Skip to content
This repository was archived by the owner on Apr 12, 2021. It is now read-only.
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 90441b4b47fc
Choose a base ref
...
head repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: d1ba7dae91d6
Choose a head ref
Loading
Showing with 980 additions and 1,079 deletions.
  1. +0 −5 lib/licenses.nix
  2. +0 −6 maintainers/maintainer-list.nix
  3. +1 −1 nixos/doc/manual/man-nixos-install.xml
  4. +59 −20 nixos/modules/services/mail/roundcube.nix
  5. +3 −3 nixos/modules/virtualisation/amazon-init.nix
  6. +1 −2 nixos/tests/corerad.nix
  7. +3 −5 pkgs/applications/audio/bitwig-studio/bitwig-studio3.nix
  8. +2 −2 pkgs/applications/audio/qmmp/default.nix
  9. +2 −2 pkgs/applications/audio/rosegarden/default.nix
  10. +36 −0 pkgs/applications/audio/string-machine/default.nix
  11. +3 −3 pkgs/applications/editors/android-studio/default.nix
  12. +38 −0 pkgs/applications/graphics/imgp/default.nix
  13. +2 −2 pkgs/applications/graphics/runwayml/default.nix
  14. +88 −0 pkgs/applications/misc/megacmd/default.nix
  15. +2 −2 pkgs/applications/networking/browsers/palemoon/default.nix
  16. +1 −1 pkgs/applications/networking/cluster/kubeless/default.nix
  17. +2 −2 pkgs/applications/networking/cluster/kubernetes/default.nix
  18. +3 −3 pkgs/applications/networking/instant-messengers/chatterino2/default.nix
  19. +2 −2 pkgs/applications/networking/instant-messengers/teams/default.nix
  20. +25 −12 pkgs/applications/networking/instant-messengers/telegram/tdesktop/default.nix
  21. +2 −2 pkgs/applications/science/biology/picard-tools/default.nix
  22. +2 −0 pkgs/applications/version-management/git-and-tools/default.nix
  23. +26 −0 pkgs/applications/version-management/git-and-tools/thicket/default.nix
  24. +8 −0 pkgs/applications/version-management/git-and-tools/thicket/shards.nix
  25. +1 −1 pkgs/applications/video/obs-studio/default.nix
  26. +2 −3 pkgs/applications/virtualization/cri-o/default.nix
  27. +10 −2 pkgs/applications/virtualization/crun/default.nix
  28. +7 −5 pkgs/applications/virtualization/podman/default.nix
  29. +22 −28 pkgs/applications/window-managers/notion/default.nix
  30. +0 −662 pkgs/applications/window-managers/notion/notion-xft_nixos.diff
  31. +5 −7 pkgs/data/icons/iconpack-obsidian/default.nix
  32. +1 −0 pkgs/desktops/cinnamon/cinnamon-desktop/default.nix
  33. +1 −0 pkgs/desktops/cinnamon/cinnamon-menus/default.nix
  34. +1 −0 pkgs/desktops/cinnamon/cinnamon-translations/default.nix
  35. +6 −0 pkgs/desktops/cinnamon/cjs/default.nix
  36. +1 −0 pkgs/desktops/cinnamon/default.nix
  37. +76 −0 pkgs/desktops/cinnamon/nemo/default.nix
  38. +165 −131 pkgs/development/compilers/graalvm/enterprise-edition.nix
  39. +3 −3 pkgs/development/compilers/unison/default.nix
  40. +1 −1 pkgs/development/interpreters/perl/wrapper.nix
  41. +6 −2 pkgs/development/interpreters/python/default.nix
  42. +8 −2 pkgs/development/interpreters/python/pypy/default.nix
  43. +8 −1 pkgs/development/interpreters/python/pypy/tk_tcl_paths.patch
  44. +2 −2 pkgs/development/libraries/audio/sratom/default.nix
  45. +2 −2 pkgs/development/libraries/cppzmq/default.nix
  46. +27 −0 pkgs/development/libraries/gensio/default.nix
  47. +2 −2 pkgs/development/libraries/pyotherside/default.nix
  48. +2 −2 pkgs/development/libraries/science/math/m4ri/default.nix
  49. +2 −2 pkgs/development/libraries/science/math/m4rie/default.nix
  50. +2 −2 pkgs/development/libraries/serd/default.nix
  51. +2 −2 pkgs/development/python-modules/aiohttp-socks/default.nix
  52. +3 −2 pkgs/development/python-modules/aiohttp/default.nix
  53. +2 −2 pkgs/development/python-modules/aioresponses/default.nix
