Merge pull request #116335 from SuperSandro2000/move-aliases.nix

authored by

Sandro and committed by
GitHub
7c932296 7ffdeb35

+1074 -515
+1 -1
nixos/modules/programs/mininet.nix
··· 8 8 cfg = config.programs.mininet; 9 9 10 10 generatedPath = with pkgs; makeSearchPath "bin" [ 11 - iperf ethtool iproute socat 11 + iperf ethtool iproute2 socat 12 12 ]; 13 13 14 14 pyEnv = pkgs.python.withPackages(ps: [ ps.mininet-python ]);
+1 -1
nixos/modules/services/misc/mame.nix
··· 53 53 description = "MAME TUN/TAP Ethernet interface"; 54 54 after = [ "network.target" ]; 55 55 wantedBy = [ "multi-user.target" ]; 56 - path = [ pkgs.iproute ]; 56 + path = [ pkgs.iproute2 ]; 57 57 serviceConfig = { 58 58 Type = "oneshot"; 59 59 RemainAfterExit = true;
+2 -2
nixos/modules/services/monitoring/datadog-agent.nix
··· 225 225 }; 226 226 }; 227 227 config = mkIf cfg.enable { 228 - environment.systemPackages = [ datadogPkg pkgs.sysstat pkgs.procps pkgs.iproute ]; 228 + environment.systemPackages = [ datadogPkg pkgs.sysstat pkgs.procps pkgs.iproute2 ]; 229 229 230 230 users.users.datadog = { 231 231 description = "Datadog Agent User"; ··· 239 239 240 240 systemd.services = let 241 241 makeService = attrs: recursiveUpdate { 242 - path = [ datadogPkg pkgs.python pkgs.sysstat pkgs.procps pkgs.iproute ]; 242 + path = [ datadogPkg pkgs.python pkgs.sysstat pkgs.procps pkgs.iproute2 ]; 243 243 wantedBy = [ "multi-user.target" ]; 244 244 serviceConfig = { 245 245 User = "datadog";
+1 -1
nixos/modules/services/monitoring/scollector.nix
··· 113 113 description = "scollector metrics collector (part of Bosun)"; 114 114 wantedBy = [ "multi-user.target" ]; 115 115 116 - path = [ pkgs.coreutils pkgs.iproute ]; 116 + path = [ pkgs.coreutils pkgs.iproute2 ]; 117 117 118 118 serviceConfig = { 119 119 User = cfg.user;
+1 -1
nixos/modules/services/networking/consul.nix
··· 191 191 ExecStop = "${cfg.package}/bin/consul leave"; 192 192 }); 193 193 194 - path = with pkgs; [ iproute gnugrep gawk consul ]; 194 + path = with pkgs; [ iproute2 gnugrep gawk consul ]; 195 195 preStart = '' 196 196 mkdir -m 0700 -p ${dataDir} 197 197 chown -R consul ${dataDir}
+1 -1
nixos/modules/services/networking/ircd-hybrid/default.nix
··· 10 10 name = "ircd-hybrid-service"; 11 11 scripts = [ "=>/bin" ./control.in ]; 12 12 substFiles = [ "=>/conf" ./ircd.conf ]; 13 - inherit (pkgs) ircdHybrid coreutils su iproute gnugrep procps; 13 + inherit (pkgs) ircdHybrid coreutils su iproute2 gnugrep procps; 14 14 15 15 ipv6Enabled = boolToString config.networking.enableIPv6; 16 16
+1 -1
nixos/modules/services/networking/libreswan.nix
··· 85 85 86 86 config = mkIf cfg.enable { 87 87 88 - environment.systemPackages = [ pkgs.libreswan pkgs.iproute ]; 88 + environment.systemPackages = [ pkgs.libreswan pkgs.iproute2 ]; 89 89 90 90 systemd.services.ipsec = { 91 91 description = "Internet Key Exchange (IKE) Protocol Daemon for IPsec";
+1 -1
nixos/modules/services/networking/networkmanager.nix
··· 465 465 restartTriggers = [ configFile overrideNameserversScript ]; 466 466 467 467 # useful binaries for user-specified hooks 468 - path = [ pkgs.iproute pkgs.util-linux pkgs.coreutils ]; 468 + path = [ pkgs.iproute2 pkgs.util-linux pkgs.coreutils ]; 469 469 aliases = [ "dbus-org.freedesktop.nm-dispatcher.service" ]; 470 470 }; 471 471
+1 -1
nixos/modules/services/networking/openvpn.nix
··· 63 63 wantedBy = optional cfg.autoStart "multi-user.target"; 64 64 after = [ "network.target" ]; 65 65 66 - path = [ pkgs.iptables pkgs.iproute pkgs.nettools ]; 66 + path = [ pkgs.iptables pkgs.iproute2 pkgs.nettools ]; 67 67 68 68 serviceConfig.ExecStart = "@${openvpn}/sbin/openvpn openvpn --suppress-timestamps --config ${configFile}"; 69 69 serviceConfig.Restart = "always";
+1 -1
nixos/modules/services/networking/sslh.nix
··· 132 132 { table = "mangle"; command = "OUTPUT ! -o lo -p tcp -m connmark --mark 0x02/0x0f -j CONNMARK --restore-mark --mask 0x0f"; } 133 133 ]; 134 134 in { 135 - path = [ pkgs.iptables pkgs.iproute pkgs.procps ]; 135 + path = [ pkgs.iptables pkgs.iproute2 pkgs.procps ]; 136 136 137 137 preStart = '' 138 138 # Cleanup old iptables entries which might be still there
+1 -1
nixos/modules/services/networking/strongswan-swanctl/module.nix
··· 63 63 description = "strongSwan IPsec IKEv1/IKEv2 daemon using swanctl"; 64 64 wantedBy = [ "multi-user.target" ]; 65 65 after = [ "network-online.target" ]; 66 - path = with pkgs; [ kmod iproute iptables util-linux ]; 66 + path = with pkgs; [ kmod iproute2 iptables util-linux ]; 67 67 environment = { 68 68 STRONGSWAN_CONF = pkgs.writeTextFile { 69 69 name = "strongswan.conf";
+1 -1
nixos/modules/services/networking/strongswan.nix
··· 152 152 systemd.services.strongswan = { 153 153 description = "strongSwan IPSec Service"; 154 154 wantedBy = [ "multi-user.target" ]; 155 - path = with pkgs; [ kmod iproute iptables util-linux ]; # XXX Linux 155 + path = with pkgs; [ kmod iproute2 iptables util-linux ]; # XXX Linux 156 156 after = [ "network-online.target" ]; 157 157 environment = { 158 158 STRONGSWAN_CONF = strongswanConf { inherit setup connections ca secretsFile managePlugins enabledPlugins; };
+3 -3
nixos/modules/services/networking/wireguard.nix
··· 63 63 64 64 preSetup = mkOption { 65 65 example = literalExample '' 66 - ${pkgs.iproute}/bin/ip netns add foo 66 + ${pkgs.iproute2}/bin/ip netns add foo 67 67 ''; 68 68 default = ""; 69 69 type = with types; coercedTo (listOf str) (concatStringsSep "\n") lines; ··· 278 278 wantedBy = [ "multi-user.target" "wireguard-${interfaceName}.service" ]; 279 279 environment.DEVICE = interfaceName; 280 280 environment.WG_ENDPOINT_RESOLUTION_RETRIES = "infinity"; 281 - path = with pkgs; [ iproute wireguard-tools ]; 281 + path = with pkgs; [ iproute2 wireguard-tools ]; 282 282 283 283 serviceConfig = { 284 284 Type = "oneshot"; ··· 333 333 after = [ "network.target" "network-online.target" ]; 334 334 wantedBy = [ "multi-user.target" ]; 335 335 environment.DEVICE = name; 336 - path = with pkgs; [ kmod iproute wireguard-tools ]; 336 + path = with pkgs; [ kmod iproute2 wireguard-tools ]; 337 337 338 338 serviceConfig = { 339 339 Type = "oneshot";
+1 -1
nixos/modules/services/security/fail2ban.nix
··· 243 243 restartTriggers = [ fail2banConf jailConf pathsConf ]; 244 244 reloadIfChanged = true; 245 245 246 - path = [ cfg.package cfg.packageFirewall pkgs.iproute ]; 246 + path = [ cfg.package cfg.packageFirewall pkgs.iproute2 ]; 247 247 248 248 unitConfig.Documentation = "man:fail2ban(1)"; 249 249
+2 -2
nixos/modules/services/security/sshguard.nix
··· 108 108 partOf = optional config.networking.firewall.enable "firewall.service"; 109 109 110 110 path = with pkgs; if config.networking.nftables.enable 111 - then [ nftables iproute systemd ] 112 - else [ iptables ipset iproute systemd ]; 111 + then [ nftables iproute2 systemd ] 112 + else [ iptables ipset iproute2 systemd ]; 113 113 114 114 # The sshguard ipsets must exist before we invoke 115 115 # iptables. sshguard creates the ipsets after startup if
+9 -9
nixos/modules/tasks/network-interfaces-scripted.nix
··· 101 101 102 102 unitConfig.ConditionCapability = "CAP_NET_ADMIN"; 103 103 104 - path = [ pkgs.iproute ]; 104 + path = [ pkgs.iproute2 ]; 105 105 106 106 serviceConfig = { 107 107 Type = "oneshot"; ··· 185 185 # Restart rather than stop+start this unit to prevent the 186 186 # network from dying during switch-to-configuration. 187 187 stopIfChanged = false; 188 - path = [ pkgs.iproute ]; 188 + path = [ pkgs.iproute2 ]; 189 189 script = 190 190 '' 191 191 state="/run/nixos/network/addresses/${i.name}" ··· 258 258 wantedBy = [ "network-setup.service" (subsystemDevice i.name) ]; 259 259 partOf = [ "network-setup.service" ]; 260 260 before = [ "network-setup.service" ]; 261 - path = [ pkgs.iproute ]; 261 + path = [ pkgs.iproute2 ]; 262 262 serviceConfig = { 263 263 Type = "oneshot"; 264 264 RemainAfterExit = true; ··· 284 284 before = [ "network-setup.service" ]; 285 285 serviceConfig.Type = "oneshot"; 286 286 serviceConfig.RemainAfterExit = true; 287 - path = [ pkgs.iproute ]; 287 + path = [ pkgs.iproute2 ]; 288 288 script = '' 289 289 # Remove Dead Interfaces 290 290 echo "Removing old bridge ${n}..." ··· 372 372 wants = deps; # if one or more interface fails, the switch should continue to run 373 373 serviceConfig.Type = "oneshot"; 374 374 serviceConfig.RemainAfterExit = true; 375 - path = [ pkgs.iproute config.virtualisation.vswitch.package ]; 375 + path = [ pkgs.iproute2 config.virtualisation.vswitch.package ]; 376 376 preStart = '' 377 377 echo "Resetting Open vSwitch ${n}..." 378 378 ovs-vsctl --if-exists del-br ${n} -- add-br ${n} \ ··· 413 413 before = [ "network-setup.service" ]; 414 414 serviceConfig.Type = "oneshot"; 415 415 serviceConfig.RemainAfterExit = true; 416 - path = [ pkgs.iproute pkgs.gawk ]; 416 + path = [ pkgs.iproute2 pkgs.gawk ]; 417 417 script = '' 418 418 echo "Destroying old bond ${n}..." 419 419 ${destroyBond n} ··· 451 451 before = [ "network-setup.service" ]; 452 452 serviceConfig.Type = "oneshot"; 453 453 serviceConfig.RemainAfterExit = true; 454 - path = [ pkgs.iproute ]; 454 + path = [ pkgs.iproute2 ]; 455 455 script = '' 456 456 # Remove Dead Interfaces 457 457 ip link show "${n}" >/dev/null 2>&1 && ip link delete "${n}" ··· 476 476 before = [ "network-setup.service" ]; 477 477 serviceConfig.Type = "oneshot"; 478 478 serviceConfig.RemainAfterExit = true; 479 - path = [ pkgs.iproute ]; 479 + path = [ pkgs.iproute2 ]; 480 480 script = '' 481 481 # Remove Dead Interfaces 482 482 ip link show "${n}" >/dev/null 2>&1 && ip link delete "${n}" ··· 504 504 before = [ "network-setup.service" ]; 505 505 serviceConfig.Type = "oneshot"; 506 506 serviceConfig.RemainAfterExit = true; 507 - path = [ pkgs.iproute ]; 507 + path = [ pkgs.iproute2 ]; 508 508 script = '' 509 509 # Remove Dead Interfaces 510 510 ip link show "${n}" >/dev/null 2>&1 && ip link delete "${n}"
+1 -1
nixos/modules/tasks/network-interfaces-systemd.nix
··· 259 259 wants = deps; # if one or more interface fails, the switch should continue to run 260 260 serviceConfig.Type = "oneshot"; 261 261 serviceConfig.RemainAfterExit = true; 262 - path = [ pkgs.iproute config.virtualisation.vswitch.package ]; 262 + path = [ pkgs.iproute2 config.virtualisation.vswitch.package ]; 263 263 preStart = '' 264 264 echo "Resetting Open vSwitch ${n}..." 265 265 ovs-vsctl --if-exists del-br ${n} -- add-br ${n} \
+3 -3
nixos/modules/tasks/network-interfaces.nix
··· 1171 1171 wantedBy = [ "network.target" ]; 1172 1172 after = [ "network-pre.target" ]; 1173 1173 unitConfig.ConditionCapability = "CAP_NET_ADMIN"; 1174 - path = [ pkgs.iproute ]; 1174 + path = [ pkgs.iproute2 ]; 1175 1175 serviceConfig.Type = "oneshot"; 1176 1176 serviceConfig.RemainAfterExit = true; 1177 1177 script = '' ··· 1249 1249 ${optionalString (current.type == "mesh" && current.meshID!=null) "${pkgs.iw}/bin/iw dev ${device} set meshid ${current.meshID}"} 1250 1250 ${optionalString (current.type == "monitor" && current.flags!=null) "${pkgs.iw}/bin/iw dev ${device} set monitor ${current.flags}"} 1251 1251 ${optionalString (current.type == "managed" && current.fourAddr!=null) "${pkgs.iw}/bin/iw dev ${device} set 4addr ${if current.fourAddr then "on" else "off"}"} 1252 - ${optionalString (current.mac != null) "${pkgs.iproute}/bin/ip link set dev ${device} address ${current.mac}"} 1252 + ${optionalString (current.mac != null) "${pkgs.iproute2}/bin/ip link set dev ${device} address ${current.mac}"} 1253 1253 ''; 1254 1254 1255 1255 # Udev script to execute for a new WLAN interface. The script configures the new WLAN interface. ··· 1260 1260 ${optionalString (new.type == "mesh" && new.meshID!=null) "${pkgs.iw}/bin/iw dev ${device} set meshid ${new.meshID}"} 1261 1261 ${optionalString (new.type == "monitor" && new.flags!=null) "${pkgs.iw}/bin/iw dev ${device} set monitor ${new.flags}"} 1262 1262 ${optionalString (new.type == "managed" && new.fourAddr!=null) "${pkgs.iw}/bin/iw dev ${device} set 4addr ${if new.fourAddr then "on" else "off"}"} 1263 - ${optionalString (new.mac != null) "${pkgs.iproute}/bin/ip link set dev ${device} address ${new.mac}"} 1263 + ${optionalString (new.mac != null) "${pkgs.iproute2}/bin/ip link set dev ${device} address ${new.mac}"} 1264 1264 ''; 1265 1265 1266 1266 # Udev attributes for systemd to name the device and to create a .device target.
+1 -1
nixos/modules/virtualisation/brightbox-image.nix
··· 119 119 wants = [ "network-online.target" ]; 120 120 after = [ "network-online.target" ]; 121 121 122 - path = [ pkgs.wget pkgs.iproute ]; 122 + path = [ pkgs.wget pkgs.iproute2 ]; 123 123 124 124 script = 125 125 ''
+1 -1
nixos/modules/virtualisation/ec2-data.nix
··· 19 19 wantedBy = [ "multi-user.target" "sshd.service" ]; 20 20 before = [ "sshd.service" ]; 21 21 22 - path = [ pkgs.iproute ]; 22 + path = [ pkgs.iproute2 ]; 23 23 24 24 script = 25 25 ''
+1 -1
nixos/modules/virtualisation/google-compute-config.nix
··· 110 110 systemd.services.google-network-daemon = { 111 111 description = "Google Compute Engine Network Daemon"; 112 112 after = [ "network-online.target" "network.target" "google-instance-setup.service" ]; 113 - path = with pkgs; [ iproute ]; 113 + path = with pkgs; [ iproute2 ]; 114 114 serviceConfig = { 115 115 ExecStart = "${gce}/bin/google_network_daemon"; 116 116 StandardOutput="journal+console";
+1 -1
nixos/modules/virtualisation/nixos-containers.nix
··· 739 739 740 740 unitConfig.RequiresMountsFor = "/var/lib/containers/%i"; 741 741 742 - path = [ pkgs.iproute ]; 742 + path = [ pkgs.iproute2 ]; 743 743 744 744 environment = { 745 745 root = "/var/lib/containers/%i";
+1 -1
nixos/modules/virtualisation/xe-guest-utilities.nix
··· 17 17 wantedBy = [ "multi-user.target" ]; 18 18 after = [ "xe-linux-distribution.service" ]; 19 19 requires = [ "proc-xen.mount" ]; 20 - path = [ pkgs.coreutils pkgs.iproute ]; 20 + path = [ pkgs.coreutils pkgs.iproute2 ]; 21 21 serviceConfig = { 22 22 PIDFile = "/run/xe-daemon.pid"; 23 23 ExecStart = "${pkgs.xe-guest-utilities}/bin/xe-daemon -p /run/xe-daemon.pid";
+1 -1
nixos/modules/virtualisation/xen-dom0.nix
··· 248 248 # Xen provides udev rules. 249 249 services.udev.packages = [ cfg.package ]; 250 250 251 - services.udev.path = [ pkgs.bridge-utils pkgs.iproute ]; 251 + services.udev.path = [ pkgs.bridge-utils pkgs.iproute2 ]; 252 252 253 253 systemd.services.xen-store = { 254 254 description = "Xen Store Daemon";
+1 -1
nixos/tests/mysql/mariadb-galera-mariabackup.nix
··· 2 2 3 3 let 4 4 mysqlenv-common = pkgs.buildEnv { name = "mysql-path-env-common"; pathsToLink = [ "/bin" ]; paths = with pkgs; [ bash gawk gnutar inetutils which ]; }; 5 - mysqlenv-mariabackup = pkgs.buildEnv { name = "mysql-path-env-mariabackup"; pathsToLink = [ "/bin" ]; paths = with pkgs; [ gzip iproute netcat procps pv socat ]; }; 5 + mysqlenv-mariabackup = pkgs.buildEnv { name = "mysql-path-env-mariabackup"; pathsToLink = [ "/bin" ]; paths = with pkgs; [ gzip iproute2 netcat procps pv socat ]; }; 6 6 7 7 in { 8 8 name = "mariadb-galera-mariabackup";
+3 -3
nixos/tests/wireguard/basic.nix
··· 52 52 inherit (wg-snakeoil-keys.peer0) publicKey; 53 53 }; 54 54 55 - postSetup = let inherit (pkgs) iproute; in '' 56 - ${iproute}/bin/ip route replace 10.23.42.1/32 dev wg0 57 - ${iproute}/bin/ip route replace fc00::1/128 dev wg0 55 + postSetup = let inherit (pkgs) iproute2; in '' 56 + ${iproute2}/bin/ip route replace 10.23.42.1/32 dev wg0 57 + ${iproute2}/bin/ip route replace fc00::1/128 dev wg0 58 58 ''; 59 59 }; 60 60 };
+2 -2
pkgs/applications/audio/aj-snapshot/default.nix
··· 1 - { lib, stdenv, fetchurl, alsaLib, jack2Full, minixml, pkg-config }: 1 + { lib, stdenv, fetchurl, alsaLib, jack2, minixml, pkg-config }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = packageName + "-" + version ; ··· 13 13 doCheck = false; 14 14 15 15 nativeBuildInputs = [ pkg-config ]; 16 - buildInputs = [ alsaLib minixml jack2Full ]; 16 + buildInputs = [ alsaLib minixml jack2 ]; 17 17 18 18 meta = with lib; { 19 19 description = "Tool for storing/restoring JACK and/or ALSA connections to/from cml files";
+2 -2
pkgs/applications/audio/faust/faust2jack.nix
··· 1 1 { faust 2 2 , gtk2 3 - , jack2Full 3 + , jack2 4 4 , alsaLib 5 5 , opencv 6 6 , libsndfile ··· 18 18 19 19 propagatedBuildInputs = [ 20 20 gtk2 21 - jack2Full 21 + jack2 22 22 alsaLib 23 23 opencv 24 24 libsndfile
+2 -2
pkgs/applications/audio/faust/faust2jaqt.nix
··· 1 1 { faust 2 - , jack2Full 2 + , jack2 3 3 , qt4 4 4 , libsndfile 5 5 , alsaLib ··· 16 16 ]; 17 17 18 18 propagatedBuildInputs = [ 19 - jack2Full 19 + jack2 20 20 qt4 21 21 libsndfile 22 22 alsaLib
+2 -2
pkgs/applications/audio/lsp-plugins/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, pkg-config, makeWrapper 2 - , libsndfile, jack2Full 2 + , libsndfile, jack2 3 3 , libGLU, libGL, lv2, cairo 4 4 , ladspaH, php }: 5 5 ··· 15 15 }; 16 16 17 17 nativeBuildInputs = [ pkg-config php makeWrapper ]; 18 - buildInputs = [ jack2Full libsndfile libGLU libGL lv2 cairo ladspaH ]; 18 + buildInputs = [ jack2 libsndfile libGLU libGL lv2 cairo ladspaH ]; 19 19 20 20 makeFlags = [ 21 21 "PREFIX=${placeholder "out"}"
+2 -2
pkgs/applications/audio/sonic-pi/default.nix
··· 9 9 , pkg-config 10 10 , boost 11 11 , bash 12 - , jack2Full 12 + , jack2 13 13 , supercollider 14 14 , qwt 15 15 , osmid ··· 102 102 dontWrapQtApps = true; 103 103 preFixup = '' 104 104 wrapQtApp "$out/bin/sonic-pi" \ 105 - --prefix PATH : ${ruby}/bin:${bash}/bin:${supercollider}/bin:${jack2Full}/bin \ 105 + --prefix PATH : ${ruby}/bin:${bash}/bin:${supercollider}/bin:${jack2}/bin \ 106 106 --set AUBIO_LIB "${aubio}/lib/libaubio.so" 107 107 ''; 108 108
+2 -2
pkgs/applications/audio/tetraproc/default.nix
··· 1 1 { lib, stdenv, fetchurl, makeWrapper 2 - , expat, fftwFloat, fontconfig, freetype, libjack2, jack2Full, libclthreads, libclxclient 2 + , expat, fftwFloat, fontconfig, freetype, libjack2, jack2, libclthreads, libclxclient 3 3 , libsndfile, libxcb, xorg 4 4 }: 5 5 ··· 30 30 31 31 postInstall = '' 32 32 # Make sure Jack is avalable in $PATH for tetraproc 33 - wrapProgram $out/bin/tetraproc --prefix PATH : "${jack2Full}/bin" 33 + wrapProgram $out/bin/tetraproc --prefix PATH : "${jack2}/bin" 34 34 ''; 35 35 36 36 meta = with lib; {
+2 -2
pkgs/applications/gis/saga/default.nix
··· 12 12 , dxflib 13 13 , curl 14 14 , libiodbc 15 - , lzma 15 + , xz 16 16 , libharu 17 17 , opencv 18 18 , vigra ··· 64 64 vigra 65 65 postgresql 66 66 libiodbc 67 - lzma 67 + xz 68 68 qhull 69 69 giflib 70 70 ]
+2 -2
pkgs/applications/graphics/hydrus/default.nix
··· 1 1 { lib 2 2 , fetchFromGitHub 3 - , lzma 3 + , xz 4 4 , qt5 5 5 , wrapQtAppsHook 6 6 , miniupnpc_2 ··· 39 39 service-identity 40 40 twisted 41 41 lz4 42 - lzma 42 + xz 43 43 pysocks 44 44 matplotlib 45 45 qtpy
+2 -2
pkgs/applications/graphics/opentoonz/default.nix
··· 1 1 { boost, cmake, fetchFromGitHub, freeglut, freetype, glew, libjpeg, libmypaint 2 - , libpng, libtiff, libusb1, lz4, lzma, lzo, openblas, pkg-config, qtbase 2 + , libpng, libtiff, libusb1, lz4, xz, lzo, openblas, pkg-config, qtbase 3 3 , qtmultimedia, qtscript, lib, stdenv, superlu, wrapQtAppsHook, }: 4 4 let source = import ./source.nix { inherit fetchFromGitHub; }; 5 5 in stdenv.mkDerivation rec { ··· 21 21 libtiff 22 22 libusb1 23 23 lz4 24 - lzma 24 + xz 25 25 lzo 26 26 openblas 27 27 qtbase
+7 -7
pkgs/applications/kde/akonadi/default.nix
··· 2 2 mkDerivation, lib, kdepimTeam, 3 3 extra-cmake-modules, shared-mime-info, qtbase, accounts-qt, 4 4 boost, kaccounts-integration, kcompletion, kconfigwidgets, kcrash, kdbusaddons, 5 - kdesignerplugin, ki18n, kiconthemes, kio, kitemmodels, kwindowsystem, mysql, qttools, 6 - signond, lzma, 5 + kdesignerplugin, ki18n, kiconthemes, kio, kitemmodels, kwindowsystem, mariadb, qttools, 6 + signond, xz, 7 7 }: 8 8 9 9 mkDerivation { ··· 21 21 nativeBuildInputs = [ extra-cmake-modules shared-mime-info ]; 22 22 buildInputs = [ 23 23 kaccounts-integration kcompletion kconfigwidgets kcrash kdbusaddons kdesignerplugin 24 - ki18n kiconthemes kio kwindowsystem lzma accounts-qt qttools signond 24 + ki18n kiconthemes kio kwindowsystem xz accounts-qt qttools signond 25 25 ]; 26 26 propagatedBuildInputs = [ boost kitemmodels ]; 27 27 outputs = [ "out" "dev" ]; 28 28 CXXFLAGS = [ 29 - ''-DNIXPKGS_MYSQL_MYSQLD=\"${lib.getBin mysql}/bin/mysqld\"'' 30 - ''-DNIXPKGS_MYSQL_MYSQLADMIN=\"${lib.getBin mysql}/bin/mysqladmin\"'' 31 - ''-DNIXPKGS_MYSQL_MYSQL_INSTALL_DB=\"${lib.getBin mysql}/bin/mysql_install_db\"'' 32 - ''-DNIXPKGS_MYSQL_MYSQLCHECK=\"${lib.getBin mysql}/bin/mysqlcheck\"'' 29 + ''-DNIXPKGS_MYSQL_MYSQLD=\"${lib.getBin mariadb}/bin/mysqld\"'' 30 + ''-DNIXPKGS_MYSQL_MYSQLADMIN=\"${lib.getBin mariadb}/bin/mysqladmin\"'' 31 + ''-DNIXPKGS_MYSQL_MYSQL_INSTALL_DB=\"${lib.getBin mariadb}/bin/mysql_install_db\"'' 32 + ''-DNIXPKGS_MYSQL_MYSQLCHECK=\"${lib.getBin mariadb}/bin/mysqlcheck\"'' 33 33 ''-DNIXPKGS_POSTGRES_PG_CTL=\"\"'' 34 34 ''-DNIXPKGS_POSTGRES_PG_UPGRADE=\"\"'' 35 35 ''-DNIXPKGS_POSTGRES_INITDB=\"\"''
+2 -2
pkgs/applications/misc/azuredatastudio/default.nix
··· 12 12 , at-spi2-atk 13 13 , gnutar 14 14 , atomEnv 15 - , kerberos 15 + , libkrb5 16 16 }: 17 17 18 18 # from justinwoo/azuredatastudio-nix ··· 70 70 at-spi2-core 71 71 at-spi2-atk 72 72 stdenv.cc.cc.lib 73 - kerberos 73 + libkrb5 74 74 ] 75 75 ) 76 76 targetPath
+2 -2
pkgs/applications/misc/bashSnippets/default.nix
··· 1 1 { stdenv, lib, fetchFromGitHub, makeWrapper 2 - , curl, python3, bind, iproute, bc, gitMinimal }: 2 + , curl, python3, bind, iproute2, bc, gitMinimal }: 3 3 let 4 4 version = "1.23.0"; 5 5 deps = lib.makeBinPath [ 6 6 curl 7 7 python3 8 8 bind.dnsutils 9 - iproute 9 + iproute2 10 10 bc 11 11 gitMinimal 12 12 ];
+2 -2
pkgs/applications/misc/golden-cheetah/default.nix
··· 1 1 { lib, fetchFromGitHub, fetchpatch, mkDerivation 2 2 , qtbase, qtsvg, qtserialport, qtwebengine, qtmultimedia, qttools 3 3 , qtconnectivity, qtcharts, libusb-compat-0_1 4 - , yacc, flex, zlib, qmake, makeDesktopItem, makeWrapper 4 + , bison, flex, zlib, qmake, makeDesktopItem, makeWrapper 5 5 }: 6 6 7 7 let ··· 29 29 qtbase qtsvg qtserialport qtwebengine qtmultimedia qttools zlib 30 30 qtconnectivity qtcharts libusb-compat-0_1 31 31 ]; 32 - nativeBuildInputs = [ flex makeWrapper qmake yacc ]; 32 + nativeBuildInputs = [ flex makeWrapper qmake bison ]; 33 33 34 34 patches = [ 35 35 # allow building with bison 3.7
+2 -2
pkgs/applications/misc/sc-im/default.nix
··· 4 4 , makeWrapper 5 5 , pkg-config 6 6 , which 7 - , yacc 7 + , bison 8 8 , gnuplot 9 9 , libxls 10 10 , libxml2 ··· 29 29 makeWrapper 30 30 pkg-config 31 31 which 32 - yacc 32 + bison 33 33 ]; 34 34 35 35 buildInputs = [
