1
0
Fork 1
mirror of https://github.com/NixOS/nixpkgs.git synced 2024-11-22 13:41:26 +00:00
Commit graph

88088 commits

Author SHA1 Message Date
Tim Steinbach 43fd03a6df oh-my-zsh: 2016-07-15 -> 2016-08-01 2016-08-05 09:53:48 -04:00
Ricardo M. Correia e5db1995a6 ocamlPackages.containers: 0.16 -> 0.18 2016-08-05 14:35:17 +02:00
Ram Kromberg 76c2988e33 wavpack: 4.75.0 -> 4.80.0 2016-08-05 13:54:56 +03:00
Domen Kožar 1664279f0e Add nix-repl as release blocker
This would have blocked the channel in recent curl bump.
2016-08-05 12:08:44 +02:00
obadz d6528a1b7f chromium: fixup commit 33557ac
Helps with #17460

@cleverca22 saw calls to SetuidSandboxHost::GetSandboxBinaryPath so we
patch this function instead.

cc @joachifm
2016-08-05 10:55:48 +01:00
Rok Garbas 3823033107 Revert "curl: 7.47.1 -> 7.50.0" (#17528) 2016-08-05 11:03:51 +02:00
Rok Garbas 9c6fccf29a Revert "curl: 7.50.0 -> 7.50.1" (#17525) 2016-08-05 10:52:30 +02:00
Julien Dehos d46d0c4bb1 gtksourceviewmm: init at 3.18.0 2016-08-05 09:53:45 +02:00
Aneesh Agrawal 5e3eb476f5 neovim: remove unused glib dependency (#17499)
As far as I can tell, neovim has never required glib to build.
The neovim libtermkey does include a demo-glib.c example, but that is
optional.
2016-08-05 09:33:05 +02:00
Kranium Gikos Mendoza 4b62054f4c curl: 7.50.0 -> 7.50.1 (#17486) 2016-08-05 05:00:53 +02:00
Franz Pletz 2d6b7aa545 linux: enable some useful networking options
All options are enabled by default on Debian and some other
distributions, so these should be safe.
2016-08-05 04:07:31 +02:00
Franz Pletz a3f6ca6d17 collectd: 5.5.1 -> 5.5.2 (security)
Fixes CVE-2016-6254.
2016-08-05 04:07:31 +02:00
Franz Pletz 6cf7e8d2ed libreswan: 3.17 -> 3.18 (security)
Fixes CVE-2016-5391, see

  https://libreswan.org/security/CVE-2016-5391/CVE-2016-5391.txt
2016-08-05 04:07:31 +02:00
Lancelot SIX 8420753239
gcc49: 4.9.3 -> 4.9.4
Bugfix release of the 4.9 branch. See
http://lists.gnu.org/archive/html/info-gnu/2016-08/msg00001.html for
announcement
2016-08-05 00:01:15 +02:00
Franz Pletz 792f96fbc7 Merge pull request #17489 from mayflower/pkg/gitlab-8-10
gitlab: 8.5.12 -> 8.10.3, update module
2016-08-04 23:35:22 +02:00
Josef Kemetmueller 54748c1e3f nlohmann_json: init at 2.0.2
A header only C++ library for modern JSON.
2016-08-04 23:34:23 +02:00
Tuomas Tynkkynen 2ea72fa9c8 nixos/luksroot: Reference correct output of openssl 2016-08-04 23:12:39 +03:00
Tuomas Tynkkynen 0eb827918d xorg.libpciaccess: Not supported on Darwin
http://hydra.nixos.org/build/38160825/nixlog/1/raw
2016-08-04 23:11:45 +03:00
obadz 33557acb36 chromium: add ability to control which sandbox is used
First step towards addressing #17460

In order to be able to run the SUID sandbox, which is good for security
and required to run Chromium with any kind of reasonable sandboxing when
using grsecurity kernels, we want to be able to control where the
sandbox comes from in the Chromium wrapper. This commit patches the
appropriate bit of source and adds the same old sandbox to the wrapper
(so it should be a no-op)
2016-08-04 20:37:35 +01:00
koral b3beab9f03 webkitgtk: 2.10.4 -> 2.10.9 2016-08-04 21:18:38 +02:00
Dinnanid 672447f1ad
eclipse-sdk: 4.5.2 -> 4.6 2016-08-04 20:11:08 +02:00
Dinnanid b78a70ccc8
eclipse-sdk: 4.5.1 -> 4.5.2 2016-08-04 20:11:08 +02:00
obadz fbea275286 haskellPackages.ghc-mod: remove override as 5.6.0.0 is ghc8 compatible
cc @peti
2016-08-04 17:40:17 +01:00
Brad Ediger f0f9172017 elm: Constrain aeson-pretty to <0.8 (#17511)
https://github.com/elm-lang/elm-compiler/pull/1431
2016-08-04 18:08:32 +02:00
Thomas Tuegel 9a29551636 Merge branch 'plasma-5.7' 2016-08-04 10:44:43 -05:00
Peter Hoeg aded8e40c1 startkde: default to breeze instead of plastik on a fresh login 2016-08-04 10:44:25 -05:00
Thomas Tuegel 5b008e30b4 kdeWrapper: avoid excessive file collisions 2016-08-04 10:40:36 -05:00
Peter Simons 2627b09b82 haskell-applicative-quoters: fix build with GHC 8.x 2016-08-04 17:38:44 +02:00
obadz 037d9c6cab nixos-install: add options --closure, --no-channel-copy, --no-root-passwd, and --no-bootloader
Closes #17236

