Merge staging-next into staging

authored by

github-actions[bot] and committed by
GitHub
67307df2 455ed0b4

+97 -85
+5
nixos/doc/manual/release-notes/rl-2505.section.md
··· 290 291 To get the necessary hash of the vendored dependencies, omit `hash`. The build will fail and tell you the correct value. 292 293 - `programs.fzf.keybindings` now supports the fish shell. 294 295 <!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. -->
··· 290 291 To get the necessary hash of the vendored dependencies, omit `hash`. The build will fail and tell you the correct value. 292 293 + - KDE Partition Manager `partitionmanager`'s support for ReiserFS is removed. 294 + ReiserFS has not been actively maintained for many years. It has been marked as obsolete since Linux 6.6, and 295 + [is removed](https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c01f664e4ca210823b7594b50669bbd9b0a3c3b0) 296 + in Linux 6.13. 297 + 298 - `programs.fzf.keybindings` now supports the fish shell. 299 300 <!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. -->
+13 -17
pkgs/applications/audio/mixxx/default.nix
··· 1 { 2 lib, 3 stdenv, 4 - mkDerivation, 5 fetchFromGitHub, 6 chromaprint, 7 cmake, ··· 38 portaudio, 39 portmidi, 40 protobuf, 41 qtbase, 42 qtkeychain, 43 - qtscript, 44 qtsvg, 45 - qtx11extras, 46 rubberband, 47 serd, 48 sord, ··· 53 upower, 54 vamp-plugin-sdk, 55 wavpack, 56 - wrapGAppsHook3, 57 }: 58 59 - mkDerivation rec { 60 pname = "mixxx"; 61 - version = "2.4.2"; 62 63 src = fetchFromGitHub { 64 owner = "mixxxdj"; 65 repo = "mixxx"; 66 rev = version; 67 - hash = "sha256-YfpFRLosIIND+HnZN+76ZY0dQqEJaFkWZS84gZOCdfc="; 68 }; 69 70 nativeBuildInputs = [ 71 cmake 72 pkg-config 73 - wrapGAppsHook3 74 ]; 75 76 - dontWrapGApps = true; 77 - 78 buildInputs = [ 79 chromaprint 80 faad2 ··· 109 portaudio 110 portmidi 111 protobuf 112 qtbase 113 qtkeychain 114 - qtscript 115 qtsvg 116 - qtx11extras 117 rubberband 118 serd 119 sord ··· 126 wavpack 127 ]; 128 129 - preFixup = '' 130 - qtWrapperArgs+=(--set LOCALE_ARCHIVE ${glibcLocales}/lib/locale/locale-archive ''${gappsWrapperArgs[@]}) 131 - ''; 132 133 # mixxx installs udev rules to DATADIR instead of SYSCONFDIR 134 # let's disable this and install udev rules manually via postInstall ··· 151 homepage = "https://mixxx.org"; 152 description = "Digital DJ mixing software"; 153 mainProgram = "mixxx"; 154 - license = licenses.gpl2Plus; 155 maintainers = with maintainers; [ 156 - bfortz 157 benley 158 ]; 159 platforms = platforms.linux; 160 };
··· 1 { 2 lib, 3 stdenv, 4 fetchFromGitHub, 5 chromaprint, 6 cmake, ··· 37 portaudio, 38 portmidi, 39 protobuf, 40 + qt5compat, 41 qtbase, 42 + qtdeclarative, 43 qtkeychain, 44 qtsvg, 45 rubberband, 46 serd, 47 sord, ··· 52 upower, 53 vamp-plugin-sdk, 54 wavpack, 55 + wrapQtAppsHook, 56 }: 57 58 + stdenv.mkDerivation rec { 59 pname = "mixxx"; 60 + version = "2.5.0"; 61 62 src = fetchFromGitHub { 63 owner = "mixxxdj"; 64 repo = "mixxx"; 65 rev = version; 66 + hash = "sha256-1ZE2hVwacZve0+IOQs+htK/kl7zFsOWkh/KcrnI6u/M="; 67 }; 68 69 nativeBuildInputs = [ 70 cmake 71 pkg-config 72 + wrapQtAppsHook 73 ]; 74 75 buildInputs = [ 76 chromaprint 77 faad2 ··· 106 portaudio 107 portmidi 108 protobuf 109 + qt5compat 110 qtbase 111 + qtdeclarative 112 qtkeychain 113 qtsvg 114 rubberband 115 serd 116 sord ··· 123 wavpack 124 ]; 125 126 + qtWrapperArgs = [ "--set LOCALE_ARCHIVE ${glibcLocales}/lib/locale/locale-archive" ]; 127 128 # mixxx installs udev rules to DATADIR instead of SYSCONFDIR 129 # let's disable this and install udev rules manually via postInstall ··· 146 homepage = "https://mixxx.org"; 147 description = "Digital DJ mixing software"; 148 mainProgram = "mixxx"; 149 + changelog = "https://github.com/mixxxdj/mixxx/blob/${version}/CHANGELOG.md"; 150 + license = licenses.gpl2; 151 maintainers = with maintainers; [ 152 benley 153 + bfortz 154 ]; 155 platforms = platforms.linux; 156 };
+2 -5
pkgs/applications/kde/partitionmanager/default.nix
··· 24 jfsutils, 25 nilfs-utils, 26 ntfs3g, 27 - reiser4progs, 28 - reiserfsprogs, 29 udftools, 30 xfsprogs, 31 zfs, ··· 54 jfsutils 55 nilfs-utils 56 ntfs3g 57 - reiser4progs 58 - reiserfsprogs 59 udftools 60 xfsprogs 61 zfs ··· 98 longDescription = '' 99 KDE Partition Manager is a utility to help you manage the disks, partitions, and file systems on your computer. 100 It allows you to easily create, copy, move, delete, back up, restore, and resize them without losing data. 101 - It supports a large number of file systems, including ext2/3/4, btrfs, reiserfs, NTFS, FAT16/32, JFS, XFS and more. 102 103 To install on NixOS, use the option `programs.partition-manager.enable = true`. 104 '';
··· 24 jfsutils, 25 nilfs-utils, 26 ntfs3g, 27 udftools, 28 xfsprogs, 29 zfs, ··· 52 jfsutils 53 nilfs-utils 54 ntfs3g 55 + # reiser{4,fs}progs intentionally omitted due to filesystem removal from Linux. 56 udftools 57 xfsprogs 58 zfs ··· 95 longDescription = '' 96 KDE Partition Manager is a utility to help you manage the disks, partitions, and file systems on your computer. 97 It allows you to easily create, copy, move, delete, back up, restore, and resize them without losing data. 98 + It supports a large number of file systems, including ext2/3/4, btrfs, NTFS, FAT16/32, JFS, XFS and more. 99 100 To install on NixOS, use the option `programs.partition-manager.enable = true`. 101 '';
+3 -3
pkgs/applications/networking/cluster/terraform-providers/providers.json
··· 1337 "vendorHash": null 1338 }, 1339 "utils": { 1340 - "hash": "sha256-bxjEdmPgKPFpRM9Jz9nichDhXY+7x74WS6VjZGf9VUE=", 1341 "homepage": "https://registry.terraform.io/providers/cloudposse/utils", 1342 "owner": "cloudposse", 1343 "repo": "terraform-provider-utils", 1344 - "rev": "v1.26.0", 1345 "spdx": "Apache-2.0", 1346 - "vendorHash": "sha256-zJtVKDaqOMQqyAzq4VtVv5MgXS999BwxeWhXQI6McC4=" 1347 }, 1348 "vault": { 1349 "hash": "sha256-vMt7FyNY+Tv7C+YT4h6BOn4EDU5ypOHQvtW0VtQiifg=",
··· 1337 "vendorHash": null 1338 }, 1339 "utils": { 1340 + "hash": "sha256-rCTY06SEsppImhBZmx5AX58sOsI2NPJ5oK3+o64MIy8=", 1341 "homepage": "https://registry.terraform.io/providers/cloudposse/utils", 1342 "owner": "cloudposse", 1343 "repo": "terraform-provider-utils", 1344 + "rev": "v1.28.0", 1345 "spdx": "Apache-2.0", 1346 + "vendorHash": "sha256-Dxd/2TjxPoa+JcHlmmcoPx2wegZJzhbI1abNmF4wDik=" 1347 }, 1348 "vault": { 1349 "hash": "sha256-vMt7FyNY+Tv7C+YT4h6BOn4EDU5ypOHQvtW0VtQiifg=",
