summary refs log tree commit diff
path: root/pkgs
Commit message (Collapse)AuthorAge
* chromiumOSPackages: use more stable update sourceAlyssa Ross2019-12-17
| | | | | | | | | | It has been explained to me that cros-omahaproxy reports which versions are available to users, while cros-updates-serving reports the latest builds available for each channel. The latter is probably better for our use case anyway, and apparently, while both aren't officially supported, is less likely to randomly break. So let's use that instead, even if it is much more annoying to parse.
* mktuntap: init at 2019-12-15Alyssa Ross2019-12-15
|
* Merge remote-tracking branch 'nixpkgs/master' into masterAlyssa Ross2019-12-15
|\
| * Merge pull request #75698 from scaredmushroom/aircrack-ng_masterFranz Pletz2019-12-15
| |\ | | | | | | aircrack-ng: fixed missing dependency for airmon-ng
| | * aircrack-ng: fixed missing dependency for airmon-ngcap2019-12-15
| | |
| * | Merge pull request #75694 from plutotulp/spamassassin-ipv6-masterFranz Pletz2019-12-15
| |\ \ | | | | | | | | spamassassin: enable IPv6 support with Socket6
| | * | spamassassin: enable IPv6 support with Socket6Erlend Pedersen2019-12-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Communication between spamc and spamd would fail with messages about addresses being too long: error: Bad arg length for Socket::unpack_sockaddr_in, length is 28, should be 16 By adding Socket6 as a buildInput, spamd is now able to process emails without choking on IPv6 addresses.
| * | | dolt: init at 0.12.0 (#75693)Danylo Hlynskyi2019-12-16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * dolt: init at 0.12.0 * Update pkgs/servers/sql/dolt/default.nix Co-Authored-By: robert seaton <robbpseaton@gmail.com> * fix eval * Update pkgs/servers/sql/dolt/default.nix Co-Authored-By: Wael Nasreddine <wael.nasreddine@gmail.com> * update Go docs as well
| * | | Merge pull request #75722 from flokli/xilinx-bootgenFlorian Klink2019-12-15
| |\ \ \ | | | | | | | | | | xilinx-bootgen: init at 2019-10-23
| | * | | xilinx-bootgen: init at unstable-2019-10-23Florian Klink2019-12-15
| | | |/ | | |/|
| * | | Merge pull request #75723 from andir/advancecompMichael Raskin2019-12-15
| |\ \ \ | | | | | | | | | | advancecomp: fix CVE-2019-9210
| | * | | advancecomp: fix CVE-2019-9210Andreas Rammhold2019-12-15
| | | | |
| * | | | Merge pull request #75715 from andir/ansibleFranz Pletz2019-12-15
| |\ \ \ \ | | | | | | | | | | | | ansible fixes for CVE-2019-10156 CVE-2019-10206 CVE-2019-14846 CVE-2019-14856 CVE-2019-14858 CVE-2019-14864
| | * | | | ansible_2_6: 2.6.17 -> 2.6.20Andreas Rammhold2019-12-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This addresses the following security issues: * CVE-2019-14846 - Several Ansible plugins could disclose aws credentials in log files. inventory/aws_ec2.py, inventory/aws_rds.py, lookup/aws_account_attribute.py, and lookup/aws_secret.py, lookup/aws_ssm.py use the boto3 library from the Ansible process. The boto3 library logs credentials at log level DEBUG. If Ansible's logging was enabled (by setting LOG_PATH to a value) Ansible would set the global log level to DEBUG. This was inherited by boto and would then log boto credentials to the file specified by LOG_PATH. This did not affect aws ansible modules as those are executed in a separate process. This has been fixed by switching to log level INFO * Convert CLI provided passwords to text initially, to