+10
lib/licenses.nix
+10
lib/licenses.nix
···
+12
maintainers/maintainer-list.nix
+12
maintainers/maintainer-list.nix
······
······
+87
-12
nixos/doc/manual/from_md/release-notes/rl-2305.section.xml
+87
-12
nixos/doc/manual/from_md/release-notes/rl-2305.section.xml
·········
·········+<link xlink:href="https://www.defined.net/blog/announcing-relay-support-in-nebula/">announcement</link>
+15
-1
nixos/doc/manual/release-notes/rl-2305.section.md
+15
-1
nixos/doc/manual/release-notes/rl-2305.section.md
···- The [services.wordpress.sites.<name>.plugins](#opt-services.wordpress.sites._name_.plugins) and [services.wordpress.sites.<name>.themes](#opt-services.wordpress.sites._name_.themes) options have been converted from sets to attribute sets to allow for consumers to specify explicit install paths via attribute name.- In `mastodon` it is now necessary to specify location of file with `PostgreSQL` database password. In `services.mastodon.database.passwordFile` parameter default value `/var/lib/mastodon/secrets/db-password` has been changed to `null`.- The `--target-host` and `--build-host` options of `nixos-rebuild` no longer treat the `localhost` value specially – to build on/deploy to local machine, omit the relevant flag.···- The module `usbmuxd` now has the ability to change the package used by the daemon. In case you're experiencing issues with `usbmuxd` you can try an alternative program like `usbmuxd2`. Available as [services.usbmuxd.package](#opt-services.usbmuxd.package)-- A few openssh options have been moved from extraConfig to the new freeform option `settings` and renamed as follow: `services.openssh.kbdInteractiveAuthentication` to `services.openssh.settings.KbdInteractiveAuthentication`, `services.openssh.passwordAuthentication` to `services.openssh.settings.PasswordAuthentication`, `services.openssh.useDns` to `services.openssh.settings.UseDns`, `services.openssh.permitRootLogin` to `services.openssh.settings.PermitRootLogin`, `services.openssh.logLevel` to `services.openssh.settings.LogLevel`.- `services.mastodon` gained a tootctl wrapped named `mastodon-tootctl` similar to `nextcloud-occ` which can be executed from any user and switches to the configured mastodon user with sudo and sources the environment variables.···- [Garage](https://garagehq.deuxfleurs.fr/) version is based on [system.stateVersion](options.html#opt-system.stateVersion), existing installations will keep using version 0.7. New installations will use version 0.8. In order to upgrade a Garage cluster, please follow [upstream instructions](https://garagehq.deuxfleurs.fr/documentation/cookbook/upgrading/) and force [services.garage.package](options.html#opt-services.garage.package) or upgrade accordingly [system.stateVersion](options.html#opt-system.stateVersion).
···- The [services.wordpress.sites.<name>.plugins](#opt-services.wordpress.sites._name_.plugins) and [services.wordpress.sites.<name>.themes](#opt-services.wordpress.sites._name_.themes) options have been converted from sets to attribute sets to allow for consumers to specify explicit install paths via attribute name.+- Nebula now runs as a system user and group created for each nebula network, using the `CAP_NET_ADMIN` ambient capability on launch rather than starting as root. Ensure that any files each Nebula instance needs to access are owned by the correct user and group, by default `nebula-${networkName}`.- In `mastodon` it is now necessary to specify location of file with `PostgreSQL` database password. In `services.mastodon.database.passwordFile` parameter default value `/var/lib/mastodon/secrets/db-password` has been changed to `null`.- The `--target-host` and `--build-host` options of `nixos-rebuild` no longer treat the `localhost` value specially – to build on/deploy to local machine, omit the relevant flag.···- The module `usbmuxd` now has the ability to change the package used by the daemon. In case you're experiencing issues with `usbmuxd` you can try an alternative program like `usbmuxd2`. Available as [services.usbmuxd.package](#opt-services.usbmuxd.package)+- A few openssh options have been moved from extraConfig to the new freeform option `settings` and renamed as follows:+- `services.openssh.kbdInteractiveAuthentication` -> `services.openssh.settings.KbdInteractiveAuthentication`+- `services.openssh.passwordAuthentication` to `services.openssh.settings.PasswordAuthentication`- `services.mastodon` gained a tootctl wrapped named `mastodon-tootctl` similar to `nextcloud-occ` which can be executed from any user and switches to the configured mastodon user with sudo and sources the environment variables.···- [Garage](https://garagehq.deuxfleurs.fr/) version is based on [system.stateVersion](options.html#opt-system.stateVersion), existing installations will keep using version 0.7. New installations will use version 0.8. In order to upgrade a Garage cluster, please follow [upstream instructions](https://garagehq.deuxfleurs.fr/documentation/cookbook/upgrading/) and force [services.garage.package](options.html#opt-services.garage.package) or upgrade accordingly [system.stateVersion](options.html#opt-system.stateVersion).+- Nebula now supports the `services.nebula.networks.<name>.isRelay` and `services.nebula.networks.<name>.relays` configuration options for setting up or allowing traffic relaying. See the [announcement](https://www.defined.net/blog/announcing-relay-support-in-nebula/) for more details about relays.
