+2
-2
lib/fileset/internal.nix
+2
-2
lib/fileset/internal.nix
···Paths represented as strings are not supported by `lib.fileset`, use `lib.sources` or derivations instead.''
···+${context} ("${toString value}") is a string-like value, but it should be a file set or a path instead.Paths represented as strings are not supported by `lib.fileset`, use `lib.sources` or derivations instead.''
+2
-2
lib/fileset/tests.sh
+2
-2
lib/fileset/tests.sh
···-expectFailure 'toSource { root = ./.; fileset = 10; }' 'lib.fileset.toSource: `fileset` is of type int, but it should be a path instead.'-expectFailure 'toSource { root = ./.; fileset = "/some/path"; }' 'lib.fileset.toSource: `fileset` \("/some/path"\) is a string-like value, but it should be a path instead.\s*Paths represented as strings are not supported by `lib.fileset`, use `lib.sources` or derivations instead.'
···+expectFailure 'toSource { root = ./.; fileset = 10; }' 'lib.fileset.toSource: `fileset` is of type int, but it should be a file set or a path instead.'+expectFailure 'toSource { root = ./.; fileset = "/some/path"; }' 'lib.fileset.toSource: `fileset` \("/some/path"\) is a string-like value, but it should be a file set or a path instead.\s*Paths represented as strings are not supported by `lib.fileset`, use `lib.sources` or derivations instead.'
+5
maintainers/maintainer-list.nix
+5
maintainers/maintainer-list.nix
···
+2
nixos/doc/manual/release-notes/rl-2311.section.md
+2
nixos/doc/manual/release-notes/rl-2311.section.md
···- `service.borgmatic.settings.location` and `services.borgmatic.configurations.<name>.location` are deprecated, please move your options out of sections to the global scope.- The Cinnamon module now enables XDG desktop integration by default. If you are experiencing collisions related to xdg-desktop-portal-gtk you can safely remove `xdg.portal.extraPortals = [ pkgs.xdg-desktop-portal-gtk ];` from your NixOS configuration.
···- `service.borgmatic.settings.location` and `services.borgmatic.configurations.<name>.location` are deprecated, please move your options out of sections to the global scope.+- `dagger` was removed because using a package called `dagger` and packaging it from source violates their trademark policy.- The Cinnamon module now enables XDG desktop integration by default. If you are experiencing collisions related to xdg-desktop-portal-gtk you can safely remove `xdg.portal.extraPortals = [ pkgs.xdg-desktop-portal-gtk ];` from your NixOS configuration.
+390
-354
nixos/modules/security/pam.nix
+390
-354
nixos/modules/security/pam.nix
·········-account sufficient ${pkgs.pam_mysql}/lib/security/pam_mysql.so config_file=/etc/security/pam_mysql.conf-account [success=ok ignore=ignore default=die] ${pkgs.google-guest-oslogin}/lib/security/pam_oslogin_login.so-account [success=ok default=ignore] ${pkgs.google-guest-oslogin}/lib/security/pam_oslogin_admin.so-auth [success=done perm_denied=die default=ignore] ${pkgs.google-guest-oslogin}/lib/security/pam_oslogin_login.so-auth sufficient ${pkgs.pam_mysql}/lib/security/pam_mysql.so config_file=/etc/security/pam_mysql.conf-auth sufficient ${pkgs.pam_ssh_agent_auth}/libexec/pam_ssh_agent_auth.so file=${lib.concatStringsSep ":" config.services.openssh.authorizedKeysFiles}-auth ${p11.control} ${pkgs.pam_p11}/lib/security/pam_p11.so ${pkgs.opensc}/lib/opensc-pkcs11.so-auth ${u2f.control} ${pkgs.pam_u2f}/lib/security/pam_u2f.so ${optionalString u2f.debug "debug"} ${optionalString (u2f.authFile != null) "authfile=${u2f.authFile}"} ''-+ ''${optionalString u2f.interactive "interactive"} ${optionalString u2f.cue "cue"} ${optionalString (u2f.appId != null) "appid=${u2f.appId}"} ${optionalString (u2f.origin != null) "origin=${u2f.origin}"}-(let ussh = config.security.pam.ussh; in optionalString (config.security.pam.ussh.enable && cfg.usshAuth) ''-auth ${ussh.control} ${pkgs.pam_ussh}/lib/security/pam_ussh.so ${optionalString (ussh.caFile != null) "ca_file=${ussh.caFile}"} ${optionalString (ussh.authorizedPrincipals != null) "authorized_principals=${ussh.authorizedPrincipals}"} ${optionalString (ussh.authorizedPrincipalsFile != null) "authorized_principals_file=${ussh.authorizedPrincipalsFile}"} ${optionalString (ussh.group != null) "group=${ussh.group}"}-auth requisite ${pkgs.oath-toolkit}/lib/security/pam_oath.so window=${toString oath.window} usersfile=${toString oath.usersFile} digits=${toString oath.digits}-auth ${yubi.control} ${pkgs.yubico-pam}/lib/security/pam_yubico.so mode=${toString yubi.mode} ${optionalString (yubi.challengeResponsePath != null) "chalresp_path=${yubi.challengeResponsePath}"} ${optionalString (yubi.mode == "client") "id=${toString yubi.id}"} ${optionalString yubi.debug "debug"}······-auth optional pam_unix.so ${optionalString cfg.allowNullPassword "nullok"} ${optionalString cfg.nodelay "nodelay"} likeauth-auth optional ${config.boot.zfs.package}/lib/security/pam_zfs_key.so homes=${config.security.pam.zfs.homes}-auth optional ${pkgs.plasma5Packages.kwallet-pam}/lib/security/pam_kwallet5.so kwalletd=${pkgs.plasma5Packages.kwallet.bin}/bin/kwalletd5-auth optional ${pkgs.pam_gnupg}/lib/security/pam_gnupg.so ${optionalString cfg.gnupg.storeOnly " store-only"}-auth required ${pkgs.google-authenticator}/lib/security/pam_google_authenticator.so no_increment_hotp-auth sufficient pam_unix.so ${optionalString cfg.allowNullPassword "nullok"} ${optionalString cfg.nodelay "nodelay"} likeauth try_first_pass-auth [default=ignore success=1 service_err=reset] ${pam_krb5}/lib/security/pam_krb5.so use_first_pass-auth [default=die success=done] ${pam_ccreds}/lib/security/pam_ccreds.so action=validate use_first_pass-password optional ${config.boot.zfs.package}/lib/security/pam_zfs_key.so homes=${config.security.pam.zfs.homes}-password sufficient ${pkgs.pam_mysql}/lib/security/pam_mysql.so config_file=/etc/security/pam_mysql.conf-session required ${pkgs.pam}/lib/security/pam_mkhomedir.so silent skel=${config.security.pam.makeHomeDir.skelDirectory} umask=${config.security.pam.makeHomeDir.umask}-session optional ${config.boot.zfs.package}/lib/security/pam_zfs_key.so homes=${config.security.pam.zfs.homes} ${optionalString config.security.pam.zfs.noUnmount "nounmount"}-session optional ${pkgs.pam_mysql}/lib/security/pam_mysql.so config_file=/etc/security/pam_mysql.conf-optionalString (cfg.showMotd && (config.users.motd != null || config.users.motdFile != null)) ''-session optional ${pkgs.apparmor-pam}/lib/security/pam_apparmor.so order=user,group,default debug-session optional ${pkgs.plasma5Packages.kwallet-pam}/lib/security/pam_kwallet5.so kwalletd=${pkgs.plasma5Packages.kwallet.bin}/bin/kwalletd5-session optional ${pkgs.pam_gnupg}/lib/security/pam_gnupg.so ${optionalString cfg.gnupg.noAutostart " no-autostart"}·········
···+The `order` values for the built-in rules are subject to change. If you assign a constant value to this option, a system update could silently reorder your rule. You could be locked out of your system, or your system could be left wide open. When using this option, set it to a relative offset from another rule's `order` value:+Indicates the behavior of the PAM-API should the module fail to succeed in its authentication task. See `control` in {manpage}`pam.conf(5)` for details.+Either the full filename of the PAM to be used by the application (it begins with a '/'), or a relative pathname from the default module location. See `module-path` in {manpage}`pam.conf(5)` for details.+Tokens that can be used to modify the specific behavior of the given PAM. Such arguments will be documented for each individual module. See `module-arguments` in {manpage}`pam.conf(5)` for details.+{option}`settings` are automatically added as {option}`args`. It's recommended to use the {option}`settings` option whenever possible so that arguments can be overridden.+Boolean values render just the key if true, and nothing if false. Null values are ignored. All other values are rendered as key-value pairs.···+This option and its suboptions are experimental and subject to breaking changes without notice.