+2 -2
pkgs/applications/networking/appgate-sdp/default.nix
··· 17 17 , glib 18 18 , gtk3 19 19 , icu 20 - , iproute 20 + , iproute2 21 21 , krb5 22 22 , lib 23 23 , mesa ··· 169 169 patchelf --set-interpreter "$(cat $NIX_CC/nix-support/dynamic-linker)" --set-rpath "$ORIGIN:$out/opt/appgate/service/:$out/opt/appgate/:${rpath}" $binary 170 170 done 171 171 172 - wrapProgram $out/opt/appgate/appgate-driver --prefix PATH : ${lib.makeBinPath [ iproute networkmanager dnsmasq ]} 172 + wrapProgram $out/opt/appgate/appgate-driver --prefix PATH : ${lib.makeBinPath [ iproute2 networkmanager dnsmasq ]} 173 173 wrapProgram $out/opt/appgate/linux/set_dns --set PYTHONPATH $PYTHONPATH 174 174 ''; 175 175 meta = with lib; {
+2 -2
pkgs/applications/networking/browsers/chromium/common.nix
··· 8 8 , libusb1, pciutils, nss, re2 9 9 10 10 , python2Packages, perl, pkg-config 11 - , nspr, systemd, kerberos 11 + , nspr, systemd, libkrb5 12 12 , util-linux, alsaLib 13 13 , bison, gperf 14 14 , glib, gtk3, dbus-glib ··· 135 135 buildInputs = defaultDependencies ++ [ 136 136 nspr nss systemd 137 137 util-linux alsaLib 138 - bison gperf kerberos 138 + bison gperf libkrb5 139 139 glib gtk3 dbus-glib 140 140 libXScrnSaver libXcursor libXtst libxshmfence libGLU libGL 141 141 pciutils protobuf speechd libXdamage at-spi2-core
+2 -2
pkgs/applications/networking/browsers/elinks/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, fetchpatch, ncurses, xlibsWrapper, bzip2, zlib 2 - , brotli, zstd, lzma, openssl, autoreconfHook, gettext, pkg-config, libev 2 + , brotli, zstd, xz, openssl, autoreconfHook, gettext, pkg-config, libev 3 3 , gpm, libidn, tre, expat 4 4 , # Incompatible licenses, LGPLv3 - GPLv2 5 5 enableGuile ? false, guile ? null ··· 23 23 }; 24 24 25 25 buildInputs = [ 26 - ncurses xlibsWrapper bzip2 zlib brotli zstd lzma 26 + ncurses xlibsWrapper bzip2 zlib brotli zstd xz 27 27 openssl libidn tre expat libev 28 28 ] 29 29 ++ lib.optional stdenv.isLinux gpm
+2 -2
pkgs/applications/networking/browsers/firefox-bin/default.nix
··· 13 13 , glibc 14 14 , gtk2 15 15 , gtk3 16 - , kerberos 16 + , libkrb5 17 17 , libX11 18 18 , libXScrnSaver 19 19 , libxcb ··· 106 106 glibc 107 107 gtk2 108 108 gtk3 109 - kerberos 109 + libkrb5 110 110 mesa 111 111 libX11 112 112 libXScrnSaver
+2 -2
pkgs/applications/networking/browsers/firefox/common.nix
··· 24 24 , gtk3Support ? true, gtk2, gtk3, wrapGAppsHook 25 25 , waylandSupport ? true, libxkbcommon 26 26 , ltoSupport ? (stdenv.isLinux && stdenv.is64bit), overrideCC, buildPackages 27 - , gssSupport ? true, kerberos 27 + , gssSupport ? true, libkrb5 28 28 , pipewireSupport ? waylandSupport && webrtcSupport, pipewire 29 29 30 30 ## privacy-related options ··· 174 174 ++ lib.optional alsaSupport alsaLib 175 175 ++ lib.optional pulseaudioSupport libpulseaudio # only headers are needed 176 176 ++ lib.optional gtk3Support gtk3 177 - ++ lib.optional gssSupport kerberos 177 + ++ lib.optional gssSupport libkrb5 178 178 ++ lib.optional waylandSupport libxkbcommon 179 179 ++ lib.optional pipewireSupport pipewire 180 180 ++ lib.optional (lib.versionAtLeast ffversion "82") gnum4
+2 -2
pkgs/applications/networking/browsers/firefox/wrapper.nix
··· 8 8 , tridactyl-native 9 9 , fx_cast_bridge 10 10 , udev 11 - , kerberos 11 + , libkrb5 12 12 , libva 13 13 , mesa # firefox wants gbm for drm+dmabuf 14 14 }: ··· 65 65 libs = lib.optionals stdenv.isLinux [ udev libva mesa libnotify xorg.libXScrnSaver ] 66 66 ++ lib.optional (pipewireSupport && lib.versionAtLeast version "83") pipewire 67 67 ++ lib.optional ffmpegSupport ffmpeg 68 - ++ lib.optional gssSupport kerberos 68 + ++ lib.optional gssSupport libkrb5 69 69 ++ lib.optional useGlvnd libglvnd 70 70 ++ lib.optionals (cfg.enableQuakeLive or false) 71 71 (with xorg; [ stdenv.cc libX11 libXxf86dga libXxf86vm libXext libXt alsaLib zlib ])
+2 -2
pkgs/applications/networking/browsers/google-chrome/default.nix
··· 5 5 , libXcursor, libXext, libXfixes, libXrender, libXScrnSaver, libXcomposite, libxcb 6 6 , alsaLib, libXdamage, libXtst, libXrandr, libxshmfence, expat, cups 7 7 , dbus, gtk3, gdk-pixbuf, gcc-unwrapped, at-spi2-atk, at-spi2-core 8 - , kerberos, libdrm, mesa 8 + , libkrb5, libdrm, mesa 9 9 , libxkbcommon, wayland # ozone/wayland 10 10 11 11 # Command line programs ··· 66 66 liberation_ttf curl util-linux xdg-utils wget 67 67 flac harfbuzz icu libpng opusWithCustomModes snappy speechd 68 68 bzip2 libcap at-spi2-atk at-spi2-core 69 - kerberos libdrm mesa coreutils 69 + libkrb5 libdrm mesa coreutils 70 70 libxkbcommon wayland 71 71 ] ++ optional pulseSupport libpulseaudio 72 72 ++ optional libvaSupport libva
+2 -2
pkgs/applications/networking/cluster/k3s/default.nix
··· 3 3 , makeWrapper 4 4 , socat 5 5 , iptables 6 - , iproute 6 + , iproute2 7 7 , bridge-utils 8 8 , conntrack-tools 9 9 , buildGoPackage ··· 240 240 kmod 241 241 socat 242 242 iptables 243 - iproute 243 + iproute2 244 244 bridge-utils 245 245 ethtool 246 246 util-linux
+2 -2
pkgs/applications/networking/cluster/openshift/default.nix
··· 1 1 { lib, fetchFromGitHub, buildGoPackage, which, go-bindata, rsync, util-linux 2 - , coreutils, kerberos, ncurses, clang, installShellFiles 2 + , coreutils, libkrb5, ncurses, clang, installShellFiles 3 3 , components ? [ 4 4 "cmd/oc" 5 5 "cmd/openshift" ··· 33 33 34 34 goPackagePath = "github.com/openshift/origin"; 35 35 36 - buildInputs = [ kerberos ncurses ]; 36 + buildInputs = [ libkrb5 ncurses ]; 37 37 38 38 nativeBuildInputs = [ which rsync go-bindata clang installShellFiles ]; 39 39
+2 -2
pkgs/applications/networking/compactor/default.nix
··· 1 1 { autoconf, automake, boost, cbor-diag, cddl, fetchFromGitHub, file, libctemplate, libmaxminddb 2 - , libpcap, libtins, libtool, lzma, openssl, pkg-config, lib, stdenv, tcpdump, wireshark-cli 2 + , libpcap, libtins, libtool, xz, openssl, pkg-config, lib, stdenv, tcpdump, wireshark-cli 3 3 }: 4 4 5 5 stdenv.mkDerivation rec { ··· 20 20 libpcap 21 21 openssl 22 22 libtins 23 - lzma 23 + xz 24 24 libctemplate 25 25 libmaxminddb 26 26 ];
+2 -2
pkgs/applications/networking/firehol/default.nix
··· 1 1 { stdenv, lib, fetchFromGitHub, pkgs 2 - , autoconf, automake, curl, iprange, iproute, ipset, iptables, iputils 2 + , autoconf, automake, curl, iprange, iproute2, ipset, iptables, iputils 3 3 , kmod, nettools, procps, tcpdump, traceroute, util-linux, whois 4 4 5 5 # If true, just install FireQOS without FireHOL ··· 35 35 36 36 nativeBuildInputs = [ autoconf automake ]; 37 37 buildInputs = [ 38 - curl iprange iproute ipset iptables iputils kmod 38 + curl iprange iproute2 ipset iptables iputils kmod 39 39 nettools procps tcpdump traceroute util-linux whois 40 40 ]; 41 41
+2 -2
pkgs/applications/networking/ike/default.nix
··· 1 1 { lib, stdenv, fetchurl, fetchpatch, cmake, openssl, libedit, flex, bison, qt4, makeWrapper 2 - , gcc, nettools, iproute, linuxHeaders }: 2 + , gcc, nettools, iproute2, linuxHeaders }: 3 3 4 4 # NOTE: use $out/etc/iked.conf as sample configuration and also set: dhcp_file "/etc/iked.dhcp"; 5 5 # launch with "iked -f /etc/iked.conf" ··· 26 26 ]; 27 27 28 28 nativeBuildInputs = [ cmake flex bison makeWrapper ]; 29 - buildInputs = [ openssl libedit qt4 nettools iproute ]; 29 + buildInputs = [ openssl libedit qt4 nettools iproute2 ]; 30 30 31 31 postPatch = '' 32 32 # fix build with bison3
+2 -2
pkgs/applications/networking/instant-messengers/telegram/kotatogram-desktop/default.nix
··· 1 1 { mkDerivation, lib, fetchFromGitHub, pkg-config, python3, cmake, ninja 2 2 , qtbase, qtimageformats, libdbusmenu, hunspell, xdg-utils, ffmpeg_3, openalSoft 3 - , lzma, lz4, xxHash, zlib, minizip, openssl, libtgvoip, microsoft_gsl, tl-expected 3 + , xz, lz4, xxHash, zlib, minizip, openssl, libtgvoip, microsoft_gsl, tl-expected 4 4 , range-v3 5 5 }: 6 6 ··· 21 21 nativeBuildInputs = [ pkg-config python3 cmake ninja ]; 22 22 23 23 buildInputs = [ 24 - qtbase qtimageformats ffmpeg_3 openalSoft lzma lz4 xxHash libdbusmenu 24 + qtbase qtimageformats ffmpeg_3 openalSoft xz lz4 xxHash libdbusmenu 25 25 zlib minizip openssl hunspell libtgvoip microsoft_gsl tl-expected range-v3 26 26 ]; 27 27
+2 -2
pkgs/applications/networking/mailreaders/alpine/default.nix
··· 1 - {lib, stdenv, fetchurl, ncurses, tcl, openssl, pam, kerberos 1 + {lib, stdenv, fetchurl, ncurses, tcl, openssl, pam, libkrb5 2 2 , openldap 3 3 }: 4 4 ··· 12 12 }; 13 13 14 14 buildInputs = [ 15 - ncurses tcl openssl pam kerberos openldap 15 + ncurses tcl openssl pam libkrb5 openldap 16 16 ]; 17 17 18 18 hardeningDisable = [ "format" ];
+2 -2
pkgs/applications/networking/mailreaders/mutt/default.nix
··· 4 4 , cyrus_sasl ? null 5 5 , gnupg ? null 6 6 , gpgme ? null 7 - , kerberos ? null 7 + , libkrb5 ? null 8 8 , headerCache ? true 9 9 , sslSupport ? true 10 10 , saslSupport ? true ··· 43 43 [ ncurses which perl ] 44 44 ++ optional headerCache gdbm 45 45 ++ optional sslSupport openssl 46 - ++ optional gssSupport kerberos 46 + ++ optional gssSupport libkrb5 47 47 ++ optional saslSupport cyrus_sasl 48 48 ++ optional gpgmeSupport gpgme; 49 49
+2 -2
pkgs/applications/networking/mailreaders/neomutt/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, gettext, makeWrapper, tcl, which 2 - , ncurses, perl , cyrus_sasl, gss, gpgme, kerberos, libidn, libxml2, notmuch, openssl 2 + , ncurses, perl , cyrus_sasl, gss, gpgme, libkrb5, libidn, libxml2, notmuch, openssl 3 3 , lmdb, libxslt, docbook_xsl, docbook_xml_dtd_42, w3m, mailcap, sqlite, zlib 4 4 }: 5 5 ··· 15 15 }; 16 16 17 17 buildInputs = [ 18 - cyrus_sasl gss gpgme kerberos libidn ncurses 18 + cyrus_sasl gss gpgme libkrb5 libidn ncurses 19 19 notmuch openssl perl lmdb 20 20 mailcap sqlite 21 21 ];
+2 -2
pkgs/applications/networking/mailreaders/thunderbird-bin/68.nix
··· 16 16 , glibc 17 17 , gtk2 18 18 , gtk3 19 - , kerberos 19 + , libkrb5 20 20 , libX11 21 21 , libXScrnSaver 22 22 , libXcomposite ··· 94 94 glibc 95 95 gtk2 96 96 gtk3 97 - kerberos 97 + libkrb5 98 98 libX11 99 99 libXScrnSaver 100 100 libXcomposite
+2 -2
pkgs/applications/networking/mailreaders/thunderbird-bin/default.nix
··· 20 20 , gpgme 21 21 , gtk2 22 22 , gtk3 23 - , kerberos 23 + , libkrb5 24 24 , libcanberra 25 25 , libGL 26 26 , libGLU ··· 93 93 glibc 94 94 gtk2 95 95 gtk3 96 - kerberos 96 + libkrb5 97 97 libX11 98 98 libXScrnSaver 99 99 libXcomposite
+2 -2
pkgs/applications/networking/remote/aws-workspaces/default.nix
··· 1 1 { stdenv, lib 2 2 , makeWrapper, dpkg, fetchurl, autoPatchelfHook 3 - , curl, kerberos, lttng-ust, libpulseaudio, gtk3, openssl_1_1, icu, webkitgtk, librsvg, gdk-pixbuf, libsoup, glib-networking 3 + , curl, libkrb5, lttng-ust, libpulseaudio, gtk3, openssl_1_1, icu, webkitgtk, librsvg, gdk-pixbuf, libsoup, glib-networking 4 4 }: 5 5 6 6 stdenv.mkDerivation rec { ··· 27 27 28 28 buildInputs = [ 29 29 stdenv.cc.cc.lib 30 - kerberos 30 + libkrb5 31 31 curl 32 32 lttng-ust 33 33 libpulseaudio
+2 -2
pkgs/applications/networking/remote/x2goserver/default.nix
··· 1 1 { stdenv, lib, fetchurl, perlPackages, makeWrapper, perl, which, nx-libs 2 2 , util-linux, coreutils, glibc, gawk, gnused, gnugrep, findutils, xorg 3 - , nettools, iproute, bc, procps, psmisc, lsof, pwgen, openssh, sshfs, bash 3 + , nettools, iproute2, bc, procps, psmisc, lsof, pwgen, openssh, sshfs, bash 4 4 }: 5 5 6 6 let ··· 31 31 32 32 binaryDeps = [ 33 33 perlEnv which nx-libs util-linux coreutils glibc.bin gawk gnused gnugrep 34 - findutils nettools iproute bc procps psmisc lsof pwgen openssh sshfs 34 + findutils nettools iproute2 bc procps psmisc lsof pwgen openssh sshfs 35 35 xorg.xauth xorg.xinit xorg.xrandr xorg.xmodmap xorg.xwininfo xorg.fontutil 36 36 xorg.xkbcomp xorg.setxkbmap 37 37 ];
+2 -2
pkgs/applications/office/wpsoffice/default.nix
··· 23 23 , libtool 24 24 , libuuid 25 25 , libxml2 26 - , lzma 26 + , xz 27 27 , nspr 28 28 , nss 29 29 , openssl ··· 97 97 libuuid 98 98 libxcb 99 99 libxml2 100 - lzma 100 + xz 101 101 nspr 102 102 nss 103 103 openssl
+2 -2
pkgs/applications/radio/gnss-sdr/default.nix
··· 4 4 , cmake 5 5 , gmp 6 6 , glog 7 - , gmock 7 + , gtest 8 8 , openssl 9 9 , gflags 10 10 , gnuradio3_8 ··· 42 42 armadillo 43 43 gnuradio3_8.unwrapped.boost 44 44 glog 45 - gmock 45 + gtest 46 46 openssl 47 47 gflags 48 48 orc
+2 -2
pkgs/applications/science/biology/bcftools/default.nix
··· 1 - { lib, stdenv, fetchurl, htslib, zlib, bzip2, lzma, curl, perl, python3, bash }: 1 + { lib, stdenv, fetchurl, htslib, zlib, bzip2, xz, curl, perl, python3, bash }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "bcftools"; ··· 14 14 python3 15 15 ]; 16 16 17 - buildInputs = [ htslib zlib bzip2 lzma curl ]; 17 + buildInputs = [ htslib zlib bzip2 xz curl ]; 18 18 19 19 strictDeps = true; 20 20
+3 -2
pkgs/applications/science/biology/bedtools/default.nix
··· 1 - {lib, stdenv, fetchFromGitHub, zlib, python3, bzip2, lzma}: 1 + {lib, stdenv, fetchFromGitHub, zlib, python3, bzip2, xz}: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "bedtools"; ··· 17 17 python3 18 18 ]; 19 19 20 - buildInputs = [ zlib bzip2 lzma ]; 20 + buildInputs = [ zlib bzip2 xz ]; 21 + 21 22 cxx = if stdenv.cc.isClang then "clang++" else "g++"; 22 23 cc = if stdenv.cc.isClang then "clang" else "gcc"; 23 24 buildPhase = "make prefix=$out SHELL=${stdenv.shell} CXX=${cxx} CC=${cc} -j $NIX_BUILD_CORES";
+2 -2
pkgs/applications/science/biology/delly/default.nix
··· 1 - { lib, stdenv, fetchpatch, fetchFromGitHub, htslib, zlib, bzip2, lzma, ncurses, boost }: 1 + { lib, stdenv, fetchpatch, fetchFromGitHub, htslib, zlib, bzip2, xz, ncurses, boost }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "delly"; ··· 11 11 sha256 = "sha256-DWwC35r8cQbePUzppkFQlev0YZdxk2+BSrNTW/DOY3M="; 12 12 }; 13 13 14 - buildInputs = [ zlib htslib bzip2 lzma ncurses boost ]; 14 + buildInputs = [ zlib htslib bzip2 xz ncurses boost ]; 15 15 16 16 EBROOTHTSLIB = htslib; 17 17
+2 -2
pkgs/applications/science/biology/freebayes/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, zlib, bzip2, lzma }: 1 + { lib, stdenv, fetchFromGitHub, zlib, bzip2, xz }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "freebayes"; ··· 13 13 fetchSubmodules = true; 14 14 }; 15 15 16 - buildInputs = [ zlib bzip2 lzma ]; 16 + buildInputs = [ zlib bzip2 xz ]; 17 17 18 18 installPhase = '' 19 19 install -vD bin/freebayes bin/bamleftalign scripts/* -t $out/bin
+2 -2
pkgs/applications/science/biology/kent/default.nix
··· 3 3 , libuuid 4 4 , zlib 5 5 , bzip2 6 - , lzma 6 + , xz 7 7 , openssl 8 8 , curl 9 9 , libmysqlclient ··· 22 22 sha256 = "0l5lmqqc6sqkf4hyk3z4825ly0vdlj5xdfad6zd0708cb1v81nbx"; 23 23 }; 24 24 25 - buildInputs = [ libpng libuuid zlib bzip2 lzma openssl curl libmysqlclient ]; 25 + buildInputs = [ libpng libuuid zlib bzip2 xz openssl curl libmysqlclient ]; 26 26 27 27 patchPhase = '' 28 28 substituteInPlace ./src/checkUmask.sh \
+2 -2
pkgs/applications/science/biology/octopus/default.nix
··· 1 - {lib, stdenv, fetchpatch, fetchFromGitHub, cmake, boost, gmp, htslib, zlib, lzma, pkg-config}: 1 + {lib, stdenv, fetchpatch, fetchFromGitHub, cmake, boost, gmp, htslib, zlib, xz, pkg-config}: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "octopus"; ··· 24 24 ]; 25 25 26 26 nativeBuildInputs = [ cmake pkg-config ]; 27 - buildInputs = [ boost gmp htslib zlib lzma ]; 27 + buildInputs = [ boost gmp htslib zlib xz ]; 28 28 29 29 postInstall = '' 30 30 mkdir $out/bin
+2 -2
pkgs/applications/science/biology/svaba/default.nix
··· 1 - { lib, stdenv, zlib, bzip2, lzma, fetchFromGitHub } : 1 + { lib, stdenv, zlib, bzip2, xz, fetchFromGitHub } : 2 2 3 3 stdenv.mkDerivation rec { 4 4 version = "1.1.0"; ··· 12 12 fetchSubmodules = true; 13 13 }; 14 14 15 - buildInputs = [ zlib bzip2 lzma ]; 15 + buildInputs = [ zlib bzip2 xz ]; 16 16 17 17 installPhase = '' 18 18 runHook preInstall
+2 -2
pkgs/applications/science/electronics/tkgate/1.x.nix
··· 1 - { lib, stdenv, fetchurl, tcl, tk, libX11, glibc, which, yacc, flex, imake, xorgproto, gccmakedep }: 1 + { lib, stdenv, fetchurl, tcl, tk, libX11, glibc, which, bison, flex, imake, xorgproto, gccmakedep }: 2 2 3 3 let 4 4 libiconvInc = lib.optionalString stdenv.isLinux "${glibc.dev}/include"; ··· 12 12 sha256 = "1pqywkidfpdbj18i03h97f4cimld4fb3mqfy8jjsxs12kihm18fs"; 13 13 }; 14 14 15 - nativeBuildInputs = [ which yacc flex imake gccmakedep ]; 15 + nativeBuildInputs = [ which bison flex imake gccmakedep ]; 16 16 buildInputs = [ tcl tk libX11 xorgproto ]; 17 17 dontUseImakeConfigure = true; 18 18
+2 -2
pkgs/applications/science/machine-learning/shogun/default.nix
··· 1 1 { stdenv, lib, fetchFromGitHub, fetchpatch, fetchurl, cmake, ctags, swig 2 2 # data, compression 3 - , bzip2, curl, hdf5, json_c, lzma, lzo, protobuf, snappy 3 + , bzip2, curl, hdf5, json_c, xz, lzo, protobuf, snappy 4 4 # maths 5 5 , blas, lapack, eigen, nlopt, lp_solve, colpack, glpk 6 6 # libraries ··· 67 67 68 68 nativeBuildInputs = [ cmake ]; 69 69 buildInputs = with lib; [ 70 - blas lapack bzip2 colpack curl ctags eigen hdf5 json_c lp_solve lzma lzo 70 + blas lapack bzip2 colpack curl ctags eigen hdf5 json_c lp_solve xz lzo 71 71 protobuf nlopt snappy swig (libarchive.dev) libxml2 lapack glpk 72 72 ] 73 73 ++ optionals (pythonSupport) (with pythonPackages; [ python ply numpy ])
+2 -2
pkgs/applications/science/misc/root/5.nix
··· 1 1 { lib, stdenv, fetchurl, fetchpatch, cmake, pcre, pkg-config, python2 2 - , libX11, libXpm, libXft, libXext, libGLU, libGL, zlib, libxml2, lz4, lzma, gsl_1, xxHash 2 + , libX11, libXpm, libXft, libXext, libGLU, libGL, zlib, libxml2, lz4, xz, gsl_1, xxHash 3 3 , Cocoa, OpenGL, noSplash ? false }: 4 4 5 5 stdenv.mkDerivation rec { ··· 12 12 }; 13 13 14 14 nativeBuildInputs = [ cmake pkg-config ]; 15 - buildInputs = [ pcre python2 zlib libxml2 lz4 lzma gsl_1 xxHash ] 15 + buildInputs = [ pcre python2 zlib libxml2 lz4 xz gsl_1 xxHash ] 16 16 ++ lib.optionals (!stdenv.isDarwin) [ libX11 libXpm libXft libXext libGLU libGL ] 17 17 ++ lib.optionals (stdenv.isDarwin) [ Cocoa OpenGL ] 18 18 ;
+2 -2
pkgs/applications/science/misc/root/default.nix
··· 1 1 { stdenv, lib, fetchurl, makeWrapper, cmake, ftgl, gl2ps, glew, gsl, llvm_5 2 - , libX11, libXpm, libXft, libXext, libGLU, libGL, libxml2, lz4, lzma, pcre 2 + , libX11, libXpm, libXft, libXext, libGLU, libGL, libxml2, lz4, xz, pcre 3 3 , pkg-config, python, xxHash, zlib, zstd 4 4 , libAfterImage, giflib, libjpeg, libtiff, libpng 5 5 , Cocoa, OpenGL, noSplash ? false }: ··· 14 14 }; 15 15 16 16 nativeBuildInputs = [ makeWrapper cmake pkg-config ]; 17 - buildInputs = [ ftgl gl2ps glew pcre zlib zstd llvm_5 libxml2 lz4 lzma gsl xxHash libAfterImage giflib libjpeg libtiff libpng python.pkgs.numpy ] 17 + buildInputs = [ ftgl gl2ps glew pcre zlib zstd llvm_5 libxml2 lz4 xz gsl xxHash libAfterImage giflib libjpeg libtiff libpng python.pkgs.numpy ] 18 18 ++ lib.optionals (!stdenv.isDarwin) [ libX11 libXpm libXft libXext libGLU libGL ] 19 19 ++ lib.optionals (stdenv.isDarwin) [ Cocoa OpenGL ] 20 20 ;
+2 -2
pkgs/applications/version-management/monotone-viz/default.nix
··· 1 1 { lib, stdenv, fetchurl, ocamlPackages, gnome2, pkg-config, makeWrapper, glib 2 - , libtool, libpng, yacc, expat, fontconfig, gd, pango, libjpeg, libwebp, xlibsWrapper, libXaw 2 + , libtool, libpng, bison, expat, fontconfig, gd, pango, libjpeg, libwebp, xlibsWrapper, libXaw 3 3 }: 4 4 # We need an old version of Graphviz for format compatibility reasons. 5 5 # This version is vulnerable, but monotone-viz will never feed it bad input. 6 6 let graphviz_2_0 = import ./graphviz-2.0.nix { 7 7 inherit lib stdenv fetchurl pkg-config xlibsWrapper libpng libjpeg expat libXaw 8 - yacc libtool fontconfig pango gd libwebp; 8 + bison libtool fontconfig pango gd libwebp; 9 9 }; in 10 10 let inherit (gnome2) libgnomecanvas; in 11 11 let inherit (ocamlPackages) ocaml lablgtk camlp4; in
+2 -2
pkgs/applications/version-management/monotone-viz/graphviz-2.0.nix
··· 1 1 { lib, stdenv, fetchurl, pkg-config, xlibsWrapper, libpng, libjpeg, expat, libXaw 2 - , yacc, libtool, fontconfig, pango, gd, libwebp 2 + , bison, libtool, fontconfig, pango, gd, libwebp 3 3 }: 4 4 5 5 stdenv.mkDerivation rec { ··· 12 12 13 13 nativeBuildInputs = [ pkg-config ]; 14 14 buildInputs = [ 15 - xlibsWrapper libpng libjpeg expat libXaw yacc 15 + xlibsWrapper libpng libjpeg expat libXaw bison 16 16 libtool fontconfig pango gd libwebp 17 17 ]; 18 18
+2 -2
pkgs/applications/video/handbrake/default.nix
··· 9 9 10 10 { stdenv, lib, fetchFromGitHub, 11 11 # Main build tools 12 - pkg-config, autoconf, automake, libtool, m4, lzma, python3, 12 + pkg-config, autoconf, automake, libtool, m4, xz, python3, 13 13 numactl, 14 14 # Processing, video codecs, containers 15 15 ffmpeg-full, nv-codec-headers, libogg, x264, x265, libvpx, libtheora, dav1d, ··· 100 100 ffmpeg-full libogg libtheora x264 x265 libvpx dav1d 101 101 libopus lame libvorbis a52dec speex libsamplerate 102 102 libiconv fribidi fontconfig freetype libass jansson libxml2 harfbuzz 103 - libdvdread libdvdnav libdvdcss libbluray lzma 103 + libdvdread libdvdnav libdvdcss libbluray xz 104 104 ] ++ lib.optional (!stdenv.isDarwin) numactl 105 105 ++ lib.optionals useGtk [ 106 106 glib gtk3 libappindicator-gtk3 libnotify
+2 -2
pkgs/applications/video/kodi-packages/vfs-libarchive/default.nix
··· 1 - { lib, rel, buildKodiBinaryAddon, fetchFromGitHub, libarchive, lzma, bzip2, zlib, lz4, lzo, openssl }: 1 + { lib, rel, buildKodiBinaryAddon, fetchFromGitHub, libarchive, xz, bzip2, zlib, lz4, lzo, openssl }: 2 2 buildKodiBinaryAddon rec { 3 3 pname = namespace; 4 4 namespace = "vfs.libarchive"; ··· 11 11 sha256 = "1q62p1i6rvqk2zv6f1cpffkh95lgclys2xl4dwyhj3acmqdxd9i5"; 12 12 }; 13 13 14 - extraBuildInputs = [ libarchive lzma bzip2 zlib lz4 lzo openssl ]; 14 + extraBuildInputs = [ libarchive xz bzip2 zlib lz4 lzo openssl ]; 15 15 16 16 meta = with lib; { 17 17 description = "LibArchive Virtual Filesystem add-on for Kodi";
+560
pkgs/applications/video/kodi/packages.nix
