Commit graph

290830 commits

Author SHA1 Message Date
sternenseemann
9c6c587e7a haskell.packages.ghc{8104,901}: correct cabal-install override comment 2021-05-19 17:17:02 +02:00
sternenseemann
dcaa389959 haskellPackages.glirc: remove jailbreak 2021-05-19 15:47:09 +02:00
sternenseemann
e4c634d687 haskellPackages.glirc: remove unnecessary random override
random 1.2.0 is our default version now.
2021-05-19 15:44:04 +02:00
sternenseemann
f3119f03ac haskell.packages.*.cabal-install: remove random, hashable overrides
These are not necessary anymore as stackage naturally contains random
1.2.0 and we apply the hashable fix globally as well.
2021-05-19 15:44:04 +02:00
sternenseemann
e467c282ba haskellPackages.hashable: make test suite work with random 1.2.0
hashable's test suite pins random to < 1.2 even in the latest release on
hackage, but lifting the bound fixes the build without any issues. Using
a patch so we are reminded to remove it when it's unnecessary.
2021-05-19 15:44:04 +02:00
sternenseemann
89ca3346f0 haskellPackages.lsp-test: remove unnecessary override
We arrived at 0.14.0.0 naturally via stackage.
2021-05-19 15:44:04 +02:00
sternenseemann
20dd4577c7 haskellPackages: fix infinite recursion by disabling random's tests
random 1.2.0 has a new test suite with a lot of dependencies. Among
other packages it depends on doctest which depends on syb which depends
on tasty which depends on optparse-applicative which depends on
QuickCheck which depends on -- you guessed it -- random!

