nixpkgs mirror (for testing) github.com/NixOS/nixpkgs
nix

Merge pull request #81167 from NixOS/staging-next

Staging next

authored by

Frederik Rietdijk and committed by
GitHub
33133b26 1b92a08a

+439 -156
+3 -3
pkgs/applications/editors/ed/default.nix
··· 3 3 4 4 stdenv.mkDerivation (rec { 5 5 name = "ed-${version}"; 6 - version = "1.15"; 6 + version = "1.16"; 7 7 8 8 src = fetchurl { 9 9 url = "mirror://gnu/ed/${name}.tar.lz"; 10 - sha256 = "0x6ivy5k0d7dy5z9g8q8nipr89m4qbk2ink2898qq43smp08ji5d"; 10 + sha256 = "0b4b1lwizvng9bvpcjnmpj2i80xz9xw2w8nfff27b2h4mca7mh6g"; 11 11 }; 12 12 13 13 nativeBuildInputs = [ lzip ]; ··· 30 30 31 31 license = stdenv.lib.licenses.gpl3Plus; 32 32 33 - homepage = https://www.gnu.org/software/ed/; 33 + homepage = "https://www.gnu.org/software/ed/"; 34 34 35 35 maintainers = [ ]; 36 36 platforms = stdenv.lib.platforms.unix;
-2
pkgs/applications/version-management/git-and-tools/git/default.nix
··· 139 139 # Install contrib stuff. 140 140 mkdir -p $out/share/git 141 141 cp -a contrib $out/share/git/ 142 - mkdir -p $out/share/emacs/site-lisp 143 - ln -s "$out/share/git/contrib/emacs/"*.el $out/share/emacs/site-lisp/ 144 142 mkdir -p $out/share/bash-completion/completions 145 143 ln -s $out/share/git/contrib/completion/git-completion.bash $out/share/bash-completion/completions/git 146 144 mkdir -p $out/etc/bash_completion.d
+2 -2
pkgs/desktops/gnome-3/core/gnome-desktop/default.nix
··· 4 4 5 5 stdenv.mkDerivation rec { 6 6 pname = "gnome-desktop"; 7 - version = "3.34.2"; 7 + version = "3.34.4"; 8 8 9 9 outputs = [ "out" "dev" "devdoc" ]; 10 10 11 11 src = fetchurl { 12 12 url = "mirror://gnome/sources/gnome-desktop/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; 13 - sha256 = "1v983xirwp1y6ggz97bh742ak6gff0hxb359dgn37nikjxhvm0a0"; 13 + sha256 = "1g0cvsx0gk65kfa91knkqg7l2isrnlpvqwjbzpr3a5f2girp4gn5"; 14 14 }; 15 15 16 16 nativeBuildInputs = [
+245
pkgs/development/compilers/go/1.14.nix
··· 1 + { stdenv, fetchurl, tzdata, iana-etc, runCommand 2 + , perl, which, pkgconfig, patch, procps, pcre, cacert, Security, Foundation 3 + , mailcap, runtimeShell 4 + , buildPackages, pkgsTargetTarget 5 + }: 6 + 7 + let 8 + 9 + inherit (stdenv.lib) optionals optionalString; 10 + 11 + goBootstrap = runCommand "go-bootstrap" {} '' 12 + mkdir $out 13 + cp -rf ${buildPackages.go_bootstrap}/* $out/ 14 + chmod -R u+w $out 15 + find $out -name "*.c" -delete 16 + cp -rf $out/bin/* $out/share/go/bin/ 17 + ''; 18 + 19 + goarch = platform: { 20 + "i686" = "386"; 21 + "x86_64" = "amd64"; 22 + "aarch64" = "arm64"; 23 + "arm" = "arm"; 24 + "armv5tel" = "arm"; 25 + "armv6l" = "arm"; 26 + "armv7l" = "arm"; 27 + }.${platform.parsed.cpu.name} or (throw "Unsupported system"); 28 + 29 + in 30 + 31 + stdenv.mkDerivation rec { 32 + pname = "go"; 33 + version = "1.14"; 34 + 35 + src = fetchurl { 36 + url = "https://dl.google.com/go/go${version}.src.tar.gz"; 37 + sha256 = "12a3nzj4k4p5ica447sjfva9pvvj84a03b4xlg3mhl2nmm33wr3d"; 38 + }; 39 + 40 + # perl is used for testing go vet 41 + nativeBuildInputs = [ perl which pkgconfig patch procps ]; 42 + buildInputs = [ cacert pcre ] 43 + ++ optionals stdenv.isLinux [ stdenv.cc.libc.out ] 44 + ++ optionals (stdenv.hostPlatform.libc == "glibc") [ stdenv.cc.libc.static ]; 45 + 46 + 47 + propagatedBuildInputs = optionals stdenv.isDarwin [ Security Foundation ]; 48 + 49 + hardeningDisable = [ "all" ]; 50 + 51 + prePatch = '' 52 + patchShebangs ./ # replace /bin/bash 53 + 54 + # This source produces shell script at run time, 55 + # and thus it is not corrected by patchShebangs. 56 + substituteInPlace misc/cgo/testcarchive/carchive_test.go \ 57 + --replace '#!/usr/bin/env bash' '#!${runtimeShell}' 58 + 59 + # Patch the mimetype database location which is missing on NixOS. 60 + # but also allow static binaries built with NixOS to run outside nix 61 + sed -i 's,\"/etc/mime.types,"${mailcap}/etc/mime.types\"\,\n\t&,' src/mime/type_unix.go 62 + 63 + # Disabling the 'os/http/net' tests (they want files not available in 64 + # chroot builds) 65 + rm src/net/{listen,parse}_test.go 66 + rm src/syscall/exec_linux_test.go 67 + 68 + # !!! substituteInPlace does not seems to be effective. 69 + # The os test wants to read files in an existing path. Just don't let it be /usr/bin. 70 + sed -i 's,/usr/bin,'"`pwd`", src/os/os_test.go 71 + sed -i 's,/bin/pwd,'"`type -P pwd`", src/os/os_test.go 72 + # Disable the unix socket test 73 + sed -i '/TestShutdownUnix/aif true \{ return\; \}' src/net/net_test.go 74 + # Disable the hostname test 75 + sed -i '/TestHostname/aif true \{ return\; \}' src/os/os_test.go 76 + # ParseInLocation fails the test 77 + sed -i '/TestParseInSydney/aif true \{ return\; \}' src/time/format_test.go 78 + # Remove the api check as it never worked 79 + sed -i '/src\/cmd\/api\/run.go/ireturn nil' src/cmd/dist/test.go 80 + # Remove the coverage test as we have removed this utility 81 + sed -i '/TestCoverageWithCgo/aif true \{ return\; \}' src/cmd/go/go_test.go 82 + # Remove the timezone naming test 83 + sed -i '/TestLoadFixed/aif true \{ return\; \}' src/time/time_test.go 84 + # Remove disable setgid test 85 + sed -i '/TestRespectSetgidDir/aif true \{ return\; \}' src/cmd/go/internal/work/build_test.go 86 + # Remove cert tests that conflict with NixOS's cert resolution 87 + sed -i '/TestEnvVars/aif true \{ return\; \}' src/crypto/x509/root_unix_test.go 88 + # TestWritevError hangs sometimes 89 + sed -i '/TestWritevError/aif true \{ return\; \}' src/net/writev_test.go 90 + # TestVariousDeadlines fails sometimes 91 + sed -i '/TestVariousDeadlines/aif true \{ return\; \}' src/net/timeout_test.go 92 + 93 + sed -i 's,/etc/protocols,${iana-etc}/etc/protocols,' src/net/lookup_unix.go 94 + sed -i 's,/etc/services,${iana-etc}/etc/services,' src/net/port_unix.go 95 + 96 + # Disable cgo lookup tests not works, they depend on resolver 97 + rm src/net/cgo_unix_test.go 98 + 99 + '' + optionalString stdenv.isLinux '' 100 + # prepend the nix path to the zoneinfo files but also leave the original value for static binaries 101 + # that run outside a nix server 102 + sed -i 's,\"/usr/share/zoneinfo/,"${tzdata}/share/zoneinfo/\"\,\n\t&,' src/time/zoneinfo_unix.go 103 + 104 + '' + optionalString stdenv.isAarch32 '' 105 + echo '#!