Commit Graph

495 Commits

Author SHA1 Message Date
Elliot Cameron
06b9024cc0 nginx: upgrade pcre to pcre2
Nginx builds with pcre2 by default as of version 1.21.5.
2024-11-14 15:07:36 -05:00
Martin Weinelt
36fd156152
nginxModules.vod: pin to ffmpeg 6
Closes: #351760
2024-10-28 00:21:04 +01:00
Azat Bahawi
20f02a8fde
nginxModules.njs: 0.8.1 -> 0.8.4 (#317683) 2024-10-23 21:45:28 +00:00
Sergei Trofimovich
a104755959 nginxMainline: 1.27.1 -> 1.27.2
Changes: https://nginx.org/en/CHANGES
2024-10-09 06:42:21 +01:00
Artturin
e0464e4788 treewide: replace stdenv.is with stdenv.hostPlatform.is
In preparation for the deprecation of `stdenv.isX`.

These shorthands are not conducive to cross-compilation because they
hide the platforms.

Darwin might get cross-compilation for which the continued usage of `stdenv.isDarwin` will get in the way

One example of why this is bad and especially affects compiler packages
https://www.github.com/NixOS/nixpkgs/pull/343059

There are too many files to go through manually but a treewide should
get users thinking when they see a `hostPlatform.isX` in a place where it
doesn't make sense.

```
fd --type f "\.nix" | xargs sd --fixed-strings "stdenv.is" "stdenv.hostPlatform.is"
fd --type f "\.nix" | xargs sd --fixed-strings "stdenv'.is" "stdenv'.hostPlatform.is"
fd --type f "\.nix" | xargs sd --fixed-strings "clangStdenv.is" "clangStdenv.hostPlatform.is"
fd --type f "\.nix" | xargs sd --fixed-strings "gccStdenv.is" "gccStdenv.hostPlatform.is"
fd --type f "\.nix" | xargs sd --fixed-strings "stdenvNoCC.is" "stdenvNoCC.hostPlatform.is"
fd --type f "\.nix" | xargs sd --fixed-strings "inherit (stdenv) is" "inherit (stdenv.hostPlatform) is"
fd --type f "\.nix" | xargs sd --fixed-strings "buildStdenv.is" "buildStdenv.hostPlatform.is"
fd --type f "\.nix" | xargs sd --fixed-strings "effectiveStdenv.is" "effectiveStdenv.hostPlatform.is"
fd --type f "\.nix" | xargs sd --fixed-strings "originalStdenv.is" "originalStdenv.hostPlatform.is"
```
2024-09-25 00:04:37 +03:00
Martin Weinelt
bbd0a867c2
nginxModules.develkit: 0.3.1 -> 0.3.3
https://github.com/vision5/ngx_devel_kit/releases/tag/v0.3.2
https://github.com/vision5/ngx_devel_kit/releases/tag/v0.3.3
2024-08-31 13:49:31 +02:00
Thomas Gerbet
694024f07d nginxMainline: 1.27.0 -> 1.27.1
Fixes CVE-2024-7347

Changes:
https://nginx.org/en/CHANGES
2024-08-15 19:55:22 +02:00
Thomas Gerbet
a46766ea91 nginx: 1.26.1 -> 1.26.2
Fixes CVE-2024-7347

