Merge staging-next into staging

authored by github-actions[bot] and committed by GitHub 53c1035b 53a0c287

+121 -115
-6
maintainers/maintainer-list.nix
··· 544 544 githubId = 638836; 545 545 name = "Andreas Rammhold"; 546 546 }; 547 - andreabedini = { 548 - email = "andrea@kzn.io"; 549 - github = "andreabedini"; 550 - githubId = 69135; 551 - name = "Andrea Bedini"; 552 - }; 553 547 andreasfelix = { 554 548 email = "fandreas@physik.hu-berlin.de"; 555 549 github = "andreasfelix";
+45 -41
nixos/modules/programs/captive-browser.nix
··· 1 1 { config, lib, pkgs, ... }: 2 2 3 3 with lib; 4 - 5 4 let 6 5 cfg = config.programs.captive-browser; 7 6 in ··· 27 26 # the options below are the same as in "captive-browser.toml" 28 27 browser = mkOption { 29 28 type = types.str; 30 - default = concatStringsSep " " [ "${pkgs.chromium}/bin/chromium" 31 - "--user-data-dir=\${XDG_DATA_HOME:-$HOME/.local/share}/chromium-captive" 32 - ''--proxy-server="socks5://$PROXY"'' 33 - ''--host-resolver-rules="MAP * ~NOTFOUND , EXCLUDE localhost"'' 34 - "--no-first-run" 35 - "--new-window" 36 - "--incognito" 37 - "http://cache.nixos.org/" 38 - ]; 29 + default = concatStringsSep " " [ 30 + ''${pkgs.chromium}/bin/chromium'' 31 + ''--user-data-dir=''${XDG_DATA_HOME:-$HOME/.local/share}/chromium-captive'' 32 + ''--proxy-server="socks5://$PROXY"'' 33 + ''--host-resolver-rules="MAP * ~NOTFOUND , EXCLUDE localhost"'' 34 + ''--no-first-run'' 35 + ''--new-window'' 36 + ''--incognito'' 37 + ''-no-default-browser-check'' 38 + ''http://cache.nixos.org/'' 39 + ]; 39 40 description = '' 40 41 The shell (/bin/sh) command executed once the proxy starts. 41 42 When browser exits, the proxy exits. An extra env var PROXY is available. ··· 81 82 82 83 config = mkIf cfg.enable { 83 84 84 - programs.captive-browser.dhcp-dns = mkOptionDefault ( 85 - if config.networking.networkmanager.enable then 86 - "${pkgs.networkmanager}/bin/nmcli dev show ${escapeShellArg cfg.interface} | ${pkgs.gnugrep}/bin/fgrep IP4.DNS" 87 - else if config.networking.dhcpcd.enable then 88 - "${pkgs.dhcpcd}/bin/dhcpcd -U ${escapeShellArg cfg.interface} | ${pkgs.gnugrep}/bin/fgrep domain_name_servers" 89 - else if config.networking.useNetworkd then 90 - "${cfg.package}/bin/systemd-networkd-dns ${escapeShellArg cfg.interface}" 91 - else 92 - "${config.security.wrapperDir}/udhcpc --quit --now -f -i ${escapeShellArg cfg.interface} -O dns --script ${ 93 - pkgs.writeScript "udhcp-script" '' 94 - #!