+1
nixos/modules/module-list.nix
+1
nixos/modules/module-list.nix
+1
-1
nixos/modules/programs/ssh.nix
+1
-1
nixos/modules/programs/ssh.nix
+1
-1
nixos/modules/services/computing/slurm/slurm.nix
+1
-1
nixos/modules/services/computing/slurm/slurm.nix
+231
nixos/modules/services/monitoring/cockpit.nix
+231
nixos/modules/services/monitoring/cockpit.nix
···
···+See the [documentation](https://cockpit-project.org/guide/latest/cockpit.conf.5.html), that is also available with `man cockpit.conf.5` for details.+environment.etc."cockpit/cockpit.conf".source = settingsFormat.generate "cockpit.conf" cfg.settings;+requires = [ "cockpit.socket" "cockpit-wsinstance-http.socket" "cockpit-wsinstance-https-factory.socket" ];+# See https://www.freedesktop.org/software/systemd/man/systemd.service.html#ExecStart= for details+# - As cockpit.socket is disabled by default, /run/cockpit/motd points to /run/cockpit/inactive.motd+"C /run/cockpit/inactive.motd 0640 root root - ${cfg.package}/share/cockpit/motd/inactive.motd"
+53
-18
nixos/modules/services/networking/nebula.nix
+53
-18
nixos/modules/services/networking/nebula.nix
···List of IPs of lighthouse hosts this node should report to and query from. This should be empty on lighthouse······unitConfig.StartLimitIntervalSec = 0; # ensure Restart=always is always honoured (networks can go down for arbitrarily long)······
···List of IPs of lighthouse hosts this node should report to and query from. This should be empty on lighthouse······unitConfig.StartLimitIntervalSec = 0; # ensure Restart=always is always honoured (networks can go down for arbitrarily long)······
+79
-89
nixos/modules/services/networking/ssh/sshd.nix
+79
-89
nixos/modules/services/networking/ssh/sshd.nix
······(mkRenamedOptionModule [ "services" "openssh" "useDns" ] [ "services" "openssh" "settings" "UseDns" ])(mkRenamedOptionModule [ "services" "openssh" "permitRootLogin" ] [ "services" "openssh" "settings" "PermitRootLogin" ])(mkRenamedOptionModule [ "services" "openssh" "logLevel" ] [ "services" "openssh" "settings" "LogLevel" ])·····················
······(mkRenamedOptionModule [ "services" "openssh" "useDns" ] [ "services" "openssh" "settings" "UseDns" ])(mkRenamedOptionModule [ "services" "openssh" "permitRootLogin" ] [ "services" "openssh" "settings" "PermitRootLogin" ])(mkRenamedOptionModule [ "services" "openssh" "logLevel" ] [ "services" "openssh" "settings" "LogLevel" ])+(mkRenamedOptionModule [ "services" "openssh" "macs" ] [ "services" "openssh" "settings" "Macs" ])+(mkRenamedOptionModule [ "services" "openssh" "cyphers" ] [ "services" "openssh" "settings" "Cyphers" ])+(mkRenamedOptionModule [ "services" "openssh" "kexAlgorithms" ] [ "services" "openssh" "settings" "KexAlgorithms" ])+(mkRenamedOptionModule [ "services" "openssh" "gatewayPorts" ] [ "services" "openssh" "settings" "GatewayPorts" ])+(mkRenamedOptionModule [ "services" "openssh" "forwardX11" ] [ "services" "openssh" "settings" "X11Forwarding" ])·····················+assertions = [{ assertion = if cfg.settings.X11Forwarding then cfgc.setXAuthLocation else true;
+1
-1
nixos/modules/services/search/meilisearch.nix
+1
-1
nixos/modules/services/search/meilisearch.nix
···
···
+2
-2
nixos/modules/services/security/privacyidea.nix
+2
-2
nixos/modules/services/security/privacyidea.nix
······
······
+2
-1
nixos/modules/services/web-servers/nginx/default.nix
+2
-1
nixos/modules/services/web-servers/nginx/default.nix
···+# don't let clients close the keep-alive connection to upstream. See the nginx blog for details:
+1
nixos/tests/all-tests.nix
+1
nixos/tests/all-tests.nix
···
···
+135
nixos/tests/cockpit.nix
+135
nixos/tests/cockpit.nix
···
···
+1
-1
nixos/tests/cups-pdf.nix
+1
-1
nixos/tests/cups-pdf.nix
+143
-58
nixos/tests/nebula.nix
+143
-58
nixos/tests/nebula.nix
····································-'nebula-cert sign -ca-crt /etc/nebula/ca.crt -ca-key /etc/nebula/ca.key -name "${name}" -groups "${name}" -ip "${ip}" -in-pub /tmp/${name}.pub -out-crt /tmp/${name}.crt','nebula-cert sign -ca-crt /etc/nebula/ca.crt -ca-key /etc/nebula/ca.key -name "lighthouse" -groups "lighthouse" -ip "10.0.100.1/24" -out-crt /etc/nebula/lighthouse.crt -out-key /etc/nebula/lighthouse.key',···
