lol

Merge staging-next into staging

authored by

github-actions[bot] and committed by
GitHub
445e4a40 1db7f30d

+247 -213
+1 -1
.github/workflows/backport.yml
··· 24 24 with: 25 25 ref: ${{ github.event.pull_request.head.sha }} 26 26 - name: Create backport PRs 27 - uses: korthout/backport-action@v1.1.0 27 + uses: korthout/backport-action@v1.2.0 28 28 with: 29 29 # Config README: https://github.com/korthout/backport-action#backport-action 30 30 pull_description: |-
+1 -1
maintainers/maintainer-list.nix
··· 10147 10147 email = "arthur@cri.epita.fr"; 10148 10148 github = "MrFreezeex"; 10149 10149 name = "Arthur Outhenin-Chalandre"; 10150 - githubId = 14573967; 10150 + githubId = 3845213; 10151 10151 }; 10152 10152 mrityunjaygr8 = { 10153 10153 email = "mrityunjaysaxena1996@gmail.com";
-8
nixos/modules/virtualisation/podman/default.nix
··· 183 183 184 184 systemd.packages = [ cfg.package ]; 185 185 186 - systemd.services.podman.serviceConfig = { 187 - ExecStart = [ "" "${cfg.package}/bin/podman $LOGGING system service" ]; 188 - }; 189 - 190 186 systemd.services.podman-prune = { 191 187 description = "Prune podman resources"; 192 188 ··· 206 202 207 203 systemd.sockets.podman.wantedBy = [ "sockets.target" ]; 208 204 systemd.sockets.podman.socketConfig.SocketGroup = "podman"; 209 - 210 - systemd.user.services.podman.serviceConfig = { 211 - ExecStart = [ "" "${cfg.package}/bin/podman $LOGGING system service" ]; 212 - }; 213 205 214 206 systemd.user.sockets.podman.wantedBy = [ "sockets.target" ]; 215 207
+4
nixos/tests/podman/default.nix
··· 8 8 nodes = { 9 9 rootful = { pkgs, ... }: { 10 10 virtualisation.podman.enable = true; 11 + 12 + # hack to ensure that podman built with and without zfs in extraPackages is cached 13 + boot.supportedFilesystems = [ "zfs" ]; 14 + networking.hostId = "00000000"; 11 15 }; 12 16 rootless = { pkgs, ... }: { 13 17 virtualisation.podman.enable = true;
+4 -1
pkgs/applications/audio/reaper/default.nix
··· 4 4 , makeWrapper 5 5 6 6 , alsa-lib 7 + , curl 7 8 , gtk3 8 9 , lame 10 + , libxml2 9 11 , ffmpeg 10 12 , vlc 11 13 , xdg-utils ··· 69 71 # Setting the rpath of the plugin shared object files does not 70 72 # seem to have an effect for some plugins. 71 73 # We opt for wrapping the executable with LD_LIBRARY_PATH prefix. 74 + # Note that libcurl and libxml2 are needed for ReaPack to run. 72 75 wrapProgram $out/opt/REAPER/reaper \ 73 - --prefix LD_LIBRARY_PATH : "${lib.makeLibraryPath [ lame ffmpeg vlc xdotool ]}" 76 + --prefix LD_LIBRARY_PATH : "${lib.makeLibraryPath [ curl lame libxml2 ffmpeg vlc xdotool stdenv.cc.cc.lib ]}" 74 77 75 78 mkdir $out/bin 76 79 ln -s $out/opt/REAPER/reaper $out/bin/
+3
pkgs/applications/editors/neovim/utils.nix
··· 89 89 python3 = withPython3; 90 90 ruby = withRuby; 91 91 }; 92 + # as expected by packdir 93 + packpathDirs.myNeovimPackages = myVimPackage; 92 94 ## Here we calculate all of the arguments to the 1st call of `makeWrapper` 93 95 # We start with the executable itself NOTE we call this variable "initial" 94 96 # because if configure != {} we need to call makeWrapper twice, in order to ··· 131 133 132 134 builtins.removeAttrs args ["plugins"] // { 133 135 wrapperArgs = makeWrapperArgs; 136 + inherit packpathDirs; 134 137 inherit neovimRcContent; 135 138 inherit manifestRc; 136 139 inherit python3Env;
+2 -2
pkgs/applications/editors/vscode/extensions/default.nix
··· 2597 2597 mktplcRef = { 2598 2598 name = "code-spell-checker"; 2599 2599 publisher = "streetsidesoftware"; 2600 - version = "2.17.1"; 2601 - sha256 = "sha256-gQSAq63fqniHmA9T0nKpUAzo+kpSCZzblr6FQ33LIPI="; 2600 + version = "2.18.0"; 2601 + sha256 = "sha256-HwexlpPW15sXoxPQXDHWcQ8Yvz/5KMtZO4A34rXoXQ8="; 2602 2602 }; 2603 2603 meta = with lib; { 2604 2604 changelog = "https://marketplace.visualstudio.com/items/streetsidesoftware.code-spell-checker/changelog";
+1 -1
pkgs/applications/graphics/drawio/headless.nix
··· 21 21 # Drawio needs to run in a virtual X session, because Electron 22 22 # refuses to work and dies with an unhelpful error message otherwise: 23 23 # "The futex facility returned an unexpected error code." 24 - XDG_CONFIG_HOME="$tmpdir" ${xvfb-run}/bin/xvfb-run ${drawio}/bin/drawio $@ 24 + XDG_CONFIG_HOME="$tmpdir" ${xvfb-run}/bin/xvfb-run --auto-display ${drawio}/bin/drawio $@ 25 25 ''; 26 26 27 27 meta = with lib; {
+6
pkgs/applications/graphics/gnome-decoder/default.nix
··· 65 65 66 66 LIBCLANG_PATH = "${libclang.lib}/lib"; 67 67 68 + # FIXME: workaround for Pipewire 0.3.64 deprecated API change, remove when fixed upstream 69 + # https://gitlab.freedesktop.org/pipewire/pipewire-rs/-/issues/55 70 + preBuild = '' 71 + export BINDGEN_EXTRA_CLANG_ARGS="$BINDGEN_EXTRA_CLANG_ARGS -DPW_ENABLE_DEPRECATED" 72 + ''; 73 + 68 74 meta = with lib; { 69 75 description = "Scan and Generate QR Codes"; 70 76 homepage = "https://gitlab.gnome.org/World/decoder";
