lol

Merge branch 'staging-next' into staging

+247 -187
+4
nixos/doc/manual/default.nix
··· 14 let 15 lib = pkgs.lib; 16 17 # We need to strip references to /nix/store/* from options, 18 # including any `extraSources` if some modules came from elsewhere, 19 # or else the build will fail.
··· 14 let 15 lib = pkgs.lib; 16 17 + docbook_xsl_ns = pkgs.docbook-xsl-ns.override { 18 + withManOptDedupPatch = true; 19 + }; 20 + 21 # We need to strip references to /nix/store/* from options, 22 # including any `extraSources` if some modules came from elsewhere, 23 # or else the build will fail.
+56 -53
nixos/modules/services/networking/networkmanager.nix
··· 5 let 6 cfg = config.networking.networkmanager; 7 8 - basePackages = with pkgs; [ 9 - modemmanager 10 - networkmanager 11 - networkmanager-fortisslvpn 12 - networkmanager-iodine 13 - networkmanager-l2tp 14 - networkmanager-openconnect 15 - networkmanager-openvpn 16 - networkmanager-vpnc 17 - networkmanager-sstp 18 - ] ++ optional (!delegateWireless && !enableIwd) wpa_supplicant; 19 - 20 delegateWireless = config.networking.wireless.enable == true && cfg.unmanaged != []; 21 22 enableIwd = cfg.wifi.backend == "iwd"; ··· 145 ''; 146 }; 147 148 in { 149 150 meta = { ··· 227 ''; 228 }; 229 230 - packages = mkOption { 231 - type = types.listOf types.package; 232 default = [ ]; 233 description = '' 234 - Extra packages that provide NetworkManager plugins. 235 ''; 236 - apply = list: basePackages ++ list; 237 }; 238 239 dhcp = mkOption { 240 - type = types.enum [ "dhclient" "dhcpcd" "internal" ]; 241 default = "internal"; 242 description = '' 243 Which program (or internal library) should be used for DHCP. ··· 380 </para><para> 381 If you enable this option the 382 <literal>networkmanager_strongswan</literal> plugin will be added to 383 - the <option>networking.networkmanager.packages</option> option 384 so you don't need to to that yourself. 385 ''; 386 }; ··· 399 }; 400 401 imports = [ 402 (mkRenamedOptionModule [ "networking" "networkmanager" "useDnsmasq" ] [ "networking" "networkmanager" "dns" ]) 403 (mkRemovedOptionModule ["networking" "networkmanager" "dynamicHosts"] '' 404 This option was removed because allowing (multiple) regular users to ··· 426 427 hardware.wirelessRegulatoryDatabase = true; 428 429 - environment.etc = with pkgs; { 430 - "NetworkManager/NetworkManager.conf".source = configFile; 431 - 432 - "NetworkManager/VPN/nm-openvpn-service.name".source = 433 - "${networkmanager-openvpn}/lib/NetworkManager/VPN/nm-openvpn-service.name"; 434 - 435 - "NetworkManager/VPN/nm-vpnc-service.name".source = 436 - "${networkmanager-vpnc}/lib/NetworkManager/VPN/nm-vpnc-service.name"; 437 - 438 - "NetworkManager/VPN/nm-openconnect-service.name".source = 439 - "${networkmanager-openconnect}/lib/NetworkManager/VPN/nm-openconnect-service.name"; 440 - 441 - "NetworkManager/VPN/nm-fortisslvpn-service.name".source = 442 - "${networkmanager-fortisslvpn}/lib/NetworkManager/VPN/nm-fortisslvpn-service.name"; 443 - 444 - "NetworkManager/VPN/nm-l2tp-service.name".source = 445 - "${networkmanager-l2tp}/lib/NetworkManager/VPN/nm-l2tp-service.name"; 446 - 447 - "NetworkManager/VPN/nm-iodine-service.name".source = 448 - "${networkmanager-iodine}/lib/NetworkManager/VPN/nm-iodine-service.name"; 449 - 450 - "NetworkManager/VPN/nm-sstp-service.name".source = 451 - "${networkmanager-sstp}/lib/NetworkManager/VPN/nm-sstp-service.name"; 452 - 453 } 454 // optionalAttrs cfg.enableFccUnlock 455 { 456 "ModemManager/fcc-unlock.d".source = ··· 460 { 461 "NetworkManager/dispatcher.d/02overridedns".source = overrideNameserversScript; 462 } 463 - // optionalAttrs cfg.enableStrongSwan 464 - { 465 - "NetworkManager/VPN/nm-strongswan-service.name".source = 466 - "${pkgs.networkmanager_strongswan}/lib/NetworkManager/VPN/nm-strongswan-service.name"; 467 - } 468 // listToAttrs (lib.imap1 (i: s: 469 { 470 name = "NetworkManager/dispatcher.d/${dispatcherTypesSubdirMap.${s.type}}03userscript${lib.fixedWidthNumber 4 i}"; 471 value = { mode = "0544"; inherit (s) source; }; 472 }) cfg.dispatcherScripts); 473 474 - environment.systemPackages = cfg.packages; 475 476 users.groups = { 477 networkmanager.gid = config.ids.gids.networkmanager; ··· 490 }; 491 }; 492 493 - systemd.packages = cfg.packages; 494 495 systemd.tmpfiles.rules = [ 496 "d /etc/NetworkManager/system-connections 0700 root root -" 497 "d /etc/ipsec.d 0700 root root -" 498 "d /var/lib/NetworkManager-fortisslvpn 0700 root root -" 499 500 - "d /var/lib/dhclient 0755 root root -" 501 "d /var/lib/misc 0755 root root -" # for dnsmasq.leases 502 ]; 503 ··· 534 useDHCP = false; 535 }) 536 537 (mkIf cfg.enableStrongSwan { 538 - networkmanager.packages = [ pkgs.networkmanager_strongswan ]; 539 }) 540 541 (mkIf enableIwd { ··· 559 security.polkit.enable = true; 560 security.polkit.extraConfig = polkitConf; 561 562 - services.dbus.packages = cfg.packages 563 ++ optional cfg.enableStrongSwan pkgs.strongswanNM 564 ++ optional (cfg.dns == "dnsmasq") pkgs.dnsmasq; 565 566 - services.udev.packages = cfg.packages; 567 }; 568 }