····································+'nebula-cert sign -ca-crt /etc/nebula/ca.crt -ca-key /etc/nebula/ca.key -name "${name}" -groups "${name}" -ip "${ip}" -in-pub /root/${name}.pub -out-crt /root/${name}.crt'+${node}.succeed("ip --brief addr show eth1 | awk '{print $3}' | tail -n1 | cut -d/ -f1").strip()'nebula-cert sign -ca-crt /etc/nebula/ca.crt -ca-key /etc/nebula/ca.key -name "lighthouse" -groups "lighthouse" -ip "10.0.100.1/24" -out-crt /etc/nebula/lighthouse.crt -out-key /etc/nebula/lighthouse.key',···+# allowAny can ping the lighthouse, but not allowFromLighthouse because of its inbound firewall+# block allowFromLighthouse <-> allowAny, and allowFromLighthouse -> allowAny should still work.+# block allowAny <-> allowFromLighthouse, and allowAny -> allowFromLighthouse should still work.+# block lighthouse <-> allowFromLighthouse and allowAny <-> allowFromLighthouse; allowFromLighthouse won't get to allowAny+# block lighthouse <-> allowAny, allowAny <-> allowFromLighthouse, and allowAny <-> allowToLighthouse; it won't get to allowFromLighthouse or allowToLighthouse+# block lighthouse <-> allowToLighthouse and allowToLighthouse <-> allowAny; it won't get to allowAny
+107
-101
nixos/tests/pgadmin4.nix
+107
-101
nixos/tests/pgadmin4.nix
······-&& sed -i 's|/opt/PostgreSQL/9.4/bin/|${pkgs.postgresql}/bin|' web/regression/test_config.json \-&& sed -i 's|\"headless_chrome\": false|\"headless_chrome\": true|' web/regression/test_config.json"-# see https://stackoverflow.com/questions/50642308/webdriverexception-unknown-error-devtoolsactiveport-file-doesnt-exist-while-t#50642913-&& sed -i '\|options.add_argument(\"--disable-infobars\")|a \ \ \ \ \ \ \ \ options.binary_location = \"${pkgs.chromium}/bin/chromium\"' web/regression/runtests.py \-&& sed -i '\|options.add_argument(\"--no-sandbox\")|a \ \ \ \ \ \ \ \ options.add_argument(\"--headless\")' web/regression/runtests.py \-&& sed -i '\|options.add_argument(\"--disable-infobars\")|a \ \ \ \ \ \ \ \ options.add_argument(\"--disable-dev-shm-usage\")' web/regression/runtests.py \-&& sed -i 's|(chrome_options=options)|(executable_path=\"${pkgs.chromedriver}/bin/chromedriver\", chrome_options=options)|' web/regression/runtests.py \---exclude browser.tests.test_ldap_login.LDAPLoginTestCase,browser.tests.test_ldap_login,browser.tests.test_kerberos_with_mocking'
······+# also ensure Server Mode is set to false, which will automatically exclude some unnecessary tests.+# see https://github.com/pgadmin-org/pgadmin4/blob/fd1c26408bbf154fa455a49ee5c12895933833a3/web/regression/runtests.py#L217-L226+&& sed -i 's|/opt/PostgreSQL/9.4/bin/|${pkgs.postgresql}/bin|' web/regression/test_config.json \+&& sed -i 's|\"headless_chrome\": false|\"headless_chrome\": true|' web/regression/test_config.json \+&& sed -i 's|builtins.SERVER_MODE = None|builtins.SERVER_MODE = False|' web/regression/runtests.py"+# see https://stackoverflow.com/questions/50642308/webdriverexception-unknown-error-devtoolsactiveport-file-doesnt-exist-while-t#50642913+&& sed -i '\|options.add_argument(\"--disable-infobars\")|a \ \ \ \ \ \ \ \ options.binary_location = \"${pkgs.chromium}/bin/chromium\"' web/regression/runtests.py \+&& sed -i '\|options.add_argument(\"--no-sandbox\")|a \ \ \ \ \ \ \ \ options.add_argument(\"--headless\")' web/regression/runtests.py \+&& sed -i '\|options.add_argument(\"--disable-infobars\")|a \ \ \ \ \ \ \ \ options.add_argument(\"--disable-dev-shm-usage\")' web/regression/runtests.py \+&& sed -i 's|(chrome_options=options)|(executable_path=\"${pkgs.chromedriver}/bin/chromedriver\", chrome_options=options)|' web/regression/runtests.py \+&& sed -i \'s|builtins.SERVER_MODE = False|builtins.SERVER_MODE = True|\' regression/runtests.py \
-1
pkgs/applications/audio/amarok/default.nix
-1
pkgs/applications/audio/amarok/default.nix
···, karchive, kcmutils, kconfig, kdnssd, kguiaddons, kinit, kirigami2, knewstuff, knotifyconfig, ktexteditor, kwindowsystem, curl, ffmpeg, gdk-pixbuf, libaio, liblastfm, libmtp, loudmouth, lzo, lz4, mariadb-embedded, pcre, snappy, taglib, taglib_extras
···, karchive, kcmutils, kconfig, kdnssd, kguiaddons, kinit, kirigami2, knewstuff, knotifyconfig, ktexteditor, kwindowsystem, curl, ffmpeg, gdk-pixbuf, libaio, liblastfm, libmtp, loudmouth, lzo, lz4, mariadb-embedded, pcre, snappy, taglib, taglib_extras
+1
-1
pkgs/applications/editors/vim/plugins/overrides.nix
+1
-1
pkgs/applications/editors/vim/plugins/overrides.nix
+6
-4
pkgs/applications/misc/iptsd/default.nix
+6
-4
