Skip to content
This repository was archived by the owner on Apr 12, 2021. It is now read-only.
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 423be37a0b4a
Choose a base ref
...
head repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: 14656d703159
Choose a head ref

Commits on Apr 21, 2018

  1. xorg.libXfixes: 5.0.2 -> 5.0.3

    Semi-automatic update generated by https://github.com/ryantm/nix-update tools. These checks were done:
    
    - built on NixOS
    - Warning: no binary found that responded to help or version flags. (This warning appears even if the package isn't expected to have binaries.)
    - found 5.0.3 with grep in /nix/store/g5hcg35wmg25sgfjp7mvi4cx3shldbxd-libXfixes-5.0.3
    - directory tree listing: https://gist.github.com/7398ada0908969ebbd1e7e629a1e0ef7
    
    (cherry picked from commit 0e443ce)
    Only fixes CVE-2016-7944; /cc #38994.
    ryantm authored and vcunat committed Apr 21, 2018

    Verified

    This commit was signed with the committer’s verified signature.
    vcunat Vladimír Čunát
    Copy the full SHA
    ce86b8f View commit details
  2. Verified

    This commit was signed with the committer’s verified signature.
    vcunat Vladimír Čunát
    Copy the full SHA
    88c4a29 View commit details
  3. Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    pSub Pascal Wittmann
    Copy the full SHA
    1768eb6 View commit details
  4. Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    pSub Pascal Wittmann
    Copy the full SHA
    fc3dfe6 View commit details
  5. gradle: 4.6 -> 4.7

    (cherry picked from commit 82f70b6)
    NeQuissimus committed Apr 21, 2018

    Verified

    This commit was signed with the committer’s verified signature.
    NeQuissimus Tim Steinbach
    Copy the full SHA
    e8f32d0 View commit details
  6. nixos/systemd: Fix environment type -> allows overriding

    (cherry picked from commit e9fc255)
    infinisil authored and LnL7 committed Apr 21, 2018

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    LnL7 Daiderd Jordan
    Copy the full SHA
    df4eae6 View commit details
  7. rustc: disable test on i686

    They run out of memory and lead to failing tests.
    
    fixes #39110
    
    (cherry picked from commit 14a119e)
    Mic92 committed Apr 21, 2018
    Copy the full SHA
    ca5bc1e View commit details
  8. zfs: patch exportfs path for sharenfs functionality

    (cherry picked from commit 1eddfaf)
    sorki authored and Mic92 committed Apr 21, 2018
    Copy the full SHA
    f4fdebf View commit details
  9. Fixed repo for ImageMagick 6 (#39276)

    (cherry picked from commit 5d3c7ff)
    Dirk Lemstra authored and Robert Schütz committed Apr 21, 2018
    Copy the full SHA
    b68697c View commit details

Commits on Apr 22, 2018

  1. libimobiledevice: use cve tag in patchname for vulnix auto-detection

    (cherry picked from commit 81a255d)
    pSub committed Apr 22, 2018

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    pSub Pascal Wittmann
    Copy the full SHA
    29e5da8 View commit details
  2. Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    pSub Pascal Wittmann
    Copy the full SHA
    7395480 View commit details
  3. Merge #31320: docs and glibc: explicit comments on outputs

    (cherry picked from commit 17c4b83)
    vcunat committed Apr 22, 2018

    Verified

    This commit was signed with the committer’s verified signature.
    vcunat Vladimír Čunát
    Copy the full SHA
    ad222f3 View commit details
  4. systemd.nspawn: fix missing suffix

    Fix files placed in `/etc/systemd/nspawn/` missing `.nspawn` suffix
    
    (cherry picked from commit 87cbb86)
    Giumo X. Clanjor (哆啦比猫/兰威举) authored and Mic92 committed Apr 22, 2018
    Copy the full SHA
    0517698 View commit details
  5. farbfeld, sent: wrap PATH for 2ff and sent

