about summary refs log tree commit diff
path: root/pkgs/applications/networking
Commit message (Collapse)AuthorAge
* esniper: update to version 2.30.0Peter Simons2014-05-23
|
* Merge pull request #2730 from pSub/dwb-updatePeter Simons2014-05-23
|\ | | | | Update dwb. This fixes some bugs in dwb.
| * Update dwb. This fixes some bugs in dwb.Pascal Wittmann2014-05-23
| |
* | Merge pull request #2719 from wizeman/u/transmission-updVladimír Čunát2014-05-22
|\ \ | | | | | | transmission: Update from 2.82 -> 2.83 + fixes
| * | transmission: Fix compilation due to missing systemd dependencyRicardo M. Correia2014-05-22
| | |
| * | transmission: Update from 2.82 -> 2.83Ricardo M. Correia2014-05-22
| | |
* | | flashplayer: Update from 11.2.202.356 -> 11.2.202.359Ricardo M. Correia2014-05-22
| | |
* | | chromium: Update stable channel from 34.0.1847.132 -> 35.0.1916.114Ricardo M. Correia2014-05-22
|/ /
* | lynx: update from 2.8.7 to 2.8.8Rob Vermaas2014-05-22
| |
* | firefox: Update to 29.0.1Eelco Dolstra2014-05-19
| |
* | btsync: fix my stupidityAustin Seipp2014-05-18
| | | | | | | | Signed-off-by: Austin Seipp <aseipp@pobox.com>
* | btsync: 1.3.93 -> 1.3.94Austin Seipp2014-05-18
| | | | | | | | Signed-off-by: Austin Seipp <aseipp@pobox.com>
* | Merge pull request #2604 from wkennington/master.notbitAustin Seipp2014-05-17
|\ \ | | | | | | notbit: Bump version and add more configuration options
| * | notbit: Bump to git-faf0930William A. Kennington III2014-05-13
| | |
* | | Merge pull request #2662 from wkennington/master.mumbleRob Vermaas2014-05-16
|\ \ \ | | | | | | | | mumble: Update 1.2.5 -> 1.2.6
| * | | mumble: Update 1.2.5 -> 1.2.6William A. Kennington III2014-05-15
| | | |
* | | | syncthing: update to version 0.8.5Christoph Hrdinka2014-05-15
|/ / /
* | | Merge pull request #2438 from falsifian/gnunet_depsAustin Seipp2014-05-14
|\ \ \ | |/ / |/| | fix GNUnet missing dependencies
| * | gnunet: add libgnurl and GnuTLS as dependenciesJames Cook2014-04-27
| | | | | | | | | | | | | | | | | | | | | libgnurl is essential for bootstrapping (needed to download a hostlist). GnuTLS is needed by gnunet-gns-proxy. Also sort dependencies alphabetically.
* | | Merge pull request #2624 from lethalman/uzbllethalman2014-05-13
|\ \ \ | | | | | | | | uzbl: Add gsettings_desktop_schemas as build input. Closes #2332
| * | | uzbl: Add gsettings_desktop_schemas as build input. Closes #2332Luca Bruno2014-05-12
| | |/ | |/|
* | | conkeror: upgrade to latest snapshotMathijs Kwik2014-05-10
| | |
* | | Merge pull request #2506 from ikervagyok/muttRob Vermaas2014-05-09
|\ \ \ | | | | | | | | Updated to mutt-1.5.23
| * | | Updated to mutt-1.5.23Lengyel Balázs2014-05-05
| | | |
* | | | rsyncd: default read/write permissions should be nobody:nogroupEmery Hemingway2014-05-09
| | | |
* | | | pidgin-sipe: fix build by updatingVladimír Čunát2014-05-08
| | | | | | | | | | | | | | | | Also add platforms (linux).
* | | | sylpheed: 3.2 (2012) -> 3.4.1 (2014) (close #2558)Benjamin Podszun2014-05-08
| | | | | | | | | | | | | | | | vcunat fixed eval and tested it runs.
* | | | nixpkgs: Bump filezilla to 3.8.0 (close #2578)Benjamin Podszun2014-05-08
| |/ / |/| |
* | | dropbox-cli: use stable URL, version 1.6.2Vladimír Čunát2014-05-08
| | | | | | | | | | | | Thanks to @darklajid for reporting and testing on IRC.
