Merge #281828: staging-next 2024-01-18

+2222 -1581
+3 -3
doc/languages-frameworks/emscripten.section.md
··· 86 86 87 87 postPatch = pkgs.lib.optionalString pkgs.stdenv.isDarwin '' 88 88 substituteInPlace configure \ 89 - --replace '/usr/bin/libtool' 'ar' \ 90 - --replace 'AR="libtool"' 'AR="ar"' \ 91 - --replace 'ARFLAGS="-o"' 'ARFLAGS="-r"' 89 + --replace-fail '/usr/bin/libtool' 'ar' \ 90 + --replace-fail 'AR="libtool"' 'AR="ar"' \ 91 + --replace-fail 'ARFLAGS="-o"' 'ARFLAGS="-r"' 92 92 ''; 93 93 }) 94 94 ```
+1 -1
doc/languages-frameworks/rust.section.md
··· 701 701 hello = attrs: lib.optionalAttrs (lib.versionAtLeast attrs.version "1.0") { 702 702 postPatch = '' 703 703 substituteInPlace lib/zoneinfo.rs \ 704 - --replace "/usr/share/zoneinfo" "${tzdata}/share/zoneinfo" 704 + --replace-fail "/usr/share/zoneinfo" "${tzdata}/share/zoneinfo" 705 705 ''; 706 706 }; 707 707 };
+1 -1
doc/stdenv/platform-notes.chapter.md
··· 54 54 # ... 55 55 prePatch = '' 56 56 substituteInPlace Makefile \ 57 - --replace '/usr/bin/xcrun clang' clang 57 + --replace-fail '/usr/bin/xcrun clang' clang 58 58 ''; 59 59 } 60 60 ```
+17 -6
doc/stdenv/stdenv.chapter.md
··· 230 230 231 231 postInstall = '' 232 232 substituteInPlace $out/bin/solo5-virtio-mkimage \ 233 - --replace "/usr/lib/syslinux" "${syslinux}/share/syslinux" \ 234 - --replace "/usr/share/syslinux" "${syslinux}/share/syslinux" \ 235 - --replace "cp " "cp --no-preserve=mode " 233 + --replace-fail "/usr/lib/syslinux" "${syslinux}/share/syslinux" \ 234 + --replace-fail "/usr/share/syslinux" "${syslinux}/share/syslinux" \ 235 + --replace-fail "cp " "cp --no-preserve=mode " 236 236 237 237 wrapProgram $out/bin/solo5-virtio-mkimage \ 238 238 --prefix PATH : ${lib.makeBinPath [ dosfstools mtools parted syslinux ]} ··· 1253 1253 1254 1254 Performs string substitution on the contents of \<infile\>, writing the result to \<outfile\>. The substitutions in \<subs\> are of the following form: 1255 1255 1256 - #### `--replace` \<s1\> \<s2\> {#fun-substitute-replace} 1256 + #### `--replace-fail` \<s1\> \<s2\> {#fun-substitute-replace-fail} 1257 + 1258 + Replace every occurrence of the string \<s1\> by \<s2\>. 1259 + Will error if no change is made. 1260 + 1261 + #### `--replace-warn` \<s1\> \<s2\> {#fun-substitute-replace-warn} 1262 + 1263 + Replace every occurrence of the string \<s1\> by \<s2\>. 1264 + Will print a warning if no change is made. 1265 + 1266 + #### `--replace-quiet` \<s1\> \<s2\> {#fun-substitute-replace-quiet} 1257 1267 1258 1268 Replace every occurrence of the string \<s1\> by \<s2\>. 1269 + Will do nothing if no change can be made. 1259 1270 1260 1271 #### `--subst-var` \<varName\> {#fun-substitute-subst-var} 1261 1272 ··· 1269 1280 1270 1281 ```shell 1271 1282 substitute ./foo.in ./foo.out \ 1272 - --replace /usr/bin/bar $bar/bin/bar \ 1273 - --replace "a string containing spaces" "some other text" \ 1283 + --replace-fail /usr/bin/bar $bar/bin/bar \ 1284 + --replace-fail "a string containing spaces" "some other text" \ 1274 1285 --subst-var someVar 1275 1286 ``` 1276 1287
+18
nixos/doc/manual/configuration/linux-kernel.chapter.md
··· 92 92 boot.kernelPackages = pkgs.linuxPackagesFor yourCustomKernel; 93 93 ``` 94 94 95 + ## Rust {#sec-linux-rust} 96 + 97 + The Linux kernel does not have Rust language support enabled by 98 + default. For kernel versions 6.7 or newer, experimental Rust support 99 + can be enabled. In a NixOS configuration, set: 100 + 101 + ```nix 102 + boot.kernelPatches = [ 103 + { 104 + name = "Rust Support"; 105 + patch = null; 106 + features = { 107 + rust = true; 108 + }; 109 + } 110 + ]; 111 + ``` 112 + 95 113 ## Developing kernel modules {#sec-linux-config-developing-modules} 96 114 97 115 This section was moved to the [Nixpkgs manual](https://nixos.org/nixpkgs/manual#sec-linux-kernel-developing-modules).
+4
nixos/doc/manual/release-notes/rl-2405.section.md
··· 133 133 134 134 - `services.resolved.fallbackDns` can now be used to disable the upstream fallback servers entirely by setting it to an empty list. To get the previous behaviour of the upstream defaults set it to null, the new default, instead. 135 135 136 + - `xxd` has been moved from `vim` default output to its own output to reduce closure size. The canonical way to reference it across all platforms is `unixtools.xxd`. 137 + 136 138 - `services.avahi.nssmdns` got split into `services.avahi.nssmdns4` and `services.avahi.nssmdns6` which enable the mDNS NSS switch for IPv4 and IPv6 respectively. 137 139 Since most mDNS responders only register IPv4 addresses, most users want to keep the IPv6 support disabled to avoid long timeouts. 138 140 ··· 230 232 231 233 - The option [`services.nextcloud.config.dbport`] of the Nextcloud module was removed to match upstream. 232 234 The port can be specified in [`services.nextcloud.config.dbhost`](#opt-services.nextcloud.config.dbhost). 235 + 236 + - `stdenv`: The `--replace` flag in `substitute`, `substituteInPlace`, `substituteAll`, `substituteAllStream`, and `substituteStream` is now deprecated if favor of the new `--replace-fail`, `--replace-warn` and `--replace-quiet`. The deprecated `--replace` equates to `--replace-warn`. 233 237 234 238 - The Yama LSM is now enabled by default in the kernel, which prevents ptracing 235 239 non-child processes. This means you will not be able to attach gdb to an
+2 -2
nixos/modules/system/boot/luksroot.nix
··· 1076 1076 boot.initrd.systemd = { 1077 1077 contents."/etc/crypttab".source = stage1Crypttab; 1078 1078 1079 - extraBin.systemd-cryptsetup = "${config.boot.initrd.systemd.package}/lib/systemd/systemd-cryptsetup"; 1079 + extraBin.systemd-cryptsetup = "${config.boot.initrd.systemd.package}/bin/systemd-cryptsetup"; 1080 1080 1081 1081 additionalUpstreamUnits = [ 1082 1082 "cryptsetup-pre.target" ··· 1084 1084 "remote-cryptsetup.target" 1085 1085 ]; 1086 1086 storePaths = [ 1087 - "${config.boot.initrd.systemd.package}/lib/systemd/systemd-cryptsetup" 1087 + "${config.boot.initrd.systemd.package}/bin/systemd-cryptsetup" 1088 1088 "${config.boot.initrd.systemd.package}/lib/systemd/system-generators/systemd-cryptsetup-generator" 1089 1089 ]; 1090 1090
+3
nixos/modules/system/boot/systemd/initrd.nix
··· 70 70 "systemd-tmpfiles-setup.service" 71 71 "timers.target" 72 72 "umount.target" 73 + "systemd-bsod.service" 73 74 ] ++ cfg.additionalUpstreamUnits; 74 75 75 76 upstreamWants = [ ··· 424 425 425 426 storePaths = [ 426 427 # systemd tooling 428 + "${cfg.package}/lib/systemd/systemd-executor" 427 429 "${cfg.package}/lib/systemd/systemd-fsck" 428 430 "${cfg.package}/lib/systemd/systemd-hibernate-resume" 429 431 "${cfg.package}/lib/systemd/systemd-journald" ··· 433 435 "${cfg.package}/lib/systemd/systemd-shutdown" 434 436 "${cfg.package}/lib/systemd/systemd-sulogin-shell" 435 437 "${cfg.package}/lib/systemd/systemd-sysctl" 438 + "${cfg.package}/lib/systemd/systemd-bsod" 436 439 437 440 # generators 438 441 "${cfg.package}/lib/systemd/system-generators/systemd-debug-generator"
+1
nixos/tests/all-tests.nix
··· 451 451 kerberos = handleTest ./kerberos/default.nix {}; 452 452 kernel-generic = handleTest ./kernel-generic.nix {}; 453 453 kernel-latest-ath-user-regd = handleTest ./kernel-latest-ath-user-regd.nix {}; 454 + kernel-rust = runTestOn ["x86_64-linux"] ./kernel-rust.nix; 454 455 keter = handleTest ./keter.nix {}; 455 456 kexec = handleTest ./kexec.nix {}; 456 457 keycloak = discoverTests (import ./keycloak.nix);
+30
nixos/tests/kernel-rust.nix
··· 1 + { pkgs, ... }: { 2 + name = "kernel-rust"; 3 + meta = with pkgs.lib.maintainers; { 4 + maintainers = [ blitz ]; 5 + }; 6 + 7 + nodes.machine = { config, pkgs, ... }: 8 + { 9 + boot.kernelPackages = pkgs.linuxPackages_testing; 10 + 11 + boot.extraModulePackages = [ 12 + config.boot.kernelPackages.rust-out-of-tree-module 13 + ]; 14 + 15 + boot.kernelPatches = [ 16 + { 17 + name = "Rust Support"; 18 + patch = null; 19 + features = { 20 + rust = true; 21 + }; 22 + } 23 + ]; 24 + }; 25 + 26 + testScript = '' 27 + machine.wait_for_unit("default.target") 28 + machine.succeed("modprobe rust_out_of_tree") 29 + ''; 30 + }
+2 -2
pkgs/applications/audio/mpg123/default.nix
··· 21 21 22 22 stdenv.mkDerivation rec { 23 23 pname = "${lib.optionalString libOnly "lib"}mpg123"; 24 - version = "1.32.3"; 24 + version = "1.32.4"; 25 25 26 26 src = fetchurl { 27 27 url = "mirror://sourceforge/mpg123/mpg123-${version}.tar.bz2"; 28 - hash = "sha256-LZkTpX1O6PSXoYLG6CWCYCQJeCpPtIHpif7r9ENYZ7Q="; 28 + hash = "sha256-WplmQzj7L3UbZi9A7iWATQydtrV13LXOdBxtxkIkoIo="; 29 29 }; 30 30 31 31 outputs = [ "out" "dev" "man" ] ++ lib.optional withConplay "conplay";
+18 -15
pkgs/applications/editors/neovim/default.nix
··· 12 12 13 13 # now defaults to false because some tests can be flaky (clipboard etc), see 14 14 # also: https://github.com/neovim/neovim/issues/16233 15 - , doCheck ? false 16 15 , nodejs ? null, fish ? null, python3 ? null 17 16 }: 18 - 19 - let 17 + stdenv.mkDerivation (finalAttrs: 18 + let 20 19 nvim-lpeg-dylib = luapkgs: if stdenv.isDarwin 21 20 then (luapkgs.lpeg.overrideAttrs (oa: { 22 21 preConfigure = '' ··· 42 41 (nvim-lpeg-dylib ps) 43 42 luabitop 44 43 mpack 45 - ] ++ lib.optionals doCheck [ 44 + ] ++ lib.optionals finalAttrs.doCheck [ 46 45 luv 47 46 coxpcall 48 47 busted ··· 64 63 in deterministicLuajit.withPackages(ps: [ ps.mpack (nvim-lpeg-dylib ps) ]) 65 64 else lua.luaOnBuild; 66 65 67 - pyEnv = python3.withPackages(ps: with ps; [ pynvim msgpack ]); 68 66 69 - in 70 - stdenv.mkDerivation rec { 67 + in { 71 68 pname = "neovim-unwrapped"; 72 69 version = "0.9.5"; 73 70 71 + __structuredAttrs = true; 72 + 74 73 src = fetchFromGitHub { 75 74 owner = "neovim"; 76 75 repo = "neovim"; 77 - rev = "v${version}"; 76 + rev = "v${finalAttrs.version}"; 78 77 hash = "sha256-CcaBqA0yFCffNPmXOJTo8c9v1jrEBiqAl8CG5Dj5YxE="; 79 78 }; 80 79 ··· 87 86 88 87 dontFixCmake = true; 89 88 90 - inherit lua; 89 + inherit lua treesitter-parsers; 91 90 92 91 buildInputs = [ 93 92 gperf ··· 105 104 tree-sitter 106 105 unibilium 107 106 ] ++ lib.optionals stdenv.isDarwin [ libiconv CoreServices ] 108 - ++ lib.optionals doCheck [ glibcLocales procps ] 107 + ++ lib.optionals finalAttrs.doCheck [ glibcLocales procps ] 109 108 ; 110 109 111 - inherit doCheck; 110 + doCheck = false; 112 111 113 112 # to be exhaustive, one could run 114 113 # make oldtests too 115 114 checkPhase = '' 115 + runHook preCheck 116 116 make functionaltest 117 + runHook postCheck 117 118 ''; 118 119 119 120 nativeBuildInputs = [ ··· 123 124 ]; 124 125 125 126 # extra programs test via `make functionaltest` 126 - nativeCheckInputs = [ 127 + nativeCheckInputs = let 128 + pyEnv = python3.withPackages(ps: with ps; [ pynvim msgpack ]); 129 + in [ 127 130 fish 128 131 nodejs 129 132 pyEnv # for src/clint.py ··· 166 169 ln -s \ 167 170 ${tree-sitter.buildGrammar { 168 171 inherit language src; 169 - version = "neovim-${version}"; 172 + version = "neovim-${finalAttrs.version}"; 170 173 }}/parser \ 171 174 $out/lib/nvim/parser/${language}.so 172 175 '') 173 - treesitter-parsers); 176 + finalAttrs.treesitter-parsers); 174 177 175 178 shellHook='' 176 179 export VIMRUNTIME=$PWD/runtime ··· 199 202 maintainers = with maintainers; [ manveru rvolosatovs ]; 200 203 platforms = platforms.unix; 201 204 }; 202 - } 205 + })
+20 -8
pkgs/applications/editors/vim/common.nix
··· 1 1 { lib, fetchFromGitHub }: 2 2 rec { 3 - version = "9.0.2116"; 3 + version = "9.1.0004"; 4 + 5 + outputs = [ "out" "xxd" ]; 4 6 5 7 src = fetchFromGitHub { 6 8 owner = "vim"; 7 9 repo = "vim"; 8 10 rev = "v${version}"; 9 - hash = "sha256-ZKcNg/RrjvEsxpIcTjzQYi1xig3zLeTV+PXaBb4gUuM="; 11 + hash = "sha256-Y5ZSJLEFdptEMA0xvstr6H1G4iiaYXpkJGSSFwoTfc0="; 10 12 }; 11 13 12 14 enableParallelBuilding = true; ··· 14 16 15 17 hardeningDisable = [ "fortify" ]; 16 18 17 - postPatch = 18 - # Use man from $PATH; escape sequences are still problematic. 19 - '' 20 - substituteInPlace runtime/ftplugin/man.vim \ 21 - --replace "/usr/bin/man " "man " 22 - ''; 19 + # Use man from $PATH; escape sequences are still problematic. 20 + postPatch = '' 21 + substituteInPlace runtime/ftplugin/man.vim \ 22 + --replace "/usr/bin/man " "man " 23 + ''; 24 + 25 + # man page moving is done in postFixup instead of postInstall otherwise fixupPhase moves it right back where it was 26 + postFixup = '' 27 + moveToOutput bin/xxd "$xxd" 28 + moveToOutput share/man/man1/xxd.1.gz "$xxd" 29 + for manFile in $out/share/man/*/man1/xxd.1*; do 30 + # moveToOutput does not take full paths or wildcards... 31 + moveToOutput "share/man/$(basename "$(dirname "$(dirname "$manFile")")")/man1/xxd.1.gz" "$xxd" 32 + done 33 + ''; 23 34 24 35 meta = with lib; { 25 36 description = "The most popular clone of the VI editor"; ··· 28 39 maintainers = with maintainers; [ das_j equirosa ]; 29 40 platforms = platforms.unix; 30 41 mainProgram = "vim"; 42 + outputsToInstall = [ "out" "xxd" ]; 31 43 }; 32 44 }
+1 -8
pkgs/applications/editors/vim/default.nix
··· 15 15 stdenv.mkDerivation { 16 16 pname = "vim"; 17 17 18 - inherit (common) version src postPatch hardeningDisable enableParallelBuilding enableParallelInstalling meta; 18 + inherit (common) version outputs src postPatch hardeningDisable enableParallelBuilding enableParallelInstalling postFixup meta; 19 19 20 20 nativeBuildInputs = [ gettext pkg-config ]; 21 21 buildInputs = [ ncurses bash gawk ] ··· 62 62 ''; 63 63 64 64 __impureHostDeps = [ "/dev/ptmx" ]; 65 - 66 - # To fix the trouble in vim73, that it cannot cross-build with this patch 67 - # to bypass a configure script check that cannot be done cross-building. 68 - # http://groups.google.com/group/vim_dev/browse_thread/thread/66c02efd1523554b?pli=1 69 - # patchPhase = '' 70 - # sed -i -e 's/as_fn_error.*int32.*/:/' src/auto/configure 71 - # ''; 72 65 }
+2 -2
pkgs/applications/editors/vim/full.nix
··· 66 66 67 67 pname = "vim-full"; 68 68 69 - inherit (common) version postPatch hardeningDisable enableParallelBuilding meta; 69 + inherit (common) version outputs postPatch hardeningDisable enableParallelBuilding meta; 70 70 71 71 src = builtins.getAttr source { 72 72 default = common.src; # latest release ··· 181 181 ln -sfn '${nixosRuntimepath}' "$out"/share/vim/vimrc 182 182 ''; 183 183 184 - postFixup = lib.optionalString wrapPythonDrv '' 184 + postFixup = common.postFixup + lib.optionalString wrapPythonDrv '' 185 185 wrapProgram "$out/bin/vim" --prefix PATH : "${python3}/bin" \ 186 186 --set NIX_PYTHONPATH "${python3}/${python3.sitePackages}" 187 187 '';
+4 -9
pkgs/applications/editors/vim/plugins/overrides.nix
··· 97 97 , errcheck 98 98 , go-motion 99 99 , go-tools 100 - , gocode 101 100 , gocode-gomod 102 101 , godef 103 102 , gogetdoc ··· 110 109 , iferr 111 110 , impl 112 111 , reftools 112 + , revive 113 113 , # hurl dependencies 114 114 hurl 115 115 , # must be lua51Packages ··· 1530 1530 vim-go = 1531 1531 let 1532 1532 binPath = lib.makeBinPath [ 1533 - # TODO: package commented packages 1534 1533 asmfmt 1535 1534 delve 1536 1535 errcheck 1537 1536 go-motion 1538 - go-tools # contains staticcheck 1539 - gocode 1537 + go-tools # contains staticcheck, keyify 1540 1538 gocode-gomod 1541 1539 godef 1542 1540 gogetdoc ··· 1544 1542 golangci-lint 1545 1543 gomodifytags 1546 1544 gopls 1547 - # gorename 1548 1545 gotags 1549 - gotools 1550 - # guru 1546 + gotools # contains guru, gorename 1551 1547 iferr 1552 1548 impl 1553 - # keyify 1554 1549 reftools 1555 - # revive 1550 + revive 1556 1551 ]; 1557 1552 in 1558 1553 super.vim-go.overrideAttrs {
+2 -2
pkgs/applications/graphics/ImageMagick/default.nix
··· 49 49 50 50 stdenv.mkDerivation (finalAttrs: { 51 51 pname = "imagemagick"; 52 - version = "7.1.1-25"; 52 + version = "7.1.1-26"; 53 53 54 54 src = fetchFromGitHub { 55 55 owner = "ImageMagick"; 56 56 repo = "ImageMagick"; 57 57 rev = finalAttrs.version; 58 - hash = "sha256-HKDeeh8DNj0y7wS4DqctXhmNaOqZ02JeBXRFrEpH0M4="; 58 + hash = "sha256-diJhCRDT0SbAYZdBPoxZJWlrUW2Nz4/d7H0Nnybw0Yw="; 59 59 }; 60 60 61 61 outputs = [ "out" "dev" "doc" ]; # bin/ isn't really big
+3 -2
pkgs/applications/misc/mupdf/default.nix
··· 98 98 99 99 nativeBuildInputs = [ pkg-config ] 100 100 ++ lib.optional (enableGL || enableX11) copyDesktopItems 101 + ++ lib.optional (stdenv.isDarwin && (enableGL || enableX11)) desktopToDarwinBundle 101 102 ++ lib.optionals (enableCxx || enablePython) [ python3 python3.pkgs.setuptools python3.pkgs.libclang ] 102 103 ++ lib.optionals (enablePython) [ which swig ] 103 - ++ lib.optionals stdenv.isDarwin [ desktopToDarwinBundle fixDarwinDylibNames xcbuild ]; 104 + ++ lib.optionals stdenv.isDarwin [ fixDarwinDylibNames xcbuild ]; 104 105 105 106 buildInputs = [ freetype harfbuzz openjpeg jbig2dec libjpeg gumbo ] 106 107 ++ lib.optionals enableX11 [ libX11 libXext libXi libXrandr ] ··· 126 127 done 127 128 ''; 128 129 129 - desktopItems = [ 130 + desktopItems = lib.optionals (enableGL || enableX11) [ 130 131 (makeDesktopItem { 131 132 name = pname; 132 133 desktopName = pname;
+1 -1
pkgs/applications/networking/go-graft/default.nix
··· 13 13 14 14 CGO_ENABLED = 0; 15 15 16 - ldflags = [ "-X github.com/mzz2017/gg/cmd.Version=${version}" "-s" "-w" "-buildid=" ]; 16 + ldflags = [ "-X github.com/mzz2017/gg/cmd.Version=${version}" "-s" "-w" ]; 17 17 vendorHash = "sha256-fnM4ycqDyruCdCA1Cr4Ki48xeQiTG4l5dLVuAafEm14="; 18 18 subPackages = [ "." ]; 19 19
+12
pkgs/applications/networking/sync/rsync/configure.ac-fix-failing-IPv6-check.patch
··· 1 + diff -rup rsync-3.2.7/configure.sh rsync-3.2.7-fixed/configure.sh 2 + --- rsync-3.2.7/configure.sh 2022-10-20 17:57:22 3 + +++ rsync-3.2.7-fixed/configure.sh 2024-01-01 19:51:58 4 + @@ -7706,7 +7706,7 @@ else $as_nop 5 + #include <stdlib.h> 6 + #include <sys/types.h> 7 + #include <sys/socket.h> 8 + -main() 9 + +int main() 10 + { 11 + if (socket(AF_INET6, SOCK_STREAM, 0) < 0) 12 + exit(1);
+2
pkgs/applications/networking/sync/rsync/default.nix
··· 34 34 # https://github.com/WayneD/rsync/issues/511#issuecomment-1774612577 35 35 # original source: https://build.opensuse.org/package/view_file/network/rsync/rsync-fortified-strlcpy-fix.patch?expand=1&rev=3f8dd2f4a404c96c0f69176e60893714 36 36 ./rsync-fortified-strlcpy-fix.patch 37 + # https://github.com/WayneD/rsync/pull/558 38 + ./configure.ac-fix-failing-IPv6-check.patch 37 39 ]; 38 40 39 41 buildInputs = [ libiconv zlib popt ]
+2 -1
pkgs/applications/science/chemistry/octopus/default.nix
··· 1 - { lib, stdenv, fetchFromGitLab, gfortran, perl, procps 1 + { lib, stdenv, fetchFromGitLab, gfortran, which, perl, procps 2 2 , libyaml, libxc, fftw, blas, lapack, gsl, netcdf, arpack, autoreconfHook 3 3 , python3 4 4 , enableFma ? stdenv.hostPlatform.fmaSupport ··· 22 22 }; 23 23 24 24 nativeBuildInputs = [ 25 + which 25 26 perl 26 27 procps 27 28 autoreconfHook
+1 -1
pkgs/applications/version-management/gitsign/default.nix
··· 19 19 20 20 nativeBuildInputs = [ makeWrapper ]; 21 21 22 - ldflags = [ "-s" "-w" "-buildid=" "-X github.com/sigstore/gitsign/pkg/version.gitVersion=${version}" ]; 22 + ldflags = [ "-s" "-w" "-X github.com/sigstore/gitsign/pkg/version.gitVersion=${version}" ]; 23 23 24 24 preCheck = '' 25 25 # test all paths
+3 -3
pkgs/applications/version-management/mercurial/default.nix
··· 23 23 24 24 self = python3Packages.buildPythonApplication rec { 25 25 pname = "mercurial${lib.optionalString fullBuild "-full"}"; 26 - version = "6.6.1"; 26 + version = "6.6.2"; 27 27 28 28 src = fetchurl { 29 29 url = "https://mercurial-scm.org/release/mercurial-${version}.tar.gz"; 30 - sha256 = "sha256-opRlo/5Ao+jUm6g0MTSsKrooa2g//rg42gz25FIflpU="; 30 + sha256 = "sha256-y0lNe+fdwvydMXHIiDCvnAKyHHU+PlET3vrJwDc7S2A="; 31 31 }; 32 32 33 33 format = "other"; ··· 37 37 cargoDeps = if rustSupport then rustPlatform.fetchCargoTarball { 38 38 inherit src; 39 39 name = "mercurial-${version}"; 40 - sha256 = "sha256-wLV0qdCfMgGpZRxnZik/lRwZHm/66p0sJn/mYVRvRkQ="; 40 + sha256 = "sha256-yOysqMrTWDx/ENcJng8Rm338NI9vpuBGH6Yq8B7+MFg="; 41 41 sourceRoot = "mercurial-${version}/rust"; 42 42 } else null; 43 43 cargoRoot = if rustSupport then "rust" else null;
+2 -2
pkgs/applications/video/vlc/default.nix
··· 44 44 , libmtp 45 45 , liboggz 46 46 , libopus 47 - , libplacebo 47 + , libplacebo_5 48 48 , libpulseaudio 49 49 , libraw1394 50 50 , librsvg ··· 164 164 libmtp 165 165 liboggz 166 166 libopus 167 - libplacebo 167 + libplacebo_5 168 168 libpulseaudio 169 169 libraw1394 170 170 librsvg
+2 -2
pkgs/build-support/cc-wrapper/default.nix
··· 525 525 # additional -isystem flags will confuse gfortran (see 526 526 # https://github.com/NixOS/nixpkgs/pull/209870#issuecomment-1500550903) 527 527 + optionalString (libcxx == null && isClang && (useGccForLibs && gccForLibs.langCC or false)) '' 528 - for dir in ${gccForLibs}${lib.optionalString (hostPlatform != targetPlatform) "/${targetPlatform.config}"}/include/c++/*; do 528 + for dir in ${gccForLibs}/include/c++/*; do 529 529 echo "-isystem $dir" >> $out/nix-support/libcxx-cxxflags 530 530 done 531 - for dir in ${gccForLibs}${lib.optionalString (hostPlatform != targetPlatform) "/${targetPlatform.config}"}/include/c++/*/${targetPlatform.config}; do 531 + for dir in ${gccForLibs}/include/c++/*/${targetPlatform.config}; do 532 532 echo "-isystem $dir" >> $out/nix-support/libcxx-cxxflags 533 533 done 534 534 ''
+6
pkgs/build-support/go/module.nix
··· 39 39 # Not needed with buildGoModule 40 40 , goPackagePath ? "" 41 41 42 + , ldflags ? [ ] 43 + 42 44 # needed for buildFlags{,Array} warning 43 45 , buildFlags ? "" 44 46 , buildFlagsArray ? "" ··· 153 155 154 156 GOFLAGS = lib.optionals (!proxyVendor) [ "-mod=vendor" ] ++ lib.optionals (!allowGoReference) [ "-trimpath" ]; 155 157 inherit CGO_ENABLED enableParallelBuilding GO111MODULE GOTOOLCHAIN; 158 + 159 + # If not set to an explicit value, set the buildid empty for reproducibility. 160 + ldflags = ldflags ++ lib.optionals (!lib.any (lib.hasPrefix "-buildid=") ldflags) [ "-buildid=" ]; 156 161 157 162 configurePhase = args.configurePhase or ('' 158 163 runHook preConfigure ··· 301 306 lib.warnIf (args' ? vendorSha256) "`vendorSha256` is deprecated. Use `vendorHash` instead" 302 307 lib.warnIf (buildFlags != "" || buildFlagsArray != "") 303 308 "Use the `ldflags` and/or `tags` attributes instead of `buildFlags`/`buildFlagsArray`" 309 + lib.warnIf (builtins.elem "-buildid=" ldflags) "`-buildid=` is set by default as ldflag by buildGoModule" 304 310 package
+6
pkgs/build-support/go/package.nix
··· 37 37 38 38 , CGO_ENABLED ? go.CGO_ENABLED 39 39 40 + , ldflags ? [ ] 41 + 40 42 # needed for buildFlags{,Array} warning 41 43 , buildFlags ? "" 42 44 , buildFlagsArray ? "" ··· 90 92 GOFLAGS = lib.optionals (!allowGoReference) [ "-trimpath" ]; 91 93 92 94 GOARM = toString (lib.intersectLists [(stdenv.hostPlatform.parsed.cpu.version or "")] ["5" "6" "7"]); 95 + 96 + # If not set to an explicit value, set the buildid empty for reproducibility. 97 + ldflags = ldflags ++ lib.optionals (!lib.any (lib.hasPrefix "-buildid=") ldflags) [ "-buildid=" ]; 93 98 94 99 configurePhase = args.configurePhase or ('' 95 100 runHook preConfigure ··· 280 285 in 281 286 lib.warnIf (buildFlags != "" || buildFlagsArray != "") 282 287 "Use the `ldflags` and/or `tags` attributes instead of `buildFlags`/`buildFlagsArray`" 288 + lib.warnIf (builtins.elem "-buildid=" ldflags) "`-buildid=` is set by default as ldflag by buildGoModule" 283 289 package
+1 -1
pkgs/by-name/at/athens/package.nix
··· 18 18 vendorHash = "sha256-8+PdkanodNZW/xeFf+tDm3Ej7DRSpBBtiT/CqjnWthw="; 19 19 20 20 CGO_ENABLED = "0"; 21 - ldflags = [ "-s" "-w" "-buildid=" "-X github.com/gomods/athens/pkg/build.version=${version}" ]; 21 + ldflags = [ "-s" "-w" "-X github.com/gomods/athens/pkg/build.version=${version}" ]; 22 22 23 23 subPackages = [ "cmd/proxy" ]; 24 24
+158
pkgs/by-name/bl/bluez/package.nix
··· 1 + { lib 2 + , stdenv 3 + , alsa-lib 4 + , dbus 5 + , docutils 6 + , ell 7 + , enableExperimental ? false 8 + , fetchpatch 9 + , fetchurl 10 + , glib 11 + , json_c 12 + , libical 13 + , pkg-config 14 + , python3 15 + , readline 16 + , systemdMinimal 17 + , udev 18 + }: 19 + 20 + stdenv.mkDerivation (finalAttrs: { 21 + pname = "bluez"; 22 + version = "5.71"; 23 + 24 + src = fetchurl { 25 + url = "mirror://kernel/linux/bluetooth/bluez-${finalAttrs.version}.tar.xz"; 26 + hash = "sha256-uCjUGMk87R9Vthb7VILPAVN0QL+zT72hpWTz7OlHNdg="; 27 + }; 28 + 29 + buildInputs = [ 30 + alsa-lib 31 + dbus 32 + ell 33 + glib 34 + json_c 35 + libical 36 + python3 37 + readline 38 + udev 39 + ]; 40 + 41 + nativeBuildInputs = [ 42 + docutils 43 + pkg-config 44 + python3.pkgs.wrapPython 45 + ]; 46 + 47 + outputs = [ "out" "dev" "test" ]; 48 + 49 + postPatch = '' 50 + substituteInPlace tools/hid2hci.rules \ 51 + --replace /sbin/udevadm ${systemdMinimal}/bin/udevadm \ 52 + --replace "hid2hci " "$out/lib/udev/hid2hci " 53 + '' + 54 + # Disable some tests: 55 + # - test-mesh-crypto depends on the following kernel settings: 56 + # CONFIG_CRYPTO_[USER|USER_API|USER_API_AEAD|USER_API_HASH|AES|CCM|AEAD|CMAC] 57 + '' 58 + if [[ ! -f unit/test-mesh-crypto.c ]]; then 59 + echo "unit/test-mesh-crypto.c no longer exists" 60 + false 61 + fi 62 + echo 'int main() { return 77; }' > unit/test-mesh-crypto.c 63 + ''; 64 + 65 + configureFlags = [ 66 + "--localstatedir=/var" 67 + (lib.enableFeature enableExperimental "experimental") 68 + (lib.enableFeature true "btpclient") 69 + (lib.enableFeature true "cups") 70 + (lib.enableFeature true "external-ell") 71 + (lib.enableFeature true "health") 72 + (lib.enableFeature true "hid2hci") 73 + (lib.enableFeature true "library") 74 + (lib.enableFeature true "logger") 75 + (lib.enableFeature true "mesh") 76 + (lib.enableFeature true "midi") 77 + (lib.enableFeature true "nfc") 78 + (lib.enableFeature true "pie") 79 + (lib.enableFeature true "sixaxis") 80 + # Set "deprecated" to provide ciptool, sdptool, and rfcomm (unmaintained); 81 + # superseded by new D-Bus APIs 82 + (lib.enableFeature true "deprecated") 83 + (lib.withFeatureAs true "dbusconfdir" "${placeholder "out"}/share") 84 + (lib.withFeatureAs true "dbussessionbusdir" "${placeholder "out"}/share/dbus-1/services") 85 + (lib.withFeatureAs true "dbussystembusdir" "${placeholder "out"}/share/dbus-1/system-services") 86 + (lib.withFeatureAs true "systemdsystemunitdir" "${placeholder "out"}/etc/systemd/system") 87 + (lib.withFeatureAs true "systemduserunitdir" "${placeholder "out"}/etc/systemd/user") 88 + (lib.withFeatureAs true "udevdir" "${placeholder "out"}/lib/udev") 89 + ]; 90 + 91 + makeFlags = [ 92 + "rulesdir=${placeholder "out"}/lib/udev/rules.d" 93 + ]; 94 + 95 + # Work around `make install' trying to create /var/lib/bluetooth. 96 + installFlags = [ 97 + "statedir=$(TMPDIR)/var/lib/bluetooth" 98 + ]; 99 + 100 + doCheck = stdenv.hostPlatform.isx86_64; 101 + 102 + postInstall = let 103 + pythonPath = with python3.pkgs; [ 104 + dbus-python 105 + pygobject3 106 + recursivePthLoader 107 + ]; 108 + in 109 + '' 110 + mkdir -p $test/{bin,test} 111 + cp -a test $test 112 + pushd $test/test 113 + for t in \ 114 + list-devices \ 115 + monitor-bluetooth \ 116 + simple-agent \ 117 + test-adapter \ 118 + test-device \ 119 + test-thermometer \ 120 + ; do 121 + ln -s ../test/$t $test/bin/bluez-$t 122 + done 123 + popd 124 + wrapPythonProgramsIn $test/test "$test/test ${toString pythonPath}" 125 + 126 + # for bluez4 compatibility for NixOS 127 + mkdir $out/sbin 128 + ln -s ../libexec/bluetooth/bluetoothd $out/sbin/bluetoothd 129 + ln -s ../libexec/bluetooth/obexd $out/sbin/obexd 130 + 131 + # Add extra configuration 132 + mkdir $out/etc/bluetooth 133 + ln -s /etc/bluetooth/main.conf $out/etc/bluetooth/main.conf 134 + 135 + # https://github.com/NixOS/nixpkgs/issues/204418 136 + ln -s /etc/bluetooth/input.conf $out/etc/bluetooth/input.conf 137 + ln -s /etc/bluetooth/network.conf $out/etc/bluetooth/network.conf 138 + 139 + # Add missing tools, ref https://git.archlinux.org/svntogit/packages.git/tree/trunk/PKGBUILD?h=packages/bluez 140 + for files in $(find tools/ -type f -perm -755); do 141 + filename=$(basename $files) 142 + install -Dm755 tools/$filename $out/bin/$filename 143 + done 144 + install -Dm755 attrib/gatttool $out/bin/gatttool 145 + ''; 146 + 147 + enableParallelBuilding = true; 148 + 149 + meta = { 150 + homepage = "https://www.bluez.org/"; 151 + description = "Official Linux Bluetooth protocol stack"; 152 + changelog = "https://git.kernel.org/pub/scm/bluetooth/bluez.git/tree/ChangeLog?h=${finalAttrs.version}"; 153 + license = with lib.licenses; [ bsd2 gpl2Plus lgpl21Plus mit ]; 154 + mainProgram = "btinfo"; 155 + maintainers = with lib.maintainers; [ AndersonTorres ]; 156 + platforms = lib.platforms.linux; 157 + }; 158 + })
+77
pkgs/by-name/li/libplacebo_5/package.nix
··· 1 + { lib 2 + , stdenv 3 + , fetchFromGitLab 4 + , meson 5 + , ninja 6 + , pkg-config 7 + , python3Packages 8 + , vulkan-headers 9 + , vulkan-loader 10 + , shaderc 11 + , lcms2 12 + , libGL 13 + , libX11 14 + , libunwind 15 + , libdovi 16 + }: 17 + 18 + stdenv.mkDerivation rec { 19 + pname = "libplacebo"; 20 + version = "5.264.1"; 21 + 22 + src = fetchFromGitLab { 23 + domain = "code.videolan.org"; 24 + owner = "videolan"; 25 + repo = pname; 26 + rev = "v${version}"; 27 + hash = "sha256-YEefuEfJURi5/wswQKskA/J1UGzessQQkBpltJ0Spq8="; 28 + }; 29 + 30 + nativeBuildInputs = [ 31 + meson 32 + ninja 33 + pkg-config 34 + vulkan-headers 35 + python3Packages.jinja2 36 + python3Packages.glad2 37 + ]; 38 + 39 + buildInputs = [ 40 + vulkan-loader 41 + shaderc 42 + lcms2 43 + libGL 44 + libX11 45 + libunwind 46 + libdovi 47 + ]; 48 + 49 + mesonFlags = with lib; [ 50 + (mesonOption "vulkan-registry" "${vulkan-headers}/share/vulkan/registry/vk.xml") 51 + (mesonBool "demos" false) # Don't build and install the demo programs 52 + (mesonEnable "d3d11" false) # Disable the Direct3D 11 based renderer 53 + (mesonEnable "glslang" false) # rely on shaderc for GLSL compilation instead 54 + ] ++ optionals stdenv.isDarwin [ 55 + (mesonEnable "unwind" false) # libplacebo doesn’t build with `darwin.libunwind` 56 + ]; 57 + 58 + postPatch = '' 59 + substituteInPlace meson.build \ 60 + --replace 'python_env.append' '#' 61 + ''; 62 + 63 + meta = with lib; { 64 + description = "Reusable library for GPU-accelerated video/image rendering primitives"; 65 + longDescription = '' 66 + Reusable library for GPU-accelerated image/view processing primitives and 67 + shaders, as well a batteries-included, extensible, high-quality rendering 68 + pipeline (similar to mpv's vo_gpu). Supports Vulkan, OpenGL and Metal (via 69 + MoltenVK). 70 + ''; 71 + homepage = "https://code.videolan.org/videolan/libplacebo"; 72 + changelog = "https://code.videolan.org/videolan/libplacebo/-/tags/v${version}"; 73 + license = licenses.lgpl21Plus; 74 + maintainers = with maintainers; [ primeos tadeokondrak ]; 75 + platforms = platforms.all; 76 + }; 77 + }
-27
pkgs/by-name/me/meson/007-darwin-case-sensitivity.patch
··· 1 - From a908a574daf8bac10bb2a0ee3771052d2167a85f Mon Sep 17 00:00:00 2001 2 - From: Randy Eckenrode <randy@largeandhighquality.com> 3 - Date: Sun, 3 Dec 2023 15:41:20 -0500 4 - Subject: [PATCH] Fix test failure on Darwin on a case-sensitive fs 5 - 6 - This was encountered while looking into an issue with 7 - https://github.com/NixOS/nixpkgs/pull/268583. 8 - 9 - I run my Nix store on case-sensitive APFS, so the test fails due to 10 - trying to link `-framework ldap` instead of `-framework LDAP`. 11 - --- 12 - test cases/osx/5 extra frameworks/meson.build | 2 +- 13 - 1 file changed, 1 insertion(+), 1 deletion(-) 14 - 15 - diff --git a/test cases/osx/5 extra frameworks/meson.build b/test cases/osx/5 extra frameworks/meson.build 16 - index f6c01e63a1bd..96532846c632 100644 17 - --- a/test cases/osx/5 extra frameworks/meson.build 18 - +++ b/test cases/osx/5 extra frameworks/meson.build 19 - @@ -7,7 +7,7 @@ dep_main = dependency('Foundation') 20 - assert(dep_main.type_name() == 'extraframeworks', 'type_name is ' + dep_main.type_name()) 21 - 22 - # https://github.com/mesonbuild/meson/issues/10002 23 - -ldap_dep = dependency('ldap', method : 'extraframework') 24 - +ldap_dep = dependency('LDAP', method : 'extraframework') 25 - assert(ldap_dep.type_name() == 'extraframeworks', 'type_name is ' + ldap_dep.type_name()) 26 - 27 - stlib = static_library('stat', 'stat.c', install : true, dependencies: [opengl_dep, ldap_dep])
+2 -5
pkgs/by-name/me/meson/package.nix
··· 18 18 in 19 19 python3.pkgs.buildPythonApplication rec { 20 20 pname = "meson"; 21 - version = "1.3.0"; 21 + version = "1.3.1"; 22 22 23 23 src = fetchFromGitHub { 24 24 owner = "mesonbuild"; 25 25 repo = "meson"; 26 26 rev = "refs/tags/${version}"; 27 - hash = "sha256-Jt3PWnbv/8P6Rvf3E/Yli2vdtfgx3CmsW+jlc9CK5KA="; 27 + hash = "sha256-KNNtHi3jx0MRiOgmluA4ucZJWB2WeIYdApfHuspbCqg="; 28 28 }; 29 29 30 30 patches = [ ··· 65 65 66 66 # Nixpkgs cctools does not have bitcode support. 67 67 ./006-disable-bitcode.patch 68 - 69 - # https://github.com/mesonbuild/meson/pull/12587 70 - ./007-darwin-case-sensitivity.patch 71 68 ]; 72 69 73 70 buildInputs = lib.optionals (python3.pythonOlder "3.9") [
+1 -1
pkgs/by-name/up/uplosi/package.nix
··· 16 16 vendorHash = "sha256-RsjUPLe8omoN+XGyNhHDxzNfZR7VVTkh/f/On1oCRqM="; 17 17 18 18 CGO_ENABLED = "0"; 19 - ldflags = [ "-s" "-w" "-buildid=" "-X main.version=${version}" ]; 19 + ldflags = [ "-s" "-w" "-X main.version=${version}" ]; 20 20 flags = [ "-trimpath" ]; 21 21 22 22 meta = with lib; {
+26
pkgs/by-name/vu/vulkan-volk/package.nix
