Skip to content

Commit

Permalink
Merge master into staging-next
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Jan 23, 2023
2 parents d8bfd0a + 9d351dc commit eadaaa7
Show file tree
Hide file tree
Showing 107 changed files with 2,786 additions and 1,025 deletions.
6 changes: 6 additions & 0 deletions maintainers/maintainer-list.nix
Original file line number Diff line number Diff line change
Expand Up @@ -10418,6 +10418,12 @@
githubId = 6052922;
name = "Kirill Struokov";
};
novenary = {
email = "streetwalkermc@gmail.com";
github = "9ary";
githubId = 1155030;
name = "novenary";
};
np = {
email = "np.nix@nicolaspouillard.fr";
github = "np";
Expand Down
9 changes: 9 additions & 0 deletions nixos/doc/manual/from_md/release-notes/rl-2305.section.xml
Original file line number Diff line number Diff line change
Expand Up @@ -354,6 +354,15 @@
been changed to <literal>null</literal>.
</para>
</listitem>
<listitem>
<para>
The <literal>--target-host</literal> and
<literal>--build-host</literal> options of
<literal>nixos-rebuild</literal> no longer treat the
<literal>localhost</literal> value specially – to build
on/deploy to local machine, omit the relevant flag.
</para>
</listitem>
<listitem>
<para>
The <literal>nix.readOnlyStore</literal> option has been
Expand Down
6 changes: 3 additions & 3 deletions nixos/doc/manual/man-nixos-rebuild.xml
Original file line number Diff line number Diff line change
Expand Up @@ -583,15 +583,15 @@
<listitem>
<para>
Specifies the NixOS target host. By setting this to something other than
<replaceable>localhost</replaceable>, the system activation will happen
an empty string, the system activation will happen
on the remote host instead of the local machine. The remote host needs to
be accessible over ssh, and for the commands <option>switch</option>,
<option>boot</option> and <option>test</option> you need root access.
</para>

<para>
If <option>--build-host</option> is not explicitly specified, building
will take place locally.
If <option>--build-host</option> is not explicitly specified or empty,
building will take place locally.
</para>

<para>
Expand Down
2 changes: 2 additions & 0 deletions nixos/doc/manual/release-notes/rl-2305.section.md
Original file line number Diff line number Diff line change
Expand Up @@ -87,6 +87,8 @@ In addition to numerous new and upgraded packages, this release has the followin

- In `mastodon` it is now necessary to specify location of file with `PostgreSQL` database password. In `services.mastodon.database.passwordFile` parameter default value `/var/lib/mastodon/secrets/db-password` has been changed to `null`.

- The `--target-host` and `--build-host` options of `nixos-rebuild` no longer treat the `localhost` value specially – to build on/deploy to local machine, omit the relevant flag.

- The `nix.readOnlyStore` option has been renamed to `boot.readOnlyNixStore` to clarify that it configures the NixOS boot process, not the Nix daemon.

- Deprecated `xlibsWrapper` transitional package has been removed in favour of direct use of its constitutents: `xorg.libX11`, `freetype` and others.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -242,20 +242,21 @@ def main() -> None:
warnings.warn("NIXOS_INSTALL_GRUB env var deprecated, use NIXOS_INSTALL_BOOTLOADER", DeprecationWarning)
os.environ["NIXOS_INSTALL_BOOTLOADER"] = "1"

# flags to pass to bootctl install/update
bootctl_flags = []

if "@canTouchEfiVariables@" != "1":
bootctl_flags.append("--no-variables")

if "@graceful@" == "1":
bootctl_flags.append("--graceful")

if os.getenv("NIXOS_INSTALL_BOOTLOADER") == "1":
# bootctl uses fopen() with modes "wxe" and fails if the file exists.
if os.path.exists("@efiSysMountPoint@/loader/loader.conf"):
os.unlink("@efiSysMountPoint@/loader/loader.conf")

flags = []

if "@canTouchEfiVariables@" != "1":
flags.append("--no-variables")

if "@graceful@" == "1":
flags.append("--graceful")

subprocess.check_call(["@systemd@/bin/bootctl", "--esp-path=@efiSysMountPoint@"] + flags + ["install"])
subprocess.check_call(["@systemd@/bin/bootctl", "--esp-path=@efiSysMountPoint@"] + bootctl_flags + ["install"])
else:
# Update bootloader to latest if needed
available_out = subprocess.check_output(["@systemd@/bin/bootctl", "--version"], universal_newlines=True).split()[2]
Expand Down Expand Up @@ -284,7 +285,7 @@ def main() -> None:
print("skipping systemd-boot update to %s because of known regression" % available_version)
else:
print("updating systemd-boot from %s to %s" % (installed_version, available_version))
subprocess.check_call(["@systemd@/bin/bootctl", "--esp-path=@efiSysMountPoint@", "update"])
subprocess.check_call(["@systemd@/bin/bootctl", "--esp-path=@efiSysMountPoint@"] + bootctl_flags + ["update"])

