diff --git a/nixos/doc/manual/installation/installing-virtualbox-guest.xml b/nixos/doc/manual/installation/installing-virtualbox-guest.xml
index 1cffeed48079..4957b700946e 100644
--- a/nixos/doc/manual/installation/installing-virtualbox-guest.xml
+++ b/nixos/doc/manual/installation/installing-virtualbox-guest.xml
@@ -83,7 +83,7 @@
VirtualBox settings (Machine / Settings / Shared Folders, then click on the
"Add" icon). Add the following to the
/etc/nixos/configuration.nix to auto-mount them. If you do
- not add "nofail", the system will no boot properly. The
+ not add "nofail", the system will not boot properly. The
same goes for disabling rngd which is normally used to get
randomness but this does not work in virtual machines.
diff --git a/nixos/modules/virtualisation/qemu-vm.nix b/nixos/modules/virtualisation/qemu-vm.nix
index 447d1f091c8c..b66ac1441864 100644
--- a/nixos/modules/virtualisation/qemu-vm.nix
+++ b/nixos/modules/virtualisation/qemu-vm.nix
@@ -605,6 +605,10 @@ in
virtualisation.bootDevice = mkDefault (driveDeviceName 1);
+ virtualisation.useEFIBoot = mkDefault
+ (config.boot.loader.systemd-boot.enable ||
+ config.boot.loader.efi.canTouchEfiVariables);
+
virtualisation.pathsInNixDB = [ config.system.build.toplevel ];
# FIXME: Consolidate this one day.
diff --git a/nixos/tests/systemd-boot.nix b/nixos/tests/systemd-boot.nix
index 7a663dd9b428..a37c87bccc28 100644
--- a/nixos/tests/systemd-boot.nix
+++ b/nixos/tests/systemd-boot.nix
@@ -9,7 +9,6 @@ with pkgs.lib;
let
common = {
virtualisation.useBootLoader = true;
- virtualisation.useEFIBoot = true;
boot.loader.systemd-boot.enable = true;
boot.loader.efi.canTouchEfiVariables = true;
environment.systemPackages = [ pkgs.efibootmgr ];
diff --git a/pkgs/applications/misc/keystore-explorer/default.nix b/pkgs/applications/misc/keystore-explorer/default.nix
new file mode 100644
index 000000000000..613b96d1731c
--- /dev/null
+++ b/pkgs/applications/misc/keystore-explorer/default.nix
@@ -0,0 +1,40 @@
+{ fetchzip, stdenv, jdk8, runtimeShell }:
+
+stdenv.mkDerivation rec {
+ version = "5.4.4";
+ pname = "keystore-explorer";
+ src = fetchzip {
+ url = "https://github.com/kaikramer/keystore-explorer/releases/download/v${version}/kse-544.zip";
+ sha256 = "01kpa8g6p6vcqq9y70w5bm8jbw4kp55pbywj2zrhgjibrhgjqi0b";
+ };
+
+ installPhase = ''
+ runHook preInstall
+
+ mkdir -p $out/bin
+ mkdir -p $out/share/keystore-explorer
+ cp -R icons licenses lib kse.jar $out/share/keystore-explorer/
+
+ # keystore-explorer's kse.sh tries to detect the path of Java by using
+ # Python on Darwin; just write our own start script to avoid unnecessary dependencies
+ cat > $out/bin/keystore-explorer < $out/share/applications/steam.desktop
+ ln -s ${steam}/share/applications/steam.desktop $out/share/applications/steam.desktop
'';
profile = ''
