Merge master into staging-next

authored by

github-actions[bot] and committed by
GitHub
728f30ca b2488e1c

+146 -54
+2 -2
nixos/modules/misc/ids.nix
··· 46 46 messagebus = 4; # D-Bus 47 47 haldaemon = 5; 48 48 #disk = 6; # unused 49 - vsftpd = 7; 49 + #vsftpd = 7; # dynamically allocated ass of 2021-09-14 50 50 ftp = 8; 51 51 bitlbee = 9; 52 52 #avahi = 10; # removed 2019-05-22 ··· 366 366 messagebus = 4; # D-Bus 367 367 haldaemon = 5; 368 368 disk = 6; 369 - vsftpd = 7; 369 + #vsftpd = 7; # dynamically allocated as of 2021-09-14 370 370 ftp = 8; 371 371 bitlbee = 9; 372 372 #avahi = 10; # removed 2019-05-22
+3 -1
nixos/modules/services/networking/vsftpd.nix
··· 282 282 283 283 users.users = { 284 284 "vsftpd" = { 285 - uid = config.ids.uids.vsftpd; 285 + group = "vsftpd"; 286 + isSystemUser = true; 286 287 description = "VSFTPD user"; 287 288 home = if cfg.localRoot != null 288 289 then cfg.localRoot # <= Necessary for virtual users. ··· 297 298 }; 298 299 }; 299 300 301 + users.groups.vsftpd = {}; 300 302 users.groups.ftp.gid = config.ids.gids.ftp; 301 303 302 304 # If you really have to access root via FTP use mkOverride or userlistDeny
+1
nixos/modules/system/boot/systemd.nix
··· 1060 1060 uid = config.ids.uids.systemd-coredump; 1061 1061 group = "systemd-coredump"; 1062 1062 }; 1063 + users.groups.systemd-coredump = {}; 1063 1064 users.users.systemd-network = { 1064 1065 uid = config.ids.uids.systemd-network; 1065 1066 group = "systemd-network";
+4 -4
pkgs/applications/blockchains/bitcoin/default.nix
··· 24 24 25 25 with lib; 26 26 let 27 - version = "0.21.1"; 28 - majorMinorVersion = versions.majorMinor version; 27 + version = "22.0"; 28 + majorVersion = versions.major version; 29 29 desktop = fetchurl { 30 - url = "https://raw.githubusercontent.com/bitcoin-core/packaging/${majorMinorVersion}/debian/bitcoin-qt.desktop"; 30 + url = "https://raw.githubusercontent.com/bitcoin-core/packaging/${majorVersion}.x/debian/bitcoin-qt.desktop"; 31 31 sha256 = "0cpna0nxcd1dw3nnzli36nf9zj28d2g9jf5y0zl9j18lvanvniha"; 32 32 }; 33 33 in ··· 40 40 "https://bitcoincore.org/bin/bitcoin-core-${version}/bitcoin-${version}.tar.gz" 41 41 "https://bitcoin.org/bin/bitcoin-core-${version}/bitcoin-${version}.tar.gz" 42 42 ]; 43 - sha256 = "caff23449220cf45753f312cefede53a9eac64000bb300797916526236b6a1e0"; 43 + sha256 = "d0e9d089b57048b1555efa7cd5a63a7ed042482045f6f33402b1df425bf9613b"; 44 44 }; 45 45 46 46 nativeBuildInputs =
+2
pkgs/applications/graphics/freecad/default.nix
··· 15 15 , libGLU 16 16 , libXmu 17 17 , libf2c 18 + , libredwg 18 19 , libspnav 19 20 , matplotlib 20 21 , medfile ··· 131 132 132 133 qtWrapperArgs = [ 133 134 "--set COIN_GL_NO_CURRENT_CONTEXT_CHECK 1" 135 + "--prefix PATH : ${libredwg}/bin" 134 136 ]; 135 137 136 138 postFixup = ''
+2 -2
pkgs/applications/misc/mob/default.nix
