lol
0
fork

Configure Feed

Select the types of activity you want to include in your feed.

kerberos: deprecate alias

+89 -95
+2 -2
pkgs/applications/misc/azuredatastudio/default.nix
··· 12 12 , at-spi2-atk 13 13 , gnutar 14 14 , atomEnv 15 - , kerberos 15 + , libkrb5 16 16 }: 17 17 18 18 # from justinwoo/azuredatastudio-nix ··· 70 70 at-spi2-core 71 71 at-spi2-atk 72 72 stdenv.cc.cc.lib 73 - kerberos 73 + libkrb5 74 74 ] 75 75 ) 76 76 targetPath
+2 -2
pkgs/applications/networking/browsers/chromium/common.nix
··· 8 8 , libusb1, pciutils, nss, re2 9 9 10 10 , python2Packages, perl, pkg-config 11 - , nspr, systemd, kerberos 11 + , nspr, systemd, libkrb5 12 12 , util-linux, alsaLib 13 13 , bison, gperf 14 14 , glib, gtk3, dbus-glib ··· 135 135 buildInputs = defaultDependencies ++ [ 136 136 nspr nss systemd 137 137 util-linux alsaLib 138 - bison gperf kerberos 138 + bison gperf libkrb5 139 139 glib gtk3 dbus-glib 140 140 libXScrnSaver libXcursor libXtst libxshmfence libGLU libGL 141 141 pciutils protobuf speechd libXdamage at-spi2-core
+2 -2
pkgs/applications/networking/browsers/firefox-bin/default.nix
··· 13 13 , glibc 14 14 , gtk2 15 15 , gtk3 16 - , kerberos 16 + , libkrb5 17 17 , libX11 18 18 , libXScrnSaver 19 19 , libxcb ··· 106 106 glibc 107 107 gtk2 108 108 gtk3 109 - kerberos 109 + libkrb5 110 110 mesa 111 111 libX11 112 112 libXScrnSaver
+2 -2
pkgs/applications/networking/browsers/firefox/common.nix
··· 24 24 , gtk3Support ? true, gtk2, gtk3, wrapGAppsHook 25 25 , waylandSupport ? true, libxkbcommon 26 26 , ltoSupport ? (stdenv.isLinux && stdenv.is64bit), overrideCC, buildPackages 27 - , gssSupport ? true, kerberos 27 + , gssSupport ? true, libkrb5 28 28 , pipewireSupport ? waylandSupport && webrtcSupport, pipewire 29 29 30 30 ## privacy-related options ··· 174 174 ++ lib.optional alsaSupport alsaLib 175 175 ++ lib.optional pulseaudioSupport libpulseaudio # only headers are needed 176 176 ++ lib.optional gtk3Support gtk3 177 - ++ lib.optional gssSupport kerberos 177 + ++ lib.optional gssSupport libkrb5 178 178 ++ lib.optional waylandSupport libxkbcommon 179 179 ++ lib.optional pipewireSupport pipewire 180 180 ++ lib.optional (lib.versionAtLeast ffversion "82") gnum4
+2 -2
pkgs/applications/networking/browsers/firefox/wrapper.nix
··· 8 8 , tridactyl-native 9 9 , fx_cast_bridge 10 10 , udev 11 - , kerberos 11 + , libkrb5 12 12 , libva 13 13 , mesa # firefox wants gbm for drm+dmabuf 14 14 }: ··· 65 65 libs = lib.optionals stdenv.isLinux [ udev libva mesa libnotify xorg.libXScrnSaver ] 66 66 ++ lib.optional (pipewireSupport && lib.versionAtLeast version "83") pipewire 67 67 ++ lib.optional ffmpegSupport ffmpeg 68 - ++ lib.optional gssSupport kerberos 68 + ++ lib.optional gssSupport libkrb5 69 69 ++ lib.optional useGlvnd libglvnd 70 70 ++ lib.optionals (cfg.enableQuakeLive or false) 71 71 (with xorg; [ stdenv.cc libX11 libXxf86dga libXxf86vm libXext libXt alsaLib zlib ])
+2 -2
pkgs/applications/networking/browsers/google-chrome/default.nix
··· 5 5 , libXcursor, libXext, libXfixes, libXrender, libXScrnSaver, libXcomposite, libxcb 6 6 , alsaLib, libXdamage, libXtst, libXrandr, libxshmfence, expat, cups 7 7 , dbus, gtk3, gdk-pixbuf, gcc-unwrapped, at-spi2-atk, at-spi2-core 8 - , kerberos, libdrm, mesa 8 + , libkrb5, libdrm, mesa 9 9 , libxkbcommon, wayland # ozone/wayland 10 10 11 11 # Command line programs ··· 66 66 liberation_ttf curl util-linux xdg-utils wget 67 67 flac harfbuzz icu libpng opusWithCustomModes snappy speechd 68 68 bzip2 libcap at-spi2-atk at-spi2-core 69 - kerberos libdrm mesa coreutils 69 + libkrb5 libdrm mesa coreutils 70 70 libxkbcommon wayland 71 71 ] ++ optional pulseSupport libpulseaudio 72 72 ++ optional libvaSupport libva
