Merge branch 'staging-next' into staging

+247 -187
+4
nixos/doc/manual/default.nix
··· 14 14 let 15 15 lib = pkgs.lib; 16 16 17 + docbook_xsl_ns = pkgs.docbook-xsl-ns.override { 18 + withManOptDedupPatch = true; 19 + }; 20 + 17 21 # We need to strip references to /nix/store/* from options, 18 22 # including any `extraSources` if some modules came from elsewhere, 19 23 # or else the build will fail.
+56 -53
nixos/modules/services/networking/networkmanager.nix
··· 5 5 let 6 6 cfg = config.networking.networkmanager; 7 7 8 - basePackages = with pkgs; [ 9 - modemmanager 10 - networkmanager 11 - networkmanager-fortisslvpn 12 - networkmanager-iodine 13 - networkmanager-l2tp 14 - networkmanager-openconnect 15 - networkmanager-openvpn 16 - networkmanager-vpnc 17 - networkmanager-sstp 18 - ] ++ optional (!delegateWireless && !enableIwd) wpa_supplicant; 19 - 20 8 delegateWireless = config.networking.wireless.enable == true && cfg.unmanaged != []; 21 9 22 10 enableIwd = cfg.wifi.backend == "iwd"; ··· 145 133 ''; 146 134 }; 147 135 136 + packages = [ 137 + pkgs.modemmanager 138 + pkgs.networkmanager 139 + ] 140 + ++ cfg.plugins 141 + ++ lib.optionals (!delegateWireless && !enableIwd) [ 142 + pkgs.wpa_supplicant 143 + ]; 144 + 148 145 in { 149 146 150 147 meta = { ··· 227 224 ''; 228 225 }; 229 226 230 - packages = mkOption { 231 - type = types.listOf types.package; 227 + plugins = mkOption { 228 + type = 229 + let 230 + networkManagerPluginPackage = types.package // { 231 + description = "NetworkManager plug-in"; 232 + check = 233 + p: 234 + lib.assertMsg 235 + (types.package.check p 236 + && p ? networkManagerPlugin 237 + && lib.isString p.networkManagerPlugin) 238 + '' 239 + Package ‘${p.name}’, is not a NetworkManager plug-in. 240 + Those need to have a ‘networkManagerPlugin’ attribute. 241 + ''; 242 + }; 243 + in 244 + types.listOf networkManagerPluginPackage; 232 245 default = [ ]; 233 246 description = '' 234 - Extra packages that provide NetworkManager plugins. 247 + List of NetworkManager plug-ins to enable. 248 + Some plug-ins are enabled by the NetworkManager module by default. 235 249 ''; 236 - apply = list: basePackages ++ list; 237 250 }; 238 251 239 252 dhcp = mkOption { 240 - type = types.enum [ "dhclient" "dhcpcd" "internal" ]; 253 + type = types.enum [ "dhcpcd" "internal" ]; 241 254 default = "internal"; 242 255 description = '' 243 256 Which program (or internal library) should be used for DHCP. ··· 380 393 </para><para> 381 394 If you enable this option the 382 395 <literal>networkmanager_strongswan</literal> plugin will be added to 383 - the <option>networking.networkmanager.packages</option> option 396 + the <option>networking.networkmanager.plugins</option> option 384 397 so you don't need to to that yourself. 385 398 ''; 386 399 }; ··· 399 412 }; 400 413 401 414 imports = [ 415 + (mkRenamedOptionModule 416 + [ "networking" "networkmanager" "packages" ] 417 + [ "networking" "networkmanager" "plugins" ]) 402 418 (mkRenamedOptionModule [ "networking" "networkmanager" "useDnsmasq" ] [ "networking" "networkmanager" "dns" ]) 403 419 (mkRemovedOptionModule ["networking" "networkmanager" "dynamicHosts"] '' 404 420 This option was removed because allowing (multiple) regular users to ··· 426 442 427 443 hardware.wirelessRegulatoryDatabase = true; 428 444 429 - environment.etc = with pkgs; { 430 - "NetworkManager/NetworkManager.conf".source = configFile; 431 - 432 - "NetworkManager/VPN/nm-openvpn-service.name".source = 433 - "${networkmanager-openvpn}/lib/NetworkManager/VPN/nm-openvpn-service.name"; 434 - 435 - "NetworkManager/VPN/nm-vpnc-service.name".source = 436 - "${networkmanager-vpnc}/lib/NetworkManager/VPN/nm-vpnc-service.name"; 437 - 438 - "NetworkManager/VPN/nm-openconnect-service.name".source = 439 - "${networkmanager-openconnect}/lib/NetworkManager/VPN/nm-openconnect-service.name"; 440 - 441 - "NetworkManager/VPN/nm-fortisslvpn-service.name".source = 442 - "${networkmanager-fortisslvpn}/lib/NetworkManager/VPN/nm-fortisslvpn-service.name"; 