diff --git a/nixos/doc/manual/development/writing-nixos-tests.section.md b/nixos/doc/manual/development/writing-nixos-tests.section.md index a8c54aa66762..d9749d37da79 100644 --- a/nixos/doc/manual/development/writing-nixos-tests.section.md +++ b/nixos/doc/manual/development/writing-nixos-tests.section.md @@ -162,7 +162,9 @@ The following methods are available on machine objects: If the command detaches, it must close stdout, as `execute` will wait for this to consume all output reliably. This can be achieved by redirecting stdout to stderr `>&2`, to `/dev/console`, `/dev/null` or - a file. + a file. Examples of detaching commands are `sleep 365d &`, where the + shell forks a new process that can write to stdout and `xclip -i`, where + the `xclip` command itself forks without closing stdout. Takes an optional parameter `check_return` that defaults to `True`. Setting this parameter to `False` will not check for the return code and return -1 instead. This can be used for commands that shut down @@ -183,7 +185,8 @@ The following methods are available on machine objects: - Dereferencing unset variables fail the command. - - It will wait for stdout to be closed. See `execute`. + - It will wait for stdout to be closed. See `execute` for the + implications. `fail` diff --git a/nixos/doc/manual/from_md/development/writing-nixos-tests.section.xml b/nixos/doc/manual/from_md/development/writing-nixos-tests.section.xml index e0fd90f2bac2..0d523681b639 100644 --- a/nixos/doc/manual/from_md/development/writing-nixos-tests.section.xml +++ b/nixos/doc/manual/from_md/development/writing-nixos-tests.section.xml @@ -271,8 +271,13 @@ start_all() for this to consume all output reliably. This can be achieved by redirecting stdout to stderr >&2, to /dev/console, - /dev/null or a file. Takes an optional - parameter check_return that defaults to + /dev/null or a file. Examples of detaching + commands are sleep 365d &, where the + shell forks a new process that can write to stdout and + xclip -i, where the + xclip command itself forks without closing + stdout. Takes an optional parameter + check_return that defaults to True. Setting this parameter to False will not check for the return code and return -1 instead. This can be used for commands that shut @@ -314,7 +319,7 @@ start_all() It will wait for stdout to be closed. See - execute. + execute for the implications. diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index 52b57596d542..eb14b22b22d8 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -450,9 +450,10 @@ The NixOS VM test framework, pkgs.nixosTest/make-test-python.nix, - now requires non-terminating commands such as - succeed("foo &") to close - stdout. This can be done with a redirect such as + now requires detaching commands such as + succeed("foo &") and + succeed("foo | xclip -i") to + close stdout. This can be done with a redirect such as succeed("foo >&2 &"). This breaking change was necessitated by a race condition causing tests to fail or hang. It applies to all methods that @@ -1858,6 +1859,14 @@ Superuser created successfully. + + + security.pam.services.<name>.makeHomeDir + now uses umask=0077 instead of + umask=0022 when creating the home + directory. + + diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index 1d567ff7f12d..1fe2ae10f586 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -133,7 +133,7 @@ In addition to numerous new and upgraded packages, this release has the followin ## Backward Incompatibilities {#sec-release-21.11-incompatibilities} -- The NixOS VM test framework, `pkgs.nixosTest`/`make-test-python.nix`, now requires non-terminating commands such as `succeed("foo &")` to close stdout. +- The NixOS VM test framework, `pkgs.nixosTest`/`make-test-python.nix`, now requires detaching commands such as `succeed("foo &")` and `succeed("foo | xclip -i")` to close stdout. This can be done with a redirect such as `succeed("foo >&2 &")`. This breaking change was necessitated by a race condition causing tests to fail or hang. It applies to all methods that invoke commands on the nodes, including `execute`, `succeed`, `fail`, `wait_until_succeeds`, `wait_until_fails`. @@ -516,3 +516,5 @@ In addition to numerous new and upgraded packages, this release has the followin - The `services.unifi.dataDir` option is removed and the data is now always located under `/var/lib/unifi/data`. This is done to make better use of systemd state direcotiry and thus making the service restart more reliable. - The unifi logs can now be found under: `/var/log/unifi` instead of `/var/lib/unifi/logs`. - The unifi run directory can now be found under: `/run/unifi` instead of `/var/lib/unifi/run`. + +- `security.pam.services..makeHomeDir` now uses `umask=0077` instead of `umask=0022` when creating the home directory. diff --git a/nixos/modules/security/pam.nix b/nixos/modules/security/pam.nix index 1174d36c1d21..40df6c67ef84 100644 --- a/nixos/modules/security/pam.nix +++ b/nixos/modules/security/pam.nix @@ -529,7 +529,7 @@ let ${optionalString (cfg.ttyAudit.disablePattern != null) "disable=${cfg.ttyAudit.disablePattern}"} "} ${optionalString cfg.makeHomeDir - "session required ${pkgs.pam}/lib/security/pam_mkhomedir.so silent skel=${config.security.pam.makeHomeDir.skelDirectory} umask=0022"} + "session required ${pkgs.pam}/lib/security/pam_mkhomedir.so silent skel=${config.security.pam.makeHomeDir.skelDirectory} umask=0077"} ${optionalString cfg.updateWtmp "session required ${pkgs.pam}/lib/security/pam_lastlog.so silent"} ${optionalString config.security.pam.enableEcryptfs diff --git a/nixos/modules/services/networking/ddclient.nix b/nixos/modules/services/networking/ddclient.nix index 833b0cbcdcf7..fd9c216b0602 100644 --- a/nixos/modules/services/networking/ddclient.nix +++ b/nixos/modules/services/networking/ddclient.nix @@ -28,6 +28,16 @@ let ''; configFile = if (cfg.configFile != null) then cfg.configFile else configFile'; + preStart = '' + install ${configFile} /run/${RuntimeDirectory}/ddclient.conf + ${lib.optionalString (cfg.configFile == null) (if (cfg.passwordFile != null) then '' + password=$(head -n 1 ${cfg.passwordFile}) + sed -i "s/^password=$/password=$password/" /run/${RuntimeDirectory}/ddclient.conf + '' else '' + sed -i '/^password=$/d' /run/${RuntimeDirectory}/ddclient.conf + '')} + ''; + in with lib; @@ -57,6 +67,15 @@ with lib; ''; }; + package = mkOption { + type = package; + default = pkgs.ddclient; + defaultText = "pkgs.ddclient"; + description = '' + The ddclient executable package run by the service. + ''; + }; + domains = mkOption { default = [ "" ]; type = listOf str; @@ -195,20 +214,13 @@ with lib; serviceConfig = { DynamicUser = true; + RuntimeDirectoryMode = "0700"; inherit RuntimeDirectory; inherit StateDirectory; Type = "oneshot"; - ExecStart = "${lib.getBin pkgs.ddclient}/bin/ddclient -file /run/${RuntimeDirectory}/ddclient.conf"; + ExecStartPre = "!${pkgs.writeShellScript "ddclient-prestart" preStart}"; + ExecStart = "${lib.getBin cfg.package}/bin/ddclient -file /run/${RuntimeDirectory}/ddclient.conf"; }; - preStart = '' - install -m 600 ${configFile} /run/${RuntimeDirectory}/ddclient.conf - ${optionalString (cfg.configFile == null) (if (cfg.passwordFile != null) then '' - password=$(head -n 1 ${cfg.passwordFile}) - sed -i "s/^password=$/password=$password/" /run/${RuntimeDirectory}/ddclient.conf - '' else '' - sed -i '/^password=$/d' /run/${RuntimeDirectory}/ddclient.conf - '')} - ''; }; systemd.timers.ddclient = { diff --git a/nixos/modules/services/web-apps/mastodon.nix b/nixos/modules/services/web-apps/mastodon.nix index 2458cb3b5942..7910f3980487 100644 --- a/nixos/modules/services/web-apps/mastodon.nix +++ b/nixos/modules/services/web-apps/mastodon.nix @@ -38,7 +38,7 @@ let // (if cfg.smtp.authenticate then { SMTP_LOGIN = cfg.smtp.user; } else {}) // cfg.extraConfig; - systemCallsList = [ "@clock" "@cpu-emulation" "@debug" "@keyring" "@module" "@mount" "@obsolete" "@raw-io" "@reboot" "@setuid" "@swap" ]; + systemCallsList = [ "@cpu-emulation" "@debug" "@keyring" "@ipc" "@mount" "@obsolete" "@privileged" "@setuid" ]; cfgService = { # User and group @@ -50,6 +50,9 @@ let # Logs directory and mode LogsDirectory = "mastodon"; LogsDirectoryMode = "0750"; + # Proc filesystem + ProcSubset = "pid"; + ProtectProc = "invisible"; # Access write directories UMask = "0027"; # Capabilities @@ -74,6 +77,7 @@ let MemoryDenyWriteExecute = false; RestrictRealtime = true; RestrictSUIDSGID = true; + RemoveIPC = true; PrivateMounts = true; # System Call Filtering SystemCallArchitectures = "native"; @@ -464,7 +468,7 @@ in { Type = "oneshot"; WorkingDirectory = cfg.package; # System Call Filtering - SystemCallFilter = "~" + lib.concatStringsSep " " (systemCallsList ++ [ "@resources" ]); + SystemCallFilter = [ ("~" + lib.concatStringsSep " " (systemCallsList ++ [ "@resources" ])) "@chown" "pipe" "pipe2" ]; } // cfgService; after = [ "network.target" ]; @@ -491,7 +495,7 @@ in { EnvironmentFile = "/var/lib/mastodon/.secrets_env"; WorkingDirectory = cfg.package; # System Call Filtering - SystemCallFilter = "~" + lib.concatStringsSep " " (systemCallsList ++ [ "@resources" ]); + SystemCallFilter = [ ("~" + lib.concatStringsSep " " (systemCallsList ++ [ "@resources" ])) "@chown" "pipe" "pipe2" ]; } // cfgService; after = [ "mastodon-init-dirs.service" "network.target" ] ++ (if databaseActuallyCreateLocally then [ "postgresql.service" ] else []); wantedBy = [ "multi-user.target" ]; @@ -517,7 +521,7 @@ in { RuntimeDirectory = "mastodon-streaming"; RuntimeDirectoryMode = "0750"; # System Call Filtering - SystemCallFilter = "~" + lib.concatStringsSep " " (systemCallsList ++ [ "@privileged" "@resources" ]); + SystemCallFilter = [ ("~" + lib.concatStringsSep " " (systemCallsList ++ [ "@memlock" "@resources" ])) "pipe" "pipe2" ]; } // cfgService; }; @@ -541,7 +545,7 @@ in { RuntimeDirectory = "mastodon-web"; RuntimeDirectoryMode = "0750"; # System Call Filtering - SystemCallFilter = "~" + lib.concatStringsSep " " (systemCallsList ++ [ "@resources" ]); + SystemCallFilter = [ ("~" + lib.concatStringsSep " " (systemCallsList ++ [ "@resources" ])) "@chown" "pipe" "pipe2" ]; } // cfgService; path = with pkgs; [ file imagemagick ffmpeg ]; }; @@ -563,7 +567,7 @@ in { EnvironmentFile = "/var/lib/mastodon/.secrets_env"; WorkingDirectory = cfg.package; # System Call Filtering - SystemCallFilter = "~" + lib.concatStringsSep " " systemCallsList; + SystemCallFilter = [ ("~" + lib.concatStringsSep " " systemCallsList) "@chown" "pipe" "pipe2" ]; } // cfgService; path = with pkgs; [ file imagemagick ffmpeg ]; }; diff --git a/nixos/modules/services/x11/desktop-managers/plasma5.nix b/nixos/modules/services/x11/desktop-managers/plasma5.nix index 52b641e23bdc..8a1793484e23 100644 --- a/nixos/modules/services/x11/desktop-managers/plasma5.nix +++ b/nixos/modules/services/x11/desktop-managers/plasma5.nix @@ -189,6 +189,10 @@ in ]; services.xserver.displayManager.sessionPackages = [ pkgs.libsForQt5.plasma5.plasma-workspace ]; + # Default to be `plasma` (X11) instead of `plasmawayland`, since plasma wayland currently has + # many tiny bugs. + # See: https://github.com/NixOS/nixpkgs/issues/143272 + services.xserver.displayManager.defaultSession = mkDefault "plasma"; security.wrappers = { kcheckpass = { diff --git a/nixos/modules/services/x11/display-managers/default.nix b/nixos/modules/services/x11/display-managers/default.nix index d910ac566d87..bdc46faa7fd0 100644 --- a/nixos/modules/services/x11/display-managers/default.nix +++ b/nixos/modules/services/x11/display-managers/default.nix @@ -280,7 +280,7 @@ in null; example = "gnome"; description = '' - Graphical session to pre-select in the session chooser (only effective for GDM and LightDM). + Graphical session to pre-select in the session chooser (only effective for GDM, LightDM and SDDM). On GDM, LightDM and SDDM, it will also be used as a session for auto-login. ''; diff --git a/nixos/modules/services/x11/display-managers/sddm.nix b/nixos/modules/services/x11/display-managers/sddm.nix index 5a4fad9c4cb1..529a086381f0 100644 --- a/nixos/modules/services/x11/display-managers/sddm.nix +++ b/nixos/modules/services/x11/display-managers/sddm.nix @@ -30,6 +30,9 @@ let HaltCommand = "/run/current-system/systemd/bin/systemctl poweroff"; RebootCommand = "/run/current-system/systemd/bin/systemctl reboot"; Numlock = if cfg.autoNumlock then "on" else "none"; # on, off none + + # Implementation is done via pkgs/applications/display-managers/sddm/sddm-default-session.patch + DefaultSession = optionalString (dmcfg.defaultSession != null) "${dmcfg.defaultSession}.desktop"; }; Theme = { diff --git a/nixos/tests/chromium.nix b/nixos/tests/chromium.nix index 1df4def66374..8965646bc5dc 100644 --- a/nixos/tests/chromium.nix +++ b/nixos/tests/chromium.nix @@ -215,7 +215,7 @@ mapAttrs (channel: chromiumPkg: makeTest rec { clipboard = machine.succeed( ru( - "echo void | ${pkgs.xclip}/bin/xclip -i" + "echo void | ${pkgs.xclip}/bin/xclip -i >&2" ) ) machine.succeed( diff --git a/nixos/tests/seafile.nix b/nixos/tests/seafile.nix index 17862cff189e..70b9ba55457e 100644 --- a/nixos/tests/seafile.nix +++ b/nixos/tests/seafile.nix @@ -6,7 +6,7 @@ import ./make-test-python.nix ({ pkgs, ... }: }; in { name = "seafile"; - meta = with pkgs.stdenv.lib.maintainers; { + meta = with pkgs.lib.maintainers; { maintainers = [ kampfschlaefer schmittlauch ]; }; diff --git