+1 -1
pkgs/applications/science/math/mathematica/default.nix
··· 30 let 31 versions = callPackage ./versions.nix { }; 32 33 - matching-versions = lib.sort (v1: v2: lib.versionAtLeast v1.version v2.version) ( 34 lib.filter ( 35 v: v.lang == lang && (version == null || isMatching v.version version) && matchesDoc v 36 ) versions
··· 30 let 31 versions = callPackage ./versions.nix { }; 32 33 + matching-versions = lib.sort (v1: v2: lib.versionOlder v2.version v1.version) ( 34 lib.filter ( 35 v: v.lang == lang && (version == null || isMatching v.version version) && matchesDoc v 36 ) versions
+3 -3
pkgs/by-name/op/opentofu/package.nix
··· 15 let 16 package = buildGoModule rec { 17 pname = "opentofu"; 18 - version = "1.8.7"; 19 20 src = fetchFromGitHub { 21 owner = "opentofu"; 22 repo = "opentofu"; 23 rev = "v${version}"; 24 - hash = "sha256-OLXR9aA94KcIsZxk8gOZxZsljMKuymScuYcoj9W5Hj4="; 25 }; 26 27 - vendorHash = "sha256-6M/uqwhNruIPx5srbimKuDJaFiZkyosoZQXWjxa6GxY="; 28 ldflags = [ 29 "-s" 30 "-w"
··· 15 let 16 package = buildGoModule rec { 17 pname = "opentofu"; 18 + version = "1.8.8"; 19 20 src = fetchFromGitHub { 21 owner = "opentofu"; 22 repo = "opentofu"; 23 rev = "v${version}"; 24 + hash = "sha256-qH08gSQijn/o+YlMUXKdNaSY8lBk0u/pN28TBcevDvE="; 25 }; 26 27 + vendorHash = "sha256-Ijgr5XhsFM3M8f4bnMAQ691kNnQPAGQ8pHv1BCqZU3I="; 28 ldflags = [ 29 "-s" 30 "-w"
+6
pkgs/by-name/re/reiser4progs/package.nix
··· 38 description = "Reiser4 utilities"; 39 license = licenses.gpl2Plus; 40 platforms = platforms.linux; 41 }; 42 }
··· 38 description = "Reiser4 utilities"; 39 license = licenses.gpl2Plus; 40 platforms = platforms.linux; 41 + 42 + # error: initialization of 43 + # 'int (*)(uint64_t *, uint64_t, uint32_t, int, int)' {aka 'int (*)(long unsigned int *, long unsigned int, unsigned int, int, int)'} 44 + # from incompatible pointer type 45 + # 'int (*)(uint64_t *, uint32_t, uint64_t, int, int)' {aka 'int (*)(long unsigned int *, unsigned int, long unsigned int, int, int)'} 46 + broken = true; 47 }; 48 }
+4 -4
pkgs/by-name/ty/typstyle/package.nix
··· 8 9 rustPlatform.buildRustPackage rec { 10 pname = "typstyle"; 11 - version = "0.12.13"; 12 13 src = fetchFromGitHub { 14 owner = "Enter-tainer"; 15 repo = "typstyle"; 16 tag = "v${version}"; 17 - hash = "sha256-mEpMKXN07qjQ+qQSSTKVKss0c/x4bm0K5WcwLTjdejs="; 18 }; 19 20 useFetchCargoVendor = true; 21 - cargoHash = "sha256-1NZmLH845oXb/IVQzwSv9hqoUGR5ZuGtsk4SCn/s2kk="; 22 23 # Disabling tests requiring network access 24 checkFlags = [ ··· 36 }; 37 38 meta = { 39 - changelog = "https://github.com/Enter-tainer/typstyle/blob/${src.tag}/CHANGELOG.md"; 40 description = "Format your typst source code"; 41 homepage = "https://github.com/Enter-tainer/typstyle"; 42 license = lib.licenses.asl20;
