3
0
Fork 0
forked from mirrors/nixpkgs
Commit graph

3904 commits

Author SHA1 Message Date
Lluís Batlle i Rossell faf6ad8428 espeak: update to 1.46.02 2012-08-27 19:10:06 +02:00
Ludovic Courtès dc4cfe89ff emacs: Update to 24.2. 2012-08-27 18:16:06 +02:00
Michael Raskin 098b0c6a1d Rapcad: add
Rapcad is a tool similar to OpenSCAD but with a richer language.
2012-08-27 15:41:49 +04:00
Peter Simons 430e7454e9 haskell-mathblog: drop obsolete package; it doesn't build with current versions of GHC 2012-08-27 11:29:45 +02:00
aszlig d5c2b35b82
chromium: Re-enable legacy sandbox for version 22.
This enables legacy seccomp sandbox by default even on chromium 22, because the
BPF sandbox is still work in progress, please see:

http://crbug.com/139872
http://crbug.com/130662

Because the BPF seccomp sandbox is used in case the legacy seccomp mode
initialization fails, we might need to patch this again, as soon as the BPF
sandbox is fully implemented to fall back to legacy seccomp and use BPF by
default.

We now have two patches for "default to seccomp" - one for Chromium 21 and one
for 22 or higher.
2012-08-27 06:50:35 +02:00
aszlig c67d8bcabe
chromium: Don't use the sandbox patch on v21.
The patch doesn't apply in version 22 and newer, because mode 1 sandboxes are
connsidered "legacy" (well, apart from the fact that I'd personally prefer BPF
anyway), for reasons I wasn't able to find, yet. But let's proceed on BPF
integration and thus gain more insight on the exact reasons.
2012-08-26 07:36:57 +02:00
aszlig b1a6a98139
chromium: Drop dependency on subversion.
Versions older than 21 needed subversion in order to build. As the oldest
version we support is 21, we no longer need this dependency.
2012-08-26 03:03:24 +02:00
aszlig 819ee63851
chromium: Update to new release channels.
If you look at what changed, you'll surely notice that version 22 is now in
beta, so we have to expect things to break. And one thing that will break for
sure is the seccomp patch, because beginning with 22 the new BPF seccomp sandbox
is going to replace the mode 1 seccomp sandbox.
2012-08-26 02:56:59 +02:00
aszlig 224098757f
chromium/update.sh: Fix spacing in cache messages.
This commit doesn't add any feature and just fixes a small annoyance which
result in messages like this:

Checking if xxx applies...no.

See that there is no whitespace between "..." and "no"? Well, the world cares
for more important things, but for me personally those minor annoyances can turn
into major annoyances.
2012-08-26 02:52:33 +02:00
Cillian de Róiste 32e339da54 Adding jack_capture: A program for recording soundfiles with jack 2012-08-25 01:58:56 +02:00
Lluís Batlle i Rossell 87a3bcd470 libreoffice: trying to make it build with openjdk 2012-08-24 09:20:53 +02:00
Eelco Dolstra dbe524fe3f flac: Add description 2012-08-23 13:57:31 -04:00
Sergey Mironov 222b6e21a5 gimp: revert broken gimp-2.6 dependencies 2012-08-23 03:09:19 +04:00
Eelco Dolstra e188f8ec66 virtualbox: Update to 4.1.20 2012-08-22 16:48:03 -04:00
Eelco Dolstra 964880ec8f virtualbox: Drop accidental JDK dependency 2012-08-22 15:55:46 -04:00
Peter Simons 30a36ad6e5 hadoop: add version 2.0.1-alpha 2012-08-22 14:13:40 +02:00
Shea Levy f34225c440 Merge branch 'chromium-updater' of https://github.com/aszlig/nixpkgs
chromium: Improve update script and update to latest versions.

Previously, we had a single hash of the whole version response from
omahaproxy.

Unfortunately the dev version is released quite frequently, so the hash
is of no use at all (we could rather directly fetch rather than
executing the script, because it will fetch all channels anyway).

This pull request adds two methods of caching:

* First of all, if a perticular version/channel is already in the
previous version of the sources.nix file, don't download it again.

* And the second method is to check if the current sha256 is already
downloaded and reads the corresponding sha256 from the lookup table.

So, this should really help to avoid flooding the download servers and
to not stress impatient users too much.
2012-08-22 06:36:33 -04:00
aszlig 5df4e12c92 firefox: Build against system NSS.
So, now even Firefox can be built with our shiny new fixed up NSS derivation,
and as this is desired (especially if we want to support certificates from the
CA bundle), let's make it the default.
2012-08-22 08:29:10 +02:00
aszlig 8b4fae76b3 chromium: Build with NSS by default.
Hurray! This is the first time chromium is working with NSS _and_ is able to
verify certificates using the root certificates built in into NSS.

Optimally it would use certs from OPENSSL_X509_CERT_FILE, but at least it's
working, so let's add that at some later point.
2012-08-22 08:29:10 +02:00
Mathijs Kwik a5663aee4d emacs: add "sunrise commander" 2012-08-21 10:33:20 +02:00
Mathijs Kwik 85c88d473b emacs: add "rect-mark" 2012-08-21 10:33:06 +02:00
Shea Levy 18bbb2fa5c Merge branch 'virtualbox-manual-kernel' of github.com:aszlig/nixpkgs
virtualbox: Fix build for manual kernel.

This should fix building VirtualBox against kernels made using the new
manual kernel configuration system.

