···256256257257- `nodePackages.meshcommander` has been removed, as the package was deprecated by Intel.
258258259259-- The default version of `z3` has been updated from 4.8 to 4.13. There are still a few packages that need specific older versions; those will continue to be maintained as long as other packages depend on them but may be removed in the future.
259259+- The default version of `z3` has been updated from 4.8 to 4.14, and all old versions have been dropped. Note that `fstar` still depends on specific versions, and maintains them as overrides.
260260261261- `prometheus` has been updated from 2.55.0 to 3.1.0.
262262 Read the [release blog post](https://prometheus.io/blog/2024/11/14/prometheus-3-0/) and
+2
nixos/doc/manual/release-notes/rl-2505.section.md
···162162163163- [GlitchTip](https://glitchtip.com/), an open source Sentry API compatible error tracking platform. Available as [services.glitchtip](#opt-services.glitchtip.enable).
164164165165+- [`yarr`](https://github.com/nkanaev/yarr), a small, web-based feed aggregator and RSS reader. Available as [services.yarr](#opt-services.yarr.enable).
166166+165167- [Stash](https://github.com/stashapp/stash), An organizer for your adult videos/images, written in Go. Available as [services.stash](#opt-services.stash.enable).
166168167169- [vsmartcard-vpcd](https://frankmorgner.github.io/vsmartcard/virtualsmartcard/README.html), a virtual smart card driver. Available as [services.vsmartcard-vpcd](#opt-services.vsmartcard-vpcd.enable).
···22 lib,
33 stdenv,
44 fetchurl,
55- fetchFromGitLab,
66- fetchpatch,
75 cfitsio,
86 cmake,
97 curl,
1010- eigen,
88+ eigen_3_4_0,
119 gsl,
1210 indi-full,
1311 kdePackages,
···2220 zlib,
2321}:
24222525-let
2626- # reverts 'eigen: 3.4.0 -> 3.4.0-unstable-2022-05-19'
2727- # https://github.com/nixos/nixpkgs/commit/d298f046edabc84b56bd788e11eaf7ed72f8171c
2828- eigen' = eigen.overrideAttrs (old: rec {
2929- version = "3.4.0";
3030- src = fetchFromGitLab {
3131- owner = "libeigen";
3232- repo = "eigen";
3333- rev = version;
3434- hash = "sha256-1/4xMetKMDOgZgzz3WMxfHUEpmdAm52RqZvz6i0mLEw=";
3535- };
3636- patches = (old.patches or [ ]) ++ [
3737- # Fixes e.g. onnxruntime on aarch64-darwin:
3838- # https://hydra.nixos.org/build/248915128/nixlog/1,
3939- # originally suggested in https://github.com/NixOS/nixpkgs/pull/258392.
4040- #
4141- # The patch is from
4242- # ["Fix vectorized reductions for Eigen::half"](https://gitlab.com/libeigen/eigen/-/merge_requests/699)
4343- # which is two years old,
4444- # but Eigen hasn't had a release in two years either:
4545- # https://gitlab.com/libeigen/eigen/-/issues/2699.
