Merge staging-next into staging

authored by

github-actions[bot] and committed by
GitHub
67307df2 455ed0b4

+97 -85
+5
nixos/doc/manual/release-notes/rl-2505.section.md
··· 290 290 291 291 To get the necessary hash of the vendored dependencies, omit `hash`. The build will fail and tell you the correct value. 292 292 293 + - KDE Partition Manager `partitionmanager`'s support for ReiserFS is removed. 294 + ReiserFS has not been actively maintained for many years. It has been marked as obsolete since Linux 6.6, and 295 + [is removed](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c01f664e4ca210823b7594b50669bbd9b0a3c3b0) 296 + in Linux 6.13. 297 + 293 298 - `programs.fzf.keybindings` now supports the fish shell. 294 299 295 300 <!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. -->
+13 -17
pkgs/applications/audio/mixxx/default.nix
··· 1 1 { 2 2 lib, 3 3 stdenv, 4 - mkDerivation, 5 4 fetchFromGitHub, 6 5 chromaprint, 7 6 cmake, ··· 38 37 portaudio, 39 38 portmidi, 40 39 protobuf, 40 + qt5compat, 41 41 qtbase, 42 + qtdeclarative, 42 43 qtkeychain, 43 - qtscript, 44 44 qtsvg, 45 - qtx11extras, 46 45 rubberband, 47 46 serd, 48 47 sord, ··· 53 52 upower, 54 53 vamp-plugin-sdk, 55 54 wavpack, 56 - wrapGAppsHook3, 55 + wrapQtAppsHook, 57 56 }: 58 57 59 - mkDerivation rec { 58 + stdenv.mkDerivation rec { 60 59 pname = "mixxx"; 61 - version = "2.4.2"; 60 + version = "2.5.0"; 62 61 63 62 src = fetchFromGitHub { 64 63 owner = "mixxxdj"; 65 64 repo = "mixxx"; 66 65 rev = version; 67 - hash = "sha256-YfpFRLosIIND+HnZN+76ZY0dQqEJaFkWZS84gZOCdfc="; 66 + hash = "sha256-1ZE2hVwacZve0+IOQs+htK/kl7zFsOWkh/KcrnI6u/M="; 68 67 }; 69 68 70 69 nativeBuildInputs = [ 71 70 cmake 72 71 pkg-config 73 - wrapGAppsHook3 72 + wrapQtAppsHook 74 73 ]; 75 74 76 - dontWrapGApps = true; 77 - 78 75 buildInputs = [ 79 76 chromaprint 80 77 faad2 ··· 109 106 portaudio 110 107 portmidi 111 108 protobuf 109 + qt5compat 112 110 qtbase 111 + qtdeclarative 113 112 qtkeychain 114 - qtscript 115 113 qtsvg 116 - qtx11extras 117 114 rubberband 118 115 serd 119 116 sord ··· 126 123 wavpack 127 124 ]; 128 125 129 - preFixup = '' 130 - qtWrapperArgs+=(--set LOCALE_ARCHIVE ${glibcLocales}/lib/locale/locale-archive ''${gappsWrapperArgs[@]}) 131 - ''; 126 + qtWrapperArgs = [ "--set LOCALE_ARCHIVE ${glibcLocales}/lib/locale/locale-archive" ]; 132 127 133 128 # mixxx installs udev rules to DATADIR instead of SYSCONFDIR 134 129 # let's disable this and install udev rules manually via postInstall ··· 151 146 homepage = "https://mixxx.org"; 152 147 description = "Digital DJ mixing software"; 153 148 mainProgram = "mixxx"; 154 - license = licenses.gpl2Plus; 149 + changelog = "https://github.com/mixxxdj/mixxx/blob/${version}/CHANGELOG.md"; 150 + license = licenses.gpl2; 155 151 maintainers = with maintainers; [ 156 - bfortz 157 152 benley 153 + bfortz 158 154 ]; 159 155 platforms = platforms.linux; 160 156 };