    (cherry picked from commit fa3f620)
    oxzi authored and Mic92 committed Apr 22, 2018
    Copy the full SHA
    4adf3a7 View commit details
  6. exempi: 2.4.4 -> 2.4.5

    Semi-automatic update generated by https://github.com/ryantm/nix-update tools. These checks were done:
    
    - built on NixOS
    - Warning: no binary found that responded to help or version flags. (This warning appears even if the package isn't expected to have binaries.)
    - found 2.4.5 with grep in /nix/store/l4nmjlanshgdwrh95g1h0714zcm1kk3z-exempi-2.4.5
    - directory tree listing: https://gist.github.com/2d437e9ea408cfda7abaa772865a0b82
    
    (cherry picked from commit 34682dd)
    ryantm authored and pSub committed Apr 22, 2018

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    pSub Pascal Wittmann
    Copy the full SHA
    bae7df6 View commit details
  7. nixos/installer/channel: Add some files that the channel also has

    Nothing probably uses this, but let's be pedantic and have the
    pre-included channel on the install media be as close as possible to
    what 'nix-channel --update' will give them.
    
    The only remaining difference is that the channel adds programs.sqlite,
    which is fundamentally unfixable.
    
    (cherry picked from commit bd77849)
    dezgeg committed Apr 22, 2018
    Copy the full SHA
    fe0da42 View commit details
  8. enhanced-ctorrent: fix CVE-2009-1759 (#39311)

    Patches from Debian.
    
    (cherry picked from commit 69f23d9)
    MostAwesomeDude authored and Mic92 committed Apr 22, 2018
    Copy the full SHA
    691a6fc View commit details
  9. zfs: mark as broken for 4.16

    (cherry picked from commit bc7c7b2)
    Mic92 committed Apr 22, 2018
    Copy the full SHA
    b3c84d4 View commit details
  10. nix: 2.0 -> 2.0.1

    (cherry picked from commit 03b3652)
    Signed-off-by: Domen Kožar <domen@dev.si>
    edolstra authored and domenkozar committed Apr 22, 2018

    Verified

    This commit was signed with the committer’s verified signature.
    domenkozar Domen Kožar
    Copy the full SHA
    f04f75a View commit details

Commits on Apr 23, 2018

  1. Verified

    This commit was signed with the committer’s verified signature.
    vcunat Vladimír Čunát
    Copy the full SHA
    a9384fd View commit details
  2. trezord: Added Trezor Model-T (v2) udev rules

    (cherry picked from commit 4bf61fa)
    elitak authored and adisbladis committed Apr 23, 2018

    Unverified

    The committer email address is not verified.
    Copy the full SHA
    14656d7 View commit details
10 changes: 8 additions & 2 deletions doc/multiple-output.xml
Original file line number Diff line number Diff line change
@@ -36,10 +36,16 @@
<para>Here you find how to write a derivation that produces multiple outputs.</para>
<para>In nixpkgs there is a framework supporting multiple-output derivations. It tries to cover most cases by default behavior. You can find the source separated in &lt;<filename>nixpkgs/pkgs/build-support/setup-hooks/multiple-outputs.sh</filename>&gt;; it's relatively well-readable. The whole machinery is triggered by defining the <varname>outputs</varname> attribute to contain the list of desired output names (strings).</para>
<programlisting>outputs = [ "bin" "dev" "out" "doc" ];</programlisting>
<para>Often such a single line is enough. For each output an equally named environment variable is passed to the builder and contains the path in nix store for that output. By convention, the first output should contain the executable programs provided by the package as that output is used by Nix in string conversions, allowing references to binaries like <literal>${pkgs.perl}/bin/perl</literal> to always work. Typically you also want to have the main <varname>out</varname> output, as it catches any files that didn't get elsewhere.</para>

<para>Often such a single line is enough. For each output an equally named environment variable is passed to the builder and contains the path in nix store for that output. Typically you also want to have the main <varname>out</varname> output, as it catches any files that didn't get elsewhere.</para>
<note><para>There is a special handling of the <varname>debug</varname> output, described at <xref linkend="stdenv-separateDebugInfo" />.</para></note>

