lol
fork

Configure Feed

Select the types of activity you want to include in your feed.

Merge master into staging-next

authored by

github-actions[bot] and committed by
GitHub
6b95af24 75d4639b

+736 -430
+1 -1
doc/languages-frameworks/rust.section.md
··· 817 817 ## Using community maintained Rust toolchains {#using-community-maintained-rust-toolchains} 818 818 819 819 ::: {.note} 820 - Note: The following projects cannot be used within nixpkgs since [IFD](#ssec-import-from-derivation) is disallowed. 820 + The following projects cannot be used within Nixpkgs since [Import From Derivation](https://nixos.org/manual/nix/unstable/language/import-from-derivation) (IFD) is disallowed in Nixpkgs. 821 821 To package things that require Rust nightly, `RUSTC_BOOTSTRAP = true;` can sometimes be used as a hack. 822 822 ::: 823 823
+1 -1
lib/fileset/README.md
··· 176 176 177 177 Arguments: 178 178 - (+) Such paths are usually produced by derivations, which means `toSource` would either: 179 - - Require IFD if `builtins.path` is used as the underlying primitive 179 + - Require [Import From Derivation](https://nixos.org/manual/nix/unstable/language/import-from-derivation) (IFD) if `builtins.path` is used as the underlying primitive 180 180 - Require importing the entire `root` into the store such that derivations can be used to do the filtering 181 181 - (+) The convenient path coercion like `union ./foo ./bar` wouldn't work for absolute paths, requiring more verbose alternate interfaces: 182 182 - `let root = "/nix/store/...-source"; in union "${root}/foo" "${root}/bar"`
+15 -12
lib/strings.nix
··· 854 854 assert (lib.isBool flag); 855 855 mesonOption feature (if flag then "enabled" else "disabled"); 856 856 857 - /* Create an --{enable,disable}-<feat> string that can be passed to 857 + /* Create an --{enable,disable}-<feature> string that can be passed to 858 858 standard GNU Autoconf scripts. 859 859 860 860 Example: ··· 863 863 enableFeature false "shared" 864 864 => "--disable-shared" 865 865 */ 866 - enableFeature = enable: feat: 867 - assert isString feat; # e.g. passing openssl instead of "openssl" 868 - "--${if enable then "enable" else "disable"}-${feat}"; 866 + enableFeature = flag: feature: 867 + assert lib.isBool flag; 868 + assert lib.isString feature; # e.g. passing openssl instead of "openssl" 869 + "--${if flag then "enable" else "disable"}-${feature}"; 869 870 870 - /* Create an --{enable-<feat>=<value>,disable-<feat>} string that can be passed to 871 + /* Create an --{enable-<feature>=<value>,disable-<feature>} string that can be passed to 871 872 standard GNU Autoconf scripts. 872 873 873 874 Example: ··· 876 877 enableFeatureAs false "shared" (throw "ignored") 877 878 => "--disable-shared" 878 879 */ 879 - enableFeatureAs = enable: feat: value: enableFeature enable feat + optionalString enable "=${value}"; 880 + enableFeatureAs = flag: feature: value: 881 + enableFeature flag feature + optionalString flag "=${value}"; 880 882 881 - /* Create an --{with,without}-<feat> string that can be passed to 883 + /* Create an --{with,without}-<feature> string that can be passed to 882 884 standard GNU Autoconf scripts. 883 885 884 886 Example: ··· 887 889 withFeature false "shared" 888 890 => "--without-shared" 889 891 */ 890 - withFeature = with_: feat: 891 - assert isString feat; # e.g. passing openssl instead of "openssl" 892 - "--${if with_ then "with" else "without"}-${feat}"; 892 + withFeature = flag: feature: 893 + assert isString feature; # e.g. passing openssl instead of "openssl" 894 + "--${if flag then "with" else "without"}-${feature}"; 893 895 894 - /* Create an --{with-<feat>=<value>,without-<feat>} string that can be passed to 896 + /* Create an --{with-<feature>=<value>,without-<feature>} string that can be passed to 895 897 standard GNU Autoconf scripts. 896 898 897 899 Example: ··· 900 902 withFeatureAs false "shared" (throw "ignored") 901 903 => "--without-shared" 902 904 */ 903 - withFeatureAs = with_: feat: value: withFeature with_ feat + optionalString with_ "=${value}"; 905 + withFeatureAs = flag: feature: value: 906 + withFeature flag feature + optionalString flag "=${value}"; 904 907 905 908 /* Create a fixed width string with additional prefix to match 906 909 required width.
+2
nixos/doc/manual/release-notes/rl-2311.section.md
··· 189 189 190 190 - `odoo` now defaults to 16, updated from 15. 191 191 192 + - `varnish` was upgraded from 7.2.x to 7.4.x, see https://varnish-cache.org/docs/7.3/whats-new/upgrading-7.3.html and https://varnish-cache.org/docs/7.4/whats-new/upgrading-7.4.html for upgrade notes. The current LTS version is still offered as `varnish60`. 193 + 192 194 - `util-linux` is now supported on Darwin and is no longer an alias to `unixtools`. Use the `unixtools.util-linux` package for access to the Apple variants of the utilities. 193 195 194 196 - `services.keyd` changed API. Now you can create multiple configuration files.
+1
nixos/modules/module-list.nix
··· 1083 1083 ./services/networking/thelounge.nix 1084 1084 ./services/networking/tinc.nix 1085 1085 ./services/networking/tinydns.nix 1086 + ./services/networking/tinyproxy.nix 1086 1087 ./services/networking/tmate-ssh-server.nix 1087 1088 ./services/networking/tox-bootstrapd.nix 1088 1089 ./services/networking/tox-node.nix
+13
nixos/modules/programs/wayland/sway.nix
··· 42 42 <https://github.com/swaywm/sway/wiki> and 43 43 "man 5 sway" for more information''); 44 44 45 + enableRealtime = mkEnableOption (lib.mdDoc '' 46 + add CAP_SYS_NICE capability on `sway` binary for realtime scheduling 47 + privileges. This may improve latency and reduce stuttering, specially in 48 + high load scenarios'') // { default = true; }; 49 + 45 50 package = mkOption { 46 51 type = with types; nullOr package; 47 52 default = defaultSwayPackage; ··· 147 152 ''; 148 153 } // optionalAttrs (cfg.package != null) { 149 154 "sway/config".source = mkOptionDefault "${cfg.package}/etc/sway/config"; 155 + }; 156 + }; 157 + security.wrappers = mkIf (cfg.enableRealtime && cfg.package != null) { 158 + sway = { 159 + owner = "root"; 160 + group = "root"; 161 + source = "${cfg.package}/bin/sway"; 162 + capabilities = "cap_sys_nice+ep"; 150 163 }; 151 164 }; 152 165 # To make a Sway session available if a display manager like SDDM is enabled:
+31 -38
nixos/modules/services/networking/connman.nix
··· 1 1 { config, lib, pkgs, ... }: 2 2 3 - with pkgs; 4 - with lib; 5 - 6 3 let 7 4 cfg = config.services.connman; 8 5 configFile = pkgs.writeText "connman.conf" '' 9 6 [General] 10 - NetworkInterfaceBlacklist=${concatStringsSep "," cfg.networkInterfaceBlacklist} 7 + NetworkInterfaceBlacklist=${lib.concatStringsSep "," cfg.networkInterfaceBlacklist} 11 8 12 9 ${cfg.extraConfig} 13 10 ''; 14 11 enableIwd = cfg.wifi.backend == "iwd"; 15 12 in { 13 + meta.maintainers = with lib.maintainers; [ AndersonTorres ]; 16 14 17 15 imports = [ 18 - (mkRenamedOptionModule [ "networking" "connman" ] [ "services" "connman" ]) 16 + (lib.mkRenamedOptionModule [ "networking" "connman" ] [ "services" "connman" ]) 19 17 ]; 20 18 21 19 ###### interface 22 20 23 21 options = { 24 - 25 22 services.connman = { 26 - 27 - enable = mkOption { 28 - type = types.bool; 23 + enable = lib.mkOption { 24 + type = lib.types.bool; 29 25 default = false; 30 26 description = lib.mdDoc '' 31 27 Whether to use ConnMan for managing your network connections. 32 28 ''; 33 29 }; 34 30 35 - enableVPN = mkOption { 36 - type = types.bool; 31 + package = lib.mkOption { 32 + type = lib.types.package; 33 + description = lib.mdDoc "The connman package / build flavor"; 34 + default = pkgs.connman; 35 + defaultText = lib.literalExpression "pkgs.connman"; 36 + example = lib.literalExpression "pkgs.connmanFull"; 37 + }; 38 + 39 + enableVPN = lib.mkOption { 40 + type = lib.types.bool; 37 41 default = true; 38 42 description = lib.mdDoc '' 39 43 Whether to enable ConnMan VPN service. 