Commit Graph

56 Commits

Author SHA1 Message Date
Peter Simons
476635afe1 Drop myself from meta.maintainers for most packages.
I'd like to reduce the number of Github notifications and
review requests I receive.
2021-10-14 11:01:27 +02:00
Ryan Burns
41574158a0 libgpg-error: rename from libgpgerror
Matches pname and upstream project name
2021-10-06 18:23:43 -07:00
Alyssa Ross
1626c49714 gnupg: drop obsolete Emacs syntax highlighting fix
Emacs + nix-mode highlights this file just fine without this comment
for me, so I assume the problem in nix-mode has been fixed in the five
years since this comment was added.
2021-02-07 16:11:22 +00:00
Ben Siraphob
76f93cc731 pkgs/tools: pkgconfig -> pkg-config 2021-01-16 23:49:59 -08:00
Ben Siraphob
8c5d37129f pkgs/tools: stdenv.lib -> lib 2021-01-15 17:12:36 +07:00
Michael Weiss
d88ad75767 gnupg: 2.2.26 -> 2.2.27
Announcement: https://lists.gnupg.org/pipermail/gnupg-announce/2021q1/000452.html

Luckily this fixes a regression from GnuPG 2.2.26 that broke the build
of libsForQt5.qgpgme (a test failed). Fix #109009.
2021-01-12 08:33:48 +01:00
Profpatsch
4a7f99d55d treewide: with stdenv.lib; in meta -> with lib;
Part of: https://github.com/NixOS/nixpkgs/issues/108938

meta = with stdenv.lib;

is a widely used pattern. We want to slowly remove
the `stdenv.lib` indirection and encourage people
to use `lib` directly. Thus let’s start with the meta
field.

This used a rewriting script to mostly automatically
replace all occurances of this pattern, and add the
`lib` argument to the package header if it doesn’t
exist yet.

The script in its current form is available at
https://cs.tvl.fyi/depot@2f807d7f141068d2d60676a89213eaa5353ca6e0/-/blob/users/Profpatsch/nixpkgs-rewriter/default.nix
2021-01-11 10:38:22 +01:00
Luke Bentley-Fox
374e3033d1 gnupg: 2.2.25 -> 2.2.26 2021-01-04 18:18:26 +01:00
R. RyanTM
8d9de19300
gnupg: 2.2.24 -> 2.2.25 (#106400) 2020-12-31 06:56:29 +01:00
R. RyanTM
9979bc5b8a gnupg: 2.2.23 -> 2.2.24 2020-11-25 10:32:32 -08:00
WORLDofPEACE
309ce3f8a1
Merge pull request #100031 from ju1m/gnupg
gnupg: put libexec tools (eg. gpg-preset-passphrase) in PATH
2020-10-25 17:39:50 -04:00
Julien Moutinho
d5d543d263 gnupg: put libexec tools (eg. gpg-preset-passphrase) in PATH 2020-10-08 16:35:34 +02:00
Doron Behar
9252369134 gnupg: 2.2.22 -> 2.2.23 2020-09-04 20:04:29 +02:00
Doron Behar
2131a1df39 gnupg: 2.2.21 -> 2.2.22 2020-08-29 13:36:15 +02:00
Pavol Rusnak
e296e89d75
gnupg22: 2.2.20 -> 2.2.21
Fix reproducibility by fixing SOURCE_DATE_EPOCH usage
2020-07-27 18:22:26 +02:00
Linus Heckemann
6673a4988e
gnupg: use libusb1 (#85374)
* gnupg: use libusb1

This fixes scdaemon's direct ccid support.

* systemd: fix gnupg-minimal
2020-04-21 08:35:40 +02:00
Michael Reilly
84cf00f980
treewide: Per RFC45, remove all unquoted URLs 2020-04-10 17:54:53 +01:00
Lancelot SIX
24e38aab9c
gnupg: 2.2.19 -> 2.2.20
See https://lists.gnu.org/archive/html/info-gnu/2020-03/msg00008.html
for release information.
2020-03-21 00:03:43 +01:00
Vincent Breitmoser
7cc68a961d gnupg: apply patch to allow import of key updates without user ids
This adds a patch series which allows GnuPG to import updates
(revocations and subkeys) from certificates that contain no user ids.
This is relevant for refreshing keys from the default keyserver
keys.openpgp.org, where only user ids that contain verified email
addresses will be distributed, and revoked keys never contain any user
ids.

