nixpkgs mirror (for testing) github.com/NixOS/nixpkgs
nix

Merge branch 'staging' into staging-next

Conflicts:
pkgs/os-specific/linux/kernel/common-config.nix

+2132 -2184
+1 -3
nixos/lib/systemd-lib.nix
··· 228 228 mkdir -p $out/getty.target.wants/ 229 229 ln -s ../autovt@tty1.service $out/getty.target.wants/ 230 230 231 - ln -s ../local-fs.target ../remote-fs.target \ 232 - ../nss-lookup.target ../nss-user-lookup.target ../swap.target \ 233 - $out/multi-user.target.wants/ 231 + ln -s ../remote-fs.target $out/multi-user.target.wants/ 234 232 ''} 235 233 ''; # */ 236 234
-10
nixos/tests/installer.nix
··· 561 561 + " mkpart primary 2048M -1s" # PV2 562 562 + " set 2 lvm on", 563 563 "udevadm settle", 564 - "sleep 1", 565 564 "pvcreate /dev/vda1 /dev/vda2", 566 - "sleep 1", 567 565 "vgcreate MyVolGroup /dev/vda1 /dev/vda2", 568 - "sleep 1", 569 566 "lvcreate --size 1G --name swap MyVolGroup", 570 - "sleep 1", 571 567 "lvcreate --size 3G --name nixos MyVolGroup", 572 - "sleep 1", 573 568 "mkswap -f /dev/MyVolGroup/swap -L swap", 574 569 "swapon -L swap", 575 570 "mkfs.xfs -L nixos /dev/MyVolGroup/nixos", 576 571 "mount LABEL=nixos /mnt", 577 - ) 578 - ''; 579 - postBootCommands = '' 580 - assert "loaded active" in machine.succeed( 581 - "systemctl list-units 'lvm2-pvscan@*' -ql --no-legend | tee /dev/stderr" 582 572 ) 583 573 ''; 584 574 };
+2 -2
pkgs/applications/audio/mpg123/default.nix
··· 18 18 19 19 stdenv.mkDerivation rec { 20 20 pname = "mpg123"; 21 - version = "1.28.2"; 21 + version = "1.29.3"; 22 22 23 23 src = fetchurl { 24 24 url = "mirror://sourceforge/${pname}/${pname}-${version}.tar.bz2"; 25 - sha256 = "006v44nz4nkpgvxz1k2vbbrfpa2m47hyydscs0wf3iysiyvd9vvy"; 25 + sha256 = "sha256-ljiF2Mx3Ji8ot3GHx9GJ4yGV5kJE3iUwt5jd8yGD6Ec="; 26 26 }; 27 27 28 28 outputs = [ "out" ] ++ lib.optionals withConplay [ "conplay" ];
+2 -2
pkgs/applications/editors/vim/common.nix
··· 1 1 { lib, fetchFromGitHub }: 2 2 rec { 3 - version = "8.2.3848"; 3 + version = "8.2.3877"; 4 4 5 5 src = fetchFromGitHub { 6 6 owner = "vim"; 7 7 repo = "vim"; 8 8 rev = "v${version}"; 9 - sha256 = "sha256-U6xrEZbieRBU0FDdTloYdZzuNpJ9+Q7FZgfI+0SPEAQ="; 9 + sha256 = "sha256-NqTO2TdhOs63eP7CdWY9U9nbR7No3hqPV5rGhYF9arA="; 10 10 }; 11 11 12 12 enableParallelBuilding = true;
+5
pkgs/applications/misc/index-fm/default.nix
··· 27 27 sha256 = "sha256-Os/5igKGYBeY/FxO6I+7mpFohuk3yHGLd7vE2GewFpU="; 28 28 }; 29 29 30 + postPatch = '' 31 + substituteInPlace CMakeLists.txt \ 32 + --replace "-Werror" "" 33 + ''; 34 + 30 35 nativeBuildInputs = [ 31 36 cmake 32 37 extra-cmake-modules
+2
pkgs/applications/networking/browsers/firefox/common.nix
··· 129 129 inherit src unpackPhase meta; 130 130 131 131 patches = [ 132 + # Upstream bug: https://bugzilla.mozilla.org/show_bug.cgi?id=1745560: 133 + ./fix-build-with-wayland-1.20.patch 132 134 ] ++ 133 135 lib.optional (lib.versionAtLeast version "86") ./env_var_for_system_dir-ff86.patch ++ 134 136 lib.optional (lib.versionAtLeast version "90" && lib.versionOlder version "95") ./no-buildconfig-ffx90.patch ++
+13
pkgs/applications/networking/browsers/firefox/fix-build-with-wayland-1.20.patch
··· 1 + diff --git a/widget/gtk/mozwayland/mozwayland.c b/widget/gtk/mozwayland/mozwayland.c 2 + index 7a448e6..7792581 100644 3 + --- a/widget/gtk/mozwayland/mozwayland.c 4 + +++ b/widget/gtk/mozwayland/mozwayland.c 5 + @@ -200,3 +200,8 @@ MOZ_EXPORT int wl_list_empty(const struct wl_list* list) { return -1; } 6 + 7 + MOZ_EXPORT void wl_list_insert_list(struct wl_list* list, 8 + struct wl_list* other) {} 9 + + 10 + +MOZ_EXPORT struct wl_proxy * 11 + +wl_proxy_marshal_flags(struct wl_proxy *proxy, uint32_t opcode, 12 + + const struct wl_interface *interface, uint32_t version, 13 + + uint32_t flags, ...) { return NULL; }
+1 -1
pkgs/build-support/alternatives/lapack/default.nix
··· 89 89 ln -s $out/lib/liblapacke.so.3 $out/lib/liblapacke.so 90 90 fi 91 91 92 - cp ${lib.getDev lapack-reference}/include/lapacke{,_mangling,_config}.h $dev/include 92 + cp ${lib.getDev lapack-reference}/include/lapacke{,_mangling,_config,_utils}.h $dev/include 93 93 94 94 cat <<EOF > $dev/lib/pkgconfig/lapacke.pc 95 95 Name: lapacke
+2 -2
pkgs/data/misc/poppler-data/default.nix
··· 1 1 { fetchurl, lib, stdenv, cmake, ninja }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "poppler-data-0.4.10"; 4 + name = "poppler-data-0.4.11"; 5 5 6 6 src = fetchurl { 7 7 url = "https://poppler.freedesktop.org/${name}.tar.gz"; 8 - sha256 = "0c3vjs3p7rjc4yfacnhd865r27czmzwcr4j2z4jldi68dvvcwbvf"; 8 + sha256 = "sha256-LOwFzRuwOvmKiwah4i9ubhplseLzgWyzBpuwh0gl8Iw="; 9 9 }; 10 10 11 11 nativeBuildInputs = [ cmake ninja ];
+3 -3
pkgs/data/misc/tzdata/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "tzdata"; 5 - version = "2021c"; 5 + version = "2021e"; 6 6 7 7 srcs = 8 8 [ (fetchurl { 9 9 url = "https://data.iana.org/time-zones/releases/tzdata${version}.tar.gz"; 10 - sha256 = "0himprzx3ahxkmg4rvp8n5lqry76qzc65j6sfq151hqirg4d3wdl"; 10 + sha256 = "1cdjdcxl0s9xf0dg1z64kh7llm80byxqlzrkkjzcdlyh6yvl5v07"; 11 11 }) 12 12 (fetchurl { 13 13 url = "https://data.iana.org/time-zones/releases/tzcode${version}.tar.gz"; 14 - sha256 = "01fsa661vzdij46z286pa8q07cppqz29sr2pf0qqldqpldbb6km3"; 14 + sha256 = "0x8pcfmjvxk29yfh8bklchv2f0vpl4yih0gc4wyx292l78wncijq"; 15 15 }) 16 16 ]; 17 17
+6 -1
pkgs/data/themes/material-kwin-decoration/default.nix
··· 16 16 17 17 mkDerivation rec { 18 18 pname = "material-kwin-decoration"; 19 - version = "unstable-20211028"; 19 + version = "unstable-2021-10-28"; 20 20 21 21 src = fetchFromGitHub { 22 22 owner = "Zren"; ··· 24 24 rev = "cc5cc399a546b66907629b28c339693423c894c8"; 25 25 sha256 = "sha256-aYlnPFhf+ISVe5Ycryu5BSXY8Lb5OoueMqnWQZiv6Lc="; 26 26 }; 27 + 28 + postPatch = '' 29 + substituteInPlace CMakeLists.txt \ 30 + --replace "-Werror" "" 31 + ''; 27 32 28 33 nativeBuildInputs = [ cmake extra-cmake-modules ]; 29 34
+2 -2
pkgs/desktops/gnome/core/gnome-desktop/default.nix
··· 26 26 27 27 stdenv.mkDerivation rec { 28 28 pname = "gnome-desktop"; 29 - version = "41.1"; 29 + version = "41.2"; 30 30 31 31 outputs = [ "out" "dev" "devdoc" ]; 32 32 33 33 src = fetchurl { 34 34 url = "mirror://gnome/sources/gnome-desktop/${lib.versions.major version}/${pname}-${version}.tar.xz"; 35 - sha256 = "sha256-voqvpk17ov0xB57tY505/aHqd+9301pnjwGcTZHUc8I="; 35 + sha256 = "sha256-NDKe79rK0jMqatuuU4yNpuUiNcd3WpCLfDIECgdT7Go="; 36 36 }; 37 37 38 38 patches = [
+1 -1
pkgs/development/compilers/llvm/10/llvm/default.nix
··· 95 95 --replace 'set(_install_rpath "@loader_path/../''${CMAKE_INSTALL_LIBDIR}''${LLVM_LIBDIR_SUFFIX}" ''${extra_libdir})' "" 96 96 '' 97 97 # Patch llvm-config to return correct library path based on --link-{shared,static}. 98 - + optionalString (enableSharedLibraries) '' 98 + + '' 99 99 substitute '${./outputs.patch}' ./outputs.patch --subst-var lib 100 100 patch -p1 < ./outputs.patch 101 101 '' + ''
+3 -13
pkgs/development/compilers/llvm/10/llvm/outputs.patch
··· 2 2 index 94d426b..37f7794 100644 3 3 --- a/tools/llvm-config/llvm-config.cpp 4 4 +++ b/tools/llvm-config/llvm-config.cpp 5 - @@ -333,6 +333,21 @@ int main(int argc, char **argv) { 5 + @@ -333,6 +333,11 @@ int main(int argc, char **argv) { 6 6 ActiveIncludeOption = "-I" + ActiveIncludeDir; 7 7 } 8 8 9 - + /// Nix-specific multiple-output handling: override ActiveLibDir if --link-shared 9 + + /// Nix-specific multiple-output handling: override ActiveLibDir 10 10 + if (!IsInDevelopmentTree) { 11 - + bool WantShared = true; 12 - + for (int i = 1; i < argc; ++i) { 13 - + StringRef Arg = argv[i]; 14 - + if (Arg == "--link-shared") 15 - + WantShared = true; 16 - + else if (Arg == "--link-static") 17 - + WantShared = false; // the last one wins 18 - + } 19 - + 20 - + if (WantShared) 21 - + ActiveLibDir = std::string("@lib@") + "/lib" + LLVM_LIBDIR_SUFFIX; 11 + + ActiveLibDir = std::string("@lib@") + "/lib" + LLVM_LIBDIR_SUFFIX; 22 12 + } 23 13 + 24 14 /// We only use `shared library` mode in cases where the static library form
+1
pkgs/development/compilers/llvm/11/clang/default.nix
··· 30 30 cmakeFlags = [ 31 31 "-DCMAKE_CXX_FLAGS=-std=c++14" 32 32 "-DCLANGD_BUILD_XPC=OFF" 33 + "-DLLVM_ENABLE_RTTI=ON" 33 34 "-DLLVM_CONFIG_PATH=${libllvm.dev}/bin/llvm-config${lib.optionalString (stdenv.hostPlatform != stdenv.buildPlatform) "-native"}" 34 35 ] ++ lib.optionals enableManpages [ 35 36 "-DCLANG_INCLUDE_DOCS=ON"
+1 -1
pkgs/development/compilers/llvm/11/llvm/default.nix
··· 93 93 --replace 'set(_install_rpath "@loader_path/../''${CMAKE_INSTALL_LIBDIR}''${LLVM_LIBDIR_SUFFIX}" ''${extra_libdir})' "" 94 94 '' 95 95 # Patch llvm-config to return correct library path based on --link-{shared,static}. 96 - + optionalString (enableSharedLibraries) '' 96 + + '' 97 97 substitute '${./outputs.patch}' ./outputs.patch --subst-var lib 98 98 patch -p1 < ./outputs.patch 99 99 '' + ''
+3 -13
pkgs/development/compilers/llvm/11/llvm/outputs.patch
··· 2 2 index 94d426b..37f7794 100644 3 3 --- a/tools/llvm-config/llvm-config.cpp 4 4 +++ b/tools/llvm-config/llvm-config.cpp 5 - @@ -333,6 +333,21 @@ int main(int argc, char **argv) { 5 + @@ -333,6 +333,11 @@ int main(int argc, char **argv) { 6 6 ActiveIncludeOption = "-I" + ActiveIncludeDir; 7 7 } 8 8 9 - + /// Nix-specific multiple-output handling: override ActiveLibDir if --link-shared 9 + + /// Nix-specific multiple-output handling: override ActiveLibDir 10 10 + if (!IsInDevelopmentTree) { 11 - + bool WantShared = true; 12 - + for (int i = 1; i < argc; ++i) { 13 - + StringRef Arg = argv[i]; 14 - + if (Arg == "--link-shared") 15 - + WantShared = true; 16 - + else if (Arg == "--link-static") 17 - + WantShared = false; // the last one wins 18 - + } 19 - + 20 - + if (WantShared) 21 - + ActiveLibDir = std::string("@lib@") + "/lib" + LLVM_LIBDIR_SUFFIX; 11 + + ActiveLibDir = std::string("@lib@") + "/lib" + LLVM_LIBDIR_SUFFIX; 22 12 + } 23 13 + 24 14 /// We only use `shared library` mode in cases where the static library form
+1
pkgs/development/compilers/llvm/12/clang/default.nix
··· 31 31 cmakeFlags = [ 32 32 "-DCMAKE_CXX_FLAGS=-std=c++14" 33 33 "-DCLANGD_BUILD_XPC=OFF" 34 + "-DLLVM_ENABLE_RTTI=ON" 34 35 "-DLLVM_CONFIG_PATH=${libllvm.dev}/bin/llvm-config${lib.optionalString (stdenv.hostPlatform != stdenv.buildPlatform) "-native"}" 35 36 ] ++ lib.optionals enableManpages [ 36 37 "-DCLANG_INCLUDE_DOCS=ON"
+1 -1
pkgs/development/compilers/llvm/12/llvm/default.nix
··· 74 74 --replace 'set(_install_rpath "@loader_path/../''${CMAKE_INSTALL_LIBDIR}''${LLVM_LIBDIR_SUFFIX}" ''${extra_libdir})' "" 75 75 '' 76 76 # Patch llvm-config to return correct library path based on --link-{shared,static}. 77 - + optionalString (enableSharedLibraries) '' 77 + + '' 78 78 substitute '${./outputs.patch}' ./outputs.patch --subst-var lib 79 79 patch -p1 < ./outputs.patch 80 80 '' + ''
+3 -13
pkgs/development/compilers/llvm/12/llvm/outputs.patch
··· 2 2 index 94d426b..37f7794 100644 3 3 --- a/tools/llvm-config/llvm-config.cpp 4 4 +++ b/tools/llvm-config/llvm-config.cpp 5 - @@ -333,6 +333,21 @@ int main(int argc, char **argv) { 5 + @@ -333,6 +333,11 @@ int main(int argc, char **argv) { 6 6 ActiveIncludeOption = "-I" + ActiveIncludeDir; 7 7 } 8 8 9 - + /// Nix-specific multiple-output handling: override ActiveLibDir if --link-shared 9 + + /// Nix-specific multiple-output handling: override ActiveLibDir 10 10 + if (!IsInDevelopmentTree) { 11 - + bool WantShared = true; 12 - + for (int i = 1; i < argc; ++i) { 13 - + StringRef Arg = argv[i]; 14 - + if (Arg == "--link-shared") 15 - + WantShared = true; 16 - + else if (Arg == "--link-static") 17 - + WantShared = false; // the last one wins 18 - + } 19 - + 20 - + if (WantShared) 21 - + ActiveLibDir = std::string("@lib@") + "/lib" + LLVM_LIBDIR_SUFFIX; 11 + + ActiveLibDir = std::string("@lib@") + "/lib" + LLVM_LIBDIR_SUFFIX; 22 12 + } 23 13 + 24 14 /// We only use `shared library` mode in cases where the static library form
+1
pkgs/development/compilers/llvm/13/clang/default.nix
··· 21 21 cmakeFlags = [ 22 22 "-DCMAKE_CXX_FLAGS=-std=c++14" 23 23 "-DCLANGD_BUILD_XPC=OFF" 24 + "-DLLVM_ENABLE_RTTI=ON" 24 25 "-DLLVM_CONFIG_PATH=${libllvm.dev}/bin/llvm-config${lib.optionalString (stdenv.hostPlatform != stdenv.buildPlatform) "-native"}" 25 26 ] ++ lib.optionals enableManpages [ 26 27 "-DCLANG_INCLUDE_DOCS=ON"
+1 -1
pkgs/development/compilers/llvm/13/llvm/default.nix
··· 68 68 --replace 'set(_install_rpath "@loader_path/../''${CMAKE_INSTALL_LIBDIR}''${LLVM_LIBDIR_SUFFIX}" ''${extra_libdir})' "" 69 69 '' 70 70 # Patch llvm-config to return correct library path based on --link-{shared,static}. 71 - + optionalString (enableSharedLibraries) '' 71 + + '' 72 72 substitute '${./outputs.patch}' ./outputs.patch --subst-var lib 73 73 patch -p1 < ./outputs.patch 74 74 '' + ''
+3 -13
pkgs/development/compilers/llvm/13/llvm/outputs.patch
··· 2 2 index 94d426b..37f7794 100644 3 3 --- a/tools/llvm-config/llvm-config.cpp 4 4 +++ b/tools/llvm-config/llvm-config.cpp 5 - @@ -333,6 +333,21 @@ int main(int argc, char **argv) { 5 + @@ -333,6 +333,11 @@ int main(int argc, char **argv) { 6 6 ActiveIncludeOption = "-I" + ActiveIncludeDir; 7 7 } 8 8 9 - + /// Nix-specific multiple-output handling: override ActiveLibDir if --link-shared 9 + + /// Nix-specific multiple-output handling: override ActiveLibDir 10 10 + if (!IsInDevelopmentTree) { 11 - + bool WantShared = true; 12 - + for (int i = 1; i < argc; ++i) { 13 - + StringRef Arg = argv[i]; 14 - + if (Arg == "--link-shared") 15 - + WantShared = true; 16 - + else if (Arg == "--link-static") 17 - + WantShared = false; // the last one wins 18 - + } 19 - + 20 - + if (WantShared) 21 - + ActiveLibDir = std::string("@lib@") + "/lib" + LLVM_LIBDIR_SUFFIX; 11 + + ActiveLibDir = std::string("@lib@") + "/lib" + LLVM_LIBDIR_SUFFIX; 22 12 + } 23 13 + 24 14 /// We only use `shared library` mode in cases where the static library form
+10
pkgs/development/compilers/llvm/5/compiler-rt/compiler-rt-5-cstddef.patch
··· 1 + --- a/lib/xray/xray_buffer_queue.h 2 + +++ b/lib/xray/xray_buffer_queue.h 3 + @@ -17,6 +17,7 @@ 4 + 5 + #include "sanitizer_common/sanitizer_atomic.h" 6 + #include "sanitizer_common/sanitizer_mutex.h" 7 + +#include <cstddef> 8 + #include <deque> 9 + #include <unordered_set> 10 + #include <utility>
+1
pkgs/development/compilers/llvm/5/compiler-rt/default.nix
··· 58 58 59 59 ./sys-ustat.patch 60 60 ../../common/compiler-rt/libsanitizer-no-cyclades-9.patch 61 + ./compiler-rt-5-cstddef.patch 61 62 ] ++ lib.optional stdenv.hostPlatform.isAarch32 ./armv7l.patch; 62 63 63 64 # TSAN requires XPC on Darwin, which we have no public/free source files for. We can depend on the Apple frameworks
+1 -1
pkgs/development/compilers/llvm/5/llvm/default.nix
··· 82 82 --replace 'set(_install_rpath "@loader_path/../''${CMAKE_INSTALL_LIBDIR}" ''${extra_libdir})' "" 83 83 '' 84 84 # Patch llvm-config to return correct library path based on --link-{shared,static}. 85 - + optionalString (enableSharedLibraries) '' 85 + + '' 86 86 substitute '${./outputs.patch}' ./outputs.patch --subst-var lib 87 87 patch -p1 < ./outputs.patch 88 88 '' + ''
+3 -13
pkgs/development/compilers/llvm/5/llvm/outputs.patch
··· 2 2 index 94d426b..37f7794 100644 3 3 --- a/tools/llvm-config/llvm-config.cpp 4 4 +++ b/tools/llvm-config/llvm-config.cpp 5 - @@ -333,6 +333,21 @@ int main(int argc, char **argv) { 5 + @@ -333,6 +333,11 @@ int main(int argc, char **argv) { 6 6 ActiveIncludeOption = "-I" + ActiveIncludeDir; 7 7 } 8 8 9 - + /// Nix-specific multiple-output handling: override ActiveLibDir if --link-shared 9 + + /// Nix-specific multiple-output handling: override ActiveLibDir 10 10 + if (!IsInDevelopmentTree) { 11 - + bool WantShared = true; 12 - + for (int i = 1; i < argc; ++i) { 13 - + StringRef Arg = argv[i]; 14 - + if (Arg == "--link-shared") 15 - + WantShared = true; 16 - + else if (Arg == "--link-static") 17 - + WantShared = false; // the last one wins 18 - + } 19 - + 20 - + if (WantShared) 21 - + ActiveLibDir = std::string("@lib@") + "/lib" + LLVM_LIBDIR_SUFFIX; 11 + + ActiveLibDir = std::string("@lib@") + "/lib" + LLVM_LIBDIR_SUFFIX; 22 12 + } 23 13 + 24 14 /// We only use `shared library` mode in cases where the static library form
+1 -1
pkgs/development/compilers/llvm/6/llvm/default.nix
··· 80 80 --replace 'set(_install_rpath "@loader_path/../''${CMAKE_INSTALL_LIBDIR}" ''${extra_libdir})' "" 81 81 '' 82 82 # Patch llvm-config to return correct library path based on --link-{shared,static}. 83 - + optionalString (enableSharedLibraries) '' 83 + + '' 84 84 substitute '${./outputs.patch}' ./outputs.patch --subst-var lib 85 85 patch -p1 < ./outputs.patch 86 86 '' + ''
+3 -13
pkgs/development/compilers/llvm/6/llvm/outputs.patch
··· 2 2 index 94d426b..37f7794 100644 3 3 --- a/tools/llvm-config/llvm-config.cpp 4 4 +++ b/tools/llvm-config/llvm-config.cpp 5 - @@ -333,6 +333,21 @@ int main(int argc, char **argv) { 5 + @@ -333,6 +333,11 @@ int main(int argc, char **argv) { 6 6 ActiveIncludeOption = "-I" + ActiveIncludeDir; 7 7 } 8 8 9 - + /// Nix-specific multiple-output handling: override ActiveLibDir if --link-shared 9 + + /// Nix-specific multiple-output handling: override ActiveLibDir 10 10 + if (!IsInDevelopmentTree) { 11 - + bool WantShared = true; 12 - + for (int i = 1; i < argc; ++i) { 13 - + StringRef Arg = argv[i]; 14 - + if (Arg == "--link-shared") 15 - + WantShared = true; 16 - + else if (Arg == "--link-static") 17 - + WantShared = false; // the last one wins 18 - + } 19 - + 20 - + if (WantShared) 21 - + ActiveLibDir = std::string("@lib@") + "/lib" + LLVM_LIBDIR_SUFFIX; 11 + + ActiveLibDir = std::string("@lib@") + "/lib" + LLVM_LIBDIR_SUFFIX; 22 12 + } 23 13 + 24 14 /// We only use `shared library` mode in cases where the static library form
+1 -1
pkgs/development/compilers/llvm/7/llvm/default.nix
··· 84 84 --replace 'set(_install_rpath "@loader_path/../''${CMAKE_INSTALL_LIBDIR}" ''${extra_libdir})' "" 85 85 '' 86 86 # Patch llvm-config to return correct library path based on --link-{shared,static}. 87 - + optionalString (enableSharedLibraries) '' 87 + + '' 88 88 substitute '${./outputs.patch}' ./outputs.patch --subst-var lib 89 89 patch -p1 < ./outputs.patch 90 90 '' + ''
+3 -13
pkgs/development/compilers/llvm/7/llvm/outputs.patch
··· 2 2 index 94d426b..37f7794 100644 3 3 --- a/tools/llvm-config/llvm-config.cpp 4 4 +++ b/tools/llvm-config/llvm-config.cpp 5 - @@ -333,6 +333,21 @@ int main(int argc, char **argv) { 5 + @@ -333,6 +333,11 @@ int main(int argc, char **argv) { 6 6 ActiveIncludeOption = "-I" + ActiveIncludeDir; 7 7 } 8 8 9 - + /// Nix-specific multiple-output handling: override ActiveLibDir if --link-shared 9 + + /// Nix-specific multiple-output handling: override ActiveLibDir 10 10 + if (!IsInDevelopmentTree) { 11 - + bool WantShared = true; 12 - + for (int i = 1; i < argc; ++i) { 13 - + StringRef Arg = argv[i]; 14 - + if (Arg == "--link-shared") 15 - + WantShared = true; 16 - + else if (Arg == "--link-static") 17 - + WantShared = false; // the last one wins 18 - + } 19 - + 20 - + if (WantShared) 21 - + ActiveLibDir = std::string("@lib@") + "/lib" + LLVM_LIBDIR_SUFFIX; 11 + + ActiveLibDir = std::string("@lib@") + "/lib" + LLVM_LIBDIR_SUFFIX; 22 12 + } 23 13 + 24 14 /// We only use `shared library` mode in cases where the static library form
+1 -1
pkgs/development/compilers/llvm/8/llvm/default.nix
··· 87 87 --replace 'set(_install_rpath "@loader_path/../''${CMAKE_INSTALL_LIBDIR}" ''${extra_libdir})' "" 88 88 '' 89 89 # Patch llvm-config to return correct library path based on --link-{shared,static}. 90 - + optionalString (enableSharedLibraries) '' 90 + + '' 91 91 substitute '${./outputs.patch}' ./outputs.patch --subst-var lib 92 92 patch -p1 < ./outputs.patch 93 93 '' + ''
+3 -13
pkgs/development/compilers/llvm/8/llvm/outputs.patch
··· 2 2 index 94d426b..37f7794 100644 3 3 --- a/tools/llvm-config/llvm-config.cpp 4 4 +++ b/tools/llvm-config/llvm-config.cpp 5 - @@ -333,6 +333,21 @@ int main(int argc, char **argv) { 5 + @@ -333,6 +333,11 @@ int main(int argc, char **argv) { 6 6 ActiveIncludeOption = "-I" + ActiveIncludeDir; 7 7 } 8 8 9 - + /// Nix-specific multiple-output handling: override ActiveLibDir if --link-shared 9 + + /// Nix-specific multiple-output handling: override ActiveLibDir 10 10 + if (!IsInDevelopmentTree) { 11 - + bool WantShared = true; 12 - + for (int i = 1; i < argc; ++i) { 13 - + StringRef Arg = argv[i]; 14 - + if (Arg == "--link-shared") 15 - + WantShared = true; 16 - + else if (Arg == "--link-static") 17 - + WantShared = false; // the last one wins 18 - + } 19 - + 20 - + if (WantShared) 21 - + ActiveLibDir = std::string("@lib@") + "/lib" + LLVM_LIBDIR_SUFFIX; 11 + + ActiveLibDir = std::string("@lib@") + "/lib" + LLVM_LIBDIR_SUFFIX; 22 12 + } 23 13 + 24 14 /// We only use `shared library` mode in cases where the static library form
+1 -1
pkgs/development/compilers/llvm/9/llvm/default.nix
··· 85 85 --replace 'set(_install_rpath "@loader_path/../''${CMAKE_INSTALL_LIBDIR}" ''${extra_libdir})' "" 86 86 '' 87 87 # Patch llvm-config to return correct library path based on --link-{shared,static}. 88 - + optionalString (enableSharedLibraries) '' 88 + + '' 89 89 substitute '${./outputs.patch}' ./outputs.patch --subst-var lib 90 90 patch -p1 < ./outputs.patch 91 91 '' + ''
+3 -13
pkgs/development/compilers/llvm/9/llvm/outputs.patch
··· 2 2 index 94d426b..37f7794 100644 3 3 --- a/tools/llvm-config/llvm-config.cpp 4 4 +++ b/tools/llvm-config/llvm-config.cpp 5 - @@ -333,6 +333,21 @@ int main(int argc, char **argv) { 5 + @@ -333,6 +333,11 @@ int main(int argc, char **argv) { 6 6 ActiveIncludeOption = "-I" + ActiveIncludeDir; 7 7 } 8 8 9 - + /// Nix-specific multiple-output handling: override ActiveLibDir if --link-shared 9 + + /// Nix-specific multiple-output handling: override ActiveLibDir 10 10 + if (!IsInDevelopmentTree) { 11 - + bool WantShared = true; 12 - + for (int i = 1; i < argc; ++i) { 13 - + StringRef Arg = argv[i]; 14 - + if (Arg == "--link-shared") 15 - + WantShared = true; 16 - + else if (Arg == "--link-static") 17 - + WantShared = false; // the last one wins 18 - + } 19 - + 20 - + if (WantShared) 21 - + ActiveLibDir = std::string("@lib@") + "/lib" + LLVM_LIBDIR_SUFFIX; 11 + + ActiveLibDir = std::string("@lib@") + "/lib" + LLVM_LIBDIR_SUFFIX; 22 12 + } 23 13 + 24 14 /// We only use `shared library` mode in cases where the static library form
+1
pkgs/development/compilers/llvm/git/clang/default.nix
··· 21 21 cmakeFlags = [ 22 22 "-DCMAKE_CXX_FLAGS=-std=c++14" 23 23 "-DCLANGD_BUILD_XPC=OFF" 24 + "-DLLVM_ENABLE_RTTI=ON" 24 25 "-DLLVM_CONFIG_PATH=${libllvm.dev}/bin/llvm-config${lib.optionalString (stdenv.hostPlatform != stdenv.buildPlatform) "-native"}" 25 26 ] ++ lib.optionals enableManpages [ 26 27 "-DCLANG_INCLUDE_DOCS=ON"
+1 -1
pkgs/development/compilers/llvm/git/llvm/default.nix
··· 60 60 --replace 'set(_install_rpath "@loader_path/../''${CMAKE_INSTALL_LIBDIR}''${LLVM_LIBDIR_SUFFIX}" ''${extra_libdir})' "" 61 61 '' 62 62 # Patch llvm-config to return correct library path based on --link-{shared,static}. 63 - + optionalString (enableSharedLibraries) '' 63 + + '' 64 64 substitute '${./outputs.patch}' ./outputs.patch --subst-var lib 65 65 patch -p1 < ./outputs.patch 66 66 '' + ''
+3 -13
pkgs/development/compilers/llvm/git/llvm/outputs.patch
··· 2 2 index 94d426b..37f7794 100644 3 3 --- a/tools/llvm-config/llvm-config.cpp 4 4 +++ b/tools/llvm-config/llvm-config.cpp 5 - @@ -333,6 +333,21 @@ int main(int argc, char **argv) { 5 + @@ -333,6 +333,11 @@ int main(int argc, char **argv) { 6 6 ActiveIncludeOption = "-I" + ActiveIncludeDir; 7 7 } 8 8 9 - + /// Nix-specific multiple-output handling: override ActiveLibDir if --link-shared 9 + + /// Nix-specific multiple-output handling: override ActiveLibDir 10 10 + if (!IsInDevelopmentTree) { 11 - + bool WantShared = true; 12 - + for (int i = 1; i < argc; ++i) { 13 - + StringRef Arg = argv[i]; 14 - + if (Arg == "--link-shared") 15 - + WantShared = true; 16 - + else if (Arg == "--link-static") 17 - + WantShared = false; // the last one wins 18 - + } 19 - + 20 - + if (WantShared) 21 - + ActiveLibDir = std::string("@lib@") + "/lib" + LLVM_LIBDIR_SUFFIX; 11 + + ActiveLibDir = std::string("@lib@") + "/lib" + LLVM_LIBDIR_SUFFIX; 22 12 + } 23 13 + 24 14 /// We only use `shared library` mode in cases where the static library form
+3 -13
pkgs/development/compilers/llvm/rocm/llvm/outputs.patch
··· 2 2 index 94d426b..37f7794 100644 3 3 --- a/tools/llvm-config/llvm-config.cpp 4 4 +++ b/tools/llvm-config/llvm-config.cpp 5 - @@ -333,6 +333,21 @@ int main(int argc, char **argv) { 5 + @@ -333,6 +333,11 @@ int main(int argc, char **argv) { 6 6 ActiveIncludeOption = "-I" + ActiveIncludeDir; 7 7 } 8 8 9 - + /// Nix-specific multiple-output handling: override ActiveLibDir if --link-shared 9 + + /// Nix-specific multiple-output handling: override ActiveLibDir 10 10 + if (!IsInDevelopmentTree) { 11 - + bool WantShared = true; 12 - + for (int i = 1; i < argc; ++i) { 13 - + StringRef Arg = argv[i]; 14 - + if (Arg == "--link-shared") 15 - + WantShared = true; 16 - + else if (Arg == "--link-static") 17 - + WantShared = false; // the last one wins 18 - + } 19 - + 20 - + if (WantShared) 21 - + ActiveLibDir = std::string("@lib@") + "/lib" + LLVM_LIBDIR_SUFFIX; 11 + + ActiveLibDir = std::string("@lib@") + "/lib" + LLVM_LIBDIR_SUFFIX; 22 12 + } 23 13 + 24 14 /// We only use `shared library` mode in cases where the static library form
+3 -1
pkgs/development/compilers/yasm/default.nix
··· 1 - {lib, stdenv, fetchurl}: 1 + {lib, stdenv, fetchurl, buildPackages}: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "yasm"; ··· 8 8 url = "https://www.tortall.net/projects/yasm/releases/yasm-${version}.tar.gz"; 9 9 sha256 = "0gv0slmm0qpq91za3v2v9glff3il594x5xsrbgab7xcmnh0ndkix"; 10 10 }; 11 + 12 + depsBuildBuild = [ buildPackages.stdenv.cc ]; 11 13 12 14 meta = with lib; { 13 15 homepage = "http://www.tortall.net/projects/yasm/";
+2 -1
pkgs/development/interpreters/python/cpython/default.nix
··· 193 193 prePatch = optionalString stdenv.isDarwin '' 194 194 substituteInPlace configure --replace '`/usr/bin/arch`' '"i386"' 195 195 substituteInPlace configure --replace '-Wl,-stack_size,1000000' ' ' 196 - '' + optionalString (stdenv.isDarwin && x11Support) '' 196 + '' + optionalString (pythonOlder "3.9" && stdenv.isDarwin && x11Support) '' 197 + # Broken on >= 3.9; replaced with ./3.9/darwin-tcl-tk.patch 197 198 substituteInPlace setup.py --replace /Library/Frameworks /no-such-path 198 199 ''; 199 200
+32 -33
pkgs/development/interpreters/ruby/default.nix
··· 17 17 # Contains the ruby version heuristics 18 18 rubyVersion = import ./ruby-version.nix { inherit lib; }; 19 19 20 - # Needed during postInstall 21 - buildRuby = 22 - if stdenv.hostPlatform == stdenv.buildPlatform 23 - then "$out/bin/ruby" 24 - else "${buildPackages.ruby}/bin/ruby"; 25 - 26 20 generic = { version, sha256 }: let 27 21 ver = version; 28 22 tag = ver.gitTag; 29 23 atLeast30 = lib.versionAtLeast ver.majMin "3.0"; 30 - baseruby = self.override { 31 - useRailsExpress = false; 32 - docSupport = false; 33 - rubygemsSupport = false; 34 - }; 35 24 self = lib.makeOverridable ( 36 25 { stdenv, buildPackages, lib 37 26 , fetchurl, fetchpatch, fetchFromSavannah, fetchFromGitHub ··· 48 59 , buildEnv, bundler, bundix 49 60 , libiconv, libobjc, libunwind, Foundation 50 61 , makeWrapper, buildRubyGem, defaultGemConfig 62 + , baseRuby ? buildPackages.ruby.override { 63 + useRailsExpress = false; 64 + docSupport = false; 65 + rubygemsSupport = false; 66 + } 67 + , useBaseRuby ? stdenv.hostPlatform != stdenv.buildPlatform || useRailsExpress 51 68 }: 52 69 stdenv.mkDerivation rec { 53 70 pname = "ruby"; ··· 76 81 77 82 nativeBuildInputs = [ autoreconfHook bison ] 78 83 ++ (op docSupport groff) 79 - ++ op (stdenv.buildPlatform != stdenv.hostPlatform) buildPackages.ruby; 84 + ++ op useBaseRuby baseRuby; 80 85 buildInputs = [ autoconf ] 81 86 ++ (op fiddleSupport libffi) 82 87 ++ (ops cursesSupport [ ncurses readline ]) ··· 128 133 sed -i ext/io/console/io-console.gemspec -e '/s\.date/d' 129 134 ''; 130 135 131 - configureFlags = ["--enable-shared" "--enable-pthread" "--with-soname=ruby-${version}"] 132 - ++ op useRailsExpress "--with-baseruby=${baseruby}/bin/ruby" 133 - ++ op (!jitSupport) "--disable-jit-support" 134 - ++ op (!docSupport) "--disable-install-doc" 135 - ++ op (jemallocSupport) "--with-jemalloc" 136 - ++ ops stdenv.isDarwin [ 137 - # on darwin, we have /usr/include/tk.h -- so the configure script detects 138 - # that tk is installed 139 - "--with-out-ext=tk" 140 - # on yosemite, "generating encdb.h" will hang for a very long time without this flag 141 - "--with-setjmp-type=setjmp" 142 - ] 143 - ++ op (stdenv.hostPlatform != stdenv.buildPlatform) 144 - "--with-baseruby=${buildRuby}"; 136 + configureFlags = [ 137 + (lib.enableFeature (!stdenv.hostPlatform.isStatic) "shared") 138 + (lib.enableFeature true "pthread") 139 + (lib.withFeatureAs true "soname" "ruby-${version}") 140 + (lib.withFeatureAs useBaseRuby "baseruby" "${baseRuby}/bin/ruby") 141 + (lib.enableFeature jitSupport "jit-support") 142 + (lib.enableFeature docSupport "install-doc") 143 + (lib.withFeature jemallocSupport "jemalloc") 144 + (lib.withFeatureAs docSupport "ridir" "${placeholder "devdoc"}/share/ri") 145 + ] ++ ops stdenv.isDarwin [ 146 + # on darwin, we have /usr/include/tk.h -- so the configure script detects 147 + # that tk is installed 148 + "--with-out-ext=tk" 149 + # on yosemite, "generating encdb.h" will hang for a very long time without this flag 150 + "--with-setjmp-type=setjmp" 151 + ]; 145 152 146 153 preConfigure = opString docSupport '' 147 - configureFlagsArray+=("--with-ridir=$devdoc/share/ri") 148 - 149 154 # rdoc creates XDG_DATA_DIR (defaulting to $HOME/.local/share) even if 150 155 # it's not going to be used. 151 156 export HOME=$TMPDIR ··· 203 208 # Add rbconfig shim so ri can find docs 204 209 mkdir -p $devdoc/lib/ruby/site_ruby 205 210 cp ${./rbconfig.rb} $devdoc/lib/ruby/site_ruby/rbconfig.rb 206 - '' + opString useRailsExpress '' 211 + sed -i '/^ CONFIG\["\(BASERUBY\|SHELL\|GREP\|EGREP\|MKDIR_P\|MAKEDIRS\|INSTALL\)"\]/d' $rbConfig 212 + '' + opString useBaseRuby '' 207 213 # Prevent the baseruby from being included in the closure. 208 - sed -i '/^ CONFIG\["BASERUBY"\]/d' $rbConfig 209 - sed -i "s|'--with-baseruby=${baseruby}/bin/ruby'||" $rbConfig 214 + ${removeReferencesTo}/bin/remove-references-to \ 215 + -t ${baseRuby} \ 216 + $rbConfig $out/lib/libruby* 210 217 ''; 211 218 212 - disallowedRequisites = op (!jitSupport) stdenv.cc.cc; 219 + disallowedRequisites = op (!jitSupport) stdenv.cc.cc 220 + ++ op useBaseRuby baseRuby; 213 221 214 222 meta = with lib; { 215 223 description = "The Ruby language"; ··· 225 227 passthru = rec { 226 228 version = ver; 227 229 rubyEngine = "ruby"; 228 - baseRuby = baseruby; 229 230 libPath = "lib/${rubyEngine}/${ver.libDir}"; 230 231 gemPath = "lib/${rubyEngine}/gems/${ver.libDir}"; 231 232 devEnv = import ./dev.nix { ··· 243 246 minorVersion = ver.minor; 244 247 teenyVersion = ver.tiny; 245 248 patchLevel = ver.patchLevel; 249 + } // lib.optionalAttrs useBaseRuby { 250 + inherit baseRuby; 246 251 }; 247 252 } 248 253 ) args; in self;
+43
pkgs/development/libraries/SDL2/Fix-build-against-wayland-1.20.patch
··· 1 + From a31d1f1683ef2e9c063c3fa1db79d111cca99414 Mon Sep 17 00:00:00 2001 2 + From: David Redondo <kde@david-redondo.de> 3 + Date: Fri, 10 Dec 2021 16:22:34 +0100 4 + Subject: [PATCH] Fix build against wayland 1.20 5 + 6 + Fixes #5088 7 + 8 + (cherry picked from commit e2ade2bfc46d915cd306c63c830b81d800b2575f) 9 + --- 10 + src/video/wayland/SDL_waylanddyn.h | 2 ++ 11 + src/video/wayland/SDL_waylandsym.h | 4 ++++ 12 + 2 files changed, 6 insertions(+) 13 + 14 + diff --git a/src/video/wayland/SDL_waylanddyn.h b/src/video/wayland/SDL_waylanddyn.h 15 + index 485a9c19f..37070e946 100644 16 + --- a/src/video/wayland/SDL_waylanddyn.h 17 + +++ b/src/video/wayland/SDL_waylanddyn.h 18 + @@ -81,6 +81,8 @@ void SDL_WAYLAND_UnloadSymbols(void); 19 + #define wl_proxy_add_listener (*WAYLAND_wl_proxy_add_listener) 20 + #define wl_proxy_marshal_constructor (*WAYLAND_wl_proxy_marshal_constructor) 21 + #define wl_proxy_marshal_constructor_versioned (*WAYLAND_wl_proxy_marshal_constructor_versioned) 22 + +#define wl_proxy_marshal_flags (*WAYLAND_wl_proxy_marshal_flags) 23 + +#define wl_proxy_marshal_array_flags (*WAYLAND_wl_proxy_marshal_array_flags) 24 + 25 + #define wl_seat_interface (*WAYLAND_wl_seat_interface) 26 + #define wl_surface_interface (*WAYLAND_wl_surface_interface) 27 + diff --git a/src/video/wayland/SDL_waylandsym.h b/src/video/wayland/SDL_waylandsym.h 28 + index c4c189d3c..789f49e27 100644 29 + --- a/src/video/wayland/SDL_waylandsym.h 30 + +++ b/src/video/wayland/SDL_waylandsym.h 31 + @@ -71,6 +71,10 @@ SDL_WAYLAND_SYM(struct wl_proxy *, wl_proxy_marshal_constructor, (struct wl_prox 32 + SDL_WAYLAND_MODULE(WAYLAND_CLIENT_1_10) 33 + SDL_WAYLAND_SYM(struct wl_proxy *, wl_proxy_marshal_constructor_versioned, (struct wl_proxy *proxy, uint32_t opcode, const struct wl_interface *interface, uint32_t version, ...)) 34 + 35 + +SDL_WAYLAND_MODULE(WAYLAND_CLIENT_1_20) 36 + +SDL_WAYLAND_SYM(struct wl_proxy*, wl_proxy_marshal_flags, (struct wl_proxy *proxy, uint32_t opcode, const struct wl_interface *interfac, uint32_t version, uint32_t flags, ...)) 37 + +SDL_WAYLAND_SYM(struct wl_proxy*, wl_proxy_marshal_array_flags, (struct wl_proxy *proxy, uint32_t opcode, const struct wl_interface *interface, uint32_t version, uint32_t flags, union wl_argument *args)) 38 + + 39 + SDL_WAYLAND_INTERFACE(wl_seat_interface) 40 + SDL_WAYLAND_INTERFACE(wl_surface_interface) 41 + SDL_WAYLAND_INTERFACE(wl_shm_pool_interface) 42 + -- 43 + 2.33.1
+5 -1
pkgs/development/libraries/SDL2/default.nix
··· 35 35 outputs = [ "out" "dev" ]; 36 36 outputBin = "dev"; # sdl-config 37 37 38 - patches = [ ./find-headers.patch ]; 38 + patches = [ 39 + ./find-headers.patch 40 + # To fix the build with wayland 1.20.0: 41 + ./Fix-build-against-wayland-1.20.patch 42 + ]; 39 43 40 44 # Fix with mesa 19.2: https://bugzilla.libsdl.org/show_bug.cgi?id=4797 41 45 postPatch = ''
+2 -2
pkgs/development/libraries/aws-c-common/default.nix
··· 7 7 8 8 stdenv.mkDerivation rec { 9 9 pname = "aws-c-common"; 10 - version = "0.6.17"; 10 + version = "0.6.18"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "awslabs"; 14 14 repo = pname; 15 15 rev = "v${version}"; 16 - sha256 = "sha256-+FzTEpotxco4+9gLVUL+rkCWoMjRCorKQ47JINHsnNA="; 16 + sha256 = "sha256-5Y+cfiVtZGmExPuE3s5m8hnd0HrPwSiKptj0DM1mtUY="; 17 17 }; 18 18 19 19 nativeBuildInputs = [ cmake ];
+2 -2
pkgs/development/libraries/aws-c-s3/default.nix
··· 12 12 13 13 stdenv.mkDerivation rec { 14 14 pname = "aws-c-s3"; 15 - version = "0.1.27"; 15 + version = "0.1.29"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "awslabs"; 19 19 repo = "aws-c-s3"; 20 20 rev = "v${version}"; 21 - sha256 = "sha256-GtBUC5cKMN9rd5GQbYoipVvxrUCCNKbb5vhHUGQpeH8="; 21 + sha256 = "sha256-E3hMe6iEs0a22rsKn/F6EgTFjpQUMXbPtO9JkaZxj9Y="; 22 22 }; 23 23 24 24 nativeBuildInputs = [
+17 -3
pkgs/development/libraries/boehm-gc/default.nix
··· 1 1 { lib, stdenv, fetchurl 2 2 , autoreconfHook 3 - , enableLargeConfig ? false # doc: https://github.com/ivmai/bdwgc/blob/v8.0.6/doc/README.macros#L195 3 + , enableLargeConfig ? false # doc: https://github.com/ivmai/bdwgc/blob/v8.2.0/doc/README.macros (LARGE_CONFIG) 4 + , nix 5 + , nix_2_3 6 + , nixUnstable 4 7 }: 5 8 6 9 stdenv.mkDerivation rec { 7 10 pname = "boehm-gc"; 8 - version = "8.0.6"; 11 + version = "8.2.0"; 9 12 10 13 src = fetchurl { 11 14 urls = [ 12 15 "https://github.com/ivmai/bdwgc/releases/download/v${version}/gc-${version}.tar.gz" 13 16 "https://www.hboehm.info/gc/gc_source/gc-${version}.tar.gz" 14 17 ]; 15 - sha256 = "3b4914abc9fa76593596773e4da671d7ed4d5390e3d46fbf2e5f155e121bea11"; 18 + sha256 = "sha256-JUD3NWy3T2xbdTJsbTigZu3XljYf19TtJuSU2YVv7Y8="; 16 19 }; 17 20 18 21 outputs = [ "out" "dev" "doc" ]; ··· 38 35 doCheck = true; # not cross; 39 36 40 37 enableParallelBuilding = true; 38 + 39 + passthru = { 40 + tests = { 41 + # Assuming this package is picked up by these packages as expected. 42 + inherit 43 + nix 44 + nixUnstable 45 + nix_2_3 46 + ; 47 + }; 48 + }; 41 49 42 50 meta = { 43 51 description = "The Boehm-Demers-Weiser conservative garbage collector for C and C++";
+2 -2
pkgs/development/libraries/c-ares/default.nix
··· 8 8 let self = 9 9 stdenv.mkDerivation rec { 10 10 pname = "c-ares"; 11 - version = "1.17.2"; 11 + version = "1.18.1"; 12 12 13 13 src = fetchurl { 14 14 url = "https://c-ares.haxx.se/download/${pname}-${version}.tar.gz"; 15 - sha256 = "sha256-SAPIRM4gzlEO8OuD+OpB+iTsqunSgMRoxYLSuyWzkT0="; 15 + sha256 = "sha256-Gn1SqKhKn7/7G+kTPA9uFyF9kepab6Yfa0cpzaeOu88="; 16 16 }; 17 17 18 18 enableParallelBuilding = true;
+2 -2
pkgs/development/libraries/c-blosc/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "c-blosc"; 5 - version = "1.21.0"; 5 + version = "1.21.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "Blosc"; 9 9 repo = "c-blosc"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-B8SFOc1oGgU5AGAbkqe5oz045H08TnymNAbzz2oOKoo="; 11 + sha256 = "sha256-6SKEyciwDOxcbO8chvmxrLCxLkc93zxo6eH0c/lRyT8="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ cmake ];
+2 -2
pkgs/development/libraries/chromaprint/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "chromaprint"; 5 - version = "1.5.0"; 5 + version = "1.5.1"; 6 6 7 7 src = fetchurl { 8 8 url = "https://github.com/acoustid/chromaprint/releases/download/v${version}/${pname}-${version}.tar.gz"; 9 - sha256 = "0sknmyl5254rc55bvkhfwpl4dfvz45xglk1rq8zq5crmwq058fjp"; 9 + sha256 = "sha256-oarY+juLGLeNN1Wzdn+v+au2ckLgG0eOyaZOGQ8zXhw="; 10 10 }; 11 11 12 12 nativeBuildInputs = [ cmake ];
+3 -2
pkgs/development/libraries/db/generic.nix
··· 11 11 }: 12 12 13 13 stdenv.mkDerivation (rec { 14 - name = "db-${version}"; 14 + pname = "db"; 15 + inherit version; 15 16 16 17 src = fetchurl { 17 - url = "https://download.oracle.com/berkeley-db/${name}.tar.gz"; 18 + url = "https://download.oracle.com/berkeley-db/${pname}-${version}.tar.gz"; 18 19 sha256 = sha256; 19 20 }; 20 21
+2 -2
pkgs/development/libraries/enchant/2.x.nix
··· 11 11 12 12 stdenv.mkDerivation rec { 13 13 pname = "enchant"; 14 - version = "2.3.1"; 14 + version = "2.3.2"; 15 15 16 16 outputs = [ "out" "dev" ]; 17 17 18 18 src = fetchurl { 19 19 url = "https://github.com/AbiWord/${pname}/releases/download/v${version}/${pname}-${version}.tar.gz"; 20 - sha256 = "sha256-e0sa/PLNi/ppHe6mGIQE0zfyMXS7w5ucKt0r80Bzbpw="; 20 + sha256 = "sha256-zpukf9TTQDG9aURVmKaYpmEWArKw6R1wXpGm9QmerW4="; 21 21 }; 22 22 23 23 nativeBuildInputs = [
+2 -2
pkgs/development/libraries/expat/default.nix
··· 7 7 8 8 stdenv.mkDerivation rec { 9 9 pname = "expat"; 10 - version = "2.4.1"; 10 + version = "2.4.2"; 11 11 12 12 src = fetchurl { 13 13 url = "https://github.com/libexpat/libexpat/releases/download/R_${lib.replaceStrings ["."] ["_"] version}/${pname}-${version}.tar.xz"; 14 - sha256 = "sha256-zwMtDbqbkoY2VI4ysyei1msaq2PE9KE90TLC0dLy+2o="; 14 + sha256 = "sha256-vC/1j0nCmqx7/3BabBZ6gh8mxRIHn/CKxDL9D9ybsZk="; 15 15 }; 16 16 17 17 outputs = [ "out" "dev" ]; # TODO: fix referrers
+2 -2
pkgs/development/libraries/fftw/default.nix