40 44 ''; 41 45 }; 42 46 43 - extraConfig = mkOption { 44 - type = types.lines; 47 + extraConfig = lib.mkOption { 48 + type = lib.types.lines; 45 49 default = ""; 46 50 description = lib.mdDoc '' 47 51 Configuration lines appended to the generated connman configuration file. 48 52 ''; 49 53 }; 50 54 51 - networkInterfaceBlacklist = mkOption { 52 - type = with types; listOf str; 55 + networkInterfaceBlacklist = lib.mkOption { 56 + type = with lib.types; listOf str; 53 57 default = [ "vmnet" "vboxnet" "virbr" "ifb" "ve" ]; 54 58 description = lib.mdDoc '' 55 59 Default blacklisted interfaces, this includes NixOS containers interfaces (ve). ··· 57 61 }; 58 62 59 63 wifi = { 60 - backend = mkOption { 61 - type = types.enum [ "wpa_supplicant" "iwd" ]; 64 + backend = lib.mkOption { 65 + type = lib.types.enum [ "wpa_supplicant" "iwd" ]; 62 66 default = "wpa_supplicant"; 63 67 description = lib.mdDoc '' 64 68 Specify the Wi-Fi backend used. ··· 67 71 }; 68 72 }; 69 73 70 - extraFlags = mkOption { 71 - type = with types; listOf str; 74 + extraFlags = lib.mkOption { 75 + type = with lib.types; listOf str; 72 76 default = [ ]; 73 77 example = [ "--nodnsproxy" ]; 74 78 description = lib.mdDoc '' 75 79 Extra flags to pass to connmand 76 80 ''; 77 81 }; 78 - 79 - package = mkOption { 80 - type = types.package; 81 - description = lib.mdDoc "The connman package / build flavor"; 82 - default = connman; 83 - defaultText = literalExpression "pkgs.connman"; 84 - example = literalExpression "pkgs.connmanFull"; 85 - }; 86 - 87 82 }; 88 - 89 83 }; 90 84 91 85 ###### implementation 92 86 93 - config = mkIf cfg.enable { 94 - 87 + config = lib.mkIf cfg.enable { 95 88 assertions = [{ 96 89 assertion = !config.networking.useDHCP; 97 90 message = "You can not use services.connman with networking.useDHCP"; ··· 107 100 systemd.services.connman = { 108 101 description = "Connection service"; 109 102 wantedBy = [ "multi-user.target" ]; 110 - after = [ "syslog.target" ] ++ optional enableIwd "iwd.service"; 111 - requires = optional enableIwd "iwd.service"; 103 + after = [ "syslog.target" ] ++ lib.optional enableIwd "iwd.service"; 104 + requires = lib.optional enableIwd "iwd.service"; 112 105 serviceConfig = { 113 106 Type = "dbus"; 114 107 BusName = "net.connman"; ··· 117 110 "${cfg.package}/sbin/connmand" 118 111 "--config=${configFile}" 119 112 "--nodaemon" 120 - ] ++ optional enableIwd "--wifi=iwd_agent" 113 + ] ++ lib.optional enableIwd "--wifi=iwd_agent" 121 114 ++ cfg.extraFlags); 122 115 StandardOutput = "null"; 123 116 }; 124 117 }; 125 118 126 - systemd.services.connman-vpn = mkIf cfg.enableVPN { 119 + systemd.services.connman-vpn = lib.mkIf cfg.enableVPN { 127 120 description = "ConnMan VPN service"; 128 121 wantedBy = [ "multi-user.target" ]; 129 122 after = [ "syslog.target" ]; ··· 136 129 }; 137 130 }; 138 131 139 - systemd.services.net-connman-vpn = mkIf cfg.enableVPN { 132 + systemd.services.net-connman-vpn = lib.mkIf cfg.enableVPN { 140 133 description = "D-BUS Service"; 141 134 serviceConfig = { 142 135 Name = "net.connman.vpn"; ··· 150 143 networking = { 151 144 useDHCP = false; 152 145 wireless = { 153 - enable = mkIf (!enableIwd) true; 146 + enable = lib.mkIf (!enableIwd) true; 154 147 dbusControlled = true; 155 - iwd = mkIf enableIwd { 148 + iwd = lib.mkIf enableIwd { 156 149 enable = true; 157 150 }; 158 151 };
+103
nixos/modules/services/networking/tinyproxy.nix
··· 1 + { config, lib, pkgs, ... }: 2 + 3 + with lib; 4 + 5 + let 6 + cfg = config.services.tinyproxy; 7 + mkValueStringTinyproxy = with lib; v: 8 + if true == v then "yes" 9 + else if false == v then "no" 10 + else generators.mkValueStringDefault {} v; 11 + mkKeyValueTinyproxy = { 12 + mkValueString ? mkValueStringDefault {} 13 + }: sep: k: v: 14 + if null == v then "" 15 + else "${lib.strings.escape [sep] k}${sep}${mkValueString v}"; 16 + 17 + settingsFormat = (pkgs.formats.keyValue { 18 + mkKeyValue = mkKeyValueTinyproxy { 19 + mkValueString = mkValueStringTinyproxy; 20 + } " "; 21 + listsAsDuplicateKeys= true; 22 + }); 23 + configFile = settingsFormat.generate "tinyproxy.conf" cfg.settings; 24 + 25 + in 26 + { 27 + 28 + options = { 29 + services.tinyproxy = { 30 + enable = mkEnableOption (lib.mdDoc "Tinyproxy daemon"); 31 + package = mkPackageOptionMD pkgs "tinyproxy" {}; 32 + settings = mkOption { 33 + description = lib.mdDoc "Configuration for [tinyproxy](https://tinyproxy.github.io/)."; 34 + default = { }; 35 + example = literalExpression ''{ 36 + Port 8888; 37 + Listen 127.0.0.1; 38 + Timeout 600; 39 + Allow 127.0.0.1; 40 + Anonymous = ['"Host"' '"Authorization"']; 41 + ReversePath = '"/example/" "http://www.example.com/"'; 42 + }''; 43 + type = types.submodule ({name, ...}: { 44 + freeformType = settingsFormat.type; 45 + options = { 46 + Listen = mkOption { 47 + type = types.str; 48 + default = "127.0.0.1"; 49 + description = lib.mdDoc '' 50 + Specify which address to listen to. 51 + ''; 52 + }; 53 + Port = mkOption { 54 + type = types.int; 55 + default = 8888; 56 + description = lib.mdDoc '' 57 + Specify which port to listen to. 58 + ''; 59 + }; 60 + Anonymous = mkOption { 61 + type = types.listOf types.str; 62 + default = []; 63 + description = lib.mdDoc '' 64 + If an `Anonymous` keyword is present, then anonymous proxying is enabled. The headers listed with `Anonymous` are allowed through, while all others are denied. If no Anonymous keyword is present, then all headers are allowed through. You must include quotes around the headers. 65 + ''; 66 + }; 67 + Filter = mkOption { 68 + type = types.nullOr types.path; 69 + default = null; 70 + description = lib.mdDoc '' 71 + Tinyproxy supports filtering of web sites based on URLs or domains. This option specifies the location of the file containing the filter rules, one rule per line. 72 + ''; 73 + }; 74 + }; 75 + }); 76 + }; 77 + }; 78 + }; 79 + config = mkIf cfg.enable { 80 + systemd.services.tinyproxy = { 81 + description = "TinyProxy daemon"; 82 + after = [ "network.target" ]; 83 + wantedBy = [ "multi-user.target" ]; 84 + serviceConfig = { 85 + User = "tinyproxy"; 86 + Group = "tinyproxy"; 87 + Type = "simple"; 88 + ExecStart = "${getExe pkgs.tinyproxy} -d -c ${configFile}"; 89 + ExecReload = "${pkgs.coreutils}/bin/kill -SIGHUP $MAINPID"; 90 + KillSignal = "SIGINT"; 91 + TimeoutStopSec = "30s"; 92 + Restart = "on-failure"; 93 + }; 94 + }; 95 + 96 + users.users.tinyproxy = { 97 + group = "tinyproxy"; 98 + isSystemUser = true; 99 + }; 100 + users.groups.tinyproxy = {}; 101 + }; 102 + meta.maintainers = with maintainers; [ tcheronneau ]; 103 + }
+2 -2
nixos/tests/all-tests.nix
··· 819 819 timezone = handleTest ./timezone.nix {}; 820 820 tinc = handleTest ./tinc {}; 821 821 tinydns = handleTest ./tinydns.nix {}; 822 + tinyproxy = handleTest ./tinyproxy.nix {}; 822 823 tinywl = handleTest ./tinywl.nix {}; 823 824 tmate-ssh-server = handleTest ./tmate-ssh-server.nix { }; 824 825 tomcat = handleTest ./tomcat.nix {}; ··· 855 856 uwsgi = handleTest ./uwsgi.nix {}; 856 857 v2ray = handleTest ./v2ray.nix {}; 857 858 varnish60 = handleTest ./varnish.nix { package = pkgs.varnish60; }; 858 - varnish72 = handleTest ./varnish.nix { package = pkgs.varnish72; }; 859 - varnish73 = handleTest ./varnish.nix { package = pkgs.varnish73; }; 859 + varnish74 = handleTest ./varnish.nix { package = pkgs.varnish74; }; 860 860 vault = handleTest ./vault.nix {}; 861 861 vault-agent = handleTest ./vault-agent.nix {}; 862 862 vault-dev = handleTest ./vault-dev.nix {};
+20
nixos/tests/tinyproxy.nix
··· 1 + import ./make-test-python.nix ({ pkgs, ... }: { 2 + name = "tinyproxy"; 3 + 4 + nodes.machine = { config, pkgs, ... }: { 5 + services.tinyproxy = { 6 + enable = true; 7 + settings = { 8 + Listen = "127.0.0.1"; 9 + Port = 8080; 10 + }; 11 + }; 12 + }; 13 + 14 + testScript = '' 15 + machine.wait_for_unit("tinyproxy.service") 16 + machine.wait_for_open_port(8080) 17 + 18 + machine.succeed('curl -s http://localhost:8080 |grep -i tinyproxy') 19 + ''; 20 + })
