157780 Commits

Author SHA1 Message Date
Herman Fries
e74b79709a dotnet-sdk: 2.1.402 -> 2.1.403 2018-10-23 15:49:20 +02:00
Brandon Elam Barker
68cb7903c7 ats2: 0.3.11 -> 0.3.12 2018-10-23 13:23:03 +00:00
Jörg Thalheim
a463643de8
Merge pull request #48856 from peterhoeg/u/sc
snapcast: 0.14.0 -> 0.15.0
2018-10-23 14:04:26 +01:00
Vincent Demeester
ab27bcf01e buildah: 1.1 -> 1.4
Signed-off-by: Vincent Demeester <vincent@sbr.pm>
2018-10-23 13:17:31 +02:00
xeji
8eb13ff724
Merge pull request #48869 from Synthetica9/patch-2
wlroots: remove broken tag
2018-10-23 12:42:52 +02:00
Bart Brouns
3a84f7a6a5 dragonfly-reverb: 0.9.1 -> 0.9.4 (#48691) 2018-10-23 12:42:01 +02:00
Edmund Wu
a53a3bf1ee vscode-extensions.ms-python.python: 2018.8.0 -> 2018.9.1 (#48849) 2018-10-23 12:34:31 +02:00
Rob Vermaas
debbed29d1 datadog-agent: add option to enable trace agent 2018-10-23 12:30:06 +02:00
Patrick Hilhorst
886131c243
wlroots: remove broken tag
See: https://github.com/NixOS/nixpkgs/issues/38344#issuecomment-432032834
2018-10-23 12:26:30 +02:00
Alyssa Ross
e20e1e5c2c weechat: add perl.withPackages (#48815)
Allows for adding Perl libraries in the same way as for Python. Doesn't
really need to be a function, since there's only one perlPackages in
nixpkgs, but I went for consistency with the python plugin.
2018-10-23 12:23:47 +02:00
Wael Nasreddine
cc4b9ef40f gocode: 2018-07-27 -> 2018-10-22 (#48832)
github.com/nsf/gocode has also been deprecated in favor of github.com/mdempsky/gocode
2018-10-23 12:14:55 +02:00
Silvan Mosberger
6f00276171
Merge pull request #48661 from baracoder/nvidia-update
nvidia_x11: 390.87 -> 410.66
2018-10-23 12:01:58 +02:00
Jörg Thalheim
e82af6003c
Merge pull request #48821 from nyanloutre/jackett-10-365
jackett: 0.10.304 -> 0.10.365
2018-10-23 10:42:48 +01:00
Jörg Thalheim
29373797c4
Merge pull request #48860 from r-ryantm/auto-update/wavebox
wavebox: 4.3.0 -> 4.4.0
2018-10-23 10:42:21 +01:00
R. RyanTM
6d0b34f3c8 wireguard-tools: 0.0.20181007 -> 0.0.20181018
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/wireguard-tools/versions
2018-10-23 02:32:02 -07:00
R. RyanTM
7133128107 urh: 2.3.0 -> 2.4.0
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/urh/versions
2018-10-23 02:18:56 -07:00
Elis Hirwing
608e7b20f6 sequeler: 0.6.2 -> 0.6.3 (#48858)
Changelog: https://github.com/Alecaddd/sequeler/releases/tag/v0.6.3
2018-10-23 11:08:33 +02:00
nyanloutre
7a44e6e365 jackett: update mono version to 5.14
See details here : https://github.com/NixOS/nixpkgs/pull/48821#issuecomment-431837095
2018-10-23 10:59:32 +02:00
Peter Hoeg
a080e0a424
Merge pull request #47718 from peterhoeg/f/fj
firejail: override files should be in /etc/firejail
2018-10-23 16:57:28 +08:00
Michael Raskin
fd9b525d88
Merge pull request #48808 from danieldk/openalSoft-1.19.1
openal: 1.19.0 -> 1.19.1
2018-10-23 08:54:31 +00:00
Michael Raskin
16c329f3da visidata: init at 1.3.1 2018-10-23 12:00:11 +03:00
Joachim F
3fb7ce300d
Merge pull request #48855 from r-ryantm/auto-update/zimg
zimg: 2.7.5 -> 2.8
2018-10-23 08:41:38 +00:00