pkgs/applications/misc/iptsd/default.nix
······
······
+13
-13
pkgs/applications/misc/pdfsam-basic/default.nix
+13
-13
pkgs/applications/misc/pdfsam-basic/default.nix
···url = "https://github.com/torakiki/pdfsam/releases/download/v${version}/pdfsam_${version}-1_amd64.deb";······-description = "Multi-platform software designed to extract pages, split, merge, mix and rotate PDF files";
···url = "https://github.com/torakiki/pdfsam/releases/download/v${version}/pdfsam_${version}-1_amd64.deb";······+description = "Multi-platform software designed to extract pages, split, merge, mix and rotate PDF files";
+76
-15
pkgs/applications/misc/privacyidea/default.nix
+76
-15
pkgs/applications/misc/privacyidea/default.nix
······# Taken from by https://github.com/NixOS/nixpkgs/pull/173090/commits/d2c0c7eb4cc91beb0a1adbaf13abc0a526a21708·········-url = "https://github.com/privacyidea/privacyidea/commit/0e28f36c0b3291a361669f4a3a77c294f4564475.patch";···
······# Taken from by https://github.com/NixOS/nixpkgs/pull/173090/commits/d2c0c7eb4cc91beb0a1adbaf13abc0a526a21708···+url = "https://github.com/mkrizek/jinja/commit/bd8bad37d1c0e2d8995a44fd88e234f5340afec5.patch";·········
+7
-6
pkgs/applications/misc/watchmate/default.nix
+7
-6
pkgs/applications/misc/watchmate/default.nix
·········
·········
+2
-2
pkgs/applications/misc/xchm/default.nix
+2
-2
pkgs/applications/misc/xchm/default.nix
+7
-1
pkgs/applications/networking/browsers/chromium/common.nix
+7
-1
pkgs/applications/networking/browsers/chromium/common.nix
·········
·········
+6
-6
pkgs/applications/networking/browsers/chromium/upstream-info.json
+6
-6
pkgs/applications/networking/browsers/chromium/upstream-info.json
······
······
+2
-2
pkgs/applications/networking/browsers/lagrange/default.nix
+2
-2
pkgs/applications/networking/browsers/lagrange/default.nix
···
···
+5
-5
pkgs/applications/networking/browsers/librewolf/src.json
+5
-5
pkgs/applications/networking/browsers/librewolf/src.json
···-"sha512": "9e2b6e20353e414da3d2eb9dcd3d77757664a98a4438a8e84f19a1c7c203e40136b08bf96a458fac05ddc627347217d32f1f6337980c5ca918874993657a58e7"
···+"sha512": "58b21449a16a794152888f50e7fe9488c28739a7e067729acdc1de9f2e8384e6316cffdfe89f690f0d211189668d940825b4f8a26b8100468ae120772df99d72"
+33
pkgs/applications/networking/cluster/pv-migrate/default.nix
+33
pkgs/applications/networking/cluster/pv-migrate/default.nix
···
···
+2
-2
pkgs/applications/networking/cluster/terraform-providers/providers.json
+2
-2
pkgs/applications/networking/cluster/terraform-providers/providers.json
···
···
+2
-2
pkgs/applications/office/portfolio/default.nix
+2
-2
pkgs/applications/office/portfolio/default.nix
···url = "https://github.com/buchen/portfolio/releases/download/${version}/PortfolioPerformance-${version}-linux.gtk.x86_64.tar.gz";
···url = "https://github.com/buchen/portfolio/releases/download/${version}/PortfolioPerformance-${version}-linux.gtk.x86_64.tar.gz";
+23
pkgs/applications/office/rime-cli/default.nix
+23
pkgs/applications/office/rime-cli/default.nix
···
···
+2
-2
pkgs/applications/science/biology/stacks/default.nix
+2
-2
pkgs/applications/science/biology/stacks/default.nix
+43
pkgs/applications/science/chemistry/mopac/default.nix
+43
pkgs/applications/science/chemistry/mopac/default.nix
···
···
+41
pkgs/applications/science/chemistry/wxmacmolplt/default.nix
+41
pkgs/applications/science/chemistry/wxmacmolplt/default.nix
···
···
+1
-1
pkgs/applications/science/logic/coq/default.nix
+1
-1
pkgs/applications/science/logic/coq/default.nix
+2
-2
pkgs/applications/virtualization/conmon/default.nix
+2
-2
pkgs/applications/virtualization/conmon/default.nix
+5
pkgs/build-support/go/module.nix
+5
pkgs/build-support/go/module.nix
+1
-1
pkgs/data/fonts/iosevka/bin.nix
+1
-1
pkgs/data/fonts/iosevka/bin.nix
+92
-92
pkgs/data/fonts/iosevka/variants.nix
+92
-92
pkgs/data/fonts/iosevka/variants.nix
···
···
+44
pkgs/data/themes/breath-theme/default.nix
+44
pkgs/data/themes/breath-theme/default.nix
···
···
+5
-11
pkgs/development/interpreters/wasmtime/default.nix
+5
-11
pkgs/development/interpreters/wasmtime/default.nix
······
······
+14
pkgs/development/libraries/apr/cross-assume-dev-zero-mmappable.patch
+14
pkgs/development/libraries/apr/cross-assume-dev-zero-mmappable.patch
···
···
+3
-26
pkgs/development/libraries/apr/default.nix
+3
-26
pkgs/development/libraries/apr/default.nix
