···1518 <listitem>
1519 <para>
1520 The
000000000000000001521 <link xlink:href="options.html#opt-services.syncoid.enable">services.syncoid.enable</link>
1522 module now properly drops ZFS permissions after usage. Before
1523 it delegated permissions to whole pools instead of datasets
···1518 <listitem>
1519 <para>
1520 The
1521+ <link xlink:href="options.html#opt-services.smokeping.host">services.smokeping.host</link>
1522+ option was added and defaulted to
1523+ <literal>localhost</literal>. Before,
1524+ <literal>smokeping</literal> listened to all interfaces by
1525+ default. NixOS defaults generally aim to provide
1526+ non-Internet-exposed defaults for databases and internal
1527+ monitoring tools, see e.g.
1528+ <link xlink:href="https://github.com/NixOS/nixpkgs/issues/100192">#100192</link>.
1529+ Further, the systemd service for <literal>smokeping</literal>
1530+ got reworked defaults for increased operational stability, see
1531+ <link xlink:href="https://github.com/NixOS/nixpkgs/pull/144127">PR
1532+ #144127</link> for details.
1533+ </para>
1534+ </listitem>
1535+ <listitem>
1536+ <para>
1537+ The
1538 <link xlink:href="options.html#opt-services.syncoid.enable">services.syncoid.enable</link>
1539 module now properly drops ZFS permissions after usage. Before
1540 it delegated permissions to whole pools instead of datasets
+2
nixos/doc/manual/release-notes/rl-2111.section.md
···445446- The [networking.wireless.iwd](options.html#opt-networking.wireless.iwd.enable) module has a new [networking.wireless.iwd.settings](options.html#opt-networking.wireless.iwd.settings) option.
44700448- The [services.syncoid.enable](options.html#opt-services.syncoid.enable) module now properly drops ZFS permissions after usage. Before it delegated permissions to whole pools instead of datasets and didn't clean up after execution. You can manually look this up for your pools by running `zfs allow your-pool-name` and use `zfs unallow syncoid your-pool-name` to clean this up.
449450- Zfs: `latestCompatibleLinuxPackages` is now exported on the zfs package. One can use `boot.kernelPackages = config.boot.zfs.package.latestCompatibleLinuxPackages;` to always track the latest compatible kernel with a given version of zfs.
···445446- The [networking.wireless.iwd](options.html#opt-networking.wireless.iwd.enable) module has a new [networking.wireless.iwd.settings](options.html#opt-networking.wireless.iwd.settings) option.
447448+- The [services.smokeping.host](options.html#opt-services.smokeping.host) option was added and defaulted to `localhost`. Before, `smokeping` listened to all interfaces by default. NixOS defaults generally aim to provide non-Internet-exposed defaults for databases and internal monitoring tools, see e.g. [#100192](https://github.com/NixOS/nixpkgs/issues/100192). Further, the systemd service for `smokeping` got reworked defaults for increased operational stability, see [PR #144127](https://github.com/NixOS/nixpkgs/pull/144127) for details.
449+450- The [services.syncoid.enable](options.html#opt-services.syncoid.enable) module now properly drops ZFS permissions after usage. Before it delegated permissions to whole pools instead of datasets and didn't clean up after execution. You can manually look this up for your pools by running `zfs allow your-pool-name` and use `zfs unallow syncoid your-pool-name` to clean this up.
451452- Zfs: `latestCompatibleLinuxPackages` is now exported on the zfs package. One can use `boot.kernelPackages = config.boot.zfs.package.latestCompatibleLinuxPackages;` to always track the latest compatible kernel with a given version of zfs.
···1+{ lib, stdenv, fetchurl, dpkg, autoPatchelfHook, makeWrapper, electron
2+, alsa-lib, glibc, gtk3, libxshmfence, mesa, nss }:
3+4+stdenv.mkDerivation rec {
5+ pname = "threema-desktop";
6+ version = "1.0.3";
7+8+ src = fetchurl {
9+ # As Threema only offers a Latest Release url, the plan is to upload each
10+ # new release url to web.archive.org until their Github releases page gets populated.
11+ url = "https://web.archive.org/web/20211027194646/https://releases.threema.ch/web-electron/v1/release/Threema-Latest.deb";
12+ sha256 = "sha256-qiFv52nnyfHxCWTePmyxW/MgzFy3EUxmW6n+UIkw7tk=";
13+ };
14+15+ nativeBuildInputs = [
16+ dpkg
17+ autoPatchelfHook
18+ makeWrapper
19+ ];
20+21+ buildInputs = [ alsa-lib glibc gtk3 libxshmfence mesa nss ];
22+23+ dontBuild = true;
24+ dontConfigure = true;
25+26+ unpackPhase = ''
27+ # Can't unpack with the common dpkg-deb -x method
28+ dpkg --fsys-tarfile $src | tar --extract
29+ '';
30+31+ installPhase = ''
32+ runHook preInstall
33+34+ # This will cause confusion, not needed
35+ rm -r usr/bin
36+ mv usr $out
37+38+ runHook postInstall
39+ '';
40+41+ postFixup = ''
42+ mv $out/share/applications/threema.desktop $out/share/applications/threema-desktop.desktop
43+ makeWrapper ${electron}/bin/electron $out/bin/threema \
44+ --add-flags $out/lib/threema/resources/app.asar
45+ '';
46+47+ meta = with lib; {
48+ description = "Desktop client for Threema, a privacy-focused end-to-end encrypted mobile messenger";
49+ homepage = "https://threema.ch";
50+ license = licenses.agpl3Only;
51+ maintainers = with maintainers; [ wolfangaukang ];
52+ platforms = [ "x86_64-linux" ];
53+ };
54+}
+3-3
pkgs/applications/science/logic/lean/default.nix
···23stdenv.mkDerivation rec {
4 pname = "lean";
5- version = "3.33.0";
67 src = fetchFromGitHub {
8 owner = "leanprover-community";
···11 # from. this is then used to check whether an olean file should be
12 # rebuilt. don't use a tag as rev because this will get replaced into
13 # src/githash.h.in in preConfigure.