443 - 444 - "NetworkManager/VPN/nm-l2tp-service.name".source = 445 - "${networkmanager-l2tp}/lib/NetworkManager/VPN/nm-l2tp-service.name"; 446 - 447 - "NetworkManager/VPN/nm-iodine-service.name".source = 448 - "${networkmanager-iodine}/lib/NetworkManager/VPN/nm-iodine-service.name"; 449 - 450 - "NetworkManager/VPN/nm-sstp-service.name".source = 451 - "${networkmanager-sstp}/lib/NetworkManager/VPN/nm-sstp-service.name"; 452 - 445 + environment.etc = { 446 + "NetworkManager/NetworkManager.conf".source = configFile; 453 447 } 448 + // builtins.listToAttrs (map (pkg: nameValuePair "NetworkManager/${pkg.networkManagerPlugin}" { 449 + source = "${pkg}/lib/NetworkManager/${pkg.networkManagerPlugin}"; 450 + }) cfg.plugins) 454 451 // optionalAttrs cfg.enableFccUnlock 455 452 { 456 453 "ModemManager/fcc-unlock.d".source = ··· 460 457 { 461 458 "NetworkManager/dispatcher.d/02overridedns".source = overrideNameserversScript; 462 459 } 463 - // optionalAttrs cfg.enableStrongSwan 464 - { 465 - "NetworkManager/VPN/nm-strongswan-service.name".source = 466 - "${pkgs.networkmanager_strongswan}/lib/NetworkManager/VPN/nm-strongswan-service.name"; 467 - } 468 460 // listToAttrs (lib.imap1 (i: s: 469 461 { 470 462 name = "NetworkManager/dispatcher.d/${dispatcherTypesSubdirMap.${s.type}}03userscript${lib.fixedWidthNumber 4 i}"; 471 463 value = { mode = "0544"; inherit (s) source; }; 472 464 }) cfg.dispatcherScripts); 473 465 474 - environment.systemPackages = cfg.packages; 466 + environment.systemPackages = packages; 475 467 476 468 users.groups = { 477 469 networkmanager.gid = config.ids.gids.networkmanager; ··· 490 482 }; 491 483 }; 492 484 493 - systemd.packages = cfg.packages; 485 + systemd.packages = packages; 494 486 495 487 systemd.tmpfiles.rules = [ 496 488 "d /etc/NetworkManager/system-connections 0700 root root -" 497 489 "d /etc/ipsec.d 0700 root root -" 498 490 "d /var/lib/NetworkManager-fortisslvpn 0700 root root -" 499 491 500 - "d /var/lib/dhclient 0755 root root -" 501 492 "d /var/lib/misc 0755 root root -" # for dnsmasq.leases 502 493 ]; 503 494 ··· 534 525 useDHCP = false; 535 526 }) 536 527 528 + { 529 + networkmanager.plugins = with pkgs; [ 530 + networkmanager-fortisslvpn 531 + networkmanager-iodine 532 + networkmanager-l2tp 533 + networkmanager-openconnect 534 + networkmanager-openvpn 535 + networkmanager-vpnc 536 + networkmanager-sstp 537 + ]; 538 + } 539 + 537 540 (mkIf cfg.enableStrongSwan { 538 - networkmanager.packages = [ pkgs.networkmanager_strongswan ]; 541 + networkmanager.plugins = [ pkgs.networkmanager_strongswan ]; 539 542 }) 540 543 541 544 (mkIf enableIwd { ··· 559 562 security.polkit.enable = true; 560 563 security.polkit.extraConfig = polkitConf; 561 564 562 - services.dbus.packages = cfg.packages 565 + services.dbus.packages = packages 563 566 ++ optional cfg.enableStrongSwan pkgs.strongswanNM 564 567 ++ optional (cfg.dns == "dnsmasq") pkgs.dnsmasq; 565 568 566 - services.udev.packages = cfg.packages; 569 + services.udev.packages = packages; 567 570 }; 568 571 }
+5 -1
nixos/modules/virtualisation/azure-common.nix
··· 21 21 # way to select them anyway. 22 22 boot.loader.grub.configurationLimit = 0; 23 23 24 - fileSystems."/".device = "/dev/disk/by-label/nixos"; 24 + fileSystems."/" = { 25 + device = "/dev/disk/by-label/nixos"; 26 + fsType = "ext4"; 27 + autoResize = true; 28 + }; 25 29 26 30 # Allow root logins only using the SSH key that the user specified 27 31 # at instance creation time, ping client connections to avoid timeouts
+2 -2
pkgs/applications/graphics/yed/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "yEd"; 5 - version = "3.21.1"; 5 + version = "3.22"; 6 6 7 7 src = fetchzip { 8 8 url = "https://www.yworks.com/resources/yed/demo/${pname}-${version}.zip"; 9 - sha256 = "1jw28hkd7p0n660gid8yh5y0kdcz6ycn4hsgjlf0pq48x9kv6w0c"; 9 + sha256 = "sha256-GHYdvWie2k9YarS9DaA4bExswV3UQ26O8+7K/6yvtac="; 10 10 }; 11 11 12 12 nativeBuildInputs = [ makeWrapper unzip wrapGAppsHook ];
+2 -2
