Commit Graph

4044 Commits

Author SHA1 Message Date
Jörg Thalheim
f2bf4157f7
Merge pull request #45126 from r-ryantm/auto-update/wireguard-tools
wireguard: 0.0.20180802 -> 0.0.20180809
2018-08-17 07:28:52 +02:00
Jörg Thalheim
d70d575151
Merge pull request #45156 from markuskowa/lics-tools
Add license meta tags
2018-08-17 00:31:26 +02:00
Samuel Dionne-Riel
1ac2becd97
Merge pull request #44712 from r-ryantm/auto-update/polygraph
polygraph: 4.11.0 -> 4.12.0
2018-08-16 18:28:09 -04:00
Markus Kowalewski
17702d0416
curl: add license 2018-08-16 21:38:59 +02:00
R. RyanTM
c1486ca1c2 spoofer: 1.3.2 -> 1.3.3
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/spoofer/versions.
2018-08-16 12:11:54 -07:00
R. RyanTM
7fff759f6d wireguard: 0.0.20180802 -> 0.0.20180809
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/wireguard-tools/versions.
2018-08-16 10:49:50 -07:00
Timo Kaufmann
d202dafd4a
Merge pull request #45055 from alyssais/slack-cli
slack-cli: init at 0.18.0
2018-08-16 01:30:33 +02:00
Samuel Leathers
67b1cbb39d
Merge pull request #40399 from rvl/datadog-agent
DataDog Agent v6
2018-08-15 15:53:03 -04:00
Alyssa Ross
0e374a1b9c
slack-cli: fix dirname hack 2018-08-15 16:59:05 +01:00
Alyssa Ross
026f49e28c
slack-cli: remove wrapper package 2018-08-15 15:48:23 +01:00
Alyssa Ross
0a57de6f5b
slack-cli: add metadata 2018-08-15 15:47:24 +01:00
Alyssa Ross
e276965a16
slack-cli: warn when not using SLACK_CLI_TOKEN 2018-08-15 15:47:19 +01:00
Alyssa Ross
dac2235c1a
slack-cli: quote shell variables 2018-08-15 12:32:19 +01:00
Alyssa Ross
d2eacdcd65
slack-cli: use nativeBuildInputs for makeWrapper 2018-08-15 12:32:00 +01:00
Alyssa Ross
838473d3c5
slack-cli: add version to name 2018-08-15 12:28:43 +01:00
Alyssa Ross
ccc8dd222e
slack-cli: use fetchFromGitHub instead of fetchurl 2018-08-15 11:36:28 +01:00
Alyssa Ross
8d2ab1d914
slack-cli: init at 0.18.0
slack-cli must be configured using the SLACK_CLI_TOKEN environment
variable. Using `slack init` will not work because it tries to write to
the Nix store.
2018-08-15 09:56:04 +01:00
Markus Kowalewski
038cd7533e
altermime: add license 2018-08-14 13:33:05 +02:00
Vladimír Čunát
ded9a4b1aa
Merge branch 'staging-next' into staging
Commits from master, conflict resolutions, etc.
2018-08-13 20:57:50 +02:00
Vladimír Čunát
5b0398dc36
Merge branch 'master' into staging-next
Conflicts: gobby and libinfinity - I took the hand-edited versions
instead of those resuting from the mass-replacement.

