···5555[*.lock]
5656indent_size = unset
57575858+# trailing whitespace is an actual syntax element of classic Markdown/
5959+# CommonMark to enforce a line break
6060+[*.md]
6161+trim_trailing_whitespace = unset
6262+5863[eggs.nix]
5964trim_trailing_whitespace = unset
6065
···7474 </para>
7575 </listitem>
7676 <listitem>
7777+<literallayout>Pulseaudio has been upgraded to version 15.0 and now optionally <link xlink:href="https://www.freedesktop.org/wiki/Software/PulseAudio/Notes/15.0/#supportforldacandaptxbluetoothcodecsplussbcxqsbcwithhigher-qualityparameters">supports additional Bluetooth audio codecs</link> like aptX or LDAC, with codec switching support being available in <literal>pavucontrol</literal>. This feature is disabled by default but can be enabled by using <literal>hardware.pulseaudio.package = pkgs.pulseaudioFull;</literal>.
7878+Existing 3rd party modules that provided similar functionality, like <literal>pulseaudio-modules-bt</literal> or <literal>pulseaudio-hsphfpd</literal> are deprecated and have been removed.</literallayout>
7979+ </listitem>
8080+ <listitem>
7781 <para>
7882 The new
7983 <link xlink:href="https://nixos.org/manual/nixpkgs/stable/#sec-postgresqlTestHook"><literal>postgresqlTestHook</literal></link>
+3
nixos/doc/manual/release-notes/rl-2205.section.md
···27272828- Systemd has been upgraded to the version 250.
29293030+- Pulseaudio has been upgraded to version 15.0 and now optionally [supports additional Bluetooth audio codecs](https://www.freedesktop.org/wiki/Software/PulseAudio/Notes/15.0/#supportforldacandaptxbluetoothcodecsplussbcxqsbcwithhigher-qualityparameters) like aptX or LDAC, with codec switching support being available in `pavucontrol`. This feature is disabled by default but can be enabled by using `hardware.pulseaudio.package = pkgs.pulseaudioFull;`.
3131+ Existing 3rd party modules that provided similar functionality, like `pulseaudio-modules-bt` or `pulseaudio-hsphfpd` are deprecated and have been removed.
3232+3033- The new [`postgresqlTestHook`](https://nixos.org/manual/nixpkgs/stable/#sec-postgresqlTestHook) runs a PostgreSQL server for the duration of package checks.
31343235- [`kops`](https://kops.sigs.k8s.io) defaults to 1.22.4, which will enable [Instance Metadata Service Version 2](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/configuring-instance-metadata-service.html) and require tokens on new clusters with Kubernetes 1.22. This will increase security by default, but may break some types of workloads. See the [release notes](https://kops.sigs.k8s.io/releases/1.22-notes/) for details.
···1111 if [ -n "$setupPyGlobalFlags" ]; then
1212 args+="$setupPyGlobalFlags"
1313 fi
1414+ if [ -n "$enableParallelBuilding" ]; then
1515+ setupPyBuildFlags+="--parallel $NIX_BUILD_CORES"
1616+ fi
1417 if [ -n "$setupPyBuildFlags" ]; then
1518 args+="build_ext $setupPyBuildFlags"
1619 fi
···4040 makeFlagsArray+=("bindir=$bin/bin" "sbindir=$bin/sbin" "rootsbindir=$bin/sbin")
4141 '';
42424343- # The stackprotector and fortify hardening flags are autodetected by glibc
4444- # and enabled by default if supported. Setting it for every gcc invocation
4545- # does not work.
4646- hardeningDisable = [ "stackprotector" "fortify" ]
4747- # XXX: Not actually musl-speciic but since only musl enables pie by default,
4848- # limit rebuilds by only disabling pie w/musl
4949- ++ lib.optional stdenv.hostPlatform.isMusl "pie";
4343+ # The pie, stackprotector and fortify hardening flags are autodetected by
4444+ # glibc and enabled by default if supported. Setting it for every gcc
4545+ # invocation does not work.
4646+ hardeningDisable = [ "fortify" "pie" "stackprotector" ];
50475148 NIX_CFLAGS_COMPILE = lib.concatStringsSep " "
5249 (builtins.concatLists [
···530530 # when a command can’t be found in a bazel build, you might also
531531 # need to add it to `defaultShellPath`.
532532 nativeBuildInputs = [
533533- coreutils
534533 installShellFiles
535534 makeWrapper
536535 python3
···525525 # when a command can’t be found in a bazel build, you might also
526526 # need to add it to `defaultShellPath`.
527527 nativeBuildInputs = [
528528- coreutils
529528 installShellFiles
530529 makeWrapper
531530 python3
···7788stdenv.mkDerivation rec {
99 pname = "ell";
1010- version = "0.49";
1010+ version = "0.50";
11111212 outputs = [ "out" "dev" ];
13131414 src = fetchgit {
1515 url = "https://git.kernel.org/pub/scm/libs/ell/ell.git";
1616 rev = version;
1717- sha256 = "sha256-/5ivelqRDvJuPVJqMs27VJUIq7/Dw6ROt/cmjSo309s=";
1717+ sha256 = "sha256-LQAbE/pAKjVFsn9FjIbvY6sTBcVBdi4LCOnDVZ/WGV0=";
1818 };
19192020 nativeBuildInputs = [
···3131 doCheck = true;
32323333 meta = with lib; {
3434- homepage = "https://01.org/ell";
3434+ homepage = "https://git.kernel.org/pub/scm/libs/ell/ell.git";
3535 description = "Embedded Linux Library";
3636 longDescription = ''
3737 The Embedded Linux* Library (ELL) provides core, low-level functionality for system daemons. It typically has no dependencies other than the Linux kernel, C standard library, and libdl (for dynamic linking). While ELL is designed to be efficient and compact enough for use on embedded Linux platforms, it is not limited to resource-constrained systems.