+If you use this option in your system configuration, you will need to manually monitor this module for any changes. Otherwise, failure to adjust your configuration properly could lead to you being locked out of your system, or worse, your system could be left wide open to attackers.+If you share configuration examples that use this option, you MUST include this warning so that users are informed.+You may freely use this option within `nixpkgs`, and future changes will account for those use sites.···+checkPair = a: b: assert assertMsg (a.order != b.order) "security.pam.services.${name}.rules.${type}: rules '${a.name}' and '${b.name}' cannot have the same order value (${toString a.order})"; b;+{ name = "ldap"; enable = use_ldap; control = "sufficient"; modulePath = "${pam_ldap}/lib/security/pam_ldap.so"; }+{ name = "mysql"; enable = cfg.mysqlAuth; control = "sufficient"; modulePath = "${pkgs.pam_mysql}/lib/security/pam_mysql.so"; settings = {+{ name = "kanidm"; enable = config.services.kanidm.enablePam; control = "sufficient"; modulePath = "${pkgs.kanidm}/lib/pam_kanidm.so"; settings = {+{ name = "sss"; enable = config.services.sssd.enable; control = if cfg.sssdStrictAccess then "[default=bad success=ok user_unknown=ignore]" else "sufficient"; modulePath = "${pkgs.sssd}/lib/security/pam_sss.so"; }+{ name = "krb5"; enable = config.security.pam.krb5.enable; control = "sufficient"; modulePath = "${pam_krb5}/lib/security/pam_krb5.so"; }+{ name = "oslogin_login"; enable = cfg.googleOsLoginAccountVerification; control = "[success=ok ignore=ignore default=die]"; modulePath = "${pkgs.google-guest-oslogin}/lib/security/pam_oslogin_login.so"; }+{ name = "oslogin_admin"; enable = cfg.googleOsLoginAccountVerification; control = "[success=ok default=ignore]"; modulePath = "${pkgs.google-guest-oslogin}/lib/security/pam_oslogin_admin.so"; }+{ name = "systemd_home"; enable = config.services.homed.enable; control = "sufficient"; modulePath = "${config.systemd.package}/lib/security/pam_systemd_home.so"; }+{ name = "oslogin_login"; enable = cfg.googleOsLoginAuthentication; control = "[success=done perm_denied=die default=ignore]"; modulePath = "${pkgs.google-guest-oslogin}/lib/security/pam_oslogin_login.so"; }+{ name = "rootok"; enable = cfg.rootOK; control = "sufficient"; modulePath = "pam_rootok.so"; }+{ name = "wheel"; enable = cfg.requireWheel; control = "required"; modulePath = "pam_wheel.so"; settings = {+{ name = "faillock"; enable = cfg.logFailures; control = "required"; modulePath = "pam_faillock.so"; }+{ name = "mysql"; enable = cfg.mysqlAuth; control = "sufficient"; modulePath = "${pkgs.pam_mysql}/lib/security/pam_mysql.so"; settings = {+{ name = "ssh_agent_auth"; enable = config.security.pam.enableSSHAgentAuth && cfg.sshAgentAuth; control = "sufficient"; modulePath = "${pkgs.pam_ssh_agent_auth}/libexec/pam_ssh_agent_auth.so"; settings = {+(let p11 = config.security.pam.p11; in { name = "p11"; enable = cfg.p11Auth; control = p11.control; modulePath = "${pkgs.pam_p11}/lib/security/pam_p11.so"; args = [+(let u2f = config.security.pam.u2f; in { name = "u2f"; enable = cfg.u2fAuth; control = u2f.control; modulePath = "${pkgs.pam_u2f}/lib/security/pam_u2f.so"; settings = {+{ name = "usb"; enable = cfg.usbAuth; control = "sufficient"; modulePath = "${pkgs.pam_usb}/lib/security/pam_usb.so"; }+(let ussh = config.security.pam.ussh; in { name = "ussh"; enable = config.security.pam.ussh.enable && cfg.usshAuth; control = ussh.control; modulePath = "${pkgs.pam_ussh}/lib/security/pam_ussh.so"; settings = {+(let oath = config.security.pam.oath; in { name = "oath"; enable = cfg.oathAuth; control = "requisite"; modulePath = "${pkgs.oath-toolkit}/lib/security/pam_oath.so"; settings = {+(let yubi = config.security.pam.yubico; in { name = "yubico"; enable = cfg.yubicoAuth; control = yubi.control; modulePath = "${pkgs.yubico-pam}/lib/security/pam_yubico.so"; settings = {+(let dp9ik = config.security.pam.dp9ik; in { name = "p9"; enable = dp9ik.enable; control = dp9ik.control; modulePath = "${pkgs.pam_dp9ik}/lib/security/pam_p9.so"; args = [+{ name = "fprintd"; enable = cfg.fprintAuth; control = "sufficient"; modulePath = "${pkgs.fprintd}/lib/security/pam_fprintd.so"; }······+{ name = "systemd_home-early"; enable = config.services.homed.enable; control = "optional"; modulePath = "${config.systemd.package}/lib/security/pam_systemd_home.so"; }+{ name = "unix-early"; enable = cfg.unixAuth; control = "optional"; modulePath = "pam_unix.so"; settings = {+{ name = "ecryptfs"; enable = config.security.pam.enableEcryptfs; control = "optional"; modulePath = "${pkgs.ecryptfs}/lib/security/pam_ecryptfs.so"; settings = {+{ name = "fscrypt"; enable = config.security.pam.enableFscrypt; control = "optional"; modulePath = "${pkgs.fscrypt-experimental}/lib/security/pam_fscrypt.so"; }+{ name = "zfs_key"; enable = cfg.zfs; control = "optional"; modulePath = "${config.boot.zfs.package}/lib/security/pam_zfs_key.so"; settings = {+{ name = "mount"; enable = cfg.pamMount; control = "optional"; modulePath = "${pkgs.pam_mount}/lib/security/pam_mount.so"; settings = {+{ name = "kwallet5"; enable = cfg.enableKwallet; control = "optional"; modulePath = "${pkgs.plasma5Packages.kwallet-pam}/lib/security/pam_kwallet5.so"; settings = {+{ name = "gnome_keyring"; enable = cfg.enableGnomeKeyring; control = "optional"; modulePath = "${pkgs.gnome.gnome-keyring}/lib/security/pam_gnome_keyring.so"; }+{ name = "gnupg"; enable = cfg.gnupg.enable; control = "optional"; modulePath = "${pkgs.pam_gnupg}/lib/security/pam_gnupg.so"; settings = {+{ name = "faildelay"; enable = cfg.failDelay.enable; control = "optional"; modulePath = "${pkgs.pam}/lib/security/pam_faildelay.so"; settings = {+{ name = "google_authenticator"; enable = cfg.googleAuthenticator.enable; control = "required"; modulePath = "${pkgs.google-authenticator}/lib/security/pam_google_authenticator.so"; settings = {+{ name = "duo"; enable = cfg.duoSecurity.enable; control = "required"; modulePath = "${pkgs.duo-unix}/lib/security/pam_duo.so"; }+{ name = "systemd_home"; enable = config.services.homed.enable; control = "sufficient"; modulePath = "${config.systemd.package}/lib/security/pam_systemd_home.so"; }+{ name = "unix"; enable = cfg.unixAuth; control = "sufficient"; modulePath = "pam_unix.so"; settings = {+{ name = "otpw"; enable = cfg.otpwAuth; control = "sufficient"; modulePath = "${pkgs.otpw}/lib/security/pam_otpw.so"; }+{ name = "ldap"; enable = use_ldap; control = "sufficient"; modulePath = "${pam_ldap}/lib/security/pam_ldap.so"; settings = {+{ name = "kanidm"; enable = config.services.kanidm.enablePam; control = "sufficient"; modulePath = "${pkgs.kanidm}/lib/pam_kanidm.so"; settings = {+{ name = "sss"; enable = config.services.sssd.enable; control = "sufficient"; modulePath = "${pkgs.sssd}/lib/security/pam_sss.so"; settings = {+{ name = "krb5"; enable = config.security.pam.krb5.enable; control = "[default=ignore success=1 service_err=reset]"; modulePath = "${pam_krb5}/lib/security/pam_krb5.so"; settings = {+{ name = "ccreds-validate"; enable = config.security.pam.krb5.enable; control = "[default=die success=done]"; modulePath = "${pam_ccreds}/lib/security/pam_ccreds.so"; settings = {+{ name = "ccreds-store"; enable = config.security.pam.krb5.enable; control = "sufficient"; modulePath = "${pam_ccreds}/lib/security/pam_ccreds.so"; settings = {+{ name = "systemd_home"; enable = config.services.homed.enable; control = "sufficient"; modulePath = "${config.systemd.package}/lib/security/pam_systemd_home.so"; }+{ name = "ecryptfs"; enable = config.security.pam.enableEcryptfs; control = "optional"; modulePath = "${pkgs.ecryptfs}/lib/security/pam_ecryptfs.so"; }+{ name = "fscrypt"; enable = config.security.pam.enableFscrypt; control = "optional"; modulePath = "${pkgs.fscrypt-experimental}/lib/security/pam_fscrypt.so"; }+{ name = "zfs_key"; enable = cfg.zfs; control = "optional"; modulePath = "${config.boot.zfs.package}/lib/security/pam_zfs_key.so"; settings = {+{ name = "mount"; enable = cfg.pamMount; control = "optional"; modulePath = "${pkgs.pam_mount}/lib/security/pam_mount.so"; }+{ name = "ldap"; enable = use_ldap; control = "sufficient"; modulePath = "${pam_ldap}/lib/security/pam_ldap.so"; }+{ name = "mysql"; enable = cfg.mysqlAuth; control = "sufficient"; modulePath = "${pkgs.pam_mysql}/lib/security/pam_mysql.so"; settings = {+{ name = "kanidm"; enable = config.services.kanidm.enablePam; control = "sufficient"; modulePath = "${pkgs.kanidm}/lib/pam_kanidm.so"; }+{ name = "sss"; enable = config.services.sssd.enable; control = "sufficient"; modulePath = "${pkgs.sssd}/lib/security/pam_sss.so"; }+{ name = "krb5"; enable = config.security.pam.krb5.enable; control = "sufficient"; modulePath = "${pam_krb5}/lib/security/pam_krb5.so"; settings = {+{ name = "gnome_keyring"; enable = cfg.enableGnomeKeyring; control = "optional"; modulePath = "${pkgs.gnome.gnome-keyring}/lib/security/pam_gnome_keyring.so"; settings = {+{ name = "env"; enable = cfg.setEnvironment; control = "required"; modulePath = "pam_env.so"; settings = {+{ name = "loginuid"; enable = cfg.setLoginUid; control = if config.boot.isContainer then "optional" else "required"; modulePath = "pam_loginuid.so"; }+{ name = "tty_audit"; enable = cfg.ttyAudit.enable; control = "required"; modulePath = "${pkgs.pam}/lib/security/pam_tty_audit.so"; settings = {+{ name = "systemd_home"; enable = config.services.homed.enable; control = "required"; modulePath = "${config.systemd.package}/lib/security/pam_systemd_home.so"; }+{ name = "mkhomedir"; enable = cfg.makeHomeDir; control = "required"; modulePath = "${pkgs.pam}/lib/security/pam_mkhomedir.so"; settings = {+{ name = "lastlog"; enable = cfg.updateWtmp; control = "required"; modulePath = "${pkgs.pam}/lib/security/pam_lastlog.so"; settings = {+{ name = "ecryptfs"; enable = config.security.pam.enableEcryptfs; control = "optional"; modulePath = "${pkgs.ecryptfs}/lib/security/pam_ecryptfs.so"; }+{ name = "fscrypt-skip-systemd"; enable = config.security.pam.enableFscrypt; control = "[success=1 default=ignore]"; modulePath = "pam_succeed_if.so"; args = [+{ name = "fscrypt"; enable = config.security.pam.enableFscrypt; control = "optional"; modulePath = "${pkgs.fscrypt-experimental}/lib/security/pam_fscrypt.so"; }+{ name = "zfs_key-skip-systemd"; enable = cfg.zfs; control = "[success=1 default=ignore]"; modulePath = "pam_succeed_if.so"; args = [+{ name = "zfs_key"; enable = cfg.zfs; control = "optional"; modulePath = "${config.boot.zfs.package}/lib/security/pam_zfs_key.so"; settings = {+{ name = "mount"; enable = cfg.pamMount; control = "optional"; modulePath = "${pkgs.pam_mount}/lib/security/pam_mount.so"; settings = {+{ name = "ldap"; enable = use_ldap; control = "optional"; modulePath = "${pam_ldap}/lib/security/pam_ldap.so"; }+{ name = "mysql"; enable = cfg.mysqlAuth; control = "optional"; modulePath = "${pkgs.pam_mysql}/lib/security/pam_mysql.so"; settings = {+{ name = "kanidm"; enable = config.services.kanidm.enablePam; control = "optional"; modulePath = "${pkgs.kanidm}/lib/pam_kanidm.so"; }+{ name = "sss"; enable = config.services.sssd.enable; control = "optional"; modulePath = "${pkgs.sssd}/lib/security/pam_sss.so"; }+{ name = "krb5"; enable = config.security.pam.krb5.enable; control = "optional"; modulePath = "${pam_krb5}/lib/security/pam_krb5.so"; }+{ name = "otpw"; enable = cfg.otpwAuth; control = "optional"; modulePath = "${pkgs.otpw}/lib/security/pam_otpw.so"; }+{ name = "systemd"; enable = cfg.startSession; control = "optional"; modulePath = "${config.systemd.package}/lib/security/pam_systemd.so"; }+{ name = "xauth"; enable = cfg.forwardXAuth; control = "optional"; modulePath = "pam_xauth.so"; settings = {+{ name = "limits"; enable = cfg.limits != []; control = "required"; modulePath = "${pkgs.pam}/lib/security/pam_limits.so"; settings = {+{ name = "motd"; enable = cfg.showMotd && (config.users.motd != null || config.users.motdFile != null); control = "optional"; modulePath = "${pkgs.pam}/lib/security/pam_motd.so"; settings = {+{ name = "apparmor"; enable = cfg.enableAppArmor && config.security.apparmor.enable; control = "optional"; modulePath = "${pkgs.apparmor-pam}/lib/security/pam_apparmor.so"; settings = {+{ name = "kwallet5"; enable = cfg.enableKwallet; control = "optional"; modulePath = "${pkgs.plasma5Packages.kwallet-pam}/lib/security/pam_kwallet5.so"; settings = {+{ name = "gnome_keyring"; enable = cfg.enableGnomeKeyring; control = "optional"; modulePath = "${pkgs.gnome.gnome-keyring}/lib/security/pam_gnome_keyring.so"; settings = {+{ name = "gnupg"; enable = cfg.gnupg.enable; control = "optional"; modulePath = "${pkgs.pam_gnupg}/lib/security/pam_gnupg.so"; settings = {+{ name = "cgfs"; enable = config.virtualisation.lxc.lxcfs.enable; control = "optional"; modulePath = "${pkgs.lxc}/lib/security/pam_cgfs.so"; args = [·········
+1
-1
nixos/modules/services/web-apps/writefreely.nix
+1
-1
nixos/modules/services/web-apps/writefreely.nix
+10
-1
nixos/modules/virtualisation/nixos-containers.nix
+10
-1
nixos/modules/virtualisation/nixos-containers.nix
······
+1
-1
nixos/tests/pam/pam-u2f.nix
+1
-1
nixos/tests/pam/pam-u2f.nix
+5
-4
nixos/tests/pam/test_chfn.py
+5
-4
nixos/tests/pam/test_chfn.py
······-non_functional_lines = set([line for line in extra_lines if (line == "" or line.startswith("#"))])
······
-10
nixos/tests/systemd-repart.nix
-10
nixos/tests/systemd-repart.nix
···
+16
-2
pkgs/applications/audio/espeak-ng/default.nix
+16
-2
pkgs/applications/audio/espeak-ng/default.nix
······
······
+2
-2
pkgs/applications/blockchains/monero-gui/default.nix
+2
-2
pkgs/applications/blockchains/monero-gui/default.nix
+5
-4
pkgs/applications/editors/vim/plugins/nvim-treesitter/update.py
+5
-4
pkgs/applications/editors/vim/plugins/nvim-treesitter/update.py
···generated_file = """# generated by pkgs/applications/editors/vim/plugins/nvim-treesitter/update.py···
···generated_file = """# generated by pkgs/applications/editors/vim/plugins/nvim-treesitter/update.py···
+7
-3
pkgs/applications/editors/vim/plugins/update.py
+7
-3
pkgs/applications/editors/vim/plugins/update.py
···
···
+2
-2
pkgs/applications/editors/vscode/extensions/default.nix
+2
-2
pkgs/applications/editors/vscode/extensions/default.nix
+6
-6
pkgs/applications/editors/vscode/vscodium.nix
+6
-6
pkgs/applications/editors/vscode/vscodium.nix
······
······
+6
pkgs/applications/misc/keepassxc/default.nix
+6
pkgs/applications/misc/keepassxc/default.nix
···+# See https://github.com/keepassxreboot/keepassxc/blob/cd7a53abbbb81e468efb33eb56eefc12739969b8/src/browser/NativeMessageInstaller.cpp#L317+substituteAll "${./firefox-native-messaging-host.json}" "$out/lib/mozilla/native-messaging-hosts/org.keepassxc.keepassxc_browser.json"
+9
pkgs/applications/misc/keepassxc/firefox-native-messaging-host.json
+9
pkgs/applications/misc/keepassxc/firefox-native-messaging-host.json
+2
pkgs/applications/networking/browsers/firefox/wrapper.nix
+2
pkgs/applications/networking/browsers/firefox/wrapper.nix
······++ lib.optional (cfg.enablePlasmaBrowserIntegration or false) plasma5Packages.plasma-browser-integrationlibs = lib.optionals stdenv.isLinux [ udev libva mesa libnotify xorg.libXScrnSaver cups pciutils ]
······++ lib.optional (cfg.enablePlasmaBrowserIntegration or false) plasma5Packages.plasma-browser-integrationlibs = lib.optionals stdenv.isLinux [ udev libva mesa libnotify xorg.libXScrnSaver cups pciutils ]
+2
-10
pkgs/applications/networking/browsers/lynx/default.nix
+2
-10
pkgs/applications/networking/browsers/lynx/default.nix
···-url = "https://git.alpinelinux.org/aports/plain/main/lynx/CVE-2021-38165.patch?id=3400945dbbb8a87065360963e4caa0e17d3dcc61";
···
+5
-5
pkgs/applications/networking/instant-messengers/element/pin.nix
+5
-5
pkgs/applications/networking/instant-messengers/element/pin.nix
···
···
+3
-3
pkgs/applications/networking/rymdport/default.nix
+3
-3
pkgs/applications/networking/rymdport/default.nix
···
···
+2
-2
pkgs/applications/radio/freedv/default.nix
+2
-2
pkgs/applications/radio/freedv/default.nix