Hydra: ?compare=1473190
2018-08-13 20:43:59 +02:00
Wout Mertens
a69f61df21
siege: build on all Unix
Confirmed to work on Darwin
2018-08-13 16:05:53 +02:00
Vladimír Čunát
00df25ee57
Merge branch 'master' into staging-next
Hydra: ?compare=1472947
2018-08-12 10:33:41 +02:00
Tor Hedin Brønner
580cab57e4
wget, fwknop: fixup after configureFlags refactoring 2018-08-12 10:08:46 +02:00
Franz Pletz
7d4efc17a0
wget: fix build 2018-08-11 22:09:22 +02:00
Timo Kaufmann
921e5ceef3
Merge pull request #44894 from markuskowa/sqlite-lic
Fix licenses (#43716)
2018-08-11 15:31:29 +02:00
Markus Kowalewski
c2cfaec0c9
ssmtp: add license 2018-08-11 14:34:24 +02:00
Markus Kowalewski
e91ef7c74c
sshpass: add license 2018-08-11 14:33:52 +02:00
Jan Malakhovski
e745d7976e mailutils: use checkInputs, make tests run, but disable, also cleanup 2018-08-11 09:35:34 +00:00
Jan Malakhovski
131e6d664b socat: make tests run, but disable 2018-08-11 09:35:33 +00:00
Jan Malakhovski
fea886b31f aria2: make tests run, but disable 2018-08-11 09:35:33 +00:00
Jan Malakhovski
3b16f3d467 tcpdump: use checkInputs, fix tests 2018-08-11 09:35:28 +00:00
Jan Malakhovski
75993b0f93 swec: use checkInputs 2018-08-11 09:35:26 +00:00
Jan Malakhovski
2cd4bcec4a chrony: fix tests 2018-08-11 09:35:21 +00:00
Pascal Wittmann
a34579e01e
Merge branch 'master' into add-missing-licenses
Conflicts:
	pkgs/tools/networking/network-manager/fortisslvpn.nix
2018-08-11 09:36:34 +02:00
Frederik Rietdijk
d9fa74ba78 Merge master into staging 2018-08-09 18:28:15 +02:00
Jan Tojnar
86254f07b8
networkmanager_strongswan: 1.4.3 → 1.4.4 2018-08-09 18:17:40 +02:00
Jan Tojnar
87cf73bd1a
networkmanager-openconnect: clean up 2018-08-09 18:17:40 +02:00
Jan Tojnar
93d728b2ed
networkmanager-fortisslvpn: clean up 2018-08-09 18:17:34 +02:00
Jan Tojnar
cb32ca2645
networkmanager-iodine: clean up 2018-08-09 18:17:32 +02:00
Jan Tojnar
3fa8a478e3
networkmanager-l2tp: 1.2.8 → 1.2.10 2018-08-09 18:17:32 +02:00
Jan Tojnar
7f175f2ad7
networkmanager-vpnc: clean up 2018-08-09 18:17:26 +02:00
Jan Tojnar
bababf31c0
networkmanager-openconnect: move to a subdirectory 2018-08-09 18:16:43 +02:00
Jan Tojnar
73539d3939
networkmanager-fortisslvpn: move to a subdirectory 2018-08-09 17:37:12 +02:00
Jan Tojnar
1f6f4e69d1
networkmanager-iodine: move to a subdirectory 2018-08-09 17:37:12 +02:00
Jan Tojnar
3fb05d10d0
networkmanager-l2tp: move to a subdirectory 2018-08-09 17:37:11 +02:00
Jan Tojnar
cbbf0f1447
networkmanager-vpnc: move to a subdirectory 2018-08-09 17:37:10 +02:00
Jan Tojnar
11b4c9cb8e
networkmanager-openvpn: cleanup 2018-08-09 17:37:10 +02:00
Jan Tojnar
d2f75c32de
networkmanagerapplet: clean up 2018-08-09 17:37:09 +02:00
Vincent Ambo
924016f45f dd-agent: Simplify inclusion of additional Datadog core integrations
Refactors the process used to build the Datadog core integrations to
be more easily extensible with integrations other than the ones built
and installed by default.

Documentation has been added in relevant parts of the module to
describe how the process works.

As a high-level overview:

The `datadog-integrations-core` attribute in the top-level package set
now accepts an extra parameter.

This parameter is an attribute set where each key is the name of a
Datadog integration as it appears in Datadog's integrations-core
repository[1], and the value is a function that receives the Python
package set and returns the required dependencies of this integration.

For example:

    datadog-integrations-core {
      ntp = (ps: [ ps.ntplib ]);
    };

This would build the default integrations and, additionally, the `ntp`
integration.

To support passing the modified Python environment to the
datadog-agent itself, the `python` key has been moved inside of the
derivation which means that it will be made overridable.

This relates to NixOS/nixpkgs#40399.

