Commit graph

90967 commits

Author SHA1 Message Date
Domen Kožar
4c22a048d7 Revert "Revert "xulrunner: Remove""
This reverts commit 5041cae5b7.

This is fixed in follow up commit.
2016-09-07 16:51:38 +02:00
aszlig
75efdc6502
nixos/tests/blivet: Fix btrfs-related tests
The loopback-based tests use a storage size of 102400 blocks (one block
is 1024 bytes), which doesn't seem to fit for btrfs volumes in recent
btrfs versions. I'm setting this to 409600 (400 MB) now so that it
should be enough for later versions in case they need even more space
for subvolumes.

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2016-09-07 16:32:12 +02:00
Eelco Dolstra
5041cae5b7 Revert "xulrunner: Remove"
This reverts commit 8c3e9ea53e.
2016-09-07 15:17:39 +02:00
aszlig
fb46df8a9a
nixos: Fix ordering of firewall.service
Follow-up to the following commits:

  abdc5961c3: Fix starting the firewall
  e090701e2d: Order before sysinit

Solely use sysinit.target here instead of multi-user.target because we
want to make sure that the iptables rules are applied *before* any
socket units are started.

The reason I've dropped the wantedBy on multi-user.target is that
sysinit.target is already a part of the dependency chain of
multi-user.target.

To make sure that this holds true, I've added a small test case to
ensure that during switch of the configuration the firewall.service is
considered as well.

Tested using the firewall NixOS test.

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
Cc: @edolstra
2016-09-07 15:11:24 +02:00
Bjørn Forsman
10b335992e Fix eval (due to xulrunner removal) 2016-09-07 15:08:13 +02:00
Domen Kožar
72f4bc9cf9 Merge pull request #18394 from groxxda/gazebo
gazeboSimulator: fix builds
2016-09-07 14:57:15 +02:00
Eelco Dolstra
8c3e9ea53e xulrunner: Remove 2016-09-07 14:43:29 +02:00
Eelco Dolstra
445a39a23b chatzilla: 0.9.91 -> 0.9.92 2016-09-07 14:42:55 +02:00
Eelco Dolstra
e090701e2d firewall: Order before sysinit
Suggested by @aszlig.
2016-09-07 14:42:30 +02:00
Eelco Dolstra
abdc5961c3 Fix starting the firewall
Probably as a result of 992c514a20, it
was not being started anymore.

My understanding of systemd.special(7) (section "Special passive
system units") is that the firewall should want network-pre.target,
rather than the other way around (not very intuitive...). This in
itself does not cause the firewall to be wanted, which is why the
wanted-by relationship with multi-user.target is necessary.

http://hydra.nixos.org/build/39965589
2016-09-07 14:30:11 +02:00
Alexander Ried
7a623aec47 ignition-transport: fix cmake file 2016-09-07 14:24:18 +02:00
Alexander Ried
b6be650608 gazebo.sdformat: fix cmake file 2016-09-07 14:23:33 +02:00
Eelco Dolstra
d8625f6d25 Make the NFSv4 tests release-critical
We can probably drop NFSv3...
2016-09-07 14:15:57 +02:00
Eelco Dolstra
58b028f9ee nfs module: Fix dependency on statd and idmapd
http://hydra.nixos.org/build/40038016
2016-09-07 14:15:57 +02:00
Eelco Dolstra
015c984537 nfs module: Improve descriptions 2016-09-07 14:15:57 +02:00
Eelco Dolstra
d0857bb1e6 openresolv: 3.7.0 -> 3.8.1 2016-09-07 14:15:57 +02:00
Alexey Shmalko
b7237abc08 avahi-daemon: remove default browse-domains
These domains are not actually default but examples. See
https://github.com/lathiat/avahi/blob/master/avahi-daemon/avahi-daemon.conf#L24
for default config.
2016-09-07 13:58:21 +02:00
Rahul Gopinath
3ddf76c00a mono: init at 4.6 2016-09-07 12:42:48 +02:00
Tuomas Tynkkynen
c57d6821aa perlPackages.MozillaLdap: Reference correct output of openldap 2016-09-07 13:00:56 +03:00
aszlig
1187b00e58
qtkeychain: Allow building with Qt 5
So far we don't yet need the Qt 5 build for qtkeychain because the two
packages that depend on it are still using Qt 4. However, the next
upstream version of Tomahawk for example already uses Qt 5, so let's
prepare for that.