pkgs/applications/misc/taskwarrior/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "taskwarrior"; 5 - version = "2.6.1"; 5 + version = "2.6.2"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "GothenburgBitFactory"; 9 9 repo = "taskwarrior"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-jMZzo2cegoapEHTvfD6ThU1IsXru3iOcpyDbZxkSXzQ="; 11 + sha256 = "sha256-0YveqiylXJi4cdDCfnPtwCVOJbQrZYsxnXES+9B4Yfw="; 12 12 fetchSubmodules = true; 13 13 }; 14 14
+3 -3
pkgs/applications/misc/xdragon/default.nix pkgs/tools/X11/xdragon/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "xdragon"; 5 - version = "1.1.1"; 5 + version = "1.2.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "mwh"; 9 9 repo = "dragon"; 10 10 rev = "v${version}"; 11 - sha256 = "0fgzz39007fdjwq72scp0qygp2v3zc5f1xkm0sxaa8zxm25g1bra"; 11 + sha256 = "sha256-wqG6idlVvdN+sPwYgWu3UL0la5ssvymZibiak3KeV7M="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ pkg-config ]; 15 15 buildInputs = [ gtk3 ]; 16 16 17 - installFlags = [ "PREFIX=${placeholder "out"}/bin" ]; 17 + installFlags = [ "PREFIX=${placeholder "out"}" ]; 18 18 postInstall = '' 19 19 ln -s $out/bin/dragon $out/bin/xdragon 20 20 '';
-21
pkgs/applications/networking/instant-messengers/telegram/kotatogram-desktop/default.nix
··· 7 7 , ninja 8 8 , clang 9 9 , python3 10 - , wrapGAppsHook 11 10 , wrapQtAppsHook 12 11 , removeReferencesTo 13 12 , extra-cmake-modules ··· 27 26 , tl-expected 28 27 , hunspell 29 28 , glibmm 30 - , webkitgtk 31 29 , jemalloc 32 30 , rnnoise 33 31 , abseil-cpp ··· 65 63 , IOSurface 66 64 , Metal 67 65 , MetalKit 68 - , withWebKit ? false 69 66 }: 70 67 71 68 with lib; ··· 113 110 --replace '"libasound.so.2"' '"${alsa-lib}/lib/libasound.so.2"' 114 111 substituteInPlace Telegram/ThirdParty/libtgvoip/os/linux/AudioPulse.cpp \ 115 112 --replace '"libpulse.so.0"' '"${libpulseaudio}/lib/libpulse.so.0"' 116 - '' + optionalString (stdenv.isLinux && withWebKit) '' 117 - substituteInPlace Telegram/lib_webview/webview/platform/linux/webview_linux_webkit_gtk.cpp \ 118 - --replace '"libwebkit2gtk-4.0.so.37"' '"${webkitgtk}/lib/libwebkit2gtk-4.0.so.37"' 119 113 '' + optionalString stdenv.isDarwin '' 120 114 substituteInPlace Telegram/CMakeLists.txt \ 121 115 --replace 'COMMAND iconutil' 'COMMAND png2icns' \ ··· 124 118 --replace "\''${appicon_path}" "\''${appicon_path}/icon_16x16.png \''${appicon_path}/icon_32x32.png \''${appicon_path}/icon_128x128.png \''${appicon_path}/icon_256x256.png \''${appicon_path}/icon_512x512.png" 125 119 ''; 126 120 127 - # We want to run wrapProgram manually (with additional parameters) 128 - dontWrapGApps = stdenv.isLinux; 129 - dontWrapQtApps = stdenv.isLinux && withWebKit; 130 - 131 121 nativeBuildInputs = [ 132 122 pkg-config 133 123 cmake ··· 139 129 # to build bundled libdispatch 140 130 clang 141 131 extra-cmake-modules 142 - ] ++ optionals (stdenv.isLinux && withWebKit) [ 143 - wrapGAppsHook 144 132 ]; 145 133 146 134 buildInputs = [ ··· 166 154 glibmm 167 155 jemalloc 168 156 wayland 169 - ] ++ optionals (stdenv.isLinux && withWebKit) [ 170 - webkitgtk 171 157 ] ++ optionals stdenv.isDarwin [ 172 158 Cocoa 173 159 CoreFoundation ··· 223 209 remove-references-to -t ${stdenv.cc.cc} $out/bin/$binName 224 210 remove-references-to -t ${microsoft_gsl} $out/bin/$binName 225 211 remove-references-to -t ${tg_owt.dev} $out/bin/$binName 226 - ''; 227 - 228 - postFixup = optionalString (stdenv.isLinux && withWebKit) '' 229 - # We also use gappsWrapperArgs from wrapGAppsHook. 230 - wrapProgram $out/bin/kotatogram-desktop \ 231 - "''${gappsWrapperArgs[@]}" \ 232 - "''${qtWrapperArgs[@]}" 233 212 ''; 234 213 235 214 passthru = {
+23
pkgs/applications/networking/instant-messengers/telegram/kotatogram-desktop/with-webkit.nix
