about summary refs log tree commit diff
path: root/pkgs/top-level
AgeCommit message (Collapse)AuthorFilesLines
2023-05-14Merge pull request #231753 from figsoda/chitMartin Weinelt1-3/+1
chit: unpin openssl
2023-05-14Merge pull request #231755 from figsoda/nzbgetMartin Weinelt1-3/+1
nzbget: make compatible with openssl 3
2023-05-13nzbget: make compatible with openssl 3figsoda1-3/+1
2023-05-13taizen: update Cargo.lock, unpin openssl, add figsoda as a maintainerfigsoda1-4/+1
2023-05-13chit: unpin opensslfigsoda1-3/+1
2023-05-13Merge pull request #231697 from trofi/libgcc-removalSergei Trofimovich2-4/+1
libgcc: remove unused package
2023-05-13Merge pull request #228388 from trofi/gcc13Sergei Trofimovich1-1/+57
gcc13, gccgo13, gfortran13, gnat13: init at 13.1.0
2023-05-13Merge master into staging-nextgithub-actions[bot]2-1/+7
2023-05-13Merge pull request #231183 from jleightcap/jl/find-libpython-0.3.0Robert Scott1-0/+2
python310Packages.find-libpython: init at 0.3.0
2023-05-13Merge pull request #231624 from bachp/zhf-thanosRobert Scott1-1/+5
thanos: pin to Go 1.19
2023-05-13Merge branch 'master' into staging-nextVladimír Čunát2-18/+9
2023-05-13libgcc: remove unused packageSergei Trofimovich2-4/+1
`libgcc` is not usable as is and as a result no packages use it today. `gcc.cc.libgcc` should provide the same library. But ideally it should not be used at all as it's an implementation detail of `gcc` support libraries.
2023-05-13Merge pull request #231550 from figsoda/git-seriesMartin Weinelt1-3/+1
git-series: update Cargo.lock and unpin openssl
2023-05-13Merge pull request #231565 from figsoda/movineMartin Weinelt1-4/+1
movine: 0.11.0 -> 0.11.4, unpin openssl
2023-05-13Merge pull request #231584 from figsoda/paperoniMartin Weinelt1-4/+1
paperoni: update Cargo.lock and unpin openssl
2023-05-13Merge pull request #231567 from figsoda/tensormanfigsoda1-3/+1
2023-05-13Merge pull request #231352 from lovesegfault/kernel-updatesMaximilian Bosch1-4/+5
linuxKernel.kernels: update
2023-05-13gcc13, gccgo13, gfortran13, gnat13: init at 13.1.0Sergei Trofimovich1-1/+57
It's a copy of `gcc12.cc` implementation. Nothing special added here. Note that gccgo13 does not build yet (similar to existing gccgo12). The failure is related to libgcc_s.so lookup problems. Not specific to gcc-13 release. Co-authored-by: Weijia Wang <9713184+wegank@users.noreply.github.com> Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2023-05-13Merge master into staging-nextgithub-actions[bot]1-0/+2
2023-05-13linuxKernels: ensure hardened kernels remain patched against CVE-2023-32233Maximilian Bosch1-0/+5
2023-05-13Merge pull request #231378 from FedericoSchonborn/budgie-pluginsBobby Rong1-0/+1
Add `budgiePlugins` set, init `budgie-user-indicator-redux` at 1.0.1
2023-05-13thanos: pin to Go 1.19Pascal Bach1-1/+5
It panics when running with Go 1.20 with the following error: ``` panic: Something in this program imports go4.org/unsafe/assume-no-moving-gc to declare that it assumes a non-moving garbage collector, but your version of go4.org/unsafe/assume-no-moving-gc hasn't been updated to assert that it's safe against the go1.20 runtime. If you want to risk it, run with environment variable ASSUME_NO_MOVING_GC_UNSAFE_RISK_IT_WITH=go1.20 set. Notably, if go1.20 adds a moving garbage collector, this program is unsafe to use. ```