<section xml:id="multiple-output-file-binaries-first-convention">
<title><quote>Binaries first</quote></title>
<para>A commonly adopted convention in <literal>nixpkgs</literal> is that executables provided by the package are contained within its first output. This convention allows the dependent packages to reference the executables provided by packages in a uniform manner. For instance, provided with the knowledge that the <literal>perl</literal> package contains a <literal>perl</literal> executable it can be referenced as <literal>${pkgs.perl}/bin/perl</literal> within a Nix derivation that needs to execute a Perl script.</para>
<para>The <literal>glibc</literal> package is a deliberate single exception to the <quote>binaries first</quote> convention. The <literal>glibc</literal> has <literal>libs</literal> as its first output allowing the libraries provided by <literal>glibc</literal> to be referenced directly (e.g. <literal>${stdenv.glibc}/lib/ld-linux-x86-64.so.2</literal>). The executables provided by <literal>glibc</literal> can be accessed via its <literal>bin</literal> attribute (e.g. <literal>${stdenv.glibc.bin}/bin/ldd</literal>).</para>
<para>The reason for why <literal>glibc</literal> deviates from the convention is because referencing a library provided by <literal>glibc</literal> is a very common operation among Nix packages. For instance, third-party executables packaged by Nix are typically patched and relinked with the relevant version of <literal>glibc</literal> libraries from Nix packages (please see the documentation on <link xlink:href="https://nixos.org/patchelf.html">patchelf</link> for more details).</para>
</section>

<section xml:id="multiple-output-file-type-groups">
<title>File type groups</title>
<para>The support code currently recognizes some particular kinds of outputs and either instructs the build system of the package to put files into their desired outputs or it moves the files during the fixup phase. Each group of file types has an <varname>outputFoo</varname> variable specifying the output name where they should go. If that variable isn't defined by the derivation writer, it is guessed &ndash; a default output name is defined, falling back to other possibilities if the output isn't defined.</para>
2 changes: 2 additions & 0 deletions nixos/modules/installer/cd-dvd/channel.nix
Original file line number Diff line number Diff line change
@@ -21,7 +21,9 @@ let
if [ ! -e $out/nixos/nixpkgs ]; then
ln -s . $out/nixos/nixpkgs
fi
echo -n ${config.system.nixos.revision} > $out/nixos/.git-revision
echo -n ${config.system.nixos.versionSuffix} > $out/nixos/.version-suffix
echo ${config.system.nixos.versionSuffix} | sed -e s/pre// > $out/nixos/svn-revision
'';