··· 1 + { lib, stdenv, fetchFromGitHub, cmake, vulkan-headers }: 2 + 3 + stdenv.mkDerivation (finalAttrs: { 4 + pname = "volk"; 5 + version = "1.3.275.0"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "zeux"; 9 + repo = "volk"; 10 + rev = "vulkan-sdk-${finalAttrs.version}"; 11 + hash = "sha256-uTjLgJMGN8nOVhVIl/GNhO2jXe9ebhc9vzAwCDwfuf4="; 12 + }; 13 + 14 + nativeBuildInputs = [ cmake ]; 15 + buildInputs = [ vulkan-headers ]; 16 + 17 + cmakeFlags = ["-DVOLK_INSTALL=1"]; 18 + 19 + meta = with lib; { 20 + description = " Meta loader for Vulkan API"; 21 + homepage = "https://github.com/zeux/volk"; 22 + platforms = platforms.all; 23 + license = licenses.mit; 24 + maintainers = with maintainers; [ k900 ]; 25 + }; 26 + })
+2 -2
pkgs/data/misc/iana-etc/default.nix
··· 2 2 3 3 stdenvNoCC.mkDerivation rec { 4 4 pname = "iana-etc"; 5 - version = "20230316"; 5 + version = "20231227"; 6 6 7 7 src = fetchzip { 8 8 url = "https://github.com/Mic92/iana-etc/releases/download/${version}/iana-etc-${version}.tar.gz"; 9 - sha256 = "sha256-5acFYPSwevEw5tZNbQDpui3stWuMdnhaKHqC8lhnsOY="; 9 + sha256 = "sha256-8Pa6LtAml8axjrUS32UbFIqTtM8v124U2Tt0J4sC0Is="; 10 10 }; 11 11 12 12 installPhase = ''
+2
pkgs/development/compilers/gcc/common/configure-flags.nix
··· 135 135 # We pick "/" path to effectively avoid sysroot offset and make it work 136 136 # as a native case. 137 137 "--with-build-sysroot=/" 138 + # Same with the stdlibc++ headers embedded in the gcc output 139 + "--with-gxx-include-dir=${placeholder "out"}/include/c++/${version}/" 138 140 ] 139 141 140 142 # Basic configuration
+20 -8
pkgs/development/compilers/gcc/patches/12/mangle-NIX_STORE-in-__FILE__.patch
··· 12 12 Typical examples are `nix` -> `nlohmann_json` and `pipewire` -> 13 13 `lttng-ust.dev`. 14 14 15 + For this reason we want to remove the occurrences of hashes in the 16 + expansion of `__FILE__`. `nuke-references` does it by replacing hashes 17 + by `eeeeee...` but those paths are also used for debug symbols. It is 18 + handy to be able to invert the transformation to go back to the original 19 + store path for debuginfod servers. The chosen solution is to make the 20 + hash uppercase: 21 + - it does not trigger runtime references (except for all digit hashes, 22 + which are unlikely enough) 23 + - it visually looks like a bogus store path 24 + - it is easy to find the original store path if required 25 + 15 26 Ideally we would like to use `-fmacro-prefix-map=` feature of `gcc` as: 16 27 17 - -fmacro-prefix-map=/nix/store/$hash1-nlohmann-json-ver=/nix/store/eeee.eee-nlohmann-json-ver 28 + -fmacro-prefix-map=/nix/store/$hash1-nlohmann-json-ver=/nix/store/$HASH1-nlohmann-json-ver 18 29 -fmacro-prefix-map=/nix/... 19 30 20 31 In practice it quickly exhausts argument length limit due to `gcc` ··· 25 36 26 37 Tested as: 27 38 28 - $ printf "# 0 \"/nix/store/01234567890123456789012345678901-pppppp-vvvvvvv\" \nconst char * f(void) { return __FILE__; }" | NIX_STORE=/nix/store ./gcc/xgcc -Bgcc -x c - -S -o - 39 + $ printf "# 0 \"/nix/store/aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa-pppppp-vvvvvvv\" \nconst char * f(void) { return __FILE__; }" | NIX_STORE=/nix/store ./gcc/xgcc -Bgcc -x c - -S -o - 29 40 ... 30 - .string "/nix/store/eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee-pppppp-vvvvvvv" 41 + .string "/nix/store/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA-pppppp-vvvvvvv" 31 42 ... 32 43 33 44 Mangled successfully. ··· 43 54 /* Perform user-specified mapping of filename prefixes. Return the 44 55 GC-allocated new name corresponding to FILENAME or FILENAME if no 45 56 remapping was performed. */ 46 - @@ -76,7 +79,30 @@ remap_filename (file_prefix_map *maps, const char *filename) 57 + @@ -76,7 +79,31 @@ remap_filename (file_prefix_map *maps, const char *filename) 47 58 if (filename_ncmp (filename, map->old_prefix, map->old_len) == 0) 48 59 break; 49 60 if (!map) ··· 51 62 + { 52 63 + if (maps == macro_prefix_maps) 53 64 + { 54 - + /* Remap all fo $NIX_STORE/.{32} paths to 55 - + * equivalent $NIX_STORE/e{32}. 65 + + /* Remap the 32 characters after $NIX_STORE/ to uppercase 56 66 + * 57 67 + * That way we avoid argument parameters explosion 58 68 + * and still avoid embedding headers into runtime closure: ··· 66 76 + { 67 77 + s = (char *) ggc_alloc_atomic (name_len + 1); 68 78 + memcpy(s, name, name_len + 1); 69 - + memset(s + nix_store_len + 1, 'e', 32); 79 + + for (int i = nix_store_len + 1; i < nix_store_len + 1 + 32; i++) { 80 + + s[i] = TOUPPER(s[i]); 81 + + } 70 82 + return s; 71 83 + } 72 84 + } ··· 75 87 name = filename + map->old_len; 76 88 name_len = strlen (name) + 1; 77 89 78 - @@ -90,7 +116,6 @@ remap_filename (file_prefix_map *maps, const char *filename) 90 + @@ -90,7 +117,6 @@ remap_filename (file_prefix_map *maps, const char *filename) 79 91 ignore it in DW_AT_producer (dwarf2out.cc). */ 80 92 81 93 /* Linked lists of file_prefix_map structures. */
+60
pkgs/development/compilers/gcc/patches/13/ICE-PR110280.patch
··· 1 + From f4029de35fb1b293a4fd586574b1b4b73ddf7880 Mon Sep 17 00:00:00 2001 2 + From: Prathamesh Kulkarni <prathamesh.kulkarni@linaro.org> 3 + Date: Wed, 26 Jul 2023 22:36:26 +0530 4 + Subject: [PATCH] [aarch64/match.pd] Fix ICE observed in PR110280. 5 + 6 + gcc/ChangeLog: 7 + PR tree-optimization/110280 8 + * match.pd (vec_perm_expr(v, v, mask) -> v): Explicitly build vector 9 + using build_vector_from_val with the element of input operand, and 10 + mask's type if operand and mask's types don't match. 11 + 12 + gcc/testsuite/ChangeLog: 13 + PR tree-optimization/110280 14 + * gcc.target/aarch64/sve/pr110280.c: New test. 15 + 16 + (cherry picked from commit 85d8e0d8d5342ec8b4e6a54e22741c30b33c6f04) 17 + --- 18 + gcc/match.pd | 9 ++++++++- 19 + gcc/testsuite/gcc.target/aarch64/sve/pr110280.c | 12 ++++++++++++ 20 + 2 files changed, 20 insertions(+), 1 deletion(-) 21 + create mode 100644 gcc/testsuite/gcc.target/aarch64/sve/pr110280.c 22 + 23 + diff --git a/gcc/match.pd b/gcc/match.pd 24 + index 9118244825054..c3bb4fbc0a7a2 100644 25 + --- a/gcc/match.pd 26 + +++ b/gcc/match.pd 27 + @@ -8292,7 +8292,14 @@ and, 28 + 29 + (simplify 30 + (vec_perm vec_same_elem_p@0 @0 @1) 31 + - @0) 32 + + (if (types_match (type, TREE_TYPE (@0))) 33 + + @0 34 + + (with 35 + + { 36 + + tree elem = uniform_vector_p (@0); 37 + + } 38 + + (if (elem) 39 + + { build_vector_from_val (type, elem); })))) 40 + 41 + /* Push VEC_PERM earlier if that may help FMA perception (PR101895). */ 42 + (simplify 43 + diff --git a/gcc/testsuite/gcc.target/aarch64/sve/pr110280.c b/gcc/testsuite/gcc.target/aarch64/sve/pr110280.c 44 + new file mode 100644 45 + index 0000000000000..d3279f383629f 46 + --- /dev/null 47 + +++ b/gcc/testsuite/gcc.target/aarch64/sve/pr110280.c 48 + @@ -0,0 +1,12 @@ 49 + +/* { dg-do compile } */ 50 + +/* { dg-options "-O3 -fdump-tree-optimized" } */ 51 + + 52 + +#include "arm_sve.h" 53 + + 54 + +svuint32_t l() 55 + +{ 56 + + _Alignas(16) const unsigned int lanes[4] = {0, 0, 0, 0}; 57 + + return svld1rq_u32(svptrue_b8(), lanes); 58 + +} 59 + + 60 + +/* { dg-final { scan-tree-dump-not "VEC_PERM_EXPR" "optimized" } } */
+20 -9
pkgs/development/compilers/gcc/patches/13/mangle-NIX_STORE-in-__FILE__.patch
··· 12 12 Typical examples are `nix` -> `nlohmann_json` and `pipewire` -> 13 13 `lttng-ust.dev`. 14 14 15 + For this reason we want to remove the occurrences of hashes in the 16 + expansion of `__FILE__`. `nuke-references` does it by replacing hashes 17 + by `eeeeee...` but those paths are also used for debug symbols. It is 18 + handy to be able to invert the transformation to go back to the original 19 + store path for debuginfod servers. The chosen solution is to make the 20 + hash uppercase: 21 + - it does not trigger runtime references (except for all digit hashes, 22 + which are unlikely enough) 23 + - it visually looks like a bogus store path 24 + - it is easy to find the original store path if required 25 + 15 26 Ideally we would like to use `-fmacro-prefix-map=` feature of `gcc` as: 16 27 17 - -fmacro-prefix-map=/nix/store/$hash1-nlohmann-json-ver=/nix/store/eeee.eee-nlohmann-json-ver 28 + -fmacro-prefix-map=/nix/store/$hash1-nlohmann-json-ver=/nix/store/$HASH1-nlohmann-json-ver 18 29 -fmacro-prefix-map=/nix/... 19 30 20 31 In practice it quickly exhausts argument length limit due to `gcc` ··· 25 36 26 37 Tested as: 27 38 28 - $ printf "# 0 \"/nix/store/01234567890123456789012345678901-pppppp-vvvvvvv\" \nconst char * f(void) { return __FILE__; }" | NIX_STORE=/nix/store ./gcc/xgcc -Bgcc -x c - -S -o - 39 + $ printf "# 0 \"/nix/store/aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa-pppppp-vvvvvvv\" \nconst char * f(void) { return __FILE__; }" | NIX_STORE=/nix/store ./gcc/xgcc -Bgcc -x c - -S -o - 29 40 ... 30 - .string "/nix/store/eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee-pppppp-vvvvvvv" 41 + .string "/nix/store/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA-pppppp-vvvvvvv" 31 42 ... 32 43 33 44 Mangled successfully. ··· 43 54 /* Perform user-specified mapping of filename prefixes. Return the 44 55 GC-allocated new name corresponding to FILENAME or FILENAME if no 45 56 remapping was performed. */ 46 - @@ -102,6 +105,29 @@ remap_filename (file_prefix_map *maps, const char *filename) 57 + @@ -102,6 +105,30 @@ remap_filename (file_prefix_map *maps, const char *filename) 47 58 break; 48 59 if (!map) 49 60 { 50 61 + if (maps == macro_prefix_maps) 51 62 + { 52 - + /* Remap all fo $NIX_STORE/.{32} paths to 53 - + * equivalent $NIX_STORE/e{32}. 63 + + /* Remap all fo $NIX_STORE/.{32} paths to uppercase 54 64 + * 55 65 + * That way we avoid argument parameters explosion 56 66 + * and still avoid embedding headers into runtime closure: ··· 64 74 + { 65 75 + s = (char *) ggc_alloc_atomic (name_len + 1); 66 76 + memcpy(s, name, name_len + 1); 67 - + memset(s + nix_store_len + 1, 'e', 32); 77 + + for (int i = nix_store_len + 1; i < nix_store_len + 1 + 32; i++) { 78 + + s[i] = TOUPPER(s[i]); 79 + + } 68 80 + if (realname != filename) 69 81 + free (const_cast <char *> (realname)); 70 82 + return s; ··· 73 85 if (realname != filename) 74 86 free (const_cast <char *> (realname)); 75 87 return filename; 76 - @@ -124,7 +150,6 @@ remap_filename (file_prefix_map *maps, const char *filename) 88 + @@ -124,7 +151,6 @@ remap_filename (file_prefix_map *maps, const char *filename) 77 89 ignore it in DW_AT_producer (gen_command_line_string in opts.cc). */ 78 90 79 91 /* Linked lists of file_prefix_map structures. */ ··· 81 93 static file_prefix_map *debug_prefix_maps; /* -fdebug-prefix-map */ 82 94 static file_prefix_map *profile_prefix_maps; /* -fprofile-prefix-map */ 83 95 84 -
+1
pkgs/development/compilers/gcc/patches/default.nix
··· 74 74 ++ optional langFortran (if atLeast12 then ./gcc-12-gfortran-driving.patch else ./gfortran-driving.patch) 75 75 ++ optional atLeast7 ./ppc-musl.patch 76 76 ++ optional is12 ./12/lambda-ICE-PR109241.patch # backport ICE fix on ccache code 77 + ++ optional is13 ./13/ICE-PR110280.patch # backport ICE fix on const_unop 77 78 ++ optional (atLeast9 && langD) ./libphobos.patch 78 79 79 80
+2 -2
pkgs/development/compilers/glslang/default.nix
··· 9 9 }: 10 10 stdenv.mkDerivation rec { 11 11 pname = "glslang"; 12 - version = "13.1.1"; 12 + version = "14.0.0"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "KhronosGroup"; 16 16 repo = "glslang"; 17 17 rev = version; 18 - hash = "sha256-fuzNsVYdnThMzd4tLN/sTbCBXg6qXKLDJRziOKyOBGg="; 18 + hash = "sha256-7kIIU45pe+IF7lGltpIKSvQBmcXR+TWFvmx7ztMNrpc="; 19 19 }; 20 20 21 21 # These get set at all-packages, keep onto them for child drvs
+2 -2
pkgs/development/compilers/go/1.21.nix
··· 46 46 in 47 47 stdenv.mkDerivation (finalAttrs: { 48 48 pname = "go"; 49 - version = "1.21.5"; 49 + version = "1.21.6"; 50 50 51 51 src = fetchurl { 52 52 url = "https://go.dev/dl/go${finalAttrs.version}.src.tar.gz"; 53 - hash = "sha256-KFy730tubmLtWPNw8/bYwwgl1uVsWFPGbTwjvNsJ2xk="; 53 + hash = "sha256-Ekkmpi5F942qu67bnAEdl2MxhqM8I4/8HiUyDAIEYkg="; 54 54 }; 55 55 56 56 strictDeps = true;
+1
pkgs/development/compilers/llvm/10/default.nix
··· 158 158 echo "-B${targetLlvmLibraries.compiler-rt}/lib" >> $out/nix-support/cc-cflags 159 159 '' + lib.optionalString (!stdenv.targetPlatform.isWasm) '' 160 160 echo "--unwindlib=libunwind" >> $out/nix-support/cc-cflags 161 + echo "-L${targetLlvmLibraries.libunwind}/lib" >> $out/nix-support/cc-ldflags 161 162 '' + lib.optionalString (!stdenv.targetPlatform.isWasm && stdenv.targetPlatform.useLLVM or false) '' 162 163 echo "-lunwind" >> $out/nix-support/cc-ldflags 163 164 '' + lib.optionalString stdenv.targetPlatform.isWasm ''
+1 -1
pkgs/development/compilers/llvm/10/llvm/default.nix
··· 248 248 ] ++ optionals isDarwin [ 249 249 "-DLLVM_ENABLE_LIBCXX=ON" 250 250 "-DCAN_TARGET_i386=false" 251 - ] ++ optionals (stdenv.hostPlatform != stdenv.buildPlatform) [ 251 + ] ++ optionals ((stdenv.hostPlatform != stdenv.buildPlatform) && !(stdenv.buildPlatform.canExecute stdenv.hostPlatform)) [ 252 252 "-DCMAKE_CROSSCOMPILING=True" 253 253 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 254 254 (
+1
pkgs/development/compilers/llvm/11/default.nix
··· 173 173 echo "-B${targetLlvmLibraries.compiler-rt}/lib" >> $out/nix-support/cc-cflags 174 174 '' + lib.optionalString (!stdenv.targetPlatform.isWasm) '' 175 175 echo "--unwindlib=libunwind" >> $out/nix-support/cc-cflags 176 + echo "-L${targetLlvmLibraries.libunwind}/lib" >> $out/nix-support/cc-ldflags 176 177 '' + lib.optionalString (!stdenv.targetPlatform.isWasm && stdenv.targetPlatform.useLLVM or false) '' 177 178 echo "-lunwind" >> $out/nix-support/cc-ldflags 178 179 '' + lib.optionalString stdenv.targetPlatform.isWasm ''
+1 -1
pkgs/development/compilers/llvm/11/llvm/default.nix
··· 256 256 ] ++ optionals isDarwin [ 257 257 "-DLLVM_ENABLE_LIBCXX=ON" 258 258 "-DCAN_TARGET_i386=false" 259 - ] ++ optionals (stdenv.hostPlatform != stdenv.buildPlatform) [ 259 + ] ++ optionals ((stdenv.hostPlatform != stdenv.buildPlatform) && !(stdenv.buildPlatform.canExecute stdenv.hostPlatform)) [ 260 260 "-DCMAKE_CROSSCOMPILING=True" 261 261 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 262 262 (
+1
pkgs/development/compilers/llvm/12/default.nix
··· 173 173 echo "-B${targetLlvmLibraries.compiler-rt}/lib" >> $out/nix-support/cc-cflags 174 174 '' + lib.optionalString (!stdenv.targetPlatform.isWasm) '' 175 175 echo "--unwindlib=libunwind" >> $out/nix-support/cc-cflags 176 + echo "-L${targetLlvmLibraries.libunwind}/lib" >> $out/nix-support/cc-ldflags 176 177 '' + lib.optionalString (!stdenv.targetPlatform.isWasm && stdenv.targetPlatform.useLLVM or false) '' 177 178 echo "-lunwind" >> $out/nix-support/cc-ldflags 178 179 '' + lib.optionalString stdenv.targetPlatform.isWasm ''
+1 -1
pkgs/development/compilers/llvm/12/llvm/default.nix
··· 244 244 ] ++ optionals isDarwin [ 245 245 "-DLLVM_ENABLE_LIBCXX=ON" 246 246 "-DCAN_TARGET_i386=false" 247 - ] ++ optionals (stdenv.hostPlatform != stdenv.buildPlatform) [ 247 + ] ++ optionals ((stdenv.hostPlatform != stdenv.buildPlatform) && !(stdenv.buildPlatform.canExecute stdenv.hostPlatform)) [ 248 248 "-DCMAKE_CROSSCOMPILING=True" 249 249 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 250 250 (
+1
pkgs/development/compilers/llvm/13/default.nix
··· 213 213 echo "-B${targetLlvmLibraries.compiler-rt}/lib" >> $out/nix-support/cc-cflags 214 214 '' + lib.optionalString (!stdenv.targetPlatform.isWasm) '' 215 215 echo "--unwindlib=libunwind" >> $out/nix-support/cc-cflags 216 + echo "-L${targetLlvmLibraries.libunwind}/lib" >> $out/nix-support/cc-ldflags 216 217 '' + lib.optionalString (!stdenv.targetPlatform.isWasm && stdenv.targetPlatform.useLLVM or false) '' 217 218 echo "-lunwind" >> $out/nix-support/cc-ldflags 218 219 '' + lib.optionalString stdenv.targetPlatform.isWasm ''
+1 -1
pkgs/development/compilers/llvm/13/llvm/default.nix
··· 206 206 ] ++ optionals isDarwin [ 207 207 "-DLLVM_ENABLE_LIBCXX=ON" 208 208 "-DCAN_TARGET_i386=false" 209 - ] ++ optionals (stdenv.hostPlatform != stdenv.buildPlatform) [ 209 + ] ++ optionals ((stdenv.hostPlatform != stdenv.buildPlatform) && !(stdenv.buildPlatform.canExecute stdenv.hostPlatform)) [ 210 210 "-DCMAKE_CROSSCOMPILING=True" 211 211 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 212 212 (
+1
pkgs/development/compilers/llvm/14/default.nix
··· 216 216 (!stdenv.targetPlatform.isWasm && stdenv.targetPlatform.useLLVM or false) 217 217 "-lunwind" 218 218 ++ lib.optional stdenv.targetPlatform.isWasm "-fno-exceptions"; 219 + nixSupport.cc-ldflags = lib.optionals (!stdenv.targetPlatform.isWasm) [ "-L${targetLlvmLibraries.libunwind}/lib" ]; 219 220 }; 220 221 221 222 clangNoLibcxx = wrapCCWith rec {
+1 -1
pkgs/development/compilers/llvm/14/llvm/default.nix
··· 205 205 ] ++ optionals isDarwin [ 206 206 "-DLLVM_ENABLE_LIBCXX=ON" 207 207 "-DCAN_TARGET_i386=false" 208 - ] ++ optionals (stdenv.hostPlatform != stdenv.buildPlatform) [ 208 + ] ++ optionals ((stdenv.hostPlatform != stdenv.buildPlatform) && !(stdenv.buildPlatform.canExecute stdenv.hostPlatform)) [ 209 209 "-DCMAKE_CROSSCOMPILING=True" 210 210 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 211 211 (
+1
pkgs/development/compilers/llvm/15/default.nix
··· 221 221 (!stdenv.targetPlatform.isWasm && stdenv.targetPlatform.useLLVM or false) 222 222 "-lunwind" 223 223 ++ lib.optional stdenv.targetPlatform.isWasm "-fno-exceptions"; 224 + nixSupport.cc-ldflags = lib.optionals (!stdenv.targetPlatform.isWasm) [ "-L${targetLlvmLibraries.libunwind}/lib" ]; 224 225 }; 225 226 226 227 clangNoLibcxx = wrapCCWith rec {
+8
pkgs/development/compilers/llvm/15/libcxx/default.nix
··· 56 56 hash = "sha256-AaM9A6tQ4YAw7uDqCIV4VaiUyLZv+unwcOqbakwW9/k="; 57 57 relative = "libcxx"; 58 58 }) 59 + # fix for https://github.com/NixOS/nixpkgs/issues/269548 60 + # https://github.com/llvm/llvm-project/pull/77218 61 + (fetchpatch { 62 + name = "darwin-system-libcxxabi-link-flags.patch"; 63 + url = "https://github.com/llvm/llvm-project/commit/c5b89b29ee6e3c444a355fd1cf733ce7ab2e316a.patch"; 64 + hash = "sha256-LNoPg1KCoP8RWxU/AzHR52f4Dww24I9BGQJedMhFxyQ="; 65 + relative = "libcxx"; 66 + }) 59 67 ] ++ lib.optionals stdenv.hostPlatform.isMusl [ 60 68 ../../libcxx-0001-musl-hacks.patch 61 69 ];
+1 -1
pkgs/development/compilers/llvm/15/llvm/default.nix
··· 343 343 ] ++ optionals isDarwin [ 344 344 "-DLLVM_ENABLE_LIBCXX=ON" 345 345 "-DCAN_TARGET_i386=false" 346 - ] ++ optionals (stdenv.hostPlatform != stdenv.buildPlatform) [ 346 + ] ++ optionals ((stdenv.hostPlatform != stdenv.buildPlatform) && !(stdenv.buildPlatform.canExecute stdenv.hostPlatform)) [ 347 347 "-DCMAKE_CROSSCOMPILING=True" 348 348 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 349 349 (
+1
pkgs/development/compilers/llvm/16/default.nix
··· 226 226 (!stdenv.targetPlatform.isWasm && stdenv.targetPlatform.useLLVM or false) 227 227 "-lunwind" 228 228 ++ lib.optional stdenv.targetPlatform.isWasm "-fno-exceptions"; 229 + nixSupport.cc-ldflags = lib.optionals (!stdenv.targetPlatform.isWasm) [ "-L${targetLlvmLibraries.libunwind}/lib" ]; 229 230 }; 230 231 231 232 clangNoLibcxx = wrapCCWith rec {
+9 -1
pkgs/development/compilers/llvm/16/libcxx/default.nix
··· 1 1 { lib, stdenv, llvm_meta 2 - , monorepoSrc, runCommand 2 + , monorepoSrc, runCommand, fetchpatch 3 3 , cmake, ninja, python3, fixDarwinDylibNames, version 4 4 , cxxabi ? if stdenv.hostPlatform.isFreeBSD then libcxxrt else libcxxabi 5 5 , libcxxabi, libcxxrt, libunwind ··· 47 47 48 48 patches = [ 49 49 ./gnu-install-dirs.patch 50 + # fix for https://github.com/NixOS/nixpkgs/issues/269548 51 + # https://github.com/llvm/llvm-project/pull/77218 52 + (fetchpatch { 53 + name = "darwin-system-libcxxabi-link-flags.patch"; 54 + url = "https://github.com/llvm/llvm-project/commit/c5b89b29ee6e3c444a355fd1cf733ce7ab2e316a.patch"; 55 + hash = "sha256-LNoPg1KCoP8RWxU/AzHR52f4Dww24I9BGQJedMhFxyQ="; 56 + relative = "libcxx"; 57 + }) 50 58 ]; 51 59 52 60 postPatch = ''
+1 -1
pkgs/development/compilers/llvm/16/llvm/default.nix
··· 331 331 ] ++ optionals isDarwin [ 332 332 "-DLLVM_ENABLE_LIBCXX=ON" 333 333 "-DCAN_TARGET_i386=false" 334 - ] ++ optionals (stdenv.hostPlatform != stdenv.buildPlatform) [ 334 + ] ++ optionals ((stdenv.hostPlatform != stdenv.buildPlatform) && !(stdenv.buildPlatform.canExecute stdenv.hostPlatform)) [ 335 335 "-DCMAKE_CROSSCOMPILING=True" 336 336 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 337 337 (
+12 -1
pkgs/development/compilers/llvm/17/libcxx/default.nix
··· 1 1 { lib, stdenv, llvm_meta 2 - , monorepoSrc, runCommand 2 + , monorepoSrc, runCommand, fetchpatch 3 3 , cmake, ninja, python3, fixDarwinDylibNames, version 4 4 , cxxabi ? if stdenv.hostPlatform.isFreeBSD then libcxxrt else libcxxabi 5 5 , libcxxabi, libcxxrt, libunwind ··· 44 44 cd ../${basename} 45 45 chmod -R u+w . 46 46 ''; 47 + 48 + patches = [ 49 + # fix for https://github.com/NixOS/nixpkgs/issues/269548 50 + # https://github.com/llvm/llvm-project/pull/77218 51 + (fetchpatch { 52 + name = "darwin-system-libcxxabi-link-flags.patch"; 53 + url = "https://github.com/llvm/llvm-project/commit/c5b89b29ee6e3c444a355fd1cf733ce7ab2e316a.patch"; 54 + hash = "sha256-LNoPg1KCoP8RWxU/AzHR52f4Dww24I9BGQJedMhFxyQ="; 55 + relative = "libcxx"; 56 + }) 57 + ]; 47 58 48 59 postPatch = '' 49 60 cd ../runtimes
+1 -1
pkgs/development/compilers/llvm/17/llvm/default.nix
··· 330 330 ] ++ optionals isDarwin [ 331 331 "-DLLVM_ENABLE_LIBCXX=ON" 332 332 "-DCAN_TARGET_i386=false" 333 - ] ++ optionals (stdenv.hostPlatform != stdenv.buildPlatform) [ 333 + ] ++ optionals ((stdenv.hostPlatform != stdenv.buildPlatform) && !(stdenv.buildPlatform.canExecute stdenv.hostPlatform)) [ 334 334 "-DCMAKE_CROSSCOMPILING=True" 335 335 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 336 336 (
+1
pkgs/development/compilers/llvm/8/default.nix
··· 161 161 echo "-B${targetLlvmLibraries.compiler-rt}/lib" >> $out/nix-support/cc-cflags 162 162 '' + lib.optionalString (!stdenv.targetPlatform.isWasm) '' 163 163 echo "--unwindlib=libunwind" >> $out/nix-support/cc-cflags 164 + echo "-L${targetLlvmLibraries.libunwind}/lib" >> $out/nix-support/cc-ldflags 164 165 '' + lib.optionalString (!stdenv.targetPlatform.isWasm && stdenv.targetPlatform.useLLVM or false) '' 165 166 echo "-lunwind" >> $out/nix-support/cc-ldflags 166 167 '' + lib.optionalString stdenv.targetPlatform.isWasm ''
+1 -1
pkgs/development/compilers/llvm/8/llvm/default.nix
··· 222 222 ] ++ optionals (isDarwin) [ 223 223 "-DLLVM_ENABLE_LIBCXX=ON" 224 224 "-DCAN_TARGET_i386=false" 225 - ] ++ optionals (stdenv.hostPlatform != stdenv.buildPlatform) [ 225 + ] ++ optionals ((stdenv.hostPlatform != stdenv.buildPlatform) && !(stdenv.buildPlatform.canExecute stdenv.hostPlatform)) [ 226 226 "-DCMAKE_CROSSCOMPILING=True" 227 227 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 228 228 (
+1
pkgs/development/compilers/llvm/9/default.nix
··· 161 161 echo "-B${targetLlvmLibraries.compiler-rt}/lib" >> $out/nix-support/cc-cflags 162 162 '' + lib.optionalString (!stdenv.targetPlatform.isWasm) '' 163 163 echo "--unwindlib=libunwind" >> $out/nix-support/cc-cflags 164 + echo "-L${targetLlvmLibraries.libunwind}/lib" >> $out/nix-support/cc-ldflags 164 165 '' + lib.optionalString (!stdenv.targetPlatform.isWasm && stdenv.targetPlatform.useLLVM or false) '' 165 166 echo "-lunwind" >> $out/nix-support/cc-ldflags 166 167 '' + lib.optionalString stdenv.targetPlatform.isWasm ''
+1 -1
pkgs/development/compilers/llvm/9/llvm/default.nix
··· 237 237 ] ++ optionals (isDarwin) [ 238 238 "-DLLVM_ENABLE_LIBCXX=ON" 239 239 "-DCAN_TARGET_i386=false" 240 - ] ++ optionals (stdenv.hostPlatform != stdenv.buildPlatform) [ 240 + ] ++ optionals ((stdenv.hostPlatform != stdenv.buildPlatform) && !(stdenv.buildPlatform.canExecute stdenv.hostPlatform)) [ 241 241 "-DCMAKE_CROSSCOMPILING=True" 242 242 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 243 243 (
+1
pkgs/development/compilers/llvm/git/default.nix
··· 216 216 (!stdenv.targetPlatform.isWasm && stdenv.targetPlatform.useLLVM or false) 217 217 "-lunwind" 218 218 ++ lib.optional stdenv.targetPlatform.isWasm "-fno-exceptions"; 219 + nixSupport.cc-ldflags = lib.optionals (!stdenv.targetPlatform.isWasm) [ "-L${targetLlvmLibraries.libunwind}/lib" ]; 219 220 }; 220 221 221 222 clangNoLibcxx = wrapCCWith rec {
+12 -1
pkgs/development/compilers/llvm/git/libcxx/default.nix
··· 1 1 { lib, stdenv, llvm_meta 2 - , monorepoSrc, runCommand 2 + , monorepoSrc, runCommand, fetchpatch 3 3 , cmake, ninja, python3, fixDarwinDylibNames, version 4 4 , cxxabi ? if stdenv.hostPlatform.isFreeBSD then libcxxrt else libcxxabi 5 5 , libcxxabi, libcxxrt, libunwind ··· 44 44 cd ../${basename} 45 45 chmod -R u+w . 46 46 ''; 47 + 48 + patches = [ 49 + # fix for https://github.com/NixOS/nixpkgs/issues/269548 50 + # https://github.com/llvm/llvm-project/pull/77218 51 + (fetchpatch { 52 + name = "darwin-system-libcxxabi-link-flags.patch"; 53 + url = "https://github.com/llvm/llvm-project/commit/c5b89b29ee6e3c444a355fd1cf733ce7ab2e316a.patch"; 54 + hash = "sha256-LNoPg1KCoP8RWxU/AzHR52f4Dww24I9BGQJedMhFxyQ="; 55 + relative = "libcxx"; 56 + }) 57 + ]; 47 58 48 59 postPatch = '' 49 60 cd ../runtimes
+1 -1
pkgs/development/compilers/llvm/git/llvm/default.nix
··· 329 329 ] ++ optionals isDarwin [ 330 330 "-DLLVM_ENABLE_LIBCXX=ON" 331 331 "-DCAN_TARGET_i386=false" 332 - ] ++ optionals (stdenv.hostPlatform != stdenv.buildPlatform) [ 332 + ] ++ optionals ((stdenv.hostPlatform != stdenv.buildPlatform) && !(stdenv.buildPlatform.canExecute stdenv.hostPlatform)) [ 333 333 "-DCMAKE_CROSSCOMPILING=True" 334 334 "-DLLVM_TABLEGEN=${buildLlvmTools.llvm}/bin/llvm-tblgen" 335 335 (
+8 -1
pkgs/development/compilers/spirv-llvm-translator/default.nix
··· 48 48 inherit (branch) rev hash; 49 49 }; 50 50 51 - patches = lib.optionals (llvmMajor == "16") [ 51 + patches = [ 52 + # Fixes build after spirv-headers breaking change 53 + (fetchpatch { 54 + url = "https://github.com/KhronosGroup/SPIRV-LLVM-Translator/commit/0166a0fb86dc6c0e8903436bbc3a89bc3273ebc0.patch"; 55 + excludes = ["spirv-headers-tag.conf"]; 56 + hash = "sha256-17JJG8eCFVphElY5fVT/79hj0bByWxo8mVp1ZNjQk/M="; 57 + }) 58 + ] ++ lib.optionals (llvmMajor == "16") [ 52 59 # Fixes builds that link against external LLVM dynamic library 53 60 (fetchpatch { 54 61 url = "https://github.com/KhronosGroup/SPIRV-LLVM-Translator/commit/f3b9b604d7eda18d0d1029d94a6eebd33aa3a3fe.patch";
+1 -1
pkgs/development/compilers/zulu/common.nix
··· 57 57 isJdk8 = lib.versions.major dist.jdkVersion == "8"; 58 58 59 59 jdk = stdenv.mkDerivation rec { 60 - pname = "zulu${dist.zuluVersion}-${javaPackage}"; 60 + pname = "zulu-${javaPackage}"; 61 61 version = dist.jdkVersion; 62 62 63 63 src = fetchurl {
+2 -2
pkgs/development/interpreters/ruby/rubygems/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "rubygems"; 5 - version = "3.5.3"; 5 + version = "3.5.5"; 6 6 7 7 src = fetchurl { 8 8 url = "https://rubygems.org/rubygems/rubygems-${version}.tgz"; 9 - hash = "sha256-8xFe6AgJkvJXwBYbgR4HsBLyAXXtiTSfsayYl33cXJw="; 9 + hash = "sha256-ErKsKMIEvs4oA8eS9v1ASfqlMOJOxeTVfCA99AIcTh0="; 10 10 }; 11 11 12 12 patches = [
+2 -2
pkgs/development/libraries/aws-c-auth/default.nix
··· 14 14 15 15 stdenv.mkDerivation rec { 16 16 pname = "aws-c-auth"; 17 - version = "0.7.7"; 17 + version = "0.7.10"; 18 18 19 19 src = fetchFromGitHub { 20 20 owner = "awslabs"; 21 21 repo = "aws-c-auth"; 22 22 rev = "v${version}"; 23 - sha256 = "sha256-GO3Sfbi1dwsqQM6rlnEHyE7wolQjdVwD5BAu5ychEuY="; 23 + hash = "sha256-yJ0sgw0y9tIiIHgTPVnfYd8zAGjO83qfeeEzstGH9CE="; 24 24 }; 25 25 26 26 nativeBuildInputs = [
+7 -2
pkgs/development/libraries/catch2/3.nix
··· 7 7 8 8 stdenv.mkDerivation rec { 9 9 pname = "catch2"; 10 - version = "3.4.0"; 10 + version = "3.5.2"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "catchorg"; 14 14 repo = "Catch2"; 15 15 rev = "v${version}"; 16 - hash = "sha256-DqGGfNjKPW9HFJrX9arFHyNYjB61uoL6NabZatTWrr0="; 16 + hash = "sha256-xGPfXjk+oOnR7JqTrZd2pKJxalrlS8CMs7HWDClXaS8="; 17 17 }; 18 18 19 19 nativeBuildInputs = [ ··· 28 28 # our darwin build environment https://github.com/catchorg/Catch2/issues/1691 29 29 "-DCMAKE_CTEST_ARGUMENTS=-E;ApprovalTests" 30 30 ]; 31 + 32 + # Tests fail on x86_32 if compiled with x87 floats: https://github.com/catchorg/Catch2/issues/2796 33 + env = lib.optionalAttrs stdenv.isx86_32 { 34 + NIX_CFLAGS_COMPILE = "-msse2 -mfpmath=sse"; 35 + }; 31 36 32 37 doCheck = true; 33 38
+1
pkgs/development/libraries/dbus/default.nix
··· 43 43 ''; 44 44 45 45 outputs = [ "out" "dev" "lib" "doc" "man" ]; 46 + separateDebugInfo = true; 46 47 47 48 strictDeps = true; 48 49 nativeBuildInputs = [
+8
pkgs/development/libraries/editline/default.nix
··· 16 16 url = "https://github.com/troglobit/editline/commit/265c1fb6a0b99bedb157dc7c320f2c9629136518.patch"; 17 17 sha256 = "sha256-9fhQH0hT8BcykGzOUoT18HBtWjjoXnePSGDJQp8GH30="; 18 18 }) 19 + 20 + # Pending autoconf-2.72 upstream support: 21 + # https://github.com/troglobit/editline/pull/64 22 + (fetchpatch { 23 + name = "autoconf-2.72.patch"; 24 + url = "https://github.com/troglobit/editline/commit/f444a316f5178b8e20fe31e7b2d979e651da077e.patch"; 25 + hash = "sha256-m3jExTkPvE+ZBwHzf/A+ugzzfbLmeWYn726l7Po7f10="; 26 + }) 19 27 ]; 20 28 21 29 nativeBuildInputs = [ autoreconfHook ];
+3 -1
pkgs/development/libraries/enchant/2.x.nix
··· 22 22 hash = "sha256-wcVxnypZfOPgbJOM+5n7aX2gk96nuFfMAE3B3PG7oYI="; 23 23 }; 24 24 25 + strictDeps = true; 26 + 25 27 nativeBuildInputs = [ 26 28 groff 27 29 pkg-config ··· 33 35 nuspell 34 36 ]; 35 37 36 - nativeCheckInputs = [ 38 + checkInputs = [ 37 39 unittest-cpp 38 40 ]; 39 41
+12 -11
pkgs/development/libraries/ffmpeg/generic.nix
··· 44 44 , withFreetype ? withHeadlessDeps # Needed for drawtext filter 45 45 , withFrei0r ? withFullDeps # frei0r video filtering 46 46 , withFribidi ? withFullDeps # Needed for drawtext filter 47 - , withGlslang ? withFullDeps && !stdenv.isDarwin && lib.versionAtLeast version "5.0" 48 47 , withGme ? withFullDeps # Game Music Emulator 49 48 , withGnutls ? withHeadlessDeps 50 49 , withGsm ? withFullDeps # GSM de/encoder ··· 73 72 , withRtmp ? false # RTMP[E] support 74 73 , withSamba ? withFullDeps && !stdenv.isDarwin # Samba protocol 75 74 , withSdl2 ? withSmallDeps 75 + , withShaderc ? withFullDeps && !stdenv.isDarwin && lib.versionAtLeast version "5.0" 76 76 , withSoxr ? withHeadlessDeps # Resampling via soxr 77 77 , withSpeex ? withHeadlessDeps # Speex de/encoder 78 78 , withSrt ? withHeadlessDeps # Secure Reliable Transport (SRT) protocol ··· 189 189 , frei0r 190 190 , fribidi 191 191 , game-music-emu 192 - , glslang 193 192 , gnutls 194 193 , gsm 195 194 , intel-media-sdk ··· 213 212 , libopenmpt 214 213 , libopus 215 214 , libplacebo 215 + , libplacebo_5 216 216 , libpulseaudio 217 217 , libraw1394 218 218 , librsvg ··· 244 244 , rtmpdump 245 245 , samba 246 246 , SDL2 247 + , shaderc 247 248 , soxr 248 249 , speex 249 250 , srt ··· 349 350 ''; 350 351 351 352 patches = map (patch: fetchpatch patch) (extraPatches 352 - ++ (lib.optional (lib.versionAtLeast version "6" && lib.versionOlder version "6.1") 353 + ++ (lib.optional (lib.versionAtLeast finalAttrs.version "6" && lib.versionOlder finalAttrs.version "6.1") 353 354 { # this can be removed post 6.1 354 355 name = "fix_aacps_tablegen"; 355 356 url = "https://git.ffmpeg.org/gitweb/ffmpeg.git/patch/814178f92647be2411516bbb82f48532373d2554"; 356 357 hash = "sha256-FQV9/PiarPXCm45ldtCsxGHjlrriL8DKpn1LaKJ8owI="; 357 358 } 358 359 ) 359 - ++ (lib.optional (stdenv.isDarwin && lib.versionAtLeast version "6.1" && lib.versionOlder version "6.2") 360 + ++ (lib.optional (lib.versionAtLeast finalAttrs.version "6.1" && lib.versionOlder finalAttrs.version "6.2") 360 361 { # this can be removed post 6.1 361 362 name = "fix_build_failure_due_to_PropertyKey_EncoderID"; 362 363 url = "https://git.ffmpeg.org/gitweb/ffmpeg.git/patch/cb049d377f54f6b747667a93e4b719380c3e9475"; ··· 416 417 (enableFeature buildAvdevice "avdevice") 417 418 (enableFeature buildAvfilter "avfilter") 418 419 (enableFeature buildAvformat "avformat") 419 - ] ++ optionals (lib.versionOlder version "5") [ 420 + ] ++ optionals (lib.versionOlder finalAttrs.version "5") [ 420 421 # Ffmpeg > 4 doesn't know about the flag anymore 421 422 (enableFeature buildAvresample "avresample") 422 423 ] ++ [ ··· 476 477 (enableFeature withModplug "libmodplug") 477 478 (enableFeature withMysofa "libmysofa") 478 479 (enableFeature withOpus "libopus") 479 - (optionalString (versionAtLeast version "5.0" && withLibplacebo) "--enable-libplacebo") 480 + (optionalString (versionAtLeast finalAttrs.version "5.0" && withLibplacebo) "--enable-libplacebo") 480 481 (enableFeature withSvg "librsvg") 481 482 (enableFeature withSrt "libsrt") 482 483 (enableFeature withSsh "libssh") ··· 524 525 (enableFeature withZimg "libzimg") 525 526 (enableFeature withZlib "zlib") 526 527 (enableFeature withVulkan "vulkan") 527 - (enableFeature withGlslang "libglslang") 528 + (optionalString (lib.versionAtLeast finalAttrs.version "5") (enableFeature withShaderc "libshaderc")) 528 529 (enableFeature withSamba "libsmbclient") 529 530 /* 530 531 * Developer flags ··· 560 561 # TODO This was always in buildInputs before, why? 561 562 buildInputs = optionals withFullDeps [ libdc1394 ] 562 563 ++ optionals (withFullDeps && !stdenv.isDarwin) [ libraw1394 ] # TODO where does this belong to 563 - ++ optionals (withNvdec || withNvenc) [ (if (lib.versionAtLeast version "6") then nv-codec-headers-12 else nv-codec-headers) ] 564 + ++ optionals (withNvdec || withNvenc) [ (if (lib.versionAtLeast finalAttrs.version "6") then nv-codec-headers-12 else nv-codec-headers) ] 564 565 ++ optionals withAlsa [ alsa-lib ] 565 566 ++ optionals withAom [ libaom ] 566 567 ++ optionals withAribcaption [ libaribcaption ] ··· 577 578 ++ optionals withFreetype [ freetype ] 578 579 ++ optionals withFrei0r [ frei0r ] 579 580 ++ optionals withFribidi [ fribidi ] 580 - ++ optionals withGlslang [ glslang ] 581 581 ++ optionals withGme [ game-music-emu ] 582 582 ++ optionals withGnutls [ gnutls ] 583 583 ++ optionals withGsm [ gsm ] 584 584 ++ optionals withIconv [ libiconv ] # On Linux this should be in libc, do we really need it? 585 585 ++ optionals withJack [ libjack2 ] 586 586 ++ optionals withLadspa [ ladspaH ] 587 - ++ optionals withLibplacebo [ libplacebo vulkan-headers ] 587 + ++ optionals withLibplacebo [ (if (lib.versionAtLeast finalAttrs.version "6.1") then libplacebo else libplacebo_5) vulkan-headers ] 588 588 ++ optionals withLzma [ xz ] 589 589 ++ optionals withMfx [ intel-media-sdk ] 590 590 ++ optionals withModplug [ libmodplug ] ··· 604 604 ++ optionals withRtmp [ rtmpdump ] 605 605 ++ optionals withSamba [ samba ] 606 606 ++ optionals withSdl2 [ SDL2 ] 607 + ++ optionals withShaderc [ shaderc ] 607 608 ++ optionals withSoxr [ soxr ] 608 609 ++ optionals withSpeex [ speex ] 609 610 ++ optionals withSrt [ srt ] ··· 692 693 meta = with lib; { 693 694 description = "A complete, cross-platform solution to record, convert and stream audio and video"; 694 695 homepage = "https://www.ffmpeg.org/"; 695 - changelog = "https://github.com/FFmpeg/FFmpeg/blob/n${version}/Changelog"; 696 + changelog = "https://github.com/FFmpeg/FFmpeg/blob/n${finalAttrs.version}/Changelog"; 696 697 longDescription = '' 697 698 FFmpeg is the leading multimedia framework, able to decode, encode, transcode, 698 699 mux, demux, stream, filter and play pretty much anything that humans and machines
