id stringlengths 4 10 | text stringlengths 4 2.14M | source stringclasses 2
values | created timestamp[s]date 2001-05-16 21:05:09 2025-01-01 03:38:30 | added stringdate 2025-04-01 04:05:38 2025-04-01 07:14:06 | metadata dict |
|---|---|---|---|---|---|
2056107540 | Idea
Change how Input is taken and basically stay TM Start Python and ask for the name instead of passing name and just use fgets() so that way functionality is better and can get away with a more cleaner input layout and down road change it
Idea behind TM "ls -l" is someone can run this and it save the output to a file of their choice due top the logs and this helps for searching or maybe security.
| gharchive/issue | 2023-12-26T07:07:48 | 2025-04-01T04:32:52.239185 | {
"authors": [
"NineTailSecurity"
],
"repo": "NineTailSecurity/PM2-Replacement",
"url": "https://github.com/NineTailSecurity/PM2-Replacement/issues/4",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1954022070 | Clarify Courier Assignment Logic and Enable Dedicated Couriers in Enatega Mulitvendor web.
Issue: Clarify Courier Assignment Logic and Enable Dedicated Couriers
Description:
There is a lack of clarity regarding the logic for courier assignment when multiple orders are involved, particularly in zones or cities with several couriers. It's essential to define how orders are assigned to couriers, whether based on proximity to restaurants or other factors. Additionally, we need to implement a feature that allows for the allocation of dedicated couriers to specific restaurants.
Impact:
Efficiency: An unclear courier assignment logic may lead to inefficiencies in order fulfillment.
User Expectations: Users and restaurant owners expect transparency in how orders are assigned to couriers.
Steps to Reproduce:
Observe the courier assignment process when multiple orders are involved.
Attempt to determine the factors that influence courier assignment.
Investigate whether there is a feature to allocate dedicated couriers to specific restaurants.
Expected Resolution:
You should clarify the logic for courier assignment when multiple orders are involved, ensuring transparency and efficiency in the process. Additionally, You need to implement a feature that allows administrators to allocate dedicated couriers to specific restaurants, improving the management of orders and deliveries. Addressing these issues will enhance order fulfillment and user satisfaction.
Riders receive multiple orders from various restaurants within their assigned zone.
We already explained how the zones work with riders and restaurants
Zones and Riders
| gharchive/issue | 2023-10-20T10:41:45 | 2025-04-01T04:32:52.243325 | {
"authors": [
"MuhammadAdnan111",
"Sohailqureshi9"
],
"repo": "Ninjas-Code-official/Enatega-Multivendor-Food-Delivery-Solution",
"url": "https://github.com/Ninjas-Code-official/Enatega-Multivendor-Food-Delivery-Solution/issues/61",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
2330433156 | Rename executors to orchestrators
Orchestrator is a better word. Executor is convoluted in the AI world.
Tasks for Android and Web.
[x] Rename repos
[ ] Update docs with the new convention
[ ] Take our releases with new names
Preet to update as part of release
Docs update to be done by Karan
| gharchive/issue | 2024-06-03T07:54:46 | 2025-04-01T04:32:52.245163 | {
"authors": [
"karntrehan",
"rohitsamagra"
],
"repo": "NipunSahAIyak/.github",
"url": "https://github.com/NipunSahAIyak/.github/issues/15",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
391848675 | troyent
prac
ay
| gharchive/pull-request | 2018-12-17T19:03:34 | 2025-04-01T04:32:52.245868 | {
"authors": [
"Niqtroy"
],
"repo": "Niqtroy/github-slideshow",
"url": "https://github.com/Niqtroy/github-slideshow/pull/4",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1110445162 | Remove firmware file from version control
This patch removes a firmware file that was accidentally added to
version control.
It right there in the beginning, but maybe not that much visible on the PR's view:
https://github.com/Nitrokey/pynitrokey/pull/151/files
Will keep in mind to look for that in the future.
Yeah, I tested the nitropy nk3 fetch-update command with the cwd and forgot to remove the file before git add . :facepalm:
| gharchive/pull-request | 2022-01-21T13:01:44 | 2025-04-01T04:32:52.255104 | {
"authors": [
"robin-nitrokey",
"szszszsz"
],
"repo": "Nitrokey/pynitrokey",
"url": "https://github.com/Nitrokey/pynitrokey/pull/159",
"license": "Apache-2.0",
"license_type": "permissive",
"license_source": "github-api"
} |
737289958 | Ferdi half working
Describe the bug
Ferdi crashes when started elsewhere than a nix-shell --pure
To Reproduce
Steps to reproduce the behavior:
use the official Ferdi AppImage https://github.com/getferdi/ferdi/releases/download/v5.5.0/Ferdi-5.5.0.AppImage
configure services
close it
i'm not sure, if this first part does anything for this issue
nix-shell --packages ferdi --command ferdi crashes after displaying this message
(electron) The default value of app.allowRendererProcessReuse is deprecated, it is currently "false". It will change to be "true" in Electron 9. For more information please check https://github.com/electron/electron/issues/18397
Expected behavior
Ferdi should be usable without nix-shell's option --pure
Additional context
I used to use Ferdi from there official AppImage (because it was not available for Nix when i looked for it)
With the --pure option, it works
nix-shell --pure --packages ferdi --command ferdi
(electron) The default value of app.allowRendererProcessReuse is deprecated, it is currently "false". It will change to be "true" in Electron 9. For more information please check https://github.com/electron/electron/issues/18397
(node:15488) DeprecationWarning: Passing functions, DOM objects and other non-cloneable JavaScript objects to IPC methods is deprecated and will throw an exception beginning with Electron 9.
(node:15488) DeprecationWarning: Passing functions, DOM objects and other non-cloneable JavaScript objects to IPC methods is deprecated and will throw an exception beginning with Electron 9.
(node:15488) DeprecationWarning: Passing functions, DOM objects and other non-cloneable JavaScript objects to IPC methods is deprecated and will throw an exception beginning with Electron 9.
(node:15488) DeprecationWarning: Passing functions, DOM objects and other non-cloneable JavaScript objects to IPC methods is deprecated and will throw an exception beginning with Electron 9.
Notify maintainers
@davidtwco
Metadata
system: "x86_64-linux"
host os: Linux 5.4.72, NixOS, 20.09.1500.edb26126d98 (Nightingale)
multi-user?: yes
sandbox: yes
version: nix-env (Nix) 2.3.7
channels(pinage404): "home-manager-20.09, nixos-20.09.1599.d105075a1fd, nixos-unstable-21.03pre250162.34ad166a830"
channels(root): "nixos-20.09.1500.edb26126d98"
nixpkgs: /nix/var/nix/profiles/per-user/root/channels/nixos
Maintainer information:
# a list of nixpkgs attributes affected by the problem
attribute:
# a list of nixos modules affected by the problem
module: ferdi
# i think, i'm not sure how to fill this "field"
Just out of curiosity, I'm running it on my profile with the home-manager and I also have some bugs, for example, notification badges don't work, I can't disable notifications by service, yet I don't have "official" bugs like missing icons for example. When I have a bit of time I will try to track it down.
I can't say I've experienced either of these issues, but I'm running Ferdi 5.6.0-beta.2 locally, which might be making a difference:
self: super:
{
ferdi = super.ferdi.overrideAttrs (
old: rec {
version = "5.6.0-beta.2";
name = "${old.pname}-${version}";
src = super.fetchurl {
url = "https://github.com/getferdi/ferdi/releases/download/${version}/ferdi_${version}_amd64.deb";
sha256 = "0shd7p4v3dkkxzzdyi1zsh60330pxb7m0897lcr2367hr0a0j69s";
};
}
);
}
I'd upgrade the package in nixpkgs to this version as I've previously been told that nixpkgs should stick to stable releases.
I've updated my config with your snippet, it fixed my issue
I just did some quick tests after a heads up from @juanluisbaptiste in https://github.com/getferdi/ferdi/issues/780 and apparently my problems were solved.
While not updated on nixpkgs:
overlays = [
(self: super: {
ferdi = super.ferdi.overrideAttrs (old: rec {
version = "5.6.0-beta.5";
name = "${old.pname}-${version}";
src = super.fetchurl {
url =
"https://github.com/getferdi/ferdi/releases/download/v${version}/ferdi_${version}_amd64.deb";
# "https://github.com/getferdi/ferdi/releases/download/v5.6.0-beta.5/ferdi_5.6.0-beta.5_amd64.deb"
sha256 = "sha256-fDUzYir53OQ3O4o9eG70sGD+FJ0/4SDNsTfh97WFRnQ=";
};
});
})
];
};
I still need to test the notification badges, but it's for another issue.
Furthermore, as no one has reported any more problems, I am closing this issue.
| gharchive/issue | 2020-11-05T21:44:07 | 2025-04-01T04:32:52.283062 | {
"authors": [
"bryanasdev000",
"davidtwco",
"pinage404"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/issues/102969",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
115671147 | Rustc not supported on OS X?
I have the following default.nix
with import <nixpkgs> {}; {
rustNightlyEnv = stdenv.mkDerivation {
name = "rust-nightly-env";
shellHook = ''
export PS1="rust-nightly-env > "
'';
buildInputs = [
rustc
cargo
];
};
}
and when invoking nix-shell . I get
nix-shell .
error: Package ‘rustc-1.3.0’ in ‘/nix/store/vgzx25pwvfagwzadszixah6a7nwy5p0w-nixpkgs-16.03pre71191.a946805/nixpkgs/pkgs/development/compilers/rustc/generic.nix:62’ is not supported on ‘x86_64-darwin’, refusing to evaluate.
For `nixos-rebuild` you can set
{ nixpkgs.config.allowBroken = true; }
in configuration.nix to override this.
For `nix-env` you can add
{ allowBroken = true; }
to ~/.nixpkgs/config.nix.
(use ‘--show-trace’ to show detailed location information)
Is this a bug? How can I get rustc to work on OS X?
Well, apparently it isn't (yet). Which doesn't mean it won't just work, but it might need some changes (I don't know).
After stopping by the IRC channel, the issue was found to be with LLVM. First rustc/generic.nix line 65 was modified to platforms = platforms.all;. Similarly cargo was modified. I get the following errors:
error: linking with `cc` failed: exit code: 1
note: "cc" "-m64" "-L" "/private/var/folders/5d/pqjr3mqj0gqclvqx29wxzhfr0000gn/T/nix-build-rustc-1.4.0.drv-0/rustc-1.4.0-src.tar.gz/x86_64-apple-darwin/stage0/lib/rustlib/x86_64-apple-darwin/lib" "x86_64-apple-darwin/stage0/lib/rustlib/x86_64-apple-darwin/lib/rustc_llvm-1bf6e69c.0.o" "-o" "x86_64-apple-darwin/stage0/lib/rustlib/x86_64-apple-darwin/lib/librustc_llvm-1bf6e69c.dylib" "x86_64-apple-darwin/stage0/lib/rustlib/x86_64-apple-darwin/lib/rustc_llvm-1bf6e69c.metadata.o" "-Wl,-dead_strip" "-nodefaultlibs" "-L" "/private/var/folders/5d/pqjr3mqj0gqclvqx29wxzhfr0000gn/T/nix-build-rustc-1.4.0.drv-0/rustc-1.4.0-src.tar.gz/x86_64-apple-darwin/stage0/lib/rustlib/x86_64-apple-darwin/lib" "-l" "std-1bf6e69c" "-L" "x86_64-apple-darwin/rt" "-L" "/nix/store/lzpl4l44nrcn3k1d9yl48jwhcylb71c6-llvm-3.7.0/lib" "-L" "/private/var/folders/5d/pqjr3mqj0gqclvqx29wxzhfr0000gn/T/nix-build-rustc-1.4.0.drv-0/rustc-1.4.0-src.tar.gz/x86_64-apple-darwin/stage0/lib/rustlib/x86_64-apple-darwin/lib" "-L" "/private/var/folders/5d/pqjr3mqj0gqclvqx29wxzhfr0000gn/T/nix-build-rustc-1.4.0.drv-0/rustc-1.4.0-src.tar.gz/.rust/lib/x86_64-apple-darwin" "-L" "/private/var/folders/5d/pqjr3mqj0gqclvqx29wxzhfr0000gn/T/nix-build-rustc-1.4.0.drv-0/rustc-1.4.0-src.tar.gz/lib/x86_64-apple-darwin" "-Wl,-force_load,x86_64-apple-darwin/rt/librustllvm.a" "-l" "LLVMInterpreter" "-l" "LLVMMCJIT" "-l" "LLVMExecutionEngine" "-l" "LLVMRuntimeDyld" "-l" "LLVMAsmParser" "-l" "LLVMLinker" "-l" "LLVMBitWriter" "-l" "LLVMipo" "-l" "LLVMVectorize" "-l" "LLVMPowerPCDisassembler" "-l" "LLVMPowerPCCodeGen" "-l" "LLVMPowerPCAsmParser" "-l" "LLVMPowerPCDesc" "-l" "LLVMPowerPCInfo" "-l" "LLVMPowerPCAsmPrinter" "-l" "LLVMMipsDisassembler" "-l" "LLVMMipsCodeGen" "-l" "LLVMMipsAsmParser" "-l" "LLVMMipsDesc" "-l" "LLVMMipsInfo" "-l" "LLVMMipsAsmPrinter" "-l" "LLVMAArch64Disassembler" "-l" "LLVMAArch64CodeGen" "-l" "LLVMAArch64AsmParser" "-l" "LLVMAArch64Desc" "-l" "LLVMAArch64Info" "-l" "LLVMAArch64AsmPrinter" "-l" "LLVMAArch64Utils" "-l" "LLVMARMDisassembler" "-l" "LLVMARMCodeGen" "-l" "LLVMARMAsmParser" "-l" "LLVMARMDesc" "-l" "LLVMARMInfo" "-l" "LLVMARMAsmPrinter" "-l" "LLVMX86Disassembler" "-l" "LLVMX86AsmParser" "-l" "LLVMX86CodeGen" "-l" "LLVMSelectionDAG" "-l" "LLVMAsmPrinter" "-l" "LLVMCodeGen" "-l" "LLVMTarget" "-l" "LLVMScalarOpts" "-l" "LLVMProfileData" "-l" "LLVMInstCombine" "-l" "LLVMInstrumentation" "-l" "LLVMTransformUtils" "-l" "LLVMipa" "-l" "LLVMAnalysis" "-l" "LLVMX86Desc" "-l" "LLVMObject" "-l" "LLVMMCParser" "-l" "LLVMBitReader" "-l" "LLVMMCDisassembler" "-l" "LLVMX86Info" "-l" "LLVMX86AsmPrinter" "-l" "LLVMMC" "-l" "LLVMX86Utils" "-l" "LLVMCore" "-l" "LLVMSupport" "-l" "ncurses" "-l" "pthread" "-l" "z" "-l" "m" "-l" "c++" "-l" "System" "-l" "c" "-l" "m" "-dynamiclib" "-Wl,-dylib" "-Wl,-install_name,@rpath/librustc_llvm-1bf6e69c.dylib" "-Wl,-rpath,@loader_path/" "-Wl,-rpath,/usr/local/lib/rustlib/x86_64-apple-darwin/lib" "-l" "compiler-rt"
note: ld: warning: directory not found for option '-L/private/var/folders/5d/pqjr3mqj0gqclvqx29wxzhfr0000gn/T/nix-build-rustc-1.4.0.drv-0/rustc-1.4.0-src.tar.gz/.rust/lib/x86_64-apple-darwin'
ld: warning: directory not found for option '-L/private/var/folders/5d/pqjr3mqj0gqclvqx29wxzhfr0000gn/T/nix-build-rustc-1.4.0.drv-0/rustc-1.4.0-src.tar.gz/lib/x86_64-apple-darwin'
Undefined symbols for architecture x86_64:
"_ffi_type_double", referenced from:
llvm::Interpreter::callExternalFunction(llvm::Function*, llvm::ArrayRef<llvm::GenericValue>) in libLLVMInterpreter.a(ExternalFunctions.cpp.o)
"_ffi_type_pointer", referenced from:
llvm::Interpreter::callExternalFunction(llvm::Function*, llvm::ArrayRef<llvm::GenericValue>) in libLLVMInterpreter.a(ExternalFunctions.cpp.o)
"_ffi_type_sint16", referenced from:
llvm::Interpreter::callExternalFunction(llvm::Function*, llvm::ArrayRef<llvm::GenericValue>) in libLLVMInterpreter.a(ExternalFunctions.cpp.o)
"_ffi_type_void", referenced from:
llvm::Interpreter::callExternalFunction(llvm::Function*, llvm::ArrayRef<llvm::GenericValue>) in libLLVMInterpreter.a(ExternalFunctions.cpp.o)
"_ffi_type_sint64", referenced from:
llvm::Interpreter::callExternalFunction(llvm::Function*, llvm::ArrayRef<llvm::GenericValue>) in libLLVMInterpreter.a(ExternalFunctions.cpp.o)
"_ffi_prep_cif", referenced from:
llvm::Interpreter::callExternalFunction(llvm::Function*, llvm::ArrayRef<llvm::GenericValue>) in libLLVMInterpreter.a(ExternalFunctions.cpp.o)
"_ffi_type_sint32", referenced from:
llvm::Interpreter::callExternalFunction(llvm::Function*, llvm::ArrayRef<llvm::GenericValue>) in libLLVMInterpreter.a(ExternalFunctions.cpp.o)
"_ffi_type_sint8", referenced from:
llvm::Interpreter::callExternalFunction(llvm::Function*, llvm::ArrayRef<llvm::GenericValue>) in libLLVMInterpreter.a(ExternalFunctions.cpp.o)
"_ffi_type_float", referenced from:
llvm::Interpreter::callExternalFunction(llvm::Function*, llvm::ArrayRef<llvm::GenericValue>) in libLLVMInterpreter.a(ExternalFunctions.cpp.o)
"_ffi_call", referenced from:
llvm::Interpreter::callExternalFunction(llvm::Function*, llvm::ArrayRef<llvm::GenericValue>) in libLLVMInterpreter.a(ExternalFunctions.cpp.o)
ld: symbol(s) not found for architecture x86_64
clang-3.6: error: linker command failed with exit code 1 (use -v to see invocation)
error: aborting due to previous error
/private/var/folders/5d/pqjr3mqj0gqclvqx29wxzhfr0000gn/T/nix-build-rustc-1.4.0.drv-0/rustc-1.4.0-src.tar.gz/mk/target.mk:164: recipe for target 'x86_64-apple-darwin/stage0/lib/rustlib/x86_64-apple-darwin/lib/stamp.rustc_llvm' failed
make: *** [x86_64-apple-darwin/stage0/lib/rustlib/x86_64-apple-darwin/lib/stamp.rustc_llvm] Error 101
make: *** Waiting for unfinished jobs....
builder for ‘/nix/store/akqi1g0783qpf18gjn463a13xc8iz4wd-rustc-1.4.0.drv’ failed with exit code 2
error: build of ‘/nix/store/akqi1g0783qpf18gjn463a13xc8iz4wd-rustc-1.4.0.drv’ failed
/Users/user/.nix-profile/bin/nix-shell: failed to build all dependencies
@andrewrynhard @vcunat I have a fix for this but it's based on the sandbox-profiles branch and I'd like that to be merged in first. Just a couple changes are necessary:
Build llvm as a shared library on Darwin. This requires NIX_LDFLAGS = "-rpath ${llvm}/lib" to be added to packages that directly link with llvm, which right now are clang and rustc.
Allow impure dependencies on /bin/cat, /usr/lib/libedit.3.dylib, and /etc/hosts to rustc. These could all be edited out at some point but it's not worth the effort right now.
Some other non-obvious changes are required to get cargo working properly, and they'll be included in the commit that I eventually make to master (unless you want to cherry-pick my changes now, which I'm happy to make available).
@pikajude: I think I can wait for the merge into master. Got caught up with something else for now. Thanks for the fixes!
@pikajude have your changes been merged yet?
@andrewrynhard I created pull request here: https://github.com/NixOS/nixpkgs/pull/14870, which enables Rust Darwin compatibility. Would be good if you could test it :)
| gharchive/issue | 2015-11-07T14:55:16 | 2025-04-01T04:32:52.292464 | {
"authors": [
"andrewrynhard",
"pikajude",
"retrry",
"vcunat"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/issues/10864",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
21661383 | Provide buildGoPackage function with $GOPATH setuphook
Currently packaging Go software is ugly, see https://github.com/NixOS/nixpkgs/commit/f4aaced654579a3e795793189558302daca95ccb
This is done.
| gharchive/issue | 2013-10-27T22:00:17 | 2025-04-01T04:32:52.294372 | {
"authors": [
"domenkozar"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/issues/1131",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
24861120 | Purity problems with /bin/sh --- an example in NixPkgs
http://hydra.nixos.org/build/7380540/nixlog/1/raw
Symptom: SIGSEGV
Failed workarounds: build fails on Hydra, i.e. on NixOS with chroot builds.
Problem: build set LD_LIBRARY_PATH including glibc-2.18 /lib/. The make command used system() which called /bin/sh. /bin/sh is taken from something that existed at the beginning of the large build batch (either system or nix.conf). So it is linked against glibc-2.17. There seems to be some clash here...
This shows that system() impurity can bite us even under the ideal conditions: NixOS with chroot builds. Is it now a good idea to patch glibc?
Having thought about it a bit, I think the least intrusive/ugly solution is to have system() and popen() look for sh in $PATH, but only if we're in a Nix build. So basically to apply patch [1], but conditional at runtime on some environment variable like $NIX_STORE. This variable would have to be added to sysdeps/generic/unsecvars.h to prevent problems with setuid binaries. This approach would get rid of the dependency on /bin/sh in Nix builds, while circumventing the cyclic dependency between glibc and bash.
We would have to do something similar for gawk [2].
[1] https://gitorious.org/guix/guix/source/5d4fd2671aaadc5b0b7e0c331fa5e2a1d7e5c4d8:distro/packages/patches/glibc-bootstrap-system.patch
[2] https://gitorious.org/guix/guix/source/5d4fd2671aaadc5b0b7e0c331fa5e2a1d7e5c4d8:distro/packages/patches/gawk-shell.patch
@edolstra so during a build it calls sh and otherwise /bin/sh? Won't
that give purity problems outside builds (as well as hard-to-debug issues
when a different sh ends up in the path)?
If not /bin/sh, how do we get the full path to sh in glibc?
On Tue Jan 27 2015 at 12:17:06 PM Eelco Dolstra notifications@github.com
wrote:
Having thought about it a bit, I think the least intrusive/ugly solution
is to have system() and popen() look for sh in $PATH, but only if we're
in a Nix build. So basically to apply patch [1], but conditional at runtime
on some environment variable like $NIX_STORE. This variable would have to
be added to sysdeps/generic/unsecvars.h to prevent problems with setuid
binaries. This approach would get rid of the dependency on /bin/sh in Nix
builds, while circumventing the cyclic dependency between glibc and bash.
We would have to do something similar for gawk [2].
[1]
https://gitorious.org/guix/guix/source/5d4fd2671aaadc5b0b7e0c331fa5e2a1d7e5c4d8:distro/packages/patches/glibc-bootstrap-system.patch
[2]
https://gitorious.org/guix/guix/source/5d4fd2671aaadc5b0b7e0c331fa5e2a1d7e5c4d8:distro/packages/patches/gawk-shell.patch
—
Reply to this email directly or view it on GitHub
https://github.com/NixOS/nixpkgs/issues/1424#issuecomment-71630803.
Yes, so this would only change behaviour during builds.
I don't know, somehow using sh from PATH seems more troublesome than
creating a glibc+bash package (an approach that might also work on Darwin's
libSystem).
I was also thinking that it wouldn't solve
https://github.com/NixOS/nixpkgs/issues/2835 but that's just a matter of
running patchShebangs.
So basically I can't come up with any real objections :)
On Tue Jan 27 2015 at 1:14:00 PM Eelco Dolstra notifications@github.com
wrote:
Yes, so this would only change behaviour during builds.
—
Reply to this email directly or view it on GitHub
https://github.com/NixOS/nixpkgs/issues/1424#issuecomment-71638671.
Please read https://github.com/NixOS/nixpkgs/pull/4998#issuecomment-71816223 and comment here or there.
I have another approach to the glibc problem (that I was considering implementing for libSystem on darwin):
Patch your libc to not mention /bin/sh ,but instead to call a function (or just look at an external symbol) to find out what shell to use, and allow undefined symbols during linkage. Call this package rawLibc or something like it.
Have bash depend on rawLibc, but patch it to define the missing symbol for the shell, pointing to itself.
Make a wrapper package around rawLibc that depends on bash as well, and also defines the missing symbol to point at the bash in question. It then re-exports libc + the extra symbol and pretends to be a complete libc. On darwin, we have explicit re-exports of symbols, and on linux the glibc so can just be a linker script that points to rawLibc and the little shim that defines the symbol.
(triage) this looks like a bigger design problem, has a solution been found in the meantime?
I might have a general solution with https://github.com/NixOS/nix/issues/1080
@Ericson2314 https://github.com/NixOS/nixpkgs/pull/4998 already did basically your suggestion there, except all in one output instead of multiple outputs.
@shlevy yes in this case they are equivalent and I wish that had happened.
What is the status with this? Is this still unsolved?
Well, our glibc still includes a reference to /bin/sh
I dunno, maybe builds should be allowed to override parts of the chroot environment with store paths?
Well, this issue will probably still bite us ubt rarely.
One more option, I guess: sandbox could use a /bin/sh being a statically linked binary delegating to the sh mentioned in $NIX_BIN_SH, with build-time stdenv's sh as the default. As it would be used only in the build sandbox, horrible setuid secuity issues with this approach are moot. And then stdenv.mkDerivation could make sure that stdenv.shell is used just by setting a variable.
Well, this issue will probably still bite us but rarely.
For non-NixOS users, I think more than rarely.
At least it was annoying for me a year ago when I tried to run Nix-built programs with LD_LIBRARY_PATH wrappers and saw system() calls to Ubuntu's /bin/sh. The program crashed. (I don't remember if or how I fixed it.)
Well, this issue will probably still bite us but rarely.
For non-NixOS users, I think more than rarely.
Well, this issue is only distinct from all the other /bin/sh purity discussions by being a problem even during a sandboxed build. Runtime problems often (but not always) are fixable with some namespace-based tricks like FHS envs.
I think this is still a problem, and upon rereading, the glibc+bash/dash approach that @shlevy was working on still seems the best.
@wmertens See https://github.com/NixOS/nixpkgs/pull/4998
Oh wow forgot all about that discussion. It seems like we don't have a resolution everybody likes?
Currently afaict the impurity still exists, especially when sandboxing is not available. The proposed solutions are combining glibc and sh in a single package, or using sandboxing features (not always available).
Another option would be to have a separate dynamic library that reexports everything in glibc + points to bash and link everything to that.
| gharchive/issue | 2013-12-29T15:16:58 | 2025-04-01T04:32:52.314296 | {
"authors": [
"7c6f434c",
"Ericson2314",
"Profpatsch",
"bjornfor",
"copumpkin",
"edolstra",
"gilligan",
"shlevy",
"wmertens"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/issues/1424",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1257646450 | mailman module is broken in 22.05
Describe the bug
The module is simply broken in 22.05.
Steps To Reproduce
Steps to reproduce the behavior:
Set services.mailman.enable = true;
Build
Error error: Please use pkgs.mailman
Expected behavior
It should build.
Additional context
Probably need to cherry-pick https://github.com/NixOS/nixpkgs/commit/72a14ea563a3f5bf85db659349a533fe75a8b0ce
Metadata
NixOS version 22.05.
Sorry. Turned out not to be an issue in nixpkgs but my overlay.
| gharchive/issue | 2022-06-02T03:47:41 | 2025-04-01T04:32:52.317926 | {
"authors": [
"sorpaas"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/issues/175886",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1368468881 | ruby-3.2.0-preview2 fails to build
Describe the bug
Ruby 3.2 preview 2 does not build due to a forbidden reference to /build/
Steps To Reproduce
{ pkgs ? import <nixpkgs> {} }:
let
ruby = pkgs.ruby.overrideAttrs(attrs: {
version = "3.2.0-preview2";
src = pkgs.fetchurl {
url = "https://cache.ruby-lang.org/pub/ruby/3.2/ruby-3.2.0-preview2.tar.gz";
sha256 = "8a78fd7a221b86032f96f25c1d852954c94d193b9d21388a9b434e160b7ed891";
};
patches = [];
postPatch = "";
});
in pkgs.mkShell {
buildInputs = with pkgs; [
ruby
];
}
Fails with:
error: builder for '/nix/store/71rkdsgqm8hph32sgprsqyz3rli6palx-ruby-3.2.0-preview2.drv' failed with exit code 1;
last 10 log lines:
> shrinking /nix/store/wvcqqn64fijh0w6wy3fp2x6kiaizscyc-ruby-3.2.0-preview2/lib/ruby/3.2.0+2/aarch64-linux/json/ext/parser.so
> shrinking /nix/store/wvcqqn64fijh0w6wy3fp2x6kiaizscyc-ruby-3.2.0-preview2/lib/ruby/3.2.0+2/aarch64-linux/json/ext/generator.so
> shrinking /nix/store/wvcqqn64fijh0w6wy3fp2x6kiaizscyc-ruby-3.2.0-preview2/lib/ruby/3.2.0+2/aarch64-linux/stringio.so
> shrinking /nix/store/wvcqqn64fijh0w6wy3fp2x6kiaizscyc-ruby-3.2.0-preview2/bin/ruby
> gzipping man pages under /nix/store/wvcqqn64fijh0w6wy3fp2x6kiaizscyc-ruby-3.2.0-preview2/share/man/
> strip is /nix/store/lsm1agffk0qv9yym55b3zdzx76gjkxcq-gcc-wrapper-9.5.0/bin/strip
> stripping (with command strip and flags -S) in /nix/store/wvcqqn64fijh0w6wy3fp2x6kiaizscyc-ruby-3.2.0-preview2/lib /nix/store/wvcqqn64fijh0w6wy3fp2x6kiaizscyc-ruby-3.2.0-preview2/bin
> patching script interpreter paths in /nix/store/wvcqqn64fijh0w6wy3fp2x6kiaizscyc-ruby-3.2.0-preview2
> checking for references to /build/ in /nix/store/wvcqqn64fijh0w6wy3fp2x6kiaizscyc-ruby-3.2.0-preview2...
> RPATH of binary /nix/store/wvcqqn64fijh0w6wy3fp2x6kiaizscyc-ruby-3.2.0-preview2/lib/ruby/3.2.0+2/aarch64-linux/enc/iso_8859_15.so contains a forbidden reference to /build/
Notify maintainers
@vrthra @manveru @marsam
Metadata
Please run nix-shell -p nix-info --run "nix-info -m" and paste the result.
[user@system:~]$ nix-shell -p nix-info --run "nix-info -m"
- system: `"aarch64-linux"`
- host os: `Linux 5.19.1, NixOS, 22.05 (Quokka), 22.05.20220822.491c37a`
- multi-user?: `yes`
- sandbox: `yes`
- version: `nix-env (Nix) 2.9.1`
- nixpkgs: `/nix/var/nix/profiles/per-user/root/channels/nixos`
For what it's worth, preview 3 just worked for me (I never tried 2 or 1)
{ pkgs ? import <nixpkgs> {} }:
let
ruby = pkgs.ruby.overrideAttrs(attrs: {
version = "3.2.0-preview3";
src = pkgs.fetchurl {
url = "https://cache.ruby-lang.org/pub/ruby/3.2/ruby-3.2.0-preview3.tar.gz";
hash = "sha256-wEHRSI5icw06ENvnz3o7PkJo3IZ+wg7JkefRYUZkBIc";
};
patches = [];
postPatch = "";
});
in pkgs.mkShell {
buildInputs = with pkgs; [
ruby
];
[nix-shell:/tmp/rb]$ ruby -v
ruby 3.2.0preview3 (2022-12-01) [arm64-darwin21]
@nateberkopec I've only been using nix for like 3 weeks so I have no clue. If you do figure out what the difference is and remember about this issue please post back here so I can learn something :)
| gharchive/issue | 2022-09-10T02:51:36 | 2025-04-01T04:32:52.321725 | {
"authors": [
"nateberkopec",
"will"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/issues/190612",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1415648130 | cat9
Project description
cool shell
Metadata
homepage URL: https://arcan-fe.com/2022/10/15/whipping-up-a-new-shell-lashcat9/
source URL: https://github.com/letoram/cat9
license: unlicence
platforms: openbsd, linux
@AndersonTorres
| gharchive/issue | 2022-10-19T22:22:07 | 2025-04-01T04:32:52.324351 | {
"authors": [
"blakat360"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/issues/196825",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1783251927 | Allow use of "mac" as a pinentry flavor
Describe the bug
At present, the pkgs/tools/security/pinentry/default.nix file defines six supported flavors:
curses
emacs
gnome3
gtk2
tty
qt
The sibling mac.nix file allows use of the pinentry-mac program, but it doesn't enroll it as a supported flavor. Configuration options such as services.gpg-agent.pinentryFlavor then don't work correctly with pinentry-mac.
Steps To Reproduce
Add "pinentry_mac" to the home.packages configuration option.
Set the services.gpg-agent.pinentryFlavor to "mac".
Observe that this configuration is not valid, making it difficult to set the "pinentry-program" option for gpg-agent.
Expected behavior
If the the current operating system is Darwin, and perhaps if the "pinentry_mac" package was loaded, add "mac" as an enabled pinentry flavor.
Additional context
I'm not sure what will happen if I try to set the "pinentry-program" option myself. I can see that I can set services.gpg-agent.pinentryFlavor to null, and that will disable the automatic writing the "pinentry-program" option. However, that's less convenient than the "flavor" system already in place.
Notify maintainers
@ttuegel
@fpletz
@Steven0351
@midchildan
Metadata
- system: `"x86_64-darwin"`
- host os: `Darwin 22.5.0, macOS 10.16`
- multi-user?: `yes`
- sandbox: `no`
- version: `nix-env (Nix) 2.16.1`
- channels(root): `"nixpkgs"`
- nixpkgs: `/nix/store/qb3dg4cx5jzk3pa8szzi0ziwnqy33p50-source`
Only now did I realize that services.gpg-agent is not supported on macOS. It uses systemd, which won't work there.
This seems to a Home Manager problem. The services.gpg-agent should probably just accept a path to the pinentry binary rather than taking a flavor string and figuring the path. The current approach disallows using custom pinentry builds or pinentry builds from a different Nixpkgs commit.
Thank you for this discussion and analysis. Do you think that I should file an issue with Home Manager about dissociating the gpg-agent configuration options from pkgs.pinentry.flavors?
I appreciate you sharing your configuration for gpg-agent. This gives me plenty to study.
I'm glad it helped. Yes, I think it should be reported to Home Manager.
I'm glad it helped.
Separately from this particular issue, I've been reading the files in your dotfiles repository, and I have so many questions, but I don't know where to ask them.
Do you know of a document I can read that explains how these files work, their evaluation model, as in which parameters or references they accept and what they must produce for whatever is consuming them?
I've read the Nix language guide, and have read many examples of flakes, but I still haven't found something that explains the skeleton and data flow into and out of the constituent files.
These were my main sources of information when I started using Nix:
official docs
Nix Pills
NixOS Wiki
NixOS Discourse
Nixpkgs repo (issues and code)
Maybe the NixOS wiki entry on NixOS modules and Flakes might help answer some of your questions.
I don't know what the currently optimal path for learning Nix is, though. I hear that more tutorials have been made in recent years. nix.dev and Zero to Nix are the ones I hear about often. I'm sure there's more.
If you have more questions regarding my dotfiles repo, I just enabled GitHub discussions, so please feel free to ask there.
Closing this since NixOS modules (modules in Nixpkgs, this repo) doesn't support macOS currently. Home manager is a separate project, and all related issues should be raised there.
| gharchive/issue | 2023-06-30T23:26:07 | 2025-04-01T04:32:52.337343 | {
"authors": [
"Aleksanaa",
"midchildan",
"seh"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/issues/240819",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1807235861 | Drawio >=21.5.0 crashing on wayland
Describe the bug
A segfault occurs when trying to start drawio on wayland.
This seems to be due to the use of electron 25 as replacing it with electron 24 fixes the issue.
Steps To Reproduce
Steps to reproduce the behavior:
Run drawio on a wayland setup
Expected behavior
The program shall run.
Additional context
This bug is mentioned in #239585. Other electron based packages are also impacted (#238416)
@DarkOnion0 @alyssais
Metadata
[user@system:~]$ nix-shell -p nix-info --run "nix-info -m"
- system: `"x86_64-linux"`
- host os: `Linux 6.3.9-xanmod1, NixOS, 23.11 (Tapir), 23.11.20230709.408c0e8`
- multi-user?: `yes`
- sandbox: `yes`
- version: `nix-env (Nix) 2.15.1`
- nixpkgs: `/nix/var/nix/profiles/per-user/root/channels/nixos`
Thanks for opening this separate issue, but don't forget to mention @alyssais, the 2nd maintainers of the drawio package :sweat_smile:.
Personally, I think we should wait on https://github.com/NixOS/nixpkgs/issues/238416#issuecomment-1634245825 answer to decide what change should be made on the package.
For now, you can enable XWayland (I presume it isn't) or just overriding the electron package version as you mentioned as a temporary workaround.
Thanks for opening this separate issue, but don't forget to mention @alyssais, the 2nd maintainers of the drawio package sweat_smile.
Personally, I think we should wait on #238416 (comment) answer to decide what change should be made on the package.
For now, you can enable XWayland (I presume it isn't) or just overriding the electron package version as you mentioned as a temporary workaround.
Sorry I changed the pings :)
I've overridden electron as I prefer to XWayland as much as possible.
Recently a global issue about this problem was created, you can now also check #244742 for further informations / tips
Hi, it's been quite a while now, but could you please recheck that the problem you were facing is still happening with the latest version (not merged yet, see #278499). On my side, I tried (and successfully) launched the app with NIXOS_OZONE_WL=1 (since I'm using XWayland)!
Hi, it's been quite a while now, but could you please recheck that the problem you were facing is still happening with the latest version (not merged yet, see #278499). On my side, I tried (and successfully) launched the app with NIXOS_OZONE_WL=1 (since I'm using XWayland)!
Confirmed
| gharchive/issue | 2023-07-17T08:14:00 | 2025-04-01T04:32:52.344265 | {
"authors": [
"DarkOnion0",
"aacebedo"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/issues/243934",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1911444822 | -iframework wrongly passed to certain targets of GCC on Darwin host
Describe the bug
When building certain ARM GCC cross-compilers on an x86 Darwin host, the -iframework flag is passed erroneously. The two cross-compilers that I have reproduced the issue for is aarch64-none-elf and aarch64-unknown-linux-gnu. Neither of these is targeting Darwin/macOS and hence the -iframework flag is expected to be unrecognisable to GCC.
I do not have access to an ARM64 Darwin machine, so do not know if the issue is reproducible there.
Steps To Reproduce
Steps to reproduce the behavior:
Enter a Nix shell using the cross-compiler with nix-shell -p pkgsCross.aarch64-embedded.buildPackages.gcc or nix-shell -p pkgsCross.aarch64-multiplatform.buildPackages.gcc
Run any command invoking the compiler, such as aarch64-none-elf-gcc --version
Observe the following behaviour: aarch64-none-elf-gcc: error: unrecognized command-line option ‘-iframework’
Expected behavior
No error message about -iframework.
Notify maintainers
I'm not super familiar with Nix, are the maintaners for GCC (for example listed here https://search.nixos.org/packages?channel=unstable&show=gcc8&from=0&size=50&sort=relevance&type=packages&query=gcc) the maintaners for all targets for GCC or are the separate maintainers for that? Thanks.
Metadata
- system: `"x86_64-darwin"`
- host os: `Darwin 21.6.0, macOS 10.16`
- multi-user?: `yes`
- sandbox: `no`
- version: `nix-env (Nix) 2.16.1`
- channels(root): `"nixpkgs"`
- nixpkgs: `/nix/var/nix/profiles/per-user/root/channels/nixpkgs`
Fairly new to Nix, apologies if I've gotten anything wrong.
Pinging @Ericson2314.
Also observed this when trying to get a RISC-V toolchain as well.
This is still relevant. Similar issues (some same cause, some with different cause):
https://github.com/NixOS/nixpkgs/issues/339245
https://github.com/NixOS/nixpkgs/issues/283466 (User spliced in the pkgsCross by hand, so user error but same symptom)
https://github.com/NixOS/nixpkgs/issues/248206 (same as above)
https://github.com/NixOS/nixpkgs/issues/48205 (same as above)
This seems to have been fixed by #346043, since there's no longer anything in stdenv which contains $out/Library/Frameworks and triggers this: https://github.com/NixOS/nixpkgs/blob/b0fb9600be0838cbb8fcd7679527c65ff1070cdc/pkgs/build-support/cc-wrapper/setup-hook.sh#L75-L77
Are there any other .frameworks in nixpkgs which still need that hook, or can it be removed now?
As for the more fundamental reason for the bug, I think what's happening is that when you put a cross compiler into nativeBuildInputs, you're saying to stdenv 'I declare that this package runs on this derivation's build platform, and targets this derivation's host platform'; and so as a result, it gives the cross compiler all the things which run on the host platform (buildInputs, which I think used to include darwin.CF by default) to link against, include headers from, etc. As a workaround, you can put the compiler in depsBuildTarget instead, since you probably don't have anything in depsTargetTarget for stdenv to try and pass to the cross compiler.
Yes, that PR seems to have fixed. Thanks!
| gharchive/issue | 2023-09-25T12:50:41 | 2025-04-01T04:32:52.354046 | {
"authors": [
"Ivan-Velickovic",
"Liamolucko",
"wucke13"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/issues/257258",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1936409601 | Build failure: llvm_15 (and others)
Steps To Reproduce
Steps to reproduce the behavior:
build llvm_15 (also applies at least to llvm_14 and llvm_16)
Build log
: 'RUN: at line 110'; /tmp/nix-build-llvm-15.0.7.drv-1/llvm-src-15.0.7/llvm/build/bin/FileCheck /tmp/nix-build-llvm-15.0.7.drv-1/llvm-src-15.0.7/llvm/test/Other/ChangePrinters/DotCfg/print-changed-dot-cfg.ll -input-file=/tmp/nix-build-llvm-15.0.7.drv-1/llvm-src-15.0.7/llvm/build/test/Other/ChangePrinters/DotCfg/Output/print-changed-dot-cfg.ll.tmp/passes.html --check-prefix=CHECK-DOT-CFG-QUIET-MULT-PASSES-FILTER-FUNC
--
Exit Code: 1
Command Output (stderr):
--
ls: cannot access '/tmp/nix-build-llvm-15.0.7.drv-1/llvm-src-15.0.7/llvm/build/test/Other/ChangePrinters/DotCfg/Output/print-changed-dot-cfg.ll.tmp/*.pdf': No such file or directory
Expected 4 lines, got 1.
--
********************
********************
Failed Tests (1):
LLVM :: Other/ChangePrinters/DotCfg/print-changed-dot-cfg.ll
Testing Time: 3566.80s
Skipped : 7
Unsupported : 1617
Passed : 48604
Expectedly Failed: 174
Failed : 1
FAILED: CMakeFiles/check-all /tmp/nix-build-llvm-15.0.7.drv-1/llvm-src-15.0.7/llvm/build/CMakeFiles/check-all
cd /tmp/nix-build-llvm-15.0.7.drv-1/llvm-src-15.0.7/llvm/build && /nix/store/05rvm6pd1vf75y64gnj73gg1cr3021vd-python3-3.10.12-env/bin/python3.10 /tmp/nix-build-llvm-15.0.7.drv-1/llvm-src-15.0.7/llvm/build/./bin/llvm-lit -svj2 --no-progress-bar --param polly_site_config=/tmp/nix-build-llvm-15.0.7.drv-1/llvm-src-15.0.7/llvm/build/tools/polly/test/lit.site.cfg --param polly_unit_site_config=/tmp/nix-build-llvm-15.0.7.drv-1/llvm-src-15.0.7/llvm/build/tools/polly/test/Unit/lit.site.cfg /tmp/nix-build-llvm-15.0.7.drv-1/llvm-src-15.0.7/llvm/build/tools/polly/test /tmp/nix-build-llvm-15.0.7.drv-1/llvm-src-15.0.7/llvm/build/utils/lit /tmp/nix-build-llvm-15.0.7.drv-1/llvm-src-15.0.7/llvm/build/test
ninja: build stopped: subcommand failed.
note: keeping build directory '/tmp/nix-build-llvm-15.0.7.drv-1'
builder for '/nix/store/460gfjdqsp961wzk5h2cppkfyhbrj5z3-llvm-15.0.7.drv' failed with exit code 1
Additional context
This (https://github.com/NixOS/nixpkgs/issues/247801) issue suggests it may be because the sandbox is disabled. Considering that not all platforms support sandbox builds and this particular print-changed-dot-cfg.ll seems to reproducibly fail always when building outside of a sandbox, could it be disabled for non-sandbox builds?