/bin/sh 95 - if [ "$1" = bound ]; then 96 - echo "$dns" 97 - fi 98 - ''}" 99 - ); 85 + programs.captive-browser.dhcp-dns = 86 + let 87 + iface = prefix: 88 + optionalString cfg.bindInterface (concatStringsSep " " (map escapeShellArg [ prefix cfg.interface ])); 89 + in 90 + mkOptionDefault ( 91 + if config.networking.networkmanager.enable then 92 + "${pkgs.networkmanager}/bin/nmcli dev show ${iface ""} | ${pkgs.gnugrep}/bin/fgrep IP4.DNS" 93 + else if config.networking.dhcpcd.enable then 94 + "${pkgs.dhcpcd}/bin/dhcpcd ${iface "-U"} | ${pkgs.gnugrep}/bin/fgrep domain_name_servers" 95 + else if config.networking.useNetworkd then 96 + "${cfg.package}/bin/systemd-networkd-dns ${iface ""}" 97 + else 98 + "${config.security.wrapperDir}/udhcpc --quit --now -f ${iface "-i"} -O dns --script ${ 99 + pkgs.writeShellScript "udhcp-script" '' 100 + if [ "$1" = bound ]; then 101 + echo "$dns" 102 + fi 103 + ''}" 104 + ); 100 105 101 106 security.wrappers.udhcpc = { 102 - capabilities = "cap_net_raw+p"; 103 - source = "${pkgs.busybox}/bin/udhcpc"; 107 + capabilities = "cap_net_raw+p"; 108 + source = "${pkgs.busybox}/bin/udhcpc"; 104 109 }; 105 110 106 111 security.wrappers.captive-browser = { 107 - capabilities = "cap_net_raw+p"; 108 - source = pkgs.writeScript "captive-browser" '' 109 - #!${pkgs.bash}/bin/bash 110 - export XDG_CONFIG_HOME=${pkgs.writeTextDir "captive-browser.toml" '' 111 - browser = """${cfg.browser}""" 112 - dhcp-dns = """${cfg.dhcp-dns}""" 113 - socks5-addr = """${cfg.socks5-addr}""" 114 - ${optionalString cfg.bindInterface '' 115 - bind-device = """${cfg.interface}""" 116 - ''} 117 - ''} 118 - exec ${cfg.package}/bin/captive-browser 119 - ''; 112 + capabilities = "cap_net_raw+p"; 113 + source = pkgs.writeShellScript "captive-browser" '' 114 + export XDG_CONFIG_HOME=${pkgs.writeTextDir "captive-browser.toml" '' 115 + browser = """${cfg.browser}""" 116 + dhcp-dns = """${cfg.dhcp-dns}""" 117 + socks5-addr = """${cfg.socks5-addr}""" 118 + ${optionalString cfg.bindInterface '' 119 + bind-device = """${cfg.interface}""" 120 + ''} 121 + ''} 122 + exec ${cfg.package}/bin/captive-browser 123 + ''; 120 124 }; 121 125 }; 122 126 }
+2 -2
nixos/modules/testing/service-runner.nix
··· 52 52 53 53 # Run the ExecStartPre program. FIXME: this could be a list. 54 54 my $preStart = <<END_CMD; 55 - ${service.serviceConfig.ExecStartPre or ""} 55 + ${concatStringsSep "\n" (service.serviceConfig.ExecStartPre or [])} 56 56 END_CMD 57 57 if (defined $preStart && $preStart ne "\n") { 58 58 print STDERR "running ExecStartPre: $preStart\n"; ··· 79 79 80 80 # Run the ExecStartPost program. 81 81 my $postStart = <<END_CMD; 82 - ${service.serviceConfig.ExecStartPost or ""} 82 + ${concatStringsSep "\n" (service.serviceConfig.ExecStartPost or [])} 83 83 END_CMD 84 84 if (defined $postStart && $postStart ne "\n") { 85 85 print STDERR "running ExecStartPost: $postStart\n";
+22
pkgs/applications/editors/emacs-modes/jam-mode/default.nix