+12 -4
pkgs/development/libraries/folly/default.nix
··· 4 4 , boost 5 5 , cmake 6 6 , double-conversion 7 - , fetchpatch 8 7 , fmt_8 9 8 , gflags 10 9 , glog ··· 64 63 # temporary hack until folly builds work on aarch64, 65 64 # see https://github.com/facebook/folly/issues/1880 66 65 "-DCMAKE_LIBRARY_ARCHITECTURE=${if stdenv.isx86_64 then "x86_64" else "dummy"}" 66 + 67 + # ensure correct dirs in $dev/lib/pkgconfig/libfolly.pc 68 + # see https://github.com/NixOS/nixpkgs/issues/144170 69 + "-DCMAKE_INSTALL_INCLUDEDIR=include" 70 + "-DCMAKE_INSTALL_LIBDIR=lib" 67 71 ]; 68 72 73 + # split outputs to reduce downstream closure sizes 74 + outputs = [ "out" "dev" ]; 75 + 76 + # patch prefix issues again 77 + # see https://github.com/NixOS/nixpkgs/issues/144170 69 78 postFixup = '' 70 - substituteInPlace "$out"/lib/pkgconfig/libfolly.pc \ 71 - --replace '=''${prefix}//' '=/' \ 72 - --replace '=''${exec_prefix}//' '=/' 79 + substituteInPlace $dev/lib/cmake/${pname}/${pname}-targets-release.cmake \ 80 + --replace '$'{_IMPORT_PREFIX}/lib/ $out/lib/ 73 81 ''; 74 82 75 83 # folly-config.cmake, will `find_package` these, thus there should be
+2 -13
pkgs/development/libraries/fontconfig/default.nix
··· 1 1 { stdenv 2 2 , lib 3 3 , fetchurl 4 - , fetchpatch2 5 4 , pkg-config 6 5 , python3 7 6 , freetype ··· 15 14 16 15 stdenv.mkDerivation rec { 17 16 pname = "fontconfig"; 18 - version = "2.14.2"; 17 + version = "2.15.0"; 19 18 20 19 outputs = [ "bin" "dev" "lib" "out" ]; # $out contains all the config 21 20 22 21 src = fetchurl { 23 22 url = "https://www.freedesktop.org/software/fontconfig/release/${pname}-${version}.tar.xz"; 24 - hash = "sha256-26aVtXvOFQI9LO7e+CBiwrkl5R9dTMSu9zbPE/YKRos="; 23 + hash = "sha256-Y6BljQ4G4PqIYQZFK1jvBPIfWCAuoCqUw53g0zNdfA4="; 25 24 }; 26 - 27 - patches = [ 28 - # Provide 11-lcdfilter-none.conf for NixOS module 29 - # https://gitlab.freedesktop.org/fontconfig/fontconfig/-/merge_requests/268 30 - (fetchpatch2 { 31 - name = "add-optional-11-lcdfilter-none-configuration.patch"; 32 - url = "https://gitlab.freedesktop.org/fontconfig/fontconfig/-/commit/c2666a6d9a6ed18b1bfcef8176e25f62993e24db.patch"; 33 - hash = "sha256-UBzkxy3uxFO+g0aQtPnBZv7OncgQdinwzNwWS8ngjcE="; 34 - }) 35 - ]; 36 25 37 26 nativeBuildInputs = [ 38 27 autoreconfHook
+17 -4
pkgs/development/libraries/fontconfig/make-fonts-conf.nix
··· 1 - { runCommand, stdenv, lib, libxslt, fontconfig, dejavu_fonts, fontDirectories }: 1 + { runCommand, stdenv, lib, libxslt, fontconfig, dejavu_fonts, fontDirectories 2 + , impureFontDirectories ? [ 3 + # nix user profile 4 + "~/.nix-profile/lib/X11/fonts" "~/.nix-profile/share/fonts" 5 + ] 6 + ++ lib.optional stdenv.isDarwin "~/Library/Fonts" 7 + ++ [ 8 + # FHS paths for non-NixOS platforms 9 + "/usr/share/fonts" "/usr/local/share/fonts" 10 + ] 11 + # darwin paths 12 + ++ lib.optionals stdenv.isDarwin [ "/Library/Fonts" "/System/Library/Fonts" ] 13 + # nix default profile 14 + ++ [ "/nix/var/nix/profiles/default/lib/X11/fonts" "/nix/var/nix/profiles/default/share/fonts" ] }: 2 15 3 16 runCommand "fonts.conf" 4 17 { 5 18 nativeBuildInputs = [ libxslt ]; 6 19 buildInputs = [ fontconfig ]; 20 + inherit fontDirectories; 7 21 # Add a default font for non-nixos systems, <1MB and in nixos defaults. 8 - fontDirectories = fontDirectories ++ [ dejavu_fonts.minimal ] 9 - # further non-nixos fonts on darwin 10 - ++ lib.optionals stdenv.isDarwin [ "/System/Library/Fonts" "/Library/Fonts" "~/Library/Fonts" ]; 22 + impureFontDirectories = impureFontDirectories ++ [ dejavu_fonts.minimal ]; 11 23 } 12 24 '' 13 25 xsltproc --stringparam fontDirectories "$fontDirectories" \ 26 + --stringparam impureFontDirectories "$impureFontDirectories" \ 14 27 --path ${fontconfig.out}/share/xml/fontconfig \ 15 28 ${./make-fonts-conf.xsl} ${fontconfig.out}/etc/fonts/fonts.conf \ 16 29 > $out
+9 -11
pkgs/development/libraries/fontconfig/make-fonts-conf.xsl
··· 15 15 <xsl:output method='xml' encoding="UTF-8" doctype-system="urn:fontconfig:fonts.dtd" /> 16 16 17 17 <xsl:param name="fontDirectories" /> 18 + <xsl:param name="impureFontDirectories" /> 18 19 19 20 <xsl:template match="/fontconfig"> 20 21 ··· 23 24 24 25 <!-- the first cachedir will be used to store the cache --> 25 26 <cachedir prefix="xdg">fontconfig</cachedir> 27 + <xsl:text>&#0010;</xsl:text> 26 28 <!-- /var/cache/fontconfig is useful for non-nixos systems --> 27 29 <cachedir>/var/cache/fontconfig</cachedir> 30 + <xsl:text>&#0010;</xsl:text> 28 31 29 32 <!-- system-wide config --> 30 33 <include ignore_missing="yes">/etc/fonts/conf.d</include> 34 + <xsl:text>&#0010;</xsl:text> 31 35 32 36 <dir prefix="xdg">fonts</dir> 37 + <xsl:text>&#0010;</xsl:text> 33 38 <xsl:for-each select="str:tokenize($fontDirectories)"> 34 39 <dir><xsl:value-of select="." /></dir> 35 40 <xsl:text>&#0010;</xsl:text> 36 41 </xsl:for-each> 37 42 38 - <!-- nix user profile --> 39 - <dir>~/.nix-profile/lib/X11/fonts</dir> 40 - <dir>~/.nix-profile/share/fonts</dir> 41 - 42 - <!-- FHS paths for non-NixOS platforms --> 43 - <dir>/usr/share/fonts</dir> 44 - <dir>/usr/local/share/fonts</dir> 45 - 46 - <!-- nix default profile --> 47 - <dir>/nix/var/nix/profiles/default/lib/X11/fonts</dir> 48 - <dir>/nix/var/nix/profiles/default/share/fonts</dir> 43 + <xsl:for-each select="str:tokenize($impureFontDirectories)"> 44 + <dir><xsl:value-of select="." /></dir> 45 + <xsl:text>&#0010;</xsl:text> 46 + </xsl:for-each> 49 47 50 48 </fontconfig> 51 49
+2 -2
pkgs/development/libraries/gd/default.nix
··· 44 44 45 45 nativeBuildInputs = [ autoconf automake pkg-config ]; 46 46 47 - buildInputs = [ zlib fontconfig freetype libpng libjpeg libwebp libtiff libavif ] 48 - ++ lib.optional withXorg libXpm; 47 + buildInputs = [ zlib freetype libpng libjpeg libwebp libtiff libavif ] 48 + ++ lib.optionals withXorg [ fontconfig libXpm ]; 49 49 50 50 outputs = [ "bin" "dev" "out" ]; 51 51
+2 -2
pkgs/development/libraries/gnutls/default.nix
··· 35 35 36 36 stdenv.mkDerivation rec { 37 37 pname = "gnutls"; 38 - version = "3.8.2"; 38 + version = "3.8.3"; 39 39 40 40 src = fetchurl { 41 41 url = "mirror://gnupg/gnutls/v${lib.versions.majorMinor version}/gnutls-${version}.tar.xz"; 42 - hash = "sha256-52XlAW/6m53SQ+NjoEYNV3B0RE7iSRJn2y6WycKt73c="; 42 + hash = "sha256-90/FlUsn1Oxt+7Ed6ph4iLWxJCiaNwOvytoO5SD0Fz4="; 43 43 }; 44 44 45 45 outputs = [ "bin" "dev" "out" "man" "devdoc" ];
+3 -1
pkgs/development/libraries/gperftools/default.nix
··· 4 4 , fetchpatch 5 5 , autoreconfHook 6 6 , libunwind 7 + , perl 7 8 }: 8 9 9 10 stdenv.mkDerivation rec { ··· 29 30 nativeBuildInputs = [ autoreconfHook ]; 30 31 31 32 # tcmalloc uses libunwind in a way that works correctly only on non-ARM dynamically linked linux 32 - buildInputs = lib.optional (stdenv.isLinux && !(stdenv.hostPlatform.isAarch || stdenv.hostPlatform.isStatic )) libunwind; 33 + buildInputs = [ perl ] 34 + ++ lib.optional (stdenv.isLinux && !(stdenv.hostPlatform.isAarch || stdenv.hostPlatform.isStatic )) libunwind; 33 35 34 36 # Disable general dynamic TLS on AArch to support dlopen()'ing the library: 35 37 # https://bugzilla.redhat.com/show_bug.cgi?id=1483558
+3
pkgs/development/libraries/jellyfin-ffmpeg/default.nix
··· 15 15 hash = "sha256-LMwGxx++z6TpZLnpeRGraid4653Mp8T4pY5EP4Z7GXY="; 16 16 }; 17 17 18 + # Clobber upstream patches as they don't apply to the Jellyfin fork 19 + patches = []; 20 + 18 21 buildInputs = old.buildInputs ++ [ chromaprint ]; 19 22 20 23 configureFlags = old.configureFlags ++ [
+1 -1
pkgs/development/libraries/kde-frameworks/fetch.sh
··· 1 - WGET_ARGS=( https://download.kde.org/stable/frameworks/5.113/ -A '*.tar.xz' ) 1 + WGET_ARGS=( https://download.kde.org/stable/frameworks/5.114/ -A '*.tar.xz' )
+332 -332
pkgs/development/libraries/kde-frameworks/srcs.nix
··· 4 4 5 5 { 6 6 attica = { 7 - version = "5.113.0"; 7 + version = "5.114.0"; 8 8 src = fetchurl { 9 - url = "${mirror}/stable/frameworks/5.113/attica-5.113.0.tar.xz"; 10 - sha256 = "0p6n2jvky5x9gpwmp31mdxf0bzywaljgnkszgbklyc35xk9i6j14"; 11 - name = "attica-5.113.0.tar.xz"; 9 + url = "${mirror}/stable/frameworks/5.114/attica-5.114.0.tar.xz"; 10 + sha256 = "0gkdsm1vyyyxxyl4rni9s2bdz5w6zphzjl58fddjl899da06hqfq"; 11 + name = "attica-5.114.0.tar.xz"; 12 12 }; 13 13 }; 14 14 baloo = { 15 - version = "5.113.0"; 15 + version = "5.114.0"; 16 16 src = fetchurl { 17 - url = "${mirror}/stable/frameworks/5.113/baloo-5.113.0.tar.xz"; 18 - sha256 = "1jv7202dj2w0vcv49bgp0iv1sfy3kdqr974rcr77pcfzhhda9bix"; 19 - name = "baloo-5.113.0.tar.xz"; 17 + url = "${mirror}/stable/frameworks/5.114/baloo-5.114.0.tar.xz"; 18 + sha256 = "19sib1y0m5h2gnnpr9rfk810p6pdfm4zzxlm0a44r7910llp8i50"; 19 + name = "baloo-5.114.0.tar.xz"; 20 20 }; 21 21 }; 22 22 bluez-qt = { 23 - version = "5.113.0"; 23 + version = "5.114.0"; 24 24 src = fetchurl { 25 - url = "${mirror}/stable/frameworks/5.113/bluez-qt-5.113.0.tar.xz"; 26 - sha256 = "1y6nkl9zc5298jc6klxz88h6srmma085w1q5l4jmjihgys2zkcx7"; 27 - name = "bluez-qt-5.113.0.tar.xz"; 25 + url = "${mirror}/stable/frameworks/5.114/bluez-qt-5.114.0.tar.xz"; 26 + sha256 = "1ni50jwnb5ww8mkql0p3q8660c0srj8p0ik27lvxakwdq4wf6l9s"; 27 + name = "bluez-qt-5.114.0.tar.xz"; 28 28 }; 29 29 }; 30 30 breeze-icons = { 31 - version = "5.113.0"; 31 + version = "5.114.0"; 32 32 src = fetchurl { 33 - url = "${mirror}/stable/frameworks/5.113/breeze-icons-5.113.0.tar.xz"; 34 - sha256 = "0kb3wchx84dpi77zsi1b9pzlkhg3sjagxcsf1pdappagq3xn1p48"; 35 - name = "breeze-icons-5.113.0.tar.xz"; 33 + url = "${mirror}/stable/frameworks/5.114/breeze-icons-5.114.0.tar.xz"; 34 + sha256 = "0z5cpv10jyjdwjfkm7nj6hyp4vj29apm476hvbpb4gan27jyb91y"; 35 + name = "breeze-icons-5.114.0.tar.xz"; 36 36 }; 37 37 }; 38 38 extra-cmake-modules = { 39 - version = "5.113.0"; 39 + version = "5.114.0"; 40 40 src = fetchurl { 41 - url = "${mirror}/stable/frameworks/5.113/extra-cmake-modules-5.113.0.tar.xz"; 42 - sha256 = "1i1vpf9860cwrq5b01yrgf94hmzk9dx637j638shgjmyxr058pi6"; 43 - name = "extra-cmake-modules-5.113.0.tar.xz"; 41 + url = "${mirror}/stable/frameworks/5.114/extra-cmake-modules-5.114.0.tar.xz"; 42 + sha256 = "0z4nqravsfzlsgvkg5rha2d0qxfr3pfncw7z2fxzzqvzj7mfk6im"; 43 + name = "extra-cmake-modules-5.114.0.tar.xz"; 44 44 }; 45 45 }; 46 46 frameworkintegration = { 47 - version = "5.113.0"; 47 + version = "5.114.0"; 48 48 src = fetchurl { 49 - url = "${mirror}/stable/frameworks/5.113/frameworkintegration-5.113.0.tar.xz"; 50 - sha256 = "17i7frachq23kfg78ar33x5acwf7pmwl1a5c02qif44mml8b09hi"; 51 - name = "frameworkintegration-5.113.0.tar.xz"; 49 + url = "${mirror}/stable/frameworks/5.114/frameworkintegration-5.114.0.tar.xz"; 50 + sha256 = "1dqgzhhh8gnvl8jsvh2i6pjn935d61avh63b4z9kpllhvp9a2lnd"; 51 + name = "frameworkintegration-5.114.0.tar.xz"; 52 52 }; 53 53 }; 54 54 kactivities = { 55 - version = "5.113.0"; 55 + version = "5.114.0"; 56 56 src = fetchurl { 57 - url = "${mirror}/stable/frameworks/5.113/kactivities-5.113.0.tar.xz"; 58 - sha256 = "1d9lkhp344wdss9vab3gh9h31f1k6fifdhp17fblpkykgyvbb26y"; 59 - name = "kactivities-5.113.0.tar.xz"; 57 + url = "${mirror}/stable/frameworks/5.114/kactivities-5.114.0.tar.xz"; 58 + sha256 = "10pyynqz8c22la9aqms080iqlisj3irbi1kwnn3s0vg5dsjxr1p3"; 59 + name = "kactivities-5.114.0.tar.xz"; 60 60 }; 61 61 }; 62 62 kactivities-stats = { 63 - version = "5.113.0"; 63 + version = "5.114.0"; 64 64 src = fetchurl { 65 - url = "${mirror}/stable/frameworks/5.113/kactivities-stats-5.113.0.tar.xz"; 66 - sha256 = "136z2njw3k2l71xp4vg10sm5q925xh8yfr9a784wnr0kwngdb71i"; 67 - name = "kactivities-stats-5.113.0.tar.xz"; 65 + url = "${mirror}/stable/frameworks/5.114/kactivities-stats-5.114.0.tar.xz"; 66 + sha256 = "1zhrs2p3c831rwx7ww87i82k5i236vfywdxv7zhz93k3vffyqby7"; 67 + name = "kactivities-stats-5.114.0.tar.xz"; 68 68 }; 69 69 }; 70 70 kapidox = { 71 - version = "5.113.0"; 71 + version = "5.114.0"; 72 72 src = fetchurl { 73 - url = "${mirror}/stable/frameworks/5.113/kapidox-5.113.0.tar.xz"; 74 - sha256 = "05407c01wnjyslbbz0w5wipjpx6ng3izya41mg13g700ainj9q1x"; 75 - name = "kapidox-5.113.0.tar.xz"; 73 + url = "${mirror}/stable/frameworks/5.114/kapidox-5.114.0.tar.xz"; 74 + sha256 = "0xxw3lvipyax8r1af3ypwjj6waarbp2z9n11fjb4kvyigsypglmb"; 75 + name = "kapidox-5.114.0.tar.xz"; 76 76 }; 77 77 }; 78 78 karchive = { 79 - version = "5.113.0"; 79 + version = "5.114.0"; 80 80 src = fetchurl { 81 - url = "${mirror}/stable/frameworks/5.113/karchive-5.113.0.tar.xz"; 82 - sha256 = "03a3p85hmx4ycfp0y5l9yw4cy3i9jwy7jd27psmckr4q0538k91d"; 83 - name = "karchive-5.113.0.tar.xz"; 81 + url = "${mirror}/stable/frameworks/5.114/karchive-5.114.0.tar.xz"; 82 + sha256 = "015gc1zarny8r478p7g9m6r67l5dk3r0vcp28ilmfmznxy0k0hda"; 83 + name = "karchive-5.114.0.tar.xz"; 84 84 }; 85 85 }; 86 86 kauth = { 87 - version = "5.113.0"; 87 + version = "5.114.0"; 88 88 src = fetchurl { 89 - url = "${mirror}/stable/frameworks/5.113/kauth-5.113.0.tar.xz"; 90 - sha256 = "0ncpyq2l53p4yhhxkvk23x0ji9amrbnm6kbz8dp573cqww79pih2"; 91 - name = "kauth-5.113.0.tar.xz"; 89 + url = "${mirror}/stable/frameworks/5.114/kauth-5.114.0.tar.xz"; 90 + sha256 = "1rkf9mc9718wn8pzd3d3wcg3lsn0vkr9a2cqnz86rbg3cf2qdbir"; 91 + name = "kauth-5.114.0.tar.xz"; 92 92 }; 93 93 }; 94 94 kbookmarks = { 95 - version = "5.113.0"; 95 + version = "5.114.0"; 96 96 src = fetchurl { 97 - url = "${mirror}/stable/frameworks/5.113/kbookmarks-5.113.0.tar.xz"; 98 - sha256 = "1fgnh8amy2ghn50i59al0iyqvj05pzdxai9qxqzbvi65f1pibi7d"; 99 - name = "kbookmarks-5.113.0.tar.xz"; 97 + url = "${mirror}/stable/frameworks/5.114/kbookmarks-5.114.0.tar.xz"; 98 + sha256 = "06lnsyjhh80mdcqjww40glinmrjydbmkhv27a267vf34r7kam9rc"; 99 + name = "kbookmarks-5.114.0.tar.xz"; 100 100 }; 101 101 }; 102 102 kcalendarcore = { 103 - version = "5.113.0"; 103 + version = "5.114.0"; 104 104 src = fetchurl { 105 - url = "${mirror}/stable/frameworks/5.113/kcalendarcore-5.113.0.tar.xz"; 106 - sha256 = "18psjzqcfzaplcfjpjda983mrpv306il0j49q3rm9hj9ycj54wc2"; 107 - name = "kcalendarcore-5.113.0.tar.xz"; 105 + url = "${mirror}/stable/frameworks/5.114/kcalendarcore-5.114.0.tar.xz"; 106 + sha256 = "0aimda01zqw4fz5ldvz4vh767bi10r00kvm62n89nxhsq46wlk7p"; 107 + name = "kcalendarcore-5.114.0.tar.xz"; 108 108 }; 109 109 }; 110 110 kcmutils = { 111 - version = "5.113.0"; 111 + version = "5.114.0"; 112 112 src = fetchurl { 113 - url = "${mirror}/stable/frameworks/5.113/kcmutils-5.113.0.tar.xz"; 114 - sha256 = "1xbfzw2zfl966zp70jzfp3hjzn334zf4hnwr82priffafgrin57s"; 115 - name = "kcmutils-5.113.0.tar.xz"; 113 + url = "${mirror}/stable/frameworks/5.114/kcmutils-5.114.0.tar.xz"; 114 + sha256 = "1pblf3c60m0gn3vhdprw28f8y54kij02jwz91r2vnmng8d1xkrp9"; 115 + name = "kcmutils-5.114.0.tar.xz"; 116 116 }; 117 117 }; 118 118 kcodecs = { 119 - version = "5.113.0"; 119 + version = "5.114.0"; 120 120 src = fetchurl { 121 - url = "${mirror}/stable/frameworks/5.113/kcodecs-5.113.0.tar.xz"; 122 - sha256 = "1xvaq0yg4n4lwyq3yx2m8jrvfg7f0qrwgxxam4rmp2l245bvn34i"; 123 - name = "kcodecs-5.113.0.tar.xz"; 121 + url = "${mirror}/stable/frameworks/5.114/kcodecs-5.114.0.tar.xz"; 122 + sha256 = "080zvcqd8iq05p5x3qaf3rryx75lg2l2j1dr18sp50ir50zfwh2w"; 123 + name = "kcodecs-5.114.0.tar.xz"; 124 124 }; 125 125 }; 126 126 kcompletion = { 127 - version = "5.113.0"; 127 + version = "5.114.0"; 128 128 src = fetchurl { 129 - url = "${mirror}/stable/frameworks/5.113/kcompletion-5.113.0.tar.xz"; 130 - sha256 = "016280h98j1ssvc3a4b3vyh4s93s9y9hn1jrpbfbkm9xxnvi7k79"; 131 - name = "kcompletion-5.113.0.tar.xz"; 129 + url = "${mirror}/stable/frameworks/5.114/kcompletion-5.114.0.tar.xz"; 130 + sha256 = "0qvdxqlh1dklkbmqfjg5gc3dkdicgzn6q5lgvyf8cv46dinj6mwc"; 131 + name = "kcompletion-5.114.0.tar.xz"; 132 132 }; 133 133 }; 134 134 kconfig = { 135 - version = "5.113.0"; 135 + version = "5.114.0"; 136 136 src = fetchurl { 137 - url = "${mirror}/stable/frameworks/5.113/kconfig-5.113.0.tar.xz"; 138 - sha256 = "0fwhn3yp4gfwjiy5dx7gs0zd65yjlrrzkqpy7fpg7n97qf99q2a8"; 139 - name = "kconfig-5.113.0.tar.xz"; 137 + url = "${mirror}/stable/frameworks/5.114/kconfig-5.114.0.tar.xz"; 138 + sha256 = "0hghdh4p6cq9ckp4g5jdgd8w47pdsxxvzimrdfjrs71lmy8ydiy2"; 139 + name = "kconfig-5.114.0.tar.xz"; 140 140 }; 141 141 }; 142 142 kconfigwidgets = { 143 - version = "5.113.0"; 143 + version = "5.114.0"; 144 144 src = fetchurl { 145 - url = "${mirror}/stable/frameworks/5.113/kconfigwidgets-5.113.0.tar.xz"; 146 - sha256 = "0bmk5qxiss7a71xpfsbqj831wkcf94b7wfbw9xisvnxlfmf60y4v"; 147 - name = "kconfigwidgets-5.113.0.tar.xz"; 145 + url = "${mirror}/stable/frameworks/5.114/kconfigwidgets-5.114.0.tar.xz"; 146 + sha256 = "16layydkcwfbvzxqjzprkq8bbxifn0z0wm7mc9bzwrfxy761rjnj"; 147 + name = "kconfigwidgets-5.114.0.tar.xz"; 148 148 }; 149 149 }; 150 150 kcontacts = { 151 - version = "5.113.0"; 151 + version = "5.114.0"; 152 152 src = fetchurl { 153 - url = "${mirror}/stable/frameworks/5.113/kcontacts-5.113.0.tar.xz"; 154 - sha256 = "1y9cdv1g2ypwl4b0hk1sxk7lvb5qkbm4n1gh62plqsran62jsimm"; 155 - name = "kcontacts-5.113.0.tar.xz"; 153 + url = "${mirror}/stable/frameworks/5.114/kcontacts-5.114.0.tar.xz"; 154 + sha256 = "0lyqvbs216p5zpssaf4pyccph7nbwkbvhpmhbi32y2rm23cmxlwf"; 155 + name = "kcontacts-5.114.0.tar.xz"; 156 156 }; 157 157 }; 158 158 kcoreaddons = { 159 - version = "5.113.0"; 159 + version = "5.114.0"; 160 160 src = fetchurl { 161 - url = "${mirror}/stable/frameworks/5.113/kcoreaddons-5.113.0.tar.xz"; 162 - sha256 = "1bhanzfjw2i49sx2hjnim8k72vvbs7gyig7nkqkgbaxzpa8qgwrf"; 163 - name = "kcoreaddons-5.113.0.tar.xz"; 161 + url = "${mirror}/stable/frameworks/5.114/kcoreaddons-5.114.0.tar.xz"; 162 + sha256 = "1wv3s3xsiii96k17nzs2fb0ih2lyg52krf58v44nlk9wfi4wmnqx"; 163 + name = "kcoreaddons-5.114.0.tar.xz"; 164 164 }; 165 165 }; 166 166 kcrash = { 167 - version = "5.113.0"; 167 + version = "5.114.0"; 168 168 src = fetchurl { 169 - url = "${mirror}/stable/frameworks/5.113/kcrash-5.113.0.tar.xz"; 170 - sha256 = "1mg90xm6ckcd30s07psn30sgh81lx8kfs0p1h6cblg4q8bkgkndv"; 171 - name = "kcrash-5.113.0.tar.xz"; 169 + url = "${mirror}/stable/frameworks/5.114/kcrash-5.114.0.tar.xz"; 170 + sha256 = "1avi4yd3kpjqxrvci1nicxbh9mjafj1w2vgfmqanq66b76s4kxj1"; 171 + name = "kcrash-5.114.0.tar.xz"; 172 172 }; 173 173 }; 174 174 kdav = { 175 - version = "5.113.0"; 175 + version = "5.114.0"; 176 176 src = fetchurl { 177 - url = "${mirror}/stable/frameworks/5.113/kdav-5.113.0.tar.xz"; 178 - sha256 = "1djng9c741xairr84nvjbkq4dk551p7yk91g8d4nndy8s1kiz1dv"; 179 - name = "kdav-5.113.0.tar.xz"; 177 + url = "${mirror}/stable/frameworks/5.114/kdav-5.114.0.tar.xz"; 178 + sha256 = "11959fxz24snk2l31kw8w96wah0s2fjimimrxh6xhppiy5qp2fp2"; 179 + name = "kdav-5.114.0.tar.xz"; 180 180 }; 181 181 }; 182 182 kdbusaddons = { 183 - version = "5.113.0"; 183 + version = "5.114.0"; 184 184 src = fetchurl { 185 - url = "${mirror}/stable/frameworks/5.113/kdbusaddons-5.113.0.tar.xz"; 186 - sha256 = "101a406f8i0wgaxd0ilvfcb3plzjgvxw9bhhm5pin6fpr0xkjrnk"; 187 - name = "kdbusaddons-5.113.0.tar.xz"; 185 + url = "${mirror}/stable/frameworks/5.114/kdbusaddons-5.114.0.tar.xz"; 186 + sha256 = "0pzzznyxhi48z5hhdsdxz3vaaihrdshpx65ha2v2nn2gh3ww7ikm"; 187 + name = "kdbusaddons-5.114.0.tar.xz"; 188 188 }; 189 189 }; 190 190 kdeclarative = { 191 - version = "5.113.0"; 191 + version = "5.114.0"; 192 192 src = fetchurl { 193 - url = "${mirror}/stable/frameworks/5.113/kdeclarative-5.113.0.tar.xz"; 194 - sha256 = "1wj9arkmjdrac04cq2w5bw5184jnlq5xn2cw6n7lajc31yrbc0rk"; 195 - name = "kdeclarative-5.113.0.tar.xz"; 193 + url = "${mirror}/stable/frameworks/5.114/kdeclarative-5.114.0.tar.xz"; 194 + sha256 = "0w98pj8acxb4m9645963rzq5vja1fbih5czz24mf9zdqlg2dkz8g"; 195 + name = "kdeclarative-5.114.0.tar.xz"; 196 196 }; 197 197 }; 198 198 kded = { 199 - version = "5.113.0"; 199 + version = "5.114.0"; 200 200 src = fetchurl { 201 - url = "${mirror}/stable/frameworks/5.113/kded-5.113.0.tar.xz"; 202 - sha256 = "1vb3z7r2l206n7p70a4cbkrm7fvyk7hqqf0bz7514r4g86l4l5n4"; 203 - name = "kded-5.113.0.tar.xz"; 201 + url = "${mirror}/stable/frameworks/5.114/kded-5.114.0.tar.xz"; 202 + sha256 = "00n4isc4ahii0ldrg761lkmnq27kmrfqs9zkmpvmgbg57259mvc3"; 203 + name = "kded-5.114.0.tar.xz"; 204 204 }; 205 205 }; 206 206 kdelibs4support = { 207 - version = "5.113.0"; 207 + version = "5.114.0"; 208 208 src = fetchurl { 209 - url = "${mirror}/stable/frameworks/5.113/portingAids/kdelibs4support-5.113.0.tar.xz"; 210 - sha256 = "1z843zq1g5n3b8gb20y8266hyikvbzdsgc77gvcgzvqfdxk19l24"; 211 - name = "kdelibs4support-5.113.0.tar.xz"; 209 + url = "${mirror}/stable/frameworks/5.114/portingAids/kdelibs4support-5.114.0.tar.xz"; 210 + sha256 = "17473him2fjfcw5f88diarqac815wsakfyb9fka82a4qqh9l41mc"; 211 + name = "kdelibs4support-5.114.0.tar.xz"; 212 212 }; 213 213 }; 214 214 kdesignerplugin = { 215 - version = "5.113.0"; 215 + version = "5.114.0"; 216 216 src = fetchurl { 217 - url = "${mirror}/stable/frameworks/5.113/portingAids/kdesignerplugin-5.113.0.tar.xz"; 218 - sha256 = "05hwq8rpm1f9ad5fyk2gjqxm6gvvx2gx2zdbklww9ghlh8qndl9i"; 219 - name = "kdesignerplugin-5.113.0.tar.xz"; 217 + url = "${mirror}/stable/frameworks/5.114/portingAids/kdesignerplugin-5.114.0.tar.xz"; 218 + sha256 = "0zlvkayv6zl5rp1076bscmdzyw93y7sxqb5848w11vs0g9amcj9n"; 219 + name = "kdesignerplugin-5.114.0.tar.xz"; 220 220 }; 221 221 }; 222 222 kdesu = { 223 - version = "5.113.0"; 223 + version = "5.114.0"; 224 224 src = fetchurl { 225 - url = "${mirror}/stable/frameworks/5.113/kdesu-5.113.0.tar.xz"; 226 - sha256 = "085d3d6qpl4m7z8smm0bq9khfjjglpb1gd9n8q0d541127y2cpq4"; 227 - name = "kdesu-5.113.0.tar.xz"; 225 + url = "${mirror}/stable/frameworks/5.114/kdesu-5.114.0.tar.xz"; 226 + sha256 = "14dcf32izn4lxr8vx372rfznflc1rcxwanx06phkd8mx9zyg4jxr"; 227 + name = "kdesu-5.114.0.tar.xz"; 228 228 }; 229 229 }; 230 230 kdewebkit = { 231 - version = "5.113.0"; 231 + version = "5.114.0"; 232 232 src = fetchurl { 233 - url = "${mirror}/stable/frameworks/5.113/portingAids/kdewebkit-5.113.0.tar.xz"; 234 - sha256 = "18bmg88xj07h8y5f3f2ckjs9m61mf8jrxrg4vg8hrf4nabxz20xn"; 235 - name = "kdewebkit-5.113.0.tar.xz"; 233 + url = "${mirror}/stable/frameworks/5.114/portingAids/kdewebkit-5.114.0.tar.xz"; 234 + sha256 = "04zc2qs13k04gsn124mnh6sqi3pax8c014jcb0qdh3h2r2y72bz3"; 235 + name = "kdewebkit-5.114.0.tar.xz"; 236 236 }; 237 237 }; 238 238 kdnssd = { 239 - version = "5.113.0"; 239 + version = "5.114.0"; 240 240 src = fetchurl { 241 - url = "${mirror}/stable/frameworks/5.113/kdnssd-5.113.0.tar.xz"; 242 - sha256 = "1hbb9zy1f13m45b6kzndxw619vnmx0s418brqgkdaxgsh12j5anq"; 243 - name = "kdnssd-5.113.0.tar.xz"; 241 + url = "${mirror}/stable/frameworks/5.114/kdnssd-5.114.0.tar.xz"; 242 + sha256 = "1zw5rkprr54j05ic8zljk57zahp2v6333slr253r3n1679zqlv64"; 243 + name = "kdnssd-5.114.0.tar.xz"; 244 244 }; 245 245 }; 246 246 kdoctools = { 247 - version = "5.113.0"; 247 + version = "5.114.0"; 248 248 src = fetchurl { 249 - url = "${mirror}/stable/frameworks/5.113/kdoctools-5.113.0.tar.xz"; 250 - sha256 = "0cfs4znhp7psrz99j3brp8q39gg0bpzvkrdx90zl6vvrc06d2zaa"; 251 - name = "kdoctools-5.113.0.tar.xz"; 249 + url = "${mirror}/stable/frameworks/5.114/kdoctools-5.114.0.tar.xz"; 250 + sha256 = "15s58r2zvdckw30x9q9ir8h1i8q2ncfgjn9h4jnmylwm79z3z27v"; 251 + name = "kdoctools-5.114.0.tar.xz"; 252 252 }; 253 253 }; 254 254 kemoticons = { 255 - version = "5.113.0"; 255 + version = "5.114.0"; 256 256 src = fetchurl { 257 - url = "${mirror}/stable/frameworks/5.113/kemoticons-5.113.0.tar.xz"; 258 - sha256 = "127frvsp1h9hg755vz2i609wxqqgzgsz15iqr7hcpbmmf6xvm8i2"; 259 - name = "kemoticons-5.113.0.tar.xz"; 257 + url = "${mirror}/stable/frameworks/5.114/kemoticons-5.114.0.tar.xz"; 258 + sha256 = "0w87prkhdmba7y8ylbycdpwdzd2djmp7hvv5ljb9s4aqqhnn3vw4"; 259 + name = "kemoticons-5.114.0.tar.xz"; 260 260 }; 261 261 }; 262 262 kfilemetadata = { 263 - version = "5.113.0"; 263 + version = "5.114.0"; 264 264 src = fetchurl { 265 - url = "${mirror}/stable/frameworks/5.113/kfilemetadata-5.113.0.tar.xz"; 266 - sha256 = "1ap25y66y1r185fghvkkkkp4f6acnkazny8wxw5hv1gg25ilpsir"; 267 - name = "kfilemetadata-5.113.0.tar.xz"; 265 + url = "${mirror}/stable/frameworks/5.114/kfilemetadata-5.114.0.tar.xz"; 266 + sha256 = "15va29chlsrxii02w1ax718hp1b14ym59lcfyzh7w30zlf681560"; 267 + name = "kfilemetadata-5.114.0.tar.xz"; 268 268 }; 269 269 }; 270 270 kglobalaccel = { 271 - version = "5.113.0"; 271 + version = "5.114.0"; 272 272 src = fetchurl { 273 - url = "${mirror}/stable/frameworks/5.113/kglobalaccel-5.113.0.tar.xz"; 274 - sha256 = "0ibm1wd7fhi3j5za0agyq2zrs9nx5a8b47iijkzgkpz9ylxniwrs"; 275 - name = "kglobalaccel-5.113.0.tar.xz"; 273 + url = "${mirror}/stable/frameworks/5.114/kglobalaccel-5.114.0.tar.xz"; 274 + sha256 = "19mmav055fnzyl760fyhf0pdvaidd5i1h04l2hcnpin4p1jnpfap"; 275 + name = "kglobalaccel-5.114.0.tar.xz"; 276 276 }; 277 277 }; 278 278 kguiaddons = { 279 - version = "5.113.0"; 279 + version = "5.114.0"; 280 280 src = fetchurl { 281 - url = "${mirror}/stable/frameworks/5.113/kguiaddons-5.113.0.tar.xz"; 282 - sha256 = "1ykhxgx89x1qv916pcz3j0q14ylalg9v23jjw0dbwpg5hlj4qlyc"; 283 - name = "kguiaddons-5.113.0.tar.xz"; 281 + url = "${mirror}/stable/frameworks/5.114/kguiaddons-5.114.0.tar.xz"; 282 + sha256 = "0riya9plcz9c1ndhdbsradssndshbm12705swn7vf7am17n7f947"; 283 + name = "kguiaddons-5.114.0.tar.xz"; 284 284 }; 285 285 }; 286 286 kholidays = { 287 - version = "5.113.0"; 287 + version = "5.114.0"; 288 288 src = fetchurl { 289 - url = "${mirror}/stable/frameworks/5.113/kholidays-5.113.0.tar.xz"; 290 - sha256 = "1wq397j3m3s9a45k9h5hsdsfansvb3a5q8biag2w3fsb1i84id0i"; 291 - name = "kholidays-5.113.0.tar.xz"; 289 + url = "${mirror}/stable/frameworks/5.114/kholidays-5.114.0.tar.xz"; 290 + sha256 = "19r8dxglz5ll6iyvigsccil3ikvcsnyy5nwcpjvjr1c0brigcjmy"; 291 + name = "kholidays-5.114.0.tar.xz"; 292 292 }; 293 293 }; 294 294 khtml = { 295 - version = "5.113.0"; 295 + version = "5.114.0"; 296 296 src = fetchurl { 297 - url = "${mirror}/stable/frameworks/5.113/portingAids/khtml-5.113.0.tar.xz"; 298 - sha256 = "0m284rwq8f49j71lcapzr4qi0f72a0adnv67mfg5blar867161mq"; 299 - name = "khtml-5.113.0.tar.xz"; 297 + url = "${mirror}/stable/frameworks/5.114/portingAids/khtml-5.114.0.tar.xz"; 298 + sha256 = "1mf84zs9hjvmi74f8rgqzrfkqjq597f9k64dn1bqcj13v0w10vry"; 299 + name = "khtml-5.114.0.tar.xz"; 300 300 }; 301 301 }; 302 302 ki18n = { 303 - version = "5.113.0"; 303 + version = "5.114.0"; 304 304 src = fetchurl { 305 - url = "${mirror}/stable/frameworks/5.113/ki18n-5.113.0.tar.xz"; 306 - sha256 = "0hl0qp3653xiwa5ndk82ygy2kgrc0pygqkknb1cx5w54s56bm57w"; 307 - name = "ki18n-5.113.0.tar.xz"; 305 + url = "${mirror}/stable/frameworks/5.114/ki18n-5.114.0.tar.xz"; 306 + sha256 = "1yg03awcx5ay6lgbgwv91i0ankrm94z9m0wky4v03gnwnvw8pa0v"; 307 + name = "ki18n-5.114.0.tar.xz"; 308 308 }; 309 309 }; 310 310 kiconthemes = { 311 - version = "5.113.0"; 311 + version = "5.114.0"; 312 312 src = fetchurl { 313 - url = "${mirror}/stable/frameworks/5.113/kiconthemes-5.113.0.tar.xz"; 314 - sha256 = "0q2c1s8pwl7dnx9v7q061zn5n1prk0vv0j77kki9wfncjaf15g0g"; 315 - name = "kiconthemes-5.113.0.tar.xz"; 313 + url = "${mirror}/stable/frameworks/5.114/kiconthemes-5.114.0.tar.xz"; 314 + sha256 = "0ndiqmcs1ybj4acc6k3p9jwq09slqc4nj12ifqvlxrfj3ak6sb28"; 315 + name = "kiconthemes-5.114.0.tar.xz"; 316 316 }; 317 317 }; 318 318 kidletime = { 319 - version = "5.113.0"; 319 + version = "5.114.0"; 320 320 src = fetchurl { 321 - url = "${mirror}/stable/frameworks/5.113/kidletime-5.113.0.tar.xz"; 322 - sha256 = "1cdfhn3mcxvizba1gpf0viba3g0mnva3l226lkca3p9ps8c4z3rm"; 323 - name = "kidletime-5.113.0.tar.xz"; 321 + url = "${mirror}/stable/frameworks/5.114/kidletime-5.114.0.tar.xz"; 322 + sha256 = "06sc9w54g4n7s5gjkqz08rgcz6v3pr0bdgx3gbjgzass6l4m8w7p"; 323 + name = "kidletime-5.114.0.tar.xz"; 324 324 }; 325 325 }; 326 326 kimageformats = { 327 - version = "5.113.0"; 327 + version = "5.114.0"; 328 328 src = fetchurl { 329 - url = "${mirror}/stable/frameworks/5.113/kimageformats-5.113.0.tar.xz"; 330 - sha256 = "0gys83sazgbj7h3yiaacqr464z951ixygrhzcw16cnqjm8phic44"; 331 - name = "kimageformats-5.113.0.tar.xz"; 329 + url = "${mirror}/stable/frameworks/5.114/kimageformats-5.114.0.tar.xz"; 330 + sha256 = "1nfzpgnrbwncx9zp9cwa169jlfv7i85p00a07d4jc5hrdyvvkn0w"; 331 + name = "kimageformats-5.114.0.tar.xz"; 332 332 }; 333 333 }; 334 334 kinit = { 335 - version = "5.113.0"; 335 + version = "5.114.0"; 336 336 src = fetchurl { 337 - url = "${mirror}/stable/frameworks/5.113/kinit-5.113.0.tar.xz"; 338 - sha256 = "1ydmgxyr5j9zi0a5vlb64kkjxka3rsyvzj10y3dww92qyapnn2bv"; 339 - name = "kinit-5.113.0.tar.xz"; 337 + url = "${mirror}/stable/frameworks/5.114/kinit-5.114.0.tar.xz"; 338 + sha256 = "0b6z9gq05vz20hm5y9ai3sbqq3gxwm3a3z88dkvi7dywk7vbqcph"; 339 + name = "kinit-5.114.0.tar.xz"; 340 340 }; 341 341 }; 342 342 kio = { 343 - version = "5.113.0"; 343 + version = "5.114.0"; 344 344 src = fetchurl { 345 - url = "${mirror}/stable/frameworks/5.113/kio-5.113.0.tar.xz"; 346 - sha256 = "1bjmv3wdpmzqbv1xzzl0ydirccbknnjyqn6wzb057zgy7kpi1cd8"; 347 - name = "kio-5.113.0.tar.xz"; 345 + url = "${mirror}/stable/frameworks/5.114/kio-5.114.0.tar.xz"; 346 + sha256 = "0nwmxbfhvfw69q07vxvflri7rkdczyc89xv4ll3nrzrhgf15kb2z"; 347 + name = "kio-5.114.0.tar.xz"; 348 348 }; 349 349 }; 350 350 kirigami2 = { 351 - version = "5.113.0"; 351 + version = "5.114.0"; 352 352 src = fetchurl { 353 - url = "${mirror}/stable/frameworks/5.113/kirigami2-5.113.0.tar.xz"; 354 - sha256 = "0zy3s841q2xw4d048a3qh4cfh9kb3qaqxml4ny5zi73crm173h8y"; 355 - name = "kirigami2-5.113.0.tar.xz"; 353 + url = "${mirror}/stable/frameworks/5.114/kirigami2-5.114.0.tar.xz"; 354 + sha256 = "1bd232gs4394fa3aq31mjqrn8f3vjsghx7817szi7ryvnn6fnqkw"; 355 + name = "kirigami2-5.114.0.tar.xz"; 356 356 }; 357 357 }; 358 358 kitemmodels = { 359 - version = "5.113.0"; 359 + version = "5.114.0"; 360 360 src = fetchurl { 361 - url = "${mirror}/stable/frameworks/5.113/kitemmodels-5.113.0.tar.xz"; 362 - sha256 = "01i1s7rw7ndp3gnl3bg0pv8a9qz95rmz0jxkw97p72gcah2q2yvk"; 363 - name = "kitemmodels-5.113.0.tar.xz"; 361 + url = "${mirror}/stable/frameworks/5.114/kitemmodels-5.114.0.tar.xz"; 362 + sha256 = "1bfmcrbcbrvp2rcaf32vzvarqwp41gn6s4xpf56hnxbwf9kgk1fl"; 363 + name = "kitemmodels-5.114.0.tar.xz"; 364 364 }; 365 365 }; 366 366 kitemviews = { 367 - version = "5.113.0"; 367 + version = "5.114.0"; 368 368 src = fetchurl { 369 - url = "${mirror}/stable/frameworks/5.113/kitemviews-5.113.0.tar.xz"; 370 - sha256 = "0wnmgm72kv7vxadsrkdbnjknb4lkzrmn6gk7car7jx2i91kz7xdd"; 371 - name = "kitemviews-5.113.0.tar.xz"; 369 + url = "${mirror}/stable/frameworks/5.114/kitemviews-5.114.0.tar.xz"; 370 + sha256 = "00vl2ck0pq0sqcxvhlr2pimgr27hd9v7y9dz6w4arb5smi5q1ixg"; 371 + name = "kitemviews-5.114.0.tar.xz"; 372 372 }; 373 373 }; 374 374 kjobwidgets = { 375 - version = "5.113.0"; 375 + version = "5.114.0"; 376 376 src = fetchurl { 377 - url = "${mirror}/stable/frameworks/5.113/kjobwidgets-5.113.0.tar.xz"; 378 - sha256 = "0f5shrapjvwp8bc34vypzfsfl07pj7nmdflf9lcwc8h3kwf2rxqr"; 379 - name = "kjobwidgets-5.113.0.tar.xz"; 377 + url = "${mirror}/stable/frameworks/5.114/kjobwidgets-5.114.0.tar.xz"; 378 + sha256 = "1ymlqi5cqcs79nj1vff8pqwgvy0dxj5vv7l529w3a3n315hkrny8"; 379 + name = "kjobwidgets-5.114.0.tar.xz"; 380 380 }; 381 381 }; 382 382 kjs = { 383 - version = "5.113.0"; 383 + version = "5.114.0"; 384 384 src = fetchurl { 385 - url = "${mirror}/stable/frameworks/5.113/portingAids/kjs-5.113.0.tar.xz"; 386 - sha256 = "0h50jyd9mddnavafikn9haqqcq1mql2v8qcc1c233ffplkx1f6hb"; 387 - name = "kjs-5.113.0.tar.xz"; 385 + url = "${mirror}/stable/frameworks/5.114/portingAids/kjs-5.114.0.tar.xz"; 386 + sha256 = "08nh6yr6bqifpb5s9a4wbjwmwnm7zp5k8hcdmyb6mlcbam9qp6j7"; 387 + name = "kjs-5.114.0.tar.xz"; 388 388 }; 389 389 }; 390 390 kjsembed = { 391 - version = "5.113.0"; 391 + version = "5.114.0"; 392 392 src = fetchurl { 393 - url = "${mirror}/stable/frameworks/5.113/portingAids/kjsembed-5.113.0.tar.xz"; 394 - sha256 = "0bwsj0n3d038vs3n2mw6x8srbg4da40bw59q14cpv70ws1sg2r2n"; 395 - name = "kjsembed-5.113.0.tar.xz"; 393 + url = "${mirror}/stable/frameworks/5.114/portingAids/kjsembed-5.114.0.tar.xz"; 394 + sha256 = "1xglisxv7nfsbj9lgpvc4c5ql4f6m7n71vf7vih5ff3aqybrkgxa"; 395 + name = "kjsembed-5.114.0.tar.xz"; 396 396 }; 397 397 }; 398 398 kmediaplayer = { 399 - version = "5.113.0"; 399 + version = "5.114.0"; 400 400 src = fetchurl { 401 - url = "${mirror}/stable/frameworks/5.113/portingAids/kmediaplayer-5.113.0.tar.xz"; 402 - sha256 = "1nyn7x28j17yrb7zx31519h2ghp5h3pwk6baxais0q1mv9azyfay"; 403 - name = "kmediaplayer-5.113.0.tar.xz"; 401 + url = "${mirror}/stable/frameworks/5.114/portingAids/kmediaplayer-5.114.0.tar.xz"; 402 + sha256 = "092yvzvrkvr8xxncw7h5ghfd2bggzxsqfj67c2vhymhfw4i0c54x"; 403 + name = "kmediaplayer-5.114.0.tar.xz"; 404 404 }; 405 405 }; 406 406 knewstuff = { 407 - version = "5.113.0"; 407 + version = "5.114.0"; 408 408 src = fetchurl { 409 - url = "${mirror}/stable/frameworks/5.113/knewstuff-5.113.0.tar.xz"; 410 - sha256 = "0fj17rxyp9wmmc9jh8zjpgwpia9r4xlvabvkb4ynd1vhy58k8w51"; 411 - name = "knewstuff-5.113.0.tar.xz"; 409 + url = "${mirror}/stable/frameworks/5.114/knewstuff-5.114.0.tar.xz"; 410 + sha256 = "15xmx7rnnrsz2cj044aviyr4hi9h8r0nnva9qzcjcq2hkkgj7wjj"; 411 + name = "knewstuff-5.114.0.tar.xz"; 412 412 }; 413 413 }; 414 414 knotifications = { 415 - version = "5.113.0"; 415 + version = "5.114.0"; 416 416 src = fetchurl { 417 - url = "${mirror}/stable/frameworks/5.113/knotifications-5.113.0.tar.xz"; 418 - sha256 = "1yzpf12wsi3h3v7z68b42rjdrnfkah6avq4y611b0r004shgkl1x"; 419 - name = "knotifications-5.113.0.tar.xz"; 417 + url = "${mirror}/stable/frameworks/5.114/knotifications-5.114.0.tar.xz"; 418 + sha256 = "0cjd5ml9hyzprjgmrc132cmp7g9hnl0h5swlxw2ifqnxxyfkg72b"; 419 + name = "knotifications-5.114.0.tar.xz"; 420 420 }; 421 421 }; 422 422 knotifyconfig = { 423 - version = "5.113.0"; 423 + version = "5.114.0"; 424 424 src = fetchurl { 425 - url = "${mirror}/stable/frameworks/5.113/knotifyconfig-5.113.0.tar.xz"; 426 - sha256 = "1gdzyxcc371lmnzc153k8wdyxgsv7r2y44j8d5srld36amssxnc6"; 427 - name = "knotifyconfig-5.113.0.tar.xz"; 425 + url = "${mirror}/stable/frameworks/5.114/knotifyconfig-5.114.0.tar.xz"; 426 + sha256 = "049n64qlr69zv1dc1dhgbsca37179hp06xfsxnhg97lblz3p3gds"; 427 + name = "knotifyconfig-5.114.0.tar.xz"; 428 428 }; 429 429 }; 430 430 kpackage = { 431 - version = "5.113.0"; 431 + version = "5.114.0"; 432 432 src = fetchurl { 433 - url = "${mirror}/stable/frameworks/5.113/kpackage-5.113.0.tar.xz"; 434 - sha256 = "04605kr2w0yhwx64lqq1qc1zmmip7vkxnxv3fs2846864814fkk2"; 435 - name = "kpackage-5.113.0.tar.xz"; 433 + url = "${mirror}/stable/frameworks/5.114/kpackage-5.114.0.tar.xz"; 434 + sha256 = "0v165az3k5lfszxy0kl2464573y0dcq92fyfiklwnkkcjsvba69d"; 435 + name = "kpackage-5.114.0.tar.xz"; 436 436 }; 437 437 }; 438 438 kparts = { 439 - version = "5.113.0"; 439 + version = "5.114.0"; 440 440 src = fetchurl { 441 - url = "${mirror}/stable/frameworks/5.113/kparts-5.113.0.tar.xz"; 442 - sha256 = "0mx95xrr6pad4q5p0sn2iqmc59787bpfkvkyiz9li56wynh1jf48"; 443 - name = "kparts-5.113.0.tar.xz"; 441 + url = "${mirror}/stable/frameworks/5.114/kparts-5.114.0.tar.xz"; 442 + sha256 = "1rrf765p554r7l8j23gx5zxdq6wimh0v91qdkwz7ilm2qr16vd5v"; 443 + name = "kparts-5.114.0.tar.xz"; 444 444 }; 445 445 }; 446 446 kpeople = { 447 - version = "5.113.0"; 447 + version = "5.114.0"; 448 448 src = fetchurl { 449 - url = "${mirror}/stable/frameworks/5.113/kpeople-5.113.0.tar.xz"; 450 - sha256 = "08g44hq1iywycf44imdqkql4gx2vyg87n1nxxqq6ssva0kybia7n"; 451 - name = "kpeople-5.113.0.tar.xz"; 449 + url = "${mirror}/stable/frameworks/5.114/kpeople-5.114.0.tar.xz"; 450 + sha256 = "04v0s3amn6lbb16qvp1r6figckva6xk8z7djk8jda8fbnx8dx2r1"; 451 + name = "kpeople-5.114.0.tar.xz"; 452 452 }; 453 453 }; 454 454 kplotting = { 455 - version = "5.113.0"; 455 + version = "5.114.0"; 456 456 src = fetchurl { 457 - url = "${mirror}/stable/frameworks/5.113/kplotting-5.113.0.tar.xz"; 458 - sha256 = "16pfia711y9iqnl0svyg00g7a2x4ln8yaxmrmy74xj7y0dj5jcyj"; 459 - name = "kplotting-5.113.0.tar.xz"; 457 + url = "${mirror}/stable/frameworks/5.114/kplotting-5.114.0.tar.xz"; 458 + sha256 = "17x58pplln0plqiyhjpzdiqxngylxq5gkc5gk7b91xzm783x2k0n"; 459 + name = "kplotting-5.114.0.tar.xz"; 460 460 }; 461 461 }; 462 462 kpty = { 463 - version = "5.113.0"; 463 + version = "5.114.0"; 464 464 src = fetchurl { 465 - url = "${mirror}/stable/frameworks/5.113/kpty-5.113.0.tar.xz"; 466 - sha256 = "0hzn18lidiiaxr08fjhk0r5zh0m01ls46w1fyjnv42bvf7vd7v5y"; 467 - name = "kpty-5.113.0.tar.xz"; 465 + url = "${mirror}/stable/frameworks/5.114/kpty-5.114.0.tar.xz"; 466 + sha256 = "0fm7bfp89kvg1a64q8piiyal71p6vjnqcm13zak6r9fbfwcm0gs9"; 467 + name = "kpty-5.114.0.tar.xz"; 468 468 }; 469 469 }; 470 470 kquickcharts = { 471 - version = "5.113.0"; 471 + version = "5.114.0"; 472 472 src = fetchurl { 473 - url = "${mirror}/stable/frameworks/5.113/kquickcharts-5.113.0.tar.xz"; 474 - sha256 = "0v47c6mdx72rdz441zk4csc6a2bj6wi7772vlpz2yr3ay70l8f5d"; 475 - name = "kquickcharts-5.113.0.tar.xz"; 473 + url = "${mirror}/stable/frameworks/5.114/kquickcharts-5.114.0.tar.xz"; 474 + sha256 = "1f91x92qdzxp31z7ixx9jn41hq9f3w9hjia94pab9vsnaz8prbd1"; 475 + name = "kquickcharts-5.114.0.tar.xz"; 476 476 }; 477 477 }; 478 478 kross = { 479 - version = "5.113.0"; 479 + version = "5.114.0"; 480 480 src = fetchurl { 481 - url = "${mirror}/stable/frameworks/5.113/portingAids/kross-5.113.0.tar.xz"; 482 - sha256 = "1cqdcm086a4kjrb9k6cwqn05fg5ij3zppc8bi7dxrgrfxc494c8s"; 483 - name = "kross-5.113.0.tar.xz"; 481 + url = "${mirror}/stable/frameworks/5.114/portingAids/kross-5.114.0.tar.xz"; 482 + sha256 = "0bbpi63lxbb4ylx2jd172a2bqyxkd606n7w8zrvcjy466lkv3sz4"; 483 + name = "kross-5.114.0.tar.xz"; 484 484 }; 485 485 }; 486 486 krunner = { 487 - version = "5.113.0"; 487 + version = "5.114.0"; 488 488 src = fetchurl { 489 - url = "${mirror}/stable/frameworks/5.113/krunner-5.113.0.tar.xz"; 490 - sha256 = "0z7d6nyvrlgr7aw9ibz1xgp62220iwzvhqpqikwlxhc9hjggmdlh"; 491 - name = "krunner-5.113.0.tar.xz"; 489 + url = "${mirror}/stable/frameworks/5.114/krunner-5.114.0.tar.xz"; 490 + sha256 = "1rjs9b87bi4f6pdm9fwnha2sj2mrq260l80iz2jq1zah83p546sw"; 491 + name = "krunner-5.114.0.tar.xz"; 492 492 }; 493 493 }; 494 494 kservice = { 495 - version = "5.113.0"; 495 + version = "5.114.0"; 496 496 src = fetchurl { 497 - url = "${mirror}/stable/frameworks/5.113/kservice-5.113.0.tar.xz"; 498 - sha256 = "09ph72jb40pkw1nzayvzzav4m6240amkj6jvx390dmsvr7jzn0nb"; 499 - name = "kservice-5.113.0.tar.xz"; 497 + url = "${mirror}/stable/frameworks/5.114/kservice-5.114.0.tar.xz"; 498 + sha256 = "0jdvlplnsb9w628wh3ip6awxvhgyc097zh7ls9614ymkbnpc9xca"; 499 + name = "kservice-5.114.0.tar.xz"; 500 500 }; 501 501 }; 502 502 ktexteditor = { 503 - version = "5.113.0"; 503 + version = "5.114.0"; 504 504 src = fetchurl { 505 - url = "${mirror}/stable/frameworks/5.113/ktexteditor-5.113.0.tar.xz"; 506 - sha256 = "02nclhfgqximsl8w6la5w0fshzcj71nrz5kjb2p1s28xdf1ahvgg"; 507 - name = "ktexteditor-5.113.0.tar.xz"; 505 + url = "${mirror}/stable/frameworks/5.114/ktexteditor-5.114.0.tar.xz"; 506 + sha256 = "06amzk6290imi2gj3v1k3f56zdlad7zbz4wwlf34v4iibj9mfgw8"; 507 + name = "ktexteditor-5.114.0.tar.xz"; 508 508 }; 509 509 }; 510 510 ktextwidgets = { 511 - version = "5.113.0"; 511 + version = "5.114.0"; 512 512 src = fetchurl { 513 - url = "${mirror}/stable/frameworks/5.113/ktextwidgets-5.113.0.tar.xz"; 514 - sha256 = "060grfna4kj8nhxgk38yf3csqfgxg0358dkwmg8aw5y5k0jys2az"; 515 - name = "ktextwidgets-5.113.0.tar.xz"; 513 + url = "${mirror}/stable/frameworks/5.114/ktextwidgets-5.114.0.tar.xz"; 514 + sha256 = "0w1wwyd3fy351rmkhf3i55is5031j2zxvswm0b1sb3pd159v888v"; 515 + name = "ktextwidgets-5.114.0.tar.xz"; 516 516 }; 517 517 }; 518 518 kunitconversion = { 519 - version = "5.113.0"; 519 + version = "5.114.0"; 520 520 src = fetchurl { 521 - url = "${mirror}/stable/frameworks/5.113/kunitconversion-5.113.0.tar.xz"; 522 - sha256 = "1x7gwrz43wvd3r87x545bxxyzhqj87mhhx05dqh0b09vqk6gxzza"; 523 - name = "kunitconversion-5.113.0.tar.xz"; 521 + url = "${mirror}/stable/frameworks/5.114/kunitconversion-5.114.0.tar.xz"; 522 + sha256 = "1qyqvl8fy105zwma5nrkz9zg5932w2f33daw0azhj322iffrm39n"; 523 + name = "kunitconversion-5.114.0.tar.xz"; 524 524 }; 525 525 }; 526 526 kwallet = { 527 - version = "5.113.0"; 527 + version = "5.114.0"; 528 528 src = fetchurl { 529 - url = "${mirror}/stable/frameworks/5.113/kwallet-5.113.0.tar.xz"; 530 - sha256 = "0aq8d5c5p9j19bzspd205gh297n7fh5f26m49826fx5mp1im4lwn"; 531 - name = "kwallet-5.113.0.tar.xz"; 529 + url = "${mirror}/stable/frameworks/5.114/kwallet-5.114.0.tar.xz"; 530 + sha256 = "1cji8bvy5m77zljyrrgipsw8pxcds1sgikxlq3sdfxymcsw2wr36"; 531 + name = "kwallet-5.114.0.tar.xz"; 532 532 }; 533 533 }; 534 534 kwayland = { 535 - version = "5.113.0"; 535 + version = "5.114.0"; 536 536 src = fetchurl { 537 - url = "${mirror}/stable/frameworks/5.113/kwayland-5.113.0.tar.xz"; 538 - sha256 = "1anhvz4b1q835py451jznnfj9z2jh1fwnx4lfwhi67viaplpiwqg"; 539 - name = "kwayland-5.113.0.tar.xz"; 537 + url = "${mirror}/stable/frameworks/5.114/kwayland-5.114.0.tar.xz"; 538 + sha256 = "1lzmlbv5vl656cigjj07hbc0gj6g1i2xqanvnhxj360109kzilf1"; 539 + name = "kwayland-5.114.0.tar.xz"; 540 540 }; 541 541 }; 542 542 kwidgetsaddons = { 543 - version = "5.113.0"; 543 + version = "5.114.0"; 544 544 src = fetchurl { 545 - url = "${mirror}/stable/frameworks/5.113/kwidgetsaddons-5.113.0.tar.xz"; 546 - sha256 = "01rabfl2v5l9r3fgwgy75krib1486mdc4k3kfi035s6dvg8iy015"; 547 - name = "kwidgetsaddons-5.113.0.tar.xz"; 545 + url = "${mirror}/stable/frameworks/5.114/kwidgetsaddons-5.114.0.tar.xz"; 546 + sha256 = "1cc8lsk9v0cp2wiy1q26mlkf8np0yj01sq8a7w13ga5s6hv4sh2n"; 547 + name = "kwidgetsaddons-5.114.0.tar.xz"; 548 548 }; 549 549 }; 550 550 kwindowsystem = { 551 - version = "5.113.0"; 551 + version = "5.114.0"; 552 552 src = fetchurl { 553 - url = "${mirror}/stable/frameworks/5.113/kwindowsystem-5.113.0.tar.xz"; 554 - sha256 = "1hzavawsl14rsl9qb874zahvsvkrbcin7fg1xn1d7ssypphlis51"; 555 - name = "kwindowsystem-5.113.0.tar.xz"; 553 + url = "${mirror}/stable/frameworks/5.114/kwindowsystem-5.114.0.tar.xz"; 554 + sha256 = "03xbsf1pmswd2kpn3pdszp4vndclsh7j02fp22npxaxllmfr4va9"; 555 + name = "kwindowsystem-5.114.0.tar.xz"; 556 556 }; 557 557 }; 558 558 kxmlgui = { 559 - version = "5.113.0"; 559 + version = "5.114.0"; 560 560 src = fetchurl { 561 - url = "${mirror}/stable/frameworks/5.113/kxmlgui-5.113.0.tar.xz"; 562 - sha256 = "022l557z9jgrz2hj8hh9z7cjkvfhl5rdp81jhk2gd3wzmyf5zzmq"; 563 - name = "kxmlgui-5.113.0.tar.xz"; 561 + url = "${mirror}/stable/frameworks/5.114/kxmlgui-5.114.0.tar.xz"; 562 + sha256 = "0gvjf32ssc0r0bdpb1912ldsr5rjls8vrscwy5gm9g5gw504hmmr"; 563 + name = "kxmlgui-5.114.0.tar.xz"; 564 564 }; 565 565 }; 566 566 kxmlrpcclient = { 567 - version = "5.113.0"; 567 + version = "5.114.0"; 568 568 src = fetchurl { 569 - url = "${mirror}/stable/frameworks/5.113/portingAids/kxmlrpcclient-5.113.0.tar.xz"; 570 - sha256 = "141vlxxnyll5q0wg2va5prg0wf0hpymlzfkg37h1ngjwjs2x2yc1"; 571 - name = "kxmlrpcclient-5.113.0.tar.xz"; 569 + url = "${mirror}/stable/frameworks/5.114/portingAids/kxmlrpcclient-5.114.0.tar.xz"; 570 + sha256 = "1fgjai3vj3yk67ynhd7blilyrdhdn5nvma3v3j1sbdg98pr7qzar"; 571 + name = "kxmlrpcclient-5.114.0.tar.xz"; 572 572 }; 573 573 }; 574 574 modemmanager-qt = { 575 - version = "5.113.0"; 575 + version = "5.114.0"; 576 576 src = fetchurl { 577 - url = "${mirror}/stable/frameworks/5.113/modemmanager-qt-5.113.0.tar.xz"; 578 - sha256 = "069irg7ckws06qzq5mwkxvzx4r2xqwagwif6dq284hjihrz38l8b"; 579 - name = "modemmanager-qt-5.113.0.tar.xz"; 577 + url = "${mirror}/stable/frameworks/5.114/modemmanager-qt-5.114.0.tar.xz"; 578 + sha256 = "16jqhmcpsffl9a7c0bb4hwjy3bw5rakdsnc5n6y8djc6237jl9pi"; 579 + name = "modemmanager-qt-5.114.0.tar.xz"; 580 580 }; 581 581 }; 582 582 networkmanager-qt = { 583 - version = "5.113.0"; 583 + version = "5.114.0"; 584 584 src = fetchurl { 585 - url = "${mirror}/stable/frameworks/5.113/networkmanager-qt-5.113.0.tar.xz"; 586 - sha256 = "03wdbw6dr9a49qcs1j2lm9q894rvdl8xqjpwm3yrrjb866yyhcg1"; 587 - name = "networkmanager-qt-5.113.0.tar.xz"; 585 + url = "${mirror}/stable/frameworks/5.114/networkmanager-qt-5.114.0.tar.xz"; 586 + sha256 = "10anjsnrzawrfjlznjvvl2sbxrajl2ddnq2kgl314b5dk7z3yk4n"; 587 + name = "networkmanager-qt-5.114.0.tar.xz"; 588 588 }; 589 589 }; 590 590 oxygen-icons = { 591 - version = "5.113.0"; 591 + version = "5.114.0"; 592 592 src = fetchurl { 593 - url = "${mirror}/stable/frameworks/5.113/oxygen-icons-5.113.0.tar.xz"; 594 - sha256 = "0grdn0gz59lfp4n5mmlan71x3iwgm87dnhk8mla02dn7hv0fl0xx"; 595 - name = "oxygen-icons-5.113.0.tar.xz"; 593 + url = "${mirror}/stable/frameworks/5.114/oxygen-icons-5.114.0.tar.xz"; 594 + sha256 = "0f6hv5g8y2ggagrq9x9b78bqxqg6bqcpm1xxhf69ybgjikrqdf2r"; 595 + name = "oxygen-icons-5.114.0.tar.xz"; 596 596 }; 597 597 }; 598 598 plasma-framework = { 599 - version = "5.113.0"; 599 + version = "5.114.0"; 600 600 src = fetchurl { 601 - url = "${mirror}/stable/frameworks/5.113/plasma-framework-5.113.0.tar.xz"; 602 - sha256 = "0iijawnh9ri1n6qgdrraf3lq5sy7z0jy5ihmfzk22pn10ba992ky"; 603 - name = "plasma-framework-5.113.0.tar.xz"; 601 + url = "${mirror}/stable/frameworks/5.114/plasma-framework-5.114.0.tar.xz"; 602 + sha256 = "058hl76q35bw3rzmv348azk1lmhkpgmfrxr3jd9s1hphijr8sgcx"; 603 + name = "plasma-framework-5.114.0.tar.xz"; 604 604 }; 605 605 }; 606 606 prison = { 607 - version = "5.113.0"; 607 + version = "5.114.0"; 608 608 src = fetchurl { 609 - url = "${mirror}/stable/frameworks/5.113/prison-5.113.0.tar.xz"; 610 - sha256 = "18y4gxj5zml59a8i7gzr5cbbzi5wyknbva2ihfdpqf85vw3x2wdp"; 611 - name = "prison-5.113.0.tar.xz"; 609 + url = "${mirror}/stable/frameworks/5.114/prison-5.114.0.tar.xz"; 610 + sha256 = "1wbr1lryxmrx65ilq1bhqsdhhikrih977nhpb02fq0cqnvv7v9i7"; 611 + name = "prison-5.114.0.tar.xz"; 612 612 }; 613 613 }; 614 614 purpose = { 615 - version = "5.113.0"; 615 + version = "5.114.0"; 616 616 src = fetchurl { 617 - url = "${mirror}/stable/frameworks/5.113/purpose-5.113.0.tar.xz"; 618 - sha256 = "0p5zcvrkaw71w8795x2a4lx3z977j6jcnwbi9wi1956gcx4avhhf"; 619 - name = "purpose-5.113.0.tar.xz"; 617 + url = "${mirror}/stable/frameworks/5.114/purpose-5.114.0.tar.xz"; 618 + sha256 = "1lj67f0x4gvbh9by3c3crbbwwnx7b9ifjna9ggziya4m6zj0m4z1"; 619 + name = "purpose-5.114.0.tar.xz"; 620 620 }; 621 621 }; 622 622 qqc2-desktop-style = { 623 - version = "5.113.0"; 623 + version = "5.114.0"; 624 624 src = fetchurl { 625 - url = "${mirror}/stable/frameworks/5.113/qqc2-desktop-style-5.113.0.tar.xz"; 626 - sha256 = "0sk0sk7cq511m0rjmgsg1z8s4sy064qmbql472ljyblafm71wj6p"; 627 - name = "qqc2-desktop-style-5.113.0.tar.xz"; 625 + url = "${mirror}/stable/frameworks/5.114/qqc2-desktop-style-5.114.0.tar.xz"; 626 + sha256 = "1y5g91vybjvhwmzpfwrc70q5j7jxf5b972f9fh2vzb930jir6c8g"; 627 + name = "qqc2-desktop-style-5.114.0.tar.xz"; 628 628 }; 629 629 }; 630 630 solid = { 631 - version = "5.113.0"; 631 + version = "5.114.0"; 632 632 src = fetchurl { 633 - url = "${mirror}/stable/frameworks/5.113/solid-5.113.0.tar.xz"; 634 - sha256 = "0vhhkn15axfvlwrf9np91hnipw1lb2x9zh0ajpngvxzcnj6kvn7r"; 635 - name = "solid-5.113.0.tar.xz"; 633 + url = "${mirror}/stable/frameworks/5.114/solid-5.114.0.tar.xz"; 634 + sha256 = "1slxlj5jhp8g745l328932934633nl81sq3n8fd73h655hymsk4s"; 635 + name = "solid-5.114.0.tar.xz"; 636 636 }; 637 637 }; 638 638 sonnet = { 639 - version = "5.113.0"; 639 + version = "5.114.0"; 640 640 src = fetchurl { 641 - url = "${mirror}/stable/frameworks/5.113/sonnet-5.113.0.tar.xz"; 642 - sha256 = "17v3a2j0vhx7mzv0wfgqky248m57gasyv1xbjqpzjdr3x2f1zhy6"; 643 - name = "sonnet-5.113.0.tar.xz"; 641 + url = "${mirror}/stable/frameworks/5.114/sonnet-5.114.0.tar.xz"; 642 + sha256 = "0zxi96i3gfpx759qc1nyz7jqlswg5ivgr1w9gbbsm1x5fi9ikadx"; 643 + name = "sonnet-5.114.0.tar.xz"; 644 644 }; 645 645 }; 646 646 syndication = { 647 - version = "5.113.0"; 647 + version = "5.114.0"; 648 648 src = fetchurl { 649 - url = "${mirror}/stable/frameworks/5.113/syndication-5.113.0.tar.xz"; 650 - sha256 = "1nzcfk4qsjvrgci3vk78jjpbig61pm0y73h3qs83yld1zw3az3jx"; 651 - name = "syndication-5.113.0.tar.xz"; 649 + url = "${mirror}/stable/frameworks/5.114/syndication-5.114.0.tar.xz"; 650 + sha256 = "13rjb1zm9yd8vbm9h7avqih5v0rr2srqwglm29l7mcnankqlh4n7"; 651 + name = "syndication-5.114.0.tar.xz"; 652 652 }; 653 653 }; 654 654 syntax-highlighting = { 655 - version = "5.113.0"; 655 + version = "5.114.0"; 656 656 src = fetchurl { 657 - url = "${mirror}/stable/frameworks/5.113/syntax-highlighting-5.113.0.tar.xz"; 658 - sha256 = "1blifnqikvrlkcskwjdk54mvh8yd4r0vzz282mi64w7alimlilgl"; 659 - name = "syntax-highlighting-5.113.0.tar.xz"; 657 + url = "${mirror}/stable/frameworks/5.114/syntax-highlighting-5.114.0.tar.xz"; 658 + sha256 = "1skblg2m0sar63qrgkjsg0w9scixggm5qj7lp4gzjn4hwq6m3n63"; 659 + name = "syntax-highlighting-5.114.0.tar.xz"; 660 660 }; 661 661 }; 662 662 threadweaver = { 663 - version = "5.113.0"; 663 + version = "5.114.0"; 664 664 src = fetchurl { 665 - url = "${mirror}/stable/frameworks/5.113/threadweaver-5.113.0.tar.xz"; 666 - sha256 = "1x7i7mdg5v22y04m720k9fqj7xagm8qnlssb1xjs9nj0aqif8jgp"; 667 - name = "threadweaver-5.113.0.tar.xz"; 665 + url = "${mirror}/stable/frameworks/5.114/threadweaver-5.114.0.tar.xz"; 666 + sha256 = "1y07g58w6z3i11y3djg3aaxanhp9hzaciq61l4dn1gqwghn09xgh"; 667 + name = "threadweaver-5.114.0.tar.xz"; 668 668 }; 669 669 }; 670 670 }
+2 -2
pkgs/development/libraries/libcamera/default.nix
··· 22 22 23 23 stdenv.mkDerivation rec { 24 24 pname = "libcamera"; 25 - version = "0.0.5"; 25 + version = "0.1.0"; 26 26 27 27 src = fetchgit { 28 28 url = "https://git.libcamera.org/libcamera/libcamera.git"; 29 29 rev = "v${version}"; 30 - hash = "sha256-rd1YIEosg4+H/FJBYCoxdQlV9F0evU5fckHJrSdVPOE="; 30 + hash = "sha256-icHZtv25QvJEv0DlELT3cDxho3Oz2BJAMNKr5W4bshk="; 31 31 }; 32 32 33 33 outputs = [ "out" "dev" "doc" ];
+2 -2
pkgs/development/libraries/libdrm/default.nix
··· 6 6 7 7 stdenv.mkDerivation rec { 8 8 pname = "libdrm"; 9 - version = "2.4.119"; 9 + version = "2.4.120"; 10 10 11 11 src = fetchurl { 12 12 url = "https://dri.freedesktop.org/${pname}/${pname}-${version}.tar.xz"; 13 - hash = "sha256-CknxLwm1tuaOqq/z8Cynz/mqkmk5shLTQxYdPorFYpE="; 13 + hash = "sha256-O/VTY/dsclCUZEGrUdOmzArlGAVcD/AXMkq3bN77Mno="; 14 14 }; 15 15 16 16 outputs = [ "out" "dev" "bin" ];
+2 -2
pkgs/development/libraries/libjxl/default.nix
··· 9 9 , libjpeg 10 10 , libpng 11 11 , libwebp 12 - , openexr 12 + , openexr_3 13 13 , pkg-config 14 14 , zlib 15 15 , buildDocs ? true ··· 79 79 libjpeg 80 80 libpng 81 81 libwebp 82 - openexr 82 + openexr_3 83 83 zlib 84 84 ]; 85 85
+2 -21
pkgs/development/libraries/libmbim/default.nix
··· 1 1 { lib 2 2 , stdenv 3 3 , fetchFromGitLab 4 - , fetchpatch 5 4 , meson 6 5 , ninja 7 6 , pkg-config ··· 19 18 20 19 stdenv.mkDerivation rec { 21 20 pname = "libmbim"; 22 - version = "1.28.4"; 21 + version = "1.30.0"; 23 22 24 23 outputs = [ "out" "dev" ] 25 24 ++ lib.optionals withDocs [ "man" ]; ··· 29 28 owner = "mobile-broadband"; 30 29 repo = "libmbim"; 31 30 rev = version; 32 - hash = "sha256-aaYjvJ2OMTzkUyqWCyHdmsKJ3VGqBmKQzb1DWK/1cPU="; 31 + hash = "sha256-sHTpu9WeMZroT+1I18ObEHWSzcyj/Relyz8UNe+WawI="; 33 32 }; 34 - 35 - patches = [ 36 - # Intel Mutual Authentication - FCC lock. Part of 1.30, backported to 37 - # openSUSE and Fedora and ChromeOS. 38 - # https://src.fedoraproject.org/rpms/libmbim/blob/rawhide/f/libmbim.spec 39 - (fetchpatch { 40 - url = "https://cgit.freedesktop.org/libmbim/libmbim/patch/?id=910db9cb2b6fde303d3b4720890cf6dc6fc00880"; 41 - hash = "sha256-412sXdWb8WsSexe1scI/C57dwENgNWoREGO1GxSF4hs="; 42 - }) 43 - 44 - # Intel Tools. Allows tracing various commands. Part of 1.30, backported to 45 - # openSUSE, Fedora and ChromeOS. 46 - # https://src.fedoraproject.org/rpms/libmbim/blob/rawhide/f/libmbim.spec 47 - (fetchpatch { 48 - url = "https://cgit.freedesktop.org/libmbim/libmbim/patch/?id=8a6dec6ed11931601e605c9537da9904b3be5bc0"; 49 - hash = "sha256-tU4zkUl5aZJE+g/qbnWprUHe/PmZvqVKB9qecSaUBhk="; 50 - }) 51 - ]; 52 33 53 34 mesonFlags = [ 54 35 "-Dudevdir=${placeholder "out"}/lib/udev"
+13 -11
pkgs/development/libraries/libplacebo/default.nix
··· 10 10 , shaderc 11 11 , lcms2 12 12 , libGL 13 - , xorg 13 + , libX11 14 14 , libunwind 15 15 , libdovi 16 + , xxHash 16 17 }: 17 18 18 19 stdenv.mkDerivation rec { 19 20 pname = "libplacebo"; 20 - version = "5.264.1"; 21 + version = "6.338.1"; 21 22 22 23 src = fetchFromGitLab { 23 24 domain = "code.videolan.org"; 24 25 owner = "videolan"; 25 26 repo = pname; 26 27 rev = "v${version}"; 27 - hash = "sha256-YEefuEfJURi5/wswQKskA/J1UGzessQQkBpltJ0Spq8="; 28 + hash = "sha256-NZmwR3+lIC2PF+k+kqCjoMYkMM/PKOJmDwAq7t6YONY="; 28 29 }; 29 30 30 31 nativeBuildInputs = [ ··· 41 42 shaderc 42 43 lcms2 43 44 libGL 44 - xorg.libX11 45 + libX11 45 46 libunwind 46 47 libdovi 48 + xxHash 47 49 ]; 48 50 49 - mesonFlags = [ 50 - "-Dvulkan-registry=${vulkan-headers}/share/vulkan/registry/vk.xml" 51 - "-Ddemos=false" # Don't build and install the demo programs 52 - "-Dd3d11=disabled" # Disable the Direct3D 11 based renderer 53 - "-Dglslang=disabled" # rely on shaderc for GLSL compilation instead 54 - ] ++ lib.optionals stdenv.isDarwin [ 55 - "-Dunwind=disabled" # libplacebo doesn’t build with `darwin.libunwind` 51 + mesonFlags = with lib; [ 52 + (mesonOption "vulkan-registry" "${vulkan-headers}/share/vulkan/registry/vk.xml") 53 + (mesonBool "demos" false) # Don't build and install the demo programs 54 + (mesonEnable "d3d11" false) # Disable the Direct3D 11 based renderer 55 + (mesonEnable "glslang" false) # rely on shaderc for GLSL compilation instead 56 + ] ++ optionals stdenv.isDarwin [ 57 + (mesonEnable "unwind" false) # libplacebo doesn’t build with `darwin.libunwind` 56 58 ]; 57 59 58 60 postPatch = ''
+2 -2
pkgs/development/libraries/libqmi/default.nix
··· 23 23 24 24 stdenv.mkDerivation rec { 25 25 pname = "libqmi"; 26 - version = "1.32.4"; 26 + version = "1.34.0"; 27 27 28 28 outputs = [ "out" "dev" ] 29 29 ++ lib.optional withIntrospection "devdoc"; ··· 33 33 owner = "mobile-broadband"; 34 34 repo = "libqmi"; 35 35 rev = version; 36 - hash = "sha256-cczGvoD+2+G6uiAt0Iv1BO4/FqzO9bkqhFsEwOfp7qw="; 36 + hash = "sha256-l9ev9ZOWicVNZ/Wj//KNd3NHcefIrLVriqJhEpwWvtQ="; 37 37 }; 38 38 39 39 nativeBuildInputs = [
+2 -11
pkgs/development/libraries/libraw/default.nix
··· 1 1 { lib 2 2 , stdenv 3 3 , fetchFromGitHub 4 - , fetchpatch 5 4 , autoreconfHook 6 5 , lcms2 7 6 , pkg-config ··· 16 15 17 16 stdenv.mkDerivation rec { 18 17 pname = "libraw"; 19 - version = "0.21.1"; 18 + version = "0.21.2"; 20 19 21 20 src = fetchFromGitHub { 22 21 owner = "LibRaw"; 23 22 repo = "LibRaw"; 24 23 rev = version; 25 - sha256 = "sha256-K9mULf6V/TCl5Vu4iuIdSGF9HzQlgNQLRFHIpNbmAlY"; 24 + hash = "sha256-p9CmOCulvV7+KKn1lXwpcysOo0+mD5UgPqy2ki0cIFE="; 26 25 }; 27 - 28 - patches = [ 29 - (fetchpatch { 30 - name = "CVE-2023-1729.patch"; 31 - url = "https://github.com/LibRaw/LibRaw/commit/9ab70f6dca19229cb5caad7cc31af4e7501bac93.patch"; 32 - hash = "sha256-OAyqphxvtSM15NI77HwtGTmTmP9YNu3xhZ6D1CceJ7I="; 33 - }) 34 - ]; 35 26 36 27 outputs = [ "out" "lib" "dev" "doc" ]; 37 28
+8 -14
pkgs/development/libraries/libunwind/default.nix
··· 1 - { stdenv, lib, fetchurl, fetchpatch, autoreconfHook, xz, buildPackages }: 1 + { stdenv, lib, fetchFromGitHub, fetchpatch, autoreconfHook, xz, buildPackages }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "libunwind"; 5 - version = "1.6.2"; 5 + version = "1.7.2"; 6 6 7 - src = fetchurl { 8 - url = "mirror://savannah/libunwind/${pname}-${version}.tar.gz"; 9 - sha256 = "sha256-SmrsZmmR+0XQiJxErt6K1usQgHHDVU/N/2cfnJR5SXY="; 7 + src = fetchFromGitHub { 8 + owner = "libunwind"; 9 + repo = "libunwind"; 10 + rev = "v${version}"; 11 + hash = "sha256-z5YCue0zadQnMEbGFniFvDjXNy6dSHQDQnXRXS6Uh/Y="; 10 12 }; 11 - 12 - patches = [ 13 - # Fix for aarch64 and non-4K pages. Remove once upgraded past 1.6.2. 14 - (fetchpatch { 15 - url = "https://github.com/libunwind/libunwind/commit/e85b65cec757ef589f28957d0c6c21c498a03bdf.patch"; 16 - sha256 = "1lnlygvhqrdrjgw303pg2k2k4ms4gaghpjsgmhk47q83vy1yjwfg"; 17 - }) 18 - ]; 19 13 20 14 postPatch = if (stdenv.cc.isClang || stdenv.hostPlatform.isStatic) then '' 21 15 substituteInPlace configure.ac --replace "-lgcc_s" "" ··· 50 44 description = "A portable and efficient API to determine the call-chain of a program"; 51 45 maintainers = with maintainers; [ orivej ]; 52 46 # https://github.com/libunwind/libunwind#libunwind 53 - platforms = [ "aarch64-linux" "armv5tel-linux" "armv6l-linux" "armv7a-linux" "armv7l-linux" "i686-freebsd13" "i686-linux" "mips64el-linux" "mipsel-linux" "powerpc64-linux" "powerpc64le-linux" "riscv64-linux" "s390x-linux" "x86_64-freebsd13" "x86_64-linux" "x86_64-solaris" ]; 47 + platforms = [ "aarch64-linux" "armv5tel-linux" "armv6l-linux" "armv7a-linux" "armv7l-linux" "i686-freebsd13" "i686-linux" "loongarch64-linux" "mips64el-linux" "mipsel-linux" "powerpc64-linux" "powerpc64le-linux" "riscv64-linux" "s390x-linux" "x86_64-freebsd13" "x86_64-linux" "x86_64-solaris" ]; 54 48 # libunwind relies on getcontext/setcontext, 55 49 # and only has a musl implementation for some platforms 56 50 # https://github.com/libunwind/libunwind/issues/33
+2 -2
pkgs/development/libraries/libxmlb/default.nix
··· 18 18 19 19 stdenv.mkDerivation rec { 20 20 pname = "libxmlb"; 21 - version = "0.3.14"; 21 + version = "0.3.15"; 22 22 23 23 outputs = [ "out" "lib" "dev" "devdoc" "installedTests" ]; 24 24 ··· 26 26 owner = "hughsie"; 27 27 repo = "libxmlb"; 28 28 rev = version; 29 - hash = "sha256-lpVXl/n/ecDLbbLQg9T+o4GdGZM7pNXGYTyVogNCl2E="; 29 + hash = "sha256-S0wBVhfRa81mAmqpYYAKAyKLnfnVsXJEcGA21i5tdzo="; 30 30 }; 31 31 32 32 patches = [
+2
pkgs/development/libraries/libxslt/default.nix
··· 60 60 "--without-crypto" 61 61 ]; 62 62 63 + enableParallelBuilding = true; 64 + 63 65 postFixup = '' 64 66 moveToOutput bin/xslt-config "$dev" 65 67 moveToOutput lib/xsltConf.sh "$dev"
+10
pkgs/development/libraries/libzip/default.nix
··· 1 1 { lib, stdenv 2 2 , cmake 3 + , fetchpatch2 3 4 , fetchurl 4 5 , perl 5 6 , zlib ··· 23 24 url = "https://libzip.org/download/${finalAttrs.pname}-${finalAttrs.version}.tar.gz"; 24 25 sha256 = "sha256-lmmuXf46xbOJdTbchGaodMjPLA47H90I11snOIQpk2M="; 25 26 }; 27 + 28 + patches = [ 29 + # https://github.com/nih-at/libzip/issues/404 30 + (fetchpatch2 { 31 + name = "Check-for-zstd_TARGET-before-using-it-in-a-regex.patch"; 32 + url = "https://github.com/nih-at/libzip/commit/c719428916b4d19e838f873b1a177b126a080d61.patch"; 33 + hash = "sha256-4ksbXEM8kNvs3wtbIaXLEQNSKaxl0es/sIg0EINaTHE="; 34 + }) 35 + ]; 26 36 27 37 outputs = [ "out" "dev" "man" ]; 28 38
+3 -4
pkgs/development/libraries/openexr/default.nix
··· 9 9 10 10 stdenv.mkDerivation rec { 11 11 pname = "openexr"; 12 - version = "2.5.8"; 12 + version = "2.5.10"; 13 13 14 14 outputs = [ "bin" "dev" "out" "doc" ]; 15 15 ··· 17 17 owner = "AcademySoftwareFoundation"; 18 18 repo = "openexr"; 19 19 rev = "v${version}"; 20 - sha256 = "sha256-N7XdDaDsYdx4TXvHplQDTvhHNUmW5rntdaTKua4C0es="; 20 + hash = "sha256-xdC+T79ZQBx/XhuIXtP93Roj0N9lF+E65ReEKQ4kIsg="; 21 21 }; 22 22 23 23 patches = [ ··· 36 36 sha256 = "sha256-DrpldpNgN5pWKzIuuPIrynGX3EpP8YhJlu+lLfNFGxQ="; 37 37 }) 38 38 39 - # Backport gcc-13 fix: 40 - # https://github.com/AcademySoftwareFoundation/openexr/pull/1264 39 + # GCC 13 fixes 41 40 ./gcc-13.patch 42 41 ]; 43 42
+19 -27
pkgs/development/libraries/openexr/gcc-13.patch
··· 1 - https://github.com/AcademySoftwareFoundation/openexr/pull/1264 2 - https://github.com/AcademySoftwareFoundation/openexr/commit/d0088a3c6943a9a53fc24e29885414d082d531fe.patch 1 + From 8aa103fe6e815514990e59708468eabc36f7f332 Mon Sep 17 00:00:00 2001 2 + From: =?UTF-8?q?=C3=A9clairevoyant?= 3 + <848000+eclairevoyant@users.noreply.github.com> 4 + Date: Fri, 5 Jan 2024 18:12:16 -0500 5 + Subject: [PATCH] gcc13 3 6 4 - --- a/OpenEXR/IlmImf/ImfDwaCompressor.cpp 5 - +++ b/OpenEXR/IlmImf/ImfDwaCompressor.cpp 6 - @@ -159,6 +159,7 @@ 7 - #include <limits> 8 - 9 - #include <cstddef> 10 - +#include <cstdint> 11 - 12 - 13 - // Windows specific addition to prevent the indirect import of the redefined min/max macros 14 - --- a/OpenEXR/IlmImf/ImfHuf.cpp 15 - +++ b/OpenEXR/IlmImf/ImfHuf.cpp 16 - @@ -53,6 +53,7 @@ 17 - #include <cstring> 18 - #include <cassert> 7 + --- 8 + OpenEXR/IlmImf/ImfTiledMisc.cpp | 1 + 9 + 1 file changed, 1 insertion(+) 10 + 11 + diff --git a/OpenEXR/IlmImf/ImfTiledMisc.cpp b/OpenEXR/IlmImf/ImfTiledMisc.cpp 12 + index 06ea3144..749537d4 100644 13 + --- a/OpenEXR/IlmImf/ImfTiledMisc.cpp 14 + +++ b/OpenEXR/IlmImf/ImfTiledMisc.cpp 15 + @@ -46,6 +46,7 @@ 16 + #include <ImfTileDescription.h> 19 17 #include <algorithm> 18 + #include <limits> 20 19 +#include <cstdint> 21 20 22 - 23 - using namespace std; 24 - --- a/OpenEXR/IlmImf/ImfMisc.cpp 25 - +++ b/OpenEXR/IlmImf/ImfMisc.cpp 26 - @@ -52,6 +52,7 @@ 27 - #include <ImfConvert.h> 28 - #include <ImfPartType.h> 29 - #include <ImfTileDescription.h> 30 - +#include <cstdint> 31 21 #include "ImfNamespace.h" 32 22 33 - OPENEXR_IMF_INTERNAL_NAMESPACE_SOURCE_ENTER 23 + -- 24 + 2.42.0 25 +
+2 -2
pkgs/development/libraries/pipewire/default.nix
··· 81 81 82 82 self = stdenv.mkDerivation rec { 83 83 pname = "pipewire"; 84 - version = "1.0.0"; 84 + version = "1.0.1"; 85 85 86 86 outputs = [ 87 87 "out" ··· 97 97 owner = "pipewire"; 98 98 repo = "pipewire"; 99 99 rev = version; 100 - sha256 = "sha256-mfnMluxJAxDbB6JlIM6HJ0zg7e1q3ia3uFbht6zeHCk="; 100 + sha256 = "sha256-rvf0sZRgDDLcqroLg7hcMUqXD/4JT+3lBRX6/m+3Ry8="; 101 101 }; 102 102 103 103 patches = [
+26 -8
pkgs/development/libraries/pixman/default.nix
··· 1 1 { lib 2 2 , stdenv 3 3 , fetchurl 4 + , meson 5 + , ninja 4 6 , pkg-config 5 7 , libpng 6 8 , glib /*just passthru*/ ··· 12 14 , tigervnc 13 15 , wlroots 14 16 , xwayland 17 + 18 + , gitUpdater 15 19 }: 16 20 17 21 stdenv.mkDerivation rec { 18 22 pname = "pixman"; 19 - version = "0.42.2"; 23 + version = "0.43.0"; 20 24 21 25 src = fetchurl { 22 26 urls = [ 23 27 "mirror://xorg/individual/lib/${pname}-${version}.tar.gz" 24 28 "https://cairographics.org/releases/${pname}-${version}.tar.gz" 25 29 ]; 26 - hash = "sha256-6hSA762i/ZSLx1Nm98NJ4cltMpfQmj/mJibjjiNKYl4="; 30 + hash = "sha256-plwoIJhY+xa+5Q2AnID5Co5BXA5P2DIQeKGCJ4WlVgo="; 27 31 }; 28 32 29 33 separateDebugInfo = !stdenv.hostPlatform.isStatic; 30 34 31 - nativeBuildInputs = [ pkg-config ]; 35 + nativeBuildInputs = [ meson ninja pkg-config ]; 32 36 33 37 buildInputs = [ libpng ]; 34 38 35 - configureFlags = lib.optional stdenv.isAarch32 "--disable-arm-iwmmxt" 36 - # Disable until https://gitlab.freedesktop.org/pixman/pixman/-/issues/46 is resolved 37 - ++ lib.optional (stdenv.isAarch64 && !stdenv.cc.isGNU) "--disable-arm-a64-neon"; 39 + # Default "enabled" value attempts to enable CPU features on all 40 + # architectures and requires used to disable them: 41 + # https://gitlab.freedesktop.org/pixman/pixman/-/issues/88 42 + mesonAutoFeatures = "auto"; 43 + mesonFlags = [ 44 + "-Diwmmxt=disabled" 45 + ] 46 + # Disable until https://gitlab.freedesktop.org/pixman/pixman/-/issues/46 is resolved 47 + ++ lib.optional (stdenv.isAarch64 && !stdenv.cc.isGNU) "-Da64-neon=disabled"; 38 48 39 49 preConfigure = '' 40 50 # https://gitlab.freedesktop.org/pixman/pixman/-/issues/62 41 51 export OMP_NUM_THREADS=$((NIX_BUILD_CORES > 184 ? 184 : NIX_BUILD_CORES)) 42 52 ''; 43 53 54 + enableParallelBuilding = true; 55 + 44 56 doCheck = true; 45 57 46 58 postInstall = glib.flattenInclude; 47 59 48 - passthru.tests = { 49 - inherit cairo qemu scribus tigervnc wlroots xwayland; 60 + passthru = { 61 + tests = { 62 + inherit cairo qemu scribus tigervnc wlroots xwayland; 63 + }; 64 + updateScript = gitUpdater { 65 + url = "https://gitlab.freedesktop.org/pixman/pixman.git"; 66 + rev-prefix = "pixman-"; 67 + }; 50 68 }; 51 69 52 70 meta = with lib; {
+8 -7
pkgs/development/libraries/qrencode/default.nix
··· 1 1 { lib, stdenv, fetchurl, pkg-config, SDL2, libpng, libiconv, libobjc }: 2 2 3 - stdenv.mkDerivation rec { 3 + stdenv.mkDerivation (finalAttrs: rec { 4 4 pname = "qrencode"; 5 5 version = "4.1.1"; 6 6 ··· 16 16 buildInputs = [ libiconv libpng ] 17 17 ++ lib.optionals stdenv.isDarwin [ libobjc ]; 18 18 19 - configureFlags = [ 20 - "--with-tests" 21 - ]; 22 - 23 19 nativeCheckInputs = [ SDL2 ]; 24 20 25 - doCheck = true; 21 + doCheck = false; 26 22 27 23 checkPhase = '' 28 24 runHook preCheck ··· 34 30 runHook postCheck 35 31 ''; 36 32 33 + passthru.tests = finalAttrs.finalPackage.overrideAttrs (_: { 34 + configureFlags = [ "--with-tests" ]; 35 + doCheck = true; 36 + }); 37 + 37 38 meta = with lib; { 38 39 homepage = "https://fukuchi.org/works/qrencode/"; 39 40 description = "C library for encoding data in a QR Code symbol"; ··· 47 48 platforms = platforms.all; 48 49 mainProgram = "qrencode"; 49 50 }; 50 - } 51 + })
+2
pkgs/development/libraries/qt-5/5.15/default.nix
··· 51 51 ./qtdeclarative.patch 52 52 # prevent headaches from stale qmlcache data 53 53 ./qtdeclarative-default-disable-qmlcache.patch 54 + # add version specific QML import path 55 + ./qtdeclarative-qml-paths.patch 54 56 ]; 55 57 qtlocation = lib.optionals stdenv.cc.isClang [ 56 58 # Fix build with Clang 16
+33
pkgs/development/libraries/qt-5/5.15/qtdeclarative-qml-paths.patch
