Skip to content
This repository was archived by the owner on Apr 12, 2021. It is now read-only.
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 4a200fbbf0a2
Choose a base ref
...
head repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: 8f354badbc71
Choose a head ref

Commits on Jan 9, 2019

  1. nixos/nslcd: restart when nslcd.conf changes

    Julien Moutinho committed Jan 9, 2019
    Copy the full SHA
    4af7db9 View commit details
  2. nixos/nslcd: use systemd's RuntimeDirectory

    Julien Moutinho committed Jan 9, 2019
    Copy the full SHA
    eb90d97 View commit details

Commits on Jan 12, 2019

  1. shmig: 2017-07-24 -> 1.0.0

    Update to the latest revision, don't replace `which` anymore as all
    `which` references are eliminated previously, enable support for at
    least one database type (otherwise this scrpit is unusable and needs to
    be built manually with support for on of these packages).
    
    Tested functionality with a simple SQLite database.
    Ma27 committed Jan 12, 2019

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    mweinelt Martin Weinelt
    Copy the full SHA
    f494cff View commit details

Commits on Jan 18, 2019

  1. Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    dtzWill Will Dietz
    Copy the full SHA
    d1e838e View commit details
  2. nixos/tests: test LDAP password changing through nslcd

    NOTE: slapd.conf is deprecated, hence use cn=config.
    Julien Moutinho committed Jan 18, 2019
    Copy the full SHA
    65cfba2 View commit details

Commits on Jan 19, 2019

  1. Copy the full SHA
    1f2a3fe View commit details

Commits on Jan 24, 2019

  1. certmgr: Add patch for optional trust of self-signed certificates at …

    …remote cfssl apiserver
    Johan Thomsen authored and fpletz committed Jan 24, 2019

    Unverified

    This user has not yet uploaded their public signing key.
    Copy the full SHA
    72eb82b View commit details
  2. Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    marsam Mario Rodas
    Copy the full SHA
    016128d View commit details
  3. Copy the full SHA
    4602b43 View commit details

Commits on Jan 28, 2019

  1. argo: init at 2.2.1

    groodt committed Jan 28, 2019
    Copy the full SHA
    acb9168 View commit details

Commits on Jan 30, 2019

  1. Copy the full SHA
    f5dbe5d View commit details
  2. Copy the full SHA
    edbb992 View commit details
  3. Copy the full SHA
    c995ad0 View commit details
  4. ruby_2_6: 2.6.0 -> 2.6.1

    alyssais committed Jan 30, 2019
    Copy the full SHA
    b89c3b9 View commit details
  5. bazel: 0.21.0 -> 0.22.0

    picnoir authored and Profpatsch committed Jan 30, 2019
    Copy the full SHA
    a5aca72 View commit details
  6. Merge pull request #53650 from Ma27/update-shmig

    shmig: 2017-07-24 -> 1.0.0
    Ma27 authored Jan 30, 2019
    Copy the full SHA
    c7001df View commit details
  7. Copy the full SHA
    9c7c211 View commit details
  8. Copy the full SHA
    faaf5f6 View commit details
  9. Copy the full SHA
    16ab34c View commit details
  10. lua: add withPackages function (#54460)

    * lua: add withPackages function
    
    First step towards more automation similar to the haskell backend.
    Follow up of NixOS/nixpkgs#33903
    Matthieu Coudron authored and 7c6f434c committed Jan 30, 2019
    Copy the full SHA
    c4519cf View commit details
  11. thunderbird, thunderbird-bin: 60.4.0 -> 60.5.0 (#54935)

    * thunderbird-bin: 60.3.3 -> 60.5.0
    
    * thunderbird: 60.4.0 -> 60.5.0
    taku0 authored and 7c6f434c committed Jan 30, 2019

    Unverified

    This commit is not signed, but one or more authors requires that any commit attributed to them is signed.
    Copy the full SHA
    3106cbe View commit details
  12. pythonPackages.mozsvc: 0.8 -> 0.10

    tg-x authored and Nadrieril committed Jan 30, 2019

    Unverified

    This commit is not signed, but one or more authors requires that any commit attributed to them is signed.
    Copy the full SHA
    8119e08 View commit details
  13. pythonPackages.syncserver: 1.6.0 -> 1.8.0

    tg-x authored and Nadrieril committed Jan 30, 2019
    Copy the full SHA
    c1a071d View commit details
  14. Copy the full SHA
    ab3d099 View commit details
  15. Copy the full SHA
    08aa3e7 View commit details
  16. Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    marsam Mario Rodas
    Copy the full SHA
    957d058 View commit details
  17. nixos/syncserver: use gunicorn

