3
0
Fork 0
forked from mirrors/nixpkgs
Commit graph

223566 commits

Author SHA1 Message Date
Jörg Thalheim 9ae6b51c0c
Merge pull request #85881 from sternenseemann/apostrophe-alias 2020-04-29 13:12:38 +01:00
talyz 2535cdfe91
php: Unify the usage of the php package in php-packages.nix
Instead of using two different php packages in php-packages.nix, one
wrapper and one unwrapped, simply use the wrapper and use its
"unwrapped" attribute when necessary. Also, get rid of the packages
and extensions attributes from the base package, since they're no
longer needed.
2020-04-29 13:59:29 +02:00
talyz 5cad1b4aff
php: Get rid of the phpXXbase attributes, update docs
Since the introduction of php.unwrapped there's no real need for the
phpXXbase attributes, so let's remove them to lessen potential
confusion and clutter. Also update the docs to make it clear how to
get hold of an unwrapped PHP if needed.
2020-04-29 13:45:48 +02:00
talyz 3bfd4e864f
php: Add passthru.tests 2020-04-29 13:45:07 +02:00
talyz ef990961bc
php.buildEnv: Provide the unwrapped php package in php.unwrapped
This is useful if you need to access the dev output of the unwrapped
derivation.
2020-04-29 13:44:20 +02:00
Jan Tojnar 519b7d24f4
Merge pull request #65835 from jorsn/libextractor-gstreamer 2020-04-29 13:29:28 +02:00
Mario Rodas 8917cd8b88
Merge pull request #86300 from lugray/bump_shadowenv
shadowenv: 2.0.0 -> 2.0.2
2020-04-29 06:18:46 -05:00
Mario Rodas f0240514d2
jetbrains-mono: 1.0.5 -> 1.0.6
Changelog: https://github.com/JetBrains/JetBrainsMono/releases/tag/v1.0.6
2020-04-29 06:01:00 -05:00
Martin Weinelt 704a018aae
coturn: apply patch for CVE-2020-6061/6062
Fixes: CVE-2020-6061, CVE-2020-6062

An exploitable heap overflow vulnerability exists in the way CoTURN
4.5.1.1 web server parses POST requests. A specially crafted HTTP
POST request can lead to information leaks and other misbehavior.
An attacker needs to send an HTTPS request to trigger this vulnerability.

An exploitable denial-of-service vulnerability exists in the way
CoTURN 4.5.1.1 web server parses POST requests. A specially crafted
HTTP POST request can lead to server crash and denial of service.
An attacker needs to send an HTTP request to trigger this vulnerability.
2020-04-29 12:53:16 +02:00
adisbladis 78cba5ac1e
nixos.podman: Expose extraPackages from the podman wrapper 2020-04-29 11:53:06 +01:00
adisbladis b2a9a3e9cb
podman: Wrap packages required to run containers 2020-04-29 11:40:44 +01:00
Mario Rodas cffb1cbcb2
Merge pull request #86286 from marsam/update-act
act: 0.2.7 -> 0.2.8
2020-04-29 05:40:38 -05:00
Oleksii Filonenko 6d83e9572d hydroxide: 0.2.11 -> 0.2.14 2020-04-29 13:36:27 +03:00
Oleksii Filonenko ca417e5c95 monolith: 2.2.2 -> 2.2.4 2020-04-29 13:33:01 +03:00
Oleksii Filonenko 3bdfedde2a frp: 0.32.0 -> 0.33.0 2020-04-29 13:24:20 +03:00
Oleksii Filonenko a0a75a947a emplace: 0.2.15 -> 0.2.19 2020-04-29 13:21:04 +03:00
talyz c3d5d92f4a
php.buildEnv: Add phpIni attribute for easy access to the php.ini 2020-04-29 12:12:59 +02:00
Matthieu Coudron 8ce65087c3 broadcom_sta: fix build on 5.6 2020-04-29 11:57:03 +02:00
Lisa Ugray 329cc874e4 shadowenv: 2.0.0 -> 2.0.2
Pick up shell completions
2020-04-29 05:46:18 -04:00
Peter Hoeg 8f43c55598
Merge pull request #86289 from peterhoeg/f/libeatmydata
libeatmydata: allow building from checkout
2020-04-29 17:44:01 +08:00
Bart Brouns 7b8408fd4b mu: 1.4.1 -> 1.4.3 2020-04-29 11:32:15 +02:00
Mario Rodas ac885e1b87
fstar: install completions 2020-04-29 04:20:00 -05:00
Michael Weiss bfa2452dc8
Merge pull request #86206 from primeos/chromium
chromium: 81.0.4044.122 -> 81.0.4044.129
2020-04-29 11:15:25 +02:00
Peter Hoeg 3628b1c6bf libeatmydata: allow building from checkout
Also include note about running tests.
2020-04-29 16:17:04 +08:00
Sascha Grunert c07a4675a3
kubernix: v0.2.0
Signed-off-by: Sascha Grunert <sgrunert@suse.com>
2020-04-29 09:27:09 +02:00
Jan Tojnar f14021febf
Merge branch 'master' into staging-next 2020-04-29 08:35:23 +02:00
Jan Tojnar 2b5e2ffe0a
Merge pull request #86165 from jtojnar/libusb-compat-rename 2020-04-29 08:26:08 +02:00
Jörg Thalheim 6015d03ef1
Merge pull request #86037 from purcell/dotnet-arm64 2020-04-29 07:04:32 +01:00
worldofpeace d67d074ae6
Merge pull request #86285 from cole-h/fish
fish: 3.1.1 -> 3.1.2
2020-04-29 01:37:57 -04:00
worldofpeace a6dc21fa2d nixos/pantheon: fix doc typo 2020-04-29 01:20:03 -04:00
jakobrs d21cc14114 v4l2loopback: 0.12.4 -> 0.12.5 2020-04-29 07:19:01 +02:00
Vincent Laporte 95b35a2514 coqPackages.gappalib: 1.4.1 → 1.4.3 2020-04-29 06:56:14 +02:00
Peter Hoeg 83a57cfa31
Merge pull request #81366 from pvgoran/pykms-fix-logging
pykms: fix/enhance logging
2020-04-29 12:49:00 +08:00
Cole Helbling 7a15b6037b
fish: 3.1.1 -> 3.1.2
https://github.com/fish-shell/fish-shell/compare/3.1.1...3.1.2