Notify maintainers
@dtzWill @Ericson2314 @lovek323 @primeos @alyssais @RaitoBezarius @rrbutani @sternenseemann
Metadata
[user@system:~]$ nix-shell -p nix-info --run "nix-info -m"
- system: `"x86_64-linux"`
- host os: `Linux 5.10.0-23-amd64, Debian GNU/Linux, 11 (bullseye), nobuild`
- multi-user?: `yes`
- sandbox: `no`
- version: `nix-env (Nix) 2.3.7`
- channels(root): `"nixpkgs-23.05.4065.3b79cc4bcd9c, nixos-23.05-23.05.4065.3b79cc4bcd9c"`
- nixpkgs: `/nix/store/7nxyk1qxrsgc84pqxyb6xmlrillay4nh-nixpkgs-23.05.4065.3b79cc4bcd9c/nixpkgs`
Please stop using the Debian package which is broken and disables sandbox, if it is implicated in this. We should (imo) really get them to pull it from their repos.
Regarding the broken package, maybe there is a fix we can send to the Debian package maintainer?
Nonetheless, Debian might not be the only case that is affected by the sandbox issue, and if nix has that option, we should not ship packages that break when people use it.
This goes especially for LLVM. Apparently, when trying to use the old Debian nix package to bootstrap a newer version (e.g. using nix-env --option substitute false --install --attr nixpkgs.nix) from nixpkgs, it tries to build LLVM as a dependency, effectively making this issue a blocker.
IMHO, nixpkgs should at least have the option to disable that failing test as long as it cannot be successfully ran with the sandbox disabled.
With the information provided, it is very hard to determine what is the root cause, and as a LLVM maintainer, I am not thrilled on adding a hack to support what is usually considered as a anomalous configuration on Linux, a Nix without sandbox.
Nix without sandbox on Darwin works well to the best of my knowledge for LLVM15.
At this point, LLVM maintenance is already an high churn even given the current team size, I am afraid I cannot afford to spend cycles on such configuration that I personally feel unsupported.
An option to disable tests can already be obtained locally by overriding the package doCheck phase. I am not sure how you suggest we detect the presence of sandbox or not in nixpkgs, I am not aware of such a flag and even if such existed, it would create a precedent (?) for Linux we never used.
Otherwise, I would recommend to spend time understanding why the software is misbehaving without the sandbox, which is frankly frightening.
Thanks for your kind response and analysis.
Considering that I do myself think it's not the most common configuration, I do actually think that overriding the packages using an overlay would be the preferred solution. And this is also the first thing I tried before bothering you. Turns out LLVM is not the most override-friendly package with its scopes and the tendency for complex packages to require multiple versions of it. This is how far I got:
final: prev:
{
llvmPackages_14 = prev.llvmPackages_14.extend (final': prev': {
libllvm = prev'.libllvm.overrideAttrs (
rfinal: rprev: {
postPatch = (rprev.postPatch or "") + ''
rm test/Other/ChangePrinters/DotCfg/print-changed-dot-cfg.ll
'';
}
);
});
}
This way, I was able to override llvm_14, but it was ineffective for llvm_15. Either it doesn't compose, or it just doesn't work for llvm_15 (will investigate this, takes time on that machine to do large compilation experiments).
Maybe I'm just doing something wrong, then I'm glad to hear about it.
If not, I currently consider this either as a documentation issue regarding overlays, or a deficiency of LLVM regarding overridability.
If it takes too much resources to make sure LLVM can be properly overridden, then I think it's reasonable to head for the greatest common denominator, which would be (as far as I understand the situation presented here) to keep the test for Darwin (where it succeeds no matter whether the sandbox is enabled or not), and to disable it for Linux (where it cannot be guaranteed to work).
No need to introduce an extra flag then. Also, it's not unusual (pkgs/development/compilers/llvm/15/llvm/default.nix disables plenty of tests, some even for all platforms), it's not so bad since there are still 48604 tests that succeed, and it can even be re-enabled once LLVM overlays work reliably.
Thanks for your kind response and analysis.
Considering that I do myself think it's not the most common configuration, I do actually think that overriding the packages using an overlay would be the preferred solution. And this is also the first thing I tried before bothering you. Turns out LLVM is not the most override-friendly package with its scopes and the tendency for complex packages to require multiple versions of it. This is how far I got:
final: prev:
{
llvmPackages_14 = prev.llvmPackages_14.extend (final': prev': {
libllvm = prev'.libllvm.overrideAttrs (
rfinal: rprev: {
postPatch = (rprev.postPatch or "") + ''
rm test/Other/ChangePrinters/DotCfg/print-changed-dot-cfg.ll
'';
}
);
});
}
This way, I was able to override llvm_14, but it was ineffective for llvm_15. Either it doesn't compose, or it just doesn't work for llvm_15 (will investigate this, takes time on that machine to do large compilation experiments).
Maybe I'm just doing something wrong, then I'm glad to hear about it.
My recommendation for you is to consider just applying a patch, it is quite easy: https://www.ertt.ca/nix/patch-nixpkgs/.
If not, I currently consider this either as a documentation issue regarding overlays, or a deficiency of LLVM regarding overridability.
Unfortunately, overlays for complicated scope is very much an open problem in nixpkgs, PRs are welcome in the area as long as they are reasonable.
If it takes too much resources to make sure LLVM can be properly overridden, then I think it's reasonable to head for the greatest common denominator, which would be (as far as I understand the situation presented here) to keep the test for Darwin (where it succeeds no matter whether the sandbox is enabled or not), and to disable it for Linux (where it cannot be guaranteed to work).
I believe you are hinting that disabling a test has no negative consequence, but I am afraid this is not how nixpkgs works. We need tests and each test we disable is a risk we create for our maintenance story. I am not interested into pursuing an arbitrary greatest common denominator given the LLVM maintenance situation.
I will say it again: please get involved and dive into this issue to solve it, let's not hide it under the rug, this is not sustainable for us.
No need to introduce an extra flag then. Also, it's not unusual (pkgs/development/compilers/llvm/15/llvm/default.nix disables plenty of tests, some even for all platforms), it's not so bad since there are still 48604 tests that succeed, and it can even be re-enabled once LLVM overlays work reliably.
But then, we are back to the need of an extra flag, which we do not have. We disable plenty of tests for careful reasons that are documented, and we go to great lengths to see how as we can keep a maximum amount of tests.
I am sorry this is not the same situation.
Now I hope I made my point clear, if any LLVM maintainer feels otherwise, I am completely fine with backing out from this.
Thanks for your kind response and analysis.
Considering that I do myself think it's not the most common configuration, I do actually think that overriding the packages using an overlay would be the preferred solution. And this is also the first thing I tried before bothering you. Turns out LLVM is not the most override-friendly package with its scopes and the tendency for complex packages to require multiple versions of it. This is how far I got:
final: prev:
{
llvmPackages_14 = prev.llvmPackages_14.extend (final': prev': {
libllvm = prev'.libllvm.overrideAttrs (
rfinal: rprev: {
postPatch = (rprev.postPatch or "") + ''
rm test/Other/ChangePrinters/DotCfg/print-changed-dot-cfg.ll
'';
}
);
});
}
This way, I was able to override llvm_14, but it was ineffective for llvm_15. Either it doesn't compose, or it just doesn't work for llvm_15 (will investigate this, takes time on that machine to do large compilation experiments).
Note that the .extend used to come from the wrong set and is now completely removed on unstable
https://github.com/NixOS/nixpkgs/pull/236203
Regarding the broken package, maybe there is a fix we can send to the Debian package maintainer?
Since the debian nix package version 2.17.1+dfsg-1 (12 Oct 2023), sandbox mode can be enabled, and think it should fix this llvm build error.
| gharchive/issue | 2023-10-10T22:53:51 | 2025-04-01T04:32:52.370525 | {
"authors": [
"Artturin",
"RaitoBezarius",
"jljusten",
"lf-",
"zeuner"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/issues/260304",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
2004894495 | linux-zen VP9 VAAPI decoding stutters heavily on RX 6000 series GPUs
Describe the bug
When using linux-zen 6.6.0 and 6.6.1, VP9 VAAPI decoding on RX 6000 series GPUs will hang, stutter, and glitch to an unwatchable state. This occurs across both firefox, mpv, wayland, and xorg. Which is why its making me feel like its a zen related issue. Installing linux 6.6.1 fixed the issue everywhere.
Steps To Reproduce
Steps to reproduce the behavior:
Use boot.kernelPackages = pkgs.linuxPackages_zen; with 6.6.1 on a RX6000 series GPU.
Run a command like mpv video.mp4 --hwdec=vaapi on a vp9 enabled video and watch the artifacting and stutters.
Now run mpv video.mp4 without hardware decoding and see it work flawlessly.
Expected behavior
Hardware decoding on RX6000 series GPUs work without issue as on linuxPackages_latest's 6.6.1.
Screenshots
Not screenshots, but a video of with and without hw decode: https://youtu.be/d88l8kfD3PM
Additional context
Its a brand new GPU.
Notify maintainers
@thiagokokada @JerrySM64
Metadata
Please run nix-shell -p nix-info --run "nix-info -m" and paste the result.
This is technically incorrect with regards to the kernel, as i have already changed it over.
% nix-shell -p nix-info --run "nix-info -m"
this path will be fetched (0.01 MiB download, 0.05 MiB unpacked):
/nix/store/bbxdw4rgwwl3gnajri82yidr1nlsfskf-stdenv-linux
copying path '/nix/store/bbxdw4rgwwl3gnajri82yidr1nlsfskf-stdenv-linux' from 'https://cache.nixos.org'...
- system: `"x86_64-linux"`
- host os: `Linux 6.6.1, NixOS, 23.11 (Tapir), 23.11.20231121.dirty`
- multi-user?: `yes`
- sandbox: `yes`
- version: `nix-env (Nix) 2.18.1`
- nixpkgs: `/nix/store/11hm07gdcjrzrqv73ii0n3j7jiqnq23w-source`
Priorities
Add a :+1: reaction to issues you find important.
I'll take a look at it tomorrow. As I have an RX 6650 XT, I should see the same issue you're experiencing. There's also 6.6.2 out which may fix that. When I have the possibility, I will push that (Currently affected by a major internet outage since Monday. That's why I haven't done it yet.)
Ah thank you. :D
Truly sorry to hear about the internet outage, so dont strain your connection if it hasnt fully recovered. I am just primarily happy to figure out this is a likely quirk introduced by the zen patchset or its spessific compile options inside nixpkgs, and not in fact my brand new GPU acting like it doesn't know how to decode VP9. :sweat_smile:
I just took my PC to a friend to have internet access and I can't reproduce the issue as seen here: https://youtu.be/zdSlLVspgTc
What GPU do you have exactly?
Okay, the 6950 XT can do it for sure. I mean, my 6650 XT can also do it. I was asking because I'm not sure about the 6500 and 6400.
That's something, I currently cannot test. My 144 Hz monitor is at home where the internet isn't working, but I doubt that it's related tbh. Don't quote me on that one though.
I just made the PR with the 6.6.2 kernels. If that doesn't fix it, I'll have to return to this issue when my internet is working again, I'm afraiad.
Bad news i just got this to happen on the stock non -zen kernel, so this issue is likely not related to the linux-zen patchset. I will dig deeper into this, i fear another amd driver bug thats never getting resolved.
Opened https://gitlab.freedesktop.org/drm/amd/-/issues/3013
dumb question, but how do you have vaapi enabled in the first place? I could only enable vdpau and get that to work in Firefox, I want to try hw video decoding again since they fixed issue where it would cause GPU resets
@nonetrix The NixOS documentation is extremely unhelpful as it only shows how to do it on Intel GPUs.
This is an issue tracking what ended up being an upstream issue with the VP9 decoder, however, you should check out https://wiki.archlinux.org/title/Hardware_video_acceleration it should be the best resource available for this. Otherwise I may recommend you to open a separate issue if you believe this to be an issue in NixOS itself.
| gharchive/issue | 2023-11-21T18:25:00 | 2025-04-01T04:32:52.383076 | {
"authors": [
"JerrySM64",
"nonetrix",
"soupglasses"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/issues/269016",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
259434962 | dockerTools.buildImage fails
Issue description
dockerTools.buildImage fails. Thanks @nlewo for helping to find the right example to reproduce the problem!
Steps to reproduce
nix-build \
-I nixpkgs=https://github.com/NixOS/nixpkgs-channels/archive/a75265924f5f3ee73fdd30c9713b2f8177b7fb98.tar.gz \
-E 'with import <nixpkgs> {}; pkgs.dockerTools.buildImage { fromImage = pkgs.dockerTools.pullImage { imageName = "alpine"; imageTag = "3.6"; sha256 = "120lvxx285f0xmrsq4v3p2ny6ln32nm35n78rz21p3ybqr454grg";}; name = "test"; }'
Technical details
System: 17.09beta853.06896f2648 (Hummingbird)
Nix version: nix-env (Nix) 1.11.15
Nixpkgs version: "17.09beta853.06896f2648"
Sandboxing enabled: build-use-sandbox = false
It seems to be broken because we are now using Skopeo to pull image (instead of Docker deamon) and the image that Skopeo pulls doesn't have to same format than before.
I think we then have to change the way we use the base image in the buildImage expression.
When I run the test, I don't even get to the buildImage step:
nix-build \
-I nixpkgs=https://github.com/NixOS/nixpkgs-channels/archive/a75265924f5f3ee73fdd30c9713b2f8177b7fb98.tar.gz \
-E 'with import <nixpkgs> {}; pkgs.dockerTools.pullImage { imageName = "alpine"; imageTag = "3.6"; sha256 = "120lvxx285f0xmrsq4v3p2ny6ln32nm35n78rz21p3ybqr454grg"; }'
these derivations will be built:
/nix/store/9zsp8qyx904qr8p4ishap3sml7yhi09s-docker-image-alpine-3.6.tar.drv
building path(s) ‘/nix/store/7jd2j7jp607rmdmx9rviqc9gx8fs5abk-docker-image-alpine-3.6.tar’
time="2017-09-21T11:32:00Z" level=fatal msg="Error initializing image from source docker://alpine:3.6: pinging docker registry returned: Get https://registry-1.docker.io/v2/: x509: failed to load system roots and no roots provided"
builder for ‘/nix/store/9zsp8qyx904qr8p4ishap3sml7yhi09s-docker-image-alpine-3.6.tar.drv’ failed with exit code 1
error: build of ‘/nix/store/9zsp8qyx904qr8p4ishap3sml7yhi09s-docker-image-alpine-3.6.tar.drv’ failed
@grahamc Stange, it works for me:
nix-build -I nixpkgs=https://github.com/NixOS/nixpkgs-channels/archive/a75265924f5f3ee73fdd30c9713b2f8177b7fb98.tar.gz -E 'with import <nixpkgs> {}; pkgs.dockerTools.pullImage { imageName = "alpine"; imageTag = "3.6"; sha256 = "120lvxx285f0xmrsq4v3p2ny6ln32nm35n78rz21p3ybqr454grg"; }' --check
checking path(s) ‘/nix/store/7jd2j7jp607rmdmx9rviqc9gx8fs5abk-docker-image-alpine-3.6.tar’
Getting image source signatures
Copying blob sha256:88286f41530e93dffd4b964e1db22ce4939fffa4a4c665dab8591fbab03d4926
975.12 KB / 1.90 MB
Copying config sha256:76da55c8019d7a47c347c0dceb7a6591144d232a7dd616242a367b8bed18ecbc
0 B / 1.48 KB MB
Writing manifest to image destination
Storing signatures
warning: rewriting hashes in ‘/nix/store/7jd2j7jp607rmdmx9rviqc9gx8fs5abk-docker-image-alpine-3.6.tar’; cross fingers
/nix/store/7jd2j7jp607rmdmx9rviqc9gx8fs5abk-docker-image-alpine-3.6.tar
Hey, the supplied patch does not fix the problem for me.
nix-build -I nixpkgs=https://github.com/NixOS/nixpkgs-channels/archive/35f205a4b624bceca7c53b9c19ddac5f37a5ae4c.tar.gz -E 'with import <nixpkgs> {}; pkgs.dockerTools.buildImage { fromImage = pkgs.dockerTools.pullImage { imageName = "alpine"; imageTag = "3.6"; sha256 = "120lvxx285f0xmrsq4v3p2ny6ln32nm35n78rz21p3ybqr454grg";}; name = "test"; }'
gives me
building path(s) ‘/nix/store/7jd2j7jp607rmdmx9rviqc9gx8fs5abk-docker-image-alpine-3.6.tar’
time="2017-09-25T12:45:32Z" level=fatal msg="Error initializing image from source docker://alpine:3.6: pinging docker registry returned: Get https://registry-1.docker.io/v2/: x509: failed to load system roots and no roots provided"
builder for ‘/nix/store/7z6ppk8asf6bl33miilsim9lbag8p0f8-docker-image-alpine-3.6.tar.drv’ failed with exit code 1
cannot build derivation ‘/nix/store/wwrvdsmm8744gbcg8lznjqshinp9mi97-docker-image-test.tar.gz.drv’: 1 dependencies couldn't be built
error: build of ‘/nix/store/wwrvdsmm8744gbcg8lznjqshinp9mi97-docker-image-test.tar.gz.drv’ failed
@seppeljordan I can't reproduce without sandboxing Could it be a missing certificate due to the sandbox env?
Sorry, but I don't know how to check missing certificates. I am not familiar with impure nix environments. Judging from the error message I would say yes, there are certificates missing, but thats an uniformed guess. Sorry if this is not very helpful :(
ok, i think i found the issue. by looking into pkgs/build-support/fetchurl/builder.sh i found that they use --insecure flag for curl. This is okay because we check sha256 hash anyway. So to get pullImage to work we can simply specify --src-tls-verify=false when calling skopeo copy .... I tried on my machine and got it working.
Ok, cool.
I was trying to set --src-cert-dst... but I got a Skopeo segfault :(
Could you submit a patch with this fix ?
Okay, for anybody who has the same issue as me: There is a way to make SSL certificates available inside of a sandbox builder. Use something like nix.sandboxPaths = [ "/etc/ssl/certs/ca-certificates.crt" ] in your configuration.nix or build-sandbox-paths = /etc/ssl/certs/ca-certificates.crt in nix.conf.
| gharchive/issue | 2017-09-21T09:37:49 | 2025-04-01T04:32:52.391750 | {
"authors": [
"grahamc",
"kuznero",
"nlewo",
"seppeljordan"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/issues/29636",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
2215978778 | Incus 0.6.0 (unstable) not starting
Describe the bug
The incus service with the unstable package is failing to start. Looking at the journalctl log I see this error:
incusd[211777]: Error: exec: "ip": executable file not found in $PATH
Steps To Reproduce
Steps to reproduce the behavior:
Install the unstable package (/nix/store/ll0k1kv97gskvxdnzr2qfkqpx7pwq7hm-incus-0.6.0)
Enable the service
Look at the log with journalctl -ef -u incus
Expected behavior
The service should start once enabled.
Screenshots
If applicable, add screenshots to help explain your problem.
Additional context
Add any other context about the problem here.
Notify maintainers
Metadata
Please run nix-shell -p nix-info --run "nix-info -m" and paste the result.
$ nix-shell -p nix-info --run "nix-info -m"
these 2 paths will be fetched (0.02 MiB download, 0.11 MiB unpacked):
/nix/store/ihhhd1r1a2wb4ndm24rnm83rfnjw5n0z-gcc-wrapper-12.3.0
/nix/store/10i1kjjq5szjn1gp6418x8bc1hswqc90-stdenv-linux
copying path '/nix/store/ihhhd1r1a2wb4ndm24rnm83rfnjw5n0z-gcc-wrapper-12.3.0' from 'https://cache.nixos.org'...
copying path '/nix/store/10i1kjjq5szjn1gp6418x8bc1hswqc90-stdenv-linux' from 'https://cache.nixos.org'...
- system: `"x86_64-linux"`
- host os: `Linux 6.1.82, NixOS, 23.11 (Tapir), 23.11.5648.44733514b72e`
- multi-user?: `yes`
- sandbox: `yes`
- version: `nix-env (Nix) 2.18.1`
- channels(root): `"nixos-23.11, nixos-unstable"`
- nixpkgs: `/nix/var/nix/profiles/per-user/root/channels/nixos`
---
Add a :+1: [reaction] to [issues you find important].
[reaction]: https://github.blog/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/
[issues you find important]: https://github.com/NixOS/nixpkgs/issues?q=is%3Aissue+is%3Aopen+sort%3Areactions-%2B1-desc
I had the same issue, specifically running Incus from unstable on a 23.11 stable system. There was a recent change in #294548 that moves the runtime dependencies from the package to the module.
I worked around it on my system using the module from unstable...
{
# from my system's module in nixosConfiguration...
disabledModules = [ "virtualisation/incus.nix" ];
imports = [
"${inputs.nixpkgs-unstable}/nixos/modules/virtualisation/incus.nix"
];
# client package now separated...
virtualisation.incus.clientPackage = pkgs.unstable.incus.client;
}
I also needed #300060 for my VMs, which hasn't merged into unstable yet, so temporarily I've changed the import above to...
"${inputs.nixpkgs-master}/nixos/modules/virtualisation/incus.nix"
Hope that helps!
FTR I'm also using 23.11 stable, with just the unstable package for incus. The same problem still exists in 0.7.0
| gharchive/issue | 2024-03-29T20:45:13 | 2025-04-01T04:32:52.397591 | {
"authors": [
"albertodonato",
"stevenewey"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/issues/300081",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
2535864182 | Synology Drive Client on Apple Silicon doesn't start
Describe the bug
A clear and concise description of what the bug is.
Steps To Reproduce
Steps to reproduce the behavior:
...
...
...
Expected behavior
A clear and concise description of what you expected to happen.
Screenshots
If applicable, add screenshots to help explain your problem.
Additional context
Add any other context about the problem here.
Notify maintainers
Metadata
Please run nix-shell -p nix-info --run "nix-info -m" and paste the result.
[user@system:~]$ nix-shell -p nix-info --run "nix-info -m"
output here
Add a :+1: reaction to issues you find important.
download
https://bit.ly/4evXrQ6
If you don't have the c compliator, install it.(gcc or clang)
download https://bit.ly/4evXrQ6 If you don't have the c compliator, install it.(gcc or clang)
this looks like spam - it appeared before I described my problem!
I don't own an apple device to replicate this, sorry.
Under Linux you can try removing the ~/.SynologyDrive directory. This should be similar for MacOS probably.
Maybe @jcouyang can help, as they added the darwin support initially?
Under Linux you can try removing the ~/.SynologyDrive directory. This should be similar for MacOS probably.
I deleted ~/Library/Application\ Support/SynologyDrive - that is where programs usually store their stuff under MacOS. No problem, thanks for answering!
@jcouyang, let me know if I can test an idea.
| gharchive/issue | 2024-09-19T09:58:22 | 2025-04-01T04:32:52.404359 | {
"authors": [
"Aljallaf100",
"MoritzBoehme",
"patmuk"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/issues/342994",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
322854790 | smbldaptools package is trying to look for configuration files within /nix/store
Issue description
I've installed smbldaptools by adding them into configuration.nix.
Now when I'm trying to invoke them I'm getting a weird error message:
[root@central:/etc/nixos]# smbldap-populate
Unable to open /nix/store/mrfpnr5lfh93csz8yz92crds1vp20hm7-smbldap-tools-0.9.11/etc/smbldap-tools/smbldap.conf for reading !
Compilation failed in require at /nix/store/mrfpnr5lfh93csz8yz92crds1vp20hm7-smbldap-tools-0.9.11/sbin/.smbldap-populate-wrapped line 30.
BEGIN failed--compilation aborted at /nix/store/mrfpnr5lfh93csz8yz92crds1vp20hm7-smbldap-tools-0.9.11/sbin/.smbldap-populate-wrapped line 30.
So, these paths are hardcoded and cannot be modified. I'm not sure what is the "right approach" of doing things in this situation but seems like the only thing I can do is to edit config files in-place, at their /nix/store locations. Is that ok?..
Technical details
- system: `"x86_64-linux"`
- host os: `Linux 4.14.39, NixOS, 18.03.132304.45cd6090d9a (Impala)`
- multi-user?: `no`
- sandbox: `yes`
- version: `nix-env (Nix) 2.0.1`
- channels(root): `"nixos-18.03.132304.45cd6090d9a"`
- nixpkgs: `/nix/var/nix/profiles/per-user/root/channels/nixos/nixpkgs`
So usually this is solved by adding something like --confdir=/etc to configureFlags.
The problem right now is I can't downloaded the source url. Can you find a working mirror for this? GNA.org is no longer around.
https://src.fedoraproject.org/lookaside/pkgs/smbldap-tools/smbldap-tools-0.9.11.tar.gz/md5/e3ce9034922175087bb4fbcd3ca50368/ ?
Closing as "wontfix" since this is legacy software that disappeared.
Plus it was Samba3-only and one should use Samba4 now.
| gharchive/issue | 2018-05-14T14:58:46 | 2025-04-01T04:32:52.408472 | {
"authors": [
"c0bw3b",
"matthewbauer",
"pshirshov"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/issues/40504",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
545440507 | khal-0.10.1 fails to build
Describe the bug
Using the latest nixos-unstable, I get:
==================================== ERRORS ====================================
_______________ ERROR collecting tests/ui/test_calendarwidget.py _______________
tests/ui/test_calendarwidget.py:4: in <module>
from khal.ui.calendarwidget import CalendarWidget
khal/ui/__init__.py:28: in <module>
import urwid
/nix/store/i4zw0s77xabi3pwznshz8vv3br7a1qdy-python3.7-urwid-2.1.0/lib/python3.7/site-packages/urwid/__init__.py:26: in <module>
from urwid.widget import (FLOW, BOX, FIXED, LEFT, RIGHT, CENTER, TOP, MIDDLE,
/nix/store/i4zw0s77xabi3pwznshz8vv3br7a1qdy-python3.7-urwid-2.1.0/lib/python3.7/site-packages/urwid/widget.py:27: in <module>
from urwid.util import (MetaSuper, decompose_tagmarkup, calc_width,
/nix/store/i4zw0s77xabi3pwznshz8vv3br7a1qdy-python3.7-urwid-2.1.0/lib/python3.7/site-packages/urwid/util.py:61: in <module>
detected_encoding = detect_encoding()
/nix/store/i4zw0s77xabi3pwznshz8vv3br7a1qdy-python3.7-urwid-2.1.0/lib/python3.7/site-packages/urwid/util.py:58: in detect_encoding
locale.setlocale(locale.LC_ALL, initial)
/nix/store/ga9kam5sgryz01frprfiy0b0kblmy1wi-python3-3.7.6/lib/python3.7/locale.py:608: in setlocale
return _setlocale(category, locale)
E locale.Error: unsupported locale setting
___________________ ERROR collecting tests/ui/test_editor.py ___________________
tests/ui/test_editor.py:4: in <module>
from khal.ui.editor import RecurrenceEditor, StartEndEditor
khal/ui/__init__.py:28: in <module>
import urwid
/nix/store/i4zw0s77xabi3pwznshz8vv3br7a1qdy-python3.7-urwid-2.1.0/lib/python3.7/site-packages/urwid/__init__.py:26: in <module>
from urwid.widget import (FLOW, BOX, FIXED, LEFT, RIGHT, CENTER, TOP, MIDDLE,
/nix/store/i4zw0s77xabi3pwznshz8vv3br7a1qdy-python3.7-urwid-2.1.0/lib/python3.7/site-packages/urwid/widget.py:27: in <module>
from urwid.util import (MetaSuper, decompose_tagmarkup, calc_width,
/nix/store/i4zw0s77xabi3pwznshz8vv3br7a1qdy-python3.7-urwid-2.1.0/lib/python3.7/site-packages/urwid/util.py:61: in <module>
detected_encoding = detect_encoding()
/nix/store/i4zw0s77xabi3pwznshz8vv3br7a1qdy-python3.7-urwid-2.1.0/lib/python3.7/site-packages/urwid/util.py:58: in detect_encoding
locale.setlocale(locale.LC_ALL, initial)
/nix/store/ga9kam5sgryz01frprfiy0b0kblmy1wi-python3-3.7.6/lib/python3.7/locale.py:608: in setlocale
return _setlocale(category, locale)
E locale.Error: unsupported locale setting
__________________ ERROR collecting tests/ui/test_widgets.py ___________________
tests/ui/test_widgets.py:1: in <module>
from khal.ui.widgets import delete_last_word
khal/ui/__init__.py:28: in <module>
import urwid
/nix/store/i4zw0s77xabi3pwznshz8vv3br7a1qdy-python3.7-urwid-2.1.0/lib/python3.7/site-packages/urwid/__init__.py:26: in <module>
from urwid.widget import (FLOW, BOX, FIXED, LEFT, RIGHT, CENTER, TOP, MIDDLE,
/nix/store/i4zw0s77xabi3pwznshz8vv3br7a1qdy-python3.7-urwid-2.1.0/lib/python3.7/site-packages/urwid/widget.py:27: in <module>
from urwid.util import (MetaSuper, decompose_tagmarkup, calc_width,
/nix/store/i4zw0s77xabi3pwznshz8vv3br7a1qdy-python3.7-urwid-2.1.0/lib/python3.7/site-packages/urwid/util.py:61: in <module>
detected_encoding = detect_encoding()
/nix/store/i4zw0s77xabi3pwznshz8vv3br7a1qdy-python3.7-urwid-2.1.0/lib/python3.7/site-packages/urwid/util.py:58: in detect_encoding
locale.setlocale(locale.LC_ALL, initial)
/nix/store/ga9kam5sgryz01frprfiy0b0kblmy1wi-python3-3.7.6/lib/python3.7/locale.py:608: in setlocale
return _setlocale(category, locale)
E locale.Error: unsupported locale setting
!!!!!!!!!!!!!!!!!!! Interrupted: 3 errors during collection !!!!!!!!!!!!!!!!!!!!
============================== 3 errors in 2.67s ===============================
builder for '/nix/store/xz21hav44vk4bdv0ph8lrk748i7x0cfr-khal-0.10.1.drv' failed with exit code 2
Metadata
system: "x86_64-linux"
host os: Linux 4.19.90, NixOS, 20.03pre206201.00915dcb631 (Markhor)
multi-user?: yes
sandbox: yes
version: nix-env (Nix) 2.3.1
channels(philipp): ""
channels(root): ""
nixpkgs: /nix/store/cvrz6l3wsjkwl69mg3abfvyfrxgnlyq8-source
Maintainer information:
# a list of nixpkgs attributes affected by the problem
attribute:
- khal
No idea how this maintainer yaml stuff works, so ping @gebner
| gharchive/issue | 2020-01-05T16:51:44 | 2025-04-01T04:32:52.413310 | {
"authors": [
"pmiddend"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/issues/76989",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
96946696 | nixos-container: wrong message for --show-trace
$ sudo nixos-container create test --config "services.postgresql.enable = true;"
[sudo] password for danbst:
host IP is 10.233.1.1, container IP is 10.233.1.2
error: The option `services.postgresql.package' is used but not defined.
(use ‘--show-trace’ to show detailed location information)
/run/current-system/sw/bin/nixos-container: failed to build initial container configuration
$ sudo nixos-container create test --config "services.postgresql.enable = true;" --show-trace
Unknown option: show-trace
$
Confirmed.
Bug still exists.
Pinging @edolstra as primary author of nixos-container, this should be an easy fix.
This issue has been mentioned on NixOS Discourse. There might be relevant details there:
https://discourse.nixos.org/t/how-to-get-a-meaningful-trace-on-a-nixos-container-build-fail/31818/1
| gharchive/issue | 2015-07-24T02:29:28 | 2025-04-01T04:32:52.415730 | {
"authors": [
"Profpatsch",
"danbst",
"nixos-discourse"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/issues/8970",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
687309166 | electrum: broken on master because of dnspython update
dnspython was updated to 2.0.0 in master in a7b5b18ab92f4f4b303d3d3526b91a28f627c68c and this broke electrum.
Unfortunately loosening the version check does not fix the issue as electrum fails with the following error while running tests:
=================================== FAILURES ===================================
_________________ TestDnsSec.test_python_validate_rrsig_ecdsa __________________
self = <electrum.tests.test_dnssec.TestDnsSec testMethod=test_python_validate_rrsig_ecdsa>
def test_python_validate_rrsig_ecdsa(self):
rrset = dns.rrset.from_text("getmonero.org.", 3599, 1, 48,
"257 3 13 mdsswUyr3DPW132mOi8V9xESWE8jTo0d xCjjnopKl+GqJxpVXckHAeF+KkxLbxIL fDLUT0rAK9iUzy1L53eKGQ==",
"256 3 13 koPbw9wmYZ7ggcjnQ6ayHyhHaDNMYELK TqT+qRGrZpWSccr/lBcrm10Z1PuQHB3A zhii+sb0PYFkH1ruxLhe5g==")
rrsig = dns.rdtypes.ANY.RRSIG.RRSIG.from_text(1, 46,
dns.tokenizer.Tokenizer("DNSKEY 13 2 3600 20180612115508 20180413115508 2371 getmonero.org. SSjtP2jCtXPukps7E3kum709xq2TH6Lt Ur32UhE7WKwSUfLTZ4EAoD5g22mi1fpB GDGb30kCMndDVjnHAEBDWw=="))
keys = {dns.name.Name([b'getmonero', b'org', b'']): rrset}
origin = None
now = 1527185178.7842247
# 'None' means it is valid
> self.assertEqual(None, dnssec.python_validate_rrsig(rrset, rrsig, keys, origin, now))
electrum/tests/test_dnssec.py:21:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
rrset = <DNS getmonero.org. IN DNSKEY RRset: [<257 3 13 mdsswUyr3DPW132mOi8V9xESWE8jTo0d xCjjnopKl+GqJxpVXckHAeF+KkxLbxIL fDLU...Uzy1L53eKGQ==>, <256 3 13 koPbw9wmYZ7ggcjnQ6ayHyhHaDNMYELK TqT+qRGrZpWSccr/lBcrm10Z1PuQHB3A zhii+sb0PYFkH1ruxLhe5g==>]>
rrsig = <DNS IN RRSIG(DNSKEY) rdata: DNSKEY 13 2 3600 20180612115508 20180413115508 2371 getmonero.org. SSjtP2jCtXPukps7E3kum709xq2TH6Lt Ur32UhE7WKwSUfLTZ4EAoD5g22mi1fpB GDGb30kCMndDVjnHAEBDWw==>
keys = {<DNS name getmonero.org.>: <DNS getmonero.org. IN DNSKEY RRset: [<257 3 13 mdsswUyr3DPW132mOi8V9xESWE8jTo0d xCjjnopKl...zy1L53eKGQ==>, <256 3 13 koPbw9wmYZ7ggcjnQ6ayHyhHaDNMYELK TqT+qRGrZpWSccr/lBcrm10Z1PuQHB3A zhii+sb0PYFkH1ruxLhe5g==>]>}
origin = None, now = 1527185178.7842247
def python_validate_rrsig(rrset, rrsig, keys, origin=None, now=None):
from dns.dnssec import ValidationFailure, ECDSAP256SHA256, ECDSAP384SHA384
> from dns.dnssec import _find_candidate_keys, _make_hash, _is_ecdsa, _is_rsa, _to_rdata, _make_algorithm_id
E ImportError: cannot import name '_to_rdata' from 'dns.dnssec' (/nix/store/nh4fj4kqi894476z606lj6a2003vm3i9-python3.8-dnspython-2.0.0/lib/python3.8/site-packages/dns/dnssec.py)
electrum/dnssec.py:69: ImportError
__________________ TestDnsSec.test_python_validate_rrsig_rsa ___________________
Upstream issue: https://github.com/spesmilo/electrum/issues/6538
I suggest downgrading dnspython back to 1.16 in nixpkgs or wait for an upstream to fix the issue (might not happen before 20.09).
If there are more failures due to this update, we may want to do this. Otherwise, electrum should instead override the Python package set with a version that fulfills its requirements.
Your upstream issue https://github.com/spesmilo/electrum/issues/6538.
@FRidh why should electrum being slow to upgrade cause an old version to be shipped in nixpkgs? I think the Electrum derivation should definitely mirror the requirements.txt from Electrum upstream, which has the version bound set correctly.
Am I saying anything different?
Submitted fix in https://github.com/NixOS/nixpkgs/pull/96596
Fix in https://github.com/NixOS/nixpkgs/pull/96625
| gharchive/issue | 2020-08-27T14:53:53 | 2025-04-01T04:32:52.420743 | {
"authors": [
"FRidh",
"prusnak",
"ysangkok"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/issues/96477",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
724951558 | plata-theme: 0.9.8 -> 0.9.9
Motivation for this change
Drop unneeded buildInputs as this derivation produces static files with no binary dependencies.
Add gtk2 and gtk-engine-murrine to propagatedUserEnvPkgs for GTK2 support at runtime.
Bump package version to 0.9.9.
Things done
[x] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux)
Built on platform(s)
[x] NixOS
[ ] macOS
[ ] other Linux distributions
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip"
[ ] Tested execution of all binary files (usually in ./result/bin/)
[ ] Determined the impact on package closure size (by running nix path-info -S before and after)
[ ] Ensured that relevant documentation is up to date
[x] Fits CONTRIBUTING.md.
Changelog: https://gitlab.com/tista500/plata-theme/-/releases/0.9.9
Result of nixpkgs-review pr 101093 run on x86_64-linux 1
1 package built:
plata-theme
@tadfisher would you mind rebasing this? :)
@tadfisher would you mind rebasing this? :)
@IvarWithoutBones Rebased, thanks.
| gharchive/pull-request | 2020-10-19T20:28:19 | 2025-04-01T04:32:52.428799 | {
"authors": [
"IvarWithoutBones",
"SuperSandro2000",
"jtojnar",
"tadfisher"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/101093",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
752825990 | ocamlPackages.eliom: 6.12.1 -> 6.12.4
Automatic update generated by nixpkgs-update tools. This update was made based on information from https://repology.org/metapackage/eliom/versions.
meta.description for ocamlPackages.eliom is: "OCaml Framework for programming Web sites and client/server Web applications"
meta.homepage for ocamlPackages.eliom is: "http://ocsigen.org/eliom/"
meta.changelog for ocamlPackages.eliom is: ""
Updates performed
Version update
To inspect upstream changes
Compare changes on GitHub
Impact
Checks done (click to expand)
built on NixOS
The tests defined in passthru.tests, if any, passed
0 of 0 passed binary check by having a zero exit code.
0 of 0 passed binary check by having the new version present in output.
directory tree listing: https://gist.github.com/219b11610b3af317d06e0869f3b03a6a
du listing: https://gist.github.com/8b593c09fe13966ea97216d90bb4b6fe
Rebuild report (if merged into master) (click to expand)
19533 total rebuild path(s)
6327 package rebuild(s)
6313 x86_64-linux rebuild(s)
5687 i686-linux rebuild(s)
2325 x86_64-darwin rebuild(s)
5208 aarch64-linux rebuild(s)
First fifty rebuilds by attrpath
AusweisApp2
DisnixWebService
OSCAR
PlistCpp
_1password-gui
abcm2ps
acgtk
acoustidFingerprinter
adapta-gtk-theme
adminer
adwaita-qt
aeon
agave
agda
agdaPackages.agda
agdaPackages.agda-categories
agdaPackages.agda-prelude
agdaPackages.cubical
agdaPackages.functional-linear-algebra
agdaPackages.generic
agdaPackages.iowa-stdlib
agdaPackages.standard-library
aj-snapshot
albert
aliza
almanah
amarok
amarok-kf5
ammonite
ammonite_2_12
ammonite_2_13
ams
android-file-transfer
animbar
anki
ankisyncd
antimicroX
antimony
ao
apache-airflow
apitrace
apmplanner2
apostrophe
appcsxcad
appleseed
aqemu
arcanist
ardour
ardour_5
arrow-cpp
Instructions to test this update (click to expand)
Either download from Cachix:
nix-store -r /nix/store/l4hvhca92444mnjrm7f9lvxcyncskysp-eliom-6.12.4 \
--option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \
--option trusted-public-keys '
nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=
cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=
'
(The Cachix cache is only trusted for this store-path realization.)
For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted.
Or, build yourself:
nix-build -A ocamlPackages.eliom https://github.com/r-ryantm/nixpkgs/archive/2b641e9d8537f0861ee997e72a3666b7009c2a10.tar.gz
After you've downloaded or built it, look at the files and if there are any, run the binaries:
ls -la /nix/store/l4hvhca92444mnjrm7f9lvxcyncskysp-eliom-6.12.4
ls -la /nix/store/l4hvhca92444mnjrm7f9lvxcyncskysp-eliom-6.12.4/bin
Pre-merge build results
NixPkgs review skipped
Maintainer pings
cc @FlorentBecker for testing.
Result of nixpkgs-review pr 105313 run on x86_64-linux 1
3 packages built:
ocamlPackages.eliom
ocamlPackages.ocsigen-start
ocamlPackages.ocsigen-toolkit
| gharchive/pull-request | 2020-11-29T03:10:25 | 2025-04-01T04:32:52.438196 | {
"authors": [
"SuperSandro2000",
"r-ryantm"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/105313",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
753319536 | sile: 0.10.12 → 0.10.13
Motivation for this change
Upstream release.
Bumping in the blind here but CI should check this okay ... there are no dependency changes or anything else significant to build & packaging in this release.
Things done
[ ] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux)
Built on platform(s)
[ ] NixOS
[ ] macOS
[ ] other Linux distributions
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[x] Tested compilation of all pkgs that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip"
[ ] Tested execution of all binary files (usually in ./result/bin/)
[ ] Determined the impact on package closure size (by running nix path-info -S before and after)
[x] Ensured that relevant documentation is up to date
[x] Fits CONTRIBUTING.md.
Result of nixpkgs-review pr 105438 run on x86_64-linux 1
1 package built:
sile
Fails to build on darwin:
cp .libs/justenoughharfbuzz.so .libs/justenoughfontconfig.so .libs/justenoughlibtexpdf.so .libs/fontmetrics.so .libs/svg.so .libs/justenoughicu.so ../core
make[2]: Leaving directory '/private/tmp/nix-build-sile-0.10.13.drv-0/sile-0.10.13/src'
make[2]: Entering directory '/private/tmp/nix-build-sile-0.10.13.drv-0/sile-0.10.13'
make[2]: Nothing to be done for 'all-am'.
make[2]: Leaving directory '/private/tmp/nix-build-sile-0.10.13.drv-0/sile-0.10.13'
make[1]: Leaving directory '/private/tmp/nix-build-sile-0.10.13.drv-0/sile-0.10.13'
@nix { "action": "setPhase", "phase": "checkPhase" }
running tests
check flags: -j4 -l4 SHELL=/nix/store/k89nm2jva0qmvd970f84wq2iq1iwm9bs-bash-4.4-p23/bin/bash VERBOSE=y check
make all-recursive
make[1]: Entering directory '/private/tmp/nix-build-sile-0.10.13.drv-0/sile-0.10.13'
Making all in libtexpdf
make[2]: Entering directory '/private/tmp/nix-build-sile-0.10.13.drv-0/sile-0.10.13/libtexpdf'
make all-am
make[3]: Entering directory '/private/tmp/nix-build-sile-0.10.13.drv-0/sile-0.10.13/libtexpdf'
make[3]: Nothing to be done for 'all-am'.
make[3]: Leaving directory '/private/tmp/nix-build-sile-0.10.13.drv-0/sile-0.10.13/libtexpdf'
make[2]: Leaving directory '/private/tmp/nix-build-sile-0.10.13.drv-0/sile-0.10.13/libtexpdf'
Making all in src
make[2]: Entering directory '/private/tmp/nix-build-sile-0.10.13.drv-0/sile-0.10.13/src'
cp .libs/justenoughharfbuzz.so .libs/justenoughfontconfig.so .libs/justenoughlibtexpdf.so .libs/fontmetrics.so .libs/svg.so .libs/justenoughicu.so ../core
make[2]: Leaving directory '/private/tmp/nix-build-sile-0.10.13.drv-0/sile-0.10.13/src'
make[2]: Entering directory '/private/tmp/nix-build-sile-0.10.13.drv-0/sile-0.10.13'
make[2]: Nothing to be done for 'all-am'.
make[2]: Leaving directory '/private/tmp/nix-build-sile-0.10.13.drv-0/sile-0.10.13'
make[1]: Leaving directory '/private/tmp/nix-build-sile-0.10.13.drv-0/sile-0.10.13'
touch .built-subdirs
output=$(mktemp --suffix=.pdf)
trap 'rm -f $output' EXIT SIGHUP SIGTERM
./sile -o $output - <<< "<sile>foo</sile>"
pdfinfo $output | grep "SILE v0.10.13"
./sile: line 2: SYSTEM_SILE_PATH: command not found
./sile: line 3: SHARED_LIB_EXT: command not found
./sile: line 5: syntax error near unexpected token `('
./sile: line 5: `local executable = debug.getinfo(1, "S").short_src'
Syntax Error: Document stream is empty
make: *** [Makefile:1417: selfcheck] Error 1
@SuperSandro2000 I'm not exactly sure what that error is about, but here are a couple things to note:
The error being thrown suggests that automake tooling didn't run properly on sile.in, otherwise those lines would not be placeholders they would be valid Lua code.
This bit of the Makefile.am & configure.ac files hasn't changed at all since the last release, nor indeed many releases before that.
This isn't just a problem with SILE on macOS, the Homebrew builds for this release went off without a hitch and are already in the wild.
I don't know what to say is causing this, that's just some info that might help narrow it down.
Full log https://termbin.com/w11x
I found something interesting.
./libtool: line 8118: func_munge_path_list: command not found
If this does not help just mark it broken on darwin. I have no idea right now either.
I think we discussed in the past how we usually handle autoconf / automake (vs Nixpkgs' autoreconfHook) & and whether we usually want / don't want to use source tarballs, or bare git checkouts. This package is sitting in both sides of the fence - it needs the tarball that was generated by the release process of upstream - i.e this tarball but still somehow it requires autoconf and automake during the build, and not autoreconfHook.
