nixpkgs mirror (for testing) github.com/NixOS/nixpkgs
nix

Merge #233944: staging-next 2023-05-25

+390 -313
+6 -6
nixos/tests/nginx-http3.nix
··· 76 76 server.wait_for_open_port(443) 77 77 78 78 # Check http connections 79 - client.succeed("curl --verbose --http3 https://acme.test | grep 'Hello World!'") 79 + client.succeed("curl --verbose --http3-only https://acme.test | grep 'Hello World!'") 80 80 81 81 # Check downloadings 82 - client.succeed("curl --verbose --http3 https://acme.test/example.txt --output /tmp/example.txt") 82 + client.succeed("curl --verbose --http3-only https://acme.test/example.txt --output /tmp/example.txt") 83 83 client.succeed("cat /tmp/example.txt | grep 'Check http3 protocol.'") 84 84 85 85 # Check header reading 86 - client.succeed("curl --verbose --http3 --head https://acme.test | grep 'content-type'") 87 - client.succeed("curl --verbose --http3 --head https://acme.test | grep 'HTTP/3 200'") 88 - client.succeed("curl --verbose --http3 --head https://acme.test/error | grep 'HTTP/3 404'") 86 + client.succeed("curl --verbose --http3-only --head https://acme.test | grep 'content-type'") 87 + client.succeed("curl --verbose --http3-only --head https://acme.test | grep 'HTTP/3 200'") 88 + client.succeed("curl --verbose --http3-only --head https://acme.test/error | grep 'HTTP/3 404'") 89 89 90 90 # Check change User-Agent 91 - client.succeed("curl --verbose --http3 --user-agent 'Curl test 3.0' https://acme.test") 91 + client.succeed("curl --verbose --http3-only --user-agent 'Curl test 3.0' https://acme.test") 92 92 server.succeed("cat /var/log/nginx/access.log | grep 'Curl test 3.0'") 93 93 94 94 server.shutdown()
+2 -2
pkgs/applications/editors/vim/common.nix
··· 1 1 { lib, fetchFromGitHub }: 2 2 rec { 3 - version = "9.0.1441"; 3 + version = "9.0.1562"; 4 4 5 5 src = fetchFromGitHub { 6 6 owner = "vim"; 7 7 repo = "vim"; 8 8 rev = "v${version}"; 9 - hash = "sha256-tGWOIXx4gNMg0CB4ytUrj9bQLXw+4pl2lfgGR81+EJk="; 9 + hash = "sha256-+QKh3CxSjwcJ+Rj9RHYHRKSZixkfA1ZCAPDIyV/Npt8="; 10 10 }; 11 11 12 12 enableParallelBuilding = true;
+2 -2
pkgs/applications/terminal-emulators/xterm/default.nix
··· 4 4 5 5 stdenv.mkDerivation rec { 6 6 pname = "xterm"; 7 - version = "379"; 7 + version = "380"; 8 8 9 9 src = fetchurl { 10 10 urls = [ 11 11 "ftp://ftp.invisible-island.net/xterm/${pname}-${version}.tgz" 12 12 "https://invisible-mirror.net/archives/xterm/${pname}-${version}.tgz" 13 13 ]; 14 - hash = "sha256-p93ydO6EuX+xKDZ1AJ1Tyi0CoP/VzlpRGNr8NiPrsxA="; 14 + hash = "sha256-DB3B+oAPpktcWNFt25BecAsnylOKZb6MA7K6V2EQbDg="; 15 15 }; 16 16 17 17 strictDeps = true;
+1 -1
pkgs/build-support/remove-references-to/remove-references-to.sh
··· 32 32 33 33 for region in "${regions[@]}"; do 34 34 for hook in "${fixupHooks[@]}"; do 35 - eval "$hook" "$i" 35 + eval "$hook" "$region" 36 36 done 37 37 done
+6 -2
pkgs/development/compilers/gcc/common/pre-configure.nix
··· 77 77 # - If GCC allowed implicit declaration of symbols, it would not fail during 78 78 # compilation even if the configure scripts did not check header presence. 79 79 # 80 - + lib.optionalString (hostPlatform.isDarwin) '' 81 - export ac_cv_func_aligned_alloc=no 80 + + lib.optionalString (buildPlatform.isDarwin) '' 81 + export build_configargs=ac_cv_func_aligned_alloc=no 82 + '' + lib.optionalString (hostPlatform.isDarwin) '' 83 + export host_configargs=ac_cv_func_aligned_alloc=no 84 + '' + lib.optionalString (targetPlatform.isDarwin) '' 85 + export target_configargs=ac_cv_func_aligned_alloc=no 82 86 '' 83 87 84 88 # In order to properly install libgccjit on macOS Catalina, strip(1)
+2 -2
pkgs/development/libraries/audio/roc-toolkit/default.nix
··· 21 21 22 22 stdenv.mkDerivation rec { 23 23 pname = "roc-toolkit"; 24 - version = "0.2.3"; 24 + version = "0.2.4"; 25 25 26 26 outputs = [ "out" "dev" ]; 27 27 ··· 29 29 owner = "roc-streaming"; 30 30 repo = "roc-toolkit"; 31 31 rev = "v${version}"; 32 - hash = "sha256-wwcc2r1hrM9zryMJp+DOifSh0g6T/gdZJMpVdhqhjR8="; 32 + hash = "sha256-x4+/MIFKcos9xWhvSNWdsUQA2oLiyYS0MJE60HY/3hQ="; 33 33 }; 34 34 35 35 nativeBuildInputs = [
-3
pkgs/development/libraries/audiofile/default.nix
··· 28 28 29 29 outputs = [ "out" "dev" "man" ]; 30 30 31 - # fix build with gcc9 32 - NIX_CFLAGS_LINK = lib.optional (stdenv.system == "i686-linux") "-lgcc"; 33 - 34 31 # Even when statically linking, libstdc++.la is put in dependency_libs here, 35 32 # and hence libstdc++.so passed to the linker, just pass -lstdc++ and let the 36 33 # compiler do what it does best. (libaudiofile.la is a generated file, so we
+4 -2
pkgs/development/libraries/dav1d/default.nix
··· 10 10 11 11 stdenv.mkDerivation rec { 12 12 pname = "dav1d"; 13 - version = "1.1.0"; 13 + version = "1.2.0"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "videolan"; 17 17 repo = pname; 18 18 rev = version; 19 - hash = "sha256-1k6TsaXI9nwrBXTj3hncblkQuN/bvDudWDCsx4E4iwY="; 19 + hash = "sha256-Y9wqa6lIs0eKT+q+95gjzfHIc3pglXzLNaDjsWy1gok="; 20 20 }; 21 + 22 + outputs = [ "out" "dev" ]; 21 23 22 24 nativeBuildInputs = [ meson ninja nasm pkg-config ]; 23 25 # TODO: doxygen (currently only HTML and not build by default).
+2 -2
pkgs/development/libraries/directx-headers/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, meson, ninja }: 2 2 stdenv.mkDerivation rec { 3 3 pname = "directx-headers"; 4 - version = "1.610.0"; 4 + version = "1.610.2"; 5 5 6 6 src = fetchFromGitHub { 7 7 owner = "microsoft"; 8 8 repo = "DirectX-Headers"; 9 9 rev = "v${version}"; 10 - hash = "sha256-lPYXAMFSyU3FopWdE6dDRWD6sVKcjxDVsTbgej/T2sk="; 10 + hash = "sha256-se+/TgqKdatTnBlHcBC1K4aOGGfPEW+E1efpP34+xc0="; 11 11 }; 12 12 13 13 nativeBuildInputs = [ meson ninja ];
+7
pkgs/development/libraries/ffmpeg/4.nix
··· 1 1 import ./generic.nix rec { 2 2 version = "4.4.3"; 3 3 sha256 = "sha256-zZDzG1hD+0AHqElzeGR6OVm+H5wqtdktloSPmEUzT/c="; 4 + extraPatches = [ 5 + { 6 + name = "libsvtav1-1.5.0-compat-compressed_ten_bit_format.patch"; 7 + url = "https://git.ffmpeg.org/gitweb/ffmpeg.git/patch/031f1561cd286596cdb374da32f8aa816ce3b135"; 8 + hash = "sha256-mSnmAkoNikDpxcN+A/hpB7mUbbtcMvm4tG6gZFuroe8="; 9 + } 10 + ]; 4 11 }
+17
pkgs/development/libraries/ffmpeg/5.nix
··· 1 1 import ./generic.nix rec { 2 2 version = "5.1.3"; 3 3 sha256 = "sha256-twfJvANLQGO7TiyHPMPqApfHLFUlOGZTTIIGEnjyvuE="; 4 + extraPatches = [ 5 + { 6 + name = "libsvtav1-1.5.0-compat-compressed_ten_bit_format.patch"; 7 + url = "https://git.ffmpeg.org/gitweb/ffmpeg.git/patch/031f1561cd286596cdb374da32f8aa816ce3b135"; 8 + hash = "sha256-mSnmAkoNikDpxcN+A/hpB7mUbbtcMvm4tG6gZFuroe8="; 9 + } 10 + { 11 + name = "libsvtav1-1.5.0-compat-vbv_bufsize.patch"; 12 + url = "https://git.ffmpeg.org/gitweb/ffmpeg.git/patch/1c6fd7d756afe0f8b7df14dbf7a95df275f8f5ee"; 13 + hash = "sha256-v9Viyo12QfZpbcVqd1aHgLl/DgSkdE9F1kr6afTGPik="; 14 + } 15 + { 16 + name = "libsvtav1-1.5.0-compat-maximum_buffer_size_ms-conditional.patch"; 17 + url = "https://git.ffmpeg.org/gitweb/ffmpeg.git/patch/96748ac54f998ba6fe22802799c16b4eba8d4ccc"; 18 + hash = "sha256-Z5HSe7YpryYGHD3BYXejAhqR4EPnmfTGyccxNvU3AaU="; 19 + } 20 + ]; 4 21 }
+2 -2
pkgs/development/libraries/fribidi/default.nix
··· 10 10 11 11 stdenv.mkDerivation rec { 12 12 pname = "fribidi"; 13 - version = "1.0.12"; 13 + version = "1.0.13"; 14 14 15 15 outputs = [ "out" "dev" "devdoc" ]; 16 16 17 17 # NOTE: Only URL tarball has "Have pre-generated man pages: true", which works-around upstream usage of some rare ancient `c2man` fossil application. 18 18 src = fetchurl { 19 19 url = "https://github.com/fribidi/fribidi/releases/download/v${version}/${pname}-${version}.tar.xz"; 20 - sha256 = "sha256-DNIz+X/IxnuzrCfOhEDe9dP/rPUWdluRwsxlRJgpNJU="; 20 + sha256 = "sha256-f6FsgMgb1iL3sZjTE1baE5zDGKY/x3YSF69BMJA/VKI="; 21 21 }; 22 22 23 23 postPatch = ''
+2 -2
pkgs/development/libraries/gnu-efi/default.nix
··· 3 3 4 4 stdenv.mkDerivation rec { 5 5 pname = "gnu-efi"; 6 - version = "3.0.15"; 6 + version = "3.0.17"; 7 7 8 8 src = fetchurl { 9 9 url = "mirror://sourceforge/gnu-efi/${pname}-${version}.tar.bz2"; 10 - sha256 = "sha256-kxole5xcG6Zf9Rnxg3PEOKJoJfLbeGaxY+ltGxaPIOo="; 10 + sha256 = "sha256-eAfpAzSTQ6ehQuu5NHA6KHIjXolojPWGwDKwoQh7yvQ="; 11 11 }; 12 12 13 13 buildInputs = [ pciutils ];
+6 -7
pkgs/development/libraries/gstreamer/bad/default.nix