··· 1 + { lib, stdenv, callPackage, fetchFromGitHub 2 + , cmake, kodi, libcec_platform, tinyxml, pugixml 3 + , steam, udev, libusb1, jsoncpp, libhdhomerun, zlib 4 + , python3Packages, expat, glib, nspr, nss, openssl 5 + , libssh, libarchive, xz, bzip2, lz4, lzo }: 6 + 7 + with lib; 8 + 9 + let self = rec { 10 + 11 + addonDir = "/share/kodi/addons"; 12 + rel = "Matrix"; 13 + 14 + inherit kodi; 15 + 16 + # Convert derivation to a kodi module. Stolen from ../../../top-level/python-packages.nix 17 + toKodiAddon = drv: drv.overrideAttrs(oldAttrs: { 18 + # Use passthru in order to prevent rebuilds when possible. 19 + passthru = (oldAttrs.passthru or {})// { 20 + kodiAddonFor = kodi; 21 + requiredKodiAddons = requiredKodiAddons drv.propagatedBuildInputs; 22 + }; 23 + }); 24 + 25 + # Check whether a derivation provides a Kodi addon. 26 + hasKodiAddon = drv: drv ? kodiAddonFor && drv.kodiAddonFor == kodi; 27 + 28 + # Get list of required Kodi addons given a list of derivations. 29 + requiredKodiAddons = drvs: let 30 + modules = filter hasKodiAddon drvs; 31 + in unique (modules ++ concatLists (catAttrs "requiredKodiAddons" modules)); 32 + 33 + kodi-platform = stdenv.mkDerivation rec { 34 + project = "kodi-platform"; 35 + version = "17.1"; 36 + name = "${project}-${version}"; 37 + 38 + src = fetchFromGitHub { 39 + owner = "xbmc"; 40 + repo = project; 41 + rev = "c8188d82678fec6b784597db69a68e74ff4986b5"; 42 + sha256 = "1r3gs3c6zczmm66qcxh9mr306clwb3p7ykzb70r3jv5jqggiz199"; 43 + }; 44 + 45 + nativeBuildInputs = [ cmake ]; 46 + buildInputs = [ kodi libcec_platform tinyxml ]; 47 + }; 48 + 49 + buildKodiAddon = 50 + { name ? "${attrs.pname}-${attrs.version}" 51 + , namespace 52 + , sourceDir ? "" 53 + , ... } @ attrs: 54 + toKodiAddon (stdenv.mkDerivation ({ 55 + name = "kodi-" + name; 56 + 57 + dontStrip = true; 58 + 59 + extraRuntimeDependencies = [ ]; 60 + 61 + installPhase = '' 62 + cd $src/$sourceDir 63 + d=$out${addonDir}/${namespace} 64 + mkdir -p $d 65 + sauce="." 66 + [ -d ${namespace} ] && sauce=${namespace} 67 + cp -R "$sauce/"* $d 68 + ''; 69 + } // attrs)); 70 + 71 + buildKodiBinaryAddon = 72 + { name ? "${attrs.pname}-${attrs.version}" 73 + , namespace 74 + , version 75 + , extraBuildInputs ? [] 76 + , extraRuntimeDependencies ? [] 77 + , extraInstallPhase ? "", ... } @ attrs: 78 + toKodiAddon (stdenv.mkDerivation ({ 79 + name = "kodi-" + name; 80 + 81 + dontStrip = true; 82 + 83 + nativeBuildInputs = [ cmake ]; 84 + buildInputs = [ kodi kodi-platform libcec_platform ] ++ extraBuildInputs; 85 + 86 + inherit extraRuntimeDependencies; 87 + 88 + # disables check ensuring install prefix is that of kodi 89 + cmakeFlags = [ 90 + "-DOVERRIDE_PATHS=1" 91 + ]; 92 + 93 + # kodi checks for addon .so libs existance in the addon folder (share/...) 94 + # and the non-wrapped kodi lib/... folder before even trying to dlopen 95 + # them. Symlinking .so, as setting LD_LIBRARY_PATH is of no use 96 + installPhase = let n = namespace; in '' 97 + make install 98 + ln -s $out/lib/addons/${n}/${n}.so.${version} $out${addonDir}/${n}/${n}.so.${version} 99 + ${extraInstallPhase} 100 + ''; 101 + } // attrs)); 102 + 103 + advanced-launcher = buildKodiAddon rec { 104 + 105 + pname = "advanced-launcher"; 106 + namespace = "plugin.program.advanced.launcher"; 107 + version = "2.5.8"; 108 + 109 + src = fetchFromGitHub { 110 + owner = "edwtjo"; 111 + repo = pname; 112 + rev = version; 113 + sha256 = "142vvgs37asq5m54xqhjzqvgmb0xlirvm0kz6lxaqynp0vvgrkx2"; 114 + }; 115 + 116 + meta = { 117 + homepage = "https://forum.kodi.tv/showthread.php?tid=85724"; 118 + description = "A program launcher for Kodi"; 119 + longDescription = '' 120 + Advanced Launcher allows you to start any Linux, Windows and 121 + macOS external applications (with command line support or not) 122 + directly from the Kodi GUI. Advanced Launcher also give you 123 + the possibility to edit, download (from Internet resources) 124 + and manage all the meta-data (informations and images) related 125 + to these applications. 126 + ''; 127 + platforms = platforms.all; 128 + maintainers = with maintainers; [ edwtjo ]; 129 + broken = true; # requires port to python3 130 + }; 131 + 132 + }; 133 + 134 + advanced-emulator-launcher = buildKodiAddon rec { 135 + 136 + pname = "advanced-emulator-launcher"; 137 + namespace = "plugin.program.advanced.emulator.launcher"; 138 + version = "0.9.6"; 139 + 140 + src = fetchFromGitHub { 141 + owner = "Wintermute0110"; 142 + repo = namespace; 143 + rev = version; 144 + sha256 = "1sv9z77jj6bam6llcnd9b3dgkbvhwad2m1v541rv3acrackms2z2"; 145 + }; 146 + 147 + meta = { 148 + homepage = "https://forum.kodi.tv/showthread.php?tid=287826"; 149 + description = "A program launcher for Kodi"; 150 + longDescription = '' 151 + Advanced Emulator Launcher is a multi-emulator front-end for Kodi 152 + scalable to collections of thousands of ROMs. Includes offline scrapers 153 + for MAME and No-Intro ROM sets and also supports scrapping ROM metadata 154 + and artwork online. ROM auditing for No-Intro ROMs using No-Intro XML 155 + DATs. Launching of games and standalone applications is also available. 156 + ''; 157 + platforms = platforms.all; 158 + maintainers = with maintainers; [ edwtjo ]; 159 + broken = true; # requires port to python3 160 + }; 161 + 162 + }; 163 + 164 + controllers = let 165 + pname = "game-controller"; 166 + version = "1.0.3"; 167 + 168 + src = fetchFromGitHub { 169 + owner = "kodi-game"; 170 + repo = "kodi-game-controllers"; 171 + rev = "01acb5b6e8b85392b3cb298b034aadb1b24ccf18"; 172 + sha256 = "0sbc0w0fwbp7rbmbgb6a1kglhnn5g85hijcbbvf5x6jdq9v3f1qb"; 173 + }; 174 + 175 + meta = { 176 + description = "Add support for different gaming controllers."; 177 + platforms = platforms.all; 178 + maintainers = with maintainers; [ edwtjo ]; 179 + }; 180 + 181 + mkController = controller: { 182 + ${controller} = buildKodiAddon rec { 183 + pname = pname + "-" + controller; 184 + namespace = "game.controller." + controller; 185 + sourceDir = "addons/" + namespace; 186 + inherit version src meta; 187 + }; 188 + }; 189 + in (mkController "default") 190 + // (mkController "dreamcast") 191 + // (mkController "gba") 192 + // (mkController "genesis") 193 + // (mkController "mouse") 194 + // (mkController "n64") 195 + // (mkController "nes") 196 + // (mkController "ps") 197 + // (mkController "snes"); 198 + 199 + hyper-launcher = let 200 + pname = "hyper-launcher"; 201 + version = "1.5.2"; 202 + src = fetchFromGitHub rec { 203 + name = pname + "-" + version + ".tar.gz"; 204 + owner = "teeedubb"; 205 + repo = owner + "-xbmc-repo"; 206 + rev = "f958ba93fe85b9c9025b1745d89c2db2e7dd9bf6"; 207 + sha256 = "1dvff24fbas25k5kvca4ssks9l1g5rfa3hl8lqxczkaqi3pp41j5"; 208 + }; 209 + meta = { 210 + homepage = "https://forum.kodi.tv/showthread.php?tid=258159"; 211 + description = "A ROM launcher for Kodi that uses HyperSpin assets."; 212 + maintainers = with maintainers; [ edwtjo ]; 213 + broken = true; # requires port to python3 214 + }; 215 + in { 216 + service = buildKodiAddon { 217 + pname = pname + "-service"; 218 + version = "1.2.1"; 219 + namespace = "service.hyper.launcher"; 220 + inherit src meta; 221 + }; 222 + plugin = buildKodiAddon { 223 + namespace = "plugin.hyper.launcher"; 224 + inherit pname version src meta; 225 + }; 226 + }; 227 + 228 + joystick = buildKodiBinaryAddon rec { 229 + pname = namespace; 230 + namespace = "peripheral.joystick"; 231 + version = "1.7.1"; 232 + 233 + src = fetchFromGitHub { 234 + owner = "xbmc"; 235 + repo = namespace; 236 + rev = "${version}-${rel}"; 237 + sha256 = "1dhj4afr9kj938xx70fq5r409mz6lbw4n581ljvdjj9lq7akc914"; 238 + }; 239 + 240 + meta = { 241 + description = "Binary addon for raw joystick input."; 242 + platforms = platforms.all; 243 + maintainers = with maintainers; [ edwtjo ]; 244 + }; 245 + 246 + extraBuildInputs = [ tinyxml udev ]; 247 + }; 248 + 249 + simpleplugin = buildKodiAddon rec { 250 + pname = "simpleplugin"; 251 + namespace = "script.module.simpleplugin"; 252 + version = "2.3.2"; 253 + 254 + src = fetchFromGitHub { 255 + owner = "romanvm"; 256 + repo = namespace; 257 + rev = "v.${version}"; 258 + sha256 = "0myar8dqjigb75pcc8zx3i5z79p1ifgphgb82s5syqywk0zaxm3j"; 259 + }; 260 + 261 + meta = { 262 + homepage = src.meta.homepage; 263 + description = "Simpleplugin API"; 264 + license = licenses.gpl3; 265 + broken = true; # requires port to python3 266 + }; 267 + }; 268 + 269 + svtplay = buildKodiAddon rec { 270 + 271 + pname = "svtplay"; 272 + namespace = "plugin.video.svtplay"; 273 + version = "5.1.12"; 274 + 275 + src = fetchFromGitHub { 276 + name = pname + "-" + version + ".tar.gz"; 277 + owner = "nilzen"; 278 + repo = "xbmc-" + pname; 279 + rev = "v${version}"; 280 + sha256 = "04j1nhm7mh9chs995lz6bv1vsq5xzk7a7c0lmk4bnfv8jrfpj0w6"; 281 + }; 282 + 283 + meta = { 284 + homepage = "https://forum.kodi.tv/showthread.php?tid=67110"; 285 + description = "Watch content from SVT Play"; 286 + longDescription = '' 287 + With this addon you can stream content from SVT Play 288 + (svtplay.se). The plugin fetches the video URL from the SVT 289 + Play website and feeds it to the Kodi video player. HLS (m3u8) 290 + is the preferred video format by the plugin. 291 + ''; 292 + platforms = platforms.all; 293 + maintainers = with maintainers; [ edwtjo ]; 294 + }; 295 + 296 + }; 297 + 298 + steam-controller = buildKodiBinaryAddon rec { 299 + pname = namespace; 300 + namespace = "peripheral.steamcontroller"; 301 + version = "0.11.0"; 302 + 303 + src = fetchFromGitHub { 304 + owner = "kodi-game"; 305 + repo = namespace; 306 + rev = "f68140ca44f163a03d3a625d1f2005a6edef96cb"; 307 + sha256 = "09lm8i119xlsxxk0c64rnp8iw0crr90v7m8iwi9r31qdmxrdxpmg"; 308 + }; 309 + 310 + extraBuildInputs = [ libusb1 ]; 311 + 312 + meta = { 313 + description = "Binary addon for steam controller."; 314 + platforms = platforms.all; 315 + maintainers = with maintainers; [ edwtjo ]; 316 + }; 317 + 318 + }; 319 + 320 + steam-launcher = buildKodiAddon { 321 + 322 + pname = "steam-launcher"; 323 + namespace = "script.steam.launcher"; 324 + version = "3.5.1"; 325 + 326 + src = fetchFromGitHub rec { 327 + owner = "teeedubb"; 328 + repo = owner + "-xbmc-repo"; 329 + rev = "8260bf9b464846a1f1965da495d2f2b7ceb81d55"; 330 + sha256 = "1fj3ry5s44nf1jzxk4bmnpa4b9p23nrpmpj2a4i6xf94h7jl7p5k"; 331 + }; 332 + 333 + propagatedBuildInputs = [ steam ]; 334 + 335 + meta = { 336 + homepage = "https://forum.kodi.tv/showthread.php?tid=157499"; 337 + description = "Launch Steam in Big Picture Mode from Kodi"; 338 + longDescription = '' 339 + This add-on will close/minimise Kodi, launch Steam in Big 340 + Picture Mode and when Steam BPM is exited (either by quitting 341 + Steam or returning to the desktop) Kodi will 342 + restart/maximise. Running pre/post Steam scripts can be 343 + configured via the addon. 344 + ''; 345 + maintainers = with maintainers; [ edwtjo ]; 346 + }; 347 + }; 348 + 349 + pdfreader = buildKodiAddon rec { 350 + pname = "pdfreader"; 351 + namespace = "plugin.image.pdf"; 352 + version = "2.0.2"; 353 + 354 + src = fetchFromGitHub { 355 + owner = "i96751414"; 356 + repo = "plugin.image.pdfreader"; 357 + rev = "v${version}"; 358 + sha256 = "0nkqhlm1gyagq6xpdgqvd5qxyr2ngpml9smdmzfabc8b972mwjml"; 359 + }; 360 + 361 + meta = { 362 + homepage = "https://forum.kodi.tv/showthread.php?tid=187421"; 363 + description = "A comic book reader"; 364 + maintainers = with maintainers; [ edwtjo ]; 365 + }; 366 + }; 367 + 368 + pvr-hts = buildKodiBinaryAddon rec { 369 + 370 + pname = "pvr-hts"; 371 + namespace = "pvr.hts"; 372 + version = "8.2.2"; 373 + 374 + src = fetchFromGitHub { 375 + owner = "kodi-pvr"; 376 + repo = "pvr.hts"; 377 + rev = "${version}-${rel}"; 378 + sha256 = "0jnn9gfjl556acqjf92wzzn371gxymhbbi665nqgg2gjcan0a49q"; 379 + }; 380 + 381 + meta = { 382 + homepage = "https://github.com/kodi-pvr/pvr.hts"; 383 + description = "Kodi's Tvheadend HTSP client addon"; 384 + platforms = platforms.all; 385 + maintainers = with maintainers; [ cpages ]; 386 + }; 387 + 388 + }; 389 + 390 + pvr-hdhomerun = buildKodiBinaryAddon rec { 391 + 392 + pname = "pvr-hdhomerun"; 393 + namespace = "pvr.hdhomerun"; 394 + version = "7.1.0"; 395 + 396 + src = fetchFromGitHub { 397 + owner = "kodi-pvr"; 398 + repo = "pvr.hdhomerun"; 399 + rev = "${version}-${rel}"; 400 + sha256 = "0gbwjssnd319csq2kwlyjj1rskg19m1dxac5dl2dymvx5hn3zrgm"; 401 + }; 402 + 403 + meta = { 404 + homepage = "https://github.com/kodi-pvr/pvr.hdhomerun"; 405 + description = "Kodi's HDHomeRun PVR client addon"; 406 + platforms = platforms.all; 407 + maintainers = with maintainers; [ titanous ]; 408 + }; 409 + 410 + extraBuildInputs = [ jsoncpp libhdhomerun ]; 411 + 412 + }; 413 + 414 + pvr-iptvsimple = buildKodiBinaryAddon rec { 415 + 416 + pname = "pvr-iptvsimple"; 417 + namespace = "pvr.iptvsimple"; 418 + version = "7.4.2"; 419 + 420 + src = fetchFromGitHub { 421 + owner = "kodi-pvr"; 422 + repo = "pvr.iptvsimple"; 423 + rev = "${version}-${rel}"; 424 + sha256 = "062i922qi0izkvn7v47yhyy2cf3fa7xc3k95b1gm9abfdwkk8ywr"; 425 + }; 426 + 427 + meta = { 428 + homepage = "https://github.com/kodi-pvr/pvr.iptvsimple"; 429 + description = "Kodi's IPTV Simple client addon"; 430 + platforms = platforms.all; 431 + maintainers = with maintainers; [ ]; 432 + license = licenses.gpl2Plus; 433 + }; 434 + 435 + extraBuildInputs = [ zlib pugixml ]; 436 + }; 437 + 438 + osmc-skin = buildKodiAddon rec { 439 + 440 + pname = "osmc-skin"; 441 + namespace = "skin.osmc"; 442 + version = "18.0.0"; 443 + 444 + src = fetchFromGitHub { 445 + owner = "osmc"; 446 + repo = namespace; 447 + rev = "40a6c318641e2cbeac58fb0e7dde9c2beac737a0"; 448 + sha256 = "1l7hyfj5zvjxjdm94y325bmy1naak455b9l8952sb0gllzrcwj6s"; 449 + }; 450 + 451 + meta = { 452 + homepage = "https://github.com/osmc/skin.osmc"; 453 + description = "The default skin for OSMC"; 454 + platforms = platforms.all; 455 + maintainers = with maintainers; [ worldofpeace ]; 456 + license = licenses.cc-by-nc-sa-30; 457 + }; 458 + }; 459 + 460 + yatp = python3Packages.toPythonModule (buildKodiAddon rec { 461 + pname = "yatp"; 462 + namespace = "plugin.video.yatp"; 463 + version = "3.3.2"; 464 + 465 + src = fetchFromGitHub { 466 + owner = "romanvm"; 467 + repo = "kodi.yatp"; 468 + rev = "v.${version}"; 469 + sha256 = "12g1f57sx7dy6wy7ljl7siz2qs1kxcmijcg7xx2xpvmq61x9qa2d"; 470 + }; 471 + 472 + patches = [ ./yatp/dont-monkey.patch ]; 473 + 474 + propagatedBuildInputs = [ 475 + simpleplugin 476 + python3Packages.requests 477 + python3Packages.libtorrent-rasterbar 478 + ]; 479 + 480 + meta = { 481 + homepage = src.meta.homepage; 482 + description = "Yet Another Torrent Player: libtorrent-based torrent streaming for Kodi"; 483 + license = licenses.gpl3; 484 + broken = true; # requires port to python3 485 + }; 486 + }); 487 + 488 + inputstream-adaptive = buildKodiBinaryAddon rec { 489 + 490 + pname = "inputstream-adaptive"; 491 + namespace = "inputstream.adaptive"; 492 + version = "2.6.7"; 493 + 494 + src = fetchFromGitHub { 495 + owner = "peak3d"; 496 + repo = "inputstream.adaptive"; 497 + rev = "${version}-${rel}"; 498 + sha256 = "1pwqmbr78wp12jn6rwv63npdfc456adwz0amlxf6gvgg43li6p7s"; 499 + }; 500 + 501 + extraBuildInputs = [ expat ]; 502 + 503 + extraRuntimeDependencies = [ glib nspr nss stdenv.cc.cc.lib ]; 504 + 505 + extraInstallPhase = let n = namespace; in '' 506 + ln -s $out/lib/addons/${n}/libssd_wv.so $out/${addonDir}/${n}/libssd_wv.so 507 + ''; 508 + 509 + meta = { 510 + homepage = "https://github.com/peak3d/inputstream.adaptive"; 511 + description = "Kodi inputstream addon for several manifest types"; 512 + platforms = platforms.all; 513 + maintainers = with maintainers; [ sephalon ]; 514 + }; 515 + }; 516 + 517 + vfs-sftp = buildKodiBinaryAddon rec { 518 + pname = namespace; 519 + namespace = "vfs.sftp"; 520 + version = "2.0.0"; 521 + 522 + src = fetchFromGitHub { 523 + owner = "xbmc"; 524 + repo = namespace; 525 + rev = "${version}-${rel}"; 526 + sha256 = "06w74sh8yagrrp7a7rjaz3xrh1j3wdqald9c4b72c33gpk5997dk"; 527 + }; 528 + 529 + meta = with lib; { 530 + description = "SFTP Virtual Filesystem add-on for Kodi"; 531 + license = licenses.gpl2Plus; 532 + platforms = platforms.all; 533 + maintainers = with maintainers; [ minijackson ]; 534 + }; 535 + 536 + extraBuildInputs = [ openssl libssh zlib ]; 537 + }; 538 + 539 + vfs-libarchive = buildKodiBinaryAddon rec { 540 + pname = namespace; 541 + namespace = "vfs.libarchive"; 542 + version = "2.0.0"; 543 + 544 + src = fetchFromGitHub { 545 + owner = "xbmc"; 546 + repo = namespace; 547 + rev = "${version}-${rel}"; 548 + sha256 = "1q62p1i6rvqk2zv6f1cpffkh95lgclys2xl4dwyhj3acmqdxd9i5"; 549 + }; 550 + 551 + meta = with lib; { 552 + description = "LibArchive Virtual Filesystem add-on for Kodi"; 553 + license = licenses.gpl2Plus; 554 + platforms = platforms.all; 555 + maintainers = with maintainers; [ minijackson ]; 556 + }; 557 + 558 + extraBuildInputs = [ libarchive xz bzip2 zlib lz4 lzo openssl ]; 559 + }; 560 + }; in self
+2 -2
pkgs/applications/virtualization/docker/default.nix
··· 13 13 , stdenv, fetchFromGitHub, fetchpatch, buildGoPackage 14 14 , makeWrapper, installShellFiles, pkg-config 15 15 , go-md2man, go, containerd, runc, docker-proxy, tini, libtool 16 - , sqlite, iproute, lvm2, systemd, docker-buildx 16 + , sqlite, iproute2, lvm2, systemd, docker-buildx 17 17 , btrfs-progs, iptables, e2fsprogs, xz, util-linux, xfsprogs, git 18 18 , procps, libseccomp 19 19 , nixosTests ··· 72 72 nativeBuildInputs = [ makeWrapper pkg-config go-md2man go libtool installShellFiles ]; 73 73 buildInputs = [ sqlite lvm2 btrfs-progs systemd libseccomp ]; 74 74 75 - extraPath = optionals (stdenv.isLinux) (makeBinPath [ iproute iptables e2fsprogs xz xfsprogs procps util-linux git ]); 75 + extraPath = optionals (stdenv.isLinux) (makeBinPath [ iproute2 iptables e2fsprogs xz xfsprogs procps util-linux git ]); 76 76 77 77 buildPhase = '' 78 78 export GOCACHE="$TMPDIR/go-cache"
+2 -2
pkgs/applications/virtualization/gvisor/default.nix
··· 5 5 , git 6 6 , glibcLocales 7 7 , go 8 - , iproute 8 + , iproute2 9 9 , iptables 10 10 , makeWrapper 11 11 , procps ··· 87 87 88 88 # Needed for the 'runsc do' subcomand 89 89 wrapProgram $out/bin/runsc \ 90 - --prefix PATH : ${lib.makeBinPath [ iproute iptables procps ]} 90 + --prefix PATH : ${lib.makeBinPath [ iproute2 iptables procps ]} 91 91 ''; 92 92 }; 93 93
+2 -2
pkgs/applications/virtualization/open-vm-tools/default.nix
··· 1 1 { stdenv, lib, fetchFromGitHub, makeWrapper, autoreconfHook, 2 2 fuse, libmspack, openssl, pam, xercesc, icu, libdnet, procps, libtirpc, rpcsvc-proto, 3 3 libX11, libXext, libXinerama, libXi, libXrender, libXrandr, libXtst, 4 - pkg-config, glib, gdk-pixbuf-xlib, gtk3, gtkmm3, iproute, dbus, systemd, which, 4 + pkg-config, glib, gdk-pixbuf-xlib, gtk3, gtkmm3, iproute2, dbus, systemd, which, 5 5 withX ? true }: 6 6 7 7 stdenv.mkDerivation rec { ··· 59 59 60 60 postInstall = '' 61 61 wrapProgram "$out/etc/vmware-tools/scripts/vmware/network" \ 62 - --prefix PATH ':' "${lib.makeBinPath [ iproute dbus systemd which ]}" 62 + --prefix PATH ':' "${lib.makeBinPath [ iproute2 dbus systemd which ]}" 63 63 ''; 64 64 65 65 meta = with lib; {
+2 -2
pkgs/applications/virtualization/x11docker/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, makeWrapper, nx-libs, xorg, getopt, gnugrep, gawk, ps, mount, iproute }: 1 + { lib, stdenv, fetchFromGitHub, makeWrapper, nx-libs, xorg, getopt, gnugrep, gawk, ps, mount, iproute2 }: 2 2 stdenv.mkDerivation rec { 3 3 pname = "x11docker"; 4 4 version = "6.6.2"; ··· 16 16 installPhase = '' 17 17 install -D x11docker "$out/bin/x11docker"; 18 18 wrapProgram "$out/bin/x11docker" \ 19 - --prefix PATH : "${lib.makeBinPath [ getopt gnugrep gawk ps mount iproute nx-libs xorg.xdpyinfo xorg.xhost xorg.xinit ]}" 19 + --prefix PATH : "${lib.makeBinPath [ getopt gnugrep gawk ps mount iproute2 nx-libs xorg.xdpyinfo xorg.xhost xorg.xinit ]}" 20 20 ''; 21 21 22 22 meta = {
+2 -2
pkgs/applications/virtualization/xen/generic.nix
··· 13 13 14 14 # Scripts 15 15 , coreutils, gawk, gnused, gnugrep, diffutils, multipath-tools 16 - , iproute, inetutils, iptables, bridge-utils, openvswitch, nbd, drbd 16 + , iproute2, inetutils, iptables, bridge-utils, openvswitch, nbd, drbd 17 17 , lvm2, util-linux, procps, systemd 18 18 19 19 # Documentation ··· 31 31 scriptEnvPath = concatMapStringsSep ":" (x: "${x}/bin") [ 32 32 which perl 33 33 coreutils gawk gnused gnugrep diffutils util-linux multipath-tools 34 - iproute inetutils iptables bridge-utils openvswitch nbd drbd 34 + iproute2 inetutils iptables bridge-utils openvswitch nbd drbd 35 35 ]; 36 36 37 37 withXenfiles = f: concatStringsSep "\n" (mapAttrsToList f config.xenfiles);
+2 -2
pkgs/applications/window-managers/cwm/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, libX11, libXinerama, libXrandr, libXft, yacc, pkg-config }: 1 + { lib, stdenv, fetchFromGitHub, libX11, libXinerama, libXrandr, libXft, bison, pkg-config }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 ··· 13 13 }; 14 14 15 15 nativeBuildInputs = [ pkg-config ]; 16 - buildInputs = [ libX11 libXinerama libXrandr libXft yacc ]; 16 + buildInputs = [ libX11 libXinerama libXrandr libXft bison ]; 17 17 18 18 prePatch = ''sed -i "s@/usr/local@$out@" Makefile''; 19 19
+2 -2
pkgs/applications/window-managers/dwm/dwm-status.nix
··· 1 1 { lib, rustPlatform, fetchFromGitHub, dbus, gdk-pixbuf, libnotify, makeWrapper, pkg-config, xorg 2 2 , enableAlsaUtils ? true, alsaUtils, coreutils 3 - , enableNetwork ? true, dnsutils, iproute, wirelesstools }: 3 + , enableNetwork ? true, dnsutils, iproute2, wirelesstools }: 4 4 5 5 let 6 6 bins = lib.optionals enableAlsaUtils [ alsaUtils coreutils ] 7 - ++ lib.optionals enableNetwork [ dnsutils iproute wirelesstools ]; 7 + ++ lib.optionals enableNetwork [ dnsutils iproute2 wirelesstools ]; 8 8 in 9 9 10 10 rustPlatform.buildRustPackage rec {
+3 -3
pkgs/applications/window-managers/i3/blocks-gaps.nix
··· 1 1 { fetchFromGitHub, lib, stdenv, perl, makeWrapper 2 - , iproute, acpi, sysstat, alsaUtils 2 + , iproute2, acpi, sysstat, alsaUtils 3 3 , scripts ? [ "bandwidth" "battery" "cpu_usage" "disk" "iface" 4 4 "load_average" "memory" "volume" "wifi" ] 5 5 }: ··· 30 30 31 31 postFixup = '' 32 32 wrapProgram $out/libexec/i3blocks/bandwidth \ 33 - --prefix PATH : ${makeBinPath (optional (elem "bandwidth" scripts) iproute)} 33 + --prefix PATH : ${makeBinPath (optional (elem "bandwidth" scripts) iproute2)} 34 34 wrapProgram $out/libexec/i3blocks/battery \ 35 35 --prefix PATH : ${makeBinPath (optional (elem "battery" scripts) acpi)} 36 36 wrapProgram $out/libexec/i3blocks/cpu_usage \ 37 37 --prefix PATH : ${makeBinPath (optional (elem "cpu_usage" scripts) sysstat)} 38 38 wrapProgram $out/libexec/i3blocks/iface \ 39 - --prefix PATH : ${makeBinPath (optional (elem "iface" scripts) iproute)} 39 + --prefix PATH : ${makeBinPath (optional (elem "iface" scripts) iproute2)} 40 40 wrapProgram $out/libexec/i3blocks/volume \ 41 41 --prefix PATH : ${makeBinPath (optional (elem "volume" scripts) alsaUtils)} 42 42 '';
+1 -1
pkgs/build-support/vm/default.nix
··· 573 573 buildCommand = '' 574 574 ${createRootFS} 575 575 576 - PATH=$PATH:${lib.makeBinPath [ dpkg dpkg glibc lzma ]} 576 + PATH=$PATH:${lib.makeBinPath [ dpkg dpkg glibc xz ]} 577 577 578 578 # Unpack the .debs. We do this to prevent pre-install scripts 579 579 # (which have lots of circular dependencies) from barfing.