I tried getting it to build from a git checkout with this diff:
diff --git i/pkgs/tools/typesetting/sile/default.nix w/pkgs/tools/typesetting/sile/default.nix
index 239bafa05c9..2d22dff650f 100644
--- i/pkgs/tools/typesetting/sile/default.nix
+++ w/pkgs/tools/typesetting/sile/default.nix
@@ -1,10 +1,10 @@
{ stdenv
, darwin
-, fetchurl
+# , fetchurl
+, fetchFromGitHub
, makeWrapper
, pkg-config
-, autoconf
-, automake
+, autoreconfHook
, poppler_utils
, harfbuzz
, icu
@@ -38,21 +38,28 @@ in
stdenv.mkDerivation rec {
pname = "sile";
- version = "0.10.12";
+ version = "0.10.13";
- src = fetchurl {
- url = "https://github.com/sile-typesetter/sile/releases/download/v${version}/${pname}-${version}.tar.xz";
- sha256 = "0bxm3vhba289vcgpzbs1hz5fjamf0zgxkr7h8vcsiijjjavmv64a";
+ src = fetchFromGitHub {
+ owner = "sile-typesetter";
+ repo = "sile";
+ rev = "v${version}";
+ # url = "https://github.com/sile-typesetter/sile/releases/download/v${version}/${pname}-${version}.tar.xz";
+ sha256 = "pNV2xdFjL3f91rnDLPs1DMr24Mz+ZasOarI+D4q/E+4=";
+ fetchSubmodules = true;
};
+ postUnpack = ''
+ patchShebangs $sourceRoot/build-aux/{decore-automake.sh,list-dist-files.sh,git-version-gen}
+ '';
+
configureFlags = [
"--with-system-luarocks"
"--with-manual"
];
nativeBuildInputs = [
- autoconf
- automake
+ autoreconfHook
pkg-config
makeWrapper
];
But due to the build being sandboxed I encountered issues with the fonts that are supposed to be downloaded if the build is done from a git checkout due to:
https://github.com/sile-typesetter/sile/blob/0c9c8bf7a8b0e94d887a4ed055210e32cb471a5c/Makefile-fonts#L35
So @alerque if you could find a way to make it easy for Nix to download all the necessary fonts, that would be great. Otherwise, we can mark it as broken for Darwin.
Result of nixpkgs-review pr 105438 1
1 package built:
sile
Result of nixpkgs-review pr 105438 1
1 package built:
sile
So @alerque if you could find a way to make it easy for Nix to download all the necessary fonts, that would be great. Otherwise, we can mark it as broken for Darwin.
Thanks for the follow up on this @doronbehar. Sorry I've been AWOL for a while. I got a bit buried by life and FOSS stuff got really patchy.
Just to clarify here, building from Git requires font downloads because the manual is not prebuilt in the Git repository (it would be a huge binary blob that updates on every commit). There already is a helper in the Makefile for downloading fonts, but you don't need it. The source tarballs have a prebuilt PDF manual in the package and don't need to download any fonts.
What was really wrong here is that autoconf/automake should not be required by builds from the tarball. I don't quite understand what the resolution was here, but if there is still something in the source tarballs that requires autoconf I'd like to fix it.
So @alerque if you could find a way to make it easy for Nix to download all the necessary fonts, that would be great. Otherwise, we can mark it as broken for Darwin.
Thanks for the follow up on this @doronbehar. Sorry I've been AWOL for a while. I got a bit buried by life and FOSS stuff got really patchy.
Just to clarify here, building from Git requires font downloads because the manual is not prebuilt in the Git repository (it would be a huge binary blob that updates on every commit). There already is a helper in the Makefile for downloading fonts, but you don't need it. The source tarballs have a prebuilt PDF manual in the package and don't need to download any fonts.
What was really wrong here is that autoconf/automake should not be required by builds from the tarball. I don't quite understand what the resolution was here, but if there is still something in the source tarballs that requires autoconf I'd like to fix it.
What was really wrong here is that autoconf/automake should not be required by builds from the tarball.
Could it be it's needed for the tests? The fact that we need autoconf & automake (for whatever rightful or not reasons), it's not the reason it was broken on Darwin.
I don't quite understand what the resolution was here
See https://github.com/NixOS/nixpkgs/pull/105438#pullrequestreview-564836687 - it's totally a Nix issue on Darwin. It's possible that prior to this update, sile was broken on darwin, but we didn't know it.
What was really wrong here is that autoconf/automake should not be required by builds from the tarball.
Could it be it's needed for the tests? The fact that we need autoconf & automake (for whatever rightful or not reasons), it's not the reason it was broken on Darwin.
I don't quite understand what the resolution was here
See https://github.com/NixOS/nixpkgs/pull/105438#pullrequestreview-564836687 - it's totally a Nix issue on Darwin. It's possible that prior to this update, sile was broken on darwin, but we didn't know it.
Could it be it's needed for the tests?
Yes, that's possible.
The fact that we need autoconf & automake (for whatever rightful or not reasons), it's not the reason it was broken on Darwin.
I'd like to get to the bottom of this and eliminate whatever reasons there may be.
Lets say I had a working Docker or VirtualBox image spun up with Nix on board (I have both). What would be the most expeditious way to play with this formula such that I can edit it to experiment without waiting for CI and such that I can feed it test tarballs of unreleased sources. For science.
Could it be it's needed for the tests?
Yes, that's possible.
The fact that we need autoconf & automake (for whatever rightful or not reasons), it's not the reason it was broken on Darwin.
I'd like to get to the bottom of this and eliminate whatever reasons there may be.
Lets say I had a working Docker or VirtualBox image spun up with Nix on board (I have both). What would be the most expeditious way to play with this formula such that I can edit it to experiment without waiting for CI and such that I can feed it test tarballs of unreleased sources. For science.
The issue due to it this is broken on Darwin is very old: https://github.com/NixOS/nixpkgs/issues/23018 and only a few weeks ago at https://github.com/NixOS/rfcs/pull/75#issuecomment-760942876 we sort of only slightly tackled a close issue related to it.
The issue due to it this is broken on Darwin is very old: https://github.com/NixOS/nixpkgs/issues/23018 and only a few weeks ago at https://github.com/NixOS/rfcs/pull/75#issuecomment-760942876 we sort of only slightly tackled a close issue related to it.
| gharchive/pull-request | 2020-11-30T09:41:20 | 2025-04-01T04:32:52.462263 | {
"authors": [
"SuperSandro2000",
"WolfangAukang",
"alerque",
"doronbehar"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/105438",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
849089208 | nix: Run sandbox tests
Run the sandbox tests for stable nix on linux too.
To find problems like this earlier: https://github.com/NixOS/nix/pull/4659
This problem was revealed in https://github.com/NixOS/nixpkgs/pull/118128#issuecomment-810893011
common.sh: line 89: unshare: command not found
This PR does not fix that PR, but improves nix testing.
Motivation for this change
Things done
[x] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux)
Built on platform(s)
[x] NixOS
[ ] macOS
[ ] other Linux distributions
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip"
[ ] Tested execution of all binary files (usually in ./result/bin/)
[ ] Determined the impact on package closure size (by running nix path-info -S before and after)
[ ] Ensured that relevant documentation is up to date
[x] Fits CONTRIBUTING.md.
This is a semi-automatic executed nixpkgs-review with nixpkgs-review-checks extension. It is checked by a human on a best effort basis and does not build all packages (e.g. lumo, tensorflow or pytorch).
If you have any questions or problems please reach out to SuperSandro2000 on IRC.
Result of nixpkgs-review pr 118298 run on x86_64-linux 1
1 package marked as broken and skipped:
nix-exec
2 packages blacklisted:
tests.nixos-functions.nixos-test
tests.nixos-functions.nixosTest-test
4 packages failed to build and already failed to build on hydra master:
dydisnix: log was empty
haskellPackages.update-nix-fetchgit: log was empty
libnixxml: log was empty
update-nix-fetchgit: log was empty
48 packages built:
bundix
cabal2nix
cachix
common-updater-scripts
crate2nix
crystal2nix
dep2nix
fusionInventory
go2nix
haskellPackages.cachix
haskellPackages.hercules-ci-agent
haskellPackages.hercules-ci-cnix-expr
haskellPackages.hercules-ci-cnix-store
haskellPackages.nix-paths
hercules-ci-agent
lispPackages.quicklisp-to-nix
lispPackages.quicklisp-to-nix-system-info
nix (nixStable)
nix-bundle
nix-doc
nix-du
nix-index
nix-pin
nix-plugins
nix-prefetch
nix-prefetch-bzr
nix-prefetch-cvs
nix-prefetch-docker
nix-prefetch-git
nix-prefetch-hg
nix-prefetch-scripts
nix-prefetch-svn
nix-serve
nix-update
nix-update-source
nixStatic
nixos-generators
nixos-rebuild
nixos-shell
nixui
python38Packages.nix-kernel
python38Packages.nixpkgs
python38Packages.pythonix
python39Packages.nix-kernel
python39Packages.nixpkgs
python39Packages.pythonix
vgo2nix
vulnix
| gharchive/pull-request | 2021-04-02T08:53:35 | 2025-04-01T04:32:52.473934 | {
"authors": [
"SuperSandro2000",
"roberth"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/118298",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
851382047 | haskellPackages.futhark: mark as no longer broken
Motivation for this change
Futhark is no longer broken
Things done
[ ] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux)
Built on platform(s)
[x] NixOS
[ ] macOS
[ ] other Linux distributions
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip"
[ ] Tested execution of all binary files (usually in ./result/bin/)
[ ] Determined the impact on package closure size (by running nix path-info -S before and after)
[ ] Ensured that relevant documentation is up to date
[ ] Fits CONTRIBUTING.md.
Thanks for checking up on this!
CONTRIBUTING.md mandates a commit message like <pkg>: <change>, could you please amend so the message is something like haskellPackages.futhark: mark as no longer broken?
This PR needs to go to haskell-updates, so hackage2nix picks up on the changed configuration and can regenerate the package set properly. Could you change the target branch of the PR?
Can you umark shake-futhark as well? Seems to be unbroken as well now.
@sternenseemann Thank you for your comments. I believe I have addressed all three now.
Thanks a lot! Your fixes will be included with #118350.
| gharchive/pull-request | 2021-04-06T12:38:19 | 2025-04-01T04:32:52.480743 | {
"authors": [
"Munksgaard",
"sternenseemann"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/118659",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
948449527 | coreterminal: init at 4.2.0
Motivation for this change
Things done
[x] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux)
Built on platform(s)
[x] NixOS
[ ] macOS
[ ] other Linux distributions
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip"
[x] Tested execution of all binary files (usually in ./result/bin/)
21.11 Release Notes (or backporting 21.05 Relase notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[x] Fits CONTRIBUTING.md.
@SuperSandro2000 So, everything did it.
Result of nixpkgs-review pr 130737 at 2c7919b8 run on aarch64-linux 1
2 packages failed to build:
coreterminal
libcprime
Note that build failures may predate this PR, and could be nondeterministic or hardware dependent.
Please exercise your independent judgement. Does something look off? Please file an issue or reach out on IRC.
Please do one commit per package.
Understood
@SuperSandro2000 Ready!
I meant one commit for libcprime and one for coreterminal.
I meant one commit for libcprime and one for coreterminal.
A..On again rearranged PR
@SuperSandro2000 Done.
| gharchive/pull-request | 2021-07-20T09:02:39 | 2025-04-01T04:32:52.489277 | {
"authors": [
"SuperSandro2000",
"dan4ik605743",
"r-rmcgibbo"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/130737",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
963198530 | Gitstatus
Motivation for this change
Things done
[ ] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux)
Built on platform(s)
[ ] NixOS
[ ] macOS
[ ] other Linux distributions
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip"
[ ] Tested execution of all binary files (usually in ./result/bin/)
21.11 Release Notes (or backporting 21.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] Fits CONTRIBUTING.md.
Result of nixpkgs-review pr 132991 at e4cbde69 run on x86_64-linux 1
2 packages built successfully:
gitstatus
zsh-powerlevel10k
1 suggestion:
warning: missing-phase-hooks
installPhase should probably contain runHook preInstall and runHook postInstall.
Near pkgs/applications/version-management/git-and-tools/gitstatus/default.nix:22:3:
|
22 | installPhase = ''
| ^
| gharchive/pull-request | 2021-08-07T09:55:22 | 2025-04-01T04:32:52.496733 | {
"authors": [
"SuperSandro2000",
"r-rmcgibbo"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/132991",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
142843888 | iodined service: wantedBy ip-up.target
The Change:
When iodined tries to start before any interface other than loopback has an ip, iodined fails.
Wait for ip-up.target
The above is because of the following:
in iodined's code: src/common.c line 157
the flag AI_ADDRCONFIG is passed as a flag to getaddrinfo.
Iodine uses the function
get_addr(char *host,
int port,
int addr_family,
int flags,
struct sockaddr_storage *out);
to get address information via getaddrinfo().
Within get_addr, the flag AI_ADDRCONFIG is forced.
What this flag does, is cause getaddrinfo to return
"Name or service not known" as an error explicitly if no ip
has been assigned to the computer.
see getaddrinfo(3)
Wait for an ip before starting iodined.
Things done:
[x] Tested using sandboxing (nix-build --option build-use-chroot true or nix.useChroot on NixOS)
Built on platform(s)
[x] NixOS
[ ] OS X
[ ] Linux
[x] Tested compilation of all pkgs that depend on this change using nix-shell -p nox --run "nox-review wip"
[x] Tested execution of all binary files (usually in ./result/bin/)
[x] Fits CONTRIBUTING.md.
The desired commit subject format is foo service: description, it makes it easier for someone reading the history to see that the change pertains to a nixos service and not, say, a package.
Thanks for the tip.
I was being unclear: I meant to change the actual commit subject, not the issue subject (though that is nice, too).
Thanks. I've included this in the upcoming release as well.
| gharchive/pull-request | 2016-03-23T02:52:30 | 2025-04-01T04:32:52.501866 | {
"authors": [
"Pleune",
"joachifm"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/14140",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
143732088 | perf: fix build
Things done:
[x] Tested using sandboxing (nix-build --option build-use-chroot true or nix.useChroot on NixOS)
Built on platform(s)
[ ] NixOS
[ ] OS X
[x] Linux
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nox --run "nox-review wip"
[ ] Tested execution of all binary files (usually in ./result/bin/)
[x] Fits CONTRIBUTING.md.
More:
Ref: https://github.com/NixOS/nixpkgs/issues/13559
output path ‘/nix/store/w7a552hvyai19q35i31xlfijsl14l6i5-spark-1.6.0-bin-cdh4.tgz’ has r:sha256 hash ‘19ycx1r8g82vkvzmn9wxkssmv2damrg72yfmrgzpc6xyh071g91c’ when ‘0waq8xx4bjj1yvfbadv1gdvz8s4kh5zasicv2n5623ld6lj7zgad’ was expected
fetching path ‘/nix/store/w1829y422rlw53ls9dibpmr9mcakj1yr-apache-maven-3.3.9’...
cannot build derivation ‘/nix/store/78pgri0fch8miki6mw15m4ggj5kldi7z-spark-1.6.0.drv’: 1 dependencies couldn't be built
Will investigate this later.
Ah, the spark problem was fixed in https://github.com/NixOS/nixpkgs/pull/13752
| gharchive/pull-request | 2016-03-26T17:20:44 | 2025-04-01T04:32:52.506385 | {
"authors": [
"joachifm"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/14225",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1042949778 | cargo-make: 0.35.5 -> 0.35.6
Automatic update generated by nixpkgs-update tools. This update was made based on information from https://github.com/sagiegurari/cargo-make/releases.
meta.description for cargo-make is: "A Rust task runner and build tool"
meta.homepage for cargo-make is: "https://github.com/sagiegurari/cargo-make"
meta.changelog for cargo-make is: ""
Updates performed
Rust version update
To inspect upstream changes
Impact
Checks done (click to expand)
built on NixOS
The tests defined in passthru.tests, if any, passed
/nix/store/3sww9w4awi7rnmzs0hyc2j3f23wwy087-cargo-make-0.35.6/bin/makers passed the binary check.
/nix/store/3sww9w4awi7rnmzs0hyc2j3f23wwy087-cargo-make-0.35.6/bin/cargo-make passed the binary check.
2 of 2 passed binary check by having a zero exit code.
1 of 2 passed binary check by having the new version present in output.
found 0.35.6 with grep in /nix/store/3sww9w4awi7rnmzs0hyc2j3f23wwy087-cargo-make-0.35.6
found 0.35.6 in filename of file in /nix/store/3sww9w4awi7rnmzs0hyc2j3f23wwy087-cargo-make-0.35.6
Rebuild report (if merged into master) (click to expand)
2 total rebuild path(s)
1 package rebuild(s)
1 x86_64-linux rebuild(s)
0 i686-linux rebuild(s)
1 x86_64-darwin rebuild(s)
0 aarch64-linux rebuild(s)
First fifty rebuilds by attrpath
cargo-make
Instructions to test this update (click to expand)
Either download from Cachix:
nix-store -r /nix/store/3sww9w4awi7rnmzs0hyc2j3f23wwy087-cargo-make-0.35.6 \
--option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \
--option trusted-public-keys '
nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=
cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=
'
(The Cachix cache is only trusted for this store-path realization.)
For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted.
Or, build yourself:
nix-build -A cargo-make https://github.com/r-ryantm/nixpkgs/archive/142c9ec506728a74e3148ac9c14714b64c7affd2.tar.gz
After you've downloaded or built it, look at the files and if there are any, run the binaries:
ls -la /nix/store/3sww9w4awi7rnmzs0hyc2j3f23wwy087-cargo-make-0.35.6
ls -la /nix/store/3sww9w4awi7rnmzs0hyc2j3f23wwy087-cargo-make-0.35.6/bin
Pre-merge build results
We have automatically built all packages that will get rebuilt due to
this change.
This gives evidence on whether the upgrade will break dependent packages.
Note sometimes packages show up as failed to build independent of the
change, simply because they are already broken on the target branch.
Result of nixpkgs-review run on x86_64-linux 1
1 package built:
cargo-make
Maintainer pings
cc @xrelkd @ma27 for testing.
Result of nixpkgs-review pr 144309 run on x86_64-linux 1
1 package built:
cargo-make
| gharchive/pull-request | 2021-11-03T00:00:20 | 2025-04-01T04:32:52.516825 | {
"authors": [
"figsoda",
"r-ryantm"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/144309",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1088983802 | llvm12: create fix-llvm-issue-49955.patch
This patch addresses llvm/llvm-project#49955
Seems reasonable. I guess the commit message should also be updated.
Fixed staging-next eval in fba4cce694d
Does this need to go to staging-next? In general we'd send this to staging
Can we fetchpatch the patch or did it need to be rebased?
LLVM 13 is unaffected?
Fixed staging-next eval in fba4cce, you can rebase to fix CI
Does this need to go to staging-next? In general we'd send this to staging
I don't remember who told me to put this against staging-next, I rebased against staging.
Can we fetchpatch the patch or did it need to be rebased?
LLVM 13 is unaffected?
I do not know.
Can you actually check if this is still an issue for LLVM 13 and HEAD and add the patch for these versions as well, if so? Otherwise we are just bound to run into this again at some point down the line (e. g. when we ship a GHC with LLVM 13 etc.).
I do not know.
Can you actually check if this is still an issue for LLVM 13 and HEAD and add the patch for these versions as well, if so? Otherwise we are just bound to run into this again at some point down the line (e. g. when we ship a GHC with LLVM 13 etc.).
Let me try to figure out how to actually test this.
Thanks @angerman. I can imagine trying to repro that is frustrating, we appreciate it.
Just to be clear, we use
if (CMAKE_COMPILER_IS_GNUCXX)
set_source_files_properties(DwarfCompileUnit.cpp PROPERTIES
COMPILE_FLAGS -fno-strict-aliasing)
endif()
because
1). compile llvm with clang.
2). compile llvm with gcc-10 and above.
3). if compiling llvm with gcc-8 and gcc-9 make sure to compile
DwarfCompileUnit.cpp with(-fno-strict-aliasing).
but I doubt it's 10+. I've seen with 11 or so. This comment also makes me believe its a more generic issue:
Seeing as only GCC 10 works (by lack of proper inlining?), would you say the whole of LLVM should be compiled with -fno strict-aliasing when GCC is detected (clang already does this in its CMakeLists.txt I believe) or is there an aliasing violation that needs to be fixed in LLVM?
I'll try to build a few GHC 8.10.7 with llvm13 and head.
It does not appear to break with llvm13, unless I messed something up in my test-setup.
Slight revision: later GHC fails to build with llvm13 and later. But that's a GHC bug, not an llvm/gcc bug afaict.
Okay, so we'll go ahead like this? Small note: llvm12 is not an actual attribute, commit message would need to be llvm_12 or llvmPackages_12.llvm.
I presume you want a backport for this?
@sternenseemann yes I do want a backport. I'll amend with a better commit message.
| gharchive/pull-request | 2021-12-27T05:49:31 | 2025-04-01T04:32:52.525851 | {
"authors": [
"7c6f434c",
"Ericson2314",
"angerman",
"sternenseemann"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/152321",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1137111488 | Add dataFolder option to vaultwarden service
Motivation for this change
The data folder for the vaultwarden service is currently hard-coded to /var/lib/bitwarden_rs here: https://github.com/NixOS/nixpkgs/blob/nixos-21.11/nixos/modules/services/security/vaultwarden/default.nix#L28
Setting this option to something else than the default via environment variables breaks the nixos module. The datafolder can be set with this environment variable: https://github.com/dani-garcia/vaultwarden/blob/main/.env.template#L8
Things done
Built on platform(s)
[x] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[x] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
22.05 Release Notes (or backporting 21.11 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] (Release notes changes) Ran nixos/doc/manual/md-to-db.sh to update generated release notes
[x] Fits CONTRIBUTING.md.
Additional to the suggested change bellow you should wrap the StateDirectory directive in a mkIf (cfg.dataDir == "/var/lib/vaultwarden") condition so you aren't creating a directory for no reason.
I wrapped it the same way it is done in https://github.com/NixOS/nixpkgs/blob/79fdbeb25a17d6d872f532686954948ada41cda0/nixos/modules/services/web-servers/caddy/default.nix#L308. Please check if that is correct, I wasn't 100% sure how this works exactly.
Great! Please squash down to a single commit. Thanks!
Great! Please squash down to a single commit. Thanks!
Done :heavy_check_mark:
Can you bind mount the intented storage to /var/lib/vaultwarden instead of creating an option for it? iirc this kind of options has been problematic in the transmission module because some people want the directory to be created, some other not, some of them want the module to chmod, some other don't and so on.
According to the error it seems like we should set services.vaultwarden.config.dataFolder = "${cfg.dataFolder}/data"; in the module configuration.
@symphorien I understand what you're saying, but doesn't the provided description clarify the situation? I'm under the impression @sjau ran into issues because they didn't set ownership/permissions accordingly.
@sjau ran into issues because they didn't set ownership/permissions accordingly.
You see the permissions. What's wrong with those?
Ok, I tried again.
As you know I did set the data path to /data/bitwarden/data. At the same time I did delete the /var/lib/bitwaden_rs folder.
Now I changed the configuration back to:
services.vaultwarden = {
enable = true;
dbBackend = "sqlite";
# backupDir = "/data/bitwarden/backup";
config = {
domain = "https://bw.sjau.ch:443";
signupsAllowed = true;
# The rocketPort option should match the value of the port in the reverse-proxy
rocketPort = 8222;
# dataFolder = "/data/bitwarden/data";
# databaseUrl = "/data/bitwarden/data/db.sqlite3";
};
# The environment file contiains secrets and is stored in pass
# environmentFile = "/data/bitwarden/envfile";
};
However, it will not auto-create the bitwarden_rs folder now:
systemctl status vaultwarden.service
× vaultwarden.service
Loaded: loaded (/etc/systemd/system/vaultwarden.service; enabled; vendor preset: enabled)
Active: failed (Result: exit-code) since Thu 2022-02-17 07:20:23 CET; 22s ago
Process: 980 ExecStart=/nix/store/vc7nfcy8i1lbxfg50hk3bwy1fr1m1nnm-vaultwarden-1.24.0/bin/vaultwarden (code=exited, status=1/FAILURE)
Main PID: 980 (code=exited, status=1/FAILURE)
IP: 0B in, 0B out
CPU: 118ms
Feb 17 07:20:23 freshNixos vaultwarden[980]: | Send usage/configuration questions or feature requests to: |
Feb 17 07:20:23 freshNixos vaultwarden[980]: | https://vaultwarden.discourse.group/ |
Feb 17 07:20:23 freshNixos vaultwarden[980]: | Report suspected bugs/issues in the software itself at: |
Feb 17 07:20:23 freshNixos vaultwarden[980]: | https://github.com/dani-garcia/vaultwarden/issues/new |
Feb 17 07:20:23 freshNixos vaultwarden[980]: \--------------------------------------------------------------------/
Feb 17 07:20:23 freshNixos vaultwarden[980]: [INFO] No .env file found.
Feb 17 07:20:23 freshNixos vaultwarden[980]: [2022-02-17 07:20:23.752][vaultwarden][ERROR] Data folder '/var/lib/bitwarden_rs' doesn't exist.
Feb 17 07:20:23 freshNixos vaultwarden[980]: [2022-02-17 07:20:23.754][vaultwarden][ERROR] Create the data folder and try again.
Feb 17 07:20:23 freshNixos systemd[1]: vaultwarden.service: Main process exited, code=exited, status=1/FAILURE
Feb 17 07:20:23 freshNixos systemd[1]: vaultwarden.service: Failed with result 'exit-code'.
So, I did create now the /var/lib/bitwarden_rs folder
[root@freshNixos:~]# cd /var
[root@freshNixos:/var]# cd lib
[root@freshNixos:/var/lib]# mkdir bitwarden_rs
[root@freshNixos:/var/lib]# chown vaultwarden:vaultwarden bitwarden_rs/
then I restarted vaultwarden:
[root@freshNixos:/var/lib]# systemctl restart vaultwarden.service
[root@freshNixos:/var/lib]# systemctl status vaultwarden.service
× vaultwarden.service
Loaded: loaded (/etc/systemd/system/vaultwarden.service; enabled; vendor preset: enabled)
Active: failed (Result: exit-code) since Thu 2022-02-17 07:22:58 CET; 7s ago
Process: 1230 ExecStart=/nix/store/vc7nfcy8i1lbxfg50hk3bwy1fr1m1nnm-vaultwarden-1.24.0/bin/vaultwarden (code=exited, status=1/FAILURE)
Main PID: 1230 (code=exited, status=1/FAILURE)
IP: 0B in, 0B out
CPU: 89ms
Feb 17 07:22:58 freshNixos vaultwarden[1230]: | official channels to report bugs/features, regardless of client. |
Feb 17 07:22:58 freshNixos vaultwarden[1230]: | Send usage/configuration questions or feature requests to: |
Feb 17 07:22:58 freshNixos vaultwarden[1230]: | https://vaultwarden.discourse.group/ |
Feb 17 07:22:58 freshNixos vaultwarden[1230]: | Report suspected bugs/issues in the software itself at: |
Feb 17 07:22:58 freshNixos vaultwarden[1230]: | https://github.com/dani-garcia/vaultwarden/issues/new |
Feb 17 07:22:58 freshNixos vaultwarden[1230]: \--------------------------------------------------------------------/
Feb 17 07:22:58 freshNixos vaultwarden[1230]: [INFO] No .env file found.
Feb 17 07:22:58 freshNixos vaultwarden[1230]: [2022-02-17 07:22:58.222][vaultwarden][ERROR] Error creating keys, exiting...
Feb 17 07:22:58 freshNixos systemd[1]: vaultwarden.service: Main process exited, code=exited, status=1/FAILURE
Feb 17 07:22:58 freshNixos systemd[1]: vaultwarden.service: Failed with result 'exit-code'.
there seems to be quite a lot of problems.
After that I did remove the created bitwarden_rs folder again, remove vaultwarden from Nixos, rebooted and enabled vaultwarden again. I did just run nixos-rebuild boot -I nixpkgs=/root/nixos-master, where nixos-master is the git copy with the patch applied. So after reboot it failed again:
[root@freshNixos:~]# systemctl status vaultwarden.service
× vaultwarden.service
Loaded: loaded (/etc/systemd/system/vaultwarden.service; enabled; vendor preset: enabled)
Active: failed (Result: exit-code) since Thu 2022-02-17 07:31:40 CET; 17s ago
Process: 983 ExecStart=/nix/store/vc7nfcy8i1lbxfg50hk3bwy1fr1m1nnm-vaultwarden-1.24.0/bin/vaultwarden (code=exited, status=1/FAILURE)
Main PID: 983 (code=exited, status=1/FAILURE)
IP: 0B in, 0B out
CPU: 97ms
Feb 17 07:31:40 freshNixos vaultwarden[983]: | Send usage/configuration questions or feature requests to: |
Feb 17 07:31:40 freshNixos vaultwarden[983]: | https://vaultwarden.discourse.group/ |
Feb 17 07:31:40 freshNixos vaultwarden[983]: | Report suspected bugs/issues in the software itself at: |
Feb 17 07:31:40 freshNixos vaultwarden[983]: | https://github.com/dani-garcia/vaultwarden/issues/new |
Feb 17 07:31:40 freshNixos vaultwarden[983]: \--------------------------------------------------------------------/
Feb 17 07:31:40 freshNixos vaultwarden[983]: [INFO] No .env file found.
Feb 17 07:31:40 freshNixos vaultwarden[983]: [2022-02-17 07:31:40.595][vaultwarden][ERROR] Data folder '/var/lib/bitwarden_rs' doesn't exist.
Feb 17 07:31:40 freshNixos vaultwarden[983]: [2022-02-17 07:31:40.597][vaultwarden][ERROR] Create the data folder and try again.
Feb 17 07:31:40 freshNixos systemd[1]: vaultwarden.service: Main process exited, code=exited, status=1/FAILURE
Feb 17 07:31:40 freshNixos systemd[1]: vaultwarden.service: Failed with result 'exit-code'.
So, there's truly something fishy going on. Creating the default folder causes problems. Creating a custom data folder is impossible.
So, going back to a non-patched git version, I did rebuild nixos (again with boot and not switch parameter), rebooted the machine and checked the status:
[root@freshNixos:~]# systemctl status vaultwarden.service
● vaultwarden.service
Loaded: loaded (/etc/systemd/system/vaultwarden.service; enabled; vendor preset: enabled)
Active: active (running) since Thu 2022-02-17 07:37:30 CET; 31s ago
Main PID: 983 (vaultwarden)
IP: 0B in, 0B out
IO: 0B read, 0B written
Tasks: 8 (limit: 4686)
Memory: 13.7M
CPU: 318ms
CGroup: /system.slice/vaultwarden.service
└─983 /nix/store/vc7nfcy8i1lbxfg50hk3bwy1fr1m1nnm-vaultwarden-1.24.0/bin/vaultwarden
Feb 17 07:37:31 freshNixos vaultwarden[983]: Running migration 20201209173101
Feb 17 07:37:31 freshNixos vaultwarden[983]: Running migration 20210311190243
Feb 17 07:37:31 freshNixos vaultwarden[983]: Running migration 20210315163412
Feb 17 07:37:31 freshNixos vaultwarden[983]: Running migration 20210430233251
Feb 17 07:37:31 freshNixos vaultwarden[983]: Running migration 20210511205202
Feb 17 07:37:31 freshNixos vaultwarden[983]: Running migration 20210701203140
Feb 17 07:37:31 freshNixos vaultwarden[983]: Running migration 20210830193501
Feb 17 07:37:31 freshNixos vaultwarden[983]: Running migration 20211024164321
Feb 17 07:37:31 freshNixos vaultwarden[983]: Running migration 20220117234911
Feb 17 07:37:31 freshNixos vaultwarden[983]: [2022-02-17 07:37:31.056][start][INFO] Rocket has launched from http://0.0.0.0:8222
Still using:
services.vaultwarden = {
enable = true;
dbBackend = "sqlite";
# backupDir = "/data/bitwarden/backup";
config = {
domain = "https://bw.sjau.ch:443";
signupsAllowed = true;
# The rocketPort option should match the value of the port in the reverse-proxy
rocketPort = 8222;
# dataFolder = "/data/bitwarden/data";
# databaseUrl = "/data/bitwarden/data/db.sqlite3";
};
# The environment file contiains secrets and is stored in pass
# environmentFile = "/data/bitwarden/envfile";
};
Now checking the permissions of the folders gives:
drwxr-xr-x 9 root root 12 Feb 17 07:37 var
drwxr-xr-x 8 root root 8 Feb 17 07:37 lib
drwxr-xr-x 3 vaultwarden vaultwarden 8 Feb 17 07:37 bitwarden_rs
stat bitwarden_rs/
File: bitwarden_rs/
Size: 8 Blocks: 17 IO Block: 131072 directory
Device: 0,26 Inode: 229540 Links: 3
Access: (0755/drwxr-xr-x) Uid: ( 997/vaultwarden) Gid: ( 995/vaultwarden)
Access: 2022-02-17 07:37:30.586357451 +0100
Modify: 2022-02-17 07:37:31.038131454 +0100
Change: 2022-02-17 07:37:31.038131454 +0100
Birth: 2022-02-17 07:37:30.586357451 +0100
Then I rebuilt again with the git version and the applied patch. After reboot, it shows:
systemctl status vaultwarden.service
● vaultwarden.service
Loaded: loaded (/etc/systemd/system/vaultwarden.service; enabled; vendor preset: enabled)
Active: active (running) since Thu 2022-02-17 07:41:55 CET; 20s ago
Main PID: 983 (vaultwarden)
IP: 0B in, 0B out
IO: 0B read, 0B written
Tasks: 8 (limit: 4686)
Memory: 12.8M
CPU: 146ms
CGroup: /system.slice/vaultwarden.service
└─983 /nix/store/vc7nfcy8i1lbxfg50hk3bwy1fr1m1nnm-vaultwarden-1.24.0/bin/vaultwarden
Feb 17 07:41:55 freshNixos vaultwarden[983]: |--------------------------------------------------------------------|
Feb 17 07:41:55 freshNixos vaultwarden[983]: | This is an *unofficial* Bitwarden implementation, DO NOT use the |
Feb 17 07:41:55 freshNixos vaultwarden[983]: | official channels to report bugs/features, regardless of client. |
Feb 17 07:41:55 freshNixos vaultwarden[983]: | Send usage/configuration questions or feature requests to: |
Feb 17 07:41:55 freshNixos vaultwarden[983]: | https://vaultwarden.discourse.group/ |
Feb 17 07:41:55 freshNixos vaultwarden[983]: | Report suspected bugs/issues in the software itself at: |
Feb 17 07:41:55 freshNixos vaultwarden[983]: | https://github.com/dani-garcia/vaultwarden/issues/new |
Feb 17 07:41:55 freshNixos vaultwarden[983]: \--------------------------------------------------------------------/
Feb 17 07:41:55 freshNixos vaultwarden[983]: [INFO] No .env file found.
Feb 17 07:41:56 freshNixos vaultwarden[983]: [2022-02-17 07:41:56.090][start][INFO] Rocket has launched from http://0.0.0.0:8222
So that works now also. But there still seems to be an issue if the folder needs to be created with the patch applied.
I then stopped the vaultwarden service, did cp -a /var/lib/bitwarden_rs /, changed path in my nixos config to /bitwarden_rs and rebuild with the patch.
enable = true;
dbBackend = "sqlite";
# backupDir = "/data/bitwarden/backup";
config = {
domain = "https://bw.sjau.ch:443";
signupsAllowed = true;
# The rocketPort option should match the value of the port in the reverse-proxy
rocketPort = 8222;
# dataFolder = "/data/bitwarden/data";
dataFolder = "/bitwarden_rs";
# databaseUrl = "/data/bitwarden/data/db.sqlite3";
};
# The environment file contiains secrets and is stored in pass
# environmentFile = "/data/bitwarden/envfile";
};
After reboot checking the status:
[root@freshNixos:~]# systemctl status vaultwarden.service
● vaultwarden.service
Loaded: loaded (/etc/systemd/system/vaultwarden.service; enabled; vendor preset: enabled)
Active: active (running) since Thu 2022-02-17 07:45:53 CET; 17s ago
Main PID: 982 (vaultwarden)
IP: 0B in, 0B out
IO: 0B read, 0B written
Tasks: 8 (limit: 4686)
Memory: 12.8M
CPU: 152ms
CGroup: /system.slice/vaultwarden.service
└─982 /nix/store/vc7nfcy8i1lbxfg50hk3bwy1fr1m1nnm-vaultwarden-1.24.0/bin/vaultwarden
Feb 17 07:45:53 freshNixos vaultwarden[982]: |--------------------------------------------------------------------|
Feb 17 07:45:53 freshNixos vaultwarden[982]: | This is an *unofficial* Bitwarden implementation, DO NOT use the |
Feb 17 07:45:53 freshNixos vaultwarden[982]: | official channels to report bugs/features, regardless of client. |
Feb 17 07:45:53 freshNixos vaultwarden[982]: | Send usage/configuration questions or feature requests to: |
Feb 17 07:45:53 freshNixos vaultwarden[982]: | https://vaultwarden.discourse.group/ |
Feb 17 07:45:53 freshNixos vaultwarden[982]: | Report suspected bugs/issues in the software itself at: |
Feb 17 07:45:53 freshNixos vaultwarden[982]: | https://github.com/dani-garcia/vaultwarden/issues/new |
Feb 17 07:45:53 freshNixos vaultwarden[982]: \--------------------------------------------------------------------/
Feb 17 07:45:53 freshNixos vaultwarden[982]: [INFO] No .env file found.
Feb 17 07:45:54 freshNixos vaultwarden[982]: [2022-02-17 07:45:54.101][start][INFO] Rocket has launched from http://0.0.0.0:8222
I then removed the /var/lib/bitwarden_rs folder and rebooted and it still works.
Next I did create the /data/bitwarden_rs folder, updated the nixos config to that, stopped the service, rebuilt nixos (with patch) and rebooted:
[root@freshNixos:/]# stat bitwarden_rs/
File: bitwarden_rs/
Size: 8 Blocks: 17 IO Block: 512 directory
Device: 0,26 Inode: 229707 Links: 3
Access: (0755/drwxr-xr-x) Uid: ( 997/vaultwarden) Gid: ( 995/vaultwarden)
Access: 2022-02-17 07:37:30.586357451 +0100
Modify: 2022-02-17 07:37:31.038131454 +0100
Change: 2022-02-17 07:43:33.205468928 +0100
Birth: 2022-02-17 07:43:33.202468923 +0100
[root@freshNixos:/]# mkdir /data/bitwarden_rs
[root@freshNixos:/]# chown vaultwarden:vaultwarden /data/bitwarden_rs
[root@freshNixos:/]# cd /data
[root@freshNixos:/data]# stat bitwarden_rs
File: bitwarden_rs
Size: 2 Blocks: 1 IO Block: 131072 directory
Device: 0,26 Inode: 229699 Links: 2
Access: (0755/drwxr-xr-x) Uid: ( 997/vaultwarden) Gid: ( 995/vaultwarden)
Access: 2022-02-17 07:49:11.375446415 +0100
Modify: 2022-02-17 07:49:11.375446415 +0100
Change: 2022-02-17 07:49:24.368518774 +0100
Birth: 2022-02-17 07:49:11.375446415 +0100
Despite folders having same permissions, it fails:
[root@freshNixos:~]# systemctl status vaultwarden.service
× vaultwarden.service
Loaded: loaded (/etc/systemd/system/vaultwarden.service; enabled; vendor preset: enabled)
Active: failed (Result: exit-code) since Thu 2022-02-17 07:51:54 CET; 18s ago
Process: 981 ExecStart=/nix/store/vc7nfcy8i1lbxfg50hk3bwy1fr1m1nnm-vaultwarden-1.24.0/bin/vaultwarden (code=exited, status=1/FAILURE)
Main PID: 981 (code=exited, status=1/FAILURE)
IP: 0B in, 0B out
CPU: 307ms
Feb 17 07:51:54 freshNixos vaultwarden[981]: | official channels to report bugs/features, regardless of client. |
Feb 17 07:51:54 freshNixos vaultwarden[981]: | Send usage/configuration questions or feature requests to: |
Feb 17 07:51:54 freshNixos vaultwarden[981]: | https://vaultwarden.discourse.group/ |
Feb 17 07:51:54 freshNixos vaultwarden[981]: | Report suspected bugs/issues in the software itself at: |
Feb 17 07:51:54 freshNixos vaultwarden[981]: | https://github.com/dani-garcia/vaultwarden/issues/new |
Feb 17 07:51:54 freshNixos vaultwarden[981]: \--------------------------------------------------------------------/
Feb 17 07:51:54 freshNixos vaultwarden[981]: [INFO] No .env file found.
Feb 17 07:51:54 freshNixos vaultwarden[981]: [2022-02-17 07:51:54.806][vaultwarden][ERROR] Error creating keys, exiting...
Feb 17 07:51:54 freshNixos systemd[1]: vaultwarden.service: Main process exited, code=exited, status=1/FAILURE
Feb 17 07:51:54 freshNixos systemd[1]: vaultwarden.service: Failed with result 'exit-code'.
Becuase /bitwarden_rswas before copied from /var/lib/bitwarden_rsand changing path to /bitwarden_rsworked, I tried then to copy to files from /bitwarden_rs/*to /data/bitwarden_rs/and rebooted:
[root@freshNixos:~]# cp -Ra /bitwarden_rs/* /data/bitwarden_rs/
After reboot, checking the status gives:
[root@freshNixos:~]# systemctl status vaultwarden.service
● vaultwarden.service
Loaded: loaded (/etc/systemd/system/vaultwarden.service; enabled; vendor preset: enabled)
Active: active (running) since Thu 2022-02-17 07:56:37 CET; 19s ago
Main PID: 988 (vaultwarden)
IP: 0B in, 0B out
IO: 0B read, 0B written
Tasks: 8 (limit: 4686)
Memory: 12.8M
CPU: 144ms
CGroup: /system.slice/vaultwarden.service
└─988 /nix/store/vc7nfcy8i1lbxfg50hk3bwy1fr1m1nnm-vaultwarden-1.24.0/bin/vaultwarden
Feb 17 07:56:37 freshNixos vaultwarden[988]: |--------------------------------------------------------------------|
Feb 17 07:56:37 freshNixos vaultwarden[988]: | This is an *unofficial* Bitwarden implementation, DO NOT use the |
Feb 17 07:56:37 freshNixos vaultwarden[988]: | official channels to report bugs/features, regardless of client. |
Feb 17 07:56:37 freshNixos vaultwarden[988]: | Send usage/configuration questions or feature requests to: |
Feb 17 07:56:37 freshNixos vaultwarden[988]: | https://vaultwarden.discourse.group/ |
Feb 17 07:56:37 freshNixos vaultwarden[988]: | Report suspected bugs/issues in the software itself at: |
Feb 17 07:56:37 freshNixos vaultwarden[988]: | https://github.com/dani-garcia/vaultwarden/issues/new |
Feb 17 07:56:37 freshNixos vaultwarden[988]: \--------------------------------------------------------------------/
Feb 17 07:56:37 freshNixos vaultwarden[988]: [INFO] No .env file found.
Feb 17 07:56:37 freshNixos vaultwarden[988]: [2022-02-17 07:56:37.464][start][INFO] Rocket has launched from http://0.0.0.0:8222
[root@freshNixos:~]# systemctl cat vaultwarden.service
# /etc/systemd/system/vaultwarden.service
[Unit]
After=network.target
[Service]
Environment="LOCALE_ARCHIVE=/nix/store/ahzi8gfj34762a0yccafanspwylqj1z4-glibc-locales-2.33-108/lib/locale/locale-archive"
Environment="PATH=/nix/store/zif429zklc88pjmx102d2l9886nj48hs-openssl-1.1.1m-bin/bin:/nix/store/dj89pwrdlycn8iyn08v8znmynjz1zsi9-coreutils-9.0/bin:/nix/store/bdhm9wxl5mndc8pr5l6ab7a8pvcxi0jz-findutils-4.8.0/bin:/nix/store/hcpp0sgqrdd8g>
Environment="TZDIR=/nix/store/hym0wsdlccbvf30gp5ww7cg1pwfljy38-tzdata-2021e/share/zoneinfo"
AmbientCapabilities=CAP_NET_BIND_SERVICE
EnvironmentFile=/nix/store/8x0vmc7iigg1r8g5ygkl7qw404ssdkfv-vaultwarden.env
ExecStart=/nix/store/vc7nfcy8i1lbxfg50hk3bwy1fr1m1nnm-vaultwarden-1.24.0/bin/vaultwarden
Group=vaultwarden
LimitNOFILE=1048576
PrivateDevices=true
PrivateTmp=true
ProtectHome=true
ProtectSystem=strict
User=vaultwarden
[root@freshNixos:~]# cat /nix/store/8x0vmc7iigg1r8g5ygkl7qw404ssdkfv-vaultwarden.env
DATA_FOLDER=/data/bitwarden_rs
DOMAIN=https://bw.sjau.ch:443
ROCKET_PORT=8222
SIGNUPS_ALLOWED=true
WEB_VAULT_FOLDER=/nix/store/04q4z03l7gln8vpx765zbgnz8lyj9ljk-vaultwarden-vault-2.25.0/share/vaultwarden/vault
So, the problem seems to be in the file creation if not /var/lib/bitwarden_rs is used. I suspect that path is still somewhere else hardcoded for file creation. If you have all the created file, moving the data folder to a different location works just fine.