··· 1 + { stdenv, lib, kotatogram-desktop, glib-networking, webkitgtk, makeWrapper }: 2 + 3 + with lib; 4 + 5 + stdenv.mkDerivation { 6 + pname = "${kotatogram-desktop.pname}-with-webkit"; 7 + version = kotatogram-desktop.version; 8 + nativeBuildInputs = [ makeWrapper ]; 9 + dontUnpack = true; 10 + installPhase = '' 11 + mkdir -p $out 12 + cp -r ${kotatogram-desktop}/share $out 13 + ''; 14 + postFixup = '' 15 + mkdir -p $out/bin 16 + makeWrapper ${kotatogram-desktop}/bin/kotatogram-desktop $out/bin/kotatogram-desktop \ 17 + --prefix GIO_EXTRA_MODULES : ${glib-networking}/lib/gio/modules \ 18 + --prefix LD_LIBRARY_PATH : ${makeLibraryPath [ webkitgtk ]} 19 + ''; 20 + meta = kotatogram-desktop.meta // { 21 + platforms = platforms.linux; 22 + }; 23 + }
+30 -16
pkgs/applications/science/biology/eggnog-mapper/default.nix
··· 1 - { lib, fetchFromGitHub, fetchpatch, makeWrapper, python27Packages, wget, diamond, hmmer }: 1 + { lib 2 + , autoPatchelfHook 3 + , fetchFromGitHub 4 + , python3Packages 5 + , wget 6 + , zlib 7 + }: 2 8 3 - python27Packages.buildPythonApplication rec { 9 + python3Packages.buildPythonApplication rec { 4 10 pname = "eggnog-mapper"; 5 - version = "1.0.3"; 11 + version = "2.1.7"; 6 12 7 13 src = fetchFromGitHub { 8 14 owner = "eggnogdb"; 9 - repo = "eggnog-mapper"; 15 + repo = pname; 10 16 rev = version; 11 - sha256 = "1aaaflppy84bhkh2hb5gnzm4xgrz0rz0cgfpadr9w8cva8p0sqdv"; 17 + hash = "sha256-auVD/r8m3TAB1KYMQ7Sae23eDg6LRx/daae0505cjwU="; 12 18 }; 13 19 14 - patches = (fetchpatch { 15 - url = "https://github.com/eggnogdb/eggnog-mapper/commit/6972f601ade85b65090efca747d2302acb58507f.patch"; 16 - sha256 = "0abnmn0bh11jihf5d3cggiild1ykawzv5f5fhb4cyyi8fvy4hcxf"; 17 - }); 20 + postPatch = '' 21 + # Not a great solution... 22 + substituteInPlace setup.cfg \ 23 + --replace "==" ">=" 24 + ''; 18 25 19 - nativeBuildInputs = [ makeWrapper ]; 20 - propagatedBuildInputs = [ python27Packages.biopython wget diamond hmmer ]; 26 + nativeBuildInputs = [ 27 + autoPatchelfHook 28 + ]; 21 29 22 - # make emapper find diamond & hmmer 23 - makeWrapperArgs = [ 24 - ''--prefix PATH ':' "${diamond}/bin"'' 25 - ''--prefix PATH ':' "${hmmer}/bin"'' 26 - ]; 30 + buildInputs = [ 31 + zlib 32 + ]; 33 + 34 + propagatedBuildInputs = [ 35 + wget 36 + ] ++ (with python3Packages; [ 37 + biopython 38 + psutil 39 + XlsxWriter 40 + ]); 27 41 28 42 # Tests rely on some of the databases being available, which is not bundled 29 43 # with this package as (1) in total, they represent >100GB of data, and (2)
+2 -2
pkgs/applications/science/medicine/xmedcon/default.nix
··· 10 10 11 11 stdenv.mkDerivation rec { 12 12 pname = "xmedcon"; 13 - version = "0.21.2"; 13 + version = "0.22.0"; 14 14 15 15 src = fetchurl { 16 16 url = "mirror://sourceforge/${pname}/${pname}-${version}.tar.bz2"; 17 - sha256 = "0svff8rc3j2p47snaq1hx9mv4ydmxawpb0hf3d165g1ccjwvmm6m"; 17 + sha256 = "sha256-Ui7XoLSzTMPIFW/3nARCmvlGF+1l7pmcnKsnvn3NFJE="; 18 18 }; 19 19 20 20 buildInputs = [
+15 -6
pkgs/applications/version-management/git-sizer/default.nix
··· 1 - { lib, buildGoPackage, fetchFromGitHub }: 1 + { lib, buildGoModule, fetchFromGitHub, testVersion, git-sizer }: 2 2 3 - buildGoPackage rec { 3 + buildGoModule rec { 4 4 pname = "git-sizer"; 5 - version = "1.3.0"; 6 - 7 - goPackagePath = "github.com/github/git-sizer"; 5 + version = "1.5.0"; 8 6 9 7 src = fetchFromGitHub { 10 8 owner = "github"; 11 9 repo = pname; 12 10 rev = "v${version}"; 13 - sha256 = "0kmyvai5xfalm56ywa6mhdvvjnacdzwcyz28bw0pz9a4gyf1mgvh"; 11 + sha256 = "sha256-On7QBTzKfnuuzwMQ8m1odxGqfIKL+EDg5V05Kxuhmqw="; 12 + }; 13 + 14 + vendorSha256 = "sha256-oRlsD99XiI/0ZWibjyRcycmGab+vMbXrV5hIdIyUDYg="; 15 + 16 + ldflags = [ "-s" "-w" "-X main.BuildVersion=${version}" ]; 17 + 18 + doCheck = false; 19 + 20 + passthru.tests.vesion = testVersion { 21 + package = git-sizer; 14 22 }; 15 23 16 24 meta = with lib; { 17 25 description = "Compute various size metrics for a Git repository"; 26 + homepage = "https://github.com/github/git-sizer"; 18 27 license = licenses.mit; 19 28 maintainers = with maintainers; [ matthewbauer ]; 20 29 };
+5 -1
pkgs/data/sgml+xml/stylesheets/xslt/docbook-xsl/default.nix