··· 23 23 , lcms2 24 24 , libnice 25 25 , webrtc-audio-processing 26 - , webrtc-audio-processing_1 27 26 , lilv 28 27 , lv2 29 28 , serd ··· 89 90 , vo-aacenc 90 91 , libfreeaptx 91 92 , zxing-cpp 93 + , usrsctp 92 94 , VideoToolbox 93 95 , AudioToolbox 94 96 , AVFoundation ··· 108 108 109 109 stdenv.mkDerivation rec { 110 110 pname = "gst-plugins-bad"; 111 - version = "1.22.2"; 111 + version = "1.22.3"; 112 112 113 113 outputs = [ "out" "dev" ]; 114 114 115 115 src = fetchurl { 116 116 url = "https://gstreamer.freedesktop.org/src/${pname}/${pname}-${version}.tar.xz"; 117 - hash = "sha256-PY+vHONALIU1zjqMThpslg5LVlXb2mtVlD25rHkCLQ8="; 117 + hash = "sha256-4XmP7i2GEn8GN0gcYH+YMpO/D9garXClx7RyBa82Idg="; 118 118 }; 119 119 120 120 patches = [ ··· 165 165 libde265 166 166 libdvdnav 167 167 libdvdread 168 + libnice 168 169 qrencode 169 170 libsndfile 170 171 libusb1 ··· 194 193 vo-aacenc 195 194 libfreeaptx 196 195 zxing-cpp 196 + usrsctp 197 197 ] ++ lib.optionals enableZbar [ 198 198 zbar 199 199 ] ++ lib.optionals faacSupport [ ··· 224 222 flite 225 223 libdrm 226 224 libgudev 227 - libnice 228 225 sbc 229 226 spandsp 230 227 ··· 277 276 "-Dmusepack=disabled" 278 277 "-Dopenni2=disabled" # not packaged in nixpkgs as of writing 279 278 "-Dopensles=disabled" # not packaged in nixpkgs as of writing 280 - "-Dsctp=disabled" # required `usrsctp` library not packaged in nixpkgs as of writing 281 279 "-Dsvthevcenc=disabled" # required `SvtHevcEnc` library not packaged in nixpkgs as of writing 282 280 "-Dteletext=disabled" # required `zvbi` library not packaged in nixpkgs as of writing 283 281 "-Dtinyalsa=disabled" # not packaged in nixpkgs as of writing ··· 311 311 "-Duvch264=disabled" # requires gudev 312 312 "-Dv4l2codecs=disabled" # requires gudev 313 313 "-Dladspa=disabled" # requires lrdf 314 - "-Dwebrtc=disabled" # requires libnice, which as of writing doesn't work on Darwin in nixpkgs 315 314 "-Dwildmidi=disabled" # see dependencies above 316 315 ] ++ lib.optionals (!stdenv.isLinux || !stdenv.isx86_64) [ 317 316 "-Dqsv=disabled" # Linux (and Windows) x86 only ··· 360 361 ''; 361 362 license = if enableGplPlugins then licenses.gpl2Plus else licenses.lgpl2Plus; 362 363 platforms = platforms.linux ++ platforms.darwin; 363 - maintainers = with maintainers; [ matthewbauer ]; 364 + maintainers = with maintainers; [ matthewbauer lilyinstarlight ]; 364 365 }; 365 366 }
+3 -3
pkgs/development/libraries/gstreamer/base/default.nix
··· 45 45 46 46 stdenv.mkDerivation (finalAttrs: { 47 47 pname = "gst-plugins-base"; 48 - version = "1.22.2"; 48 + version = "1.22.3"; 49 49 50 50 outputs = [ "out" "dev" ]; 51 51 ··· 53 53 inherit (finalAttrs) pname version; 54 54 in fetchurl { 55 55 url = "https://gstreamer.freedesktop.org/src/${pname}/${pname}-${version}.tar.xz"; 56 - hash = "sha256-62USDE7nm3oVPDwZctXAFYwhUYd8xR7Hclu6V0lnnUk="; 56 + hash = "sha256-HFliiaDUIHOAIz66jDapMsTRrOuhmTKTfZtXwkzvifM="; 57 57 }; 58 58 59 59 strictDeps = true; ··· 168 168 "gstreamer-video-1.0" 169 169 ]; 170 170 platforms = platforms.unix; 171 - maintainers = with maintainers; [ matthewbauer ]; 171 + maintainers = with maintainers; [ matthewbauer lilyinstarlight ]; 172 172 }; 173 173 })
+3 -3
pkgs/development/libraries/gstreamer/core/default.nix
··· 24 24 25 25 stdenv.mkDerivation (finalAttrs: { 26 26 pname = "gstreamer"; 27 - version = "1.22.2"; 27 + version = "1.22.3"; 28 28 29 29 outputs = [ 30 30 "bin" ··· 36 36 inherit (finalAttrs) pname version; 37 37 in fetchurl { 38 38 url = "https://gstreamer.freedesktop.org/src/${pname}/${pname}-${version}.tar.xz"; 39 - hash = "sha256-sq/nNgOSHGCLpIlp27fXQ3dnRL/l2AWeziQRN7f4jiE="; 39 + hash = "sha256-n/6rlQU/n2mV6zs9oiXojyHBKc1g2gAtP3ldtw1tWXQ="; 40 40 }; 41 41 42 42 depsBuildBuild = [ ··· 120 120 "gstreamer-controller-1.0" 121 121 ]; 122 122 platforms = platforms.unix; 123 - maintainers = with maintainers; [ ttuegel matthewbauer ]; 123 + maintainers = with maintainers; [ ttuegel matthewbauer lilyinstarlight ]; 124 124 }; 125 125 })
+1 -1
pkgs/development/libraries/gstreamer/default.nix
··· 48 48 ipu6-camera-hal = ipu6ep-camera-hal; 49 49 }; 50 50 51 - # note: gst-python is in ./python/default.nix - called under pythonPackages 51 + # note: gst-python is in ../../python-modules/gst-python - called under python3Packages 52 52 }
+3 -2
pkgs/development/libraries/gstreamer/devtools/default.nix
··· 17 17 18 18 stdenv.mkDerivation rec { 19 19 pname = "gst-devtools"; 20 - version = "1.22.2"; 20 + version = "1.22.3"; 21 21 22 22 src = fetchurl { 23 23 url = "https://gstreamer.freedesktop.org/src/${pname}/${pname}-${version}.tar.xz"; 24 - hash = "sha256-62JybT4nqHgjaaJP1jZKiIXtJGKzu9qwkd/8gTnuBtg="; 24 + hash = "sha256-RGrJxC1QLL/ZCBc3zBuFOzwfUNt3ynzNAa6hD2h1UME="; 25 25 }; 26 26 27 27 outputs = [ ··· 65 65 homepage = "https://gstreamer.freedesktop.org"; 66 66 license = licenses.lgpl2Plus; 67 67 platforms = platforms.unix; 68 + maintainers = with maintainers; [ lilyinstarlight ]; 68 69 }; 69 70 }
+3 -2
pkgs/development/libraries/gstreamer/ges/default.nix
··· 18 18 19 19 stdenv.mkDerivation rec { 20 20 pname = "gst-editing-services"; 21 - version = "1.22.2"; 21 + version = "1.22.3"; 22 22 23 23 outputs = [ 24 24 "out" ··· 27 27 28 28 src = fetchurl { 29 29 url = "https://gstreamer.freedesktop.org/src/${pname}/${pname}-${version}.tar.xz"; 30 - hash = "sha256-RTsUZPw4V94mmnyw69lmr+Ahcdl772cqC4oKbUPgzr8="; 30 + hash = "sha256-FaW85iUJseEl6FoJ7EHzIcD1SSZLUETACV/PstXAzqI="; 31 31 }; 32 32 33 33 nativeBuildInputs = [ ··· 69 69 homepage = "https://gstreamer.freedesktop.org"; 70 70 license = licenses.lgpl2Plus; 71 71 platforms = platforms.unix; 72 + maintainers = with maintainers; [ lilyinstarlight ]; 72 73 }; 73 74 }
+3 -3
pkgs/development/libraries/gstreamer/good/default.nix
··· 52 52 53 53 stdenv.mkDerivation rec { 54 54 pname = "gst-plugins-good"; 55 - version = "1.22.2"; 55 + version = "1.22.3"; 56 56 57 57 outputs = [ "out" "dev" ]; 58 58 59 59 src = fetchurl { 60 60 url = "https://gstreamer.freedesktop.org/src/${pname}/${pname}-${version}.tar.xz"; 61 - hash = "sha256-fIzFlCXysjL2DKfRPlbt1hXaT3Eec90Bp8/6Rua8DN0="; 61 + hash = "sha256-r4EVSzou8/TS/ro5XyVpb+6m/RPsYsktPHqXNHBxAnM="; 62 62 }; 63 63 64 64 strictDeps = true; ··· 190 190 ''; 191 191 license = licenses.lgpl2Plus; 192 192 platforms = platforms.linux ++ platforms.darwin; 193 - maintainers = with maintainers; [ matthewbauer ]; 193 + maintainers = with maintainers; [ matthewbauer lilyinstarlight ]; 194 194 }; 195 195 }
+3 -2
pkgs/development/libraries/gstreamer/libav/default.nix
··· 18 18 19 19 stdenv.mkDerivation rec { 20 20 pname = "gst-libav"; 21 - version = "1.22.2"; 21 + version = "1.22.3"; 22 22 23 23 src = fetchurl { 24 24 url = "https://gstreamer.freedesktop.org/src/${pname}/${pname}-${version}.tar.xz"; 25 - hash = "sha256-/Kr5h4/o87yCMX7xOhVYgky2jfH4loxnl/VWxeM7z/0="; 25 + hash = "sha256-LsXIBYCLQ3Gn4ysdoCAqHIprNrbOkFCAv1w0CX0SqSM="; 26 26 }; 27 27 28 28 outputs = [ "out" "dev" ]; ··· 57 57 homepage = "https://gstreamer.freedesktop.org"; 58 58 license = licenses.lgpl2Plus; 59 59 platforms = platforms.unix; 60 + maintainers = with maintainers; [ lilyinstarlight ]; 60 61 }; 61 62 }
+9 -6
pkgs/development/libraries/gstreamer/rs/default.nix
··· 1 1 { lib 2 2 , stdenv 3 3 , fetchFromGitLab 4 - , fetchpatch 5 4 , writeText 6 5 , rustPlatform 7 6 , meson ··· 26 27 , Security 27 28 , gst-plugins-good 28 29 , nix-update-script 30 + # specifies a limited subset of plugins to build (the default `null` means all plugins supported on the stdenv platform) 31 + , plugins ? null 32 + # Checks meson.is_cross_build(), so even canExecute isn't enough. 33 + , enableDocumentation ? stdenv.hostPlatform == stdenv.buildPlatform && plugins == null 34 + , hotdoc 29 35 # TODO: required for case-insensitivity hack below 30 36 , yq 31 37 , moreutils 32 - # specify a limited set of plugins to build if not all supported plugins 33 - , plugins ? null 34 38 }: 35 39 36 40 let ··· 96 94 97 95 selectedPlugins = if plugins != null then lib.unique (lib.sort lib.lessThan plugins) else lib.subtractLists ( 98 96 [ 99 - "audiofx" # tests have race-y failure, see https://gitlab.freedesktop.org/gstreamer/gst-plugins-rs/-/issues/337 100 97 "csound" # tests have weird failure on x86, does not currently work on arm or darwin 101 98 "livesync" # tests have suspicious intermittent failure, see https://gitlab.freedesktop.org/gstreamer/gst-plugins-rs/-/issues/357 102 99 ] ++ lib.optionals stdenv.isDarwin [ ··· 163 162 cargo 164 163 cargo-c 165 164 nasm 165 + ] ++ lib.optionals enableDocumentation [ 166 + hotdoc 166 167 ]; 167 168 168 169 buildInputs = [ ··· 181 178 map (plugin: lib.mesonEnable plugin true) selectedPlugins 182 179 ) ++ [ 183 180 (lib.mesonOption "sodium-source" "system") 184 - (lib.mesonEnable "doc" false) # `hotdoc` not packaged in nixpkgs as of writing 181 + (lib.mesonEnable "doc" enableDocumentation) 185 182 ] ++ (let 186 183 crossFile = writeText "cross-file.conf" '' 187 184 [binaries] ··· 191 188 "--cross-file=${crossFile}" 192 189 ]); 193 190 194 - # turn off all auto plugins if a list is specified 191 + # turn off all auto plugins since we use a list of plugins we generate 195 192 mesonAutoFeatures = "disabled"; 196 193 197 194 doCheck = true;