··· 1 + { trivialBuild, lib, fetchurl }: 2 + 3 + trivialBuild rec { 4 + pname = "jam-mode"; 5 + version = "0.3"; 6 + 7 + src = fetchurl { 8 + url = "https://dev.gentoo.org/~ulm/distfiles/jam-mode-${version}.el.xz"; 9 + sha256 = "1jchgiy2rgvnb3swr6ar72yas6pj4inpgpcq78q01q6snflmi2fh"; 10 + }; 11 + 12 + unpackPhase = '' 13 + xz -cd $src > jam-mode.el 14 + ''; 15 + 16 + meta = with lib; { 17 + description = "An Emacs major mode for editing Jam files"; 18 + license = licenses.gpl2Plus; 19 + maintainers = with maintainers; [ qyliss ]; 20 + platforms = platforms.all; 21 + }; 22 + }
+2
pkgs/applications/editors/emacs-modes/manual-packages.nix
··· 111 111 112 112 helm-words = callPackage ./helm-words { }; 113 113 114 + jam-mode = callPackage ./jam-mode { }; 115 + 114 116 org-mac-link = 115 117 callPackage ./org-mac-link { }; 116 118
+2
pkgs/applications/editors/kakoune/default.nix
··· 25 25 export version="v${version}" 26 26 ''; 27 27 28 + enableParallelBuilding = true; 29 + 28 30 doInstallCheck = true; 29 31 installCheckPhase = '' 30 32 $out/bin/kak -ui json -e "kill 0"
+2 -2
pkgs/applications/misc/fetchmail/default.nix
··· 1 1 { lib, stdenv, fetchurl, openssl }: 2 2 3 3 let 4 - version = "6.4.15"; 4 + version = "6.4.16"; 5 5 in 6 6 stdenv.mkDerivation { 7 7 pname = "fetchmail"; ··· 9 9 10 10 src = fetchurl { 11 11 url = "mirror://sourceforge/fetchmail/fetchmail-${version}.tar.xz"; 12 - sha256 = "sha256-c1shdHSTfhPPzeotQqNGv2hIfg1h7+vk0Nnt3LOia5Y="; 12 + sha256 = "sha256-BEuaCsA6+653RJed7+Pi4y45FBvKaP0Mje2i7UCIT7k="; 13 13 }; 14 14 15 15 buildInputs = [ openssl ];
+2 -2
pkgs/applications/misc/visidata/default.nix
··· 15 15 }: 16 16 buildPythonApplication rec { 17 17 pname = "visidata"; 18 - version = "2.2"; 18 + version = "2.2.1"; 19 19 20 20 src = fetchFromGitHub { 21 21 owner = "saulpw"; 22 22 repo = "visidata"; 23 23 rev = "v${version}"; 24 - sha256 = "14169q74vpighxnmpxf3nwi19vrv7p76ybb1zp7h8q2harysxkgl"; 24 + sha256 = "1gkvnywjg0n3n7d855ivclsj3d8mzihhkgv9a18srcszkmyix903"; 25 25 }; 26 26 27 27 propagatedBuildInputs = [
+11
pkgs/applications/networking/remote/citrix-workspace/sources.nix
··· 65 65 x86hash = "0f982d5y9k4hscqfmqpfs277cqw1pvp191ybvg5p8rxk12fh67vf"; 66 66 x64suffix = "12"; 67 67 x86suffix = "12"; 68 + homepage = "https://www.citrix.com/de-de/downloads/workspace-app/legacy-workspace-app-for-linux/workspace-app-for-linux-2012.html"; 69 + }; 70 + 71 + "21.01.0" = { 72 + major = "21"; 73 + minor = "1"; 74 + patch = "0"; 75 + x64hash = "01m9g1bs6iiqbd778gjps2zznvqijlyn3mfw38aa0w1rr6ms326a"; 76 + x86hash = "1mmx5r3wi9i6bwh4kdlpw446m8kijkaar8shi0q1n21fv0ygg3r5"; 77 + x64suffix = "14"; 78 + x86suffix = "14"; 68 79 homepage = "https://www.citrix.com/de-de/downloads/workspace-app/linux/workspace-app-for-linux-latest.html"; 69 80 }; 70 81 };
+2 -2
pkgs/applications/version-management/git-repo/default.nix