+2 -2
pkgs/applications/networking/cluster/openshift/default.nix
··· 1 1 { lib, fetchFromGitHub, buildGoPackage, which, go-bindata, rsync, util-linux 2 - , coreutils, kerberos, ncurses, clang, installShellFiles 2 + , coreutils, libkrb5, ncurses, clang, installShellFiles 3 3 , components ? [ 4 4 "cmd/oc" 5 5 "cmd/openshift" ··· 33 33 34 34 goPackagePath = "github.com/openshift/origin"; 35 35 36 - buildInputs = [ kerberos ncurses ]; 36 + buildInputs = [ libkrb5 ncurses ]; 37 37 38 38 nativeBuildInputs = [ which rsync go-bindata clang installShellFiles ]; 39 39
+2 -2
pkgs/applications/networking/mailreaders/alpine/default.nix
··· 1 - {lib, stdenv, fetchurl, ncurses, tcl, openssl, pam, kerberos 1 + {lib, stdenv, fetchurl, ncurses, tcl, openssl, pam, libkrb5 2 2 , openldap 3 3 }: 4 4 ··· 12 12 }; 13 13 14 14 buildInputs = [ 15 - ncurses tcl openssl pam kerberos openldap 15 + ncurses tcl openssl pam libkrb5 openldap 16 16 ]; 17 17 18 18 hardeningDisable = [ "format" ];
+2 -2
pkgs/applications/networking/mailreaders/mutt/default.nix
··· 4 4 , cyrus_sasl ? null 5 5 , gnupg ? null 6 6 , gpgme ? null 7 - , kerberos ? null 7 + , libkrb5 ? null 8 8 , headerCache ? true 9 9 , sslSupport ? true 10 10 , saslSupport ? true ··· 43 43 [ ncurses which perl ] 44 44 ++ optional headerCache gdbm 45 45 ++ optional sslSupport openssl 46 - ++ optional gssSupport kerberos 46 + ++ optional gssSupport libkrb5 47 47 ++ optional saslSupport cyrus_sasl 48 48 ++ optional gpgmeSupport gpgme; 49 49
+2 -2
pkgs/applications/networking/mailreaders/neomutt/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, gettext, makeWrapper, tcl, which 2 - , ncurses, perl , cyrus_sasl, gss, gpgme, kerberos, libidn, libxml2, notmuch, openssl 2 + , ncurses, perl , cyrus_sasl, gss, gpgme, libkrb5, libidn, libxml2, notmuch, openssl 3 3 , lmdb, libxslt, docbook_xsl, docbook_xml_dtd_42, w3m, mailcap, sqlite, zlib 4 4 }: 5 5 ··· 15 15 }; 16 16 17 17 buildInputs = [ 18 - cyrus_sasl gss gpgme kerberos libidn ncurses 18 + cyrus_sasl gss gpgme libkrb5 libidn ncurses 19 19 notmuch openssl perl lmdb 20 20 mailcap sqlite 21 21 ];
+2 -2
pkgs/applications/networking/mailreaders/thunderbird-bin/68.nix
··· 16 16 , glibc 17 17 , gtk2 18 18 , gtk3 19 - , kerberos 19 + , libkrb5 20 20 , libX11 21 21 , libXScrnSaver 22 22 , libXcomposite ··· 94 94 glibc 95 95 gtk2 96 96 gtk3 97 - kerberos 97 + libkrb5 98 98 libX11 99 99 libXScrnSaver 100 100 libXcomposite
+2 -2
pkgs/applications/networking/mailreaders/thunderbird-bin/default.nix
··· 20 20 , gpgme 21 21 , gtk2 22 22 , gtk3 23 - , kerberos 23 + , libkrb5 24 24 , libcanberra 25 25 , libGL 26 26 , libGLU ··· 93 93 glibc 94 94 gtk2 95 95 gtk3 96 - kerberos 96 + libkrb5 97 97 libX11 98 98 libXScrnSaver 99 99 libXcomposite
+2 -2
pkgs/applications/networking/remote/aws-workspaces/default.nix
··· 1 1 { stdenv, lib 2 2 , makeWrapper, dpkg, fetchurl, autoPatchelfHook 3 - , curl, kerberos, lttng-ust, libpulseaudio, gtk3, openssl_1_1, icu, webkitgtk, librsvg, gdk-pixbuf, libsoup, glib-networking 3 + , curl, libkrb5, lttng-ust, libpulseaudio, gtk3, openssl_1_1, icu, webkitgtk, librsvg, gdk-pixbuf, libsoup, glib-networking 4 4 }: 5 5 6 6 stdenv.mkDerivation rec { ··· 27 27 28 28 buildInputs = [ 29 29 stdenv.cc.cc.lib 30 - kerberos 30 + libkrb5 31 31 curl 32 32 lttng-ust 33 33 libpulseaudio
+2 -2
