Commit graph

6784 commits

Author SHA1 Message Date
Ryan Mulligan
038a0c9a60 treewide: http to https 2018-04-30 21:39:20 -07:00
Will Dietz
4b7b083bcb treewide: stdenv.lib.platforms.gnu -> ... gnu ++ linux
Include all linux platforms.
2018-04-30 18:12:10 -05:00
Will Dietz
855e0463ab tree-wide: platforms = platforms.gnu; -> platforms = gnu ++ linux
"platforms.gnu" has been linux-only since at least 17.03:

$ nix eval -f channel:nixos-17.03 lib.platforms.gnu
[ "i686-linux" "x86_64-linux" "armv5tel-linux" "armv6l-linux" "armv7l-linux" "aarch64-linux" "mips64el-linux" ]

Unlike platforms.linux, platforms.gnu indicates "must use glibc"
which for the most part is not intended.

Replacing platforms.gnu with platforms.linux would be the same "today"
but let's err on preserving existing behavior and be optimistic
about platforms these packages work on.
2018-04-30 18:08:48 -05:00
xeji
bfb26debdb
Merge pull request #39732 from r-ryantm/auto-update/riot-web
riot-web: 0.14.0 -> 0.14.1
2018-04-30 23:12:25 +02:00
R. RyanTM
dc2f012215 riot-web: 0.14.0 -> 0.14.1
Semi-automatic update generated by https://github.com/ryantm/nixpkgs-update tools.

This update was made based on information from https://repology.org/metapackage/riot-web/versions.

These checks were done:

- built on NixOS
- Warning: no binary found that responded to help or version flags. (This warning appears even if the package isn't expected to have binaries.)
- found 0.14.1 with grep in /nix/store/77d4rg2yy4gj8m1mvrw6zqhdi7jv7cg8-riot-web-0.14.1
- directory tree listing: https://gist.github.com/4606f4af0dcfc7ef1ece43dfe4b38abe
2018-04-30 10:12:01 -07:00
Ben Gamari
eaf71dd33e notmuch: 0.26.1 -> 0.26.2 2018-04-30 12:21:55 -04:00
Peter Hoeg
dbcdcb63d8 quaternion: 0.0.5 -> 0.0.9 2018-04-30 17:25:02 +08:00
Robert Schütz
463dbec94e
Merge pull request #39693 from danielfullmer/rclone-1.41
rclone: 1.40 -> 1.41
2018-04-30 09:05:52 +02:00
Peter Hoeg
12d89a7ed9
Merge pull request #39147 from peterhoeg/u/tox
tox: libtoxcore and assorted tox client updates
2018-04-30 04:07:30 +00:00
worldofpeace
82080d77a0
wire-desktop: correct desktopItem 2018-04-29 20:32:41 -04:00
Daniel Fullmer
841643796a rclone: 1.40 -> 1.41 2018-04-29 20:03:05 -04:00
Peter Hoeg
8ce6587966 utox: 0.16.1 -> 0.17.0 2018-04-30 07:55:07 +08:00
Léo Gaspard
905b03bce2 chromium: fix build on aarch64
chromium build on aarch64 failed with:
```
FAILED: obj/skia/skia/convolver_neon.o
g++ -MMD -MF obj/skia/skia/convolver_neon.o.d -DV8_DEPRECATION_WARNINGS -DUSE_UDEV -DUSE_AURA=1 -DUSE_GLIB=1 -DUSE_NSS_CERTS=1 -DUSE_X11=1 -DNO_TCMALLOC -DFULL_SAFE_BROWSING -DSAFE_BROWSING_CSD -DSAFE_BROWSING_DB_LOCAL -DCHROMIUM_BUILD -D_FILE_OFFSET_BITS=64 -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE -D_LIBCPP_DISABLE_VISIBILITY_ANNOTATIONS -D_LIBCXXABI_DISABLE_VISIBILITY_ANNOTATIONS -DNDEBUG -DNVALGRIND -DDYNAMIC_ANNOTATIONS_ENABLED=0 -DSK_IGNORE_LINEONLY_AA_CONVEX_PATH_OPTS -DSK_HAS_PNG_LIBRARY -DSK_HAS_WEBP_LIBRARY -DSK_HAS_JPEG_LIBRARY -DSK_SUPPORT_GPU=1 -DSK_FREETYPE_MINIMUM_RUNTIME_VERSION=\(\(\(FREETYPE_MAJOR\)\ \*\ 0x01000000\)\ \|\ \(\(FREETYPE_MINOR\)\ \*\ 0x00010000\)\ \|\ \(\(FREETYPE_PATCH\)\ \*\ 0x00000100\)\) -DSK_GAMMA_EXPONENT=1.2 -DSK_GAMMA_CONTRAST=0.2 -DSK_DEFAULT_FONT_CACHE_LIMIT=20971520 -DGLIB_VERSION_MAX_ALLOWED=GLIB_VERSION_2_32 -DGLIB_VERSION_MIN_REQUIRED=GLIB_VERSION_2_26 -DFT_CONFIG_CONFIG_H=\"freetype-custom-config/ftconfig.h\" -DFT_CONFIG_MODULES_H=\"freetype-custom-config/ftmodule.h\" -DFT_CONFIG_OPTIONS_H=\"freetype-custom-config/ftoption.h\" -DPDFIUM_REQUIRED_MODULES -DCHROMIUM_RESTRICT_VISIBILITY -DUSE_LIBJPEG_TURBO=1 -DU_USING_ICU_NAMESPACE=0 -DU_ENABLE_DYLOAD=0 -DU_STATIC_IMPLEMENTATION -DICU_UTIL_DATA_IMPL=ICU_UTIL_DATA_FILE -DUCHAR_TYPE=uint16_t -DUSE_SYSTEM_ZLIB=1 -I../.. -Igen -I../../skia/config -I../../skia/ext -I../../third_party/skia/include/c -I../../third_party/skia/include/config -I../../third_party/skia/include/core -I../../third_party/skia/include/effects -I../../third_party/skia/include/encode -I../../third_party/skia/include/gpu -I../../third_party/skia/include/images -I../../third_party/skia/include/lazy -I../../third_party/skia/include/pathops -I../../third_party/skia/include/pdf -I../../third_party/skia/include/pipe -I../../third_party/skia/include/ports -I../../third_party/skia/include/utils -I../../third_party/skia/src/gpu -I../../third_party/skia/src/sksl -I../../third_party/skia/include/codec -I../../third_party/skia/include/private -I../../third_party/skia/include/client/android -I../../third_party/skia/src/codec -I../../third_party/skia/src/core -I../../third_party/skia/src/image -I../../third_party/skia/src/images -I../../third_party/skia/src/opts -I../../third_party/skia/src/pdf -I../../third_party/skia/src/ports -I../../third_party/skia/src/shaders -I../../third_party/skia/src/shaders/gradients -I../../third_party/skia/src/sfnt -I../../third_party/skia/src/utils -I../../third_party/skia/src/lazy -I../../third_party/skia/third_party/gif -I../../third_party/skia/src/effects/gradients -Igen/shim_headers/libpng_shim -Igen/shim_headers/zlib_shim -I../../third_party/freetype/include -I../../third_party/freetype/src/include -I../../third_party/harfbuzz-ng/src -I../../third_party/libjpeg_turbo -I../../third_party/fontconfig/src -I../../third_party/icu/source/common -I../../third_party/icu/source/i18n -I../../third_party/sfntly/src/cpp/src -fno-strict-aliasing --param=ssp-buffer-size=4 -fstack-protector -Wno-builtin-macro-redefined -D__DATE__= -D__TIME__= -D__TIMESTAMP__= -funwind-tables -fPIC -pipe -pthread -fno-omit-frame-pointer -g0 -fno-builtin-abs -fvisibility=hidden -Wno-unused-local-typedefs -Wno-maybe-uninitialized -Wno-deprecated-declarations -fno-delete-null-pointer-checks -Wno-missing-field-initializers -Wno-unused-parameter -O2 -fno-ident -fdata-sections -ffunction-sections -isystem/nix/store/smmxgfkqaqqh43d5gmv5p3abcq19hkzy-glib-2.56.0-dev/include/glib-2.0 -isystem/nix/store/yn3bbw1sxg19h07wzn16k0ja58wr9yiz-glib-2.56.0/lib/glib-2.0/include -isystem/nix/store/f82jgynysk9mvhyfavfzims41zkskb3c-libpng-apng-1.6.34-dev/include/libpng16 -isystem/nix/store/56i89kfi2nmjrv8hifsz6zikr6pq1avw-zlib-1.2.11-dev/include -std=gnu++14 -fno-exceptions -fno-rtti -nostdinc++ -isystem../../buildtools/third_party/libc++/trunk/include -isystem../../buildtools/third_party/libc++abi/trunk/include -fvisibility-inlines-hidden -Wno-narrowing -c ../../skia/ext/convolver_neon.cc -o obj/skia/skia/convolver_neon.o
../../skia/ext/convolver_neon.cc: In function 'int32x4_t skia::AccumRemainder(const unsigned char*, const Fixed*, int)':
../../skia/ext/convolver_neon.cc:26:65: error: cannot convert '<brace-enclosed initializer list>' to 'int32x4_t {aka __vector(4) int}' in return
   return {remainder[0], remainder[1], remainder[2], remainder[3]};
                                                                 ^
```

The following patch appears to fix this build issue.