+2 -2
pkgs/desktops/gnome-3/core/evolution-data-server/default.nix
··· 1 1 { fetchurl, lib, stdenv, substituteAll, pkg-config, gnome3, python3, gobject-introspection 2 2 , intltool, libsoup, libxml2, libsecret, icu, sqlite, tzdata, libcanberra-gtk3, gcr, p11-kit 3 3 , db, nspr, nss, libical, gperf, wrapGAppsHook, glib-networking, pcre, vala, cmake, ninja 4 - , kerberos, openldap, webkitgtk, libaccounts-glib, json-glib, glib, gtk3, libphonenumber 4 + , libkrb5, openldap, webkitgtk, libaccounts-glib, json-glib, glib, gtk3, libphonenumber 5 5 , gnome-online-accounts, libgweather, libgdata, gsettings-desktop-schemas, boost, protobuf }: 6 6 7 7 stdenv.mkDerivation rec { ··· 34 34 buildInputs = [ 35 35 glib libsoup libxml2 gtk3 gnome-online-accounts 36 36 gcr p11-kit libgweather libgdata libaccounts-glib json-glib 37 - icu sqlite kerberos openldap webkitgtk glib-networking 37 + icu sqlite libkrb5 openldap webkitgtk glib-networking 38 38 libcanberra-gtk3 pcre libphonenumber boost protobuf 39 39 ]; 40 40
+2 -2
pkgs/development/compilers/graalvm/default.nix
··· 1 1 { stdenv, lib, fetchFromGitHub, fetchurl, fetchzip, fetchgit, mercurial_4, python27, setJavaClassPath, 2 2 which, zlib, makeWrapper, openjdk, unzip, git, clang, llvm, icu, ruby, glibc, bash, gcc, libobjc, 3 - xcodebuild, gfortran, readline, bzip2, lzma, pcre, curl, ed, libresolv, libiconv, writeScriptBin, 3 + xcodebuild, gfortran, readline, bzip2, xz, pcre, curl, ed, libresolv, libiconv, writeScriptBin, 4 4 openssl, perl, CoreFoundation, Foundation, JavaNativeFoundation, JavaRuntimeSupport, JavaVM, Cocoa 5 5 }: 6 6 ··· 372 372 373 373 buildInputs = [ mx zlib.dev mercurial jvmci8 git llvm clang 374 374 python27withPackages icu ruby bzip2 which 375 - readline bzip2 lzma pcre curl ed gfortran 375 + readline bzip2 xz pcre curl ed gfortran 376 376 ] ++ lib.optional stdenv.isDarwin [ 377 377 CoreFoundation gcc.cc.lib libiconv perl openssl 378 378 ];
+2 -2
pkgs/development/interpreters/python/cpython/default.nix
··· 3 3 , expat 4 4 , libffi 5 5 , gdbm 6 - , lzma 6 + , xz 7 7 , mime-types ? null, mimetypesSupport ? true 8 8 , ncurses 9 9 , openssl ··· 103 103 ]; 104 104 105 105 buildInputs = filter (p: p != null) ([ 106 - zlib bzip2 expat lzma libffi gdbm sqlite readline ncurses openssl ] 106 + zlib bzip2 expat xz libffi gdbm sqlite readline ncurses openssl ] 107 107 ++ optionals x11Support [ tcl tk libX11 xorgproto ] 108 108 ++ optionals (bluezSupport && stdenv.isLinux) [ bluez ] 109 109 ++ optionals stdenv.isDarwin [ configd ])
+2 -2
pkgs/development/interpreters/python/pypy/default.nix
··· 1 1 { lib, stdenv, substituteAll, fetchurl 2 2 , zlib ? null, zlibSupport ? true, bzip2, pkg-config, libffi, libunwind, Security 3 3 , sqlite, openssl, ncurses, python, expat, tcl, tk, tix, xlibsWrapper, libX11 4 - , self, gdbm, db, lzma 4 + , self, gdbm, db, xz 5 5 , python-setup-hook 6 6 # For the Python package set 7 7 , packageOverrides ? (self: super: {}) ··· 53 53 buildInputs = [ 54 54 bzip2 openssl pythonForPypy libffi ncurses expat sqlite tk tcl xlibsWrapper libX11 gdbm db 55 55 ] ++ optionals isPy3k [ 56 - lzma 56 + xz 57 57 ] ++ optionals (stdenv ? cc && stdenv.cc.libc != null) [ 58 58 stdenv.cc.libc 59 59 ] ++ optionals zlibSupport [
+2 -2
pkgs/development/libraries/comedilib/default.nix
··· 3 3 , fetchFromGitHub 4 4 , autoreconfHook 5 5 , flex 6 - , yacc 6 + , bison 7 7 , xmlto 8 8 , docbook_xsl 9 9 , docbook_xml_dtd_44 ··· 26 26 nativeBuildInputs = [ 27 27 autoreconfHook 28 28 flex 29 - yacc 29 + bison 30 30 swig 31 31 xmlto 32 32 docbook_xml_dtd_44
+2 -2
pkgs/development/libraries/cyrus-sasl/default.nix
··· 1 - { lib, stdenv, fetchurl, openssl, openldap, kerberos, db, gettext 1 + { lib, stdenv, fetchurl, openssl, openldap, libkrb5, db, gettext 2 2 , pam, fixDarwinDylibNames, autoreconfHook, enableLdap ? false 3 3 , buildPackages, pruneLibtoolFiles, fetchpatch }: 4 4 ··· 22 22 nativeBuildInputs = [ autoreconfHook pruneLibtoolFiles ] 23 23 ++ lib.optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames; 24 24 buildInputs = 25 - [ openssl db gettext kerberos ] 25 + [ openssl db gettext libkrb5 ] 26 26 ++ lib.optional enableLdap openldap 27 27 ++ lib.optional stdenv.isLinux pam; 28 28
+3 -3
pkgs/development/libraries/ffmpeg-full/default.nix
··· 99 99 , libxcbshapeExtlib ? true # X11 grabbing shape rendering 100 100 , libXv ? null # Xlib support 101 101 , libXext ? null # Xlib support 102 - , lzma ? null # xz-utils 102 + , xz ? null # xz-utils 103 103 , nvenc ? !stdenv.isDarwin && !stdenv.isAarch64, nv-codec-headers ? null # NVIDIA NVENC support 104 104 , openal ? null # OpenAL 1.1 capture support 105 105 #, opencl ? null # OpenCL code ··· 381 381 (enableFeature libxcbshmExtlib "libxcb-shm") 382 382 (enableFeature libxcbxfixesExtlib "libxcb-xfixes") 383 383 (enableFeature libxcbshapeExtlib "libxcb-shape") 384 - (enableFeature (lzma != null) "lzma") 384 + (enableFeature (xz != null) "lzma") 385 385 (enableFeature nvenc "nvenc") 386 386 (enableFeature (openal != null) "openal") 387 387 #(enableFeature opencl "opencl") ··· 431 431 bzip2 celt dav1d fontconfig freetype frei0r fribidi game-music-emu gnutls gsm 432 432 libjack2 ladspaH lame libaom libass libbluray libbs2b libcaca libdc1394 libmodplug libmysofa 433 433 libogg libopus librsvg libssh libtheora libvdpau libvorbis libvpx libwebp libX11 434 - libxcb libXv libXext lzma openal openjpeg libpulseaudio rav1e svt-av1 rtmpdump opencore-amr 434 + libxcb libXv libXext xz openal openjpeg libpulseaudio rav1e svt-av1 rtmpdump opencore-amr 435 435 samba SDL2 soxr speex srt vid-stab vo-amrwbenc wavpack x264 x265 xavs xvidcore 436 436 zeromq4 zlib 437 437 ] ++ optionals openglExtlib [ libGL libGLU ]
+2 -2
pkgs/development/libraries/ffmpeg/generic.nix
··· 1 1 { lib, stdenv, buildPackages, fetchurl, pkg-config, addOpenGLRunpath, perl, texinfo, yasm 2 2 , alsaLib, bzip2, fontconfig, freetype, gnutls, libiconv, lame, libass, libogg 3 - , libssh, libtheora, libva, libdrm, libvorbis, libvpx, lzma, libpulseaudio, soxr 3 + , libssh, libtheora, libva, libdrm, libvorbis, libvpx, xz, libpulseaudio, soxr 4 4 , x264, x265, xvidcore, zlib, libopus, speex, nv-codec-headers, dav1d 5 5 , openglSupport ? false, libGLU ? null, libGL ? null 6 6 , libmfxSupport ? false, intel-media-sdk ? null ··· 171 171 172 172 buildInputs = [ 173 173 bzip2 fontconfig freetype gnutls libiconv lame libass libogg libssh libtheora 174 - libvorbis lzma soxr x264 x265 xvidcore zlib libopus speex nv-codec-headers 174 + libvorbis xz soxr x264 x265 xvidcore zlib libopus speex nv-codec-headers 175 175 ] ++ optionals openglSupport [ libGL libGLU ] 176 176 ++ optional libmfxSupport intel-media-sdk 177 177 ++ optional libaomSupport libaom
+4 -4
pkgs/development/libraries/flatpak/default.nix
··· 13 13 , xmlto 14 14 , appstream-glib 15 15 , substituteAll 16 - , yacc 16 + , bison 17 17 , xdg-dbus-proxy 18 18 , p11-kit 19 19 , bubblewrap ··· 35 35 , fuse 36 36 , nixosTests 37 37 , libsoup 38 - , lzma 38 + , xz 39 39 , zstd 40 40 , ostree 41 41 , polkit ··· 114 114 pkg-config 115 115 xmlto 116 116 appstream-glib 117 - yacc 117 + bison 118 118 wrapGAppsNoGuiHook 119 119 ]; 120 120 ··· 129 129 libcap 130 130 libseccomp 131 131 libsoup 132 - lzma 132 + xz 133 133 zstd 134 134 polkit 135 135 python3
+2 -2
pkgs/development/libraries/folly/default.nix
··· 8 8 , gflags 9 9 , libiberty 10 10 , lz4 11 - , lzma 11 + , xz 12 12 , zlib 13 13 , jemalloc 14 14 , openssl ··· 43 43 libiberty 44 44 openssl 45 45 lz4 46 - lzma 46 + xz 47 47 zlib 48 48 jemalloc 49 49 libunwind
+2 -2
pkgs/development/libraries/gnome-online-accounts/default.nix
··· 22 22 , docbook_xml_dtd_412 23 23 , gnome3 24 24 , gcr 25 - , kerberos 25 + , libkrb5 26 26 , gvfs 27 27 , dbus 28 28 , wrapGAppsHook ··· 75 75 gvfs # OwnCloud, Google Drive 76 76 icu 77 77 json-glib 78 - kerberos 78 + libkrb5 79 79 librest 80 80 libsecret 81 81 libsoup
+2 -2
pkgs/development/libraries/gnutls-kdh/generic.nix
··· 2 2 , perl, gmp, autogen, libidn, p11-kit, unbound, libiconv 3 3 , guileBindings ? config.gnutls.guile or false, guile 4 4 , tpmSupport ? true, trousers, nettools, gperftools, gperf, gettext, automake 5 - , yacc, texinfo 5 + , bison, texinfo 6 6 7 7 # Version dependent args 8 8 , version, src, patches ? [], postPatch ? "", nativeBuildInputs ? [] ··· 55 55 enableParallelBuilding = false; 56 56 57 57 buildInputs = [ lzo lzip nettle libtasn1 libidn p11-kit zlib gmp 58 - autogen gperftools gperf gettext automake yacc texinfo ] 58 + autogen gperftools gperf gettext automake bison texinfo ] 59 59 ++ lib.optional doCheck nettools 60 60 ++ lib.optional (stdenv.isFreeBSD || stdenv.isDarwin) libiconv 61 61 ++ lib.optional (tpmSupport && stdenv.isLinux) trousers
+2 -2
pkgs/development/libraries/gsasl/default.nix
··· 1 - { fetchurl, lib, stdenv, libidn, kerberos }: 1 + { fetchurl, lib, stdenv, libidn, libkrb5 }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "gsasl-1.10.0"; ··· 8 8 sha256 = "sha256-hby9juYJWt54cCY6KOvLiDL1Qepzk5dUlJJgFcB1aNM="; 9 9 }; 10 10 11 - buildInputs = [ libidn kerberos ]; 11 + buildInputs = [ libidn libkrb5 ]; 12 12 13 13 configureFlags = [ "--with-gssapi-impl=mit" ]; 14 14
+2 -2
pkgs/development/libraries/kde-frameworks/karchive.nix
··· 1 1 { 2 2 mkDerivation, lib, 3 3 extra-cmake-modules, 4 - bzip2, lzma, qtbase, zlib, 4 + bzip2, xz, qtbase, zlib, 5 5 }: 6 6 7 7 mkDerivation { ··· 11 11 broken = builtins.compareVersions qtbase.version "5.14.0" < 0; 12 12 }; 13 13 nativeBuildInputs = [ extra-cmake-modules ]; 14 - buildInputs = [ bzip2 lzma zlib ]; 14 + buildInputs = [ bzip2 xz zlib ]; 15 15 propagatedBuildInputs = [ qtbase ]; 16 16 outputs = [ "out" "dev" ]; 17 17 }
+2 -2
pkgs/development/libraries/kerberos/heimdal.nix
··· 1 - { lib, stdenv, fetchFromGitHub, autoreconfHook, pkg-config, python3, perl, yacc, flex 1 + { lib, stdenv, fetchFromGitHub, autoreconfHook, pkg-config, python3, perl, bison, flex 2 2 , texinfo, perlPackages 3 3 , openldap, libcap_ng, sqlite, openssl, db, libedit, pam 4 4 , CoreFoundation, Security, SystemConfiguration ··· 20 20 21 21 patches = [ ./heimdal-make-missing-headers.patch ]; 22 22 23 - nativeBuildInputs = [ autoreconfHook pkg-config python3 perl yacc flex texinfo ] 23 + nativeBuildInputs = [ autoreconfHook pkg-config python3 perl bison flex texinfo ] 24 24 ++ (with perlPackages; [ JSON ]); 25 25 buildInputs = optionals (stdenv.isLinux) [ libcap_ng ] 26 26 ++ [ db sqlite openssl libedit openldap pam]
+2 -2
pkgs/development/libraries/kerberos/krb5.nix
··· 1 - { lib, stdenv, fetchurl, pkg-config, perl, yacc, bootstrap_cmds 1 + { lib, stdenv, fetchurl, pkg-config, perl, bison, bootstrap_cmds 2 2 , openssl, openldap, libedit, keyutils 3 3 4 4 # Extra Arguments ··· 50 50 ]; 51 51 52 52 nativeBuildInputs = [ pkg-config perl ] 53 - ++ optional (!libOnly) yacc 53 + ++ optional (!libOnly) bison 54 54 # Provides the mig command used by the build scripts 55 55 ++ optional stdenv.isDarwin bootstrap_cmds; 56 56
+2 -2
pkgs/development/libraries/libaacs/default.nix
··· 1 - { lib, stdenv, fetchurl, libgcrypt, libgpgerror, yacc, flex }: 1 + { lib, stdenv, fetchurl, libgcrypt, libgpgerror, bison, flex }: 2 2 3 3 # library that allows libbluray to play AACS protected bluray disks 4 4 # libaacs does not infringe DRM's right or copyright. See the legal page of the website for more info. ··· 18 18 19 19 buildInputs = [ libgcrypt libgpgerror ]; 20 20 21 - nativeBuildInputs = [ yacc flex ]; 21 + nativeBuildInputs = [ bison flex ]; 22 22 23 23 meta = with lib; { 24 24 homepage = "https://www.videolan.org/developers/libaacs.html";
+2 -2
pkgs/development/libraries/libgssglue/default.nix
··· 1 - { lib, stdenv, fetchurl, kerberos }: 1 + { lib, stdenv, fetchurl, libkrb5 }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "libgssglue-0.4"; ··· 15 15 postInstall = '' 16 16 mkdir -p $out/etc 17 17 cat <<EOF > $out/etc/gssapi_mech.conf 18 - ${kerberos}/lib/libgssapi_krb5.so mechglue_internal_krb5_init 18 + ${libkrb5}/lib/libgssapi_krb5.so mechglue_internal_krb5_init 19 19 EOF 20 20 ''; 21 21
+2 -2
pkgs/development/libraries/libphonenumber/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, cmake, gmock, boost, pkg-config, protobuf, icu }: 1 + { lib, stdenv, fetchFromGitHub, cmake, gtest, boost, pkg-config, protobuf, icu }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "phonenumber"; ··· 13 13 14 14 nativeBuildInputs = [ 15 15 cmake 16 - gmock 16 + gtest 17 17 pkg-config 18 18 ]; 19 19
+2 -2
pkgs/development/libraries/librime/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, cmake, boost, glog, leveldb, marisa, opencc, 2 - libyamlcpp, gmock }: 2 + libyamlcpp, gtest }: 3 3 4 4 stdenv.mkDerivation rec { 5 5 pname = "librime"; ··· 14 14 15 15 nativeBuildInputs = [ cmake ]; 16 16 17 - buildInputs = [ boost glog leveldb marisa opencc libyamlcpp gmock ]; 17 + buildInputs = [ boost glog leveldb marisa opencc libyamlcpp gtest ]; 18 18 19 19 meta = with lib; { 20 20 homepage = "https://rime.im/";
+2 -2
pkgs/development/libraries/libticalcs2/default.nix
··· 7 7 , libticonv 8 8 , libtifiles2 9 9 , libticables2 10 - , lzma 10 + , xz 11 11 , bzip2 12 12 , acl 13 13 , libobjc ··· 31 31 libticonv 32 32 libtifiles2 33 33 libticables2 34 - lzma 34 + xz 35 35 bzip2 36 36 ] ++ lib.optionals stdenv.isLinux [ 37 37 acl
+3 -3
pkgs/development/libraries/libvirt/5.9.0.nix
··· 1 1 { lib, stdenv, fetchurl, fetchgit 2 2 , pkg-config, makeWrapper, libtool, autoconf, automake, fetchpatch 3 3 , coreutils, libxml2, gnutls, perl, python2, attr 4 - , iproute, iptables, readline, lvm2, util-linux, systemd, libpciaccess, gettext 4 + , iproute2, iptables, readline, lvm2, util-linux, systemd, libpciaccess, gettext 5 5 , libtasn1, ebtables, libgcrypt, yajl, pmutils, libcap_ng, libapparmor 6 6 , dnsmasq, libnl, libpcap, libxslt, xhtml1, numad, numactl, perlPackages 7 7 , curl, libiconv, gmp, zfs, parted, bridge-utils, dmidecode, glib, rpcsvc-proto, libtirpc ··· 54 54 55 55 preConfigure = '' 56 56 ${ optionalString (!buildFromTarball) "./bootstrap --no-git --gnulib-srcdir=$(pwd)/.gnulib" } 57 - PATH=${lib.makeBinPath ([ dnsmasq ] ++ optionals stdenv.isLinux [ iproute iptables ebtables lvm2 systemd numad ] ++ optionals enableIscsi [ openiscsi ])}:$PATH 57 + PATH=${lib.makeBinPath ([ dnsmasq ] ++ optionals stdenv.isLinux [ iproute2 iptables ebtables lvm2 systemd numad ] ++ optionals enableIscsi [ openiscsi ])}:$PATH 58 58 # the path to qemu-kvm will be stored in VM's .xml and .save files 59 59 # do not use "''${qemu_kvm}/bin/qemu-kvm" to avoid bound VMs to particular qemu derivations 60 60 substituteInPlace src/lxc/lxc_conf.c \ ··· 101 101 102 102 103 103 postInstall = let 104 - binPath = [ iptables iproute pmutils numad numactl bridge-utils dmidecode dnsmasq ebtables ] ++ optionals enableIscsi [ openiscsi ]; 104 + binPath = [ iptables iproute2 pmutils numad numactl bridge-utils dmidecode dnsmasq ebtables ] ++ optionals enableIscsi [ openiscsi ]; 105 105 in '' 106 106 substituteInPlace $out/libexec/libvirt-guests.sh \ 107 107 --replace 'ON_BOOT=start' 'ON_BOOT=''${ON_BOOT:-start}' \
+3 -3
pkgs/development/libraries/libvirt/default.nix
··· 1 1 { lib, stdenv, fetchurl, fetchgit 2 2 , makeWrapper, autoreconfHook, fetchpatch 3 3 , coreutils, libxml2, gnutls, perl, python3, attr, glib, docutils 4 - , iproute, readline, lvm2, util-linux, systemd, libpciaccess, gettext 4 + , iproute2, readline, lvm2, util-linux, systemd, libpciaccess, gettext 5 5 , libtasn1, iptables, ebtables, libgcrypt, yajl, pmutils, libcap_ng, libapparmor 6 6 , dnsmasq, libnl, libpcap, libxslt, xhtml1, numad, numactl, perlPackages 7 7 , curl, libiconv, gmp, zfs, parted, bridge-utils, dmidecode, dbus, libtirpc, rpcsvc-proto, darwin ··· 85 85 sed -i meson.build -e "s|conf.set_quoted('${var}',.*|conf.set_quoted('${var}','${value}')|" 86 86 ''; 87 87 in '' 88 - PATH=${lib.makeBinPath ([ dnsmasq ] ++ optionals stdenv.isLinux [ iproute iptables ebtables-compat lvm2 systemd numad ] ++ optionals enableIscsi [ openiscsi ])}:$PATH 88 + PATH=${lib.makeBinPath ([ dnsmasq ] ++ optionals stdenv.isLinux [ iproute2 iptables ebtables-compat lvm2 systemd numad ] ++ optionals enableIscsi [ openiscsi ])}:$PATH 89 89 # the path to qemu-kvm will be stored in VM's .xml and .save files 90 90 # do not use "''${qemu_kvm}/bin/qemu-kvm" to avoid bound VMs to particular qemu derivations 91 91 substituteInPlace src/lxc/lxc_conf.c \ ··· 126 126 127 127 postInstall = let 128 128 # Keep the legacy iptables binary for now for backwards compatibility (comment on #109332) 129 - binPath = [ iptables ebtables-compat iproute pmutils numad numactl bridge-utils dmidecode dnsmasq ] ++ optionals enableIscsi [ openiscsi ]; 129 + binPath = [ iptables ebtables-compat iproute2 pmutils numad numactl bridge-utils dmidecode dnsmasq ] ++ optionals enableIscsi [ openiscsi ]; 130 130 in '' 131 131 substituteInPlace $out/libexec/libvirt-guests.sh \ 132 132 --replace 'ON_BOOT="start"' 'ON_BOOT=''${ON_BOOT:-start}' \
+2 -2
pkgs/development/libraries/libxkbcommon/default.nix
··· 1 - { lib, stdenv, fetchurl, meson, ninja, pkg-config, yacc, doxygen 1 + { lib, stdenv, fetchurl, meson, ninja, pkg-config, bison, doxygen 2 2 , xkeyboard_config, libxcb, libxml2 3 3 , python3 4 4 , libX11 ··· 21 21 22 22 outputs = [ "out" "dev" "doc" ]; 23 23 24 - nativeBuildInputs = [ meson ninja pkg-config yacc doxygen ] 24 + nativeBuildInputs = [ meson ninja pkg-config bison doxygen ] 25 25 ++ lib.optional withWaylandSupport wayland; 26 26 buildInputs = [ xkeyboard_config libxcb libxml2 ] 27 27 ++ lib.optionals withWaylandSupport [ wayland wayland-protocols ];
+2 -2
pkgs/development/libraries/libxkbcommon/libxkbcommon_7.nix
··· 1 - { lib, stdenv, fetchurl, pkg-config, yacc, flex, xkeyboard_config, libxcb, libX11 }: 1 + { lib, stdenv, fetchurl, pkg-config, bison, flex, xkeyboard_config, libxcb, libX11 }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "libxkbcommon-0.7.2"; ··· 11 11 outputs = [ "out" "dev" ]; 12 12 13 13 nativeBuildInputs = [ pkg-config ]; 14 - buildInputs = [ yacc flex xkeyboard_config libxcb ]; 14 + buildInputs = [ bison flex xkeyboard_config libxcb ]; 15 15 16 16 configureFlags = [ 17 17 "--with-xkb-config-root=${xkeyboard_config}/etc/X11/xkb"
+3 -3
pkgs/development/libraries/protobuf/generic-v3.nix
··· 1 1 { lib, stdenv 2 2 , fetchFromGitHub 3 - , autoreconfHook, zlib, gmock, buildPackages 3 + , autoreconfHook, zlib, gtest, buildPackages 4 4 , version, sha256 5 5 , ... 6 6 }: ··· 20 20 21 21 postPatch = '' 22 22 rm -rf gmock 23 - cp -r ${gmock.src}/googlemock gmock 24 - cp -r ${gmock.src}/googletest googletest 23 + cp -r ${gtest.src}/googlemock gmock 24 + cp -r ${gtest.src}/googletest googletest 25 25 chmod -R a+w gmock 26 26 chmod -R a+w googletest 27 27 ln -s ../googletest gmock/gtest
+2 -2
pkgs/development/libraries/science/biology/htslib/default.nix
··· 1 - { lib, stdenv, fetchurl, zlib, bzip2, lzma, curl, perl }: 1 + { lib, stdenv, fetchurl, zlib, bzip2, xz, curl, perl }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "htslib"; ··· 12 12 # perl is only used during the check phase. 13 13 nativeBuildInputs = [ perl ]; 14 14 15 - buildInputs = [ zlib bzip2 lzma curl ]; 15 + buildInputs = [ zlib bzip2 xz curl ]; 16 16 17 17 configureFlags = [ "--enable-libcurl" ]; # optional but strongly recommended 18 18
+3 -3
pkgs/development/libraries/serf/default.nix
··· 1 - { lib, stdenv, fetchurl, apr, scons, openssl, aprutil, zlib, kerberos 1 + { lib, stdenv, fetchurl, apr, scons, openssl, aprutil, zlib, libkrb5 2 2 , pkg-config, libiconv }: 3 3 4 4 stdenv.mkDerivation rec { ··· 12 12 13 13 nativeBuildInputs = [ pkg-config scons ]; 14 14 buildInputs = [ apr openssl aprutil zlib libiconv ] 15 - ++ lib.optional (!stdenv.isCygwin) kerberos; 15 + ++ lib.optional (!stdenv.isCygwin) libkrb5; 16 16 17 17 patches = [ ./scons.patch ]; 18 18 ··· 25 25 sconsFlags+=" OPENSSL=${openssl}" 26 26 sconsFlags+=" ZLIB=${zlib}" 27 27 '' + lib.optionalString (!stdenv.isCygwin) '' 28 - sconsFlags+=" GSSAPI=${kerberos.dev}" 28 + sconsFlags+=" GSSAPI=${libkrb5.dev}" 29 29 ''; 30 30 31 31 enableParallelBuilding = true;
+3 -3
pkgs/development/libraries/sope/default.nix
··· 1 1 { gnustep, lib, fetchFromGitHub , libxml2, openssl_1_1 2 - , openldap, mysql, libmysqlclient, postgresql }: 2 + , openldap, mariadb, libmysqlclient, postgresql }: 3 3 with lib; 4 4 5 5 gnustep.stdenv.mkDerivation rec { ··· 17 17 nativeBuildInputs = [ gnustep.make ]; 18 18 buildInputs = flatten ([ gnustep.base libxml2 openssl_1_1 ] 19 19 ++ optional (openldap != null) openldap 20 - ++ optionals (mysql != null) [ libmysqlclient mysql ] 20 + ++ optionals (mariadb != null) [ libmysqlclient mariadb ] 21 21 ++ optional (postgresql != null) postgresql); 22 22 23 23 postPatch = '' ··· 31 31 32 32 configureFlags = [ "--prefix=" "--disable-debug" "--enable-xml" "--with-ssl=ssl" ] 33 33 ++ optional (openldap != null) "--enable-openldap" 34 - ++ optional (mysql != null) "--enable-mysql" 34 + ++ optional (mariadb != null) "--enable-mysql" 35 35 ++ optional (postgresql != null) "--enable-postgresql"; 36 36 37 37 # Yes, this is ugly.