[1]: https://github.com/DataDog/integrations-core
2018-08-09 17:25:23 +02:00
Rodney Lorrimar
fb6679151a datadog-integrations-core: init at git-2018-05-27 2018-08-09 16:53:30 +02:00
Rodney Lorrimar
637cc2a35e datadog-agent: init at 6.1.4
DataDog have adopted a subtle naming convention:

 - dd-agent refers to the v5 Python implementation
 - datadog-agent refers to the v6 golang implementation
2018-08-09 16:53:29 +02:00
Pascal Wittmann
af8cd3c74e
Merge branch 'master' into add-missing-licenses
Conflicts:
	pkgs/applications/version-management/subversion/default.nix
2018-08-09 13:10:27 +02:00
Pascal Wittmann
8915ed06b3
networkmanager-fortisslvpn: add license
see issue #43716
2018-08-09 13:03:31 +02:00
Vladyslav M
ce3e962031 wireguard: 0.0.20180708 -> 0.0.20180802 (#44490) 2018-08-09 00:54:10 +02:00
R. RyanTM
54b14db807 lftp: 4.8.3 -> 4.8.4
Semi-automatic update generated by https://github.com/ryantm/nixpkgs-update tools. This update was made based on information from https://repology.org/metapackage/lftp/versions.
2018-08-09 00:33:45 +02:00
R. RyanTM
4a1d0b12bf polygraph: 4.11.0 -> 4.12.0
Semi-automatic update generated by https://github.com/ryantm/nixpkgs-update tools. This update was made based on information from https://repology.org/metapackage/polygraph/versions.
2018-08-08 04:32:56 -07:00
Robert Schütz
6342ab656c
Merge pull request #44446 from rnhmjoj/python2->python3
Make python{2,3} version explicit
2018-08-08 11:18:21 +02:00
Jörg Thalheim
22f35b975d
Merge pull request #44664 from r-ryantm/auto-update/zerotierone
zerotierone: 1.2.10 -> 1.2.12
2018-08-08 06:36:56 +01:00
R. RyanTM
81712b8b5a zerotierone: 1.2.10 -> 1.2.12
Semi-automatic update generated by https://github.com/ryantm/nixpkgs-update tools. This update was made based on information from https://repology.org/metapackage/zerotierone/versions.
2018-08-07 20:58:42 -07:00
rnhmjoj
43bb45136f
speedtest-cli: use python3 2018-08-08 02:20:55 +02:00
rnhmjoj
026ec8cfb5
offlineimap: use python2 2018-08-08 02:20:54 +02:00
Cole Mickens
f84394025e megatools: v2017-10-26 -> v1.10.2 (#44597) 2018-08-07 23:10:38 +02:00
Jan Tojnar
c0bd2946da
networkmanagerapplet: 1.8.14 → 1.8.16
Closes: https://github.com/NixOS/nixpkgs/issues/44253
2018-08-07 20:01:13 +02:00
Jan Tojnar
8bd8c09f98
x11_ssh_askpass: clean up & add man page 2018-08-07 12:08:10 +02:00
Pascal Wittmann
f7be21f4c9
Merge branch 'master' into add-missing-licenses
Conflicts:
	pkgs/development/libraries/exiv2/default.nix
        Set license to gpl2Plus
2018-08-06 12:04:52 +02:00
Vincent Bernat
bf1473f5e0 haproxy: use getaddrinfo() on Linux (#44489)
As per project's README:

> Recent systems can resolve IPv6 host names using getaddrinfo(). This
> primitive is not present in all libcs and does not work in all of
> them either. Support in glibc was broken before 2.3. Some embedded
> libs may not properly work either, thus, support is disabled by
> default, meaning that some host names which only resolve as IPv6
> addresses will not resolve and configs might emit an error during
> parsing. If you know that your OS libc has reliable support for
> getaddrinfo(), you can add USE_GETADDRINFO=1 on the make command
> line to enable it. This is the recommended option for most Linux
> distro packagers since it's working fine on all recent mainstream
> distros. It is automatically enabled on Solaris 8 and above, as it's
> known to work.

Without this option, it is not possible for HAProxy to solve IPv6-only
names. This option is enabled in Debian builds without any notable
adverse effect.
2018-08-05 18:17:27 +02:00
Vincent Bernat
cc1d82196c haproxy: 1.8.9 -> 1.8.13 (#44487)
The patches previously applied have been included upstream. Upstream
changelog (only MAJOR/MEDIUM):

2018/07/30 : 1.8.13
    - BUG/MEDIUM: h2: don't accept new streams if conn_streams are still in excess
    - BUG/MEDIUM: h2: never leave pending data in the output buffer on close
    - BUG/MEDIUM: h2: make sure the last stream closes the connection after a timeout
    - BUG/MEDIUM: threads: Fix the exit condition of the thread barrier
    - BUG/MEDIUM: stream-int: don't immediately enable reading when the buffer was reportedly full
    - BUG/MEDIUM: stats: don't ask for more data as long as we're responding
    - BUG/MEDIUM: threads/sync: use sched_yield when available
    - BUG/MEDIUM: h2: prevent orphaned streams from blocking a connection forever
    - BUG/MEDIUM: threads: properly fix nbthreads == MAX_THREADS
    - BUG/MEDIUM: threads: unbreak "bind" referencing an incorrect thread number
    - MEDIUM: proxy_protocol: Convert IPs to v6 when protocols are mixed