+3 -3
pkgs/applications/misc/bottles/default.nix
··· 29 29 30 30 python3Packages.buildPythonApplication rec { 31 31 pname = "bottles-unwrapped"; 32 - version = "50.2"; 32 + version = "51.5"; 33 33 34 34 src = fetchFromGitHub { 35 35 owner = "bottlesdevs"; 36 36 repo = "bottles"; 37 37 rev = version; 38 - sha256 = "sha256-+r/r3vExnvYQIicKAEmwZ+eRSep6kWte5k7gu9jC67w="; 38 + sha256 = "sha256-8VF/CD0Wu2eV6wOpj/M6peKDthFWlcg+1NzzTSIH4S8="; 39 39 }; 40 40 41 41 patches = [ ./vulkan_icd.patch ]; ··· 60 60 ]; 61 61 62 62 propagatedBuildInputs = with python3Packages; [ 63 + pathvalidate 63 64 pycurl 64 65 pyyaml 65 66 requests ··· 72 73 chardet 73 74 certifi 74 75 idna 75 - pillow 76 76 orjson 77 77 icoextract 78 78 ] ++ [
+2 -2
pkgs/applications/networking/freefilesync/default.nix
··· 14 14 15 15 gcc12Stdenv.mkDerivation rec { 16 16 pname = "freefilesync"; 17 - version = "12.0"; 17 + version = "12.1"; 18 18 19 19 src = fetchFromGitHub { 20 20 owner = "hkneptune"; 21 21 repo = "FreeFileSync"; 22 22 rev = "v${version}"; 23 - hash = "sha256-7vdhSEh43mpVbrzJzt005EkwoXfknYnAC+FZIAZF020="; 23 + hash = "sha256-KA3Bn8skJ2gMmihmwlUmN6jXZmfoYY/f4vqbKwvxwgw="; 24 24 }; 25 25 26 26 # Patches from ROSA Linux
+2 -2
pkgs/applications/networking/maestral-qt/default.nix
··· 7 7 8 8 python3.pkgs.buildPythonApplication rec { 9 9 pname = "maestral-qt"; 10 - version = "1.6.5"; 10 + version = "1.7.1"; 11 11 disabled = python3.pythonOlder "3.7"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "SamSchott"; 15 15 repo = "maestral-qt"; 16 16 rev = "refs/tags/v${version}"; 17 - hash = "sha256-yKsCM8LZ/GR/bc2WW+Ml1vSroB4iaxh09Az/B+aIVBU="; 17 + hash = "sha256-YYlH9s3iNEIacs8izEnIU32j+2lruQ5JJrjvDIzQjRE="; 18 18 }; 19 19 20 20 format = "pyproject";
+57 -16
pkgs/applications/virtualization/podman/default.nix
··· 14 14 , go-md2man 15 15 , nixosTests 16 16 , python3 17 + , makeWrapper 18 + , symlinkJoin 19 + , extraPackages ? [ ] 20 + , runc 21 + , crun 22 + , conmon 23 + , slirp4netns 24 + , fuse-overlayfs 25 + , util-linux 26 + , iptables 27 + , iproute2 28 + , catatonit 29 + , gvproxy 30 + , aardvark-dns 31 + , netavark 17 32 , testers 18 33 , podman 19 34 }: 35 + let 36 + # do not add qemu to this wrapper, store paths get written to the podman vm config and break when GCed 20 37 38 + binPath = lib.makeBinPath ([ 39 + ] ++ lib.optionals stdenv.isLinux [ 40 + runc 41 + crun 42 + conmon 43 + slirp4netns 44 + fuse-overlayfs 45 + util-linux 46 + iptables 47 + iproute2 48 + ] ++ extraPackages); 49 + 50 + helpersBin = symlinkJoin { 51 + name = "podman-helper-binary-wrapper"; 52 + 53 + # this only works for some binaries, others may need to be be added to `binPath` or in the modules 54 + paths = [ 55 + gvproxy 56 + ] ++ lib.optionals stdenv.isLinux [ 57 + aardvark-dns 58 + catatonit # added here for the pause image and also set in `containersConf` for `init_path` 59 + netavark 60 + ]; 61 + }; 62 + in 21 63 buildGoModule rec { 22 64 pname = "podman"; 23 65 version = "4.4.2"; ··· 38 80 39 81 doCheck = false; 40 82 41 - outputs = [ "out" "man" ] ++ lib.optionals stdenv.isLinux [ "rootlessport" ]; 83 + outputs = [ "out" "man" ]; 42 84 43 - nativeBuildInputs = [ pkg-config go-md2man installShellFiles python3 ]; 85 + nativeBuildInputs = [ pkg-config go-md2man installShellFiles makeWrapper python3 ]; 44 86 45 87 buildInputs = lib.optionals stdenv.isLinux [ 46 88 btrfs-progs ··· 52 94 systemd 53 95 ]; 54 96 97 + HELPER_BINARIES_DIR = "${PREFIX}/libexec/podman"; # used in buildPhase & installPhase 98 + PREFIX = "${placeholder "out"}"; 99 + 55 100 buildPhase = '' 56 101 runHook preBuild 57 102 patchShebangs . 58 103 ${if stdenv.isDarwin then '' 59 104 make podman-remote # podman-mac-helper uses FHS paths 60 105 '' else '' 61 - make bin/podman bin/rootlessport 106 + make bin/podman bin/rootlessport bin/quadlet 62 107 ''} 63 108 make docs 64 109 runHook postBuild ··· 66 111 67 112 installPhase = '' 68 113 runHook preInstall 69 - mkdir -p {$out/{bin,etc,lib,share},$man} # ensure paths exist for the wrapper 70 114 ${if stdenv.isDarwin then '' 71 - mv bin/{darwin/podman,podman} 115 + install bin/darwin/podman -Dt $out/bin 72 116 '' else '' 73 - install -Dm644 contrib/tmpfile/podman.conf -t $out/lib/tmpfiles.d 74 - for s in contrib/systemd/**/*.in; do 75 - substituteInPlace "$s" --replace "@@PODMAN@@" "podman" # don't use unwrapped binary 76 - done 77 - PREFIX=$out make install.systemd 78 - install -Dm555 bin/rootlessport -t $rootlessport/bin 117 + make install.bin install.systemd 79 118 ''} 80 - install -Dm555 