in
8 changes: 4 additions & 4 deletions nixos/modules/installer/tools/nix-fallback-paths.nix
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
x86_64-linux = "/nix/store/6p2gambjac7xdkd2a7w1dsxdk1q5cq4d-nix-2.0";
i686-linux = "/nix/store/zznnaijjk3nwx0cmpczxsvngmqzhl7r4-nix-2.0";
aarch64-linux = "/nix/store/ci96w9kxfkmlc7x2vwqiz4da0r6abxnq-nix-2.0";
x86_64-darwin = "/nix/store/xmi4fylvx4qc79ji9v5q3zfy9vfdy4sv-nix-2.0";
x86_64-linux = "/nix/store/2gk7rk2sx2dkmsjr59gignrfdmya8f6s-nix-2.0.1";
i686-linux = "/nix/store/5160glkphiv13qggnivyidg8r0491pbl-nix-2.0.1";
aarch64-linux = "/nix/store/jk29zz3ns9vdkkclcyzzkpzp8dhv1x3i-nix-2.0.1";
x86_64-darwin = "/nix/store/4a9czmrpd4hf3r80zcmga2c2lm3hbbvv-nix-2.0.1";
}
11 changes: 9 additions & 2 deletions nixos/modules/services/hardware/trezord.nix
Original file line number Diff line number Diff line change
@@ -26,8 +26,15 @@ in {
name = "trezord-udev-rules";
destination = "/etc/udev/rules.d/51-trezor.rules";
text = ''
SUBSYSTEM=="usb", ATTR{idVendor}=="534c", ATTR{idProduct}=="0001", MODE="0666", GROUP="dialout", SYMLINK+="trezor%n"
KERNEL=="hidraw*", ATTRS{idVendor}=="534c", ATTRS{idProduct}=="0001", MODE="0666", GROUP="dialout"
# Trezor 1
SUBSYSTEM=="usb", ATTR{idVendor}=="534c", ATTR{idProduct}=="0001", MODE="0666", GROUP="dialout", SYMLINK+="trezor%n"
KERNEL=="hidraw*", ATTRS{idVendor}=="534c", ATTRS{idProduct}=="0001", MODE="0666", GROUP="dialout"
# Trezor 2 (Model-T)
SUBSYSTEM=="usb", ATTR{idVendor}=="1209", ATTR{idProduct}=="53c0", MODE="0661", GROUP="dialout", TAG+="uaccess", TAG+="udev-acl", SYMLINK+="trezor%n"
SUBSYSTEM=="usb", ATTR{idVendor}=="1209", ATTR{idProduct}=="53c1", MODE="0660", GROUP="dialout", TAG+="uaccess", TAG+="udev-acl", SYMLINK+="trezor%n"
KERNEL=="hidraw*", ATTRS{idVendor}=="1209", ATTRS{idProduct}=="53c1", MODE="0660", GROUP="dialout", TAG+="uaccess", TAG+="udev-acl"
];
'';
});

2 changes: 1 addition & 1 deletion nixos/modules/system/boot/systemd-nspawn.nix
Original file line number Diff line number Diff line change
@@ -110,7 +110,7 @@ in {

config =
let
units = mapAttrs' (n: v: nameValuePair "${n}.nspawn" (instanceToUnit n v)) cfg;
units = mapAttrs' (n: v: let nspawnFile = "${n}.nspawn"; in nameValuePair nspawnFile (instanceToUnit nspawnFile v)) cfg;
in mkIf (cfg != {}) {

environment.etc."systemd/nspawn".source = generateUnits "nspawn" units [] [];
2 changes: 1 addition & 1 deletion nixos/modules/system/boot/systemd-unit-options.nix
Original file line number Diff line number Diff line change
@@ -217,7 +217,7 @@ in rec {

environment = mkOption {
default = {};
type = types.attrs; # FIXME
type = with types; attrsOf (nullOr (either str package));
example = { PATH = "/foo/bar/bin"; LANG = "nl_NL.UTF-8"; };
description = "Environment variables passed to the service's processes.";
};
2 changes: 1 addition & 1 deletion nixos/modules/system/boot/systemd.nix
Original file line number Diff line number Diff line change
@@ -516,7 +516,7 @@ in
};

systemd.globalEnvironment = mkOption {
type = types.attrs;
type = with types; attrsOf (nullOr (either str package));
default = {};
example = { TZ = "CET"; };
description = ''
2 changes: 1 addition & 1 deletion pkgs/applications/graphics/ImageMagick/default.nix
Original file line number Diff line number Diff line change
@@ -38,7 +38,7 @@ stdenv.mkDerivation rec {

src = fetchFromGitHub {
owner = "ImageMagick";
repo = "ImageMagick";
repo = "ImageMagick6";
rev = cfg.version;
inherit (cfg) sha256;
};
8 changes: 6 additions & 2 deletions pkgs/applications/misc/sent/default.nix
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{ stdenv, fetchurl, farbfeld, libX11, libXft
{ stdenv, fetchurl, farbfeld, libX11, libXft, makeWrapper
, patches ? [] }:

stdenv.mkDerivation rec {
@@ -9,14 +9,18 @@ stdenv.mkDerivation rec {
sha256 = "0cxysz5lp25mgww73jl0mgip68x7iyvialyzdbriyaff269xxwvv";
};

buildInputs = [ farbfeld libX11 libXft ];
buildInputs = [ libX11 libXft ];
nativeBuildInputs = [ makeWrapper ];

