Commit Graph

84478 Commits

Author SHA1 Message Date
Thomas Tuegel
fde2093b44 Merge branch 'qmake-rpath' 2016-05-29 20:29:45 -05:00
obadz
d18ba0f50d toxvpn: init at 20151111
(Authored by @cleverca22)
2016-05-30 00:21:22 +01:00
Nikolay Amiantov
76bf59a231 elmPackages: mark release.nix as autogenerated 2016-05-30 02:11:41 +03:00
Frederik Rietdijk
e645389834 Neovim: use Python 3.5 again (#15781)
neovim: use Python 3.5 again
2016-05-29 23:31:47 +02:00
Frederik Rietdijk
fd9cabe3a3 Merge pull request #15813 from elasticdog/pywinrm
pythonPackages.pywinrm: old rev -> 0.1.1
2016-05-29 22:43:37 +02:00
Nikolay Amiantov
1b2139b3e2 buildFHSEnv: use separate gcc for 64- and 32-bit 2016-05-29 23:22:58 +03:00
Arseniy Seroka
46df051890 Merge pull request #15814 from valeriangalliat/hotfix/fcgiwrap-systemd-230
fcgiwrap: fix build with systemd 230
2016-05-29 23:07:39 +03:00
Matt McHenry
7fe0c342a3 bins: init at 1.1.29 2016-05-29 21:48:28 +02:00
Matt McHenry
e5ea52e1eb perl: XML::Handler::YAWriter: init at 0.23 2016-05-29 21:48:28 +02:00
Matt McHenry
cb26fc0a12 perl: XML::Grove: init at 0.46alpha 2016-05-29 21:48:28 +02:00
Matt McHenry
282f080b2e perl: HTML::Clean: init at 0.8 2016-05-29 21:48:28 +02:00
Matt McHenry
c479fb1d61 perl: Image::Info: init at 1.38 2016-05-29 21:48:28 +02:00
Thomas Tuegel
95c5bfc2dc qt55.qmakeHook: remove temporary directory in postInstall
Fixes #15556. If the temporary directory is not removed, it will be
retained in RPATH, which is a serious security concern.
2016-05-29 14:07:03 -05:00
Valérian Galliat
3fbd047736 fcgiwrap: fix build with systemd 230
Closes #15791.
2016-05-29 14:48:03 -04:00
Joachim Fasting
bfefc54bc5
grsecurity: 4.5.5-201605211442 -> 4.5.5-201605291201 2016-05-29 20:34:24 +02:00
Aaron Bull Schaefer
97b231975f pythonPackages.pywinrm: old rev -> 0.1.1
This was previously tied to an older commit rev and not an actual release
version; and that old commit was causing connectivity issues due to improper
SSL support.
2016-05-29 11:25:34 -07:00
Nikolay Amiantov
51f479465c qgroundcontrol: fix build 2016-05-29 19:51:22 +03:00
aszlig
dc38003af9
nixos/containers: Create an empty machine-id file
Since systemd version 230, it is required to have a machine-id file
prior to the startup of the container. If the file is empty, a transient
machine ID is generated by systemd-nspawn.

See systemd/systemd#3014 for more details on the matter.

This unbreaks all of the containers-* NixOS tests.

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
Cc: @edolstra
Closes: #15808
2016-05-29 18:38:37 +02:00
Joachim Fasting
8d1fec55f6 Merge pull request #15802 from phunehehe/casperjs-cp
casperjs: do not move the current working directory
2016-05-29 16:52:28 +02:00
Hoang Xuan Phu
b4bf2364e5 casperjs: do not move the current working directory
If /tmp and /nix are in different filesystems, this causes the `find`s
in the fixup phase to fail because of a stale file handle:

    find: cannot get current directory: No such file or directory
2016-05-29 20:53:36 +08:00
Bjørn Forsman
586dd54199 pitivi: unbreak build
[Breakage introduced in commit 5c4e00b6b797c444c0a0ca434c3b6f
("gst_all_1: 1.6.1 -> 1.8.0 (#14628)").]

The build is failing due to a Wayland test/example program
(<gst-plugins-bad>/tests/examples/waylandsink) being built with a gtk3
input without Wayland support (or detection is failing):

  main.c:28:2: error: #error "Wayland is not supported in GTK+"

Fix it by explicitly disabling wayland; pass --enable-wayland=no to
configure.
2016-05-29 13:17:25 +02:00
Vladimír Čunát
b7c38c7909 perlPackages.X11XCB: 0.14 -> 0.16
Fixes #15771.
2016-05-29 12:33:00 +02:00
Pascal Wittmann
5f599361fc calibre: 2.56.0 -> 2.57.1 2016-05-29 12:25:17 +02:00
Joachim Fasting
ca227d3746 Merge pull request #15502 from nathan7/master
sqlite: pass --enable-readline when interactive mode is enabled
2016-05-29 12:19:15 +02:00
Bjørn Forsman
41eafd25a0 Revert "x2goclient: move to qmake4Hook"
This reverts commit 83406bc171ca2b385c49838e6ed5e89007a875b5, because
it broke the build.

x2goclient requires to be built with its top-level (hand coded) Makefile
(in accordance with upstream documentation). Invoking qmake directly on
the .pro file, without specifying a separate build tree, will overwrite
the Makefile and break the build.