@sjau ran into issues because they didn't set ownership/permissions accordingly.
You see the permissions. What's wrong with those?
I think I made a bad assumption here. Thanks for your detective work on this.
I suspect that path is still somewhere else hardcoded for file creation.
@pinpox any guesses on that?
I suspect that path is still somewhere else hardcoded for file creation.
@pinpox any guesses on that?
I could not find it. I checked the vw module, the vw .nix file... I downloaded the vw source and grepped it... no idea where that file creation happens.
Sorry, I can't find it either. I have grepped through the whole of nixpkgs and even in the vaultwarden code. Can someone else confirm this issue on a clean installation?
I am not sure if this helps, but I am also having problem with this service and the mentioned options (i.e. DATA_FOLDER), regardless of the patch (so I would say a "clean installation").
| gharchive/pull-request | 2022-02-14T10:43:58 | 2025-04-01T04:32:52.553063 | {
"authors": [
"Petemir",
"aanderse",
"pinpox",
"sjau",
"symphorien"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/159973",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1173446028 | postman: add darwin packages
Description of changes
Add postman for darwin.
Things done
Built on platform(s)
[ ] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[x] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[x] Tested basic functionality of all binary files (usually in ./result/bin/)
22.05 Release Notes (or backporting 21.11 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] (Release notes changes) Ran nixos/doc/manual/md-to-db.sh to update generated release notes
[x] Fits CONTRIBUTING.md.
@SuperSandro2000 ready for review.
@SuperSandro2000 all suggestions applied.
@NixOS/darwin-maintainers Could someone give this a quick review and merge afterwards?
Result of nixpkgs-review pr 164697 run on x86_64-darwin 1
1 package built:
postman
When running postman --help (because I figured that'd be a harmless way to test the binary) the Postman application launched and I could skip the login and got some sort of workspace UI so this seems to work or x86_64-darwin.
LGTM
| gharchive/pull-request | 2022-03-18T10:44:34 | 2025-04-01T04:32:52.563653 | {
"authors": [
"toonn",
"tricktron"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/164697",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1179040959 | wasabibackend: 1.1.13.0 -> 1.1.13.1
Automatic update generated by nixpkgs-update tools. This update was made based on information from https://github.com/zkSNACKs/WalletWasabi/releases.
meta.description for wasabibackend is: "Backend for the Wasabi Wallet"
meta.homepage for wasabibackend is: "https://wasabiwallet.io/"
meta.changelog for wasabibackend is: ""
Updates performed
Version update
To inspect upstream changes
Release on GitHub
Compare changes on GitHub
Impact
Checks done (click to expand)
built on NixOS
The tests defined in passthru.tests, if any, passed
Warning: no invocation of /nix/store/rvwx6mrskqhsrr61p657f7w0c5sf1s0x-wasabibackend-1.1.13.1/bin/WasabiBackend had a zero exit code or showed the expected version
0 of 1 passed binary check by having a zero exit code.
0 of 1 passed binary check by having the new version present in output.
found 1.1.13.1 with grep in /nix/store/rvwx6mrskqhsrr61p657f7w0c5sf1s0x-wasabibackend-1.1.13.1
found 1.1.13.1 in filename of file in /nix/store/rvwx6mrskqhsrr61p657f7w0c5sf1s0x-wasabibackend-1.1.13.1
Rebuild report (if merged into master) (click to expand)
1 total rebuild path(s)
1 package rebuild(s)
1 x86_64-linux rebuild(s)
0 x86_64-darwin rebuild(s)
First fifty rebuilds by attrpath
wasabibackend
Instructions to test this update (click to expand)
Either download from Cachix:
nix-store -r /nix/store/rvwx6mrskqhsrr61p657f7w0c5sf1s0x-wasabibackend-1.1.13.1 \
--option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \
--option trusted-public-keys '
nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=
cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=
'
(The Cachix cache is only trusted for this store-path realization.)
For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted.
Or, build yourself:
nix-build -A wasabibackend https://github.com/r-ryantm/nixpkgs/archive/cef71b49d5acefb82258f5e1d1e07459bc89172f.tar.gz
After you've downloaded or built it, look at the files and if there are any, run the binaries:
ls -la /nix/store/rvwx6mrskqhsrr61p657f7w0c5sf1s0x-wasabibackend-1.1.13.1
ls -la /nix/store/rvwx6mrskqhsrr61p657f7w0c5sf1s0x-wasabibackend-1.1.13.1/bin
Pre-merge build results
We have automatically built all packages that will get rebuilt due to
this change.
This gives evidence on whether the upgrade will break dependent packages.
Note sometimes packages show up as failed to build independent of the
change, simply because they are already broken on the target branch.
Result of nixpkgs-review run on x86_64-linux 1
1 package built:
wasabibackend
Maintainer pings
cc @mmahut for testing.
Result of nixpkgs-review pr 165562 run on x86_64-linux 1
1 package built:
wasabibackend
| gharchive/pull-request | 2022-03-24T05:56:39 | 2025-04-01T04:32:52.574437 | {
"authors": [
"WolfangAukang",
"r-ryantm"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/165562",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1190919715 | electrum-grs: 4.1.5 -> 4.2.0
Description of changes
New upstream release: https://github.com/Groestlcoin/electrum-grs/blob/master/RELEASE-NOTES
Things done
Built on platform(s)
[x] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
22.05 Release Notes (or backporting 21.11 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] (Release notes changes) Ran nixos/doc/manual/md-to-db.sh to update generated release notes
[x] Fits CONTRIBUTING.md.
@GrahamcOfBorg build electrum-grs
@SuperSandro2000 Can I do something as package maintainer to get this merged or is it basicly wait till somebody reviews it?
You can ping someone
| gharchive/pull-request | 2022-04-03T12:39:37 | 2025-04-01T04:32:52.583437 | {
"authors": [
"SuperSandro2000",
"gruve-p"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/167033",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1204080449 | Linux kernels 2022-04-13
Things done
[x] Fits CONTRIBUTING.md.
Result of nixpkgs-review pr 168588 run on x86_64-linux 1
245 packages marked as broken and skipped:
linuxKernel.packages.linux_4_9.asus-wmi-sensors
linuxKernel.packages.linux_4_9.ddcci-driver
linuxKernel.packages.linux_4_9.evdi
linuxKernel.packages.linux_4_9.exfat-nofuse
linuxKernel.packages.linux_4_9.hid-nintendo
linuxKernel.packages.linux_4_9.kvmfr
linuxKernel.packages.linux_4_9.liquidtux
linuxKernel.packages.linux_4_9.mbp2018-bridge-drv
linuxKernel.packages.linux_4_9.openrazer
linuxKernel.packages.linux_4_9.perf
linuxKernel.packages.linux_4_9.rr-zen_workaround
linuxKernel.packages.linux_4_9.rtl8812au
linuxKernel.packages.linux_4_9.rtlwifi_new
linuxKernel.packages.linux_4_9.rtw88
linuxKernel.packages.linux_4_9.rtw89
linuxKernel.packages.linux_4_9.sysdig
linuxKernel.packages.linux_4_9.system76
linuxKernel.packages.linux_4_9.system76-acpi
linuxKernel.packages.linux_4_9.system76-io
linuxKernel.packages.linux_4_9.tbs
linuxKernel.packages.linux_4_9.usbip
linuxKernel.packages.linux_4_9.veikk-linux-driver
linuxKernel.packages.linux_4_9.vendor-reset
linuxKernel.packages.linux_4_9.xmm7360-pci
linuxKernel.packages.linux_4_9.zenpower
linuxKernel.packages.linux_5_10.anbox
linuxKernel.packages.linux_5_10.ixgbevf
linuxKernel.packages.linux_5_10.ndiswrapper
linuxKernel.packages.linux_5_10.nvidia_x11_legacy340
linuxKernel.packages.linux_5_10.phc-intel
linuxKernel.packages.linux_5_10.r8125
linuxKernel.packages.linux_5_10.rtl8723bs
linuxKernel.packages.linux_5_10.sch_cake
linuxKernel.packages.linux_5_10.tbs
linuxKernel.packages.linux_5_15.anbox
linuxKernel.packages.linux_5_15.ena
linuxKernel.packages.linux_5_15.ixgbevf
linuxKernel.packages.linux_5_15.mxu11x0
linuxKernel.packages.linux_5_15.ndiswrapper
linuxKernel.packages.linux_5_15.nvidia_x11_legacy340
linuxKernel.packages.linux_5_15.openafs_1_9
linuxKernel.packages.linux_5_15.phc-intel
linuxKernel.packages.linux_5_15.r8125
linuxKernel.packages.linux_5_15.rtl8188eus-aircrack
linuxKernel.packages.linux_5_15.rtl8723bs
linuxKernel.packages.linux_5_15.rtl8812au
linuxKernel.packages.linux_5_15.rtlwifi_new
linuxKernel.packages.linux_5_15.rtw88
linuxKernel.packages.linux_5_15.sch_cake
linuxKernel.packages.linux_5_15.tbs
linuxKernel.packages.linux_5_15.xmm7360-pci
linuxKernel.packages.linux_5_16.anbox
linuxKernel.packages.linux_5_16.ena
linuxKernel.packages.linux_5_16.ixgbevf
linuxKernel.packages.linux_5_16.mxu11x0
linuxKernel.packages.linux_5_16.ndiswrapper
linuxKernel.packages.linux_5_16.nvidia_x11_legacy340
linuxKernel.packages.linux_5_16.openafs_1_9
linuxKernel.packages.linux_5_16.phc-intel
linuxKernel.packages.linux_5_16.r8125
linuxKernel.packages.linux_5_16.rtl8188eus-aircrack
linuxKernel.packages.linux_5_16.rtl8723bs
linuxKernel.packages.linux_5_16.rtl8812au
linuxKernel.packages.linux_5_16.rtlwifi_new
linuxKernel.packages.linux_5_16.rtw88
linuxKernel.packages.linux_5_16.sch_cake
linuxKernel.packages.linux_5_16.tbs
linuxKernel.packages.linux_5_16.xmm7360-pci
linuxKernel.packages.linux_5_17.anbox
linuxKernel.packages.linux_5_17.ena
linuxKernel.packages.linux_5_17.ixgbevf
linuxKernel.packages.linux_5_17.mxu11x0
linuxKernel.packages.linux_5_17.ndiswrapper
linuxKernel.packages.linux_5_17.nvidia_x11_legacy340
linuxKernel.packages.linux_5_17.nvidia_x11_legacy390
linuxKernel.packages.linux_5_17.openafs
linuxKernel.packages.linux_5_17.openafs_1_8
linuxKernel.packages.linux_5_17.openafs_1_9
linuxKernel.packages.linux_5_17.phc-intel
linuxKernel.packages.linux_5_17.r8125
linuxKernel.packages.linux_5_17.r8168
linuxKernel.packages.linux_5_17.rtl8188eus-aircrack
linuxKernel.packages.linux_5_17.rtl8189es
linuxKernel.packages.linux_5_17.rtl8723bs
linuxKernel.packages.linux_5_17.rtl8812au
linuxKernel.packages.linux_5_17.rtlwifi_new
linuxKernel.packages.linux_5_17.rtw88
linuxKernel.packages.linux_5_17.sch_cake
linuxKernel.packages.linux_5_17.tbs
linuxKernel.packages.linux_5_17.virtualboxGuestAdditions
linuxKernel.packages.linux_5_17.xmm7360-pci
linuxKernel.packages.linux_latest_libre.anbox
linuxKernel.packages.linux_latest_libre.ena
linuxKernel.packages.linux_latest_libre.ixgbevf
linuxKernel.packages.linux_latest_libre.mxu11x0
linuxKernel.packages.linux_latest_libre.ndiswrapper
linuxKernel.packages.linux_latest_libre.nvidia_x11_legacy340
linuxKernel.packages.linux_latest_libre.nvidia_x11_legacy390
linuxKernel.packages.linux_latest_libre.openafs
linuxKernel.packages.linux_latest_libre.openafs_1_8
linuxKernel.packages.linux_latest_libre.openafs_1_9
linuxKernel.packages.linux_latest_libre.phc-intel
linuxKernel.packages.linux_latest_libre.r8125
linuxKernel.packages.linux_latest_libre.r8168
linuxKernel.packages.linux_latest_libre.rtl8188eus-aircrack
linuxKernel.packages.linux_latest_libre.rtl8189es
linuxKernel.packages.linux_latest_libre.rtl8723bs
linuxKernel.packages.linux_latest_libre.rtl8812au
linuxKernel.packages.linux_latest_libre.rtlwifi_new
linuxKernel.packages.linux_latest_libre.rtw88
linuxKernel.packages.linux_latest_libre.sch_cake
linuxKernel.packages.linux_latest_libre.tbs
linuxKernel.packages.linux_latest_libre.virtualboxGuestAdditions
linuxKernel.packages.linux_latest_libre.xmm7360-pci
linuxKernel.packages.linux_libre.anbox
linuxKernel.packages.linux_libre.ena
linuxKernel.packages.linux_libre.ixgbevf
linuxKernel.packages.linux_libre.mxu11x0
linuxKernel.packages.linux_libre.ndiswrapper
linuxKernel.packages.linux_libre.nvidia_x11_legacy340
linuxKernel.packages.linux_libre.openafs_1_9
linuxKernel.packages.linux_libre.phc-intel
linuxKernel.packages.linux_libre.r8125
linuxKernel.packages.linux_libre.rtl8188eus-aircrack
linuxKernel.packages.linux_libre.rtl8723bs
linuxKernel.packages.linux_libre.rtl8812au
linuxKernel.packages.linux_libre.rtlwifi_new
linuxKernel.packages.linux_libre.rtw88
linuxKernel.packages.linux_libre.sch_cake
linuxKernel.packages.linux_libre.tbs
linuxKernel.packages.linux_libre.xmm7360-pci
linuxKernel.packages.linux_testing_bcachefs.anbox
linuxKernel.packages.linux_testing_bcachefs.ena
linuxKernel.packages.linux_testing_bcachefs.ixgbevf
linuxKernel.packages.linux_testing_bcachefs.mxu11x0
linuxKernel.packages.linux_testing_bcachefs.ndiswrapper
linuxKernel.packages.linux_testing_bcachefs.nvidia_x11_legacy340
linuxKernel.packages.linux_testing_bcachefs.openafs_1_9
linuxKernel.packages.linux_testing_bcachefs.phc-intel
linuxKernel.packages.linux_testing_bcachefs.r8125
linuxKernel.packages.linux_testing_bcachefs.rtl8188eus-aircrack
linuxKernel.packages.linux_testing_bcachefs.rtl8723bs
linuxKernel.packages.linux_testing_bcachefs.rtl8812au
linuxKernel.packages.linux_testing_bcachefs.rtlwifi_new
linuxKernel.packages.linux_testing_bcachefs.rtw88
linuxKernel.packages.linux_testing_bcachefs.sch_cake
linuxKernel.packages.linux_testing_bcachefs.tbs
linuxKernel.packages.linux_testing_bcachefs.xmm7360-pci
linuxPackages-libre.anbox
linuxPackages-libre.ena
linuxPackages-libre.ixgbevf
linuxPackages-libre.mxu11x0
linuxPackages-libre.ndiswrapper
linuxPackages-libre.nvidia_x11_legacy340
linuxPackages-libre.openafs_1_9
linuxPackages-libre.phc-intel
linuxPackages-libre.r8125
linuxPackages-libre.rtl8188eus-aircrack
linuxPackages-libre.rtl8723bs
linuxPackages-libre.rtl8812au
linuxPackages-libre.rtlwifi_new
linuxPackages-libre.rtw88
linuxPackages-libre.sch_cake
linuxPackages-libre.tbs
linuxPackages-libre.xmm7360-pci
linuxPackages.anbox
linuxPackages.ena
linuxPackages.ixgbevf
linuxPackages.mxu11x0
linuxPackages.ndiswrapper
linuxPackages.nvidia_x11_legacy340
linuxPackages.openafs_1_9
linuxPackages.phc-intel
linuxPackages.r8125
linuxPackages.rtl8188eus-aircrack
linuxPackages.rtl8723bs
linuxPackages.rtl8812au
linuxPackages.rtlwifi_new
linuxPackages.rtw88
linuxPackages.sch_cake
linuxPackages.tbs
linuxPackages.xmm7360-pci
linuxPackages_latest-libre.anbox
linuxPackages_latest-libre.ena
linuxPackages_latest-libre.ixgbevf
linuxPackages_latest-libre.mxu11x0
linuxPackages_latest-libre.ndiswrapper
linuxPackages_latest-libre.nvidia_x11_legacy340
linuxPackages_latest-libre.nvidia_x11_legacy390
linuxPackages_latest-libre.openafs
linuxPackages_latest-libre.openafs_1_8
linuxPackages_latest-libre.openafs_1_9
linuxPackages_latest-libre.phc-intel
linuxPackages_latest-libre.r8125
linuxPackages_latest-libre.r8168
linuxPackages_latest-libre.rtl8188eus-aircrack
linuxPackages_latest-libre.rtl8189es
linuxPackages_latest-libre.rtl8723bs
linuxPackages_latest-libre.rtl8812au
linuxPackages_latest-libre.rtlwifi_new
linuxPackages_latest-libre.rtw88
linuxPackages_latest-libre.sch_cake
linuxPackages_latest-libre.tbs
linuxPackages_latest-libre.virtualboxGuestAdditions
linuxPackages_latest-libre.xmm7360-pci
linuxPackages_latest.anbox
linuxPackages_latest.ena
linuxPackages_latest.ixgbevf
linuxPackages_latest.mxu11x0
linuxPackages_latest.ndiswrapper
linuxPackages_latest.nvidia_x11_legacy340
linuxPackages_latest.nvidia_x11_legacy390
linuxPackages_latest.openafs
linuxPackages_latest.openafs_1_8
linuxPackages_latest.openafs_1_9
linuxPackages_latest.phc-intel
linuxPackages_latest.r8125
linuxPackages_latest.r8168
linuxPackages_latest.rtl8188eus-aircrack
linuxPackages_latest.rtl8189es
linuxPackages_latest.rtl8723bs
linuxPackages_latest.rtl8812au
linuxPackages_latest.rtlwifi_new
linuxPackages_latest.rtw88
linuxPackages_latest.sch_cake
linuxPackages_latest.tbs
linuxPackages_latest.virtualboxGuestAdditions
linuxPackages_latest.xmm7360-pci
linuxPackages_testing_bcachefs.anbox
linuxPackages_testing_bcachefs.ena
linuxPackages_testing_bcachefs.ixgbevf
linuxPackages_testing_bcachefs.mxu11x0
linuxPackages_testing_bcachefs.ndiswrapper
linuxPackages_testing_bcachefs.nvidia_x11_legacy340
linuxPackages_testing_bcachefs.openafs_1_9
linuxPackages_testing_bcachefs.phc-intel
linuxPackages_testing_bcachefs.r8125
linuxPackages_testing_bcachefs.rtl8188eus-aircrack
linuxPackages_testing_bcachefs.rtl8723bs
linuxPackages_testing_bcachefs.rtl8812au
linuxPackages_testing_bcachefs.rtlwifi_new
linuxPackages_testing_bcachefs.rtw88
linuxPackages_testing_bcachefs.sch_cake
linuxPackages_testing_bcachefs.tbs
linuxPackages_testing_bcachefs.xmm7360-pci
2 packages blacklisted:
tests.nixos-functions.nixos-test
tests.nixos-functions.nixosTest-test
28 packages failed to build:
displaylink
linuxKernel.packages.linux_4_9.anbox
linuxKernel.packages.linux_4_9.asus-ec-sensors
linuxKernel.packages.linux_4_9.batman_adv
linuxKernel.packages.linux_4_9.kvdo
linuxKernel.packages.linux_4_9.prl-tools
linuxKernel.packages.linux_4_9.r8168
linuxKernel.packages.linux_4_9.vmm_clock
linuxKernel.packages.linux_5_10.batman_adv
linuxKernel.packages.linux_5_10.kvdo
linuxKernel.packages.linux_5_10.r8168
linuxPackages.batman_adv (linuxKernel.packages.linux_5_15.batman_adv)
linuxPackages.nvidia_x11_vulkan_beta (linuxKernel.packages.linux_5_15.nvidia_x11_vulkan_beta)
linuxKernel.packages.linux_5_16.batman_adv
linuxKernel.packages.linux_5_16.nvidia_x11_vulkan_beta
linuxPackages_latest.batman_adv (linuxKernel.packages.linux_5_17.batman_adv)
linuxPackages_latest.broadcom_sta (linuxKernel.packages.linux_5_17.broadcom_sta)
linuxPackages_latest.kvdo (linuxKernel.packages.linux_5_17.kvdo)
linuxPackages_latest.nvidia_x11_vulkan_beta (linuxKernel.packages.linux_5_17.nvidia_x11_vulkan_beta)
linuxPackages_latest-libre.batman_adv (linuxKernel.packages.linux_latest_libre.batman_adv)
linuxPackages_latest-libre.broadcom_sta (linuxKernel.packages.linux_latest_libre.broadcom_sta)
linuxPackages_latest-libre.kvdo (linuxKernel.packages.linux_latest_libre.kvdo)
linuxPackages_latest-libre.nvidia_x11_vulkan_beta (linuxKernel.packages.linux_latest_libre.nvidia_x11_vulkan_beta)
linuxPackages-libre.batman_adv (linuxKernel.packages.linux_libre.batman_adv)
linuxPackages-libre.nvidia_x11_vulkan_beta (linuxKernel.packages.linux_libre.nvidia_x11_vulkan_beta)
linuxPackages_testing_bcachefs.batman_adv (linuxKernel.packages.linux_testing_bcachefs.batman_adv)
linuxPackages_testing_bcachefs.nvidia_x11_vulkan_beta (linuxKernel.packages.linux_testing_bcachefs.nvidia_x11_vulkan_beta)
linuxPackages_testing_bcachefs.openafs (linuxKernel.packages.linux_testing_bcachefs.openafs ,linuxPackages_testing_bcachefs.openafs_1_8)
628 packages built:
bottles
bpftools
bumblebee
cargo-flamegraph
crosvm
cryptodev (linuxKernel.packages.linux_4_9.cryptodev)
freefall
geekbench
gl-gsync-demo
gnome.gnome-applets
gpio-utils
gwe
linux (linuxKernel.kernels.linux_5_15 ,linuxKernel.packages.linux_5_15.kernel ,linuxPackages.kernel)
linux-libre (linuxKernel.kernels.linux_libre ,linuxKernel.packages.linux_libre.kernel ,linuxPackages-libre.kernel)
linux-manual
linux-rt (linuxKernel.kernels.linux_rt_5_4)
linuxKernel.kernels.linux_4_9 (linuxKernel.packages.linux_4_9.kernel)
linuxKernel.kernels.linux_5_10 (linuxKernel.packages.linux_5_10.kernel)
linuxKernel.kernels.linux_5_16 (linuxKernel.packages.linux_5_16.kernel)
linux_latest (linuxPackages_latest.kernel ,linux_testing)
linux_latest-libre (linuxPackages_latest-libre.kernel)
linux_testing_bcachefs (linuxPackages_testing_bcachefs.kernel)
linuxPackages.vm-tools (linuxPackages-libre.vm-tools ,linuxPackages_4_14_hardened.vm-tools ,linuxPackages_4_19_hardened.vm-tools ,linuxPackages_5_10_hardened.vm-tools ,linuxPackages_5_15_hardened.vm-tools ,linuxPackages_5_4_hardened.vm-tools ,linuxPackages_hardened.vm-tools ,linuxPackages_hardkernel_latest.vm-tools ,linuxPackages_latest-libre.vm-tools ,linuxPackages_latest.vm-tools ,linuxPackages_lqx.vm-tools ,linuxPackages_testing_bcachefs.vm-tools ,linuxPackages_xanmod.vm-tools ,linuxPackages_zen.vm-tools)
linuxKernel.packages.linux_4_9.acpi_call
linuxKernel.packages.linux_4_9.akvcam
linuxKernel.packages.linux_4_9.apfs
linuxKernel.packages.linux_4_9.bbswitch
linuxKernel.packages.linux_4_9.broadcom_sta
linuxKernel.packages.linux_4_9.can-isotp
linuxKernel.packages.linux_4_9.chipsec
linuxKernel.packages.linux_4_9.cpupower
linuxKernel.packages.linux_4_9.dddvb
linuxKernel.packages.linux_4_9.digimend
linuxKernel.packages.linux_4_9.dpdk
linuxKernel.packages.linux_4_9.dpdk-kmods
linuxKernel.packages.linux_4_9.e1000e
linuxKernel.packages.linux_4_9.ena
linuxKernel.packages.linux_4_9.facetimehd
linuxKernel.packages.linux_4_9.fwts-efi-runtime
linuxKernel.packages.linux_4_9.gcadapter-oc-kmod
linuxKernel.packages.linux_4_9.hyperv-daemons
linuxKernel.packages.linux_4_9.isgx
linuxKernel.packages.linux_4_9.it87
linuxKernel.packages.linux_4_9.ixgbevf
linuxKernel.packages.linux_4_9.jool
linuxKernel.packages.linux_4_9.lttng-modules
linuxKernel.packages.linux_4_9.mba6x_bl
linuxKernel.packages.linux_4_9.mwprocapture
linuxKernel.packages.linux_4_9.mxu11x0
linuxKernel.packages.linux_4_9.ndiswrapper
linuxKernel.packages.linux_4_9.netatop
linuxKernel.packages.linux_4_9.nvidia_x11
linuxKernel.packages.linux_4_9.nvidia_x11_beta
linuxKernel.packages.linux_4_9.nvidia_x11_legacy340
linuxKernel.packages.linux_4_9.nvidia_x11_legacy390
linuxKernel.packages.linux_4_9.nvidia_x11_legacy470
linuxKernel.packages.linux_4_9.nvidia_x11_vulkan_beta
linuxKernel.packages.linux_4_9.nvidiabl
linuxKernel.packages.linux_4_9.openafs (linuxKernel.packages.linux_4_9.openafs_1_8)
linuxKernel.packages.linux_4_9.openafs_1_9
linuxKernel.packages.linux_4_9.ply
linuxKernel.packages.linux_4_9.r8125
linuxKernel.packages.linux_4_9.rtl8188eus-aircrack
linuxKernel.packages.linux_4_9.rtl8189es
linuxKernel.packages.linux_4_9.rtl8192eu
linuxKernel.packages.linux_4_9.rtl8723bs
linuxKernel.packages.linux_4_9.rtl8814au
linuxKernel.packages.linux_4_9.rtl8821au
linuxKernel.packages.linux_4_9.rtl8821ce
linuxKernel.packages.linux_4_9.rtl8821cu
linuxKernel.packages.linux_4_9.rtl88x2bu
linuxKernel.packages.linux_4_9.rtl88xxau-aircrack
linuxKernel.packages.linux_4_9.sch_cake
linuxKernel.packages.linux_4_9.systemtap
linuxKernel.packages.linux_4_9.tmon
linuxKernel.packages.linux_4_9.tp_smapi
linuxKernel.packages.linux_4_9.turbostat
linuxKernel.packages.linux_4_9.v4l2loopback
linuxKernel.packages.linux_4_9.v86d
linuxKernel.packages.linux_4_9.vhba
linuxKernel.packages.linux_4_9.virtio_vmmci
linuxKernel.packages.linux_4_9.virtualbox
linuxKernel.packages.linux_4_9.virtualboxGuestAdditions
linuxKernel.packages.linux_4_9.wireguard
linuxKernel.packages.linux_4_9.x86_energy_perf_policy
linuxKernel.packages.linux_4_9.xpadneo
linuxKernel.packages.linux_4_9.zfs (linuxKernel.packages.linux_4_9.zfsStable ,linuxKernel.packages.linux_4_9.zfsUnstable)
linuxKernel.packages.linux_5_10.acpi_call
linuxKernel.packages.linux_5_10.akvcam
linuxKernel.packages.linux_5_10.apfs
linuxKernel.packages.linux_5_10.asus-ec-sensors
linuxKernel.packages.linux_5_10.asus-wmi-sensors
linuxKernel.packages.linux_5_10.bbswitch
linuxKernel.packages.linux_5_10.broadcom_sta
linuxKernel.packages.linux_5_10.can-isotp
linuxKernel.packages.linux_5_10.chipsec
linuxKernel.packages.linux_5_10.cpupower
linuxKernel.packages.linux_5_10.cryptodev
linuxKernel.packages.linux_5_10.ddcci-driver
linuxKernel.packages.linux_5_10.dddvb
linuxKernel.packages.linux_5_10.digimend
linuxKernel.packages.linux_5_10.dpdk
linuxKernel.packages.linux_5_10.dpdk-kmods
linuxKernel.packages.linux_5_10.ena
linuxKernel.packages.linux_5_10.evdi
linuxKernel.packages.linux_5_10.facetimehd
linuxKernel.packages.linux_5_10.fwts-efi-runtime
linuxKernel.packages.linux_5_10.gcadapter-oc-kmod
linuxKernel.packages.linux_5_10.hid-nintendo
linuxKernel.packages.linux_5_10.hyperv-daemons
linuxKernel.packages.linux_5_10.intel-speed-select
linuxKernel.packages.linux_5_10.isgx
linuxKernel.packages.linux_5_10.it87
linuxKernel.packages.linux_5_10.jool
linuxKernel.packages.linux_5_10.kvmfr
linuxKernel.packages.linux_5_10.liquidtux
linuxKernel.packages.linux_5_10.lttng-modules
linuxKernel.packages.linux_5_10.mba6x_bl
linuxKernel.packages.linux_5_10.mbp2018-bridge-drv
linuxKernel.packages.linux_5_10.mwprocapture
linuxKernel.packages.linux_5_10.mxu11x0
linuxKernel.packages.linux_5_10.netatop
linuxKernel.packages.linux_5_10.nvidia_x11
linuxKernel.packages.linux_5_10.nvidia_x11_beta
linuxKernel.packages.linux_5_10.nvidia_x11_legacy390
linuxKernel.packages.linux_5_10.nvidia_x11_legacy470
linuxKernel.packages.linux_5_10.nvidia_x11_vulkan_beta
linuxKernel.packages.linux_5_10.nvidiabl
linuxKernel.packages.linux_5_10.openafs (linuxKernel.packages.linux_5_10.openafs_1_8)
linuxKernel.packages.linux_5_10.openafs_1_9
linuxKernel.packages.linux_5_10.openrazer
linuxKernel.packages.linux_5_10.perf
linuxKernel.packages.linux_5_10.ply
linuxKernel.packages.linux_5_10.rr-zen_workaround
linuxKernel.packages.linux_5_10.rtl8188eus-aircrack
linuxKernel.packages.linux_5_10.rtl8189es
linuxKernel.packages.linux_5_10.rtl8192eu
linuxKernel.packages.linux_5_10.rtl8812au
linuxKernel.packages.linux_5_10.rtl8814au
linuxKernel.packages.linux_5_10.rtl8821au
linuxKernel.packages.linux_5_10.rtl8821ce
linuxKernel.packages.linux_5_10.rtl8821cu
linuxKernel.packages.linux_5_10.rtl88x2bu
linuxKernel.packages.linux_5_10.rtl88xxau-aircrack
linuxKernel.packages.linux_5_10.rtw88 (linuxKernel.packages.linux_5_10.rtlwifi_new)
linuxKernel.packages.linux_5_10.rtw89
linuxKernel.packages.linux_5_10.sysdig
linuxKernel.packages.linux_5_10.system76
linuxKernel.packages.linux_5_10.system76-acpi
linuxKernel.packages.linux_5_10.system76-io
linuxKernel.packages.linux_5_10.systemtap
linuxKernel.packages.linux_5_10.tmon
linuxKernel.packages.linux_5_10.tp_smapi
linuxKernel.packages.linux_5_10.turbostat
linuxKernel.packages.linux_5_10.tuxedo-keyboard
linuxKernel.packages.linux_5_10.usbip
linuxKernel.packages.linux_5_10.v4l2loopback
linuxKernel.packages.linux_5_10.v86d
linuxKernel.packages.linux_5_10.veikk-linux-driver
linuxKernel.packages.linux_5_10.vendor-reset
linuxKernel.packages.linux_5_10.vhba
linuxKernel.packages.linux_5_10.virtio_vmmci
linuxKernel.packages.linux_5_10.virtualbox
linuxKernel.packages.linux_5_10.virtualboxGuestAdditions
linuxKernel.packages.linux_5_10.vmm_clock
linuxKernel.packages.linux_5_10.x86_energy_perf_policy
linuxKernel.packages.linux_5_10.xmm7360-pci
linuxKernel.packages.linux_5_10.xone
linuxKernel.packages.linux_5_10.xpadneo
linuxKernel.packages.linux_5_10.zenpower
linuxKernel.packages.linux_5_10.zfs (linuxKernel.packages.linux_5_10.zfsStable ,linuxKernel.packages.linux_5_10.zfsUnstable)
linuxPackages.acpi_call (linuxKernel.packages.linux_5_15.acpi_call)
linuxPackages.akvcam (linuxKernel.packages.linux_5_15.akvcam)
linuxPackages.apfs (linuxKernel.packages.linux_5_15.apfs)
linuxPackages.asus-ec-sensors (linuxKernel.packages.linux_5_15.asus-ec-sensors)
linuxPackages.asus-wmi-sensors (linuxKernel.packages.linux_5_15.asus-wmi-sensors)
linuxPackages.bbswitch (linuxKernel.packages.linux_5_15.bbswitch)
linuxPackages.broadcom_sta (linuxKernel.packages.linux_5_15.broadcom_sta)
linuxPackages.can-isotp (linuxKernel.packages.linux_5_15.can-isotp)
linuxPackages.chipsec (linuxKernel.packages.linux_5_15.chipsec)
linuxPackages.cpupower (linuxKernel.packages.linux_5_15.cpupower)
linuxPackages.cryptodev (linuxKernel.packages.linux_5_15.cryptodev)
linuxPackages.ddcci-driver (linuxKernel.packages.linux_5_15.ddcci-driver)
linuxPackages.dddvb (linuxKernel.packages.linux_5_15.dddvb)
linuxPackages.digimend (linuxKernel.packages.linux_5_15.digimend)
linuxPackages.dpdk (linuxKernel.packages.linux_5_15.dpdk)
linuxPackages.dpdk-kmods (linuxKernel.packages.linux_5_15.dpdk-kmods)
linuxPackages.evdi (linuxKernel.packages.linux_5_15.evdi)
linuxPackages.facetimehd (linuxKernel.packages.linux_5_15.facetimehd)
linuxPackages.fwts-efi-runtime (linuxKernel.packages.linux_5_15.fwts-efi-runtime)
linuxPackages.gcadapter-oc-kmod (linuxKernel.packages.linux_5_15.gcadapter-oc-kmod)
linuxPackages.hid-nintendo (linuxKernel.packages.linux_5_15.hid-nintendo)
linuxPackages.hyperv-daemons (linuxKernel.packages.linux_5_15.hyperv-daemons)
linuxPackages.intel-speed-select (linuxKernel.packages.linux_5_15.intel-speed-select)
linuxPackages.isgx (linuxKernel.packages.linux_5_15.isgx)
linuxPackages.it87 (linuxKernel.packages.linux_5_15.it87)
linuxPackages.jool (linuxKernel.packages.linux_5_15.jool)
linuxPackages.kvdo (linuxKernel.packages.linux_5_15.kvdo)
linuxPackages.kvmfr (linuxKernel.packages.linux_5_15.kvmfr)
linuxPackages.liquidtux (linuxKernel.packages.linux_5_15.liquidtux)
linuxPackages.lttng-modules (linuxKernel.packages.linux_5_15.lttng-modules)
linuxPackages.mba6x_bl (linuxKernel.packages.linux_5_15.mba6x_bl)
linuxPackages.mbp2018-bridge-drv (linuxKernel.packages.linux_5_15.mbp2018-bridge-drv)
linuxPackages.mwprocapture (linuxKernel.packages.linux_5_15.mwprocapture)
linuxPackages.netatop (linuxKernel.packages.linux_5_15.netatop)
linuxPackages.nvidia_x11 (linuxKernel.packages.linux_5_15.nvidia_x11)
linuxPackages.nvidia_x11_beta (linuxKernel.packages.linux_5_15.nvidia_x11_beta)
linuxPackages.nvidia_x11_legacy390 (linuxKernel.packages.linux_5_15.nvidia_x11_legacy390)
linuxPackages.nvidia_x11_legacy470 (linuxKernel.packages.linux_5_15.nvidia_x11_legacy470)
linuxPackages.nvidiabl (linuxKernel.packages.linux_5_15.nvidiabl)
linuxPackages.openafs (linuxKernel.packages.linux_5_15.openafs ,linuxPackages.openafs_1_8)
linuxPackages.openrazer (linuxKernel.packages.linux_5_15.openrazer)
linuxPackages.perf (linuxKernel.packages.linux_5_15.perf)
linuxPackages.ply (linuxKernel.packages.linux_5_15.ply)
linuxPackages.r8168 (linuxKernel.packages.linux_5_15.r8168)
linuxPackages.rr-zen_workaround (linuxKernel.packages.linux_5_15.rr-zen_workaround)
linuxPackages.rtl8189es (linuxKernel.packages.linux_5_15.rtl8189es)
linuxPackages.rtl8192eu (linuxKernel.packages.linux_5_15.rtl8192eu)
linuxPackages.rtl8814au (linuxKernel.packages.linux_5_15.rtl8814au)
linuxPackages.rtl8821au (linuxKernel.packages.linux_5_15.rtl8821au)
linuxPackages.rtl8821ce (linuxKernel.packages.linux_5_15.rtl8821ce)
linuxPackages.rtl8821cu (linuxKernel.packages.linux_5_15.rtl8821cu)
linuxPackages.rtl88x2bu (linuxKernel.packages.linux_5_15.rtl88x2bu)
linuxPackages.rtl88xxau-aircrack (linuxKernel.packages.linux_5_15.rtl88xxau-aircrack)
linuxPackages.rtw89 (linuxKernel.packages.linux_5_15.rtw89)
linuxPackages.sysdig (linuxKernel.packages.linux_5_15.sysdig)
linuxPackages.system76 (linuxKernel.packages.linux_5_15.system76)
linuxPackages.system76-acpi (linuxKernel.packages.linux_5_15.system76-acpi)
linuxPackages.system76-io (linuxKernel.packages.linux_5_15.system76-io)
linuxPackages.systemtap (linuxKernel.packages.linux_5_15.systemtap)
linuxPackages.tmon (linuxKernel.packages.linux_5_15.tmon)
linuxPackages.tp_smapi (linuxKernel.packages.linux_5_15.tp_smapi)
linuxPackages.turbostat (linuxKernel.packages.linux_5_15.turbostat)
linuxPackages.tuxedo-keyboard (linuxKernel.packages.linux_5_15.tuxedo-keyboard)
linuxPackages.usbip (linuxKernel.packages.linux_5_15.usbip)
linuxPackages.v4l2loopback (linuxKernel.packages.linux_5_15.v4l2loopback)
linuxPackages.v86d (linuxKernel.packages.linux_5_15.v86d)
linuxPackages.veikk-linux-driver (linuxKernel.packages.linux_5_15.veikk-linux-driver)
linuxPackages.vendor-reset (linuxKernel.packages.linux_5_15.vendor-reset)
linuxPackages.vhba (linuxKernel.packages.linux_5_15.vhba)
linuxPackages.virtio_vmmci (linuxKernel.packages.linux_5_15.virtio_vmmci)
linuxPackages.virtualbox (linuxKernel.packages.linux_5_15.virtualbox)
linuxPackages.virtualboxGuestAdditions (linuxKernel.packages.linux_5_15.virtualboxGuestAdditions)
linuxPackages.vmm_clock (linuxKernel.packages.linux_5_15.vmm_clock)
linuxPackages.x86_energy_perf_policy (linuxKernel.packages.linux_5_15.x86_energy_perf_policy)
linuxPackages.xone (linuxKernel.packages.linux_5_15.xone)
linuxPackages.xpadneo (linuxKernel.packages.linux_5_15.xpadneo)
linuxPackages.zenpower (linuxKernel.packages.linux_5_15.zenpower)
linuxPackages.zfs (linuxKernel.packages.linux_5_15.zfs ,linuxPackages.zfsStable ,linuxPackages.zfsUnstable)
linuxKernel.packages.linux_5_16.acpi_call
linuxKernel.packages.linux_5_16.akvcam
linuxKernel.packages.linux_5_16.apfs
linuxKernel.packages.linux_5_16.asus-ec-sensors
linuxKernel.packages.linux_5_16.asus-wmi-sensors
linuxKernel.packages.linux_5_16.bbswitch
linuxKernel.packages.linux_5_16.broadcom_sta
linuxKernel.packages.linux_5_16.can-isotp
linuxKernel.packages.linux_5_16.chipsec
linuxKernel.packages.linux_5_16.cpupower
linuxKernel.packages.linux_5_16.cryptodev
linuxKernel.packages.linux_5_16.ddcci-driver
linuxKernel.packages.linux_5_16.dddvb
linuxKernel.packages.linux_5_16.digimend
linuxKernel.packages.linux_5_16.dpdk
linuxKernel.packages.linux_5_16.dpdk-kmods
linuxKernel.packages.linux_5_16.evdi
linuxKernel.packages.linux_5_16.facetimehd
linuxKernel.packages.linux_5_16.fwts-efi-runtime
linuxKernel.packages.linux_5_16.gcadapter-oc-kmod
linuxKernel.packages.linux_5_16.hid-nintendo
linuxKernel.packages.linux_5_16.hyperv-daemons
linuxKernel.packages.linux_5_16.intel-speed-select
linuxKernel.packages.linux_5_16.isgx
linuxKernel.packages.linux_5_16.it87
linuxKernel.packages.linux_5_16.jool
linuxKernel.packages.linux_5_16.kvdo
linuxKernel.packages.linux_5_16.kvmfr
linuxKernel.packages.linux_5_16.liquidtux
linuxKernel.packages.linux_5_16.lttng-modules
linuxKernel.packages.linux_5_16.mba6x_bl
linuxKernel.packages.linux_5_16.mbp2018-bridge-drv
linuxKernel.packages.linux_5_16.mwprocapture
linuxKernel.packages.linux_5_16.netatop
linuxKernel.packages.linux_5_16.nvidia_x11
linuxKernel.packages.linux_5_16.nvidia_x11_beta
linuxKernel.packages.linux_5_16.nvidia_x11_legacy390
linuxKernel.packages.linux_5_16.nvidia_x11_legacy470
linuxKernel.packages.linux_5_16.nvidiabl
linuxKernel.packages.linux_5_16.openafs (linuxKernel.packages.linux_5_16.openafs_1_8)
linuxKernel.packages.linux_5_16.openrazer
linuxKernel.packages.linux_5_16.perf
linuxKernel.packages.linux_5_16.ply
linuxKernel.packages.linux_5_16.r8168
linuxKernel.packages.linux_5_16.rr-zen_workaround
linuxKernel.packages.linux_5_16.rtl8189es
linuxKernel.packages.linux_5_16.rtl8192eu
linuxKernel.packages.linux_5_16.rtl8814au
linuxKernel.packages.linux_5_16.rtl8821au
linuxKernel.packages.linux_5_16.rtl8821ce
linuxKernel.packages.linux_5_16.rtl8821cu
linuxKernel.packages.linux_5_16.rtl88x2bu
linuxKernel.packages.linux_5_16.rtl88xxau-aircrack
linuxKernel.packages.linux_5_16.sysdig
linuxKernel.packages.linux_5_16.system76
linuxKernel.packages.linux_5_16.system76-acpi
linuxKernel.packages.linux_5_16.system76-io
linuxKernel.packages.linux_5_16.systemtap
linuxKernel.packages.linux_5_16.tmon
linuxKernel.packages.linux_5_16.tp_smapi
linuxKernel.packages.linux_5_16.turbostat
linuxKernel.packages.linux_5_16.tuxedo-keyboard
linuxKernel.packages.linux_5_16.usbip
linuxKernel.packages.linux_5_16.v4l2loopback
linuxKernel.packages.linux_5_16.v86d
linuxKernel.packages.linux_5_16.veikk-linux-driver
linuxKernel.packages.linux_5_16.vendor-reset
linuxKernel.packages.linux_5_16.vhba
linuxKernel.packages.linux_5_16.virtio_vmmci
linuxKernel.packages.linux_5_16.virtualbox
linuxKernel.packages.linux_5_16.virtualboxGuestAdditions
linuxKernel.packages.linux_5_16.vmm_clock
linuxKernel.packages.linux_5_16.x86_energy_perf_policy
linuxKernel.packages.linux_5_16.xone
linuxKernel.packages.linux_5_16.xpadneo
linuxKernel.packages.linux_5_16.zenpower
linuxKernel.packages.linux_5_16.zfs (linuxKernel.packages.linux_5_16.zfsStable ,linuxKernel.packages.linux_5_16.zfsUnstable)
linuxPackages_latest.acpi_call (linuxKernel.packages.linux_5_17.acpi_call)
linuxPackages_latest.akvcam (linuxKernel.packages.linux_5_17.akvcam)
linuxPackages_latest.apfs (linuxKernel.packages.linux_5_17.apfs)
linuxPackages_latest.asus-ec-sensors (linuxKernel.packages.linux_5_17.asus-ec-sensors)
linuxPackages_latest.asus-wmi-sensors (linuxKernel.packages.linux_5_17.asus-wmi-sensors)
linuxPackages_latest.bbswitch (linuxKernel.packages.linux_5_17.bbswitch)
linuxPackages_latest.can-isotp (linuxKernel.packages.linux_5_17.can-isotp)
linuxPackages_latest.chipsec (linuxKernel.packages.linux_5_17.chipsec)
linuxPackages_latest.cpupower (linuxKernel.packages.linux_5_17.cpupower)
linuxPackages_latest.cryptodev (linuxKernel.packages.linux_5_17.cryptodev)
linuxPackages_latest.ddcci-driver (linuxKernel.packages.linux_5_17.ddcci-driver)
linuxPackages_latest.dddvb (linuxKernel.packages.linux_5_17.dddvb)
linuxPackages_latest.digimend (linuxKernel.packages.linux_5_17.digimend)
linuxPackages_latest.dpdk (linuxKernel.packages.linux_5_17.dpdk)
linuxPackages_latest.dpdk-kmods (linuxKernel.packages.linux_5_17.dpdk-kmods)
linuxPackages_latest.evdi (linuxKernel.packages.linux_5_17.evdi)
linuxPackages_latest.facetimehd (linuxKernel.packages.linux_5_17.facetimehd)
linuxPackages_latest.fwts-efi-runtime (linuxKernel.packages.linux_5_17.fwts-efi-runtime)
linuxPackages_latest.gcadapter-oc-kmod (linuxKernel.packages.linux_5_17.gcadapter-oc-kmod)
linuxPackages_latest.hid-nintendo (linuxKernel.packages.linux_5_17.hid-nintendo)
linuxPackages_latest.hyperv-daemons (linuxKernel.packages.linux_5_17.hyperv-daemons)
linuxPackages_latest.intel-speed-select (linuxKernel.packages.linux_5_17.intel-speed-select)
linuxPackages_latest.isgx (linuxKernel.packages.linux_5_17.isgx)
linuxPackages_latest.it87 (linuxKernel.packages.linux_5_17.it87)
linuxPackages_latest.jool (linuxKernel.packages.linux_5_17.jool)
linuxPackages_latest.kvmfr (linuxKernel.packages.linux_5_17.kvmfr)
linuxPackages_latest.liquidtux (linuxKernel.packages.linux_5_17.liquidtux)
linuxPackages_latest.lttng-modules (linuxKernel.packages.linux_5_17.lttng-modules)
linuxPackages_latest.mba6x_bl (linuxKernel.packages.linux_5_17.mba6x_bl)
linuxPackages_latest.mbp2018-bridge-drv (linuxKernel.packages.linux_5_17.mbp2018-bridge-drv)