··· 19 19 assert elem precision [ "single" "double" "long-double" "quad-precision" ]; 20 20 21 21 let 22 - version = "3.3.9"; 22 + version = "3.3.10"; 23 23 withDoc = stdenv.cc.isGNU; 24 24 in 25 25 ··· 31 31 "http://fftw.org/fftw-${version}.tar.gz" 32 32 "ftp://ftp.fftw.org/pub/fftw/fftw-${version}.tar.gz" 33 33 ]; 34 - sha256 = "sha256-vyx85AsEroEa9xTetRJRDMLBe5q51t3PSf5Eh+6nrz0="; 34 + sha256 = "sha256-VskyVJhSzdz6/as4ILAgDHdCZ1vpIXnlnmIVs0DiZGc="; 35 35 }; 36 36 37 37 outputs = [ "out" "dev" "man" ]
+9
pkgs/development/libraries/fontconfig/default.nix
··· 1 1 { lib, stdenv 2 + , fetchpatch 2 3 , substituteAll 3 4 , fetchurl 4 5 , pkg-config ··· 21 20 url = "https://www.freedesktop.org/software/fontconfig/release/${pname}-${version}.tar.xz"; 22 21 sha256 = "0g004r0bkkqz00mpm3svnnxn7d83158q0yb9ggxryizxfg5m5w55"; 23 22 }; 23 + 24 + patches = [ 25 + # Fix font style detection 26 + (fetchpatch { 27 + url = "https://gitlab.freedesktop.org/fontconfig/fontconfig/-/commit/92fbf14b0d7c4737ffe1e8326b7ab8ffae5548c3.patch"; 28 + sha256 = "1wmyax2151hg3m11q61mv25k45zk2w3xapb4p1r6wzk91zjlsgyr"; 29 + }) 30 + ]; 24 31 25 32 outputs = [ "bin" "dev" "lib" "out" ]; # $out contains all the config 26 33
+2 -2
pkgs/development/libraries/freetype/default.nix
··· 12 12 13 13 stdenv.mkDerivation rec { 14 14 pname = "freetype"; 15 - version = "2.11.0"; 15 + version = "2.11.1"; 16 16 17 17 src = fetchurl { 18 18 url = "mirror://savannah/${pname}/${pname}-${version}.tar.xz"; 19 - sha256 = "sha256-i+45vTloxIBLcGFKCjrVlyma0OgkvIqtXOiq9IBnvec="; 19 + sha256 = "sha256-MzOufP2ohCnJenrmO30BqzmAdsO2cYLpYOVoQFDyxcg="; 20 20 }; 21 21 22 22 propagatedBuildInputs = [ zlib bzip2 libpng ]; # needed when linking against freetype
+2 -2
pkgs/development/libraries/fribidi/default.nix
··· 10 10 11 11 stdenv.mkDerivation rec { 12 12 pname = "fribidi"; 13 - version = "1.0.10"; 13 + version = "1.0.11"; 14 14 15 15 outputs = [ "out" "devdoc" ]; 16 16 17 17 # NOTE: Only URL tarball has "Have pre-generated man pages: true", which works-around upstream usage of some rare ancient `c2man` fossil application. 18 18 src = fetchurl { 19 19 url = "https://github.com/fribidi/fribidi/releases/download/v${version}/${pname}-${version}.tar.xz"; 20 - sha256 = "009wcpgk4jj5x52skjkfs6xar6x38mcngs75rb59nj9ig1y6h73z"; 20 + sha256 = "sha256-MPk+nGPuYn0aLO3PWaw01FvzAkCYL5nkTG4BVGa05z0="; 21 21 }; 22 22 23 23 postPatch = ''
+2 -2
pkgs/development/libraries/glib-networking/default.nix
··· 18 18 19 19 stdenv.mkDerivation rec { 20 20 pname = "glib-networking"; 21 - version = "2.70.0"; 21 + version = "2.70.1"; 22 22 23 23 outputs = [ "out" "installedTests" ]; 24 24 25 25 src = fetchurl { 26 26 url = "mirror://gnome/sources/${pname}/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; 27 - sha256 = "0dbg1na239mbavn4hknkax5sns9q2dbdnqw9wcpmhv58mzkhid36"; 27 + sha256 = "Kha/wtJxzNMmbj+0YryKQQPALoG7szmqktb7BgWS17w="; 28 28 }; 29 29 30 30 patches = [
+2 -2
pkgs/development/libraries/glib/default.nix
··· 45 45 46 46 stdenv.mkDerivation rec { 47 47 pname = "glib"; 48 - version = "2.70.1"; 48 + version = "2.70.2"; 49 49 50 50 src = fetchurl { 51 51 url = "mirror://gnome/sources/glib/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; 52 - sha256 = "+be85/UXU6H0OFO7ysqL8J4V6ZQmjinP16dvZWNiY8A="; 52 + sha256 = "BVFFnIXNPaPVjdyQFv0ovlr1A/XhYVpxultRKslFgG8="; 53 53 }; 54 54 55 55 patches = optionals stdenv.isDarwin [
+20
pkgs/development/libraries/gmp/5.1.3-CVE-2021-43618.patch
··· 1 + Based on https://gmplib.org/repo/gmp-6.2/raw-rev/561a9c25298e, 2 + adapted for 5.x by ris 3 + 4 + diff -r e1fd9db13b47 -r 561a9c25298e mpz/inp_raw.c 5 + --- a/mpz/inp_raw.c Tue Dec 22 23:49:51 2020 +0100 6 + +++ b/mpz/inp_raw.c Thu Oct 21 19:06:49 2021 +0200 7 + @@ -81,8 +81,11 @@ 8 + 9 + abs_csize = ABS (csize); 10 + 11 + + if (UNLIKELY (abs_csize > ~(mp_bitcnt_t) 0 / 8)) 12 + + return 0; /* Bit size overflows */ 13 + + 14 + /* round up to a multiple of limbs */ 15 + - abs_xsize = (abs_csize*8 + GMP_NUMB_BITS-1) / GMP_NUMB_BITS; 16 + + abs_xsize = ((mp_bitcnt_t)abs_csize*8 + GMP_NUMB_BITS-1) / GMP_NUMB_BITS; 17 + 18 + if (abs_xsize != 0) 19 + { 20 +
+5 -1
pkgs/development/libraries/gmp/5.1.x.nix
··· 22 22 23 23 nativeBuildInputs = [ m4 ]; 24 24 25 - patches = if stdenv.isDarwin then [ ./need-size-t.patch ] else null; 25 + patches = [ 26 + ./5.1.3-CVE-2021-43618.patch 27 + ] ++ lib.optionals stdenv.isDarwin [ 28 + ./need-size-t.patch 29 + ]; 26 30 27 31 configureFlags = [ 28 32 "--with-pic"
+19
pkgs/development/libraries/gmp/6.2.1-CVE-2021-43618.patch
··· 1 + https://gmplib.org/repo/gmp-6.2/raw-rev/561a9c25298e 2 + 3 + diff -r e1fd9db13b47 -r 561a9c25298e mpz/inp_raw.c 4 + --- a/mpz/inp_raw.c Tue Dec 22 23:49:51 2020 +0100 5 + +++ b/mpz/inp_raw.c Thu Oct 21 19:06:49 2021 +0200 6 + @@ -88,8 +88,11 @@ 7 + 8 + abs_csize = ABS (csize); 9 + 10 + + if (UNLIKELY (abs_csize > ~(mp_bitcnt_t) 0 / 8)) 11 + + return 0; /* Bit size overflows */ 12 + + 13 + /* round up to a multiple of limbs */ 14 + - abs_xsize = BITS_TO_LIMBS (abs_csize*8); 15 + + abs_xsize = BITS_TO_LIMBS ((mp_bitcnt_t) abs_csize * 8); 16 + 17 + if (abs_xsize != 0) 18 + { 19 +
+2
pkgs/development/libraries/gmp/6.x.nix
··· 20 20 sha256 = "0z2ddfiwgi0xbf65z4fg4hqqzlhv0cc6hdcswf3c6n21xdmk5sga"; 21 21 }; 22 22 23 + patches = [ ./6.2.1-CVE-2021-43618.patch ]; 24 + 23 25 #outputs TODO: split $cxx due to libstdc++ dependency 24 26 # maybe let ghc use a version with *.so shared with rest of nixpkgs and *.a added 25 27 # - see #5855 for related discussion
+2 -2
pkgs/development/libraries/gsl/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "gsl"; 5 - version = "2.7"; 5 + version = "2.7.1"; 6 6 7 7 src = fetchurl { 8 8 url = "mirror://gnu/gsl/${pname}-${version}.tar.gz"; 9 - sha256 = "sha256-77vzeF2g5TA4vnkHUAYotGYVLbw8FzqH3hteui4jYCs="; 9 + sha256 = "sha256-3LD71DBIgyt1f/mUJpGo3XACbV2g/4VgHlJof23us0s="; 10 10 }; 11 11 12 12 preConfigure = if (lib.versionAtLeast stdenv.hostPlatform.darwinMinVersion "11" && stdenv.isDarwin) then ''
+2 -2
pkgs/development/libraries/gupnp/default.nix
··· 20 20 21 21 stdenv.mkDerivation rec { 22 22 pname = "gupnp"; 23 - version = "1.4.0"; 23 + version = "1.4.1"; 24 24 25 25 outputs = [ "out" "dev" ] 26 26 ++ lib.optionals (stdenv.buildPlatform == stdenv.hostPlatform) [ "devdoc" ]; 27 27 28 28 src = fetchurl { 29 29 url = "mirror://gnome/sources/gupnp/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; 30 - sha256 = "sha256-WQ/7ArhNoqGuxo/VNLxArxs33T9iI/nRV3/EirSL428="; 30 + sha256 = "sha256-iZGWteZvA7jiXwRqemWM0qaFG+y4Py1VNFqzKBZV3Aw="; 31 31 }; 32 32 33 33 patches = [
+2 -2
pkgs/development/libraries/harfbuzz/default.nix
··· 24 24 }: 25 25 26 26 let 27 - version = "3.0.0"; 27 + version = "3.1.2"; 28 28 inherit (lib) optional optionals optionalString; 29 29 mesonFeatureFlag = opt: b: 30 30 "-D${opt}=${if b then "enabled" else "disabled"}"; ··· 39 39 owner = "harfbuzz"; 40 40 repo = "harfbuzz"; 41 41 rev = version; 42 - sha256 = "sha256-yRRr4RcnbwoZ1Hn3+zbbocKFyBSLYx/exaAHNGsPINA="; 42 + sha256 = "sha256-1xndbJhx+1AzJNnpvvdEcBHPZMPaMI03h6sG2h1d3qs="; 43 43 }; 44 44 45 45 postPatch = ''
+17 -10
pkgs/development/libraries/hidapi/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, autoreconfHook, pkg-config, udev, libusb1 2 - , darwin }: 1 + { lib 2 + , stdenv 3 + , fetchFromGitHub 4 + , cmake 5 + , pkg-config 6 + , libusb1 7 + , udev 8 + , Cocoa 9 + , IOKit 10 + }: 3 11 4 12 stdenv.mkDerivation rec { 5 13 pname = "hidapi"; 6 - version = "0.10.1"; 14 + version = "0.11.0"; 7 15 8 16 src = fetchFromGitHub { 9 17 owner = "libusb"; 10 18 repo = "hidapi"; 11 19 rev = "${pname}-${version}"; 12 - sha256 = "1nr4z4b10vpbh3ss525r7spz4i43zim2ba5qzfl15dgdxshxxivb"; 20 + sha256 = "0dzigvmwbg20b33xn0sklnf489m8g84yrcm8kqlrsd7x8iymsg63"; 13 21 }; 14 22 15 - nativeBuildInputs = [ autoreconfHook pkg-config ]; 23 + nativeBuildInputs = [ cmake pkg-config ]; 16 24 17 - buildInputs = [ ] 18 - ++ lib.optionals stdenv.isLinux [ libusb1 udev ]; 25 + buildInputs = lib.optionals stdenv.isLinux [ libusb1 udev ]; 19 26 20 27 enableParallelBuilding = true; 21 28 22 - propagatedBuildInputs = lib.optionals stdenv.isDarwin (with darwin.apple_sdk.frameworks; [ IOKit Cocoa ]); 29 + propagatedBuildInputs = lib.optionals stdenv.isDarwin [ Cocoa IOKit ]; 23 30 24 31 meta = with lib; { 25 32 description = "Library for communicating with USB and Bluetooth HID devices"; 26 33 homepage = "https://github.com/libusb/hidapi"; 27 34 maintainers = with maintainers; [ prusnak ]; 28 - # Actually, you can chose between GPLv3, BSD or HIDAPI license (more liberal) 29 - license = licenses.bsd3; 35 + # You can choose between GPLv3, BSD or HIDAPI license (even more liberal) 36 + license = with licenses; [ bsd3 /* or */ gpl3Only ] ; 30 37 platforms = platforms.unix; 31 38 }; 32 39 }
+25 -4
pkgs/development/libraries/kdb/default.nix
··· 1 - { 2 - mkDerivation, lib, fetchurl, 3 - extra-cmake-modules, 4 - qtbase, qttranslations, kcoreaddons, python2, sqlite, postgresql, libmysqlclient 1 + { mkDerivation 2 + , lib 3 + , fetchurl 4 + , fetchpatch 5 + , extra-cmake-modules 6 + , qtbase 7 + , qttranslations 8 + , kcoreaddons 9 + , python2 10 + , sqlite 11 + , postgresql 12 + , libmysqlclient 5 13 }: 6 14 7 15 mkDerivation rec { ··· 20 12 url = "mirror://kde/stable/${pname}/src/${pname}-${version}.tar.xz"; 21 13 sha256 = "0s909x34a56n3xwhqz27irl2gbzidax0685w2kf34f0liny872cg"; 22 14 }; 15 + 16 + patches = [ 17 + # fix build with newer QT versions 18 + (fetchpatch { 19 + url = "https://github.com/KDE/kdb/commit/b36d74f13a1421437a725fb74502c993c359392a.patch"; 20 + sha256 = "sha256-ENMZTUZ3yCKUhHPMUcDe1cMY2GLBz0G3ZvMRyj8Hfrw="; 21 + }) 22 + # fix build with newer posgresql versions 23 + (fetchpatch { 24 + url = "https://github.com/KDE/kdb/commit/40cdaea4d7824cc1b0d26e6ad2dcb61fa2077911.patch"; 25 + sha256 = "sha256-cZpX6L/NZX3vztnh0s2+v4J7kBcKgUdecY53LRp8CwM="; 26 + }) 27 + ]; 23 28 24 29 nativeBuildInputs = [ extra-cmake-modules ]; 25 30
+4 -4
pkgs/development/libraries/kde-frameworks/extra-cmake-modules/nix-lib-path.patch
··· 1 - diff --git a/kde-modules/KDEInstallDirs.cmake b/kde-modules/KDEInstallDirs.cmake 1 + diff --git a/kde-modules/KDEInstallDirsCommon.cmake b/kde-modules/KDEInstallDirsCommon.cmake 2 2 index c1d056b..d9e19f0 100644 3 - --- a/kde-modules/KDEInstallDirs.cmake 4 - +++ b/kde-modules/KDEInstallDirs.cmake 5 - @@ -242,35 +242,6 @@ 3 + --- a/kde-modules/KDEInstallDirsCommon.cmake 4 + +++ b/kde-modules/KDEInstallDirsCommon.cmake 5 + @@ -15,35 +15,6 @@ 6 6 # GNUInstallDirs code deals with re-configuring, but that is dealt with 7 7 # by the _define_* macros in this module). 8 8 set(_LIBDIR_DEFAULT "lib")
+1 -1
pkgs/development/libraries/kde-frameworks/fetch.sh
··· 1 - WGET_ARGS=( https://download.kde.org/stable/frameworks/5.87/ -A '*.tar.xz' ) 1 + WGET_ARGS=( https://download.kde.org/stable/frameworks/5.89/ -A '*.tar.xz' )
-45
pkgs/development/libraries/kde-frameworks/kinit/0001-kinit-libpath.patch
··· 1 - From 715c5f461b4992dac066601202a673bc551a5e33 Mon Sep 17 00:00:00 2001 2 - From: Thomas Tuegel <ttuegel@mailbox.org> 3 - Date: Sun, 16 Feb 2020 14:23:31 -0600 4 - Subject: [PATCH 1/4] kinit-libpath 5 - 6 - --- 7 - src/kdeinit/kinit.cpp | 22 +++++++++------------- 8 - 1 file changed, 9 insertions(+), 13 deletions(-) 9 - 10 - diff --git a/src/kdeinit/kinit.cpp b/src/kdeinit/kinit.cpp 11 - index 8fff17a..0801b75 100644 12 - --- a/src/kdeinit/kinit.cpp 13 - +++ b/src/kdeinit/kinit.cpp 14 - @@ -622,19 +622,15 @@ static pid_t launch(int argc, const char *_name, const char *args, 15 - 16 - if (!libpath.isEmpty()) { 17 - if (libpath_relative) { 18 - - // NB: Because Qt makes the actual dlopen() call, the 19 - - // RUNPATH of kdeinit is *not* respected - see 20 - - // https://sourceware.org/bugzilla/show_bug.cgi?id=13945 21 - - // - so we try hacking it in ourselves 22 - - QString install_lib_dir = QFile::decodeName( 23 - - CMAKE_INSTALL_PREFIX "/" KDE_INSTALL_LIBDIR "/"); 24 - - QString orig_libpath = libpath; 25 - - libpath = install_lib_dir + libpath; 26 - - l.setFileName(libpath); 27 - - if (!l.load()) { 28 - - libpath = orig_libpath; 29 - - l.setFileName(libpath); 30 - - l.load(); 31 - + // Try to load the library relative to the active profiles. 32 - + QByteArrayList profiles = qgetenv("NIX_PROFILES").split(' '); 33 - + // Reverse the profile list. 34 - + std::reverse(profiles.begin(), profiles.end()); 35 - + for (const QByteArray &profile: profiles) { 36 - + if (!profile.isEmpty()) { 37 - + l.setFileName(QFile::decodeName(profile) + QStringLiteral("/lib/") + libpath); 38 - + if (l.load()) break; 39 - + } 40 - } 41 - } else { 42 - l.load(); 43 - -- 44 - 2.23.1 45 -
+1 -1
pkgs/development/libraries/kde-frameworks/kinit/0002-start_kdeinit-path.patch
··· 11 11 index 891f50c..ef664ad 100644 12 12 --- a/src/start_kdeinit/start_kdeinit_wrapper.c 13 13 +++ b/src/start_kdeinit/start_kdeinit_wrapper.c 14 - @@ -23,7 +23,7 @@ 14 + @@ -11,7 +11,7 @@ 15 15 #include <string.h> 16 16 #include <unistd.h> 17 17
-1
pkgs/development/libraries/kde-frameworks/kinit/default.nix
··· 14 14 kconfig kcrash ki18n kio kservice kwindowsystem 15 15 ]; 16 16 patches = [ 17 - ./0001-kinit-libpath.patch 18 17 ./0002-start_kdeinit-path.patch 19 18 ./0003-kdeinit-extra-libs.patch 20 19 ./0004-start_kdeinit-environ-hard-limit.patch
+2 -2
pkgs/development/libraries/kde-frameworks/kpackage/0001-Allow-external-paths-default.patch
··· 11 11 index 36f5600..881f176 100644 12 12 --- a/src/kpackage/package.cpp 13 13 +++ b/src/kpackage/package.cpp 14 - @@ -858,7 +858,7 @@ PackagePrivate::PackagePrivate() 14 + @@ -866,7 +866,7 @@ PackagePrivate::PackagePrivate() 15 + PackagePrivate::PackagePrivate() 15 16 : QSharedData() 16 17 , fallbackPackage(nullptr) 17 - , metadata(nullptr) 18 18 - , externalPaths(false) 19 19 + , externalPaths(true) 20 20 , valid(false)
-8
pkgs/development/libraries/kde-frameworks/sonnet.nix
··· 1 1 { mkDerivation 2 - , fetchpatch 3 2 , extra-cmake-modules 4 3 , aspell, qtbase, qttools 5 4 }: 6 5 7 6 mkDerivation { 8 7 name = "sonnet"; 9 - patches = [ 10 - # Pull upstream path to fix determinism. 11 - (fetchpatch { 12 - url = "https://invent.kde.org/frameworks/sonnet/-/commit/a01fc66b8affb01221d1fdf84146a78c172d4c6b.patch"; 13 - sha256 = "1jzd65rmgvfpcxrsnsmdz8ac1ldqs9rjfryy8fryy0ibzbhc1050"; 14 - }) 15 - ]; 16 8 nativeBuildInputs = [ extra-cmake-modules ]; 17 9 buildInputs = [ aspell qttools ]; 18 10 propagatedBuildInputs = [ qtbase ];
+332 -332
pkgs/development/libraries/kde-frameworks/srcs.nix
··· 4 4 5 5 { 6 6 attica = { 7 - version = "5.87.0"; 7 + version = "5.89.0"; 8 8 src = fetchurl { 9 - url = "${mirror}/stable/frameworks/5.87/attica-5.87.0.tar.xz"; 10 - sha256 = "0wjfrlmwg03js544xjlpznxxqv14cj40fpzbfnlj24kjgd1ai8dq"; 11 - name = "attica-5.87.0.tar.xz"; 9 + url = "${mirror}/stable/frameworks/5.89/attica-5.89.0.tar.xz"; 10 + sha256 = "03q2ajvwrl1x6h0jcvc6nh0avj7dqhx4k1lx5qa3xgfxwk01kgp9"; 11 + name = "attica-5.89.0.tar.xz"; 12 12 }; 13 13 }; 14 14 baloo = { 15 - version = "5.87.0"; 15 + version = "5.89.0"; 16 16 src = fetchurl { 17 - url = "${mirror}/stable/frameworks/5.87/baloo-5.87.0.tar.xz"; 18 - sha256 = "0h55hn6klsq19l44qzc95l1r7hx2zr9hr4ysxd8kvcxc02imaswb"; 19 - name = "baloo-5.87.0.tar.xz"; 17 + url = "${mirror}/stable/frameworks/5.89/baloo-5.89.0.tar.xz"; 18 + sha256 = "091gjzn4armm4xs61csavwgij54mv8v9hx3gvva18g06gjkajyis"; 19 + name = "baloo-5.89.0.tar.xz"; 20 20 }; 21 21 }; 22 22 bluez-qt = { 23 - version = "5.87.0"; 23 + version = "5.89.0"; 24 24 src = fetchurl { 25 - url = "${mirror}/stable/frameworks/5.87/bluez-qt-5.87.0.tar.xz"; 26 - sha256 = "1shk3riddgdb0i6f0603hbhww13z1b566rdaplxsbgk8cyhl5acz"; 27 - name = "bluez-qt-5.87.0.tar.xz"; 25 + url = "${mirror}/stable/frameworks/5.89/bluez-qt-5.89.0.tar.xz"; 26 + sha256 = "00wczjvvhxzi12ijf65d66x36gm0x6j5z3b6cwqgdz2s66wr0jw5"; 27 + name = "bluez-qt-5.89.0.tar.xz"; 28 28 }; 29 29 }; 30 30 breeze-icons = { 31 - version = "5.87.0"; 31 + version = "5.89.0"; 32 32 src = fetchurl { 33 - url = "${mirror}/stable/frameworks/5.87/breeze-icons-5.87.0.tar.xz"; 34 - sha256 = "19f7n4r6b0b1l8hc79xbj8gc18xf488bk4i0wdbw22x9vwl4h58h"; 35 - name = "breeze-icons-5.87.0.tar.xz"; 33 + url = "${mirror}/stable/frameworks/5.89/breeze-icons-5.89.0.tar.xz"; 34 + sha256 = "12l2wzc3pah5qapznriaffh4wz97s6nqxlj9i119k9qw295d6wfw"; 35 + name = "breeze-icons-5.89.0.tar.xz"; 36 36 }; 37 37 }; 38 38 extra-cmake-modules = { 39 - version = "5.87.0"; 39 + version = "5.89.0"; 40 40 src = fetchurl { 41 - url = "${mirror}/stable/frameworks/5.87/extra-cmake-modules-5.87.0.tar.xz"; 42 - sha256 = "1axwz0p3ggjpcxpqqlyng3fa2pxmjxgybncgkp8i81i7iq6sf72l"; 43 - name = "extra-cmake-modules-5.87.0.tar.xz"; 41 + url = "${mirror}/stable/frameworks/5.89/extra-cmake-modules-5.89.0.tar.xz"; 42 + sha256 = "0bzhd6xcphrcnbg8ylx91rq5y3vvl3jfcgik19bvh8sr4ad25mrx"; 43 + name = "extra-cmake-modules-5.89.0.tar.xz"; 44 44 }; 45 45 }; 46 46 frameworkintegration = { 47 - version = "5.87.0"; 47 + version = "5.89.0"; 48 48 src = fetchurl { 49 - url = "${mirror}/stable/frameworks/5.87/frameworkintegration-5.87.0.tar.xz"; 50 - sha256 = "1bbgxqgy28abrk2cgzj7k2m18xmkl9kw58dal03pzlmh77br00lb"; 51 - name = "frameworkintegration-5.87.0.tar.xz"; 49 + url = "${mirror}/stable/frameworks/5.89/frameworkintegration-5.89.0.tar.xz"; 50 + sha256 = "0f7cqxmgnwi4n8fa8vifqaysbk7839x1qbmp9qfa998jxnn1w92f"; 51 + name = "frameworkintegration-5.89.0.tar.xz"; 52 52 }; 53 53 }; 54 54 kactivities = { 55 - version = "5.87.0"; 55 + version = "5.89.0"; 56 56 src = fetchurl { 57 - url = "${mirror}/stable/frameworks/5.87/kactivities-5.87.0.tar.xz"; 58 - sha256 = "1ynngg9x70dwcnn4ncf7h63hj5p187d4mk1aqriax0iz21mfjmp9"; 59 - name = "kactivities-5.87.0.tar.xz"; 57 + url = "${mirror}/stable/frameworks/5.89/kactivities-5.89.0.tar.xz"; 58 + sha256 = "1dhxl487246kpx4w5zhhdgk94jwns09dvragvh2bb787mszqq5v9"; 59 + name = "kactivities-5.89.0.tar.xz"; 60 60 }; 61 61 }; 62 62 kactivities-stats = { 63 - version = "5.87.0"; 63 + version = "5.89.0"; 64 64 src = fetchurl { 65 - url = "${mirror}/stable/frameworks/5.87/kactivities-stats-5.87.0.tar.xz"; 66 - sha256 = "1n7jzbfwgwclnrnssxm180fis74qp3v9nximhc0l8fmb8ac1f106"; 67 - name = "kactivities-stats-5.87.0.tar.xz"; 65 + url = "${mirror}/stable/frameworks/5.89/kactivities-stats-5.89.0.tar.xz"; 66 + sha256 = "1pp3vkkadaday0pzd09hdhccw6hbrqp481hcdzzyqj1x2ckb59bj"; 67 + name = "kactivities-stats-5.89.0.tar.xz"; 68 68 }; 69 69 }; 70 70 kapidox = { 71 - version = "5.87.0"; 71 + version = "5.89.0"; 72 72 src = fetchurl { 73 - url = "${mirror}/stable/frameworks/5.87/kapidox-5.87.0.tar.xz"; 74 - sha256 = "0iyla9i4ln6w9wkm4dand53ir6gzsm4180diwi9p2q5mfrk0rvja"; 75 - name = "kapidox-5.87.0.tar.xz"; 73 + url = "${mirror}/stable/frameworks/5.89/kapidox-5.89.0.tar.xz"; 74 + sha256 = "0a3vwh3rzpcaylz77fs4biiadljchs2lfh6svg149yg95yqwng3b"; 75 + name = "kapidox-5.89.0.tar.xz"; 76 76 }; 77 77 }; 78 78 karchive = { 79 - version = "5.87.0"; 79 + version = "5.89.0"; 80 80 src = fetchurl { 81 - url = "${mirror}/stable/frameworks/5.87/karchive-5.87.0.tar.xz"; 82 - sha256 = "0d8wqrynwmqazlf5v7qas9akrvcwr4lrqg3dcbnq61mmc252wgqh"; 83 - name = "karchive-5.87.0.tar.xz"; 81 + url = "${mirror}/stable/frameworks/5.89/karchive-5.89.0.tar.xz"; 82 + sha256 = "1s45mns9km1fy2d07d2nmslf4dc2pl5i169ncq2dc7vabjvyh59b"; 83 + name = "karchive-5.89.0.tar.xz"; 84 84 }; 85 85 }; 86 86 kauth = { 87 - version = "5.87.0"; 87 + version = "5.89.0"; 88 88 src = fetchurl { 89 - url = "${mirror}/stable/frameworks/5.87/kauth-5.87.0.tar.xz"; 90 - sha256 = "1gbq487v2nn0zyis6xdvsn0mz7yy131vafq76jdi7b6nyh5c1lgi"; 91 - name = "kauth-5.87.0.tar.xz"; 89 + url = "${mirror}/stable/frameworks/5.89/kauth-5.89.0.tar.xz"; 90 + sha256 = "1ys9xr7js8rj07ff7ncp9d52rcn10bg49jcyg4ldam07bfpq36nz"; 91 + name = "kauth-5.89.0.tar.xz"; 92 92 }; 93 93 }; 94 94 kbookmarks = { 95 - version = "5.87.0"; 95 + version = "5.89.0"; 96 96 src = fetchurl { 97 - url = "${mirror}/stable/frameworks/5.87/kbookmarks-5.87.0.tar.xz"; 98 - sha256 = "0klws0psdq9vx09p38ckki7aqbdkcns1smk8ckj79krpsjv8q9nx"; 99 - name = "kbookmarks-5.87.0.tar.xz"; 97 + url = "${mirror}/stable/frameworks/5.89/kbookmarks-5.89.0.tar.xz"; 98 + sha256 = "16bh5daimpjwy0gz56v32vslnmzmyfsf8z92s5gi13bkjfp03syn"; 99 + name = "kbookmarks-5.89.0.tar.xz"; 100 100 }; 101 101 }; 102 102 kcalendarcore = { 103 - version = "5.87.0"; 103 + version = "5.89.0"; 104 104 src = fetchurl { 105 - url = "${mirror}/stable/frameworks/5.87/kcalendarcore-5.87.0.tar.xz"; 106 - sha256 = "0ig2w0dxrf9ih9hqk5rvqqmyhg658m1hs4807zl66llplkr58q0n"; 107 - name = "kcalendarcore-5.87.0.tar.xz"; 105 + url = "${mirror}/stable/frameworks/5.89/kcalendarcore-5.89.0.tar.xz"; 106 + sha256 = "1xy045d5jl3qk9ka13ximk7x70q5pswh143kqk7cf6x0f7bvgpap"; 107 + name = "kcalendarcore-5.89.0.tar.xz"; 108 108 }; 109 109 }; 110 110 kcmutils = { 111 - version = "5.87.0"; 111 + version = "5.89.0"; 112 112 src = fetchurl { 113 - url = "${mirror}/stable/frameworks/5.87/kcmutils-5.87.0.tar.xz"; 114 - sha256 = "09pcif2gmkbhwqb8cxfs89nw81wdpdsd4a2n7xdm1xz6lpwwmk1h"; 115 - name = "kcmutils-5.87.0.tar.xz"; 113 + url = "${mirror}/stable/frameworks/5.89/kcmutils-5.89.0.tar.xz"; 114 + sha256 = "0za9x8v9lnwyib1gip6wbmda19wfjaf2yh6yiqlszxcbsfq7kzhm"; 115 + name = "kcmutils-5.89.0.tar.xz"; 116 116 }; 117 117 }; 118 118 kcodecs = { 119 - version = "5.87.0"; 119 + version = "5.89.0"; 120 120 src = fetchurl { 121 - url = "${mirror}/stable/frameworks/5.87/kcodecs-5.87.0.tar.xz"; 122 - sha256 = "1fb8agbkwxnxb0hlzz0ya460z3ihn9qz2zvjdxvk21rjhmp1alh7"; 123 - name = "kcodecs-5.87.0.tar.xz"; 121 + url = "${mirror}/stable/frameworks/5.89/kcodecs-5.89.0.tar.xz"; 122 + sha256 = "1j2pmsyi8lvhnzhrrvsm98x7inf503vr2b58yl070zp293fyhd9q"; 123 + name = "kcodecs-5.89.0.tar.xz"; 124 124 }; 125 125 }; 126 126 kcompletion = { 127 - version = "5.87.0"; 127 + version = "5.89.0"; 128 128 src = fetchurl { 129 - url = "${mirror}/stable/frameworks/5.87/kcompletion-5.87.0.tar.xz"; 130 - sha256 = "15c9sgdgw6cf5y2jjgjlsxn0p0pxvrmhzcyq05d9fqhy185ng03p"; 131 - name = "kcompletion-5.87.0.tar.xz"; 129 + url = "${mirror}/stable/frameworks/5.89/kcompletion-5.89.0.tar.xz"; 130 + sha256 = "0bv9kxrdprk1jvsf9mqkag0pkq7h1wngdpvdx9wfy4kkbj7y46zf"; 131 + name = "kcompletion-5.89.0.tar.xz"; 132 132 }; 133 133 }; 134 134 kconfig = { 135 - version = "5.87.0"; 135 + version = "5.89.0"; 136 136 src = fetchurl { 137 - url = "${mirror}/stable/frameworks/5.87/kconfig-5.87.0.tar.xz"; 138 - sha256 = "1l8px5qpf5qfma24filim1swblgbdvnf25pc38qc6s79inkganrl"; 139 - name = "kconfig-5.87.0.tar.xz"; 137 + url = "${mirror}/stable/frameworks/5.89/kconfig-5.89.0.tar.xz"; 138 + sha256 = "0ixil0qyd8byn4ix5w9mp5kdvkscnwhamknrnbqzikhmmknprccf"; 139 + name = "kconfig-5.89.0.tar.xz"; 140 140 }; 141 141 }; 142 142 kconfigwidgets = { 143 - version = "5.87.0"; 143 + version = "5.89.0"; 144 144 src = fetchurl { 145 - url = "${mirror}/stable/frameworks/5.87/kconfigwidgets-5.87.0.tar.xz"; 146 - sha256 = "18m3nqlp87am2w8my4y933ck9k3cs5q62nkhbp8ngaavw8cfbd84"; 147 - name = "kconfigwidgets-5.87.0.tar.xz"; 145 + url = "${mirror}/stable/frameworks/5.89/kconfigwidgets-5.89.0.tar.xz"; 146 + sha256 = "0rzqx2knc8bc26jyislb1dw5qdhmkga3cqlyiyynbawx3scind60"; 147 + name = "kconfigwidgets-5.89.0.tar.xz"; 148 148 }; 149 149 }; 150 150 kcontacts = { 151 - version = "5.87.0"; 151 + version = "5.89.0"; 152 152 src = fetchurl { 153 - url = "${mirror}/stable/frameworks/5.87/kcontacts-5.87.0.tar.xz"; 154 - sha256 = "02zyirvds572rxbdc47ncs71a66z5hql0vpj8lx1zpr0nnvpvlcv"; 155 - name = "kcontacts-5.87.0.tar.xz"; 153 + url = "${mirror}/stable/frameworks/5.89/kcontacts-5.89.0.tar.xz"; 154 + sha256 = "1yjgrzn3bx8fzmr6mjd2c99gxlh0nqm1fi3sgmcn1bj07jdrp52r"; 155 + name = "kcontacts-5.89.0.tar.xz"; 156 156 }; 157 157 }; 158 158 kcoreaddons = { 159 - version = "5.87.0"; 159 + version = "5.89.0"; 160 160 src = fetchurl { 161 - url = "${mirror}/stable/frameworks/5.87/kcoreaddons-5.87.0.tar.xz"; 162 - sha256 = "19pdpz7jjknccaqc2i6zfmclmrk60clzanvx72ryvh7yb0xyk7yj"; 163 - name = "kcoreaddons-5.87.0.tar.xz"; 161 + url = "${mirror}/stable/frameworks/5.89/kcoreaddons-5.89.0.tar.xz"; 162 + sha256 = "0ss27wz8z2lfhn0njads2rwd62aciamr0vcbj4gyfiv2ddw8bl71"; 163 + name = "kcoreaddons-5.89.0.tar.xz"; 164 164 }; 165 165 }; 166 166 kcrash = { 167 - version = "5.87.0"; 167 + version = "5.89.0"; 168 168 src = fetchurl { 169 - url = "${mirror}/stable/frameworks/5.87/kcrash-5.87.0.tar.xz"; 170 - sha256 = "1l48dn5vqn4lns57v61p1a8r3pklx4xclsa3890pjf6iviqxf22r"; 171 - name = "kcrash-5.87.0.tar.xz"; 169 + url = "${mirror}/stable/frameworks/5.89/kcrash-5.89.0.tar.xz"; 170 + sha256 = "07pc449qqvz6rfs1wk6r2jgfncpliig8c1cxzhbkzqrkcf1gj6ba"; 171 + name = "kcrash-5.89.0.tar.xz"; 172 172 }; 173 173 }; 174 174 kdav = { 175 - version = "5.87.0"; 175 + version = "5.89.0"; 176 176 src = fetchurl { 177 - url = "${mirror}/stable/frameworks/5.87/kdav-5.87.0.tar.xz"; 178 - sha256 = "0sb1g0wdpql5gw52nxhzkk1wa9md2k25lwyf902g3pf7ahdgdk5z"; 179 - name = "kdav-5.87.0.tar.xz"; 177 + url = "${mirror}/stable/frameworks/5.89/kdav-5.89.0.tar.xz"; 178 + sha256 = "1wyg6bxfp1r1snk40y6q70ix00aqwx4sl4z7jrg12h38cnc8sa6v"; 179 + name = "kdav-5.89.0.tar.xz"; 180 180 }; 181 181 }; 182 182 kdbusaddons = { 183 - version = "5.87.0"; 183 + version = "5.89.0"; 184 184 src = fetchurl { 185 - url = "${mirror}/stable/frameworks/5.87/kdbusaddons-5.87.0.tar.xz"; 186 - sha256 = "14xmrvak95aqc98a6k6ldg1w4g7syx2xng3vgvwj9wzpzr3shp6p"; 187 - name = "kdbusaddons-5.87.0.tar.xz"; 185 + url = "${mirror}/stable/frameworks/5.89/kdbusaddons-5.89.0.tar.xz"; 186 + sha256 = "1yh5xx01wsjcj6axcw1r94p32rrs111078prssgnngbrihbhbjzh"; 187 + name = "kdbusaddons-5.89.0.tar.xz"; 188 188 }; 189 189 }; 190 190 kdeclarative = { 191 - version = "5.87.0"; 191 + version = "5.89.0"; 192 192 src = fetchurl { 193 - url = "${mirror}/stable/frameworks/5.87/kdeclarative-5.87.0.tar.xz"; 194 - sha256 = "0zx4alsqk3vqfgyi6x7v2mcar92j3swmg0ms0b9mjl95bvpgi4k7"; 195 - name = "kdeclarative-5.87.0.tar.xz"; 193 + url = "${mirror}/stable/frameworks/5.89/kdeclarative-5.89.0.tar.xz"; 194 + sha256 = "18a4rcx60h5j44d79bhr2l46f3lhgnf2x0sb64dr7dcc0m5rmsay"; 195 + name = "kdeclarative-5.89.0.tar.xz"; 196 196 }; 197 197 }; 198 198 kded = { 199 - version = "5.87.0"; 199 + version = "5.89.0"; 200 200 src = fetchurl { 201 - url = "${mirror}/stable/frameworks/5.87/kded-5.87.0.tar.xz"; 202 - sha256 = "18dw1dd2lmwsh04yan1q72c5lzcgzm9kig1rqag3rg81h7pclsr5"; 203 - name = "kded-5.87.0.tar.xz"; 201 + url = "${mirror}/stable/frameworks/5.89/kded-5.89.0.tar.xz"; 202 + sha256 = "1rr3g7b60zlx8j7d7k2hlhhv2wa67lakfpyd1zgpy2y3k281hbfl"; 203 + name = "kded-5.89.0.tar.xz"; 204 204 }; 205 205 }; 206 206 kdelibs4support = { 207 - version = "5.87.0"; 207 + version = "5.89.0"; 208 208 src = fetchurl { 209 - url = "${mirror}/stable/frameworks/5.87/portingAids/kdelibs4support-5.87.0.tar.xz"; 210 - sha256 = "17kw76fd97rhdyna3dc7hsajvd8bv9l71qx0xaqn65pvzbndf2jf"; 211 - name = "kdelibs4support-5.87.0.tar.xz"; 209 + url = "${mirror}/stable/frameworks/5.89/portingAids/kdelibs4support-5.89.0.tar.xz"; 210 + sha256 = "1672f75f0wmdrqhx9vynzgflm3ssmngkpp1r5li53ppb11wg6sbr"; 211 + name = "kdelibs4support-5.89.0.tar.xz"; 212 212 }; 213 213 }; 214 214 kdesignerplugin = { 215 - version = "5.87.0"; 215 + version = "5.89.0"; 216 216 src = fetchurl { 217 - url = "${mirror}/stable/frameworks/5.87/portingAids/kdesignerplugin-5.87.0.tar.xz"; 218 - sha256 = "12rckqvg6w5cycvmxbrkvxi7ysfk6bqk3yi1ik4ryqh4x5dz2am9"; 219 - name = "kdesignerplugin-5.87.0.tar.xz"; 217 + url = "${mirror}/stable/frameworks/5.89/portingAids/kdesignerplugin-5.89.0.tar.xz"; 218 + sha256 = "0g8y51i70m8s7y829qyqnki57s8d4l3xdpdbn1p2rr1szglj8hvf"; 219 + name = "kdesignerplugin-5.89.0.tar.xz"; 220 220 }; 221 221 }; 222 222 kdesu = { 223 - version = "5.87.0"; 223 + version = "5.89.0"; 224 224 src = fetchurl { 225 - url = "${mirror}/stable/frameworks/5.87/kdesu-5.87.0.tar.xz"; 226 - sha256 = "05bb3hcb00j1f047q6ngbb8arrp4s03da880sky0slvvicm4ynkr"; 227 - name = "kdesu-5.87.0.tar.xz"; 225 + url = "${mirror}/stable/frameworks/5.89/kdesu-5.89.0.tar.xz"; 226 + sha256 = "0jmww11l6709cpfriwklhij5izsh948mki9grzzq3jijw8zs0mrx"; 227 + name = "kdesu-5.89.0.tar.xz"; 228 228 }; 229 229 }; 230 230 kdewebkit = { 231 - version = "5.87.0"; 231 + version = "5.89.0"; 232 232 src = fetchurl { 233 - url = "${mirror}/stable/frameworks/5.87/portingAids/kdewebkit-5.87.0.tar.xz"; 234 - sha256 = "1a578sa6nfp2vycrrhc37idwg47nrrfhv6dp8rfb2gj4vf67bzcv"; 235 - name = "kdewebkit-5.87.0.tar.xz"; 233 + url = "${mirror}/stable/frameworks/5.89/portingAids/kdewebkit-5.89.0.tar.xz"; 234 + sha256 = "0xwd346z928yk4iwykgashc36m2xqnwn49jix5jbk1w57dbia2da"; 235 + name = "kdewebkit-5.89.0.tar.xz"; 236 236 }; 237 237 }; 238 238 kdnssd = { 239 - version = "5.87.0"; 239 + version = "5.89.0"; 240 240 src = fetchurl { 241 - url = "${mirror}/stable/frameworks/5.87/kdnssd-5.87.0.tar.xz"; 242 - sha256 = "1rs8i75qm1vazy8cnvcv3sha6faf27bav491z8brcs8fiab96dnw"; 243 - name = "kdnssd-5.87.0.tar.xz"; 241 + url = "${mirror}/stable/frameworks/5.89/kdnssd-5.89.0.tar.xz"; 242 + sha256 = "0v72g137l8kl2xapfrcrw8w6zmn94h08hvwdggzr9fvgswzdbvsh"; 243 + name = "kdnssd-5.89.0.tar.xz"; 244 244 }; 245 245 }; 246 246 kdoctools = { 247 - version = "5.87.0"; 247 + version = "5.89.0"; 248 248 src = fetchurl { 249 - url = "${mirror}/stable/frameworks/5.87/kdoctools-5.87.0.tar.xz"; 250 - sha256 = "0md5wiv5mv4q63g9ads8d0xg8qxlh91dqgyg66n8abcg56qq83ps"; 251 - name = "kdoctools-5.87.0.tar.xz"; 249 + url = "${mirror}/stable/frameworks/5.89/kdoctools-5.89.0.tar.xz"; 250 + sha256 = "1x8q45y2sgi3d9j79qcx02z2939j52mp1jrs3rjqq42xxvvrlcg1"; 251 + name = "kdoctools-5.89.0.tar.xz"; 252 252 }; 253 253 }; 254 254 kemoticons = { 255 - version = "5.87.0"; 255 + version = "5.89.0"; 256 256 src = fetchurl { 257 - url = "${mirror}/stable/frameworks/5.87/kemoticons-5.87.0.tar.xz"; 258 - sha256 = "0iah6ws0x9xnm900rii2k82gf155cbwlnxbz2rxbybp1dmbjbz5y"; 259 - name = "kemoticons-5.87.0.tar.xz"; 257 + url = "${mirror}/stable/frameworks/5.89/kemoticons-5.89.0.tar.xz"; 258 + sha256 = "0mcyq20ca6x73jhwwhhwq8jzqpadnazjy5y9dyfa2wz8ijbnjqzw"; 259 + name = "kemoticons-5.89.0.tar.xz"; 260 260 }; 261 261 }; 262 262 kfilemetadata = { 263 - version = "5.87.0"; 263 + version = "5.89.0"; 264 264 src = fetchurl { 265 - url = "${mirror}/stable/frameworks/5.87/kfilemetadata-5.87.0.tar.xz"; 266 - sha256 = "1nh4gzprc588q8zfz94j76x3vvf77cnsc30xrs07316726mksw2i"; 267 - name = "kfilemetadata-5.87.0.tar.xz"; 265 + url = "${mirror}/stable/frameworks/5.89/kfilemetadata-5.89.0.tar.xz"; 266 + sha256 = "04abysdijmpdd05grihawpbw8f9h3fhlv3y7wjz76kl66gyqg035"; 267 + name = "kfilemetadata-5.89.0.tar.xz"; 268 268 }; 269 269 }; 270 270 kglobalaccel = { 271 - version = "5.87.0"; 271 + version = "5.89.0"; 272 272 src = fetchurl { 273 - url = "${mirror}/stable/frameworks/5.87/kglobalaccel-5.87.0.tar.xz"; 274 - sha256 = "1wk6mxq6ylkvalcwbrkmc0whvkbllkfwnsf4hxz86cnixqb7ybjh"; 275 - name = "kglobalaccel-5.87.0.tar.xz"; 273 + url = "${mirror}/stable/frameworks/5.89/kglobalaccel-5.89.0.tar.xz"; 274 + sha256 = "0jxxlhmwsgrx1p6w1al9c11bglxn5im181wqih7ds5h2naa7b8kj"; 275 + name = "kglobalaccel-5.89.0.tar.xz"; 276 276 }; 277 277 }; 278 278 kguiaddons = { 279 - version = "5.87.0"; 279 + version = "5.89.0"; 280 280 src = fetchurl { 281 - url = "${mirror}/stable/frameworks/5.87/kguiaddons-5.87.0.tar.xz"; 282 - sha256 = "1k88x22f8db90x28fryg6cp239sfs0zrjk18l72v09bg3zc7y1lh"; 283 - name = "kguiaddons-5.87.0.tar.xz"; 281 + url = "${mirror}/stable/frameworks/5.89/kguiaddons-5.89.0.tar.xz"; 282 + sha256 = "17mxkk4w4q6bkqblkdinw2b0jdfxhk7xkfy5hw730gjm6is6p861"; 283 + name = "kguiaddons-5.89.0.tar.xz"; 284 284 }; 285 285 }; 286 286 kholidays = { 287 - version = "5.87.0"; 287 + version = "5.89.0"; 288 288 src = fetchurl { 289 - url = "${mirror}/stable/frameworks/5.87/kholidays-5.87.0.tar.xz"; 290 - sha256 = "1ca51vkmwwrl1fvs2fw16nvpmag2licywwmwjiaapkk8hv6v1gzm"; 291 - name = "kholidays-5.87.0.tar.xz"; 289 + url = "${mirror}/stable/frameworks/5.89/kholidays-5.89.0.tar.xz"; 290 + sha256 = "0ry0n73dkjxv7ani753mh8ymy4yblhj841ca5y5kci8wr9h6358w"; 291 + name = "kholidays-5.89.0.tar.xz"; 292 292 }; 293 293 }; 294 294 khtml = { 295 - version = "5.87.0"; 295 + version = "5.89.0"; 296 296 src = fetchurl { 297 - url = "${mirror}/stable/frameworks/5.87/portingAids/khtml-5.87.0.tar.xz"; 298 - sha256 = "1jxpznzw4r8ikx0g5n1fg0qrkllph5cwih4lcvwjn6cqx2ypgn6f"; 299 - name = "khtml-5.87.0.tar.xz"; 297 + url = "${mirror}/stable/frameworks/5.89/portingAids/khtml-5.89.0.tar.xz"; 298 + sha256 = "072pawwp62mx5shh8x4mcpr8h6a24qr82zyyiricz4jba0r7z3yr"; 299 + name = "khtml-5.89.0.tar.xz"; 300 300 }; 301 301 }; 302 302 ki18n = { 303 - version = "5.87.0"; 303 + version = "5.89.0"; 304 304 src = fetchurl { 305 - url = "${mirror}/stable/frameworks/5.87/ki18n-5.87.0.tar.xz"; 306 - sha256 = "0395khchbhp7x4fgb2fwxlpx0mhdvbkgd0v7kwgmm0n4bkn7jphi"; 307 - name = "ki18n-5.87.0.tar.xz"; 305 + url = "${mirror}/stable/frameworks/5.89/ki18n-5.89.0.tar.xz"; 306 + sha256 = "1zlq0ywd8hnaniwdv3vd76xmv91cdn6pqs6k9y6dz3fayl15p0g6"; 307 + name = "ki18n-5.89.0.tar.xz"; 308 308 }; 309 309 }; 310 310 kiconthemes = { 311 - version = "5.87.0"; 311 + version = "5.89.0"; 312 312 src = fetchurl { 313 - url = "${mirror}/stable/frameworks/5.87/kiconthemes-5.87.0.tar.xz"; 314 - sha256 = "04chb3y3d6hxwy9f1xdifvl2mbcd8xbh7fv6x5m5vnb1cviwc6j7"; 315 - name = "kiconthemes-5.87.0.tar.xz"; 313 + url = "${mirror}/stable/frameworks/5.89/kiconthemes-5.89.0.tar.xz"; 314 + sha256 = "1hv8blvvg12agjynl0yvvsl8dfsyk2aa9clmq60igcs5lm4jpvaa"; 315 + name = "kiconthemes-5.89.0.tar.xz"; 316 316 }; 317 317 }; 318 318 kidletime = { 319 - version = "5.87.0"; 319 + version = "5.89.0"; 320 320 src = fetchurl { 321 - url = "${mirror}/stable/frameworks/5.87/kidletime-5.87.0.tar.xz"; 322 - sha256 = "1m0p602i9c4dmkll3g8flmzq23ywv20rxnvzc1c8bf5kqn6321qp"; 323 - name = "kidletime-5.87.0.tar.xz"; 321 + url = "${mirror}/stable/frameworks/5.89/kidletime-5.89.0.tar.xz"; 322 + sha256 = "0547yj8yn9nly3bkq3in38ljhwbg0bvj0wp3yxp2dl05wpyvzqfz"; 323 + name = "kidletime-5.89.0.tar.xz"; 324 324 }; 325 325 }; 326 326 kimageformats = { 327 - version = "5.87.0"; 327 + version = "5.89.0"; 328 328 src = fetchurl { 329 - url = "${mirror}/stable/frameworks/5.87/kimageformats-5.87.0.tar.xz"; 330 - sha256 = "0c4qq5j6hzz90kh7mmirafglr9l5wck3r67ij436gpmq69ignvmg"; 331 - name = "kimageformats-5.87.0.tar.xz"; 329 + url = "${mirror}/stable/frameworks/5.89/kimageformats-5.89.0.tar.xz"; 330 + sha256 = "1m3fl14lzsfl0fam38nnalapc1xhpryf1ibvcm7bgh4g1cm1bvnw"; 331 + name = "kimageformats-5.89.0.tar.xz"; 332 332 }; 333 333 }; 334 334 kinit = { 335 - version = "5.87.0"; 335 + version = "5.89.0"; 336 336 src = fetchurl { 337 - url = "${mirror}/stable/frameworks/5.87/kinit-5.87.0.tar.xz"; 338 - sha256 = "0435syvhisagbq82qcbims5adq88ivv793gvb3kx03hxhyyx81xs"; 339 - name = "kinit-5.87.0.tar.xz"; 337 + url = "${mirror}/stable/frameworks/5.89/kinit-5.89.0.tar.xz"; 338 + sha256 = "1llaqz7yv011k4g1fvy1rzlff8bdgvqwqvh3s3nrqahwq2gx2rr9"; 339 + name = "kinit-5.89.0.tar.xz"; 340 340 }; 341 341 }; 342 342 kio = { 343 - version = "5.87.0"; 343 + version = "5.89.0"; 344 344 src = fetchurl { 345 - url = "${mirror}/stable/frameworks/5.87/kio-5.87.0.tar.xz"; 346 - sha256 = "0sxwrqvfkqm679v99lx50vd2p4bx10pdzrjhxg0njfwww2fxa7mr"; 347 - name = "kio-5.87.0.tar.xz"; 345 + url = "${mirror}/stable/frameworks/5.89/kio-5.89.0.tar.xz"; 346 + sha256 = "1ka8s6cj7ms74w4xj6x91hx1ijlh883x3ibjwmbhva6mbzk1z0nx"; 347 + name = "kio-5.89.0.tar.xz"; 348 348 }; 349 349 }; 350 350 kirigami2 = { 351 - version = "5.87.0"; 351 + version = "5.89.0"; 352 352 src = fetchurl { 353 - url = "${mirror}/stable/frameworks/5.87/kirigami2-5.87.0.tar.xz"; 354 - sha256 = "1wvj0nnb1dd1k12arlmlx99gjhk7v2jpw5sgyjka6kkps31nr1zi"; 355 - name = "kirigami2-5.87.0.tar.xz"; 353 + url = "${mirror}/stable/frameworks/5.89/kirigami2-5.89.0.tar.xz"; 354 + sha256 = "1jn5c0lhh7hcp81278kagw0r96nri80x9vrg51jg7cs42h7pfp98"; 355 + name = "kirigami2-5.89.0.tar.xz"; 356 356 }; 357 357 }; 358 358 kitemmodels = { 359 - version = "5.87.0"; 359 + version = "5.89.0"; 360 360 src = fetchurl { 361 - url = "${mirror}/stable/frameworks/5.87/kitemmodels-5.87.0.tar.xz"; 362 - sha256 = "1qx78pfbnwsq8nn6fa8qjjc0zn4nwh4dqs0ifb9iaam33cl3kw92"; 363 - name = "kitemmodels-5.87.0.tar.xz"; 361 + url = "${mirror}/stable/frameworks/5.89/kitemmodels-5.89.0.tar.xz"; 362 + sha256 = "10bag80kjz4x22097z9w1liw73kkirk72266vr0qplyr00jwqi33"; 363 + name = "kitemmodels-5.89.0.tar.xz"; 364 364 }; 365 365 }; 366 366 kitemviews = { 367 - version = "5.87.0"; 367 + version = "5.89.0"; 368 368 src = fetchurl { 369 - url = "${mirror}/stable/frameworks/5.87/kitemviews-5.87.0.tar.xz"; 370 - sha256 = "1nrg92nyc39fl1n7k38pa4k8dahwl76wadv0v0ixyh1zx0x4clbg"; 371 - name = "kitemviews-5.87.0.tar.xz"; 369 + url = "${mirror}/stable/frameworks/5.89/kitemviews-5.89.0.tar.xz"; 370 + sha256 = "180n41gkv6vgmljcqh2sg5922glq59z56zq7y299vwnkgix9aqns"; 371 + name = "kitemviews-5.89.0.tar.xz"; 372 372 }; 373 373 }; 374 374 kjobwidgets = { 375 - version = "5.87.0"; 375 + version = "5.89.0"; 376 376 src = fetchurl { 377 - url = "${mirror}/stable/frameworks/5.87/kjobwidgets-5.87.0.tar.xz"; 378 - sha256 = "0s0g4dygc6c9p5w7vdk7bninizsdhj5xan351x15b4k0ddgq8sz5"; 379 - name = "kjobwidgets-5.87.0.tar.xz"; 377 + url = "${mirror}/stable/frameworks/5.89/kjobwidgets-5.89.0.tar.xz"; 378 + sha256 = "02ysdzn25a9lms70fawnz3h5vdxy9p528qmbxslsnpz29r5h2wb8"; 379 + name = "kjobwidgets-5.89.0.tar.xz"; 380 380 }; 381 381 }; 382 382 kjs = { 383 - version = "5.87.0"; 383 + version = "5.89.0"; 384 384 src = fetchurl { 385 - url = "${mirror}/stable/frameworks/5.87/portingAids/kjs-5.87.0.tar.xz"; 386 - sha256 = "1ihwhjgk3k2nmyfg2brdjriymm2qi5dgmh47phmb9b2gvzqx6yg8"; 387 - name = "kjs-5.87.0.tar.xz"; 385 + url = "${mirror}/stable/frameworks/5.89/portingAids/kjs-5.89.0.tar.xz"; 386 + sha256 = "0yxk4qwl4cxv3kklvla5q3xx2vgj4lwp4pb3bplkkbighm01naih"; 387 + name = "kjs-5.89.0.tar.xz"; 388 388 }; 389 389 }; 390 390 kjsembed = { 391 - version = "5.87.0"; 391 + version = "5.89.0"; 392 392 src = fetchurl { 393 - url = "${mirror}/stable/frameworks/5.87/portingAids/kjsembed-5.87.0.tar.xz"; 394 - sha256 = "0j8b637k8vx2qhl3zf6744ywykv6hnfcs2xgsq0i8w5ji0a2jigv"; 395 - name = "kjsembed-5.87.0.tar.xz"; 393 + url = "${mirror}/stable/frameworks/5.89/portingAids/kjsembed-5.89.0.tar.xz"; 394 + sha256 = "08ajxgh1lfbx8nf4vsljzcwkfjih8fyqp9nr2xbv2a9dbv51x1sf"; 395 + name = "kjsembed-5.89.0.tar.xz"; 396 396 }; 397 397 }; 398 398 kmediaplayer = { 399 - version = "5.87.0"; 399 + version = "5.89.0"; 400 400 src = fetchurl { 401 - url = "${mirror}/stable/frameworks/5.87/portingAids/kmediaplayer-5.87.0.tar.xz"; 402 - sha256 = "0mrmb7q4wmj8v9ipb9vh4c8scl1mr0frz3yvpc96dyimvb87pp08"; 403 - name = "kmediaplayer-5.87.0.tar.xz"; 401 + url = "${mirror}/stable/frameworks/5.89/portingAids/kmediaplayer-5.89.0.tar.xz"; 402 + sha256 = "0hf44hij1bqcfvxhs7ka00habgh3lc39xajnblpm9br8xybgkaz0"; 403 + name = "kmediaplayer-5.89.0.tar.xz"; 404 404 }; 405 405 }; 406 406 knewstuff = { 407 - version = "5.87.0"; 407 + version = "5.89.0"; 408 408 src = fetchurl { 409 - url = "${mirror}/stable/frameworks/5.87/knewstuff-5.87.0.tar.xz"; 410 - sha256 = "0xnilr3r3l36g3j7a2nf2kqmill22ibrr6qfniqcywmcqpnq7x4q"; 411 - name = "knewstuff-5.87.0.tar.xz"; 409 + url = "${mirror}/stable/frameworks/5.89/knewstuff-5.89.0.tar.xz"; 410 + sha256 = "1qw3lm4vjxal7r314y0zqj59fmzj4b9z2dsd10r3mxpiwjra0s45"; 411 + name = "knewstuff-5.89.0.tar.xz"; 412 412 }; 413 413 }; 414 414 knotifications = { 415 - version = "5.87.0"; 415 + version = "5.89.0"; 416 416 src = fetchurl { 417 - url = "${mirror}/stable/frameworks/5.87/knotifications-5.87.0.tar.xz"; 418 - sha256 = "03zraci1lnzz3d5i97i2m2h4z8xp4fmm28aizk3xipqkgy3q61c3"; 419 - name = "knotifications-5.87.0.tar.xz"; 417 + url = "${mirror}/stable/frameworks/5.89/knotifications-5.89.0.tar.xz"; 418 + sha256 = "1jghpawqp0zy1scs2l0dqz2sqv4xd65xiavabpjwhycx5pxpvbhs"; 419 + name = "knotifications-5.89.0.tar.xz"; 420 420 }; 421 421 }; 422 422 knotifyconfig = { 423 - version = "5.87.0"; 423 + version = "5.89.0"; 424 424 src = fetchurl { 425 - url = "${mirror}/stable/frameworks/5.87/knotifyconfig-5.87.0.tar.xz"; 426 - sha256 = "0jd5yzjg625ixm3fbmpafvg6wc69cvppqr0z0y0wzkbzbd930ggh"; 427 - name = "knotifyconfig-5.87.0.tar.xz"; 425 + url = "${mirror}/stable/frameworks/5.89/knotifyconfig-5.89.0.tar.xz"; 426 + sha256 = "041qnnxhsi35xygyzlppvpghfd8fxraas824dz7rfjiym2zid7jh"; 427 + name = "knotifyconfig-5.89.0.tar.xz"; 428 428 }; 429 429 }; 430 430 kpackage = { 431 - version = "5.87.0"; 431 + version = "5.89.0"; 432 432 src = fetchurl { 433 - url = "${mirror}/stable/frameworks/5.87/kpackage-5.87.0.tar.xz"; 434 - sha256 = "1dmhj1byxmk407mcz62ydrzzjab6c4da22blkm4f5das79blkdsy"; 435 - name = "kpackage-5.87.0.tar.xz"; 433 + url = "${mirror}/stable/frameworks/5.89/kpackage-5.89.0.tar.xz"; 434 + sha256 = "198n0gr2v9r11ml2vkx9xazxf3rbw3qgc44l7x134rpn1jv9b0s3"; 435 + name = "kpackage-5.89.0.tar.xz"; 436 436 }; 437 437 }; 438 438 kparts = { 439 - version = "5.87.0"; 439 + version = "5.89.0"; 440 440 src = fetchurl { 441 - url = "${mirror}/stable/frameworks/5.87/kparts-5.87.0.tar.xz"; 442 - sha256 = "0jmjyvrskhvnp0w1d9l9k5azwf1ppda97qp2801179x77bgdfbgi"; 443 - name = "kparts-5.87.0.tar.xz"; 441 + url = "${mirror}/stable/frameworks/5.89/kparts-5.89.0.tar.xz"; 442 + sha256 = "0vdz1sxqkx2nynlsywyp8j2ciq226cs40c3m70lqs0j5w283i5ra"; 443 + name = "kparts-5.89.0.tar.xz"; 444 444 }; 445 445 }; 446 446 kpeople = { 447 - version = "5.87.0"; 447 + version = "5.89.0"; 448 448 src = fetchurl { 449 - url = "${mirror}/stable/frameworks/5.87/kpeople-5.87.0.tar.xz"; 450 - sha256 = "002qnfxyrzv9jr1z86ih7v7bprbpfx311s646rbmjc6c9wqa5a1a"; 451 - name = "kpeople-5.87.0.tar.xz"; 449 + url = "${mirror}/stable/frameworks/5.89/kpeople-5.89.0.tar.xz"; 450 + sha256 = "12bry15lr7xpgmfgpw1mdd805n1af6050vaa3pk4mbf0vc6clg5y"; 451 + name = "kpeople-5.89.0.tar.xz"; 452 452 }; 453 453 }; 454 454 kplotting = { 455 - version = "5.87.0"; 455 + version = "5.89.0"; 456 456 src = fetchurl { 457 - url = "${mirror}/stable/frameworks/5.87/kplotting-5.87.0.tar.xz"; 458 - sha256 = "1np6rqrxldnhz82ak291kr87zqccmp9a3v4gvxl0xsm2qnpzxlxz"; 459 - name = "kplotting-5.87.0.tar.xz"; 457 + url = "${mirror}/stable/frameworks/5.89/kplotting-5.89.0.tar.xz"; 458 + sha256 = "1asqzv5jl2nb9ml5vwlpcsi9f2vw7y8rcihlvkf569s7kxsrswns"; 459 + name = "kplotting-5.89.0.tar.xz"; 460 460 }; 461 461 }; 462 462 kpty = { 463 - version = "5.87.0"; 463 + version = "5.89.0"; 464 464 src = fetchurl { 465 - url = "${mirror}/stable/frameworks/5.87/kpty-5.87.0.tar.xz"; 466 - sha256 = "1qd2lj53m0gbpmfilwrcz5v2m735daqlxj2qv1j5m28b3bjwz2li"; 467 - name = "kpty-5.87.0.tar.xz"; 465 + url = "${mirror}/stable/frameworks/5.89/kpty-5.89.0.tar.xz"; 466 + sha256 = "0053sx30d1w2m03wqv3mhkjrxdf7ps1xj8h74fv0a0clf9ab0i4x"; 467 + name = "kpty-5.89.0.tar.xz"; 468 468 }; 469 469 }; 470 470 kquickcharts = { 471 - version = "5.87.0"; 471 + version = "5.89.0"; 472 472 src = fetchurl { 473 - url = "${mirror}/stable/frameworks/5.87/kquickcharts-5.87.0.tar.xz"; 474 - sha256 = "1dx4ilwih9pfimfn5l3fgjf0z1k75p6sb7y03akgnl4i9w2aycv8"; 475 - name = "kquickcharts-5.87.0.tar.xz"; 473 + url = "${mirror}/stable/frameworks/5.89/kquickcharts-5.89.0.tar.xz"; 474 + sha256 = "05syj1162j1zhg9wws81kk9z2ri3jvlvnq95l3gv29zf582j7h91"; 475 + name = "kquickcharts-5.89.0.tar.xz"; 476 476 }; 477 477 }; 478 478 kross = { 479 - version = "5.87.0"; 479 + version = "5.89.0"; 480 480 src = fetchurl { 481 - url = "${mirror}/stable/frameworks/5.87/portingAids/kross-5.87.0.tar.xz"; 482 - sha256 = "1nnyl67b43064y5gvj7ccvzz5481vbaycjhxxzgf4iaj0qm2vpfh"; 483 - name = "kross-5.87.0.tar.xz"; 481 + url = "${mirror}/stable/frameworks/5.89/portingAids/kross-5.89.0.tar.xz"; 482 + sha256 = "0j88ikhxypyy4yickcz3hcdfaj8g7qjinf5va7g5ghzjar7q9x4y"; 483 + name = "kross-5.89.0.tar.xz"; 484 484 }; 485 485 }; 486 486 krunner = { 487 - version = "5.87.0"; 487 + version = "5.89.0"; 488 488 src = fetchurl { 489 - url = "${mirror}/stable/frameworks/5.87/krunner-5.87.0.tar.xz"; 490 - sha256 = "0ygqfaif9xp30ahrld85xzsgmfmy51560hl8ym8shggwar20kb1s"; 491 - name = "krunner-5.87.0.tar.xz"; 489 + url = "${mirror}/stable/frameworks/5.89/krunner-5.89.0.tar.xz"; 490 + sha256 = "11wzn33k6gwfiwc6idhsr8fj441c82bbzz8bx8i228ymvnqrdcqx"; 491 + name = "krunner-5.89.0.tar.xz"; 492 492 }; 493 493 }; 494 494 kservice = { 495 - version = "5.87.0"; 495 + version = "5.89.0"; 496 496 src = fetchurl { 497 - url = "${mirror}/stable/frameworks/5.87/kservice-5.87.0.tar.xz"; 498 - sha256 = "0a3fcqhwbzqwy9wy1787p8hr1s1jfmz3y1dk2spiifwk9l668mxn"; 499 - name = "kservice-5.87.0.tar.xz"; 497 + url = "${mirror}/stable/frameworks/5.89/kservice-5.89.0.tar.xz"; 498 + sha256 = "0srbjazz302w7zsxh5zcq5zhgz8ad09zxld1rpfkyxg5z820lrq5"; 499 + name = "kservice-5.89.0.tar.xz"; 500 500 }; 501 501 }; 502 502 ktexteditor = { 503 - version = "5.87.0"; 503 + version = "5.89.0"; 504 504 src = fetchurl { 505 - url = "${mirror}/stable/frameworks/5.87/ktexteditor-5.87.0.tar.xz"; 506 - sha256 = "13dnwf2zvp3k6xb0ry5a11gaf2j7x2swhq8d689w4gf3awpma7rg"; 507 - name = "ktexteditor-5.87.0.tar.xz"; 505 + url = "${mirror}/stable/frameworks/5.89/ktexteditor-5.89.0.tar.xz"; 506 + sha256 = "02bg84dmqadjlwfmccviz0d0wj0qf9fy2i9igq4mv150hqy93bb7"; 507 + name = "ktexteditor-5.89.0.tar.xz"; 508 508 }; 509 509 }; 510 510 ktextwidgets = { 511 - version = "5.87.0"; 511 + version = "5.89.0"; 512 512 src = fetchurl { 513 - url = "${mirror}/stable/frameworks/5.87/ktextwidgets-5.87.0.tar.xz"; 514 - sha256 = "04gmqw8wjf6r8lpsjcsg0925a6b6hnckzy5i9ykvian1kq2d79fr"; 515 - name = "ktextwidgets-5.87.0.tar.xz"; 513 + url = "${mirror}/stable/frameworks/5.89/ktextwidgets-5.89.0.tar.xz"; 514 + sha256 = "0yz2y111hjs1zq1f8887sn334gpf0sv4lrfq3i5dj0x3vcjgmccl"; 515 + name = "ktextwidgets-5.89.0.tar.xz"; 516 516 }; 517 517 }; 518 518 kunitconversion = { 519 - version = "5.87.0"; 519 + version = "5.89.0"; 520 520 src = fetchurl { 521 - url = "${mirror}/stable/frameworks/5.87/kunitconversion-5.87.0.tar.xz"; 522 - sha256 = "1b5yvs0inr0kj7i4j5yavlxz6n8h3d2wbgw39r2harzxd4xjzz4h"; 523 - name = "kunitconversion-5.87.0.tar.xz"; 521 + url = "${mirror}/stable/frameworks/5.89/kunitconversion-5.89.0.tar.xz"; 522 + sha256 = "1bmnlcsi8qbba38ywr3f4vd7kddiwzmrnn9n69c6626jg4aj3g1q"; 523 + name = "kunitconversion-5.89.0.tar.xz"; 524 524 }; 525 525 }; 526 526 kwallet = { 527 - version = "5.87.0"; 527 + version = "5.89.0"; 528 528 src = fetchurl { 529 - url = "${mirror}/stable/frameworks/5.87/kwallet-5.87.0.tar.xz"; 530 - sha256 = "1a2qiwhf6hwh6qs9x84hz1ryaaqqm8bpg9v29kjy6cq9krn3mwar"; 531 - name = "kwallet-5.87.0.tar.xz"; 529 + url = "${mirror}/stable/frameworks/5.89/kwallet-5.89.0.tar.xz"; 530 + sha256 = "1yy34asal5jni78jxywddh3hjpzsr1myck0f89h78a2zc28xnd1h"; 531 + name = "kwallet-5.89.0.tar.xz"; 532 532 }; 533 533 }; 534 534 kwayland = { 535 - version = "5.87.0"; 535 + version = "5.89.0"; 536 536 src = fetchurl { 537 - url = "${mirror}/stable/frameworks/5.87/kwayland-5.87.0.tar.xz"; 538 - sha256 = "03lrlprvc3bj43f0l0dirg93l7amzlcx4ajaqh9h54g030qanfmc"; 539 - name = "kwayland-5.87.0.tar.xz"; 537 + url = "${mirror}/stable/frameworks/5.89/kwayland-5.89.0.tar.xz"; 538 + sha256 = "1sq4zy9bifbqlg8s3af2vwxyyg84kmxfyvdi479cn46vdavylp2j"; 539 + name = "kwayland-5.89.0.tar.xz"; 540 540 }; 541 541 }; 542 542 kwidgetsaddons = { 543 - version = "5.87.0"; 543 + version = "5.89.0"; 544 544 src = fetchurl { 545 - url = "${mirror}/stable/frameworks/5.87/kwidgetsaddons-5.87.0.tar.xz"; 546 - sha256 = "00gv9lxiah6yg8lxjd0md0zyvhi7zc9s6fg14jfh0cb1i0zrn49b"; 547 - name = "kwidgetsaddons-5.87.0.tar.xz"; 545 + url = "${mirror}/stable/frameworks/5.89/kwidgetsaddons-5.89.0.tar.xz"; 546 + sha256 = "1rs30ialmrhwvxah6rvzbavjnp4ziaaf0j0jcm63kyqbb5nywgmk"; 547 + name = "kwidgetsaddons-5.89.0.tar.xz"; 548 548 }; 549 549 }; 550 550 kwindowsystem = { 551 - version = "5.87.0"; 551 + version = "5.89.0"; 552 552 src = fetchurl { 553 - url = "${mirror}/stable/frameworks/5.87/kwindowsystem-5.87.0.tar.xz"; 554 - sha256 = "0rxmpawp5g46xp5irk1gcdq6n2y9r9vlx1dm5gpqhcfh7gr64ja2"; 555 - name = "kwindowsystem-5.87.0.tar.xz"; 553 + url = "${mirror}/stable/frameworks/5.89/kwindowsystem-5.89.0.tar.xz"; 554 + sha256 = "1h0v72mb7s36ggw8nv70rpk16q0cflbhgvqwzlfqvh68kbs35a4q"; 555 + name = "kwindowsystem-5.89.0.tar.xz"; 556 556 }; 557 557 }; 558 558 kxmlgui = { 559 - version = "5.87.0"; 559 + version = "5.89.0"; 560 560 src = fetchurl { 561 - url = "${mirror}/stable/frameworks/5.87/kxmlgui-5.87.0.tar.xz"; 562 - sha256 = "1wnss0rjspgih3m2a3faflamf7n681k8sf8pzrcsrvvrzq95n65i"; 563 - name = "kxmlgui-5.87.0.tar.xz"; 561 + url = "${mirror}/stable/frameworks/5.89/kxmlgui-5.89.0.tar.xz"; 562 + sha256 = "0mjfg0hd9rswz3jpmc8xjw5jqgip58cx3bavijdlnp7pla7r7j56"; 563 + name = "kxmlgui-5.89.0.tar.xz"; 564 564 }; 565 565 }; 566 566 kxmlrpcclient = { 567 - version = "5.87.0"; 567 + version = "5.89.0"; 568 568 src = fetchurl { 569 - url = "${mirror}/stable/frameworks/5.87/portingAids/kxmlrpcclient-5.87.0.tar.xz"; 570 - sha256 = "03l5zs4l52f3w01hsk00r8hmnccyy3iw2vhiclvpp6dksmb8yad7"; 571 - name = "kxmlrpcclient-5.87.0.tar.xz"; 569 + url = "${mirror}/stable/frameworks/5.89/portingAids/kxmlrpcclient-5.89.0.tar.xz"; 570 + sha256 = "0ri3z76r1v1vfp3j0mrpvan6jzmp57a5g4vwshv4zgyvr484qhlp"; 571 + name = "kxmlrpcclient-5.89.0.tar.xz"; 572 572 }; 573 573 }; 574 574 modemmanager-qt = { 575 - version = "5.87.0"; 575 + version = "5.89.0"; 576 576 src = fetchurl { 577 - url = "${mirror}/stable/frameworks/5.87/modemmanager-qt-5.87.0.tar.xz"; 578 - sha256 = "1ag98r2hhd93gki3dvlz48sgqc2805b0p0w4m0az0czvxnclg0rk"; 579 - name = "modemmanager-qt-5.87.0.tar.xz"; 577 + url = "${mirror}/stable/frameworks/5.89/modemmanager-qt-5.89.0.tar.xz"; 578 + sha256 = "1sam8cr638h9gyp60dhgmrpddy6y7waf9xaij46kvc0xdan501fi"; 579 + name = "modemmanager-qt-5.89.0.tar.xz"; 580 580 }; 581 581 }; 582 582 networkmanager-qt = { 583 - version = "5.87.0"; 583 + version = "5.89.0"; 584 584 src = fetchurl { 585 - url = "${mirror}/stable/frameworks/5.87/networkmanager-qt-5.87.0.tar.xz"; 586 - sha256 = "0a4sxcm88mfry1sjc4r0qx5aqmbb61ghmd912wqk19nx18qgkm5y"; 587 - name = "networkmanager-qt-5.87.0.tar.xz"; 585 + url = "${mirror}/stable/frameworks/5.89/networkmanager-qt-5.89.0.tar.xz"; 586 + sha256 = "1x1pxsf4dm8h0bj6my9rg2j95nnn81919fv9apvqglf6i3xd2pq4"; 587 + name = "networkmanager-qt-5.89.0.tar.xz"; 588 588 }; 589 589 }; 590 590 oxygen-icons5 = { 591 - version = "5.87.0"; 591 + version = "5.89.0"; 592 592 src = fetchurl { 593 - url = "${mirror}/stable/frameworks/5.87/oxygen-icons5-5.87.0.tar.xz"; 594 - sha256 = "0mpxv2m6nkl1cp3p0xgpm916k2ykvkyk0x0ka4azs8iyy0anc36m"; 595 - name = "oxygen-icons5-5.87.0.tar.xz"; 593 + url = "${mirror}/stable/frameworks/5.89/oxygen-icons5-5.89.0.tar.xz"; 594 + sha256 = "1gmx2k5hqfa0lap2y9sv7csi09s8nl3rvab5nz731wr3s9m2frpr"; 595 + name = "oxygen-icons5-5.89.0.tar.xz"; 596 596 }; 597 597 }; 598 598 plasma-framework = { 599 - version = "5.87.0"; 599 + version = "5.89.0"; 600 600 src = fetchurl { 601 - url = "${mirror}/stable/frameworks/5.87/plasma-framework-5.87.0.tar.xz"; 602 - sha256 = "1y7w4b7jb8rnkfan97yln5w9w68skrmif4wqqba4f9mj6y2dcajb"; 603 - name = "plasma-framework-5.87.0.tar.xz"; 601 + url = "${mirror}/stable/frameworks/5.89/plasma-framework-5.89.0.tar.xz"; 602 + sha256 = "0wx6a3agplfmf2p86ljhgd3pjx7f15g1hp660i62zw84zvpsh2dp"; 603 + name = "plasma-framework-5.89.0.tar.xz"; 604 604 }; 605 605 }; 606 606 prison = { 607 - version = "5.87.0"; 607 + version = "5.89.0"; 608 608 src = fetchurl { 609 - url = "${mirror}/stable/frameworks/5.87/prison-5.87.0.tar.xz"; 610 - sha256 = "0vb8ny4za37v4nmcy9qw8zz5zcr46clci9lg22s84f26l4vlcs87"; 611 - name = "prison-5.87.0.tar.xz"; 609 + url = "${mirror}/stable/frameworks/5.89/prison-5.89.0.tar.xz"; 610 + sha256 = "0jd3qfj5k4fxqpbkjpr81mvni9kqppcq0gn5yyc9nys4wk4nr934"; 611 + name = "prison-5.89.0.tar.xz"; 612 612 }; 613 613 }; 614 614 purpose = { 615 - version = "5.87.0"; 615 + version = "5.89.0"; 616 616 src = fetchurl { 617 - url = "${mirror}/stable/frameworks/5.87/purpose-5.87.0.tar.xz"; 618 - sha256 = "0ddpm2hm3x1p25hkjzff4vs906n5bkkk4j3myh0gvyqn8accdhsd"; 619 - name = "purpose-5.87.0.tar.xz"; 617 + url = "${mirror}/stable/frameworks/5.89/purpose-5.89.0.tar.xz"; 618 + sha256 = "1sfhwzw1ghr1yg4fkrz0r2myd5569mscsr98pnc3plr78ppq9lwy"; 619 + name = "purpose-5.89.0.tar.xz"; 620 620 }; 621 621 }; 622 622 qqc2-desktop-style = { 623 - version = "5.87.0"; 623 + version = "5.89.0"; 624 624 src = fetchurl { 625 - url = "${mirror}/stable/frameworks/5.87/qqc2-desktop-style-5.87.0.tar.xz"; 626 - sha256 = "02i4rg5gf7i63lm4f0afm9n3lgzvklpbg43d0zcsdwzph386baq7"; 627 - name = "qqc2-desktop-style-5.87.0.tar.xz"; 625 + url = "${mirror}/stable/frameworks/5.89/qqc2-desktop-style-5.89.0.tar.xz"; 626 + sha256 = "1q2y0hb69f3ldaslbpw8v0xapchqndjp4wzgmghd1zqab8lqjl5c"; 627 + name = "qqc2-desktop-style-5.89.0.tar.xz"; 628 628 }; 629 629 }; 630 630 solid = { 631 - version = "5.87.0"; 631 + version = "5.89.0"; 632 632 src = fetchurl { 633 - url = "${mirror}/stable/frameworks/5.87/solid-5.87.0.tar.xz"; 634 - sha256 = "0zmcc4ryp4j93999f0fgwvchs4gycbynsz0wghrhdqkfhsjvhqra"; 635 - name = "solid-5.87.0.tar.xz"; 633 + url = "${mirror}/stable/frameworks/5.89/solid-5.89.0.tar.xz"; 634 + sha256 = "1gy8ddg5803fpdifg68gkjrl9l2dwjrmwyzq5jzsfr6yabcfih93"; 635 + name = "solid-5.89.0.tar.xz"; 636 636 }; 637 637 }; 638 638 sonnet = { 639 - version = "5.87.0"; 639 + version = "5.89.0"; 640 640 src = fetchurl { 641 - url = "${mirror}/stable/frameworks/5.87/sonnet-5.87.0.tar.xz"; 642 - sha256 = "1cc9j9ks33s6amr01a7ywnqiqvm498vlmqqva40ddvkfq1azxmhs"; 643 - name = "sonnet-5.87.0.tar.xz"; 641 + url = "${mirror}/stable/frameworks/5.89/sonnet-5.89.0.tar.xz"; 642 + sha256 = "0fdkx68hyp5fq0fyfbq0691vcx70qm7md2nd4028gmpcbxxaixa1"; 643 + name = "sonnet-5.89.0.tar.xz"; 644 644 }; 645 645 }; 646 646 syndication = { 647 - version = "5.87.0"; 647 + version = "5.89.0"; 648 648 src = fetchurl { 649 - url = "${mirror}/stable/frameworks/5.87/syndication-5.87.0.tar.xz"; 650 - sha256 = "1xbs83smgqzk01r7nds6p74v9n1pa0zhlafbbxlj2m226p1zf8bs"; 651 - name = "syndication-5.87.0.tar.xz"; 649 + url = "${mirror}/stable/frameworks/5.89/syndication-5.89.0.tar.xz"; 650 + sha256 = "186dw32jhgfwz7dz9payx645gvhgzcf6qy5qiad6ifkvda50g9cw"; 651 + name = "syndication-5.89.0.tar.xz"; 652 652 }; 653 653 }; 654 654 syntax-highlighting = { 655 - version = "5.87.0"; 655 + version = "5.89.0"; 656 656 src = fetchurl { 657 - url = "${mirror}/stable/frameworks/5.87/syntax-highlighting-5.87.0.tar.xz"; 658 - sha256 = "148wm3qdjkwzvcm51x3cppsxl4rylbjyjp1pfh6545fhikm5nqi6"; 659 - name = "syntax-highlighting-5.87.0.tar.xz"; 657 + url = "${mirror}/stable/frameworks/5.89/syntax-highlighting-5.89.0.tar.xz"; 658 + sha256 = "0iy9ryjf6bcxwp9kni00p82mx1bg101z8331ykixffn41vfgxb9a"; 659 + name = "syntax-highlighting-5.89.0.tar.xz"; 660 660 }; 661 661 }; 662 662 threadweaver = { 663 - version = "5.87.0"; 663 + version = "5.89.0"; 664 664 src = fetchurl { 665 - url = "${mirror}/stable/frameworks/5.87/threadweaver-5.87.0.tar.xz"; 666 - sha256 = "1gqpzv2ijw66fpvaqv66xsglh19lv0k4j9i505xmmkzlyddbhkch"; 667 - name = "threadweaver-5.87.0.tar.xz"; 665 + url = "${mirror}/stable/frameworks/5.89/threadweaver-5.89.0.tar.xz"; 666 + sha256 = "03yrlp9ixfb3wsrfmgxfhryzy2jsfnk4wnphmlk5nh98nxa9706x"; 667 + name = "threadweaver-5.89.0.tar.xz"; 668 668 }; 669 669 }; 670 670 }
+3 -2
pkgs/development/libraries/lib3ds/default.nix
··· 1 1 { lib, stdenv, fetchurl, unzip }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "lib3ds-1.3.0"; 4 + pname = "lib3ds"; 5 + version = "1.3.0"; 5 6 6 7 src = fetchurl { 7 - url = "http://lib3ds.googlecode.com/files/${name}.zip"; 8 + url = "http://lib3ds.googlecode.com/files/lib3ds-${version}.zip"; 8 9 sha256 = "1qr9arfdkjf7q11xhvxwzmhxqz3nhcjkyb8zzfjpz9jm54q0rc7m"; 9 10 }; 10 11
+3 -2
pkgs/development/libraries/libLAS/default.nix
··· 1 1 { lib, stdenv, fetchurl, boost, cmake, gdal, libgeotiff, libtiff, LASzip2, fixDarwinDylibNames }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "libLAS-1.8.1"; 4 + pname = "libLAS"; 5 + version = "1.8.1"; 5 6 6 7 src = fetchurl { 7 - url = "https://download.osgeo.org/liblas/${name}.tar.bz2"; 8 + url = "https://download.osgeo.org/liblas/libLAS-${version}.tar.bz2"; 8 9 sha256 = "0xjfxb3ydvr2258ji3spzyf81g9caap19ql2pk91wiivqsc4mnws"; 9 10 }; 10 11
+5 -3
pkgs/development/libraries/libcdaudio/default.nix
··· 1 1 {lib, stdenv, fetchurl}: 2 2 3 - stdenv.mkDerivation { 4 - name = "libcdaudio-0.99.12p2"; 3 + stdenv.mkDerivation rec { 4 + pname = "libcdaudio"; 5 + version = "0.99.12p2"; 6 + 5 7 src = fetchurl { 6 - url = "mirror://sourceforge/libcdaudio/libcdaudio-0.99.12p2.tar.gz"; 8 + url = "mirror://sourceforge/libcdaudio/libcdaudio-${version}.tar.gz"; 7 9 sha256 = "1fsy6dlzxrx177qc877qhajm9l4g28mvh06h2l15rxy4bapzknjz" ; 8 10 }; 9 11
+4 -3
pkgs/development/libraries/libcdio-paranoia/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, autoreconfHook, libcdio, pkg-config, 2 2 libiconv, IOKit, DiskArbitration}: 3 3 4 - stdenv.mkDerivation { 5 - name = "libcdio-paranoia-0.94+2"; 4 + stdenv.mkDerivation rec { 5 + pname = "libcdio-paranoia"; 6 + version = "0.94+2"; 6 7 7 8 src = fetchFromGitHub { 8 9 owner = "rocky"; 9 10 repo = "libcdio-paranoia"; 10 - rev = "release-10.2+0.94+2"; 11 + rev = "release-10.2+${version}"; 11 12 sha256 = "1wjgmmaca4baw7k5c3vdap9hnjc49ciagi5kvpvync3aqfmdvkha"; 12 13 }; 13 14
+3 -2
pkgs/development/libraries/libcdio/default.nix
··· 1 1 { lib, stdenv, fetchurl, fetchpatch, libcddb, pkg-config, ncurses, help2man, libiconv, Carbon, IOKit }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "libcdio-2.1.0"; 4 + pname = "libcdio"; 5 + version = "2.1.0"; 5 6 6 7 src = fetchurl { 7 - url = "mirror://gnu/libcdio/${name}.tar.bz2"; 8 + url = "mirror://gnu/libcdio/libcdio-${version}.tar.bz2"; 8 9 sha256 = "0avi6apv5ydjy6b9c3z9a46rvp5i57qyr09vr7x4nndxkmcfjl45"; 9 10 }; 10 11
+3 -2
pkgs/development/libraries/libchop/default.nix
··· 4 4 }: 5 5 6 6 stdenv.mkDerivation rec { 7 - name = "libchop-0.5.2"; 7 + pname = "libchop"; 8 + version = "0.5.2"; 8 9 9 10 src = fetchurl { 10 - url = "mirror://savannah/libchop/${name}.tar.gz"; 11 + url = "mirror://savannah/libchop/libchop-${version}.tar.gz"; 11 12 sha256 = "0fpdyxww41ba52d98blvnf543xvirq1v9xz1i3x1gm9lzlzpmc2g"; 12 13 }; 13 14
+2 -2
pkgs/development/libraries/libcryptui/default.nix
··· 1 - { lib, stdenv, fetchurl, autoreconfHook, pkg-config, intltool, glib, gnome, gtk3, gnupg22, gpgme, dbus-glib, libgnome-keyring }: 1 + { lib, stdenv, fetchurl, autoreconfHook, pkg-config, intltool, glib, gnome, gtk3, gnupg, gpgme, dbus-glib, libgnome-keyring }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "libcryptui"; ··· 14 14 ]; 15 15 16 16 nativeBuildInputs = [ pkg-config intltool autoreconfHook ]; 17 - buildInputs = [ glib gtk3 gnupg22 gpgme dbus-glib libgnome-keyring ]; 17 + buildInputs = [ glib gtk3 gnupg gpgme dbus-glib libgnome-keyring ]; 18 18 propagatedBuildInputs = [ dbus-glib ]; 19 19 20 20 enableParallelBuilding = true;
+3 -2
pkgs/development/libraries/libdbi-drivers/default.nix
··· 6 6 7 7 with lib; 8 8 stdenv.mkDerivation rec { 9 - name = "libdbi-drivers-0.9.0"; 9 + pname = "libdbi-drivers"; 10 + version = "0.9.0"; 10 11 11 12 src = fetchurl { 12 - url = "mirror://sourceforge/libdbi-drivers/${name}.tar.gz"; 13 + url = "mirror://sourceforge/libdbi-drivers/libdbi-drivers-${version}.tar.gz"; 13 14 sha256 = "0m680h8cc4428xin4p733azysamzgzcmv4psjvraykrsaz6ymlj3"; 14 15 }; 15 16
+4 -3
pkgs/development/libraries/libdnet/default.nix
··· 1 1 {lib, stdenv, fetchurl, automake, autoconf, libtool}: 2 2 3 - stdenv.mkDerivation { 4 - name = "libdnet-1.12"; 3 + stdenv.mkDerivation rec { 4 + pname = "libdnet"; 5 + version = "1.12"; 5 6 6 7 enableParallelBuilding = true; 7 8 8 9 src = fetchurl { 9 - url = "https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/libdnet/libdnet-1.12.tgz"; 10 + url = "https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/libdnet/libdnet-${version}.tgz"; 10 11 sha256 = "09mhbr8x66ykhf5581a5zjpplpjxibqzgkkpx689kybwg0wk1cw3"; 11 12 }; 12 13
+3 -2
pkgs/development/libraries/libdv/default.nix
··· 1 1 { lib, stdenv, fetchurl, popt }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "libdv-1.0.0"; 4 + pname = "libdv"; 5 + version = "1.0.0"; 5 6 6 7 src = fetchurl { 7 - url = "mirror://sourceforge/libdv/${name}.tar.gz"; 8 + url = "mirror://sourceforge/libdv/libdv-${version}.tar.gz"; 8 9 sha256 = "1fl96f2xh2slkv1i1ix7kqk576a0ak1d33cylm0mbhm96d0761d3"; 9 10 }; 10 11
+4 -3
pkgs/development/libraries/libdvdnav/4.2.1.nix
··· 1 1 {lib, stdenv, fetchurl, pkg-config, libdvdread}: 2 2 3 - stdenv.mkDerivation { 4 - name = "libdvdnav-4.2.1"; 3 + stdenv.mkDerivation rec { 4 + pname = "libdvdnav"; 5 + version = "4.2.1"; 5 6 6 7 src = fetchurl { 7 - url = "http://dvdnav.mplayerhq.hu/releases/libdvdnav-4.2.1.tar.xz"; 8 + url = "http://dvdnav.mplayerhq.hu/releases/libdvdnav-${version}.tar.xz"; 8 9 sha256 = "7fca272ecc3241b6de41bbbf7ac9a303ba25cb9e0c82aa23901d3104887f2372"; 9 10 }; 10 11
+4 -3
pkgs/development/libraries/libdvdread/4.9.9.nix
··· 1 1 {lib, stdenv, fetchurl, libdvdcss}: 2 2 3 - stdenv.mkDerivation { 4 - name = "libdvdread-4.9.9"; 3 + stdenv.mkDerivation rec { 4 + pname = "libdvdread"; 5 + version = "4.9.9"; 5 6 6 7 src = fetchurl { 7 - url = "http://dvdnav.mplayerhq.hu/releases/libdvdread-4.9.9.tar.xz"; 8 + url = "http://dvdnav.mplayerhq.hu/releases/libdvdread-${version}.tar.xz"; 8 9 sha256 = "d91275471ef69d488b05cf15c60e1cd65e17648bfc692b405787419f47ca424a"; 9 10 }; 10 11
+4 -3
pkgs/development/libraries/libdwg/default.nix
··· 1 1 {lib, stdenv, fetchurl, indent}: 2 2 3 - stdenv.mkDerivation { 4 - name = "libdwg-0.6"; 3 + stdenv.mkDerivation rec { 4 + pname = "libdwg"; 5 + version = "0.6"; 5 6 6 7 src = fetchurl { 7 - url = "mirror://sourceforge/libdwg/libdwg-0.6.tar.bz2"; 8 + url = "mirror://sourceforge/libdwg/libdwg-${version}.tar.bz2"; 8 9 sha256 = "0l8ks1x70mkna1q7mzy1fxplinz141bd24qhrm1zkdil74mcsryc"; 9 10 }; 10 11
+2 -2
pkgs/development/libraries/libedit/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "libedit"; 5 - version = "20210714-3.1"; 5 + version = "20210910-3.1"; 6 6 7 7 src = fetchurl { 8 8 url = "https://thrysoee.dk/editline/${pname}-${version}.tar.gz"; 9 - sha256 = "sha256-MCO0mK1ZP9d0WuOyCrrVRt5Qa2e4+7VXljfKaauC28k="; 9 + sha256 = "sha256-Z5KmqZIFB2LtzKKP8zGM233jfcz3vDDbWfzXAX7tE8U="; 10 10 }; 11 11 12 12 outputs = [ "out" "dev" ];
+4 -3
pkgs/development/libraries/libee/default.nix
··· 1 1 { lib, stdenv, fetchurl, pkg-config, libestr }: 2 - stdenv.mkDerivation { 3 - name = "libee-0.4.1"; 2 + stdenv.mkDerivation rec { 3 + pname = "libee"; 4 + version = "0.4.1"; 4 5 5 6 src = fetchurl { 6 - url = "http://www.libee.org/download/files/download/libee-0.4.1.tar.gz"; 7 + url = "http://www.libee.org/download/files/download/libee-${version}.tar.gz"; 7 8 sha256 = "09xhgzmsq0g3jsyj24vy67bhzk2fv971w5ixdkhfwgar70cw1nn0"; 8 9 }; 9 10
+8 -8
pkgs/development/libraries/libepoxy/default.nix
··· 16 16 inherit (lib) getLib optional optionalString; 17 17 18 18 in 19 - stdenv.mkDerivation (rec { 19 + stdenv.mkDerivation rec { 20 20 pname = "libepoxy"; 21 21 version = "1.5.9"; 22 22 ··· 55 55 56 56 NIX_CFLAGS_COMPILE = ''-DLIBGL_PATH="${getLib libGL}/lib"''; 57 57 58 + # cgl_epoxy_api fails in darwin sandbox and on Hydra (because it's headless?) 59 + preCheck = lib.optionalString stdenv.isDarwin '' 60 + substituteInPlace ../test/meson.build \ 61 + --replace "[ 'cgl_epoxy_api', [ 'cgl_epoxy_api.c' ] ]," "" 62 + ''; 63 + 58 64 # tests are running from version 1.5.9 59 65 doCheck = true; 60 66 ··· 71 65 maintainers = with maintainers; [ goibhniu erictapen ]; 72 66 platforms = platforms.unix; 73 67 }; 74 - } // lib.optionalAttrs stdenv.isDarwin { 75 - # cgl_epoxy_api fails in darwin sandbox and on Hydra (because it's headless?) 76 - preCheck = '' 77 - substituteInPlace ../test/meson.build \ 78 - --replace "[ 'cgl_epoxy_api', [ 'cgl_epoxy_api.c' ] ]," "" 79 - ''; 80 - }) 68 + }
+2 -2
pkgs/development/libraries/libevdev/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "libevdev"; 5 - version = "1.11.0"; 5 + version = "1.12.0"; 6 6 7 7 src = fetchurl { 8 8 url = "https://www.freedesktop.org/software/${pname}/${pname}-${version}.tar.xz"; 9 - sha256 = "sha256-Y/TqFImFihCQgOC0C9Q+TgkDoeEuqIjVgduMSVdHwtA="; 9 + sha256 = "sha256-L3KeNIBpV5H5SC6DiL1yNAK4nw6vEYBXu96jzs7psjc="; 10 10 }; 11 11 12 12 nativeBuildInputs = [ python3 ];
+2 -2
pkgs/development/libraries/libfido2/default.nix
··· 12 12 13 13 stdenv.mkDerivation rec { 14 14 pname = "libfido2"; 15 - version = "1.8.0"; 15 + version = "1.9.0"; 16 16 17 17 # releases on https://developers.yubico.com/libfido2/Releases/ are signed 18 18 src = fetchurl { 19 19 url = "https://developers.yubico.com/${pname}/Releases/${pname}-${version}.tar.gz"; 20 - sha256 = "07gxyy5yzgfh5hg7q9fr77z5mkj0xjvd5ya7p5f5kar4iwc92hjm"; 20 + sha256 = "sha256-ujnjrzc20t/IrT0ctuO+fszAlYhhCjsHyGXQ7T5YwtI="; 21 21 }; 22 22 23 23 nativeBuildInputs = [ cmake pkg-config ];
+3 -2
pkgs/development/libraries/libgcrypt/1.5.nix
··· 3 3 assert enableCapabilities -> stdenv.isLinux; 4 4 5 5 stdenv.mkDerivation rec { 6 - name = "libgcrypt-1.5.6"; 6 + pname = "libgcrypt"; 7 + version = "1.5.6"; 7 8 8 9 src = fetchurl { 9 - url = "mirror://gnupg/libgcrypt/${name}.tar.bz2"; 10 + url = "mirror://gnupg/libgcrypt/libgcrypt-${version}.tar.bz2"; 10 11 sha256 = "0ydy7bgra5jbq9mxl5x031nif3m6y3balc6ndw2ngj11wnsjc61h"; 11 12 }; 12 13
+3 -2
pkgs/development/libraries/libglvnd/default.nix
··· 5 5 6 6 stdenv.mkDerivation rec { 7 7 pname = "libglvnd"; 8 - version = "1.3.4"; 8 + version = "1.4.0"; 9 9 10 10 src = fetchFromGitLab { 11 11 domain = "gitlab.freedesktop.org"; 12 12 owner = "glvnd"; 13 13 repo = "libglvnd"; 14 14 rev = "v${version}"; 15 - sha256 = "0phvgg2h3pcz3x39gaymwb37bnw1s26clq9wsj0zx398zmp3dwpk"; 15 + sha256 = "06y7m486kgg566krbhb0gvmpzy6ayd98psnrmmkrnw8p513lg8k3"; 16 16 }; 17 17 18 18 nativeBuildInputs = [ autoreconfHook pkg-config python3 addOpenGLRunpath ]; ··· 63 63 ''; 64 64 inherit (src.meta) homepage; 65 65 # https://gitlab.freedesktop.org/glvnd/libglvnd#libglvnd: 66 + changelog = "https://gitlab.freedesktop.org/glvnd/libglvnd/-/tags/v${version}"; 66 67 license = with licenses; [ mit bsd1 bsd3 gpl3Only asl20 ]; 67 68 platforms = platforms.linux ++ platforms.darwin; 68 69 maintainers = with maintainers; [ primeos ];
+3 -2
pkgs/development/libraries/libgpod/default.nix
··· 6 6 7 7 8 8 stdenv.mkDerivation rec { 9 - name = "libgpod-0.8.3"; 9 + pname = "libgpod"; 10 + version = "0.8.3"; 10 11 11 12 src = fetchurl { 12 - url = "mirror://sourceforge/gtkpod/${name}.tar.bz2"; 13 + url = "mirror://sourceforge/gtkpod/libgpod-${version}.tar.bz2"; 13 14 sha256 = "0pcmgv1ra0ymv73mlj4qxzgyir026z9jpl5s5bkg35afs1cpk2k3"; 14 15 }; 15 16
+2 -2
pkgs/development/libraries/libimagequant/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "libimagequant"; 5 - version = "2.15.1"; 5 + version = "2.17.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "ImageOptim"; 9 9 repo = pname; 10 10 rev = version; 11 - sha256 = "sha256-ElMwLeUdrJeJJ9YoieCF/CUNcNMwj5WcjXmMW/nMyAw="; 11 + sha256 = "sha256-ZoBCZsoUO66X4sDbMO89g4IX5+jqGMLGR7aC2UwD2tE="; 12 12 }; 13 13 14 14 preConfigure = ''
+2 -2
pkgs/development/libraries/libjpeg-turbo/default.nix
··· 16 16 stdenv.mkDerivation rec { 17 17 18 18 pname = "libjpeg-turbo"; 19 - version = "2.1.0"; 19 + version = "2.1.2"; 20 20 21 21 src = fetchFromGitHub { 22 22 owner = "libjpeg-turbo"; 23 23 repo = "libjpeg-turbo"; 24 24 rev = version; 25 - sha256 = "sha256-Ma3Q/zMJPjsQmoaYJtVbHJOx65AfGLWJYi2iRFm3l5s="; 25 + sha256 = "sha256-mlHueKAU/uNUdV9s4jWKAE+XVJdpEFhw2hxGvqRwAGc="; 26 26 }; 27 27 28 28 # This is needed by freeimage
+12 -2
pkgs/development/libraries/libjxl/default.nix
··· 1 1 { stdenv, lib, fetchFromGitHub 2 + , fetchpatch 2 3 , asciidoc 3 4 , brotli 4 5 , cmake ··· 19 18 20 19 stdenv.mkDerivation rec { 21 20 pname = "libjxl"; 22 - version = "0.5"; 21 + version = "0.6.1"; 23 22 24 23 src = fetchFromGitHub { 25 24 owner = "libjxl"; 26 25 repo = "libjxl"; 27 26 rev = "v${version}"; 28 - sha256 = "0grljgmy6cfhm8zni9d1mdn01qzc49k1pl75vhr7qcd3sp4r8lxm"; 27 + sha256 = "sha256-fTK5hyU9PZ6nigMsfzVugwviihgAXfEcLF+l+n5h+54="; 29 28 # There are various submodules in `third_party/`. 30 29 fetchSubmodules = true; 31 30 }; 31 + 32 + patches = [ 33 + # present in master, remove after 0.7? 34 + (fetchpatch { 35 + name = "fix-link-lld-macho.patch"; 36 + url = "https://github.com/libjxl/libjxl/commit/88fe3fff3dc70c72405f57c69feffd9823930034.patch"; 37 + sha256 = "1419fyiq4srpj72cynwyvqy8ldi7vn9asvkp5fsbmiqkyhb15jpk"; 38 + }) 39 + ]; 32 40 33 41 # hydra's darwin machines run into https://github.com/libjxl/libjxl/issues/408 34 42 # unless we disable highway's tests
+2 -2
pkgs/development/libraries/libksba/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "libksba"; 5 - version = "1.5.1"; 5 + version = "1.6.0"; 6 6 7 7 src = fetchurl { 8 8 url = "mirror://gnupg/libksba/libksba-${version}.tar.bz2"; 9 - sha256 = "sha256-sPTGXk5EfZojSfa4wOd6KL6VMeRUi6AsVF0fRtx7+SE="; 9 + sha256 = "sha256-2taD5vLZFdiAqkvtXOqaEVaQuJNbeKG74BZpGJMHpIs="; 10 10 }; 11 11 12 12 outputs = [ "out" "dev" "info" ];
+3 -2
pkgs/development/libraries/liblogging/default.nix
··· 3 3 }: 4 4 5 5 stdenv.mkDerivation rec { 6 - name = "liblogging-1.0.6"; 6 + pname = "liblogging"; 7 + version = "1.0.6"; 7 8 8 9 src = fetchurl { 9 - url = "http://download.rsyslog.com/liblogging/${name}.tar.gz"; 10 + url = "http://download.rsyslog.com/liblogging/liblogging-${version}.tar.gz"; 10 11 sha256 = "14xz00mq07qmcgprlj5b2r21ljgpa4sbwmpr6jm2wrf8wms6331k"; 11 12 }; 12 13
+3 -2
pkgs/development/libraries/liblognorm/default.nix
··· 1 1 { lib, stdenv, fetchurl, pkg-config, libestr, json_c, pcre, fastJson }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "liblognorm-2.0.6"; 4 + pname = "liblognorm"; 5 + version = "2.0.6"; 5 6 6 7 src = fetchurl { 7 - url = "http://www.liblognorm.com/files/download/${name}.tar.gz"; 8 + url = "http://www.liblognorm.com/files/download/liblognorm-${version}.tar.gz"; 8 9 sha256 = "1wpn15c617r7lfm1z9d5aggmmi339s6yn4pdz698j0r2bkl5gw6g"; 9 10 }; 10 11
+2 -2
pkgs/development/libraries/libmbim/default.nix
··· 11 11 12 12 stdenv.mkDerivation rec { 13 13 pname = "libmbim"; 14 - version = "1.26.0"; 14 + version = "1.26.2"; 15 15 16 16 src = fetchurl { 17 17 url = "https://www.freedesktop.org/software/libmbim/${pname}-${version}.tar.xz"; 18 - sha256 = "1kqkx139z62w391bz6lwmcjg7v12jxlcm7hj88222xrcn8k0j7qy"; 18 + sha256 = "sha256-EMd79bXrjJK6gOm1GZI62biYNivI4ZKOK8mhfuumSa8="; 19 19 }; 20 20 21 21 outputs = [ "out" "dev" "man" ];
+2 -2
pkgs/development/libraries/libmd/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "libmd"; 5 - version = "1.0.3"; 5 + version = "1.0.4"; 6 6 7 7 src = fetchurl { 8 8 url = "https://archive.hadrons.org/software/${pname}/${pname}-${version}.tar.xz"; 9 - sha256 = "0jmga8y94h857ilra3qjaiax3wd5pd6mx1h120zhl9fcjmzhj0js"; 9 + sha256 = "sha256-9RySEELjS+3e3tS3VVdlZVnPWx8kSAM7TB7sEcB+Uw8="; 10 10 }; 11 11 12 12 nativeBuildInputs = [ autoreconfHook ];
+4 -2
pkgs/development/libraries/libmikmod/default.nix
··· 4 4 inherit (lib) optional optionalString; 5 5 6 6 in stdenv.mkDerivation rec { 7 - name = "libmikmod-3.3.11.1"; 7 + pname = "libmikmod"; 8 + version = "3.3.11.1"; 9 + 8 10 src = fetchurl { 9 - url = "mirror://sourceforge/mikmod/${name}.tar.gz"; 11 + url = "mirror://sourceforge/mikmod/libmikmod-${version}.tar.gz"; 10 12 sha256 = "06bdnhb0l81srdzg6gn2v2ydhhaazza7rshrcj3q8dpqr3gn97dd"; 11 13 }; 12 14
+3 -2
pkgs/development/libraries/libmms/default.nix
··· 1 1 { lib, stdenv, fetchurl, glib, pkg-config }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "libmms-0.6.4"; 4 + pname = "libmms"; 5 + version = "0.6.4"; 5 6 6 7 src = fetchurl { 7 - url = "mirror://sourceforge/libmms/${name}.tar.gz"; 8 + url = "mirror://sourceforge/libmms/libmms-${version}.tar.gz"; 8 9 sha256 = "0kvhxr5hkabj9v7ah2rzkbirndfqdijd9hp8v52c1z6bxddf019w"; 9 10 }; 10 11
+3 -2
pkgs/development/libraries/libmodbus/default.nix
··· 1 1 { lib, stdenv, fetchurl }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "libmodbus-3.1.6"; 4 + pname = "libmodbus"; 5 + version = "3.1.6"; 5 6 6 7 src = fetchurl { 7 - url = "http://libmodbus.org/releases/${name}.tar.gz"; 8 + url = "http://libmodbus.org/releases/libmodbus-${version}.tar.gz"; 8 9 sha256 = "05kwz0n5gn9m33cflzv87lz3zp502yp8fpfzbx70knvfl6agmnfp"; 9 10 }; 10 11
+6 -3
pkgs/development/libraries/libndp/default.nix
··· 1 - { lib, stdenv, fetchurl }: 1 + { lib, stdenv, fetchurl, autoreconfHook }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "libndp-1.8"; 4 + pname = "libndp"; 5 + version = "1.8"; 5 6 6 7 src = fetchurl { 7 - url = "http://libndp.org/files/${name}.tar.gz"; 8 + url = "http://libndp.org/files/libndp-${version}.tar.gz"; 8 9 sha256 = "sha256-iP+2buLrUn8Ub1wC9cy8OLqX0rDVfrRr+6SIghqwwCs="; 9 10 }; 11 + 12 + nativeBuildInputs = [ autoreconfHook ]; 10 13 11 14 meta = with lib; { 12 15 homepage = "http://libndp.org/";
+3 -2
pkgs/development/libraries/libnfnetlink/default.nix
··· 1 1 { lib, stdenv, fetchurl }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "libnfnetlink-1.0.1"; 4 + pname = "libnfnetlink"; 5 + version = "1.0.1"; 5 6 6 7 src = fetchurl { 7 - url = "https://www.netfilter.org/projects/libnfnetlink/files/${name}.tar.bz2"; 8 + url = "https://www.netfilter.org/projects/libnfnetlink/files/libnfnetlink-${version}.tar.bz2"; 8 9 sha256 = "06mm2x4b01k3m7wnrxblk9j0mybyr4pfz28ml7944xhjx6fy2w7j"; 9 10 }; 10 11
+4 -3
pkgs/development/libraries/libnxml/default.nix
··· 1 1 {lib, stdenv, fetchurl, curl}: 2 2 3 - stdenv.mkDerivation { 4 - name = "libnxml-0.18.3"; 3 + stdenv.mkDerivation rec { 4 + pname = "libnxml"; 5 + version = "0.18.3"; 5 6 6 7 src = fetchurl { 7 - url = "https://www.autistici.org/bakunin/libnxml/libnxml-0.18.3.tar.gz"; 8 + url = "https://www.autistici.org/bakunin/libnxml/libnxml-${version}.tar.gz"; 8 9 sha256 = "0ix5b9bxd7r517vhgcxwdviq4m0g0pq46s5g3h04gcqnpbin150g"; 9 10 }; 10 11
+3 -2
pkgs/development/libraries/liboil/default.nix
··· 1 1 {lib, stdenv, fetchurl, pkg-config }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "liboil-0.3.17"; 4 + pname = "liboil"; 5 + version = "0.3.17"; 5 6 6 7 src = fetchurl { 7 - url = "${meta.homepage}/download/${name}.tar.gz"; 8 + url = "${meta.homepage}/download/liboil-${version}.tar.gz"; 8 9 sha256 = "0sgwic99hxlb1av8cm0albzh8myb7r3lpcwxfm606l0bkc3h4pqh"; 9 10 }; 10 11
+2 -1
pkgs/development/libraries/liboop/default.nix
··· 1 1 {lib, stdenv, fetchurl}: 2 2 3 3 stdenv.mkDerivation { 4 - name = "liboop-1.0"; 4 + pname = "liboop"; 5 + version = "1.0"; 5 6 6 7 src = fetchurl { 7 8 url = "http://download.ofb.net/liboop/liboop.tar.gz";
+3 -2
pkgs/development/libraries/libotr/default.nix
··· 1 1 { lib, stdenv, fetchurl, libgcrypt, autoreconfHook }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "libotr-4.1.1"; 4 + pname = "libotr"; 5 + version = "4.1.1"; 5 6 6 7 src = fetchurl { 7 - url = "https://otr.cypherpunks.ca/${name}.tar.gz"; 8 + url = "https://otr.cypherpunks.ca/libotr-${version}.tar.gz"; 8 9 sha256 = "1x8rliydhbibmzwdbyr7pd7n87m2jmxnqkpvaalnf4154hj1hfwb"; 9 10 }; 10 11
+4 -3
pkgs/development/libraries/libpipeline/default.nix
··· 1 1 { lib, stdenv, fetchurl }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "libpipeline-1.5.3"; 4 + pname = "libpipeline"; 5 + version = "1.5.4"; 5 6 6 7 src = fetchurl { 7 - url = "mirror://savannah/libpipeline/${name}.tar.gz"; 8 - sha256 = "1c5dl017xil2ssb6a5vg927bnsbc9vymfgi9ahvqbb8gypx0igsx"; 8 + url = "mirror://savannah/libpipeline/libpipeline-${version}.tar.gz"; 9 + sha256 = "sha256-23hb3boKN+8UtO+Cri0YuIJOaYPfuZEDGTheKN8/Gpw="; 9 10 }; 10 11 11 12 patches = lib.optionals stdenv.isDarwin [ ./fix-on-osx.patch ];
+3 -2
pkgs/development/libraries/libpng/12.nix
··· 3 3 assert stdenv.hostPlatform == stdenv.buildPlatform -> zlib != null; 4 4 5 5 stdenv.mkDerivation rec { 6 - name = "libpng-1.2.59"; 6 + pname = "libpng"; 7 + version = "1.2.59"; 7 8 8 9 src = fetchurl { 9 - url = "mirror://sourceforge/libpng/${name}.tar.xz"; 10 + url = "mirror://sourceforge/libpng/libpng-${version}.tar.xz"; 10 11 sha256 = "1izw9ybm27llk8531w6h4jp4rk2rxy2s9vil16nwik5dp0amyqxl"; 11 12 }; 12 13
+3 -2
pkgs/development/libraries/libpseudo/default.nix
··· 1 1 {lib, stdenv, fetchurl, pkg-config, glib, ncurses}: 2 2 stdenv.mkDerivation rec { 3 - name = "libpseudo-1.2.0"; 3 + pname = "libpseudo"; 4 + version = "1.2.0"; 4 5 5 6 src = fetchurl { 6 - url = "mirror://sourceforge/libpseudo/${name}.tar.gz"; 7 + url = "mirror://sourceforge/libpseudo/libpseudo-${version}.tar.gz"; 7 8 sha256 = "0d3pw0m3frycr3x5kzqcaj4r2qh43iv6b0fpd6l4yk0aa4a9560n"; 8 9 }; 9 10
+3 -2
pkgs/development/libraries/librdf/raptor.nix
··· 1 1 { lib, stdenv, fetchurl, libxml2, curl }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "raptor-1.4.21"; 4 + pname = "raptor"; 5 + version = "1.4.21"; 5 6 6 7 src = fetchurl { 7 - url = "http://download.librdf.org/source/${name}.tar.gz"; 8 + url = "http://download.librdf.org/source/raptor-${version}.tar.gz"; 8 9 sha256 = "db3172d6f3c432623ed87d7d609161973d2f7098e3d2233d0702fbcc22cfd8ca"; 9 10 }; 10 11
+3 -2
pkgs/development/libraries/librdf/rasqal.nix
··· 1 1 { lib, stdenv, fetchurl, librdf_raptor2, gmp, pkg-config, pcre, libxml2, perl }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "rasqal-0.9.33"; 4 + pname = "rasqal"; 5 + version = "0.9.33"; 5 6 6 7 src = fetchurl { 7 - url = "http://download.librdf.org/source/${name}.tar.gz"; 8 + url = "http://download.librdf.org/source/rasqal-${version}.tar.gz"; 8 9 sha256 = "0z6rrwn4jsagvarg8d5zf0j352kjgi33py39jqd29gbhcnncj939"; 9 10 }; 10 11
+3 -2
pkgs/development/libraries/librdf/redland.nix
··· 7 7 }: 8 8 9 9 stdenv.mkDerivation rec { 10 - name = "redland-1.0.17"; 10 + pname = "redland"; 11 + version = "1.0.17"; 11 12 12 13 src = fetchurl { 13 - url = "http://download.librdf.org/source/${name}.tar.gz"; 14 + url = "http://download.librdf.org/source/redland-${version}.tar.gz"; 14 15 sha256 = "de1847f7b59021c16bdc72abb4d8e2d9187cd6124d69156f3326dd34ee043681"; 15 16 }; 16 17
+6 -3
pkgs/development/libraries/libroxml/default.nix
··· 1 1 { lib, stdenv, fetchurl }: 2 2 3 - stdenv.mkDerivation { 4 - name = "libroxml-2.3.0"; 3 + stdenv.mkDerivation rec { 4 + pname = "libroxml"; 5 + version = "2.3.0"; 6 + 5 7 src = fetchurl { 6 - url = "http://download.libroxml.net/pool/v2.x/libroxml-2.3.0.tar.gz"; 8 + url = "http://download.libroxml.net/pool/v2.x/libroxml-${version}.tar.gz"; 7 9 sha256 = "0y0vc9n4rfbimjp28nx4kdfzz08j5xymh5xjy84l9fhfac5z5a0x"; 8 10 }; 11 + 9 12 meta = with lib; { 10 13 homepage = "https://www.libroxml.net/"; 11 14 description = "This library is minimum, easy-to-use, C implementation for xml file parsing";
+2 -2
pkgs/development/libraries/librsvg/default.nix
··· 24 24 25 25 stdenv.mkDerivation rec { 26 26 pname = "librsvg"; 27 - version = "2.52.3"; 27 + version = "2.52.4"; 28 28 29 29 outputs = [ "out" "dev" "installedTests" ]; 30 30 31 31 src = fetchurl { 32 32 url = "mirror://gnome/sources/${pname}/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; 33 - sha256 = "Nuf1vIjXhgjqf2wF5K/krMFga5rxPChF1DhQc9CCuKQ="; 33 + sha256 = "Zg7Ig2o6kVh7yThJIBMtTDjR0XGMZ/4WDFIT/k3sKSg="; 34 34 }; 35 35 36 36 cargoVendorDir = "vendor";
