Commit Graph

250 Commits

Author SHA1 Message Date
github-actions[bot]
683f8efd0d
Merge staging-next into staging 2024-10-29 18:04:56 +00:00
Aleksana
b1669786f1
pkgsStatic.openssh: fix build (#278079) 2024-10-29 20:13:39 +08:00
Thomas Gerbet
f108380db7
openssh, openssh_hpn, openssh_gssapi: 9.8p1 -> 9.9p1 (#350699)
* openssh: 9.8p1 -> 9.9p1

Changes: https://www.openssh.com/releasenotes.html#9.9p1

* openssh_hpn: 9.8p1 -> 9.9p1

Changes: https://www.openssh.com/releasenotes.html#9.9p1

* openssh_gssapi: 9.8p1 -> 9.9p1

Changes:
https://www.openssh.com/releasenotes.html#9.9p1

---------

Co-authored-by: Ashish SHUKLA <ashish.is@lostca.se>
2024-10-25 18:06:31 +02:00
Artturin
f0e657f3b1 Merge branch 'master' into staging-next 2024-09-25 06:05:01 +03:00
Artturin
e0464e4788 treewide: replace stdenv.is with stdenv.hostPlatform.is
In preparation for the deprecation of `stdenv.isX`.

These shorthands are not conducive to cross-compilation because they
hide the platforms.

Darwin might get cross-compilation for which the continued usage of `stdenv.isDarwin` will get in the way

One example of why this is bad and especially affects compiler packages
https://www.github.com/NixOS/nixpkgs/pull/343059

There are too many files to go through manually but a treewide should
get users thinking when they see a `hostPlatform.isX` in a place where it
doesn't make sense.

```
fd --type f "\.nix" | xargs sd --fixed-strings "stdenv.is" "stdenv.hostPlatform.is"
fd --type f "\.nix" | xargs sd --fixed-strings "stdenv'.is" "stdenv'.hostPlatform.is"
fd --type f "\.nix" | xargs sd --fixed-strings "clangStdenv.is" "clangStdenv.hostPlatform.is"
fd --type f "\.nix" | xargs sd --fixed-strings "gccStdenv.is" "gccStdenv.hostPlatform.is"
fd --type f "\.nix" | xargs sd --fixed-strings "stdenvNoCC.is" "stdenvNoCC.hostPlatform.is"
fd --type f "\.nix" | xargs sd --fixed-strings "inherit (stdenv) is" "inherit (stdenv.hostPlatform) is"
fd --type f "\.nix" | xargs sd --fixed-strings "buildStdenv.is" "buildStdenv.hostPlatform.is"
fd --type f "\.nix" | xargs sd --fixed-strings "effectiveStdenv.is" "effectiveStdenv.hostPlatform.is"
fd --type f "\.nix" | xargs sd --fixed-strings "originalStdenv.is" "originalStdenv.hostPlatform.is"
```
2024-09-25 00:04:37 +03:00
Alyssa Ross
17648a4f57
openssh: fix building for musl with GCC 14 2024-09-13 20:51:50 +02:00
github-actions[bot]
22c53603c5
Merge master into staging-next 2024-08-30 00:13:29 +00:00
Philip Taron
ae92f312bf
treewide: use a consistent meta.priority default 2024-08-29 09:04:57 -07:00
github-actions[bot]
0629545b27
Merge master into staging-next 2024-08-27 00:13:08 +00:00
Martin Weinelt
9c50de8b57
tree-wide: remove eelco as maintainer from things he no longer maintains (#336287) 2024-08-26 20:39:56 +02:00
Martin Weinelt
c0a12dc762
Merge remote-tracking branch 'origin/staging-next' into staging 2024-08-22 21:34:11 +02:00
Thomas Gerbet
3caaa2f748
Merge pull request #335479 from knl/fix-openssh-hpn-on-darwin
openssh_hpn: update patch to fix aarch64-darwin build
2024-08-22 21:16:27 +02:00
Nikola Knezevic
c37b77008b openssh_hpn: update patch to fix aarch64-darwin build
This change uses the new patch for HPN from FreeBSD project that adds a
missing include to `sshd.c` (for `channels.h`, that includes the
definition of `channel_set_hpn`).
2024-08-22 14:14:30 +02:00
K900
5c68540f8b Merge remote-tracking branch 'origin/staging-next' into staging 2024-08-22 13:20:38 +03:00
Jade Lovelace
5dfdb09561 tree-wide: remove eelco as maintainer from things he no longer maintains
While preparing this change, I read the git blame on all of the files I
touched. I saw a working lifetime of building this system which we use
every day and love dearly and keep maintained ourselves. I saw commits
from a 14 year range between 2003 to 2017!! I could not be more thankful
for Eelco's work on building large parts of the foundation of nixpkgs
that all of us rely on now.