${runtimeShell}' > misc/cgo/testplugin/test.bash 106 + '' + optionalString stdenv.isDarwin '' 107 + substituteInPlace src/race.bash --replace \ 108 + "sysctl machdep.cpu.extfeatures | grep -qv EM64T" true 109 + sed -i 's,strings.Contains(.*sysctl.*,true {,' src/cmd/dist/util.go 110 + sed -i 's,"/etc","'"$TMPDIR"'",' src/os/os_test.go 111 + sed -i 's,/_go_os_test,'"$TMPDIR"'/_go_os_test,' src/os/path_test.go 112 + 113 + sed -i '/TestChdirAndGetwd/aif true \{ return\; \}' src/os/os_test.go 114 + sed -i '/TestCredentialNoSetGroups/aif true \{ return\; \}' src/os/exec/exec_posix_test.go 115 + sed -i '/TestRead0/aif true \{ return\; \}' src/os/os_test.go 116 + sed -i '/TestSystemRoots/aif true \{ return\; \}' src/crypto/x509/root_darwin_test.go 117 + 118 + sed -i '/TestGoInstallRebuildsStalePackagesInOtherGOPATH/aif true \{ return\; \}' src/cmd/go/go_test.go 119 + sed -i '/TestBuildDashIInstallsDependencies/aif true \{ return\; \}' src/cmd/go/go_test.go 120 + 121 + sed -i '/TestDisasmExtld/aif true \{ return\; \}' src/cmd/objdump/objdump_test.go 122 + 123 + sed -i 's/unrecognized/unknown/' src/cmd/link/internal/ld/lib.go 124 + 125 + # TestCurrent fails because Current is not implemented on Darwin 126 + sed -i 's/TestCurrent/testCurrent/g' src/os/user/user_test.go 127 + sed -i 's/TestLookup/testLookup/g' src/os/user/user_test.go 128 + 129 + touch $TMPDIR/group $TMPDIR/hosts $TMPDIR/passwd 130 + ''; 131 + 132 + patches = [ 133 + ./remove-tools-1.11.patch 134 + ./ssl-cert-file-1.13.patch 135 + ./remove-test-pie-1.14.patch 136 + ./creds-test.patch 137 + ./go-1.9-skip-flaky-19608.patch 138 + ./go-1.9-skip-flaky-20072.patch 139 + ./skip-external-network-tests.patch 140 + ./skip-nohup-tests.patch 141 + ] ++ [ 142 + # breaks under load: https://github.com/golang/go/issues/25628 143 + (if stdenv.isAarch32 144 + then ./skip-test-extra-files-on-aarch32-1.14.patch 145 + else ./skip-test-extra-files-on-386-1.14.patch) 146 + ]; 147 + 148 + postPatch = '' 149 + find . -name '*.orig' -exec rm {} ';' 150 + ''; 151 + 152 + GOOS = stdenv.targetPlatform.parsed.kernel.name; 153 + GOARCH = goarch stdenv.targetPlatform; 154 + # GOHOSTOS/GOHOSTARCH must match the building system, not the host system. 155 + # Go will nevertheless build a for host system that we will copy over in 156 + # the install phase. 157 + GOHOSTOS = stdenv.buildPlatform.parsed.kernel.name; 158 + GOHOSTARCH = goarch stdenv.buildPlatform; 159 + 160 + # {CC,CXX}_FOR_TARGET must be only set for cross compilation case as go expect those 161 + # to be different from CC/CXX 162 + CC_FOR_TARGET = if (stdenv.buildPlatform != stdenv.targetPlatform) then 163 + "${pkgsTargetTarget.stdenv.cc}/bin/${pkgsTargetTarget.stdenv.cc.targetPrefix}cc" 164 + else 165 + null; 166 + CXX_FOR_TARGET = if (stdenv.buildPlatform != stdenv.targetPlatform) then 167 + "${pkgsTargetTarget.stdenv.cc}/bin/${pkgsTargetTarget.stdenv.cc.targetPrefix}c++" 168 + else 169 + null; 170 + 171 + GOARM = toString (stdenv.lib.intersectLists [(stdenv.hostPlatform.parsed.cpu.version or "")] ["5" "6" "7"]); 172 + GO386 = 387; # from Arch: don't assume sse2 on i686 173 + CGO_ENABLED = 1; 174 + # Hopefully avoids test timeouts on Hydra 175 + GO_TEST_TIMEOUT_SCALE = 3; 176 + 177 + # Indicate that we are running on build infrastructure 178 + # Some tests assume things like home directories and users exists 179 + GO_BUILDER_NAME = "nix"; 180 + 181 + GOROOT_BOOTSTRAP="${goBootstrap}/share/go"; 182 + 183 + postConfigure = '' 184 + export GOCACHE=$TMPDIR/go-cache 185 + # this is compiled into the binary 186 + export GOROOT_FINAL=$out/share/go 187 + 188 + export PATH=$(pwd)/bin:$PATH 189 + 190 + # Independent from host/target, CC should produce code for the building system. 191 + export CC=${buildPackages.stdenv.cc}/bin/cc 192 + ulimit -a 193 + ''; 194 + 195 + postBuild = '' 196 + (cd src && ./make.bash) 197 + ''; 198 + 199 + doCheck = stdenv.hostPlatform == stdenv.targetPlatform && !stdenv.isDarwin; 200 + 201 + checkPhase = '' 202 + runHook preCheck 203 + (cd src && HOME=$TMPDIR GOCACHE=$TMPDIR/go-cache ./run.bash --no-rebuild) 204 + runHook postCheck 205 + ''; 206 + 207 + preInstall = '' 208 + rm -r pkg/obj 209 + # Contains the wrong perl shebang when cross compiling, 210 + # since it is not used for anything we can deleted as well. 211 + rm src/regexp/syntax/make_perl_groups.pl 212 + '' + (if (stdenv.buildPlatform != stdenv.hostPlatform) then '' 213 + mv bin/*_*/* bin 214 + rmdir bin/*_* 215 + ${optionalString (!(GOHOSTARCH == GOARCH && GOOS == GOHOSTOS)) '' 216 + rm -rf pkg/${GOHOSTOS}_${GOHOSTARCH} pkg/tool/${GOHOSTOS}_${GOHOSTARCH} 217 + ''} 218 + '' else if (stdenv.hostPlatform != stdenv.targetPlatform) then '' 219 + rm -rf bin/*_* 220 + ${optionalString (!(GOHOSTARCH == GOARCH && GOOS == GOHOSTOS)) '' 221 + rm -rf pkg/${GOOS}_${GOARCH} pkg/tool/${GOOS}_${GOARCH} 222 + ''} 223 + '' else ""); 224 + 225 + installPhase = '' 226 + runHook preInstall 227 + mkdir -p $GOROOT_FINAL 228 + cp -a bin pkg src lib misc api doc $GOROOT_FINAL 229 + ln -s $GOROOT_FINAL/bin $out/bin 230 + runHook postInstall 231 + ''; 232 + 233 + setupHook = ./setup-hook.sh; 234 + 235 + disallowedReferences = [ goBootstrap ]; 236 + 237 + meta = with stdenv.lib; { 238 + branch = "1.14"; 239 + homepage = http://golang.org/; 240 + description = "The Go Programming language"; 241 + license = licenses.bsd3; 242 + maintainers = with maintainers; [ cstrahan orivej mic92 rvolosatovs kalbasit Frostman ]; 243 + platforms = platforms.linux ++ platforms.darwin; 244 + }; 245 + }