This patch series was originally authored and submitted to upstream half
a year ago (by me), but now comes from Debian packaging where it's been
included since then.

Relates to the following upstream issue: https://dev.gnupg.org/T4393
2020-03-06 06:58:56 +01:00
Lancelot SIX
84c16b7d39 gnupg: 2.2.18 -> 2.2.19
See https://lists.gnu.org/archive/html/info-gnu/2019-12/msg00001.html
for release information.
2019-12-10 18:56:32 +01:00
Lancelot SIX
52a0f0632b
gnupg: 2.2.17 -> 2.2.18
See https://lists.gnu.org/archive/html/info-gnu/2019-11/msg00010.html
for release information
2019-11-26 00:06:41 +01:00
wucke13
d1270ac85b gnugp: adding option for minimal build
Basically a flavour of gnugpg, which solely containts `bin/gnupg`.
2019-11-02 21:32:06 +01:00
Franz Pletz
3d832dee59 gnupg: disable gui/pinentry support by default
This solves the dependency cycle in gcr alternatively so there won't be
two gnupg store paths in a standard NixOS system which has udisks2 enabled
by default.

NixOS users are expected to use the gpg-agent user service to pull in the
appropriate pinentry flavour or install it on their systemPackages and set
it in their local gnupg agent config instead.

Co-authored-by: Florian Klink <flokli@flokli.de>
2019-10-16 20:31:16 -04:00
Nick Spinale
e39d627a12 gnupg: fix cross-compilation 2019-09-16 10:48:24 +00:00
volth
46420bbaa3 treewide: name -> pname (easy cases) (#66585)
treewide replacement of

stdenv.mkDerivation rec {
  name = "*-${version}";
  version = "*";

to pname
2019-08-15 13:41:18 +01:00
Will Dietz
c793a1d422
gnupg: 2.2.16 -> 2.2.17
https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
2019-07-09 13:18:34 -05:00
Alyssa Ross
4cab72953c
gnupg: vendor SKS patch
This quickly became a 404 upstream.

Fixes https://github.com/NixOS/nixpkgs/64256.
2019-07-03 16:39:28 +00:00
Alyssa Ross
ba23c14b84
gnupg: apply default server CA verification patch
See discussion at
https://github.com/NixOS/nixpkgs/pull/63952#issuecomment-507048690.

Upstream commit:

commit 1c9cc97e9d47d73763810dcb4a36b6cdf31a2254
Author: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Date:   Sun Jun 30 11:54:35 2019 -0400

    dirmngr: Only use SKS pool CA for SKS pool

    * dirmngr/http.c (http_session_new): when checking whether the
    keyserver is the HKPS pool, check specifically against the pool name,
    as ./configure might have been used to select a different default
    keyserver.  It makes no sense to apply Kristian's certificate
    authority to anything other than the literal host
    hkps.pool.sks-keyservers.net.

    Signed-off-by: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
    GnuPG-Bug-Id: 4593
2019-06-30 19:06:17 +00:00
Alyssa Ross
c727083e65
gnupg: change default keyserver to non-SKS
See https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f.

The SKS network is vulnerable to certificate poisoning, which can
destroy GnuPG installations. keys.openpgp.org is a new non-SKS keyserver
that is resistant to this type of attack.

With such an attack being possible, it is unsafe to use SKS keyservers
for almost anything, and so we should protect our users from a now
unsafe default. keys.openpgp.org offers some (but not all) functionality
of SKS, and is better than nothing.