+3 -2
pkgs/development/libraries/libsigcxx/1.2.nix
··· 1 1 {lib, stdenv, fetchurl, pkg-config, m4}: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "libsigc++-1.2.7"; 4 + pname = "libsigc++"; 5 + version = "1.2.7"; 5 6 6 7 src = fetchurl { 7 - url = "mirror://gnome/sources/libsigc++/1.2/${name}.tar.bz2"; 8 + url = "mirror://gnome/sources/libsigc++/1.2/libsigc++-${version}.tar.bz2"; 8 9 sha256 = "099224v5y0y1ggqrfc8vga8afr3nb93iicn7cj8xxgsrwa83s5nr"; 9 10 }; 10 11
+3 -2
pkgs/development/libraries/libsigsegv/default.nix
··· 3 3 }: 4 4 5 5 stdenv.mkDerivation rec { 6 - name = "libsigsegv-2.13"; 6 + pname = "libsigsegv"; 7 + version = "2.13"; 7 8 8 9 src = fetchurl { 9 - url = "mirror://gnu/libsigsegv/${name}.tar.gz"; 10 + url = "mirror://gnu/libsigsegv/libsigsegv-${version}.tar.gz"; 10 11 sha256 = "sha256-vnjuQXawX3x1/wMpjYSHTbkPS2ydVQPw2hIms6PEgRk="; 11 12 }; 12 13
+2 -2
pkgs/development/libraries/libsoup/3.x.nix
··· 21 21 22 22 stdenv.mkDerivation rec { 23 23 pname = "libsoup"; 24 - version = "3.0.2"; 24 + version = "3.0.3"; 25 25 26 26 outputs = [ "out" "dev" ]; 27 27 28 28 src = fetchurl { 29 29 url = "mirror://gnome/sources/${pname}/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; 30 - sha256 = "sha256-mO9T7ZtIFewFIyFVNxr4A6mSj0ZSrMaF/wIIa+FqP/U="; 30 + sha256 = "sha256-UWWwTa2uMCfpoogthoaUtFhq/9d4wZSYKuTeI3PS4l4="; 31 31 }; 32 32 33 33 nativeBuildInputs = [
+2 -2
pkgs/development/libraries/libsoup/default.nix
··· 22 22 23 23 stdenv.mkDerivation rec { 24 24 pname = "libsoup"; 25 - version = "2.74.1"; 25 + version = "2.74.2"; 26 26 27 27 outputs = [ "out" "dev" ]; 28 28 29 29 src = fetchurl { 30 30 url = "mirror://gnome/sources/${pname}/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; 31 - sha256 = "sha256-3CejuPowvI/5ULWnWVh1fSJC4+UeTi2cTmI+9195O/g="; 31 + sha256 = "sha256-8KQnZW5f4Z4d9xwQfojfobLmc8JcVHt4I7YBi0DQEVk="; 32 32 }; 33 33 34 34 nativeBuildInputs = [
+2 -1
pkgs/development/libraries/libstemmer/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, cmake }: 2 2 3 3 stdenv.mkDerivation { 4 - name = "libstemmer-2017-03-02"; 4 + pname = "libstemmer"; 5 + version = "unstable-2017-03-02"; 5 6 6 7 src = fetchFromGitHub { 7 8 owner = "zvelo";
+4 -4
pkgs/development/libraries/libsurvive/default.nix
··· 3 3 , cmake 4 4 , pkg-config 5 5 , freeglut 6 - , liblapack 6 + , lapack 7 7 , libusb1 8 - , openblas 8 + , blas 9 9 , zlib 10 10 }: 11 11 ··· 24 24 25 25 buildInputs = [ 26 26 freeglut 27 - liblapack 27 + lapack 28 28 libusb1 29 - openblas 29 + blas 30 30 zlib 31 31 ]; 32 32
+4 -3
pkgs/development/libraries/libtasn1/default.nix
··· 1 1 { lib, stdenv, fetchurl, perl, texinfo }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "libtasn1-4.17.0"; 4 + pname = "libtasn1"; 5 + version = "4.18.0"; 5 6 6 7 src = fetchurl { 7 - url = "mirror://gnu/libtasn1/${name}.tar.gz"; 8 - sha256 = "sha256-7OdVHOp5IrjhDX68cLwiSNH91zNRZGotao1oqUIcRaU="; 8 + url = "mirror://gnu/libtasn1/libtasn1-${version}.tar.gz"; 9 + sha256 = "sha256-Q2XBVJU1Y9ZMZ6AktgfR7nXG23bg0PZXCeqAozTNGJg="; 9 10 }; 10 11 11 12 outputs = [ "out" "dev" "devdoc" ];
+3 -2
pkgs/development/libraries/libtiger/default.nix
··· 1 1 { stdenv, lib, fetchurl, libkate, pango, cairo, pkg-config, darwin }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "libtiger-0.3.4"; 4 + pname = "libtiger"; 5 + version = "0.3.4"; 5 6 6 7 src = fetchurl { 7 - url = "https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/libtiger/${name}.tar.gz"; 8 + url = "https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/libtiger/libtiger-${version}.tar.gz"; 8 9 sha256 = "0rj1bmr9kngrgbxrjbn4f4f9pww0wmf6viflinq7ava7zdav4hkk"; 9 10 }; 10 11
+2 -1
pkgs/development/libraries/libtoxcore/new-api.nix
··· 2 2 , libvpx, check, libconfig, pkg-config }: 3 3 4 4 stdenv.mkDerivation { 5 - name = "tox-core-new-20160727"; 5 + pname = "tox-core-new"; 6 + version = "unstable-2016-07-27"; 6 7 7 8 src = fetchFromGitHub { 8 9 owner = "irungentoo";
+3 -2
pkgs/development/libraries/libviper/default.nix
··· 1 1 {lib, stdenv, fetchurl, pkg-config, glib, ncurses, gpm}: 2 2 stdenv.mkDerivation rec { 3 - name = "libviper-1.4.6"; 3 + pname = "libviper"; 4 + version = "1.4.6"; 4 5 5 6 src = fetchurl { 6 - url = "mirror://sourceforge/libviper/${name}.tar.gz"; 7 + url = "mirror://sourceforge/libviper/libviper-${version}.tar.gz"; 7 8 sha256 = "1jvm7wdgw6ixyhl0pcfr9lnr9g6sg6whyrs9ihjiz0agvqrgvxwc"; 8 9 }; 9 10
+3 -2
pkgs/development/libraries/libwpd/0.8.nix
··· 1 1 { lib, stdenv, fetchurl, pkg-config, glib, libgsf, libxml2, bzip2 }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "libwpd-0.8.14"; 4 + pname = "libwpd"; 5 + version = "0.8.14"; 5 6 6 7 src = fetchurl { 7 - url = "mirror://sourceforge/libwpd/${name}.tar.gz"; 8 + url = "mirror://sourceforge/libwpd/libwpd-${version}.tar.gz"; 8 9 sha256 = "1syli6i5ma10cwzpa61a18pyjmianjwsf6pvmvzsh5md6yk4yx01"; 9 10 }; 10 11
+3 -2
pkgs/development/libraries/libwpd/default.nix
··· 1 1 { lib, stdenv, fetchurl, zlib, pkg-config, glib, libgsf, libxml2, librevenge }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "libwpd-0.10.0"; 4 + pname = "libwpd"; 5 + version = "0.10.0"; 5 6 6 7 src = fetchurl { 7 - url = "mirror://sourceforge/libwpd/${name}.tar.xz"; 8 + url = "mirror://sourceforge/libwpd/libwpd-${version}.tar.xz"; 8 9 sha256 = "0b6krzr6kxzm89g6bapn805kdayq70hn16n5b5wfs2lwrf0ag2wx"; 9 10 }; 10 11
+4 -2
pkgs/development/libraries/libxdg-basedir/default.nix
··· 1 1 {lib, stdenv, fetchurl, fetchpatch}: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "libxdg-basedir-1.2.0"; 4 + pname = "libxdg-basedir"; 5 + version = "1.2.0"; 6 + 5 7 src = fetchurl { 6 - url = "https://nevill.ch/libxdg-basedir/downloads/${name}.tar.gz"; 8 + url = "https://nevill.ch/libxdg-basedir/downloads/libxdg-basedir-${version}.tar.gz"; 7 9 sha256 = "2757a949618742d80ac59ee2f0d946adc6e71576406cdf798e6ced507708cdf4"; 8 10 }; 9 11
+3 -2
pkgs/development/libraries/libxkbcommon/libxkbcommon_7.nix
··· 1 1 { lib, stdenv, fetchurl, pkg-config, bison, flex, xkeyboard_config, libxcb, libX11 }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "libxkbcommon-0.7.2"; 4 + pname = "libxkbcommon"; 5 + version = "0.7.2"; 5 6 6 7 src = fetchurl { 7 - url = "http://xkbcommon.org/download/${name}.tar.xz"; 8 + url = "http://xkbcommon.org/download/libxkbcommon-${version}.tar.xz"; 8 9 sha256 = "1n5rv5n210kjnkyrvbh04gfwaa7zrmzy1393p8nyqfw66lkxr918"; 9 10 }; 10 11
+4 -6
pkgs/development/libraries/log4cplus/default.nix
··· 1 1 { lib, stdenv, fetchurl }: 2 2 3 - let 4 - name = "log4cplus-2.0.7"; 5 - in 6 - stdenv.mkDerivation { 7 - inherit name; 3 + stdenv.mkDerivation rec { 4 + pname = "log4cplus"; 5 + version = "2.0.7"; 8 6 9 7 src = fetchurl { 10 - url = "mirror://sourceforge/log4cplus/${name}.tar.bz2"; 8 + url = "mirror://sourceforge/log4cplus/log4cplus-${version}.tar.bz2"; 11 9 sha256 = "sha256-j626/uK6TlWKD3iEJhPJ+yOcd12D8jNA0JEITA4bEqs="; 12 10 }; 13 11
+5 -5
pkgs/development/libraries/menu-cache/default.nix
··· 1 1 { lib, stdenv, fetchurl, glib, pkg-config, libfm-extra }: 2 2 3 - let name = "menu-cache-1.1.0"; 4 - in 5 - stdenv.mkDerivation { 6 - inherit name; 3 + stdenv.mkDerivation rec { 4 + pname = "menu-cache"; 5 + version = "1.1.0"; 6 + 7 7 src = fetchurl { 8 - url = "mirror://sourceforge/lxde/${name}.tar.xz"; 8 + url = "mirror://sourceforge/lxde/menu-cache-${version}.tar.xz"; 9 9 sha256 = "1iry4zlpppww8qai2cw4zid4081hh7fz8nzsp5lqyffbkm2yn0pd"; 10 10 }; 11 11
+3 -2
pkgs/development/libraries/mythes/default.nix
··· 1 1 { lib, stdenv, fetchurl, hunspell, ncurses, pkg-config, perl }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "mythes-1.2.4"; 4 + pname = "mythes"; 5 + version = "1.2.4"; 5 6 6 7 src = fetchurl { 7 - url = "mirror://sourceforge/hunspell/${name}.tar.gz"; 8 + url = "mirror://sourceforge/hunspell/mythes-${version}.tar.gz"; 8 9 sha256 = "0prh19wy1c74kmzkkavm9qslk99gz8h8wmjvwzjc6lf8v2az708y"; 9 10 }; 10 11
+2 -1
pkgs/development/libraries/neardal/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, autoconf, automake, libtool, pkg-config, glib, readline, makeWrapper }: 2 2 3 3 stdenv.mkDerivation { 4 - name = "neardal-0.7-post-git-20150930"; 4 + pname = "neardal"; 5 + version = "unstable-0.7-post-git-2015-09-30"; 5 6 6 7 src = fetchFromGitHub { 7 8 owner = "connectivity";
+3 -2
pkgs/development/libraries/npth/default.nix
··· 1 1 { lib, stdenv, fetchurl }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "npth-1.6"; 4 + pname = "npth"; 5 + version = "1.6"; 5 6 6 7 src = fetchurl { 7 - url = "mirror://gnupg/npth/${name}.tar.bz2"; 8 + url = "mirror://gnupg/npth/npth-${version}.tar.bz2"; 8 9 sha256 = "1lg2lkdd3z1s3rpyf88786l243adrzyk9p4q8z9n41ygmpcsp4qk"; 9 10 }; 10 11
+2 -2
pkgs/development/libraries/nspr/default.nix
··· 7 7 8 8 stdenv.mkDerivation rec { 9 9 pname = "nspr"; 10 - version = "4.32"; 10 + version = "4.33"; 11 11 12 12 src = fetchurl { 13 13 url = "mirror://mozilla/nspr/releases/v${version}/src/nspr-${version}.tar.gz"; 14 - sha256 = "0v3zds1id71j5a5si42a658fjz8nv2f6zp6w4gqrqmdr6ksz8sxv"; 14 + sha256 = "1mwklrsx05ga30crr9xi6nl4d49d5mzx2x533bxw4l0fpqay6gmj"; 15 15 }; 16 16 17 17 patches = [
+2 -2
pkgs/development/libraries/nss/default.nix
··· 27 27 # It will rebuild itself using the version of this package (NSS) and if 28 28 # an update is required do the required changes to the expression. 29 29 # Example: nix-shell ./maintainers/scripts/update.nix --argstr package cacert 30 - version = "3.73"; 30 + version = "3.73.1"; 31 31 32 32 in 33 33 stdenv.mkDerivation rec { ··· 36 36 37 37 src = fetchurl { 38 38 url = "mirror://mozilla/security/nss/releases/NSS_${lib.replaceStrings [ "." ] [ "_" ] version}_RTM/src/${pname}-${version}.tar.gz"; 39 - sha256 = "1rfqjq02rfv0ycdmvic51pi093rg33zb8kpqkvddf44vv9l3lvan"; 39 + sha256 = "x2j5/jEp6LzC6WeUVtft2UU6IleEqPx9xFAYBvH+mr4="; 40 40 }; 41 41 42 42 depsBuildBuild = [ buildPackages.stdenv.cc ];
+4 -3
pkgs/development/libraries/ogre/1.10.x.nix
··· 8 8 , withNvidiaCg ? false, nvidia_cg_toolkit 9 9 , withSamples ? false }: 10 10 11 - stdenv.mkDerivation { 12 - name = "ogre-1.10.11"; 11 + stdenv.mkDerivation rec { 12 + pname = "ogre"; 13 + version = "1.10.11"; 13 14 14 15 src = fetchurl { 15 - url = "https://bitbucket.org/sinbad/ogre/get/v1-10-11.tar.gz"; 16 + url = "https://bitbucket.org/sinbad/ogre/get/v${lib.replaceStrings ["."] ["-"] version}.tar.gz"; 16 17 sha256 = "1zwvlx5dz9nwjazhnrhzb0w8ilpa84r0hrxrmmy69pgr1p1yif5a"; 17 18 }; 18 19
+3 -2
pkgs/development/libraries/opendbx/default.nix
··· 3 3 let inherit (lib) getDev; in 4 4 5 5 stdenv.mkDerivation rec { 6 - name = "opendbx-1.4.6"; 6 + pname = "opendbx"; 7 + version = "1.4.6"; 7 8 8 9 src = fetchurl { 9 - url = "https://linuxnetworks.de/opendbx/download/${name}.tar.gz"; 10 + url = "https://linuxnetworks.de/opendbx/download/opendbx-${version}.tar.gz"; 10 11 sha256 = "0z29h6zx5f3gghkh1a0060w6wr572ci1rl2a3480znf728wa0ii2"; 11 12 }; 12 13
+4 -3
pkgs/development/libraries/openslp/default.nix
··· 1 1 { lib, stdenv, fetchurl, fetchpatch }: 2 2 3 - stdenv.mkDerivation { 4 - name = "openslp-2.0.0"; 3 + stdenv.mkDerivation rec { 4 + pname = "openslp"; 5 + version = "2.0.0"; 5 6 6 7 src = fetchurl { 7 - url = "mirror://sourceforge/openslp/2.0.0/2.0.0/openslp-2.0.0.tar.gz"; 8 + url = "mirror://sourceforge/openslp/${version}/${version}/openslp-${version}.tar.gz"; 8 9 sha256 = "16splwmqp0400w56297fkipaq9vlbhv7hapap8z09gp5m2i3fhwj"; 9 10 }; 10 11
+3 -3
pkgs/development/libraries/openssl/default.nix
··· 193 193 }; 194 194 195 195 openssl_1_1 = common { 196 - version = "1.1.1l"; 197 - sha256 = "sha256-C3o+XlnDSCf+DDp0t+yLrvMCuY+oAIjX+RU6oW+na9E="; 196 + version = "1.1.1m"; 197 + sha256 = "sha256-+JGZvosjykX8fLnx2NPuZzEjGChq0DD1MWrKZGLbbJY="; 198 198 patches = [ 199 199 ./1.1/nix-ssl-cert-file.patch 200 200 201 201 (if stdenv.hostPlatform.isDarwin 202 202 then ./use-etc-ssl-certs-darwin.patch 203 203 else ./use-etc-ssl-certs.patch) 204 - ] ++ lib.optionals (stdenv.isDarwin) [ 204 + ] ++ lib.optionals (stdenv.isDarwin && (builtins.substring 5 5 version) < "m") [ 205 205 ./1.1/macos-yosemite-compat.patch 206 206 ]; 207 207 withDocs = true;
+2 -2
pkgs/development/libraries/pango/default.nix
··· 24 24 25 25 stdenv.mkDerivation rec { 26 26 pname = "pango"; 27 - version = "1.48.10"; 27 + version = "1.50.0"; 28 28 29 29 outputs = [ "bin" "out" "dev" ] 30 30 ++ lib.optionals withDocs [ "devdoc" ]; 31 31 32 32 src = fetchurl { 33 33 url = "mirror://gnome/sources/${pname}/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; 34 - sha256 = "IeH1eYvN/adeq8QoBRSwiWq1b2VtTn5mAwuaJTXs3Jg="; 34 + sha256 = "26i2Ld+G4Q9z+Tw9Ila3MjiyvK+HA3yiKbQL3AQOs/M="; 35 35 }; 36 36 37 37 strictDeps = !withIntrospection;
+2 -2
pkgs/development/libraries/pangomm/default.nix
··· 3 3 4 4 stdenv.mkDerivation rec { 5 5 pname = "pangomm"; 6 - version= "2.46.1"; 6 + version= "2.46.2"; 7 7 8 8 src = fetchurl { 9 9 url = "mirror://gnome/sources/${pname}/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; 10 - sha256 = "sha256-yIUBP+YaTFEX/aOVdw1QdWNBHGPkn0o6ztTJ7+NNmXU="; 10 + sha256 = "sha256-V0QqtNwEOHe/44OZFXMastaT/GY0pxYUQi+1MMnqpvQ="; 11 11 }; 12 12 13 13 outputs = [ "out" "dev" ];
+5 -3
pkgs/development/libraries/pangoxsl/default.nix
··· 1 1 {lib, stdenv, fetchurl, pkg-config, glib, pango}: 2 2 3 - stdenv.mkDerivation { 4 - name = "pangoxsl-1.6.0.3"; 3 + stdenv.mkDerivation rec { 4 + pname = "pangoxsl"; 5 + version = "1.6.0.3"; 6 + 5 7 src = fetchurl { 6 - url = "mirror://sourceforge/pangopdf/pangoxsl-1.6.0.3.tar.gz"; 8 + url = "mirror://sourceforge/pangopdf/pangoxsl-${version}.tar.gz"; 7 9 sha256 = "1wcd553nf4nwkrfrh765cyzwj9bsg7zpkndg2hjs8mhwgx04lm8n"; 8 10 }; 9 11
+2 -2
pkgs/development/libraries/pcre/default.nix
··· 11 11 pname = "pcre" 12 12 + lib.optionalString (variant == "cpp") "-cpp" 13 13 + lib.optionalString (variant != "cpp" && variant != null) variant; 14 - version = "8.44"; 14 + version = "8.45"; 15 15 16 16 src = fetchurl { 17 17 url = "mirror://sourceforge/project/pcre/pcre/${version}/pcre-${version}.tar.bz2"; 18 - sha256 = "0v9nk51wh55pcbnf2jr36yarz8ayajn6d7ywiq2wagivn9c8c40r"; 18 + sha256 = "sha256-Ta5v3NK7C7bDe1+Xwzwr6VTadDmFNpzdrDVG4yGL/7g="; 19 19 }; 20 20 21 21 outputs = [ "bin" "dev" "out" "doc" "man" ];
+2 -2
pkgs/development/libraries/plasma-wayland-protocols/default.nix
··· 7 7 8 8 mkDerivation rec { 9 9 pname = "plasma-wayland-protocols"; 10 - version = "1.4.0"; 10 + version = "1.5.0"; 11 11 12 12 src = fetchurl { 13 13 url = "mirror://kde/stable/${pname}/${pname}-${version}.tar.xz"; 14 - sha256 = "sha256-OLBDHZMagzk3cKu4KUIGk2tjuJzu4/DGPw8Ibz0rG6k="; 14 + sha256 = "sha256-zMn8INehMO2/sjPDOxMldArAGyZAqjelxUTtv7oYqDM="; 15 15 }; 16 16 17 17 nativeBuildInputs = [ extra-cmake-modules ];
+3 -2
pkgs/development/libraries/pocketsphinx/default.nix
··· 7 7 }: 8 8 9 9 stdenv.mkDerivation rec { 10 - name = "pocketsphinx-5prealpha"; 10 + pname = "pocketsphinx"; 11 + version = "5prealpha"; 11 12 12 13 src = fetchurl { 13 - url = "mirror://sourceforge/cmusphinx/${name}.tar.gz"; 14 + url = "mirror://sourceforge/cmusphinx/pocketsphinx-${version}.tar.gz"; 14 15 sha256 = "1n9yazzdgvpqgnfzsbl96ch9cirayh74jmpjf7svs4i7grabanzg"; 15 16 }; 16 17
+3 -2
pkgs/development/libraries/pth/default.nix
··· 1 1 { lib, stdenv, fetchurl }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "pth-2.0.7"; 4 + pname = "pth"; 5 + version = "2.0.7"; 5 6 6 7 src = fetchurl { 7 - url = "mirror://gnu/pth/${name}.tar.gz"; 8 + url = "mirror://gnu/pth/pth-${version}.tar.gz"; 8 9 sha256 = "0ckjqw5kz5m30srqi87idj7xhpw6bpki43mj07bazjm2qmh3cdbj"; 9 10 }; 10 11
+5 -3
pkgs/development/libraries/qtscriptgenerator/default.nix
··· 1 1 { lib, stdenv, fetchurl, qt4 }: 2 2 3 - stdenv.mkDerivation { 4 - name = "qtscriptgenerator-0.1.0"; 3 + stdenv.mkDerivation rec { 4 + pname = "qtscriptgenerator"; 5 + version = "0.1.0"; 6 + 5 7 src = fetchurl { 6 - url = "https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/qtscriptgenerator/qtscriptgenerator-src-0.1.0.tar.gz"; 8 + url = "https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/qtscriptgenerator/qtscriptgenerator-src-${version}.tar.gz"; 7 9 sha256 = "0h8zjh38n2wfz7jld0jz6a09y66dbsd2jhm4f2024qfgcmxcabj6"; 8 10 }; 9 11 buildInputs = [ qt4 ];
+4 -3
pkgs/development/libraries/qwt/6.nix
··· 1 1 { lib, stdenv, fetchurl, qtbase, qtsvg, qttools, qmake }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "qwt-6.1.6"; 4 + pname = "qwt"; 5 + version = "6.1.6"; 5 6 6 7 src = fetchurl { 7 - url = "mirror://sourceforge/qwt/${name}.tar.bz2"; 8 + url = "mirror://sourceforge/qwt/qwt-${version}.tar.bz2"; 8 9 sha256 = "sha256-mUYNMcEV7kEXsBddiF9HwsWQ14QgbwmBXcBY++Xt4fY="; 9 10 }; 10 11 ··· 16 15 sed -e "s|QWT_INSTALL_PREFIX.*=.*|QWT_INSTALL_PREFIX = $out|g" -i qwtconfig.pri 17 16 ''; 18 17 19 - qmakeFlags = [ "-after doc.path=$out/share/doc/${name}" ]; 18 + qmakeFlags = [ "-after doc.path=$out/share/doc/qwt-${version}" ]; 20 19 21 20 dontWrapQtApps = true; 22 21
+4 -3
pkgs/development/libraries/qwt/6_qt4.nix
··· 1 1 { lib, stdenv, fetchurl, qt4, qmake4Hook, AGL }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "qwt-6.1.5"; 4 + pname = "qwt"; 5 + version = "6.1.5"; 5 6 6 7 src = fetchurl { 7 - url = "mirror://sourceforge/qwt/${name}.tar.bz2"; 8 + url = "mirror://sourceforge/qwt/qwt-${version}.tar.bz2"; 8 9 sha256 = "0hf0mpca248xlqn7xnzkfj8drf19gdyg5syzklvq8pibxiixwxj0"; 9 10 }; 10 11 ··· 28 27 install_name_tool -id "$out/lib/qwt.framework/Versions/6/qwt" "$out/lib/qwt.framework/Versions/6/qwt" 29 28 ''; 30 29 31 - qmakeFlags = [ "-after doc.path=$out/share/doc/${name}" ]; 30 + qmakeFlags = [ "-after doc.path=$out/share/doc/qwt-${version}" ]; 32 31 33 32 meta = with lib; { 34 33 description = "Qt widgets for technical applications";
+4 -3
pkgs/development/libraries/rabbitmq-java-client/default.nix
··· 1 1 { fetchurl, lib, stdenv, ant, jdk, jre, python, makeWrapper }: 2 2 3 - stdenv.mkDerivation { 4 - name = "rabbitmq-java-client-3.3.4"; 3 + stdenv.mkDerivation rec { 4 + pname = "rabbitmq-java-client"; 5 + version = "3.3.4"; 5 6 6 7 src = fetchurl { 7 - url = "https://www.rabbitmq.com/releases/rabbitmq-java-client/v3.3.4/rabbitmq-java-client-3.3.4.tar.gz"; 8 + url = "https://www.rabbitmq.com/releases/rabbitmq-java-client/v${version}/rabbitmq-java-client-${version}.tar.gz"; 8 9 sha256 = "03kspkgzzjsbq6f8yl2zj5m30qwgxv3l58hrbf6gcgxb5rpfk6sh"; 9 10 }; 10 11
+4 -3
pkgs/development/libraries/readline/5.x.nix
··· 1 1 { lib, stdenv, fetchurl, ncurses }: 2 2 3 - stdenv.mkDerivation { 4 - name = "readline-5.2"; 3 + stdenv.mkDerivation rec { 4 + pname = "readline"; 5 + version = "5.2"; 5 6 6 7 src = fetchurl { 7 - url = "mirror://gnu/readline/readline-5.2.tar.gz"; 8 + url = "mirror://gnu/readline/readline-${version}.tar.gz"; 8 9 sha256 = "0icz4hqqq8mlkwrpczyaha94kns0am9z0mh3a2913kg2msb8vs0j"; 9 10 }; 10 11
+4 -3
pkgs/development/libraries/readline/6.2.nix
··· 2 2 }: 3 3 4 4 stdenv.mkDerivation (rec { 5 - name = "readline-6.2"; 5 + pname = "readline"; 6 + version = "6.2"; 6 7 7 8 src = fetchurl { 8 - url = "mirror://gnu/readline/${name}.tar.gz"; 9 + url = "mirror://gnu/readline/readline-${version}.tar.gz"; 9 10 sha256 = "10ckm2bd2rkxhvdmj7nmbsylmihw0abwcsnxf8y27305183rd9kr"; 10 11 }; 11 12 ··· 22 21 (let 23 22 patch = nr: sha256: 24 23 fetchurl { 25 - url = "mirror://gnu/readline/${name}-patches/readline62-${nr}"; 24 + url = "mirror://gnu/readline/readline-${version}-patches/readline62-${nr}"; 26 25 inherit sha256; 27 26 }; 28 27 in
+2 -1
pkgs/development/libraries/readline/6.3.nix
··· 1 1 { fetchurl, lib, stdenv, ncurses }: 2 2 3 3 stdenv.mkDerivation { 4 - name = "readline-6.3p08"; 4 + pname = "readline"; 5 + version = "6.3p08"; 5 6 6 7 src = fetchurl { 7 8 url = "mirror://gnu/readline/readline-6.3.tar.gz";
+3 -2
pkgs/development/libraries/resolv_wrapper/default.nix
··· 1 1 { lib, stdenv, fetchurl, cmake, pkg-config }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "resolv_wrapper-1.1.7"; 4 + pname = "resolv_wrapper"; 5 + version = "1.1.7"; 5 6 6 7 src = fetchurl { 7 - url = "mirror://samba/cwrap/${name}.tar.gz"; 8 + url = "mirror://samba/cwrap/resolv_wrapper-${version}.tar.gz"; 8 9 sha256 = "sha256-Rgrn/V5TSFvn3ZmlXFki8csWNrnoghmB1JrRZQfIoHQ="; 9 10 }; 10 11
+4 -3
pkgs/development/libraries/rlog/default.nix
··· 1 1 { lib, stdenv, fetchurl }: 2 2 3 - stdenv.mkDerivation { 4 - name = "rlog-1.4"; 3 + stdenv.mkDerivation rec { 4 + pname = "rlog"; 5 + version = "1.4"; 5 6 6 7 src = fetchurl { 7 - url = "http://rlog.googlecode.com/files/rlog-1.4.tar.gz"; 8 + url = "http://rlog.googlecode.com/files/rlog-${version}.tar.gz"; 8 9 sha256 = "0y9zg0pd7vmnskwac1qdyzl282z7kb01nmn57lsg2mjdxgnywf59"; 9 10 }; 10 11
+9
pkgs/development/libraries/science/math/liblapack/default.nix
··· 1 1 { lib 2 2 , stdenv 3 3 , fetchFromGitHub 4 + , fetchpatch 4 5 , gfortran 5 6 , cmake 6 7 , shared ? true ··· 17 16 rev = "v${version}"; 18 17 sha256 = "sha256-ewYUM+M7jDO5LLnB4joiKkqgXjEDmWbFZbgad8x98gc="; 19 18 }; 19 + 20 + patches = [ 21 + (fetchpatch { 22 + name = "CVE-2021-4048.patch"; 23 + url = "https://github.com/Reference-LAPACK/lapack/commit/0631b6beaed60ba118b0b027c0f8d35397bf5df0.patch"; 24 + sha256 = "1bqjw3f6ak9iz97y7ckn0rrfcgrzbn9prgfasl489qpxgzp2kjh8"; 25 + }) 26 + ]; 20 27 21 28 nativeBuildInputs = [ gfortran cmake ]; 22 29
+7 -1
pkgs/development/libraries/science/math/openblas/default.nix
··· 208 208 done 209 209 210 210 # Setup symlinks for blas / lapack 211 + '' + lib.optionalString enableShared '' 211 212 ln -s $out/lib/libopenblas${shlibExt} $out/lib/libblas${shlibExt} 212 213 ln -s $out/lib/libopenblas${shlibExt} $out/lib/libcblas${shlibExt} 213 214 ln -s $out/lib/libopenblas${shlibExt} $out/lib/liblapack${shlibExt} 214 215 ln -s $out/lib/libopenblas${shlibExt} $out/lib/liblapacke${shlibExt} 215 - '' + lib.optionalString stdenv.hostPlatform.isLinux '' 216 + '' + lib.optionalString (stdenv.hostPlatform.isLinux && enableShared) '' 216 217 ln -s $out/lib/libopenblas${shlibExt} $out/lib/libblas${shlibExt}.3 217 218 ln -s $out/lib/libopenblas${shlibExt} $out/lib/libcblas${shlibExt}.3 218 219 ln -s $out/lib/libopenblas${shlibExt} $out/lib/liblapack${shlibExt}.3 219 220 ln -s $out/lib/libopenblas${shlibExt} $out/lib/liblapacke${shlibExt}.3 221 + '' + lib.optionalString enableStatic '' 222 + ln -s $out/lib/libopenblas.a $out/lib/libblas.a 223 + ln -s $out/lib/libopenblas.a $out/lib/libcblas.a 224 + ln -s $out/lib/libopenblas.a $out/lib/liblapack.a 225 + ln -s $out/lib/libopenblas.a $out/lib/liblapacke.a 220 226 ''; 221 227 222 228 meta = with lib; {
+3 -2
pkgs/development/libraries/shapelib/default.nix
··· 1 1 { lib, stdenv, fetchurl }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "shapelib-1.5.0"; 4 + pname = "shapelib"; 5 + version = "1.5.0"; 5 6 6 7 src = fetchurl { 7 - url = "https://download.osgeo.org/shapelib/${name}.tar.gz"; 8 + url = "https://download.osgeo.org/shapelib/shapelib-${version}.tar.gz"; 8 9 sha256 = "1qfsgb8b3yiqwvr6h9m81g6k9fjhfys70c22p7kzkbick20a9h0z"; 9 10 }; 10 11
+3 -2
pkgs/development/libraries/shhmsg/default.nix
··· 1 1 { lib, stdenv, fetchurl }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "shhmsg-1.4.2"; 4 + pname = "shhmsg"; 5 + version = "1.4.2"; 5 6 6 7 src = fetchurl { 7 - url = "https://shh.thathost.com/pub-unix/files/${name}.tar.gz"; 8 + url = "https://shh.thathost.com/pub-unix/files/shhmsg-${version}.tar.gz"; 8 9 sha256 = "0ax02fzqpaxr7d30l5xbndy1s5vgg1ag643c7zwiw2wj1czrxil8"; 9 10 }; 10 11
+3 -2
pkgs/development/libraries/sparsehash/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "sparsehash-2.0.4"; 4 + pname = "sparsehash"; 5 + version = "2.0.4"; 5 6 6 7 src = fetchFromGitHub { 7 8 owner = "sparsehash"; 8 9 repo = "sparsehash"; 9 - rev = name; 10 + rev = "sparsehash-${version}"; 10 11 sha256 = "1pf1cjvcjdmb9cd6gcazz64x0cd2ndpwh6ql2hqpypjv725xwxy7"; 11 12 }; 12 13
+3 -2
pkgs/development/libraries/speex/default.nix
··· 1 1 { lib, stdenv, fetchurl, autoreconfHook, pkg-config, fftw, speexdsp }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "speex-1.2.0"; 4 + pname = "speex"; 5 + version = "1.2.0"; 5 6 6 7 src = fetchurl { 7 - url = "http://downloads.us.xiph.org/releases/speex/${name}.tar.gz"; 8 + url = "http://downloads.us.xiph.org/releases/speex/speex-${version}.tar.gz"; 8 9 sha256 = "150047wnllz4r94whb9r73l5qf0z5z3rlhy98bawfbblmkq8mbpa"; 9 10 }; 10 11
+3 -2
pkgs/development/libraries/sphinxbase/default.nix
··· 8 8 }: 9 9 10 10 stdenv.mkDerivation (rec { 11 - name = "sphinxbase-5prealpha"; 11 + pname = "sphinxbase"; 12 + version = "5prealpha"; 12 13 13 14 src = fetchurl { 14 - url = "mirror://sourceforge/cmusphinx/${name}.tar.gz"; 15 + url = "mirror://sourceforge/cmusphinx/sphinxbase-${version}.tar.gz"; 15 16 sha256 = "0vr4k8pv5a8nvq9yja7kl13b5lh0f9vha8fc8znqnm8bwmcxnazp"; 16 17 }; 17 18
+6 -7
pkgs/development/libraries/wayland/default.nix
··· 30 30 in 31 31 stdenv.mkDerivation rec { 32 32 pname = "wayland"; 33 - version = "1.19.0"; 33 + version = "1.20.0"; 34 34 35 35 src = fetchurl { 36 36 url = "https://wayland.freedesktop.org/releases/${pname}-${version}.tar.xz"; 37 - sha256 = "05bd2vphyx8qwa1mhsj1zdaiv4m4v94wrlssrn0lad8d601dkk5s"; 37 + sha256 = "09c7rpbwavjg4y16mrfa57gk5ix6rnzpvlnv1wp7fnbh9hak985q"; 38 38 }; 39 39 40 40 patches = [ 41 - # Picked from upstream 'main' branch for Darwin support. 42 - (fetchpatch { 43 - url = "https://gitlab.freedesktop.org/wayland/wayland/-/commit/f452e41264387dee4fd737cbf1af58b34b53941b.patch"; 44 - sha256 = "00mk32a01vgn31sm3wk4p8mfwvqv3xv02rxvdj1ygnzgb1ac62r7"; 45 - }) 46 41 (substituteAll { 47 42 src = ./0001-add-placeholder-for-nm.patch; 48 43 nm = "${stdenv.cc.targetPrefix}nm"; ··· 46 51 47 52 postPatch = lib.optionalString withDocumentation '' 48 53 patchShebangs doc/doxygen/gen-doxygen.py 54 + '' + lib.optionalString stdenv.hostPlatform.isStatic '' 55 + # delete line containing os-wrappers-test, disables 56 + # the building of os-wrappers-test 57 + sed -i '/os-wrappers-test/d' tests/meson.build 49 58 ''; 50 59 51 60 outputs = [ "out" "bin" "dev" ] ++ lib.optionals withDocumentation [ "doc" "man" ];
+64
pkgs/development/libraries/wlroots/0.15.nix
··· 1 + { lib, stdenv, fetchFromGitLab, meson_0_60, ninja, pkg-config, wayland-scanner 2 + , libGL, wayland, wayland-protocols, libinput, libxkbcommon, pixman 3 + , xcbutilwm, libX11, libcap, xcbutilimage, xcbutilerrors, mesa 4 + , libpng, ffmpeg, xcbutilrenderutil, seatd, vulkan-loader, glslang 5 + 6 + , enableXWayland ? true, xwayland ? null 7 + }: 8 + 9 + stdenv.mkDerivation rec { 10 + pname = "wlroots"; 11 + version = "0.15.0"; 12 + 13 + src = fetchFromGitLab { 14 + domain = "gitlab.freedesktop.org"; 15 + owner = "wlroots"; 16 + repo = "wlroots"; 17 + rev = version; 18 + sha256 = "0wdzs0wpv61pxgy3mx3xjsndyfmbj30v47d3w9ymmnd4r479n41n"; 19 + }; 20 + 21 + # $out for the library and $examples for the example programs (in examples): 22 + outputs = [ "out" "examples" ]; 23 + 24 + depsBuildBuild = [ pkg-config ]; 25 + 26 + nativeBuildInputs = [ meson_0_60 ninja pkg-config wayland-scanner ]; 27 + 28 + buildInputs = [ 29 + libGL wayland wayland-protocols libinput libxkbcommon pixman 30 + xcbutilwm libX11 libcap xcbutilimage xcbutilerrors mesa 31 + libpng ffmpeg xcbutilrenderutil seatd vulkan-loader glslang 32 + ] 33 + ++ lib.optional enableXWayland xwayland 34 + ; 35 + 36 + mesonFlags = 37 + lib.optional (!enableXWayland) "-Dxwayland=disabled" 38 + ; 39 + 40 + postFixup = '' 41 + # Install ALL example programs to $examples: 42 + # screencopy dmabuf-capture input-inhibitor layer-shell idle-inhibit idle 43 + # screenshot output-layout multi-pointer rotation tablet touch pointer 44 + # simple 45 + mkdir -p $examples/bin 46 + cd ./examples 47 + for binary in $(find . -executable -type f -printf '%P\n' | grep -vE '\.so'); do 48 + cp "$binary" "$examples/bin/wlroots-$binary" 49 + done 50 + ''; 51 + 52 + meta = with lib; { 53 + description = "A modular Wayland compositor library"; 54 + longDescription = '' 55 + Pluggable, composable, unopinionated modules for building a Wayland 56 + compositor; or about 50,000 lines of code you were going to write anyway. 57 + ''; 58 + inherit (src.meta) homepage; 59 + changelog = "https://gitlab.freedesktop.org/wlroots/wlroots/-/tags/${version}"; 60 + license = licenses.mit; 61 + platforms = platforms.linux; 62 + maintainers = with maintainers; [ primeos synthetica ]; 63 + }; 64 + }
pkgs/development/libraries/wlroots/default.nix pkgs/development/libraries/wlroots/0.14.nix
+2 -2
pkgs/development/python-modules/aiohttp-socks/default.nix
··· 2 2 3 3 buildPythonPackage rec { 4 4 pname = "aiohttp-socks"; 5 - version = "0.6.0"; 5 + version = "0.7.1"; 6 6 7 7 src = fetchPypi { 8 8 inherit version; 9 9 pname = "aiohttp_socks"; 10 - sha256 = "04w010bvi719ifpc3sshav95k10hf9nq8czn9yglkj206yxcypdr"; 10 + sha256 = "2215cac4891ef3fa14b7d600ed343ed0f0a670c23b10e4142aa862b3db20341a"; 11 11 }; 12 12 13 13 propagatedBuildInputs = [ aiohttp attrs python-socks ];
+2 -2
pkgs/development/python-modules/aiopvpc/default.nix
··· 15 15 16 16 buildPythonPackage rec { 17 17 pname = "aiopvpc"; 18 - version = "2.2.4"; 18 + version = "2.3.0"; 19 19 format = "pyproject"; 20 20 21 21 disabled = pythonOlder "3.8"; ··· 24 24 owner = "azogue"; 25 25 repo = pname; 26 26 rev = "v${version}"; 27 - sha256 = "sha256-39cGDbaBS5we+WbqvABe6tKwTmbgd+NYLssKQCOuBsc="; 27 + sha256 = "1rj71lk7yjwpcbcgd51sls4wja1i4v509nljbviy5bxrfmi434qv"; 28 28 }; 29 29 30 30 nativeBuildInputs = [
+2 -1
pkgs/development/python-modules/amqtt/default.nix
··· 28 28 29 29 postPatch = '' 30 30 substituteInPlace pyproject.toml \ 31 - --replace 'websockets = "^9.0"' 'websockets = "^10.0"' 31 + --replace 'websockets = "^9.0"' 'websockets = "^10.0"' \ 32 + --replace 'PyYAML = "^5.4.0"' 'PyYAML = "*"' \ 32 33 ''; 33 34 34 35 nativeBuildInputs = [ poetry-core ];
+7 -1
pkgs/development/python-modules/astropy-extension-helpers/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 3 , fetchPypi 4 + , findutils 4 5 , pytestCheckHook 5 6 }: 6 7 ··· 17 16 18 17 patches = [ ./permissions.patch ]; 19 18 20 - checkInputs = [ pytestCheckHook ]; 19 + checkInputs = [ findutils pytestCheckHook ]; 20 + 21 + # avoid import mismatch errors, as conftest.py is copied to build dir 22 + pytestFlagsArray = [ 23 + "extension_helpers" 24 + ]; 21 25 22 26 pythonImportsCheck = [ 23 27 "extension_helpers"
+2 -2
pkgs/development/python-modules/aws-xray-sdk/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "aws-xray-sdk"; 15 - version = "2.8.0"; 15 + version = "2.9.0"; 16 16 17 17 src = fetchPypi { 18 18 inherit pname version; 19 - sha256 = "90c2fcc982a770e86d009a4c3d2b5c3e372da91cb8284d982bae458e2c0bb268"; 19 + sha256 = "b0cd972db218d4d8f7b53ad806fc6184626b924c4997ae58fc9f2a8cd1281568"; 20 20 }; 21 21 22 22 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/azure-core/default.nix
··· 15 15 }: 16 16 17 17 buildPythonPackage rec { 18 - version = "1.20.1"; 18 + version = "1.21.1"; 19 19 pname = "azure-core"; 20 20 disabled = isPy27; 21 21 22 22 src = fetchPypi { 23 23 inherit pname version; 24 24 extension = "zip"; 25 - sha256 = "21d06311c9c373e394ed9f9db035306773334a0181932e265889eca34d778d17"; 25 + sha256 = "88d2db5cf9a135a7287dc45fdde6b96f9ca62c9567512a3bb3e20e322ce7deb2"; 26 26 }; 27 27 28 28 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/backports-entry-points-selectable/default.nix
··· 2 2 3 3 buildPythonPackage rec { 4 4 pname = "backports-entry-points-selectable"; 5 - version = "1.1.0"; 5 + version = "1.1.1"; 6 6 7 7 src = fetchPypi { 8 8 pname = "backports.entry_points_selectable"; 9 9 inherit version; 10 - sha256 = "988468260ec1c196dab6ae1149260e2f5472c9110334e5d51adcb77867361f6a"; 10 + sha256 = "914b21a479fde881635f7af5adc7f6e38d6b274be32269070c53b698c60d5386"; 11 11 }; 12 12 13 13 nativeBuildInputs = [ setuptools-scm ];
+2 -2
pkgs/development/python-modules/black/default.nix
··· 20 20 21 21 buildPythonPackage rec { 22 22 pname = "black"; 23 - version = "21.10b0"; 23 + version = "21.12b0"; 24 24 25 25 disabled = pythonOlder "3.6"; 26 26 27 27 src = fetchPypi { 28 28 inherit pname version; 29 - sha256 = "sha256-qZUiKQkuMl/l89rlbYH2ObI/cTHrhAeBlH5LKIYDDzM="; 29 + sha256 = "sha256-d7gPaTpWni5SeVhFljTxjfmwuiYluk4MLV2lvkLm8rM="; 30 30 }; 31 31 32 32 nativeBuildInputs = [ setuptools-scm ];
+2 -2
pkgs/development/python-modules/boto3/default.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "boto3"; 16 - version = "1.20.13"; # N.B: if you change this, change botocore and awscli to a matching version 16 + version = "1.20.21"; # N.B: if you change this, change botocore and awscli to a matching version 17 17 18 18 src = fetchPypi { 19 19 inherit pname version; 20 - sha256 = "bbf53a077d6a0575ddec8026f0475ca6ee6f41b227914bf315bf3e049a3d653a"; 20 + sha256 = "2fb05cbe81b9ce11d9394fc6c4ffa5fd1cceb114dc1d2887dc61081707e44522"; 21 21 }; 22 22 23 23 propagatedBuildInputs = [ botocore jmespath s3transfer ] ++ lib.optionals (!isPy3k) [ futures ];
+2 -2
pkgs/development/python-modules/botocore/default.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "botocore"; 16 - version = "1.23.14"; # N.B: if you change this, change boto3 and awscli to a matching version 16 + version = "1.23.21"; # N.B: if you change this, change boto3 and awscli to a matching version 17 17 18 18 src = fetchPypi { 19 19 inherit pname version; 20 - sha256 = "sha256-6NUsvy5zxiaM8sIH9H48+z7eCYP5PotZZ0tUYo5+8fE="; 20 + sha256 = "d7f8e82cba38aa1e66015cab0a5ca3204503e90afc4695e97228e28329a14c04"; 21 21 }; 22 22 23 23 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/cfn-lint/default.nix
··· 23 23 24 24 buildPythonPackage rec { 25 25 pname = "cfn-lint"; 26 - version = "0.56.2"; 26 + version = "0.56.3"; 27 27 28 28 src = fetchFromGitHub { 29 29 owner = "aws-cloudformation"; 30 30 repo = "cfn-python-lint"; 31 31 rev = "v${version}"; 32 - sha256 = "0wpsj719r0p122qmi3nznzqnxqb0nx53isg9fma75894pvq2v5wc"; 32 + sha256 = "12r0zxwidf4vdbbpzlhlmgc2as5bn45yf663f00iv6px0glq02zs"; 33 33 }; 34 34 35 35 postPatch = ''
+2 -2
pkgs/development/python-modules/chiapos/default.nix
··· 14 14 15 15 buildPythonPackage rec { 16 16 pname = "chiapos"; 17 - version = "1.0.6"; 17 + version = "1.0.7"; 18 18 disabled = pythonOlder "3.7"; 19 19 20 20 src = fetchPypi { 21 21 inherit pname version; 22 - sha256 = "sha256-Zh5AULPgbG0oYPcBZMp/vm94MPyfdtYn4P5V+1LeMqA="; 22 + sha256 = "1e10ce00730d293ed83ed3a3c630d525c9256fe4e31e64abbda7aa054b8a753f"; 23 23 }; 24 24 25 25 patches = [
+2 -2
pkgs/development/python-modules/cmd2/default.nix
··· 18 18 19 19 buildPythonPackage rec { 20 20 pname = "cmd2"; 21 - version = "2.3.2"; 21 + version = "2.3.3"; 22 22 23 23 disabled = pythonOlder "3.6"; 24 24 25 25 src = fetchPypi { 26 26 inherit pname version; 27 - sha256 = "cad18787a26147dad4b161d75c5ab7de16ffe91fef1cfad8e6f18b712746e800"; 27 + sha256 = "750d7eb04d55c3bc2a413e191bc177856f388102de47d11f2210a35266543640"; 28 28 }; 29 29 30 30 LC_ALL = "en_US.UTF-8";
+2 -3
pkgs/development/python-modules/cocotb/default.nix
··· 5 5 , setuptools 6 6 , setuptools-scm 7 7 , cocotb-bus 8 - , pytest 8 + , pytestCheckHook 9 9 , swig 10 10 , verilog 11 11 }: ··· 42 42 substituteInPlace setup.py --replace "'cocotb-bus<1.0'" "" 43 43 ''; 44 44 45 - checkInputs = [ cocotb-bus pytest swig verilog ]; 45 + checkInputs = [ cocotb-bus pytestCheckHook swig verilog ]; 46 46 47 47 checkPhase = '' 48 48 export PATH=$out/bin:$PATH 49 - make test 50 49 ''; 51 50 52 51 meta = with lib; {
+2 -2
pkgs/development/python-modules/configparser/default.nix
··· 2 2 3 3 buildPythonPackage rec { 4 4 pname = "configparser"; 5 - version = "5.1.0"; 5 + version = "5.2.0"; 6 6 7 7 src = fetchPypi { 8 8 inherit pname version; 9 - sha256 = "202b9679a809b703720afa2eacaad4c6c2d63196070e5d9edc953c0489dfd536"; 9 + sha256 = "1b35798fdf1713f1c3139016cfcbc461f09edbf099d1fb658d4b7479fcaa3daa"; 10 10 }; 11 11 12 12 # No tests available
+2 -3
pkgs/development/python-modules/construct/2.10.54.nix
··· 14 14 sha256 = "1mqspsn6bf3ibvih1zna2glkg8iw7vy5zg9gzg0d1m8zcndk2c48"; 15 15 }; 16 16 17 - checkInputs = [ pytestCheckHook pytest-benchmark enum34 numpy ]; 17 + checkInputs = [ pytestCheckHook enum34 numpy ]; 18 18 19 19 # these have dependencies that are broken on Python 2 20 20 disabledTestPaths = [ ··· 24 24 ]; 25 25 26 26 disabledTests = [ 27 + "test_benchmarks" 27 28 "test_timestamp" 28 29 ] ++ lib.optionals stdenv.isDarwin [ 29 30 "test_multiprocessing" 30 31 ]; 31 - 32 - pytestFlagsArray = [ "--benchmark-disable" ]; 33 32 34 33 meta = with lib; { 35 34 description = "Powerful declarative parser (and builder) for binary data";
+2 -4
pkgs/development/python-modules/construct/default.nix
··· 22 22 lz4 23 23 ]; 24 24 25 - checkInputs = [ pytestCheckHook pytest-benchmark numpy arrow ruamel-yaml cloudpickle ]; 25 + checkInputs = [ pytestCheckHook numpy arrow ruamel-yaml cloudpickle ]; 26 26 27 - disabledTests = lib.optionals stdenv.isDarwin [ "test_multiprocessing" ]; 28 - 29 - pytestFlagsArray = [ "--benchmark-disable" ]; 27 + disabledTests = [ "test_benchmarks" ] ++ lib.optionals stdenv.isDarwin [ "test_multiprocessing" ]; 30 28 31 29 meta = with lib; { 32 30 description = "Powerful declarative parser (and builder) for binary data";
+2 -2
pkgs/development/python-modules/croniter/default.nix
··· 10 10 11 11 buildPythonPackage rec { 12 12 pname = "croniter"; 13 - version = "1.0.15"; 13 + version = "1.1.0"; 14 14 15 15 src = fetchPypi { 16 16 inherit pname version; 17 - sha256 = "06c2smrjskd9di8lcpymcxmygncxr14932qjhslc37yyaafzq3d7"; 17 + sha256 = "4023e4d18ced979332369964351e8f4f608c1f7c763e146b1d740002c4245247"; 18 18 }; 19 19 20 20 propagatedBuildInputs = [
+3 -3
pkgs/development/python-modules/cryptography/default.nix
··· 21 21 22 22 buildPythonPackage rec { 23 23 pname = "cryptography"; 24 - version = "3.4.8"; # Also update the hash in vectors.nix 24 + version = "36.0.0"; # Also update the hash in vectors.nix 25 25 26 26 src = fetchPypi { 27 27 inherit pname version; 28 - sha256 = "072awar70cwfd2hnx0pvp1dkc7gw45mbm3wcyddvxz5frva5xk4l"; 28 + sha256 = "0zshc1jaavykdnic5ns8zax6gqganys6gp5f35bqcfggnkn6kxsj"; 29 29 }; 30 30 31 31 cargoDeps = rustPlatform.fetchCargoTarball { 32 32 inherit src; 33 33 sourceRoot = "${pname}-${version}/${cargoRoot}"; 34 34 name = "${pname}-${version}"; 35 - sha256 = "01h511h6l4qvjxbaw662m1l84pb4wrhwxmnb3qj6ik13mx2m477m"; 35 + sha256 = "1nbw4cfshyc125jwdivg9gxy52qcd1iz31lypl95ij9bn1dyx933"; 36 36 }; 37 37 38 38 cargoRoot = "src/rust";
+1 -1
pkgs/development/python-modules/cryptography/vectors.nix
··· 7 7 8 8 src = fetchPypi { 9 9 inherit pname version; 10 - sha256 = "1wl0ynh3lzhc6q59g8mybvijmnp195x7fjxlb3h3sgcraw14312c"; 10 + sha256 = "19gs051jbsixxwhlfs4xdxpzg8w1vypzpz3w56bp9x01qwzfbdy6"; 11 11 }; 12 12 13 13 # No tests included
+2 -2
pkgs/development/python-modules/cx_freeze/default.nix
··· 2 2 3 3 buildPythonPackage rec { 4 4 pname = "cx_Freeze"; 5 - version = "6.8.3"; 5 + version = "6.8.4"; 6 6 7 7 src = fetchPypi { 8 8 inherit pname version; 9 - sha256 = "05e7a2b099d4eb36e74116311b693dcc3103763aee92ef32079be0b6d4832fa0"; 9 + sha256 = "aec66432bc207b699b252f9468e8cc6d61efda72269cab3a3231d6f95c0328f9"; 10 10 }; 11 11 12 12 disabled = pythonOlder "3.5";
+4
pkgs/development/python-modules/dbus/default.nix
··· 23 23 MACOSX_DEPLOYMENT_TARGET=10.16 24 24 '' else null; 25 25 26 + configureFlags = [ 27 + "PYTHON_VERSION=${lib.versions.major python.version}" 28 + ]; 29 + 26 30 nativeBuildInputs = [ pkg-config ]; 27 31 buildInputs = [ dbus dbus-glib ] 28 32 # My guess why it's sometimes trying to -lncurses.