··· 4 4 5 5 stdenv.mkDerivation rec { 6 6 pname = "git-repo"; 7 - version = "2.12.1"; 7 + version = "2.12.2"; 8 8 9 9 src = fetchFromGitHub { 10 10 owner = "android"; 11 11 repo = "tools_repo"; 12 12 rev = "v${version}"; 13 - sha256 = "sha256-9w8kGMgxvbeKpri+zC8mcsbC6pnwqbLbKu1XB5tfBBo="; 13 + sha256 = "sha256-E0HGianaTNRVJsFh8tb1wdxEARRXzkFG2OHU6op5oQ4="; 14 14 }; 15 15 16 16 patches = [ ./import-ssl-module.patch ];
+6 -4
pkgs/applications/virtualization/podman/default.nix
··· 16 16 17 17 buildGoModule rec { 18 18 pname = "podman"; 19 - version = "2.2.1"; 19 + version = "3.0.0"; 20 20 21 21 src = fetchFromGitHub { 22 22 owner = "containers"; 23 23 repo = "podman"; 24 24 rev = "v${version}"; 25 - sha256 = "166ch73pqx76ppfkhfg3zqxr71jf5pk5asl5bb5rwhyzf7f057q5"; 25 + sha256 = "141ii271w2azvhl8ragrgzmir9iq9npl8wmh5dr31kvq4z4syxw1"; 26 26 }; 27 27 28 28 vendorSha256 = null; ··· 55 55 mv bin/{podman-remote,podman} 56 56 '' + '' 57 57 install -Dm555 bin/podman $out/bin/podman 58 - installShellCompletion --bash completions/bash/podman 59 - installShellCompletion --zsh completions/zsh/_podman 58 + installShellCompletion --bash completions/bash/* 59 + installShellCompletion --fish completions/fish/* 60 + installShellCompletion --zsh completions/zsh/* 60 61 MANDIR=$man/share/man make install.man-nobuild 61 62 ''; 62 63 ··· 65 66 meta = with lib; { 66 67 homepage = "https://podman.io/"; 67 68 description = "A program for managing pods, containers and container images"; 69 + changelog = "https://github.com/containers/podman/blob/v${version}/changelog.txt"; 68 70 license = licenses.asl20; 69 71 maintainers = with maintainers; [ marsam ] ++ teams.podman.members; 70 72 platforms = platforms.unix;
+6 -33
pkgs/development/compilers/ecl/default.nix
··· 1 - {lib, stdenv, fetchurl 1 + {lib, stdenv, fetchurl, fetchpatch 2 2 , libtool, autoconf, automake 3 3 , texinfo 4 4 , gmp, mpfr, libffi, makeWrapper ··· 11 11 s = # Generated upstream information 12 12 rec { 13 13 baseName="ecl"; 14 - version="20.4.24"; 14 + version="21.2.1"; 15 15 name="${baseName}-${version}"; 16 16 url="https://common-lisp.net/project/ecl/static/files/release/${name}.tgz"; 17 - sha256="01qgdmr54wkj854f69qdm9sybrvd6gd21dpx4askdaaqybnkh237"; 17 + sha256="000906nnq25177bgsfndiw3iqqgrjc9spk10hzk653sbz3f7anmi"; 18 18 }; 19 19 buildInputs = [ 20 20 libtool autoconf automake texinfo makeWrapper ··· 36 36 }; 37 37 38 38 patches = [ 39 - # https://trac.sagemath.org/ticket/22191#comment:237 40 - (fetchurl { 41 - name = "ECL_WITH_LISP_FPE.patch"; 42 - url = "https://git.sagemath.org/sage.git/plain/build/pkgs/ecl/patches/ECL_WITH_LISP_FPE.patch?h=9.2"; 43 - sha256 = "0b194613avcmzr1k9gq725z41wdkg5rsa0q21kdw050iqpprcj1c"; 44 - }) 45 - 46 39 # https://gitlab.com/embeddable-common-lisp/ecl/-/merge_requests/1 47 - (fetchurl { 48 - name = "write_error.patch"; 40 + (fetchpatch { 49 41 url = "https://git.sagemath.org/sage.git/plain/build/pkgs/ecl/patches/write_error.patch?h=9.2"; 50 - sha256 = "1lvdvh77blnxp0zbd27dsbq1ljkb5qblabf1illszn4j7qgq88fh"; 51 - }) 52 - 53 - # Three patches to fix ecl's unicode handling (https://trac.sagemath.org/ticket/30122) 54 - (fetchurl { 55 - name = "0001-unicode-fix-ecl_string_case-for-non-ascii-characters.patch"; 56 - url = "https://git.sagemath.org/sage.git/plain/build/pkgs/ecl/patches/0001-unicode-fix-ecl_string_case-for-non-ascii-characters.patch?h=9.2"; 57 - sha256 = "0z8pnhawivrrbg4vz144nr2sz64jxp7764hn6df13bgkz84iqbmk"; 58 - }) 59 - 60 - (fetchurl { 61 - name = "0002-cosmetic-fix-some-compiler-warnings.patch"; 62 - url = "https://git.sagemath.org/sage.git/plain/build/pkgs/ecl/patches/0002-cosmetic-fix-some-compiler-warnings.patch?h=9.2"; 63 - sha256 = "0msx3say9igwr9z5ywnr3gs6vsndnzlx47fmzwzh4l0m274cnia8"; 64 - }) 65 - 66 - (fetchurl { 67 - name = "0003-printer-fix-printing-of-symbols-with-non-ascii-names.patch"; 68 - url = "https://git.sagemath.org/sage.git/plain/build/pkgs/ecl/patches/0003-printer-fix-printing-of-symbols-with-non-ascii-names.patch?h=9.2"; 69 - sha256 = "0ln5dsx6p265fkph3bl5wblgfi3f7frb4jl6v473wz3ibvcx1x9a"; 42 + sha256 = "0hfxacpgn4919hg0mn4wf4m8r7y592r4gw7aqfnva7sckxi6w089"; 70 43 }) 71 44 ]; 72 45 ··· 96 69 homepage = "https://common-lisp.net/project/ecl/"; 97 70 license = lib.licenses.mit ; 98 71 maintainers = [lib.maintainers.raskin]; 99 - platforms = lib.platforms.linux; 72 + platforms = lib.platforms.unix; 100 73 }; 101 74 }
+2 -2
pkgs/development/libraries/libaom/default.nix
··· 32 32 cmakeFlags = [ 33 33 "-DBUILD_SHARED_LIBS=ON" 34 34 "-DENABLE_TESTS=OFF" 35 - ] ++ lib.optionals stdenv.isDarwin [ 35 + ] ++ lib.optionals (stdenv.isDarwin && stdenv.isAarch64) [ 36 36 # CPU detection isn't supported on Darwin and breaks the aarch64-darwin build: 37 - "-DCONFIG_RUNTIME_CPU_DETECT=OFF" 37 + "-DCONFIG_RUNTIME_CPU_DETECT=0" 38 38 ]; 39 39 40 40 postFixup = ''
+10 -14
pkgs/development/ocaml-modules/ppx_deriving_protobuf/default.nix
··· 1 - { lib, fetchFromGitHub, buildDunePackage, ocaml, cppo, ppx_tools, ppx_deriving 2 - , ppxfind }: 3 - 4 - if lib.versionAtLeast ocaml.version "4.11" 5 - then throw "ppx_deriving_protobuf is not available for OCaml ${ocaml.version}" 6 - else 1 + { lib, fetchurl, buildDunePackage, cppo, ppx_deriving 2 + , ppxlib 3 + }: 7 4 8 5 buildDunePackage rec { 9 6 pname = "ppx_deriving_protobuf"; 10 - version = "2.7"; 7 + version = "3.0.0"; 11 8 12 - src = fetchFromGitHub { 13 - owner = "ocaml-ppx"; 14 - repo = pname; 15 - rev = "v${version}"; 16 - sha256 = "0aq4f3gbkhhai0c8i5mcw2kpqy8l610f4dknwkrxh0nsizwbwryn"; 9 + useDune2 = true; 10 + 11 + src = fetchurl { 12 + url = "https://github.com/ocaml-ppx/ppx_deriving_protobuf/releases/download/v${version}/ppx_deriving_protobuf-v${version}.tbz"; 