Commit Graph

154359 Commits

Author SHA1 Message Date
Jörg Thalheim
c0f092c948
Merge pull request #47720 from r-ryantm/auto-update/tiled
tiled: 1.1.6 -> 1.2.0
2018-10-03 11:17:50 +01:00
Jörg Thalheim
3e953d6980
Merge pull request #47724 from xeji/p/st
st: remove unused build inputs, drop wrapper
2018-10-03 11:16:46 +01:00
Andreas Rammhold
1200117b5c
Merge pull request #47712 from andir/firefox
firefox{-bin,}: 62.0.2 -> 62.0.3, firefox-esr-60: 60.2.1 -> 60.2.2
2018-10-03 11:23:20 +02:00
R. RyanTM
c707a8906c tiled: 1.1.6 -> 1.2.0
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/tiled/versions
2018-10-03 01:44:11 -07:00
Uli Baum
63ff7bd008 st: remove unused build inputs, drop wrapper
- remove unused buildInputs
- ncurses belongs in nativeBuildInputs (tic to compile terminfo)
- drop dmenu wrapper, st doesn't use dmenu at all
2018-10-03 10:42:59 +02:00
Sarah Brofeldt
2dd69e8d8e
Merge pull request #47500 from ma9e/libimagequant
libimagequant: init at 2.12.1
2018-10-03 10:27:57 +02:00
Peter Simons
929ad8e996 samsung-unified-linux-driver: update default version to 4.01.17
* Version 4.01.17 works fine for me on NixOS, driving both a Samsung ML-2165w
   and a Samsung ML-2510 printer successfully.

 * Version 4.00.39 is broken. The build shows errors, but doesn't abort. The
   generated binaries don't work, because they are lacking rpaths to their
   library dependencies.

 * Renamed old default.nix file to 1.00.37.nix. That version wasn't the default
   and it feels like a bad idea to mix versioned and unversioned file names in
   the same directory.
2018-10-03 10:25:46 +02:00
Peter Hoeg
949d024dcf
Merge pull request #47710 from r-ryantm/auto-update/zeal
zeal: 0.6.0 -> 0.6.1
2018-10-03 16:06:27 +08:00
Andreas Rammhold
246d2848ff
firefox-esr-60: 60.2.1 -> 60.2.2 [critical security fixes]
This update bumps the package to the latest stable version containing a
few security fixes:

- CVE-2018-12386: Type confusion in JavaScript
  A vulnerability in register allocation in JavaScript can lead to type
  confusion, allowing for an arbitrary read and write. This leads to
  remote code execution inside the sandboxed content process when
  triggered.

- CVE-2018-12387
  A vulnerability where the JavaScript JIT compiler inlines
  Array.prototype.push with multiple arguments that results in the stack
  pointer being off by 8 bytes after a bailout. This leaks a memory
  address to the calling function which can be used as part of an
  exploit inside the sandboxed content process.

Source: https://www.mozilla.org/en-US/security/advisories/mfsa2018-24/
2018-10-03 09:51:13 +02:00
Andreas Rammhold
e7785f1148
firefox: 62.0.2 -> 62.0.3 [critical security fixes]
This update bumps the package to the latest stable version containing a
few security fixes:

- CVE-2018-12386: Type confusion in JavaScript
  A vulnerability in register allocation in JavaScript can lead to type
  confusion, allowing for an arbitrary read and write. This leads to
  remote code execution inside the sandboxed content process when
  triggered.

- CVE-2018-12387
  A vulnerability where the JavaScript JIT compiler inlines
  Array.prototype.push with multiple arguments that results in the stack
  pointer being off by 8 bytes after a bailout. This leaks a memory
  address to the calling function which can be used as part of an
  exploit inside the sandboxed content process.

Source: https://www.mozilla.org/en-US/security/advisories/mfsa2018-24/
2018-10-03 09:51:13 +02:00
Andreas Rammhold
64d02660cb
firefox-bin: 62.0.2 -> 62.0.3 [critical security fixes]
This update bumps the package to the latest stable version containing a
few security fixes:

- CVE-2018-12386: Type confusion in JavaScript
  A vulnerability in register allocation in JavaScript can lead to type
  confusion, allowing for an arbitrary read and write. This leads to
  remote code execution inside the sandboxed content process when
  triggered.