"This release of fish fixes a major issue discovered in fish 3.1.1:
Commands such as `fzf` and `enhancd`, when used with `eval`, would hang.
`eval` buffered output too aggressively, which has been fixed."
2020-04-28 21:26:50 -07:00
Pavel Goran c678d68cdb nixos/pykms: add SyslogIdentifier 2020-04-29 03:53:47 +00:00
Pavel Goran 462fa8bbaf pykms: replace logging patch
The logging "sed-patch" that was introduced for version 20190611 worked poorly:
it was too intrusive (breaking the --logfile option), and it didn't prevent
using in-store file for logging by default. The new logging patch (an actual
"diff-patch") is less intrusive: it just changes the default log file's
location to be the current directory instead of the executable's directory.
2020-04-29 03:53:41 +00:00
Mario Rodas de71be7723
Merge pull request #86220 from avdv/wtf-0.29.0
wtf: 0.29.0 -> 0.29.0
2020-04-28 21:42:09 -05:00
Martin Weinelt c9fef6230a dnsmasq: 2.80 → 2.81
Fixes: CVE-2019-14834

A vulnerability was found in dnsmasq before version 2.81, where the
memory leak allows remote attackers to cause a denial of service
(memory consumption) via vectors involving DHCP response creation.

Changelog:

version 2.81
	Improve cache behaviour for TCP connections. For ease of
	implementaion, dnsmasq has always forked a new process to handle
	each incoming TCP connection. A side-effect of this is that
	any DNS queries answered from TCP connections are not cached:
	when TCP connections were rare, this was not a problem.
	With the coming of DNSSEC, it is now the case that some
	DNSSEC queries have answers which spill to TCP, and if,
	for instance, this applies to the keys for the root, then
	those never get cached, and performance is very bad.
	This fix passes cache entries back from the TCP child process to
	the main server process, and fixes the problem.

	Remove the NO_FORK compile-time option, and support for uclinux.
	In an era where everything has an MMU, this looks like
	an anachronism, and it adds to (Ok, multiplies!) the
	combinatorial explosion of compile-time options. Thanks to
	Kevin Darbyshire-Bryant for the patch.

	Fix line-counting when reading /etc/hosts and friends; for
	correct error messages. Thanks to Christian Rosentreter
	for reporting this.

	Fix bug in DNS non-terminal code, added in 2.80, which could
	sometimes cause a NODATA rather than an NXDOMAIN reply.
	Thanks to Norman Rasmussen, Sven Mueller and Maciej Żenczykowski
	for spotting and diagnosing the bug and providing patches.

	Support TCP-fastopen (RFC-7413) on both incoming and
	outgoing TCP connections, if supported and enabled in the OS.

	Improve kernel-capability manipulation code under Linux. Dnsmasq
	now fails early if a required capability is not available, and
	tries not to request capabilities not required by its
	configuration.

	Add --shared-network config. This enables allocation of addresses
	by the DHCP server in subnets where the server (or relay) does not
	have an interface on the network in that subnet. Many thanks to
	kamp.de for sponsoring this feature.

	Fix broken contrib/lease_tools/dhcp_lease_time.c. A packet
	validation check got borked in commit 2b38e382 and release 2.80.
	Thanks to Tomasz Szajner for spotting this.

	Fix compilation against nettle version 3.5 and later.

