Merge staging-next into staging

Changed files
+107 -38
nixos
doc
manual
release-notes
modules
pkgs
applications
networking
cluster
terraform-docs
virtualization
conmon
cri-o
podman
runc
development
coq-modules
odd-order
tools
ameba
buildah
gotestsum
misc
go-md2man
skopeo
games
servers
monitoring
do-agent
tools
misc
chezmoi
security
sslscan
virtualization
cri-tools
top-level
+9
nixos/doc/manual/release-notes/rl-2105.xml
···
</programlisting>
</para>
</listitem>
+
<listitem>
+
<para>
+
<option>environment.defaultPackages</option> now includes the nano package.
+
If <package>pkgs.nano</package> is not added to the list,
+
make sure another editor is installed and the <literal>EDITOR</literal>
+
environment variable is set to it.
+
Environment variables can be set using <option>environment.variables</option>.
+
</para>
+
</listitem>
</itemizedlist>
</section>
+14 -6
nixos/modules/config/system-path.nix
···
pkgs.xz
pkgs.less
pkgs.libcap
-
pkgs.nano
pkgs.ncurses
pkgs.netcat
config.programs.ssh.package
···
];
defaultPackages = map (pkg: setPrio ((pkg.meta.priority or 5) + 3) pkg)
-
[ pkgs.perl
+
[ pkgs.nano
+
pkgs.perl
pkgs.rsync
pkgs.strace
];
···
default = defaultPackages;
example = literalExample "[]";
description = ''
-
Set of packages users expect from a minimal linux istall.
-
Like systemPackages, they appear in
-
/run/current-system/sw. These packages are
+
Set of default packages that aren't strictly neccessary
+
for a running system, entries can be removed for a more
+
minimal NixOS installation.
+
+
Note: If <package>pkgs.nano</package> is removed from this list,
+
make sure another editor is installed and the
+
<literal>EDITOR</literal> environment variable is set to it.
+
Environment variables can be set using
+
<option>environment.variables</option>.
+
+
Like with systemPackages, packages are installed to
+
<filename>/run/current-system/sw</filename>. They are
automatically available to all users, and are
automatically updated every time you rebuild the system
configuration.
-
If you want a more minimal system, set it to an empty list.
'';
};
+2 -2
pkgs/applications/networking/cluster/terraform-docs/default.nix
···
{ lib, buildGoModule, fetchFromGitHub }:
buildGoModule rec {
pname = "terraform-docs";
-
version = "0.12.0";
+
version = "0.12.1";
src = fetchFromGitHub {
owner = "terraform-docs";
repo = pname;
rev = "v${version}";
-
sha256 = "sha256-6jUYntnMB/LxyZuRkSaOVcrzJOIoucdaY+5GVHwJL8Y=";
+
sha256 = "sha256-zQFPuHxfFvfwPVV0vPeA+A6XCw2Vt4tY4S2JBGcqaBQ=";
};
vendorSha256 = "sha256-HO2E8i5A/2Xi7Pq+Mqb/2ogK1to8IvZjRuDXfzGvOXk=";
+2
pkgs/applications/virtualization/conmon/default.nix
···
makeFlags = [ "bin/conmon" ];
installPhase = ''
+
runHook preInstall
install -D bin/conmon -t $out/bin
+
runHook postInstall
'';
passthru.tests = { inherit (nixosTests) cri-o podman; };
+4
pkgs/applications/virtualization/cri-o/default.nix
···
BUILDTAGS = "apparmor seccomp selinux containers_image_openpgp containers_image_ostree_stub";
buildPhase = ''
+
runHook preBuild
make binaries docs BUILDTAGS="$BUILDTAGS"
+
runHook postBuild
'';
installPhase = ''
+
runHook preInstall
install -Dm755 bin/* -t $out/bin
for shell in bash fish zsh; do
···
done
installManPage docs/*.[1-9]
+
runHook postInstall
'';
passthru.tests = { inherit (nixosTests) cri-o; };
+9 -3
pkgs/applications/virtualization/podman/default.nix
···
buildGoModule rec {
pname = "podman";
-
version = "3.0.1";
+
version = "3.1.0";
src = fetchFromGitHub {
owner = "containers";
repo = "podman";
rev = "v${version}";
-
sha256 = "sha256-+z28Z0KvaJa32+eTGFsNX8g/WVd3BohKoBnNPU/kpWM=";
+
sha256 = "sha256-Cql9ikk0lo/LeWNykEJSKgfGnBSUU5vOh/zUIEvMapk=";
};
patches = [
···
];
buildPhase = ''
+
runHook preBuild
patchShebangs .