+2 -5
pkgs/applications/kde/partitionmanager/default.nix
··· 24 24 jfsutils, 25 25 nilfs-utils, 26 26 ntfs3g, 27 - reiser4progs, 28 - reiserfsprogs, 29 27 udftools, 30 28 xfsprogs, 31 29 zfs, ··· 54 52 jfsutils 55 53 nilfs-utils 56 54 ntfs3g 57 - reiser4progs 58 - reiserfsprogs 55 + # reiser{4,fs}progs intentionally omitted due to filesystem removal from Linux. 59 56 udftools 60 57 xfsprogs 61 58 zfs ··· 98 95 longDescription = '' 99 96 KDE Partition Manager is a utility to help you manage the disks, partitions, and file systems on your computer. 100 97 It allows you to easily create, copy, move, delete, back up, restore, and resize them without losing data. 101 - It supports a large number of file systems, including ext2/3/4, btrfs, reiserfs, NTFS, FAT16/32, JFS, XFS and more. 98 + It supports a large number of file systems, including ext2/3/4, btrfs, NTFS, FAT16/32, JFS, XFS and more. 102 99 103 100 To install on NixOS, use the option `programs.partition-manager.enable = true`. 104 101 '';
+3 -3
pkgs/applications/networking/cluster/terraform-providers/providers.json
··· 1337 1337 "vendorHash": null 1338 1338 }, 1339 1339 "utils": { 1340 - "hash": "sha256-bxjEdmPgKPFpRM9Jz9nichDhXY+7x74WS6VjZGf9VUE=", 1340 + "hash": "sha256-rCTY06SEsppImhBZmx5AX58sOsI2NPJ5oK3+o64MIy8=", 1341 1341 "homepage": "https://registry.terraform.io/providers/cloudposse/utils", 1342 1342 "owner": "cloudposse", 1343 1343 "repo": "terraform-provider-utils", 1344 - "rev": "v1.26.0", 1344 + "rev": "v1.28.0", 1345 1345 "spdx": "Apache-2.0", 1346 - "vendorHash": "sha256-zJtVKDaqOMQqyAzq4VtVv5MgXS999BwxeWhXQI6McC4=" 1346 + "vendorHash": "sha256-Dxd/2TjxPoa+JcHlmmcoPx2wegZJzhbI1abNmF4wDik=" 1347 1347 }, 1348 1348 "vault": { 1349 1349 "hash": "sha256-vMt7FyNY+Tv7C+YT4h6BOn4EDU5ypOHQvtW0VtQiifg=",
+1 -1
pkgs/applications/science/math/mathematica/default.nix
··· 30 30 let 31 31 versions = callPackage ./versions.nix { }; 32 32 33 - matching-versions = lib.sort (v1: v2: lib.versionAtLeast v1.version v2.version) ( 33 + matching-versions = lib.sort (v1: v2: lib.versionOlder v2.version v1.version) ( 34 34 lib.filter ( 35 35 v: v.lang == lang && (version == null || isMatching v.version version) && matchesDoc v 36 36 ) versions
+3 -3
pkgs/by-name/op/opentofu/package.nix
··· 15 15 let 16 16 package = buildGoModule rec { 17 17 pname = "opentofu"; 18 - version = "1.8.7"; 18 + version = "1.8.8"; 19 19 20 20 src = fetchFromGitHub { 21 21 owner = "opentofu"; 22 22 repo = "opentofu"; 23 23 rev = "v${version}"; 24 - hash = "sha256-OLXR9aA94KcIsZxk8gOZxZsljMKuymScuYcoj9W5Hj4="; 24 + hash = "sha256-qH08gSQijn/o+YlMUXKdNaSY8lBk0u/pN28TBcevDvE="; 25 25 }; 26 26 27 - vendorHash = "sha256-6M/uqwhNruIPx5srbimKuDJaFiZkyosoZQXWjxa6GxY="; 27 + vendorHash = "sha256-Ijgr5XhsFM3M8f4bnMAQ691kNnQPAGQ8pHv1BCqZU3I="; 28 28 ldflags = [ 29 29 "-s" 30 30 "-w"
