1
0
Fork 1
mirror of https://github.com/NixOS/nixpkgs.git synced 2024-11-30 09:31:01 +00:00
Commit graph

84475 commits

Author SHA1 Message Date
obadz d18ba0f50d toxvpn: init at 20151111
(Authored by @cleverca22)
2016-05-30 00:21:22 +01:00
Nikolay Amiantov 76bf59a231 elmPackages: mark release.nix as autogenerated 2016-05-30 02:11:41 +03:00
Frederik Rietdijk e645389834 Neovim: use Python 3.5 again (#15781)
neovim: use Python 3.5 again
2016-05-29 23:31:47 +02:00
Frederik Rietdijk fd9cabe3a3 Merge pull request #15813 from elasticdog/pywinrm
pythonPackages.pywinrm: old rev -> 0.1.1
2016-05-29 22:43:37 +02:00
Nikolay Amiantov 1b2139b3e2 buildFHSEnv: use separate gcc for 64- and 32-bit 2016-05-29 23:22:58 +03:00
Arseniy Seroka 46df051890 Merge pull request #15814 from valeriangalliat/hotfix/fcgiwrap-systemd-230
fcgiwrap: fix build with systemd 230
2016-05-29 23:07:39 +03:00
Matt McHenry 7fe0c342a3 bins: init at 1.1.29 2016-05-29 21:48:28 +02:00
Matt McHenry e5ea52e1eb perl: XML::Handler::YAWriter: init at 0.23 2016-05-29 21:48:28 +02:00
Matt McHenry cb26fc0a12 perl: XML::Grove: init at 0.46alpha 2016-05-29 21:48:28 +02:00
Matt McHenry 282f080b2e perl: HTML::Clean: init at 0.8 2016-05-29 21:48:28 +02:00
Matt McHenry c479fb1d61 perl: Image::Info: init at 1.38 2016-05-29 21:48:28 +02:00
Valérian Galliat 3fbd047736 fcgiwrap: fix build with systemd 230
Closes #15791.
2016-05-29 14:48:03 -04:00
Joachim Fasting bfefc54bc5
grsecurity: 4.5.5-201605211442 -> 4.5.5-201605291201 2016-05-29 20:34:24 +02:00
Aaron Bull Schaefer 97b231975f pythonPackages.pywinrm: old rev -> 0.1.1
This was previously tied to an older commit rev and not an actual release
version; and that old commit was causing connectivity issues due to improper
SSL support.
2016-05-29 11:25:34 -07:00
Nikolay Amiantov 51f479465c qgroundcontrol: fix build 2016-05-29 19:51:22 +03:00
aszlig dc38003af9
nixos/containers: Create an empty machine-id file
Since systemd version 230, it is required to have a machine-id file
prior to the startup of the container. If the file is empty, a transient
machine ID is generated by systemd-nspawn.

See systemd/systemd#3014 for more details on the matter.

This unbreaks all of the containers-* NixOS tests.

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
Cc: @edolstra
Closes: #15808
2016-05-29 18:38:37 +02:00
Joachim Fasting 8d1fec55f6 Merge pull request #15802 from phunehehe/casperjs-cp
casperjs: do not move the current working directory
2016-05-29 16:52:28 +02:00
Hoang Xuan Phu b4bf2364e5 casperjs: do not move the current working directory
If /tmp and /nix are in different filesystems, this causes the `find`s
in the fixup phase to fail because of a stale file handle:

    find: cannot get current directory: No such file or directory
2016-05-29 20:53:36 +08:00
Bjørn Forsman 586dd54199 pitivi: unbreak build
[Breakage introduced in commit 5c4e00b6b7
("gst_all_1: 1.6.1 -> 1.8.0 (#14628)").]

The build is failing due to a Wayland test/example program
(<gst-plugins-bad>/tests/examples/waylandsink) being built with a gtk3
input without Wayland support (or detection is failing):

  main.c:28:2: error: #error "Wayland is not supported in GTK+"

Fix it by explicitly disabling wayland; pass --enable-wayland=no to
configure.
2016-05-29 13:17:25 +02:00
Vladimír Čunát b7c38c7909 perlPackages.X11XCB: 0.14 -> 0.16
Fixes #15771.
2016-05-29 12:33:00 +02:00
Pascal Wittmann 5f599361fc calibre: 2.56.0 -> 2.57.1 2016-05-29 12:25:17 +02:00
Joachim Fasting ca227d3746 Merge pull request #15502 from nathan7/master
sqlite: pass --enable-readline when interactive mode is enabled
2016-05-29 12:19:15 +02:00
Bjørn Forsman 41eafd25a0 Revert "x2goclient: move to qmake4Hook"
This reverts commit 83406bc171, because
it broke the build.

x2goclient requires to be built with its top-level (hand coded) Makefile
(in accordance with upstream documentation). Invoking qmake directly on
the .pro file, without specifying a separate build tree, will overwrite
the Makefile and break the build.

