+10
lib/licenses.nix
+10
lib/licenses.nix
···
+12
maintainers/maintainer-list.nix
+12
maintainers/maintainer-list.nix
······
+87
-12
nixos/doc/manual/from_md/release-notes/rl-2305.section.xml
+87
-12
nixos/doc/manual/from_md/release-notes/rl-2305.section.xml
·········+<link xlink:href="https://www.defined.net/blog/announcing-relay-support-in-nebula/">announcement</link>
+15
-1
nixos/doc/manual/release-notes/rl-2305.section.md
+15
-1
nixos/doc/manual/release-notes/rl-2305.section.md
···- The [services.wordpress.sites.<name>.plugins](#opt-services.wordpress.sites._name_.plugins) and [services.wordpress.sites.<name>.themes](#opt-services.wordpress.sites._name_.themes) options have been converted from sets to attribute sets to allow for consumers to specify explicit install paths via attribute name.+- Nebula now runs as a system user and group created for each nebula network, using the `CAP_NET_ADMIN` ambient capability on launch rather than starting as root. Ensure that any files each Nebula instance needs to access are owned by the correct user and group, by default `nebula-${networkName}`.- In `mastodon` it is now necessary to specify location of file with `PostgreSQL` database password. In `services.mastodon.database.passwordFile` parameter default value `/var/lib/mastodon/secrets/db-password` has been changed to `null`.- The `--target-host` and `--build-host` options of `nixos-rebuild` no longer treat the `localhost` value specially – to build on/deploy to local machine, omit the relevant flag.···- The module `usbmuxd` now has the ability to change the package used by the daemon. In case you're experiencing issues with `usbmuxd` you can try an alternative program like `usbmuxd2`. Available as [services.usbmuxd.package](#opt-services.usbmuxd.package)-- A few openssh options have been moved from extraConfig to the new freeform option `settings` and renamed as follow: `services.openssh.kbdInteractiveAuthentication` to `services.openssh.settings.KbdInteractiveAuthentication`, `services.openssh.passwordAuthentication` to `services.openssh.settings.PasswordAuthentication`, `services.openssh.useDns` to `services.openssh.settings.UseDns`, `services.openssh.permitRootLogin` to `services.openssh.settings.PermitRootLogin`, `services.openssh.logLevel` to `services.openssh.settings.LogLevel`.+- A few openssh options have been moved from extraConfig to the new freeform option `settings` and renamed as follows:+- `services.openssh.kbdInteractiveAuthentication` -> `services.openssh.settings.KbdInteractiveAuthentication`+- `services.openssh.passwordAuthentication` to `services.openssh.settings.PasswordAuthentication`- `services.mastodon` gained a tootctl wrapped named `mastodon-tootctl` similar to `nextcloud-occ` which can be executed from any user and switches to the configured mastodon user with sudo and sources the environment variables.···- [Garage](https://garagehq.deuxfleurs.fr/) version is based on [system.stateVersion](options.html#opt-system.stateVersion), existing installations will keep using version 0.7. New installations will use version 0.8. In order to upgrade a Garage cluster, please follow [upstream instructions](https://garagehq.deuxfleurs.fr/documentation/cookbook/upgrading/) and force [services.garage.package](options.html#opt-services.garage.package) or upgrade accordingly [system.stateVersion](options.html#opt-system.stateVersion).+- Nebula now supports the `services.nebula.networks.<name>.isRelay` and `services.nebula.networks.<name>.relays` configuration options for setting up or allowing traffic relaying. See the [announcement](https://www.defined.net/blog/announcing-relay-support-in-nebula/) for more details about relays.
+1
nixos/modules/module-list.nix
+1
