Commit Graph

798 Commits

Author SHA1 Message Date
Jonathan Ringer
727abb55c7 azure-cli: freeze azure-mgmt-deploymentmanager 2020-02-02 09:43:05 -08:00
Frederik Rietdijk
c195ef6aab
Merge pull request #78928 from NixOS/staging-next
Staging next
2020-02-02 15:35:18 +01:00
Mario Rodas
77f2d9bf1c
procs: 0.9.2 -> 0.9.5 2020-01-31 04:20:00 -05:00
Frederik Rietdijk
5cc0468a20 Merge staging into staging-next 2020-01-31 00:16:31 +01:00
Bruno Bigras
3922c927ab lego: 3.2.0 -> 3.3.0 2020-01-29 20:51:25 -05:00
xrelkd
5648d92acc eksctl: 0.12.0 -> 0.13.0 2020-01-29 03:24:07 +08:00
Frederik Rietdijk
cdff57e1fc Merge staging-next into staging 2020-01-28 10:48:36 +01:00
Mario Rodas
e39afd4095
procs: 0.9.0 -> 0.9.2 2020-01-26 04:20:00 -05:00
Mario Rodas
476a4fa40d
Merge pull request #78149 from talyz/nomachine-6.9.2
nomachine-client: 6.8.1 -> 6.9.2
2020-01-25 03:25:53 -05:00
Mario Rodas
4dbba7a143
procs: 0.8.16 -> 0.9.0 2020-01-23 09:00:00 -05:00
Jonathan Ringer
1474940ea4 ansible_2_8: 2.8.6 -> 2.8.7 2020-01-22 01:12:28 -08:00
Jonathan Ringer
3444d76c1b ansible_2_*: overridePythonAttrs -> overrideAttrs 2020-01-22 01:12:28 -08:00
Jonathan Ringer
99eb9231d4 ansible_2_9: init at 2.9.2 2020-01-22 01:12:28 -08:00
zimbatm
f8df74be4b
vncdo: fix build 2020-01-21 13:16:01 +01:00
talyz
62af7804ef nomachine-client: 6.8.1 -> 6.9.2 2020-01-21 10:29:39 +01:00
Mario Rodas
949c5f8451
Merge pull request #78068 from r-ryantm/auto-update/acme.sh
acme-sh: 2.8.3 -> 2.8.5
2020-01-20 07:36:58 -05:00
R. RyanTM
02fad0d598 acme-sh: 2.8.3 -> 2.8.5 2020-01-20 03:00:35 +00:00
Mario Rodas
30a7902609
sewer: enable on darwin 2020-01-19 04:20:00 -05:00
Mario Rodas
fc408d55e6 sewer: 0.7.3 -> 0.7.9 2020-01-19 04:20:00 -05:00
R. RyanTM
d97a34cfcf sewer: 0.7.0 -> 0.7.3 2020-01-17 10:44:46 +00:00
Robin Gloster
aa489adfd8
Merge pull request #77686 from alyssais/urllib3
Revert "Re-revert "awscli: Get rid of runtime -dev dependencies""
2020-01-17 00:38:52 +01:00
Mario Rodas
5f586605df
Merge pull request #77670 from amarrella/update/eksctl
eksctl: 0.11.1 -> 0.12.0
2020-01-14 21:49:58 -05:00
Alyssa Ross
76af9e8438
Revert "Re-revert "awscli: Get rid of runtime -dev dependencies""
This reverts commit a1eacb900e.

