2022-12-10T10:50:36 jfbview 0.5.7 -> 0.6.0 https://github.com/jichu4n/JFBView/releases 2022-12-10T10:50:39 attrpath: jfbview 2022-12-10T10:50:39 Checking auto update branch... 2022-12-10T10:50:39 No auto update branch exists 2022-12-10T10:50:42 [version] 2022-12-10T10:50:44 [version] updated version and sha256 2022-12-10T10:50:44 [rustCrateVersion] 2022-12-10T10:50:44 [rustCrateVersion] No cargoSha256 found 2022-12-10T10:50:44 [golangModuleVersion] 2022-12-10T10:50:44 [golangModuleVersion] Not a buildGoModule package with vendorSha256 2022-12-10T10:50:44 [updateScript] 2022-12-10T10:50:44 [updateScript] skipping because derivation has no updateScript 2022-12-10T10:50:44 2022-12-10T10:50:44 [quotedUrls] 2022-12-10T10:50:44 [quotedUrls] nothing found to replace 2022-12-10T10:50:44 Diff after rewrites: diff --git a/pkgs/os-specific/linux/jfbview/default.nix b/pkgs/os-specific/linux/jfbview/default.nix index eb61ff9d513..f38f71e738b 100644 --- a/pkgs/os-specific/linux/jfbview/default.nix +++ b/pkgs/os-specific/linux/jfbview/default.nix @@ -15,13 +15,13 @@ in stdenv.mkDerivation rec { pname = package; - version = "0.5.7"; + version = "0.6.0"; src = fetchFromGitHub { repo = "JFBView"; owner = "jichu4n"; rev = version; - sha256 = "0ppns49hnmp04zdjw6wc28v0yvz31rkzvd5ylcj7arikx20llpxf"; + sha256 = "sha256-nlsZaG5zExTNYhjl5DksbdzczkZxqTxfne14aIs/cn8="; }; postPatch = '' 2022-12-10T10:52:11 Received ExitFailure 1 when running Raw command: /nix/store/6fr58pqy02hmgw1h7b9nqmv7vlp3v346-nix-2.3.15/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A jfbview Received ExitFailure 1 when running Raw command: /nix/store/6fr58pqy02hmgw1h7b9nqmv7vlp3v346-nix-2.3.15/bin/nix log -f . jfbview Standard output: warning: unknown setting 'experimental-features' error: Package ‘mupdf-1.17.0’ in /var/cache/nixpkgs-update/worker/worktree/jfbview/pkgs/applications/misc/mupdf/1.17.nix:85 is marked as insecure, refusing to evaluate. Known issues: - CVE-2020-26519: denial of service when parsing JBIG2 - CVE-2017-5991: NULL pointer dereference You can install it anyway by allowing this package, using the following methods: a) To temporarily allow all insecure packages, you can use an environment variable for a single invocation of the nix tools: $ export NIXPKGS_ALLOW_INSECURE=1 Note: For `nix shell`, `nix build`, `nix develop` or any other Nix 2.4+ (Flake) command, `--impure` must be passed in order to read this environment variable. b) for `nixos-rebuild` you can add ‘mupdf-1.17.0’ to `nixpkgs.config.permittedInsecurePackages` in the configuration.nix, like so: { nixpkgs.config.permittedInsecurePackages = [ "mupdf-1.17.0" ]; } c) For `nix-env`, `nix-build`, `nix-shell` or any other Nix command you can add ‘mupdf-1.17.0’ to `permittedInsecurePackages` in ~/.config/nixpkgs/config.nix, like so: { permittedInsecurePackages = [ "mupdf-1.17.0" ]; } (use '--show-trace' to show detailed location information)