nixos/modules/module-list.nix
···
+1
-1
nixos/modules/programs/ssh.nix
+1
-1
nixos/modules/programs/ssh.nix
···-mkDefault (config.services.xserver.enable || config.programs.ssh.forwardX11 || config.services.openssh.forwardX11);+mkDefault (config.services.xserver.enable || config.programs.ssh.forwardX11 || config.services.openssh.settings.X11Forwarding);
+1
-1
nixos/modules/services/computing/slurm/slurm.nix
+1
-1
nixos/modules/services/computing/slurm/slurm.nix
···
+231
nixos/modules/services/monitoring/cockpit.nix
+231
nixos/modules/services/monitoring/cockpit.nix
···+See the [documentation](https://cockpit-project.org/guide/latest/cockpit.conf.5.html), that is also available with `man cockpit.conf.5` for details.+environment.etc."cockpit/cockpit.conf".source = settingsFormat.generate "cockpit.conf" cfg.settings;+requires = [ "cockpit.socket" "cockpit-wsinstance-http.socket" "cockpit-wsinstance-https-factory.socket" ];+# See https://www.freedesktop.org/software/systemd/man/systemd.service.html#ExecStart= for details+# - As cockpit.socket is disabled by default, /run/cockpit/motd points to /run/cockpit/inactive.motd+"C /run/cockpit/inactive.motd 0640 root root - ${cfg.package}/share/cockpit/motd/inactive.motd"
+53
-18
nixos/modules/services/networking/nebula.nix
+53
-18
nixos/modules/services/networking/nebula.nix
···List of IPs of lighthouse hosts this node should report to and query from. This should be empty on lighthouse······unitConfig.StartLimitIntervalSec = 0; # ensure Restart=always is always honoured (networks can go down for arbitrarily long)······
+79
-89
nixos/modules/services/networking/ssh/sshd.nix
+79
-89
nixos/modules/services/networking/ssh/sshd.nix
······(mkRenamedOptionModule [ "services" "openssh" "useDns" ] [ "services" "openssh" "settings" "UseDns" ])(mkRenamedOptionModule [ "services" "openssh" "permitRootLogin" ] [ "services" "openssh" "settings" "PermitRootLogin" ])(mkRenamedOptionModule [ "services" "openssh" "logLevel" ] [ "services" "openssh" "settings" "LogLevel" ])+(mkRenamedOptionModule [ "services" "openssh" "macs" ] [ "services" "openssh" "settings" "Macs" ])+(mkRenamedOptionModule [ "services" "openssh" "cyphers" ] [ "services" "openssh" "settings" "Cyphers" ])+(mkRenamedOptionModule [ "services" "openssh" "kexAlgorithms" ] [ "services" "openssh" "settings" "KexAlgorithms" ])+(mkRenamedOptionModule [ "services" "openssh" "gatewayPorts" ] [ "services" "openssh" "settings" "GatewayPorts" ])+(mkRenamedOptionModule [ "services" "openssh" "forwardX11" ] [ "services" "openssh" "settings" "X11Forwarding" ])·····················+assertions = [{ assertion = if cfg.settings.X11Forwarding then cfgc.setXAuthLocation else true;
+1
-1
nixos/modules/services/search/meilisearch.nix
+1
-1
nixos/modules/services/search/meilisearch.nix
···
+2
-2
nixos/modules/services/security/privacyidea.nix
+2
-2
nixos/modules/services/security/privacyidea.nix
······
+2
-1
nixos/modules/services/web-servers/nginx/default.nix
+2
-1
nixos/modules/services/web-servers/nginx/default.nix
···+# don't let clients close the keep-alive connection to upstream. See the nginx blog for details:
+1
nixos/tests/all-tests.nix
+1
nixos/tests/all-tests.nix
···
+135
nixos/tests/cockpit.nix
+135
nixos/tests/cockpit.nix
···
+1
-1
nixos/tests/cups-pdf.nix
+1
-1
nixos/tests/cups-pdf.nix
+143
-58
nixos/tests/nebula.nix
+143
-58
nixos/tests/nebula.nix