+2 -2
pkgs/development/libraries/tpm2-tss/default.nix
··· 1 1 { stdenv, lib, fetchFromGitHub 2 2 , autoreconfHook, autoconf-archive, pkg-config, doxygen, perl 3 3 , openssl, json_c, curl, libgcrypt 4 - , cmocka, uthash, ibm-sw-tpm2, iproute, procps, which 4 + , cmocka, uthash, ibm-sw-tpm2, iproute2, procps, which 5 5 }: 6 6 7 7 stdenv.mkDerivation rec { ··· 20 20 ]; 21 21 buildInputs = [ openssl json_c curl libgcrypt ]; 22 22 checkInputs = [ 23 - cmocka uthash ibm-sw-tpm2 iproute procps which 23 + cmocka uthash ibm-sw-tpm2 iproute2 procps which 24 24 ]; 25 25 26 26 preAutoreconf = "./bootstrap";
+3 -3
pkgs/development/libraries/unixODBCDrivers/default.nix
··· 1 - { fetchurl, stdenv, unixODBC, cmake, postgresql, mysql, sqlite, zlib, libxml2, dpkg, lib, openssl, kerberos, libuuid, patchelf, libiconv, fetchFromGitHub }: 1 + { fetchurl, stdenv, unixODBC, cmake, postgresql, mariadb, sqlite, zlib, libxml2, dpkg, lib, openssl, libkrb5, libuuid, patchelf, libiconv, fetchFromGitHub }: 2 2 3 3 # I haven't done any parameter tweaking.. So the defaults provided here might be bad 4 4 ··· 79 79 }; 80 80 81 81 nativeBuildInputs = [ cmake ]; 82 - buildInputs = [ unixODBC mysql ]; 82 + buildInputs = [ unixODBC mariadb ]; 83 83 84 84 cmakeFlags = [ "-DWITH_UNIXODBC=1" ]; 85 85 ··· 157 157 ''; 158 158 159 159 postFixup = '' 160 - patchelf --set-rpath ${lib.makeLibraryPath [ unixODBC openssl.out kerberos libuuid stdenv.cc.cc ]} \ 160 + patchelf --set-rpath ${lib.makeLibraryPath [ unixODBC openssl.out libkrb5 libuuid stdenv.cc.cc ]} \ 161 161 $out/lib/libmsodbcsql-${versionMajor}.${versionMinor}.so.${versionAdditional} 162 162 ''; 163 163
+2 -2
pkgs/development/python-modules/backports_lzma/default.nix
··· 2 2 , buildPythonPackage 3 3 , fetchPypi 4 4 , isPy3k 5 - , lzma 5 + , xz 6 6 , python 7 7 , pythonOlder 8 8 }: ··· 18 18 sha256 = "16d8b68e4d3cd4e6c9ddb059850452946da3914c8a8e197a7f2b0954559f2df4"; 19 19 }; 20 20 21 - buildInputs = [ lzma ]; 21 + buildInputs = [ xz ]; 22 22 23 23 checkPhase = '' 24 24 ${python.interpreter} test/test_lzma.py
+1 -2
pkgs/development/python-modules/binwalk/default.nix
··· 14 14 , cramfsswap 15 15 , sasquatch 16 16 , squashfsTools 17 - , lzma 18 17 , matplotlib 19 18 , nose 20 19 , pycrypto ··· 32 31 sha256 = "1bxgj569fzwv6jhcbl864nmlsi9x1k1r20aywjxc8b9b1zgqrlvc"; 33 32 }; 34 33 35 - propagatedBuildInputs = [ zlib xz ncompress gzip bzip2 gnutar p7zip cabextract squashfsTools lzma pycrypto ] 34 + propagatedBuildInputs = [ zlib xz ncompress gzip bzip2 gnutar p7zip cabextract squashfsTools xz pycrypto ] 36 35 ++ lib.optionals visualizationSupport [ matplotlib pyqtgraph ] 37 36 ++ lib.optionals (!stdenv.isDarwin) [ cramfsprogs cramfsswap sasquatch ]; 38 37
+2 -2
pkgs/development/python-modules/deeptoolsintervals/default.nix
··· 3 3 , fetchPypi 4 4 , pytest 5 5 , zlib 6 - , lzma 6 + , xz 7 7 }: 8 8 9 9 buildPythonPackage rec { ··· 15 15 sha256 = "1xnl80nblysj6dylj4683wgrfa425rkx4dp5k65hvwdns9pw753x"; 16 16 }; 17 17 18 - buildInputs = [ zlib lzma ]; 18 + buildInputs = [ zlib xz ]; 19 19 20 20 checkInputs = [ pytest ]; 21 21
+2 -2
pkgs/development/python-modules/kerberos/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 3 , fetchPypi 4 - , kerberos 4 + , libkrb5 5 5 }: 6 6 7 7 buildPythonPackage rec { ··· 13 13 sha256 = "cdd046142a4e0060f96a00eb13d82a5d9ebc0f2d7934393ed559bac773460a2c"; 14 14 }; 15 15 16 - nativeBuildInputs = [ kerberos ]; 16 + nativeBuildInputs = [ libkrb5 ]; 17 17 18 18 # No tests in archive 19 19 doCheck = false;
+2 -2
pkgs/development/python-modules/pysam/default.nix
··· 7 7 , cython 8 8 , htslib 9 9 , libdeflate 10 - , lzma 10 + , xz 11 11 , pytest 12 12 , samtools 13 13 , zlib ··· 33 33 curl 34 34 cython 35 35 libdeflate 36 - lzma 36 + xz 37 37 zlib 38 38 ]; 39 39
+2 -2
pkgs/development/python-modules/rpy2/2.nix
··· 9 9 , rWrapper 10 10 , rPackages 11 11 , pcre 12 - , lzma 12 + , xz 13 13 , bzip2 14 14 , zlib 15 15 , icu ··· 35 35 readline 36 36 R 37 37 pcre 38 - lzma 38 + xz 39 39 bzip2 40 40 zlib 41 41 icu
+2 -2
pkgs/development/python-modules/rpy2/default.nix
··· 7 7 , rWrapper 8 8 , rPackages 9 9 , pcre 10 - , lzma 10 + , xz 11 11 , bzip2 12 12 , zlib 13 13 , icu ··· 46 46 47 47 buildInputs = [ 48 48 pcre 49 - lzma 49 + xz 50 50 bzip2 51 51 zlib 52 52 icu
+5 -5
pkgs/development/r-modules/default.nix
··· 310 310 RGtk2 = [ pkgs.gtk2.dev ]; 311 311 rhdf5 = [ pkgs.zlib ]; 312 312 Rhdf5lib = [ pkgs.zlib ]; 313 - Rhpc = [ pkgs.zlib pkgs.bzip2.dev pkgs.icu pkgs.lzma.dev pkgs.mpi pkgs.pcre.dev ]; 314 - Rhtslib = [ pkgs.zlib.dev pkgs.automake pkgs.autoconf pkgs.bzip2.dev pkgs.lzma.dev pkgs.curl.dev ]; 313 + Rhpc = [ pkgs.zlib pkgs.bzip2.dev pkgs.icu pkgs.xz.dev pkgs.mpi pkgs.pcre.dev ]; 314 + Rhtslib = [ pkgs.zlib.dev pkgs.automake pkgs.autoconf pkgs.bzip2.dev pkgs.xz.dev pkgs.curl.dev ]; 315 315 rjags = [ pkgs.jags ]; 316 - rJava = [ pkgs.zlib pkgs.bzip2.dev pkgs.icu pkgs.lzma.dev pkgs.pcre.dev pkgs.jdk pkgs.libzip ]; 316 + rJava = [ pkgs.zlib pkgs.bzip2.dev pkgs.icu pkgs.xz.dev pkgs.pcre.dev pkgs.jdk pkgs.libzip ]; 317 317 Rlibeemd = [ pkgs.gsl_1 ]; 318 318 rmatio = [ pkgs.zlib.dev ]; 319 319 Rmpfr = [ pkgs.gmp pkgs.mpfr.dev ]; ··· 334 334 RVowpalWabbit = [ pkgs.zlib.dev pkgs.boost ]; 335 335 rzmq = [ pkgs.zeromq pkgs.pkg-config ]; 336 336 clustermq = [ pkgs.zeromq ]; 337 - SAVE = [ pkgs.zlib pkgs.bzip2 pkgs.icu pkgs.lzma pkgs.pcre ]; 337 + SAVE = [ pkgs.zlib pkgs.bzip2 pkgs.icu pkgs.xz pkgs.pcre ]; 338 338 sdcTable = [ pkgs.gmp pkgs.glpk ]; 339 339 seewave = [ pkgs.fftw.dev pkgs.libsndfile.dev ]; 340 340 seqinr = [ pkgs.zlib.dev ]; ··· 939 939 }); 940 940 941 941 littler = old.littler.overrideAttrs (attrs: with pkgs; { 942 - buildInputs = [ pcre lzma zlib bzip2 icu which ] ++ attrs.buildInputs; 942 + buildInputs = [ pcre xz zlib bzip2 icu which ] ++ attrs.buildInputs; 943 943 postInstall = '' 944 944 install -d $out/bin $out/share/man/man1 945 945 ln -s ../library/littler/bin/r $out/bin/r
+2 -2
pkgs/development/ruby-modules/gem-config/default.nix
··· 17 17 # This seperates "what to build" (the exact gem versions) from "how to build" 18 18 # (to make gems behave if necessary). 19 19 20 - { lib, fetchurl, writeScript, ruby, kerberos, libxml2, libxslt, python, stdenv, which 20 + { lib, fetchurl, writeScript, ruby, libkrb5, libxml2, libxslt, python, stdenv, which 21 21 , libiconv, postgresql, v8, clang, sqlite, zlib, imagemagick 22 22 , pkg-config , ncurses, xapian, gpgme, util-linux, tzdata, icu, libffi 23 23 , cmake, libssh2, openssl, libmysqlclient, darwin, git, perl, pcre, gecode_3, curl ··· 607 607 }; 608 608 609 609 timfel-krb5-auth = attrs: { 610 - buildInputs = [ kerberos ]; 610 + buildInputs = [ libkrb5 ]; 611 611 }; 612 612 613 613 tiny_tds = attrs: {
+2 -2
pkgs/development/tools/analysis/spin/default.nix
··· 1 - { stdenv, lib, fetchurl, makeWrapper, yacc, gcc 1 + { stdenv, lib, fetchurl, makeWrapper, bison, gcc 2 2 , withISpin ? true, tk, swarm, graphviz }: 3 3 4 4 let ··· 20 20 }; 21 21 22 22 nativeBuildInputs = [ makeWrapper ]; 23 - buildInputs = [ yacc ]; 23 + buildInputs = [ bison ]; 24 24 25 25 sourceRoot = "Spin/Src${version}"; 26 26
+2 -2
pkgs/development/tools/build-managers/jam/default.nix
··· 1 - { lib, stdenv, fetchurl, yacc }: 1 + { lib, stdenv, fetchurl, bison }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "jam-2.6.1"; ··· 8 8 sha256 = "19xkvkpycxfsncxvin6yqrql3x3z9ypc1j8kzls5k659q4kv5rmc"; 9 9 }; 10 10 11 - nativeBuildInputs = [ yacc ]; 11 + nativeBuildInputs = [ bison ]; 12 12 13 13 preConfigure = '' 14 14 unset AR
+2 -2
pkgs/development/tools/cdecl/default.nix
··· 1 - {lib, stdenv, fetchurl, yacc, flex, readline, ncurses, gnused}: 1 + {lib, stdenv, fetchurl, bison, flex, readline, ncurses, gnused}: 2 2 3 3 stdenv.mkDerivation { 4 4 name = "cdecl-2.5"; ··· 14 14 makeFlags="$makeFlags PREFIX=$out BINDIR=$out/bin MANDIR=$out/man1 CATDIR=$out/cat1 CC=$CC"; 15 15 mkdir -p $out/bin; 16 16 ''; 17 - buildInputs = [yacc flex readline ncurses]; 17 + buildInputs = [bison flex readline ncurses]; 18 18 19 19 meta = { 20 20 description = "Translator English -- C/C++ declarations";
+2 -2
pkgs/development/tools/database/shmig/default.nix
··· 1 1 { stdenv, fetchFromGitHub 2 2 , withMySQL ? true, withPSQL ? false, withSQLite ? false 3 - , mysql, postgresql, sqlite, gawk, gnugrep, findutils, gnused 3 + , mariadb, postgresql, sqlite, gawk, gnugrep, findutils, gnused 4 4 , lib 5 5 }: 6 6 ··· 21 21 patchShebangs . 22 22 23 23 substituteInPlace shmig \ 24 - --replace "\`which mysql\`" "${lib.optionalString withMySQL "${mysql.client}/bin/mysql"}" \ 24 + --replace "\`which mysql\`" "${lib.optionalString withMySQL "${mariadb.client}/bin/mysql"}" \ 25 25 --replace "\`which psql\`" "${lib.optionalString withPSQL "${postgresql}/bin/psql"}" \ 26 26 --replace "\`which sqlite3\`" "${lib.optionalString withSQLite "${sqlite}/bin/sqlite3"}" \ 27 27 --replace "awk" "${gawk}/bin/awk" \
+2 -2
pkgs/development/tools/diesel-cli/default.nix
··· 1 1 { stdenv, lib, rustPlatform, fetchFromGitHub, openssl, pkg-config, Security 2 2 , sqliteSupport ? true, sqlite 3 3 , postgresqlSupport ? true, postgresql 4 - , mysqlSupport ? true, mysql, zlib, libiconv 4 + , mysqlSupport ? true, mariadb, zlib, libiconv 5 5 }: 6 6 7 7 assert lib.assertMsg (sqliteSupport == true || postgresqlSupport == true || mysqlSupport == true) ··· 55 55 ++ optional (stdenv.isDarwin && mysqlSupport) libiconv 56 56 ++ optional sqliteSupport sqlite 57 57 ++ optional postgresqlSupport postgresql 58 - ++ optionals mysqlSupport [ mysql zlib ]; 58 + ++ optionals mysqlSupport [ mariadb zlib ]; 59 59 60 60 buildAndTestSubdir = "diesel_cli"; 61 61
+2 -2
pkgs/development/tools/misc/autoconf/2.13.nix
··· 1 - {lib, stdenv, fetchurl, m4, perl, lzma}: 1 + {lib, stdenv, fetchurl, m4, perl, xz}: 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "autoconf-2.13"; ··· 8 8 sha256 = "07krzl4czczdsgzrrw9fiqx35xcf32naf751khg821g5pqv12qgh"; 9 9 }; 10 10 11 - nativebuildInputs = [ lzma ]; 11 + nativebuildInputs = [ xz ]; 12 12 buildInputs = [ m4 perl ]; 13 13 14 14 doCheck = true;
+2 -2
pkgs/development/tools/misc/avrdude/default.nix
··· 1 - { lib, stdenv, fetchurl, yacc, flex, libusb-compat-0_1, libelf, libftdi1, readline 1 + { lib, stdenv, fetchurl, bison, flex, libusb-compat-0_1, libelf, libftdi1, readline 2 2 # docSupport is a big dependency, disabled by default 3 3 , docSupport ? false, texLive ? null, texinfo ? null, texi2html ? null 4 4 }: ··· 15 15 16 16 configureFlags = lib.optionals docSupport "--enable-doc"; 17 17 18 - buildInputs = [ yacc flex libusb-compat-0_1 libelf libftdi1 readline ] 18 + buildInputs = [ bison flex libusb-compat-0_1 libelf libftdi1 readline ] 19 19 ++ lib.optionals docSupport [ texLive texinfo texi2html ]; 20 20 21 21 meta = with lib; {
+2 -2
pkgs/development/tools/misc/hydra/common.nix
··· 2 2 , makeWrapper, autoconf, automake, libtool, unzip, pkg-config, sqlite, libpqxx 3 3 , top-git, mercurial, darcs, subversion, breezy, openssl, bzip2, libxslt 4 4 , perl, postgresql, nukeReferences, git, boehmgc, nlohmann_json 5 - , docbook_xsl, openssh, gnused, coreutils, findutils, gzip, lzma, gnutar 5 + , docbook_xsl, openssh, gnused, coreutils, findutils, gzip, xz, gnutar 6 6 , rpm, dpkg, cdrkit, pixz, lib, boost, autoreconfHook, src ? null, version ? null 7 7 , migration ? false, patches ? [] 8 8 , tests ? {}, mdbook ··· 89 89 90 90 hydraPath = lib.makeBinPath ( 91 91 [ sqlite subversion openssh nix coreutils findutils pixz 92 - gzip bzip2 lzma gnutar unzip git top-git mercurial /*darcs*/ gnused breezy 92 + gzip bzip2 xz gnutar unzip git top-git mercurial /*darcs*/ gnused breezy 93 93 ] ++ lib.optionals stdenv.isLinux [ rpm dpkg cdrkit ] ); 94 94 95 95 nativeBuildInputs = [ autoreconfHook pkg-config mdbook ];
+2 -2
pkgs/development/tools/misc/texinfo/4.13a.nix
··· 1 - { stdenv, fetchurl, texinfo, ncurses, lzma }: 1 + { stdenv, fetchurl, texinfo, ncurses, xz }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "texinfo"; ··· 10 10 }; 11 11 12 12 buildInputs = [ ncurses ]; 13 - nativeBuildInputs = [ lzma ]; 13 + nativeBuildInputs = [ xz ]; 14 14 15 15 # Disabled because we don't have zdiff in the stdenv bootstrap. 16 16 #doCheck = true;
+2 -2
pkgs/development/tools/vogl/default.nix
··· 1 1 { mkDerivation, lib, fetchFromGitHub 2 2 , cmake, git, pkg-config, wget, zip 3 3 , qtbase, qtx11extras 4 - , libdwarf, libjpeg_turbo, libunwind, lzma, tinyxml, libX11 4 + , libdwarf, libjpeg_turbo, libunwind, xz, tinyxml, libX11 5 5 , SDL2, SDL2_gfx, SDL2_image, SDL2_ttf 6 6 , freeglut, libGLU 7 7 , fetchpatch ··· 31 31 buildInputs = [ 32 32 git wget zip 33 33 qtbase qtx11extras 34 - libdwarf libjpeg_turbo libunwind lzma tinyxml libX11 34 + libdwarf libjpeg_turbo libunwind xz tinyxml libX11 35 35 SDL2 SDL2_gfx SDL2_image SDL2_ttf 36 36 freeglut libGLU 37 37 ];
+2 -2
pkgs/development/tools/xcbuild/toolchains.nix
··· 44 44 fi 45 45 done 46 46 47 - ln -s ${buildPackages.yacc}/bin/yacc $toolchain/bin/yacc 48 - ln -s ${buildPackages.yacc}/bin/bison $toolchain/bin/bison 47 + ln -s ${buildPackages.bison}/bin/yacc $toolchain/bin/yacc 48 + ln -s ${buildPackages.bison}/bin/bison $toolchain/bin/bison 49 49 ln -s ${buildPackages.flex}/bin/flex $toolchain/bin/flex 50 50 ln -s ${buildPackages.flex}/bin/flex++ $toolchain/bin/flex++ 51 51 ln -s $toolchain/bin/flex $toolchain/bin/lex
+2 -2
pkgs/games/freeciv/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, autoreconfHook, lua5_3, pkg-config, python3 2 - , zlib, bzip2, curl, lzma, gettext, libiconv 2 + , zlib, bzip2, curl, xz, gettext, libiconv 3 3 , sdlClient ? true, SDL, SDL_mixer, SDL_image, SDL_ttf, SDL_gfx, freetype, fluidsynth 4 4 , gtkClient ? false, gtk3 5 5 , qtClient ? false, qt5 ··· 31 31 nativeBuildInputs = [ autoreconfHook pkg-config ] 32 32 ++ optional qtClient [ qt5.wrapQtAppsHook ]; 33 33 34 - buildInputs = [ lua5_3 zlib bzip2 curl lzma gettext libiconv ] 34 + buildInputs = [ lua5_3 zlib bzip2 curl xz gettext libiconv ] 35 35 ++ optionals sdlClient [ SDL SDL_mixer SDL_image SDL_ttf SDL_gfx freetype fluidsynth ] 36 36 ++ optionals gtkClient [ gtk3 ] 37 37 ++ optionals qtClient [ qt5.qtbase ]
+2 -2
pkgs/games/spring/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, cmake, lzma, boost, libdevil, zlib, p7zip 1 + { lib, stdenv, fetchFromGitHub, cmake, xz, boost, libdevil, zlib, p7zip 2 2 , openal, libvorbis, glew, freetype, xorg, SDL2, libGLU, libGL 3 3 , asciidoc, docbook_xsl, docbook_xsl_ns, curl, makeWrapper 4 4 , jdk ? null, python ? null, systemd, libunwind, which, minizip ··· 41 41 "-DPREFER_STATIC_LIBS:BOOL=OFF"]; 42 42 43 43 nativeBuildInputs = [ cmake makeWrapper docbook_xsl docbook_xsl_ns asciidoc ]; 44 - buildInputs = [ lzma boost libdevil zlib p7zip openal libvorbis freetype SDL2 44 + buildInputs = [ xz boost libdevil zlib p7zip openal libvorbis freetype SDL2 45 45 xorg.libX11 xorg.libXcursor libGLU libGL glew curl 46 46 systemd libunwind which minizip ] 47 47 ++ lib.optional withAI jdk
+2 -2
pkgs/misc/emulators/cdemu/libmirage.nix
··· 1 1 { callPackage, gobject-introspection, cmake, pkg-config 2 - , glib, libsndfile, zlib, bzip2, lzma, libsamplerate, intltool 2 + , glib, libsndfile, zlib, bzip2, xz, libsamplerate, intltool 3 3 , pcre, util-linux, libselinux, libsepol }: 4 4 5 5 let pkg = import ./base.nix { ··· 8 8 pkgSha256 = "08mfvqyk3833ksfd47i4j3ppmrw5ry219km6h7lywdh9hm9x14yf"; 9 9 }; 10 10 in callPackage pkg { 11 - buildInputs = [ glib libsndfile zlib bzip2 lzma libsamplerate intltool ]; 11 + buildInputs = [ glib libsndfile zlib bzip2 xz libsamplerate intltool ]; 12 12 drvParams = { 13 13 PKG_CONFIG_GOBJECT_INTROSPECTION_1_0_GIRDIR = "${placeholder "out"}/share/gir-1.0"; 14 14 PKG_CONFIG_GOBJECT_INTROSPECTION_1_0_TYPELIBDIR = "${placeholder "out"}/lib/girepository-1.0";
+2 -2
pkgs/misc/lightspark/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, pkg-config, cmake, curl, zlib, ffmpeg_3, glew, pcre 2 - , rtmpdump, cairo, boost, SDL2, SDL2_mixer, libjpeg, pango, lzma, nasm 2 + , rtmpdump, cairo, boost, SDL2, SDL2_mixer, libjpeg, pango, xz, nasm 3 3 , llvm, glibmm 4 4 }: 5 5 ··· 22 22 23 23 buildInputs = [ 24 24 curl zlib ffmpeg_3 glew pcre rtmpdump cairo boost SDL2 SDL2_mixer libjpeg 25 - pango lzma nasm llvm glibmm 25 + pango xz nasm llvm glibmm 26 26 ]; 27 27 28 28 meta = with lib; {
+3 -3
pkgs/os-specific/bsd/netbsd/default.nix
··· 1 - { stdenv, stdenvNoCC, fetchcvs, lib, groff, mandoc, zlib, yacc, flex 1 + { stdenv, stdenvNoCC, fetchcvs, lib, groff, mandoc, zlib, bison, flex 2 2 , writeText, buildPackages, splicePackages, symlinkJoin }: 3 3 4 4 let ··· 563 563 sha256 = "0630lbvz6v4ic13bfg8ccwfhqkgcv76bfdw9f36rfsnwfgpxqsmq"; 564 564 meta.platforms = lib.platforms.netbsd; 565 565 nativeBuildInputs = [ makeMinimal install mandoc groff flex 566 - yacc genassym gencat lorder tsort stat ]; 566 + bison genassym gencat lorder tsort stat ]; 567 567 extraPaths = [ sys.src ld_elf_so.src ]; 568 568 }; 569 569 ··· 587 587 librpcsvc.src libutil.src librt.src libcrypt.src ]; 588 588 buildInputs = [ buildPackages.netbsd.headers csu ]; 589 589 nativeBuildInputs = [ makeMinimal install mandoc groff flex 590 - yacc genassym gencat lorder tsort stat ]; 590 + bison genassym gencat lorder tsort stat ]; 591 591 NIX_CFLAGS_COMPILE = "-B${csu}/lib"; 592 592 meta.platforms = lib.platforms.netbsd; 593 593 SHLIBINSTALLDIR = "$(out)/lib";
+2 -2
pkgs/os-specific/darwin/apple-source-releases/adv_cmds/boot.nix
··· 1 - { lib, appleDerivation, fetchzip, bsdmake, perl, flex, yacc 1 + { lib, appleDerivation, fetchzip, bsdmake, perl, flex, bison 2 2 }: 3 3 4 4 # this derivation sucks ··· 16 16 }; 17 17 18 18 in appleDerivation { 19 - nativeBuildInputs = [ bsdmake perl yacc flex ]; 19 + nativeBuildInputs = [ bsdmake perl bison flex ]; 20 20 buildInputs = [ flex ]; 21 21 22 22 patchPhase = ''
+2 -2
pkgs/os-specific/darwin/apple-source-releases/bootstrap_cmds/default.nix
··· 1 - { lib, stdenv, appleDerivation, yacc, flex }: 1 + { lib, stdenv, appleDerivation, bison, flex }: 2 2 3 3 appleDerivation { 4 - nativeBuildInputs = [ yacc flex ]; 4 + nativeBuildInputs = [ bison flex ]; 5 5 6 6 buildPhase = '' 7 7 cd migcom.tproj
+2 -2
pkgs/os-specific/darwin/apple-source-releases/file_cmds/default.nix
··· 1 - { lib, appleDerivation, xcbuildHook, zlib, bzip2, lzma, ncurses, libutil }: 1 + { lib, appleDerivation, xcbuildHook, zlib, bzip2, xz, ncurses, libutil }: 2 2 3 3 appleDerivation { 4 4 nativeBuildInputs = [ xcbuildHook ]; 5 - buildInputs = [ zlib bzip2 lzma ncurses libutil ]; 5 + buildInputs = [ zlib bzip2 xz ncurses libutil ]; 6 6 7 7 # some commands not working: 8 8 # mtree: _simple.h not found
+3 -3
pkgs/os-specific/darwin/apple-source-releases/text_cmds/default.nix
··· 1 - { lib, appleDerivation, xcbuildHook, ncurses, bzip2, zlib, lzma }: 1 + { lib, appleDerivation, xcbuildHook, ncurses, bzip2, zlib, xz }: 2 2 3 3 appleDerivation { 4 4 nativeBuildInputs = [ xcbuildHook ]; 5 - buildInputs = [ ncurses bzip2 zlib lzma ]; 5 + buildInputs = [ ncurses bzip2 zlib xz ]; 6 6 7 7 # patches to use ncursees 8 8 # disables md5 9 9 patchPhase = '' 10 10 substituteInPlace text_cmds.xcodeproj/project.pbxproj \ 11 - --replace 'FC6C98FB149A94EB00DDCC47 /* libcurses.dylib */ = {isa = PBXFileReference; lastKnownFileType = "compiled.mach-o.dylib"; name = libcurses.dylib; path = /usr/lib/libcurses.dylib; sourceTree = "<absolute>"; };' 'FC6C98FB149A94EB00DDCC47 /* libncurses.dylib */ = {isa = PBXFileReference; lastKnownFileType = "compiled.mach-o.dylib"; name = libncurses.dylib; path = /usr/lib/libncurses.dylib; sourceTree = "<absolute>"; };' \ 11 + --replace 'FC6C98FB149A94EB00DDCC47 /* libcurses.dylib */ = {isa = PBXFileReference; lastKnownFileType = "compiled.mach-o.dylib"; name = libcurses.dylib; path = /usr/lib/libcurses.dylib; sourceTree = "<absolute>"; };' 'FC6C98FB149A94EB00DDCC47 /* libncurses.dylib */ = {isa = PBXFileReference; lastKnownFileType = "compiled.mach-o.dylib"; name = libncurses.dylib; path = /usr/lib/libncurses.dylib; sourceTree = "<absolute>"; };' \ 12 12 --replace 'FC7A7EB5149875E00086576A /* PBXTargetDependency */,' "" 13 13 ''; 14 14
+2 -2
pkgs/os-specific/linux/autofs/default.nix
··· 1 1 { lib, stdenv, fetchurl, flex, bison, linuxHeaders, libtirpc, mount, umount, nfs-utils, e2fsprogs 2 - , libxml2, kerberos, kmod, openldap, sssd, cyrus_sasl, openssl, rpcsvc-proto }: 2 + , libxml2, libkrb5, kmod, openldap, sssd, cyrus_sasl, openssl, rpcsvc-proto }: 3 3 4 4 let 5 5 version = "5.1.6"; ··· 36 36 #make install SUBDIRS="samples" # impure! 37 37 ''; 38 38 39 - buildInputs = [ linuxHeaders libtirpc libxml2 kerberos kmod openldap sssd 39 + buildInputs = [ linuxHeaders libtirpc libxml2 libkrb5 kmod openldap sssd 40 40 openssl cyrus_sasl rpcsvc-proto ]; 41 41 42 42 nativeBuildInputs = [ flex bison ];
+2 -2
pkgs/os-specific/linux/cifs-utils/default.nix
··· 1 1 { stdenv, lib, fetchurl, autoreconfHook, docutils, pkg-config 2 - , kerberos, keyutils, pam, talloc, python3 }: 2 + , libkrb5, keyutils, pam, talloc, python3 }: 3 3 4 4 stdenv.mkDerivation rec { 5 5 pname = "cifs-utils"; ··· 12 12 13 13 nativeBuildInputs = [ autoreconfHook docutils pkg-config ]; 14 14 15 - buildInputs = [ kerberos keyutils pam talloc python3 ]; 15 + buildInputs = [ libkrb5 keyutils pam talloc python3 ]; 16 16 17 17 configureFlags = [ "ROOTSBINDIR=$(out)/sbin" ] ++ lib.optionals (stdenv.hostPlatform != stdenv.buildPlatform) [ 18 18 # AC_FUNC_MALLOC is broken on cross builds.