Source: b84682f31d%5E%21/#F0
Suggested-by: @dezgeg
2018-04-29 18:38:38 +03:00
Léo Gaspard
a07881c8b8 chromium: skia patch appears to be still needed with 66 on aarch64
Cc @chaoflow @bendlas
Replaces #39628
2018-04-29 18:38:38 +03:00
Philipp Steinpaß
49003e880c gnunet: Add gnunet_git. 2018-04-29 13:26:40 +02:00
Joachim Fasting
9df35787f1
tor-browser-bundle-bin: allow unset XAUTHORITY
Apparently this can happen on e.g., fedora.

Closes https://github.com/NixOS/nixpkgs/issues/38671
2018-04-29 12:17:30 +02:00
Peter Hoeg
3f454bc90f toxic: 0.7.2 -> 0.8.2 2018-04-29 07:52:54 +08:00
Peter Hoeg
88454d73b0 qtox: 1.13.1 -> 1.15.0 2018-04-29 07:52:54 +08:00
Peter Hoeg
058df14f81 ratox: 0.4 -> 0.4.20180303 2018-04-29 07:52:54 +08:00
Michael Raskin
f5268994be weechat-matrix-bridge: 2018-01-10 -> 2017-03-29 2018-04-28 22:42:39 +02:00
Michael Raskin
7cd7e4ce26 weechat: 2.0 -> 2.1 2018-04-28 22:42:38 +02:00
Jan Tojnar
f92d9364e1
Merge pull request #35410 from jtojnar/syncthing-gtk-0.9.3
syncthing-gtk: 0.9.2.7 → 0.9.3
2018-04-28 22:02:00 +02:00
Jan Tojnar
094683ac36
syncthing-gtk: 0.9.2.7 → 0.9.3.1 2018-04-28 22:00:32 +02:00
Andreas Rammhold
bf325f1bd7
quassel: 0.12.4 -> 0.12.5 (fixes RCE & remote crash)
It was found that Quassel could be remotely crashed and had an
unauthenticated RCE vulnerability. The public annoucement can be found
on the oss-sec archive [1]. The bump to 0.12.5 is supposed fixe both issues.

[1] http://seclists.org/oss-sec/2018/q2/77
2018-04-28 11:08:42 +02:00
Matthew Justin Bauer
455e4c8d5b
Merge pull request #38906 from xvapx/upd/tribler
tribler: 7.0.1 -> 7.0.2
2018-04-27 15:03:53 -05:00
Jens Binkert
53722f25ad terraform-provider-ibm: init at 0.8.0 2018-04-27 20:20:21 +02:00
zimbatm
ad7bc980d2 terraform: update all plugins 2018-04-27 12:54:40 +01:00
Jörg Thalheim
fd29514404
Merge pull request #39579 from xeji/teamviewer
teamviewer: 12.0.90041 -> 13.1.3026
2018-04-27 08:21:54 +01:00
xeji
9badee01c1 teamviewer 12.0.90041 -> 13.1.3026
bump, move to qt5, drop i686 support
2018-04-27 00:45:32 +02:00
Sarah Brofeldt
2248f98dea
Merge pull request #39570 from srhb/chromium-24h-timeout
chromium: See if Hydra obeys a 24h meta.timeout
2018-04-26 22:12:16 +02:00
Sarah Brofeldt
537d14f4e2 chromium: See if Hydra obeys a 24h meta.timeout 2018-04-26 21:59:33 +02:00
John Ericson
ba52ae5048 treewide: isArm -> isAarch32
Following legacy packing conventions, `isArm` was defined just for
32-bit ARM instruction set. This is confusing to non packagers though,
because Aarch64 is an ARM instruction set.

