Skip to content
This repository was archived by the owner on Apr 12, 2021. It is now read-only.
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 2b417708c282
Choose a base ref
...
head repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: 13c15f26d44c
Choose a head ref

Commits on Jun 13, 2020

  1. nextcloud: 18.0.4 -> 18.0.6

    (cherry picked from commit 660973d)
    tokudan committed Jun 13, 2020
    Copy the full SHA
    f6faec2 View commit details

Commits on Jun 18, 2020

  1. json_c: add patch for CVE-2020-12762

    Fixes: https://nvd.nist.gov/vuln/detail/CVE-2020-12762
    
    (cherry picked from commit d3e1b77)
    mmilata committed Jun 18, 2020
    Copy the full SHA
    5e1de95 View commit details
  2. go: stop setting GOPATH

    The compiler does not need it anymore, has not needed it for many years
    iirc. This just goes in and pollutes the environment overriding the
    users GOPATH and causing grief.
    
    Go even warns about it itself, without vs with this commit:
    
    ```sh
    ~> go env GOPATH
    /home/manny/go
    ~> nix-shell -p go
    ~> go env GOPATH
    warning: GOPATH set to GOROOT (/nix/store/gvw1mfpdrk7i82884yhxf9lf5j3c12zm-go-1.14.1/share/go) has no effect
    /nix/store/gvw1mfpdrk7i82884yhxf9lf5j3c12zm-go-1.14.1/share/go
    ~> exit
    ~> nix-shell -I nixpkgs=cloned/NixOS/nixpkgs -p go
    ~> go env GOPATH
    /home/manny/go
    ~> exit
    ```
    
    (cherry picked from commit a1e13f6)
    mmlb authored and zowoq committed Jun 18, 2020
    Copy the full SHA
    6cd67ec View commit details
  3. go_1_13: stop setting GOPATH

    a1e13f6
    
    (cherry picked from commit 469f14c)
    zowoq committed Jun 18, 2020
    Copy the full SHA
    296e584 View commit details
  4. go_1_12: stop setting GOPATH

    zowoq committed Jun 18, 2020
    Copy the full SHA
    c9965e2 View commit details
  5. go: 1.14.1 -> 1.14.2

    (cherry picked from commit 416caeb)
    Mic92 authored and zowoq committed Jun 18, 2020
    Copy the full SHA
    382b2db View commit details
  6. go: 1.14.2 -> 1.14.3

    zowoq committed Jun 18, 2020
    Copy the full SHA
    2a1c67c View commit details
  7. go_1_13: 1.13.8 -> 1.13.11

    (cherry picked from commit d1e7b00)
    zowoq committed Jun 18, 2020
    Copy the full SHA
    203fcba View commit details
  8. Copy the full SHA
    b1cbd08 View commit details
  9. go: 1.14.3 -> 1.14.4

    zowoq committed Jun 18, 2020
    Copy the full SHA
    16a461d View commit details
  10. go: fix TestDontCacheBrokenHTTP2Conn failure

    (cherry picked from commit aae680c)
    zowoq committed Jun 18, 2020
    Copy the full SHA
    4094b36 View commit details
  11. buildGoModule: passthru the modSha256 (#82027)

    The builder does not technically need the modSha256 of the vendor dir, and even
    though we pass it the entire vendor dir it makes sense not to risk having an
    accidental dependency on that variable.
    
    However, tools like [nixpkgs-update](https://github.com/ryantm/nixpkgs-update)
    need to inspect the `modSha256` of a package in order to be able to update them,
    and since this is a real part of the package (describes info about its
    dependencies) let's add it to `passthru`.
    
    Specifically, this allows us to run a cmd like `nix eval -f . tflint.modSha256`
    to get the current value, which is how the bot finds it to replace with the new
    version in the Rust ecosystem.
    
    (cherry picked from commit 5f77ff6)
    bhipple authored and zowoq committed Jun 18, 2020
    Copy the full SHA
    9ae22e3 View commit details
  12. go-modules: Augment builds w/ vendor src

    This is done in response to complaints that the module format is not
    human readable. The vendor source blob is flat files and should be
    extremely readable.
    
    (cherry picked from commit 9761128)
    c00w authored and zowoq committed Jun 18, 2020
    Copy the full SHA
    470d555 View commit details
  13. go-modules: Add in old modsha256 w/ warning

    (removed warning for 20.03)
    (cherry picked from commit a0ddea1)
    c00w authored and zowoq committed Jun 18, 2020
    Copy the full SHA
    124d70c View commit details
  14. Copy the full SHA
    e69158b View commit details
  15. Copy the full SHA
    799a3b4 View commit details
  16. libexif: 0.6.21 -> 0.6.22

    Also:
    - build from git
    - enable cross compilation
    
    (cherry picked from commit e761cfe)
    erictapen committed Jun 18, 2020
    Copy the full SHA
    e3ca027 View commit details
  17. luajit*: patch CVE-2019-19391

    - upstream argues that this kind of problems can't be called
      vulnerabilities
    - the upstream patch is trivial, so why not fix the bug
    - nixpkgs master uses git versions already containing that commit
    Fixes #90875 (roundup ticket).
    vcunat committed Jun 18, 2020
    Copy the full SHA
    4e48231 View commit details
  18. libjpeg(-turbo): patch CVE-2020-13790

    Fixes #90864 on 20.03 (roundup issue).
    (cherry picked from commit d5fd2ed)
    vcunat committed Jun 18, 2020
    Copy the full SHA
    0ba0883 View commit details
  19. Merge pull request #90978 from erictapen/20.03-libexif-0.6.22

    [20.03] libexif: 0.6.21 -> 0.6.22 for security fixes
    flokli authored Jun 18, 2020
    Copy the full SHA
    00e7d87 View commit details
  20. Merge pull request #90269 from tokudan/2003nextcloud1806

    nextcloud: 18.0.4 -> 18.0.6 [20.03]
    Mic92 authored Jun 18, 2020
    Copy the full SHA
    07e2936 View commit details
  21. mutt: patch for CVE-2020-14093

    rnhmjoj committed Jun 18, 2020
    Copy the full SHA
    fd8bbb8 View commit details
  22. monero: 0.15.0.1 -> 0.16.0.0

    (cherry picked from commit a311031)
    rnhmjoj committed Jun 18, 2020
    Copy the full SHA
    0a29dda View commit details

Commits on Jun 19, 2020

  1. monero-gui: 0.15.0.4 -> 0.16.0.0

    (cherry picked from commit 7c04173)
    rnhmjoj committed Jun 19, 2020
    Copy the full SHA
    7587e07 View commit details
  2. mwprocapture: 1.2.4054 -> 1.2.4177