·································# From what I can tell, StrictHostKeyChecking=no is necessary for ssh to work between machines.···-'nebula-cert sign -ca-crt /etc/nebula/ca.crt -ca-key /etc/nebula/ca.key -name "${name}" -groups "${name}" -ip "${ip}" -in-pub /tmp/${name}.pub -out-crt /tmp/${name}.crt',+'nebula-cert sign -ca-crt /etc/nebula/ca.crt -ca-key /etc/nebula/ca.key -name "${name}" -groups "${name}" -ip "${ip}" -in-pub /root/${name}.pub -out-crt /root/${name}.crt'+${node}.succeed("ip --brief addr show eth1 | awk '{print $3}' | tail -n1 | cut -d/ -f1").strip()'nebula-cert ca -name "Smoke Test" -out-crt /etc/nebula/ca.crt -out-key /etc/nebula/ca.key','nebula-cert sign -ca-crt /etc/nebula/ca.crt -ca-key /etc/nebula/ca.key -name "lighthouse" -groups "lighthouse" -ip "10.0.100.1/24" -out-crt /etc/nebula/lighthouse.crt -out-key /etc/nebula/lighthouse.key',···+# allowAny can ping the lighthouse, but not allowFromLighthouse because of its inbound firewall+# block allowFromLighthouse <-> allowAny, and allowFromLighthouse -> allowAny should still work.+# block allowAny <-> allowFromLighthouse, and allowAny -> allowFromLighthouse should still work.+# block lighthouse <-> allowFromLighthouse and allowAny <-> allowFromLighthouse; allowFromLighthouse won't get to allowAny+# block lighthouse <-> allowAny, allowAny <-> allowFromLighthouse, and allowAny <-> allowToLighthouse; it won't get to allowFromLighthouse or allowToLighthouse+# block lighthouse <-> allowToLighthouse and allowToLighthouse <-> allowAny; it won't get to allowAny
+107
-101
nixos/tests/pgadmin4.nix
+107
-101
nixos/tests/pgadmin4.nix
······-&& sed -i 's|/opt/PostgreSQL/9.4/bin/|${pkgs.postgresql}/bin|' web/regression/test_config.json \-&& sed -i 's|\"headless_chrome\": false|\"headless_chrome\": true|' web/regression/test_config.json"+# also ensure Server Mode is set to false, which will automatically exclude some unnecessary tests.+# see https://github.com/pgadmin-org/pgadmin4/blob/fd1c26408bbf154fa455a49ee5c12895933833a3/web/regression/runtests.py#L217-L226+&& sed -i 's|/opt/PostgreSQL/9.4/bin/|${pkgs.postgresql}/bin|' web/regression/test_config.json \+&& sed -i 's|\"headless_chrome\": false|\"headless_chrome\": true|' web/regression/test_config.json \+&& sed -i 's|builtins.SERVER_MODE = None|builtins.SERVER_MODE = False|' web/regression/runtests.py"-# see https://stackoverflow.com/questions/50642308/webdriverexception-unknown-error-devtoolsactiveport-file-doesnt-exist-while-t#50642913-&& sed -i '\|options.add_argument(\"--disable-infobars\")|a \ \ \ \ \ \ \ \ options.binary_location = \"${pkgs.chromium}/bin/chromium\"' web/regression/runtests.py \-&& sed -i '\|options.add_argument(\"--no-sandbox\")|a \ \ \ \ \ \ \ \ options.add_argument(\"--headless\")' web/regression/runtests.py \-&& sed -i '\|options.add_argument(\"--disable-infobars\")|a \ \ \ \ \ \ \ \ options.add_argument(\"--disable-dev-shm-usage\")' web/regression/runtests.py \-&& sed -i 's|(chrome_options=options)|(executable_path=\"${pkgs.chromedriver}/bin/chromedriver\", chrome_options=options)|' web/regression/runtests.py \+# see https://stackoverflow.com/questions/50642308/webdriverexception-unknown-error-devtoolsactiveport-file-doesnt-exist-while-t#50642913+&& sed -i '\|options.add_argument(\"--disable-infobars\")|a \ \ \ \ \ \ \ \ options.binary_location = \"${pkgs.chromium}/bin/chromium\"' web/regression/runtests.py \+&& sed -i '\|options.add_argument(\"--no-sandbox\")|a \ \ \ \ \ \ \ \ options.add_argument(\"--headless\")' web/regression/runtests.py \+&& sed -i '\|options.add_argument(\"--disable-infobars\")|a \ \ \ \ \ \ \ \ options.add_argument(\"--disable-dev-shm-usage\")' web/regression/runtests.py \+&& sed -i 's|(chrome_options=options)|(executable_path=\"${pkgs.chromedriver}/bin/chromedriver\", chrome_options=options)|' web/regression/runtests.py \---exclude browser.tests.test_ldap_login.LDAPLoginTestCase,browser.tests.test_ldap_login,browser.tests.test_kerberos_with_mocking'+&& sed -i \'s|builtins.SERVER_MODE = False|builtins.SERVER_MODE = True|\' regression/runtests.py \
-1
pkgs/applications/audio/amarok/default.nix