The official ARM overview for ARMv8[1] is surprisingly not confusing,
given the overall state of affairs for ARM naming conventions, and
offers us a solution. It divides the nomenclature into three levels:

```
ISA:             ARMv8   {-A, -R, -M}
                 /    \
Mode:     Aarch32     Aarch64
             |         /   \
Encoding:   A64      A32   T32
```

At the top is the overall v8 instruction set archicture. Second are the
two modes, defined by bitwidth but differing in other semantics too, and
buttom are the encodings, (hopefully?) isomorphic if they encode the
same mode.

The 32 bit encodings are mostly backwards compatible with previous
non-Thumb and Thumb encodings, and if so we can pun the mode names to
instead mean "sets of compatable or isomorphic encodings", and then
voilà we have nice names for 32-bit and 64-bit arm instruction sets
which do not use the word ARM so as to not confused either laymen or
experienced ARM packages.

[1]: https://developer.arm.com/products/architecture/a-profile
2018-04-25 15:28:55 -04:00
Michael Raskin
cdca27101d
Merge pull request #39450 from r-ryantm/auto-update/baresip
baresip: 0.5.8 -> 0.5.9
2018-04-24 23:10:30 +00:00
Jörg Thalheim
cf68bb33cb dino: fix checksum 2018-04-24 23:44:32 +01:00
Jörg Thalheim
296bc1e569 dino: 2018-03-10 -> 2018-04-19 2018-04-24 23:41:21 +01:00
R. RyanTM
85161629c5 baresip: 0.5.8 -> 0.5.9
Semi-automatic update generated by https://github.com/ryantm/nixpkgs-update tools.

This update was made based on information from https://repology.org/metapackage/baresip/versions.

These checks were done:

- built on NixOS
- Warning: no binary found that responded to help or version flags. (This warning appears even if the package isn't expected to have binaries.)
- found 0.5.9 with grep in /nix/store/qh69vw5jdwnw82vb6gkwz4f0k8gpjjry-baresip-0.5.9
- directory tree listing: https://gist.github.com/f67689bcf18570ad0408e54fa06db37c
2018-04-24 15:33:02 -07:00
Kamil Chmielewski
3cdb8f581d spark: provided-hadoop -> nixpkgs hadoop
spark should use nixpkgs provided hadoop to make it consistent
for bigger Nix hadoop + spark setup
2018-04-23 20:48:33 +02:00
xeji
a586011b58 firefox-wrapper: fix icon linking (#39315)
don't try to link non-existing icons
2018-04-23 08:33:09 +01:00
Corbin Simpson
69f23d9e73 enhanced-ctorrent: fix CVE-2009-1759 (#39311)
Patches from Debian.
2018-04-22 22:42:20 +01:00
Marti Serra
e9baa47a3b tribler: 7.0.1 -> 7.0.2 2018-04-22 10:42:10 +02:00
Matthew Justin Bauer
c8e58113b2
Merge pull request #38801 from worldofpeace/wire-desktop
wire-desktop: init at 3.0.2816
2018-04-21 20:47:56 -05:00
Herwig Hochleitner
2b29e40153 chromium: 65.0.3325.181 -> 66.0.3359.117
Critical CVE-2018-6085: Use after free in Disk Cache. Reported by Ned Williamson on 2018-03-28
Critical CVE-2018-6086: Use after free in Disk Cache. Reported by Ned Williamson on 2018-03-30
High CVE-2018-6087: Use after free in WebAssembly. Reported by Anonymous on 2018-02-20
High CVE-2018-6088: Use after free in PDFium. Reported by Anonymous on 2018-03-15
High CVE-2018-6089: Same origin policy bypass in Service Worker. Reported by Rob Wu on 2018-02-04
High CVE-2018-6090: Heap buffer overflow in Skia. Reported by ZhanJia Song on 2018-03-12
High CVE-2018-6091: Incorrect handling of plug-ins by Service Worker. Reported by Jun Kokatsu (@shhnjk) on 2017-10-05
High CVE-2018-6092: Integer overflow in WebAssembly. Reported by Natalie Silvanovich of Google Project Zero on 2018-03-08
Medium CVE-2018-6093: Same origin bypass in Service Worker. Reported by Jun Kokatsu (@shhnjk) on 2017-11-01
Medium CVE-2018-6094: Exploit hardening regression in Oilpan. Reported by Chris Rohlf on 2016-08-01
Medium CVE-2018-6095: Lack of meaningful user interaction requirement before file upload. Reported by Abdulrahman Alqabandi (@qab) on 2016-08-11
Medium CVE-2018-6096: Fullscreen UI spoof. Reported by WenXu Wu of Tencent's Xuanwu Lab on 2017-10-19
Medium CVE-2018-6097: Fullscreen UI spoof. Reported by xisigr of Tencent's Xuanwu Lab on 2018-01-26
Medium CVE-2018-6098: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-01-03
Medium CVE-2018-6099: CORS bypass in ServiceWorker. Reported by Jun Kokatsu (@shhnjk) on 2018-02-03
Medium CVE-2018-6100: URL spoof in Omnibox. Reported by Lnyas Zhang on 2018-02-11
Medium CVE-2018-6101: Insufficient protection of remote debugging prototol in DevTools . Reported by Rob Wu on 2018-02-19
Medium CVE-2018-6102: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-02-20
Medium CVE-2018-6103: UI spoof in Permissions. Reported by Khalil Zhani on 2018-02-24
Medium CVE-2018-6104: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-03-08
Medium CVE-2018-6105: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-01-18
Medium CVE-2018-6106: Incorrect handling of promises in V8. Reported by lokihardt of Google Project Zero on 2018-01-25
Medium CVE-2018-6107: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-02-02
Medium CVE-2018-6108: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-02-27
Low CVE-2018-6109: Incorrect handling of files by FileAPI. Reported by Dominik Weber (@DoWeb_) on 2017-04-10
Low CVE-2018-6110: Incorrect handling of plaintext files via file:// . Reported by Wenxiang Qian (aka blastxiang) on 2017-10-24
Low CVE-2018-6111: Heap-use-after-free in DevTools. Reported by Khalil Zhani on 2017-11-02
Low CVE-2018-6112: Incorrect URL handling in DevTools. Reported by Rob Wu on 2017-12-29
Low CVE-2018-6113: URL spoof in Navigation. Reported by Khalil Zhani on 2018-01-25
Low CVE-2018-6114: CSP bypass. Reported by Lnyas Zhang on 2018-02-13
Low CVE-2018-6115: SmartScreen bypass in downloads. Reported by James Feher on 2018-03-07
Low CVE-2018-6116: Incorrect low memory handling in WebAssembly. Reported by Jin from Chengdu Security Response Center of Qihoo 360 Technology Co. Ltd. on 2018-03-15
Low CVE-2018-6117: Confusing autofill settings. Reported by Spencer Dailey on 2018-03-15
Low CVE-2018-6084: Incorrect use of Distributed Objects in Google Software Updater on MacOS. Reported by Ian Beer of Google Project Zero on 2018-03-15
2018-04-21 14:57:45 +02:00
R. RyanTM
951d6a9f93 inboxer: 1.0.4 -> 1.1.2 (#39233)
Semi-automatic update generated by https://github.com/ryantm/nixpkgs-update tools.

