summary refs log tree commit diff
path: root/pkgs/tools/admin
Commit message (Collapse)AuthorAge
* Merge pull request #77670 from amarrella/update/eksctlMario Rodas2020-01-14
|\ | | | | eksctl: 0.11.1 -> 0.12.0
| * eksctl: 0.11.1 -> 0.12.0Alessandro Marrella2020-01-14
| |
* | azure-cli: 2.0.79 -> 2.0.80Jonathan Ringer2020-01-13
|/
* google-cloud-sdk: include openssl(1) in PATH (#77277)edef2020-01-10
| | | | | Otherwise, it might fail with a mysterious error: ERROR: (gcloud.beta.compute.reset-windows-password) Your platform does not support OpenSSL.
* azure-cli: 2.0.78 -> 2.0.79Jonathan Ringer2020-01-09
|
* azure-cli: freeze azure-mgmt-iotcentralJonathan Ringer2020-01-09
|
* swiftclient: add setuptoolsworldofpeace2020-01-08
| | | | | | | | | | | | | Traceback (most recent call last): File "/nix/store/8qkdlyv2ckrimvi50qvl0anzv66jcp2j-python-swiftclient-3.6.0/bin/.swift-wrapped", line 7, in <module> from swiftclient.shell import main File "/nix/store/8qkdlyv2ckrimvi50qvl0anzv66jcp2j-python-swiftclient-3.6.0/lib/python3.7/site-packages/swiftclient/__init__.py", line 20, in <module> from .client import * # noqa File "/nix/store/8qkdlyv2ckrimvi50qvl0anzv66jcp2j-python-swiftclient-3.6.0/lib/python3.7/site-packages/swiftclient/client.py", line 33, in <module> from swiftclient import version as swiftclient_version File "/nix/store/8qkdlyv2ckrimvi50qvl0anzv66jcp2j-python-swiftclient-3.6.0/lib/python3.7/site-packages/swiftclient/version.py", line 15, in <module> import pkg_resources ModuleNotFoundError: No module named 'pkg_resources'
* berglas: 0.2.1 -> 0.5.0Simonas Kazlauskas2020-01-07
|
* treewide: *Inputs are flat listsMaximilian Bosch2019-12-31
|
* treewide: *inputs are listsRobin Gloster2019-12-31
|
* aws_shell: fix dep issuesJonathan Ringer2019-12-30
|
* awscli: fix buildJonathan Ringer2019-12-30
|
* azure-cli: 2.0.77 -> 2.0.78Jonathan Ringer2019-12-30
|
* Merge branch 'staging-next' into stagingJan Tojnar2019-12-30
|\
| * simpl_le: 0.16.0 -> 0.17.0Florian Klink2019-12-29
| |
| * certbot: 0.39.0 -> 1.0.0Florian Klink2019-12-29
| |
* | Merge staging-next into stagingFrederik Rietdijk2019-12-29
|\|
| * Merge pull request #76442 from r-ryantm/auto-update/tigervncMaximilian Bosch2019-12-26
| |\ | | | | | | tigervnc: 1.10.0 -> 1.10.1
| | * tigervnc: 1.10.0 -> 1.10.1R. RyanTM2019-12-24
| | |
* | | Merge branch 'staging-next' into stagingJan Tojnar2019-12-25
|\| |
| * | clair: 2.0.9 -> 2.1.2Mario Rodas2019-12-22
| | |
| * | awscli: pin colorama to 0.4.1Terje Larsen2019-12-20
| | | | | | | | | | | | This is pinned to 0.4.1 in the upstream awscli package.
| * | docker-credential-helpers: init at 0.6.3Mario Rodas2019-12-15
| |/
* | Merge pull request #75196 from r-ryantm/auto-update/bubblewrapMario Rodas2019-12-22
|\ \ | |/ |/| bubblewrap: 0.3.3 -> 0.4.0
| * bubblewrap: 0.3.3 -> 0.4.0R. RyanTM2019-12-07
| |
* | ansible_2_6: 2.6.17 -> 2.6.20Andreas Rammhold2019-12-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This addresses the following security issues: * CVE-2019-14846 - Several Ansible plugins could disclose aws credentials in log files. inventory/aws_ec2.py, inventory/aws_rds.py, lookup/aws_account_attribute.py, and lookup/aws_secret.py, lookup/aws_ssm.py use the boto3 library from the Ansible process. The boto3 library logs credentials at log level DEBUG. If Ansible's logging was enabled (by setting LOG_PATH to a value) Ansible would set the global log level to DEBUG. This was inherited by boto and would then log boto credentials to the file specified by LOG_PATH. This did not affect aws ansible modules as those are executed in a separate process. This has been fixed by switching to log level INFO * Convert CLI provided passwords to text initially, to prevent unsafe context being lost when converting from bytes->text during post processing of PlayContext. This prevents CLI provided passwords from being incorrectly templated (CVE-2019-14856) * properly hide parameters marked with no_log in suboptions when invalid parameters are passed to the module (CVE-2019-14858) * resolves CVE-2019-10206, by avoiding templating passwords from prompt as it is probable they have special characters. * Handle improper variable substitution that was happening in safe_eval, it was always meant to just do 'type enforcement' and have Jinja2 deal with all variable interpolation. Also see CVE-2019-10156 Changelog: https://github.com/ansible/ansible/blob/9bdb89f740a87bcf760424577ce18a8f68d7a741/changelogs/CHANGELOG-v2.6.rst