··· 1 + diff --git a/src/qml/qml/qqmlimport.cpp b/src/qml/qml/qqmlimport.cpp 2 + index 289f11d006..9b0a48c6c7 100644 3 + --- a/src/qml/qml/qqmlimport.cpp 4 + +++ b/src/qml/qml/qqmlimport.cpp 5 + @@ -1897,17 +1897,22 @@ QQmlImportDatabase::QQmlImportDatabase(QQmlEngine *e) 6 + addImportPath(installImportsPath); 7 + 8 + // env import paths 9 + - if (Q_UNLIKELY(!qEnvironmentVariableIsEmpty("QML2_IMPORT_PATH"))) { 10 + - const QString envImportPath = qEnvironmentVariable("QML2_IMPORT_PATH"); 11 + + auto addEnvImportPath = [this](const char *var) { 12 + #if defined(Q_OS_WIN) 13 + QLatin1Char pathSep(';'); 14 + #else 15 + QLatin1Char pathSep(':'); 16 + #endif 17 + - QStringList paths = envImportPath.split(pathSep, Qt::SkipEmptyParts); 18 + - for (int ii = paths.count() - 1; ii >= 0; --ii) 19 + - addImportPath(paths.at(ii)); 20 + - } 21 + + if (Q_UNLIKELY(!qEnvironmentVariableIsEmpty(var))) { 22 + + const QString envImportPath = qEnvironmentVariable(var); 23 + + QStringList paths = envImportPath.split(pathSep, Qt::SkipEmptyParts); 24 + + for (int ii = paths.count() - 1; ii >= 0; --ii) 25 + + addImportPath(paths.at(ii)); 26 + + } 27 + + }; 28 + + 29 + + addEnvImportPath("QML2_IMPORT_PATH"); 30 + + addEnvImportPath("NIXPKGS_QT5_QML_IMPORT_PATH"); 31 + 32 + addImportPath(QStringLiteral("qrc:/qt-project.org/imports")); 33 + addImportPath(QCoreApplication::applicationDirPath());
+1 -1
pkgs/development/libraries/qt-5/hooks/wrap-qt-apps-hook.sh
··· 31 31 local qmlDir="$1/${qtQmlPrefix:?}" 32 32 if [ -d "$qmlDir" ] 33 33 then 34 - qtWrapperArgs+=(--prefix QML2_IMPORT_PATH : "$qmlDir") 34 + qtWrapperArgs+=(--prefix NIXPKGS_QT5_QML_IMPORT_PATH : "$qmlDir") 35 35 fi 36 36 } 37 37 addEnvHooks "$targetOffset" qtHostPathHook
+1 -1
pkgs/development/libraries/qt-6/hooks/wrap-qt-apps-hook.sh
··· 31 31 32 32 local qmlDir="$1/${qtQmlPrefix:?}" 33 33 if [ -d "$qmlDir" ]; then 34 - qtWrapperArgs+=(--prefix QML2_IMPORT_PATH : "$qmlDir") 34 + qtWrapperArgs+=(--prefix NIXPKGS_QT6_QML_IMPORT_PATH : "$qmlDir") 35 35 fi 36 36 } 37 37 addEnvHooks "$targetOffset" qtHostPathHook
+2
pkgs/development/libraries/qt-6/modules/qtdeclarative.nix
··· 12 12 patches = [ 13 13 # prevent headaches from stale qmlcache data 14 14 ../patches/qtdeclarative-default-disable-qmlcache.patch 15 + # add version specific QML import path 16 + ../patches/qtdeclarative-qml-paths.patch 15 17 ]; 16 18 }
+12
pkgs/development/libraries/qt-6/patches/qtdeclarative-qml-paths.patch
··· 1 + diff --git a/src/qml/qml/qqmlimport.cpp b/src/qml/qml/qqmlimport.cpp 2 + index 2e482c220d..4873809bec 100644 3 + --- a/src/qml/qml/qqmlimport.cpp 4 + +++ b/src/qml/qml/qqmlimport.cpp 5 + @@ -1517,6 +1517,7 @@ QQmlImportDatabase::QQmlImportDatabase(QQmlEngine *e) 6 + // env import paths 7 + addEnvImportPath("QML_IMPORT_PATH"); 8 + addEnvImportPath("QML2_IMPORT_PATH"); 9 + + addEnvImportPath("NIXPKGS_QT6_QML_IMPORT_PATH"); 10 + 11 + addImportPath(QStringLiteral("qrc:/qt/qml")); 12 + addImportPath(QStringLiteral("qrc:/qt-project.org/imports"));
+2 -2
pkgs/development/libraries/rapidfuzz-cpp/default.nix
··· 7 7 8 8 stdenv.mkDerivation (finalAttrs: { 9 9 pname = "rapidfuzz-cpp"; 10 - version = "2.2.3"; 10 + version = "3.0.0"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "maxbachmann"; 14 14 repo = "rapidfuzz-cpp"; 15 15 rev = "v${finalAttrs.version}"; 16 - hash = "sha256-yEDihPvTGGL5gsd4QMYNRyfLucKLItIQM4pm6W0i2W8="; 16 + hash = "sha256-N9yGOxlk1+wgRXWLbDIXWQz+/pwbnYVs3ub4/16Nzws="; 17 17 }; 18 18 19 19 nativeBuildInputs = [
+3
pkgs/development/libraries/readline/readline-8.2-patches.nix
··· 8 8 (patch "005" "16ac25jz1a1mgkpfp1sydqf6qpsfh0s0dcmrnjpqbhg5va3s6av2") 9 9 (patch "006" "18gmh6y3klh0vv28cyqz4is3rlb32pl7f1kf5r482kfjq3w5zd67") 10 10 (patch "007" "1xmnpahs983n4w0gn3j0wr8nh1dpva33yj7fvfmhm46ph2wsa4ar") 11 + (patch "008" "0smjjzhwxi2ibpdisnk53lh1pzgka6rhlqyh3662xy69v34ysxx1") 12 + (patch "009" "05m1fwbs7mbs3pz3pg87gbbayandrrcgaqawzliqb6g1jbk8b61x") 13 + (patch "010" "0k3vyrjs2g6y2cfs03l2gp37fhxgqpiwvxb1c7z4q88cbb32x3km") 11 14 ]
+2 -2
pkgs/development/libraries/science/math/liblapack/default.nix
··· 11 11 12 12 stdenv.mkDerivation (finalAttrs: { 13 13 pname = "liblapack"; 14 - version = "3.11"; 14 + version = "3.12.0"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "Reference-LAPACK"; 18 18 repo = "lapack"; 19 19 rev = "v${finalAttrs.version}"; 20 - sha256 = "sha256-AYD78u70y8cY19hmM/aDjQEzxO8u9lPWhCFxRe5cqXI="; 20 + sha256 = "sha256-xn9HL4YF8JPka1gwet5bGGo2k505H3RfWpxkUIYNecQ="; 21 21 }; 22 22 23 23 nativeBuildInputs = [ gfortran cmake ];
+2 -2
pkgs/development/libraries/spirv-headers/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "spirv-headers"; 5 - version = "1.3.268.0"; 5 + version = "1.3.275.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "KhronosGroup"; 9 9 repo = "SPIRV-Headers"; 10 10 rev = "vulkan-sdk-${version}"; 11 - hash = "sha256-uOnSTih14bUPtrJgp7vVb3/UfdKsF6jFQqjlFeJ81AI="; 11 + hash = "sha256-/I9dJlBE0kvFvqooKuqMETtOE72Jmva3zIGnq0o4+aE="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ cmake ];
+2 -2
pkgs/development/libraries/srt/default.nix
··· 8 8 9 9 stdenv.mkDerivation rec { 10 10 pname = "srt"; 11 - version = "1.5.2"; 11 + version = "1.5.3"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "Haivision"; 15 15 repo = "srt"; 16 16 rev = "v${version}"; 17 - sha256 = "sha256-HW5l26k9w4F6IJrtiahU/8/CPY6M/cKn8AgESsntC6A="; 17 + sha256 = "sha256-HmfbBPyR+z5d9/XBvNhosk8pSSPToNtM+V0hEyb2G2w="; 18 18 }; 19 19 20 20 nativeBuildInputs = [ cmake ];
+3
pkgs/development/libraries/tiledb/default.nix
··· 58 58 cmake/Modules/FindOpenSSL_EP.cmake 59 59 ''; 60 60 61 + # upstream will hopefully fix this in some newer release 62 + env.CXXFLAGS = "-include random"; 63 + 61 64 # (bundled) blosc headers have a warning on some archs that it will be using 62 65 # unaccelerated routines. 63 66 cmakeFlags = [
+2 -2
pkgs/development/libraries/vulkan-headers/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, cmake }: 2 2 stdenv.mkDerivation rec { 3 3 pname = "vulkan-headers"; 4 - version = "1.3.268.0"; 4 + version = "1.3.275.0"; 5 5 6 6 nativeBuildInputs = [ cmake ]; 7 7 ··· 9 9 owner = "KhronosGroup"; 10 10 repo = "Vulkan-Headers"; 11 11 rev = "vulkan-sdk-${version}"; 12 - hash = "sha256-CDjWTXXnUgj9QaLDNuSVy+wf8If5LehwOZ0t0Fuh2Ro="; 12 + hash = "sha256-kBOkj7mr4stPXUCBhNJpNL3A+9BebEwrIBEIroxdH8Y="; 13 13 }; 14 14 15 15 passthru.updateScript = ./update.sh;
+1
pkgs/development/libraries/vulkan-headers/update.sh
··· 11 11 "vulkan-tools-lunarg" 12 12 "vulkan-extension-layer" 13 13 "vulkan-utility-libraries" 14 + "vulkan-volk" 14 15 "spirv-headers" 15 16 "spirv-cross" 16 17 "spirv-tools"
+2 -2
pkgs/development/libraries/vulkan-loader/default.nix
··· 3 3 4 4 stdenv.mkDerivation rec { 5 5 pname = "vulkan-loader"; 6 - version = "1.3.268.0"; 6 + version = "1.3.275.0"; 7 7 8 8 src = fetchFromGitHub { 9 9 owner = "KhronosGroup"; 10 10 repo = "Vulkan-Loader"; 11 11 rev = "vulkan-sdk-${version}"; 12 - hash = "sha256-TDn8eVz1fhGfvUiGcxqOk2BN9tuIF5+ssIXtOo3weS0="; 12 + hash = "sha256-53PUXAWiK38ciV6oMvD7ZHdXi4RU4r0RmDWUUHU3mE0="; 13 13 }; 14 14 15 15 patches = [ ./fix-pkgconfig.patch ];
+3 -3
pkgs/development/libraries/vulkan-utility-libraries/default.nix
··· 2 2 3 3 stdenv.mkDerivation (finalAttrs: { 4 4 pname = "vulkan-utility-libraries"; 5 - version = "1.3.268"; 5 + version = "1.3.275.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "KhronosGroup"; 9 9 repo = "Vulkan-Utility-Libraries"; 10 - rev = "v${finalAttrs.version}"; 11 - hash = "sha256-l6PiHCre/JQg8PSs1k/0Zzfwwv55AqVdZtBbjeKLS6E="; 10 + rev = "vulkan-sdk-${finalAttrs.version}"; 11 + hash = "sha256-gvia+Xb9BpOjPARKo3Sgp85Bfh1roFZ2PzCtXVFYeIU="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ cmake python3 ];
+6 -1
pkgs/development/libraries/xapian/default.nix
··· 28 28 enableParallelBuilding = true; 29 29 30 30 doCheck = true; 31 - env.AUTOMATED_TESTING = true; # https://trac.xapian.org/changeset/8be35f5e1/git 31 + 32 + env = { 33 + AUTOMATED_TESTING = true; # https://trac.xapian.org/changeset/8be35f5e1/git 34 + } // lib.optionalAttrs stdenv.is32bit { 35 + NIX_CFLAGS_COMPILE = "-fpermissive"; 36 + }; 32 37 33 38 # the configure script thinks that Darwin has ___exp10 34 39 # but it’s not available on my systems (or hydra apparently)
+1 -1
pkgs/development/libraries/xsimd/default.nix
··· 54 54 description = "C++ wrappers for SIMD intrinsics"; 55 55 homepage = "https://github.com/xtensor-stack/xsimd"; 56 56 license = licenses.bsd3; 57 - maintainers = with maintainers; [ tobim ]; 57 + maintainers = with maintainers; [ tobim doronbehar ]; 58 58 platforms = platforms.all; 59 59 }; 60 60 })
+2 -2
pkgs/development/libraries/zxing-cpp/default.nix
··· 9 9 10 10 stdenv.mkDerivation (finalAttrs: { 11 11 pname = "zxing-cpp"; 12 - version = "2.1.0"; 12 + version = "2.2.1"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "zxing-cpp"; 16 16 repo = "zxing-cpp"; 17 17 rev = "v${finalAttrs.version}"; 18 - hash = "sha256-B/jGsHImRfj0iEio2b6R6laWBI1LL3OI407O7sren8s="; 18 + hash = "sha256-teFspdATn9M7Z1vSr/7PdJx/xAv+TVai8rIekxqpBZk="; 19 19 }; 20 20 21 21 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/acme/default.nix
··· 3 3 , cryptography 4 4 , pyasn1 5 5 , pyopenssl 6 - , pyRFC3339 6 + , pyrfc3339 7 7 , josepy 8 8 , pytz 9 9 , requests ··· 20 20 format = "setuptools"; 21 21 22 22 propagatedBuildInputs = [ 23 - cryptography pyasn1 pyopenssl pyRFC3339 pytz requests requests-toolbelt six 23 + cryptography pyasn1 pyopenssl pyrfc3339 pytz requests requests-toolbelt six 24 24 werkzeug ndg-httpsclient josepy 25 25 ]; 26 26
+2 -2
pkgs/development/python-modules/awslambdaric/default.nix
··· 5 5 , fetchpatch 6 6 , isPy27 7 7 , pytestCheckHook 8 - , autoconf 8 + , autoconf271 9 9 , automake 10 10 , cmake 11 11 , gcc ··· 44 44 45 45 propagatedBuildInputs = [ simplejson ]; 46 46 47 - nativeBuildInputs = [ autoconf automake cmake libtool perl setuptools ]; 47 + nativeBuildInputs = [ autoconf271 automake cmake libtool perl setuptools ]; 48 48 49 49 buildInputs = [ gcc ]; 50 50
+2 -2
pkgs/development/python-modules/certbot/default.nix
··· 10 10 , distro 11 11 , josepy 12 12 , parsedatetime 13 - , pyRFC3339 13 + , pyrfc3339 14 14 , pyopenssl 15 15 , pytz 16 16 , requests ··· 47 47 distro 48 48 josepy 49 49 parsedatetime 50 - pyRFC3339 50 + pyrfc3339 51 51 pyopenssl 52 52 pytz 53 53 requests
+1 -1
pkgs/development/python-modules/fonttools/default.nix
··· 60 60 pytestCheckHook 61 61 ] ++ lib.concatLists (lib.attrVals ([ 62 62 "woff" 63 - "interpolatable" 63 + # "interpolatable" is not included because it only contains 2 tests at the time of writing but adds 270 extra dependencies 64 64 "ufo" 65 65 ] ++ lib.optionals (!skia-pathops.meta.broken) [ 66 66 "pathops" # broken
+2 -2
pkgs/development/python-modules/img2pdf/default.nix
··· 12 12 , exiftool 13 13 , ghostscript 14 14 , imagemagick 15 - , mupdf 15 + , mupdf-headless 16 16 , netpbm 17 17 , numpy 18 18 , poppler_utils ··· 74 74 exiftool 75 75 ghostscript 76 76 imagemagick 77 - mupdf 77 + mupdf-headless 78 78 netpbm 79 79 numpy 80 80 poppler_utils
+43 -39
pkgs/development/python-modules/jinja2/default.nix
··· 9 9 , pytestCheckHook 10 10 , sphinxHook 11 11 , pallets-sphinx-themes 12 + , setuptools 12 13 , sphinxcontrib-log-cabinet 13 14 , sphinx-issues 14 15 }: 15 16 16 17 buildPythonPackage rec { 17 - pname = "Jinja2"; 18 - version = "3.1.2"; 18 + pname = "jinja2"; 19 + version = "3.1.3"; 20 + pyproject = true; 19 21 20 22 disabled = pythonOlder "3.7"; 21 23 22 24 src = fetchPypi { 23 - inherit pname version; 24 - hash = "sha256-MTUacCpAip51laj8YVD8P0O7a/fjGXcMvA2535Q36FI="; 25 + pname = "Jinja2"; 26 + inherit version; 27 + hash = "sha256-rIvWVE1Lssl5K/OhWegLuo/afwfoG8Ou1WVDLVklupA="; 25 28 }; 26 29 30 + nativeBuildInputs = [ 31 + setuptools 32 + ]; 33 + 27 34 propagatedBuildInputs = [ 28 - babel 29 35 markupsafe 30 36 ]; 31 37 38 + passthru.optional-dependencies = { 39 + i18n = [ 40 + babel 41 + ]; 42 + }; 43 + 32 44 # Multiple tests run out of stack space on 32bit systems with python2. 33 45 # See https://github.com/pallets/jinja/issues/1158 34 46 doCheck = !stdenv.is32bit; 35 47 36 48 nativeCheckInputs = [ 37 49 pytestCheckHook 38 - ]; 39 - 40 - pytestFlagsArray = [ 41 - # Avoid failure due to deprecation warning 42 - # Fixed in https://github.com/python/cpython/pull/28153 43 - # Remove after cpython 3.9.8 44 - "-p no:warnings" 45 - ]; 50 + ] ++ passthru.optional-dependencies.i18n; 46 51 47 - passthru = { 48 - doc = stdenv.mkDerivation { 49 - # Forge look and feel of multi-output derivation as best as we can. 50 - # 51 - # Using 'outputs = [ "doc" ];' breaks a lot of assumptions. 52 - name = "${pname}-${version}-doc"; 53 - inherit src pname version; 52 + passthru.doc = stdenv.mkDerivation { 53 + # Forge look and feel of multi-output derivation as best as we can. 54 + # 55 + # Using 'outputs = [ "doc" ];' breaks a lot of assumptions. 56 + name = "${pname}-${version}-doc"; 57 + inherit src pname version; 54 58 55 - patches = [ 56 - # Fix import of "sphinxcontrib-log-cabinet" 57 - ./patches/import-order.patch 58 - ]; 59 + patches = [ 60 + # Fix import of "sphinxcontrib-log-cabinet" 61 + ./patches/import-order.patch 62 + ]; 59 63 60 - postInstallSphinx = '' 61 - mv $out/share/doc/* $out/share/doc/python$pythonVersion-$pname-$version 62 - ''; 64 + postInstallSphinx = '' 65 + mv $out/share/doc/* $out/share/doc/python$pythonVersion-$pname-$version 66 + ''; 63 67 64 - nativeBuildInputs = [ 65 - sphinxHook 66 - sphinxcontrib-log-cabinet 67 - pallets-sphinx-themes 68 - sphinx-issues 69 - ]; 68 + nativeBuildInputs = [ 69 + sphinxHook 70 + sphinxcontrib-log-cabinet 71 + pallets-sphinx-themes 72 + sphinx-issues 73 + ]; 70 74 71 - inherit (python) pythonVersion; 72 - inherit meta; 73 - }; 75 + inherit (python) pythonVersion; 76 + inherit meta; 74 77 }; 75 78 76 79 meta = with lib; { 77 - homepage = "https://jinja.palletsprojects.com/"; 78 - description = "Stand-alone template engine"; 80 + changelog = "https://github.com/pallets/jinja/blob/${version}/CHANGES.rst"; 81 + description = "Very fast and expressive template engine"; 82 + downloadPage = "https://github.com/pallets/jinja"; 83 + homepage = "https://jinja.palletsprojects.com"; 79 84 license = licenses.bsd3; 80 85 longDescription = '' 81 86 Jinja is a fast, expressive, extensible templating engine. Special 82 87 placeholders in the template allow writing code similar to Python 83 88 syntax. Then the template is passed data to render the final document. 84 - an optional sandboxed environment. 85 89 ''; 86 90 maintainers = with maintainers; [ pierron ]; 87 91 };
+2 -1
pkgs/development/python-modules/levenshtein/default.nix
··· 22 22 owner = "maxbachmann"; 23 23 repo = "Levenshtein"; 24 24 rev = "refs/tags/v${version}"; 25 - hash = "sha256-O39Xe26WKAGcv6DEvwuOL8NZJBem5SYZDX1TPAY7/uA="; 25 + hash = "sha256-xQimslz/G6nf2uYerLSaRAK5gvmfDmWTzEx/fh+nqg0="; 26 + fetchSubmodules = true; ## for vendored `rapidfuzz-cpp` 26 27 }; 27 28 28 29 nativeBuildInputs = [
+5 -14
pkgs/development/python-modules/matplotlib/default.nix
··· 6 6 , isPyPy 7 7 , pythonOlder 8 8 9 - # https://github.com/matplotlib/matplotlib/blob/main/doc/devel/dependencies.rst 10 9 # build-system 11 10 , certifi 12 - , oldest-supported-numpy 13 11 , pkg-config 14 12 , pybind11 15 13 , setuptools ··· 109 107 substituteInPlace src/_c_internal_utils.c \ 110 108 --replace libX11.so.6 ${libX11}/lib/libX11.so.6 \ 111 109 --replace libwayland-client.so.0 ${wayland}/lib/libwayland-client.so.0 112 - '' + 113 - # bring our own system libraries 114 - # https://github.com/matplotlib/matplotlib/blob/main/doc/devel/dependencies.rst#c-libraries 115 - '' 116 - echo "[libs] 117 - system_freetype=true 118 - system_qhull=true" > mplsetup.cfg 119 110 ''; 120 111 121 112 nativeBuildInputs = [ 122 113 certifi 123 114 numpy 124 - oldest-supported-numpy # TODO remove after updating to 3.8.0 125 115 pkg-config 126 116 pybind11 127 117 setuptools ··· 184 174 libs = { 185 175 system_freetype = true; 186 176 system_qhull = true; 187 - } // lib.optionalAttrs stdenv.isDarwin { 188 177 # LTO not working in darwin stdenv, see #19312 189 - enable_lto = false; 178 + enable_lto = !stdenv.isDarwin; 190 179 }; 191 180 }; 192 181 193 182 env.MPLSETUPCFG = writeText "mplsetup.cfg" (lib.generators.toINI {} passthru.config); 194 183 195 - # Matplotlib needs to be built against a specific version of freetype in 196 - # order for all of the tests to pass. 184 + # Encountering a ModuleNotFoundError, as describved and investigated at: 185 + # https://github.com/NixOS/nixpkgs/issues/255262 . It could be that some of 186 + # which may fail due to a freetype version that doesn't match the freetype 187 + # version used by upstream. 197 188 doCheck = false; 198 189 199 190 meta = with lib; {
+1 -1
pkgs/development/python-modules/meson-python/default.nix
··· 48 48 description = "Meson Python build backend (PEP 517)"; 49 49 homepage = "https://github.com/mesonbuild/meson-python"; 50 50 license = [ lib.licenses.mit ]; 51 - maintainers = [ lib.maintainers.fridh ]; 51 + maintainers = with lib.maintainers; [ fridh doronbehar ]; 52 52 }; 53 53 }
+3 -5
pkgs/development/python-modules/ocrmypdf/default.nix
··· 25 25 , tqdm 26 26 , typing-extensions 27 27 , unpaper 28 - , wheel 29 28 , installShellFiles 30 29 }: 31 30 32 31 buildPythonPackage rec { 33 32 pname = "ocrmypdf"; 34 - version = "15.4.4"; 33 + version = "16.0.4"; 35 34 36 - disabled = pythonOlder "3.9"; 35 + disabled = pythonOlder "3.10"; 37 36 38 37 pyproject = true; 39 38 ··· 47 46 postFetch = '' 48 47 rm "$out/.git_archival.txt" 49 48 ''; 50 - hash = "sha256-Ff0OrSJFglVPpSNB0KvDMnatj+P57zWdcVAFaM+Sg0s="; 49 + hash = "sha256-1Bg1R8c5VtJsd8NHd+WWdJRA39Jjgv9JUMcijZm942o="; 51 50 }; 52 51 53 52 patches = [ ··· 64 63 nativeBuildInputs = [ 65 64 setuptools 66 65 setuptools-scm 67 - wheel 68 66 installShellFiles 69 67 ]; 70 68
+5 -7
pkgs/development/python-modules/pikepdf/default.nix
··· 7 7 , jbig2dec 8 8 , deprecated 9 9 , lxml 10 - , mupdf 10 + , mupdf-headless 11 11 , numpy 12 12 , packaging 13 13 , pillow ··· 20 20 , qpdf 21 21 , setuptools 22 22 , substituteAll 23 - , wheel 24 23 }: 25 24 26 25 buildPythonPackage rec { 27 26 pname = "pikepdf"; 28 - version = "8.9.0"; 27 + version = "8.11.2"; 29 28 pyproject = true; 30 29 31 30 disabled = pythonOlder "3.8"; ··· 40 39 postFetch = '' 41 40 rm "$out/.git_archival.txt" 42 41 ''; 43 - hash = "sha256-ia+D0OeB/MQWRniYkBEWZsDCwEApYGgu0++I/HupK6w="; 42 + hash = "sha256-mxUXXD7/ERC6mfmLLo+zdsVblIplrlcnzTNQ7YUk3Q4="; 44 43 }; 45 44 46 45 patches = [ 47 46 (substituteAll { 48 47 src = ./paths.patch; 49 - jbig2dec = "${lib.getBin jbig2dec}/bin/jbig2dec"; 50 - mudraw = "${lib.getBin mupdf}/bin/mudraw"; 48 + jbig2dec = lib.getExe' jbig2dec "jbig2dec"; 49 + mutool = lib.getExe' mupdf-headless "mutool"; 51 50 }) 52 51 ]; 53 52 ··· 63 62 nativeBuildInputs = [ 64 63 pybind11 65 64 setuptools 66 - wheel 67 65 ]; 68 66 69 67 nativeCheckInputs = [
+5 -5
pkgs/development/python-modules/pikepdf/paths.patch
··· 1 1 diff --git a/src/pikepdf/_methods.py b/src/pikepdf/_methods.py 2 - index d27c660..6796984 100644 2 + index da40043f..4f566f01 100644 3 3 --- a/src/pikepdf/_methods.py 4 4 +++ b/src/pikepdf/_methods.py 5 - @@ -72,7 +72,7 @@ def _mudraw(buffer, fmt) -> bytes: 5 + @@ -74,7 +74,7 @@ def _mudraw(buffer, fmt) -> bytes: 6 6 tmp_in.flush() 7 7 8 8 proc = run( 9 - - ['mudraw', '-F', fmt, '-o', '-', tmp_in.name], 10 - + ['@mudraw@', '-F', fmt, '-o', '-', tmp_in.name], 9 + - ['mutool', 'draw', '-F', fmt, '-o', '-', tmp_in.name], 10 + + ['@mutool@', 'draw', '-F', fmt, '-o', '-', tmp_in.name], 11 11 capture_output=True, 12 12 check=True, 13 13 ) 14 14 diff --git a/src/pikepdf/jbig2.py b/src/pikepdf/jbig2.py 15 - index f89b4f9..f187ebd 100644 15 + index f89b4f90..f187ebdf 100644 16 16 --- a/src/pikepdf/jbig2.py 17 17 +++ b/src/pikepdf/jbig2.py 18 18 @@ -63,7 +63,7 @@ class JBIG2Decoder(JBIG2DecoderInterface):
+2 -2
pkgs/development/python-modules/pycryptodome/default.nix
··· 10 10 in 11 11 buildPythonPackage rec { 12 12 pname = "pycryptodome"; 13 - version = "3.19.0"; 13 + version = "3.19.1"; 14 14 format = "setuptools"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "Legrandin"; 18 18 repo = "pycryptodome"; 19 19 rev = "refs/tags/v${version}"; 20 - hash = "sha256-WD+OEjePVtqlmn7h1CIfraLuEQlodkvjmYQ8q7nNoGU="; 20 + hash = "sha256-+m0gF47l3c9gZ9dLdOUNW0I2W1O+OGrmsdysu7QdjvI="; 21 21 }; 22 22 23 23 postPatch = ''
+1
pkgs/development/python-modules/pycurl/default.nix
··· 70 70 # https://github.com/pycurl/pycurl/issues/819 71 71 "test_multi_socket_select" 72 72 # https://github.com/pycurl/pycurl/issues/729 73 + "test_easy_pause_unpause" 73 74 "test_multi_socket_action" 74 75 # https://github.com/pycurl/pycurl/issues/822 75 76 "test_request_with_verifypeer"
+3 -4
pkgs/development/python-modules/pymemcache/default.nix
··· 5 5 , mock 6 6 , six 7 7 , pytestCheckHook 8 + , python-memcached 8 9 , pythonOlder 9 10 , zstd 10 11 , stdenv ··· 32 33 faker 33 34 mock 34 35 pytestCheckHook 36 + python-memcached 35 37 zstd 36 38 ]; 37 39 ··· 39 41 sed -i "/--cov/d" setup.cfg 40 42 ''; 41 43 42 - disabledTests = [ 43 - # python-memcached is not available (last release in 2017) 44 - "TestClientSocketConnect" 45 - ] ++ lib.optionals stdenv.is32bit [ 44 + disabledTests = lib.optionals stdenv.is32bit [ 46 45 # test_compressed_complex is broken on 32-bit platforms 47 46 # this can be removed on the next version bump 48 47 # see also https://github.com/pinterest/pymemcache/pull/480
+3 -2
pkgs/development/python-modules/pyrfc3339/default.nix
··· 14 14 }: 15 15 16 16 buildPythonPackage rec { 17 - pname = "pyRFC3339"; 17 + pname = "pyrfc3339"; 18 18 version = "1.1"; 19 19 pyproject = true; 20 20 21 21 src = fetchPypi { 22 - inherit pname version; 22 + pname = "pyRFC3339"; 23 + inherit version; 23 24 sha256 = "06jv7ar7lpvvk0dixzwdr3wgm0g1lipxs429s2z7knwwa7hwpf41"; 24 25 }; 25 26
+6 -6
pkgs/development/python-modules/python-memcached/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 3 , fetchFromGitHub 4 - , six 4 + , setuptools 5 5 , mock 6 6 , pytestCheckHook 7 7 }: 8 8 9 9 buildPythonPackage rec { 10 10 pname = "python-memcached"; 11 - version = "1.59"; 12 - format = "setuptools"; 11 + version = "1.61"; 12 + pyproject = true; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "linsomniac"; 16 16 repo = "python-memcached"; 17 17 rev = version; 18 - hash = "sha256-tHqkwNloPTXOrEGtuDLu1cTw4SKJ4auv8UUbqdNp698="; 18 + hash = "sha256-7bUCVAmOJ6znVmTZg9AJokOuym07NHL12gZgQ2uhfNo="; 19 19 }; 20 20 21 - propagatedBuildInputs = [ 22 - six 21 + nativeBuildInputs = [ 22 + setuptools 23 23 ]; 24 24 25 25 nativeCheckInputs = [
+5 -9
pkgs/development/python-modules/pythran/default.nix
··· 25 25 26 26 in buildPythonPackage rec { 27 27 pname = "pythran"; 28 - version = "0.14.0"; 28 + version = "0.15.0"; 29 29 pyproject = true; 30 30 31 31 src = fetchFromGitHub { 32 32 owner = "serge-sans-paille"; 33 33 repo = "pythran"; 34 34 rev = version; 35 - hash = "sha256-in0ty0aBAIx7Is13hjiHZGS8eKbhxb6TL3bENzfx5vQ="; 35 + hash = "sha256-TpD8YZnnv48PKYrUqR0/qvJG1XRbcMBcrkcERh6Q4q0="; 36 36 }; 37 37 38 38 patches = [ ··· 41 41 src = ./0001-hardcode-path-to-libgomp.patch; 42 42 gomp = "${if stdenv.cc.isClang then openmp else stdenv.cc.cc.lib}/lib/libgomp${stdenv.hostPlatform.extensions.sharedLibrary}"; 43 43 }) 44 - (fetchpatch { 45 - # Python 3.12 support 46 - url = "https://github.com/serge-sans-paille/pythran/commit/258ab9aaf26172f669eab1bf2a346b5f65db3ac0.patch"; 47 - hash = "sha256-T+FLptDYIgzHBSXShULqHr/G8ttBFamq1M5JlB2HxDM="; 48 - }) 49 44 ]; 50 45 51 46 # xsimd: unvendor this header-only C++ lib 52 47 postPatch = '' 53 - rm -r third_party/xsimd 54 - ln -s '${lib.getDev xsimd}'/include/xsimd third_party/ 48 + rm -r pythran/xsimd 49 + ln -s '${lib.getDev xsimd}'/include/xsimd pythran/ 55 50 ''; 56 51 57 52 nativeBuildInputs = [ ··· 84 79 description = "Ahead of Time compiler for numeric kernels"; 85 80 homepage = "https://github.com/serge-sans-paille/pythran"; 86 81 license = lib.licenses.bsd3; 82 + maintainers = with lib.maintainers; [ doronbehar ]; 87 83 }; 88 84 }
+3 -3
pkgs/development/python-modules/rapidfuzz/default.nix
··· 18 18 19 19 buildPythonPackage rec { 20 20 pname = "rapidfuzz"; 21 - version = "3.5.2"; 22 - format = "pyproject"; 21 + version = "3.6.1"; 22 + pyproject = true; 23 23 24 24 disabled = pythonOlder "3.7"; 25 25 ··· 27 27 owner = "maxbachmann"; 28 28 repo = "RapidFuzz"; 29 29 rev = "refs/tags/v${version}"; 30 - hash = "sha256-D7Z0xKqAJAPKSAEK+3Mpz/LaEKqKYczp+m6SqfzufwA="; 30 + hash = "sha256-QJVRT+d/IIGxkWfSNoXFSmbW017+8CTKuWD4W+TzvBs="; 31 31 }; 32 32 33 33 postPatch = ''
+2 -2
pkgs/development/python-modules/scikit-learn/default.nix
··· 24 24 25 25 buildPythonPackage rec { 26 26 pname = "scikit-learn"; 27 - version = "1.3.2"; 27 + version = "1.4.0"; 28 28 pyproject = true; 29 29 30 30 disabled = pythonOlder "3.6"; 31 31 32 32 src = fetchPypi { 33 33 inherit pname version; 34 - hash = "sha256-ovVMdqzMFaNL+5Bm5selbB5yNd2ldiuZB5IzC1LM+wU="; 34 + hash = "sha256-1Dc8mE66IOOTIW7dUaPj7t5Wy+k9QkdRbSBWQ8O5MSE="; 35 35 }; 36 36 37 37 buildInputs = [
+13 -42
pkgs/development/python-modules/scipy/default.nix
··· 13 13 , pkg-config 14 14 , pythran 15 15 , wheel 16 + , nose 17 + , setuptools 18 + , hypothesis 16 19 , pytestCheckHook 17 20 , pytest-xdist 18 21 , numpy ··· 31 34 # nix-shell maintainers/scripts/update.nix --argstr package python3.pkgs.scipy 32 35 # 33 36 # The update script uses sed regexes to replace them with the updated hashes. 34 - version = "1.11.4"; 35 - srcHash = "sha256-hNAZOMDFYqZpb67Pzg/WALWagFYvqYO1jOmcipDDRbE="; 37 + version = "1.12.0"; 38 + srcHash = "sha256-PuiyYTgSegDTV9Kae5N68FOXT1jyJrNv9p2aFP70Z20="; 36 39 datasetsHashes = { 37 40 ascent = "1qjp35ncrniq9rhzb14icwwykqg2208hcssznn3hz27w39615kh3"; 38 41 ecg = "1bwbjp43b7znnwha5hv6wiz3g0bhwrpqpi75s12zidxrbwvd62pj"; ··· 75 78 }) 76 79 ]; 77 80 78 - # Relax deps a bit 81 + # Upstream complicated numpy version pinning is causing issues in the 82 + # configurePhase, so we pass on it. 79 83 postPatch = '' 80 84 substituteInPlace pyproject.toml \ 81 - --replace 'meson-python>=0.12.1,<0.15.0' 'meson-python' \ 82 - --replace 'numpy==' 'numpy>=' \ 83 - --replace "pybind11>=2.10.4,<2.11.1" "pybind11>=2.10.4,<2.12.0" \ 84 - --replace 'wheel<0.41.0' 'wheel' 85 + --replace-fail 'numpy==' 'numpy>=' \ 85 86 ''; 86 87 87 88 nativeBuildInputs = [ ··· 91 92 pythran 92 93 pkg-config 93 94 wheel 95 + setuptools 94 96 ]; 95 97 96 98 buildInputs = [ ··· 108 110 __darwinAllowLocalNetworking = true; 109 111 110 112 nativeCheckInputs = [ 113 + nose 114 + hypothesis 111 115 pytestCheckHook 112 116 pytest-xdist 113 117 ]; ··· 157 161 # 158 162 hardeningDisable = lib.optionals (stdenv.isAarch64 && stdenv.isDarwin) [ "stackprotector" ]; 159 163 160 - checkPhase = '' 161 - runHook preCheck 162 - 163 - # Adapted from pytestCheckHook because scipy uses a custom check phase. 164 - # It needs to pass `$args` as a Python list to `scipy.test` rather than as 165 - # arguments to pytest on the command-line. 166 - args="" 167 - if [ -n "$disabledTests" ]; then 168 - disabledTestsString=$(_pytestComputeDisabledTestsString "''${disabledTests[@]}") 169 - args+="'-k','$disabledTestsString'" 170 - fi 171 - 172 - if [ -n "''${disabledTestPaths-}" ]; then 173 - eval "disabledTestPaths=($disabledTestPaths)" 174 - fi 175 - 176 - for path in ''${disabledTestPaths[@]}; do 177 - if [ ! -e "$path" ]; then 178 - echo "Disabled tests path \"$path\" does not exist. Aborting" 179 - exit 1 180 - fi 181 - args+="''${args:+,}'--ignore=\"$path\"'" 182 - done 183 - args+="''${args:+,}$(printf \'%s\', "''${pytestFlagsArray[@]}")" 184 - args=''${args%,} 185 - 186 - pushd "$out" 164 + preCheck = '' 187 165 export OMP_NUM_THREADS=$(( $NIX_BUILD_CORES / 4 )) 188 - ${python.interpreter} -c "import scipy, sys; sys.exit(scipy.test( 189 - 'fast', 190 - verbose=10, 191 - extra_argv=[$args], 192 - parallel=$NIX_BUILD_CORES 193 - ) != True)" 194 - popd 195 - runHook postCheck 166 + cd $out 196 167 ''; 197 168 198 169 requiredSystemFeatures = [ "big-parallel" ]; # the tests need lots of CPU time
+7 -2
pkgs/development/python-modules/sip/default.nix
··· 9 9 , ply 10 10 , toml 11 11 , tomli 12 + , poppler-qt5 12 13 }: 13 14 14 15 buildPythonPackage rec { 15 16 pname = "sip"; 16 - version = "6.8.0"; 17 + version = "6.8.1"; 17 18 18 19 format = "pyproject"; 19 20 20 21 src = fetchPypi { 21 22 inherit pname version; 22 - hash = "sha256-LtGQSCDLZhtyB+sdzPrr7BpUY9ytkDukSK0ZRVAtCJw="; 23 + hash = "sha256-MALfQV4WisP/45OULbxxMcuCreUAAOFSb0aoit4m9Zg="; 23 24 }; 24 25 25 26 nativeBuildInputs = [ ··· 35 36 doCheck = false; 36 37 37 38 pythonImportsCheck = [ "sipbuild" ]; 39 + 40 + passthru.tests = { 41 + inherit poppler-qt5; 42 + }; 38 43 39 44 meta = with lib; { 40 45 description = "Creates C++ bindings for Python modules";
+4 -2
pkgs/development/python-modules/sphinxcontrib-apidoc/default.nix
··· 2 2 , buildPythonPackage 3 3 , fetchPypi 4 4 , pbr 5 + , setuptools 5 6 }: 6 7 7 8 buildPythonPackage rec { 8 9 pname = "sphinxcontrib-apidoc"; 9 10 version = "0.4.0"; 10 - format = "setuptools"; 11 + pyproject = true; 11 12 12 13 src = fetchPypi { 13 14 inherit pname version; ··· 19 20 rm test-requirements.txt requirements.txt 20 21 ''; 21 22 22 - propagatedBuildInputs = [ 23 + nativeBuildInputs = [ 23 24 pbr 25 + setuptools 24 26 ]; 25 27 26 28 # Check is disabled due to circular dependency of sphinx
+2 -2
pkgs/development/ruby-modules/bundler/default.nix
··· 4 4 inherit ruby; 5 5 name = "${gemName}-${version}"; 6 6 gemName = "bundler"; 7 - version = "2.5.3"; 8 - source.sha256 = "sha256-JJzQdaxPM1rnD3iMm+D0wYgJOk2n0FvVO+K67z8l58s="; 7 + version = "2.5.5"; 8 + source.sha256 = "sha256-E8f+JpAw4qZAKmVMBt7/Aa72dM7WSds76YtVA6CApGI="; 9 9 dontPatchShebangs = true; 10 10 11 11 postFixup = ''
+1 -1
pkgs/development/ruby-modules/gem/default.nix
··· 34 34 , stdenv ? ruby.stdenv 35 35 , namePrefix ? (let 36 36 rubyName = builtins.parseDrvName ruby.name; 37 - in "${rubyName.name}${rubyName.version}-") 37 + in "${rubyName.name}${lib.versions.majorMinor rubyName.version}-") 38 38 , nativeBuildInputs ? [] 39 39 , buildInputs ? [] 40 40 , meta ? {}
+8 -8
pkgs/development/tools/documentation/doxygen/default.nix
··· 8 8 , qt5 9 9 , CoreServices 10 10 , libiconv 11 - , withSqlite ? true, sqlite 11 + , sqlite 12 12 }: 13 13 14 14 stdenv.mkDerivation rec { 15 15 pname = "doxygen"; 16 - version = "1.9.8"; 16 + version = "1.10.0"; 17 17 18 18 src = fetchFromGitHub { 19 19 owner = "doxygen"; 20 20 repo = "doxygen"; 21 21 rev = "Release_${lib.replaceStrings [ "." ] [ "_" ] version}"; 22 - sha256 = "sha256-uQ1Fl2kmY7qmzy34NOmZCgPxVGwmqRqDvV6yEab5P4w="; 22 + sha256 = "sha256-FPI5ICdn9Tne/g9SP6jAQS813AAyoDNooDR/Hyvq6R4="; 23 23 }; 24 24 25 25 nativeBuildInputs = [ ··· 29 29 bison 30 30 ]; 31 31 32 - buildInputs = [ libiconv ] 33 - ++ lib.optionals withSqlite [ sqlite ] 32 + buildInputs = [ libiconv sqlite ] 34 33 ++ lib.optionals (qt5 != null) (with qt5; [ qtbase wrapQtAppsHook ]) 35 34 ++ lib.optionals stdenv.isDarwin [ CoreServices ]; 36 35 37 - cmakeFlags = [ "-DICONV_INCLUDE_DIR=${libiconv}/include" ] 38 - ++ lib.optional withSqlite "-Duse_sqlite3=ON" 39 - ++ lib.optional (qt5 != null) "-Dbuild_wizard=YES"; 36 + cmakeFlags = [ 37 + "-DICONV_INCLUDE_DIR=${libiconv}/include" 38 + "-Duse_sys_sqlite3=ON" 39 + ] ++ lib.optional (qt5 != null) "-Dbuild_wizard=YES"; 40 40 41 41 env.NIX_CFLAGS_COMPILE = 42 42 lib.optionalString stdenv.isDarwin "-mmacosx-version-min=10.9";
-43
pkgs/development/tools/gocode/default.nix
··· 1 - { lib, buildGoPackage, fetchFromGitHub }: 2 - 3 - buildGoPackage rec { 4 - pname = "gocode-unstable"; 5 - version = "2020-04-06"; 6 - rev = "4acdcbdea79de6b3dee1c637eca5cbea0fdbe37c"; 7 - 8 - goPackagePath = "github.com/mdempsky/gocode"; 9 - 10 - # we must allow references to the original `go` package, 11 - # because `gocode` needs to dig into $GOROOT to provide completions for the 12 - # standard packages. 13 - allowGoReference = true; 14 - 15 - src = fetchFromGitHub { 16 - inherit rev; 17 - 18 - owner = "mdempsky"; 19 - repo = "gocode"; 20 - sha256 = "0i1hc089gb6a4mcgg56vn5l0q96wrlza2n08l4349s3dc2j559fb"; 21 - }; 22 - 23 - goDeps = ./deps.nix; 24 - 25 - meta = with lib; { 26 - description = "An autocompletion daemon for the Go programming language"; 27 - longDescription = '' 28 - Gocode is a helper tool which is intended to be integrated with your 29 - source code editor, like vim, neovim and emacs. It provides several 30 - advanced capabilities, which currently includes: 31 - 32 - - Context-sensitive autocompletion 33 - 34 - It is called daemon, because it uses client/server architecture for 35 - caching purposes. In particular, it makes autocompletions very fast. 36 - Typical autocompletion time with warm cache is 30ms, which is barely 37 - noticeable. 38 - ''; 39 - homepage = "https://github.com/mdempsky/gocode"; 40 - license = licenses.mit; 41 - maintainers = with maintainers; [ kalbasit ]; 42 - }; 43 - }
-12
pkgs/development/tools/gocode/deps.nix
··· 1 - # This file was generated by https://github.com/kamilchm/go2nix v1.3.0 2 - [ 3 - { 4 - goPackagePath = "golang.org/x/tools"; 5 - fetch = { 6 - type = "git"; 7 - url = "https://go.googlesource.com/tools"; 8 - rev = "72e4a01eba4315301fd9ce00c8c2f492580ded8a"; 9 - sha256 = "0a8c7j4w784w441j3j3bh640vy1g6g214641qv485wyi0xj49anf"; 10 - }; 11 - } 12 - ]
+5 -1
pkgs/development/tools/gofumpt/default.nix
··· 21 21 22 22 CGO_ENABLED = "0"; 23 23 24 - ldflags = "-s -w -X main.version=v${version}"; 24 + ldflags = [ 25 + "-s" 26 + "-w" 27 + "-X main.version=v${version}" 28 + ]; 25 29 26 30 checkFlags = [ 27 31 # Requires network access (Error: module lookup disabled by GOPROXY=off).