··· 1 - { lib, stdenv, substituteAll, fetchurl, fetchpatch, findXMLCatalogs, writeScriptBin, ruby, bash }: 1 + { lib, stdenv, substituteAll, fetchurl, fetchpatch, findXMLCatalogs, writeScriptBin, ruby, bash, withManOptDedupPatch ? false }: 2 2 3 3 let 4 4 ··· 36 36 src = ./catalog-legacy-uris.patch; 37 37 inherit legacySuffix suffix version; 38 38 }) 39 + ] ++ lib.optionals withManOptDedupPatch [ 40 + # Fixes https://github.com/NixOS/nixpkgs/issues/166304 41 + # https://github.com/docbook/xslt10-stylesheets/pull/241 42 + ./fix-man-options-duplication.patch 39 43 ]; 40 44 41 45 propagatedBuildInputs = [ findXMLCatalogs ];
+11
pkgs/data/sgml+xml/stylesheets/xslt/docbook-xsl/fix-man-options-duplication.patch
··· 1 + --- a/manpages/lists.xsl 2 + +++ b/manpages/lists.xsl 3 + @@ -110,7 +110,7 @@ 4 + <xsl:text>.RE&#10;</xsl:text> 5 + </xsl:template> 6 + 7 + -<xsl:template match="d:varlistentry/d:term"/> 8 + +<xsl:template match="d:varlistentry/d:term" priority="1"/> 9 + <xsl:template match="d:glossentry/d:glossterm"/> 10 + 11 + <xsl:template match="d:variablelist[ancestor::d:listitem or ancestor::d:step or ancestor::d:glossdef]|
+1 -5
pkgs/development/libraries/leveldb/default.nix
··· 38 38 "-DBUILD_SHARED_LIBS=${if static then "OFF" else "ON"}" 39 39 "-DCMAKE_SKIP_BUILD_RPATH=OFF" 40 40 "-DLEVELDB_BUILD_TESTS=OFF" 41 + "-DLEVELDB_BUILD_BENCHMARKS=OFF" 41 42 ]; 42 - 43 - postPatch = lib.optionalString stdenv.hostPlatform.isStatic '' 44 - # remove shared objects from "all" target 45 - sed -i '/^all:/ s/$(SHARED_LIBS) $(SHARED_PROGRAMS)//' Makefile 46 - ''; 47 43 48 44 postInstall = '' 49 45 substituteInPlace "$out"/lib/cmake/leveldb/leveldbTargets.cmake \
+3 -3
pkgs/development/tools/azcopy/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "azure-storage-azcopy"; 5 - version = "10.13.0"; 5 + version = "10.14.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "Azure"; 9 9 repo = "azure-storage-azcopy"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-L5gfS2hwk1uaWEygn+liupdANL9qizHAjxNz25KBwaY="; 11 + sha256 = "sha256-9NuX4BbQx/ZeWvyTxlZjrb7ETwSFwBpfDcSt8qvKAxE="; 12 12 }; 13 13 14 14 subPackages = [ "." ]; 15 15 16 - vendorSha256 = "sha256-ePEpc18Y99Moe/aj8n1+no6D70vZoIEjC023Uup98Uo="; 16 + vendorSha256 = "sha256-9ThsJySzsyS0eX/0BlAAvtaeJpPYCP0cN1YgIShYrKw="; 17 17 18 18 doCheck = false; 19 19
+2 -2
pkgs/development/tools/clj-kondo/default.nix
··· 2 2 3 3 buildGraalvmNativeImage rec { 4 4 pname = "clj-kondo"; 5 - version = "2022.03.09"; 5 + version = "2022.04.08"; 6 6 7 7 src = fetchurl { 8 8 url = "https://github.com/clj-kondo/${pname}/releases/download/v${version}/${pname}-${version}-standalone.jar"; 9 - sha256 = "sha256-gPn3wORb30I/zTXUdxUxMesKFJx6ES7jEjUYuC/DAVI="; 9 + sha256 = "sha256-dZtiwePwgLgKc0WkSnxI2zW9hOWKVW5+rO905LQhgvQ="; 10 10 }; 11 11 12 12 extraNativeImageBuildArgs = [
+2 -2
pkgs/os-specific/linux/pipework/default.nix
··· 1 1 { stdenv, lib, fetchFromGitHub, makeWrapper 2 - , bridge-utils, iproute2, lxc, openvswitch, docker, busybox, dhcpcd, dhcp 2 + , bridge-utils, iproute2, lxc, openvswitch, docker, busybox, dhcpcd 3 3 }: 4 4 5 5 stdenv.mkDerivation { ··· 15 15 installPhase = '' 16 16 install -D pipework $out/bin/pipework 17 17 wrapProgram $out/bin/pipework --prefix PATH : \ 18 - ${lib.makeBinPath [ bridge-utils iproute2 lxc openvswitch docker busybox dhcpcd dhcp ]}; 18 + ${lib.makeBinPath [ bridge-utils iproute2 lxc openvswitch docker busybox dhcpcd ]}; 19 19 ''; 20 20 meta = with lib; { 21 21 description = "Software-Defined Networking tools for LXC";
+5 -4
pkgs/servers/search/elasticsearch/7.x.nix
··· 18 18 plat = elemAt info 1; 19 19 shas = 20 20 { 21 - x86_64-linux = "1s16l95wc589cr69pfbgmkn9rkvxn6sd6jlbiqpm6p6iyxiaxd6c"; 22 - x86_64-darwin = "05h7pvq4pb816wgcymnfklp3w6sv54x6138v2infw5219dnk8pfs"; 23 - aarch64-linux = "0q4xnjzhlx1b2lkikca88qh9glfxaifsm419k2bxxlrfrx31zlkq"; 21 + x86_64-linux = "1s16l95wc589cr69pfbgmkn9rkvxn6sd6jlbiqpm6p6iyxiaxd6c"; 22 + x86_64-darwin = "05h7pvq4pb816wgcymnfklp3w6sv54x6138v2infw5219dnk8pfs"; 23 + aarch64-linux = "0q4xnjzhlx1b2lkikca88qh9glfxaifsm419k2bxxlrfrx31zlkq"; 24 + aarch64-darwin = "067mb1dianwiarw8cz1va4g6zfhp9ls4s174xbpkxwsknvvyhgz6"; 24 25 }; 25 26 in 26 27 stdenv.mkDerivation rec { ··· 45 46 ''; 46 47 47 48 nativeBuildInputs = [ makeWrapper ] 48 - ++ optional stdenv.isLinux autoPatchelfHook; 49 + ++ lib.optional (!stdenv.hostPlatform.isDarwin) autoPatchelfHook; 49 50 50 51 buildInputs = [ jre_headless util-linux zlib ]; 51 52