pkgs/desktops/gnome-3/core/evolution-data-server/default.nix
··· 1 1 { fetchurl, lib, stdenv, substituteAll, pkg-config, gnome3, python3, gobject-introspection 2 2 , intltool, libsoup, libxml2, libsecret, icu, sqlite, tzdata, libcanberra-gtk3, gcr, p11-kit 3 3 , db, nspr, nss, libical, gperf, wrapGAppsHook, glib-networking, pcre, vala, cmake, ninja 4 - , kerberos, openldap, webkitgtk, libaccounts-glib, json-glib, glib, gtk3, libphonenumber 4 + , libkrb5, openldap, webkitgtk, libaccounts-glib, json-glib, glib, gtk3, libphonenumber 5 5 , gnome-online-accounts, libgweather, libgdata, gsettings-desktop-schemas, boost, protobuf }: 6 6 7 7 stdenv.mkDerivation rec { ··· 34 34 buildInputs = [ 35 35 glib libsoup libxml2 gtk3 gnome-online-accounts 36 36 gcr p11-kit libgweather libgdata libaccounts-glib json-glib 37 - icu sqlite kerberos openldap webkitgtk glib-networking 37 + icu sqlite libkrb5 openldap webkitgtk glib-networking 38 38 libcanberra-gtk3 pcre libphonenumber boost protobuf 39 39 ]; 40 40
+2 -2
pkgs/development/libraries/cyrus-sasl/default.nix
··· 1 - { lib, stdenv, fetchurl, openssl, openldap, kerberos, db, gettext 1 + { lib, stdenv, fetchurl, openssl, openldap, libkrb5, db, gettext 2 2 , pam, fixDarwinDylibNames, autoreconfHook, enableLdap ? false 3 3 , buildPackages, pruneLibtoolFiles, fetchpatch }: 4 4 ··· 22 22 nativeBuildInputs = [ autoreconfHook pruneLibtoolFiles ] 23 23 ++ lib.optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames; 24 24 buildInputs = 25 - [ openssl db gettext kerberos ] 25 + [ openssl db gettext libkrb5 ] 26 26 ++ lib.optional enableLdap openldap 27 27 ++ lib.optional stdenv.isLinux pam; 28 28
+2 -2
pkgs/development/libraries/gnome-online-accounts/default.nix
··· 22 22 , docbook_xml_dtd_412 23 23 , gnome3 24 24 , gcr 25 - , kerberos 25 + , libkrb5 26 26 , gvfs 27 27 , dbus 28 28 , wrapGAppsHook ··· 75 75 gvfs # OwnCloud, Google Drive 76 76 icu 77 77 json-glib 78 - kerberos 78 + libkrb5 79 79 librest 80 80 libsecret 81 81 libsoup
+2 -2
pkgs/development/libraries/gsasl/default.nix
··· 1 - { fetchurl, lib, stdenv, libidn, kerberos }: 1 + { fetchurl, lib, stdenv, libidn, libkrb5 }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "gsasl-1.10.0"; ··· 8 8 sha256 = "sha256-hby9juYJWt54cCY6KOvLiDL1Qepzk5dUlJJgFcB1aNM="; 9 9 }; 10 10 11 - buildInputs = [ libidn kerberos ]; 11 + buildInputs = [ libidn libkrb5 ]; 12 12 13 13 configureFlags = [ "--with-gssapi-impl=mit" ]; 14 14
+2 -2
pkgs/development/libraries/libgssglue/default.nix
··· 1 - { lib, stdenv, fetchurl, kerberos }: 1 + { lib, stdenv, fetchurl, libkrb5 }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "libgssglue-0.4"; ··· 15 15 postInstall = '' 16 16 mkdir -p $out/etc 17 17 cat <<EOF > $out/etc/gssapi_mech.conf 18 - ${kerberos}/lib/libgssapi_krb5.so mechglue_internal_krb5_init 18 + ${libkrb5}/lib/libgssapi_krb5.so mechglue_internal_krb5_init 19 19 EOF 20 20 ''; 21 21
+3 -3
pkgs/development/libraries/serf/default.nix
··· 1 - { lib, stdenv, fetchurl, apr, scons, openssl, aprutil, zlib, kerberos 1 + { lib, stdenv, fetchurl, apr, scons, openssl, aprutil, zlib, libkrb5 2 2 , pkg-config, libiconv }: 3 3 4 4 stdenv.mkDerivation rec { ··· 12 12 13 13 nativeBuildInputs = [ pkg-config scons ]; 14 14 buildInputs = [ apr openssl aprutil zlib libiconv ] 15 - ++ lib.optional (!stdenv.isCygwin) kerberos; 15 + ++ lib.optional (!stdenv.isCygwin) libkrb5; 16 16 17 17 patches = [ ./scons.patch ]; 18 18 ··· 25 25 sconsFlags+=" OPENSSL=${openssl}" 26 26 sconsFlags+=" ZLIB=${zlib}" 27 27 '' + lib.optionalString (!stdenv.isCygwin) '' 28 - sconsFlags+=" GSSAPI=${kerberos.dev}" 28 + sconsFlags+=" GSSAPI=${libkrb5.dev}" 29 29 ''; 30 30 31 31 enableParallelBuilding = true;
