Commit graph

54678 commits

Author SHA1 Message Date
Peter Simons
028363d969 haskell-Rasterific: update to version 0.4 2014-12-13 12:06:02 +01:00
Peter Simons
1a0505143c haskell-github-backup: update to version 1.20141204 2014-12-13 12:06:02 +01:00
Peter Simons
c55c87085d haskell-taffybar: update to version 0.4.4 2014-12-13 12:06:02 +01:00
Peter Simons
ccd74d7497 haskell-ghc-server: drop obsolete package 2014-12-13 12:06:01 +01:00
Peter Simons
5e2f4a4a73 haskell-gloss-rendering: add version 1.9.2.1 2014-12-13 12:06:01 +01:00
Peter Simons
17589d33da haskell-list-t: add version 0.3.0 2014-12-13 12:06:01 +01:00
Peter Simons
f514804aad haskell-mtl-prelude: add version 1.0.1 2014-12-13 12:06:01 +01:00
Peter Simons
d9566a3b35 haskell-hlint: update to version 1.9.13 2014-12-13 12:06:01 +01:00
aszlig
69858d7743
nixos: Add VM test for VirtualBox.
Currently it pretty much tests starting up virtual machines and just
shutting down afterwards, but for both VBoxManage and the VirtualBox
GUI.

This helps catching errors in hardened mode, however we still need to
test whether networking works the way intended (and I fear that this is
broken at the moment).

The VirtualBox VM is _not_ using hardware virtualization support (thus
we use system = "i686-linux", because x86_64 has no emulation support),
because we're already within a qemu VM, which means it's going to be
slow as hell (that's why I've written own subs just for testing
startup/shutdown/whatnot with respective timeouts).

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2014-12-13 11:43:44 +01:00
Michael Raskin
34b0d860d5 Try harder to use out-of-store udev rule location 2014-12-13 12:55:24 +03:00
Michael Raskin
efd51accc4 Trying to update iptables - apparently, already latest 2014-12-13 12:55:24 +03:00
Michael Raskin
fbceebd868 Merge pull request #5288 from mstarzyk/j
j: Fix building libj.so
2014-12-13 10:49:30 +03:00
aszlig
0d71ec8a6e
nixos/virtualbox: Fix setuid wrappers.
We only need to have setuid-root wrappers for VBox{Headless,SDL} and
VirtualBox, otherwise VBoxManage will run as root and NOT drop
privileges!

Fixes #5283.

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2014-12-13 07:52:19 +01:00
Jaka Hudoklin
e1c679f0fb Merge pull request #5319 from offlinehacker/pkgs/xca/fix
xca: not broken anymore
2014-12-13 01:13:12 +01:00
Jaka Hudoklin
6e7d796b54 xca: not broken anymore 2014-12-13 00:56:59 +01:00
Jaka Hudoklin
d8ee91cb54 nixos: container profile, fix a few things 2014-12-12 20:28:01 +01:00
Michael Raskin
2c85888a04 Fix Firefox wrapper set-as-default functionality 2014-12-12 22:03:06 +03:00
Domen Kožar
e0e08f1465 whitespace change to fix k2pdfopt build
(cherry picked from commit 896036d8e5)
Signed-off-by: Domen Kožar <domen@dev.si>
2014-12-12 18:39:01 +01:00
Domen Kožar
e752a8cff9 gltron: mark as broken
(cherry picked from commit 23d01bb90c)
Signed-off-by: Domen Kožar <domen@dev.si>
2014-12-12 18:39:01 +01:00
Jaka Hudoklin
13e58784bf nixos/gitlab: fixes
- fix timezone data not found
- fix module, add simple test
- allow to set port
2014-12-12 18:01:31 +01:00
Thomas Hunger
59995e168c nixos: Add gitlab and gitlab-shell
I had to make several adjustments to make it work with nixos:

* Replace relative config file lookups with ENV variable.
* Modify gitlab-shell to not clear then environment when running
  pre-receive.
* Modify gitlab-shell to write some environment variables into
  the .authorized_keys file to make sure gitlab-shell reads the
  correct config file.
* Log unicorn output to syslog.
  I tried various ways of adding a syslog package but the bundler would
  not pick them up. Please fix in a better way if possible.
* Gitlab-runner program wrapper.
  This is useful to run e.g. backups etc. with the correct
  environment set up.
2014-12-12 18:01:29 +01:00
Domen Kožar
b7eba773dc hhvm: 3.2.0 -> 3.3.0, fix build
(cherry picked from commit 9d0d9ae9f7)
Signed-off-by: Domen Kožar <domen@dev.si>
2014-12-12 17:09:48 +01:00
tv
86055e2f00 nixopsUnstable: Initial version 1.3pre1362_2a616f8 2014-12-12 16:30:54 +01:00
Luca Bruno
e3b84d8dfc Some fixes to the polari irc client 2014-12-12 15:24:23 +01:00
Luca Bruno
f28eff8b82 Merge branch 'polari', PR #5264 2014-12-12 15:12:54 +01:00
Damien Cassou
bc789064d8 Package for the Polari IRC app
This commit includes a patch to telepathy's derivation, written by
Lethalman. This patch makes public the Telepathy's dependency to
dbus_glib. This patch will become problematic with the next pkgconfig
upgrade but this upgrade should make the patch irrelevant. See these 2
links for more information:
- https://bugs.freedesktop.org/show_bug.cgi?id=15199
- https://bugzilla.redhat.com/show_bug.cgi?id=436773