- CVE-2018-12387
  A vulnerability where the JavaScript JIT compiler inlines
  Array.prototype.push with multiple arguments that results in the stack
  pointer being off by 8 bytes after a bailout. This leaks a memory
  address to the calling function which can be used as part of an
  exploit inside the sandboxed content process.

Source: https://www.mozilla.org/en-US/security/advisories/mfsa2018-24/
2018-10-03 09:35:54 +02:00
R. RyanTM
17094f37c9 zeal: 0.6.0 -> 0.6.1
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/zeal/versions
2018-10-03 00:35:14 -07:00
Ryan Mulligan
6455c314a8
Merge pull request #47700 from ryantm/aliaseval
treewide: fix evaluation problems
2018-10-02 21:37:01 -07:00
Ryan Mulligan
856fbc8dba treewide: fix allowAliases = false evaluation problems 2018-10-02 21:33:40 -07:00
Peter Hoeg
7af39cb9b8
Merge pull request #47482 from peterhoeg/f/hyperv
nixos on hyperv: load proper modules and make installer use the module
2018-10-03 11:45:29 +08:00
Peter Hoeg
8bc64b6c24
Merge pull request #47667 from jluttine/nano-wallet-16.1
nano-wallet: 16.0 -> 16.1
2018-10-03 10:42:30 +08:00
aszlig
5e7bf8c5e9
nixos/tests/misc: Fix reboot-wtmp subtest
From commit b63f65aea0:

  I used tmpfiles.d instead of activation snippets to create the logs.
  It's good enough for upstream and other distros; it's probably good
  enough for us.

The "reboot-wtmp" subtest fails because it it assumes that there is a
reboot record even on the initial boot. This is only the case if wtmp is
created within the activation script, but the implementation now uses
tmpfiles.d, so the creation of the file is done at a much later stage.

Apart from that, if you think about the state after the installation as
"first boot", using the term "reboot" wouldn't probably make sense
either.

So in our subtest, we now reboot the machine and check the wtmp record
afterwards as we did before.

Signed-off-by: aszlig <aszlig@nix.build>
Cc: @edolstra, @jameysharp, @Mic92
2018-10-03 03:57:28 +02:00
Sean Haugh
8ba7aa0ed1 libimagequant: add myself as maintainer 2018-10-02 18:29:47 -05:00
Sean Haugh
276d3d8538 libimagequant: init at 2.12.1 2018-10-02 18:29:47 -05:00
Vladyslav M
889c72032f mpv: 0.29.0 -> 0.29.1 (#47689) 2018-10-03 00:34:16 +02:00
Renaud
b6c8246824 gmm: 5.1 -> 5.3 (#47686) 2018-10-03 00:30:36 +02:00
Vladyslav M
3c45be7d9b i3status-rust: 0.9.0.2018-09-30 -> 0.9.0.2018-10-02 (#47687) 2018-10-03 00:29:26 +02:00
Timo Kaufmann
b3e2f32177
Merge pull request #47620 from bachp/unifi-update
Unifi updates
2018-10-03 00:17:44 +02:00
Vladyslav M
bae2f2dbda hyperfine: 1.1.0 -> 1.3.0 (#47521) 2018-10-02 23:41:48 +02:00
Graham Christensen
62b3e55923
Merge pull request #47683 from NixOS/docs-lib-options
docs: lib/options.nix function documentation
2018-10-02 17:34:07 -04:00
Matthew Bauer
33d8ba28aa
Merge pull request #47682 from NixOS/docs-trivial-builders
trivial builders: adding usage documentation for functions
2018-10-02 16:09:44 -05:00
Matthew Bauer
8fd8d72527
Merge pull request #47681 from NixOS/docs-lib-sources
docs: documentation for `cleanSource`
2018-10-02 16:08:27 -05:00
Matthew Bauer
a88b8da554
Merge pull request #47676 from matthewbauer/security-mojave-fix
haskell: fix x509-system on mojave
2018-10-02 15:18:39 -05:00
Matthew Bauer
300ff965ae haskell: fix x509-system on mojave
darwin.security_tool is currently broken in Mojave. See issue #45042
for more info. Our security_tool stuff comes from 10.9 so I suspect
that it needs an update.