bin/podman -t $out/bin 81 - PREFIX=$out make install.completions 82 - MANDIR=$man/share/man make install.man 119 + make install.completions install.man 120 + mkdir -p ${HELPER_BINARIES_DIR} 121 + ln -s ${helpersBin}/bin/* ${HELPER_BINARIES_DIR} 122 + wrapProgram $out/bin/podman \ 123 + --prefix PATH : ${lib.escapeShellArg binPath} 83 124 runHook postInstall 84 125 ''; 85 126 86 127 postFixup = lib.optionalString stdenv.isLinux '' 87 - RPATH=$(patchelf --print-rpath $out/bin/podman) 88 - patchelf --set-rpath "${lib.makeLibraryPath [ systemd ]}":$RPATH $out/bin/podman 128 + RPATH=$(patchelf --print-rpath $out/bin/.podman-wrapped) 129 + patchelf --set-rpath "${lib.makeLibraryPath [ systemd ]}":$RPATH $out/bin/.podman-wrapped 89 130 ''; 90 131 91 132 passthru.tests = {
-78
pkgs/applications/virtualization/podman/wrapper.nix
··· 1 - { podman-unwrapped 2 - , runCommand 3 - , makeWrapper 4 - , symlinkJoin 5 - , lib 6 - , stdenv 7 - , extraPackages ? [] 8 - , runc # Default container runtime 9 - , crun # Container runtime (default with cgroups v2 for podman/buildah) 10 - , conmon # Container runtime monitor 11 - , slirp4netns # User-mode networking for unprivileged namespaces 12 - , fuse-overlayfs # CoW for images, much faster than default vfs 13 - , util-linux # nsenter 14 - , iptables 15 - , iproute2 16 - , catatonit 17 - , gvproxy 18 - , aardvark-dns 19 - , netavark 20 - }: 21 - 22 - # do not add qemu to this wrapper, store paths get written to the podman vm config and break when GCed 23 - 24 - let 25 - binPath = lib.makeBinPath ([ 26 - ] ++ lib.optionals stdenv.isLinux [ 27 - runc 28 - crun 29 - conmon 30 - slirp4netns 31 - fuse-overlayfs 32 - util-linux 33 - iptables 34 - iproute2 35 - ] ++ extraPackages); 36 - 37 - helpersBin = symlinkJoin { 38 - name = "${podman-unwrapped.pname}-helper-binary-wrapper-${podman-unwrapped.version}"; 39 - 40 - # this only works for some binaries, others may need to be be added to `binPath` or in the modules 41 - paths = [ 42 - gvproxy 43 - ] ++ lib.optionals stdenv.isLinux [ 44 - aardvark-dns 45 - catatonit # added here for the pause image and also set in `containersConf` for `init_path` 46 - netavark 47 - podman-unwrapped.rootlessport 48 - ]; 49 - }; 50 - 51 - in runCommand podman-unwrapped.name { 52 - name = "${podman-unwrapped.pname}-wrapper-${podman-unwrapped.version}"; 53 - inherit (podman-unwrapped) pname version passthru; 54 - 55 - preferLocalBuild = true; 56 - 57 - meta = builtins.removeAttrs podman-unwrapped.meta [ "outputsToInstall" ]; 58 - 59 - outputs = [ 60 - "out" 61 - "man" 62 - ]; 63 - 64 - nativeBuildInputs = [ 65 - makeWrapper 66 - ]; 67 - 68 - } '' 69 - ln -s ${podman-unwrapped.man} $man 70 - 71 - mkdir -p $out/bin 72 - ln -s ${podman-unwrapped}/etc $out/etc 73 - ln -s ${podman-unwrapped}/lib $out/lib 74 - ln -s ${podman-unwrapped}/share $out/share 75 - makeWrapper ${podman-unwrapped}/bin/podman $out/bin/podman \ 76 - --set CONTAINERS_HELPER_BINARY_DIR ${helpersBin}/bin \ 77 - --prefix PATH : ${lib.escapeShellArg binPath} 78 - ''
+2 -2
pkgs/build-support/coq/default.nix
··· 84 84 inherit (fetched) version src; 85 85 86 86 nativeBuildInputs = args.overrideNativeBuildInputs 87 - or ([ which coq.ocamlPackages.findlib ] 87 + or ([ which ] 88 88 ++ optional useDune coq.ocamlPackages.dune_3 89 - ++ optional (useDune || mlPlugin) coq.ocamlPackages.ocaml 89 + ++ optionals (useDune || mlPlugin) [ coq.ocamlPackages.ocaml coq.ocamlPackages.findlib ] 90 90 ++ (args.nativeBuildInputs or []) ++ extraNativeBuildInputs); 91 91 buildInputs = args.overrideBuildInputs 92 92 or ([ coq ] ++ (args.buildInputs or []) ++ extraBuildInputs);
+2 -2
pkgs/desktops/pantheon/granite/7/default.nix
··· 18 18 19 19 stdenv.mkDerivation rec { 20 20 pname = "granite"; 21 - version = "7.1.0"; 21 + version = "7.2.0"; 22 22 23 23 outputs = [ "out" "dev" ]; 24 24 ··· 26 26 owner = "elementary"; 27 27 repo = pname; 28 28 rev = version; 29 - sha256 = "sha256-tdZSiIK+BW8uhbRxLUcrGQt71jRfVLOTgFNOqeLK6ig="; 29 + sha256 = "sha256-LU2eIeaNqO4/6dPUuzOQ/w4tx0dEm26JwZ87yQ16c4o="; 30 30 }; 31 31 32 32 nativeBuildInputs = [
+1 -1
pkgs/development/coq-modules/coq-elpi/default.nix
··· 56 56 buildFlags = [ "OCAMLWARN=" ]; 57 57 58 58 mlPlugin = true; 59 - propagatedBuildInputs = [ elpi ]; 59 + propagatedBuildInputs = [ coq.ocamlPackages.findlib elpi ]; 60 60 61 61 meta = { 62 62 description = "Coq plugin embedding ELPI.";
+1 -1
pkgs/development/coq-modules/coqhammer/default.nix
··· 42 42 release."1.3-coq8.10".version = "1.3"; 43 43 release."1.1.1-coq8.9".version = "1.1.1"; 44 44 release."1.1-coq8.9".version = "1.1"; 45 - releaseRev = v: "v${v}"; 45 + releaseRev = v: "refs/tags/v${v}"; 46 46 47 47 postPatch = '' 48 48 substituteInPlace Makefile.coq.local --replace \