Changes:
https://nginx.org/en/CHANGES-1.26
2024-08-15 19:53:39 +02:00
Martin Weinelt
5757a3c0bb
nginxModules.vod: 1.32 -> 1.33 2024-08-01 04:16:00 +02:00
Jörg Thalheim
5356420466 treewide: remove unused with statements from maintainer lists
$ find -type f -name '*.nix' -print0 | xargs -P "$(nproc)" -0 sed -i \
  -e 's!with lib.maintainers; \[ *\];![ ];!' \
  -e 's!with maintainers; \[ *\];![ ];!'
2024-07-29 10:06:20 +08:00
Sigmanificient
543cd40ecc treewide: remove trailing space in description
Done using `grep -rP 'description\s+=\s+"[^"]+[ ]";' | cut -d ':' -f 1 |
xargs -i nvim {}` and sorting the opened files by hand, avoiding
generated packages list
2024-07-26 03:38:50 +02:00
superherointj
cca34e8615 nginx: add stridtech team as maintainer 2024-07-12 12:16:22 +02:00
Alexis Hildebrandt
755b915a15 treewide: Remove indefinite article from meta.description
nix run nixpkgs#silver-searcher -- -G '\.nix$' -0l 'description.*"[Aa]n?' pkgs \
  | xargs -0 nix run nixpkgs#gnused -- -i '' -Ee 's/(description.*")[Aa]n? (.)/\1\U\2/'
2024-06-09 23:07:45 +02:00
Raphael Zimmermann
5b25b69ce6 nginxModules.njs: 0.8.1 -> 0.8.4 2024-06-06 09:59:18 +02:00
Sigmanificient
d48a9bb622 treewide: remove unused fetchpatch arguments 2024-06-04 12:40:25 +02:00
Thomas Gerbet
35c696f49f nginxMainline: 1.25.4 -> 1.27.0
Fixes CVE-2024-32760, CVE-2024-31079, CVE-2024-35200 and CVE-2024-34161.

Changes:
```

Changes with nginx 1.27.0                                        29 May 2024

    *) Security: when using HTTP/3, processing of a specially crafted QUIC
       session might cause a worker process crash, worker process memory
       disclosure on systems with MTU larger than 4096 bytes, or might have
       potential other impact (CVE-2024-32760, CVE-2024-31079,
       CVE-2024-35200, CVE-2024-34161).
       Thanks to Nils Bars of CISPA.

    *) Feature: variables support in the "proxy_limit_rate",
       "fastcgi_limit_rate", "scgi_limit_rate", and "uwsgi_limit_rate"
       directives.

    *) Bugfix: reduced memory consumption for long-lived requests if "gzip",
       "gunzip", "ssi", "sub_filter", or "grpc_pass" directives are used.

    *) Bugfix: nginx could not be built by gcc 14 if the --with-atomic
       option was used.
       Thanks to Edgar Bonet.

    *) Bugfixes in HTTP/3.

Changes with nginx 1.25.5                                        16 Apr 2024

    *) Feature: virtual servers in the stream module.

    *) Feature: the ngx_stream_pass_module.

    *) Feature: the "deferred", "accept_filter", and "setfib" parameters of
       the "listen" directive in the stream module.

    *) Feature: cache line size detection for some architectures.
       Thanks to Piotr Sikora.

    *) Feature: support for Homebrew on Apple Silicon.
       Thanks to Piotr Sikora.

    *) Bugfix: Windows cross-compilation bugfixes and improvements.
       Thanks to Piotr Sikora.

    *) Bugfix: unexpected connection closure while using 0-RTT in QUIC.
       Thanks to Vladimir Khomutov.
```
2024-05-31 11:32:40 +02:00
Thomas Gerbet
25e4a15f2a nginx: 1.26.0 -> 1.26.1
Fixes CVE-2024-32760, CVE-2024-31079, CVE-2024-35200 and CVE-2024-34161.
Note that the `nginxQuic` derivation rely on `nginxMainline`.

Changes:
```
Changes with nginx 1.26.1                                        29 May 2024

    *) Security: when using HTTP/3, processing of a specially crafted QUIC
       session might cause a worker process crash, worker process memory
       disclosure on systems with MTU larger than 4096 bytes, or might have
       potential other impact (CVE-2024-32760, CVE-2024-31079,
       CVE-2024-35200, CVE-2024-34161).
       Thanks to Nils Bars of CISPA.

    *) Bugfix: reduced memory consumption for long-lived requests if "gzip",
       "gunzip", "ssi", "sub_filter", or "grpc_pass" directives are used.

    *) Bugfix: nginx could not be built by gcc 14 if the --with-atomic
       option was used.
       Thanks to Edgar Bonet.

    *) Bugfix: in HTTP/3.