+2 -10
pkgs/README.md
··· 368 368 369 369 ### Import From Derivation 370 370 371 - Import From Derivation (IFD) is disallowed in Nixpkgs for performance reasons: 372 - [Hydra] evaluates the entire package set, and sequential builds during evaluation would increase evaluation times to become impractical. 373 - 374 - [Hydra]: https://github.com/NixOS/hydra 371 + [Import From Derivation](https://nixos.org/manual/nix/unstable/language/import-from-derivation) (IFD) is disallowed in Nixpkgs for performance reasons: 372 + [Hydra](https://github.com/NixOS/hydra) evaluates the entire package set, and sequential builds during evaluation would increase evaluation times to become impractical. 375 373 376 374 Import From Derivation can be worked around in some cases by committing generated intermediate files to version control and reading those instead. 377 - 378 - <!-- TODO: remove the following and link to Nix manual once https://github.com/NixOS/nix/pull/7332 is merged --> 379 - 380 - See also [NixOS Wiki: Import From Derivation]. 381 - 382 - [NixOS Wiki: Import From Derivation]: https://nixos.wiki/wiki/Import_From_Derivation 383 375 384 376 ## Sources 385 377
+2
pkgs/applications/misc/pdfstudio/common.nix
··· 5 5 , version 6 6 , desktopName 7 7 , longDescription 8 + , broken ? false 8 9 , buildFHSEnv 9 10 , extraBuildInputs ? [ ] 10 11 , jdk ··· 85 86 ''; 86 87 87 88 meta = with lib; { 89 + inherit broken; 88 90 homepage = "https://www.qoppa.com/${pname}/"; 89 91 description = "An easy to use, full-featured PDF editing software"; 90 92 longDescription = longDescription;
+4
pkgs/applications/misc/pdfstudio/default.nix
··· 40 40 sha256 = "sha256-QXNsH1T+ItV3s9r8CnwgRUo1mhVbe8LkEun9gUmlVQg="; 41 41 }; 42 42 jdk = jdk17; 43 + 44 + # Bad hash, got sha256-afRhx9VCVRFUJoUnqs1bzF0yXpz3yEgLiFjMRB9xvsk= 45 + # Likely unstable. 46 + broken = true; 43 47 }; 44 48 45 49 pdfstudio2021 = callPackage ./common.nix rec {
+2 -2
pkgs/applications/networking/instant-messengers/rocketchat-desktop/default.nix
··· 4 4 in 5 5 stdenv.mkDerivation rec { 6 6 pname = "rocketchat-desktop"; 7 - version = "3.9.8"; 7 + version = "3.9.9"; 8 8 9 9 src = fetchurl { 10 10 url = "https://github.com/RocketChat/Rocket.Chat.Electron/releases/download/${version}/rocketchat-${version}-linux-amd64.deb"; 11 - hash = "sha256-sx4WRAeitbBrz6jFvD0WF/EzR7cx4tOPoczbJ+tkw1s="; 11 + hash = "sha256-50mVmE+q2VYJXIv2iD6ppS83We0aJRT9vje+zpJcdq0="; 12 12 }; 13 13 14 14 nativeBuildInputs = [
+22 -14
pkgs/applications/science/logic/dafny/default.nix
··· 8 8 9 9 buildDotnetModule rec { 10 10 pname = "Dafny"; 11 - version = "4.2.0"; 11 + version = "4.3.0"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "dafny-lang"; 15 15 repo = "dafny"; 16 16 rev = "v${version}"; 17 - sha256 = "sha256-RSGaOgGf3m94t3SKnvSPqz0VHhWr6NmIMtGsmOynMaM="; 17 + hash = "sha256-bnKaaqh1/921SRwnwqgYb31SJ8vguEBtzywPTz79S6I="; 18 18 }; 19 19 20 - postPatch = '' 21 - cp ${writeScript "fake-gradlew-for-dafny" '' 22 - mkdir -p build/libs/ 23 - javac $(find -name "*.java" | grep "^./src/main") -d classes 24 - jar cf build/libs/DafnyRuntime-${version}.jar -C classes dafny 25 - ''} Source/DafnyRuntime/DafnyRuntimeJava/gradlew 20 + postPatch = 21 + # This version number seems to be hardcoded and didn't get updated with the 22 + # version bump from 4.2.0 to 4.3.0. 23 + let dafnyRuntimeJarVersion = "4.2.0"; 24 + in '' 25 + cp ${ 26 + writeScript "fake-gradlew-for-dafny" '' 27 + mkdir -p build/libs/ 28 + javac $(find -name "*.java" | grep "^./src/main") -d classes 29 + jar cf build/libs/DafnyRuntime-${dafnyRuntimeJarVersion}.jar -C classes dafny 30 + ''} Source/DafnyRuntime/DafnyRuntimeJava/gradlew 26 31 27 - # Needed to fix 28 - # "error NETSDK1129: The 'Publish' target is not supported without specifying a target framework. The current project targets multiple frameworks, you must specify the framework for the published application." 29 - substituteInPlace Source/DafnyRuntime/DafnyRuntime.csproj \ 30 - --replace TargetFrameworks TargetFramework \ 31 - --replace "netstandard2.0;net452" net6.0 32 - ''; 32 + # Needed to fix 33 + # "error NETSDK1129: The 'Publish' target is not supported without 34 + # specifying a target framework. The current project targets multiple 35 + # frameworks, you must specify the framework for the published 36 + # application." 37 + substituteInPlace Source/DafnyRuntime/DafnyRuntime.csproj \ 38 + --replace TargetFrameworks TargetFramework \ 39 + --replace "netstandard2.0;net452" net6.0 40 + ''; 33 41 34 42 buildInputs = [ jdk11 ]; 35 43 nugetDeps = ./deps.nix;
+2
pkgs/applications/window-managers/sway/default.nix
··· 44 44 # Use /run/current-system/sw/share and /etc instead of /nix/store 45 45 # references: 46 46 ./sway-config-nixos-paths.patch 47 + # Drop ambient capabilities after getting SCHED_RR 48 + ./drop_ambient_capabilities.patch 47 49 ]; 48 50 49 51 strictDeps = true;
+41
pkgs/applications/window-managers/sway/drop_ambient_capabilities.patch
··· 1 + From e7d9098e81289ae99d07ec3eac1fec1d303b8fe4 Mon Sep 17 00:00:00 2001 2 + From: Thiago Kenji Okada <thiagokokada@gmail.com> 3 + Date: Thu, 5 Oct 2023 15:23:35 +0100 4 + Subject: [PATCH] drop ambient capabilities 5 + 6 + Within NixOS the only possibility to gain cap_sys_nice is using the 7 + security.wrapper infrastructure. However to pass the capabilities to the 8 + wrapped program, they are raised to the ambient set. To fix this we make 9 + sure to drop the ambient capabilities during sway startup and realtime 10 + setup. Otherwise all programs started by sway also gain cap_sys_nice, 11 + which is not something we want. 12 + 13 + Co-authored-by: Rouven Czerwinski <rouven@czerwinskis.de> 14 + --- 15 + sway/realtime.c | 3 +++ 16 + 1 file changed, 3 insertions(+) 17 + 18 + diff --git a/sway/realtime.c b/sway/realtime.c 19 + index 11154af0..06f872a8 100644 20 + --- a/sway/realtime.c 21 + +++ b/sway/realtime.c 22 + @@ -3,6 +3,7 @@ 23 + #include <unistd.h> 24 + #include <pthread.h> 25 + #include "sway/server.h" 26 + +#include "sys/prctl.h" 27 + #include "log.h" 28 + 29 + static void child_fork_callback(void) { 30 + @@ -10,6 +11,8 @@ static void child_fork_callback(void) { 31 + 32 + param.sched_priority = 0; 33 + 34 + + prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_CLEAR_ALL, 0, 0, 0); 35 + + 36 + int ret = pthread_setschedparam(pthread_self(), SCHED_OTHER, &param); 37 + if (ret != 0) { 38 + sway_log(SWAY_ERROR, "Failed to reset scheduler policy on fork"); 39 + -- 40 + 2.42.0 41 +
+4
pkgs/by-name/README.md
··· 3 3 The structure of this directory maps almost directly to top-level package attributes. 4 4 This is the recommended way to add new top-level packages to Nixpkgs [when possible](#limitations). 5 5 6 + Packages found in the named-based structure do not need to be explicitly added to the 7 + `top-level/all-packages.nix` file unless they require overriding the default value 8 + of an implicit attribute (see below). 9 + 6 10 ## Example 7 11 8 12 The top-level package `pkgs.some-package` may be declared by setting up this file structure:
+176
pkgs/by-name/co/connman/package.nix