···
···
+66
pkgs/development/compilers/yosys/plugins/synlig-makefile-for-nix.patch
+66
pkgs/development/compilers/yosys/plugins/synlig-makefile-for-nix.patch
···
···+export PKG_CONFIG_PATH=$(call ShQuote,${$(call GetTargetStructName,surelog).output_vars.PKG_CONFIG_PATH}$(if ${PKG_CONFIG_PATH},:${PKG_CONFIG_PATH}))
+73
pkgs/development/compilers/yosys/plugins/synlig.nix
+73
pkgs/development/compilers/yosys/plugins/synlig.nix
···
···
+3
-3
pkgs/development/embedded/svdtools/default.nix
+3
-3
pkgs/development/embedded/svdtools/default.nix
···
···
+2
-2
pkgs/development/libraries/nghttp3/default.nix
+2
-2
pkgs/development/libraries/nghttp3/default.nix
+2
-2
pkgs/development/libraries/ngtcp2/default.nix
+2
-2
pkgs/development/libraries/ngtcp2/default.nix
+5
-2
pkgs/development/libraries/pcaudiolib/default.nix
+5
-2
pkgs/development/libraries/pcaudiolib/default.nix
······
······
+3
-3
pkgs/development/libraries/updfparser/default.nix
+3
-3
pkgs/development/libraries/updfparser/default.nix
···
···
+2
-2
pkgs/development/python-modules/aiovlc/default.nix
+2
-2
pkgs/development/python-modules/aiovlc/default.nix
······
······
+2
-13
pkgs/development/python-modules/celery-types/default.nix
+2
-13
pkgs/development/python-modules/celery-types/default.nix
······-url = "https://github.com/sbdchd/celery-types/commit/ff83f06a0302084e1a690e2a5a8b25f2c0dfc6e7.patch";
······
-39
pkgs/development/python-modules/click-aliases/0001-Fix-quotes-in-test.patch
-39
pkgs/development/python-modules/click-aliases/0001-Fix-quotes-in-test.patch
···
···
+7
-4
pkgs/development/python-modules/click-aliases/default.nix
+7
-4
pkgs/development/python-modules/click-aliases/default.nix
···
···
+2
-2
pkgs/development/python-modules/hahomematic/default.nix
+2
-2
pkgs/development/python-modules/hahomematic/default.nix
······
······
+3
-3
pkgs/development/python-modules/igraph/default.nix
+3
-3
pkgs/development/python-modules/igraph/default.nix
······
······
+5
-4
pkgs/development/python-modules/pylutron-caseta/default.nix
+5
-4
pkgs/development/python-modules/pylutron-caseta/default.nix
············
············
-45
pkgs/development/python-modules/pymazda/default.nix
-45
pkgs/development/python-modules/pymazda/default.nix
···
···
+2
-2
pkgs/development/python-modules/pytensor/default.nix
+2
-2
pkgs/development/python-modules/pytensor/default.nix
······
······
+2
-2
pkgs/development/python-modules/python-lsp-ruff/default.nix
+2
-2
pkgs/development/python-modules/python-lsp-ruff/default.nix
···
···
+2
-2
pkgs/development/python-modules/sagemaker/default.nix
+2
-2
pkgs/development/python-modules/sagemaker/default.nix
······
······
+2
-2
pkgs/development/python-modules/scikit-hep-testdata/default.nix
+2
-2
pkgs/development/python-modules/scikit-hep-testdata/default.nix
······
······
+7
-5
pkgs/development/python-modules/siuba/default.nix
+7
-5
pkgs/development/python-modules/siuba/default.nix
·········
·········
+2
-2
pkgs/development/python-modules/stanza/default.nix
+2
-2
pkgs/development/python-modules/stanza/default.nix
······
······
+3
-3
pkgs/development/python-modules/structlog/default.nix
+3
-3
pkgs/development/python-modules/structlog/default.nix
···
···
+4
-3
pkgs/development/python-modules/sumo/default.nix
+4
-3
pkgs/development/python-modules/sumo/default.nix
······
······
+13
-3
pkgs/development/python-modules/tag-expressions/default.nix
+13
-3
pkgs/development/python-modules/tag-expressions/default.nix
···
···
+2
-2
pkgs/development/python-modules/tesserocr/default.nix
+2
-2
pkgs/development/python-modules/tesserocr/default.nix
+3
-3
pkgs/development/python-modules/textual-universal-directorytree/default.nix
+3
-3
pkgs/development/python-modules/textual-universal-directorytree/default.nix
···
···
+2
-2
pkgs/development/python-modules/tubeup/default.nix
+2
-2
pkgs/development/python-modules/tubeup/default.nix
+2
-2
pkgs/development/python-modules/txtai/default.nix
+2
-2
pkgs/development/python-modules/txtai/default.nix
······
······
+2
-2
pkgs/development/python-modules/typepy/default.nix
