-
-
Notifications
You must be signed in to change notification settings - Fork 104
Comparing changes
Open a pull request
base repository: NixOS/nixpkgs-channels
base: a2eed09a8c85
head repository: NixOS/nixpkgs-channels
compare: c0611717dcab
- 7 commits
- 7 files changed
- 5 contributors
Commits on Dec 21, 2018
-
security.pam: make pam_unix.so required, not sufficient
Having pam_unix set to "sufficient" means early-succeeding account management group, as soon as pam_unix.so is succeeding. This is not sufficient. For example, nixos modules might install nss modules for user lookup, so pam_unix.so succeeds, and we end the stack successfully, even though other pam account modules might want to do more extensive checks. Other distros seem to set pam_unix.so to 'required', so if there are other pam modules in that management group, they get a chance to do some validation too. For SSSD, @PsyanticY already added a workaround knob in NixOS/nixpkgs#31969, while stating this should be the default anyway. I did some thinking in what could break - after this commit, we require pam_unix to succeed, means we require `getent passwd $username` to return something. This is the case for all local users due to the passwd nss module, and also the case for all modules installing their nss module to nsswitch.conf - true for ldap (if not explicitly disabled) and sssd. I'm not so sure about krb5, cc @eqyiel for opinions. Is there some nss module loaded? Should the pam account module be placed before pam_unix? We don't drop the `security.pam.services.<name?>.sssdStrictAccess` option, as it's also used some lines below to tweak error behaviour inside the pam sssd module itself (by changing it's 'control' field). This is also required to get admin login for Google OS Login working (#51566), as their pam_oslogin_admin accounts module takes care of sudo configuration.
Configuration menu - View commit details
-
Copy full SHA for d180bf3 - Browse repository at this point
Copy the full SHA d180bf3View commit details -
Configuration menu - View commit details
-
Copy full SHA for 5d9d164 - Browse repository at this point
Copy the full SHA 5d9d164View commit details -
Merge pull request #52488 from flokli/pam_account_unix_required
security.pam: make pam_unix.so required, not sufficient
Configuration menu - View commit details
-
Copy full SHA for 9c86e8f - Browse repository at this point
Copy the full SHA 9c86e8fView commit details -
nixpkgs/firecracker: init at 0.12.0
This currently uses a binary-only package, since building jailer/firecracker all on their own is somewhat complex from my attempts. This will later be changed into a source-only build, ideally. Signed-off-by: Austin Seipp <aseipp@pobox.com>
Configuration menu - View commit details
-
Copy full SHA for 814319f - Browse repository at this point
Copy the full SHA 814319fView commit details -
Merge pull request #52631 from jlesquembre/clojure
clojure: 1.9.0.391 -> 1.10.0.403
Configuration menu - View commit details
-
Copy full SHA for 435ba2b - Browse repository at this point
Copy the full SHA 435ba2bView commit details -
pythonPackages.uritemplate_py: remove
This package is the same as uritemplate.
Configuration menu - View commit details
-
Copy full SHA for 26869e7 - Browse repository at this point
Copy the full SHA 26869e7View commit details -
Merge pull request #52641 from lopsided98/uritemplate-merge
pythonPackages.uritemplate_py: remove
Configuration menu - View commit details
-
Copy full SHA for c061171 - Browse repository at this point
Copy the full SHA c061171View commit details
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff a2eed09a8c85...c0611717dcab