··· 2 2 3 3 buildGoPackage rec { 4 4 pname = "mob"; 5 - version = "1.10.0"; 5 + version = "1.12.0"; 6 6 goPackagePath = "github.com/remotemobprogramming/mob"; 7 7 8 8 src = fetchFromGitHub { 9 9 rev = "v${version}"; 10 10 owner = "remotemobprogramming"; 11 11 repo = pname; 12 - sha256 = "sha256-O732PNmE+RDmETHAX/vlaSF4ZUShmO7P1B41kCw+/cQ="; 12 + sha256 = "sha256-5hvuaKlaWrB8nEeHytnn4ywciLbOSoXdBdc3K/PqMG8="; 13 13 }; 14 14 15 15 meta = with lib; {
+6 -6
pkgs/applications/networking/browsers/chromium/upstream-info.json
··· 1 1 { 2 2 "stable": { 3 - "version": "93.0.4577.63", 4 - "sha256": "0ls8r77la6p7474j84wchvs4rvnxwfv7c8xvbxjm8h7jqak4zwza", 5 - "sha256bin64": "1kv742arnv710mhakm2v59dwfypg7j01k7rd5if8h0s49yzdw3qc", 3 + "version": "93.0.4577.82", 4 + "sha256": "0lr8zdq06smncdzd6knzww9hxl8ynvxadmrkyyl13fpwb1422rjx", 5 + "sha256bin64": "0ydvcakpnl20gx7493hv6aqnyf8f28rkvzgwnm4gws92b92n9ify", 6 6 "deps": { 7 7 "gn": { 8 8 "version": "2021-07-08", ··· 12 12 } 13 13 }, 14 14 "chromedriver": { 15 - "version": "93.0.4577.15", 16 - "sha256_linux": "11wcimkcgaiz740k9xibi5hq1kd4zgy1vk6bd6cp31wjw4y21x5f", 17 - "sha256_darwin": "0cxf3cg5pg9rigq7wmbap6wvmgpdr6v44bndisyaqhlw7s2hhndn" 15 + "version": "93.0.4577.63", 16 + "sha256_linux": "0w2lyjj0y9g1wnvk1sg2wi9dvhbjhdz1jb20rlrp5ny2gak6a47b", 17 + "sha256_darwin": "11420nflyfvf95hxj488336jq6xqjn4lcrwpr67rj2fx6ganji7z" 18 18 } 19 19 }, 20 20 "beta": {
+2 -2
pkgs/applications/networking/cluster/bosh-cli/default.nix
··· 8 8 buildGoModule rec { 9 9 pname = "bosh-cli"; 10 10 11 - version = "6.4.5"; 11 + version = "6.4.6"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "cloudfoundry"; 15 15 repo = pname; 16 16 rev = "v${version}"; 17 - sha256 = "sha256-/1JRje7SNrIsb3V1tq5ZW5zsURaQUzM/Jp3TMR0MfKw="; 17 + sha256 = "sha256-MNM8gyi7L00OSf2EIEQFAlH7oMrcZSubf6tWcgJJMeQ="; 18 18 }; 19 19 vendorSha256 = null; 20 20
+71 -24
pkgs/build-support/setup-hooks/auto-patchelf.sh
··· 38 38 declare -Ag autoPatchelfCachedDepsAssoc 39 39 declare -ag autoPatchelfCachedDeps 40 40 41 - 42 41 addToDepCache() { 43 42 if [[ ${autoPatchelfCachedDepsAssoc[$1]+f} ]]; then return; fi 44 43 ··· 54 53 declare -gi doneRecursiveSearch=0 55 54 declare -g foundDependency 56 55 57 - getDepsFromSo() { 58 - ldd "$1" 2> /dev/null | sed -n -e 's/[^=]*=> *\(.\+\) \+([^)]*)$/\1/p' 56 + getDepsFromElfBinary() { 57 + # NOTE: This does not use runPatchelf because it may encounter non-ELF 58 + # files. Caller is expected to check the return code if needed. 59 + patchelf --print-needed "$1" 2> /dev/null 59 60 } 60 61 61 - populateCacheWithRecursiveDeps() { 62 - local so found foundso 63 - for so in "${autoPatchelfCachedDeps[@]}"; do 64 - for found in $(getDepsFromSo "$so"); do 65 - local base="${found##*/}" 66 - local soname="${base%.so*}" 67 - for foundso in "${found%/*}/$soname".so*; do 62 + getRpathFromElfBinary() { 63 + # NOTE: This does not use runPatchelf because it may encounter non-ELF 64 + # files. Caller is expected to check the return code if needed. 65 + local rpath 66 + rpath="$(patchelf --print-rpath "$1" 2> /dev/null)" || return $? 