perl is a run-time dependency, so it should be in buildInputs rather
than nativeBuildInputs.
This has been preventing patchShebangsAuto() in fixupOutputHooks from
patching the /usr/bin/perl interpreter shebang in $out/bin/rrsync since
61bc03c017.
Resolves#71198
If `UISTYLE` is not specified, Unison tries to auto-detect the UI style
based on the available environment. On macOS this apparently means using
`UISTYLE=mac`, it can't actually build this way in Nix.
This makes the command ‘nix-env -qa -f. --arg config '{skipAliases =
true;}'’ work in Nixpkgs.
Misc...
- qtikz: use libsForQt5.callPackage
This ensures we get the right poppler.
- rewrites:
docbook5_xsl -> docbook_xsl_ns
docbook_xml_xslt -> docbook_xsl
diffpdf: fixup
Semi-automatic update generated by https://github.com/ryantm/nix-update tools. These checks were done:
- built on NixOS
- ran `/nix/store/8dj6mrs62z7z7d42v0jwcwz7k46i927i-backintime-common-1.1.24/bin/backintime -h` got 0 exit code
- ran `/nix/store/8dj6mrs62z7z7d42v0jwcwz7k46i927i-backintime-common-1.1.24/bin/backintime --help` got 0 exit code
- ran `/nix/store/8dj6mrs62z7z7d42v0jwcwz7k46i927i-backintime-common-1.1.24/bin/backintime -v` and found version 1.1.24
- ran `/nix/store/8dj6mrs62z7z7d42v0jwcwz7k46i927i-backintime-common-1.1.24/bin/backintime --version` and found version 1.1.24
- found 1.1.24 with grep in /nix/store/8dj6mrs62z7z7d42v0jwcwz7k46i927i-backintime-common-1.1.24
Semi-automatic update. These checks were performed:
- built on NixOS
- ran `/nix/store/3f76mczmag2wnkww6la0hcdnf82jly92-lsyncd-2.2.2/bin/lsyncd --version` and found version 2.2.2
- found 2.2.2 with grep in /nix/store/3f76mczmag2wnkww6la0hcdnf82jly92-lsyncd-2.2.2
- found 2.2.2 in filename of file in /nix/store/3f76mczmag2wnkww6la0hcdnf82jly92-lsyncd-2.2.2
cc "@bobvanderlinden"
The CVE patches weren't previously applied because they depend on the
enableCopyDevicesPatch parameter. The naming of the patches attribute in
base.nix was misleading.
The new rsync release now really fixes:
* CVE-2017-15994
* CVE-2017-16548
* CVE-2017-17433
* CVE-2017-17434