··· 8 9 rustPlatform.buildRustPackage rec { 10 pname = "typstyle"; 11 + version = "0.12.14"; 12 13 src = fetchFromGitHub { 14 owner = "Enter-tainer"; 15 repo = "typstyle"; 16 tag = "v${version}"; 17 + hash = "sha256-TOu/1NiIofY87ttdBPDM2tVRg57FL8v8FCwkf0NFdBQ="; 18 }; 19 20 useFetchCargoVendor = true; 21 + cargoHash = "sha256-2BX1Ol7eCWs7b5cIwQWWBwFksQ4HO7NmnoP9D384TUQ="; 22 23 # Disabling tests requiring network access 24 checkFlags = [ ··· 36 }; 37 38 meta = { 39 + changelog = "https://github.com/Enter-tainer/typstyle/blob/v${version}/CHANGELOG.md"; 40 description = "Format your typst source code"; 41 homepage = "https://github.com/Enter-tainer/typstyle"; 42 license = lib.licenses.asl20;
+19
pkgs/by-name/ve/vesktop/fix_read_only_settings.patch
···
··· 1 + diff --git a/src/main/settings.ts b/src/main/settings.ts 2 + index 6fad97f..dfc64e3 100644 3 + --- a/src/main/settings.ts 4 + +++ b/src/main/settings.ts 5 + @@ -26,8 +26,12 @@ function loadSettings<T extends object = any>(file: string, name: string) { 6 + 7 + const store = new SettingsStore(settings); 8 + store.addGlobalChangeListener(o => { 9 + - mkdirSync(dirname(file), { recursive: true }); 10 + - writeFileSync(file, JSON.stringify(o, null, 4)); 11 + + try { 12 + + mkdirSync(dirname(file), { recursive: true }); 13 + + writeFileSync(file, JSON.stringify(o, null, 4)); 14 + + } catch (e) { 15 + + console.error("Nix: Failed to write settings.", e); 16 + + } 17 + }); 18 + 19 + return store;
+4 -1
pkgs/by-name/ve/vesktop/package.nix
··· 69 ]; 70 71 patches = 72 - [ ./disable_update_checking.patch ] 73 ++ lib.optional withSystemVencord ( 74 replaceVars ./use_system_vencord.patch { 75 inherit vencord;
··· 69 ]; 70 71 patches = 72 + [ 73 + ./disable_update_checking.patch 74 + ./fix_read_only_settings.patch 75 + ] 76 ++ lib.optional withSystemVencord ( 77 replaceVars ./use_system_vencord.patch { 78 inherit vencord;
+2 -2
pkgs/desktops/deepin/apps/deepin-terminal/default.nix
··· 16 17 stdenv.mkDerivation rec { 18 pname = "deepin-terminal"; 19 - version = "6.0.15"; 20 21 src = fetchFromGitHub { 22 owner = "linuxdeepin"; 23 repo = pname; 24 rev = version; 25 - hash = "sha256-Xcvdv58gJNhrdznQ09Nz/nMkM4IFIgQnapuhIdYHG0g="; 26 }; 27 28 cmakeFlags = [ "-DVERSION=${version}" ];
··· 16 17 stdenv.mkDerivation rec { 18 pname = "deepin-terminal"; 19 + version = "6.0.17"; 20 21 src = fetchFromGitHub { 22 owner = "linuxdeepin"; 23 repo = pname; 24 rev = version; 25 + hash = "sha256-T5tjjbNYUaiG9a5zMoKN6I0ec/WLftF2xwUPczlNwB8="; 26 }; 27 28 cmakeFlags = [ "-DVERSION=${version}" ];
+1 -4
pkgs/kde/gear/kpmcore/default.nix
··· 18 jfsutils, 19 nilfs-utils, 20 ntfs3g, 21 - reiser4progs, 22 - reiserfsprogs, 23 udftools, 24 xfsprogs, 25 zfs, ··· 44 jfsutils 45 nilfs-utils 46 ntfs3g 47 - reiser4progs 48 - reiserfsprogs 49 udftools 50 xfsprogs 51 zfs
··· 18 jfsutils, 19 nilfs-utils, 20 ntfs3g, 21 udftools, 22 xfsprogs, 23 zfs, ··· 42 jfsutils 43 nilfs-utils 44 ntfs3g 45 + # reiser{4,fs}progs intentionally omitted due to filesystem removal from Linux. 46 udftools 47 xfsprogs 48 zfs
+3 -3
pkgs/os-specific/linux/kernel/common-config.nix