Jörg Thalheim
4008dff2e7
Merge pull request #48859 from dywedir/skim
skim: 0.5.1 -> 0.5.2
2018-10-23 09:38:50 +01:00
Michael Raskin
acb7d85993 lrs: init at 7.0 2018-10-23 11:41:29 +03:00
R. RyanTM
1d0ab5d73b units: 2.17 -> 2.18
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/units/versions
2018-10-23 01:32:01 -07:00
Andreas Rammhold
5137c04770
firefox-bin: 62.0.3 -> 63.0 2018-10-23 10:15:48 +02:00
Andreas Rammhold
277da59e47
firefox: 62.0.3 -> 63.0 2018-10-23 10:15:46 +02:00
Andreas Rammhold
8a9b6bc607
nss: 3.38 -> 3.39 2018-10-23 10:15:44 +02:00
Sarah Brofeldt
1d8c5e70cf
Merge pull request #48783 from marsam/feature/update-redis
redis: 4.0.11 -> 5.0.0
2018-10-23 10:10:17 +02:00
lewo
1a840f6fb4
Merge pull request #48614 from vdemeester/init-kube-prompt
kube-prompt: init at 1.0.4
2018-10-23 09:49:58 +02:00
R. RyanTM
2fb21f220e wavebox: 4.3.0 -> 4.4.0
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/wavebox/versions
2018-10-23 00:49:54 -07:00
Vladyslav Mykhailichenko
ef0a9f42a6 skim: 0.5.1 -> 0.5.2 2018-10-23 10:31:05 +03:00
Peter Hoeg
3eeecc0988 snapcast: 0.14.0 -> 0.15.0 2018-10-23 14:33:45 +08:00
R. RyanTM
12e6483d07 zimg: 2.7.5 -> 2.8
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/zimg/versions
2018-10-22 23:16:56 -07:00
midchildan
444ce2dbdf
sourcetrail: init at 2018.3.55 2018-10-23 11:37:07 +09:00
José Romildo Malaquias
3c13950733 go-lib: 1.2.16.1 -> 1.2.16.3 2018-10-22 21:15:01 -03:00
José Romildo Malaquias
6b087a3d21 go-lib: fix instalation directory for source 2018-10-22 21:15:00 -03:00
José Romildo Malaquias
fffd13e5e0 go-dbus-factory: fix instalation directory for source 2018-10-22 21:15:00 -03:00
José Romildo Malaquias
38bb704137 dbus-factory: fix instalation directory for source 2018-10-22 21:15:00 -03:00
José Romildo Malaquias
c3fe5bd088 dde-daemon: init at 3.2.24.7 2018-10-22 21:15:00 -03:00
Vladyslav M
66760c7c5c
Merge pull request #48846 from veprbl/pr/zstd_137
zstd: 1.3.6 -> 1.3.7
2018-10-23 02:05:08 +03:00
Renaud
ab5380ec82
nixos/ddclient: make configFile private
/run/ddclient/ddclient.conf should be installed in mode 660 (readable and writeable only by ddclient.service user and group)
2018-10-23 00:43:41 +02:00
John Wiegley
8a7cd00597
wabt: Allow building on Darwin as well 2018-10-22 15:32:09 -07:00
Dmitry Kalinkin
0b520bd26d
zstd: 1.3.6 -> 1.3.7 2018-10-22 18:27:35 -04:00
Renaud
f76a9eb526
nixos/ddclient: make RuntimeDirectory private
ddclient will raise a warning if /run/ddclient/ is world-readable
2018-10-22 23:58:12 +02:00
Jörg Thalheim
9a7bca27cc
Merge pull request #48834 from dhess/dovenull-group-fix
dovecot: dovenull user should have its own group.
2018-10-22 22:46:17 +01:00
Benjamin Hipple
f65afcb4c3 pythonPackages.bitarray: init at 0.8.3 2018-10-22 17:23:05 -04:00
Michael Weiss
f4615bef06 wlroots: 2018-03-16 -> 0.1
Keep "meta.broken = true" but update the package to keep track of
upstream changes and prepare the "reintegration" into nixpkgs.
2018-10-22 22:58:44 +02:00
R. RyanTM
7615027fad libowfat: 0.31 -> 0.32 (#48414)
* libowfat: 0.31 -> 0.32

Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/libowfat/versions

* libowfat: keep headers under include directory

0.32 wanted to move them under include/libowfat/ 
but it breaks gatling and opentracker
2018-10-22 22:43:11 +02:00
Arian van Putten
9f72791516 nixos/containers: Introduce several tweaks to systemd-nspawn from upstream systemd
* Lets container@.service  be activated by machines.target instead of
  multi-user.target

  According to the systemd manpages, all containers that are registered
  by machinectl, should be inside machines.target for easy stopping
  and starting container units altogether

* make sure container@.service and container.slice instances are
  actually located in machine.slice

  https://plus.google.com/112206451048767236518/posts/SYAueyXHeEX
  See original commit: https://github.com/NixOS/systemd/commit/45d383a3b8

* Enable Cgroup delegation for nixos-containers

  Delegate=yes should be set for container scopes where a systemd instance
  inside the container shall manage the hierarchies below its own cgroup
  and have access to all controllers.

  This is equivalent to enabling all accounting options on the systemd
  process inside the system container.  This means that systemd inside
  the container is responsible for managing Cgroup resources for
  unit files that enable accounting options inside.  Without this
  option, units that make use of cgroup features within system
  containers might misbehave

  See original commit: https://github.com/NixOS/systemd/commit/a931ad47a8

  from the manpage:
    Turns on delegation of further resource control partitioning to
    processes of the unit. Units where this is enabled may create and
    manage their own private subhierarchy of control groups below the
    control group of the unit itself. For unprivileged services (i.e.
    those using the User= setting) the unit's control group will be made
    accessible to the relevant user. When enabled the service manager
    will refrain from manipulating control groups or moving processes
    below the unit's control group, so that a clear concept of ownership
    is established: the control group tree above the unit's control
    group (i.e. towards the root control group) is owned and managed by
    the service manager of the host, while the control group tree below
    the unit's control group is owned and managed by the unit itself.
    Takes either a boolean argument or a list of control group
    controller names. If true, delegation is turned on, and all
    supported controllers are enabled for the unit, making them
    available to the unit's processes for management. If false,
    delegation is turned off entirely (and no additional controllers are
    enabled). If set to a list of controllers, delegation is turned on,
    and the specified controllers are enabled for the unit. Note that
    additional controllers than the ones specified might be made
    available as well, depending on configuration of the containing
    slice unit or other units contained in it. Note that assigning the
    empty string will enable delegation, but reset the list of
    controllers, all assignments prior to this will have no effect.
    Defaults to false.

    Note that controller delegation to less privileged code is only safe
    on the unified control group hierarchy. Accordingly, access to the
    specified controllers will not be granted to unprivileged services
    on the legacy hierarchy, even when requested.

    The following controller names may be specified: cpu, cpuacct, io,
    blkio, memory, devices, pids. Not all of these controllers are
    available on all kernels however, and some are specific to the
    unified hierarchy while others are specific to the legacy hierarchy.
    Also note that the kernel might support further controllers, which
    aren't covered here yet as delegation is either not supported at all
    for them or not defined cleanly.
2018-10-22 22:36:08 +02:00