+3
pkgs/development/libraries/science/chemistry/openmm/default.nix
··· 78 78 "-DCMAKE_LIBRARY_PATH=${cudaPackages.cudatoolkit}/lib64/stubs" 79 79 ]; 80 80 81 + # https://github.com/NixOS/nixpkgs/issues/201254 82 + NIX_LDFLAGS = lib.optionalString (stdenv.isLinux && stdenv.isAarch64 && stdenv.cc.isGNU) "-lgcc"; 83 + 81 84 postInstall = lib.strings.optionalString enablePython '' 82 85 export OPENMM_LIB_PATH=$out/lib 83 86 export OPENMM_INCLUDE_PATH=$out/include
+10
pkgs/development/python-modules/adblock/default.nix
··· 1 1 { lib 2 2 , stdenv 3 3 , fetchFromGitHub 4 + , fetchpatch 4 5 , buildPythonPackage 5 6 , rustPlatform 6 7 , pkg-config ··· 28 29 rev = "refs/tags/${version}"; 29 30 hash = "sha256-5g5xdUzH/RTVwu4Vfb5Cb1t0ruG0EXgiXjrogD/+JCU="; 30 31 }; 32 + 33 + patches = [ 34 + # https://github.com/ArniDagur/python-adblock/pull/91 35 + (fetchpatch { 36 + name = "pep-621-compat.patch"; 37 + url = "https://github.com/ArniDagur/python-adblock/commit/2a8716e0723b60390f0aefd0e05f40ba598ac73f.patch"; 38 + hash = "sha256-n9+LDs0no66OdNZxw3aU57ngWrAbmm6hx4qIuxXoatM="; 39 + }) 40 + ]; 31 41 32 42 cargoDeps = rustPlatform.fetchCargoTarball { 33 43 inherit src;
+2 -2
pkgs/development/python-modules/maestral/default.nix
··· 27 27 28 28 buildPythonPackage rec { 29 29 pname = "maestral"; 30 - version = "1.6.5"; 30 + version = "1.7.1"; 31 31 format = "pyproject"; 32 32 33 33 disabled = pythonOlder "3.7"; ··· 36 36 owner = "SamSchott"; 37 37 repo = "maestral"; 38 38 rev = "refs/tags/v${version}"; 39 - hash = "sha256-YCPMPkvMaZ0uzTiiCbXFDpgDS0yGlfF0wKK2HhYmH+Y="; 39 + hash = "sha256-WYLYDDXxO5ot30oSBkxgJszn8nyAQh5XtCyywBz56J4="; 40 40 }; 41 41 42 42 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/pyvista/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "pyvista"; 14 - version = "0.38.2"; 14 + version = "0.38.3"; 15 15 format = "setuptools"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = pname; 19 19 repo = pname; 20 20 rev = "v${version}"; 21 - hash = "sha256-wyzS/51IXsSuyLIWFVUK4sgtHrppL5Hp52H6aWTcN+c="; 21 + hash = "sha256-DkJZfzBS/amQqZDcsmQo+WlSxOYtIwizXJOjF/N2lSE="; 22 22 }; 23 23 24 24 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/roonapi/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "roonapi"; 14 - version = "0.1.3"; 14 + version = "0.1.4"; 15 15 format = "pyproject"; 16 16 17 17 disabled = pythonOlder "3.7"; ··· 20 20 owner = "pavoni"; 21 21 repo = "pyroon"; 22 22 rev = version; 23 - hash = "sha256-QOFBNTz8g3f6C8Vjkblrd3QFCRrA1WqOCv6xS4GbFC4="; 23 + hash = "sha256-TXIKa5DB5+511fQuHAQwPWqw7vQPP+s1X3U7BgEfzzE="; 24 24 }; 25 25 26 26 nativeBuildInputs = [
+6 -2
pkgs/development/python-modules/tld/default.nix
··· 9 9 10 10 buildPythonPackage rec { 11 11 pname = "tld"; 12 - version = "0.12.7"; 12 + version = "0.13"; 13 13 format = "setuptools"; 14 14 15 15 disabled = pythonOlder "3.7"; 16 16 17 17 src = fetchPypi { 18 18 inherit pname version; 19 - hash = "sha256-tvdynhnODrx3ugpltw1iE665UsAf9gXhKZquX7diHF4="; 19 + hash = "sha256-k93l4cBL3xhEl26uRAcGN50h9KsjW3PAXXSD4HT7Vik="; 20 20 }; 21 + 22 + postPatch = '' 23 + sed -i "/--cov/d" pytest.ini 24 + ''; 21 25 22 26 nativeCheckInputs = [ 23 27 pytestCheckHook
+1 -1
pkgs/development/tools/build-managers/rocm-cmake/default.nix
··· 7 7 8 8 stdenv.mkDerivation (finalAttrs: { 9 9 pname = "rocm-cmake"; 10 - version = "5.4.2"; 10 + version = "5.4.3"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "RadeonOpenCompute";
+5
pkgs/development/tools/jira_cli/default.nix
··· 28 28 homepage = "https://github.com/alisaifee/jira-cli"; 29 29 maintainers = with maintainers; [ nyarly ]; 30 30 license = licenses.mit; 31 + # Project is unmaintained 32 + # https://github.com/alisaifee/jira-cli#this-project-needs-a-new-owner 33 + # Requires suds-jurko which was removed (due to the usage of use_2to3) 34 + # Checked on 2023-02-27 35 + broken = true; 31 36 }; 32 37 }
+3
pkgs/os-specific/linux/kernel/common-config.nix
··· 642 642 XEN_SAVE_RESTORE = option yes; 643 643 XEN_SCRUB_PAGES = whenOlder "4.19" yes; 644 644 XEN_SELFBALLOONING = whenOlder "5.3" yes; 645 + 646 + # Enable device detection on virtio-mmio hypervisors 647 + VIRTIO_MMIO_CMDLINE_DEVICES = yes; 645 648 }; 646 649 647 650 media = {
+30 -30
pkgs/os-specific/linux/kernel/hardened/patches.json