@@ -261,6 +272,7 @@ in buildFHSUserEnv rec {
fi
fi
${lib.optionalString (!nativeOnly) exportLDPath}
+ ${fixBootstrap}
exec steam "$@"
'';
@@ -287,6 +299,7 @@ in buildFHSUserEnv rec {
fi
shift
${lib.optionalString (!nativeOnly) exportLDPath}
+ ${fixBootstrap}
exec -- "$run" "$@"
'';
};
diff --git a/pkgs/games/steam/steam.nix b/pkgs/games/steam/steam.nix
index 20ccba641e4a..fa99f39d68cb 100644
--- a/pkgs/games/steam/steam.nix
+++ b/pkgs/games/steam/steam.nix
@@ -2,7 +2,7 @@
let
traceLog = "/tmp/steam-trace-dependencies.log";
- version = "1.0.0.61";
+ version = "1.0.0.68";
in stdenv.mkDerivation {
pname = "steam-original";
@@ -10,7 +10,7 @@ in stdenv.mkDerivation {
src = fetchurl {
url = "https://repo.steampowered.com/steam/pool/steam/s/steam/steam_${version}.tar.gz";
- sha256 = "0c5xy57gwr14vp3wy3jpqi5dl6y7n01p2dy4jlgl9bf9x7616r6n";
+ sha256 = "sha256-ZeiCYjxnH0Ath5bB20QHmE8R3wU4/3RiAw2NUhrrKNM=";
};
makeFlags = [ "DESTDIR=$(out)" "PREFIX=" ];
@@ -26,14 +26,16 @@ in stdenv.mkDerivation {
EOF
chmod +x $out/bin/steamdeps
''}
- install -d $out/lib/udev/rules.d
- install -m644 lib/udev/rules.d/*.rules $out/lib/udev/rules.d
+
+ # this just installs a link, "steam.desktop -> /lib/steam/steam.desktop"
+ rm $out/share/applications/steam.desktop
+ sed -e 's,/usr/bin/steam,steam,g' steam.desktop > $out/share/applications/steam.desktop
'';
meta = with stdenv.lib; {
description = "A digital distribution platform";
homepage = "http://store.steampowered.com/";
license = licenses.unfreeRedistributable;
- maintainers = with maintainers; [ jagajaga ];
+ maintainers = with maintainers; [ jagajaga jonringer ];
};
}
diff --git a/pkgs/os-specific/linux/kernel/linux-zen.nix b/pkgs/os-specific/linux/kernel/linux-zen.nix
index 5ac81d6ebb94..fd06b2f82172 100644
--- a/pkgs/os-specific/linux/kernel/linux-zen.nix
+++ b/pkgs/os-specific/linux/kernel/linux-zen.nix
@@ -1,7 +1,7 @@
{ stdenv, fetchFromGitHub, buildLinux, ... } @ args:
let
- version = "5.9.14";
+ version = "5.10.1";
in
buildLinux (args // {
@@ -13,11 +13,11 @@ buildLinux (args // {
owner = "zen-kernel";
repo = "zen-kernel";
rev = "v${version}-zen1";
- sha256 = "1b8pm80z49d7qk9mvdf9w3hih34pilqr1zjk110q5im1kdz81zrg";
+ sha256 = "1c77x53ixyn64b4qq6br6ckicmjs316c8k08yfxibmhv72av1wcp";
};
extraMeta = {
- branch = "5.9/master";
+ branch = "5.10/master";
maintainers = with stdenv.lib.maintainers; [ atemu andresilva ];
};
diff --git a/pkgs/os-specific/linux/libpsm2/default.nix b/pkgs/os-specific/linux/libpsm2/default.nix
index b9e41380da8c..501453b88216 100644
--- a/pkgs/os-specific/linux/libpsm2/default.nix
+++ b/pkgs/os-specific/linux/libpsm2/default.nix
@@ -2,8 +2,7 @@
stdenv.mkDerivation rec {
pname = "libpsm2";
- version = "11.2.156";
- ifs_version = "10_10_2_0_44";
+ version = "11.2.185";
preConfigure= ''
export UDEVDIR=$out/etc/udev
@@ -14,7 +13,7 @@ stdenv.mkDerivation rec {