For instance, there are no install rules in the .pro file. That exists
only in the Makefile.
2016-05-29 11:38:41 +02:00
Frederik Rietdijk e7c9684217 pythonPackages.google_api_python_client: fix url 2016-05-29 09:06:13 +02:00
Bjørn Forsman bc31253c62 pythonPackages.pyusb: 1.0.0rc1 -> 1.0.0
Unbreaks build, because the (old) src URL doesn't exist anymore.
2016-05-29 00:50:48 +02:00
Bjørn Forsman 15072e8986 pencil: unbreak build by using 'firefox-unwrapped' as 'xulrunner'
The xulrunner build itself is broken at the moment.
2016-05-29 00:21:30 +02:00
Joachim Fasting ea5039e448 Merge pull request #15712 from rardiol/pcsxr94b
pcsxr: init at 1.9.94
2016-05-28 23:33:09 +02:00
Joachim Fasting 61f92ec541 Merge pull request #15779 from joachifm/sipcmd-refactor
sipcmd: refactoring
2016-05-28 23:03:52 +02:00
Joachim Fasting 73e0c95288 Merge pull request #15778 from joachifm/bup-refactor
bup: refactorings
2016-05-28 23:03:46 +02:00
Jude Taylor b950dd4c4f add fondu-060102 2016-05-28 13:51:50 -07:00
Joachim Fasting 69091bae84 Merge pull request #15741 from romildo/fix.themes
Numix and Paper themes: fix installation dir and update revision
2016-05-28 22:30:55 +02:00
aszlig b5f95a5303
Merge pull request #15762 (Chromium update)
This is the original pull request plus some commits from me to bring all
channels to the latest versions, because the fixed security
vulnerabilites might not be fixed in the dev version we had before.

I've tested the whole changeset on my Hydra at:

https://headcounter.org/hydra/eval/322006

Thanks to @srp for the initial commit and thus implicitly also for the
security notice.

Cc: @abbradar
2016-05-28 21:14:40 +02:00
Benjamin Staffin 7a023d50b9 jsonnet: add platforms attribute 2016-05-28 14:39:45 -04:00
Arseniy Seroka bb0d8b5519 Merge pull request #15780 from joachifm/slurm-refactor
Slurm refactorings
2016-05-28 21:25:43 +03:00
Arseniy Seroka 1ce4a7c923 Merge pull request #15784 from romildo/upd.mate-themes
mate-themes: 1.6.3 -> 3.18.1
2016-05-28 21:24:38 +03:00
Benjamin Staffin 5e53489cd6 Merge pull request #15789 from benley/kafka-0-9
apache-kafka: 0.8.2.1 -> 0.9.0.1 (keep both around temporarily)
2016-05-28 14:18:53 -04:00
Benjamin Staffin cf5af59468 apache-kafka: retain 0.8.x and 0.9.x
Should make it a little easier for users who need time to plan for the
major 0.9 update.
2016-05-28 13:46:46 -04:00
Redvers Davies 0af8c1f8b8
mt-st: init at 1.3
Closes #15787
2016-05-28 19:33:14 +02:00
Maarten Hoogendoorn ca4e52d62a apache-kafka: 0.8.2.1 -> 0.9.0.1
(cherry picked from commit bada304393)
2016-05-28 13:27:57 -04:00
aszlig 79d18eb604
chromium: Update dev channel to v52.0.2743.10
With this update we need to rebase the nix_plugin_paths patch, which was
done by @srp and I took it from his comment at:

https://github.com/NixOS/nixpkgs/pull/15762#issuecomment-222230677

Other than that, using libjpeg from nixpkgs fails to link:

https://headcounter.org/hydra/build/1114273

Rather than just using versionAtLeast to check for >= version 52, we're
matching on the explicit version number. That way we can make sure that
we (try to) build with system libjpeg again so we can keep it out of the
overall Chromium build time.

Built and tested using the VM tests on my Hydra at:

https://headcounter.org/hydra/eval/322006

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2016-05-28 19:15:39 +02:00
aszlig c7a3645e7b
chromium: Remove stuff for versions <= v51
We're already on version 52, so there really is no need to keep all
those conditionals and old patches anymore.

Tested dropping the unconditional build_fixes_46.patch via the Chromium
VM tests.