··· 2 2 "4.14": { 3 3 "patch": { 4 4 "extra": "-hardened1", 5 - "name": "linux-hardened-4.14.305-hardened1.patch", 6 - "sha256": "05zcfy7dh8vlbvf9iw99m2xi7d9df254lg3a77hhb8cb264yn6z0", 7 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/4.14.305-hardened1/linux-hardened-4.14.305-hardened1.patch" 5 + "name": "linux-hardened-4.14.307-hardened1.patch", 6 + "sha256": "0fqif3brjhjfwdxjwm12allj5pdgdlfm83h6izlgxkn5iy05cviq", 7 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/4.14.307-hardened1/linux-hardened-4.14.307-hardened1.patch" 8 8 }, 9 - "sha256": "16lmhxqpbhyqmgmlyicjadzz3axhl5smfrr230x45ahkdghwsnx3", 10 - "version": "4.14.305" 9 + "sha256": "00dp0vj9572ig4zsnmhl2a2v5vx40hnjibyifw24x1q6qdaia72f", 10 + "version": "4.14.307" 11 11 }, 12 12 "4.19": { 13 13 "patch": { 14 14 "extra": "-hardened1", 15 - "name": "linux-hardened-4.19.272-hardened1.patch", 16 - "sha256": "1qimbp19mimy6dqv4rc8hb6966sq7l1y72hp0s0vy682qx556zwg", 17 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/4.19.272-hardened1/linux-hardened-4.19.272-hardened1.patch" 15 + "name": "linux-hardened-4.19.274-hardened1.patch", 16 + "sha256": "0hc2ci4jy2jhjmmqmmv6i2g6lj997d8hwgrh68qrraifzd3rjm23", 17 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/4.19.274-hardened1/linux-hardened-4.19.274-hardened1.patch" 18 18 }, 19 - "sha256": "1y8kyc48v8bsl53zc6dsy5xhazv0vyna98fycj181aypicvbk7s8", 20 - "version": "4.19.272" 19 + "sha256": "1a2w6knszfqg7ilnvxrs0kbgcviq90iqw9wp2d6y3qy9jfhnb8k4", 20 + "version": "4.19.274" 21 21 }, 22 22 "5.10": { 23 23 "patch": { 24 24 "extra": "-hardened1", 25 - "name": "linux-hardened-5.10.168-hardened1.patch", 26 - "sha256": "1qhpsvra0b6vwshkxbqjzdz27szj79rwgpi1fv3g4401pa15dk69", 27 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.10.168-hardened1/linux-hardened-5.10.168-hardened1.patch" 25 + "name": "linux-hardened-5.10.170-hardened1.patch", 26 + "sha256": "0fr0rzxrpmcddzamdnc15ywpd396dl8j7ycy19a789vhfz3132bz", 27 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.10.170-hardened1/linux-hardened-5.10.170-hardened1.patch" 28 28 }, 29 - "sha256": "171mmgkjdsn6gx6z8kr5d80aygn4jjf8jc9zfh7m2c4dpab2azdn", 30 - "version": "5.10.168" 29 + "sha256": "0pw2jnsnq2yxxvl4dkx6f7a8gczj8l484qpd4ibw737vprv1idd2", 30 + "version": "5.10.170" 31 31 }, 32 32 "5.15": { 33 33 "patch": { 34 34 "extra": "-hardened1", 35 - "name": "linux-hardened-5.15.94-hardened1.patch", 36 - "sha256": "11w4cs6j9g1p7ycf8zbyf1lx6pq3k8za6llsc80s0l4i1kvk0k3f", 37 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.15.94-hardened1/linux-hardened-5.15.94-hardened1.patch" 35 + "name": "linux-hardened-5.15.96-hardened1.patch", 36 + "sha256": "032311r4phsp8cb4vzgdh3gsm4l5494138x1jfwfxhzkgmp4g4yh", 37 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.15.96-hardened1/linux-hardened-5.15.96-hardened1.patch" 38 38 }, 39 - "sha256": "0wjsqvhp0jnisypb8yw6dncyp5k7zxbhjivh7jqivpsdwvdp14ns", 40 - "version": "5.15.94" 39 + "sha256": "167g34xjbqxr5klqp127j2j15pms4jmgs0y7gr8zipiz2i69g39l", 40 + "version": "5.15.96" 41 41 }, 42 42 "5.4": { 43 43 "patch": { 44 44 "extra": "-hardened1", 45 - "name": "linux-hardened-5.4.231-hardened1.patch", 46 - "sha256": "1fximwmcp0205i3jxmglf0jawgy1knrc9cnjpz05am8yi7ndikmd", 47 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.4.231-hardened1/linux-hardened-5.4.231-hardened1.patch" 45 + "name": "linux-hardened-5.4.233-hardened1.patch", 46 + "sha256": "11df6i0v7xsp363hdqfdixadn5db41ig51pd5fhknpdh1yrpx9by", 47 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.4.233-hardened1/linux-hardened-5.4.233-hardened1.patch" 48 48 }, 49 - "sha256": "1a1nbyvkf6iaj5lz6ahg7kk9pyrx7j77jmaj92fyihdl3mzyml4d", 50 - "version": "5.4.231" 49 + "sha256": "09vnp4qcv7kwahbbvjznnv7pxq1cvbn11n0rn5rzx97jnia5f7js", 50 + "version": "5.4.233" 51 51 }, 52 52 "6.1": { 53 53 "patch": { 54 54 "extra": "-hardened1", 55 - "name": "linux-hardened-6.1.12-hardened1.patch", 56 - "sha256": "0nz2gz7nx0z9am8fldza28vj0fgp7hdx3skpm1xvdhgy8d35p33l", 57 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/6.1.12-hardened1/linux-hardened-6.1.12-hardened1.patch" 55 + "name": "linux-hardened-6.1.14-hardened1.patch", 56 + "sha256": "1r76nhg11sv654hg90gf6s9bmwdbmc88jh7wbpb9cyj63dw8dliv", 57 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/6.1.14-hardened1/linux-hardened-6.1.14-hardened1.patch" 58 58 }, 59 - "sha256": "1spdl3i69qwn7cywzs6kql8nlisdnmnwk9za7v4xq1092xsscynl", 60 - "version": "6.1.12" 59 + "sha256": "03c1pszgm0qwwz7l5fnmbr6ank632bsl81pdx48svizy3q0pcw52", 60 + "version": "6.1.14" 61 61 } 62 62 }
+2 -2
pkgs/os-specific/linux/kernel/linux-4.14.nix
··· 3 3 with lib; 4 4 5 5 buildLinux (args // rec { 6 - version = "4.14.306"; 6 + version = "4.14.307"; 7 7 8 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 9 modDirVersion = versions.pad 3 version; ··· 13 13 14 14 src = fetchurl { 15 15 url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz"; 16 - sha256 = "17phif2kazp5wykjv7vphjzv8bcanvpv5qq4v3df5nq9gbpypfsq"; 16 + sha256 = "00dp0vj9572ig4zsnmhl2a2v5vx40hnjibyifw24x1q6qdaia72f"; 17 17 }; 18 18 } // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/kernel/linux-4.19.nix
