diff --git a/nixos/doc/manual/installation/installing-virtualbox-guest.xml b/nixos/doc/manual/installation/installing-virtualbox-guest.xml
index 1cffeed4807..4957b700946 100644
--- a/nixos/doc/manual/installation/installing-virtualbox-guest.xml
+++ b/nixos/doc/manual/installation/installing-virtualbox-guest.xml
@@ -83,7 +83,7 @@
VirtualBox settings (Machine / Settings / Shared Folders, then click on the
"Add" icon). Add the following to the
/etc/nixos/configuration.nix to auto-mount them. If you do
- not add "nofail", the system will no boot properly. The
+ not add "nofail", the system will not boot properly. The
same goes for disabling rngd which is normally used to get
randomness but this does not work in virtual machines.
diff --git a/nixos/modules/virtualisation/qemu-vm.nix b/nixos/modules/virtualisation/qemu-vm.nix
index 447d1f091c8..b66ac144186 100644
--- a/nixos/modules/virtualisation/qemu-vm.nix
+++ b/nixos/modules/virtualisation/qemu-vm.nix
@@ -605,6 +605,10 @@ in
virtualisation.bootDevice = mkDefault (driveDeviceName 1);
+ virtualisation.useEFIBoot = mkDefault
+ (config.boot.loader.systemd-boot.enable ||
+ config.boot.loader.efi.canTouchEfiVariables);
+
virtualisation.pathsInNixDB = [ config.system.build.toplevel ];
# FIXME: Consolidate this one day.
diff --git a/nixos/tests/systemd-boot.nix b/nixos/tests/systemd-boot.nix
index 7a663dd9b42..a37c87bccc2 100644
--- a/nixos/tests/systemd-boot.nix
+++ b/nixos/tests/systemd-boot.nix
@@ -9,7 +9,6 @@ with pkgs.lib;
let
common = {
virtualisation.useBootLoader = true;
- virtualisation.useEFIBoot = true;
boot.loader.systemd-boot.enable = true;
boot.loader.efi.canTouchEfiVariables = true;
environment.systemPackages = [ pkgs.efibootmgr ];
diff --git a/pkgs/applications/misc/keystore-explorer/default.nix b/pkgs/applications/misc/keystore-explorer/default.nix
new file mode 100644
index 00000000000..613b96d1731
--- /dev/null
+++ b/pkgs/applications/misc/keystore-explorer/default.nix
@@ -0,0 +1,40 @@
+{ fetchzip, stdenv, jdk8, runtimeShell }:
+
+stdenv.mkDerivation rec {
+ version = "5.4.4";
+ pname = "keystore-explorer";
+ src = fetchzip {
+ url = "https://github.com/kaikramer/keystore-explorer/releases/download/v${version}/kse-544.zip";
+ sha256 = "01kpa8g6p6vcqq9y70w5bm8jbw4kp55pbywj2zrhgjibrhgjqi0b";
+ };
+
+ installPhase = ''
+ runHook preInstall
+
+ mkdir -p $out/bin
+ mkdir -p $out/share/keystore-explorer
+ cp -R icons licenses lib kse.jar $out/share/keystore-explorer/
+
+ # keystore-explorer's kse.sh tries to detect the path of Java by using
+ # Python on Darwin; just write our own start script to avoid unnecessary dependencies
+ cat > $out/bin/keystore-explorer < $out/share/applications/steam.desktop
+ ln -s ${steam}/share/applications/steam.desktop $out/share/applications/steam.desktop
'';
profile = ''