4646- (fetchpatch {
4747- url = "https://gitlab.com/libeigen/eigen/-/commit/d0e3791b1a0e2db9edd5f1d1befdb2ac5a40efe0.patch";
4848- hash = "sha256-8qiNpuYehnoiGiqy0c3Mcb45pwrmc6W4rzCxoLDSvj0=";
4949- })
5050- ];
5151- });
5252-in
5353-5423stdenv.mkDerivation (finalAttrs: {
5524 pname = "kstars";
5625 version = "3.7.5";
···7039 breeze-icons
7140 cfitsio
7241 curl
7373- eigen'
4242+ eigen_3_4_0
7443 gsl
7544 indi-full
7645 kconfig
+3-8
pkgs/by-name/li/libblake3/package.nix
···55 fetchFromGitHub,
66 tbb_2021_11,
7788- # Until we have a release with
99- # https://github.com/BLAKE3-team/BLAKE3/pull/461 and similar, or those
1010- # PRs are patched onto this current release. Even then, I think we
1111- # still need to disable for MinGW build because
1212- # https://github.com/BLAKE3-team/BLAKE3/issues/467
1313- useTBB ? false,
88+ useTBB ? true,
149}:
15101611stdenv.mkDerivation (finalAttrs: {
1712 pname = "libblake3";
1818- version = "1.8.0";
1313+ version = "1.8.2";
19142015 src = fetchFromGitHub {
2116 owner = "BLAKE3-team";
2217 repo = "BLAKE3";
2318 tag = finalAttrs.version;
2424- hash = "sha256-Krh0yVNZKL6Mb0McqWTIMNownsgM3MUEX2IP+F/fu+k=";
1919+ hash = "sha256-IABVErXWYQFXZcwsFKfQhm3ox7UZUcW5uzVrGwsSp94=";
2520 };
26212722 sourceRoot = finalAttrs.src.name + "/c";
···1212}:
1313let
1414 pname = "obsidian";
1515- version = "1.8.9";
1515+ version = "1.8.10";
1616 appname = "Obsidian";
1717 meta = with lib; {
1818 description = "Powerful knowledge base that works on top of a local folder of plain text Markdown files";
···3636 url = "https://github.com/obsidianmd/obsidian-releases/releases/download/v${version}/${filename}";
3737 hash =
3838 if stdenv.hostPlatform.isDarwin then
3939- "sha256-OPK5GI0P52zk7EF8Gk5i15N/WddbNjS47YNy55o2A8k="
3939+ "sha256-3BiPbT1ME75WpR/mTDl8/TI+yq6+WMU+RaZXykUG8yE="
4040 else
4141- "sha256-XVq0nQiyT2HvKQpzJIvhghsGgg4ye7uqZcyA1nH4O/o=";
4141+ "sha256-xZoi4Z9JMM/FEPfvjBXEag3pT/uJH9dvFp8qHnTFNKE=";
4242 };
43434444 icon = fetchurl {
+104-50
pkgs/by-name/ov/ovftool/package.nix
···11{
22 autoPatchelfHook,
33 c-ares,
44+ curl,
45 darwin,
56 expat,
67 fetchurl,
78 glibc,
89 icu60,
1010+ jq,
911 lib,
1012 libiconv,
1113 libredirect,
1214 libxcrypt-legacy,
1315 libxml2,
1416 makeWrapper,
1717+ openssl,
1518 stdenv,
1619 unzip,
1720 xercesc,
1821 zlib,
2222+ acceptBroadcomEula ? false,
1923}:
20242125let
2626+ # Returns the base URL for the given tool ID.
2727+ mkBaseUrl = toolId: "https://developer.broadcom.com/tools/${toolId}/latest";
2828+ ovftoolId = "open-virtualization-format-ovf-tool";
22292323- ovftoolSystems =
3030+ # Use browser devtools to figure out how this works.
3131+ fetchFromBroadcom =
3232+ {
3333+ fileName,
3434+ version,
3535+ toolId ? ovftoolId,
3636+ artifactId ? 21342,
3737+ fileType ? "Download",
3838+ source ? "",
3939+ hash ? "",
4040+ }:
2441 let
2525- baseUrl = "https://vdc-download.vmware.com/vmwb-repository/dcr-public";
4242+ requestJson = builtins.toJSON {
4343+ inherit
4444+ fileName
4545+ artifactId
4646+ fileType
4747+ source
4848+ ;
4949+ };
2650 in
2727- {
2828- "i686-linux" = rec {
2929- name = "VMware-ovftool-${version}-lin.i386.zip";
3030- # As of 2024-02-20 the "Zip of OVF Tool for 32-bit Linux" download link
3131- # on the v4.6.2 page links to v4.6.0.