    (cherry picked from commit 9a57b0bbd5f4ed5f2c89008745f155962814e63f)
    
    Reason: mwprocapture build is broken on 20.03, 1.2.4054 does not
    compile with Linux 5.4.
    pwetzel authored and Cray Elliott committed Jun 19, 2020
    Copy the full SHA
    199de04 View commit details
  3. Merge branch 'staging-20.03' into release-20.03

    A bunch of CVE fixes.  The libexif change has not been rebuilt on Hydra,
    but it's only about a thousand rebuilds (when summed over all platforms).
    vcunat committed Jun 19, 2020
    Copy the full SHA
    b2540c7 View commit details
  4. Merge pull request #91072 from rnhmjoj/mutt-20.03

    [20.03] mutt: patch for CVE-2020-14093
    rnhmjoj authored Jun 19, 2020
    Copy the full SHA
    0bc134c View commit details
  5. Merge pull request #91076 from rnhmjoj/monero-20.03

    [20.03] monero: 0.15 -> 0.16
    rnhmjoj authored Jun 19, 2020
    Copy the full SHA
    c684d8c View commit details
  6. sv-kalendar: fix meta

    bqv authored and garbas committed Jun 19, 2020
    Copy the full SHA
    48a6a8b View commit details
  7. jhead: 3.03 -> 3.04

    (cherry picked from commit 7395b11)
    rycee committed Jun 19, 2020
    Copy the full SHA
    8b38149 View commit details
  8. neomutt: Make it not reference .dev outputs.

    (cherry picked from commit 3b9a8f5)
    doronbehar authored and Ma27 committed Jun 19, 2020

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    marsam Mario Rodas
    Copy the full SHA
    2a0c129 View commit details
  9. neomutt: make manual.txt not empty

    Without elinks / w3m / lynx in the nativeBuildInputs, there are these
    errors in the build:
    
    LC_ALL=C w3m -dump -O UTF8 docs/manual.html > docs/manual.txt || \
    LC_ALL=C lynx -dump -nolist -with_backspaces \
            -display_charset=us-ascii docs/manual.html > docs/manual.txt || \
    LC_ALL=C elinks -dump -no-numbering -no-references \
            docs/manual.html | sed -e 's,\\001, ,g' > docs/manual.txt
    /nix/store/xfbmj7sl2ikicym9x3yq7cms5qx1w39k-bash-4.4-p23/bin/bash: w3m: command not found
    /nix/store/xfbmj7sl2ikicym9x3yq7cms5qx1w39k-bash-4.4-p23/bin/bash: line 1: lynx: command not found
    /nix/store/xfbmj7sl2ikicym9x3yq7cms5qx1w39k-bash-4.4-p23/bin/bash: line 3: elinks: command not found
    
    (cherry picked from commit b8f6521)
    doronbehar authored and Ma27 committed Jun 19, 2020

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    marsam Mario Rodas
    Copy the full SHA
    5ca29c7 View commit details
  10. neomutt: Remove old fixes for failing tests

    Includes both rfc2047 tests workarounds and locale workarounds.
    Fixes #86896. See neomutt/neomutt#2314 .
    
    (cherry picked from commit b58227a)
    doronbehar authored and Ma27 committed Jun 19, 2020
    Copy the full SHA
    657aa0b View commit details
  11. Copy the full SHA
    c9ad468 View commit details

Commits on Jun 20, 2020

  1. flashplayer: 32.0.0.363 -> 32.0.0.371

    (cherry picked from commit d8fa222)
    taku0 authored and FRidh committed Jun 20, 2020

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    Ma27 Maximilian Bosch
    Copy the full SHA
    694939b View commit details
  2. flashplayer: 32.0.0.371 -> 32.0.0.387

    (cherry picked from commit 0a14605)
    taku0 authored and FRidh committed Jun 20, 2020
    Copy the full SHA
    a4a203e View commit details
  3. Merge pull request #90217 from zowoq/golang

    [20.03] golang backports
    zowoq authored Jun 20, 2020
    Copy the full SHA
    fea8c13 View commit details
  4. Copy the full SHA
    cdd1ece View commit details
  5. nixos/nextcloud: add occ internal option

    This option exposes the prefconfigured nextcloud-occ
    program. nextcloud-occ can then be used in other systemd services or
    added in environment.systemPackages.
    
    The nextcloud test shows how it can be add in
    environment.systemPackages.
    
    (cherry picked from commit 7d994ad)
    nlewo authored and Ma27 committed Jun 20, 2020
    Copy the full SHA
    6a99d5d View commit details

Commits on Jun 21, 2020

  1. lepton: 1.2.1 → 2019-08-20

    (cherry picked from commit b48a451)
    artemist authored and marsam committed Jun 21, 2020

    Verified

    This commit was signed with the committer’s verified signature.
    primeos Michael Weiss
    Copy the full SHA
    210d7a1 View commit details

Commits on Jun 22, 2020

  1. Copy the full SHA
    13c15f2 View commit details
Showing with 400 additions and 134 deletions.
  1. +9 −1 nixos/modules/services/web-apps/nextcloud.nix
  2. +7 −1 nixos/tests/nextcloud/basic.nix
  3. +9 −5 pkgs/applications/blockchains/monero-gui/default.nix
  4. +5 −4 pkgs/applications/blockchains/monero/default.nix
  5. +1 −1 pkgs/applications/editors/emacs-modes/sv-kalender/default.nix
  6. +2 −2 pkgs/applications/networking/browsers/chromium/plugins.nix
  7. +5 −5 pkgs/applications/networking/browsers/mozilla-plugins/flashplayer/default.nix
  8. +3 −3 pkgs/applications/networking/browsers/mozilla-plugins/flashplayer/standalone.nix
  9. +7 −1 pkgs/applications/networking/mailreaders/mutt/default.nix
  10. +13 −13 pkgs/applications/networking/mailreaders/neomutt/default.nix
  11. +0 −2 pkgs/development/compilers/go/1.12.nix
  12. +2 −4 pkgs/development/compilers/go/1.13.nix
  13. +9 −4 pkgs/development/compilers/go/1.14.nix
  14. +0 −2 pkgs/development/compilers/go/1.4.nix
  15. +0 −5 pkgs/development/compilers/go/setup-hook.sh
  16. +38 −20 pkgs/development/go-modules/generic/default.nix
  17. +227 −0 pkgs/development/go-modules/generic/old.nix
  18. +8 −0 pkgs/development/interpreters/luajit/default.nix
  19. +10 −1 pkgs/development/libraries/json-c/default.nix
  20. +14 −35 pkgs/development/libraries/libexif/default.nix
  21. +8 −1 pkgs/development/libraries/libjpeg-turbo/default.nix
  22. +2 −2 pkgs/os-specific/linux/mwprocapture/default.nix
  23. +7 −2 pkgs/servers/nextcloud/default.nix
  24. +7 −14 pkgs/tools/graphics/jhead/default.nix
  25. +4 −4 pkgs/tools/graphics/lepton/default.nix
  26. +3 −2 pkgs/top-level/all-packages.nix
10 changes: 9 additions & 1 deletion nixos/modules/services/web-apps/nextcloud.nix
Original file line number Diff line number Diff line change
@@ -69,7 +69,7 @@ in {
package = mkOption {
type = types.package;
description = "Which package to use for the Nextcloud instance.";
relatedPackages = [ "nextcloud17" "nextcloud18" ];
relatedPackages = [ "nextcloud17" "nextcloud18" "nextcloud19" ];
};