-1
pkgs/applications/audio/amarok/default.nix
···, karchive, kcmutils, kconfig, kdnssd, kguiaddons, kinit, kirigami2, knewstuff, knotifyconfig, ktexteditor, kwindowsystem, curl, ffmpeg, gdk-pixbuf, libaio, liblastfm, libmtp, loudmouth, lzo, lz4, mariadb-embedded, pcre, snappy, taglib, taglib_extras
+1
-1
pkgs/applications/editors/vim/plugins/overrides.nix
+1
-1
pkgs/applications/editors/vim/plugins/overrides.nix
+6
-4
pkgs/applications/misc/iptsd/default.nix
+6
-4
pkgs/applications/misc/iptsd/default.nix
······
+13
-13
pkgs/applications/misc/pdfsam-basic/default.nix
+13
-13
pkgs/applications/misc/pdfsam-basic/default.nix
···url = "https://github.com/torakiki/pdfsam/releases/download/v${version}/pdfsam_${version}-1_amd64.deb";······-description = "Multi-platform software designed to extract pages, split, merge, mix and rotate PDF files";+description = "Multi-platform software designed to extract pages, split, merge, mix and rotate PDF files";
+76
-15
pkgs/applications/misc/privacyidea/default.nix
+76
-15
pkgs/applications/misc/privacyidea/default.nix
······# Taken from by https://github.com/NixOS/nixpkgs/pull/173090/commits/d2c0c7eb4cc91beb0a1adbaf13abc0a526a21708···+url = "https://github.com/mkrizek/jinja/commit/bd8bad37d1c0e2d8995a44fd88e234f5340afec5.patch";······-url = "https://github.com/privacyidea/privacyidea/commit/0e28f36c0b3291a361669f4a3a77c294f4564475.patch";···
+7
-6
pkgs/applications/misc/watchmate/default.nix
+7
-6
pkgs/applications/misc/watchmate/default.nix
·········
+2
-2
pkgs/applications/misc/xchm/default.nix
+2
-2
pkgs/applications/misc/xchm/default.nix
···
+7
-1
pkgs/applications/networking/browsers/chromium/common.nix
+7
-1
pkgs/applications/networking/browsers/chromium/common.nix
······# Optional patch to use SOURCE_DATE_EPOCH in compute_build_timestamp.py (should be upstreamed):···
+6
-6
pkgs/applications/networking/browsers/chromium/upstream-info.json
+6
-6
pkgs/applications/networking/browsers/chromium/upstream-info.json
······
+2
-2
pkgs/applications/networking/browsers/lagrange/default.nix
+2
-2
pkgs/applications/networking/browsers/lagrange/default.nix
···
+5
-5
pkgs/applications/networking/browsers/librewolf/src.json
+5
-5
pkgs/applications/networking/browsers/librewolf/src.json
···-"sha512": "9e2b6e20353e414da3d2eb9dcd3d77757664a98a4438a8e84f19a1c7c203e40136b08bf96a458fac05ddc627347217d32f1f6337980c5ca918874993657a58e7"+"sha512": "58b21449a16a794152888f50e7fe9488c28739a7e067729acdc1de9f2e8384e6316cffdfe89f690f0d211189668d940825b4f8a26b8100468ae120772df99d72"
+33
pkgs/applications/networking/cluster/pv-migrate/default.nix
+33
pkgs/applications/networking/cluster/pv-migrate/default.nix
···
+2
-2
pkgs/applications/networking/cluster/terraform-providers/providers.json
+2
-2
pkgs/applications/networking/cluster/terraform-providers/providers.json
···
+2
-2
pkgs/applications/office/portfolio/default.nix
+2
-2
pkgs/applications/office/portfolio/default.nix
···url = "https://github.com/buchen/portfolio/releases/download/${version}/PortfolioPerformance-${version}-linux.gtk.x86_64.tar.gz";
+23
pkgs/applications/office/rime-cli/default.nix
+23
pkgs/applications/office/rime-cli/default.nix
···
+2
-2
pkgs/applications/science/biology/stacks/default.nix
+2
-2
pkgs/applications/science/biology/stacks/default.nix
···
+43
pkgs/applications/science/chemistry/mopac/default.nix
+43
pkgs/applications/science/chemistry/mopac/default.nix
···
+41
pkgs/applications/science/chemistry/wxmacmolplt/default.nix
+41
pkgs/applications/science/chemistry/wxmacmolplt/default.nix
···
+1
-1
pkgs/applications/science/logic/coq/default.nix
+1
-1
pkgs/applications/science/logic/coq/default.nix
···
+2
-2
pkgs/applications/virtualization/conmon/default.nix
+2
-2