@@ -261,6 +272,7 @@ in buildFHSUserEnv rec {
fi
fi
${lib.optionalString (!nativeOnly) exportLDPath}
+ ${fixBootstrap}
exec steam "$@"
'';
@@ -287,6 +299,7 @@ in buildFHSUserEnv rec {
fi
shift
${lib.optionalString (!nativeOnly) exportLDPath}
+ ${fixBootstrap}
exec -- "$run" "$@"
'';
};
diff --git a/pkgs/games/steam/steam.nix b/pkgs/games/steam/steam.nix
index 20ccba641e4..fa99f39d68c 100644
--- a/pkgs/games/steam/steam.nix
+++ b/pkgs/games/steam/steam.nix
@@ -2,7 +2,7 @@
let
traceLog = "/tmp/steam-trace-dependencies.log";
- version = "1.0.0.61";
+ version = "1.0.0.68";
in stdenv.mkDerivation {
pname = "steam-original";
@@ -10,7 +10,7 @@ in stdenv.mkDerivation {
src = fetchurl {
url = "https://repo.steampowered.com/steam/pool/steam/s/steam/steam_${version}.tar.gz";
- sha256 = "0c5xy57gwr14vp3wy3jpqi5dl6y7n01p2dy4jlgl9bf9x7616r6n";
+ sha256 = "sha256-ZeiCYjxnH0Ath5bB20QHmE8R3wU4/3RiAw2NUhrrKNM=";
};
makeFlags = [ "DESTDIR=$(out)" "PREFIX=" ];
@@ -26,14 +26,16 @@ in stdenv.mkDerivation {
EOF
chmod +x $out/bin/steamdeps
''}
- install -d $out/lib/udev/rules.d
- install -m644 lib/udev/rules.d/*.rules $out/lib/udev/rules.d
+
+ # this just installs a link, "steam.desktop -> /lib/steam/steam.desktop"
+ rm $out/share/applications/steam.desktop
+ sed -e 's,/usr/bin/steam,steam,g' steam.desktop > $out/share/applications/steam.desktop
'';
meta = with stdenv.lib; {
description = "A digital distribution platform";
homepage = "http://store.steampowered.com/";
license = licenses.unfreeRedistributable;
- maintainers = with maintainers; [ jagajaga ];
+ maintainers = with maintainers; [ jagajaga jonringer ];
};
}
diff --git a/pkgs/os-specific/linux/kernel/linux-zen.nix b/pkgs/os-specific/linux/kernel/linux-zen.nix
index 5ac81d6ebb9..fd06b2f8217 100644
--- a/pkgs/os-specific/linux/kernel/linux-zen.nix
+++ b/pkgs/os-specific/linux/kernel/linux-zen.nix
@@ -1,7 +1,7 @@
{ stdenv, fetchFromGitHub, buildLinux, ... } @ args:
let
- version = "5.9.14";
+ version = "5.10.1";
in
buildLinux (args // {
@@ -13,11 +13,11 @@ buildLinux (args // {
owner = "zen-kernel";
repo = "zen-kernel";
rev = "v${version}-zen1";
- sha256 = "1b8pm80z49d7qk9mvdf9w3hih34pilqr1zjk110q5im1kdz81zrg";
+ sha256 = "1c77x53ixyn64b4qq6br6ckicmjs316c8k08yfxibmhv72av1wcp";
};
extraMeta = {
- branch = "5.9/master";
+ branch = "5.10/master";
maintainers = with stdenv.lib.maintainers; [ atemu andresilva ];
};
diff --git a/pkgs/os-specific/linux/libpsm2/default.nix b/pkgs/os-specific/linux/libpsm2/default.nix
index b9e41380da8..501453b8821 100644
--- a/pkgs/os-specific/linux/libpsm2/default.nix
+++ b/pkgs/os-specific/linux/libpsm2/default.nix
@@ -2,8 +2,7 @@
stdenv.mkDerivation rec {
pname = "libpsm2";
- version = "11.2.156";
- ifs_version = "10_10_2_0_44";
+ version = "11.2.185";
preConfigure= ''
export UDEVDIR=$out/etc/udev
@@ -14,7 +13,7 @@ stdenv.mkDerivation rec {