# unpacking doesn't create a directory
sourceRoot = ".";

inherit patches;

installFlags = [ "PREFIX=$(out)" ];
postInstall = ''
wrapProgram "$out/bin/sent" --prefix PATH : "${farbfeld}/bin"
'';

meta = with stdenv.lib; {
description = "A simple plaintext presentation tool";
15 changes: 14 additions & 1 deletion pkgs/applications/networking/enhanced-ctorrent/default.nix
Original file line number Diff line number Diff line change
@@ -1,13 +1,26 @@
{ stdenv, fetchurl }:
{ stdenv, fetchurl, fetchpatch }:

stdenv.mkDerivation rec {
version = "dnh3.3.2";
name = "enhanced-ctorrent";

src = fetchurl {
url = "http://www.rahul.net/dholmes/ctorrent/ctorrent-dnh3.3.2.tar.gz";
sha256 = "0qs8waqwllk56i3yy3zhncy7nsnhmf09a494p5siz4vm2k4ncwy8";
};

# These patches come from Debian and fix CVE-2009-1759.
patches = [
(fetchpatch {
url = "https://sources.debian.org/data/main/c/ctorrent/1.3.4.dnh3.3.2-5/debian/patches/cve-security-fix.diff";
sha256 = "1qkzzm8sfspbcs10azmmif4qcr7pr8r38dsa2py84lsjm1yi3kls";
})
(fetchpatch {
url = "https://sources.debian.org/data/main/c/ctorrent/1.3.4.dnh3.3.2-5/debian/patches/FTBFS-fix.diff";
sha256 = "1m3zh96xwqjjzsbg62f7kx0miams58nys1f484qhdn870b5x9p06";
})
];

meta = {
description = "BitTorrent client written in C++";
longDescription = ''
5 changes: 3 additions & 2 deletions pkgs/development/compilers/rust/default.nix
Original file line number Diff line number Diff line change
@@ -20,10 +20,11 @@ in rec {

configureFlags = [ "--release-channel=stable" ];

# Upstream is not running tests on aarch64:
# 1. Upstream is not running tests on aarch64:
# see https://github.com/rust-lang/rust/issues/49807#issuecomment-380860567
# So we do the same.
doCheck = !stdenv.isAarch64;
# 2. Tests run out of memory for i686
doCheck = !stdenv.isAarch64 && !stdenv.isi686;

patches = [
./patches/0001-Disable-fragile-tests-libstd-net-tcp-on-Darwin-Linux.patch
3 changes: 2 additions & 1 deletion pkgs/development/libraries/cyrus-sasl/default.nix
Original file line number Diff line number Diff line change
@@ -22,7 +22,8 @@ stdenv.mkDerivation rec {

patches = [
./missing-size_t.patch # https://bugzilla.redhat.com/show_bug.cgi?id=906519
(fetchpatch { # CVE-2013-4122
(fetchpatch {
name = "CVE-2013-4122.patch";
url = "http://sourceforge.net/projects/miscellaneouspa/files/glibc217/cyrus-sasl-2.1.26-glibc217-crypt.diff";
sha256 = "05l7dh1w9d5fvzg0pjwzqh0fy4ah8y5cv6v67s4ssbq8xwd4pkf2";
})
4 changes: 2 additions & 2 deletions pkgs/development/libraries/exempi/default.nix
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
{ stdenv, fetchurl, expat, zlib, boost, libiconv, darwin }:

stdenv.mkDerivation rec {
name = "exempi-2.4.4";
name = "exempi-2.4.5";

