Commit graph

1181 commits

Author SHA1 Message Date
Michael Raskin
37418b3f70 Add farstream support to gajim 2012-09-23 21:39:26 +04:00
Eelco Dolstra
e6077fbc46 Remove getConfig helper function
An expression like ‘getConfig [ "cabal" "libraryProfiling" ] false’
can be written more concisely as ‘config.cabal.libraryProfiling or false’.
2012-09-19 13:56:56 -04:00
aszlig
6667ee858b
chromium: Update dev/beta channels.
beta: 22.0.1229.56
dev: 23.0.1262.0

Patch for http://crbug.com/143623 still applies and is still not fixed upstream.

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2012-09-15 07:44:21 +02:00
Michael Raskin
e12c0dbace LaTeX + Spelling work 2012-09-13 19:25:04 +04:00
Michael Raskin
5df4c97694 Fix wrapping 2012-09-13 19:25:04 +04:00
Michael Raskin
c20a9e4ac5 Make Gajim find speller 2012-09-13 19:25:04 +04:00
Michael Raskin
8b7d12d0f5 Gajim: make OpenSSL code work 2012-09-13 18:03:50 +04:00
Michael Raskin
947741de5f Gajim: update to 0.15.1 2012-09-13 18:03:50 +04:00
Michael Raskin
009db2ae7a Fix license 2012-09-13 15:30:12 +04:00
Michael Raskin
2dec65340b Fix python path 2012-09-13 14:46:45 +04:00
Michael Raskin
917db3212f Add PyFeed dependency. Starts now 2012-09-13 14:32:38 +04:00
Michael Raskin
070f2419dd Fixed a few SaT dependencies 2012-09-13 14:24:07 +04:00
Michael Raskin
b52919ac9e Buildable Salut-à-toi 2012-09-13 14:14:49 +04:00
Eelco Dolstra
ea2fbd7864 Fix Thunderbird/Firefox URLs
The Mozilla FTP site has old releases, so is preferred over HTTP.
2012-09-11 16:11:16 -04:00
Eelco Dolstra
b1ce15f77b firefox: Update to 15.0.1
Also untabified the expression.
2012-09-11 13:47:34 -04:00
aszlig
2c315dee85
Merge branch 'tcl-tkabber-fixup'
This introduces the following changes:

 * Fixes libPrefix in Tcl libraries I fucked up a few months ago and adds
   missing meta attributes.
 * Correctly set TKABBER_SITE_PLUGINS so Tkabber is able to find plugins, if
   present.
 * Rely on OPENSSL_X509_CERT_FILE instead of depending on cacert directly.
 * Introduces a new license called "Tcl/Tk", which applies to some Tcl libraries
   and is a variation of the BSD license with restrictions regarding
   governmental use.
 * New package tclgpg for GPG support in Tkabber.
2012-09-11 05:13:03 +02:00
aszlig
2347cfa4f9
chromium: Revert zlib changes for v22 and higher.
SVN revision 151720 breaks the build with system zlib, see:

http://src.chromium.org/viewvc/chrome?view=rev&revision=151720

The issue here is, that r151720 introduces changes directly in zlib, which
aren't upstream and unfortunately there is no more information stating the exact
reasons for this change, as all references to it are not publicly available:

http://crbug.com/139744
https://chromiumcodereview.appspot.com/10837057

So for the moment, we're going to add a patch, which applies to v22 and higher,
which essentially reverts r151720, until either more information on the issue is
available or it is resolved upstream.

As someone has already reported the issue, we just need to track the following
issue:

http://crbug.com/143623

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2012-09-11 04:54:26 +02:00
aszlig
20f883179e
chromium: Update channels to latest versions.
stable: 21.0.1180.89
beta: 22.0.1229.39
dev: 23.0.1255.0

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2012-09-11 04:54:25 +02:00
aszlig
9d71bb96c0
w3m: Add mouse support for completeness.
I'm personally not using mouse/gpm support for w3m, because I find it somewhat
too awkward when copy/pasting text. But maybe there are users out there who want
to have it.