nix-build -A tests.installer.simple '<nixos/release.nix>' succeeds ✓
2016-08-04 16:22:25 +01:00
Thomas Tuegel c291485b74 kde5.breeze-grub: init at 5.7.3 2016-08-04 10:15:32 -05:00
Thomas Tuegel bed8eb86c6 kde5.breeze-plymouth: init at 5.7.3 2016-08-04 10:00:12 -05:00
Joachim F 4eef7a4ecf Merge pull request #17506 from romildo/upd.tint2
tint2: 0.12.11 -> 0.12.12
2016-08-04 16:54:34 +02:00
Joachim F 18333473bd Merge pull request #17507 from romildo/upd.mate
mate-themes: 3.20.8 -> 3.20.10
2016-08-04 16:54:18 +02:00
Joachim F 6664471d51 Merge pull request #17505 from Mounium/patch-1
flat-plat: Made the theme actually discoverable
2016-08-04 16:50:51 +02:00
Joachim F 5754eec8f6 Merge pull request #15967 from ericbmerritt/fix/nixos-container
nixos-container: fix allow alternative nixos paths
2016-08-04 16:50:05 +02:00
Thomas Tuegel 0184f0e47c kwin: add xwayland input 2016-08-04 09:46:35 -05:00
Thomas Tuegel 29c3fea7b0 kde5.breeze-qt5: add kwayland input 2016-08-04 09:45:54 -05:00
Thomas Tuegel 8117931752 kde5.kscreenlocker: reformat 2016-08-04 09:13:53 -05:00
Eric Merritt a2feaf6d79 nixos-container: feature add 'config-file' option
This adds a config file option to nixos-container.pl that makes it quite
a bit easier to use.
2016-08-04 07:08:56 -07:00
Eric Merritt fe8f0dbd53 nixos-container: fix allow alternative nixos paths
This should be completely backwards compatible. It allows the '-f' part
of the nix-env command to be configured. This greatly eases using
nixos-container as part of development where several nixpkgs
repositories might be tested at the same time.
2016-08-04 07:08:05 -07:00
Thomas Tuegel 44f3ad9ebb kde5.kinfocenter: display Wayland and OpenGL info 2016-08-04 09:07:17 -05:00
Thomas Tuegel 4ee36f3112 kde5.plasma: 5.7.2 -> 5.7.3 2016-08-04 09:07:08 -05:00
Benno Fünfstück 3f3d18c017 Merge pull request #17218 from bennofs/fix-nixos-version
fix nixos-version --hash when building from git
2016-08-04 15:56:08 +02:00
Christian Kauhaus ea7e705cd9 varnish: fix localstatedir for varnish* tools (#17508)
The varnish tools (varnishstat, varnishlog, ...) tried to load the VSM
file from a spurious var directory in the Nix store. Fix the default so
the tools "just work" when also keeping services.varnish.stateDir at the
default.

Notes:
- The tools use $localstatedir/$HOSTNAME so I've adapted the default for
  stateDir as well to contain hostName.
- Added postStop action to remove the localstatedir. There is no point
  in keeping it around when varnish does not run, as it regenerates it
  on startup anyway.

Fixes #7495
2016-08-04 15:25:23 +02:00
Peter Simons 8f52a0f926 hackage-packages.nix: update Haskell package set
This update was generated by hackage2nix v2.0-22-ga83e456 using the following inputs:

  - Hackage: 07ee4666b6
  - LTS Haskell: dfe21a3b8d
  - Stackage Nightly: 7c2bfd83db
2016-08-04 15:20:31 +02:00
José Romildo Malaquias 1f7871fa93 mate-themes: 3.20.8 -> 3.20.10 2016-08-04 08:05:50 -03:00
Mounium 1d1b875a9d flat-plat: made the theme discoverable 2016-08-04 13:02:22 +02:00
José Romildo Malaquias 20e4e2f9eb tint2: 0.12.11 -> 0.12.12 2016-08-04 07:31:55 -03:00
Rob Vermaas ea9d390c1a Update spotify
(cherry picked from commit 25e68f79e6)
2016-08-04 09:12:43 +00:00
Peter Hoeg c4cba0e51f ssh module: ignore exit code when socket activated
sshd will at times fail when exiting. When socket activated, this will
leave a number of sshd@ service instances in the failed state, so we
simply ignore the error code if we are running socket activated.

Recommended by upstream:
http://systemd-devel.freedesktop.narkive.com/d0eapMCG/socket-activated-sshd-service-showing-up-as-a-failure-when-the-client-connection-fails

Fixes: #3279
2016-08-04 16:47:44 +08:00