nix: update flake lock
Some checks failed
Test / Create distribution (push) Successful in 26s
Test / Sandbox (push) Successful in 2m23s
Test / Sandbox (race detector) (push) Successful in 3m17s
Test / Fpkg (push) Successful in 4m21s
Test / Fortify (race detector) (push) Failing after 6m16s
Test / Fortify (push) Failing after 2m7s
Test / Flake checks (push) Has been skipped
Some checks failed
Test / Create distribution (push) Successful in 26s
Test / Sandbox (push) Successful in 2m23s
Test / Sandbox (race detector) (push) Successful in 3m17s
Test / Fpkg (push) Successful in 4m21s
Test / Fortify (race detector) (push) Failing after 6m16s
Test / Fortify (push) Failing after 2m7s
Test / Flake checks (push) Has been skipped
Signed-off-by: Ophestra <cat@gensokyo.uk>
This commit is contained in:
parent
6c1205106d
commit
577f20de86
@ -10,7 +10,7 @@ buildGoModule {
|
|||||||
|
|
||||||
src = ./.;
|
src = ./.;
|
||||||
inherit (fortify) vendorHash;
|
inherit (fortify) vendorHash;
|
||||||
CGO_ENABLED = 0;
|
env.CGO_ENABLED = 0;
|
||||||
|
|
||||||
preBuild = ''
|
preBuild = ''
|
||||||
go mod init fsu >& /dev/null
|
go mod init fsu >& /dev/null
|
||||||
|
@ -90,9 +90,9 @@ func testProxyFinaliseStartWaitCloseString(t *testing.T, useSandbox bool) {
|
|||||||
|
|
||||||
t.Run("invalid start", func(t *testing.T) {
|
t.Run("invalid start", func(t *testing.T) {
|
||||||
if !useSandbox {
|
if !useSandbox {
|
||||||
p = dbus.NewDirect(context.TODO(), nil, nil)
|
p = dbus.NewDirect(t.Context(), nil, nil)
|
||||||
} else {
|
} else {
|
||||||
p = dbus.New(context.TODO(), nil, nil)
|
p = dbus.New(t.Context(), nil, nil)
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := p.Start(); !errors.Is(err, syscall.ENOTRECOVERABLE) {
|
if err := p.Start(); !errors.Is(err, syscall.ENOTRECOVERABLE) {
|
||||||
@ -120,7 +120,7 @@ func testProxyFinaliseStartWaitCloseString(t *testing.T, useSandbox bool) {
|
|||||||
}
|
}
|
||||||
})
|
})
|
||||||
|
|
||||||
ctx, cancel := context.WithTimeout(context.TODO(), 5*time.Second)
|
ctx, cancel := context.WithTimeout(t.Context(), 5*time.Second)
|
||||||
defer cancel()
|
defer cancel()
|
||||||
if !useSandbox {
|
if !useSandbox {
|
||||||
p = dbus.NewDirect(ctx, final, nil)
|
p = dbus.NewDirect(ctx, final, nil)
|
||||||
|
16
flake.lock
generated
16
flake.lock
generated
@ -7,32 +7,32 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1746171682,
|
"lastModified": 1748665073,
|
||||||
"narHash": "sha256-EyXUNSa+H+YvGVuQJP1nZskXAowxKYp79RNUsNdQTj4=",
|
"narHash": "sha256-RMhjnPKWtCoIIHiuR9QKD7xfsKb3agxzMfJY8V9MOew=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "home-manager",
|
"repo": "home-manager",
|
||||||
"rev": "50eee705bbdbac942074a8c120e8194185633675",
|
"rev": "282e1e029cb6ab4811114fc85110613d72771dea",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"ref": "release-24.11",
|
"ref": "release-25.05",
|
||||||
"repo": "home-manager",
|
"repo": "home-manager",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"nixpkgs": {
