3
0
Fork 0
forked from mirrors/nixpkgs
Commit graph

84619 commits

Author SHA1 Message Date
Vladimír Čunát b7c38c7909 perlPackages.X11XCB: 0.14 -> 0.16
Fixes #15771.
2016-05-29 12:33:00 +02:00
Pascal Wittmann 5f599361fc calibre: 2.56.0 -> 2.57.1 2016-05-29 12:25:17 +02:00
Joachim Fasting ca227d3746 Merge pull request #15502 from nathan7/master
sqlite: pass --enable-readline when interactive mode is enabled
2016-05-29 12:19:15 +02:00
Bjørn Forsman 41eafd25a0 Revert "x2goclient: move to qmake4Hook"
This reverts commit 83406bc171, because
it broke the build.

x2goclient requires to be built with its top-level (hand coded) Makefile
(in accordance with upstream documentation). Invoking qmake directly on
the .pro file, without specifying a separate build tree, will overwrite
the Makefile and break the build.

For instance, there are no install rules in the .pro file. That exists
only in the Makefile.
2016-05-29 11:38:41 +02:00
Frederik Rietdijk e7c9684217 pythonPackages.google_api_python_client: fix url 2016-05-29 09:06:13 +02:00
Bjørn Forsman bc31253c62 pythonPackages.pyusb: 1.0.0rc1 -> 1.0.0
Unbreaks build, because the (old) src URL doesn't exist anymore.
2016-05-29 00:50:48 +02:00
Bjørn Forsman 15072e8986 pencil: unbreak build by using 'firefox-unwrapped' as 'xulrunner'
The xulrunner build itself is broken at the moment.
2016-05-29 00:21:30 +02:00
Joachim Fasting ea5039e448 Merge pull request #15712 from rardiol/pcsxr94b
pcsxr: init at 1.9.94
2016-05-28 23:33:09 +02:00
Thomas Tuegel 747517da48 qt56.qmakeHook: remove temporary directory in postInstall
Fixes #15556. If the temporary directory is not removed, it will be
retained in RPATH, which is a serious security concern.
2016-05-28 16:06:03 -05:00
Joachim Fasting 61f92ec541 Merge pull request #15779 from joachifm/sipcmd-refactor
sipcmd: refactoring
2016-05-28 23:03:52 +02:00
Joachim Fasting 73e0c95288 Merge pull request #15778 from joachifm/bup-refactor
bup: refactorings
2016-05-28 23:03:46 +02:00
Jude Taylor b950dd4c4f add fondu-060102 2016-05-28 13:51:50 -07:00
Joachim Fasting 69091bae84 Merge pull request #15741 from romildo/fix.themes
Numix and Paper themes: fix installation dir and update revision
2016-05-28 22:30:55 +02:00
aszlig b5f95a5303
Merge pull request #15762 (Chromium update)
This is the original pull request plus some commits from me to bring all
channels to the latest versions, because the fixed security
vulnerabilites might not be fixed in the dev version we had before.

I've tested the whole changeset on my Hydra at:

https://headcounter.org/hydra/eval/322006

Thanks to @srp for the initial commit and thus implicitly also for the
security notice.

Cc: @abbradar
2016-05-28 21:14:40 +02:00
Marius Bakke 80ab61219b duplicity: 0.7.06 -> 0.7.07.1 2016-05-28 19:54:47 +01:00
Benjamin Staffin 7a023d50b9 jsonnet: add platforms attribute 2016-05-28 14:39:45 -04:00
Arseniy Seroka bb0d8b5519 Merge pull request #15780 from joachifm/slurm-refactor
Slurm refactorings
2016-05-28 21:25:43 +03:00
Arseniy Seroka 1ce4a7c923 Merge pull request #15784 from romildo/upd.mate-themes
mate-themes: 1.6.3 -> 3.18.1
2016-05-28 21:24:38 +03:00
Benjamin Staffin 5e53489cd6 Merge pull request #15789 from benley/kafka-0-9
apache-kafka: 0.8.2.1 -> 0.9.0.1 (keep both around temporarily)
2016-05-28 14:18:53 -04:00
Benjamin Staffin cf5af59468 apache-kafka: retain 0.8.x and 0.9.x
Should make it a little easier for users who need time to plan for the
major 0.9 update.
2016-05-28 13:46:46 -04:00
José Romildo Malaquias 2e0c97de6e mate-icon-theme: 1.6.3 -> 1.14.1 2016-05-28 14:43:21 -03:00
Redvers Davies 0af8c1f8b8
mt-st: init at 1.3
Closes #15787
2016-05-28 19:33:14 +02:00
Maarten Hoogendoorn ca4e52d62a apache-kafka: 0.8.2.1 -> 0.9.0.1
(cherry picked from commit bada304393)
2016-05-28 13:27:57 -04:00
aszlig 79d18eb604
chromium: Update dev channel to v52.0.2743.10
With this update we need to rebase the nix_plugin_paths patch, which was
done by @srp and I took it from his comment at:

