libvmi 0.12.0 -> 0.14.0 https://github.com/libvmi/libvmi/releases attrpath: libvmi Checking auto update branch... No auto update branch exists [version] [version] updated version and sha256 [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Not a buildGoModule package with vendorSha256 or vendorHash [npmDepsVersion] [npmDepsVersion] No npmDepsHash [updateScript] [updateScript] skipping because derivation has no updateScript [quotedUrls] [quotedUrls] nothing found to replace Diff after rewrites: diff --git a/pkgs/development/libraries/libvmi/default.nix b/pkgs/development/libraries/libvmi/default.nix index cbcba106b83d..836cbbaa4cf3 100644 --- a/pkgs/development/libraries/libvmi/default.nix +++ b/pkgs/development/libraries/libvmi/default.nix @@ -12,14 +12,14 @@ stdenv.mkDerivation rec { pname = "libvmi"; - version = "0.12.0"; + version = "0.14.0"; libVersion = "0.0.12"; src = fetchFromGitHub { owner = "libvmi"; repo = "libvmi"; rev = "v${version}"; - sha256 = "0wbi2nasb1gbci6cq23g6kq7i10rwi1y7r44rl03icr5prqjpdyv"; + sha256 = "sha256-n0SLRFBpghsEIB9erCz7tUkuW1CaJ1Ueha4FRvtSROE="; }; buildInputs = [ glib libvirt json_c ] ++ (lib.optional xenSupport xen); Received ExitFailure 1 when running Raw command: /nix/store/3nqhcyc7vid1npgcd0m7arg5sn325nhz-nix-2.12.0/bin/nix-build --option sandbox true --arg config "{ allowBroken = true; allowUnfree = true; allowAliases = false; }" --arg overlays "[ ]" -A libvmi Received ExitFailure 1 when running Raw command: /nix/store/3nqhcyc7vid1npgcd0m7arg5sn325nhz-nix-2.12.0/bin/nix --extra-experimental-features nix-command log -f . libvmi Standard output: error: Package ‘xen-4.15.1’ in /var/cache/nixpkgs-update/worker/worktree/libvmi/pkgs/applications/virtualization/xen/generic.nix:240 is marked as insecure, refusing to evaluate. Known issues: - CVE-2022-42332 - CVE-2022-42333 - CVE-2022-42334 - CVE-2022-42331 You can install it anyway by allowing this package, using the following methods: a) To temporarily allow all insecure packages, you can use an environment variable for a single invocation of the nix tools: $ export NIXPKGS_ALLOW_INSECURE=1 Note: For `nix shell`, `nix build`, `nix develop` or any other Nix 2.4+ (Flake) command, `--impure` must be passed in order to read this environment variable. b) for `nixos-rebuild` you can add ‘xen-4.15.1’ to `nixpkgs.config.permittedInsecurePackages` in the configuration.nix, like so: { nixpkgs.config.permittedInsecurePackages = [ "xen-4.15.1" ]; } c) For `nix-env`, `nix-build`, `nix-shell` or any other Nix command you can add ‘xen-4.15.1’ to `permittedInsecurePackages` in ~/.config/nixpkgs/config.nix, like so: { permittedInsecurePackages = [ "xen-4.15.1" ]; } (use '--show-trace' to show detailed location information)