pkgs/applications/virtualization/conmon/default.nix
···
+5
pkgs/build-support/go/module.nix
+5
pkgs/build-support/go/module.nix
+1
-1
pkgs/data/fonts/iosevka/bin.nix
+1
-1
pkgs/data/fonts/iosevka/bin.nix
···
+92
-92
pkgs/data/fonts/iosevka/variants.nix
+92
-92
pkgs/data/fonts/iosevka/variants.nix
···
+44
pkgs/data/themes/breath-theme/default.nix
+44
pkgs/data/themes/breath-theme/default.nix
···
+5
-11
pkgs/development/interpreters/wasmtime/default.nix
+5
-11
pkgs/development/interpreters/wasmtime/default.nix
······
+14
pkgs/development/libraries/apr/cross-assume-dev-zero-mmappable.patch
+14
pkgs/development/libraries/apr/cross-assume-dev-zero-mmappable.patch
···
+3
-26
pkgs/development/libraries/apr/default.nix
+3
-26
pkgs/development/libraries/apr/default.nix
···-# Cross fix. Patch the /dev/zero mmapable detection logic. https://bugs.gentoo.org/show_bug.cgi?id=830833
+3
-3
pkgs/development/libraries/sealcurses/default.nix
+3
-3
pkgs/development/libraries/sealcurses/default.nix
···
+2
-2
pkgs/development/libraries/the-foundation/default.nix
+2
-2
pkgs/development/libraries/the-foundation/default.nix
···
+56
pkgs/development/python-modules/bambi/default.nix
+56
pkgs/development/python-modules/bambi/default.nix
···
+38
pkgs/development/python-modules/bencode-py/default.nix
+38
pkgs/development/python-modules/bencode-py/default.nix
···
+4
-4
pkgs/development/python-modules/cmsis-pack-manager/default.nix
+4
-4
pkgs/development/python-modules/cmsis-pack-manager/default.nix
······
+43
pkgs/development/python-modules/formulae/default.nix
+43
pkgs/development/python-modules/formulae/default.nix
···
+7
-8
pkgs/development/python-modules/humanize/default.nix
+7
-8
pkgs/development/python-modules/humanize/default.nix
······
+3
-3
pkgs/development/python-modules/piccata/default.nix
+3
-3
pkgs/development/python-modules/piccata/default.nix
···
+36
pkgs/development/python-modules/sphinxcontrib-youtube/default.nix
+36
pkgs/development/python-modules/sphinxcontrib-youtube/default.nix
···
+1
-1
pkgs/development/tools/analysis/evmdis/default.nix
+1
-1
pkgs/development/tools/analysis/evmdis/default.nix
+2
-2
pkgs/development/tools/analysis/include-what-you-use/default.nix
+2
-2
pkgs/development/tools/analysis/include-what-you-use/default.nix
···
+3
-3
pkgs/development/tools/buildah/default.nix
+3
-3
pkgs/development/tools/buildah/default.nix
···
+3
-3
pkgs/development/tools/geckodriver/default.nix
+3
-3
pkgs/development/tools/geckodriver/default.nix
···
+3
-3
pkgs/development/tools/ruff/default.nix
+3
-3
pkgs/development/tools/ruff/default.nix
···
+1
-1
pkgs/development/tools/statik/default.nix
+1
-1
pkgs/development/tools/statik/default.nix
+24
pkgs/development/tools/yamlfmt/default.nix
+24
pkgs/development/tools/yamlfmt/default.nix
···
+10
-5
pkgs/misc/frescobaldi/default.nix
+10
-5
pkgs/misc/frescobaldi/default.nix
······
+7
-5
pkgs/misc/logging/beats/7.x.nix
+7
-5
pkgs/misc/logging/beats/7.x.nix
······
+36
pkgs/os-specific/darwin/openwith/default.nix
+36
pkgs/os-specific/darwin/openwith/default.nix
···+description = "Utility to specify which application bundle should open specific file extensions";
+4
-4
pkgs/os-specific/linux/kernel/zen-kernels.nix
+4
-4
pkgs/os-specific/linux/kernel/zen-kernels.nix
···
+2
-2
pkgs/os-specific/linux/trace-cmd/kernelshark.nix
+2
-2
pkgs/os-specific/linux/trace-cmd/kernelshark.nix
···
+4
-2
pkgs/servers/geospatial/mapcache/default.nix
+4
-2
pkgs/servers/geospatial/mapcache/default.nix
······
+226
pkgs/servers/monitoring/cockpit/default.nix
+226
pkgs/servers/monitoring/cockpit/default.nix
···+--replace 'devel@lists.cockpit-project.org' 'https://github.com/NixOS/nixpkgs/issues/new?assignees=&labels=0.kind%3A+bug&template=bug_report.md&title=cockpit%25'
+34