67 + 68 + local IFS=':' 69 + printf "%s\n" $rpath 70 + } 71 + 72 + populateCacheForDep() { 73 + local so="$1" 74 + local rpath found 75 + rpath="$(getRpathFromElfBinary "$so")" || return 1 76 + 77 + for found in $(getDepsFromElfBinary "$so"); do 78 + local rpathElem 79 + for rpathElem in $rpath; do 80 + # Ignore empty element or $ORIGIN magic variable which should be 81 + # deterministically resolved by adding this package's library 82 + # files early anyway. 83 + # 84 + # shellcheck disable=SC2016 85 + # (Expressions don't expand in single quotes, use double quotes for 86 + # that.) 87 + if [[ -z "$rpathElem" || "$rpathElem" == *'$ORIGIN'* ]]; then 88 + continue 89 + fi 90 + 91 + local soname="${found%.so*}" 92 + local foundso= 93 + for foundso in "$rpathElem/$soname".so*; do 68 94 addToDepCache "$foundso" 69 95 done 96 + 97 + # Found in this element of the rpath, no need to check others. 98 + if [ -n "$foundso" ]; then 99 + break 100 + fi 70 101 done 71 102 done 103 + 104 + # Not found in any rpath element. 105 + return 1 106 + } 107 + 108 + populateCacheWithRecursiveDeps() { 109 + # Dependencies may add more to the end of this array, so we use a counter 110 + # with while instead of a regular for loop here. 111 + local -i i=0 112 + while [ $i -lt ${#autoPatchelfCachedDeps[@]} ]; do 113 + populateCacheForDep "${autoPatchelfCachedDeps[$i]}" 114 + i=$i+1 115 + done 72 116 } 73 117 74 118 getSoArch() { 75 - objdump -f "$1" | sed -ne 's/^architecture: *\([^,]\+\).*/\1/p' 119 + $OBJDUMP -f "$1" | sed -ne 's/^architecture: *\([^,]\+\).*/\1/p' 76 120 } 77 121 78 122 # NOTE: If you want to use this function outside of the autoPatchelf function, ··· 130 174 fi 131 175 fi 132 176 177 + local libcLib 178 + libcLib="$(< "$NIX_CC/nix-support/orig-libc")/lib" 179 + 133 180 echo "searching for dependencies of $toPatch" >&2 134 181 135 - # We're going to find all dependencies based on ldd output, so we need to 136 - # clear the RPATH first. 137 - runPatchelf --remove-rpath "$toPatch" 138 - 139 - # If the file is not a dynamic executable, ldd/sed will fail, 140 - # in which case we return, since there is nothing left to do. 141 182 local missing 142 - missing="$( 143 - ldd "$toPatch" 2> /dev/null | \ 144 - sed -n -e 's/^[\t ]*\([^ ]\+\) => not found.*/\1/p' 145 - )" || return 0 183 + missing="$(getDepsFromElfBinary "$toPatch")" || return 0 146 184 147 185 # This ensures that we get the output of all missing dependencies instead 148 186 # of failing at the first one, because it's more useful when working on a 149 187 # new package where you don't yet know its dependencies. 150 188 151 189 for dep in $missing; do 190 + # Check whether this library exists in libc. If so, we don't need to do 191 + # any futher searching -- it will be resolved correctly by the linker. 