+6
pkgs/by-name/re/reiser4progs/package.nix
··· 38 38 description = "Reiser4 utilities"; 39 39 license = licenses.gpl2Plus; 40 40 platforms = platforms.linux; 41 + 42 + # error: initialization of 43 + # 'int (*)(uint64_t *, uint64_t, uint32_t, int, int)' {aka 'int (*)(long unsigned int *, long unsigned int, unsigned int, int, int)'} 44 + # from incompatible pointer type 45 + # 'int (*)(uint64_t *, uint32_t, uint64_t, int, int)' {aka 'int (*)(long unsigned int *, unsigned int, long unsigned int, int, int)'} 46 + broken = true; 41 47 }; 42 48 }
+4 -4
pkgs/by-name/ty/typstyle/package.nix
··· 8 8 9 9 rustPlatform.buildRustPackage rec { 10 10 pname = "typstyle"; 11 - version = "0.12.13"; 11 + version = "0.12.14"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "Enter-tainer"; 15 15 repo = "typstyle"; 16 16 tag = "v${version}"; 17 - hash = "sha256-mEpMKXN07qjQ+qQSSTKVKss0c/x4bm0K5WcwLTjdejs="; 17 + hash = "sha256-TOu/1NiIofY87ttdBPDM2tVRg57FL8v8FCwkf0NFdBQ="; 18 18 }; 19 19 20 20 useFetchCargoVendor = true; 21 - cargoHash = "sha256-1NZmLH845oXb/IVQzwSv9hqoUGR5ZuGtsk4SCn/s2kk="; 21 + cargoHash = "sha256-2BX1Ol7eCWs7b5cIwQWWBwFksQ4HO7NmnoP9D384TUQ="; 22 22 23 23 # Disabling tests requiring network access 24 24 checkFlags = [ ··· 36 36 }; 37 37 38 38 meta = { 39 - changelog = "https://github.com/Enter-tainer/typstyle/blob/${src.tag}/CHANGELOG.md"; 39 + changelog = "https://github.com/Enter-tainer/typstyle/blob/v${version}/CHANGELOG.md"; 40 40 description = "Format your typst source code"; 41 41 homepage = "https://github.com/Enter-tainer/typstyle"; 42 42 license = lib.licenses.asl20;
+19
pkgs/by-name/ve/vesktop/fix_read_only_settings.patch
··· 1 + diff --git a/src/main/settings.ts b/src/main/settings.ts 2 + index 6fad97f..dfc64e3 100644 3 + --- a/src/main/settings.ts 4 + +++ b/src/main/settings.ts 5 + @@ -26,8 +26,12 @@ function loadSettings<T extends object = any>(file: string, name: string) { 6 + 7 + const store = new SettingsStore(settings); 8 + store.addGlobalChangeListener(o => { 9 + - mkdirSync(dirname(file), { recursive: true }); 10 + - writeFileSync(file, JSON.stringify(o, null, 4)); 11 + + try { 12 + + mkdirSync(dirname(file), { recursive: true }); 13 + + writeFileSync(file, JSON.stringify(o, null, 4)); 14 + + } catch (e) { 15 + + console.error("Nix: Failed to write settings.", e); 16 + + } 17 + }); 18 + 19 + return store;
+4 -1
pkgs/by-name/ve/vesktop/package.nix
··· 69 69 ]; 70 70 71 71 patches = 72 - [ ./disable_update_checking.patch ] 72 + [ 73 + ./disable_update_checking.patch 74 + ./fix_read_only_settings.patch 75 + ] 73 76 ++ lib.optional withSystemVencord ( 74 77 replaceVars ./use_system_vencord.patch { 75 78 inherit vencord;
+2 -2
pkgs/desktops/deepin/apps/deepin-terminal/default.nix