+34
pkgs/development/compilers/go/remove-test-pie-1.14.patch
··· 1 + diff --git a/src/cmd/dist/test.go b/src/cmd/dist/test.go 2 + index 56bdfcac19..d7d67ab94d 100644 3 + --- a/src/cmd/dist/test.go 4 + +++ b/src/cmd/dist/test.go 5 + @@ -580,29 +580,6 @@ func (t *tester) registerTests() { 6 + }) 7 + } 8 + 9 + - // Test internal linking of PIE binaries where it is supported. 10 + - if goos == "linux" && (goarch == "amd64" || goarch == "arm64") { 11 + - t.tests = append(t.tests, distTest{ 12 + - name: "pie_internal", 13 + - heading: "internal linking of -buildmode=pie", 14 + - fn: func(dt *distTest) error { 15 + - t.addCmd(dt, "src", t.goTest(), "reflect", "-buildmode=pie", "-ldflags=-linkmode=internal", t.timeout(60)) 16 + - return nil 17 + - }, 18 + - }) 19 + - // Also test a cgo package. 20 + - if t.cgoEnabled && t.internalLink() { 21 + - t.tests = append(t.tests, distTest{ 22 + - name: "pie_internal_cgo", 23 + - heading: "internal linking of -buildmode=pie", 24 + - fn: func(dt *distTest) error { 25 + - t.addCmd(dt, "src", t.goTest(), "os/user", "-buildmode=pie", "-ldflags=-linkmode=internal", t.timeout(60)) 26 + - return nil 27 + - }, 28 + - }) 29 + - } 30 + - } 31 + - 32 + // sync tests 33 + if goos != "js" { // js doesn't support -cpu=10 34 + t.tests = append(t.tests, distTest{
+15
pkgs/development/compilers/go/skip-test-extra-files-on-386-1.14.patch
··· 1 + diff --git a/src/os/exec/exec_test.go b/src/os/exec/exec_test.go 2 + index dce66c5c2e..2532224376 100644 3 + --- a/src/os/exec/exec_test.go 4 + +++ b/src/os/exec/exec_test.go 5 + @@ -627,6 +627,10 @@ func TestExtraFiles(t *testing.T) { 6 + t.Skipf("skipping test on %q", runtime.GOOS) 7 + } 8 + 9 + + if runtime.GOOS == "linux" && runtime.GOARCH == "386" { 10 + + t.Skipf("skipping test on %q %q", runtime.GOARCH, runtime.GOOS) 11 + + } 12 + + 13 + // Force network usage, to verify the epoll (or whatever) fd 14 + // doesn't leak to the child, 15 + ln, err := net.Listen("tcp", "127.0.0.1:0")
+15
pkgs/development/compilers/go/skip-test-extra-files-on-aarch32-1.14.patch
··· 1 + diff --git a/src/os/exec/exec_test.go b/src/os/exec/exec_test.go 2 + index dce66c5c2e..2532224376 100644 3 + --- a/src/os/exec/exec_test.go 4 + +++ b/src/os/exec/exec_test.go 5 + @@ -627,6 +627,10 @@ func TestExtraFiles(t *testing.T) { 6 + t.Skipf("skipping test on %q", runtime.GOOS) 7 + } 8 + 9 + + if runtime.GOOS == "linux" && runtime.GOARCH == "arm" { 10 + + t.Skipf("skipping test on %q %q", runtime.GOARCH, runtime.GOOS) 11 + + } 12 + + 13 + // Force network usage, to verify the epoll (or whatever) fd 14 + // doesn't leak to the child, 15 + ln, err := net.Listen("tcp", "127.0.0.1:0")
+1 -1
pkgs/development/haskell-modules/generic-builder.nix
··· 384 384 done 385 385 386 386 for d in $(grep '^dynamic-library-dirs:' "$packageConfDir"/* | cut -d' ' -f2- | tr ' ' '\n' | sort -u); do 387 - for lib in "$d/"*.dylib; do 387 + for lib in "$d/"*.{dylib,so}; do 388 388 ln -s "$lib" "$dynamicLinksDir" 389 389 done 390 390 done
+1 -13
pkgs/development/interpreters/perl/default.nix
··· 1 1 { config, lib, stdenv, fetchurl, pkgs, buildPackages, callPackage 2 - , enableThreading ? stdenv ? glibc, coreutils, makeWrapper 2 + , enableThreading ? true, coreutils, makeWrapper 3 3 }: 4 4 5 5 with lib; 6 - 7 - # We can only compile perl with threading on platforms where we have a 8 - # real glibc in the stdenv. 9 - # 10 - # Instead of silently building an unthreaded perl if this is not the 11 - # case, we force callers to disableThreading explicitly, therefore 12 - # documenting the platforms where the perl is not threaded. 13 - # 14 - # In the case of stdenv linux boot stage1 it's not possible to use 15 - # threading because of the simpleness of the bootstrap glibc, so we 16 - # use enableThreading = false there. 17 - assert enableThreading -> (stdenv ? glibc); 18 6 19 7 let 20 8
+1 -1
pkgs/development/interpreters/python/hooks/python-imports-check-hook.sh
··· 6 6 7 7 if [ -n "$pythonImportsCheck" ]; then 8 8 echo "Check whether the following modules can be imported: $pythonImportsCheck" 9 - cd $out && eval "@pythonCheckInterpreter@ -c 'import os; import importlib; list(map(lambda mod: importlib.import_module(mod), os.environ[\"pythonImportsCheck\"].split()))'" 9 + ( cd $out && eval "@pythonCheckInterpreter@ -c 'import os; import importlib; list(map(lambda mod: importlib.import_module(mod), os.environ[\"pythonImportsCheck\"].split()))'" ) 10 10 fi 11 11 } 12 12
+2 -2
pkgs/development/libraries/cppunit/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "cppunit"; 5 - version = "1.15.0"; 5 + version = "1.15.1"; 6 6 7 7 src = fetchurl { 8 8 url = "https://dev-www.libreoffice.org/src/${pname}-${version}.tar.gz"; 9 - sha256 = "08j9hc11yl07ginsf282pshn6zpy96yhzf7426sfn10f8gdxyq8w"; 9 + sha256 = "19qpqzy66bq76wcyadmi3zahk5v1ll2kig1nvg96zx9padkcdic9"; 10 10 }; 11 11 12 12 meta = with stdenv.lib; {
+2 -2
pkgs/development/libraries/folks/default.nix
··· 29 29 30 30 stdenv.mkDerivation rec { 31 31 pname = "folks"; 32 - version = "0.13.1"; 32 + version = "0.13.2"; 33 33 34 34 outputs = [ "out" "dev" ]; 35 35 36 36 src = fetchurl { 37 37 url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; 38 - sha256 = "0pda8sx4ap3lyri5fdrnakl29la1zkhwlc9bmnp13qigp1iwdw9x"; 38 + sha256 = "0wq14yjs7m3axziy679a854vc7r7fj1l38p9jnyapb21vswdcqq2"; 39 39 }; 40 40 41 41 mesonFlags = [
+2 -2
pkgs/development/libraries/gjs/default.nix