pkgs/servers/monitoring/cockpit/fix-makefiles.patch
+34
pkgs/servers/monitoring/cockpit/fix-makefiles.patch
···++ ln -sTfr $(DESTDIR)$(prefix)/run/cockpit/motd $(DESTDIR)$(prefix)$(sysconfdir)/motd.d/cockpit++ ln -sTfr $(DESTDIR)$(prefix)/run/cockpit/motd $(DESTDIR)$(prefix)$(sysconfdir)/issue.d/cockpit.issue+- mkdir -p $(DESTDIR)$(sysconfdir)/cockpit/ws-certs.d $(DESTDIR)$(sysconfdir)/cockpit/machines.d+- chmod 755 $(DESTDIR)$(sysconfdir)/cockpit/ws-certs.d $(DESTDIR)$(sysconfdir)/cockpit/machines.d++ mkdir -p $(DESTDIR)$(prefix)$(sysconfdir)/cockpit/ws-certs.d $(DESTDIR)$(prefix)$(sysconfdir)/cockpit/machines.d++ chmod 755 $(DESTDIR)$(prefix)$(sysconfdir)/cockpit/ws-certs.d $(DESTDIR)$(prefix)$(sysconfdir)/cockpit/machines.d
+12
pkgs/servers/monitoring/cockpit/nerf-node-modules.patch
+12
pkgs/servers/monitoring/cockpit/nerf-node-modules.patch
···
+3
-3
pkgs/servers/search/meilisearch/default.nix
+3
-3
pkgs/servers/search/meilisearch/default.nix
······
+3
-3
pkgs/servers/sftpgo/default.nix
+3
-3
pkgs/servers/sftpgo/default.nix
···
+2
-2
pkgs/servers/sql/pgpool/default.nix
+2
-2
pkgs/servers/sql/pgpool/default.nix
···
+2
-2
pkgs/servers/sql/postgresql/ext/timescaledb.nix
+2
-2
pkgs/servers/sql/postgresql/ext/timescaledb.nix
······
+3
-1
pkgs/servers/web-apps/freshrss/default.nix
+3
-1
pkgs/servers/web-apps/freshrss/default.nix
+1
-1
pkgs/servers/web-apps/phylactery/default.nix
+1
-1
pkgs/servers/web-apps/phylactery/default.nix
+6
-3
pkgs/tools/admin/pgadmin/default.nix
+6
-3
pkgs/tools/admin/pgadmin/default.nix
···url = "https://ftp.postgresql.org/pub/pgadmin/pgadmin4/v${version}/source/pgadmin4-${version}.tar.gz";······
+2
-6
pkgs/tools/admin/pgadmin/package.json
+2
-6
pkgs/tools/admin/pgadmin/package.json
·········-"pgadmin4-tree": "git+https://github.com/EnterpriseDB/pgadmin4-treeview/#96ceb7f27f43660a804e61d23a76aeb9aa188bb6",-"react-data-grid": "git+https://github.com/EnterpriseDB/react-data-grid.git/#200d2f5e02de694e3e9ffbe177c279bc40240fb8",+"react-data-grid": "git+https://github.com/pgadmin-org/react-data-grid.git/#200d2f5e02de694e3e9ffbe177c279bc40240fb8",···-"webcabin-docker": "git+https://github.com/EnterpriseDB/wcDocker/#3df8aac825ee2892f4d824de273b779cc6dbcad8",+"webcabin-docker": "git+https://github.com/pgadmin-org/wcdocker/#3df8aac825ee2892f4d824de273b779cc6dbcad8",
+14
-81
pkgs/tools/admin/pgadmin/yarn.lock
+14
-81
pkgs/tools/admin/pgadmin/yarn.lock
···resolved "https://registry.yarnpkg.com/aspen-decorations/-/aspen-decorations-1.1.1.tgz#7d0ca740efab1aa4fd91a1f3db81ac29186607a3"integrity sha512-Ej2tv0Gz3bnhkNCyzzjDeG2V5vd49T30ca0SKywHuLA5RKrZ1NutEyZnUYku4WmUV1/TdpHRiSJ759nbZK4xtQ==···resolved "https://registry.yarnpkg.com/content-type/-/content-type-1.0.4.tgz#e138cc75e040c727b1966fe5e5f8c9aee256fe3b"integrity sha512-hIP3EEPs8tB9AT1L+NUqtwOAps4mk2Zob89MWXMHjHWg9milF/j4osnnQLXBCBFBk/tvIG/tUc9mOUJiPBhPXA==-resolved "https://registry.yarnpkg.com/context-menu/-/context-menu-2.0.0.tgz#565f13210248e3442700e6b1a2d63406f2b08552"-integrity sha512-VQrkvcJDevuq+sde0QADRLOdIRpa4a1ti4knstrPILDLfWU/RB4ZIGpj32Chh/mURjrbi0CoLT1eonr3X86Khg==···resolved "https://registry.yarnpkg.com/jmespath/-/jmespath-0.16.0.tgz#b15b0a85dfd4d930d43e69ed605943c802785076"integrity sha512-9FzQjJ7MATs1tSpnco1K6ayiYE3figslrXA72G2HQ/n76RzvYlofyi5QM+iX4YRs/pu3yzxlVQSST23+dMDknw==resolved "https://registry.yarnpkg.com/jquery-contextmenu/-/jquery-contextmenu-2.9.2.tgz#f9dc362e45871dda2e50fa45de2243e917446ced"integrity sha512-6S6sH/08owDStC/7zNwcN366yR0ydX6PmMB0RnjLRQOp7Nc/rqwEHglshfHrrw2kdTev97GXwRXrayDUmToIOw==-resolved "https://registry.yarnpkg.com/jquery-ui/-/jquery-ui-1.13.2.tgz#de03580ae6604773602f8d786ad1abfb75232034"-integrity sha512-wBZPnqWs5GaYJmo1Jj0k/mrSkzdQzKDwhXNtHKcBdAcKVxMM3KNYFq+iJ2i1rwiG53Z8M4mTn3Qxrm17uH1D4Q==-"jquery@>=1.7.1 <4.0.0", "jquery@>=1.8.0 <4.0.0", jquery@^3.3.1, jquery@^3.5.0, jquery@^3.6.0:resolved "https://registry.yarnpkg.com/jquery/-/jquery-3.6.1.tgz#fab0408f8b45fc19f956205773b62b292c147a16"integrity sha512-opJeO4nCucVnsjiXOE+/PcCgYw9Gwpvs/a6B1LL/lQhwWwpbVEVYDZ1FokFr8PRc7ghYlrFPuyHuiiDNTQxmcw==···integrity sha512-Bdboy+l7tA3OGW6FjyFHWkP5LuByj1Tk33Ljyq0axyzdk9//JSi2u3fP1QSmd1KNwq6VOKYGlAu87CisVir6Pw==-resolved "https://registry.yarnpkg.com/json5/-/json5-1.0.1.tgz#779fb0018604fa854eacbf6252180d83543e3dbe"-integrity sha512-aKS4WQjPenRxiQsC93MNfjx+nbF4PAdYzmd/1JIj8HYzqfbu86beTuNgXDzPknWk0n0uARlyewZo4s++ES36Ow==+resolved "https://registry.yarnpkg.com/json5/-/json5-1.0.2.tgz#63d98d60f21b313b77c4d6da18bfa69d80e1d593"+integrity sha512-g1MWMLBiz8FKi1e4w0UyVL3w+iJceWAFBAaBnnGKOpNa5f8TLktkbre1+s6oICydWAm+HRUGTmI+//xv2hvXYA==-resolved "https://registry.yarnpkg.com/json5/-/json5-2.2.1.tgz#655d50ed1e6f95ad1a3caababd2b0efda10b395c"-integrity sha512-1hqLFMSrGHRHxav9q9gNjJ5EXznIxGVO09xQRrwplcS8qs28pZ8s8hupZAmqDwZUmVZ2Qb2jnyPOWcDH8m8dlA==+resolved "https://registry.yarnpkg.com/json5/-/json5-2.2.3.tgz#78cd6f1a19bdc12b73db5ad0c61efd66c1e29283"+integrity "sha1-eM1vGhm9wStz21rQxh79ZsHikoM= sha512-XmOWe7eyHYH14cLdVPoyg+GOH3rYX++KpzrylJwSW98t3Nk+U8XOl8FWKOgwtzdb8lXGf6zYwDUzeHMWfxasyg=="···resolved "https://registry.yarnpkg.com/performance-now/-/performance-now-2.1.0.tgz#6309f4e0e5fa913ec1c69307ae364b4b377c9e7b"integrity sha512-7EAHlyLHI56VEIdK57uwHdHKIaAGbnXPiw0yWbarQZOKaKpvUIgW0jWRVLiatnM+XXlSwsanIBH/hzGMJulMow==-"pgadmin4-tree@git+https://github.com/EnterpriseDB/pgadmin4-treeview/#96ceb7f27f43660a804e61d23a76aeb9aa188bb6":-resolved "git+https://github.com/EnterpriseDB/pgadmin4-treeview/#96ceb7f27f43660a804e61d23a76aeb9aa188bb6"resolved "https://registry.yarnpkg.com/picocolors/-/picocolors-1.0.0.tgz#cb5bdc74ff3f51892236eaf79d68bc44564ab81c"···resolved "https://registry.yarnpkg.com/react-aspen/-/react-aspen-1.2.0.tgz#375fa82a8db627542fc8b9e6e421baa49a65ab95"integrity sha512-w+vUn4ScCzcxDB5xEsKIuIkUnySEQXlp/zqPFChWEpYG12mPO7h7z/LWuK2QXUoDbIP96Fcf1+UAI9I/cstPqg==···-"react-data-grid@git+https://github.com/EnterpriseDB/react-data-grid.git/#200d2f5e02de694e3e9ffbe177c279bc40240fb8":+"react-data-grid@git+https://github.com/pgadmin-org/react-data-grid.git/#200d2f5e02de694e3e9ffbe177c279bc40240fb8":-resolved "git+https://github.com/EnterpriseDB/react-data-grid.git/#200d2f5e02de694e3e9ffbe177c279bc40240fb8"+resolved "git+https://github.com/pgadmin-org/react-data-grid.git/#200d2f5e02de694e3e9ffbe177c279bc40240fb8"···-resolved "https://registry.yarnpkg.com/react-dom/-/react-dom-16.14.0.tgz#7ad838ec29a777fb3c75c3a190f661cf92ab8b89"-integrity sha512-1gCeQXDLoIqMgqD3IO2Ah9bnf0w9kzhwN5q4FGnHZ67hBm9yePzB5JJAIQCc8x3pFnNlwFq4RidZggNAAkzWWw==···-resolved "https://registry.yarnpkg.com/react/-/react-16.14.0.tgz#94d776ddd0aaa37da3eda8fc5b6b18a4c9a3114d"-integrity sha512-0X2CImDkJGApiAlcf0ODKIneSwBPhqJawOa5wCtKbu7ZECrmS26NvtSILynQ66cgkT/RJ4LidJOc3bUESwmU8g==resolved "https://registry.yarnpkg.com/react/-/react-17.0.2.tgz#d0b5cc516d29eb3eee383f75b62864cfb6800037"···resolved "https://registry.yarnpkg.com/sax/-/sax-1.2.4.tgz#2816234e2378bddc4e5354fab5caa895df7100d9"integrity sha512-NqVDv9TpANUjFm0N8uM5GxL36UgKi9/atZw+x7YFnQ8ckwFGKrl4xX4yWtrey3UJm5nP1kUbnYgLopqWNSRhWw==-resolved "https://registry.yarnpkg.com/scheduler/-/scheduler-0.19.1.tgz#4f3e2ed2c1a7d65681f4c854fa8c5a1ccb40f196"-integrity sha512-n/zwRWRYSUj0/3g/otKDRPMh6qv2SYMWNq85IEa8iZyAv8od9zDYpGSnpBEjNgcMNq6Scbu5KfIPxNF72R/2EA==···-resolved "https://registry.yarnpkg.com/tiny-emitter/-/tiny-emitter-2.1.0.tgz#1d1a56edfc51c43e863cbb5382a72330e3555423"-integrity sha512-NB6Dk1A9xgQPMoGqC5CVXn123gWyte215ONT5Pp5a0yt4nlEoO1ZWeCwpncaekPHXO60i47ihFnZPiRPjRMq4Q==resolved "https://registry.yarnpkg.com/tiny-warning/-/tiny-warning-1.0.3.tgz#94a30db453df4c643d0fd566060d60a875d84754"···-"webcabin-docker@git+https://github.com/EnterpriseDB/wcDocker/#3df8aac825ee2892f4d824de273b779cc6dbcad8":+"webcabin-docker@git+https://github.com/pgadmin-org/wcdocker/#3df8aac825ee2892f4d824de273b779cc6dbcad8":-resolved "git+https://github.com/EnterpriseDB/wcDocker/#3df8aac825ee2892f4d824de273b779cc6dbcad8"+resolved "git+https://github.com/pgadmin-org/wcdocker/#3df8aac825ee2892f4d824de273b779cc6dbcad8"