* | | midori: fix build (close #2542)宋文武2014-05-06
| | |
* | | chromium: Fix userns sandbox patch for version 36.aszlig2014-05-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This fixes build for version 36, which i accidentally broke in commit f6e31fadd80486cdd68e3ad3d7ae888aa81400b9. The reason this happened, was that my Hydra didn't pick up the latest commit and I actually tested and built the parent commit instead of the update commit. So, this commit is the real "builds fine, tested" for all channels. Also, the sandbox client initalization has moved into setuid_sandbox_client.cc, so we need to move the lookup of the CHROMIUM_SANDBOX_BINARY_PATH environment variable there. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
* | | chromium/source: Propagate system attribute.aszlig2014-05-05
|/ / | | | | | | | | | | | | | | | | | | | | | | The system attribute was already there in the function head of the shared update helper but it actually wasn't used and thus later the import of <nixpkgs> was done using builtins.currentSystem instead of the system attribute inherited from the source derivation. Now we correctly propagate the attribute, so that even when running a 64bit kernel you can run a 32bit Chromium with binary plugins. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
* | chromium: Update all channels to latest versions.aszlig2014-05-04
| | | | | | | | | | | | | | | | | | | | With this commit, the following new upstream versions are introduced: stable: 34.0.1847.116 -> 34.0.1847.132 (builds fine, tested) beta: 35.0.1916.47 -> 35.0.1916.86 (builds fine, tested) dev: 36.0.1941.0 -> 36.0.1964.2 (builds fine, tested) Signed-off-by: aszlig <aszlig@redmoonstudios.org>
* | chromium: Link against pulse instead of dlopen().aszlig2014-05-04
| | | | | | | | | | | | | | | | | | | | | | | | | | | | This fixes the issue of Chromium not being able to load the pulseaudio librarp We could also propagate the build inputs, but it would end up being the same as just directoly linking against the library. Thanks to @aristidb for noticing this in #2421: https://github.com/NixOS/nixpkgs/pull/2421#issuecomment-42113656 Signed-off-by: aszlig <aszlig@redmoonstudios.org>
* | rsync: fix CVE-2014-2855 by upstream patchVladimír Čunát2014-05-03
| |
* | midori: update from 0.5.7 to 0.5.8宋文武2014-05-02
| |
* | Update thunderbird-bin to version 24.5.0taku02014-05-02
| |
* | syncthing: Bump to 0.8.2.Moritz Ulrich2014-04-30
| | | | | | | | | | Tested this in two containers running 0.7.1 before. Upgraded fine and kept working without configuration changes.
* | chatzilla: Update to 0.9.90.1Eelco Dolstra2014-04-30
| | | | | | | | Also, make it work with recent Firefoxes.
* | flashplayer: Update to 11.2.202.356Eelco Dolstra2014-04-30
| | | | | | | | CVE-2014-0515
* | firefox: Update to 29.0Eelco Dolstra2014-04-29
| |
* | spark: 0.9.0 -> 0.9.1Austin Seipp2014-04-29
|/ | | | Signed-off-by: Austin Seipp <aseipp@pobox.com>
* chromium: Fix desktop icon and duplicate entry.aszlig2014-04-27
| | | | | | | | | This should fix the desktop icon location for both desktop entries (the one from the Chromium derivation itself and the wrapper) and renames the name of the file so that it gets overridden by the wrappers desktop item so we don't end up having two of them. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
* btsync: 1.3.87 -> 1.3.93Austin Seipp2014-04-26
| | | | Signed-off-by: Austin Seipp <aseipp@pobox.com>
* Merge pull request #2315 from lethalman/gnome3Domen Kožar2014-04-24
|\ | | | | gedit, libmediaart, fix xdg-user-dirs, enable GI in grilo, prioritize nautilus mimetype, seahorse, gnome-music, glade, gnome-documents
| * transmission-remote-gtk: delete hicolor icon cacheLuca Bruno2014-04-22
| |
* | Fix meta.maintainer -> meta.maintainersEelco Dolstra2014-04-23
|/
* wireshark: add patch to lookup "dumpcap" in PATHBjørn Forsman2014-04-22
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | What this allows us to do is define a "dumpcap" setuid wrapper in NixOS and have wireshark use that instead of the non-setuid dumpcap binary that it normally uses. As far as I can tell, the code that is changed to do lookup in PATH is only used by wireshark/tshark to find dumpcap. dumpcap, the thing that's typically setuid, is not affected by this patch. wireshark and tshark should *not* be installed setuid, so the fact that they now do lookup in PATH is not a security concern. With this commit, and the following config, only "root" and users in the "wireshark" group will have access to capturing network traffic with wireshark/dumpcap: environment.systemPackages = [ pkgs.wireshark ]; security.setuidOwners = [ { program = "dumpcap"; owner = "root"; group = "wireshark"; setuid = true; setgid = false; permissions = "u+rx,g+x"; } ]; users.extraGroups.wireshark.gid = 500; (This wouldn't have worked before, because then wireshark would not use our setuid dumpcap binary.)
* wireshark: add myself (bjornfor) as maintainerBjørn Forsman2014-04-22
|
* wireshark: build with libcap (POSIX capabilities)Bjørn Forsman2014-04-22
| | | | | | | | | | | This makes running wireshark (or more specifically, dumpcap) as root a bit more secure. From <wireshark-1.11.2>/doc/README.packaging: The "--with-libcap" option is only useful when dumpcap is installed setuid. If it is enabled dumpcap will try to drop any setuid privileges it may have while retaining the CAP_NET_ADMIN and CAP_NET_RAW capabilities. It is enabled by default, if the Linux capabilities library (on which it depends) is found.