+2 -2
pkgs/os-specific/linux/firmware/firmware-manager/default.nix
··· 1 - { rustPlatform, lib, fetchFromGitHub, lzma, pkg-config, openssl, dbus, glib, udev, cairo, pango, atk, gdk-pixbuf, gtk3, wrapGAppsHook }: 1 + { rustPlatform, lib, fetchFromGitHub, xz, pkg-config, openssl, dbus, glib, udev, cairo, pango, atk, gdk-pixbuf, gtk3, wrapGAppsHook }: 2 2 rustPlatform.buildRustPackage rec { 3 3 pname = "firmware-manager"; 4 4 version = "0.1.2"; ··· 12 12 13 13 nativeBuildInputs = [ pkg-config wrapGAppsHook ]; 14 14 15 - buildInputs = [ lzma openssl dbus glib udev cairo pango atk gdk-pixbuf gtk3 ]; 15 + buildInputs = [ xz openssl dbus glib udev cairo pango atk gdk-pixbuf gtk3 ]; 16 16 17 17 depsExtraArgs.postPatch = "make prefix='$(out)' toml-gen"; 18 18
+2 -2
pkgs/os-specific/linux/firmware/system76-firmware/default.nix
··· 1 - { rustPlatform, lib, fetchFromGitHub, lzma, pkg-config, openssl, dbus, efibootmgr, makeWrapper }: 1 + { rustPlatform, lib, fetchFromGitHub, xz, pkg-config, openssl, dbus, efibootmgr, makeWrapper }: 2 2 rustPlatform.buildRustPackage rec { 3 3 pname = "system76-firmware"; 4 4 # Check Makefile when updating, make sure postInstall matches make install ··· 13 13 14 14 nativeBuildInputs = [ pkg-config makeWrapper ]; 15 15 16 - buildInputs = [ lzma openssl dbus ]; 16 + buildInputs = [ xz openssl dbus ]; 17 17 18 18 cargoBuildFlags = [ "--workspace" ]; 19 19
+2 -2
pkgs/os-specific/linux/gogoclient/default.nix
··· 1 - {lib, stdenv, fetchurl, openssl, nettools, iproute, sysctl}: 1 + {lib, stdenv, fetchurl, openssl, nettools, iproute2, sysctl}: 2 2 3 3 let baseName = "gogoclient"; 4 4 version = "1.2"; ··· 29 29 substituteInPlace "$out/template/linux.sh" \ 30 30 --replace "/sbin/ifconfig" "${nettools}/bin/ifconfig" \ 31 31 --replace "/sbin/route" "${nettools}/bin/route" \ 32 - --replace "/sbin/ip" "${iproute}/sbin/ip" \ 32 + --replace "/sbin/ip" "${iproute2}/sbin/ip" \ 33 33 --replace "/sbin/sysctl" "${sysctl}/bin/sysctl" 34 34 sed -i -e 's/^.*Exec \$route -A.*$/& metric 128/' $out/template/linux.sh 35 35 '';
+2 -2
pkgs/os-specific/linux/hyperv-daemons/default.nix
··· 1 1 { stdenv, lib, python, kernel, makeWrapper, writeText 2 - , gawk, iproute }: 2 + , gawk, iproute2 }: 3 3 4 4 let 5 5 libexec = "libexec/hypervkvpd"; ··· 42 42 43 43 postFixup = '' 44 44 wrapProgram $out/bin/hv_kvp_daemon \ 45 - --prefix PATH : $out/bin:${lib.makeBinPath [ gawk iproute ]} 45 + --prefix PATH : $out/bin:${lib.makeBinPath [ gawk iproute2 ]} 46 46 ''; 47 47 }; 48 48
+2 -2
pkgs/os-specific/linux/iproute/mptcp.nix
··· 1 - { lib, iproute, fetchFromGitHub }: 1 + { lib, iproute2, fetchFromGitHub }: 2 2 3 - iproute.overrideAttrs (oa: rec { 3 + iproute2.overrideAttrs (oa: rec { 4 4 pname = "iproute_mptcp"; 5 5 version = "0.95"; 6 6
+2 -2
pkgs/os-specific/linux/ipsec-tools/default.nix
··· 1 - { lib, stdenv, fetchurl, fetchpatch, linuxHeaders, readline, openssl, flex, kerberos, pam }: 1 + { lib, stdenv, fetchurl, fetchpatch, linuxHeaders, readline, openssl, flex, libkrb5, pam }: 2 2 3 3 # TODO: These tools are supposed to work under NetBSD and FreeBSD as 4 4 # well, so I guess it's not appropriate to place this expression in ··· 14 14 sha256 = "0b9gfbz78k2nj0k7jdlm5kajig628ja9qm0z5yksiwz22s3v7dlf"; 15 15 }; 16 16 17 - buildInputs = [ readline openssl flex kerberos pam ]; 17 + buildInputs = [ readline openssl flex libkrb5 pam ]; 18 18 19 19 patches = [ 20 20 ./dont-create-localstatedir-during-install.patch
+2 -2
pkgs/os-specific/linux/libcgroup/default.nix
··· 1 - { lib, stdenv, fetchurl, fetchpatch, pam, yacc, flex }: 1 + { lib, stdenv, fetchurl, fetchpatch, pam, bison, flex }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "libcgroup"; ··· 9 9 sha256 = "0lgvyq37gq84sk30sg18admxaj0j0p5dq3bl6g74a1ppgvf8pqz4"; 10 10 }; 11 11 12 - buildInputs = [ pam yacc flex ]; 12 + buildInputs = [ pam bison flex ]; 13 13 14 14 patches = [ 15 15 (fetchpatch {
+6 -6
pkgs/os-specific/linux/nfs-utils/default.nix
··· 1 1 { stdenv, fetchurl, fetchpatch, lib, pkg-config, util-linux, libcap, libtirpc, libevent 2 - , sqlite, kerberos, kmod, libuuid, keyutils, lvm2, systemd, coreutils, tcp_wrappers 2 + , sqlite, libkrb5, kmod, libuuid, keyutils, lvm2, systemd, coreutils, tcp_wrappers 3 3 , python3, buildPackages, nixosTests, rpcsvc-proto 4 4 , enablePython ? true 5 5 }: ··· 25 25 26 26 buildInputs = [ 27 27 libtirpc libcap libevent sqlite lvm2 28 - libuuid keyutils kerberos tcp_wrappers 28 + libuuid keyutils libkrb5 tcp_wrappers 29 29 ] ++ lib.optional enablePython python3; 30 30 31 31 enableParallelBuilding = true; ··· 33 33 preConfigure = 34 34 '' 35 35 substituteInPlace configure \ 36 - --replace '$dir/include/gssapi' ${lib.getDev kerberos}/include/gssapi \ 37 - --replace '$dir/bin/krb5-config' ${lib.getDev kerberos}/bin/krb5-config 36 + --replace '$dir/include/gssapi' ${lib.getDev libkrb5}/include/gssapi \ 37 + --replace '$dir/bin/krb5-config' ${lib.getDev libkrb5}/bin/krb5-config 38 38 ''; 39 39 40 40 configureFlags = 41 41 [ "--enable-gss" 42 42 "--enable-svcgss" 43 43 "--with-statedir=/var/lib/nfs" 44 - "--with-krb5=${lib.getLib kerberos}" 44 + "--with-krb5=${lib.getLib libkrb5}" 45 45 "--with-systemd=${placeholder "out"}/etc/systemd/system" 46 46 "--enable-libmount-mount" 47 47 "--with-pluginpath=${placeholder "lib"}/lib/libnfsidmap" # this installs libnfsidmap ··· 106 106 # https://bugzilla.kernel.org/show_bug.cgi?id=203793 107 107 doCheck = false; 108 108 109 - disallowedReferences = [ (lib.getDev kerberos) ]; 109 + disallowedReferences = [ (lib.getDev libkrb5) ]; 110 110 111 111 passthru.tests = { 112 112 nfs3-simple = nixosTests.nfs3.simple;
+1 -1
pkgs/os-specific/linux/openvswitch/lts.nix
··· 1 1 { lib, stdenv, fetchurl, makeWrapper, pkg-config, util-linux, which 2 - , procps, libcap_ng, openssl, python2, iproute , perl 2 + , procps, libcap_ng, openssl, python2, perl 3 3 , automake, autoconf, libtool, kernel ? null }: 4 4 5 5 with lib;
+2 -2
pkgs/os-specific/linux/pam_krb5/default.nix
··· 1 - { lib, stdenv, fetchurl, pam, kerberos }: 1 + { lib, stdenv, fetchurl, pam, libkrb5 }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "pam-krb5-4.10"; ··· 8 8 sha256 = "09wzxd5zrj5bzqpb01qf148npj5k8hmd2bx2ij1qsy40hdxqyq79"; 9 9 }; 10 10 11 - buildInputs = [ pam kerberos ]; 11 + buildInputs = [ pam libkrb5 ]; 12 12 13 13 meta = with lib; { 14 14 homepage = "https://www.eyrie.org/~eagle/software/pam-krb5/";
+2 -2
pkgs/os-specific/linux/pcmciautils/default.nix
··· 1 1 { config, lib, stdenv, fetchurl 2 - , yacc, flex 2 + , bison, flex 3 3 , sysfsutils, kmod, udev 4 4 , firmware ? config.pcmciaUtils.firmware or [] # Special pcmcia cards. 5 5 , configOpts ? config.pcmciaUtils.config or null # Special hardware (map memory & port & irq) ··· 14 14 sha256 = "0sfm3w2n73kl5w7gb1m6q8gy5k4rgwvzz79n6yhs9w3sag3ix8sk"; 15 15 }; 16 16 17 - buildInputs = [udev yacc sysfsutils kmod flex]; 17 + buildInputs = [udev bison sysfsutils kmod flex]; 18 18 19 19 patchPhase = '' 20 20 sed -i "
+2 -2
pkgs/os-specific/linux/pipework/default.nix
··· 1 1 { stdenv, lib, fetchFromGitHub, makeWrapper 2 - , bridge-utils, iproute, lxc, openvswitch, docker, busybox, dhcpcd, dhcp 2 + , bridge-utils, iproute2, lxc, openvswitch, docker, busybox, dhcpcd, dhcp 3 3 }: 4 4 5 5 stdenv.mkDerivation { ··· 15 15 installPhase = '' 16 16 install -D pipework $out/bin/pipework 17 17 wrapProgram $out/bin/pipework --prefix PATH : \ 18 - ${lib.makeBinPath [ bridge-utils iproute lxc openvswitch docker busybox dhcpcd dhcp ]}; 18 + ${lib.makeBinPath [ bridge-utils iproute2 lxc openvswitch docker busybox dhcpcd dhcp ]}; 19 19 ''; 20 20 meta = with lib; { 21 21 description = "Software-Defined Networking tools for LXC";
+2 -2
pkgs/os-specific/linux/ply/default.nix
··· 1 - { lib, stdenv, kernel, fetchFromGitHub, autoreconfHook, yacc, flex, p7zip, rsync }: 1 + { lib, stdenv, kernel, fetchFromGitHub, autoreconfHook, bison, flex, p7zip, rsync }: 2 2 3 3 assert kernel != null -> lib.versionAtLeast kernel.version "4.0"; 4 4 ··· 7 7 in stdenv.mkDerivation { 8 8 pname = "ply"; 9 9 inherit version; 10 - nativeBuildInputs = [ autoreconfHook flex yacc p7zip rsync ]; 10 + nativeBuildInputs = [ autoreconfHook flex bison p7zip rsync ]; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "iovisor";
+2 -2
pkgs/os-specific/linux/rdma-core/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, cmake, pkg-config, docutils 2 - , pandoc, ethtool, iproute, libnl, udev, python3, perl 2 + , pandoc, ethtool, iproute2, libnl, udev, python3, perl 3 3 , makeWrapper 4 4 } : 5 5 ··· 18 18 }; 19 19 20 20 nativeBuildInputs = [ cmake pkg-config pandoc docutils makeWrapper ]; 21 - buildInputs = [ libnl ethtool iproute udev python3 perl ]; 21 + buildInputs = [ libnl ethtool iproute2 udev python3 perl ]; 22 22 23 23 cmakeFlags = [ 24 24 "-DCMAKE_INSTALL_RUNDIR=/run"
+2 -2
pkgs/os-specific/linux/sssd/default.nix
··· 1 1 { lib, stdenv, fetchurl, fetchpatch, glibc, augeas, dnsutils, c-ares, curl, 2 2 cyrus_sasl, ding-libs, libnl, libunistring, nss, samba, nfs-utils, doxygen, 3 3 python, python3, pam, popt, talloc, tdb, tevent, pkg-config, ldb, openldap, 4 - pcre, kerberos, cifs-utils, glib, keyutils, dbus, fakeroot, libxslt, libxml2, 4 + pcre, libkrb5, cifs-utils, glib, keyutils, dbus, fakeroot, libxslt, libxml2, 5 5 libuuid, ldap, systemd, nspr, check, cmocka, uid_wrapper, 6 6 nss_wrapper, ncurses, Po4a, http-parser, jansson, 7 7 docbook_xsl, docbook_xml_dtd_44, ··· 62 62 enableParallelBuilding = true; 63 63 buildInputs = [ augeas dnsutils c-ares curl cyrus_sasl ding-libs libnl libunistring nss 64 64 samba nfs-utils doxygen python python3 popt 65 - talloc tdb tevent pkg-config ldb pam openldap pcre kerberos 65 + talloc tdb tevent pkg-config ldb pam openldap pcre libkrb5 66 66 cifs-utils glib keyutils dbus fakeroot libxslt libxml2 67 67 libuuid ldap systemd nspr check cmocka uid_wrapper 68 68 nss_wrapper ncurses Po4a http-parser jansson ];
+2 -2
pkgs/os-specific/windows/cygwin-setup/default.nix
··· 1 1 { lib, stdenv, fetchcvs, autoconf, automake, libtool, flex, bison, pkg-config 2 - , zlib, bzip2, lzma, libgcrypt 2 + , zlib, bzip2, xz, libgcrypt 3 3 }: 4 4 5 5 with lib; ··· 24 24 buildInputs = map mkStatic (o.buildInputs or []); 25 25 propagatedBuildInputs = map mkStatic (o.propagatedBuildInputs or []); 26 26 }); 27 - in map mkStatic [ zlib bzip2 lzma libgcrypt ]; 27 + in map mkStatic [ zlib bzip2 xz libgcrypt ]; 28 28 29 29 configureFlags = [ "--disable-shared" ]; 30 30
+2 -2
pkgs/servers/http/apt-cacher-ng/default.nix
··· 5 5 , fetchurl 6 6 , fuse 7 7 , libevent 8 - , lzma 8 + , xz 9 9 , openssl 10 10 , pkg-config 11 11 , systemd ··· 23 23 }; 24 24 25 25 nativeBuildInputs = [ cmake doxygen pkg-config ]; 26 - buildInputs = [ bzip2 fuse libevent lzma openssl systemd tcp_wrappers zlib ]; 26 + buildInputs = [ bzip2 fuse libevent xz openssl systemd tcp_wrappers zlib ]; 27 27 28 28 meta = with lib; { 29 29 description = "A caching proxy specialized for linux distribution files";
+3 -3
pkgs/servers/http/nix-binary-cache/default.nix
··· 1 1 {lib, stdenv 2 2 , coreutils, findutils, nix, xz, bzip2, gnused, gnugrep, openssl 3 - , lighttpd, iproute }: 3 + , lighttpd, iproute2 }: 4 4 stdenv.mkDerivation rec { 5 5 version = "2014-06-29-1"; 6 6 pname = "nix-binary-cache"; ··· 21 21 --replace @gnugrep@ "${gnugrep}/bin" \ 22 22 --replace @openssl@ "${openssl.bin}/bin" \ 23 23 --replace @lighttpd@ "${lighttpd}/sbin" \ 24 - --replace @iproute@ "${iproute}/sbin" \ 24 + --replace @iproute@ "${iproute2}/sbin" \ 25 25 --replace "xXxXx" "xXxXx" 26 26 27 27 chmod a+x "$out/bin/nix-binary-cache.cgi" ··· 38 38 --replace @gnugrep@ "${gnugrep}/bin" \ 39 39 --replace @openssl@ "${openssl.bin}/bin" \ 40 40 --replace @lighttpd@ "${lighttpd}/sbin" \ 41 - --replace @iproute@ "${iproute}/sbin" \ 41 + --replace @iproute@ "${iproute2}/sbin" \ 42 42 --replace "xXxXx" "xXxXx" 43 43 44 44 chmod a+x "$out/bin/nix-binary-cache-start"
+2 -2
pkgs/servers/ldap/389/default.nix
··· 1 1 { lib, stdenv, fetchurl, fetchpatch, autoreconfHook, pkg-config, doxygen, perl, pam, nspr, nss, openldap 2 - , db, cyrus_sasl, svrcore, icu, net-snmp, kerberos, pcre, perlPackages, libevent, openssl, python3 2 + , db, cyrus_sasl, svrcore, icu, net-snmp, libkrb5, pcre, perlPackages, libevent, openssl, python3 3 3 }: 4 4 5 5 stdenv.mkDerivation rec { ··· 14 14 nativeBuildInputs = [ autoreconfHook pkg-config doxygen ]; 15 15 buildInputs = [ 16 16 perl pam nspr nss openldap db cyrus_sasl svrcore icu 17 - net-snmp kerberos pcre libevent openssl python3 17 + net-snmp libkrb5 pcre libevent openssl python3 18 18 ] ++ (with perlPackages; [ MozillaLdap NetAddrIP DBFile ]); 19 19 20 20 patches = [
+4 -4
pkgs/servers/monitoring/fusion-inventory/default.nix
··· 1 - { lib, perlPackages, nix, dmidecode, pciutils, usbutils, iproute, nettools 1 + { lib, perlPackages, nix, dmidecode, pciutils, usbutils, iproute2, nettools 2 2 , fetchFromGitHub, makeWrapper 3 3 }: 4 4 ··· 18 18 patchShebangs bin 19 19 20 20 substituteInPlace "lib/FusionInventory/Agent/Tools/Linux.pm" \ 21 - --replace /sbin/ip ${iproute}/sbin/ip 21 + --replace /sbin/ip ${iproute2}/sbin/ip 22 22 substituteInPlace "lib/FusionInventory/Agent/Task/Inventory/Linux/Networks.pm" \ 23 - --replace /sbin/ip ${iproute}/sbin/ip 23 + --replace /sbin/ip ${iproute2}/sbin/ip 24 24 ''; 25 25 26 26 buildTools = []; ··· 67 67 for cur in $out/bin/*; do 68 68 if [ -x "$cur" ]; then 69 69 sed -e "s|./lib|$out/lib|" -i "$cur" 70 - wrapProgram "$cur" --prefix PATH : ${lib.makeBinPath [nix dmidecode pciutils usbutils nettools iproute]} 70 + wrapProgram "$cur" --prefix PATH : ${lib.makeBinPath [nix dmidecode pciutils usbutils nettools iproute2]} 71 71 fi 72 72 done 73 73 '';
+2 -2
pkgs/servers/monitoring/mackerel-agent/default.nix
··· 1 - { stdenv, lib, buildGoModule, fetchFromGitHub, makeWrapper, iproute, nettools }: 1 + { stdenv, lib, buildGoModule, fetchFromGitHub, makeWrapper, iproute2, nettools }: 2 2 3 3 buildGoModule rec { 4 4 pname = "mackerel-agent"; ··· 13 13 14 14 nativeBuildInputs = [ makeWrapper ]; 15 15 checkInputs = lib.optionals (!stdenv.isDarwin) [ nettools ]; 16 - buildInputs = lib.optionals (!stdenv.isDarwin) [ iproute ]; 16 + buildInputs = lib.optionals (!stdenv.isDarwin) [ iproute2 ]; 17 17 18 18 vendorSha256 = "sha256-yomxALecP+PycelOmwrteK/LoW7wsst7os+jcbF46Bs="; 19 19
+3 -3
pkgs/servers/openafs/1.8/default.nix
··· 1 1 { lib, stdenv, buildPackages, fetchurl, which, autoconf, automake, flex 2 - , yacc , glibc, perl, kerberos, libxslt, docbook_xsl, file 2 + , bison , glibc, perl, libkrb5, libxslt, docbook_xsl, file 3 3 , docbook_xml_dtd_43, libtool_2 4 4 , withDevdoc ? false, doxygen, dblatex # Extra developer documentation 5 5 , ncurses # Extra ncurses utilities. Needed for debugging and monitoring. ··· 16 16 17 17 depsBuildBuild = [ buildPackages.stdenv.cc ]; 18 18 nativeBuildInputs = [ autoconf automake flex libxslt libtool_2 perl 19 - which yacc ] ++ optionals withDevdoc [ doxygen dblatex ]; 19 + which bison ] ++ optionals withDevdoc [ doxygen dblatex ]; 20 20 21 - buildInputs = [ kerberos ncurses ]; 21 + buildInputs = [ libkrb5 ncurses ]; 22 22 23 23 patches = [ ./bosserver.patch ./cross-build.patch ] ++ optional (tsmbac != null) ./tsmbac.patch; 24 24
+4 -5
pkgs/servers/openafs/1.8/module.nix
··· 1 - { lib, stdenv, fetchurl, which, autoconf, automake, flex, yacc 2 - , kernel, glibc, perl, libtool_2, kerberos, fetchpatch }: 1 + { lib, stdenv, fetchurl, which, autoconf, automake, flex, bison 2 + , kernel, glibc, perl, libtool_2, libkrb5, fetchpatch }: 3 3 4 4 with (import ./srcs.nix { 5 5 inherit fetchurl; ··· 13 13 name = "openafs-${version}-${kernel.modDirVersion}"; 14 14 inherit version src; 15 15 16 - nativeBuildInputs = [ autoconf automake flex libtool_2 perl which yacc ] 16 + nativeBuildInputs = [ autoconf automake flex libtool_2 perl which bison ] 17 17 ++ kernel.moduleBuildDependencies; 18 18 19 - buildInputs = [ kerberos ]; 19 + buildInputs = [ libkrb5 ]; 20 20 21 21 patches = [ 22 22 # LINUX 5.8: Replace kernel_setsockopt with new funcs ··· 91 91 maintainers = [ maintainers.maggesi maintainers.spacefrogg ]; 92 92 broken = versionOlder kernel.version "3.18" || kernel.isHardened; 93 93 }; 94 - 95 94 }
+3 -3
pkgs/servers/openafs/1.9/default.nix
··· 1 1 { lib, stdenv, buildPackages, fetchurl, which, autoconf, automake, flex 2 - , yacc , glibc, perl, kerberos, libxslt, docbook_xsl, file 2 + , bison , glibc, perl, libkrb5, libxslt, docbook_xsl, file 3 3 , docbook_xml_dtd_43, libtool_2 4 4 , withDevdoc ? false, doxygen, dblatex # Extra developer documentation 5 5 , ncurses # Extra ncurses utilities. Needed for debugging and monitoring. ··· 16 16 17 17 depsBuildBuild = [ buildPackages.stdenv.cc ]; 18 18 nativeBuildInputs = [ autoconf automake flex libxslt libtool_2 perl 19 - which yacc ] ++ optionals withDevdoc [ doxygen dblatex ]; 19 + which bison ] ++ optionals withDevdoc [ doxygen dblatex ]; 20 20 21 - buildInputs = [ kerberos ncurses ]; 21 + buildInputs = [ libkrb5 ncurses ]; 22 22 23 23 patches = [ ./bosserver.patch ./cross-build.patch ] ++ optional (tsmbac != null) ./tsmbac.patch; 24 24
+4 -5
pkgs/servers/openafs/1.9/module.nix
··· 1 - { lib, stdenv, fetchurl, which, autoconf, automake, flex, yacc 2 - , kernel, glibc, perl, libtool_2, kerberos, fetchpatch }: 1 + { lib, stdenv, fetchurl, which, autoconf, automake, flex, bison 2 + , kernel, glibc, perl, libtool_2, libkrb5, fetchpatch }: 3 3 4 4 with (import ./srcs.nix { 5 5 inherit fetchurl; ··· 13 13 name = "openafs-${version}-${kernel.modDirVersion}"; 14 14 inherit version src; 15 15 16 - nativeBuildInputs = [ autoconf automake flex libtool_2 perl which yacc ] 16 + nativeBuildInputs = [ autoconf automake flex libtool_2 perl which bison ] 17 17 ++ kernel.moduleBuildDependencies; 18 18 19 - buildInputs = [ kerberos ]; 19 + buildInputs = [ libkrb5 ]; 20 20 21 21 patches = []; 22 22 ··· 60 60 maintainers = [ maintainers.maggesi maintainers.spacefrogg ]; 61 61 broken = versionOlder kernel.version "3.18" || kernel.isHardened; 62 62 }; 63 - 64 63 }
+2 -2
pkgs/servers/openbgpd/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, autoconf, automake, libtool, m4, yacc }: 1 + { lib, stdenv, fetchFromGitHub, autoconf, automake, libtool, m4, bison }: 2 2 3 3 let 4 4 openbsd_version = ··· 21 21 sha256 = "sha256-TKs6tt/SCWes6kYAGIrSShZgOLf7xKh26xG3Zk7wCCw="; 22 22 }; 23 23 24 - nativeBuildInputs = [ autoconf automake libtool m4 yacc ]; 24 + nativeBuildInputs = [ autoconf automake libtool m4 bison ]; 25 25 26 26 preConfigure = '' 27 27 mkdir ./openbsd
+2 -2
pkgs/servers/pim6sd/default.nix
··· 1 - { stdenv, fetchFromGitHub, lib, autoreconfHook, yacc, flex }: 1 + { stdenv, fetchFromGitHub, lib, autoreconfHook, bison, flex }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "pim6sd"; ··· 11 11 sha256 = "0x7dyark2mp9xqz9cnmmgaf0z143vxn2835clllpji4ylg77zdjw"; 12 12 }; 13 13 14 - nativeBuildInputs = [ autoreconfHook yacc flex ]; 14 + nativeBuildInputs = [ autoreconfHook bison flex ]; 15 15 16 16 meta = with lib; { 17 17 description = "PIM for IPv6 sparse mode daemon";
+2 -2
pkgs/servers/tailscale/default.nix
··· 1 - { lib, buildGoModule, fetchFromGitHub, makeWrapper, iptables, iproute }: 1 + { lib, buildGoModule, fetchFromGitHub, makeWrapper, iptables, iproute2 }: 2 2 3 3 buildGoModule rec { 4 4 pname = "tailscale"; ··· 30 30 31 31 postInstall = '' 32 32 wrapProgram $out/bin/tailscaled --prefix PATH : ${ 33 - lib.makeBinPath [ iproute iptables ] 33 + lib.makeBinPath [ iproute2 iptables ] 34 34 } 35 35 sed -i -e "s#/usr/sbin#$out/bin#" -e "/^EnvironmentFile/d" ./cmd/tailscaled/tailscaled.service 36 36 install -D -m0444 -t $out/lib/systemd/system ./cmd/tailscaled/tailscaled.service
+5 -5
pkgs/servers/zoneminder/default.nix
··· 1 1 { stdenv, lib, fetchFromGitHub, fetchurl, fetchpatch, substituteAll, cmake, makeWrapper, pkg-config 2 - , curl, ffmpeg_3, glib, libjpeg, libselinux, libsepol, mp4v2, libmysqlclient, mysql, pcre, perl, perlPackages 2 + , curl, ffmpeg_3, glib, libjpeg, libselinux, libsepol, mp4v2, libmysqlclient, mariadb, pcre, perl, perlPackages 3 3 , polkit, util-linuxMinimal, x264, zlib 4 4 , coreutils, procps, psmisc, nixosTests }: 5 5 ··· 122 122 done 123 123 124 124 substituteInPlace scripts/zmdbbackup.in \ 125 - --replace /usr/bin/mysqldump ${mysql.client}/bin/mysqldump 125 + --replace /usr/bin/mysqldump ${mariadb.client}/bin/mysqldump 126 126 127 127 substituteInPlace scripts/zmupdate.pl.in \ 128 - --replace "'mysql'" "'${mysql.client}/bin/mysql'" \ 129 - --replace "'mysqldump'" "'${mysql.client}/bin/mysqldump'" 128 + --replace "'mysql'" "'${mariadb.client}/bin/mysql'" \ 129 + --replace "'mysqldump'" "'${mariadb.client}/bin/mysqldump'" 130 130 131 131 for f in scripts/ZoneMinder/lib/ZoneMinder/Config.pm.in \ 132 132 scripts/zmupdate.pl.in \ ··· 147 147 ''; 148 148 149 149 buildInputs = [ 150 - curl ffmpeg_3 glib libjpeg libselinux libsepol mp4v2 libmysqlclient mysql.client pcre perl polkit x264 zlib 150 + curl ffmpeg_3 glib libjpeg libselinux libsepol mp4v2 libmysqlclient mariadb.client pcre perl polkit x264 zlib 151 151 util-linuxMinimal # for libmount 152 152 ] ++ (with perlPackages; [ 153 153 # build-time dependencies
+2 -2
pkgs/shells/es/default.nix
··· 1 - { lib, stdenv, fetchurl, readline, yacc }: 1 + { lib, stdenv, fetchurl, readline, bison }: 2 2 3 3 let 4 4 version = "0.9.1"; ··· 20 20 sourceRoot=. 21 21 ''; 22 22 23 - buildInputs = [ readline yacc ]; 23 + buildInputs = [ readline bison ]; 24 24 25 25 configureFlags = [ "--with-readline" ]; 26 26
+2 -2
pkgs/tools/admin/acme.sh/default.nix
··· 1 - { stdenv, lib, fetchFromGitHub, makeWrapper, curl, openssl, socat, iproute, unixtools, dnsutils }: 1 + { stdenv, lib, fetchFromGitHub, makeWrapper, curl, openssl, socat, iproute2, unixtools, dnsutils }: 2 2 stdenv.mkDerivation rec { 3 3 pname = "acme.sh"; 4 4 version = "2.8.8"; ··· 22 22 openssl 23 23 curl 24 24 dnsutils 25 - (if stdenv.isLinux then iproute else unixtools.netstat) 25 + (if stdenv.isLinux then iproute2 else unixtools.netstat) 26 26 ] 27 27 }" 28 28 '';
+2 -2
pkgs/tools/admin/lxd/default.nix
··· 1 1 { lib, hwdata, pkg-config, lxc, buildGoPackage, fetchurl 2 2 , makeWrapper, acl, rsync, gnutar, xz, btrfs-progs, gzip, dnsmasq 3 - , squashfsTools, iproute, iptables, ebtables, iptables-nftables-compat, libcap 3 + , squashfsTools, iproute2, iptables, ebtables, iptables-nftables-compat, libcap 4 4 , libco-canonical, dqlite, raft-canonical, sqlite-replication, udev 5 5 , writeShellScriptBin, apparmor-profiles, apparmor-parser 6 6 , criu ··· 48 48 49 49 wrapProgram $out/bin/lxd --prefix PATH : ${lib.makeBinPath ( 50 50 networkPkgs 51 - ++ [ acl rsync gnutar xz btrfs-progs gzip dnsmasq squashfsTools iproute bash criu ] 51 + ++ [ acl rsync gnutar xz btrfs-progs gzip dnsmasq squashfsTools iproute2 bash criu ] 52 52 ++ [ (writeShellScriptBin "apparmor_parser" '' 53 53 exec '${apparmor-parser}/bin/apparmor_parser' -I '${apparmor-profiles}/etc/apparmor.d' "$@" 54 54 '') ]
+2 -2
pkgs/tools/archivers/fsarchiver/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, autoreconfHook, pkg-config 2 - , zlib, bzip2, lzma, lzo, lz4, zstd, xz 2 + , zlib, bzip2, lzo, lz4, zstd, xz 3 3 , libgcrypt, e2fsprogs, util-linux, libgpgerror }: 4 4 5 5 let ··· 21 21 ]; 22 22 23 23 buildInputs = [ 24 - zlib bzip2 lzma lzo lz4 zstd xz 24 + zlib bzip2 xz lzo lz4 zstd xz 25 25 libgcrypt e2fsprogs util-linux libgpgerror 26 26 ]; 27 27
+2 -2
pkgs/tools/archivers/innoextract/default.nix
··· 1 1 { lib, stdenv, fetchurl, cmake, makeWrapper 2 - , boost, lzma 2 + , boost, xz 3 3 , withGog ? false, unar ? null }: 4 4 5 5 stdenv.mkDerivation rec { ··· 10 10 sha256 = "09l1z1nbl6ijqqwszdwch9mqr54qb7df0wp2sd77v17dq6gsci33"; 11 11 }; 12 12 13 - buildInputs = [ lzma boost ]; 13 + buildInputs = [ xz boost ]; 14 14 15 15 # Python is reported as missing during the build, however 16 16 # including Python does not change the output.