+3 -3
pkgs/development/libraries/gstreamer/rtsp-server/default.nix
··· 15 15 16 16 stdenv.mkDerivation rec { 17 17 pname = "gst-rtsp-server"; 18 - version = "1.22.2"; 18 + version = "1.22.3"; 19 19 20 20 src = fetchurl { 21 21 url = "https://gstreamer.freedesktop.org/src/${pname}/${pname}-${version}.tar.xz"; 22 - hash = "sha256-K+Suz7iHEBAOpxFe0CFkA+gJQ0Tr8UYJQnG41Nc4KL8="; 22 + hash = "sha256-0Co536m9v5mj3S03jheUKzzkLf42+wwn4tCwFyL8Vh0="; 23 23 }; 24 24 25 25 outputs = [ ··· 62 62 ''; 63 63 license = licenses.lgpl2Plus; 64 64 platforms = platforms.unix; 65 - maintainers = with maintainers; [ bkchr ]; 65 + maintainers = with maintainers; [ bkchr lilyinstarlight ]; 66 66 }; 67 67 }
+3 -3
pkgs/development/libraries/gstreamer/ugly/default.nix
··· 26 26 27 27 stdenv.mkDerivation rec { 28 28 pname = "gst-plugins-ugly"; 29 - version = "1.22.2"; 29 + version = "1.22.3"; 30 30 31 31 outputs = [ "out" "dev" ]; 32 32 33 33 src = fetchurl { 34 34 url = "https://gstreamer.freedesktop.org/src/${pname}/${pname}-${version}.tar.xz"; 35 - hash = "sha256-jzD0TbC9BjcJv2++VROOOpivCry2HDYPNVgrvhDoBpE="; 35 + hash = "sha256-PcmO1cIpM2izxObOVdib6DSgpi6b+I7xeSjPA7fVo2A="; 36 36 }; 37 37 38 38 nativeBuildInputs = [ ··· 93 93 ''; 94 94 license = if enableGplPlugins then licenses.gpl2Plus else licenses.lgpl2Plus; 95 95 platforms = platforms.unix; 96 - maintainers = with maintainers; [ matthewbauer ]; 96 + maintainers = with maintainers; [ matthewbauer lilyinstarlight ]; 97 97 }; 98 98 }
+3 -3
pkgs/development/libraries/gstreamer/vaapi/default.nix
··· 24 24 25 25 stdenv.mkDerivation rec { 26 26 pname = "gstreamer-vaapi"; 27 - version = "1.22.2"; 27 + version = "1.22.3"; 28 28 29 29 src = fetchurl { 30 30 url = "https://gstreamer.freedesktop.org/src/${pname}/${pname}-${version}.tar.xz"; 31 - hash = "sha256-0uZC+XRfl9n3On9Qhedlmpox/iCbd05uRdrgQbQ13wY="; 31 + hash = "sha256-onhnBi6LaTBfylt9PxPtfDGLcD59cnVslDlb0wXHsyw="; 32 32 }; 33 33 34 34 outputs = [ ··· 84 84 description = "Set of VAAPI GStreamer Plug-ins"; 85 85 homepage = "https://gstreamer.freedesktop.org"; 86 86 license = licenses.lgpl21Plus; 87 - maintainers = with maintainers; [ ]; 88 87 platforms = platforms.linux; 88 + maintainers = with maintainers; [ lilyinstarlight ]; 89 89 }; 90 90 }
+2 -2
pkgs/development/libraries/harfbuzz/default.nix
··· 34 34 35 35 stdenv.mkDerivation rec { 36 36 pname = "harfbuzz${lib.optionalString withIcu "-icu"}"; 37 - version = "7.2.0"; 37 + version = "7.3.0"; 38 38 39 39 src = fetchurl { 40 40 url = "https://github.com/harfbuzz/harfbuzz/releases/download/${version}/harfbuzz-${version}.tar.xz"; 41 - hash = "sha256-/FVgyAfq4O/V+VtapMZYAMeo7tZkIAimsefj//94c8w="; 41 + hash = "sha256-IHcHiXSaybqEbfM5g9vaItuDbHDZ9dBQy5qlNHCUqPs="; 42 42 }; 43 43 44 44 postPatch = ''
+2 -2
pkgs/development/libraries/libaom/default.nix
··· 8 8 in 9 9 stdenv.mkDerivation rec { 10 10 pname = "libaom"; 11 - version = "3.6.0"; 11 + version = "3.6.1"; 12 12 13 13 src = fetchzip { 14 14 url = "https://aomedia.googlesource.com/aom/+archive/v${version}.tar.gz"; 15 - sha256 = "sha256-tt19UCsZP99rq6BYBSzSHecyIu4CiimD+P1f3CY2QEU="; 15 + sha256 = "sha256-U7hmKdpjTtqStM4UIjCvgJ2swpZ1x0Px1Q9+gSHbaeQ="; 16 16 stripRoot = false; 17 17 }; 18 18
+2
pkgs/development/libraries/libass/default.nix
··· 17 17 sha256 = "sha256-8NoLv7pHbBauPhz9hiJW0wkVkR96uqGxbOYu5lMZJ4Q="; 18 18 }; 19 19 20 + outputs = [ "out" "dev" ]; 21 + 20 22 configureFlags = [ 21 23 (lib.enableFeature fontconfigSupport "fontconfig") 22 24 (lib.enableFeature rasterizerSupport "rasterizer")
+24 -14
pkgs/development/libraries/libclc/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, ninja, cmake, python3, llvmPackages, spirv-llvm-translator }: 2 - 3 - let 4 - llvm = llvmPackages.llvm; 5 - clang-unwrapped = llvmPackages.clang-unwrapped; 6 - in 1 + { lib, stdenv, fetchFromGitHub, buildPackages, ninja, cmake, python3, llvm_14 }: 7 2 8 3 stdenv.mkDerivation rec { 9 4 pname = "libclc"; 10 - version = "15.0.7"; 5 + version = "16.0.3"; 11 6 12 7 src = fetchFromGitHub { 13 8 owner = "llvm"; 14 9 repo = "llvm-project"; 15 10 rev = "llvmorg-${version}"; 16 - sha256 = "sha256-wjuZQyXQ/jsmvy6y1aksCcEDXGBjuhpgngF3XQJ/T4s="; 11 + hash = "sha256-paWwnoU3XMqreRgh9JbT1tDMTwq/ZL0ss3SJTteEGL0="; 17 12 }; 18 13 sourceRoot = "source/libclc"; 14 + 15 + outputs = [ "out" "dev" ]; 19 16 20 17 # cmake expects all required binaries to be in the same place, so it will not be able to find clang without the patch 21 18 postPatch = '' 22 19 substituteInPlace CMakeLists.txt \ 23 - --replace 'find_program( LLVM_CLANG clang PATHS ''${LLVM_BINDIR} NO_DEFAULT_PATH )' \ 24 - 'find_program( LLVM_CLANG clang PATHS "${clang-unwrapped}/bin" NO_DEFAULT_PATH )' \ 25 - --replace 'find_program( LLVM_SPIRV llvm-spirv PATHS ''${LLVM_BINDIR} NO_DEFAULT_PATH )' \ 26 - 'find_program( LLVM_SPIRV llvm-spirv PATHS "${spirv-llvm-translator}/bin" NO_DEFAULT_PATH )' 20 + --replace 'find_program( LLVM_CLANG clang PATHS ''${LLVM_TOOLS_BINARY_DIR} NO_DEFAULT_PATH )' \ 21 + 'find_program( LLVM_CLANG clang PATHS "${buildPackages.clang_14.cc}/bin" NO_DEFAULT_PATH )' \ 22 + --replace 'find_program( LLVM_AS llvm-as PATHS ''${LLVM_TOOLS_BINARY_DIR} NO_DEFAULT_PATH )' \ 23 + 'find_program( LLVM_AS llvm-as PATHS "${buildPackages.llvm_14}/bin" NO_DEFAULT_PATH )' \ 24 + --replace 'find_program( LLVM_LINK llvm-link PATHS ''${LLVM_TOOLS_BINARY_DIR} NO_DEFAULT_PATH )' \ 25 + 'find_program( LLVM_LINK llvm-link PATHS "${buildPackages.llvm_14}/bin" NO_DEFAULT_PATH )' \ 26 + --replace 'find_program( LLVM_OPT opt PATHS ''${LLVM_TOOLS_BINARY_DIR} NO_DEFAULT_PATH )' \ 27 + 'find_program( LLVM_OPT opt PATHS "${buildPackages.llvm_14}/bin" NO_DEFAULT_PATH )' \ 28 + --replace 'find_program( LLVM_SPIRV llvm-spirv PATHS ''${LLVM_TOOLS_BINARY_DIR} NO_DEFAULT_PATH )' \ 29 + 'find_program( LLVM_SPIRV llvm-spirv PATHS "${buildPackages.spirv-llvm-translator}/bin" NO_DEFAULT_PATH )' 30 + '' + lib.optionalString (stdenv.hostPlatform != stdenv.buildPlatform) '' 31 + substituteInPlace CMakeLists.txt \ 32 + --replace 'COMMAND prepare_builtins' 'COMMAND ${buildPackages.libclc.dev}/bin/prepare_builtins' 27 33 ''; 28 34 29 - nativeBuildInputs = [ cmake ninja python3 spirv-llvm-translator ]; 30 - buildInputs = [ llvm clang-unwrapped ]; 35 + nativeBuildInputs = [ cmake ninja python3 ]; 36 + buildInputs = [ llvm_14 ]; 31 37 strictDeps = true; 32 38 cmakeFlags = [ 33 39 "-DCMAKE_INSTALL_INCLUDEDIR=include" 34 40 ]; 41 + 42 + postInstall = '' 43 + install -Dt $dev/bin prepare_builtins 44 + ''; 35 45 36 46 meta = with lib; { 37 47 broken = stdenv.isDarwin;
+2
pkgs/development/libraries/libdaemon/default.nix
··· 9 9 sha256 = "0d5qlq5ab95wh1xc87rqrh1vx6i8lddka1w3f1zcqvcqdxgyn8zx"; 10 10 }; 11 11 12 + outputs = [ "out" "dev" "doc" ]; 13 + 12 14 patches = [ ./fix-includes.patch ]; 13 15 14 16 configureFlags = [ "--disable-lynx" ]
+2 -2
pkgs/development/libraries/libevdev/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "libevdev"; 5 - version = "1.13.0"; 5 + version = "1.13.1"; 6 6 7 7 src = fetchurl { 8 8 url = "https://www.freedesktop.org/software/${pname}/${pname}-${version}.tar.xz"; 9 - sha256 = "sha256-nt8gBsyGpQVSeWR8OOySPRGoIe5NwsMDPo0g6O4jfNk="; 9 + sha256 = "sha256-Bqd78qxcmTMFiCvBZBAX9b7BWS1tG2R4e61JKrNPLzY="; 10 10 }; 11 11 12 12 nativeBuildInputs = [ python3 ];
+2 -2
pkgs/development/libraries/liblc3/default.nix
··· 7 7 8 8 let 9 9 name = "liblc3"; 10 - version = "1.0.2"; 10 + version = "1.0.3"; 11 11 in 12 12 stdenv.mkDerivation { 13 13 pname = name; ··· 17 17 owner = "google"; 18 18 repo = "liblc3"; 19 19 rev = "v${version}"; 20 - sha256 = "sha256-Be+dPUnxC2+cHzqL2FAqXOU7NjEAHiPBKh7spuYkvhc="; 20 + sha256 = "sha256-PEnK12FWAtxOMR3WyuxOQTgF+lD9S5YX+oKuWRbFfXM="; 21 21 }; 22 22 23 23 outputs = [ "out" "dev" ];