maxUploadSize = mkOption {
@@ -303,6 +303,14 @@ in {
'';
};
};
occ = mkOption {
type = types.package;
default = occ;
internal = true;
description = ''
The nextcloud-occ program preconfigured to target this Nextcloud instance.
'';
};
};

config = mkIf cfg.enable (mkMerge [
8 changes: 7 additions & 1 deletion nixos/tests/nextcloud/basic.nix
Original file line number Diff line number Diff line change
@@ -11,7 +11,9 @@ in {
# The only thing the client needs to do is download a file.
client = { ... }: {};

nextcloud = { config, pkgs, ... }: {
nextcloud = { config, pkgs, ... }: let
cfg = config;
in {
networking.firewall.allowedTCPPorts = [ 80 ];

services.nextcloud = {
@@ -27,6 +29,8 @@ in {
startAt = "20:00";
};
};

environment.systemPackages = [ cfg.services.nextcloud.occ ];
};
};

@@ -52,6 +56,8 @@ in {
in ''
start_all()
nextcloud.wait_for_unit("multi-user.target")
# This is just to ensure the nextcloud-occ program is working
nextcloud.succeed("nextcloud-occ status")
nextcloud.succeed("curl -sSf http://nextcloud/login")
nextcloud.succeed(
"${withRcloneEnv} ${copySharedFile}"
14 changes: 9 additions & 5 deletions pkgs/applications/blockchains/monero-gui/default.nix
Original file line number Diff line number Diff line change
@@ -4,21 +4,21 @@
, qtmultimedia, qtxmlpatterns
, qtquickcontrols, qtquickcontrols2
, monero, unbound, readline, boost, libunwind
, libsodium, pcsclite, zeromq, cppzmq
, libsodium, pcsclite, zeromq, libgcrypt, libgpgerror
, hidapi, libusb, protobuf, randomx
}:

with stdenv.lib;

stdenv.mkDerivation rec {
pname = "monero-gui";
version = "0.15.0.4";
version = "0.16.0.0";

src = fetchFromGitHub {
owner = "monero-project";
repo = "monero-gui";
rev = "v${version}";
sha256 = "12m5fgnxkr11q2arx1m5ccpxqm5ljcvm6l547dwqn297zs5jim4z";
sha256 = "06vdrsj5y9k0zn32hspyxc7sw1kkyrvi3chzkdbnxk9jvyj8k4ld";
};

nativeBuildInputs = [ qmake pkgconfig wrapQtAppsHook ];
@@ -27,9 +27,9 @@ stdenv.mkDerivation rec {
qtbase qtdeclarative qtgraphicaleffects
qtmultimedia qtquickcontrols qtquickcontrols2
qtxmlpatterns
monero unbound readline
monero unbound readline libgcrypt libgpgerror
boost libunwind libsodium pcsclite zeromq
cppzmq hidapi libusb protobuf randomx
hidapi libusb protobuf randomx
];

NIX_CFLAGS_COMPILE = [ "-Wno-error=format-security" ];
@@ -52,6 +52,10 @@ stdenv.mkDerivation rec {
preBuild = ''
sed -i s#/opt/monero-wallet-gui##g Makefile
make -C src/zxcvbn-c
# use nixpkgs monero sources
rmdir monero
ln -s "${monero.src}" monero
'';

desktopItem = makeDesktopItem {
9 changes: 5 additions & 4 deletions pkgs/applications/blockchains/monero/default.nix
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{ stdenv, fetchFromGitHub
, cmake, pkgconfig
, boost, miniupnpc, openssl, unbound, cppzmq
, boost, miniupnpc, openssl, unbound
, zeromq, pcsclite, readline, libsodium, hidapi
, pythonProtobuf, randomx, rapidjson, libusb
, CoreData, IOKit, PCSC
@@ -10,27 +10,28 @@ assert stdenv.isDarwin -> IOKit != null;

stdenv.mkDerivation rec {
pname = "monero";
version = "0.15.0.1";
version = "0.16.0.0";

src = fetchFromGitHub {
owner = "monero-project";
repo = "monero";
rev = "v${version}";
sha256 = "0sypa235lf2bbib4b71xpaw39h9304slgsvnsz8wmy9fq1zx009m";
sha256 = "0x74h5z0nxxxip97ibc854pqmrgd8r4d6w62m424f66i8gbzfskh";
fetchSubmodules = true;
};

nativeBuildInputs = [ cmake pkgconfig ];

buildInputs = [
boost miniupnpc openssl unbound
cppzmq zeromq pcsclite readline
zeromq pcsclite readline
libsodium hidapi randomx rapidjson
pythonProtobuf libusb
] ++ stdenv.lib.optionals stdenv.isDarwin [ IOKit CoreData PCSC ];

cmakeFlags = [
"-DCMAKE_BUILD_TYPE=Release"
"-DUSE_DEVICE_TREZOR=ON"
"-DBUILD_GUI_DEPS=ON"
"-DReadline_ROOT_DIR=${readline.dev}"
] ++ stdenv.lib.optional stdenv.isDarwin "-DBoost_USE_MULTITHREADED=OFF";
Original file line number Diff line number Diff line change
@@ -17,6 +17,6 @@ trivialBuild {
homepage = "http://bigwalter.net/daniel/elisp/sv-kalender.el";
platforms = platforms.all;
license = licenses.gpl3Plus;
maintainers = [ maintainer.rycee ];
maintainers = [ maintainers.rycee ];
};
}
4 changes: 2 additions & 2 deletions pkgs/applications/networking/browsers/chromium/plugins.nix
Original file line number Diff line number Diff line change
@@ -45,11 +45,11 @@ let

flash = stdenv.mkDerivation rec {
pname = "flashplayer-ppapi";
version = "32.0.0.363";
version = "32.0.0.387";

src = fetchzip {
url = "https://fpdownload.adobe.com/pub/flashplayer/pdc/${version}/flash_player_ppapi_linux.x86_64.tar.gz";
sha256 = "0znk8an892mykgbz56hyv3gz65vc9mhb3vn96c6bsvicwl1fn460";
sha256 = "1igs8nh3zpfcps97ahzh7kknx3rddh6yliig8lxf6jskbpf0qgzf";
stripRoot = false;
};