··· 3 3 with lib; 4 4 5 5 buildLinux (args // rec { 6 - version = "4.19.273"; 6 + version = "4.19.274"; 7 7 8 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 9 modDirVersion = versions.pad 3 version; ··· 13 13 14 14 src = fetchurl { 15 15 url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz"; 16 - sha256 = "0wr7sprmqkdr6d44cj3rvaynyvrmyn1rax9wjqa7sk36yhvz47ij"; 16 + sha256 = "1a2w6knszfqg7ilnvxrs0kbgcviq90iqw9wp2d6y3qy9jfhnb8k4"; 17 17 }; 18 18 } // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/kernel/linux-5.10.nix
··· 3 3 with lib; 4 4 5 5 buildLinux (args // rec { 6 - version = "5.10.169"; 6 + version = "5.10.170"; 7 7 8 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 9 modDirVersion = versions.pad 3 version; ··· 13 13 14 14 src = fetchurl { 15 15 url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz"; 16 - sha256 = "1kxgxdbgymdhf7w416qxv948py0mq8qlhz5ag962322ynmp4yxfr"; 16 + sha256 = "0pw2jnsnq2yxxvl4dkx6f7a8gczj8l484qpd4ibw737vprv1idd2"; 17 17 }; 18 18 } // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/kernel/linux-5.15.nix
··· 3 3 with lib; 4 4 5 5 buildLinux (args // rec { 6 - version = "5.15.95"; 6 + version = "5.15.96"; 7 7 8 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 9 modDirVersion = versions.pad 3 version; ··· 13 13 14 14 src = fetchurl { 15 15 url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz"; 16 - sha256 = "06s4aqkk26fph8hm15m7cssjrwa5y7cqy9y2znfnf0w8sbqd2wga"; 16 + sha256 = "167g34xjbqxr5klqp127j2j15pms4jmgs0y7gr8zipiz2i69g39l"; 17 17 }; 18 18 } // (args.argsOverride or { }))
+2 -2
pkgs/os-specific/linux/kernel/linux-5.4.nix
··· 3 3 with lib; 4 4 5 5 buildLinux (args // rec { 6 - version = "5.4.232"; 6 + version = "5.4.233"; 7 7 8 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 9 modDirVersion = versions.pad 3 version; ··· 13 13 14 14 src = fetchurl { 15 15 url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz"; 16 - sha256 = "14qf8ddyhcs1ga1zqj4q2si6nc48sfc67nn9nigsnbcbg5g6lrdh"; 16 + sha256 = "09vnp4qcv7kwahbbvjznnv7pxq1cvbn11n0rn5rzx97jnia5f7js"; 17 17 }; 18 18 } // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/kernel/linux-6.1.nix
··· 3 3 with lib; 4 4 5 5 buildLinux (args // rec { 6 - version = "6.1.13"; 6 + version = "6.1.14"; 7 7 8 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 9 modDirVersion = versions.pad 3 version; ··· 13 13 14 14 src = fetchurl { 15 15 url = "mirror://kernel/linux/kernel/v6.x/linux-${version}.tar.xz"; 16 - sha256 = "0rvss7g77kp1hldhwrpfc7ck50rd0cjfcxj1bshps1xhyhci7128"; 16 + sha256 = "03c1pszgm0qwwz7l5fnmbr6ank632bsl81pdx48svizy3q0pcw52"; 17 17 }; 18 18 } // (args.argsOverride or { }))
+2 -2
pkgs/os-specific/linux/kernel/linux-6.2.nix
··· 3 3 with lib; 4 4 5 5 buildLinux (args // rec { 6 - version = "6.2"; 6 + version = "6.2.1"; 7 7 8 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 9 modDirVersion = versions.pad 3 version; ··· 13 13 14 14 src = fetchurl { 15 15 url = "mirror://kernel/linux/kernel/v6.x/linux-${version}.tar.xz"; 16 - sha256 = "sha256-dIYvqKtA7a6FuzOFwLcf4QMoi85RhSbWMZeACzy97LE="; 16 + sha256 = "0d154mps5967mgl8sxls6x5nw2ya1pmvxyahiwacx90fr7hhgk1g"; 17 17 }; 18 18 } // (args.argsOverride or { }))
+3 -3
pkgs/os-specific/linux/kernel/linux-rt-5.15.nix
··· 6 6 , ... } @ args: 7 7 8 8 let 9 - version = "5.15.94-rt59"; # updated by ./update-rt.sh 9 + version = "5.15.95-rt60"; # updated by ./update-rt.sh 10 10 branch = lib.versions.majorMinor version; 11 11 kversion = builtins.elemAt (lib.splitString "-" version) 0; 12 12 in buildLinux (args // { ··· 18 18 19 19 src = fetchurl { 20 20 url = "mirror://kernel/linux/kernel/v5.x/linux-${kversion}.tar.xz"; 21 - sha256 = "0wjsqvhp0jnisypb8yw6dncyp5k7zxbhjivh7jqivpsdwvdp14ns"; 21 + sha256 = "06s4aqkk26fph8hm15m7cssjrwa5y7cqy9y2znfnf0w8sbqd2wga"; 22 22 }; 23 23 24 24 kernelPatches = let rt-patch = { 25 25 name = "rt"; 26 26 patch = fetchurl { 27 27 url = "mirror://kernel/linux/kernel/projects/rt/${branch}/older/patch-${version}.patch.xz"; 28 - sha256 = "12lv1cywnlylb908bwy76ala94j1j5klrgv71l9ihf4vvdpj2nxi"; 28 + sha256 = "0plz9zcibhpqsrapykvvqqhz0i2sy7wrjd3jsypvia6j3vghrz4s"; 29 29 }; 30 30 }; in [ rt-patch ] ++ kernelPatches; 31 31
+4 -4
pkgs/servers/invidious/versions.json
··· 4 4 "sha256": "sha256-EU6T9yQCdOLx98Io8o01rEsgxDFF/Xoy42LgPopD2/A=" 5 5 }, 6 6 "invidious": { 7 - "rev": "7993784701686c057b85c57704537135e6326de9", 8 - "sha256": "sha256-LKoUm38gUXucOdXmiJGaKt7ckeb7JBd5I/AxDRDnq30=", 9 - "version": "unstable-2023-02-13" 7 + "rev": "0995e0447c2b54d80b55231830b847d41c19b404", 8 + "sha256": "sha256-hXF836jxMriMJ/qcBJIF5cRvQG719PStKqTZQcIRqlw=", 9 + "version": "unstable-2023-02-22" 10 10 }, 11 11 "lsquic": { 12 12 "sha256": "sha256-hG8cUvhbCNeMOsKkaJlgGpzUrIx47E/WhmPIdI5F3qM=", 13 13 "version": "2.18.1" 14 14 }, 15 15 "videojs": { 16 - "sha256": "0m09pc9acpzhfwwvc9dayl60nn28skmmglgvmlp48dlkqgfbgc27" 16 + "sha256": "0zj8fgxdg6jsllaxn795xipa6yxh4yf08hb8x0idyg74q37gfh4c" 17 17 } 18 18 }