··· 5 let 6 cfg = config.networking.networkmanager; 7 8 delegateWireless = config.networking.wireless.enable == true && cfg.unmanaged != []; 9 10 enableIwd = cfg.wifi.backend == "iwd"; ··· 133 ''; 134 }; 135 136 + packages = [ 137 + pkgs.modemmanager 138 + pkgs.networkmanager 139 + ] 140 + ++ cfg.plugins 141 + ++ lib.optionals (!delegateWireless && !enableIwd) [ 142 + pkgs.wpa_supplicant 143 + ]; 144 + 145 in { 146 147 meta = { ··· 224 ''; 225 }; 226 227 + plugins = mkOption { 228 + type = 229 + let 230 + networkManagerPluginPackage = types.package // { 231 + description = "NetworkManager plug-in"; 232 + check = 233 + p: 234 + lib.assertMsg 235 + (types.package.check p 236 + && p ? networkManagerPlugin 237 + && lib.isString p.networkManagerPlugin) 238 + '' 239 + Package ‘${p.name}’, is not a NetworkManager plug-in. 240 + Those need to have a ‘networkManagerPlugin’ attribute. 241 + ''; 242 + }; 243 + in 244 + types.listOf networkManagerPluginPackage; 245 default = [ ]; 246 description = '' 247 + List of NetworkManager plug-ins to enable. 248 + Some plug-ins are enabled by the NetworkManager module by default. 249 ''; 250 }; 251 252 dhcp = mkOption { 253 + type = types.enum [ "dhcpcd" "internal" ]; 254 default = "internal"; 255 description = '' 256 Which program (or internal library) should be used for DHCP. ··· 393 </para><para> 394 If you enable this option the 395 <literal>networkmanager_strongswan</literal> plugin will be added to 396 + the <option>networking.networkmanager.plugins</option> option 397 so you don't need to to that yourself. 398 ''; 399 }; ··· 412 }; 413 414 imports = [ 415 + (mkRenamedOptionModule 416 + [ "networking" "networkmanager" "packages" ] 417 + [ "networking" "networkmanager" "plugins" ]) 418 (mkRenamedOptionModule [ "networking" "networkmanager" "useDnsmasq" ] [ "networking" "networkmanager" "dns" ]) 419 (mkRemovedOptionModule ["networking" "networkmanager" "dynamicHosts"] '' 420 This option was removed because allowing (multiple) regular users to ··· 442 443 hardware.wirelessRegulatoryDatabase = true; 444 445 + environment.etc = { 446 + "NetworkManager/NetworkManager.conf".source = configFile; 447 } 448 + // builtins.listToAttrs (map (pkg: nameValuePair "NetworkManager/${pkg.networkManagerPlugin}" { 449 + source = "${pkg}/lib/NetworkManager/${pkg.networkManagerPlugin}"; 450 + }) cfg.plugins) 451 // optionalAttrs cfg.enableFccUnlock 452 { 453 "ModemManager/fcc-unlock.d".source = ··· 457 { 458 "NetworkManager/dispatcher.d/02overridedns".source = overrideNameserversScript; 459 } 460 // listToAttrs (lib.imap1 (i: s: 461 { 462 name = "NetworkManager/dispatcher.d/${dispatcherTypesSubdirMap.${s.type}}03userscript${lib.fixedWidthNumber 4 i}"; 463 value = { mode = "0544"; inherit (s) source; }; 464 }) cfg.dispatcherScripts); 465 466 + environment.systemPackages = packages; 467 468 users.groups = { 469 networkmanager.gid = config.ids.gids.networkmanager; ··· 482 }; 483 }; 484 485 + systemd.packages = packages; 486 487 systemd.tmpfiles.rules = [ 488 "d /etc/NetworkManager/system-connections 0700 root root -" 489 "d /etc/ipsec.d 0700 root root -" 490 "d /var/lib/NetworkManager-fortisslvpn 0700 root root -" 491 492 "d /var/lib/misc 0755 root root -" # for dnsmasq.leases 493 ]; 494 ··· 525 useDHCP = false; 526 }) 527 528 + { 529 + networkmanager.plugins = with pkgs; [ 530 + networkmanager-fortisslvpn 531 + networkmanager-iodine 532 + networkmanager-l2tp 533 + networkmanager-openconnect 534 + networkmanager-openvpn 535 + networkmanager-vpnc 536 + networkmanager-sstp 537 + ]; 538 + } 539 + 540 (mkIf cfg.enableStrongSwan { 541 + networkmanager.plugins = [ pkgs.networkmanager_strongswan ]; 542 }) 543 544 (mkIf enableIwd { ··· 562 security.polkit.enable = true; 563 security.polkit.extraConfig = polkitConf; 564 565 + services.dbus.packages = packages 566 ++ optional cfg.enableStrongSwan pkgs.strongswanNM 567 ++ optional (cfg.dns == "dnsmasq") pkgs.dnsmasq; 568 569 + services.udev.packages = packages; 570 }; 571 }
+5 -1
nixos/modules/virtualisation/azure-common.nix
··· 21 # way to select them anyway. 22 boot.loader.grub.configurationLimit = 0; 23 24 - fileSystems."/".device = "/dev/disk/by-label/nixos"; 25 26 # Allow root logins only using the SSH key that the user specified 27 # at instance creation time, ping client connections to avoid timeouts
··· 21 # way to select them anyway. 22 boot.loader.grub.configurationLimit = 0; 23 24 + fileSystems."/" = { 25 + device = "/dev/disk/by-label/nixos"; 26 + fsType = "ext4"; 27 + autoResize = true; 28 + }; 29 30 # Allow root logins only using the SSH key that the user specified 31 # at instance creation time, ping client connections to avoid timeouts
+2 -2
pkgs/applications/graphics/yed/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "yEd"; 5 - version = "3.21.1"; 6 7 src = fetchzip { 8 url = "https://www.yworks.com/resources/yed/demo/${pname}-${version}.zip"; 9 - sha256 = "1jw28hkd7p0n660gid8yh5y0kdcz6ycn4hsgjlf0pq48x9kv6w0c"; 10 }; 11 12 nativeBuildInputs = [ makeWrapper unzip wrapGAppsHook ];
··· 2 3 stdenv.mkDerivation rec { 4 pname = "yEd"; 5 + version = "3.22"; 6 7 src = fetchzip { 8 url = "https://www.yworks.com/resources/yed/demo/${pname}-${version}.zip"; 9 + sha256 = "sha256-GHYdvWie2k9YarS9DaA4bExswV3UQ26O8+7K/6yvtac="; 10 }; 11 12 nativeBuildInputs = [ makeWrapper unzip wrapGAppsHook ];
+2 -2