buildInputs = [ numactl pkgconfig ];
- installFlags = [
+ installFlags = [
"DESTDIR=$(out)"
"UDEVDIR=/etc/udev"
"LIBPSM2_COMPAT_CONF_DIR=/etc"
@@ -23,8 +22,8 @@ stdenv.mkDerivation rec {
src = fetchFromGitHub {
owner = "intel";
repo = "opa-psm2";
- rev = "IFS_RELEASE_${ifs_version}";
- sha256 = "0ckrfzih1ga9yvximxjdh0z05kn9l858ykqiblv18w6ka3gra1xz";
+ rev = "PSM2_${version}";
+ sha256 = "062hg4r6gz7pla9df70nqs5i2a3mp1wszmp4l0g771fykhhrxsjg";
};
postInstall = ''
diff --git a/pkgs/tools/filesystems/glusterfs/default.nix b/pkgs/tools/filesystems/glusterfs/default.nix
index f495b56e3252..a4e6bc1182be 100644
--- a/pkgs/tools/filesystems/glusterfs/default.nix
+++ b/pkgs/tools/filesystems/glusterfs/default.nix
@@ -1,25 +1,17 @@
-{stdenv, fetchurl, fuse, bison, flex_2_5_35, openssl, python3, ncurses, readline,
+{stdenv, fetchFromGitHub, fuse, bison, flex_2_5_35, openssl, python3, ncurses, readline,
autoconf, automake, libtool, pkgconfig, zlib, libaio, libxml2, acl, sqlite,
liburcu, attr, makeWrapper, coreutils, gnused, gnugrep, which,
openssh, gawk, findutils, util-linux, lvm2, btrfs-progs, e2fsprogs, xfsprogs, systemd,
rsync, glibc, rpcsvc-proto, libtirpc
}:
let
- s =
- rec {
- baseName="glusterfs";
- # NOTE: On each glusterfs release, it should be checked if gluster added
- # new, or changed, Python scripts whose PYTHONPATH has to be set in
- # `postFixup` below, and whose runtime deps need to go into
- # `nativeBuildInputs`.
- # The command
- # find /nix/store/...-glusterfs-.../ -name '*.py' -executable
- # can help with finding new Python scripts.
- version = "7.6";
- name="${baseName}-${version}";
- url="https://github.com/gluster/glusterfs/archive/v${version}.tar.gz";
- sha256 = "0zdcv2jk8dp67id8ic30mkn97ccp07jf20g7v09a5k31pw9aqyih";
- };
+ # NOTE: On each glusterfs release, it should be checked if gluster added
+ # new, or changed, Python scripts whose PYTHONPATH has to be set in
+ # `postFixup` below, and whose runtime deps need to go into
+ # `nativeBuildInputs`.
+ # The command
+ # find /nix/store/...-glusterfs-.../ -name '*.py' -executable
+ # can help with finding new Python scripts.
buildInputs = [
fuse bison flex_2_5_35 openssl ncurses readline
@@ -60,16 +52,17 @@ let
which # which
xfsprogs # xfs_info
];
-in
-stdenv.mkDerivation
-{
- inherit (s) name version;
- inherit buildInputs propagatedBuildInputs;
+in stdenv.mkDerivation rec {
+ pname = "glusterfs";
+ version = "8.3";
- patches = [
- # Remove when https://bugzilla.redhat.com/show_bug.cgi?id=1489610 is fixed
- ./glusterfs-fix-bug-1489610-glusterfind-var-data-under-prefix.patch
- ];
+ src = fetchFromGitHub {
+ owner = "gluster";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "09vvbymiacz2pzwnq6f2dd7g2zszzsivdncz45sh977v3z0n84az";
+ };
+ inherit buildInputs propagatedBuildInputs;
postPatch = ''