	Fix spurious DNSSEC validation failures when the auth section
	of a reply contains unsigned RRs from a signed zone,
	with the exception that NSEC and NSEC3 RRs must always be signed.
        Thanks to Tore Anderson for spotting and diagnosing the bug.

	Add --dhcp-ignore-clid. This disables reading of DHCP client
	identifier option (option 61), so clients are only identified by
	MAC addresses.

	Fix a bug which stopped --dhcp-name-match from working when a hostname
	is supplied in --dhcp-host. Thanks to James Feeney for spotting this.

	Fix bug which caused very rarely caused zero-length DHCPv6 packets.
	Thanks to Dereck Higgins for spotting this.

	Add --tftp-single-port option.

	Enhance --conf-dir to load files in a deterministic order. Thanks to
	Evgenii Seliavka for the suggestion and initial patch.

	In the router advert code, handle case where we have two
	different interfaces on the same IPv6 net, and we are doing
	RA/DHCP service on only one of them. Thanks to NIIBE Yutaka
	for spotting this case and making the initial patch.

	Support prefixed ranges of ipv6 addresses in dhcp-host.
	This eases problems chain-netbooting, where each link in the
	chain requests an address using a different UID. With a single
	address, only one gets the "static" address, but with this
	fix, enough addresses can be reserved for all the stages of the
	boot. Many thanks to Harald Jensås for his work on this idea and
	earlier patches.

	Add filtering by tag of --dhcp-host directives. Based on a patch
	by Harald Jensås.

	Allow empty server spec in --rev-server, to match --server.

	Remove DSA signature verification from DNSSEC, as specified in
	RFC 8624. Thanks to Loganaden Velvindron for the original patch.

	Add --script-on-renewal option.
2020-04-29 04:22:08 +02:00
worldofpeace b7f80f00ef
Merge pull request #86150 from ceedubs/unison-ucm-M1l
unison-ucm: 1.0.M1j-alpha -> 1.0.M1l-alpha
2020-04-28 21:49:49 -04:00
Mario Rodas af6f00d552
Merge pull request #86211 from marsam/update-nodejs-12_x
nodejs-12_x: 12.16.2 -> 12.16.3
2020-04-28 20:41:35 -05:00
Jaka Hudoklin d3ef0655d4
Merge pull request #86233 from prusnak/remove-amd-legacy
amdadl-sdk, amdapp-sdk: remove
2020-04-29 01:31:31 +00:00
adisbladis 50950bda13
Merge pull request #86262 from zowoq/podman
podman: 1.9.0 -> 1.9.1
2020-04-29 03:00:47 +02:00
Mario Rodas 002817019b
Merge pull request #86224 from bbigras/starship
starship: 0.40.1 -> 0.41.0
2020-04-28 19:37:12 -05:00
Colin 4007ceb6af
treewide get rid of go 1.12 (#83253)
* treewide Drop unneeded go 1.12 overrides

* Fix packr to be go module compatible.

I updated to version 2.8.0 which is the latest on master.
Then due to the 2 different sets of go modules which are used, I split
the build into two different derivations, then merged them togethor
using symlinkJoin to have the same output structure as the existing derivation.

* Remove consul dependency on go1.12

I updated the consul version to 1.7.2 and flipped it to building using
modules.

* Remove go1.12 from perkeep.

Update the version to the latest unstable on master.

* Update scaleway-cli to not be pinned to go1.12

Switched the version to 1.20

* Update prometheus-varnish-exporter to not depend on go1.12

* Update lnd to build with go1.12

Updated the version
Forced only building subpackages with main to prevent panics over
multiple modules in one repo

* Remove go1.12 from openshift

Had to update the version to 4.1.0 and do a bit of munging to get this
to work

* Remove go1.12 completely.

These are no longer needed.

* Update bazel-watcher and make it build with go 1.14
2020-04-28 20:16:20 -04:00
Matthew Bauer 764c8203b8 nixos/systemd.nix: don’t require online for multi-user.target
Not all systems need to be online to boot up. So, don’t pull
network-online.target into multi-user.target. Services that need
online network can still require it.

This increases my boot time from ~9s to ~5s.
2020-04-28 18:59:48 -05:00
Lionello Lunesu 386da32bb0 ldc: 1.17.0 -> 1.20.1
This reverts commit 31d630c3a4.
2020-04-29 07:31:53 +08:00
Lionello Lunesu e0777cba19 Patch bash in test6952.d 2020-04-29 07:31:52 +08:00
Lionello Lunesu 6e7a36bcb3 Update patch dlang/dmd#11053 2020-04-29 07:31:52 +08:00
Lionello Lunesu 6c9beaa744 dmd: 2.085.1 -> 2.091.1
Apply patch dlang/dmd#11053
2020-04-29 07:31:52 +08:00
Florian Klink c01ac3ed12
Merge pull request #85998 from helsinki-systems/make-nsswitch-more-flexible
nixos/nsswitch: Make databases more configurable
2020-04-29 01:28:33 +02:00