···-# Cross fix. Patch the /dev/zero mmapable detection logic. https://bugs.gentoo.org/show_bug.cgi?id=830833
···
+3
-3
pkgs/development/libraries/sealcurses/default.nix
+3
-3
pkgs/development/libraries/sealcurses/default.nix
···
···
+2
-2
pkgs/development/libraries/the-foundation/default.nix
+2
-2
pkgs/development/libraries/the-foundation/default.nix
···
···
+56
pkgs/development/python-modules/bambi/default.nix
+56
pkgs/development/python-modules/bambi/default.nix
···
···
+38
pkgs/development/python-modules/bencode-py/default.nix
+38
pkgs/development/python-modules/bencode-py/default.nix
···
···
+4
-4
pkgs/development/python-modules/cmsis-pack-manager/default.nix
+4
-4
pkgs/development/python-modules/cmsis-pack-manager/default.nix
······
······
+43
pkgs/development/python-modules/formulae/default.nix
+43
pkgs/development/python-modules/formulae/default.nix
···
···
+7
-8
pkgs/development/python-modules/humanize/default.nix
+7
-8
pkgs/development/python-modules/humanize/default.nix
······
······
+3
-3
pkgs/development/python-modules/piccata/default.nix
+3
-3
pkgs/development/python-modules/piccata/default.nix
···
···
+36
pkgs/development/python-modules/sphinxcontrib-youtube/default.nix
+36
pkgs/development/python-modules/sphinxcontrib-youtube/default.nix
···
···
+1
-1
pkgs/development/tools/analysis/evmdis/default.nix
+1
-1
pkgs/development/tools/analysis/evmdis/default.nix
+2
-2
pkgs/development/tools/analysis/include-what-you-use/default.nix
+2
-2
pkgs/development/tools/analysis/include-what-you-use/default.nix
···
···
+3
-3
pkgs/development/tools/buildah/default.nix
+3
-3
pkgs/development/tools/buildah/default.nix
···
···
+3
-3
pkgs/development/tools/geckodriver/default.nix
+3
-3
pkgs/development/tools/geckodriver/default.nix
···
···
+3
-3
pkgs/development/tools/ruff/default.nix
+3
-3
pkgs/development/tools/ruff/default.nix
···
···
+1
-1
pkgs/development/tools/statik/default.nix
+1
-1
pkgs/development/tools/statik/default.nix
+24
pkgs/development/tools/yamlfmt/default.nix
+24
pkgs/development/tools/yamlfmt/default.nix
···
···
+10
-5
pkgs/misc/frescobaldi/default.nix
+10
-5
pkgs/misc/frescobaldi/default.nix
······
······
+7
-5
pkgs/misc/logging/beats/7.x.nix
+7
-5
pkgs/misc/logging/beats/7.x.nix
······
······
+36
pkgs/os-specific/darwin/openwith/default.nix
+36
pkgs/os-specific/darwin/openwith/default.nix
···
···+description = "Utility to specify which application bundle should open specific file extensions";
+4
-4
pkgs/os-specific/linux/kernel/zen-kernels.nix
+4
-4
pkgs/os-specific/linux/kernel/zen-kernels.nix
···
···
+2
-2
pkgs/os-specific/linux/trace-cmd/kernelshark.nix
+2
-2
pkgs/os-specific/linux/trace-cmd/kernelshark.nix
···
···
+4
-2
pkgs/servers/geospatial/mapcache/default.nix
+4
-2
pkgs/servers/geospatial/mapcache/default.nix
······
······
+226
pkgs/servers/monitoring/cockpit/default.nix
+226
pkgs/servers/monitoring/cockpit/default.nix
···
···+--replace 'devel@lists.cockpit-project.org' 'https://github.com/NixOS/nixpkgs/issues/new?assignees=&labels=0.kind%3A+bug&template=bug_report.md&title=cockpit%25'
+34
pkgs/servers/monitoring/cockpit/fix-makefiles.patch
+34
pkgs/servers/monitoring/cockpit/fix-makefiles.patch
···
···++ ln -sTfr $(DESTDIR)$(prefix)/run/cockpit/motd $(DESTDIR)$(prefix)$(sysconfdir)/motd.d/cockpit++ ln -sTfr $(DESTDIR)$(prefix)/run/cockpit/motd $(DESTDIR)$(prefix)$(sysconfdir)/issue.d/cockpit.issue+- mkdir -p $(DESTDIR)$(sysconfdir)/cockpit/ws-certs.d $(DESTDIR)$(sysconfdir)/cockpit/machines.d+- chmod 755 $(DESTDIR)$(sysconfdir)/cockpit/ws-certs.d $(DESTDIR)$(sysconfdir)/cockpit/machines.d++ mkdir -p $(DESTDIR)$(prefix)$(sysconfdir)/cockpit/ws-certs.d $(DESTDIR)$(prefix)$(sysconfdir)/cockpit/machines.d++ chmod 755 $(DESTDIR)$(prefix)$(sysconfdir)/cockpit/ws-certs.d $(DESTDIR)$(prefix)$(sysconfdir)/cockpit/machines.d
+12
pkgs/servers/monitoring/cockpit/nerf-node-modules.patch
+12
pkgs/servers/monitoring/cockpit/nerf-node-modules.patch
···
···
+3
-3
pkgs/servers/search/meilisearch/default.nix
+3
-3
pkgs/servers/search/meilisearch/default.nix
······
······
+3
-3
pkgs/servers/sftpgo/default.nix
+3
-3
pkgs/servers/sftpgo/default.nix
···
···
+2
-2
pkgs/servers/sql/pgpool/default.nix
+2
-2
pkgs/servers/sql/pgpool/default.nix
···
···
+2
-2
pkgs/servers/sql/postgresql/ext/timescaledb.nix
+2
-2
pkgs/servers/sql/postgresql/ext/timescaledb.nix
······
······
+3
-1