prevent unsafe context being lost when converting from bytes->text during post processing of PlayContext. This prevents CLI provided passwords from being incorrectly templated (CVE-2019-14856) * properly hide parameters marked with no_log in suboptions when invalid parameters are passed to the module (CVE-2019-14858) * resolves CVE-2019-10206, by avoiding templating passwords from prompt as it is probable they have special characters. * Handle improper variable substitution that was happening in safe_eval, it was always meant to just do 'type enforcement' and have Jinja2 deal with all variable interpolation. Also see CVE-2019-10156 Changelog: https://github.com/ansible/ansible/blob/9bdb89f740a87bcf760424577ce18a8f68d7a741/changelogs/CHANGELOG-v2.6.rst
| | * | | | ansible_2_8: 2.8.4 -> 2.8.7Andreas Rammhold2019-12-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This addresses the following security issues: * Ansible: Splunk and Sumologic callback plugins leak sensitive data in logs (CVE-2019-14864) * CVE-2019-14846 - Several Ansible plugins could disclose aws credentials in log files. inventory/aws_ec2.py, inventory/aws_rds.py, lookup/aws_account_attribute.py, and lookup/aws_secret.py, lookup/aws_ssm.py use the boto3 library from the Ansible process. The boto3 library logs credentials at log level DEBUG. If Ansible's logging was enabled (by setting LOG_PATH to a value) Ansible would set the global log level to DEBUG. This was inherited by boto and would then log boto credentials to the file specified by LOG_PATH. This did not affect aws ansible modules as those are executed in a separate process. This has been fixed by switching to log level INFO * Convert CLI provided passwords to text initially, to prevent unsafe context being lost when converting from bytes->text during post processing of PlayContext. This prevents CLI provided passwords from being incorrectly templated (CVE-2019-14856) * properly hide parameters marked with no_log in suboptions when invalid parameters are passed to the module (CVE-2019-14858) Changelog: https://github.com/ansible/ansible/blob/24220a618a6d5cd3b5c99f8c7f7771661ed08d33/changelogs/CHANGELOG-v2.8.rst
| | * | | | ansible_2_7: 2.7.11 -> 2.7.15Andreas Rammhold2019-12-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This fixes the following security issues: * Ansible: Splunk and Sumologic callback plugins leak sensitive data in logs (CVE-2019-14864) * CVE-2019-14846 - Several Ansible plugins could disclose aws credentials in log files. inventory/aws_ec2.py, inventory/aws_rds.py, lookup/aws_account_attribute.py, and lookup/aws_secret.py, lookup/aws_ssm.py use the boto3 library from the Ansible process. The boto3 library logs credentials at log level DEBUG. If Ansible's logging was enabled (by setting LOG_PATH to a value) Ansible would set the global log level to DEBUG. This was inherited by boto and would then log boto credentials to the file specified by LOG_PATH. This did not affect aws ansible modules as those are executed in a separate process. This has been fixed by switching to log level INFO * Convert CLI provided passwords to text initially, to prevent unsafe context being lost when converting from bytes->text during post processing of PlayContext. This prevents CLI provided passwords from being incorrectly templated (CVE-2019-14856) * properly hide parameters marked with no_log in suboptions when invalid parameters are passed to the module (CVE-2019-14858) * resolves CVE-2019-10206, by avoiding templating passwords from prompt as it is probable they have special characters. * Handle improper variable substitution that was happening in safe_eval, it was always meant to just do 'type enforcement' and have Jinja2 deal with all variable interpolation. Also see CVE-2019-10156 Changelog: https://github.com/ansible/ansible/blob/0623dedf2d9c4afc09e5be30d3ef249f9d1ebece/changelogs/CHANGELOG-v2.7.rst#v2-7-15