Tested building against Tomahawk Git master with qt5.qtkeychain.

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2016-09-07 11:43:39 +02:00
aszlig
eeebc13e03
qtkeychain: 0.4.0 -> 0.7.0
Upstream changes since version 0.4.0:

  * version 0.5.0 (release 2015-05-04):
    - Added support for KWallet5 (KDE5/KF)
  * version 0.6.0 (release 2016-03-18)
    - Added support for the Windows Credential Store
  * version 0.6.1 (release 2016-03-31)
    - Fix KWallet not working (regressions in 0.6.0)
  * version 0.6.2 (release 2016-04-04)
    - KWallet: Fixes a crash when storing passwords, seen on Debian/KDE4
  * version 0.7.0 (release 2016-05-23)
    - Bump SO version due to 0.6 being binary-incompatible to previous
      releases

Tomahawk and owncloud-client depend on this library, both are still
building fine after this update.

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2016-09-07 11:43:36 +02:00
aszlig
da24fbd0ec
qtkeychain: Fix install of translations
The following doesn't seem to be quite right and I have missed this when
I was introducing qtkeychain in the first place:

-- Installing: /nix/store/...-qtkeychain-0.4.0/$out/share/qt/translations/qtkeychain_de.qm
-- Installing: /nix/store/...-qtkeychain-0.4.0/$out/share/qt/translations/qtkeychain_ro.qm

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2016-09-07 11:43:32 +02:00
Shea Levy
03b888e205 Merge branch 'stage2-generalise-containers' of https://github.com/rickynils/nixpkgs 2016-09-07 05:39:22 -04:00
Eelco Dolstra
70be99c645 Merge pull request #18365 from NixOS/fix-sshd-failure
Make /var/empty immutable (with chattr +i)
2016-09-07 11:18:49 +02:00
Domen Kožar
8f95e6f6aa hardcode e2fsprogs, idempotent chmod, remove care condition 2016-09-07 10:49:27 +02:00
Peter Simons
4a265a68bd Merge pull request #18381 from siddharthist/dovecot/mailUser
dovecot service: require mail{User,Group} with sieveScripts
2016-09-07 10:16:17 +02:00
Rickard Nilsson
ab9537ca22 nixos: Generalise the container tests in stage-2 boot
This way, stage-2 behaves correctly also for libvirt-lxc containers.

Some more discussion on this:
a7a08188bf
bfe46a653b
2016-09-07 07:50:04 +00:00
Franz Pletz
5f6557d437
charybdis: 3.5.1 -> 3.5.3 (security)
Fixes CVE-2016-7143 (certificate fingerprint spoofing through crafted
SASL messages).
2016-09-07 08:12:02 +02:00
Franz Pletz
5929399527
graphicsmagick: 1.3.24 -> 1.3.25 (security)
Includes some security fixes, see

  http://www.graphicsmagick.org/NEWS.html#september-5-2016
2016-09-07 07:08:51 +02:00
Joachim F
526746d874 Merge pull request #18383 from peterhoeg/lw
ledger-web: we have bundlerEnv, let us use it
2016-09-07 07:08:17 +02:00
Edward Tjörnhammar
e051ac665c
android-studio: add 32bit zlib for api 22 2016-09-07 06:47:40 +02:00
Franz Pletz
6a11b816ff Merge pull request #17386 from vrthra/ruby
ruby: 2.2.3 -> 2.2.5 and 2.1.7 -> 2.1.10
2016-09-07 06:37:18 +02:00
Rahul Gopinath
3b9b8726bd ruby: 2.1.7 -> 2.1.10 2016-09-06 21:14:00 -07:00
Rahul Gopinath
7163bab78f ruby: 2.2.3 -> 2.2.5 2016-09-06 21:13:59 -07:00
Peter Hoeg
222d084927 ledger-web: we have bundlerEnv, let us use it 2016-09-07 11:17:12 +08:00
Franz Pletz
7949e69382
chromium: update to latest channel releases (security)
Fixes the following security problems:

- CVE-2016-5147: Universal XSS in Blink
- CVE-2016-5148: Universal XSS in Blink
- CVE-2016-5149: Script injection in extensions
- CVE-2016-5150: Use after free in Blink
- CVE-2016-5151: Use after free in PDFium
- CVE-2016-5152: Heap overflow in PDFium
- CVE-2016-5153: Use after destruction in Blink
- CVE-2016-5154: Heap overflow in PDFium
- CVE-2016-5155: Address bar spoofing
- CVE-2016-5156: Use after free in event bindings
- CVE-2016-5157: Heap overflow in PDFium
- CVE-2016-5158: Heap overflow in PDFium
- CVE-2016-5159: Heap overflow in PDFium
- CVE-2016-5160: Extensions web accessible resources bypass
- CVE-2016-5161: Type confusion in Blink.
- CVE-2016-5162: Extensions web accessible resources bypass
- CVE-2016-5163: Address bar spoofing
- CVE-2016-5164: Universal XSS using DevTools
- CVE-2016-5165: Script injection in DevTools
- CVE-2016-5166: SMB Relay Attack via Save Page As
- CVE-2016-5167: Various fixes from internal audits, fuzzing and other initiatives
2016-09-07 04:49:56 +02:00
Peter Hoeg
d4eac0278c calibre: 2.64.0 -> 2.66.0 (#18311)
A few additional changes:

1. We load patches from debian for improving privacy and security
2. Now with QT 5.6 instead of 5.5
3. We strip bundled python code and use proper upstream instead
2016-09-07 04:32:06 +02:00
Langston Barrett
492a90f1c9 dovecot service: require mail{User,Group} with sieveScripts
fixes #17702.
2016-09-07 01:50:59 +00:00
obadz
39e197ab1c uhub: 0.4.1 -> 0.5.0 (fixes build)
@ehmry: please have a look so that we can cherry-pick in release-16.09
and move forward on #18209
2016-09-07 02:30:03 +01:00
Joachim F
1c7270f001 Merge pull request #18379 from peterhoeg/st_0146
syncthing: 0.14.5 -> 0.14.6
2016-09-07 03:24:01 +02:00
obadz
973fd1aae1 haskellPackages.haste-Cabal: mark as broken 2016-09-07 01:35:23 +01:00
obadz
d9db8a9bf5 seq24: fix build failures due to name clash in "mutex" class 2016-09-07 01:30:44 +01:00
Nikolay Amiantov
aed2cd32f8 nixos containers: hopefully fix test failures
Closes #18377.
2016-09-07 02:55:48 +03:00
Dan Peebles
9a05352488 souffle: work around hardening bug on linux 2016-09-06 23:11:33 +00:00
Joachim F
b78e625445 Merge pull request #18235 from teh/master
Remove broken hyperdex package and dependencies. Closes #17995.
2016-09-07 00:18:48 +02:00
Shea Levy
d81d59aad9 Merge branch 'fix/st-update-0.7' of git://github.com/andsild/nixpkgs 2016-09-06 18:04:48 -04:00
Joachim F
6340b32e49 Merge pull request #18370 from elasticdog/transcrypt
transcrypt: 0.9.7 -> 0.9.9
2016-09-06 23:55:47 +02:00
Aaron Bull Schaefer
598ccfdec9 transcrypt: 0.9.7 -> 0.9.9 2016-09-06 14:55:19 -07:00
Thomas Tuegel
3b78026a7f Merge pull request #18297 from edwtjo/zotero-esr-verfix
zotero: remove esr suffix from version string.
2016-09-06 16:50:45 -05:00
Joachim F
6949069678 Merge pull request #18119 from puffnfresh/package/hyperterm
hyperterm: init at 0.7.6
2016-09-06 23:50:00 +02:00