However, the end date of that range of the files I looked at the blame
on was 2017. I did not see surviving code from any newer date than that.
Looking at the Git logs, Eelco has been working on other things, and
that's totally fine.

However, it means that our maintenance metadata is out of date on a lot
of packages, and *that*'s the reason I am submitting this change. There
are a lot of packages that don't have anyone with their name on them to
be pinged if they need attention, even if they have had recent activity
(although it is never clear if recent activity was just someone fixing
it because ZHF or because the package actually matters to them).
There are a lot of packages with storied history that maybe don't need
to be in the set anymore at all since they have not been touched in
years; or maybe they are simply finished.

Empty maintainer lists should be a sign that we need to figure out who
maintains it or potentially remove it if it has rotted, and allowing the
maintainer list to be empty if it is already not maintained is part of a
healthy repository ecology.

Either way, I would like to have the maintenance metadata not mislead
anyone into sending Eelco emails about packages he doesn't, in practice,
work on anymore. I have not removed his name from everything; there are
some things that he is the upstream for or has worked on more recently,
for instance, like Nix, which I have left alone.
2024-08-21 01:17:45 -07:00
deinferno
e4eea8374c
pkgsStatic.openssh: fix build 2024-08-19 11:09:17 +02:00
Elliot Cameron
e6f8f04f9e openssh: use krb5 dev output 2024-08-17 00:50:38 -04:00
Thomas Gerbet
68c2966218 openssh_gssapi: 9.7p1 -> 9.8p1
https://www.openssh.com/txt/release-9.8
2024-08-17 00:45:52 +02:00
Thomas Gerbet
2efa5e16a2 openssh_hpn: 9.7p1 -> 9.8p1
Changes:
https://www.openssh.com/txt/release-9.8
2024-07-13 14:28:56 +02:00
Jörg Thalheim
c7411f7d53
Merge pull request #277579 from nikstur/openssh-tests-in-separate-derivation
openssh: put tests into passthru
2024-07-07 19:10:35 +02:00
Emily
e328c86314 openssh_{hpn,gssapi}: add backported security fix patches
Fixes a critical security bug allowing remote code execution as root:
<https://www.openssh.com/txt/release-9.8>

This may be CVE-2024-6387 (currently embargoed):
<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6387>

Thanks to upstream and Sam James <sam@gentoo.org> for the backport:
<1633ef4547>

Please don’t use these packages on the open internet if you care
a lot about security.
2024-07-01 13:06:28 +02:00
Emily
7f993cdf26 openssh: 9.7p1 -> 9.8p1
Fixes a critical security bug allowing remote code execution as root:
<https://www.openssh.com/txt/release-9.8>

This may be CVE-2024-6387 (currently embargoed):
<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6387>
2024-07-01 11:00:38 +02:00
nikstur
8677517558 openssh: put tests into passthru
openssh tests are very slow (they take ~30 mins because they are not
parallelized). This makes rebuilding (esp. after changes e.g. to
systemd) painful. Putting the tests into a separate derivation solves
this without losing any testing capability.

Debian does the same: https://packages.debian.org/sid/openssh-tests
2024-06-14 23:52:56 +02:00
Alexis Hildebrandt
755b915a15 treewide: Remove indefinite article from meta.description
nix run nixpkgs#silver-searcher -- -G '\.nix$' -0l 'description.*"[Aa]n?' pkgs \
  | xargs -0 nix run nixpkgs#gnused -- -i '' -Ee 's/(description.*")[Aa]n? (.)/\1\U\2/'
2024-06-09 23:07:45 +02:00
Thomas Gerbet
ef6fea2d86 openssh: move Kerberos support into a dedicated package
The `openssh` and `openssh_hpn` packages are now built without
the Kerberos support by default in an effort to reduce the attack surface.

The Kerberos support is likely used only by a fraction of the total users
(I'm guessing mainly users integrating SSH in an Active Directory env) so
dropping it should not impact too many users. It should also be noted that
the Kerberos/GSSAPI auth is disabled by default in the configuration.
`opensshWithKerberos` and `openssh_hpnWithKerberos` are added in order
to provide an easy migration path for users needing this support.

