diff options
author | Raphael Robatsch <raphael-git@tapesoftware.net> | 2023-05-14 19:43:45 +0200 |
---|---|---|
committer | Raphael Robatsch <raphael-git@tapesoftware.net> | 2023-05-14 19:43:45 +0200 |
commit | 7b17416a3cbef61847841d96b6b4b66f2b875df6 (patch) | |
tree | 800fae353f2b8c9013c281b338e90dba1a41f23a | |
parent | b0fa61a4e235cfcde936564b5c062bad544bd6d1 (diff) | |
download | nixpkgs-7b17416a3cbef61847841d96b6b4b66f2b875df6.tar nixpkgs-7b17416a3cbef61847841d96b6b4b66f2b875df6.tar.gz nixpkgs-7b17416a3cbef61847841d96b6b4b66f2b875df6.tar.bz2 nixpkgs-7b17416a3cbef61847841d96b6b4b66f2b875df6.tar.lz nixpkgs-7b17416a3cbef61847841d96b6b4b66f2b875df6.tar.xz nixpkgs-7b17416a3cbef61847841d96b6b4b66f2b875df6.tar.zst nixpkgs-7b17416a3cbef61847841d96b6b4b66f2b875df6.zip |
openslp: update broken patch URLs
https://src.fedoraproject.org/cgit/ does not exist anymore, and the automatic redirects are not 100% accurate.
-rw-r--r-- | pkgs/development/libraries/openslp/default.nix | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/pkgs/development/libraries/openslp/default.nix b/pkgs/development/libraries/openslp/default.nix index 7ebbd9ad5ce..6e03138adfa 100644 --- a/pkgs/development/libraries/openslp/default.nix +++ b/pkgs/development/libraries/openslp/default.nix @@ -12,12 +12,12 @@ stdenv.mkDerivation rec { patches = [ (fetchpatch { name = "openslp-2.0.0-null-pointer-deref.patch"; - url = "https://src.fedoraproject.org/cgit/rpms/openslp.git/plain/openslp-2.0.0-null-pointer-deref.patch"; + url = "https://src.fedoraproject.org/rpms/openslp/raw/696fd55ae4fcea7beda0a25131dca8bfb14bbdf9/f/openslp-2.0.0-null-pointer-deref.patch"; sha256 = "186f3rj3z2lf5h1lpbhqk0szj2a9far1p3mjqg6422f29yjfnz6a"; }) (fetchpatch { name = "openslp-2.0.0-CVE-2016-7567.patch"; - url = "https://src.fedoraproject.org/cgit/rpms/openslp.git/plain/openslp-2.0.0-cve-2016-7567.patch"; + url = "https://src.fedoraproject.org/rpms/openslp/raw/696fd55ae4fcea7beda0a25131dca8bfb14bbdf9/f/openslp-2.0.0-cve-2016-7567.patch"; sha256 = "0zp61axx93b7nrbsyhn2x4dnw7n9y6g4rys21hyqxk4khrnc2yr9"; }) ./CVE-2016-4912.patch |