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2016-05-28 19:04:22 +02:00
aszlig 0f4095ec50
chromium: Fix hash for beta Debian package
I'm not sure how the wrong hash ended up being there, but I've checked
the hash from three different machines (and networks) just to be sure I
didn't make a mistake.

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2016-05-28 18:57:15 +02:00
José Romildo Malaquias ae08abb8b3 mate-themes: 1.6.3 -> 3.18.1 2016-05-28 13:28:47 -03:00
Scott R. Parish e2d067d760
chromium: Update to latest stable and beta channel
Overview of updated versions:

stable: 50.0.2661.102 -> 51.0.2704.63
beta: 51.0.2704.47 -> 51.0.2704.63

I tried to update dev, but couldn't get it to compile, it was failing
with a "'isnan' was not declared in this scope.

As far as I can tell, at the moment the beta and stable channels are
on the same version.

The stable update addresses the following security issues:

  * High   CVE-2016-1672: Cross-origin bypass in extension bindings. Credit
                          to Mariusz Mlynski.
  * High   CVE-2016-1673: Cross-origin bypass in Blink. Credit to Mariusz
                          Mlynski.
  * High   CVE-2016-1674: Cross-origin bypass in extensions. Credit to Mariusz
                          Mlynski.
  * High   CVE-2016-1675: Cross-origin bypass in Blink. Credit to Mariusz
                          Mlynski.
  * High   CVE-2016-1676: Cross-origin bypass in extension bindings. Credit
                          to Rob Wu.
  * Medium CVE-2016-1677: Type confusion in V8. Credit to Guang Gong of
                        Qihoo 360.
  * High   CVE-2016-1678: Heap overflow in V8. Credit to Christian Holler.
  * High   CVE-2016-1679: Heap use-after-free in V8 bindings. Credit to Rob Wu.
  * High   CVE-2016-1680: Heap use-after-free in Skia. Credit to Atte Kettunen
                          of OUSPG.
  * High   CVE-2016-1681: Heap overflow in PDFium. Credit to Aleksandar Nikolic
                          of Cisco Talos.
  * Medium CVE-2016-1682: CSP bypass for ServiceWorker. Credit to
                          KingstonTime.
  * Medium CVE-2016-1683: Out-of-bounds access in libxslt. Credit to Nicolas
                          Gregoire.
  * Medium CVE-2016-1684: Integer overflow in libxslt. Credit to Nicolas
                          Gregoire.
  * Medium CVE-2016-1685: Out-of-bounds read in PDFium. Credit to Ke Liu
                          of Tencent's Xuanwu LAB.
  * Medium CVE-2016-1686: Out-of-bounds read in PDFium. Credit to Ke Liu
                          of Tencent's Xuanwu LAB.
  * Medium CVE-2016-1687: Information leak in extensions. Credit to Rob Wu.
  * Medium CVE-2016-1688: Out-of-bounds read in V8. Credit to Max Korenko.
  * Medium CVE-2016-1689: Heap buffer overflow in media. Credit to Atte
                          Kettunen of OUSPG.
  * Medium CVE-2016-1690: Heap use-after-free in Autofill. Credit to Rob Wu.
  * Low    CVE-2016-1691: Heap buffer-overflow in Skia. Credit to Atte Kettunen
                          of OUSPG.
  * Low    CVE-2016-1692: Limited cross-origin bypass in ServiceWorker. Credit
                          to Til Jasper Ullrich.
  * Low    CVE-2016-1693: HTTP Download of Software Removal Tool. Credit to
                          Khalil Zhani.
  * Low    CVE-2016-1694: HPKP pins removed on cache clearance. Credit to Ryan
                          Lester and Bryant Zadegan.

See: http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
2016-05-28 18:12:39 +02:00
Frederik Rietdijk 5b0a045d07 Merge pull request #15769 from redvers/mtx
mtx: init at 1.3.12
2016-05-28 16:47:36 +02:00
Redvers Davies 2745b5a652 mtx: init at 1.3.12 2016-05-28 10:43:03 -04:00
Joachim Fasting b31bbf43fb Merge pull request #15748 from romildo/upd.enlightenment
efl: 1.17.0 -> 1.17.1, elementary: 1.17.0 -> 1.17.1
2016-05-28 16:06:23 +02:00
Marius Bakke 4561a649f4 openvswitch: 2.3.1 -> 2.5.0 (#15729) 2016-05-28 16:02:04 +02:00
Frederik Rietdijk 5c6d7825b4 pythonPackages.msgpack: fix tests 2016-05-28 15:49:54 +02:00
Moritz Ulrich 7b2fab05f3 Merge pull request #15606 from dvc94ch/fpga-toolchain-updates
FPGA toolchain updates
2016-05-28 15:41:10 +02:00