2022-12-28T04:27:47 gpac 2.0.0 -> 2.2.0 https://repology.org/metapackage/gpac/versions 2022-12-28T04:27:50 attrpath: gpac 2022-12-28T04:27:50 Checking auto update branch... 2022-12-28T04:27:50 No auto update branch exists 2022-12-28T04:27:53 [version] 2022-12-28T04:27:57 [version] updated version and sha256 2022-12-28T04:27:57 [rustCrateVersion] 2022-12-28T04:27:57 [rustCrateVersion] No cargoSha256 found 2022-12-28T04:27:57 [golangModuleVersion] 2022-12-28T04:27:57 [golangModuleVersion] Not a buildGoModule package with vendorSha256 2022-12-28T04:27:57 [updateScript] 2022-12-28T04:27:57 [updateScript] skipping because derivation has no updateScript 2022-12-28T04:27:57 2022-12-28T04:27:57 [quotedUrls] 2022-12-28T04:27:58 [quotedUrls] nothing found to replace 2022-12-28T04:27:58 Diff after rewrites: diff --git a/pkgs/applications/video/gpac/default.nix b/pkgs/applications/video/gpac/default.nix index 6390558013f..1f144ede4d6 100644 --- a/pkgs/applications/video/gpac/default.nix +++ b/pkgs/applications/video/gpac/default.nix @@ -1,14 +1,14 @@ { lib, stdenv, fetchFromGitHub, pkg-config, zlib }: stdenv.mkDerivation rec { - version = "2.0.0"; + version = "2.2.0"; pname = "gpac"; src = fetchFromGitHub { owner = "gpac"; repo = "gpac"; rev = "v${version}"; - sha256 = "sha256-MIX32lSqf/lrz9240h4wMIQp/heUmwvDJz8WN08yf6c="; + sha256 = "sha256-m2qXTXLGgAyU9y6GEk4Hp/7Al57IPRSqImJatIcwswQ="; }; postPatch = '' 2022-12-28T04:29:22 Received ExitFailure 1 when running Raw command: /nix/store/6fr58pqy02hmgw1h7b9nqmv7vlp3v346-nix-2.3.15/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A gpac Received ExitFailure 1 when running Raw command: /nix/store/6fr58pqy02hmgw1h7b9nqmv7vlp3v346-nix-2.3.15/bin/nix log -f . gpac Standard output: warning: unknown setting 'experimental-features' error: Package ‘gpac-2.2.0’ in /var/cache/nixpkgs-update/worker/worktree/gpac/pkgs/applications/video/gpac/default.nix:27 is marked as insecure, refusing to evaluate. Known issues: - CVE-2022-1035 - CVE-2022-1172 - CVE-2022-1222 - CVE-2022-1795 - CVE-2022-2453 - CVE-2022-2454 - CVE-2022-2549 You can install it anyway by allowing this package, using the following methods: a) To temporarily allow all insecure packages, you can use an environment variable for a single invocation of the nix tools: $ export NIXPKGS_ALLOW_INSECURE=1 Note: For `nix shell`, `nix build`, `nix develop` or any other Nix 2.4+ (Flake) command, `--impure` must be passed in order to read this environment variable. b) for `nixos-rebuild` you can add ‘gpac-2.2.0’ to `nixpkgs.config.permittedInsecurePackages` in the configuration.nix, like so: { nixpkgs.config.permittedInsecurePackages = [ "gpac-2.2.0" ]; } c) For `nix-env`, `nix-build`, `nix-shell` or any other Nix command you can add ‘gpac-2.2.0’ to `permittedInsecurePackages` in ~/.config/nixpkgs/config.nix, like so: { permittedInsecurePackages = [ "gpac-2.2.0" ]; } (use '--show-trace' to show detailed location information) 2022-12-28T08:09:07 gpac 2.0.0 -> 2.2.0 https://github.com/gpac/gpac/releases 2022-12-28T08:09:09 attrpath: gpac 2022-12-28T08:09:09 Checking auto update branch... 2022-12-28T08:09:09 No auto update branch exists 2022-12-28T08:09:12 [version] 2022-12-28T08:09:17 [version] updated version and sha256 2022-12-28T08:09:17 [rustCrateVersion] 2022-12-28T08:09:17 [rustCrateVersion] No cargoSha256 found 2022-12-28T08:09:17 [golangModuleVersion] 2022-12-28T08:09:17 [golangModuleVersion] Not a buildGoModule package with vendorSha256 2022-12-28T08:09:17 [updateScript] 2022-12-28T08:09:17 [updateScript] skipping because derivation has no updateScript 2022-12-28T08:09:17 2022-12-28T08:09:17 [quotedUrls] 2022-12-28T08:09:17 [quotedUrls] nothing found to replace 2022-12-28T08:09:17 Diff after rewrites: diff --git a/pkgs/applications/video/gpac/default.nix b/pkgs/applications/video/gpac/default.nix index 6390558013f..1f144ede4d6 100644 --- a/pkgs/applications/video/gpac/default.nix +++ b/pkgs/applications/video/gpac/default.nix @@ -1,14 +1,14 @@ { lib, stdenv, fetchFromGitHub, pkg-config, zlib }: stdenv.mkDerivation rec { - version = "2.0.0"; + version = "2.2.0"; pname = "gpac"; src = fetchFromGitHub { owner = "gpac"; repo = "gpac"; rev = "v${version}"; - sha256 = "sha256-MIX32lSqf/lrz9240h4wMIQp/heUmwvDJz8WN08yf6c="; + sha256 = "sha256-m2qXTXLGgAyU9y6GEk4Hp/7Al57IPRSqImJatIcwswQ="; }; postPatch = '' 2022-12-28T08:10:42 Received ExitFailure 1 when running Raw command: /nix/store/6fr58pqy02hmgw1h7b9nqmv7vlp3v346-nix-2.3.15/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A gpac Received ExitFailure 1 when running Raw command: /nix/store/6fr58pqy02hmgw1h7b9nqmv7vlp3v346-nix-2.3.15/bin/nix log -f . gpac Standard output: warning: unknown setting 'experimental-features' error: Package ‘gpac-2.2.0’ in /var/cache/nixpkgs-update/worker/worktree/gpac/pkgs/applications/video/gpac/default.nix:27 is marked as insecure, refusing to evaluate. Known issues: - CVE-2022-1035 - CVE-2022-1172 - CVE-2022-1222 - CVE-2022-1795 - CVE-2022-2453 - CVE-2022-2454 - CVE-2022-2549 You can install it anyway by allowing this package, using the following methods: a) To temporarily allow all insecure packages, you can use an environment variable for a single invocation of the nix tools: $ export NIXPKGS_ALLOW_INSECURE=1 Note: For `nix shell`, `nix build`, `nix develop` or any other Nix 2.4+ (Flake) command, `--impure` must be passed in order to read this environment variable. b) for `nixos-rebuild` you can add ‘gpac-2.2.0’ to `nixpkgs.config.permittedInsecurePackages` in the configuration.nix, like so: { nixpkgs.config.permittedInsecurePackages = [ "gpac-2.2.0" ]; } c) For `nix-env`, `nix-build`, `nix-shell` or any other Nix command you can add ‘gpac-2.2.0’ to `permittedInsecurePackages` in ~/.config/nixpkgs/config.nix, like so: { permittedInsecurePackages = [ "gpac-2.2.0" ]; } (use '--show-trace' to show detailed location information)