3232- version = "4.6.0-21452615";
3333- url = "${baseUrl}/7254abb2-434d-4f5d-83e2-9311ced9752e/57e666a2-874c-48fe-b1d2-4b6381f7fe97/${name}";
3434- hash = "sha256-qEOr/3SW643G5ZQQNJTelZbUxB8HmxPd5uD+Gqsoxz0=";
3535- };
3636- "x86_64-linux" = rec {
3737- name = "VMware-ovftool-${version}-lin.x86_64.zip";
3838- version = "4.6.2-22220919";
3939- url = "${baseUrl}/8a93ce23-4f88-4ae8-b067-ae174291e98f/c609234d-59f2-4758-a113-0ec5bbe4b120/${name}";
4040- hash = "sha256-3B1cUDldoTqLsbSARj2abM65nv+Ot0z/Fa35/klJXEY=";
4141- };
4242- "x86_64-darwin" = rec {
4343- name = "VMware-ovftool-${version}-mac.x64.zip";
4444- version = "4.6.2-22220919";
4545- url = "${baseUrl}/91091b23-280a-487a-a048-0c2594303c92/dc666e23-104f-4b9b-be11-6d88dcf3ab98/${name}";
4646- hash = "sha256-AZufZ0wxt5DYjnpahDfy36W8i7kjIfEkW6MoELSx11k=";
4747- };
5151+ fetchurl {
5252+ name = fileName;
5353+ url =
5454+ (mkBaseUrl toolId)
5555+ + "?p_p_id=SDK_AND_TOOL_DETAILS_INSTANCE_iwlk&p_p_lifecycle=2&p_p_resource_id=documentDownloadArtifact";
5656+ curlOptsList = [
5757+ "--json"
5858+ requestJson
5959+ ];
6060+ downloadToTemp = true;
6161+ nativeBuildInputs = [ jq ];
6262+ postFetch = ''
6363+ # Try again with the new URL
6464+ urls="$(jq -r 'if (.success == true) then .data.downloadUrl else error(. | tostring) end' < "$downloadedFile" || exit $?)" \
6565+ downloadToTemp="" \
6666+ curlOptsList="" \
6767+ curlOpts="" \
6868+ postFetch="" \
6969+ exec "$SHELL" "''${BASH_ARGV[@]}"
7070+ '';
7171+ inherit hash;
4872 };
49735050- ovftoolSystem = ovftoolSystems.${stdenv.system} or (throw "unsupported system ${stdenv.system}");
7474+ ovftoolSystems = {
7575+ "x86_64-linux" = rec {
7676+ version = "4.6.3-24031167";
7777+ fileName = "VMware-ovftool-${version}-lin.x86_64.zip";
7878+ hash = "sha256-NEwwgmEh/mrZkMMhI+Kq+SYdd3MJ0+IBLdUhd1+kPow=";
7979+ };
8080+ "x86_64-darwin" = rec {
8181+ version = "4.6.3-24031167";
8282+ fileName = "VMware-ovftool-${version}-mac.x64.zip";
8383+ hash = "sha256-vhACcc4tjaQhvKwZyWkgpaKaoC+coWGl1zfSIC6WebM=";
8484+ };
8585+ };
51868787+ ovftoolSystem = ovftoolSystems.${stdenv.system} or (throw "unsupported system ${stdenv.system}");
5288in
5353-stdenv.mkDerivation {
8989+stdenv.mkDerivation (final: {
5490 pname = "ovftool";
5591 inherit (ovftoolSystem) version;
56925757- src = fetchurl {
5858- inherit (ovftoolSystem) name url hash;
5959- };
9393+ src =
9494+ if acceptBroadcomEula then
9595+ fetchFromBroadcom {
9696+ inherit (ovftoolSystem) fileName version hash;
9797+ }
9898+ else
9999+ throw ''
100100+ See the following URL for terms of using this software:
101101+ ${mkBaseUrl ovftoolId}
102102+103103+ Use `${final.pname}.override { acceptBroadcomEula = true; }` if you accept Broadcom's terms
104104+ and would like to use this package.