··· 19 19 20 20 stdenv.mkDerivation rec { 21 21 pname = "gjs"; 22 - version = "1.58.4"; 22 + version = "1.58.5"; 23 23 24 24 src = fetchurl { 25 25 url = "mirror://gnome/sources/gjs/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; 26 - sha256 = "0pxxgsb9gvymgr7qsglfdbaa7hy29y01prszjr27f7bpdik3y6i6"; 26 + sha256 = "0fm1szmhdawvgbf9fh6vvkv1fdvbn888fciyi2wkhx48kz09jvg7"; 27 27 }; 28 28 29 29 outputs = [ "out" "dev" "installedTests" ];
+2 -2
pkgs/development/libraries/glib/default.nix
··· 48 48 49 49 stdenv.mkDerivation rec { 50 50 pname = "glib"; 51 - version = "2.62.4"; 51 + version = "2.62.5"; 52 52 53 53 src = fetchurl { 54 54 url = "mirror://gnome/sources/glib/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; 55 - sha256 = "1g2vj9lyh032kcwij7avx5d6a99rcsnkd07sbl9i55zsfw6h712c"; 55 + sha256 = "0bj5hagvfiqcjd20w543pvbnrlqvs8nbxvqjflyvcn36ljpwvldq"; 56 56 }; 57 57 58 58 patches = optionals stdenv.isDarwin [
+11 -11
pkgs/development/libraries/glib/split-dev-programs.patch
··· 1 1 diff --git a/gio/gdbus-2.0/codegen/meson.build b/gio/gdbus-2.0/codegen/meson.build 2 - index 121e9e6bb..b76fa0188 100644 2 + index 5ea6bae2f..e0b584a86 100644 3 3 --- a/gio/gdbus-2.0/codegen/meson.build 4 4 +++ b/gio/gdbus-2.0/codegen/meson.build 5 5 @@ -16,7 +16,7 @@ gdbus_codegen_conf.set('DATADIR', glib_datadir) ··· 12 12 ) 13 13 # Provide tools for others when we're a subproject and they use the Meson GNOME module 14 14 diff --git a/gio/meson.build b/gio/meson.build 15 - index 9a9e621b3..12e1d146a 100644 15 + index 3535788ab..99c3b48d6 100644 16 16 --- a/gio/meson.build 17 17 +++ b/gio/meson.build 18 - @@ -830,14 +830,15 @@ pkg.generate(libgio, 18 + @@ -831,14 +831,15 @@ pkg.generate(libgio, 19 19 variables : ['datadir=' + join_paths('${prefix}', get_option('datadir')), 20 20 'schemasdir=' + join_paths('${datadir}', schemas_subdir), 21 21 'bindir=' + join_paths('${prefix}', get_option('bindir')), 22 22 + 'devbindir=' + get_option('devbindir'), 23 - 'giomoduledir=' + giomodulesdir, 23 + 'giomoduledir=' + pkgconfig_giomodulesdir, 24 24 'gio=' + join_paths('${bindir}', 'gio'), 25 25 - 'gio_querymodules=' + join_paths('${bindir}', 'gio-querymodules'), 26 26 - 'glib_compile_schemas=' + join_paths('${bindir}', 'glib-compile-schemas'), ··· 36 36 'gsettings=' + join_paths('${bindir}', 'gsettings')], 37 37 version : glib_version, 38 38 install_dir : glib_pkgconfigreldir, 39 - @@ -938,12 +939,14 @@ executable('gio', gio_tool_sources, 39 + @@ -939,12 +940,14 @@ executable('gio', gio_tool_sources, 40 40 41 41 executable('gresource', 'gresource-tool.c', 42 42 install : true, ··· 51 51 c_args : gio_c_args, 52 52 # intl.lib is not compatible with SAFESEH 53 53 link_args : noseh_link_args, 54 - @@ -952,6 +955,7 @@ gio_querymodules = executable('gio-querymodules', 'gio-querymodules.c', 'giomodu 54 + @@ -953,6 +956,7 @@ gio_querymodules = executable('gio-querymodules', 'gio-querymodules.c', 'giomodu 55 55 glib_compile_schemas = executable('glib-compile-schemas', 56 56 [gconstructor_as_data_h, 'gvdb/gvdb-builder.c', 'glib-compile-schemas.c'], 57 57 install : true, ··· 59 59 # intl.lib is not compatible with SAFESEH 60 60 link_args : noseh_link_args, 61 61 dependencies : [libgio_dep, libgobject_dep, libgmodule_dep, libglib_dep]) 62 - @@ -959,6 +963,7 @@ glib_compile_schemas = executable('glib-compile-schemas', 62 + @@ -960,6 +964,7 @@ glib_compile_schemas = executable('glib-compile-schemas', 63 63 glib_compile_resources = executable('glib-compile-resources', 64 64 [gconstructor_as_data_h, 'gvdb/gvdb-builder.c', 'glib-compile-resources.c'], 65 65 install : true, ··· 68 68 # intl.lib is not compatible with SAFESEH 69 69 link_args : noseh_link_args, 70 70 diff --git a/glib/meson.build b/glib/meson.build 71 - index 91a48f194..80472a06b 100644 71 + index aaf5f00f5..09edd291a 100644 72 72 --- a/glib/meson.build 73 73 +++ b/glib/meson.build 74 74 @@ -375,9 +375,10 @@ pkg.generate(libglib, ··· 103 103 install_mode: 'rwxr-xr-x' 104 104 ) 105 105 diff --git a/gobject/meson.build b/gobject/meson.build 106 - index c7805c556..22ec629a4 100644 106 + index 85e283bab..386ad5e4e 100644 107 107 --- a/gobject/meson.build 108 108 +++ b/gobject/meson.build 109 109 @@ -75,7 +75,7 @@ foreach tool: python_tools ··· 124 124 125 125 install_data('gobject_gdb.py', install_dir : join_paths(glib_pkgdatadir, 'gdb')) 126 126 diff --git a/meson.build b/meson.build 127 - index 717d1bccb..fb0bee8a1 100644 127 + index 484f4c750..c7f9327d9 100644 128 128 --- a/meson.build 129 129 +++ b/meson.build 130 - @@ -2118,7 +2118,7 @@ if have_sh 130 + @@ -2122,7 +2122,7 @@ if have_sh 131 131 gettextize_conf.set('datarootdir', glib_datadir) 132 132 gettextize_conf.set('datadir', glib_datadir) 133 133 configure_file(input : 'glib-gettextize.in',
+2 -2
pkgs/development/libraries/grilo-plugins/default.nix
··· 31 31 32 32 stdenv.mkDerivation rec { 33 33 pname = "grilo-plugins"; 34 - version = "0.3.10"; 34 + version = "0.3.11"; 35 35 36 36 src = fetchurl { 37 37 url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; 38 - sha256 = "0jldaixc4kzycn5v8ixkjld1n0z3dp0l1p3vchgdwpvdvc7kcfw0"; 38 + sha256 = "0wyd3n5mn7b77hxylkc3f62v01mlavh96901pz342hwrn42ydqnx"; 39 39 }; 40 40 41 41 patches = [
+2 -2
pkgs/development/libraries/grilo/default.nix
··· 4 4 5 5 let 6 6 pname = "grilo"; 7 - version = "0.3.11"; # if you change minor, also change ./setup-hook.sh 7 + version = "0.3.12"; # if you change minor, also change ./setup-hook.sh 8 8 in stdenv.mkDerivation rec { 9 9 name = "${pname}-${version}"; 10 10 ··· 13 13 14 14 src = fetchurl { 15 15 url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${name}.tar.xz"; 16 - sha256 = "0s7b50nbyvi75x2l507q9pnpp4ynrx9qa0hm2bkw7wd2nl61r48g"; 16 + sha256 = "0w8sq5g6g1rg85h53vbll8va70fcp6082mlpmy98aa03444ddyyv"; 17 17 }; 18 18 19 19 setupHook = ./setup-hook.sh;