buildInputs = [ numactl pkgconfig ];
- installFlags = [
+ installFlags = [
"DESTDIR=$(out)"
"UDEVDIR=/etc/udev"
"LIBPSM2_COMPAT_CONF_DIR=/etc"
@@ -23,8 +22,8 @@ stdenv.mkDerivation rec {
src = fetchFromGitHub {
owner = "intel";
repo = "opa-psm2";
- rev = "IFS_RELEASE_${ifs_version}";
- sha256 = "0ckrfzih1ga9yvximxjdh0z05kn9l858ykqiblv18w6ka3gra1xz";
+ rev = "PSM2_${version}";
+ sha256 = "062hg4r6gz7pla9df70nqs5i2a3mp1wszmp4l0g771fykhhrxsjg";
};
postInstall = ''
diff --git a/pkgs/tools/filesystems/glusterfs/default.nix b/pkgs/tools/filesystems/glusterfs/default.nix
index f495b56e325..a4e6bc1182b 100644
--- a/pkgs/tools/filesystems/glusterfs/default.nix
+++ b/pkgs/tools/filesystems/glusterfs/default.nix
@@ -1,25 +1,17 @@
-{stdenv, fetchurl, fuse, bison, flex_2_5_35, openssl, python3, ncurses, readline,
+{stdenv, fetchFromGitHub, fuse, bison, flex_2_5_35, openssl, python3, ncurses, readline,
autoconf, automake, libtool, pkgconfig, zlib, libaio, libxml2, acl, sqlite,
liburcu, attr, makeWrapper, coreutils, gnused, gnugrep, which,
openssh, gawk, findutils, util-linux, lvm2, btrfs-progs, e2fsprogs, xfsprogs, systemd,
rsync, glibc, rpcsvc-proto, libtirpc
}:
let
- s =
- rec {
- baseName="glusterfs";
- # NOTE: On each glusterfs release, it should be checked if gluster added
- # new, or changed, Python scripts whose PYTHONPATH has to be set in
- # `postFixup` below, and whose runtime deps need to go into
- # `nativeBuildInputs`.
- # The command
- # find /nix/store/...-glusterfs-.../ -name '*.py' -executable
- # can help with finding new Python scripts.
- version = "7.6";
- name="${baseName}-${version}";
- url="https://github.com/gluster/glusterfs/archive/v${version}.tar.gz";
- sha256 = "0zdcv2jk8dp67id8ic30mkn97ccp07jf20g7v09a5k31pw9aqyih";
- };
+ # NOTE: On each glusterfs release, it should be checked if gluster added
+ # new, or changed, Python scripts whose PYTHONPATH has to be set in
+ # `postFixup` below, and whose runtime deps need to go into
+ # `nativeBuildInputs`.
+ # The command
+ # find /nix/store/...-glusterfs-.../ -name '*.py' -executable
+ # can help with finding new Python scripts.
buildInputs = [
fuse bison flex_2_5_35 openssl ncurses readline
@@ -60,16 +52,17 @@ let
which # which
xfsprogs # xfs_info
];
-in
-stdenv.mkDerivation
-{
- inherit (s) name version;
- inherit buildInputs propagatedBuildInputs;
+in stdenv.mkDerivation rec {
+ pname = "glusterfs";
+ version = "8.3";
- patches = [
- # Remove when https://bugzilla.redhat.com/show_bug.cgi?id=1489610 is fixed
- ./glusterfs-fix-bug-1489610-glusterfind-var-data-under-prefix.patch
- ];
+ src = fetchFromGitHub {
+ owner = "gluster";
+ repo = pname;
+ rev = "v${version}";
+ sha256 = "09vvbymiacz2pzwnq6f2dd7g2zszzsivdncz45sh977v3z0n84az";
+ };
+ inherit buildInputs propagatedBuildInputs;
postPatch = ''
