Commit Graph

3944 Commits

Author SHA1 Message Date
Jan Tojnar
86254f07b8
networkmanager_strongswan: 1.4.3 → 1.4.4 2018-08-09 18:17:40 +02:00
Jan Tojnar
87cf73bd1a
networkmanager-openconnect: clean up 2018-08-09 18:17:40 +02:00
Jan Tojnar
93d728b2ed
networkmanager-fortisslvpn: clean up 2018-08-09 18:17:34 +02:00
Jan Tojnar
cb32ca2645
networkmanager-iodine: clean up 2018-08-09 18:17:32 +02:00
Jan Tojnar
3fa8a478e3
networkmanager-l2tp: 1.2.8 → 1.2.10 2018-08-09 18:17:32 +02:00
Jan Tojnar
7f175f2ad7
networkmanager-vpnc: clean up 2018-08-09 18:17:26 +02:00
Jan Tojnar
bababf31c0
networkmanager-openconnect: move to a subdirectory 2018-08-09 18:16:43 +02:00
Jan Tojnar
73539d3939
networkmanager-fortisslvpn: move to a subdirectory 2018-08-09 17:37:12 +02:00
Jan Tojnar
1f6f4e69d1
networkmanager-iodine: move to a subdirectory 2018-08-09 17:37:12 +02:00
Jan Tojnar
3fb05d10d0
networkmanager-l2tp: move to a subdirectory 2018-08-09 17:37:11 +02:00
Jan Tojnar
cbbf0f1447
networkmanager-vpnc: move to a subdirectory 2018-08-09 17:37:10 +02:00
Jan Tojnar
11b4c9cb8e
networkmanager-openvpn: cleanup 2018-08-09 17:37:10 +02:00
Jan Tojnar
d2f75c32de
networkmanagerapplet: clean up 2018-08-09 17:37:09 +02:00
Vladyslav M
ce3e962031 wireguard: 0.0.20180708 -> 0.0.20180802 (#44490) 2018-08-09 00:54:10 +02:00
R. RyanTM
54b14db807 lftp: 4.8.3 -> 4.8.4
Semi-automatic update generated by https://github.com/ryantm/nixpkgs-update tools. This update was made based on information from https://repology.org/metapackage/lftp/versions.
2018-08-09 00:33:45 +02:00
Robert Schütz
6342ab656c
Merge pull request #44446 from rnhmjoj/python2->python3
Make python{2,3} version explicit
2018-08-08 11:18:21 +02:00
Jörg Thalheim
22f35b975d
Merge pull request #44664 from r-ryantm/auto-update/zerotierone
zerotierone: 1.2.10 -> 1.2.12
2018-08-08 06:36:56 +01:00
R. RyanTM
81712b8b5a zerotierone: 1.2.10 -> 1.2.12
Semi-automatic update generated by https://github.com/ryantm/nixpkgs-update tools. This update was made based on information from https://repology.org/metapackage/zerotierone/versions.
2018-08-07 20:58:42 -07:00
rnhmjoj
43bb45136f
speedtest-cli: use python3 2018-08-08 02:20:55 +02:00
rnhmjoj
026ec8cfb5
offlineimap: use python2 2018-08-08 02:20:54 +02:00
Cole Mickens
f84394025e megatools: v2017-10-26 -> v1.10.2 (#44597) 2018-08-07 23:10:38 +02:00
Jan Tojnar
c0bd2946da
networkmanagerapplet: 1.8.14 → 1.8.16
Closes: https://github.com/NixOS/nixpkgs/issues/44253
2018-08-07 20:01:13 +02:00
Jan Tojnar
8bd8c09f98
x11_ssh_askpass: clean up & add man page 2018-08-07 12:08:10 +02:00
Vincent Bernat
bf1473f5e0 haproxy: use getaddrinfo() on Linux (#44489)
As per project's README:

> Recent systems can resolve IPv6 host names using getaddrinfo(). This
> primitive is not present in all libcs and does not work in all of
> them either. Support in glibc was broken before 2.3. Some embedded
> libs may not properly work either, thus, support is disabled by
> default, meaning that some host names which only resolve as IPv6
> addresses will not resolve and configs might emit an error during
> parsing. If you know that your OS libc has reliable support for
> getaddrinfo(), you can add USE_GETADDRINFO=1 on the make command
> line to enable it. This is the recommended option for most Linux
> distro packagers since it's working fine on all recent mainstream
> distros. It is automatically enabled on Solaris 8 and above, as it's
> known to work.