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2012-09-10 19:54:54 +02:00
aszlig
194e9d929c
w3m: Add support for fbcon image display.
This builds the w3m image helper with fbcon support if the derivation is called
with graphicsSupport set to true. This change shouldn't break anything as
graphicsSupport is disabled by default, so in any case it could only break
things for users explicitly passing the attribute.

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2012-09-10 19:54:53 +02:00
aszlig
36947c8957
tkabber: Honor OPENSSL_X509_CERT_FILE.
This gets rid of the dependency on cacert and ensures that Tkabber will read
OPENSSL_X509_CERT_FILE whenever the sslcacertstore is not set by the user in
Tkabber's options.

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2012-09-09 07:00:00 +02:00
aszlig
c544eb4c71
tkabber: Set the correct path to tkabber-plugins.
This should now point to the path for the tkabber plugins package, which will be
used as soon as the tkabber-plugins derivation is available as a symlink in the
user's environment.

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2012-09-09 07:00:00 +02:00
aszlig
e18227378a
tkabber-plugins: Add missing meta attributes.
Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2012-09-09 07:00:00 +02:00
aszlig
bf72d46084
tkabber: Add missing meta.license.
Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2012-09-09 06:59:59 +02:00
aszlig
5b59bb4d28
tkabber-plugins: Remove dependency on tkabber.
The tkabber plugins really do not require a dependency on tkabber itself, so
let's drop it. In addition, this also removes creating a $out/bin dir, which was
left back then when creating the tkabber-plugins derivation by copy & pasting
stuff from the main tkabber derivation.

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2012-09-09 06:59:59 +02:00
aszlig
5d15972278
tkabber: Clean up TCLLIBPATH generation.
This should make things a lot more DRY as we now can generalize library paths by
using the libPrefix attribute of each library. In addition this also cuts the
line length in wrapProgram.

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2012-09-09 06:59:59 +02:00
aszlig
d058ae5b0b
tkabber: Add tclgpg to TCLLIBPATH.
This ensures that Tkabber can now be used with GPG support, though as of gnupg
version 2, this requires gpg-agent as well. Only if all conditions are met, an
option to actually use GPG will show up in Tkabber's settings.

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2012-09-09 06:59:59 +02:00
aszlig
28a725fcbe
bwidget/tcllib/tcltls: Add libPrefix attributes.
This is what I forgot in the packages I have added a few months ago, so it's
time to revisit them and improve things, like for example set the right
libPrefix in order to stay consistent with other TCL libraries.

In addition this fixes some whitespace ugliness in the affected packages.

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2012-09-09 06:59:58 +02:00
Carles Pagès
ef0c0089da yafc: update to 1.2.3 2012-09-06 17:31:40 +02:00
Mathijs Kwik
8277c18b53 vnstat: upgrade to 1.11 2012-09-02 11:57:49 +02:00
Lluís Batlle i Rossell
724451668c firefox15: trying another way of telling hydra to build it 2012-09-02 10:45:16 +02:00
Rob Vermaas
ac8dd727d0 Restore google talk plugin versioned url, now it seems to work again. 2012-09-01 21:36:46 +02:00
Lluís Batlle i Rossell
36619822a1 firefox15: Telling hydra to build it 2012-09-01 16:39:13 +02:00
Michael Raskin
4add07db0c Firefox: add 15.0 version 2012-09-01 09:55:59 +04:00
Rob Vermaas
fbbaf6759d Update google talk plugin 2012-08-31 23:22:04 +02:00
Yury G. Kudryashov
1de0428020 KTorrent-4.2.1 2012-08-31 12:20:41 +04:00
Yury G. Kudryashov
f1a2d031e5 konversation-1.4 2012-08-31 12:07:09 +04:00
Yury G. Kudryashov
7d8aa35a07 rekonq-1.1 2012-08-31 12:06:48 +04:00
aszlig
d5c2b35b82
chromium: Re-enable legacy sandbox for version 22.
This enables legacy seccomp sandbox by default even on chromium 22, because the
BPF sandbox is still work in progress, please see:

http://crbug.com/139872
http://crbug.com/130662

Because the BPF seccomp sandbox is used in case the legacy seccomp mode
initialization fails, we might need to patch this again, as soon as the BPF
sandbox is fully implemented to fall back to legacy seccomp and use BPF by
default.