|
"nixpkgs": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1746557022,
|
"lastModified": 1748437600,
|
||||||
"narHash": "sha256-QkNoyEf6TbaTW5UZYX0OkwIJ/ZMeKSSoOMnSDPQuol0=",
|
"narHash": "sha256-hYKMs3ilp09anGO7xzfGs3JqEgUqFMnZ8GMAqI6/k04=",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "1d3aeb5a193b9ff13f63f4d9cc169fb88129f860",
|
"rev": "7282cb574e0607e65224d33be8241eae7cfe0979",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"ref": "nixos-24.11",
|
"ref": "nixos-25.05",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
|
@ -2,10 +2,10 @@
|
|||||||
description = "fortify sandbox tool and nixos module";
|
description = "fortify sandbox tool and nixos module";
|
||||||
|
|
||||||
inputs = {
|
inputs = {
|
||||||
nixpkgs.url = "github:NixOS/nixpkgs/nixos-24.11";
|
nixpkgs.url = "github:NixOS/nixpkgs/nixos-25.05";
|
||||||
|
|
||||||
home-manager = {
|
home-manager = {
|
||||||
url = "github:nix-community/home-manager/release-24.11";
|
url = "github:nix-community/home-manager/release-25.05";
|
||||||
inputs.nixpkgs.follows = "nixpkgs";
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
@ -13,7 +13,7 @@ import (
|
|||||||
|
|
||||||
func TestCmd(t *testing.T) {
|
func TestCmd(t *testing.T) {
|
||||||
t.Run("start non-existent helper path", func(t *testing.T) {
|
t.Run("start non-existent helper path", func(t *testing.T) {
|
||||||
h := helper.NewDirect(context.Background(), "/proc/nonexistent", argsWt, false, argF, nil, nil)
|
h := helper.NewDirect(t.Context(), "/proc/nonexistent", argsWt, false, argF, nil, nil)
|
||||||
|
|
||||||
if err := h.Start(); !errors.Is(err, os.ErrNotExist) {
|
if err := h.Start(); !errors.Is(err, os.ErrNotExist) {
|
||||||
t.Errorf("Start: error = %v, wantErr %v",
|
t.Errorf("Start: error = %v, wantErr %v",
|
||||||
@ -22,7 +22,7 @@ func TestCmd(t *testing.T) {
|
|||||||
})
|
})
|
||||||
|
|
||||||
t.Run("valid new helper nil check", func(t *testing.T) {
|
t.Run("valid new helper nil check", func(t *testing.T) {
|
||||||
if got := helper.NewDirect(context.TODO(), "fortify", argsWt, false, argF, nil, nil); got == nil {
|
if got := helper.NewDirect(t.Context(), "fortify", argsWt, false, argF, nil, nil); got == nil {
|
||||||
t.Errorf("NewDirect(%q, %q) got nil",
|
t.Errorf("NewDirect(%q, %q) got nil",
|
||||||
argsWt, "fortify")
|
argsWt, "fortify")
|
||||||
return
|
return
|
||||||
|
@ -15,7 +15,7 @@ import (
|
|||||||
|
|
||||||
func TestContainer(t *testing.T) {
|
func TestContainer(t *testing.T) {
|
||||||
t.Run("start empty container", func(t *testing.T) {
|
t.Run("start empty container", func(t *testing.T) {
|
||||||
h := helper.New(context.Background(), "/nonexistent", argsWt, false, argF, nil, nil)
|
h := helper.New(t.Context(), "/nonexistent", argsWt, false, argF, nil, nil)
|
||||||
|
|
||||||
wantErr := "sandbox: starting an empty container"
|
wantErr := "sandbox: starting an empty container"
|
||||||
if err := h.Start(); err == nil || err.Error() != wantErr {