sed -e '/chmod u+s/d' -i contrib/fuse-util/Makefile.am
@@ -91,7 +84,7 @@ stdenv.mkDerivation
# but fails when the version is empty.
# See upstream GlusterFS bug https://bugzilla.redhat.com/show_bug.cgi?id=1452705
preConfigure = ''
- echo "v${s.version}" > VERSION
+ echo "v${version}" > VERSION
./autogen.sh
export PYTHON=${python3}/bin/python
'';
@@ -109,7 +102,7 @@ stdenv.mkDerivation
postInstall = ''
cp -r $out/$out/* $out
rm -r $out/nix
- '';
+ '';
postFixup = ''
# glusterd invokes `gluster` and other utilities when telling other glusterd nodes to run commands.
@@ -153,7 +146,7 @@ stdenv.mkDerivation
wrapProgram $out/share/glusterfs/scripts/eventsdash.py --set PATH "$GLUSTER_PATH" --set PYTHONPATH "$GLUSTER_PYTHONPATH" --set LD_LIBRARY_PATH "$GLUSTER_LD_LIBRARY_PATH"
wrapProgram $out/libexec/glusterfs/glusterfind/brickfind.py --set PATH "$GLUSTER_PATH" --set PYTHONPATH "$GLUSTER_PYTHONPATH" --set LD_LIBRARY_PATH "$GLUSTER_LD_LIBRARY_PATH"
wrapProgram $out/libexec/glusterfs/glusterfind/changelog.py --set PATH "$GLUSTER_PATH" --set PYTHONPATH "$GLUSTER_PYTHONPATH" --set LD_LIBRARY_PATH "$GLUSTER_LD_LIBRARY_PATH"
- '';
+ '';
doInstallCheck = true;
@@ -187,12 +180,7 @@ stdenv.mkDerivation
rm -r $out/bin/conf.py
'';
- src = fetchurl {
- inherit (s) url sha256;
- };
-
meta = with stdenv.lib; {
- inherit (s) version;
description = "Distributed storage system";
homepage = "https://www.gluster.org";
license = licenses.lgpl3Plus; # dual licese: choice of lgpl3Plus or gpl2
diff --git a/pkgs/tools/filesystems/glusterfs/glusterfs-fix-bug-1489610-glusterfind-var-data-under-prefix.patch b/pkgs/tools/filesystems/glusterfs/glusterfs-fix-bug-1489610-glusterfind-var-data-under-prefix.patch
deleted file mode 100644
index f08d73cf3a65..000000000000
--- a/pkgs/tools/filesystems/glusterfs/glusterfs-fix-bug-1489610-glusterfind-var-data-under-prefix.patch
+++ /dev/null
@@ -1,27 +0,0 @@
-From f523afac49e24ecc0fa4ad85195135689cf445f0 Mon Sep 17 00:00:00 2001
-From: =?UTF-8?q?Niklas=20Hamb=C3=BCchen?=
-Date: Wed, 27 Sep 2017 21:36:41 +0200
-Subject: [PATCH] Fix "glusterfind saves var data under $prefix instead of
- localstatedir". Fixes #1489610
-
-Change-Id: Id2362c20f34346c37acfb9eb1ad105d0b7b8b60f
----
- configure.ac | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/configure.ac b/configure.ac
-index f87d8a454..b4d3f5d10 100644
---- a/configure.ac
-+++ b/configure.ac
-@@ -1118,7 +1118,7 @@ if test "x$exec_prefix" = xNONE; then
- exec_prefix="$(eval echo $prefix)"
- fi
- GLUSTERFS_LIBEXECDIR="$(eval echo $libexecdir)/glusterfs"
--GLUSTERFSD_MISCDIR="$(eval echo $prefix)/var/lib/misc/glusterfsd"
-+GLUSTERFSD_MISCDIR="$(eval echo $localstatedir)/lib/misc/glusterfsd"
- prefix=$old_prefix
- exec_prefix=$old_exec_prefix
-
---
-2.12.0
-
diff --git a/pkgs/tools/security/neopg/default.nix b/pkgs/tools/security/neopg/default.nix
index 4f4f660e20f4..8c0d31853ff9 100644
--- a/pkgs/tools/security/neopg/default.nix
+++ b/pkgs/tools/security/neopg/default.nix
@@ -44,5 +44,6 @@ stdenv.mkDerivation rec {