We now have two patches for "default to seccomp" - one for Chromium 21 and one
for 22 or higher.
2012-08-27 06:50:35 +02:00
aszlig
c67d8bcabe
chromium: Don't use the sandbox patch on v21.
The patch doesn't apply in version 22 and newer, because mode 1 sandboxes are
connsidered "legacy" (well, apart from the fact that I'd personally prefer BPF
anyway), for reasons I wasn't able to find, yet. But let's proceed on BPF
integration and thus gain more insight on the exact reasons.
2012-08-26 07:36:57 +02:00
aszlig
b1a6a98139
chromium: Drop dependency on subversion.
Versions older than 21 needed subversion in order to build. As the oldest
version we support is 21, we no longer need this dependency.
2012-08-26 03:03:24 +02:00
aszlig
819ee63851
chromium: Update to new release channels.
If you look at what changed, you'll surely notice that version 22 is now in
beta, so we have to expect things to break. And one thing that will break for
sure is the seccomp patch, because beginning with 22 the new BPF seccomp sandbox
is going to replace the mode 1 seccomp sandbox.
2012-08-26 02:56:59 +02:00
aszlig
224098757f
chromium/update.sh: Fix spacing in cache messages.
This commit doesn't add any feature and just fixes a small annoyance which
result in messages like this:

Checking if xxx applies...no.

See that there is no whitespace between "..." and "no"? Well, the world cares
for more important things, but for me personally those minor annoyances can turn
into major annoyances.
2012-08-26 02:52:33 +02:00
Peter Simons
30a36ad6e5 hadoop: add version 2.0.1-alpha 2012-08-22 14:13:40 +02:00
Shea Levy
f34225c440 Merge branch 'chromium-updater' of https://github.com/aszlig/nixpkgs
chromium: Improve update script and update to latest versions.

Previously, we had a single hash of the whole version response from
omahaproxy.

Unfortunately the dev version is released quite frequently, so the hash
is of no use at all (we could rather directly fetch rather than
executing the script, because it will fetch all channels anyway).

This pull request adds two methods of caching:

* First of all, if a perticular version/channel is already in the
previous version of the sources.nix file, don't download it again.

* And the second method is to check if the current sha256 is already
downloaded and reads the corresponding sha256 from the lookup table.

So, this should really help to avoid flooding the download servers and
to not stress impatient users too much.
2012-08-22 06:36:33 -04:00
aszlig
5df4e12c92 firefox: Build against system NSS.
So, now even Firefox can be built with our shiny new fixed up NSS derivation,
and as this is desired (especially if we want to support certificates from the
CA bundle), let's make it the default.
2012-08-22 08:29:10 +02:00
aszlig
8b4fae76b3 chromium: Build with NSS by default.
Hurray! This is the first time chromium is working with NSS _and_ is able to
verify certificates using the root certificates built in into NSS.

Optimally it would use certs from OPENSSL_X509_CERT_FILE, but at least it's
working, so let's add that at some later point.
2012-08-22 08:29:10 +02:00
aszlig
4393fffcce chromium: Update channels to latest versions.
This removes the now obsolete VHASH line in sources.nix aswell.
2012-08-17 12:57:35 +02:00
aszlig
6968400a34 chromium: Check sha256 per channel in update.sh.
Until this commit we had a single hash of the whole version response from
omahaproxy. This worked well for not updating unnecessarily but only until one
single channel has a new version available.

Unfortunately the dev version is released quite frequently, so the hash is of no
use at all (we could rather directly fetch everything everytime we execute the
script).

This led to this commit, which adds two methods of caching:

First of all, if a perticular version/channel is already in the previous version
of the sources.nix file, don't download it again.

And the second method is to check if the current sha256 is already downloaded
and reads the corresponding sha256 from the lookup table.

So, this should really help to avoid flooding the download servers and to not
stress impatient users too much.
2012-08-17 12:57:34 +02:00
Rok Garbas
d91b51c140 Update: notmuch to 0.13.2 2012-08-13 00:24:14 +02:00