+2 -2
pkgs/development/libraries/gtk/3.x.nix
··· 48 48 49 49 stdenv.mkDerivation rec { 50 50 pname = "gtk+3"; 51 - version = "3.24.13"; 51 + version = "3.24.14"; 52 52 53 53 outputs = [ "out" "dev" ] ++ optional withGtkDoc "devdoc"; 54 54 outputBin = "dev"; ··· 60 60 61 61 src = fetchurl { 62 62 url = "mirror://gnome/sources/gtk+/${stdenv.lib.versions.majorMinor version}/gtk+-${version}.tar.xz"; 63 - sha256 = "1a9hi7k59q0kqx0n3xhsk1ly23w9g9ncllnay1756g0yrww5qxsc"; 63 + sha256 = "120yz5gxqbv7sgdbcy4i0b6ixm8jpjzialdrqs0gv15q7bwnjk8w"; 64 64 }; 65 65 66 66 patches = [
+2 -2
pkgs/development/libraries/kerberos/krb5.nix
··· 14 14 with stdenv.lib; 15 15 stdenv.mkDerivation rec { 16 16 name = "${type}krb5-${version}"; 17 - majorVersion = "1.17"; 17 + majorVersion = "1.18"; 18 18 version = majorVersion; 19 19 20 20 src = fetchurl { 21 21 url = "https://kerberos.org/dist/krb5/${majorVersion}/krb5-${version}.tar.gz"; 22 - sha256 = "1xc1ly09697b7g2vngvx76szjqy9769kpgn27lnp1r9xln224vjs"; 22 + sha256 = "121c5xsy3x0i4wdkrpw62yhvji6virbh6n30ypazkp0isws3k4bk"; 23 23 }; 24 24 25 25 outputs = [ "out" "dev" ];
+2 -2
pkgs/development/libraries/libbytesize/default.nix
··· 4 4 }: 5 5 6 6 let 7 - version = "2.1"; 7 + version = "2.2"; 8 8 in stdenv.mkDerivation rec { 9 9 pname = "libbytesize"; 10 10 inherit version; ··· 13 13 owner = "storaged-project"; 14 14 repo = "libbytesize"; 15 15 rev = version; 16 - sha256 = "0qb6zx2fdghm21lishlcrhnwf4wwy5p69dsgp0504kn93ii7mw3m"; 16 + sha256 = "0n4gmn68ypsk3gcw6akcghlgk3aj3wskwg3mlg93cw5y3a33nbhm"; 17 17 }; 18 18 19 19 outputs = [ "out" "dev" "devdoc" ];
+2 -2
pkgs/development/libraries/libcdr/default.nix
··· 1 1 { stdenv, fetchurl, libwpg, libwpd, lcms, pkgconfig, librevenge, icu, boost, cppunit }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "libcdr-0.1.5"; 4 + name = "libcdr-0.1.6"; 5 5 6 6 src = fetchurl { 7 7 url = "https://dev-www.libreoffice.org/src/${name}.tar.xz"; 8 - sha256 = "0j1skr11jwvafn0l6p37v3i4lqc8wcn489g8f7c4mqwbk94mrkka"; 8 + sha256 = "0qgqlw6i25zfq1gf7f6r5hrhawlrgh92sg238kjpf2839aq01k81"; 9 9 }; 10 10 11 11 buildInputs = [ libwpg libwpd lcms librevenge icu boost cppunit ];
+2 -2
pkgs/development/libraries/libinput/default.nix
··· 27 27 with stdenv.lib; 28 28 stdenv.mkDerivation rec { 29 29 pname = "libinput"; 30 - version = "1.15.1"; 30 + version = "1.15.2"; 31 31 32 32 src = fetchurl { 33 33 url = "https://www.freedesktop.org/software/libinput/${pname}-${version}.tar.xz"; 34 - sha256 = "05hcjlsrc38yn1g1n7kia9m93nc703hx66gf977kw5vgbi4mfbvb"; 34 + sha256 = "0ivpb4sghl80cs7jg3xrs53kckif6wy81cny3a8mry94nszky74p"; 35 35 }; 36 36 37 37 outputs = [ "bin" "out" "dev" ];
+2 -6
pkgs/development/libraries/libpeas/default.nix
··· 4 4 5 5 stdenv.mkDerivation rec { 6 6 pname = "libpeas"; 7 - version = "1.24.0"; 7 + version = "1.24.1"; 8 8 9 9 outputs = [ "out" "dev" ]; 10 10 11 11 src = fetchurl { 12 12 url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; 13 - sha256 = "1yg6r0srz3knhgvplprl3pikrq5c02dmdxgfwcynd6hjih9h16hb"; 13 + sha256 = "1162dr7smmfb02czmhshr0f93hqj7w0nw29bys5lzfvwarxcyflw"; 14 14 }; 15 15 16 16 nativeBuildInputs = [ pkgconfig meson ninja gettext gobject-introspection ]; ··· 18 18 propagatedBuildInputs = [ 19 19 # Required by libpeas-1.0.pc 20 20 gobject-introspection 21 - ]; 22 - 23 - patches = [ 24 - ./fix-libpeas-gtk-pc.patch 25 21 ]; 26 22 27 23 passthru = {
-22
pkgs/development/libraries/libpeas/fix-libpeas-gtk-pc.patch
··· 1 - diff --git a/libpeas-gtk/meson.build b/libpeas-gtk/meson.build 2 - index bf590de..00def42 100644 3 - --- a/libpeas-gtk/meson.build 4 - +++ b/libpeas-gtk/meson.build 5 - @@ -111,10 +111,17 @@ libpeas_gtk_test_dep = declare_dependency( 6 - sources: libpeas_gtk_dep_sources, 7 - ) 8 - 9 - +libpeas_gtk_pc_reqs = [ 10 - + glib_dep, 11 - + gtk_dep, 12 - + package_string + ' >= @0@'.format(version) 13 - +] 14 - + 15 - libpeas_gtk_pc = pkg.generate( 16 - libpeas_gtk_sha, 17 - name: package_gtk_string, 18 - description: 'GObject plugins library widgetery', 19 - + requires: libpeas_gtk_pc_reqs, 20 - subdirs: package_string, 21 - install_dir: pkgconfigdir, 22 - )
+3 -3
pkgs/development/libraries/libqmi/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "libqmi"; 5 - version = "1.24.2"; 5 + version = "1.24.4"; 6 6 7 7 src = fetchurl { 8 8 url = "https://www.freedesktop.org/software/libqmi/${pname}-${version}.tar.xz"; 9 - sha256 = "10mjfmiznaxvfk0f9wr18kyxz3mpdrvnh0qw9g8c1nv0z5vf9r2a"; 9 + sha256 = "12licfsszr6qxpg9b2b04qm2glk8d42fcy32zr8jzwrgr7gbl5h3"; 10 10 }; 11 11 12 12 outputs = [ "out" "dev" "devdoc" ]; ··· 29 29 doCheck = true; 30 30 31 31 meta = with stdenv.lib; { 32 - homepage = https://www.freedesktop.org/wiki/Software/libqmi/; 32 + homepage = "https://www.freedesktop.org/wiki/Software/libqmi/"; 33 33 description = "Modem protocol helper library"; 34 34 platforms = platforms.linux; 35 35 license = licenses.gpl2;
+2 -10
pkgs/development/libraries/libsecret/default.nix
··· 4 4 5 5 stdenv.mkDerivation rec { 6 6 pname = "libsecret"; 7 - version = "0.20.0"; 7 + version = "0.20.1"; 8 8 9 9 src = fetchurl { 10 10 url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; 11 - sha256 = "0hxfpm8f4rlx685igd4bv89wb80v2952h373g3w6l42kniq7667i"; 11 + sha256 = "0ir4ynpf8b64xss1azvsi5x6697lik7hkf3z0xxa2qv2xja3xxsp"; 12 12 }; 13 - 14 - patches = [ 15 - (fetchpatch { 16 - name = "rename-internal-functions-to-avoid-conflicts-and-fix-build.patch"; 17 - url = "https://gitlab.gnome.org/GNOME/libsecret/commit/cf21ad50b62f7c8e4b22ef374f0a73290a99bdb8.patch"; 18 - sha256 = "1n9nyzq5qrvw7s6sj5gzj33ia3rrx719jpys1cfhfbayg2sxyd4n"; 19 - }) 20 - ]; 21 13 22 14 postPatch = '' 23 15 patchShebangs .