Modified by Luca Bruno:
- Moved telepathy_idle to propagatedUserEnvPkgs
- Added myself to maintainers
- Enable parallel building
2014-12-12 15:12:19 +01:00
Eelco Dolstra
fcd4aa44d5 valgrind: Update to 3.10.1 2014-12-12 15:08:25 +01:00
Oliver Charles
40bbc1806a opentsdb: Use the release tarball
Now that https://github.com/OpenTSDB/opentsdb/issues/420 is resolved
we can use the official release tarball. This includes all third
party JARs, which vastly simplifies the build expression.
2014-12-12 12:43:15 +00:00
Damien Cassou
f581054dc4 Add python package mutag 2014-12-12 13:35:27 +01:00
Michael Raskin
9ed097ab50 Fix fetchzip for actuall zip files 2014-12-12 15:16:57 +03:00
Michael Raskin
59ec0f0e0d Improve eudev paths in the same way as they are set in the original package 2014-12-12 14:49:20 +03:00
Pascal Wittmann
377822fb64 mujs: update to latest revision 2014-12-12 12:14:13 +01:00
Vladimír Čunát
3bcd3ed017 nixos: check resumeDevice is absolute path and document
Fixes #5219 after merging #4995.

(cherry picked from commit 0681d61c37)
Signed-off-by: Domen Kožar <domen@dev.si>
2014-12-12 11:11:57 +01:00
Eelco Dolstra
8bb494c170 Get rid of a warning about dbus in the activation script 2014-12-12 10:45:37 +01:00
Peter Simons
29546928b1 haskell-LambdaHack: update to version 0.4.100.0 2014-12-12 10:01:28 +01:00
Peter Simons
61d4faa59d haskell-Allure: update to version 0.4.100.0 2014-12-12 10:01:28 +01:00
lethalman
ed485025e3 Merge pull request #5305 from wizeman/u/scikit
python3Packages.scikitlearn: Enable on py3k
2014-12-12 09:48:51 +01:00
Peter Simons
46b0c68ea2 Merge pull request #5282 from rickynils/java-truststore-env
openjdk: Read SSL truststore from JAVAX_NET_SSL_TRUSTSTORE
2014-12-12 09:22:15 +01:00
Austin Seipp
0bdff430a4 nixpkgs: rr 2.0.0 -> 3.0.0, with 64bit support
Signed-off-by: Austin Seipp <aseipp@pobox.com>
2014-12-12 01:20:23 -06:00
Stewart Mackenzie
1e7f7edd72 Erlang bump from 17.3 to 17.4 as 17.3 has a serious ssl bug 2014-12-12 15:13:10 +08:00
Mateusz Kowalczyk
614ea25952 mpv: update to 0.7.1 2014-12-12 03:16:17 +00:00
Mateusz Kowalczyk
4fcb615498 youtube-dl: update to 2014.12.12.1 2014-12-12 03:09:02 +00:00
Ricardo M. Correia
b772ba327e python3Packages.scikitlearn: Enable on py3k 2014-12-12 03:48:07 +01:00
Jaka Hudoklin
0d01793870 Merge pull request #5290 from bbarker/gradle221
keeping gradle updated
2014-12-12 03:06:33 +01:00
aszlig
cf7f15c92c
nixos-install: Pass CA cert bundle to chroot.
Since we're using HTTPS for the binary cache (introduced in faf0797) by
default, the binary cache should also be available during installation.

The file that is defined in SSL_CERT_FILE outside of the chroot is
copied over to /tmp/ca-cert.crt inside the chroot, so we have an
absolute path we can reference during nixos-install. However, this might
end up with the file not being cleaned up properly from outside of the
store, but neither would be /tmp/root so the cleanup issue needs to be
solved in another place (or commit to be more exact).

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2014-12-12 03:03:14 +01:00
Jaka Hudoklin
f2e20fa837 nixos: container profile, update /init symlink on rebuild 2014-12-12 02:55:23 +01:00
Jaka Hudoklin
1f9acba088 Merge pull request #5303 from massimo-zaniboni/submit/redmine
redmine: use libc libiconv implementation on Linux.
2014-12-12 02:34:51 +01:00
Massimo Zaniboni
32f9644943 redmine: use libc libciconv implementation on Linux. 2014-12-12 01:20:53 +01:00
Rickard Nilsson
95fdc8cf29 openjdk: Introduce JAVAX_NET_SSL_TRUSTSTORE env
This small patch makes it possible to control java's truststore path through
the environment. This lets you add (system- or session-wide) CAs that should
be allowed by Java. Java users can still use -Djavax.net.ssl.truststore to
override the truststore set by JAVAX_NET_SSL_TRUSTSTORE.

Something like this can be used to build the truststore (in this example just
using the standard pkgs.cacert CA-bundle):

{
  environment.variables.JAVAX_NET_SSL_TRUSTSTORE = "${
    pkgs.runCommand "cacerts" {} ''
      ${pkgs.perl}/bin/perl \
        ${pkgs.path}/pkgs/development/compilers/openjdk/generate-cacerts.pl \
        ${pkgs.jre}/bin/keytool \
        ${pkgs.cacert}/etc/ca-bundle.crt
      mv cacerts $out
    ''
  }";
}

Ideally, the dependency on pkgs.cacert should also be removed from pkgs.openjdk
to avoid rebuilding java each time the standard CA-bundle changes. Something
along the example above must then be added to NixOS (however, it would be
nice to not depend on ${pkgs.jre}/bin/keytool to generate that environment
variable).
2014-12-12 01:14:09 +01:00
Jaka Hudoklin
c96df1fece Merge pull request #5302 from ambrop72/virtualbox-network-interface
virtualbox: Unbreak the nixos module.
2014-12-12 00:30:34 +01:00