+2 -2
pkgs/tools/backup/automysqlbackup/default.nix
··· 1 - { lib, stdenv, fetchurl, makeWrapper, mysql, mailutils, pbzip2, pigz, bzip2, gzip }: 1 + { lib, stdenv, fetchurl, makeWrapper, mariadb, mailutils, pbzip2, pigz, bzip2, gzip }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "automysqlbackup"; ··· 19 19 cp automysqlbackup $out/bin/ 20 20 cp automysqlbackup.conf $out/etc/ 21 21 22 - wrapProgram $out/bin/automysqlbackup --prefix PATH : ${lib.makeBinPath [ mysql mailutils pbzip2 pigz bzip2 gzip ]} 22 + wrapProgram $out/bin/automysqlbackup --prefix PATH : ${lib.makeBinPath [ mariadb mailutils pbzip2 pigz bzip2 gzip ]} 23 23 ''; 24 24 25 25 meta = with lib; {
+2 -2
pkgs/tools/backup/rdedup/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, rustPlatform, pkg-config, openssl, libsodium 2 - , llvmPackages, clang, lzma 2 + , llvmPackages, clang, xz 3 3 , Security }: 4 4 5 5 rustPlatform.buildRustPackage rec { ··· 20 20 ]; 21 21 22 22 nativeBuildInputs = [ pkg-config llvmPackages.libclang clang ]; 23 - buildInputs = [ openssl libsodium lzma ] 23 + buildInputs = [ openssl libsodium xz ] 24 24 ++ (lib.optional stdenv.isDarwin Security); 25 25 26 26 configurePhase = ''
+3 -3
pkgs/tools/bluetooth/blueman/default.nix
··· 1 1 { config, stdenv, lib, fetchurl, intltool, pkg-config, python3Packages, bluez, gtk3 2 - , obex_data_server, xdg-utils, dnsmasq, dhcp, libappindicator, iproute 2 + , obex_data_server, xdg-utils, dnsmasq, dhcp, libappindicator, iproute2 3 3 , gnome3, librsvg, wrapGAppsHook, gobject-introspection, autoreconfHook 4 4 , networkmanager, withPulseAudio ? config.pulseaudio or stdenv.isLinux, libpulseaudio, fetchpatch }: 5 5 6 6 let 7 7 pythonPackages = python3Packages; 8 - binPath = lib.makeBinPath [ xdg-utils dnsmasq dhcp iproute ]; 8 + binPath = lib.makeBinPath [ xdg-utils dnsmasq dhcp iproute2 ]; 9 9 10 10 in stdenv.mkDerivation rec { 11 11 pname = "blueman"; ··· 23 23 ]; 24 24 25 25 buildInputs = [ bluez gtk3 pythonPackages.python librsvg 26 - gnome3.adwaita-icon-theme iproute libappindicator networkmanager ] 26 + gnome3.adwaita-icon-theme iproute2 libappindicator networkmanager ] 27 27 ++ pythonPath 28 28 ++ lib.optional withPulseAudio libpulseaudio; 29 29
+2 -2
pkgs/tools/compression/pbzx/default.nix
··· 1 - {stdenv, lib, fetchFromGitHub, lzma, xar}: 1 + {stdenv, lib, fetchFromGitHub, xz, xar}: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "pbzx"; ··· 9 9 rev = "v${version}"; 10 10 sha256 = "0bwd7wmnhpz1n5p39mh6asfyccj4cm06hwigslcwbb3pdwmvxc90"; 11 11 }; 12 - buildInputs = [ lzma xar ]; 12 + buildInputs = [ xz xar ]; 13 13 buildPhase = '' 14 14 cc pbzx.c -llzma -lxar -o pbzx 15 15 '';
+2 -2
pkgs/tools/compression/pixz/default.nix
··· 1 1 { 2 2 lib, stdenv, fetchFromGitHub, autoconf, automake, libtool, pkg-config 3 3 , asciidoc, libxslt, libxml2, docbook_xml_dtd_45, docbook_xsl 4 - , libarchive, lzma 4 + , libarchive, xz 5 5 }: 6 6 stdenv.mkDerivation rec { 7 7 baseName = "pixz"; ··· 12 12 buildInputs = [ 13 13 autoconf automake libtool asciidoc libxslt libxml2 14 14 docbook_xml_dtd_45 docbook_xsl 15 - libarchive lzma 15 + libarchive xz 16 16 ]; 17 17 preBuild = '' 18 18 echo "XML_CATALOG_FILES='$XML_CATALOG_FILES'"
+2 -2
pkgs/tools/compression/pxz/default.nix
··· 1 - { lib, stdenv, fetchgit, xz, lzma }: 1 + { lib, stdenv, fetchgit, xz }: 2 2 3 3 let name = "pxz"; 4 4 version = "4.999.9beta+git"; ··· 12 12 sha256 = "0na2kw8cf0qd8l1aywlv9m3xrxnqlcwxfdwp3f7x9vxwqx3k32kc"; 13 13 }; 14 14 15 - buildInputs = [ lzma ]; 15 + buildInputs = [ xz ]; 16 16 17 17 patches = [ ./_SC_ARG_MAX.patch ]; 18 18
+2 -2
pkgs/tools/compression/xar/default.nix
··· 1 - { lib, stdenv, fetchurl, libxml2, lzma, openssl, zlib, bzip2, fts, autoconf }: 1 + { lib, stdenv, fetchurl, libxml2, xz, openssl, zlib, bzip2, fts, autoconf }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 version = "1.6.1"; ··· 9 9 sha256 = "0ghmsbs6xwg1092v7pjcibmk5wkyifwxw6ygp08gfz25d2chhipf"; 10 10 }; 11 11 12 - buildInputs = [ libxml2 lzma openssl zlib bzip2 fts autoconf ]; 12 + buildInputs = [ libxml2 xz openssl zlib bzip2 fts autoconf ]; 13 13 14 14 prePatch = '' 15 15 substituteInPlace configure.ac \
+2 -2
pkgs/tools/filesystems/irods/common.nix
··· 1 - { lib, stdenv, bzip2, zlib, autoconf, automake, cmake, gnumake, help2man , texinfo, libtool , cppzmq , libarchive, avro-cpp, boost, jansson, zeromq, openssl, pam, libiodbc, kerberos, gcc, libcxx, which, catch2 }: 1 + { lib, stdenv, bzip2, zlib, autoconf, automake, cmake, gnumake, help2man , texinfo, libtool , cppzmq , libarchive, avro-cpp, boost, jansson, zeromq, openssl, pam, libiodbc, libkrb5, gcc, libcxx, which, catch2 }: 2 2 3 3 # Common attributes of irods packages 4 4 5 5 { 6 6 nativeBuildInputs = [ autoconf automake cmake gnumake help2man texinfo which gcc ]; 7 - buildInputs = [ bzip2 zlib libtool cppzmq libarchive avro-cpp jansson zeromq openssl pam libiodbc kerberos boost libcxx catch2 ]; 7 + buildInputs = [ bzip2 zlib libtool cppzmq libarchive avro-cpp jansson zeromq openssl pam libiodbc libkrb5 boost libcxx catch2 ]; 8 8 9 9 cmakeFlags = [ 10 10 "-DIRODS_EXTERNALS_FULLPATH_CLANG=${stdenv.cc}"
+2 -2
pkgs/tools/filesystems/irods/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, bzip2, zlib, autoconf, automake, cmake, gnumake, help2man , texinfo, libtool , cppzmq , libarchive, avro-cpp_llvm, boost, jansson, zeromq, openssl , pam, libiodbc, kerberos, gcc, libcxx, which, catch2 }: 1 + { lib, stdenv, fetchFromGitHub, bzip2, zlib, autoconf, automake, cmake, gnumake, help2man , texinfo, libtool , cppzmq , libarchive, avro-cpp_llvm, boost, jansson, zeromq, openssl , pam, libiodbc, libkrb5, gcc, libcxx, which, catch2 }: 2 2 3 3 let 4 4 avro-cpp=avro-cpp_llvm; ··· 7 7 common = import ./common.nix { 8 8 inherit lib stdenv bzip2 zlib autoconf automake cmake gnumake 9 9 help2man texinfo libtool cppzmq libarchive jansson 10 - zeromq openssl pam libiodbc kerberos gcc libcxx 10 + zeromq openssl pam libiodbc libkrb5 gcc libcxx 11 11 boost avro-cpp which catch2; 12 12 }; 13 13 in rec {
+1 -2
pkgs/tools/filesystems/sasquatch/default.nix
··· 2 2 , fetchurl 3 3 , lz4 ? null 4 4 , lz4Support ? false 5 - , lzma 6 5 , lzo 7 6 , lib, stdenv 8 7 , xz ··· 28 27 sha256 = "1xpklm0y43nd9i6jw43y2xh5zvlmj9ar2rvknh0bh7kv8c95aq0d"; 29 28 }; 30 29 31 - buildInputs = [ lzma lzo xz zlib ] 30 + buildInputs = [ xz lzo xz zlib ] 32 31 ++ lib.optional lz4Support lz4; 33 32 34 33 patches = [ patch ];
+2 -2
pkgs/tools/graphics/asymptote/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, fetchurl, fetchpatch 2 - , autoreconfHook, bison, glm, yacc, flex 2 + , autoreconfHook, bison, glm, flex 3 3 , freeglut, ghostscriptX, imagemagick, fftw 4 4 , boehmgc, libGLU, libGL, mesa, ncurses, readline, gsl, libsigsegv 5 5 , python3Packages ··· 31 31 autoreconfHook 32 32 bison 33 33 flex 34 - yacc 34 + bison 35 35 texinfo 36 36 ]; 37 37
+2 -2
pkgs/tools/graphics/graphviz/base.nix
··· 2 2 3 3 { lib, stdenv, fetchFromGitLab, autoreconfHook, pkg-config, cairo, expat, flex 4 4 , fontconfig, gd, gettext, gts, libdevil, libjpeg, libpng, libtool, pango 5 - , yacc, fetchpatch, xorg ? null, ApplicationServices }: 5 + , bison, fetchpatch, xorg ? null, ApplicationServices }: 6 6 7 7 let 8 8 inherit (lib) optional optionals optionalString; ··· 37 37 nativeBuildInputs = [ autoreconfHook pkg-config ]; 38 38 39 39 buildInputs = [ 40 - libpng libjpeg expat yacc libtool fontconfig gd gts libdevil flex pango 40 + libpng libjpeg expat bison libtool fontconfig gd gts libdevil flex pango 41 41 gettext 42 42 ] ++ optionals (xorg != null) (with xorg; [ libXrender libXaw libXpm ]) 43 43 ++ optionals (stdenv.isDarwin) [ ApplicationServices ];
+2 -2
pkgs/tools/misc/fwup/default.nix
··· 8 8 , libarchive 9 9 , libconfuse 10 10 , libsodium 11 - , lzma 11 + , xz 12 12 , zlib 13 13 , coreutils 14 14 , dosfstools ··· 42 42 libarchive 43 43 libconfuse 44 44 libsodium 45 - lzma 45 + xz 46 46 zlib 47 47 ] 48 48 ++ lib.optionals stdenv.isDarwin [
+2 -2
pkgs/tools/misc/osinfo-db-tools/default.nix
··· 1 1 { lib, stdenv, fetchurl, pkg-config, meson, ninja, gettext, glib, libxml2, perl, python3 2 - , libxslt, libarchive, bzip2, lzma, json-glib, libsoup 2 + , libxslt, libarchive, bzip2, xz, json-glib, libsoup 3 3 }: 4 4 5 5 stdenv.mkDerivation rec { ··· 12 12 }; 13 13 14 14 nativeBuildInputs = [ meson ninja pkg-config gettext perl python3 ]; 15 - buildInputs = [ glib json-glib libxml2 libxslt libarchive bzip2 lzma libsoup ]; 15 + buildInputs = [ glib json-glib libxml2 libxslt libarchive bzip2 xz libsoup ]; 16 16 17 17 meta = with lib; { 18 18 description = "Tools for managing the osinfo database";
+2 -2
pkgs/tools/misc/ostree/default.nix
··· 25 25 , libarchive 26 26 , libcap 27 27 , bzip2 28 - , yacc 28 + , bison 29 29 , libxslt 30 30 , docbook-xsl-nons 31 31 , docbook_xml_dtd_42 ··· 74 74 gobject-introspection 75 75 which 76 76 makeWrapper 77 - yacc 77 + bison 78 78 libxslt 79 79 docbook-xsl-nons 80 80 docbook_xml_dtd_42
+3 -3
pkgs/tools/networking/ddclient/default.nix
··· 1 - { lib, fetchurl, perlPackages, iproute, perl }: 1 + { lib, fetchurl, perlPackages, iproute2, perl }: 2 2 3 3 perlPackages.buildPerlPackage rec { 4 4 pname = "ddclient"; ··· 19 19 touch Makefile.PL 20 20 substituteInPlace ddclient \ 21 21 --replace 'in the output of ifconfig' 'in the output of ip addr show' \ 22 - --replace 'ifconfig -a' '${iproute}/sbin/ip addr show' \ 23 - --replace 'ifconfig $arg' '${iproute}/sbin/ip addr show $arg' \ 22 + --replace 'ifconfig -a' '${iproute2}/sbin/ip addr show' \ 23 + --replace 'ifconfig $arg' '${iproute2}/sbin/ip addr show $arg' \ 24 24 --replace '/usr/bin/perl' '${perl}/bin/perl' # Until we get the patchShebangs fixed (issue #55786) we need to patch this manually 25 25 ''; 26 26
+2 -2
pkgs/tools/networking/dhcp/default.nix
··· 1 - { stdenv, fetchurl, perl, file, nettools, iputils, iproute, makeWrapper 1 + { stdenv, fetchurl, perl, file, nettools, iputils, iproute2, makeWrapper 2 2 , coreutils, gnused, openldap ? null 3 3 , buildPackages, lib 4 4 }: ··· 59 59 60 60 cp client/scripts/linux $out/sbin/dhclient-script 61 61 substituteInPlace $out/sbin/dhclient-script \ 62 - --replace /sbin/ip ${iproute}/sbin/ip 62 + --replace /sbin/ip ${iproute2}/sbin/ip 63 63 wrapProgram "$out/sbin/dhclient-script" --prefix PATH : \ 64 64 "${nettools}/bin:${nettools}/sbin:${iputils}/bin:${coreutils}/bin:${gnused}/bin" 65 65 '';
+2 -2
pkgs/tools/networking/gvpe/default.nix
··· 1 - { lib, stdenv, fetchurl, openssl, gmp, zlib, iproute, nettools }: 1 + { lib, stdenv, fetchurl, openssl, gmp, zlib, iproute2, nettools }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "gvpe"; ··· 20 20 ]; 21 21 22 22 preBuild = '' 23 - sed -e 's@"/sbin/ifconfig.*"@"${iproute}/sbin/ip link set $IFNAME address $MAC mtu $MTU"@' -i src/device-linux.C 23 + sed -e 's@"/sbin/ifconfig.*"@"${iproute2}/sbin/ip link set $IFNAME address $MAC mtu $MTU"@' -i src/device-linux.C 24 24 sed -e 's@/sbin/ifconfig@${nettools}/sbin/ifconfig@g' -i src/device-*.C 25 25 ''; 26 26
+3 -3
pkgs/tools/networking/libreswan/default.nix
··· 1 1 { lib, stdenv, fetchurl, makeWrapper, 2 2 pkg-config, systemd, gmp, unbound, bison, flex, pam, libevent, libcap_ng, curl, nspr, 3 - bash, iproute, iptables, procps, coreutils, gnused, gawk, nss, which, python3, 3 + bash, iproute2, iptables, procps, coreutils, gnused, gawk, nss, which, python3, 4 4 docs ? false, xmlto, libselinux, ldns 5 5 }: 6 6 7 7 let 8 8 binPath = lib.makeBinPath [ 9 - bash iproute iptables procps coreutils gnused gawk nss.tools which python3 9 + bash iproute2 iptables procps coreutils gnused gawk nss.tools which python3 10 10 ]; 11 11 in 12 12 ··· 44 44 pkg-config 45 45 ]; 46 46 47 - buildInputs = [ bash iproute iptables systemd coreutils gnused gawk gmp unbound pam libevent 47 + buildInputs = [ bash iproute2 iptables systemd coreutils gnused gawk gmp unbound pam libevent 48 48 libcap_ng curl nspr nss python3 ldns ] 49 49 ++ lib.optional docs xmlto 50 50 ++ lib.optional stdenv.isLinux libselinux;
+2 -2
pkgs/tools/networking/maxscale/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, cmake, pkg-config, glibc 2 - , bison, curl, flex, gperftools, jansson, jemalloc, kerberos, lua, libmysqlclient 2 + , bison, curl, flex, gperftools, jansson, jemalloc, libkrb5, lua, libmysqlclient 3 3 , ncurses, openssl, pcre, pcre2, perl, rabbitmq-c, sqlite, tcl 4 4 , libaio, libedit, libtool, libui, libuuid, zlib 5 5 }: ··· 18 18 nativeBuildInputs = [ cmake pkg-config ]; 19 19 20 20 buildInputs = [ 21 - bison curl flex gperftools jansson jemalloc kerberos lua libmysqlclient 21 + bison curl flex gperftools jansson jemalloc libkrb5 lua libmysqlclient 22 22 ncurses openssl pcre pcre2 perl rabbitmq-c sqlite tcl 23 23 libaio libedit libtool libui libuuid zlib 24 24 ];
+2 -2
pkgs/tools/networking/miniupnpd/default.nix
··· 1 1 { stdenv, lib, fetchurl, iptables, libuuid, pkg-config 2 - , which, iproute, gnused, coreutils, gawk, makeWrapper 2 + , which, iproute2, gnused, coreutils, gawk, makeWrapper 3 3 }: 4 4 5 5 let 6 - scriptBinEnv = lib.makeBinPath [ which iproute iptables gnused coreutils gawk ]; 6 + scriptBinEnv = lib.makeBinPath [ which iproute2 iptables gnused coreutils gawk ]; 7 7 in 8 8 stdenv.mkDerivation rec { 9 9 name = "miniupnpd-2.1.20190502";
+2 -2
pkgs/tools/networking/miredo/default.nix
··· 1 - { lib, stdenv, fetchurl, nettools, iproute, judy }: 1 + { lib, stdenv, fetchurl, nettools, iproute2, judy }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 version = "1.2.6"; ··· 15 15 substituteInPlace misc/client-hook.bsd \ 16 16 --replace '/sbin/route' '${nettools}/bin/route' \ 17 17 --replace '/sbin/ifconfig' '${nettools}/bin/ifconfig' 18 - substituteInPlace misc/client-hook.iproute --replace '/sbin/ip' '${iproute}/bin/ip' 18 + substituteInPlace misc/client-hook.iproute --replace '/sbin/ip' '${iproute2}/bin/ip' 19 19 ''; 20 20 21 21 configureFlags = [ "--with-Judy" ];
+2 -2
pkgs/tools/networking/netboot/default.nix
··· 1 - { lib, stdenv, fetchurl, yacc, lzo, db4 }: 1 + { lib, stdenv, fetchurl, bison, lzo, db4 }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "netboot-0.10.2"; ··· 7 7 sha256 = "09w09bvwgb0xzn8hjz5rhi3aibysdadbg693ahn8rylnqfq4hwg0"; 8 8 }; 9 9 10 - buildInputs = [ yacc lzo db4 ]; 10 + buildInputs = [ bison lzo db4 ]; 11 11 12 12 hardeningDisable = [ "format" ]; 13 13
+2 -2
pkgs/tools/networking/nfdump/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub 2 2 , autoconf, automake, libtool, pkg-config 3 - , bzip2, libpcap, flex, yacc }: 3 + , bzip2, libpcap, flex, bison }: 4 4 5 5 let version = "1.6.22"; in 6 6 ··· 15 15 sha256 = "14x2k85ard1kp99hhd90zsmvyw24g03m84rn13gb4grm9gjggzrj"; 16 16 }; 17 17 18 - nativeBuildInputs = [ autoconf automake flex libtool pkg-config yacc ]; 18 + nativeBuildInputs = [ autoconf automake flex libtool pkg-config bison ]; 19 19 buildInputs = [ bzip2 libpcap ]; 20 20 21 21 preConfigure = ''
+6 -6
pkgs/tools/networking/openssh/common.nix
··· 20 20 , pam 21 21 , etcDir ? null 22 22 , withKerberos ? true 23 - , kerberos 23 + , libkrb5 24 24 , libfido2 25 25 , withFIDO ? stdenv.hostPlatform.isUnix && !stdenv.hostPlatform.isMusl 26 26 , linkOpenssl ? true ··· 45 45 ''; 46 46 47 47 nativeBuildInputs = [ pkg-config ] 48 - # This is not the same as the kerberos from the inputs! pkgs.kerberos is 48 + # This is not the same as the libkrb5 from the inputs! pkgs.libkrb5 is 49 49 # needed here to access krb5-config in order to cross compile. See: 50 50 # https://github.com/NixOS/nixpkgs/pull/107606 51 - ++ optional withKerberos pkgs.kerberos 51 + ++ optional withKerberos pkgs.libkrb5 52 52 ++ extraNativeBuildInputs; 53 53 buildInputs = [ zlib openssl libedit ] 54 54 ++ optional withFIDO libfido2 55 - ++ optional withKerberos kerberos 55 + ++ optional withKerberos libkrb5 56 56 ++ optional stdenv.isLinux pam; 57 57 58 58 preConfigure = '' ··· 70 70 # Kerberos can be found either by krb5-config or by fall-back shell 71 71 # code in openssh's configure.ac. Neither of them support static 72 72 # build, but patching code for krb5-config is simpler, so to get it 73 - # into PATH, kerberos.dev is added into buildInputs. 73 + # into PATH, libkrb5.dev is added into buildInputs. 74 74 + optionalString stdenv.hostPlatform.isStatic '' 75 75 sed -i "s,PKGCONFIG --libs,PKGCONFIG --libs --static,g" configure 76 76 sed -i 's#KRB5CONF --libs`#KRB5CONF --libs` -lkrb5support -lkeyutils#g' configure ··· 89 89 (if stdenv.isLinux then "--with-pam" else "--without-pam") 90 90 ] ++ optional (etcDir != null) "--sysconfdir=${etcDir}" 91 91 ++ optional withFIDO "--with-security-key-builtin=yes" 92 - ++ optional withKerberos (assert kerberos != null; "--with-kerberos5=${kerberos}") 92 + ++ optional withKerberos (assert libkrb5 != null; "--with-kerberos5=${libkrb5}") 93 93 ++ optional stdenv.isDarwin "--disable-libutil" 94 94 ++ optional (!linkOpenssl) "--without-openssl"; 95 95
+4 -4
pkgs/tools/networking/openvpn/default.nix
··· 3 3 , pkg-config 4 4 , makeWrapper 5 5 , runtimeShell 6 - , iproute 6 + , iproute2 7 7 , lzo 8 8 , openssl 9 9 , pam ··· 40 40 41 41 buildInputs = [ lzo openssl ] 42 42 ++ optional stdenv.isLinux pam 43 - ++ optional withIpRoute iproute 43 + ++ optional withIpRoute iproute2 44 44 ++ optional useSystemd systemd 45 45 ++ optional pkcs11Support pkcs11helper; 46 46 47 47 configureFlags = optionals withIpRoute [ 48 48 "--enable-iproute2" 49 - "IPROUTE=${iproute}/sbin/ip" 49 + "IPROUTE=${iproute2}/sbin/ip" 50 50 ] 51 51 ++ optional useSystemd "--enable-systemd" 52 52 ++ optional pkcs11Support "--enable-pkcs11" ··· 60 60 '' + optionalString useSystemd '' 61 61 install -Dm555 ${update-resolved} $out/libexec/update-systemd-resolved 62 62 wrapProgram $out/libexec/update-systemd-resolved \ 63 - --prefix PATH : ${makeBinPath [ runtimeShell iproute systemd util-linux ]} 63 + --prefix PATH : ${makeBinPath [ runtimeShell iproute2 systemd util-linux ]} 64 64 ''; 65 65 66 66 enableParallelBuilding = true;
+2 -2
pkgs/tools/networking/openvpn/update-systemd-resolved.nix
··· 1 1 { lib, stdenv, fetchFromGitHub 2 2 , makeWrapper 3 - , iproute, systemd, coreutils, util-linux }: 3 + , iproute2, systemd, coreutils, util-linux }: 4 4 5 5 stdenv.mkDerivation rec { 6 6 pname = "update-systemd-resolved"; ··· 21 21 22 22 installPhase = '' 23 23 wrapProgram $out/libexec/openvpn/update-systemd-resolved \ 24 - --prefix PATH : ${lib.makeBinPath [ iproute systemd coreutils util-linux ]} 24 + --prefix PATH : ${lib.makeBinPath [ iproute2 systemd coreutils util-linux ]} 25 25 ''; 26 26 27 27 meta = with lib; {
+2 -2
pkgs/tools/networking/pptp/default.nix
··· 1 - { lib, stdenv, fetchurl, perl, ppp, iproute }: 1 + { lib, stdenv, fetchurl, perl, ppp, iproute2 }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "pptp"; ··· 14 14 ''; 15 15 16 16 preConfigure = '' 17 - makeFlagsArray=( IP=${iproute}/bin/ip PPPD=${ppp}/sbin/pppd \ 17 + makeFlagsArray=( IP=${iproute2}/bin/ip PPPD=${ppp}/sbin/pppd \ 18 18 BINDIR=$out/sbin MANDIR=$out/share/man/man8 \ 19 19 PPPDIR=$out/etc/ppp ) 20 20 '';
+3 -3
pkgs/tools/networking/shorewall/default.nix
··· 3 3 , fetchurl 4 4 , gnugrep 5 5 , gnused 6 - , iproute 6 + , iproute2 7 7 , ipset 8 8 , iptables 9 9 , perl ··· 15 15 let 16 16 PATH = lib.concatStringsSep ":" 17 17 [ "${coreutils}/bin" 18 - "${iproute}/bin" 18 + "${iproute2}/bin" 19 19 "${iptables}/bin" 20 20 "${ipset}/bin" 21 21 "${ebtables}/bin" ··· 46 46 47 47 buildInputs = [ 48 48 coreutils 49 - iproute 49 + iproute2 50 50 ipset 51 51 iptables 52 52 ebtables
+2 -2
pkgs/tools/networking/snabb/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, bash, makeWrapper, git, mysql, diffutils, which, coreutils, procps, nettools 1 + { lib, stdenv, fetchFromGitHub, bash, makeWrapper, git, mariadb, diffutils, which, coreutils, procps, nettools 2 2 ,supportOpenstack ? true 3 3 }: 4 4 ··· 28 28 done 29 29 '' + optionalString supportOpenstack '' 30 30 # We need a way to pass $PATH to the scripts 31 - sed -i '2iexport PATH=${git}/bin:${mysql}/bin:${which}/bin:${procps}/bin:${coreutils}/bin' src/program/snabbnfv/neutron_sync_master/neutron_sync_master.sh.inc 31 + sed -i '2iexport PATH=${git}/bin:${mariadb}/bin:${which}/bin:${procps}/bin:${coreutils}/bin' src/program/snabbnfv/neutron_sync_master/neutron_sync_master.sh.inc 32 32 sed -i '2iexport PATH=${git}/bin:${coreutils}/bin:${diffutils}/bin:${nettools}/bin' src/program/snabbnfv/neutron_sync_agent/neutron_sync_agent.sh.inc 33 33 ''; 34 34