sed -e '/chmod u+s/d' -i contrib/fuse-util/Makefile.am
@@ -91,7 +84,7 @@ stdenv.mkDerivation
# but fails when the version is empty.
# See upstream GlusterFS bug https://bugzilla.redhat.com/show_bug.cgi?id=1452705
preConfigure = ''
- echo "v${s.version}" > VERSION
+ echo "v${version}" > VERSION
./autogen.sh
export PYTHON=${python3}/bin/python
'';
@@ -109,7 +102,7 @@ stdenv.mkDerivation
postInstall = ''
cp -r $out/$out/* $out
rm -r $out/nix
- '';
+ '';
postFixup = ''
# glusterd invokes `gluster` and other utilities when telling other glusterd nodes to run commands.
@@ -153,7 +146,7 @@ stdenv.mkDerivation
wrapProgram $out/share/glusterfs/scripts/eventsdash.py --set PATH "$GLUSTER_PATH" --set PYTHONPATH "$GLUSTER_PYTHONPATH" --set LD_LIBRARY_PATH "$GLUSTER_LD_LIBRARY_PATH"
wrapProgram $out/libexec/glusterfs/glusterfind/brickfind.py --set PATH "$GLUSTER_PATH" --set PYTHONPATH "$GLUSTER_PYTHONPATH" --set LD_LIBRARY_PATH "$GLUSTER_LD_LIBRARY_PATH"
wrapProgram $out/libexec/glusterfs/glusterfind/changelog.py --set PATH "$GLUSTER_PATH" --set PYTHONPATH "$GLUSTER_PYTHONPATH" --set LD_LIBRARY_PATH "$GLUSTER_LD_LIBRARY_PATH"
- '';
+ '';
doInstallCheck = true;
@@ -187,12 +180,7 @@ stdenv.mkDerivation
rm -r $out/bin/conf.py
'';
- src = fetchurl {
- inherit (s) url sha256;
- };
-
meta = with stdenv.lib; {
- inherit (s) version;
description = "Distributed storage system";
homepage = "https://www.gluster.org";
license = licenses.lgpl3Plus; # dual licese: choice of lgpl3Plus or gpl2
diff --git a/pkgs/tools/filesystems/glusterfs/glusterfs-fix-bug-1489610-glusterfind-var-data-under-prefix.patch b/pkgs/tools/filesystems/glusterfs/glusterfs-fix-bug-1489610-glusterfind-var-data-under-prefix.patch
deleted file mode 100644
index f08d73cf3a6..00000000000
--- a/pkgs/tools/filesystems/glusterfs/glusterfs-fix-bug-1489610-glusterfind-var-data-under-prefix.patch
+++ /dev/null
@@ -1,27 +0,0 @@
-From f523afac49e24ecc0fa4ad85195135689cf445f0 Mon Sep 17 00:00:00 2001
-From: =?UTF-8?q?Niklas=20Hamb=C3=BCchen?=
-Date: Wed, 27 Sep 2017 21:36:41 +0200
-Subject: [PATCH] Fix "glusterfind saves var data under $prefix instead of
- localstatedir". Fixes #1489610
-
-Change-Id: Id2362c20f34346c37acfb9eb1ad105d0b7b8b60f
----
- configure.ac | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/configure.ac b/configure.ac
-index f87d8a454..b4d3f5d10 100644
---- a/configure.ac
-+++ b/configure.ac
-@@ -1118,7 +1118,7 @@ if test "x$exec_prefix" = xNONE; then
- exec_prefix="$(eval echo $prefix)"
- fi
- GLUSTERFS_LIBEXECDIR="$(eval echo $libexecdir)/glusterfs"
--GLUSTERFSD_MISCDIR="$(eval echo $prefix)/var/lib/misc/glusterfsd"
-+GLUSTERFSD_MISCDIR="$(eval echo $localstatedir)/lib/misc/glusterfsd"
- prefix=$old_prefix
- exec_prefix=$old_exec_prefix
-
---
-2.12.0
-
diff --git a/pkgs/tools/security/neopg/default.nix b/pkgs/tools/security/neopg/default.nix
index 4f4f660e20f..8c0d31853ff 100644
--- a/pkgs/tools/security/neopg/default.nix
+++ b/pkgs/tools/security/neopg/default.nix
@@ -44,5 +44,6 @@ stdenv.mkDerivation rec {