+2 -2
pkgs/development/libraries/unixODBCDrivers/default.nix
··· 1 - { fetchurl, stdenv, unixODBC, cmake, postgresql, mysql, sqlite, zlib, libxml2, dpkg, lib, openssl, kerberos, libuuid, patchelf, libiconv, fetchFromGitHub }: 1 + { fetchurl, stdenv, unixODBC, cmake, postgresql, mysql, sqlite, zlib, libxml2, dpkg, lib, openssl, libkrb5, libuuid, patchelf, libiconv, fetchFromGitHub }: 2 2 3 3 # I haven't done any parameter tweaking.. So the defaults provided here might be bad 4 4 ··· 157 157 ''; 158 158 159 159 postFixup = '' 160 - patchelf --set-rpath ${lib.makeLibraryPath [ unixODBC openssl.out kerberos libuuid stdenv.cc.cc ]} \ 160 + patchelf --set-rpath ${lib.makeLibraryPath [ unixODBC openssl.out libkrb5 libuuid stdenv.cc.cc ]} \ 161 161 $out/lib/libmsodbcsql-${versionMajor}.${versionMinor}.so.${versionAdditional} 162 162 ''; 163 163
+2 -2
pkgs/development/python-modules/kerberos/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 3 , fetchPypi 4 - , kerberos 4 + , libkrb5 5 5 }: 6 6 7 7 buildPythonPackage rec { ··· 13 13 sha256 = "cdd046142a4e0060f96a00eb13d82a5d9ebc0f2d7934393ed559bac773460a2c"; 14 14 }; 15 15 16 - nativeBuildInputs = [ kerberos ]; 16 + nativeBuildInputs = [ libkrb5 ]; 17 17 18 18 # No tests in archive 19 19 doCheck = false;
+2 -2
pkgs/development/ruby-modules/gem-config/default.nix
··· 17 17 # This seperates "what to build" (the exact gem versions) from "how to build" 18 18 # (to make gems behave if necessary). 19 19 20 - { lib, fetchurl, writeScript, ruby, kerberos, libxml2, libxslt, python, stdenv, which 20 + { lib, fetchurl, writeScript, ruby, libkrb5, libxml2, libxslt, python, stdenv, which 21 21 , libiconv, postgresql, v8, clang, sqlite, zlib, imagemagick 22 22 , pkg-config , ncurses, xapian, gpgme, util-linux, tzdata, icu, libffi 23 23 , cmake, libssh2, openssl, libmysqlclient, darwin, git, perl, pcre, gecode_3, curl ··· 607 607 }; 608 608 609 609 timfel-krb5-auth = attrs: { 610 - buildInputs = [ kerberos ]; 610 + buildInputs = [ libkrb5 ]; 611 611 }; 612 612 613 613 tiny_tds = attrs: {
+2 -2
pkgs/os-specific/linux/autofs/default.nix
··· 1 1 { lib, stdenv, fetchurl, flex, bison, linuxHeaders, libtirpc, mount, umount, nfs-utils, e2fsprogs 2 - , libxml2, kerberos, kmod, openldap, sssd, cyrus_sasl, openssl, rpcsvc-proto }: 2 + , libxml2, libkrb5, kmod, openldap, sssd, cyrus_sasl, openssl, rpcsvc-proto }: 3 3 4 4 let 5 5 version = "5.1.6"; ··· 36 36 #make install SUBDIRS="samples" # impure! 37 37 ''; 38 38 39 - buildInputs = [ linuxHeaders libtirpc libxml2 kerberos kmod openldap sssd 39 + buildInputs = [ linuxHeaders libtirpc libxml2 libkrb5 kmod openldap sssd 40 40 openssl cyrus_sasl rpcsvc-proto ]; 41 41 42 42 nativeBuildInputs = [ flex bison ];
+2 -2
pkgs/os-specific/linux/cifs-utils/default.nix
··· 1 1 { stdenv, lib, fetchurl, autoreconfHook, docutils, pkg-config 2 - , kerberos, keyutils, pam, talloc, python3 }: 2 + , libkrb5, keyutils, pam, talloc, python3 }: 3 3 4 4 stdenv.mkDerivation rec { 5 5 pname = "cifs-utils"; ··· 12 12 13 13 nativeBuildInputs = [ autoreconfHook docutils pkg-config ]; 14 14 15 - buildInputs = [ kerberos keyutils pam talloc python3 ]; 15 + buildInputs = [ libkrb5 keyutils pam talloc python3 ]; 16 16 17 17 configureFlags = [ "ROOTSBINDIR=$(out)/sbin" ] ++ lib.optionals (stdenv.hostPlatform != stdenv.buildPlatform) [ 18 18 # AC_FUNC_MALLOC is broken on cross builds.