https://github.com/NixOS/nixpkgs/pull/15762#issuecomment-222230677

Other than that, using libjpeg from nixpkgs fails to link:

https://headcounter.org/hydra/build/1114273

Rather than just using versionAtLeast to check for >= version 52, we're
matching on the explicit version number. That way we can make sure that
we (try to) build with system libjpeg again so we can keep it out of the
overall Chromium build time.

Built and tested using the VM tests on my Hydra at:

https://headcounter.org/hydra/eval/322006

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2016-05-28 19:15:39 +02:00
aszlig c7a3645e7b
chromium: Remove stuff for versions <= v51
We're already on version 52, so there really is no need to keep all
those conditionals and old patches anymore.

Tested dropping the unconditional build_fixes_46.patch via the Chromium
VM tests.

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2016-05-28 19:04:22 +02:00
aszlig 0f4095ec50
chromium: Fix hash for beta Debian package
I'm not sure how the wrong hash ended up being there, but I've checked
the hash from three different machines (and networks) just to be sure I
didn't make a mistake.

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2016-05-28 18:57:15 +02:00
José Romildo Malaquias ae08abb8b3 mate-themes: 1.6.3 -> 3.18.1 2016-05-28 13:28:47 -03:00
Scott R. Parish e2d067d760
chromium: Update to latest stable and beta channel
Overview of updated versions:

stable: 50.0.2661.102 -> 51.0.2704.63
beta: 51.0.2704.47 -> 51.0.2704.63

I tried to update dev, but couldn't get it to compile, it was failing
with a "'isnan' was not declared in this scope.

As far as I can tell, at the moment the beta and stable channels are
on the same version.

The stable update addresses the following security issues:

  * High   CVE-2016-1672: Cross-origin bypass in extension bindings. Credit
                          to Mariusz Mlynski.
  * High   CVE-2016-1673: Cross-origin bypass in Blink. Credit to Mariusz
                          Mlynski.
  * High   CVE-2016-1674: Cross-origin bypass in extensions. Credit to Mariusz
                          Mlynski.
  * High   CVE-2016-1675: Cross-origin bypass in Blink. Credit to Mariusz
                          Mlynski.
  * High   CVE-2016-1676: Cross-origin bypass in extension bindings. Credit
                          to Rob Wu.
  * Medium CVE-2016-1677: Type confusion in V8. Credit to Guang Gong of
                        Qihoo 360.
  * High   CVE-2016-1678: Heap overflow in V8. Credit to Christian Holler.
  * High   CVE-2016-1679: Heap use-after-free in V8 bindings. Credit to Rob Wu.
  * High   CVE-2016-1680: Heap use-after-free in Skia. Credit to Atte Kettunen
                          of OUSPG.
  * High   CVE-2016-1681: Heap overflow in PDFium. Credit to Aleksandar Nikolic
                          of Cisco Talos.
  * Medium CVE-2016-1682: CSP bypass for ServiceWorker. Credit to
                          KingstonTime.
  * Medium CVE-2016-1683: Out-of-bounds access in libxslt. Credit to Nicolas
                          Gregoire.
  * Medium CVE-2016-1684: Integer overflow in libxslt. Credit to Nicolas
                          Gregoire.
  * Medium CVE-2016-1685: Out-of-bounds read in PDFium. Credit to Ke Liu
                          of Tencent's Xuanwu LAB.
  * Medium CVE-2016-1686: Out-of-bounds read in PDFium. Credit to Ke Liu
                          of Tencent's Xuanwu LAB.
  * Medium CVE-2016-1687: Information leak in extensions. Credit to Rob Wu.
  * Medium CVE-2016-1688: Out-of-bounds read in V8. Credit to Max Korenko.
  * Medium CVE-2016-1689: Heap buffer overflow in media. Credit to Atte
                          Kettunen of OUSPG.
  * Medium CVE-2016-1690: Heap use-after-free in Autofill. Credit to Rob Wu.
  * Low    CVE-2016-1691: Heap buffer-overflow in Skia. Credit to Atte Kettunen
                          of OUSPG.
  * Low    CVE-2016-1692: Limited cross-origin bypass in ServiceWorker. Credit
                          to Til Jasper Ullrich.
  * Low    CVE-2016-1693: HTTP Download of Software Removal Tool. Credit to
                          Khalil Zhani.
  * Low    CVE-2016-1694: HPKP pins removed on cache clearance. Credit to Ryan
                          Lester and Bryant Zadegan.