pkgs/applications/misc/taskwarrior/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "taskwarrior"; 5 - version = "2.6.1"; 6 7 src = fetchFromGitHub { 8 owner = "GothenburgBitFactory"; 9 repo = "taskwarrior"; 10 rev = "v${version}"; 11 - sha256 = "sha256-jMZzo2cegoapEHTvfD6ThU1IsXru3iOcpyDbZxkSXzQ="; 12 fetchSubmodules = true; 13 }; 14
··· 2 3 stdenv.mkDerivation rec { 4 pname = "taskwarrior"; 5 + version = "2.6.2"; 6 7 src = fetchFromGitHub { 8 owner = "GothenburgBitFactory"; 9 repo = "taskwarrior"; 10 rev = "v${version}"; 11 + sha256 = "sha256-0YveqiylXJi4cdDCfnPtwCVOJbQrZYsxnXES+9B4Yfw="; 12 fetchSubmodules = true; 13 }; 14
+3 -3
pkgs/applications/misc/xdragon/default.nix pkgs/tools/X11/xdragon/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "xdragon"; 5 - version = "1.1.1"; 6 7 src = fetchFromGitHub { 8 owner = "mwh"; 9 repo = "dragon"; 10 rev = "v${version}"; 11 - sha256 = "0fgzz39007fdjwq72scp0qygp2v3zc5f1xkm0sxaa8zxm25g1bra"; 12 }; 13 14 nativeBuildInputs = [ pkg-config ]; 15 buildInputs = [ gtk3 ]; 16 17 - installFlags = [ "PREFIX=${placeholder "out"}/bin" ]; 18 postInstall = '' 19 ln -s $out/bin/dragon $out/bin/xdragon 20 '';
··· 2 3 stdenv.mkDerivation rec { 4 pname = "xdragon"; 5 + version = "1.2.0"; 6 7 src = fetchFromGitHub { 8 owner = "mwh"; 9 repo = "dragon"; 10 rev = "v${version}"; 11 + sha256 = "sha256-wqG6idlVvdN+sPwYgWu3UL0la5ssvymZibiak3KeV7M="; 12 }; 13 14 nativeBuildInputs = [ pkg-config ]; 15 buildInputs = [ gtk3 ]; 16 17 + installFlags = [ "PREFIX=${placeholder "out"}" ]; 18 postInstall = '' 19 ln -s $out/bin/dragon $out/bin/xdragon 20 '';
-21
pkgs/applications/networking/instant-messengers/telegram/kotatogram-desktop/default.nix
··· 7 , ninja 8 , clang 9 , python3 10 - , wrapGAppsHook 11 , wrapQtAppsHook 12 , removeReferencesTo 13 , extra-cmake-modules ··· 27 , tl-expected 28 , hunspell 29 , glibmm 30 - , webkitgtk 31 , jemalloc 32 , rnnoise 33 , abseil-cpp ··· 65 , IOSurface 66 , Metal 67 , MetalKit 68 - , withWebKit ? false 69 }: 70 71 with lib; ··· 113 --replace '"libasound.so.2"' '"${alsa-lib}/lib/libasound.so.2"' 114 substituteInPlace Telegram/ThirdParty/libtgvoip/os/linux/AudioPulse.cpp \ 115 --replace '"libpulse.so.0"' '"${libpulseaudio}/lib/libpulse.so.0"' 116 - '' + optionalString (stdenv.isLinux && withWebKit) '' 117 - substituteInPlace Telegram/lib_webview/webview/platform/linux/webview_linux_webkit_gtk.cpp \ 118 - --replace '"libwebkit2gtk-4.0.so.37"' '"${webkitgtk}/lib/libwebkit2gtk-4.0.so.37"' 119 '' + optionalString stdenv.isDarwin '' 120 substituteInPlace Telegram/CMakeLists.txt \ 121 --replace 'COMMAND iconutil' 'COMMAND png2icns' \ ··· 124 --replace "\''${appicon_path}" "\''${appicon_path}/icon_16x16.png \''${appicon_path}/icon_32x32.png \''${appicon_path}/icon_128x128.png \''${appicon_path}/icon_256x256.png \''${appicon_path}/icon_512x512.png" 125 ''; 126 127 - # We want to run wrapProgram manually (with additional parameters) 128 - dontWrapGApps = stdenv.isLinux; 129 - dontWrapQtApps = stdenv.isLinux && withWebKit; 130 - 131 nativeBuildInputs = [ 132 pkg-config 133 cmake ··· 139 # to build bundled libdispatch 140 clang 141 extra-cmake-modules 142 - ] ++ optionals (stdenv.isLinux && withWebKit) [ 143 - wrapGAppsHook 144 ]; 145 146 buildInputs = [ ··· 166 glibmm 167 jemalloc 168 wayland 169 - ] ++ optionals (stdenv.isLinux && withWebKit) [ 170 - webkitgtk 171 ] ++ optionals stdenv.isDarwin [ 172 Cocoa 173 CoreFoundation ··· 223 remove-references-to -t ${stdenv.cc.cc} $out/bin/$binName 224 remove-references-to -t ${microsoft_gsl} $out/bin/$binName 225 remove-references-to -t ${tg_owt.dev} $out/bin/$binName 226 - ''; 227 - 228 - postFixup = optionalString (stdenv.isLinux && withWebKit) '' 229 - # We also use gappsWrapperArgs from wrapGAppsHook. 230 - wrapProgram $out/bin/kotatogram-desktop \ 231 - "''${gappsWrapperArgs[@]}" \ 232 - "''${qtWrapperArgs[@]}" 233 ''; 234 235 passthru = {
··· 7 , ninja 8 , clang 9 , python3 10 , wrapQtAppsHook 11 , removeReferencesTo 12 , extra-cmake-modules ··· 26 , tl-expected 27 , hunspell 28 , glibmm 29 , jemalloc 30 , rnnoise 31 , abseil-cpp ··· 63 , IOSurface 64 , Metal 65 , MetalKit 66 }: 67 68 with lib; ··· 110 --replace '"libasound.so.2"' '"${alsa-lib}/lib/libasound.so.2"' 111 substituteInPlace Telegram/ThirdParty/libtgvoip/os/linux/AudioPulse.cpp \ 112 --replace '"libpulse.so.0"' '"${libpulseaudio}/lib/libpulse.so.0"' 113 '' + optionalString stdenv.isDarwin '' 114 substituteInPlace Telegram/CMakeLists.txt \ 115 --replace 'COMMAND iconutil' 'COMMAND png2icns' \ ··· 118 --replace "\''${appicon_path}" "\''${appicon_path}/icon_16x16.png \''${appicon_path}/icon_32x32.png \''${appicon_path}/icon_128x128.png \''${appicon_path}/icon_256x256.png \''${appicon_path}/icon_512x512.png" 119 ''; 120 121 nativeBuildInputs = [ 122 pkg-config 123 cmake ··· 129 # to build bundled libdispatch 130 clang 131 extra-cmake-modules 132 ]; 133 134 buildInputs = [ ··· 154 glibmm 155 jemalloc 156 wayland 157 ] ++ optionals stdenv.isDarwin [ 158 Cocoa 159 CoreFoundation ··· 209 remove-references-to -t ${stdenv.cc.cc} $out/bin/$binName 210 remove-references-to -t ${microsoft_gsl} $out/bin/$binName 211 remove-references-to -t ${tg_owt.dev} $out/bin/$binName 212 ''; 213 214 passthru = {
+23