+2 -2
pkgs/servers/sql/pgbouncer/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "pgbouncer"; 5 - version = "1.16.1"; 5 + version = "1.17.0"; 6 6 7 7 src = fetchurl { 8 8 url = "https://pgbouncer.github.io/downloads/files/${version}/${pname}-${version}.tar.gz"; 9 - sha256 = "1z7p3ghpmbp5qv1bz9s186jn0hfnr300dc5p0hmh6vbnwklpfx08"; 9 + sha256 = "sha256-ZXMJt7xceoXL9wqaRBtTX3gkEjCB6rt7qG0ANJolbiM="; 10 10 }; 11 11 12 12 nativeBuildInputs = [ pkg-config ];
-28
pkgs/tools/X11/dragon-drop/default.nix
··· 1 - { lib, stdenv, gtk, pkg-config, fetchFromGitHub }: 2 - 3 - stdenv.mkDerivation rec { 4 - pname = "dragon-drop"; 5 - version = "1.1.1"; 6 - 7 - src = fetchFromGitHub { 8 - owner = "mwh"; 9 - repo = "dragon"; 10 - rev = "v${version}"; 11 - sha256 = "0fgzz39007fdjwq72scp0qygp2v3zc5f1xkm0sxaa8zxm25g1bra"; 12 - }; 13 - 14 - nativeBuildInputs = [ pkg-config ]; 15 - buildInputs = [ gtk ]; 16 - 17 - installPhase = '' 18 - install -D dragon -t $out/bin 19 - ''; 20 - 21 - meta = with lib; { 22 - description = "Simple drag-and-drop source/sink for X"; 23 - homepage = "https://github.com/mwh/dragon"; 24 - maintainers = with maintainers; [ jb55 markus1189 ]; 25 - license = licenses.gpl3; 26 - platforms = with platforms; unix; 27 - }; 28 - }
+2 -2
pkgs/tools/compression/gzip/default.nix
··· 11 11 12 12 stdenv.mkDerivation rec { 13 13 pname = "gzip"; 14 - version = "1.11"; 14 + version = "1.12"; 15 15 16 16 src = fetchurl { 17 17 url = "mirror://gnu/gzip/${pname}-${version}.tar.xz"; 18 - sha256 = "01vrly90rvc98af6rcmrb3gwv1l6pylasvsdka23dffwizb9b6lv"; 18 + sha256 = "sha256-zl4D5Rn2N+H4FAEazjXE+HszwLur7sNbr1+9NHnpGVY="; 19 19 }; 20 20 21 21 outputs = [ "out" "man" "info" ];
+5 -4
pkgs/tools/misc/starship/default.nix
··· 9 9 , nixosTests 10 10 , Security 11 11 , Foundation 12 + , Cocoa 12 13 }: 13 14 14 15 rustPlatform.buildRustPackage rec { 15 16 pname = "starship"; 16 - version = "1.3.0"; 17 + version = "1.5.4"; 17 18 18 19 src = fetchFromGitHub { 19 20 owner = "starship"; 20 21 repo = pname; 21 22 rev = "v${version}"; 22 - sha256 = "sha256-mqUE4JzNBhvtDpT2LM23eHX8q93wtPqA+/zr/PxEDiE="; 23 + sha256 = "sha256-nLzqfSRmA+D310MDvX+g8nNsoaiSixG+j+g87CPzYMs="; 23 24 }; 24 25 25 26 nativeBuildInputs = [ installShellFiles pkg-config ]; 26 27 27 - buildInputs = [ libgit2 ] ++ lib.optionals stdenv.isDarwin [ libiconv Security Foundation ]; 28 + buildInputs = [ libgit2 ] ++ lib.optionals stdenv.isDarwin [ libiconv Security Foundation Cocoa ]; 28 29 29 30 postInstall = '' 30 31 for shell in bash fish zsh; do ··· 33 34 done 34 35 ''; 35 36 36 - cargoSha256 = "sha256-hQNDiayVT4UgbxcxdXssi/evPvwgyvG/UOFyEHj7jpo="; 37 + cargoSha256 = "sha256-FXzAvO11NIr6dxF2OeV5XJWHG2kgZiASuBnoC6mSps8="; 37 38 38 39 preCheck = '' 39 40 HOME=$TMPDIR
+2 -2
pkgs/tools/misc/tmux-mem-cpu-load/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "tmux-mem-cpu-load"; 5 - version = "3.5.1"; 5 + version = "3.6.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "thewtex"; 9 9 repo = "tmux-mem-cpu-load"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-4ZMF+RacZL9dJRCz63XPNuigTKHOW+ZcA4vB4jsnASc="; 11 + sha256 = "sha256-1smhlp30y0qihm+d9RcCKY1CFbPm5gzago+OIQQT5jE="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ cmake ];
+30
pkgs/tools/networking/curl/7.82.0-openssl-fix-CN-check.patch