src = fetchurl {
url = "http://libopenraw.freedesktop.org/download/${name}.tar.bz2";
sha256 = "1c1xxiw9lazdaz4zvrnvcy9pif9l1wib7zy91m48i7a4bnf9mmd2";
sha256 = "07i29xmg8bqriviaf4vi1mwha4lrw85kfla29cfym14fp3z8aqa0";
};

configureFlags = [
6 changes: 5 additions & 1 deletion pkgs/development/libraries/farbfeld/default.nix
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{ stdenv, fetchgit, libpng, libjpeg }:
{ stdenv, fetchgit, makeWrapper, file, libpng, libjpeg }:

stdenv.mkDerivation rec {
name = "farbfeld-${version}";
@@ -11,8 +11,12 @@ stdenv.mkDerivation rec {
};

buildInputs = [ libpng libjpeg ];
nativeBuildInputs = [ makeWrapper ];

installFlags = "PREFIX=/ DESTDIR=$(out)";
postInstall = ''
wrapProgram "$out/bin/2ff" --prefix PATH : "${file}/bin"
'';

meta = with stdenv.lib; {
description = "Suckless image format with conversion tools";
18 changes: 17 additions & 1 deletion pkgs/development/libraries/glibc/common.nix
Original file line number Diff line number Diff line change
@@ -1,5 +1,21 @@
/* Build configuration used to build glibc, Info files, and locale
information. */
information.
Note that this derivation has multiple outputs and does not respect the
standard convention of putting the executables into the first output. The
first output is `lib` so that the libraries provided by this derivation
can be accessed directly, e.g.
"${pkgs.glibc}/lib/ld-linux-x86_64.so.2"
The executables are put into `bin` output and need to be referenced via
the `bin` attribute of the main package, e.g.
"${pkgs.glibc.bin}/bin/ldd".
The executables provided by glibc typically include `ldd`, `locale`, `iconv`
but the exact set depends on the library version and the configuration.
*/

{ stdenv, lib
, buildPlatform, hostPlatform
2 changes: 1 addition & 1 deletion pkgs/development/libraries/jasper/default.nix
Original file line number Diff line number Diff line change
@@ -12,8 +12,8 @@ stdenv.mkDerivation rec {
};

patches = [
# Fixes CVE-2018-9055
(fetchpatch {
name = "CVE-2018-9055.patch";
url = "http://paste.opensuse.org/view/raw/330751ce";
sha256 = "0m798m6c4v9yyhql7x684j5kppcm6884n1rrb9ljz8p9aqq2jqnm";
})
3 changes: 2 additions & 1 deletion pkgs/development/libraries/libimobiledevice/default.nix
Original file line number Diff line number Diff line change
@@ -10,7 +10,8 @@ stdenv.mkDerivation rec {

patches = [
./disable_sslv3.patch
(fetchpatch { # CVE-2016-5104
(fetchpatch {
name = "CVE-2016-5104.patch";
url = "https://github.com/libimobiledevice/libimobiledevice/commit/df1f5c4d70d0c19ad40072f5246ca457e7f9849e.patch";
sha256 = "06ygb9aqcvm4v08wrldsddjgyqv5bkpq6lxzq2a1nwqp9mq4a4k1";
})
3 changes: 2 additions & 1 deletion pkgs/development/libraries/libusbmuxd/default.nix
Original file line number Diff line number Diff line change
@@ -8,7 +8,8 @@ stdenv.mkDerivation rec {
};

patches = [
(fetchpatch { # CVE-2016-5104
(fetchpatch {
name = "CVE-2016-5104.patch";
url = "https://github.com/libimobiledevice/libusbmuxd/commit/4397b3376dc4e4cb1c991d0aed61ce6482614196.patch";
sha256 = "0cl3vys7bkwbdzf64d0rz3zlqpfc30w4l7j49ljv01agh42ywhgk";
})
4 changes: 2 additions & 2 deletions pkgs/development/tools/build-managers/gradle/default.nix
Original file line number Diff line number Diff line change
@@ -52,12 +52,12 @@ rec {
};

gradle_latest = gradleGen rec {
name = "gradle-4.6";
name = "gradle-4.7";
nativeVersion = "0.14";

src = fetchurl {
url = "http://services.gradle.org/distributions/${name}-bin.zip";
sha256 = "05drn7a9d2blbmd3l0443bpf5qzf5frwnl9ww0bha1qfng95zgcq";
sha256 = "016vvjvk3gfasv3h6dxxp48kp9v4ariqj280bijn835mr1yhi9gw";
};
};