3838 '';
3939+ changelog = "https://git.kernel.org/pub/scm/libs/ell/ell.git/tree/ChangeLog?h=${version}";
3940 license = licenses.lgpl21Plus;
4041 platforms = platforms.linux;
4142 maintainers = with maintainers; [ mic92 dtzWill maxeaubrey ];
+2-2
pkgs/os-specific/linux/kernel-headers/default.nix
···8181in {
8282 inherit makeLinuxHeaders;
83838484- linuxHeaders = let version = "5.16"; in
8484+ linuxHeaders = let version = "5.17"; in
8585 makeLinuxHeaders {
8686 inherit version;
8787 src = fetchurl {
8888 url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz";
8989- sha256 = "1fq86dbx2p124vi4j8nan68gj4zyw4xnqh4jxq9aqsdvi24pwz82";
8989+ sha256 = "1cdi43x4c3l4chznh57gm55szycj4wjlxl1dss1ilnfvvmhyypsm";
9090 };
9191 patches = [
9292 ./no-relocs.patch # for building x86 kernel headers on non-ELF platforms
···66 pname = "libcap-ng";
77 # When updating make sure to test that the version with
88 # all of the python bindings still works
99- version = "0.8.2";
99+ version = "0.8.3";
10101111 src = fetchurl {
1212 url = "${meta.homepage}/${pname}-${version}.tar.gz";
1313- sha256 = "1sasp1n154aqy9fz0knlb966svm7xg1zjhg1vr4q839bgjvq7h2j";
1313+ sha256 = "sha256-vtb2hI4iuy+Dtfdksq7w7TkwVOgDqOOocRyyo55rSS0=";
1414 };
15151616 nativeBuildInputs = [ swig ];
···11-{ lib, stdenv, fetchFromGitHub, bash, makeWrapper, bat
11+{ lib, stdenv, fetchFromGitHub, makeWrapper, bat
22# batdiff, batgrep, and batwatch
33, coreutils
44, getconf
···3333 };
34343535 # bat needs to be in the PATH during building so EXECUTABLE_BAT picks it up
3636- nativeBuildInputs = [ bash bat ];
3636+ nativeBuildInputs = [ bat ];
37373838 dontConfigure = true;
3939···93939494 src = core;
95959696- nativeBuildInputs = [ bash makeWrapper ];
9696+ nativeBuildInputs = [ makeWrapper ];
9797 # Make the dependencies available to the tests.
9898 buildInputs = dependencies;
9999
···4040 ];
41414242 buildInputs = [ perl ];
4343- nativeBuildInputs = [ makeWrapper gnused ];
4343+ nativeBuildInputs = [ makeWrapper ];
44444545 # XXX: While [1] states that DESTDIR should not be used, and that the correct
4646 # variable to set is, in fact, PREFIX, tlp thinks otherwise. The Makefile for
+6-5
pkgs/tools/networking/curl/default.nix
···108108 configureFlags = [
109109 # Build without manual
110110 "--disable-manual"
111111- # Disable default CA bundle, use NIX_SSL_CERT_FILE or fallback
112112- # to nss-cacert from the default profile.
113113- # https://github.com/curl/curl/issues/8696 - fallback is not supported by HTTP3
114114- (if http3Support then "--with-ca-bundle=/etc/ssl/certs/ca-certificates.crt" else "--without-ca-bundle")
115115- "--without-ca-path"
116111 (lib.enableFeature c-aresSupport "ares")
117112 (lib.enableFeature ldapSupport "ldap")
118113 (lib.enableFeature ldapSupport "ldaps")
···136131 ++ lib.optionals stdenv.hostPlatform.isWindows [
137132 "--disable-shared"
138133 "--enable-static"
134134+ ] ++ lib.optionals stdenv.isDarwin [
135135+ # Disable default CA bundle, use NIX_SSL_CERT_FILE or fallback to nss-cacert from the default profile.
136136+ # Without this curl might detect /etc/ssl/cert.pem at build time on macOS, causing curl to ignore NIX_SSL_CERT_FILE.
137137+ # https://github.com/curl/curl/issues/8696 - fallback is not supported by HTTP3
138138+ (if http3Support then "--with-ca-bundle=/etc/ssl/certs/ca-certificates.crt" else "--without-ca-bundle")
139139+ "--without-ca-path"
139140 ];
140141141142 CXX = "${stdenv.cc.targetPrefix}c++";
···656656 libmsgpack = throw "'libmsgpack' has been renamed to/replaced by 'msgpack'"; # Converted to throw 2022-02-22
657657 libosmpbf = throw "libosmpbf was removed because it is no longer required by osrm-backend";
658658 libpng_apng = throw "libpng_apng has been removed, because it is equivalent to libpng"; # Added 2021-03-21
659659+ libpulseaudio-vanilla = libpulseaudio; # Added 2022-04-20
659660 libqmatrixclient = throw "libqmatrixclient was renamed to libquotient"; # Added 2020-04-09
660661 libqrencode = throw "'libqrencode' has been renamed to/replaced by 'qrencode'"; # Converted to throw 2022-02-22
661662 librdf = lrdf; # Added 2020-03-22
···1713317133 sha256 = "0xl8lcv9gfv0nn8vrrxa4az359whqdhmzw4r51nn3add8pn3s9ip";
1713417134 };
1713517135 buildInputs = [ pkgs.zookeeper_mt ];
1713617136- nativeBuildInputs = [ pkgs.gnused ];
1713717136 # fix "error: format not a string literal and no format arguments [-Werror=format-security]"
1713817137 hardeningDisable = [ "format" ];
1713917138 # Make the async API accessible