··· 545 # Enable Rust and features that depend on it 546 # Use a lower priority to allow these options to be overridden in hardened/config.nix 547 rust = lib.optionalAttrs withRust { 548 - RUST = lib.mkDefault yes; 549 550 # These don't technically require Rust but we probably want to get some more testing 551 # on the whole DRM panic setup before shipping it by default. 552 DRM_PANIC = whenAtLeast "6.12" yes; 553 DRM_PANIC_SCREEN = whenAtLeast "6.12" (freeform "kmsg"); 554 555 - DRM_PANIC_SCREEN_QR_CODE = lib.mkDefault (whenAtLeast "6.12" yes); 556 }; 557 558 sound = ··· 1275 LIRC = yes; 1276 1277 SCHED_CORE = whenAtLeast "5.14" yes; 1278 - SCHED_CLASS_EXT = lib.mkDefault (whenAtLeast "6.12" yes); 1279 1280 LRU_GEN = whenAtLeast "6.1" yes; 1281 LRU_GEN_ENABLED = whenAtLeast "6.1" yes;
··· 545 # Enable Rust and features that depend on it 546 # Use a lower priority to allow these options to be overridden in hardened/config.nix 547 rust = lib.optionalAttrs withRust { 548 + RUST = yes; 549 550 # These don't technically require Rust but we probably want to get some more testing 551 # on the whole DRM panic setup before shipping it by default. 552 DRM_PANIC = whenAtLeast "6.12" yes; 553 DRM_PANIC_SCREEN = whenAtLeast "6.12" (freeform "kmsg"); 554 555 + DRM_PANIC_SCREEN_QR_CODE = whenAtLeast "6.12" yes; 556 }; 557 558 sound = ··· 1275 LIRC = yes; 1276 1277 SCHED_CORE = whenAtLeast "5.14" yes; 1278 + SCHED_CLASS_EXT = whenAtLeast "6.12" yes; 1279 1280 LRU_GEN = whenAtLeast "6.1" yes; 1281 LRU_GEN_ENABLED = whenAtLeast "6.1" yes;
-11
pkgs/os-specific/linux/kernel/hardened/config.nix
··· 38 DEBUG_PLIST = whenAtLeast "5.2" yes; 39 DEBUG_SG = yes; 40 DEBUG_VIRTUAL = yes; 41 - # Set in common config as whenAtLeast "6.12" yes; Currently errors during config 42 - SCHED_CLASS_EXT = whenAtLeast "6.12" (option yes); 43 SCHED_STACK_END_CHECK = yes; 44 45 REFCOUNT_FULL = whenOlder "5.4.208" yes; ··· 68 PANIC_TIMEOUT = freeform "-1"; 69 70 GCC_PLUGINS = yes; # Enable gcc plugin options 71 - # Gather additional entropy at boot time for systems that may not have appropriate entropy sources. 72 - GCC_PLUGIN_LATENT_ENTROPY = yes; 73 74 GCC_PLUGIN_STRUCTLEAK = option yes; # A port of the PaX structleak plugin 75 GCC_PLUGIN_STRUCTLEAK_BYREF_ALL = option yes; # Also cover structs passed by address ··· 87 UBSAN_LOCAL_BOUNDS = option yes; # clang only 88 CFI_CLANG = option yes; # clang only Control Flow Integrity since 6.1 89 90 - # Same as GCC_PLUGIN_RANDSTRUCT*, but has been renamed to `RANDSTRUCT*` in 5.19. 91 - RANDSTRUCT = whenAtLeast "5.19" yes; 92 - RANDSTRUCT_PERFORMANCE = whenAtLeast "5.19" yes; 93 - 94 # Disable various dangerous settings 95 ACPI_CUSTOM_METHOD = whenOlder "6.9" no; # Allows writing directly to physical memory 96 PROC_KCORE = no; # Exposes kernel text image layout ··· 118 119 # not needed for less than a decade old glibc versions 120 LEGACY_VSYSCALL_NONE = yes; 121 - 122 - RUST = option yes; # Yes currently erros on 6.12 123 - DRM_PANIC_SCREEN_QR_CODE = whenAtLeast "6.12" (option yes); 124 }