··· 1 + { lib 2 + , stdenv 3 + , fetchurl 4 + , fetchpatch 5 + , autoreconfHook 6 + , dbus 7 + , file 8 + , glib 9 + , gnutls 10 + , iptables 11 + , libmnl 12 + , libnftnl # for nftables 13 + , nixosTests 14 + , openconnect 15 + , openvpn 16 + , pkg-config 17 + , polkit 18 + , ppp 19 + , pptp 20 + , readline 21 + , vpnc 22 + , dnsType ? "internal" # or "systemd-resolved" 23 + , enableBluetooth ? true 24 + , enableClient ? true 25 + , enableDatafiles ? true 26 + , enableDundee ? true 27 + , enableEthernet ? true 28 + , enableGadget ? true 29 + , enableHh2serialGps ? false 30 + , enableIospm ? false 31 + , enableL2tp ? false 32 + , enableLoopback ? true 33 + , enableNeard ? true 34 + , enableNetworkManager ? null 35 + , enableNetworkManagerCompatibility ? 36 + if enableNetworkManager == null 37 + then false 38 + else lib.warn "enableNetworkManager option is deprecated; use enableNetworkManagerCompatibility instead" enableNetworkManager 39 + , enableOfono ? true 40 + , enableOpenconnect ? true 41 + , enableOpenvpn ? true 42 + , enablePacrunner ? true 43 + , enablePolkit ? true 44 + , enablePptp ? true 45 + , enableStats ? true 46 + , enableTist ? false 47 + , enableTools ? true 48 + , enableVpnc ? true 49 + , enableWifi ? true 50 + , enableWireguard ? true 51 + , enableWispr ? true 52 + , firewallType ? "iptables" # or "nftables" 53 + }: 54 + 55 + let 56 + inherit (lib) 57 + enableFeature 58 + enableFeatureAs 59 + optionals 60 + withFeatureAs; 61 + in 62 + assert lib.asserts.assertOneOf "firewallType" firewallType [ "iptables" "nftables" ]; 63 + assert lib.asserts.assertOneOf "dnsType" dnsType [ "internal" "systemd-resolved" ]; 64 + stdenv.mkDerivation (finalAttrs: { 65 + pname = "connman"; 66 + version = "1.42"; 67 + 68 + src = fetchurl { 69 + url = "mirror://kernel/linux/network/connman/connman-${finalAttrs.version}.tar.xz"; 70 + hash = "sha256-o+a65G/Age8una48qk92Sd6JLD3mIsICg6wMqBQjwqo="; 71 + }; 72 + 73 + patches = [ 74 + # simply the middle section of upstream commit a48864a2e5d2a725dfc6eef567108bc13b43857f 75 + # dist tarball is broken, hence this patch as a workaround 76 + ./create-libppp-compat.h.patch 77 + ] ++ optionals stdenv.hostPlatform.isMusl [ 78 + # Fix Musl build by avoiding a Glibc-only API. 79 + (fetchurl { 80 + url = "https://git.alpinelinux.org/aports/plain/community/connman/libresolv.patch?id=e393ea84386878cbde3cccadd36a30396e357d1e"; 81 + hash = "sha256-7Q1bp8rD/gGVYUqnIXqjr9vypR8jlC926p3KYWl9kLw="; 82 + }) 83 + ]; 84 + 85 + nativeBuildInputs = [ 86 + autoreconfHook 87 + file 88 + pkg-config 89 + ]; 90 + 91 + buildInputs = [ 92 + glib 93 + dbus 94 + libmnl 95 + gnutls 96 + readline 97 + ] 98 + ++ optionals (firewallType == "iptables") [ iptables ] 99 + ++ optionals (firewallType == "nftables") [ libnftnl ] 100 + ++ optionals (enableOpenconnect) [ openconnect ] 101 + ++ optionals (enablePolkit) [ polkit ] 102 + ++ optionals (enablePptp) [ pptp ppp ] 103 + ; 104 + 105 + postPatch = '' 106 + sed -i "s@/usr/bin/file@file@g" ./configure 107 + ''; 108 + 109 + configureFlags = [ 110 + # directories flags 111 + "--sysconfdir=/etc" 112 + "--localstatedir=/var" 113 + ] ++ [ 114 + # production build flags 115 + (enableFeature false "maintainer-mode") 116 + (enableFeatureAs true "session-policy-local" "builtin") 117 + # for building and running tests 118 + # (enableFeature true "tests") # installs the tests, we don't want that 119 + (enableFeature true "tools") 120 + (enableFeature enableLoopback "loopback") 121 + (enableFeature enableEthernet "ethernet") 122 + (enableFeature enableWireguard "wireguard") 123 + (enableFeature enableGadget "gadget") 124 + (enableFeature enableWifi "wifi") 125 + # enable IWD support for wifi as it doesn't require any new dependencies and 126 + # it's easier for the NixOS module to use only one connman package when IWD 127 + # is requested 128 + (enableFeature enableWifi "iwd") 129 + (enableFeature enableBluetooth "bluetooth") 130 + (enableFeature enableOfono "ofono") 131 + (enableFeature enableDundee "dundee") 132 + (enableFeature enablePacrunner "pacrunner") 133 + (enableFeature enableNeard "neard") 134 + (enableFeature enableWispr "wispr") 135 + (enableFeature enableTools "tools") 136 + (enableFeature enableStats "stats") 137 + (enableFeature enableClient "client") 138 + (enableFeature enableDatafiles "datafiles") 139 + (enableFeature enablePolkit "polkit") 140 + (enableFeature enablePptp "pptp") 141 + (enableFeature enableWireguard "wireguard") 142 + (enableFeature enableNetworkManagerCompatibility "nmcompat") 143 + (enableFeature enableHh2serialGps "hh2serial-gps") 144 + (enableFeature enableL2tp "l2tp") 145 + (enableFeature enableIospm "iospm") 146 + (enableFeature enableTist "tist") 147 + ] ++ [ 148 + (enableFeatureAs enableOpenconnect "openconnect" "builtin") 149 + (enableFeatureAs enableOpenvpn "openvpn" "builtin") 150 + (enableFeatureAs enableVpnc "vpnc" "builtin") 151 + ] ++ [ 152 + (withFeatureAs true "dbusconfdir" "${placeholder "out"}/share") 153 + (withFeatureAs true "dbusdatadir" "${placeholder "out"}/share") 154 + (withFeatureAs true "tmpfilesdir" "${placeholder "out"}/tmpfiles.d") 155 + (withFeatureAs true "systemdunitdir" "${placeholder "out"}/systemd/system") 156 + (withFeatureAs true "dns-backend" "${dnsType}") 157 + (withFeatureAs true "firewall" "${firewallType}") 158 + (withFeatureAs enableOpenconnect "openconnect" "${openconnect}/sbin/openconnect") 159 + (withFeatureAs enableOpenvpn "openvpn" "${openvpn}/sbin/openvpn") 160 + (withFeatureAs enableVpnc "vpnc" "${vpnc}/sbin/vpnc") 161 + (withFeatureAs enablePptp "pptp" "${pptp}/sbin/pptp") 162 + ]; 163 + 164 + doCheck = true; 165 + 166 + passthru.tests.connman = nixosTests.connman; 167 + 168 + meta = { 169 + description = "A daemon for managing internet connections"; 170 + homepage = "https://git.kernel.org/pub/scm/network/connman/connman.git/about/"; 171 + license = lib.licenses.gpl2Only; 172 + mainProgram = "connmanctl"; 173 + maintainers = with lib.maintainers; [ eclairevoyant AndersonTorres ]; 174 + platforms = lib.platforms.linux; 175 + }; 176 + })
+2 -2
pkgs/development/libraries/cimg/default.nix pkgs/by-name/ci/cimg/package.nix
··· 7 7 8 8 stdenv.mkDerivation (finalAttrs: { 9 9 pname = "cimg"; 10 - version = "3.2.6"; 10 + version = "3.3.1"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "GreycLab"; 14 14 repo = "CImg"; 15 15 rev = "v.${finalAttrs.version}"; 16 - hash = "sha256-HEqjvL16Ca3Al3I6VK50CU6zHFj9Nn/SAXXCfRU4rgo="; 16 + hash = "sha256-Y3UPfBH+Sa1f529J1JXx8Ul0zi3b1mkOvo1tbxBSYRk="; 17 17 }; 18 18 19 19 outputs = [ "out" "doc" ];
+22
pkgs/development/php-packages/meminfo/default.nix
··· 1 + { buildPecl, lib, fetchFromGitHub }: 2 + 3 + buildPecl rec { 4 + version = "unstable-2022-03-25"; 5 + pname = "meminfo"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "BitOne"; 9 + repo = "php-meminfo"; 10 + rev = "0ab7f5aea96c4dafce27c7e215b4907db2a2f493"; 11 + hash = "sha256-MO+B+ZNg6OAnxkOtdA15o+G41XbsG1N1WBz7thMCjck="; 12 + }; 13 + 14 + sourceRoot = "${src.name}/extension"; 15 + 16 + meta = { 17 + description = "PHP extension to get insight about memory usage"; 18 + homepage = "https://github.com/BitOne/php-meminfo"; 19 + license = lib.licenses.mit; 20 + maintainers = with lib.maintainers; [ drupol ]; 21 + }; 22 + }
+18 -13
pkgs/development/python-modules/rnginline/default.nix
··· 1 1 { lib 2 2 , fetchPypi 3 3 , buildPythonPackage 4 + , poetry-core 4 5 , lxml 5 - , docopt 6 - , six 6 + , docopt-ng 7 + , typing-extensions 8 + , importlib-metadata 9 + , importlib-resources 7 10 , pytestCheckHook 8 11 , mock 9 - , fetchpatch 10 12 }: 11 13 12 14 buildPythonPackage rec { ··· 18 20 hash = "sha256-JWqzs+OqOynIAWYVgGrZiuiCqObAgGe6rBt0DcP3U6E="; 19 21 }; 20 22 21 - patches = [ 22 - # Fix failing tests. Should be included in releases after 0.0.2 23 - # https://github.com/h4l/rnginline/issues/3 24 - (fetchpatch { 25 - url = "https://github.com/h4l/rnginline/commit/b1d1c8cda2a17d46627309950f2442021749c07e.patch"; 26 - hash = "sha256-XbisEwun2wPOp7eqW2YDVdayJ4sjAMG/ezFwgoCKe9o="; 27 - name = "fix_tests_failing_collect.patch"; 28 - }) 23 + format = "pyproject"; 24 + 25 + postPatch = '' 26 + substituteInPlace pyproject.toml \ 27 + --replace 'importlib-metadata = "^6.6.0"' 'importlib-metadata = "^6.0.0"' 28 + ''; 29 + 30 + nativeBuildInputs = [ 31 + poetry-core 29 32 ]; 30 33 31 34 propagatedBuildInputs = [ 32 - docopt 35 + docopt-ng 33 36 lxml 34 - six 37 + typing-extensions 38 + importlib-metadata 39 + importlib-resources 35 40 ]; 36 41 37 42 nativeCheckInputs = [
-1
pkgs/os-specific/linux/firmware/fwupd/default.nix