'';
maintainers = with maintainers; [ erictapen ];
platforms = platforms.linux;
+ broken = true; # fails to build with recent versions of botan. https://github.com/das-labor/neopg/issues/98
};
}
diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix
index 7890c68aa3f2..0b98bd47d1e4 100644
--- a/pkgs/top-level/all-packages.nix
+++ b/pkgs/top-level/all-packages.nix
@@ -5107,6 +5107,8 @@ in
keyfuzz = callPackage ../tools/inputmethods/keyfuzz { };
+ keystore-explorer = callPackage ../applications/misc/keystore-explorer { };
+
kibana6 = callPackage ../development/tools/misc/kibana/6.x.nix { };
kibana6-oss = callPackage ../development/tools/misc/kibana/6.x.nix {
enableUnfree = false;
@@ -9070,6 +9072,8 @@ in
fasmg = callPackage ../development/compilers/fasmg { };
+ flasm = callPackage ../development/compilers/flasm { };
+
flyctl = callPackage ../development/web/flyctl { };
flutterPackages =
@@ -10592,19 +10596,16 @@ in
octave = callPackage ../development/interpreters/octave {
python = python3;
mkDerivation = stdenv.mkDerivation;
- jdk = jdk8; # TODO: remove override https://github.com/NixOS/nixpkgs/pull/89731
};
octave-jit = callPackage ../development/interpreters/octave {
python = python3;
enableJIT = true;
mkDerivation = stdenv.mkDerivation;
- jdk = jdk8; # TODO: remove override https://github.com/NixOS/nixpkgs/pull/89731
};
octaveFull = libsForQt5.callPackage ../development/interpreters/octave {
python = python3;
enableQt = true;
overridePlatforms = ["x86_64-linux" "x86_64-darwin"];
- jdk = jdk8; # TODO: remove override https://github.com/NixOS/nixpkgs/pull/89731
};
ocropus = callPackage ../applications/misc/ocropus { };
@@ -16083,6 +16084,8 @@ in
soapyairspy = callPackage ../applications/radio/soapyairspy { };
+ soapyaudio = callPackage ../applications/radio/soapyaudio { };
+
soapybladerf = callPackage ../applications/radio/soapybladerf { };
soapyhackrf = callPackage ../applications/radio/soapyhackrf { };
@@ -16095,6 +16098,7 @@ in
extraPackages = [
limesuite
soapyairspy
+ soapyaudio
soapybladerf
soapyhackrf
soapyremote
@@ -16250,10 +16254,6 @@ in
python = python3;
};
- sundials_2 = callPackage ../development/libraries/sundials/2.x.nix {
- python = python3;
- };
-
sutils = callPackage ../tools/misc/sutils { };
svrcore = callPackage ../development/libraries/svrcore { };
diff --git a/pkgs/top-level/release-alternatives.nix b/pkgs/top-level/release-alternatives.nix
index 7479377bd302..5e309a0129c3 100644
--- a/pkgs/top-level/release-alternatives.nix
+++ b/pkgs/top-level/release-alternatives.nix
@@ -9,7 +9,7 @@ let
blasUsers = [
# "julia_07" "julia_10" "julia_11" "julia_13" "octave" "octaveFull"
"fflas-ffpack" "linbox" "R" "ipopt" "hpl" "rspamd" "octopus"
- "sundials" "sundials_2" "superlu" "suitesparse_5_3" "suitesparse_4_4"
+ "sundials" "superlu" "suitesparse_5_3" "suitesparse_4_4"
"suitesparse_4_2" "scs" "scalapack" "petsc" "cholmod-extra"
"arpack" "qrupdate" "libcint" "iml" "globalarrays" "arrayfire" "armadillo"
"xfitter" "lammps" "plink-ng" "quantum-espresso" "siesta"