  54. +2 −2 pkgs/development/python-modules/ansible/default.nix
  55. +2 −2 pkgs/development/python-modules/apprise/default.nix
  56. +2 −2 pkgs/development/python-modules/azure-mgmt-containerservice/default.nix
  57. +2 −2 pkgs/development/python-modules/azure-mgmt-hdinsight/default.nix
  58. +2 −2 pkgs/development/python-modules/azure-mgmt-media/default.nix
  59. +2 −2 pkgs/development/python-modules/azure-mgmt-netapp/default.nix
  60. +2 −2 pkgs/development/python-modules/azure-mgmt-recoveryservicesbackup/default.nix
  61. +2 −2 pkgs/development/python-modules/bitarray/default.nix
  62. +2 −2 pkgs/development/python-modules/bumps/default.nix
  63. +2 −2 pkgs/development/python-modules/cmd2/default.nix
  64. +2 −2 pkgs/development/python-modules/dask-ml/default.nix
  65. +2 −2 pkgs/development/python-modules/diff_cover/default.nix
  66. +2 −2 pkgs/development/python-modules/django-auth-ldap/default.nix
  67. +2 −2 pkgs/development/python-modules/html2text/default.nix
  68. +2 −2 pkgs/development/python-modules/jupyter_console/default.nix
  69. +2 −2 pkgs/development/python-modules/jupyterlab/default.nix
  70. +2 −2 pkgs/development/python-modules/jupytext/default.nix
  71. +2 −2 pkgs/development/python-modules/libnacl/default.nix
  72. +2 −2 pkgs/development/python-modules/phonenumbers/default.nix
  73. +7 −2 pkgs/development/python-modules/ppft/default.nix
  74. +2 −2 pkgs/development/python-modules/praw/default.nix
  75. +2 −2 pkgs/development/python-modules/python-dotenv/default.nix
  76. +2 −2 pkgs/development/python-modules/python-telegram-bot/default.nix
  77. +2 −2 pkgs/development/python-modules/qtawesome/default.nix
  78. +2 −2 pkgs/development/python-modules/shodan/default.nix
  79. +2 −2 pkgs/development/python-modules/spotipy/default.nix
  80. +2 −2 pkgs/development/python-modules/stripe/default.nix
  81. +3 −1 pkgs/development/python-modules/uvloop/default.nix
  82. +2 −2 pkgs/development/python-modules/vega/default.nix
  83. +2 −2 pkgs/development/tools/build-managers/icmake/default.nix
  84. +2 −2 pkgs/development/web/postman/default.nix
  85. +2 −2 pkgs/misc/drivers/hplip/default.nix
  86. +2 −2 pkgs/os-specific/linux/powerstat/default.nix
  87. +2 −2 pkgs/os-specific/linux/wireguard/default.nix
  88. +2 −2 pkgs/servers/metabase/default.nix
  89. +8 −2 pkgs/servers/monitoring/loki/default.nix
  90. +2 −2 pkgs/servers/mqtt/mosquitto/default.nix
  91. +2 −2 pkgs/servers/nextcloud/default.nix
  92. +23 −0 pkgs/servers/ser2net/default.nix
  93. +15 −5 pkgs/tools/admin/ansible/default.nix
  94. +45 −0 pkgs/tools/backup/luckybackup/default.nix
  95. +9 −3 pkgs/tools/filesystems/ceph/default.nix
  96. +2 −2 pkgs/tools/filesystems/glusterfs/default.nix
  97. +2 −2 pkgs/tools/graphics/argyllcms/default.nix
  98. +28 −0 pkgs/tools/misc/h/default.nix
  99. +9 −9 pkgs/tools/misc/ipxe/default.nix
  100. +6 −7 pkgs/tools/misc/mcfly/default.nix
  101. +4 −4 pkgs/tools/networking/amass/default.nix
  102. +3 −3 pkgs/tools/networking/corerad/default.nix
  103. +6 −6 pkgs/tools/networking/v2ray/default.nix
  104. +2 −2 pkgs/tools/networking/wireguard-tools/default.nix
  105. +2 −2 pkgs/tools/security/munge/default.nix
  106. +2 −2 pkgs/tools/system/hwinfo/default.nix
  107. +2 −2 pkgs/tools/system/s-tui/default.nix
  108. +2 −2 pkgs/tools/text/mawk/default.nix
  109. +9 −7 pkgs/tools/text/ocrmypdf/default.nix
  110. +13 −0 pkgs/tools/text/ocrmypdf/liblept.patch
  111. +27 −5 pkgs/top-level/all-packages.nix
5 changes: 0 additions & 5 deletions lib/licenses.nix
Original file line number Diff line number Diff line change
@@ -536,11 +536,6 @@ lib.mapAttrs (n: v: v // { shortName = n; }) {
fullName = "University of Illinois/NCSA Open Source License";
};