pkgs/applications/networking/instant-messengers/telegram/kotatogram-desktop/with-webkit.nix
···
··· 1 + { stdenv, lib, kotatogram-desktop, glib-networking, webkitgtk, makeWrapper }: 2 + 3 + with lib; 4 + 5 + stdenv.mkDerivation { 6 + pname = "${kotatogram-desktop.pname}-with-webkit"; 7 + version = kotatogram-desktop.version; 8 + nativeBuildInputs = [ makeWrapper ]; 9 + dontUnpack = true; 10 + installPhase = '' 11 + mkdir -p $out 12 + cp -r ${kotatogram-desktop}/share $out 13 + ''; 14 + postFixup = '' 15 + mkdir -p $out/bin 16 + makeWrapper ${kotatogram-desktop}/bin/kotatogram-desktop $out/bin/kotatogram-desktop \ 17 + --prefix GIO_EXTRA_MODULES : ${glib-networking}/lib/gio/modules \ 18 + --prefix LD_LIBRARY_PATH : ${makeLibraryPath [ webkitgtk ]} 19 + ''; 20 + meta = kotatogram-desktop.meta // { 21 + platforms = platforms.linux; 22 + }; 23 + }
+30 -16
pkgs/applications/science/biology/eggnog-mapper/default.nix
··· 1 - { lib, fetchFromGitHub, fetchpatch, makeWrapper, python27Packages, wget, diamond, hmmer }: 2 3 - python27Packages.buildPythonApplication rec { 4 pname = "eggnog-mapper"; 5 - version = "1.0.3"; 6 7 src = fetchFromGitHub { 8 owner = "eggnogdb"; 9 - repo = "eggnog-mapper"; 10 rev = version; 11 - sha256 = "1aaaflppy84bhkh2hb5gnzm4xgrz0rz0cgfpadr9w8cva8p0sqdv"; 12 }; 13 14 - patches = (fetchpatch { 15 - url = "https://github.com/eggnogdb/eggnog-mapper/commit/6972f601ade85b65090efca747d2302acb58507f.patch"; 16 - sha256 = "0abnmn0bh11jihf5d3cggiild1ykawzv5f5fhb4cyyi8fvy4hcxf"; 17 - }); 18 19 - nativeBuildInputs = [ makeWrapper ]; 20 - propagatedBuildInputs = [ python27Packages.biopython wget diamond hmmer ]; 21 22 - # make emapper find diamond & hmmer 23 - makeWrapperArgs = [ 24 - ''--prefix PATH ':' "${diamond}/bin"'' 25 - ''--prefix PATH ':' "${hmmer}/bin"'' 26 - ]; 27 28 # Tests rely on some of the databases being available, which is not bundled 29 # with this package as (1) in total, they represent >100GB of data, and (2)
··· 1 + { lib 2 + , autoPatchelfHook 3 + , fetchFromGitHub 4 + , python3Packages 5 + , wget 6 + , zlib 7 + }: 8 9 + python3Packages.buildPythonApplication rec { 10 pname = "eggnog-mapper"; 11 + version = "2.1.7"; 12 13 src = fetchFromGitHub { 14 owner = "eggnogdb"; 15 + repo = pname; 16 rev = version; 17 + hash = "sha256-auVD/r8m3TAB1KYMQ7Sae23eDg6LRx/daae0505cjwU="; 18 }; 19 20 + postPatch = '' 21 + # Not a great solution... 22 + substituteInPlace setup.cfg \ 23 + --replace "==" ">=" 24 + ''; 25 26 + nativeBuildInputs = [ 27 + autoPatchelfHook 28 + ]; 29 30 + buildInputs = [ 31 + zlib 32 + ]; 33 + 34 + propagatedBuildInputs = [ 35 + wget 36 + ] ++ (with python3Packages; [ 37 + biopython 38 + psutil 39 + XlsxWriter 40 + ]); 41 42 # Tests rely on some of the databases being available, which is not bundled 43 # with this package as (1) in total, they represent >100GB of data, and (2)
+2 -2
pkgs/applications/science/medicine/xmedcon/default.nix
··· 10 11 stdenv.mkDerivation rec { 12 pname = "xmedcon"; 13 - version = "0.21.2"; 14 15 src = fetchurl { 16 url = "mirror://sourceforge/${pname}/${pname}-${version}.tar.bz2"; 17 - sha256 = "0svff8rc3j2p47snaq1hx9mv4ydmxawpb0hf3d165g1ccjwvmm6m"; 18 }; 19 20 buildInputs = [
··· 10 11 stdenv.mkDerivation rec { 12 pname = "xmedcon"; 13 + version = "0.22.0"; 14 15 src = fetchurl { 16 url = "mirror://sourceforge/${pname}/${pname}-${version}.tar.bz2"; 17 + sha256 = "sha256-Ui7XoLSzTMPIFW/3nARCmvlGF+1l7pmcnKsnvn3NFJE="; 18 }; 19 20 buildInputs = [
+15 -6
pkgs/applications/version-management/git-sizer/default.nix
··· 1 - { lib, buildGoPackage, fetchFromGitHub }: 2 3 - buildGoPackage rec { 4 pname = "git-sizer"; 5 - version = "1.3.0"; 6 - 7 - goPackagePath = "github.com/github/git-sizer"; 8 9 src = fetchFromGitHub { 10 owner = "github"; 11 repo = pname; 12 rev = "v${version}"; 13 - sha256 = "0kmyvai5xfalm56ywa6mhdvvjnacdzwcyz28bw0pz9a4gyf1mgvh"; 14 }; 15 16 meta = with lib; { 17 description = "Compute various size metrics for a Git repository"; 18 license = licenses.mit; 19 maintainers = with maintainers; [ matthewbauer ]; 20 };
··· 1 + { lib, buildGoModule, fetchFromGitHub, testVersion, git-sizer }: 2 3 + buildGoModule rec { 4 pname = "git-sizer"; 5 + version = "1.5.0"; 6 7 src = fetchFromGitHub { 8 owner = "github"; 9 repo = pname; 10 rev = "v${version}"; 11 + sha256 = "sha256-On7QBTzKfnuuzwMQ8m1odxGqfIKL+EDg5V05Kxuhmqw="; 12 + }; 13 + 14 + vendorSha256 = "sha256-oRlsD99XiI/0ZWibjyRcycmGab+vMbXrV5hIdIyUDYg="; 15 + 16 + ldflags = [ "-s" "-w" "-X main.BuildVersion=${version}" ]; 17 + 18 + doCheck = false; 19 + 20 + passthru.tests.vesion = testVersion { 21 + package = git-sizer; 22 }; 23 24 meta = with lib; { 25 description = "Compute various size metrics for a Git repository"; 26 + homepage = "https://github.com/github/git-sizer"; 27 license = licenses.mit; 28 maintainers = with maintainers; [ matthewbauer ]; 29 };
+5 -1
pkgs/data/sgml+xml/stylesheets/xslt/docbook-xsl/default.nix
··· 1 - { lib, stdenv, substituteAll, fetchurl, fetchpatch, findXMLCatalogs, writeScriptBin, ruby, bash }: 2 3 let 4 ··· 36 src = ./catalog-legacy-uris.patch; 37 inherit legacySuffix suffix version; 38 }) 39 ]; 40 41 propagatedBuildInputs = [ findXMLCatalogs ];