    As described in `syncserver`'s documentation.
    Makes it possible to run behind a reverse proxy.
    Nadrieril committed Jan 30, 2019
    Copy the full SHA
    63c7fe0 View commit details
  18. Copy the full SHA
    375020c View commit details
  19. Merge pull request #54258 from aij/zfs

    zfsUnstable: 0.8.0-rc2 -> 0.8.0-rc3
    Mic92 authored Jan 30, 2019
    Copy the full SHA
    73fda89 View commit details
  20. Merge pull request #54739 from Nadrieril/fix-ffsync

    Fix firefox sync-server
    dotlambda authored Jan 30, 2019

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    marsam Mario Rodas
    Copy the full SHA
    0525fa5 View commit details
  21. iperf3: fix musl patch

    Mic92 committed Jan 30, 2019
    Copy the full SHA
    5b622c1 View commit details
  22. Merge pull request #45567 from johanot/certmgr-rootca-patch

    certmgr: Add patch for optional trust of self-signed certificates at remote cfssl apiserver
    fpletz authored Jan 30, 2019
    Copy the full SHA
    72f324d View commit details
  23. Copy the full SHA
    5a5def3 View commit details
  24. Merge pull request #54939 from alyssais/ruby-2.6.1

    ruby_2_6: 2.6.0 -> 2.6.1
    alyssais authored Jan 30, 2019
    Copy the full SHA
    60e279e View commit details
  25. Merge pull request #54601 from groodt/greg/argo-2.2.1

    argo: init at 2.2.1
    alyssais authored Jan 30, 2019
    Copy the full SHA
    bfd2c80 View commit details
  26. Merge pull request #54954 from costrouc/munge-module-key-permissions

    munge: fix module munge.key permissions from 0700 -> 0400 readonly
    alyssais authored Jan 30, 2019
    Copy the full SHA
    293a5c9 View commit details
  27. pyspark: 2.3.2 -> 2.4.0, fix version bounds

    py4j seems to work fine with this version
    matthewbauer committed Jan 30, 2019
    Copy the full SHA
    c0f8270 View commit details
  28. Merge pull request #54898 from matthewbauer/pyspark-fix

    pyspark: 2.3.2 -> 2.4.0, fix version bounds
    matthewbauer authored Jan 30, 2019
    Copy the full SHA
    bdc7aab View commit details
  29. Merge pull request #53762 from ju1m/nslcd

    Improving integration of `nslcd`, PAM and `openldap`.
    flokli authored Jan 30, 2019
    Copy the full SHA
    d3c2ed2 View commit details
  30. scdoc: 1.8.0 -> 1.8.1