The cycle could be broken at any point of course, I've disabled the
tests on random here because it has seen the change that causes all
of this. However, we may also want to consider doing this for
optparse-applicative instead, since random seems like a more critical
package to run the tests for possibly? Not sure, looking for feedback.
2021-05-19 15:44:04 +02:00
(cdep)illabout
0a1c857489
hackage-packages.nix: Regenerate based on current config
This commit has been generated by maintainers/scripts/haskell/regenerate-hackage-packages.sh
2021-05-19 21:31:19 +09:00
(cdep)illabout
22cefb0445
all-cabal-hashes: 2021-05-12T11:46:04Z -> 2021-05-19T07:17:55Z
This commit has been generated by maintainers/scripts/haskell/update-hackage.sh
2021-05-19 21:29:21 +09:00
(cdep)illabout
ffb24a47f8
Stackage Nightly: 2021-05-10 -> 2021-05-19
This commit has been generated by maintainers/scripts/haskell/update-stackage.sh
2021-05-19 21:28:03 +09:00
Fabian Affolter
0443320991
Merge pull request #123661 from chivay/bump-classifier
pythonPackages.karton-classifier: 1.0.0 -> 1.1.0
2021-05-19 14:20:00 +02:00
Fabian Affolter
38646ec80d
Merge pull request #123662 from chivay/bump-karton-asciimagic
pythonPackages.karton-asciimagic: 1.0.0 -> 1.0.1
2021-05-19 14:16:18 +02:00
Fabian Affolter
397c3ac236
Merge pull request #123664 from chivay/bump-mwdb-reporter
pythonPackages.karton-mwdb-reporter: 1.0.0 -> 1.0.1
2021-05-19 14:13:59 +02:00
Fabian Affolter
4889f36592
Merge pull request #123666 from chivay/bump-dashboard
pythonPackages.karton-dashboard: 1.1.0 -> 1.2.0
2021-05-19 14:12:07 +02:00
Joachim Breitner
41b485f7c4 dune.nix: Include dune version in warning when dune is not supported
as dune 1 and dune 2 have different version ranges here
2021-05-19 14:07:20 +02:00
Pavol Rusnak
e62ec73827
Merge pull request #123674 from prusnak/trezor-suite
trezor-suite: 21.4.1 -> 21.5.1
2021-05-19 13:58:52 +02:00
Michele Guerini Rocco
376eabdac3
Merge pull request #123254 from rnhmjoj/ipsec
libreswan: 3.2 -> 4.4
2021-05-19 13:36:04 +02:00
Pavol Rusnak
612c30ac03
trezor-suite: 21.4.1 -> 21.5.1 2021-05-19 13:21:20 +02:00
Hubert Jasudowicz
e80e36702b pythonPackages.karton-dashboard: 1.1.0 -> 1.2.0 2021-05-19 13:00:55 +02:00
Hubert Jasudowicz
7d97cbdacf pythonPackages.karton-mwdb-reporter: 1.0.0 -> 1.0.1 2021-05-19 12:57:36 +02:00
Hubert Jasudowicz
c61d3ab21b pythonPackages.karton-asciimagic: 1.0.0 -> 1.0.1 2021-05-19 12:51:33 +02:00
Hubert Jasudowicz
a13dd7dde7 pythonPackages.karton-classifier: 1.0.0 -> 1.1.0 2021-05-19 12:45:12 +02:00
Sascha Grunert
7013a0f279 runc: 1.0.0-rc94 -> 1.0.0-rc95
Signed-off-by: Sascha Grunert <sgrunert@redhat.com>
2021-05-19 20:38:42 +10:00
Fabian Affolter
a6b4be8775
Merge pull request #123526 from fabaff/bump-gdu
gdu: 4.11.1 -> 4.11.2
2021-05-19 12:17:35 +02:00
Fabian Affolter
7973682137
Merge pull request #122686 from fabaff/fix-requests-http-signature
python3Packages.requests-http-signature: 0.1.0 -> 0.2.0
2021-05-19 12:16:24 +02:00
Mario Rodas
96d42f122f
Merge pull request #123248 from r-ryantm/auto-update/gitlab-pages
gitlab-pages: 1.38.0 -> 1.39.0
2021-05-19 05:00:10 -05:00
Mario Rodas
ac659d1702
Merge pull request #122534 from r-ryantm/auto-update/jackett
jackett: 0.17.1027 -> 0.18.15
2021-05-19 04:59:12 -05:00
Martin Weinelt
9613c8c0f3
Merge pull request #123652 from fabaff/bump-brother
python3Packages.brother: 1.0.1 -> 1.0.2
2021-05-19 11:58:20 +02:00
Robert Hensing
5bbdc24b2a
Merge pull request #123597 from hercules-ci/issue-123572
tests.trivial: Avoid evaluation and ${pkgs.path} dep
2021-05-19 11:57:32 +02:00
Fabian Affolter
9784a04d66 python3Packages.requests-http-signature: 0.1.0 -> 0.2.0 2021-05-19 11:50:50 +02:00
Fabian Affolter
d33553a4cc
Merge pull request #123223 from fabaff/cleanup-flask-appbuilder
python3Packages.flask-appbuilder: 3.2.3 -> 3.3.0
2021-05-19 11:44:31 +02:00
Robert Hensing
14f54a8b3c tests.trivial: Add meta 2021-05-19 11:41:45 +02:00
Robert Schütz
82f5c64af7
kdeltachat: unstable-2021-05-16 -> unstable-2021-05-18 (#123575) 2021-05-19 11:34:15 +02:00
Fabian Affolter
41d8507284 python3Packages.brother: 1.0.1 -> 1.0.2 2021-05-19 11:03:06 +02:00
Jan Tojnar
ea87fc7c63
Merge pull request #123623 from dasj19/gnome-podcasts-dependency
gnome-podcasts: removed cmake from dependencies
2021-05-19 09:53:54 +02:00
Jörg Thalheim
1341338ad4
Merge pull request #123627 from fortuneteller2k/bump-ena
linuxPackages.ena: 2.4.1 -> 2.5.0
2021-05-19 08:46:03 +01:00
Sandro
dd0afe0aa2
Merge pull request #123380 from cideM/fix-RcppArmadillo
rPackages.RcppArmadillo: fix darwin
2021-05-19 09:44:12 +02:00
Alex Wied
684158897d
tinyproxy: 1.10.0 -> 1.11.0 (#122757)
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2021-05-19 09:42:04 +02:00
Fabian Affolter
f3ad74ab76 gdu: 4.11.1 -> 4.11.2 2021-05-19 09:41:55 +02:00
Sandro
3ea04685ce
Merge pull request #122556 from davidtwco/sphinxcontrib-actdiag-nwdiag-seqdiag-init 2021-05-19 09:38:27 +02:00
Kim Lindberger
f131787bb6
Merge pull request #121708 from talyz/replace-secret
treewide: Replace uses of `replace-literal` with `replace-secret` to avoid leaking secrets
2021-05-19 09:34:51 +02:00
Fabian Affolter
f6e4e2ff41 python3Packages.flask-appbuilder: 3.2.3 -> 3.3.0 2021-05-19 09:34:07 +02:00
talyz
380b52c737
nixos/keycloak: Use replace-secret to avoid leaking secrets
Using `replace-literal` to insert secrets leaks the secrets through
the `replace-literal` process' `/proc/<pid>/cmdline`
file. `replace-secret` solves this by reading the secret straight from
the file instead, which also simplifies the code a bit.
2021-05-19 09:32:28 +02:00
talyz
88b76d5ef9
nixos/mpd: Use replace-secret to avoid leaking secrets
Using `replace-literal` to insert secrets leaks the secrets through
the `replace-literal` process' `/proc/<pid>/cmdline`
file. `replace-secret` solves this by reading the secret straight from
the file instead.
2021-05-19 09:32:22 +02:00
talyz
3a29b7bf5b
nixos/mpdscribble: Use replace-secret to avoid leaking secrets
Using `replace-literal` to insert secrets leaks the secrets through
the `replace-literal` process' `/proc/<pid>/cmdline`
file. `replace-secret` solves this by reading the secret straight from
the file instead, which also simplifies the code a bit.
2021-05-19 09:32:17 +02:00
talyz
7842e89bfc
nixos/gitlab: Use replace-secret to avoid leaking secrets
Using `replace-literal` to insert secrets leaks the secrets through
the `replace-literal` process' `/proc/<pid>/cmdline`
file. `replace-secret` solves this by reading the secret straight from
the file instead, which also simplifies the code a bit.
2021-05-19 09:32:12 +02:00
talyz
38398fade1
nixos/discourse: Use replace-secret to avoid leaking secrets
Using `replace-literal` to insert secrets leaks the secrets through
the `replace-literal` process' `/proc/<pid>/cmdline`
file. `replace-secret` solves this by reading the secret straight from
the file instead, which also simplifies the code a bit.
2021-05-19 09:32:06 +02:00
talyz
27f8f6956a
replace-secret: Init
Add a small utility script which securely replaces secrets in
files. Doing this with `sed`, `replace-literal` or similar utilities
leaks the secrets through the spawned process' `/proc/<pid>/cmdline` file.
2021-05-19 09:32:00 +02:00
Vladimír Čunát
7cefeafb11
Merge #122934: krita: add breeze-icons 2021-05-19 09:17:58 +02:00
Fabian Affolter
529e32ba47
python3Packages.pysonos: 0.0.46 -> 0.0.48 (#123537) 2021-05-19 09:08:36 +02:00