| * | | | | Merge pull request #75708 from andir/thunderbird-binFranz Pletz2019-12-15
| |\ \ \ \ \ | | | | | | | | | | | | | | thunderbird-bin: 68.2.2 -> 68.3.0
| | * | | | | thunderbird-bin: 68.2.2 -> 68.3.0Andreas Rammhold2019-12-15
| | | |_|/ / | | |/| | |
| * | | | | Merge pull request #67781 from jonringer/bump-errbotFranz Pletz2019-12-15
| |\ \ \ \ \ | | | | | | | | | | | | | | errbot: 5.2.0 -> 6.1.1
| | * | | | | errbot: 5.2.0 -> 6.1.1Jonathan Ringer2019-12-15
| | | | | | |
| * | | | | | xmr-stak: 2.10.7 -> 2.10.8R. RyanTM2019-12-15
| | | | | | |
| * | | | | | Merge pull request #75234 from filalex77/subfinder-2.2.2Franz Pletz2019-12-15
| |\ \ \ \ \ \ | | | | | | | | | | | | | | | | subfinder: 2018-07-15 -> 2.2.4
| | * | | | | | subfinder: 2.2.2 -> 2.2.4Oleksii Filonenko2019-12-15
| | | | | | | |
| | * | | | | | subfinder: add filalex77 to maintainersOleksii Filonenko2019-12-08
| | | | | | | |
| | * | | | | | subfinder: 2018-07-15 -> 2.2.2Oleksii Filonenko2019-12-08
| | | | | | | |
| * | | | | | | Merge pull request #75474 from chkno/xsecurelock-no-longer-needs-xset-path-fixedFranz Pletz2019-12-15
| |\ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | xsecurelock: Remove obsolete path fix
| | * | | | | | | xsecurelock: Remove obsolete path fixChuck2019-12-10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | helpers/saver_blank became trivial in xsecurelock commit d4a817ae5e071540a1b11825908dd91a8697591a, which first appeared in release 1.4.0.
| * | | | | | | | Merge pull request #75704 from andir/dovecotFranz Pletz2019-12-15
| |\ \ \ \ \ \ \ \ | | |_|_|_|_|_|/ / | |/| | | | | | | dovecot: 2.3.8 -> 2.3.9.2
| | * | | | | | | dovecot: 2.3.8 -> 2.3.9.2Andreas Rammhold2019-12-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Update to latest version & updated the patch file to match with the lastest verison. Fixes the following security issue: * CVE-2019-19722: Mails with group addresses in From or To fields caused crash in push notification drivers.
| * | | | | | | | Merge pull request #75682 from Kiwi/wire-desktop-iconworldofpeace2019-12-15
| |\ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | wire-desktop: fix desktop icon
| | * | | | | | | | wire-desktop: fix desktop iconRobert Djubek2019-12-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Update the Name attribute in the wire-desktop.desktop applications file and add StartupWMClass key. This fixes the icons on plasma5 and gnome3 which, in certain places, showed a generic X.org icon instead of the Wire icon.
| * | | | | | | | | gtk-server: 2.3.1 -> 2.4.5Jonathan Ringer2019-12-15
| | |_|_|_|/ / / / | |/| | | | | | | | | | | | | | | | | | | | | | | | | Also bumped gtk version from gtk2 to gtk3
| * | | | | | | | Merge pull request #75331 from r-ryantm/auto-update/python3.8-mysqlclientMario Rodas2019-12-15
| |\ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | python38Packages.mysqlclient: 1.4.5 -> 1.4.6
| | * | | | | | | | python38Packages.mysqlclient: 1.4.5 -> 1.4.6R. RyanTM2019-12-08