    primeos committed Jan 30, 2019
    Copy the full SHA
    8f354ba View commit details
Showing with 2,806 additions and 1,300 deletions.
  1. +10 −0 maintainers/maintainer-list.nix
  2. +14 −2 nixos/doc/manual/release-notes/rl-1903.xml
  3. +45 −11 nixos/modules/config/ldap.nix
  4. +1 −1 nixos/modules/security/pam.nix
  5. +15 −11 nixos/modules/services/networking/firefox/sync-server.nix
  6. +9 −2 nixos/modules/services/security/certmgr.nix
  7. +1 −1 nixos/modules/services/security/munge.nix
  8. +330 −53 nixos/tests/ldap.nix
  9. +397 −397 pkgs/applications/networking/browsers/firefox-bin/beta_sources.nix
  10. +397 −397 pkgs/applications/networking/browsers/firefox-bin/devedition_sources.nix
  11. +24 −0 pkgs/applications/networking/cluster/argo/default.nix
  12. +687 −0 pkgs/applications/networking/cluster/argo/deps.nix
  13. +233 −233 pkgs/applications/networking/mailreaders/thunderbird-bin/release_sources.nix
  14. +3 −3 pkgs/applications/networking/mailreaders/thunderbird/default.nix
  15. +23 −0 pkgs/applications/networking/mailreaders/thunderbird/no-buildconfig.patch
  16. +32 −0 pkgs/development/coq-modules/coq-extensible-records/default.nix
  17. +21 −1 pkgs/development/interpreters/lua-5/5.1.nix
  18. +25 −1 pkgs/development/interpreters/lua-5/5.2.nix
  19. +22 −2 pkgs/development/interpreters/lua-5/5.3.nix
  20. 0 pkgs/development/interpreters/lua-5/build-rocks.nix
  21. 0 pkgs/development/interpreters/lua-5/build-rockspec.nix
  22. +15 −0 pkgs/development/interpreters/lua-5/setup-hook.nix
  23. +47 −0 pkgs/development/interpreters/lua-5/setup-hook.sh
  24. +4 −0 pkgs/development/interpreters/lua-5/with-packages.nix
  25. +73 −0 pkgs/development/interpreters/lua-5/wrapper.nix
  26. +10 −0 pkgs/development/interpreters/luajit/2.0.nix
  27. +7 −0 pkgs/development/interpreters/luajit/2.1.nix
  28. +62 −59 pkgs/development/interpreters/luajit/default.nix
  29. +3 −3 pkgs/development/interpreters/ruby/default.nix
  30. +1 −1 pkgs/development/interpreters/ruby/patchsets.nix
  31. +17 −0 pkgs/development/lua-modules/default.nix
  32. +3 −3 pkgs/development/lua-modules/generic/default.nix
  33. +27 −0 pkgs/development/python-modules/django-sesame/default.nix
  34. +27 −0 pkgs/development/python-modules/favicon/default.nix
  35. +9 −14 pkgs/development/python-modules/mozsvc/default.nix
  36. +5 −2 pkgs/development/python-modules/pyspark/default.nix
  37. +14 −9 pkgs/development/python-modules/serversyncstorage/default.nix
  38. +0 −33 pkgs/development/python-modules/syncserver/default.nix
  39. +1 −0 pkgs/development/python-modules/tokenserver/default.nix
  40. +3 −3 pkgs/development/tools/build-managers/bazel/default.nix
  41. +8 −8 pkgs/development/tools/database/shmig/default.nix
  42. +4 −4 pkgs/os-specific/linux/zfs/default.nix
  43. +2 −3 pkgs/servers/minio/default.nix
  44. +47 −0 pkgs/servers/syncserver/default.nix
  45. +2 −2 pkgs/tools/networking/iperf/3.nix
  46. +37 −17 pkgs/tools/security/certmgr/default.nix
  47. +2 −2 pkgs/tools/typesetting/scdoc/default.nix
  48. +32 −14 pkgs/top-level/all-packages.nix
  49. +1 −0 pkgs/top-level/coq-packages.nix
  50. +50 −6 pkgs/top-level/lua-packages.nix
  51. +4 −2 pkgs/top-level/python-packages.nix
10 changes: 10 additions & 0 deletions maintainers/maintainer-list.nix
Original file line number Diff line number Diff line change
@@ -1773,6 +1773,11 @@
github = "dguibert";
name = "David Guibert";
};
groodt = {
email = "groodt@gmail.com";
github = "groodt";
name = "Greg Roodt";
};
guibou = {
email = "guillaum.bouchard@gmail.com";
github = "guibou";
@@ -3666,6 +3671,11 @@
github = "PsyanticY";
name = "Psyanticy";
};
ptival = {
email = "valentin.robert.42@gmail.com";
github = "Ptival";
name = "Valentin Robert";
};
puffnfresh = {
email = "brian@brianmckenna.org";
github = "puffnfresh";
16 changes: 14 additions & 2 deletions nixos/doc/manual/release-notes/rl-1903.xml
Original file line number Diff line number Diff line change
@@ -331,17 +331,29 @@
<para>
The <literal>pam_unix</literal> account module is now loaded with its
control field set to <literal>required</literal> instead of
<literal>sufficient</literal>, so that later pam account modules that
<literal>sufficient</literal>, so that later PAM account modules that
might do more extensive checks are being executed.
Previously, the whole account module verification was exited prematurely
in case a nss module provided the account name to
<literal>pam_unix</literal>.
The LDAP and SSSD NixOS modules already add their NSS modules when
enabled. In case your setup breaks due to some later pam account module
enabled. In case your setup breaks due to some later PAM account module
previosuly shadowed, or failing NSS lookups, please file a bug. You can
get back the old behaviour by manually setting
<literal><![CDATA[security.pam.services.<name?>.text]]></literal>.
</para>
</listitem>
<listitem>
<para>
The <literal>pam_unix</literal> password module is now loaded with its
control field set to <literal>sufficient</literal> instead of
<literal>required</literal>, so that password managed only
by later PAM password modules are being executed.
Previously, for example, changing an LDAP account's password through PAM
was not possible: the whole password module verification
was exited prematurely by <literal>pam_unix</literal>,
preventing <literal>pam_ldap</literal> to manage the password as it should.
</para>
</listitem>
<listitem>
<para>
56 changes: 45 additions & 11 deletions nixos/modules/config/ldap.nix
Original file line number Diff line number Diff line change
@@ -38,6 +38,8 @@ let
bind_timelimit ${toString cfg.bind.timeLimit}
${optionalString (cfg.bind.distinguishedName != "")
"binddn ${cfg.bind.distinguishedName}" }
${optionalString (cfg.daemon.rootpwmoddn != "")
"rootpwmoddn ${cfg.daemon.rootpwmoddn}" }
${optionalString (cfg.daemon.extraConfig != "") cfg.daemon.extraConfig }
'';
};
@@ -126,6 +128,26 @@ in
the end of the nslcd configuration file (nslcd.conf).
'' ;
} ;