105105+ '';
6010661107 buildInputs =
62108 [
···67113 libxcrypt-legacy
68114 xercesc
69115 zlib
116116+ curl
70117 ]
71118 ++ lib.optionals stdenv.hostPlatform.isLinux [
72119 glibc
120120+ openssl
73121 ]
74122 ++ lib.optionals stdenv.hostPlatform.isDarwin [
75123 libxml2
···97145 # with the addition of a libexec directory and a Nix-style binary wrapper.
9814699147 # Almost all libs in the package appear to be VMware proprietary except for
100100- # libgoogleurl and libcurl. The rest of the libraries that the installer
101101- # extracts are omitted here, and provided in buildInputs. Since libcurl
102102- # depends on VMware's OpenSSL, both libs are still used.
148148+ # libgoogleurl and libcurl.
149149+ #
103150 # FIXME: Replace libgoogleurl? Possibly from Chromium?
104104- # FIXME: Tell VMware to use a modern version of OpenSSL. As of ovftool
105105- # v4.6.2 ovftool uses openssl-1.0.2zh which in seems to be the extended
151151+ # FIXME: Tell VMware to use a modern version of OpenSSL on macOS. As of ovftool
152152+ # v4.6.3 ovftool uses openssl-1.0.2zj which in seems to be the extended
106153 # support LTS release: https://www.openssl.org/support/contracts.html
107154108155 # Install all libs that are not patched in preFixup.
···111158 install -m 644 -t "$out/lib" \
112159 ''
113160 + lib.optionalString stdenv.hostPlatform.isLinux ''
114114- libcrypto.so.1.0.2 \
115115- libcurl.so.4 \
116161 libgoogleurl.so.59 \
117117- libssl.so.1.0.2 \
118162 libssoclient.so \
119163 libvim-types.so \
120164 libvmacore.so \
121165 libvmomi.so
122166 ''
167167+ # macOS still relies on OpenSSL 1.0.2 as of v4.6.3, but Linux is in the clear
123168 + lib.optionalString stdenv.hostPlatform.isDarwin ''
124169 lib/libcrypto.1.0.2.dylib \
125125- lib/libcurl.4.dylib \
126170 lib/libgoogleurl.59.0.30.45.2.dylib \
127171 lib/libssl.1.0.2.dylib \
128172 lib/libssoclient.dylib \
···151195 install -m 644 -t "$out/share/licenses" \
152196 "vmware.eula" \
153197 "vmware-eula.rtf" \
198198+ "README.txt" \
154199 "open_source_licenses.txt"
155200156201 # Install Docs
···195240 change_args+=(-change @loader_path/lib/libicuuc.60.2.dylib ${icu60}/lib/libicuuc.60.2.dylib)
196241 change_args+=(-change @loader_path/lib/libxerces-c-3.2.dylib ${xercesc}/lib/libxerces-c-3.2.dylib)
197242243243+ # lolwut
244244+ change_args+=(-change @GOBUILD_CAYMAN_CURL_ROOT@/apple_mac64/lib/libcurl.4.dylib ${curl.out}/lib/libcurl.4.dylib)
245245+198246 # Patch binary
199247 install_name_tool "''${change_args[@]}" "$out/libexec/ovftool"
248248+ otool -L "$out/libexec/ovftool"
200249201250 # Additional patches for ovftool dylibs
202251 change_args+=(-change /usr/lib/libresolv.9.dylib ${lib.getLib darwin.libresolv}/lib/libresolv.9.dylib)
···206255 change_args+=(-change @loader_path/libicuuc.60.2.dylib ${icu60}/lib/libicuuc.60.2.dylib)
207256 change_args+=(-change @loader_path/libxerces-c-3.2.dylib ${xercesc}/lib/libxerces-c-3.2.dylib)
208257209209- # Add new abolute paths for other libs to all libs
258258+ # Add new absolute paths for other libs to all libs
210259 for lib in $out/lib/*.dylib; do
211260 libname=$(basename $lib)