··· 1 + From 911714d617c106ed5d553bf003e34ec94ab6a136 Mon Sep 17 00:00:00 2001 2 + From: Daniel Stenberg <daniel@haxx.se> 3 + Date: Tue, 8 Mar 2022 13:38:13 +0100 4 + Subject: [PATCH] openssl: fix CN check error code 5 + 6 + Due to a missing 'else' this returns error too easily. 7 + 8 + Regressed in: d15692ebb 9 + 10 + Reported-by: Kristoffer Gleditsch 11 + Fixes #8559 12 + Closes #8560 13 + --- 14 + lib/vtls/openssl.c | 3 ++- 15 + 1 file changed, 2 insertions(+), 1 deletion(-) 16 + 17 + diff --git a/lib/vtls/openssl.c b/lib/vtls/openssl.c 18 + index 0b79fc50a9c5..4618beeb3867 100644 19 + --- a/lib/vtls/openssl.c 20 + +++ b/lib/vtls/openssl.c 21 + @@ -1817,7 +1817,8 @@ CURLcode Curl_ossl_verifyhost(struct Curl_easy *data, struct connectdata *conn, 22 + memcpy(peer_CN, ASN1_STRING_get0_data(tmp), peerlen); 23 + peer_CN[peerlen] = '\0'; 24 + } 25 + - result = CURLE_OUT_OF_MEMORY; 26 + + else 27 + + result = CURLE_OUT_OF_MEMORY; 28 + } 29 + } 30 + else /* not a UTF8 name */
+1
pkgs/tools/networking/curl/default.nix
··· 66 66 67 67 patches = [ 68 68 ./7.79.1-darwin-no-systemconfiguration.patch 69 + ./7.82.0-openssl-fix-CN-check.patch 69 70 ]; 70 71 71 72 outputs = [ "bin" "dev" "out" "man" "devdoc" ];
+11 -16
pkgs/tools/networking/dhcp/default.nix
··· 1 1 { stdenv, fetchurl, fetchpatch, perl, file, nettools, iputils, iproute2, makeWrapper 2 2 , coreutils, gnused, openldap ? null 3 3 , buildPackages, lib 4 + 5 + # client and relay are end of life, remove after 4.4.3 6 + , withClient ? false 7 + , withRelay ? false 4 8 }: 5 9 6 10 stdenv.mkDerivation rec { 7 11 pname = "dhcp"; 8 - version = "4.4.2-P1"; 12 + version = "4.4.3"; 9 13 10 14 src = fetchurl { 11 15 url = "https://ftp.isc.org/isc/dhcp/${version}/${pname}-${version}.tar.gz"; 12 - sha256 = "06jsr0cg5rsmyibshrpcb9za0qgwvqccashdma7mlm1rflrh8pmh"; 16 + sha256 = "sha256-Dj7GtMKgXsAUiHS82ZmmbQVRg3jXdCH2B/sLydATWBg="; 13 17 }; 14 18 15 19 patches = ··· 18 22 # patch, the hostname doesn't get set properly if the old 19 23 # hostname (i.e. before reboot) is equal to the new hostname. 20 24 ./set-hostname.patch 21 - 22 - (fetchpatch { 23 - # upstream build fix against -fno-common compilers like >=gcc-10 24 - url = "https://gitlab.isc.org/isc-projects/dhcp/-/commit/6c7e61578b1b449272dbb40dd8b98d03dad8a57a.patch"; 25 - sha256 = "1g37ix0yf9zza8ri8bg438ygcjviniblfyb20y4gzc8lysy28m8b"; 26 - }) 27 - 28 - # Fix parallel build failure, the patch is pending upstream inclusion: 29 - # https://gitlab.isc.org/isc-projects/dhcp/-/merge_requests/76 30 - (fetchpatch { 31 - name = "parallel-make.patch"; 32 - url = "https://gitlab.isc.org/isc-projects/dhcp/-/commit/46d101b97c5a3b19a3f63f7b60e5f88994a64e22.patch"; 33 - sha256 = "1y3nsmqjzcg4bhp1xmqp47v7rkl3bpcildkx6mlrg255yvxapmdp"; 34 - }) 35 25 ]; 36 26 37 27 nativeBuildInputs = [ perl makeWrapper ]; ··· 77 67 --replace /sbin/ip ${iproute2}/sbin/ip 78 68 wrapProgram "$out/sbin/dhclient-script" --prefix PATH : \ 79 69 "${nettools}/bin:${nettools}/sbin:${iputils}/bin:${coreutils}/bin:${gnused}/bin" 70 + '' + lib.optionalString (!withClient) '' 71 + rm $out/sbin/{dhclient,dhclient-script,.dhclient-script-wrapped} 72 + '' + lib.optionalString (!withRelay) '' 73 + rm $out/sbin/dhcrelay 80 74 ''; 81 75 82 76 preConfigure = ··· 103 97 homepage = "https://www.isc.org/dhcp/"; 104 98 license = licenses.mpl20; 105 99 platforms = platforms.unix; 100 + knownVulnerabilities = lib.optional (withClient || withRelay) "The client and relay component of the dhcp package have reached their end of life"; 106 101 }; 107 102 }
+4 -4
pkgs/tools/networking/networkmanager/default.nix
··· 12 12 , polkit 13 13 , gnutls 14 14 , ppp 15 - , dhcp 15 + , dhcpcd 16 16 , iptables 17 17 , nftables 18 18 , python3 ··· 96 96 "-Dresolvconf=${openresolv}/bin/resolvconf" 97 97 98 98 # DHCP clients 99 - "-Ddhclient=${dhcp}/bin/dhclient" 100 - # Upstream prefers dhclient, so don't add dhcpcd to the closure 101 - "-Ddhcpcd=no" 99 + # ISC DHCP client has reached it's end of life, so stop using it 100 + "-Ddhclient=no" 101 + "-Ddhcpcd=${dhcpcd}/bin/dhcpcd" 102 102 "-Ddhcpcanon=no" 103 103 104 104 # Miscellaneous
+1
pkgs/tools/networking/networkmanager/fortisslvpn/default.nix
··· 73 73 attrPath = "networkmanager-fortisslvpn"; 74 74 versionPolicy = "odd-unstable"; 75 75 }; 76 + networkManagerPlugin = "VPN/nm-fortisslvpn-service.name"; 76 77 }; 77 78 78 79 meta = with lib; {