'';
maintainers = with maintainers; [ erictapen ];
platforms = platforms.linux;
+ broken = true; # fails to build with recent versions of botan. https://github.com/das-labor/neopg/issues/98
};
}
diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix
index d92ba58a7e8..9e4bb224e23 100644
--- a/pkgs/top-level/all-packages.nix
+++ b/pkgs/top-level/all-packages.nix
@@ -5091,6 +5091,8 @@ in
keyfuzz = callPackage ../tools/inputmethods/keyfuzz { };
+ keystore-explorer = callPackage ../applications/misc/keystore-explorer { };
+
kibana6 = callPackage ../development/tools/misc/kibana/6.x.nix { };
kibana6-oss = callPackage ../development/tools/misc/kibana/6.x.nix {
enableUnfree = false;
@@ -9033,6 +9035,8 @@ in
fasmg = callPackage ../development/compilers/fasmg { };
+ flasm = callPackage ../development/compilers/flasm { };
+
flyctl = callPackage ../development/web/flyctl { };
flutterPackages =
@@ -10553,19 +10557,16 @@ in
octave = callPackage ../development/interpreters/octave {
python = python3;
mkDerivation = stdenv.mkDerivation;
- jdk = jdk8; # TODO: remove override https://github.com/NixOS/nixpkgs/pull/89731
};
octave-jit = callPackage ../development/interpreters/octave {
python = python3;
enableJIT = true;
mkDerivation = stdenv.mkDerivation;
- jdk = jdk8; # TODO: remove override https://github.com/NixOS/nixpkgs/pull/89731
};
octaveFull = libsForQt5.callPackage ../development/interpreters/octave {
python = python3;
enableQt = true;
overridePlatforms = ["x86_64-linux" "x86_64-darwin"];
- jdk = jdk8; # TODO: remove override https://github.com/NixOS/nixpkgs/pull/89731
};
ocropus = callPackage ../applications/misc/ocropus { };
@@ -16017,6 +16018,8 @@ in
soapyairspy = callPackage ../applications/radio/soapyairspy { };
+ soapyaudio = callPackage ../applications/radio/soapyaudio { };
+
soapybladerf = callPackage ../applications/radio/soapybladerf { };
soapyhackrf = callPackage ../applications/radio/soapyhackrf { };
@@ -16029,6 +16032,7 @@ in
extraPackages = [
limesuite
soapyairspy
+ soapyaudio
soapybladerf
soapyhackrf
soapyremote
@@ -16184,10 +16188,6 @@ in
python = python3;
};
- sundials_2 = callPackage ../development/libraries/sundials/2.x.nix {
- python = python3;
- };
-
sutils = callPackage ../tools/misc/sutils { };
svrcore = callPackage ../development/libraries/svrcore { };
diff --git a/pkgs/top-level/release-alternatives.nix b/pkgs/top-level/release-alternatives.nix
index 7479377bd30..5e309a0129c 100644
--- a/pkgs/top-level/release-alternatives.nix
+++ b/pkgs/top-level/release-alternatives.nix
@@ -9,7 +9,7 @@ let
blasUsers = [
# "julia_07" "julia_10" "julia_11" "julia_13" "octave" "octaveFull"
"fflas-ffpack" "linbox" "R" "ipopt" "hpl" "rspamd" "octopus"
- "sundials" "sundials_2" "superlu" "suitesparse_5_3" "suitesparse_4_4"
+ "sundials" "superlu" "suitesparse_5_3" "suitesparse_4_4"
"suitesparse_4_2" "scs" "scalapack" "petsc" "cholmod-extra"
"arpack" "qrupdate" "libcint" "iml" "globalarrays" "arrayfire" "armadillo"
"xfitter" "lammps" "plink-ng" "quantum-espresso" "siesta"