+7
pkgs/tools/admin/google-cloud-sdk/components.nix
··· 3 3 , google-cloud-sdk 4 4 , system 5 5 , snapshotPath 6 + , autoPatchelfHook 7 + , python3 6 8 , ... 7 9 }: 8 10 ··· 159 161 # Write the snapshot file to the `.install` folder 160 162 cp $snapshotPath $out/google-cloud-sdk/.install/${pname}.snapshot.json 161 163 ''; 164 + nativeBuildInputs = [ 165 + autoPatchelfHook 166 + python3 167 + stdenv.cc.cc 168 + ]; 162 169 passthru = { 163 170 dependencies = filterForSystem dependencies; 164 171 };
+36 -13
pkgs/tools/admin/lexicon/default.nix
··· 7 7 8 8 buildPythonApplication rec { 9 9 pname = "lexicon"; 10 - version = "3.9.4"; 10 + version = "3.11.7"; 11 11 format = "pyproject"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "AnalogJ"; 15 15 repo = pname; 16 - rev = "v${version}"; 16 + rev = "refs/tags/v${version}"; 17 17 hash = "sha256-TySgIxBEl2RolndAkEN4vCIDKaI48vrh2ocd+CTn7Ow="; 18 18 }; 19 19 ··· 23 23 24 24 propagatedBuildInputs = [ 25 25 beautifulsoup4 26 - boto3 27 26 cryptography 28 - dnspython 29 - future 30 - localzone 31 - oci 32 - pynamecheap 27 + importlib-metadata 33 28 pyyaml 34 29 requests 35 - softlayer 36 30 tldextract 37 - transip 38 - xmltodict 39 - zeep 40 31 ]; 41 32 33 + passthru.optional-dependencies = { 34 + route53 = [ 35 + boto3 36 + ]; 37 + localzone = [ 38 + localzone 39 + ]; 40 + softlayer = [ 41 + softlayer 42 + ]; 43 + gransy = [ 44 + zeep 45 + ]; 46 + ddns = [ 47 + dnspython 48 + ]; 49 + oci = [ 50 + oci 51 + ]; 52 + full = [ 53 + boto3 54 + dnspython 55 + localzone 56 + oci 57 + softlayer 58 + zeep 59 + ]; 60 + }; 61 + 42 62 nativeCheckInputs = [ 43 63 mock 44 64 pytestCheckHook 45 65 pytest-xdist 46 66 vcrpy 47 - ]; 67 + ] ++ passthru.optional-dependencies.full; 48 68 49 69 disabledTestPaths = [ 50 70 # Tests require network access 51 71 "lexicon/tests/providers/test_auto.py" 72 + # Tests require an additional setup 73 + "lexicon/tests/providers/test_localzone.py" 52 74 ]; 53 75 54 76 pythonImportsCheck = [ ··· 58 80 meta = with lib; { 59 81 description = "Manipulate DNS records of various DNS providers in a standardized way"; 60 82 homepage = "https://github.com/AnalogJ/lexicon"; 83 + changelog = "https://github.com/AnalogJ/lexicon/blob/v${version}/CHANGELOG.md"; 61 84 license = licenses.mit; 62 85 maintainers = with maintainers; [ flyfloh ]; 63 86 };
+2
pkgs/tools/networking/rathole/default.nix
··· 32 32 33 33 __darwinAllowLocalNetworking = true; 34 34 35 + doCheck = false; # https://github.com/rapiz1/rathole/issues/222 36 + 35 37 meta = with lib; { 36 38 description = "Reverse proxy for NAT traversal"; 37 39 homepage = "https://github.com/rapiz1/rathole";
+2 -1
pkgs/tools/wayland/oguri/default.nix
··· 36 36 description = "A very nice animated wallpaper daemon for Wayland compositors"; 37 37 license = licenses.mit; 38 38 maintainers = with maintainers; [ AndersonTorres ]; 39 - platforms = platforms.unix; 39 + inherit (wayland.meta) platforms; 40 + broken = stdenv.isDarwin; # this should be enfoced by wayland platforms in the future 40 41 }; 41 42 }
+20 -17
pkgs/top-level/all-packages.nix
··· 2304 2304 stdenv = 2305 2305 if stdenv.isDarwin && stdenv.isAarch64 then llvmPackages_14.stdenv 2306 2306 # https://github.com/NixOS/nixpkgs/issues/201254 2307 - else if stdenv.isLinux && stdenv.isAarch64 && stdenv.cc.isGNU then gcc11Stdenv 2307 + else if stdenv.isLinux && stdenv.isAarch64 && stdenv.cc.isGNU then gcc12Stdenv 2308 2308 else stdenv; 2309 2309 }; 2310 2310 ··· 8769 8769 # See comments on https://github.com/NixOS/nixpkgs/pull/198836 8770 8770 # Remove below when stdenv for linux-aarch64 become recent enough. 8771 8771 # https://github.com/NixOS/nixpkgs/issues/201254 8772 - stdenv = if stdenv.isLinux && stdenv.isAarch64 && stdenv.cc.isGNU then gcc11Stdenv else stdenv; 8772 + stdenv = if stdenv.isLinux && stdenv.isAarch64 && stdenv.cc.isGNU then gcc12Stdenv else stdenv; 8773 8773 }; 8774 8774 kakoune = wrapKakoune kakoune-unwrapped { 8775 8775 plugins = [ ]; # override with the list of desired plugins ··· 11074 11074 11075 11075 pocketbase = callPackage ../servers/pocketbase { }; 11076 11076 11077 - podman = callPackage ../applications/virtualization/podman/wrapper.nix { }; 11078 - podman-unwrapped = callPackage ../applications/virtualization/podman { }; 11077 + podman = callPackage ../applications/virtualization/podman { }; 11079 11078 11080 11079 podman-compose = python3Packages.callPackage ../applications/virtualization/podman-compose {}; 11081 11080 ··· 11366 11365 11367 11366 qovery-cli = callPackage ../tools/admin/qovery-cli { }; 11368 11367 11369 - qownnotes = libsForQt5.callPackage ../applications/office/qownnotes { }; 11368 + qownnotes = darwin.apple_sdk_11_0.callPackage ../applications/office/qownnotes { 11369 + inherit (libsForQt5) qmake qtbase qtdeclarative qtsvg qttools qtwayland qtwebsockets qtx11extras qtxmlpatterns wrapQtAppsHook; 11370 + }; 11370 11371 11371 11372 qpdf = callPackage ../development/libraries/qpdf { }; 11372 11373 ··· 11655 11656 rpm-ostree = callPackage ../tools/misc/rpm-ostree { 11656 11657 gperf = gperf_3_0; 11657 11658 # https://github.com/NixOS/nixpkgs/issues/201254 11658 - stdenv = if stdenv.isLinux && stdenv.isAarch64 && stdenv.cc.isGNU then gcc11Stdenv else stdenv; 11659 + stdenv = if stdenv.isLinux && stdenv.isAarch64 && stdenv.cc.isGNU then gcc12Stdenv else stdenv; 11659 11660 }; 11660 11661 11661 11662 rpm2targz = callPackage ../tools/archivers/rpm2targz { }; ··· 19185 19186 else callPackage ../os-specific/linux/bionic-prebuilt { }; 19186 19187 19187 19188 19188 - bobcat = callPackage ../development/libraries/bobcat 19189 - (lib.optionalAttrs (with stdenv.hostPlatform; isAarch64 && isLinux) { 19190 - # C++20 is required, aarch64-linux has gcc 9 by default 19191 - stdenv = gcc10Stdenv; 19192 - }); 19189 + bobcat = callPackage ../development/libraries/bobcat { 19190 + # C++20 is required, aarch64-linux has gcc 9 by default 19191 + # https://github.com/NixOS/nixpkgs/issues/201254 19192 + stdenv = if stdenv.isLinux && stdenv.isAarch64 && stdenv.cc.isGNU then gcc12Stdenv else stdenv; 19193 + }; 19193 19194 19194 19195 boehmgc = callPackage ../development/libraries/boehm-gc { }; 19195 19196 ··· 22373 22374 22374 22375 mtxclient = callPackage ../development/libraries/mtxclient { 22375 22376 # https://github.com/NixOS/nixpkgs/issues/201254 22376 - stdenv = if stdenv.isLinux && stdenv.isAarch64 && stdenv.cc.isGNU then gcc11Stdenv else stdenv; 22377 + stdenv = if stdenv.isLinux && stdenv.isAarch64 && stdenv.cc.isGNU then gcc12Stdenv else stdenv; 22377 22378 }; 22378 22379 22379 22380 mu = callPackage ../tools/networking/mu { ··· 31798 31799 open-policy-agent = callPackage ../development/tools/open-policy-agent { }; 31799 31800 31800 31801 openmm = callPackage ../development/libraries/science/chemistry/openmm { 31801 - stdenv = if stdenv.targetPlatform.isAarch64 then gcc9Stdenv else gcc11Stdenv; 31802 - gfortran = if stdenv.targetPlatform.isAarch64 then gfortran9 else gfortran11; 31802 + stdenv = gcc11Stdenv; 31803 + gfortran = gfortran11; 31803 31804 }; 31804 31805 31805 31806 openshift = callPackage ../applications/networking/cluster/openshift { }; ··· 32063 32064 32064 32065 nheko = libsForQt5.callPackage ../applications/networking/instant-messengers/nheko { 32065 32066 # https://github.com/NixOS/nixpkgs/issues/201254 32066 - stdenv = if stdenv.isLinux && stdenv.isAarch64 && stdenv.cc.isGNU then gcc11Stdenv else stdenv; 32067 + stdenv = if stdenv.isLinux && stdenv.isAarch64 && stdenv.cc.isGNU then gcc12Stdenv else stdenv; 32067 32068 }; 32068 32069 32069 32070 nomacs = libsForQt5.callPackage ../applications/graphics/nomacs { }; ··· 32663 32664 32664 32665 quantomatic = callPackage ../applications/science/physics/quantomatic { }; 32665 32666 32666 - quassel = libsForQt5.callPackage ../applications/networking/irc/quassel { }; 32667 + quassel = darwin.apple_sdk_11_0.callPackage ../applications/networking/irc/quassel { 32668 + inherit (libsForQt5) kconfigwidgets kcoreaddons knotifications knotifyconfig ktextwidgets kwidgetsaddons kxmlgui phonon qtbase qtscript mkDerivation qca-qt5; 32669 + }; 32667 32670 32668 32671 quasselClient = quassel.override { 32669 32672 monolithic = false; ··· 37408 37411 python = python3; 37409 37412 inherit (darwin.apple_sdk.frameworks) Cocoa CoreSymbolication OpenGL; 37410 37413 # https://github.com/NixOS/nixpkgs/issues/201254 37411 - stdenv = if stdenv.isLinux && stdenv.isAarch64 && stdenv.cc.isGNU then gcc11Stdenv else stdenv; 37414 + stdenv = if stdenv.isLinux && stdenv.isAarch64 && stdenv.cc.isGNU then gcc12Stdenv else stdenv; 37412 37415 }; 37413 37416 37414 37417 root5 = lowPrio (callPackage ../applications/science/misc/root/5.nix {
+3 -1
pkgs/top-level/qt5-packages.nix
··· 176 176 177 177 pulseaudio-qt = callPackage ../development/libraries/pulseaudio-qt { }; 178 178 179 - qca-qt5 = callPackage ../development/libraries/qca-qt5 { }; 179 + qca-qt5 = pkgs.darwin.apple_sdk_11_0.callPackage ../development/libraries/qca-qt5 { 180 + inherit (libsForQt5) qtbase; 181 + }; 180 182 181 183 qcoro = callPackage ../development/libraries/qcoro { }; 182 184