* | ansible_2_7: 2.7.11 -> 2.7.15Andreas Rammhold2019-12-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This fixes the following security issues: * Ansible: Splunk and Sumologic callback plugins leak sensitive data in logs (CVE-2019-14864) * CVE-2019-14846 - Several Ansible plugins could disclose aws credentials in log files. inventory/aws_ec2.py, inventory/aws_rds.py, lookup/aws_account_attribute.py, and lookup/aws_secret.py, lookup/aws_ssm.py use the boto3 library from the Ansible process. The boto3 library logs credentials at log level DEBUG. If Ansible's logging was enabled (by setting LOG_PATH to a value) Ansible would set the global log level to DEBUG. This was inherited by boto and would then log boto credentials to the file specified by LOG_PATH. This did not affect aws ansible modules as those are executed in a separate process. This has been fixed by switching to log level INFO * Convert CLI provided passwords to text initially, to prevent unsafe context being lost when converting from bytes->text during post processing of PlayContext. This prevents CLI provided passwords from being incorrectly templated (CVE-2019-14856) * properly hide parameters marked with no_log in suboptions when invalid parameters are passed to the module (CVE-2019-14858) * resolves CVE-2019-10206, by avoiding templating passwords from prompt as it is probable they have special characters. * Handle improper variable substitution that was happening in safe_eval, it was always meant to just do 'type enforcement' and have Jinja2 deal with all variable interpolation. Also see CVE-2019-10156 Changelog: https://github.com/ansible/ansible/blob/0623dedf2d9c4afc09e5be30d3ef249f9d1ebece/changelogs/CHANGELOG-v2.7.rst#v2-7-15
* | tigervnc: add perl to buildInputs (#75367)itsHMR2019-12-14
| | | | | | | | tigervnc ships vncserver, quote from the documentation: vncserver - a wrapper script which makes starting Xvnc more convenient vncserver requires Perl.
* | azure-cli: freeze azure-mgmt-recoveryservicesbackupJonathan Ringer2019-12-10
| |
* | Merge pull request #75290 from marsam/update-awsweeperSarah Brofeldt2019-12-09
|\ \ | | | | | | awsweeper: init at 0.4.1
| * | awsweeper: init at 0.4.1Mario Rodas2019-12-08
| | |
* | | procs: 0.8.13 -> 0.8.16Mario Rodas2019-12-09
|/ /
* | awscli: remove unnecessary override on python prompt_toolkitBenjamin Hipple2019-12-07
| | | | | | | | | | | | | | | | | | | | This override to the old 1.x version of `prompt_toolkit` appears to be unnecessary; removing it does not change the hash of `awscli`. In a follow-up, we could likely remove the RSA override as well, if we're OK with patching out the `setup.cfg` requirements. This dropped support for some old modules, but appears to not break API compatibility otherwise: https://github.com/sybrenstuvel/python-rsa/blob/master/CHANGELOG.md#version-40---released-2018-09-16
* | eksctl: 0.11.0 -> 0.11.1xrelkd2019-12-06
| |
* | Merge pull request #74371 from bbigras/legoTimo Kaufmann2019-12-05
|\ \ | |/ |/| lego: 3.0.2 -> 3.2.0
| * lego: 3.0.2 -> 3.2.0Bruno Bigras2019-11-28
| |
* | eksctl: 0.10.2 -> 0.11.0xrelkd2019-12-05
| |
* | azure-cli: freeze azure-mgmt-imagebuilderJonathan Ringer2019-12-03
| |
* | azure-cli: freeze azure-mgmt-sqlvirtualmachine at 0.4.0Jonathan Ringer2019-12-02
| |
* | azure-cli: 2.0.76 -> 2.0.77Jonathan Ringer2019-12-01
| |
* | tigervnc: 1.9.0 -> 1.10.0R. RyanTM2019-11-30
| | | | | | | | | | * tigervnc: 1.9.0 -> 1.10.0 (#74679) + refresh meta.homepage
* | azure-cli: freeze cosmosdbJonathan Ringer2019-11-29
|/
* Merge pull request #74108 from r-ryantm/auto-update/aws-google-authMario Rodas2019-11-25
|\ | | | | aws-google-auth: 0.0.32 -> 0.0.33
| * aws-google-auth: 0.0.32 -> 0.0.33R. RyanTM2019-11-25
| |
* | fbvnc: init at 1.0.2Michael Raskin2019-11-25
| |
* | tightvnc: add patches for four CVEsRobert Scott2019-11-24
|/ | | | | | | | | | | | Security fixes for: * CVE-2019-8287 * CVE-2019-15678 * CVE-2019-15679 * CVE-2019-15680 mostly adapted from patches fixing similar issues in the actively maintained libvnc (#73970)
* azure-cli: init at 2.0.76Jonathan Ringer2019-11-23
|
* eksctl: 0.9.0 -> 0.10.2xrelkd2019-11-22
|
* elasticsearch-curator: move out of python-packagesJonathan Ringer2019-11-19
| | | | | | Upstream froze click to <7, which means it will only work with overrides, which means it can't compose with other python modules.
* awslogs: propagate setuptoolsJos van Bakel2019-11-14
| | | (#71172)