```
2024-05-31 11:30:28 +02:00
superherointj
e3e087e9ea nginx: make geoip optional 2024-05-25 12:08:22 -03:00
superherointj
64973309bb nginx: make image filter optional
Reduces nginx package size from 109.88 MiB to 41.99 MiB. Reduction of -67.88 MiB.

GD (libgd.github.io) is a library for the dynamic creation of images.

Co-authored-by: @ulrikstrid
2024-05-25 12:08:22 -03:00
superherointj
27a9dd9264 pkgsMusl.nginx: fix build
Fixes:

> error: #warning usage of non-standard #include <sys/cdefs.h> is deprecated [-Werror=cpp]
2024-05-22 20:58:30 -03:00
Thomas Gerbet
73d98d9b4a nginxStable: 1.24.0 -> 1.26.0
Changes
http://nginx.org/en/CHANGES-1.26

The 1.24.x branch is now considered EOL.
2024-04-26 23:10:10 +02:00
Sandro
e79a4cbd5c
Merge pull request #304704 from deshaw/upstream-fix-nginxModules.lua 2024-04-17 11:37:59 +02:00
Elliot Cameron
8f67b3d446 nginxModules.spnego-http-auth: fix support for nginx 1.23+ 2024-04-16 23:31:41 -04:00
Elliot Cameron
99afffdc3a nginxModules.lua: remove patch that is already applied
This module was applying a patch that is now included in all versions of Nginx that Nixpkgs supports.
2024-04-16 23:20:55 -04:00
Jussi Kuokkanen
82b45bf454 treewide: remove licenses.agpl3 2024-03-21 18:09:24 +02:00
stuebinm
ff1a94e523 treewide: add meta.mainProgram to packages with a single binary
The nixpkgs-unstable channel's programs.sqlite was used to identify
packages producing exactly one binary, and these automatically added
to their package definitions wherever possible.
2024-03-19 03:14:51 +01:00
Izorkin
b4c120b65f
nginxMainline: 1.25.3 -> 1.25.4 2024-02-14 21:02:38 +03:00
Pol Dellaiera
f5bf3f09f3
Merge pull request #277450 from SuperSandro2000/nginx-openresty
nginxModules.echo: 0.62 -> 0.63,  nginxModules.lua: 0.10.22 -> 0.10.26
2024-02-10 11:06:23 +01:00
Sandro Jäckel
d8a53ce428
nginxModules.lua: 0.10.22 -> 0.10.26
Diff: https://github.com/openresty/lua-nginx-module/compare/v0.10.22...v0.10.26
2024-01-15 15:42:33 +01:00
Sandro Jäckel
f462bea34e
nginxModules.echo: 0.62 -> 0.63
Diff: https://github.com/openresty/echo-nginx-module/compare/v0.62...v0.63
2024-01-15 15:42:33 +01:00
Sandro Jäckel
7b74c252df
nginxModules.lua: add version to support nix-update 2024-01-15 15:31:50 +01:00
Sandro Jäckel
95123f3589
nginxModules.echo: add version to support nix-update 2024-01-15 15:31:32 +01:00
Dee Anzorge
f124c73686 nginx: change etags for statically compressed files served from store
Per RFC 9110, [section 8.8.1][1], different representations of the same
resource should have different Etags:

> A strong validator is unique across all versions of all
> representations associated with a particular resource over time.
> However, there is no implication of uniqueness across representations
> of different resources (i.e., the same strong validator might be in
> use for representations of multiple resources at the same time and
> does not imply that those representations are equivalent)

When serving statically compressed files (ie, when there is an existing
corresponding .gz/.br/etc. file on disk), Nginx sends the Etag marked
as strong. These tags should be different for each compressed format
(as shown in  an explicit example in section [8.8.3.3][2] of the RFC).
Upstream Etags are composed of the file modification timestamp and
content length, and the latter generally changes between these
representations.