+2 -2
pkgs/os-specific/linux/ipsec-tools/default.nix
··· 1 - { lib, stdenv, fetchurl, fetchpatch, linuxHeaders, readline, openssl, flex, kerberos, pam }: 1 + { lib, stdenv, fetchurl, fetchpatch, linuxHeaders, readline, openssl, flex, libkrb5, pam }: 2 2 3 3 # TODO: These tools are supposed to work under NetBSD and FreeBSD as 4 4 # well, so I guess it's not appropriate to place this expression in ··· 14 14 sha256 = "0b9gfbz78k2nj0k7jdlm5kajig628ja9qm0z5yksiwz22s3v7dlf"; 15 15 }; 16 16 17 - buildInputs = [ readline openssl flex kerberos pam ]; 17 + buildInputs = [ readline openssl flex libkrb5 pam ]; 18 18 19 19 patches = [ 20 20 ./dont-create-localstatedir-during-install.patch
+6 -6
pkgs/os-specific/linux/nfs-utils/default.nix
··· 1 1 { stdenv, fetchurl, fetchpatch, lib, pkg-config, util-linux, libcap, libtirpc, libevent 2 - , sqlite, kerberos, kmod, libuuid, keyutils, lvm2, systemd, coreutils, tcp_wrappers 2 + , sqlite, libkrb5, kmod, libuuid, keyutils, lvm2, systemd, coreutils, tcp_wrappers 3 3 , python3, buildPackages, nixosTests, rpcsvc-proto 4 4 , enablePython ? true 5 5 }: ··· 25 25 26 26 buildInputs = [ 27 27 libtirpc libcap libevent sqlite lvm2 28 - libuuid keyutils kerberos tcp_wrappers 28 + libuuid keyutils libkrb5 tcp_wrappers 29 29 ] ++ lib.optional enablePython python3; 30 30 31 31 enableParallelBuilding = true; ··· 33 33 preConfigure = 34 34 '' 35 35 substituteInPlace configure \ 36 - --replace '$dir/include/gssapi' ${lib.getDev kerberos}/include/gssapi \ 37 - --replace '$dir/bin/krb5-config' ${lib.getDev kerberos}/bin/krb5-config 36 + --replace '$dir/include/gssapi' ${lib.getDev libkrb5}/include/gssapi \ 37 + --replace '$dir/bin/krb5-config' ${lib.getDev libkrb5}/bin/krb5-config 38 38 ''; 39 39 40 40 configureFlags = 41 41 [ "--enable-gss" 42 42 "--enable-svcgss" 43 43 "--with-statedir=/var/lib/nfs" 44 - "--with-krb5=${lib.getLib kerberos}" 44 + "--with-krb5=${lib.getLib libkrb5}" 45 45 "--with-systemd=${placeholder "out"}/etc/systemd/system" 46 46 "--enable-libmount-mount" 47 47 "--with-pluginpath=${placeholder "lib"}/lib/libnfsidmap" # this installs libnfsidmap ··· 106 106 # https://bugzilla.kernel.org/show_bug.cgi?id=203793 107 107 doCheck = false; 108 108 109 - disallowedReferences = [ (lib.getDev kerberos) ]; 109 + disallowedReferences = [ (lib.getDev libkrb5) ]; 110 110 111 111 passthru.tests = { 112 112 nfs3-simple = nixosTests.nfs3.simple;
+2 -2
pkgs/os-specific/linux/pam_krb5/default.nix
··· 1 - { lib, stdenv, fetchurl, pam, kerberos }: 1 + { lib, stdenv, fetchurl, pam, libkrb5 }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "pam-krb5-4.10"; ··· 8 8 sha256 = "09wzxd5zrj5bzqpb01qf148npj5k8hmd2bx2ij1qsy40hdxqyq79"; 9 9 }; 10 10 11 - buildInputs = [ pam kerberos ]; 11 + buildInputs = [ pam libkrb5 ]; 12 12 13 13 meta = with lib; { 14 14 homepage = "https://www.eyrie.org/~eagle/software/pam-krb5/";
+2 -2
pkgs/os-specific/linux/sssd/default.nix
··· 1 1 { lib, stdenv, fetchurl, fetchpatch, glibc, augeas, dnsutils, c-ares, curl, 2 2 cyrus_sasl, ding-libs, libnl, libunistring, nss, samba, nfs-utils, doxygen, 3 3 python, python3, pam, popt, talloc, tdb, tevent, pkg-config, ldb, openldap, 4 - pcre, kerberos, cifs-utils, glib, keyutils, dbus, fakeroot, libxslt, libxml2, 4 + pcre, libkrb5, cifs-utils, glib, keyutils, dbus, fakeroot, libxslt, libxml2, 5 5 libuuid, ldap, systemd, nspr, check, cmocka, uid_wrapper, 6 6 nss_wrapper, ncurses, Po4a, http-parser, jansson, 7 7 docbook_xsl, docbook_xml_dtd_44, ··· 62 62 enableParallelBuilding = true; 63 63 buildInputs = [ augeas dnsutils c-ares curl cyrus_sasl ding-libs libnl libunistring nss 64 64 samba nfs-utils doxygen python python3 popt 65 - talloc tdb tevent pkg-config ldb pam openldap pcre kerberos 65 + talloc tdb tevent pkg-config ldb pam openldap pcre libkrb5 66 66 cifs-utils glib keyutils dbus fakeroot libxslt libxml2 67 67 libuuid ldap systemd nspr check cmocka uid_wrapper 68 68 nss_wrapper ncurses Po4a http-parser jansson ];