+1 -1
pkgs/development/tools/kind/default.nix
··· 20 20 21 21 CGO_ENABLED = 0; 22 22 GOFLAGS = [ "-trimpath" ]; 23 - ldflags = [ "-buildid=" "-w" ]; 23 + ldflags = [ "-w" ]; 24 24 25 25 doCheck = false; 26 26
+69
pkgs/development/tools/misc/autoconf/2.71.nix
··· 1 + { lib, stdenv, fetchurl, m4, perl, texinfo }: 2 + 3 + # Note: this package is used for bootstrapping fetchurl, and thus 4 + # cannot use fetchpatch! All mutable patches (generated by GitHub or 5 + # cgit) that are needed here should be included directly in Nixpkgs as 6 + # files. 7 + 8 + stdenv.mkDerivation rec { 9 + pname = "autoconf"; 10 + version = "2.71"; 11 + outputs = [ "out" "doc" ]; 12 + 13 + src = fetchurl { 14 + url = "mirror://gnu/autoconf/autoconf-${version}.tar.xz"; 15 + sha256 = "197sl23irn6s9pd54rxj5vcp5y8dv65jb9yfqgr2g56cxg7q6k7i"; 16 + }; 17 + patches = [ 18 + # fix stale autom4te cache race condition: 19 + # https://savannah.gnu.org/support/index.php?110521 20 + ./2.71-fix-race.patch 21 + ]; 22 + 23 + strictDeps = true; 24 + nativeBuildInputs = [ m4 perl texinfo ]; 25 + buildInputs = [ m4 ]; 26 + postBuild = " 27 + make html 28 + "; 29 + 30 + postInstall = " 31 + make install-html 32 + "; 33 + 34 + # Work around a known issue in Cygwin. See 35 + # http://thread.gmane.org/gmane.comp.sysutils.autoconf.bugs/6822 for 36 + # details. 37 + # There are many test failures on `i386-pc-solaris2.11'. 38 + doCheck = ((!stdenv.isCygwin) && (!stdenv.isSunOS)); 39 + 40 + # Don't fixup "#! /bin/sh" in Autoconf, otherwise it will use the 41 + # "fixed" path in generated files! 42 + dontPatchShebangs = true; 43 + 44 + enableParallelBuilding = true; 45 + 46 + # Make the Autotest test suite run in parallel. 47 + preCheck ='' 48 + export TESTSUITEFLAGS="-j$NIX_BUILD_CORES" 49 + ''; 50 + 51 + meta = { 52 + homepage = "https://www.gnu.org/software/autoconf/"; 53 + description = "Part of the GNU Build System"; 54 + 55 + longDescription = '' 56 + GNU Autoconf is an extensible package of M4 macros that produce 57 + shell scripts to automatically configure software source code 58 + packages. These scripts can adapt the packages to many kinds of 59 + UNIX-like systems without manual user intervention. Autoconf 60 + creates a configuration script for a package from a template 61 + file that lists the operating system features that the package 62 + can use, in the form of M4 macro calls. 63 + ''; 64 + 65 + license = lib.licenses.gpl3Plus; 66 + 67 + platforms = lib.platforms.all; 68 + }; 69 + }
+2 -7
pkgs/development/tools/misc/autoconf/default.nix
··· 7 7 8 8 stdenv.mkDerivation rec { 9 9 pname = "autoconf"; 10 - version = "2.71"; 10 + version = "2.72"; 11 11 outputs = [ "out" "doc" ]; 12 12 13 13 src = fetchurl { 14 14 url = "mirror://gnu/autoconf/autoconf-${version}.tar.xz"; 15 - sha256 = "197sl23irn6s9pd54rxj5vcp5y8dv65jb9yfqgr2g56cxg7q6k7i"; 15 + hash = "sha256-uohcExlXjWyU1G6bDc60AUyq/iSQ5Deg28o/JwoiP1o="; 16 16 }; 17 - patches = [ 18 - # fix stale autom4te cache race condition: 19 - # https://savannah.gnu.org/support/index.php?110521 20 - ./2.71-fix-race.patch 21 - ]; 22 17 23 18 strictDeps = true; 24 19 nativeBuildInputs = [ m4 perl texinfo ];
+2 -2
pkgs/development/tools/misc/lttng-ust/default.nix
··· 1 1 import ./generic.nix { 2 - version = "2.13.6"; 3 - sha256 = "sha256-5+BFlt1zrHqpnifNAA+UnbsP7VG9KQmfmwiiXB3wztU="; 2 + version = "2.13.7"; 3 + sha256 = "sha256-X7TxfDB8jBt5xoVh6JvpVi0H50Jb9A5yjE1mdVNCpes="; 4 4 }
-5
pkgs/development/tools/misc/ycmd/default.nix
··· 1 1 { stdenv, lib, fetchFromGitHub, cmake, ninja, python 2 - , withGocode ? true, gocode 3 2 , withGodef ? true, godef 4 3 , withGotools? true, gotools 5 4 , withTypescript ? true, typescript ··· 63 62 mkdir -p $out/lib/ycmd/third_party 64 63 cp -r third_party/* $out/lib/ycmd/third_party/ 65 64 66 - '' + lib.optionalString withGocode '' 67 - TARGET=$out/lib/ycmd/third_party/gocode 68 - mkdir -p $TARGET 69 - ln -sf ${gocode}/bin/gocode $TARGET 70 65 '' + lib.optionalString withGodef '' 71 66 TARGET=$out/lib/ycmd/third_party/godef 72 67 mkdir -p $TARGET
+3 -3
pkgs/development/tools/rust/maturin/default.nix
··· 9 9 10 10 rustPlatform.buildRustPackage rec { 11 11 pname = "maturin"; 12 - version = "1.3.0"; 12 + version = "1.4.0"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "PyO3"; 16 16 repo = "maturin"; 17 17 rev = "v${version}"; 18 - hash = "sha256-MVmu9m+9XhWuPBEEoaYmsSbMFziSZaM5Gg5kOr1DT54="; 18 + hash = "sha256-mD/7wWeclV5Xqii9hcZMustvR6tf7MoyTZ3WsvEc61U="; 19 19 }; 20 20 21 - cargoHash = "sha256-hrdrGFtL2vGczINnvDa4rclkXsNWnEqtTt3NVaRay8w="; 21 + cargoHash = "sha256-w8XpCJ8GS2VszW/9/O2suy82zVO1UpWTrU1lFGYwhvw="; 22 22 23 23 buildInputs = lib.optionals stdenv.isDarwin [ Security libiconv ]; 24 24
+2 -2
pkgs/development/tools/spirv-tools/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "spirv-tools"; 5 - version = "1.3.268.0"; 5 + version = "1.3.275.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "KhronosGroup"; 9 9 repo = "SPIRV-Tools"; 10 10 rev = "vulkan-sdk-${version}"; 11 - hash = "sha256-Bned5Pa6zCFByfNvqD0M5t3l4uAJYkDlpe6wu8e7a3U="; 11 + hash = "sha256-RzGvoDt1Qc+f6mZsfs99MxX4YB3yFc5FP92Yx/WGrsI="; 12 12 }; 13 13 14 14 # The cmake options are sufficient for turning on static building, but not
+2 -2
pkgs/development/tools/vulkan-validation-layers/default.nix
··· 23 23 in 24 24 stdenv.mkDerivation rec { 25 25 pname = "vulkan-validation-layers"; 26 - version = "1.3.268.0"; 26 + version = "1.3.275.0"; 27 27 28 28 src = fetchFromGitHub { 29 29 owner = "KhronosGroup"; 30 30 repo = "Vulkan-ValidationLayers"; 31 31 rev = "vulkan-sdk-${version}"; 32 - hash = "sha256-DwkSUclStYKe54tC1H3jMv1KOSScgqf25tR5ajQZ6os="; 32 + hash = "sha256-hJx8gn0zCN3+DhO6niylZJXPHgQ+VhQV5tL8qAeRaUg="; 33 33 }; 34 34 35 35 nativeBuildInputs = [
+2 -2
pkgs/development/web/nodejs/v20.nix
··· 8 8 in 9 9 buildNodejs { 10 10 inherit enableNpm; 11 - version = "20.10.0"; 12 - sha256 = "sha256-MuslbuvYys1VdOZjHlS0K+fsjr4lrUeoymhUA7rRVTU="; 11 + version = "20.11.0"; 12 + sha256 = "sha256-MYB+vu6wScU/F2XkqVrtaUdqS2lt0QDLU5q2aNeVC0A="; 13 13 patches = [ 14 14 ./revert-arm64-pointer-auth.patch 15 15 ./disable-darwin-v8-system-instrumentation-node19.patch
-164
pkgs/os-specific/linux/bluez/default.nix
··· 1 - { stdenv 2 - , lib 3 - , fetchurl 4 - , fetchpatch 5 - , alsa-lib 6 - , dbus 7 - , ell 8 - , glib 9 - , json_c 10 - , libical 11 - , docutils 12 - , pkg-config 13 - , python3 14 - , readline 15 - , systemdMinimal 16 - , udev 17 - , withExperimental ? false 18 - }: let 19 - pythonPath = with python3.pkgs; [ 20 - dbus-python 21 - pygobject3 22 - recursivePthLoader 23 - ]; 24 - in stdenv.mkDerivation rec { 25 - pname = "bluez"; 26 - version = "5.70"; 27 - 28 - src = fetchurl { 29 - url = "mirror://kernel/linux/bluetooth/${pname}-${version}.tar.xz"; 30 - sha256 = "sha256-N+Ny6RaVXhRMuIL4iOS+QImPEK47fCE93N1V7pwAkng="; 31 - }; 32 - 33 - patches = [ 34 - # replace use of a non-standard symbol to fix build with musl libc (pkgsMusl.bluez) 35 - (fetchpatch { 36 - url = "https://git.alpinelinux.org/aports/plain/main/bluez/max-input.patch?id=32b31b484cb13009bd8081c4106e4cf064ec2f1f"; 37 - sha256 = "sha256-SczbXtsxBkCO+izH8XOBcrJEO2f7MdtYVT3+2fCV8wU="; 38 - }) 39 - # Fix device pairing regression 40 - # FIXME: remove in next release 41 - (fetchpatch { 42 - url = "https://github.com/bluez/bluez/commit/3a9c637010f8dc1ba3e8382abe01065761d4f5bb.patch"; 43 - hash = "sha256-UUmYMHnxYrw663nEEC2mv3zj5e0omkLNejmmPUtgS3c="; 44 - }) 45 - # CVE-2023-45866 / https://github.com/skysafe/reblog/tree/main/cve-2023-45866 46 - (fetchpatch { 47 - name = "CVE-2023-45866.patch"; 48 - url = "https://git.kernel.org/pub/scm/bluetooth/bluez.git/patch/profiles/input?id=25a471a83e02e1effb15d5a488b3f0085eaeb675"; 49 - sha256 = "sha256-IuPQ18yN0EO/PkqdT/JETyOxdZCKewBiDjGN4CG2GLo="; 50 - }) 51 - ]; 52 - 53 - buildInputs = [ 54 - alsa-lib 55 - dbus 56 - ell 57 - glib 58 - json_c 59 - libical 60 - python3 61 - readline 62 - udev 63 - ]; 64 - 65 - nativeBuildInputs = [ 66 - docutils 67 - pkg-config 68 - python3.pkgs.wrapPython 69 - ]; 70 - 71 - outputs = [ "out" "dev" "test" ]; 72 - 73 - postPatch = '' 74 - substituteInPlace tools/hid2hci.rules \ 75 - --replace /sbin/udevadm ${systemdMinimal}/bin/udevadm \ 76 - --replace "hid2hci " "$out/lib/udev/hid2hci " 77 - # Disable some tests: 78 - # - test-mesh-crypto depends on the following kernel settings: 79 - # CONFIG_CRYPTO_[USER|USER_API|USER_API_AEAD|USER_API_HASH|AES|CCM|AEAD|CMAC] 80 - if [[ ! -f unit/test-mesh-crypto.c ]]; then echo "unit/test-mesh-crypto.c no longer exists"; false; fi 81 - echo 'int main() { return 77; }' > unit/test-mesh-crypto.c 82 - ''; 83 - 84 - configureFlags = [ 85 - "--localstatedir=/var" 86 - "--enable-library" 87 - "--enable-cups" 88 - "--enable-pie" 89 - "--enable-external-ell" 90 - "--with-dbusconfdir=${placeholder "out"}/share" 91 - "--with-dbussystembusdir=${placeholder "out"}/share/dbus-1/system-services" 92 - "--with-dbussessionbusdir=${placeholder "out"}/share/dbus-1/services" 93 - "--with-systemdsystemunitdir=${placeholder "out"}/etc/systemd/system" 94 - "--with-systemduserunitdir=${placeholder "out"}/etc/systemd/user" 95 - "--with-udevdir=${placeholder "out"}/lib/udev" 96 - "--enable-health" 97 - "--enable-mesh" 98 - "--enable-midi" 99 - "--enable-nfc" 100 - "--enable-sixaxis" 101 - "--enable-btpclient" 102 - "--enable-hid2hci" 103 - "--enable-logger" 104 - 105 - # To provide ciptool, sdptool, and rfcomm (unmaintained) 106 - # superseded by new D-Bus APIs 107 - "--enable-deprecated" 108 - ] ++ lib.optional withExperimental "--enable-experimental"; 109 - 110 - 111 - # Work around `make install' trying to create /var/lib/bluetooth. 112 - installFlags = [ "statedir=$(TMPDIR)/var/lib/bluetooth" ]; 113 - 114 - makeFlags = [ "rulesdir=${placeholder "out"}/lib/udev/rules.d" ]; 115 - 116 - doCheck = stdenv.hostPlatform.isx86_64; 117 - 118 - postInstall = '' 119 - mkdir -p $test/{bin,test} 120 - cp -a test $test 121 - pushd $test/test 122 - for a in \ 123 - simple-agent \ 124 - test-adapter \ 125 - test-device \ 126 - test-thermometer \ 127 - list-devices \ 128 - monitor-bluetooth \ 129 - ; do 130 - ln -s ../test/$a $test/bin/bluez-$a 131 - done 132 - popd 133 - wrapPythonProgramsIn $test/test "$test/test ${toString pythonPath}" 134 - '' + '' 135 - # for bluez4 compatibility for NixOS 136 - mkdir $out/sbin 137 - ln -s ../libexec/bluetooth/bluetoothd $out/sbin/bluetoothd 138 - ln -s ../libexec/bluetooth/obexd $out/sbin/obexd 139 - 140 - # Add extra configuration 141 - mkdir $out/etc/bluetooth 142 - ln -s /etc/bluetooth/main.conf $out/etc/bluetooth/main.conf 143 - 144 - # https://github.com/NixOS/nixpkgs/issues/204418 145 - ln -s /etc/bluetooth/input.conf $out/etc/bluetooth/input.conf 146 - ln -s /etc/bluetooth/network.conf $out/etc/bluetooth/network.conf 147 - 148 - # Add missing tools, ref https://git.archlinux.org/svntogit/packages.git/tree/trunk/PKGBUILD?h=packages/bluez 149 - for files in `find tools/ -type f -perm -755`; do 150 - filename=$(basename $files) 151 - install -Dm755 tools/$filename $out/bin/$filename 152 - done 153 - install -Dm755 attrib/gatttool $out/bin/gatttool 154 - ''; 155 - 156 - enableParallelBuilding = true; 157 - 158 - meta = with lib; { 159 - description = "Bluetooth support for Linux"; 160 - homepage = "http://www.bluez.org/"; 161 - license = with licenses; [ gpl2 lgpl21 ]; 162 - platforms = platforms.linux; 163 - }; 164 - }
+2 -2
pkgs/os-specific/linux/hwdata/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "hwdata"; 5 - version = "0.377-2"; 5 + version = "0.378"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "vcrhonek"; 9 9 repo = "hwdata"; 10 10 rev = "v${version}"; 11 - hash = "sha256-Nh+EIsJ/98NnflndQeSgiV2iOC0icTEfgwAySPbG6Lo="; 11 + hash = "sha256-YCx0b4crg8A7mGXwqk1XQZKsm/3TUE8C2bOYKnb/FSA="; 12 12 }; 13 13 14 14 configureFlags = [ "--datadir=${placeholder "out"}/share" ];
+10
pkgs/os-specific/linux/kernel/common-config.nix
··· 381 381 DRM_VC4_HDMI_CEC = yes; 382 382 }; 383 383 384 + # Enables Rust support in the Linux kernel. This is currently not enabled by default, because it occasionally requires 385 + # patching the Linux kernel for the specific Rust toolchain in nixpkgs. These patches usually take a bit 386 + # of time to appear and this would hold up Linux kernel and Rust toolchain updates. 387 + # 388 + # Once Rust in the kernel has more users, we can reconsider enabling it by default. 389 + rust = optionalAttrs ((features.rust or false) && versionAtLeast version "6.7") { 390 + RUST = yes; 391 + GCC_PLUGINS = no; 392 + }; 393 + 384 394 sound = { 385 395 SND_DYNAMIC_MINORS = yes; 386 396 SND_AC97_POWER_SAVE = yes; # AC97 Power-Saving Mode
+11 -2
pkgs/os-specific/linux/kernel/generic.nix
··· 9 9 , pahole 10 10 , lib 11 11 , stdenv 12 + , rustc 13 + , rustPlatform 14 + , rust-bindgen 12 15 13 16 , # The kernel source tarball. 14 17 src ··· 115 118 map ({extraConfig ? "", ...}: extraConfig) kernelPatches; 116 119 in lib.concatStringsSep "\n" ([baseConfigStr] ++ configFromPatches); 117 120 121 + withRust = ((configfile.moduleStructuredConfig.settings.RUST or {}).tristate or null) == "y"; 122 + 118 123 configfile = stdenv.mkDerivation { 119 124 inherit ignoreConfigErrors autoModules preferBuiltin kernelArch extraMakeFlags; 120 125 pname = "linux-config"; ··· 128 133 depsBuildBuild = [ buildPackages.stdenv.cc ]; 129 134 nativeBuildInputs = [ perl gmp libmpc mpfr ] 130 135 ++ lib.optionals (lib.versionAtLeast version "4.16") [ bison flex ] 131 - ++ lib.optional (lib.versionAtLeast version "5.2") pahole; 136 + ++ lib.optional (lib.versionAtLeast version "5.2") pahole 137 + ++ lib.optionals withRust [ rust-bindgen rustc ] 138 + ; 139 + 140 + RUST_LIB_SRC = lib.optionalString withRust rustPlatform.rustLibSrc; 132 141 133 142 platformName = stdenv.hostPlatform.linux-kernel.name; 134 143 # e.g. "defconfig" ··· 200 209 inherit kernelPatches randstructSeed extraMakeFlags extraMeta configfile; 201 210 pos = builtins.unsafeGetAttrPos "version" args; 202 211 203 - config = { CONFIG_MODULES = "y"; CONFIG_FW_LOADER = "m"; }; 212 + config = { CONFIG_MODULES = "y"; CONFIG_FW_LOADER = "m"; } // lib.optionalAttrs withRust { CONFIG_RUST = "y"; }; 204 213 } // lib.optionalAttrs (modDirVersion != null) { inherit modDirVersion; }); 205 214 206 215 passthru = basicArgs // {
+25 -18
pkgs/os-specific/linux/kernel/manual-config.nix
··· 1 1 { lib, stdenv, buildPackages, runCommand, nettools, bc, bison, flex, perl, rsync, gmp, libmpc, mpfr, openssl 2 2 , libelf, cpio, elfutils, zstd, python3Minimal, zlib, pahole, kmod, ubootTools 3 3 , fetchpatch 4 + , rustc, rust-bindgen, rustPlatform 4 5 }: 5 6 6 7 let ··· 56 57 inherit (lib) 57 58 hasAttr getAttr optional optionals optionalString optionalAttrs maintainers platforms; 58 59 59 - # Dependencies that are required to build kernel modules 60 - moduleBuildDependencies = [ 61 - pahole 62 - perl 63 - libelf 64 - # module makefiles often run uname commands to find out the kernel version 65 - (buildPackages.deterministic-uname.override { inherit modDirVersion; }) 66 - ] ++ optional (lib.versionAtLeast version "5.13") zstd; 67 - 68 60 drvAttrs = config_: kernelConf: kernelPatches: configfile: 69 61 let 70 62 config = let attrName = attr: "CONFIG_" + attr; in { ··· 84 76 } // config_; 85 77 86 78 isModular = config.isYes "MODULES"; 79 + withRust = config.isYes "RUST"; 87 80 88 81 buildDTBs = kernelConf.DTB or false; 89 82 83 + # Dependencies that are required to build kernel modules 84 + moduleBuildDependencies = [ 85 + pahole 86 + perl 87 + libelf 88 + # module makefiles often run uname commands to find out the kernel version 89 + (buildPackages.deterministic-uname.override { inherit modDirVersion; }) 90 + ] 91 + ++ optional (lib.versionAtLeast version "5.13") zstd 92 + ++ optionals withRust [ rustc rust-bindgen ] 93 + ; 94 + 90 95 in (optionalAttrs isModular { outputs = [ "out" "dev" ]; }) // { 91 96 passthru = rec { 92 97 inherit version modDirVersion config kernelPatches configfile 93 98 moduleBuildDependencies stdenv; 94 - inherit isZen isHardened isLibre; 99 + inherit isZen isHardened isLibre withRust; 95 100 isXen = lib.warn "The isXen attribute is deprecated. All Nixpkgs kernels that support it now have Xen enabled." true; 96 101 baseVersion = lib.head (lib.splitString "-rc" version); 97 102 kernelOlder = lib.versionOlder baseVersion; ··· 99 104 }; 100 105 101 106 inherit src; 107 + 108 + depsBuildBuild = [ buildPackages.stdenv.cc ]; 109 + nativeBuildInputs = [ perl bc nettools openssl rsync gmp libmpc mpfr zstd python3Minimal kmod ubootTools ] 110 + ++ optional (lib.versionOlder version "5.8") libelf 111 + ++ optionals (lib.versionAtLeast version "4.16") [ bison flex ] 112 + ++ optionals (lib.versionAtLeast version "5.2") [ cpio pahole zlib ] 113 + ++ optional (lib.versionAtLeast version "5.8") elfutils 114 + ++ optionals withRust [ rustc rust-bindgen ]; 115 + 116 + RUST_LIB_SRC = lib.optionalString withRust rustPlatform.rustLibSrc; 102 117 103 118 patches = 104 119 map (p: p.patch) kernelPatches ··· 362 377 inherit version; 363 378 364 379 enableParallelBuilding = true; 365 - 366 - depsBuildBuild = [ buildPackages.stdenv.cc ]; 367 - nativeBuildInputs = [ perl bc nettools openssl rsync gmp libmpc mpfr zstd python3Minimal kmod ubootTools ] 368 - ++ optional (lib.versionOlder version "5.8") libelf 369 - ++ optionals (lib.versionAtLeast version "4.16") [ bison flex ] 370 - ++ optionals (lib.versionAtLeast version "5.2") [ cpio pahole zlib ] 371 - ++ optional (lib.versionAtLeast version "5.8") elfutils 372 - ; 373 380 374 381 hardeningDisable = [ "bindnow" "format" "fortify" "stackprotector" "pic" "pie" ]; 375 382
+2 -2
pkgs/os-specific/linux/libcap-ng/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "libcap-ng"; 5 - version = "0.8.3"; 5 + version = "0.8.4"; 6 6 7 7 src = fetchurl { 8 8 url = "https://people.redhat.com/sgrubb/libcap-ng/libcap-ng-${version}.tar.gz"; 9 - sha256 = "sha256-vtb2hI4iuy+Dtfdksq7w7TkwVOgDqOOocRyyo55rSS0="; 9 + sha256 = "sha256-aFgdOzjnVTy29t33gTsfyZ5ShW8hQh97R3zlq9JgWoo="; 10 10 }; 11 11 12 12 outputs = [ "out" "dev" "man" ];
+2 -2
pkgs/os-specific/linux/lvm2/2_03.nix
··· 1 1 import ./common.nix { 2 - version = "2.03.22"; 3 - hash = "sha256-TFppI70aznzgRHRgioSTfOBTupGxrOnwsAFyaOcy3Hw="; 2 + version = "2.03.23"; 3 + hash = "sha256-dOeUqene4bz4ogZfZbkZbET98yHiLWO5jtfejJqhel0="; 4 4 }
+2 -2
pkgs/os-specific/linux/lvm2/common.nix
··· 103 103 })) 104 104 # Musl fix from Alpine 105 105 ./fix-stdio-usage.patch 106 - ] ++ lib.optionals stdenv.hostPlatform.isStatic [ 107 - ./no-shared.patch 106 + # https://gitlab.com/lvmteam/lvm2/-/merge_requests/8 107 + ./fix-static.patch 108 108 ]; 109 109 110 110 doCheck = false; # requires root
+28
pkgs/os-specific/linux/lvm2/fix-static.patch
··· 1 + From 0cbe7f0adc86c92c61156c417b27b063f156b31b Mon Sep 17 00:00:00 2001 2 + From: Alyssa Ross <hi@alyssa.is> 3 + Date: Tue, 2 Jan 2024 18:15:20 +0100 4 + Subject: [PATCH] makefiles: fix disabling shared link 5 + 6 + LIB_SHARED still gets set when shared linking has been disabled, so 7 + the previous version of this check still attempted to build the 8 + shared library. 9 + --- 10 + libdm/make.tmpl.in | 2 +- 11 + 1 file changed, 1 insertion(+), 1 deletion(-) 12 + 13 + diff --git a/libdm/make.tmpl.in b/libdm/make.tmpl.in 14 + index 2dd9625d4d..69ba2c35ab 100644 15 + --- a/libdm/make.tmpl.in 16 + +++ b/libdm/make.tmpl.in 17 + @@ -436,7 +436,7 @@ DEFS+=-D_FILE_OFFSET_BITS=64 18 + @echo " [CC] $(<F)" 19 + $(Q) $(CC) -c $(CFLAGS) $(CLDFLAGS) $< $(LIBS) -o $@ 20 + 21 + -ifneq (,$(LIB_SHARED)) 22 + +ifeq ("@SHARED_LINK@", "yes") 23 + 24 + TARGETS += $(LIB_SHARED).$(LIB_VERSION) 25 + $(LIB_SHARED).$(LIB_VERSION): $(OBJECTS) $(LDDEPS) 26 + -- 27 + GitLab 28 +
-46
pkgs/os-specific/linux/lvm2/no-shared.patch
··· 1 - diff --git a/libdm/Makefile.in b/libdm/Makefile.in 2 - index 2758648e6..f305a12b0 100644 3 - --- a/libdm/Makefile.in 4 - +++ b/libdm/Makefile.in 5 - @@ -47,7 +47,6 @@ endif 6 - 7 - LIB_SHARED = $(interface)/libdevmapper.$(LIB_SUFFIX) 8 - LIB_VERSION = $(LIB_VERSION_DM) 9 - -TARGETS = libdevmapper.$(LIB_SUFFIX) libdevmapper.$(LIB_SUFFIX).$(LIB_VERSION) .symver_check 10 - 11 - CFLOW_LIST = $(SOURCES) 12 - CFLOW_LIST_TARGET = libdevmapper.cflow 13 - diff --git a/libdm/make.tmpl.in b/libdm/make.tmpl.in 14 - index a731687c2..9366cdf1c 100644 15 - --- a/libdm/make.tmpl.in 16 - +++ b/libdm/make.tmpl.in 17 - @@ -314,7 +314,7 @@ SUBDIRS.cflow := $(SUBDIRS:=.cflow) 18 - SUBDIRS.clean := $(SUBDIRS:=.clean) 19 - SUBDIRS.distclean := $(SUBDIRS:=.distclean) 20 - 21 - -TARGETS += $(LIB_SHARED) $(LIB_STATIC) 22 - +TARGETS += $(LIB_STATIC) 23 - 24 - all: $(SUBDIRS) $(TARGETS) 25 - 26 - @@ -431,7 +431,6 @@ DEFS+=-D_FILE_OFFSET_BITS=64 27 - 28 - ifneq (,$(LIB_SHARED)) 29 - 30 - -TARGETS += $(LIB_SHARED).$(LIB_VERSION) 31 - $(LIB_SHARED).$(LIB_VERSION): $(OBJECTS) $(LDDEPS) 32 - @echo " [CC] $@" 33 - ifeq ("@LIB_SUFFIX@","so") 34 - diff --git a/make.tmpl.in b/make.tmpl.in 35 - index b73176f5a..6100d0dfd 100644 36 - --- a/make.tmpl.in 37 - +++ b/make.tmpl.in 38 - @@ -368,7 +368,7 @@ SUBDIRS.cflow := $(SUBDIRS:=.cflow) 39 - SUBDIRS.clean := $(SUBDIRS:=.clean) 40 - SUBDIRS.distclean := $(SUBDIRS:=.distclean) 41 - 42 - -TARGETS += $(LIB_SHARED) $(LIB_STATIC) 43 - +TARGETS += $(LIB_STATIC) 44 - 45 - INTERNAL_LIBS = \ 46 - $(top_builddir)/libdaemon/client/libdaemonclient.a \
+13 -4
pkgs/os-specific/linux/pam/default.nix
··· 7 7 8 8 stdenv.mkDerivation rec { 9 9 pname = "linux-pam"; 10 - version = "1.5.2"; 10 + version = "1.5.3"; 11 11 12 12 src = fetchurl { 13 - url = "https://github.com/linux-pam/linux-pam/releases/download/v${version}/Linux-PAM-${version}.tar.xz"; 14 - sha256 = "sha256-5OxxMakdpEUSV0Jo9JPG2MoQXIcJFpG46bVspoXU+U0="; 13 + url = "https://github.com/linux-pam/linux-pam/releases/download/v${version}/Linux-PAM-${version}.tar.xz"; 14 + hash = "sha256-esS1D+7gBKn6iPHf0tL6c4qCiWdjBQzXc7PFSwqBgoM="; 15 15 }; 16 16 17 17 patches = [ ··· 24 24 url = "https://github.com/linux-pam/linux-pam/commit/77bd338125cde583ecdfb9fd69619bcd2baf15c2.patch"; 25 25 hash = "sha256-tlc9RcLZpEH315NFD4sdN9yOco8qhC6+bszl4OHm+AI="; 26 26 }) 27 - ]; 27 + ] 28 + ++ lib.optional stdenv.hostPlatform.isMusl (fetchpatch { 29 + name = "missing-termio.patch"; 30 + url = "https://github.com/linux-pam/linux-pam/commit/5374f677e4cae669eb9accf2449178b602e8a40a.patch"; 31 + hash = "sha256-b6n8f16ETSNj5h+5/Yhn32XMfVO8xEnZRRhw+nuLP/8="; 32 + }) 33 + ; 28 34 29 35 # Case-insensitivity workaround for https://github.com/linux-pam/linux-pam/issues/569 30 36 postPatch = if stdenv.buildPlatform.isDarwin && stdenv.buildPlatform != stdenv.hostPlatform then '' ··· 57 63 configureFlags = [ 58 64 "--includedir=${placeholder "out"}/include/security" 59 65 "--enable-sconfigdir=/etc/security" 66 + # The module is deprecated. We re-enable it explicitly until NixOS 67 + # module stops using it. 68 + "--enable-lastlog" 60 69 ]; 61 70 62 71 installFlags = [
+28
pkgs/os-specific/linux/rust-out-of-tree-module/default.nix
··· 1 + { lib, fetchFromGitHub, kernel }: 2 + kernel.stdenv.mkDerivation { 3 + name = "rust-out-of-tree-module"; 4 + 5 + src = fetchFromGitHub { 6 + owner = "Rust-for-linux"; 7 + repo = "rust-out-of-tree-module"; 8 + 9 + rev = "7addf9dafba795524f6179a557f7272ecbe1b165"; 10 + hash = "sha256-Bj7WonZ499W/FajbxjM7yBkU9iTxTW7CrRbCSzWbsSc="; 11 + }; 12 + 13 + nativeBuildInputs = kernel.moduleBuildDependencies; 14 + makeFlags = kernel.makeFlags ++ [ "KDIR=${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" ]; 15 + 16 + installFlags = [ "INSTALL_MOD_PATH=${placeholder "out"}" ]; 17 + installTargets = [ "modules_install" ]; 18 + 19 + meta = { 20 + broken = !kernel.withRust; 21 + description = "A basic template for an out-of-tree Linux kernel module written in Rust"; 22 + homepage = "https://github.com/Rust-for-Linux/rust-out-of-tree-module"; 23 + license = lib.licenses.gpl2Only; 24 + maintainers = [ lib.maintainers.blitz ]; 25 + platforms = lib.platforms.linux; 26 + }; 27 + 28 + }
+2 -2
pkgs/os-specific/linux/systemd/0001-Start-device-units-for-uninitialised-encrypted-devic.patch
··· 13 13 1 file changed, 4 deletions(-) 14 14 15 15 diff --git a/rules.d/99-systemd.rules.in b/rules.d/99-systemd.rules.in 16 - index c0defc31de..8f80235731 100644 16 + index 0d68f31d36..6b52f7ed4b 100644 17 17 --- a/rules.d/99-systemd.rules.in 18 18 +++ b/rules.d/99-systemd.rules.in 19 - @@ -20,10 +20,6 @@ SUBSYSTEM=="block", TAG+="systemd" 19 + @@ -22,10 +22,6 @@ SUBSYSTEM=="block", TAG+="systemd" 20 20 SUBSYSTEM=="block", ENV{DM_SUSPENDED}=="1", IMPORT{db}="SYSTEMD_READY", GOTO="systemd_end" 21 21 SUBSYSTEM=="block", ACTION=="add", ENV{DM_UDEV_DISABLE_OTHER_RULES_FLAG}=="1", ENV{SYSTEMD_READY}="0" 22 22
+3 -3
pkgs/os-specific/linux/systemd/0002-Don-t-try-to-unmount-nix-or-nix-store.patch
··· 14 14 2 files changed, 6 insertions(+), 2 deletions(-) 15 15 16 16 diff --git a/src/shared/fstab-util.c b/src/shared/fstab-util.c 17 - index 4ffec25c75..b99031c54e 100644 17 + index 55e76b6e16..015a608035 100644 18 18 --- a/src/shared/fstab-util.c 19 19 +++ b/src/shared/fstab-util.c 20 - @@ -43,6 +43,8 @@ bool fstab_is_extrinsic(const char *mount, const char *opts) { 20 + @@ -66,6 +66,8 @@ bool fstab_is_extrinsic(const char *mount, const char *opts) { 21 21 /* Don't bother with the OS data itself */ 22 22 if (PATH_IN_SET(mount, 23 23 "/", ··· 27 27 "/etc")) 28 28 return true; 29 29 diff --git a/src/shutdown/umount.c b/src/shutdown/umount.c 30 - index 1586c2e214..fcae95f824 100644 30 + index 1a9b99d761..04ef9af1ea 100644 31 31 --- a/src/shutdown/umount.c 32 32 +++ b/src/shutdown/umount.c 33 33 @@ -170,8 +170,10 @@ int mount_points_list_get(const char *mountinfo, MountPoint **head) {
+3 -3
pkgs/os-specific/linux/systemd/0003-Fix-NixOS-containers.patch
··· 10 10 1 file changed, 2 insertions(+) 11 11 12 12 diff --git a/src/nspawn/nspawn.c b/src/nspawn/nspawn.c 13 - index e170958fc5..898a674631 100644 13 + index 38196ef3d6..57d1750b00 100644 14 14 --- a/src/nspawn/nspawn.c 15 15 +++ b/src/nspawn/nspawn.c 16 - @@ -5648,6 +5648,7 @@ static int run(int argc, char *argv[]) { 16 + @@ -5602,6 +5602,7 @@ static int run(int argc, char *argv[]) { 17 17 goto finish; 18 18 } 19 19 } else { ··· 21 21 _cleanup_free_ char *p = NULL; 22 22 23 23 if (arg_pivot_root_new) 24 - @@ -5662,6 +5663,7 @@ static int run(int argc, char *argv[]) { 24 + @@ -5618,6 +5619,7 @@ static int run(int argc, char *argv[]) { 25 25 "Directory %s doesn't look like it has an OS tree (/usr/ directory is missing). Refusing.", arg_directory); 26 26 goto finish; 27 27 }
+14 -13
pkgs/os-specific/linux/systemd/0004-Add-some-NixOS-specific-unit-directories.patch
··· 11 11 12 12 Original-Author: Eelco Dolstra <eelco.dolstra@logicblox.com> 13 13 --- 14 - src/basic/path-lookup.c | 17 ++--------------- 14 + src/basic/path-lookup.c | 18 ++---------------- 15 15 src/core/systemd.pc.in | 8 ++++---- 16 - 2 files changed, 6 insertions(+), 19 deletions(-) 16 + 2 files changed, 6 insertions(+), 20 deletions(-) 17 17 18 18 diff --git a/src/basic/path-lookup.c b/src/basic/path-lookup.c 19 - index 7d158a8295..f9bd62b631 100644 19 + index 4e3d59fc56..0d18b9a2d0 100644 20 20 --- a/src/basic/path-lookup.c 21 21 +++ b/src/basic/path-lookup.c 22 22 @@ -92,11 +92,7 @@ int xdg_user_data_dir(char **ret, const char *suffix) { ··· 31 31 NULL 32 32 }; 33 33 34 - @@ -617,15 +613,13 @@ int lookup_paths_init( 34 + @@ -613,16 +609,13 @@ int lookup_paths_init( 35 35 persistent_config, 36 36 SYSTEM_CONFIG_UNIT_DIR, 37 37 "/etc/systemd/system", ··· 44 44 - "/usr/local/lib/systemd/system", 45 45 SYSTEM_DATA_UNIT_DIR, 46 46 - "/usr/lib/systemd/system", 47 + - /* To be used ONLY for images which might be legacy split-usr */ 47 48 - STRV_IFNOTNULL(flags & LOOKUP_PATHS_SPLIT_USR ? "/lib/systemd/system" : NULL), 48 49 STRV_IFNOTNULL(generator_late)); 49 50 break; 50 51 51 - @@ -641,14 +635,11 @@ int lookup_paths_init( 52 + @@ -638,14 +631,11 @@ int lookup_paths_init( 52 53 persistent_config, 53 54 USER_CONFIG_UNIT_DIR, 54 55 "/etc/systemd/user", ··· 64 65 STRV_IFNOTNULL(generator_late)); 65 66 break; 66 67 67 - @@ -808,7 +799,6 @@ char **generator_binary_paths(RuntimeScope scope) { 68 + @@ -805,7 +795,6 @@ char **generator_binary_paths(RuntimeScope scope) { 68 69 case RUNTIME_SCOPE_SYSTEM: 69 70 add = strv_new("/run/systemd/system-generators", 70 71 "/etc/systemd/system-generators", ··· 72 73 SYSTEM_GENERATOR_DIR); 73 74 break; 74 75 75 - @@ -816,7 +806,6 @@ char **generator_binary_paths(RuntimeScope scope) { 76 + @@ -813,7 +802,6 @@ char **generator_binary_paths(RuntimeScope scope) { 76 77 case RUNTIME_SCOPE_USER: 77 78 add = strv_new("/run/systemd/user-generators", 78 79 "/etc/systemd/user-generators", ··· 80 81 USER_GENERATOR_DIR); 81 82 break; 82 83 83 - @@ -855,14 +844,12 @@ char **env_generator_binary_paths(RuntimeScope runtime_scope) { 84 + @@ -852,14 +840,12 @@ char **env_generator_binary_paths(RuntimeScope runtime_scope) { 84 85 case RUNTIME_SCOPE_SYSTEM: 85 86 add = strv_new("/run/systemd/system-environment-generators", 86 87 "/etc/systemd/system-environment-generators", ··· 96 97 break; 97 98 98 99 diff --git a/src/core/systemd.pc.in b/src/core/systemd.pc.in 99 - index 693433b34b..5932a21b5b 100644 100 + index f3b85b0190..8ae544b495 100644 100 101 --- a/src/core/systemd.pc.in 101 102 +++ b/src/core/systemd.pc.in 102 - @@ -38,10 +38,10 @@ systemdsystemconfdir=${systemd_system_conf_dir} 103 + @@ -43,10 +43,10 @@ systemdsystemconfdir=${systemd_system_conf_dir} 103 104 systemd_user_conf_dir=${sysconfdir}/systemd/user 104 105 systemduserconfdir=${systemd_user_conf_dir} 105 106 ··· 111 112 +systemd_user_unit_path=${systemd_user_conf_dir}:/etc/systemd/user:/nix/var/nix/profiles/default/lib/systemd/user:/run/systemd/user:${systemduserunitdir} 112 113 systemduserunitpath=${systemd_user_unit_path} 113 114 114 - systemd_system_generator_dir=${root_prefix}/lib/systemd/system-generators 115 - @@ -50,10 +50,10 @@ systemdsystemgeneratordir=${systemd_system_generator_dir} 115 + systemd_system_generator_dir=${prefix}/lib/systemd/system-generators 116 + @@ -55,10 +55,10 @@ systemdsystemgeneratordir=${systemd_system_generator_dir} 116 117 systemd_user_generator_dir=${prefix}/lib/systemd/user-generators 117 118 systemdusergeneratordir=${systemd_user_generator_dir} 118 119 ··· 124 125 +systemd_user_generator_path=/run/systemd/user-generators:/etc/systemd/user-generators:${systemd_user_generator_dir} 125 126 systemdusergeneratorpath=${systemd_user_generator_path} 126 127 127 - systemd_sleep_dir=${root_prefix}/lib/systemd/system-sleep 128 + systemd_sleep_dir=${prefix}/lib/systemd/system-sleep
+2 -2
pkgs/os-specific/linux/systemd/0005-Get-rid-of-a-useless-message-in-user-sessions.patch
··· 13 13 1 file changed, 2 insertions(+), 1 deletion(-) 14 14 15 15 diff --git a/src/core/manager.c b/src/core/manager.c 16 - index 22ec6e79b1..771e8e7f16 100644 16 + index e61ebee253..22cc5cc843 100644 17 17 --- a/src/core/manager.c 18 18 +++ b/src/core/manager.c 19 - @@ -1559,7 +1559,8 @@ static unsigned manager_dispatch_stop_when_bound_queue(Manager *m) { 19 + @@ -1562,7 +1562,8 @@ static unsigned manager_dispatch_stop_when_bound_queue(Manager *m) { 20 20 if (!unit_is_bound_by_inactive(u, &culprit)) 21 21 continue; 22 22
+6 -6
pkgs/os-specific/linux/systemd/0006-hostnamed-localed-timedated-disable-methods-that-cha.patch
··· 11 11 3 files changed, 25 insertions(+) 12 12 13 13 diff --git a/src/hostname/hostnamed.c b/src/hostname/hostnamed.c 14 - index 9ef45f8e75..99b1ec2e36 100644 14 + index e1d53f2395..a224e6dadc 100644 15 15 --- a/src/hostname/hostnamed.c 16 16 +++ b/src/hostname/hostnamed.c 17 17 @@ -1053,6 +1053,9 @@ static int method_set_static_hostname(sd_bus_message *m, void *userdata, sd_bus_ ··· 35 35 36 36 context_read_machine_info(c); 37 37 diff --git a/src/locale/localed.c b/src/locale/localed.c 38 - index f544a73580..ce00c262cc 100644 38 + index 5d96237fae..9af35cd29c 100644 39 39 --- a/src/locale/localed.c 40 40 +++ b/src/locale/localed.c 41 41 @@ -229,6 +229,9 @@ static int method_set_locale(sd_bus_message *m, void *userdata, sd_bus_error *er ··· 69 69 70 70 r = x11_context_verify_and_warn(&in, LOG_ERR, error); 71 71 diff --git a/src/timedate/timedated.c b/src/timedate/timedated.c 72 - index ad1d492d6b..331af34505 100644 72 + index c7be30f563..50f8aa8675 100644 73 73 --- a/src/timedate/timedated.c 74 74 +++ b/src/timedate/timedated.c 75 - @@ -665,6 +665,10 @@ static int method_set_timezone(sd_bus_message *m, void *userdata, sd_bus_error * 75 + @@ -659,6 +659,10 @@ static int method_set_timezone(sd_bus_message *m, void *userdata, sd_bus_error * 76 76 if (r < 0) 77 77 return r; 78 78 ··· 83 83 if (!timezone_is_valid(z, LOG_DEBUG)) 84 84 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid or not installed time zone '%s'", z); 85 85 86 - @@ -743,6 +747,9 @@ static int method_set_local_rtc(sd_bus_message *m, void *userdata, sd_bus_error 86 + @@ -737,6 +741,9 @@ static int method_set_local_rtc(sd_bus_message *m, void *userdata, sd_bus_error 87 87 if (r < 0) 88 88 return r; 89 89 ··· 93 93 if (lrtc == c->local_rtc && !fix_system) 94 94 return sd_bus_reply_method_return(m, NULL); 95 95 96 - @@ -923,6 +930,9 @@ static int method_set_ntp(sd_bus_message *m, void *userdata, sd_bus_error *error 96 + @@ -917,6 +924,9 @@ static int method_set_ntp(sd_bus_message *m, void *userdata, sd_bus_error *error 97 97 if (r < 0) 98 98 return r; 99 99
-24
pkgs/os-specific/linux/systemd/0007-Fix-hwdb-paths.patch
··· 1 - From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001 2 - From: Nikolay Amiantov <ab@fmap.me> 3 - Date: Thu, 7 Jul 2016 02:47:13 +0300 4 - Subject: [PATCH] Fix hwdb paths 5 - 6 - Patch by vcunat. 7 - --- 8 - src/libsystemd/sd-hwdb/hwdb-internal.h | 6 +----- 9 - 1 file changed, 1 insertion(+), 5 deletions(-) 10 - 11 - diff --git a/src/libsystemd/sd-hwdb/hwdb-internal.h b/src/libsystemd/sd-hwdb/hwdb-internal.h 12 - index 5302679a62..39e59a527f 100644 13 - --- a/src/libsystemd/sd-hwdb/hwdb-internal.h 14 - +++ b/src/libsystemd/sd-hwdb/hwdb-internal.h 15 - @@ -83,8 +83,4 @@ struct trie_value_entry2_f { 16 - } _packed_; 17 - 18 - #define hwdb_bin_paths \ 19 - - "/etc/systemd/hwdb/hwdb.bin\0" \ 20 - - "/etc/udev/hwdb.bin\0" \ 21 - - "/usr/lib/systemd/hwdb/hwdb.bin\0" \ 22 - - _CONF_PATHS_SPLIT_USR_NULSTR("systemd/hwdb/hwdb.bin") \ 23 - - UDEVLIBEXECDIR "/hwdb.bin\0" 24 - + "/etc/udev/hwdb.bin\0"
+13 -13
pkgs/os-specific/linux/systemd/0008-Change-usr-share-zoneinfo-to-etc-zoneinfo.patch pkgs/os-specific/linux/systemd/0007-Change-usr-share-zoneinfo-to-etc-zoneinfo.patch
··· 35 35 <literal>Etc/UTC</literal>. The resulting link should lead to the 36 36 corresponding binary 37 37 diff --git a/src/basic/time-util.c b/src/basic/time-util.c 38 - index 1db630003a..31744c3e68 100644 38 + index f9014dc560..3ee0363369 100644 39 39 --- a/src/basic/time-util.c 40 40 +++ b/src/basic/time-util.c 41 - @@ -1350,7 +1350,7 @@ static int get_timezones_from_zone1970_tab(char ***ret) { 41 + @@ -1412,7 +1412,7 @@ static int get_timezones_from_zone1970_tab(char ***ret) { 42 42 43 43 assert(ret); 44 44 ··· 47 47 if (!f) 48 48 return -errno; 49 49 50 - @@ -1391,7 +1391,7 @@ static int get_timezones_from_tzdata_zi(char ***ret) { 50 + @@ -1453,7 +1453,7 @@ static int get_timezones_from_tzdata_zi(char ***ret) { 51 51 52 52 assert(ret); 53 53 ··· 56 56 if (!f) 57 57 return -errno; 58 58 59 - @@ -1503,7 +1503,7 @@ int verify_timezone(const char *name, int log_level) { 59 + @@ -1565,7 +1565,7 @@ int verify_timezone(const char *name, int log_level) { 60 60 if (p - name >= PATH_MAX) 61 61 return -ENAMETOOLONG; 62 62 ··· 65 65 66 66 fd = open(t, O_RDONLY|O_CLOEXEC); 67 67 if (fd < 0) 68 - @@ -1563,7 +1563,7 @@ int get_timezone(char **ret) { 68 + @@ -1625,7 +1625,7 @@ int get_timezone(char **ret) { 69 69 if (r < 0) 70 70 return r; /* returns EINVAL if not a symlink */ 71 71 ··· 75 75 return -EINVAL; 76 76 77 77 diff --git a/src/firstboot/firstboot.c b/src/firstboot/firstboot.c 78 - index 1956ab3b13..9ef356f8af 100644 78 + index f77a5f6266..63bac85b29 100644 79 79 --- a/src/firstboot/firstboot.c 80 80 +++ b/src/firstboot/firstboot.c 81 - @@ -630,7 +630,7 @@ static int process_timezone(int rfd) { 81 + @@ -632,7 +632,7 @@ static int process_timezone(int rfd) { 82 82 if (isempty(arg_timezone)) 83 83 return 0; 84 84 ··· 88 88 r = symlinkat_atomic_full(e, pfd, f, /* make_relative= */ false); 89 89 if (r < 0) 90 90 diff --git a/src/nspawn/nspawn.c b/src/nspawn/nspawn.c 91 - index 898a674631..c41a416e04 100644 91 + index e48ebe8342..41796f3358 100644 92 92 --- a/src/nspawn/nspawn.c 93 93 +++ b/src/nspawn/nspawn.c 94 - @@ -1924,8 +1924,8 @@ int userns_mkdir(const char *root, const char *path, mode_t mode, uid_t uid, gid 94 + @@ -1845,8 +1845,8 @@ int userns_mkdir(const char *root, const char *path, mode_t mode, uid_t uid, gid 95 95 static const char *timezone_from_path(const char *path) { 96 96 return PATH_STARTSWITH_SET( 97 97 path, ··· 103 103 104 104 static bool etc_writable(void) { 105 105 diff --git a/src/timedate/timedated.c b/src/timedate/timedated.c 106 - index 331af34505..722c4b5b4f 100644 106 + index 50f8aa8675..aff156ab42 100644 107 107 --- a/src/timedate/timedated.c 108 108 +++ b/src/timedate/timedated.c 109 - @@ -282,7 +282,7 @@ static int context_read_data(Context *c) { 109 + @@ -276,7 +276,7 @@ static int context_read_data(Context *c) { 110 110 111 111 r = get_timezone(&t); 112 112 if (r == -EINVAL) ··· 115 115 else if (r < 0) 116 116 log_warning_errno(r, "Failed to get target of /etc/localtime: %m"); 117 117 118 - @@ -306,7 +306,7 @@ static int context_write_data_timezone(Context *c) { 118 + @@ -300,7 +300,7 @@ static int context_write_data_timezone(Context *c) { 119 119 120 120 if (isempty(c->zone) || streq(c->zone, "UTC")) { 121 121 ··· 124 124 125 125 if (unlink("/etc/localtime") < 0 && errno != ENOENT) 126 126 return -errno; 127 - @@ -314,9 +314,9 @@ static int context_write_data_timezone(Context *c) { 127 + @@ -308,9 +308,9 @@ static int context_write_data_timezone(Context *c) { 128 128 return 0; 129 129 } 130 130