notion_lgpl = {
url = "https://raw.githubusercontent.com/raboof/notion/master/LICENSE";
fullName = "Notion modified LGPL";
};

nposl3 = spdx {
spdxId = "NPOSL-3.0";
fullName = "Non-Profit Open Software License 3.0";
6 changes: 0 additions & 6 deletions maintainers/maintainer-list.nix
Original file line number Diff line number Diff line change
@@ -40,12 +40,6 @@
See `./scripts/check-maintainer-github-handles.sh` for an example on how to work with this data.
*/
{
"00-matt" = {
name = "Matt Smith";
email = "matt@offtopica.uk";
github = "00-matt";
githubId = 48835712;
};
"0x4A6F" = {
email = "0x4A6F@shackspace.de";
name = "Joachim Ernst";
2 changes: 1 addition & 1 deletion nixos/doc/manual/man-nixos-install.xml
Original file line number Diff line number Diff line change
@@ -210,7 +210,7 @@
The closure must be an appropriately configured NixOS system, with boot
loader and partition configuration that fits the target host. Such a
closure is typically obtained with a command such as <command>nix-build
-I nixos-config=./configuration.nix '&lt;nixos&gt;' -A system
-I nixos-config=./configuration.nix '&lt;nixpkgs/nixos&gt;' -A system
--no-out-link</command>
</para>
</listitem>
79 changes: 59 additions & 20 deletions nixos/modules/services/mail/roundcube.nix
Original file line number Diff line number Diff line change
@@ -5,6 +5,8 @@ with lib;
let
cfg = config.services.roundcube;
fpm = config.services.phpfpm.pools.roundcube;
localDB = cfg.database.host == "localhost";
user = cfg.database.username;
in
{
options.services.roundcube = {
@@ -44,7 +46,10 @@ in
username = mkOption {
type = types.str;
default = "roundcube";
description = "Username for the postgresql connection";
description = ''
Username for the postgresql connection.
If <literal>database.host</literal> is set to <literal>localhost</literal>, a unix user and group of the same name will be created as well.
'';
};
host = mkOption {
type = types.str;
@@ -58,7 +63,12 @@ in
};
password = mkOption {
type = types.str;
description = "Password for the postgresql connection";
description = "Password for the postgresql connection. Do not use: the password will be stored world readable in the store; use <literal>passwordFile</literal> instead.";
default = "";
};
passwordFile = mkOption {
type = types.str;
description = "Password file for the postgresql connection. Must be readable by user <literal>nginx</literal>. Ignored if <literal>database.host</literal> is set to <literal>localhost</literal>, as peer authentication will be used.";
};
dbname = mkOption {
type = types.str;
@@ -83,14 +93,22 @@ in
};

config = mkIf cfg.enable {
# backward compatibility: if password is set but not passwordFile, make one.
services.roundcube.database.passwordFile = mkIf (!localDB && cfg.database.password != "") (mkDefault ("${pkgs.writeText "roundcube-password" cfg.database.password}"));
warnings = lib.optional (!localDB && cfg.database.password != "") "services.roundcube.database.password is deprecated and insecure; use services.roundcube.database.passwordFile instead";