Original file line number Diff line number Diff line change
@@ -74,7 +74,7 @@ let
in
stdenv.mkDerivation rec {
pname = "flashplayer";
version = "32.0.0.363";
version = "32.0.0.387";

src = fetchurl {
url =
@@ -85,14 +85,14 @@ stdenv.mkDerivation rec {
sha256 =
if debug then
if arch == "x86_64" then
"06711k4vbn6mqfd8gvx2snsxyalhw15hn5b64sja8726z5rxvzy7"
"1wmk60lnlrj9f8dvk4b6j7pqyl00w00qbzbdw4awzx91wmgfc4x0"
else
"0v584aqhy4xk08afi3ypkq4mqjq57y136z82i5ixyim88dqbaf4f"
"1afjxhi5jzn8zbkva940i9fayzxj1r3n6rqsiny02fpnv0waypfy"
else
if arch == "x86_64" then
"1g1ijxypm8a8mfc1x58gksmaakqpp7xmf277wiir8zqjn3vd6c64"
"0si8rx955kyfsprk5465hfzafxvrdm7g686q7p5xykmh88nck6k2"
else
"13nbxmqmbxqvdhdwdqimim2f9fz3y2vrsx6b3pck6352m4i4wzh8";
"02pw2knvgdkahyp7lmy7fmynmplaz5wswdz48h3sdj6ibr066h97";
};

nativeBuildInputs = [ unzip ];
Original file line number Diff line number Diff line change
@@ -50,7 +50,7 @@

stdenv.mkDerivation {
pname = "flashplayer-standalone";
version = "32.0.0.363";
version = "32.0.0.387";

src = fetchurl {
url =
@@ -60,9 +60,9 @@ stdenv.mkDerivation {
"https://fpdownload.macromedia.com/pub/flashplayer/updaters/32/flash_player_sa_linux.x86_64.tar.gz";
sha256 =
if debug then
"03zhza8lvc1nvz3racwfsajfd6rnbw3g56dp5wvr1qmaps8xaaqg"
"1yxdwmm2gz162rmc9hwlccqgq613gnrihjicnzgan4vk7hjlga5y"
else
"0bhp7jv2l2agfzr8m564k749a5g75dw1390phlwvf49n1h8ldap2";
"0hm5is3giz45a4v9m77q0i1dgyhpqqkagpjndbnynsnl9a61r0ly";
};

nativeBuildInputs = [ unzip ];
8 changes: 7 additions & 1 deletion pkgs/applications/networking/mailreaders/mutt/default.nix
Original file line number Diff line number Diff line change
@@ -34,7 +34,13 @@ stdenv.mkDerivation rec {
sha256 = "0y3ks10mc7m8c7pd4c4j8pj7n5rqcvzrjs8mzldv7z7jnlb30hkq";
};

patches = optional smimeSupport (fetchpatch {
patches = [
# patch for CVE-2020-14093
(fetchpatch {
url = "https://github.com/muttmua/mutt/commit/3e88866dc60b5fa6aaba6fd7c1710c12c1c3cd01.patch";
sha256 = "1md4krh76kjbg6nkyvbpjn6iz17c7m7xvdj6gjvjr7akqjhfw48h";
})
] ++ optional smimeSupport (fetchpatch {
url = "https://salsa.debian.org/mutt-team/mutt/raw/debian/1.10.1-2/debian/patches/misc/smime.rc.patch";
sha256 = "0b4i00chvx6zj9pcb06x2jysmrcb2znn831lcy32cgfds6gr3nsi";
});
26 changes: 13 additions & 13 deletions pkgs/applications/networking/mailreaders/neomutt/default.nix
Original file line number Diff line number Diff line change
@@ -1,18 +1,18 @@
{ stdenv, fetchFromGitHub, gettext, makeWrapper, tcl, which, writeScript
, ncurses, perl , cyrus_sasl, gss, gpgme, kerberos, libidn, libxml2, notmuch, openssl
, lmdb, libxslt, docbook_xsl, docbook_xml_dtd_42, mailcap, runtimeShell, sqlite, zlib
, lmdb, libxslt, docbook_xsl, docbook_xml_dtd_42, elinks, mailcap, runtimeShell, sqlite, zlib
, glibcLocales
}:

stdenv.mkDerivation rec {
version = "20200501";
version = "20200619";
pname = "neomutt";

src = fetchFromGitHub {
owner = "neomutt";
repo = "neomutt";
rev = version;
sha256 = "1xrs2bagrcg489zp7g39l3rrpgz8n1ji9cbr21wrnasfbhqcsmnx";
sha256 = "0dhdpd0wdk5bam0q7cvjy4f451ai0mapmyrar7r7m5dnn6lcwvfv";
};

buildInputs = [
@@ -22,7 +22,7 @@ stdenv.mkDerivation rec {
];

nativeBuildInputs = [
docbook_xsl docbook_xml_dtd_42 gettext libxml2 libxslt.bin makeWrapper tcl which zlib
docbook_xsl docbook_xml_dtd_42 gettext libxml2 libxslt.bin makeWrapper tcl which zlib elinks
];

enableParallelBuilding = true;
@@ -42,12 +42,10 @@ stdenv.mkDerivation rec {
# and use a far more comprehensive list than the one shipped with neomutt
substituteInPlace sendlib.c \
--replace /etc/mime.types ${mailcap}/etc/mime.types
'';