+2
pkgs/development/python-modules/devtools/default.nix
··· 37 37 disabledTests = [ 38 38 # Test for Windows32 39 39 "test_print_subprocess" 40 + # sensitive to timing 41 + "test_multiple_not_verbose" 40 42 ]; 41 43 42 44 pythonImportsCheck = [
+2 -2
pkgs/development/python-modules/diff-cover/default.nix
··· 16 16 17 17 buildPythonPackage rec { 18 18 pname = "diff-cover"; 19 - version = "5.4.0"; 19 + version = "5.5.0"; 20 20 disabled = pythonOlder "3.6"; 21 21 22 22 src = fetchPypi { 23 23 pname = "diff_cover"; 24 24 inherit version; 25 - sha256 = "sha256-4iQ9/QcXh/lW8HE6wFZWc6Y57xhAEWu2TQnIUZJNAMs="; 25 + sha256 = "e2d36131c13f571d9f5c4109b9e08b71ed00757eabec0156de74e33f6ef5627f"; 26 26 }; 27 27 28 28 propagatedBuildInputs = [
+3 -2
pkgs/development/python-modules/diofant/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "diofant"; 15 - version = "0.12.0"; 15 + version = "0.13.0"; 16 16 disabled = pythonOlder "3.9"; 17 + format = "pyproject"; 17 18 18 19 src = fetchPypi { 19 20 inherit version; 20 21 pname = "Diofant"; 21 - sha256 = "sha256-G0CTSoDSduiWxlrk5XjnX5ldNZ9f7yxaJeUPO3ezJgo="; 22 + sha256 = "bac9e086a7156b20f18e3291d6db34e305338039a3c782c585302d377b74dd3c"; 22 23 }; 23 24 24 25 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/django/2.nix
··· 6 6 7 7 buildPythonPackage rec { 8 8 pname = "Django"; 9 - version = "2.2.24"; 9 + version = "2.2.25"; 10 10 11 11 disabled = !isPy3k; 12 12 13 13 src = fetchPypi { 14 14 inherit pname version; 15 - sha256 = "1dvx3x85lggm91x7mpvaf9nmpxyz7r97pbpnmr2k1qfy0c7gyf9k"; 15 + sha256 = "sha256-seZerzcTR9SxPrfgYbCXhslzBh3pU5DDJ8hcHiqiNJw="; 16 16 }; 17 17 18 18 patches = lib.optional withGdal
+2 -2
pkgs/development/python-modules/django/3.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "Django"; 16 - version = "3.2.9"; 16 + version = "3.2.10"; 17 17 18 18 disabled = pythonOlder "3.7"; 19 19 20 20 src = fetchPypi { 21 21 inherit pname version; 22 - sha256 = "51284300f1522ffcdb07ccbdf676a307c6678659e1284f0618e5a774127a6a08"; 22 + sha256 = "sha256-B06IGLS0Cs3CNp5n3NZVXVWDKXhUCNzSU0DumPHx1cQ="; 23 23 }; 24 24 25 25 patches = lib.optional withGdal
+2
pkgs/development/python-modules/duckdb/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 3 , duckdb 4 + , mypy 4 5 , numpy 5 6 , pandas 6 7 , pybind11 ··· 39 38 40 39 checkInputs = [ 41 40 pytestCheckHook 41 + mypy 42 42 ]; 43 43 44 44 pythonImportsCheck = [ "duckdb" ];
+1
pkgs/development/python-modules/emv/default.nix
··· 21 21 22 22 substituteInPlace setup.py \ 23 23 --replace "click==7.1.2" "click" \ 24 + --replace "terminaltables==3.1.0" "terminaltables~=3.1" \ 24 25 --replace "pyscard==2.0.0" "pyscard" 25 26 ''; 26 27
+2 -2
pkgs/development/python-modules/ephem/default.nix
··· 7 7 8 8 buildPythonPackage rec { 9 9 pname = "ephem"; 10 - version = "4.1.1"; 10 + version = "4.1.2"; 11 11 format = "setuptools"; 12 12 13 13 src = fetchPypi { 14 14 inherit pname version; 15 - sha256 = "sha256-26ngXHjOkQrnWgY1GlWSR5GRqNxXCsDNbRinfpgTiHM="; 15 + sha256 = "d65bf7c85d96ca830de82729d9ce54ba854a9625916d8765c1954c1f29680b76"; 16 16 }; 17 17 18 18 checkInputs = [
+2 -2
pkgs/development/python-modules/faker/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "faker"; 15 - version = "9.3.1"; 15 + version = "9.9.0"; 16 16 17 17 src = fetchPypi { 18 18 pname = "Faker"; 19 19 inherit version; 20 - hash = "sha256-zdnpry+6XJbuLsSshBm7pFjia1iiuYwfZGfuZglr7lI="; 20 + hash = "sha256-cidwOj2zbtgkEQhUdUREX0WqRdsvP2PohcubVpk4Pw4="; 21 21 }; 22 22 23 23 propagatedBuildInputs = [
+1
pkgs/development/python-modules/fe25519/default.nix
··· 31 31 32 32 postPatch = '' 33 33 substituteInPlace setup.py \ 34 + --replace "fountains~=1.1.1" "fountains~=1.2" \ 34 35 --replace "bitlist~=0.5.1" "bitlist>=0.5.1" \ 35 36 --replace "parts~=1.1.2" "parts>=1.1.2" 36 37 '';
+2 -2
pkgs/development/python-modules/fountains/default.nix
··· 6 6 7 7 buildPythonPackage rec { 8 8 pname = "fountains"; 9 - version = "1.1.1"; 9 + version = "1.2.0"; 10 10 11 11 src = fetchPypi { 12 12 inherit pname version; 13 - sha256 = "fbf4e2cb11d60d3bafca5bb7c01c254d08a5541ed7ddfe00ef975eb173fb75a4"; 13 + sha256 = "6de6bc117c376f40a26e111111d638159a2e8a25cfe32f946db0d779decbb70a"; 14 14 }; 15 15 16 16 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/frozendict/default.nix
··· 8 8 9 9 buildPythonPackage rec { 10 10 pname = "frozendict"; 11 - version = "2.1.0"; 11 + version = "2.1.1"; 12 12 format = "setuptools"; 13 13 14 14 disabled = !isPy3k; 15 15 16 16 src = fetchPypi { 17 17 inherit pname version; 18 - sha256 = "0189168749ddea8601afd648146c502533f93ae33840eb76cd71f694742623cd"; 18 + sha256 = "655b879217dd445a2023e16154cc231febef802b5c812d5c2e822280ad69e1dc"; 19 19 }; 20 20 21 21 pythonImportsCheck = [
+2 -2
pkgs/development/python-modules/google-api-python-client/default.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "google-api-python-client"; 16 - version = "2.31.0"; 16 + version = "2.32.0"; 17 17 format = "setuptools"; 18 18 19 19 disabled = pythonOlder "3.6"; 20 20 21 21 src = fetchPypi { 22 22 inherit pname version; 23 - sha256 = "3f64a5eee6fa03ab51806dccf48e342fda83fea60c290518c6a2dfdbf2de9efd"; 23 + sha256 = "619fe50155e73342c17aba4bbb2a08be8ce6ae00b795af383de7d6616b485c94"; 24 24 }; 25 25 26 26 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/google-cloud-bigquery/default.nix
··· 18 18 19 19 buildPythonPackage rec { 20 20 pname = "google-cloud-bigquery"; 21 - version = "2.30.1"; 21 + version = "2.31.0"; 22 22 format = "setuptools"; 23 23 24 24 src = fetchPypi { 25 25 inherit pname version; 26 - sha256 = "4e3b5e3dcc475d5a601d84872ac0b63e059540be2251b1c4165c51106d572855"; 26 + sha256 = "ff66d7d1f64795a855784706c3baa52d18fa0cd1cc4f0a150cf74268abb53ac0"; 27 27 }; 28 28 29 29 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/google-cloud-testutils/default.nix
··· 2 2 3 3 buildPythonPackage rec { 4 4 pname = "google-cloud-testutils"; 5 - version = "1.2.0"; 5 + version = "1.3.0"; 6 6 7 7 src = fetchPypi { 8 8 inherit pname version; 9 - sha256 = "9c60ea86b28998935875b5aea0b89b0a3aac5e433e0039236f633c5d0ff5f8b8"; 9 + sha256 = "7a755c1247e32e92bd6df4fa2240dab185b29da9777ab3b946c3b3d9f1abf5d3"; 10 10 }; 11 11 12 12 propagatedBuildInputs = [ click google-auth six ];
+5
pkgs/development/python-modules/gradient-utils/default.nix
··· 52 52 "test_add_metrics_pushes_metrics" # requires a working prometheus push gateway 53 53 ]; 54 54 55 + disabledTestPaths = [ 56 + # needs network access 57 + "tests/integration/test_metrics.py" 58 + ]; 59 + 55 60 pythonImportsCheck = [ "gradient_utils" ]; 56 61 57 62 meta = with lib; {
+2 -2
pkgs/development/python-modules/gradient/default.nix
··· 22 22 23 23 buildPythonPackage rec { 24 24 pname = "gradient"; 25 - version = "1.8.13"; 25 + version = "1.9.0"; 26 26 27 27 src = fetchPypi { 28 28 inherit pname version; 29 - sha256 = "0fa4a0553c28839e364d3aac27ec7292d26c1df27b8c54701d57eb7eda0b14f2"; 29 + sha256 = "47be02511d7ea66a13559598851cb435d435fb3f7676f6de17292d06daad8947"; 30 30 }; 31 31 32 32 postPatch = ''
+2 -2
pkgs/development/python-modules/humanize/default.nix
··· 9 9 }: 10 10 11 11 buildPythonPackage rec { 12 - version = "3.12.0"; 12 + version = "3.13.1"; 13 13 pname = "humanize"; 14 14 disabled = isPy27; # setup.py no longer compatible 15 15 16 16 src = fetchPypi { 17 17 inherit pname version; 18 - sha256 = "5ec1a66e230a3e31fb3f184aab9436ea13d4e37c168e0ffc345ae5bb57e58be6"; 18 + sha256 = "12f113f2e369dac7f35d3823f49262934f4a22a53a6d3d4c86b736f50db88c7b"; 19 19 }; 20 20 21 21 nativeBuildInputs = [ setuptools-scm ];
+1
pkgs/development/python-modules/hydra/default.nix
··· 23 23 disabledTests = [ 24 24 "test_bash_completion_with_dot_in_path" 25 25 "test_install_uninstall" 26 + "test_config_search_path" 26 27 ]; 27 28 disabledTestPaths = [ "tests/test_hydra.py" ]; 28 29
+2 -2
pkgs/development/python-modules/hypothesis/default.nix
··· 18 18 # If you need these, you can just add them to your environment. 19 19 20 20 pname = "hypothesis"; 21 - version = "6.27.1"; 21 + version = "6.30.1"; 22 22 23 23 # Use github tarballs that includes tests 24 24 src = fetchFromGitHub { 25 25 owner = "HypothesisWorks"; 26 26 repo = "hypothesis-python"; 27 27 rev = "hypothesis-python-${version}"; 28 - sha256 = "05kfz041vrd9fy8gl8ch05g806jj4j6l1cnwhqgygagn9z3aq1jx"; 28 + sha256 = "0nk57v03q7ss7dbsfd9gi3lzl6ngplk7axbiksm26dgkhh4swk8y"; 29 29 }; 30 30 31 31 postUnpack = "sourceRoot=$sourceRoot/hypothesis-python";
+2 -2
pkgs/development/python-modules/imageio/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "imageio"; 15 - version = "2.12.0"; 15 + version = "2.13.2"; 16 16 disabled = isPy27; 17 17 18 18 src = fetchPypi { 19 - sha256 = "c416dd68328ace8536ff333cbb8927954036be56e201fed416e53e8f95e08a6c"; 19 + sha256 = "5b7a55d07de88a2fd70f18a1608ca05ba2b55596a942fb2c390240201009a6c3"; 20 20 inherit pname version; 21 21 }; 22 22
+2 -2
pkgs/development/python-modules/ipykernel/default.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "ipykernel"; 16 - version = "6.5.1"; 16 + version = "6.6.0"; 17 17 18 18 src = fetchPypi { 19 19 inherit pname version; 20 - sha256 = "dd27172bccbbcfef952991e49372e4c6fd1c14eed0df05ebd5b4335cb27a81a2"; 20 + sha256 = "3a227788216b43982d9ac28195949467627b0d16e6b8af9741d95dcaa8c41a89"; 21 21 }; 22 22 23 23 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/ipython/default.nix
··· 22 22 23 23 buildPythonPackage rec { 24 24 pname = "ipython"; 25 - version = "7.29.0"; 25 + version = "7.30.1"; 26 26 disabled = pythonOlder "3.7"; 27 27 28 28 src = fetchPypi { 29 29 inherit pname version; 30 - sha256 = "4f69d7423a5a1972f6347ff233e38bbf4df6a150ef20fbb00c635442ac3060aa"; 30 + sha256 = "cb6aef731bf708a7727ab6cde8df87f0281b1427d41e65d62d4b68934fa54e97"; 31 31 }; 32 32 33 33 prePatch = lib.optionalString stdenv.isDarwin ''
+16 -4
pkgs/development/python-modules/iso8601/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 3 , fetchPypi 4 + , hypothesis 4 5 , pytestCheckHook 6 + , pytz 7 + , pythonOlder 5 8 }: 6 9 7 10 buildPythonPackage rec { 8 11 pname = "iso8601"; 9 - version = "0.1.16"; 12 + version = "1.0.2"; 13 + format = "setuptools"; 14 + 15 + disabled = pythonOlder "3.6"; 10 16 11 17 src = fetchPypi { 12 18 inherit pname version; 13 - sha256 = "sha256-NlMvd8yABZTo8WZB7a5/G695MvBdjlCFRblfxTxtyFs="; 19 + sha256 = "sha256-J/UDIg5oRdnblU+yErlbA2LYt+bBsjJqhwYcPek1lLE="; 14 20 }; 15 21 16 22 checkInputs = [ 23 + hypothesis 17 24 pytestCheckHook 25 + pytz 18 26 ]; 19 27 20 - pytestFlagsArray = [ "iso8601" ]; 28 + pytestFlagsArray = [ 29 + "iso8601" 30 + ]; 21 31 22 - pythonImportsCheck = [ "iso8601" ]; 32 + pythonImportsCheck = [ 33 + "iso8601" 34 + ]; 23 35 24 36 meta = with lib; { 25 37 description = "Simple module to parse ISO 8601 dates";
+1
pkgs/development/python-modules/isort/default.nix
··· 52 52 53 53 disabledTests = [ 54 54 "test_run" # doesn't like paths in /build 55 + "test_fuzz_show_unified_diff" # flakey 55 56 "test_pyi_formatting_issue_942" 56 57 "test_requirements_finder" 57 58 "test_pipfile_finder"
+2 -2
pkgs/development/python-modules/jedi-language-server/default.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "jedi-language-server"; 16 - version = "0.34.11"; 16 + version = "0.34.12"; 17 17 format = "pyproject"; 18 18 19 19 src = fetchFromGitHub { 20 20 owner = "pappasam"; 21 21 repo = pname; 22 22 rev = "v${version}"; 23 - sha256 = "0gxpq93mfyzhjz5yvjwv2jjda1djpf20x38893ngswsm7lrh62x5"; 23 + sha256 = "0v2292sn0c9bl4gsw698hpzcgm115gk4929nx726vh2139qnazqp"; 24 24 }; 25 25 26 26 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/jupyter-packaging/default.nix
··· 10 10 11 11 buildPythonPackage rec { 12 12 pname = "jupyter-packaging"; 13 - version = "0.10.2"; 13 + version = "0.11.1"; 14 14 disabled = pythonOlder "3.7"; 15 15 16 16 src = fetchPypi { 17 17 pname = "jupyter_packaging"; 18 18 inherit version; 19 - sha256 = "sha256-iEX0ht1IwWYM+tGOUJHRwDVA6y6fvzzs8h7LIrabh3A="; 19 + sha256 = "6f5c7eeea98f7f3c8fb41d565a94bf59791768a93f93148b3c2dfb7ebade8eec"; 20 20 }; 21 21 22 22 propagatedBuildInputs = [ deprecation packaging tomlkit ];
+2 -2
pkgs/development/python-modules/jupyterlab-widgets/default.nix
··· 4 4 5 5 buildPythonPackage rec { 6 6 pname = "jupyterlab-widgets"; 7 - version = "1.0.0"; 7 + version = "1.0.2"; 8 8 9 9 src = fetchPypi { 10 10 pname = "jupyterlab_widgets"; 11 11 inherit version; 12 - sha256 = "0y7vhhas3qndiypcpcfnhrj9n92v2w4hdc86nn620s9h9nl2j6jw"; 12 + sha256 = "7885092b2b96bf189c3a705cc3c412a4472ec5e8382d0b47219a66cccae73cfa"; 13 13 }; 14 14 15 15 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/limits/default.nix
··· 2 2 3 3 buildPythonPackage rec { 4 4 pname = "limits"; 5 - version = "1.5.1"; 5 + version = "1.6"; 6 6 7 7 src = fetchPypi { 8 8 inherit pname version; 9 - sha256 = "f0c3319f032c4bfad68438ed1325c0fac86dac64582c7c25cddc87a0b658fa20"; 9 + sha256 = "6c0a57b42647f1141f5a7a0a8479b49e4367c24937a01bd9d4063a595c2dd48a"; 10 10 }; 11 11 12 12 propagatedBuildInputs = [ six ];
+2 -2
pkgs/development/python-modules/lxml/default.nix
··· 8 8 9 9 buildPythonPackage rec { 10 10 pname = "lxml"; 11 - version = "4.6.4-5"; 11 + version = "4.7.1"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = pname; 15 15 repo = pname; 16 16 rev = "lxml-${version}"; 17 - sha256 = "159cc48nl40qsx8pc8sasgny5xc0s3y0xrq3w3aw53s3ijncsgfl"; 17 + sha256 = "0xji4kcw1fl3nqg04q6zlympkx2kv2s1r1p18763dshgpisqgiq4"; 18 18 }; 19 19 20 20 # setuptoolsBuildPhase needs dependencies to be passed through nativeBuildInputs
+2 -2
pkgs/development/python-modules/markdown/default.nix
··· 9 9 10 10 buildPythonPackage rec { 11 11 pname = "markdown"; 12 - version = "3.3.5"; 12 + version = "3.3.6"; 13 13 14 14 disabled = pythonOlder "3.6"; 15 15 16 16 src = fetchPypi { 17 17 pname = "Markdown"; 18 18 inherit version; 19 - sha256 = "sha256-JulUa/vN5fzQcr2PYSycG24md8uKrb32UgZnT0bd4Gk="; 19 + sha256 = "sha256-dt+K4yKU7Dnc+JNAOCiC36Epdfh/RcPtHs2x6M78cAY="; 20 20 }; 21 21 22 22 propagatedBuildInputs = lib.optionals (pythonOlder "3.10") [
+2 -2
pkgs/development/python-modules/mautrix/default.nix
··· 4 4 5 5 buildPythonPackage rec { 6 6 pname = "mautrix"; 7 - version = "0.12.4"; 7 + version = "0.12.5"; 8 8 9 9 src = fetchPypi { 10 10 inherit pname version; 11 - sha256 = "c8d226a96e57d52bb532d7e572ba5670d2e2143f720063a4bbd04a77049030d4"; 11 + sha256 = "f7095cc4e5aa85043416fbfc5ca3e03c46800dcebfe3ac1d502e520197cea1ee"; 12 12 }; 13 13 14 14 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/metakernel/default.nix
··· 6 6 7 7 buildPythonPackage rec { 8 8 pname = "metakernel"; 9 - version = "0.28.1"; 9 + version = "0.28.2"; 10 10 11 11 src = fetchPypi { 12 12 inherit pname version; 13 - sha256 = "3b57eb7b3b332614dcba1fa53c8cc1253dbccf962b111517ea16cbecce9a11d5"; 13 + sha256 = "8811a4497444495639ef000902f4c6e8a7e2c57da1d47a8a24bcc9083548b389"; 14 14 }; 15 15 16 16 propagatedBuildInputs = [ ipykernel ];
+2 -2
pkgs/development/python-modules/mlflow/default.nix
··· 24 24 25 25 buildPythonPackage rec { 26 26 pname = "mlflow"; 27 - version = "1.21.0"; 27 + version = "1.22.0"; 28 28 disabled = isPy27; 29 29 30 30 src = fetchPypi { 31 31 inherit pname version; 32 - sha256 = "5524a371f19c66a18e7ebe9b1085a77f63a6ae514271e487428f28187d79fc8f"; 32 + sha256 = "f680390715e436ae38cf7056ec91030fc9eb67cc631226f28ff9504fbe395add"; 33 33 }; 34 34 35 35 # run into https://stackoverflow.com/questions/51203641/attributeerror-module-alembic-context-has-no-attribute-config
+2 -2
pkgs/development/python-modules/mocket/default.nix
··· 19 19 20 20 buildPythonPackage rec { 21 21 pname = "mocket"; 22 - version = "3.10.1"; 22 + version = "3.10.2"; 23 23 disabled = !isPy3k; 24 24 25 25 src = fetchPypi { 26 26 inherit pname version; 27 - sha256 = "c77e75432c21108e5a28a529793eb2b82753b6f7050ac9f59fc5d7a72fa74c0f"; 27 + sha256 = "6dbfd47fdc5629136bdbb487cd3cc8d786b402df546b9c7106bed737677aa9f4"; 28 28 }; 29 29 30 30 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/nest-asyncio/default.nix
··· 5 5 }: 6 6 7 7 buildPythonPackage rec { 8 - version = "1.5.1"; 8 + version = "1.5.4"; 9 9 pname = "nest_asyncio"; 10 10 disabled = !(pythonAtLeast "3.5"); 11 11 12 12 src = fetchPypi { 13 13 inherit pname version; 14 - sha256 = "afc5a1c515210a23c461932765691ad39e8eba6551c055ac8d5546e69250d0aa"; 14 + sha256 = "f969f6013a16fadb4adcf09d11a68a4f617c6049d7af7ac2c676110169a63abd"; 15 15 }; 16 16 17 17 # tests not packaged with source dist as of 1.3.2/1.3.2, and
+3 -3
pkgs/development/python-modules/oci/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "oci"; 14 - version = "2.36.0"; 14 + version = "2.52.0"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "oracle"; 18 18 repo = "oci-python-sdk"; 19 19 rev = "v${version}"; 20 - hash = "sha256-scG/ZhWeiCgXp7iD6arWIN8KZecSjKLsCW4oXeJvx6M="; 20 + hash = "sha256-4MlelzUPCJCZJQh8sNJHEL0WEcVWktV0TBEY0tdTHmk="; 21 21 }; 22 22 23 23 postPatch = '' 24 24 substituteInPlace setup.py \ 25 25 --replace "configparser==4.0.2" "configparser" \ 26 - --replace "cryptography==3.2.1" "cryptography" \ 26 + --replace "cryptography<=3.4.7,>=3.2.1" "cryptography" \ 27 27 --replace "pyOpenSSL>=17.5.0,<=19.1.0" "pyOpenSSL" 28 28 ''; 29 29
+19 -3
pkgs/development/python-modules/olefile/default.nix
··· 1 - { lib, buildPythonPackage, fetchPypi }: 1 + { lib 2 + , buildPythonPackage 3 + , fetchPypi 4 + , pytestCheckHook 5 + }: 6 + 2 7 buildPythonPackage rec { 3 8 pname = "olefile"; 4 9 version = "0.46"; 10 + format = "setuptools"; 5 11 6 12 src = fetchPypi { 7 13 inherit pname version; ··· 15 9 sha256 = "133b031eaf8fd2c9399b78b8bc5b8fcbe4c31e85295749bb17a87cba8f3c3964"; 16 10 }; 17 11 12 + checkInputs = [ 13 + pytestCheckHook 14 + ]; 15 + 16 + pythonImportsCheck = [ 17 + "olefile" 18 + ]; 19 + 18 20 meta = with lib; { 19 21 description = "Python package to parse, read and write Microsoft OLE2 files"; 20 22 homepage = "https://www.decalage.info/python/olefileio"; 21 - # BSD like + reference to Pillow 22 - license = "http://olefile.readthedocs.io/en/latest/License.html"; 23 + # BSD2 + reference to Pillow 24 + # http://olefile.readthedocs.io/en/latest/License.html 25 + license = with licenses; [ bsd2 /* and */ hpnd ]; 26 + maintainers = with maintainers; [ fab ]; 23 27 }; 24 28 }
+2 -2
pkgs/development/python-modules/openstacksdk/default.nix
··· 18 18 19 19 buildPythonPackage rec { 20 20 pname = "openstacksdk"; 21 - version = "0.60.0"; 21 + version = "0.61.0"; 22 22 23 23 src = fetchPypi { 24 24 inherit pname version; 25 - sha256 = "aa6efead2ac116482f29aecc2c14ba3b4c76a6f8dede93bf296a2b65492ef420"; 25 + sha256 = "3eed308871230f0c53a8f58b6c5a358b184080c6b2c6bc69ab088eea057aa127"; 26 26 }; 27 27 28 28 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/oslo-utils/default.nix
··· 23 23 24 24 buildPythonPackage rec { 25 25 pname = "oslo-utils"; 26 - version = "4.11.0"; 26 + version = "4.12.0"; 27 27 28 28 src = fetchPypi { 29 29 pname = "oslo.utils"; 30 30 inherit version; 31 - sha256 = "1wl3r4jayzjgzf36iwn05xcjfh227s97qymjxji9hz4ibhy3v83f"; 31 + sha256 = "37aa1ee2c6cd8f3933912dd4323cbf7cd2d141e6dedb3debb764e491a9c9cf4d"; 32 32 }; 33 33 34 34 postPatch = ''
+2 -2
pkgs/development/python-modules/paramiko/default.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "paramiko"; 16 - version = "2.8.0"; 16 + version = "2.8.1"; 17 17 18 18 src = fetchPypi { 19 19 inherit pname version; 20 - sha256 = "e673b10ee0f1c80d46182d3af7751d033d9b573dd7054d2d0aa46be186c3c1d2"; 20 + sha256 = "85b1245054e5d7592b9088cc6d08da22445417912d3a3e48138675c7a8616438"; 21 21 }; 22 22 23 23 propagatedBuildInputs = [ bcrypt cryptography pynacl pyasn1 ];
+7 -5
pkgs/development/python-modules/parsy/default.nix
··· 1 - { lib, buildPythonPackage, fetchPypi, pythonOlder, pytest }: 1 + { lib, buildPythonPackage, fetchFromGitHub, pythonOlder, pytest }: 2 2 3 3 buildPythonPackage rec { 4 4 pname = "parsy"; 5 5 version = "1.4.0"; 6 6 7 - src = fetchPypi { 8 - inherit pname version; 9 - sha256 = "7c411373e520e97431f0b390db9d2cfc5089bc1d33f4f1584d2cdc9e6368f302"; 7 + src = fetchFromGitHub { 8 + repo = "parsy"; 9 + owner = "python-parsy"; 10 + rev = "v${version}"; 11 + sha256 = "sha256-FislrLb+u4T5m/eEER7kazZHJKEwPHe+Vg/YDJp4PyM="; 10 12 }; 11 13 12 14 checkInputs = [ pytest ]; 13 15 14 16 checkPhase = '' 15 - py.test test/ 17 + py.test tests 16 18 ''; 17 19 18 20 disabled = pythonOlder "3.4";
+2 -2
pkgs/development/python-modules/pebble/default.nix
··· 2 2 3 3 buildPythonPackage rec { 4 4 pname = "pebble"; 5 - version = "4.6.0"; 5 + version = "4.6.3"; 6 6 disabled = isPy27; 7 7 8 8 src = fetchPypi { 9 9 pname = "Pebble"; 10 10 inherit version; 11 - sha256 = "0a595f7mrf89xlck9b2x83bqybc9zd9jxkl0sa5cf19vax18rg8h"; 11 + sha256 = "694e1105db888f3576b8f00662f90b057cf3780e6f8b7f57955a568008d0f497"; 12 12 }; 13 13 14 14 doCheck = !stdenv.isDarwin;
+2 -2
pkgs/development/python-modules/pip/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "pip"; 14 - version = "21.1.3"; 14 + version = "21.3.1"; 15 15 format = "other"; 16 16 17 17 src = fetchFromGitHub { 18 18 owner = "pypa"; 19 19 repo = pname; 20 20 rev = version; 21 - sha256 = "sha256-zfMz9p4I6Kmw849xuvnmGWHmWtajDntFW1jjDilKkgk="; 21 + sha256 = "sha256-A8oePI5VOKGJTY6ZuUhcOhRkz2I2FSdfsS2xIgktCVQ="; 22 22 name = "${pname}-${version}-source"; 23 23 }; 24 24
+2 -1
pkgs/development/python-modules/pkuseg/default.nix
··· 2 2 , buildPythonPackage 3 3 , fetchPypi 4 4 , isPy3k 5 + , pythonAtLeast 5 6 , cython 6 7 , numpy 7 8 }: ··· 11 10 pname = "pkuseg"; 12 11 version = "0.0.25"; 13 12 14 - disabled = !isPy3k; 13 + disabled = !isPy3k || pythonAtLeast "3.9"; 15 14 16 15 src = fetchPypi { 17 16 inherit pname version;
+2 -2
pkgs/development/python-modules/plugwise/default.nix
··· 19 19 20 20 buildPythonPackage rec { 21 21 pname = "plugwise"; 22 - version = "0.15.3"; 22 + version = "0.15.4"; 23 23 format = "setuptools"; 24 24 25 25 src = fetchFromGitHub { 26 26 owner = pname; 27 27 repo = "python-plugwise"; 28 28 rev = "v${version}"; 29 - sha256 = "sha256-HaH0LcH6L3R9vLT0vlM1absMTbfqgEeVi/aP2FqdnQY="; 29 + sha256 = "0lp87vn9kh0xqng5mv5j914pgrbnhp54bisq76njijn32mgaw4qq"; 30 30 }; 31 31 32 32 postPatch = ''
+2 -2
pkgs/development/python-modules/pot/default.nix
··· 16 16 17 17 buildPythonPackage rec { 18 18 pname = "pot"; 19 - version = "0.7.0"; 19 + version = "0.8.0"; 20 20 21 21 src = fetchPypi { 22 22 pname = "POT"; 23 23 inherit version; 24 - sha256 = "01mdsiv8rlgqzvm3bds9aj49khnn33i523c2cqqrl10zg742pb6l"; 24 + sha256 = "a70e092ddc5a29a4b526192750604a634dfc2faa1641664b4c2c1c00b3cd63cf"; 25 25 }; 26 26 27 27 postPatch = ''
+2 -2
pkgs/development/python-modules/privacyidea-ldap-proxy/default.nix
··· 2 2 3 3 buildPythonPackage rec { 4 4 pname = "privacyidea-ldap-proxy"; 5 - version = "0.6.2"; 5 + version = "0.7"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "privacyidea"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-U2lg4zDQKn9FQ7O0zSLaijIkXKVjg8wi2ItueF4ACDU="; 11 + sha256 = "1i2kgxqd38xvb42qj0a4a35w4vk0fyp3n7w48kqmvrxc77p6r6i8"; 12 12 }; 13 13 14 14 propagatedBuildInputs = [ twisted ldaptor configobj ];
+2 -2
pkgs/development/python-modules/prompt-toolkit/default.nix
··· 8 8 9 9 buildPythonPackage rec { 10 10 pname = "prompt-toolkit"; 11 - version = "3.0.22"; 11 + version = "3.0.23"; 12 12 format = "setuptools"; 13 13 14 14 disabled = pythonOlder "3.6"; ··· 16 16 src = fetchPypi { 17 17 pname = "prompt_toolkit"; 18 18 inherit version; 19 - sha256 = "sha256-RJ8zPdEgvQH10paozhRSEUujpx+ucojS8K4skYdk+nI="; 19 + sha256 = "7053aba00895473cb357819358ef33f11aa97e4ac83d38efb123e5649ceeecaf"; 20 20 }; 21 21 22 22 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/py-nightscout/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "py-nightscout"; 15 - version = "1.3.2"; 15 + version = "1.3.3"; 16 16 format = "setuptools"; 17 17 18 18 disabled = pythonOlder "3.8"; ··· 21 21 owner = "marciogranzotto"; 22 22 repo = pname; 23 23 rev = "v${version}"; 24 - sha256 = "06i8vc7ykk5112y66cjixbrks46mdx3r0ygkmyah6gfgq1ddc39j"; 24 + sha256 = "0kslmm3wrxhm307nqmjmq8i8vy1x6mjaqlgba0hgvisj6b4hx65k"; 25 25 }; 26 26 27 27 propagatedBuildInputs = [
+4 -4
pkgs/development/python-modules/pyTelegramBotAPI/default.nix
··· 1 - { lib, buildPythonPackage, fetchPypi, requests }: 1 + { lib, buildPythonPackage, fetchPypi, aiohttp, requests }: 2 2 3 3 buildPythonPackage rec { 4 4 pname = "pyTelegramBotAPI"; 5 - version = "4.2.0"; 5 + version = "4.2.1"; 6 6 7 7 src = fetchPypi { 8 8 inherit pname version; 9 - sha256 = "05f85dacbcf0bdf2459698bab4325f3a699d1c04bc61581627d76d075c3d5488"; 9 + sha256 = "9a407fd58a406a53ae44ae8ff5f2edb4396be67bca3436523f791642d8561de3"; 10 10 }; 11 11 12 - propagatedBuildInputs = [ requests ]; 12 + propagatedBuildInputs = [ aiohttp requests ]; 13 13 14 14 meta = with lib; { 15 15 homepage = "https://github.com/eternnoir/pyTelegramBotAPI";
+2 -2
pkgs/development/python-modules/py_scrypt/default.nix
··· 6 6 7 7 buildPythonPackage rec { 8 8 pname = "scrypt"; 9 - version = "0.8.18"; 9 + version = "0.8.19"; 10 10 11 11 src = fetchPypi { 12 12 inherit pname version; 13 - sha256 = "bcf04257af12e6d52974d177a7b08e314b66f350a73f9b6f7b232d69a6a1e041"; 13 + sha256 = "ad143035ae0cf5e97c4b399f4e4686adf442c5f0f06f9f198a0cc6c091335fb7"; 14 14 }; 15 15 16 16 buildInputs = [ openssl ];
+2 -2
pkgs/development/python-modules/pyatv/default.nix
··· 20 20 21 21 buildPythonPackage rec { 22 22 pname = "pyatv"; 23 - version = "0.9.6"; 23 + version = "0.9.7"; 24 24 format = "setuptools"; 25 25 26 26 disabled = pythonOlder "3.6"; ··· 29 29 owner = "postlund"; 30 30 repo = pname; 31 31 rev = "v${version}"; 32 - sha256 = "0navm7a0k1679kj7nbkbyl7s2q0wq0xmcnizmnvp0arkd5xqmqv1"; 32 + sha256 = "1ikv9m1348sjv31gch5w0sj97jlr4yjxbqfyds7alxxcm5hrhai4"; 33 33 }; 34 34 35 35 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/pygit2/default.nix
··· 2 2 3 3 buildPythonPackage rec { 4 4 pname = "pygit2"; 5 - version = "1.7.1"; 5 + version = "1.7.2"; 6 6 7 7 src = fetchPypi { 8 8 inherit pname version; 9 - sha256 = "d7faa29558436decc2e78110f38d6677eb366b683ba5cdc2803d47195711165d"; 9 + sha256 = "70a4536a35452c31f823b59b6fdb665aa3778a43b73ccda3a4f79fa9962ad2bb"; 10 10 }; 11 11 12 12 preConfigure = lib.optionalString stdenv.isDarwin ''
+2 -2
pkgs/development/python-modules/pyjwt/default.nix
··· 10 10 11 11 buildPythonPackage rec { 12 12 pname = "pyjwt"; 13 - version = "2.1.0"; 13 + version = "2.3.0"; 14 14 disabled = pythonOlder "3.6"; 15 15 16 16 src = fetchPypi { 17 17 pname = "PyJWT"; 18 18 inherit version; 19 - sha256 = "sha256-+6ROeJi7yhYKKytQH0koJPyDgkhdOm8Rul0MGTfOYTA="; 19 + sha256 = "sha256-uIi01W8G9tzXdyEMM05pxze+dHVdPl6e4/5n3Big7kE="; 20 20 }; 21 21 22 22 propagatedBuildInputs = [
+1 -1
pkgs/development/python-modules/pymavlink/default.nix
··· 6 6 7 7 src = fetchPypi { 8 8 inherit pname version; 9 - sha256 = "08ppwlsnrvzkpi4fn14d4d4grzx2bmsd0m9369q3f9hw48fgf645"; 9 + sha256 = "ee40af9fad9c054237800cc835df5c0975504de13e5c29001be496893083fa83"; 10 10 }; 11 11 12 12 propagatedBuildInputs = [ future lxml ];
+2 -2
pkgs/development/python-modules/pymongo/default.nix
··· 6 6 7 7 buildPythonPackage rec { 8 8 pname = "pymongo"; 9 - version = "3.12.1"; 9 + version = "3.12.2"; 10 10 disabled = pythonOlder "3.6"; 11 11 12 12 src = fetchPypi { 13 13 inherit pname version; 14 - sha256 = "704879b6a54c45ad76cea7c6789c1ae7185050acea7afd15b58318fa1932ed45"; 14 + sha256 = "64ea5e97fca1a37f83df9f3460bf63640bc0d725e12f3471e6acbf3a6040dd37"; 15 15 }; 16 16 17 17 # Tests call a running mongodb instance
+2 -2
pkgs/development/python-modules/pymupdf/default.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "pymupdf"; 16 - version = "1.18.17"; 16 + version = "1.19.2"; 17 17 18 18 src = fetchPypi { 19 19 pname = "PyMuPDF"; 20 20 inherit version; 21 - sha256 = "fa39ee5e91eae77818e07b6bb7e0cb0b402ad88e39a74b08626ce1c2150c5414"; 21 + sha256 = "964bbacddab9cba6cd2c8f388429fe4a97c0775b3096a13ac15724f5a1a2c58d"; 22 22 }; 23 23 24 24 postPatch = ''
+13 -8
pkgs/development/python-modules/pyomo/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 - , fetchPypi 3 + , fetchFromGitHub 4 4 , isPy27 5 5 , pyutilib 6 6 , appdirs 7 7 , ply 8 8 , six 9 9 , nose 10 + , glpk 10 11 }: 11 12 12 13 buildPythonPackage rec { 13 14 pname = "pyomo"; 14 - version = "5.6.1"; 15 + version = "5.7.3"; 15 16 disabled = isPy27; # unable to import pyutilib.th 16 17 17 - src = fetchPypi { 18 - pname = "Pyomo"; 19 - inherit version; 20 - sha256 = "449be9a4c9b3caee7c89dbe5f0e4e5ad0eaeef8be110a860641cd249986e362c"; 18 + src = fetchFromGitHub { 19 + repo = "pyomo"; 20 + owner = "pyomo"; 21 + rev = version; 22 + sha256 = "sha256-p0/DdCwyXdzXElzjWewKs0Oi7BMXC+BxgYikdZL0t68="; 21 23 }; 22 24 23 - checkInputs = [ nose ]; 25 + checkInputs = [ nose glpk ]; 24 26 propagatedBuildInputs = [ 25 27 pyutilib 26 28 appdirs ··· 32 30 33 31 checkPhase = '' 34 32 rm pyomo/bilevel/tests/test_blp.py \ 35 - pyomo/version/tests/test_installer.py 33 + pyomo/version/tests/test_installer.py \ 34 + pyomo/common/tests/test_download.py \ 35 + pyomo/core/tests/examples/test_pyomo.py 36 + export HOME=$TMPDIR 36 37 nosetests 37 38 ''; 38 39
+2 -2
pkgs/development/python-modules/pyopengl/default.nix
··· 7 7 8 8 buildPythonPackage rec { 9 9 pname = "pyopengl"; 10 - version = "3.1.4"; 10 + version = "3.1.5"; 11 11 12 12 src = fetchPypi { 13 13 pname = "PyOpenGL"; 14 14 inherit version; 15 - sha256 = "0bdf5ed600df30c8830455702338902528717c0af85ac5914f1dc5aa0bfa6eee"; 15 + sha256 = "4107ba0d0390da5766a08c242cf0cf3404c377ed293c5f6d701e457c57ba3424"; 16 16 }; 17 17 18 18 propagatedBuildInputs = [ pillow ];
+2 -2
pkgs/development/python-modules/pyqt-builder/default.nix
··· 2 2 3 3 buildPythonPackage rec { 4 4 pname = "pyqt-builder"; 5 - version = "1.10.1"; 5 + version = "1.12.2"; 6 6 7 7 src = fetchPypi { 8 8 pname = "PyQt-builder"; 9 9 inherit version; 10 - sha256 = "05vyckg4pq95s3b23drhd24sjwzic1k36nwckxz5jc83mixhqywn"; 10 + sha256 = "f62bb688d70e0afd88c413a8d994bda824e6cebd12b612902d1945c5a67edcd7"; 11 11 }; 12 12 13 13 propagatedBuildInputs = [ packaging sip ];
+9 -10
pkgs/development/python-modules/pytest-annotate/default.nix
··· 6 6 }: 7 7 8 8 buildPythonPackage rec { 9 - version = "1.0.4"; 10 9 pname = "pytest-annotate"; 10 + version = "1.0.4"; 11 + format = "setuptools"; 11 12 12 13 src = fetchPypi { 13 14 inherit pname version; ··· 23 22 pyannotate 24 23 ]; 25 24 26 - postPatch = '' 27 - substituteInPlace setup.py \ 28 - --replace "pytest>=3.2.0,<4.0.0" "pytest" 29 - ''; 30 - 31 - # no testing in a testing module... 25 + # Module has no tests 32 26 doCheck = false; 33 27 28 + pythonImportsCheck = [ 29 + "pytest_annotate" 30 + ]; 31 + 34 32 meta = with lib; { 35 - broken = true; # unmaintained and incompatible with pytest>=6.0 36 - homepage = "https://github.com/kensho-technologies/pytest-annotate"; 37 33 description = "Generate PyAnnotate annotations from your pytest tests"; 34 + homepage = "https://github.com/kensho-technologies/pytest-annotate"; 38 35 license = licenses.asl20; 39 - maintainers = [ maintainers.costrouc ]; 36 + maintainers = with maintainers; [ costrouc ]; 40 37 }; 41 38 }
+28 -14
pkgs/development/python-modules/pytest-asyncio/default.nix
··· 1 - { lib, buildPythonPackage, fetchPypi, pytest, isPy3k, isPy35, async_generator }: 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + , hypothesis 5 + , pytest 6 + , pytestCheckHook 7 + , pythonOlder 8 + }: 9 + 2 10 buildPythonPackage rec { 3 11 pname = "pytest-asyncio"; 4 12 version = "0.16.0"; 13 + format = "setuptools"; 5 14 6 - disabled = !isPy3k; 15 + disabled = pythonOlder "3.6"; 7 16 8 - src = fetchPypi { 9 - inherit pname version; 10 - sha256 = "7496c5977ce88c34379df64a66459fe395cd05543f0a2f837016e7144391fcfb"; 17 + src = fetchFromGitHub { 18 + owner = "pytest-dev"; 19 + repo = pname; 20 + rev = "v${version}"; 21 + sha256 = "sha256-4zMbzdDtiLRKo5C12wZRoBNguXLn3f26NuDwQ+pHA0I="; 11 22 }; 12 23 13 - buildInputs = [ pytest ] 14 - ++ lib.optionals isPy35 [ async_generator ]; 24 + buildInputs = [ 25 + pytest 26 + ]; 15 27 16 - # No tests in archive 17 - doCheck = false; 28 + checkInputs = [ 29 + hypothesis 30 + pytestCheckHook 31 + ]; 18 32 19 - # LICENSE file is not distributed. https://github.com/pytest-dev/pytest-asyncio/issues/92 20 - postPatch = '' 21 - substituteInPlace setup.cfg --replace "license_file = LICENSE" "" 22 - ''; 33 + pythonImportsCheck = [ 34 + "pytest_asyncio" 35 + ]; 23 36 24 37 meta = with lib; { 25 38 description = "library for testing asyncio code with pytest"; 26 - license = licenses.asl20; 27 39 homepage = "https://github.com/pytest-dev/pytest-asyncio"; 40 + license = licenses.asl20; 41 + maintainers = with maintainers; [ ]; 28 42 }; 29 43 }
+26 -11
pkgs/development/python-modules/pytest-benchmark/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 3 , fetchFromGitHub 4 - , pytest 5 - , py-cpuinfo 6 - , pythonOlder 7 4 , pathlib 5 + , py-cpuinfo 6 + , pytest 7 + , pythonOlder 8 8 , statistics 9 9 }: 10 10 11 11 buildPythonPackage rec { 12 12 pname = "pytest-benchmark"; 13 - version = "3.2.2"; 13 + version = "3.4.1"; 14 + format = "setuptools"; 14 15 15 16 src = fetchFromGitHub { 16 17 owner = "ionelmc"; 17 18 repo = pname; 18 19 rev = "v${version}"; 19 - sha256 = "1hslzzinpwc1zqhbpllqh3sllmiyk69pcycl7ahr0rz3micgwczj"; 20 + sha256 = "sha256-qc/8Epax5bPUZvhq42xSj6NUq0T4gbO5dDDS6omWBOU="; 20 21 }; 21 22 22 - buildInputs = [ pytest ]; 23 + buildInputs = [ 24 + pytest 25 + ]; 23 26 24 - propagatedBuildInputs = [ py-cpuinfo ] ++ lib.optionals (pythonOlder "3.4") [ pathlib statistics ]; 27 + propagatedBuildInputs = [ 28 + py-cpuinfo 29 + ] ++ lib.optionals (pythonOlder "3.4") [ 30 + pathlib 31 + statistics 32 + ]; 25 33 26 - meta = { 27 - description = "Py.test fixture for benchmarking code"; 34 + # Circular dependency 35 + doCheck = false; 36 + 37 + pythonImportsCheck = [ 38 + "pytest_benchmark" 39 + ]; 40 + 41 + meta = with lib; { 42 + description = "Pytest fixture for benchmarking code"; 28 43 homepage = "https://github.com/ionelmc/pytest-benchmark"; 29 - license = lib.licenses.bsd2; 30 - maintainers = with lib.maintainers; [ costrouc ]; 44 + license = licenses.bsd2; 45 + maintainers = with maintainers; [ costrouc ]; 31 46 }; 32 47 }
+3 -2
pkgs/development/python-modules/pytest-check/default.nix
··· 7 7 8 8 buildPythonPackage rec { 9 9 pname = "pytest-check"; 10 - version = "1.0.1"; 10 + version = "1.0.4"; 11 + format = "flit"; 11 12 12 13 src = fetchPypi { 13 14 pname = "pytest_check"; 14 15 inherit version; 15 - sha256 = "1i01i5ab06ic11na13gcacrlcs2ab6rmaii0yz0x06z5ynnljn6s"; 16 + sha256 = "c93eee5a98bcd28634a4ec657ab62c46d25fa384300811e5a925d9c4d98b9540"; 16 17 }; 17 18 18 19 buildInputs = [ pytest ];
+2 -2
pkgs/development/python-modules/pytest-django/default.nix
··· 10 10 }: 11 11 buildPythonPackage rec { 12 12 pname = "pytest-django"; 13 - version = "4.4.0"; 13 + version = "4.5.1"; 14 14 15 15 src = fetchPypi { 16 16 inherit pname version; 17 - sha256 = "b5171e3798bf7e3fc5ea7072fe87324db67a4dd9f1192b037fed4cc3c1b7f455"; 17 + sha256 = "01fe1242e706375d7c942d206a30826bd9c0dffde99bfac627050cdc91f0d792"; 18 18 }; 19 19 20 20 nativeBuildInputs = [ pytest setuptools-scm ];
+5 -2
pkgs/development/python-modules/pytest-forked/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 + , pythonOlder 3 4 , fetchPypi 4 5 , setuptools-scm 5 6 , py ··· 10 9 11 10 buildPythonPackage rec { 12 11 pname = "pytest-forked"; 13 - version = "1.3.0"; 12 + version = "1.4.0"; 13 + 14 + disabled = pythonOlder "3.6"; 14 15 15 16 src = fetchPypi { 16 17 inherit pname version; 17 - sha256 = "6aa9ac7e00ad1a539c41bec6d21011332de671e938c7637378ec9710204e37ca"; 18 + sha256 = "sha256-i2dYfI+Yy7rf3YBFOe1UVbbtA4AiA0hd0vU8FCLXRA4="; 18 19 }; 19 20 20 21 nativeBuildInputs = [ setuptools-scm ];
+11 -6
pkgs/development/python-modules/pytest-localserver/default.nix
··· 1 - { buildPythonPackage 2 - , lib 1 + { lib 2 + , buildPythonPackage 3 3 , fetchPypi 4 4 , werkzeug 5 5 }: ··· 7 7 buildPythonPackage rec { 8 8 pname = "pytest-localserver"; 9 9 version = "0.5.1"; 10 + format = "setuptools"; 10 11 11 12 src = fetchPypi { 12 13 inherit pname version; 13 14 sha256 = "ef6f04193dc0f7e8df5b27b3a8834318fa12eaf025436d2a99afff1b73cde761"; 14 15 }; 15 16 16 - propagatedBuildInputs = [ werkzeug ]; 17 + propagatedBuildInputs = [ 18 + werkzeug 19 + ]; 17 20 18 21 # all tests access network: does not work in sandbox 19 22 doCheck = false; 20 - pythonImportsCheck = [ "pytest_localserver" ]; 23 + 24 + pythonImportsCheck = [ 25 + "pytest_localserver" 26 + ]; 21 27 22 28 meta = with lib; { 23 29 description = "Plugin for the pytest testing framework to test server connections locally"; 24 - homepage = "https://pypi.python.org/pypi/pytest-localserver"; 30 + homepage = "https://github.com/pytest-dev/pytest-localserver"; 25 31 license = licenses.mit; 26 32 maintainers = with maintainers; [ siriobalmelli ]; 27 33 }; 28 34 } 29 -
+26 -11
pkgs/development/python-modules/pytest-randomly/default.nix
··· 1 - { lib, buildPythonPackage, fetchFromGitHub, pythonOlder 2 - , factory_boy, faker, numpy, importlib-metadata 3 - , pytestCheckHook, pytest-xdist 1 + { lib 2 + , buildPythonPackage 3 + , factory_boy 4 + , faker 5 + , fetchFromGitHub 6 + , importlib-metadata 7 + , numpy 8 + , pytest-xdist 9 + , pytestCheckHook 10 + , pythonOlder 4 11 }: 5 12 6 13 buildPythonPackage rec { 7 14 pname = "pytest-randomly"; 8 - version = "3.10.1"; 15 + version = "3.10.3"; 16 + format = "setuptools"; 9 17 10 18 disabled = pythonOlder "3.6"; 11 19 12 - # fetch from GitHub as pypi tarball doesn't include tests 13 20 src = fetchFromGitHub { 14 21 repo = pname; 15 22 owner = "pytest-dev"; 16 23 rev = version; 17 - sha256 = "10z7hsr8yd80sf5113i61p0g1c0nqkx7p4xi19v3d133f6vjbh3k"; 24 + sha256 = "sha256-NoYpMpFWz52Z0+KIUumUFp3xMPA1jGw8COojU+bsgHc="; 18 25 }; 19 26 20 27 propagatedBuildInputs = lib.optionals (pythonOlder "3.10") [ ··· 29 22 ]; 30 23 31 24 checkInputs = [ 32 - pytestCheckHook 33 - pytest-xdist 34 - numpy 35 25 factory_boy 36 26 faker 27 + numpy 28 + pytest-xdist 29 + pytestCheckHook 37 30 ]; 31 + 38 32 # needs special invocation, copied from tox.ini 39 - pytestFlagsArray = [ "-p" "no:randomly" ]; 33 + pytestFlagsArray = [ 34 + "-p" 35 + "no:randomly" 36 + ]; 37 + 38 + pythonImportsCheck = [ 39 + "pytest_randomly" 40 + ]; 40 41 41 42 meta = with lib; { 42 43 description = "Pytest plugin to randomly order tests and control random.seed"; 43 44 homepage = "https://github.com/pytest-dev/pytest-randomly"; 44 45 license = licenses.bsd3; 45 - maintainers = [ maintainers.sternenseemann ]; 46 + maintainers = with maintainers; [ sternenseemann ]; 46 47 }; 47 48 }