| | | | | | | | | |
| * | | | | | | | | Merge pull request #75368 from r-ryantm/auto-update/python3.8-sasmodelsMario Rodas2019-12-15
| |\ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | python38Packages.sasmodels: 1.0.0 -> 1.0.1
| | * | | | | | | | | python38Packages.sasmodels: 1.0.0 -> 1.0.1R. RyanTM2019-12-09
| | |/ / / / / / / /
| * | | | | | | | | Merge pull request #75675 from marsam/update-git-goneMario Rodas2019-12-15
| |\ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | gitAndTools.git-gone: 0.1.2 -> 0.2.0
| | * | | | | | | | | gitAndTools.git-gone: 0.1.2 -> 0.2.0Mario Rodas2019-12-14
| | | |_|/ / / / / / | | |/| | | | | | |
| * | | | | | | | | Merge pull request #75398 from r-ryantm/auto-update/tpm2-toolsMario Rodas2019-12-15
| |\ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | tpm2-tools: 4.0.1 -> 4.1
| | * | | | | | | | | tpm2-tools: 4.0.1 -> 4.1R. RyanTM2019-12-09
| | | |/ / / / / / / | | |/| | | | | | |
| * | | | | | | | | Merge pull request #75516 from ivan/chromium-79.0.3945.79Graham Christensen2019-12-15
| |\ \ \ \ \ \ \ \ \ | | |_|_|_|_|_|_|/ / | |/| | | | | | | | chromium: 78.0.3904.108 -> 79.0.3945.79
| | * | | | | | | | chromium: fix enableWideVine for v79 which needs the manifest.json in ↵Ivan Kozik2019-12-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | WidevineCdm/
| | * | | | | | | | chromium: explain enable_widevine = trueIvan Kozik2019-12-15
| | | | | | | | | |
| | * | | | | | | | chromium: remove enableNaCl optionIvan Kozik2019-12-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This hasn't worked since 2016 (https://github.com/NixOS/nixpkgs/issues/13983) and is being removed very soon, per "Q4 2019" in https://developer.chrome.com/native-client/migration (It's staying around for "Chrome Apps", but those only run on ChromeOS now.) earth.google.com users can use https://earth.google.com/web/?beta=1 to get the wasm version instead of the PNaCl version.
| | * | | | | | | | chromium: use llvmPackages_9 to more closely match upstreamIvan Kozik2019-12-15
| | | | | | | | | |
| | * | | | | | | | chromium: fix GL support by not using the ANGLE GL implementationIvan Kozik2019-12-15
| | | | | | | | | |
| | * | | | | | | | chromium: 78.0.3904.108 -> 79.0.3945.79Ivan Kozik2019-12-11
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html CVE-2019-13725 CVE-2019-13726 CVE-2019-13727 CVE-2019-13728 CVE-2019-13729 CVE-2019-13730 CVE-2019-13732 CVE-2019-13734 CVE-2019-13735 CVE-2019-13764 CVE-2019-13736 CVE-2019-13737 CVE-2019-13738 CVE-2019-13739 CVE-2019-13740 CVE-2019-13741 CVE-2019-13742 CVE-2019-13743 CVE-2019-13744 CVE-2019-13745 CVE-2019-13746 CVE-2019-13747 CVE-2019-13748 CVE-2019-13749 CVE-2019-13750 CVE-2019-13751 CVE-2019-13752 CVE-2019-13753 CVE-2019-13754 CVE-2019-13755 CVE-2019-13756 CVE-2019-13757 CVE-2019-13758 CVE-2019-13759 CVE-2019-13761 CVE-2019-13762 CVE-2019-13763 The new widevine patch was taken from https://git.archlinux.org/svntogit/packages.git/plain/trunk/chromium-widevine.patch?h=packages/chromium
| * | | | | | | | | Merge pull request #75671 from clayrat/tparsec-updateMario Rodas2019-12-15
| |\ \ \ \ \ \ \ \ \ | | |_|_|_|_|_|_|/ / | |/| | | | | | | | idrisPackages.tparsec: 2019-06-18 -> 2019-09-19
| | * | | | | | | | idrisPackages.tparsec: 2019-06-18 -> 2019-09-19Alex Gryzlov2019-12-15
| | | | | | | | | |
| * | | | | | | | | tectonic: 0.1.11 -> 0.1.12 (#75396)Marco A L Barbosa2019-12-15
| | | | | | | | | |