2018/06/27 : 1.8.12
    - BUG/MAJOR: stick_table: Complete incomplete SEGV fix

2018/06/26 : 1.8.11
    - BUG/MAJOR: Stick-tables crash with segfault when the key is not in the stick-table

2018/06/22 : 1.8.10
    - BUG/MEDIUM: spoe: Flags are not encoded in network order
    - BUG/MEDIUM: contrib/mod_defender: Use network order to encode/decode flags
    - BUG/MEDIUM: contrib/modsecurity: Use network order to encode/decode flags
    - BUG/MEDIUM: cache: don't cache when an Authorization header is present
    - BUG/MEDIUM: dns: Delay the attempt to run a DNS resolution on check failure.
    - BUG/MEDIUM: fd: Only check update_mask against all_threads_mask.
    - BUG/MEDIUM: servers: Add srv_addr default placeholder to the state file
    - BUG/MEDIUM: lua/socket: Length required read doesn't work
    - BUG/MEDIUM: stick-tables: Decrement ref_cnt in table_* converters
    - BUG/MEDIUM: spoe: Return an error when the wrong ACK is received in sync mode
    - BUG/MEDIUM: lua/socket: wrong scheduling for sockets
    - BUG/MAJOR: lua: Dead lock with sockets
    - BUG/MEDIUM: lua/socket: Notification error
    - BUG/MEDIUM: lua/socket: Sheduling error on write: may dead-lock
    - BUG/MEDIUM: lua/socket: Buffer error, may segfault
    - MAJOR: spoe: upgrade the SPOP version to 2.0 and remove the support for 1.0
    - BUG/MEDIUM: threads: handle signal queue only in thread 0
    - BUG/MAJOR: map: fix a segfault when using http-request set-map
    - BUG/MAJOR: ssl: Random crash with cipherlist capture
    - BUG/MAJOR: ssl: OpenSSL context is stored in non-reserved memory slot
    - BUG/MEDIUM: fd: Don't modify the update_mask in fd_dodelete().
    - BUG/MEDIUM: threads: Use the sync point to check active jobs and exit
2018-08-05 16:48:22 +02:00
Pascal Wittmann
e7c9273b87
getmail: add license
see issue #43716
2018-08-05 16:43:09 +02:00
Pascal Wittmann
1058537c7c
rtorrent: add license
see issue #43716
2018-08-04 19:12:54 +02:00
Pascal Wittmann
e700483077
sstp: add license
see issue #43716
2018-08-04 16:59:43 +02:00
Pascal Wittmann
8743f8f29a
surfraw: add license
see issue #43716
2018-08-04 16:55:09 +02:00
Mario Rodas
2d7e6b79dc rtorrent: 20161023 -> 0.9.7 2018-08-04 08:35:54 -05:00
Mario Rodas
b723af3174 libtorrent: 20161212 -> 0.13.7 2018-08-04 08:35:54 -05:00
Tuomas Tynkkynen
008fd5fcf5 Merge remote-tracking branch 'upstream/master' into staging 2018-08-04 15:17:42 +03:00
Jan Tojnar
cb4263a7a8
Merge pull request #44037 from flokli/fix-nm-applet-vpn
networkmanager: fix VPN activation through nm-applet
2018-08-04 02:17:27 +02:00
Florian Klink
24726a35d9 networkmanager: fix compile error due to NM_AVAILABLE_IN_1_12_2 macro 2018-08-04 01:32:45 +02:00
Florian Klink
e63ef63c93 network-manager-applet: add patch for import file chooser 2018-08-04 01:08:25 +02:00
Florian Klink
88b2b6c71c network-manager: 1.12.0 -> 1.12.2
fix VPN activation through nm-applet (#43806),
upstream bug https://gitlab.gnome.org/GNOME/network-manager-applet/issues/12
2018-08-04 01:08:25 +02:00
John Ericson
f0d6b385d1 treewide: Make all the rest of configureFlags 2018-08-03 17:06:03 -04:00
John Ericson
db965063b3 treewide: Make configureFlags lists 2018-08-03 17:06:03 -04:00
John Ericson
85a9913edd treewide: Make more complicated configureFlags lists 2018-08-03 17:06:03 -04:00
xeji
5c7bf43c24
Merge pull request #44342 from carlosdagos/tinyproxy
tinyproxy: init at 1.8.4
2018-08-02 16:12:12 +02:00
Carlos D'Agostino
a568eec08c tinyproxy: add docbook_xsl and add nonet option to a2x 2018-08-02 23:35:29 +10:00
Carlos D
c431713f99 tinyproxy: init at 1.8.4 2018-08-02 18:36:57 +10:00
Bignaux Ronan
38e582c91d photon: init at 1.0.7 (#44269) 2018-08-02 09:49:54 +02:00
Maximilian Bosch
cd5e01edd9 ocserv: init at 0.12.1 (#42871)
`ocserv` is a VPN server which follows the openconnect protocol
(https://github.com/openconnect/protocol). The packaging is slightly
inspired by the AUR version
(https://aur.archlinux.org/packages/ocserv/).