··· 38 DEBUG_PLIST = whenAtLeast "5.2" yes; 39 DEBUG_SG = yes; 40 DEBUG_VIRTUAL = yes; 41 SCHED_STACK_END_CHECK = yes; 42 43 REFCOUNT_FULL = whenOlder "5.4.208" yes; ··· 66 PANIC_TIMEOUT = freeform "-1"; 67 68 GCC_PLUGINS = yes; # Enable gcc plugin options 69 70 GCC_PLUGIN_STRUCTLEAK = option yes; # A port of the PaX structleak plugin 71 GCC_PLUGIN_STRUCTLEAK_BYREF_ALL = option yes; # Also cover structs passed by address ··· 83 UBSAN_LOCAL_BOUNDS = option yes; # clang only 84 CFI_CLANG = option yes; # clang only Control Flow Integrity since 6.1 85 86 # Disable various dangerous settings 87 ACPI_CUSTOM_METHOD = whenOlder "6.9" no; # Allows writing directly to physical memory 88 PROC_KCORE = no; # Exposes kernel text image layout ··· 110 111 # not needed for less than a decade old glibc versions 112 LEGACY_VSYSCALL_NONE = yes; 113 }
+30 -30
pkgs/os-specific/linux/kernel/hardened/patches.json
··· 2 "5.10": { 3 "patch": { 4 "extra": "-hardened1", 5 - "name": "linux-hardened-v5.10.231-hardened1.patch", 6 - "sha256": "1hjk2scmks3z78i4lzkjm7lcv2m94cv8mmpixw8ylxjfhq1hksv4", 7 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/v5.10.231-hardened1/linux-hardened-v5.10.231-hardened1.patch" 8 }, 9 - "sha256": "0xcnlz5ib4b368z5cyp4qwys3jsbm18wlvwn73rzj2j6rj1lhnjn", 10 - "version": "5.10.231" 11 }, 12 "5.15": { 13 "patch": { 14 "extra": "-hardened1", 15 - "name": "linux-hardened-v5.15.174-hardened1.patch", 16 - "sha256": "1583qbknmqf8fhm95jdpr4qw8i7nq2103ba5wsrn87w43m14s2z8", 17 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/v5.15.174-hardened1/linux-hardened-v5.15.174-hardened1.patch" 18 }, 19 - "sha256": "02kn9nvaa36s070k235lk9x6n40l2zlwj4v6i2y6nnx0cjw3rrn3", 20 - "version": "5.15.174" 21 }, 22 "5.4": { 23 "patch": { 24 "extra": "-hardened1", 25 - "name": "linux-hardened-v5.4.287-hardened1.patch", 26 - "sha256": "08abr58k2ha29x72mpz49ivzmm5bhv6fflxwm0lhmijwqly2p05d", 27 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/v5.4.287-hardened1/linux-hardened-v5.4.287-hardened1.patch" 28 }, 29 - "sha256": "082bq26bwi8jxfbk840wf9awm5l65aya4bg43im9qvqfpzjzl3qd", 30 - "version": "5.4.287" 31 }, 32 "6.1": { 33 "patch": { 34 "extra": "-hardened1", 35 - "name": "linux-hardened-v6.1.120-hardened1.patch", 36 - "sha256": "1x9nl76186ij447x2xrrrls9xaj97rdw4b6v4dnsyg9qjx846lp6", 37 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/v6.1.120-hardened1/linux-hardened-v6.1.120-hardened1.patch" 38 }, 39 - "sha256": "06gp5fdq0bc39hd8mf9mrdrygdybdr3nzsb58lcapf5vmjw9gjb1", 40 - "version": "6.1.120" 41 }, 42 "6.11": { 43 "patch": { ··· 52 "6.12": { 53 "patch": { 54 "extra": "-hardened1", 55 - "name": "linux-hardened-v6.12.5-hardened1.patch", 56 - "sha256": "07rb0wf647qjdkir2p0bxf625bhbjlqhdv5wrjfc5c0dhrlikihr", 57 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/v6.12.5-hardened1/linux-hardened-v6.12.5-hardened1.patch" 58 }, 59 - "sha256": "1k9bc0lpgg29bh7zqz3pm91hhjnfyl5aw6r6hph3ha743k77y81r", 60 - "version": "6.12.5" 61 }, 62 "6.6": { 63 "patch": { 64 "extra": "-hardened1", 65 - "name": "linux-hardened-v6.6.66-hardened1.patch", 66 - "sha256": "04m65bfmahjq29qy9lbzhyqz7a0yahgfjq8d1ck5z4y0x3yvpggp", 67 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/v6.6.66-hardened1/linux-hardened-v6.6.66-hardened1.patch" 68 }, 69 - "sha256": "0lhy5waj330hmaxbqpfw2fxzkvvlxxs1nr325i8jy736qhvpjxcx", 70 - "version": "6.6.66" 71 } 72 }