+6
pkgs/development/libraries/libssh/default.nix
··· 22 22 sha256 = "sha256-tg4v9/Nnue7itWNNOmMwPd/t4OahjfyojESodw5+QjQ="; 23 23 }; 24 24 25 + # Do not split 'dev' output until lib/cmake/libssh/libssh-config.cmake 26 + # is fixed to point INTERFACE_INCLUDE_DIRECTORIES to .dev output. 27 + # Otherwise it breaks `plasma5Packages.kio-extras`: 28 + # https://hydra.nixos.org/build/221540008/nixlog/3/tail 29 + #outputs = [ "out" "dev" ]; 30 + 25 31 postPatch = '' 26 32 # Fix headers to use libsodium instead of NaCl 27 33 sed -i 's,nacl/,sodium/,g' ./include/libssh/curve25519.h src/curve25519.c
+3 -13
pkgs/development/libraries/libuv/default.nix
··· 1 1 { stdenv 2 2 , lib 3 3 , fetchFromGitHub 4 - , fetchpatch 5 4 , autoconf 6 5 , automake 7 6 , libtool ··· 23 24 }: 24 25 25 26 stdenv.mkDerivation rec { 26 - version = "1.44.2"; 27 + version = "1.45.0"; 27 28 pname = "libuv"; 28 29 29 30 src = fetchFromGitHub { 30 31 owner = pname; 31 32 repo = pname; 32 33 rev = "v${version}"; 33 - sha256 = "sha256-K6v+00basjI32ON27ZjC5spQi/zWCcslDwQwyosq2iY="; 34 + sha256 = "sha256-qKw9QFR24Uw7pVA9isPH8Va+9/5DYuqXz6l6jWcXn+4="; 34 35 }; 35 36 36 37 outputs = [ "out" "dev" ]; 37 - 38 - patches = [ 39 - # Fix tests for statically linked variant upstream PR is 40 - # https://github.com/libuv/libuv/pull/3735 41 - (fetchpatch { 42 - url = "https://github.com/libuv/libuv/commit/9d898acc564351dde74e9ed9865144e5c41f5beb.patch"; 43 - sha256 = "sha256-6XsjrseD8a+ny887EKOX0NmHocLMXGf2YL13vkNHUZ0="; 44 - }) 45 - ]; 46 38 47 39 postPatch = let 48 40 toDisable = [ ··· 43 53 "getaddrinfo_fail" "getaddrinfo_fail_sync" 44 54 "threadpool_multiple_event_loops" # times out on slow machines 45 55 "get_passwd" # passed on NixOS but failed on other Linuxes 46 - "tcp_writealot" "udp_multicast_join" "udp_multicast_join6" # times out sometimes 56 + "tcp_writealot" "udp_multicast_join" "udp_multicast_join6" "metrics_pool_events" # times out sometimes 47 57 "fs_fstat" # https://github.com/libuv/libuv/issues/2235#issuecomment-1012086927 48 58 49 59 # Assertion failed in test/test-tcp-bind6-error.c on line 60: r == UV_EADDRINUSE
+2
pkgs/development/libraries/libvisual/default.nix
··· 17 17 hash = "sha256-qhKHdBf3bTZC2fTHIzAjgNgzF1Y51jpVZB0Bkopd230="; 18 18 }; 19 19 20 + outputs = [ "out" "dev" ]; 21 + 20 22 patches = [ 21 23 # pull upstream fix for SDL1 cross-compilation. 22 24 # https://github.com/Libvisual/libvisual/pull/238
+2
pkgs/development/libraries/libyaml/default.nix
··· 14 14 sha256 = "18zsnsxc53pans4a01cs4401a2cjk3qi098hi440pj4zijifgcsb"; 15 15 }; 16 16 17 + outputs = [ "out" "dev" ]; 18 + 17 19 nativeBuildInputs = [ autoreconfHook ]; 18 20 19 21 meta = with lib; {
+2 -2
pkgs/development/libraries/nettle/default.nix
··· 1 1 { callPackage, fetchurl }: 2 2 3 3 callPackage ./generic.nix rec { 4 - version = "3.8.1"; 4 + version = "3.9"; 5 5 6 6 src = fetchurl { 7 7 url = "mirror://gnu/nettle/nettle-${version}.tar.gz"; 8 - hash = "sha256-Nk8+K3fNfc3oP9fEUhnINOVLDHXkKLb4lKI9Et1By/4="; 8 + hash = "sha256-Duet9acgFhC7f+Csu3ybO+g75EkE3TXrvNllzYlr/qo="; 9 9 }; 10 10 }
+2 -2
pkgs/development/libraries/nghttp3/default.nix
··· 6 6 7 7 stdenv.mkDerivation rec { 8 8 pname = "nghttp3"; 9 - version = "0.10.0"; 9 + version = "0.11.0"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "ngtcp2"; 13 13 repo = pname; 14 14 rev = "v${version}"; 15 - hash = "sha256-V0g/d1B9uMn7KZU6ShzyPGXOSAYCbz4ZubnhAwz+Qsc="; 15 + hash = "sha256-fZMFSQ8RCVxuoLrisa8lLqjNVe4fIuGqbyKtkC/u02M="; 16 16 }; 17 17 18 18 outputs = [ "out" "dev" "doc" ];
+2 -2
pkgs/development/libraries/ngtcp2/default.nix
··· 8 8 9 9 stdenv.mkDerivation rec { 10 10 pname = "ngtcp2"; 11 - version = "0.14.1"; 11 + version = "0.15.0"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "ngtcp2"; 15 15 repo = pname; 16 16 rev = "v${version}"; 17 - hash = "sha256-VsacRYvjTWVx2ga952s1vs02GElXIW6umgcYr3UCcgE="; 17 + hash = "sha256-FWNWpRuCUyqTIyLZkBFKrd2urjSCqHp20mBAXOcJm14="; 18 18 }; 19 19 20 20 outputs = [ "out" "dev" "doc" ];
+2 -2
pkgs/development/libraries/openal-soft/default.nix
··· 8 8 9 9 stdenv.mkDerivation rec { 10 10 pname = "openal-soft"; 11 - version = "1.22.2"; 11 + version = "1.23.1"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "kcat"; 15 15 repo = "openal-soft"; 16 16 rev = version; 17 - sha256 = "sha256-MVM0qCZDWcO7/Hnco+0dBqzBLcWD279xjx0slxxlc4w="; 17 + sha256 = "sha256-jwY1NzNJdWIvVv7TvJyg4cIGFLWGZhL3BkMI1NbOEG0="; 18 18 }; 19 19 20 20 patches = [
+2 -2
pkgs/development/libraries/qca-qt5/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "qca-qt5"; 5 - version = "2.3.5"; 5 + version = "2.3.6"; 6 6 7 7 src = fetchurl { 8 8 url = "http://download.kde.org/stable/qca/${version}/qca-${version}.tar.xz"; 9 - sha256 = "sha256-kffZFqs2kr9ZkfClU7+BUxYb/doUvQBdSAorTjhDYug="; 9 + sha256 = "sha256-7lnVMdS4L7FoX02NdMLKoHd/UBgA90JuqjchCaQwUkk="; 10 10 }; 11 11 12 12 buildInputs = [ openssl qtbase ];
+4 -2
pkgs/development/libraries/sbc/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "sbc"; 5 - version = "1.4"; 5 + version = "2.0"; 6 6 7 7 src = fetchurl { 8 8 url = "https://www.kernel.org/pub/linux/bluetooth/${pname}-${version}.tar.xz"; 9 - sha256 = "1jal98pnrjkzxlkiqy0ykh4qmgnydz9bmsp1jn581p5kddpg92si"; 9 + sha256 = "sha256-jxI2jh279V4UU2UgRzz7M4yEs5KTnMm2Qpg2D9SgeZI="; 10 10 }; 11 + 12 + outputs = [ "out" "dev" ]; 11 13 12 14 nativeBuildInputs = [ pkg-config ]; 13 15 buildInputs = [ libsndfile ];
+2
pkgs/development/libraries/silgraphite/graphite2.nix
··· 17 17 sha256 = "1790ajyhk0ax8xxamnrk176gc9gvhadzy78qia4rd8jzm89ir7gr"; 18 18 }; 19 19 20 + outputs = [ "out" "dev" ]; 21 + 20 22 nativeBuildInputs = [ pkg-config cmake ]; 21 23 buildInputs = [ freetype ]; 22 24
+2 -2
pkgs/development/libraries/wavpack/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "wavpack"; 5 - version = "5.5.0"; 5 + version = "5.6.0"; 6 6 7 7 enableParallelBuilding = true; 8 8 ··· 16 16 owner = "dbry"; 17 17 repo = "WavPack"; 18 18 rev = version; 19 - hash = "sha256-4QDtLywu0PT+YsMV26M74bL2P7p4s1tk8ZBQtQcubaU="; 19 + hash = "sha256-fWAGE87JTNTnYoxrkMf3I8C53kZrQiiBy3Zyg0cw8Og="; 20 20 }; 21 21 22 22 outputs = [ "out" "dev" "doc" "man" ];
+2
pkgs/development/libraries/webrtc-audio-processing/0.3.nix
··· 9 9 sha256 = "1gsx7k77blfy171b6g3m0k0s0072v6jcawhmx1kjs9w5zlwdkzd0"; 10 10 }; 11 11 12 + outputs = [ "out" "dev" ]; 13 + 12 14 patches = [ 13 15 ./enable-riscv.patch 14 16 ./enable-powerpc.patch
+2
pkgs/development/libraries/zimg/default.nix
··· 11 11 sha256 = "1069x49l7kh1mqcq1h3f0m5j0h832jp5x230bh4c613ymgg5kn00"; 12 12 }; 13 13 14 + outputs = [ "out" "dev" "doc" ]; 15 + 14 16 nativeBuildInputs = [ autoreconfHook ]; 15 17 16 18 enableParallelBuilding = true;
+3 -2
pkgs/development/python-modules/gst-python/default.nix
··· 14 14 15 15 buildPythonPackage rec { 16 16 pname = "gst-python"; 17 - version = "1.22.2"; 17 + version = "1.22.3"; 18 18 19 19 format = "other"; 20 20 ··· 22 22 23 23 src = fetchurl { 24 24 url = "${meta.homepage}/src/gst-python/${pname}-${version}.tar.xz"; 25 - hash = "sha256-vvKz2Czkvka3dbG7VjBcEAPuAbU1pTqC+f6JJJchU60="; 25 + hash = "sha256-cL7T+r5jS8Yi723k5uscM7yc79ZL2rIA9voxa0aMcxw="; 26 26 }; 27 27 28 28 # Python 2.x is not supported. ··· 61 61 homepage = "https://gstreamer.freedesktop.org"; 62 62 description = "Python bindings for GStreamer"; 63 63 license = licenses.lgpl2Plus; 64 + maintainers = with maintainers; [ lilyinstarlight ]; 64 65 }; 65 66 }
+2 -2
pkgs/development/python-modules/matplotlib/default.nix
··· 76 76 in 77 77 78 78 buildPythonPackage rec { 79 - version = "3.7.0"; 79 + version = "3.7.1"; 80 80 pname = "matplotlib"; 81 81 format = "pyproject"; 82 82 ··· 84 84 85 85 src = fetchPypi { 86 86 inherit pname version; 87 - hash = "sha256-j279MTQw1+9wo4oydigcsuhkazois7IesifaIOFeaBM="; 87 + hash = "sha256-e3MwXyXqtFQb1+4Llth+U66cnxgjvlZZuAbNhXhv6II="; 88 88 }; 89 89 90 90 env.XDG_RUNTIME_DIR = "/tmp";
+2 -2
pkgs/development/python-modules/mkdocs-material/default.nix
··· 19 19 20 20 buildPythonPackage rec { 21 21 pname = "mkdocs-material"; 22 - version = "9.1.8"; 22 + version = "9.1.13"; 23 23 format = "pyproject"; 24 24 25 25 disabled = pythonOlder "3.7"; ··· 28 28 owner = "squidfunk"; 29 29 repo = pname; 30 30 rev = "refs/tags/${version}"; 31 - hash = "sha256-a0AeRjS0fV4q3z6MPZBBv8Ffv61W3zHPrnPT4evBnaw="; 31 + hash = "sha256-S+cCNcQR8Y1UGj+4Nfy9Z10N/9PRq13fSeR2YFntxWI="; 32 32 }; 33 33 34 34 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/requests/default.nix