+2 -2
pkgs/tools/networking/vtun/default.nix
··· 1 - { lib, stdenv, fetchurl, fetchpatch, openssl, lzo, zlib, yacc, flex }: 1 + { lib, stdenv, fetchurl, fetchpatch, openssl, lzo, zlib, bison, flex }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "vtun-3.0.4"; ··· 18 18 sed -i -e 's/-m 755//' -e 's/-o root -g 0//' Makefile.in 19 19 sed -i '/strip/d' Makefile.in 20 20 ''; 21 - buildInputs = [ lzo openssl zlib yacc flex ]; 21 + buildInputs = [ lzo openssl zlib bison flex ]; 22 22 23 23 configureFlags = [ 24 24 "--with-lzo-headers=${lzo}/include/lzo"
+2 -2
pkgs/tools/networking/wget2/default.nix
··· 17 17 , libhsts 18 18 , libidn2 19 19 , libpsl 20 - , lzma 20 + , xz 21 21 , nghttp2 22 22 , sslSupport ? true 23 23 , openssl ··· 58 58 59 59 nativeBuildInputs = [ autoreconfHook flex lzip pkg-config python3 texinfo ]; 60 60 61 - buildInputs = [ brotli bzip2 gpgme libhsts libidn2 libpsl lzma nghttp2 pcre2 zlib zstd ] 61 + buildInputs = [ brotli bzip2 gpgme libhsts libidn2 libpsl xz nghttp2 pcre2 zlib zstd ] 62 62 ++ lib.optional sslSupport openssl; 63 63 64 64 # TODO: include translation files
+2 -2
pkgs/tools/networking/wicd/default.nix
··· 1 1 { lib, stdenv, fetchurl, python2Packages 2 2 , wpa_supplicant, dhcp, dhcpcd, wirelesstools 3 - , nettools, openresolv, iproute, iputils }: 3 + , nettools, openresolv, iproute2, iputils }: 4 4 5 5 let 6 6 inherit (python2Packages) python pygobject2 dbus-python pyGtkGlade pycairo; ··· 36 36 37 37 substituteInPlace in/scripts=wicd.in --subst-var-by TEMPLATE-DEFAULT $out/share/other/dhclient.conf.template.default 38 38 39 - sed -i "2iexport PATH=${lib.makeBinPath [ python wpa_supplicant dhcpcd dhcp wirelesstools nettools nettools iputils openresolv iproute ]}\$\{PATH:+:\}\$PATH" in/scripts=wicd.in 39 + sed -i "2iexport PATH=${lib.makeBinPath [ python wpa_supplicant dhcpcd dhcp wirelesstools nettools nettools iputils openresolv iproute2 ]}\$\{PATH:+:\}\$PATH" in/scripts=wicd.in 40 40 sed -i "3iexport PYTHONPATH=$(toPythonPath $out):$(toPythonPath ${pygobject2}):$(toPythonPath ${dbus-python})\$\{PYTHONPATH:+:\}\$PYTHONPATH" in/scripts=wicd.in 41 41 sed -i "2iexport PATH=${python}/bin\$\{PATH:+:\}\$PATH" in/scripts=wicd-client.in 42 42 sed -i "3iexport PYTHONPATH=$(toPythonPath $out):$(toPythonPath ${pyGtkGlade})/gtk-2.0:$(toPythonPath ${pygobject2}):$(toPythonPath ${pygobject2})/gtk-2.0:$(toPythonPath ${pycairo}):$(toPythonPath ${dbus-python})\$\{PYTHONPATH:+:\}\$PYTHONPATH" in/scripts=wicd-client.in
+2 -2
pkgs/tools/networking/wireguard-tools/default.nix
··· 3 3 , fetchzip 4 4 , nixosTests 5 5 , iptables 6 - , iproute 6 + , iproute2 7 7 , makeWrapper 8 8 , openresolv 9 9 , procps ··· 38 38 --replace /usr/bin $out/bin 39 39 '' + lib.optionalString stdenv.isLinux '' 40 40 for f in $out/bin/*; do 41 - wrapProgram $f --prefix PATH : ${lib.makeBinPath [ procps iproute iptables openresolv ]} 41 + wrapProgram $f --prefix PATH : ${lib.makeBinPath [ procps iproute2 iptables openresolv ]} 42 42 done 43 43 '' + lib.optionalString stdenv.isDarwin '' 44 44 for f in $out/bin/*; do
+2 -2
pkgs/tools/networking/zerotierone/default.nix
··· 1 - { lib, stdenv, buildPackages, fetchFromGitHub, openssl, lzo, zlib, iproute, ronn }: 1 + { lib, stdenv, buildPackages, fetchFromGitHub, openssl, lzo, zlib, iproute2, ronn }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "zerotierone"; ··· 22 22 23 23 24 24 nativeBuildInputs = [ ronn ]; 25 - buildInputs = [ openssl lzo zlib iproute ]; 25 + buildInputs = [ openssl lzo zlib iproute2 ]; 26 26 27 27 enableParallelBuilding = true; 28 28
+2 -2
pkgs/tools/package-management/apt/default.nix
··· 1 1 { stdenv, lib, fetchurl, pkg-config, cmake, perlPackages, curl, gtest 2 - , gnutls, libtasn1, lzma, bzip2, lz4, zstd, libseccomp, udev 2 + , gnutls, libtasn1, xz, bzip2, lz4, zstd, libseccomp, udev 3 3 , db, dpkg, libxslt, docbook_xsl, docbook_xml_dtd_45 4 4 5 5 # used when WITH_DOC=ON ··· 26 26 nativeBuildInputs = [ pkg-config cmake gtest libxslt.bin ]; 27 27 28 28 buildInputs = [ 29 - perlPackages.perl curl gnutls libtasn1 lzma bzip2 lz4 zstd libseccomp udev db dpkg 29 + perlPackages.perl curl gnutls libtasn1 xz bzip2 lz4 zstd libseccomp udev db dpkg 30 30 ] ++ lib.optionals withDocs [ 31 31 doxygen perlPackages.Po4a w3m docbook_xml_dtd_45 32 32 ] ++ lib.optionals withNLS [
+2 -2
pkgs/tools/package-management/nix/default.nix
··· 16 16 , jq, libarchive, libcpuid 17 17 , lowdown, mdbook 18 18 # Used by tests 19 - , gmock 19 + , gtest 20 20 , busybox-sandbox-shell 21 21 , storeDir 22 22 , stateDir ··· 56 56 ] 57 57 ++ lib.optionals stdenv.isDarwin [ Security ] 58 58 ++ lib.optional (stdenv.isLinux || stdenv.isDarwin) libsodium 59 - ++ lib.optionals is24 [ libarchive gmock lowdown ] 59 + ++ lib.optionals is24 [ libarchive gtest lowdown ] 60 60 ++ lib.optional (is24 && stdenv.isx86_64) libcpuid 61 61 ++ lib.optional withLibseccomp libseccomp 62 62 ++ lib.optional withAWS
+2 -2
pkgs/tools/package-management/opkg/default.nix
··· 1 - { lib, stdenv, fetchurl, pkg-config, curl, gpgme, libarchive, bzip2, lzma, attr, acl, libxml2 1 + { lib, stdenv, fetchurl, pkg-config, curl, gpgme, libarchive, bzip2, xz, attr, acl, libxml2 2 2 , autoreconfHook }: 3 3 4 4 stdenv.mkDerivation rec { ··· 10 10 }; 11 11 12 12 nativeBuildInputs = [ pkg-config autoreconfHook ]; 13 - buildInputs = [ curl gpgme libarchive bzip2 lzma attr acl libxml2 ]; 13 + buildInputs = [ curl gpgme libarchive bzip2 xz attr acl libxml2 ]; 14 14 15 15 meta = with lib; { 16 16 description = "A lightweight package management system based upon ipkg";
+2 -2
pkgs/tools/package-management/pacman/default.nix
··· 1 1 { stdenv, lib, fetchurl, pkg-config, m4, perl, libarchive, openssl, zlib, bzip2, 2 - lzma, curl, runtimeShell }: 2 + xz, curl, runtimeShell }: 3 3 4 4 stdenv.mkDerivation rec { 5 5 pname = "pacman"; ··· 24 24 installFlags = [ "sysconfdir=${placeholder "out"}/etc" ]; 25 25 26 26 nativeBuildInputs = [ pkg-config m4 ]; 27 - buildInputs = [ curl perl libarchive openssl zlib bzip2 lzma ]; 27 + buildInputs = [ curl perl libarchive openssl zlib bzip2 xz ]; 28 28 29 29 postFixup = '' 30 30 substituteInPlace $out/bin/repo-add \
+2 -2
pkgs/tools/security/enpass/default.nix
··· 2 2 , glib, libGLU, libGL, libpulseaudio, zlib, dbus, fontconfig, freetype 3 3 , gtk3, pango 4 4 , makeWrapper , python2Packages, lib 5 - , lsof, curl, libuuid, cups, mesa, lzma, libxkbcommon 5 + , lsof, curl, libuuid, cups, mesa, xz, libxkbcommon 6 6 }: 7 7 8 8 let ··· 38 38 curl 39 39 libuuid 40 40 cups 41 - lzma 41 + xz 42 42 libxkbcommon 43 43 ]); 44 44 package = stdenv.mkDerivation {
+2 -2
pkgs/tools/security/john/default.nix
··· 1 - { lib, stdenv, fetchurl, openssl, nss, nspr, kerberos, gmp, zlib, libpcap, re2 1 + { lib, stdenv, fetchurl, openssl, nss, nspr, libkrb5, gmp, zlib, libpcap, re2 2 2 , gcc, python3Packages, perl, perlPackages, makeWrapper 3 3 }: 4 4 ··· 36 36 "--with-systemwide" 37 37 ]; 38 38 39 - buildInputs = [ openssl nss nspr kerberos gmp zlib libpcap re2 ]; 39 + buildInputs = [ openssl nss nspr libkrb5 gmp zlib libpcap re2 ]; 40 40 nativeBuildInputs = [ gcc python3Packages.wrapPython perl makeWrapper ]; 41 41 propagatedBuildInputs = (with python3Packages; [ dpkt scapy lxml ]) ++ # For pcap2john.py 42 42 (with perlPackages; [ DigestMD4 DigestSHA1 GetoptLong # For pass_gen.pl
+2 -2
pkgs/tools/security/sshguard/default.nix
··· 1 - { lib, stdenv, fetchurl, autoreconfHook, yacc, flex}: 1 + { lib, stdenv, fetchurl, autoreconfHook, bison, flex}: 2 2 3 3 stdenv.mkDerivation rec { 4 4 version = "2.4.1"; ··· 11 11 12 12 doCheck = true; 13 13 14 - nativeBuildInputs = [ autoreconfHook yacc flex ]; 14 + nativeBuildInputs = [ autoreconfHook bison flex ]; 15 15 16 16 configureFlags = [ "--sysconfdir=/etc" ]; 17 17
+2 -2
pkgs/tools/security/tor/default.nix
··· 1 1 { lib, stdenv, fetchurl, pkg-config, libevent, openssl, zlib, torsocks 2 - , libseccomp, systemd, libcap, lzma, zstd, scrypt, nixosTests 2 + , libseccomp, systemd, libcap, xz, zstd, scrypt, nixosTests 3 3 , writeShellScript 4 4 5 5 # for update.nix ··· 40 40 outputs = [ "out" "geoip" ]; 41 41 42 42 nativeBuildInputs = [ pkg-config ]; 43 - buildInputs = [ libevent openssl zlib lzma zstd scrypt ] ++ 43 + buildInputs = [ libevent openssl zlib xz zstd scrypt ] ++ 44 44 lib.optionals stdenv.isLinux [ libseccomp systemd libcap ]; 45 45 46 46 patches = [ ./disable-monotonic-timer-tests.patch ];
+2 -2
pkgs/tools/system/inxi/default.nix
··· 2 2 , ps, dnsutils # dig is recommended for multiple categories 3 3 , withRecommends ? false # Install (almost) all recommended tools (see --recommends) 4 4 , withRecommendedSystemPrograms ? withRecommends, util-linuxMinimal, dmidecode 5 - , file, hddtemp, iproute, ipmitool, usbutils, kmod, lm_sensors, smartmontools 5 + , file, hddtemp, iproute2, ipmitool, usbutils, kmod, lm_sensors, smartmontools 6 6 , binutils, tree, upower, pciutils 7 7 , withRecommendedDisplayInformationPrograms ? withRecommends, glxinfo, xorg 8 8 }: ··· 11 11 prefixPath = programs: 12 12 "--prefix PATH ':' '${lib.makeBinPath programs}'"; 13 13 recommendedSystemPrograms = lib.optionals withRecommendedSystemPrograms [ 14 - util-linuxMinimal dmidecode file hddtemp iproute ipmitool usbutils kmod 14 + util-linuxMinimal dmidecode file hddtemp iproute2 ipmitool usbutils kmod 15 15 lm_sensors smartmontools binutils tree upower pciutils 16 16 ]; 17 17 recommendedDisplayInformationPrograms = lib.optionals
+2 -2
pkgs/tools/system/syslog-ng-incubator/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, autoreconfHook, pkg-config, glib, syslogng 2 - , eventlog, perl, python, yacc, protobufc, libivykis, libcap, czmq 2 + , eventlog, perl, python, bison, protobufc, libivykis, libcap, czmq 3 3 }: 4 4 5 5 stdenv.mkDerivation rec { ··· 13 13 sha256 = "17y85cqcyfbp882gaii731cvz5bg1s8rgda271jh6kgnrz5rbd4s"; 14 14 }; 15 15 16 - nativeBuildInputs = [ pkg-config autoreconfHook yacc ]; 16 + nativeBuildInputs = [ pkg-config autoreconfHook bison ]; 17 17 18 18 buildInputs = [ 19 19 glib syslogng eventlog perl python protobufc libivykis libcap czmq
+2 -2
pkgs/tools/system/thermald/default.nix
··· 10 10 , libevdev 11 11 , libtool 12 12 , libxml2 13 - , lzma 13 + , xz 14 14 , pkg-config 15 15 , lib, stdenv 16 16 , upower ··· 45 45 dbus-glib 46 46 libevdev 47 47 libxml2 48 - lzma 48 + xz 49 49 upower 50 50 ]; 51 51
+2 -2
pkgs/tools/system/vboot_reference/default.nix
··· 1 - { lib, stdenv, fetchFromGitiles, pkg-config, libuuid, openssl, libyaml, lzma }: 1 + { lib, stdenv, fetchFromGitiles, pkg-config, libuuid, openssl, libyaml, xz }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 version = "20180311"; ··· 13 13 }; 14 14 15 15 nativeBuildInputs = [ pkg-config ]; 16 - buildInputs = [ openssl libuuid libyaml lzma ]; 16 + buildInputs = [ openssl libuuid libyaml xz ]; 17 17 18 18 enableParallelBuilding = true; 19 19
+2 -2
pkgs/tools/text/silver-searcher/default.nix
··· 1 - {lib, stdenv, fetchFromGitHub, autoreconfHook, pkg-config, pcre, zlib, lzma}: 1 + {lib, stdenv, fetchFromGitHub, autoreconfHook, pkg-config, pcre, zlib, xz}: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "silver-searcher"; ··· 16 16 NIX_LDFLAGS = lib.optionalString stdenv.isLinux "-lgcc_s"; 17 17 18 18 nativeBuildInputs = [ autoreconfHook pkg-config ]; 19 - buildInputs = [ pcre zlib lzma ]; 19 + buildInputs = [ pcre zlib xz ]; 20 20 21 21 meta = with lib; { 22 22 homepage = "https://github.com/ggreer/the_silver_searcher/";
+2 -2
pkgs/tools/text/zimwriterfs/default.nix
··· 9 9 , file 10 10 , icu 11 11 , gumbo 12 - , lzma 12 + , xz 13 13 , xapian 14 14 , zimlib 15 15 , zlib ··· 27 27 }; 28 28 29 29 nativeBuildInputs = [ automake autoconf libtool pkg-config ]; 30 - buildInputs = [ file icu gumbo lzma zimlib zlib xapian ]; 30 + buildInputs = [ file icu gumbo xz zimlib zlib xapian ]; 31 31 setSourceRoot = '' 32 32 sourceRoot=$(echo */zimwriterfs) 33 33 '';
+8
pkgs/top-level/aliases.nix
··· 269 269 gnustep-make = gnustep.make; # added 2016-7-6 270 270 gnupg20 = throw "gnupg20 has been removed from nixpkgs as upstream dropped support on 2017-12-31";# added 2020-07-12 271 271 gnuvd = throw "gnuvd was removed because the backend service is missing"; # added 2020-01-14 272 + gmock = gtest; # moved from top-level 2021-03-14 272 273 go_1_12 = throw "go_1_12 has been removed"; # added 2020-04-26 273 274 go-pup = pup; # added 2017-12-19 274 275 gobby5 = gobby; # added 2021-02-01 ··· 310 311 infiniband-diags = rdma-core; # added 2019-08-09 311 312 inotifyTools = inotify-tools; 312 313 inter-ui = inter; # added 2021-03-27 314 + iproute = iproute2; # moved from top-level 2021-03-14 313 315 i-score = throw "i-score has been removed: abandoned upstream."; # added 2020-11-21 316 + jack2Full = jack2; # moved from top-level 2021-03-14 314 317 jamomacore = throw "jamomacore has been removed: abandoned upstream."; # added 2020-11-21 315 318 jbidwatcher = throw "jbidwatcher was discontinued in march 2021"; # added 2021-03-15 316 319 jbuilder = dune_1; # added 2018-09-09 ··· 335 338 kicad-with-packages3d = kicad; # added 2019-11-25 336 339 kindlegen = throw "kindlegen has been removed from nixpkgs, as it's abandoned and no longer available for download."; # 2021-03-09 337 340 krename-qt5 = krename; # added 2017-02-18 341 + kerberos = libkrb5; # moved from top-level 2021-03-14 338 342 keymon = throw "keymon has been removed from nixpkgs, as it's abandoned and archived."; # 2019-12-10 339 343 kvm = qemu_kvm; # added 2018-04-25 340 344 latinmodern-math = lmmath; ··· 395 399 lua5_expat = luaPackages.luaexpat; # added 2017-05-02 396 400 lua5_sec = luaPackages.luasec; # added 2017-05-02 397 401 lxappearance-gtk3 = throw "lxappearance-gtk3 has been removed. Use lxappearance instead, which now defaults to Gtk3"; # added 2020-06-03 402 + lzma = xz; # moved from top-level 2021-03-14 398 403 m3d-linux = m33-linux; # added 2016-08-13 399 404 man_db = man-db; # added 2016-05 400 405 manpages = man-pages; # added 2015-12-06 401 406 marathon = throw "marathon has been removed from nixpkgs, as it's unmaintained"; # added 2020-08-15 407 + mysql = mariadb; # moved from top-level 2021-03-14 402 408 mariadb-client = hiPrio mariadb.client; #added 2019.07.28 403 409 matcha = throw "matcha was renamed to matcha-gtk-theme"; # added 2020-05-09 404 410 mathics = throw "mathics has been removed from nixpkgs, as it's unmaintained"; # added 2020-08-15 ··· 825 831 xlibs = xorg; # added 2015-09 826 832 xpraGtk3 = xpra; # added 2018-09-13 827 833 xv = xxv; # added 2020-02-22 834 + yacc = bison; # moved from top-level 2021-03-14 828 835 youtubeDL = youtube-dl; # added 2014-10-26 829 836 ytop = throw "ytop has been abandoned by upstream. Consider switching to bottom instead"; 830 837 yubikey-neo-manager = throw "yubikey-neo-manager has been removed because it was broken. Use yubikey-manager-qt instead."; # added 2021-03-08 831 838 yuzu = yuzu-mainline; # added 2021-01-25 832 839 zimreader = throw "zimreader has been removed from nixpkgs as it has been replaced by kiwix-serve and stopped working with modern zimlib versions."; # added 2021-03-28 833 840 zdfmediathk = mediathekview; # added 2019-01-19 841 + 834 842 gnome_user_docs = gnome-user-docs; # added 2019-11-20 835 843 # spidermonkey is not ABI upwards-ompatible, so only allow this for nix-shell 836 844 spidermonkey = spidermonkey_78; # added 2020-10-09
+8 -12
pkgs/top-level/all-packages.nix
··· 5178 5178 gt5 = callPackage ../tools/system/gt5 { }; 5179 5179 5180 5180 gtest = callPackage ../development/libraries/gtest { }; 5181 - gmock = gtest; # TODO: move to aliases.nix 5182 5181 5183 5182 gbenchmark = callPackage ../development/libraries/gbenchmark {}; 5184 5183 ··· 6348 6347 luxcorerender = callPackage ../tools/graphics/luxcorerender { }; 6349 6348 6350 6349 xz = callPackage ../tools/compression/xz { }; 6351 - lzma = xz; # TODO: move to aliases.nix 6352 6350 6353 6351 lz4 = callPackage ../tools/compression/lz4 { }; 6354 6352 ··· 12258 12256 }); 12259 12257 12260 12258 bison = callPackage ../development/tools/parsing/bison { }; 12261 - yacc = bison; # TODO: move to aliases.nix 12262 12259 12263 12260 # Ruby fails to build with current bison 12264 12261 bison_3_5 = pkgs.bison.overrideAttrs (oldAttrs: rec { ··· 13917 13914 cypress = callPackage ../development/web/cypress { }; 13918 13915 13919 13916 cyrus_sasl = callPackage ../development/libraries/cyrus-sasl { 13920 - kerberos = if stdenv.isFreeBSD then libheimdal else kerberos; 13917 + libkrb5 = if stdenv.isFreeBSD then libheimdal else libkrb5; 13921 13918 }; 13922 13919 13923 13920 # Make bdb5 the default as it is the last release under the custom ··· 14955 14952 }; 14956 14953 krb5Full = krb5; 14957 14954 libkrb5 = krb5.override { type = "lib"; }; 14958 - kerberos = libkrb5; # TODO: move to aliases.nix 14959 14955 14960 14956 l-smash = callPackage ../development/libraries/l-smash { 14961 14957 stdenv = gccStdenv; ··· 18119 18115 18120 18116 ### SERVERS 18121 18117 18122 - _389-ds-base = callPackage ../servers/ldap/389 { 18123 - kerberos = libkrb5; 18124 - }; 18118 + _389-ds-base = callPackage ../servers/ldap/389 { }; 18125 18119 18126 18120 adguardhome = callPackage ../servers/adguardhome {}; 18127 18121 ··· 18703 18697 inherit (darwin) cctools; 18704 18698 inherit (pkgs.darwin.apple_sdk.frameworks) CoreServices; 18705 18699 }; 18706 - mysql = mariadb; # TODO: move to aliases.nix 18707 18700 18708 18701 mongodb = hiPrio mongodb-3_4; 18709 18702 ··· 19502 19495 iotop = callPackage ../os-specific/linux/iotop { }; 19503 19496 19504 19497 iproute2 = callPackage ../os-specific/linux/iproute { }; 19505 - iproute = iproute2; # Alias added 2020-11-15 (TODO: deprecate and move to pkgs/top-level/aliases.nix) 19506 19498 19507 19499 iproute_mptcp = callPackage ../os-specific/linux/iproute/mptcp.nix { }; 19508 19500 ··· 29505 29497 inherit (darwin.apple_sdk.frameworks) AudioUnit CoreAudio Accelerate; 29506 29498 inherit (darwin) libobjc; 29507 29499 }; 29500 + 29508 29501 libjack2 = jack2.override { prefix = "lib"; }; 29509 - jack2Full = jack2; # TODO: move to aliases.nix 29510 29502 29511 29503 j2cli = with python3Packages; toPythonApplication j2cli; 29512 29504 ··· 29840 29832 mnemonicode = callPackage ../misc/mnemonicode { }; 29841 29833 29842 29834 mysql-workbench = callPackage ../applications/misc/mysql-workbench (let mysql = mysql57; in { 29843 - gdal = gdal.override {libmysqlclient = mysql // {lib = {dev = mysql;};};}; 29835 + gdal = gdal.override { 29836 + libmysqlclient = mysql // { 29837 + lib = { dev = mysql; } 29838 + ;} 29839 + ;}; 29844 29840 mysql = mysql; 29845 29841 pcre = pcre-cpp; 29846 29842 jre = jre8; # TODO: remove override https://github.com/NixOS/nixpkgs/pull/89731
+1 -1
pkgs/top-level/lua-packages.nix
··· 8 8 { fetchurl, stdenv, lua, unzip, pkg-config 9 9 , pcre, oniguruma, gnulib, tre, glibc, sqlite, openssl, expat 10 10 , autoreconfHook, gnum4 11 - , mysql, postgresql, cyrus_sasl 11 + , postgresql, cyrus_sasl 12 12 , fetchFromGitHub, which, writeText 13 13 , pkgs 14 14 , lib
+1 -3
pkgs/top-level/python-packages.nix
··· 3659 3659 3660 3660 keras-preprocessing = callPackage ../development/python-modules/keras-preprocessing { }; 3661 3661 3662 - kerberos = callPackage ../development/python-modules/kerberos { 3663 - inherit (pkgs) kerberos; 3664 - }; 3662 + kerberos = callPackage ../development/python-modules/kerberos { }; 3665 3663 3666 3664 keyring = if isPy3k then 3667 3665 callPackage ../development/python-modules/keyring { }
+1 -1
pkgs/top-level/release-small.nix
··· 93 93 ltrace = linux; 94 94 lvm2 = linux; 95 95 lynx = linux; 96 - lzma = linux; 96 + xz = linux; 97 97 man = linux; 98 98 man-pages = linux; 99 99 mc = all;