This default is only present in gnupg22. gnupg20 and gnupg1orig are not
affected.
2019-06-30 14:09:02 +00:00
Will Dietz
3f7657d7fb
gnupg: 2.2.15 -> 2.2.16
https://dev.gnupg.org/T4509
2019-05-28 21:06:20 -05:00
Peter Simons
806d022395
Merge pull request #58381 from dtzWill/update/gnupg-2.2.15
gnupg: 2.2.14 -> 2.2.15
2019-03-26 20:14:37 +01:00
Will Dietz
4f1d76275e gnupg: 2.2.14 -> 2.2.15
https://dev.gnupg.org/T4434
2019-03-26 11:09:54 -05:00
Peter Simons
98dcfed615
Merge pull request #57818 from illegalprime/fix/gnupg-cross
gnupg: use config flags to find lib prefix instead of their binary tools
2019-03-26 13:57:43 +01:00
Will Dietz
43ed5cb1df gnupg: 2.2.13 -> 2.2.14
https://lists.gnupg.org/pipermail/gnupg-announce/2019q1/000435.html
2019-03-19 07:34:02 -05:00
Michael Eden
268f15915b gnupg: use config flags to find lib prefix instead of their binary tools 2019-03-16 16:29:38 -04:00
Will Dietz
a3db3e5d12 gnupg: 2.2.12 -> 2.2.13
https://dev.gnupg.org/T4290
2019-02-12 12:55:11 -06:00
Jörg Thalheim
b5c1deca8a
treewide: remove wkennington as maintainer
He prefers to contribute to his own nixpkgs fork triton.
Since he is still marked as maintainer in many packages
this leaves the wrong impression he still maintains those.
2019-01-26 10:05:32 +00:00
Will Dietz
19f303a144 gnupg: 2.2.11 -> 2.2.12
https://dev.gnupg.org/T4289
2018-12-19 09:14:43 +01:00
Lancelot SIX
ace631b616
gnupg22: 2.2.10 -> 2.2.11
See http://lists.gnu.org/archive/html/info-gnu/2018-11/msg00003.html for
release information
2018-11-06 15:59:38 +01:00
Lancelot SIX
e2d8e06a9f gnupg22: 2.2.9 -> 2.2.10 (#45809)
See https://lists.gnu.org/archive/html/info-gnu/2018-08/msg00010.html
for release information
2018-08-31 08:34:55 +02:00
Lancelot SIX
b9fbcfb487 gnupg: 2.2.8 -> 2.2.9 (#43431)
See https://lists.gnu.org/archive/html/info-gnu/2018-07/msg00003.html
for release information.
2018-08-02 21:39:13 +02:00
volth
52f53c69ce pkgs/*: remove unreferenced function arguments 2018-07-21 02:48:04 +00:00
Jan Tojnar
3784fd5e46
pcsclite: split package 2018-06-29 04:40:54 +02:00
Andreas Rammhold
1abc0537b6
gnupg: 2.2.7 -> 2.2.8
This addresses CVE-2018-12020. The details can be retrived from the
changelog [1].

[1] https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000425.html
2018-06-10 21:30:52 +02:00
Lancelot SIX
130aee566d
gnupg: 2.2.6 -> 2.2.7
See http://lists.gnu.org/archive/html/info-gnu/2018-05/msg00004.html for
release informations.
2018-05-03 10:34:35 +02:00
Lancelot SIX
ecc5a2bc15
gnupg: 2.2.5 -> 2.2.6
See http://lists.gnu.org/archive/html/info-gnu/2018-04/msg00005.html for
release information
2018-04-16 12:17:24 +02:00
Matthew Bauer
ed2a9cf65f treewide: remove libintl hacks 2018-03-22 16:50:11 -05:00
Lancelot SIX
0b455cec93 gnupg: 2.2.4 -> 2.2.5
See http://lists.gnu.org/archive/html/info-gnu/2018-02/msg00005.html
for release information
2018-03-05 15:12:52 +01:00
Lancelot SIX
2beb8389df
gnupg: 2.2.3 -> 2.2.4
See http://lists.gnu.org/archive/html/info-gnu/2017-12/msg00013.html
for release information
2017-12-21 11:57:54 +01:00
Lancelot SIX
5f5d8e67a7
gnupg: 2.2.2 -> 2.2.3
This is a maintenance release.
See http://lists.gnu.org/archive/html/info-gnu/2017-11/msg00008.html
for release information
2017-11-21 17:58:29 +01:00