Without this option, it is not possible for HAProxy to solve IPv6-only
names. This option is enabled in Debian builds without any notable
adverse effect.
2018-08-05 18:17:27 +02:00
Vincent Bernat
cc1d82196c haproxy: 1.8.9 -> 1.8.13 (#44487)
The patches previously applied have been included upstream. Upstream
changelog (only MAJOR/MEDIUM):

2018/07/30 : 1.8.13
    - BUG/MEDIUM: h2: don't accept new streams if conn_streams are still in excess
    - BUG/MEDIUM: h2: never leave pending data in the output buffer on close
    - BUG/MEDIUM: h2: make sure the last stream closes the connection after a timeout
    - BUG/MEDIUM: threads: Fix the exit condition of the thread barrier
    - BUG/MEDIUM: stream-int: don't immediately enable reading when the buffer was reportedly full
    - BUG/MEDIUM: stats: don't ask for more data as long as we're responding
    - BUG/MEDIUM: threads/sync: use sched_yield when available
    - BUG/MEDIUM: h2: prevent orphaned streams from blocking a connection forever
    - BUG/MEDIUM: threads: properly fix nbthreads == MAX_THREADS
    - BUG/MEDIUM: threads: unbreak "bind" referencing an incorrect thread number
    - MEDIUM: proxy_protocol: Convert IPs to v6 when protocols are mixed

2018/06/27 : 1.8.12
    - BUG/MAJOR: stick_table: Complete incomplete SEGV fix

2018/06/26 : 1.8.11
    - BUG/MAJOR: Stick-tables crash with segfault when the key is not in the stick-table

2018/06/22 : 1.8.10
    - BUG/MEDIUM: spoe: Flags are not encoded in network order
    - BUG/MEDIUM: contrib/mod_defender: Use network order to encode/decode flags
    - BUG/MEDIUM: contrib/modsecurity: Use network order to encode/decode flags
    - BUG/MEDIUM: cache: don't cache when an Authorization header is present
    - BUG/MEDIUM: dns: Delay the attempt to run a DNS resolution on check failure.
    - BUG/MEDIUM: fd: Only check update_mask against all_threads_mask.
    - BUG/MEDIUM: servers: Add srv_addr default placeholder to the state file
    - BUG/MEDIUM: lua/socket: Length required read doesn't work
    - BUG/MEDIUM: stick-tables: Decrement ref_cnt in table_* converters
    - BUG/MEDIUM: spoe: Return an error when the wrong ACK is received in sync mode
    - BUG/MEDIUM: lua/socket: wrong scheduling for sockets
    - BUG/MAJOR: lua: Dead lock with sockets
    - BUG/MEDIUM: lua/socket: Notification error
    - BUG/MEDIUM: lua/socket: Sheduling error on write: may dead-lock
    - BUG/MEDIUM: lua/socket: Buffer error, may segfault
    - MAJOR: spoe: upgrade the SPOP version to 2.0 and remove the support for 1.0
    - BUG/MEDIUM: threads: handle signal queue only in thread 0
    - BUG/MAJOR: map: fix a segfault when using http-request set-map
    - BUG/MAJOR: ssl: Random crash with cipherlist capture
    - BUG/MAJOR: ssl: OpenSSL context is stored in non-reserved memory slot
    - BUG/MEDIUM: fd: Don't modify the update_mask in fd_dodelete().
    - BUG/MEDIUM: threads: Use the sync point to check active jobs and exit
2018-08-05 16:48:22 +02:00
Mario Rodas
2d7e6b79dc rtorrent: 20161023 -> 0.9.7 2018-08-04 08:35:54 -05:00
Mario Rodas
b723af3174 libtorrent: 20161212 -> 0.13.7 2018-08-04 08:35:54 -05:00
Jan Tojnar
cb4263a7a8
Merge pull request #44037 from flokli/fix-nm-applet-vpn
networkmanager: fix VPN activation through nm-applet
2018-08-04 02:17:27 +02:00
Florian Klink
24726a35d9 networkmanager: fix compile error due to NM_AVAILABLE_IN_1_12_2 macro 2018-08-04 01:32:45 +02:00
Florian Klink
e63ef63c93 network-manager-applet: add patch for import file chooser 2018-08-04 01:08:25 +02:00
Florian Klink
88b2b6c71c network-manager: 1.12.0 -> 1.12.2
fix VPN activation through nm-applet (#43806),
upstream bug https://gitlab.gnome.org/GNOME/network-manager-applet/issues/12
2018-08-04 01:08:25 +02:00
xeji
5c7bf43c24
Merge pull request #44342 from carlosdagos/tinyproxy
tinyproxy: init at 1.8.4
2018-08-02 16:12:12 +02:00
Carlos D'Agostino
a568eec08c tinyproxy: add docbook_xsl and add nonet option to a2x 2018-08-02 23:35:29 +10:00
Carlos D
c431713f99 tinyproxy: init at 1.8.4 2018-08-02 18:36:57 +10:00
Bignaux Ronan
38e582c91d photon: init at 1.0.7 (#44269) 2018-08-02 09:49:54 +02:00
Maximilian Bosch
cd5e01edd9 ocserv: init at 0.12.1 (#42871)
`ocserv` is a VPN server which follows the openconnect protocol
(https://github.com/openconnect/protocol). The packaging is slightly
inspired by the AUR version
(https://aur.archlinux.org/packages/ocserv/).