pkgs/servers/web-apps/freshrss/default.nix
+3
-1
pkgs/servers/web-apps/freshrss/default.nix
+1
-1
pkgs/servers/web-apps/phylactery/default.nix
+1
-1
pkgs/servers/web-apps/phylactery/default.nix
+6
-3
pkgs/tools/admin/pgadmin/default.nix
+6
-3
pkgs/tools/admin/pgadmin/default.nix
···url = "https://ftp.postgresql.org/pub/pgadmin/pgadmin4/v${version}/source/pgadmin4-${version}.tar.gz";······
···url = "https://ftp.postgresql.org/pub/pgadmin/pgadmin4/v${version}/source/pgadmin4-${version}.tar.gz";······
+2
-6
pkgs/tools/admin/pgadmin/package.json
+2
-6
pkgs/tools/admin/pgadmin/package.json
·········-"pgadmin4-tree": "git+https://github.com/EnterpriseDB/pgadmin4-treeview/#96ceb7f27f43660a804e61d23a76aeb9aa188bb6",-"react-data-grid": "git+https://github.com/EnterpriseDB/react-data-grid.git/#200d2f5e02de694e3e9ffbe177c279bc40240fb8",···-"webcabin-docker": "git+https://github.com/EnterpriseDB/wcDocker/#3df8aac825ee2892f4d824de273b779cc6dbcad8",
·········+"react-data-grid": "git+https://github.com/pgadmin-org/react-data-grid.git/#200d2f5e02de694e3e9ffbe177c279bc40240fb8",···+"webcabin-docker": "git+https://github.com/pgadmin-org/wcdocker/#3df8aac825ee2892f4d824de273b779cc6dbcad8",
+14
-81
pkgs/tools/admin/pgadmin/yarn.lock
+14
-81
pkgs/tools/admin/pgadmin/yarn.lock
···resolved "https://registry.yarnpkg.com/aspen-decorations/-/aspen-decorations-1.1.1.tgz#7d0ca740efab1aa4fd91a1f3db81ac29186607a3"integrity sha512-Ej2tv0Gz3bnhkNCyzzjDeG2V5vd49T30ca0SKywHuLA5RKrZ1NutEyZnUYku4WmUV1/TdpHRiSJ759nbZK4xtQ==···resolved "https://registry.yarnpkg.com/content-type/-/content-type-1.0.4.tgz#e138cc75e040c727b1966fe5e5f8c9aee256fe3b"integrity sha512-hIP3EEPs8tB9AT1L+NUqtwOAps4mk2Zob89MWXMHjHWg9milF/j4osnnQLXBCBFBk/tvIG/tUc9mOUJiPBhPXA==-resolved "https://registry.yarnpkg.com/context-menu/-/context-menu-2.0.0.tgz#565f13210248e3442700e6b1a2d63406f2b08552"-integrity sha512-VQrkvcJDevuq+sde0QADRLOdIRpa4a1ti4knstrPILDLfWU/RB4ZIGpj32Chh/mURjrbi0CoLT1eonr3X86Khg==···resolved "https://registry.yarnpkg.com/jmespath/-/jmespath-0.16.0.tgz#b15b0a85dfd4d930d43e69ed605943c802785076"integrity sha512-9FzQjJ7MATs1tSpnco1K6ayiYE3figslrXA72G2HQ/n76RzvYlofyi5QM+iX4YRs/pu3yzxlVQSST23+dMDknw==resolved "https://registry.yarnpkg.com/jquery-contextmenu/-/jquery-contextmenu-2.9.2.tgz#f9dc362e45871dda2e50fa45de2243e917446ced"integrity sha512-6S6sH/08owDStC/7zNwcN366yR0ydX6PmMB0RnjLRQOp7Nc/rqwEHglshfHrrw2kdTev97GXwRXrayDUmToIOw==-resolved "https://registry.yarnpkg.com/jquery-ui/-/jquery-ui-1.13.2.tgz#de03580ae6604773602f8d786ad1abfb75232034"-integrity sha512-wBZPnqWs5GaYJmo1Jj0k/mrSkzdQzKDwhXNtHKcBdAcKVxMM3KNYFq+iJ2i1rwiG53Z8M4mTn3Qxrm17uH1D4Q==-"jquery@>=1.7.1 <4.0.0", "jquery@>=1.8.0 <4.0.0", jquery@^3.3.1, jquery@^3.5.0, jquery@^3.6.0:resolved "https://registry.yarnpkg.com/jquery/-/jquery-3.6.1.tgz#fab0408f8b45fc19f956205773b62b292c147a16"integrity sha512-opJeO4nCucVnsjiXOE+/PcCgYw9Gwpvs/a6B1LL/lQhwWwpbVEVYDZ1FokFr8PRc7ghYlrFPuyHuiiDNTQxmcw==···integrity sha512-Bdboy+l7tA3OGW6FjyFHWkP5LuByj1Tk33Ljyq0axyzdk9//JSi2u3fP1QSmd1KNwq6VOKYGlAu87CisVir6Pw==-resolved "https://registry.yarnpkg.com/json5/-/json5-1.0.1.tgz#779fb0018604fa854eacbf6252180d83543e3dbe"-integrity sha512-aKS4WQjPenRxiQsC93MNfjx+nbF4PAdYzmd/1JIj8HYzqfbu86beTuNgXDzPknWk0n0uARlyewZo4s++ES36Ow==-resolved "https://registry.yarnpkg.com/json5/-/json5-2.2.1.tgz#655d50ed1e6f95ad1a3caababd2b0efda10b395c"-integrity sha512-1hqLFMSrGHRHxav9q9gNjJ5EXznIxGVO09xQRrwplcS8qs28pZ8s8hupZAmqDwZUmVZ2Qb2jnyPOWcDH8m8dlA==···resolved "https://registry.yarnpkg.com/performance-now/-/performance-now-2.1.0.tgz#6309f4e0e5fa913ec1c69307ae364b4b377c9e7b"integrity sha512-7EAHlyLHI56VEIdK57uwHdHKIaAGbnXPiw0yWbarQZOKaKpvUIgW0jWRVLiatnM+XXlSwsanIBH/hzGMJulMow==-"pgadmin4-tree@git+https://github.com/EnterpriseDB/pgadmin4-treeview/#96ceb7f27f43660a804e61d23a76aeb9aa188bb6":-resolved "git+https://github.com/EnterpriseDB/pgadmin4-treeview/#96ceb7f27f43660a804e61d23a76aeb9aa188bb6"resolved "https://registry.yarnpkg.com/picocolors/-/picocolors-1.0.0.tgz#cb5bdc74ff3f51892236eaf79d68bc44564ab81c"···resolved "https://registry.yarnpkg.com/react-aspen/-/react-aspen-1.2.0.tgz#375fa82a8db627542fc8b9e6e421baa49a65ab95"integrity sha512-w+vUn4ScCzcxDB5xEsKIuIkUnySEQXlp/zqPFChWEpYG12mPO7h7z/LWuK2QXUoDbIP96Fcf1+UAI9I/cstPqg==···-"react-data-grid@git+https://github.com/EnterpriseDB/react-data-grid.git/#200d2f5e02de694e3e9ffbe177c279bc40240fb8":-resolved "git+https://github.com/EnterpriseDB/react-data-grid.git/#200d2f5e02de694e3e9ffbe177c279bc40240fb8"···-resolved "https://registry.yarnpkg.com/react-dom/-/react-dom-16.14.0.tgz#7ad838ec29a777fb3c75c3a190f661cf92ab8b89"-integrity sha512-1gCeQXDLoIqMgqD3IO2Ah9bnf0w9kzhwN5q4FGnHZ67hBm9yePzB5JJAIQCc8x3pFnNlwFq4RidZggNAAkzWWw==···-resolved "https://registry.yarnpkg.com/react/-/react-16.14.0.tgz#94d776ddd0aaa37da3eda8fc5b6b18a4c9a3114d"-integrity sha512-0X2CImDkJGApiAlcf0ODKIneSwBPhqJawOa5wCtKbu7ZECrmS26NvtSILynQ66cgkT/RJ4LidJOc3bUESwmU8g==resolved "https://registry.yarnpkg.com/react/-/react-17.0.2.tgz#d0b5cc516d29eb3eee383f75b62864cfb6800037"···resolved "https://registry.yarnpkg.com/sax/-/sax-1.2.4.tgz#2816234e2378bddc4e5354fab5caa895df7100d9"integrity sha512-NqVDv9TpANUjFm0N8uM5GxL36UgKi9/atZw+x7YFnQ8ckwFGKrl4xX4yWtrey3UJm5nP1kUbnYgLopqWNSRhWw==-resolved "https://registry.yarnpkg.com/scheduler/-/scheduler-0.19.1.tgz#4f3e2ed2c1a7d65681f4c854fa8c5a1ccb40f196"-integrity sha512-n/zwRWRYSUj0/3g/otKDRPMh6qv2SYMWNq85IEa8iZyAv8od9zDYpGSnpBEjNgcMNq6Scbu5KfIPxNF72R/2EA==···-resolved "https://registry.yarnpkg.com/tiny-emitter/-/tiny-emitter-2.1.0.tgz#1d1a56edfc51c43e863cbb5382a72330e3555423"-integrity sha512-NB6Dk1A9xgQPMoGqC5CVXn123gWyte215ONT5Pp5a0yt4nlEoO1ZWeCwpncaekPHXO60i47ihFnZPiRPjRMq4Q==resolved "https://registry.yarnpkg.com/tiny-warning/-/tiny-warning-1.0.3.tgz#94a30db453df4c643d0fd566060d60a875d84754"···-"webcabin-docker@git+https://github.com/EnterpriseDB/wcDocker/#3df8aac825ee2892f4d824de273b779cc6dbcad8":-resolved "git+https://github.com/EnterpriseDB/wcDocker/#3df8aac825ee2892f4d824de273b779cc6dbcad8"
···resolved "https://registry.yarnpkg.com/aspen-decorations/-/aspen-decorations-1.1.1.tgz#7d0ca740efab1aa4fd91a1f3db81ac29186607a3"integrity sha512-Ej2tv0Gz3bnhkNCyzzjDeG2V5vd49T30ca0SKywHuLA5RKrZ1NutEyZnUYku4WmUV1/TdpHRiSJ759nbZK4xtQ==···resolved "https://registry.yarnpkg.com/content-type/-/content-type-1.0.4.tgz#e138cc75e040c727b1966fe5e5f8c9aee256fe3b"integrity sha512-hIP3EEPs8tB9AT1L+NUqtwOAps4mk2Zob89MWXMHjHWg9milF/j4osnnQLXBCBFBk/tvIG/tUc9mOUJiPBhPXA==···resolved "https://registry.yarnpkg.com/jmespath/-/jmespath-0.16.0.tgz#b15b0a85dfd4d930d43e69ed605943c802785076"integrity sha512-9FzQjJ7MATs1tSpnco1K6ayiYE3figslrXA72G2HQ/n76RzvYlofyi5QM+iX4YRs/pu3yzxlVQSST23+dMDknw==resolved "https://registry.yarnpkg.com/jquery-contextmenu/-/jquery-contextmenu-2.9.2.tgz#f9dc362e45871dda2e50fa45de2243e917446ced"integrity sha512-6S6sH/08owDStC/7zNwcN366yR0ydX6PmMB0RnjLRQOp7Nc/rqwEHglshfHrrw2kdTev97GXwRXrayDUmToIOw==resolved "https://registry.yarnpkg.com/jquery/-/jquery-3.6.1.tgz#fab0408f8b45fc19f956205773b62b292c147a16"integrity sha512-opJeO4nCucVnsjiXOE+/PcCgYw9Gwpvs/a6B1LL/lQhwWwpbVEVYDZ1FokFr8PRc7ghYlrFPuyHuiiDNTQxmcw==···integrity sha512-Bdboy+l7tA3OGW6FjyFHWkP5LuByj1Tk33Ljyq0axyzdk9//JSi2u3fP1QSmd1KNwq6VOKYGlAu87CisVir6Pw==+resolved "https://registry.yarnpkg.com/json5/-/json5-1.0.2.tgz#63d98d60f21b313b77c4d6da18bfa69d80e1d593"+integrity sha512-g1MWMLBiz8FKi1e4w0UyVL3w+iJceWAFBAaBnnGKOpNa5f8TLktkbre1+s6oICydWAm+HRUGTmI+//xv2hvXYA==+resolved "https://registry.yarnpkg.com/json5/-/json5-2.2.3.tgz#78cd6f1a19bdc12b73db5ad0c61efd66c1e29283"+integrity "sha1-eM1vGhm9wStz21rQxh79ZsHikoM= sha512-XmOWe7eyHYH14cLdVPoyg+GOH3rYX++KpzrylJwSW98t3Nk+U8XOl8FWKOgwtzdb8lXGf6zYwDUzeHMWfxasyg=="···resolved "https://registry.yarnpkg.com/performance-now/-/performance-now-2.1.0.tgz#6309f4e0e5fa913ec1c69307ae364b4b377c9e7b"integrity sha512-7EAHlyLHI56VEIdK57uwHdHKIaAGbnXPiw0yWbarQZOKaKpvUIgW0jWRVLiatnM+XXlSwsanIBH/hzGMJulMow==resolved "https://registry.yarnpkg.com/picocolors/-/picocolors-1.0.0.tgz#cb5bdc74ff3f51892236eaf79d68bc44564ab81c"···resolved "https://registry.yarnpkg.com/react-aspen/-/react-aspen-1.2.0.tgz#375fa82a8db627542fc8b9e6e421baa49a65ab95"integrity sha512-w+vUn4ScCzcxDB5xEsKIuIkUnySEQXlp/zqPFChWEpYG12mPO7h7z/LWuK2QXUoDbIP96Fcf1+UAI9I/cstPqg==···+"react-data-grid@git+https://github.com/pgadmin-org/react-data-grid.git/#200d2f5e02de694e3e9ffbe177c279bc40240fb8":+resolved "git+https://github.com/pgadmin-org/react-data-grid.git/#200d2f5e02de694e3e9ffbe177c279bc40240fb8"······resolved "https://registry.yarnpkg.com/react/-/react-17.0.2.tgz#d0b5cc516d29eb3eee383f75b62864cfb6800037"···resolved "https://registry.yarnpkg.com/sax/-/sax-1.2.4.tgz#2816234e2378bddc4e5354fab5caa895df7100d9"integrity sha512-NqVDv9TpANUjFm0N8uM5GxL36UgKi9/atZw+x7YFnQ8ckwFGKrl4xX4yWtrey3UJm5nP1kUbnYgLopqWNSRhWw==···resolved "https://registry.yarnpkg.com/tiny-warning/-/tiny-warning-1.0.3.tgz#94a30db453df4c643d0fd566060d60a875d84754"···+"webcabin-docker@git+https://github.com/pgadmin-org/wcdocker/#3df8aac825ee2892f4d824de273b779cc6dbcad8":+resolved "git+https://github.com/pgadmin-org/wcdocker/#3df8aac825ee2892f4d824de273b779cc6dbcad8"