+2 -2
pkgs/servers/ldap/389/default.nix
··· 1 1 { lib, stdenv, fetchurl, fetchpatch, autoreconfHook, pkg-config, doxygen, perl, pam, nspr, nss, openldap 2 - , db, cyrus_sasl, svrcore, icu, net-snmp, kerberos, pcre, perlPackages, libevent, openssl, python3 2 + , db, cyrus_sasl, svrcore, icu, net-snmp, libkrb5, pcre, perlPackages, libevent, openssl, python3 3 3 }: 4 4 5 5 stdenv.mkDerivation rec { ··· 14 14 nativeBuildInputs = [ autoreconfHook pkg-config doxygen ]; 15 15 buildInputs = [ 16 16 perl pam nspr nss openldap db cyrus_sasl svrcore icu 17 - net-snmp kerberos pcre libevent openssl python3 17 + net-snmp libkrb5 pcre libevent openssl python3 18 18 ] ++ (with perlPackages; [ MozillaLdap NetAddrIP DBFile ]); 19 19 20 20 patches = [
+2 -2
pkgs/servers/openafs/1.8/default.nix
··· 1 1 { lib, stdenv, buildPackages, fetchurl, which, autoconf, automake, flex 2 - , yacc , glibc, perl, kerberos, libxslt, docbook_xsl, file 2 + , yacc , glibc, perl, libkrb5, libxslt, docbook_xsl, file 3 3 , docbook_xml_dtd_43, libtool_2 4 4 , withDevdoc ? false, doxygen, dblatex # Extra developer documentation 5 5 , ncurses # Extra ncurses utilities. Needed for debugging and monitoring. ··· 18 18 nativeBuildInputs = [ autoconf automake flex libxslt libtool_2 perl 19 19 which yacc ] ++ optionals withDevdoc [ doxygen dblatex ]; 20 20 21 - buildInputs = [ kerberos ncurses ]; 21 + buildInputs = [ libkrb5 ncurses ]; 22 22 23 23 patches = [ ./bosserver.patch ./cross-build.patch ] ++ optional (tsmbac != null) ./tsmbac.patch; 24 24
+2 -3
pkgs/servers/openafs/1.8/module.nix
··· 1 1 { lib, stdenv, fetchurl, which, autoconf, automake, flex, yacc 2 - , kernel, glibc, perl, libtool_2, kerberos, fetchpatch }: 2 + , kernel, glibc, perl, libtool_2, libkrb5, fetchpatch }: 3 3 4 4 with (import ./srcs.nix { 5 5 inherit fetchurl; ··· 16 16 nativeBuildInputs = [ autoconf automake flex libtool_2 perl which yacc ] 17 17 ++ kernel.moduleBuildDependencies; 18 18 19 - buildInputs = [ kerberos ]; 19 + buildInputs = [ libkrb5 ]; 20 20 21 21 patches = [ 22 22 # LINUX 5.8: Replace kernel_setsockopt with new funcs ··· 91 91 maintainers = [ maintainers.maggesi maintainers.spacefrogg ]; 92 92 broken = versionOlder kernel.version "3.18" || kernel.isHardened; 93 93 }; 94 - 95 94 }
+2 -2
pkgs/servers/openafs/1.9/default.nix
··· 1 1 { lib, stdenv, buildPackages, fetchurl, which, autoconf, automake, flex 2 - , yacc , glibc, perl, kerberos, libxslt, docbook_xsl, file 2 + , yacc , glibc, perl, libkrb5, libxslt, docbook_xsl, file 3 3 , docbook_xml_dtd_43, libtool_2 4 4 , withDevdoc ? false, doxygen, dblatex # Extra developer documentation 5 5 , ncurses # Extra ncurses utilities. Needed for debugging and monitoring. ··· 18 18 nativeBuildInputs = [ autoconf automake flex libxslt libtool_2 perl 19 19 which yacc ] ++ optionals withDevdoc [ doxygen dblatex ]; 20 20 21 - buildInputs = [ kerberos ncurses ]; 21 + buildInputs = [ libkrb5 ncurses ]; 22 22 23 23 patches = [ ./bosserver.patch ./cross-build.patch ] ++ optional (tsmbac != null) ./tsmbac.patch; 24 24
+2 -3
pkgs/servers/openafs/1.9/module.nix
··· 1 1 { lib, stdenv, fetchurl, which, autoconf, automake, flex, yacc 2 - , kernel, glibc, perl, libtool_2, kerberos, fetchpatch }: 2 + , kernel, glibc, perl, libtool_2, libkrb5, fetchpatch }: 3 3 4 4 with (import ./srcs.nix { 5 5 inherit fetchurl; ··· 16 16 nativeBuildInputs = [ autoconf automake flex libtool_2 perl which yacc ] 17 17 ++ kernel.moduleBuildDependencies; 18 18 19 - buildInputs = [ kerberos ]; 19 + buildInputs = [ libkrb5 ]; 20 20 21 21 patches = []; 22 22 ··· 60 60 maintainers = [ maintainers.maggesi maintainers.spacefrogg ]; 61 61 broken = versionOlder kernel.version "3.18" || kernel.isHardened; 62 62 }; 63 - 64 63 }