|
if err := h.Start(); err == nil || err.Error() != wantErr {
|
||||||
@ -25,7 +25,7 @@ func TestContainer(t *testing.T) {
|
|||||||
})
|
})
|
||||||
|
|
||||||
t.Run("valid new helper nil check", func(t *testing.T) {
|
t.Run("valid new helper nil check", func(t *testing.T) {
|
||||||
if got := helper.New(context.TODO(), "fortify", argsWt, false, argF, nil, nil); got == nil {
|
if got := helper.New(t.Context(), "fortify", argsWt, false, argF, nil, nil); got == nil {
|
||||||
t.Errorf("New(%q, %q) got nil",
|
t.Errorf("New(%q, %q) got nil",
|
||||||
argsWt, "fortify")
|
argsWt, "fortify")
|
||||||
return
|
return
|
||||||
|
@ -55,7 +55,7 @@ func testHelper(t *testing.T, createHelper func(ctx context.Context, setOutput f
|
|||||||
t.Cleanup(func() { helper.WaitDelay = oldWaitDelay })
|
t.Cleanup(func() { helper.WaitDelay = oldWaitDelay })
|
||||||
|
|
||||||
t.Run("start helper with status channel and wait", func(t *testing.T) {
|
t.Run("start helper with status channel and wait", func(t *testing.T) {
|
||||||
ctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)
|
ctx, cancel := context.WithTimeout(t.Context(), 5*time.Second)
|
||||||
stdout := new(strings.Builder)
|
stdout := new(strings.Builder)
|
||||||
h := createHelper(ctx, func(stdoutP, stderrP *io.Writer) { *stdoutP, *stderrP = stdout, os.Stderr }, true)
|
h := createHelper(ctx, func(stdoutP, stderrP *io.Writer) { *stdoutP, *stderrP = stdout, os.Stderr }, true)
|
||||||
|
|
||||||
@ -109,7 +109,7 @@ func testHelper(t *testing.T, createHelper func(ctx context.Context, setOutput f
|
|||||||
})
|
})
|
||||||
|
|
||||||
t.Run("start helper and wait", func(t *testing.T) {
|
t.Run("start helper and wait", func(t *testing.T) {
|
||||||
ctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)
|
ctx, cancel := context.WithTimeout(t.Context(), 5*time.Second)
|
||||||
defer cancel()
|
defer cancel()
|
||||||
stdout := new(strings.Builder)
|
stdout := new(strings.Builder)
|
||||||
h := createHelper(ctx, func(stdoutP, stderrP *io.Writer) { *stdoutP, *stderrP = stdout, os.Stderr }, false)
|
h := createHelper(ctx, func(stdoutP, stderrP *io.Writer) { *stdoutP, *stderrP = stdout, os.Stderr }, false)
|
||||||
|
@ -6,6 +6,4 @@ import (
|
|||||||
"git.gensokyo.uk/security/fortify/internal/state"
|
"git.gensokyo.uk/security/fortify/internal/state"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestMulti(t *testing.T) {
|
func TestMulti(t *testing.T) { testStore(t, state.NewMulti(t.TempDir())) }
|
||||||
testStore(t, state.NewMulti(t.TempDir()))
|
|
||||||
}
|
|
||||||
|
@ -70,7 +70,7 @@ func TestContainer(t *testing.T) {
|
|||||||
|
|
||||||
for _, tc := range testCases {
|
for _, tc := range testCases {
|
||||||
t.Run(tc.name, func(t *testing.T) {
|
t.Run(tc.name, func(t *testing.T) {
|
||||||
ctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)
|
ctx, cancel := context.WithTimeout(t.Context(), 5*time.Second)
|
||||||
defer cancel()
|
defer cancel()
|
||||||
|
|