··· 1 + { lib, stdenv, substituteAll, fetchurl, fetchpatch, findXMLCatalogs, writeScriptBin, ruby, bash, withManOptDedupPatch ? false }: 2 3 let 4 ··· 36 src = ./catalog-legacy-uris.patch; 37 inherit legacySuffix suffix version; 38 }) 39 + ] ++ lib.optionals withManOptDedupPatch [ 40 + # Fixes https://github.com/NixOS/nixpkgs/issues/166304 41 + # https://github.com/docbook/xslt10-stylesheets/pull/241 42 + ./fix-man-options-duplication.patch 43 ]; 44 45 propagatedBuildInputs = [ findXMLCatalogs ];
+11
pkgs/data/sgml+xml/stylesheets/xslt/docbook-xsl/fix-man-options-duplication.patch
···
··· 1 + --- a/manpages/lists.xsl 2 + +++ b/manpages/lists.xsl 3 + @@ -110,7 +110,7 @@ 4 + <xsl:text>.RE&#10;</xsl:text> 5 + </xsl:template> 6 + 7 + -<xsl:template match="d:varlistentry/d:term"/> 8 + +<xsl:template match="d:varlistentry/d:term" priority="1"/> 9 + <xsl:template match="d:glossentry/d:glossterm"/> 10 + 11 + <xsl:template match="d:variablelist[ancestor::d:listitem or ancestor::d:step or ancestor::d:glossdef]|
+1 -5
pkgs/development/libraries/leveldb/default.nix
··· 38 "-DBUILD_SHARED_LIBS=${if static then "OFF" else "ON"}" 39 "-DCMAKE_SKIP_BUILD_RPATH=OFF" 40 "-DLEVELDB_BUILD_TESTS=OFF" 41 ]; 42 - 43 - postPatch = lib.optionalString stdenv.hostPlatform.isStatic '' 44 - # remove shared objects from "all" target 45 - sed -i '/^all:/ s/$(SHARED_LIBS) $(SHARED_PROGRAMS)//' Makefile 46 - ''; 47 48 postInstall = '' 49 substituteInPlace "$out"/lib/cmake/leveldb/leveldbTargets.cmake \
··· 38 "-DBUILD_SHARED_LIBS=${if static then "OFF" else "ON"}" 39 "-DCMAKE_SKIP_BUILD_RPATH=OFF" 40 "-DLEVELDB_BUILD_TESTS=OFF" 41 + "-DLEVELDB_BUILD_BENCHMARKS=OFF" 42 ]; 43 44 postInstall = '' 45 substituteInPlace "$out"/lib/cmake/leveldb/leveldbTargets.cmake \
+3 -3
pkgs/development/tools/azcopy/default.nix
··· 2 3 buildGoModule rec { 4 pname = "azure-storage-azcopy"; 5 - version = "10.13.0"; 6 7 src = fetchFromGitHub { 8 owner = "Azure"; 9 repo = "azure-storage-azcopy"; 10 rev = "v${version}"; 11 - sha256 = "sha256-L5gfS2hwk1uaWEygn+liupdANL9qizHAjxNz25KBwaY="; 12 }; 13 14 subPackages = [ "." ]; 15 16 - vendorSha256 = "sha256-ePEpc18Y99Moe/aj8n1+no6D70vZoIEjC023Uup98Uo="; 17 18 doCheck = false; 19
··· 2 3 buildGoModule rec { 4 pname = "azure-storage-azcopy"; 5 + version = "10.14.0"; 6 7 src = fetchFromGitHub { 8 owner = "Azure"; 9 repo = "azure-storage-azcopy"; 10 rev = "v${version}"; 11 + sha256 = "sha256-9NuX4BbQx/ZeWvyTxlZjrb7ETwSFwBpfDcSt8qvKAxE="; 12 }; 13 14 subPackages = [ "." ]; 15 16 + vendorSha256 = "sha256-9ThsJySzsyS0eX/0BlAAvtaeJpPYCP0cN1YgIShYrKw="; 17 18 doCheck = false; 19
+2 -2
pkgs/development/tools/clj-kondo/default.nix
··· 2 3 buildGraalvmNativeImage rec { 4 pname = "clj-kondo"; 5 - version = "2022.03.09"; 6 7 src = fetchurl { 8 url = "https://github.com/clj-kondo/${pname}/releases/download/v${version}/${pname}-${version}-standalone.jar"; 9 - sha256 = "sha256-gPn3wORb30I/zTXUdxUxMesKFJx6ES7jEjUYuC/DAVI="; 10 }; 11 12 extraNativeImageBuildArgs = [
··· 2 3 buildGraalvmNativeImage rec { 4 pname = "clj-kondo"; 5 + version = "2022.04.08"; 6 7 src = fetchurl { 8 url = "https://github.com/clj-kondo/${pname}/releases/download/v${version}/${pname}-${version}-standalone.jar"; 9 + sha256 = "sha256-dZtiwePwgLgKc0WkSnxI2zW9hOWKVW5+rO905LQhgvQ="; 10 }; 11 12 extraNativeImageBuildArgs = [
+2 -2
pkgs/os-specific/linux/pipework/default.nix
··· 1 { stdenv, lib, fetchFromGitHub, makeWrapper 2 - , bridge-utils, iproute2, lxc, openvswitch, docker, busybox, dhcpcd, dhcp 3 }: 4 5 stdenv.mkDerivation { ··· 15 installPhase = '' 16 install -D pipework $out/bin/pipework 17 wrapProgram $out/bin/pipework --prefix PATH : \ 18 - ${lib.makeBinPath [ bridge-utils iproute2 lxc openvswitch docker busybox dhcpcd dhcp ]}; 19 ''; 20 meta = with lib; { 21 description = "Software-Defined Networking tools for LXC";
··· 1 { stdenv, lib, fetchFromGitHub, makeWrapper 2 + , bridge-utils, iproute2, lxc, openvswitch, docker, busybox, dhcpcd 3 }: 4 5 stdenv.mkDerivation { ··· 15 installPhase = '' 16 install -D pipework $out/bin/pipework 17 wrapProgram $out/bin/pipework --prefix PATH : \ 18 + ${lib.makeBinPath [ bridge-utils iproute2 lxc openvswitch docker busybox dhcpcd ]}; 19 ''; 20 meta = with lib; { 21 description = "Software-Defined Networking tools for LXC";
+5 -4
pkgs/servers/search/elasticsearch/7.x.nix
··· 18 plat = elemAt info 1; 19 shas = 20 { 21 - x86_64-linux = "1s16l95wc589cr69pfbgmkn9rkvxn6sd6jlbiqpm6p6iyxiaxd6c"; 22 - x86_64-darwin = "05h7pvq4pb816wgcymnfklp3w6sv54x6138v2infw5219dnk8pfs"; 23 - aarch64-linux = "0q4xnjzhlx1b2lkikca88qh9glfxaifsm419k2bxxlrfrx31zlkq"; 24 }; 25 in 26 stdenv.mkDerivation rec { ··· 45 ''; 46 47 nativeBuildInputs = [ makeWrapper ] 48 - ++ optional stdenv.isLinux autoPatchelfHook; 49 50 buildInputs = [ jre_headless util-linux zlib ]; 51
··· 18 plat = elemAt info 1; 19 shas = 20 { 21 + x86_64-linux = "1s16l95wc589cr69pfbgmkn9rkvxn6sd6jlbiqpm6p6iyxiaxd6c"; 22 + x86_64-darwin = "05h7pvq4pb816wgcymnfklp3w6sv54x6138v2infw5219dnk8pfs"; 23 + aarch64-linux = "0q4xnjzhlx1b2lkikca88qh9glfxaifsm419k2bxxlrfrx31zlkq"; 24 + aarch64-darwin = "067mb1dianwiarw8cz1va4g6zfhp9ls4s174xbpkxwsknvvyhgz6"; 25 }; 26 in 27 stdenv.mkDerivation rec { ··· 46 ''; 47 48 nativeBuildInputs = [ makeWrapper ] 49 + ++ lib.optional (!stdenv.hostPlatform.isDarwin) autoPatchelfHook; 50 51 buildInputs = [ jre_headless util-linux zlib ]; 52