+1 -1
pkgs/os-specific/linux/systemd/0009-localectl-use-etc-X11-xkb-for-list-x11.patch pkgs/os-specific/linux/systemd/0008-localectl-use-etc-X11-xkb-for-list-x11.patch
··· 10 10 1 file changed, 1 insertion(+), 1 deletion(-) 11 11 12 12 diff --git a/src/locale/localectl.c b/src/locale/localectl.c 13 - index d8db9d9d22..4601bb5431 100644 13 + index 32354027f1..1d231f1afc 100644 14 14 --- a/src/locale/localectl.c 15 15 +++ b/src/locale/localectl.c 16 16 @@ -297,7 +297,7 @@ static int list_x11_keymaps(int argc, char **argv, void *userdata) {
-23
pkgs/os-specific/linux/systemd/0010-build-don-t-create-statedir-and-don-t-touch-prefixdi.patch
··· 1 - From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001 2 - From: Franz Pletz <fpletz@fnordicwalking.de> 3 - Date: Sun, 11 Feb 2018 04:37:44 +0100 4 - Subject: [PATCH] build: don't create statedir and don't touch prefixdir 5 - 6 - --- 7 - meson.build | 3 --- 8 - 1 file changed, 3 deletions(-) 9 - 10 - diff --git a/meson.build b/meson.build 11 - index 395eca1943..082cd748bb 100644 12 - --- a/meson.build 13 - +++ b/meson.build 14 - @@ -4707,9 +4707,6 @@ install_data('LICENSE.GPL2', 15 - install_subdir('LICENSES', 16 - install_dir : docdir) 17 - 18 - -meson.add_install_script('sh', '-c', mkdir_p.format(systemdstatedir)) 19 - -meson.add_install_script('sh', '-c', 'touch $DESTDIR@0@'.format(prefixdir)) 20 - - 21 - ############################################################ 22 - 23 - # Ensure that changes to the docs/ directory do not break the
+8 -8
pkgs/os-specific/linux/systemd/0011-add-rootprefix-to-lookup-dir-paths.patch pkgs/os-specific/linux/systemd/0009-add-rootprefix-to-lookup-dir-paths.patch
··· 12 12 1 file changed, 4 insertions(+), 2 deletions(-) 13 13 14 14 diff --git a/src/basic/constants.h b/src/basic/constants.h 15 - index 3f96786da9..6e8fb40c08 100644 15 + index 6bb5f3c281..678d13737d 100644 16 16 --- a/src/basic/constants.h 17 17 +++ b/src/basic/constants.h 18 - @@ -74,13 +74,15 @@ 18 + @@ -65,13 +65,15 @@ 19 + "/etc/" n "\0" \ 19 20 "/run/" n "\0" \ 20 21 "/usr/local/lib/" n "\0" \ 21 - "/usr/lib/" n "\0" \ 22 - - _CONF_PATHS_SPLIT_USR_NULSTR(n) 23 - + _CONF_PATHS_SPLIT_USR_NULSTR(n) \ 24 - + ROOTPREFIX "/lib/" n "\0" 22 + - "/usr/lib/" n "\0" 23 + + "/usr/lib/" n "\0" \ 24 + + PREFIX "/lib/" n "\0" 25 25 26 26 #define CONF_PATHS_USR(n) \ 27 27 "/etc/" n, \ ··· 29 29 "/usr/local/lib/" n, \ 30 30 - "/usr/lib/" n 31 31 + "/usr/lib/" n, \ 32 - + ROOTPREFIX "/lib/" n 32 + + PREFIX "/lib/" n 33 33 34 34 #define CONF_PATHS(n) \ 35 - CONF_PATHS_USR(n) \ 35 + CONF_PATHS_USR(n)
+28
pkgs/os-specific/linux/systemd/0012-path-util.h-add-placeholder-for-DEFAULT_PATH_NORMAL.patch
··· 1 + From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001 2 + From: Florian Klink <flokli@flokli.de> 3 + Date: Sun, 8 Mar 2020 01:05:54 +0100 4 + Subject: [PATCH] path-util.h: add placeholder for DEFAULT_PATH_NORMAL 5 + 6 + This will be the $PATH used to lookup ExecStart= etc. options, which 7 + systemd itself uses extensively. 8 + --- 9 + src/basic/path-util.h | 6 +++--- 10 + 1 file changed, 3 insertions(+), 3 deletions(-) 11 + 12 + diff --git a/src/basic/path-util.h b/src/basic/path-util.h 13 + index 6d943e967f..d4380aa7e3 100644 14 + --- a/src/basic/path-util.h 15 + +++ b/src/basic/path-util.h 16 + @@ -25,9 +25,9 @@ 17 + # define PATH_SBIN_BIN_NULSTR(x) PATH_NORMAL_SBIN_BIN_NULSTR(x) 18 + #endif 19 + 20 + -#define DEFAULT_PATH PATH_SBIN_BIN("/usr/local/") ":" PATH_SBIN_BIN("/usr/") 21 + -#define DEFAULT_PATH_NULSTR PATH_SBIN_BIN_NULSTR("/usr/local/") PATH_SBIN_BIN_NULSTR("/usr/") 22 + -#define DEFAULT_PATH_COMPAT PATH_SPLIT_SBIN_BIN("/usr/local/") ":" PATH_SPLIT_SBIN_BIN("/usr/") ":" PATH_SPLIT_SBIN_BIN("/") 23 + +#define DEFAULT_PATH "@defaultPathNormal@" 24 + +#define DEFAULT_PATH_NULSTR "@defaultPathNormal@\0" 25 + +#define DEFAULT_PATH_COMPAT DEFAULT_PATH 26 + 27 + #ifndef DEFAULT_USER_PATH 28 + # define DEFAULT_USER_PATH DEFAULT_PATH
+2 -2
pkgs/os-specific/linux/systemd/0012-systemd-shutdown-execute-scripts-in-etc-systemd-syst.patch pkgs/os-specific/linux/systemd/0010-systemd-shutdown-execute-scripts-in-etc-systemd-syst.patch
··· 10 10 1 file changed, 1 insertion(+) 11 11 12 12 diff --git a/src/shutdown/shutdown.c b/src/shutdown/shutdown.c 13 - index 8395bb429d..14fbc85bb4 100644 13 + index b976b7d8cf..b1c02df6fd 100644 14 14 --- a/src/shutdown/shutdown.c 15 15 +++ b/src/shutdown/shutdown.c 16 - @@ -334,6 +334,7 @@ static void init_watchdog(void) { 16 + @@ -336,6 +336,7 @@ static void init_watchdog(void) { 17 17 int main(int argc, char *argv[]) { 18 18 static const char* const dirs[] = { 19 19 SYSTEM_SHUTDOWN_PATH,
+2 -2
pkgs/os-specific/linux/systemd/0013-systemd-sleep-execute-scripts-in-etc-systemd-system-.patch pkgs/os-specific/linux/systemd/0011-systemd-sleep-execute-scripts-in-etc-systemd-system-.patch
··· 9 9 1 file changed, 1 insertion(+) 10 10 11 11 diff --git a/src/sleep/sleep.c b/src/sleep/sleep.c 12 - index de1f6c7ec1..d0cdebd80a 100644 12 + index 21af3e9e52..6d096e3c78 100644 13 13 --- a/src/sleep/sleep.c 14 14 +++ b/src/sleep/sleep.c 15 - @@ -224,6 +224,7 @@ static int execute( 15 + @@ -215,6 +215,7 @@ static int execute( 16 16 }; 17 17 static const char* const dirs[] = { 18 18 SYSTEM_SLEEP_PATH,
-30
pkgs/os-specific/linux/systemd/0014-path-util.h-add-placeholder-for-DEFAULT_PATH_NORMAL.patch
··· 1 - From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001 2 - From: Florian Klink <flokli@flokli.de> 3 - Date: Sun, 8 Mar 2020 01:05:54 +0100 4 - Subject: [PATCH] path-util.h: add placeholder for DEFAULT_PATH_NORMAL 5 - 6 - This will be the $PATH used to lookup ExecStart= etc. options, which 7 - systemd itself uses extensively. 8 - --- 9 - src/basic/path-util.h | 6 +++--- 10 - 1 file changed, 3 insertions(+), 3 deletions(-) 11 - 12 - diff --git a/src/basic/path-util.h b/src/basic/path-util.h 13 - index 97175bee11..3839704901 100644 14 - --- a/src/basic/path-util.h 15 - +++ b/src/basic/path-util.h 16 - @@ -25,11 +25,11 @@ 17 - # define PATH_SBIN_BIN_NULSTR(x) PATH_NORMAL_SBIN_BIN_NULSTR(x) 18 - #endif 19 - 20 - -#define DEFAULT_PATH_NORMAL PATH_SBIN_BIN("/usr/local/") ":" PATH_SBIN_BIN("/usr/") 21 - -#define DEFAULT_PATH_NORMAL_NULSTR PATH_SBIN_BIN_NULSTR("/usr/local/") PATH_SBIN_BIN_NULSTR("/usr/") 22 - +#define DEFAULT_PATH_NORMAL "@defaultPathNormal@" 23 - +#define DEFAULT_PATH_NORMAL_NULSTR "@defaultPathNormal@\0" 24 - #define DEFAULT_PATH_SPLIT_USR DEFAULT_PATH_NORMAL ":" PATH_SBIN_BIN("/") 25 - #define DEFAULT_PATH_SPLIT_USR_NULSTR DEFAULT_PATH_NORMAL_NULSTR PATH_SBIN_BIN_NULSTR("/") 26 - -#define DEFAULT_PATH_COMPAT PATH_SPLIT_SBIN_BIN("/usr/local/") ":" PATH_SPLIT_SBIN_BIN("/usr/") ":" PATH_SPLIT_SBIN_BIN("/") 27 - +#define DEFAULT_PATH_COMPAT DEFAULT_PATH_NORMAL 28 - 29 - #if HAVE_SPLIT_USR 30 - # define DEFAULT_PATH DEFAULT_PATH_SPLIT_USR
-30
pkgs/os-specific/linux/systemd/0015-pkg-config-derive-prefix-from-prefix.patch
··· 1 - From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001 2 - From: =?UTF-8?q?J=C3=B6rg=20Thalheim?= <joerg@thalheim.io> 3 - Date: Sun, 6 Dec 2020 08:34:19 +0100 4 - Subject: [PATCH] pkg-config: derive prefix from --prefix 5 - 6 - Point prefix to the one configured, instead of `/usr` `systemd` has limited 7 - support for making the pkgconfig prefix overridable, and interpolates those 8 - values later down. 9 - 10 - So we only need to patch this one value to get the correct paths. 11 - See systemd/systemd@bc4e6e27922a2873985ab9367d79fb099f70b505 for details. 12 - 13 - Co-Authored-By: Florian Klink <flokli@flokli.de> 14 - --- 15 - src/core/systemd.pc.in | 2 +- 16 - 1 file changed, 1 insertion(+), 1 deletion(-) 17 - 18 - diff --git a/src/core/systemd.pc.in b/src/core/systemd.pc.in 19 - index 5932a21b5b..20bf8e316d 100644 20 - --- a/src/core/systemd.pc.in 21 - +++ b/src/core/systemd.pc.in 22 - @@ -11,7 +11,7 @@ 23 - # considered deprecated (though there is no plan to remove them). New names 24 - # shall have underscores. 25 - 26 - -prefix=/usr 27 - +prefix={{PREFIX}} 28 - root_prefix={{ROOTPREFIX_NOSLASH}} 29 - rootprefix=${root_prefix} 30 - sysconf_dir={{SYSCONF_DIR}}
+2 -2
pkgs/os-specific/linux/systemd/0016-inherit-systemd-environment-when-calling-generators.patch pkgs/os-specific/linux/systemd/0013-inherit-systemd-environment-when-calling-generators.patch
··· 16 16 1 file changed, 8 insertions(+) 17 17 18 18 diff --git a/src/core/manager.c b/src/core/manager.c 19 - index 771e8e7f16..acf3ead8d7 100644 19 + index 22cc5cc843..5dc7d4504f 100644 20 20 --- a/src/core/manager.c 21 21 +++ b/src/core/manager.c 22 - @@ -3899,9 +3899,17 @@ static int build_generator_environment(Manager *m, char ***ret) { 22 + @@ -3914,9 +3914,17 @@ static int build_generator_environment(Manager *m, char ***ret) { 23 23 * adjust generated units to that. Let's pass down some bits of information that are easy for us to 24 24 * determine (but a bit harder for generator scripts to determine), as environment variables. */ 25 25
+7 -8
pkgs/os-specific/linux/systemd/0017-core-don-t-taint-on-unmerged-usr.patch pkgs/os-specific/linux/systemd/0014-core-don-t-taint-on-unmerged-usr.patch
··· 13 13 14 14 See also: https://github.com/systemd/systemd/issues/24191 15 15 --- 16 - src/core/manager.c | 4 ---- 17 - 1 file changed, 4 deletions(-) 16 + src/core/manager.c | 3 --- 17 + 1 file changed, 3 deletions(-) 18 18 19 19 diff --git a/src/core/manager.c b/src/core/manager.c 20 - index acf3ead8d7..bdbab16829 100644 20 + index 5dc7d4504f..6208c9aa31 100644 21 21 --- a/src/core/manager.c 22 22 +++ b/src/core/manager.c 23 - @@ -4754,10 +4754,6 @@ char* manager_taint_string(const Manager *m) { 24 - if (m->taint_usr) 25 - stage[n++] = "split-usr"; 23 + @@ -4800,9 +4800,6 @@ char* manager_taint_string(const Manager *m) { 24 + const char* stage[12] = {}; 25 + size_t n = 0; 26 26 27 27 - _cleanup_free_ char *usrbin = NULL; 28 28 - if (readlink_malloc("/bin", &usrbin) < 0 || !PATH_IN_SET(usrbin, "usr/bin", "/usr/bin")) 29 29 - stage[n++] = "unmerged-usr"; 30 - - 30 + 31 31 if (access("/proc/cgroups", F_OK) < 0) 32 32 stage[n++] = "cgroups-missing"; 33 -
+21
pkgs/os-specific/linux/systemd/0017-meson.build-do-not-create-systemdstatedir.patch
··· 1 + From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001 2 + From: nikstur <nikstur@outlook.com> 3 + Date: Mon, 6 Nov 2023 22:51:38 +0100 4 + Subject: [PATCH] meson.build: do not create systemdstatedir 5 + 6 + --- 7 + meson.build | 1 - 8 + 1 file changed, 1 deletion(-) 9 + 10 + diff --git a/meson.build b/meson.build 11 + index 7419e2b0b0..c82a527976 100644 12 + --- a/meson.build 13 + +++ b/meson.build 14 + @@ -2497,7 +2497,6 @@ install_data('LICENSE.GPL2', 15 + install_subdir('LICENSES', 16 + install_dir : docdir) 17 + 18 + -install_emptydir(systemdstatedir) 19 + 20 + ############################################################ 21 +
+3 -3
pkgs/os-specific/linux/systemd/0018-tpm2_context_init-fix-driver-name-checking.patch pkgs/os-specific/linux/systemd/0015-tpm2_context_init-fix-driver-name-checking.patch
··· 27 27 1 file changed, 1 insertion(+), 1 deletion(-) 28 28 29 29 diff --git a/src/shared/tpm2-util.c b/src/shared/tpm2-util.c 30 - index ae8a8bc073..c284b244f8 100644 30 + index 5e07b88a89..8dd7315009 100644 31 31 --- a/src/shared/tpm2-util.c 32 32 +++ b/src/shared/tpm2-util.c 33 - @@ -582,7 +582,7 @@ int tpm2_context_new(const char *device, Tpm2Context **ret_context) { 33 + @@ -654,7 +654,7 @@ int tpm2_context_new(const char *device, Tpm2Context **ret_context) { 34 34 fn = strjoina("libtss2-tcti-", driver, ".so.0"); 35 35 36 36 /* Better safe than sorry, let's refuse strings that cannot possibly be valid driver early, before going to disk. */ 37 37 - if (!filename_is_valid(fn)) 38 38 + if (!path_is_valid(fn)) 39 - return log_error_errno(SYNTHETIC_ERRNO(EINVAL), "TPM2 driver name '%s' not valid, refusing.", driver); 39 + return log_debug_errno(SYNTHETIC_ERRNO(EINVAL), "TPM2 driver name '%s' not valid, refusing.", driver); 40 40 41 41 context->tcti_dl = dlopen(fn, RTLD_NOW);
+2 -2
pkgs/os-specific/linux/systemd/0019-systemctl-edit-suggest-systemdctl-edit-runtime-on-sy.patch pkgs/os-specific/linux/systemd/0016-systemctl-edit-suggest-systemdctl-edit-runtime-on-sy.patch
··· 30 30 1 file changed, 3 insertions(+) 31 31 32 32 diff --git a/src/systemctl/systemctl-edit.c b/src/systemctl/systemctl-edit.c 33 - index e3f25d52d5..81c9c6f6b7 100644 33 + index 367afa20f7..5777154d01 100644 34 34 --- a/src/systemctl/systemctl-edit.c 35 35 +++ b/src/systemctl/systemctl-edit.c 36 - @@ -323,6 +323,9 @@ int verb_edit(int argc, char *argv[], void *userdata) { 36 + @@ -322,6 +322,9 @@ int verb_edit(int argc, char *argv[], void *userdata) { 37 37 sd_bus *bus; 38 38 int r; 39 39
pkgs/os-specific/linux/systemd/0020-timesyncd-disable-NSCD-when-DNSSEC-validation-is-dis.patch pkgs/os-specific/linux/systemd/0018-timesyncd-disable-NSCD-when-DNSSEC-validation-is-dis.patch
+176 -141
pkgs/os-specific/linux/systemd/default.nix
··· 5 5 , nixosTests 6 6 , pkgsCross 7 7 , fetchFromGitHub 8 - , fetchpatch 9 8 , fetchzip 10 9 , buildPackages 11 10 , makeBinaryWrapper ··· 20 19 21 20 # glib is only used during tests (test-bus-gvariant, test-bus-marshal) 22 21 , glib 23 - , substituteAll 24 22 , gettext 25 23 , python3Packages 26 24 ··· 52 50 , intltool 53 51 , bzip2 54 52 , pcre2 55 - , e2fsprogs 56 53 , elfutils 57 54 , linuxHeaders ? stdenv.cc.libc.linuxHeaders 58 55 , gnutls ··· 68 65 , libmicrohttpd 69 66 , libfido2 70 67 , p11-kit 68 + , libpwquality 69 + , qrencode 71 70 72 71 # the (optional) BPF feature requires bpftool, libbpf, clang and llvm-strip to be available during build time. 73 72 # Only libbpf should be a runtime dependency. ··· 106 105 , withHostnamed ? true 107 106 , withHwdb ? true 108 107 , withImportd ? !stdenv.hostPlatform.isMusl 108 + , withIptables ? true 109 109 , withKmod ? true 110 110 , withLibBPF ? lib.versionAtLeast buildPackages.llvmPackages.clang.version "10.0" 111 111 && (stdenv.hostPlatform.isAarch -> lib.versionAtLeast stdenv.hostPlatform.parsed.cpu.version "6") # assumes hard floats ··· 126 126 , withNss ? !stdenv.hostPlatform.isMusl 127 127 , withOomd ? true 128 128 , withPam ? true 129 - , withPasswordQuality ? false 129 + , withPasswordQuality ? true 130 130 , withPCRE2 ? true 131 131 , withPolkit ? true 132 132 , withPortabled ? !stdenv.hostPlatform.isMusl 133 + , withQrencode ? true 133 134 , withRemote ? !stdenv.hostPlatform.isMusl 134 135 , withResolved ? true 135 136 , withShellCompletions ? true ··· 141 142 , withUkify ? false # adds python to closure which is too much by default 142 143 , withUserDb ? true 143 144 , withUtmp ? !stdenv.hostPlatform.isMusl 145 + , withVmspawn ? true 144 146 # tests assume too much system access for them to be feasible for us right now 145 147 , withTests ? false 146 148 # build only libudev and libsystemd ··· 163 165 assert withUkify -> (withEfi && withBootloader); 164 166 assert withRepart -> withCryptsetup; 165 167 assert withBootloader -> withEfi; 166 - # passwdqc is not packaged in nixpkgs yet, if you want to fix this, please submit a PR. 167 - assert !withPasswordQuality; 168 168 169 169 let 170 170 wantCurl = withRemote || withImportd; 171 171 wantGcrypt = withResolved || withImportd; 172 - version = "254.6"; 172 + version = "255.2"; 173 173 174 174 # Bump this variable on every (major) version change. See below (in the meson options list) for why. 175 175 # command: 176 176 # $ curl -s https://api.github.com/repos/systemd/systemd/releases/latest | \ 177 177 # jq '.created_at|strptime("%Y-%m-%dT%H:%M:%SZ")|mktime' 178 - releaseTimestamp = "1690536449"; 178 + releaseTimestamp = "1701895110"; 179 179 in 180 180 stdenv.mkDerivation (finalAttrs: { 181 181 inherit pname version; ··· 186 186 owner = "systemd"; 187 187 repo = "systemd-stable"; 188 188 rev = "v${version}"; 189 - hash = "sha256-Ku24ecDeQt0t7A8/adR3Jm47QZ19+wdMPyJRzCxU4uU="; 189 + hash = "sha256-8SfJY/pcH4yrDeJi0GfIUpetTbpMwyswvSu+RSfgqfY="; 190 190 }; 191 191 192 192 # On major changes, or when otherwise required, you *must* reformat the patches, ··· 201 201 ./0004-Add-some-NixOS-specific-unit-directories.patch 202 202 ./0005-Get-rid-of-a-useless-message-in-user-sessions.patch 203 203 ./0006-hostnamed-localed-timedated-disable-methods-that-cha.patch 204 - ./0007-Fix-hwdb-paths.patch 205 - ./0008-Change-usr-share-zoneinfo-to-etc-zoneinfo.patch 206 - ./0009-localectl-use-etc-X11-xkb-for-list-x11.patch 207 - ./0010-build-don-t-create-statedir-and-don-t-touch-prefixdi.patch 208 - ./0011-add-rootprefix-to-lookup-dir-paths.patch 209 - ./0012-systemd-shutdown-execute-scripts-in-etc-systemd-syst.patch 210 - ./0013-systemd-sleep-execute-scripts-in-etc-systemd-system-.patch 211 - ./0014-path-util.h-add-placeholder-for-DEFAULT_PATH_NORMAL.patch 212 - ./0015-pkg-config-derive-prefix-from-prefix.patch 213 - ./0016-inherit-systemd-environment-when-calling-generators.patch 214 - ./0017-core-don-t-taint-on-unmerged-usr.patch 215 - ./0018-tpm2_context_init-fix-driver-name-checking.patch 216 - ./0019-systemctl-edit-suggest-systemdctl-edit-runtime-on-sy.patch 204 + ./0007-Change-usr-share-zoneinfo-to-etc-zoneinfo.patch 205 + ./0008-localectl-use-etc-X11-xkb-for-list-x11.patch 206 + ./0009-add-rootprefix-to-lookup-dir-paths.patch 207 + ./0010-systemd-shutdown-execute-scripts-in-etc-systemd-syst.patch 208 + ./0011-systemd-sleep-execute-scripts-in-etc-systemd-system-.patch 209 + ./0012-path-util.h-add-placeholder-for-DEFAULT_PATH_NORMAL.patch 210 + ./0013-inherit-systemd-environment-when-calling-generators.patch 211 + ./0014-core-don-t-taint-on-unmerged-usr.patch 212 + ./0015-tpm2_context_init-fix-driver-name-checking.patch 213 + ./0016-systemctl-edit-suggest-systemdctl-edit-runtime-on-sy.patch 214 + ./0017-meson.build-do-not-create-systemdstatedir.patch 217 215 ] ++ lib.optional (stdenv.hostPlatform.isLinux && stdenv.hostPlatform.isGnu) [ 218 - ./0020-timesyncd-disable-NSCD-when-DNSSEC-validation-is-dis.patch 216 + ./0018-timesyncd-disable-NSCD-when-DNSSEC-validation-is-dis.patch 219 217 ] ++ lib.optional stdenv.hostPlatform.isMusl ( 220 218 let 221 219 oe-core = fetchzip { ··· 299 297 { name = "libbpf.so.1"; pkg = opt withLibBPF libbpf; } 300 298 { name = "libbpf.so.0"; pkg = null; } 301 299 302 - # We did never provide support for libxkbcommon & qrencode 300 + # We did never provide support for libxkbcommon 303 301 { name = "libxkbcommon.so.0"; pkg = null; } 304 - { name = "libqrencode.so.4"; pkg = null; } 302 + 303 + # qrencode 304 + { name = "libqrencode.so.4"; pkg = opt withQrencode qrencode; } 305 305 { name = "libqrencode.so.3"; pkg = null; } 306 306 307 - # We did not provide libpwquality before so it is safe to disable it for 308 - # now. 309 - { name = "libpwquality.so.1"; pkg = null; } 307 + # Password quality 308 + # We currently do not package passwdqc, only libpwquality. 309 + { name = "libpwquality.so.1"; pkg = opt withPasswordQuality libpwquality; } 310 + { name = "libpasswdqc.so.1"; pkg = null; } 310 311 311 312 # Only include cryptsetup if it is enabled. We might not be able to 312 313 # provide it during "bootstrap" in e.g. the minimal systemd build as ··· 338 339 # Support for PKCS#11 in systemd-cryptsetup, systemd-cryptenroll and systemd-homed 339 340 { name = "libp11-kit.so.0"; pkg = opt (withHomed || withCryptsetup) p11-kit; } 340 341 341 - # Password quality support 342 - { name = "libpasswdqc.so.1"; pkg = opt withPasswordQuality null; } 342 + { name = "libip4tc.so.2"; pkg = opt withIptables iptables; } 343 343 ]; 344 344 345 345 patchDlOpen = dl: ··· 434 434 ++ lib.optional withApparmor libapparmor 435 435 ++ lib.optional withAudit audit 436 436 ++ lib.optional wantCurl (lib.getDev curl) 437 - ++ lib.optionals withCompression [ bzip2 lz4 xz zstd ] 437 + ++ lib.optionals withCompression [ zlib bzip2 lz4 xz zstd ] 438 438 ++ lib.optional withCoredump elfutils 439 439 ++ lib.optional withCryptsetup (lib.getDev cryptsetup.dev) 440 440 ++ lib.optional withKexectools kexec-tools 441 441 ++ lib.optional withKmod kmod 442 442 ++ lib.optional withLibidn2 libidn2 443 443 ++ lib.optional withLibseccomp libseccomp 444 - ++ lib.optional withNetworkd iptables 444 + ++ lib.optional withIptables iptables 445 445 ++ lib.optional withPam pam 446 446 ++ lib.optional withPCRE2 pcre2 447 447 ++ lib.optional withSelinux libselinux ··· 451 451 ++ lib.optionals withLibBPF [ libbpf ] 452 452 ++ lib.optional withTpm2Tss tpm2-tss 453 453 ++ lib.optional withUkify (python3Packages.python.withPackages (ps: with ps; [ pefile ])) 454 + ++ lib.optionals withPasswordQuality [ libpwquality ] 455 + ++ lib.optionals withQrencode [ qrencode ] 454 456 ; 455 457 456 458 mesonBuildType = "release"; 457 459 458 460 mesonFlags = [ 459 - "-Dversion-tag=${version}" 461 + # Options 462 + 460 463 # We bump this variable on every (major) version change to ensure 461 464 # that we have known-good value for a timestamp that is in the (not so distant) past. 462 465 # This serves as a lower bound for valid system timestamps during startup. Systemd will 463 466 # reset the system timestamp if this date is +- 15 years from the system time. 464 467 # See the systemd v250 release notes for further details: 465 468 # https://github.com/systemd/systemd/blob/60e930fc3e6eb8a36fbc184773119eb8d2f30364/NEWS#L258-L266 466 - "-Dtime-epoch=${releaseTimestamp}" 469 + (lib.mesonOption "time-epoch" releaseTimestamp) 470 + 471 + (lib.mesonOption "version-tag" version) 472 + (lib.mesonOption "mode" "release") 473 + (lib.mesonOption "tty-gid" "3") # tty in NixOS has gid 3 474 + (lib.mesonOption "debug-shell" "${bashInteractive}/bin/bash") 475 + (lib.mesonOption "pamconfdir" "${placeholder "out"}/etc/pam.d") 476 + # Use cgroupsv2. This is already the upstream default, but better be explicit. 477 + (lib.mesonOption "default-hierarchy" "unified") 478 + (lib.mesonOption "kmod-path" "${kmod}/bin/kmod") 479 + 480 + # D-Bus 481 + (lib.mesonOption "dbuspolicydir" "${placeholder "out"}/share/dbus-1/system.d") 482 + (lib.mesonOption "dbussessionservicedir" "${placeholder "out"}/share/dbus-1/services") 483 + (lib.mesonOption "dbussystemservicedir" "${placeholder "out"}/share/dbus-1/system-services") 484 + 485 + # pkgconfig 486 + (lib.mesonOption "pkgconfiglibdir" "${placeholder "dev"}/lib/pkgconfig") 487 + (lib.mesonOption "pkgconfigdatadir" "${placeholder "dev"}/share/pkgconfig") 488 + 489 + # Keyboard 490 + (lib.mesonOption "loadkeys-path" "${kbd}/bin/loadkeys") 491 + (lib.mesonOption "setfont-path" "${kbd}/bin/setfont") 492 + 493 + # SBAT 494 + (lib.mesonOption "sbat-distro" "nixos") 495 + (lib.mesonOption "sbat-distro-summary" "NixOS") 496 + (lib.mesonOption "sbat-distro-url" "https://nixos.org/") 497 + (lib.mesonOption "sbat-distro-pkgname" pname) 498 + (lib.mesonOption "sbat-distro-version" version) 499 + 500 + # Users 501 + (lib.mesonOption "system-uid-max" "999") 502 + (lib.mesonOption "system-gid-max" "999") 503 + 504 + # SysVinit 505 + (lib.mesonOption "sysvinit-path" "") 506 + (lib.mesonOption "sysvrcnd-path" "") 507 + 508 + # Login 509 + (lib.mesonOption "sulogin-path" "${util-linux.login}/bin/sulogin") 510 + (lib.mesonOption "nologin-path" "${util-linux.login}/bin/nologin") 511 + 512 + # Mount 513 + (lib.mesonOption "mount-path" "${lib.getOutput "mount" util-linux}/bin/mount") 514 + (lib.mesonOption "umount-path" "${lib.getOutput "mount" util-linux}/bin/umount") 515 + 516 + 517 + # Features 518 + 519 + # Tests 520 + (lib.mesonBool "tests" withTests) 521 + (lib.mesonEnable "glib" withTests) 522 + (lib.mesonEnable "dbus" withTests) 523 + 524 + # Compression 525 + (lib.mesonEnable "bzip2" withCompression) 526 + (lib.mesonEnable "lz4" withCompression) 527 + (lib.mesonEnable "xz" withCompression) 528 + (lib.mesonEnable "zstd" withCompression) 529 + (lib.mesonEnable "zlib" withCompression) 530 + 531 + # NSS 532 + (lib.mesonEnable "nss-mymachines" withNss) 533 + (lib.mesonEnable "nss-resolve" withNss) 534 + (lib.mesonBool "nss-myhostname" withNss) 535 + (lib.mesonBool "nss-systemd" withNss) 536 + 537 + # Cryptsetup 538 + (lib.mesonEnable "libcryptsetup" withCryptsetup) 539 + (lib.mesonEnable "libcryptsetup-plugins" withCryptsetup) 540 + (lib.mesonEnable "p11kit" (withHomed || withCryptsetup)) 467 541 468 - "-Dmode=release" 469 - "-Ddbuspolicydir=${placeholder "out"}/share/dbus-1/system.d" 470 - "-Ddbussessionservicedir=${placeholder "out"}/share/dbus-1/services" 471 - "-Ddbussystemservicedir=${placeholder "out"}/share/dbus-1/system-services" 472 - "-Dpam=${lib.boolToString withPam}" 473 - "-Dpamconfdir=${placeholder "out"}/etc/pam.d" 474 - "-Drootprefix=${placeholder "out"}" 475 - "-Dpkgconfiglibdir=${placeholder "dev"}/lib/pkgconfig" 476 - "-Dpkgconfigdatadir=${placeholder "dev"}/share/pkgconfig" 477 - "-Dloadkeys-path=${kbd}/bin/loadkeys" 478 - "-Dsetfont-path=${kbd}/bin/setfont" 479 - "-Dtty-gid=3" # tty in NixOS has gid 3 480 - "-Ddebug-shell=${bashInteractive}/bin/bash" 481 - "-Dglib=${lib.boolToString withTests}" 482 - # while we do not run tests we should also not build them. Removes about 600 targets 483 - "-Dtests=false" 484 - "-Dacl=${lib.boolToString withAcl}" 485 - "-Danalyze=${lib.boolToString withAnalyze}" 486 - "-Daudit=${lib.boolToString withAudit}" 487 - "-Dgcrypt=${lib.boolToString wantGcrypt}" 488 - "-Dimportd=${lib.boolToString withImportd}" 489 - "-Dlz4=${lib.boolToString withCompression}" 490 - "-Dhomed=${lib.boolToString withHomed}" 491 - "-Dlogind=${lib.boolToString withLogind}" 492 - "-Dlocaled=${lib.boolToString withLocaled}" 493 - "-Dhostnamed=${lib.boolToString withHostnamed}" 494 - "-Dmachined=${lib.boolToString withMachined}" 495 - "-Dnetworkd=${lib.boolToString withNetworkd}" 496 - "-Doomd=${lib.boolToString withOomd}" 497 - "-Dpolkit=${lib.boolToString withPolkit}" 498 - "-Dlibcryptsetup=${lib.boolToString withCryptsetup}" 499 - "-Dportabled=${lib.boolToString withPortabled}" 500 - "-Dhwdb=${lib.boolToString withHwdb}" 501 - "-Dremote=${lib.boolToString withRemote}" 502 - "-Dtimedated=${lib.boolToString withTimedated}" 503 - "-Dtimesyncd=${lib.boolToString withTimesyncd}" 504 - "-Duserdb=${lib.boolToString withUserDb}" 505 - "-Dcoredump=${lib.boolToString withCoredump}" 506 - "-Dfirstboot=false" 507 - "-Dresolve=${lib.boolToString withResolved}" 508 - "-Dsplit-usr=false" 509 - "-Dlibcurl=${lib.boolToString wantCurl}" 510 - "-Dlibidn=false" 511 - "-Dlibidn2=${lib.boolToString withLibidn2}" 512 - "-Dfirstboot=${lib.boolToString withFirstboot}" 513 - "-Dsysusers=${lib.boolToString withSysusers}" 514 - "-Drepart=${lib.boolToString withRepart}" 515 - "-Dsysupdate=${lib.boolToString withSysupdate}" 516 - "-Dquotacheck=false" 517 - "-Dldconfig=false" 518 - "-Dsmack=true" 519 - "-Db_pie=true" 520 - "-Dinstall-sysconfdir=false" 521 - "-Dsbat-distro=nixos" 522 - "-Dsbat-distro-summary=NixOS" 523 - "-Dsbat-distro-url=https://nixos.org/" 524 - "-Dsbat-distro-pkgname=${pname}" 525 - "-Dsbat-distro-version=${version}" 526 - /* 527 - As of now, systemd doesn't allow runtime configuration of these values. So 528 - the settings in /etc/login.defs have no effect on it. Many people think this 529 - should be supported however, see 530 - - https://github.com/systemd/systemd/issues/3855 531 - - https://github.com/systemd/systemd/issues/4850 532 - - https://github.com/systemd/systemd/issues/9769 533 - - https://github.com/systemd/systemd/issues/9843 534 - - https://github.com/systemd/systemd/issues/10184 535 - */ 536 - "-Dsystem-uid-max=999" 537 - "-Dsystem-gid-max=999" 542 + # FIDO2 543 + (lib.mesonEnable "libfido2" withFido2) 544 + (lib.mesonEnable "openssl" withFido2) 538 545 539 - "-Dsysvinit-path=" 540 - "-Dsysvrcnd-path=" 546 + # Password Quality 547 + (lib.mesonEnable "pwquality" withPasswordQuality) 548 + (lib.mesonEnable "passwdqc" false) 541 549 542 - "-Dsulogin-path=${util-linux.login}/bin/sulogin" 543 - "-Dnologin-path=${util-linux.login}/bin/nologin" 544 - "-Dmount-path=${lib.getOutput "mount" util-linux}/bin/mount" 545 - "-Dumount-path=${lib.getOutput "mount" util-linux}/bin/umount" 546 - "-Dcreate-log-dirs=false" 550 + # Remote 551 + (lib.mesonEnable "remote" withRemote) 552 + (lib.mesonEnable "microhttpd" withRemote) 547 553 548 - # Use cgroupsv2. This is already the upstream default, but better be explicit. 549 - "-Ddefault-hierarchy=unified" 550 - # Upstream defaulted to disable manpages since they optimize for the much 551 - # more frequent development builds 552 - "-Dman=true" 554 + (lib.mesonEnable "pam" withPam) 555 + (lib.mesonEnable "acl" withAcl) 556 + (lib.mesonEnable "audit" withAudit) 557 + (lib.mesonEnable "apparmor" withApparmor) 558 + (lib.mesonEnable "gcrypt" wantGcrypt) 559 + (lib.mesonEnable "importd" withImportd) 560 + (lib.mesonEnable "homed" withHomed) 561 + (lib.mesonEnable "polkit" withPolkit) 562 + (lib.mesonEnable "elfutils" withCoredump) 563 + (lib.mesonEnable "libcurl" wantCurl) 564 + (lib.mesonEnable "libidn" false) 565 + (lib.mesonEnable "libidn2" withLibidn2) 566 + (lib.mesonEnable "libiptc" withIptables) 567 + (lib.mesonEnable "repart" withRepart) 568 + (lib.mesonEnable "sysupdate" withSysupdate) 569 + (lib.mesonEnable "selinux" withSelinux) 570 + (lib.mesonEnable "tpm2" withTpm2Tss) 571 + (lib.mesonEnable "pcre2" withPCRE2) 572 + (lib.mesonEnable "bpf-framework" withLibBPF) 573 + (lib.mesonEnable "bootloader" withBootloader) 574 + (lib.mesonEnable "ukify" withUkify) 575 + (lib.mesonEnable "kmod" withKmod) 576 + (lib.mesonEnable "qrencode" withQrencode) 577 + (lib.mesonEnable "vmspawn" withVmspawn) 578 + (lib.mesonEnable "xenctrl" false) 579 + (lib.mesonEnable "gnutls" false) 580 + (lib.mesonEnable "xkbcommon" false) 581 + (lib.mesonEnable "man" true) 553 582 554 - "-Defi=${lib.boolToString withEfi}" 555 - "-Dbootloader=${lib.boolToString withBootloader}" 583 + (lib.mesonBool "analyze" withAnalyze) 584 + (lib.mesonBool "logind" withLogind) 585 + (lib.mesonBool "localed" withLocaled) 586 + (lib.mesonBool "hostnamed" withHostnamed) 587 + (lib.mesonBool "machined" withMachined) 588 + (lib.mesonBool "networkd" withNetworkd) 589 + (lib.mesonBool "oomd" withOomd) 590 + (lib.mesonBool "portabled" withPortabled) 591 + (lib.mesonBool "hwdb" withHwdb) 592 + (lib.mesonBool "timedated" withTimedated) 593 + (lib.mesonBool "timesyncd" withTimesyncd) 594 + (lib.mesonBool "userdb" withUserDb) 595 + (lib.mesonBool "coredump" withCoredump) 596 + (lib.mesonBool "firstboot" withFirstboot) 597 + (lib.mesonBool "resolve" withResolved) 598 + (lib.mesonBool "sysusers" withSysusers) 599 + (lib.mesonBool "efi" withEfi) 600 + (lib.mesonBool "utmp" withUtmp) 601 + (lib.mesonBool "log-trace" withLogTrace) 602 + (lib.mesonBool "quotacheck" false) 603 + (lib.mesonBool "ldconfig" false) 604 + (lib.mesonBool "install-sysconfdir" false) 605 + (lib.mesonBool "create-log-dirs" false) 606 + (lib.mesonBool "smack" true) 607 + (lib.mesonBool "b_pie" true) 556 608 557 - "-Dukify=${lib.boolToString withUkify}" 558 609 ] ++ lib.optionals (withShellCompletions == false) [ 559 - "-Dbashcompletiondir=no" 560 - "-Dzshcompletiondir=no" 561 - ] ++ lib.optionals (!withNss) [ 562 - "-Dnss-myhostname=false" 563 - "-Dnss-mymachines=false" 564 - "-Dnss-resolve=false" 565 - "-Dnss-systemd=false" 566 - ] ++ lib.optionals withLibBPF [ 567 - "-Dbpf-framework=true" 568 - ] ++ lib.optionals withTpm2Tss [ 569 - "-Dtpm2=true" 570 - ] ++ lib.optionals (!withUtmp) [ 571 - "-Dutmp=false" 610 + (lib.mesonOption "bashcompletiondir" "no") 611 + (lib.mesonOption "zshcompletiondir" "no") 572 612 ] ++ lib.optionals stdenv.hostPlatform.isMusl [ 573 - "-Dgshadow=false" 574 - "-Didn=false" 575 - ] ++ lib.optionals withKmod [ 576 - "-Dkmod=true" 577 - "-Dkmod-path=${kmod}/bin/kmod" 578 - ] ++ lib.optionals withLogTrace [ 579 - "-Dlog-trace=true" 613 + (lib.mesonBool "gshadow" false) 614 + (lib.mesonBool "idn" false) 580 615 ]; 581 616 preConfigure = 582 617 let ··· 753 788 754 789 # Wrap in the correct path for LUKS2 tokens. 755 790 postFixup = lib.optionalString withCryptsetup '' 756 - for f in lib/systemd/systemd-cryptsetup bin/systemd-cryptenroll; do 791 + for f in bin/systemd-cryptsetup bin/systemd-cryptenroll; do 757 792 # This needs to be in LD_LIBRARY_PATH because rpath on a binary is not propagated to libraries using dlopen, in this case `libcryptsetup.so` 758 793 wrapProgram $out/$f --prefix LD_LIBRARY_PATH : ${placeholder "out"}/lib/cryptsetup 759 794 done ··· 763 798 # To cross compile a derivation that builds a UKI with ukify, we need to wrap 764 799 # ukify with the correct binutils. When wrapping, no splicing happens so we 765 800 # have to explicitly pull binutils from targetPackages. 766 - wrapProgram $out/lib/systemd/ukify --prefix PATH : ${lib.makeBinPath [ targetPackages.stdenv.cc.bintools ] }:${placeholder "out"}/lib/systemd 801 + wrapProgram $out/bin/ukify --prefix PATH : ${lib.makeBinPath [ targetPackages.stdenv.cc.bintools ] }:${placeholder "out"}/lib/systemd 767 802 ''; 768 803 769 804 disallowedReferences = lib.optionals (stdenv.buildPlatform != stdenv.hostPlatform)
+2 -2
pkgs/servers/firebird/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, libedit, autoreconfHook, zlib, unzip, libtommath, libtomcrypt, icu, superServer ? false }: 1 + { lib, stdenv, fetchFromGitHub, libedit, autoreconfHook271, zlib, unzip, libtommath, libtomcrypt, icu, superServer ? false }: 2 2 3 3 let base = { 4 4 pname = "firebird"; ··· 13 13 maintainers = with maintainers; [ marcweber ]; 14 14 }; 15 15 16 - nativeBuildInputs = [ autoreconfHook ]; 16 + nativeBuildInputs = [ autoreconfHook271 ]; 17 17 18 18 buildInputs = [ libedit icu ]; 19 19
+2 -2
pkgs/servers/mqtt/flashmq/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "flashmq"; 5 - version = "1.4.5"; 5 + version = "1.8.4"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "halfgaar"; 9 9 repo = "FlashMQ"; 10 10 rev = "v${version}"; 11 - hash = "sha256-DcxwwUNpnMeK8A3LuyfrWAMCng0yIcX9bKxNGY0uDSo="; 11 + hash = "sha256-CMZim7FSTzjUaViVFq5OABOAUX3Aee+I3/HQhNIdIVM="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ cmake installShellFiles ];
+11 -4
pkgs/servers/nosql/redis/default.nix
··· 1 - { lib, stdenv, fetchurl, lua, jemalloc, pkg-config, nixosTests 1 + { lib, stdenv, fetchurl, fetchpatch, lua, jemalloc, pkg-config, nixosTests 2 2 , tcl, which, ps, getconf 3 3 , withSystemd ? lib.meta.availableOn stdenv.hostPlatform systemd, systemd 4 4 # dependency ordering is broken at the moment when building with openssl ··· 12 12 13 13 stdenv.mkDerivation (finalAttrs: { 14 14 pname = "redis"; 15 - version = "7.2.3"; 15 + version = "7.2.4"; 16 16 17 17 src = fetchurl { 18 18 url = "https://download.redis.io/releases/redis-${finalAttrs.version}.tar.gz"; 19 - hash = "sha256-PisZbW603bnnQwiL/CkVzLtC1A9aij7djLaccW7DS+c="; 19 + hash = "sha256-jRBMJqFUsp/WfWVotPN1ISISrUHgwsqj1mSA5429O1k="; 20 20 }; 21 21 22 - patches = lib.optionals useSystemJemalloc [ 22 + patches = [ 23 + # fixes: make test [exception]: Executing test client: permission denied 24 + # https://github.com/redis/redis/issues/12792 25 + (fetchpatch { 26 + url = "https://github.com/redis/redis/pull/12887.diff"; 27 + hash = "sha256-VZEMShW7Ckn5hLJHffQvE94Uly41WZW1bwvxny+Y3W8="; 28 + }) 29 + ] ++ lib.optionals useSystemJemalloc [ 23 30 # use system jemalloc 24 31 (fetchurl { 25 32 url = "https://gitlab.archlinux.org/archlinux/packaging/packages/redis/-/raw/102cc861713c796756abd541bf341a4512eb06e6/redis-5.0-use-system-jemalloc.patch";
+26 -1
pkgs/stdenv/generic/setup.sh