+2 -2
pkgs/tools/filesystems/irods/common.nix
··· 1 - { lib, stdenv, bzip2, zlib, autoconf, automake, cmake, gnumake, help2man , texinfo, libtool , cppzmq , libarchive, avro-cpp, boost, jansson, zeromq, openssl, pam, libiodbc, kerberos, gcc, libcxx, which, catch2 }: 1 + { lib, stdenv, bzip2, zlib, autoconf, automake, cmake, gnumake, help2man , texinfo, libtool , cppzmq , libarchive, avro-cpp, boost, jansson, zeromq, openssl, pam, libiodbc, libkrb5, gcc, libcxx, which, catch2 }: 2 2 3 3 # Common attributes of irods packages 4 4 5 5 { 6 6 nativeBuildInputs = [ autoconf automake cmake gnumake help2man texinfo which gcc ]; 7 - buildInputs = [ bzip2 zlib libtool cppzmq libarchive avro-cpp jansson zeromq openssl pam libiodbc kerberos boost libcxx catch2 ]; 7 + buildInputs = [ bzip2 zlib libtool cppzmq libarchive avro-cpp jansson zeromq openssl pam libiodbc libkrb5 boost libcxx catch2 ]; 8 8 9 9 cmakeFlags = [ 10 10 "-DIRODS_EXTERNALS_FULLPATH_CLANG=${stdenv.cc}"
+2 -2
pkgs/tools/filesystems/irods/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, bzip2, zlib, autoconf, automake, cmake, gnumake, help2man , texinfo, libtool , cppzmq , libarchive, avro-cpp_llvm, boost, jansson, zeromq, openssl , pam, libiodbc, kerberos, gcc, libcxx, which, catch2 }: 1 + { lib, stdenv, fetchFromGitHub, bzip2, zlib, autoconf, automake, cmake, gnumake, help2man , texinfo, libtool , cppzmq , libarchive, avro-cpp_llvm, boost, jansson, zeromq, openssl , pam, libiodbc, libkrb5, gcc, libcxx, which, catch2 }: 2 2 3 3 let 4 4 avro-cpp=avro-cpp_llvm; ··· 7 7 common = import ./common.nix { 8 8 inherit lib stdenv bzip2 zlib autoconf automake cmake gnumake 9 9 help2man texinfo libtool cppzmq libarchive jansson 10 - zeromq openssl pam libiodbc kerberos gcc libcxx 10 + zeromq openssl pam libiodbc libkrb5 gcc libcxx 11 11 boost avro-cpp which catch2; 12 12 }; 13 13 in rec {
+2 -2
pkgs/tools/networking/maxscale/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, cmake, pkg-config, glibc 2 - , bison, curl, flex, gperftools, jansson, jemalloc, kerberos, lua, libmysqlclient 2 + , bison, curl, flex, gperftools, jansson, jemalloc, libkrb5, lua, libmysqlclient 3 3 , ncurses, openssl, pcre, pcre2, perl, rabbitmq-c, sqlite, tcl 4 4 , libaio, libedit, libtool, libui, libuuid, zlib 5 5 }: ··· 18 18 nativeBuildInputs = [ cmake pkg-config ]; 19 19 20 20 buildInputs = [ 21 - bison curl flex gperftools jansson jemalloc kerberos lua libmysqlclient 21 + bison curl flex gperftools jansson jemalloc libkrb5 lua libmysqlclient 22 22 ncurses openssl pcre pcre2 perl rabbitmq-c sqlite tcl 23 23 libaio libedit libtool libui libuuid zlib 24 24 ];
+6 -6
pkgs/tools/networking/openssh/common.nix
··· 20 20 , pam 21 21 , etcDir ? null 22 22 , withKerberos ? true 23 - , kerberos 23 + , libkrb5 24 24 , libfido2 25 25 , withFIDO ? stdenv.hostPlatform.isUnix && !stdenv.hostPlatform.isMusl 26 26 , linkOpenssl ? true ··· 45 45 ''; 46 46 47 47 nativeBuildInputs = [ pkg-config ] 48 - # This is not the same as the kerberos from the inputs! pkgs.kerberos is 48 + # This is not the same as the libkrb5 from the inputs! pkgs.libkrb5 is 49 49 # needed here to access krb5-config in order to cross compile. See: 50 50 # https://github.com/NixOS/nixpkgs/pull/107606 51 - ++ optional withKerberos pkgs.kerberos 51 + ++ optional withKerberos pkgs.libkrb5 52 52 ++ extraNativeBuildInputs; 53 53 buildInputs = [ zlib openssl libedit ] 54 54 ++ optional withFIDO libfido2 55 - ++ optional withKerberos kerberos 55 + ++ optional withKerberos libkrb5 56 56 ++ optional stdenv.isLinux pam; 57 57 58 58 preConfigure = '' ··· 70 70 # Kerberos can be found either by krb5-config or by fall-back shell 71 71 # code in openssh's configure.ac. Neither of them support static 72 72 # build, but patching code for krb5-config is simpler, so to get it 73 - # into PATH, kerberos.dev is added into buildInputs. 