mkdir_p("@efiSysMountPoint@/efi/nixos")
mkdir_p("@efiSysMountPoint@/loader/entries")
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/system/boot/modprobe.nix
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ with lib;
###### interface

options = {
boot.modprobeConfig.enable = mkEnableOption (lib.mdDoc "modprobe config. This is useful for systemds like containers which do not require a kernel.") // {
boot.modprobeConfig.enable = mkEnableOption (lib.mdDoc "modprobe config. This is useful for systems like containers which do not require a kernel") // {
default = true;
};

Expand Down
4 changes: 2 additions & 2 deletions nixos/modules/virtualisation/qemu-vm.nix
Original file line number Diff line number Diff line change
Expand Up @@ -211,7 +211,7 @@ let
''
mkdir $out
diskImage=$out/disk.img
${qemu}/bin/qemu-img create -f qcow2 $diskImage "60M"
${qemu}/bin/qemu-img create -f qcow2 $diskImage "120M"
${if cfg.useEFIBoot then ''
efiVars=$out/efi-vars.fd
cp ${cfg.efi.variables} $efiVars
Expand All @@ -225,7 +225,7 @@ let
+ " -drive if=pflash,format=raw,unit=1,file=$efiVars");
}
''
# Create a /boot EFI partition with 60M and arbitrary but fixed GUIDs for reproducibility
# Create a /boot EFI partition with 120M and arbitrary but fixed GUIDs for reproducibility
${pkgs.gptfdisk}/bin/sgdisk \
--set-alignment=1 --new=1:34:2047 --change-name=1:BIOSBootPartition --typecode=1:ef02 \
--set-alignment=512 --largest-new=2 --change-name=2:EFISystem --typecode=2:ef00 \
Expand Down
1 change: 0 additions & 1 deletion nixos/tests/kernel-generic.nix
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,6 @@ let
linux_5_4_hardened
linux_5_10_hardened
linux_5_15_hardened
linux_6_0_hardened
linux_6_1_hardened

linux_testing;
Expand Down
4 changes: 2 additions & 2 deletions nixos/tests/systemd-boot.nix
Original file line number Diff line number Diff line change
Expand Up @@ -101,13 +101,13 @@ in
# Replace version inside sd-boot with something older. See magic[] string in systemd src/boot/efi/boot.c
machine.succeed(
"""
find /boot -iname '*.efi' -print0 | \
find /boot -iname '*boot*.efi' -print0 | \
xargs -0 -I '{}' sed -i 's/#### LoaderInfo: systemd-boot .* ####/#### LoaderInfo: systemd-boot 000.0-1-notnixos ####/' '{}'
"""
)
output = machine.succeed("/run/current-system/bin/switch-to-configuration boot")
assert "updating systemd-boot from (000.0-1-notnixos) to " in output
assert "updating systemd-boot from 000.0-1-notnixos to " in output
'';
};

Expand Down
4 changes: 2 additions & 2 deletions pkgs/applications/audio/cider/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -2,11 +2,11 @@

appimageTools.wrapType2 rec {
pname = "cider";
version = "1.5.7";
version = "1.6.0";

src = fetchurl {
url = "https://github.com/ciderapp/cider-releases/releases/download/v${version}/Cider-${version}.AppImage";
sha256 = "sha256-fWpt7YxqEDa1U4CwyVZwgbiwe0lrh64v0cJG9pbNMUU=";
sha256 = "sha256-fbeUl+vQpEdP17m3koblKv9z4CRpLNYtVQf7bs8ZP1M=";
};

extraInstallCommands =
Expand Down
4 changes: 2 additions & 2 deletions pkgs/applications/audio/grandorgue/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -5,14 +5,14 @@

stdenv.mkDerivation rec {
pname = "grandorgue";
version = "3.9.0-1";
version = "3.9.4-1";

src = fetchFromGitHub {
owner = "GrandOrgue";
repo = pname;
rev = version;
fetchSubmodules = true;
sha256 = "sha256-+LWEjoke7f+6f4K4jO9nCG88Mdg9C49+v3FboM9/NkU=";
sha256 = "sha256-10gcVxMLhMXUblvJYLj0TTwGFl1YHI7HU3TfHXtJ+24=";
};