This update was made based on information from https://repology.org/metapackage/inboxer/versions.

These checks were done:

- built on NixOS
- Warning: no binary found that responded to help or version flags. (This warning appears even if the package isn't expected to have binaries.)
- found 1.1.2 with grep in /nix/store/dbk6jvgi9kc56yh5grh1d3yndcwd0965-inboxer-1.1.2
- directory tree listing: https://gist.github.com/fd594eb2f8f8083359d8736e32edee72
2018-04-20 16:03:24 +02:00
Michael Weiss
5131977f1b gns3Packages.{server,gui}{Stable,Preview}: 2.1.4 -> 2.1.5 2018-04-19 22:34:32 +02:00
worldofpeace
754b30ef00 wire-desktop: init at 3.0.2816 2018-04-19 13:50:35 -04:00
Matthew Justin Bauer
78cfa7bbd0
Merge pull request #38976 from volth/patch-124
tixati: 2.55 -> 2.57
2018-04-19 11:59:15 -05:00
Peter Hoeg
da4695009c freerdp: 2.0.0-rc1 -> 2.0.0-rc2 2018-04-19 10:31:19 +08:00
Jörg Thalheim
d308ac9233
Merge pull request #39064 from r-ryantm/auto-update/frostwire
frostwire-bin: 6.6.3 -> 6.6.5
2018-04-17 20:26:28 +01:00
Matthew Bauer
52893d5276 treewide: move "extensions" drvs to dir
This cleans up the tree for pkgs/applications somewhat. Should not
change any hashes.
2018-04-17 13:50:49 -05:00
Michael Weiss
9cb0b49673 signal-desktop-beta: Mark as broken (really outdated) 2018-04-17 18:26:53 +02:00