See: http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
2016-05-28 18:12:39 +02:00
Frederik Rietdijk 5b0a045d07 Merge pull request #15769 from redvers/mtx
mtx: init at 1.3.12
2016-05-28 16:47:36 +02:00
Redvers Davies 2745b5a652 mtx: init at 1.3.12 2016-05-28 10:43:03 -04:00
Frederik Rietdijk a65e049ca4 pithos: use Python 3.5 2016-05-28 16:10:06 +02:00
Joachim Fasting b31bbf43fb Merge pull request #15748 from romildo/upd.enlightenment
efl: 1.17.0 -> 1.17.1, elementary: 1.17.0 -> 1.17.1
2016-05-28 16:06:23 +02:00
Marius Bakke 4561a649f4 openvswitch: 2.3.1 -> 2.5.0 (#15729) 2016-05-28 16:02:04 +02:00
Frederik Rietdijk 5c6d7825b4 pythonPackages.msgpack: fix tests 2016-05-28 15:49:54 +02:00
Moritz Ulrich 7b2fab05f3 Merge pull request #15606 from dvc94ch/fpga-toolchain-updates
FPGA toolchain updates
2016-05-28 15:41:10 +02:00
Joachim Fasting 5e1bea1ec2
bup: refactorings
- Use `fetchFromGitHub`
- Apply patches standard patch phase
- Use `pythonPackages`
- Use `stdenv.is{Darwin,Linux}`
- meta fixups
- Enable support for the web front-end
2016-05-28 15:32:49 +02:00
Frederik Rietdijk 373455e237 Merge pull request #15613 from womfoo/facter
facter: 3.1.5 -> 3.1.6 (add ruby support) and dependency leatherman: 0.4.2 -> 0.7.0
2016-05-28 15:29:31 +02:00
Joachim Fasting b05bb30361
slurm service: robust reference to slurm bin output 2016-05-28 15:28:21 +02:00
Joachim Fasting c420d0fb28
slurm service: fix typo in option description 2016-05-28 15:28:21 +02:00
Joachim Fasting 622b1b057b
slurm-llnl: multiple outputs 2016-05-28 15:28:20 +02:00
Frederik Rietdijk eb7d55f68a Merge pull request #15777 from rnhmjoj/btfs
btfs: 2.8 -> 2.9
2016-05-28 15:25:42 +02:00
Joachim Fasting bb4989529f
sipcmd: refactoring
- Use `fetchFromGitHub`
- meta cleanups
2016-05-28 15:25:31 +02:00
rnhmjoj 862ccab89c
btfs: 2.8 -> 2.9 2016-05-28 15:21:15 +02:00
Moritz Ulrich ff771e948c rustRacer: 1.1.0 -> 1.2.10 2016-05-28 15:19:00 +02:00
Profpatsch c7d288fd56 mpv: add script infrastructure & convert script
mpv’s functionality can be modified with lua scripts, by specifying them
on the command line.
`scripts` is a list of lua files that are appended to the default mpv
invocation. We also provide a `mpvScripts` attrset with the available
scripts in the top namespace.

`convert` is one such script, that extends mpv with a simple but very
convenient on-the-fly cropping and converting feature.

Closes #14040.
2016-05-28 15:16:12 +02:00
Frederik Rietdijk ee547881d6 Merge pull request #15501 from FRidh/octave
octave: add libsndfile to buildInputs, fixes #15494
2016-05-28 15:07:13 +02:00
Moritz Ulrich d8b0618e6c buildRustPackage: Don't specify logLevel by default. 2016-05-28 15:05:11 +02:00
Moritz Ulrich 303aac8381 cargo: 0.9.0 -> 0.10.0, rustRegistry: 2016-05-12 -> 2016-05-28. 2016-05-28 15:05:11 +02:00
Moritz Ulrich 1e04865e87 buildRustPackage: Add log-level argument. 2016-05-28 15:05:11 +02:00
Frederik Rietdijk b88caeff8f Merge pull request #15776 from rnhmjoj/imv
imv: 2.0.0 -> 2.1.2
2016-05-28 15:03:46 +02:00