Here I am putting in a hack to get things working again. This uses the
system provided security binary at /usr/bin/security to avoid the
issue in Haskell’s x509-system package. Unfortunately, this will break
with the sandbox. I am also working on a proper fix, but this requires
updating lots of Apple stuff (and also copumpkin’s new CF). You can
follow the progress on this branch:

  https://github.com/matthewbauer/nixpkgs/tree/xcode-security

This commit should be backported to release-18.03 and release-18.09.

/cc @copumpkin @lnl7 @pikajude
2018-10-02 15:14:11 -05:00
Samuel Leathers
024eb9a5a5 trivial builders: adding usage documentation for functions 2018-10-02 22:09:09 +02:00
Tobias Pflug
d5166027e2 docs: lib/options.nix function documentation 2018-10-02 22:05:57 +02:00
Tobias Pflug
1d68b5ee84 docs: documentation for cleanSource 2018-10-02 22:05:06 +02:00
Jörg Thalheim
1643967b8d
Merge pull request #47668 from jluttine/syncthing-0.14.51
syncthing: 0.14.50 -> 0.14.51
2018-10-02 20:19:55 +01:00
Jörg Thalheim
83f6cf82c5
Merge pull request #47656 from plapadoo/jetbrains-libnotify
jetbrains: add libnotify to wrapper to enable notifications
2018-10-02 20:11:42 +01:00
Jörg Thalheim
67c86d8bc2
Merge pull request #47673 from dysinger/feature/dysinger
added dysinger as a maintainer
2018-10-02 20:10:52 +01:00
Peter Simons
a4badb243c hledger: fix build of new version 1.11 2018-10-02 21:08:48 +02:00
Peter Simons
8f400527a7 haskell-hspec: update ghc-8.6.x overrides for version 2.5.8 2018-10-02 21:08:47 +02:00
Peter Simons
8841b09c0f haskell-doctest: drop obsolete override for ghc-8.6.x 2018-10-02 21:08:47 +02:00
Peter Simons
ab1a64fe6a hackage-packages.nix: automatic Haskell package set update
This update was generated by hackage2nix v2.11.1 from Hackage revision
8d7d987c0d.
2018-10-02 21:08:42 +02:00
Peter Simons
d072586714 LTS Haskell 12.11 2018-10-02 21:07:59 +02:00
Jörg Thalheim
1de4ebdf9a
Merge pull request #47675 from kalbasit/nixpkgs_update-twa
twa: 1.3.1 -> 1.5.1
2018-10-02 20:07:03 +01:00
Patrick Hilhorst
fbf55e95dc i3lock-color: 2.11-c -> 2.12.c (#47674)
Note the change in naming scheme, this is intentional
(https://github.com/PandorasFox/i3lock-color/issues/92)
2018-10-02 21:03:41 +02:00
Wael M. Nasreddine
9b08685e96
twa: set meta.platforms to platforms.unix 2018-10-02 11:30:55 -07:00
Jörg Thalheim
4c5b6d6e53
Merge pull request #47666 from plapadoo/jshint-phantomjs
jshint: depend on phantomjs2
2018-10-02 19:25:23 +01:00
Jörg Thalheim
b12c759f76
Merge pull request #47563 from jameysharp/unscripted
Replace several activation script snippets with declarative configuration
2018-10-02 19:21:34 +01:00
Wael M. Nasreddine
82b5887cab
twa: 1.3.1 -> 1.5.1 2018-10-02 11:10:58 -07:00
Pascal Bach
8fa7b89353 unifiTesting: 5.9.22 -> 5.9.29 2018-10-02 19:47:38 +02:00
Pascal Bach
9cab954ab6 unifiStable: 5.8.28 -> 5.8.30 2018-10-02 19:47:26 +02:00
Frederik Rietdijk
4d1abc4419
Merge pull request #47604 from NixOS/staging-next
Staging next
2018-10-02 18:22:18 +02:00
Jaakko Luttinen
2671acc471
syncthing: 0.14.50 -> 0.14.51 2018-10-02 19:20:13 +03:00