New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
doas: 6.0 -> 6.6 #74184
doas: 6.0 -> 6.6 #74184
Conversation
The CVEs mentioned seem to be for https://github.com/slicer69/doas while the package we have at hand is https://github.com/Duncaen/OpenDoas. |
@nh2 Thanks. I've added an issue for it and I'll adjust the CVE reporting to exclude these ones. |
@mokulus did anyone test it? |
I've tested it with I think it's worth to add to docs that you need to add |
There has to be more work done on
Makefile also tries to move some files to
So this package needs: something similar to how |
This version bump is on master (cherry-picked from #86488). |
Semi-automatic update generated by https://github.com/ryantm/nixpkgs-update tools. This update was made based on information from https://repology.org/metapackage/doas/versions.
meta.description for doas is: '"Executes the given command as another user"'.
meta.homepage for doas is: '"https://github.com/Duncaen/OpenDoas"
Release on GitHub
Compare changes on GitHub
Checks done (click to expand)
built on NixOS
The tests defined in
passthru.tests
, if any, passed0 of 0 passed binary check by having a zero exit code.
0 of 0 passed binary check by having the new version present in output.
found 6.6 with grep in /nix/store/0fjcg1snr9b2cf867f2c0fklna6ddcx9-doas-6.6
directory tree listing: https://gist.github.com/198c5be2ca3f81921ac909440e6806b4
du listing: https://gist.github.com/afaa608290b67f7c8de95f833e732278
Rebuild report (if merged into master) (click to expand)
3 total rebuild path(s)
1 package rebuild(s)
1 x86_64-linux rebuild(s)
1 i686-linux rebuild(s)
0 x86_64-darwin rebuild(s)
1 aarch64-linux rebuild(s)
First fifty rebuilds by attrpath
doas
Instructions to test this update (click to expand)
Either download from Cachix:
(r-ryantm's Cachix cache is only trusted for this store-path realization.)
Or, build yourself:
After you've downloaded or built it, look at the files and if there are any, run the binaries:
Experimental: CVE security report (click to expand)
CVEs resolved by this update:
CVEs introduced by this update:
none
CVEs present in both versions:
none
cc @cstrahan for testing.