··· 227 227 ] ++ lib.optionals (!enablePassim) [ 228 228 "-Dpassim=disabled" 229 229 ] ++ lib.optionals (!haveDell) [ 230 - "-Dplugin_dell=disabled" 231 230 "-Dplugin_synaptics_mst=disabled" 232 231 ] ++ lib.optionals (!haveRedfish) [ 233 232 "-Dplugin_redfish=disabled"
+44 -17
pkgs/servers/sql/postgresql/default.nix
··· 110 110 locale = "${if stdenv.isDarwin then darwin.adv_cmds else lib.getBin stdenv.cc.libc}/bin/locale"; 111 111 }) 112 112 113 - ] ++ lib.optionals (stdenv'.hostPlatform.isMusl && atLeast "12") [ 114 - (fetchpatch { 115 - url = "https://git.alpinelinux.org/aports/plain/main/postgresql14/icu-collations-hack.patch?id=56999e6d0265ceff5c5239f85fdd33e146f06cb7"; 116 - hash = "sha256-Yb6lMBDqeVP/BLMyIr5rmR6OkaVzo68cV/+cL2LOe/M="; 117 - }) 118 - ] ++ lib.optionals (stdenv'.hostPlatform.isMusl && atLeast "13") [ 119 - (if olderThan "14" then 120 - fetchpatch { 121 - url = "https://git.alpinelinux.org/aports/plain/main/postgresql13/disable-test-collate.icu.utf8.patch?id=69faa146ec9fff3b981511068f17f9e629d4688b"; 122 - hash = "sha256-IOOx7/laDYhTz1Q1r6H1FSZBsHCgD4lHvia+/os7CCo="; 123 - } 124 - else 125 - fetchpatch { 126 - url = "https://git.alpinelinux.org/aports/plain/main/postgresql14/disable-test-collate.icu.utf8.patch?id=56999e6d0265ceff5c5239f85fdd33e146f06cb7"; 127 - hash = "sha256-pnl+wM3/IUyq5iJzk+h278MDA9R0GQXQX8d4wJcB2z4="; 128 - }) 129 - ] ++ lib.optionals stdenv'.isLinux [ 113 + ] ++ lib.optionals stdenv'.hostPlatform.isMusl ( 114 + let 115 + self = { 116 + "12" = { 117 + icu-collations-hack = fetchurl { 118 + url = "https://git.alpinelinux.org/aports/plain/testing/postgresql12/icu-collations-hack.patch?id=d5227c91adda59d4e7f55f13468f0314e8869174"; 119 + hash = "sha256-wuwjvGHArkRNwFo40g3p43W32OrJohretlt6iSRlJKg="; 120 + }; 121 + }; 122 + "13" = { 123 + inherit (self."14") icu-collations-hack; 124 + disable-test-collate-icu-utf8 = fetchurl { 125 + url = "https://git.alpinelinux.org/aports/plain/main/postgresql13/disable-test-collate.icu.utf8.patch?id=69faa146ec9fff3b981511068f17f9e629d4688b"; 126 + hash = "sha256-jS/qxezaiaKhkWeMCXwpz1SDJwUWn9tzN0uKaZ3Ph2Y="; 127 + }; 128 + }; 129 + "14" = { 130 + icu-collations-hack = fetchurl { 131 + url = "https://git.alpinelinux.org/aports/plain/main/postgresql14/icu-collations-hack.patch?id=56999e6d0265ceff5c5239f85fdd33e146f06cb7"; 132 + hash = "sha256-wuwjvGHArkRNwFo40g3p43W32OrJohretlt6iSRlJKg="; 133 + }; 134 + disable-test-collate-icu-utf8 = fetchurl { 135 + url = "https://git.alpinelinux.org/aports/plain/main/postgresql14/disable-test-collate.icu.utf8.patch?id=56999e6d0265ceff5c5239f85fdd33e146f06cb7"; 136 + hash = "sha256-jXe23AxnFjEl+TZQm4R7rStk2Leo08ctxMNmu1xr5zM="; 137 + }; 138 + }; 139 + "15" = { 140 + icu-collations-hack = fetchurl { 141 + url = "https://git.alpinelinux.org/aports/plain/main/postgresql15/icu-collations-hack.patch?id=f424e934e6d076c4ae065ce45e734aa283eecb9c"; 142 + hash = "sha256-HgtmhF4OJYU9macGJbTB9PjQi/yW7c3Akm3U0niWs8I="; 143 + }; 144 + }; 145 + "16" = { 146 + icu-collations-hack = fetchurl { 147 + url = "https://git.alpinelinux.org/aports/plain/main/postgresql16/icu-collations-hack.patch?id=08a24be262339fd093e641860680944c3590238e"; 148 + hash = "sha256-+urQdVIlADLdDPeT68XYv5rljhbK8M/7mPZn/cF+FT0="; 149 + }; 150 + }; 151 + }; 152 + 153 + patchesForVersion = self.${lib.versions.major version} or (throw "no musl patches for postgresql ${version}"); 154 + in 155 + lib.attrValues patchesForVersion 156 + ) ++ lib.optionals stdenv'.isLinux [ 130 157 (if atLeast "13" then ./patches/socketdir-in-run-13.patch else ./patches/socketdir-in-run.patch) 131 158 ]; 132 159
+5 -10
pkgs/servers/varnish/default.nix
··· 51 51 }; 52 52 in 53 53 { 54 - # EOL TBA 54 + # EOL (LTS) TBA 55 55 varnish60 = common { 56 56 version = "6.0.11"; 57 57 hash = "sha256-UVkA2+tH/9MOs5BlyuAzFnmD7Pm9A6lDWic2B+HRKNs="; 58 58 }; 59 - # EOL 2023-09-15 60 - varnish72 = common { 61 - version = "7.2.1"; 62 - hash = "sha256-TZN9FyCo7BnFM/ly2TA6HJiJt7/KdDeJOuXCfPIEqUA="; 63 - }; 64 - # EOL 2024-03-15 65 - varnish73 = common { 66 - version = "7.3.0"; 67 - hash = "sha256-4tu7DsJwqQZHw4aGbm4iaZOu1G5I3nUacruBlzfxSuc="; 59 + # EOL 2024-09-15 60 + varnish74 = common { 61 + version = "7.4.1"; 62 + hash = "sha256-h02Deq9JuPJxjLYLjIx5AOnqEMJk8hjIjNZy1Zb0uJ8="; 68 63 }; 69 64 }
+3 -7
pkgs/servers/varnish/modules.nix
··· 41 41 version = "0.15.1"; 42 42 sha256 = "1lwgjhgr5yw0d17kbqwlaj5pkn70wvaqqjpa1i0n459nx5cf5pqj"; 43 43 }; 44 - modules20 = common { 45 - version = "0.20.0"; 46 - sha256 = "sha256-3eH3qCa24rWqYXsTTDmm/9LjBMxcxUuozuRzZ3e8cUo="; 47 - }; 48 - modules22 = common { 49 - version = "0.22.0"; 50 - sha256 = "sha256-eoa6i6AuOS4pxQKA/lbJnwFc39cRiLqnBSpPM4Oitrc="; 44 + modules23 = common { 45 + version = "0.23.0"; 46 + sha256 = "sha256-Dd1pLMmRC59iRRpReDeQJ8Sv00ojb8InvaMrb+iRv4I="; 51 47 }; 52 48 }
+4 -8
pkgs/servers/varnish/packages.nix
··· 1 - { callPackages, callPackage, varnish60, varnish72, varnish73, fetchFromGitHub }: { 1 + { callPackages, callPackage, varnish60, varnish74, fetchFromGitHub }: { 2 2 varnish60Packages = rec { 3 3 varnish = varnish60; 4 4 modules = (callPackages ./modules.nix { inherit varnish; }).modules15; ··· 13 13 sha256 = "1n94slrm6vn3hpymfkla03gw9603jajclg84bjhwb8kxsk3rxpmk"; 14 14 }; 15 15 }; 16 - varnish72Packages = rec { 17 - varnish = varnish72; 18 - modules = (callPackages ./modules.nix { inherit varnish; }).modules20; 19 - }; 20 - varnish73Packages = rec { 21 - varnish = varnish73; 22 - modules = (callPackages ./modules.nix { inherit varnish; }).modules22; 16 + varnish74Packages = rec { 17 + varnish = varnish74; 18 + modules = (callPackages ./modules.nix { inherit varnish; }).modules23; 23 19 }; 24 20 }
+2 -2
pkgs/servers/web-apps/snipe-it/default.nix
··· 36 36 37 37 in package.override rec { 38 38 pname = "snipe-it"; 39 - version = "6.2.1"; 39 + version = "6.2.2"; 40 40 41 41 src = fetchFromGitHub { 42 42 owner = "snipe"; 43 43 repo = pname; 44 44 rev = "v${version}"; 45 - sha256 = "0kx5j9a2fbj9zy0i9r01z3lsbqlf488kn5b42fjs47nfzk1yznvx"; 45 + sha256 = "11i9ijkl7am5k48y7r5k6nki2827cd7mw3dr1xj8dvb8diwaskqi"; 46 46 }; 47 47 48 48 passthru.tests = nixosTests.snipe-it;
+7 -6
pkgs/tools/admin/lxd/package.json
··· 4 4 "author": "Canonical Webteam", 5 5 "license": "LGPL-3.0-only", 6 6 "scripts": { 7 - "clean": "rm -rf node_modules yarn-error.log *.log build/ .jekyll-metadata .bundle", 7 + "clean": "rm -rf node_modules yarn-error.log *.log build/ .jekyll-metadata .bundle playwright-report test-results haproxy-local.cfg", 8 8 "build-html": "cp build/ui/index.html build/index.html", 9 9 "build": "npx vite build && yarn build-html", 10 10 "format-js-eslint": "eslint 'src/**/*.{json,jsx,tsx,ts}' 'tests/**/*.ts' --fix", ··· 17 17 "hooks-add": "husky install", 18 18 "hooks-remove": "husky uninstall", 19 19 "start": "concurrently --kill-others --raw 'vite | grep -v localhost' 'yarn serve'", 20 - "serve": "./entrypoint" 21 - }, 20 + "serve": "./entrypoint", 21 + "test-js": "react-scripts test src/ --watchAll=false"}, 22 22 "dependencies": { 23 - "@canonical/react-components": "0.42.0", 23 + "@canonical/react-components": "0.47.0", 24 24 "@monaco-editor/react": "^4.4.6", 25 25 "@tanstack/react-query": "^4.14.5", 26 26 "@use-it/event-listener": "^0.1.7", 27 + "axios": "1.3.2", 27 28 "cytoscape": "3.23.0", 28 29 "cytoscape-popper": "2.0.0", 29 30 "formik": "2.2.9", ··· 38 39 "react-scripts": "5.0.1", 39 40 "react-useportal": "^1.0.17", 40 41 "serve": "14.1.2", 41 - "vanilla-framework": "3.15.1", 42 + "vanilla-framework": "4.3.0", 42 43 "xterm-addon-fit": "0.6.0", 43 44 "xterm-for-react": "1.0.4", 44 45 "yup": "0.32.11" ··· 78 79 "sass": "1.57.1", 79 80 "sass-loader": "13.2.0", 80 81 "style-loader": "3.3.1", 81 - "stylelint": "14.16.1", 82 + "stylelint": "15.10.1", 82 83 "stylelint-config-prettier": "9.0.4", 83 84 "stylelint-config-standard-scss": "6.1.0", 84 85 "stylelint-order": "5.0.0",
+4 -4
pkgs/tools/admin/lxd/ui.nix