··· 16 16 17 17 stdenv.mkDerivation rec { 18 18 pname = "deepin-terminal"; 19 - version = "6.0.15"; 19 + version = "6.0.17"; 20 20 21 21 src = fetchFromGitHub { 22 22 owner = "linuxdeepin"; 23 23 repo = pname; 24 24 rev = version; 25 - hash = "sha256-Xcvdv58gJNhrdznQ09Nz/nMkM4IFIgQnapuhIdYHG0g="; 25 + hash = "sha256-T5tjjbNYUaiG9a5zMoKN6I0ec/WLftF2xwUPczlNwB8="; 26 26 }; 27 27 28 28 cmakeFlags = [ "-DVERSION=${version}" ];
+1 -4
pkgs/kde/gear/kpmcore/default.nix
··· 18 18 jfsutils, 19 19 nilfs-utils, 20 20 ntfs3g, 21 - reiser4progs, 22 - reiserfsprogs, 23 21 udftools, 24 22 xfsprogs, 25 23 zfs, ··· 44 42 jfsutils 45 43 nilfs-utils 46 44 ntfs3g 47 - reiser4progs 48 - reiserfsprogs 45 + # reiser{4,fs}progs intentionally omitted due to filesystem removal from Linux. 49 46 udftools 50 47 xfsprogs 51 48 zfs
+3 -3
pkgs/os-specific/linux/kernel/common-config.nix
··· 545 545 # Enable Rust and features that depend on it 546 546 # Use a lower priority to allow these options to be overridden in hardened/config.nix 547 547 rust = lib.optionalAttrs withRust { 548 - RUST = lib.mkDefault yes; 548 + RUST = yes; 549 549 550 550 # These don't technically require Rust but we probably want to get some more testing 551 551 # on the whole DRM panic setup before shipping it by default. 552 552 DRM_PANIC = whenAtLeast "6.12" yes; 553 553 DRM_PANIC_SCREEN = whenAtLeast "6.12" (freeform "kmsg"); 554 554 555 - DRM_PANIC_SCREEN_QR_CODE = lib.mkDefault (whenAtLeast "6.12" yes); 555 + DRM_PANIC_SCREEN_QR_CODE = whenAtLeast "6.12" yes; 556 556 }; 557 557 558 558 sound = ··· 1275 1275 LIRC = yes; 1276 1276 1277 1277 SCHED_CORE = whenAtLeast "5.14" yes; 1278 - SCHED_CLASS_EXT = lib.mkDefault (whenAtLeast "6.12" yes); 1278 + SCHED_CLASS_EXT = whenAtLeast "6.12" yes; 1279 1279 1280 1280 LRU_GEN = whenAtLeast "6.1" yes; 1281 1281 LRU_GEN_ENABLED = whenAtLeast "6.1" yes;
-11
pkgs/os-specific/linux/kernel/hardened/config.nix
··· 38 38 DEBUG_PLIST = whenAtLeast "5.2" yes; 39 39 DEBUG_SG = yes; 40 40 DEBUG_VIRTUAL = yes; 41 - # Set in common config as whenAtLeast "6.12" yes; Currently errors during config 42 - SCHED_CLASS_EXT = whenAtLeast "6.12" (option yes); 43 41 SCHED_STACK_END_CHECK = yes; 44 42 45 43 REFCOUNT_FULL = whenOlder "5.4.208" yes; ··· 68 66 PANIC_TIMEOUT = freeform "-1"; 69 67 70 68 GCC_PLUGINS = yes; # Enable gcc plugin options 71 - # Gather additional entropy at boot time for systems that may not have appropriate entropy sources. 72 - GCC_PLUGIN_LATENT_ENTROPY = yes; 73 69 74 70 GCC_PLUGIN_STRUCTLEAK = option yes; # A port of the PaX structleak plugin 75 71 GCC_PLUGIN_STRUCTLEAK_BYREF_ALL = option yes; # Also cover structs passed by address ··· 87 83 UBSAN_LOCAL_BOUNDS = option yes; # clang only 88 84 CFI_CLANG = option yes; # clang only Control Flow Integrity since 6.1 89 85 90 - # Same as GCC_PLUGIN_RANDSTRUCT*, but has been renamed to `RANDSTRUCT*` in 5.19. 