+29
-97
pkgs/tools/admin/pgadmin/yarn.nix
+29
-97
pkgs/tools/admin/pgadmin/yarn.nix
···-sha512 = "VQrkvcJDevuq+sde0QADRLOdIRpa4a1ti4knstrPILDLfWU/RB4ZIGpj32Chh/mURjrbi0CoLT1eonr3X86Khg==";···-sha512 = "wBZPnqWs5GaYJmo1Jj0k/mrSkzdQzKDwhXNtHKcBdAcKVxMM3KNYFq+iJ2i1rwiG53Z8M4mTn3Qxrm17uH1D4Q==";···-sha512 = "aKS4WQjPenRxiQsC93MNfjx+nbF4PAdYzmd/1JIj8HYzqfbu86beTuNgXDzPknWk0n0uARlyewZo4s++ES36Ow==";+sha512 = "g1MWMLBiz8FKi1e4w0UyVL3w+iJceWAFBAaBnnGKOpNa5f8TLktkbre1+s6oICydWAm+HRUGTmI+//xv2hvXYA==";-sha512 = "1hqLFMSrGHRHxav9q9gNjJ5EXznIxGVO09xQRrwplcS8qs28pZ8s8hupZAmqDwZUmVZ2Qb2jnyPOWcDH8m8dlA==";+sha512 = "XmOWe7eyHYH14cLdVPoyg+GOH3rYX++KpzrylJwSW98t3Nk+U8XOl8FWKOgwtzdb8lXGf6zYwDUzeHMWfxasyg==";·········sha512 = "QeoM/i73HHu2XF9aKksIUuamHPDvRglEwdHL4jsp784BgUuWcg6mzfxT0QDdQz8Wj0qyRKx2eMg8iZtWvU4E2Q==";-sha512 = "1gCeQXDLoIqMgqD3IO2Ah9bnf0w9kzhwN5q4FGnHZ67hBm9yePzB5JJAIQCc8x3pFnNlwFq4RidZggNAAkzWWw==";···sha512 = "D4IiBeRtGXziZ1n0XklnFGu7h9gU684zepqyKzgPNzrsrk7xOCxni+TCckjg2Nr/DiaEEGVVmnhYSlT2rB47dQ==";-sha512 = "0X2CImDkJGApiAlcf0ODKIneSwBPhqJawOa5wCtKbu7ZECrmS26NvtSILynQ66cgkT/RJ4LidJOc3bUESwmU8g==";···sha512 = "NqVDv9TpANUjFm0N8uM5GxL36UgKi9/atZw+x7YFnQ8ckwFGKrl4xX4yWtrey3UJm5nP1kUbnYgLopqWNSRhWw==";-sha512 = "n/zwRWRYSUj0/3g/otKDRPMh6qv2SYMWNq85IEa8iZyAv8od9zDYpGSnpBEjNgcMNq6Scbu5KfIPxNF72R/2EA==";···-sha512 = "NB6Dk1A9xgQPMoGqC5CVXn123gWyte215ONT5Pp5a0yt4nlEoO1ZWeCwpncaekPHXO60i47ihFnZPiRPjRMq4Q==";···
+3
-3
pkgs/tools/misc/dua/default.nix
+3
-3
pkgs/tools/misc/dua/default.nix
·········
+2
-1
pkgs/tools/misc/ldapvi/default.nix
+2
-1
pkgs/tools/misc/ldapvi/default.nix
···
+1
-1
pkgs/tools/misc/lnch/default.nix
+1
-1
pkgs/tools/misc/lnch/default.nix
+1
-1
pkgs/tools/misc/rlwrap/default.nix
+1
-1
pkgs/tools/misc/rlwrap/default.nix
+2
-2
pkgs/tools/misc/tbls/default.nix
+2
-2
pkgs/tools/misc/tbls/default.nix
···
+11
-22
pkgs/tools/networking/mozillavpn/default.nix
+11
-22
pkgs/tools/networking/mozillavpn/default.nix
······-url = "https://github.com/mozilla-mobile/mozilla-vpn-client/pull/5236/commits/6fdc689001619a06b752fa629647642ea66f4e26.patch";·········+substituteInPlace src/apps/vpn/platforms/linux/daemon/org.mozilla.vpn.dbus.service --replace /usr/bin/mozillavpn "$out/bin/mozillavpn"
+5
-1
pkgs/tools/networking/nebula/default.nix
+5
-1
pkgs/tools/networking/nebula/default.nix
······
+2
-2
pkgs/tools/networking/ssldump/default.nix
+2
-2
pkgs/tools/networking/ssldump/default.nix
···
+2
-2
pkgs/tools/system/stress-ng/default.nix
+2
-2
pkgs/tools/system/stress-ng/default.nix
···
+64
pkgs/tools/typesetting/tex/advi/default.nix
+64
pkgs/tools/typesetting/tex/advi/default.nix
···+description = "Active-DVI is a Unix-platform DVI previewer and a programmable presenter for slides written in LaTeX.";
+19
-5
pkgs/top-level/all-packages.nix
+19
-5
pkgs/top-level/all-packages.nix
·································
+4
pkgs/top-level/darwin-packages.nix
+4
pkgs/top-level/darwin-packages.nix
···
+8
pkgs/top-level/python-packages.nix
+8
pkgs/top-level/python-packages.nix
············sphinxcontrib-websupport = callPackage ../development/python-modules/sphinxcontrib-websupport { };+sphinxcontrib-youtube = callPackage ../development/python-modules/sphinxcontrib-youtube { };