* gnu/packages/ruby-xyz.scm (ruby-asciidoctor-pdf): Move to location of
other ruby-asciidoctor* packages.
Change-Id: I39abd28d57917e624d14a548ae501bc9fbe32844
Signed-off-by: Andreas Enge <andreas@enge.fr>
* gnu/packages/aux-files/emacs/guix-emacs.el: Fix flycheck warnings,
replace when-let with when-let*.
(guix-emacs--load-file-no-error): End docstring with a dot.
(guix-emacs--non-core-load-path): Make a defsubst and add a docstring.
Change-Id: I62d03b3fb9b4e671209ce5d8d7039d67f417d24b
Signed-off-by: Liliana Marie Prikler <liliana.prikler@gmail.com>
* gnu/packages/aux-files/emacs/guix-emacs.el
(guix-emacs-find-autoloads): Warn about non-existent directories in load
path instead of raising an error.
Change-Id: Icf470d7aa0f2f8a694c13c8d84b9f7c50c334919
Signed-off-by: Liliana Marie Prikler <liliana.prikler@gmail.com>
* gnu/packages/emacs.scm (%selector): Rename to ...
(%emacs-selector): Remove a few tests that actually pass and exclude the
benchmark test.
(emacs-minimal): Use %emacs-selector instead of %selector.
Change-Id: I0dddd390586be170f24e13ee7873a875fd12d6e2
Signed-off-by: Liliana Marie Prikler <liliana.prikler@gmail.com>
* gnu/packages/emacs.scm (%emacs-next-selector): New variable.
(emacs-next-minimal): Update to 31.0.50-2.509228f. Remove now unessecary
patch "emacs-zoom-image-test-fix.patch". Use %emacs-next-selector.
(emacs->emacs-next): Use %emacs-next-selector.
Change-Id: I4618ee38a72e210c60c069704eed69b08af70072
Signed-off-by: Liliana Marie Prikler <liliana.prikler@gmail.com>
* gnu/packages/emacs.scm (emacs-ert-selector): Surround test names with
beginning of line and end of line regex characters as emacs expects a regex.
Sort the list of tests so that rearranging the excluded tests does not result
in a rebuild.
Change-Id: I7002fa48122d8409f383f85f515a1a6ac9cdd957
Signed-off-by: Liliana Marie Prikler <liliana.prikler@gmail.com>
The function name got changed in upstream commit d3ead375092, dated
2020-01-31.
* gnu/packages/emacs.scm (emacs-minimal): Replace 'tramp-process-running-p',
not the now non-existant function 'tramp-compat-process-running-p'.
Change-Id: If2adff095b968b804729533fcdd188f5035f9eed
Signed-off-by: Liliana Marie Prikler <liliana.prikler@gmail.com>
* gnu/packages/emacs.scm (emacs-minimal):[arguments]<#:phases>: Patch include
path to C header files for ffap.
Change-Id: If703f78eecb8a8bfc1b39a6c2e052b1920b39475
Signed-off-by: Liliana Marie Prikler <liliana.prikler@gmail.com>
* gnu/packages/emacs-xyz.scm (emacs-org)
[arguments] <#:phases>: Do not skip the tests
'test-org/org-encode-time' and 'test-org/org-time-string-to-time'.
[native-inputs]: Add 'tzdata'.
Change-Id: Ie5d619275f8ce72fbb85216aae46ac41aedaec04
Signed-off-by: Liliana Marie Prikler <liliana.prikler@gmail.com>
The issue this patch solves got fixed in GTK 3.23.37.
* gnu/packages/patches/emacs-pgtk-super-key-fix.patch: Delete file.
* gnu/local.mk (dist_patch_DATA): Unregister it.
* gnu/packages/emacs.scm (emacs-minimal, emacs-next-minimal): Do not use the
super-key patch.
Change-Id: I5a1098ce0a4709aa8f05a5a82e2b78866b48a87f
Signed-off-by: Liliana Marie Prikler <liliana.prikler@gmail.com>
* gnu/packages/patches/emacs-native-comp-fix-filenames.patch: Use correct
function for datatype.
* gnu/packages/patches/emacs-next-native-comp-fix-filenames.patch: Use correct
function for datatype.
* gnu/packages/emacs.scm (emacs-minimal): Remove now unnecessary flags.
Change-Id: Id362deef83f28653f5bc3babb4a07726c1443ebf
Signed-off-by: Liliana Marie Prikler <liliana.prikler@gmail.com>
Trying to run "M-x disassemble" in emacs on a native compiled function would
fail because it could not find objdump.
* gnu/packages/emacs.scm (emacs-no-x): Patch path to objdump.
Change-Id: Ia0994fce88142189cd8fdeeceb0532e5132bce37
Signed-off-by: Liliana Marie Prikler <liliana.prikler@gmail.com>
The snippets are inherited by emacs-next and friends so this shouldn't change
any of guix packages but this will allow user source transformations to also
benifit from these snippets.
* gnu/packages/emacs.scm (emacs-minimal): Move some snippets to build phases.