environment.etc."roundcube/config.inc.php".text = ''
<?php
${lib.optionalString (!localDB) "$password = file_get_contents('${cfg.database.passwordFile}');"}
$config = array();
$config['db_dsnw'] = 'pgsql://${cfg.database.username}:${cfg.database.password}@${cfg.database.host}/${cfg.database.dbname}';
$config['db_dsnw'] = 'pgsql://${cfg.database.username}${lib.optionalString (!localDB) ":' . $password . '"}@${if localDB then "unix(/run/postgresql)" else cfg.database.host}/${cfg.database.dbname}';
$config['log_driver'] = 'syslog';
$config['max_message_size'] = '25M';
$config['plugins'] = [${concatMapStringsSep "," (p: "'${p}'") cfg.plugins}];
$config['des_key'] = file_get_contents('/var/lib/roundcube/des_key');
$config['mime_types'] = '${pkgs.nginx}/conf/mime.types';
${cfg.extraConfig}
'';

@@ -116,12 +134,26 @@ in
};
};

services.postgresql = mkIf (cfg.database.host == "localhost") {
services.postgresql = mkIf localDB {
enable = true;
ensureDatabases = [ cfg.database.dbname ];
ensureUsers = [ {
name = cfg.database.username;
ensurePermissions = {
"DATABASE ${cfg.database.username}" = "ALL PRIVILEGES";
};
} ];
};

users.users.${user} = mkIf localDB {
group = user;
isSystemUser = true;
createHome = false;
};
users.groups.${user} = mkIf localDB {};

services.phpfpm.pools.roundcube = {
user = "nginx";
user = if localDB then user else "nginx";
phpOptions = ''
error_log = 'stderr'
log_errors = on
@@ -143,32 +175,39 @@ in
};
systemd.services.phpfpm-roundcube.after = [ "roundcube-setup.service" ];

systemd.services.roundcube-setup = let
pgSuperUser = config.services.postgresql.superUser;
in mkMerge [
systemd.services.roundcube-setup = mkMerge [
(mkIf (cfg.database.host == "localhost") {
requires = [ "postgresql.service" ];
after = [ "postgresql.service" ];
path = [ config.services.postgresql.package ];
})
{
wantedBy = [ "multi-user.target" ];
script = ''
mkdir -p /var/lib/roundcube
if [ ! -f /var/lib/roundcube/db-created ]; then
if [ "${cfg.database.host}" = "localhost" ]; then
${pkgs.sudo}/bin/sudo -u ${pgSuperUser} psql postgres -c "create role ${cfg.database.username} with login password '${cfg.database.password}'";
${pkgs.sudo}/bin/sudo -u ${pgSuperUser} psql postgres -c "create database ${cfg.database.dbname} with owner ${cfg.database.username}";
fi
PGPASSWORD="${cfg.database.password}" ${pkgs.postgresql}/bin/psql -U ${cfg.database.username} \
-f ${cfg.package}/SQL/postgres.initial.sql \
-h ${cfg.database.host} ${cfg.database.dbname}
touch /var/lib/roundcube/db-created
script = let
psql = "${lib.optionalString (!localDB) "PGPASSFILE=${cfg.database.passwordFile}"} ${pkgs.postgresql}/bin/psql ${lib.optionalString (!localDB) "-h ${cfg.database.host} -U ${cfg.database.username} "} ${cfg.database.dbname}";
in
''
version="$(${psql} -t <<< "select value from system where name = 'roundcube-version';" || true)"
if ! (grep -E '[a-zA-Z0-9]' <<< "$version"); then
${psql} -f ${cfg.package}/SQL/postgres.initial.sql
fi
if [ ! -f /var/lib/roundcube/des_key ]; then
base64 /dev/urandom | head -c 24 > /var/lib/roundcube/des_key;
# we need to log out everyone in case change the des_key
# from the default when upgrading from nixos 19.09
${psql} <<< 'TRUNCATE TABLE session;'
fi
${pkgs.php}/bin/php ${cfg.package}/bin/update.sh
'';
serviceConfig.Type = "oneshot";
serviceConfig = {
Type = "oneshot";
StateDirectory = "roundcube";
User = if localDB then user else "nginx";
# so that the des_key is not world readable
StateDirectoryMode = "0700";
};
}
];
};
6 changes: 3 additions & 3 deletions nixos/modules/virtualisation/amazon-init.nix
Original file line number Diff line number Diff line change
@@ -8,7 +8,7 @@ let
export HOME=/root
export PATH=${pkgs.lib.makeBinPath [ config.nix.package pkgs.systemd pkgs.gnugrep pkgs.gnused config.system.build.nixos-rebuild]}:$PATH
export NIX_PATH=/nix/var/nix/profiles/per-user/root/channels/nixos:nixos-config=/etc/nixos/configuration.nix:/nix/var/nix/profiles/per-user/root/channels
export NIX_PATH=nixpkgs=/nix/var/nix/profiles/per-user/root/channels/nixos:nixos-config=/etc/nixos/configuration.nix:/nix/var/nix/profiles/per-user/root/channels
userData=/etc/ec2-metadata/user-data
@@ -18,9 +18,9 @@ let
# that as the channel.
if sed '/^\(#\|SSH_HOST_.*\)/d' < "$userData" | grep -q '\S'; then
channels="$(grep '^###' "$userData" | sed 's|###\s*||')"
printf "%s" "$channels" | while read channel; do
while IFS= read -r channel; do
echo "writing channel: $channel"
done
done < <(printf "%s\n" "$channels")
if [[ -n "$channels" ]]; then
printf "%s" "$channels" > /root/.nix-channels
3 changes: 1 addition & 2 deletions nixos/tests/corerad.nix
Original file line number Diff line number Diff line change
@@ -18,8 +18,7 @@ import ./make-test-python.nix (
[[interfaces]]
name = "eth1"
send_advertisements = true
[[interfaces.plugins]]
name = "prefix"
[[interfaces.prefix]]
prefix = "::/64"
'';
};
8 changes: 3 additions & 5 deletions pkgs/applications/audio/bitwig-studio/bitwig-studio3.nix
Original file line number Diff line number Diff line change
@@ -2,18 +2,16 @@