a/nixos/tests/systemd-boot.nix b/nixos/tests/systemd-boot.nix index 8c9d3d19f2aa..c3899b58d6b3 100644 --- a/nixos/tests/systemd-boot.nix +++ b/nixos/tests/systemd-boot.nix @@ -42,7 +42,7 @@ in # Check that specialisations create corresponding boot entries. specialisation = makeTest { name = "systemd-boot-specialisation"; - meta.maintainers = with pkgs.stdenv.lib.maintainers; [ lukegb ]; + meta.maintainers = with pkgs.lib.maintainers; [ lukegb ]; machine = { pkgs, lib, ... }: { imports = [ common ]; diff --git a/pkgs/applications/display-managers/sddm/default.nix b/pkgs/applications/display-managers/sddm/default.nix index 091498fae003..c75aba9d2615 100644 --- a/pkgs/applications/display-managers/sddm/default.nix +++ b/pkgs/applications/display-managers/sddm/default.nix @@ -19,6 +19,7 @@ in mkDerivation { patches = [ ./sddm-ignore-config-mtime.patch + ./sddm-default-session.patch # Load `/etc/profile` for `environment.variables` with zsh default shell. # See: https://github.com/sddm/sddm/pull/1382 (fetchpatch { diff --git a/pkgs/applications/display-managers/sddm/sddm-default-session.patch b/pkgs/applications/display-managers/sddm/sddm-default-session.patch new file mode 100644 index 000000000000..455ebbd41577 --- /dev/null +++ b/pkgs/applications/display-managers/sddm/sddm-default-session.patch @@ -0,0 +1,71 @@ +diff --git a/src/common/Configuration.h b/src/common/Configuration.h +index cf44a62..7bb9c03 100644 +--- a/src/common/Configuration.h ++++ b/src/common/Configuration.h +@@ -44,6 +44,7 @@ namespace SDDM { + "NOTE: Currently ignored if autologin is enabled.")); + Entry(InputMethod, QString, QStringLiteral("qtvirtualkeyboard"), _S("Input method module")); + Entry(Namespaces, QStringList, QStringList(), _S("Comma-separated list of Linux namespaces for user session to enter")); ++ Entry(DefaultSession, QString, QString(), _S("System-wide default session")); + // Name Entries (but it's a regular class again) + Section(Theme, + Entry(ThemeDir, QString, _S(DATA_INSTALL_DIR "/themes"), _S("Theme directory path")); +diff --git a/src/greeter/SessionModel.cpp b/src/greeter/SessionModel.cpp +index 1953c76..54fe2f2 100644 +--- a/src/greeter/SessionModel.cpp ++++ b/src/greeter/SessionModel.cpp +@@ -43,6 +43,7 @@ namespace SDDM { + beginResetModel(); + populate(Session::WaylandSession, mainConfig.Wayland.SessionDir.get()); + populate(Session::X11Session, mainConfig.X11.SessionDir.get()); ++ selectDefaultSession(); + endResetModel(); + + // refresh everytime a file is changed, added or removed +@@ -52,6 +53,7 @@ namespace SDDM { + d->sessions.clear(); + populate(Session::WaylandSession, mainConfig.Wayland.SessionDir.get()); + populate(Session::X11Session, mainConfig.X11.SessionDir.get()); ++ selectDefaultSession(); + endResetModel(); + }); + watcher->addPath(mainConfig.Wayland.SessionDir.get()); +@@ -149,11 +151,25 @@ namespace SDDM { + else + delete si; + } ++ } ++ ++ void SessionModel::selectDefaultSession() { ++ d->lastIndex = 0; ++ + // find out index of the last session + for (int i = 0; i < d->sessions.size(); ++i) { + if (d->sessions.at(i)->fileName() == stateConfig.Last.Session.get()) { + d->lastIndex = i; +- break; ++ return; ++ } ++ } ++ ++ // Otherwise, fallback to system-wide default session. ++ auto defaultSession = mainConfig.DefaultSession.get(); ++ for (int i = 0; i < d->sessions.size(); ++i) { ++ if (QFileInfo(d->sessions.at(i)->fileName()).fileName() == defaultSession) { ++ d->lastIndex = i; ++ return; + } + } + } +diff --git a/src/greeter/SessionModel.h b/src/greeter/SessionModel.h +index 2e2efa9..a93315c 100644 +--- a/src/greeter/SessionModel.h ++++ b/src/greeter/SessionModel.h +@@ -58,6 +58,7 @@ namespace SDDM { + SessionModelPrivate *d { nullptr }; + + void populate(Session::Type type, const QString &path); ++ void selectDefaultSession(); + }; + } + diff --git a/pkgs/applications/misc/koreader/default.nix b/pkgs/applications/misc/koreader/default.nix index af66e2282b40..3d11162241eb 100644 --- a/pkgs/applications/misc/koreader/default.nix +++ b/pkgs/applications/misc/koreader/default.nix @@ -13,12 +13,12 @@ let font-droid = nerdfonts.override { fonts = [ "DroidSansMono" ]; }; in stdenv.mkDerivation rec { pname = "koreader"; - version = "2021.09"; + version = "2021.10.1"; src = fetchurl { url = "https://github.com/koreader/koreader/releases/download/v${version}/koreader-${version}-amd64.deb"; - sha256 = "1q2mbmczx2y5ylriq4k3lbjlpw4pwfq2vvcx06ymax31fsrvix84"; + sha256 = "sha256-UpDwexBfjlne/uNMTtNjIyZb3TDMYFeDvtwtTFARovw="; }; sourceRoot = "."; diff --git a/pkgs/applications/misc/pipr/default.nix b/pkgs/applications/misc/pipr/default.nix index 96627f5cccb5..2f5ba3e6d9cb 100644 --- a/pkgs/applications/misc/pipr/default.nix +++ b/pkgs/applications/misc/pipr/default.nix @@ -7,16 +7,16 @@ rustPlatform.buildRustPackage rec { pname = "pipr"; - version = "0.0.15"; + version = "0.0.16"; src = fetchFromGitHub { owner = "ElKowar"; repo = pname; rev = "v${version}"; - sha256 = "1pbj198nqi27kavz9bm31a3h7h70by6l00046x09yf9n8qjpp01w"; + sha256 = "sha256-6jtUNhib6iveuZ7qUKK7AllyMKFpZ8OUUaIieFqseY8="; }; - cargoSha256 = "05ryaxi479fxzdcl51r1xlqbiasfzxcxgvl4wnxync8qi8q2yqk0"; + cargoSha256 = "sha256-SLOiX8z8LuQ9VA/lg0lOhqs85MGs0vmeP74cS6sgghI="; nativeBuildInputs = [ makeWrapper ]; postFixup = '' diff --git a/pkgs/applications/networking/browsers/chromium/upstream-info.json b/pkgs/applications/networking/browsers/chromium/upstream-info.json index acc11144def9..d10615fdec27 100644 --- a/pkgs/applications/networking/browsers/chromium/upstream-info.json +++ b/pkgs/applications/networking/browsers/chromium/upstream-info.json @@ -18,9 +18,9 @@ } }, "beta": { - "version": "96.0.4664.27", - "sha256": "1ym9llqmkhlnrmawc0dcnzkvr714kykvdcldkar5yqp0x46k7bi6", - "sha256bin64": "1x4y589qmiz0zgkpv17phcl8h5c7qankpfvv6c42w5bysx6mn1f7", + "version": "96.0.4664.35", + "sha256": "047zc1hl5iwhrgnypl7r5ga2cx1yz26lf1x5cnvdqmarmmkq380m", + "sha256bin64": "1cw89fafxxhr85x4vzhxv3jkmqfnxjisc7gj9v8y2ixqpn190hjl", "deps": { "gn": { "version": "2021-09-24", @@ -31,15 +31,15 @@ } }, "dev": { - "version": "97.0.4682.3", - "sha256": "1z2d3r3d4g3ng1p73s243jllvvfkh085vvqz0vaa6pv7c9631pn4", - "sha256bin64": "0xravg4jjbwj7vifabz94mfammv0zx754hpa6kynjaqzvlxbax2a", + "version": "97.0.4688.2", + "sha256": "0a5i64gxb24z5mfvmf50g4fafvqqbj7k5077arnhwzp3xiznld88", + "sha256bin64": "0l70qlna8x05rrlcfgv2xyl8g5nlmd42i8n0yc9dw3mwq8m4c4db", "deps": { "gn": { - "version": "2021-10-08", + "version": "2021-10-30", "url": "https://gn.googlesource.com/gn", - "rev": "693f9fb87e4febdd4299db9f73d8d2c958e63148", - "sha256": "1qfjj2mdpflry4f9fkagvb76zwfibys4nqz9lddy1zh5nnbd9mff" + "rev": "8926696a4186279489cc2b8d768533e61bba73d7", + "sha256": "1084lnyb0a1khbgjvak05fcx6jy973wqvsf77n0alxjys18sg2yk" } } }, diff --git a/pkgs/applications/networking/cluster/nixops/poetry-git-overlay.nix b/pkgs/applications/networking/cluster/nixops/poetry-git-overlay.nix index 75b9471c9e09..b542a1eff955 100644 --- a/pkgs/applications/networking/cluster/nixops/poetry-git-overlay.nix +++ b/pkgs/applications/networking/cluster/nixops/poetry-git-overlay.nix @@ -15,8 +15,8 @@ self: super: { _: { src = pkgs.fetchgit { url = "https://github.com/NixOS/nixops-aws.git"; - rev = "371aedeb7fd53b8978a60dd7c37d3a6c38101c48"; - sha256 = "15jz9x3ra3hsh6xj4cbri1fvvjk2rplnnhnccz7qc6f176b5r01j"; + rev = "44f774272bd522cc7e87074c056f2225f771ded0"; + sha256 = "0x9pv186nkcfisr1c1nxw8gpazkrg546dfl95140rif0xzw3pizx"; }; } ); diff --git a/pkgs/applications/networking/cluster/nixops/poetry.lock b/pkgs/applications/networking/cluster/nixops/poetry.lock index 87d8fce2f23c..642b063368c6 100644 --- a/pkgs/applications/networking/cluster/nixops/poetry.lock +++ b/pkgs/applications/networking/cluster/nixops/poetry.lock @@ -38,14 +38,14 @@ python-versions = "*" [[package]] name = "boto3" -version = "1.18.64" +version = "1.19.9" description = "The AWS SDK for Python" category = "main" optional = false python-versions = ">= 3.6" [package.dependencies] -botocore = ">=1.21.64,<1.22.0" +botocore = ">=1.22.9,<1.23.0" jmespath = ">=0.7.1,<1.0.0" s3transfer = ">=0.5.0,<0.6.0" @@ -54,7 +54,7 @@ crt = ["botocore[crt] (>=1.21.0,<2.0a0)"] [[package]] name = "botocore" -version = "1.21.64" +version = "1.22.9" description = "Low-level, data-driven core of boto 3." category = "main" optional = false @@ -173,7 +173,7 @@ python-versions = ">=2.6, !=3.0.*, !=3.1.*, !=3.2.*" [[package]] name = "libvirt-python" -version = "7.8.0" +version = "7.9.0" description = "The libvirt virtualization API python binding" category = "main" optional = false @@ -228,7 +228,7 @@ typing-extensions = "^3.7.4" type = "git" url = "https://github.com/NixOS/nixops-aws.git" reference = "master" -resolved_reference = "371aedeb7fd53b8978a60dd7c37d3a6c38101c48" +resolved_reference = "44f774272bd522cc7e87074c056f2225f771ded0" [[package]] name = "nixops-encrypted-links" @@ -344,14 +344,14 @@ resolved_reference = "81a1c2ef424dcf596a97b2e46a58ca73a1dd1ff8" [[package]] name = "packaging" -version = "21.0" +version = "21.2" description = "Core utilities for Python packages" category = "dev" optional = false python-versions = ">=3.6" [package.dependencies] -pyparsing = ">=2.0.2" +pyparsing = ">=2.0.2,<3" [[package]] name = "pluggy" @@ -621,12 +621,12 @@ boto = [ {file = "boto-2.49.0.tar.gz", hash = "sha256:ea0d3b40a2d852767be77ca343b58a9e3a4b00d9db440efb8da74b4e58025e5a"}, ] boto3 = [ - {file = "boto3-1.18.64-py3-none-any.whl", hash = "sha256:b4d6299dd16a3042b7750cde00fe38d57fd59d3ce242308ba8488618ca931694"}, - {file = "boto3-1.18.64.tar.gz", hash = "sha256:9223b433b0d3b74f2b9574fb3c384048998343ccd6b608044318a7f9b904f661"}, + {file = "boto3-1.19.9-py3-none-any.whl", hash = "sha256:efa4aea4d30e93f8913a5731ab4de7b6d2020ee77cdde7e61bfae56670da1a14"}, + {file = "boto3-1.19.9.tar.gz", hash = "sha256:2fe4edec0e02705059e6baac52e29f97fae6086bf8b817e6ca0e49b48c0fbbf2"}, ] botocore = [ - {file = "botocore-1.21.64-py3-none-any.whl", hash = "sha256:d57287377e4c7c7d7bf6c5fa39e02994de1d99fced9492a58a00e5a54bae1cca"}, - {file = "botocore-1.21.64.tar.gz", hash = "sha256:0a30dca4dad7d43fd856e671ace95f9afc4726caa1e22f0ae11b654fc76e0c7d"}, + {file = "botocore-1.22.9-py3-none-any.whl", hash = "sha256:612d26b58f790d267cc7714e82262104b681db799655b6dd6b64fcd9caf08bef"}, + {file = "botocore-1.22.9.tar.gz", hash = "sha256:7b59367bace96595e9feeed9765c7178278c55531b2b9e07b7618911e9f0a00b"}, ] certifi = [ {file = "certifi-2021.10.8-py2.py3-none-any.whl", hash = "sha256:d62a0163eb4c2344ac042ab2bdf75399a71a2d8c7d47eac2e2ee91b9d6339569"}, @@ -699,6 +699,8 @@ cryptography = [ {file = "cryptography-3.4.8-cp36-abi3-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:34dae04a0dce5730d8eb7894eab617d8a70d0c97da76b905de9efb7128ad7085"}, {file = "cryptography-3.4.8-cp36-abi3-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:1eb7bb0df6f6f583dd8e054689def236255161ebbcf62b226454ab9ec663746b"}, {file = "cryptography-3.4.8-cp36-abi3-manylinux_2_24_x86_64.whl", hash = "sha256:9965c46c674ba8cc572bc09a03f4c649292ee73e1b683adb1ce81e82e9a6a0fb"}, + {file = "cryptography-3.4.8-cp36-abi3-musllinux_1_1_aarch64.whl", hash = "sha256:3c4129fc3fdc0fa8e40861b5ac0c673315b3c902bbdc05fc176764815b43dd1d"}, + {file = "cryptography-3.4.8-cp36-abi3-musllinux_1_1_x86_64.whl", hash = "sha256:695104a9223a7239d155d7627ad912953b540929ef97ae0c34c7b8bf30857e89"}, {file = "cryptography-3.4.8-cp36-abi3-win32.whl", hash = "sha256:21ca464b3a4b8d8e86ba0ee5045e103a1fcfac3b39319727bc0fc58c09c6aff7"}, {file = "cryptography-3.4.8-cp36-abi3-win_amd64.whl", hash = "sha256:3520667fda779eb788ea00080124875be18f2d8f0848ec00733c0ec3bb8219fc"}, {file = "cryptography-3.4.8-pp36-pypy36_pp73-manylinux_2_12_x86_64.manylinux2010_x86_64.whl", hash = "sha256:d2a6e5ef66503da51d2110edf6c403dc6b494cc0082f85db12f54e9c5d4c3ec5"}, @@ -732,15 +734,31 @@ jmespath = [ {file = "jmespath-0.10.0.tar.gz", hash = "sha256:b85d0567b8666149a93172712e68920734333c0ce7e89b78b3e987f71e5ed4f9"}, ] libvirt-python = [ - {file = "libvirt-python-7.8.0.tar.gz", hash = "sha256:9d07416d66805bf1a17f34491b3ced2ac6c42b6a012ddf9177e0e3ae1b103fd5"}, + {file = "libvirt-python-7.9.0.tar.gz", hash = "sha256:8535cffa5fbf05185648f9f57a2f71899c3bc12c897d320351c53725a48e5359"}, ] markupsafe = [ + {file = "MarkupSafe-2.0.1-cp310-cp310-macosx_10_9_universal2.whl", hash = "sha256:d8446c54dc28c01e5a2dbac5a25f071f6653e6e40f3a8818e8b45d790fe6ef53"}, + {file = "MarkupSafe-2.0.1-cp310-cp310-macosx_10_9_x86_64.whl", hash = "sha256:36bc903cbb393720fad60fc28c10de6acf10dc6cc883f3e24ee4012371399a38"}, + {file = "MarkupSafe-2.0.1-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:2d7d807855b419fc2ed3e631034685db6079889a1f01d5d9dac950f764da3dad"}, + {file = "MarkupSafe-2.0.1-cp310-cp310-manylinux_2_5_i686.manylinux1_i686.manylinux_2_12_i686.manylinux2010_i686.whl", hash = "sha256:add36cb2dbb8b736611303cd3bfcee00afd96471b09cda130da3581cbdc56a6d"}, + {file = "MarkupSafe-2.0.1-cp310-cp310-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_12_x86_64.manylinux2010_x86_64.whl", hash = "sha256:168cd0a3642de83558a5153c8bd34f175a9a6e7f6dc6384b9655d2697312a646"}, + {file = "MarkupSafe-2.0.1-cp310-cp310-musllinux_1_1_aarch64.whl", hash = "sha256:4dc8f9fb58f7364b63fd9f85013b780ef83c11857ae79f2feda41e270468dd9b"}, + {file = "MarkupSafe-2.0.1-cp310-cp310-musllinux_1_1_i686.whl", hash = "sha256:20dca64a3ef2d6e4d5d615a3fd418ad3bde77a47ec8a23d984a12b5b4c74491a"}, + {file = "MarkupSafe-2.0.1-cp310-cp310-musllinux_1_1_x86_64.whl", hash = "sha256:cdfba22ea2f0029c9261a4bd07e830a8da012291fbe44dc794e488b6c9bb353a"}, + {file = "MarkupSafe-2.0.1-cp310-cp310-win32.whl", hash = "sha256:99df47edb6bda1249d3e80fdabb1dab8c08ef3975f69aed437cb69d0a5de1e28"}, + {file = "MarkupSafe-2.0.1-cp310-cp310-win_amd64.whl", hash = "sha256:e0f138900af21926a02425cf736db95be9f4af72ba1bb21453432a07f6082134"}, {file = "MarkupSafe-2.0.1-cp36-cp36m-macosx_10_9_x86_64.whl", hash = "sha256:f9081981fe268bd86831e5c75f7de206ef275defcb82bc70740ae6dc507aee51"}, {file = "MarkupSafe-2.0.1-cp36-cp36m-manylinux1_i686.whl", hash = "sha256:0955295dd5eec6cb6cc2fe1698f4c6d84af2e92de33fbcac4111913cd100a6ff"}, {file = "MarkupSafe-2.0.1-cp36-cp36m-manylinux1_x86_64.whl", hash = "sha256:0446679737af14f45767963a1a9ef7620189912317d095f2d9ffa183a4d25d2b"}, {file = "MarkupSafe-2.0.1-cp36-cp36m-manylinux2010_i686.whl", hash = "sha256:f826e31d18b516f653fe296d967d700fddad5901ae07c622bb3705955e1faa94"}, {file = "MarkupSafe-2.0.1-cp36-cp36m-manylinux2010_x86_64.whl", hash = "sha256:fa130dd50c57d53368c9d59395cb5526eda596d3ffe36666cd81a44d56e48872"}, {file = "MarkupSafe-2.0.1-cp36-cp36m-manylinux2014_aarch64.whl", hash = "sha256:905fec760bd2fa1388bb5b489ee8ee5f7291d692638ea5f67982d968366bef9f"}, + {file = "MarkupSafe-2.0.1-cp36-cp36m-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:bf5d821ffabf0ef3533c39c518f3357b171a1651c1ff6827325e4489b0e46c3c"}, + {file = "MarkupSafe-2.0.1-cp36-cp36m-manylinux_2_5_i686.manylinux1_i686.manylinux_2_12_i686.manylinux2010_i686.whl", hash = "sha256:0d4b31cc67ab36e3392bbf3862cfbadac3db12bdd8b02a2731f509ed5b829724"}, + {file = "MarkupSafe-2.0.1-cp36-cp36m-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_12_x86_64.manylinux2010_x86_64.whl", hash = "sha256:baa1a4e8f868845af802979fcdbf0bb11f94f1cb7ced4c4b8a351bb60d108145"}, + {file = "MarkupSafe-2.0.1-cp36-cp36m-musllinux_1_1_aarch64.whl", hash = "sha256:deb993cacb280823246a026e3b2d81c493c53de6acfd5e6bfe31ab3402bb37dd"}, + {file = "MarkupSafe-2.0.1-cp36-cp36m-musllinux_1_1_i686.whl", hash = "sha256:63f3268ba69ace99cab4e3e3b5840b03340efed0948ab8f78d2fd87ee5442a4f"}, + {file = "MarkupSafe-2.0.1-cp36-cp36m-musllinux_1_1_x86_64.whl", hash = "sha256:8d206346619592c6200148b01a2142798c989edcb9c896f9ac9722a99d4e77e6"}, {file = "MarkupSafe-2.0.1-cp36-cp36m-win32.whl", hash = "sha256:6c4ca60fa24e85fe25b912b01e62cb969d69a23a5d5867682dd3e80b5b02581d"}, {file = "MarkupSafe-2.0.1-cp36-cp36m-win_amd64.whl", hash = "sha256:b2f4bf27480f5e5e8ce285a8c8fd176c0b03e93dcc6646477d4630e83440c6a9"}, {file = "MarkupSafe-2.0.1-cp37-cp37m-macosx_10_9_x86_64.whl", hash = "sha256:0717a7390a68be14b8c793ba258e075c6f4ca819f15edfc2a3a027c823718567"}, @@ -749,14 +767,27 @@ markupsafe = [ {file = "MarkupSafe-2.0.1-cp37-cp37m-manylinux2010_i686.whl", hash = "sha256:d7f9850398e85aba693bb640262d3611788b1f29a79f0c93c565694658f4071f"}, {file = "MarkupSafe-2.0.1-cp37-cp37m-manylinux2010_x86_64.whl", hash = "sha256:6a7fae0dd14cf60ad5ff42baa2e95727c3d81ded453457771d02b7d2b3f9c0c2"}, {file = "MarkupSafe-2.0.1-cp37-cp37m-manylinux2014_aarch64.whl", hash = "sha256:b7f2d075102dc8c794cbde1947378051c4e5180d52d276987b8d28a3bd58c17d"}, + {file = "MarkupSafe-2.0.1-cp37-cp37m-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:e9936f0b261d4df76ad22f8fee3ae83b60d7c3e871292cd42f40b81b70afae85"}, + {file = "MarkupSafe-2.0.1-cp37-cp37m-manylinux_2_5_i686.manylinux1_i686.manylinux_2_12_i686.manylinux2010_i686.whl", hash = "sha256:2a7d351cbd8cfeb19ca00de495e224dea7e7d919659c2841bbb7f420ad03e2d6"}, + {file = "MarkupSafe-2.0.1-cp37-cp37m-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_12_x86_64.manylinux2010_x86_64.whl", hash = "sha256:60bf42e36abfaf9aff1f50f52644b336d4f0a3fd6d8a60ca0d054ac9f713a864"}, + {file = "MarkupSafe-2.0.1-cp37-cp37m-musllinux_1_1_aarch64.whl", hash = "sha256:d6c7ebd4e944c85e2c3421e612a7057a2f48d478d79e61800d81468a8d842207"}, + {file = "MarkupSafe-2.0.1-cp37-cp37m-musllinux_1_1_i686.whl", hash = "sha256:f0567c4dc99f264f49fe27da5f735f414c4e7e7dd850cfd8e69f0862d7c74ea9"}, + {file = "MarkupSafe-2.0.1-cp37-cp37m-musllinux_1_1_x86_64.whl", hash = "sha256:89c687013cb1cd489a0f0ac24febe8c7a666e6e221b783e53ac50ebf68e45d86"}, {file = "MarkupSafe-2.0.1-cp37-cp37m-win32.whl", hash = "sha256:a30e67a65b53ea0a5e62fe23682cfe22712e01f453b95233b25502f7c61cb415"}, {file = "MarkupSafe-2.0.1-cp37-cp37m-win_amd64.whl", hash = "sha256:611d1ad9a4288cf3e3c16014564df047fe08410e628f89805e475368bd304914"}, + {file = "MarkupSafe-2.0.1-cp38-cp38-macosx_10_9_universal2.whl", hash = "sha256:5bb28c636d87e840583ee3adeb78172efc47c8b26127267f54a9c0ec251d41a9"}, {file = "MarkupSafe-2.0.1-cp38-cp38-macosx_10_9_x86_64.whl", hash = "sha256:be98f628055368795d818ebf93da628541e10b75b41c559fdf36d104c5787066"}, {file = "MarkupSafe-2.0.1-cp38-cp38-manylinux1_i686.whl", hash = "sha256:1d609f577dc6e1aa17d746f8bd3c31aa4d258f4070d61b2aa5c4166c1539de35"}, {file = "MarkupSafe-2.0.1-cp38-cp38-manylinux1_x86_64.whl", hash = "sha256:7d91275b0245b1da4d4cfa07e0faedd5b0812efc15b702576d103293e252af1b"}, {file = "MarkupSafe-2.0.1-cp38-cp38-manylinux2010_i686.whl", hash = "sha256:01a9b8ea66f1658938f65b93a85ebe8bc016e6769611be228d797c9d998dd298"}, {file = "MarkupSafe-2.0.1-cp38-cp38-manylinux2010_x86_64.whl", hash = "sha256:47ab1e7b91c098ab893b828deafa1203de86d0bc6ab587b160f78fe6c4011f75"}, {file = "MarkupSafe-2.0.1-cp38-cp38-manylinux2014_aarch64.whl", hash = "sha256:97383d78eb34da7e1fa37dd273c20ad4320929af65d156e35a5e2d89566d9dfb"}, + {file = "MarkupSafe-2.0.1-cp38-cp38-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:6fcf051089389abe060c9cd7caa212c707e58153afa2c649f00346ce6d260f1b"}, + {file = "MarkupSafe-2.0.1-cp38-cp38-manylinux_2_5_i686.manylinux1_i686.manylinux_2_12_i686.manylinux2010_i686.whl", hash = "sha256:5855f8438a7d1d458206a2466bf82b0f104a3724bf96a1c781ab731e4201731a"}, + {file = "MarkupSafe-2.0.1-cp38-cp38-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_12_x86_64.manylinux2010_x86_64.whl", hash = "sha256:3dd007d54ee88b46be476e293f48c85048603f5f516008bee124ddd891398ed6"}, + {file = "MarkupSafe-2.0.1-cp38-cp38-musllinux_1_1_aarch64.whl", hash = "sha256:aca6377c0cb8a8253e493c6b451565ac77e98c2951c45f913e0b52facdcff83f"}, + {file = "MarkupSafe-2.0.1-cp38-cp38-musllinux_1_1_i686.whl", hash = "sha256:04635854b943835a6ea959e948d19dcd311762c5c0c6e1f0e16ee57022669194"}, + {file = "MarkupSafe-2.0.1-cp38-cp38-musllinux_1_1_x86_64.whl", hash = "sha256:6300b8454aa6930a24b9618fbb54b5a68135092bc666f7b06901f897fa5c2fee"}, {file = "MarkupSafe-2.0.1-cp38-cp38-win32.whl", hash = "sha256:023cb26ec21ece8dc3907c0e8320058b2e0cb3c55cf9564da612bc325bed5e64"}, {file = "MarkupSafe-2.0.1-cp38-cp38-win_amd64.whl", hash = "sha256:984d76483eb32f1bcb536dc27e4ad56bba4baa70be32fa87152832cdd9db0833"}, {file = "MarkupSafe-2.0.1-cp39-cp39-macosx_10_9_universal2.whl", hash = "sha256:2ef54abee730b502252bcdf31b10dacb0a416229b72c18b19e24a4509f273d26"}, @@ -766,6 +797,12 @@ markupsafe = [ {file = "MarkupSafe-2.0.1-cp39-cp39-manylinux2010_i686.whl", hash = "sha256:4efca8f86c54b22348a5467704e3fec767b2db12fc39c6d963168ab1d3fc9135"}, {file = "MarkupSafe-2.0.1-cp39-cp39-manylinux2010_x86_64.whl", hash = "sha256:ab3ef638ace319fa26553db0624c4699e31a28bb2a835c5faca8f8acf6a5a902"}, {file = "MarkupSafe-2.0.1-cp39-cp39-manylinux2014_aarch64.whl", hash = "sha256:f8ba0e8349a38d3001fae7eadded3f6606f0da5d748ee53cc1dab1d6527b9509"}, + {file = "MarkupSafe-2.0.1-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:c47adbc92fc1bb2b3274c4b3a43ae0e4573d9fbff4f54cd484555edbf030baf1"}, + {file = "MarkupSafe-2.0.1-cp39-cp39-manylinux_2_5_i686.manylinux1_i686.manylinux_2_12_i686.manylinux2010_i686.whl", hash = "sha256:37205cac2a79194e3750b0af2a5720d95f786a55ce7df90c3af697bfa100eaac"}, + {file = "MarkupSafe-2.0.1-cp39-cp39-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_12_x86_64.manylinux2010_x86_64.whl", hash = "sha256:1f2ade76b9903f39aa442b4aadd2177decb66525062db244b35d71d0ee8599b6"}, + {file = "MarkupSafe-2.0.1-cp39-cp39-musllinux_1_1_aarch64.whl", hash = "sha256:4296f2b1ce8c86a6aea78613c34bb1a672ea0e3de9c6ba08a960efe0b0a09047"}, + {file = "MarkupSafe-2.0.1-cp39-cp39-musllinux_1_1_i686.whl", hash = "sha256:9f02365d4e99430a12647f09b6cc8bab61a6564363f313126f775eb4f6ef798e"}, + {file = "MarkupSafe-2.0.1-cp39-cp39-musllinux_1_1_x86_64.whl", hash = "sha256:5b6d930f030f8ed98e3e6c98ffa0652bdb82601e7a016ec2ab5d7ff23baa78d1"}, {file = "MarkupSafe-2.0.1-cp39-cp39-win32.whl", hash = "sha256:10f82115e21dc0dfec9ab5c0223652f7197feb168c940f3ef61563fc2d6beb74"}, {file = "MarkupSafe-2.0.1-cp39-cp39-win_amd64.whl", hash = "sha256:693ce3f9e70a6cf7d2fb9e6c9d8b204b6b39897a2c4a1aa65728d5ac97dcc1d8"}, {file = "MarkupSafe-2.0.1.tar.gz", hash = "sha256:594c67807fb16238b30c44bdf74f36c02cdf22d1c8cda91ef8a0ed8dabf5620a"}, @@ -779,8 +816,8 @@ nixops-virtd = [] nixopsvbox = [] nixos-modules-contrib = [] packaging = [ - {file = "packaging-21.0-py3-none-any.whl", hash = "sha256:c86254f9220d55e31cc94d69bade760f0847da8000def4dfe1c6b872fd14ff14"}, - {file = "packaging-21.0.tar.gz", hash = "sha256:7dc96269f53a4ccec5c0670940a4281106dd0bb343f47b7471f779df49c2fbe7"}, + {file = "packaging-21.2-py3-none-any.whl", hash = "sha256:14317396d1e8cdb122989b916fa2c7e9ca8e2be9e8060a6eff75b6b7b4d8a7e0"}, + {file = "packaging-21.2.tar.gz", hash = "sha256:096d689d78ca690e4cd8a89568ba06d07ca097e3306a4381635073ca91479966"}, ] pluggy = [ {file = "pluggy-0.13.1-py2.py3-none-any.whl", hash = "sha256:966c145cd83c96502c3c3868f50408687b38434af77734af1e9ca461a4081d2d"}, diff --git a/pkgs/applications/networking/instant-messengers/pidgin-plugins/purple-lurch/default.nix b/pkgs/applications/networking/instant-messengers/pidgin-plugins/purple-lurch/default.nix index 2170aac16e05..c0497ed86ce1 100644 --- a/pkgs/applications/networking/instant-messengers/pidgin-plugins/purple-lurch/default.nix +++ b/pkgs/applications/networking/instant-messengers/pidgin-plugins/purple-lurch/default.nix @@ -2,13 +2,13 @@ stdenv.mkDerivation rec { pname = "purple-lurch"; - version = "0.6.7"; + version = "0.7.0"; src = fetchFromGitHub { owner = "gkdr"; repo = "lurch"; rev = "v${version}"; - sha256 = "029jjqinsfhpv0zgji3sv1cyk54fn9qp176fwy97d1clf0vflxrz"; + sha256 = "sha256-yyzotKL1Z4B2BxloJndJKemONMPLG9pVDVe2K5AL05g="; fetchSubmodules = true; }; diff --git a/pkgs/applications/networking/mullvad-vpn/default.nix b/pkgs/applications/networking/mullvad-vpn/default.nix index 4a5b5708aaca..e03d6fa23f5a 100644 --- a/pkgs/applications/networking/mullvad-vpn/default.nix +++ b/pkgs/applications/networking/mullvad-vpn/default.nix @@ -72,7 +72,7 @@ stdenv.mkDerivation rec { mv usr/bin/* $out/bin mv opt/Mullvad\ VPN/* $out/share/mullvad - sed -i 's|\/opt\/Mullvad.*VPN|env MULLVAD_DISABLE_UPDATE_NOTIFICATION=1 '$out'/bin|g' $out/share/applications/mullvad-vpn.desktop + sed -i 's|"\/opt\/Mullvad.*VPN|env MULLVAD_DISABLE_UPDATE_NOTIFICATION=1 "'$out'/bin|g' $out/share/applications/mullvad-vpn.desktop ln -s $out/share/mullvad/mullvad-{gui,vpn} $out/bin/ ln -s $out/share/mullvad/resources/mullvad-daemon $out/bin/mullvad-daemon diff --git a/pkgs/applications/networking/nextdns/default.nix b/pkgs/applications/networking/nextdns/default.nix index 561a1c77b1ca..ae7eb49a1c66 100644 --- a/pkgs/applications/networking/nextdns/default.nix +++ b/pkgs/applications/networking/nextdns/default.nix @@ -2,13 +2,13 @@ buildGoModule rec { pname = "nextdns"; - version = "1.37.2"; + version = "1.37.3"; src = fetchFromGitHub { owner = "nextdns"; repo = "nextdns"; rev = "v${version}"; - sha256 = "sha256-R0n/wRCaQ8WvQer3bBLUmOdIojtfjXU0bs0pTn7L0lc="; + sha256 = "sha256-BCDVn4JaRYIexI7NrRDchUl9u4AEJa+An9ItYYJDs3A="; }; vendorSha256 = "sha256-YZm+DUrH+1xdJrGjmlajbcsnqVODVbZKivVjmqZ2e48="; diff --git a/pkgs/applications/video/openshot-qt/default.nix b/pkgs/applications/video/openshot-qt/default.nix index ac396f4be80a..bb6bfa637cec 100644 --- a/pkgs/applications/video/openshot-qt/default.nix +++ b/pkgs/applications/video/openshot-qt/default.nix @@ -1,7 +1,14 @@ -{ lib, stdenv, mkDerivationWith, fetchFromGitHub, fetchpatch -, doxygen, python3Packages, libopenshot -, wrapGAppsHook, gtk3 -, qtsvg }: +{ lib +, stdenv +, mkDerivationWith +, fetchFromGitHub +, doxygen +, gtk3 +, libopenshot +, python3Packages +, qtsvg +, wrapGAppsHook +}: mkDerivationWith python3Packages.buildPythonApplication rec { pname = "openshot-qt"; @@ -14,11 +21,23 @@ mkDerivationWith python3Packages.buildPythonApplication rec { sha256 = "0pa8iwl217503bjlqg2zlrw5lxyq5hvxrf5apxrh3843hj1w1myv"; }; - nativeBuildInputs = [ doxygen wrapGAppsHook ]; + nativeBuildInputs = [ + doxygen + wrapGAppsHook + ]; - buildInputs = [ gtk3 ]; + buildInputs = [ + gtk3 + ]; - propagatedBuildInputs = with python3Packages; [ libopenshot pyqt5_with_qtwebkit requests sip_4 httplib2 pyzmq ]; + propagatedBuildInputs = with python3Packages; [ + httplib2 + libopenshot + pyqt5_with_qtwebkit + pyzmq + requests + sip_4 + ]; dontWrapGApps = true; dontWrapQtApps = true; @@ -56,4 +75,9 @@ mkDerivationWith python3Packages.buildPythonApplication rec { maintainers = with maintainers; [ AndersonTorres ]; platforms = with platforms; unix; }; + + passthru = { + inherit libopenshot; + inherit (libopenshot) libopenshot-audio; + }; } diff --git a/pkgs/applications/video/openshot-qt/libopenshot-audio.nix b/pkgs/applications/video/openshot-qt/libopenshot-audio.nix index c3bcc09cd3fb..c5a33af44377 100644 --- a/pkgs/applications/video/openshot-qt/libopenshot-audio.nix +++ b/pkgs/applications/video/openshot-qt/libopenshot-audio.nix @@ -1,34 +1,58 @@ -{ lib, stdenv, fetchFromGitHub, pkg-config, cmake, doxygen -, alsa-lib, libX11, libXft, libXrandr, libXinerama, libXext, libXcursor -, zlib, AGL, Cocoa, Foundation +{ lib +, stdenv +, fetchFromGitHub +, alsa-lib +, cmake +, doxygen +, libX11 +, libXcursor +, libXext +, libXft +, libXinerama +, libXrandr +, pkg-config +, zlib +, AGL +, Cocoa +, Foundation }: -with lib; stdenv.mkDerivation rec { pname = "libopenshot-audio"; - version = "0.2.0"; + version = "0.2.2"; src = fetchFromGitHub { owner = "OpenShot"; repo = "libopenshot-audio"; rev = "v${version}"; - sha256 = "13if0m5mvlqly8gmbhschzb9papkgp3yqivklhb949dhy16m8zgf"; + sha256 = "sha256-XtwTZsj/L/sw/28E7Qr5UyghGlBFFXvbmZLGXBB8vg0="; }; - nativeBuildInputs = - [ pkg-config cmake doxygen ]; + nativeBuildInputs = [ + cmake + doxygen + pkg-config + ]; - buildInputs = - optionals stdenv.isLinux [ alsa-lib ] - ++ (if stdenv.isDarwin then - [ zlib AGL Cocoa Foundation ] - else - [ libX11 libXft libXrandr libXinerama libXext libXcursor ]) - ; + buildInputs = lib.optionals stdenv.isLinux [ + alsa-lib + ] ++ (if stdenv.isDarwin then [ + AGL + Cocoa + Foundation + zlib + ] else [ + libX11 + libXcursor + libXext + libXft + libXinerama + libXrandr + ]); doCheck = false; - meta = { + meta = with lib; { homepage = "http://openshot.org/"; description = "High-quality sound editing library"; longDescription = '' diff --git a/pkgs/applications/video/openshot-qt/libopenshot.nix b/pkgs/applications/video/openshot-qt/libopenshot.nix index 246c3d5cab86..8a98010ef642 100644 --- a/pkgs/applications/video/openshot-qt/libopenshot.nix +++ b/pkgs/applications/video/openshot-qt/libopenshot.nix @@ -1,56 +1,69 @@ -{ lib, stdenv, fetchFromGitHub, fetchpatch -, pkg-config, cmake, doxygen -, libopenshot-audio, imagemagick, ffmpeg -, swig, python3, jsoncpp -, cppzmq, zeromq -, qtbase, qtmultimedia +{ lib +, stdenv +, fetchFromGitHub +, alsa-lib +, cmake +, cppzmq +, doxygen +, ffmpeg +, imagemagick +, jsoncpp +, libopenshot-audio , llvmPackages +, pkg-config +, python3 +, qtbase +, qtmultimedia +, swig +, zeromq }: -with lib; stdenv.mkDerivation rec { pname = "libopenshot"; - version = "0.2.5"; + version = "0.2.7"; src = fetchFromGitHub { owner = "OpenShot"; repo = "libopenshot"; rev = "v${version}"; - sha256 = "1mxjkgjmjzgf628y3rscc6rqf55hxgjpmvwxlncfk1216i5xskwp"; + sha256 = "sha256-aF8wrPxFIjCy5gw72e/WyL/Wcx9tUGDkrqHS+ZDVK0U="; }; - patches = [ - # Fix build with GCC 10. - (fetchpatch { - name = "fix-build-with-gcc-10.patch"; - url = "https://github.com/OpenShot/libopenshot/commit/13290364e7bea54164ab83d973951f2898ad9e23.diff"; - sha256 = "0i7rpdsr8y9dphil8yq75qbh20vfqjc2hp5ahv0ws58z9wj6ngnz"; - }) - ]; - postPatch = '' sed -i 's/{UNITTEST++_INCLUDE_DIR}/ENV{UNITTEST++_INCLUDE_DIR}/g' tests/CMakeLists.txt - sed -i 's/{_REL_PYTHON_MODULE_PATH}/ENV{_REL_PYTHON_MODULE_PATH}/g' src/bindings/python/CMakeLists.txt + sed -i 's/{_REL_PYTHON_MODULE_PATH}/ENV{_REL_PYTHON_MODULE_PATH}/g' bindings/python/CMakeLists.txt export _REL_PYTHON_MODULE_PATH=$(toPythonPath $out) ''; - nativeBuildInputs = [ pkg-config cmake doxygen swig ]; + nativeBuildInputs = [ + alsa-lib + cmake + doxygen + pkg-config + swig + ]; - buildInputs = - [ imagemagick ffmpeg python3 jsoncpp - cppzmq zeromq qtbase qtmultimedia ] - ++ optional stdenv.isDarwin llvmPackages.openmp - ; + buildInputs = [ + cppzmq + ffmpeg + imagemagick + jsoncpp + libopenshot-audio + python3 + qtbase + qtmultimedia + zeromq + ] ++ lib.optionals stdenv.isDarwin [ + llvmPackages.openmp + ]; dontWrapQtApps = true; - LIBOPENSHOT_AUDIO_DIR = libopenshot-audio; - doCheck = false; cmakeFlags = [ "-DENABLE_RUBY=OFF" ]; - meta = { + meta = with lib; { homepage = "http://openshot.org/"; description = "Free, open-source video editor library"; longDescription = '' @@ -58,8 +71,12 @@ stdenv.mkDerivation rec { delivering high quality video editing, animation, and playback solutions to the world. API currently supports C++, Python, and Ruby. ''; - license = with licenses; gpl3Plus; + license = licenses.gpl3Plus; maintainers = with maintainers; [ AndersonTorres ]; - platforms = with platforms; unix; + platforms = platforms.unix; + }; + + passthru = { + inherit libopenshot-audio; }; } diff --git a/pkgs/build-support/libredirect/default.nix b/pkgs/build-support/libredirect/default.nix index 42525ec98a7e..f87c6d23dd79 100644 --- a/pkgs/build-support/libredirect/default.nix +++ b/pkgs/build-support/libredirect/default.nix @@ -38,11 +38,11 @@ stdenv.mkDerivation rec { install -vD "$libName" "$out/lib/$libName" + # Provide a setup hook that injects our library into every process. mkdir -p "$hook/nix-support" cat < "$hook/nix-support/setup-hook" ${if stdenv.isDarwin then '' export DYLD_INSERT_LIBRARIES="$out/lib/$libName" - export DYLD_FORCE_FLAT_NAMESPACE=1 '' else '' export LD_PRELOAD="$out/lib/$libName" ''} diff --git a/pkgs/build-support/libredirect/libredirect.c b/pkgs/build-support/libredirect/libredirect.c index c7058ce123c5..7dac4684722f 100644 --- a/pkgs/build-support/libredirect/libredirect.c +++ b/pkgs/build-support/libredirect/libredirect.c @@ -2,6 +2,7 @@ #include #include #include +#include #include #include #include @@ -13,6 +14,22 @@ #define MAX_REDIRECTS 128 +#ifdef __APPLE__ + struct dyld_interpose { + const void * replacement; + const void * replacee; + }; + #define WRAPPER(ret, name) static ret _libredirect_wrapper_##name + #define LOOKUP_REAL(name) &name + #define WRAPPER_DEF(name) \ + __attribute__((used)) static struct dyld_interpose _libredirect_interpose_##name \ + __attribute__((section("__DATA,__interpose"))) = { &_libredirect_wrapper_##name, &name }; +#else + #define WRAPPER(ret, name) ret name + #define LOOKUP_REAL(name) dlsym(RTLD_NEXT, #name) + #define WRAPPER_DEF(name) +#endif + static int nrRedirects = 0; static char * from[MAX_REDIRECTS]; static char * to[MAX_REDIRECTS]; @@ -80,9 +97,9 @@ static int open_needs_mode(int flags) it contains only what we needed for programs in Nixpkgs. Just add more functions as needed. */ -int open(const char * path, int flags, ...) +WRAPPER(int, open)(const char * path, int flags, ...) { - int (*open_real) (const char *, int, mode_t) = dlsym(RTLD_NEXT, "open"); + int (*open_real) (const char *, int, mode_t) = LOOKUP_REAL(open); mode_t mode = 0; if (open_needs_mode(flags)) { va_list ap; @@ -93,10 +110,12 @@ int open(const char * path, int flags, ...) char buf[PATH_MAX]; return open_real(rewrite(path, buf), flags, mode); } +WRAPPER_DEF(open) -int open64(const char * path, int flags, ...) +#ifndef __APPLE__ +WRAPPER(int, open64)(const char * path, int flags, ...) { - int (*open64_real) (const char *, int, mode_t) = dlsym(RTLD_NEXT, "open64"); + int (*open64_real) (const char *, int, mode_t) = LOOKUP_REAL(open64); mode_t mode = 0; if (open_needs_mode(flags)) { va_list ap; @@ -107,10 +126,12 @@ int open64(const char * path, int flags, ...) char buf[PATH_MAX]; return open64_real(rewrite(path, buf), flags, mode); } +WRAPPER_DEF(open64) +#endif -int openat(int dirfd, const char * path, int flags, ...) +WRAPPER(int, openat)(int dirfd, const char * path, int flags, ...) { - int (*openat_real) (int, const char *, int, mode_t) = dlsym(RTLD_NEXT, "openat"); + int (*openat_real) (int, const char *, int, mode_t) = LOOKUP_REAL(openat); mode_t mode = 0; if (open_needs_mode(flags)) { va_list ap; @@ -121,57 +142,73 @@ int openat(int dirfd, const char * path, int flags, ...) char buf[PATH_MAX]; return openat_real(dirfd, rewrite(path, buf), flags, mode); } +WRAPPER_DEF(openat) -FILE * fopen(const char * path, const char * mode) +WRAPPER(FILE *, fopen)(const char * path, const char * mode) { - FILE * (*fopen_real) (const char *, const char *) = dlsym(RTLD_NEXT, "fopen"); + FILE * (*fopen_real) (const char *, const char *) = LOOKUP_REAL(fopen); char buf[PATH_MAX]; return fopen_real(rewrite(path, buf), mode); } +WRAPPER_DEF(fopen) -FILE * __nss_files_fopen(const char * path) +#ifndef __APPLE__ +WRAPPER(FILE *, __nss_files_fopen)(const char * path) { - FILE * (*__nss_files_fopen_real) (const char *) = dlsym(RTLD_NEXT, "__nss_files_fopen"); + FILE * (*__nss_files_fopen_real) (const char *) = LOOKUP_REAL(__nss_files_fopen); char buf[PATH_MAX]; return __nss_files_fopen_real(rewrite(path, buf)); } +WRAPPER_DEF(__nss_files_fopen) +#endif -FILE * fopen64(const char * path, const char * mode) +#ifndef __APPLE__ +WRAPPER(FILE *, fopen64)(const char * path, const char * mode) { - FILE * (*fopen64_real) (const char *, const char *) = dlsym(RTLD_NEXT, "fopen64"); + FILE * (*fopen64_real) (const char *, const char *) = LOOKUP_REAL(fopen64); char buf[PATH_MAX]; return fopen64_real(rewrite(path, buf), mode); } +WRAPPER_DEF(fopen64) +#endif -int __xstat(int ver, const char * path, struct stat * st) +#ifndef __APPLE__ +WRAPPER(int, __xstat)(int ver, const char * path, struct stat * st) { - int (*__xstat_real) (int ver, const char *, struct stat *) = dlsym(RTLD_NEXT, "__xstat"); + int (*__xstat_real) (int ver, const char *, struct stat *) = LOOKUP_REAL(__xstat); char buf[PATH_MAX]; return __xstat_real(ver, rewrite(path, buf), st); } +WRAPPER_DEF(__xstat) +#endif -int __xstat64(int ver, const char * path, struct stat64 * st) +#ifndef __APPLE__ +WRAPPER(int, __xstat64)(int ver, const char * path, struct stat64 * st) { - int (*__xstat64_real) (int ver, const char *, struct stat64 *) = dlsym(RTLD_NEXT, "__xstat64"); + int (*__xstat64_real) (int ver, const char *, struct stat64 *) = LOOKUP_REAL(__xstat64); char buf[PATH_MAX]; return __xstat64_real(ver, rewrite(path, buf), st); } +WRAPPER_DEF(__xstat64) +#endif -int stat(const char * path, struct stat * st) +WRAPPER(int, stat)(const char * path, struct stat * st) { - int (*__stat_real) (const char *, struct stat *) = dlsym(RTLD_NEXT, "stat"); + int (*__stat_real) (const char *, struct stat *) = LOOKUP_REAL(stat); char buf[PATH_MAX]; return __stat_real(rewrite(path, buf), st); } +WRAPPER_DEF(stat) -int access(const char * path, int mode) +WRAPPER(int, access)(const char * path, int mode) { - int (*access_real) (const char *, int mode) = dlsym(RTLD_NEXT, "access"); + int (*access_real) (const char *, int mode) = LOOKUP_REAL(access); char buf[PATH_MAX]; return access_real(rewrite(path, buf), mode); } +WRAPPER_DEF(access) -int posix_spawn(pid_t * pid, const char * path, +WRAPPER(int, posix_spawn)(pid_t * pid, const char * path, const posix_spawn_file_actions_t * file_actions, const posix_spawnattr_t * attrp, char * const argv[], char * const envp[]) @@ -179,12 +216,13 @@ int posix_spawn(pid_t * pid, const char * path, int (*posix_spawn_real) (pid_t *, const char *, const posix_spawn_file_actions_t *, const posix_spawnattr_t *, - char * const argv[], char * const envp[]) = dlsym(RTLD_NEXT, "posix_spawn"); + char * const argv[], char * const envp[]) = LOOKUP_REAL(posix_spawn); char buf[PATH_MAX]; return posix_spawn_real(pid, rewrite(path, buf), file_actions, attrp, argv, envp); } +WRAPPER_DEF(posix_spawn) -int posix_spawnp(pid_t * pid, const char * file, +WRAPPER(int, posix_spawnp)(pid_t * pid, const char * file, const posix_spawn_file_actions_t * file_actions, const posix_spawnattr_t * attrp, char * const argv[], char * const envp[]) @@ -192,43 +230,48 @@ int posix_spawnp(pid_t * pid, const char * file, int (*posix_spawnp_real) (pid_t *, const char *, const posix_spawn_file_actions_t *, const posix_spawnattr_t *, - char * const argv[], char * const envp[]) = dlsym(RTLD_NEXT, "posix_spawnp"); + char * const argv[], char * const envp[]) = LOOKUP_REAL(posix_spawnp); char buf[PATH_MAX]; return posix_spawnp_real(pid, rewrite(file, buf), file_actions, attrp, argv, envp); } +WRAPPER_DEF(posix_spawnp) -int execv(const char * path, char * const argv[]) +WRAPPER(int, execv)(const char * path, char * const argv[]) { - int (*execv_real) (const char * path, char * const argv[]) = dlsym(RTLD_NEXT, "execv"); + int (*execv_real) (const char * path, char * const argv[]) = LOOKUP_REAL(execv); char buf[PATH_MAX]; return execv_real(rewrite(path, buf), argv); } +WRAPPER_DEF(execv) -int execvp(const char * path, char * const argv[]) +WRAPPER(int, execvp)(const char * path, char * const argv[]) { - int (*_execvp) (const char *, char * const argv[]) = dlsym(RTLD_NEXT, "execvp"); + int (*_execvp) (const char *, char * const argv[]) = LOOKUP_REAL(execvp); char buf[PATH_MAX]; return _execvp(rewrite(path, buf), argv); } +WRAPPER_DEF(execvp) -int execve(const char * path, char * const argv[], char * const envp[]) +WRAPPER(int, execve)(const char * path, char * const argv[], char * const envp[]) { - int (*_execve) (const char *, char * const argv[], char * const envp[]) = dlsym(RTLD_NEXT, "execve"); + int (*_execve) (const char *, char * const argv[], char * const envp[]) = LOOKUP_REAL(execve); char buf[PATH_MAX]; return _execve(rewrite(path, buf), argv, envp); } +WRAPPER_DEF(execve) -DIR * opendir(const char * path) +WRAPPER(DIR *, opendir)(const char * path) { char buf[PATH_MAX]; - DIR * (*_opendir) (const char*) = dlsym(RTLD_NEXT, "opendir"); + DIR * (*_opendir) (const char*) = LOOKUP_REAL(opendir); return _opendir(rewrite(path, buf)); } +WRAPPER_DEF(opendir) #define SYSTEM_CMD_MAX 512 -char *replace_substring(char * source, char * buf, char * replace_string, char * start_ptr, char * suffix_ptr) { +static char * replace_substring(char * source, char * buf, char * replace_string, char * start_ptr, char * suffix_ptr) { char head[SYSTEM_CMD_MAX] = {0}; strncpy(head, source, start_ptr - source); @@ -241,7 +284,7 @@ char *replace_substring(char * source, char * buf, char * replace_string, char * return buf; } -char *replace_string(char * buf, char * from, char * to) { +static char * replace_string(char * buf, char * from, char * to) { int num_matches = 0; char * matches[SYSTEM_CMD_MAX]; int from_len = strlen(from); @@ -264,32 +307,48 @@ char *replace_string(char * buf, char * from, char * to) { return buf; } -void rewriteSystemCall(const char * command, char * buf) { - strcpy(buf, command); +static void rewriteSystemCall(const char * command, char * buf) { + char * p = buf; + + #ifdef __APPLE__ + // The dyld environment variable is not inherited by the subprocess spawned + // by system(), so this hack redefines it. + Dl_info info; + dladdr(&rewriteSystemCall, &info); + p = stpcpy(p, "export DYLD_INSERT_LIBRARIES="); + p = stpcpy(p, info.dli_fname); + p = stpcpy(p, ";"); + #endif + + stpcpy(p, command); + for (int n = 0; n < nrRedirects; ++n) { replace_string(buf, from[n], to[n]); } } -int system(const char *command) +WRAPPER(int, system)(const char *command) { - int (*_system) (const char*) = dlsym(RTLD_NEXT, "system"); + int (*_system) (const char*) = LOOKUP_REAL(system); char newCommand[SYSTEM_CMD_MAX]; rewriteSystemCall(command, newCommand); return _system(newCommand); } +WRAPPER_DEF(system) -int mkdir(const char *path, mode_t mode) +WRAPPER(int, mkdir)(const char *path, mode_t mode) { - int (*mkdir_real) (const char *path, mode_t mode) = dlsym(RTLD_NEXT, "mkdir"); + int (*mkdir_real) (const char *path, mode_t mode) = LOOKUP_REAL(mkdir); char buf[PATH_MAX]; return mkdir_real(rewrite(path, buf), mode); } +WRAPPER_DEF(mkdir) -int mkdirat(int dirfd, const char *path, mode_t mode) +WRAPPER(int, mkdirat)(int dirfd, const char *path, mode_t mode) { - int (*mkdirat_real) (int dirfd, const char *path, mode_t mode) = dlsym(RTLD_NEXT, "mkdirat"); + int (*mkdirat_real) (int dirfd, const char *path, mode_t mode) = LOOKUP_REAL(mkdirat); char buf[PATH_MAX]; return mkdirat_real(dirfd, rewrite(path, buf), mode); } +WRAPPER_DEF(mkdirat) diff --git a/pkgs/data/icons/tela-icon-theme/default.nix b/pkgs/data/icons/tela-icon-theme/default.nix index 31745f9b2f15..69f0337fcaa6 100644 --- a/pkgs/data/icons/tela-icon-theme/default.nix +++ b/pkgs/data/icons/tela-icon-theme/default.nix @@ -2,13 +2,13 @@ stdenvNoCC.mkDerivation rec { pname = "tela-icon-theme"; - version = "2021-10-08"; + version = "2021-11-05"; src = fetchFromGitHub { owner = "vinceliuice"; repo = pname; rev = version; - sha256 = "sha256-4h6c7asjUC7pqi4GkxCN13LOpVVbjBdvjUMN7sXAlNE="; + sha256 = "sha256-mvkgHBdZm6vF+/DS3CRLl1m14U0Lj4Xtz4J/vpJUTQM="; }; nativeBuildInputs = [ gtk3 jdupes ]; diff --git a/pkgs/desktops/plasma-5/fetch.sh b/pkgs/desktops/plasma-5/fetch.sh index b69eba34b154..d6b54869122c 100644 --- a/pkgs/desktops/plasma-5/fetch.sh +++ b/pkgs/desktops/plasma-5/fetch.sh @@ -1 +1 @@ -WGET_ARGS=( https://download.kde.org/stable/plasma/5.23.1/ -A '*.tar.xz' ) +WGET_ARGS=( https://download.kde.org/stable/plasma/5.23.2/ -A '*.tar.xz' ) diff --git a/pkgs/desktops/plasma-5/plasma-vault/encfs-path.patch b/pkgs/desktops/plasma-5/plasma-vault/0001-encfs-path.patch similarity index 66% rename from pkgs/desktops/plasma-5/plasma-vault/encfs-path.patch rename to pkgs/desktops/plasma-5/plasma-vault/0001-encfs-path.patch index 14f593ea60a8..a5e9d8c531e1 100644 --- a/pkgs/desktops/plasma-5/plasma-vault/encfs-path.patch +++ b/pkgs/desktops/plasma-5/plasma-vault/0001-encfs-path.patch @@ -1,19 +1,31 @@ +From fef6bfe87db4411e3dda2f96741cd8204fe41d85 Mon Sep 17 00:00:00 2001 +From: Thomas Tuegel +Date: Tue, 2 Nov 2021 05:57:50 -0500 +Subject: [PATCH 1/3] encfs path + +--- + kded/engine/backends/encfs/encfsbackend.cpp | 4 ++-- + 1 file changed, 2 insertions(+), 2 deletions(-) + diff --git a/kded/engine/backends/encfs/encfsbackend.cpp b/kded/engine/backends/encfs/encfsbackend.cpp -index 628af7b..6edd38e 100644 +index 2d15fa2..3f49867 100644 --- a/kded/engine/backends/encfs/encfsbackend.cpp +++ b/kded/engine/backends/encfs/encfsbackend.cpp -@@ -100,12 +100,12 @@ QProcess *EncFsBackend::encfs(const QStringList &arguments) const +@@ -101,12 +101,12 @@ QProcess *EncFsBackend::encfs(const QStringList &arguments) const auto config = KSharedConfig::openConfig(PLASMAVAULT_CONFIG_FILE); KConfigGroup backendConfig(config, "EncfsBackend"); - + - return process("encfs", arguments + backendConfig.readEntry("extraMountOptions", QStringList{}), {}); + return process(NIXPKGS_ENCFS, arguments + backendConfig.readEntry("extraMountOptions", QStringList{}), {}); } - + QProcess *EncFsBackend::encfsctl(const QStringList &arguments) const { - return process("encfsctl", arguments, {}); + return process(NIXPKGS_ENCFSCTL, arguments, {}); } - + } // namespace PlasmaVault +-- +2.33.1 + diff --git a/pkgs/desktops/plasma-5/plasma-vault/0002-cryfs-path.patch b/pkgs/desktops/plasma-5/plasma-vault/0002-cryfs-path.patch new file mode 100644 index 000000000000..4c7567b15076 --- /dev/null +++ b/pkgs/desktops/plasma-5/plasma-vault/0002-cryfs-path.patch @@ -0,0 +1,25 @@ +From a89a0d3f9088d272c01ccb9b730d1dbb500f9cb8 Mon Sep 17 00:00:00 2001 +From: Thomas Tuegel +Date: Tue, 2 Nov 2021 05:59:34 -0500 +Subject: [PATCH 2/3] cryfs path + +--- + kded/engine/backends/cryfs/cryfsbackend.cpp | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/kded/engine/backends/cryfs/cryfsbackend.cpp b/kded/engine/backends/cryfs/cryfsbackend.cpp +index 64138b6..1a9fde2 100644 +--- a/kded/engine/backends/cryfs/cryfsbackend.cpp ++++ b/kded/engine/backends/cryfs/cryfsbackend.cpp +@@ -207,7 +207,7 @@ QProcess *CryFsBackend::cryfs(const QStringList &arguments) const + auto config = KSharedConfig::openConfig(PLASMAVAULT_CONFIG_FILE); + KConfigGroup backendConfig(config, "CryfsBackend"); + +- return process("cryfs", arguments + backendConfig.readEntry("extraMountOptions", QStringList{}), {{"CRYFS_FRONTEND", "noninteractive"}}); ++ return process(NIXPKGS_CRYFS, arguments + backendConfig.readEntry("extraMountOptions", QStringList{}), {{"CRYFS_FRONTEND", "noninteractive"}}); + } + + } // namespace PlasmaVault +-- +2.33.1 + diff --git a/pkgs/desktops/plasma-5/plasma-vault/0003-fusermount-path.patch b/pkgs/desktops/plasma-5/plasma-vault/0003-fusermount-path.patch new file mode 100644 index 000000000000..0d4481c70541 --- /dev/null +++ b/pkgs/desktops/plasma-5/plasma-vault/0003-fusermount-path.patch @@ -0,0 +1,25 @@ +From 63571e28c65935f32567c0b179a096d62726b778 Mon Sep 17 00:00:00 2001 +From: Thomas Tuegel +Date: Tue, 2 Nov 2021 06:00:32 -0500 +Subject: [PATCH 3/3] fusermount path + +--- + kded/engine/fusebackend_p.cpp | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/kded/engine/fusebackend_p.cpp b/kded/engine/fusebackend_p.cpp +index 91f3523..1c19d88 100644 +--- a/kded/engine/fusebackend_p.cpp ++++ b/kded/engine/fusebackend_p.cpp +@@ -86,7 +86,7 @@ QProcess *FuseBackend::process(const QString &executable, const QStringList &arg + + QProcess *FuseBackend::fusermount(const QStringList &arguments) const + { +- return process("fusermount", arguments, {}); ++ return process(NIXPKGS_FUSERMOUNT, arguments, {}); + } + + FutureResult<> FuseBackend::initialize(const QString &name, const Device &device, const MountPoint &mountPoint, const Vault::Payload &payload) +-- +2.33.1 + diff --git a/pkgs/desktops/plasma-5/plasma-vault/cryfs-path.patch b/pkgs/desktops/plasma-5/plasma-vault/cryfs-path.patch deleted file mode 100644 index 6bab35fe4a97..000000000000 --- a/pkgs/desktops/plasma-5/plasma-vault/cryfs-path.patch +++ /dev/null @@ -1,13 +0,0 @@ -diff --git a/kded/engine/backends/cryfs/cryfsbackend.cpp b/kded/engine/backends/cryfs/cryfsbackend.cpp -index 58a6929..7212980 100644 ---- a/kded/engine/backends/cryfs/cryfsbackend.cpp -+++ b/kded/engine/backends/cryfs/cryfsbackend.cpp -@@ -241,7 +241,7 @@ QProcess *CryFsBackend::cryfs(const QStringList &arguments) const - auto config = KSharedConfig::openConfig(PLASMAVAULT_CONFIG_FILE); - KConfigGroup backendConfig(config, "CryfsBackend"); - -- return process("cryfs", -+ return process(NIXPKGS_CRYFS, - arguments + backendConfig.readEntry("extraMountOptions", QStringList{}), - { { "CRYFS_FRONTEND", "noninteractive" } }); - } diff --git a/pkgs/desktops/plasma-5/plasma-vault/default.nix b/pkgs/desktops/plasma-5/plasma-vault/default.nix index e016944be456..453ba2b107a1 100644 --- a/pkgs/desktops/plasma-5/plasma-vault/default.nix +++ b/pkgs/desktops/plasma-5/plasma-vault/default.nix @@ -18,9 +18,9 @@ mkDerivation { nativeBuildInputs = [ extra-cmake-modules ]; patches = [ - ./encfs-path.patch - ./cryfs-path.patch - ./fusermount-path.patch + ./0001-encfs-path.patch + ./0002-cryfs-path.patch + ./0003-fusermount-path.patch ]; buildInputs = [ diff --git a/pkgs/desktops/plasma-5/plasma-vault/fusermount-path.patch b/pkgs/desktops/plasma-5/plasma-vault/fusermount-path.patch deleted file mode 100644 index b2a7866531bf..000000000000 --- a/pkgs/desktops/plasma-5/plasma-vault/fusermount-path.patch +++ /dev/null @@ -1,18 +0,0 @@ -diff --git a/kded/engine/fusebackend_p.cpp b/kded/engine/fusebackend_p.cpp -index d07e313..ea7d81c 100644 ---- a/kded/engine/fusebackend_p.cpp -+++ b/kded/engine/fusebackend_p.cpp -@@ -106,7 +106,7 @@ QProcess *FuseBackend::process(const QString &executable, - - QProcess *FuseBackend::fusermount(const QStringList &arguments) const - { -- return process("fusermount", arguments, {}); -+ return process(NIXPKGS_FUSERMOUNT, arguments, {}); - } - - -@@ -279,4 +279,3 @@ bool FuseBackend::isOpened(const MountPoint &mountPoint) const - } - - } // namespace PlasmaVault -- diff --git a/pkgs/desktops/plasma-5/plasma-workspace/default.nix b/pkgs/desktops/plasma-5/plasma-workspace/default.nix index f44becda9020..927ca7debc29 100644 --- a/pkgs/desktops/plasma-5/plasma-workspace/default.nix +++ b/pkgs/desktops/plasma-5/plasma-workspace/default.nix @@ -1,5 +1,5 @@ { - mkDerivation, lib, fetchpatch, + mkDerivation, lib, extra-cmake-modules, kdoctools, @@ -53,12 +53,6 @@ mkDerivation { ./0001-startkde.patch ./0002-absolute-wallpaper-install-dir.patch ./0003-startkde-unit-detection.patch - # Included in 5.23.2 - (fetchpatch { - name = "ignore-placeholder-screens"; - url = "https://invent.kde.org/plasma/plasma-workspace/-/merge_requests/1125.patch"; - sha256 = "sha256-lvcAxb301lQbfEKPcxMlfap9g7TjHOk50ZYX91RC7gY="; - }) ]; # QT_INSTALL_BINS refers to qtbase, and qdbus is in qttools diff --git a/pkgs/desktops/plasma-5/srcs.nix b/pkgs/desktops/plasma-5/srcs.nix index d3df742f9990..9e45140d2b62 100644 --- a/pkgs/desktops/plasma-5/srcs.nix +++ b/pkgs/desktops/plasma-5/srcs.nix @@ -4,427 +4,427 @@ { bluedevil = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/bluedevil-5.23.1.tar.xz"; - sha256 = "1fxl1v27jk1hnxn7s9cqnw1h0pcghpyr2kxbqlx6fhnk0gp44gra"; - name = "bluedevil-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/bluedevil-5.23.2.tar.xz"; + sha256 = "0whg8d95vm6zc4vzdlffyvm5kqhi5b501z3749zx743jx8r125nb"; + name = "bluedevil-5.23.2.tar.xz"; }; }; breeze = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/breeze-5.23.1.tar.xz"; - sha256 = "108l31v692f0yp1chbgw7nfjxs9qqyxm491zwg5p1n27jdgxq4dc"; - name = "breeze-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/breeze-5.23.2.tar.xz"; + sha256 = "1b2n0wcwfp96k76cmm8llr6cvdxvpb6h17r0r4rnl4ypg36i03sb"; + name = "breeze-5.23.2.tar.xz"; }; }; breeze-grub = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/breeze-grub-5.23.1.tar.xz"; - sha256 = "1qmixw5q8i1inx65yn84sc44rbllffmjpzbbrxhjxazfa90kjh63"; - name = "breeze-grub-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/breeze-grub-5.23.2.tar.xz"; + sha256 = "0zbych6hyfxjc4rl0m9nij6vgyg66s4b51vm5rjd9p0s6zhipzrl"; + name = "breeze-grub-5.23.2.tar.xz"; }; }; breeze-gtk = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/breeze-gtk-5.23.1.tar.xz"; - sha256 = "11yjanh6m52sv717bma5m7is8mmz8raqf3i7xjgd9kiafdbp6rjh"; - name = "breeze-gtk-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/breeze-gtk-5.23.2.tar.xz"; + sha256 = "1ays2z6gmy1yx4ka5fjcmymlvq67p2wjwijciw4ambx1bxz6s5ci"; + name = "breeze-gtk-5.23.2.tar.xz"; }; }; breeze-plymouth = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/breeze-plymouth-5.23.1.tar.xz"; - sha256 = "0f4lxp4h2aji2gnrbplvs2xmwca0zcq3z1dm4fa31qy7ipr0b9qw"; - name = "breeze-plymouth-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/breeze-plymouth-5.23.2.tar.xz"; + sha256 = "1lpri3rnfip9a24wrdm5b959l9lqkgk48l5ngisfly3619jz5aml"; + name = "breeze-plymouth-5.23.2.tar.xz"; }; }; discover = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/discover-5.23.1.tar.xz"; - sha256 = "0wgfws2m5x2bgqcx8h50jhvgj98pmyywr5h3f560mxwd3admq9a4"; - name = "discover-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/discover-5.23.2.tar.xz"; + sha256 = "0560qrq6c7hd29cjhxvl9qyn4a97vzp5hwgdlbzmrw6kcyjy83cy"; + name = "discover-5.23.2.tar.xz"; }; }; drkonqi = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/drkonqi-5.23.1.tar.xz"; - sha256 = "19fksscf29lw4dvdf4s8z97q60yn77w35qmz298myw0n6cd9n1vk"; - name = "drkonqi-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/drkonqi-5.23.2.tar.xz"; + sha256 = "0ilg9x2ipncsbjms2l97dd0vdnay4jpsrbvamvfavdffqvzibd9f"; + name = "drkonqi-5.23.2.tar.xz"; }; }; kactivitymanagerd = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/kactivitymanagerd-5.23.1.tar.xz"; - sha256 = "02gaky1ibzfkv5gx6hpwksm06jb025k9hb7lqrbp5wbn2j5m3g7a"; - name = "kactivitymanagerd-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/kactivitymanagerd-5.23.2.tar.xz"; + sha256 = "1y4bmwwakz9k9rkqslh1n9cnn4jvmrdc0hd760fqsf80z1v7k2dh"; + name = "kactivitymanagerd-5.23.2.tar.xz"; }; }; kde-cli-tools = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/kde-cli-tools-5.23.1.tar.xz"; - sha256 = "1qm7s2zdvq4i8lry736npwfy95xkrhwi6zhmqlb5j21y9g2hh6ns"; - name = "kde-cli-tools-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/kde-cli-tools-5.23.2.tar.xz"; + sha256 = "1zphp97g3mpz86h00d1blkj568dwfdgvl4jqx81v1s6p7dcr1wl7"; + name = "kde-cli-tools-5.23.2.tar.xz"; }; }; kdecoration = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/kdecoration-5.23.1.tar.xz"; - sha256 = "09y3n2ifdkcpp21b15pw2k8jfqhwp19rwqyl31il5js36ymsx1qm"; - name = "kdecoration-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/kdecoration-5.23.2.tar.xz"; + sha256 = "0p36grnjfnl71kqqrkvr18pr72mia81x8rnvnzb3r5abc5kbna6k"; + name = "kdecoration-5.23.2.tar.xz"; }; }; kde-gtk-config = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/kde-gtk-config-5.23.1.tar.xz"; - sha256 = "0g2p6rnc6qij4mrbz955gpjsda6ck3g0y68rkkkm4849j72pinbx"; - name = "kde-gtk-config-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/kde-gtk-config-5.23.2.tar.xz"; + sha256 = "0bwwlqnzdn2w9dsx64hlmy1rgc69549c89lqj0yj858prncb82d6"; + name = "kde-gtk-config-5.23.2.tar.xz"; }; }; kdeplasma-addons = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/kdeplasma-addons-5.23.1.tar.xz"; - sha256 = "126rrj22431i1immbrvagndi36bfapxcyjrhy6q7qxlg8lwmmvl4"; - name = "kdeplasma-addons-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/kdeplasma-addons-5.23.2.tar.xz"; + sha256 = "0jqbhkmq2w2q6my1vhw07j6lqxmcpb5cn5vaz7pl4ax8rqiy5i76"; + name = "kdeplasma-addons-5.23.2.tar.xz"; }; }; kgamma5 = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/kgamma5-5.23.1.tar.xz"; - sha256 = "11d5qdhgxn51q7fs0jmaswxm68wygk7b38kj0f1h665fsc56sxfg"; - name = "kgamma5-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/kgamma5-5.23.2.tar.xz"; + sha256 = "168pc6rnxbmwrkpsghfaqjvza0m3cnvzcvlr860lkp91vqqq32b6"; + name = "kgamma5-5.23.2.tar.xz"; }; }; khotkeys = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/khotkeys-5.23.1.tar.xz"; - sha256 = "0kz8pgwrcrsqf6zsb3zyx7a4g43svdm7iq6jm9p0ncfjnrl0ks6s"; - name = "khotkeys-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/khotkeys-5.23.2.tar.xz"; + sha256 = "1pd2p46cc955z1s34jccqw81ps07nl4q4s4qzra0i831j7xsa9ib"; + name = "khotkeys-5.23.2.tar.xz"; }; }; kinfocenter = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/kinfocenter-5.23.1.tar.xz"; - sha256 = "01690mvak6i7c17ksfar8793c33y7x391pw5bfa0ggm428k8jbz1"; - name = "kinfocenter-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/kinfocenter-5.23.2.tar.xz"; + sha256 = "0bgdgd0n68fb5kaqdqyng9fvf3mjparrnjdp246i68kkclci5nym"; + name = "kinfocenter-5.23.2.tar.xz"; }; }; kmenuedit = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/kmenuedit-5.23.1.tar.xz"; - sha256 = "124imx7afbihdp3d10yap6ww9404b63va35h4hfsr5dglfmjfhpk"; - name = "kmenuedit-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/kmenuedit-5.23.2.tar.xz"; + sha256 = "1jr25zdplndjhw8qb6c2xf255v73c85pcy7ps7x80g0y34pz2h1x"; + name = "kmenuedit-5.23.2.tar.xz"; }; }; kscreen = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/kscreen-5.23.1.tar.xz"; - sha256 = "1j8z8dgp7l0iccyblnq5mf6xysaa17z0ljw9zwvq8ir57cnky55g"; - name = "kscreen-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/kscreen-5.23.2.tar.xz"; + sha256 = "1wc0ydyi5vbm3mpjqrkcxjz22gsz2xzw3xw48161z9aikfhhn44v"; + name = "kscreen-5.23.2.tar.xz"; }; }; kscreenlocker = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/kscreenlocker-5.23.1.tar.xz"; - sha256 = "0qxmmchl73s9ci0b8by5j6ik8aikwd1xcxyfxhp3fhav519i7i50"; - name = "kscreenlocker-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/kscreenlocker-5.23.2.tar.xz"; + sha256 = "1yfqj5g7zvayah53pz0bgmmz8q8hd2rmk5ndzacfl7qrz3dxq2g6"; + name = "kscreenlocker-5.23.2.tar.xz"; }; }; ksshaskpass = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/ksshaskpass-5.23.1.tar.xz"; - sha256 = "0azb195s2f068k2vj9piby36lh786gvkzvnnajzs74pmqpl8kay1"; - name = "ksshaskpass-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/ksshaskpass-5.23.2.tar.xz"; + sha256 = "1icb5z7hnyrhh29krp5pgxm214w4lkq4k29laa8a1jryp3igqm1l"; + name = "ksshaskpass-5.23.2.tar.xz"; }; }; ksystemstats = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/ksystemstats-5.23.1.tar.xz"; - sha256 = "0zkag07lhrz5d7bwhl4lyj2cxh0is9z8z9lavl1dmwfnjs86a0z6"; - name = "ksystemstats-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/ksystemstats-5.23.2.tar.xz"; + sha256 = "0m1ijvqr5b09b4hmr81hi5wvf8d79vg36hkmq9r2digr76pf1ni4"; + name = "ksystemstats-5.23.2.tar.xz"; }; }; kwallet-pam = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/kwallet-pam-5.23.1.tar.xz"; - sha256 = "02jycjh7l437f2r9a2861yd8j7ayy0f63qkda67703p4va412rk3"; - name = "kwallet-pam-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/kwallet-pam-5.23.2.tar.xz"; + sha256 = "105dpcb6zskqkbnhd5sl4igb0r87dza383m0qqffqfriwvjf9v6z"; + name = "kwallet-pam-5.23.2.tar.xz"; }; }; kwayland-integration = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/kwayland-integration-5.23.1.tar.xz"; - sha256 = "0shdq4wrb2p7agc1ds6vm49g75bsizsmlwdikq5sqpgzbgv10dgp"; - name = "kwayland-integration-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/kwayland-integration-5.23.2.tar.xz"; + sha256 = "0fchl5bjyn9vkj2rzqhlg3jzi2gp993l3c6skviyfqkvp3fq91bl"; + name = "kwayland-integration-5.23.2.tar.xz"; }; }; kwayland-server = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/kwayland-server-5.23.1.tar.xz"; - sha256 = "0mwxllkqgmvr7lq0kkikndn68y6mxl9hmfm8kjmnq95zq5nimbgb"; - name = "kwayland-server-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/kwayland-server-5.23.2.tar.xz"; + sha256 = "03cc0hm99gyr07kbk6vkqxs3nngsnl51smbpwg5rb3lycij38f1j"; + name = "kwayland-server-5.23.2.tar.xz"; }; }; kwin = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/kwin-5.23.1.tar.xz"; - sha256 = "0ccbb41xsa257vabd17m3fx9h760izizgy9xrg9mpg5shjmxff2q"; - name = "kwin-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/kwin-5.23.2.tar.xz"; + sha256 = "1fpq3r93lk0wmzckd8jkw4fcdggl75mjyj59j9ivijnb8an7vfpz"; + name = "kwin-5.23.2.tar.xz"; }; }; kwrited = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/kwrited-5.23.1.tar.xz"; - sha256 = "16sg4mffwhpx5c2dp6zki9128zjpkcyjlm8nd8jdkcdq5ww4f4pk"; - name = "kwrited-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/kwrited-5.23.2.tar.xz"; + sha256 = "1czaq3gzyb5v153626rxb54512nkhlpsypf4aghdr9c32n12vgd4"; + name = "kwrited-5.23.2.tar.xz"; }; }; layer-shell-qt = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/layer-shell-qt-5.23.1.tar.xz"; - sha256 = "02lyzc93ymz5jr05sy5pf1aqyx098q3jhzxk28k6fslzxq327767"; - name = "layer-shell-qt-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/layer-shell-qt-5.23.2.tar.xz"; + sha256 = "0pw9k1g7g5fjq6hkmri546pph1rycyay97gvw8ngzx67v0n9phlg"; + name = "layer-shell-qt-5.23.2.tar.xz"; }; }; libkscreen = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/libkscreen-5.23.1.tar.xz"; - sha256 = "0hyh0j95i0xrbh07770axby3lqhmiclzxwx1bplmnpayymwdac1r"; - name = "libkscreen-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/libkscreen-5.23.2.tar.xz"; + sha256 = "1shlw9wa01ilfhh57i6752mm62qjhj0w0q5qz6kvga3gmzmwp6sf"; + name = "libkscreen-5.23.2.tar.xz"; }; }; libksysguard = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/libksysguard-5.23.1.tar.xz"; - sha256 = "12c1qy736036rfvk42pnb0z32sjqfk4x4069v7iycy4nd91xyg88"; - name = "libksysguard-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/libksysguard-5.23.2.tar.xz"; + sha256 = "1knbik3r2bv11vzc17k9971bgrd7dsk9d7j4s5323schymmbzypq"; + name = "libksysguard-5.23.2.tar.xz"; }; }; milou = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/milou-5.23.1.tar.xz"; - sha256 = "047z4dklk7hixk6m0xw2y2mhrdzmczz1ikhzvxnxhgmghm3w14cg"; - name = "milou-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/milou-5.23.2.tar.xz"; + sha256 = "0nshc6bbbjyrs2sah1q0y5msrdhhrzz24fbgqvh871csb9lh3idz"; + name = "milou-5.23.2.tar.xz"; }; }; oxygen = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/oxygen-5.23.1.tar.xz"; - sha256 = "0dxj1fr8p6dnlqwr5bs3f8s1g12vndapc8b07h6hzhcwi26wm81f"; - name = "oxygen-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/oxygen-5.23.2.tar.xz"; + sha256 = "1k2bibgwdzwad87xyr31231b5jfk2m2x348layz41f3zl33mj1cp"; + name = "oxygen-5.23.2.tar.xz"; }; }; plasma-browser-integration = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/plasma-browser-integration-5.23.1.tar.xz"; - sha256 = "1yaayy60dgj652rjzhh659anspw4cf7rqgmzdw471nzds3zpfr6x"; - name = "plasma-browser-integration-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/plasma-browser-integration-5.23.2.tar.xz"; + sha256 = "08zf8qjcq538fg7zpw73qdcvp4a88vxvvm297y7gch37h9nrbmgg"; + name = "plasma-browser-integration-5.23.2.tar.xz"; }; }; plasma-desktop = { - version = "5.23.1"; + version = "5.23.2.1"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/plasma-desktop-5.23.1.tar.xz"; - sha256 = "102fkhmh33xw7w2sq20d5v4576apyqp9dwh8v3nwd8vfjbq6lv7f"; - name = "plasma-desktop-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/plasma-desktop-5.23.2.1.tar.xz"; + sha256 = "0d2r6bxj04078acdlv6dzvy4jamcj1d49bafa4430hcqrxjy8scg"; + name = "plasma-desktop-5.23.2.1.tar.xz"; }; }; plasma-disks = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/plasma-disks-5.23.1.tar.xz"; - sha256 = "11cssgdz4h9ln4738gphg544f9jmzmzax3chq1pp7dzk8cgh4fxq"; - name = "plasma-disks-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/plasma-disks-5.23.2.tar.xz"; + sha256 = "0phv135v4jav17nb2f7cwvmcxk6sqr582jvw1y34vfphjgg8z3kw"; + name = "plasma-disks-5.23.2.tar.xz"; }; }; plasma-firewall = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/plasma-firewall-5.23.1.tar.xz"; - sha256 = "066b36kxycffwmhgls51q8hpww06j2v2hcc9z4bzmix7jhpzkk0w"; - name = "plasma-firewall-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/plasma-firewall-5.23.2.tar.xz"; + sha256 = "1h0zjzx7anhsbpx64q6pg3nh3w329nap3d1sqz5jg2iishql8jnz"; + name = "plasma-firewall-5.23.2.tar.xz"; }; }; plasma-integration = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/plasma-integration-5.23.1.tar.xz"; - sha256 = "0wfbvp6r6nh7x8q4ddhf19bnkvlcspcxy2hjsb2nnr0nvs3k8aya"; - name = "plasma-integration-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/plasma-integration-5.23.2.tar.xz"; + sha256 = "116hnkfwh4q1ssmayqjx1slam3fmhmdqwd89bc5rzhw0amf1vvy8"; + name = "plasma-integration-5.23.2.tar.xz"; }; }; plasma-nano = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/plasma-nano-5.23.1.tar.xz"; - sha256 = "1ybd12jkw3sbcqzv8pqmkrvww1l73igb907zv457ha5rwy9hi60a"; - name = "plasma-nano-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/plasma-nano-5.23.2.tar.xz"; + sha256 = "110d5qwlfg6jngxf19kqgzj0j8izqyqid0pvd10dwahp7sbsrq3q"; + name = "plasma-nano-5.23.2.tar.xz"; }; }; plasma-nm = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/plasma-nm-5.23.1.tar.xz"; - sha256 = "0qsh5wrk97i9nxpp3la6fp6fvrk0f0gxh71nrzr0c9bc7307imfi"; - name = "plasma-nm-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/plasma-nm-5.23.2.tar.xz"; + sha256 = "0pphzdm5ccl045jvzp83lrcscrhrng12a7sl3mjqa1ghzfbyg2x0"; + name = "plasma-nm-5.23.2.tar.xz"; }; }; plasma-pa = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/plasma-pa-5.23.1.tar.xz"; - sha256 = "0zm5clsj9lfdv0v80g7bzb2cldcghaqn0d9nwywwrpmclmqik7x7"; - name = "plasma-pa-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/plasma-pa-5.23.2.tar.xz"; + sha256 = "05f3hfvp387l968w1h8mwydzvm4kdvyyz1zvphpws8x2izwgjksn"; + name = "plasma-pa-5.23.2.tar.xz"; }; }; plasma-phone-components = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/plasma-phone-components-5.23.1.tar.xz"; - sha256 = "174wvb5jrzsfmn09q4qspf3rdi5nr6faf2n1zc9p1dkwn67pkml2"; - name = "plasma-phone-components-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/plasma-phone-components-5.23.2.tar.xz"; + sha256 = "1rfkxs3v37768fw51wm850smj75c3bcyl3xxl256kqm9rcb4n1gk"; + name = "plasma-phone-components-5.23.2.tar.xz"; }; }; plasma-sdk = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/plasma-sdk-5.23.1.tar.xz"; - sha256 = "1sqywr9d6ghyyff713z1v45207ivddda5hxd7dzpxaf36nb3imq0"; - name = "plasma-sdk-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/plasma-sdk-5.23.2.tar.xz"; + sha256 = "043qpvx6kwzpm80cqvr40y5dhw45ivb5qzc902jfc1288l3qgh1s"; + name = "plasma-sdk-5.23.2.tar.xz"; }; }; plasma-systemmonitor = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/plasma-systemmonitor-5.23.1.tar.xz"; - sha256 = "1kqrkjz8iks5h737a6hpbb104gbaxangrwlzjfgi2h280j2288f8"; - name = "plasma-systemmonitor-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/plasma-systemmonitor-5.23.2.tar.xz"; + sha256 = "0nsva84h46kx7hyv3qz2jmqgiw9mdglyxlhz3x1ywl0m4g91mgq7"; + name = "plasma-systemmonitor-5.23.2.tar.xz"; }; }; plasma-tests = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/plasma-tests-5.23.1.tar.xz"; - sha256 = "1cnn9s9cw6p5aidbsj7ysarcp9jdlxpa54zm0gy9cxp5jbz4hypm"; - name = "plasma-tests-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/plasma-tests-5.23.2.tar.xz"; + sha256 = "0b8mb39vgxlrrsllyq8x83ny4i302w0hs9dgbjg909fmwddlz3k3"; + name = "plasma-tests-5.23.2.tar.xz"; }; }; plasma-thunderbolt = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/plasma-thunderbolt-5.23.1.tar.xz"; - sha256 = "138irsg1mqq31i9rn0ddrhbjym23c1r1w5y1mhrvaqwxqqd5yp0a"; - name = "plasma-thunderbolt-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/plasma-thunderbolt-5.23.2.tar.xz"; + sha256 = "13h5ai0bq3nafsaa2bmgdsy10ychlqm8rnvfqypkx9y52jy9jcwc"; + name = "plasma-thunderbolt-5.23.2.tar.xz"; }; }; plasma-vault = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/plasma-vault-5.23.1.tar.xz"; - sha256 = "0kwcbdm48pg907sah734xnknsa8azlpasxnj9xnagqi91kly5ay5"; - name = "plasma-vault-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/plasma-vault-5.23.2.tar.xz"; + sha256 = "0d9iynky3fxsd6lr7db51aynjz7yz51n21brgwghld4dyfyh0hsf"; + name = "plasma-vault-5.23.2.tar.xz"; }; }; plasma-workspace = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/plasma-workspace-5.23.1.tar.xz"; - sha256 = "1bggh6xrlcxa5yh5398a2bhrgqnzv6hw6ifwws7wrkdkazw7kygv"; - name = "plasma-workspace-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/plasma-workspace-5.23.2.tar.xz"; + sha256 = "0wivjcl5s6llsq8vhi2qiw6gj0a6vppaqvmd1qihpsxgrb763lnv"; + name = "plasma-workspace-5.23.2.tar.xz"; }; }; plasma-workspace-wallpapers = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/plasma-workspace-wallpapers-5.23.1.tar.xz"; - sha256 = "1aplxn4kd48rc5p7x5218iscwlp2sr2sh5qyyl43z28fns0bh9pv"; - name = "plasma-workspace-wallpapers-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/plasma-workspace-wallpapers-5.23.2.tar.xz"; + sha256 = "00aam10k8zmlzw0v9jv5k0gwcjizrvpcyd3nx8m3zyiv6b2jw1g9"; + name = "plasma-workspace-wallpapers-5.23.2.tar.xz"; }; }; plymouth-kcm = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/plymouth-kcm-5.23.1.tar.xz"; - sha256 = "1fdsw7mfcfa90598981w2yb23nbwjqh9ncr8y0ab0l3i0qf8c727"; - name = "plymouth-kcm-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/plymouth-kcm-5.23.2.tar.xz"; + sha256 = "1qgg2d5lrnv5g42ikjnyby3lkxm6iaa1kxw13sdzyv5s6234q7qp"; + name = "plymouth-kcm-5.23.2.tar.xz"; }; }; polkit-kde-agent = { - version = "1-5.23.1"; + version = "1-5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/polkit-kde-agent-1-5.23.1.tar.xz"; - sha256 = "0agmrd64jpvkiy4636hyi7cv9wrj7w6krqihz3d6fm84gqiifrj1"; - name = "polkit-kde-agent-1-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/polkit-kde-agent-1-5.23.2.tar.xz"; + sha256 = "1fldyflcpwhjym9z3rsi90mfjan15w28gwd1s53kiy2fzvmvj0a0"; + name = "polkit-kde-agent-1-5.23.2.tar.xz"; }; }; powerdevil = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/powerdevil-5.23.1.tar.xz"; - sha256 = "15n0xm2yzwinjs33iwgg3jln7ddrc3rvj4m97ya3j16bsqw5j6kj"; - name = "powerdevil-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/powerdevil-5.23.2.tar.xz"; + sha256 = "0f6nhla8gsxil4i0f6np9vjs7f4hgikfw0m6zwp67qqlh9n83mxi"; + name = "powerdevil-5.23.2.tar.xz"; }; }; qqc2-breeze-style = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/qqc2-breeze-style-5.23.1.tar.xz"; - sha256 = "087mqgs9gdrwykqncvm0vvwhrnl77qilp89gmcgkr44kdsnp5682"; - name = "qqc2-breeze-style-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/qqc2-breeze-style-5.23.2.tar.xz"; + sha256 = "09bpvydpinqhc5vrx92fzw9ga6xynpvzxhwrq95dwdp3801kwkgy"; + name = "qqc2-breeze-style-5.23.2.tar.xz"; }; }; sddm-kcm = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/sddm-kcm-5.23.1.tar.xz"; - sha256 = "0i40yj686dfrvkd78msczzh9ffslccnjgmwps29rz1fr8kvjj9mp"; - name = "sddm-kcm-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/sddm-kcm-5.23.2.tar.xz"; + sha256 = "0xq9qyy56vhrwa0m4yvhp0all8m13jzhyhflc2y0d82cb4sn10yh"; + name = "sddm-kcm-5.23.2.tar.xz"; }; }; systemsettings = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/systemsettings-5.23.1.tar.xz"; - sha256 = "0m3fvxr9l1whdgkd9i3wc2gw6yb12di59ihkdxnbbir5j4qm3m3w"; - name = "systemsettings-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/systemsettings-5.23.2.tar.xz"; + sha256 = "0vr22bj0nwp55qximbdn47y4208nhybqiz8pc6fqr2hdg9582s8i"; + name = "systemsettings-5.23.2.tar.xz"; }; }; xdg-desktop-portal-kde = { - version = "5.23.1"; + version = "5.23.2"; src = fetchurl { - url = "${mirror}/stable/plasma/5.23.1/xdg-desktop-portal-kde-5.23.1.tar.xz"; - sha256 = "1bpjq6nd7yc3az9zl13jq088jp2zbdgzqdaxl69wszzaq324qrpp"; - name = "xdg-desktop-portal-kde-5.23.1.tar.xz"; + url = "${mirror}/stable/plasma/5.23.2/xdg-desktop-portal-kde-5.23.2.tar.xz"; + sha256 = "0ji02bscvdjcifibrjx5mk1ga91892hj3f6jcyiycd2xj4sqbcnf"; + name = "xdg-desktop-portal-kde-5.23.2.tar.xz"; }; }; } diff --git a/pkgs/development/libraries/arrow-cpp/default.nix b/pkgs/development/libraries/arrow-cpp/default.nix index fbf84f34ca5c..1ede4ced5071 100644 --- a/pkgs/development/libraries/arrow-cpp/default.nix +++ b/pkgs/development/libraries/arrow-cpp/default.nix @@ -171,11 +171,18 @@ stdenv.mkDerivation rec { "TestFilterKernelWithNumeric/7.CompareArrayAndFilterRandomNumeric" "TestCompareKernel.PrimitiveRandomTests" ] ++ lib.optionals enableS3 [ + "S3OptionsTest.FromUri" + "S3RegionResolutionTest.NonExistentBucket" "S3RegionResolutionTest.PublicBucket" "S3RegionResolutionTest.RestrictedBucket" - "S3RegionResolutionTest.NonExistentBucket" - "S3OptionsTest.FromUri" "TestMinioServer.Connect" + "TestS3FS.OpenOutputStreamBackgroundWrites" + "TestS3FS.OpenOutputStreamDestructorBackgroundWrites" + "TestS3FS.OpenOutputStreamDestructorSyncWrite" + "TestS3FS.OpenOutputStreamDestructorSyncWrites" + "TestS3FS.OpenOutputStreamMetadata" + "TestS3FS.OpenOutputStreamSyncWrites" + "TestS3FSGeneric.*" ]; in lib.optionalString doInstallCheck "-${builtins.concatStringsSep ":" filteredTests}"; diff --git a/pkgs/development/libraries/glibc/common.nix b/pkgs/development/libraries/glibc/common.nix index 064c2532472e..91281f9cd244 100644 --- a/pkgs/development/libraries/glibc/common.nix +++ b/pkgs/development/libraries/glibc/common.nix @@ -288,9 +288,4 @@ stdenv.mkDerivation ({ // lib.optionalAttrs (stdenv.hostPlatform != stdenv.buildPlatform) { preInstall = null; # clobber the native hook - - # To avoid a dependency on the build system 'bash'. - preFixup = '' - rm -f $bin/bin/{ldd,tzselect,catchsegv,xtrace} - ''; }) diff --git a/pkgs/development/libraries/libvirt/default.nix b/pkgs/development/libraries/libvirt/default.nix index 8c1de7820b00..040ba8eb8507 100644 --- a/pkgs/development/libraries/libvirt/default.nix +++ b/pkgs/development/libraries/libvirt/default.nix @@ -70,14 +70,14 @@ let in stdenv.mkDerivation rec { pname = "libvirt"; - version = "7.8.0"; + version = "7.9.0"; src = if buildFromTarball then fetchurl { url = "https://libvirt.org/sources/${pname}-${version}.tar.xz"; - sha256 = "sha256-pyfNCke/ok+n3ih00j86n58Czra0m6FSiPbZoJixmSE="; + sha256 = "sha256-gpzytfV0J5xA8ERuEWiBXT82uJcQVgJjyiznAlb3Low="; } else fetchFromGitLab @@ -85,7 +85,7 @@ stdenv.mkDerivation rec { owner = pname; repo = pname; rev = "v${version}"; - sha256 = "sha256-/tSMJFgLPAiQXcZ2qZLM4XZqf96NtW3+zwKyrwGho2s="; + sha256 = "sha256-Ua6+EKLES3385fqhH2+qwnwE+X/nmWqIBxCXXE3SVhs="; fetchSubmodules = true; }; diff --git a/pkgs/development/libraries/simgear/default.nix b/pkgs/development/libraries/simgear/default.nix index 6167d63544f4..3ce41e3193c5 100644 --- a/pkgs/development/libraries/simgear/default.nix +++ b/pkgs/development/libraries/simgear/default.nix @@ -23,7 +23,7 @@ stdenv.mkDerivation rec { meta = with lib; { description = "Simulation construction toolkit"; - homepage = "https://gitorious.org/fg/simgear"; + homepage = "https://wiki.flightgear.org/SimGear"; maintainers = with maintainers; [ raskin ]; platforms = platforms.linux; license = licenses.lgpl2; diff --git a/pkgs/development/lua-modules/overrides.nix b/pkgs/development/lua-modules/overrides.nix index f01fb7df1172..9190f1fff864 100644 --- a/pkgs/development/lua-modules/overrides.nix +++ b/pkgs/development/lua-modules/overrides.nix @@ -88,7 +88,7 @@ with prev; ]; }); - ljsyscall = prev.ljsyscall.overrideAttrs(oa: rec { + ljsyscall = prev.lib.overrideLuarocks prev.ljsyscall (drv: rec { version = "unstable-20180515"; # package hasn't seen any release for a long time src = pkgs.fetchFromGitHub { diff --git a/pkgs/development/python-modules/ansible-runner/default.nix b/pkgs/development/python-modules/ansible-runner/default.nix index 9dc8eadb7775..a23f668529d1 100644 --- a/pkgs/development/python-modules/ansible-runner/default.nix +++ b/pkgs/development/python-modules/ansible-runner/default.nix @@ -8,20 +8,33 @@ , six , stdenv , ansible -, pytest , mock +, openssh +, pytest-mock +, pytest-timeout +, pytest-xdist +, pytestCheckHook }: buildPythonPackage rec { pname = "ansible-runner"; - version = "2.0.2"; + version = "2.0.3"; src = fetchPypi { inherit pname version; - sha256 = "c02b690803ec0be4453411c53743cd3fdca1dfc66dfa075794e14e717c5b61b3"; + sha256 = "15j0ljgw1rjxq4xiywxxxnxj4r6vwk8dwljkdsjmq3qmwgifcswg"; }; - checkInputs = [ pytest mock ]; + checkInputs = [ + ansible # required to place ansible CLI onto the PATH in tests + pytestCheckHook + pytest-mock + pytest-timeout + pytest-xdist + mock + openssh + ]; + propagatedBuildInputs = [ ansible psutil @@ -31,14 +44,31 @@ buildPythonPackage rec { six ]; - # test_process_isolation_settings is currently broken on Darwin Catalina - # https://github.com/ansible/ansible-runner/issues/413 - checkPhase = '' - HOME=$TMPDIR pytest \ - --ignore test/unit/test_runner.py \ - -k "not prepare ${lib.optionalString stdenv.isDarwin "and not process_isolation_settings"}" + preCheck = '' + export HOME=$(mktemp -d) ''; + disabledTests = [ + "test_callback_plugin_task_args_leak" # requires internet + "test_env_accuracy" + "test_large_stdout_blob" # times out on slower hardware + ] + # test_process_isolation_settings is currently broken on Darwin Catalina + # https://github.com/ansible/ansible-runner/issues/413 + ++ lib.optional stdenv.isDarwin "process_isolation_settings"; + + disabledTestPaths = [ + # these tests unset PATH and then run executables like `bash` (see https://github.com/ansible/ansible-runner/pull/918) + "test/integration/test_runner.py" + "test/unit/test_runner.py" + ] + ++ lib.optionals stdenv.isDarwin [ + # integration tests on Darwin are not regularly passing in ansible-runner's own CI + "test/integration" + # these tests write to `/tmp` which is not writable on Darwin + "test/unit/config/test__base.py" + ]; + meta = with lib; { description = "Helps when interfacing with Ansible"; homepage = "https://github.com/ansible/ansible-runner"; diff --git a/pkgs/development/python-modules/aws-sam-translator/default.nix b/pkgs/development/python-modules/aws-sam-translator/default.nix index 9807c6581c55..d8c1419b0c53 100644 --- a/pkgs/development/python-modules/aws-sam-translator/default.nix +++ b/pkgs/development/python-modules/aws-sam-translator/default.nix @@ -14,13 +14,13 @@ buildPythonPackage rec { pname = "aws-sam-translator"; - version = "1.39.0"; + version = "1.40.0"; src = fetchFromGitHub { owner = "aws"; repo = "serverless-application-model"; rev = "v${version}"; - sha256 = "1a9m7zyqc414adw1i0sr2n9nlnmry0gi1ah1qna3yv9dx4ql9v9c"; + sha256 = "sha256-jVJVoS7rc1RebBvihzmv6LvufMf/VvXOwj0TYkXBdmo="; }; propagatedBuildInputs = [ diff --git a/pkgs/development/python-modules/devtools/default.nix b/pkgs/development/python-modules/devtools/default.nix index fdb240dde842..98f446315d91 100644 --- a/pkgs/development/python-modules/devtools/default.nix +++ b/pkgs/development/python-modules/devtools/default.nix @@ -1,9 +1,19 @@ -{ buildPythonPackage, pythonOlder, fetchFromGitHub, lib, pygments -, pytestCheckHook, pytest-mock }: +{ lib +, asttokens +, buildPythonPackage +, executing +, fetchFromGitHub +, pygments +, pytest-mock +, pytestCheckHook +, pythonOlder +}: buildPythonPackage rec { pname = "devtools"; version = "0.8.0"; + format = "setuptools"; + disabled = pythonOlder "3.6"; src = fetchFromGitHub { @@ -13,11 +23,25 @@ buildPythonPackage rec { sha256 = "0yavcbxzxi1nfa1k326gsl03y8sadi5z5acamwd8b1bsiv15p757"; }; - propagatedBuildInputs = [ pygments ]; + propagatedBuildInputs = [ + asttokens + executing + pygments + ]; - checkInputs = [ pytestCheckHook pytest-mock ]; + checkInputs = [ + pytestCheckHook + pytest-mock + ]; - pythonImportsCheck = [ "devtools" ]; + disabledTests = [ + # Test for Windows32 + "test_print_subprocess" + ]; + + pythonImportsCheck = [ + "devtools" + ]; meta = with lib; { description = "Python's missing debug print command and other development tools"; diff --git a/pkgs/development/python-modules/executing/default.nix b/pkgs/development/python-modules/executing/default.nix index 8ab6994ac415..1a6664df6712 100644 --- a/pkgs/development/python-modules/executing/default.nix +++ b/pkgs/development/python-modules/executing/default.nix @@ -1,19 +1,20 @@ { lib +, asttokens , buildPythonPackage , fetchFromGitHub , setuptools-scm -, asttokens }: buildPythonPackage rec { pname = "executing"; - version = "0.5.4"; + version = "0.8.2"; + format = "setuptools"; src = fetchFromGitHub { owner = "alexmojaki"; repo = pname; rev = "v${version}"; - sha256 = "1hqx94h6l2wg9sljiaajfay2nr62sqa819w3bxrz8cdki1abdygv"; + sha256 = "sha256-CDZQ9DONn7M+2/GtmM2G6nQPpI9dOd0ca+2F1PGRwO4="; }; nativeBuildInputs = [ @@ -26,7 +27,13 @@ buildPythonPackage rec { # Tests appear to run fine (Ran 22 tests in 4.076s) with setuptoolsCheckPhase # but crash with pytestCheckHook - checkInputs = [ asttokens ]; + checkInputs = [ + asttokens + ]; + + pythonImportsCheck = [ + "executing" + ]; meta = with lib; { description = "Get information about what a frame is currently doing, particularly the