+32 -10
pkgs/development/python-modules/pytest-snapshot/default.nix
··· 1 - { lib, buildPythonPackage, fetchPypi, packaging, pytest, setuptools-scm }: 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + , packaging 5 + , pytest 6 + , setuptools-scm 7 + , pytestCheckHook 8 + }: 2 9 3 10 buildPythonPackage rec { 4 11 pname = "pytest-snapshot"; 5 12 version = "0.8.0"; 13 + format = "setuptools"; 6 14 7 - src = fetchPypi { 8 - inherit pname version; 9 - sha256 = "cf84c88c3e0b4ae08ae797d9ccdc32715b64dd68b2da40f575db56956ed23326"; 15 + src = fetchFromGitHub { 16 + owner = "joseph-roitman"; 17 + repo = pname; 18 + rev = "v${version}"; 19 + sha256 = "sha256-xnfsB4wmsvqq5FfhLasSpxZh7+vhQsND6+Lxu0OuCvs="; 10 20 }; 11 21 12 - nativeBuildInputs = [ setuptools-scm ]; 22 + SETUPTOOLS_SCM_PRETEND_VERSION = version; 13 23 14 - buildInputs = [ pytest ]; 24 + nativeBuildInputs = [ 25 + setuptools-scm 26 + ]; 15 27 16 - propagatedBuildInputs = [ packaging ]; 28 + buildInputs = [ 29 + pytest 30 + ]; 17 31 18 - # pypi does not contain tests and GitHub archive is not supported because setuptools-scm can't detect the version 19 - doCheck = false; 20 - pythonImportsCheck = [ "pytest_snapshot" ]; 32 + propagatedBuildInputs = [ 33 + packaging 34 + ]; 35 + 36 + checkInputs = [ 37 + pytestCheckHook 38 + ]; 39 + 40 + pythonImportsCheck = [ 41 + "pytest_snapshot" 42 + ]; 21 43 22 44 meta = with lib; { 23 45 description = "A plugin to enable snapshot testing with pytest";
+17 -5
pkgs/development/python-modules/pytest-timeout/default.nix
··· 9 9 10 10 buildPythonPackage rec { 11 11 pname = "pytest-timeout"; 12 - version = "1.4.2"; 12 + version = "2.0.1"; 13 + format = "setuptools"; 13 14 14 15 src = fetchPypi { 15 16 inherit pname version; 16 - sha256 = "0xnsigs0kmpq1za0d4i522sp3f71x5bgpdh3ski0rs74yqy13cr0"; 17 + sha256 = "sha256-pexOzt246nJpEYSFk9ZoWUEH55diHpf5Oh0dvG+7kIA="; 17 18 }; 18 19 19 - buildInputs = [ pytest ]; 20 + buildInputs = [ 21 + pytest 22 + ]; 20 23 21 - checkInputs = [ pytestCheckHook pexpect pytest-cov ]; 24 + checkInputs = [ 25 + pytestCheckHook 26 + pexpect 27 + pytest-cov 28 + ]; 22 29 23 30 disabledTests = [ 24 31 "test_suppresses_timeout_when_pdb_is_entered" 25 32 # Remove until https://github.com/pytest-dev/pytest/pull/7207 or similar 26 33 "test_suppresses_timeout_when_debugger_is_entered" 27 34 ]; 35 + 28 36 pytestFlagsArray = [ 29 37 "-ra" 30 38 ]; 31 39 40 + pythonImportsCheck = [ 41 + "pytest_timeout" 42 + ]; 43 + 32 44 meta = with lib; { 33 - description = "py.test plugin to abort hanging tests"; 45 + description = "Pytest plugin to abort hanging tests"; 34 46 homepage = "https://github.com/pytest-dev/pytest-timeout/"; 35 47 changelog = "https://github.com/pytest-dev/pytest-timeout/#changelog"; 36 48 license = licenses.mit;
+2 -2
pkgs/development/python-modules/pytest-xdist/default.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "pytest-xdist"; 16 - version = "2.4.0"; 16 + version = "2.5.0"; 17 17 disabled = pythonOlder "3.6"; 18 18 19 19 src = fetchPypi { 20 20 inherit pname version; 21 - sha256 = "89b330316f7fc475f999c81b577c2b926c9569f3d397ae432c0c2e2496d61ff9"; 21 + sha256 = "sha256-RYDeyj/wTdsqxT66Oddstd1e3qwFDLb7x2iw3XErTt8="; 22 22 }; 23 23 24 24 nativeBuildInputs = [ setuptools-scm ];
+2 -2
pkgs/development/python-modules/python-lsp-server/default.nix
··· 35 35 36 36 buildPythonPackage rec { 37 37 pname = "python-lsp-server"; 38 - version = "1.3.1"; 38 + version = "1.3.2"; 39 39 disabled = pythonOlder "3.6"; 40 40 41 41 src = fetchFromGitHub { 42 42 owner = "python-lsp"; 43 43 repo = pname; 44 44 rev = "v${version}"; 45 - sha256 = "067dlhwwv4mkrirnmqinrvkbfx59hf7fiah081d62a46vxvpnv9s"; 45 + sha256 = "1whivnhz60mdqvq8m00rf7ghhy8a4k5b4kdsj0h90hbrsl1610p6"; 46 46 }; 47 47 48 48 postPatch = ''
+4 -7
pkgs/development/python-modules/python-miio/default.nix
··· 24 24 25 25 buildPythonPackage rec { 26 26 pname = "python-miio"; 27 - version = "0.5.8"; 28 - disabled = pythonOlder "3.6"; 27 + version = "0.5.9.1"; 28 + disabled = pythonOlder "3.6.5"; 29 29 format = "pyproject"; 30 30 31 31 src = fetchPypi { 32 32 inherit pname version; 33 - sha256 = "sha256-16XEah5rgem/L8A/zo1zPrifrU15VMk652rFLZcvjig="; 33 + sha256 = "sha256-fWLN1mGSoB+H6YSwTYpx1fuXfkrHBgdRkhzDLbmMBcg="; 34 34 }; 35 35 36 36 postPatch = '' 37 37 substituteInPlace pyproject.toml \ 38 - --replace 'click = "^7"' 'click = "*"' \ 39 - --replace 'croniter = "^0"' 'croniter = "*"' \ 40 - --replace 'cryptography = "^3"' 'cryptography = "*"' \ 41 - --replace 'defusedxml = "^0.6"' 'defusedxml = "*"' 38 + --replace 'defusedxml = "^0"' 'defusedxml = "*"' \ 42 39 ''; 43 40 44 41 nativeBuildInputs = [
+5
pkgs/development/python-modules/python-smarttub/default.nix
··· 38 38 pytestCheckHook 39 39 ]; 40 40 41 + postPatch = '' 42 + substituteInPlace setup.py \ 43 + --replace "pyjwt~=2.1.0" "pyjwt>=2.1.0" 44 + ''; 45 + 41 46 pythonImportsCheck = [ 42 47 "smarttub" 43 48 ];
+2 -2
pkgs/development/python-modules/pythondialog/default.nix
··· 6 6 7 7 buildPythonPackage rec { 8 8 pname = "pythondialog"; 9 - version = "3.5.2"; 9 + version = "3.5.3"; 10 10 disabled = !isPy3k; 11 11 12 12 src = fetchPypi { 13 13 inherit pname version; 14 - sha256 = "4fc11e95540d1d5dbe0a60cd3fb7787354df85ee4b5da21f708ea46cb47bf6d6"; 14 + sha256 = "b2a34a8af0a6625ccbdf45cd343b854fc6c1a85231dadc80b8805db836756323"; 15 15 }; 16 16 17 17 patchPhase = ''
+2 -2
pkgs/development/python-modules/pyutilib/default.nix
··· 7 7 8 8 buildPythonPackage rec { 9 9 pname = "pyutilib"; 10 - version = "5.7.2"; 10 + version = "6.0.0"; 11 11 12 12 src = fetchPypi { 13 13 pname = "PyUtilib"; 14 14 inherit version; 15 - sha256 = "0bdb5hlj6kyb9m3xnpxzasfv5psnxfj21qx6md8ym8zkcqyq1qs5"; 15 + sha256 = "sha256-08FPjtkCioMbK/Ubird3brqH5mz8WKBrmcNZqqZA8EA="; 16 16 }; 17 17 18 18 propagatedBuildInputs = [
+7 -7
pkgs/development/python-modules/pyyaml/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 + , pythonOlder 3 4 , fetchFromGitHub 4 5 , cython 5 6 , libyaml 6 - , isPy27 7 7 , python 8 8 }: 9 9 10 10 buildPythonPackage rec { 11 11 pname = "PyYAML"; 12 - version = "5.4.1.1"; 12 + version = "6.0"; 13 + 14 + disabled = pythonOlder "3.6"; 13 15 14 16 src = fetchFromGitHub { 15 17 owner = "yaml"; 16 18 repo = "pyyaml"; 17 19 rev = version; 18 - sha256 = "1v386gzdvsjg0mgix6v03rd0cgs9dl81qvn3m547849jm8r41dx8"; 20 + sha256 = "sha256-wcII32mRgRRmAgojntyxBMQkjvxU2jylCgVzlHAj2Xc="; 19 21 }; 20 22 21 23 nativeBuildInputs = [ cython ]; 22 24 23 25 buildInputs = [ libyaml ]; 24 26 25 - checkPhase = let 26 - testdir = if isPy27 then "tests/lib" else "tests/lib3"; 27 - in '' 27 + checkPhase = '' 28 28 runHook preCheck 29 - PYTHONPATH="${testdir}:$PYTHONPATH" ${python.interpreter} -m test_all 29 + PYTHONPATH="tests/lib:$PYTHONPATH" ${python.interpreter} -m test_all 30 30 runHook postCheck 31 31 ''; 32 32
+2 -2
pkgs/development/python-modules/qtpy/default.nix
··· 2 2 3 3 buildPythonPackage rec { 4 4 pname = "QtPy"; 5 - version = "1.11.2"; 5 + version = "1.11.3"; 6 6 7 7 src = fetchPypi { 8 8 inherit pname version; 9 - sha256 = "d6e4ae3a41f1fcb19762b58f35ad6dd443b4bdc867a4cb81ef10ccd85403c92b"; 9 + sha256 = "d427addd37386a8d786db81864a5536700861d95bf085cb31d1bea855d699557"; 10 10 }; 11 11 12 12 # no concrete propagatedBuildInputs as multiple backends are supposed
+2 -2
pkgs/development/python-modules/quandl/default.nix
··· 9 9 10 10 buildPythonPackage rec { 11 11 pname = "quandl"; 12 - version = "3.6.1"; 12 + version = "3.7.0"; 13 13 disabled = !isPy3k; 14 14 15 15 src = fetchPypi { 16 16 inherit version; 17 17 pname = "Quandl"; 18 - sha256 = "0jr69fqxhzdmkfh3fxz0yp2kks2hkmixrscjjf59q2l7irglwhc4"; 18 + sha256 = "6e0b82fbc7861610b3577c5397277c4220e065eee0fed4e46cd6b6021655b64c"; 19 19 }; 20 20 21 21 checkInputs = [
+2 -2
pkgs/development/python-modules/reportlab/default.nix
··· 11 11 ft = freetype.overrideAttrs (oldArgs: { dontDisableStatic = true; }); 12 12 in buildPythonPackage rec { 13 13 pname = "reportlab"; 14 - version = "3.6.2"; 14 + version = "3.6.3"; 15 15 16 16 src = fetchPypi { 17 17 inherit pname version; 18 - sha256 = "f0c4b47b012d893b0b9f5703cf6f01b5593714a3fc1e7dc73efbbfe26bb7e16a"; 18 + sha256 = "be4f05230eb17b9c9c61a180ab0c89c30112da2823c77807a2a5ddba19365865"; 19 19 }; 20 20 21 21 checkInputs = [ glibcLocales ];
+2 -2
pkgs/development/python-modules/requests-kerberos/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "requests-kerberos"; 15 - version = "0.13.0"; 15 + version = "0.14.0"; 16 16 17 17 # tests are not present in the PyPI version 18 18 src = fetchFromGitHub { 19 19 owner = "requests"; 20 20 repo = pname; 21 21 rev = "v${version}"; 22 - sha256 = "0yvfg2cj3d10l8fd8kyal4hmpd7fd1c3bca13cj9ril5l573in76"; 22 + sha256 = "0s30pcnlir3j2jmf7yh065f294cf3x0x5i3ldskn8mm0a3657mv3"; 23 23 }; 24 24 25 25 # avoid needing to package krb5
+2 -2
pkgs/development/python-modules/rich/default.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "rich"; 16 - version = "10.14.0"; 16 + version = "10.15.2"; 17 17 format = "pyproject"; 18 18 disabled = pythonOlder "3.6"; 19 19 ··· 21 21 owner = "willmcgugan"; 22 22 repo = pname; 23 23 rev = "v${version}"; 24 - sha256 = "1j1m1064gmy07ah4crds5sd0k7dcwvf2b1z6rvjfvq4v9fx962qv"; 24 + sha256 = "0439fnzcqm2ixigica1fn5g6d3sdji9r699dsh3npwr4z44p2jkk"; 25 25 }; 26 26 27 27 nativeBuildInputs = [ poetry-core ];
+2 -2
pkgs/development/python-modules/ruamel-yaml/default.nix
··· 8 8 9 9 buildPythonPackage rec { 10 10 pname = "ruamel-yaml"; 11 - version = "0.17.16"; 11 + version = "0.17.17"; 12 12 13 13 src = fetchPypi { 14 14 pname = "ruamel.yaml"; 15 15 inherit version; 16 - sha256 = "1a771fc92d3823682b7f0893ad56cb5a5c87c48e62b5399d6f42c8759a583b33"; 16 + sha256 = "9751de4cbb57d4bfbf8fc394e125ed4a2f170fbff3dc3d78abf50be85924f8be"; 17 17 }; 18 18 19 19 # Tests use relative paths
+2 -2
pkgs/development/python-modules/s3fs/default.nix
··· 8 8 9 9 buildPythonPackage rec { 10 10 pname = "s3fs"; 11 - version = "2021.11.0"; 11 + version = "2021.11.1"; 12 12 13 13 src = fetchPypi { 14 14 inherit pname version; 15 - sha256 = "3c23eac1fa5b685c9d507950b24f75929e8bcd1ea98b9a95cf2a9cb66ee6c9f5"; 15 + sha256 = "1a9ea7596663cda3a5dc6802f11eb468b397de35a8793750e9a98c65abd1a114"; 16 16 }; 17 17 18 18 buildInputs = [
+2 -2
pkgs/development/python-modules/sagemaker/default.nix
··· 16 16 17 17 buildPythonPackage rec { 18 18 pname = "sagemaker"; 19 - version = "2.69.0"; 19 + version = "2.70.0"; 20 20 21 21 src = fetchPypi { 22 22 inherit pname version; 23 - sha256 = "8e9051a44a82be07e32d83cfc12d724fd1cb76f83ade34cd9e69c45a8d37c676"; 23 + sha256 = "1bc0b783befa4d07dd9c43da1d1d0f3a0e66767ce8aa2af0c376cfa47c12689a"; 24 24 }; 25 25 26 26 pythonImportsCheck = [
+1
pkgs/development/python-modules/scrapy/default.nix
··· 111 111 "test_custom_loop_asyncio" 112 112 "test_custom_loop_asyncio_deferred_signal" 113 113 "FileFeedStoragePreFeedOptionsTest" # https://github.com/scrapy/scrapy/issues/5157 114 + "test_timeout_download_from_spider_nodata_rcvd" 114 115 # Fails with AssertionError 115 116 "test_peek_fifo" 116 117 "test_peek_one_element"
+2 -2
pkgs/development/python-modules/sip/default.nix
··· 2 2 3 3 buildPythonPackage rec { 4 4 pname = "sip"; 5 - version = "6.1.1"; 5 + version = "6.5.0"; 6 6 7 7 src = fetchPypi { 8 8 pname = "sip"; 9 9 inherit version; 10 - sha256 = "083ykzg7zbvrfrg3ram2vx93zrmhpm817kf9bkhw8r6pzkr5mljj"; 10 + sha256 = "a1cf8431a8eb9392b3ff6dc61d832d0447bfdcae5b3e4256a5fa74dbc25b0734"; 11 11 }; 12 12 13 13 propagatedBuildInputs = [ packaging toml ];
+2 -2
pkgs/development/python-modules/sqlalchemy-utils/default.nix
··· 5 5 6 6 buildPythonPackage rec { 7 7 pname = "sqlalchemy-utils"; 8 - version = "0.37.7"; 8 + version = "0.37.9"; 9 9 10 10 src = fetchPypi { 11 11 inherit version; 12 12 pname = "SQLAlchemy-Utils"; 13 - sha256 = "sha256-cW2dlZIljbllGlEdA+ayVTJCwqRAhV7j99WBK7tV2es="; 13 + sha256 = "4667edbdcb1ece011076b69772ef524bfbb17cc97e03f11ee6b85d98e7741d61"; 14 14 }; 15 15 16 16 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/sqlalchemy/default.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "SQLAlchemy"; 16 - version = "1.4.27"; 16 + version = "1.4.29"; 17 17 18 18 src = fetchPypi { 19 19 inherit pname version; 20 - sha256 = "sha256-12g1na6zqGZE84VMZlnkSWo+a7orRlHsyHznrUFbMgw="; 20 + sha256 = "sha256:+iutFOFHS6ZJz8lpwdLskV3T55Z380a7/gjpPvkCCzk="; 21 21 }; 22 22 23 23 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/srsly/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "srsly"; 15 - version = "2.4.1"; 15 + version = "2.4.2"; 16 16 17 17 disabled = pythonOlder "3.6"; 18 18 19 19 src = fetchPypi { 20 20 inherit pname version; 21 - hash = "sha256-sPKuwKMp5ufnQqCmDpmnSWjKKb5x81xcTeIh4ygXaSY="; 21 + hash = "sha256-KrolIpJ2eHUIat9OQ4DiewJNc2VUVveW+OB+s6TfrMA="; 22 22 }; 23 23 24 24 nativeBuildInputs = [ cython ];
+2 -2
pkgs/development/python-modules/strictyaml/default.nix
··· 7 7 }: 8 8 9 9 buildPythonPackage rec { 10 - version = "1.6.0"; 10 + version = "1.6.1"; 11 11 pname = "strictyaml"; 12 12 disabled = isPy27; 13 13 14 14 src = fetchPypi { 15 15 inherit pname version; 16 - sha256 = "73fa9769214a310486d7916453a09bd38b07d28a9dcbdf27719183c1d7d949f6"; 16 + sha256 = "688be16ee5d1a2f94aa4abdc6d881e8e254d173d724ac88725955fe66bdb63d4"; 17 17 }; 18 18 19 19 postPatch = ''
+4 -4
pkgs/development/python-modules/tatsu/default.nix
··· 5 5 6 6 buildPythonPackage rec { 7 7 pname = "tatsu"; 8 - version = "5.6.1"; 8 + version = "5.7.1"; 9 + # upstream only supports 3.10+ 10 + disabled = pythonOlder "3.10"; 9 11 10 12 src = fetchFromGitHub { 11 13 owner = "neogeny"; 12 14 repo = "TatSu"; 13 15 rev = "v${version}"; 14 - sha256 = "149ra1lwax5m1svlv4dwjfqw00lc5vwyfj6zw2v0ammmfm1b94x9"; 16 + sha256 = "12ljff6l29q92625pgsg4f7xf4dz6iz1c3zdkzz188s4lnwpy8b8"; 15 17 }; 16 - 17 - disabled = pythonOlder "3.8"; 18 18 19 19 nativeBuildInputs = [ pytest-runner ]; 20 20 propagatedBuildInputs = [ colorama regex ];
+2 -2
pkgs/development/python-modules/terminaltables/default.nix
··· 5 5 6 6 buildPythonPackage rec { 7 7 pname = "terminaltables"; 8 - version = "3.1.0"; 8 + version = "3.1.7"; 9 9 10 10 src = fetchPypi { 11 11 inherit pname version; 12 - sha256 = "f3eb0eb92e3833972ac36796293ca0906e998dc3be91fbe1f8615b331b853b81"; 12 + sha256 = "5dab2f33927c0a020b8011c81b92830ff9fd4ba701657da5d7bfdc41048360a6"; 13 13 }; 14 14 15 15 meta = with lib; {
+6
pkgs/development/python-modules/testpath/default.nix
··· 1 1 { lib 2 + , stdenv 2 3 , buildPythonPackage 3 4 , fetchPypi 4 5 , pytestCheckHook ··· 17 16 checkInputs = [ 18 17 pytestCheckHook 19 18 ]; 19 + 20 + preCheck = lib.optionalString stdenv.isDarwin '' 21 + # Work around https://github.com/jupyter/testpath/issues/24 22 + export TMPDIR="/tmp" 23 + ''; 20 24 21 25 meta = with lib; { 22 26 description = "Test utilities for code working with files and commands";
+2 -2
pkgs/development/python-modules/textacy/default.nix
··· 21 21 22 22 buildPythonPackage rec { 23 23 pname = "textacy"; 24 - version = "0.11.0"; 24 + version = "0.12.0"; 25 25 disabled = pythonOlder "3.7"; 26 26 27 27 src = fetchPypi { 28 28 inherit pname version; 29 - sha256 = "sha256-d/tyTCewoERA15iBv4H2LORFzgco15fnnN1sneeGuF4="; 29 + sha256 = "2c92bdd6b47305447b64e4cb6cc43c11675f021f910a8074bc8149dbf5325e5b"; 30 30 }; 31 31 32 32 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/trytond/default.nix
··· 24 24 25 25 buildPythonApplication rec { 26 26 pname = "trytond"; 27 - version = "6.2.1"; 27 + version = "6.2.2"; 28 28 format = "setuptools"; 29 29 30 30 disabled = pythonOlder "3.6"; 31 31 32 32 src = fetchPypi { 33 33 inherit pname version; 34 - sha256 = "418f16c45b7130555447af901639b92bb188d39f46ce7fe4dfcd941c5959ed7e"; 34 + sha256 = "9494016dd8b4da5a06dccdd1afbd918248d42da9f2c19b1eb8958052c747e193"; 35 35 }; 36 36 37 37 # Tells the tests which database to use
+2 -2
pkgs/development/python-modules/types-protobuf/default.nix
··· 2 2 3 3 buildPythonPackage rec { 4 4 pname = "types-protobuf"; 5 - version = "3.18.1"; 5 + version = "3.18.2"; 6 6 7 7 src = fetchPypi { 8 8 inherit pname version; 9 - sha256 = "6696bf3cabc51dcc076e8de025c405dbdea7488c5268c2febd14527dac82c233"; 9 + sha256 = "ca21dedfe7759acbeb0cd8f5c72a74ff3c409ae0c07bc1d94eff5123ac0fa23c"; 10 10 }; 11 11 12 12 propagatedBuildInputs = [ types-futures ];
+2 -2
pkgs/development/python-modules/websocket-client/default.nix
··· 8 8 9 9 buildPythonPackage rec { 10 10 pname = "websocket-client"; 11 - version = "1.2.1"; 11 + version = "1.2.2"; 12 12 disabled = pythonOlder "3.6"; 13 13 14 14 src = fetchPypi { 15 15 inherit pname version; 16 - sha256 = "8dfb715d8a992f5712fff8c843adae94e22b22a99b2c5e6b0ec4a1a981cc4e0d"; 16 + sha256 = "21861f8645eb5725d1becfe86d7e7ae1a31d98b72556f9d44fcc5100976353cf"; 17 17 }; 18 18 19 19 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/youtube-search-python/default.nix
··· 2 2 3 3 buildPythonPackage rec { 4 4 pname = "youtube-search-python"; 5 - version = "1.5.2"; 5 + version = "1.5.3"; 6 6 7 7 disabled = pythonOlder "3.6"; 8 8 9 9 src = fetchPypi { 10 10 inherit pname version; 11 - sha256 = "33f0d58f4803b0b2badf860cd31fb83d3f7edecdd2c01dd09cd6511abbf0e6b9"; 11 + sha256 = "4bc39224d1f0915692101a7739289c41173de2eb88b445aabc7be284802b7489"; 12 12 }; 13 13 14 14 propagatedBuildInputs = [ httpx ];
+2 -2
pkgs/development/python-modules/zope-deferredimport/default.nix
··· 7 7 8 8 buildPythonPackage rec { 9 9 pname = "zope-deferredimport"; 10 - version = "4.3"; 10 + version = "4.3.1"; 11 11 12 12 src = fetchPypi { 13 13 pname = "zope.deferredimport"; 14 14 inherit version; 15 - sha256 = "2ddef5a7ecfff132a2dd796253366ecf9748a446e30f1a0b3a636aec9d9c05c5"; 15 + sha256 = "57b2345e7b5eef47efcd4f634ff16c93e4265de3dcf325afc7315ade48d909e1"; 16 16 }; 17 17 18 18 propagatedBuildInputs = [ zope_proxy ];
+2 -2
pkgs/development/python-modules/zope-hookable/default.nix
··· 6 6 7 7 buildPythonPackage rec { 8 8 pname = "zope-hookable"; 9 - version = "5.0.1"; 9 + version = "5.1.0"; 10 10 11 11 src = fetchPypi { 12 12 pname = "zope.hookable"; 13 13 inherit version; 14 - sha256 = "0hc82lfr7bk53nvbxvjkibkarngyrzgfk2i6bg8wshl0ly0pdl19"; 14 + sha256 = "8fc3e6cd0486c6af48e3317c299def719b57538332a194e0b3bc6a772f4faa0e"; 15 15 }; 16 16 17 17 checkInputs = [ zope_testing ];
+2 -2
pkgs/development/python-modules/zstd/default.nix
··· 4 4 5 5 buildPythonPackage rec { 6 6 pname = "zstd"; 7 - version = "1.5.0.2"; 7 + version = "1.5.0.4"; 8 8 9 9 src = fetchPypi { 10 10 inherit pname version; 11 - sha256 = "8d3388a15135c481b28ca67d079cb5fd79a9691626fd9979e6b4ec00eabb9e79"; 11 + sha256 = "0d048f03fc6354c565ac1e36bb6bf697cfe9941217717fc6a2076529d8b860c3"; 12 12 }; 13 13 14 14 postPatch = ''
+2 -2
pkgs/development/tools/build-managers/cmake/default.nix
··· 17 17 + lib.optionalString isBootstrap "-boot" 18 18 + lib.optionalString useNcurses "-cursesUI" 19 19 + lib.optionalString withQt5 "-qt5UI"; 20 - version = "3.21.2"; 20 + version = "3.22.1"; 21 21 22 22 src = fetchurl { 23 23 url = "https://cmake.org/files/v${lib.versions.majorMinor version}/cmake-${version}.tar.gz"; 24 - sha256 = "sha256-lCdeC2HIS7QnEPUyCiPG3LLG7gMq59KmFvU/aLPSFlk="; 24 + sha256 = "sha256-DpmCKVSdez82hwPSDiSOfuH4U5ENQnBKqHkYwhPqgsA="; 25 25 }; 26 26 27 27 patches = [
+27 -43
pkgs/development/tools/build-managers/cmake/remove-systemconfiguration-dep.patch
··· 1 - From 76523ca5b2227085bb65253900e866b08a2b5efb Mon Sep 17 00:00:00 2001 2 - From: Tobias Mayer <tobim@fastmail.fm> 3 - Date: Fri, 30 Jul 2021 10:50:16 +0200 4 - Subject: [PATCH] Disable NAT64 address synthesis on darwin 5 - 6 - This intentionally breaks the feature by partially reverting 7 - https://github.com/curl/curl/commit/31f631a142d855f069242f3e0c643beec25d1b51 8 - 9 - This is a stop-gap to get CMake to build without the SystemConfiguration 10 - framework. 11 - --- 12 - Utilities/cmcurl/CMakeLists.txt | 8 -------- 13 - Utilities/cmcurl/lib/curl_setup.h | 4 ---- 14 - Utilities/cmcurl/lib/hostip.c | 17 ----------------- 15 - 3 files changed, 29 deletions(-) 16 - 17 1 diff --git a/Utilities/cmcurl/CMakeLists.txt b/Utilities/cmcurl/CMakeLists.txt 18 - index 16ef037ccc..17564bbb69 100644 2 + index 9eef01aaf0..d141d4086c 100644 19 3 --- a/Utilities/cmcurl/CMakeLists.txt 20 4 +++ b/Utilities/cmcurl/CMakeLists.txt 21 - @@ -511,14 +511,6 @@ if(CMAKE_USE_SECTRANSP) 22 - list(APPEND CURL_LIBS "${COREFOUNDATION_FRAMEWORK}" "${SECURITY_FRAMEWORK}") 23 - endif() 5 + @@ -537,12 +537,7 @@ if(${CMAKE_SYSTEM_NAME} MATCHES "Darwin") 6 + message(FATAL_ERROR "CoreFoundation framework not found") 7 + endif() 24 8 25 - -if (${CMAKE_SYSTEM_NAME} MATCHES "Darwin") 26 9 - find_library(SYSTEMCONFIGURATION_FRAMEWORK "SystemConfiguration") 27 10 - if(NOT SYSTEMCONFIGURATION_FRAMEWORK) 28 11 - message(FATAL_ERROR "SystemConfiguration framework not found") 29 12 - endif() 30 - - list(APPEND CURL_LIBS "${SYSTEMCONFIGURATION_FRAMEWORK}") 31 - -endif() 32 13 - 33 - if(CMAKE_USE_OPENSSL) 34 - find_package(OpenSSL) 35 - if(NOT OpenSSL_FOUND) 14 + - list(APPEND CURL_LIBS "-framework CoreFoundation" "-framework SystemConfiguration") 15 + + list(APPEND CURL_LIBS "-framework CoreFoundation") 16 + 17 + if(CMAKE_USE_SECTRANSP) 18 + find_library(SECURITY_FRAMEWORK "Security") 36 19 diff --git a/Utilities/cmcurl/lib/curl_setup.h b/Utilities/cmcurl/lib/curl_setup.h 37 - index 2d13a40a55..35160bc0f5 100644 20 + index 554dcc1e67..059f14e632 100644 38 21 --- a/Utilities/cmcurl/lib/curl_setup.h 39 22 +++ b/Utilities/cmcurl/lib/curl_setup.h 40 - @@ -251,11 +251,7 @@ 23 + @@ -257,11 +257,7 @@ 41 24 * performing this task will result in a synthesized IPv6 address. 42 25 */ 43 26 #if defined(__APPLE__) && !defined(USE_ARES) ··· 33 50 34 51 #ifdef USE_LWIPSOCK 35 52 diff --git a/Utilities/cmcurl/lib/hostip.c b/Utilities/cmcurl/lib/hostip.c 36 - index e0e3cfc2cb..45190a100b 100644 53 + index 117caa2957..9f7c709e44 100644 37 54 --- a/Utilities/cmcurl/lib/hostip.c 38 55 +++ b/Utilities/cmcurl/lib/hostip.c 39 56 @@ -68,10 +68,6 @@ ··· 47 64 #if defined(CURLRES_SYNCH) && \ 48 65 defined(HAVE_ALARM) && defined(SIGALRM) && defined(HAVE_SIGSETJMP) 49 66 /* alarm-based timeouts can only be used with all the dependencies satisfied */ 50 - @@ -533,19 +529,6 @@ enum resolve_t Curl_resolv(struct Curl_easy *data, 67 + @@ -653,23 +649,6 @@ enum resolve_t Curl_resolv(struct Curl_easy *data, 51 68 return CURLRESOLV_ERROR; 52 69 } 53 70 54 71 -#if defined(ENABLE_IPV6) && defined(CURL_OSX_CALL_COPYPROXIES) 55 - - /* 56 - - * The automagic conversion from IPv4 literals to IPv6 literals only works 57 - - * if the SCDynamicStoreCopyProxies system function gets called first. As 58 - - * Curl currently doesn't support system-wide HTTP proxies, we therefore 59 - - * don't use any value this function might return. 60 - - * 61 - - * This function is only available on a macOS and is not needed for 62 - - * IPv4-only builds, hence the conditions above. 63 - - */ 64 - - SCDynamicStoreCopyProxies(NULL); 72 + - { 73 + - /* 74 + - * The automagic conversion from IPv4 literals to IPv6 literals only 75 + - * works if the SCDynamicStoreCopyProxies system function gets called 76 + - * first. As Curl currently doesn't support system-wide HTTP proxies, we 77 + - * therefore don't use any value this function might return. 78 + - * 79 + - * This function is only available on a macOS and is not needed for 80 + - * IPv4-only builds, hence the conditions above. 81 + - */ 82 + - CFDictionaryRef dict = SCDynamicStoreCopyProxies(NULL); 83 + - if(dict) 84 + - CFRelease(dict); 85 + - } 65 86 -#endif 66 87 - 67 88 #ifndef USE_RESOLVE_ON_IPS 68 89 /* First check if this is an IPv4 address string */ 69 90 if(Curl_inet_pton(AF_INET, hostname, &in) > 0) 70 - -- 71 - 2.32.0 72 -
+3 -3
pkgs/development/tools/build-managers/ninja/setup-hook.sh
··· 14 14 ) 15 15 16 16 echoCmd 'build flags' "${flagsArray[@]}" 17 - ninja "${flagsArray[@]}" 17 + ninja "${flagsArray[@]}" | cat 18 18 19 19 runHook postBuild 20 20 } ··· 33 33 ) 34 34 35 35 echoCmd 'install flags' "${flagsArray[@]}" 36 - ninja "${flagsArray[@]}" 36 + ninja "${flagsArray[@]}" | cat 37 37 38 38 runHook postInstall 39 39 } ··· 67 67 ) 68 68 69 69 echoCmd 'check flags' "${flagsArray[@]}" 70 - ninja "${flagsArray[@]}" 70 + ninja "${flagsArray[@]}" | cat 71 71 fi 72 72 73 73 runHook postCheck
+2 -2
pkgs/development/tools/build-managers/waf/default.nix
··· 8 8 in 9 9 stdenv.mkDerivation rec { 10 10 pname = "waf"; 11 - version = "2.0.22"; 11 + version = "2.0.23"; 12 12 13 13 src = fetchFromGitLab { 14 14 owner = "ita1024"; 15 15 repo = "waf"; 16 16 rev = "${pname}-${version}"; 17 - sha256 = "sha256-WGGyhvQdFYmC0NOA5VVqCRMF1fvfPcTI42x1nHvz0W0="; 17 + sha256 = "sha256-AASjkXb3eCVjbuT0GOwhagoNHxG7/XP1Mj0i1U4j13Q="; 18 18 }; 19 19 20 20 nativeBuildInputs = [ python3 ensureNewerSourcesForZipFilesHook ];
+239
pkgs/development/tools/misc/binutils/CVE-2021-45078.patch
··· 1 + based on upstream https://sourceware.org/git/?p=binutils-gdb.git;a=patch;h=161e87d12167b1e36193385485c1f6ce92f74f02;hp=d5c94731766bf4f276146fd29c1df8eebc2aaf69 2 + 3 + adapted by ris to apply to 2.35.2 (simply capitalizing booleans) 4 + 5 + diff --git a/binutils/stabs.c b/binutils/stabs.c 6 + index 274bfb0e7fa..83ee3ea5fa4 100644 7 + --- a/binutils/stabs.c 8 + +++ b/binutils/stabs.c 9 + @@ -202,7 +202,7 @@ static debug_type stab_find_type (void *, struct stab_handle *, const int *); 10 + static bool stab_record_type 11 + (void *, struct stab_handle *, const int *, debug_type); 12 + static debug_type stab_xcoff_builtin_type 13 + - (void *, struct stab_handle *, int); 14 + + (void *, struct stab_handle *, unsigned int); 15 + static debug_type stab_find_tagged_type 16 + (void *, struct stab_handle *, const char *, int, enum debug_type_kind); 17 + static debug_type *stab_demangle_argtypes 18 + @@ -3496,166 +3496,167 @@ stab_record_type (void *dhandle ATTRIBUTE_UNUSED, struct stab_handle *info, 19 + 20 + static debug_type 21 + stab_xcoff_builtin_type (void *dhandle, struct stab_handle *info, 22 + - int typenum) 23 + + unsigned int typenum) 24 + { 25 + debug_type rettype; 26 + const char *name; 27 + 28 + - if (typenum >= 0 || typenum < -XCOFF_TYPE_COUNT) 29 + + typenum = -typenum - 1; 30 + + if (typenum >= XCOFF_TYPE_COUNT) 31 + { 32 + - fprintf (stderr, _("Unrecognized XCOFF type %d\n"), typenum); 33 + + fprintf (stderr, _("Unrecognized XCOFF type %d\n"), -typenum - 1); 34 + return DEBUG_TYPE_NULL; 35 + } 36 + - if (info->xcoff_types[-typenum] != NULL) 37 + - return info->xcoff_types[-typenum]; 38 + + if (info->xcoff_types[typenum] != NULL) 39 + + return info->xcoff_types[typenum]; 40 + 41 + - switch (-typenum) 42 + + switch (typenum) 43 + { 44 + - case 1: 45 + + case 0: 46 + /* The size of this and all the other types are fixed, defined 47 + by the debugging format. */ 48 + name = "int"; 49 + rettype = debug_make_int_type (dhandle, 4, FALSE); 50 + break; 51 + - case 2: 52 + + case 1: 53 + name = "char"; 54 + rettype = debug_make_int_type (dhandle, 1, FALSE); 55 + break; 56 + - case 3: 57 + + case 2: 58 + name = "short"; 59 + rettype = debug_make_int_type (dhandle, 2, FALSE); 60 + break; 61 + - case 4: 62 + + case 3: 63 + name = "long"; 64 + rettype = debug_make_int_type (dhandle, 4, FALSE); 65 + break; 66 + - case 5: 67 + + case 4: 68 + name = "unsigned char"; 69 + rettype = debug_make_int_type (dhandle, 1, TRUE); 70 + break; 71 + - case 6: 72 + + case 5: 73 + name = "signed char"; 74 + rettype = debug_make_int_type (dhandle, 1, FALSE); 75 + break; 76 + - case 7: 77 + + case 6: 78 + name = "unsigned short"; 79 + rettype = debug_make_int_type (dhandle, 2, TRUE); 80 + break; 81 + - case 8: 82 + + case 7: 83 + name = "unsigned int"; 84 + rettype = debug_make_int_type (dhandle, 4, TRUE); 85 + break; 86 + - case 9: 87 + + case 8: 88 + name = "unsigned"; 89 + rettype = debug_make_int_type (dhandle, 4, TRUE); 90 + break; 91 + - case 10: 92 + + case 9: 93 + name = "unsigned long"; 94 + rettype = debug_make_int_type (dhandle, 4, TRUE); 95 + break; 96 + - case 11: 97 + + case 10: 98 + name = "void"; 99 + rettype = debug_make_void_type (dhandle); 100 + break; 101 + - case 12: 102 + + case 11: 103 + /* IEEE single precision (32 bit). */ 104 + name = "float"; 105 + rettype = debug_make_float_type (dhandle, 4); 106 + break; 107 + - case 13: 108 + + case 12: 109 + /* IEEE double precision (64 bit). */ 110 + name = "double"; 111 + rettype = debug_make_float_type (dhandle, 8); 112 + break; 113 + - case 14: 114 + + case 13: 115 + /* This is an IEEE double on the RS/6000, and different machines 116 + with different sizes for "long double" should use different 117 + negative type numbers. See stabs.texinfo. */ 118 + name = "long double"; 119 + rettype = debug_make_float_type (dhandle, 8); 120 + break; 121 + - case 15: 122 + + case 14: 123 + name = "integer"; 124 + rettype = debug_make_int_type (dhandle, 4, FALSE); 125 + break; 126 + - case 16: 127 + + case 15: 128 + name = "boolean"; 129 + rettype = debug_make_bool_type (dhandle, 4); 130 + break; 131 + - case 17: 132 + + case 16: 133 + name = "short real"; 134 + rettype = debug_make_float_type (dhandle, 4); 135 + break; 136 + - case 18: 137 + + case 17: 138 + name = "real"; 139 + rettype = debug_make_float_type (dhandle, 8); 140 + break; 141 + - case 19: 142 + + case 18: 143 + /* FIXME */ 144 + name = "stringptr"; 145 + rettype = NULL; 146 + break; 147 + - case 20: 148 + + case 19: 149 + /* FIXME */ 150 + name = "character"; 151 + rettype = debug_make_int_type (dhandle, 1, TRUE); 152 + break; 153 + - case 21: 154 + + case 20: 155 + name = "logical*1"; 156 + rettype = debug_make_bool_type (dhandle, 1); 157 + break; 158 + - case 22: 159 + + case 21: 160 + name = "logical*2"; 161 + rettype = debug_make_bool_type (dhandle, 2); 162 + break; 163 + - case 23: 164 + + case 22: 165 + name = "logical*4"; 166 + rettype = debug_make_bool_type (dhandle, 4); 167 + break; 168 + - case 24: 169 + + case 23: 170 + name = "logical"; 171 + rettype = debug_make_bool_type (dhandle, 4); 172 + break; 173 + - case 25: 174 + + case 24: 175 + /* Complex type consisting of two IEEE single precision values. */ 176 + name = "complex"; 177 + rettype = debug_make_complex_type (dhandle, 8); 178 + break; 179 + - case 26: 180 + + case 25: 181 + /* Complex type consisting of two IEEE double precision values. */ 182 + name = "double complex"; 183 + rettype = debug_make_complex_type (dhandle, 16); 184 + break; 185 + - case 27: 186 + + case 26: 187 + name = "integer*1"; 188 + rettype = debug_make_int_type (dhandle, 1, FALSE); 189 + break; 190 + - case 28: 191 + + case 27: 192 + name = "integer*2"; 193 + rettype = debug_make_int_type (dhandle, 2, FALSE); 194 + break; 195 + - case 29: 196 + + case 28: 197 + name = "integer*4"; 198 + rettype = debug_make_int_type (dhandle, 4, FALSE); 199 + break; 200 + - case 30: 201 + + case 29: 202 + /* FIXME */ 203 + name = "wchar"; 204 + rettype = debug_make_int_type (dhandle, 2, FALSE); 205 + break; 206 + - case 31: 207 + + case 30: 208 + name = "long long"; 209 + rettype = debug_make_int_type (dhandle, 8, FALSE); 210 + break; 211 + - case 32: 212 + + case 31: 213 + name = "unsigned long long"; 214 + rettype = debug_make_int_type (dhandle, 8, TRUE); 215 + break; 216 + - case 33: 217 + + case 32: 218 + name = "logical*8"; 219 + rettype = debug_make_bool_type (dhandle, 8); 220 + break; 221 + - case 34: 222 + + case 33: 223 + name = "integer*8"; 224 + rettype = debug_make_int_type (dhandle, 8, FALSE); 225 + break; 226 + @@ -3664,9 +3665,7 @@ stab_xcoff_builtin_type (void *dhandle, struct stab_handle *info, 227 + } 228 + 229 + rettype = debug_name_type (dhandle, name, rettype); 230 + - 231 + - info->xcoff_types[-typenum] = rettype; 232 + - 233 + + info->xcoff_types[typenum] = rettype; 234 + return rettype; 235 + } 236 + 237 + -- 238 + 2.27.0 239 +
+1
pkgs/development/tools/misc/binutils/default.nix
··· 85 85 86 86 ./CVE-2020-35448.patch 87 87 ./CVE-2021-3487.patch 88 + ./CVE-2021-45078.patch 88 89 ] ++ lib.optional stdenv.targetPlatform.isiOS ./support-ios.patch 89 90 ++ # This patch was suggested by Nick Clifton to fix 90 91 # https://sourceware.org/bugzilla/show_bug.cgi?id=16177
+2 -2
pkgs/development/tools/misc/pahole/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "pahole"; 5 - version = "1.22"; 5 + version = "1.23"; 6 6 src = fetchgit { 7 7 url = "https://git.kernel.org/pub/scm/devel/pahole/pahole.git"; 8 8 rev = "v${version}"; 9 - sha256 = "sha256-U1/i9WNlLphPIcNysC476sqil/q9tMYmu+Y6psga8I0="; 9 + sha256 = "sha256-Dt3ZcUfjwdtTTv6qRFRgwK5GFWXdpN7fvb9KhpS1O94="; 10 10 }; 11 11 12 12 nativeBuildInputs = [ cmake pkg-config ];
+2 -2
pkgs/development/tools/misc/patchelf/default.nix
··· 7 7 8 8 stdenv.mkDerivation rec { 9 9 pname = "patchelf"; 10 - version = "0.13"; 10 + version = "0.14.3"; 11 11 12 12 src = fetchurl { 13 13 url = "https://github.com/NixOS/${pname}/releases/download/${version}/${pname}-${version}.tar.bz2"; 14 - sha256 = "1v8px6g0zvhfxqa1inmdqfj4gc8dm70x7874hri4s48szjyd8zjc"; 14 + sha256 = "sha256-oBfsPSFSoZ/ZacDYez+LQ+MqZuT/q9yHZ6VgYrmuwnA="; 15 15 }; 16 16 17 17 setupHook = [ ./setup-hook.sh ];
+8 -5
pkgs/development/tools/parsing/flex/default.nix
··· 1 1 { lib, stdenv, buildPackages, fetchurl, bison, m4 2 - , fetchpatch, autoreconfHook, help2man 2 + , autoreconfHook, help2man 3 3 }: 4 + 5 + # Avoid 'fetchpatch' to allow 'flex' to be used as a possible 'gcc' 6 + # dependency during bootstrap. Useful when gcc is built from snapshot 7 + # or from a git tree (flex lexers are not pre-generated there). 4 8 5 9 stdenv.mkDerivation rec { 6 10 pname = "flex"; ··· 17 13 18 14 # Also upstream, will be part of 2.6.5 19 15 # https://github.com/westes/flex/commit/24fd0551333e 20 - patches = [(fetchpatch { 16 + patches = [(fetchurl { 21 17 name = "glibc-2.26.patch"; 22 - url = "https://raw.githubusercontent.com/lede-project/source/0fb14a2b1ab2f82c" 23 - + "/tools/flex/patches/200-build-AC_USE_SYSTEM_EXTENSIONS-in-configure.ac.patch"; 24 - sha256 = "1aarhcmz7mfrgh15pkj6f7ikxa2m0mllw1i1vscsf1kw5d05lw6f"; 18 + url = "https://raw.githubusercontent.com/lede-project/source/0fb14a2b1ab2f82ce63f4437b062229d73d90516/tools/flex/patches/200-build-AC_USE_SYSTEM_EXTENSIONS-in-configure.ac.patch"; 19 + sha256 = "0mpp41zdg17gx30kcpj83jl8hssks3adbks0qzbhcz882b9c083r"; 25 20 })]; 26 21 27 22 postPatch = ''
+1 -1
pkgs/development/tools/sassc/default.nix
··· 11 11 sha256 = "sha256-jcs3+orRqKt9C3c2FTdeaj4H2rBP74lW3HF8CHSm7lQ="; 12 12 }; 13 13 14 - preConfigure = '' 14 + postPatch = '' 15 15 export SASSC_VERSION=${version} 16 16 ''; 17 17
+2 -2
pkgs/development/web/nodejs/v14.nix
··· 7 7 in 8 8 buildNodejs { 9 9 inherit enableNpm; 10 - version = "14.18.1"; 11 - sha256 = "1vc9rypkgr5i5y946jnyr9jjpydxvm74p1s17rg2zayzvlddg89z"; 10 + version = "14.18.2"; 11 + sha256 = "02v8rjwm8492w91rfvxy369bm11wy3vlkl3dxcl3dkcb1zhrr2iy"; 12 12 patches = lib.optional stdenv.isDarwin ./bypass-xcodebuild.diff; 13 13 }
+2 -1
pkgs/os-specific/darwin/swift-corelibs/corefoundation.nix
··· 11 11 in 12 12 13 13 stdenv.mkDerivation { 14 - name = "swift-corefoundation"; 14 + pname = "swift-corefoundation"; 15 + version = "unstable-2018-09-14"; 15 16 16 17 src = fetchFromGitHub { 17 18 owner = "apple";
+2 -2
pkgs/os-specific/linux/cryptsetup/default.nix
··· 3 3 4 4 stdenv.mkDerivation rec { 5 5 pname = "cryptsetup"; 6 - version = "2.4.1"; 6 + version = "2.4.2"; 7 7 8 8 outputs = [ "out" "dev" "man" ]; 9 9 10 10 src = fetchurl { 11 11 url = "mirror://kernel/linux/utils/cryptsetup/v2.4/${pname}-${version}.tar.xz"; 12 - sha256 = "sha256-o1anJ6g6RkreVm6VI5Yioi2+Tg9IKxmP2wSrDTpanF8="; 12 + sha256 = "sha256-FwzCMmqdru61eFeRdr0Q1KYO5cT8W8aQGM5n2vxUC5w="; 13 13 }; 14 14 15 15 # Disable 4 test cases that fail in a sandbox
+6
pkgs/os-specific/linux/kernel/common-config.nix
··· 883 883 SCHED_CORE = whenAtLeast "5.14" yes; 884 884 885 885 FSL_MC_UAPI_SUPPORT = mkIf (stdenv.hostPlatform.system == "aarch64-linux") (whenAtLeast "5.12" yes); 886 + 887 + ASHMEM = { optional = true; tristate = whenAtLeast "5.0" "y";}; 888 + ANDROID = { optional = true; tristate = whenAtLeast "5.0" "y";}; 889 + ANDROID_BINDER_IPC = { optional = true; tristate = whenAtLeast "5.0" "y";}; 890 + ANDROID_BINDERFS = { optional = true; tristate = whenAtLeast "5.0" "y";}; 891 + ANDROID_BINDER_DEVICES = { optional = true; freeform = whenAtLeast "5.0" "binder,hwbinder,vndbinder";}; 886 892 } // optionalAttrs (stdenv.hostPlatform.system == "x86_64-linux" || stdenv.hostPlatform.system == "aarch64-linux") { 887 893 # Enable CPU/memory hotplug support 888 894 # Allows you to dynamically add & remove CPUs/memory to a VM client running NixOS without requiring a reboot
+2 -1
pkgs/os-specific/linux/kmod/default.nix
··· 4 4 }: 5 5 6 6 let 7 - systems = [ "/run/current-system/kernel-modules" "/run/booted-system/kernel-modules" "" ]; 7 + systems = [ "/run/booted-system/kernel-modules" "/run/current-system/kernel-modules" "" ]; 8 8 modulesDirs = lib.concatMapStringsSep ":" (x: "${x}/lib/modules") systems; 9 9 10 10 in stdenv.mkDerivation rec { ··· 52 52 changelog = "https://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git/plain/NEWS?h=v${version}"; 53 53 license = with licenses; [ lgpl21Plus gpl2Plus ]; # GPLv2+ for tools 54 54 platforms = platforms.unix; 55 + maintainers = with maintainers; [ artturin ]; 55 56 }; 56 57 }
