "pom": "sha256-EZl4r3MFn6zT3FwecidqQGFa9/8E4S3hrhrM1m4Wnis=" }, - "org/jetbrains/compose/animation#animation-desktop/1.8.1": { - "jar": "sha256-vGq1X7iJi0ebiUmf+DnHcT2vwDViP9fl24qN0jJsKSs=", - "module": "sha256-yG3gWe+Y5CiQpxpa6wDm8CFcAfY2lcN8cBDEPXmiIAE=", - "pom": "sha256-F4rVgALUrp95f/UfuILSF25+/sUF6Ws4Q9XvkHIc2Oo=" + "org/jetbrains/compose/animation#animation-core/1.9.0-alpha03": { + "jar": "sha256-E/dpyAeVnkCu8DankSQ8pcereFgTn04Ose+6AH1RHTk=", + "module": "sha256-oVqIZ88/6G2gNfzUBc/uv/IIlmz81gaHBTgRp0R7McM=", + "pom": "sha256-uE4tzjDEbHBJCJCuQCzBKfB2ejMed7Z6Q4gRcKjxHsM=" }, - "org/jetbrains/compose/animation#animation/1.8.1": { - "jar": "sha256-EuDnSPZ+MrvICFudBztCu5Gd3YbNntZrFfJsXgnLiF0=", - "module": "sha256-2shnIo11ioRKdiGSwINjDLyhLaajLARbWRyVS+pelOc=", - "pom": "sha256-YaumUmCrbxCqyyqkpR1/pEMrOF2xGttJiO19vZuj5tM=" + "org/jetbrains/compose/animation#animation-desktop/1.9.0-alpha03": { + "jar": "sha256-XAirRSJ7zJw+ftS+Hd/zBlTkFf0Xv1Vtu+2lGjeiDWI=", + "module": "sha256-ttx4+LqR4MB3X/g0RqcF52lpQUahoQMZEJ1Vce8WNEw=", + "pom": "sha256-OqFaPIyqNr6lM+210MOUj2CMTwia3xYpRxP9xrAEPC8=" }, - "org/jetbrains/compose/annotation-internal#annotation/1.6.11": { - "module": "sha256-9txJXZJVCe3GwMVcdR2oaytNDL2VYz7aIxe4XBsON54=", - "pom": "sha256-Rppb+yjQ15aoR93X1dggwc10TgLXOl8zBPh5kN+utbg=" + "org/jetbrains/compose/animation#animation/1.9.0-alpha03": { + "jar": "sha256-bcGb2vnawue+p2Y0Xgvqxcg9iIvmMV9XotugTGwhbuk=", + "module": "sha256-79LyWWPFjpDMF0E0vFlCsE9IURRpurTkXmJ23Trqqy0=", + "pom": "sha256-HMUrWBoNVKYVWxGl3pWmc2HTSXnoJi+is6GWkKpU+Ss=" }, - "org/jetbrains/compose/annotation-internal#annotation/1.8.1": { - "jar": "sha256-1gV2kPxwSrKN+jrCVamY0wvlyTm8dkuKxbGj0ZlWplc=", - "module": "sha256-3M1cwHz/11Kl6U46jWwqEPjuFo6TbiK+h+bDRBd5nMk=", - "pom": "sha256-XSc2j4nl3ilCyRrW85PZVUzYq96js9Jsoy7KD7KcybY=" + "org/jetbrains/compose/annotation-internal#annotation/1.8.2": { + "module": "sha256-6tQ9Tmx0RuQ3H8KpGRhBKUJXKCApYhbsE/hAOj0w9Ww=", + "pom": "sha256-GSS3emTUqvyOwlr6mUXq2MRmTSJGrKmU0vq60CxbsDE=" }, - "org/jetbrains/compose/collection-internal#collection/1.8.1": { - "jar": "sha256-014iAteeY1DonAaUkyPy9f9xPbyjJ9iJLDBxYHT+010=", - "module": "sha256-Klo0O1Dv8LkHstqB2593vQckdSb16+dEHm4pBNP34ZU=", - "pom": "sha256-0colFB1zhOr2DYajNf44m2D8LtWI0B5QNVAdLxT5J30=" + "org/jetbrains/compose/annotation-internal#annotation/1.9.0-alpha03": { + "jar": "sha256-WXuJPt69fsPuZvPGPJHjwjcz+JZ0XRe8cq72YYpHpo8=", + "module": "sha256-jynnbrJ+DGkNIlOLmNgyQsdCPirzJoGekHL+RJBNMYk=", + "pom": "sha256-JMKPMEwBk0WIFoVEUpI+i1TedxJwi9IEfKeFd3zfUoU=" }, - "org/jetbrains/compose/components#components-resources-android/1.8.1": { - "module": "sha256-ZKtFBy96+EyUFbwAl8Ha1Lk28krQXc/rBmY4tLYhwy0=", - "pom": "sha256-pi7R1PrNyU3MAndC2TJQrccIxY6YzGMt1w0Jw7yUFBc=" + "org/jetbrains/compose/collection-internal#collection/1.9.0-alpha03": { + "jar": "sha256-rZiL5OyWp1tRHfMM2U6O9cFPDZqedQjM7wkvW06hkKg=", + "module": "sha256-fAeQwQjS81TT04V1dSWyygP02+sWkcH5BebHDCeGQw4=", + "pom": "sha256-8O2JETJGxFxUFbkxzcM5G+nKJsNwPYkei26PIsQrHj0=" }, - "org/jetbrains/compose/components#components-resources-desktop/1.8.1": { - "jar": "sha256-yzw74W1057pEfF4MXve7piZKmkF47jw3L486T/cIbPo=", - "module": "sha256-8sX/TL9IACRPFknVWf2zXa8kFcgXmXvFgRIL5x6sHyw=", - "pom": "sha256-5+SWCm9a6z8Cl4+2RzF11usMOjWsoKM/HjJ6d9E78Z4=" + "org/jetbrains/compose/components#components-resources-android/1.9.0-alpha03": { + "module": "sha256-6z6NDmpXvxLESUy3yNxmg2lTC+BZTo489S4CyKyb+BM=", + "pom": "sha256-w2/QViDyUIy5im6xGAUjQaVpo+9DnNrTpqtVFGLDgAw=" }, - "org/jetbrains/compose/components#components-resources/1.8.1": { + "org/jetbrains/compose/components#components-resources-desktop/1.9.0-alpha03": { + "jar": "sha256-K/lUcVwRmw2B1vAVn/tdVcnEUco8k/ICTqwhD0218tM=", + "module": "sha256-HmifMdhLmmp7NMBhfir4KoUJuvck+usOWYg55qnTbD0=", + "pom": "sha256-OcJ9wKZMbKwaE5yQ5DZSiTJWxqeePFGlHpdKKuJOXOQ=" + }, + "org/jetbrains/compose/components#components-resources/1.9.0-alpha03": { "jar": "sha256-dAsS2pRpOm3Re8AdIztq48wMCfMsfcsz3c5678XahpY=", - "module": "sha256-oAfd9XCE2H/GgfnJI8BqReQlup7cfOAFGpQiRBVVruk=", - "pom": "sha256-Tw8+3RWsQtZi+jG00inClTGdWG1kA9dGJjri9R35PiA=" + "module": "sha256-9/8MqLeFHAvgQO8daAg3EW5w6FBvkTmOIpF0MdlOUic=", + "pom": "sha256-/VttSxC/oP75WoOtnk9kT4wc7o4P5smEMr0qH06BXqc=" }, - "org/jetbrains/compose/desktop#desktop-jvm-linux-x64/1.8.1": { - "pom": "sha256-xqGqbIgi+mzyje0UkDDRnJN8ilssqNesCyqgE30h2rM=" + "org/jetbrains/compose/desktop#desktop-jvm-linux-x64/1.9.0-alpha03": { + "pom": "sha256-fsc6zPPAJjZrooSv7zFQ7kT9gP+qyexbDUt12AJHfCM=" }, - "org/jetbrains/compose/desktop#desktop-jvm/1.8.1": { - "jar": "sha256-Wm8xHTJrwA6Tvgr79cp7lZCzSDeOc7whAzRlZPSAc48=", - "module": "sha256-3QIgElcGFNboqnlF9iifdK8N8Tu/MNq2ZlbJqaZszLs=", - "pom": "sha256-GcZneyRjopJpQrjXwdybXmbOG9Wb3Xikr5CQYUhfq5w=" + "org/jetbrains/compose/desktop#desktop-jvm/1.9.0-alpha03": { + "jar": "sha256-k80y7cddL32QX9x8/Y1Ei5pLuxiE7Rgy+IbcngP1NII=", + "module": "sha256-bvkZY+SAuwO7OUmd1rE8P2Qnr7UQes6NNfWvg42wIm0=", + "pom": "sha256-rGcq+thNI750798l6a0pSsgoPlFhlwFF893THOWwzyE=" }, - "org/jetbrains/compose/desktop#desktop/1.8.1": { - "module": "sha256-GYrnVfALksltfGEltGfowSLYXalaKXRdcj1Kl2Q0fjY=", - "pom": "sha256-0YzSWRCWe2b9LR/PIodYMDB0J/YUhT/cyDh2Ii5ZvtI=" + "org/jetbrains/compose/desktop#desktop/1.9.0-alpha03": { + "module": "sha256-Vk8khI9e3AbVGowaTHDAdhXOKUIlFBOD1c/Kjl4bzqI=", + "pom": "sha256-0MPwCkfTHQ4Zjut16/8rYlcIHJaI/mVbyi+ZPtxbnyc=" }, - "org/jetbrains/compose/foundation#foundation-desktop/1.8.1": { - "jar": "sha256-7xoYr64dlKMO+bSaQc5KuDGzHaed5kc1nOeUbkznyl0=", - "module": "sha256-0z25jBoNkv+u4UNxXj2GzoNFL9OlZHgcGpT7zkiCbrY=", - "pom": "sha256-/tv4PXUeYdfbkucHgEJt9YSwVcOgdYnvvEIsac3UnNY=" + "org/jetbrains/compose/foundation#foundation-desktop/1.9.0-alpha03": { + "jar": "sha256-huRib2U3e6fM9lnOVXeZRb8fJSnWQwzJmeJoHpYzgVM=", + "module": "sha256-t8U78S2lT1H+YDNz/O462Ib8M8fhn+c1IYilYb3jAXQ=", + "pom": "sha256-eWaImXsLeOC2zjXX89Q+lmdxb7Ta6wY+I84qvzoiaoo=" }, - "org/jetbrains/compose/foundation#foundation-layout-desktop/1.8.1": { - "jar": "sha256-Cb8kfmXy0+KuMJB6AdRtyRqKahQS0aXrYQlYE876Q9Q=", - "module": "sha256-/NrFnsfdRWLKn0j8DcOpU6vHpT1djGTWD9GrQt7iVJE=", - "pom": "sha256-KZMog84a1WxcmcClYesvJHtKccmBxfpd9cWVdh7xWm0=" + "org/jetbrains/compose/foundation#foundation-layout-desktop/1.9.0-alpha03": { + "jar": "sha256-1QCK1yRxZDw+S56ik20Q8oq9PTZ34WaS4SutN74euqE=", + "module": "sha256-3IYh/Qi4n97Iv+Lwy2+WCj7gOSE1w9pwPagHptCJNNY=", + "pom": "sha256-X4t0SGJzgnjvonY4cW1pDnfT2n+ndLWf3fJ85wIyVL4=" }, - "org/jetbrains/compose/foundation#foundation-layout/1.8.1": { - "jar": "sha256-vc3u+MB8WJmED3cZJXxkBa56v7rHx7EbFmBGEy6yzUs=", - "module": "sha256-5hQsccEb2JWVA4rmUNDQ80e0kgIYHJAP9RlWzfMoBHQ=", - "pom": "sha256-L1PHFrIogKx8n7tEp0j3U0hoX6eL/ksTvlLXcsyNPCg=" + "org/jetbrains/compose/foundation#foundation-layout/1.9.0-alpha03": { + "jar": "sha256-lH5CQN9TU1neyllQUUl/4cHGV21vYdTwFqcH4J4ocIo=", + "module": "sha256-sI+jgVnNgSRB25DslIbUbZ1EZ05Sfmoy9Pb7lngaXzQ=", + "pom": "sha256-8B/IJ0RjZZQoWE7m1p/NRuC8x6AeqHiVwizXh6PfRVQ=" }, - "org/jetbrains/compose/foundation#foundation/1.8.1": { - "jar": "sha256-Nots4ZTsLVE2C+tS0RmEtqnQ4I3elz/lpBY2x9NOlsQ=", - "module": "sha256-XsUxTJo76zBwCftDG14+rRvm2P3dchMqfMT1/HurlEo=", - "pom": "sha256-LS6ItIE/f0gf6kax7KA/iOW2STMYq85HnRLUIambs1w=" + "org/jetbrains/compose/foundation#foundation/1.9.0-alpha03": { + "jar": "sha256-TktA+oAzMqxVes9DpyVs1Sae4bS5Xnq6Fr4Db0glrNg=", + "module": "sha256-VdXaem+ADcA46C/iE/+yh5VD0CYzSKJKg508uCrzuDo=", + "pom": "sha256-OTxYq00EOHyUv69vs6ZbQMA4s4/AmrsccEGosW/zbjw=" }, - "org/jetbrains/compose/material#material-desktop/1.8.1": { - "jar": "sha256-xxNBGs96XrdKlhHdCkq3ud/8NwoMQTW3Ejx2IGXajOk=", - "module": "sha256-op36bb+ZwOH/EbPkQ7/jW97H0sCNyrx1rBDzomFH4+4=", - "pom": "sha256-fXT/7E2Nn9pua7uVtGdO+s6G/dCRrNJKdvYLyehJvyg=" + "org/jetbrains/compose/material#material-desktop/1.9.0-alpha03": { + "jar": "sha256-eaxo+FEAZsc3sVbxyRvcfAx8NRbGb4snPULMcHynRBI=", + "module": "sha256-u8AoOC/FbKrwHGb+Zw9TqwVGFyf3xGAJiK2WTHoEmmA=", + "pom": "sha256-a/tsYA33utjoBcmYgb0jMRfdJQDbWcmjDUek1pwz/d0=" }, "org/jetbrains/compose/material#material-icons-core-desktop/1.7.3": { "jar": "sha256-vPbIU7bbL/FI0tOq07en6lTZP8e0Lgr9hA622vGhxoE=", @@ -2940,160 +3113,185 @@ "module": "sha256-sfqa12veAdmGn5uwxxKc0rByeU8jfgTRXj73yKZqSHI=", "pom": "sha256-3NyiJy7t6vlAZmO5s4zMl8cXnoWqHKeJMuxhIuVZlYw=" }, - "org/jetbrains/compose/material#material-ripple-desktop/1.8.1": { - "jar": "sha256-VRZAECR5rIOkGqSp6X2aMtbS9G5xvXvBG9VdIZVNqv0=", - "module": "sha256-YX+DDRq6JqzcWOf5H91zA9Tl4Fn6mY/6du+fZmHyTWI=", - "pom": "sha256-fbllABC02OUN2F9TY5RkIR2ZnAjyV3oI+hj16cqwKcI=" + "org/jetbrains/compose/material#material-ripple-desktop/1.9.0-alpha03": { + "jar": "sha256-IEkYkCt0SNFHNKXEnxKjLnmSWSpDLezUtPx9CyuLJWI=", + "module": "sha256-IMCWAeS9OdERnHf3LoD6QLPiujUw/l5jMTWS63VWENI=", + "pom": "sha256-hrPbhwV5/xIhBGAWAUq/fz5pDbK89/zr4fqe5DLBOxk=" }, - "org/jetbrains/compose/material#material-ripple/1.8.1": { - "jar": "sha256-Wrr7KrK6fP9MLUUFVwTWwTJtbUcoCVTc1lQTwfFMmfo=", - "module": "sha256-8Q0ijiCZn+hMKpZzjpTjOHdOn5KyeMHhh7sNXb8km8E=", - "pom": "sha256-aHNPpsy0T3zUGK2DhVAn9kfkPPzszw1EFkacYZ2Wb6I=" + "org/jetbrains/compose/material#material-ripple/1.9.0-alpha03": { + "jar": "sha256-1Rauza5e8iXD36C/0dP+gjpAvCFRLLidMP2/E+SnKpI=", + "module": "sha256-j3oA4nV6oohqzvrzBKc+7s4JXilwjbvW4GIce5+Kf1w=", + "pom": "sha256-8VVa0T5I88JVn+xnrenp2v3NQAYs82ByRlJMuUwjfeQ=" }, - "org/jetbrains/compose/material#material/1.8.1": { - "jar": "sha256-BoiwzmAM0E7tO6MFTqEnXYW9I2wtXliwcTDiv9e3G+U=", - "module": "sha256-pMZmji+6KIs1qzpp+gVFZ9GXp/v1kgQ3AAepOSOMyk8=", - "pom": "sha256-jZ3kSFHxsvH+3WRMMokWgWocTP1GSOkHYY2I51I9aa4=" + "org/jetbrains/compose/material#material/1.9.0-alpha03": { + "jar": "sha256-zxN0LszL1Hor6f2Z45Eej5XdvaiwmKesLLtdJFfBBp0=", + "module": "sha256-qsd8DfuRWcLfsta0KIr8WkiiGrPBWs/jxUQ/FMo3F/k=", + "pom": "sha256-huc1Q+af6kFcfPz6NGi670jU65f8D/WHorM/sI6RDso=" }, - "org/jetbrains/compose/material3#material3-desktop/1.8.1": { - "jar": "sha256-I0XQjR7dwB1ynhyDyqQ/mxvIxv3RbYAjAKuv0lklXBI=", - "module": "sha256-4IVIRSu5oNQZnmRxlIr5C4+QtBkpiqU8QEZmNtzuBmA=", - "pom": "sha256-yL5wxZ0MjvFkFseiI2VHLC0rhcmUUyZfKyLV1wYFeQ8=" + "org/jetbrains/compose/material3#material3-desktop/1.9.0-alpha03": { + "jar": "sha256-tTCqqXOayBgD4tuBIu2+wPde1IT1dd5MDleB4i4I7k0=", + "module": "sha256-FoE6TZrLAK8758THZUikdnm9dRw467rcqViw+f1GoBk=", + "pom": "sha256-/lf3isc4uuN5xWliOSNnG7iBkcKBSzJRYZS4lOweFJQ=" }, - "org/jetbrains/compose/material3#material3/1.8.1": { - "jar": "sha256-9bvuFgVaRPo6wLhG982s8/QNLE8XL5mWS5HJ66RNIwI=", - "module": "sha256-ki5wOxY1+yEpRZl9ZrGovrjFHvQuKNrY+Odwh8wEBEg=", - "pom": "sha256-CGWRptyFyQz6NIdXhYpdWmoNgQVnUNW4h/+U2V/M3po=" + "org/jetbrains/compose/material3#material3/1.9.0-alpha03": { + "jar": "sha256-vlzkMfNTmmOFSVIOs+tG4WGp/oRGh85M9T0WZXy5Z/c=", + "module": "sha256-iec93+F/anId32BdQeLJSC7hyhvuhMTo+QD6MYpwEPY=", + "pom": "sha256-hAL1vIE8veAjG8C1QyRzwGPipIcH3nBZryHNU8CL6Go=" }, - "org/jetbrains/compose/runtime#runtime-desktop/1.8.1": { - "jar": "sha256-j3qR4LBfkhMIVjCcTmm8wQlUNLV/AvLl0+MRNEMiYrY=", - "module": "sha256-tYTI3LKSsYbsSpFDgV3eT/i86uAj6VaEL/FM1s70VYc=", - "pom": "sha256-1xqHMpZtdCoOpFxGZpctYFWgsUSXy5yIpYHsqw68oaY=" + "org/jetbrains/compose/runtime#runtime-annotation/1.9.0-alpha03": { + "jar": "sha256-g9uhumkk50pl84RxOhvRjXFmtvdtd6LLhm2LKZCxr74=", + "module": "sha256-GmsF0heEh72c8Z76nPiCFfDi5B51GignLK6MsX09ABA=", + "pom": "sha256-vQUZJ2fxupyBAIvxj7MYkC1eHpQzDxF/bYzBo+HQtC8=" }, - "org/jetbrains/compose/runtime#runtime-saveable-desktop/1.8.1": { - "jar": "sha256-IR6bMX3jLuu70pPqhkjbEKVYafc74lj+WfX704u2X1o=", - "module": "sha256-yzBkRs/Nh1hbCnOh/8Fn3u4R+d7rCZqhOl/TIf9hpyU=", - "pom": "sha256-QZ7l0FPw+qMna1BpAIjRIir48N2ae4Xl5t8V215Fn4c=" + "org/jetbrains/compose/runtime#runtime-desktop/1.9.0-alpha03": { + "jar": "sha256-OqjQ6PE2qqP13fK/2JhHDUVkYbLgJKVhZc1tadOLk5M=", + "module": "sha256-bT7kqMJYC2dgFreCYouHJjUD0KuLsPY1tFGRGykRmHY=", + "pom": "sha256-BRgrq+KEVfFL7/amgWfNlSRr378x1YJgqGxQL7Lbq18=" + }, + "org/jetbrains/compose/runtime#runtime-saveable-desktop/1.9.0-alpha03": { + "jar": "sha256-R1UP5BF5RIk6NYv2L2gy/ucQhEjUa9GoYv62FLiIx/4=", + "module": "sha256-uGD2LtNmVhxF5/Y1B1BzEmovzQfmMPHsD6dd8rLw7dU=", + "pom": "sha256-/+7Reyx0LlU09+c6pgJMKCuPzzkcgj4gixeTLWrazKA=" }, "org/jetbrains/compose/runtime#runtime-saveable/1.8.0-rc01": { "module": "sha256-omkTSIkqQd6WrRyMiJg5nBjBjoIqw7/9wzf8Z/oSV+k=", "pom": "sha256-qo6egoMD5MH1T5/EDz0Q9++ZFulL/qOYL99XbAOyGos=" }, - "org/jetbrains/compose/runtime#runtime-saveable/1.8.1": { - "jar": "sha256-k1lybzsoNA2DJ0zraS+yUqGoGFa50YkJHmXJeZauWJw=", - "module": "sha256-0yfnFki4Q8DEGpRtkCgKra1BRRxGXOTd6l9+HDGiPyw=", - "pom": "sha256-iwnMZ2LRHHCSWvxwnDDRTGAScAkiLOQRALfSqv7UNeE=" + "org/jetbrains/compose/runtime#runtime-saveable/1.9.0-alpha03": { + "jar": "sha256-yCH0JcECYF+7CDcYFXoEqh6PswLxHAbxztfnbXd2Ga0=", + "module": "sha256-f2854bD2nn69uhjgxUhx5BuKTRiG0GN49Nd3ZUjKfIc=", + "pom": "sha256-oIf38+TKATldX/gwTQAJHgGb8X+NhF/M4ob0n9d9JTU=" }, - "org/jetbrains/compose/runtime#runtime/1.8.1": { - "jar": "sha256-V8WSKO3626iTfB9EiaOeEt0Do0ncycySkEwddJXxWoY=", - "module": "sha256-oSvxFE9uQxqpotPBGvme41ZBoMlFRlQBaAl5mQyZBGY=", - "pom": "sha256-/O0YNtx7WtvoQ+oYS/8V+4+RNiDXWXGRW6svgHYb6/w=" + "org/jetbrains/compose/runtime#runtime/1.9.0-alpha03": { + "jar": "sha256-2TqEbLwQ8SSZG89ahxmwQSHNOAomo1y7rTs09+JOuYg=", + "module": "sha256-tFHN49zaQTZK2uZhg4xKFsEEsB4R2zSDNZG5WBq4wTs=", + "pom": "sha256-iTWSjkk+CszISZONV9oxd2AM+ag6a3vQ0kiIrg98kdY=" }, "org/jetbrains/compose/ui#ui-backhandler-desktop/1.8.1": { - "jar": "sha256-4rwc2e7jbHLYv+ko7TKWA+957AAKoTaIjvfNgAgWkqY=", "module": "sha256-XPdA/uuCIYL5QQxvqO21R6xKIF/e7GJoluBDzZiK4Sc=", "pom": "sha256-Dbtc47X8X/H+SqFX7/RUutblh0SHmBjxWDzAq07NjqI=" }, + "org/jetbrains/compose/ui#ui-backhandler-desktop/1.9.0-alpha03": { + "jar": "sha256-1brC8xkt7EGxxEXfcE9Nrn/luIwCPTlA08xDMMRMCQM=", + "module": "sha256-+r0DFp3NNI9gxhAdjCcidT/DPuT3hskPCIYCLmkcnu4=", + "pom": "sha256-byyf0tFBBz0gracPpm1MjPoCPq2Kvt5i9xjt45lH0J8=" + }, "org/jetbrains/compose/ui#ui-backhandler/1.8.1": { - "jar": "sha256-jGyaOb+gaj2y5FGSBunLzGtQ8OqWgiDH5N7swZi1wz4=", "module": "sha256-YqpVDszXiMXuiQVR2rd5uz8ncrXBywMQTU7zpBAtsI8=", "pom": "sha256-rprTOa5BXBozKwyLI8/FWKLKMSj66D3pdyipFNSSgqw=" }, - "org/jetbrains/compose/ui#ui-desktop/1.8.1": { - "jar": "sha256-sZrvPY0mzohmL1HG5b0Q6RUXetj4qAdV2+/B5Krjqzw=", - "module": "sha256-fVlgck/8X3E6NcCEGYqeWwk9rjKJPQgRf2BKHp0NCIY=", - "pom": "sha256-012zE2MHC58DamGZR1y7fYQIdNj+GEPfz8PgWJB1nXE=" + "org/jetbrains/compose/ui#ui-backhandler/1.9.0-alpha03": { + "jar": "sha256-VwXXAFPXlwM+nV0G3Olul20ENCwafyBHpwVuo9Tsrxw=", + "module": "sha256-lhbk5n0duVkzWzV4HzvfgSZ+usJw1443M9enGhK2gHA=", + "pom": "sha256-vhqeoOupI0VEk94ZVcWfkEIdv317upClxVKfPIB+g/k=" }, - "org/jetbrains/compose/ui#ui-geometry-desktop/1.8.1": { - "jar": "sha256-Wq+LeL7W5Wt07okxcszi4xaBO2HYoizdwFh6Unxcqic=", - "module": "sha256-ixvG7QVwigaU2p/U/KBuSqXMNA1oSgTwHXw+kbFILuQ=", - "pom": "sha256-UKm0k0TgXJPTBIhRiyCTviemWf8K6xVhs9KgOSzBiLc=" + "org/jetbrains/compose/ui#ui-desktop/1.9.0-alpha03": { + "jar": "sha256-EIVYa/eCEr+CyIu9j6MbeAcaPKD14j36bpH0mGgl/AI=", + "module": "sha256-hYSykRDhdgTesgC0aEbpefN4Y1sUWzs4bLvBNA6Dv6k=", + "pom": "sha256-zKGYEj4wZKDCS/Ogy6hYmUsSrHv6hVDU+hR6meFk3JQ=" }, - "org/jetbrains/compose/ui#ui-geometry/1.8.1": { - "jar": "sha256-V67+05gNp/BTpn25/Fv7FpfKrnMh+fka2x/7WnTLrS4=", - "module": "sha256-Vfel/OUNEvvKSk66kjmWXsjjpcmf7GL0/4O6dWb2/p4=", - "pom": "sha256-TgdMXEhw30Dq8xp+Jjc+OOqGFNtMYkNP5T2mlbCRpNQ=" + "org/jetbrains/compose/ui#ui-geometry-desktop/1.9.0-alpha03": { + "jar": "sha256-FkiBiAs7cfKFTmIOsjl4HhMH5IlaocTv4WFbbMtLgF4=", + "module": "sha256-Bo0meGaHhZn3N22GMAcdps1OztBVpsmkhst9EepTd/Y=", + "pom": "sha256-9yS/WoTL2hCwA+2Qpu+VePp++VWCvmXOS3FfY9kpHDk=" + }, + "org/jetbrains/compose/ui#ui-geometry/1.9.0-alpha03": { + "jar": "sha256-BI/7fplRkB+wvzk0UAEodIfoWhlbKU19R9MRP7GUXTM=", + "module": "sha256-6fexhtOxTCjoBVV68CZYbyJoBRWiz3NphBaAZdkRwX8=", + "pom": "sha256-1lgIgUDiQaYx6UXSC4jGH0co0SRXvMTFCwL6iXdr3N0=" }, "org/jetbrains/compose/ui#ui-graphics-desktop/1.8.1": { - "jar": "sha256-sxoU+OAbhlO/N3iKkwCM04/9bYcZIVBj6mGmWm/Zdr8=", "module": "sha256-10fh8k6ZGHpWH9f01g0sNwG5tqFClNVQJInzpkUodOg=", "pom": "sha256-wQFTGOOQi644STxMpKFcc21va27R6csez3FN0R5W55Q=" }, + "org/jetbrains/compose/ui#ui-graphics-desktop/1.9.0-alpha03": { + "jar": "sha256-GP1pekpruFCRwFxGEY6EBoaeTLmO0IB52ZJ2tv/Kyjs=", + "module": "sha256-uCK9FqM0XEbbD8JXzAYBqFi4szmLXbpnXG/fI5EBK9g=", + "pom": "sha256-jHitpN7wOLVeazuL9Ikmr9XBAXxEZfiZXgVZC+Xm85w=" + }, "org/jetbrains/compose/ui#ui-graphics/1.8.1": { - "jar": "sha256-lkHLC+s4SDe5G33W09WuFLxYXUd01AvITfsPm+ORm3g=", "module": "sha256-/JzRAPnnp8t8vAElAFyqY3qnYitVykg+82eF55IT9IY=", "pom": "sha256-iAy52I3mMELOvd3u6+n4TKqpdriVMIhWR3H79pGCkxA=" }, - "org/jetbrains/compose/ui#ui-text-desktop/1.8.1": { - "jar": "sha256-W2TgVApMqu6zwTXV0T9B/s0v9DxB6QN07UIv74q9kp0=", - "module": "sha256-6cxeSsCDR1yZ/QUe+8reYvSZ2GTUCYKaVPyiEaxNe48=", - "pom": "sha256-gOAmZpnYeoOi39w+mykRZJLzGB6twdKo5uUNm4+FWKE=" + "org/jetbrains/compose/ui#ui-graphics/1.9.0-alpha03": { + "jar": "sha256-5o07XCWFGl8nAnKsywOoW1bUx1LYMC1GP7cRW+Lwps0=", + "module": "sha256-0Q1zK3zEaj1PUsPX5cO1nhg4FYUHohxKE9MHvxPKCUE=", + "pom": "sha256-WJ4WJVCGvjqkFgcs4GZtAY05zGxuN47Yl3ifqI5uOac=" }, - "org/jetbrains/compose/ui#ui-text/1.8.1": { - "jar": "sha256-ECPVFRCYgbAkvx3LjJDowUqEy/mSkvwZ3XdtyYtN0Yc=", - "module": "sha256-x4We0HIvN6v2ReaWb8avObkmlTGE8nPe4MBLXuosGzg=", - "pom": "sha256-S6k2+Vjo8cNgymeJV8QmIA6wkDkScds3A4bZ61xtOlQ=" + "org/jetbrains/compose/ui#ui-text-desktop/1.9.0-alpha03": { + "jar": "sha256-aRXPnOofDRpE7Zv3FiZUBlF/ykEGrd5oENMnP42IlyI=", + "module": "sha256-UzZBUc5/hT3KX+jhFWHpaDzs4PHnCKphOdvvscmNOmY=", + "pom": "sha256-iGr3AHviKMYo1C6kIqmIij8NAeW0Q87MgVKaSPe/e1M=" }, - "org/jetbrains/compose/ui#ui-tooling-preview-desktop/1.8.1": { + "org/jetbrains/compose/ui#ui-text/1.9.0-alpha03": { + "jar": "sha256-dQKWV4sw/T1kw3iFyHJJJc9p74+u/rJ4+n9IAlWjiX4=", + "module": "sha256-CEWH12E9TxIdh2S8lAQYjQe2VWBNgh9ZiEPLhbS09lw=", + "pom": "sha256-hz2re7S7XYQHOqojcPUm4T6NY/lZf6lFlXqQN1k37ME=" + }, + "org/jetbrains/compose/ui#ui-tooling-preview-desktop/1.9.0-alpha03": { "jar": "sha256-eohirZEZhP91HQSZwyI+agxxqCG8t1qZ9mlk7tqmfXg=", - "module": "sha256-P8N3lhWKWd+iGBMFXYWht+qwHn3eWXNgfpHZAWK+3jE=", - "pom": "sha256-p+ZZxg79zO3DVMjiEa82sTFusOOwvtLSsKKtXtAaqRQ=" + "module": "sha256-Ft4lkGe7k1UaowVcOAjMj7isZj6xlFGK3JIwgoVUth0=", + "pom": "sha256-g3Jib31C6l/wznrF0gdcv280Q+Sh+Ydl9Lic/2OJB54=" }, - "org/jetbrains/compose/ui#ui-tooling-preview/1.8.1": { - "module": "sha256-+CQodkx902vv/qoutb/n9Kud9SmyFR2uKd5HtuZKH4w=", - "pom": "sha256-LvBNcjVLkczvteTDO0ptS8ZfhQQmokxHmf9ez8M+M3U=" + "org/jetbrains/compose/ui#ui-tooling-preview/1.9.0-alpha03": { + "module": "sha256-xoleUSc4gnEUFFnvDGgw9OMcTAd2KFb7dvdujb6rKSI=", + "pom": "sha256-zbOWWtFN260IRo8EPpU7d0oGi3m2k4TUPKCNnTOD1Wo=" }, - "org/jetbrains/compose/ui#ui-uikit/1.8.1": { + "org/jetbrains/compose/ui#ui-uikit/1.9.0-alpha03": { "jar": "sha256-GhOzmt860nZ/ln92S6Cg0u0qLQnu8xDyLSwDBNe9pss=", - "module": "sha256-QXn1sqsGWARHwgKZ+ROUMXLFVTdVff5HXm26lv1UiIs=", - "pom": "sha256-AUSPKG8NIoql2K8cSaI6Y4dB9EMXvP3lRq49PByYaTU=" + "module": "sha256-8e0MhyDhn+r9/8IQRURNXHhSzodwr+bEcRKr4TbH9mQ=", + "pom": "sha256-8GudMCzkSrxv2C79omBsYE9Ne7crbRZGfick1yKmlEk=" }, - "org/jetbrains/compose/ui#ui-unit-desktop/1.8.1": { - "jar": "sha256-KW0j3qp4tQjPldFM9b2lik861bQthfzIvs9uEv+9A34=", - "module": "sha256-fH48rTPyMPv0u1/hp+/1jtfr4mO18YDprUg0sw4PIX0=", - "pom": "sha256-tT1dMwSAKBuuts2g95OPipWgUcoumZawS8TglbR9/5A=" + "org/jetbrains/compose/ui#ui-unit-desktop/1.9.0-alpha03": { + "jar": "sha256-VRFEG5JHn2Tu1+iSX7nqj8g2BtS06BGdCO7WZCHewF4=", + "module": "sha256-fy2nNBJf5dpeDG3PPfrAxKStp+VPXCgsZmQX/yAVFds=", + "pom": "sha256-q3cGeeffTPLnLXjZSYKQFjyqAVutneWOf6MRsx7ZcnU=" }, - "org/jetbrains/compose/ui#ui-unit/1.8.1": { - "jar": "sha256-/DD6mH46ZXP7Wbza1QrYjEDiL0Y7NGlYlZBIp4RcDHM=", - "module": "sha256-ToFMts0PADpJkeMOCujkFY0de0JJuUdYPjfUEeDL3zQ=", - "pom": "sha256-aA0WVssRSftvZPgMwyBFNDAIGTMbGeW+wBUOpWvJqgY=" + "org/jetbrains/compose/ui#ui-unit/1.9.0-alpha03": { + "jar": "sha256-jdPYcS1ATiQtxaDU9CozatE9oeLvo0Y2IevYMT4O/8s=", + "module": "sha256-1rK00VM7yOilTej/zP7MqUJ+gxdlM+bA9kwIF0lJgJY=", + "pom": "sha256-7W6SArJAzWKYchLeWTi71Htdkt2zVxwolCeYNOobWfc=" }, - "org/jetbrains/compose/ui#ui-util-desktop/1.8.1": { - "jar": "sha256-47HEObTqgChb6Q6u2OcFZDf2cc+v5LGKOpy1OHyAvko=", - "module": "sha256-GQpqulWL9g5y46ArGd6BDwsUHGmGd7JdXFpbH8ay/ZE=", - "pom": "sha256-1RaGCp1pRQA4mF7tpH3ZKAvPkzD1iH/LiObmxwo5m90=" + "org/jetbrains/compose/ui#ui-util-desktop/1.9.0-alpha03": { + "jar": "sha256-YJPfHFvDGd7YzB8Ux56qTuAeQu1MqN2ptS3RM4yqclA=", + "module": "sha256-zl0GELVQbrnGMK1QxpLvv7EMwoUSMTOzNBQhJD2lgbU=", + "pom": "sha256-rDQeR4LxgQj3HlW2lJdLpibD2X8Rf3yGaiQFJMIvioQ=" }, - "org/jetbrains/compose/ui#ui-util/1.8.1": { - "jar": "sha256-/jAPJxAxwLwcn8pcr4+DnstL3omIZjsnPh2uBRSUum0=", - "module": "sha256-vLAWCjnlzHufrO0ey63qQNf5VmlQGWyffrGi+B9tnOs=", - "pom": "sha256-PrznVmxCJcgJpeM12CyeYB9IWcsMY7gv4i81qOvfBVg=" - }, - "org/jetbrains/compose/ui#ui/1.8.0": { - "module": "sha256-FOM6PYxigEyzFHWZ7gpjSmTA9xsN7i4hRUm+j9eCk0U=", - "pom": "sha256-pkQCj9i//MRRv+3nDZDPZhTFVIVvaKjiQZu5UvM+fGM=" + "org/jetbrains/compose/ui#ui-util/1.9.0-alpha03": { + "jar": "sha256-aUd5BWjrlAMSejcowWlRrHxzWlUN1+pVZGDgtXmsTBM=", + "module": "sha256-37yGlB6QxD0QPKacWu0edFCHBtnmGwo/gd7a+2UPtdM=", + "pom": "sha256-RWs2d8CUreW1Zx651Rlx8NBkOw42djFFewrZnJCQODM=" }, "org/jetbrains/compose/ui#ui/1.8.1": { - "jar": "sha256-RX5oQ17pk9vxLGDMKioq0clLZWH9xZrPHjbcwcukUR0=", "module": "sha256-1bMY7+7p4EnrrYbGyGOshwiomCsixLRjmKy8kLyzRYk=", "pom": "sha256-XwzZmppbK0Dz7k4el6sJUvVWVygS/6r+tVRCQXuuEjM=" }, + "org/jetbrains/compose/ui#ui/1.9.0-alpha03": { + "jar": "sha256-CtcyeE6GOHBDP53qTb1XZOdI/mSF4S/Ujn7J2g1/P3w=", + "module": "sha256-R9MerXfuarq5HnZkOumgTfrxnzpNvrueMqiIyN81f+0=", + "pom": "sha256-2XbLixVcWXHCRhIeJw4+3yznoP+lh4ZmlKwOlR9yfb0=" + }, "org/jetbrains/intellij/deps#trove4j/1.0.20200330": { "jar": "sha256-xf1yW/+rUYRr88d9sTg8YKquv+G3/i8A0j/ht98KQ50=", "pom": "sha256-h3IcuqZaPJfYsbqdIHhA8WTJ/jh1n8nqEP/iZWX40+k=" }, - "org/jetbrains/kotlin#compose-compiler-gradle-plugin/2.1.21": { - "module": "sha256-sYdQC4zfyNLBw6F7lhzEO3tOGFQS/NsEsDvrkPEz+70=", - "pom": "sha256-zBwgchGRVLwYQXGzQmk/99LF+dwhLR5aTMCZOGL81ec=" + "org/jetbrains/kotlin#abi-tools-api/2.2.0": { + "jar": "sha256-hxeDiGZkLjvdR+yeAmC70wdujH6GvgXirahoMesq+Qo=", + "pom": "sha256-UwmmvuGytgrDtfXTXMS2zDiKFzOA17jeqgIJ6wgUnpA=" }, - "org/jetbrains/kotlin#compose-compiler-gradle-plugin/2.1.21/gradle85": { - "jar": "sha256-uGEv2xhdzZiXGlG8H0K+k2e8vK7lE+NywkoU9O2xm4Y=" + "org/jetbrains/kotlin#compose-compiler-gradle-plugin/2.2.0": { + "module": "sha256-yujfY6oQEBSS5bomvTsxfEQ8CEb0YFYmyg31Pqp2kI4=", + "pom": "sha256-QLUrE0gN6thPU5glVtmUINr+crY3k655OZRb0nfe4uI=" }, - "org/jetbrains/kotlin#fus-statistics-gradle-plugin/2.1.21": { - "module": "sha256-dqMj2vtYjg+u6OMUi5EPtuw+tCL8EGQBBr5bfwapx/M=", - "pom": "sha256-v7ZAATVL2BgCx0mRTMLPWOWsXQWtnB9JrEZbdxbQUiU=" + "org/jetbrains/kotlin#compose-compiler-gradle-plugin/2.2.0/gradle813": { + "jar": "sha256-9z0vg2MAwCLeASLwVkL/UgcOAifzrNPjaxPXF+R7FSM=" }, - "org/jetbrains/kotlin#fus-statistics-gradle-plugin/2.1.21/gradle85": { - "jar": "sha256-/AkFgQMJpa0+oV37vhKaR+kNsRIVIyNkhBtyBEEk57A=" + "org/jetbrains/kotlin#fus-statistics-gradle-plugin/2.2.0": { + "module": "sha256-5d0u34ivdW30d1ra13xS0AkDUav1EZLPGdP+YsZnyrg=", + "pom": "sha256-Qejc6FcbX7TuAzURlYL+IoBQqP8ZPiRg1SmMX5Dj1nU=" + }, + "org/jetbrains/kotlin#fus-statistics-gradle-plugin/2.2.0/gradle813": { + "jar": "sha256-0M+f8jrTjCEO7QzCWlExWjhOYf3BWlP+uGwAvuaRqug=" }, "org/jetbrains/kotlin#kotlin-assignment-compiler-plugin-embeddable/2.0.21": { "jar": "sha256-VNSBSyF3IXiP2GU5gSMImi/P91FQ17NdjnMKI34my9E=", @@ -3106,106 +3304,106 @@ "jar": "sha256-cLmHScMJc9O3YhCL37mROSB4swhzCKzTwa0zqg9GIV0=", "pom": "sha256-qNP7huk2cgYkCh2+6LMBCteRP+oY+9Rtv2EB+Yvj4V0=" }, - "org/jetbrains/kotlin#kotlin-build-statistics/2.1.21": { - "jar": "sha256-OnYsHlWFWUR9r0IX/eK5grJQh1brECplcRlPEt1BrPo=", - "pom": "sha256-HSDrHKwGm5iFdxccNOBABfpcbmk1mR1ve6mGKl6uGng=" + "org/jetbrains/kotlin#kotlin-build-statistics/2.2.0": { + "jar": "sha256-klfy37x4iCf2AnUPrijX6UWTLq2QQVP3f09sTE2Y5RE=", + "pom": "sha256-8Uct+ZZDqe4VJrFEka0vaNz8Zunr9WywFuSFzaj69sI=" }, "org/jetbrains/kotlin#kotlin-build-tools-api/2.0.21": { "jar": "sha256-j8orSvbEzyRWXZp/ZMMXhIlRjQSeEGmB22cY7yLK4Y4=", "pom": "sha256-zL2XaTA2Y0gWKVGY5JRFNPr7c9d4+M1NQ588h7CQ9JQ=" }, - "org/jetbrains/kotlin#kotlin-build-tools-api/2.1.21": { - "jar": "sha256-BrtrNnHUvDunTA4O+rvc1VXMwtTMLvZ80wnFc4yNHlQ=", - "pom": "sha256-U5ag0mBsMOA66ZSnl8b5FoTG47LZ6aRf1pLl6T7sDJM=" + "org/jetbrains/kotlin#kotlin-build-tools-api/2.2.0": { + "jar": "sha256-HezZmyKUN3QfNqAIxnip2PrjBxbodyFRMI9W9owQ844=", + "pom": "sha256-I6QFgttMPijHq6X8fpZHvI1e/d+dAFWp5CyaCJbVzjM=" }, "org/jetbrains/kotlin#kotlin-build-tools-impl/2.0.21": { "jar": "sha256-um6iTa7URxf1AwcqkcWbDafpyvAAK9DsG+dzKUwSfcs=", "pom": "sha256-epPI22tqqFtPyvD0jKcBa5qEzSOWoGUreumt52eaTkE=" }, - "org/jetbrains/kotlin#kotlin-build-tools-impl/2.1.21": { - "jar": "sha256-5sfxijIo9WypFAClTdrSHh14mp+aByY7VgyMlTR8Y80=", - "pom": "sha256-Wtkc/mCCSH5t8hdVjUcnCDB4vHVjy0zZBEt6e00sBY4=" + "org/jetbrains/kotlin#kotlin-build-tools-impl/2.2.0": { + "jar": "sha256-SofzwCcvFyhdYOmGQ+whn1Ppta1aI/O8TFQ6hkT4bxc=", + "pom": "sha256-6DgEIFq2l7pyL0YiprG1GS70ejDL35ApdwFJQ3hQTv8=" }, "org/jetbrains/kotlin#kotlin-compiler-embeddable/2.0.21": { "jar": "sha256-n6jN0d4NzP/hVMmX1CPsa19TzW2Rd+OnepsN4D+xvIE=", "pom": "sha256-vUZWpG7EGCUuW8Xhwg6yAp+yqODjzJTu3frH6HyM1bY=" }, - "org/jetbrains/kotlin#kotlin-compiler-embeddable/2.1.21": { - "jar": "sha256-Z6LjZzdl8JdyVgjMfIQ7DY/dlL2a9BMnIRNhYUqlfUk=", - "pom": "sha256-27+KwlUNWxripifyBPKLFvknHjbETYmUqjsTnL9w5Fo=" + "org/jetbrains/kotlin#kotlin-compiler-embeddable/2.2.0": { + "jar": "sha256-svdD6luhL2ng815djUYGnXTI4oYQh1SKfg4Up4S8TPE=", + "pom": "sha256-FqFd0ZfPJBNJT3iMuWFE2aFGJnw9b38cFbejweBSNGo=" }, "org/jetbrains/kotlin#kotlin-compiler-runner/2.0.21": { "jar": "sha256-COYFvoEGD/YS0K65QFihm8SsmWJcNcRhxsCzAlYOkQQ=", "pom": "sha256-+Wdq1JVBFLgc39CR6bW0J7xkkc+pRIRmjWU9TRkCPm0=" }, - "org/jetbrains/kotlin#kotlin-compiler-runner/2.1.21": { - "jar": "sha256-cKiXK7e+GyuwmMml2nC+wd1EyxBNTaGqbjPcVRAo1Jo=", - "pom": "sha256-/BmETtKRd+x6tsN5jR0DnaRroncb+HEuKcLyRFncW44=" + "org/jetbrains/kotlin#kotlin-compiler-runner/2.2.0": { + "jar": "sha256-kHBq6Gcd77oBQI3RxUG6MJEskHDN8d3aGMUero1nkwQ=", + "pom": "sha256-iQfZfcaLv0CgrmZ5RZAvDtwWYdvPdDuuDf2nw7mp1Mg=" }, - "org/jetbrains/kotlin#kotlin-compose-compiler-plugin-embeddable/2.1.21": { - "jar": "sha256-ZxnS3XYgroz9FRtW0tPAyuV+ZC0ucosnKg6G0YQjJ28=", - "pom": "sha256-qeKk6p5W0S7L/pXHZPq2q+hg/eEN7c/LvT5X9W2qNng=" + "org/jetbrains/kotlin#kotlin-compose-compiler-plugin-embeddable/2.2.0": { + "jar": "sha256-gMZU83asR02r+w8zRBpB6wgxQ5I9S3tVpgrDZETkP+U=", + "pom": "sha256-dOsGBCFCF6Ve/V7J6sQn/sRlg/sDTGQVIYShg/fG2Bc=" }, "org/jetbrains/kotlin#kotlin-daemon-client/2.0.21": { "jar": "sha256-Nx6gjk8DaILMjgZP/PZEWZDfREKVuh7GiSjnzCtbwBU=", "pom": "sha256-8oY4JGtQVSC/6TXxXz7POeS6VSb6RcjzKsfeejEjdAA=" }, - "org/jetbrains/kotlin#kotlin-daemon-client/2.1.21": { - "jar": "sha256-MHDdA1nv5KE0jAzpuVsDJHmXZVmLt7aHbxVJq1NH6U8=", - "pom": "sha256-TVeT9Xm3mUDoeCxYvWgbnxZL2yvvAbcq2b5pqR6uq+4=" + "org/jetbrains/kotlin#kotlin-daemon-client/2.2.0": { + "jar": "sha256-ISk9oBbkuhKhKKwm/ZIKdOi4f1dM+bxDxgo9LnZFp64=", + "pom": "sha256-HESKBvDKmGiVi+CHesnof8TgG8uTaHp8rBLTxNCd7uY=" }, "org/jetbrains/kotlin#kotlin-daemon-embeddable/2.0.21": { "jar": "sha256-saCnPFAi+N0FpjjGt2sr1zYYGKHzhg/yZEEzsd0r2wM=", "pom": "sha256-jbZ7QN1gJaLtBpKU8sm8+2uW2zFZz+927deEHCZq+/A=" }, - "org/jetbrains/kotlin#kotlin-daemon-embeddable/2.1.21": { - "jar": "sha256-lAHv/YLehgbfMokwiidcwdNXN2hmXKXt0J3DGccXFfQ=", - "pom": "sha256-GbJjDusajsrIz3ClF2JBCiAXUvAxHrG2+RwB1B350dw=" + "org/jetbrains/kotlin#kotlin-daemon-embeddable/2.2.0": { + "jar": "sha256-omzI4thhkZfMTRFb6ndm6aqODx54duoETuG58wVlRgE=", + "pom": "sha256-vSrk4skWBWVKilUn2nV/KyJ2WA0fXq6+q9M0OvjVxGc=" }, - "org/jetbrains/kotlin#kotlin-gradle-plugin-annotations/2.1.21": { - "jar": "sha256-eEu/b4g00ez2XsUf57RLQW8zBS6CGWKlm55/dOCU9pY=", - "pom": "sha256-QxApK3Qc26Bu6iaC8YU5U4i+OvPLATzIo+gei5NokQA=" + "org/jetbrains/kotlin#kotlin-gradle-plugin-annotations/2.2.0": { + "jar": "sha256-nRsH2uVVnD/JwtzhW9hcNtwedt/zd/ExJIm9ZmDBZUQ=", + "pom": "sha256-uvxt1O1fRcLhvCgXfCxkDie/t8WQEZ6GW7nkCZOLrEA=" }, - "org/jetbrains/kotlin#kotlin-gradle-plugin-api/2.1.21": { - "jar": "sha256-VY+KMrr1qH6WlMi7OVVwqeduCuqrqmg/msH83oujqsw=", - "module": "sha256-q9fHAOmpTF3zzNlek9LuqwwZJkXXB+rZXFzqR+gcwns=", - "pom": "sha256-QG8P2ImjHfVX+txkaouXADreDCRrX7N6YTYZFWMgUfc=" + "org/jetbrains/kotlin#kotlin-gradle-plugin-api/2.2.0": { + "jar": "sha256-u6au4h0YX3LfiW80jw6nsRdcEc1mNzeZid+JnLSMl+E=", + "module": "sha256-AmOgtdQFEGmmFjJYOK5CGmxNAG3JsVWnpCkmYIiAC6c=", + "pom": "sha256-iG8sRJ+dvmQc0kPxk3FNegQlNrMCrEHHLVYOWmZmDIg=" }, - "org/jetbrains/kotlin#kotlin-gradle-plugin-api/2.1.21/gradle85": { - "jar": "sha256-VY+KMrr1qH6WlMi7OVVwqeduCuqrqmg/msH83oujqsw=" + "org/jetbrains/kotlin#kotlin-gradle-plugin-api/2.2.0/gradle813": { + "jar": "sha256-u6au4h0YX3LfiW80jw6nsRdcEc1mNzeZid+JnLSMl+E=" }, - "org/jetbrains/kotlin#kotlin-gradle-plugin-idea-proto/2.1.21": { - "jar": "sha256-BYO5l57dTI9f78CNWRGCHpw7Bakbg5+hqgcPkm7ny6A=", - "pom": "sha256-FLbl3/I/lNzTMmw9JXv2JeRVsVCVJiBcILNAtCw1f6M=" + "org/jetbrains/kotlin#kotlin-gradle-plugin-idea-proto/2.2.0": { + "jar": "sha256-QY4hdjJ20qlGFr6ZCCanRdWdTF2WY48LviERDSxWSTs=", + "pom": "sha256-w5AgQre9S2t3oY8+4f6ol9N7vroloD0Uqe7//hWCXn0=" }, - "org/jetbrains/kotlin#kotlin-gradle-plugin-idea/2.1.21": { - "jar": "sha256-APb4Q6vJMNDGGrtOPjAsjRd2EpH5srwlhv4SsMuXXq0=", - "module": "sha256-gIWGw896zkzfCLEYX7yv0PVcUhNIUPNmUlr7rlC7xTo=", - "pom": "sha256-N0agkbc65RnLtbszwftDNKYyR8W/kOgidFL9wgZ9+k8=" + "org/jetbrains/kotlin#kotlin-gradle-plugin-idea/2.2.0": { + "jar": "sha256-7JacXwsJn4I4RiMiOPm9ZPPTdB5i6pBQrS5DL6150KA=", + "module": "sha256-r+m2AUJwBIVJuyAySjGdYkoFoLnmtBfmm2kHldfPDUs=", + "pom": "sha256-/ewxpJDZDsNuf5qj12xVDgqVq9Otg3lTvUn6E9pwFQ0=" }, - "org/jetbrains/kotlin#kotlin-gradle-plugin-model/2.1.21": { - "jar": "sha256-aATNXwXXf6lUrHt6kw57V/rgjK8CTiKRiAo8KKSfwHU=", - "module": "sha256-Ifoqg7FTeAa7x+1lVrmVIqXhbziR6CiKG8/ozf0mQrg=", - "pom": "sha256-G8Rcq/W6A2rdAmkEVCOxH0pXv0tPylnjGzxCspFmAcI=" + "org/jetbrains/kotlin#kotlin-gradle-plugin-model/2.2.0": { + "jar": "sha256-Z6FKxCSqGWo0ax3Jn0QqbVc0WCrXt+epzN8oqc0rIJs=", + "module": "sha256-LC4w2DDqdpq6iX9PlvGeHoLY1qI/UzaJugn0GTMASYY=", + "pom": "sha256-bBzMOzcGY8KHIUn12briW/fpLqcVFepzxSlwlzbKMYk=" }, - "org/jetbrains/kotlin#kotlin-gradle-plugin/2.1.21": { - "module": "sha256-fhIOTfygjt1IkK/gtou6WqifJ/uhHY/mj2ttoLISk1g=", - "pom": "sha256-wMnxGQvSSKV9G3U26ahPw/6d8YCwJMPlblGi7iwLz80=" + "org/jetbrains/kotlin#kotlin-gradle-plugin/2.2.0": { + "module": "sha256-Y3w/yuVyOnQnAmwO2z3GeW3T/nmQ3CKG1PdJbt9dKYU=", + "pom": "sha256-E2FqOVx9n8Xc7iclKn9ocX2MaZTNEldL0dsxelGG1yE=" }, - "org/jetbrains/kotlin#kotlin-gradle-plugin/2.1.21/gradle85": { - "jar": "sha256-6sBIdsGrZgNvYBb9kIM/IEsCNsJ2R1nK0GknbgLLQ+Y=" + "org/jetbrains/kotlin#kotlin-gradle-plugin/2.2.0/gradle813": { + "jar": "sha256-g1xNwYoHMl9XkwUMfy52XSNcWWdJVo5HtZe0Sdhnlo0=" }, - "org/jetbrains/kotlin#kotlin-gradle-plugins-bom/2.1.21": { - "module": "sha256-avSUrGVuckg0HOukOePWJhFtARfJ+9+Xq+5lcOEaCHc=", - "pom": "sha256-eTmPhH1rfKipak5GOf+iLhaRJIr+tOgQGeEdG9C7IFI=" + "org/jetbrains/kotlin#kotlin-gradle-plugins-bom/2.2.0": { + "module": "sha256-ur08SXopcd/GjlAlT/lwZak6Ixg+jto8OY+E9gzsErI=", + "pom": "sha256-2cRaL1cw6E6bhPpCxkoYdNy6ZmjyEsT+KXvqJdwAeHg=" }, - "org/jetbrains/kotlin#kotlin-klib-commonizer-api/2.1.21": { - "jar": "sha256-Q+CkDB33nDOjBJkUvJ5mbkT7yyDwfUVo7qBZXpcqLHE=", - "pom": "sha256-3F+A6RGCz54qBN/XKdcOfTFOHt+NZGJLFm5o90lSw9Q=" + "org/jetbrains/kotlin#kotlin-klib-commonizer-api/2.2.0": { + "jar": "sha256-8FcCw6bq725+hCNTvmT1jTMHGX4Vp/F5gE08VQcZ7mk=", + "pom": "sha256-6R0DUNf9G+4pyP9OP9bxcZBS7P6V98wXZtnVwnD3iQk=" }, - "org/jetbrains/kotlin#kotlin-native-utils/2.1.21": { - "jar": "sha256-3ECUhclc04pfMNWHjr6ai/Lm5vJUtv6eRcygmZkF4HA=", - "pom": "sha256-2RW7ZEMRhfvbhlxNKxLmuniqaME0fFnfrieaMqIyhPk=" + "org/jetbrains/kotlin#kotlin-native-utils/2.2.0": { + "jar": "sha256-pOlvczba6EnznPK2NKU20CoqvfARS3M5Wty4yIGFDp4=", + "pom": "sha256-DafPXrsb0m4u/IkRhLzqM8tPKxwpNYEnr1MGHNataZY=" }, "org/jetbrains/kotlin#kotlin-reflect/1.6.10": { "jar": "sha256-MnesECrheq0QpVq+x1/1aWyNEJeQOWQ0tJbnUIeFQgM=", @@ -3227,63 +3425,60 @@ "jar": "sha256-nBEfjQit5FVWYnLVYZIa3CsstrekzO442YKcXjocpqM=", "pom": "sha256-lbLpKa+hBxvZUv0Tey5+gdBP4bu4G3V+vtBrIW5aRSQ=" }, - "org/jetbrains/kotlin#kotlin-script-runtime/2.1.21": { - "jar": "sha256-2CIfRFhU8wrJLCSNVDYJ4Oy12Fu1ujTAQ2hLATy1uJc=", - "pom": "sha256-/RCT8ncp9uYMG6xjkFYkDMXvP16zQUT/LqgahFeBFJQ=" + "org/jetbrains/kotlin#kotlin-script-runtime/2.2.0": { + "jar": "sha256-Ttl/0eDJux0JSO1eY8yRRWMTpZUYKVuSssFRSu9VYVA=", + "pom": "sha256-5QdIv0Z09lRgPnsbuDBjTsmevZwzDeukytzuwHZ8u1Y=" }, "org/jetbrains/kotlin#kotlin-scripting-common/2.0.21": { "jar": "sha256-+H3rKxTQaPmcuhghfYCvhUgcApxzGthwRFjprdnKIPg=", "pom": "sha256-hP6ezqjlV+/6iFbJAhMlrWPCHZ0TEh6q6xGZ9qZYZXU=" }, - "org/jetbrains/kotlin#kotlin-scripting-common/2.1.21": { - "jar": "sha256-RYLip8B/lTOptKZAijKl9Xll37FF1kaGCthn1GMIQ/E=", - "pom": "sha256-O04w8DuW7euw0ThjDCIwSN5w6MQILJDQaUPsok1B7tU=" + "org/jetbrains/kotlin#kotlin-scripting-common/2.2.0": { + "jar": "sha256-fJrISZ+pGyAep4NlN8Yl3VKoJUnlfms/F1zAx56atgQ=", + "pom": "sha256-1M1vjH2tiOZ9iVzT23qNTH3I6N3Y6WeOH1619gHZsO0=" }, "org/jetbrains/kotlin#kotlin-scripting-compiler-embeddable/2.0.21": { "jar": "sha256-JBPCMP3YzUfrvronPk35TPO0TLPsldLLNUcsk3aMnxw=", "pom": "sha256-1Ch6fUD4+Birv3zJhH5/OSeC0Ufb7WqEQORzvE9r8ug=" }, - "org/jetbrains/kotlin#kotlin-scripting-compiler-embeddable/2.1.21": { - "jar": "sha256-tbHg9AYvkc/iFtcGF+ivl3S1KI/YGeDOX2BQ+Nhukvo=", - "pom": "sha256-SCLW9orULZzZRP1zUpClvbXN8Psd1dpszG6F/AjtXfk=" + "org/jetbrains/kotlin#kotlin-scripting-compiler-embeddable/2.2.0": { + "jar": "sha256-ksfW7HxfBdisAcN+dHrGd9iS6ZusDeXlFmg7jzZAdys=", + "pom": "sha256-VjapUSxI/NqPgm+ypKwXPCnW6zV0ZHE9VNJaTUbsbBM=" }, "org/jetbrains/kotlin#kotlin-scripting-compiler-impl-embeddable/2.0.21": { "jar": "sha256-btD6W+slRmiDmJtWQfNoCUeSYLcBRTVQL9OHzmx7qDM=", "pom": "sha256-0ysb8kupKaL6MqbjRDIPp7nnvgbON/z3bvOm3ITiNrE=" }, - "org/jetbrains/kotlin#kotlin-scripting-compiler-impl-embeddable/2.1.21": { - "jar": "sha256-oSlfKCsHDAzv25aGFPb2SqcfG9vnRvHt9jUnQH1dlrE=", - "pom": "sha256-WM84eKRG1G8/YECYa5wrU9f3pNneB+0mQzNdWAuDdgQ=" + "org/jetbrains/kotlin#kotlin-scripting-compiler-impl-embeddable/2.2.0": { + "jar": "sha256-HSbL3a7rb/1FgIU5bs6gsID8Io/gBtz4MD2ldxHzN0U=", + "pom": "sha256-oeMpM4wq8LRweB0ECGnpsZdS+KTesi9D9qiR68dPH4I=" }, "org/jetbrains/kotlin#kotlin-scripting-jvm/2.0.21": { "jar": "sha256-iEJ/D3pMR4RfoiIdKfbg4NfL5zw+34vKMLTYs6M2p3w=", "pom": "sha256-opCFi++0KZc09RtT7ZqUFaKU55um/CE8BMQnzch5nA0=" }, - "org/jetbrains/kotlin#kotlin-scripting-jvm/2.1.21": { - "jar": "sha256-s/4fcumtSC1yb4nhOfRcSv57P4Ct/kzckdzAoiY3l40=", - "pom": "sha256-ghqPEByspjga2jbyM7nJH8wIhrNYT16qXPMESEm6tqI=" + "org/jetbrains/kotlin#kotlin-scripting-jvm/2.2.0": { + "jar": "sha256-YKjHQtYfRPIxH73IqGt2fRcboJ2XvnLWukUNN/fj/b8=", + "pom": "sha256-dii0nV53BennadESYAZtmmlXPW2Av4Iw0FRvWo54yJ4=" }, - "org/jetbrains/kotlin#kotlin-serialization-compiler-plugin-embeddable/2.1.21": { - "jar": "sha256-0hSA7OwU4CLaICr7xAkWfFPGT/ZAv7IZAiMP7cYoXeE=", - "pom": "sha256-chwbOMaiiJdBO7rhel3WMPRMBPlGiXNgTP4fYy42Z4s=" + "org/jetbrains/kotlin#kotlin-serialization-compiler-plugin-embeddable/2.2.0": { + "jar": "sha256-+1QsLXi5SGrYr9rC5f5IHizs0f9qwNXlVReBkgX7hp0=", + "pom": "sha256-/LYda1u7sX6VC98rYhYL/XeH1GTLnp8HLtUwMCyVuwI=" }, - "org/jetbrains/kotlin#kotlin-serialization/2.1.21": { - "module": "sha256-slOwL1BlFSW4AeKUXZr9RVUrRCC/FPzhxQDKX4lHyc8=", - "pom": "sha256-+oVjLbzKF7IlJM0ldKyFsgzE+u5oLIGeWDe+0Sncy4w=" + "org/jetbrains/kotlin#kotlin-serialization/2.2.0": { + "module": "sha256-J5YzW2kaW1kRKQSJD7mEz2miukJrlLArTT8Nbrg27GQ=", + "pom": "sha256-JWhP7DcwFNjDuuH09/FKz74Rk9u6KSuiF7gJ59+0eoQ=" }, - "org/jetbrains/kotlin#kotlin-serialization/2.1.21/gradle85": { - "jar": "sha256-G6Oulwq5Idk694SifQQ4wPjeXTIxqKX8lo7V+INk5d4=" - }, - "org/jetbrains/kotlin#kotlin-stdlib-common/1.6.10": { - "pom": "sha256-91ryF83Y3Z4HseDgGAhKMgkqCRo5C3P+qmV+xE5c8JQ=" + "org/jetbrains/kotlin#kotlin-serialization/2.2.0/gradle813": { + "jar": "sha256-5OpAsyLJqmsdT5K44bm41SNObJyxhPM0NMonqCth/yQ=" }, "org/jetbrains/kotlin#kotlin-stdlib-common/2.0.21": { "module": "sha256-b134r2M2AKa5z7D8x2SvPVEZ83Zndne5G2rugWsdMKs=", "pom": "sha256-X0As+413MZW5ZwUBJMnom1+EsXJGThiUkpeJv1xMLyk=" }, - "org/jetbrains/kotlin#kotlin-stdlib-common/2.1.21": { - "module": "sha256-pNj8FM7bN3mEOkf7zlIv0XPph1CRlk26wbjdeIT2wfk=", - "pom": "sha256-kk6Exb2AM5n2nFspYmsTKpSwBAL1X53lugGNyBHfo5M=" + "org/jetbrains/kotlin#kotlin-stdlib-common/2.2.0": { + "module": "sha256-WPwNZk/Dpn5+a+n9vq7b0hLfo+Un90T4YeeSzacsDkc=", + "pom": "sha256-U3q0BzqEelm6dtmaZFqGCbU4L/pdJZGjVLL6MR9JlzM=" }, "org/jetbrains/kotlin#kotlin-stdlib-jdk7/1.3.72": { "pom": "sha256-nVoT2avDNEXhNm0livCnfkLwGUWs73wJF7nVOYVOL84=" @@ -3291,35 +3486,44 @@ "org/jetbrains/kotlin#kotlin-stdlib-jdk7/1.8.0": { "pom": "sha256-36lkSmrluJjuR1ux9X6DC6H3cK7mycFfgRKqOBGAGEo=" }, + "org/jetbrains/kotlin#kotlin-stdlib-jdk7/1.8.21": { + "jar": "sha256-M9FI2w4R3r0NkGd9KCQrztkH+cd3MAAP1ZeGcIkDnYY=", + "pom": "sha256-m7EH1dXjkwvFl38AekPNILfSTZGxweUo6m7g8kjxTTY=" + }, "org/jetbrains/kotlin#kotlin-stdlib-jdk7/1.8.22": { - "jar": "sha256-BV9cskKH+hBhAJlae0erkhJrgegy6HX1+izwvVVpPQs=", "pom": "sha256-T5WKqZPVmE+PXr7UFGVipfOp9pW2BJyfKHOBN5ytqzM=" }, - "org/jetbrains/kotlin#kotlin-stdlib-jdk7/2.1.0": { - "jar": "sha256-/epsQgNyT0Lo5kvvLwv3kSnM0d8e3xzP/cIt599JjHY=", - "pom": "sha256-BvvBTssUoK9HtaP400dj9JM9XLpaPSRQRb/i8r25Gx4=" + "org/jetbrains/kotlin#kotlin-stdlib-jdk7/2.1.20": { + "jar": "sha256-U0O/eVeDky5fpTiwvKBa+BC7ByE+25uqdwx4QGj1eGc=", + "pom": "sha256-3PPeG6Uzk6RJx4nx5RX5qojGA6bTVqSA6kL/fUqYtzc=" }, - "org/jetbrains/kotlin#kotlin-stdlib-jdk7/2.1.10": { - "jar": "sha256-L4dvs1tz2YBuyFAHAyZavL1ap8PIH0GiylSoVahkmzQ=", - "pom": "sha256-6yvOL/52LUQE2Or+lYF3XLxbkLsfl/0xZLpyJRfTvsY=" + "org/jetbrains/kotlin#kotlin-stdlib-jdk7/2.1.21": { + "jar": "sha256-lmhGFy4QUstbNNezRkemR5mzP22oFlCfeCXFb1WJUjQ=", + "pom": "sha256-Dm8fi7CjxJxFYamSMAl0c4g/1bL121k5bQ5VGfJ2xDA=" }, "org/jetbrains/kotlin#kotlin-stdlib-jdk8/1.5.10": { "pom": "sha256-BtEZ8p4iMjNxAX2mfRDHShVrFfINnIIRalf+4UVMbGg=" }, + "org/jetbrains/kotlin#kotlin-stdlib-jdk8/1.7.22": { + "pom": "sha256-6vPC0+N6UU9C60yVVhpGVpFaJldJeWr53K4ox8pgQ1g=" + }, + "org/jetbrains/kotlin#kotlin-stdlib-jdk8/1.8.0": { + "pom": "sha256-K7bHVRuXx7oCn5hmWC56oZ1jq/1M1T2j/AxGLzq1/CY=" + }, "org/jetbrains/kotlin#kotlin-stdlib-jdk8/1.8.21": { + "jar": "sha256-PbdSowB08G7mxXmEqm8n2kT00rvH9UQmUfaYjxyyt9c=", "pom": "sha256-ODnXKNfDCaXDaLAnC0S08ceHj/XKXTKpogT6o0kUWdg=" }, "org/jetbrains/kotlin#kotlin-stdlib-jdk8/1.8.22": { - "jar": "sha256-QZiw6vCQpPJbb35aWVgfQxS6jJ9s0dE+6dNI5l7Y9wc=", "pom": "sha256-ko8hhyF0djE8uBbUgHC8dlSqO5pa6B0/xfjCecyPjZ4=" }, - "org/jetbrains/kotlin#kotlin-stdlib-jdk8/2.1.0": { - "jar": "sha256-I408fkkvEZtQ2hwiVG3XYkYuVfIkCWEfXlPdd2Jc1UQ=", - "pom": "sha256-52K4xFaQropqNd9YT1S+nJ2mWIXmGpBUJq6vylk34c4=" + "org/jetbrains/kotlin#kotlin-stdlib-jdk8/2.1.20": { + "jar": "sha256-7SIhe13AlAoGjYvpRAu+L3+fUcRmzdEYXiOFzewZ8jg=", + "pom": "sha256-5VDFII038AtTOMefcivvkwaR2gWE8tPgfYPTOk2kBuk=" }, - "org/jetbrains/kotlin#kotlin-stdlib-jdk8/2.1.10": { - "jar": "sha256-sJJg6kgo3Gz8Z9JhJ9rOOK4ru+ilZdLQKXJegcLSWOw=", - "pom": "sha256-YGyBfFx/1hFnDVWVK1dz+lxo8OPNJyelXe07GzzKLYc=" + "org/jetbrains/kotlin#kotlin-stdlib-jdk8/2.1.21": { + "jar": "sha256-h7T5Vt4nQBRGIn5HSsejGs/w0KgIcWDFQojB5vRqZ+Y=", + "pom": "sha256-9KkWH2LpUq9Q/WKhomCB8413f+zWlH/YQD8UR/hmnao=" }, "org/jetbrains/kotlin#kotlin-stdlib/2.0.20": { "jar": "sha256-+xaVlmWaUYNXxLLBb0PcdascSYBWXtS0oxegUOXjkAY=", @@ -3341,45 +3545,50 @@ "module": "sha256-DTc1BD1ot6WvtE0n3mX4Cp0rIIRicJwu27SP1bOVrYo=", "pom": "sha256-xVJAhso+SaZ5ht+P3M1mA3uvXzxaNYt2+d1gm+57tjg=" }, - "org/jetbrains/kotlin#kotlin-stdlib/2.1.21/all": { - "jar": "sha256-geB9406Esp4U8/3vkC9LxM8dXalZuGffaD++HMVM4eE=" + "org/jetbrains/kotlin#kotlin-stdlib/2.2.0": { + "jar": "sha256-ZdEthaO4ZcFg25FHhRcSpksQ2t1osi7qIqlb+KhnDco=", + "module": "sha256-pbmP3NnbAX1ULhlyJdzuGNZYpW3h2yzEHhMZbWsXaaQ=", + "pom": "sha256-jDyCEAfBNBFVhzm589U4LrgVUds4lc/7iVYeVsD03BY=" }, - "org/jetbrains/kotlin#kotlin-tooling-core/2.1.21": { - "jar": "sha256-tPu1I+hmLUqEUbmjap5/1D9jfLDNapueNoFxlmXavY0=", - "pom": "sha256-RdzNNvsgz0B28XOMmbzt98rdd3Xti8cWopgr0VzpaDA=" + "org/jetbrains/kotlin#kotlin-stdlib/2.2.0/all": { + "jar": "sha256-4jAPqlnJNSk9q7Chg9LmEIqbARxCcHbD97oQ0ktzugo=" }, - "org/jetbrains/kotlin#kotlin-util-io/2.1.21": { - "jar": "sha256-43JJKisFVtYv0Djj7fxFMbVQZUhs4o0E9HBj0rwDDBw=", - "pom": "sha256-XzfSWuJDprEFAHoH18j0Wd4zep84fMiz63VPmNZCoA4=" + "org/jetbrains/kotlin#kotlin-tooling-core/2.2.0": { + "jar": "sha256-dAFOxPPveM59p+Pmlk8sUmoxIdXFj++MopeeXzRFgvQ=", + "pom": "sha256-Fiq+zmN9Egvzs1mfJIETV3zey68Q1bInq3cFLmYykpM=" }, - "org/jetbrains/kotlin#kotlin-util-klib-metadata/2.1.21": { - "jar": "sha256-lMf8tAQF9WSCQAuqI1yW6BAQweBDv/YwC3CzTl6o2bs=", - "pom": "sha256-eoezrWbdJ6gKAzWv3R9Hij3SrldqmpQ7sfN2ORv435E=" + "org/jetbrains/kotlin#kotlin-util-io/2.2.0": { + "jar": "sha256-h//zwBlwqqkBGr3lZbtSoXmqbckDjFh4koHtK2jVji0=", + "pom": "sha256-NcfaTe0E3/GCIeDzgPo/NhIOvq2hOYOmEQtGWWaKbr0=" }, - "org/jetbrains/kotlin#kotlin-util-klib/2.1.21": { - "jar": "sha256-pSSDHpeV0+dW1N5Uy9WyEN6Al9rXxHiryVeuP2DgpxY=", - "pom": "sha256-CzeIoSSkcVMm+oZ3iFz7KYkf73jLKxbOBhP/JBCZ9Rg=" + "org/jetbrains/kotlin#kotlin-util-klib-metadata/2.2.0": { + "jar": "sha256-nOOw3gU8uf8HoPcXyhQvKQp05NGdkzLbImq+D+thyB4=", + "pom": "sha256-XVJ2wbYor7xCBZ80CoTe/Uv7XroYJm3zdDYH5XftX4c=" }, - "org/jetbrains/kotlin/android#org.jetbrains.kotlin.android.gradle.plugin/2.1.21": { - "pom": "sha256-V9d2eAb2wCMKmmD2aBii1MMH7RX3ne8mjCNnpQAfHpE=" + "org/jetbrains/kotlin#kotlin-util-klib/2.2.0": { + "jar": "sha256-FPB+vZrfvk6F+06/MSJSULL8P1Qo7OQ31O1j7D+prE0=", + "pom": "sha256-NU7YchvXXwfcCyQbiFg+7oLCTZIdN+lrctmNpi1ISEo=" }, - "org/jetbrains/kotlin/jvm#org.jetbrains.kotlin.jvm.gradle.plugin/2.1.21": { - "pom": "sha256-lwZWtSH+gItcWdy2DFS/3oMRciBCkmZ7vj+nAxeepgE=" + "org/jetbrains/kotlin/android#org.jetbrains.kotlin.android.gradle.plugin/2.2.0": { + "pom": "sha256-T5NJZTIJBBtZ6uDk3FUj+IS0Kr6/4zzZTBV2+9DaWU8=" }, - "org/jetbrains/kotlin/kapt#org.jetbrains.kotlin.kapt.gradle.plugin/2.1.21": { - "pom": "sha256-nfdRjr+L17rZKWGqSnml9aax4/d/ytSQalC1P3+PEWE=" + "org/jetbrains/kotlin/jvm#org.jetbrains.kotlin.jvm.gradle.plugin/2.2.0": { + "pom": "sha256-QBsEZwxCCyyDNuXLtxvL9tJCaVIIkRs1j73lk5dw/tk=" }, - "org/jetbrains/kotlin/multiplatform#org.jetbrains.kotlin.multiplatform.gradle.plugin/2.1.21": { - "pom": "sha256-DG0n8Kv57YUv6/7HHDxxnamPaBkK5hPJWXcogZMDhDc=" + "org/jetbrains/kotlin/kapt#org.jetbrains.kotlin.kapt.gradle.plugin/2.2.0": { + "pom": "sha256-EK1dJbeSBjb82VVbw5mkBVSOS5x7RWCfo729Ux/Zx2U=" }, - "org/jetbrains/kotlin/plugin/compose#org.jetbrains.kotlin.plugin.compose.gradle.plugin/2.1.21": { - "pom": "sha256-ETxHjQ2z/dXjKtMb1YAdde6ozujrmzG1ECxuU/WRjIo=" + "org/jetbrains/kotlin/multiplatform#org.jetbrains.kotlin.multiplatform.gradle.plugin/2.2.0": { + "pom": "sha256-Th/4G5CLrp1FxpqGmFPveeupDcyXEUjGYCpKrGwZ0nQ=" }, - "org/jetbrains/kotlin/plugin/parcelize#org.jetbrains.kotlin.plugin.parcelize.gradle.plugin/2.1.21": { - "pom": "sha256-whgPFdsRfKadJIGZ0bIQxP4zNd1y/UB9RrrHXUs/EXs=" + "org/jetbrains/kotlin/plugin/compose#org.jetbrains.kotlin.plugin.compose.gradle.plugin/2.2.0": { + "pom": "sha256-i6lXKixJ7Cd6QAKYfm3bdhFQXvOogL2sR7lDX4GrRUA=" }, - "org/jetbrains/kotlin/plugin/serialization#org.jetbrains.kotlin.plugin.serialization.gradle.plugin/2.1.21": { - "pom": "sha256-BPVi9hVzJ+zx1LlEtmaztYc+8XPxmtUkfKBwqL5cMTY=" + "org/jetbrains/kotlin/plugin/parcelize#org.jetbrains.kotlin.plugin.parcelize.gradle.plugin/2.2.0": { + "pom": "sha256-Pe0maNCDIMJHTqGiy34la90Fq8/SbWKF6twKL1MDVm0=" + }, + "org/jetbrains/kotlin/plugin/serialization#org.jetbrains.kotlin.plugin.serialization.gradle.plugin/2.2.0": { + "pom": "sha256-GDXSnI7Vf5WwZO0Na7y7pYTzBAh0YxAeFPSgY2exPi8=" }, "org/jetbrains/kotlinx#atomicfu-jvm/0.23.2": { "module": "sha256-9frJHDc6AJjlzK5iIeibtxoUkM9qiUnuNI1G7hyo06Y=", @@ -3464,15 +3673,15 @@ "module": "sha256-kFK7SUS5FqUGX2GNfUb+EqTAxonQIbyYQ1v4l3WIsWQ=", "pom": "sha256-zt+0Miu5cVkXrmmCCeoS3ziKuliVy7rRxWcith6EQ8A=" }, - "org/jetbrains/kotlinx#kotlinx-datetime-jvm/0.6.2": { - "jar": "sha256-ECdkkhEp4eRKdPQIt6C42sbRiSxgQuDkj4vbu/eMbS4=", - "module": "sha256-NU2xXaMv4YfblMbCNe96hDNrLdx5PQw3JEOZ320Kx9M=", - "pom": "sha256-OnOPkC80uNtLRGTRs9kj0mVuLKzEY2woadrFIO/Rbik=" + "org/jetbrains/kotlinx#kotlinx-datetime-jvm/0.7.0-0.6.x-compat": { + "jar": "sha256-N4w1jY0Y2GgTn3pYDCen0830hz8OPyFLn2JAnW+QStU=", + "module": "sha256-YPK2J+GEvwQ3IffXGzdRgsaUkbU86+KvvAGmIunYDZc=", + "pom": "sha256-fs60N3yxaihqLFhPO8A/2/1DTDHe86XEBNTHQFw5VOk=" }, - "org/jetbrains/kotlinx#kotlinx-datetime/0.6.2": { - "jar": "sha256-gZ1OTgmmi0foQqBHN7568eGyqyM6VvauSTp57lj3Jrs=", - "module": "sha256-F5UTkzbHp4fwwvvyHSFc/1mRxx+AIZyjyiYOA0eIzCg=", - "pom": "sha256-6LX1lHxGTDyHzUJEdZ1odW/Db3pvZGQAFHGmXEX0z6U=" + "org/jetbrains/kotlinx#kotlinx-datetime/0.7.0-0.6.x-compat": { + "jar": "sha256-9NUs0+G2huECJW1KZRXwksdoBKE0F9SAMtnaHzSmWP8=", + "module": "sha256-VIqIn29omVh7PDkPd3BJyNss7PTbG7GZC8GyH/WyHso=", + "pom": "sha256-5gqOhdZjzNTHK9XMhiIDv9/NcJ2W5jLI9Bfnb1YW8xc=" }, "org/jetbrains/kotlinx#kotlinx-io-bytestring-jvm/0.7.0": { "jar": "sha256-6jimaw/0btgt3tnoHS3OcOX74DvWzFK0/IhpOB3qe30=", @@ -3503,18 +3712,18 @@ "org/jetbrains/kotlinx#kotlinx-serialization-bom/1.8.0": { "pom": "sha256-xD5IdSnM/RIJ66hlOrjolZggNGSq+/5fBEje2ZKHFQk=" }, - "org/jetbrains/kotlinx#kotlinx-serialization-bom/1.8.1": { - "pom": "sha256-APNVWudiSFHGfbEsMIvJziauMnzw1yR2akAeW6AGCMc=" + "org/jetbrains/kotlinx#kotlinx-serialization-bom/1.9.0": { + "pom": "sha256-bX/zZcDvHNN2+1SxoWyAoh7Vj+tGwz80ULbPIuKxNT0=" }, - "org/jetbrains/kotlinx#kotlinx-serialization-cbor-jvm/1.8.1": { - "jar": "sha256-YExBMMp6DpeaRJz1UAh6XCxYZIXorwHc8ksDt7KHMG0=", - "module": "sha256-rgLBUPlwsgP3K/AozeUMR1cSY4++dmtcOAy6i9osPuo=", - "pom": "sha256-cL61rpsZVui0aLKyNaAn1UChPQLCkv/ryDjGBDbDlA8=" + "org/jetbrains/kotlinx#kotlinx-serialization-cbor-jvm/1.9.0": { + "jar": "sha256-5F8y8NgOEWRZPPz58ZB645hxCExqoI5JrMLo4i4dk84=", + "module": "sha256-p2T3qH/cndhDT+tKU1Jx6RbTbRrnlwdWdZBcSqQsxl4=", + "pom": "sha256-iN6S2cWW2Ql3OwIZD35qyLYlm+Fj/tDBfLAmML8UJeI=" }, - "org/jetbrains/kotlinx#kotlinx-serialization-cbor/1.8.1": { - "jar": "sha256-UEWTS54uI3e7VjgIAKuBnBX5W8Rse7cYgYuhBPT2tNU=", - "module": "sha256-+RTSOFj5Cbd1lUYiwq30F52UXUsJLOOzZmPKLcPJUZw=", - "pom": "sha256-4NNPstJ5ZwLyQWzetr+m5sqbMGHkSkI+UQ1b+pEyrNE=" + "org/jetbrains/kotlinx#kotlinx-serialization-cbor/1.9.0": { + "jar": "sha256-Cn6OuNtbI5Mfd+2wyMwvBwQ8OjVJRlDD1y28yAfwRzM=", + "module": "sha256-uMMMi+ontK+O6ze1MiM5j4XIFWZ0UbXpJcDQipgyatU=", + "pom": "sha256-WjRfczbaDdI9ehpAy0msOt8y97kR6zZzCY8/aCsA9Oc=" }, "org/jetbrains/kotlinx#kotlinx-serialization-core-jvm/1.6.3": { "jar": "sha256-KcghqNTiXL/k8s6WzdRSb2H49OaaE1+WEqNKgdk7ZfE=", @@ -3526,10 +3735,10 @@ "module": "sha256-NzH80jhWGpCpdSs0hfHWNeAbRF5Kd4F9ewd/S50vQi0=", "pom": "sha256-QVKRtvWbeTemcau136BLJyl811jLUQLNzHWUFJj5wDw=" }, - "org/jetbrains/kotlinx#kotlinx-serialization-core-jvm/1.8.1": { - "jar": "sha256-NWW21NeJv3BoPEVWaUQof8HY3HXCPZi9h9AQWcx28rM=", - "module": "sha256-++GdWIrX1fZGZmaCA0/0Tglo0iBx/mzPn5ngPHpe+lc=", - "pom": "sha256-RGZV6NQ4KL+7OHzp0VGpNxowkrSLkJ6AYGtT/FiXnig=" + "org/jetbrains/kotlinx#kotlinx-serialization-core-jvm/1.9.0": { + "jar": "sha256-Hwr6FyEQ5FpyMe8bRK6P2Eweuv+W8/w61o74xIEgtZw=", + "module": "sha256-cMh+MWGSq3cpqmOZIgKQ98jZ/dTZNC3J+cDkKFarNG0=", + "pom": "sha256-hxkNQ05icv7WBa8PztFfa8CC2KVQQMUZjm1LLWovysI=" }, "org/jetbrains/kotlinx#kotlinx-serialization-core/1.6.2": { "module": "sha256-arz0gTrJTfA3AS4xZzaKNEUHD9+OqyHQjYhtTtnC+2c=", @@ -3543,10 +3752,10 @@ "module": "sha256-mE2aqabpvMONfoNuqNAAsThyCH/GZY0NjWIldjPzlfE=", "pom": "sha256-nVbnQWLOQn4MSetsuXUSR0Mq3PwukTw4KWY+27qr7hM=" }, - "org/jetbrains/kotlinx#kotlinx-serialization-core/1.8.1": { - "jar": "sha256-2ZhZ/4zEmudp+Uivgj9GlHs+Vhf+wmg/3pUdTQ4Kd0k=", - "module": "sha256-eL3oMFSUrxs445ZrUleskINAFkk/i60hm4iGx/vbJdU=", - "pom": "sha256-Rz8Ko+Sheqt4YNykkNxC6rthJPHSlT5qmVoIcX5QxxQ=" + "org/jetbrains/kotlinx#kotlinx-serialization-core/1.9.0": { + "jar": "sha256-ecpZ3uVj+c/AXmZzvUDDyUAgn8awUAZ+9+bZ2j7rslY=", + "module": "sha256-jNEYEwvyIIAgKeI5l0oz0nL00COlYQ9Vfs5rD4mV+J8=", + "pom": "sha256-lTt2Dcs2Ooqgz+X5GMPd0SRmh4XZGKw/QAsZGZasrJ0=" }, "org/jetbrains/kotlinx#kotlinx-serialization-json-jvm/1.6.3": { "jar": "sha256-0yNBebz/GIbVPWfBHspH9/PPe2PDSdFpZfbbUbfz3Zo=", @@ -3558,10 +3767,10 @@ "module": "sha256-l+NZl/6prZY63lv0wDko/lOXS4JlIdSwP7+zyrAgiqo=", "pom": "sha256-4CSBj4YiByqIM8DTmVd3Uet3ZJymO9DA/AYATWaRd6Q=" }, - "org/jetbrains/kotlinx#kotlinx-serialization-json-jvm/1.8.1": { - "jar": "sha256-h2nlZHVX43AJGcMtUI9cXa1TxdgjTNEIRjVPvP8UqiQ=", - "module": "sha256-uZHLSTQAwdlgut+oYhcVjGN+XsqIgbIM0BJbtOz8+DE=", - "pom": "sha256-1mXWtB/gWPZmpvOGrS5JzBAe+P0u7+/vy8ER6R7oJDY=" + "org/jetbrains/kotlinx#kotlinx-serialization-json-jvm/1.9.0": { + "jar": "sha256-2UzDTK45JGoa90/aY/nEgSzhIhbvZB1fo7u7U5ppItg=", + "module": "sha256-u634x2urP82I/ORbO7tj37FIfzgCHhvdg7+5MQ735po=", + "pom": "sha256-azQzwqqesmYo26vxbJYzTKqzD24HcQ0Q7n+HkGznMN0=" }, "org/jetbrains/kotlinx#kotlinx-serialization-json/1.6.3": { "module": "sha256-gNHYf6CmO/+Dleo5EL2oDQnw9YNQTd6o7QB7x6hrTNQ=", @@ -3571,34 +3780,38 @@ "module": "sha256-lK/eU8GRw+Hge5+AiqF3f4YryKlbxQtGYozQkhnVaFg=", "pom": "sha256-WAgq+Zc0Ah1bjbKcQ1sR1FyhGxwP14bHhFIsnSxxeVg=" }, - "org/jetbrains/kotlinx#kotlinx-serialization-json/1.8.1": { - "jar": "sha256-WK3zNYoPmd2NZqVQ++GQZNOV4NX38eRlFc00cKVvu7A=", - "module": "sha256-f33wBUM932BPUqq9avsh65YJMZfLS90Hk8SEydPEtnU=", - "pom": "sha256-x3AMmcg94CtGVBo9fktps4h0m3wPV9zrRU0UPyzYens=" + "org/jetbrains/kotlinx#kotlinx-serialization-json/1.9.0": { + "jar": "sha256-8NRkNgU2KrFYwRsg9si+FyYCO7kxuerV/6WhTiM4394=", + "module": "sha256-T8E+xBK3uaIToX39qjNkV4Ab4W/BZa2GsLcxT9CW5ww=", + "pom": "sha256-mUGX39Wqub9VhVbCFW/eIoK6b8OtR/RmoIznk1zPR2Q=" }, - "org/jetbrains/kotlinx#kotlinx-serialization-protobuf-jvm/1.8.1": { - "jar": "sha256-+9F09y6oI2S6oRIGny17NhdY9raL2B0qxRsCxmpI6SQ=", - "module": "sha256-klXX5uXZzp3bV2f6KNPGmShYhGZ+kaph4bE12YjuCJM=", - "pom": "sha256-pYV9XmD4gWHKeEQUai/jfyiV+B5SMJCbFRtKPY7AMpw=" + "org/jetbrains/kotlinx#kotlinx-serialization-protobuf-jvm/1.9.0": { + "jar": "sha256-VVA1IFrRohJUtJ/Wtd2+atGrtce6uiRCWL11j4Boe8o=", + "module": "sha256-p/t741TYikH7SYLX67JhwMBVlnV1vihfqaZZIOcPw20=", + "pom": "sha256-fZIz7eXK8jgiBAVsevV7Bdfwc1qL7C49KwdMeeBzyGQ=" }, - "org/jetbrains/kotlinx#kotlinx-serialization-protobuf/1.8.1": { - "jar": "sha256-WXhdxbkL4v1wnxP8FpreJ+ppeFXIKuMS4YjHw43mZyY=", - "module": "sha256-LZ+TjZbK4twphqfvbyy9Fnan+HVLLVH8vk04Y92rfD0=", - "pom": "sha256-YTuFlIYGTe0T+YpQCtBJ284ZpY/DO/d3ajgSx9Cg/RA=" + "org/jetbrains/kotlinx#kotlinx-serialization-protobuf/1.9.0": { + "jar": "sha256-ib3UlPnQyek2J1fAAfnt8LznqPFv9sKz98fqVWMp0XQ=", + "module": "sha256-mwFJcOIvn6AaDZtp6Hnc08FDY7cZxIn/T4IV/wNAyk0=", + "pom": "sha256-fGITTg4BarB1VpjDWLOZAXsIikBFkj7K/rI9CL4yQEc=" }, - "org/jetbrains/skiko#skiko-awt-runtime-linux-x64/0.9.4.2": { - "jar": "sha256-BgMd7mf+Oqid1HK5CwVX+sTPPbPOhcrNuiuohVuARC4=", - "pom": "sha256-OFs3RHR+HV7O1XeZG+5Y/IaclA6Ga59g2moLl+iNRfs=" + "org/jetbrains/runtime#jbr-api/1.5.0": { + "jar": "sha256-ZX7efX+OF1yQmyPKoQ/NTUpREwT9k4qpzIRXtDeJUNU=", + "pom": "sha256-/jziiqT0Ga0GcErRyoIzTQ6HFmfKWxE8UVfnUXzhMh4=" }, - "org/jetbrains/skiko#skiko-awt/0.9.4.2": { - "jar": "sha256-fQxhrXQp0vnBbaGMtAi5PIOiO9iE57JdICJcEjsUWQs=", - "module": "sha256-QLtd1spRZwbFeF6FWNzouZquZt+jOqW3SrgtJdpF6QM=", - "pom": "sha256-nFBlTp2Mzx1vR/53vsHXPObqcGI0Li13AdnKF49e1Is=" + "org/jetbrains/skiko#skiko-awt-runtime-linux-x64/0.9.18": { + "jar": "sha256-4P1mqoajyPXIJLBJL5sI/P5UN4gB7x+Sir1GVA1jM/8=", + "pom": "sha256-Pq8UmTxE+PUpwzy1muo0sTOUb9l4AaOvleqy97sBOmo=" }, - "org/jetbrains/skiko#skiko/0.9.4.2": { - "jar": "sha256-ebDT2cpWGoqzLVJ9y5Q8+GVPebZXsrNMu4OQlwydSSM=", - "module": "sha256-6jCa+fvM7wsStVetEF9GVXgxEhYgMLvwXkYYc79SPSc=", - "pom": "sha256-JJZxEpDExjiEPbjjXqPm8dWXBlshEhYCvsAEQE7+3dA=" + "org/jetbrains/skiko#skiko-awt/0.9.18": { + "jar": "sha256-xGaOKnif9vLlmnLAs6xhVAppYYtDbJCoTOLT7Zd4atI=", + "module": "sha256-EGBQrIr05YJ2+Bq2FzKs0MevZ21FIbMtioBx8MPV2y0=", + "pom": "sha256-rCr1hVUP1G5nNukZWzUgDfh1Bf5g4dpqke0lNzxLA3s=" + }, + "org/jetbrains/skiko#skiko/0.9.18": { + "jar": "sha256-1lA/lgz5/+CHXIQmBK8lCpANBiR7OKAnO984cz48w4s=", + "module": "sha256-cVpesso+V/XZiU3JB7pVKzwLiJFU70d9CkX5vNAQ13E=", + "pom": "sha256-ULBGubYqCTrihATJtiQrtHFBNYhH5e6gC2AZueIlgec=" }, "org/jgrapht#jgrapht-core/1.5.2": { "jar": "sha256-36WW6fDQg48bXoHdDNYOOnbCwpCsJaCgKf/eWM9eTBQ=", @@ -3636,6 +3849,10 @@ "module": "sha256-qaTye+lOmbnVcBYtJGqA9obSd9XTGutUgQR89R2vRuQ=", "pom": "sha256-GdS3R7IEgFMltjNFUylvmGViJ3pKwcteWTpeTE9eQRU=" }, + "org/junit#junit-bom/5.12.2": { + "module": "sha256-3nCsXZGlJlbYiQptI7ngTZm5mxoEAlMN7K1xvzGyc14=", + "pom": "sha256-zvgP7IZFT2gGv7DfJGabXG8y4styhTnqhZ9H39ybvBc=" + }, "org/jvnet/staxex#stax-ex/1.8.1": { "jar": "sha256-IFIlSQVunlCqNe8LRFouR6U9Br4LCpRn1wTiSD/7BJo=", "pom": "sha256-j8hPNs5tps6MiTtlOBmaf2mmmgcG2bF6PuajoJRS7tY=" @@ -3771,9 +3988,16 @@ "jar": "sha256-oSV43eG6AL2bgW04iguHmSjQC6s8g8JA9wE79BlsV5o=", "pom": "sha256-saAPWxxNvmK4BdZdI5Eab3cGOInXyx6G/oOJ1hkEc/c=" }, + "org/slf4j#slf4j-api/2.0.17": { + "jar": "sha256-e3UdlSBhlU1av+1xgcH2RdM2CRtnmJFZHWMynGIuuDI=", + "pom": "sha256-FQxAKH987NwhuTgMqsmOkoxPM8Aj22s0jfHFrJdwJr8=" + }, "org/slf4j#slf4j-bom/2.0.16": { "pom": "sha256-BWYEjsglzfKHWGIK9k2eFK44qc2HSN1vr6bfSkGUwnk=" }, + "org/slf4j#slf4j-bom/2.0.17": { + "pom": "sha256-940ntkK0uIbrg5/BArXNn+fzDzdZn/5oGFvk4WCQMek=" + }, "org/slf4j#slf4j-parent/1.7.25": { "pom": "sha256-GPXFISDbA26I1hNviDnIMtB0vdqVx1bG9CkknS21SsY=" }, @@ -3783,6 +4007,9 @@ "org/slf4j#slf4j-parent/2.0.16": { "pom": "sha256-CaC0zIFNcnRhbJsW1MD9mq8ezIEzNN5RMeVHJxsZguU=" }, + "org/slf4j#slf4j-parent/2.0.17": { + "pom": "sha256-lc1x6FLf2ykSbli3uTnVfsKy5gJDkYUuC1Rd7ggrvzs=" + }, "org/sonatype/oss#oss-parent/7": { "pom": "sha256-tR+IZ8kranIkmVV/w6H96ne9+e9XRyL+kM5DailVlFQ=" }, @@ -3792,11 +4019,6 @@ "org/tensorflow#tensorflow-lite-metadata/0.2.0": { "jar": "sha256-6fGLikHwF+kDPLDthciiuiMHKSzf4l6uNlkj56MdKnA=", "pom": "sha256-D+MTJug7diLLzZx11GeykfAf/jzG4+dmUawFocHHo2A=" - }, - "tv/wunderbox#nativefiledialog/1.0.3": { - "jar": "sha256-Uylw98VdRF8E5NBaa0Pw6Gdjgi0IrYnkxp4ymdMaDXQ=", - "module": "sha256-ccMC3YcbfoIsZ5V28baF6UueyQUshzkF6yFN+kqrufw=", - "pom": "sha256-rk4+z470z6LX39SJRUeIM+pDNL4Kq2+XoENzJBX7rr8=" } } } diff --git a/pkgs/by-name/ke/keyguard/package.nix b/pkgs/by-name/ke/keyguard/package.nix index b305093f520b..69436ec8e410 100644 --- a/pkgs/by-name/ke/keyguard/package.nix +++ b/pkgs/by-name/ke/keyguard/package.nix @@ -19,13 +19,13 @@ stdenv.mkDerivation (finalAttrs: { pname = "keyguard"; - version = "1.12.3"; + version = "1.13.0"; src = fetchFromGitHub { owner = "AChep"; repo = "keyguard-app"; - tag = "r20250530"; - hash = "sha256-FTDZ4ztFv+pcyupI+tHr+VLrENSN6hqs13i1KJmreAM="; + tag = "r20250705"; + hash = "sha256-9UT75HntRswpf1G04x07DfxNfR3PsMv0Ee/NRVrJS3Y="; }; postPatch = '' diff --git a/pkgs/by-name/ki/kics/package.nix b/pkgs/by-name/ki/kics/package.nix index 80b2a3fdf261..d315c28e208e 100644 --- a/pkgs/by-name/ki/kics/package.nix +++ b/pkgs/by-name/ki/kics/package.nix @@ -8,16 +8,16 @@ buildGoModule rec { pname = "kics"; - version = "2.1.11"; + version = "2.1.12"; src = fetchFromGitHub { owner = "Checkmarx"; repo = "kics"; tag = "v${version}"; - hash = "sha256-WtqP+6mMzVT/boKuMVWJadUNQanIQDrh50RqrdMM/FM="; + hash = "sha256-InoH/BzRJtJaFGL1OjLpRoz72Gkrf03WRZQUDyxnFDM="; }; - vendorHash = "sha256-5Am4iJpAKdU00hP5BBrd57ULXs/h/Ja9sm29HmYVOYw="; + vendorHash = "sha256-kKK3kSWjork6KZdPzKySsiHR0bOLKlzltP/u6ZQioqM="; subPackages = [ "cmd/console" ]; diff --git a/pkgs/by-name/le/lexbor/package.nix b/pkgs/by-name/le/lexbor/package.nix index f15ce43431df..a10068899b83 100644 --- a/pkgs/by-name/le/lexbor/package.nix +++ b/pkgs/by-name/le/lexbor/package.nix @@ -7,13 +7,13 @@ stdenv.mkDerivation (finalAttrs: { pname = "lexbor"; - version = "2.4.0"; + version = "2.5.0"; src = fetchFromGitHub { owner = "lexbor"; repo = "lexbor"; tag = "v${finalAttrs.version}"; - hash = "sha256-wsm+2L2ar+3LGyBXl39Vp9l1l5JONWvO0QbI87TDfWM="; + hash = "sha256-QmD8p6dySLEeHjCmDSTplXwsy2Z7yHKYlXmPCKwaBfU="; }; nativeBuildInputs = [ diff --git a/pkgs/by-name/li/libmbd/package.nix b/pkgs/by-name/li/libmbd/package.nix index ce975085ab8f..92d8ff469825 100644 --- a/pkgs/by-name/li/libmbd/package.nix +++ b/pkgs/by-name/li/libmbd/package.nix @@ -15,13 +15,13 @@ assert !lapack.isILP64; stdenv.mkDerivation rec { pname = "libMBD"; - version = "0.12.8"; + version = "0.13.0"; src = fetchFromGitHub { owner = "libmbd"; repo = "libMBD"; rev = version; - hash = "sha256-ctUaBLPaZHoV1rU3u1idvPLGbvC9Z17YBxYKCaL7EMk="; + hash = "sha256-mSKD/pNluumKP3SCubD68uak2Vya/1tyIh42UxRgSXY="; }; preConfigure = '' diff --git a/pkgs/by-name/li/libnvme/package.nix b/pkgs/by-name/li/libnvme/package.nix index 3c898afb8a8d..c894494686e9 100644 --- a/pkgs/by-name/li/libnvme/package.nix +++ b/pkgs/by-name/li/libnvme/package.nix @@ -19,7 +19,7 @@ stdenv.mkDerivation (finalAttrs: { pname = "libnvme"; - version = "1.11.1"; + version = "1.15"; outputs = [ "out" ] ++ lib.optionals withDocs [ "man" ]; @@ -27,7 +27,7 @@ stdenv.mkDerivation (finalAttrs: { owner = "linux-nvme"; repo = "libnvme"; rev = "v${finalAttrs.version}"; - hash = "sha256-CEGr7PDOVRi210XvICH8iLYDKn8S9bGruBO4tycvsT8="; + hash = "sha256-PdSlynwOjC9SkUh3H6doEgHwwBry5Ti5XjRoS2bc5a0="; }; postPatch = '' diff --git a/pkgs/by-name/li/liboprf/package.nix b/pkgs/by-name/li/liboprf/package.nix new file mode 100644 index 000000000000..3944080262fb --- /dev/null +++ b/pkgs/by-name/li/liboprf/package.nix @@ -0,0 +1,41 @@ +{ + lib, + stdenv, + fetchFromGitHub, + pkgconf, + libsodium, + nix-update-script, +}: + +stdenv.mkDerivation (finalAttrs: { + pname = "liboprf"; + version = "0.7.1"; + + src = fetchFromGitHub { + owner = "stef"; + repo = "liboprf"; + tag = "v${finalAttrs.version}"; + hash = "sha256-auC6iVTMbLktKCPY8VgOdx2dMI2KDzNgtY1zyNXjM1A="; + }; + + sourceRoot = "${finalAttrs.src.name}/src"; + + strictDeps = true; + + nativeBuildInputs = [ pkgconf ]; + + buildInputs = [ libsodium ]; + + makeFlags = [ "PREFIX=$(out)" ]; + + passthru.updateScript = nix-update-script { }; + + meta = { + description = "Library providing OPRF and Threshold OPRF based on libsodium"; + homepage = "https://github.com/stef/liboprf"; + changelog = "https://github.com/stef/liboprf/releases/tag/v${finalAttrs.version}"; + license = lib.licenses.lgpl3Plus; + teams = [ lib.teams.ngi ]; + platforms = lib.platforms.unix; + }; +}) diff --git a/pkgs/by-name/li/libphidget22/package.nix b/pkgs/by-name/li/libphidget22/package.nix index 8f38eaf8847e..4be4da81ccfb 100644 --- a/pkgs/by-name/li/libphidget22/package.nix +++ b/pkgs/by-name/li/libphidget22/package.nix @@ -7,7 +7,7 @@ }: let # This package should be updated together with libphidget22extra - version = "1.22.20250324"; + version = "1.22.20250714"; in stdenv.mkDerivation { pname = "libphidget22"; @@ -15,7 +15,7 @@ stdenv.mkDerivation { src = fetchurl { url = "https://www.phidgets.com/downloads/phidget22/libraries/linux/libphidget22/libphidget22-${version}.tar.gz"; - hash = "sha256-FR/+b4z73LtGQdT4gypre9SZmZSiWzP/Q+00uia1lhA="; + hash = "sha256-QsdNyShJkKtRHNtezO9jF2ZUilrTaqZBMTp+UcWNkhA="; }; nativeBuildInputs = [ automake ]; diff --git a/pkgs/by-name/li/livi/package.nix b/pkgs/by-name/li/livi/package.nix index 0ceea80f2d53..34a434ba88b1 100644 --- a/pkgs/by-name/li/livi/package.nix +++ b/pkgs/by-name/li/livi/package.nix @@ -16,14 +16,14 @@ stdenv.mkDerivation rec { pname = "livi"; - version = "0.3.1"; + version = "0.3.2"; src = fetchFromGitLab { owner = "guidog"; repo = "livi"; domain = "gitlab.gnome.org"; rev = "v${version}"; - hash = "sha256-cPnmKepXPeA3h0VYHypEPHAOclhVseokL1NsCKxGJ78="; + hash = "sha256-cLvSK50RnXCYoXwpp+unTVnxqCkPa3Zr4dZT0TpYFpE="; }; nativeBuildInputs = [ meson diff --git a/pkgs/by-name/me/megasync/package.nix b/pkgs/by-name/me/megasync/package.nix index 415b6c85d14a..4c3a26d3c6db 100644 --- a/pkgs/by-name/me/megasync/package.nix +++ b/pkgs/by-name/me/megasync/package.nix @@ -34,13 +34,13 @@ }: stdenv.mkDerivation (finalAttrs: { pname = "megasync"; - version = "5.12.0.1"; + version = "5.14.0.2"; src = fetchFromGitHub rec { owner = "meganz"; repo = "MEGAsync"; tag = "v${finalAttrs.version}_Linux"; - hash = "sha256-dIva/Xmk7enmRbczfuy1VLAcAMPQ27HUaHEQSTsldaY="; + hash = "sha256-iYAyk8UCIuYaacdviPSuWmwx6hgzHveW9oyftISZo7s="; fetchSubmodules = false; # DesignTokensImporter cannot be fetched, see #1010 in github:meganz/megasync leaveDotGit = true; postFetch = '' diff --git a/pkgs/by-name/mi/mihomo-party/package.nix b/pkgs/by-name/mi/mihomo-party/package.nix index b1b410d023ae..45e1e42db6a8 100644 --- a/pkgs/by-name/mi/mihomo-party/package.nix +++ b/pkgs/by-name/mi/mihomo-party/package.nix @@ -16,7 +16,7 @@ stdenv.mkDerivation (finalAttrs: { pname = "mihomo-party"; - version = "1.7.6"; + version = "1.8.3"; src = let @@ -31,8 +31,8 @@ stdenv.mkDerivation (finalAttrs: { fetchurl { url = "https://github.com/mihomo-party-org/mihomo-party/releases/download/v${finalAttrs.version}/mihomo-party-linux-${finalAttrs.version}-${arch}.deb"; hash = selectSystem { - x86_64-linux = "sha256-83RajPreGieOYBAkoR6FsFREnOGDDuMK6+Qg+R/koac="; - aarch64-linux = "sha256-oWOXLUYWRKRgPtNv9ZvM1ODd44dhymVTKHJBK/xxOOs="; + x86_64-linux = "sha256-3x6xueQS81IWutY0BH52wRdb8Fh2kTQF7QgwZACE6kk="; + aarch64-linux = "sha256-SBPFnY/0CAUhEpZe+wav+HY2kmZ45+gzoXrUn7jUrts="; }; }; diff --git a/pkgs/by-name/mp/mprisence/package.nix b/pkgs/by-name/mp/mprisence/package.nix new file mode 100644 index 000000000000..70adacdba0dc --- /dev/null +++ b/pkgs/by-name/mp/mprisence/package.nix @@ -0,0 +1,38 @@ +{ + lib, + rustPlatform, + fetchFromGitHub, + pkg-config, + dbus, + openssl, +}: + +rustPlatform.buildRustPackage (finalAttrs: { + pname = "mprisence"; + version = "1.2.4"; + + src = fetchFromGitHub { + owner = "lazykern"; + repo = "mprisence"; + tag = "v${finalAttrs.version}"; + hash = "sha256-eUUUHjR6wnbaPb1QD9luEVvu5qSAxG5c4TuMjnzRV40="; + }; + + cargoHash = "sha256-BnzDMvwqQ56VFc7AuzsfyZ002qcmRaAOMfipynZ1/Mc="; + + nativeBuildInputs = [ pkg-config ]; + + buildInputs = [ + dbus + openssl + ]; + + meta = with lib; { + description = "Highly customizable Discord Rich Presence for MPRIS media players on Linux"; + homepage = "https://github.com/lazykern/mprisence"; + license = licenses.mit; + maintainers = with maintainers; [ toasteruwu ]; + sourceProvenance = with sourceTypes; [ fromSource ]; + mainProgram = "mprisence"; + }; +}) diff --git a/pkgs/by-name/ne/nestopia-ue/package.nix b/pkgs/by-name/ne/nestopia-ue/package.nix index d976ec8649be..04d8ffb21b6a 100644 --- a/pkgs/by-name/ne/nestopia-ue/package.nix +++ b/pkgs/by-name/ne/nestopia-ue/package.nix @@ -22,13 +22,13 @@ stdenv.mkDerivation (finalAttrs: { pname = "nestopia"; - version = "1.53.1"; + version = "1.53.2"; src = fetchFromGitHub { owner = "0ldsk00l"; repo = "nestopia"; rev = finalAttrs.version; - hash = "sha256-6r6o/2GDp1Rcp+OWaQVgIQGC6NAxtmx4lxDWWpwv8aQ="; + hash = "sha256-sKemwbmEr637KL951wsmDxLFDvWh+0K+exdDd0+Iq1c="; }; buildInputs = [ diff --git a/pkgs/by-name/ni/nix-serve/package.nix b/pkgs/by-name/ni/nix-serve/package.nix index 294258cc5b27..943b3f76f863 100644 --- a/pkgs/by-name/ni/nix-serve/package.nix +++ b/pkgs/by-name/ni/nix-serve/package.nix @@ -3,17 +3,14 @@ stdenv, fetchFromGitHub, bzip2, - nixVersions, + nix, makeWrapper, nixosTests, - fetchpatch, }: let - rev = "77ffa33d83d2c7c6551c5e420e938e92d72fec24"; - sha256 = "sha256-MJRdVO2pt7wjOu5Hk0eVeNbk5bK5+Uo/Gh9XfO4OlMY="; - nix = nixVersions.nix_2_24; - inherit (nix.perl-bindings) perl; + rev = "a7e046db4b29d422fc9aac60ea6b82b31399951a"; + sha256 = "sha256-6ZQ0OLijq6UtOtUqRdFC19+helhU0Av6MvGCZf6XmcQ="; in stdenv.mkDerivation { @@ -26,14 +23,6 @@ stdenv.mkDerivation { inherit rev sha256; }; - patches = [ - # Part of https://github.com/edolstra/nix-serve/pull/61 - (fetchpatch { - url = "https://github.com/edolstra/nix-serve/commit/9e434fff4486afeb3cc3f631f6dc56492b204704.patch"; - sha256 = "sha256-TxQ6q6UApTKsYIMdr/RyrkKSA3k47stV63bTbxchNTU="; - }) - ]; - nativeBuildInputs = [ makeWrapper ]; dontBuild = true; @@ -42,20 +31,20 @@ stdenv.mkDerivation { install -Dm0755 nix-serve.psgi $out/libexec/nix-serve/nix-serve.psgi makeWrapper ${ - perl.withPackages (p: [ + nix.perl-bindings.perl.withPackages (p: [ p.DBDSQLite p.Plack p.Starman nix.perl-bindings ]) }/bin/starman $out/bin/nix-serve \ - --prefix PATH : "${ - lib.makeBinPath [ - bzip2 - nix - ] - }" \ - --add-flags $out/libexec/nix-serve/nix-serve.psgi + --prefix PATH : "${ + lib.makeBinPath [ + bzip2 + nix + ] + }" \ + --add-flags $out/libexec/nix-serve/nix-serve.psgi ''; /** diff --git a/pkgs/by-name/ni/nix-unit/package.nix b/pkgs/by-name/ni/nix-unit/package.nix index 4b8659e0d75d..0ca2f0644bf1 100644 --- a/pkgs/by-name/ni/nix-unit/package.nix +++ b/pkgs/by-name/ni/nix-unit/package.nix @@ -13,24 +13,30 @@ pkg-config, fetchFromGitHub, }: - +let + # We pin the nix version to a known working one here as upgrades can likely break the build. + # Since the nix language is rather stable we don't always need to have the latest and greatest for unit tests + # On each update of nix unit we should re-evaluate what version we need. + nixComponents = nixVersions.nixComponents_2_30; +in stdenv.mkDerivation (finalAttrs: { pname = "nix-unit"; - version = "2.24.1"; + version = "2.30.0"; src = fetchFromGitHub { owner = "nix-community"; repo = "nix-unit"; rev = "v${finalAttrs.version}"; - hash = "sha256-PcT0jtv2QFaht5eSs1Vq4XGDqtMLdPC49ao9uwGYclE="; + hash = "sha256-yQ7HqzfrG7B6Sq1iGBI7QJsbkI/07Ccz42bqWJW4NJA="; }; buildInputs = [ + nixComponents.nix-main + nixComponents.nix-store + nixComponents.nix-expr + nixComponents.nix-cmd + nixComponents.nix-flake nlohmann_json - # We pin the nix version to a known working one here as upgrades can likely break the build. - # Since the nix language is rather stable we don't always need to have the latest and greatest for unit tests - # On each update of nix unit we should re-evaluate what version we need. - nixVersions.nix_2_24 boost ]; diff --git a/pkgs/by-name/ni/nixos-rebuild-ng/package.nix b/pkgs/by-name/ni/nixos-rebuild-ng/package.nix index 371d32af592f..b75960263e2d 100644 --- a/pkgs/by-name/ni/nixos-rebuild-ng/package.nix +++ b/pkgs/by-name/ni/nixos-rebuild-ng/package.nix @@ -113,9 +113,9 @@ python3Packages.buildPythonApplication rec { with_nix_stable = nixos-rebuild-ng.override { nix = nixVersions.stable; }; - with_nix_2_24 = nixos-rebuild-ng.override { + with_nix_2_28 = nixos-rebuild-ng.override { # oldest supported version in nixpkgs - nix = nixVersions.nix_2_24; + nix = nixVersions.nix_2_28; }; with_lix_latest = nixos-rebuild-ng.override { nix = lixPackageSets.latest.lix; diff --git a/pkgs/by-name/nu/nurl/package.nix b/pkgs/by-name/nu/nurl/package.nix index 7781aa82f5bf..5ce4c166d4fe 100644 --- a/pkgs/by-name/nu/nurl/package.nix +++ b/pkgs/by-name/nu/nurl/package.nix @@ -6,7 +6,7 @@ makeBinaryWrapper, gitMinimal, mercurial, - nixForLinking, + nix, }: rustPlatform.buildRustPackage rec { @@ -36,7 +36,7 @@ rustPlatform.buildRustPackage rec { lib.makeBinPath [ gitMinimal mercurial - nixForLinking + nix ] } installManPage artifacts/nurl.1 diff --git a/pkgs/by-name/nv/nvrh/package.nix b/pkgs/by-name/nv/nvrh/package.nix index 3c633bcb8e3f..cc731edd50d3 100644 --- a/pkgs/by-name/nv/nvrh/package.nix +++ b/pkgs/by-name/nv/nvrh/package.nix @@ -17,17 +17,12 @@ buildGoModule (finalAttrs: { hash = "sha256-9pWeoFah8bxbngqETgi8uGbvUqKUhdiRHmOuxpPmJNs="; }; - postPatch = '' - substituteInPlace go.mod \ - --replace-fail "go 1.23.1" "go 1.22.7" - ''; + vendorHash = "sha256-DuGMlRdVUMKwghPQjVP3A+epnsA5a15jl84Y8LTPkTM="; preBuild = '' cp manifest.json src/ ''; - vendorHash = "sha256-DuGMlRdVUMKwghPQjVP3A+epnsA5a15jl84Y8LTPkTM="; - ldflags = [ "-s" "-w" diff --git a/pkgs/by-name/nw/nwjs-ffmpeg-prebuilt/package.nix b/pkgs/by-name/nw/nwjs-ffmpeg-prebuilt/package.nix index 52d482ae4a60..27bd71cbc925 100644 --- a/pkgs/by-name/nw/nwjs-ffmpeg-prebuilt/package.nix +++ b/pkgs/by-name/nw/nwjs-ffmpeg-prebuilt/package.nix @@ -7,7 +7,7 @@ let bits = if stdenv.hostPlatform.is64bit then "x64" else "ia32"; - version = "0.101.2"; + version = "0.102.0"; in stdenv.mkDerivation { pname = "nwjs-ffmpeg-prebuilt"; @@ -16,8 +16,8 @@ stdenv.mkDerivation { src = let hashes = { - "x64" = "sha256-A7b2JQrMqLHJGgNXhMMQkud2pROl7UXS4bhQJBCGRSY="; - "ia32" = "sha256-A7b2JQrMqLHJGgNXhMMQkud2pROl7UXS4bhQJBCGRSY="; + "x64" = "sha256-o9Xso1bRRfGJhf0cfWS1sS6FNugl1bbI27Jzn1YXqNw="; + "ia32" = "sha256-o9Xso1bRRfGJhf0cfWS1sS6FNugl1bbI27Jzn1YXqNw="; }; in fetchurl { diff --git a/pkgs/by-name/oc/ocenaudio/package.nix b/pkgs/by-name/oc/ocenaudio/package.nix index 98c86efc7d2c..a23717687f7f 100644 --- a/pkgs/by-name/oc/ocenaudio/package.nix +++ b/pkgs/by-name/oc/ocenaudio/package.nix @@ -14,12 +14,12 @@ stdenv.mkDerivation (finalAttrs: { pname = "ocenaudio"; - version = "3.15.2"; + version = "3.15.3"; src = fetchurl { name = "ocenaudio.deb"; url = "https://www.ocenaudio.com/downloads/index.php/ocenaudio_debian12.deb?version=v${finalAttrs.version}"; - hash = "sha256-sAsa/stC+OF7g7fNQGRT5x0GO0YKzH/lOPzWIZA0YsY="; + hash = "sha256-Nc4G+p6KLlID59kVYmlU+UE7vIPYeTqQeCEv9hrJnh0="; }; nativeBuildInputs = [ diff --git a/pkgs/applications/radio/openwebrx/default.nix b/pkgs/by-name/op/openwebrx/package.nix similarity index 62% rename from pkgs/applications/radio/openwebrx/default.nix rename to pkgs/by-name/op/openwebrx/package.nix index b22e3dd4236f..000f783f70bc 100644 --- a/pkgs/applications/radio/openwebrx/default.nix +++ b/pkgs/by-name/op/openwebrx/package.nix @@ -1,19 +1,15 @@ { stdenv, lib, - buildPythonPackage, - buildPythonApplication, + python3Packages, fetchFromGitHub, pkg-config, cmake, - setuptools, libsamplerate, fftwFloat, rtl-sdr, soapysdr-with-plugins, csdr, - pycsdr, - pydigiham, direwolf, sox, wsjtx, @@ -22,16 +18,16 @@ let - js8py = buildPythonPackage rec { + js8py = python3Packages.buildPythonPackage rec { pname = "js8py"; version = "0.1.1"; format = "setuptools"; src = fetchFromGitHub { owner = "jketterl"; - repo = pname; - rev = version; - sha256 = "1j80zclg1cl5clqd00qqa16prz7cyc32bvxqz2mh540cirygq24w"; + repo = "js8py"; + tag = version; + hash = "sha256-nAj8fI4MkAKr+LjvJQbz7Px8TVAYA9AwZYWy8Cj7AMk="; }; pythonImportsCheck = [ @@ -39,11 +35,11 @@ let "test" ]; - meta = with lib; { + meta = { homepage = "https://github.com/jketterl/js8py"; description = "Library to decode the output of the js8 binary of JS8Call"; - license = licenses.gpl3Only; - teams = [ teams.c3d2 ]; + license = lib.licenses.gpl3Only; + teams = with lib.teams; [ c3d2 ]; }; }; @@ -53,9 +49,9 @@ let src = fetchFromGitHub { owner = "jketterl"; - repo = pname; - rev = version; - sha256 = "sha256-1H0TJ8QN3b6Lof5TWvyokhCeN+dN7ITwzRvEo2X8OWc="; + repo = "owrx_connector"; + tag = version; + hash = "sha256-1H0TJ8QN3b6Lof5TWvyokhCeN+dN7ITwzRvEo2X8OWc="; }; nativeBuildInputs = [ @@ -71,41 +67,45 @@ let soapysdr-with-plugins ]; - meta = with lib; { + meta = { homepage = "https://github.com/jketterl/owrx_connector"; description = "Set of connectors that are used by OpenWebRX to interface with SDR hardware"; - license = licenses.gpl3Only; - platforms = platforms.unix; - teams = [ teams.c3d2 ]; + license = lib.licenses.gpl3Only; + platforms = lib.platforms.unix; + teams = with lib.teams; [ c3d2 ]; }; }; in -buildPythonApplication rec { +python3Packages.buildPythonApplication rec { pname = "openwebrx"; version = "1.2.2"; format = "setuptools"; src = fetchFromGitHub { owner = "jketterl"; - repo = pname; - rev = version; + repo = "openwebrx"; + tag = version; hash = "sha256-i3Znp5Sxs/KtJazHh2v9/2P+3cEocWB5wIpF7E4pK9s="; }; - propagatedBuildInputs = [ - setuptools - csdr - pycsdr - pydigiham - js8py - soapysdr-with-plugins - owrx_connector - direwolf - sox - wsjtx - codecserver - ]; + dependencies = + with python3Packages; + [ + setuptools + csdr + pycsdr + pydigiham + ] + ++ [ + js8py + soapysdr-with-plugins + owrx_connector + direwolf + sox + wsjtx + codecserver + ]; pythonImportsCheck = [ "csdr" @@ -117,11 +117,11 @@ buildPythonApplication rec { inherit js8py owrx_connector; }; - meta = with lib; { + meta = { homepage = "https://github.com/jketterl/openwebrx"; description = "Simple DSP library and command-line tool for Software Defined Radio"; mainProgram = "openwebrx"; - license = licenses.gpl3Only; - teams = [ teams.c3d2 ]; + license = lib.licenses.gpl3Only; + teams = with lib.teams; [ c3d2 ]; }; } diff --git a/pkgs/by-name/pe/peering-manager/package.nix b/pkgs/by-name/pe/peering-manager/package.nix index b6324e14f8d0..47236b92abb3 100644 --- a/pkgs/by-name/pe/peering-manager/package.nix +++ b/pkgs/by-name/pe/peering-manager/package.nix @@ -9,13 +9,13 @@ python3.pkgs.buildPythonApplication rec { pname = "peering-manager"; - version = "1.9.6"; + version = "1.9.7"; src = fetchFromGitHub { owner = "peering-manager"; repo = "peering-manager"; tag = "v${version}"; - sha256 = "sha256-XPnov+pvO0H1ucMuSXs2tpYRE87jpfDiBDUFjnEhydA="; + sha256 = "sha256-lxelWtiMO6w8Tt7zK/NDdmc3PaKlGibKjSfhD+tGrCU="; }; format = "other"; diff --git a/pkgs/by-name/pi/pinit/package.nix b/pkgs/by-name/pi/pinit/package.nix index b4d467c58810..c0296b5239d7 100644 --- a/pkgs/by-name/pi/pinit/package.nix +++ b/pkgs/by-name/pi/pinit/package.nix @@ -14,13 +14,13 @@ stdenv.mkDerivation (finalAttrs: { pname = "pinit"; - version = "2.1.1"; + version = "2.2.0"; src = fetchFromGitHub { owner = "ryonakano"; repo = "pinit"; rev = finalAttrs.version; - hash = "sha256-unvlMytZdjVbrWlwkpw90NZoFw9A6Ga0bB2XqFEPuVE="; + hash = "sha256-v/GFgEStQPQxwnPiTCa8gSDj8jZqJkUqLRV/WfBx3Tc="; }; nativeBuildInputs = [ diff --git a/pkgs/by-name/pi/pixelflasher/package.nix b/pkgs/by-name/pi/pixelflasher/package.nix index 56c7e2e73b2a..b84e24bd8352 100644 --- a/pkgs/by-name/pi/pixelflasher/package.nix +++ b/pkgs/by-name/pi/pixelflasher/package.nix @@ -10,14 +10,14 @@ }: python3Packages.buildPythonApplication rec { pname = "pixelflasher"; - version = "8.3.1.0"; + version = "8.4.0.1"; format = "other"; src = fetchFromGitHub { owner = "badabing2005"; repo = "PixelFlasher"; tag = "v${version}"; - hash = "sha256-/IEnQQ1fUKWeoKIOH4q9NmWM2Sz/b1xDqQ1s9zEWOI8="; + hash = "sha256-9WQXkJ902PHgfwyWY0zd1fBVsEoxyeg5Eq2H0lUxY2Q="; }; desktopItems = [ diff --git a/pkgs/by-name/pr/protoc-gen-es/package.nix b/pkgs/by-name/pr/protoc-gen-es/package.nix index 5b33f3b0aeb6..d21a7028e63d 100644 --- a/pkgs/by-name/pr/protoc-gen-es/package.nix +++ b/pkgs/by-name/pr/protoc-gen-es/package.nix @@ -7,20 +7,20 @@ buildNpmPackage rec { pname = "protoc-gen-es"; - version = "2.6.2"; + version = "2.6.3"; src = fetchFromGitHub { owner = "bufbuild"; repo = "protobuf-es"; tag = "v${version}"; - hash = "sha256-ckjup1R5x57N8EmyuLJjVxnHouAYb0fzOPmNVjXFBEM="; + hash = "sha256-7mtI/eVkM0bx6Izf4m00vTg54zJ27AevvRTjKO5/CHM="; postFetch = '' ${lib.getExe npm-lockfile-fix} $out/package-lock.json ''; }; - npmDepsHash = "sha256-YKGRUbtNNlQblX8h+KxJnqVhwVJEnFZAxb74PIp6lnE="; + npmDepsHash = "sha256-TUV1byasVU4vJin/L+Ex32zi0BukhFVe2k9u3y2lxG4="; npmWorkspace = "packages/protoc-gen-es"; diff --git a/pkgs/by-name/pr/proton-ge-bin/package.nix b/pkgs/by-name/pr/proton-ge-bin/package.nix index 1e62be6dfb21..275efa042add 100644 --- a/pkgs/by-name/pr/proton-ge-bin/package.nix +++ b/pkgs/by-name/pr/proton-ge-bin/package.nix @@ -9,11 +9,11 @@ }: stdenvNoCC.mkDerivation (finalAttrs: { pname = "proton-ge-bin"; - version = "GE-Proton10-11"; + version = "GE-Proton10-12"; src = fetchzip { url = "https://github.com/GloriousEggroll/proton-ge-custom/releases/download/${finalAttrs.version}/${finalAttrs.version}.tar.gz"; - hash = "sha256-gTf8k0fx0KGCHVTQLkZli/CvZMkVVNpgBDpI/eiuynE="; + hash = "sha256-mjqcN/gTfAlPDXgJUm8qxH+jvNN8iiIuF33hSQ5Y/Vo="; }; dontUnpack = true; diff --git a/pkgs/by-name/rd/rdma-core/package.nix b/pkgs/by-name/rd/rdma-core/package.nix index 3e8044c08a59..c3fe8d64bdaa 100644 --- a/pkgs/by-name/rd/rdma-core/package.nix +++ b/pkgs/by-name/rd/rdma-core/package.nix @@ -17,13 +17,13 @@ stdenv.mkDerivation (finalAttrs: { pname = "rdma-core"; - version = "58.0"; + version = "59.0"; src = fetchFromGitHub { owner = "linux-rdma"; repo = "rdma-core"; rev = "v${finalAttrs.version}"; - hash = "sha256-dCaxZeGmnf46XI0RZjVWy1JsQjpdCw63lbe2RkWNwQs="; + hash = "sha256-GSARu2HNej4tI62RjLWkjS+5FKVbeNmX7jh0atlEpX0="; }; strictDeps = true; diff --git a/pkgs/by-name/re/renoise/package.nix b/pkgs/by-name/re/renoise/package.nix index fa83e9696a35..4a956006eb2b 100644 --- a/pkgs/by-name/re/renoise/package.nix +++ b/pkgs/by-name/re/renoise/package.nix @@ -25,18 +25,18 @@ let platforms = { x86_64-linux = { archSuffix = "x86_64"; - hash = "sha256-BigVJ3TJ0tiDoxe+fX1iSyj6Q1o/8CkAo7fJ8aaftsQ="; + hash = "sha256-UxhGe22W50cqjNMoAdxHnyFmTmiysYd8EkASRFrpuYs="; }; aarch64-linux = { archSuffix = "arm64"; - hash = "sha256-Ee7a8vi9inE4QZoeZtTipXBuZAg2urdicLcm/LUgw5Q="; + hash = "sha256-itWnH1JiG+AhYZtNtrJtW9p7LlRF/ab5+npFODiKznY="; }; }; in stdenv.mkDerivation rec { pname = "renoise"; - version = "3.5.0"; + version = "3.5.1"; src = if releasePath != null then diff --git a/pkgs/by-name/re/retrospy/package.nix b/pkgs/by-name/re/retrospy/package.nix index f0744008502c..d2744d80d1e1 100644 --- a/pkgs/by-name/re/retrospy/package.nix +++ b/pkgs/by-name/re/retrospy/package.nix @@ -8,13 +8,13 @@ runCommandLocal, }: let - version = "6.9"; + version = "6.10"; src = fetchFromGitHub { owner = "retrospy"; repo = "RetroSpy"; rev = "v${version}"; - hash = "sha256-QoZcKFVjd0qYQ+Ds4Y/JKBPiL+z83wxm0ktuETX5ZPU="; + hash = "sha256-XupMQRBhX0w6Qv7t0BPhkrjDTOm5HdpLCLSq0gbC3Mk="; }; executables = [ diff --git a/pkgs/by-name/ro/rocketchat-desktop/package.nix b/pkgs/by-name/ro/rocketchat-desktop/package.nix index f62ff9c2c6d5..3c325c6c19de 100644 --- a/pkgs/by-name/ro/rocketchat-desktop/package.nix +++ b/pkgs/by-name/ro/rocketchat-desktop/package.nix @@ -10,11 +10,11 @@ let in stdenv.mkDerivation rec { pname = "rocketchat-desktop"; - version = "4.7.1"; + version = "4.8.1"; src = fetchurl { url = "https://github.com/RocketChat/Rocket.Chat.Electron/releases/download/${version}/rocketchat-${version}-linux-amd64.deb"; - hash = "sha256-6Wr4058jeU+hJafJmV9NQEkAt699E4fyKmtUwqkIQCw="; + hash = "sha256-WzKQLJhP5pAF2uT9teDIDZ9+Fh/wugymO3XCyXTOM3o="; }; nativeBuildInputs = [ diff --git a/pkgs/by-name/sa/saber/package.nix b/pkgs/by-name/sa/saber/package.nix index 08cf4f15b430..82311fd6d23e 100644 --- a/pkgs/by-name/sa/saber/package.nix +++ b/pkgs/by-name/sa/saber/package.nix @@ -17,13 +17,13 @@ flutter332.buildFlutterApplication rec { pname = "saber"; - version = "0.26.0"; + version = "0.26.2"; src = fetchFromGitHub { owner = "saber-notes"; repo = "saber"; tag = "v${version}"; - hash = "sha256-5N4HojdDysLgCPq614ZzJXx/dx3s4F++W35fjYdevRk="; + hash = "sha256-htSOzjmLijF1nSBluazJ80Jl041OtZKwnA1H39l63SQ="; }; gitHashes = lib.importJSON ./gitHashes.json; diff --git a/pkgs/by-name/sa/saber/pubspec.lock.json b/pkgs/by-name/sa/saber/pubspec.lock.json index 80ebb7d5b6d9..8294a87bfbd9 100644 --- a/pkgs/by-name/sa/saber/pubspec.lock.json +++ b/pkgs/by-name/sa/saber/pubspec.lock.json @@ -214,11 +214,11 @@ "dependency": "transitive", "description": { "name": "built_value", - "sha256": "082001b5c3dc495d4a42f1d5789990505df20d8547d42507c29050af6933ee27", + "sha256": "ba95c961bafcd8686d1cf63be864eb59447e795e124d98d6a27d91fcd13602fb", "url": "https://pub.dev" }, "source": "hosted", - "version": "8.10.1" + "version": "8.11.1" }, "chalkdart": { "dependency": "transitive", @@ -444,11 +444,11 @@ "dependency": "direct main", "description": { "name": "dynamic_color", - "sha256": "eae98052fa6e2826bdac3dd2e921c6ce2903be15c6b7f8b6d8a5d49b5086298d", + "sha256": "43a5a6679649a7731ab860334a5812f2067c2d9ce6452cf069c5e0c25336c17c", "url": "https://pub.dev" }, "source": "hosted", - "version": "1.7.0" + "version": "1.8.1" }, "dynamite_runtime": { "dependency": "transitive", @@ -524,11 +524,11 @@ "dependency": "direct main", "description": { "name": "file_picker", - "sha256": "ef9908739bdd9c476353d6adff72e88fd00c625f5b959ae23f7567bd5137db0a", + "sha256": "970d33d79e1da667b6da222575fd7f2e30e323ca76251504477e6d51405b2d9a", "url": "https://pub.dev" }, "source": "hosted", - "version": "10.2.0" + "version": "10.2.4" }, "file_selector_linux": { "dependency": "transitive", @@ -682,31 +682,31 @@ "dependency": "transitive", "description": { "name": "flutter_plugin_android_lifecycle", - "sha256": "f948e346c12f8d5480d2825e03de228d0eb8c3a737e4cdaa122267b89c022b5e", + "sha256": "6382ce712ff69b0f719640ce957559dde459e55ecd433c767e06d139ddf16cab", "url": "https://pub.dev" }, "source": "hosted", - "version": "2.0.28" + "version": "2.0.29" }, "flutter_quill": { "dependency": "direct main", "description": { "name": "flutter_quill", - "sha256": "7e60963632bbc8615627f0bae8e178515f69ecb378ad49fa68c43c2aabf33e21", + "sha256": "8e33ef670abad16405582a37ce63ac82b7531998682e8bd8348d0f3da998b8ce", "url": "https://pub.dev" }, "source": "hosted", - "version": "11.4.1" + "version": "11.4.2" }, "flutter_quill_delta_from_html": { "dependency": "transitive", "description": { "name": "flutter_quill_delta_from_html", - "sha256": "4597bd0853a704696837aa6b05cffd851f587b176204c234edddfed1c1862a09", + "sha256": "0eb801ea8dd498cadc057507af5da794d4c9599ce58b2569cb3d4bb53ba8bed2", "url": "https://pub.dev" }, "source": "hosted", - "version": "1.5.2" + "version": "1.5.3" }, "flutter_secure_storage": { "dependency": "direct main", @@ -835,11 +835,11 @@ "dependency": "direct main", "description": { "name": "font_awesome_flutter", - "sha256": "d3a89184101baec7f4600d58840a764d2ef760fe1c5a20ef9e6b0e9b24a07a3a", + "sha256": "f50ce90dbe26d977415b9540400d6778bef00894aced6358ae578abd92b14b10", "url": "https://pub.dev" }, "source": "hosted", - "version": "10.8.0" + "version": "10.9.0" }, "fuchsia_remote_debug_protocol": { "dependency": "transitive", @@ -861,11 +861,11 @@ "dependency": "direct main", "description": { "name": "go_router", - "sha256": "c489908a54ce2131f1d1b7cc631af9c1a06fac5ca7c449e959192089f9489431", + "sha256": "8b1f37dfaf6e958c6b872322db06f946509433bec3de753c3491a42ae9ec2b48", "url": "https://pub.dev" }, "source": "hosted", - "version": "16.0.0" + "version": "16.1.0" }, "golden_screenshot": { "dependency": "direct dev", @@ -911,11 +911,11 @@ "dependency": "direct main", "description": { "name": "http", - "sha256": "2c11f3f94c687ee9bad77c171151672986360b2b001d109814ee7140b2cf261b", + "sha256": "bb2ce4590bc2667c96f318d68cac1b5a7987ec819351d32b1c987239a815e007", "url": "https://pub.dev" }, "source": "hosted", - "version": "1.4.0" + "version": "1.5.0" }, "http_parser": { "dependency": "transitive", @@ -1107,11 +1107,11 @@ "dependency": "direct main", "description": { "name": "material_symbols_icons", - "sha256": "7c50901b39d1ad645ee25d920aed008061e1fd541a897b4ebf2c01d966dbf16b", + "sha256": "ef20d86fb34c2b59eb7553c4d795bb8a7ec8c890c53ffd3148c64f7adc46ae50", "url": "https://pub.dev" }, "source": "hosted", - "version": "4.2815.1" + "version": "4.2858.1" }, "matrix4_transform": { "dependency": "transitive", @@ -1406,11 +1406,21 @@ "dependency": "direct main", "description": { "name": "pdfrx", - "sha256": "c7f80eac77b38a66f2dc49e5cbfd38ed522da77d42ac6d5552872a17f7262a67", + "sha256": "a88e7797623d3b89d4a863f583c973c681f39aa48eadceb4aa61c0c99cc7fa19", "url": "https://pub.dev" }, "source": "hosted", - "version": "1.3.3" + "version": "2.1.3" + }, + "pdfrx_engine": { + "dependency": "transitive", + "description": { + "name": "pdfrx_engine", + "sha256": "69a2448ca87d0536fe4eb78fbe753fb2fb2f8ae3a1b73e2fd1937585e717c2b1", + "url": "https://pub.dev" + }, + "source": "hosted", + "version": "0.1.12" }, "perfect_freehand": { "dependency": "direct main", @@ -1837,11 +1847,11 @@ "dependency": "transitive", "description": { "name": "shared_preferences_android", - "sha256": "20cbd561f743a342c76c151d6ddb93a9ce6005751e7aa458baad3858bfbfb6ac", + "sha256": "5bcf0772a761b04f8c6bf814721713de6f3e5d9d89caf8d3fe031b02a342379e", "url": "https://pub.dev" }, "source": "hosted", - "version": "2.4.10" + "version": "2.4.11" }, "shared_preferences_foundation": { "dependency": "transitive", @@ -1913,21 +1923,21 @@ "dependency": "direct main", "description": { "name": "slang", - "sha256": "bc9488b19acbc4756aa60a9de19720045f9d49a4a7524d56475e0a6965bcd8bd", + "sha256": "b02c531f453c328a1343818c64d730357ac140860147c9a29030fdfc82039266", "url": "https://pub.dev" }, "source": "hosted", - "version": "4.7.3" + "version": "4.8.1" }, "slang_flutter": { "dependency": "direct main", "description": { "name": "slang_flutter", - "sha256": "fff13b6fc8b0378ee23856c4f9fd7f8e2777b430090681f4d19ab14c47de9bc6", + "sha256": "7a5e55f2b1ec99e06354a5213b992d34017efacccba8ffc6066cfc5517cc0282", "url": "https://pub.dev" }, "source": "hosted", - "version": "4.7.0" + "version": "4.8.0" }, "source_span": { "dependency": "transitive", @@ -1983,11 +1993,11 @@ "dependency": "direct main", "description": { "name": "stow_plain", - "sha256": "be2496088876a6a3c51e24de0230a3c7626c8bc47c4edb8761ce69dcddbedca3", + "sha256": "a463db00b22d5793cd9afb1137ca54783a29aca1a12242d5760b0a101cb71f41", "url": "https://pub.dev" }, "source": "hosted", - "version": "0.5.0" + "version": "0.5.1" }, "stow_secure": { "dependency": "direct main", @@ -2133,11 +2143,11 @@ "dependency": "transitive", "description": { "name": "url_launcher_android", - "sha256": "8582d7f6fe14d2652b4c45c9b6c14c0b678c2af2d083a11b604caeba51930d79", + "sha256": "0aedad096a85b49df2e4725fa32118f9fa580f3b14af7a2d2221896a02cd5656", "url": "https://pub.dev" }, "source": "hosted", - "version": "6.3.16" + "version": "6.3.17" }, "url_launcher_ios": { "dependency": "transitive", @@ -2353,41 +2363,41 @@ "dependency": "direct main", "description": { "name": "workmanager", - "sha256": "dffcbbfd99af17271ca52d8a3767ba8a1000b357f2774db8ed5d58879cb9783a", + "sha256": "4df6f985993aea6d594d8d32d9e2518f765cfd798d2013a5361c01d557c29372", "url": "https://pub.dev" }, "source": "hosted", - "version": "0.8.0" + "version": "0.9.0+2" }, "workmanager_android": { "dependency": "transitive", "description": { "name": "workmanager_android", - "sha256": "a6447816c41aa0ad8f6fa29b62d09a528891cf0737296397e1caae2523ced7dc", + "sha256": "4877dd22660079d5f0adbc9435443cb28355d786eda01127c9b31f046611d5e9", "url": "https://pub.dev" }, "source": "hosted", - "version": "0.8.0" + "version": "0.9.0+1" }, "workmanager_apple": { "dependency": "transitive", "description": { "name": "workmanager_apple", - "sha256": "9c99003682a8423bdc122ff4bae891e24574d1e676ea302d2ef0493266228461", + "sha256": "96e959081ba6e4c75c5b598d7c15f775ce435f67ed5f5864ad76b3f7bd5244a8", "url": "https://pub.dev" }, "source": "hosted", - "version": "0.8.0" + "version": "0.9.1+1" }, "workmanager_platform_interface": { "dependency": "transitive", "description": { "name": "workmanager_platform_interface", - "sha256": "b1f0a868f1117511a23b0eb4220f08134152433b51a83eed479b1d68bbe23789", + "sha256": "b3f4e359d21b6f091c85eb3e7750493e93d8a678c6c2a2a8ed999eb09af57ae7", "url": "https://pub.dev" }, "source": "hosted", - "version": "0.8.0" + "version": "0.9.1" }, "xdg_directories": { "dependency": "transitive", @@ -2433,11 +2443,11 @@ "dependency": "direct main", "description": { "name": "yaru", - "sha256": "d9149e87ddcbabd6214fe629bfd0b6a94b9d81ca55a5618949ffc47a3d8a7b69", + "sha256": "39645e95ad17c4aa87e857227c927446ea49c8042205f4911b03f833ed021849", "url": "https://pub.dev" }, "source": "hosted", - "version": "8.0.0" + "version": "8.1.0" }, "yaru_window": { "dependency": "transitive", @@ -2491,7 +2501,7 @@ } }, "sdks": { - "dart": ">=3.8.0 <4.0.0", + "dart": ">=3.8.1 <4.0.0", "flutter": ">=3.32.7" } } diff --git a/pkgs/by-name/sc/screenly-cli/package.nix b/pkgs/by-name/sc/screenly-cli/package.nix index 5f7a9cfaf172..27e7ac557852 100644 --- a/pkgs/by-name/sc/screenly-cli/package.nix +++ b/pkgs/by-name/sc/screenly-cli/package.nix @@ -10,16 +10,16 @@ rustPlatform.buildRustPackage rec { pname = "screenly-cli"; - version = "1.0.3"; + version = "1.0.4"; src = fetchFromGitHub { owner = "screenly"; repo = "cli"; tag = "v${version}"; - hash = "sha256-sRi0CpdaPCH54m2XojicARLXZELB4PFcLLw0KB0j6jE="; + hash = "sha256-6whyTCfmBx+PS40ML8VNR5WvIfnUCMxos7KCCbtHXAo="; }; - cargoHash = "sha256-U9NAfColVKbLsEf3HXS4Vu2eNvCjG0+koESFUWP9vMk="; + cargoHash = "sha256-LG6/+/Ibw7mh854ue6L74DLK4WocmDWqK8FvsEascYw="; nativeBuildInputs = [ pkg-config diff --git a/pkgs/by-name/sh/shipwright/package.nix b/pkgs/by-name/sh/shipwright/package.nix index 72d2e7dbef1c..c3fd3e73c0c8 100644 --- a/pkgs/by-name/sh/shipwright/package.nix +++ b/pkgs/by-name/sh/shipwright/package.nix @@ -111,13 +111,12 @@ let in stdenv.mkDerivation (finalAttrs: { pname = "shipwright"; - version = "9.0.2"; - + version = "9.0.5"; src = fetchFromGitHub { owner = "harbourmasters"; repo = "shipwright"; tag = finalAttrs.version; - hash = "sha256-xmRUUMjQt3CFJ0GxlUsUqmp//XTRWik3jSD4auql7Nk="; + hash = "sha256-F5d4u3Nq/+yYiOgkH/bwWPhZDxgBpJ5ktee0Hc5UmEo="; fetchSubmodules = true; deepClone = true; postFetch = '' diff --git a/pkgs/by-name/sl/slurm/common-env-echo.patch b/pkgs/by-name/sl/slurm/common-env-echo.patch deleted file mode 100644 index cff52116d145..000000000000 --- a/pkgs/by-name/sl/slurm/common-env-echo.patch +++ /dev/null @@ -1,13 +0,0 @@ -diff --git a/src/common/env.c b/src/common/env.c -index 4dad18fef1..730f28af96 100644 ---- a/src/common/env.c -+++ b/src/common/env.c -@@ -2073,7 +2073,7 @@ char **env_array_user_default(const char *username, int timeout, int mode, - char **env = NULL; - char *starttoken = "XXXXSLURMSTARTPARSINGHEREXXXX"; - char *stoptoken = "XXXXSLURMSTOPPARSINGHEREXXXXX"; -- char cmdstr[256], *env_loc = NULL; -+ char cmdstr[PATH_MAX], *env_loc = NULL; - char *stepd_path = NULL; - int fildes[2], found, fval, len, rc, timeleft; - int buf_read, buf_rem, config_timeout; diff --git a/pkgs/by-name/sl/slurm/package.nix b/pkgs/by-name/sl/slurm/package.nix index 42a622a51c30..6e325de204d4 100644 --- a/pkgs/by-name/sl/slurm/package.nix +++ b/pkgs/by-name/sl/slurm/package.nix @@ -41,7 +41,7 @@ stdenv.mkDerivation rec { pname = "slurm"; - version = "25.05.1.1"; + version = "25.05.2.1"; # N.B. We use github release tags instead of https://www.schedmd.com/downloads.php # because the latter does not keep older releases. @@ -50,7 +50,7 @@ stdenv.mkDerivation rec { repo = "slurm"; # The release tags use - instead of . rev = "${pname}-${builtins.replaceStrings [ "." ] [ "-" ] version}"; - hash = "sha256-Lu/ebXI8U4XggYhQ+yyKmGXpgqtCeYMWB3o0+Ujzj0s="; + hash = "sha256-RpMzn8x378QWMFFj5pn8b9j1jWLKGEbvINt0PMsCIHI="; }; outputs = [ @@ -58,12 +58,6 @@ stdenv.mkDerivation rec { "dev" ]; - patches = [ - # increase string length to allow for full - # path of 'echo' in nix store - ./common-env-echo.patch - ]; - prePatch = '' substituteInPlace src/common/env.c \ --replace "/bin/echo" "${coreutils}/bin/echo" diff --git a/pkgs/by-name/sp/space-station-14-launcher/package.nix b/pkgs/by-name/sp/space-station-14-launcher/package.nix index b4db13f51cd1..df453041091d 100644 --- a/pkgs/by-name/sp/space-station-14-launcher/package.nix +++ b/pkgs/by-name/sp/space-station-14-launcher/package.nix @@ -36,7 +36,7 @@ soundfont-path ? "${soundfont-fluid}/share/soundfonts/FluidR3_GM2-2.sf2", }: let - version = "0.32.1"; + version = "0.33.0"; pname = "space-station-14-launcher"; in buildDotnetModule rec { @@ -50,7 +50,7 @@ buildDotnetModule rec { owner = "space-wizards"; repo = "SS14.Launcher"; tag = "v${version}"; - hash = "sha256-Es+DBwWh2QxCev+Aepi8ItTXSYIgNgb05zdScOBZNJs="; + hash = "sha256-mEockP4fcNFP0h1j30cV2Czq751xjjpdaqQ0Wxe0+7M="; fetchSubmodules = true; }; diff --git a/pkgs/by-name/sp/sparkle/package.nix b/pkgs/by-name/sp/sparkle/package.nix index ffca8e9a40d3..6476c9022b39 100644 --- a/pkgs/by-name/sp/sparkle/package.nix +++ b/pkgs/by-name/sp/sparkle/package.nix @@ -2,21 +2,30 @@ lib, stdenv, fetchurl, - dpkg, autoPatchelfHook, - nss, - nspr, + dpkg, alsa-lib, - openssl, - webkitgtk_4_0, - udev, - libayatana-appindicator, + at-spi2-atk, + cairo, + cups, + dbus, + expat, + glib, + gtk3, libGL, + libgbm, + libxkbcommon, + musl, + nspr, + nss, + pango, + udev, + xorg, }: stdenv.mkDerivation (finalAttrs: { pname = "sparkle"; - version = "1.6.9"; + version = "1.6.10"; src = let @@ -31,22 +40,40 @@ stdenv.mkDerivation (finalAttrs: { fetchurl { url = "https://github.com/xishang0128/sparkle/releases/download/${finalAttrs.version}/sparkle-linux-${finalAttrs.version}-${arch}.deb"; hash = selectSystem { - x86_64-linux = "sha256-db9YDfh8EA+EDtD/XO9pBaHkKcbqsDAkQF7lXxAo18I="; - aarch64-linux = "sha256-CfgcFhsu6G6Mm82paz/9yWwO4OltJZRBV6QffseHcrg="; + x86_64-linux = "sha256-07hgkZi3WVBz0pLo871tfzV5uUlAx8hizaDshpo5eOg="; + aarch64-linux = "sha256-N/oEer06zhn23/p6jQaZ8pCkE9F8dzIHL5n7kvHP8X0="; }; }; nativeBuildInputs = [ - dpkg autoPatchelfHook + dpkg ]; buildInputs = [ - nss - nspr alsa-lib - openssl - webkitgtk_4_0 + at-spi2-atk + cairo + cups + dbus + expat + glib + gtk3 + libGL + libgbm + libxkbcommon + musl + nspr + nss + pango + udev + xorg.libX11 + xorg.libXcomposite + xorg.libXdamage + xorg.libXext + xorg.libXfixes + xorg.libXrandr + xorg.libxcb (lib.getLib stdenv.cc.cc) ]; @@ -54,24 +81,18 @@ stdenv.mkDerivation (finalAttrs: { runHook preInstall mkdir -p $out/bin + chmod 0755 opt/sparkle/resources/files/sysproxy cp -r opt $out/opt - cp -r usr/share $out/share - substituteInPlace $out/share/applications/sparkle.desktop \ + substituteInPlace usr/share/applications/sparkle.desktop \ --replace-fail "/opt/sparkle/sparkle" "sparkle" + cp -r usr/share $out/share ln -s $out/opt/sparkle/sparkle $out/bin/sparkle runHook postInstall ''; preFixup = '' - patchelf --add-needed libGL.so.1 \ - --add-rpath ${ - lib.makeLibraryPath [ - libGL - udev - libayatana-appindicator - ] - } $out/opt/sparkle/sparkle + patchelf --add-needed libGL.so.1 $out/opt/sparkle/sparkle ''; passthru.updateScript = ./update.sh; @@ -79,13 +100,13 @@ stdenv.mkDerivation (finalAttrs: { meta = { description = "Another Mihomo GUI"; homepage = "https://github.com/xishang0128/sparkle"; + license = lib.licenses.gpl3Plus; mainProgram = "sparkle"; + maintainers = with lib.maintainers; [ ]; platforms = [ "aarch64-linux" "x86_64-linux" ]; - license = lib.licenses.gpl3Plus; sourceProvenance = with lib.sourceTypes; [ binaryNativeCode ]; - maintainers = with lib.maintainers; [ ]; }; }) diff --git a/pkgs/by-name/st/stress-ng/package.nix b/pkgs/by-name/st/stress-ng/package.nix index 3487ff859de5..1198af345882 100644 --- a/pkgs/by-name/st/stress-ng/package.nix +++ b/pkgs/by-name/st/stress-ng/package.nix @@ -18,13 +18,13 @@ stdenv.mkDerivation rec { pname = "stress-ng"; - version = "0.19.02"; + version = "0.19.03"; src = fetchFromGitHub { owner = "ColinIanKing"; repo = "stress-ng"; rev = "V${version}"; - hash = "sha256-QEj+JC3l6O8UqK08+X2CIs/GNHdV7hn2bem3xx1jgjQ="; + hash = "sha256-k0F/1tkoyalhSNsEQk+wHGHUCDBzOkmdv6VYubesGd4="; }; postPatch = '' diff --git a/pkgs/by-name/sv/svelte-language-server/package-lock.json b/pkgs/by-name/sv/svelte-language-server/package-lock.json index 5f433b74f117..14e6cbbb2e17 100644 --- a/pkgs/by-name/sv/svelte-language-server/package-lock.json +++ b/pkgs/by-name/sv/svelte-language-server/package-lock.json @@ -1,12 +1,12 @@ { "name": "svelte-language-server", - "version": "0.17.17", + "version": "0.17.19", "lockfileVersion": 3, "requires": true, "packages": { "": { "name": "svelte-language-server", - "version": "0.17.17", + "version": "0.17.19", "license": "MIT", "dependencies": { "@jridgewell/trace-mapping": "^0.3.25", @@ -20,7 +20,7 @@ "prettier-plugin-svelte": "^3.4.0", "svelte": "^4.2.19", "svelte2tsx": "~0.7.35", - "typescript": "^5.8.2", + "typescript": "^5.9.2", "typescript-auto-import-cache": "^0.3.6", "vscode-css-languageservice": "~6.3.5", "vscode-html-languageservice": "~5.4.0", @@ -110,9 +110,9 @@ "license": "MIT" }, "node_modules/@jridgewell/gen-mapping": { - "version": "0.3.12", - "resolved": "https://registry.npmjs.org/@jridgewell/gen-mapping/-/gen-mapping-0.3.12.tgz", - "integrity": "sha512-OuLGC46TjB5BbN1dH8JULVVZY4WTdkF7tV9Ys6wLL1rubZnCMstOhNHueU5bLCrnRuDhKPDM4g6sw4Bel5Gzqg==", + "version": "0.3.13", + "resolved": "https://registry.npmjs.org/@jridgewell/gen-mapping/-/gen-mapping-0.3.13.tgz", + "integrity": "sha512-2kkt/7niJ6MgEPxF0bYdQ6etZaA+fQvDcLKckhy1yIQOzaoKjBBjSj63/aLVjYE3qhRt5dvM+uUyfCg6UKCBbA==", "license": "MIT", "dependencies": { "@jridgewell/sourcemap-codec": "^1.5.0", @@ -129,15 +129,15 @@ } }, "node_modules/@jridgewell/sourcemap-codec": { - "version": "1.5.4", - "resolved": "https://registry.npmjs.org/@jridgewell/sourcemap-codec/-/sourcemap-codec-1.5.4.tgz", - "integrity": "sha512-VT2+G1VQs/9oz078bLrYbecdZKs912zQlkelYpuf+SXF+QvZDYJlbx/LSx+meSAwdDFnF8FVXW92AVjjkVmgFw==", + "version": "1.5.5", + "resolved": "https://registry.npmjs.org/@jridgewell/sourcemap-codec/-/sourcemap-codec-1.5.5.tgz", + "integrity": "sha512-cYQ9310grqxueWbl+WuIUIaiUaDcj7WOq5fVhEljNVgRfOUhY9fy2zTvfoqWsnebh8Sl70VScFbICvJnLKB0Og==", "license": "MIT" }, "node_modules/@jridgewell/trace-mapping": { - "version": "0.3.29", - "resolved": "https://registry.npmjs.org/@jridgewell/trace-mapping/-/trace-mapping-0.3.29.tgz", - "integrity": "sha512-uw6guiW/gcAGPDhLmd77/6lW8QLeiV5RUTsAX46Db6oLhGaVj4lhnPwb184s1bkc8kdVg/+h988dro8GRDpmYQ==", + "version": "0.3.30", + "resolved": "https://registry.npmjs.org/@jridgewell/trace-mapping/-/trace-mapping-0.3.30.tgz", + "integrity": "sha512-GQ7Nw5G2lTu/BtHTKfXhKHok2WGetd4XYcVKGx00SjAk8GMwgJM3zr6zORiPGuOE+/vkc90KtTosSSvaCjKb2Q==", "license": "MIT", "dependencies": { "@jridgewell/resolve-uri": "^3.1.0", @@ -240,9 +240,9 @@ "license": "MIT" }, "node_modules/@types/node": { - "version": "18.19.120", - "resolved": "https://registry.npmjs.org/@types/node/-/node-18.19.120.tgz", - "integrity": "sha512-WtCGHFXnVI8WHLxDAt5TbnCM4eSE+nI0QN2NJtwzcgMhht2eNz6V9evJrk+lwC8bCY8OWV5Ym8Jz7ZEyGnKnMA==", + "version": "18.19.122", + "resolved": "https://registry.npmjs.org/@types/node/-/node-18.19.122.tgz", + "integrity": "sha512-yzegtT82dwTNEe/9y+CM8cgb42WrUfMMCg2QqSddzO1J6uPmBD7qKCZ7dOHZP2Yrpm/kb0eqdNMn2MUyEiqBmA==", "dev": true, "license": "MIT", "dependencies": { @@ -1696,9 +1696,9 @@ } }, "node_modules/svelte2tsx": { - "version": "0.7.41", - "resolved": "https://registry.npmjs.org/svelte2tsx/-/svelte2tsx-0.7.41.tgz", - "integrity": "sha512-/TUwpyn/Qc1wcGuayf2GSwvZ7htdAOzpo0JFFm96srKnRXoTD0gy4n06g+XgH8w016S3lPtyFVtFAm+0yJ0BZw==", + "version": "0.7.42", + "resolved": "https://registry.npmjs.org/svelte2tsx/-/svelte2tsx-0.7.42.tgz", + "integrity": "sha512-PSNrKS16aVdAajoFjpF5M0t6TA7ha7GcKbBajD9RG3M+vooAuvLnWAGUSC6eJL4zEOVbOWKtcS2BuY4rxPljoA==", "license": "MIT", "dependencies": { "dedent-js": "^1.0.1", @@ -1793,9 +1793,9 @@ } }, "node_modules/typescript": { - "version": "5.8.3", - "resolved": "https://registry.npmjs.org/typescript/-/typescript-5.8.3.tgz", - "integrity": "sha512-p1diW6TqL9L07nNxvRMM7hMMw4c5XOo/1ibL4aAIGmSAt9slTE1Xgw5KWuof2uTOvCg9BY7ZRi+GaF+7sfgPeQ==", + "version": "5.9.2", + "resolved": "https://registry.npmjs.org/typescript/-/typescript-5.9.2.tgz", + "integrity": "sha512-CWBzXQrc/qOkhidw1OzBTQuYRbfyxDXJMVJ1XNwUHGROVmuaeiEm3OslpZ1RV96d7SKKjZKrSJu3+t/xlw3R9A==", "license": "Apache-2.0", "bin": { "tsc": "bin/tsc", diff --git a/pkgs/by-name/sv/svelte-language-server/package.nix b/pkgs/by-name/sv/svelte-language-server/package.nix index 3e40ec351ddf..7ed2dfa682b1 100644 --- a/pkgs/by-name/sv/svelte-language-server/package.nix +++ b/pkgs/by-name/sv/svelte-language-server/package.nix @@ -4,7 +4,7 @@ fetchurl, }: let - version = "0.17.17"; + version = "0.17.19"; in buildNpmPackage { pname = "svelte-language-server"; @@ -12,10 +12,10 @@ buildNpmPackage { src = fetchurl { url = "https://registry.npmjs.org/svelte-language-server/-/svelte-language-server-${version}.tgz"; - hash = "sha256-VVZdRJEKjjuT9HPeAhsG7/5Z63cjWNYMbRiYIez/DLs="; + hash = "sha256-5Jap4dZzVWZxrIQSWUnTXG63re4T2mjcSvSilM7EReI="; }; - npmDepsHash = "sha256-pKiGKthx9dn55uRbJt5CsnB9Nlt67mXNJQArbrj57oc="; + npmDepsHash = "sha256-stE8uno/Oc/LvEWvD8KqoQ/mfNJHWa4PatGDwE+ix7E="; postPatch = '' ln -s ${./package-lock.json} package-lock.json diff --git a/pkgs/by-name/sy/syncstorage-rs/package.nix b/pkgs/by-name/sy/syncstorage-rs/package.nix index 9309dcd8ebe0..4eb3bc70888b 100644 --- a/pkgs/by-name/sy/syncstorage-rs/package.nix +++ b/pkgs/by-name/sy/syncstorage-rs/package.nix @@ -22,13 +22,13 @@ in rustPlatform.buildRustPackage rec { pname = "syncstorage-rs"; - version = "0.18.3"; + version = "0.19.1"; src = fetchFromGitHub { owner = "mozilla-services"; repo = "syncstorage-rs"; tag = version; - hash = "sha256-LrtUHvkajZ94SSo63hypAnxfv4x61vne2uMazx4vv8c="; + hash = "sha256-UEBF0z2gn9Jpj6IefvB5XMwt21uuD5PlpHj7Ow7yf/Y="; }; nativeBuildInputs = [ @@ -47,7 +47,7 @@ rustPlatform.buildRustPackage rec { --prefix PATH : ${lib.makeBinPath [ pyFxADeps ]} ''; - cargoHash = "sha256-q6WKaUHr1/Cxpj/A2ox3e63EqQpNMDk3Bdkdrb6qq7A="; + cargoHash = "sha256-fkVqyA296BmK+jK9yJ0gj0V7CThv021AxNMCMFdr8fg="; # almost all tests need a DB to test against doCheck = false; diff --git a/pkgs/by-name/ta/tabby-agent/package.nix b/pkgs/by-name/ta/tabby-agent/package.nix index 124d765d5624..a045074d4a24 100644 --- a/pkgs/by-name/ta/tabby-agent/package.nix +++ b/pkgs/by-name/ta/tabby-agent/package.nix @@ -9,13 +9,13 @@ }: stdenv.mkDerivation (finalAttrs: { pname = "tabby-agent"; - version = "0.30.1"; + version = "0.30.2"; src = fetchFromGitHub { owner = "TabbyML"; repo = "tabby"; tag = "v${finalAttrs.version}"; - hash = "sha256-daKT/1d6O1ZPbdvVoG7Kj3T7wG3gYvg8wblvO0Ec+3M="; + hash = "sha256-qg9DcIjsXan6SQY5y+Df4vtAjv6kHNfVVXXUvdCYrRQ="; }; nativeBuildInputs = [ diff --git a/pkgs/by-name/ta/tailwindcss_4/package.nix b/pkgs/by-name/ta/tailwindcss_4/package.nix index a7d0e41d6400..ca21148aceb2 100644 --- a/pkgs/by-name/ta/tailwindcss_4/package.nix +++ b/pkgs/by-name/ta/tailwindcss_4/package.nix @@ -7,7 +7,7 @@ makeWrapper, }: let - version = "4.1.11"; + version = "4.1.12"; inherit (stdenv.hostPlatform) system; throwSystem = throw "tailwindcss has not been packaged for ${system} yet."; @@ -22,10 +22,10 @@ let hash = { - aarch64-darwin = "sha256-9ZhLnABcPmeEHDOQbHp8kuheQF9h4Cnpu2LogN1mLnk="; - aarch64-linux = "sha256-BAmqQiKWn0f6b0Fg/lOH55v3Jp56/g6LIvdTLJjh0xQ="; - x86_64-darwin = "sha256-duJzJlBtENUOZbdReV8FN/kwTssQCr6DXsE4xBd084w="; - x86_64-linux = "sha256-ZIBbhK9CkuBD6m+G0kLxkcCsdTWcGkmEVd/mxkKv26s="; + aarch64-darwin = "sha256-fWm+F3a76KSeFXFNmHPQiVnDIK/w8HFNjY5tnQDZtUM="; + aarch64-linux = "sha256-GBMyl0//GzQjrXXWovHQmt8cpj6xMk2wr7xMMP8a0IY="; + x86_64-darwin = "sha256-/JNdUYE0QkcsLhsoWC/sPfIEN55T1XJJN9UW3UJa83w="; + x86_64-linux = "sha256-Xu7mbqI36umhYPozFP0M92q5k1Uamfr7Fvodtsa5Aok="; } .${system} or throwSystem; in diff --git a/pkgs/by-name/uc/uclibc-ng/package.nix b/pkgs/by-name/uc/uclibc-ng/package.nix index 40bfcf94a53c..9863c5d02c22 100644 --- a/pkgs/by-name/uc/uclibc-ng/package.nix +++ b/pkgs/by-name/uc/uclibc-ng/package.nix @@ -63,11 +63,11 @@ let in stdenv.mkDerivation (finalAttrs: { pname = "uclibc-ng"; - version = "1.0.52"; + version = "1.0.54"; src = fetchurl { url = "https://downloads.uclibc-ng.org/releases/${finalAttrs.version}/uClibc-ng-${finalAttrs.version}.tar.xz"; - hash = "sha256-iB2kc3hPlcyCkLsHgMCvyBDKKNV14z1a/V5xU7KaoTY="; + hash = "sha256-0ez2XMIhfdQRik2vwavyfFhbXLV48715kfxkC3lkP/I="; }; # 'ftw' needed to build acl, a coreutils dependency diff --git a/pkgs/by-name/v2/v2rayn/deps.json b/pkgs/by-name/v2/v2rayn/deps.json index 5b3bb4ce1e3b..0936d52912a7 100644 --- a/pkgs/by-name/v2/v2rayn/deps.json +++ b/pkgs/by-name/v2/v2rayn/deps.json @@ -11,8 +11,8 @@ }, { "pname": "Avalonia", - "version": "11.3.2", - "hash": "sha256-eDptsmrO7QxIvHm5kCs9ZE/N1tAuIBvaJMKiAcsu9yk=" + "version": "11.3.3", + "hash": "sha256-UvENUQgoTUikjIMTL+oI93FNwr1gZfoGVtZdYzBzdts=" }, { "pname": "Avalonia.Angle.Windows.Natives", @@ -31,38 +31,38 @@ }, { "pname": "Avalonia.Controls.ColorPicker", - "version": "11.3.2", - "hash": "sha256-Lr943SkpYMZz3+TPA7vc/mtbQH0r/eLewZFNGNf3i2M=" + "version": "11.3.3", + "hash": "sha256-zg35D8NygrU8mCAsLLoPmrzXZcV31NuHNtTaiZZhOxc=" }, { "pname": "Avalonia.Controls.DataGrid", - "version": "11.3.2", - "hash": "sha256-PFz2fgrBzXQWPLj9X1wdDKDH2iy/54E4NBa+yO7DTfQ=" + "version": "11.3.3", + "hash": "sha256-kDO6o2U2SRVMRE/60FOiLfWi90HxYhoUnAIcxX270ww=" }, { "pname": "Avalonia.Desktop", - "version": "11.3.2", - "hash": "sha256-A3LV30ekjXWdo/pRldL4S68AAA6BTuLU8ZGCinkNrvk=" + "version": "11.3.3", + "hash": "sha256-/jYjxA5vJqU5IpJkgnlathprzdHB/ihdL35ZZBRESeU=" }, { "pname": "Avalonia.Diagnostics", - "version": "11.3.2", - "hash": "sha256-fMXY9p16o/wpUXFjRngf96gVwSlX/WCY0fn3nE/TmIY=" + "version": "11.3.3", + "hash": "sha256-rHBFnhZ+gAqPqqDfZxBxUr3wXIpgOc9hInwzDOgdk5E=" }, { "pname": "Avalonia.FreeDesktop", - "version": "11.3.2", - "hash": "sha256-Mxvpd5JKmIpjQCZmuiSb6IkKfwQhA3o712Ubdx0gP28=" + "version": "11.3.3", + "hash": "sha256-kUSE90HoJz9NsYCphLUQgNkxb3xHhFIlqXa6lzuGi4c=" }, { "pname": "Avalonia.Native", - "version": "11.3.2", - "hash": "sha256-HLVKaAVIRnm77lk7LJfrbiEmGWVIim7XMMoZAyGVUFA=" + "version": "11.3.3", + "hash": "sha256-QmvN5gUsgjk7ViacdXOwHULHid0TfAKJGW3cf9A8bwQ=" }, { "pname": "Avalonia.ReactiveUI", - "version": "11.3.2", - "hash": "sha256-lYKhqoKqEZB4tttXehK5KoBMkwVeTxAThh87dns4C/c=" + "version": "11.3.3", + "hash": "sha256-Clq/13CZRTFEJmVw41Tw0tJEtm0AYvBKJah7OdFbBSo=" }, { "pname": "Avalonia.Remote.Protocol", @@ -76,28 +76,28 @@ }, { "pname": "Avalonia.Remote.Protocol", - "version": "11.3.2", - "hash": "sha256-NIkrj4pMvxVvznexzEXmNI8KXWLSXmVbHHWpwz9h3M8=" + "version": "11.3.3", + "hash": "sha256-gHZA53IyRAdeIg7yRIN6Pzh0AbOGd5B9mckEWsPuK7A=" }, { "pname": "Avalonia.Skia", - "version": "11.3.2", - "hash": "sha256-cBJo/tTewA2/LSygJ5aAyPPr11KpLPwS1I6kQxDMy24=" + "version": "11.3.3", + "hash": "sha256-pUMqXnupxztsAP/n4U2pSgTga89gy7CBLg39y2j0EjA=" }, { "pname": "Avalonia.Themes.Simple", - "version": "11.3.2", - "hash": "sha256-c8QtpXv+B1CTkW9ovxOZwjRZAkD4KZzIvhIhI5WJXdo=" + "version": "11.3.3", + "hash": "sha256-nUfIEeJZgiLuy681S16Qncri6fvCGF7tYk4dSf3JY4s=" }, { "pname": "Avalonia.Win32", - "version": "11.3.2", - "hash": "sha256-FNs+O2knXcmUpfDjd/9JcNmpzEi8g3UQ3pQHItnN2U8=" + "version": "11.3.3", + "hash": "sha256-jlQXEdbZjfRsu2MjYzHGUAyn+uvdACXCvm63HjUKqfQ=" }, { "pname": "Avalonia.X11", - "version": "11.3.2", - "hash": "sha256-OCH5bwJ7Zje0/L7qtDcFa+yje/uwm2pYNE169J866/I=" + "version": "11.3.3", + "hash": "sha256-7A+uzB7g21P+RnKO4bKOJVY35qPz5Xna8n8VGG7RoMw=" }, { "pname": "CliWrap", @@ -111,8 +111,8 @@ }, { "pname": "Downloader", - "version": "3.3.4", - "hash": "sha256-QbbWlP3IzDzPWuZcQCfqpKQZMPSMETL/+6AXlhcjVc8=" + "version": "4.0.2", + "hash": "sha256-+F4cSVEjeHI8QfCjphKJLdZlViGE7/rSVq/MYDtiyPE=" }, { "pname": "DynamicData", @@ -161,13 +161,13 @@ }, { "pname": "Microsoft.Extensions.DependencyInjection.Abstractions", - "version": "8.0.1", - "hash": "sha256-lzTYLpRDAi3wW9uRrkTNJtMmaYdtGJJHdBLbUKu60PM=" + "version": "8.0.2", + "hash": "sha256-UfLfEQAkXxDaVPC7foE/J3FVEXd31Pu6uQIhTic3JgY=" }, { "pname": "Microsoft.Extensions.Logging.Abstractions", - "version": "8.0.1", - "hash": "sha256-TYce3qvMr92JbAZ62ATBsocaH0joJzw0px0tYGZ9N0U=" + "version": "8.0.3", + "hash": "sha256-5MSY1aEwUbRXehSPHYw0cBZyFcUH4jkgabddxhMiu3Q=" }, { "pname": "Microsoft.Win32.Registry", diff --git a/pkgs/by-name/v2/v2rayn/package.nix b/pkgs/by-name/v2/v2rayn/package.nix index 7e46f5d5f076..123ef884349b 100644 --- a/pkgs/by-name/v2/v2rayn/package.nix +++ b/pkgs/by-name/v2/v2rayn/package.nix @@ -19,15 +19,18 @@ nix-update-script, }: -buildDotnetModule rec { +let + version = "7.13.8"; +in +buildDotnetModule { pname = "v2rayn"; - version = "7.13.2"; + inherit version; src = fetchFromGitHub { owner = "2dust"; repo = "v2rayN"; tag = version; - hash = "sha256-go0XhZF3rEZ11MmHSx+dKqOT6IyiTqtn6hNHLwTyHOM="; + hash = "sha256-ygQh3fB2G0FA187Nmmb6lG2FaduN2zOZIStuMWvqEGk="; fetchSubmodules = true; }; @@ -41,7 +44,7 @@ buildDotnetModule rec { substituteInPlace v2rayN/ServiceLib/Global.cs \ --replace-fail "/bin/bash" "${bash}/bin/bash" substituteInPlace v2rayN/ServiceLib/Handler/CoreAdminHandler.cs \ - --replace-fail "/bin/sh" "${bash}/bin/bash" + --replace-fail "/bin/bash" "${bash}/bin/bash" substituteInPlace v2rayN/ServiceLib/Handler/AutoStartupHandler.cs \ --replace-fail "Utils.GetExePath())" '"v2rayN")' substituteInPlace v2rayN/ServiceLib/ViewModels/MainWindowViewModel.cs \ @@ -100,13 +103,13 @@ buildDotnetModule rec { ]; postInstall = '' - install -Dm644 v2rayN/v2rayN.Desktop/v2rayN.png $out/share/pixmaps/v2rayn.png + install -D --mode 0644 v2rayN/v2rayN.Desktop/v2rayN.png $out/share/icons/hicolor/256x256/apps/v2rayn.png ''; passthru.updateScript = nix-update-script { }; meta = { - description = "GUI client for Windows and Linux, support Xray core and sing-box-core and others"; + description = "GUI client support Xray core and sing-box-core and others"; homepage = "https://github.com/2dust/v2rayN"; mainProgram = "v2rayN"; license = with lib.licenses; [ gpl3Plus ]; diff --git a/pkgs/by-name/va/vault-bin/package.nix b/pkgs/by-name/va/vault-bin/package.nix index 809def9d68f0..7649792581a7 100644 --- a/pkgs/by-name/va/vault-bin/package.nix +++ b/pkgs/by-name/va/vault-bin/package.nix @@ -6,7 +6,7 @@ stdenv.mkDerivation rec { pname = "vault-bin"; - version = "1.20.1"; + version = "1.20.2"; src = let @@ -20,11 +20,11 @@ stdenv.mkDerivation rec { aarch64-darwin = "darwin_arm64"; }; hash = selectSystem { - x86_64-linux = "sha256-enaT1ACAW2jG5IbmKlJMRTDrGlCiIlT0HzZV6MjLeFw="; - aarch64-linux = "sha256-D0+uRm6+942R3AkSnD03PRtG32hdbKsyVFKk5bGgqGQ="; - i686-linux = "sha256-fP9Cmp2h2/8Gwe6hCddwRZ7+9yqzxodqhLWytZQBJOc="; - x86_64-darwin = "sha256-gEXitrmyxl3Dq9T/o4QnG9+Bwfc0IMUPWEqu/U/4Dpk="; - aarch64-darwin = "sha256-ps4uIJ6tQPyDQ5hJyDksSRTYDwRqbSeIFOuLStrnos4="; + x86_64-linux = "sha256-Ea+GaukEEd02SzZYe+bzu8EWNPc5XxUVs3qZkF2ry6s="; + aarch64-linux = "sha256-Q1n57tUIaPdg++fr2NREv0hsApJdRqyfs/qEHiyst7Y="; + i686-linux = "sha256-8V/2Dm6F799fBhuPyUrdu6e7KDmr6SYxU74wRXCRobs="; + x86_64-darwin = "sha256-Yuaon05IXauU61xOqAh97DtlKhIQ05qt+Str5JXleHE="; + aarch64-darwin = "sha256-wTTEIeoKDNDenhMzwXtldjsz13jvrDY4eOuPFjSyE4Q="; }; in fetchzip { diff --git a/pkgs/by-name/ve/velocity/deps.json b/pkgs/by-name/ve/velocity/deps.json index 1a2cae5892f0..39a782eaf699 100644 --- a/pkgs/by-name/ve/velocity/deps.json +++ b/pkgs/by-name/ve/velocity/deps.json @@ -661,102 +661,102 @@ "jar": "sha256-wmJ0R0s4RLzbfYPPc6eFNm+EtFO8F6GRz6T4/D4CIjQ=", "pom": "sha256-3Etrgt7DQXBSvBc7lC+5asogUIpLmkfp8b2yQAXkPuc=" }, - "io/netty#netty-buffer/4.2.1.Final": { - "jar": "sha256-Ls6NhBPVqjWh0eD+lPafnp7dj3q7U/bFV6Rzyf0L/I4=", - "pom": "sha256-kI8SXPGXUNqRcRIhTOuon6Rt0iZU3tvAQbmaGN516gg=" + "io/netty#netty-buffer/4.2.3.Final": { + "jar": "sha256-qE+AnL+14CCqdFEXJ/TrOM8TxiN3nTptXhvs3Bc0c70=", + "pom": "sha256-iRZkcKHco4p768EiNBVjqG1ljK+9hZUUgoyi9nWRfnI=" }, - "io/netty#netty-codec-base/4.2.1.Final": { - "jar": "sha256-wqGnr5kWlCcvdLt9qwEFkEl5DBS0U3YACYJ+EFUw07c=", - "pom": "sha256-HhZaZI/68L/DUEepXastE8xH9MhaO60bpeX/GR9RTfw=" + "io/netty#netty-codec-base/4.2.3.Final": { + "jar": "sha256-KM75Eub2Km9ZJuOVdb2xiQd5qxkoQXRHh6Ok2Z9L5vQ=", + "pom": "sha256-fFqqtOVkCtacmEBqkLvVgikjOU8Q0u8CcnGzxLtM1PY=" }, - "io/netty#netty-codec-compression/4.2.1.Final": { - "jar": "sha256-x9UaT2nEv78EP5LRlvYabfQq0pxb0NBT0QcRciClykY=", - "pom": "sha256-PUu9bTVQI2qrQ9FQxrKPBvV0QFpg0K7k7Z43G2nPF8U=" + "io/netty#netty-codec-compression/4.2.3.Final": { + "jar": "sha256-anuL5vYq7OEmWDdlgHqZGnYCZtoesrsYl6q24tcm35I=", + "pom": "sha256-30Yl9QQDBiADH3Xt7NMY8QcNicuRGJU/NYUEwYXj638=" }, - "io/netty#netty-codec-haproxy/4.2.1.Final": { - "jar": "sha256-9tKNDNRcyZhLpihrVZdg9/q9Xc8K0XhwHvDq5SmfRlc=", - "pom": "sha256-1/zgS3ordcAx0e/Fg7kZ7WT8OATQ+fe/cNtN83TIyrQ=" + "io/netty#netty-codec-haproxy/4.2.3.Final": { + "jar": "sha256-p73EbZ4Ku+0OcIuupOsII7Hm8VRIOURcn4DfJGHUgqw=", + "pom": "sha256-MST4IVR0lmfsoNS9ppg8Ic7hOZE6dFDkH/3fwwPEA4k=" }, - "io/netty#netty-codec-http/4.2.1.Final": { - "jar": "sha256-EOgxhiv32rzsz0/YKYnDHdo5qJ7Wac9+lt7glykHdUE=", - "pom": "sha256-IgFVyOpvA50KfkncC8wJEDVCK63RJqtdTHJCcQKlzFo=" + "io/netty#netty-codec-http/4.2.3.Final": { + "jar": "sha256-BeLOUhSA74RtRKvsG7riB/dnRzWb/n/Ka1lxiLd9Smg=", + "pom": "sha256-Zx9BTXgvTfnYoYZah3jFBJx8PodUaNyH11LRb5mqCkQ=" }, - "io/netty#netty-codec-marshalling/4.2.1.Final": { - "jar": "sha256-SFSZicclpwJXkTKathKhpMvksQ5T9KaxPkTJwMVCh2o=", - "pom": "sha256-Jbo/nNzuOZQJYUr0NYs1SQKnVXqxLSgFTCE2WRom088=" + "io/netty#netty-codec-marshalling/4.2.3.Final": { + "jar": "sha256-vpkn+uQVSP9WEXNCLElK2lXJmDlmrVTyDBgfGqmbRL0=", + "pom": "sha256-H0wOGS22gfyWwIdj+lVuWFT6bjvG20CZCyfANX5T15s=" }, - "io/netty#netty-codec-protobuf/4.2.1.Final": { - "jar": "sha256-yQ/7MaBKMoAonacuY6r3oj+XwWmOLMm5a/pkad+C9Zg=", - "pom": "sha256-1THFYFdSdgq6pFwwbPwyv9DdhrUjeVyYCv7qASifEDg=" + "io/netty#netty-codec-protobuf/4.2.3.Final": { + "jar": "sha256-8jMnfOCEcgui7qf2ea02SxwKEPuSB9kztucSQGIQpdI=", + "pom": "sha256-qB7ueV2s3HgW82mR5+HJ+xpW8yMNgVPMuerztjp2Xtc=" }, - "io/netty#netty-codec/4.2.1.Final": { - "jar": "sha256-7vbxj3GsXjLcJ6jVJUeRRsWf7DAJnUMaQGYq/329RvE=", - "pom": "sha256-50zpmZRDPP4uWb0c5YR5fpCK1ddv47TZfp5xpzChvGQ=" + "io/netty#netty-codec/4.2.3.Final": { + "jar": "sha256-e9+J8CDdkQpnOSuXVNcWVrCMXQsxVdDipCJ94CnHLpM=", + "pom": "sha256-4L/Y1glKSVu9VaNOtZXmy7+7Lio0KKTp6x98v1rVShk=" }, - "io/netty#netty-common/4.2.1.Final": { - "jar": "sha256-fupKlvYazgYzeQY3QVDLc8lPJIiX/aPahltcOKcQvf0=", - "pom": "sha256-LuOladJw8oHrQ6uo6Mb9sgQXtV3D+wffbVPEwM39/Cs=" + "io/netty#netty-common/4.2.3.Final": { + "jar": "sha256-2gLPoSX6PdxS4sdw6Lm/6Jhh7N5MTe01AYlWkv9JstQ=", + "pom": "sha256-BqQtEX7CXFeRnmRWcB5kkzvBZNnIOIoQ/2UwoGBSuio=" }, - "io/netty#netty-handler/4.2.1.Final": { - "jar": "sha256-uX0Fet//+4JM5rXZh2v+Hwv86yRQS2ONP2xik8//XcU=", - "pom": "sha256-2eLP4nuNM9r9fSmHXLIaYV17+TD29tRfRP2wVQNn11Q=" + "io/netty#netty-handler/4.2.3.Final": { + "jar": "sha256-6pwQ9MOF8mAlZYD4fG9U8cE9Bb/Teey0DI8KzEw5DLI=", + "pom": "sha256-6bXP9gOCM5xv7NPH0MzdD7F1P2sboWJgmr+i+dTxjRk=" }, - "io/netty#netty-parent/4.2.1.Final": { - "pom": "sha256-w5aMzUh1X2OcSI0V9sFBOc76FWGZbEdiBcK+IdZngLQ=" + "io/netty#netty-parent/4.2.3.Final": { + "pom": "sha256-Hv4svswTjgmw8494nkIptnV/kc4tByzejztmwlqpcB0=" }, - "io/netty#netty-resolver/4.2.1.Final": { - "jar": "sha256-+xxanxIwzFWJRKxjPltk0+TsmB2ODVcn1fWBIgCLIY4=", - "pom": "sha256-yHpisHkPKXcurI6z3uY9Dm4ZQY2H57sbTZhK+E7LdQ4=" + "io/netty#netty-resolver/4.2.3.Final": { + "jar": "sha256-GXUh4KkIlx+lfYRA4wGpw5VRjechozsN+uBTybYWxkI=", + "pom": "sha256-BFpHO5FIrc+x2WVX1K4SU0K3X7LKVjKJD6PCOPnYgcc=" }, - "io/netty#netty-transport-classes-epoll/4.2.1.Final": { - "jar": "sha256-zC+Xr6VoTxmVpfEAazbJuksjPB5oA4xQ5bd7FKuk7qQ=", - "pom": "sha256-xDnVSdFm5hjdHluGEj62ZJmzf9Mo+UleCJh8TsduvS0=" + "io/netty#netty-transport-classes-epoll/4.2.3.Final": { + "jar": "sha256-j5oICgTnoaiZO1lC3hxydm8663PgO/Tf8iMDAaZkjWA=", + "pom": "sha256-BIJRpHBiMLlGgvlj0PIqcBfckN3QSABeKQQEQGpK3rU=" }, - "io/netty#netty-transport-classes-io_uring/4.2.1.Final": { - "jar": "sha256-xt64sgz3ajfiz26QX9Pu5Ph+7WR41O11x3CfQOABkVY=", - "pom": "sha256-pW283sTP9EwK3z21jILuXXTjtwxw+bgvstQljd1+mkk=" + "io/netty#netty-transport-classes-io_uring/4.2.3.Final": { + "jar": "sha256-GmDWN2JgVWu7eIo7T0KVvTiG3yZy3ciwRNdCdu2xObo=", + "pom": "sha256-vlpW4b6EXBoz5WckCdHhx+hsxgckvys2Am0/hN2gEFA=" }, - "io/netty#netty-transport-classes-kqueue/4.2.1.Final": { - "jar": "sha256-jx1LTHuS7dMdGcF2q2DF4+ceeESBzJXH/FDHRRHTLVY=", - "pom": "sha256-FZfud6TwQxu61IMSkFPYCpJxI9QEZKiMbK8mFfSJ0X0=" + "io/netty#netty-transport-classes-kqueue/4.2.3.Final": { + "jar": "sha256-g6eRvF01c8e/966kF/X2D+hSpJDrnXGv82m+M8RI8bw=", + "pom": "sha256-HoIDHN+VP4HilqVwKyOzwLcnV4rgscml1SpQxt1t1IM=" }, - "io/netty#netty-transport-native-epoll/4.2.1.Final": { - "jar": "sha256-r7pS5ooybM9V+fDL5DKL3HdfTQfkmp/bBU7e4zKk1iY=", - "pom": "sha256-jU8ZMnkjUd2dh18wKBgtGO380ot2HRmh/v28vTA53ho=" + "io/netty#netty-transport-native-epoll/4.2.3.Final": { + "jar": "sha256-l3aX9ZNb3xxTXAzUMPiu5Xqvf7PWvO6C9RZuqrMdKy4=", + "pom": "sha256-Kuh5vHL7CtnZZobT/KgQ4MiITHSOTUxyGBcVm8rKrao=" }, - "io/netty#netty-transport-native-epoll/4.2.1.Final/linux-aarch_64": { - "jar": "sha256-qKVqGCRta5N39nhh3ZnVRJd7eCKPvueD/pK291kebwo=" + "io/netty#netty-transport-native-epoll/4.2.3.Final/linux-aarch_64": { + "jar": "sha256-JOdtx0MJWtxpZ/1RqvhxiMQ4rrmlBECRk9bxeaOVD6Q=" }, - "io/netty#netty-transport-native-epoll/4.2.1.Final/linux-x86_64": { - "jar": "sha256-06vTRm3/oo01EC+Ig0a6TO9ZvBVm0AhLX6xf6yrasf0=" + "io/netty#netty-transport-native-epoll/4.2.3.Final/linux-x86_64": { + "jar": "sha256-43lQ7X/WHEcw5IO1cU0xaoC6c2XawEUIsO4UcugRv/Y=" }, - "io/netty#netty-transport-native-io_uring/4.2.1.Final": { - "jar": "sha256-cA85zEIqvjT0pypNb4vXrIN+IPkKaw19bqBioJPaRfQ=", - "pom": "sha256-sIrz9A+m3YDNS7IHuKbDC056QnyqJQXplvELqKmsOcY=" + "io/netty#netty-transport-native-io_uring/4.2.3.Final": { + "jar": "sha256-Eua64ls90kVTr38BwwtZbpCzrRCDDAv3Xh57FAZkFmE=", + "pom": "sha256-Ll/iBk6SUi+9M8f2a5W0pvYA9a1BZ+EquiC7NoEnQ/Y=" }, - "io/netty#netty-transport-native-io_uring/4.2.1.Final/linux-aarch_64": { - "jar": "sha256-Sz4XmKmexoj1p0KO0XdT7mi1ODY3RYVQ7KVycgFa27U=" + "io/netty#netty-transport-native-io_uring/4.2.3.Final/linux-aarch_64": { + "jar": "sha256-SkYKRO+yPVw8c+ljDIFagr78U8PY2jsyXG4JfguQroo=" }, - "io/netty#netty-transport-native-io_uring/4.2.1.Final/linux-x86_64": { - "jar": "sha256-iWlfPXfnC3GSwonzezLC077qlQRhh0/mrZZTP8m5jXE=" + "io/netty#netty-transport-native-io_uring/4.2.3.Final/linux-x86_64": { + "jar": "sha256-KYHFM7OrlmxODOWuxS3J9cG8PQ491PhWqDPC163RJoM=" }, - "io/netty#netty-transport-native-kqueue/4.2.1.Final": { - "jar": "sha256-yBOQD8hQKKmxDapY57E/gAdIByXWj5LSmIk6IX4TASo=", - "pom": "sha256-2sqgyfd13F0mqip8Paewi5nMw++c/it0XEMJtJZRj00=" + "io/netty#netty-transport-native-kqueue/4.2.3.Final": { + "jar": "sha256-UmQvRVD7pR42pQtnL0UC/2esnT70FMd2lwQJ52dPZ4U=", + "pom": "sha256-SZmx6MKCEM2c6XpU33cjkwvoILy/QqwP+OYlcU/Npmg=" }, - "io/netty#netty-transport-native-kqueue/4.2.1.Final/osx-aarch_64": { - "jar": "sha256-M1afocec8CjdrrAwZ2PiyUJx1shUTFkX0Pmc3pLjxKE=" + "io/netty#netty-transport-native-kqueue/4.2.3.Final/osx-aarch_64": { + "jar": "sha256-LZAQjwE6R4gvuz8FRIeNMANyvRKWu8cIbK4RlMZTGAg=" }, - "io/netty#netty-transport-native-kqueue/4.2.1.Final/osx-x86_64": { - "jar": "sha256-2Kh+nBDNnLxRsiJXq43HmfCywb87V4/gH4phdaxf2g4=" + "io/netty#netty-transport-native-kqueue/4.2.3.Final/osx-x86_64": { + "jar": "sha256-BFMxwe9+GXD9JvSyRn7VZOFeE6OgTjTrU+LxZRijT3M=" }, - "io/netty#netty-transport-native-unix-common/4.2.1.Final": { - "jar": "sha256-fyp3RpUMyyJ5CK/j7iG5vPaczFhDe7F8FXmo1XL7OKk=", - "pom": "sha256-XZQGqeIfeIg7nliBQp3VOFQ0bxEEXbs4H49By/LbdYE=" + "io/netty#netty-transport-native-unix-common/4.2.3.Final": { + "jar": "sha256-11JDOI6+i6P1YYMnm3JXIaA6xOeTIJ2s5v4VFLhdZ5s=", + "pom": "sha256-u3asm4lXSX4306D+gy7j9A8ffZj7Wkp1bstKAw4jjHs=" }, - "io/netty#netty-transport/4.2.1.Final": { - "jar": "sha256-up/UVZj6BWBdKlAU1vRxEuQ5K6K5Es0eN4bkhRs5fPc=", - "pom": "sha256-g8ryhVEg1V430/dDgX23gUOezAxMfra7Zv80sEDNjO8=" + "io/netty#netty-transport/4.2.3.Final": { + "jar": "sha256-0/wgHcn+iHFRkT0wDncNqgkA8TIiIQVleofCyWyG5QU=", + "pom": "sha256-v3iNbongKeLxVIvnlMJSngras0pYbvag/4Ans1JoPrw=" }, "it/unimi/dsi#fastutil/8.5.15": { "jar": "sha256-z/62ZzvfHm5Dd9aE3y9VrDWc9c9t9hPgXmLe7qUAk2o=", diff --git a/pkgs/by-name/ve/velocity/package.nix b/pkgs/by-name/ve/velocity/package.nix index 447c9f4e68f0..aad52afc3a4f 100644 --- a/pkgs/by-name/ve/velocity/package.nix +++ b/pkgs/by-name/ve/velocity/package.nix @@ -35,13 +35,13 @@ let in stdenv.mkDerivation (finalAttrs: { pname = "velocity"; - version = "3.4.0-unstable-2025-08-02"; + version = "3.4.0-unstable-2025-08-13"; src = fetchFromGitHub { owner = "PaperMC"; repo = "Velocity"; - rev = "d47848cb93a5f94a95059c2794c0197df6360f29"; - hash = "sha256-bCvUXWv4rdoZEU1GpVSlXROC9kBtSGisvmCgRPKVZ4o="; + rev = "5d450ab3c74ae7ccca13abe2cde20b8473fe64e4"; + hash = "sha256-snRSNXjhm297GcyO1dhd8wDXYB0M+k2BPF8g4w0XC6s="; }; nativeBuildInputs = [ diff --git a/pkgs/by-name/ve/versatiles/package.nix b/pkgs/by-name/ve/versatiles/package.nix index d1cef0cb81ce..471b187e24ac 100644 --- a/pkgs/by-name/ve/versatiles/package.nix +++ b/pkgs/by-name/ve/versatiles/package.nix @@ -6,16 +6,16 @@ rustPlatform.buildRustPackage rec { pname = "versatiles"; - version = "0.15.6"; # When updating: Replace with current version + version = "0.15.7"; # When updating: Replace with current version src = fetchFromGitHub { owner = "versatiles-org"; repo = "versatiles-rs"; tag = "v${version}"; # When updating: Replace with long commit hash of new version - hash = "sha256-JWMoXsMRdllYrTpUdKYEi7i5AI5957qwrr8agvyKeT8="; # When updating: Use `lib.fakeHash` for recomputing the hash once. Run: 'nix-build -A versatiles'. Swap with new hash and proceed. + hash = "sha256-E0CWhNaaIfBZsRYcZ2FzWW6HhBRVolY/Lfr1ru+sikQ="; # When updating: Use `lib.fakeHash` for recomputing the hash once. Run: 'nix-build -A versatiles'. Swap with new hash and proceed. }; - cargoHash = "sha256-8DtkeWo+lxv/9JzknpWnGYCA9v2HA4jFN4ZvseFpOGU="; # When updating: Same as above + cargoHash = "sha256-1ZC1MLPfh9E36dxF23Fd0668m3c4cKRD+TJTF1h7ph8="; # When updating: Same as above __darwinAllowLocalNetworking = true; diff --git a/pkgs/by-name/vp/vpl-gpu-rt/package.nix b/pkgs/by-name/vp/vpl-gpu-rt/package.nix index bc64a4308723..4e64f985e0dc 100644 --- a/pkgs/by-name/vp/vpl-gpu-rt/package.nix +++ b/pkgs/by-name/vp/vpl-gpu-rt/package.nix @@ -10,7 +10,7 @@ stdenv.mkDerivation rec { pname = "vpl-gpu-rt"; - version = "25.3.0"; + version = "25.3.1"; outputs = [ "out" @@ -21,7 +21,7 @@ stdenv.mkDerivation rec { owner = "intel"; repo = "vpl-gpu-rt"; rev = "intel-onevpl-${version}"; - hash = "sha256-S4HjNZrrHxTiHao102fODrUE4isqd2QR7dFfqxEQRx8="; + hash = "sha256-BjGoBPWsw8wCDAw1z+imegzbvgRrMNUHdXkUHULC/Vs="; }; nativeBuildInputs = [ diff --git a/pkgs/by-name/wa/waybar-lyric/package.nix b/pkgs/by-name/wa/waybar-lyric/package.nix index becf0b8f5fd9..ee5956c32df1 100644 --- a/pkgs/by-name/wa/waybar-lyric/package.nix +++ b/pkgs/by-name/wa/waybar-lyric/package.nix @@ -7,13 +7,13 @@ }: buildGoModule (finalAttrs: { pname = "waybar-lyric"; - version = "0.10.0"; + version = "0.11.0"; src = fetchFromGitHub { owner = "Nadim147c"; repo = "waybar-lyric"; tag = "v${finalAttrs.version}"; - hash = "sha256-RqUaak9MH7lE1ez8T+UKm2Eqk0ImePPubfFExNpZqM8="; + hash = "sha256-1n00yxeDlxn/BzDF4cc+JkJZMmEtZftqey3Hwg6aAKI="; }; vendorHash = "sha256-DBtSC+ePl6dvHqB10FyeojnYoT3mmsWAnbs/lZLibl8="; diff --git a/pkgs/by-name/we/wezterm/package.nix b/pkgs/by-name/we/wezterm/package.nix index aaf098d19d35..493757e0ef3b 100644 --- a/pkgs/by-name/we/wezterm/package.nix +++ b/pkgs/by-name/we/wezterm/package.nix @@ -28,14 +28,14 @@ rustPlatform.buildRustPackage rec { pname = "wezterm"; - version = "0-unstable-2025-07-10"; + version = "0-unstable-2025-07-30"; src = fetchFromGitHub { owner = "wez"; repo = "wezterm"; - rev = "85c587f9f3d8be49dfa252da116fc9ca290df113"; + rev = "6a493f88fab06a792308e0c704790390fd3c6232"; fetchSubmodules = true; - hash = "sha256-hyyKC5BXeIbgP+bXxtvIz1LZUDoUJ6+em/PrX/TEg4k="; + hash = "sha256-ilDUBkXKo3N83ew3I+Ic48SBjraCs3OyjVXlTItX0mU="; }; postPatch = '' diff --git a/pkgs/by-name/wi/wineasio/package.nix b/pkgs/by-name/wi/wineasio/package.nix index 955951318877..21ddf7083b35 100644 --- a/pkgs/by-name/wi/wineasio/package.nix +++ b/pkgs/by-name/wi/wineasio/package.nix @@ -10,13 +10,13 @@ multiStdenv.mkDerivation rec { pname = "wineasio"; - version = "1.2.0"; + version = "1.3.0"; src = fetchFromGitHub { owner = "wineasio"; repo = "wineasio"; tag = "v${version}"; - hash = "sha256-d5BGJAkaM5XZXyqm6K/UzFE4sD6QVHHGnLi1bcHxiaM="; + hash = "sha256-Yw07XBzllbZ7l1XZcCvEaxZieaHLVxM5cmBM+HAjtQ4="; fetchSubmodules = true; }; diff --git a/pkgs/by-name/wl/wl-mirror/package.nix b/pkgs/by-name/wl/wl-mirror/package.nix index fe12b34711e3..dd04024bc44a 100644 --- a/pkgs/by-name/wl/wl-mirror/package.nix +++ b/pkgs/by-name/wl/wl-mirror/package.nix @@ -31,13 +31,13 @@ in stdenv.mkDerivation rec { pname = "wl-mirror"; - version = "0.18.2"; + version = "0.18.3"; src = fetchFromGitHub { owner = "Ferdi265"; repo = "wl-mirror"; rev = "v${version}"; - hash = "sha256-1R8jMDPprTeLt98iALC5l1mdW1U2yKGVtncXGatM8Vg="; + hash = "sha256-xj+CZPHeMAisOMB8mYSIc2jAa5iQD5pM+Stccq4gnak="; }; strictDeps = true; diff --git a/pkgs/by-name/xm/xmedcon/package.nix b/pkgs/by-name/xm/xmedcon/package.nix index 18cc7aa471fe..dc0de8a82d75 100644 --- a/pkgs/by-name/xm/xmedcon/package.nix +++ b/pkgs/by-name/xm/xmedcon/package.nix @@ -12,11 +12,11 @@ stdenv.mkDerivation rec { pname = "xmedcon"; - version = "0.25.2"; + version = "0.25.3"; src = fetchurl { url = "mirror://sourceforge/${pname}/${pname}-${version}.tar.bz2"; - sha256 = "sha256-vg14IRLukAOBtAE32AIyXTRzLzwKCGsvIFYRas/hyNs="; + sha256 = "sha256-9VrTQP614tIrmZRm9bSpmlXqCbMPzqvhv222eFiKS4M="; }; buildInputs = [ diff --git a/pkgs/by-name/xr/xrdp/package.nix b/pkgs/by-name/xr/xrdp/package.nix index 5f00ddaab799..7c89b824bce8 100644 --- a/pkgs/by-name/xr/xrdp/package.nix +++ b/pkgs/by-name/xr/xrdp/package.nix @@ -74,7 +74,7 @@ let xrdp = stdenv.mkDerivation rec { pname = "xrdp"; - version = "0.10.3"; + version = "0.10.4.1"; src = applyPatches { inherit version; @@ -85,7 +85,7 @@ let repo = "xrdp"; rev = "v${version}"; fetchSubmodules = true; - hash = "sha256-6QSz0a0ed1UxfYYibehPgGUzU/xf1HmqEvVE4xU5hRg="; + hash = "sha256-ula1B9/eriJ+0r6d9r2LAzh7J3s6/uvAiTKeRzLuVL0="; }; }; diff --git a/pkgs/by-name/ya/yaru-theme/package.nix b/pkgs/by-name/ya/yaru-theme/package.nix index de75d25a8dd2..aa97c2eda20d 100644 --- a/pkgs/by-name/ya/yaru-theme/package.nix +++ b/pkgs/by-name/ya/yaru-theme/package.nix @@ -17,13 +17,13 @@ stdenv.mkDerivation rec { pname = "yaru"; - version = "25.04.2"; + version = "25.10.1"; src = fetchFromGitHub { owner = "ubuntu"; repo = "yaru"; rev = version; - hash = "sha256-+Jis5ODElztIp/QBuKqVyg0cTtPKr246WHrlGSBKgm0="; + hash = "sha256-+ZJxzJkWl/yIX1MtpJ72O2phRh4FZY8CTDPAB15jCSU="; }; nativeBuildInputs = [ diff --git a/pkgs/by-name/yo/yourkit-java/package.nix b/pkgs/by-name/yo/yourkit-java/package.nix index a5ee65f0694c..64a40c0e80a1 100644 --- a/pkgs/by-name/yo/yourkit-java/package.nix +++ b/pkgs/by-name/yo/yourkit-java/package.nix @@ -10,7 +10,7 @@ let vPath = v: lib.elemAt (lib.splitString "-" v) 0; - version = "2025.3-b151"; + version = "2025.3-b153"; arches = { aarch64-linux = "arm64"; @@ -20,8 +20,8 @@ let arch = arches.${stdenvNoCC.targetPlatform.system} or (throw "Unsupported system"); hashes = { - arm64 = "sha256-pQ/AC50Ck7jVw5FTWgj8arDej0b0YXlEZ/vT43GWGoM="; - x64 = "sha256-mgiry7nGe7Ct1sXsztits2X2XJBj4kUBzjVRQQMLCyE="; + arm64 = "sha256-DKpNFv5nuxdIUjgM/+LyVweV0B6SfCojcWfsAkoMH6w="; + x64 = "sha256-9CSCJaISxdc7lwZUxyO8gmkxuuvKMb3I9G0ftYfYY7c="; }; desktopItem = makeDesktopItem { diff --git a/pkgs/by-name/za/zabbix-agent2-plugin-postgresql/package.nix b/pkgs/by-name/za/zabbix-agent2-plugin-postgresql/package.nix index 739d0cfbbc9c..3d35f3b4cb01 100644 --- a/pkgs/by-name/za/zabbix-agent2-plugin-postgresql/package.nix +++ b/pkgs/by-name/za/zabbix-agent2-plugin-postgresql/package.nix @@ -6,11 +6,11 @@ buildGoModule rec { pname = "zabbix-agent2-plugin-postgresql"; - version = "7.2.7"; + version = "7.4.1"; src = fetchurl { url = "https://cdn.zabbix.com/zabbix-agent2-plugins/sources/postgresql/zabbix-agent2-plugin-postgresql-${version}.tar.gz"; - hash = "sha256-gdrNsdjxo1bbGKI3gu+cqOX4/InvClpjOSzwmeWi9cw="; + hash = "sha256-8Rlg1A6l6I89YoRHMo3s9MRip0LXe2hqiYBliGqEScg="; }; vendorHash = null; diff --git a/pkgs/by-name/ze/zed-editor/package.nix b/pkgs/by-name/ze/zed-editor/package.nix index cffcf0a0dac3..86303753e481 100644 --- a/pkgs/by-name/ze/zed-editor/package.nix +++ b/pkgs/by-name/ze/zed-editor/package.nix @@ -99,7 +99,7 @@ let in rustPlatform.buildRustPackage (finalAttrs: { pname = "zed-editor"; - version = "0.198.6"; + version = "0.199.6"; outputs = [ "out" @@ -112,7 +112,7 @@ rustPlatform.buildRustPackage (finalAttrs: { owner = "zed-industries"; repo = "zed"; tag = "v${finalAttrs.version}"; - hash = "sha256-XsfY6K8qsL2mi0+Z3tJp6LVDm7D+X3dPnaqgeT1iIHs="; + hash = "sha256-3H+NmYI0ZV+T2Jqgb6sxVDoyhn2lpiklhMmM25+RuJA="; }; patches = [ @@ -138,7 +138,7 @@ rustPlatform.buildRustPackage (finalAttrs: { --replace-fail "inner.redirect(policy)" "inner.redirect_policy(policy)" ''; - cargoHash = "sha256-XIED6sQ7a5z2p1CZQ4A9TSTTNI5qpp9WSzVmiYdYG2o="; + cargoHash = "sha256-9UMLe8n8LWtE0vc2zIuzN6E0vaszQWbDcnJUv7CEUIk="; nativeBuildInputs = [ cmake diff --git a/pkgs/by-name/zx/zxcvbn-c/package.nix b/pkgs/by-name/zx/zxcvbn-c/package.nix index 3fc9d2ae5090..d08f120cacbd 100644 --- a/pkgs/by-name/zx/zxcvbn-c/package.nix +++ b/pkgs/by-name/zx/zxcvbn-c/package.nix @@ -5,13 +5,13 @@ }: stdenv.mkDerivation rec { pname = "zxcvbn-c"; - version = "2.5"; + version = "2.6"; src = fetchFromGitHub { owner = "tsyrogit"; repo = "zxcvbn-c"; rev = "v${version}"; - sha256 = "sha256-RKqbv0iGkjS7Y7KikqglZ+AK1oiw4G1mB2Zg87tOlbI="; + sha256 = "sha256-/ATlpcx0XTtmzs6REA2YsnINKWz5xPNaetfhfyMuFP0="; }; installPhase = '' diff --git a/pkgs/development/compilers/dotnet/packages.nix b/pkgs/development/compilers/dotnet/packages.nix index 1c57d1a78640..10f06dcec0e5 100644 --- a/pkgs/development/compilers/dotnet/packages.nix +++ b/pkgs/development/compilers/dotnet/packages.nix @@ -54,7 +54,7 @@ let mkdir -p "$out" - pushd "$src"/Private.SourceBuilt.Artifacts.*.${targetRid} + pushd "$src"/lib/Private.SourceBuilt.Artifacts.*.${targetRid} pushd ${pname}.${version}.nupkg xmlstarlet \ @@ -136,13 +136,13 @@ let runHook preInstall mkdir -p "$out"/share - cp -r "$src"/dotnet-sdk-${version}-${targetRid} "$out"/share/dotnet + cp -r "$src"/lib/dotnet-sdk-${version}-${targetRid} "$out"/share/dotnet chmod +w "$out"/share/dotnet mkdir "$out"/bin ln -s "$out"/share/dotnet/dotnet "$out"/bin/dotnet mkdir -p "$artifacts" - cp -r "$src"/Private.SourceBuilt.Artifacts.*.${targetRid}/* "$artifacts"/ + cp -r "$src"/lib/Private.SourceBuilt.Artifacts.*.${targetRid}/* "$artifacts"/ chmod +w -R "$artifacts" local package @@ -193,7 +193,7 @@ let runHook preInstall mkdir -p "$out"/share - cp -r "$src/dotnet-runtime-${version}-${targetRid}" "$out"/share/dotnet + cp -r "$src/lib/dotnet-runtime-${version}-${targetRid}" "$out"/share/dotnet chmod +w "$out"/share/dotnet mkdir "$out"/bin ln -s "$out"/share/dotnet/dotnet "$out"/bin/dotnet @@ -221,12 +221,12 @@ let runHook preInstall mkdir -p "$out"/share - cp -r "$src/dotnet-runtime-${runtime.version}-${targetRid}" "$out"/share/dotnet + cp -r "$src/lib/dotnet-runtime-${runtime.version}-${targetRid}" "$out"/share/dotnet chmod +w "$out"/share/dotnet/shared mkdir "$out"/bin ln -s "$out"/share/dotnet/dotnet "$out"/bin/dotnet - cp -Tr "$src/aspnetcore-runtime-${version}-${targetRid}"/shared/Microsoft.AspNetCore.App "$out"/share/dotnet/shared/Microsoft.AspNetCore.App + cp -Tr "$src/lib/aspnetcore-runtime-${version}-${targetRid}"/shared/Microsoft.AspNetCore.App "$out"/share/dotnet/shared/Microsoft.AspNetCore.App chmod +w "$out"/share/dotnet/shared runHook postInstall diff --git a/pkgs/development/compilers/dotnet/vmr.nix b/pkgs/development/compilers/dotnet/vmr.nix index abb1bada08d1..d4715d5fa0dc 100644 --- a/pkgs/development/compilers/dotnet/vmr.nix +++ b/pkgs/development/compilers/dotnet/vmr.nix @@ -188,14 +188,6 @@ stdenv.mkDerivation rec { substituteInPlace \ src/runtime/src/native/libs/CMakeLists.txt \ --replace-fail 'add_compile_options(-Weverything)' 'add_compile_options(-Wall)' - - # strip native symbols in runtime - # see: https://github.com/dotnet/source-build/issues/2543 - xmlstarlet ed \ - --inplace \ - -s //Project -t elem -n PropertyGroup \ - -s \$prev -t elem -n KeepNativeSymbols -v false \ - src/runtime/Directory.Build.props '' + lib.optionalString (lib.versionAtLeast version "9") ( '' @@ -393,6 +385,10 @@ stdenv.mkDerivation rec { # bash: warning: setlocale: LC_ALL: cannot change locale (en_US.UTF-8) LOCALE_ARCHIVE = lib.optionalString isLinux "${glibcLocales}/lib/locale/locale-archive"; + # clang: error: argument unused during compilation: '-Wa,--compress-debug-sections' [-Werror,-Wunused-command-line-argument] + # caused by separateDebugInfo + NIX_CFLAGS_COMPILE = "-Wno-unused-command-line-argument"; + buildFlags = [ "--with-packages" bootstrapSdk.artifacts @@ -447,11 +443,11 @@ stdenv.mkDerivation rec { '' runHook preInstall - mkdir "$out" + mkdir -p "$out"/lib pushd "artifacts/${assets}/Release" find . -name \*.tar.gz | while read archive; do - target=$out/$(basename "$archive" .tar.gz) + target=$out/lib/$(basename "$archive" .tar.gz) # dotnet 9 currently has two copies of the sdk tarball [[ ! -e "$target" ]] || continue mkdir "$target" @@ -460,7 +456,7 @@ stdenv.mkDerivation rec { popd local -r unpacked="$PWD/.unpacked" - for nupkg in $out/Private.SourceBuilt.Artifacts.*.${targetRid}/{,SourceBuildReferencePackages/}*.nupkg; do + for nupkg in $out/lib/Private.SourceBuilt.Artifacts.*.${targetRid}/{,SourceBuildReferencePackages/}*.nupkg; do rm -rf "$unpacked" unzip ${unzipFlags} "$unpacked" "$nupkg" chmod -R +rw "$unpacked" @@ -479,9 +475,6 @@ stdenv.mkDerivation rec { echo ${sigtool} > "$out"/nix-support/manual-sdk-deps ''; - # dotnet cli is in the root, so we need to strip from there - # TODO: should we install in $out/share/dotnet? - stripDebugList = [ "." ]; # stripping dlls results in: # Failed to load System.Private.CoreLib.dll (error code 0x8007000B) # stripped crossgen2 results in: @@ -491,6 +484,8 @@ stdenv.mkDerivation rec { stripExclude=(\*.dll crossgen2) ''; + separateDebugInfo = true; + passthru = { inherit releaseManifest buildRid targetRid; icu = _icu; diff --git a/pkgs/development/compilers/flutter/build-support/build-flutter-application.nix b/pkgs/development/compilers/flutter/build-support/build-flutter-application.nix index 69c776102d7d..3b8c1941dfc6 100644 --- a/pkgs/development/compilers/flutter/build-support/build-flutter-application.nix +++ b/pkgs/development/compilers/flutter/build-support/build-flutter-application.nix @@ -39,7 +39,7 @@ let ++ flutterFlags; builderArgs = - rec { + let universal = args // { inherit flutterMode flutterFlags flutterBuildFlags; @@ -125,6 +125,9 @@ let fi ''; }; + in + { + inherit universal; linux = universal // { outputs = universal.outputs or [ ] ++ [ "debug" ]; diff --git a/pkgs/development/compilers/flutter/default.nix b/pkgs/development/compilers/flutter/default.nix index 192b6e61fd06..32e7581df049 100644 --- a/pkgs/development/compilers/flutter/default.nix +++ b/pkgs/development/compilers/flutter/default.nix @@ -96,7 +96,7 @@ let in (mkCustomFlutter args).overrideAttrs ( prev: next: { - passthru = next.passthru // rec { + passthru = next.passthru // { inherit wrapFlutter mkCustomFlutter mkFlutter; buildFlutterApplication = callPackage ./build-support/build-flutter-application.nix { flutter = wrapFlutter (mkCustomFlutter args); diff --git a/pkgs/development/compilers/flutter/engine/package.nix b/pkgs/development/compilers/flutter/engine/package.nix index 76300ee2b5ed..343a9957ea61 100644 --- a/pkgs/development/compilers/flutter/engine/package.nix +++ b/pkgs/development/compilers/flutter/engine/package.nix @@ -347,21 +347,19 @@ stdenv.mkDerivation (finalAttrs: { dart = callPackage ./dart.nix { engine = finalAttrs.finalPackage; }; }; - meta = - with lib; - { - # Very broken on Darwin - broken = stdenv.hostPlatform.isDarwin; - description = "Flutter engine"; - homepage = "https://flutter.dev"; - maintainers = with maintainers; [ RossComputerGuy ]; - license = licenses.bsd3; - platforms = [ - "x86_64-linux" - "aarch64-linux" - "x86_64-darwin" - "aarch64-darwin" - ]; - } - // lib.optionalAttrs (lib.versionOlder flutterVersion "3.22") { hydraPlatforms = [ ]; }; + meta = { + # Very broken on Darwin + broken = stdenv.hostPlatform.isDarwin; + description = "Flutter engine"; + homepage = "https://flutter.dev"; + maintainers = with lib.maintainers; [ RossComputerGuy ]; + license = lib.licenses.bsd3; + platforms = [ + "x86_64-linux" + "aarch64-linux" + "x86_64-darwin" + "aarch64-darwin" + ]; + } + // lib.optionalAttrs (lib.versionOlder flutterVersion "3.22") { hydraPlatforms = [ ]; }; }) diff --git a/pkgs/development/compilers/flutter/flutter-tools.nix b/pkgs/development/compilers/flutter/flutter-tools.nix index 4eb71e2afabe..00db44021a8c 100644 --- a/pkgs/development/compilers/flutter/flutter-tools.nix +++ b/pkgs/development/compilers/flutter/flutter-tools.nix @@ -27,14 +27,16 @@ let content_hash = "1111111111111111111111111111111111111111"; }; }; + + dartEntryPoints."flutter_tools.snapshot" = "bin/flutter_tools.dart"; in -buildDartApplication.override { inherit dart; } rec { +buildDartApplication.override { inherit dart; } { pname = "flutter-tools"; - inherit version; + inherit version dartEntryPoints; dartOutputType = "jit-snapshot"; src = flutterSrc; - sourceRoot = "${src.name}/packages/flutter_tools"; + sourceRoot = "${flutterSrc.name}/packages/flutter_tools"; postUnpack = ''chmod -R u+w "$NIX_BUILD_TOP/source"''; inherit patches; @@ -69,7 +71,6 @@ buildDartApplication.override { inherit dart; } rec { ln -s '${dart}' "$FLUTTER_ROOT/bin/cache/dart-sdk" ''; - dartEntryPoints."flutter_tools.snapshot" = "bin/flutter_tools.dart"; dartCompileFlags = [ "--define=NIX_FLUTTER_HOST_PLATFORM=${systemPlatform}" ]; # The Dart wrapper launchers are useless for the Flutter tool - it is designed diff --git a/pkgs/development/compilers/flutter/flutter.nix b/pkgs/development/compilers/flutter/flutter.nix index e1aed72276e1..fb7b3fa4a9cc 100644 --- a/pkgs/development/compilers/flutter/flutter.nix +++ b/pkgs/development/compilers/flutter/flutter.nix @@ -189,14 +189,14 @@ let inherit engine; }; - meta = with lib; { - description = "Flutter is Google's SDK for building mobile, web and desktop with Dart"; + meta = { + description = "Makes it easy and fast to build beautiful apps for mobile and beyond"; longDescription = '' - Flutter is Google’s UI toolkit for building beautiful, - natively compiled applications for mobile, web, and desktop from a single codebase. + Flutter is Google's SDK for crafting beautiful, + fast user experiences for mobile, web, and desktop from a single codebase. ''; homepage = "https://flutter.dev"; - license = licenses.bsd3; + license = lib.licenses.bsd3; platforms = [ "x86_64-linux" "aarch64-linux" @@ -204,10 +204,10 @@ let "aarch64-darwin" ]; mainProgram = "flutter"; - maintainers = with maintainers; [ + maintainers = with lib.maintainers; [ ericdallo ]; - teams = [ teams.flutter ]; + teams = [ lib.teams.flutter ]; }; }; in diff --git a/pkgs/development/compilers/graalvm/default.nix b/pkgs/development/compilers/graalvm/default.nix index 543ffceee8dc..409553f9b2e4 100644 --- a/pkgs/development/compilers/graalvm/default.nix +++ b/pkgs/development/compilers/graalvm/default.nix @@ -23,6 +23,11 @@ lib.makeScope pkgs.newScope ( truffleruby = self.callPackage ./community-edition/truffleruby { }; + graalvm-oracle_25-ea = + (self.callPackage ./graalvm-oracle { version = "25-ea-32"; }).overrideAttrs + (prev: { + autoPatchelfIgnoreMissingDeps = [ "libonnxruntime.so.1" ]; + }); graalvm-oracle_23 = self.callPackage ./graalvm-oracle { version = "23"; }; graalvm-oracle_17 = self.callPackage ./graalvm-oracle { version = "17"; }; graalvm-oracle = self.graalvm-oracle_23; diff --git a/pkgs/development/compilers/graalvm/graalvm-oracle/hashes.nix b/pkgs/development/compilers/graalvm/graalvm-oracle/hashes.nix index ea5de7396f10..b593142b066b 100644 --- a/pkgs/development/compilers/graalvm/graalvm-oracle/hashes.nix +++ b/pkgs/development/compilers/graalvm/graalvm-oracle/hashes.nix @@ -4,6 +4,24 @@ # $ rg -No "(https://.+)\"" -r '$1' pkgs/development/compilers/graalvm/graalvm-oracle/hashes.nix | \ # parallel -k 'echo {}; nix --extra-experimental-features nix-command hash convert --hash-algo sha256 --to sri $(curl -s {}.sha256)' { + "25-ea-32" = { + "aarch64-linux" = { + hash = "sha256-JO/6VHxhd8Vetpv/iLKxNCL8wHa2VAfSIs0fiWdB4QA="; + url = "https://github.com/graalvm/oracle-graalvm-ea-builds/releases/download/jdk-25.0.0-ea.32/graalvm-jdk-25.0.0-ea.32_linux-aarch64_bin.tar.gz"; + }; + "x86_64-linux" = { + hash = "sha256-IevvXyhRnY/ujd3MriWULNcTYXOgt9h8bHhlJzkumjE="; + url = "https://github.com/graalvm/oracle-graalvm-ea-builds/releases/download/jdk-25.0.0-ea.32/graalvm-jdk-25.0.0-ea.32_linux-x64_bin.tar.gz"; + }; + "x86_64-darwin" = { + hash = "sha256-YhMGtXud6mer7UbSd6Eyl2d1rPKzEb6zF/NFtWLIG3E="; + url = "https://github.com/graalvm/oracle-graalvm-ea-builds/releases/download/jdk-25.0.0-ea.32/graalvm-jdk-25.0.0-ea.32_macos-x64_bin.tar.gz"; + }; + "aarch64-darwin" = { + hash = "sha256-alNurm5ieedOi636Mnyq8BqFAyOV0dBaeTtDk4c4cPQ="; + url = "https://github.com/graalvm/oracle-graalvm-ea-builds/releases/download/jdk-25.0.0-ea.32/graalvm-jdk-25.0.0-ea.32_macos-aarch64_bin.tar.gz"; + }; + }; "23" = { "aarch64-linux" = { hash = "sha256-VlB664/l7NWFQrPE3vEJvCXkEzKEJ0ck/HNU5pGGTwU="; diff --git a/pkgs/development/compilers/openjdk/24/source.json b/pkgs/development/compilers/openjdk/24/source.json index 83e95cd07610..ef9e52624b4c 100644 --- a/pkgs/development/compilers/openjdk/24/source.json +++ b/pkgs/development/compilers/openjdk/24/source.json @@ -1,6 +1,6 @@ { - "hash": "sha256-vXZNi6whn0GpL02DBaGAp40vYOP6BkJrLOhhL9df2kA=", + "hash": "sha256-YgkTSh7U/tJxiJIi8fxCkVgcogMQbcN4PgjmlcHcOBE=", "owner": "openjdk", "repo": "jdk24u", - "rev": "refs/tags/jdk-24.0.1+9" + "rev": "refs/tags/jdk-24.0.2+12" } diff --git a/pkgs/development/compilers/openjdk/8/source.json b/pkgs/development/compilers/openjdk/8/source.json index 70986db98119..ba66b2d05b20 100644 --- a/pkgs/development/compilers/openjdk/8/source.json +++ b/pkgs/development/compilers/openjdk/8/source.json @@ -1,6 +1,6 @@ { - "hash": "sha256-y+YFPDSkPopIi0++rTwf2fsehzBdW1eR3tEWGGV5Yqk=", + "hash": "sha256-CQZKhDojo+a4vZsIzRM/KoUfR17LedQYBWCRJxDFJUM=", "owner": "openjdk", "repo": "jdk8u", - "rev": "refs/tags/jdk8u442-b06" + "rev": "refs/tags/jdk8u462-b08" } diff --git a/pkgs/development/libraries/libcef/default.nix b/pkgs/development/libraries/libcef/default.nix index 59d9b0e73d3b..5fcd3a1ebd63 100644 --- a/pkgs/development/libraries/libcef/default.nix +++ b/pkgs/development/libraries/libcef/default.nix @@ -92,14 +92,14 @@ let in stdenv.mkDerivation (finalAttrs: { pname = "libcef"; - version = "138.0.33"; - gitRevision = "276ed6d"; - chromiumVersion = "138.0.7204.169"; + version = "139.0.17"; + gitRevision = "6c347eb"; + chromiumVersion = "139.0.7258.31"; buildType = "Release"; srcHash = selectSystem { - aarch64-linux = "sha256-CWO0jwDstuLfyNLGSR/DDxB6LYl8IySn04FxQ9MI6qQ="; - x86_64-linux = "sha256-M1lpsDCGqm65bR6tTglkW6ENliEmLDk/Ko+NW7UTtoc="; + aarch64-linux = "sha256-wTBPGunl1j4PlB5K6jzGtRusLIgOLlKtcQxaZmVr1zc="; + x86_64-linux = "sha256-kRMO8DP4El1qytDsAZBdHvR9AAHXce90nPdyfJailBg="; }; src = fetchurl { diff --git a/pkgs/development/ocaml-modules/opam-core/default.nix b/pkgs/development/ocaml-modules/opam-core/default.nix index 0cb568cd2dfc..dc907ac3b435 100644 --- a/pkgs/development/ocaml-modules/opam-core/default.nix +++ b/pkgs/development/ocaml-modules/opam-core/default.nix @@ -8,6 +8,7 @@ sha, swhid_core, uutf, + patch, }: buildDunePackage { @@ -22,6 +23,7 @@ buildDunePackage { re sha swhid_core + patch ]; # get rid of check for curl at configure time diff --git a/pkgs/development/ocaml-modules/opam-repository/default.nix b/pkgs/development/ocaml-modules/opam-repository/default.nix index 5cde7b3ce055..529b7c184939 100644 --- a/pkgs/development/ocaml-modules/opam-repository/default.nix +++ b/pkgs/development/ocaml-modules/opam-repository/default.nix @@ -3,6 +3,7 @@ buildDunePackage, opam-format, curl, + patch, }: buildDunePackage { @@ -10,7 +11,10 @@ buildDunePackage { inherit (opam-format) src version; - propagatedBuildInputs = [ opam-format ]; + propagatedBuildInputs = [ + opam-format + patch + ]; configureFlags = [ "--disable-checks" ]; diff --git a/pkgs/development/ocaml-modules/patch/default.nix b/pkgs/development/ocaml-modules/patch/default.nix index 2615b3d3e4ac..bb64547e9cc3 100644 --- a/pkgs/development/ocaml-modules/patch/default.nix +++ b/pkgs/development/ocaml-modules/patch/default.nix @@ -9,15 +9,15 @@ buildDunePackage rec { pname = "patch"; - version = "2.0.0"; + version = "3.0.0"; - minimalOCamlVersion = "4.03"; + minimalOCamlVersion = "4.08"; src = fetchFromGitHub { owner = "hannesm"; repo = "patch"; tag = "v${version}"; - hash = "sha256-xqcUZaKlbyXF2//MbCom7/pGA2ej6KHYI3rizXwoqTY="; + hash = "sha256-WIleUxfGp8cvQHYAyRRI6S/MSP4u0BbEyAqlRxCb/To="; }; checkInputs = [ diff --git a/pkgs/development/ocaml-modules/raylib/default.nix b/pkgs/development/ocaml-modules/raylib/default.nix index e6fbe711e7da..17708d871d2c 100644 --- a/pkgs/development/ocaml-modules/raylib/default.nix +++ b/pkgs/development/ocaml-modules/raylib/default.nix @@ -1,6 +1,7 @@ { lib, fetchurl, + fetchpatch, buildDunePackage, dune-configurator, ctypes, @@ -23,6 +24,18 @@ buildDunePackage rec { hash = "sha256-/SeKgQOrhsAgMNk6ODAZlopL0mL0lVfCTx1ugmV1P/s="; }; + patches = [ + (fetchpatch { + name = "fix-build-with-patch-3.0.0.patch"; + url = "https://github.com/tjammer/raylib-ocaml/commit/40e6fef44e3c39d4526806c4b830da77c4fe4bb8.patch"; + excludes = [ + "dune-project" + "raygui.opam" + ]; + hash = "sha256-MEZkkBgjL2iT6Av/s0tJCrW7+oyp9QD6sUbXEusCAWI="; + }) + ]; + buildInputs = [ dune-configurator patch diff --git a/pkgs/development/ocaml-modules/raylib/raygui.nix b/pkgs/development/ocaml-modules/raylib/raygui.nix index f4971b1b1e37..8f10576eae89 100644 --- a/pkgs/development/ocaml-modules/raylib/raygui.nix +++ b/pkgs/development/ocaml-modules/raylib/raygui.nix @@ -13,6 +13,8 @@ buildDunePackage rec { hash = "sha256-PQcVTAQKeTPkOOHk5w3O3Tz0n7jLvkIo3Urvrk66eMs="; }; + inherit (raylib) patches; + propagatedBuildInputs = [ raylib ]; diff --git a/pkgs/development/python-modules/anndata/default.nix b/pkgs/development/python-modules/anndata/default.nix index de98a116f529..294ca6b8aeef 100644 --- a/pkgs/development/python-modules/anndata/default.nix +++ b/pkgs/development/python-modules/anndata/default.nix @@ -12,6 +12,7 @@ hatchling, joblib, lib, + legacy-api-wrap, natsort, numba, numpy, @@ -32,14 +33,14 @@ buildPythonPackage rec { pname = "anndata"; - version = "0.12.1"; + version = "0.12.2"; pyproject = true; src = fetchFromGitHub { owner = "scverse"; repo = "anndata"; tag = version; - hash = "sha256-vxyRJ77PIkRIyl4aTQggXSQVoMKLQe3mCA5H3W/wmN8="; + hash = "sha256-uGkeSlYcphRnIFfe9UcLvnupKeMzAIm5wT8fp3gmPKw="; }; build-system = [ @@ -50,6 +51,7 @@ buildPythonPackage rec { dependencies = [ array-api-compat h5py + legacy-api-wrap natsort numpy pandas @@ -92,18 +94,24 @@ buildPythonPackage rec { ]; disabledTests = [ + # requires data from a previous test execution: + "test_no_diff" + # doctests that require scanpy, creating a circular dependency chain. These # do not work in disabledTestPaths for some reason. "anndata._core.anndata.AnnData.concatenate" "anndata._core.anndata.AnnData.obs_names_make_unique" "anndata._core.anndata.AnnData.var_names_make_unique" + "anndata._core.extensions.register_anndata_namespac" "anndata._core.merge.concat" "anndata._core.merge.gen_reindexer" "anndata._core.sparse_dataset.sparse_dataset" "anndata._io.specs.registry.read_elem_as_dask" + "anndata._io.specs.registry.read_elem_lazy" "anndata._io.utils.report_read_key_on_error" "anndata._io.utils.report_write_key_on_error" "anndata._warnings.ImplicitModificationWarning" + "anndata.experimental.backed._io.read_lazy" "anndata.experimental.merge.concat_on_disk" "anndata.experimental.multi_files._anncollection.AnnCollection" "anndata.utils.make_index_unique" @@ -148,7 +156,7 @@ buildPythonPackage rec { pythonImportsCheck = [ "anndata" ]; meta = { - changelog = "https://github.com/scverse/anndata/blob/main/docs/release-notes/${src.tag}.md"; + changelog = "https://github.com/scverse/anndata/blob/main/docs/release-notes/${version}.md"; description = "Python package for handling annotated data matrices in memory and on disk"; homepage = "https://anndata.readthedocs.io/"; license = lib.licenses.bsd3; diff --git a/pkgs/development/python-modules/basedmypy/default.nix b/pkgs/development/python-modules/basedmypy/default.nix index 288b5852f8bc..0ffba2cfe3a5 100644 --- a/pkgs/development/python-modules/basedmypy/default.nix +++ b/pkgs/development/python-modules/basedmypy/default.nix @@ -31,7 +31,7 @@ buildPythonPackage rec { pname = "basedmypy"; - version = "2.10.0"; + version = "2.10.1"; pyproject = true; disabled = pythonOlder "3.8"; @@ -40,7 +40,7 @@ buildPythonPackage rec { owner = "KotlinIsland"; repo = "basedmypy"; tag = "v${version}"; - hash = "sha256-/43wVQoW/BbRD8j8Oypq5yz79ZTyAkLD4T8/aUg/QT8="; + hash = "sha256-IzRKOReSgio5S5PG8iD9VQF9R1GEqBAIDeeCtq+ZVXg="; }; postPatch = '' diff --git a/pkgs/development/python-modules/dataclass-csv/default.nix b/pkgs/development/python-modules/dataclass-csv/default.nix new file mode 100644 index 000000000000..d229b2d017d4 --- /dev/null +++ b/pkgs/development/python-modules/dataclass-csv/default.nix @@ -0,0 +1,46 @@ +{ + lib, + buildPythonPackage, + fetchFromGitHub, + pytestCheckHook, + distutils, + setuptools, +}: +buildPythonPackage rec { + pname = "dataclass-csv"; + version = "1.4.0"; + pyproject = true; + + src = fetchFromGitHub { + owner = "dfurtado"; + repo = "dataclass-csv"; + tag = version; + hash = "sha256-XDvQrKUtg5ptkF36xGlykhc395pmjBP/19m0EPDyaOM="; + }; + + patches = [ + ./deprecated_dependency.patch + ]; + + build-system = [ + setuptools + ]; + + dependencies = [ + distutils + ]; + + nativeCheckInputs = [ + pytestCheckHook + ]; + + pythonImportsCheck = [ "dataclass_csv" ]; + + meta = { + description = "Map CSV data into dataclasses"; + homepage = "https://github.com/dfurtado/dataclass-csv"; + changelog = "https://github.com/dfurtado/dataclass-csv/releases/tag/${version}"; + license = lib.licenses.bsd3; + maintainers = with lib.maintainers; [ theobori ]; + }; +} diff --git a/pkgs/development/python-modules/dataclass-csv/deprecated_dependency.patch b/pkgs/development/python-modules/dataclass-csv/deprecated_dependency.patch new file mode 100644 index 000000000000..32e518788892 --- /dev/null +++ b/pkgs/development/python-modules/dataclass-csv/deprecated_dependency.patch @@ -0,0 +1,15 @@ +diff --git a/setup.py b/setup.py +index b998ace..4fa4b90 100644 +--- a/setup.py ++++ b/setup.py +@@ -13,9 +13,7 @@ with open("HISTORY.md") as history_file: + + requirements = [] + +-setup_requirements = [ +- "pytest-runner", +-] ++setup_requirements = [] + + test_requirements = [ + "pytest", diff --git a/pkgs/development/python-modules/finetuning-scheduler/default.nix b/pkgs/development/python-modules/finetuning-scheduler/default.nix index 344e3c735659..5bef00a10bb1 100644 --- a/pkgs/development/python-modules/finetuning-scheduler/default.nix +++ b/pkgs/development/python-modules/finetuning-scheduler/default.nix @@ -58,23 +58,28 @@ buildPythonPackage rec { nativeCheckInputs = [ pytestCheckHook ]; enabledTestPaths = [ "tests" ]; - disabledTests = - lib.optionals (pythonOlder "3.12") [ - # torch._dynamo.exc.BackendCompilerFailed: backend='inductor' raised: - # LoweringException: ImportError: cannot import name 'triton_key' from 'triton.compiler.compiler' - "test_fts_dynamo_enforce_p0" - "test_fts_dynamo_resume" - "test_fts_dynamo_intrafit" - ] - ++ lib.optionals (pythonAtLeast "3.13") [ - # RuntimeError: Dynamo is not supported on Python 3.13+ - "test_fts_dynamo_enforce_p0" - "test_fts_dynamo_resume" - ] - ++ lib.optionals (stdenv.hostPlatform.isAarch64 && stdenv.hostPlatform.isLinux) [ - # slightly exceeds numerical tolerance on aarch64-linux: - "test_fts_frozen_bn_track_running_stats" - ]; + disabledTests = [ + # Fails since pytorch-lightning was bumped to 2.5.3 + # IndexError: list index out of range + # https://github.com/speediedan/finetuning-scheduler/issues/19 + "test_fts_misconfiguration" + ] + ++ lib.optionals (pythonOlder "3.12") [ + # torch._dynamo.exc.BackendCompilerFailed: backend='inductor' raised: + # LoweringException: ImportError: cannot import name 'triton_key' from 'triton.compiler.compiler' + "test_fts_dynamo_enforce_p0" + "test_fts_dynamo_resume" + "test_fts_dynamo_intrafit" + ] + ++ lib.optionals (pythonAtLeast "3.13") [ + # RuntimeError: Dynamo is not supported on Python 3.13+ + "test_fts_dynamo_enforce_p0" + "test_fts_dynamo_resume" + ] + ++ lib.optionals (stdenv.hostPlatform.isAarch64 && stdenv.hostPlatform.isLinux) [ + # slightly exceeds numerical tolerance on aarch64-linux: + "test_fts_frozen_bn_track_running_stats" + ]; pythonImportsCheck = [ "finetuning_scheduler" ]; diff --git a/pkgs/development/python-modules/huggingface-hub/default.nix b/pkgs/development/python-modules/huggingface-hub/default.nix index ff225ae59b73..d0777a4170c2 100644 --- a/pkgs/development/python-modules/huggingface-hub/default.nix +++ b/pkgs/development/python-modules/huggingface-hub/default.nix @@ -40,14 +40,14 @@ buildPythonPackage rec { pname = "huggingface-hub"; - version = "0.34.3"; + version = "0.34.4"; pyproject = true; src = fetchFromGitHub { owner = "huggingface"; repo = "huggingface_hub"; tag = "v${version}"; - hash = "sha256-rK9Y+hpjk7AOcTPNUcbyqbiEmH6xVG0fy+pUQop422M="; + hash = "sha256-2R4G/2VBj/URVdVn/1dPBDdFCdXZymPc2zdbzddyYwU="; }; build-system = [ setuptools ]; diff --git a/pkgs/development/python-modules/influxdb3-python/default.nix b/pkgs/development/python-modules/influxdb3-python/default.nix index da19130dbae4..a75233d1b2d8 100644 --- a/pkgs/development/python-modules/influxdb3-python/default.nix +++ b/pkgs/development/python-modules/influxdb3-python/default.nix @@ -15,7 +15,7 @@ buildPythonPackage rec { pname = "influxdb3-python"; - version = "0.14.0"; + version = "0.15.0"; pyproject = true; disabled = pythonOlder "3.8"; @@ -24,7 +24,7 @@ buildPythonPackage rec { owner = "InfluxCommunity"; repo = "influxdb3-python"; tag = "v${version}"; - hash = "sha256-gCLH1MtLYggB3t/+B062w31go5mGf0GELZWhO0DnZy8="; + hash = "sha256-BbU/CeTlJHIoZBj+NCl9Cdag/6tTP3y6FFJMPiShRUA="; }; postPatch = '' diff --git a/pkgs/development/python-modules/keras/default.nix b/pkgs/development/python-modules/keras/default.nix index 67597c1d5ca8..388e29a6b51c 100644 --- a/pkgs/development/python-modules/keras/default.nix +++ b/pkgs/development/python-modules/keras/default.nix @@ -36,14 +36,14 @@ buildPythonPackage rec { pname = "keras"; - version = "3.11.1"; + version = "3.11.2"; pyproject = true; src = fetchFromGitHub { owner = "keras-team"; repo = "keras"; tag = "v${version}"; - hash = "sha256-jyNOL5u+XVVqChD7Fs3yJCcW14bTvitiQa4H4DTeja0="; + hash = "sha256-VRza7ElCPjdMeo4LH0WSBD8WdzxojJStGXlf1pbP3b0="; }; build-system = [ diff --git a/pkgs/development/python-modules/legacy-api-wrap/default.nix b/pkgs/development/python-modules/legacy-api-wrap/default.nix new file mode 100644 index 000000000000..ce286a520803 --- /dev/null +++ b/pkgs/development/python-modules/legacy-api-wrap/default.nix @@ -0,0 +1,42 @@ +{ + lib, + buildPythonPackage, + fetchFromGitHub, + hatch-docstring-description, + hatch-vcs, + hatchling, + pytestCheckHook, +}: + +buildPythonPackage rec { + pname = "legacy-api-wrap"; + version = "1.4.1"; + pyproject = true; + + src = fetchFromGitHub { + owner = "flying-sheep"; + repo = "legacy-api-wrap"; + tag = "v${version}"; + hash = "sha256-ySkhfUyRBd4QS3f46KlaA5NrHxHr+dlkgmD4fGk2KsA="; + }; + + build-system = [ + hatch-docstring-description + hatch-vcs + hatchling + ]; + + pythonImportsCheck = [ + "legacy_api_wrap" + ]; + + nativeCheckInputs = [ pytestCheckHook ]; + + meta = { + description = "Wrap legacy APIs in python projects"; + homepage = "https://github.com/flying-sheep/legacy-api-wrap"; + changelog = "https://github.com/flying-sheep/legacy-api-wrap/releases/tag/${src.tag}"; + license = lib.licenses.mpl20; + maintainers = with lib.maintainers; [ bcdarwin ]; + }; +} diff --git a/pkgs/development/python-modules/liblp/default.nix b/pkgs/development/python-modules/liblp/default.nix new file mode 100644 index 000000000000..74a5154e4aa2 --- /dev/null +++ b/pkgs/development/python-modules/liblp/default.nix @@ -0,0 +1,35 @@ +{ + lib, + buildPythonPackage, + fetchFromGitHub, + poetry-core, +}: + +buildPythonPackage rec { + pname = "liblp"; + version = "1.0.2"; + pyproject = true; + + src = fetchFromGitHub { + owner = "sebaubuntu-python"; + repo = "liblp"; + tag = "v${version}"; + hash = "sha256-F30D2mYUYPupbr8OsrcrN6wQ639L5OlzQw/FrxPCsC4="; + }; + + build-system = [ poetry-core ]; + + # Module has no tests + doCheck = false; + + pythonImportsCheck = [ "liblp" ]; + + meta = { + description = "Android logical partitions library ported from C++ to Python"; + homepage = "https://github.com/sebaubuntu-python/liblp"; + license = lib.licenses.asl20; + platforms = lib.platforms.linux; + maintainers = with lib.maintainers; [ ungeskriptet ]; + mainProgram = "lpunpack"; + }; +} diff --git a/pkgs/development/python-modules/metaflow/default.nix b/pkgs/development/python-modules/metaflow/default.nix index 511e46a916c1..9a53878d9ee7 100644 --- a/pkgs/development/python-modules/metaflow/default.nix +++ b/pkgs/development/python-modules/metaflow/default.nix @@ -10,14 +10,14 @@ buildPythonPackage rec { pname = "metaflow"; - version = "2.16.8"; + version = "2.17.1"; pyproject = true; src = fetchFromGitHub { owner = "Netflix"; repo = "metaflow"; tag = version; - hash = "sha256-zKEk4c4hvXejF6/WxijUIlnR5dOZZjXrD3N1MIG7LMI="; + hash = "sha256-SOXgIAdbpnAnxxU4fxXd65EoAcJVdCS/owScjb/bBTk="; }; build-system = [ diff --git a/pkgs/development/python-modules/multiscale-spatial-image/default.nix b/pkgs/development/python-modules/multiscale-spatial-image/default.nix index 8f6984761652..619a4406eaff 100644 --- a/pkgs/development/python-modules/multiscale-spatial-image/default.nix +++ b/pkgs/development/python-modules/multiscale-spatial-image/default.nix @@ -9,6 +9,7 @@ python-dateutil, spatial-image, xarray, + xarray-dataclass, zarr, dask-image, fsspec, @@ -22,7 +23,7 @@ buildPythonPackage rec { pname = "multiscale-spatial-image"; - version = "2.0.2"; + version = "2.0.3"; pyproject = true; disabled = pythonOlder "3.8"; @@ -31,7 +32,7 @@ buildPythonPackage rec { owner = "spatial-image"; repo = "multiscale-spatial-image"; tag = "v${version}"; - hash = "sha256-aJp9RrCy88XFpM5GU7jADHQZFNZgXvlqSsCbmay3gww="; + hash = "sha256-wKSzhlNXIXOFEK8+xfKF6zTFr0+mdFhhvjWiHAKphk0="; }; build-system = [ hatchling ]; @@ -42,6 +43,7 @@ buildPythonPackage rec { python-dateutil spatial-image xarray + xarray-dataclass zarr ]; diff --git a/pkgs/development/python-modules/nclib/default.nix b/pkgs/development/python-modules/nclib/default.nix index 67217d4c2253..8e32235f733b 100644 --- a/pkgs/development/python-modules/nclib/default.nix +++ b/pkgs/development/python-modules/nclib/default.nix @@ -2,21 +2,21 @@ lib, buildPythonPackage, fetchPypi, - pythonOlder, + setuptools, }: buildPythonPackage rec { pname = "nclib"; - version = "1.0.5"; - format = "setuptools"; - - disabled = pythonOlder "3.7"; + version = "1.0.7"; + pyproject = true; src = fetchPypi { inherit pname version; - hash = "sha256-sKbISlL5hOBu1j6zWSib2HjJCvEoMrqdwzgG2keMqDE="; + hash = "sha256-40Bdkhmd3LiZAR1v36puV9l4tgtDb6T8k9j02JTR4Jo="; }; + build-system = [ setuptools ]; + # Project has no tests doCheck = false; @@ -24,9 +24,9 @@ buildPythonPackage rec { meta = with lib; { description = "Python module that provides netcat features"; - mainProgram = "serve-stdio"; homepage = "https://nclib.readthedocs.io/"; - license = with licenses; [ mit ]; + license = licenses.mit; maintainers = with maintainers; [ fab ]; + mainProgram = "serve-stdio"; }; } diff --git a/pkgs/development/python-modules/nikola/default.nix b/pkgs/development/python-modules/nikola/default.nix index 570f03feec97..296b34cb159e 100644 --- a/pkgs/development/python-modules/nikola/default.nix +++ b/pkgs/development/python-modules/nikola/default.nix @@ -50,14 +50,13 @@ buildPythonPackage rec { disabled = pythonOlder "3.8"; src = fetchPypi { - pname = "Nikola"; - inherit version; + inherit pname version; hash = "sha256-Y219b/wqsk9MJknoaV+LtWBOMJFT6ktgt4b6yuA6scc="; }; - nativeBuildInputs = [ setuptools ]; + build-system = [ setuptools ]; - propagatedBuildInputs = [ + dependencies = [ aiohttp babel blinker @@ -102,6 +101,7 @@ buildPythonPackage rec { disabledTests = [ # AssertionError "test_compiling_markdown" + "test_write_content_does_not_detroy_text" # Date formatting slightly differs from expectation "test_format_date_long" "test_format_date_timezone" @@ -113,10 +113,10 @@ buildPythonPackage rec { meta = with lib; { description = "Static website and blog generator"; - mainProgram = "nikola"; homepage = "https://getnikola.com/"; changelog = "https://github.com/getnikola/nikola/blob/v${version}/CHANGES.txt"; license = licenses.mit; maintainers = with maintainers; [ jluttine ]; + mainProgram = "nikola"; }; } diff --git a/pkgs/development/python-modules/ome-zarr/default.nix b/pkgs/development/python-modules/ome-zarr/default.nix index 263479410782..4ebfd118b616 100644 --- a/pkgs/development/python-modules/ome-zarr/default.nix +++ b/pkgs/development/python-modules/ome-zarr/default.nix @@ -23,14 +23,14 @@ buildPythonPackage rec { pname = "ome-zarr"; - version = "0.11.1"; + version = "0.12rc1"; pyproject = true; src = fetchFromGitHub { owner = "ome"; repo = "ome-zarr-py"; tag = "v${version}"; - hash = "sha256-3RXkz+UQvLixfYYhm5y/5vu9r0ga6s3xKx1azbmKFgg="; + hash = "sha256-uwAcICrFHZYYULfacWII5C3Y+Rs2Bf8ZLQEijfkldn8="; }; build-system = [ @@ -78,6 +78,9 @@ buildPythonPackage rec { "tests/test_starting_points.py::TestStartingPoints::test_label" "tests/test_starting_points.py::TestStartingPoints::test_labels" "tests/test_starting_points.py::TestStartingPoints::test_top_level" + + # tries to access network: + "ome_zarr/io.py" ]; pythonImportsCheck = [ diff --git a/pkgs/development/python-modules/python-etherscan-api/default.nix b/pkgs/development/python-modules/python-etherscan-api/default.nix new file mode 100644 index 000000000000..d9df87de0a33 --- /dev/null +++ b/pkgs/development/python-modules/python-etherscan-api/default.nix @@ -0,0 +1,37 @@ +{ + lib, + buildPythonPackage, + fetchFromGitHub, + requests, + setuptools, +}: + +buildPythonPackage rec { + pname = "python-etherscan-api"; + version = "2.1.0"; + pyproject = true; + + src = fetchFromGitHub { + owner = "pcko1"; + repo = "etherscan-python"; + tag = version; + hash = "sha256-HnMhWUKwVQq5RMXwSZo9q20JEnl7YN13ju01L18YAzU="; + }; + + build-system = [ setuptools ]; + + dependencies = [ requests ]; + + # Tests require an API key + doCheck = false; + + pythonImportsCheck = [ "etherscan" ]; + + meta = { + description = "A minimal, yet complete, python API for etherscan.io"; + homepage = "https://github.com/pcko1/etherscan-python"; + changelog = "https://github.com/pcko1/etherscan-python/releases/tag/${version}"; + license = lib.licenses.mit; + maintainers = [ lib.maintainers.jamiemagee ]; + }; +} diff --git a/pkgs/development/python-modules/pytorch-lightning/default.nix b/pkgs/development/python-modules/pytorch-lightning/default.nix index 6a8d934b0c9d..d1c9b0fdd4c0 100644 --- a/pkgs/development/python-modules/pytorch-lightning/default.nix +++ b/pkgs/development/python-modules/pytorch-lightning/default.nix @@ -24,14 +24,14 @@ buildPythonPackage rec { pname = "pytorch-lightning"; - version = "2.5.2"; + version = "2.5.3"; pyproject = true; src = fetchFromGitHub { owner = "Lightning-AI"; repo = "pytorch-lightning"; tag = version; - hash = "sha256-zYPjMahC8/9uYomzSFMbswJoh+CcBsnO0h4pkgCxIcQ="; + hash = "sha256-xLm8t1A6mwIyX5WCkhdt9D9/PsomkSTCAxIGBQlFGxY="; }; preConfigure = '' diff --git a/pkgs/development/python-modules/rtmapi/default.nix b/pkgs/development/python-modules/rtmapi/default.nix new file mode 100644 index 000000000000..17bc6465fadd --- /dev/null +++ b/pkgs/development/python-modules/rtmapi/default.nix @@ -0,0 +1,45 @@ +{ + lib, + buildPythonPackage, + fetchFromBitbucket, + setuptools, + httplib2, +}: + +buildPythonPackage rec { + pname = "rtmapi"; + version = "0.7.2"; + pyproject = true; + + src = fetchFromBitbucket { + owner = "rtmapi"; + repo = "rtmapi"; + rev = "release-${version}"; + hash = "sha256-+aJ7T5bE+N9bINf6S3v48wUGXQ/ikz1Xb15xWbConT4="; + }; + + build-system = [ + setuptools + ]; + + dependencies = [ + httplib2 + ]; + + postPatch = '' + substituteInPlace setup.py \ + --replace-fail "use_2to3=True," "" + ''; + + # package has no tests + doCheck = false; + + pythonImportsCheck = [ "rtmapi" ]; + + meta = { + description = "API package for rememberthemilk.com"; + homepage = "https://bitbucket.org/rtmapi/rtmapi"; + license = lib.licenses.mit; + maintainers = [ lib.maintainers.jamiemagee ]; + }; +} diff --git a/pkgs/development/python-modules/spatial-image/default.nix b/pkgs/development/python-modules/spatial-image/default.nix index fb14578b4610..9d4c051ba668 100644 --- a/pkgs/development/python-modules/spatial-image/default.nix +++ b/pkgs/development/python-modules/spatial-image/default.nix @@ -7,12 +7,12 @@ pytestCheckHook, numpy, xarray, - xarray-dataclasses, + xarray-dataclass, }: buildPythonPackage rec { pname = "spatial-image"; - version = "1.2.2"; + version = "1.2.3"; pyproject = true; disabled = pythonOlder "3.10"; @@ -21,7 +21,7 @@ buildPythonPackage rec { owner = "spatial-image"; repo = "spatial-image"; tag = "v${version}"; - hash = "sha256-Frvr8uJ3dD2lZFfqrNnki+JUbjhBdRK3BBAtIRtFqvs="; + hash = "sha256-mhT86v4/5s4dFw9sDYm5Ba7sM0ME9ifN9KEzhxVigOc="; }; build-system = [ hatchling ]; @@ -29,7 +29,7 @@ buildPythonPackage rec { dependencies = [ numpy xarray - xarray-dataclasses + xarray-dataclass ]; nativeCheckInputs = [ pytestCheckHook ]; @@ -39,7 +39,7 @@ buildPythonPackage rec { meta = { description = "Multi-dimensional spatial image data structure for scientific Python"; homepage = "https://github.com/spatial-image/spatial-image"; - changelog = "https://github.com/spatial-image/spatial-image/releases/tag/${src.tag}"; + changelog = "https://github.com/spatial-image/spatial-image/releases/tag/v${version}"; license = lib.licenses.mit; maintainers = with lib.maintainers; [ bcdarwin ]; }; diff --git a/pkgs/development/python-modules/symbolic/default.nix b/pkgs/development/python-modules/symbolic/default.nix index 2c81f6870591..85ddd66bbb1b 100644 --- a/pkgs/development/python-modules/symbolic/default.nix +++ b/pkgs/development/python-modules/symbolic/default.nix @@ -14,7 +14,7 @@ buildPythonPackage rec { pname = "symbolic"; - version = "12.16.1"; + version = "12.16.2"; pyproject = true; src = fetchFromGitHub { @@ -23,12 +23,12 @@ buildPythonPackage rec { tag = version; # the `py` directory is not included in the tarball, so we fetch the source via git instead forceFetchGit = true; - hash = "sha256-Y24IreRP/YZEugvro8PxMh32qAdEbFWhMxQLfeR1clM="; + hash = "sha256-1auaIvm9y6iIhRC+mU6PX7vsPok0CDVJHLd4nx5j5wU="; }; cargoDeps = rustPlatform.fetchCargoVendor { inherit pname version src; - hash = "sha256-IUh+6lKGsVqrmbYKEu0kahiQeMGJ3cN5lu1DIj9Hd48="; + hash = "sha256-uHRgV+wcdOsFqcYBMCJqy4CADN8XpXeKuVAsjI54Y9I="; }; nativeBuildInputs = [ diff --git a/pkgs/development/python-modules/tifffile/default.nix b/pkgs/development/python-modules/tifffile/default.nix index f9d0087ee418..b33f16588af6 100644 --- a/pkgs/development/python-modules/tifffile/default.nix +++ b/pkgs/development/python-modules/tifffile/default.nix @@ -58,11 +58,11 @@ buildPythonPackage rec { # flaky, often killed due to OOM or timeout env.SKIP_LARGE = "1"; - meta = with lib; { + meta = { description = "Read and write image data from and to TIFF files"; homepage = "https://github.com/cgohlke/tifffile/"; changelog = "https://github.com/cgohlke/tifffile/blob/v${version}/CHANGES.rst"; - license = licenses.bsd3; - maintainers = with maintainers; [ lebastr ]; + license = lib.licenses.bsd3; + maintainers = with lib.maintainers; [ lebastr ]; }; } diff --git a/pkgs/development/python-modules/tmdbsimple/default.nix b/pkgs/development/python-modules/tmdbsimple/default.nix new file mode 100644 index 000000000000..d629e66ac1ce --- /dev/null +++ b/pkgs/development/python-modules/tmdbsimple/default.nix @@ -0,0 +1,36 @@ +{ + lib, + buildPythonPackage, + fetchFromGitHub, + setuptools, + requests, +}: + +buildPythonPackage { + pname = "tmdbsimple"; + version = "2.9.2-unstable-2025-01-07"; + pyproject = true; + + src = fetchFromGitHub { + owner = "celiao"; + repo = "tmdbsimple"; + rev = "0b3359f7bab3ade391b2e5de964ed115b00984a6"; + hash = "sha256-usyL2lHSJwvPnWncI3K+yTmeU5DN1AkRzHC5nFh3vxs="; + }; + + build-system = [ setuptools ]; + + dependencies = [ requests ]; + + pythonImportsCheck = [ "tmdbsimple" ]; + + # The tests require an internet connection and an API key + doCheck = false; + + meta = { + description = "Wrapper for The Movie Database API v3"; + homepage = "https://github.com/celiao/tmdbsimple"; + license = lib.licenses.gpl3Plus; + maintainers = with lib.maintainers; [ theobori ]; + }; +} diff --git a/pkgs/development/python-modules/transformers/default.nix b/pkgs/development/python-modules/transformers/default.nix index 0d50ab01b208..7afb8627a7af 100644 --- a/pkgs/development/python-modules/transformers/default.nix +++ b/pkgs/development/python-modules/transformers/default.nix @@ -59,14 +59,14 @@ buildPythonPackage rec { pname = "transformers"; - version = "4.55.0"; + version = "4.55.2"; pyproject = true; src = fetchFromGitHub { owner = "huggingface"; repo = "transformers"; tag = "v${version}"; - hash = "sha256-dS9Xb8y/s+YpNDo6H0kO8X61C/K+SlCBLzW1JOzF4Uk="; + hash = "sha256-6cYZFFmwtPzResNB0q6yg/Lvclef4fAUqNxkSh+y+iU="; }; build-system = [ setuptools ]; diff --git a/pkgs/development/python-modules/xarray-dataclass/default.nix b/pkgs/development/python-modules/xarray-dataclass/default.nix new file mode 100644 index 000000000000..675c6cb2ca26 --- /dev/null +++ b/pkgs/development/python-modules/xarray-dataclass/default.nix @@ -0,0 +1,48 @@ +{ + lib, + buildPythonPackage, + fetchFromGitHub, + pythonOlder, + hatchling, + pytestCheckHook, + numpy, + typing-extensions, + xarray, +}: + +buildPythonPackage rec { + pname = "xarray-dataclass"; + version = "3.0.0"; + pyproject = true; + + src = fetchFromGitHub { + owner = "xarray-contrib"; + repo = "xarray-dataclass"; + tag = "v${version}"; + hash = "sha256-NHJvrkoRhq5cPSBBMWzrWVn+3sPvveMRgTXc/NdLfuA="; + }; + + build-system = [ + hatchling + ]; + + pythonRelaxDeps = [ "xarray" ]; + + dependencies = [ + numpy + typing-extensions + xarray + ]; + + nativeCheckInputs = [ pytestCheckHook ]; + + pythonImportsCheck = [ "xarray_dataclass" ]; + + meta = with lib; { + description = "Xarray data creation made easy by dataclass"; + homepage = "https://xarray-contrib.github.io/xarray-dataclass"; + changelog = "https://github.com/xarray-contrib/xarray-dataclass/releases/tag/v${version}"; + license = licenses.mit; + maintainers = with maintainers; [ bcdarwin ]; + }; +} diff --git a/pkgs/development/tools/ocaml/opam/default.nix b/pkgs/development/tools/ocaml/opam/default.nix index e2e6e99fb8eb..4198995392f7 100644 --- a/pkgs/development/tools/ocaml/opam/default.nix +++ b/pkgs/development/tools/ocaml/opam/default.nix @@ -15,11 +15,11 @@ assert lib.versionAtLeast ocaml.version "4.08.0"; stdenv.mkDerivation (finalAttrs: { pname = "opam"; - version = "2.3.0"; + version = "2.4.1"; src = fetchurl { url = "https://github.com/ocaml/opam/releases/download/${finalAttrs.version}/opam-full-${finalAttrs.version}.tar.gz"; - hash = "sha256-UGunaGXcMVtn35qonnq9XBqJen8KkteyaUl0/cUys0Y="; + hash = "sha256-xNBTApeTxxTk5zQLEVdCjA+QeDWF+xfzUVgkemQEZ9k="; }; strictDeps = true; @@ -38,12 +38,6 @@ stdenv.mkDerivation (finalAttrs: { patches = [ ./opam-shebangs.patch ]; - preConfigure = '' - # Fix opam sandboxing on nixos. Remove after opam >= 2.4.0 is released - substituteInPlace src/state/shellscripts/bwrap.sh \ - --replace-fail 'for dir in /*; do' 'for dir in /{*,run/current-system/sw}; do' - ''; - configureFlags = [ "--with-vendored-deps" "--with-mccs" diff --git a/pkgs/development/tools/ocaml/opam/opam-shebangs.patch b/pkgs/development/tools/ocaml/opam/opam-shebangs.patch index 12b66d1ebb86..cc050bbe2fc0 100644 --- a/pkgs/development/tools/ocaml/opam/opam-shebangs.patch +++ b/pkgs/development/tools/ocaml/opam/opam-shebangs.patch @@ -2,7 +2,7 @@ diff --git a/src/client/opamInitDefaults.ml b/src/client/opamInitDefaults.ml index eca13a7c..1fd66f43 100644 --- a/src/client/opamInitDefaults.ml +++ b/src/client/opamInitDefaults.ml -@@ -42,16 +42,20 @@ let eval_variables = [ +@@ -38,6 +38,9 @@ let eval_variables = let os_filter os = FOp (FIdent ([], OpamVariable.of_string "os", None), `Eq, FString os) @@ -12,32 +12,27 @@ index eca13a7c..1fd66f43 100644 let linux_filter = os_filter "linux" let macos_filter = os_filter "macos" let openbsd_filter = os_filter "openbsd" - let freebsd_filter = os_filter "freebsd" - let netbsd_filter = os_filter "netbsd" - let dragonflybsd_filter = os_filter "dragonfly" - let not_open_free_bsd_filter = - FNot (FOr (openbsd_filter, freebsd_filter)) - let win32_filter = os_filter "win32" +@@ -51,6 +54,7 @@ let win32_filter = os_filter "win32" let not_win32_filter = FOp (FIdent ([], OpamVariable.of_string "os", None), `Neq, FString "win32") let sandbox_filter = FOr (linux_filter, macos_filter) +let nixos_filter = os_distribution_filter "nixos" - let gpatch_filter = - FOr (FOr (openbsd_filter, netbsd_filter), - FOr (freebsd_filter, dragonflybsd_filter)) - let patch_filter = FNot gpatch_filter -@@ -79,4 +81,9 @@ let wrappers ~sandboxing () = + let gtar_filter = openbsd_filter + let tar_filter = FNot gtar_filter +@@ -69,6 +73,11 @@ let sandbox_wrappers = + + let wrappers ~sandboxing () = let w = OpamFile.Wrappers.empty in + let w = { w with -+ OpamFile.Wrappers. -+ pre_build = [[CString "%{hooks}%/shebangs.sh", None], Some nixos_filter]; -+ } ++ OpamFile.Wrappers. ++ pre_build = [[CString "%{hooks}%/shebangs.sh", None], Some nixos_filter]; ++ } + in if sandboxing then List.fold_left OpamFile.Wrappers.(fun w -> function | `build wrap_build -> { w with wrap_build } -@@ -113,6 +122,7 @@ let required_tools ~sandboxing () = +@@ -147,6 +156,7 @@ let required_packages_for_cygwin = let init_scripts () = [ ("sandbox.sh", OpamScript.bwrap), Some bwrap_filter; ("sandbox.sh", OpamScript.sandbox_exec), Some macos_filter; diff --git a/pkgs/os-specific/linux/prl-tools/default.nix b/pkgs/os-specific/linux/prl-tools/default.nix index 3a042cd50e4f..120a14a37107 100644 --- a/pkgs/os-specific/linux/prl-tools/default.nix +++ b/pkgs/os-specific/linux/prl-tools/default.nix @@ -43,13 +43,13 @@ let in stdenv.mkDerivation (finalAttrs: { pname = "prl-tools"; - version = "20.4.0-55980"; + version = "20.4.1-55996"; # We download the full distribution to extract prl-tools-lin.iso from # => ${dmg}/Parallels\ Desktop.app/Contents/Resources/Tools/prl-tools-lin.iso src = fetchurl { url = "https://download.parallels.com/desktop/v${lib.versions.major finalAttrs.version}/${finalAttrs.version}/ParallelsDesktop-${finalAttrs.version}.dmg"; - hash = "sha256-FTlQNTdR5SpulF9f0qtmm+ynovaD4thTNAk96HbIzFQ="; + hash = "sha256-CEyP8YZPLzjVAAjOaUqwQ4Ilzk9ybAtTTZUGZbSRrKQ="; }; hardeningDisable = [ diff --git a/pkgs/os-specific/linux/rtw88/default.nix b/pkgs/os-specific/linux/rtw88/default.nix index 0f2e47595e9a..f501e5c6a317 100644 --- a/pkgs/os-specific/linux/rtw88/default.nix +++ b/pkgs/os-specific/linux/rtw88/default.nix @@ -12,13 +12,13 @@ let in stdenv.mkDerivation { pname = "rtw88"; - version = "0-unstable-2025-07-13"; + version = "0-unstable-2025-08-09"; src = fetchFromGitHub { owner = "lwfinger"; repo = "rtw88"; - rev = "fa96fd4c014fa528d1fa50318e97aa71bf4f473c"; - hash = "sha256-KFozxbpw6HJhbL5QLnGkKEBAbeEiHrhSJUMAcbM+lX4="; + rev = "52072d874840f28c247b27f5d799f2c5c88a7e61"; + hash = "sha256-Lu3ol0iKfM9/SJ5lieh4A28h02Stc971ZypfiB2BWJ0="; }; nativeBuildInputs = kernel.moduleBuildDependencies; diff --git a/pkgs/servers/home-assistant/component-packages.nix b/pkgs/servers/home-assistant/component-packages.nix index 863bc94eeab8..c32e542c7e50 100644 --- a/pkgs/servers/home-assistant/component-packages.nix +++ b/pkgs/servers/home-assistant/component-packages.nix @@ -1608,7 +1608,8 @@ ]; "etherscan" = ps: with ps; [ - ]; # missing inputs: python-etherscan-api + python-etherscan-api + ]; "eufy" = ps: with ps; [ lakeside @@ -4910,7 +4911,8 @@ "remember_the_milk" = ps: with ps; [ httplib2 - ]; # missing inputs: RtmAPI + rtmapi + ]; "remote" = ps: with ps; [ ]; @@ -7559,6 +7561,7 @@ "reddit" "refoss" "rehlko" + "remember_the_milk" "remote" "remote_calendar" "renault" diff --git a/pkgs/servers/home-assistant/custom-components/octopus_energy/package.nix b/pkgs/servers/home-assistant/custom-components/octopus_energy/package.nix new file mode 100644 index 000000000000..96ccf01ca31c --- /dev/null +++ b/pkgs/servers/home-assistant/custom-components/octopus_energy/package.nix @@ -0,0 +1,59 @@ +{ + lib, + fetchFromGitHub, + buildHomeAssistantComponent, + pytestCheckHook, + pytest-homeassistant-custom-component, + pydantic, + mock, + nix-update-script, +}: +buildHomeAssistantComponent rec { + owner = "BottlecapDave"; + domain = "octopus_energy"; + version = "16.0.2"; + + src = fetchFromGitHub { + inherit owner; + repo = "HomeAssistant-OctopusEnergy"; + tag = "v${version}"; + hash = "sha256-/lhM00CNVPoZ8oohPuJ5j0pf0Dmxym3eycdkknlaAug="; + }; + + dependencies = [ pydantic ]; + + nativeCheckInputs = [ + pytestCheckHook + pytest-homeassistant-custom-component + mock + ]; + + disabledTestPaths = [ + # Integration tests require a valid Octopus Energy API Key + # https://github.com/BottlecapDave/HomeAssistant-OctopusEnergy/blob/develop/CONTRIBUTING.md#integration-tests + "tests/integration" + "tests/local_integration" + + # This unit test changes Home Assistant's default time zone to Europe/London + # without restoring it, which fails pytest-homeassistant-custom-component's + # teardown + "tests/unit/utils/test_get_off_peak_cost.py::test_when_rates_available_and_bst_then_off_peak_cost_returned" + ]; + + passthru.updateScript = nix-update-script { + extraArgs = [ + "--version-regex" + # Ignore pre-release versions ("beta") + "^v[0-9]+\\.[0-9]+\\.[0-9]+$" + ]; + }; + + meta = { + changelog = "https://github.com/BottlecapDave/HomeAssistant-OctopusEnergy/releases/tag/v${version}"; + description = "Unofficial Home Assistant integration for interacting with Octopus Energy"; + homepage = "https://github.com/BottlecapDave/HomeAssistant-OctopusEnergy"; + maintainers = [ lib.maintainers.matteopacini ]; + license = lib.licenses.mit; + }; + +} diff --git a/pkgs/servers/http/tomcat/default.nix b/pkgs/servers/http/tomcat/default.nix index 020efc57e85b..38fe473815e9 100644 --- a/pkgs/servers/http/tomcat/default.nix +++ b/pkgs/servers/http/tomcat/default.nix @@ -65,8 +65,8 @@ in }; tomcat10 = common { - version = "10.1.43"; - hash = "sha256-hZ0Vx/DgjlQ6klv4RyjuIWbHELFKYvvJvn9Y8XqpZ10="; + version = "10.1.44"; + hash = "sha256-4CDC+oZJ8d6au8LdznDdYemX0O0WHuAqMN5LIhJjvpw="; }; tomcat11 = common { diff --git a/pkgs/servers/icingaweb2/thirdparty.nix b/pkgs/servers/icingaweb2/thirdparty.nix index e18e8b7860e3..0e1a61a7e50a 100644 --- a/pkgs/servers/icingaweb2/thirdparty.nix +++ b/pkgs/servers/icingaweb2/thirdparty.nix @@ -7,13 +7,13 @@ stdenvNoCC.mkDerivation rec { pname = "icingaweb2-thirdparty"; - version = "0.13.0"; + version = "0.13.1"; src = fetchFromGitHub { owner = "Icinga"; repo = "icinga-php-thirdparty"; rev = "v${version}"; - sha256 = "sha256-MaUXhlMxNmaTDMRw5LPcQIU/0Sht05MOhJM+GqFD8Pc="; + sha256 = "sha256-vPr6rh/X5G///rqmgIdCYKDLeZMQVNK7FoINONO7Cw8="; }; installPhase = '' diff --git a/pkgs/servers/monitoring/grafana/plugins/grafana-polystat-panel/default.nix b/pkgs/servers/monitoring/grafana/plugins/grafana-polystat-panel/default.nix index 0f1b75bed404..184cc7124a48 100644 --- a/pkgs/servers/monitoring/grafana/plugins/grafana-polystat-panel/default.nix +++ b/pkgs/servers/monitoring/grafana/plugins/grafana-polystat-panel/default.nix @@ -2,8 +2,8 @@ grafanaPlugin { pname = "grafana-polystat-panel"; - version = "2.1.14"; - zipHash = "sha256-W6qx3b8rmIQV6Sm2rUsCDKrWi69N2S31hbmuqjYt25M="; + version = "2.1.15"; + zipHash = "sha256-l6jhlnZ9E8OdCHcX0HMpD1VjShq+mtBYeciPNkzsjlA="; meta = with lib; { description = "Hexagonal multi-stat panel for Grafana"; license = licenses.asl20; diff --git a/pkgs/servers/monitoring/prometheus/postfix-exporter.nix b/pkgs/servers/monitoring/prometheus/postfix-exporter.nix index 06066f3e205e..e78f220213c8 100644 --- a/pkgs/servers/monitoring/prometheus/postfix-exporter.nix +++ b/pkgs/servers/monitoring/prometheus/postfix-exporter.nix @@ -10,16 +10,16 @@ buildGoModule rec { pname = "postfix_exporter"; - version = "0.11.0"; + version = "0.12.1"; src = fetchFromGitHub { owner = "Hsn723"; repo = "postfix_exporter"; tag = "v${version}"; - sha256 = "sha256-tbZ3FcZfAicwL8Zz5JR/OeguPStHDNGUzTcXN5TU92M="; + sha256 = "sha256-3Sj9qRAK7lDLYShE0G1UkZsDPAMlk4KZBucDeWcnS4I="; }; - vendorHash = "sha256-j4XOqsgFQMN1OlR8cHaRP3ga1ZBB+4p5gH8m7wdnf0Q="; + vendorHash = "sha256-HCKJA7T5kCQX9ZEClHWgZgjN71YG3BGF8gXc1aDKDJ8="; ldflags = [ "-s" diff --git a/pkgs/servers/sql/postgresql/ext/pg-gvm.nix b/pkgs/servers/sql/postgresql/ext/pg-gvm.nix index a6a16d8e43e0..238621d8ccfa 100644 --- a/pkgs/servers/sql/postgresql/ext/pg-gvm.nix +++ b/pkgs/servers/sql/postgresql/ext/pg-gvm.nix @@ -14,13 +14,13 @@ postgresqlBuildExtension (finalAttrs: { pname = "pg-gvm"; - version = "22.6.10"; + version = "22.6.11"; src = fetchFromGitHub { owner = "greenbone"; repo = "pg-gvm"; tag = "v${finalAttrs.version}"; - hash = "sha256-NyArAvGkKaMKUuZs76+bmQwUBu3AXCXNCYZ9UB1V7rA="; + hash = "sha256-jkpZg1LMWuH5R4I/kTO3cofL3uNt11yXSgfFppSNC+o="; }; nativeBuildInputs = [ diff --git a/pkgs/servers/sql/postgresql/ext/timescaledb.nix b/pkgs/servers/sql/postgresql/ext/timescaledb.nix index 22ce07df097c..1c46a5f52ffd 100644 --- a/pkgs/servers/sql/postgresql/ext/timescaledb.nix +++ b/pkgs/servers/sql/postgresql/ext/timescaledb.nix @@ -13,13 +13,13 @@ postgresqlBuildExtension (finalAttrs: { pname = "timescaledb${lib.optionalString (!enableUnfree) "-apache"}"; - version = "2.21.2"; + version = "2.21.3"; src = fetchFromGitHub { owner = "timescale"; repo = "timescaledb"; tag = finalAttrs.version; - hash = "sha256-pNF75Wh8WMXqxjU19KBiH/jYzT/4uBYuUMH1vRilU94="; + hash = "sha256-u6xa8Tgb17pz0FSgbw06J6FOeFHROX9agXK4sUK1G9k="; }; nativeBuildInputs = [ cmake ]; @@ -106,7 +106,7 @@ postgresqlBuildExtension (finalAttrs: { || # PostgreSQL 18 support issue upstream: https://github.com/timescale/timescaledb/issues/8233 # Check after next package update. - lib.warnIf (finalAttrs.version != "2.21.2") "Is postgresql18Packages.timescaledb still broken?" ( + lib.warnIf (finalAttrs.version != "2.21.3") "Is postgresql18Packages.timescaledb still broken?" ( lib.versionAtLeast postgresql.version "18" ); }; diff --git a/pkgs/servers/tautulli/default.nix b/pkgs/servers/tautulli/default.nix index ffce88990230..114728f30860 100644 --- a/pkgs/servers/tautulli/default.nix +++ b/pkgs/servers/tautulli/default.nix @@ -9,7 +9,7 @@ buildPythonApplication rec { pname = "Tautulli"; - version = "2.15.2"; + version = "2.15.3"; format = "other"; pythonPath = [ setuptools ]; @@ -22,7 +22,7 @@ buildPythonApplication rec { owner = "Tautulli"; repo = pname; tag = "v${version}"; - sha256 = "sha256-psfwEdYsP6VAzF8rbxZAxLU/uPfG3vB+OaKx2bu8Gwk="; + sha256 = "sha256-TZzujSQcn65V5iG6y/1t1PfGFbf6Kntwg6Pw9K2sjvk="; }; installPhase = '' diff --git a/pkgs/tools/inputmethods/ibus-engines/ibus-table/default.nix b/pkgs/tools/inputmethods/ibus-engines/ibus-table/default.nix index 65c65e2ff2ae..ea4bcda399b1 100644 --- a/pkgs/tools/inputmethods/ibus-engines/ibus-table/default.nix +++ b/pkgs/tools/inputmethods/ibus-engines/ibus-table/default.nix @@ -15,13 +15,13 @@ stdenv.mkDerivation rec { pname = "ibus-table"; - version = "1.17.14"; + version = "1.17.15"; src = fetchFromGitHub { owner = "kaio"; repo = "ibus-table"; rev = version; - sha256 = "sha256-BPFKxJqc/p+lzUk7MHEY2j7IL6AVC/xpo5BG5YaR3vY="; + sha256 = "sha256-g3UyGbS/gtUQ54PQ0u7xRfInG+T5dkv4vF79bhXoQdY="; }; postPatch = '' diff --git a/pkgs/tools/networking/flannel/plugin.nix b/pkgs/tools/networking/flannel/plugin.nix index fdbe9380d630..ef6720116328 100644 --- a/pkgs/tools/networking/flannel/plugin.nix +++ b/pkgs/tools/networking/flannel/plugin.nix @@ -6,16 +6,16 @@ buildGoModule rec { pname = "cni-plugin-flannel"; - version = "1.6.2-flannel1"; + version = "1.7.1-flannel2"; src = fetchFromGitHub { owner = "flannel-io"; repo = "cni-plugin"; rev = "v${version}"; - sha256 = "sha256-mhDUpQf1HQLx4vn+Ju5jN5DYgkdsAs8CcmZbBqEITB4="; + sha256 = "sha256-vKHkgdmfG7jf0avwcJsNNCYlERH71ULPBHI3ObtwrIM="; }; - vendorHash = "sha256-0LgdvXNejEAgJZ9ufN3HJ+hXjUtrL0iqaQg9SpeCThM="; + vendorHash = "sha256-hDodGat/aZyDSRHN6K4J8Pq9LFlclbnEmYVwxCbraKk="; ldflags = [ "-s" diff --git a/pkgs/tools/package-management/nix-eval-jobs/default.nix b/pkgs/tools/package-management/nix-eval-jobs/default.nix index 05eec1673097..a559c0c0f4bd 100644 --- a/pkgs/tools/package-management/nix-eval-jobs/default.nix +++ b/pkgs/tools/package-management/nix-eval-jobs/default.nix @@ -1,15 +1,14 @@ { lib, boost, - cmake, fetchFromGitHub, meson, ninja, curl, - nix, nlohmann_json, pkg-config, stdenv, + nixComponents, }: stdenv.mkDerivation rec { pname = "nix-eval-jobs"; @@ -24,9 +23,14 @@ stdenv.mkDerivation rec { buildInputs = [ boost - nix curl nlohmann_json + nixComponents.nix-store + nixComponents.nix-fetchers + nixComponents.nix-expr + nixComponents.nix-flake + nixComponents.nix-main + nixComponents.nix-cmd ]; nativeBuildInputs = [ @@ -43,7 +47,11 @@ stdenv.mkDerivation rec { # Since this package is intimately tied to a specific Nix release, we # propagate the Nix used for building it to make it easier for users # downstream to reference it. - passthru = { inherit nix; }; + passthru = { + inherit nixComponents; + # For nix-fast-build + nix = nixComponents.nix-cli; + }; meta = { description = "Hydra's builtin hydra-eval-jobs as a standalone"; diff --git a/pkgs/top-level/aliases.nix b/pkgs/top-level/aliases.nix index eb62ecb326a6..6c16ca998d68 100644 --- a/pkgs/top-level/aliases.nix +++ b/pkgs/top-level/aliases.nix @@ -1402,6 +1402,7 @@ mapAliases { ''; # Added 2024-06-25 nextcloud27Packages = throw "Nextcloud27 is EOL!"; # Added 2024-06-25 nextcloud-news-updater = throw "nextcloud-news-updater has been removed because the project is unmaintained"; # Added 2025-03-28 + nixForLinking = throw "nixForLinking has been removed, use `nixVersions.nixComponents_` instead"; # Added 2025-08-14 nagiosPluginsOfficial = monitoring-plugins; neochat = makePlasma5Throw "neochat"; # added 2022-05-10 nerdfonts = throw '' diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 8aeb0e22bd57..07a20fde1e42 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -9000,16 +9000,6 @@ with pkgs; openssl_3_5 ; - openwebrx = callPackage ../applications/radio/openwebrx { - inherit (python3Packages) - buildPythonPackage - buildPythonApplication - setuptools - pycsdr - pydigiham - ; - }; - pcre = callPackage ../development/libraries/pcre { }; # pcre32 seems unused pcre-cpp = res.pcre.override { variant = "cpp"; }; @@ -15612,16 +15602,6 @@ with pkgs; nix = nixVersions.stable; - # Overlays for CppNix nightly, Lix, or Tvix want to change the default Nix - # implementation in Nixpkgs by overriding `pkgs.nix`. However, some packages - # link against the internal/unstable CppNix APIs directly, and these packages - # will break if built with different versions or implementations of Nix. - # - # If you want to swap out the Nix implementation in your package set, you - # don't want these packages to break. Therefore, some packages will refer to - # `nixForLinking` explicitly, at least until these dependencies can be sorted out. - nixForLinking = nixVersions.stable; - nixStatic = pkgsStatic.nix; lixPackageSets = recurseIntoAttrs ( @@ -15748,7 +15728,7 @@ with pkgs; ); nix-eval-jobs = callPackage ../tools/package-management/nix-eval-jobs { - nix = nixVersions.nix_2_30; + nixComponents = nixVersions.nixComponents_2_30; }; nix-delegate = haskell.lib.compose.justStaticExecutables haskellPackages.nix-delegate; diff --git a/pkgs/top-level/perl-packages.nix b/pkgs/top-level/perl-packages.nix index 1c4a899c4dff..f115610068b5 100644 --- a/pkgs/top-level/perl-packages.nix +++ b/pkgs/top-level/perl-packages.nix @@ -3317,6 +3317,13 @@ with self; url = "mirror://cpan/authors/id/E/ET/ETHER/Catalyst-Authentication-Credential-HTTP-1.018.tar.gz"; hash = "sha256-b6GBbe5kSw216gzBXF5xHcLO0gg2JavOcJZSHx1lpSk="; }; + patches = [ + (fetchpatch { + name = "CVE-2025-40920.patch"; + url = "https://github.com/perl-catalyst/Catalyst-Authentication-Credential-HTTP/commit/ad2c03aad95406db4ce35dfb670664ebde004c18.patch"; + hash = "sha256-WI6JwvY6i3KkQO9HbbSvHPX8mgM8I2cF0UTjF1D14T4="; + }) + ]; buildInputs = [ ModuleBuildTiny TestException @@ -3326,6 +3333,7 @@ with self; propagatedBuildInputs = [ CatalystPluginAuthentication ClassAccessor + CryptSysRandom DataUUID StringEscape ]; @@ -7486,6 +7494,22 @@ with self; }; }; + CryptSysRandom = buildPerlPackage { + pname = "Crypt-SysRandom"; + version = "0.007"; + src = fetchurl { + url = "mirror://cpan/authors/id/L/LE/LEONT/Crypt-SysRandom-0.007.tar.gz"; + hash = "sha256-pdSemPyjxSZsea6YmoXsoik0sFiAPuSz5usI78pO70Y="; + }; + meta = { + description = "Perl interface to system randomness"; + license = with lib.licenses; [ + artistic1 + gpl1Plus + ]; + }; + }; + CryptTwofish = buildPerlPackage { pname = "Crypt-Twofish"; version = "2.18"; diff --git a/pkgs/top-level/python-packages.nix b/pkgs/top-level/python-packages.nix index ac93aa452a6c..cfa0249805da 100644 --- a/pkgs/top-level/python-packages.nix +++ b/pkgs/top-level/python-packages.nix @@ -3313,6 +3313,8 @@ self: super: with self; { databricks-sql-connector = callPackage ../development/python-modules/databricks-sql-connector { }; + dataclass-csv = callPackage ../development/python-modules/dataclass-csv { }; + dataclass-factory = callPackage ../development/python-modules/dataclass-factory { }; dataclass-wizard = callPackage ../development/python-modules/dataclass-wizard { }; @@ -8019,6 +8021,8 @@ self: super: with self; { ledgerwallet = callPackage ../development/python-modules/ledgerwallet { }; + legacy-api-wrap = callPackage ../development/python-modules/legacy-api-wrap { }; + legacy-cgi = callPackage ../development/python-modules/legacy-cgi { }; leidenalg = callPackage ../development/python-modules/leidenalg { igraph-c = pkgs.igraph; }; @@ -8134,6 +8138,8 @@ self: super: with self; { liblarch = callPackage ../development/python-modules/liblarch { }; + liblp = callPackage ../development/python-modules/liblp { }; + liblzfse = callPackage ../development/python-modules/liblzfse { inherit (pkgs) lzfse; }; libmambapy = callPackage ../development/python-modules/libmambapy { }; @@ -14589,6 +14595,8 @@ self: super: with self; { python-etcd = callPackage ../development/python-modules/python-etcd { }; + python-etherscan-api = callPackage ../development/python-modules/python-etherscan-api { }; + python-ev3dev2 = callPackage ../development/python-modules/python-ev3dev2 { }; python-family-hub-local = callPackage ../development/python-modules/python-family-hub-local { }; @@ -15979,6 +15987,8 @@ self: super: with self; { rtfunicode = callPackage ../development/python-modules/rtfunicode { }; + rtmapi = callPackage ../development/python-modules/rtmapi { }; + rtmidi-python = callPackage ../development/python-modules/rtmidi-python { }; rtmixer = callPackage ../development/python-modules/rtmixer { }; @@ -18176,6 +18186,8 @@ self: super: with self; { tmb = callPackage ../development/python-modules/tmb { }; + tmdbsimple = callPackage ../development/python-modules/tmdbsimple { }; + tnefparse = callPackage ../development/python-modules/tnefparse { }; todoist = callPackage ../development/python-modules/todoist { }; @@ -19897,6 +19909,8 @@ self: super: with self; { xarray = callPackage ../development/python-modules/xarray { }; + xarray-dataclass = callPackage ../development/python-modules/xarray-dataclass { }; + xarray-dataclasses = callPackage ../development/python-modules/xarray-dataclasses { }; xarray-einstats = callPackage ../development/python-modules/xarray-einstats { };