+2
pkgs/development/libraries/nettle/generic.nix
··· 16 16 nativeBuildInputs = [ gnum4 ]; 17 17 propagatedBuildInputs = [ gmp ]; 18 18 19 + configureFlags = [ "--enable-fat" ]; # runtime selection of HW-accelerated code 20 + 19 21 doCheck = (stdenv.hostPlatform.system != "i686-cygwin" && !stdenv.isDarwin); 20 22 21 23 enableParallelBuilding = true;
+2 -2
pkgs/development/libraries/p11-kit/default.nix
··· 4 4 5 5 stdenv.mkDerivation rec { 6 6 pname = "p11-kit"; 7 - version = "0.23.19"; 7 + version = "0.23.20"; 8 8 9 9 src = fetchFromGitHub { 10 10 owner = "p11-glue"; 11 11 repo = pname; 12 12 rev = version; 13 - sha256 = "0hsg06mqsd90a0nxj5484b40cbfq7vna4w0sv6y5ihbj5l2hz06b"; 13 + sha256 = "00xxhzgd7cpin9nzwrrzykvhjwqg5l45p0cq2gv68y3sxq2p9q6y"; 14 14 }; 15 15 16 16 outputs = [ "out" "dev"];
+2 -2
pkgs/development/libraries/pcre/default.nix
··· 8 8 assert elem variant [ null "cpp" "pcre16" "pcre32" ]; 9 9 10 10 let 11 - version = "8.43"; 11 + version = "8.44"; 12 12 pname = if (variant == null) then "pcre" 13 13 else if (variant == "cpp") then "pcre-cpp" 14 14 else variant; ··· 18 18 19 19 src = fetchurl { 20 20 url = "https://ftp.pcre.org/pub/pcre/pcre-${version}.tar.bz2"; 21 - sha256 = "0sxg1wlknq05ryq63h21cchjmcjkin9lmnqsmhs3h08301965rwi"; 21 + sha256 = "0v9nk51wh55pcbnf2jr36yarz8ayajn6d7ywiq2wagivn9c8c40r"; 22 22 }; 23 23 24 24 outputs = [ "bin" "dev" "out" "doc" "man" ];
+2 -2
pkgs/development/libraries/poppler/default.nix
··· 12 12 in 13 13 stdenv.mkDerivation rec { 14 14 name = "poppler-${suffix}-${version}"; 15 - version = "0.84.0"; # beware: updates often break cups-filters build, check texlive and scribusUnstable too! 15 + version = "0.85.0"; # beware: updates often break cups-filters build, check texlive and scribusUnstable too! 16 16 17 17 src = fetchurl { 18 18 url = "${meta.homepage}/poppler-${version}.tar.xz"; 19 - sha256 = "0ccp2gx05cz5y04k5pgbyi4ikyq60nafa7x2yx4aaf1vfkd318f7"; 19 + sha256 = "0jyr036scdly13hx5dxmsqp2p3jifc29h2by51msw0ih6bmpbj1b"; 20 20 }; 21 21 22 22 outputs = [ "out" "dev" ];
+7
pkgs/development/libraries/qt-5/5.12/default.nix
··· 67 67 ./qtbase.patch.d/0010-qtbase-qtpluginpath.patch 68 68 ./qtbase.patch.d/0011-qtbase-assert.patch 69 69 ./qtbase.patch.d/0012-fix-header_module.patch 70 + # https://bugreports.qt.io/browse/QTBUG-81715 71 + # remove after updating to qt > 5.12.7 72 + (fetchpatch { 73 + name = "fix-qt5_make_output_file-cmake-macro.patch"; 74 + url = "https://code.qt.io/cgit/qt/qtbase.git/patch/?id=8a3fde00bf53d99e9e4853e8ab97b0e1bcf74915"; 75 + sha256 = "1gpcbdpyazdxnmldvhsf3pfwr2gjvi08x3j6rxf543rq01bp6cpx"; 76 + }) 70 77 ]; 71 78 qtdeclarative = [ ./qtdeclarative.patch ]; 72 79 qtscript = [ ./qtscript.patch ];
+2 -2
pkgs/development/libraries/tracker-miners/default.nix
··· 45 45 46 46 stdenv.mkDerivation rec { 47 47 pname = "tracker-miners"; 48 - version = "2.3.1"; 48 + version = "2.3.2"; 49 49 50 50 src = fetchurl { 51 51 url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; 52 - sha256 = "1q4hlpl3nkr0y13rzkwryyajnpy5s661z8n82dw1rskrg9mf07bv"; 52 + sha256 = "1kizavw9gbdjkw4wykgv0fcl2y6fj788nycx9p4byn6ylb1277h6"; 53 53 }; 54 54 55 55 nativeBuildInputs = [
+2 -2
pkgs/development/libraries/tracker/default.nix
··· 6 6 7 7 stdenv.mkDerivation rec { 8 8 pname = "tracker"; 9 - version = "2.3.1"; 9 + version = "2.3.2"; 10 10 11 11 outputs = [ "out" "dev" "devdoc" ]; 12 12 13 13 src = fetchurl { 14 14 url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; 15 - sha256 = "1888vyz2l5n46ywb70fryd0qipyh3x5n6q0mk56jzbb5whk8fx5n"; 15 + sha256 = "1nzbnvwwsk6kv6kqbxwlz8vk70l9ai6b4r9qypw51vp4qy72ny54"; 16 16 }; 17 17 18 18 nativeBuildInputs = [
+2 -2
pkgs/development/libraries/vte/default.nix
··· 22 22 23 23 stdenv.mkDerivation rec { 24 24 pname = "vte"; 25 - version = "0.58.2"; 25 + version = "0.58.3"; 26 26 27 27 outputs = [ "out" "dev" ]; 28 28 29 29 src = fetchurl { 30 30 url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; 31 - sha256 = "1h1bljr090cgnzim00q4pnsmjqblzn1sig3d87wv1hzjn796dj9k"; 31 + sha256 = "0xa9ipwic4jnhhbzlnqbhssz10xkzv61cpkl1ammc6mdq95bbp12"; 32 32 }; 33 33 34 34 passthru = {
+8 -2
pkgs/development/python-modules/importlib-metadata/default.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "importlib-metadata"; 16 - version = "1.3.0"; 16 + version = "1.5.0"; 17 17 18 18 src = fetchPypi { 19 19 pname = "importlib_metadata"; 20 20 inherit version; 21 - sha256 = "0ibvvqajphwdclbr236gikvyja0ynvqjlix38kvsabgrf0jqafh7"; 21 + sha256 = "00ikdj4gjhankdljnz7g5ggak4k9lql2926x0x117ir9j2lv7x86"; 22 22 }; 23 23 24 24 nativeBuildInputs = [ setuptools_scm ]; ··· 27 27 ++ lib.optionals (!isPy3k) [ pathlib2 contextlib2 configparser ]; 28 28 29 29 checkInputs = [ importlib-resources packaging ]; 30 + 31 + # removing test_main.py - it requires 'pyflakefs' 32 + # and adding `pyflakefs` to `checkInputs` causes infinite recursion. 33 + preCheck = '' 34 + rm importlib_metadata/tests/test_main.py 35 + ''; 30 36 31 37 meta = with lib; { 32 38 description = "Read metadata from Python packages";
+4 -2
pkgs/development/tools/misc/gdb/debug-info-from-env.patch
··· 3 3 4 4 --- a/gdb/main.c 5 5 +++ b/gdb/main.c 6 - @@ -551,3 +551,6 @@ captured_main_1 (struct captured_main_args *context) 6 + @@ -556,3 +556,8 @@ captured_main_1 (struct captured_main_args *context) 7 7 8 8 - debug_file_directory = relocate_gdb_directory (DEBUGDIR, 9 9 + debug_file_directory = getenv("NIX_DEBUG_INFO_DIRS"); 10 10 + 11 - + if (debug_file_directory == NULL) 11 + + if (debug_file_directory != NULL) 12 + + debug_file_directory = xstrdup(debug_file_directory); 13 + + else 12 14 + debug_file_directory = relocate_gdb_directory (DEBUGDIR, 13 15 DEBUGDIR_RELOCATABLE);