This patch initializes the package written in C, the man pages and a
module for a simple systemd unit to run the VPN server. The package
supports the following authentication methods for the server:

* `plain` (mostly username/password)
* `pam`

The third method (`radius`) is currently not supported since `nixpkgs`
misses a packaged client.

The module can be used like this:

``` nix
{
  services.ocserv = {
    enable = true;
    config = ''
      ...
    '';
  };
}
```

The option `services.ocserv.config` is required on purpose to
ensure that nobody just enables the service and experiences unexpected
side-effects on the system. For a full reference, please refer to the
man pages, the online docs or the example value.

The docs recommend to simply use `nobody` as user, so no extra user has
been added to the internal user list. Instead a configuration like
this can be used:

```
run-as-user = nobody
run-as-group = nogroup
```

/cc @tenten8401
Fixes #42594
2018-08-01 21:39:09 +02:00
leenaars
2b75a7266c ipgrep: init at 1.0 (#43887) 2018-08-01 15:40:57 +02:00
Jörg Thalheim
7ceaaa6d3a
Merge pull request #44214 from roconnor/bitcoin
Update Bitcoin and its MiniUPnPc dependency
2018-08-01 09:09:45 +01:00
Pascal Bach
b92d6d545c minio-client: 2018-04-28T00-08-20Z -> 2018-07-31T02-28-53Z 2018-08-01 00:36:44 +02:00
Robert Schütz
2ea26fb794
bittornado: init at unstable-2018-02-09 (#43770) 2018-07-31 14:23:15 +02:00
Sarah Brofeldt
cb19404faf
Merge pull request #44245 from Infinisil/add/bukubrow
bukubrow: Init at 2.4.0
2018-07-31 08:35:39 +02:00
Silvan Mosberger
2ee3d84a96
bukubrow: init at 2.4.0 2018-07-30 23:02:19 +02:00
Russell O'Connor
ae669ad68d miniupnpc_2: 2.0.20171212 -> 2.0.20180203 2018-07-29 22:57:45 -04:00
Fernando José Pando
285d770949 httperf: init at 0.9.1
* httperf: init at 0.9.1

- tested on nixos

* httperf: 0.9.1 add ssl support

* httperf: 0.9.1 default-build-phase

* httperf: 0.9.1 fix pname
2018-07-29 09:41:15 -07:00
Jörg Thalheim
08254f2462
Merge pull request #44188 from Ekleog/redsocks-maintain
redsocks: add self as maintainer
2018-07-29 12:23:48 +01:00
Léo Gaspard
6622dffb1d
redsocks: add self as maintainer 2018-07-29 15:58:50 +09:00
Lluís Batlle i Rossell
f54b387b63 Merge remote-tracking branch 'central/master' into viric_clean 2018-07-28 19:25:14 +02:00
Profpatsch
abcc849c9e s6-networking: add ssl support (libressl by default)
For now there’s only support for libressl, but it is built in a way that makes
adding support for e.g. bearssl trivial.
2018-07-27 17:48:32 +02:00
Profpatsch
5ea846a656 s6-dns: 2.2.0.1 -> 2.3.0.0 2018-07-27 17:48:32 +02:00
Daiderd Jordan
7cc5624b3c
Merge pull request #43993 from carlosdagos/cntlm-macos
cntlm: add support for darwin
2018-07-25 21:19:26 +02:00