+2 -2
pkgs/servers/sql/pgbouncer/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "pgbouncer"; 5 - version = "1.16.1"; 6 7 src = fetchurl { 8 url = "https://pgbouncer.github.io/downloads/files/${version}/${pname}-${version}.tar.gz"; 9 - sha256 = "1z7p3ghpmbp5qv1bz9s186jn0hfnr300dc5p0hmh6vbnwklpfx08"; 10 }; 11 12 nativeBuildInputs = [ pkg-config ];
··· 2 3 stdenv.mkDerivation rec { 4 pname = "pgbouncer"; 5 + version = "1.17.0"; 6 7 src = fetchurl { 8 url = "https://pgbouncer.github.io/downloads/files/${version}/${pname}-${version}.tar.gz"; 9 + sha256 = "sha256-ZXMJt7xceoXL9wqaRBtTX3gkEjCB6rt7qG0ANJolbiM="; 10 }; 11 12 nativeBuildInputs = [ pkg-config ];
-28
pkgs/tools/X11/dragon-drop/default.nix
··· 1 - { lib, stdenv, gtk, pkg-config, fetchFromGitHub }: 2 - 3 - stdenv.mkDerivation rec { 4 - pname = "dragon-drop"; 5 - version = "1.1.1"; 6 - 7 - src = fetchFromGitHub { 8 - owner = "mwh"; 9 - repo = "dragon"; 10 - rev = "v${version}"; 11 - sha256 = "0fgzz39007fdjwq72scp0qygp2v3zc5f1xkm0sxaa8zxm25g1bra"; 12 - }; 13 - 14 - nativeBuildInputs = [ pkg-config ]; 15 - buildInputs = [ gtk ]; 16 - 17 - installPhase = '' 18 - install -D dragon -t $out/bin 19 - ''; 20 - 21 - meta = with lib; { 22 - description = "Simple drag-and-drop source/sink for X"; 23 - homepage = "https://github.com/mwh/dragon"; 24 - maintainers = with maintainers; [ jb55 markus1189 ]; 25 - license = licenses.gpl3; 26 - platforms = with platforms; unix; 27 - }; 28 - }
···
+2 -2
pkgs/tools/compression/gzip/default.nix
··· 11 12 stdenv.mkDerivation rec { 13 pname = "gzip"; 14 - version = "1.11"; 15 16 src = fetchurl { 17 url = "mirror://gnu/gzip/${pname}-${version}.tar.xz"; 18 - sha256 = "01vrly90rvc98af6rcmrb3gwv1l6pylasvsdka23dffwizb9b6lv"; 19 }; 20 21 outputs = [ "out" "man" "info" ];
··· 11 12 stdenv.mkDerivation rec { 13 pname = "gzip"; 14 + version = "1.12"; 15 16 src = fetchurl { 17 url = "mirror://gnu/gzip/${pname}-${version}.tar.xz"; 18 + sha256 = "sha256-zl4D5Rn2N+H4FAEazjXE+HszwLur7sNbr1+9NHnpGVY="; 19 }; 20 21 outputs = [ "out" "man" "info" ];
+5 -4
pkgs/tools/misc/starship/default.nix
··· 9 , nixosTests 10 , Security 11 , Foundation 12 }: 13 14 rustPlatform.buildRustPackage rec { 15 pname = "starship"; 16 - version = "1.3.0"; 17 18 src = fetchFromGitHub { 19 owner = "starship"; 20 repo = pname; 21 rev = "v${version}"; 22 - sha256 = "sha256-mqUE4JzNBhvtDpT2LM23eHX8q93wtPqA+/zr/PxEDiE="; 23 }; 24 25 nativeBuildInputs = [ installShellFiles pkg-config ]; 26 27 - buildInputs = [ libgit2 ] ++ lib.optionals stdenv.isDarwin [ libiconv Security Foundation ]; 28 29 postInstall = '' 30 for shell in bash fish zsh; do ··· 33 done 34 ''; 35 36 - cargoSha256 = "sha256-hQNDiayVT4UgbxcxdXssi/evPvwgyvG/UOFyEHj7jpo="; 37 38 preCheck = '' 39 HOME=$TMPDIR
··· 9 , nixosTests 10 , Security 11 , Foundation 12 + , Cocoa 13 }: 14 15 rustPlatform.buildRustPackage rec { 16 pname = "starship"; 17 + version = "1.5.4"; 18 19 src = fetchFromGitHub { 20 owner = "starship"; 21 repo = pname; 22 rev = "v${version}"; 23 + sha256 = "sha256-nLzqfSRmA+D310MDvX+g8nNsoaiSixG+j+g87CPzYMs="; 24 }; 25 26 nativeBuildInputs = [ installShellFiles pkg-config ]; 27 28 + buildInputs = [ libgit2 ] ++ lib.optionals stdenv.isDarwin [ libiconv Security Foundation Cocoa ]; 29 30 postInstall = '' 31 for shell in bash fish zsh; do ··· 34 done 35 ''; 36 37 + cargoSha256 = "sha256-FXzAvO11NIr6dxF2OeV5XJWHG2kgZiASuBnoC6mSps8="; 38 39 preCheck = '' 40 HOME=$TMPDIR
+2 -2
pkgs/tools/misc/tmux-mem-cpu-load/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "tmux-mem-cpu-load"; 5 - version = "3.5.1"; 6 7 src = fetchFromGitHub { 8 owner = "thewtex"; 9 repo = "tmux-mem-cpu-load"; 10 rev = "v${version}"; 11 - sha256 = "sha256-4ZMF+RacZL9dJRCz63XPNuigTKHOW+ZcA4vB4jsnASc="; 12 }; 13 14 nativeBuildInputs = [ cmake ];
··· 2 3 stdenv.mkDerivation rec { 4 pname = "tmux-mem-cpu-load"; 5 + version = "3.6.0"; 6 7 src = fetchFromGitHub { 8 owner = "thewtex"; 9 repo = "tmux-mem-cpu-load"; 10 rev = "v${version}"; 11 + sha256 = "sha256-1smhlp30y0qihm+d9RcCKY1CFbPm5gzago+OIQQT5jE="; 12 }; 13 14 nativeBuildInputs = [ cmake ];
+30
pkgs/tools/networking/curl/7.82.0-openssl-fix-CN-check.patch
···
··· 1 + From 911714d617c106ed5d553bf003e34ec94ab6a136 Mon Sep 17 00:00:00 2001 2 + From: Daniel Stenberg <daniel@haxx.se> 3 + Date: Tue, 8 Mar 2022 13:38:13 +0100 4 + Subject: [PATCH] openssl: fix CN check error code 5 + 6 + Due to a missing 'else' this returns error too easily. 7 + 8 + Regressed in: d15692ebb 9 + 10 + Reported-by: Kristoffer Gleditsch 11 + Fixes #8559 12 + Closes #8560 13 + --- 14 + lib/vtls/openssl.c | 3 ++- 15 + 1 file changed, 2 insertions(+), 1 deletion(-) 16 + 17 + diff --git a/lib/vtls/openssl.c b/lib/vtls/openssl.c 18 + index 0b79fc50a9c5..4618beeb3867 100644 19 + --- a/lib/vtls/openssl.c 20 + +++ b/lib/vtls/openssl.c 21 + @@ -1817,7 +1817,8 @@ CURLcode Curl_ossl_verifyhost(struct Curl_easy *data, struct connectdata *conn, 22 + memcpy(peer_CN, ASN1_STRING_get0_data(tmp), peerlen); 23 + peer_CN[peerlen] = '\0'; 24 + } 25 + - result = CURLE_OUT_OF_MEMORY; 26 + + else 27 + + result = CURLE_OUT_OF_MEMORY; 28 + } 29 + } 30 + else /* not a UTF8 name */