${if stdenv.isDarwin
then "make podman-remote"
else "make podman"}
make docs
+
runHook postBuild
'';
-
installPhase = lib.optionalString stdenv.isDarwin ''
+
installPhase = ''
+
runHook preInstall
+
'' + lib.optionalString stdenv.isDarwin ''
mv bin/{podman-remote,podman}
'' + ''
install -Dm555 bin/podman $out/bin/podman
···
'' + lib.optionalString stdenv.isLinux ''
install -Dm644 contrib/tmpfile/podman.conf -t $out/lib/tmpfiles.d
install -Dm644 contrib/systemd/system/podman.{socket,service} -t $out/lib/systemd/system
+
'' + ''
+
runHook postInstall
'';
passthru.tests = { inherit (nixosTests) podman; };
+4
pkgs/applications/virtualization/runc/default.nix
···
makeFlags = [ "BUILDTAGS+=seccomp" ];
buildPhase = ''
+
runHook preBuild
cd go/src/${goPackagePath}
patchShebangs .
make ${toString makeFlags} runc man
+
runHook postBuild
'';
installPhase = ''
+
runHook preInstall
install -Dm755 runc $out/bin/runc
installManPage man/*/*.[1-9]
wrapProgram $out/bin/runc \
--prefix PATH : ${lib.makeBinPath [ procps ]} \
--prefix PATH : /run/current-system/systemd/bin
+
runHook postInstall
'';
passthru.tests = { inherit (nixosTests) cri-o docker podman; };
+24
pkgs/development/coq-modules/odd-order/default.nix
···
+
{ lib, mkCoqDerivation, mathcomp, version ? null }:
+
with lib;
+
+
mkCoqDerivation {
+
pname = "odd-order";
+
owner = "math-comp";
+
+
release."1.12.0".rev = "mathcomp-odd-order.1.12.0";
+
release."1.12.0".sha256 = "sha256-omsfdc294CxKAHNMMeqJCcVimvyRCHgxcQ4NJOWSfNM=";
+
+
inherit version;
+
defaultVersion = with versions; switch mathcomp.character.version [
+
{ case = pred.union (isGe "1.10.0") (isEq "dev"); out = "1.12.0"; }
+
] null;
+
+
propagatedBuildInputs = [ mathcomp.character ];
+
+
meta = {
+
description = "Formal proof of the Odd Order Theorem";
+
maintainers = with maintainers; [ siraben ];
+
license = licenses.cecill-b;
+
platforms = platforms.unix;
+
};
+
}
+2 -2
pkgs/development/tools/ameba/default.nix
···
crystal.buildCrystalPackage rec {
pname = "ameba";
-
version = "0.14.1";
+
version = "0.14.2";
src = fetchFromGitHub {
owner = "crystal-ameba";
repo = "ameba";
rev = "v${version}";
-
sha256 = "sha256-yRahBY2ob3EkBKXZN9K7UqgHM4k5CVOcWG0/oOWQFuk=";
+
sha256 = "sha256-wtUWmvAm7iTiP8eYgPiRasYjzeCIJCQd3D+8f1kMONA=";
};
meta = with lib; {
+4
pkgs/development/tools/buildah/default.nix
···
];
buildPhase = ''
+
runHook preBuild
patchShebangs .
make bin/buildah GIT_COMMIT="unknown"
make -C docs GOMD2MAN="${go-md2man}/bin/go-md2man"
+
runHook postBuild
'';
installPhase = ''
+
runHook preInstall
install -Dm755 bin/buildah $out/bin/buildah
installShellCompletion --bash contrib/completions/bash/buildah
make -C docs install PREFIX="$man"
+
runHook postInstall
'';
meta = with lib; {
+3 -3
pkgs/development/tools/gotestsum/default.nix
···
buildGoModule rec {
pname = "gotestsum";
-
version = "1.6.2";
+
version = "1.6.3";
src = fetchFromGitHub {
owner = "gotestyourself";
repo = "gotestsum";
rev = "v${version}";
-
sha256 = "sha256-/DpsB3MS0iPYFSug3RTWOprB8tclVP6v3dbS3mC3S+g=";
+
sha256 = "sha256-xUDhJLTO3JZ7rlUUzcypUev60qmRK9zOlO2VYeXqT4o=";
};
-
vendorSha256 = "sha256-AOdWv0PkDi8o5V71DVzAd/sRibbMf3CkqmJGmuxHtuc=";
+
vendorSha256 = "sha256-sHi8iW+ZV/coeAwDUYnSH039UNtUO9HK0Bhz9Gmtv8k=";
doCheck = false;
+3 -3
pkgs/development/tools/misc/md2man/default.nix pkgs/development/tools/misc/go-md2man/default.nix
···
-
{ lib, buildGoPackage, fetchFromGitHub }:
+
{ lib, buildGoModule, fetchFromGitHub }:
-
buildGoPackage rec {
+
buildGoModule rec {
pname = "go-md2man";
version = "2.0.0";
-
goPackagePath = "github.com/cpuguy83/go-md2man";
+
vendorSha256 = null;
src = fetchFromGitHub {
rev = "v${version}";
+5
pkgs/development/tools/skopeo/default.nix
···
++ lib.optionals stdenv.isLinux [ lvm2 btrfs-progs ];
buildPhase = ''
+
runHook preBuild
patchShebangs .