+2
-2
pkgs/development/python-modules/typepy/default.nix
······
······
+2
-2
pkgs/development/python-modules/unearth/default.nix
+2
-2
pkgs/development/python-modules/unearth/default.nix
+2
-2
pkgs/development/python-modules/uptime-kuma-api/default.nix
+2
-2
pkgs/development/python-modules/uptime-kuma-api/default.nix
······
······
+2
-2
pkgs/development/python-modules/vispy/default.nix
+2
-2
pkgs/development/python-modules/vispy/default.nix
+2
-2
pkgs/development/tools/build-managers/buck2/default.nix
+2
-2
pkgs/development/tools/build-managers/buck2/default.nix
······
······
+5
-5
pkgs/development/tools/build-managers/buck2/hashes.json
+5
-5
pkgs/development/tools/build-managers/buck2/hashes.json
···
···
-44
pkgs/development/tools/continuous-integration/dagger/default.nix
-44
pkgs/development/tools/continuous-integration/dagger/default.nix
···
···
+2
-2
pkgs/development/tools/moq/default.nix
+2
-2
pkgs/development/tools/moq/default.nix
···
···
+130
pkgs/development/tools/mysql-shell/innovation.nix
+130
pkgs/development/tools/mysql-shell/innovation.nix
···
···+url = "https://cdn.mysql.com//Downloads/MySQL-${lib.versions.majorMinor mysqlServerVersion}/mysql-${mysqlServerVersion}.tar.gz";+url = "https://cdn.mysql.com//Downloads/MySQL-Shell/mysql-shell-${finalAttrs.version}-src.tar.gz";+cmake --build ../mysql/build --parallel ''${NIX_BUILD_CORES:-1} --target mysqlclient mysqlxclient+wrapProgram $out/bin/mysqlsh --set PYTHONPATH "${lib.makeSearchPath python3.sitePackages pythonDeps}"+homepage = "https://dev.mysql.com/doc/mysql-shell/${lib.versions.majorMinor finalAttrs.version}/en/";
+1
-1
pkgs/games/osu-lazer/bin.nix
+1
-1
pkgs/games/osu-lazer/bin.nix
···
···
+3
-3
pkgs/misc/screensavers/pipes-rs/default.nix
+3
-3
pkgs/misc/screensavers/pipes-rs/default.nix
···
···
+1
-2
pkgs/servers/home-assistant/component-packages.nix
+1
-2
pkgs/servers/home-assistant/component-packages.nix
+3
-3
pkgs/servers/home-assistant/default.nix
+3
-3
pkgs/servers/home-assistant/default.nix
·········
·········
+2
-2
pkgs/servers/mail/exim/default.nix
+2
-2
pkgs/servers/mail/exim/default.nix
+1
-1
pkgs/servers/monitoring/prometheus/junos-czerwonk-exporter.nix
+1
-1
pkgs/servers/monitoring/prometheus/junos-czerwonk-exporter.nix
+3
-3
pkgs/servers/monitoring/prometheus/nextcloud-exporter.nix
+3
-3
pkgs/servers/monitoring/prometheus/nextcloud-exporter.nix
···
···
+5
-5
pkgs/tools/misc/ytarchive/default.nix
+5
-5
pkgs/tools/misc/ytarchive/default.nix
······
······
+317
-144
pkgs/tools/networking/bandwhich/Cargo.lock
+317
-144
pkgs/tools/networking/bandwhich/Cargo.lock
········································································································································································
········································································································································································
+2
-2
pkgs/tools/networking/bandwhich/default.nix
+2
-2
pkgs/tools/networking/bandwhich/default.nix
+1
-1
pkgs/tools/networking/oui/default.nix
+1
-1
pkgs/tools/networking/oui/default.nix
+1
pkgs/top-level/aliases.nix
+1
pkgs/top-level/aliases.nix
+13
-3
pkgs/top-level/all-packages.nix
+13
-3
pkgs/top-level/all-packages.nix
············
············
+1
pkgs/top-level/python-aliases.nix
+1
pkgs/top-level/python-aliases.nix
···pylibgen = throw "pylibgen is unmaintained upstreamed, and removed from nixpkgs"; # added 2020-06-20pymatgen-lammps = throw "pymatgen-lammps has been removed because it is unmaintained and broken"; # added 2023-06-20
···pylibgen = throw "pylibgen is unmaintained upstreamed, and removed from nixpkgs"; # added 2020-06-20pymatgen-lammps = throw "pymatgen-lammps has been removed because it is unmaintained and broken"; # added 2023-06-20+pymazda = throw "pymazda has been removed, because the upstream repo has been affected by a DCMA claim."; # added 2023-10-16
-2
pkgs/top-level/python-packages.nix
-2
pkgs/top-level/python-packages.nix
···