Previous implementation of Nix-specific Etags for things served from
store used the store hash. This is fine to share between different
files, but it becomes a problem for statically compressed versions of
the same file, as it means Nginx was serving different representations
of the same resource with the same Etag, marked as strong.

This patch addresses this by imitating the upstream Nginx behavior, and
appending the value of content length to the store hash.

[1]: https://www.rfc-editor.org/rfc/rfc9110.html#name-validator-fields
[2]:
https://www.rfc-editor.org/rfc/rfc9110.html#name-example-entity-tags-varying
2024-01-13 22:07:50 +01:00
Izorkin
10c06cb060
nginx: enable ktls support by default 2024-01-01 12:02:57 +03:00
Ryan Lahfa
b41904b923
Merge pull request #277449 from SuperSandro2000/moreheaders
nginxModules.moreheaders: 0.33 -> 0.36; adopt
2023-12-31 21:35:16 +01:00
Ryan Lahfa
d07fb6a75c
Merge pull request #263496 from poscat0x04/nginx-lua-resty
nginxModules.{lua,lua-upstream}: switch to luajit_openresty
2023-12-31 21:32:58 +01:00
Sandro Jäckel
d4492ac0f2
nginxModules.moreheaders: 0.33 -> 0.36; adopt 2023-12-29 03:37:35 +01:00
Ryan Lahfa
c6b9fb41c1
Merge pull request #271522 from kristoff3r/nginx-zstd-0-1-1
nginxModules.zstd: 0.1.0 -> 0.1.1
2023-12-24 03:52:40 +01:00
Robin Gloster
b5556f2c37
Merge pull request #268109 from helsinki-systems/helsinki-maintainer-team
maintainers/teams: init and add helsinki-systems
2023-12-20 11:43:29 +01:00
Izorkin
86efccfa45
angie: init at 1.4.0 2023-12-17 22:43:13 +03:00
Izorkin
00cb53de4f
nginx: fix nginx binary pathname 2023-12-17 16:51:29 +03:00
Kristoffer Søholm
6c19bd6631 nginxModules.zstd: 0.1.0 -> 0.1.1 2023-12-01 21:06:38 +01:00
ajs124
7b6580dba4 maintainers/teams: init and add helsinki-systems 2023-11-30 19:11:08 +01:00
Weijia Wang
add7a091c6 nginx: fix build on darwin 2023-11-18 17:01:10 +01:00
Artturi
2d3a5c7ddb
Merge pull request #262254 from Artturin/nginxsandboxrem 2023-10-31 18:39:55 +02:00
Martin Weinelt
e4f4ef7ce8
Merge pull request #263793 from fleaz/update_nginx-videothumb
nginxModules.videothumb-extractor: unstable -> 1.0.0 and switch to ffmpeg-headless
2023-10-28 17:46:01 +02:00
fleaz
55e29313dc
nginxModules: Switch from ffmpeg to ffmpeg-headless 2023-10-27 16:05:30 +02:00
fleaz
87338f90d4
nginxModules.video-thumbextractor: 92b8064 -> 1.0.0
Diff:
92b8064...e81f850
2023-10-27 16:05:29 +02:00
fleaz
f2efd2e9bc
nginxModules.vod: Patch MAX_CLIPS variable
The old limit was only 128 and this breaks some applications like e.g.
Frigate where playlists become bigger than that. According to upstream
you should just change the variable yourself if needed.

See this issue: https://github.com/kaltura/nginx-vod-module/issues/238
2023-10-26 23:21:32 +02:00
fleaz
30c49cdd91
nginxModules.vod: 1.31 -> 1.32
Changelog: https://github.com/kaltura/nginx-vod-module/compare/1.31...1.32
2023-10-26 23:20:08 +02:00