rootpwmoddn = mkOption {
default = "";
example = "cn=admin,dc=example,dc=com";
type = types.str;
description = ''
The distinguished name to use to bind to the LDAP server
when the root user tries to modify a user's password.
'';
};

rootpwmodpw = mkOption {
default = "";
example = "/run/keys/nslcd.rootpwmodpw";
type = types.str;
description = ''
The path to a file containing the credentials with which
to bind to the LDAP server if the root user tries to change a user's password
'';
};
};

bind = {
@@ -203,9 +225,11 @@ in
system.activationScripts = mkIf insertLdapPassword {
ldap = stringAfter [ "etc" "groups" "users" ] ''
if test -f "${cfg.bind.password}" ; then
echo "bindpw "$(cat ${cfg.bind.password})"" | cat ${ldapConfig.source} - > /etc/ldap.conf.bindpw
mv -fT /etc/ldap.conf.bindpw /etc/ldap.conf
chmod 600 /etc/ldap.conf
umask 0077
conf="$(mktemp)"
printf 'bindpw %s\n' "$(cat ${cfg.bind.password})" |
cat ${ldapConfig.source} - >"$conf"
mv -fT "$conf" /etc/ldap.conf
fi
'';
};
@@ -232,21 +256,31 @@ in
wantedBy = [ "multi-user.target" ];

preStart = ''
mkdir -p /run/nslcd
rm -f /run/nslcd/nslcd.pid;
chown nslcd.nslcd /run/nslcd
${optionalString (cfg.bind.distinguishedName != "") ''
if test -s "${cfg.bind.password}" ; then
ln -sfT "${cfg.bind.password}" /run/nslcd/bindpw
fi
''}
umask 0077
conf="$(mktemp)"
{
cat ${nslcdConfig.source}
test -z '${cfg.bind.distinguishedName}' -o ! -f '${cfg.bind.password}' ||
printf 'bindpw %s\n' "$(cat '${cfg.bind.password}')"
test -z '${cfg.daemon.rootpwmoddn}' -o ! -f '${cfg.daemon.rootpwmodpw}' ||
printf 'rootpwmodpw %s\n' "$(cat '${cfg.daemon.rootpwmodpw}')"
} >"$conf"
mv -fT "$conf" /etc/nslcd.conf
'';