The `openssh_gssapi` package is kept untouched.
2024-06-05 19:45:31 +10:00
Luke Granger-Brown
402031bfe6
Merge pull request #308325 from wlcx/openssh-passwd
openssh: build with correct passwd path
2024-05-17 01:31:46 +01:00
Sam Willcocks
54a3d44e24 openssh: build with correct passwd path 2024-05-16 17:42:17 +01:00
Tom Fitzhenry
03e851ea8e openssh: fix linkOpenSSL=false by linking libxcrypt
Possibly broken during https://github.com/NixOS/nixpkgs/pull/181764

Context: https://sourceware.org/legacy-ml/libc-alpha/2017-08/msg01257.html
2024-04-29 00:17:17 +10:00
Thomas Gerbet
1a462800bf openssh_gssapi: 9.6p1 -> 9.7p1
This is a follow up to #295133 now that the GSSAPI patch has been updated.

Upstream changes:
https://www.openssh.com/txt/release-9.7
2024-04-27 23:01:20 +10:00
Tom Fitzhenry
62ace1bb03 openssh: add nixosTests.openssh to passthru.tests 2024-04-14 15:00:30 +10:00
Thomas Gerbet
6ee4b8c8bf openssh: disable support for DSA keys by default
DSA signature is being deprecated by upstream as noted in the 9.7
release notes: https://www.openssh.com/txt/release-9.7

An attribute is added to allow users to restore support while it is
still possible.
2024-04-03 16:03:29 +02:00
Robert Scott
a963a86e5c
Merge pull request #295142 from LeSuisse/openssh_gssapi-9.6p1
openssh_gssapi: 9.5p1 -> 9.6p1
2024-03-15 18:57:08 +00:00
Fabián Heredia Montiel
98114f7271
Merge pull request #295133 from LeSuisse/openssh-9.7p1
openssh: 9.6p1 -> 9.7p1
2024-03-12 14:43:43 -06:00
Thomas Gerbet
e2bac969aa openssh_gssapi: 9.5p1 -> 9.6p1
Includes the mitigation for CVE-2023-48795.

Changes:
https://www.openssh.com/txt/release-9.6
2024-03-11 23:26:46 +01:00
Thomas Gerbet
41ba7c816b openssh: 9.6p1 -> 9.7p1
Changes:
https://www.openssh.com/txt/release-9.7
2024-03-11 22:55:15 +01:00
Thomas Gerbet
99237c2958 openssh_hpn: 9.5p1 -> 9.7p1
Includes the mitigation for CVE-2023-48795.

Changes:
https://www.openssh.com/txt/release-9.7
https://www.openssh.com/txt/release-9.6
2024-03-11 22:39:46 +01:00
Robin Gloster
b5556f2c37
Merge pull request #268109 from helsinki-systems/helsinki-maintainer-team
maintainers/teams: init and add helsinki-systems
2023-12-20 11:43:29 +01:00
Sandro Jäckel
7d565226df
openssh: 9.5p1 -> 9.6p1 2023-12-18 20:34:20 +01:00
ajs124
7b6580dba4 maintainers/teams: init and add helsinki-systems 2023-11-30 19:11:08 +01:00
Janne Heß
73b2187e5f
Merge pull request #259459 from jcgruenhage/openssh-ldns
openssh: enable ldns
2023-10-30 11:03:41 +01:00
Jan Christian Grünhage
2342298229
openssh: enable ldns
ldns is used for validating DNSSEC responses. With ldns enabled, using
SSHFP records on DNSSEC signed zones allows connecting to ssh servers
with host keys being automatically validated.
2023-10-06 22:45:30 +02:00
Janne Heß
6cba6142f7
openssh_gssapi: 9.4p1 -> 9.5p1 2023-10-04 23:24:11 +02:00
Janne Heß
df07e83ff6
openssh_hpn: 9.4p1 -> 9.5p1 2023-10-04 21:30:56 +02:00
Janne Heß
2d99e37a9b
openssh: 9.4p1 -> 9.5p1 2023-10-04 21:30:42 +02:00
Artturi
2dd22620f3
Merge pull request #247443 from amjoseph-nixpkgs/pr/openssh/withPAM 2023-08-28 21:45:48 +03:00
Adam Joseph
49add44e4d openssh: add withPAM parameter 2023-08-28 20:38:32 +03:00
Sergei Trofimovich
5eb1879e4e openssh: backport zlib-1.3 support 2023-08-19 17:30:22 +01:00
Janne Heß
289c866529
openssh_gssapi: 9.3p2 -> 9.4p1 2023-08-11 14:27:04 +02:00
Janne Heß
3f51296ddb
openssh_hpn: 9.3p2 -> 9.4p1 2023-08-11 14:26:51 +02:00
Janne Heß
df8ba79183
openssh: 9.3p2 -> 9.4p1 2023-08-11 14:26:42 +02:00