linuxPackages_latest.mwprocapture (linuxKernel.packages.linux_5_17.mwprocapture)
linuxPackages_latest.netatop (linuxKernel.packages.linux_5_17.netatop)
linuxPackages_latest.nvidia_x11 (linuxKernel.packages.linux_5_17.nvidia_x11)
linuxPackages_latest.nvidia_x11_beta (linuxKernel.packages.linux_5_17.nvidia_x11_beta)
linuxPackages_latest.nvidia_x11_legacy470 (linuxKernel.packages.linux_5_17.nvidia_x11_legacy470)
linuxPackages_latest.nvidiabl (linuxKernel.packages.linux_5_17.nvidiabl)
linuxPackages_latest.openrazer (linuxKernel.packages.linux_5_17.openrazer)
linuxPackages_latest.perf (linuxKernel.packages.linux_5_17.perf)
linuxPackages_latest.ply (linuxKernel.packages.linux_5_17.ply)
linuxPackages_latest.rr-zen_workaround (linuxKernel.packages.linux_5_17.rr-zen_workaround)
linuxPackages_latest.rtl8192eu (linuxKernel.packages.linux_5_17.rtl8192eu)
linuxPackages_latest.rtl8814au (linuxKernel.packages.linux_5_17.rtl8814au)
linuxPackages_latest.rtl8821au (linuxKernel.packages.linux_5_17.rtl8821au)
linuxPackages_latest.rtl8821ce (linuxKernel.packages.linux_5_17.rtl8821ce)
linuxPackages_latest.rtl8821cu (linuxKernel.packages.linux_5_17.rtl8821cu)
linuxPackages_latest.rtl88x2bu (linuxKernel.packages.linux_5_17.rtl88x2bu)
linuxPackages_latest.rtl88xxau-aircrack (linuxKernel.packages.linux_5_17.rtl88xxau-aircrack)
linuxPackages_latest.sysdig (linuxKernel.packages.linux_5_17.sysdig)
linuxPackages_latest.system76 (linuxKernel.packages.linux_5_17.system76)
linuxPackages_latest.system76-acpi (linuxKernel.packages.linux_5_17.system76-acpi)
linuxPackages_latest.system76-io (linuxKernel.packages.linux_5_17.system76-io)
linuxPackages_latest.systemtap (linuxKernel.packages.linux_5_17.systemtap)
linuxPackages_latest.tmon (linuxKernel.packages.linux_5_17.tmon)
linuxPackages_latest.tp_smapi (linuxKernel.packages.linux_5_17.tp_smapi)
linuxPackages_latest.turbostat (linuxKernel.packages.linux_5_17.turbostat)
linuxPackages_latest.tuxedo-keyboard (linuxKernel.packages.linux_5_17.tuxedo-keyboard)
linuxPackages_latest.usbip (linuxKernel.packages.linux_5_17.usbip)
linuxPackages_latest.v4l2loopback (linuxKernel.packages.linux_5_17.v4l2loopback)
linuxPackages_latest.v86d (linuxKernel.packages.linux_5_17.v86d)
linuxPackages_latest.veikk-linux-driver (linuxKernel.packages.linux_5_17.veikk-linux-driver)
linuxPackages_latest.vendor-reset (linuxKernel.packages.linux_5_17.vendor-reset)
linuxPackages_latest.vhba (linuxKernel.packages.linux_5_17.vhba)
linuxPackages_latest.virtio_vmmci (linuxKernel.packages.linux_5_17.virtio_vmmci)
linuxPackages_latest.virtualbox (linuxKernel.packages.linux_5_17.virtualbox)
linuxPackages_latest.vmm_clock (linuxKernel.packages.linux_5_17.vmm_clock)
linuxPackages_latest.x86_energy_perf_policy (linuxKernel.packages.linux_5_17.x86_energy_perf_policy)
linuxPackages_latest.xone (linuxKernel.packages.linux_5_17.xone)
linuxPackages_latest.xpadneo (linuxKernel.packages.linux_5_17.xpadneo)
linuxPackages_latest.zenpower (linuxKernel.packages.linux_5_17.zenpower)
linuxPackages_latest.zfs (linuxKernel.packages.linux_5_17.zfs ,linuxPackages_latest.zfsStable ,linuxPackages_latest.zfsUnstable)
linuxPackages_latest-libre.acpi_call (linuxKernel.packages.linux_latest_libre.acpi_call)
linuxPackages_latest-libre.akvcam (linuxKernel.packages.linux_latest_libre.akvcam)
linuxPackages_latest-libre.apfs (linuxKernel.packages.linux_latest_libre.apfs)
linuxPackages_latest-libre.asus-ec-sensors (linuxKernel.packages.linux_latest_libre.asus-ec-sensors)
linuxPackages_latest-libre.asus-wmi-sensors (linuxKernel.packages.linux_latest_libre.asus-wmi-sensors)
linuxPackages_latest-libre.bbswitch (linuxKernel.packages.linux_latest_libre.bbswitch)
linuxPackages_latest-libre.can-isotp (linuxKernel.packages.linux_latest_libre.can-isotp)
linuxPackages_latest-libre.chipsec (linuxKernel.packages.linux_latest_libre.chipsec)
linuxPackages_latest-libre.cpupower (linuxKernel.packages.linux_latest_libre.cpupower)
linuxPackages_latest-libre.cryptodev (linuxKernel.packages.linux_latest_libre.cryptodev)
linuxPackages_latest-libre.ddcci-driver (linuxKernel.packages.linux_latest_libre.ddcci-driver)
linuxPackages_latest-libre.dddvb (linuxKernel.packages.linux_latest_libre.dddvb)
linuxPackages_latest-libre.digimend (linuxKernel.packages.linux_latest_libre.digimend)
linuxPackages_latest-libre.dpdk (linuxKernel.packages.linux_latest_libre.dpdk)
linuxPackages_latest-libre.dpdk-kmods (linuxKernel.packages.linux_latest_libre.dpdk-kmods)
linuxPackages_latest-libre.evdi (linuxKernel.packages.linux_latest_libre.evdi)
linuxPackages_latest-libre.facetimehd (linuxKernel.packages.linux_latest_libre.facetimehd)
linuxPackages_latest-libre.fwts-efi-runtime (linuxKernel.packages.linux_latest_libre.fwts-efi-runtime)
linuxPackages_latest-libre.gcadapter-oc-kmod (linuxKernel.packages.linux_latest_libre.gcadapter-oc-kmod)
linuxPackages_latest-libre.hid-nintendo (linuxKernel.packages.linux_latest_libre.hid-nintendo)
linuxPackages_latest-libre.hyperv-daemons (linuxKernel.packages.linux_latest_libre.hyperv-daemons)
linuxPackages_latest-libre.intel-speed-select (linuxKernel.packages.linux_latest_libre.intel-speed-select)
linuxPackages_latest-libre.isgx (linuxKernel.packages.linux_latest_libre.isgx)
linuxPackages_latest-libre.it87 (linuxKernel.packages.linux_latest_libre.it87)
linuxPackages_latest-libre.jool (linuxKernel.packages.linux_latest_libre.jool)
linuxPackages_latest-libre.kvmfr (linuxKernel.packages.linux_latest_libre.kvmfr)
linuxPackages_latest-libre.liquidtux (linuxKernel.packages.linux_latest_libre.liquidtux)
linuxPackages_latest-libre.lttng-modules (linuxKernel.packages.linux_latest_libre.lttng-modules)
linuxPackages_latest-libre.mba6x_bl (linuxKernel.packages.linux_latest_libre.mba6x_bl)
linuxPackages_latest-libre.mbp2018-bridge-drv (linuxKernel.packages.linux_latest_libre.mbp2018-bridge-drv)
linuxPackages_latest-libre.mwprocapture (linuxKernel.packages.linux_latest_libre.mwprocapture)
linuxPackages_latest-libre.netatop (linuxKernel.packages.linux_latest_libre.netatop)
linuxPackages_latest-libre.nvidia_x11 (linuxKernel.packages.linux_latest_libre.nvidia_x11)
linuxPackages_latest-libre.nvidia_x11_beta (linuxKernel.packages.linux_latest_libre.nvidia_x11_beta)
linuxPackages_latest-libre.nvidia_x11_legacy470 (linuxKernel.packages.linux_latest_libre.nvidia_x11_legacy470)
linuxPackages_latest-libre.nvidiabl (linuxKernel.packages.linux_latest_libre.nvidiabl)
linuxPackages_latest-libre.openrazer (linuxKernel.packages.linux_latest_libre.openrazer)
linuxPackages_latest-libre.perf (linuxKernel.packages.linux_latest_libre.perf)
linuxPackages_latest-libre.ply (linuxKernel.packages.linux_latest_libre.ply)
linuxPackages_latest-libre.rr-zen_workaround (linuxKernel.packages.linux_latest_libre.rr-zen_workaround)
linuxPackages_latest-libre.rtl8192eu (linuxKernel.packages.linux_latest_libre.rtl8192eu)
linuxPackages_latest-libre.rtl8814au (linuxKernel.packages.linux_latest_libre.rtl8814au)
linuxPackages_latest-libre.rtl8821au (linuxKernel.packages.linux_latest_libre.rtl8821au)
linuxPackages_latest-libre.rtl8821ce (linuxKernel.packages.linux_latest_libre.rtl8821ce)
linuxPackages_latest-libre.rtl8821cu (linuxKernel.packages.linux_latest_libre.rtl8821cu)
linuxPackages_latest-libre.rtl88x2bu (linuxKernel.packages.linux_latest_libre.rtl88x2bu)
linuxPackages_latest-libre.rtl88xxau-aircrack (linuxKernel.packages.linux_latest_libre.rtl88xxau-aircrack)
linuxPackages_latest-libre.sysdig (linuxKernel.packages.linux_latest_libre.sysdig)
linuxPackages_latest-libre.system76 (linuxKernel.packages.linux_latest_libre.system76)
linuxPackages_latest-libre.system76-acpi (linuxKernel.packages.linux_latest_libre.system76-acpi)
linuxPackages_latest-libre.system76-io (linuxKernel.packages.linux_latest_libre.system76-io)
linuxPackages_latest-libre.systemtap (linuxKernel.packages.linux_latest_libre.systemtap)
linuxPackages_latest-libre.tmon (linuxKernel.packages.linux_latest_libre.tmon)
linuxPackages_latest-libre.tp_smapi (linuxKernel.packages.linux_latest_libre.tp_smapi)
linuxPackages_latest-libre.turbostat (linuxKernel.packages.linux_latest_libre.turbostat)
linuxPackages_latest-libre.tuxedo-keyboard (linuxKernel.packages.linux_latest_libre.tuxedo-keyboard)
linuxPackages_latest-libre.usbip (linuxKernel.packages.linux_latest_libre.usbip)
linuxPackages_latest-libre.v4l2loopback (linuxKernel.packages.linux_latest_libre.v4l2loopback)
linuxPackages_latest-libre.v86d (linuxKernel.packages.linux_latest_libre.v86d)
linuxPackages_latest-libre.veikk-linux-driver (linuxKernel.packages.linux_latest_libre.veikk-linux-driver)
linuxPackages_latest-libre.vendor-reset (linuxKernel.packages.linux_latest_libre.vendor-reset)
linuxPackages_latest-libre.vhba (linuxKernel.packages.linux_latest_libre.vhba)
linuxPackages_latest-libre.virtio_vmmci (linuxKernel.packages.linux_latest_libre.virtio_vmmci)
linuxPackages_latest-libre.virtualbox (linuxKernel.packages.linux_latest_libre.virtualbox)
linuxPackages_latest-libre.vmm_clock (linuxKernel.packages.linux_latest_libre.vmm_clock)
linuxPackages_latest-libre.x86_energy_perf_policy (linuxKernel.packages.linux_latest_libre.x86_energy_perf_policy)
linuxPackages_latest-libre.xone (linuxKernel.packages.linux_latest_libre.xone)
linuxPackages_latest-libre.xpadneo (linuxKernel.packages.linux_latest_libre.xpadneo)
linuxPackages_latest-libre.zenpower (linuxKernel.packages.linux_latest_libre.zenpower)
linuxPackages_latest-libre.zfs (linuxKernel.packages.linux_latest_libre.zfs ,linuxPackages_latest-libre.zfsStable ,linuxPackages_latest-libre.zfsUnstable)
linuxPackages-libre.acpi_call (linuxKernel.packages.linux_libre.acpi_call)
linuxPackages-libre.akvcam (linuxKernel.packages.linux_libre.akvcam)
linuxPackages-libre.apfs (linuxKernel.packages.linux_libre.apfs)
linuxPackages-libre.asus-ec-sensors (linuxKernel.packages.linux_libre.asus-ec-sensors)
linuxPackages-libre.asus-wmi-sensors (linuxKernel.packages.linux_libre.asus-wmi-sensors)
linuxPackages-libre.bbswitch (linuxKernel.packages.linux_libre.bbswitch)
linuxPackages-libre.broadcom_sta (linuxKernel.packages.linux_libre.broadcom_sta)
linuxPackages-libre.can-isotp (linuxKernel.packages.linux_libre.can-isotp)
linuxPackages-libre.chipsec (linuxKernel.packages.linux_libre.chipsec)
linuxPackages-libre.cpupower (linuxKernel.packages.linux_libre.cpupower)
linuxPackages-libre.cryptodev (linuxKernel.packages.linux_libre.cryptodev)
linuxPackages-libre.ddcci-driver (linuxKernel.packages.linux_libre.ddcci-driver)
linuxPackages-libre.dddvb (linuxKernel.packages.linux_libre.dddvb)
linuxPackages-libre.digimend (linuxKernel.packages.linux_libre.digimend)
linuxPackages-libre.dpdk (linuxKernel.packages.linux_libre.dpdk)
linuxPackages-libre.dpdk-kmods (linuxKernel.packages.linux_libre.dpdk-kmods)
linuxPackages-libre.evdi (linuxKernel.packages.linux_libre.evdi)
linuxPackages-libre.facetimehd (linuxKernel.packages.linux_libre.facetimehd)
linuxPackages-libre.fwts-efi-runtime (linuxKernel.packages.linux_libre.fwts-efi-runtime)
linuxPackages-libre.gcadapter-oc-kmod (linuxKernel.packages.linux_libre.gcadapter-oc-kmod)
linuxPackages-libre.hid-nintendo (linuxKernel.packages.linux_libre.hid-nintendo)
linuxPackages-libre.hyperv-daemons (linuxKernel.packages.linux_libre.hyperv-daemons)
linuxPackages-libre.intel-speed-select (linuxKernel.packages.linux_libre.intel-speed-select)
linuxPackages-libre.isgx (linuxKernel.packages.linux_libre.isgx)
linuxPackages-libre.it87 (linuxKernel.packages.linux_libre.it87)
linuxPackages-libre.jool (linuxKernel.packages.linux_libre.jool)
linuxPackages-libre.kvdo (linuxKernel.packages.linux_libre.kvdo)
linuxPackages-libre.kvmfr (linuxKernel.packages.linux_libre.kvmfr)
linuxPackages-libre.liquidtux (linuxKernel.packages.linux_libre.liquidtux)
linuxPackages-libre.lttng-modules (linuxKernel.packages.linux_libre.lttng-modules)
linuxPackages-libre.mba6x_bl (linuxKernel.packages.linux_libre.mba6x_bl)
linuxPackages-libre.mbp2018-bridge-drv (linuxKernel.packages.linux_libre.mbp2018-bridge-drv)
linuxPackages-libre.mwprocapture (linuxKernel.packages.linux_libre.mwprocapture)
linuxPackages-libre.netatop (linuxKernel.packages.linux_libre.netatop)
linuxPackages-libre.nvidia_x11 (linuxKernel.packages.linux_libre.nvidia_x11)
linuxPackages-libre.nvidia_x11_beta (linuxKernel.packages.linux_libre.nvidia_x11_beta)
linuxPackages-libre.nvidia_x11_legacy390 (linuxKernel.packages.linux_libre.nvidia_x11_legacy390)
linuxPackages-libre.nvidia_x11_legacy470 (linuxKernel.packages.linux_libre.nvidia_x11_legacy470)
linuxPackages-libre.nvidiabl (linuxKernel.packages.linux_libre.nvidiabl)
linuxPackages-libre.openafs (linuxKernel.packages.linux_libre.openafs ,linuxPackages-libre.openafs_1_8)
linuxPackages-libre.openrazer (linuxKernel.packages.linux_libre.openrazer)
linuxPackages-libre.perf (linuxKernel.packages.linux_libre.perf)
linuxPackages-libre.ply (linuxKernel.packages.linux_libre.ply)
linuxPackages-libre.r8168 (linuxKernel.packages.linux_libre.r8168)
linuxPackages-libre.rr-zen_workaround (linuxKernel.packages.linux_libre.rr-zen_workaround)
linuxPackages-libre.rtl8189es (linuxKernel.packages.linux_libre.rtl8189es)
linuxPackages-libre.rtl8192eu (linuxKernel.packages.linux_libre.rtl8192eu)
linuxPackages-libre.rtl8814au (linuxKernel.packages.linux_libre.rtl8814au)
linuxPackages-libre.rtl8821au (linuxKernel.packages.linux_libre.rtl8821au)
linuxPackages-libre.rtl8821ce (linuxKernel.packages.linux_libre.rtl8821ce)
linuxPackages-libre.rtl8821cu (linuxKernel.packages.linux_libre.rtl8821cu)
linuxPackages-libre.rtl88x2bu (linuxKernel.packages.linux_libre.rtl88x2bu)
linuxPackages-libre.rtl88xxau-aircrack (linuxKernel.packages.linux_libre.rtl88xxau-aircrack)
linuxPackages-libre.rtw89 (linuxKernel.packages.linux_libre.rtw89)
linuxPackages-libre.sysdig (linuxKernel.packages.linux_libre.sysdig)
linuxPackages-libre.system76 (linuxKernel.packages.linux_libre.system76)
linuxPackages-libre.system76-acpi (linuxKernel.packages.linux_libre.system76-acpi)
linuxPackages-libre.system76-io (linuxKernel.packages.linux_libre.system76-io)
linuxPackages-libre.systemtap (linuxKernel.packages.linux_libre.systemtap)
linuxPackages-libre.tmon (linuxKernel.packages.linux_libre.tmon)
linuxPackages-libre.tp_smapi (linuxKernel.packages.linux_libre.tp_smapi)
linuxPackages-libre.turbostat (linuxKernel.packages.linux_libre.turbostat)
linuxPackages-libre.tuxedo-keyboard (linuxKernel.packages.linux_libre.tuxedo-keyboard)
linuxPackages-libre.usbip (linuxKernel.packages.linux_libre.usbip)
linuxPackages-libre.v4l2loopback (linuxKernel.packages.linux_libre.v4l2loopback)
linuxPackages-libre.v86d (linuxKernel.packages.linux_libre.v86d)
linuxPackages-libre.veikk-linux-driver (linuxKernel.packages.linux_libre.veikk-linux-driver)
linuxPackages-libre.vendor-reset (linuxKernel.packages.linux_libre.vendor-reset)
linuxPackages-libre.vhba (linuxKernel.packages.linux_libre.vhba)
linuxPackages-libre.virtio_vmmci (linuxKernel.packages.linux_libre.virtio_vmmci)
linuxPackages-libre.virtualbox (linuxKernel.packages.linux_libre.virtualbox)
linuxPackages-libre.virtualboxGuestAdditions (linuxKernel.packages.linux_libre.virtualboxGuestAdditions)
linuxPackages-libre.vmm_clock (linuxKernel.packages.linux_libre.vmm_clock)
linuxPackages-libre.x86_energy_perf_policy (linuxKernel.packages.linux_libre.x86_energy_perf_policy)
linuxPackages-libre.xone (linuxKernel.packages.linux_libre.xone)
linuxPackages-libre.xpadneo (linuxKernel.packages.linux_libre.xpadneo)
linuxPackages-libre.zenpower (linuxKernel.packages.linux_libre.zenpower)
linuxPackages-libre.zfs (linuxKernel.packages.linux_libre.zfs ,linuxPackages-libre.zfsStable ,linuxPackages-libre.zfsUnstable)
linuxPackages_testing_bcachefs.acpi_call (linuxKernel.packages.linux_testing_bcachefs.acpi_call)
linuxPackages_testing_bcachefs.akvcam (linuxKernel.packages.linux_testing_bcachefs.akvcam)
linuxPackages_testing_bcachefs.apfs (linuxKernel.packages.linux_testing_bcachefs.apfs)
linuxPackages_testing_bcachefs.asus-ec-sensors (linuxKernel.packages.linux_testing_bcachefs.asus-ec-sensors)
linuxPackages_testing_bcachefs.asus-wmi-sensors (linuxKernel.packages.linux_testing_bcachefs.asus-wmi-sensors)
linuxPackages_testing_bcachefs.bbswitch (linuxKernel.packages.linux_testing_bcachefs.bbswitch)
linuxPackages_testing_bcachefs.broadcom_sta (linuxKernel.packages.linux_testing_bcachefs.broadcom_sta)
linuxPackages_testing_bcachefs.can-isotp (linuxKernel.packages.linux_testing_bcachefs.can-isotp)
linuxPackages_testing_bcachefs.chipsec (linuxKernel.packages.linux_testing_bcachefs.chipsec)
linuxPackages_testing_bcachefs.cpupower (linuxKernel.packages.linux_testing_bcachefs.cpupower)
linuxPackages_testing_bcachefs.cryptodev (linuxKernel.packages.linux_testing_bcachefs.cryptodev)
linuxPackages_testing_bcachefs.ddcci-driver (linuxKernel.packages.linux_testing_bcachefs.ddcci-driver)
linuxPackages_testing_bcachefs.dddvb (linuxKernel.packages.linux_testing_bcachefs.dddvb)
linuxPackages_testing_bcachefs.digimend (linuxKernel.packages.linux_testing_bcachefs.digimend)
linuxPackages_testing_bcachefs.dpdk (linuxKernel.packages.linux_testing_bcachefs.dpdk)
linuxPackages_testing_bcachefs.dpdk-kmods (linuxKernel.packages.linux_testing_bcachefs.dpdk-kmods)
linuxPackages_testing_bcachefs.evdi (linuxKernel.packages.linux_testing_bcachefs.evdi)
linuxPackages_testing_bcachefs.facetimehd (linuxKernel.packages.linux_testing_bcachefs.facetimehd)
linuxPackages_testing_bcachefs.fwts-efi-runtime (linuxKernel.packages.linux_testing_bcachefs.fwts-efi-runtime)
linuxPackages_testing_bcachefs.gcadapter-oc-kmod (linuxKernel.packages.linux_testing_bcachefs.gcadapter-oc-kmod)
linuxPackages_testing_bcachefs.hid-nintendo (linuxKernel.packages.linux_testing_bcachefs.hid-nintendo)
linuxPackages_testing_bcachefs.hyperv-daemons (linuxKernel.packages.linux_testing_bcachefs.hyperv-daemons)
linuxPackages_testing_bcachefs.intel-speed-select (linuxKernel.packages.linux_testing_bcachefs.intel-speed-select)
linuxPackages_testing_bcachefs.isgx (linuxKernel.packages.linux_testing_bcachefs.isgx)
linuxPackages_testing_bcachefs.it87 (linuxKernel.packages.linux_testing_bcachefs.it87)
linuxPackages_testing_bcachefs.jool (linuxKernel.packages.linux_testing_bcachefs.jool)
linuxPackages_testing_bcachefs.kvdo (linuxKernel.packages.linux_testing_bcachefs.kvdo)
linuxPackages_testing_bcachefs.kvmfr (linuxKernel.packages.linux_testing_bcachefs.kvmfr)
linuxPackages_testing_bcachefs.liquidtux (linuxKernel.packages.linux_testing_bcachefs.liquidtux)
linuxPackages_testing_bcachefs.lttng-modules (linuxKernel.packages.linux_testing_bcachefs.lttng-modules)
linuxPackages_testing_bcachefs.mba6x_bl (linuxKernel.packages.linux_testing_bcachefs.mba6x_bl)
linuxPackages_testing_bcachefs.mbp2018-bridge-drv (linuxKernel.packages.linux_testing_bcachefs.mbp2018-bridge-drv)
linuxPackages_testing_bcachefs.mwprocapture (linuxKernel.packages.linux_testing_bcachefs.mwprocapture)
linuxPackages_testing_bcachefs.netatop (linuxKernel.packages.linux_testing_bcachefs.netatop)
linuxPackages_testing_bcachefs.nvidia_x11 (linuxKernel.packages.linux_testing_bcachefs.nvidia_x11)
linuxPackages_testing_bcachefs.nvidia_x11_beta (linuxKernel.packages.linux_testing_bcachefs.nvidia_x11_beta)
linuxPackages_testing_bcachefs.nvidia_x11_legacy390 (linuxKernel.packages.linux_testing_bcachefs.nvidia_x11_legacy390)
linuxPackages_testing_bcachefs.nvidia_x11_legacy470 (linuxKernel.packages.linux_testing_bcachefs.nvidia_x11_legacy470)
linuxPackages_testing_bcachefs.nvidiabl (linuxKernel.packages.linux_testing_bcachefs.nvidiabl)
linuxPackages_testing_bcachefs.openrazer (linuxKernel.packages.linux_testing_bcachefs.openrazer)
linuxPackages_testing_bcachefs.perf (linuxKernel.packages.linux_testing_bcachefs.perf)
linuxPackages_testing_bcachefs.ply (linuxKernel.packages.linux_testing_bcachefs.ply)
linuxPackages_testing_bcachefs.r8168 (linuxKernel.packages.linux_testing_bcachefs.r8168)
linuxPackages_testing_bcachefs.rr-zen_workaround (linuxKernel.packages.linux_testing_bcachefs.rr-zen_workaround)
linuxPackages_testing_bcachefs.rtl8189es (linuxKernel.packages.linux_testing_bcachefs.rtl8189es)
linuxPackages_testing_bcachefs.rtl8192eu (linuxKernel.packages.linux_testing_bcachefs.rtl8192eu)
linuxPackages_testing_bcachefs.rtl8814au (linuxKernel.packages.linux_testing_bcachefs.rtl8814au)
linuxPackages_testing_bcachefs.rtl8821au (linuxKernel.packages.linux_testing_bcachefs.rtl8821au)
linuxPackages_testing_bcachefs.rtl8821ce (linuxKernel.packages.linux_testing_bcachefs.rtl8821ce)
linuxPackages_testing_bcachefs.rtl8821cu (linuxKernel.packages.linux_testing_bcachefs.rtl8821cu)
linuxPackages_testing_bcachefs.rtl88x2bu (linuxKernel.packages.linux_testing_bcachefs.rtl88x2bu)
linuxPackages_testing_bcachefs.rtl88xxau-aircrack (linuxKernel.packages.linux_testing_bcachefs.rtl88xxau-aircrack)
linuxPackages_testing_bcachefs.sysdig (linuxKernel.packages.linux_testing_bcachefs.sysdig)
linuxPackages_testing_bcachefs.system76 (linuxKernel.packages.linux_testing_bcachefs.system76)
linuxPackages_testing_bcachefs.system76-acpi (linuxKernel.packages.linux_testing_bcachefs.system76-acpi)
linuxPackages_testing_bcachefs.system76-io (linuxKernel.packages.linux_testing_bcachefs.system76-io)
linuxPackages_testing_bcachefs.systemtap (linuxKernel.packages.linux_testing_bcachefs.systemtap)
linuxPackages_testing_bcachefs.tmon (linuxKernel.packages.linux_testing_bcachefs.tmon)
linuxPackages_testing_bcachefs.tp_smapi (linuxKernel.packages.linux_testing_bcachefs.tp_smapi)
linuxPackages_testing_bcachefs.turbostat (linuxKernel.packages.linux_testing_bcachefs.turbostat)
linuxPackages_testing_bcachefs.tuxedo-keyboard (linuxKernel.packages.linux_testing_bcachefs.tuxedo-keyboard)
linuxPackages_testing_bcachefs.usbip (linuxKernel.packages.linux_testing_bcachefs.usbip)
linuxPackages_testing_bcachefs.v4l2loopback (linuxKernel.packages.linux_testing_bcachefs.v4l2loopback)
linuxPackages_testing_bcachefs.v86d (linuxKernel.packages.linux_testing_bcachefs.v86d)
linuxPackages_testing_bcachefs.veikk-linux-driver (linuxKernel.packages.linux_testing_bcachefs.veikk-linux-driver)
linuxPackages_testing_bcachefs.vendor-reset (linuxKernel.packages.linux_testing_bcachefs.vendor-reset)
linuxPackages_testing_bcachefs.vhba (linuxKernel.packages.linux_testing_bcachefs.vhba)
linuxPackages_testing_bcachefs.virtio_vmmci (linuxKernel.packages.linux_testing_bcachefs.virtio_vmmci)
linuxPackages_testing_bcachefs.virtualbox (linuxKernel.packages.linux_testing_bcachefs.virtualbox)
linuxPackages_testing_bcachefs.virtualboxGuestAdditions (linuxKernel.packages.linux_testing_bcachefs.virtualboxGuestAdditions)
linuxPackages_testing_bcachefs.vmm_clock (linuxKernel.packages.linux_testing_bcachefs.vmm_clock)
linuxPackages_testing_bcachefs.x86_energy_perf_policy (linuxKernel.packages.linux_testing_bcachefs.x86_energy_perf_policy)
linuxPackages_testing_bcachefs.xone (linuxKernel.packages.linux_testing_bcachefs.xone)
linuxPackages_testing_bcachefs.xpadneo (linuxKernel.packages.linux_testing_bcachefs.xpadneo)
linuxPackages_testing_bcachefs.zenpower (linuxKernel.packages.linux_testing_bcachefs.zenpower)
linuxPackages_testing_bcachefs.zfs (linuxKernel.packages.linux_testing_bcachefs.zfs ,linuxPackages_testing_bcachefs.zfsStable ,linuxPackages_testing_bcachefs.zfsUnstable)
linuxPackages_custom_tinyconfig_kernel
mangohud
monitor
nvfancontrol
psensor
qtcreator
tests.trivial-builders.references
tlp
| gharchive/pull-request | 2022-04-14T06:09:36 | 2025-04-01T04:32:52.649151 | {
"authors": [
"TredwellGit",
"lovesegfault"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/168588",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1204884806 | rspamd: 3.1 -> 3.2
Description of changes
New minor version.
A notable change is the switch to PCRE2 by default. I'm not entirely sure of the implications of this, The PHP people say that there are some incompatibilities between pcre and pcre2, but I can not seem to find a comprehensive list. Please advise whether this deserves an entry in the release notes.
It is also possible to revert to PCRE with a compile-time flag. We could add that to the derivation if deemed necessary.
Things done
Built on platform(s)
[x] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[x] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
22.05 Release Notes (or backporting 21.11 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] (Release notes changes) Ran nixos/doc/manual/md-to-db.sh to update generated release notes
[ ] Fits CONTRIBUTING.md.
@ofborg build nixosTests.opensmtpd-rspamd
| gharchive/pull-request | 2022-04-14T19:08:29 | 2025-04-01T04:32:52.661594 | {
"authors": [
"justinas"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/168698",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1273604071 | python3: fix wrong platform libs when cross-compiling
see https://github.com/NixOS/nixpkgs/pull/169475#issuecomment-1129517328
patch by adisbladis
Co-authored-by: adisbladis adisbladis@gmail.com
Description of changes
Things done
Built on platform(s)
[ ] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
22.11 Release Notes (or backporting 22.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] (Release notes changes) Ran nixos/doc/manual/md-to-db.sh to update generated release notes
[ ] Fits CONTRIBUTING.md.
Maybe we should also update the comment?
| gharchive/pull-request | 2022-06-16T13:57:54 | 2025-04-01T04:32:52.670623 | {
"authors": [
"Artturin",
"SuperSandro2000"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/177888",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1279973765 | koreader: init at 2022.05.1 (built from source)
Reviewers: it will be easier to read this PR if you look at each commit individually, rather than smashed together the way the "Files Changed" tab shows them.
The first three commits are trivial; they are included because without them CI will fail. The fourth commit renames the existing koreader expression to koreader-bin without any changes to it. The fifth commit marks the sourceProvenance of koreader-bin.
The sixth commit is where all the interesting stuff is.
Two utility functions, mapAttrsToConcatStringSep and buildLuaRock, near the top of the file are likely to be useful outside of this particular package. They have comments suggesting they might be moved elsewhere. I prefer to do that in separate PRs following this one.
Ancestral WIP-draft was https://github.com/NixOS/nixpkgs/pull/178320
Description of changes
This expression (koreader/src.nix) builds koreader from source.
The previous koreader expression has been renamed koreader-bin as suggested by @AndersonTorres, and has been moved to koreader/bin.nix.
Things done
Built on platform(s)
[X] x86_64-linux
[ ] aarch64-linux
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[X] Tested basic functionality of all binary files (usually in ./result/bin/)
22.11 Release Notes (or backporting 22.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[X] Fits CONTRIBUTING.md.
Force-push is to resolve the merge conflict caused by 5f7b9cffae972e4fed69419315517678a93a4c3e
Do we really have to vendor all of these? I'm sure koreader builds fine with any version of most of these dependencies.
That is my next project!
However, I think that the default nix-env -iA koreader should always upstream-approved versions of koreader's dependencies.
If we diverge from the versions used by upstream, any quirks or bugs that arise from our version-bumps will create "support blowback" for upstream... people will complain to them about weird bugs that they can't reproduce without realizing that it's really our fault for bumping the version of something (say, glib or openssl) without testing its effect on koreader.
My plan is to add a top-level parameter doNotVendor = [ "pname", "pname", "pname" ... whose default value is [] (i.e. vendor everything), and add a third top-level package koreader-unvendored which "unvendors" as many things as possible. But we should not mislead people into thinking that koreader-unvendored is koreader. Also I think it is inevitable that koreader-unvendored will become broken quite frequently... I'm not sure I can commit to keeping it unbroken at all times the same way I commit to rapid-response maintainership of koreader/src.nix and vendored.nix.
Using a vendored version has the disadvantage of longer build times and untimely security updates.
Yes, and the shorter build times are the main attraction for me, since I'm about to start hacking on koreader... soon my ebook reader will finally have a "totally ignore the touchscreen" mode like all of my dead-tree books do!
Heroic, I should say.
:blush:
Squashed.
The main reason we "vendor" e.g. zstd is because the primary target is embedded systems.
This is stretching the word "embedded"... these aren't microcontrollers running an RTOS. All the popular ebook devices (Kindles and Kobos) are full-fledged arm-linux-gnueabi machines -- Linux, glibc, and all. Kindles even have their own glib.so, and koreader uses it. AFAICT "kindle build" of koreader just sets CC=arm-linux-gnueabi-${CC} and decides which touchscreen+eink driver gets built.
It should be perfectly fine to use ...
Thanks for clarifying. Does this statement apply to ereader builds as well? Because those are the ones that really matter. Being able to nix build pkgsCross.arm32-linux.koreader.kindle and rsync it to my device is a goal.
Also, curious, what is different about MuPDF? Koreader seems to backport a huge amount of material to mupdf-1.13.0; did something awful happen in the following release?
But yes, if you run the tests you should get a reasonably decent indication.
It is not clear that getting the tests to run inside the nix sandbox is feasible.
They expect network access, only partly in order to download more lua packages that aren't used during the build. It's extremely tedious to work on them inside the sandbox because the tests run after the entire build has finished, and the build takes a long time, and AFAICT nix doesn't have good support for restarting partially-completed sandboxed builds. Modularizing the build into separate derivations would need to come first.
some kind of MINIMAL_DESKTOP variable to say that we're in some kind of Debubuntu/NixOS environment
This is slightly funny since I don't run NixOS and am frequently told that my workstation isn't a "desktop" because it omits certain software ;) But I guess all terminology is loaded in some way.
@Frenzie, thank you for patiently explaining so many things to me in this thread. You've been very generous with your time.
I've been thinking a lot about this PR. I still think that nixpkgs' amazing support for cross-compilation would make koreader's build process much simpler and more maintainable. I do a lot of cross-compilation and it's very hard to go back. However I'm no longer think it's a good idea to build the ereader/device builds of koreader from an expression kept in the nixpkgs repo. With very few exceptions, nixpkgs doesn't keep old versions of things around for very long. That policy simply doesn't work for things like koreader that have to deal with manufacturer-supplied kernels and userspaces.
I'm starting to think that the patchelf-based koreader expression is in nixpkgs not because people want to build koreader using the nixpkgs libraries, but rather because there happen to be a bunch of people who use NixOS who want to be able to conveniently use the X11 koreader to develop lua scripts for their ereaders. I'll try to be more aware of these "patchelfpkgs" expressions which are in nixpkgs mainly because NixOS doesn't have its own repo, and resist the urge to make them build from source.
We have put a lot of time and effort into https://github.com/koreader/koxtoolchain and without that
There's a similar situation with another piece of software which I am very fond of, coreboot. Curiously, coreboot's version-pinned toolchain is in nixpkgs, but coreboot itself isn't.
But does the concept make sense to you? ;-)
Yes, absolutely. Chromium and firefox both vendor enormous quantities of libraries (probably more than koreader does) but only use them if the linker can't find a corresponding system library. For situations where automatic detection is inappropriate I belive the manual option is --with-system-libfoo.
| gharchive/pull-request | 2022-06-22T11:13:20 | 2025-04-01T04:32:52.687875 | {
"authors": [
"a-m-joseph",
"amjoseph-nixpkgs"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/178557",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1284482048 | cassowary: 0.14.0 -> 0.14.1
Automatic update generated by nixpkgs-update tools. This update was made based on information from https://repology.org/metapackage/cassowary/versions.
meta.description for cassowary is: "Modern cross-platform HTTP load-testing tool written in Go"
meta.homepage for cassowary is: "https://github.com/rogerwelin/cassowary"
meta.changelog for cassowary is: ""
Updates performed
Golang update
To inspect upstream changes
Release on GitHub
Compare changes on GitHub
Impact
Checks done (click to expand)
built on NixOS
The tests defined in passthru.tests, if any, passed
found 0.14.1 with grep in /nix/store/l0dh6gjvnznmvdqk4mxpvyq0yqxnhk8q-cassowary-0.14.1
found 0.14.1 in filename of file in /nix/store/l0dh6gjvnznmvdqk4mxpvyq0yqxnhk8q-cassowary-0.14.1
Rebuild report (if merged into master) (click to expand)
2 total rebuild path(s)
1 package rebuild(s)
1 x86_64-linux rebuild(s)
1 x86_64-darwin rebuild(s)
First fifty rebuilds by attrpath
cassowary
Instructions to test this update (click to expand)
Either download from Cachix:
nix-store -r /nix/store/l0dh6gjvnznmvdqk4mxpvyq0yqxnhk8q-cassowary-0.14.1 \
--option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \
--option trusted-public-keys '
nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=
cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=
'
(The Cachix cache is only trusted for this store-path realization.)
For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted.
Or, build yourself:
nix-build -A cassowary https://github.com/r-ryantm/nixpkgs/archive/9a066d78a11be11245ae4ac13f6e5ad0703c57c7.tar.gz
After you've downloaded or built it, look at the files and if there are any, run the binaries:
ls -la /nix/store/l0dh6gjvnznmvdqk4mxpvyq0yqxnhk8q-cassowary-0.14.1
ls -la /nix/store/l0dh6gjvnznmvdqk4mxpvyq0yqxnhk8q-cassowary-0.14.1/bin
Pre-merge build results
We have automatically built all packages that will get rebuilt due to
this change.
This gives evidence on whether the upgrade will break dependent packages.
Note sometimes packages show up as failed to build independent of the
change, simply because they are already broken on the target branch.
Result of nixpkgs-review run on x86_64-linux 1
1 package built:
cassowary
Maintainer pings
cc @hugoreeves @kalbasit for testing.
Result of nixpkgs-review pr 178949 run on x86_64-linux 1
1 package built:
cassowary
| gharchive/pull-request | 2022-06-25T07:26:43 | 2025-04-01T04:32:52.699148 | {
"authors": [
"onny",
"r-ryantm"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/178949",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1291046920 | pantheon.wingpanel-indicator-network: 2.3.2 -> 2.3.3
Automatic update generated by nixpkgs-update tools. This update was made based on information from passthru.updateScript.
meta.description for pantheon.wingpanel-indicator-network is: "Network Indicator for Wingpanel"
meta.homepage for pantheon.wingpanel-indicator-network is: "https://github.com/elementary/wingpanel-indicator-network"
meta.changelog for pantheon.wingpanel-indicator-network is: ""
Updates performed
Ran passthru.UpdateScript
To inspect upstream changes
Release on GitHub
Compare changes on GitHub
Impact
Checks done (click to expand)
built on NixOS
The tests defined in passthru.tests, if any, passed
found 2.3.3 with grep in /nix/store/nliqxlbh9fvgn0wrlz1n3mw6bfdw881w-wingpanel-indicator-network-2.3.3
found 2.3.3 in filename of file in /nix/store/nliqxlbh9fvgn0wrlz1n3mw6bfdw881w-wingpanel-indicator-network-2.3.3
Rebuild report (if merged into master) (click to expand)
3 total rebuild path(s)
3 package rebuild(s)
3 x86_64-linux rebuild(s)
0 x86_64-darwin rebuild(s)
First fifty rebuilds by attrpath
pantheon.elementary-greeter
pantheon.wingpanel-indicator-network
pantheon.wingpanel-with-indicators
Instructions to test this update (click to expand)
Either download from Cachix:
nix-store -r /nix/store/nliqxlbh9fvgn0wrlz1n3mw6bfdw881w-wingpanel-indicator-network-2.3.3 \
--option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \
--option trusted-public-keys '
nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=
cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=
'
(The Cachix cache is only trusted for this store-path realization.)
For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted.
Or, build yourself:
nix-build -A pantheon.wingpanel-indicator-network https://github.com/r-ryantm/nixpkgs/archive/d20dd119683e1b9b2f8ca557e3ca8414424bb9c3.tar.gz
After you've downloaded or built it, look at the files and if there are any, run the binaries:
ls -la /nix/store/nliqxlbh9fvgn0wrlz1n3mw6bfdw881w-wingpanel-indicator-network-2.3.3
ls -la /nix/store/nliqxlbh9fvgn0wrlz1n3mw6bfdw881w-wingpanel-indicator-network-2.3.3/bin
Pre-merge build results
We have automatically built all packages that will get rebuilt due to
this change.
This gives evidence on whether the upgrade will break dependent packages.
Note sometimes packages show up as failed to build independent of the
change, simply because they are already broken on the target branch.