||||||
container := sandbox.New(ctx, "/usr/bin/sandbox.test", "-test.v",
|
container := sandbox.New(ctx, "/usr/bin/sandbox.test", "-test.v",
|
||||||
@ -162,7 +162,7 @@ func e(root, target, vfsOptstr, fsType, source, fsOptstr string) *vfs.MountInfoE
|
|||||||
}
|
}
|
||||||
|
|
||||||
func TestContainerString(t *testing.T) {
|
func TestContainerString(t *testing.T) {
|
||||||
container := sandbox.New(context.TODO(), "ldd", "/usr/bin/env")
|
container := sandbox.New(t.Context(), "ldd", "/usr/bin/env")
|
||||||
container.Flags |= sandbox.FAllowDevel
|
container.Flags |= sandbox.FAllowDevel
|
||||||
container.Seccomp |= seccomp.FilterMultiarch
|
container.Seccomp |= seccomp.FilterMultiarch
|
||||||
want := `argv: ["ldd" "/usr/bin/env"], flags: 0x2, seccomp: 0x2e`
|
want := `argv: ["ldd" "/usr/bin/env"], flags: 0x2, seccomp: 0x2e`
|
||||||
|
@ -35,6 +35,7 @@
|
|||||||
"NIXOS" = fs "80001ff" null null;
|
"NIXOS" = fs "80001ff" null null;
|
||||||
"X11" = fs "80001ff" null null;
|
"X11" = fs "80001ff" null null;
|
||||||
"alsa" = fs "80001ff" null null;
|
"alsa" = fs "80001ff" null null;
|
||||||
|
"bash_logout" = fs "80001ff" null null;
|
||||||
"bashrc" = fs "80001ff" null null;
|
"bashrc" = fs "80001ff" null null;
|
||||||
"binfmt.d" = fs "80001ff" null null;
|
"binfmt.d" = fs "80001ff" null null;
|
||||||
"dbus-1" = fs "80001ff" null null;
|
"dbus-1" = fs "80001ff" null null;
|
||||||
@ -148,7 +149,15 @@
|
|||||||
} null;
|
} null;
|
||||||
} null;
|
} null;
|
||||||
".local" = fs "800001ed" {
|
".local" = fs "800001ed" {
|
||||||
|
share = fs "800001ed" {
|
||||||
|
dbus-1 = fs "800001ed" {
|
||||||
|
services = fs "800001ed" {
|
||||||
|
"ca.desrt.dconf.service" = fs "80001ff" null null;
|
||||||
|
} null;
|
||||||
|
} null;
|
||||||
|
} null;
|
||||||
state = fs "800001ed" {
|
state = fs "800001ed" {
|
||||||
|
".keep" = fs "80001ff" null "";
|
||||||
home-manager = fs "800001ed" { gcroots = fs "800001ed" { current-home = fs "80001ff" null null; } null; } null;
|
home-manager = fs "800001ed" { gcroots = fs "800001ed" { current-home = fs "80001ff" null null; } null; } null;
|
||||||
nix = fs "800001ed" {
|
nix = fs "800001ed" {
|
||||||
profiles = fs "800001ed" {
|
profiles = fs "800001ed" {
|
||||||
|
@ -59,6 +59,7 @@
|
|||||||
"NIXOS" = fs "80001ff" null null;
|
"NIXOS" = fs "80001ff" null null;
|
||||||
"X11" = fs "80001ff" null null;
|
"X11" = fs "80001ff" null null;
|
||||||
"alsa" = fs "80001ff" null null;
|
"alsa" = fs "80001ff" null null;
|
||||||
|
"bash_logout" = fs "80001ff" null null;
|
||||||
"bashrc" = fs "80001ff" null null;
|
"bashrc" = fs "80001ff" null null;
|
||||||
"binfmt.d" = fs "80001ff" null null;
|
"binfmt.d" = fs "80001ff" null null;
|
||||||
"dbus-1" = fs "80001ff" null null;
|
"dbus-1" = fs "80001ff" null null;
|
||||||
@ -172,7 +173,15 @@
|
|||||||
} null;
|
} null;
|
||||||
} null;
|
} null;
|
||||||
".local" = fs "800001ed" {
|
".local" = fs "800001ed" {
|
||||||
|
share = fs "800001ed" {
|