192 + if [ -f "$libcLib/$dep" ]; then 193 + continue 194 + fi 195 + 152 196 echo -n " $dep -> " >&2 153 197 if findDependency "$dep" "$(getSoArch "$toPatch")"; then 154 198 rpath="$rpath${rpath:+:}${foundDependency%/*}" ··· 185 229 done 186 230 187 231 while IFS= read -r -d '' file; do 188 - addToDepCache "$file" 232 + addToDepCache "$file" 189 233 done < <(find "$@" "${findOpts[@]}" \! -type d \ 190 234 \( -name '*.so' -o -name '*.so.*' \) -print0) 191 235 } ··· 221 265 segmentHeaders="$(LANG=C $READELF -l "$file")" 222 266 # Skip if the ELF file doesn't have segment headers (eg. object files). 223 267 # not using grep -q, because it can cause Broken pipe 224 - [ -n "$(echo "$segmentHeaders" | grep '^Program Headers:')" ] || continue 268 + grep -q '^Program Headers:' <<<"$segmentHeaders" || continue 225 269 if isExecutable "$file"; then 226 270 # Skip if the executable is statically linked. 227 - [ -n "$(echo "$segmentHeaders" | grep "^ *INTERP\\>")" ] || continue 271 + grep -q "^ *INTERP\\>" <<<"$segmentHeaders" || continue 228 272 fi 229 273 # Jump file if patchelf is unable to parse it 230 274 # Some programs contain binary blobs for testing, ··· 256 300 # So what we do here is basically run in postFixup and emulate the same 257 301 # behaviour as fixupOutputHooks because the setup hook for patchelf is run in 258 302 # fixupOutput and the postFixup hook runs later. 303 + # 304 + # shellcheck disable=SC2016 305 + # (Expressions don't expand in single quotes, use double quotes for that.) 259 306 postFixupHooks+=(' 260 307 if [ -z "${dontAutoPatchelf-}" ]; then 261 308 autoPatchelf -- $(for output in $outputs; do
+2 -2
pkgs/development/libraries/libadwaita/default.nix
··· 18 18 19 19 stdenv.mkDerivation rec { 20 20 pname = "libadwaita"; 21 - version = "1.0.0-alpha.1"; 21 + version = "1.0.0-alpha.2"; 22 22 23 23 outputs = [ "out" "dev" "devdoc" ]; 24 24 outputBin = "devdoc"; # demo app ··· 28 28 owner = "GNOME"; 29 29 repo = "libadwaita"; 30 30 rev = version; 31 - sha256 = "1v52md62kaqykv8b6kxxbxwnbdzlda4ir7n5wh2iizadcailyw7p"; 31 + sha256 = "1yvjdzs5ipmr4gi0l4k6dkqhl9b090kpjc3ll8bv1a6i7yfaf53s"; 32 32 }; 33 33 34 34 nativeBuildInputs = [
+2 -2
pkgs/development/libraries/libatomic_ops/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "libatomic_ops"; 5 - version = "7.6.10"; 5 + version = "7.6.12"; 6 6 7 7 src = fetchurl { 8 8 urls = [ 9 9 "http://www.ivmaisoft.com/_bin/atomic_ops/libatomic_ops-${version}.tar.gz" 10 10 "https://github.com/ivmai/libatomic_ops/releases/download/v${version}/libatomic_ops-${version}.tar.gz" 11 11 ]; 12 - sha256 = "1bwry043f62pc4mgdd37zx3fif19qyrs8f5bw7qxlmkzh5hdyzjq"; 12 + sha256 = "sha256-8KtWbiX84ItWDh/qtqPbAdtKOOW8aHgEM07zkgxUnz4="; 13 13 }; 14 14 15 15 outputs = [ "out" "dev" "doc" ];
+2 -2
pkgs/development/python-modules/pyupgrade/default.nix
··· 8 8 9 9 buildPythonPackage rec { 10 10 pname = "pyupgrade"; 11 - version = "2.25.0"; 11 + version = "2.25.1"; 12 12 disabled = pythonOlder "3.6"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "asottile"; 16 16 repo = pname; 17 17 rev = "v${version}"; 18 - sha256 = "0mbx5gv6ns896mxzml8q9r9dn5wvnrb7gc5iw49fdwbb0yw9yhyx"; 18 + sha256 = "sha256-4k4973sNCqE2JbyT901HAijlyymFAR4hJp7NavqlzCQ="; 19 19 }; 20 20 21 21 checkInputs = [ pytestCheckHook ];