Change-Id: Ia9af1ee90335189092a6eb36d7b1d8592167782d
Signed-off-by: Liliana Marie Prikler <liliana.prikler@gmail.com>
* gnu/packages/engineering.scm (librepcb): Move from here ...
* gnu/packages/electronics.scm: ... to here.
Change-Id: I666ca5905be2b097e494610c49f8ca3166cb14eb
* gnu/services/web.scm
(<gunicorn-configuration>, <gunicorn-app>): New records.
(unix-socket?, unix-socket-path, gunicorn-activation,
gunicorn-shepherd-services): New procedures.
(gunicorn-service-type): New variable.
* doc/guix.texi (Web Services): Document the new service.
Co-authored-by: Arun Isaac <arunisaac@systemreboot.net>
Change-Id: I3aa970422e6a5d31158b798b1061e6928ad2160b
Signed-off-by: jgart <jgart@dismail.de>
* gnu/packages/librewolf.scm (librewolf): Update to 148.0-1.
[native-inputs]: Use clang-21 and llvm-21.
Containes fixes for:
CVE-2026-2757: Incorrect boundary conditions in the WebRTC: Audio/Video component
CVE-2026-2794: Information disclosure due to uninitialized memory in Firefox and Firefox Focus for Android
CVE-2026-2758: Use-after-free in the JavaScript: GC component
CVE-2026-2759: Incorrect boundary conditions in the Graphics: ImageLib component
CVE-2026-2795: Use-after-free in the JavaScript: GC component
CVE-2026-2760: Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component
CVE-2026-2761: Sandbox escape in the Graphics: WebRender component
CVE-2026-2762: Integer overflow in the JavaScript: Standard Library component
CVE-2026-2763: Use-after-free in the JavaScript Engine component
CVE-2026-2764: JIT miscompilation, use-after-free in the JavaScript Engine: JIT component
CVE-2026-2796: JIT miscompilation in the JavaScript: WebAssembly component
CVE-2026-2797: Use-after-free in the JavaScript: GC component
CVE-2026-2765: Use-after-free in the JavaScript Engine component
CVE-2026-2766: Use-after-free in the JavaScript Engine: JIT component
CVE-2026-2767: Use-after-free in the JavaScript: WebAssembly component
CVE-2026-2768: Sandbox escape in the Storage: IndexedDB component
CVE-2026-2798: Use-after-free in the DOM: Core & HTML component
CVE-2026-2769: Use-after-free in the Storage: IndexedDB component
CVE-2026-2799: Use-after-free in the DOM: Core & HTML component
CVE-2026-2770: Use-after-free in the DOM: Bindings (WebIDL) component
CVE-2026-2771: Undefined behavior in the DOM: Core & HTML component
CVE-2026-2772: Use-after-free in the Audio/Video: Playback component
CVE-2026-2773: Incorrect boundary conditions in the Web Audio component
CVE-2026-2774: Integer overflow in the Audio/Video component
CVE-2026-2775: Mitigation bypass in the DOM: HTML Parser component
CVE-2026-2776: Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software
CVE-2026-2777: Privilege escalation in the Messaging System component
CVE-2026-2778: Sandbox escape due to incorrect boundary conditions in the DOM: Core & HTML component
CVE-2026-2779: Incorrect boundary conditions in the Networking: JAR component
CVE-2026-2800: Spoofing issue in the WebAuthn component in Firefox for Android
CVE-2026-2780: Privilege escalation in the Netmonitor component
CVE-2026-2781: Integer overflow in the Libraries component in NSS
CVE-2026-2801: Incorrect boundary conditions in the JavaScript: WebAssembly component
CVE-2026-2782: Privilege escalation in the Netmonitor component
CVE-2026-2783: Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component
CVE-2026-2802: Race condition in the JavaScript: GC component
CVE-2026-2803: Information disclosure, mitigation bypass in the Settings UI component
CVE-2026-2784: Mitigation bypass in the DOM: Security component
CVE-2026-2785: Invalid pointer in the JavaScript Engine component
CVE-2026-2804: Use-after-free in the JavaScript: WebAssembly component
CVE-2026-2786: Use-after-free in the JavaScript Engine component
CVE-2026-2805: Invalid pointer in the DOM: Core & HTML component
CVE-2026-2787: Use-after-free in the DOM: Window and Location component
CVE-2026-2788: Incorrect boundary conditions in the Audio/Video: GMP component
CVE-2026-2789: Use-after-free in the Graphics: ImageLib component
CVE-2026-2806: Uninitialized memory in the Graphics: Text component
CVE-2026-2790: Same-origin policy bypass in the Networking: JAR component
CVE-2026-2791: Mitigation bypass in the Networking: Cache component
CVE-2026-2807: Memory safety bugs fixed in Firefox 148 and Thunderbird 148
CVE-2026-2792: Memory safety bugs fixed in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird
CVE-2026-2793: Memory safety bugs fixed in Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox
Change-Id: I3baa7dee1c8667e8a6fc04e0112c1fddb8ed7d81
Signed-off-by: Ian Eure <ian@retrospec.tv>