| Commit message (Collapse) | Author | Age |
... | |
| | | | | | | |
|
|\ \ \ \ \ \ \
| |_|_|_|_|/ /
|/| | | | | | |
treewide: replace `lib/${python.libPrefix}/site-packages` with its sh…
|
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
`${python.sitePackages}`
which should be always preferred
|
|\ \ \ \ \ \ \
| |_|/ / / / /
|/| | | | | | |
qownnotes: 24.1.4 -> 24.1.5
|
| | |/ / / /
| |/| | | | |
|
|/ / / / /
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
The lib.getExe function's feature of assuming the program name from the
package is depracated, and it says to specify it here.
I was not sure whether I should do zotero itself, or .zotero-wrapped. I
put just zotero here, but I will change it if it should be the wrapped
version.
I didn't see any meta.mainProgam use the wrapped one, so I didn't use it
here.
|
|\ \ \ \ \
| | | | | |
| | | | | | |
paperless-ngx: 2.4.0 -> 2.4.3
|
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
https://github.com/paperless-ngx/paperless-ngx/releases/tag/v2.4.3
https://github.com/paperless-ngx/paperless-ngx/releases/tag/v2.4.2
https://github.com/paperless-ngx/paperless-ngx/releases/tag/v2.4.1
|
|\ \ \ \ \ \
| |/ / / / /
|/| | | | | |
portfolio: 0.67.1 -> 0.67.2
|
| |/ / / / |
|
| | | | | |
|
|\ \ \ \ \
| | | | | |
| | | | | | |
super-productivity: 7.14.3 -> 7.17.2
|
| | | | | | |
|
|\ \ \ \ \ \
| |_|/ / / /
|/| | | | | |
timeular: 6.6.5 -> 6.6.8
|
| | | | | | |
|
|\ \ \ \ \ \
| | | | | | |
| | | | | | | |
tryton: 5.4.2 -> 7.0.5
|
| |/ / / / / |
|
|\ \ \ \ \ \
| |_|_|/ / /
|/| | | | | |
aw-server-rust: fix failing build due to removed unstable rust feature
|
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
Rust compiler plugins have been entirely removed after having been
deprecated for years [1]. This caused the build of `aw-server-rust`
to break because its `aw-server` crate still contained the respective
crate attribute to enable the feature.
This attribute has already been removed upstream along with other
no longer used unstable feature opt-ins [2]. This change pulls in
the respective commit with `fetchpatch` and filters it down to
only the changes in `aw-server/src/lib.rs`, which fixes the build
for now. The patch should be removable with the next release
(0.12.3).
[1]: https://github.com/rust-lang/rust/pull/116412
[2]: https://github.com/ActivityWatch/aw-server-rust/commit/e1cd761d2f0a9309eb851b59732c2567a7ae2d3a.patch
|
|\ \ \ \ \ \
| |/ / / / /
|/| | | | | |
qpdfview: fix missing translations
|
| | | | | | |
|
| |_|_|_|/
|/| | | | |
|
| |_|_|/
|/| | | |
|
| | | |
| | | |
| | | | |
Co-authored-by: Robert Schütz <github@dotlambda.de>
|
| | | | |
|
| |/ /
|/| | |
|
|/ /
| |
| |
| | |
https://github.com/AppFlowy-IO/AppFlowy/releases/tag/0.4.3
|
|\ \
| | |
| | | |
paperless-ngx: 2.2.1 -> 2.3.3
|
| | | |
|
|\ \ \
| | | |
| | | | |
skrooge: 1.28.0 -> 1.31.0
|
| | | | |
|
| | | | |
|
|\| | | |
|
| |\ \ \
| | | | |
| | | | | |
qownnotes: 24.1.1 -> 24.1.2
|
| | | | | |
|
|\| | | | |
|
| |\ \ \ \
| | |/ / /
| |/| | | |
planify: 4.3.2 -> 4.4
|
| | | | |
| | | | |
| | | | |
| | | | | |
https://github.com/alainm23/planify/compare/4.3.2...4.4
|
|\| | | | |
|
| |\ \ \ \
| | | | | |
| | | | | | |
scribus: 1.6.0 -> 1.6.1
|
| | | |/ /
| | |/| | |
|
|\| | | | |
|
| |/ / /
| | | |
| | | |
| | | | |
https://github.com/portfolio-performance/portfolio/releases/tag/0.67.1
|
| | | | |
|
|\| | | |
|
| |\ \ \
| | | | |
| | | | | |
libreoffice-still: 7.5.7.1 -> 7.5.9.2, libreoffice-fresh: 7.6.2.1 -> 7.6.4.1, libreoffice-bin: 7.5.5 -> 7.6.4
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
Fixes CVE-2023-6185 and CVE-2023-6186.
https://www.libreoffice.org/about-us/security/advisories/cve-2023-6185
https://www.libreoffice.org/about-us/security/advisories/cve-2023-6186
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
Fixes CVE-2023-6185 and CVE-2023-6186.
https://www.libreoffice.org/about-us/security/advisories/cve-2023-6185
https://www.libreoffice.org/about-us/security/advisories/cve-2023-6186
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
Fixes CVE-2023-6185 and CVE-2023-6186.
https://www.libreoffice.org/about-us/security/advisories/cve-2023-6185
https://www.libreoffice.org/about-us/security/advisories/cve-2023-6186
|
|\| | | | |
|