+1 -1
pkgs/os-specific/linux/lvm2/2_02.nix
··· 1 1 import ./common.nix { 2 2 version = "2.02.187"; 3 - sha256Hash = "sha256-Dg1SGoY6XbJEDy4edie6grcCc65KsLvhMIUdsNWOWvE="; 3 + sha256 = "sha256-Dg1SGoY6XbJEDy4edie6grcCc65KsLvhMIUdsNWOWvE="; 4 4 }
+2 -2
pkgs/os-specific/linux/lvm2/2_03.nix
··· 1 1 import ./common.nix { 2 - version = "2.03.12"; 3 - sha256Hash = "1shczwfd0888dchjiaqzd48ampm6f8y0ngsqd99fy4nxlbr5q1vn"; 2 + version = "2.03.14"; 3 + sha256 = "0p5077h3z7mrr0b49ikmhlhrs4v4qb530raypk3y72ja125bqqsa"; 4 4 }
+4 -4
pkgs/os-specific/linux/lvm2/common.nix
··· 1 - { version, sha256Hash }: 1 + { version, sha256 }: 2 2 3 3 { lib, stdenv 4 4 , fetchpatch ··· 22 22 23 23 src = fetchurl { 24 24 url = "https://mirrors.kernel.org/sourceware/lvm2/LVM2.${version}.tgz"; 25 - sha256 = sha256Hash; 25 + inherit sha256; 26 26 }; 27 27 28 28 nativeBuildInputs = [ pkg-config ]; ··· 58 58 substituteInPlace scripts/lvm2_activation_generator_systemd_red_hat.c \ 59 59 --replace /usr/bin/udevadm /run/current-system/systemd/bin/udevadm 60 60 # https://github.com/lvmteam/lvm2/issues/36 61 - substituteInPlace udev/69-dm-lvm-metad.rules.in \ 62 - --replace "(BINDIR)/systemd-run" /run/current-system/systemd/bin/systemd-run 61 + substituteInPlace udev/69-dm-lvm.rules.in \ 62 + --replace "/usr/bin/systemd-run" /run/current-system/systemd/bin/systemd-run 63 63 64 64 substituteInPlace make.tmpl.in --replace "@systemdsystemunitdir@" "$out/lib/systemd/system" 65 65 '' + lib.optionalString (lib.versionAtLeast version "2.03") ''
+3 -3
pkgs/os-specific/linux/systemd/0001-Start-device-units-for-uninitialised-encrypted-devic.patch
··· 1 - From d4ea219a35a09fe02bc9e47e8530644cb4fc4146 Mon Sep 17 00:00:00 2001 1 + From 93b2d29de784c68d1b4d70d7f214b19432aec6a8 Mon Sep 17 00:00:00 2001 2 2 From: Eelco Dolstra <eelco.dolstra@logicblox.com> 3 3 Date: Tue, 8 Jan 2013 15:46:30 +0100 4 - Subject: [PATCH 01/21] Start device units for uninitialised encrypted devices 4 + Subject: [PATCH 01/19] Start device units for uninitialised encrypted devices 5 5 6 6 This is necessary because the NixOS service that initialises the 7 7 filesystem depends on the appearance of the device unit. Also, this ··· 28 28 SUBSYSTEM=="block", ENV{ID_PART_GPT_AUTO_ROOT}=="1", ENV{ID_FS_TYPE}!="crypto_LUKS", SYMLINK+="gpt-auto-root" 29 29 SUBSYSTEM=="block", ENV{ID_PART_GPT_AUTO_ROOT}=="1", ENV{ID_FS_TYPE}=="crypto_LUKS", SYMLINK+="gpt-auto-root-luks" 30 30 -- 31 - 2.33.0 31 + 2.33.1 32 32
+5 -5
pkgs/os-specific/linux/systemd/0002-Don-t-try-to-unmount-nix-or-nix-store.patch
··· 1 - From 67abd8f22f70d9348bc9d8e0e93dde4d325627ba Mon Sep 17 00:00:00 2001 1 + From 41edb381df0326e216b3c569d2cd5764591267d9 Mon Sep 17 00:00:00 2001 2 2 From: Eelco Dolstra <eelco.dolstra@logicblox.com> 3 3 Date: Fri, 12 Apr 2013 13:16:57 +0200 4 - Subject: [PATCH 02/21] Don't try to unmount /nix or /nix/store 4 + Subject: [PATCH 02/19] Don't try to unmount /nix or /nix/store 5 5 6 6 They'll still be remounted read-only. 7 7 ··· 25 25 "/etc")) 26 26 return true; 27 27 diff --git a/src/shutdown/umount.c b/src/shutdown/umount.c 28 - index c2a26242c0..9936398f32 100644 28 + index 1f945b7875..6df9d383ba 100644 29 29 --- a/src/shutdown/umount.c 30 30 +++ b/src/shutdown/umount.c 31 - @@ -496,6 +496,8 @@ static int delete_md(MountPoint *m) { 31 + @@ -508,6 +508,8 @@ static int delete_md(MountPoint *m) { 32 32 33 33 static bool nonunmountable_path(const char *path) { 34 34 return path_equal(path, "/") ··· 38 38 || path_equal(path, "/usr") 39 39 #endif 40 40 -- 41 - 2.33.0 41 + 2.33.1 42 42
+3 -3
pkgs/os-specific/linux/systemd/0003-Fix-NixOS-containers.patch
··· 1 - From 37c9471f59bd57223014a4a645b5f96a71d78787 Mon Sep 17 00:00:00 2001 1 + From 43620479f6bfbbc4c3eed28947e0676c817acb7c Mon Sep 17 00:00:00 2001 2 2 From: Eelco Dolstra <eelco.dolstra@logicblox.com> 3 3 Date: Wed, 16 Apr 2014 10:59:28 +0200 4 - Subject: [PATCH 03/21] Fix NixOS containers 4 + Subject: [PATCH 03/19] Fix NixOS containers 5 5 6 6 In NixOS containers, the init script is bind-mounted into the 7 7 container, so checking early whether it exists will fail. ··· 30 30 31 31 } else { 32 32 -- 33 - 2.33.0 33 + 2.33.1 34 34
+3 -3
pkgs/os-specific/linux/systemd/0004-Look-for-fsck-in-the-right-place.patch
··· 1 - From 987d6f94dac8e1a75615fd9ddcfb0eb1c2c4c349 Mon Sep 17 00:00:00 2001 1 + From a08ed6697974d7f7dabe60d42bbc9e31a10f7e23 Mon Sep 17 00:00:00 2001 2 2 From: Eelco Dolstra <eelco.dolstra@logicblox.com> 3 3 Date: Thu, 1 May 2014 14:10:10 +0200 4 - Subject: [PATCH 04/21] Look for fsck in the right place 4 + Subject: [PATCH 04/19] Look for fsck in the right place 5 5 6 6 --- 7 7 src/fsck/fsck.c | 2 +- ··· 21 21 cmdline[i++] = "-T"; 22 22 23 23 -- 24 - 2.33.0 24 + 2.33.1 25 25
+3 -3
pkgs/os-specific/linux/systemd/0005-Add-some-NixOS-specific-unit-directories.patch
··· 1 - From da4f855044b2babe052ce303cca1de736cf952cd Mon Sep 17 00:00:00 2001 1 + From ddcfae6de8c460903c5db8c536ffeb5771e976f8 Mon Sep 17 00:00:00 2001 2 2 From: Eelco Dolstra <eelco.dolstra@logicblox.com> 3 3 Date: Fri, 19 Dec 2014 14:46:17 +0100 4 - Subject: [PATCH 05/21] Add some NixOS-specific unit directories 4 + Subject: [PATCH 05/19] Add some NixOS-specific unit directories 5 5 6 6 Look in `/nix/var/nix/profiles/default/lib/systemd/{system,user}` for 7 7 units provided by packages installed into the default profile via ··· 122 122 123 123 systemd_sleep_dir=${root_prefix}/lib/systemd/system-sleep 124 124 -- 125 - 2.33.0 125 + 2.33.1 126 126
+3 -3
pkgs/os-specific/linux/systemd/0006-Get-rid-of-a-useless-message-in-user-sessions.patch
··· 1 - From c06abdb631527f56a626b739340d1b275349612c Mon Sep 17 00:00:00 2001 1 + From b39b8871bcaa07280d6b0cf2226b1a3be31232b8 Mon Sep 17 00:00:00 2001 2 2 From: Eelco Dolstra <eelco.dolstra@logicblox.com> 3 3 Date: Mon, 11 May 2015 15:39:38 +0200 4 - Subject: [PATCH 06/21] Get rid of a useless message in user sessions 4 + Subject: [PATCH 06/19] Get rid of a useless message in user sessions 5 5 6 6 Namely lots of variants of 7 7 ··· 27 27 /* If stopping a unit fails continuously we might enter a stop loop here, hence stop acting on the 28 28 * service being unnecessary after a while. */ 29 29 -- 30 - 2.33.0 30 + 2.33.1 31 31
+3 -3
pkgs/os-specific/linux/systemd/0007-hostnamed-localed-timedated-disable-methods-that-cha.patch
··· 1 - From 207c69466cdd164c42ed1901deb06f57b12f4363 Mon Sep 17 00:00:00 2001 1 + From 566208aea81057789218b959f4d0e898eec54fc9 Mon Sep 17 00:00:00 2001 2 2 From: Gabriel Ebner <gebner@gebner.org> 3 3 Date: Sun, 6 Dec 2015 14:26:36 +0100 4 - Subject: [PATCH 07/21] hostnamed, localed, timedated: disable methods that 4 + Subject: [PATCH 07/19] hostnamed, localed, timedated: disable methods that 5 5 change system settings. 6 6 7 7 --- ··· 104 104 if (r < 0) 105 105 return r; 106 106 -- 107 - 2.33.0 107 + 2.33.1 108 108
+3 -3
pkgs/os-specific/linux/systemd/0008-Fix-hwdb-paths.patch
··· 1 - From 3ca3855259c3015615983587063fa159cfa7e93c Mon Sep 17 00:00:00 2001 1 + From 3b9983969de2a86929768f6362ed41c20dd13bd3 Mon Sep 17 00:00:00 2001 2 2 From: Nikolay Amiantov <ab@fmap.me> 3 3 Date: Thu, 7 Jul 2016 02:47:13 +0300 4 - Subject: [PATCH 08/21] Fix hwdb paths 4 + Subject: [PATCH 08/19] Fix hwdb paths 5 5 6 6 Patch by vcunat. 7 7 --- ··· 24 24 + "/etc/udev/hwdb.bin\0" 25 25 + 26 26 -- 27 - 2.33.0 27 + 2.33.1 28 28
+3 -3
pkgs/os-specific/linux/systemd/0009-Change-usr-share-zoneinfo-to-etc-zoneinfo.patch
··· 1 - From 717226ad0dc37ceb6c667c1f56396848978b6e83 Mon Sep 17 00:00:00 2001 1 + From b5966b6abb9696798618367cab33d1fed317734f Mon Sep 17 00:00:00 2001 2 2 From: Nikolay Amiantov <ab@fmap.me> 3 3 Date: Tue, 11 Oct 2016 13:12:08 +0300 4 - Subject: [PATCH 09/21] Change /usr/share/zoneinfo to /etc/zoneinfo 4 + Subject: [PATCH 09/19] Change /usr/share/zoneinfo to /etc/zoneinfo 5 5 6 6 NixOS uses this path. 7 7 --- ··· 137 137 return -ENOMEM; 138 138 139 139 -- 140 - 2.33.0 140 + 2.33.1 141 141
+3 -3
pkgs/os-specific/linux/systemd/0010-localectl-use-etc-X11-xkb-for-list-x11.patch
··· 1 - From 75d12cf65073458f091899d673c613dfc43f60c0 Mon Sep 17 00:00:00 2001 1 + From f4e9304560ad42eeb8d42be583cc55eb2e5b4bb1 Mon Sep 17 00:00:00 2001 2 2 From: Imuli <i@imu.li> 3 3 Date: Wed, 19 Oct 2016 08:46:47 -0400 4 - Subject: [PATCH 10/21] localectl: use /etc/X11/xkb for list-x11-* 4 + Subject: [PATCH 10/19] localectl: use /etc/X11/xkb for list-x11-* 5 5 6 6 NixOS has an option to link the xkb data files to /etc/X11, but not to 7 7 /usr/share/X11. ··· 23 23 return log_error_errno(errno, "Failed to open keyboard mapping list. %m"); 24 24 25 25 -- 26 - 2.33.0 26 + 2.33.1 27 27
+5 -5
pkgs/os-specific/linux/systemd/0011-build-don-t-create-statedir-and-don-t-touch-prefixdi.patch
··· 1 - From bce75eb4cdeb0b86df6b0a577e886c49a88303f6 Mon Sep 17 00:00:00 2001 1 + From 43a363f30b6012d600cfb62a3851c4ac7af4d1d5 Mon Sep 17 00:00:00 2001 2 2 From: Franz Pletz <fpletz@fnordicwalking.de> 3 3 Date: Sun, 11 Feb 2018 04:37:44 +0100 4 - Subject: [PATCH 11/21] build: don't create statedir and don't touch prefixdir 4 + Subject: [PATCH 11/19] build: don't create statedir and don't touch prefixdir 5 5 6 6 --- 7 7 meson.build | 3 --- 8 8 1 file changed, 3 deletions(-) 9 9 10 10 diff --git a/meson.build b/meson.build 11 - index b5a51b6d0d..99b071542c 100644 11 + index 5bdfd9753d..5bf6afc7b7 100644 12 12 --- a/meson.build 13 13 +++ b/meson.build 14 - @@ -3540,9 +3540,6 @@ install_data('LICENSE.GPL2', 14 + @@ -3539,9 +3539,6 @@ install_data('LICENSE.GPL2', 15 15 'docs/GVARIANT-SERIALIZATION.md', 16 16 install_dir : docdir) 17 17 ··· 22 22 23 23 # Ensure that changes to the docs/ directory do not break the 24 24 -- 25 - 2.33.0 25 + 2.33.1 26 26
+3 -3
pkgs/os-specific/linux/systemd/0012-inherit-systemd-environment-when-calling-generators.patch
··· 1 - From ecdf0c5d9f88f526521f093cc9ee85f43efab4b7 Mon Sep 17 00:00:00 2001 1 + From 7ea935a5ac4f31106ce9347227d4eb59b77b02cd Mon Sep 17 00:00:00 2001 2 2 From: Andreas Rammhold <andreas@rammhold.de> 3 3 Date: Fri, 2 Nov 2018 21:15:42 +0100 4 - Subject: [PATCH 12/21] inherit systemd environment when calling generators. 4 + Subject: [PATCH 12/19] inherit systemd environment when calling generators. 5 5 6 6 Systemd generators need access to the environment configured in 7 7 stage-2-init.sh since it schedules fsck and mkfs executions based on ··· 40 40 41 41 finish: 42 42 -- 43 - 2.33.0 43 + 2.33.1 44 44
+3 -3
pkgs/os-specific/linux/systemd/0013-add-rootprefix-to-lookup-dir-paths.patch
··· 1 - From 39969a1b01d6c223a21c770093209b7f4047aaa4 Mon Sep 17 00:00:00 2001 1 + From eb93778af78a127e8e20d6ed7fd9f91fd22dc7c9 Mon Sep 17 00:00:00 2001 2 2 From: Andreas Rammhold <andreas@rammhold.de> 3 3 Date: Thu, 9 May 2019 11:15:22 +0200 4 - Subject: [PATCH 13/21] add rootprefix to lookup dir paths 4 + Subject: [PATCH 13/19] add rootprefix to lookup dir paths 5 5 6 6 systemd does not longer use the UDEVLIBEXEC directory as root for 7 7 discovery default udev rules. By adding `$out/lib` to the lookup paths ··· 34 34 #define CONF_PATHS(n) \ 35 35 CONF_PATHS_USR(n) \ 36 36 -- 37 - 2.33.0 37 + 2.33.1 38 38
+3 -3
pkgs/os-specific/linux/systemd/0014-systemd-shutdown-execute-scripts-in-etc-systemd-syst.patch
··· 1 - From e7c960789b0ca97b24a66e9eeaa56ea645d9c66b Mon Sep 17 00:00:00 2001 1 + From 1d623def80a3532ac1445499c9d4673e21ae8195 Mon Sep 17 00:00:00 2001 2 2 From: Nikolay Amiantov <ab@fmap.me> 3 3 Date: Thu, 25 Jul 2019 20:45:55 +0300 4 - Subject: [PATCH 14/21] systemd-shutdown: execute scripts in 4 + Subject: [PATCH 14/19] systemd-shutdown: execute scripts in 5 5 /etc/systemd/system-shutdown 6 6 7 7 This is needed for NixOS to use such scripts as systemd directory is immutable. ··· 23 23 /* The log target defaults to console, but the original systemd process will pass its log target in through a 24 24 * command line argument, which will override this default. Also, ensure we'll never log to the journal or 25 25 -- 26 - 2.33.0 26 + 2.33.1 27 27
+3 -3
pkgs/os-specific/linux/systemd/0015-systemd-sleep-execute-scripts-in-etc-systemd-system-.patch
··· 1 - From 6124720aa2b9dbc07f2fb898f0db150a44a86041 Mon Sep 17 00:00:00 2001 1 + From 5a96c4a98be971d84a12ae04e42bc3cb889d5191 Mon Sep 17 00:00:00 2001 2 2 From: Nikolay Amiantov <ab@fmap.me> 3 3 Date: Thu, 25 Jul 2019 20:46:58 +0300 4 - Subject: [PATCH 15/21] systemd-sleep: execute scripts in 4 + Subject: [PATCH 15/19] systemd-sleep: execute scripts in 5 5 /etc/systemd/system-sleep 6 6 7 7 This is needed for NixOS to use such scripts as systemd directory is immutable. ··· 22 22 }; 23 23 24 24 -- 25 - 2.33.0 25 + 2.33.1 26 26
+15 -10
pkgs/os-specific/linux/systemd/0016-kmod-static-nodes.service-Update-ConditionFileNotEmp.patch
··· 1 - From bee1d855d4fb7f2d6f6b9beb1dfd14b1dea31887 Mon Sep 17 00:00:00 2001 1 + From 775a2a8940c07f4af33a2a11bfa17e0257b427cb Mon Sep 17 00:00:00 2001 2 2 From: Florian Klink <flokli@flokli.de> 3 3 Date: Sat, 7 Mar 2020 22:40:27 +0100 4 - Subject: [PATCH 16/21] kmod-static-nodes.service: Update ConditionFileNotEmpty 4 + Subject: [PATCH 16/19] kmod-static-nodes.service: Update ConditionFileNotEmpty 5 5 6 - On NixOS, kernel modules of the currently booted systems are located at 7 - /run/booted-system/kernel-modules/lib/modules/%v/, not /lib/modules/%v/. 6 + kmod loads modules from not only /lib/modules but also from 7 + /run/booted-system/kernel-modules/lib/modules and 8 + /run/current-system/kernel-modules/lib/module 9 + 10 + Co-authored-by: Arian van Putten <arian.vanputten@gmail.com> 8 11 --- 9 - units/kmod-static-nodes.service.in | 2 +- 10 - 1 file changed, 1 insertion(+), 1 deletion(-) 12 + units/kmod-static-nodes.service.in | 4 +++- 13 + 1 file changed, 3 insertions(+), 1 deletion(-) 11 14 12 15 diff --git a/units/kmod-static-nodes.service.in b/units/kmod-static-nodes.service.in 13 - index 777e82d16b..b6abc2bba0 100644 16 + index 777e82d16b..9a5e05a1cc 100644 14 17 --- a/units/kmod-static-nodes.service.in 15 18 +++ b/units/kmod-static-nodes.service.in 16 - @@ -12,7 +12,7 @@ Description=Create List of Static Device Nodes 19 + @@ -12,7 +12,9 @@ Description=Create List of Static Device Nodes 17 20 DefaultDependencies=no 18 21 Before=sysinit.target systemd-tmpfiles-setup-dev.service 19 22 ConditionCapability=CAP_SYS_MODULE 20 23 -ConditionFileNotEmpty=/lib/modules/%v/modules.devname 21 - +ConditionFileNotEmpty=/run/booted-system/kernel-modules/lib/modules/%v/modules.devname 24 + +ConditionFileNotEmpty=|/lib/modules/%v/modules.devname 25 + +ConditionFileNotEmpty=|/run/booted-system/kernel-modules/lib/modules/%v/modules.devname 26 + +ConditionFileNotEmpty=|/run/current-system/kernel-modules/lib/modules/%v/modules.devname 22 27 23 28 [Service] 24 29 Type=oneshot 25 30 -- 26 - 2.33.0 31 + 2.33.1 27 32
+3 -3
pkgs/os-specific/linux/systemd/0017-path-util.h-add-placeholder-for-DEFAULT_PATH_NORMAL.patch
··· 1 - From 62198599bbc559eeb8e2a3caebce7b9135085270 Mon Sep 17 00:00:00 2001 1 + From 6ddb2011b379f3232374327517af874b68c434b5 Mon Sep 17 00:00:00 2001 2 2 From: Florian Klink <flokli@flokli.de> 3 3 Date: Sun, 8 Mar 2020 01:05:54 +0100 4 - Subject: [PATCH 17/21] path-util.h: add placeholder for DEFAULT_PATH_NORMAL 4 + Subject: [PATCH 17/19] path-util.h: add placeholder for DEFAULT_PATH_NORMAL 5 5 6 6 This will be the $PATH used to lookup ExecStart= etc. options, which 7 7 systemd itself uses extensively. ··· 29 29 #if HAVE_SPLIT_USR 30 30 # define DEFAULT_PATH DEFAULT_PATH_SPLIT_USR 31 31 -- 32 - 2.33.0 32 + 2.33.1 33 33
+3 -3
pkgs/os-specific/linux/systemd/0018-pkg-config-derive-prefix-from-prefix.patch
··· 1 - From 7654964344ba083529cb232ab229db7c0888f782 Mon Sep 17 00:00:00 2001 1 + From 50f2ada6cbfafa75b628410e8834f29581854e6f Mon Sep 17 00:00:00 2001 2 2 From: =?UTF-8?q?J=C3=B6rg=20Thalheim?= <joerg@thalheim.io> 3 3 Date: Sun, 6 Dec 2020 08:34:19 +0100 4 - Subject: [PATCH 18/21] pkg-config: derive prefix from --prefix 4 + Subject: [PATCH 18/19] pkg-config: derive prefix from --prefix 5 5 6 6 Point prefix to the one configured, instead of `/usr` `systemd` has limited 7 7 support for making the pkgconfig prefix overridable, and interpolates those ··· 29 29 rootprefix=${root_prefix} 30 30 sysconf_dir={{SYSCONF_DIR}} 31 31 -- 32 - 2.33.0 32 + 2.33.1 33 33
+3 -3
pkgs/os-specific/linux/systemd/0019-core-handle-lookup-paths-being-symlinks.patch
··· 1 - From 4e9b4aa87d299be08cffc77a86d6f473a7a4109a Mon Sep 17 00:00:00 2001 1 + From 2ab388cf0be320879e668a6206cb15d002b55f98 Mon Sep 17 00:00:00 2001 2 2 From: Andreas Rammhold <andreas@rammhold.de> 3 3 Date: Wed, 18 Aug 2021 19:10:08 +0200 4 - Subject: [PATCH 19/21] core: handle lookup paths being symlinks 4 + Subject: [PATCH 19/19] core: handle lookup paths being symlinks 5 5 6 6 With a recent change paths leaving the statically known lookup paths 7 7 would be treated differently then those that remained within those. That ··· 76 76 log_debug("%s: linked unit file: %s → %s", 77 77 __func__, filename, simplified); 78 78 -- 79 - 2.33.0 79 + 2.33.1 80 80
-401
pkgs/os-specific/linux/systemd/0020-sd-boot-Unify-error-handling.patch
··· 1 - From 3cf1b5fb6d1dc342e836cf0990df3170d2e9db49 Mon Sep 17 00:00:00 2001 2 - From: Jan Janssen <medhefgo@web.de> 3 - Date: Wed, 11 Aug 2021 14:59:46 +0200 4 - Subject: [PATCH 20/21] sd-boot: Unify error handling 5 - 6 - log_error_stall() and log_error_status_stall() will ensure the user has 7 - a chance to catch an error message by stalling and also forcing a 8 - lightred/black color on it. Also, convert several Print() calls to it 9 - since they are actually error messages. 10 - 11 - (cherry picked from commit 8aba0eec499b762657f528988c2f093ac490620d) 12 - --- 13 - src/boot/efi/boot.c | 62 ++++++++++---------------------- 14 - src/boot/efi/random-seed.c | 73 +++++++++++++------------------------- 15 - src/boot/efi/stub.c | 24 ++++--------- 16 - src/boot/efi/util.c | 17 +++++++-- 17 - src/boot/efi/util.h | 9 +++++ 18 - 5 files changed, 75 insertions(+), 110 deletions(-) 19 - 20 - diff --git a/src/boot/efi/boot.c b/src/boot/efi/boot.c 21 - index 13940a6df7..54d704f0d1 100644 22 - --- a/src/boot/efi/boot.c 23 - +++ b/src/boot/efi/boot.c 24 - @@ -527,7 +527,7 @@ static BOOLEAN menu_run( 25 - err = console_set_mode(&config->console_mode, config->console_mode_change); 26 - if (EFI_ERROR(err)) { 27 - uefi_call_wrapper(ST->ConOut->ClearScreen, 1, ST->ConOut); 28 - - Print(L"Error switching console mode to %ld: %r.\r", (UINT64)config->console_mode, err); 29 - + log_error_stall(L"Error switching console mode to %lu: %r", (UINT64)config->console_mode, err); 30 - } 31 - } else 32 - uefi_call_wrapper(ST->ConOut->ClearScreen, 1, ST->ConOut); 33 - @@ -1221,8 +1221,7 @@ static VOID config_entry_bump_counters( 34 - break; 35 - 36 - if (r != EFI_BUFFER_TOO_SMALL || file_info_size * 2 < file_info_size) { 37 - - Print(L"\nFailed to get file info for '%s': %r\n", old_path, r); 38 - - uefi_call_wrapper(BS->Stall, 1, 3 * 1000 * 1000); 39 - + log_error_stall(L"Failed to get file info for '%s': %r", old_path, r); 40 - return; 41 - } 42 - 43 - @@ -1234,8 +1233,7 @@ static VOID config_entry_bump_counters( 44 - StrCpy(file_info->FileName, entry->next_name); 45 - r = uefi_call_wrapper(handle->SetInfo, 4, handle, &EfiFileInfoGuid, file_info_size, file_info); 46 - if (EFI_ERROR(r)) { 47 - - Print(L"\nFailed to rename '%s' to '%s', ignoring: %r\n", old_path, entry->next_name, r); 48 - - uefi_call_wrapper(BS->Stall, 1, 3 * 1000 * 1000); 49 - + log_error_stall(L"Failed to rename '%s' to '%s', ignoring: %r", old_path, entry->next_name, r); 50 - return; 51 - } 52 - 53 - @@ -2165,18 +2163,12 @@ static EFI_STATUS image_start( 54 - EFI_STATUS err; 55 - 56 - path = FileDevicePath(entry->device, entry->loader); 57 - - if (!path) { 58 - - Print(L"Error getting device path."); 59 - - uefi_call_wrapper(BS->Stall, 1, 3 * 1000 * 1000); 60 - - return EFI_INVALID_PARAMETER; 61 - - } 62 - + if (!path) 63 - + return log_error_status_stall(EFI_INVALID_PARAMETER, L"Error getting device path."); 64 - 65 - err = uefi_call_wrapper(BS->LoadImage, 6, FALSE, parent_image, path, NULL, 0, &image); 66 - - if (EFI_ERROR(err)) { 67 - - Print(L"Error loading %s: %r", entry->loader, err); 68 - - uefi_call_wrapper(BS->Stall, 1, 3 * 1000 * 1000); 69 - - return err; 70 - - } 71 - + if (EFI_ERROR(err)) 72 - + return log_error_status_stall(err, L"Error loading %s: %r", entry->loader, err); 73 - 74 - if (config->options_edit) 75 - options = config->options_edit; 76 - @@ -2190,8 +2182,7 @@ static EFI_STATUS image_start( 77 - err = uefi_call_wrapper(BS->OpenProtocol, 6, image, &LoadedImageProtocol, (VOID **)&loaded_image, 78 - parent_image, NULL, EFI_OPEN_PROTOCOL_GET_PROTOCOL); 79 - if (EFI_ERROR(err)) { 80 - - Print(L"Error getting LoadedImageProtocol handle: %r", err); 81 - - uefi_call_wrapper(BS->Stall, 1, 3 * 1000 * 1000); 82 - + log_error_stall(L"Error getting LoadedImageProtocol handle: %r", err); 83 - goto out_unload; 84 - } 85 - loaded_image->LoadOptions = options; 86 - @@ -2202,10 +2193,8 @@ static EFI_STATUS image_start( 87 - err = tpm_log_event(SD_TPM_PCR, 88 - (EFI_PHYSICAL_ADDRESS) (UINTN) loaded_image->LoadOptions, 89 - loaded_image->LoadOptionsSize, loaded_image->LoadOptions); 90 - - if (EFI_ERROR(err)) { 91 - - Print(L"Unable to add image options measurement: %r", err); 92 - - uefi_call_wrapper(BS->Stall, 1, 200 * 1000); 93 - - } 94 - + if (EFI_ERROR(err)) 95 - + log_error_stall(L"Unable to add image options measurement: %r", err); 96 - #endif 97 - } 98 - 99 - @@ -2231,9 +2220,7 @@ static EFI_STATUS reboot_into_firmware(VOID) { 100 - return err; 101 - 102 - err = uefi_call_wrapper(RT->ResetSystem, 4, EfiResetCold, EFI_SUCCESS, 0, NULL); 103 - - Print(L"Error calling ResetSystem: %r", err); 104 - - uefi_call_wrapper(BS->Stall, 1, 3 * 1000 * 1000); 105 - - return err; 106 - + return log_error_status_stall(err, L"Error calling ResetSystem: %r", err); 107 - } 108 - 109 - static VOID config_free(Config *config) { 110 - @@ -2305,30 +2292,21 @@ EFI_STATUS efi_main(EFI_HANDLE image, EFI_SYSTEM_TABLE *sys_table) { 111 - 112 - err = uefi_call_wrapper(BS->OpenProtocol, 6, image, &LoadedImageProtocol, (VOID **)&loaded_image, 113 - image, NULL, EFI_OPEN_PROTOCOL_GET_PROTOCOL); 114 - - if (EFI_ERROR(err)) { 115 - - Print(L"Error getting a LoadedImageProtocol handle: %r", err); 116 - - uefi_call_wrapper(BS->Stall, 1, 3 * 1000 * 1000); 117 - - return err; 118 - - } 119 - + if (EFI_ERROR(err)) 120 - + return log_error_status_stall(err, L"Error getting a LoadedImageProtocol handle: %r", err); 121 - 122 - /* export the device path this image is started from */ 123 - if (disk_get_part_uuid(loaded_image->DeviceHandle, uuid) == EFI_SUCCESS) 124 - efivar_set(LOADER_GUID, L"LoaderDevicePartUUID", uuid, 0); 125 - 126 - root_dir = LibOpenRoot(loaded_image->DeviceHandle); 127 - - if (!root_dir) { 128 - - Print(L"Unable to open root directory."); 129 - - uefi_call_wrapper(BS->Stall, 1, 3 * 1000 * 1000); 130 - - return EFI_LOAD_ERROR; 131 - - } 132 - + if (!root_dir) 133 - + return log_error_status_stall(EFI_LOAD_ERROR, L"Unable to open root directory.", EFI_LOAD_ERROR); 134 - 135 - if (secure_boot_enabled() && shim_loaded()) { 136 - err = security_policy_install(); 137 - - if (EFI_ERROR(err)) { 138 - - Print(L"Error installing security policy: %r ", err); 139 - - uefi_call_wrapper(BS->Stall, 1, 3 * 1000 * 1000); 140 - - return err; 141 - - } 142 - + if (EFI_ERROR(err)) 143 - + return log_error_status_stall(err, L"Error installing security policy: %r", err); 144 - } 145 - 146 - /* the filesystem path to this image, to prevent adding ourselves to the menu */ 147 - @@ -2367,8 +2345,7 @@ EFI_STATUS efi_main(EFI_HANDLE image, EFI_SYSTEM_TABLE *sys_table) { 148 - } 149 - 150 - if (config.entry_count == 0) { 151 - - Print(L"No loader found. Configuration files in \\loader\\entries\\*.conf are needed."); 152 - - uefi_call_wrapper(BS->Stall, 1, 3 * 1000 * 1000); 153 - + log_error_stall(L"No loader found. Configuration files in \\loader\\entries\\*.conf are needed."); 154 - goto out; 155 - } 156 - 157 - @@ -2440,8 +2417,7 @@ EFI_STATUS efi_main(EFI_HANDLE image, EFI_SYSTEM_TABLE *sys_table) { 158 - err = image_start(image, &config, entry); 159 - if (EFI_ERROR(err)) { 160 - graphics_mode(FALSE); 161 - - Print(L"\nFailed to execute %s (%s): %r\n", entry->title, entry->loader, err); 162 - - uefi_call_wrapper(BS->Stall, 1, 3 * 1000 * 1000); 163 - + log_error_stall(L"Failed to execute %s (%s): %r", entry->title, entry->loader, err); 164 - goto out; 165 - } 166 - 167 - diff --git a/src/boot/efi/random-seed.c b/src/boot/efi/random-seed.c 168 - index 3e179851b0..939daf3e41 100644 169 - --- a/src/boot/efi/random-seed.c 170 - +++ b/src/boot/efi/random-seed.c 171 - @@ -35,10 +35,8 @@ static EFI_STATUS acquire_rng(UINTN size, VOID **ret) { 172 - return log_oom(); 173 - 174 - err = uefi_call_wrapper(rng->GetRNG, 3, rng, NULL, size, data); 175 - - if (EFI_ERROR(err)) { 176 - - Print(L"Failed to acquire RNG data: %r\n", err); 177 - - return err; 178 - - } 179 - + if (EFI_ERROR(err)) 180 - + return log_error_status_stall(err, L"Failed to acquire RNG data: %r", err); 181 - 182 - *ret = TAKE_PTR(data); 183 - return EFI_SUCCESS; 184 - @@ -149,14 +147,12 @@ static EFI_STATUS acquire_system_token(VOID **ret, UINTN *ret_size) { 185 - err = efivar_get_raw(LOADER_GUID, L"LoaderSystemToken", &data, &size); 186 - if (EFI_ERROR(err)) { 187 - if (err != EFI_NOT_FOUND) 188 - - Print(L"Failed to read LoaderSystemToken EFI variable: %r", err); 189 - + log_error_stall(L"Failed to read LoaderSystemToken EFI variable: %r", err); 190 - return err; 191 - } 192 - 193 - - if (size <= 0) { 194 - - Print(L"System token too short, ignoring."); 195 - - return EFI_NOT_FOUND; 196 - - } 197 - + if (size <= 0) 198 - + return log_error_status_stall(EFI_NOT_FOUND, L"System token too short, ignoring."); 199 - 200 - *ret = TAKE_PTR(data); 201 - *ret_size = size; 202 - @@ -209,8 +205,7 @@ static VOID validate_sha256(void) { 203 - sha256_finish_ctx(&hash, result); 204 - 205 - if (CompareMem(result, array[i].hash, HASH_VALUE_SIZE) != 0) { 206 - - Print(L"SHA256 failed validation.\n"); 207 - - uefi_call_wrapper(BS->Stall, 1, 120 * 1000 * 1000); 208 - + log_error_stall(L"SHA256 failed validation."); 209 - return; 210 - } 211 - } 212 - @@ -246,7 +241,7 @@ EFI_STATUS process_random_seed(EFI_FILE *root_dir, RandomSeedMode mode) { 213 - err = uefi_call_wrapper(root_dir->Open, 5, root_dir, &handle, (CHAR16*) L"\\loader\\random-seed", EFI_FILE_MODE_READ|EFI_FILE_MODE_WRITE, 0ULL); 214 - if (EFI_ERROR(err)) { 215 - if (err != EFI_NOT_FOUND && err != EFI_WRITE_PROTECTED) 216 - - Print(L"Failed to open random seed file: %r\n", err); 217 - + log_error_stall(L"Failed to open random seed file: %r", err); 218 - return err; 219 - } 220 - 221 - @@ -255,15 +250,11 @@ EFI_STATUS process_random_seed(EFI_FILE *root_dir, RandomSeedMode mode) { 222 - return log_oom(); 223 - 224 - size = info->FileSize; 225 - - if (size < RANDOM_MAX_SIZE_MIN) { 226 - - Print(L"Random seed file is too short?\n"); 227 - - return EFI_INVALID_PARAMETER; 228 - - } 229 - + if (size < RANDOM_MAX_SIZE_MIN) 230 - + return log_error_status_stall(EFI_INVALID_PARAMETER, L"Random seed file is too short."); 231 - 232 - - if (size > RANDOM_MAX_SIZE_MAX) { 233 - - Print(L"Random seed file is too large?\n"); 234 - - return EFI_INVALID_PARAMETER; 235 - - } 236 - + if (size > RANDOM_MAX_SIZE_MAX) 237 - + return log_error_status_stall(EFI_INVALID_PARAMETER, L"Random seed file is too large."); 238 - 239 - seed = AllocatePool(size); 240 - if (!seed) 241 - @@ -271,20 +262,14 @@ EFI_STATUS process_random_seed(EFI_FILE *root_dir, RandomSeedMode mode) { 242 - 243 - rsize = size; 244 - err = uefi_call_wrapper(handle->Read, 3, handle, &rsize, seed); 245 - - if (EFI_ERROR(err)) { 246 - - Print(L"Failed to read random seed file: %r\n", err); 247 - - return err; 248 - - } 249 - - if (rsize != size) { 250 - - Print(L"Short read on random seed file\n"); 251 - - return EFI_PROTOCOL_ERROR; 252 - - } 253 - + if (EFI_ERROR(err)) 254 - + return log_error_status_stall(err, L"Failed to read random seed file: %r", err); 255 - + if (rsize != size) 256 - + return log_error_status_stall(EFI_PROTOCOL_ERROR, L"Short read on random seed file."); 257 - 258 - err = uefi_call_wrapper(handle->SetPosition, 2, handle, 0); 259 - - if (EFI_ERROR(err)) { 260 - - Print(L"Failed to seek to beginning of random seed file: %r\n", err); 261 - - return err; 262 - - } 263 - + if (EFI_ERROR(err)) 264 - + return log_error_status_stall(err, L"Failed to seek to beginning of random seed file: %r", err); 265 - 266 - /* Request some random data from the UEFI RNG. We don't need this to work safely, but it's a good 267 - * idea to use it because it helps us for cases where users mistakenly include a random seed in 268 - @@ -299,27 +284,19 @@ EFI_STATUS process_random_seed(EFI_FILE *root_dir, RandomSeedMode mode) { 269 - /* Update the random seed on disk before we use it */ 270 - wsize = size; 271 - err = uefi_call_wrapper(handle->Write, 3, handle, &wsize, new_seed); 272 - - if (EFI_ERROR(err)) { 273 - - Print(L"Failed to write random seed file: %r\n", err); 274 - - return err; 275 - - } 276 - - if (wsize != size) { 277 - - Print(L"Short write on random seed file\n"); 278 - - return EFI_PROTOCOL_ERROR; 279 - - } 280 - + if (EFI_ERROR(err)) 281 - + return log_error_status_stall(err, L"Failed to write random seed file: %r", err); 282 - + if (wsize != size) 283 - + return log_error_status_stall(EFI_PROTOCOL_ERROR, L"Short write on random seed file."); 284 - 285 - err = uefi_call_wrapper(handle->Flush, 1, handle); 286 - - if (EFI_ERROR(err)) { 287 - - Print(L"Failed to flush random seed file: %r\n"); 288 - - return err; 289 - - } 290 - + if (EFI_ERROR(err)) 291 - + return log_error_status_stall(err, L"Failed to flush random seed file: %r", err); 292 - 293 - /* We are good to go */ 294 - err = efivar_set_raw(LOADER_GUID, L"LoaderRandomSeed", for_kernel, size, 0); 295 - - if (EFI_ERROR(err)) { 296 - - Print(L"Failed to write random seed to EFI variable: %r\n", err); 297 - - return err; 298 - - } 299 - + if (EFI_ERROR(err)) 300 - + return log_error_status_stall(err, L"Failed to write random seed to EFI variable: %r", err); 301 - 302 - return EFI_SUCCESS; 303 - } 304 - diff --git a/src/boot/efi/stub.c b/src/boot/efi/stub.c 305 - index 082fe91c9e..82da1d3ec4 100644 306 - --- a/src/boot/efi/stub.c 307 - +++ b/src/boot/efi/stub.c 308 - @@ -36,18 +36,12 @@ EFI_STATUS efi_main(EFI_HANDLE image, EFI_SYSTEM_TABLE *sys_table) { 309 - 310 - err = uefi_call_wrapper(BS->OpenProtocol, 6, image, &LoadedImageProtocol, (VOID **)&loaded_image, 311 - image, NULL, EFI_OPEN_PROTOCOL_GET_PROTOCOL); 312 - - if (EFI_ERROR(err)) { 313 - - Print(L"Error getting a LoadedImageProtocol handle: %r ", err); 314 - - uefi_call_wrapper(BS->Stall, 1, 3 * 1000 * 1000); 315 - - return err; 316 - - } 317 - + if (EFI_ERROR(err)) 318 - + return log_error_status_stall(err, L"Error getting a LoadedImageProtocol handle: %r", err); 319 - 320 - err = pe_memory_locate_sections(loaded_image->ImageBase, sections, addrs, offs, szs); 321 - - if (EFI_ERROR(err)) { 322 - - Print(L"Unable to locate embedded .linux section: %r ", err); 323 - - uefi_call_wrapper(BS->Stall, 1, 3 * 1000 * 1000); 324 - - return err; 325 - - } 326 - + if (EFI_ERROR(err)) 327 - + return log_error_status_stall(err, L"Unable to locate embedded .linux section: %r", err); 328 - 329 - if (szs[0] > 0) 330 - cmdline = (CHAR8 *)(loaded_image->ImageBase) + addrs[0]; 331 - @@ -72,10 +66,8 @@ EFI_STATUS efi_main(EFI_HANDLE image, EFI_SYSTEM_TABLE *sys_table) { 332 - err = tpm_log_event(SD_TPM_PCR, 333 - (EFI_PHYSICAL_ADDRESS) (UINTN) loaded_image->LoadOptions, 334 - loaded_image->LoadOptionsSize, loaded_image->LoadOptions); 335 - - if (EFI_ERROR(err)) { 336 - - Print(L"Unable to add image options measurement: %r", err); 337 - - uefi_call_wrapper(BS->Stall, 1, 200 * 1000); 338 - - } 339 - + if (EFI_ERROR(err)) 340 - + log_error_stall(L"Unable to add image options measurement: %r", err); 341 - #endif 342 - } 343 - 344 - @@ -126,7 +118,5 @@ EFI_STATUS efi_main(EFI_HANDLE image, EFI_SYSTEM_TABLE *sys_table) { 345 - (UINTN)loaded_image->ImageBase + addrs[2], szs[2]); 346 - 347 - graphics_mode(FALSE); 348 - - Print(L"Execution of embedded linux image failed: %r\n", err); 349 - - uefi_call_wrapper(BS->Stall, 1, 3 * 1000 * 1000); 350 - - return err; 351 - + return log_error_status_stall(err, L"Execution of embedded linux image failed: %r", err); 352 - } 353 - diff --git a/src/boot/efi/util.c b/src/boot/efi/util.c 354 - index 6f4e5933d3..aee076060b 100644 355 - --- a/src/boot/efi/util.c 356 - +++ b/src/boot/efi/util.c 357 - @@ -411,8 +411,21 @@ EFI_STATUS file_read(EFI_FILE_HANDLE dir, const CHAR16 *name, UINTN off, UINTN s 358 - return err; 359 - } 360 - 361 - +VOID log_error_stall(const CHAR16 *fmt, ...) { 362 - + va_list args; 363 - + 364 - + uefi_call_wrapper(ST->ConOut->SetAttribute, 2, ST->ConOut, EFI_LIGHTRED|EFI_BACKGROUND_BLACK); 365 - + 366 - + Print(L"\n"); 367 - + va_start(args, fmt); 368 - + VPrint(fmt, args); 369 - + va_end(args); 370 - + Print(L"\n"); 371 - + 372 - + uefi_call_wrapper(BS->Stall, 1, 3 * 1000 * 1000); 373 - +} 374 - + 375 - EFI_STATUS log_oom(void) { 376 - - Print(L"Out of memory."); 377 - - (void) uefi_call_wrapper(BS->Stall, 1, 3 * 1000 * 1000); 378 - + log_error_stall(L"Out of memory."); 379 - return EFI_OUT_OF_RESOURCES; 380 - } 381 - diff --git a/src/boot/efi/util.h b/src/boot/efi/util.h 382 - index 1a42b01033..d3bf848a95 100644 383 - --- a/src/boot/efi/util.h 384 - +++ b/src/boot/efi/util.h 385 - @@ -74,4 +74,13 @@ static inline void FileHandleClosep(EFI_FILE_HANDLE *handle) { 386 - #define UINT64_MAX ((UINT64) -1) 387 - #endif 388 - 389 - +VOID log_error_stall(const CHAR16 *fmt, ...); 390 - EFI_STATUS log_oom(void); 391 - + 392 - +/* This works just like log_error_errno() from userspace, but requires you 393 - + * to provide err a second time if you want to use %r in the message! */ 394 - +#define log_error_status_stall(err, fmt, ...) \ 395 - + ({ \ 396 - + log_error_stall(fmt, ##__VA_ARGS__); \ 397 - + err; \ 398 - + }) 399 - -- 400 - 2.33.0 401 -
-320
pkgs/os-specific/linux/systemd/0021-sd-boot-Rework-console-input-handling.patch