··· 6 6 7 7 mkYarnPackage rec { 8 8 pname = "lxd-ui"; 9 - version = "unstable-2023-07-03"; 9 + version = "0.2"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "canonical"; 13 13 repo = "lxd-ui"; 14 - rev = "c2e819a027d440cbb1cb9d450aad280dde68e231"; 15 - sha256 = "sha256-lEzGACSv6CpxnfkOcsdPrH6KRKDkoKv63m8Gsodk8uc="; 14 + rev = "refs/tags/${version}"; 15 + sha256 = "sha256-DygWNktangFlAqinBm6wWsRLGmX6yjhmRJ2iU0yjcgk="; 16 16 }; 17 17 18 18 packageJSON = ./package.json; 19 19 offlineCache = fetchYarnDeps { 20 20 yarnLock = "${src}/yarn.lock"; 21 - sha256 = "sha256-SLkgJDb9lwz/ShZh+H4YKAFRc1BdANWI5ndM2O6NzXE="; 21 + sha256 = "sha256-B1SVCViX1LEFoBLMdFk9qaoayku7Y+zU5c4JEJkLmwE="; 22 22 }; 23 23 24 24 buildPhase = ''
+2 -2
pkgs/tools/graphics/gmic-qt/default.nix
··· 55 55 56 56 stdenv.mkDerivation (finalAttrs: { 57 57 pname = "gmic-qt${lib.optionalString (variant != "standalone") "-${variant}"}"; 58 - version = "3.2.6"; 58 + version = "3.3.1"; 59 59 60 60 src = fetchzip { 61 61 url = "https://gmic.eu/files/source/gmic_${finalAttrs.version}.tar.gz"; 62 - hash = "sha256-asB1YftHfdb7JG87WJ+ggyMCu7qb0f+aCanl5LLi9VE="; 62 + hash = "sha256-d9FRNW/MXM9ZJ1xgIZvGTUPDDnHgTJU0DuWyPkzNAmo="; 63 63 }; 64 64 65 65 nativeBuildInputs = [
+2 -2
pkgs/tools/graphics/gmic/default.nix pkgs/by-name/gm/gmic/package.nix
··· 26 26 27 27 stdenv.mkDerivation (finalAttrs: { 28 28 pname = "gmic"; 29 - version = "3.2.6"; 29 + version = "3.3.1"; 30 30 31 31 outputs = [ "out" "lib" "dev" "man" ]; 32 32 ··· 34 34 owner = "GreycLab"; 35 35 repo = "gmic"; 36 36 rev = "v.${finalAttrs.version}"; 37 - hash = "sha256-kaI5rcAz3Cw/xzWgJhMRu/cQwVrvLRAPiB5BhzPMOHY="; 37 + hash = "sha256-HagGabJ1jkg5SkMlr0Y5rGFw64jPW8QLuR0I2idM1N0="; 38 38 }; 39 39 40 40 # TODO: build this from source
+33
pkgs/tools/misc/timidity/configure-compat.patch
··· 1 + --- a/configure 2018-08-28 19:33:39.000000000 -0400 2 + +++ b/configure 2023-09-05 19:44:27.311279263 -0400 3 + @@ -6874,6 +6874,7 @@ 4 + cat >>conftest.$ac_ext <<_ACEOF 5 + /* end confdefs.h. */ 6 + #include <ctype.h> 7 + +#include <stdlib.h> 8 + #if ((' ' & 0x0FF) == 0x020) 9 + # define ISLOWER(c) ('a' <= (c) && (c) <= 'z') 10 + # define TOUPPER(c) (ISLOWER(c) ? 'A' + ((c) - 'a') : (c)) 11 + @@ -7731,6 +7732,7 @@ 12 + cat >>conftest.$ac_ext <<_ACEOF 13 + /* end confdefs.h. */ 14 + #include <ctype.h> 15 + +#include <stdlib.h> 16 + #if ((' ' & 0x0FF) == 0x020) 17 + # define ISLOWER(c) ('a' <= (c) && (c) <= 'z') 18 + # define TOUPPER(c) (ISLOWER(c) ? 'A' + ((c) - 'a') : (c)) 19 + @@ -10311,8 +10313,13 @@ 20 + if test "$cross_compiling" = yes; then 21 + ac_cv_func_fork_works=cross 22 + else 23 + - cat >conftest.$ac_ext <<_ACEOF 24 + + cat >conftest.$ac_ext <<_ACEOF 25 + +/* confdefs.h. */ 26 + +_ACEOF 27 + + cat confdefs.h >>conftest.$ac_ext 28 + + cat >>conftest.$ac_ext <<_ACEOF 29 + /* By Ruediger Kuhlmann. */ 30 + + #include <stdlib.h> 31 + #include <sys/types.h> 32 + #if HAVE_UNISTD_H 33 + # include <unistd.h>
+27 -5
pkgs/tools/misc/timidity/default.nix
··· 1 - { lib, stdenv, fetchurl 2 - , pkg-config, buildPackages 3 - , CoreAudio, alsa-lib, libjack2, ncurses 1 + { lib 2 + , stdenv 3 + , fetchurl 4 + , pkg-config 5 + , memstreamHook 6 + , CoreAudio 7 + , libobjc 8 + , libjack2 9 + , ncurses 10 + , alsa-lib 11 + , buildPackages 4 12 }: 5 13 6 14 stdenv.mkDerivation rec { ··· 12 20 sha256 = "1xf8n6dqzvi6nr2asags12ijbj1lwk1hgl3s27vm2szib8ww07qn"; 13 21 }; 14 22 15 - patches = [ ./timidity-iA-Oj.patch ]; 23 + patches = [ 24 + ./timidity-iA-Oj.patch 25 + # Fixes misdetection of features by clang 16. The configure script itself is patched because 26 + # it is old and does not work nicely with autoreconfHook. 27 + ./configure-compat.patch 28 + ]; 16 29 17 - nativeBuildInputs = [ pkg-config ]; 30 + nativeBuildInputs = [ pkg-config ] 31 + ++ lib.optionals (stdenv.isDarwin && stdenv.isx86_64) [ memstreamHook ]; 18 32 buildInputs = [ 19 33 libjack2 20 34 ncurses ··· 22 36 alsa-lib 23 37 ] ++ lib.optionals stdenv.isDarwin [ 24 38 CoreAudio 39 + libobjc 25 40 ]; 26 41 27 42 configureFlags = [ ··· 36 51 ] ++ lib.optionals stdenv.isDarwin [ 37 52 "--enable-audio=darwin,jack" 38 53 "lib_cv_va_val_copy=no" 54 + "timidity_cv_ccoption_rdynamic=yes" 55 + # These configure tests fail because of incompatible function pointer conversions. 56 + "ac_cv_func_vprintf=yes" 57 + "ac_cv_func_popen=yes" 58 + "ac_cv_func_vsnprintf=yes" 59 + "ac_cv_func_snprintf=yes" 60 + "ac_cv_func_open_memstream=yes" 39 61 ]; 40 62 41 63 makeFlags = [
pkgs/tools/networking/connman/connman-gtk/default.nix pkgs/by-name/co/connman-gtk/package.nix
pkgs/tools/networking/connman/connman-ncurses/default.nix pkgs/by-name/co/connman-ncurses/package.nix
pkgs/tools/networking/connman/connman-notify/default.nix pkgs/by-name/co/connman-notify/package.nix
pkgs/tools/networking/connman/connman/create-libppp-compat.h.patch pkgs/by-name/co/connman/create-libppp-compat.h.patch
-190
pkgs/tools/networking/connman/connman/default.nix
··· 1 - { lib 2 - , nixosTests 3 - , stdenv 4 - , fetchurl 5 - , fetchpatch 6 - , pkg-config 7 - , autoreconfHook 8 - , file 9 - , glib 10 - # always required runtime dependencies 11 - , dbus 12 - , libmnl 13 - , gnutls 14 - , readline 15 - # configurable options 16 - , firewallType ? "iptables" # or "nftables" 17 - , iptables ? null 18 - , libnftnl ? null # for nftables 19 - , dnsType ? "internal" # or "systemd-resolved" 20 - # optional features which are turned *on* by default 21 - , enableOpenconnect ? true 22 - , openconnect ? null 23 - , enableOpenvpn ? true 24 - , openvpn ? null 25 - , enableVpnc ? true 26 - , vpnc ? true 27 - , enablePolkit ? true 28 - , polkit ? null 29 - , enablePptp ? true 30 - , pptp ? null 31 - , ppp ? null 32 - , enableLoopback ? true 33 - , enableEthernet ? true 34 - , enableWireguard ? true 35 - , enableGadget ? true 36 - , enableWifi ? true 37 - , enableBluetooth ? true 38 - , enableOfono ? true 39 - , enableDundee ? true 40 - , enablePacrunner ? true 41 - , enableNeard ? true 42 - , enableWispr ? true 43 - , enableTools ? true 44 - , enableStats ? true 45 - , enableClient ? true 46 - , enableDatafiles ? true 47 - # optional features which are turned *off* by default 48 - , enableNetworkManager ? false 49 - , enableHh2serialGps ? false 50 - , enableL2tp ? false 51 - , enableIospm ? false 52 - , enableTist ? false 53 - }: 54 - 55 - assert lib.asserts.assertOneOf "firewallType" firewallType [ "iptables" "nftables" ]; 56 - assert lib.asserts.assertOneOf "dnsType" dnsType [ "internal" "systemd-resolved" ]; 57 - 58 - let inherit (lib) optionals; in 59 - 60 - stdenv.mkDerivation rec { 61 - pname = "connman"; 62 - version = "1.42"; 63 - src = fetchurl { 64 - url = "mirror://kernel/linux/network/connman/${pname}-${version}.tar.xz"; 65 - hash = "sha256-o+a65G/Age8una48qk92Sd6JLD3mIsICg6wMqBQjwqo="; 66 - }; 67 - 68 - patches = [ 69 - # simply the middle section of upstream commit a48864a2e5d2a725dfc6eef567108bc13b43857f 70 - # dist tarball is broken, hence this patch as a workaround 71 - ./create-libppp-compat.h.patch 72 - ] ++ optionals stdenv.hostPlatform.isMusl [ 73 - # Fix Musl build by avoiding a Glibc-only API. 74 - (fetchurl { 75 - url = "https://git.alpinelinux.org/aports/plain/community/connman/libresolv.patch?id=e393ea84386878cbde3cccadd36a30396e357d1e"; 76 - hash = "sha256-7Q1bp8rD/gGVYUqnIXqjr9vypR8jlC926p3KYWl9kLw="; 77 - }) 78 - ]; 79 - 80 - buildInputs = [ 81 - glib 82 - dbus 83 - libmnl 84 - gnutls 85 - readline 86 - ] ++ optionals (enableOpenconnect) [ openconnect ] 87 - ++ optionals (firewallType == "iptables") [ iptables ] 88 - ++ optionals (firewallType == "nftables") [ libnftnl ] 89 - ++ optionals (enablePolkit) [ polkit ] 90 - ++ optionals (enablePptp) [ pptp ppp ] 91 - ; 92 - 93 - nativeBuildInputs = [ 94 - pkg-config 95 - file 96 - autoreconfHook # as long as we're patching configure.ac 97 - ]; 98 - 99 - # fix invalid path to 'file' 100 - postPatch = '' 101 - sed -i "s/\/usr\/bin\/file/file/g" ./configure 102 - ''; 103 - 104 - configureFlags = [ 105 - # directories flags 106 - "--sysconfdir=/etc" 107 - "--localstatedir=/var" 108 - "--with-dbusconfdir=${placeholder "out"}/share" 109 - "--with-dbusdatadir=${placeholder "out"}/share" 110 - "--with-tmpfilesdir=${placeholder "out"}/lib/tmpfiles.d" 111 - "--with-systemdunitdir=${placeholder "out"}/lib/systemd/system" 112 - "--with-dns-backend=${dnsType}" 113 - "--with-firewall=${firewallType}" 114 - # production build flags 115 - "--disable-maintainer-mode" 116 - "--enable-session-policy-local=builtin" 117 - # for building and running tests 118 - # "--enable-tests" # installs the tests, we don't want that 119 - "--enable-tools" 120 - ] 121 - ++ optionals (!enableLoopback) [ "--disable-loopback" ] 122 - ++ optionals (!enableEthernet) [ "--disable-ethernet" ] 123 - ++ optionals (!enableWireguard) [ "--disable-wireguard" ] 124 - ++ optionals (!enableGadget) [ "--disable-gadget" ] 125 - ++ optionals (!enableWifi) [ "--disable-wifi" ] 126 - # enable IWD support for wifi as it doesn't require any new dependencies 127 - # and it's easier for the NixOS module to use only one connman package when 128 - # IWD is requested 129 - ++ optionals (enableWifi) [ "--enable-iwd" ] 130 - ++ optionals (!enableBluetooth) [ "--disable-bluetooth" ] 131 - ++ optionals (!enableOfono) [ "--disable-ofono" ] 132 - ++ optionals (!enableDundee) [ "--disable-dundee" ] 133 - ++ optionals (!enablePacrunner) [ "--disable-pacrunner" ] 134 - ++ optionals (!enableNeard) [ "--disable-neard" ] 135 - ++ optionals (!enableWispr) [ "--disable-wispr" ] 136 - ++ optionals (!enableTools) [ "--disable-tools" ] 137 - ++ optionals (!enableStats) [ "--disable-stats" ] 138 - ++ optionals (!enableClient) [ "--disable-client" ] 139 - ++ optionals (!enableDatafiles) [ "--disable-datafiles" ] 140 - ++ optionals (enableOpenconnect) [ 141 - "--enable-openconnect=builtin" 142 - "--with-openconnect=${openconnect}/sbin/openconnect" 143 - ] 144 - ++ optionals (enableOpenvpn) [ 145 - "--enable-openvpn=builtin" 146 - "--with-openvpn=${openvpn}/sbin/openvpn" 147 - ] 148 - ++ optionals (enableVpnc) [ 149 - "--enable-vpnc=builtin" 150 - "--with-vpnc=${vpnc}/sbin/vpnc" 151 - ] 152 - ++ optionals (enablePolkit) [ 153 - "--enable-polkit" 154 - ] 155 - ++ optionals (enablePptp) [ 156 - "--enable-pptp" 157 - "--with-pptp=${pptp}/sbin/pptp" 158 - ] 159 - ++ optionals (!enableWireguard) [ 160 - "--disable-wireguard" 161 - ] 162 - ++ optionals (enableNetworkManager) [ 163 - "--enable-nmcompat" 164 - ] 165 - ++ optionals (enableHh2serialGps) [ 166 - "--enable-hh2serial-gps" 167 - ] 168 - ++ optionals (enableL2tp) [ 169 - "--enable-l2tp" 170 - ] 171 - ++ optionals (enableIospm) [ 172 - "--enable-iospm" 173 - ] 174 - ++ optionals (enableTist) [ 175 - "--enable-tist" 176 - ] 177 - ; 178 - 179 - doCheck = true; 180 - 181 - passthru.tests.connman = nixosTests.connman; 182 - 183 - meta = with lib; { 184 - description = "A daemon for managing internet connections"; 185 - homepage = "https://git.kernel.org/pub/scm/network/connman/connman.git/"; 186 - maintainers = with maintainers; [ eclairevoyant ]; 187 - platforms = platforms.linux; 188 - license = licenses.gpl2Only; 189 - }; 190 - }
pkgs/tools/networking/connman/connman_dmenu/default.nix pkgs/by-name/co/connman_dmenu/package.nix
-49
pkgs/tools/networking/connman/default.nix
··· 1 - { lib, pkgs }: 2 - 3 - lib.makeScope pkgs.newScope (self: with self; { 4 - 5 - # All the defaults 6 - connman = callPackage ./connman { }; 7 - 8 - connmanFull = connman.override { 9 - # TODO: Why is this in `connmanFull` and not the default build? See TODO in 10 - # nixos/modules/services/networking/connman.nix (near the assertions) 11 - enableNetworkManager = true; 12 - enableHh2serialGps = true; 13 - enableL2tp = true; 14 - enableIospm = true; 15 - enableTist = true; 16 - }; 17 - 18 - connmanMinimal = connman.override { 19 - enableOpenconnect = false; 20 - enableOpenvpn = false; 21 - enableVpnc = false; 22 - vpnc = false; 23 - enablePolkit = false; 24 - enablePptp = false; 25 - enableLoopback = false; 26 - # enableEthernet = false; # If disabled no ethernet connection can be performed 27 - enableWireguard = false; 28 - enableGadget = false; 29 - # enableWifi = false; # If disabled no WiFi connection can be performed 30 - enableBluetooth = false; 31 - enableOfono = false; 32 - enableDundee = false; 33 - enablePacrunner = false; 34 - enableNeard = false; 35 - enableWispr = false; 36 - enableTools = false; 37 - enableStats = false; 38 - enableClient = false; 39 - # enableDatafiles = false; # If disabled, configuration and data files are not installed 40 - }; 41 - 42 - connman_dmenu = callPackage ./connman_dmenu { }; 43 - 44 - connman-gtk = callPackage ./connman-gtk { }; 45 - 46 - connman-ncurses = callPackage ./connman-ncurses { }; 47 - 48 - connman-notify = callPackage ./connman-notify { }; 49 - })
+2
pkgs/tools/networking/tinyproxy/default.nix
··· 4 4 , fetchpatch 5 5 , autoreconfHook 6 6 , perl 7 + , nixosTests 7 8 , withDebug ? false 8 9 }: 9 10 ··· 30 31 nativeBuildInputs = [ autoreconfHook perl ]; 31 32 32 33 configureFlags = lib.optionals withDebug [ "--enable-debug" ]; # Enable debugging support code and methods. 34 + passthru.tests = { inherit (nixosTests) tinyproxy; }; 33 35 34 36 meta = with lib; { 35 37 homepage = "https://tinyproxy.github.io/";
+2 -2
pkgs/tools/system/stress-ng/default.nix
··· 4 4 5 5 stdenv.mkDerivation rec { 6 6 pname = "stress-ng"; 7 - version = "0.16.04"; 7 + version = "0.17.00"; 8 8 9 9 src = fetchFromGitHub { 10 10 owner = "ColinIanKing"; 11 11 repo = pname; 12 12 rev = "V${version}"; 13 - hash = "sha256-Qr1t+xyl0aS2tSB+DyS7oXOkbcJRaSabS6g/qc8hdWc="; 13 + hash = "sha256-VChEuxNDQfkJyherlInbFEBGf6djp5zRQYaZB7w7A3s="; 14 14 }; 15 15 16 16 postPatch = ''
+14 -12
pkgs/top-level/aliases.nix
··· 133 133 inherit (libsForQt5.mauiPackages) clip; # added 2022-05-17 134 134 cpp-ipfs-api = cpp-ipfs-http-client; # Project has been renamed. Added 2022-05-15 135 135 crispyDoom = crispy-doom; # Added 2023-05-01 136 + clasp = clingo; # added 2022-12-22 137 + claws-mail-gtk3 = claws-mail; # Added 2021-07-10 138 + codimd = hedgedoc; # Added 2020-11-29 139 + inherit (libsForQt5.mauiPackages) communicator; # added 2022-05-17 140 + compton = throw "'compton' has been renamed to/replaced by 'picom'"; # Converted to throw 2023-09-10 141 + concurrencykit = libck; # Added 2021-03 142 + connmanPackages = throw "'connmanPackages' was removed and their subpackages/attributes were promoted to top level."; # Added 2023-10-08 143 + cups-kyodialog3 = cups-kyodialog; # Added 2022-11-12 144 + cvs_fast_export = cvs-fast-export; # Added 2021-06-10 136 145 137 146 # these are for convenience, not for backward compat and shouldn't expire 138 147 clang5Stdenv = lowPrio llvmPackages_5.stdenv; ··· 148 157 clang15Stdenv = lowPrio llvmPackages_15.stdenv; 149 158 clang16Stdenv = lowPrio llvmPackages_16.stdenv; 150 159 151 - clasp = clingo; # added 2022-12-22 152 - claws-mail-gtk3 = claws-mail; # Added 2021-07-10 153 - codimd = hedgedoc; # Added 2020-11-29 154 - inherit (libsForQt5.mauiPackages) communicator; # added 2022-05-17 155 - compton = throw "'compton' has been renamed to/replaced by 'picom'"; # Converted to throw 2023-09-10 156 - concurrencykit = libck; # Added 2021-03 157 - 158 - cups-kyodialog3 = cups-kyodialog; # Added 2022-11-12 159 - cvs_fast_export = cvs-fast-export; # Added 2021-06-10 160 - 161 160 ### D ### 162 161 163 - oroborus = throw "oroborus was removed, because it was abandoned years ago."; #Added 2023-09-10 164 162 dart_stable = dart; # Added 2020-01-15 165 163 dat = nodePackages.dat; 166 164 deadpixi-sam = deadpixi-sam-unstable; ··· 609 607 openssl_3_0 = openssl_3; # Added 2022-06-27 610 608 openvpn_24 = throw "openvpn_24 has been removed, because it went EOL. 2.5.x or newer is still available"; # Added 2023-01-23 611 609 orchis = orchis-theme; # Added 2021-06-09 610 + oroborus = throw "oroborus was removed, because it was abandoned years ago."; #Added 2023-09-10 612 611 osxfuse = macfuse-stubs; # Added 2021-03-20 613 612 614 613 ### P ### 615 - 616 614 617 615 packet-cli = metal-cli; # Added 2021-10-25 618 616 palemoon = throw "palemoon has been dropped due to python2 being EOL and marked insecure. Use 'palemoon-bin' instead"; # Added 2023-05-18 ··· 853 851 vivaldi-widevine = throw "'vivaldi-widevine' has been renamed to/replaced by 'widevine-cdm'"; # Added 2023-02-25 854 852 vkBasalt = vkbasalt; # Added 2022-11-22 855 853 vte_290 = throw "'vte_290' has been renamed to/replaced by 'vte'"; # Added 2023-01-05 854 + varnish72 = throw "varnish 7.2 is EOL. Either use the LTS or upgrade."; # Added 2023-10-09 855 + varnish73 = throw "varnish 7.3 is EOL. Either use the LTS or upgrade."; # Added 2023-10-09 856 + varnish72Packages = throw "varnish 7.2 is EOL. Either use the LTS or upgrade."; # Added 2023-10-09 857 + varnish73Packages = throw "varnish 7.3 is EOL. Either use the LTS or upgrade."; # Added 2023-10-09 856 858 inherit (libsForQt5.mauiPackages) vvave; # added 2022-05-17 857 859 858 860 ### W ###