+29
-97
pkgs/tools/admin/pgadmin/yarn.nix
+29
-97
pkgs/tools/admin/pgadmin/yarn.nix
···-sha512 = "VQrkvcJDevuq+sde0QADRLOdIRpa4a1ti4knstrPILDLfWU/RB4ZIGpj32Chh/mURjrbi0CoLT1eonr3X86Khg==";···-sha512 = "wBZPnqWs5GaYJmo1Jj0k/mrSkzdQzKDwhXNtHKcBdAcKVxMM3KNYFq+iJ2i1rwiG53Z8M4mTn3Qxrm17uH1D4Q==";···-sha512 = "aKS4WQjPenRxiQsC93MNfjx+nbF4PAdYzmd/1JIj8HYzqfbu86beTuNgXDzPknWk0n0uARlyewZo4s++ES36Ow==";-sha512 = "1hqLFMSrGHRHxav9q9gNjJ5EXznIxGVO09xQRrwplcS8qs28pZ8s8hupZAmqDwZUmVZ2Qb2jnyPOWcDH8m8dlA==";·········sha512 = "QeoM/i73HHu2XF9aKksIUuamHPDvRglEwdHL4jsp784BgUuWcg6mzfxT0QDdQz8Wj0qyRKx2eMg8iZtWvU4E2Q==";-sha512 = "1gCeQXDLoIqMgqD3IO2Ah9bnf0w9kzhwN5q4FGnHZ67hBm9yePzB5JJAIQCc8x3pFnNlwFq4RidZggNAAkzWWw==";···sha512 = "D4IiBeRtGXziZ1n0XklnFGu7h9gU684zepqyKzgPNzrsrk7xOCxni+TCckjg2Nr/DiaEEGVVmnhYSlT2rB47dQ==";-sha512 = "0X2CImDkJGApiAlcf0ODKIneSwBPhqJawOa5wCtKbu7ZECrmS26NvtSILynQ66cgkT/RJ4LidJOc3bUESwmU8g==";···sha512 = "NqVDv9TpANUjFm0N8uM5GxL36UgKi9/atZw+x7YFnQ8ckwFGKrl4xX4yWtrey3UJm5nP1kUbnYgLopqWNSRhWw==";-sha512 = "n/zwRWRYSUj0/3g/otKDRPMh6qv2SYMWNq85IEa8iZyAv8od9zDYpGSnpBEjNgcMNq6Scbu5KfIPxNF72R/2EA==";···-sha512 = "NB6Dk1A9xgQPMoGqC5CVXn123gWyte215ONT5Pp5a0yt4nlEoO1ZWeCwpncaekPHXO60i47ihFnZPiRPjRMq4Q==";···
·········+sha512 = "g1MWMLBiz8FKi1e4w0UyVL3w+iJceWAFBAaBnnGKOpNa5f8TLktkbre1+s6oICydWAm+HRUGTmI+//xv2hvXYA==";+sha512 = "XmOWe7eyHYH14cLdVPoyg+GOH3rYX++KpzrylJwSW98t3Nk+U8XOl8FWKOgwtzdb8lXGf6zYwDUzeHMWfxasyg==";·········sha512 = "QeoM/i73HHu2XF9aKksIUuamHPDvRglEwdHL4jsp784BgUuWcg6mzfxT0QDdQz8Wj0qyRKx2eMg8iZtWvU4E2Q==";···sha512 = "D4IiBeRtGXziZ1n0XklnFGu7h9gU684zepqyKzgPNzrsrk7xOCxni+TCckjg2Nr/DiaEEGVVmnhYSlT2rB47dQ==";···sha512 = "NqVDv9TpANUjFm0N8uM5GxL36UgKi9/atZw+x7YFnQ8ckwFGKrl4xX4yWtrey3UJm5nP1kUbnYgLopqWNSRhWw==";······
+3
-3
pkgs/tools/misc/dua/default.nix
+3
-3
pkgs/tools/misc/dua/default.nix
·········
·········
+2
-1
pkgs/tools/misc/ldapvi/default.nix
+2
-1
pkgs/tools/misc/ldapvi/default.nix
···
···
+1
-1
pkgs/tools/misc/lnch/default.nix
+1
-1
pkgs/tools/misc/lnch/default.nix
+1
-1
pkgs/tools/misc/rlwrap/default.nix
+1
-1
pkgs/tools/misc/rlwrap/default.nix
+2
-2
pkgs/tools/misc/tbls/default.nix
+2
-2
pkgs/tools/misc/tbls/default.nix
···
···
+11
-22
pkgs/tools/networking/mozillavpn/default.nix
+11
-22
pkgs/tools/networking/mozillavpn/default.nix
······-url = "https://github.com/mozilla-mobile/mozilla-vpn-client/pull/5236/commits/6fdc689001619a06b752fa629647642ea66f4e26.patch";·········
···············+substituteInPlace src/apps/vpn/platforms/linux/daemon/org.mozilla.vpn.dbus.service --replace /usr/bin/mozillavpn "$out/bin/mozillavpn"
+5
-1
pkgs/tools/networking/nebula/default.nix
+5
-1
pkgs/tools/networking/nebula/default.nix
······description = "A scalable overlay networking tool with a focus on performance, simplicity and security";
······description = "A scalable overlay networking tool with a focus on performance, simplicity and security";
+2
-2
pkgs/tools/networking/ssldump/default.nix
+2
-2
pkgs/tools/networking/ssldump/default.nix
+2
-2
pkgs/tools/system/stress-ng/default.nix
+2
-2
pkgs/tools/system/stress-ng/default.nix
+64
pkgs/tools/typesetting/tex/advi/default.nix
+64
pkgs/tools/typesetting/tex/advi/default.nix
···
···+description = "Active-DVI is a Unix-platform DVI previewer and a programmable presenter for slides written in LaTeX.";
+19
-5
pkgs/top-level/all-packages.nix
+19
-5
pkgs/top-level/all-packages.nix
·································
·································
+4
pkgs/top-level/darwin-packages.nix
+4
pkgs/top-level/darwin-packages.nix
···
+8
pkgs/top-level/python-packages.nix
+8
pkgs/top-level/python-packages.nix
············sphinxcontrib-websupport = callPackage ../development/python-modules/sphinxcontrib-websupport { };
············sphinxcontrib-websupport = callPackage ../development/python-modules/sphinxcontrib-websupport { };+sphinxcontrib-youtube = callPackage ../development/python-modules/sphinxcontrib-youtube { };