13 + sha256 = "1dc1vxnkd0cnrgac5v3zbaj2lq1d2w8118mp1cmsdxylp06yz1sj"; 17 14 }; 18 15 19 - buildInputs = [ cppo ppx_tools ppxfind ppx_deriving ]; 16 + buildInputs = [ cppo ppxlib ppx_deriving ]; 20 17 21 18 meta = with lib; { 22 19 homepage = "https://github.com/ocaml-ppx/ppx_deriving_protobuf"; 23 20 description = "A Protocol Buffers codec generator for OCaml"; 24 21 license = licenses.mit; 25 22 maintainers = [ maintainers.vyorkin ]; 26 - broken = true; 27 23 }; 28 24 }
-1
pkgs/development/python-modules/aws-sam-translator/default.nix
··· 30 30 homepage = "https://github.com/awslabs/serverless-application-model"; 31 31 description = "Python library to transform SAM templates into AWS CloudFormation templates"; 32 32 license = lib.licenses.asl20; 33 - maintainers = [ lib.maintainers.andreabedini ]; 34 33 }; 35 34 }
+1 -1
pkgs/development/tools/aws-sam-cli/default.nix
··· 96 96 homepage = "https://github.com/awslabs/aws-sam-cli"; 97 97 description = "CLI tool for local development and testing of Serverless applications"; 98 98 license = licenses.asl20; 99 - maintainers = with maintainers; [ andreabedini lo1tuma ]; 99 + maintainers = with maintainers; [ lo1tuma ]; 100 100 }; 101 101 }
+2 -2
pkgs/os-specific/linux/eudev/default.nix
··· 3 3 s = # Generated upstream information 4 4 rec { 5 5 baseName="eudev"; 6 - version = "3.2.9"; 6 + version = "3.2.10"; 7 7 name="${baseName}-${version}"; 8 8 url="http://dev.gentoo.org/~blueness/eudev/eudev-${version}.tar.gz"; 9 - sha256 = "1z6lfhhbjs6j7pbp6ybn17ywjsdl87ql6g1p3m2y26aa10cqcqc9"; 9 + sha256 = "sha256-h7sCjUcP0bhRaTSbRMVdW3M3M9wtUN3xGW4CZyXq0DQ="; 10 10 }; 11 11 12 12 nativeBuildInputs = [ pkg-config ];
+2 -2
pkgs/os-specific/linux/wireguard/default.nix
··· 7 7 8 8 stdenv.mkDerivation rec { 9 9 pname = "wireguard"; 10 - version = "1.0.20201221"; 10 + version = "1.0.20210124"; 11 11 12 12 src = fetchzip { 13 13 url = "https://git.zx2c4.com/wireguard-linux-compat/snapshot/wireguard-linux-compat-${version}.tar.xz"; 14 - sha256 = "sha256-8RPJEk+6NaJP3LNZYEncLlkdrw2jHxNekKwEr+YpHeQ="; 14 + sha256 = "sha256-ZiHnKDYziiNvNV1/HjEluC83600RYCvgbUuPiRATRYE="; 15 15 }; 16 16 17 17 hardeningDisable = [ "pic" ];
+2 -1
pkgs/top-level/all-packages.nix
··· 3121 3121 3122 3122 circus = callPackage ../tools/networking/circus { }; 3123 3123 3124 - citrix_workspace = citrix_workspace_20_12_0; 3124 + citrix_workspace = citrix_workspace_21_01_0; 3125 3125 3126 3126 inherit (callPackage ../applications/networking/remote/citrix-workspace { }) 3127 3127 citrix_workspace_20_04_0 ··· 3129 3129 citrix_workspace_20_09_0 3130 3130 citrix_workspace_20_10_0 3131 3131 citrix_workspace_20_12_0 3132 + citrix_workspace_21_01_0 3132 3133 ; 3133 3134 3134 3135 citra = libsForQt5.callPackage ../misc/emulators/citra { };