# The string conversion tests all fail with the first version of neomutt
# that has tests (20180223) as well as 20180716 so we disable them for now.
# I don't know if that is related to the tests or our build environment.
# Try again with a later release.
sed -i '/rfc2047/d' test/Makefile.autosetup test/main.c
preBuild = ''
export HOME=$(mktemp -d)
'';

configureFlags = [
@@ -60,6 +58,9 @@ stdenv.mkDerivation rec {
"--sasl"
"--with-homespool=mailbox"
"--with-mailpath="
# To make it not reference .dev outputs. See:
# https://github.com/neomutt/neomutt/pull/2367
"--disable-include-path-in-cflags"
# Look in $PATH at runtime, instead of hardcoding /usr/bin/sendmail
"ac_cv_path_SENDMAIL=sendmail"
"--zlib"
@@ -80,16 +81,15 @@ stdenv.mkDerivation rec {
cp -r ${fetchFromGitHub {
owner = "neomutt";
repo = "neomutt-test-files";
rev = "1ee274e9ae1330fb901eb7b8275b3079d7869222";
sha256 = "0dhilz4rr7616jh8jcvh50a3rr09in43nsv72mm6f3vfklcqincp";
rev = "8629adab700a75c54e8e28bf05ad092503a98f75";
sha256 = "1ci04nqkab9mh60zzm66sd6mhsr6lya8wp92njpbvafc86vvwdlr";
}} $(pwd)/test-files
chmod -R +w test-files
(cd test-files && ./setup.sh)
export NEOMUTT_TEST_DIR=$(pwd)/test-files
export LC_ALL="en_US.UTF-8"
'';

checkInputs = [ glibcLocales ];
checkTarget = "test";
postCheck = "unset NEOMUTT_TEST_DIR";

2 changes: 0 additions & 2 deletions pkgs/development/compilers/go/1.12.nix
Original file line number Diff line number Diff line change
@@ -233,8 +233,6 @@ stdenv.mkDerivation rec {
runHook postInstall
'';

setupHook = ./setup-hook.sh;

disallowedReferences = [ goBootstrap ];

meta = with stdenv.lib; {
6 changes: 2 additions & 4 deletions pkgs/development/compilers/go/1.13.nix
Original file line number Diff line number Diff line change
@@ -30,11 +30,11 @@ in

stdenv.mkDerivation rec {
pname = "go";
version = "1.13.8";
version = "1.13.12";

src = fetchurl {
url = "https://dl.google.com/go/go${version}.src.tar.gz";
sha256 = "0d7cxffk72568h46srzswrxd0bsdip7amgkf499wzn6l6d3g0fxi";
sha256 = "0d5s5rqyzp6ykj4x1dz8infcsmj3gy8djnf63ji971ypwi6jrfhp";
};

# perl is used for testing go vet
@@ -230,8 +230,6 @@ stdenv.mkDerivation rec {
runHook postInstall
'';

setupHook = ./setup-hook.sh;

disallowedReferences = [ goBootstrap ];

meta = with stdenv.lib; {
13 changes: 9 additions & 4 deletions pkgs/development/compilers/go/1.14.nix
Original file line number Diff line number Diff line change
@@ -2,6 +2,7 @@
, perl, which, pkgconfig, patch, procps, pcre, cacert, Security, Foundation
, mailcap, runtimeShell
, buildPackages, pkgsTargetTarget
, fetchpatch
}:

let
@@ -30,11 +31,11 @@ in

stdenv.mkDerivation rec {
pname = "go";
version = "1.14.1";
version = "1.14.4";

src = fetchurl {
url = "https://dl.google.com/go/go${version}.src.tar.gz";
sha256 = "0xkna02clggcdgl5xxwani62krnf64x6p3hk9k5v9ldh2lhmglia";
sha256 = "1105qk2l4kfy1ki9n9gh8j4gfqrfgfwapa1fp38hih9aphxsy4bh";
};

# perl is used for testing go vet
@@ -138,6 +139,12 @@ stdenv.mkDerivation rec {
./go-1.9-skip-flaky-20072.patch
./skip-external-network-tests.patch
./skip-nohup-tests.patch

# fix rare TestDontCacheBrokenHTTP2Conn failure
(fetchpatch {
url = "https://github.com/golang/go/commit/ea1437a8cdf6bb3c2d2447833a5d06dbd75f7ae4.patch";
sha256 = "1lyzy4nf8c34a966vw45j3j7hzpvncq2gqspfxffzkyh17xd8sgy";
})
] ++ [
# breaks under load: https://github.com/golang/go/issues/25628
(if stdenv.isAarch32
@@ -230,8 +237,6 @@ stdenv.mkDerivation rec {
runHook postInstall
'';

setupHook = ./setup-hook.sh;

disallowedReferences = [ goBootstrap ];

meta = with stdenv.lib; {
2 changes: 0 additions & 2 deletions pkgs/development/compilers/go/1.4.nix
Original file line number Diff line number Diff line change
@@ -151,8 +151,6 @@ stdenv.mkDerivation rec {
./all.bash
'';

setupHook = ./setup-hook.sh;

meta = with stdenv.lib; {
branch = "1.4";
homepage = http://golang.org/;
5 changes: 0 additions & 5 deletions pkgs/development/compilers/go/setup-hook.sh

This file was deleted.

58 changes: 38 additions & 20 deletions pkgs/development/go-modules/generic/default.nix
Original file line number Diff line number Diff line change
@@ -13,12 +13,15 @@
# path to go.mod and go.sum directory
, modRoot ? "./"

# modSha256 is the sha256 of the vendored dependencies
# vendorSha256 is the sha256 of the vendored dependencies
#
# CAUTION: if `null` is used as a value, the derivation won't be a
# fixed-output derivation but disable the build sandbox instead. Don't use
# this in nixpkgs as Hydra won't build those packages.
, modSha256
# if vendorSha256 is null, then we won't fetch any dependencies and
# rely on the vendor folder within the source.
, vendorSha256 ? null
# Whether to delete the vendor folder supplied with the source.
, deleteVendor ? false

, modSha256 ? null

# We want parallel builds by default
, enableParallelBuilding ? true
@@ -37,21 +40,26 @@
with builtins;

let
args = removeAttrs args' [ "overrideModAttrs" "modSha256" "disabled" ];
args = removeAttrs args' [ "overrideModAttrs" "vendorSha256" "disabled" ];

removeReferences = [ ] ++ lib.optional (!allowGoReference) go;

removeExpr = refs: ''remove-references-to ${lib.concatMapStrings (ref: " -t ${ref}") refs}'';

go-modules = go.stdenv.mkDerivation (let modArgs = {
deleteFlag = if deleteVendor then "true" else "false";

go-modules = if vendorSha256 != null then go.stdenv.mkDerivation (let modArgs = {

name = "${name}-go-modules";

nativeBuildInputs = [ go git cacert ];
nativeBuildInputs = (args.nativeBuildInputs or []) ++ [ go git cacert ];

inherit (args) src;
inherit (go) GOOS GOARCH;

patches = args.patches or [];
preBuild = args.preBuild or "";
sourceRoot = args.sourceRoot or "";

GO111MODULE = "on";

