287025 Commits

Author SHA1 Message Date
Léo Gaspard
b522e483b9
kcov: add metadata and passthru.tests (#121308) 2021-04-30 21:26:26 +02:00
Michael Lingelbach
f03f26bf8f maintainers: add mjlbach to the matrix team 2021-04-30 12:04:58 -07:00
Michael Lingelbach
0123d8c4c2 matrix-dendrite: init at 0.3.11 2021-04-30 12:04:55 -07:00
lunik1
248a57d61a
nixos/adguardhome: init (#120568) 2021-04-30 20:55:31 +02:00
Peter Simons
37656dc208 git-annex: update sha256 hash for the new version 2021-04-30 20:45:03 +02:00
R. RyanTM
8a3ef67925
kcov: 36 -> 38 (#121160) 2021-04-30 20:44:04 +02:00
Martin Weinelt
62de527dc3
nixos/zigbee2mqtt: start maintaing the module 2021-04-30 20:40:04 +02:00
Martin Weinelt
2b61d9ea01
nixos/zigbee2mqtt: create migration path from config to settings 2021-04-30 20:39:21 +02:00
Peter Simons
e3185a56b5 hackage-packages.nix: automatic Haskell package set update
This update was generated by hackage2nix v2.17.0-8-ge18310f from Hackage revision
8185884e7b.
2021-04-30 20:37:43 +02:00
Tobias Mayer
2d9f3e32d9
arrow-cpp: 3.0.0 -> 4.0.0
arrow-cpp: cleanup

Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2021-04-30 20:30:59 +02:00
Tobias Mayer
f5704c862d
xsimd: init at 7.5.0
xsimd: format

Co-authored-by: Sandro <sandro.jaeckel@gmail.com>

xsimd: fix on macOS

xsimd: Use fetchFromGitHub
2021-04-30 20:30:46 +02:00
Peter Simons
e20a75ec74 hackage2nix: update list of broken packages
... so that there are no failing builds on Hydra.

Ping @rkrzr because icepeak is broken.
2021-04-30 20:30:15 +02:00
Martin Weinelt
f1e7183f69
nixos/tests/zigbee2mqtt: relax DevicePolicy and log systemd-analye security 2021-04-30 19:42:26 +02:00
Martin Weinelt
a691549f7e
nixos/zigbee2mqtt: harden systemd unit
This is what is still exposed, and it allows me to control my lamps from
within home-assistant.

✗ PrivateNetwork=                                             Service has access to the host's network                                            0.5
✗ RestrictAddressFamilies=~AF_(INET|INET6)                    Service may allocate Internet sockets                                               0.3
✗ DeviceAllow=                                                Service has a device ACL with some special devices                                  0.1
✗ IPAddressDeny=                                              Service does not define an IP address allow list                                    0.2
✗ PrivateDevices=                                             Service potentially has access to hardware devices                                  0.2
✗ RootDirectory=/RootImage=                                   Service runs within the host's root directory                                       0.1
✗ SupplementaryGroups=                                        Service runs with supplementary groups                                              0.1
✗ MemoryDenyWriteExecute=                                     Service may create writable executable memory mappings                              0.1

→ Overall exposure level for zigbee2mqtt.service: 1.3 OK 🙂
2021-04-30 19:42:26 +02:00
Martin Weinelt
e0f1e1f7bf
nixos/zigbee2mqtt: convert to rfc42 style settings 2021-04-30 19:42:26 +02:00
Niklas Hambüchen
a874a8a98b release notes: Mention wireguard generatePrivateKeyFile permission changes 2021-04-30 19:28:04 +02:00
Konstantin Alekseev
7ee53c0c4f python2Packages.importlib-resources: use version 3.3.1 for python2 2021-04-30 19:10:50 +02:00
Martin Weinelt
0ae04ca063
Merge pull request #121290 from petabyteboy/feature/firefox-latest-rust 2021-04-30 19:00:32 +02:00
Niklas Hambüchen
0dc08b4138 wireguard module: generatePrivateKeyFile: Fix chmod security race. Fixes #121288
Until now, the `touch + chmod 600 + write` approach made it possible for
an unprivileged local user read the private key file, by opening
the file after the touch, before the read permissions are restricted.

This was only the case if `generatePrivateKeyFile = true` and the parent
directory of `privateKeyFile` already existed and was readable.

This commit fixes it by using `umask`, which ensures kernel-side that
the `touch` creates the file with the correct permissions atomically.

This commit also:

* Removes `mkdir --mode 0644 -p "${dirOf values.privateKeyFile}"`
  because setting permissions `drw-r--r--` ("nobody can enter that dir")
  is awkward. `drwx------` would perhaps make sense, like for `.ssh`.
  However, setting the permissions on the private key file is enough,
  and likely better, because `privateKeyFile` is about that file
  specifically and no docs suggest that there's something special
  about its parent dir.
* Removes the `chmod 0400 "${values.privateKeyFile}"`
  because there isn't really a point in removing write access from
  the owner of the private key.
2021-04-30 18:55:38 +02:00
Martin Weinelt
506bc7ba02
nixos/nginx: update hardening settings
- Set an explicit umask that allows u+rwx and g+r.
- Adds `ProtectControlGroups` and `ProtectKernelLogs`, there should be
  no need to access either.
- Adds `ProtectClock` to prevent write-access to the system clock.
- `ProtectProc` hides processes from other users within the /proc
  filesystem and `ProcSubSet` hides all files/directories unrelated to
  the process management of the units process.
- Sets `RemoveIPC`, as there is no SysV or POSIX IPC within nginx that I
  know of.
- Restricts the creation of arbitrary namespaces
- Adds a reasonable `SystemCallFilter` preventing calls to @privileged,
  @obsolete and others.