14- rev = "a0fb1e8c7ac81dfd2e80ad0de08f4e57ee853d82";
15- sha256 = "03xz3c3dzjhvjzpa8811cgzzqzw8fpajmspykavmb259i391w0y7";
16 };
1718 nativeBuildInputs = [ cmake ];
···23stdenv.mkDerivation rec {
4 pname = "lean";
5+ version = "3.35.0";
67 src = fetchFromGitHub {
8 owner = "leanprover-community";
···11 # from. this is then used to check whether an olean file should be
12 # rebuilt. don't use a tag as rev because this will get replaced into
13 # src/githash.h.in in preConfigure.
14+ rev = "a68d251bfc57341d8f1f6d8c6e548a0b08ff3b92";
15+ sha256 = "0f91kvd4z7rsjyagfx56y1vxmf4wjds7bnz6yh3sd4xx770z58d4";
16 };
1718 nativeBuildInputs = [ cmake ];
+1-1
pkgs/applications/science/logic/why3/default.nix
···23 # S-expression output for why3pp
24 ppx_deriving ppx_sexp_conv
25 # Coq Support
26- coqPackages.coq coqPackages.flocq ocamlPackages.camlp5
27 ];
2829 propagatedBuildInputs = with ocamlPackages; [ camlzip num re sexplib ];
···23 # S-expression output for why3pp
24 ppx_deriving ppx_sexp_conv
25 # Coq Support
26+ coqPackages.coq coqPackages.flocq
27 ];
2829 propagatedBuildInputs = with ocamlPackages; [ camlzip num re sexplib ];
···1+{ lib, stdenv, fetchgit, dtc, fetchpatch }:
23stdenv.mkDerivation rec {
4 pname = "spike";
···2829 doCheck = true;
3031+ # To test whether spike is working, we run the RISC-V hello applications using the RISC-V proxy
32+ # kernel on the Spike emulator and see whether we get the expected output.
33+ doInstallCheck = true;
34+ installCheckPhase =
35+ let
36+ riscvPkgs = import ../../../.. { crossSystem = lib.systems.examples.riscv64-embedded; };
37+ in
38+ ''
39+ runHook preInstallCheck
40+41+ $out/bin/spike -m64 ${riscvPkgs.riscv-pk}/bin/pk ${riscvPkgs.hello}/bin/hello | grep -Fq "Hello, world"
42+43+ runHook postInstallCheck
44+ '';
4546 meta = with lib; {
47 description = "A RISC-V ISA Simulator";
···21 patchPhase = ''
22 # Needed since the tests expect that HISTCONTROL is set.
23 sed -i '/setup()/a HISTCONTROL=""' test/bash-preexec.bats
000024 '';
2526 checkPhase = ''
···21 patchPhase = ''
22 # Needed since the tests expect that HISTCONTROL is set.
23 sed -i '/setup()/a HISTCONTROL=""' test/bash-preexec.bats
24+25+ # Skip tests failing with Bats 1.5.0.
26+ # See https://github.com/rcaloras/bash-preexec/issues/121
27+ sed -i '/^@test.*IFS/,/^}/d' test/bash-preexec.bats
28 '';
2930 checkPhase = ''
+4-5
pkgs/development/libraries/grpc/default.nix
···57 "-DgRPC_ABSL_PROVIDER=package"
58 "-DBUILD_SHARED_LIBS=ON"
59 "-DCMAKE_SKIP_BUILD_RPATH=OFF"
00060 # Needs to be compiled with -std=c++11 for clang < 11. Interestingly this is
61 # only an issue with the useLLVM stdenv, not the darwin stdenv…
62 # https://github.com/grpc/grpc/issues/26473#issuecomment-860885484
63- (if (stdenv.hostPlatform.useLLVM or false) && lib.versionOlder stdenv.cc.cc.version "11.0"
64- then "-DCMAKE_CXX_STANDARD=11"
65- else "-DCMAKE_CXX_STANDARD=17")
66- ] ++ lib.optionals (stdenv.hostPlatform != stdenv.buildPlatform) [
67- "-D_gRPC_PROTOBUF_PROTOC_EXECUTABLE=${buildPackages.protobuf}/bin/protoc"
68 ];
6970 # CMake creates a build directory by default, this conflicts with the
···57 "-DgRPC_ABSL_PROVIDER=package"
58 "-DBUILD_SHARED_LIBS=ON"
59 "-DCMAKE_SKIP_BUILD_RPATH=OFF"
60+ ] ++ lib.optionals (stdenv.hostPlatform != stdenv.buildPlatform) [
61+ "-D_gRPC_PROTOBUF_PROTOC_EXECUTABLE=${buildPackages.protobuf}/bin/protoc"
62+ ] ++ lib.optionals ((stdenv.hostPlatform.useLLVM or false) && lib.versionOlder stdenv.cc.cc.version "11.0") [
63 # Needs to be compiled with -std=c++11 for clang < 11. Interestingly this is
64 # only an issue with the useLLVM stdenv, not the darwin stdenv…
65 # https://github.com/grpc/grpc/issues/26473#issuecomment-860885484
66+ "-DCMAKE_CXX_STANDARD=11"
000067 ];
6869 # CMake creates a build directory by default, this conflicts with the