This has been tested with the standard nixpkgs kernel as well.
2012-08-19 10:03:45 -04:00
Ludovic Courtès 0ac1cf106d gpsbabel: Update to 1.4.3. 2012-08-19 15:50:50 +02:00
aszlig 347e8c32a3 virtualbox: Remove unused variable $srcroot.
Thanks to @shlevy for mentioning this.
2012-08-19 09:02:16 +02:00
aszlig 0f9a5eb027 virtualbox: Add symbol versions to all modules.
Copy all symbol versions from the ones generated in the vboxdrv build.
2012-08-19 09:02:16 +02:00
aszlig 1b8ec2eeec virtualbox: Don't build modules for guests.
We're the host so we don't need the kernel modules for the guest additions, as
they're build with in a separate derivation anyway.
2012-08-19 09:02:15 +02:00
aszlig 9fb1d2e6fc virtualbox: Remove redundant NIX_CFLAGS_COMPILE.
The "include/generated" stuff is already added to the search path by the kernel
modules build system, so no need to hack it in like this.
2012-08-19 09:02:15 +02:00
aszlig 3e62a02b17 virtualbox: Separate modules build and install.
First of all, modules won't install when there is no "make modules" prior to it,
so we're doing this now with a new function called forEachModule, so we can
avoid duplication as much as possible.

In addition this sets $sourcedir to the current directory of the configurePhase,
so we're able to find the source tree later on, after several chdir()s.
2012-08-19 09:02:15 +02:00
aszlig e32d7843da virtualbox: Set depmod path to /do_not_use_depmod.
The scripts/depmod.sh checks whether the path in $DEPMOD is executable and only
executes it if that's the case. So, by setting DEPMOD to "/do_not_use_depmod"
the destination path doesn't exist _and_ thus isn't executable aswell.
2012-08-19 09:02:15 +02:00
aszlig 31d8a9a1f4 virtualbox: Fix wrong path when recursing modules.
The for loop didn't find $curdir, because it was set _after_ the directory has
been changed. The variable is now called $srcroot and is set before the
installPhase is changing directories.
2012-08-19 09:02:15 +02:00
aszlig 830e9db5dd virtualbox: Use Linux's kbuild to build modules.
Don't rely on VirtualBox's in-tree build scripts to set include paths correctly
and use the official way of the Linux kernel to build the modules. That way we
don't need to make ugly symlinks in the kernel tree or heavily patch VirtualBox.
2012-08-19 09:02:14 +02:00
Russell O'Connor 525b8015e7 Fixing configure patch for coq 8.3. 2012-08-19 01:11:11 -04:00
Russell O'Connor eafd2008f1 Correcting filename. 2012-08-19 01:06:15 -04:00
Russell O'Connor 706cbc9318 Update coq to 8.4 2012-08-19 01:01:30 -04:00
Eelco Dolstra 1e4c4b70b1 slim: Really update to 1.3.4 2012-08-17 11:33:59 -04:00
Eelco Dolstra bc3865e414 slim: Update to 1.3.4 2012-08-17 10:51:44 -04:00
aszlig 4393fffcce chromium: Update channels to latest versions.
This removes the now obsolete VHASH line in sources.nix aswell.
2012-08-17 12:57:35 +02:00
aszlig 6968400a34 chromium: Check sha256 per channel in update.sh.
Until this commit we had a single hash of the whole version response from
omahaproxy. This worked well for not updating unnecessarily but only until one
single channel has a new version available.

Unfortunately the dev version is released quite frequently, so the hash is of no
use at all (we could rather directly fetch everything everytime we execute the
script).

This led to this commit, which adds two methods of caching:

First of all, if a perticular version/channel is already in the previous version
of the sources.nix file, don't download it again.

And the second method is to check if the current sha256 is already downloaded
and reads the corresponding sha256 from the lookup table.

So, this should really help to avoid flooding the download servers and to not
stress impatient users too much.
2012-08-17 12:57:34 +02:00
Mathijs Kwik 5a146e9cff emacs: add "color-theme" 2012-08-17 08:55:47 +02:00
Eelco Dolstra f27f8a1177 xpdf: Don't use t1lib
t1lib has multiple unpatched vulnerabilities (see
e.g. http://rhn.redhat.com/errata/RHSA-2012-0062.html).
2012-08-16 16:31:44 -04:00
Antono Vasiljev 61f7853e43 Merge pull request #92 from dmalikov/b125ef36b67f2a0aedabc34eb4dac12e61ae9828
gitAndTools: bump tig from 0.16 to 1.0
2012-08-16 06:03:54 -07:00
Sergey Mironov b229c3e09f gxneur: add frontend for XNEUR keyboard layout switcher 2012-08-15 01:10:23 +04:00
Eelco Dolstra c67c397c11 VirtualBox-GuestAdditions: Add to the channel 2012-08-14 13:43:37 -04:00
Mathijs Kwik 50cc5629af emacs: add "jade-mode" 2012-08-13 17:50:19 +02:00
Rok Garbas d91b51c140 Update: notmuch to 0.13.2 2012-08-13 00:24:14 +02:00
Lluís Batlle i Rossell 2ecb9fdb58 aircrackng, kismet: update them to latest trunk and release respectively 2012-08-11 14:42:35 +02:00
Mathijs Kwik 58ccf70f47 it seems fetchgit does not like version tags
I think they built ok on my system before, because I nix-prefetch-git'd them.
2012-08-11 11:45:31 +02:00
Mathijs Kwik b62acd8855 oops typo 2012-08-11 11:34:59 +02:00
Mathijs Kwik a6f17bd1a9 emacs: add "flymake-cursor" 2012-08-11 09:36:20 +02:00
Mathijs Kwik eaeb0a41b6 Merge pull request #96 from aszlig/google-talkplugin
google-talk-plugin: Prefer Debian package.
2012-08-10 22:58:04 -07:00