··· 18 18 19 19 buildPythonPackage rec { 20 20 pname = "requests"; 21 - version = "2.29.0"; 21 + version = "2.31.0"; 22 22 format = "setuptools"; 23 23 24 24 disabled = pythonOlder "3.7"; ··· 27 27 28 28 src = fetchPypi { 29 29 inherit pname version; 30 - hash = "sha256-8uNKdfR0kBm7Dj7/tmaDYw5P/q91gZ+1G+vvG/Wu8Fk="; 30 + hash = "sha256-lCxadY+Y15Dq7Ropy27vx/+w0c968Fw9J5Flbb1q0eE="; 31 31 }; 32 32 33 33 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/sqlalchemy/default.nix
··· 41 41 42 42 buildPythonPackage rec { 43 43 pname = "SQLAlchemy"; 44 - version = "2.0.13"; 44 + version = "2.0.15"; 45 45 format = "pyproject"; 46 46 47 47 disabled = pythonOlder "3.7"; ··· 50 50 owner = "sqlalchemy"; 51 51 repo = "sqlalchemy"; 52 52 rev = "refs/tags/rel_${lib.replaceStrings [ "." ] [ "_" ] version}"; 53 - hash = "sha256-tKxzKv0Ng0saybeFJNleCN5D8gOFw4z9m858OeddJH0="; 53 + hash = "sha256-05GhFearTA9At8MgmEfeXfbS3MAZ0Rmx8jER18q7fmI="; 54 54 }; 55 55 56 56 nativeBuildInputs =[
+2 -2
pkgs/development/tools/analysis/valgrind/default.nix
··· 6 6 7 7 stdenv.mkDerivation rec { 8 8 pname = "valgrind"; 9 - version = "3.20.0"; 9 + version = "3.21.0"; 10 10 11 11 src = fetchurl { 12 12 url = "https://sourceware.org/pub/${pname}/${pname}-${version}.tar.bz2"; 13 - sha256 = "sha256-hTbAMdvgeNNC8SH6iBqezSBctaeOY5AFrVcAEb2588Y="; 13 + hash = "sha256-EM4WGLs+M/rRbreVUrCj4SEXYkSKDX/OEcimJDuayXE="; 14 14 }; 15 15 16 16 patches = [
+2 -2
pkgs/development/tools/documentation/doxygen/default.nix
··· 13 13 14 14 stdenv.mkDerivation rec { 15 15 pname = "doxygen"; 16 - version = "1.9.6"; 16 + version = "1.9.7"; 17 17 18 18 src = fetchFromGitHub { 19 19 owner = "doxygen"; 20 20 repo = "doxygen"; 21 21 rev = "Release_${lib.replaceStrings [ "." ] [ "_" ] version}"; 22 - sha256 = "sha256-SqboPBqK7gDVTTjGgCUB9oIGBZR55EA7x65a0wumiKw="; 22 + sha256 = "sha256-ezeMQk+Vyi9qNsYwbaRRruaIYGY8stFf71W7GonXqco="; 23 23 }; 24 24 25 25 nativeBuildInputs = [
+6 -5
pkgs/development/tools/rust/maturin/default.nix
··· 11 11 12 12 rustPlatform.buildRustPackage rec { 13 13 pname = "maturin"; 14 - version = "0.14.17"; 14 + version = "1.0.0"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "PyO3"; 18 18 repo = "maturin"; 19 19 rev = "v${version}"; 20 - hash = "sha256-Qvk9Pde1xmQ/lqU6KCda+F6UV7b414TDswP5Cwrh4jc="; 20 + hash = "sha256-Y/eqkA23gzoCmsFeYqZsK52e6s8ElIdKavL4ay9Q0Zs="; 21 21 }; 22 22 23 - cargoHash = "sha256-mPpM8jVDA9TbdNR1AdAzVP6sd2glUpDKhyVaaCcQzKE="; 23 + cargoHash = "sha256-fr7HuMfuErYyPhAdwvj+HluW/K4mSHW/kKcdnWOW1i4="; 24 24 25 - nativeBuildInputs = [ pkg-config ]; 25 + nativeBuildInputs = lib.optionals stdenv.isLinux [ pkg-config ]; 26 26 27 27 buildInputs = lib.optionals stdenv.isLinux [ dbus ] 28 28 ++ lib.optionals stdenv.isDarwin [ Security libiconv ]; ··· 43 43 Python and can upload them to PyPI. 44 44 ''; 45 45 homepage = "https://github.com/PyO3/maturin"; 46 - license = licenses.asl20; 46 + changelog = "https://github.com/PyO3/maturin/blob/v${version}/Changelog.md"; 47 + license = with licenses; [ asl20 /* or */ mit ]; 47 48 maintainers = [ ]; 48 49 }; 49 50 }
+7
pkgs/misc/jackaudio/default.nix
··· 37 37 sha256 = "01s8i64qczxqawgrzrw19asaqmcspf5l2h3203xzg56wnnhhzcw7"; 38 38 }; 39 39 40 + outputs = [ "out" "dev" ]; 41 + 40 42 nativeBuildInputs = [ pkg-config python makeWrapper wafHook ]; 41 43 buildInputs = [ libsamplerate libsndfile readline eigen celt 42 44 optDbus optPythonDBus optLibffado optAlsaLib optLibopus ··· 65 63 '' else '' 66 64 wrapProgram $out/bin/jack_control --set PYTHONPATH $PYTHONPATH 67 65 ''); 66 + 67 + postFixup = '' 68 + substituteInPlace "$dev/lib/pkgconfig/jack.pc" \ 69 + --replace "$out/include" "$dev/include" 70 + ''; 68 71 69 72 passthru.tests.pkg-config = testers.testMetaPkgConfig finalAttrs.finalPackage; 70 73
+2 -2
pkgs/os-specific/linux/alsa-project/alsa-lib/default.nix
··· 8 8 9 9 stdenv.mkDerivation (finalAttrs: { 10 10 pname = "alsa-lib"; 11 - version = "1.2.8"; 11 + version = "1.2.9"; 12 12 13 13 src = fetchurl { 14 14 url = "mirror://alsa/lib/${finalAttrs.pname}-${finalAttrs.version}.tar.bz2"; 15 - hash = "sha256-GrAbdOM0JcqZwuNsCET9aIgnMZO9iYJA/o+TrMvL80c="; 15 + hash = "sha256-3JxkP9xMz9BXLMaFhY3UHgivtYPzBGCzF+QYgnX2FbI="; 16 16 }; 17 17 18 18 patches = [
+35
pkgs/os-specific/linux/audit/001-ignore-flexible-array.patch
··· 1 + From beed138222421a2eb4212d83cb889404bd7efc49 Mon Sep 17 00:00:00 2001 2 + From: Sergei Trofimovich <slyich@gmail.com> 3 + Date: Wed, 23 Mar 2022 07:27:05 +0000 4 + Subject: [PATCH] auditswig.i: avoid setter generation for audit_rule_data::buf 5 + 6 + As it's a flexible array generated code was never safe to use. 7 + With kernel's https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ed98ea2128b6fd83bce13716edf8f5fe6c47f574 8 + change it's a build failure now: 9 + 10 + audit> audit_wrap.c:5010:15: error: invalid use of flexible array member 11 + audit> 5010 | arg1->buf = (char [])(char *)memcpy(malloc((size)*sizeof(char)), (const char *)(arg2), sizeof(char)*(size)); 12 + audit> | ^ 13 + 14 + Let's avoid setter generation entirely. 15 + 16 + Closes: https://github.com/linux-audit/audit-userspace/issues/252 17 + --- 18 + bindings/swig/src/auditswig.i | 4 ++++ 19 + 1 file changed, 4 insertions(+) 20 + 21 + diff --git a/bindings/swig/src/auditswig.i b/bindings/swig/src/auditswig.i 22 + index 21aafca31..9a2c5661d 100644 23 + --- a/bindings/swig/src/auditswig.i 24 + +++ b/bindings/swig/src/auditswig.i 25 + @@ -39,6 +39,10 @@ signed 26 + #define __attribute(X) /*nothing*/ 27 + typedef unsigned __u32; 28 + typedef unsigned uid_t; 29 + +/* Sidestep SWIG's limitation of handling c99 Flexible arrays by not: 30 + + * generating setters against them: https://github.com/swig/swig/issues/1699 31 + + */ 32 + +%ignore audit_rule_data::buf; 33 + %include "/usr/include/linux/audit.h" 34 + #define __extension__ /*nothing*/ 35 + %include <stdint.i>
+59 -45
pkgs/os-specific/linux/audit/default.nix
··· 1 - { 2 - lib, stdenv, buildPackages, fetchurl, fetchpatch, 3 - runCommand, 4 - autoreconfHook, 5 - autoconf, automake, libtool, bash, 6 - # Enabling python support while cross compiling would be possible, but 7 - # the configure script tries executing python to gather info instead of 8 - # relying on python3-config exclusively 9 - enablePython ? stdenv.hostPlatform == stdenv.buildPlatform, python3, swig, 10 - linuxHeaders ? stdenv.cc.libc.linuxHeaders 1 + { lib 2 + , stdenv 3 + , fetchurl 4 + , fetchpatch 5 + , autoreconfHook 6 + , bash 7 + , buildPackages 8 + , libtool 9 + , linuxHeaders 10 + , python3 11 + , swig 12 + 13 + # Enabling python support while cross compiling would be possible, but the 14 + # configure script tries executing python to gather info instead of relying on 15 + # python3-config exclusively 16 + , enablePython ? stdenv.hostPlatform == stdenv.buildPlatform, 11 17 }: 12 18 13 - stdenv.mkDerivation rec { 19 + stdenv.mkDerivation (finalAttrs: { 14 20 pname = "audit"; 15 - version = "3.1"; 21 + version = "3.1.1"; 16 22 17 23 src = fetchurl { 18 - url = "https://people.redhat.com/sgrubb/audit/audit-${version}.tar.gz"; 19 - sha256 = "sha256-tc882rsnhsCLHeNZmjsaVH5V96n5wesgePW0TPROg3g="; 24 + url = "https://people.redhat.com/sgrubb/audit/audit-${finalAttrs.version}.tar.gz"; 25 + hash = "sha256-RuRrN2I8zgnm7hNOeNZor8NPThyHDIU+8S5BkweM/oc="; 20 26 }; 21 27 22 - outputs = [ "bin" "dev" "out" "man" ]; 23 - 24 - strictDeps = true; 25 - depsBuildBuild = [ buildPackages.stdenv.cc ]; 26 - nativeBuildInputs = [ autoreconfHook ] 27 - ++ lib.optionals enablePython [ python3 swig ]; 28 - buildInputs = [ bash ]; 29 - 30 - configureFlags = [ 31 - # z/OS plugin is not useful on Linux, 32 - # and pulls in an extra openldap dependency otherwise 33 - "--disable-zos-remote" 34 - (if enablePython then "--with-python" else "--without-python") 35 - "--with-arm" 36 - "--with-aarch64" 37 - ]; 38 - 39 - enableParallelBuilding = true; 40 28 patches = [ 41 - ./fix-static.patch 42 - 43 - # Fix pending upstream inclusion for linux-headers-5.17 support: 44 - # https://github.com/linux-audit/audit-userspace/pull/253 45 - (fetchpatch { 46 - name = "ignore-flexible-array.patch"; 47 - url = "https://github.com/linux-audit/audit-userspace/commit/beed138222421a2eb4212d83cb889404bd7efc49.patch"; 48 - sha256 = "1hf02zaxv6x0wmn4ca9fj48y2shks7vfna43i1zz58xw9jq7sza0"; 49 - }) 29 + ./000-fix-static-attribute-malloc.diff 30 + ./001-ignore-flexible-array.patch 50 31 ]; 51 32 52 33 postPatch = '' ··· 36 55 --replace "/usr/include/linux/audit.h" \ 37 56 "${linuxHeaders}/include/linux/audit.h" 38 57 ''; 58 + 59 + outputs = [ "bin" "dev" "out" "man" ]; 60 + 61 + strictDeps = true; 62 + 63 + depsBuildBuild = [ 64 + buildPackages.stdenv.cc 65 + ]; 66 + 67 + nativeBuildInputs = [ 68 + autoreconfHook 69 + ] 70 + ++ lib.optionals enablePython [ 71 + python3 72 + swig 73 + ]; 74 + 75 + buildInputs = [ 76 + bash 77 + ]; 78 + 79 + configureFlags = [ 80 + # z/OS plugin is not useful on Linux, and pulls in an extra openldap 81 + # dependency otherwise 82 + "--disable-zos-remote" 83 + "--with-arm" 84 + "--with-aarch64" 85 + (if enablePython then "--with-python" else "--without-python") 86 + ]; 87 + 88 + enableParallelBuilding = true; 89 + 39 90 meta = { 40 - description = "Audit Library"; 41 91 homepage = "https://people.redhat.com/sgrubb/audit/"; 42 - license = lib.licenses.gpl2; 92 + description = "Audit Library"; 93 + changelog = "https://github.com/linux-audit/audit-userspace/releases/tag/v${finalAttrs.version}"; 94 + license = lib.licenses.gpl2Plus; 95 + maintainers = with lib.maintainers; [ AndersonTorres ]; 43 96 platforms = lib.platforms.linux; 44 - maintainers = with lib.maintainers; [ ]; 45 97 }; 46 - } 98 + })
pkgs/os-specific/linux/audit/fix-static.patch pkgs/os-specific/linux/audit/000-fix-static-attribute-malloc.diff
+2 -2
pkgs/os-specific/linux/kernel-headers/default.nix
··· 111 111 in { 112 112 inherit makeLinuxHeaders; 113 113 114 - linuxHeaders = let version = "6.2"; in 114 + linuxHeaders = let version = "6.3"; in 115 115 makeLinuxHeaders { 116 116 inherit version; 117 117 src = fetchurl { 118 118 url = "mirror://kernel/linux/kernel/v${lib.versions.major version}.x/linux-${version}.tar.xz"; 119 - hash = "sha256-dIYvqKtA7a6FuzOFwLcf4QMoi85RhSbWMZeACzy97LE="; 119 + hash = "sha256-ujSR9e1r0nCjcMRAQ049aQhfzdUoki+gHnPXZX23Ox4="; 120 120 }; 121 121 patches = [ 122 122 ./no-relocs.patch # for building x86 kernel headers on non-ELF platforms
+4 -5
pkgs/os-specific/linux/kernel/generic.nix
··· 47 47 # symbolic name and `patch' is the actual patch. The patch may 48 48 # optionally be compressed with gzip or bzip2. 49 49 kernelPatches ? [] 50 - , ignoreConfigErrors ? stdenv.hostPlatform.linux-kernel.name != "pc" 50 + , ignoreConfigErrors ? stdenv.hostPlatform.linux-kernel.name or "" != "pc" 51 51 , extraMeta ? {} 52 52 53 53 , isZen ? false ··· 55 55 , isHardened ? false 56 56 57 57 # easy overrides to stdenv.hostPlatform.linux-kernel members 58 - , autoModules ? stdenv.hostPlatform.linux-kernel.autoModules 58 + , autoModules ? stdenv.hostPlatform.linux-kernel.autoModules or true 59 59 , preferBuiltin ? stdenv.hostPlatform.linux-kernel.preferBuiltin or false 60 60 , kernelArch ? stdenv.hostPlatform.linuxArch 61 61 , kernelTests ? [] ··· 128 128 ++ lib.optionals (lib.versionAtLeast version "4.16") [ bison flex ] 129 129 ++ lib.optional (lib.versionAtLeast version "5.2") pahole; 130 130 131 - platformName = stdenv.hostPlatform.linux-kernel.name; 132 131 # e.g. "defconfig" 133 - kernelBaseConfig = if defconfig != null then defconfig else stdenv.hostPlatform.linux-kernel.baseConfig; 132 + kernelBaseConfig = if defconfig != null then defconfig else stdenv.hostPlatform.linux-kernel.baseConfig or "defconfig"; 134 133 # e.g. "bzImage" 135 - kernelTarget = stdenv.hostPlatform.linux-kernel.target; 134 + kernelTarget = stdenv.hostPlatform.linux-kernel.target or "vmlinux"; 136 135 137 136 makeFlags = lib.optionals (stdenv.hostPlatform.linux-kernel ? makeFlags) stdenv.hostPlatform.linux-kernel.makeFlags 138 137 ++ extraMakeFlags;
+14 -12
pkgs/os-specific/linux/kernel/manual-config.nix
··· 1 1 { lib, stdenv, buildPackages, runCommand, nettools, bc, bison, flex, perl, rsync, gmp, libmpc, mpfr, openssl 2 - , libelf, cpio, elfutils, zstd, python3Minimal, zlib, pahole 2 + , libelf, cpio, elfutils, zstd, python3Minimal, zlib, pahole, ubootTools 3 3 , fetchpatch 4 4 }: 5 5 ··· 87 87 88 88 isModular = config.isYes "MODULES"; 89 89 90 - kernelConf = stdenv.hostPlatform.linux-kernel; 90 + kernelConf = stdenv.hostPlatform.linux-kernel; 91 + target = kernelConf.target or "vmlinux"; 91 92 92 93 buildDTBs = kernelConf.DTB or false; 93 94 in ··· 101 100 inherit version src; 102 101 103 102 depsBuildBuild = [ buildPackages.stdenv.cc ]; 104 - nativeBuildInputs = [ perl bc nettools openssl rsync gmp libmpc mpfr zstd python3Minimal ] 105 - ++ optional (kernelConf.target == "uImage") buildPackages.ubootTools 106 - ++ optional (lib.versionOlder version "5.8") libelf 107 - ++ optionals (lib.versionAtLeast version "4.16") [ bison flex ] 108 - ++ optionals (lib.versionAtLeast version "5.2") [ cpio pahole zlib ] 109 - ++ optional (lib.versionAtLeast version "5.8") elfutils 110 - ; 103 + nativeBuildInputs = [ 104 + bc gmp libmpc mpfr nettools openssl perl python3Minimal rsync ubootTools 105 + zstd 106 + ] ++ optional (lib.versionOlder version "5.8") libelf 107 + ++ optionals (lib.versionAtLeast version "4.16") [ bison flex ] 108 + ++ optionals (lib.versionAtLeast version "5.2") [ cpio pahole zlib ] 109 + ++ optional (lib.versionAtLeast version "5.8") elfutils; 111 110 112 111 patches = 113 112 map (p: p.patch) kernelPatches ··· 180 179 configurePhase = '' 181 180 runHook preConfigure 182 181 183 - export buildRoot=$(mktemp -d) 182 + export buildRoot=$TMPDIR/kernel-buildroot 183 + mkdir -p $buildRoot 184 184 185 185 echo "manual-config configurePhase buildRoot=$buildRoot pwd=$PWD" 186 186 ··· 298 296 # Some image types need special install targets (e.g. uImage is installed with make uinstall) 299 297 installTargets = [ 300 298 (kernelConf.installTarget or ( 301 - /**/ if kernelConf.target == "uImage" then "uinstall" 302 - else if kernelConf.target == "zImage" || kernelConf.target == "Image.gz" then "zinstall" 299 + /**/ if target == "uImage" then "uinstall" 300 + else if target == "zImage" || target == "Image.gz" then "zinstall" 303 301 else "install")) 304 302 ]; 305 303
+2 -2
pkgs/os-specific/linux/libcap/default.nix
··· 7 7 8 8 stdenv.mkDerivation rec { 9 9 pname = "libcap"; 10 - version = "2.68"; 10 + version = "2.69"; 11 11 12 12 src = fetchurl { 13 13 url = "mirror://kernel/linux/libs/security/linux-privs/libcap2/${pname}-${version}.tar.xz"; 14 - sha256 = "sha256-kL47bUG+X4GuSwPsdgErDSfIKSk2hPbAW2XV+cznJLI="; 14 + sha256 = "sha256-8xH489rYRpnQVm0db37JQ6kpiyj3FMrjyTHf1XSS1+s="; 15 15 }; 16 16 17 17 outputs = [ "out" "dev" "lib" "man" "doc" ]
+13 -8
pkgs/os-specific/linux/util-linux/default.nix
··· 1 1 { lib, stdenv, fetchurl, pkg-config, zlib, shadow 2 - , capabilitiesSupport ? true 2 + , capabilitiesSupport ? stdenv.isLinux 3 3 , libcap_ng 4 4 , libxcrypt 5 5 , ncursesSupport ? true ··· 12 12 , translateManpages ? true 13 13 , po4a 14 14 , installShellFiles 15 + , writeSupport ? stdenv.isLinux 16 + , shadowSupport ? stdenv.isLinux 17 + , memstreamHook 15 18 }: 16 19 17 20 stdenv.mkDerivation rec { 18 21 pname = "util-linux" + lib.optionalString (!nlsSupport && !ncursesSupport && !systemdSupport) "-minimal"; 19 - version = "2.38.1"; 22 + version = "2.39"; 20 23 21 24 src = fetchurl { 22 25 url = "mirror://kernel/linux/utils/util-linux/v${lib.versions.majorMinor version}/util-linux-${version}.tar.xz"; 23 - hash = "sha256-YEkqGbRObPmj3f9oMlszO4tStsWc4+vWoOyqTFEX6E8="; 26 + hash = "sha256-MrMKM2zakDGC7WH+s+m5CLdipeZv4U5D77iNNxYgdcs="; 24 27 }; 25 28 26 29 patches = [ ··· 36 33 postPatch = '' 37 34 patchShebangs tests/run.sh 38 35 39 - substituteInPlace include/pathnames.h \ 40 - --replace "/bin/login" "${shadow}/bin/login" 41 36 substituteInPlace sys-utils/eject.c \ 42 37 --replace "/bin/umount" "$bin/bin/umount" 38 + '' + lib.optionalString shadowSupport '' 39 + substituteInPlace include/pathnames.h \ 40 + --replace "/bin/login" "${shadow}/bin/login" 43 41 ''; 44 42 45 43 # !!! It would be better to obtain the path to the mount helpers ··· 49 45 # root... 50 46 configureFlags = [ 51 47 "--localstatedir=/var" 52 - "--enable-write" 53 48 "--disable-use-tty-group" 54 49 "--enable-fs-paths-default=/run/wrappers/bin:/run/current-system/sw/bin:/sbin" 55 50 "--disable-makeinstall-setuid" "--disable-makeinstall-chown" 56 51 "--disable-su" # provided by shadow 52 + (lib.enableFeature writeSupport "write") 57 53 (lib.enableFeature nlsSupport "nls") 58 54 (lib.withFeature ncursesSupport "ncursesw") 59 55 (lib.withFeature systemdSupport "systemd") ··· 78 74 ++ lib.optionals pamSupport [ pam ] 79 75 ++ lib.optionals capabilitiesSupport [ libcap_ng ] 80 76 ++ lib.optionals ncursesSupport [ ncurses ] 81 - ++ lib.optionals systemdSupport [ systemd ]; 77 + ++ lib.optionals systemdSupport [ systemd ] 78 + ++ lib.optionals (stdenv.system == "x86_64-darwin") [ memstreamHook ]; 82 79 83 80 doCheck = false; # "For development purpose only. Don't execute on production system!" 84 81 ··· 95 90 changelog = "https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v${lib.versions.majorMinor version}/v${version}-ReleaseNotes"; 96 91 # https://git.kernel.org/pub/scm/utils/util-linux/util-linux.git/tree/README.licensing 97 92 license = with licenses; [ gpl2Only gpl2Plus gpl3Plus lgpl21Plus bsd3 bsdOriginalUC publicDomain ]; 98 - platforms = platforms.linux; 93 + platforms = platforms.unix; 99 94 priority = 6; # lower priority than coreutils ("kill") and shadow ("login" etc.) packages 100 95 }; 101 96 }