make bin/skopeo docs
+
runHook postBuild
'';
installPhase = ''
+
runHook preInstall
install -Dm755 bin/skopeo -t $out/bin
installManPage docs/*.[1-9]
installShellCompletion --bash completions/bash/skopeo
'' + lib.optionalString stdenv.isLinux ''
wrapProgram $out/bin/skopeo \
--prefix PATH : ${lib.makeBinPath [ fuse-overlayfs ]}
+
'' + ''
+
runHook postInstall
'';
meta = with lib; {
+1 -1
pkgs/games/asc/default.nix
···
configureFlags = [ "--disable-paragui" "--disable-paraguitest" ];
-
NIX_CFLAGS_COMPILE = "-fpermissive"; # I'm too lazy to catch all gcc47-related problems
+
NIX_CFLAGS_COMPILE = "-fpermissive -Wno-error=narrowing"; # I'm too lazy to catch all gcc47-related problems
hardeningDisable = [ "format" ];
buildInputs = [
+2 -2
pkgs/servers/monitoring/do-agent/default.nix
···
buildGoModule rec {
pname = "do-agent";
-
version = "3.9.0";
+
version = "3.9.4";
src = fetchFromGitHub {
owner = "digitalocean";
repo = "do-agent";
rev = version;
-
sha256 = "sha256-0m2dL7oFF45yR4Vu+AW3ROf16w1iioI5McVauOQA/XQ=";
+
sha256 = "sha256-h5Bv6Us1NrxhUWBckUcGzh3qDk8yDbkmLnV6ZYDdClU=";
};
buildFlagsArray = ''
+3 -3
pkgs/tools/misc/chezmoi/default.nix
···
buildGoModule rec {
pname = "chezmoi";
-
version = "2.0.4";
+
version = "2.0.5";
src = fetchFromGitHub {
owner = "twpayne";
repo = "chezmoi";
rev = "v${version}";
-
sha256 = "sha256-jvit6Z0SwxjDmpEqojmPUJ3TVmVmW3RC+3tfvG1ev4Q=";
+
sha256 = "sha256-mq9kwkEeh+kVhiVy/h44oP3Rj819gGQDiMifSb7ryeY=";
};
-
vendorSha256 = "sha256-V05cCKQeqw6BEjLIYDeHeDePkA7rs7kjqPCys5eLefA=";
+
vendorSha256 = "sha256-YU+t8GVsLYWONezUIB4NUrVxtYOmf/2b5v4v3VSYtBU=";
doCheck = false;
+9 -6
pkgs/tools/security/sslscan/default.nix
···
-
{ lib, stdenv, fetchFromGitHub, openssl }:
+
{ lib
+
, stdenv
+
, fetchFromGitHub
+
, openssl
+
}:
stdenv.mkDerivation rec {
pname = "sslscan";
-
version = "1.11.13";
+
version = "2.0.9";
src = fetchFromGitHub {
owner = "rbsec";
repo = "sslscan";
-
rev = "${version}-rbsec";
-
sha256 = "0sa8iw91wi3515lw761j84wagab1x9rxr0mn8m08qj300z2044yk";
+
rev = version;
+
sha256 = "0594svwz4pya0syibar0ahmi5zdjbwd5kg6hrlhfpmmslrsyli6m";
};
buildInputs = [ openssl ];
···
meta = with lib; {
description = "Tests SSL/TLS services and discover supported cipher suites";
homepage = "https://github.com/rbsec/sslscan";
-
license = licenses.gpl3;
+
license = licenses.gpl3Only;
maintainers = with maintainers; [ fpletz globin ];
-
platforms = platforms.all;
};
}
+4
pkgs/tools/virtualization/cri-tools/default.nix
···
nativeBuildInputs = [ installShellFiles ];
buildPhase = ''
+
runHook preBuild
make binaries VERSION=${version}
+
runHook postBuild
'';
installPhase = ''
+
runHook preInstall
make install BINDIR=$out/bin
for shell in bash fish zsh; do
$out/bin/crictl completion $shell > crictl.$shell
installShellCompletion crictl.$shell
done
+
runHook postInstall
'';
meta = with lib; {
+2 -7
pkgs/top-level/all-packages.nix
···
sshpass = callPackage ../tools/networking/sshpass { };
-
sslscan = callPackage ../tools/security/sslscan {
-
openssl = openssl_1_0_2.override {
-
enableSSL2 = true;
-
enableSSL3 = true;
-
};
-
};
+
sslscan = callPackage ../tools/security/sslscan { };
sslmate = callPackage ../development/tools/sslmate { };
···
mavproxy = python3Packages.callPackage ../applications/science/robotics/mavproxy { };
-
go-md2man = callPackage ../development/tools/misc/md2man {};
+
go-md2man = callPackage ../development/tools/misc/go-md2man {};
mage = callPackage ../development/tools/build-managers/mage { };
+1
pkgs/top-level/coq-packages.nix
···
mathcomp-real-closed = callPackage ../development/coq-modules/mathcomp-real-closed {};
metalib = callPackage ../development/coq-modules/metalib { };
multinomials = callPackage ../development/coq-modules/multinomials {};
+
odd-order = callPackage ../development/coq-modules/odd-order { };
paco = callPackage ../development/coq-modules/paco {};
paramcoq = callPackage ../development/coq-modules/paramcoq {};
QuickChick = callPackage ../development/coq-modules/QuickChick {};