4 changes: 3 additions & 1 deletion pkgs/os-specific/linux/zfs/default.nix
Original file line number Diff line number Diff line change
@@ -4,6 +4,7 @@

# Userspace dependencies
, zlib, libuuid, python, attr, openssl
, nfs-utils

# Kernel dependencies
, kernel ? null, spl ? null, splUnstable ? null, splLegacyCrypto ? null
@@ -61,6 +62,7 @@ let
substituteInPlace ./module/zfs/zfs_ctldir.c --replace "mount -t zfs" "${utillinux}/bin/mount -t zfs"
substituteInPlace ./lib/libzfs/libzfs_mount.c --replace "/bin/umount" "${utillinux}/bin/umount"
substituteInPlace ./lib/libzfs/libzfs_mount.c --replace "/bin/mount" "${utillinux}/bin/mount"
substituteInPlace ./lib/libshare/nfs.c --replace "/usr/sbin/exportfs" "${nfs-utils}/bin/exportfs"
substituteInPlace ./cmd/ztest/ztest.c --replace "/usr/sbin/ztest" "$out/sbin/ztest"
substituteInPlace ./cmd/ztest/ztest.c --replace "/usr/sbin/zdb" "$out/sbin/zdb"
substituteInPlace ./config/user-systemd.m4 --replace "/usr/lib/modules-load.d" "$out/etc/modules-load.d"
@@ -146,7 +148,7 @@ in {
# to be adapted
zfsStable = common {
# comment/uncomment if breaking kernel versions are known
incompatibleKernelVersion = null;
incompatibleKernelVersion = "4.16";

# this package should point to the latest release.
version = "0.7.8";
6 changes: 3 additions & 3 deletions pkgs/servers/x11/xorg/default.nix
Original file line number Diff line number Diff line change
@@ -848,11 +848,11 @@ let
}) // {inherit libX11 xextproto xproto ;};

libXfixes = (mkDerivation "libXfixes" {
name = "libXfixes-5.0.2";
name = "libXfixes-5.0.3";
builder = ./builder.sh;
src = fetchurl {
url = mirror://xorg/individual/lib/libXfixes-5.0.2.tar.bz2;
sha256 = "1slsk898386xii0r3l7szwwq3s6y2m4dsj0x93ninjh8xkghxllv";
url = mirror://xorg/individual/lib/libXfixes-5.0.3.tar.bz2;
sha256 = "1miana3y4hwdqdparsccmygqr3ic3hs5jrqfzp70hvi2zwxd676y";
};
nativeBuildInputs = [ pkgconfig ];
buildInputs = [ fixesproto libX11 xextproto xproto ];
4 changes: 2 additions & 2 deletions pkgs/tools/package-management/nix/default.nix
Original file line number Diff line number Diff line change
@@ -132,10 +132,10 @@ in rec {
}) // { perl-bindings = nixStable; };

nixStable = (common rec {
name = "nix-2.0";
name = "nix-2.0.1";
src = fetchurl {
url = "http://nixos.org/releases/nix/${name}/${name}.tar.xz";
sha256 = "7024d327314bf92c1d3e6cccd944929828a44b24093954036bfb0115a92f5a14";
sha256 = "689c33b9885b56b7817bf94aad3bc7ccf50710ebb34b01c5a5a2ac4e472750b1";
};
}) // { perl-bindings = perl-bindings { nix = nixStable; }; };