+2 -2
pkgs/os-specific/linux/v4l-utils/default.nix
··· 12 12 # we need to use stdenv.mkDerivation in order not to pollute the libv4l’s closure with Qt 13 13 in stdenv.mkDerivation rec { 14 14 pname = "v4l-utils"; 15 - version = "1.22.1"; 15 + version = "1.24.1"; 16 16 17 17 src = fetchurl { 18 18 url = "https://linuxtv.org/downloads/${pname}/${pname}-${version}.tar.bz2"; 19 - hash = "sha256-Zcb76DCkTKEFxEOwJxgsGyyQU6kdHnKthJ36s4i5TjE="; 19 + hash = "sha256-y7f+imMH9c5TOgXN7XC7k8O6BjlaubbQB+tTt12AX1s="; 20 20 }; 21 21 22 22 outputs = [ "out" ] ++ lib.optional withUtils "lib" ++ [ "dev" ];
+1 -1
pkgs/servers/computing/slurm/default.nix
··· 67 67 "--with-jwt=${libjwt}" 68 68 "--with-lz4=${lz4.dev}" 69 69 "--with-munge=${munge}" 70 - "--with-yaml=${libyaml}" 70 + "--with-yaml=${libyaml.dev}" 71 71 "--with-ofed=${rdma-core}" 72 72 "--sysconfdir=/etc/slurm" 73 73 "--with-pmix=${pmix}"
+7 -5
pkgs/stdenv/darwin/default.nix
··· 487 487 nghttp2.lib 488 488 coreutils 489 489 gnugrep 490 - pcre.out 490 + gnugrep.pcre2.out 491 491 gmp 492 492 libiconv 493 493 brotli.lib ··· 563 563 nghttp2.lib 564 564 coreutils 565 565 gnugrep 566 - pcre.out 566 + gnugrep.pcre2.out 567 567 gmp 568 568 libiconv 569 569 brotli.lib ··· 587 587 persistent = self: super: with prevStage; { 588 588 inherit 589 589 gnumake gzip gnused bzip2 ed xz patch bash python3 590 - ncurses libffi zlib gmp pcre gnugrep cmake 590 + ncurses libffi zlib gmp gnugrep cmake 591 591 coreutils findutils diffutils patchutils ninja libxml2; 592 + inherit (gnugrep) pcre2; 592 593 593 594 # Hack to make sure we don't link ncurses in bootstrap tools. The proper 594 595 # solution is to avoid passing -L/nix-store/...-bootstrap-tools/lib, ··· 644 643 persistent = self: super: with prevStage; { 645 644 inherit 646 645 gnumake gzip gnused bzip2 gawk ed xz patch bash 647 - ncurses libffi zlib gmp pcre gnugrep 646 + ncurses libffi zlib gmp gnugrep 648 647 coreutils findutils diffutils patchutils pbzx; 648 + inherit (gnugrep) pcre2; 649 649 650 650 darwin = super.darwin.overrideScope (_: _: { 651 651 inherit (darwin) dyld ICU Libsystem Csu libiconv rewrite-tbd; ··· 736 734 gawk 737 735 gnugrep 738 736 patch 739 - pcre.out 737 + gnugrep.pcre2.out 740 738 gettext 741 739 binutils.bintools 742 740 binutils.bintools.lib
+2 -2
pkgs/stdenv/darwin/make-bootstrap-tools.nix
··· 54 54 chmod -R u+w $out/include 55 55 cp -rL ${darwin.ICU}/include* $out/include 56 56 cp -rL ${libiconv}/include/* $out/include 57 - cp -rL ${lib.getDev gnugrep.pcre}/include/* $out/include 57 + cp -rL ${lib.getDev gnugrep.pcre2}/include/* $out/include 58 58 mv $out/include $out/include-Libsystem 59 59 60 60 # Copy coreutils, bash, etc. ··· 86 86 cp -d ${libssh2.out}/lib/libssh*.dylib $out/lib 87 87 cp -d ${lib.getLib openssl}/lib/*.dylib $out/lib 88 88 89 - cp -d ${gnugrep.pcre.out}/lib/libpcre*.dylib $out/lib 89 + cp -d ${gnugrep.pcre2.out}/lib/libpcre2*.dylib $out/lib 90 90 cp -d ${lib.getLib libiconv}/lib/lib*.dylib $out/lib 91 91 cp -d ${lib.getLib gettext}/lib/libintl*.dylib $out/lib 92 92 chmod +x $out/lib/libintl*.dylib
-6
pkgs/stdenv/generic/setup.sh
··· 311 311 _addRpathPrefix() { 312 312 if [ "${NIX_NO_SELF_RPATH:-0}" != 1 ]; then 313 313 export NIX_LDFLAGS="-rpath $1/lib ${NIX_LDFLAGS-}" 314 - if [ -n "${NIX_LIB64_IN_SELF_RPATH:-}" ]; then 315 - export NIX_LDFLAGS="-rpath $1/lib64 ${NIX_LDFLAGS-}" 316 - fi 317 - if [ -n "${NIX_LIB32_IN_SELF_RPATH:-}" ]; then 318 - export NIX_LDFLAGS="-rpath $1/lib32 ${NIX_LDFLAGS-}" 319 - fi 320 314 fi 321 315 } 322 316
+3 -4
pkgs/stdenv/linux/default.nix
··· 127 127 '' 128 128 export NIX_ENFORCE_PURITY="''${NIX_ENFORCE_PURITY-1}" 129 129 export NIX_ENFORCE_NO_NATIVE="''${NIX_ENFORCE_NO_NATIVE-1}" 130 - ${lib.optionalString (system == "x86_64-linux") "NIX_LIB64_IN_SELF_RPATH=1"} 131 - ${lib.optionalString (system == "mipsel-linux") "NIX_LIB32_IN_SELF_RPATH=1"} 132 130 ''; 133 131 134 132 ··· 637 639 ] 638 640 # Library dependencies 639 641 ++ map getLib ( 640 - [ attr acl zlib pcre libidn2 libunistring ] 642 + [ attr acl zlib gnugrep.pcre2 libidn2 libunistring ] 641 643 ++ lib.optional (gawk.libsigsegv != null) gawk.libsigsegv 642 644 ) 643 645 # More complicated cases ··· 656 658 inherit (prevStage) 657 659 gzip bzip2 xz bash coreutils diffutils findutils gawk 658 660 gnused gnutar gnugrep gnupatch patchelf 659 - attr acl zlib pcre libunistring; 661 + attr acl zlib libunistring; 662 + inherit (prevStage.gnugrep) pcre2; 660 663 ${localSystem.libc} = getLibc prevStage; 661 664 662 665 # Hack: avoid libidn2.{bin,dev} referencing bootstrap tools. There's a logical cycle.
+1 -1
pkgs/stdenv/linux/make-bootstrap-tools.nix
··· 130 130 cp -d ${patch}/bin/* $out/bin 131 131 cp ${patchelf}/bin/* $out/bin 132 132 133 - cp -d ${gnugrep.pcre.out}/lib/libpcre*.so* $out/lib # needed by grep 133 + cp -d ${gnugrep.pcre2.out}/lib/libpcre2*.so* $out/lib # needed by grep 134 134 135 135 # Copy what we need of GCC. 136 136 cp -d ${bootGCC.out}/bin/gcc $out/bin
+3 -3
pkgs/tools/X11/xdg-utils/default.nix
··· 22 22 23 23 stdenv.mkDerivation rec { 24 24 pname = "xdg-utils"; 25 - version = "unstable-2020-10-21"; 25 + version = "unstable-2022-11-06"; 26 26 27 27 src = fetchFromGitLab { 28 28 domain = "gitlab.freedesktop.org"; 29 29 owner = "xdg"; 30 30 repo = "xdg-utils"; 31 - rev = "d11b33ec7f24cfb1546f6b459611d440013bdc72"; 32 - sha256 = "sha256-8PtXfI8hRneEpnUvIV3M+6ACjlkx0w/NEiJFdGbbHnQ="; 31 + rev = "8ae02631a9806da11b34cd6b274af02d28aee5da"; 32 + sha256 = "sha256-WdnnAiPYbREny633FnBi5tD9hDuF8NCVVbUaAVIKTxM="; 33 33 }; 34 34 35 35 patches = lib.optionals withXdgOpenUsePortalPatch [
+2 -2
pkgs/tools/filesystems/e2fsprogs/default.nix
··· 6 6 7 7 stdenv.mkDerivation rec { 8 8 pname = "e2fsprogs"; 9 - version = "1.46.6"; 9 + version = "1.47.0"; 10 10 11 11 src = fetchurl { 12 12 url = "mirror://sourceforge/${pname}/${pname}-${version}.tar.gz"; 13 - hash = "sha256-vy/MfuUXj+c6MFf34qo/5S6Yt7tGFQnGewIboA+Uxvc="; 13 + hash = "sha256-Zmev3lbu8MavJmhJdEAOTSKI6knpRBv15iKRldUaNXg="; 14 14 }; 15 15 16 16 # fuse2fs adds 14mb of dependencies
+3 -2
pkgs/tools/inputmethods/m17n-db/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "m17n-db"; 5 - version = "1.8.0"; 5 + version = "1.8.2"; 6 6 7 7 src = fetchurl { 8 8 url = "https://download.savannah.gnu.org/releases/m17n/m17n-db-${version}.tar.gz"; 9 - sha256 = "0vfw7z9i2s9np6nmx1d4dlsywm044rkaqarn7akffmb6bf1j6zv5"; 9 + sha256 = "sha256-vHR+J9ct9YoH9DG3JdeuQJIyLbxGEUykBTgoIbK6XGk="; 10 10 }; 11 11 12 12 nativeBuildInputs = [ gettext ]; ··· 20 20 meta = { 21 21 homepage = "https://www.nongnu.org/m17n/"; 22 22 description = "Multilingual text processing library (database)"; 23 + changelog = "https://git.savannah.nongnu.org/cgit/m17n/m17n-db.git/plain/NEWS?h=REL-${lib.replaceStrings [ "." ] [ "-" ] version}"; 23 24 license = lib.licenses.lgpl21Plus; 24 25 platforms = lib.platforms.linux; 25 26 maintainers = with lib.maintainers; [ astsmtl ];
+10 -14
pkgs/tools/inputmethods/m17n-lib/default.nix