And finally applies some sorting based on the order these options appear
in systemd.exec(5).
2021-04-30 18:49:43 +02:00
Travis A. Everett
5fb284dda6 yadm: add release note for 3.x 2021-04-30 11:07:35 -05:00
R. RyanTM
3ceb0e9cfa krapslog: 0.1.2 -> 0.1.3 2021-04-30 15:55:57 +00:00
Milan Pässler
903e23ad36
firefox-esr: use latest Rust
Firefox ESR 78.x used to have a problem with Rust >= 1.46, but it works
with latest Rust now!
2021-04-30 17:50:01 +02:00
Robert Schütz
c8dff328e5
Merge pull request #120447 from AluisioASG/aasg/dyndnsc-0.6.1
dyndnsc: 0.5.1 -> 0.6.1
2021-04-30 17:35:33 +02:00
Robert Schütz
93507828b2 passExtensions.pass-import: fix tests 2021-04-30 17:16:28 +02:00
Kim Lindberger
fdd6ca8fce
Merge pull request #118898 from talyz/gitlab-memory-bloat
nixos/gitlab: Add options to tame GitLab's memory usage somewhat
2021-04-30 16:58:30 +02:00
Aaron Andersen
dd454b37a0 musikcube: 0.96.5 -> 0.96.7 2021-04-30 10:56:57 -04:00
Robert Schütz
93edfffab6 pythonPackages.pykeepass: run tests 2021-04-30 16:53:36 +02:00
Aaron Andersen
ddf04bd3f1 musikcube: update from ffmpeg_3 to ffmpeg 2021-04-30 10:50:01 -04:00
Aaron Andersen
445c114b49
Merge pull request #121162 from r-ryantm/auto-update/kodi-inputstream-adaptive
kodiPackages.inputstream-adaptive: 2.6.13 -> 2.6.14
2021-04-30 10:45:18 -04:00
Aluísio Augusto Silva Gonçalves
093ab98c80
dyndnsc: 0.5.1 -> 0.6.1 2021-04-30 11:40:29 -03:00
Aluísio Augusto Silva Gonçalves
932ec5518e
python3Packages.pytest-console-scripts: init at 1.2.0
Thanks to @kvas-it for cutting a release with the patches needed to make
tests work.
2021-04-30 11:40:29 -03:00
Aluísio Augusto Silva Gonçalves
0463f91e04
python3Packages.sanic-auth: fix tests (#121279)
After #120881, packages using Sanic's `app.test_client` or
`app.asgi_client` need to depend on `sanic-testing` as well.
2021-04-30 16:40:24 +02:00
Aaron Andersen
bddecd3510 redmine: 4.2.0 -> 4.2.1 2021-04-30 10:33:25 -04:00
Aluísio Augusto Silva Gonçalves
98822ee896
python3Packages.json-logging: init at 1.3.0 2021-04-30 11:33:04 -03:00
Michael Weiss
774550baf5
Merge pull request #119615 from Synthetica9/cage-0.1.3
cage: 0.1.2.1 -> 0.1.3
2021-04-30 16:27:11 +02:00
Guillaume Girol
0c9ed22e64
Merge pull request #119562 from symphorien/fusermountsetuid
fuse: fix mount.fuse -o setuid=...
2021-04-30 14:26:39 +00:00
Michael Weiss
28b8cff301
nixos/tests/cage: Fix the test with wlroots 0.13
See #119615 for more details. The aarch64-linux test failed with
"qemu-system-aarch64: Virtio VGA not available" so I've restricted the
test to x86_64-linux (the virtio paravirtualized 3D graphics driver is
likely only available on very few platforms).
2021-04-30 15:57:04 +02:00
Joe Hermaszewski
c87152d97c ecpdap: 0.1.5 -> 0.1.6
Also put the new udev rules in /etc/udev/rules.d
2021-04-30 21:53:43 +08:00
Diogo Xavier
4d773bddeb frugal: init at 3.14.2 2021-04-30 14:53:37 +01:00
Diogo Xavier
b876437295 maintainers: add diogox 2021-04-30 14:53:31 +01:00
Michael Weiss
c89bf45195
Merge pull request #121267 from samuelgrf/fix-google-chrome-dev
google-chrome-dev: fix error on startup
2021-04-30 15:52:14 +02:00
Kira Bruneau
2008b4f9f4 undistract-me: init at unstable-2020-08-09 2021-04-30 09:49:05 -04:00
Pawel Kruszewski
013e245188 timeular: 3.4.1 -> 3.9.1 2021-04-30 15:46:36 +02:00
pennae
317a2c9f26 nixos/nix-containers: add tests for early/no-machined container stop 2021-04-30 15:43:27 +02:00
Patrick Hilhorst
4263479d3e
cage: 0.1.2.1 -> 0.1.3 2021-04-30 15:38:12 +02:00
Yurii Matsiuk
e7835da83f
zoom-us: 5.6.16775.0418 -> 5.6.16888.0424 2021-04-30 15:27:43 +02:00
Robert Schütz
dc68eb58bb
Merge pull request #120881 from AluisioASG/aasg/sanic-routing
python3Packages.sanic: 21.3.2 -> 21.3.4; fix tests
2021-04-30 15:20:49 +02:00
Samuel Gräfenstein
10b96a639c
libfaketime: add meta.mainProgram 2021-04-30 15:18:21 +02:00
Sandro
e68f542c32
Merge pull request #121260 from Mic92/cutter 2021-04-30 15:13:26 +02:00