+3 -3
pkgs/os-specific/linux/bluez/default.nix
··· 15 15 16 16 stdenv.mkDerivation rec { 17 17 pname = "bluez"; 18 - version = "5.52"; 18 + version = "5.53"; 19 19 20 20 src = fetchurl { 21 21 url = "mirror://kernel/linux/bluetooth/${pname}-${version}.tar.xz"; 22 - sha256 = "02jng21lp6fb3c2bh6vf9y7cj4gaxwk29dfc32ncy0lj0gi4q57p"; 22 + sha256 = "1g1qg6dz6hl3csrmz75ixr12lwv836hq3ckb259svvrg62l2vaiq"; 23 23 }; 24 24 25 25 pythonPath = with python3.pkgs; [ ··· 116 116 117 117 meta = with stdenv.lib; { 118 118 description = "Bluetooth support for Linux"; 119 - homepage = http://www.bluez.org/; 119 + homepage = "http://www.bluez.org/"; 120 120 license = with licenses; [ gpl2 lgpl21 ]; 121 121 platforms = platforms.linux; 122 122 repositories.git = https://git.kernel.org/pub/scm/bluetooth/bluez.git;
+2 -2
pkgs/os-specific/linux/libcap-ng/default.nix
··· 6 6 pname = "libcap-ng"; 7 7 # When updating make sure to test that the version with 8 8 # all of the python bindings still works 9 - version = "0.7.9"; 9 + version = "0.7.10"; 10 10 11 11 src = fetchurl { 12 12 url = "${meta.homepage}/${pname}-${version}.tar.gz"; 13 - sha256 = "0a0k484kwv0zilry2mbl9k56cnpdhsjxdxin17jas6kkyfy345aa"; 13 + sha256 = "1gzzy12agfa9ddipdf72h9y68zqqnvsjjylv4vnq6hj4w2safk58"; 14 14 }; 15 15 16 16 nativeBuildInputs = [ swig ];
+3 -3
pkgs/os-specific/linux/sysstat/default.nix
··· 1 1 { stdenv, fetchurl, gettext, bzip2 }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "sysstat-12.2.0"; 4 + name = "sysstat-12.3.1"; 5 5 6 6 src = fetchurl { 7 7 url = "http://pagesperso-orange.fr/sebastien.godard/${name}.tar.xz"; 8 - sha256 = "0xc3983ccr0dwab1px2jhbgj86pfmmr29k7ggnwjwm1qigmriak1"; 8 + sha256 = "1hf1sy7akribmgavadqccxpy49yv0zfb3m81d2bj6jf8pyzwcrbq"; 9 9 }; 10 10 11 11 buildInputs = [ gettext ]; ··· 23 23 patches = [ ./install.patch ]; 24 24 25 25 meta = { 26 - homepage = http://sebastien.godard.pagesperso-orange.fr/; 26 + homepage = "http://sebastien.godard.pagesperso-orange.fr/"; 27 27 description = "A collection of performance monitoring tools for Linux (such as sar, iostat and pidstat)"; 28 28 license = stdenv.lib.licenses.gpl2Plus; 29 29 platforms = stdenv.lib.platforms.linux;
+4 -4
pkgs/os-specific/linux/systemd/default.nix
··· 30 30 bzip2 = null; 31 31 }; 32 32 in stdenv.mkDerivation { 33 - version = "243.4"; 33 + version = "243.7"; 34 34 pname = "systemd"; 35 35 36 36 # When updating, use https://github.com/systemd/systemd-stable tree, not the development one! ··· 38 38 src = fetchFromGitHub { 39 39 owner = "nixos"; 40 40 repo = "systemd"; 41 - rev = "d8853d39a28b9884e0acd3ae5732a1e7caaf08af"; 42 - sha256 = "1wqm51i2czbbb3nara11mnxzqng4na1l8fvz7qnbxcrjsqm7hz18"; 41 + rev = "e7d881488292fc8bdf96acd12767eca1bd65adae"; 42 + sha256 = "0haj3iff3y13pm4w5dbqj1drp5wryqfad58jbbmnb6zdgis56h8f"; 43 43 }; 44 44 45 45 outputs = [ "out" "lib" "man" "dev" ]; ··· 258 258 passthru.interfaceVersion = 2; 259 259 260 260 meta = with stdenv.lib; { 261 - homepage = http://www.freedesktop.org/wiki/Software/systemd; 261 + homepage = "https://www.freedesktop.org/wiki/Software/systemd/"; 262 262 description = "A system and service manager for Linux"; 263 263 license = licenses.lgpl21Plus; 264 264 platforms = platforms.linux;
+2 -2
pkgs/servers/sql/mariadb/connector-c/3_1.nix
··· 1 1 { callPackage, ... } @ args: 2 2 3 3 callPackage ./. (args // { 4 - version = "3.1.5"; 5 - sha256 = "1mfrm595kfnpjladaq6m184npa3rxff9pr1vwa35r057s7nmzpm9"; 4 + version = "3.1.7"; 5 + sha256 = "16pmdms454jbralaw6rpx0rjlf2297p6h3q8wfk0n87kbn7vrxv4"; 6 6 })
+1
pkgs/servers/sql/mariadb/connector-c/default.nix
··· 41 41 ln -sv mariadb $out/lib/mysql 42 42 ln -sv mariadb $out/include/mysql 43 43 ln -sv mariadb_version.h $out/include/mariadb/mysql_version.h 44 + ln -sv libmariadb.pc $out/lib/pkgconfig/mysqlclient.pc 44 45 ''; 45 46 46 47 meta = {
+2 -3
pkgs/servers/sql/postgresql/default.nix
··· 3 3 generic = 4 4 # dependencies 5 5 { stdenv, lib, fetchurl, makeWrapper 6 - , glibc, zlib, readline, openssl, openssl_1_0_2, icu, systemd, libossp_uuid 6 + , glibc, zlib, readline, openssl, icu, systemd, libossp_uuid 7 7 , pkgconfig, libxml2, tzdata 8 8 9 9 # This is important to obtain a version of `libpq` that does not depend on systemd. ··· 32 32 setOutputFlags = false; # $out retains configureFlags :-/ 33 33 34 34 buildInputs = 35 - [ zlib readline libxml2 makeWrapper ] 35 + [ zlib readline openssl libxml2 makeWrapper ] 36 36 ++ lib.optionals icuEnabled [ icu ] 37 37 ++ lib.optionals enableSystemd [ systemd ] 38 - ++ [ (if atLeast "9.5" then openssl else openssl_1_0_2) ] 39 38 ++ lib.optionals (!stdenv.isDarwin) [ libossp_uuid ]; 40 39 41 40 nativeBuildInputs = lib.optionals icuEnabled [ pkgconfig ];
+2 -2
pkgs/tools/networking/network-manager/default.nix
··· 10 10 pythonForDocs = python3.withPackages (pkgs: with pkgs; [ pygobject3 ]); 11 11 in stdenv.mkDerivation rec { 12 12 pname = "network-manager"; 13 - version = "1.22.6"; 13 + version = "1.22.8"; 14 14 15 15 src = fetchurl { 16 16 url = "mirror://gnome/sources/NetworkManager/${stdenv.lib.versions.majorMinor version}/NetworkManager-${version}.tar.xz"; 17 - sha256 = "0r65hk7nw44jq4k6h91wrprr0x9410ibd1n7mpmlh4f4kgy276dw"; 17 + sha256 = "0kxbgln78lb1cxhd79vbpdbncsb0cppr15fycgqb9df6f8nbj4cm"; 18 18 }; 19 19 20 20 outputs = [ "out" "dev" "devdoc" "man" "doc" ];
+11 -16
pkgs/tools/networking/openssh/default.nix