+1
pkgs/tools/networking/networkmanager/iodine/default.nix
··· 48 48 packageName = pname; 49 49 attrPath = "networkmanager-iodine"; 50 50 }; 51 + networkManagerPlugin = "VPN/nm-iodine-service.name"; 51 52 }; 52 53 53 54 meta = with lib; {
+4
pkgs/tools/networking/networkmanager/l2tp/default.nix
··· 41 41 42 42 enableParallelBuilding = true; 43 43 44 + passthru = { 45 + networkManagerPlugin = "VPN/nm-l2tp-service.name"; 46 + }; 47 + 44 48 meta = with lib; { 45 49 description = "L2TP plugin for NetworkManager"; 46 50 inherit (networkmanager.meta) platforms;
+1
pkgs/tools/networking/networkmanager/openconnect/default.nix
··· 69 69 attrPath = "networkmanager-openconnect"; 70 70 versionPolicy = "odd-unstable"; 71 71 }; 72 + networkManagerPlugin = "VPN/nm-openconnect-service.name"; 72 73 }; 73 74 74 75 meta = with lib; {
+1
pkgs/tools/networking/networkmanager/openvpn/default.nix
··· 67 67 attrPath = "networkmanager-openvpn"; 68 68 versionPolicy = "odd-unstable"; 69 69 }; 70 + networkManagerPlugin = "VPN/nm-openvpn-service.name"; 70 71 }; 71 72 72 73 meta = with lib; {
+1
pkgs/tools/networking/networkmanager/sstp/default.nix
··· 54 54 packageName = pname; 55 55 attrPath = "networkmanager-sstp"; 56 56 }; 57 + networkManagerPlugin = "VPN/nm-sstp-service.name"; 57 58 }; 58 59 59 60 meta = with lib; {
+4
pkgs/tools/networking/networkmanager/strongswan/default.nix
··· 24 24 "--with-nm-plugindir=$(out)/lib/NetworkManager" 25 25 ]; 26 26 27 + passthru = { 28 + networkManagerPlugin = "VPN/nm-strongswan-service.name"; 29 + }; 30 + 27 31 PKG_CONFIG_LIBNM_VPNSERVICEDIR = "$(out)/lib/NetworkManager/VPN"; 28 32 29 33 meta = with lib; {
+1
pkgs/tools/networking/networkmanager/vpnc/default.nix
··· 64 64 attrPath = "networkmanager-vpnc"; 65 65 versionPolicy = "odd-unstable"; 66 66 }; 67 + networkManagerPlugin = "VPN/nm-vpnc-service.name"; 67 68 }; 68 69 69 70 meta = with lib; {
+1
pkgs/top-level/aliases.nix
··· 316 316 dolphinEmuMaster = dolphin-emu-beta; # Added 2021-11-10 317 317 dotnet-netcore = dotnet-runtime; # Added 2021-10-07 318 318 double_conversion = throw "'double_conversion' has been renamed to/replaced by 'double-conversion'"; # Converted to throw 2022-02-22 319 + dragon-drop = throw "'dragon-drop' has been removed in favor of 'xdragon'"; # Added 2022-04-10; 319 320 draftsight = throw "draftsight has been removed, no longer available as freeware"; # Added 2020-08-14 320 321 dvb_apps = throw "dvb_apps has been removed"; # Added 2020-11-03 321 322 dwarf_fortress = throw "'dwarf_fortress' has been renamed to/replaced by 'dwarf-fortress'"; # Converted to throw 2022-02-22
+4 -6
pkgs/top-level/all-packages.nix
··· 3011 3011 3012 3012 dpic = callPackage ../tools/graphics/dpic { }; 3013 3013 3014 - dragon-drop = callPackage ../tools/X11/dragon-drop { 3015 - gtk = gtk3; 3016 - }; 3017 - 3018 3014 dstp = callPackage ../development/tools/dstp { }; 3019 3015 3020 3016 dsvpn = callPackage ../applications/networking/dsvpn { }; ··· 24299 24295 stdmanpages = callPackage ../data/documentation/std-man-pages { }; 24300 24296 24301 24297 starship = callPackage ../tools/misc/starship { 24302 - inherit (darwin.apple_sdk.frameworks) Security Foundation; 24298 + inherit (darwin.apple_sdk.frameworks) Security Foundation Cocoa; 24303 24299 }; 24304 24300 24305 24301 stig = callPackage ../applications/networking/p2p/stig { }; ··· 27059 27055 27060 27056 abseil-cpp = abseil-cpp_202111; 27061 27057 }; 27058 + 27059 + kotatogram-desktop-with-webkit = callPackage ../applications/networking/instant-messengers/telegram/kotatogram-desktop/with-webkit.nix {}; 27062 27060 27063 27061 kpt = callPackage ../applications/networking/cluster/kpt { }; 27064 27062 ··· 34031 34029 34032 34030 sift = callPackage ../tools/text/sift { }; 34033 34031 34034 - xdragon = lowPrio (callPackage ../applications/misc/xdragon { }); 34032 + xdragon = lowPrio (callPackage ../tools/X11/xdragon { }); 34035 34033 34036 34034 xlockmore = callPackage ../misc/screensavers/xlockmore { }; 34037 34035