··· 815 815 ###################################################################### 816 816 # Textual substitution functions. 817 817 818 + # only log once, due to max logging limit on hydra 819 + _substituteStream_has_warned_replace_deprecation="" 818 820 819 821 substituteStream() { 820 822 local var=$1 ··· 822 824 shift 2 823 825 824 826 while (( "$#" )); do 827 + local is_required=1 828 + local is_quiet="" 825 829 case "$1" in 830 + --replace-quiet) 831 + is_quiet=1 832 + ;& 826 833 --replace) 834 + # deprecated 2023-11-22 835 + # this will either get removed, or switch to the behaviour of --replace-fail in the future 836 + if [ -z "$_substituteStream_has_warned_replace_deprecation" ]; then 837 + echo "substituteStream(): WARNING: '--replace' is deprecated, use --replace-{fail,warn,quiet}. ($description)" >&2 838 + _substituteStream_has_warned_replace_deprecation=1 839 + fi 840 + ;& 841 + --replace-warn) 842 + is_required="" 843 + ;& 844 + --replace-fail) 827 845 pattern="$2" 828 846 replacement="$3" 829 847 shift 3 ··· 832 850 eval "$var"'=${'"$var"'//"$pattern"/"$replacement"}' 833 851 if [ "$pattern" != "$replacement" ]; then 834 852 if [ "${!var}" == "$savedvar" ]; then 835 - echo "substituteStream(): WARNING: pattern '$pattern' doesn't match anything in $description" >&2 853 + if [ -z "$is_required" ]; then 854 + if [ -z "$is_quiet" ]; then 855 + printf "substituteStream(): WARNING: pattern %q doesn't match anything in %s\n" "$pattern" "$description" >&2 856 + fi 857 + else 858 + printf "substituteStream(): ERROR: pattern %q doesn't match anything in %s\n" "$pattern" "$description" >&2 859 + return 1 860 + fi 836 861 fi 837 862 fi 838 863 ;;
+2 -2
pkgs/tools/graphics/spirv-cross/default.nix
··· 2 2 3 3 stdenv.mkDerivation (finalAttrs: { 4 4 pname = "spirv-cross"; 5 - version = "1.3.268.0"; 5 + version = "1.3.275.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "KhronosGroup"; 9 9 repo = "SPIRV-Cross"; 10 10 rev = "vulkan-sdk-${finalAttrs.version}"; 11 - hash = "sha256-UIk5hihUPjXNzEeO2laS4dUef/rEExxXAZjMcftx+3A="; 11 + hash = "sha256-Mhr3Yxm5MeLLQFmxWmtXLsq+ZcOE+KMs+3iiTYF8t30="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ cmake python3 ];
+2 -2
pkgs/tools/graphics/vulkan-extension-layer/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "vulkan-extension-layer"; 5 - version = "1.3.268.0"; 5 + version = "1.3.275.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "KhronosGroup"; 9 9 repo = "Vulkan-ExtensionLayer"; 10 10 rev = "vulkan-sdk-${version}"; 11 - hash = "sha256-rSKPTeTDOz6IeJGRt9aIu1VH8VfVzXNYZfjdiSXEJxg="; 11 + hash = "sha256-zQycF3yKoa54KBUIuG1BqFGB00yc6oZQzdcDel2rXN0="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ cmake pkg-config jq ];
+2 -2
pkgs/tools/graphics/vulkan-tools-lunarg/default.nix
··· 26 26 27 27 stdenv.mkDerivation rec { 28 28 pname = "vulkan-tools-lunarg"; 29 - version = "1.3.268.0"; 29 + version = "1.3.275.0"; 30 30 31 31 src = fetchFromGitHub { 32 32 owner = "LunarG"; 33 33 repo = "VulkanTools"; 34 34 rev = "vulkan-sdk-${version}"; 35 - hash = "sha256-2ZUD+RBsl35QV3250JOPCIoJb4sJcBsiRE4SZaS6ROs="; 35 + hash = "sha256-MEQX90HL90jyVBWWcvOF7QLzm1+fNE5TW3MWdK4w53M="; 36 36 }; 37 37 38 38 nativeBuildInputs = [ cmake python3 jq which pkg-config libsForQt5.qt5.wrapQtAppsHook ];
+4 -2
pkgs/tools/graphics/vulkan-tools/default.nix
··· 14 14 , libXrandr 15 15 , vulkan-headers 16 16 , vulkan-loader 17 + , vulkan-volk 17 18 , wayland 18 19 , wayland-protocols 19 20 , moltenvk ··· 23 24 24 25 stdenv.mkDerivation rec { 25 26 pname = "vulkan-tools"; 26 - version = "1.3.268.0"; 27 + version = "1.3.275.0"; 27 28 28 29 src = fetchFromGitHub { 29 30 owner = "KhronosGroup"; 30 31 repo = "Vulkan-Tools"; 31 32 rev = "vulkan-sdk-${version}"; 32 - hash = "sha256-IsMxiAR4ak6kC3BNYhtI+JVNkEka4ZceSElxk39THXg="; 33 + hash = "sha256-0sAwO8gXzpMst+7l7LS1oiDLo9E6otDktCti+v8jwDw="; 33 34 }; 34 35 35 36 nativeBuildInputs = [ ··· 42 43 glslang 43 44 vulkan-headers 44 45 vulkan-loader 46 + vulkan-volk 45 47 ] ++ lib.optionals (!stdenv.isDarwin) [ 46 48 libffi 47 49 libX11
+2 -2
pkgs/tools/inputmethods/m17n-lib/default.nix
··· 7 7 }: 8 8 stdenv.mkDerivation rec { 9 9 pname = "m17n-lib"; 10 - version = "1.8.2"; 10 + version = "1.8.4"; 11 11 12 12 src = fetchurl { 13 13 url = "https://download.savannah.gnu.org/releases/m17n/m17n-lib-${version}.tar.gz"; 14 - hash = "sha256-5bA0SvnxFdlJV6P5ud68T45nG2n4wf1eC2iKeU16J/I="; 14 + hash = "sha256-xqJYLG5PKowueihE+lx+s2Oq0lOLBS8gPHEGSd1CHMg="; 15 15 }; 16 16 17 17 strictDeps = true;
+4 -2
pkgs/tools/networking/curl/default.nix
··· 15 15 ), libkrb5 16 16 , http2Support ? true, nghttp2 17 17 , http3Support ? false, nghttp3, ngtcp2 18 + , websocketSupport ? false 18 19 , idnSupport ? false, libidn2 19 20 , ldapSupport ? false, openldap 20 21 , opensslSupport ? zlibSupport, openssl ··· 47 48 48 49 stdenv.mkDerivation (finalAttrs: { 49 50 pname = "curl"; 50 - version = "8.4.0"; 51 + version = "8.5.0"; 51 52 52 53 src = fetchurl { 53 54 urls = [ 54 55 "https://curl.haxx.se/download/curl-${finalAttrs.version}.tar.xz" 55 56 "https://github.com/curl/curl/releases/download/curl-${builtins.replaceStrings [ "." ] [ "_" ] finalAttrs.version}/curl-${finalAttrs.version}.tar.xz" 56 57 ]; 57 - hash = "sha256-FsYqnErw9wPSi9pte783ukcFWtNBTXDexj4uYzbyqC0="; 58 + hash = "sha256-QquNueINgpCjtjPn+7POwV2zTfZf0QFe+KweRyN1Dus="; 58 59 }; 59 60 60 61 patches = [ ··· 111 112 (lib.enableFeature c-aresSupport "ares") 112 113 (lib.enableFeature ldapSupport "ldap") 113 114 (lib.enableFeature ldapSupport "ldaps") 115 + (lib.enableFeature websocketSupport "websockets") 114 116 # --with-ca-fallback is only supported for openssl and gnutls https://github.com/curl/curl/blame/curl-8_0_1/acinclude.m4#L1640 115 117 (lib.withFeature (opensslSupport || gnutlsSupport) "ca-fallback") 116 118 (lib.withFeature http3Support "nghttp3")
+2 -8
pkgs/tools/networking/inetutils/default.nix
··· 1 1 { stdenv 2 2 , lib 3 3 , fetchurl 4 - , fetchpatch 5 4 , ncurses 6 5 , perl 7 6 , help2man ··· 12 11 13 12 stdenv.mkDerivation rec { 14 13 pname = "inetutils"; 15 - version = "2.4"; 14 + version = "2.5"; 16 15 17 16 src = fetchurl { 18 17 url = "mirror://gnu/${pname}/${pname}-${version}.tar.xz"; 19 - sha256 = "sha256-F4nWsbGlff4qere1M+6fXf2cv1tZuxuzwmEu0I0PaLI="; 18 + hash = "sha256-h2l9YKMeELXLhqnwZR4ex77pgyDQSMBzlDGqw9V2T7Y="; 20 19 }; 21 20 22 21 outputs = ["out" "apparmor"]; ··· 24 23 patches = [ 25 24 # https://git.congatec.com/yocto/meta-openembedded/commit/3402bfac6b595c622e4590a8ff5eaaa854e2a2a3 26 25 ./inetutils-1_9-PATH_PROCNET_DEV.patch 27 - (fetchpatch { 28 - name = "CVE-2023-40303.patch"; 29 - url = "https://git.savannah.gnu.org/cgit/inetutils.git/patch/?id=e4e65c03f4c11292a3e40ef72ca3f194c8bffdd6"; 30 - hash = "sha256-I5skN537owfpFpAZr4vDKPHuERI6+oq5/hFW2RQeUxI="; 31 - }) 32 26 ]; 33 27 34 28 strictDeps = true;
+9
pkgs/tools/networking/libreswan/default.nix
··· 1 1 { lib 2 2 , stdenv 3 3 , fetchurl 4 + , fetchpatch 4 5 , nixosTests 5 6 , pkg-config 6 7 , systemd ··· 113 114 -e '/test ! -d $(NSSDIR)/,+3d' \ 114 115 -i configs/Makefile 115 116 ''; 117 + 118 + patches = [ 119 + (fetchpatch { 120 + name = "ignoring-return-value.patch"; 121 + url = "https://github.com/libreswan/libreswan/commit/ba5bad09f55959872022fa506d5ac06eafe3a314.diff"; 122 + hash = "sha256-xJ8rZWoRtJixamGY8sjOS+63Lw3RX7620HlRWYfvSxc="; 123 + }) 124 + ]; 116 125 117 126 makeFlags = [ 118 127 "PREFIX=$(out)"
+2 -2
pkgs/tools/networking/modemmanager/default.nix
··· 23 23 24 24 stdenv.mkDerivation rec { 25 25 pname = "modemmanager"; 26 - version = "1.20.6"; 26 + version = "1.22.0"; 27 27 28 28 src = fetchFromGitLab { 29 29 domain = "gitlab.freedesktop.org"; 30 30 owner = "mobile-broadband"; 31 31 repo = "ModemManager"; 32 32 rev = version; 33 - hash = "sha256-/A4WTsUQVeZDi5ei6qBvqoWYLKdRcZaYZU8/qWOPrvM="; 33 + hash = "sha256-/D9b2rCCUhpDCUfSNAWR65+3EyUywzFdH1R17eSKRDo="; 34 34 }; 35 35 36 36 patches = [
+1 -1
pkgs/tools/networking/tun2socks/default.nix
··· 17 17 vendorHash = "sha256-zeiOcn33PnyoseYb0wynkn7MfGp3rHEYBStY98C6aR8="; 18 18 19 19 ldflags = [ 20 - "-w" "-s" "-buildid=" 20 + "-w" "-s" 21 21 "-X github.com/xjasonlyu/tun2socks/v2/internal/version.Version=v${version}" 22 22 "-X github.com/xjasonlyu/tun2socks/v2/internal/version.GitCommit=v${version}" 23 23 ];
+1 -1
pkgs/tools/networking/v2ray/default.nix
··· 19 19 # https://github.com/Mic92/nix-update/pull/95 20 20 vendorHash = "sha256-ZBvHu4BEmQi6PQwRHuVwx/6X4gBqlRR44OktKRBGcs4="; 21 21 22 - ldflags = [ "-s" "-w" "-buildid=" ]; 22 + ldflags = [ "-s" "-w" ]; 23 23 24 24 subPackages = [ "main" ]; 25 25
+1 -1
pkgs/tools/networking/xray/default.nix
··· 26 26 27 27 doCheck = false; 28 28 29 - ldflags = [ "-s" "-w" "-buildid=" ]; 29 + ldflags = [ "-s" "-w" ]; 30 30 subPackages = [ "main" ]; 31 31 32 32 installPhase = ''
+200
pkgs/tools/security/gnupg/24-revert-rfc4880bis-defaults.patch
··· 1 + From 1e4f1550996334d2a631a5d769e937d29ace47bb Mon Sep 17 00:00:00 2001 2 + From: Jakub Jelen <jjelen@redhat.com> 3 + Date: Thu, 9 Feb 2023 16:38:58 +0100 4 + Subject: [PATCH gnupg] Revert the introduction of the RFC4880bis draft into 5 + defaults 6 + 7 + This reverts commit 4583f4fe2 (gpg: Merge --rfc4880bis features into 8 + --gnupg, 2022-10-31). 9 + --- 10 + g10/gpg.c | 35 ++++++++++++++++++++++++++++++++--- 11 + g10/keygen.c | 30 ++++++++++++++++++------------ 12 + 2 files changed, 50 insertions(+), 15 deletions(-) 13 + 14 + diff --git a/g10/gpg.c b/g10/gpg.c 15 + index dcab0a11a..796888013 100644 16 + --- a/g10/gpg.c 17 + +++ b/g10/gpg.c 18 + @@ -247,6 +247,7 @@ enum cmd_and_opt_values 19 + oGnuPG, 20 + oRFC2440, 21 + oRFC4880, 22 + + oRFC4880bis, 23 + oOpenPGP, 24 + oPGP7, 25 + oPGP8, 26 + @@ -636,6 +637,7 @@ static gpgrt_opt_t opts[] = { 27 + ARGPARSE_s_n (oGnuPG, "no-pgp8", "@"), 28 + ARGPARSE_s_n (oRFC2440, "rfc2440", "@"), 29 + ARGPARSE_s_n (oRFC4880, "rfc4880", "@"), 30 + + ARGPARSE_s_n (oRFC4880bis, "rfc4880bis", "@"), 31 + ARGPARSE_s_n (oOpenPGP, "openpgp", N_("use strict OpenPGP behavior")), 32 + ARGPARSE_s_n (oPGP7, "pgp6", "@"), 33 + ARGPARSE_s_n (oPGP7, "pgp7", "@"), 34 + @@ -978,7 +980,6 @@ static gpgrt_opt_t opts[] = { 35 + ARGPARSE_s_n (oNoop, "no-allow-multiple-messages", "@"), 36 + ARGPARSE_s_s (oNoop, "aead-algo", "@"), 37 + ARGPARSE_s_s (oNoop, "personal-aead-preferences","@"), 38 + - ARGPARSE_s_n (oNoop, "rfc4880bis", "@"), 39 + ARGPARSE_s_n (oNoop, "override-compliance-check", "@"), 40 + 41 + 42 + @@ -2227,7 +2228,7 @@ static struct gnupg_compliance_option compliance_options[] = 43 + { 44 + { "gnupg", oGnuPG }, 45 + { "openpgp", oOpenPGP }, 46 + - { "rfc4880bis", oGnuPG }, 47 + + { "rfc4880bis", oRFC4880bis }, 48 + { "rfc4880", oRFC4880 }, 49 + { "rfc2440", oRFC2440 }, 50 + { "pgp6", oPGP7 }, 51 + @@ -2243,8 +2244,28 @@ static struct gnupg_compliance_option compliance_options[] = 52 + static void 53 + set_compliance_option (enum cmd_and_opt_values option) 54 + { 55 + + opt.flags.rfc4880bis = 0; /* Clear because it is initially set. */ 56 + + 57 + switch (option) 58 + { 59 + + case oRFC4880bis: 60 + + opt.flags.rfc4880bis = 1; 61 + + opt.compliance = CO_RFC4880; 62 + + opt.flags.dsa2 = 1; 63 + + opt.flags.require_cross_cert = 1; 64 + + opt.rfc2440_text = 0; 65 + + opt.allow_non_selfsigned_uid = 1; 66 + + opt.allow_freeform_uid = 1; 67 + + opt.escape_from = 1; 68 + + opt.not_dash_escaped = 0; 69 + + opt.def_cipher_algo = 0; 70 + + opt.def_digest_algo = 0; 71 + + opt.cert_digest_algo = 0; 72 + + opt.compress_algo = -1; 73 + + opt.s2k_mode = 3; /* iterated+salted */ 74 + + opt.s2k_digest_algo = DIGEST_ALGO_SHA256; 75 + + opt.s2k_cipher_algo = CIPHER_ALGO_AES256; 76 + + break; 77 + case oOpenPGP: 78 + case oRFC4880: 79 + /* This is effectively the same as RFC2440, but with 80 + @@ -2288,6 +2309,7 @@ set_compliance_option (enum cmd_and_opt_values option) 81 + case oPGP8: opt.compliance = CO_PGP8; break; 82 + case oGnuPG: 83 + opt.compliance = CO_GNUPG; 84 + + opt.flags.rfc4880bis = 1; 85 + break; 86 + 87 + case oDE_VS: 88 + @@ -2491,6 +2513,7 @@ main (int argc, char **argv) 89 + opt.emit_version = 0; 90 + opt.weak_digests = NULL; 91 + opt.compliance = CO_GNUPG; 92 + + opt.flags.rfc4880bis = 1; 93 + 94 + /* Check special options given on the command line. */ 95 + orig_argc = argc; 96 + @@ -3033,6 +3056,7 @@ main (int argc, char **argv) 97 + case oOpenPGP: 98 + case oRFC2440: 99 + case oRFC4880: 100 + + case oRFC4880bis: 101 + case oPGP7: 102 + case oPGP8: 103 + case oGnuPG: 104 + @@ -3862,6 +3886,11 @@ main (int argc, char **argv) 105 + if( may_coredump && !opt.quiet ) 106 + log_info(_("WARNING: program may create a core file!\n")); 107 + 108 + + if (!opt.flags.rfc4880bis) 109 + + { 110 + + opt.mimemode = 0; /* This will use text mode instead. */ 111 + + } 112 + + 113 + if (eyes_only) { 114 + if (opt.set_filename) 115 + log_info(_("WARNING: %s overrides %s\n"), 116 + @@ -4078,7 +4107,7 @@ main (int argc, char **argv) 117 + /* Check our chosen algorithms against the list of legal 118 + algorithms. */ 119 + 120 + - if(!GNUPG) 121 + + if(!GNUPG && !opt.flags.rfc4880bis) 122 + { 123 + const char *badalg=NULL; 124 + preftype_t badtype=PREFTYPE_NONE; 125 + diff --git a/g10/keygen.c b/g10/keygen.c 126 + index a2cfe3ccf..2a1dd1f81 100644 127 + --- a/g10/keygen.c 128 + +++ b/g10/keygen.c 129 + @@ -404,7 +404,7 @@ keygen_set_std_prefs (const char *string,int personal) 130 + strcat(dummy_string,"S7 "); 131 + strcat(dummy_string,"S2 "); /* 3DES */ 132 + 133 + - if (!openpgp_aead_test_algo (AEAD_ALGO_OCB)) 134 + + if (opt.flags.rfc4880bis && !openpgp_aead_test_algo (AEAD_ALGO_OCB)) 135 + strcat(dummy_string,"A2 "); 136 + 137 + if (personal) 138 + @@ -889,7 +889,7 @@ keygen_upd_std_prefs (PKT_signature *sig, void *opaque) 139 + /* Make sure that the MDC feature flag is set if needed. */ 140 + add_feature_mdc (sig,mdc_available); 141 + add_feature_aead (sig, aead_available); 142 + - add_feature_v5 (sig, 1); 143 + + add_feature_v5 (sig, opt.flags.rfc4880bis); 144 + add_keyserver_modify (sig,ks_modify); 145 + keygen_add_keyserver_url(sig,NULL); 146 + 147 + @@ -3382,7 +3382,10 @@ parse_key_parameter_part (ctrl_t ctrl, 148 + } 149 + } 150 + else if (!ascii_strcasecmp (s, "v5")) 151 + - keyversion = 5; 152 + + { 153 + + if (opt.flags.rfc4880bis) 154 + + keyversion = 5; 155 + + } 156 + else if (!ascii_strcasecmp (s, "v4")) 157 + keyversion = 4; 158 + else 159 + @@ -3641,7 +3644,7 @@ parse_key_parameter_part (ctrl_t ctrl, 160 + * ecdsa := Use algorithm ECDSA. 161 + * eddsa := Use algorithm EdDSA. 162 + * ecdh := Use algorithm ECDH. 163 + - * v5 := Create version 5 key 164 + + * v5 := Create version 5 key (requires option --rfc4880bis) 165 + * 166 + * There are several defaults and fallbacks depending on the 167 + * algorithm. PART can be used to select which part of STRING is 168 + @@ -4513,9 +4516,9 @@ read_parameter_file (ctrl_t ctrl, const char *fname ) 169 + } 170 + } 171 + 172 + - if ((keywords[i].key == pVERSION 173 + - || keywords[i].key == pSUBVERSION)) 174 + - ; /* Ignore version. */ 175 + + if (!opt.flags.rfc4880bis && (keywords[i].key == pVERSION 176 + + || keywords[i].key == pSUBVERSION)) 177 + + ; /* Ignore version unless --rfc4880bis is active. */ 178 + else 179 + { 180 + r = xmalloc_clear( sizeof *r + strlen( value ) ); 181 + @@ -4610,11 +4613,14 @@ quickgen_set_para (struct para_data_s *para, int for_subkey, 182 + para = r; 183 + } 184 + 185 + - r = xmalloc_clear (sizeof *r + 20); 186 + - r->key = for_subkey? pSUBVERSION : pVERSION; 187 + - snprintf (r->u.value, 20, "%d", version); 188 + - r->next = para; 189 + - para = r; 190 + + if (opt.flags.rfc4880bis) 191 + + { 192 + + r = xmalloc_clear (sizeof *r + 20); 193 + + r->key = for_subkey? pSUBVERSION : pVERSION; 194 + + snprintf (r->u.value, 20, "%d", version); 195 + + r->next = para; 196 + + para = r; 197 + + } 198 + 199 + if (keytime) 200 + {
+3 -2
pkgs/tools/security/gnupg/24.nix
··· 13 13 14 14 stdenv.mkDerivation rec { 15 15 pname = "gnupg"; 16 - version = "2.4.1"; 16 + version = "2.4.3"; 17 17 18 18 src = fetchurl { 19 19 url = "mirror://gnupg/gnupg/${pname}-${version}.tar.bz2"; 20 - hash = "sha256-drceWutEO/2RDOnLyCgbYXyDQWh6+2e65FWHeXK1neg="; 20 + hash = "sha256-onGubXMvb02AwlitnuiN2clMj9wzw+RTKMTXwSa9IZ0="; 21 21 }; 22 22 23 23 depsBuildBuild = [ buildPackages.stdenv.cc ]; ··· 33 33 ./tests-add-test-cases-for-import-without-uid.patch 34 34 ./accept-subkeys-with-a-good-revocation-but-no-self-sig.patch 35 35 ./24-allow-import-of-previously-known-keys-even-without-UI.patch 36 + ./24-revert-rfc4880bis-defaults.patch 36 37 # Patch for DoS vuln from https://seclists.org/oss-sec/2022/q3/27 37 38 ./v3-0001-Disallow-compressed-signatures-and-certificates.patch 38 39 ];
-1
pkgs/tools/security/slsa-verifier/default.nix
··· 27 27 ldflags = [ 28 28 "-s" 29 29 "-w" 30 - "-buildid=" 31 30 "-X sigs.k8s.io/release-utils/version.gitVersion=${version}" 32 31 ]; 33 32
-4
pkgs/tools/security/step-ca/default.nix
··· 23 23 24 24 vendorHash = "sha256-AXMMpzXEhdKSGeVg/KK2NEgalxIXP6DUTcoxOQVqow4="; 25 25 26 - ldflags = [ 27 - "-buildid=" 28 - ]; 29 - 30 26 nativeBuildInputs = lib.optionals hsmSupport [ 31 27 pkg-config 32 28 ];
+17 -4
pkgs/tools/text/groff/site.tmac
··· 1 1 . 2 2 .if n \{\ 3 - . \" Character translations for non-keyboard 4 - . \" characters - to make them searchable 3 + . \" With groff 1.23.0 "[t]he 'utf8' output device now maps the input 4 + . \" characters '^' (caret, circumflex accent, or 'hat') and '~' (tilde) 5 + . \" to U+02C6 (modifier letter circumflex accent) and U+02DC (small tilde), 6 + . \" respectively, for consistency with groff's other output devices. 7 + . \" This change is expected to expose glyph usage errors in man pages. 8 + . \" See [http://git.savannah.gnu.org/cgit/groff.git/tree/PROBLEMS] for 9 + . \" a recipe that will conceal these errors" 10 + . \" -- https://lists.gnu.org/archive/html/groff/2023-07/msg00051.html 11 + . \" 12 + . \" Conceal glyph usage errors in man pages with the following 13 + . \" character translations for non-keyboard characters to make them searchable. 5 14 . if '\*[.T]'utf8' \{\ 6 15 . char \- \N'45' 7 16 . char - \N'45' 8 - . char ' \N'39' 9 - . char \' \N'39' 17 + . char \' \[aq] 18 + . char ' \[aq] 19 + . char ` \[ga] 20 + . char ^ \[ha] 21 + . char ~ \[ti] 10 22 . \} 23 + .\} 11 24 . 12 25 .ds doc-default-operating-system Nixpkgs 13 26 .ds doc-volume-operating-system Nixpkgs
+4 -4
pkgs/tools/video/rav1e/default.nix
··· 15 15 16 16 rustPlatform.buildRustPackage rec { 17 17 pname = "rav1e"; 18 - version = "0.6.6"; 18 + version = "0.7.1"; 19 19 20 20 src = fetchCrate { 21 21 inherit pname version; 22 - sha256 = "sha256-urYMT1sJUMBj1L/2Hi+hcYbWbi0ScSls0pm9gLj9H3o="; 22 + sha256 = "sha256-Db7qb7HBAy6lniIiN07iEzURmbfNtuhmgJRv7OUagUM="; 23 23 }; 24 24 25 - cargoHash = "sha256-qQfEpynhlIEKU1Ptq/jM1Wdtn+BVCZT1lmou2S1GL4I="; 25 + cargoHash = "sha256-VyQ6n2kIJ7OjK6Xlf0T0GNsBvgESRETzKZDZzAn8ZuY="; 26 26 27 27 depsBuildBuild = [ pkg-config ]; 28 28 ··· 38 38 # Darwin uses `llvm-strip`, which results in link errors when using `-x` to strip the asm library 39 39 # and linking it with cctools ld64. 40 40 postPatch = lib.optionalString (stdenv.isDarwin && stdenv.isx86_64) '' 41 - substituteInPlace build.rs --replace 'cmd.arg("-x")' 'cmd.arg("-S")' 41 + substituteInPlace build.rs --replace-fail '.arg("-x")' '.arg("-S")' 42 42 ''; 43 43 44 44 checkType = "debug";
+1 -14
pkgs/tools/virtualization/mkosi/default.nix
··· 30 30 let 31 31 # For systemd features used by mkosi, see 32 32 # https://github.com/systemd/mkosi/blob/19bb5e274d9a9c23891905c4bcbb8f68955a701d/action.yaml#L64-L72 33 - systemdForMkosi = (systemd.overrideAttrs (oldAttrs: { 34 - patches = oldAttrs.patches ++ [ 35 - # Enable setting a deterministic verity seed for systemd-repart. Remove when upgrading to systemd 255. 36 - (fetchpatch { 37 - url = "https://github.com/systemd/systemd/commit/81e04781106e3db24e9cf63c1d5fdd8215dc3f42.patch"; 38 - hash = "sha256-KO3poIsvdeepPmXWQXNaJJCPpmBb4sVmO+ur4om9f5k="; 39 - }) 40 - # repart: make sure rewinddir() is called before readdir() when performing rm -rf. Remove when upgrading to systemd 255. 41 - (fetchpatch { 42 - url = "https://github.com/systemd/systemd/commit/6bbb893b90e2dcb05fb310ba4608f9c9dc587845.patch"; 43 - hash = "sha256-A6cF2QAeYHGc0u0V1JMxIcV5shzf5x3Q6K+blZOWSn4="; 44 - }) 45 - ]; 46 - })).override { 33 + systemdForMkosi = systemd.override { 47 34 withRepart = true; 48 35 withBootloader = true; 49 36 withSysusers = true;
+38 -28
pkgs/top-level/aliases.nix
··· 24 24 # to appear while listing all the packages available. 25 25 removeRecurseForDerivations = alias: with lib; 26 26 if alias.recurseForDerivations or false 27 - then removeAttrs alias ["recurseForDerivations"] 27 + then removeAttrs alias [ "recurseForDerivations" ] 28 28 else alias; 29 29 30 30 # Disabling distribution prevents top-level aliases for non-recursed package ··· 41 41 else alias; 42 42 43 43 mapAliases = aliases: 44 - lib.mapAttrs (n: alias: 45 - removeDistribute 46 - (removeRecurseForDerivations 47 - (checkInPkgs n alias))) 44 + lib.mapAttrs 45 + (n: alias: 46 + removeDistribute 47 + (removeRecurseForDerivations 48 + (checkInPkgs n alias))) 48 49 aliases; 49 50 in 50 51 ··· 59 60 a4term = a4; # Added 2023-10-06 60 61 aether = throw "aether has been removed from nixpkgs; upstream unmaintained, security issues"; # Added 2023-10-03 61 62 airfield = throw "airfield has been removed due to being unmaintained"; # Added 2023-05-19 62 - alertmanager-bot = throw "alertmanager-bot is broken and has been archived by upstream" ; # Added 2023-07-28 63 + alertmanager-bot = throw "alertmanager-bot is broken and has been archived by upstream"; # Added 2023-07-28 63 64 alsa-project = throw "alsa-project was removed and its sub-attributes were promoted to top-level."; # Added 2023-11-12 64 65 alsaLib = alsa-lib; # Added 2021-06-09 65 66 alsaOss = alsa-oss; # Added 2021-06-10 ··· 102 103 bitwig-studio2 = throw "bitwig-studio2 has been removed, you can upgrade to 'bitwig-studio'"; # Added 2023-01-03 103 104 blender-with-packages = args: 104 105 lib.warn "blender-with-packages is deprecated in favor of blender.withPackages, e.g. `blender.withPackages(ps: [ ps.foobar ])`" 105 - (blender.withPackages (_: args.packages)).overrideAttrs (lib.optionalAttrs (args ? name) { pname = "blender-" + args.name; }); # Added 2023-10-30 106 + (blender.withPackages (_: args.packages)).overrideAttrs 107 + (lib.optionalAttrs (args ? name) { pname = "blender-" + args.name; }); # Added 2023-10-30 106 108 bluezFull = throw "'bluezFull' has been renamed to/replaced by 'bluez'"; # Converted to throw 2023-09-10 107 109 bookletimposer = throw "bookletimposer has been removed from nixpkgs; upstream unmaintained and broke with pypdf3"; # Added 2024-01-01 108 110 boost168 = throw "boost168 has been deprecated in favor of the latest version"; # Added 2023-06-08 ··· 188 190 clang16Stdenv = lowPrio llvmPackages_16.stdenv; 189 191 clang17Stdenv = lowPrio llvmPackages_17.stdenv; 190 192 191 - clang-tools_6 = throw "clang-tools_6 has been removed from nixpkgs"; # Added 2024-01-08 192 - clang-tools_7 = throw "clang-tools_7 has been removed from nixpkgs"; # Added 2023-11-19 193 - clang_6 = throw "clang_6 has been removed from nixpkgs"; # Added 2024-01-08 194 - clang_7 = throw "clang_7 has been removed from nixpkgs"; # Added 2023-11-19 193 + clang-tools_6 = throw "clang-tools_6 has been removed from nixpkgs"; # Added 2024-01-08 194 + clang-tools_7 = throw "clang-tools_7 has been removed from nixpkgs"; # Added 2023-11-19 195 + clang_6 = throw "clang_6 has been removed from nixpkgs"; # Added 2024-01-08 196 + clang_7 = throw "clang_7 has been removed from nixpkgs"; # Added 2023-11-19 195 197 196 198 ### D ### 197 199 ··· 223 225 dotnet-sdk_3 = dotnetCorePackages.sdk_3_1; # Added 2020-01-19 224 226 dotnet-sdk_5 = dotnetCorePackages.sdk_5_0; # Added 2020-09-11 225 227 drgeo = throw "'drgeo' has been removed as it is outdated and unmaintained"; # Added 2023-10-15 226 - dtv-scan-tables_linuxtv = dtv-scan-tables; # Added 2023-03-03 227 - dtv-scan-tables_tvheadend = dtv-scan-tables; # Added 2023-03-03 228 + dtv-scan-tables_linuxtv = dtv-scan-tables; # Added 2023-03-03 229 + dtv-scan-tables_tvheadend = dtv-scan-tables; # Added 2023-03-03 228 230 dylibbundler = macdylibbundler; # Added 2021-04-24 229 231 230 232 ### E ### ··· 344 346 345 347 gnuradio-with-packages = gnuradio3_7.override { 346 348 extraPackages = lib.attrVals [ 347 - "osmosdr" "ais" "gsm" "nacl" "rds" "limesdr" 348 - ] gnuradio3_7Packages; 349 + "osmosdr" 350 + "ais" 351 + "gsm" 352 + "nacl" 353 + "rds" 354 + "limesdr" 355 + ] 356 + gnuradio3_7Packages; 349 357 }; # Added 2020-10-16 350 358 351 359 gmock = gtest; # moved from top-level 2021-03-14 ··· 371 379 google-chrome-dev = throw "'google-chrome-dev' has been removed due to the lack of maintenance in nixpkgs. Consider using 'google-chrome' instead."; # Added 2023-10-18 372 380 google-gflags = throw "'google-gflags' has been renamed to/replaced by 'gflags'"; # Converted to throw 2023-09-10 373 381 go-thumbnailer = thud; # Added 2023-09-21 382 + gocode = throw "'gocode' has been removed as the upstream project was archived. 'gopls' is suggested as replacement"; # Added 2023-12-26 374 383 govendor = throw "'govendor' has been removed as it is no longer maintained upstream, please use Go modules instead"; # Added 2023-12-26 375 384 gometer = throw "gometer has been removed from nixpkgs because goLance stopped offering Linux support"; # Added 2023-02-10 376 385 ··· 471 480 kerberos = libkrb5; # moved from top-level 2021-03-14 472 481 kexectools = kexec-tools; # Added 2021-09-03 473 482 keysmith = libsForQt5.kdeGear.keysmith; # Added 2021-07-14 474 - kfctl = throw "kfctl is broken and has been archived by upstream" ; # Added 2023-08-21 483 + kfctl = throw "kfctl is broken and has been archived by upstream"; # Added 2023-08-21 475 484 kgx = gnome-console; # Added 2022-02-19 476 485 kibana7 = throw "Kibana 7.x has been removed from nixpkgs as it depends on an end of life Node.js version and received no maintenance in time."; # Added 2023-30-10 477 486 kibana = kibana7; ··· 518 527 librewolf-wayland = librewolf; # Added 2022-11-15 519 528 libseat = seatd; # Added 2021-06-24 520 529 libsigcxx12 = throw "'libsigcxx12' has been removed, please use newer versions"; # Added 2023-10-20 521 - libsForQt515 = libsForQt5; # Added 2022-11-24 530 + libsForQt515 = libsForQt5; # Added 2022-11-24 522 531 libtensorflow-bin = libtensorflow; # Added 2022-09-25 523 532 libtorrentRasterbar = libtorrent-rasterbar; # Added 2020-12-20 524 533 libtorrentRasterbar-1_2_x = libtorrent-rasterbar-1_2_x; # Added 2020-12-20 ··· 705 714 neochat = libsForQt5.kdeGear.neochat; # added 2022-05-10 706 715 nitrokey-udev-rules = libnitrokey; # Added 2023-03-25 707 716 nix-direnv-flakes = nix-direnv; 708 - nix-repl = throw ( # Added 2018-08-26 717 + nix-repl = throw ( 718 + # Added 2018-08-26 709 719 "nix-repl has been removed because it's not maintained anymore, " + 710 720 "use `nix repl` instead. Also see https://github.com/NixOS/nixpkgs/pull/44903" 711 721 ); 712 722 nix-review = throw "'nix-review' has been renamed to/replaced by 'nixpkgs-review'"; # Converted to throw 2023-09-10 713 - nix-template-rpm = throw "'nix-template-rpm' has been removed as it is broken and unmaintained" ; # Added 2023-11-20 723 + nix-template-rpm = throw "'nix-template-rpm' has been removed as it is broken and unmaintained"; # Added 2023-11-20 714 724 nixFlakes = nixVersions.stable; # Added 2021-05-21 715 725 nixStable = nixVersions.stable; # Added 2022-01-24 716 726 nixUnstable = nixVersions.unstable; # Added 2022-01-26 ··· 866 876 qlandkartegt = throw "'qlandkartegt' has been removed from nixpkgs, as it was broken and unmaintained"; # Added 2023-04-17 867 877 qscintilla = libsForQt5.qscintilla; # Added 2023-09-20 868 878 qscintilla-qt6 = qt6Packages.qscintilla; # Added 2023-09-20 869 - qt515 = qt5; # Added 2022-11-24 879 + qt515 = qt5; # Added 2022-11-24 870 880 qt5ct = libsForQt5.qt5ct; # Added 2021-12-27 871 881 qt6ct = qt6Packages.qt6ct; # Added 2023-03-07 872 882 qtcurve = libsForQt5.qtcurve; # Added 2020-11-07 ··· 955 965 sgtpuzzles = throw "'sgtpuzzles' has been renamed to 'sgt-puzzles'"; # Added 2023-10-06 956 966 sgtpuzzles-mobile = throw "'sgtpuzzles-mobile' has been renamed to 'sgt-puzzles-mobile'"; # Added 2023-10-06 957 967 inherit (libsForQt5.mauiPackages) shelf; # added 2022-05-17 958 - shhgit = throw "shhgit is broken and is no longer maintained. See https://github.com/eth0izzle/shhgit#-shhgit-is-no-longer-maintained-" ; # Added 2023-08-08 968 + shhgit = throw "shhgit is broken and is no longer maintained. See https://github.com/eth0izzle/shhgit#-shhgit-is-no-longer-maintained-"; # Added 2023-08-08 959 969 shipyard = jumppad; # Added 2023-06-06 960 970 signumone-ks = throw "signumone-ks has been removed from nixpkgs because the developers stopped offering the binaries"; # Added 2023-08-17 961 971 simplenote = throw "'simplenote' has been removed because it is no longer maintained and insecure"; # Added 2023-10-09 ··· 1074 1084 vamp = { vampSDK = vamp-plugin-sdk; }; # Added 2020-03-26 1075 1085 vaapiIntel = intel-vaapi-driver; # Added 2023-05-31 1076 1086 vaultwarden-vault = vaultwarden.webvault; # Added 2022-12-13 1077 - vdirsyncerStable = vdirsyncer; # Added 2020-11-08, see https://github.com/NixOS/nixpkgs/issues/103026#issuecomment-723428168 1087 + vdirsyncerStable = vdirsyncer; # Added 2020-11-08, see https://github.com/NixOS/nixpkgs/issues/103026#issuecomment-723428168 1078 1088 ventoy-bin = ventoy; # Added 2023-04-12 1079 1089 ventoy-bin-full = ventoy-full; # Added 2023-04-12 1080 1090 ViennaRNA = viennarna; # Added 2023-08-23 ··· 1172 1182 }); 1173 1183 1174 1184 /* If these are in the scope of all-packages.nix, they cause collisions 1175 - between mixed versions of qt. See: 1185 + between mixed versions of qt. See: 1176 1186 https://github.com/NixOS/nixpkgs/pull/101369 */ 1177 1187 1178 1188 inherit (plasma5Packages) ··· 1195 1205 plasma-vault plasma-workspace plasma-workspace-wallpapers polkit-kde-agent 1196 1206 powerdevil qqc2-breeze-style sddm-kcm skanlite skanpage spectacle 1197 1207 systemsettings xdg-desktop-portal-kde yakuake zanshin 1198 - ; 1208 + ; 1199 1209 1200 - kalendar = merkuro; # Renamed in 23.08 1210 + kalendar = merkuro; # Renamed in 23.08 1201 1211 kfloppy = throw "kfloppy has been removed upstream in KDE Gear 23.08"; 1202 1212 1203 1213 inherit (plasma5Packages.thirdParty) ··· 1208 1218 kwin-tiling 1209 1219 plasma-applet-caffeine-plus 1210 1220 plasma-applet-virtual-desktop-bar 1211 - ; 1221 + ; 1212 1222 1213 1223 inherit (libsForQt5) 1214 1224 sddm 1215 - ; 1225 + ; 1216 1226 1217 1227 inherit (pidginPackages) 1218 1228 pidgin-indicator ··· 1240 1250 tdlib-purple 1241 1251 pidgin-opensteamworks 1242 1252 purple-facebook 1243 - ; 1253 + ; 1244 1254 1245 1255 })
+20 -11
pkgs/top-level/all-packages.nix
··· 184 184 autoreconfHook269 = autoreconfHook.override { 185 185 autoconf = autoconf269; 186 186 }; 187 + autoreconfHook271 = autoreconfHook.override { 188 + autoconf = autoconf271; 189 + }; 187 190 188 191 autorestic = callPackage ../tools/backup/autorestic { }; 189 192 ··· 7336 7339 gsaslSupport = true; 7337 7340 rtmpSupport = true; 7338 7341 pslSupport = true; 7342 + websocketSupport = true; 7339 7343 }; 7340 7344 7341 7345 curlHTTP3 = curl.override { ··· 15820 15824 default-gcc-version = 15821 15825 if (with stdenv.targetPlatform; isVc4 || libc == "relibc") then 6 15822 15826 else if stdenv.buildPlatform.isDarwin then 12 # unable to test 15823 - else if stdenv.buildPlatform.isAarch64 then 12 # unable to test 15824 15827 else 13; 15825 15828 gcc = pkgs.${"gcc${toString default-gcc-version}"}; 15826 15829 gccFun = callPackage ../development/compilers/gcc; ··· 16673 16676 buildLlvmTools = buildPackages.llvmPackages_11.tools; 16674 16677 targetLlvmLibraries = targetPackages.llvmPackages_11.libraries or llvmPackages_11.libraries; 16675 16678 targetLlvm = targetPackages.llvmPackages_11.llvm or llvmPackages_11.llvm; 16679 + stdenv = if stdenv.cc.cc.isGNU or false then gcc12Stdenv else stdenv; # does not build with gcc13 16676 16680 })); 16677 16681 16678 16682 llvmPackages_12 = recurseIntoAttrs (callPackage ../development/compilers/llvm/12 ({ ··· 16680 16684 buildLlvmTools = buildPackages.llvmPackages_12.tools; 16681 16685 targetLlvmLibraries = targetPackages.llvmPackages_12.libraries or llvmPackages_12.libraries; 16682 16686 targetLlvm = targetPackages.llvmPackages_12.llvm or llvmPackages_12.llvm; 16687 + stdenv = if stdenv.cc.cc.isGNU or false then gcc12Stdenv else stdenv; # .libcxxabi does not build with gcc13 16683 16688 })); 16684 16689 16685 16690 llvmPackages_13 = recurseIntoAttrs (callPackage ../development/compilers/llvm/13 ({ ··· 18475 18480 18476 18481 autobuild = callPackage ../development/tools/misc/autobuild { }; 18477 18482 18478 - autoconf = autoconf271; 18479 - 18480 18483 autoconf-archive = callPackage ../development/tools/misc/autoconf-archive { }; 18481 18484 18485 + autoconf = callPackage ../development/tools/misc/autoconf { }; 18482 18486 autoconf213 = callPackage ../development/tools/misc/autoconf/2.13.nix { }; 18483 18487 autoconf264 = callPackage ../development/tools/misc/autoconf/2.64.nix { }; 18484 18488 autoconf269 = callPackage ../development/tools/misc/autoconf/2.69.nix { }; 18485 - autoconf271 = callPackage ../development/tools/misc/autoconf { }; 18489 + autoconf271 = callPackage ../development/tools/misc/autoconf/2.71.nix { }; 18486 18490 18487 18491 acr = callPackage ../development/tools/misc/acr { }; 18488 18492 ··· 27664 27668 27665 27669 blktrace = callPackage ../os-specific/linux/blktrace { }; 27666 27670 27667 - bluez5 = callPackage ../os-specific/linux/bluez { }; 27671 + bluez5 = bluez; 27672 + bluez5-experimental = bluez-experimental; 27668 27673 27669 - bluez5-experimental = callPackage ../os-specific/linux/bluez { 27670 - withExperimental = true; 27674 + bluez-experimental = bluez.override { 27675 + enableExperimental = true; 27671 27676 }; 27672 - 27673 - bluez = bluez5; 27674 27677 27675 27678 bolt = callPackage ../os-specific/linux/bolt { }; 27676 27679 ··· 28364 28367 28365 28368 go-outline = callPackage ../development/tools/go-outline { }; 28366 28369 28367 - gocode = callPackage ../development/tools/gocode { }; 28368 - 28369 28370 gocode-gomod = callPackage ../development/tools/gocode-gomod { }; 28370 28371 28371 28372 goconst = callPackage ../development/tools/goconst { }; ··· 28734 28735 withHomed = false; 28735 28736 withHwdb = false; 28736 28737 withImportd = false; 28738 + withIptables = false; 28737 28739 withLibBPF = false; 28738 28740 withLibidn2 = false; 28739 28741 withLocaled = false; ··· 28757 28759 withUserDb = false; 28758 28760 withUkify = false; 28759 28761 withBootloader = false; 28762 + withPasswordQuality = false; 28763 + withVmspawn = false; 28764 + withQrencode = false; 28760 28765 }; 28761 28766 systemdLibs = systemdMinimal.override { 28762 28767 pname = "systemd-minimal-libs"; ··· 34231 34236 }; 34232 34237 34233 34238 mupdf = callPackage ../applications/misc/mupdf { }; 34239 + mupdf-headless = mupdf.override { 34240 + enableX11 = false; 34241 + enableGL = false; 34242 + }; 34234 34243 mupdf_1_17 = callPackage ../applications/misc/mupdf/1.17 { }; 34235 34244 34236 34245 muso = callPackage ../applications/audio/muso {
+2
pkgs/top-level/linux-kernels.nix
··· 458 458 459 459 facetimehd = callPackage ../os-specific/linux/facetimehd { }; 460 460 461 + rust-out-of-tree-module = if lib.versionAtLeast kernel.version "6.7" then callPackage ../os-specific/linux/rust-out-of-tree-module { } else null; 462 + 461 463 tuxedo-keyboard = if lib.versionAtLeast kernel.version "4.14" then callPackage ../os-specific/linux/tuxedo-keyboard { } else null; 462 464 463 465 jool = callPackage ../os-specific/linux/jool { };
+1
pkgs/top-level/python-aliases.nix
··· 356 356 pyramid_multiauth = pyramid-multiauth; # added 2023-08-24 357 357 pyreadability = readability-lxml; # added 2022-05-24 358 358 pyres = throw "pyres has been removed, since it is abandoned and broken"; # added 2023-06-20 359 + pyRFC3339 = pyrfc3339; # added 2024-01-07 359 360 pyroute2-core = throw "pyroute2 migrated back to a single package scheme in version 0.7.1"; # added 2022-07-16 360 361 pyroute2-ethtool = throw "pyroute2 migrated back to a single package scheme in version 0.7.1"; # added 2022-07-16 361 362 pyroute2-ipdb = throw "pyroute2 migrated back to a single package scheme in version 0.7.1"; # added 2022-07-16
+3 -3
pkgs/top-level/python-packages.nix
··· 2558 2558 cython = callPackage ../development/python-modules/cython { }; 2559 2559 2560 2560 cython_3 = self.cython.overridePythonAttrs (old: rec { 2561 - version = "3.0.6"; 2561 + version = "3.0.7"; 2562 2562 src = old.src.override { 2563 2563 inherit version; 2564 - hash = "sha256-OZ0YVnLGZ7Juq73KQgyYVkWDeYrzvEdnCooJ6fGd1mA="; 2564 + hash = "sha256-+ymazzpXhXPBkMhY1J4M+ddfS8ScPyTFpjgEmX7wkhM="; 2565 2565 }; 2566 2566 patches = [ ]; 2567 2567 }); ··· 11165 11165 11166 11166 pyrituals = callPackage ../development/python-modules/pyrituals { }; 11167 11167 11168 - pyRFC3339 = callPackage ../development/python-modules/pyrfc3339 { }; 11168 + pyrfc3339 = callPackage ../development/python-modules/pyrfc3339 { }; 11169 11169 11170 11170 pyrmvtransport = callPackage ../development/python-modules/pyrmvtransport { }; 11171 11171
+2 -2
pkgs/top-level/unixtools.nix
··· 174 174 darwin = pkgs.darwin.basic_cmds; 175 175 }; 176 176 xxd = { 177 - linux = pkgs.vim; 178 - darwin = pkgs.vim; 177 + linux = pkgs.vim.xxd; 178 + darwin = pkgs.vim.xxd; 179 179 }; 180 180 }; 181 181