postPatch = ''
Expand Down
21 changes: 15 additions & 6 deletions pkgs/applications/audio/sooperlooper/default.nix
Original file line number Diff line number Diff line change
@@ -1,6 +1,7 @@
{ lib
, stdenv
, fetchFromGitHub
, fetchpatch
, autoreconfHook
, pkg-config
, which
Expand All @@ -9,7 +10,7 @@
, libxml2
, libjack2
, libsndfile
, wxGTK30
, wxGTK32
, libsigcxx
, libsamplerate
, rubberband
Expand All @@ -21,15 +22,23 @@

stdenv.mkDerivation rec {
pname = "sooperlooper";
version = "1.7.4";
version = "1.7.8";

src = fetchFromGitHub {
owner = "essej";
repo = "sooperlooper";
rev = "v${builtins.replaceStrings [ "." ] [ "_" ] version}";
sha256 = "1jng9bkb7iikad0dy1fkiq9wjjdhh1xi1p0cp2lvnz1dsc4yk6iw";
rev = "v${version}";
sha256 = "sha256-Lrsz/UDCgoac63FJ3CaPVaYwvBtzkGQQRLhUi6lUusE=";
};

patches = [
(fetchpatch {
name = "10-build_with_wx_32.patch";
url = "https://sources.debian.org/data/main/s/sooperlooper/1.7.8~dfsg0-2/debian/patches/10-build_with_wx_32.patch";
sha256 = "sha256-NF/w+zgRBNkSTqUJhfH9kQogXSYEF70pCN+loR0hjpg=";
})
];

autoreconfPhase = ''
patchShebangs ./autogen.sh
./autogen.sh
Expand All @@ -47,7 +56,7 @@ stdenv.mkDerivation rec {
libxml2
libjack2
libsndfile
wxGTK30
wxGTK32
libsigcxx
libsamplerate
rubberband
Expand All @@ -68,7 +77,7 @@ stdenv.mkDerivation rec {
However, this kind of live performance looping tool is most effectively used via hardware (midi footpedals, etc)
and the engine can be run standalone on a computer without a monitor.
'';
homepage = "http://essej.net/sooperlooper/"; # https is broken
homepage = "https://sonosaurus.com/sooperlooper/";
license = licenses.gpl2;
maintainers = with maintainers; [ magnetophon ];
platforms = platforms.linux;
Expand Down
4 changes: 2 additions & 2 deletions pkgs/applications/blockchains/ergo/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -2,11 +2,11 @@

stdenv.mkDerivation rec {
pname = "ergo";
version = "5.0.3";
version = "5.0.6";

src = fetchurl {
url = "https://github.com/ergoplatform/ergo/releases/download/v${version}/ergo-${version}.jar";
sha256 = "sha256-IDAss4qX39qPyOsPpVg5zU6zq/QV/RTnbHTGVl9UmOA=";
sha256 = "sha256-UiPwvZcdkeFOTMVcUT1Xr5ByrJC+yzodCfi8Br61hjU=";
};

nativeBuildInputs = [ makeWrapper ];
Expand Down
16 changes: 3 additions & 13 deletions pkgs/applications/file-managers/mc/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,6 @@
, libssh2
, openssl
, coreutils
, autoreconfHook
, autoSignDarwinBinariesHook

# updater only
Expand All @@ -25,23 +24,14 @@

stdenv.mkDerivation rec {
pname = "mc";
version = "4.8.28";
version = "4.8.29";

src = fetchurl {
url = "https://www.midnight-commander.org/downloads/${pname}-${version}.tar.xz";
sha256 = "sha256-6ZTZvppxcumsSkrWIQeSH2qjEuZosFbf5bi867r1OAM=";
sha256 = "sha256-AdijuU9YGAzKW/FyV7UHjR/W/SeptcDpcOx2dUlUCtQ=";
};

patches = [
# Add support for PERL_FOR_BUILD to fix cross-compilation:
# https://midnight-commander.org/ticket/4399
(fetchurl {
url = "https://midnight-commander.org/raw-attachment/ticket/4399/0001-configure.ac-introduce-PERL_FOR_BUILD.patch";
hash = "sha256-i4cbg/pner+yPfgmP04DEIvpNDlM9YDca1TNBdhWhwI=";
})
];

nativeBuildInputs = [ pkg-config autoreconfHook unzip ]
nativeBuildInputs = [ pkg-config unzip ]
# The preFixup hook rewrites the binary, which invaliates the code
# signature. Add the fixup hook to sign the output.
++ lib.optionals (stdenv.hostPlatform.isDarwin && stdenv.hostPlatform.isAarch64) [
Expand Down
4 changes: 2 additions & 2 deletions pkgs/applications/misc/fluidd/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,12 @@