bitwig-studio1.overrideAttrs (oldAttrs: rec {
name = "bitwig-studio-${version}";
version = "3.1.1";
version = "3.1.2";

src = fetchurl {
url = "https://downloads.bitwig.com/stable/${version}/bitwig-studio-${version}.deb";
sha256 = "1mgyyl1mr8hmzn3qdmg77km6sk58hyd0gsqr9jksh0a8p6hj24pk";
sha256 = "07djn52lz43ls6fa4k1ncz3m1nc5zv2j93hwyavnr66r0hlqy7l9";
};

buildInputs = oldAttrs.buildInputs ++ [ xorg.libXtst ];

runtimeDependencies = [
pulseaudio
];
runtimeDependencies = [ pulseaudio ];

installPhase = ''
${oldAttrs.installPhase}
4 changes: 2 additions & 2 deletions pkgs/applications/audio/qmmp/default.nix
Original file line number Diff line number Diff line change
@@ -29,11 +29,11 @@
# handle that.

mkDerivation rec {
name = "qmmp-1.3.5";
name = "qmmp-1.3.6";

src = fetchurl {
url = "http://qmmp.ylsoftware.com/files/${name}.tar.bz2";
sha256 = "0h7kcqzhfvk610937pwrhizcdgd4n7ncl1vayv6sj3va1x7pv6xm";
sha256 = "0dihy6v6j1cfx4qgwgajdn8rx6nf8x5srk8yjki9xh1mlcaanhp8";
};

nativeBuildInputs = [ cmake pkgconfig ];
4 changes: 2 additions & 2 deletions pkgs/applications/audio/rosegarden/default.nix
Original file line number Diff line number Diff line change
@@ -3,12 +3,12 @@
, liblo, liblrdf, libsamplerate, libsndfile, lirc ? null, qtbase }:

stdenv.mkDerivation (rec {
version = "19.06";
version = "19.12";
pname = "rosegarden";

src = fetchurl {
url = "mirror://sourceforge/rosegarden/${pname}-${version}.tar.bz2";
sha256 = "169qb58v2s8va59hzkih8nqb2aipsqlrbfs8q39ywqa8w5d60gcc";
sha256 = "1qcaxc6hdzva7kwxxhgl95437fagjbxzv4mihsgpr7y9qk08ppw1";
};