+2 -2
pkgs/development/tools/open-policy-agent/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "open-policy-agent"; 5 - version = "0.31.0"; 5 + version = "0.32.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "open-policy-agent"; 9 9 repo = "opa"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-SUMTyqzeaCTj/fVdDHFZkh43t+mIFGNt6wendOt9gfw="; 11 + sha256 = "sha256-RCB9PSUvfIqDAuZFw8HAF35ZhWwTiS+dAHgwlLPwc9I="; 12 12 }; 13 13 vendorSha256 = null; 14 14
+3 -3
pkgs/development/tools/operator-sdk/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "operator-sdk"; 5 - version = "1.11.0"; 5 + version = "1.12.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "operator-framework"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-5eW2yrlUI0B5YNi9BtDjPsTC2vwavEXAMppa5rv5xhE="; 11 + sha256 = "sha256-+AWkzv6SI/d3p1ljopSyLg2qi1hv6PsynmVG7+lUSTw="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-gATpYjGKxOfXUnfSZ5uXrVbIydiEbijYR2axPluE5YU="; 14 + vendorSha256 = "sha256-jYBkC0IA2xbRa+56CW/5EWG8sYg3eRuFdLpOFSinuuw="; 15 15 16 16 doCheck = false; 17 17
+3 -2
pkgs/development/tools/parsing/tree-sitter/default.nix
··· 90 90 in 91 91 { 92 92 name = 93 - (lib.strings.removePrefix "tree-sitter-" 94 - (lib.strings.removeSuffix "-grammar" name)) 93 + (lib.strings.replaceStrings ["-"] ["_"] 94 + (lib.strings.removePrefix "tree-sitter-" 95 + (lib.strings.removeSuffix "-grammar" name))) 95 96 + stdenv.hostPlatform.extensions.sharedLibrary; 96 97 path = "${drv}/parser"; 97 98 }
+37
pkgs/tools/misc/profetch/default.nix
··· 1 + { stdenv, lib, fetchFromGitHub, gprolog }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "profetch"; 5 + version = "0.1.6"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "RustemB"; 9 + repo = pname; 10 + rev = "v${version}"; 11 + sha256 = "1clh3l50wz6mlrw9kx0wh2bbhnz6bsksyh4ngz7givv4y3g9m702"; 12 + }; 13 + 14 + nativeBuildInputs = [ gprolog ]; 15 + 16 + buildPhase = '' 17 + runHook preBuild 18 + gplc profetch.pl --no-top-level --no-debugger \ 19 + --no-fd-lib --no-fd-lib-warn \ 20 + --min-size -o profetch 21 + runHook postBuild 22 + ''; 23 + 24 + installPhase = '' 25 + runHook preInstall 26 + install -Dm755 -t $out/bin profetch 27 + runHook postInstall 28 + ''; 29 + 30 + meta = with lib; { 31 + description = "System Information Fetcher Written in GNU/Prolog"; 32 + homepage = "https://github.com/RustemB/profetch"; 33 + license = licenses.gpl3Only; 34 + platforms = platforms.all; 35 + maintainers = [ maintainers.vel ]; 36 + }; 37 + }
+2
pkgs/top-level/all-packages.nix
··· 3303 3303 inherit (darwin) libiconv; 3304 3304 }; 3305 3305 3306 + profetch = callPackage ../tools/misc/profetch { }; 3307 + 3306 3308 psrecord = python3Packages.callPackage ../tools/misc/psrecord {}; 3307 3309 3308 3310 reg = callPackage ../tools/virtualization/reg { };