+1
pkgs/tools/networking/curl/default.nix
··· 66 67 patches = [ 68 ./7.79.1-darwin-no-systemconfiguration.patch 69 ]; 70 71 outputs = [ "bin" "dev" "out" "man" "devdoc" ];
··· 66 67 patches = [ 68 ./7.79.1-darwin-no-systemconfiguration.patch 69 + ./7.82.0-openssl-fix-CN-check.patch 70 ]; 71 72 outputs = [ "bin" "dev" "out" "man" "devdoc" ];
+11 -16
pkgs/tools/networking/dhcp/default.nix
··· 1 { stdenv, fetchurl, fetchpatch, perl, file, nettools, iputils, iproute2, makeWrapper 2 , coreutils, gnused, openldap ? null 3 , buildPackages, lib 4 }: 5 6 stdenv.mkDerivation rec { 7 pname = "dhcp"; 8 - version = "4.4.2-P1"; 9 10 src = fetchurl { 11 url = "https://ftp.isc.org/isc/dhcp/${version}/${pname}-${version}.tar.gz"; 12 - sha256 = "06jsr0cg5rsmyibshrpcb9za0qgwvqccashdma7mlm1rflrh8pmh"; 13 }; 14 15 patches = ··· 18 # patch, the hostname doesn't get set properly if the old 19 # hostname (i.e. before reboot) is equal to the new hostname. 20 ./set-hostname.patch 21 - 22 - (fetchpatch { 23 - # upstream build fix against -fno-common compilers like >=gcc-10 24 - url = "https://gitlab.isc.org/isc-projects/dhcp/-/commit/6c7e61578b1b449272dbb40dd8b98d03dad8a57a.patch"; 25 - sha256 = "1g37ix0yf9zza8ri8bg438ygcjviniblfyb20y4gzc8lysy28m8b"; 26 - }) 27 - 28 - # Fix parallel build failure, the patch is pending upstream inclusion: 29 - # https://gitlab.isc.org/isc-projects/dhcp/-/merge_requests/76 30 - (fetchpatch { 31 - name = "parallel-make.patch"; 32 - url = "https://gitlab.isc.org/isc-projects/dhcp/-/commit/46d101b97c5a3b19a3f63f7b60e5f88994a64e22.patch"; 33 - sha256 = "1y3nsmqjzcg4bhp1xmqp47v7rkl3bpcildkx6mlrg255yvxapmdp"; 34 - }) 35 ]; 36 37 nativeBuildInputs = [ perl makeWrapper ]; ··· 77 --replace /sbin/ip ${iproute2}/sbin/ip 78 wrapProgram "$out/sbin/dhclient-script" --prefix PATH : \ 79 "${nettools}/bin:${nettools}/sbin:${iputils}/bin:${coreutils}/bin:${gnused}/bin" 80 ''; 81 82 preConfigure = ··· 103 homepage = "https://www.isc.org/dhcp/"; 104 license = licenses.mpl20; 105 platforms = platforms.unix; 106 }; 107 }
··· 1 { stdenv, fetchurl, fetchpatch, perl, file, nettools, iputils, iproute2, makeWrapper 2 , coreutils, gnused, openldap ? null 3 , buildPackages, lib 4 + 5 + # client and relay are end of life, remove after 4.4.3 6 + , withClient ? false 7 + , withRelay ? false 8 }: 9 10 stdenv.mkDerivation rec { 11 pname = "dhcp"; 12 + version = "4.4.3"; 13 14 src = fetchurl { 15 url = "https://ftp.isc.org/isc/dhcp/${version}/${pname}-${version}.tar.gz"; 16 + sha256 = "sha256-Dj7GtMKgXsAUiHS82ZmmbQVRg3jXdCH2B/sLydATWBg="; 17 }; 18 19 patches = ··· 22 # patch, the hostname doesn't get set properly if the old 23 # hostname (i.e. before reboot) is equal to the new hostname. 24 ./set-hostname.patch 25 ]; 26 27 nativeBuildInputs = [ perl makeWrapper ]; ··· 67 --replace /sbin/ip ${iproute2}/sbin/ip 68 wrapProgram "$out/sbin/dhclient-script" --prefix PATH : \ 69 "${nettools}/bin:${nettools}/sbin:${iputils}/bin:${coreutils}/bin:${gnused}/bin" 70 + '' + lib.optionalString (!withClient) '' 71 + rm $out/sbin/{dhclient,dhclient-script,.dhclient-script-wrapped} 72 + '' + lib.optionalString (!withRelay) '' 73 + rm $out/sbin/dhcrelay 74 ''; 75 76 preConfigure = ··· 97 homepage = "https://www.isc.org/dhcp/"; 98 license = licenses.mpl20; 99 platforms = platforms.unix; 100 + knownVulnerabilities = lib.optional (withClient || withRelay) "The client and relay component of the dhcp package have reached their end of life"; 101 }; 102 }
+4 -4
pkgs/tools/networking/networkmanager/default.nix
··· 12 , polkit 13 , gnutls 14 , ppp 15 - , dhcp 16 , iptables 17 , nftables 18 , python3 ··· 96 "-Dresolvconf=${openresolv}/bin/resolvconf" 97 98 # DHCP clients 99 - "-Ddhclient=${dhcp}/bin/dhclient" 100 - # Upstream prefers dhclient, so don't add dhcpcd to the closure 101 - "-Ddhcpcd=no" 102 "-Ddhcpcanon=no" 103 104 # Miscellaneous
··· 12 , polkit 13 , gnutls 14 , ppp 15 + , dhcpcd 16 , iptables 17 , nftables 18 , python3 ··· 96 "-Dresolvconf=${openresolv}/bin/resolvconf" 97 98 # DHCP clients 99 + # ISC DHCP client has reached it's end of life, so stop using it 100 + "-Ddhclient=no" 101 + "-Ddhcpcd=${dhcpcd}/bin/dhcpcd" 102 "-Ddhcpcanon=no" 103 104 # Miscellaneous
+1
pkgs/tools/networking/networkmanager/fortisslvpn/default.nix
··· 73 attrPath = "networkmanager-fortisslvpn"; 74 versionPolicy = "odd-unstable"; 75 }; 76 }; 77 78 meta = with lib; {
··· 73 attrPath = "networkmanager-fortisslvpn"; 74 versionPolicy = "odd-unstable"; 75 }; 76 + networkManagerPlugin = "VPN/nm-fortisslvpn-service.name"; 77 }; 78 79 meta = with lib; {
+1
pkgs/tools/networking/networkmanager/iodine/default.nix
··· 48 packageName = pname; 49 attrPath = "networkmanager-iodine"; 50 }; 51 }; 52 53 meta = with lib; {
··· 48 packageName = pname; 49 attrPath = "networkmanager-iodine"; 50 }; 51 + networkManagerPlugin = "VPN/nm-iodine-service.name"; 52 }; 53 54 meta = with lib; {
+4
pkgs/tools/networking/networkmanager/l2tp/default.nix
··· 41 42 enableParallelBuilding = true; 43 44 meta = with lib; { 45 description = "L2TP plugin for NetworkManager"; 46 inherit (networkmanager.meta) platforms;