··· 4 4 , withKerberos ? true 5 5 , withGssapiPatches ? false 6 6 , kerberos 7 + , libfido2 8 + , withFIDO ? stdenv.hostPlatform.isUnix 7 9 , linkOpenssl? true 8 10 }: 9 11 ··· 14 12 # **please** update this patch when you update to a new openssh release. 15 13 gssapiPatch = fetchpatch { 16 14 name = "openssh-gssapi.patch"; 17 - url = "https://salsa.debian.org/ssh-team/openssh/raw/debian/1%258.1p1-2/debian/patches/gssapi.patch"; 18 - sha256 = "0zfxx46a5lpjp317z354yyswa2wvmb1pp5p0nxsbhsrzw94jvxsj"; 15 + url = "https://salsa.debian.org/ssh-team/openssh/raw/debian/1%258.2p1-1/debian/patches/gssapi.patch"; 16 + sha256 = "081gryqkfr5zr4f5m4v0piq1sxz06sb38z5lqxccgpivql7pa8d8"; 19 17 }; 20 18 21 19 in 22 20 with stdenv.lib; 23 21 stdenv.mkDerivation rec { 24 22 pname = "openssh"; 25 - version = if hpnSupport then "7.8p1" else "8.1p1"; 23 + version = if hpnSupport then "8.1p1" else "8.2p1"; 26 24 27 25 src = if hpnSupport then 28 26 fetchurl { 29 - url = "https://github.com/rapier1/openssh-portable/archive/hpn-KitchenSink-7_8_P1.tar.gz"; 30 - sha256 = "05q5hxx7fzcgd8a5i0zk4fwvmnz4xqk04j489irnwm7cka7xdqxw"; 27 + url = "https://github.com/rapier1/openssh-portable/archive/hpn-KitchenSink-8_1_P1.tar.gz"; 28 + sha256 = "1xiv28df9c15h44fv1i93fq8rvkyapjj9vj985ndnw3xk1nvqjyd"; 31 29 } 32 30 else 33 31 fetchurl { 34 32 url = "mirror://openbsd/OpenSSH/portable/${pname}-${version}.tar.gz"; 35 - sha256 = "1zwk3g57gb13br206k6jdhgnp6y1nibwswzraqspbl1m73pxpx82"; 33 + sha256 = "0wg6ckzvvklbzznijxkk28fb8dnwyjd0w30ra0afwv6gwr8m34j3"; 36 34 }; 37 35 38 36 patches = ··· 43 41 ./dont_create_privsep_path.patch 44 42 45 43 ./ssh-keysign.patch 46 - ] ++ optional hpnSupport 47 - # CVE-2018-20685, can probably be dropped with next version bump 48 - # See https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt 49 - # for details 50 - (fetchpatch { 51 - name = "CVE-2018-20685.patch"; 52 - url = https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2.patch; 53 - sha256 = "0q27i9ymr97yb628y44qi4m11hk5qikb1ji1vhvax8hp18lwskds"; 54 - }) 44 + ] 55 45 ++ optional withGssapiPatches (assert withKerberos; gssapiPatch); 56 46 57 47 postPatch = ··· 55 61 56 62 nativeBuildInputs = [ pkgconfig ] ++ optional (hpnSupport || withGssapiPatches) autoreconfHook; 57 63 buildInputs = [ zlib openssl libedit pam ] 64 + ++ optional withFIDO libfido2 58 65 ++ optional withKerberos kerberos; 59 66 60 67 preConfigure = '' ··· 75 80 "--disable-strip" 76 81 (if pam != null then "--with-pam" else "--without-pam") 77 82 ] ++ optional (etcDir != null) "--sysconfdir=${etcDir}" 83 + ++ optional withFIDO "--with-security-key-builtin=yes" 78 84 ++ optional withKerberos (assert kerberos != null; "--with-kerberos5=${kerberos}") 79 85 ++ optional stdenv.isDarwin "--disable-libutil" 80 86 ++ optional (!linkOpenssl) "--without-openssl"; ··· 104 108 license = stdenv.lib.licenses.bsd2; 105 109 platforms = platforms.unix ++ platforms.windows; 106 110 maintainers = with maintainers; [ eelco aneeshusa ]; 107 - broken = hpnSupport; 108 111 }; 109 112 }
+2 -2
pkgs/tools/system/gptfdisk/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "gptfdisk"; 5 - version = "1.0.4"; 5 + version = "1.0.5"; 6 6 7 7 src = fetchurl { 8 8 # https://www.rodsbooks.com/gdisk/${name}.tar.gz also works, but the home 9 9 # page clearly implies a preference for using SourceForge's bandwidth: 10 10 url = "mirror://sourceforge/gptfdisk/${pname}-${version}.tar.gz"; 11 - sha256 = "13d7gff4prl1nsdknjigmb7bbqhn79165n01v4y9mwbnd0d3jqxn"; 11 + sha256 = "0bybgp30pqxb6x5krxazkq4drca0gz4inxj89fpyr204rn3kjz8f"; 12 12 }; 13 13 14 14 postPatch = ''
+17 -7
pkgs/top-level/all-packages.nix
··· 8389 8389 buildPackages = buildPackages // { stdenv = gcc8Stdenv; }; 8390 8390 }); 8391 8391 8392 - go = go_1_13; 8392 + go_1_14 = callPackage ../development/compilers/go/1.14.nix ({ 8393 + inherit (darwin.apple_sdk.frameworks) Security Foundation; 8394 + } // lib.optionalAttrs stdenv.isAarch64 { 8395 + stdenv = gcc8Stdenv; 8396 + buildPackages = buildPackages // { stdenv = gcc8Stdenv; }; 8397 + }); 8398 + 8399 + go = go_1_14; 8393 8400 8394 8401 go-repo-root = callPackage ../development/tools/go-repo-root { }; 8395 8402 ··· 15027 15020 buildGo113Package = callPackage ../development/go-packages/generic { 15028 15021 go = buildPackages.go_1_13; 15029 15022 }; 15023 + buildGo114Package = callPackage ../development/go-packages/generic { 15024 + go = buildPackages.go_1_14; 15025 + }; 15030 15026 15031 - buildGoPackage = buildGo113Package; 15027 + buildGoPackage = buildGo114Package; 15032 15028 15033 15029 buildGo112Module = callPackage ../development/go-modules/generic { 15034 15030 go = buildPackages.go_1_12; 15035 15031 }; 15036 - 15037 15032 buildGo113Module = callPackage ../development/go-modules/generic { 15038 15033 go = buildPackages.go_1_13; 15039 15034 }; 15035 + buildGo114Module = callPackage ../development/go-modules/generic { 15036 + go = buildPackages.go_1_14; 15037 + }; 15040 15038 15041 - buildGoModule = buildGo113Module; 15039 + buildGoModule = buildGo114Module; 15042 15040 15043 15041 go2nix = callPackage ../development/tools/go2nix { }; 15044 15042 ··· 15352 15340 15353 15341 gofish = callPackage ../servers/gopher/gofish { }; 15354 15342 15355 - grafana = callPackage ../servers/monitoring/grafana { 15356 - buildGoPackage = buildGo113Package; 15357 - }; 15343 + grafana = callPackage ../servers/monitoring/grafana { }; 15358 15344 15359 15345 grafana-loki = callPackage ../servers/monitoring/loki { }; 15360 15346