stdenvNoCC.mkDerivation rec {
pname = "fluidd";
version = "1.21.1";
version = "1.23.0";

src = fetchurl {
name = "fluidd-v${version}.zip";
url = "https://github.com/cadriel/fluidd/releases/download/v${version}/fluidd.zip";
sha256 = "sha256-TahXPbZy7eoSJ/U2wL6GaMM8F6zypf7EU91JVWlevQg=";
sha256 = "sha256-SAyR7SeMFh2twLr8QqKzALlMFLv/oAfySN5+cSNALis=";
};

nativeBuildInputs = [ unzip ];
Expand Down
4 changes: 2 additions & 2 deletions pkgs/applications/misc/moolticute/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -9,13 +9,13 @@

mkDerivation rec {
pname = "moolticute";
version = "0.55.0";
version = "1.00.1";

src = fetchFromGitHub {
owner = "mooltipass";
repo = pname;
rev = "v${version}";
sha256 = "sha256-up78503+YqUB2fR9B6W6plYksTJzTj5pkmFJ5eL/mLY=";
sha256 = "sha256-oENMr3d2vFisEFl7gYBQQ0XRBeogAYOfBE5th463laI=";
};

outputs = [ "out" "udev" ];
Expand Down
4 changes: 2 additions & 2 deletions pkgs/applications/misc/tofi/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -16,13 +16,13 @@

stdenv.mkDerivation rec {
pname = "tofi";
version = "0.7.0";
version = "0.8.1";

src = fetchFromGitHub {
owner = "philj56";
repo = pname;
rev = "v${version}";
sha256 = "sha256-KLHZrfoQ6x3EeKWo/TMp30rEIqdq16i8YLr4zFHbnSc=";
sha256 = "sha256-HhkXypRGerWWHrR4maR3AtayWSy5qhl/LYwBHWGKboU=";
};

nativeBuildInputs = [ meson ninja pkg-config scdoc wayland-protocols ];
Expand Down
4 changes: 2 additions & 2 deletions pkgs/applications/networking/browsers/brave/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -90,11 +90,11 @@ in

stdenv.mkDerivation rec {
pname = "brave";
version = "1.46.144";
version = "1.47.171";

src = fetchurl {
url = "https://github.com/brave/brave-browser/releases/download/v${version}/brave-browser_${version}_amd64.deb";
sha256 = "sha256-RivuyMPrqBXeTENrH4wApqHglPAZHVXMd863Wlh+EHY=";
sha256 = "sha256-0hKosta1fxth9ScDRmrrt8BH4CTIRm0ghetY4Jkuco8=";
};

dontConfigure = true;
Expand Down
4 changes: 2 additions & 2 deletions pkgs/applications/networking/cluster/kubelogin/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -2,13 +2,13 @@

buildGoModule rec {
pname = "kubelogin";
version = "0.0.24";
version = "0.0.25";

src = fetchFromGitHub {
owner = "Azure";
repo = pname;
rev = "v${version}";
sha256 = "sha256-xHMUS08gtfN72sMkGZ+2Cazgkd2HgvHSKqugYg+j1So=";
sha256 = "sha256-28snlCqvQ0aF7DHjeHWyjOYuy2wHd2EqEDqmst9MQLc=";
};

vendorSha256 = "sha256-mjIB0ITf296yDQJP46EI6pLYkZfyU3yzD9iwP0iIXvQ=";
Expand Down
6 changes: 3 additions & 3 deletions pkgs/applications/networking/cluster/pinniped/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -2,18 +2,18 @@

buildGoModule rec{
pname = "pinniped";
version = "0.20.0";
version = "0.22.0";

src = fetchFromGitHub {
owner = "vmware-tanzu";
repo = "pinniped";
rev = "v${version}";
sha256 = "sha256-JKZij9f6zlBzbYolxz03R5j95zKELVmEhX+QRTxF/cc=";
sha256 = "sha256-gi6uFJFP3hdHJqH9y7Q8tUGRJECPHxbajU5BJeBcJzo=";
};

subPackages = "cmd/pinniped";

vendorSha256 = "sha256-szv/B7LG/In0j6MT6KCnuUfaCnK7RsJOLeuOtJ/ig9w=";
vendorHash = "sha256-4N8HtBeGeu22Go63dV0WBdbheXylButu+M9vZL7qOcU=";

ldflags = [ "-s" "-w" ];

Expand Down
Loading

0 comments on commit eadaaa7

Please sign in to comment.