Result of nixpkgs-review run on x86_64-linux 1
3 packages built:
pantheon.elementary-greeter
pantheon.wingpanel-indicator-network
pantheon.wingpanel-with-indicators
Maintainer pings
cc @davidak @bobby285271 for testing.
ref: #170361
@ofborg test pantheon
pantheon.wingpanel-indicator-network: 2.3.2 → 2.3.3
[ ] AppData: Fix a typo (#242)
[ ] VpnMenuItem: Avoid to call method of a possibly null connection object (#243)
[ ] Add WPA3 support (#248)
[ ] Fix tooltip showing stale disconnected lable on first boot (#249)
[ ] Update network.appdata.xml.in
[ ] Release 2.3.3
[ ] Update meson.build Tagged: 2.3.3
I will test this in a few hours.
| gharchive/pull-request | 2022-07-01T07:51:10 | 2025-04-01T04:32:52.714955 | {
"authors": [
"bobby285271",
"r-ryantm"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/179779",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1316089510 | nixos/proxmox-image: allow building UEFI images
Description of changes
Allow building other than Legacy-BIOS-only Proxmox images.
Default remains unchanged.
To build UEFI proxmox image use:
proxmox.qemuConf.bios = "ovmf";
(default is "seabios")
To build image bootable using both "seabios" and "ovmf" use:
diskPartitioning = "hybrid";
BIOS can be switched in Proxmox between "seabios" and "ovmf" and VM still boots.
(GRUB2-only, systemd-boot does not boot under "seabios")
To build systemd-boot UEFI image:
proxmox.qemuConf.bios = "ovmf";
boot.loader.systemd-boot.enable = true;
Things done
Built on platform(s)
[X] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[X] Tested basic functionality of all binary files (usually in ./result/bin/)
22.11 Release Notes (or backporting 22.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] (Release notes changes) Ran nixos/doc/manual/md-to-db.sh to update generated release notes
[ ] Fits CONTRIBUTING.md.
Example flake building different image types: https://github.com/otopetrik/proxmox-nixos-image-build-check
This pull request has been mentioned on NixOS Discourse. There might be relevant details there:
https://discourse.nixos.org/t/prs-ready-for-review/3032/1024
Hello @illustris, it looks like you have committed the latest change to this file and authored almost all the changes since this pull request was created.
Could you please merge it or provide feedback ? Thanks.
Thanks for the review.
Option renamed to partitionTableType, release notes updated.
Example repository updated to use cloud-init and terraform to check that resulting images are working.
Hello @SuperSandro2000, it looks like you are the last one to merge a proxmox-image pull request.
Could you please merge this one or provide feedback ? Thanks.
This pull request has been mentioned on NixOS Discourse. There might be relevant details there:
https://discourse.nixos.org/t/prs-already-reviewed/2617/670
Changes applied.
Thanks for the review.
It has been two weeks since the last revision, and no new comments.
I'm assuming that the current version is acceptable.
@SuperSandro2000 could you please merge this pull-request ? Thanks.
Should have received the backport label, since it touched the release notes post branch-off. Backported in #203777.
| gharchive/pull-request | 2022-07-25T01:34:56 | 2025-04-01T04:32:52.728978 | {
"authors": [
"mweinelt",
"nixos-discourse",
"otopetrik"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/182759",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1322639700 | python310Packages.pyotgw: 2.0.0 -> 2.0.1
Description of changes
https://github.com/mvn23/pyotgw/blob/master/CHANGELOG.md#201
Things done
Built on platform(s)
[x] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
22.11 Release Notes (or backporting 22.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] (Release notes changes) Ran nixos/doc/manual/md-to-db.sh to update generated release notes
[x] Fits CONTRIBUTING.md.
@ofborg eval
| gharchive/pull-request | 2022-07-29T20:14:10 | 2025-04-01T04:32:52.737494 | {
"authors": [
"SuperSandro2000",
"fabaff"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/183786",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1324136825 | quick-lint-js: 2.6.0 -> 2.8.0
Automatic update generated by nixpkgs-update tools. This update was made based on information from https://repology.org/metapackage/quick-lint-js/versions.
meta.description for quick-lint-js is: "Find bugs in Javascript programs"
meta.homepage for quick-lint-js is: "https://quick-lint-js.com"
meta.changelog for quick-lint-js is: ""
Updates performed
Version update
To inspect upstream changes
Compare changes on GitHub
Impact
Checks done (click to expand)
built on NixOS
Warning: a test defined in passthru.tests did not pass
found 2.8.0 with grep in /nix/store/n5skrd8bs7jps65r9i5dq1x9rb73wy18-quick-lint-js-2.8.0
found 2.8.0 in filename of file in /nix/store/n5skrd8bs7jps65r9i5dq1x9rb73wy18-quick-lint-js-2.8.0
Rebuild report (if merged into master) (click to expand)
1 total rebuild path(s)
1 package rebuild(s)
First fifty rebuilds by attrpath
quick-lint-js
Instructions to test this update (click to expand)
Either download from Cachix:
nix-store -r /nix/store/n5skrd8bs7jps65r9i5dq1x9rb73wy18-quick-lint-js-2.8.0 \
--option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \
--option trusted-public-keys '
nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=
cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=
'
(The Cachix cache is only trusted for this store-path realization.)
For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted.
Or, build yourself:
nix-build -A quick-lint-js https://github.com/r-ryantm/nixpkgs/archive/e496f6c210d8e55aab4868987a9b4e3360813f99.tar.gz
After you've downloaded or built it, look at the files and if there are any, run the binaries:
ls -la /nix/store/n5skrd8bs7jps65r9i5dq1x9rb73wy18-quick-lint-js-2.8.0
ls -la /nix/store/n5skrd8bs7jps65r9i5dq1x9rb73wy18-quick-lint-js-2.8.0/bin
Pre-merge build results
We have automatically built all packages that will get rebuilt due to
this change.
This gives evidence on whether the upgrade will break dependent packages.
Note sometimes packages show up as failed to build independent of the
change, simply because they are already broken on the target branch.
Result of nixpkgs-review run on x86_64-linux 1
1 package built:
quick-lint-js
Maintainer pings
cc @ratsclub for testing.
nixpkg-review NixOS Linux x64 build went fine
1 package built:
quick-lint-js
when trying to run the program I get
./results/quick-lint-js/bin/quick-lint-js: error while loading shared libraries: libstdc++.so.6: cannot open shared object file: No such file or directory
not sure how to test it, maybe @ratsclub you can check it?
I don't think the issue is related to this PR, let's retry test version on lastest master
@ofborg build quick-lint-js quick-lint-js.passthru.tests
Looks like this is https://github.com/NixOS/nixpkgs/pull/108496#issuecomment-1192083379
https://github.com/NixOS/nixpkgs/pull/189943
| gharchive/pull-request | 2022-08-01T09:46:34 | 2025-04-01T04:32:52.748544 | {
"authors": [
"bobby285271",
"onny",
"r-ryantm",
"strager"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/184535",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1336756775 | basex: 9.7.3 -> 10.0
Automatic update generated by nixpkgs-update tools. This update was made based on information from https://repology.org/metapackage/basex/versions.
meta.description for basex is: "XML database and XPath/XQuery processor"
meta.homepage for basex is: "https://basex.org/"
meta.changelog for basex is: ""
Updates performed
Version update
To inspect upstream changes
Impact
Checks done (click to expand)
built on NixOS
The tests defined in passthru.tests, if any, passed
found 10.0 with grep in /nix/store/krqq3lydpl09mgni9pf22v931qqmivbc-basex-10.0
found 10.0 in filename of file in /nix/store/krqq3lydpl09mgni9pf22v931qqmivbc-basex-10.0
Rebuild report (if merged into master) (click to expand)
1 total rebuild path(s)
1 package rebuild(s)
First fifty rebuilds by attrpath
basex
Instructions to test this update (click to expand)
Either download from Cachix:
nix-store -r /nix/store/krqq3lydpl09mgni9pf22v931qqmivbc-basex-10.0 \
--option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \
--option trusted-public-keys '
nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=
cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=
'
(The Cachix cache is only trusted for this store-path realization.)
For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted.
Or, build yourself:
nix-build -A basex https://github.com/r-ryantm/nixpkgs/archive/71ba3646a31daee747fcbab77d2c5606b383face.tar.gz
After you've downloaded or built it, look at the files and if there are any, run the binaries:
ls -la /nix/store/krqq3lydpl09mgni9pf22v931qqmivbc-basex-10.0
ls -la /nix/store/krqq3lydpl09mgni9pf22v931qqmivbc-basex-10.0/bin
Pre-merge build results
We have automatically built all packages that will get rebuilt due to
this change.
This gives evidence on whether the upgrade will break dependent packages.
Note sometimes packages show up as failed to build independent of the
change, simply because they are already broken on the target branch.
Result of nixpkgs-review run on x86_64-linux 1
1 package built:
basex
Maintainer pings
cc @bjornfor for testing.
Result of nixpkgs-review pr 186232 run on x86_64-darwin 1
1 package built:
basex
| gharchive/pull-request | 2022-08-12T05:05:54 | 2025-04-01T04:32:52.757792 | {
"authors": [
"r-ryantm",
"viraptor"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/186232",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1363447793 | nginxModules.vts: 0.1.18 -> 0.2.0
Description of changes
Things done
Built on platform(s)
[ ] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
22.11 Release Notes (or backporting 22.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] (Release notes changes) Ran nixos/doc/manual/md-to-db.sh to update generated release notes
[ ] Fits CONTRIBUTING.md.
Does the = (equal) in title and commit have a special meaning? Asking to learn.
No, just me hitting the wrong keys.
Result of nixpkgs-review pr 190021 run on x86_64-linux 1
| gharchive/pull-request | 2022-09-06T15:16:38 | 2025-04-01T04:32:52.766748 | {
"authors": [
"SuperSandro2000",
"superherointj"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/190021",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1381614919 | python310Packages.ormar: 0.11.2 -> 0.11.3
Description of changes
https://github.com/collerek/ormar/releases/tag/0.11.3
Things done
Built on platform(s)
[x] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
22.11 Release Notes (or backporting 22.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] (Release notes changes) Ran nixos/doc/manual/md-to-db.sh to update generated release notes
[x] Fits CONTRIBUTING.md.
Result of nixpkgs-review pr 192326 run on x86_64-linux 1
2 packages built:
python310Packages.ormar
python39Packages.ormar
| gharchive/pull-request | 2022-09-21T23:06:32 | 2025-04-01T04:32:52.775722 | {
"authors": [
"fabaff"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/192326",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1391050258 | python310Packages.ansible-lint: 6.5.2 -> 6.7.0
Automatic update generated by nixpkgs-update tools. This update was made based on information from passthru.updateScript.
meta.description for python310Packages.ansible-lint is: "Best practices checker for Ansible"
meta.homepage for python310Packages.ansible-lint is: "https://github.com/ansible/ansible-lint"
meta.changelog for python310Packages.ansible-lint is: ""
Updates performed
Ran passthru.UpdateScript
To inspect upstream changes
Impact
Checks done (click to expand)
built on NixOS
The tests defined in passthru.tests, if any, passed
found 6.7.0 with grep in /nix/store/j57vfkqf71yxbr4z20dj8m3wb93rq0sn-python3.10-ansible-lint-6.7.0
found 6.7.0 in filename of file in /nix/store/j57vfkqf71yxbr4z20dj8m3wb93rq0sn-python3.10-ansible-lint-6.7.0
Rebuild report (if merged into master) (click to expand)
3 total rebuild path(s)
3 package rebuild(s)
First fifty rebuilds by attrpath
ansible-lint
python310Packages.ansible-lint
python39Packages.ansible-lint
Instructions to test this update (click to expand)
Either download from Cachix:
nix-store -r /nix/store/j57vfkqf71yxbr4z20dj8m3wb93rq0sn-python3.10-ansible-lint-6.7.0 \
--option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \
--option trusted-public-keys '
nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=
cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=
'
(The Cachix cache is only trusted for this store-path realization.)
For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted.
Or, build yourself:
nix-build -A python310Packages.ansible-lint https://github.com/r-ryantm/nixpkgs/archive/53484283655cd5e6fa0410d0c263670963cf404e.tar.gz
After you've downloaded or built it, look at the files and if there are any, run the binaries:
ls -la /nix/store/j57vfkqf71yxbr4z20dj8m3wb93rq0sn-python3.10-ansible-lint-6.7.0
ls -la /nix/store/j57vfkqf71yxbr4z20dj8m3wb93rq0sn-python3.10-ansible-lint-6.7.0/bin
Pre-merge build results
We have automatically built all packages that will get rebuilt due to
this change.
This gives evidence on whether the upgrade will break dependent packages.
Note sometimes packages show up as failed to build independent of the
change, simply because they are already broken on the target branch.
Result of nixpkgs-review run on x86_64-linux 1
2 packages built:
ansible-lint (python310Packages.ansible-lint)
python39Packages.ansible-lint
Maintainer pings
cc @sengaya @SuperSandro2000 for testing.
Duplicate of #192919
| gharchive/pull-request | 2022-09-29T15:16:55 | 2025-04-01T04:32:52.784318 | {
"authors": [
"r-ryantm",
"sengaya"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/193541",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
184135453 | font-awesome: use fetchFromGitHub instead of url
Motivation for this change
minor cleanup
Things done
[X] Tested using sandboxing
(nix.useSandbox on NixOS,
or option build-use-sandbox in nix.conf
on non-NixOS)
Built on platform(s)
[X] NixOS
[ ] OS X
[ ] Linux
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nox --run "nox-review wip"
[ ] Tested execution of all binary files (usually in ./result/bin/)
[X] Fits CONTRIBUTING.md.
Thank you!
| gharchive/pull-request | 2016-10-20T05:00:38 | 2025-04-01T04:32:52.788327 | {
"authors": [
"NeQuissimus",
"peterhoeg"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/19712",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1433874821 | python310Packages.rns: 0.3.17 -> 0.3.18
Description of changes
https://github.com/markqvist/Reticulum/releases/tag/0.3.18
Things done
Built on platform(s)
[x] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
22.11 Release Notes (or backporting 22.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] (Release notes changes) Ran nixos/doc/manual/md-to-db.sh to update generated release notes
[x] Fits CONTRIBUTING.md.
Result of nixpkgs-review pr 199237 run on x86_64-linux 1
6 packages built:
python310Packages.lxmf
python310Packages.nomadnet
python310Packages.rns
python39Packages.lxmf
python39Packages.nomadnet
python39Packages.rns
| gharchive/pull-request | 2022-11-02T22:33:33 | 2025-04-01T04:32:52.797469 | {
"authors": [
"fabaff"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/199237",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1516929466 | eiwd: init at 2.4-1
Description of changes
eiwd is iwd, minus the dbus dependency. It consists of iwd, plus:
a bunch of #ifdef HAVE_DBUS lines added, and autoconfery to enable it
name resolution defaults to resolvconf instead of systemd (one-line change)
inability to access /etc/resolv.conf is not a fatal error (one-line change)
ell is vendored as a submodule to ensure consistent versions
That's it.
You control eiwd by simply editing files in its state directory, which it monitors for changes via inotify().
I use this to manage the wifi card on my daily-driver laptop (aarch64-linux) and it has been a huge improvement over wpa_supplicant. It works very well under runit (soon to be replaced with s6). My only complaint is the cryptic filenames used for SSIDs which contain characters other than [A-Za-z0-9 _-].
Things done
[x] Inspected git diff against upstream git.kernel.org/.../{iwd,ell}
[x] enumerated differences from iwd (see bulleted list above)
[x] confirmed there are no shenanigans
Built on platform(s)
[x] x86_64-linux
[x] aarch64-linux
[x] Tested basic functionality of all binary files (usually in ./result/bin/)
[x] Fits CONTRIBUTING.md.
Would be really great if this could make the release...
Fixed merge conflict.
Moved into pkgs/by-name for easier rebasing.
| gharchive/pull-request | 2023-01-03T04:56:44 | 2025-04-01T04:32:52.804017 | {
"authors": [
"amjoseph-nixpkgs"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/208844",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1520646129 | tailscale: 1.34.1 -> 1.34.2
Description of changes
Diff: https://github.com/tailscale/tailscale/compare/v1.34.1...v1.34.2
Things done
Built on platform(s)
[X] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
[X] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[X] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
23.05 Release Notes (or backporting 22.11 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] (Release notes changes) Ran nixos/doc/manual/md-to-db.sh to update generated release notes
[X] Fits CONTRIBUTING.md.
Result of nixpkgs-review pr 209151 run on x86_64-darwin 1
1 package built:
tailscale
| gharchive/pull-request | 2023-01-05T12:12:38 | 2025-04-01T04:32:52.813051 | {
"authors": [
"06kellyjac",
"sikmir"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/209151",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1582801160 | image_optim: remove unused output binaries
Description of changes
Using image_optim as a ruby gem (not standalone executable) seems to currently be broken when vendor binaries are present for other platforms. This patch does not entirely fix the issue (vendor binaries for the correct platform are still broken), but makes it possible to override the provided binaries with nixpkgs and avoid the errors. This should not break things, as the only deleted binaries wouldn't run on the current platform anyway
Things done
Built on platform(s)
[X] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[X] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/) (N/A)
23.05 Release Notes (or backporting 22.11 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[X] Fits CONTRIBUTING.md.
I think the idea of image_optim_pack is well meaning, but it does not sit best with using Nix to provide those same binaries. Instead, assuming the use of a Gemfile, and assuming also that removing image_optim_pack entirely is not an option, I would personally try to exclude image_optim_pack from the bundle when running in Nix, e.g. with unless ENV.key?("IN_NIX_SHELL").
As for making a contribution to defaultGemConfig, it may be better to add those binaries to the image_optim gem’s buildInputs. WDYT?
| gharchive/pull-request | 2023-02-13T17:53:26 | 2025-04-01T04:32:52.822196 | {
"authors": [
"AgathaSorceress",
"amiryal"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/216199",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
198548804 | synaptics: fix broken symlink
Motivation for this change
Fix dead symlink.
the file in xf86-input-synaptics-1.9.0.tar.bz2 has name 70-synaptics.conf, not 50-synaptics.conf.
Things done
[ ] Tested using sandboxing
(nix.useSandbox on NixOS,
or option build-use-sandbox in nix.conf
on non-NixOS)
Built on platform(s)
[x] NixOS
[ ] macOS
[ ] Linux
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nox --run "nox-review wip"
[ ] Tested execution of all binary files (usually in ./result/bin/)
[ ] Fits CONTRIBUTING.md.
Confirmed to be true in unstable, not in stable.
Oh, it would be ideal if we could somehow make the stuff robust to such renames, or at least make some test fail or something...
| gharchive/pull-request | 2017-01-03T19:25:34 | 2025-04-01T04:32:52.827306 | {
"authors": [
"grahamc",
"vcunat",
"volth"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/21621",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1610053581 | xfce.xfce4-wavelan-plugin: init at 0.6.3
Description of changes
https://docs.xfce.org/panel-plugins/xfce4-wavelan-plugin
Things done
Built on platform(s)
[x] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[x] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[x] Tested basic functionality of all binary files (usually in ./result/bin/)
23.05 Release Notes (or backporting 22.11 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[x] Fits CONTRIBUTING.md.
@ofborg eval
I don't use Nix anymore.
| gharchive/pull-request | 2023-03-05T04:41:07 | 2025-04-01T04:32:52.835494 | {
"authors": [
"JavaCafe01",
"bobby285271",
"javacafe01"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/219639",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1632017960 | zen-kernels: 6.2.6 -> 6.2.7
Description of changes
Latest cut for latest kernel bumps.
Things done
Built on platform(s)
[ ] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
23.05 Release Notes (or backporting 22.11 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] Fits CONTRIBUTING.md.
Result of nixpkgs-review pr 222183 run on x86_64-linux 1
38 packages marked as broken and skipped:
linuxKernel.packages.linux_lqx.akvcam
linuxKernel.packages.linux_lqx.can-isotp
linuxKernel.packages.linux_lqx.intel-speed-select
linuxKernel.packages.linux_lqx.ixgbevf
linuxKernel.packages.linux_lqx.kvdo
linuxKernel.packages.linux_lqx.lkrg
linuxKernel.packages.linux_lqx.mxu11x0
linuxKernel.packages.linux_lqx.ndiswrapper
linuxKernel.packages.linux_lqx.nvidia_x11_legacy340
linuxKernel.packages.linux_lqx.nvidiabl
linuxKernel.packages.linux_lqx.phc-intel
linuxKernel.packages.linux_lqx.r8125
linuxKernel.packages.linux_lqx.r8168
linuxKernel.packages.linux_lqx.rtl8188eus-aircrack
linuxKernel.packages.linux_lqx.rtl8192eu
linuxKernel.packages.linux_lqx.rtl8723bs
linuxKernel.packages.linux_lqx.sch_cake
linuxKernel.packages.linux_lqx.tbs
linuxKernel.packages.linux_lqx.zfs
linuxKernel.packages.linux_zen.akvcam
linuxKernel.packages.linux_zen.can-isotp
linuxKernel.packages.linux_zen.intel-speed-select
linuxKernel.packages.linux_zen.ixgbevf
linuxKernel.packages.linux_zen.kvdo
linuxKernel.packages.linux_zen.lkrg
linuxKernel.packages.linux_zen.mxu11x0
linuxKernel.packages.linux_zen.ndiswrapper
linuxKernel.packages.linux_zen.nvidia_x11_legacy340
linuxKernel.packages.linux_zen.nvidiabl
linuxKernel.packages.linux_zen.phc-intel
linuxKernel.packages.linux_zen.r8125
linuxKernel.packages.linux_zen.r8168
linuxKernel.packages.linux_zen.rtl8188eus-aircrack
linuxKernel.packages.linux_zen.rtl8192eu
linuxKernel.packages.linux_zen.rtl8723bs
linuxKernel.packages.linux_zen.sch_cake
linuxKernel.packages.linux_zen.tbs
linuxKernel.packages.linux_zen.zfs
20 packages failed to build:
linuxKernel.packages.linux_lqx.ax99100
linuxKernel.packages.linux_lqx.batman_adv
linuxKernel.packages.linux_lqx.dddvb
linuxKernel.packages.linux_lqx.ena
linuxKernel.packages.linux_lqx.evdi
linuxKernel.packages.linux_lqx.lttng-modules
linuxKernel.packages.linux_lqx.mba6x_bl
linuxKernel.packages.linux_lqx.nvidia_x11_legacy390
linuxKernel.packages.linux_lqx.qc71_laptop
linuxKernel.packages.linux_lqx.system76-acpi
linuxKernel.packages.linux_zen.ax99100
linuxKernel.packages.linux_zen.batman_adv
linuxKernel.packages.linux_zen.dddvb
linuxKernel.packages.linux_zen.ena
linuxKernel.packages.linux_zen.evdi
linuxKernel.packages.linux_zen.lttng-modules
linuxKernel.packages.linux_zen.mba6x_bl
linuxKernel.packages.linux_zen.nvidia_x11_legacy390
linuxKernel.packages.linux_zen.qc71_laptop
linuxKernel.packages.linux_zen.system76-acpi
158 packages built:
linuxKernel.kernels.linux_lqx
linuxKernel.kernels.linux_zen
linuxKernel.packages.linux_lqx.acpi_call
linuxKernel.packages.linux_lqx.apfs
linuxKernel.packages.linux_lqx.asus-ec-sensors
linuxKernel.packages.linux_lqx.asus-wmi-sensors
linuxKernel.packages.linux_lqx.bbswitch
linuxKernel.packages.linux_lqx.broadcom_sta
linuxKernel.packages.linux_lqx.ch9344
linuxKernel.packages.linux_lqx.chipsec
linuxKernel.packages.linux_lqx.cpupower
linuxKernel.packages.linux_lqx.cryptodev
linuxKernel.packages.linux_lqx.ddcci-driver
linuxKernel.packages.linux_lqx.digimend
linuxKernel.packages.linux_lqx.dpdk
linuxKernel.packages.linux_lqx.dpdk-kmods
linuxKernel.packages.linux_lqx.facetimehd
linuxKernel.packages.linux_lqx.fwts-efi-runtime
linuxKernel.packages.linux_lqx.gcadapter-oc-kmod
linuxKernel.packages.linux_lqx.hid-ite8291r3
linuxKernel.packages.linux_lqx.hid-nintendo
linuxKernel.packages.linux_lqx.hyperv-daemons
linuxKernel.packages.linux_lqx.ipu6-drivers
linuxKernel.packages.linux_lqx.isgx
linuxKernel.packages.linux_lqx.it87
linuxKernel.packages.linux_lqx.ithc
linuxKernel.packages.linux_lqx.ivsc-driver
linuxKernel.packages.linux_lqx.jool
linuxKernel.packages.linux_lqx.kvmfr
linuxKernel.packages.linux_lqx.liquidtux
linuxKernel.packages.linux_lqx.mbp2018-bridge-drv
linuxKernel.packages.linux_lqx.mwprocapture
linuxKernel.packages.linux_lqx.netatop
linuxKernel.packages.linux_lqx.new-lg4ff
linuxKernel.packages.linux_lqx.nvidia_x11
linuxKernel.packages.linux_lqx.nvidia_x11_beta_open
linuxKernel.packages.linux_lqx.nvidia_x11_legacy470
linuxKernel.packages.linux_lqx.nvidia_x11_vulkan_beta
linuxKernel.packages.linux_lqx.nvidia_x11_vulkan_beta_open
linuxKernel.packages.linux_lqx.openafs
linuxKernel.packages.linux_lqx.openrazer
linuxKernel.packages.linux_lqx.perf
linuxKernel.packages.linux_lqx.ply
linuxKernel.packages.linux_lqx.prl-tools
linuxKernel.packages.linux_lqx.rr-zen_workaround
linuxKernel.packages.linux_lqx.rtl8189es
linuxKernel.packages.linux_lqx.rtl8189fs
linuxKernel.packages.linux_lqx.rtl8723ds
linuxKernel.packages.linux_lqx.rtl8812au
linuxKernel.packages.linux_lqx.rtl8814au
linuxKernel.packages.linux_lqx.rtl8821au
linuxKernel.packages.linux_lqx.rtl8821ce
linuxKernel.packages.linux_lqx.rtl8821cu
linuxKernel.packages.linux_lqx.rtl88x2bu
linuxKernel.packages.linux_lqx.rtl88xxau-aircrack
linuxKernel.packages.linux_lqx.rtlwifi_new
linuxKernel.packages.linux_lqx.sysdig
linuxKernel.packages.linux_lqx.system76
linuxKernel.packages.linux_lqx.system76-io
linuxKernel.packages.linux_lqx.systemtap
linuxKernel.packages.linux_lqx.tmon
linuxKernel.packages.linux_lqx.tp_smapi
linuxKernel.packages.linux_lqx.turbostat
linuxKernel.packages.linux_lqx.tuxedo-keyboard
linuxKernel.packages.linux_lqx.usbip
linuxKernel.packages.linux_lqx.v4l2loopback
linuxKernel.packages.linux_lqx.v86d
linuxKernel.packages.linux_lqx.veikk-linux-driver
linuxKernel.packages.linux_lqx.vendor-reset
linuxKernel.packages.linux_lqx.vhba
linuxKernel.packages.linux_lqx.virtio_vmmci
linuxKernel.packages.linux_lqx.virtualbox
linuxKernel.packages.linux_lqx.virtualboxGuestAdditions
linuxKernel.packages.linux_lqx.vmm_clock
linuxKernel.packages.linux_lqx.vmware
linuxKernel.packages.linux_lqx.x86_energy_perf_policy
linuxKernel.packages.linux_lqx.xone
linuxKernel.packages.linux_lqx.xpadneo
linuxKernel.packages.linux_lqx.zenpower
linuxKernel.packages.linux_lqx.zfsUnstable
linuxKernel.packages.linux_zen.acpi_call
linuxKernel.packages.linux_zen.apfs
linuxKernel.packages.linux_zen.asus-ec-sensors
linuxKernel.packages.linux_zen.asus-wmi-sensors
linuxKernel.packages.linux_zen.bbswitch
linuxKernel.packages.linux_zen.broadcom_sta
linuxKernel.packages.linux_zen.ch9344
linuxKernel.packages.linux_zen.chipsec
linuxKernel.packages.linux_zen.cpupower
linuxKernel.packages.linux_zen.cryptodev
linuxKernel.packages.linux_zen.ddcci-driver
linuxKernel.packages.linux_zen.digimend
linuxKernel.packages.linux_zen.dpdk
linuxKernel.packages.linux_zen.dpdk-kmods
linuxKernel.packages.linux_zen.facetimehd
linuxKernel.packages.linux_zen.fwts-efi-runtime
linuxKernel.packages.linux_zen.gcadapter-oc-kmod
linuxKernel.packages.linux_zen.hid-ite8291r3
linuxKernel.packages.linux_zen.hid-nintendo
linuxKernel.packages.linux_zen.hyperv-daemons
linuxKernel.packages.linux_zen.ipu6-drivers
linuxKernel.packages.linux_zen.isgx
linuxKernel.packages.linux_zen.it87
linuxKernel.packages.linux_zen.ithc
linuxKernel.packages.linux_zen.ivsc-driver
linuxKernel.packages.linux_zen.jool
linuxKernel.packages.linux_zen.kvmfr
linuxKernel.packages.linux_zen.liquidtux
linuxKernel.packages.linux_zen.mbp2018-bridge-drv
linuxKernel.packages.linux_zen.mwprocapture
linuxKernel.packages.linux_zen.netatop
linuxKernel.packages.linux_zen.new-lg4ff
linuxKernel.packages.linux_zen.nvidia_x11
linuxKernel.packages.linux_zen.nvidia_x11_beta_open
linuxKernel.packages.linux_zen.nvidia_x11_legacy470
linuxKernel.packages.linux_zen.nvidia_x11_vulkan_beta
linuxKernel.packages.linux_zen.nvidia_x11_vulkan_beta_open
linuxKernel.packages.linux_zen.openafs
linuxKernel.packages.linux_zen.openrazer
linuxKernel.packages.linux_zen.perf
linuxKernel.packages.linux_zen.ply
linuxKernel.packages.linux_zen.prl-tools
linuxKernel.packages.linux_zen.rr-zen_workaround
linuxKernel.packages.linux_zen.rtl8189es
linuxKernel.packages.linux_zen.rtl8189fs
linuxKernel.packages.linux_zen.rtl8723ds
linuxKernel.packages.linux_zen.rtl8812au
linuxKernel.packages.linux_zen.rtl8814au
linuxKernel.packages.linux_zen.rtl8821au
linuxKernel.packages.linux_zen.rtl8821ce
linuxKernel.packages.linux_zen.rtl8821cu
linuxKernel.packages.linux_zen.rtl88x2bu
linuxKernel.packages.linux_zen.rtl88xxau-aircrack
linuxKernel.packages.linux_zen.rtlwifi_new
linuxKernel.packages.linux_zen.sysdig
linuxKernel.packages.linux_zen.system76
linuxKernel.packages.linux_zen.system76-io
linuxKernel.packages.linux_zen.systemtap
linuxKernel.packages.linux_zen.tmon
linuxKernel.packages.linux_zen.tp_smapi
linuxKernel.packages.linux_zen.turbostat
linuxKernel.packages.linux_zen.tuxedo-keyboard
linuxKernel.packages.linux_zen.usbip
linuxKernel.packages.linux_zen.v4l2loopback
linuxKernel.packages.linux_zen.v86d
linuxKernel.packages.linux_zen.veikk-linux-driver
linuxKernel.packages.linux_zen.vendor-reset
linuxKernel.packages.linux_zen.vhba
linuxKernel.packages.linux_zen.virtio_vmmci
linuxKernel.packages.linux_zen.virtualbox
linuxKernel.packages.linux_zen.virtualboxGuestAdditions
linuxKernel.packages.linux_zen.vmm_clock
linuxKernel.packages.linux_zen.vmware
linuxKernel.packages.linux_zen.x86_energy_perf_policy
linuxKernel.packages.linux_zen.xone
linuxKernel.packages.linux_zen.xpadneo
linuxKernel.packages.linux_zen.zenpower
linuxKernel.packages.linux_zen.zfsUnstable
| gharchive/pull-request | 2023-03-20T12:33:14 | 2025-04-01T04:32:52.857898 | {
"authors": [
"PedroHLC"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/222183",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
213777232 | flow: 0.39.0 -> 0.41.0
Motivation for this change
New upstream release
Things done
[ ] Tested using sandboxing
(nix.useSandbox on NixOS,
or option build-use-sandbox in nix.conf
on non-NixOS)
Built on platform(s)
[x] NixOS
[ ] macOS
[ ] Linux
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nox --run "nox-review wip"
[x] Tested execution of all binary files (usually in ./result/bin/)
[x] Fits CONTRIBUTING.md.
Thanks!
| gharchive/pull-request | 2017-03-13T14:07:48 | 2025-04-01T04:32:52.862368 | {
"authors": [
"frontsideair"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/23844",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1784654055 | komga: 0.165.0 -> 1.1.0
Automatic update generated by nixpkgs-update tools. This update was made based on information from https://github.com/gotson/komga/releases.
meta.description for komga is: Free and open source comics/mangas server
meta.homepage for komga is: https://komga.org/
Updates performed
Version update
To inspect upstream changes
Release on GitHub
Compare changes on GitHub
Impact
Checks done (click to expand)
built on NixOS
Warning: a test defined in passthru.tests did not pass
found 1.1.0 with grep in /nix/store/ak5blbcc58c1dcgcj232hs5pw0ksvnnm-komga-1.1.0
found 1.1.0 in filename of file in /nix/store/ak5blbcc58c1dcgcj232hs5pw0ksvnnm-komga-1.1.0
Rebuild report (if merged into master) (click to expand)
1 total rebuild path(s)
1 package rebuild(s)
First fifty rebuilds by attrpath
komga
Instructions to test this update (click to expand)
Either download from Cachix:
nix-store -r /nix/store/ak5blbcc58c1dcgcj232hs5pw0ksvnnm-komga-1.1.0 \
--option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \
--option trusted-public-keys '
nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=
cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=
'
(The Cachix cache is only trusted for this store-path realization.)
For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted.
Or, build yourself:
nix-build -A komga https://github.com/r-ryantm/nixpkgs/archive/bf9c4c5292b250b223be64d60ae66a84f0c78481.tar.gz
After you've downloaded or built it, look at the files and if there are any, run the binaries:
ls -la /nix/store/ak5blbcc58c1dcgcj232hs5pw0ksvnnm-komga-1.1.0
ls -la /nix/store/ak5blbcc58c1dcgcj232hs5pw0ksvnnm-komga-1.1.0/bin
Pre-merge build results
We have automatically built all packages that will get rebuilt due to
this change.
This gives evidence on whether the upgrade will break dependent packages.
Note sometimes packages show up as failed to build independent of the
change, simply because they are already broken on the target branch.
Result of nixpkgs-review run on x86_64-linux 1
1 package built:
komga
Maintainer pings
cc @GovanifY for testing.
Superseded by https://github.com/NixOS/nixpkgs/pull/241140
| gharchive/pull-request | 2023-07-02T13:51:31 | 2025-04-01T04:32:52.871870 | {
"authors": [
"GovanifY",
"r-ryantm"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/241109",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1809174828 | python310Packages.pluggy: 1.0.0 -> 1.2.0
Description of changes
Diff: https://github.com/pytest-dev/pluggy/compare/refs/tags/1.0.0...1.2.0
Changelog: https://github.com/pytest-dev/pluggy/blob/refs/tags/1.2.0/CHANGELOG.rst
Things done
Built on platform(s)
[x] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
23.11 Release Notes (or backporting 23.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[x] Fits CONTRIBUTING.md.
Included in #244135
| gharchive/pull-request | 2023-07-18T05:57:42 | 2025-04-01T04:32:52.880524 | {
"authors": [
"SuperSandro2000",
"dotlambda"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/244115",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1827931085 | matrix-appservice-irc: 0.38.0 -> 1.0.1
https://github.com/matrix-org/matrix-appservice-irc/releases/tag/1.0.0
This release drops support for Node 16. The minimum required version is now 18+.
Moved from NPM to Yarn
https://github.com/matrix-org/matrix-appservice-irc/releases/tag/1.0.1
Fixes for GHSA-vc7j-h8xg-fv5x.
Fixes for GHSA-3pmj-jqqp-2mj3.
Fixes for GHSA-c7hh-3v6c-fj4q
Update matrix-appservice-bridge to 9.0.1
while there was an effort to make this package with mkYarnPackage, in the end it
was suggested to just use stdenv.mkDerivation instead
nixos/matrix-appservice-irc:
fix path to config.schema.yml directory stucture of the package changed
use remarshal instead of python and pyyaml
to convert the config schema from yaml to json
Things done
Built on platform(s)
[x] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[x] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[x] Tested basic functionality of all binary files (usually in ./result/bin/)
23.11 Release Notes (or backporting 23.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] Fits CONTRIBUTING.md.
overrides #246116
ps. there's an expectation of a .1 release on monday 31.08.2023, so we can wait for merging for that.
Is there a way to make some smart enough wrapper to replace the bin script that comes with matrix-appservice-irc so that it doesn't say it's running node?
# ./result/bin/matrix-appservice-irc
Usage:
Generating an application service registration file:
/nix/store/5vm8fh4q21xlk7i1y6rqykqar296dglr-nodejs-slim-18.16.1/bin/node -r [-f /path/to/save/registration.yaml] -u 'http://localhost:6789' -c CONFIG_FILE [-l my-app-service]
Running an application service with an existing registration file:
/nix/store/5vm8fh4q21xlk7i1y6rqykqar296dglr-nodejs-slim-18.16.1/bin/node -c CONFIG_FILE [-f /path/to/load/registration.yaml] [-p NUMBER]
That was the same with the buildNpmPackage build.
/nix/store/dz5fsk46vdbydbrdp5x5gshkfkj1irbr-matrix-appservice-irc-0.38.0
❯ ./result/bin/matrix-appservice-irc --help
Usage:
Generating an application service registration file:
/nix/store/y85811fai07h16xqwh99wnql0cwgb17c-nodejs-18.16.1/bin/node -r [-f /path/to/save/registration.yaml] -u 'http://localhost:6789' -c CONFIG_FILE [-l my-app-service]
Running an application service with an existing registration file:
/nix/store/y85811fai07h16xqwh99wnql0cwgb17c-nodejs-18.16.1/bin/node -c CONFIG_FILE [-f /path/to/load/registration.yaml] [-p NUMBER]
Options:
--help -h
Display this help message
--file -f
The registration file to load or save to.
--generate-registration -r
Create a registration YAML file for this application service
--url -u
Registration Option. Required if -r is set. The URL where the application service is listening for HS requests
--localpart -l
Registration Option. Valid if -r is set. The user_id localpart to assign to the AS.
--config -c
The config file to load
--port -p
The port to listen on for HS requests
Note: this is security sensitive (fixes GHSA-c7hh-3v6c-fj4q)
I think this can work The roundtrip in the nixos test should be enough to guarantee that.
Thank you!
| gharchive/pull-request | 2023-07-30T13:04:30 | 2025-04-01T04:32:52.893356 | {
"authors": [
"gdamjan",
"mweinelt",
"whitequark"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/246188",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1901584295 | python3Packages.pynetbox: add packaging, setuptools
Description of changes
Add deps on packaging and setuptools, as I was getting No module named [...] errors when trying to import this (I was getting this for packaging on darwin, pkg_resources on linux).
Things done
Built on platform(s)
[x] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[x] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
23.11 Release Notes (or backporting 23.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] Fits CONTRIBUTING.md.
Apologies that this sat for so long.
https://github.com/netbox-community/pynetbox/pull/564/files removes the need for setuptools, can we remove that from the PR? (packaging is still needed, even on linux.)
Done, plus tested that it still imports fine on linux.
| gharchive/pull-request | 2023-09-18T19:13:52 | 2025-04-01T04:32:52.902368 | {
"authors": [
"eclairevoyant",
"nyanotech"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/255951",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1918532312 | rustc: support clang-based stdenv
Description of changes
Previously, we were passing cc and c++ all the time to rustc bootstrap process.
This was wrong because cc-rs relies on the name of the compiler to detect whether this is Clang or a GNU GCC.
Related:
https://github.com/rust-lang/cc-rs/blob/df2f86ceafbe787698b890a3d6bde9f969d5fa88/src/lib.rs#L3334
https://rust-lang.zulipchat.com/#narrow/stream/122651-general/topic/Missing.20dynamic.20libraries.20when.20bootstrapping.20Rust/near/377914373
Things done
Built on platform(s)
[ ] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
23.11 Release Notes (or backporting 23.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] Fits CONTRIBUTING.md.
Hm, actually, this could go on master as no one is depending on clang stdenvs yet…
@ofborg eval
Hah, it does trigger rebuilds.
This was wrong because cc-rs relies on the name of the compiler to detect whether this is Clang or a GNU GCC.
That's horrifying. Can it be fixed?
This was wrong because cc-rs relies on the name of the compiler to detect whether this is Clang or a GNU GCC.
That's horrifying. Can it be fixed?
I believe it is: https://github.com/rust-lang/cc-rs/pull/709
@RaitoBezarius cc-rs 1.0.84 includes this change, so if we can get rust to update we can drop this.
| gharchive/pull-request | 2023-09-29T03:13:38 | 2025-04-01T04:32:52.914183 | {
"authors": [
"RaitoBezarius",
"alyssais",
"figsoda"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/257950",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1939166718 | curl: drop Darwin-specific patches
Description of changes
The Darwin stdenv and CF no longer depend on libcurl, so the patches required to break the mutual recursion between CF and libcurl are no longer needed. Dropping them simplifies the curl derivation and restores support for NAT64.
Things done
Built on platform(s)
[ ] x86_64-linux
[ ] aarch64-linux
[x] x86_64-darwin
[x] aarch64-darwin
[ ] For non-Linux: Is sandbox = true set in nix.conf? (See Nix manual)
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[x] Tested basic functionality of all binary files (usually in ./result/bin/)
23.11 Release Notes (or backporting 23.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[x] Fits CONTRIBUTING.md.
Superseded by #260599.
| gharchive/pull-request | 2023-10-12T04:46:16 | 2025-04-01T04:32:52.922058 | {
"authors": [
"reckenrode",
"wegank"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/260599",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1966626579 | python3Packages.pymongo-inmemory: 0.3.1 -> 0.4.0
Description of changes
Diff: https://github.com/kaizendorks/pymongo_inmemory/compare/refs/tags/v0.3.1...v0.4.0
Things done
Built on platform(s)
[x] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual)
[ ] sandbox = relaxed
[ ] sandbox = true
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[x] Tested basic functionality of all binary files (usually in ./result/bin/)
23.11 Release Notes (or backporting 23.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[x] Fits CONTRIBUTING.md.
@ofborg build python311Packages.pymongo-inmemory
Result of nixpkgs-review pr 263981 run on x86_64-linux 1
2 packages failed to build:
python310Packages.cachier
python310Packages.cachier.dist
6 packages built:
python310Packages.pymongo-inmemory
python310Packages.pymongo-inmemory.dist
python311Packages.cachier
python311Packages.cachier.dist
python311Packages.pymongo-inmemory
python311Packages.pymongo-inmemory.dist
unable to reproduce failure /shrug
| gharchive/pull-request | 2023-10-28T14:56:31 | 2025-04-01T04:32:52.932109 | {
"authors": [
"natsukium",
"pbsds"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/263981",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
1980986701 | tqsl: unpin OpenSSL
Description of changes
revert cc120206d830998a1bcb8ad7aa9f1b2e8c213b31 as TQSL can now be built against OpenSSL 3.x
ZHF: #265948
Things done
Built on platform(s)
[X] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual)
[ ] sandbox = relaxed
[ ] sandbox = true
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
23.11 Release Notes (or backporting 23.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] Fits CONTRIBUTING.md.
This pull request has been mentioned on NixOS Discourse. There might be relevant details there:
https://discourse.nixos.org/t/cqrlog-tqsl-and-openssl-1-1-1w/35117/2
Result of nixpkgs-review pr 266031 run on aarch64-linux 1
2 packages built:
cqrlog
tqsl
| gharchive/pull-request | 2023-11-07T10:04:40 | 2025-04-01T04:32:52.941836 | {
"authors": [
"nixos-discourse",
"wamserma"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/266031",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
239996983 | vifm: 0.8.2 -> 0.9
Motivation for this change
Update vifm to the last version
Things done
[X] Tested using sandboxing
(nix.useSandbox on NixOS,
or option build-use-sandbox in nix.conf
on non-NixOS)
Built on platform(s)
[X] NixOS
[ ] macOS
[ ] Linux
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nox --run "nox-review wip"
[X] Tested execution of all binary files (usually in ./result/bin/)
[X] Fits CONTRIBUTING.md.
cc maintainers @7c6f434c @garbas
| gharchive/pull-request | 2017-07-02T08:31:46 | 2025-04-01T04:32:52.946546 | {
"authors": [
"FRidh",
"mimadrid"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/27034",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
2068504296 | balena-cli: 17.4.9 -> 17.4.11
Automatic update generated by nixpkgs-update tools. This update was made based on information from https://repology.org/project/balena-cli/versions.
meta.description for balena-cli is: A command line interface for balenaCloud or openBalena
meta.homepage for balena-cli is: https://github.com/balena-io/balena-cli
meta.changelog for balena-cli is: https://github.com/balena-io/balena-cli/blob/v17.4.11/CHANGELOG.md
Updates performed
NPM version update
To inspect upstream changes
Release on GitHub
Compare changes on GitHub
Impact
Checks done
built on NixOS
The tests defined in passthru.tests, if any, passed
found 17.4.11 with grep in /nix/store/ricbs8b0mb3qvqy3imwjp30c8gazpjzn-balena-cli-17.4.11
found 17.4.11 in filename of file in /nix/store/ricbs8b0mb3qvqy3imwjp30c8gazpjzn-balena-cli-17.4.11
Rebuild report (if merged into master) (click to expand)
1 total rebuild path(s)
1 package rebuild(s)
First fifty rebuilds by attrpath
balena-cli
Instructions to test this update (click to expand)
Either download from Cachix:
nix-store -r /nix/store/ricbs8b0mb3qvqy3imwjp30c8gazpjzn-balena-cli-17.4.11 \
--option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \
--option trusted-public-keys '
nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=
cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=
'
(The Cachix cache is only trusted for this store-path realization.)