# NOTE: because one cannot pass a custom config path to `nslcd`
# (which is only able to use `/etc/nslcd.conf`)
# changes in `nslcdConfig` won't change `serviceConfig`,
# and thus won't restart `nslcd`.
# Therefore `restartTriggers` is used on `/etc/nslcd.conf`.
restartTriggers = [ nslcdConfig.source ];

serviceConfig = {
ExecStart = "${nss_pam_ldapd}/sbin/nslcd";
Type = "forking";
PIDFile = "/run/nslcd/nslcd.pid";
Restart = "always";
RuntimeDirectory = [ "nslcd" ];
};
};

2 changes: 1 addition & 1 deletion nixos/modules/security/pam.nix
Original file line number Diff line number Diff line change
@@ -370,7 +370,7 @@ let
auth required pam_deny.so
# Password management.
password requisite pam_unix.so nullok sha512
password sufficient pam_unix.so nullok sha512
${optionalString config.security.pam.enableEcryptfs
"password optional ${pkgs.ecryptfs}/lib/security/pam_ecryptfs.so"}
${optionalString cfg.pamMount
26 changes: 15 additions & 11 deletions nixos/modules/services/networking/firefox/sync-server.nix
Original file line number Diff line number Diff line change
@@ -13,7 +13,7 @@ let
overrides = ${cfg.privateConfig}
[server:main]
use = egg:Paste#http
use = egg:gunicorn
host = ${cfg.listen.address}
port = ${toString cfg.listen.port}
@@ -30,6 +30,8 @@ let
audiences = ${removeSuffix "/" cfg.publicUrl}
'';

user = "syncserver";
group = "syncserver";
in

{
@@ -126,15 +128,14 @@ in

config = mkIf cfg.enable {

systemd.services.syncserver = let
syncServerEnv = pkgs.python.withPackages(ps: with ps; [ syncserver pasteScript requests ]);
user = "syncserver";
group = "syncserver";
in {
systemd.services.syncserver = {
after = [ "network.target" ];
description = "Firefox Sync Server";
wantedBy = [ "multi-user.target" ];
path = [ pkgs.coreutils syncServerEnv ];
path = [
pkgs.coreutils
(pkgs.python.withPackages (ps: [ pkgs.syncserver ps.gunicorn ]))
];

serviceConfig = {
User = user;
@@ -166,14 +167,17 @@ in
chown ${user}:${group} ${defaultDbLocation}
fi
'';
serviceConfig.ExecStart = "${syncServerEnv}/bin/paster serve ${syncServerIni}";

script = ''
gunicorn --paste ${syncServerIni}
'';
};

users.users.syncserver = {
group = "syncserver";
users.users.${user} = {
inherit group;
isSystemUser = true;
};

users.groups.syncserver = {};
users.groups.${group} = {};
};
}
11 changes: 9 additions & 2 deletions nixos/modules/services/security/certmgr.nix
Original file line number Diff line number Diff line change
@@ -30,13 +30,20 @@ let

preStart = ''
${concatStringsSep " \\\n" (["mkdir -p"] ++ map escapeShellArg specPaths)}
${pkgs.certmgr}/bin/certmgr -f ${certmgrYaml} check
${cfg.package}/bin/certmgr -f ${certmgrYaml} check
'';
in
{
options.services.certmgr = {
enable = mkEnableOption "certmgr";

package = mkOption {
type = types.package;
default = pkgs.certmgr;
defaultText = "pkgs.certmgr";
description = "Which certmgr package to use in the service.";
};

defaultRemote = mkOption {
type = types.str;
default = "127.0.0.1:8888";
@@ -187,7 +194,7 @@ in
serviceConfig = {
Restart = "always";
RestartSec = "10s";
ExecStart = "${pkgs.certmgr}/bin/certmgr -f ${certmgrYaml}";
ExecStart = "${cfg.package}/bin/certmgr -f ${certmgrYaml}";
};
};
};
2 changes: 1 addition & 1 deletion nixos/modules/services/security/munge.nix
Original file line number Diff line number Diff line change
@@ -50,7 +50,7 @@ in
path = [ pkgs.munge pkgs.coreutils ];

preStart = ''
chmod 0700 ${cfg.password}
chmod 0400 ${cfg.password}
mkdir -p /var/lib/munge -m 0711
chown -R munge:munge /var/lib/munge
mkdir -p /run/munge -m 0755
Loading