patchPhase = ''
36 changes: 36 additions & 0 deletions pkgs/applications/audio/string-machine/default.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,36 @@
{ stdenv, fetchFromGitHub, boost, cairo, lv2, pkg-config }:

stdenv.mkDerivation rec {
pname = "string-machine";
version = "unstable-2020-01-20";

src = fetchFromGitHub {
owner = "jpcima";
repo = pname;
rev = "188082dd0beb9a3c341035604841c53675fe66c4";
sha256 = "0l9xrzp3f0hk6h320qh250a0n1nbd6qhjmab21sjmrlb4ngy672v";
fetchSubmodules = true;
};

postPatch = ''
patchShebangs ./dpf/utils/generate-ttl.sh
'';

nativeBuildInputs = [ pkg-config ];

buildInputs = [
boost cairo lv2
];

makeFlags = [
"PREFIX=$(out)"
];

meta = with stdenv.lib; {
homepage = "https://github.com/jpcima/string-machine";
description = "Digital model of electronic string ensemble instrument";
maintainers = [ maintainers.magnetophon ];
platforms = intersectLists platforms.linux platforms.x86;
license = licenses.boost;
};
}
6 changes: 3 additions & 3 deletions pkgs/applications/editors/android-studio/default.nix
Original file line number Diff line number Diff line change
@@ -18,9 +18,9 @@ let
sha256Hash = "0xpcihr5xxr9l1kv6aflywshs8fww3s7di0g98mz475whhxwzf3q";
};
latestVersion = { # canary & dev
version = "4.0.0.8"; # "Android Studio 4.0 Canary 8"
build = "193.6107147";
sha256Hash = "0bdibjp52jjlyh0966p9657xxmz1z7vi262v6ss4ywpb7gpaj9qq";
version = "4.0.0.9"; # "Android Studio 4.0 Canary 9"
build = "193.6137316";
sha256Hash = "1cgxyqp85z5x2jnjh1qabn2cfiziiwvfr6iggzb531dlhllyfyqw";
};
in {
# Attributes are named by their corresponding release channels
38 changes: 38 additions & 0 deletions pkgs/applications/graphics/imgp/default.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
{ lib, fetchFromGitHub, buildPythonApplication, pillow, imgp }:

buildPythonApplication rec {
pname = "imgp";
version = "2.7";

src = fetchFromGitHub {
owner = "jarun";
repo = pname;
rev = "v${version}";
sha256 = "13r4fn3dd0nyidfhrr7zzpls5ifbyqdwxhyvpkqr8ahchws7wfc6";
};

propagatedBuildInputs = [ pillow ];

installFlags = [
"DESTDIR=$(out)"
"PREFIX="
];

postInstall = ''
install -Dm555 auto-completion/bash/imgp-completion.bash $out/share/bash-completion/completions/imgp.bash
install -Dm555 auto-completion/fish/imgp.fish -t $out/share/fish/vendor_completions.d
install -Dm555 auto-completion/zsh/_imgp -t $out/share/zsh/site-functions
'';

checkPhase = ''
$out/bin/imgp --help
'';

meta = with lib; {
description = "High-performance CLI batch image resizer & rotator";
homepage = "https://github.com/jarun/imgp";
license = licenses.gpl3;
platforms = platforms.unix;
maintainers = with maintainers; [ sikmir ];
};
}
4 changes: 2 additions & 2 deletions pkgs/applications/graphics/runwayml/default.nix
Original file line number Diff line number Diff line change
@@ -6,12 +6,12 @@

let
pname = "runwayml";
version = "0.10.11";
version = "0.10.20";
name = "${pname}-${version}";

src = fetchurl {
url = "https://runway-releases.s3.amazonaws.com/Runway%20${version}.AppImage";
sha256 = "0f3icgpwj1sk9bkycqw65c8bhrzzpw5yzacw52siv4j1gl4casnl";
sha256 = "1wi94xi8nrwfc4v2j1crlmwr0nxg95ffp5h4hxd84crvya8ibxgz";
name="${pname}-${version}.AppImage";
};

Loading