For instance, there are no install rules in the .pro file. That exists
only in the Makefile.
2016-05-29 11:38:41 +02:00
Frederik Rietdijk
e7c9684217 pythonPackages.google_api_python_client: fix url 2016-05-29 09:06:13 +02:00
Bjørn Forsman
bc31253c62 pythonPackages.pyusb: 1.0.0rc1 -> 1.0.0
Unbreaks build, because the (old) src URL doesn't exist anymore.
2016-05-29 00:50:48 +02:00
Bjørn Forsman
15072e8986 pencil: unbreak build by using 'firefox-unwrapped' as 'xulrunner'
The xulrunner build itself is broken at the moment.
2016-05-29 00:21:30 +02:00
Joachim Fasting
ea5039e448 Merge pull request #15712 from rardiol/pcsxr94b
pcsxr: init at 1.9.94
2016-05-28 23:33:09 +02:00
Thomas Tuegel
747517da48 qt56.qmakeHook: remove temporary directory in postInstall
Fixes #15556. If the temporary directory is not removed, it will be
retained in RPATH, which is a serious security concern.
2016-05-28 16:06:03 -05:00
Joachim Fasting
61f92ec541 Merge pull request #15779 from joachifm/sipcmd-refactor
sipcmd: refactoring
2016-05-28 23:03:52 +02:00
Joachim Fasting
73e0c95288 Merge pull request #15778 from joachifm/bup-refactor
bup: refactorings
2016-05-28 23:03:46 +02:00
Jude Taylor
b950dd4c4f add fondu-060102 2016-05-28 13:51:50 -07:00
Joachim Fasting
69091bae84 Merge pull request #15741 from romildo/fix.themes
Numix and Paper themes: fix installation dir and update revision
2016-05-28 22:30:55 +02:00
aszlig
b5f95a5303
Merge pull request #15762 (Chromium update)
This is the original pull request plus some commits from me to bring all
channels to the latest versions, because the fixed security
vulnerabilites might not be fixed in the dev version we had before.

I've tested the whole changeset on my Hydra at:

https://headcounter.org/hydra/eval/322006

Thanks to @srp for the initial commit and thus implicitly also for the
security notice.

Cc: @abbradar
2016-05-28 21:14:40 +02:00
Benjamin Staffin
7a023d50b9 jsonnet: add platforms attribute 2016-05-28 14:39:45 -04:00
Arseniy Seroka
bb0d8b5519 Merge pull request #15780 from joachifm/slurm-refactor
Slurm refactorings
2016-05-28 21:25:43 +03:00
Arseniy Seroka
1ce4a7c923 Merge pull request #15784 from romildo/upd.mate-themes
mate-themes: 1.6.3 -> 3.18.1
2016-05-28 21:24:38 +03:00
Benjamin Staffin
5e53489cd6 Merge pull request #15789 from benley/kafka-0-9
apache-kafka: 0.8.2.1 -> 0.9.0.1 (keep both around temporarily)
2016-05-28 14:18:53 -04:00
Benjamin Staffin
cf5af59468 apache-kafka: retain 0.8.x and 0.9.x
Should make it a little easier for users who need time to plan for the
major 0.9 update.
2016-05-28 13:46:46 -04:00
Redvers Davies
0af8c1f8b8
mt-st: init at 1.3
Closes #15787
2016-05-28 19:33:14 +02:00
Maarten Hoogendoorn
ca4e52d62a apache-kafka: 0.8.2.1 -> 0.9.0.1
(cherry picked from commit bada3043939a9901500c65abc9424e1ffe2310ae)
2016-05-28 13:27:57 -04:00
aszlig
79d18eb604
chromium: Update dev channel to v52.0.2743.10
With this update we need to rebase the nix_plugin_paths patch, which was
done by @srp and I took it from his comment at:

https://github.com/NixOS/nixpkgs/pull/15762#issuecomment-222230677

Other than that, using libjpeg from nixpkgs fails to link:

https://headcounter.org/hydra/build/1114273

Rather than just using versionAtLeast to check for >= version 52, we're
matching on the explicit version number. That way we can make sure that
we (try to) build with system libjpeg again so we can keep it out of the
overall Chromium build time.