@@ -64,15 +72,23 @@ let
export GOCACHE=$TMPDIR/go-cache
export GOPATH="$TMPDIR/go"
mkdir -p "''${GOPATH}/pkg/mod/cache/download"
cd "${modRoot}"
runHook postConfigure
'';

buildPhase = args.modBuildPhase or ''
runHook preBuild
go mod download
if [ ${deleteFlag} == "true" ]; then
rm -rf vendor
fi
if [ -e vendor ]; then
echo "vendor folder exists, please set 'vendorSha256=null;' or 'deleteVendor=true;' in your expression"
exit 10
fi
go mod vendor
mkdir -p vendor
runHook postBuild
'';
@@ -81,40 +97,40 @@ let
runHook preInstall
# remove cached lookup results and tiles
rm -rf "''${GOPATH}/pkg/mod/cache/download/sumdb"
cp -r "''${GOPATH}/pkg/mod/cache/download" $out
cp -r --reflink=auto vendor $out
runHook postInstall
'';

dontFixup = true;
}; in modArgs // (
if modSha256 == null then
{ __noChroot = true; }
else
{
outputHashMode = "recursive";
outputHashAlgo = "sha256";
outputHash = modSha256;
outputHash = vendorSha256;
}
) // overrideModAttrs modArgs);
) // overrideModAttrs modArgs) else "";

package = go.stdenv.mkDerivation (args // {
nativeBuildInputs = [ removeReferencesTo go ] ++ nativeBuildInputs;

inherit (go) GOOS GOARCH;

GO111MODULE = "on";
GOFLAGS = "-mod=vendor";

configurePhase = args.configurePhase or ''
runHook preConfigure
export GOCACHE=$TMPDIR/go-cache
export GOPATH="$TMPDIR/go"
export GOSUMDB=off
export GOPROXY=file://${go-modules}
export GOPROXY=off
cd "$modRoot"
if [ -n "${go-modules}" ]; then
rm -rf vendor
ln -s ${go-modules} vendor
fi
runHook postConfigure
'';
@@ -210,7 +226,7 @@ let

disallowedReferences = lib.optional (!allowGoReference) go;

passthru = passthru // { inherit go go-modules; };
passthru = passthru // { inherit go go-modules vendorSha256 ; };

meta = {
# Add default meta information
@@ -223,5 +239,7 @@ let
});
in if disabled then
throw "${package.name} not supported for go ${go.meta.branch}"
else if modSha256 != null then
(import ./old.nix { inherit go cacert git lib removeReferencesTo stdenv; } args')
else
package
227 changes: 227 additions & 0 deletions pkgs/development/go-modules/generic/old.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,227 @@
{ go, cacert, git, lib, removeReferencesTo, stdenv }:

{ name ? "${args'.pname}-${args'.version}"
, src
, buildInputs ? []
, nativeBuildInputs ? []
, passthru ? {}
, patches ? []

# A function to override the go-modules derivation
, overrideModAttrs ? (_oldAttrs : {})

# path to go.mod and go.sum directory
, modRoot ? "./"

# modSha256 is the sha256 of the vendored dependencies
#
# CAUTION: if `null` is used as a value, the derivation won't be a
# fixed-output derivation but disable the build sandbox instead. Don't use
# this in nixpkgs as Hydra won't build those packages.
, modSha256

# We want parallel builds by default
, enableParallelBuilding ? true

# Disabled flag
, disabled ? false

# Do not enable this without good reason
# IE: programs coupled with the compiler
, allowGoReference ? false

, meta ? {}

, ... }@args':

with builtins;

let
args = removeAttrs args' [ "overrideModAttrs" "modSha256" "disabled" ];

removeReferences = [ ] ++ lib.optional (!allowGoReference) go;

removeExpr = refs: ''remove-references-to ${lib.concatMapStrings (ref: " -t ${ref}") refs}'';

go-modules = go.stdenv.mkDerivation (let modArgs = {
name = "${name}-go-modules";

nativeBuildInputs = [ go git cacert ];

inherit (args) src;
inherit (go) GOOS GOARCH;

patches = args.patches or [];

GO111MODULE = "on";

impureEnvVars = lib.fetchers.proxyImpureEnvVars ++ [
"GIT_PROXY_COMMAND" "SOCKS_SERVER"
];

configurePhase = args.modConfigurePhase or ''
runHook preConfigure
export GOCACHE=$TMPDIR/go-cache
export GOPATH="$TMPDIR/go"
mkdir -p "''${GOPATH}/pkg/mod/cache/download"
cd "${modRoot}"
runHook postConfigure
'';

buildPhase = args.modBuildPhase or ''
runHook preBuild
go mod download
runHook postBuild
'';

installPhase = args.modInstallPhase or ''
runHook preInstall
# remove cached lookup results and tiles
rm -rf "''${GOPATH}/pkg/mod/cache/download/sumdb"
cp -r "''${GOPATH}/pkg/mod/cache/download" $out
runHook postInstall
'';

dontFixup = true;
}; in modArgs // (
if modSha256 == null then
{ __noChroot = true; }
else
{
outputHashMode = "recursive";
outputHashAlgo = "sha256";
outputHash = modSha256;
}
) // overrideModAttrs modArgs);

package = go.stdenv.mkDerivation (args // {
nativeBuildInputs = [ removeReferencesTo go ] ++ nativeBuildInputs;

inherit (go) GOOS GOARCH;

GO111MODULE = "on";

configurePhase = args.configurePhase or ''
runHook preConfigure
export GOCACHE=$TMPDIR/go-cache
export GOPATH="$TMPDIR/go"
export GOSUMDB=off
export GOPROXY=file://${go-modules}
cd "$modRoot"
runHook postConfigure
'';