··· 41 42 enableParallelBuilding = true; 43 44 + passthru = { 45 + networkManagerPlugin = "VPN/nm-l2tp-service.name"; 46 + }; 47 + 48 meta = with lib; { 49 description = "L2TP plugin for NetworkManager"; 50 inherit (networkmanager.meta) platforms;
+1
pkgs/tools/networking/networkmanager/openconnect/default.nix
··· 69 attrPath = "networkmanager-openconnect"; 70 versionPolicy = "odd-unstable"; 71 }; 72 }; 73 74 meta = with lib; {
··· 69 attrPath = "networkmanager-openconnect"; 70 versionPolicy = "odd-unstable"; 71 }; 72 + networkManagerPlugin = "VPN/nm-openconnect-service.name"; 73 }; 74 75 meta = with lib; {
+1
pkgs/tools/networking/networkmanager/openvpn/default.nix
··· 67 attrPath = "networkmanager-openvpn"; 68 versionPolicy = "odd-unstable"; 69 }; 70 }; 71 72 meta = with lib; {
··· 67 attrPath = "networkmanager-openvpn"; 68 versionPolicy = "odd-unstable"; 69 }; 70 + networkManagerPlugin = "VPN/nm-openvpn-service.name"; 71 }; 72 73 meta = with lib; {
+1
pkgs/tools/networking/networkmanager/sstp/default.nix
··· 54 packageName = pname; 55 attrPath = "networkmanager-sstp"; 56 }; 57 }; 58 59 meta = with lib; {
··· 54 packageName = pname; 55 attrPath = "networkmanager-sstp"; 56 }; 57 + networkManagerPlugin = "VPN/nm-sstp-service.name"; 58 }; 59 60 meta = with lib; {
+4
pkgs/tools/networking/networkmanager/strongswan/default.nix
··· 24 "--with-nm-plugindir=$(out)/lib/NetworkManager" 25 ]; 26 27 PKG_CONFIG_LIBNM_VPNSERVICEDIR = "$(out)/lib/NetworkManager/VPN"; 28 29 meta = with lib; {
··· 24 "--with-nm-plugindir=$(out)/lib/NetworkManager" 25 ]; 26 27 + passthru = { 28 + networkManagerPlugin = "VPN/nm-strongswan-service.name"; 29 + }; 30 + 31 PKG_CONFIG_LIBNM_VPNSERVICEDIR = "$(out)/lib/NetworkManager/VPN"; 32 33 meta = with lib; {
+1
pkgs/tools/networking/networkmanager/vpnc/default.nix
··· 64 attrPath = "networkmanager-vpnc"; 65 versionPolicy = "odd-unstable"; 66 }; 67 }; 68 69 meta = with lib; {
··· 64 attrPath = "networkmanager-vpnc"; 65 versionPolicy = "odd-unstable"; 66 }; 67 + networkManagerPlugin = "VPN/nm-vpnc-service.name"; 68 }; 69 70 meta = with lib; {
+1
pkgs/top-level/aliases.nix
··· 316 dolphinEmuMaster = dolphin-emu-beta; # Added 2021-11-10 317 dotnet-netcore = dotnet-runtime; # Added 2021-10-07 318 double_conversion = throw "'double_conversion' has been renamed to/replaced by 'double-conversion'"; # Converted to throw 2022-02-22 319 draftsight = throw "draftsight has been removed, no longer available as freeware"; # Added 2020-08-14 320 dvb_apps = throw "dvb_apps has been removed"; # Added 2020-11-03 321 dwarf_fortress = throw "'dwarf_fortress' has been renamed to/replaced by 'dwarf-fortress'"; # Converted to throw 2022-02-22
··· 316 dolphinEmuMaster = dolphin-emu-beta; # Added 2021-11-10 317 dotnet-netcore = dotnet-runtime; # Added 2021-10-07 318 double_conversion = throw "'double_conversion' has been renamed to/replaced by 'double-conversion'"; # Converted to throw 2022-02-22 319 + dragon-drop = throw "'dragon-drop' has been removed in favor of 'xdragon'"; # Added 2022-04-10; 320 draftsight = throw "draftsight has been removed, no longer available as freeware"; # Added 2020-08-14 321 dvb_apps = throw "dvb_apps has been removed"; # Added 2020-11-03 322 dwarf_fortress = throw "'dwarf_fortress' has been renamed to/replaced by 'dwarf-fortress'"; # Converted to throw 2022-02-22
+4 -6
pkgs/top-level/all-packages.nix
··· 3011 3012 dpic = callPackage ../tools/graphics/dpic { }; 3013 3014 - dragon-drop = callPackage ../tools/X11/dragon-drop { 3015 - gtk = gtk3; 3016 - }; 3017 - 3018 dstp = callPackage ../development/tools/dstp { }; 3019 3020 dsvpn = callPackage ../applications/networking/dsvpn { }; ··· 24299 stdmanpages = callPackage ../data/documentation/std-man-pages { }; 24300 24301 starship = callPackage ../tools/misc/starship { 24302 - inherit (darwin.apple_sdk.frameworks) Security Foundation; 24303 }; 24304 24305 stig = callPackage ../applications/networking/p2p/stig { }; ··· 27059 27060 abseil-cpp = abseil-cpp_202111; 27061 }; 27062 27063 kpt = callPackage ../applications/networking/cluster/kpt { }; 27064 ··· 34031 34032 sift = callPackage ../tools/text/sift { }; 34033 34034 - xdragon = lowPrio (callPackage ../applications/misc/xdragon { }); 34035 34036 xlockmore = callPackage ../misc/screensavers/xlockmore { }; 34037
··· 3011 3012 dpic = callPackage ../tools/graphics/dpic { }; 3013 3014 dstp = callPackage ../development/tools/dstp { }; 3015 3016 dsvpn = callPackage ../applications/networking/dsvpn { }; ··· 24295 stdmanpages = callPackage ../data/documentation/std-man-pages { }; 24296 24297 starship = callPackage ../tools/misc/starship { 24298 + inherit (darwin.apple_sdk.frameworks) Security Foundation Cocoa; 24299 }; 24300 24301 stig = callPackage ../applications/networking/p2p/stig { }; ··· 27055 27056 abseil-cpp = abseil-cpp_202111; 27057 }; 27058 + 27059 + kotatogram-desktop-with-webkit = callPackage ../applications/networking/instant-messengers/telegram/kotatogram-desktop/with-webkit.nix {}; 27060 27061 kpt = callPackage ../applications/networking/cluster/kpt { }; 27062 ··· 34029 34030 sift = callPackage ../tools/text/sift { }; 34031 34032 + xdragon = lowPrio (callPackage ../tools/X11/xdragon { }); 34033 34034 xlockmore = callPackage ../misc/screensavers/xlockmore { }; 34035