··· 2 "5.10": { 3 "patch": { 4 "extra": "-hardened1", 5 + "name": "linux-hardened-v5.10.232-hardened1.patch", 6 + "sha256": "1bfhnj6k65q6kjlxbxqfzq2l81dvbfdc4khn7n0zp6vm37a34c74", 7 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/v5.10.232-hardened1/linux-hardened-v5.10.232-hardened1.patch" 8 }, 9 + "sha256": "1w5ycdh24j4gsjc2zk7nhbmya59vhi49lbh8333ziprqlj4lb97x", 10 + "version": "5.10.232" 11 }, 12 "5.15": { 13 "patch": { 14 "extra": "-hardened1", 15 + "name": "linux-hardened-v5.15.175-hardened1.patch", 16 + "sha256": "1j7z487n26jd8npylddflpdksrwk7b7xck2gblsd1rp1zgpd0q4g", 17 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/v5.15.175-hardened1/linux-hardened-v5.15.175-hardened1.patch" 18 }, 19 + "sha256": "1l59x1f1b29mayhzxxkh9vlba41h51mmfh1vram31bks1v4bpn4g", 20 + "version": "5.15.175" 21 }, 22 "5.4": { 23 "patch": { 24 "extra": "-hardened1", 25 + "name": "linux-hardened-v5.4.288-hardened1.patch", 26 + "sha256": "0zqc0xblfy2rj1n8mr2q07apcq1rmqshsi15881df4ml5lkq4y62", 27 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/v5.4.288-hardened1/linux-hardened-v5.4.288-hardened1.patch" 28 }, 29 + "sha256": "1zhsb6gwhb6cvijzh7s8rnm4b06klyhb2mxb06gcyfvj0givlvw7", 30 + "version": "5.4.288" 31 }, 32 "6.1": { 33 "patch": { 34 "extra": "-hardened1", 35 + "name": "linux-hardened-v6.1.121-hardened1.patch", 36 + "sha256": "0m8gdp8jsv5nd5xpdcxq5jd88gcfajacm5v0fz1f5vlsgs4gazcg", 37 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/v6.1.121-hardened1/linux-hardened-v6.1.121-hardened1.patch" 38 }, 39 + "sha256": "0hrv9l2m4yqhh6cwr8xj9jvx8y3sfwmd394g0f2iawrgc3d1dg6x", 40 + "version": "6.1.121" 41 }, 42 "6.11": { 43 "patch": { ··· 52 "6.12": { 53 "patch": { 54 "extra": "-hardened1", 55 + "name": "linux-hardened-v6.12.6-hardened1.patch", 56 + "sha256": "02c723gcbdzlgladhw3mpvavz8zy5aq4ncqljrxipia419giw7g7", 57 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/v6.12.6-hardened1/linux-hardened-v6.12.6-hardened1.patch" 58 }, 59 + "sha256": "17lwn89903ffyi2b29j59c1gsczsc1kj3x70hnxziqg4blhsnl6l", 60 + "version": "6.12.6" 61 }, 62 "6.6": { 63 "patch": { 64 "extra": "-hardened1", 65 + "name": "linux-hardened-v6.6.67-hardened1.patch", 66 + "sha256": "0p6vilg82pcsqmy336157b06v1fbyx8mkzpgccpmgk77wprzd438", 67 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/v6.6.67-hardened1/linux-hardened-v6.6.67-hardened1.patch" 68 }, 69 + "sha256": "06iy243l7c2nldamq0nzbkwxrqr7sg0p89gdp3ib18s2xj1a87g4", 70 + "version": "6.6.67" 71 } 72 }
+1 -1
pkgs/top-level/all-packages.nix
··· 14589 14590 minitube = libsForQt5.callPackage ../applications/video/minitube { }; 14591 14592 - mixxx = libsForQt5.callPackage ../applications/audio/mixxx { }; 14593 14594 mldonkey = callPackage ../applications/networking/p2p/mldonkey { 14595 ocamlPackages = ocaml-ng.ocamlPackages_4_14_unsafe_string;
··· 14589 14590 minitube = libsForQt5.callPackage ../applications/video/minitube { }; 14591 14592 + mixxx = qt6Packages.callPackage ../applications/audio/mixxx { }; 14593 14594 mldonkey = callPackage ../applications/networking/p2p/mldonkey { 14595 ocamlPackages = ocaml-ng.ocamlPackages_4_14_unsafe_string;