73 + # into PATH, libkrb5.dev is added into buildInputs. 74 74 + optionalString stdenv.hostPlatform.isStatic '' 75 75 sed -i "s,PKGCONFIG --libs,PKGCONFIG --libs --static,g" configure 76 76 sed -i 's#KRB5CONF --libs`#KRB5CONF --libs` -lkrb5support -lkeyutils#g' configure ··· 89 89 (if stdenv.isLinux then "--with-pam" else "--without-pam") 90 90 ] ++ optional (etcDir != null) "--sysconfdir=${etcDir}" 91 91 ++ optional withFIDO "--with-security-key-builtin=yes" 92 - ++ optional withKerberos (assert kerberos != null; "--with-kerberos5=${kerberos}") 92 + ++ optional withKerberos (assert libkrb5 != null; "--with-kerberos5=${libkrb5}") 93 93 ++ optional stdenv.isDarwin "--disable-libutil" 94 94 ++ optional (!linkOpenssl) "--without-openssl"; 95 95
+2 -2
pkgs/tools/security/john/default.nix
··· 1 - { lib, stdenv, fetchurl, openssl, nss, nspr, kerberos, gmp, zlib, libpcap, re2 1 + { lib, stdenv, fetchurl, openssl, nss, nspr, libkrb5, gmp, zlib, libpcap, re2 2 2 , gcc, python3Packages, perl, perlPackages, makeWrapper 3 3 }: 4 4 ··· 36 36 "--with-systemwide" 37 37 ]; 38 38 39 - buildInputs = [ openssl nss nspr kerberos gmp zlib libpcap re2 ]; 39 + buildInputs = [ openssl nss nspr libkrb5 gmp zlib libpcap re2 ]; 40 40 nativeBuildInputs = [ gcc python3Packages.wrapPython perl makeWrapper ]; 41 41 propagatedBuildInputs = (with python3Packages; [ dpkt scapy lxml ]) ++ # For pcap2john.py 42 42 (with perlPackages; [ DigestMD4 DigestSHA1 GetoptLong # For pass_gen.pl
+1
pkgs/top-level/aliases.nix
··· 337 337 kicad-with-packages3d = kicad; # added 2019-11-25 338 338 kindlegen = throw "kindlegen has been removed from nixpkgs, as it's abandoned and no longer available for download."; # 2021-03-09 339 339 krename-qt5 = krename; # added 2017-02-18 340 + kerberos = libkrb5; # moved from top-level 2021-03-14 340 341 keymon = throw "keymon has been removed from nixpkgs, as it's abandoned and archived."; # 2019-12-10 341 342 kvm = qemu_kvm; # added 2018-04-25 342 343 latinmodern-math = lmmath;
+2 -5
pkgs/top-level/all-packages.nix
··· 13911 13911 cypress = callPackage ../development/web/cypress { }; 13912 13912 13913 13913 cyrus_sasl = callPackage ../development/libraries/cyrus-sasl { 13914 - kerberos = if stdenv.isFreeBSD then libheimdal else kerberos; 13914 + libkrb5 = if stdenv.isFreeBSD then libheimdal else libkrb5; 13915 13915 }; 13916 13916 13917 13917 # Make bdb5 the default as it is the last release under the custom ··· 14949 14949 }; 14950 14950 krb5Full = krb5; 14951 14951 libkrb5 = krb5.override { type = "lib"; }; 14952 - kerberos = libkrb5; # TODO: move to aliases.nix 14953 14952 14954 14953 l-smash = callPackage ../development/libraries/l-smash { 14955 14954 stdenv = gccStdenv; ··· 18113 18112 18114 18113 ### SERVERS 18115 18114 18116 - _389-ds-base = callPackage ../servers/ldap/389 { 18117 - kerberos = libkrb5; 18118 - }; 18115 + _389-ds-base = callPackage ../servers/ldap/389 { }; 18119 18116 18120 18117 adguardhome = callPackage ../servers/adguardhome {}; 18121 18118
+1 -3
pkgs/top-level/python-packages.nix
··· 3659 3659 3660 3660 keras-preprocessing = callPackage ../development/python-modules/keras-preprocessing { }; 3661 3661 3662 - kerberos = callPackage ../development/python-modules/kerberos { 3663 - inherit (pkgs) kerberos; 3664 - }; 3662 + kerberos = callPackage ../development/python-modules/kerberos { }; 3665 3663 3666 3664 keyring = if isPy3k then 3667 3665 callPackage ../development/python-modules/keyring { }