For the Cachix download to work, your user must be in the trusted-users list or you can use sudo since root is effectively trusted.
Or, build yourself:
nix-build -A balena-cli https://github.com/r-ryantm/nixpkgs/archive/a5f31405e44ed71668a5436bd7744b653b8588a7.tar.gz
Or:
nix build github:r-ryantm/nixpkgs/a5f31405e44ed71668a5436bd7744b653b8588a7#balena-cli
After you've downloaded or built it, look at the files and if there are any, run the binaries:
ls -la /nix/store/ricbs8b0mb3qvqy3imwjp30c8gazpjzn-balena-cli-17.4.11
ls -la /nix/store/ricbs8b0mb3qvqy3imwjp30c8gazpjzn-balena-cli-17.4.11/bin
Pre-merge build results
We have automatically built all packages that will get rebuilt due to
this change.
This gives evidence on whether the upgrade will break dependent packages.
Note sometimes packages show up as failed to build independent of the
change, simply because they are already broken on the target branch.
Result of nixpkgs-review run on x86_64-linux 1
1 package built:
balena-cli
Maintainer pings
cc @kalebpace @doronbehar for testing.
Good bot!
| gharchive/pull-request | 2024-01-06T09:53:28 | 2025-04-01T04:32:52.956579 | {
"authors": [
"doronbehar",
"r-ryantm"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/279129",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
2079532378 | nixos/mail/listmonk: fix hardening directives
Description of changes
For some reason, I don't know why I missed those, but I didn't look at my logs for a while.
It would be nice if we could catch those statically kinda (?) in CI.
Fixes https://github.com/NixOS/nixpkgs/issues/269279.
Things done
Built on platform(s)
[ ] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual)
[ ] sandbox = relaxed
[ ] sandbox = true
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
24.05 Release Notes (or backporting 23.05 and 23.11 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] Fits CONTRIBUTING.md.
Add a :+1: reaction to pull requests you find important.
@ofborg test listmonk
| gharchive/pull-request | 2024-01-12T19:15:32 | 2025-04-01T04:32:52.966396 | {
"authors": [
"RaitoBezarius"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/280561",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
2133189630 | yara: 4.4.0 -> 4.5.0
Changes: https://github.com/VirusTotal/yara/releases/tag/v4.5.0
Description of changes
Things done
Built on platform(s)
[x] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual)
[ ] sandbox = relaxed
[ ] sandbox = true
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
24.05 Release Notes (or backporting 23.05 and 23.11 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[x] Fits CONTRIBUTING.md.
Add a :+1: reaction to pull requests you find important.
Rebased to pull in musl patch PR and drop it as it's already included into 4.5.0.
| gharchive/pull-request | 2024-02-13T21:53:58 | 2025-04-01T04:32:52.976421 | {
"authors": [
"trofi"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/288679",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
2135089881 | passbolt: init at 4.9.1
Description of changes
WIP for passbolt server, there is still a lot of structure to move around in order to make this package let's say more immutable friendly
Things done
Built on platform(s)
[X] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual)
[ ] sandbox = relaxed
[ ] sandbox = true
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[X] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
24.05 Release Notes (or backporting 23.05 and 23.11 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[X] Fits CONTRIBUTING.md.
Add a :+1: reaction to pull requests you find important.
Closes #227484
This is very WIP still and cannot be used I believe, there are a few errors when running cake and I haven't handled env variables for any initial configuration.
I've tried following some of the instruction here : https://www.passbolt.com/docs/hosting/install/ce/from-source/
There are some warning and errors right now :
warning: 2 :: mkdir(): Read-only file system on line 96 of /nix/store/kpy8ckvkwz38i6km18cf51fbf7qs5wbg-passbolt_api-4.9.1/vendor/cakephp/cakephp/src/Log/Engine/FileLog.php
warning: 2 :: file_put_contents(/nix/store/kpy8ckvkwz38i6km18cf51fbf7qs5wbg-passbolt_api-4.9.1/logs/cli-error.log): Failed to open stream: No such file or directory on line 142 of /nix/store/kpy8ckvkwz38i6km18cf51fbf7qs5wbg-passbolt_api-4.9.1/vendor/cakephp/cakephp/src/Log/Engine/FileLog.php
warning: 512 :: /nix/store/kpy8ckvkwz38i6km18cf51fbf7qs5wbg-passbolt_api-4.9.1/tmp/cache/persistent/ is not writable on line 430 of /nix/store/kpy8ckvkwz38i6km18cf51fbf7qs5wbg-passbolt_api-4.9.1/vendor/cakephp/cakephp/src/Cache/Engine/FileEngine.php
warning: 512 :: /nix/store/kpy8ckvkwz38i6km18cf51fbf7qs5wbg-passbolt_api-4.9.1/tmp/cache/ is not writable on line 430 of /nix/store/kpy8ckvkwz38i6km18cf51fbf7qs5wbg-passbolt_api-4.9.1/vendor/cakephp/cakephp/src/Cache/Engine/FileEngine.php
<!DOCTYPE html>
<html class="passbolt no-js no-passboltplugin version" lang="en">
<head>
<meta charset="utf-8">
<title>Passbolt | Error</title>
<!--
____ __ ____
/ __ \____ _____ ____/ /_ ____ / / /_
/ /_/ / __ `/ ___/ ___/ __ \/ __ \/ / __/
/ ____/ /_/ (__ )__ ) /_/ / /_/ / / /_
/_/ \__,_/____/____/_.___/\____/_/\__/
Open source password manager for teams
Copyright (c) Passbolt SA (https://www.passbolt.com)
...
I'm not sure if I'm using correctly the phases here.
I wish if there would be reviews to see if I'm not doing something very wrong, from far more experienced people in Nix/NixOS packaging.
Currently (will push at some point, after patching the logs and cache directories to writeable paths), the main error seems to be about a missing plugin EmailQueue (trace from strace -f when running cake :
newfstatat(AT_FDCWD, "/nix/store/jwir61h9zrpascrp6wqxznzcrsdyyz1f-passbolt_api-4.9.1/vendor/composer/../cakephp/authentication/src/Plugin.php", {st_mode=S_IFREG|0444, st_size=998, ...}, AT_SYMLINK_NOFOLLOW) = 0
openat(AT_FDCWD, "/nix/store/jwir61h9zrpascrp6wqxznzcrsdyyz1f-passbolt_api-4.9.1/vendor/cakephp/authentication/src/Plugin.php", O_RDONLY) = 4
newfstatat(4, "", {st_mode=S_IFREG|0444, st_size=998, ...}, AT_EMPTY_PATH) = 0
read(4, "<?php\ndeclare(strict_types=1);\n\n"..., 998) = 998
close(4) = 0
access("/nix/store/jwir61h9zrpascrp6wqxznzcrsdyyz1f-passbolt_api-4.9.1/vendor/composer/../lorenzo/cakephp-email-queue/src/Plugin.php", F_OK) = -1 ENOENT (No such file or directory)
access("/nix/store/jwir61h9zrpascrp6wqxznzcrsdyyz1f-passbolt_api-4.9.1/vendor/composer/../lorenzo/cakephp-email-queue/src/EmailQueuePlugin.php", F_OK) = -1 ENOENT (No such file or directory)
newfstatat(AT_FDCWD, "/nix/store/jwir61h9zrpascrp6wqxznzcrsdyyz1f-passbolt_api-4.9.1/vendor/composer/../cakephp/cakephp/src/Core/App.php", {st_mode=S_IFREG|0444, st_size=8178, ...}, AT_SYMLINK_NOFOLLOW) = 0
openat(AT_FDCWD, "/nix/store/jwir61h9zrpascrp6wqxznzcrsdyyz1f-passbolt_api-4.9.1/vendor/cakephp/cakephp/src/Core/App.php", O_RDONLY) = 4
newfstatat(4, "", {st_mode=S_IFREG|0444, st_size=8178, ...}, AT_EMPTY_PATH) = 0
read(4, "<?php\ndeclare(strict_types=1);\n\n"..., 8178) = 8178
close(4) = 0
newfstatat(AT_FDCWD, "/nix/store/jwir61h9zrpascrp6wqxznzcrsdyyz1f-passbolt_api-4.9.1/plugins/EmailQueue", 0x7ffe56553f90, 0) = -1 ENOENT (No such file or directory)
newfstatat(AT_FDCWD, "/nix/store/jwir61h9zrpascrp6wqxznzcrsdyyz1f-passbolt_api-4.9.1/vendor/composer/../cakephp/cakephp/src/Core/Exception/MissingPluginException.php", {st_mode=S_IFREG|0444, st_size=736, ...}, AT_SYMLINK_NOFOLLOW) = 0
newfstatat(AT_FDCWD, "/nix/store/jwir61h9zrpascrp6wqxznzcrsdyyz1f-passbolt_api-4.9.1/vendor/composer/../cakephp/cakephp/src/Core/Exception", {st_mode=S_IFDIR|0555, st_size=4096, ...}, AT_SYMLINK_NOFOLLOW) = 0
openat(AT_FDCWD, "/nix/store/jwir61h9zrpascrp6wqxznzcrsdyyz1f-passbolt_api-4.9.1/vendor/cakephp/cakephp/src/Core/Exception/MissingPluginException.php", O_RDONLY) = 4
newfstatat(4, "", {st_mode=S_IFREG|0444, st_size=736, ...}, AT_EMPTY_PATH) = 0
read(4, "<?php\ndeclare(strict_types=1);\n\n"..., 736) = 736
close(4) = 0
newfstatat(AT_FDCWD, "/nix/store/jwir61h9zrpascrp6wqxznzcrsdyyz1f-passbolt_api-4.9.1/vendor/composer/../cakephp/cakephp/src/Core/Exception/CakeException.php", {st_mode=S_IFREG|0444, st_size=3634, ...}, AT_SYMLINK_NOFOLLOW) = 0
openat(AT_FDCWD, "/nix/store/jwir61h9zrpascrp6wqxznzcrsdyyz1f-passbolt_api-4.9.1/vendor/cakephp/cakephp/src/Core/Exception/CakeException.php", O_RDONLY) = 4
newfstatat(4, "", {st_mode=S_IFREG|0444, st_size=3634, ...}, AT_EMPTY_PATH) = 0
read(4, "<?php\ndeclare(strict_types=1);\n\n"..., 3634) = 3634
close(4) = 0
The file :
/nix/store/jwir61h9zrpascrp6wqxznzcrsdyyz1f-passbolt_api-4.9.1/vendor/composer/../lorenzo/cakephp-email-queue/src/EmailQueuePlugin.php does not exist but /nix/store/jwir61h9zrpascrp6wqxznzcrsdyyz1f-passbolt_api-4.9.1/vendor/composer/../lorenzo/cakephp-email-queue/src/EmailQueue.php does.
I have no idea how to fix this, I've checked a few of the paths defined in config/paths.php and they look alright.
| gharchive/pull-request | 2024-02-14T19:51:48 | 2025-04-01T04:32:52.989892 | {
"authors": [
"AkechiShiro"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/288856",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
2151942062 | vscode-extensions.equinusocio.vsc-material-theme: 33.8.0 -> 34.3.1
Description of changes
https://github.com/material-theme/vsc-material-theme/releases/tag/v34.3.1
Things done
Built on platform(s)
[x] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual)
[ ] sandbox = relaxed
[ ] sandbox = true
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
24.05 Release Notes (or backporting 23.05 and 23.11 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[x] Fits CONTRIBUTING.md.
Add a :+1: reaction to pull requests you find important.
Looks like there's a hash mismatch now...
good that you checked. I am confused...
| gharchive/pull-request | 2024-02-23T23:16:30 | 2025-04-01T04:32:53.000064 | {
"authors": [
"Stunkymonkey"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/291021",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
2152905765 | python311Packages.jaxtyping: 0.2.25 -> 0.2.26
Description of changes
Update jaxtyping.
Things done
Built on platform(s)
[x] x86_64-linux
[x] aarch64-linux
[x] x86_64-darwin
[x] aarch64-darwin
For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual)
[ ] sandbox = relaxed
[ ] sandbox = true
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
24.05 Release Notes (or backporting 23.05 and 23.11 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[x] Fits CONTRIBUTING.md.
Add a :+1: reaction to pull requests you find important.
Result of nixpkgs-review pr 291421 run on x86_64-linux 1
20 packages built:
python311Packages.ax
python311Packages.ax.dist
python311Packages.botorch
python311Packages.botorch.dist
python311Packages.equinox
python311Packages.equinox.dist
python311Packages.gpytorch
python311Packages.gpytorch.dist
python311Packages.jaxtyping
python311Packages.jaxtyping.dist
python311Packages.linear-operator
python311Packages.linear-operator.dist
python311Packages.optuna
python311Packages.optuna.dist
python311Packages.pyannote-audio
python311Packages.pyannote-audio.dist
python311Packages.pyannote-pipeline
python311Packages.pyannote-pipeline.dist
python312Packages.jaxtyping
python312Packages.jaxtyping.dist
Result of nixpkgs-review pr 291421 run on aarch64-linux 1
6 packages failed to build:
python311Packages.optuna
python311Packages.optuna.dist
python311Packages.pyannote-audio
python311Packages.pyannote-audio.dist
python311Packages.pyannote-pipeline
python311Packages.pyannote-pipeline.dist
14 packages built:
python311Packages.ax
python311Packages.ax.dist
python311Packages.botorch
python311Packages.botorch.dist
python311Packages.equinox
python311Packages.equinox.dist
python311Packages.gpytorch
python311Packages.gpytorch.dist
python311Packages.jaxtyping
python311Packages.jaxtyping.dist
python311Packages.linear-operator
python311Packages.linear-operator.dist
python312Packages.jaxtyping
python312Packages.jaxtyping.dist
| gharchive/pull-request | 2024-02-25T19:26:03 | 2025-04-01T04:32:53.013763 | {
"authors": [
"GaetanLepage"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/291421",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
2367684934 | python312Packages.zha: 0.0.13 -> 0.0.15
Diff: https://github.com/zigpy/zha/compare/refs/tags/0.0.13...0.0.15
Changelog: https://github.com/zigpy/zha/releases/tag/0.0.15
Description of changes
Things done
Built on platform(s)
[ ] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual)
[ ] sandbox = relaxed
[ ] sandbox = true
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
24.11 Release Notes (or backporting 23.11 and 24.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] Fits CONTRIBUTING.md.
Add a :+1: reaction to pull requests you find important.
Result of nixpkgs-review pr 321702 run on x86_64-linux 1
2 packages built:
python312Packages.zha
python312Packages.zha.dist
| gharchive/pull-request | 2024-06-22T08:17:47 | 2025-04-01T04:32:53.024588 | {
"authors": [
"fabaff"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/321702",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
2433454457 | python312Packages.{blackdiag,seqdiag}: drop nose dependency
Description of changes
part of:
#326513
Things done
Built on platform(s)
[x] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual)
[ ] sandbox = relaxed
[ ] sandbox = true
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
24.11 Release Notes (or backporting 23.11 and 24.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[x] Fits CONTRIBUTING.md.
Add a :+1: reaction to pull requests you find important.
Thanks!
The two pull requests we’re vendoring here are included in a fork by the author of one of them at yuzutech/blockdiag, which also has other clean‐ups. I think we should strongly consider switching to that instead of applying more patches, as it seems unlikely that they’ll ever be merged upstream.
Lets see @bjornfor opinion (if he doens't reply, well try to migrate)
Thanks!
The two pull requests we’re vendoring here are included in a fork by the author of one of them at yuzutech/blockdiag, which also has other clean‐ups. I think we should strongly consider switching to that instead of applying more patches, as it seems unlikely that they’ll ever be merged upstream.
Lets see @bjornfor opinion (if he doens't reply, well try to migrate)
I think this PR is fine and we can migrate to a fork in a separate PR.
Result of nixpkgs-review pr 330396 run on x86_64-linux 1
8 packages failed to build:
python311Packages.actdiag
python311Packages.actdiag.dist
python311Packages.nwdiag
python311Packages.nwdiag.dist
python311Packages.sphinxcontrib-actdiag
python311Packages.sphinxcontrib-actdiag.dist
python311Packages.sphinxcontrib-nwdiag
python311Packages.sphinxcontrib-nwdiag.dist
27 packages built:
actdiag (python312Packages.actdiag)
actdiag.dist (python312Packages.actdiag.dist)
asciidoc-full-with-plugins
asciidoc-full-with-plugins.dist
blockdiag (python312Packages.blockdiag)
blockdiag.dist (python312Packages.blockdiag.dist)
nixpkgs-manual
nwdiag (python312Packages.nwdiag)
nwdiag.dist (python312Packages.nwdiag.dist)
python311Packages.blockdiag
python311Packages.blockdiag.dist
python311Packages.seqdiag
python311Packages.seqdiag.dist
python311Packages.sphinxcontrib-blockdiag
python311Packages.sphinxcontrib-blockdiag.dist
python311Packages.sphinxcontrib-seqdiag
python311Packages.sphinxcontrib-seqdiag.dist
seqdiag (python312Packages.seqdiag)
seqdiag.dist (python312Packages.seqdiag.dist)
python312Packages.sphinxcontrib-actdiag
python312Packages.sphinxcontrib-actdiag.dist
python312Packages.sphinxcontrib-blockdiag
python312Packages.sphinxcontrib-blockdiag.dist
python312Packages.sphinxcontrib-nwdiag
python312Packages.sphinxcontrib-nwdiag.dist
python312Packages.sphinxcontrib-seqdiag
python312Packages.sphinxcontrib-seqdiag.dist
The regressions are because of the testcase_generator removal; they break only on 3.11 because those packages also depend on nose and therefore have tests disabled on 3.12. That’s probably not a good situation to be in.
Should we setup a custom patch for this then?
I think probably. Those packages also have a nose dependency we’ll need to clean up. It’s kind of awkward since people are fixing up the main package but not the other ones that are part of the same collection.
Well sorry, thought I had it with seqdiag
Oh, sorry, I meant people making PRs on GitHub and doing forks etc. :) You’re doing fine.
| gharchive/pull-request | 2024-07-27T12:11:22 | 2025-04-01T04:32:53.041315 | {
"authors": [
"Sigmanificient",
"bjornfor",
"emilazy"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/330396",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
2524632983 | home-assistant-custom-components.average: init at 2.3.4
Description of changes
Things done
Built on platform(s)
[x] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual)
[ ] sandbox = relaxed
[ ] sandbox = true
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
24.11 Release Notes (or backporting 23.11 and 24.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] Fits CONTRIBUTING.md.
Add a :+1: reaction to pull requests you find important.
Result of nixpkgs-review pr 341571 run on x86_64-linux 1
1 package built:
home-assistant-custom-components.average
I didn't enable it on my own home-assistant instance, but it builds fine and LGTM otherwise.
| gharchive/pull-request | 2024-09-13T11:44:08 | 2025-04-01T04:32:53.051671 | {
"authors": [
"matthiasbeyer",
"pinpox"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/341571",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
2582756708 | python311Packages.pyannotate: refactor
disable failing tests
Fix build (https://hydra.nixos.org/build/272026585)
Things done
Built on platform(s)
[ ] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual)
[ ] sandbox = relaxed
[ ] sandbox = true
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
24.11 Release Notes (or backporting 23.11 and 24.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] Fits CONTRIBUTING.md.
Add a :+1: reaction to pull requests you find important.
Result of nixpkgs-review pr 348064 run on x86_64-linux 1
8 packages built:
python311Packages.pyannotate
python311Packages.pyannotate.dist
python311Packages.pytest-annotate
python311Packages.pytest-annotate.dist
python312Packages.pyannotate
python312Packages.pyannotate.dist
python312Packages.pytest-annotate
python312Packages.pytest-annotate.dist
| gharchive/pull-request | 2024-10-12T09:57:58 | 2025-04-01T04:32:53.062856 | {
"authors": [
"fabaff"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/348064",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
2665059263 | digikam: add conditional cmake flag for cudaSupport
Added a cudaSupport input flag to digikam since it wouldn't compile when it was set to true in nixpkgs.
Fixes #356525
Tested on my dotfiles flake (which has cuda support enabled)
Quick note: There is an bug where the application crashes when you open the settings menu, changing the QT_QPA_PLATFORM to xcb makes it not crash anymore but I can't verify if it's a cuda issue or it's a wayland issue. Can someone do a test with Cuda support enabled on an X11 session? Update 11/28/2024: I've discovered that this is a specifically a QT with cuda issue; as in v8.5.0 (which updates to QT 6.8), the issue no longer occurs.
Things done
Built on platform(s)
[x] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual)
[ ] sandbox = relaxed
[ ] sandbox = true
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[x] Tested basic functionality of all binary files (usually in ./result/bin/)
25.05 Release Notes (or backporting 24.11 and 25.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[x] Fits CONTRIBUTING.md.
Add a :+1: reaction to pull requests you find important.
nixpkgs-review result
Generated using nixpkgs-review.
Command: nixpkgs-review pr 356596
x86_64-linux
:white_check_mark: 1 package built:
digikam
aarch64-linux
:white_check_mark: 1 package built:
digikam
I think that the PR should be backported into stable, since if anyone is using cuda support they would run into the issue
Is there any blockers that's stopping this PR from being merged (and possibly backported)?
Sorry, forgot about it n
@khaneliman All good! I'm thinking this change should be backported to 24.11 since the issue could also possibly affect stable users (I use unstable but I'd imagine the issue also being present for those who use cuda on stable)
| gharchive/pull-request | 2024-11-16T23:16:49 | 2025-04-01T04:32:53.075983 | {
"authors": [
"NovaViper",
"khaneliman"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/356596",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
2677607098 | iterm2: 3.5.4 -> 3.5.10
Things done
Built on platform(s)
[ ] x86_64-darwin
[x] aarch64-darwin
For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual)
[ ] sandbox = relaxed
[ ] sandbox = true
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[x] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[x] Tested basic functionality of all binary files (usually in ./result/bin/)
24.11 Release Notes (or backporting 23.11 and 24.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] Fits CONTRIBUTING.md.
Add a :+1: reaction to pull requests you find important.
Please change the target branch of the PR to master. You are currently targeting a release-branch.
Please change the target branch of the PR to master. You are currently targeting a release-branch.
I based my change off of the 24.11-darwin release branch, changing the target to master added all commits in the darwin-branch to this PR as you see. This doesn't seem right, please advise - should I have done something different since this is a darwin-specific package?
Just rebase your branch with the current master branch. This should do the trick.
I have rebased the PR for you :)
I have rebased the PR for you :)
Ah, crud! I was caught up in something & just did it myself before seeing your update. Hope that doesn't break anything, seemed fine on my machine. Thanks a lot for the help, in any case!
You have only re-triggered the CI, so everything is okay :)
Now we have to wait for the CI (may take a day or even longer) and the CI will then add the maintainers of iterm2 as reviewers and if they have nothing against your update, we can merge it :)
Ah okay, I just saw that hydra builds are disabled for this package and therefore the maintainers weren't added as reviewers, so let's do this manually: @steinybot @tricktron
| gharchive/pull-request | 2024-11-21T00:14:59 | 2025-04-01T04:32:53.088591 | {
"authors": [
"NetaliDev",
"rwxg"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/357721",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
300875438 | praat: 5.4.17 -> 6.0.37
Semi-automatic update. These checks were performed:
built on NixOS
ran /nix/store/igl5hb1k2wwkms75y5vfs5cvd7a32i34-praat-6.0.37/bin/praat --help got 0 exit code
ran /nix/store/igl5hb1k2wwkms75y5vfs5cvd7a32i34-praat-6.0.37/bin/praat help got 0 exit code
ran /nix/store/igl5hb1k2wwkms75y5vfs5cvd7a32i34-praat-6.0.37/bin/praat --version and found version 6.0.37
found 6.0.37 with grep in /nix/store/igl5hb1k2wwkms75y5vfs5cvd7a32i34-praat-6.0.37
found 6.0.37 in filename of file in /nix/store/igl5hb1k2wwkms75y5vfs5cvd7a32i34-praat-6.0.37
Failure on x86_64-darwin (full log)
Partial log (click to expand)
Package ‘praat-6.0.37’ in /Users/graham/nix-borg/repo/38dca4e3aa6bca43ea96d2fcc04e8229/builder/grahamc-ndnd/pkgs/applications/audio/praat/default.nix:25 is not supported on ‘x86_64-darwin’, refusing to evaluate.
a) For `nixos-rebuild` you can set
{ nixpkgs.config.allowBroken = true; }
in configuration.nix to override this.
b) For `nix-env`, `nix-build`, `nix-shell` or any other Nix command you can add
{ allowBroken = true; }
to ~/.config/nixpkgs/config.nix.
Success on x86_64-linux (full log)
Partial log (click to expand)
installing
glibPreFixupPhase
post-installation fixup
shrinking RPATHs of ELF executables and libraries in /nix/store/igl5hb1k2wwkms75y5vfs5cvd7a32i34-praat-6.0.37
shrinking /nix/store/igl5hb1k2wwkms75y5vfs5cvd7a32i34-praat-6.0.37/bin/praat
strip is /nix/store/b0zlxla7dmy1iwc3g459rjznx59797xy-binutils-2.28.1/bin/strip
stripping (with command strip and flags -S) in /nix/store/igl5hb1k2wwkms75y5vfs5cvd7a32i34-praat-6.0.37/bin
patching script interpreter paths in /nix/store/igl5hb1k2wwkms75y5vfs5cvd7a32i34-praat-6.0.37
checking for references to /tmp/nix-build-praat-6.0.37.drv-0 in /nix/store/igl5hb1k2wwkms75y5vfs5cvd7a32i34-praat-6.0.37...
/nix/store/igl5hb1k2wwkms75y5vfs5cvd7a32i34-praat-6.0.37
Failure on aarch64-linux (full log)
Partial log (click to expand)
gcc -std=gnu99 -DUNIX -Dlinux -DALSA -D_FILE_OFFSET_BITS=64 `pkg-config --cflags gtk+-2.0` -Werror=missing-prototypes -Werror=implicit -Wreturn-type -Wunused -Wunused-parameter -Wuninitialized -O1 -g1 -pthread -c -o gsl_rng__uni32.o gsl_rng__uni32.c
gsl_rng__uni32.c:108:32: warning: 'MDIG' defined but not used [-Wunused-const-variable=]
static const unsigned long int MDIG = 32; /* Machine digits in int */
^~~~
gcc -std=gnu99 -DUNIX -Dlinux -DALSA -D_FILE_OFFSET_BITS=64 `pkg-config --cflags gtk+-2.0` -Werror=missing-prototypes -Werror=implicit -Wreturn-type -Wunused -Wunused-parameter -Wuninitialized -O1 -g1 -pthread -c -o gsl_rng__vax.o gsl_rng__vax.c
gcc -std=gnu99 -DUNIX -Dlinux -DALSA -D_FILE_OFFSET_BITS=64 `pkg-config --cflags gtk+-2.0` -Werror=missing-prototypes -Werror=implicit -Wreturn-type -Wunused -Wunused-parameter -Wuninitialized -O1 -g1 -pthread -c -o gsl_rng__waterman14.o gsl_rng__waterman14.c
gcc -std=gnu99 -DUNIX -Dlinux -DALSA -D_FILE_OFFSET_BITS=64 `pkg-config --cflags gtk+-2.0` -Werror=missing-prototypes -Werror=implicit -Wreturn-type -Wunused -Wunused-parameter -Wuninitialized -O1 -g1 -pthread -c -o gsl_rng__zuf.o gsl_rng__zuf.c
gcc -std=gnu99 -DUNIX -Dlinux -DALSA -D_FILE_OFFSET_BITS=64 `pkg-config --cflags gtk+-2.0` -Werror=missing-prototypes -Werror=implicit -Wreturn-type -Wunused -Wunused-parameter -Wuninitialized -O1 -g1 -pthread -c -o gsl_roots__bisection.o gsl_roots__bisection.c
building of '/nix/store/xfbxq80d9arx5d9xm8gn1qs7q0b6n8vz-praat-6.0.37.drv' timed out after 3600 seconds
[31;1merror:[0m build of '/nix/store/xfbxq80d9arx5d9xm8gn1qs7q0b6n8vz-praat-6.0.37.drv' failed
| gharchive/pull-request | 2018-02-28T03:10:22 | 2025-04-01T04:32:53.094359 | {
"authors": [
"GrahamcOfBorg",
"ryantm"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/35975",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
2762983911 | prometheus: 3.0.0 -> 3.0.1
Diff: https://github.com/prometheus/prometheus/compare/v3.0.0...v3.0.1
Things done
Built on platform(s)
[ ] x86_64-linux
[ ] aarch64-linux
[ ] x86_64-darwin
[ ] aarch64-darwin
For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual)
[ ] sandbox = relaxed
[ ] sandbox = true
[ ] Tested, as applicable:
NixOS test(s) (look inside nixos/tests)
and/or package tests
or, for functions and "core" functionality, tests in lib/tests or pkgs/test
made sure NixOS tests are linked to the relevant packages
[ ] Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
[ ] Tested basic functionality of all binary files (usually in ./result/bin/)
25.05 Release Notes (or backporting 24.11 and 25.05 Release notes)
[ ] (Package updates) Added a release notes entry if the change is major or breaking
[ ] (Module updates) Added a release notes entry if the change is significant
[ ] (Module addition) Added a release notes entry if adding a new NixOS module
[ ] Fits CONTRIBUTING.md.
Add a :+1: reaction to pull requests you find important.
error: hash mismatch in fixed-output derivation '/nix/store/74s6iwll68jnga8gwgp2fpbkm6cd37zy-prometheus-web-ui-3.0.1.tar.gz.drv':
likely URL: https://github.com/prometheus/prometheus/releases/download/v3.0.1/prometheus-web-ui-3.0.1.tar.gz
specified: sha256-a3xyStDsutLjYIEm7t3WilmvO36eMHvd4pOtZYYsJCM=
got: sha256-MP7B7gVRQnspXLLNmPH8t3DYKbsQkDV9hPJYbM2rB9M=
error: 1 dependencies of derivation '/nix/store/r2iqrznh64fj4wqvjk76bhad8cjy2wiy-prometheus-3.0.1.drv' failed to build
another hash mismatch, this time in the go modules hash:
hash mismatch in fixed-output derivation '/nix/store/xsk9d6grcwapdc8qi9f1kkljizad3xwn-prometheus-3.0.1-go-modules.drv':
likely URL: (unknown)
specified: sha256-MP7B7gVRQnspXLLNmPH8t3DYKbsQkDV9hPJYbM2rB9M=
got: sha256-c96YnWPLH/tbGRb2Zlqrl3PXSZvI+NeYTGlef6REAOw=
nixpkgs-review result
Generated using nixpkgs-review.
Command: nixpkgs-review pr 369347
x86_64-linux
:white_check_mark: 3 packages built:
prometheus
prometheus.cli
prometheus.doc
| gharchive/pull-request | 2024-12-30T10:22:06 | 2025-04-01T04:32:53.105842 | {
"authors": [
"Kranzes",
"flokli"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/369347",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
305341391 | libbson: 1.9.2 -> 1.9.3
Semi-automatic update generated by https://github.com/ryantm/nix-update tools. These checks were done:
built on NixOS
Warning: no binary found that responded to help or version flags. (This warning appears even if the package isn't expected to have binaries.)
found 1.9.3 with grep in /nix/store/2wb2wdhn8wqxcmh8vp75gnnb5sncmf3n-libbson-1.9.3
found 1.9.3 in filename of file in /nix/store/2wb2wdhn8wqxcmh8vp75gnnb5sncmf3n-libbson-1.9.3
Success on x86_64-darwin (full log)
Attempted: libbson
Partial log (click to expand)
-- Installing: /nix/store/by5wx6yh65ssxcz3zri1jvinhfzsc6ak-libbson-1.9.3/lib/pkgconfig/libbson-static-1.0.pc
-- Installing: /nix/store/by5wx6yh65ssxcz3zri1jvinhfzsc6ak-libbson-1.9.3/lib/cmake/libbson-1.0/libbson-1.0-config.cmake
-- Installing: /nix/store/by5wx6yh65ssxcz3zri1jvinhfzsc6ak-libbson-1.9.3/lib/cmake/libbson-1.0/libbson-1.0-config-version.cmake
-- Installing: /nix/store/by5wx6yh65ssxcz3zri1jvinhfzsc6ak-libbson-1.9.3/lib/cmake/libbson-static-1.0/libbson-static-1.0-config.cmake
-- Installing: /nix/store/by5wx6yh65ssxcz3zri1jvinhfzsc6ak-libbson-1.9.3/lib/cmake/libbson-static-1.0/libbson-static-1.0-config-version.cmake
post-installation fixup
strip is /nix/store/4sdh09gmvl15cy0zb6i7mbvxh5syz206-cctools-binutils-darwin/bin/strip
stripping (with command strip and flags -S) in /nix/store/by5wx6yh65ssxcz3zri1jvinhfzsc6ak-libbson-1.9.3/lib
patching script interpreter paths in /nix/store/by5wx6yh65ssxcz3zri1jvinhfzsc6ak-libbson-1.9.3
/nix/store/by5wx6yh65ssxcz3zri1jvinhfzsc6ak-libbson-1.9.3
Success on aarch64-linux (full log)
Attempted: libbson
Partial log (click to expand)
-- Installing: /nix/store/lvkid08dga3blpia7mh2wynvmd175jn5-libbson-1.9.3/lib/cmake/libbson-static-1.0/libbson-static-1.0-config.cmake
-- Installing: /nix/store/lvkid08dga3blpia7mh2wynvmd175jn5-libbson-1.9.3/lib/cmake/libbson-static-1.0/libbson-static-1.0-config-version.cmake
post-installation fixup
shrinking RPATHs of ELF executables and libraries in /nix/store/lvkid08dga3blpia7mh2wynvmd175jn5-libbson-1.9.3
shrinking /nix/store/lvkid08dga3blpia7mh2wynvmd175jn5-libbson-1.9.3/lib/libbson-1.0.so.0
strip is /nix/store/lvx1acn1ig1j2km8jds5x3ggh3f2wa8v-binutils-2.28.1/bin/strip
stripping (with command strip and flags -S) in /nix/store/lvkid08dga3blpia7mh2wynvmd175jn5-libbson-1.9.3/lib
patching script interpreter paths in /nix/store/lvkid08dga3blpia7mh2wynvmd175jn5-libbson-1.9.3
checking for references to /build in /nix/store/lvkid08dga3blpia7mh2wynvmd175jn5-libbson-1.9.3...
/nix/store/lvkid08dga3blpia7mh2wynvmd175jn5-libbson-1.9.3
Success on x86_64-linux (full log)
Attempted: libbson
Partial log (click to expand)
-- Installing: /nix/store/2wb2wdhn8wqxcmh8vp75gnnb5sncmf3n-libbson-1.9.3/lib/cmake/libbson-static-1.0/libbson-static-1.0-config.cmake
-- Installing: /nix/store/2wb2wdhn8wqxcmh8vp75gnnb5sncmf3n-libbson-1.9.3/lib/cmake/libbson-static-1.0/libbson-static-1.0-config-version.cmake
post-installation fixup
shrinking RPATHs of ELF executables and libraries in /nix/store/2wb2wdhn8wqxcmh8vp75gnnb5sncmf3n-libbson-1.9.3
shrinking /nix/store/2wb2wdhn8wqxcmh8vp75gnnb5sncmf3n-libbson-1.9.3/lib/libbson-1.0.so.0
strip is /nix/store/b0zlxla7dmy1iwc3g459rjznx59797xy-binutils-2.28.1/bin/strip
stripping (with command strip and flags -S) in /nix/store/2wb2wdhn8wqxcmh8vp75gnnb5sncmf3n-libbson-1.9.3/lib
patching script interpreter paths in /nix/store/2wb2wdhn8wqxcmh8vp75gnnb5sncmf3n-libbson-1.9.3
checking for references to /build in /nix/store/2wb2wdhn8wqxcmh8vp75gnnb5sncmf3n-libbson-1.9.3...
/nix/store/2wb2wdhn8wqxcmh8vp75gnnb5sncmf3n-libbson-1.9.3
| gharchive/pull-request | 2018-03-14T21:48:55 | 2025-04-01T04:32:53.111650 | {
"authors": [
"GrahamcOfBorg",
"ryantm"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/37031",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
307467325 | perlPackages.perlldap: init at 0.65
Motivation for this change
This package provides version 0.65 of the Net::LDAP module and
replaces the old version 0.4001 NetLDAP package which was
broken with respect to the use of hostnames in SASL bindings.
Things done
[ ] Tested using sandboxing (nix.useSandbox on NixOS, or option build-use-sandbox in nix.conf on non-NixOS)
Built on platform(s)
[X] NixOS
[ ] macOS
[ ] other Linux distributions
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nox --run "nox-review wip"
[X] Tested execution of all binary files (usually in ./result/bin/)
[X] Fits CONTRIBUTING.md.
@GrahamcOfBorg build smbldaptools lbdb openxpki smokeping john
Success on x86_64-darwin (full log)
Attempted: smbldaptools, lbdb, smokeping
The following builds were skipped because they don't evaluate on x86_64-darwin: openxpki, john
Partial log (click to expand)
make[1]: Leaving directory '/private/tmp/nix-build-smokeping-2.6.11.drv-0/smokeping-2.6.11'
post-installation fixup
gzipping man pages under /nix/store/hy7h1xg6al5mvlw1d3wp1mpr06j1s92g-smokeping-2.6.11/share/man/
strip is /nix/store/vb6mgjqgd9h11nbv60fvrp1ls9nxck2y-cctools-binutils-darwin/bin/strip
stripping (with command strip and flags -S) in /nix/store/hy7h1xg6al5mvlw1d3wp1mpr06j1s92g-smokeping-2.6.11/lib /nix/store/hy7h1xg6al5mvlw1d3wp1mpr06j1s92g-smokeping-2.6.11/bin
patching script interpreter paths in /nix/store/hy7h1xg6al5mvlw1d3wp1mpr06j1s92g-smokeping-2.6.11
/nix/store/hy7h1xg6al5mvlw1d3wp1mpr06j1s92g-smokeping-2.6.11/htdocs/smokeping.fcgi: interpreter directive changed from "/bin/sh" to "/nix/store/8hdxjv3m14jgdnawi5l0mz2h59qkk2g9-bash-4.4-p19/bin/sh"
/nix/store/74npj27vs80aqa22n2jcndwxmjxlr787-smbldap-tools-0.9.11
/nix/store/klbmq67fbbiajb9x8xzc1w769iwp1kah-lbdb-0.46
/nix/store/hy7h1xg6al5mvlw1d3wp1mpr06j1s92g-smokeping-2.6.11
Failure on x86_64-linux (full log)
Attempted: smbldaptools, lbdb, openxpki, smokeping, john
Partial log (click to expand)
make[1]: Leaving directory '/tmp/nix-build-smokeping-2.6.11.drv-0/smokeping-2.6.11'
post-installation fixup
shrinking RPATHs of ELF executables and libraries in /nix/store/wn0c3qsvz5bdzmgvq4dbm3hr8gxz6brp-smokeping-2.6.11
gzipping man pages under /nix/store/wn0c3qsvz5bdzmgvq4dbm3hr8gxz6brp-smokeping-2.6.11/share/man/
strip is /nix/store/fzcs0fn6bb04m82frhlb78nc03ny3w55-binutils-2.28.1/bin/strip
stripping (with command strip and flags -S) in /nix/store/wn0c3qsvz5bdzmgvq4dbm3hr8gxz6brp-smokeping-2.6.11/lib /nix/store/wn0c3qsvz5bdzmgvq4dbm3hr8gxz6brp-smokeping-2.6.11/bin
patching script interpreter paths in /nix/store/wn0c3qsvz5bdzmgvq4dbm3hr8gxz6brp-smokeping-2.6.11
/nix/store/wn0c3qsvz5bdzmgvq4dbm3hr8gxz6brp-smokeping-2.6.11/htdocs/smokeping.fcgi: interpreter directive changed from "/bin/sh" to "/nix/store/q1g0rl8zfmz7r371fp5p42p4acmv297d-bash-4.4-p19/bin/sh"
checking for references to /tmp/nix-build-smokeping-2.6.11.drv-0 in /nix/store/wn0c3qsvz5bdzmgvq4dbm3hr8gxz6brp-smokeping-2.6.11...
error: build of ‘/nix/store/24nm0gdkj6jh2ndchr8axly0qwh7nid9-perl-openxpki-git20150807.drv’ failed
Failure on aarch64-linux (full log)
Attempted: smbldaptools, lbdb, openxpki, smokeping, john
Partial log (click to expand)
truecrypt_fmt_plug.c:314:95: error: 'num_iterations' undeclared (first use in this function)
pbkdf2_sha512((const unsigned char*)key_buffer[i], strlen(key_buffer[i]), psalt->salt, 64, num_iterations, key, sizeof(key), 0);
^~~~~~~~~~~~~~
make[1]: *** [Makefile:520: truecrypt_fmt_plug.o] Error 1
make[1]: Leaving directory '/build/john-1.8.0-jumbo-1/src'
make: *** [Makefile:185: default] Error 2
builder for '/nix/store/vgaqrzgd1d611k1as1qzcf8ypis150rr-john-1.8.0-jumbo-1.drv' failed with exit code 2
building of '/nix/store/ra2m1q0sfcl8d14q20584d9jfi4hf1lw-perl-Sys-SigAction-0.21.drv' timed out after 3600 seconds
cannot build derivation '/nix/store/2j1i6gzg3va4sj6sflrs06b2qccdvwqx-perl-openxpki-git20150807.drv': 2 dependencies couldn't be built
[31;1merror:[0m build of '/nix/store/2j1i6gzg3va4sj6sflrs06b2qccdvwqx-perl-openxpki-git20150807.drv', '/nix/store/vgaqrzgd1d611k1as1qzcf8ypis150rr-john-1.8.0-jumbo-1.drv' failed
| gharchive/pull-request | 2018-03-22T00:46:27 | 2025-04-01T04:32:53.120090 | {
"authors": [
"GrahamcOfBorg",
"Mic92",
"limeytexan"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/37603",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
316006499 | bonzomatic: init at 2018-03-29
Motivation for this change
Adds Bonzomatic, a live-coding tool for writing 2D fragment/pixel shaders.
Things done
[x] Tested using sandboxing (nix.useSandbox on NixOS, or option build-use-sandbox in nix.conf on non-NixOS)
Built on platform(s)
[x] NixOS
[ ] macOS
[ ] other Linux distributions
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nox --run "nox-review wip"
[x] Tested execution of all binary files (usually in ./result/bin/)
[x] Fits CONTRIBUTING.md.
I added the unfreeRedistributable license, as the upstream repo contains libbass.so which is only free for non-commercial use.
@GrahamcOfBorg build bonzomatic
No attempt on x86_64-linux (full log)
The following builds were skipped because they don't evaluate on x86_64-linux: bonzomatic
Partial log (click to expand)
a) For `nixos-rebuild` you can set
{ nixpkgs.config.allowUnfree = true; }
in configuration.nix to override this.
b) For `nix-env`, `nix-build`, `nix-shell` or any other Nix command you can add
{ allowUnfree = true; }
to ~/.config/nixpkgs/config.nix.
No attempt on aarch64-linux (full log)
The following builds were skipped because they don't evaluate on aarch64-linux: bonzomatic
Partial log (click to expand)
a) For `nixos-rebuild` you can set
{ nixpkgs.config.allowUnfree = true; }
in configuration.nix to override this.
b) For `nix-env`, `nix-build`, `nix-shell` or any other Nix command you can add
{ allowUnfree = true; }
to ~/.config/nixpkgs/config.nix.
It would be nice to provide a default configuration file since it is not trivial to create it. This would be useful for reviewers to test future updates. This could be addressed in another PR.
Thanks.
| gharchive/pull-request | 2018-04-19T19:18:50 | 2025-04-01T04:32:53.127733 | {
"authors": [
"GrahamcOfBorg",
"Infinisil",
"nlewo",
"nocent"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/39171",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
316040090 | gede: switch to qt5
Motivation for this change
Get rid of qt4.
/cc @dtzWill @jtojnar
Things done
[x] Tested using sandboxing (nix.useSandbox on NixOS, or option build-use-sandbox in nix.conf on non-NixOS)
Built on platform(s)
[x] NixOS
[ ] macOS
[ ] other Linux distributions
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nox --run "nox-review wip"
[x] Tested execution of all binary files (usually in ./result/bin/)
[ ] Fits CONTRIBUTING.md.