··· 1 - { lib, stdenv, fetchurl, fetchpatch, m17n_db, autoreconfHook, pkg-config }: 1 + { lib 2 + , stdenv 3 + , fetchurl 4 + , fetchpatch 5 + , m17n_db 6 + , autoreconfHook 7 + , pkg-config 8 + }: 2 9 stdenv.mkDerivation rec { 3 10 pname = "m17n-lib"; 4 - version = "1.8.0"; 11 + version = "1.8.2"; 5 12 6 13 src = fetchurl { 7 14 url = "https://download.savannah.gnu.org/releases/m17n/m17n-lib-${version}.tar.gz"; 8 - sha256 = "0jp61y09xqj10mclpip48qlfhniw8gwy8b28cbzxy8hq8pkwmfkq"; 15 + hash = "sha256-5bA0SvnxFdlJV6P5ud68T45nG2n4wf1eC2iKeU16J/I="; 9 16 }; 10 - 11 - patches = [ 12 - (fetchpatch { 13 - # Patch pending upstream inclusion: 14 - # https://savannah.nongnu.org/bugs/index.php?61377 15 - name = "parallel-build.patch"; 16 - url = "https://savannah.nongnu.org/bugs/download.php?file_id=53704"; 17 - hash = "sha256-1smKSIFVRJZSwCv0NiUsnndxKcPnJ/wqzH8+ka6nfNM="; 18 - excludes = [ "src/ChangeLog" ]; 19 - }) 20 - ]; 21 17 22 18 strictDeps = true; 23 19
+2 -2
pkgs/tools/networking/curl/default.nix
··· 47 47 48 48 stdenv.mkDerivation (finalAttrs: { 49 49 pname = "curl"; 50 - version = "8.0.1"; 50 + version = "8.1.1"; 51 51 52 52 src = fetchurl { 53 53 urls = [ 54 54 "https://curl.haxx.se/download/curl-${finalAttrs.version}.tar.bz2" 55 55 "https://github.com/curl/curl/releases/download/curl-${finalAttrs.version}/curl-${finalAttrs.version}.tar.bz2" 56 56 ]; 57 - hash = "sha256-m2selrdI0EuWh4a2vfQHqlx1q1Oj03wcjIHNtzZVXM8="; 57 + hash = "sha256-UdKvcieZE7XUyrH+Hzi5RM9wkEyIvuJGtb1XWETnA1o="; 58 58 }; 59 59 60 60 patches = [
+2 -2
pkgs/tools/system/pciutils/default.nix
··· 7 7 8 8 stdenv.mkDerivation rec { 9 9 pname = "pciutils"; 10 - version = "3.9.0"; # with release-date database 10 + version = "3.10.0"; # with release-date database 11 11 12 12 src = fetchurl { 13 13 url = "mirror://kernel/software/utils/pciutils/pciutils-${version}.tar.xz"; 14 - sha256 = "sha256-zep66XI53uIySaCcaKGaKHo/EJ++ssIy67YWyzhZkBI="; 14 + sha256 = "sha256-I4ouJxZnMOU6F/4Hv60ingf6ObYYEX5ZRLbX7an7sOk="; 15 15 }; 16 16 17 17 nativeBuildInputs = [ pkg-config ];
+14 -13
pkgs/tools/text/gnugrep/default.nix
··· 1 - { lib, stdenv, fetchurl, pcre, libiconv, perl, autoreconfHook }: 1 + { lib, stdenv, glibcLocales, fetchurl, pcre2, libiconv, perl, autoreconfHook }: 2 2 3 3 # Note: this package is used for bootstrapping fetchurl, and thus 4 4 # cannot use fetchpatch! All mutable patches (generated by GitHub or 5 5 # cgit) that are needed here should be included directly in Nixpkgs as 6 6 # files. 7 7 8 - let version = "3.7"; in 8 + let version = "3.11"; in 9 9 10 10 stdenv.mkDerivation { 11 11 pname = "gnugrep"; ··· 13 13 14 14 src = fetchurl { 15 15 url = "mirror://gnu/grep/grep-${version}.tar.xz"; 16 - sha256 = "0g42svbc1nq5bamxfj6x7320wli4dlj86padk0hwgbk04hqxl42w"; 16 + hash = "sha256-HbKu3eidDepCsW2VKPiUyNFdrk4ZC1muzHj1qVEnbqs="; 17 17 }; 18 18 19 - # https://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=b50c6442e43d79471a31a2a202d3e50c0557446f 20 - patches = lib.optional stdenv.hostPlatform.isLoongArch64 ./sigsegv-loongarch.patch; 19 + # Some gnulib tests fail on Musl: https://github.com/NixOS/nixpkgs/pull/228714 20 + postPatch = if stdenv.hostPlatform.isMusl then '' 21 + sed -i 's:gnulib-tests::g' Makefile.in 22 + '' else null; 21 23 22 - # Perl is needed for testing 23 - nativeBuildInputs = [ perl ] ++ lib.optional stdenv.hostPlatform.isLoongArch64 autoreconfHook; 24 + nativeCheckInputs = [ perl glibcLocales ]; 24 25 outputs = [ "out" "info" ]; # the man pages are rather small 25 26 26 - buildInputs = [ pcre libiconv ]; 27 + buildInputs = [ pcre2 libiconv ]; 27 28 28 29 # cygwin: FAIL: multibyte-white-space 29 30 # freebsd: FAIL mb-non-UTF8-performance 30 - # all platforms: timing sensitivity in long-pattern-perf 31 - #doCheck = !stdenv.isDarwin && !stdenv.isSunOS && !stdenv.isCygwin && !stdenv.isFreeBSD; 32 - doCheck = false; 31 + doCheck = !stdenv.isCygwin && !stdenv.isFreeBSD; 33 32 34 33 # On macOS, force use of mkdir -p, since Grep's fallback 35 34 # (./install-sh) is broken. ··· 61 62 license = licenses.gpl3Plus; 62 63 63 64 maintainers = [ 64 - maintainers.eelco 65 + maintainers.das_j 65 66 maintainers.m00wl 66 67 ]; 67 68 platforms = platforms.all; 68 69 mainProgram = "grep"; 69 70 }; 70 71 71 - passthru = {inherit pcre;}; 72 + passthru = { 73 + inherit pcre2; 74 + }; 72 75 }
-31
pkgs/tools/text/gnugrep/sigsegv-loongarch.patch
··· 1 - From b50c6442e43d79471a31a2a202d3e50c0557446f Mon Sep 17 00:00:00 2001 2 - From: Sun Haiyong <youbest@sina.com> 3 - Date: Sat, 4 Sep 2021 15:06:43 +0200 4 - Subject: sigsegv: Improve cross-compilation support for LoongArch CPU. 5 - 6 - * m4/stack-direction.m4 (SV_STACK_DIRECTION): Assume the stack grows 7 - down on LoongArch. 8 - --- 9 - m4/stack-direction.m4 | 3 ++- 10 - 1 file changed, 2 insertions(+), 1 deletion(-) 11 - 12 - diff --git a/m4/stack-direction.m4 b/m4/stack-direction.m4 13 - index 9328725..e682be9 100644 14 - --- a/m4/stack-direction.m4 15 - +++ b/m4/stack-direction.m4 16 - @@ -1,4 +1,4 @@ 17 - -# stack-direction.m4 serial 7 18 - +# stack-direction.m4 serial 8 19 - dnl Copyright (C) 2002-2021 Free Software Foundation, Inc. 20 - dnl This file is free software, distributed under the terms of the GNU 21 - dnl General Public License. As a special exception to the GNU General 22 - @@ -32,6 +32,7 @@ AC_DEFUN([SV_STACK_DIRECTION], 23 - i?86 | x86_64 | \ 24 - i860 | \ 25 - ia64 | \ 26 - + loongarch* | \ 27 - m32r | \ 28 - m68* | \ 29 - m88k | \ 30 - -- 31 - cgit v1.1
+3 -3
pkgs/tools/video/rav1e/default.nix
··· 35 35 36 36 in rustPlatform.buildRustPackage rec { 37 37 pname = "rav1e"; 38 - version = "0.6.4"; 38 + version = "0.6.6"; 39 39 40 40 src = fetchCrate { 41 41 inherit pname version; 42 - sha256 = "sha256-G7o82MAZmMOfs1wp3AVUgXxDW6Txuc0qTm5boRpXF6g="; 42 + sha256 = "sha256-urYMT1sJUMBj1L/2Hi+hcYbWbi0ScSls0pm9gLj9H3o="; 43 43 }; 44 44 45 - cargoHash = "sha256-12bePpI8z35gzCHGKDpaGUVvosQqijP60NCgElHDsyw="; 45 + cargoHash = "sha256-qQfEpynhlIEKU1Ptq/jM1Wdtn+BVCZT1lmou2S1GL4I="; 46 46 47 47 depsBuildBuild = [ pkg-config ]; 48 48
+2 -2
pkgs/tools/video/svt-av1/default.nix
··· 8 8 9 9 stdenv.mkDerivation (finalAttrs: { 10 10 pname = "svt-av1"; 11 - version = "1.4.1"; 11 + version = "1.5.0"; 12 12 13 13 src = fetchFromGitLab { 14 14 owner = "AOMediaCodec"; 15 15 repo = "SVT-AV1"; 16 16 rev = "v${finalAttrs.version}"; 17 - sha256 = "sha256-jmr5egbuqLnBW7OFuaQk3F4s5xqTpXhWcJAfZySGWeU="; 17 + sha256 = "sha256-EBWtvHOcFa6co0NeYns7Wkhz3LhqWJIRjBWfCrWJyss="; 18 18 }; 19 19 20 20 nativeBuildInputs = [
+4 -7
pkgs/top-level/all-packages.nix
··· 21646 21646 21647 21647 libcint = callPackage ../development/libraries/libcint { }; 21648 21648 21649 - libclc = callPackage ../development/libraries/libclc { 21650 - llvmPackages = llvmPackages_14; 21651 - }; 21649 + libclc = callPackage ../development/libraries/libclc { }; 21652 21650 21653 21651 libcli = callPackage ../development/libraries/libcli { }; 21654 21652 ··· 27907 27909 27908 27910 usermount = callPackage ../os-specific/linux/usermount { }; 27909 27911 27910 - util-linux = if stdenv.isLinux then callPackage ../os-specific/linux/util-linux { } 27911 - else unixtools.util-linux; 27912 + util-linux = callPackage ../os-specific/linux/util-linux { }; 27912 27913 27913 - util-linuxMinimal = if stdenv.isLinux then util-linux.override { 27914 + util-linuxMinimal = util-linux.override { 27914 27915 nlsSupport = false; 27915 27916 ncursesSupport = false; 27916 27917 systemdSupport = false; 27917 27918 translateManpages = false; 27918 - } else util-linux; 27919 + }; 27919 27920 27920 27921 v4l-utils = qt5.callPackage ../os-specific/linux/v4l-utils { }; 27921 27922
+1 -1
pkgs/top-level/perl-packages.nix
··· 25928 25928 buildInputs = lib.optionals (!stdenv.isDarwin) [ pkgs.glibcLocales ]; 25929 25929 propagatedBuildInputs = [ TextCharWidth ]; 25930 25930 preConfigure = '' 25931 - substituteInPlace WrapI18N.pm --replace '/usr/bin/locale' '${if stdenv.isDarwin then pkgs.darwin.adv_cmds else pkgs.glibc.bin}/bin/locale' 25931 + substituteInPlace WrapI18N.pm --replace '/usr/bin/locale' '${pkgs.unixtools.locale}/bin/locale' 25932 25932 ''; 25933 25933 meta = { 25934 25934 description = "Line wrapping module with support for multibyte, fullwidth, and combining characters and languages without whitespaces between words";
+2 -2
pkgs/top-level/unixtools.nix
··· 61 61 }; 62 62 column = { 63 63 linux = pkgs.util-linux; 64 - darwin = pkgs.netbsd.column; 64 + darwin = pkgs.darwin.text_cmds; 65 65 }; 66 66 eject = { 67 67 linux = pkgs.util-linux; ··· 106 106 }; 107 107 locale = { 108 108 linux = pkgs.glibc; 109 - darwin = pkgs.netbsd.locale; 109 + darwin = pkgs.darwin.adv_cmds; 110 110 }; 111 111 logger = { 112 112 linux = pkgs.util-linux;