2023-05-13Merge master into staging-nextgithub-actions[bot]1-7/+3
2023-05-13Merge pull request #231545 from figsoda/tremorNick Cao1-1/+0
tremor-rs: fix build, unpin openssl
2023-05-13Merge pull request #231575 from figsoda/backupNick Cao1-1/+0
git-backup: update Cargo.lock and unpin openssl
2023-05-13Merge pull request #231570 from figsoda/rustupNick Cao1-1/+0
rustup-toolchain-install-master: update Cargo.lock and unpin openssl
2023-05-13Merge pull request #231579 from figsoda/rucredstashNick Cao1-1/+0
rucredstash: update Cargo.lock to unpin openssl
2023-05-13Merge pull request #231577 from figsoda/break-timeNick Cao1-3/+1
break-time: update Cargo.lock and unpin openssl
2023-05-13spotifyd: enable mpris on LinuxMario Rodas1-0/+1
2023-05-12paperoni: update Cargo.lock and unpin opensslfigsoda1-4/+1
2023-05-12rucredstash: update Cargo.lock to unpin opensslfigsoda1-1/+0
2023-05-12break-time: update Cargo.lock and unpin opensslfigsoda1-3/+1
2023-05-12git-backup: update Cargo.lock and unpin opensslfigsoda1-1/+0
2023-05-12rustup-toolchain-install-master: update Cargo.lock and unpin opensslfigsoda1-1/+0
2023-05-13Merge pull request #231319 from hacker1024/package/flutter-3.10Maciej Krüger1-0/+2
flutter: 3.7.12 -> 3.10.0
2023-05-12tensorman: 0.1.0 -> unstable-2023-03-13figsoda1-3/+1
Diff: https://github.com/pop-os/tensorman/compare/0.1.0...b1125f71b55a8d9a4d674a62fa1e8868d40d0f0d
2023-05-12movine: 0.11.0 -> 0.11.4, unpin opensslfigsoda1-4/+1
2023-05-13Merge master into staging-nextgithub-actions[bot]3-45/+11
2023-05-13Merge pull request #231535 from colemickens/pr-cfdyndnsMartin Weinelt1-3/+1
cfdyndns: 0.0.3 -> 0.0.4; switch to openssl_3
2023-05-12git-series: update Cargo.lock and unpin opensslfigsoda1-3/+1
2023-05-12cfdyndns: 0.0.3 -> 0.0.4; switch to openssl_3Cole Mickens1-3/+1
2023-05-13Merge pull request #231530 from mweinelt/odp-dpdk-openssl3Martin Weinelt1-3/+1
odp-dpdk: Build against openssl3
2023-05-13Merge pull request #231522 from felixsinger/pkgs/mumble/use-ossl-3-apiMartin Weinelt1-14/+0
mumble: Apply patch to use OpenSSL 3.0 API
2023-05-13Merge pull request #231534 from figsoda/spotify-tuiMartin Weinelt1-1/+0
spotify-tui: unpin openssl, fix license, clean up
2023-05-12tremor-rs: unpin opensslfigsoda1-1/+0
2023-05-13Merge pull request #231517 from dywedir/synapse-btMartin Weinelt1-1/+0
synapse-bt: 1.0 -> unstable-2023-02-16, build with openssl 3.0
2023-05-13Merge pull request #231526 from figsoda/habMartin Weinelt1-3/+1
habitat: 0.90.6 -> 1.1.652, fix build, unpin openssl
2023-05-13Merge pull request #231524 from figsoda/hydra-cliMartin Weinelt1-3/+1
hydra-cli: fix build, unpin openssl
2023-05-13Merge pull request #231514 from figsoda/dephellMartin Weinelt1-4/+1
cargo-dephell: update Cargo.lock and switch to openssl 3
2023-05-12mumble: Apply patch to use OpenSSL 3.0 APIFelix Singer1-14/+0
Mumble is using a deprecated OpenSSL API and this is causing problems because OpenSSL 1.1 support should be dropped from nixpkgs. However, a patch making Mumble compatible to the OpenSSL 3.0 API is available on its master branch and included in the latest snapshot, but unfortunately that snapshot is not production ready. Apply the patch for the nixpkgs build so that we can get rid of that old OpenSSL version and drop the specific Qt package using it. Signed-off-by: Felix Singer <felixsinger@posteo.net>