buildPhase = args.buildPhase or ''
runHook preBuild
buildGoDir() {
local d; local cmd;
cmd="$1"
d="$2"
. $TMPDIR/buildFlagsArray
echo "$d" | grep -q "\(/_\|examples\|Godeps\|testdata\)" && return 0
[ -n "$excludedPackages" ] && echo "$d" | grep -q "$excludedPackages" && return 0
local OUT
if ! OUT="$(go $cmd $buildFlags "''${buildFlagsArray[@]}" -v -p $NIX_BUILD_CORES $d 2>&1)"; then
if ! echo "$OUT" | grep -qE '(no( buildable| non-test)?|build constraints exclude all) Go (source )?files'; then
echo "$OUT" >&2
return 1
fi
fi
if [ -n "$OUT" ]; then
echo "$OUT" >&2
fi
return 0
}
getGoDirs() {
local type;
type="$1"
if [ -n "$subPackages" ]; then
echo "$subPackages" | sed "s,\(^\| \),\1./,g"
else
find . -type f -name \*$type.go -exec dirname {} \; | grep -v "/vendor/" | sort --unique
fi
}
if (( "''${NIX_DEBUG:-0}" >= 1 )); then
buildFlagsArray+=(-x)
fi
if [ ''${#buildFlagsArray[@]} -ne 0 ]; then
declare -p buildFlagsArray > $TMPDIR/buildFlagsArray
else
touch $TMPDIR/buildFlagsArray
fi
if [ -z "$enableParallelBuilding" ]; then
export NIX_BUILD_CORES=1
fi
for pkg in $(getGoDirs ""); do
echo "Building subPackage $pkg"
buildGoDir install "$pkg"
done
'' + lib.optionalString (stdenv.hostPlatform != stdenv.buildPlatform) ''
# normalize cross-compiled builds w.r.t. native builds
(
dir=$GOPATH/bin/${go.GOOS}_${go.GOARCH}
if [[ -n "$(shopt -s nullglob; echo $dir/*)" ]]; then
mv $dir/* $dir/..
fi
if [[ -d $dir ]]; then
rmdir $dir
fi
)
'' + ''
runHook postBuild
'';

doCheck = args.doCheck or false;
checkPhase = args.checkPhase or ''
runHook preCheck
for pkg in $(getGoDirs test); do
buildGoDir test "$pkg"
done
runHook postCheck
'';

installPhase = args.installPhase or ''
runHook preInstall
mkdir -p $out
dir="$GOPATH/bin"
[ -e "$dir" ] && cp -r $dir $out
runHook postInstall
'';

preFixup = (args.preFixup or "") + ''
find $out/bin -type f -exec ${removeExpr removeReferences} '{}' + || true
'';

disallowedReferences = lib.optional (!allowGoReference) go;

passthru = passthru // { inherit go go-modules modSha256; };

meta = {
# Add default meta information
platforms = go.meta.platforms or lib.platforms.all;
} // meta // {
# add an extra maintainer to every package
maintainers = (meta.maintainers or []) ++
[ lib.maintainers.kalbasit ];
};
});
in if disabled then
throw "${package.name} not supported for go ${go.meta.branch}"
else
package
8 changes: 8 additions & 0 deletions pkgs/development/interpreters/luajit/default.nix
Original file line number Diff line number Diff line change
@@ -1,4 +1,5 @@
{ stdenv, fetchurl, buildPackages
, fetchpatch
, name ? "luajit-${version}"
, isStable
, sha256
@@ -20,6 +21,13 @@ stdenv.mkDerivation rec {

luaversion = "5.1";

patches = [
(fetchpatch {
name = "cve-2019-19391.patch";
url = "https://github.com/LuaJIT/LuaJIT/commit/0cd643d7c.diff";
sha256 = "1ya5h6r3mi7mkjy6bj1hjbl43j3lwh4phmi5q792rrz8az64hnjy";
})
];
postPatch = ''
substituteInPlace Makefile --replace ldconfig :
'';
11 changes: 10 additions & 1 deletion pkgs/development/libraries/json-c/default.nix
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{ stdenv, fetchurl, autoconf }:
{ stdenv, fetchurl, fetchpatch, autoconf }:

stdenv.mkDerivation rec {
name = "json-c-0.13.1";
@@ -7,6 +7,15 @@ stdenv.mkDerivation rec {
sha256 = "0ch1v18wk703bpbyzj7h1mkwvsw4rw4qdwvgykscypvqq10678ll";
};

patches = [
# https://nvd.nist.gov/vuln/detail/CVE-2020-12762
(fetchpatch {
name = "CVE-2020-12762.patch";
url = "https://github.com/json-c/json-c/commit/865b5a65199973bb63dff8e47a2f57e04fec9736.patch";
sha256 = "1g5afk4khhm1sb70xrva1pyznshcw3ipzp1g5z60dpzxy303pp6h";
})
];

outputs = [ "out" "dev" ];

nativeBuildInputs = [ autoconf ]; # for autoheader
49 changes: 14 additions & 35 deletions pkgs/development/libraries/libexif/default.nix
Original file line number Diff line number Diff line change
@@ -1,45 +1,24 @@
{ stdenv, fetchurl, fetchpatch, gettext }:
{ stdenv, fetchFromGitHub, autoreconfHook, gettext }:

stdenv.mkDerivation rec {
name = "libexif-0.6.21";
pname = "libexif";
version = "0.6.22";

src = fetchurl {
url = "mirror://sourceforge/libexif/${name}.tar.bz2";
sha256 = "06nlsibr3ylfwp28w8f5466l6drgrnydgxrm4jmxzrmk5svaxk8n";
src = fetchFromGitHub {
owner = pname;
repo = pname;
rev = "${pname}-${builtins.replaceStrings ["."] ["_"] version}-release";
sha256 = "0mzndakdi816zcs13z7yzp7hj031p2dcyfq2p391r63d9z21jmy1";
};

patches = [
(fetchpatch {
name = "CVE-2017-7544.patch";
url = "https://github.com/libexif/libexif/commit/c39acd1692023b26290778a02a9232c873f9d71a.patch";
sha256 = "0xgx6ly2i4q05shb61mfx6njwf1yp347jkznm0ka4m85i41xm6sd";
})
(fetchpatch {
name = "CVE-2018-20030-1.patch";
url = "https://github.com/libexif/libexif/commit/5d28011c40ec86cf52cffad541093d37c263898a.patch";
sha256 = "1wv8s962wmbn2m2xypgirf12g6msrbplpsmd5bh86irfwhkcppj3";
})
(fetchpatch {
name = "CVE-2018-20030-2.patch";
url = "https://github.com/libexif/libexif/commit/6aa11df549114ebda520dde4cdaea2f9357b2c89.patch";
sha256 = "01aqvz63glwq6wg0wr7ykqqghb4abgq77ghvhizbzadg1k4h7drx";
excludes = [ "NEWS" ];
})
(fetchpatch {
name = "CVE-2019-9278.patch";
url = "https://github.com/libexif/libexif/commit/75aa73267fdb1e0ebfbc00369e7312bac43d0566.patch";
sha256 = "10ikg33mips5zq9as7l9xqnyzbg1wwr4sw17517nzf4hafjpasrj";
})
];
nativeBuildInputs = [ autoreconfHook gettext ];

buildInputs = [ gettext ];

meta = {
homepage = https://libexif.github.io/;
meta = with stdenv.lib; {
homepage = "https://libexif.github.io/";
description = "A library to read and manipulate EXIF data in digital photographs";
license = stdenv.lib.licenses.lgpl21;
platforms = stdenv.lib.platforms.unix;
maintainers = [ stdenv.lib.maintainers.erictapen ];
license = licenses.lgpl21;
platforms = platforms.unix;
maintainers = with maintainers; [ erictapen ];
};