··· 1 - From 2d9fcfcfa38667ada306e095599944f941576e53 Mon Sep 17 00:00:00 2001 2 - From: Jan Janssen <medhefgo@web.de> 3 - Date: Wed, 11 Aug 2021 14:59:46 +0200 4 - Subject: [PATCH 21/21] sd-boot: Rework console input handling 5 - 6 - Fixes: #15847 7 - Probably fixes: #19191 8 - 9 - (cherry picked from commit e98d271e57f3d0356e444b6ea2d48836ee2769b0) 10 - --- 11 - src/boot/efi/boot.c | 55 +++++++--------------- 12 - src/boot/efi/console.c | 102 +++++++++++++++++++++++++++++------------ 13 - src/boot/efi/console.h | 2 +- 14 - 3 files changed, 91 insertions(+), 68 deletions(-) 15 - 16 - diff --git a/src/boot/efi/boot.c b/src/boot/efi/boot.c 17 - index 54d704f0d1..b4f3b9605a 100644 18 - --- a/src/boot/efi/boot.c 19 - +++ b/src/boot/efi/boot.c 20 - @@ -134,7 +134,7 @@ static BOOLEAN line_edit( 21 - uefi_call_wrapper(ST->ConOut->OutputString, 2, ST->ConOut, print); 22 - uefi_call_wrapper(ST->ConOut->SetCursorPosition, 3, ST->ConOut, cursor, y_pos); 23 - 24 - - err = console_key_read(&key, TRUE); 25 - + err = console_key_read(&key, 0); 26 - if (EFI_ERROR(err)) 27 - continue; 28 - 29 - @@ -387,7 +387,7 @@ static VOID print_status(Config *config, CHAR16 *loaded_image_path) { 30 - Print(L"OsIndicationsSupported: %d\n", indvar); 31 - 32 - Print(L"\n--- press key ---\n\n"); 33 - - console_key_read(&key, TRUE); 34 - + console_key_read(&key, 0); 35 - 36 - Print(L"timeout: %u\n", config->timeout_sec); 37 - if (config->timeout_sec_efivar >= 0) 38 - @@ -432,7 +432,7 @@ static VOID print_status(Config *config, CHAR16 *loaded_image_path) { 39 - Print(L"LoaderEntryDefault: %s\n", defaultstr); 40 - 41 - Print(L"\n--- press key ---\n\n"); 42 - - console_key_read(&key, TRUE); 43 - + console_key_read(&key, 0); 44 - 45 - for (UINTN i = 0; i < config->entry_count; i++) { 46 - ConfigEntry *entry; 47 - @@ -482,7 +482,7 @@ static VOID print_status(Config *config, CHAR16 *loaded_image_path) { 48 - entry->path, entry->next_name); 49 - 50 - Print(L"\n--- press key ---\n\n"); 51 - - console_key_read(&key, TRUE); 52 - + console_key_read(&key, 0); 53 - } 54 - 55 - uefi_call_wrapper(ST->ConOut->ClearScreen, 1, ST->ConOut); 56 - @@ -509,11 +509,10 @@ static BOOLEAN menu_run( 57 - UINTN y_max; 58 - CHAR16 *status; 59 - CHAR16 *clearline; 60 - - INTN timeout_remain; 61 - + UINTN timeout_remain = config->timeout_sec; 62 - INT16 idx; 63 - BOOLEAN exit = FALSE; 64 - BOOLEAN run = TRUE; 65 - - BOOLEAN wait = FALSE; 66 - 67 - graphics_mode(FALSE); 68 - uefi_call_wrapper(ST->ConIn->Reset, 2, ST->ConIn, FALSE); 69 - @@ -538,12 +537,6 @@ static BOOLEAN menu_run( 70 - y_max = 25; 71 - } 72 - 73 - - /* we check 10 times per second for a keystroke */ 74 - - if (config->timeout_sec > 0) 75 - - timeout_remain = config->timeout_sec * 10; 76 - - else 77 - - timeout_remain = -1; 78 - - 79 - idx_highlight = config->idx_default; 80 - idx_highlight_prev = 0; 81 - 82 - @@ -643,7 +636,7 @@ static BOOLEAN menu_run( 83 - 84 - if (timeout_remain > 0) { 85 - FreePool(status); 86 - - status = PoolPrint(L"Boot in %d sec.", (timeout_remain + 5) / 10); 87 - + status = PoolPrint(L"Boot in %d s.", timeout_remain); 88 - } 89 - 90 - /* print status at last line of screen */ 91 - @@ -664,27 +657,18 @@ static BOOLEAN menu_run( 92 - uefi_call_wrapper(ST->ConOut->OutputString, 2, ST->ConOut, clearline+1 + x + len); 93 - } 94 - 95 - - err = console_key_read(&key, wait); 96 - - if (EFI_ERROR(err)) { 97 - - /* timeout reached */ 98 - + err = console_key_read(&key, timeout_remain > 0 ? 1000 * 1000 : 0); 99 - + if (err == EFI_TIMEOUT) { 100 - + timeout_remain--; 101 - if (timeout_remain == 0) { 102 - exit = TRUE; 103 - break; 104 - } 105 - 106 - - /* sleep and update status */ 107 - - if (timeout_remain > 0) { 108 - - uefi_call_wrapper(BS->Stall, 1, 100 * 1000); 109 - - timeout_remain--; 110 - - continue; 111 - - } 112 - - 113 - - /* timeout disabled, wait for next key */ 114 - - wait = TRUE; 115 - + /* update status */ 116 - continue; 117 - - } 118 - - 119 - - timeout_remain = -1; 120 - + } else 121 - + timeout_remain = 0; 122 - 123 - /* clear status after keystroke */ 124 - if (status) { 125 - @@ -787,7 +771,7 @@ static BOOLEAN menu_run( 126 - config->timeout_sec_efivar, 127 - EFI_VARIABLE_NON_VOLATILE); 128 - if (config->timeout_sec_efivar > 0) 129 - - status = PoolPrint(L"Menu timeout set to %d sec.", config->timeout_sec_efivar); 130 - + status = PoolPrint(L"Menu timeout set to %d s.", config->timeout_sec_efivar); 131 - else 132 - status = StrDuplicate(L"Menu disabled. Hold down key at bootup to show menu."); 133 - } else if (config->timeout_sec_efivar <= 0){ 134 - @@ -795,7 +779,7 @@ static BOOLEAN menu_run( 135 - efivar_set( 136 - LOADER_GUID, L"LoaderConfigTimeout", NULL, EFI_VARIABLE_NON_VOLATILE); 137 - if (config->timeout_sec_config > 0) 138 - - status = PoolPrint(L"Menu timeout of %d sec is defined by configuration file.", 139 - + status = PoolPrint(L"Menu timeout of %d s is defined by configuration file.", 140 - config->timeout_sec_config); 141 - else 142 - status = StrDuplicate(L"Menu disabled. Hold down key at bootup to show menu."); 143 - @@ -813,7 +797,7 @@ static BOOLEAN menu_run( 144 - config->timeout_sec_efivar, 145 - EFI_VARIABLE_NON_VOLATILE); 146 - if (config->timeout_sec_efivar > 0) 147 - - status = PoolPrint(L"Menu timeout set to %d sec.", 148 - + status = PoolPrint(L"Menu timeout set to %d s.", 149 - config->timeout_sec_efivar); 150 - else 151 - status = StrDuplicate(L"Menu disabled. Hold down key at bootup to show menu."); 152 - @@ -2369,13 +2353,8 @@ EFI_STATUS efi_main(EFI_HANDLE image, EFI_SYSTEM_TABLE *sys_table) { 153 - else { 154 - UINT64 key; 155 - 156 - - err = console_key_read(&key, FALSE); 157 - - 158 - - if (err == EFI_NOT_READY) { 159 - - uefi_call_wrapper(BS->Stall, 1, 100 * 1000); 160 - - err = console_key_read(&key, FALSE); 161 - - } 162 - - 163 - + /* Block up to 100ms to give firmware time to get input working. */ 164 - + err = console_key_read(&key, 100 * 1000); 165 - if (!EFI_ERROR(err)) { 166 - INT16 idx; 167 - 168 - diff --git a/src/boot/efi/console.c b/src/boot/efi/console.c 169 - index 83619d2147..369c549daf 100644 170 - --- a/src/boot/efi/console.c 171 - +++ b/src/boot/efi/console.c 172 - @@ -11,61 +11,105 @@ 173 - 174 - #define EFI_SIMPLE_TEXT_INPUT_EX_GUID &(EFI_GUID) EFI_SIMPLE_TEXT_INPUT_EX_PROTOCOL_GUID 175 - 176 - -EFI_STATUS console_key_read(UINT64 *key, BOOLEAN wait) { 177 - +static inline void EventClosep(EFI_EVENT *event) { 178 - + if (!*event) 179 - + return; 180 - + 181 - + uefi_call_wrapper(BS->CloseEvent, 1, *event); 182 - +} 183 - + 184 - +/* 185 - + * Reading input from the console sounds like an easy task to do, but thanks to broken 186 - + * firmware it is actually a nightmare. 187 - + * 188 - + * There is a ConIn and TextInputEx API for this. Ideally we want to use TextInputEx, 189 - + * because that gives us Ctrl/Alt/Shift key state information. Unfortunately, it is not 190 - + * always available and sometimes just non-functional. 191 - + * 192 - + * On the other hand we have ConIn, where some firmware likes to just freeze on us 193 - + * if we call ReadKeyStroke on it. 194 - + * 195 - + * Therefore, we use WaitForEvent on both ConIn and TextInputEx (if available) along 196 - + * with a timer event. The timer ensures there is no need to call into functions 197 - + * that might freeze on us, while still allowing us to show a timeout counter. 198 - + */ 199 - +EFI_STATUS console_key_read(UINT64 *key, UINT64 timeout_usec) { 200 - static EFI_SIMPLE_TEXT_INPUT_EX_PROTOCOL *TextInputEx; 201 - static BOOLEAN checked; 202 - UINTN index; 203 - EFI_INPUT_KEY k; 204 - EFI_STATUS err; 205 - + _cleanup_(EventClosep) EFI_EVENT timer = NULL; 206 - + EFI_EVENT events[3] = { ST->ConIn->WaitForKey }; 207 - + UINTN n_events = 1; 208 - 209 - if (!checked) { 210 - err = LibLocateProtocol(EFI_SIMPLE_TEXT_INPUT_EX_GUID, (VOID **)&TextInputEx); 211 - - if (EFI_ERROR(err)) 212 - + if (EFI_ERROR(err) || 213 - + uefi_call_wrapper(BS->CheckEvent, 1, TextInputEx->WaitForKeyEx) == EFI_INVALID_PARAMETER) 214 - + /* If WaitForKeyEx fails here, the firmware pretends it talks this 215 - + * protocol, but it really doesn't. */ 216 - TextInputEx = NULL; 217 - + else 218 - + events[n_events++] = TextInputEx->WaitForKeyEx; 219 - 220 - checked = TRUE; 221 - } 222 - 223 - - /* wait until key is pressed */ 224 - - if (wait) 225 - - uefi_call_wrapper(BS->WaitForEvent, 3, 1, &ST->ConIn->WaitForKey, &index); 226 - + if (timeout_usec > 0) { 227 - + err = uefi_call_wrapper(BS->CreateEvent, 5, EVT_TIMER, 0, NULL, NULL, &timer); 228 - + if (EFI_ERROR(err)) 229 - + return log_error_status_stall(err, L"Error creating timer event: %r", err); 230 - + 231 - + /* SetTimer expects 100ns units for some reason. */ 232 - + err = uefi_call_wrapper(BS->SetTimer, 3, timer, TimerRelative, timeout_usec * 10); 233 - + if (EFI_ERROR(err)) 234 - + return log_error_status_stall(err, L"Error arming timer event: %r", err); 235 - 236 - - if (TextInputEx) { 237 - + events[n_events++] = timer; 238 - + } 239 - + 240 - + err = uefi_call_wrapper(BS->WaitForEvent, 3, n_events, events, &index); 241 - + if (EFI_ERROR(err)) 242 - + return log_error_status_stall(err, L"Error waiting for events: %r", err); 243 - + 244 - + if (timeout_usec > 0 && timer == events[index]) 245 - + return EFI_TIMEOUT; 246 - + 247 - + /* TextInputEx might be ready too even if ConIn got to signal first. */ 248 - + if (TextInputEx && !EFI_ERROR(uefi_call_wrapper(BS->CheckEvent, 1, TextInputEx->WaitForKeyEx))) { 249 - EFI_KEY_DATA keydata; 250 - UINT64 keypress; 251 - + UINT32 shift = 0; 252 - 253 - err = uefi_call_wrapper(TextInputEx->ReadKeyStrokeEx, 2, TextInputEx, &keydata); 254 - - if (!EFI_ERROR(err)) { 255 - - UINT32 shift = 0; 256 - - 257 - - /* do not distinguish between left and right keys */ 258 - - if (keydata.KeyState.KeyShiftState & EFI_SHIFT_STATE_VALID) { 259 - - if (keydata.KeyState.KeyShiftState & (EFI_RIGHT_CONTROL_PRESSED|EFI_LEFT_CONTROL_PRESSED)) 260 - - shift |= EFI_CONTROL_PRESSED; 261 - - if (keydata.KeyState.KeyShiftState & (EFI_RIGHT_ALT_PRESSED|EFI_LEFT_ALT_PRESSED)) 262 - - shift |= EFI_ALT_PRESSED; 263 - - }; 264 - - 265 - - /* 32 bit modifier keys + 16 bit scan code + 16 bit unicode */ 266 - - keypress = KEYPRESS(shift, keydata.Key.ScanCode, keydata.Key.UnicodeChar); 267 - - if (keypress > 0) { 268 - - *key = keypress; 269 - - return 0; 270 - - } 271 - + if (EFI_ERROR(err)) 272 - + return err; 273 - + 274 - + /* do not distinguish between left and right keys */ 275 - + if (keydata.KeyState.KeyShiftState & EFI_SHIFT_STATE_VALID) { 276 - + if (keydata.KeyState.KeyShiftState & (EFI_RIGHT_CONTROL_PRESSED|EFI_LEFT_CONTROL_PRESSED)) 277 - + shift |= EFI_CONTROL_PRESSED; 278 - + if (keydata.KeyState.KeyShiftState & (EFI_RIGHT_ALT_PRESSED|EFI_LEFT_ALT_PRESSED)) 279 - + shift |= EFI_ALT_PRESSED; 280 - + }; 281 - + 282 - + /* 32 bit modifier keys + 16 bit scan code + 16 bit unicode */ 283 - + keypress = KEYPRESS(shift, keydata.Key.ScanCode, keydata.Key.UnicodeChar); 284 - + if (keypress > 0) { 285 - + *key = keypress; 286 - + return EFI_SUCCESS; 287 - } 288 - + 289 - + return EFI_NOT_READY; 290 - } 291 - 292 - - /* fallback for firmware which does not support SimpleTextInputExProtocol 293 - - * 294 - - * This is also called in case ReadKeyStrokeEx did not return a key, because 295 - - * some broken firmwares offer SimpleTextInputExProtocol, but never actually 296 - - * handle any key. */ 297 - err = uefi_call_wrapper(ST->ConIn->ReadKeyStroke, 2, ST->ConIn, &k); 298 - if (EFI_ERROR(err)) 299 - return err; 300 - 301 - *key = KEYPRESS(0, k.ScanCode, k.UnicodeChar); 302 - - return 0; 303 - + return EFI_SUCCESS; 304 - } 305 - 306 - static EFI_STATUS change_mode(UINTN mode) { 307 - diff --git a/src/boot/efi/console.h b/src/boot/efi/console.h 308 - index 2c69af552a..23848a9c58 100644 309 - --- a/src/boot/efi/console.h 310 - +++ b/src/boot/efi/console.h 311 - @@ -16,5 +16,5 @@ enum console_mode_change_type { 312 - CONSOLE_MODE_MAX, 313 - }; 314 - 315 - -EFI_STATUS console_key_read(UINT64 *key, BOOLEAN wait); 316 - +EFI_STATUS console_key_read(UINT64 *key, UINT64 timeout_usec); 317 - EFI_STATUS console_set_mode(UINTN *mode, enum console_mode_change_type how); 318 - -- 319 - 2.33.0 320 -
+3 -16
pkgs/os-specific/linux/systemd/default.nix
··· 123 123 assert withCryptsetup -> (cryptsetup != null); 124 124 let 125 125 wantCurl = withRemote || withImportd; 126 - version = "249.5"; 126 + version = "249.7"; 127 127 in 128 128 stdenv.mkDerivation { 129 129 inherit pname version; ··· 134 134 owner = "systemd"; 135 135 repo = "systemd-stable"; 136 136 rev = "v${version}"; 137 - sha256 = "0bir2syy20rdi59sv8xp8nw1c92zl9z0wmv7ggsll8dca7niqwbp"; 137 + sha256 = "sha256-y33/BvvI+JyhsvuT1Cbm6J2Z72j71oXgLw6X9NwCMPE="; 138 138 }; 139 139 140 140 # If these need to be regenerated, `git am path/to/00*.patch` them into a ··· 166 166 # systemd. With the below patch we mitigate that effect by special casing 167 167 # all our root unit dirs if they are symlinks. This does exactly what we 168 168 # need (AFAICT). 169 + # See https://github.com/systemd/systemd/pull/20479 for upsteam discussion. 169 170 ./0019-core-handle-lookup-paths-being-symlinks.patch 170 - 171 - # In v248 compiler weirdness and refactoring lead to the bootloader 172 - # erroring out handling keyboard input on some systems. See 173 - # https://github.com/systemd/systemd/issues/19191 174 - # This should be redundant in v249.6 when it offically gets tagged in 175 - # systemd-stable 176 - ./0020-sd-boot-Unify-error-handling.patch 177 - ./0021-sd-boot-Rework-console-input-handling.patch 178 171 ] ++ lib.optional stdenv.hostPlatform.isMusl (let 179 172 oe-core = fetchzip { 180 173 url = "https://git.openembedded.org/openembedded-core/snapshot/openembedded-core-14c6e5a4b72d0e4665279158a0740dd1dc21f72f.tar.bz2"; ··· 577 584 ''; 578 585 579 586 postInstall = '' 580 - # sysinit.target: Don't depend on 581 - # systemd-tmpfiles-setup.service. This interferes with NixOps's 582 - # send-keys feature (since sshd.service depends indirectly on 583 - # sysinit.target). 584 - mv $out/lib/systemd/system/sysinit.target.wants/systemd-tmpfiles-setup-dev.service $out/lib/systemd/system/multi-user.target.wants/ 585 - 586 587 mkdir -p $out/example/systemd 587 588 mv $out/lib/{modules-load.d,binfmt.d,sysctl.d,tmpfiles.d} $out/example 588 589 mv $out/lib/systemd/{system,user} $out/example/systemd
+2 -14
pkgs/os-specific/linux/util-linux/default.nix
··· 1 1 { lib, stdenv, fetchurl, pkg-config, zlib, shadow, libcap_ng 2 2 , ncurses ? null, pam, systemd ? null 3 3 , nlsSupport ? true 4 - , audit ? null 5 4 }: 6 - 7 - assert stdenv.hostPlatform.isStatic -> audit != null; 8 5 9 6 stdenv.mkDerivation rec { 10 7 pname = "util-linux"; ··· 17 20 ]; 18 21 19 22 outputs = [ "bin" "dev" "out" "lib" "man" ]; 23 + separateDebugInfo = true; 20 24 21 25 postPatch = '' 22 26 patchShebangs tests/run.sh ··· 58 60 nativeBuildInputs = [ pkg-config ]; 59 61 buildInputs = 60 62 [ zlib pam libcap_ng ] 61 - ++ lib.filter (p: p != null) [ ncurses systemd ] 62 - # not sure how util-linux is linking with linux-pam, 63 - # probably just with a simplistic -lpam. 64 - # linux-pam doesn't seem to have a .pc file so I can't 65 - # add -laudit to the Requires.private. 66 - # libaudit is also needed directly anyway cf login-utils/login.c 67 - # and sys-utils/hwclock.c, not sure how we got it working 68 - # without audit on dynamic builds. 69 - ++ lib.optionals stdenv.hostPlatform.isStatic [ audit ]; 70 - 71 - NIX_CFLAGS_LINK = lib.optionalString stdenv.hostPlatform.isStatic "-laudit"; 63 + ++ lib.filter (p: p != null) [ ncurses systemd ]; 72 64 73 65 doCheck = false; # "For development purpose only. Don't execute on production system!" 74 66
+2 -2
pkgs/servers/monitoring/net-snmp/default.nix
··· 3 3 4 4 stdenv.mkDerivation rec { 5 5 pname = "net-snmp"; 6 - version = "5.9"; 6 + version = "5.9.1"; 7 7 8 8 src = fetchurl { 9 9 url = "mirror://sourceforge/net-snmp/${pname}-${version}.tar.gz"; 10 - sha256 = "0wb0vyafpspw3mcifkjjmf17r1r80kjvslycscb8nvaxz1k3lc04"; 10 + sha256 = "sha256-63/UpE3mzdv/2akqha0TCeXBBU+51afdkweciVP0jD8="; 11 11 }; 12 12 13 13 patches =
+2 -2
pkgs/servers/pulseaudio/default.nix
··· 30 30 }: 31 31 32 32 stdenv.mkDerivation rec { 33 - name = "${if libOnly then "lib" else ""}pulseaudio-${version}"; 33 + pname = "${if libOnly then "lib" else ""}pulseaudio"; 34 34 version = "14.2"; 35 35 36 36 src = fetchurl { ··· 119 119 120 120 preFixup = lib.optionalString (stdenv.isLinux && (stdenv.hostPlatform == stdenv.buildPlatform)) '' 121 121 wrapProgram $out/libexec/pulse/gsettings-helper \ 122 - --prefix XDG_DATA_DIRS : "$out/share/gsettings-schemas/${name}" \ 122 + --prefix XDG_DATA_DIRS : "$out/share/gsettings-schemas/${pname}-${version}" \ 123 123 --prefix GIO_EXTRA_MODULES : "${lib.getLib dconf}/lib/gio/modules" 124 124 ''; 125 125
+2 -2
pkgs/servers/samba/4.x.nix
··· 45 45 46 46 stdenv.mkDerivation rec { 47 47 pname = "samba"; 48 - version = "4.15.1"; 48 + version = "4.15.2"; 49 49 50 50 src = fetchurl { 51 51 url = "mirror://samba/pub/samba/stable/${pname}-${version}.tar.gz"; 52 - sha256 = "sha256-oYEfu0EQ1klp9sEI+NFh4sPiDd9HVSmj0yvZS7dFnwA="; 52 + sha256 = "sha256-YoHXxqjEn3mQqfJJpmeEs1GA/iSVV+8RR82KbRZqIRM="; 53 53 }; 54 54 55 55 outputs = [ "out" "dev" "man" ];
+2 -2
pkgs/servers/x11/xorg/xwayland.nix
··· 43 43 stdenv.mkDerivation rec { 44 44 45 45 pname = "xwayland"; 46 - version = "21.1.3"; 46 + version = "21.1.4"; 47 47 src = fetchurl { 48 48 url = "mirror://xorg/individual/xserver/${pname}-${version}.tar.xz"; 49 - sha256 = "sha256-68J1fzn9TH2xZU/YZZFYnCEaogFy1DpU93rlZ87b+KI="; 49 + sha256 = "sha256-GfZ5XzHPqOs1Kx5bPDefIu5gIOmHAf8sxnnajE8RWfc="; 50 50 }; 51 51 52 52 depsBuildBuild = [
+3
pkgs/tools/misc/coreutils/default.nix
··· 33 33 ./fix-chmod-exit-code.patch 34 34 # Workaround for https://debbugs.gnu.org/cgi/bugreport.cgi?bug=51433 35 35 ./disable-seek-hole.patch 36 + # Workaround for https://debbugs.gnu.org/cgi/bugreport.cgi?bug=52330 37 + # This patch can be dropped, once we upgrade to the next coreutils version after 9.0 38 + ./fix-arm64-macos.patch 36 39 ]; 37 40 38 41 postPatch = ''
+124
pkgs/tools/misc/coreutils/fix-arm64-macos.patch
··· 1 + diff --git a/src/uname.c b/src/uname.c 2 + index ae9b8e29d..e84fc477a 100644 3 + --- a/src/uname.c 4 + +++ b/src/uname.c 5 + @@ -27,7 +27,7 @@ 6 + # include <sys/systeminfo.h> 7 + #endif 8 + 9 + -#if HAVE_SYS_SYSCTL_H && ! defined __GLIBC__ 10 + +#if HAVE_SYS_SYSCTL_H && ! defined __GLIBC__ && ! defined __APPLE__ 11 + # if HAVE_SYS_PARAM_H 12 + # include <sys/param.h> /* needed for OpenBSD 3.0 */ 13 + # endif 14 + @@ -44,11 +44,6 @@ 15 + # endif 16 + #endif 17 + 18 + -#ifdef __APPLE__ 19 + -# include <mach/machine.h> 20 + -# include <mach-o/arch.h> 21 + -#endif 22 + - 23 + #include "system.h" 24 + #include "die.h" 25 + #include "error.h" 26 + @@ -167,6 +162,24 @@ print_element (char const *element) 27 + fputs (element, stdout); 28 + } 29 + 30 + +/* Print ELEMENT, preceded by a space if something has already been 31 + + printed. But if the environment variable ENVVAR is set, print its 32 + + value instead of ELEMENT. */ 33 + + 34 + +static void 35 + +print_element_env (char const *element, char const *envvar) 36 + +{ 37 + +#ifdef __APPLE__ 38 + + if (envvar) 39 + + { 40 + + char const *val = getenv (envvar); 41 + + if (val) 42 + + element = val; 43 + + } 44 + +#endif 45 + + print_element (element); 46 + +} 47 + + 48 + 49 + /* Set all the option flags according to the switches specified. 50 + Return the mask indicating which elements to print. */ 51 + @@ -287,26 +300,36 @@ main (int argc, char **argv) 52 + die (EXIT_FAILURE, errno, _("cannot get system name")); 53 + 54 + if (toprint & PRINT_KERNEL_NAME) 55 + - print_element (name.sysname); 56 + + print_element_env (name.sysname, "UNAME_SYSNAME"); 57 + if (toprint & PRINT_NODENAME) 58 + - print_element (name.nodename); 59 + + print_element_env (name.nodename, "UNAME_NODENAME"); 60 + if (toprint & PRINT_KERNEL_RELEASE) 61 + - print_element (name.release); 62 + + print_element_env (name.release, "UNAME_RELEASE"); 63 + if (toprint & PRINT_KERNEL_VERSION) 64 + - print_element (name.version); 65 + + print_element_env (name.version, "UNAME_VERSION"); 66 + if (toprint & PRINT_MACHINE) 67 + - print_element (name.machine); 68 + + print_element_env (name.machine, "UNAME_MACHINE"); 69 + } 70 + 71 + if (toprint & PRINT_PROCESSOR) 72 + { 73 + char const *element = unknown; 74 + +#ifdef __APPLE__ 75 + +# if defined __arm__ || defined __arm64__ 76 + + element = "arm"; 77 + +# elif defined __i386__ || defined __x86_64__ 78 + + element = "i386"; 79 + +# elif defined __ppc__ || defined __ppc64__ 80 + + element = "powerpc"; 81 + +# endif 82 + +#endif 83 + #if HAVE_SYSINFO && defined SI_ARCHITECTURE 84 + - { 85 + - static char processor[257]; 86 + - if (0 <= sysinfo (SI_ARCHITECTURE, processor, sizeof processor)) 87 + - element = processor; 88 + - } 89 + + if (element == unknown) 90 + + { 91 + + static char processor[257]; 92 + + if (0 <= sysinfo (SI_ARCHITECTURE, processor, sizeof processor)) 93 + + element = processor; 94 + + } 95 + #endif 96 + #ifdef UNAME_PROCESSOR 97 + if (element == unknown) 98 + @@ -316,26 +339,6 @@ main (int argc, char **argv) 99 + static int mib[] = { CTL_HW, UNAME_PROCESSOR }; 100 + if (sysctl (mib, 2, processor, &s, 0, 0) >= 0) 101 + element = processor; 102 + - 103 + -# ifdef __APPLE__ 104 + - /* This kludge works around a bug in Mac OS X. */ 105 + - if (element == unknown) 106 + - { 107 + - cpu_type_t cputype; 108 + - size_t cs = sizeof cputype; 109 + - NXArchInfo const *ai; 110 + - if (sysctlbyname ("hw.cputype", &cputype, &cs, NULL, 0) == 0 111 + - && (ai = NXGetArchInfoFromCpuType (cputype, 112 + - CPU_SUBTYPE_MULTIPLE)) 113 + - != NULL) 114 + - element = ai->name; 115 + - 116 + - /* Hack "safely" around the ppc vs. powerpc return value. */ 117 + - if (cputype == CPU_TYPE_POWERPC 118 + - && STRNCMP_LIT (element, "ppc") == 0) 119 + - element = "powerpc"; 120 + - } 121 + -# endif 122 + } 123 + #endif 124 + if (! (toprint == UINT_MAX && element == unknown))
+2 -2
pkgs/tools/networking/dnsmasq/default.nix
··· 13 13 in 14 14 stdenv.mkDerivation rec { 15 15 pname = "dnsmasq"; 16 - version = "2.85"; 16 + version = "2.86"; 17 17 18 18 src = fetchurl { 19 19 url = "https://www.thekelleys.org.uk/dnsmasq/${pname}-${version}.tar.xz"; 20 - sha256 = "sha256-rZjTgD32h+W5OAgPPSXGKP5ByHh1LQP7xhmXh/7jEvo="; 20 + sha256 = "sha256-KNUs/J4gBKxPhSdPUrMuFke028l2G4Ln3h5BxJkH6wg="; 21 21 }; 22 22 23 23 postPatch = lib.optionalString stdenv.hostPlatform.isLinux ''
+2 -2
pkgs/tools/networking/networkmanager/tray.nix
··· 1 - { lib, mkDerivation, fetchFromGitHub, cmake, qttools, qtbase, networkmanager-qt, modemmanager-qt }: 1 + { lib, mkDerivation, fetchFromGitHub, cmake, pkg-config, qttools, qtbase, networkmanager-qt, modemmanager-qt }: 2 2 3 3 mkDerivation rec { 4 4 pname = "nm-tray"; ··· 15 15 sed -i -e '1i#include <QMetaEnum>' src/nmmodel.cpp 16 16 ''; 17 17 18 - nativeBuildInputs = [ cmake qttools ]; 18 + nativeBuildInputs = [ cmake pkg-config qttools ]; 19 19 20 20 cmakeFlags = [ "-DWITH_MODEMMANAGER_SUPPORT=ON" ]; 21 21
+2 -2
pkgs/tools/networking/unbound/default.nix
··· 40 40 41 41 stdenv.mkDerivation rec { 42 42 pname = "unbound"; 43 - version = "1.13.2"; 43 + version = "1.14.0"; 44 44 45 45 src = fetchurl { 46 46 url = "https://nlnetlabs.nl/downloads/unbound/unbound-${version}.tar.gz"; 47 - sha256 = "sha256-ChO1R/O5KgJrXr0EI/VMmR5XGAN/2fckRYF/agQOGoM="; 47 + sha256 = "sha256-bvkcvwLVKZ6rOTKMCFc5Pee0iFov5yM93+PBJP9aicg="; 48 48 }; 49 49 50 50 outputs = [ "out" "lib" "man" ]; # "dev" would only split ~20 kB
+1 -1
pkgs/tools/package-management/nix/default.nix
··· 44 44 [ "out" "dev" ] 45 45 ++ lib.optionals enableDocumentation [ "man" "doc" ]; 46 46 47 - hardeningEnable = [ "pie" ]; 47 + hardeningEnable = lib.optionals (!stdenv.isDarwin) [ "pie" ]; 48 48 49 49 nativeBuildInputs = 50 50 [ pkg-config ]
+18 -15
pkgs/tools/security/gnupg/22.nix pkgs/tools/security/gnupg/23.nix
··· 3 3 4 4 # Each of the dependencies below are optional. 5 5 # Gnupg can be built without them at the cost of reduced functionality. 6 - , guiSupport ? true, enableMinimal ? false 7 - , adns ? null , bzip2 ? null , gnutls ? null , libusb1 ? null , openldap ? null 8 - , pcsclite ? null , pinentry ? null , readline ? null , sqlite ? null , zlib ? 9 - null 6 + , guiSupport ? stdenv.isDarwin, enableMinimal ? false 7 + , adns ? null, bzip2 ? null , gnutls ? null , libusb1 ? null , openldap ? null 8 + , tpm2-tss ? null 9 + , pcsclite ? null , pinentry ? null , readline ? null , sqlite ? null , zlib ? null 10 10 }: 11 11 12 12 with lib; ··· 15 15 16 16 stdenv.mkDerivation rec { 17 17 pname = "gnupg"; 18 - 19 - version = "2.2.27"; 18 + version = "2.3.3"; 20 19 21 20 src = fetchurl { 22 21 url = "mirror://gnupg/gnupg/${pname}-${version}.tar.bz2"; 23 - sha256 = "1693s2rp9sjwvdslj94n03wnb6rxysjy0dli0q1698af044h1ril"; 22 + sha256 = "0dz9x0r5021bhk1kjh29m1q13xbslwb8yn9qzcp7b9m1lrnvi2ap"; 24 23 }; 25 24 26 25 depsBuildBuild = [ buildPackages.stdenv.cc ]; ··· 27 28 buildInputs = [ 28 29 libgcrypt libassuan libksba libiconv npth gettext 29 30 readline libusb1 gnutls adns openldap zlib bzip2 sqlite 30 - ]; 31 + ] ++ optional (!stdenv.isDarwin) tpm2-tss ; 31 32 32 33 patches = [ 33 34 ./fix-libusb-include-path.patch 34 - ./0001-dirmngr-Only-use-SKS-pool-CA-for-SKS-pool.patch 35 35 ./tests-add-test-cases-for-import-without-uid.patch 36 36 ./allow-import-of-previously-known-keys-even-without-UI.patch 37 37 ./accept-subkeys-with-a-good-revocation-but-no-self-sig.patch ··· 40 42 # Fix broken SOURCE_DATE_EPOCH usage - remove on the next upstream update 41 43 sed -i 's/$SOURCE_DATE_EPOCH/''${SOURCE_DATE_EPOCH}/' doc/Makefile.am 42 44 sed -i 's/$SOURCE_DATE_EPOCH/''${SOURCE_DATE_EPOCH}/' doc/Makefile.in 43 - '' + lib.optionalString ( stdenv.isLinux && pcsclite != null) '' 45 + '' + lib.optionalString (stdenv.isLinux && pcsclite != null) '' 44 46 sed -i 's,"libpcsclite\.so[^"]*","${lib.getLib pcsclite}/lib/libpcsclite.so",g' scd/scdaemon.c 45 47 ''; 46 48 ··· 51 53 "--with-libassuan-prefix=${libassuan.dev}" 52 54 "--with-ksba-prefix=${libksba.dev}" 53 55 "--with-npth-prefix=${npth}" 54 - ] ++ optional guiSupport "--with-pinentry-pgm=${pinentry}/${pinentryBinaryPath}"; 55 - 56 + ] ++ optional guiSupport "--with-pinentry-pgm=${pinentry}/${pinentryBinaryPath}" 57 + ++ optional ( (!stdenv.isDarwin) && (tpm2-tss != null) ) "--with-tss=intel"; 56 58 postInstall = if enableMinimal 57 59 then '' 58 60 rm -r $out/{libexec,sbin,share} 59 - for f in `find $out/bin -type f -not -name gpg` 61 + for f in $(find $out/bin -type f -not -name gpg) 60 62 do 61 63 rm $f 62 64 done ··· 71 73 ln -s $out/bin/gpg $out/bin/gpg2 72 74 73 75 # Make libexec tools available in PATH 74 - ln -s -t $out/bin $out/libexec/* 76 + for f in $out/libexec/; do 77 + if [[ "$(basename $f)" == "gpg-wks-client" ]]; then continue; fi 78 + ln -s $f $out/bin/$(basename $f) 79 + done 75 80 ''; 81 + 82 + enableParallelBuilding = true; 76 83 77 84 meta = with lib; { 78 85 homepage = "https://gnupg.org"; 79 - description = "Modern (2.1) release of the GNU Privacy Guard, a GPL OpenPGP implementation"; 86 + description = "Modern release of the GNU Privacy Guard, a GPL OpenPGP implementation"; 80 87 license = licenses.gpl3Plus; 81 88 longDescription = '' 82 89 The GNU Privacy Guard is the GNU project's complete and free
+11 -10
pkgs/tools/security/gnupg/allow-import-of-previously-known-keys-even-without-UI.patch
··· 17 17 1 file changed, 11 insertions(+), 33 deletions(-) 18 18 19 19 diff --git a/g10/import.c b/g10/import.c 20 - index 95d419a..4fdf248 100644 20 + index 5d3162c..f9acf95 100644 21 21 --- a/g10/import.c 22 22 +++ b/g10/import.c 23 - @@ -1792,7 +1792,6 @@ import_one_real (ctrl_t ctrl, 23 + @@ -1788,7 +1788,6 @@ import_one_real (ctrl_t ctrl, 24 24 size_t an; 25 25 char pkstrbuf[PUBKEY_STRING_SIZE]; 26 26 int merge_keys_done = 0; ··· 28 28 KEYDB_HANDLE hd = NULL; 29 29 30 30 if (r_valid) 31 - @@ -1829,14 +1828,6 @@ import_one_real (ctrl_t ctrl, 31 + @@ -1825,14 +1824,6 @@ import_one_real (ctrl_t ctrl, 32 32 log_printf ("\n"); 33 33 } 34 34 35 35 - 36 - - if (!uidnode ) 36 + - if (!uidnode) 37 37 - { 38 38 - if (!silent) 39 39 - log_error( _("key %s: no user ID\n"), keystr_from_pk(pk)); ··· 43 43 if (screener && screener (keyblock, screener_arg)) 44 44 { 45 45 log_error (_("key %s: %s\n"), keystr_from_pk (pk), 46 - @@ -1911,17 +1902,10 @@ import_one_real (ctrl_t ctrl, 46 + @@ -1907,18 +1898,10 @@ import_one_real (ctrl_t ctrl, 47 47 } 48 48 } 49 49 50 - - if (!delete_inv_parts (ctrl, keyblock, keyid, options ) ) 50 + - /* Delete invalid parts and bail out if there are no user ids left. */ 51 + - if (!delete_inv_parts (ctrl, keyblock, keyid, options)) 51 52 - { 52 53 - if (!silent) 53 54 - { 54 - - log_error( _("key %s: no valid user IDs\n"), keystr_from_pk(pk)); 55 - - if (!opt.quiet ) 55 + - log_error ( _("key %s: no valid user IDs\n"), keystr_from_pk(pk)); 56 + - if (!opt.quiet) 56 57 - log_info(_("this may be caused by a missing self-signature\n")); 57 58 - } 58 59 - stats->no_user_id++; ··· 66 65 67 66 /* Get rid of deleted nodes. */ 68 67 commit_kbnode (&keyblock); 69 - @@ -1931,24 +1915,11 @@ import_one_real (ctrl_t ctrl, 68 + @@ -1927,24 +1911,11 @@ import_one_real (ctrl_t ctrl, 70 69 { 71 70 apply_keep_uid_filter (ctrl, keyblock, import_filter.keep_uid); 72 71 commit_kbnode (&keyblock); ··· 91 90 } 92 91 93 92 /* The keyblock is valid and ready for real import. */ 94 - @@ -2006,6 +1977,13 @@ import_one_real (ctrl_t ctrl, 93 + @@ -2002,6 +1973,13 @@ import_one_real (ctrl_t ctrl, 95 94 err = 0; 96 95 stats->skipped_new_keys++; 97 96 }
+1 -1
pkgs/tools/security/gnupg/fix-libusb-include-path.patch
··· 1 1 --- a/configure 2 2 +++ b/configure 3 - @@ -8987,8 +8987,7 @@ 3 + @@ -9281,8 +9281,7 @@ fi 4 4 { $as_echo "$as_me:${as_lineno-$LINENO}: checking libusb include dir" >&5 5 5 $as_echo_n "checking libusb include dir... " >&6; } 6 6 usb_incdir_found="no"
+2 -2
pkgs/tools/security/pcsclite/default.nix
··· 14 14 15 15 stdenv.mkDerivation rec { 16 16 pname = "pcsclite"; 17 - version = "1.9.4"; 17 + version = "1.9.5"; 18 18 19 19 outputs = [ "bin" "out" "dev" "doc" "man" ]; 20 20 21 21 src = fetchurl { 22 22 url = "https://pcsclite.apdu.fr/files/pcsc-lite-${version}.tar.bz2"; 23 - sha256 = "sha256:0jqwnpywk9ka3q88b1k93p8s0xhmx1isdpcqa80nd8p04z1am34a"; 23 + sha256 = "sha256:024x0hadn0kc0m9yz3l2pqzc5mdqyza9lmckg0bn4xak6frzkqwy"; 24 24 }; 25 25 26 26 patches = [ ./no-dropdir-literals.patch ];
+6 -32
pkgs/tools/security/pcsclite/no-dropdir-literals.patch
··· 1 1 diff --git a/src/hotplug_libudev.c b/src/hotplug_libudev.c 2 - index a8ba1b8..a53700b 100644 2 + index 51bd95f..84f959b 100644 3 3 --- a/src/hotplug_libudev.c 4 4 +++ b/src/hotplug_libudev.c 5 - @@ -119,7 +119,8 @@ static LONG HPReadBundleValues(void) 5 + @@ -120,7 +120,8 @@ static LONG HPReadBundleValues(void) 6 6 7 7 if (NULL == hpDir) 8 8 { ··· 12 12 Log1(PCSC_LOG_ERROR, "Disabling USB support for pcscd."); 13 13 return -1; 14 14 } 15 - @@ -722,7 +723,7 @@ ULONG HPRegisterForHotplugEvents(void) 15 + @@ -741,7 +742,7 @@ ULONG HPRegisterForHotplugEvents(void) 16 16 17 17 if (driverSize <= 0) 18 18 { ··· 22 22 Log1(PCSC_LOG_INFO, "Disabling USB support for pcscd"); 23 23 return 0; 24 24 diff --git a/src/hotplug_libusb.c b/src/hotplug_libusb.c 25 - index eff8519..8dd496d 100644 25 + index 0ada9f5..d49a407 100644 26 26 --- a/src/hotplug_libusb.c 27 27 +++ b/src/hotplug_libusb.c 28 - @@ -138,7 +138,8 @@ static LONG HPReadBundleValues(void) 28 + @@ -142,7 +142,8 @@ static LONG HPReadBundleValues(void) 29 29 30 30 if (hpDir == NULL) 31 31 { ··· 35 35 Log1(PCSC_LOG_ERROR, "Disabling USB support for pcscd."); 36 36 return -1; 37 37 } 38 - @@ -265,7 +266,8 @@ static LONG HPReadBundleValues(void) 38 + @@ -282,7 +283,8 @@ static LONG HPReadBundleValues(void) 39 39 40 40 if (driverSize == 0) 41 41 { ··· 45 45 Log1(PCSC_LOG_INFO, "Disabling USB support for pcscd"); 46 46 } 47 47 #ifdef DEBUG_HOTPLUG 48 - diff --git a/src/hotplug_linux.c b/src/hotplug_linux.c 49 - index bf69af8..64b0ed7 100644 50 - --- a/src/hotplug_linux.c 51 - +++ b/src/hotplug_linux.c 52 - @@ -130,8 +130,8 @@ static LONG HPReadBundleValues(void) 53 - 54 - if (hpDir == NULL) 55 - { 56 - - Log1(PCSC_LOG_INFO, 57 - - "Cannot open PC/SC drivers directory: " PCSCLITE_HP_DROPDIR); 58 - + Log2(PCSC_LOG_INFO, "Cannot open PC/SC drivers directory: %s", 59 - + PCSCLITE_HP_DROPDIR); 60 - Log1(PCSC_LOG_INFO, "Disabling USB support for pcscd."); 61 - return -1; 62 - } 63 - @@ -219,8 +219,8 @@ end: 64 - 65 - if (bundleSize == 0) 66 - { 67 - - Log1(PCSC_LOG_INFO, 68 - - "No bundle files in pcsc drivers directory: " PCSCLITE_HP_DROPDIR); 69 - + Log2(PCSC_LOG_INFO, "No bundle files in pcsc drivers directory: %s", 70 - + PCSCLITE_HP_DROPDIR); 71 - Log1(PCSC_LOG_INFO, "Disabling USB support for pcscd"); 72 - } 73 -
+2 -2
pkgs/tools/security/stoken/default.nix
··· 20 20 autoconf 21 21 ''; 22 22 23 - nativeBuildInputs = [ pkg-config ]; 23 + strictDeps = true; 24 + nativeBuildInputs = [ pkg-config autoconf automake libtool ]; 24 25 buildInputs = [ 25 - autoconf automake libtool 26 26 libxml2 nettle 27 27 ] ++ lib.optional withGTK3 gtk3; 28 28
+2 -2
pkgs/tools/video/mjpegtools/default.nix
··· 9 9 10 10 stdenv.mkDerivation rec { 11 11 pname = "mjpegtools"; 12 - version = "2.1.0"; 12 + version = "2.2.1"; 13 13 14 14 src = fetchurl { 15 15 url = "mirror://sourceforge/mjpeg/mjpegtools-${version}.tar.gz"; 16 - sha256 = "01y4xpfdvd4zgv6fmcjny9mr1gbfd4y2i4adp657ydw6fqyi8kw6"; 16 + sha256 = "sha256-sYBTbX2ZYLBeACOhl7ANyxAJKaSaq3HRnVX0obIQ9Jo="; 17 17 }; 18 18 19 19 hardeningDisable = [ "format" ];
+3 -3
pkgs/tools/video/rav1e/default.nix
··· 4 4 rustTargetPlatformSpec = rust.toRustTargetSpec stdenv.hostPlatform; 5 5 in rustPlatform.buildRustPackage rec { 6 6 pname = "rav1e"; 7 - version = "0.4.1"; 7 + version = "0.5.0"; 8 8 9 9 src = fetchCrate { 10 10 inherit pname version; 11 - sha256 = "sha256-9fBAH1vuLJ3yu8X5+CQGLQFDlzTYoFBUTy3Muo6hLkw="; 11 + sha256 = "sha256-3g2wqQJk26KUfzmneKdTxfNSRI/ioMa5MR6AEeR7eKs="; 12 12 }; 13 13 14 - cargoSha256 = "sha256-QhWVqHcNjJF94uTvHGVnV8MTp2bYOuCEjaMBfViOLRo="; 14 + cargoSha256 = "sha256-sPUAWQj8UDHV7IvYnerASltSPPGVB7f1tThqFYBu6t4="; 15 15 16 16 nativeBuildInputs = [ nasm cargo-c ]; 17 17 buildInputs = lib.optionals stdenv.isDarwin [ libiconv ];
+39 -17
pkgs/top-level/all-packages.nix
··· 3600 3600 3601 3601 reg = callPackage ../tools/virtualization/reg { }; 3602 3602 3603 - river = callPackage ../applications/window-managers/river { }; 3603 + river = callPackage ../applications/window-managers/river { 3604 + wlroots = wlroots_0_14; 3605 + }; 3604 3606 3605 3607 rmapi = callPackage ../applications/misc/remarkable/rmapi { }; 3606 3608 ··· 5939 5937 gnupg1orig = callPackage ../tools/security/gnupg/1.nix { }; 5940 5938 gnupg1compat = callPackage ../tools/security/gnupg/1compat.nix { }; 5941 5939 gnupg1 = gnupg1compat; # use config.packageOverrides if you prefer original gnupg1 5942 - gnupg22 = callPackage ../tools/security/gnupg/22.nix { 5940 + gnupg23 = callPackage ../tools/security/gnupg/23.nix { 5943 5941 guiSupport = stdenv.isDarwin; 5944 5942 pinentry = if stdenv.isDarwin then pinentry_mac else pinentry-gtk2; 5945 5943 }; 5946 - gnupg = gnupg22; 5944 + gnupg = gnupg23; 5947 5945 5948 5946 gnupg-pkcs11-scd = callPackage ../tools/security/gnupg-pkcs11-scd { }; 5949 5947 ··· 17055 17053 herqq = libsForQt5.callPackage ../development/libraries/herqq { }; 17056 17054 17057 17055 hidapi = callPackage ../development/libraries/hidapi { 17056 + inherit (darwin.apple_sdk.frameworks) Cocoa IOKit; 17058 17057 # TODO: remove once `udev` is `systemdMinimal` everywhere. 17059 17058 udev = systemdMinimal; 17060 - autoreconfHook = buildPackages.autoreconfHook269; 17061 17059 }; 17062 17060 17063 17061 highfive = callPackage ../development/libraries/highfive { }; ··· 22912 22910 # break some cyclic dependencies 22913 22911 util-linux = util-linuxMinimal; 22914 22912 # provide a super minimal gnupg used for systemd-machined 22915 - gnupg = callPackage ../tools/security/gnupg/22.nix { 22913 + gnupg = callPackage ../tools/security/gnupg/23.nix { 22916 22914 enableMinimal = true; 22917 22915 guiSupport = false; 22918 22916 pcsclite = null; ··· 24526 24524 24527 24525 cardboard = callPackage ../applications/window-managers/cardboard { }; 24528 24526 24529 - cage = callPackage ../applications/window-managers/cage { }; 24527 + cage = callPackage ../applications/window-managers/cage { 24528 + wlroots = wlroots_0_14; 24529 + }; 24530 24530 24531 24531 calf = callPackage ../applications/audio/calf { 24532 24532 inherit (gnome2) libglade; ··· 24935 24931 24936 24932 dyff = callPackage ../development/tools/dyff {}; 24937 24933 24938 - dwl = callPackage ../applications/window-managers/dwl { }; 24934 + dwl = callPackage ../applications/window-managers/dwl { 24935 + wlroots = wlroots_0_14; 24936 + }; 24939 24937 24940 24938 dwm = callPackage ../applications/window-managers/dwm { 24941 24939 # dwm is configured entirely through source modification. Allow users to ··· 26142 26136 26143 26137 super-productivity = callPackage ../applications/office/super-productivity { }; 26144 26138 26145 - wlroots = callPackage ../development/libraries/wlroots { 26139 + wlroots = wlroots_0_15; 26140 + wlroots_0_12 = callPackage ../development/libraries/wlroots/0.12.nix {}; 26141 + wlroots_0_14 = callPackage ../development/libraries/wlroots/0.14.nix { 26142 + inherit (xorg) xcbutilrenderutil; 26143 + }; 26144 + wlroots_0_15 = callPackage ../development/libraries/wlroots/0.15.nix { 26146 26145 inherit (xorg) xcbutilrenderutil; 26147 26146 }; 26148 26147 26149 - wlroots_0_12 = callPackage ../development/libraries/wlroots/0.12.nix {}; 26150 - 26151 - sway-unwrapped = callPackage ../applications/window-managers/sway { }; 26148 + sway-unwrapped = callPackage ../applications/window-managers/sway { 26149 + wlroots = wlroots_0_14; 26150 + }; 26152 26151 sway = callPackage ../applications/window-managers/sway/wrapper.nix { }; 26153 26152 swaybg = callPackage ../applications/window-managers/sway/bg.nix { }; 26154 26153 swayidle = callPackage ../applications/window-managers/sway/idle.nix { }; ··· 26173 26162 26174 26163 wbg = callPackage ../applications/misc/wbg { }; 26175 26164 26176 - hikari = callPackage ../applications/window-managers/hikari { }; 26165 + hikari = callPackage ../applications/window-managers/hikari { 26166 + wlroots = wlroots_0_14; 26167 + }; 26177 26168 26178 26169 i3 = callPackage ../applications/window-managers/i3 { 26179 26170 xcb-util-cursor = if stdenv.isDarwin then xcb-util-cursor-HEAD else xcb-util-cursor; ··· 26239 26226 26240 26227 i3-wk-switch = callPackage ../applications/window-managers/i3/wk-switch.nix { }; 26241 26228 26242 - waybox = callPackage ../applications/window-managers/waybox { }; 26229 + waybox = callPackage ../applications/window-managers/waybox { 26230 + wlroots = wlroots_0_14; 26231 + }; 26243 26232 26244 26233 workstyle = callPackage ../applications/window-managers/i3/workstyle.nix { }; 26245 26234 ··· 26706 26691 26707 26692 lame = callPackage ../development/libraries/lame { }; 26708 26693 26709 - labwc = callPackage ../applications/window-managers/labwc { }; 26694 + labwc = callPackage ../applications/window-managers/labwc { 26695 + wlroots = wlroots_0_14; 26696 + }; 26710 26697 26711 26698 larswm = callPackage ../applications/window-managers/larswm { }; 26712 26699 ··· 29395 29378 wayfireApplications = wayfireApplications-unwrapped.withPlugins (plugins: [ plugins.wf-shell ]); 29396 29379 inherit (wayfireApplications) wayfire wcm; 29397 29380 wayfireApplications-unwrapped = recurseIntoAttrs ( 29398 - callPackage ../applications/window-managers/wayfire/applications.nix { } 29381 + (callPackage ../applications/window-managers/wayfire/applications.nix { }). 29382 + extend (_: _: { wlroots = wlroots_0_14; }) 29399 29383 ); 29400 29384 wayfirePlugins = recurseIntoAttrs ( 29401 29385 callPackage ../applications/window-managers/wayfire/plugins.nix { ··· 29450 29432 electron = electron_14; 29451 29433 }; 29452 29434 29453 - wio = callPackage ../applications/window-managers/wio { }; 29435 + wio = callPackage ../applications/window-managers/wio { 29436 + wlroots = wlroots_0_14; 29437 + }; 29454 29438 29455 29439 whitebox-tools = callPackage ../applications/gis/whitebox-tools { 29456 29440 inherit (darwin.apple_sdk.frameworks) Security; ··· 34144 34124 inherit (darwin.apple_sdk.frameworks) DiskArbitration Foundation IOKit; 34145 34125 }; 34146 34126 34147 - cagebreak = callPackage ../applications/window-managers/cagebreak { }; 34127 + cagebreak = callPackage ../applications/window-managers/cagebreak { 34128 + wlroots = wlroots_0_14; 34129 + }; 34148 34130 34149 34131 psftools = callPackage ../os-specific/linux/psftools {}; 34150 34132
+3 -1
pkgs/top-level/python-packages.nix
··· 8145 8145 8146 8146 pywizlight = callPackage ../development/python-modules/pywizlight { }; 8147 8147 8148 - pywlroots = callPackage ../development/python-modules/pywlroots { }; 8148 + pywlroots = callPackage ../development/python-modules/pywlroots { 8149 + wlroots = pkgs.wlroots_0_14; 8150 + }; 8149 8151 8150 8152 pyxattr = callPackage ../development/python-modules/pyxattr { }; 8151 8153