Adding dev outputs to python packages means they can't be included in
a Python environment created with python3.withPackages, because
makePythonPath will include the dev output, which is empty apart from
nix-support, rather than the out output, which contains all the Python
code.
2020-01-14 16:00:00 +00:00
Alessandro Marrella
730371336b
eksctl: 0.11.1 -> 0.12.0 2020-01-14 11:55:10 +00:00
Jonathan Ringer
32b5c579b0 azure-cli: 2.0.79 -> 2.0.80 2020-01-13 14:27:30 -08:00
edef
178ac3cb99 google-cloud-sdk: include openssl(1) in PATH (#77277)
Otherwise, it might fail with a mysterious error:

    ERROR: (gcloud.beta.compute.reset-windows-password) Your platform does not support OpenSSL.
2020-01-10 09:42:37 +00:00
Jonathan Ringer
26aa690447 azure-cli: 2.0.78 -> 2.0.79 2020-01-09 10:09:02 -08:00
Jonathan Ringer
94dea31ea2 azure-cli: freeze azure-mgmt-iotcentral 2020-01-09 10:09:02 -08:00
worldofpeace
dfd115a116 swiftclient: add setuptools
Traceback (most recent call last):
  File "/nix/store/8qkdlyv2ckrimvi50qvl0anzv66jcp2j-python-swiftclient-3.6.0/bin/.swift-wrapped", line 7, in <module>
    from swiftclient.shell import main
  File "/nix/store/8qkdlyv2ckrimvi50qvl0anzv66jcp2j-python-swiftclient-3.6.0/lib/python3.7/site-packages/swiftclient/__init__.py", line 20, in <module>
    from .client import *  # noqa
  File "/nix/store/8qkdlyv2ckrimvi50qvl0anzv66jcp2j-python-swiftclient-3.6.0/lib/python3.7/site-packages/swiftclient/client.py", line 33, in <module>
    from swiftclient import version as swiftclient_version
  File "/nix/store/8qkdlyv2ckrimvi50qvl0anzv66jcp2j-python-swiftclient-3.6.0/lib/python3.7/site-packages/swiftclient/version.py", line 15, in <module>
    import pkg_resources
ModuleNotFoundError: No module named 'pkg_resources'
2020-01-08 11:06:47 -05:00
Simonas Kazlauskas
0320725e86 berglas: 0.2.1 -> 0.5.0 2020-01-07 14:20:10 +02:00
Maximilian Bosch
839c0ea7a5
treewide: *Inputs are flat lists 2019-12-31 01:10:02 +01:00
Robin Gloster
760e23136a
treewide: *inputs are lists 2019-12-31 01:09:25 +01:00
Jonathan Ringer
8043df949b aws_shell: fix dep issues 2019-12-30 16:46:51 +01:00
Jonathan Ringer
fe058ee1ed awscli: fix build 2019-12-30 16:46:51 +01:00
Jonathan Ringer
e1bb62f9bc azure-cli: 2.0.77 -> 2.0.78 2019-12-30 16:46:50 +01:00
Jan Tojnar
a69e309794
Merge branch 'staging-next' into staging 2019-12-30 05:24:03 +01:00
Florian Klink
0aa09d3c75 simpl_le: 0.16.0 -> 0.17.0 2019-12-29 19:30:31 +01:00
Florian Klink
d07796b871 certbot: 0.39.0 -> 1.0.0 2019-12-29 19:30:31 +01:00
Frederik Rietdijk
5aed91512d Merge staging-next into staging 2019-12-29 10:20:05 +01:00
Maximilian Bosch
fa28c7750a
Merge pull request #76442 from r-ryantm/auto-update/tigervnc
tigervnc: 1.10.0 -> 1.10.1
2019-12-26 20:31:01 +01:00
Jan Tojnar
4bbc6cc66f
Merge branch 'staging-next' into staging 2019-12-25 05:18:52 +01:00
R. RyanTM
e91f467811 tigervnc: 1.10.0 -> 1.10.1 2019-12-24 12:01:35 -08:00
Mario Rodas
2f2047c378
Merge pull request #75196 from r-ryantm/auto-update/bubblewrap
bubblewrap: 0.3.3 -> 0.4.0
2019-12-22 18:11:52 -05:00
Mario Rodas
932f5f6b88
clair: 2.0.9 -> 2.1.2 2019-12-22 00:00:00 -05:00
Terje Larsen
7a99d1e392
awscli: pin colorama to 0.4.1
This is pinned to 0.4.1 in the upstream awscli package.
2019-12-20 14:23:12 +01:00
Mario Rodas
b066646e04
docker-credential-helpers: init at 0.6.3 2019-12-15 18:18:18 -05:00
Andreas Rammhold
b21b92947e ansible_2_6: 2.6.17 -> 2.6.20
This addresses the following security issues:

  * CVE-2019-14846 - Several Ansible plugins could disclose aws
    credentials in log files. inventory/aws_ec2.py, inventory/aws_rds.py,
    lookup/aws_account_attribute.py, and lookup/aws_secret.py,
    lookup/aws_ssm.py use the boto3 library from the Ansible process. The
    boto3 library logs credentials at log level DEBUG. If Ansible's
    logging was enabled (by setting LOG_PATH to a value) Ansible would set
    the global log level to DEBUG. This was inherited by boto and would
    then log boto credentials to the file specified by LOG_PATH. This did
    not affect aws ansible modules as those are executed in a separate
    process. This has been fixed by switching to log level INFO
  * Convert CLI provided passwords to text initially, to prevent unsafe
    context being lost when converting from bytes->text during post
    processing of PlayContext. This prevents CLI provided passwords from
    being incorrectly templated (CVE-2019-14856)
  * properly hide parameters marked with no_log in suboptions when
    invalid parameters are passed to the module (CVE-2019-14858)
  * resolves CVE-2019-10206, by avoiding templating passwords from
    prompt as it is probable they have special characters.
  * Handle improper variable substitution that was happening in
    safe_eval, it was always meant to just do 'type enforcement' and have
    Jinja2 deal with all variable interpolation. Also see CVE-2019-10156

Changelog: 9bdb89f740/changelogs/CHANGELOG-v2.6.rst
2019-12-15 21:25:07 +01:00
Andreas Rammhold
64e2791092 ansible_2_7: 2.7.11 -> 2.7.15
This fixes the following security issues:
  * Ansible: Splunk and Sumologic callback plugins leak sensitive data
    in logs (CVE-2019-14864)
  * CVE-2019-14846 - Several Ansible plugins could disclose aws
    credentials in log files. inventory/aws_ec2.py, inventory/aws_rds.py,
    lookup/aws_account_attribute.py, and lookup/aws_secret.py,
    lookup/aws_ssm.py use the boto3 library from the Ansible process. The
    boto3 library logs credentials at log level DEBUG. If Ansible's
    logging was enabled (by setting LOG_PATH to a value) Ansible would set
    the global log level to DEBUG. This was inherited by boto and would
    then log boto credentials to the file specified by LOG_PATH. This did
    not affect aws ansible modules as those are executed in a separate
    process. This has been fixed by switching to log level INFO
  * Convert CLI provided passwords to text initially, to prevent unsafe
    context being lost when converting from bytes->text during post
    processing of PlayContext. This prevents CLI provided passwords from
    being incorrectly templated (CVE-2019-14856)
  * properly hide parameters marked with no_log in suboptions when invalid
    parameters are passed to the module (CVE-2019-14858)
  * resolves CVE-2019-10206, by avoiding templating passwords from
    prompt as it is probable they have special characters.
  * Handle improper variable substitution that was happening in
    safe_eval, it was always meant to just do 'type enforcement' and have
    Jinja2 deal with all variable interpolation. Also see CVE-2019-10156

Changelog: 0623dedf2d/changelogs/CHANGELOG-v2.7.rst (v2-7-15)
2019-12-15 21:24:59 +01:00
itsHMR
a46e3ebae5 tigervnc: add perl to buildInputs (#75367)
tigervnc ships vncserver, quote from the documentation:
vncserver - a wrapper script which makes starting Xvnc more convenient vncserver requires Perl.
2019-12-14 18:06:01 +01:00
Jonathan Ringer
8f8d977f2a azure-cli: freeze azure-mgmt-recoveryservicesbackup 2019-12-10 18:28:21 -08:00