Built and tested using the VM tests on my Hydra at:

https://headcounter.org/hydra/eval/322006

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2016-05-28 19:15:39 +02:00
aszlig
c7a3645e7b
chromium: Remove stuff for versions <= v51
We're already on version 52, so there really is no need to keep all
those conditionals and old patches anymore.

Tested dropping the unconditional build_fixes_46.patch via the Chromium
VM tests.

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2016-05-28 19:04:22 +02:00
aszlig
0f4095ec50
chromium: Fix hash for beta Debian package
I'm not sure how the wrong hash ended up being there, but I've checked
the hash from three different machines (and networks) just to be sure I
didn't make a mistake.

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2016-05-28 18:57:15 +02:00
José Romildo Malaquias
ae08abb8b3 mate-themes: 1.6.3 -> 3.18.1 2016-05-28 13:28:47 -03:00
Scott R. Parish
e2d067d760
chromium: Update to latest stable and beta channel
Overview of updated versions:

stable: 50.0.2661.102 -> 51.0.2704.63
beta: 51.0.2704.47 -> 51.0.2704.63

I tried to update dev, but couldn't get it to compile, it was failing
with a "'isnan' was not declared in this scope.

As far as I can tell, at the moment the beta and stable channels are
on the same version.

The stable update addresses the following security issues:

  * High   CVE-2016-1672: Cross-origin bypass in extension bindings. Credit
                          to Mariusz Mlynski.
  * High   CVE-2016-1673: Cross-origin bypass in Blink. Credit to Mariusz
                          Mlynski.
  * High   CVE-2016-1674: Cross-origin bypass in extensions. Credit to Mariusz
                          Mlynski.
  * High   CVE-2016-1675: Cross-origin bypass in Blink. Credit to Mariusz
                          Mlynski.
  * High   CVE-2016-1676: Cross-origin bypass in extension bindings. Credit
                          to Rob Wu.
  * Medium CVE-2016-1677: Type confusion in V8. Credit to Guang Gong of
                        Qihoo 360.
  * High   CVE-2016-1678: Heap overflow in V8. Credit to Christian Holler.
  * High   CVE-2016-1679: Heap use-after-free in V8 bindings. Credit to Rob Wu.
  * High   CVE-2016-1680: Heap use-after-free in Skia. Credit to Atte Kettunen
                          of OUSPG.
  * High   CVE-2016-1681: Heap overflow in PDFium. Credit to Aleksandar Nikolic
                          of Cisco Talos.
  * Medium CVE-2016-1682: CSP bypass for ServiceWorker. Credit to
                          KingstonTime.
  * Medium CVE-2016-1683: Out-of-bounds access in libxslt. Credit to Nicolas
                          Gregoire.
  * Medium CVE-2016-1684: Integer overflow in libxslt. Credit to Nicolas
                          Gregoire.
  * Medium CVE-2016-1685: Out-of-bounds read in PDFium. Credit to Ke Liu
                          of Tencent's Xuanwu LAB.
  * Medium CVE-2016-1686: Out-of-bounds read in PDFium. Credit to Ke Liu
                          of Tencent's Xuanwu LAB.
  * Medium CVE-2016-1687: Information leak in extensions. Credit to Rob Wu.
  * Medium CVE-2016-1688: Out-of-bounds read in V8. Credit to Max Korenko.
  * Medium CVE-2016-1689: Heap buffer overflow in media. Credit to Atte
                          Kettunen of OUSPG.
  * Medium CVE-2016-1690: Heap use-after-free in Autofill. Credit to Rob Wu.
  * Low    CVE-2016-1691: Heap buffer-overflow in Skia. Credit to Atte Kettunen
                          of OUSPG.
  * Low    CVE-2016-1692: Limited cross-origin bypass in ServiceWorker. Credit
                          to Til Jasper Ullrich.
  * Low    CVE-2016-1693: HTTP Download of Software Removal Tool. Credit to
                          Khalil Zhani.
  * Low    CVE-2016-1694: HPKP pins removed on cache clearance. Credit to Ryan
                          Lester and Bryant Zadegan.

See: http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
2016-05-28 18:12:39 +02:00
Frederik Rietdijk
5b0a045d07 Merge pull request #15769 from redvers/mtx
mtx: init at 1.3.12
2016-05-28 16:47:36 +02:00
Redvers Davies
2745b5a652 mtx: init at 1.3.12 2016-05-28 10:43:03 -04:00
Joachim Fasting
b31bbf43fb Merge pull request #15748 from romildo/upd.enlightenment
efl: 1.17.0 -> 1.17.1, elementary: 1.17.0 -> 1.17.1
2016-05-28 16:06:23 +02:00