}
9 changes: 8 additions & 1 deletion pkgs/development/libraries/libjpeg-turbo/default.nix
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{ stdenv, fetchurl, cmake, nasm, enableStatic ? false }:
{ stdenv, fetchurl, fetchpatch, cmake, nasm, enableStatic ? false }:

stdenv.mkDerivation rec {

@@ -11,6 +11,13 @@ stdenv.mkDerivation rec {
};

patches =
[
(fetchpatch {
name = "cve-2020-13790.patch";
url = "https://github.com/libjpeg-turbo/libjpeg-turbo/commit/3de15e0c344d.diff";
sha256 = "0hm5i6qir5w3zxb0xvqdh4jyvbfg7xnd28arhyfsaclfz9wdb0pb";
})
] ++
stdenv.lib.optional (stdenv.hostPlatform.libc or null == "msvcrt")
./mingw-boolean.patch;

4 changes: 2 additions & 2 deletions pkgs/os-specific/linux/mwprocapture/default.nix
Original file line number Diff line number Diff line change
@@ -15,11 +15,11 @@ let
in
stdenv.mkDerivation rec {
name = "mwprocapture-1.2.${version}-${kernel.version}";
version = "4054";
version = "4177";

src = fetchurl {
url = "http://www.magewell.com/files/drivers/ProCaptureForLinux_${version}.tar.gz";
sha256 = "0ylx75jcwlqds8w6lm11nxdlzxvy7xlz4rka2k5d6gmqa5fv19c2";
sha256 = "1nf51w9yixpvr767k49sfdb9n9rv5qc72f5yki1mkghbmabw7vys";
};

nativeBuildInputs = [ kernel.moduleBuildDependencies ];
9 changes: 7 additions & 2 deletions pkgs/servers/nextcloud/default.nix
Original file line number Diff line number Diff line change
@@ -31,7 +31,12 @@ in {
};

nextcloud18 = generic {
version = "18.0.4";
sha256 = "0aa3f4xbkzacfw0h9aic0ywk5mqlwka83qaszizj8lmk68kf3n7s";
version = "18.0.6";
sha256 = "1chmkg31jc1nr53y8r886mmd2jzb78094mrx7ggcfpjfkkv8b89s";
};

nextcloud19 = generic {
version = "19.0.0";
sha256 = "1bhazqj5f02sclh5pmifzqfahhhfqypixbvkgrnlgqy5ayb44gfj";
};
}
21 changes: 7 additions & 14 deletions pkgs/tools/graphics/jhead/default.nix
Original file line number Diff line number Diff line change
@@ -2,34 +2,27 @@

stdenv.mkDerivation rec {
pname = "jhead";
version = "3.03";
version = "3.04";

src = fetchurl {
url = "http://www.sentex.net/~mwandel/jhead/${pname}-${version}.tar.gz";
sha256 = "1hn0yqcicq3qa20h1g313l1a671r8mccpb9gz0w1056r500lw6c2";
sha256 = "1j831bqw1qpkbchdriwcy3sgzvbagaj45wlc124fs9bc9z7vp2gg";
};

patches = [
(fetchpatch {
name = "CVE-2019-1010301.patch";
url = "https://sources.debian.org/data/main/j/jhead/1:3.03-3/debian/patches/36_CVE-2019-1010301";
sha256 = "1vvrg50z5y7sjhfi973wh1q1v79sqp7hk5d4z0dlnx3fqgkjrx7q";
})
(fetchpatch {
name = "CVE-2019-1010302.patch";
url = "https://sources.debian.org/data/main/j/jhead/1:3.03-3/debian/patches/37_CVE-2019-1010302";
sha256 = "1h11mpsi7hpwbi8kpnkjwn6zpqf88f132h0rsg8sggcs3vva2x8y";
url = "https://sources.debian.org/data/main/j/jhead/1:3.04-2/debian/patches/01_gpsinfo.c";
sha256 = "0r8hdbfrdxip4dwz5wqsv47a29j33cx7w5zx4jdhp5l1ihg003lz";
})
];

buildInputs = [ libjpeg ];

patchPhase = ''
substituteInPlace makefile \
--replace /usr/local/bin $out/bin
makeFlags = [ "CPPFLAGS=" "CFLAGS=-O3" "LDFLAGS=" ];

patchPhase = ''
sed -i '/dpkg-buildflags/d' makefile
substituteInPlace jhead.c \
--replace "\" Compiled: \"__DATE__" "" \
--replace "jpegtran -trim" "${libjpeg.bin}/bin/jpegtran -trim"
'';

8 changes: 4 additions & 4 deletions pkgs/tools/graphics/lepton/default.nix
Original file line number Diff line number Diff line change
@@ -1,14 +1,14 @@
{ stdenv, fetchFromGitHub, cmake, git, glibc }:

stdenv.mkDerivation rec {
version = "1.2.1";
pname = "lepton";
version = "2019-08-20";
pname = "lepton-unstable";

src = fetchFromGitHub {
repo = "lepton";
owner = "dropbox";
rev = version;
sha256 = "1f2vyp0crj4yw27bs53vykf2fqk4w57gv3lh9dp89dh3y7wwh1ba";
rev = "3d1bc19da9f13a6e817938afd0f61a81110be4da";
sha256 = "0aqs6nvcbq8cbfv8699fa634bsz7csmk0169n069yvv17d1c07fd";
};

nativeBuildInputs = [ cmake git ];
5 changes: 3 additions & 2 deletions pkgs/top-level/all-packages.nix
Original file line number Diff line number Diff line change
@@ -5282,7 +5282,7 @@ in
grocy = callPackage ../servers/grocy { };

inherit (callPackage ../servers/nextcloud {})
nextcloud17 nextcloud18;
nextcloud17 nextcloud18 nextcloud19;

nextcloud-client = libsForQt5.callPackage ../applications/networking/nextcloud-client { };

@@ -22775,11 +22775,12 @@ in

monero = callPackage ../applications/blockchains/monero {
inherit (darwin.apple_sdk.frameworks) CoreData IOKit PCSC;
boost = boost17x;
pythonProtobuf = python3Packages.protobuf.override { protobuf = protobuf3_10; };
};

monero-gui = libsForQt5.callPackage ../applications/blockchains/monero-gui {
boost = boost16x;
boost = boost17x;
protobuf = protobuf3_10;
};