+36 -18
pkgs/top-level/all-packages.nix
··· 5569 5569 inherit (darwin.apple_sdk.frameworks) Cocoa; 5570 5570 }; 5571 5571 5572 - gmic = callPackage ../tools/graphics/gmic { }; 5573 - 5574 5572 gmic-qt = libsForQt5.callPackage ../tools/graphics/gmic-qt { }; 5575 5573 5576 5574 gpg-tui = callPackage ../tools/security/gpg-tui { ··· 6905 6903 6906 6904 conspy = callPackage ../os-specific/linux/conspy { }; 6907 6905 6908 - connmanPackages = 6909 - recurseIntoAttrs (callPackage ../tools/networking/connman { }); 6910 - inherit (connmanPackages) 6911 - connman 6912 - connmanFull 6913 - connmanMinimal 6914 - connman_dmenu 6915 - connman-gtk 6916 - connman-ncurses 6917 - connman-notify 6918 - ; 6906 + connmanFull = connman.override { 6907 + # TODO: Why is this in `connmanFull` and not the default build? See TODO in 6908 + # nixos/modules/services/networking/connman.nix (near the assertions) 6909 + enableNetworkManagerCompatibility = true; 6910 + enableHh2serialGps = true; 6911 + enableL2tp = true; 6912 + enableIospm = true; 6913 + enableTist = true; 6914 + }; 6915 + 6916 + connmanMinimal = connman.override { 6917 + # enableDatafiles = false; # If disabled, configuration and data files are not installed 6918 + # enableEthernet = false; # If disabled no ethernet connection can be performed 6919 + # enableWifi = false; # If disabled no WiFi connection can be performed 6920 + enableBluetooth = false; 6921 + enableClient = false; 6922 + enableDundee = false; 6923 + enableGadget = false; 6924 + enableLoopback = false; 6925 + enableNeard = false; 6926 + enableOfono = false; 6927 + enableOpenconnect = false; 6928 + enableOpenvpn = false; 6929 + enablePacrunner = false; 6930 + enablePolkit = false; 6931 + enablePptp = false; 6932 + enableStats = false; 6933 + enableTools = false; 6934 + enableVpnc = false; 6935 + enableWireguard = false; 6936 + enableWispr = false; 6937 + }; 6919 6938 6920 6939 convertlit = callPackage ../tools/text/convertlit { }; 6921 6940 ··· 14855 14874 valum = callPackage ../development/web/valum { }; 14856 14875 14857 14876 inherit (callPackages ../servers/varnish { }) 14858 - varnish60 varnish72 varnish73; 14877 + varnish60 varnish74; 14859 14878 inherit (callPackages ../servers/varnish/packages.nix { }) 14860 - varnish60Packages varnish72Packages varnish73Packages; 14879 + varnish60Packages varnish74Packages; 14861 14880 14862 - varnishPackages = varnish72Packages; 14881 + varnishPackages = varnish74Packages; 14863 14882 varnish = varnishPackages.varnish; 14864 14883 14865 14884 hitch = callPackage ../servers/hitch { }; ··· 20974 20993 cdk-go = callPackage ../tools/security/cdk-go { }; 20975 20994 20976 20995 cdo = callPackage ../development/libraries/cdo { }; 20977 - 20978 - cimg = callPackage ../development/libraries/cimg { }; 20979 20996 20980 20997 cista = callPackage ../development/libraries/cista { }; 20981 20998 ··· 36058 36075 36059 36076 timidity = callPackage ../tools/misc/timidity { 36060 36077 inherit (darwin.apple_sdk.frameworks) CoreAudio; 36078 + inherit (darwin) libobjc; 36061 36079 }; 36062 36080 36063 36081 tint2 = callPackage ../applications/misc/tint2 { };
+61
pkgs/top-level/perl-packages.nix
··· 4558 4558 }; 4559 4559 }; 4560 4560 4561 + CPANAudit = buildPerlPackage { 4562 + pname = "CPAN-Audit"; 4563 + version = "20230309.004"; 4564 + src = fetchurl { 4565 + url = "mirror://cpan/authors/id/B/BD/BDFOY/CPAN-Audit-20230309.004.tar.gz"; 4566 + hash = "sha256-RzrvktoYTMY1SqiG8QvwRnjvovHpmxZ/o+nvXOGmS14="; 4567 + }; 4568 + buildInputs = [ CaptureTiny YAMLTiny ]; 4569 + propagatedBuildInputs = [ CPANDistnameInfo IOInteractive JSON ModuleCPANfile ModuleExtractVERSION PerlIOgzip Mojolicious ]; 4570 + meta = { 4571 + homepage = "https://github.com/briandfoy/cpan-audit"; 4572 + description = "Audit CPAN distributions for known vulnerabilities"; 4573 + license = with lib.licenses; [ artistic1 gpl1Plus ]; 4574 + }; 4575 + }; 4576 + 4561 4577 CPANMini = buildPerlPackage { 4562 4578 pname = "CPAN-Mini"; 4563 4579 version = "1.111016"; ··· 15680 15696 }; 15681 15697 }; 15682 15698 15699 + ModuleExtractVERSION = buildPerlPackage { 15700 + pname = "Module-Extract-VERSION"; 15701 + version = "1.116"; 15702 + src = fetchurl { 15703 + url = "mirror://cpan/authors/id/B/BD/BDFOY/Module-Extract-VERSION-1.116.tar.gz"; 15704 + hash = "sha256-QZA6BoUXgoU0X12oVdkluUVO5xCpeV48TDJ7ri9Vdpg="; 15705 + }; 15706 + meta = { 15707 + homepage = "https://github.com/briandfoy/module-extract-version"; 15708 + description = "Extract a module version safely"; 15709 + license = lib.licenses.artistic2; 15710 + }; 15711 + }; 15712 + 15683 15713 ModuleFind = buildPerlPackage { 15684 15714 pname = "Module-Find"; 15685 15715 version = "0.15"; ··· 16102 16132 description = "Globally Recognized Avatars for Mojolicious"; 16103 16133 license = with lib.licenses; [ artistic1 gpl1Plus ]; 16104 16134 maintainers = with maintainers; [ sgo ]; 16135 + }; 16136 + }; 16137 + 16138 + MojoliciousPluginI18N = buildPerlModule { 16139 + pname = "Mojolicious-Plugin-I18N"; 16140 + version = "1.6"; 16141 + src = fetchurl { 16142 + url = "mirror://cpan/authors/id/S/SH/SHARIFULN/Mojolicious-Plugin-I18N-1.6.tar.gz"; 16143 + hash = "sha256-Mvte+AN9lUt+zr71wbKyS0IKvYKXAjEvStQnlPUrUU0="; 16144 + }; 16145 + propagatedBuildInputs = [ Mojolicious ]; 16146 + meta = { 16147 + homepage = "https://github.com/sharifulin/Mojolicious-Plugin-I18N"; 16148 + description = "Internationalization Plugin for Mojolicious"; 16149 + license = with lib.licenses; [ artistic1 gpl1Plus ]; 16105 16150 }; 16106 16151 }; 16107 16152 ··· 28184 28229 buildInputs = [ TestDeep TestWarn ]; 28185 28230 meta = { 28186 28231 description = "YAML 1.2 Processor"; 28232 + license = with lib.licenses; [ artistic1 gpl1Plus ]; 28233 + }; 28234 + }; 28235 + 28236 + Yancy = buildPerlPackage { 28237 + pname = "Yancy"; 28238 + version = "1.088"; 28239 + src = fetchurl { 28240 + url = "mirror://cpan/authors/id/P/PR/PREACTION/Yancy-1.088.tar.gz"; 28241 + hash = "sha256-addqs5ilrGiQc0Paisybr9UZ+0x4WrAU7CagUhA2vSo="; 28242 + }; 28243 + buildInputs = [ FileShareDirInstall ]; 28244 + propagatedBuildInputs = [ ClassMethodModifiers JSONValidator Mojolicious MojoliciousPluginI18N MojoliciousPluginOpenAPI RoleTiny ]; 28245 + meta = { 28246 + homepage = "http://preaction.me/yancy/"; 28247 + description = "The Best Web Framework Deserves the Best CMS"; 28187 28248 license = with lib.licenses; [ artistic1 gpl1Plus ]; 28188 28249 }; 28189 28250 };
+2
pkgs/top-level/php-packages.nix
··· 264 264 265 265 memcached = callPackage ../development/php-packages/memcached { }; 266 266 267 + meminfo = callPackage ../development/php-packages/meminfo { }; 268 + 267 269 mongodb = callPackage ../development/php-packages/mongodb { 268 270 inherit (pkgs) darwin; 269 271 };