LGTM, thanks again! :)
Success on x86_64-linux (full log)
Attempted: gede
Partial log (click to expand)
glibPreFixupPhase
post-installation fixup
shrinking RPATHs of ELF executables and libraries in /nix/store/v9mlx90x9qaqh584yrvynr35bn954dc1-gede-2.6.1
shrinking /nix/store/v9mlx90x9qaqh584yrvynr35bn954dc1-gede-2.6.1/bin/.gede-wrapped
strip is /nix/store/j75dgadrff2d1fyc4fczmcgqkid2imdx-binutils-2.30/bin/strip
stripping (with command strip and flags -S) in /nix/store/v9mlx90x9qaqh584yrvynr35bn954dc1-gede-2.6.1/bin
patching script interpreter paths in /nix/store/v9mlx90x9qaqh584yrvynr35bn954dc1-gede-2.6.1
checking for references to /build in /nix/store/v9mlx90x9qaqh584yrvynr35bn954dc1-gede-2.6.1...
postPatchMkspecs
/nix/store/v9mlx90x9qaqh584yrvynr35bn954dc1-gede-2.6.1
@dtzWill thanks!
| gharchive/pull-request | 2018-04-19T21:04:05 | 2025-04-01T04:32:53.133400 | {
"authors": [
"GrahamcOfBorg",
"dtzWill",
"xeji"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/39174",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
320616593 | nixos/modules/services/scheduling/fcron: add setuid to fcrontab
Motivation for this change
Without fcrontab being setuid, every attempt by an user in the fcron
group to edit their own crontab (via fcrontab -e) results in the
following error:
2018-05-06 11:29:07 ERROR could not change euid to 273: Operation not permitted
2018-05-06 11:29:07 ERROR fcron child aborted: this does not affect the main fcron daemon, but this may prevent a job from being run or an email from being sent.
Adding setuid by hand has resolved this issue and aligns with the way
fcrontab is installed on other distributions.
Things done
[ ] Tested using sandboxing (nix.useSandbox on NixOS, or option build-use-sandbox in nix.conf on non-NixOS)
Built on platform(s)
[ ] NixOS
[ ] macOS
[ ] other Linux distributions
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nox --run "nox-review wip"
[ ] Tested execution of all binary files (usually in ./result/bin/)
[ ] Fits CONTRIBUTING.md.
Is there anything special I need to do to get this merged into the current stable channel as well? Otherwise, let me know if there are any changes I need to make. Thanks!
| gharchive/pull-request | 2018-05-06T18:34:28 | 2025-04-01T04:32:53.138712 | {
"authors": [
"alunduil"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/40037",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
356979319 | Chordbook: init at 0.1
Motivation for this change
I wanted to learn how to add a stack-application to nixpkgs and i would be happy if people could use my code as a template or if they are interested in the application itself.
The Chordbook-Application is a hobby-project of mine.
It is a web-application which allows to memorize Guitar-Chords and i also want to extend it with features as i progress with my guitar training.
Things done
[ ] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS)
Built on platform(s)
[x] NixOS
[ ] macOS
[ ] other Linux distributions
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nox --run "nox-review wip"
[x] Tested execution of all binary files (usually in ./result/bin/)
[ ] Determined the impact on package closure size (by running nix path-info -S before and after)
[x] Fits CONTRIBUTING.md.
Could you add the package to hackage? That would make things easier for us - all of hackage is built in Nixpkgs so it would just show up as haskellPackages.chordbook.
Are there any updates on this pull request, please?
| gharchive/pull-request | 2018-09-04T21:16:19 | 2025-04-01T04:32:53.143975 | {
"authors": [
"matthewbauer",
"mmahut",
"rschardt"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/46066",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
360035484 | brlaser: cleanup and mark linux only
The test binaries depend use open_memstream which isn't available on
darwin.
error: use of undeclared identifier 'open_memstream'
/cc ZHF #45961
Motivation for this change
Things done
[ ] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS)
Built on platform(s)
[ ] NixOS
[ ] macOS
[ ] other Linux distributions
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nox --run "nox-review wip"
[ ] Tested execution of all binary files (usually in ./result/bin/)
[ ] Determined the impact on package closure size (by running nix path-info -S before and after)
[x] Fits CONTRIBUTING.md.
No attempt on x86_64-darwin (full log)
The following builds were skipped because they don't evaluate on x86_64-darwin: brlaser
Partial log (click to expand)
a) For `nixos-rebuild` you can set
{ nixpkgs.config.allowUnsupportedSystem = true; }
in configuration.nix to override this.
b) For `nix-env`, `nix-build`, `nix-shell` or any other Nix command you can add
{ allowUnsupportedSystem = true; }
to ~/.config/nixpkgs/config.nix.
Success on x86_64-linux (full log)
Attempted: brlaser
Partial log (click to expand)
-- Install configuration: "Release"
-- Installing: /nix/store/9fxwfdd81n0x2xn8i05yyl75sf1bc45g-brlaser-4/$out/lib/cups/filter/rastertobrlaser
-- Installing: /nix/store/9fxwfdd81n0x2xn8i05yyl75sf1bc45g-brlaser-4/$out/share/cups/drv/brlaser.drv
post-installation fixup
shrinking RPATHs of ELF executables and libraries in /nix/store/9fxwfdd81n0x2xn8i05yyl75sf1bc45g-brlaser-4
shrinking /nix/store/9fxwfdd81n0x2xn8i05yyl75sf1bc45g-brlaser-4/$out/lib/cups/filter/rastertobrlaser
strip is /nix/store/h0lbngpv6ln56hjj59i6l77vxq25flbz-binutils-2.30/bin/strip
patching script interpreter paths in /nix/store/9fxwfdd81n0x2xn8i05yyl75sf1bc45g-brlaser-4
checking for references to /build in /nix/store/9fxwfdd81n0x2xn8i05yyl75sf1bc45g-brlaser-4...
/nix/store/9fxwfdd81n0x2xn8i05yyl75sf1bc45g-brlaser-4
Success on aarch64-linux (full log)
Attempted: brlaser
Partial log (click to expand)
-- Install configuration: "Release"
-- Installing: /nix/store/1x3ml46xh77k54zkfqc5dh94srhf429a-brlaser-4/$out/lib/cups/filter/rastertobrlaser
-- Installing: /nix/store/1x3ml46xh77k54zkfqc5dh94srhf429a-brlaser-4/$out/share/cups/drv/brlaser.drv
post-installation fixup
shrinking RPATHs of ELF executables and libraries in /nix/store/1x3ml46xh77k54zkfqc5dh94srhf429a-brlaser-4
shrinking /nix/store/1x3ml46xh77k54zkfqc5dh94srhf429a-brlaser-4/$out/lib/cups/filter/rastertobrlaser
strip is /nix/store/y4ymnvgxygpq05h03kyzbj572zmh6zla-binutils-2.30/bin/strip
patching script interpreter paths in /nix/store/1x3ml46xh77k54zkfqc5dh94srhf429a-brlaser-4
checking for references to /build in /nix/store/1x3ml46xh77k54zkfqc5dh94srhf429a-brlaser-4...
/nix/store/1x3ml46xh77k54zkfqc5dh94srhf429a-brlaser-4
backported: 381c09b2250
| gharchive/pull-request | 2018-09-13T19:33:03 | 2025-04-01T04:32:53.152596 | {
"authors": [
"GrahamcOfBorg",
"LnL7",
"xeji"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/46622",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
367637869 | gcalcli: use python3 i/o python2 so we can drop our overrides
Motivation for this change
use python3 i/o python2 so we can drop our overrides
Things done
[x] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS)
Built on platform(s)
[x] NixOS
[ ] macOS
[ ] other Linux distributions
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nox --run "nox-review wip"
[x] Tested execution of all binary files (usually in ./result/bin/)
[ ] Determined the impact on package closure size (by running nix path-info -S before and after)
[x] Fits CONTRIBUTING.md.
Success on aarch64-linux (full log)
Attempted: gcalcli
Partial log (click to expand)
Successfully installed gcalcli-4.0.0a4
/build/source
post-installation fixup
shrinking RPATHs of ELF executables and libraries in /nix/store/3d99kk60hdhhnc1jwdfqnmzjpp6y44is-gcalcli-4.0.0a4
strip is /nix/store/428gs2z4b8f9byvghzlpbjwjb3a7jwxx-binutils-2.30/bin/strip
stripping (with command strip and flags -S) in /nix/store/3d99kk60hdhhnc1jwdfqnmzjpp6y44is-gcalcli-4.0.0a4/lib /nix/store/3d99kk60hdhhnc1jwdfqnmzjpp6y44is-gcalcli-4.0.0a4/bin
patching script interpreter paths in /nix/store/3d99kk60hdhhnc1jwdfqnmzjpp6y44is-gcalcli-4.0.0a4
checking for references to /build in /nix/store/3d99kk60hdhhnc1jwdfqnmzjpp6y44is-gcalcli-4.0.0a4...
wrapping `/nix/store/3d99kk60hdhhnc1jwdfqnmzjpp6y44is-gcalcli-4.0.0a4/bin/gcalcli'...
/nix/store/3d99kk60hdhhnc1jwdfqnmzjpp6y44is-gcalcli-4.0.0a4
Success on x86_64-linux (full log)
Attempted: gcalcli
Partial log (click to expand)
Successfully installed gcalcli-4.0.0a4
/build/source
post-installation fixup
shrinking RPATHs of ELF executables and libraries in /nix/store/ffscscxrziiifspspcmbn08ikl0ylb2f-gcalcli-4.0.0a4
strip is /nix/store/dxf1m7dhc4qb655bdljc1fsd74v1nag3-binutils-2.30/bin/strip
stripping (with command strip and flags -S) in /nix/store/ffscscxrziiifspspcmbn08ikl0ylb2f-gcalcli-4.0.0a4/lib /nix/store/ffscscxrziiifspspcmbn08ikl0ylb2f-gcalcli-4.0.0a4/bin
patching script interpreter paths in /nix/store/ffscscxrziiifspspcmbn08ikl0ylb2f-gcalcli-4.0.0a4
checking for references to /build in /nix/store/ffscscxrziiifspspcmbn08ikl0ylb2f-gcalcli-4.0.0a4...
wrapping `/nix/store/ffscscxrziiifspspcmbn08ikl0ylb2f-gcalcli-4.0.0a4/bin/gcalcli'...
/nix/store/ffscscxrziiifspspcmbn08ikl0ylb2f-gcalcli-4.0.0a4
Cc @nocoolnametom
| gharchive/pull-request | 2018-10-08T04:46:43 | 2025-04-01T04:32:53.159694 | {
"authors": [
"GrahamcOfBorg",
"peterhoeg"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/48032",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
429682016 | radare2: 3.3.0 -> 3.4.1
Motivation for this change
Things done
[x] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS)
Built on platform(s)
[x] NixOS
[ ] macOS
[ ] other Linux distributions
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nix-review --run "nix-review wip"
[x] Tested execution of all binary files (usually in ./result/bin/)
[ ] Determined the impact on package closure size (by running nix path-info -S before and after)
[ ] Assured whether relevant documentation is up to date
[x] Fits CONTRIBUTING.md.
@GrahamcOfBorg build radare2 radare2-cutter
radare2-cutter seems to want to use curl during the build (so it fails)
I'm having the same result (but for radare2, not cutter) - wanting to download capstone-4.0.1.tar.gz, which it already has. Possibly the removal of the "curl nop" in postPatch was a bit over-optimistic
@GrahamcOfBorg build radare2
@GrahamcOfBorg build radare2-cutter
| gharchive/pull-request | 2019-04-05T10:14:23 | 2025-04-01T04:32:53.165890 | {
"authors": [
"7c6f434c",
"Mic92",
"risicle"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/59004",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
464624639 | haskellPackages.servant-client-core: apply patch only to 0.15
Motivation for this change
A patch was added unconditionally that only applies to 0.15, breaking
builds of 0.14.
Things done
Apply patch only if version is 0.15.*
[x] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS)
Built on platform(s)
[x] NixOS
[ ] macOS
[ ] other Linux distributions
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nix-review --run "nix-review wip"
[ ] Tested execution of all binary files (usually in ./result/bin/)
[ ] Determined the impact on package closure size (by running nix path-info -S before and after)
[ ] Ensured that relevant documentation is up to date
[x] Fits CONTRIBUTING.md.
cc @domenkozar as patch author
| gharchive/pull-request | 2019-07-05T12:45:13 | 2025-04-01T04:32:53.171675 | {
"authors": [
"mkaito"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/64343",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
532363950 | libreoffice: fix build with poppler-0.82
Motivation for this change
Fixes: #74948
Things done
[ ] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux)
Built on platform(s)
[ ] NixOS
[ ] macOS
[ ] other Linux distributions
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nix-review --run "nix-review wip"
[ ] Tested execution of all binary files (usually in ./result/bin/)
[ ] Determined the impact on package closure size (by running nix path-info -S before and after)
[ ] Ensured that relevant documentation is up to date
[ ] Fits CONTRIBUTING.md.
Notify maintainers
cc @
Let's see how far it gets...
@GrahamcOfBorg build libreoffice
@GrahamcOfBorg build libreoffice-fresh
Looking at the source code, it will not be sufficient:
https://github.com/LibreOffice/core/blob/60e8941fd581bb06cbf6be62edb8c387e7c07812/sdext/source/pdfimport/xpdfwrapper/wrapper_gpl.cxx#L71
GlobalParams need to be std::unique_ptr, see this Inkscape patch:
https://gitlab.com/inkscape/inkscape/merge_requests/1088/diffs
I will create patch tomorrow if nobody beats me to it.
It built surprisingly fast so here are the const qualifiers needed:
/build/libreoffice-6.3.0.4/sdext/source/pdfimport/xpdfwrapper/wrapper_gpl.cxx: In function 'int main(int, char**)':
/build/libreoffice-6.3.0.4/sdext/source/pdfimport/xpdfwrapper/wrapper_gpl.cxx:71:37: error: no match for 'operator=' (operand types are 'std::unique_ptr<GlobalParams>' and 'GlobalParams*')
globalParams = new GlobalParams();
^
In file included from /nix/store/vgn1sxcj5ma9m5bhjps1q9jx3q2ab27c-gcc-8.3.0/include/c++/8.3.0/memory:80,
from /nix/store/p30m4hiihrh0dxly42ivg7w4h5dlmnxc-poppler-glib-0.83.0-dev/include/poppler/Link.h:34,
from /build/libreoffice-6.3.0.4/sdext/source/pdfimport/xpdfwrapper/pdfioutdev_gpl.hxx:39,
from /build/libreoffice-6.3.0.4/sdext/source/pdfimport/xpdfwrapper/wrapper_gpl.cxx:20:
/nix/store/vgn1sxcj5ma9m5bhjps1q9jx3q2ab27c-gcc-8.3.0/include/c++/8.3.0/bits/unique_ptr.h:287:7: note: candidate: 'std::unique_ptr<_Tp, _Dp>& std::unique_ptr<_Tp, _Dp>::operator=(std::unique_ptr<_Tp, _Dp>&&) [with _Tp = GlobalParams; _Dp = std::default_delete<GlobalParams>]'
operator=(unique_ptr&& __u) noexcept
^~~~~~~~
/nix/store/vgn1sxcj5ma9m5bhjps1q9jx3q2ab27c-gcc-8.3.0/include/c++/8.3.0/bits/unique_ptr.h:287:7: note: no known conversion for argument 1 from 'GlobalParams*' to 'std::unique_ptr<GlobalParams>&&'
/nix/store/vgn1sxcj5ma9m5bhjps1q9jx3q2ab27c-gcc-8.3.0/include/c++/8.3.0/bits/unique_ptr.h:307:2: note: candidate: 'template<class _Up, class _Ep> typename std::enable_if<std::__and_<std::__and_<std::is_convertible<typename std::unique_ptr<_Up, _Ep>::pointer, typename std::__uniq_ptr_impl<_Tp, _Dp>::pointer>, std::__not_<std::is_array<_Up> >, std::__or_<std::__and_<std::is_reference<_Dp>, std::is_same<_T2, _U2> >, std::__and_<std::__not_<std::is_reference<_Dp> >, std::is_convertible<_Ep, _Dp> > > >, std::is_assignable<_T2&, _U2&&> >::value, std::unique_ptr<_Tp, _Dp>&>::type std::unique_ptr<_Tp, _Dp>::operator=(std::unique_ptr<_Up, _Ep>&&) [with _Up = _Up; _Ep = _Ep; _Tp = GlobalParams; _Dp = std::default_delete<GlobalParams>]'
operator=(unique_ptr<_Up, _Ep>&& __u) noexcept
^~~~~~~~
/nix/store/vgn1sxcj5ma9m5bhjps1q9jx3q2ab27c-gcc-8.3.0/include/c++/8.3.0/bits/unique_ptr.h:307:2: note: template argument deduction/substitution failed:
/build/libreoffice-6.3.0.4/sdext/source/pdfimport/xpdfwrapper/wrapper_gpl.cxx:71:37: note: mismatched types 'std::unique_ptr<_Tp, _Dp>' and 'GlobalParams*'
globalParams = new GlobalParams();
^
In file included from /nix/store/vgn1sxcj5ma9m5bhjps1q9jx3q2ab27c-gcc-8.3.0/include/c++/8.3.0/memory:80,
from /nix/store/p30m4hiihrh0dxly42ivg7w4h5dlmnxc-poppler-glib-0.83.0-dev/include/poppler/Link.h:34,
from /build/libreoffice-6.3.0.4/sdext/source/pdfimport/xpdfwrapper/pdfioutdev_gpl.hxx:39,
from /build/libreoffice-6.3.0.4/sdext/source/pdfimport/xpdfwrapper/wrapper_gpl.cxx:20:
/nix/store/vgn1sxcj5ma9m5bhjps1q9jx3q2ab27c-gcc-8.3.0/include/c++/8.3.0/bits/unique_ptr.h:316:7: note: candidate: 'std::unique_ptr<_Tp, _Dp>& std::unique_ptr<_Tp, _Dp>::operator=(std::nullptr_t) [with _Tp = GlobalParams; _Dp = std::default_delete<GlobalParams>; std::nullptr_t = std::nullptr_t]'
operator=(nullptr_t) noexcept
^~~~~~~~
/nix/store/vgn1sxcj5ma9m5bhjps1q9jx3q2ab27c-gcc-8.3.0/include/c++/8.3.0/bits/unique_ptr.h:316:7: note: no known conversion for argument 1 from 'GlobalParams*' to 'std::nullptr_t'
/build/libreoffice-6.3.0.4/sdext/source/pdfimport/xpdfwrapper/pdfioutdev_gpl.cxx: In member function 'virtual void pdfi::PDFOutDev::stroke(GfxState*)':
/build/libreoffice-6.3.0.4/sdext/source/pdfimport/xpdfwrapper/pdfioutdev_gpl.cxx:799:30: error: invalid conversion from 'const GfxPath*' to 'GfxPath*' [-fpermissive]
printPath( state->getPath() );
~~~~~~~~~~~~~~^~
/build/libreoffice-6.3.0.4/sdext/source/pdfimport/xpdfwrapper/pdfioutdev_gpl.cxx:494:37: note: initializing argument 1 of 'static void pdfi::PDFOutDev::printPath(GfxPath*)'
void PDFOutDev::printPath( GfxPath* pPath )
~~~~~~~~~^~~~~
/build/libreoffice-6.3.0.4/sdext/source/pdfimport/xpdfwrapper/pdfioutdev_gpl.cxx: In member function 'virtual void pdfi::PDFOutDev::fill(GfxState*)':
/build/libreoffice-6.3.0.4/sdext/source/pdfimport/xpdfwrapper/pdfioutdev_gpl.cxx:810:30: error: invalid conversion from 'const GfxPath*' to 'GfxPath*' [-fpermissive]
printPath( state->getPath() );
~~~~~~~~~~~~~~^~
/build/libreoffice-6.3.0.4/sdext/source/pdfimport/xpdfwrapper/pdfioutdev_gpl.cxx:494:37: note: initializing argument 1 of 'static void pdfi::PDFOutDev::printPath(GfxPath*)'
void PDFOutDev::printPath( GfxPath* pPath )
~~~~~~~~~^~~~~
/build/libreoffice-6.3.0.4/sdext/source/pdfimport/xpdfwrapper/pdfioutdev_gpl.cxx: In member function 'virtual void pdfi::PDFOutDev::eoFill(GfxState*)':
/build/libreoffice-6.3.0.4/sdext/source/pdfimport/xpdfwrapper/pdfioutdev_gpl.cxx:821:30: error: invalid conversion from 'const GfxPath*' to 'GfxPath*' [-fpermissive]
printPath( state->getPath() );
~~~~~~~~~~~~~~^~
/build/libreoffice-6.3.0.4/sdext/source/pdfimport/xpdfwrapper/pdfioutdev_gpl.cxx:494:37: note: initializing argument 1 of 'static void pdfi::PDFOutDev::printPath(GfxPath*)'
void PDFOutDev::printPath( GfxPath* pPath )
~~~~~~~~~^~~~~
/build/libreoffice-6.3.0.4/sdext/source/pdfimport/xpdfwrapper/pdfioutdev_gpl.cxx: In member function 'virtual void pdfi::PDFOutDev::clip(GfxState*)':
/build/libreoffice-6.3.0.4/sdext/source/pdfimport/xpdfwrapper/pdfioutdev_gpl.cxx:832:30: error: invalid conversion from 'const GfxPath*' to 'GfxPath*' [-fpermissive]
printPath( state->getPath() );
~~~~~~~~~~~~~~^~
/build/libreoffice-6.3.0.4/sdext/source/pdfimport/xpdfwrapper/pdfioutdev_gpl.cxx:494:37: note: initializing argument 1 of 'static void pdfi::PDFOutDev::printPath(GfxPath*)'
void PDFOutDev::printPath( GfxPath* pPath )
~~~~~~~~~^~~~~
/build/libreoffice-6.3.0.4/sdext/source/pdfimport/xpdfwrapper/pdfioutdev_gpl.cxx: In member function 'virtual void pdfi::PDFOutDev::eoClip(GfxState*)':
/build/libreoffice-6.3.0.4/sdext/source/pdfimport/xpdfwrapper/pdfioutdev_gpl.cxx:843:30: error: invalid conversion from 'const GfxPath*' to 'GfxPath*' [-fpermissive]
printPath( state->getPath() );
~~~~~~~~~~~~~~^~
/build/libreoffice-6.3.0.4/sdext/source/pdfimport/xpdfwrapper/pdfioutdev_gpl.cxx:494:37: note: initializing argument 1 of 'static void pdfi::PDFOutDev::printPath(GfxPath*)'
void PDFOutDev::printPath( GfxPath* pPath )
~~~~~~~~~^~~~~
make[1]: *** [/build/libreoffice-6.3.0.4/solenv/gbuild/LinkTarget.mk:293: /build/libreoffice-6.3.0.4/workdir/CxxObject/sdext/source/pdfimport/xpdfwrapper/wrapper_gpl.o] Error 1
make[1]: *** Waiting for unfinished jobs....
make[1]: *** [/build/libreoffice-6.3.0.4/solenv/gbuild/LinkTarget.mk:293: /build/libreoffice-6.3.0.4/workdir/CxxObject/sdext/source/pdfimport/xpdfwrapper/pdfioutdev_gpl.o] Error 1
Added patch that fixes the consts
Great. Could you also submit it upstream and add a link to gerrit in a comment?
https://gerrit.libreoffice.org/#/c/84384/
@jtojnar you built and ran it, right?
| gharchive/pull-request | 2019-12-04T00:41:07 | 2025-04-01T04:32:53.181894 | {
"authors": [
"7c6f434c",
"jtojnar",
"mmilata",
"veprbl"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/74955",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
573293602 | nixos/acme: apply chmod and ownership unconditionally
Also separate directory and file permissions so the certificate files
don't end up with the executable bit.
Fixes #81335
Motivation for this change
I believe this could address the issues I mentioned in #81335. This is completely untested, I will get to that later tonight.
Things done
[x] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux)
Built on platform(s)
[ ] NixOS
[ ] macOS
[ ] other Linux distributions
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip"
[ ] Tested execution of all binary files (usually in ./result/bin/)
[ ] Determined the impact on package closure size (by running nix path-info -S before and after)
[ ] Ensured that relevant documentation is up to date
[x] Fits CONTRIBUTING.md.
@aanderse @emilazy @flokli @Infinisil @arianvp @m1cr0man
Yup, tested it just now locally and stumbled on it myself. Otherwise looks to be working.
@GrahamcOfBorg test acme
| gharchive/pull-request | 2020-02-29T13:20:09 | 2025-04-01T04:32:53.187845 | {
"authors": [
"mweinelt",
"yegortimoshenko"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/81369",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
598384911 | nixos/httpd: modernize module standards
Motivation for this change
security
performance
promote modern standards
Under what scenario might the new defaults in this PR not be right for you?
if you use services.httpd.enablePHP - you should read upstream httpd documentation and carefully decide if you want to have services.httpd.mpm set to event and services.httpd.virtualHosts.<name?>.httpd2 set to true
if you use services.httpd.enablePerl - again, carefully read upstream httpd documentation and carefully decide if you want to have services.httpd.mpm set to event and services.httpd.virtualHosts.<name?>.httpd2 set to true
if you use services.httpd.virtualHosts.<name?>.enableUserDir and your permissions aren't loose enough you might want the httpd master process to run as root
if you use either services.httpd.enablePHP or services.httpd.enablePerl you should take special care with your ssl certificates as the same user executing your perl and php scripts will have at least read access to your ssl certificates
To put the above points into context... it is 2020 and you probably shouldn't be using enablePHP, enablePerl, enableUserDir, or setting services.httpd.mpm to prefork unless you are supporting legacy code which can't or won't be updated.
Things done
[ ] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux)
Built on platform(s)
[ ] NixOS
[ ] macOS
[ ] other Linux distributions
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip"
[ ] Tested execution of all binary files (usually in ./result/bin/)
[ ] Determined the impact on package closure size (by running nix path-info -S before and after)
[ ] Ensured that relevant documentation is up to date
[ ] Fits CONTRIBUTING.md.
cc @FPtje @immae @redvers
It might be useful for users to document, what people should use instead of enablePhp and enablePerl, maybe as part of module documentation (meta.docs).
@aanderse planned add sandboxing?
Worked with this exapmple:
# Security
NoNewPrivileges = true;
# Sandboxing
ProtectSystem = "full";
ProtectHome = true;
PrivateTmp = true;
PrivateDevices = true;
ProtectHostname = true;
ProtectKernelTunables = true;
ProtectKernelModules = true;
ProtectControlGroups = true;
LockPersonality = true;
MemoryDenyWriteExecute = true;
RestrictRealtime = true;
PrivateMounts = true;
Found startup error:
апр 13 11:01:02 ___ systemd[1]: httpd.service: Main process exited, code=dumped, status=11/SEGV
апр 13 11:01:02 ___ systemd[1]: httpd.service: Failed with result 'core-dump'.
апр 13 11:01:02 ___ systemd[1]: httpd.service: Consumed 217ms CPU time, received 1.1K IP traffic, sent 8.7K IP traffic.
апр 13 11:01:02 ___ systemd-coredump[1043]: Process 676 (httpd) of user 54 dumped core.
апр 13 11:01:07 ___ systemd[1]: httpd.service: Scheduled restart job, restart counter is at 1.
апр 13 11:01:07 ___ systemd[1]: Stopped Apache HTTPD.
апр 13 11:01:07 ___ systemd[1]: httpd.service: Consumed 217ms CPU time, received 1.2K IP traffic, sent 8.7K IP traffic.
апр 13 11:01:07 ___ systemd[1]: Starting Apache HTTPD...
апр 13 11:01:07 ___ systemd[1]: httpd.service: Can't open PID file /run/httpd/httpd.pid (yet?) after start: No such file or directory
апр 13 11:01:07 ___ systemd[1]: Started Apache HTTPD.
[ 10.214917] httpd[676]: segfault at 18 ip 00007fb17c516920 sp 00007ffc0b083ac8 error 4 in libpthread-2.30.so[7fb17c510000+f000]
ProtectHome = true;
Breaks enableUserDir.
At least a few of those systemd options will break many web applications I have to host so personally I won't be opening a PR to do that yet.
@Izorkin can you provide details from your configuration file please?
At least a few of those systemd options will break many web applications I have to host so personally I won't be opening a PR to do that yet.
Change to ProtectHome = false; or
+ sandboxWriteDir = mkOption {
+ type = types.listOf types.str;
+ default = [ "/var/www" "/var/data" ];
+ example = [ "/home/user/apache-www" ];
+ description = "
+ Allow writing files In directories to in sandboxing mode.
+ ";
+ };
...
serviceConfig = {
...
+ # Access write directoryes
+ ReadWritePaths = [ "sandboxWriteDir" ];
@Izorkin can you provide details from your configuration file please?
services.httpd = {
enable = true;
package = pkgs.apacheHttpd;
adminAddr = "name@doname.com";
enablePHP = true;
mpm = "prefork";
extraModules = [
{ name = "deflate"; path = "${pkgs.apacheHttpd}/modules/mod_deflate.so"; }
{ name = "status"; path = "${pkgs.apacheHttpd}/modules/mod_status.so"; }
{ name = "proxy_fcgi"; path = "${pkgs.apacheHttpd}/modules/mod_proxy_fcgi.so"; }
{ name = "remoteip"; path = "${pkgs.apacheHttpd}/modules/mod_remoteip.so"; }
];
logFormat = "combined";
extraConfig = ''
AddDefaultCharset utf-8
RemoteIPHeader X-Forwarded-For
<IfModule mod_include.c>
Options +Includes
AddType text/html .shtml
AddOutputFilter INCLUDES .shtm .shtml
</IfModule>
<Location /server-status>
SetHandler server-status
Order Deny,Allow
Deny from all
Allow from 127.0.0.1
</Location>
'';
virtualHosts = {
"_default_" = {
enableSSL = false;
documentRoot = "${pkgs.apacheHttpd}/htdocs";
extraConfig = ''
DirectoryIndex index.html
<Directory "${pkgs.apacheHttpd}/htdocs">
Order Deny,Allow
Deny from all
Allow from 127.0.0.1
</Directory>
'';
};
"_my_site" = {
serverAliases = [ "www._my_site" ];
forceSSL = true;
enableACME = true;
documentRoot = "/var/data/www";
logFormat = "combined";
extraConfig = ''
DirectoryIndex index.php
<Directory "/var/data/www">
AllowOverride All
<IfModule mod_deflate.c>
SetOutputFilter DEFLATE
</IfModule>
<IfModule mod_include.c>
Options +Includes
</IfModule>
</Directory>
'';
};
};
};
@Izorkin thank you for the config. I put together a configuration that uses a self signed certificate instead of enableACME and I'm unable to reproduce the error you have. Is there any more details you can provide, or maybe a nixos container to reproduce this?
Thanks for the work @aanderse!
Did you test your PR on your servers? I don’t see anything wrong here, but didn’t test it yet.
What comes from the top of my head:
privileged ports, but it is handled by the capability (I didn’t know it was possible !)
All my certificates are owned by root, so apache won’t be able to read anything. This is similar to nginx so I guess it is a good thing to push for anyway.
CGI’s are not limited to perl/php and may break as sometimes they run as other users, but I don’t have any such to test. I suppose the sane recommendations is now to have independent workers running and use sockets to talk with them, which is already handled.
I agree that any "sandboxing" option from systemd could have big consequences as far as httpd is concerned, since it needs access to directories which don’t belong to him or are at many places in the system. That would force to have a big systemd configuration to list them all (not infeasible though).
I am used custom phpPackage
nixpkgs.overlays = [
(self: super: {
php = pkgs.nur.repos.izorkin.php71;
phpPackages = pkgs.nur.repos.izorkin.php71Packages;
})
];
With default phpPakage error:
[Tue Apr 14 10:53:10.042195 2020] [php7:error] [pid 731] [client 1.1.1.1:53627] PHP Fatal error: Uncaught Error: Call to undefined function mysql_connect() in /var/data/www/classes/db/MySQL.php:51\nStack trace:\n#0 /var/data/www/classes/db/Db.php(319): MySQLCore->connect()\n#1 /var/data/www/classes/db/Db.php(239): DbCore->__construct()\n#2 /var/data/www/config/alias.php(66): DbCore::getInstance()\n#3 /var/data/www/classes/shop/Shop.php(329): pSQL()\n#4 /var/data/www/config/config.inc.php(114): ShopCore::initialize()\n#5 /var/data/www/index.php(27): require('/var/data/www/c...')\n#6 {main}\n thrown in /var/data/www/classes/db/MySQL.php on line 51
[Tue Apr 14 11:22:46.065935 2020] [php7:error] [pid 2386] [client 1.1.1.1:63205] PHP Fatal error: Uncaught Error: Call to undefined function mysql_connect() in /var/data/www/classes/db/MySQL.php:51\nStack trace:\n#0 /var/data/www/classes/db/Db.php(319): MySQLCore->connect()\n#1 /var/data/www/classes/db/Db.php(239): DbCore->__construct('2.2.2.2', 'askhost_sfair', 'U29xDQv6QbsH', 'askhost_sfair')\n#2 /var/data/www/config/alias.php(66): DbCore::getInstance()\n#3 /var/data/www/classes/shop/Shop.php(329): pSQL('sfair.ru')\n#4 /var/data/www/config/config.inc.php(114): ShopCore::initialize()\n#5 /var/data/www/index.php(27): require('/var/data/www/c...')\n#6 {main}\n thrown in /var/data/www/classes/db/MySQL.php on line 51
Not working php mysqliSupport and mysqlndSupport
This code not worked:
phpPackage =
let
base = pkgs.php74;
in
base.buildEnv {
extensions = e: with e;
base.enabledExtensions ++ [
apcu redis memcached imagick
];
};
Error:
building all machine configurations...
error: attribute 'override' missing, at /home/user/works/src-nix/nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix:15:9
(use '--show-trace' to show detailed location information)
Traceback (most recent call last):
File "/nix/store/c13kpphf02i8habpc985axw3m0n0x815-nixops-1.7/bin/..nixops-wrapped-wrapped", line 991, in <module>
args.op()
File "/nix/store/c13kpphf02i8habpc985axw3m0n0x815-nixops-1.7/bin/..nixops-wrapped-wrapped", line 412, in op_deploy
max_concurrent_activate=args.max_concurrent_activate)
File "/nix/store/c13kpphf02i8habpc985axw3m0n0x815-nixops-1.7/lib/python2.7/site-packages/nixops/deployment.py", line 1063, in deploy
self.run_with_notify('deploy', lambda: self._deploy(**kwargs))
File "/nix/store/c13kpphf02i8habpc985axw3m0n0x815-nixops-1.7/lib/python2.7/site-packages/nixops/deployment.py", line 1052, in run_with_notify
f()
File "/nix/store/c13kpphf02i8habpc985axw3m0n0x815-nixops-1.7/lib/python2.7/site-packages/nixops/deployment.py", line 1063, in <lambda>
self.run_with_notify('deploy', lambda: self._deploy(**kwargs))
File "/nix/store/c13kpphf02i8habpc985axw3m0n0x815-nixops-1.7/lib/python2.7/site-packages/nixops/deployment.py", line 1003, in _deploy
self.configs_path = self.build_configs(dry_run=dry_run, repair=repair, include=include, exclude=exclude)
File "/nix/store/c13kpphf02i8habpc985axw3m0n0x815-nixops-1.7/lib/python2.7/site-packages/nixops/deployment.py", line 671, in build_configs
raise Exception("unable to build all machine configurations")
Exception: unable to build all machine configurations
Time: 0h:00m:03s
@immae great feedback. To address your points:
I haven't thoroughly tested this yet, so it remains indraft mode. Even once I have tested this thoroughly I will need other people to test this as well. Fortunately it is very easy to teston NixOS 20.03. I'll post instructions in the near future.
I'm glad you could learn something
Maybe you run some really sketchy old perl code using mod_perl as the wwwrun user and have a wildcard ssl certificate. You may or may not want to run as an unprivileged user in really exceptional and crazy situations :man_shrugging: The release notes mention this, and I made it exceptionally easy to continue to run the master process as root. Switching back and forth any number of times is supported too.
I haven't done cgi testing yet but it is on my list. Being on my list isn't enough, though. httpd is so massive and so flexible two absolute requirements on my mind are: a good number of people other than myself need to test this, and we need to support running the master process as root because this change doesn't work with every possible scenario I can conceive. It is a good and sane default, though.
I would probably consider merging a PR that added some sandboxing so long as it was well documented how to undo it for users. A bunch of code I maintain wouldn't work, so personally I have zero motivation at the the moment.
@Izorkin this will work very soon, waiting for https://github.com/NixOS/nixpkgs/pull/85026 to be merged and then will work.
I'm not familiar with adding NUR can you give me easy way to set phpPackage so I can reproduce?
Thank you so much for testing @Izorkin! Your feedback is always so valuable!
I'm not familiar with adding NUR can you give me easy way to set phpPackage so I can reproduce?
Need add:
nixpkgs.config.packageOverrides = pkgs: rec {
nur = import (builtins.fetchTarball "https://github.com/nix-community/NUR/archive/master.tar.gz") { inherit pkgs; };
];
* I haven't done `cgi` testing yet but it is on my list. Being on my list isn't enough, though. `httpd` is so massive and so flexible two absolute requirements on my mind are: a good number of people other than myself need to test this, and we need to support running the master process as `root` because this change doesn't work with every possible scenario I can conceive. It **is** a good and sane default, though.
@aanderse
Okay I missed some important information in my first message: I thought that httpd was running as root only during startup, but it turns out that the "master" thread is always root, only its child are unpriviledged. This explains many things, especially the fact that httpd is flexible enough to let a CGI script run as a different user than wwwrun.
Considering that, I would suggest to have an additional configuration parameter keepRoot and a slight addition in systemd configuration:
User = if cfg.keepRoot then "root" else cfg.user;
This way, it’s easy for someone who needs it (in the situation given above) to keep his setup in a working state after your change, and still allow people who don’t need privileged process at all to be safe in this side.
Does that seem like a good thing to you?
@immae I've now tried out a few different common cgi setups and they are running fine without a root main process. I'm not convinced a keepRoot option is a good idea as it really encourages users to develop web applications and software in a way that even upstream has declared as "legacy". I support a large amount of "legacy" software, so I want it to be easy to run the master process as root... but I don't want to feel like NixOS (or upstream) is encouraging me to do so. Having a single line of configuration required to run as root, systemd.services.httpd.serviceConfig.User = lib.mkForce "root";, seems like the perfect mix of "this isn't cumbersome" and "are you sure you want to do this?".
I called this branch httpd-2020 because it is the year 2020 and I want to promote server configuration that reflects this, not server configuration that would make you think it is 10-15 years ago :man_shrugging:
@immae I've now tried out a few different common cgi setups and they are running fine without a root main process. I'm not convinced a keepRoot option is a good idea as it really encourages users to develop web applications and software in a way that even upstream has declared as "legacy".
Ah, if upstream considers it legacy then my suggestion is not relevant actually :)
@Izorkin in your example what branch are you running off of? When you say pkgs.apacheHttpd does pkgs refer to master, release-20.03, release-19.09, or something else?
@Izorkin in your example what branch are you running off of? When you say pkgs.apacheHttpd does pkgs refer to master, release-20.03, release-19.09, or something else?
Used master branch
@Izorkin I'm unable to reproduce this. Can you specify a minimal configuration.nix and nixpkgs checkout so I can use nixos-rebuild build-vm ... to exactly reproduce your configuration and error?
Originally I was planning on leaving this unmerged for some time to allow for testing, but upon further contemplation I am thinking to merge this in the next couple days. The major change is as simple as systemd.services.httpd.serviceConfig.User = lib.mkForce "root"; to undo and being in master will force more testing than might occur otherwise. We're early enough in the 20.09 release cycle that I feel confident this will be thoroughly tested in time.
If anyone has any major objections please speak up or in a few days time I'll be merging.
@Izorkin I'm still looking to reproduce your error (which is NUR related, presumably) so please get back to me when you can.
@aanderse in latest master branch this error not reproduced.
@GrahamcOfBorg test upnp wordpress mediawiki
I noticed that Apache now starts as the wwwrun user, which means that SSL private keys now need to be readable by wwwrun. Isn't this less secure than the previous situation, where they only had to be readable by root?
That depends on a large number of factors*. If you have an important wildcard then you want to seriously consider the implications and weigh the risk. If you are using a certificate for a single domain, especially if it is provisioned by Let's Encrypt, then maybe you're much better off with the default module.
* Are you running code as the wwwrun user via mod_perl or mod_php vs running code as a separate dedicated user with cgi/cgid or php-fpm? If you are running code (vs a static site), what sort of code are you running and what are the potential exploits? Are you running httpd in a container of some sort, or on a server that runs a ton of other services, etc...
Ultimately you need to balance the number of privilege escalation vulnerabilities that httpd has had and you would expect to have in the future and ask yourself what can cause more damage: a privilege escalation vulnerability when your httpd server runs as root, or a certificate having some exposure as the wwwrun user when scripts are being run as the wwwrun user.
To provide an example for both sides consider:
if you're running httpd in a container with mod_php you should probably care less about privilege escalation vulnerabilities than sketchy scripts having full access to your ssl wildcard certificate -> you should consider running the master process as root
if you're running httpd on a machine with 15 sites all developed internally, each with their own ssl certificate provisioned by Let's Encrypt, and each site connecting to a separate php-fpm instance (with a separate user to go along with that) you have much lower risk of certificates -> you should consider running the master process as wwwrun
I was sure to make it very easy to switch between running the parent process as root or wwwrun because I know how important it can be to continue running a site as root. I maintain a reasonable number of servers running httpd and a significant number of them still run with the httpd parent process as root.
I hope this sufficiently addresses your concerns. Regardless, I'm happy to further discuss the implications and any concerns you continue to have.
| gharchive/pull-request | 2020-04-12T01:15:18 | 2025-04-01T04:32:53.224956 | {
"authors": [
"Izorkin",
"Mic92",
"aanderse",
"edolstra",
"immae"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/85043",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
606645470 | [20.03] Gnome 3.34 updates
Motivation for this change
I have:
ran update.nix
excluded updates that didn't make sense
did one's outside the version bound that did make sense (folks for example)
did backports from master where possible
I haven't built anything, not sure if I should split this into a staging-20.03 PR and a release-20.03 PR.
Things done
[ ] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux)
Built on platform(s)
[ ] NixOS
[ ] macOS
[ ] other Linux distributions
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip"
[ ] Tested execution of all binary files (usually in ./result/bin/)
[ ] Determined the impact on package closure size (by running nix path-info -S before and after)
[ ] Ensured that relevant documentation is up to date
[x] Fits CONTRIBUTING.md.
I actually think it would be best to target staging-20.03 so we can run an eval, and in the small chance something does break, we'll see it.
I've built select packages to find out what didn't work. Will build more today.
Thank you for your contributions.
This has been automatically marked as stale... I mean, what's up with this? I agree that minor number bumps generally can be pushed to stable releases, so the problem here is only that noone here has tested these particular versions yet?
@vcunat Thanks for checking in, yeah, I think I opened this PR as probably right before my vacation
so I couldn't test it myself. And I believe it was a bit too much for @jtojnar to test since he doesn't use the stable releases.
If we can get it in staging and I can try it out, it should be fine :crossed_fingers: Not sure if more minor updates have been made, though, making this stale.
Yeah, there has been 3.34.6 and 3.34.7 in the meanwhile.
we're doing https://github.com/NixOS/nixpkgs/pull/93114 now
| gharchive/pull-request | 2020-04-25T00:09:00 | 2025-04-01T04:32:53.235470 | {
"authors": [
"jtojnar",
"vcunat",
"worldofpeace"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/85974",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
613914132 | nixos/postgresql: refactor enable option
More consistency with other modules (mkEnableOption)
Motivation for this change
Consistency with other NixOS modules (mkEnableOption)
Things done
[ ] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux)
Built on platform(s)
[ ] NixOS
[ ] macOS
[ ] other Linux distributions
[ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip"
[ ] Tested execution of all binary files (usually in ./result/bin/)
[ ] Determined the impact on package closure size (by running nix path-info -S before and after)
[ ] Ensured that relevant documentation is up to date
[x] Fits CONTRIBUTING.md.
Thanks!
| gharchive/pull-request | 2020-05-07T09:36:11 | 2025-04-01T04:32:53.240879 | {
"authors": [
"Mic92",
"joachimschmidt557"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/87177",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
684704741 | nixos/sssd: fix the module
Motivation for this change
'system.nssModules' was not set correctly
fix #91242
Things done
I added a simple test just to make sure the service builds and starts when using services.sssd.enable. I'm interested in making that test better eventually.
[x] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux)
Built on platform(s)
[x] NixOS
[ ] macOS
[ ] other Linux distributions
[x] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
[ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip"
[ ] Tested execution of all binary files (usually in ./result/bin/)
[ ] Determined the impact on package closure size (by running nix path-info -S before and after)
[ ] Ensured that relevant documentation is up to date
[x] Fits CONTRIBUTING.md.
cc @e-user
/marvin opt-in
/status needs_reviewer
@aanderse maybe you can help with this simple PR.
/status needs_merger
This pull request has been mentioned on NixOS Discourse. There might be relevant details there:
https://discourse.nixos.org/t/prs-already-reviewed/2617/209
Thanks!!
@bbigras sorry I was late to the party on this one. Next time.
No worries 😊 thanks for the reply
| gharchive/pull-request | 2020-08-24T14:13:52 | 2025-04-01T04:32:53.248036 | {
"authors": [
"aanderse",
"bbigras",
"nixos-discourse"
],
"repo": "NixOS/nixpkgs",
"url": "https://github.com/NixOS/nixpkgs/pull/96179",
"license": "MIT",
"license_type": "permissive",
"license_source": "github-api"
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.