91 - RANDSTRUCT = whenAtLeast "5.19" yes; 92 - RANDSTRUCT_PERFORMANCE = whenAtLeast "5.19" yes; 93 - 94 86 # Disable various dangerous settings 95 87 ACPI_CUSTOM_METHOD = whenOlder "6.9" no; # Allows writing directly to physical memory 96 88 PROC_KCORE = no; # Exposes kernel text image layout ··· 118 110 119 111 # not needed for less than a decade old glibc versions 120 112 LEGACY_VSYSCALL_NONE = yes; 121 - 122 - RUST = option yes; # Yes currently erros on 6.12 123 - DRM_PANIC_SCREEN_QR_CODE = whenAtLeast "6.12" (option yes); 124 113 }
+30 -30
pkgs/os-specific/linux/kernel/hardened/patches.json
··· 2 2 "5.10": { 3 3 "patch": { 4 4 "extra": "-hardened1", 5 - "name": "linux-hardened-v5.10.231-hardened1.patch", 6 - "sha256": "1hjk2scmks3z78i4lzkjm7lcv2m94cv8mmpixw8ylxjfhq1hksv4", 7 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/v5.10.231-hardened1/linux-hardened-v5.10.231-hardened1.patch" 5 + "name": "linux-hardened-v5.10.232-hardened1.patch", 6 + "sha256": "1bfhnj6k65q6kjlxbxqfzq2l81dvbfdc4khn7n0zp6vm37a34c74", 7 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/v5.10.232-hardened1/linux-hardened-v5.10.232-hardened1.patch" 8 8 }, 9 - "sha256": "0xcnlz5ib4b368z5cyp4qwys3jsbm18wlvwn73rzj2j6rj1lhnjn", 10 - "version": "5.10.231" 9 + "sha256": "1w5ycdh24j4gsjc2zk7nhbmya59vhi49lbh8333ziprqlj4lb97x", 10 + "version": "5.10.232" 11 11 }, 12 12 "5.15": { 13 13 "patch": { 14 14 "extra": "-hardened1", 15 - "name": "linux-hardened-v5.15.174-hardened1.patch", 16 - "sha256": "1583qbknmqf8fhm95jdpr4qw8i7nq2103ba5wsrn87w43m14s2z8", 17 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/v5.15.174-hardened1/linux-hardened-v5.15.174-hardened1.patch" 15 + "name": "linux-hardened-v5.15.175-hardened1.patch", 16 + "sha256": "1j7z487n26jd8npylddflpdksrwk7b7xck2gblsd1rp1zgpd0q4g", 17 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/v5.15.175-hardened1/linux-hardened-v5.15.175-hardened1.patch" 18 18 }, 19 - "sha256": "02kn9nvaa36s070k235lk9x6n40l2zlwj4v6i2y6nnx0cjw3rrn3", 20 - "version": "5.15.174" 19 + "sha256": "1l59x1f1b29mayhzxxkh9vlba41h51mmfh1vram31bks1v4bpn4g", 20 + "version": "5.15.175" 21 21 }, 22 22 "5.4": { 23 23 "patch": { 24 24 "extra": "-hardened1", 25 - "name": "linux-hardened-v5.4.287-hardened1.patch", 26 - "sha256": "08abr58k2ha29x72mpz49ivzmm5bhv6fflxwm0lhmijwqly2p05d", 27 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/v5.4.287-hardened1/linux-hardened-v5.4.287-hardened1.patch" 25 + "name": "linux-hardened-v5.4.288-hardened1.patch", 26 + "sha256": "0zqc0xblfy2rj1n8mr2q07apcq1rmqshsi15881df4ml5lkq4y62", 27 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/v5.4.288-hardened1/linux-hardened-v5.4.288-hardened1.patch" 28 28 }, 29 - "sha256": "082bq26bwi8jxfbk840wf9awm5l65aya4bg43im9qvqfpzjzl3qd", 30 - "version": "5.4.287" 29 + "sha256": "1zhsb6gwhb6cvijzh7s8rnm4b06klyhb2mxb06gcyfvj0givlvw7", 30 + "version": "5.4.288" 31 31 }, 32 32 "6.1": { 33 33 "patch": { 34 34 "extra": "-hardened1", 35 - "name": "linux-hardened-v6.1.120-hardened1.patch", 36 - "sha256": "1x9nl76186ij447x2xrrrls9xaj97rdw4b6v4dnsyg9qjx846lp6", 37 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/v6.1.120-hardened1/linux-hardened-v6.1.120-hardened1.patch" 35 + "name": "linux-hardened-v6.1.121-hardened1.patch", 36 + "sha256": "0m8gdp8jsv5nd5xpdcxq5jd88gcfajacm5v0fz1f5vlsgs4gazcg", 37 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/v6.1.121-hardened1/linux-hardened-v6.1.121-hardened1.patch" 38 38 }, 39 - "sha256": "06gp5fdq0bc39hd8mf9mrdrygdybdr3nzsb58lcapf5vmjw9gjb1", 40 - "version": "6.1.120" 39 + "sha256": "0hrv9l2m4yqhh6cwr8xj9jvx8y3sfwmd394g0f2iawrgc3d1dg6x", 40 + "version": "6.1.121" 41 41 }, 42 42 "6.11": { 43 43 "patch": { ··· 52 52 "6.12": { 53 53 "patch": { 54 54 "extra": "-hardened1", 55 - "name": "linux-hardened-v6.12.5-hardened1.patch", 56 - "sha256": "07rb0wf647qjdkir2p0bxf625bhbjlqhdv5wrjfc5c0dhrlikihr", 57 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/v6.12.5-hardened1/linux-hardened-v6.12.5-hardened1.patch" 55 + "name": "linux-hardened-v6.12.6-hardened1.patch", 56 + "sha256": "02c723gcbdzlgladhw3mpvavz8zy5aq4ncqljrxipia419giw7g7", 57 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/v6.12.6-hardened1/linux-hardened-v6.12.6-hardened1.patch" 58 58 }, 59 - "sha256": "1k9bc0lpgg29bh7zqz3pm91hhjnfyl5aw6r6hph3ha743k77y81r", 60 - "version": "6.12.5" 59 + "sha256": "17lwn89903ffyi2b29j59c1gsczsc1kj3x70hnxziqg4blhsnl6l", 60 + "version": "6.12.6" 61 61 }, 62 62 "6.6": { 63 63 "patch": { 64 64 "extra": "-hardened1", 65 - "name": "linux-hardened-v6.6.66-hardened1.patch", 66 - "sha256": "04m65bfmahjq29qy9lbzhyqz7a0yahgfjq8d1ck5z4y0x3yvpggp", 67 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/v6.6.66-hardened1/linux-hardened-v6.6.66-hardened1.patch" 65 + "name": "linux-hardened-v6.6.67-hardened1.patch", 66 + "sha256": "0p6vilg82pcsqmy336157b06v1fbyx8mkzpgccpmgk77wprzd438", 67 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/v6.6.67-hardened1/linux-hardened-v6.6.67-hardened1.patch" 68 68 }, 69 - "sha256": "0lhy5waj330hmaxbqpfw2fxzkvvlxxs1nr325i8jy736qhvpjxcx", 70 - "version": "6.6.66" 69 + "sha256": "06iy243l7c2nldamq0nzbkwxrqr7sg0p89gdp3ib18s2xj1a87g4", 70 + "version": "6.6.67" 71 71 } 72 72 }
+1 -1
pkgs/top-level/all-packages.nix
··· 14589 14589 14590 14590 minitube = libsForQt5.callPackage ../applications/video/minitube { }; 14591 14591 14592 - mixxx = libsForQt5.callPackage ../applications/audio/mixxx { }; 14592 + mixxx = qt6Packages.callPackage ../applications/audio/mixxx { }; 14593 14593 14594 14594 mldonkey = callPackage ../applications/networking/p2p/mldonkey { 14595 14595 ocamlPackages = ocaml-ng.ocamlPackages_4_14_unsafe_string;