AST node being executed"; diff --git a/pkgs/development/python-modules/libvirt/default.nix b/pkgs/development/python-modules/libvirt/default.nix index 4572aee08b33..c2c0469aa819 100644 --- a/pkgs/development/python-modules/libvirt/default.nix +++ b/pkgs/development/python-modules/libvirt/default.nix @@ -2,13 +2,13 @@ buildPythonPackage rec { pname = "libvirt"; - version = "7.8.0"; + version = "7.9.0"; src = assert version == libvirt.version; fetchFromGitLab { owner = "libvirt"; repo = "libvirt-python"; rev = "v${version}"; - sha256 = "sha256-GuV++CFkywW0LGconyahfBGY+jjFA27Qu9JGIFt4bus="; + sha256 = "sha256-cfCyQ3KTv0lYTZMriUhm6psBAcJJIcmR/M9V/lrLmVE="; }; nativeBuildInputs = [ pkg-config ]; diff --git a/pkgs/development/tools/aws-sam-cli/default.nix b/pkgs/development/tools/aws-sam-cli/default.nix index c370cddbe436..7b0500400296 100644 --- a/pkgs/development/tools/aws-sam-cli/default.nix +++ b/pkgs/development/tools/aws-sam-cli/default.nix @@ -5,11 +5,11 @@ python3.pkgs.buildPythonApplication rec { pname = "aws-sam-cli"; - version = "1.29.0"; + version = "1.35.0"; src = python3.pkgs.fetchPypi { inherit pname version; - sha256 = "sha256-JXphjERqY5Vj8j2F4Z7FrFJJEpBgK/5236pYfQRVdco="; + sha256 = "sha256-ojJoC8UuZDVm6CDmYbPoO0e+1QAYa0UcekYEd/MGFRM="; }; # Tests are not included in the PyPI package @@ -30,6 +30,8 @@ python3.pkgs.buildPythonApplication rec { serverlessrepo tomlkit watchdog + typing-extensions + regex ]; postFixup = if enableTelemetry then "echo aws-sam-cli TELEMETRY IS ENABLED" else '' @@ -42,10 +44,14 @@ python3.pkgs.buildPythonApplication rec { substituteInPlace requirements/base.txt \ --replace "click~=7.1" "click~=8.0" \ --replace "Flask~=1.1.2" "Flask~=2.0" \ - --replace "dateparser~=0.7" "dateparser>=0.7" \ + --replace "dateparser~=1.0" "dateparser>=0.7" \ --replace "docker~=4.2.0" "docker>=4.2.0" \ --replace "requests==" "requests #" \ - --replace "watchdog==" "watchdog #" + --replace "watchdog==" "watchdog #" \ + --replace "aws_lambda_builders==" "aws-lambda-builders #" \ + --replace "typing_extensions==" "typing-extensions #" \ + --replace "regex==" "regex #" \ + --replace "tzlocal==3.0" "tzlocal==2.*" ''; meta = with lib; { diff --git a/pkgs/development/tools/database/litestream/default.nix b/pkgs/development/tools/database/litestream/default.nix index 3f70f39da951..7468aa55d618 100644 --- a/pkgs/development/tools/database/litestream/default.nix +++ b/pkgs/development/tools/database/litestream/default.nix @@ -4,13 +4,13 @@ }: buildGoModule rec { pname = "litestream"; - version = "0.3.5"; + version = "0.3.6"; src = fetchFromGitHub { owner = "benbjohnson"; repo = pname; rev = "v${version}"; - sha256 = "sha256-OQ8j0FOUWU5TfCl4AZpmX5tuhtHAbrhvzT6ve6AJNn0="; + sha256 = "sha256-A1okmeX3njyRXFKcXJPSV7Hg8Q/P7WqpGz2HThDdUQo="; }; ldflags = [ diff --git a/pkgs/development/tools/git-aggregator/default.nix b/pkgs/development/tools/git-aggregator/default.nix index a6599c667c86..9b2465366f67 100644 --- a/pkgs/development/tools/git-aggregator/default.nix +++ b/pkgs/development/tools/git-aggregator/default.nix @@ -1,17 +1,18 @@ -{ git, lib, python3Packages }: +{ lib, git, python3Packages }: python3Packages.buildPythonApplication rec { pname = "git-aggregator"; - version = "1.8.1"; + version = "2.1.0"; src = python3Packages.fetchPypi { inherit pname version; - hash = "sha256-LLsyhyhPmOOvPzwEEJwkhrDfBMFueA7kuDlnrqwr08k="; + sha256 = "sha256-79xNPzYP1j71sU5wZM5e2xTqQExqQEdxXPxbk4T/Scw="; }; nativeBuildInputs = with python3Packages; [ setuptools-scm ]; + propagatedBuildInputs = with python3Packages; [ argcomplete colorama @@ -25,13 +26,15 @@ python3Packages.buildPythonApplication rec { ]; preCheck = '' - export HOME=`mktemp -d` + export HOME="$(mktemp -d)" git config --global user.name John git config --global user.email john@localhost + git config --global init.defaultBranch master + git config --global pull.rebase false ''; meta = with lib; { - description = "Manage the aggregation of git branches from different remotes to build a consolidated one."; + description = "Manage the aggregation of git branches from different remotes to build a consolidated one"; homepage = "https://github.com/acsone/git-aggregator"; license = licenses.agpl3Plus; maintainers = with maintainers; [ lourkeur ]; diff --git a/pkgs/games/flightgear/default.nix b/pkgs/games/flightgear/default.nix index bfbb705da387..6f4a57587de9 100644 --- a/pkgs/games/flightgear/default.nix +++ b/pkgs/games/flightgear/default.nix @@ -6,7 +6,7 @@ }: let - version = "2020.3.8"; + version = "2020.3.11"; shortVersion = builtins.substring 0 6 version; data = stdenv.mkDerivation rec { pname = "flightgear-data"; @@ -14,7 +14,7 @@ let src = fetchurl { url = "mirror://sourceforge/flightgear/release-${shortVersion}/FlightGear-${version}-data.txz"; - sha256 = "sha256-/KFumHRkmRvsU/L1i11jG/KbqobnOEP7l4lyPMKHycA="; + sha256 = "sha256-Ej8VGywPQiDw3VXodcpXpOw4qU9x+MBMWMrqwHfitVg="; }; dontUnpack = true; @@ -32,7 +32,7 @@ stdenv.mkDerivation rec { src = fetchurl { url = "mirror://sourceforge/flightgear/release-${shortVersion}/${pname}-${version}.tar.bz2"; - sha256 = "XXDqhZ9nR+FwQ3LauZe8iGxOjlyDXDrEtj61BQGVDYc="; + sha256 = "sha256-/icGx3B+pzq8URR3PeRfKYYasPj1NWVq8EKO0EnKSpc="; }; # Of all the files in the source and data archives, there doesn't seem to be diff --git a/pkgs/misc/wiki-tui/default.nix b/pkgs/misc/wiki-tui/default.nix index b07dd8c731b1..168aff9a6cb6 100644 --- a/pkgs/misc/wiki-tui/default.nix +++ b/pkgs/misc/wiki-tui/default.nix @@ -1,19 +1,25 @@ -{ lib, rustPlatform, fetchCrate, ncurses, openssl, pkg-config }: +{ lib, rustPlatform, fetchFromGitHub, ncurses, openssl, pkg-config, stdenv, nix-update-script, Security }: rustPlatform.buildRustPackage rec { pname = "wiki-tui"; - version = "0.3.4"; + version = "0.4.1"; - src = fetchCrate { - inherit pname version; - sha256 = "sha256-H+C1AbZ2zUhw6TNlSPaNaNuY5iNf39JW4q2g6uolevM="; + src = fetchFromGitHub { + owner = "Builditluc"; + repo = pname; + rev = "v${version}"; + sha256 = "sha256-aCfYb5UvlWbBvBlwNjVIbOJlEV2b3+FD0qKO+9h5Nos="; }; - buildInputs = [ ncurses openssl ]; + buildInputs = [ ncurses openssl ] ++ lib.optional stdenv.isDarwin Security; nativeBuildInputs = [ pkg-config ]; - cargoSha256 = "sha256-PIt592nGtNEREQMukqRl/6KSJ/P32fWucHEMyOOc7BA="; + cargoSha256 = "sha256-dD8iC/b6KwElmq0RNdnHHC/jMWh7Q0/kMM+/zityHqQ="; + + passthru.updateScript = nix-update-script { + attrPath = pname; + }; meta = with lib; { description = "A simple and easy to use Wikipedia Text User Interface"; diff --git a/pkgs/servers/owncast/default.nix b/pkgs/servers/owncast/default.nix index 65fa8a0f22e9..68591f458230 100644 --- a/pkgs/servers/owncast/default.nix +++ b/pkgs/servers/owncast/default.nix @@ -2,13 +2,13 @@ buildGoModule rec { pname = "owncast"; - version = "0.0.9"; + version = "0.0.10"; src = fetchFromGitHub { owner = "owncast"; repo = "owncast"; rev = "v${version}"; - sha256 = "sha256-pJb11ifaiamp7P7d/xCwDKfOFufLmDDroUJPnWlTOkI="; + sha256 = "sha256-OcolQ4KnZbSgS1dpphbCML40jlheKAxbac7rjRul6Oc="; }; vendorSha256 = "sha256-NARHYeOVT7sxfL1BdJc/CPCgHNZzjWE7kACJvrEC71Y="; diff --git a/pkgs/tools/backup/partclone/default.nix b/pkgs/tools/backup/partclone/default.nix index 06c207471577..4686fcd3e647 100644 --- a/pkgs/tools/backup/partclone/default.nix +++ b/pkgs/tools/backup/partclone/default.nix @@ -4,13 +4,13 @@ stdenv.mkDerivation rec { pname = "partclone"; - version = "0.3.17"; + version = "0.3.18"; src = fetchFromGitHub { owner = "Thomas-Tsai"; repo = "partclone"; rev = version; - sha256 = "sha256-tMdBo26JvHxbVI/Y2KDMejH+YT4IVx2H/y36u9ss0C8="; + sha256 = "sha256-cSxQJmuKm54AzIQbsEZhv/I8hfpaGroszdWqbRb3Ht4="; }; nativeBuildInputs = [ autoreconfHook pkg-config ]; diff --git a/pkgs/tools/compression/crabz/default.nix b/pkgs/tools/compression/crabz/default.nix index ab5cc94b43a1..5eafb3f56145 100644 --- a/pkgs/tools/compression/crabz/default.nix +++ b/pkgs/tools/compression/crabz/default.nix @@ -29,6 +29,15 @@ rustPlatform.buildRustPackage rec { Security ]; + # link System as a dylib instead of a framework on macos + postPatch = lib.optionalString stdenv.isDarwin '' + core_affinity=../$(stripHash $cargoDeps)/core_affinity + oldHash=$(sha256sum $core_affinity/src/lib.rs | cut -d " " -f 1) + substituteInPlace $core_affinity/src/lib.rs --replace framework dylib + substituteInPlace $core_affinity/.cargo-checksum.json \ + --replace $oldHash $(sha256sum $core_affinity/src/lib.rs | cut -d " " -f 1) + ''; + meta = with lib; { description = "A cross platform, fast, compression and decompression tool"; homepage = "https://github.com/sstadick/crabz"; diff --git a/pkgs/tools/misc/fzf/default.nix b/pkgs/tools/misc/fzf/default.nix index e56a61338aaa..b82232a6b96d 100644 --- a/pkgs/tools/misc/fzf/default.nix +++ b/pkgs/tools/misc/fzf/default.nix @@ -2,13 +2,13 @@ buildGoModule rec { pname = "fzf"; - version = "0.27.3"; + version = "0.28.0"; src = fetchFromGitHub { owner = "junegunn"; repo = pname; rev = version; - sha256 = "sha256-uVGU8tOHHJYBoWTwx9ilnOKo49R0QHdCABKfGoL7Dkk="; + sha256 = "sha256-28Lu/WYIJWdLmSKX6C3w6F5NXXynPVwmmdH8PcDwC+Y="; }; vendorSha256 = "sha256-omvCzM5kH3nAE57S33NV0OFRJmU+Ty7hhriaG/Dc0o0="; diff --git a/pkgs/tools/networking/vpnc/default.nix b/pkgs/tools/networking/vpnc/default.nix index 6928bacd6ce7..d5fa25b0e44a 100644 --- a/pkgs/tools/networking/vpnc/default.nix +++ b/pkgs/tools/networking/vpnc/default.nix @@ -33,9 +33,6 @@ stdenv.mkDerivation { substituteInPlace "config.c" \ --replace "/etc/vpnc/vpnc-script" "$out/etc/vpnc/vpnc-script" - - substituteInPlace "pcf2vpnc" \ - --replace "/usr/bin/perl" "${perl}/bin/perl" ''; postInstall = '' diff --git a/pkgs/tools/nix/statix/default.nix b/pkgs/tools/nix/statix/default.nix index 1a1f5c4a2431..3e56fa4fb608 100644 --- a/pkgs/tools/nix/statix/default.nix +++ b/pkgs/tools/nix/statix/default.nix @@ -4,16 +4,16 @@ rustPlatform.buildRustPackage rec { pname = "statix"; # also update version of the vim plugin in pkgs/misc/vim-plugins/overrides.nix # the version can be found in flake.nix of the source code - version = "0.3.6"; + version = "0.4.0"; src = fetchFromGitHub { owner = "nerdypepper"; repo = pname; rev = "v${version}"; - sha256 = "sha256-fsEqPr+qtLNmTtxUxjcVDPoG7fjqFImnVHwscy2IBkE="; + sha256 = "sha256-wqkhtAOO6pKLjUUnDbVFwzm6mbXhP/4iJU7ZKtDKrE8="; }; - cargoSha256 = "sha256-7fSJhRqZh7lUIe8vVzIVx+1phd+Am+GNzKN62NSuOYs="; + cargoSha256 = "sha256-e20POz9ZvuT0S+YG+9x7hcudhXQpOR4rVSFJbz76OI0="; cargoBuildFlags = lib.optionals withJson [ "--features" "json" ]; diff --git a/pkgs/tools/package-management/nvd/default.nix b/pkgs/tools/package-management/nvd/default.nix index 1218ac01f9a6..2a00acff690c 100644 --- a/pkgs/tools/package-management/nvd/default.nix +++ b/pkgs/tools/package-management/nvd/default.nix @@ -2,13 +2,15 @@ stdenv.mkDerivation rec { pname = "nvd"; - version = "0.1.1"; + version = "0.1.2"; src = fetchFromGitLab { owner = "khumba"; repo = pname; - rev = "v${version}"; - sha256 = "0accq0cw6qsxin1fb2bp2ijgjf9akb9qlivkykpfsgnk5qjafv2n"; + # There is a 0.1.2 release but no tag yet + # https://gitlab.com/khumba/nvd/-/issues/7 + rev = "13d3ab1255e0de03693cecb7da9764c9afd5d472"; + sha256 = "1537s7j0m0hkahf0s1ai7bm94xj9fz6b9x78py0dn3cgnl9bfzla"; }; buildInputs = [ python3 ]; diff --git a/pkgs/tools/security/passff-host/default.nix b/pkgs/tools/security/passff-host/default.nix index fb348800f5a1..87b349c63a46 100644 --- a/pkgs/tools/security/passff-host/default.nix +++ b/pkgs/tools/security/passff-host/default.nix @@ -2,13 +2,13 @@ stdenv.mkDerivation rec { pname = "passff-host"; - version = "1.2.1"; + version = "1.2.2"; src = fetchFromGitHub { owner = "passff"; repo = pname; rev = version; - sha256 = "0ydfwvhgnw5c3ydx2gn5d7ys9g7cxlck57vfddpv6ix890v21451"; + sha256 = "sha256-9q4onU/e/pzLp5lGQjf/ScOOCVMiMQRaLGEm8K8flX4="; }; buildInputs = [ python3 ]; diff --git a/pkgs/tools/wayland/wlogout/default.nix b/pkgs/tools/wayland/wlogout/default.nix index 2625405808cc..d9d442126010 100644 --- a/pkgs/tools/wayland/wlogout/default.nix +++ b/pkgs/tools/wayland/wlogout/default.nix @@ -9,6 +9,7 @@ , libxkbcommon , wayland , wayland-protocols +, gtk-layer-shell }: stdenv.mkDerivation rec { @@ -28,6 +29,7 @@ stdenv.mkDerivation rec { libxkbcommon wayland wayland-protocols + gtk-layer-shell ]; postPatch = '' diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 43a75af9922e..16b7114f16e3 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -33022,7 +33022,9 @@ with pkgs; wiki-js = callPackage ../servers/web-apps/wiki-js { }; - wiki-tui = callPackage ../misc/wiki-tui { }; + wiki-tui = callPackage ../misc/wiki-tui { + inherit (darwin.apple_sdk.frameworks) Security; + }; winePackagesFor = wineBuild: lib.makeExtensible (self: with self; { callPackage = newScope self; diff --git a/pkgs/top-level/perl-packages.nix b/pkgs/top-level/perl-packages.nix index 8393c1fd4ba1..19ee06b75a5a 100644 --- a/pkgs/top-level/perl-packages.nix +++ b/pkgs/top-level/perl-packages.nix @@ -20636,12 +20636,12 @@ let SysVirt = buildPerlModule rec { pname = "Sys-Virt"; - version = "7.8.0"; + version = "7.9.0"; src = fetchFromGitLab { owner = "libvirt"; repo = "libvirt-perl"; - rev = "v7.8.0"; - sha256 = "sha256-D/sVIKMWy3WnDM97+ofG3ClgGhJJuK2a6NJLC03S4LI="; + rev = "v7.9.0"; + sha256 = "sha256-QxY6TRVQWrN689CD76CQZeyXsDVWxk24N1v67DCvmDo="; }; nativeBuildInputs = [ pkgs.pkg-config ]; buildInputs = [ pkgs.libvirt CPANChanges TestPod TestPodCoverage XMLXPath ];