Commit graph

191178 commits

Author SHA1 Message Date
Jan Tojnar
dd7ec2ea97
python2Packages.nototools: 2017-09-25 → 2019-03-20 2019-08-29 17:24:10 +02:00
WilliButz
c323b0ea59
grafana: 6.3.3 -> 6.3.4, update url for static source 2019-08-29 17:16:47 +02:00
Maximilian Bosch
ccc1613a11
documize-community: 3.1.1 -> 3.2.0
https://github.com/documize/community/releases/tag/v3.2.0
https://github.com/documize/community/releases/tag/v3.1.2
2019-08-29 17:05:46 +02:00
Arian van Putten
604b7c139f Fix letsencrypt (#60219)
* nixos/acme: Fix ordering of cert requests

When subsequent certificates would be added, they would
not wake up nginx correctly due to target units only being triggered
once. We now added more fine-grained systemd dependencies to make sure
nginx always is aware of new certificates and doesn't restart too early
resulting in a crash.

Furthermore, the acme module has been refactored. Mostly to get
rid of the deprecated PermissionStartOnly systemd options which were
deprecated. Below is a summary of changes made.

* Use SERVICE_RESULT to determine status
This was added in systemd v232. we don't have to keep track
of the EXITCODE ourselves anymore.

* Add regression test for requesting mutliple domains

* Deprecate 'directory' option
We now use systemd's StateDirectory option to manage
create and permissions of the acme state directory.

* The webroot is created using a systemd.tmpfiles.rules rule
instead of the preStart script.

* Depend on certs directly

By getting rid of the target units, we make sure ordering
is correct in the case that you add new certs after already
having deployed some.

Reason it broke before:  acme-certificates.target would
be in active state, and if you then add a new cert, it
would still be active and hence nginx would restart
without even requesting a new cert. Not good!  We
make the dependencies more fine-grained now. this should fix that

* Remove activationDelay option

It complicated the code a lot, and is rather arbitrary. What if
your activation script takes more than activationDelay seconds?

Instead, one should use systemd dependencies to make sure some
action happens before setting the certificate live.

e.g. If you want to wait until your cert is published in DNS DANE /
TLSA, you could create a unit that blocks until it appears in DNS:

```
RequiredBy=acme-${cert}.service
After=acme-${cert}.service
ExecStart=publish-wait-for-dns-script
```
2019-08-29 16:32:59 +02:00
Matthew Bauer
abd1172a6f emacs: 26.2 -> 26.3; emacs-mac: 26.2-7.6 -> 26.3-7.7 2019-08-29 10:19:55 -04:00
Vika
4b5fc2cfae
redis: Try to fix cross-compilation
**Note**: This makes redis use libc malloc when cross-compiling to
ARM. This may or may not degrade performance.

The reason for this is vendored jemalloc with Redis' patches. The
makefile for deps has hardcoded configure flags for jemalloc, and as a
result, it is unable to cross-compile it.
2019-08-29 17:12:06 +03:00
José Romildo Malaquias
097ae482d4
Merge pull request #67628 from romildo/upd.enlightenment
enlightenment.enlightenment: 0.22.4 -> 0.23.0
2019-08-29 10:28:41 -03:00
José Romildo Malaquias
35f4e95fb0
Merge pull request #67621 from romildo/upd.rage
enlightenment.rage: 0.3.0 -> 0.3.1
2019-08-29 10:27:22 -03:00
Robin Gloster
cbd4d59daf
Merge pull request #67177 from Izorkin/virt-viewer
virt-viewer: remove unused packages
2019-08-29 15:20:17 +02:00
Izorkin
4471efd9e0
virt-viewer: remove unused packages 2019-08-29 15:16:34 +02:00
Izorkin
066bd13613
libvirt-glib: remove unused packages 2019-08-29 15:16:34 +02:00
Mario Rodas
0fc011ed25
Merge pull request #67640 from xrelkd/update/eksctl
eksctl: 0.4.2 -> 0.4.3
2019-08-29 07:57:25 -05:00
Robin Gloster
9a83c29311
Merge pull request #67681 from mayflower/confluence-update
atlassian-confluence: 6.15.6 -> 6.15.8
2019-08-29 14:14:59 +02:00
xrelkd
17e833d8e5 cargo-bloat: 0.8.2 -> 0.8.3 2019-08-29 20:08:20 +08:00
William Casarin
8f4216bd97 move wallet software into the blockchains section 2019-08-29 05:06:06 -07:00
William Casarin
04ef817479 blockchains: remove default.nix
This is no longer needed

Signed-off-by: William Casarin <jb55@jb55.com>
2019-08-29 05:06:06 -07:00
William Casarin
8d6cb26e41 all-packages: add blockchains section
Signed-off-by: William Casarin <jb55@jb55.com>
2019-08-29 05:06:05 -07:00
William Casarin
72682e4654 tree: rename altcoins to blockchains
Signed-off-by: William Casarin <jb55@jb55.com>
2019-08-29 05:01:42 -07:00
Mario Rodas
9533d32b35
Merge pull request #67675 from marsam/update-1password
1password: 0.5.7 -> 0.6.1
2019-08-29 06:45:41 -05:00
Kevin Cox
e356ccda2c
Merge pull request #67679 from xrelkd/update/cargo-web
cargo-web: 0.6.25 -> 0.6.26
2019-08-29 12:40:06 +01:00
rnhmjoj
dc18715e76
rxvt_unicode: add rnhmjoj as maintainer 2019-08-29 13:33:25 +02:00
rnhmjoj
38aa8faa30
maintainers: update rnhmjoj information 2019-08-29 13:33:25 +02:00
Valerio Besozzi
7dfe735465
waybar: 0.7.2 -> 0.8.0 2019-08-29 12:13:36 +02:00
xrelkd
b5977ddd8e cargo-web: 0.6.25 -> 0.6.26 2019-08-29 18:03:52 +08:00
Florian Klink
132a8382b0
Merge pull request #66922 from davidak/netdata_enableCgroupAccounting
netdata: enable cgroup accounting
2019-08-29 11:56:57 +02:00
Alexey Shmalko
e2eef8d28d
escrotum: 2017-01-28 -> 2019-06-10 2019-08-29 12:20:01 +03:00
Simon Lackerbauer
48c153d57f
atlassian-confluence: 6.15.6 -> 6.15.8 2019-08-29 11:15:20 +02:00
Johan Thomsen
298439f4fa kinetic-cpp-client: use openssl_1_0_2 2019-08-29 11:08:10 +02:00
Andreas Rammhold
e6e3270bd4
kea: 1.5.0 -> 1.5.0-P1 (security)
Fixes:

* CVE-2019-6472 affects the Kea DHCPv6 server, which can exit
  with an assertion failure if the DHCPv6 server process receives
  a request containing DUID value which is too large.
  (https://kb.isc.org/docs/cve-2019-6474)

* CVE-2019-6473 affects the Kea DHCPv4 server, which can exit with
  an assertion failure if it receives a packed containing a malformed
  option.  (https://kb.isc.org/docs/cve-2019-6473)

* CVE-2019-6474 can cause a condition where the server cannot be
  restarted without manual operator intervention to correct a problem
  that can be deliberately introduced into the stored leases.
  CVE-2019-6474 can only affect servers which are using memfile
  for lease storage.  (https://kb.isc.org/docs/cve-2019-6474)

Annoucement: https://www.openwall.com/lists/oss-security/2019/08/29/1
2019-08-29 10:38:24 +02:00
Peter Hoeg
5e3334bc55
Merge pull request #67612 from peterhoeg/u/hidapi
hidapi: 0.8.0-RC1 -> 0.9.0
2019-08-29 16:37:21 +08:00
Mario Rodas
2af98a46c1
1password: 0.5.7 -> 0.6.1 2019-08-29 03:00:00 -05:00
Jaka Hudoklin
8d1510abfb
Merge pull request #67606 from endocrimes/r-vault-1.2.2
vault: 1.0.2 -> 1.2.2
2019-08-29 07:07:09 +00:00
Serhii Khoma
7f88d0feb7 hubstaff: 1.4.9 -> 1.4.10 2019-08-29 09:49:25 +03:00
Vincent Laporte
3f63225309 ocamlPackages.batteries: 2.9.0 -> 2.10.0
Ensures compatibility with OCaml 4.08.
2019-08-29 05:42:43 +00:00
worldofpeace
2cb1eda297
Merge pull request #67660 from lightbulbjim/qtpass-wayland
qtpass: 1.2.3 -> 1.3.0
2019-08-29 00:56:08 -04:00
Chris Rendle-Short
8de860b60d qtpass: 1.2.3 -> 1.3.0 2019-08-29 14:52:47 +10:00
Chris Rendle-Short
392763aea6 qtpass: fix missing app icon and name when running under Wayland
Patch has been upstreamed and should be safe to remove in versions >
1.3.0
2019-08-29 12:38:36 +10:00
worldofpeace
bde1c6b5e8
Merge pull request #67604 from peterhoeg/f/gcompris
gcompris: use Qt mkDerivation
2019-08-28 22:26:43 -04:00
Peter Hoeg
8d3c2c8538 gcompris: use Qt mkDerivation 2019-08-29 10:22:22 +08:00
Silvan Mosberger
7f6a9eef26
crystal: Fix runtime by switching to openssl_1_0_2
This makes `crystal play` work
2019-08-29 03:31:14 +02:00
Maximilian Bosch
819696bb0c
evcxr: 0.4.3 -> 0.4.4
https://github.com/google/evcxr/releases/tag/v0.4.4
2019-08-29 01:51:25 +02:00
Daniel Fullmer
33b67761be zerotierone: 1.4.2 -> 1.4.4 (#67648) 2019-08-28 20:28:46 +00:00
Pascal Bach
02ed974bba nixos/gitlab-runner: add missing HOME to environment (#67450)
Gitlab runner fails to start if HOME is not set.
2019-08-28 20:27:28 +00:00
Artemis Tosini
a4ca80771e
one_gadget: 1.6.2 → 1.7.2 2019-08-28 19:29:17 +00:00
Daniel Fullmer
88723457e6 rclone: 1.49.0 -> 1.49.1 2019-08-28 15:22:12 -04:00
WilliButz
b602b5c067
Merge pull request #67634 from mmahut/prometheus-cups-exporter
prometheus-cups-exporter: init at unstable-2019-03-17
2019-08-28 21:07:16 +02:00
Andreas Rammhold
f43086caa9
Merge pull request #67637 from andir/dovecot
dovecot-pigeonhole: 0.5.7.1 -> 0.5.7.2 (CVE-2019-11500)
2019-08-28 20:58:10 +02:00
Imuli
7863697575 fly: 5.3.0 -> 5.4.1 (#67633) 2019-08-28 12:30:18 -06:00
Graham Christensen
ff6b4b12b7
Merge pull request #67642 from kisik21/lr-maintainership
lr: add myself (@kisik21) as maintainer
2019-08-28 14:14:20 -04:00
Marek Mahut
0c4cb4c102 prometheus-cups-exporter: init at unstable-2019-03-17 2019-08-28 19:56:12 +02:00