-
-
Notifications
You must be signed in to change notification settings - Fork 17.7k
audit: 4.1.0 -> 4.1.1, enable uring support and bash completions #429438
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
032e936 to
438a1dd
Compare
438a1dd to
85b95d8
Compare
|
Hmm, seems there are new musl issues: I'll investigate. |
85b95d8 to
8bcab0c
Compare
|
Okay, fixed the musl build, proposed the fix upstream in linux-audit/audit-userspace#491 |
192be61 to
6e81e1a
Compare
|
I'll bump this to an unstable build once linux-audit/audit-userspace#492 is merged. Then we can make use of |
36a0e14 to
90263bf
Compare
pkgs/by-name/au/audit/package.nix
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
After the README updates upstream, i decided its probably best for now to keep the legacy scripts for people that are interested in compliance. I plan to remove them once i figured out a way to log who triggers systemctl commands. Systemd is already aware of who tries to do systemctl stuff, and it knows about audit. I imagine we could just add a piece of code that logs an audit entry whenever someone tries something funny. But that is a project for future me.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actually hold on, the legacy scripts point to /sbin/auditctl, so they never worked to begin with. We should just remove them, seems absolutely no one uses them or there'd have been a bug report about that.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
On a FHS distro, they are also by default in libexec, so I don't know who uses them anyways. I agree, they should be removed and if you really care about this, you should just execute the shutdown yourself with auditctl --signal.
90263bf to
c8bc7de
Compare
pkgs/by-name/au/audit/package.nix
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nit: I don't think this is necessarily the right spot to put this kind of information. Probably better suited for the NixOS manual.
|
It would be awesome if we could add a disallowedRequisites to the + __structuredAttrs = true;
+
+ outputChecks.lib.disallowedRequisites = [
+ bash
+ bashNonInteractive
+ ]; |
|
Commits should be squashed (at least 93e320bc1bffd985bbe33bfa311498f05f7a6dd1 and 8e6df209b2c3ec6c8ca79c4bd0bbce3db3340edd) |
c8bc7de to
c26c07d
Compare
Release notes: https://github.com/linux-audit/audit-userspace/releases/tag/v4.1.1 Unstable patches: - musl support - `--disable-legacy-actions` support - `--runstatedir` support
c26c07d to
025afda
Compare
|
Alright, squashed and explicitly disallowed bash, this should be good then. |
|
Awesome, thank you! |
Release notes: https://github.com/linux-audit/audit-userspace/releases/tag/v4.1.1
The goal is to eventually run the audit-testsuite, which also requires io_uring support.
Things done
passthru.tests.nixpkgs-reviewon this PR. See nixpkgs-review usage../result/bin/.Add a 👍 reaction to pull requests you find important.