This patch initializes the package written in C, the man pages and a
module for a simple systemd unit to run the VPN server. The package
supports the following authentication methods for the server:

* `plain` (mostly username/password)
* `pam`

The third method (`radius`) is currently not supported since `nixpkgs`
misses a packaged client.

The module can be used like this:

``` nix
{
  services.ocserv = {
    enable = true;
    config = ''
      ...
    '';
  };
}
```

The option `services.ocserv.config` is required on purpose to
ensure that nobody just enables the service and experiences unexpected
side-effects on the system. For a full reference, please refer to the
man pages, the online docs or the example value.

The docs recommend to simply use `nobody` as user, so no extra user has
been added to the internal user list. Instead a configuration like
this can be used:

```
run-as-user = nobody
run-as-group = nogroup
```

/cc @tenten8401
Fixes #42594
2018-08-01 21:39:09 +02:00
leenaars
2b75a7266c ipgrep: init at 1.0 (#43887) 2018-08-01 15:40:57 +02:00
Jörg Thalheim
7ceaaa6d3a
Merge pull request #44214 from roconnor/bitcoin
Update Bitcoin and its MiniUPnPc dependency
2018-08-01 09:09:45 +01:00
Pascal Bach
b92d6d545c minio-client: 2018-04-28T00-08-20Z -> 2018-07-31T02-28-53Z 2018-08-01 00:36:44 +02:00
Robert Schütz
2ea26fb794
bittornado: init at unstable-2018-02-09 (#43770) 2018-07-31 14:23:15 +02:00
Sarah Brofeldt
cb19404faf
Merge pull request #44245 from Infinisil/add/bukubrow
bukubrow: Init at 2.4.0
2018-07-31 08:35:39 +02:00
Silvan Mosberger
2ee3d84a96
bukubrow: init at 2.4.0 2018-07-30 23:02:19 +02:00
Russell O'Connor
ae669ad68d miniupnpc_2: 2.0.20171212 -> 2.0.20180203 2018-07-29 22:57:45 -04:00
Fernando José Pando
285d770949 httperf: init at 0.9.1
* httperf: init at 0.9.1

- tested on nixos

* httperf: 0.9.1 add ssl support

* httperf: 0.9.1 default-build-phase

* httperf: 0.9.1 fix pname
2018-07-29 09:41:15 -07:00
Jörg Thalheim
08254f2462
Merge pull request #44188 from Ekleog/redsocks-maintain
redsocks: add self as maintainer
2018-07-29 12:23:48 +01:00
Léo Gaspard
6622dffb1d
redsocks: add self as maintainer 2018-07-29 15:58:50 +09:00
Lluís Batlle i Rossell
f54b387b63 Merge remote-tracking branch 'central/master' into viric_clean 2018-07-28 19:25:14 +02:00
Profpatsch
abcc849c9e s6-networking: add ssl support (libressl by default)
For now there’s only support for libressl, but it is built in a way that makes
adding support for e.g. bearssl trivial.
2018-07-27 17:48:32 +02:00
Profpatsch
5ea846a656 s6-dns: 2.2.0.1 -> 2.3.0.0 2018-07-27 17:48:32 +02:00
Daiderd Jordan
7cc5624b3c
Merge pull request #43993 from carlosdagos/cntlm-macos
cntlm: add support for darwin
2018-07-25 21:19:26 +02:00