212261 change_args+=(-change "@loader_path/$libname" "$out/lib/$libname")
···217266 libname=$(basename $lib)
218267 install_name_tool -id "$libname" "$lib"
219268 install_name_tool "''${change_args[@]}" "$lib"
269269+ otool -L "$lib"
220270 done
221271 '';
222272···227277 (allow file-read* (subpath "/System/Library/TextEncodings"))
228278 '';
229279230230- doInstallCheck = true;
280280+ # Seems to get stuck and return 255, but works outside the sandbox
281281+ doInstallCheck = !stdenv.hostPlatform.isDarwin;
231282232283 postInstallCheck =
233284 lib.optionalString stdenv.hostPlatform.isDarwin ''
234285 export HOME=$TMPDIR
235286 # Construct a dummy /etc/passwd file - ovftool attempts to determine the
236287 # user's "real" home using this
237237- DUMMY_PASSWD="$(realpath $HOME/dummy-passwd)"
288288+ DUMMY_PASSWD="$HOME/dummy-passwd"
238289 cat > $DUMMY_PASSWD <<EOF
239290 $(whoami)::$(id -u):$(id -g)::$HOME:$SHELL
240291 EOF
241292 export DYLD_INSERT_LIBRARIES="${libredirect}/lib/libredirect.dylib"
242242- export NIX_REDIRECTS="/etc/passwd=$DUMMY_PASSWD"
293293+ export NIX_REDIRECTS="/etc/passwd=$(realpath "$DUMMY_PASSWD")"
243294 ''
244295 + ''
245296 mkdir -p ovftool-check && cd ovftool-check
246297247298 ovftool_with_args="$out/bin/ovftool --X:logToConsole"
248299300300+ # There are non-fatal warnings if we don't provide this, due to the sandbox.
301301+ export LC_ALL=C
302302+249303 # `installCheckPhase.ova` is a NixOS 22.11 image (doesn't actually matter)
250304 # with a 1 MiB root disk that's all zero. Make sure that it converts
251305 # properly.
252306307307+ set -x
253308 $ovftool_with_args --schemaValidate ${./installCheckPhase.ova}
254309 $ovftool_with_args --sourceType=OVA --targetType=OVF ${./installCheckPhase.ova} nixos.ovf
255310···259314 test -f nixos-disk1.vmdk
260315261316 $ovftool_with_args --schemaValidate nixos.ovf
317317+ set +x
262318 '';
263319264320 meta = with lib; {
···272328 ];
273329 platforms = builtins.attrNames ovftoolSystems;
274330 mainProgram = "ovftool";
275275- knownVulnerabilities = [
276276- "The bundled version of openssl 1.0.2zh in ovftool has open vulnerabilities."
331331+ knownVulnerabilities = lib.optionals (stdenv.isDarwin) [
332332+ "The bundled version of openssl 1.0.2zj in ovftool for Darwin has open vulnerabilities."
333333+ "https://openssl-library.org/news/vulnerabilities-1.0.2/"
277334 "CVE-2024-0727"
278278- "CVE-2023-5678"
279279- "CVE-2023-3817"
280280- "CVE-2009-3767"
281281- "CVE-2009-3766"
282282- "CVE-2009-3765"
283283- "CVE-2009-1390"
335335+ "CVE-2024-5535"
336336+ "CVE-2024-9143"
337337+ "CVE-2024-13176"
284338 ];
285339 };
286286-}
340340+})
···4040 # point 'nix edit' and ofborg at the file that defines the attribute,
4141 # not this common file.
4242 pos = builtins.unsafeGetAttrPos "version" args;
4343+4444+ # Since this package is intimately tied to a specific Nix release, we
4545+ # propagate the Nix used for building it to make it easier for users
4646+ # downstream to reference it.
4747+ passthru = {
4848+ nix = lix;
4949+ };
5050+4351 meta = {
4452 description = "Hydra's builtin `hydra-eval-jobs` as a standalone tool";
4553 mainProgram = "nix-eval-jobs";