||||||
|
dbus-1 = fs "800001ed" {
|
||||||
|
services = fs "800001ed" {
|
||||||
|
"ca.desrt.dconf.service" = fs "80001ff" null null;
|
||||||
|
} null;
|
||||||
|
} null;
|
||||||
|
} null;
|
||||||
state = fs "800001ed" {
|
state = fs "800001ed" {
|
||||||
|
".keep" = fs "80001ff" null "";
|
||||||
home-manager = fs "800001ed" { gcroots = fs "800001ed" { current-home = fs "80001ff" null null; } null; } null;
|
home-manager = fs "800001ed" { gcroots = fs "800001ed" { current-home = fs "80001ff" null null; } null; } null;
|
||||||
nix = fs "800001ed" {
|
nix = fs "800001ed" {
|
||||||
profiles = fs "800001ed" {
|
profiles = fs "800001ed" {
|
||||||
|
@ -59,6 +59,7 @@
|
|||||||
"NIXOS" = fs "80001ff" null null;
|
"NIXOS" = fs "80001ff" null null;
|
||||||
"X11" = fs "80001ff" null null;
|
"X11" = fs "80001ff" null null;
|
||||||
"alsa" = fs "80001ff" null null;
|
"alsa" = fs "80001ff" null null;
|
||||||
|
"bash_logout" = fs "80001ff" null null;
|
||||||
"bashrc" = fs "80001ff" null null;
|
"bashrc" = fs "80001ff" null null;
|
||||||
"binfmt.d" = fs "80001ff" null null;
|
"binfmt.d" = fs "80001ff" null null;
|
||||||
"dbus-1" = fs "80001ff" null null;
|
"dbus-1" = fs "80001ff" null null;
|
||||||
@ -172,7 +173,15 @@
|
|||||||
} null;
|
} null;
|
||||||
} null;
|
} null;
|
||||||
".local" = fs "800001ed" {
|
".local" = fs "800001ed" {
|
||||||
|
share = fs "800001ed" {
|
||||||
|
dbus-1 = fs "800001ed" {
|
||||||
|
services = fs "800001ed" {
|
||||||
|
"ca.desrt.dconf.service" = fs "80001ff" null null;
|
||||||
|
} null;
|
||||||
|
} null;
|
||||||
|
} null;
|
||||||
state = fs "800001ed" {
|
state = fs "800001ed" {
|
||||||
|
".keep" = fs "80001ff" null "";
|
||||||
home-manager = fs "800001ed" { gcroots = fs "800001ed" { current-home = fs "80001ff" null null; } null; } null;
|
home-manager = fs "800001ed" { gcroots = fs "800001ed" { current-home = fs "80001ff" null null; } null; } null;
|
||||||
nix = fs "800001ed" {
|
nix = fs "800001ed" {
|
||||||
profiles = fs "800001ed" {
|
profiles = fs "800001ed" {
|
||||||
|
@ -60,6 +60,7 @@
|
|||||||
"NIXOS" = fs "80001ff" null null;
|
"NIXOS" = fs "80001ff" null null;
|
||||||
"X11" = fs "80001ff" null null;
|
"X11" = fs "80001ff" null null;
|
||||||
"alsa" = fs "80001ff" null null;
|
"alsa" = fs "80001ff" null null;
|
||||||
|
"bash_logout" = fs "80001ff" null null;
|
||||||
"bashrc" = fs "80001ff" null null;
|
"bashrc" = fs "80001ff" null null;
|
||||||
"binfmt.d" = fs "80001ff" null null;
|
"binfmt.d" = fs "80001ff" null null;
|
||||||
"dbus-1" = fs "80001ff" null null;
|
"dbus-1" = fs "80001ff" null null;
|
||||||
@ -173,7 +174,15 @@
|
|||||||
} null;
|
} null;
|
||||||
} null;
|
} null;
|
||||||
".local" = fs "800001ed" {
|
".local" = fs "800001ed" {
|
||||||
|
share = fs "800001ed" {
|
||||||
|
dbus-1 = fs "800001ed" {
|
||||||
|
services = fs "800001ed" {
|
||||||
|
"ca.desrt.dconf.service" = fs "80001ff" null null;
|
||||||
|
} null;
|
||||||
|
} null;
|
||||||
|
} null;
|
||||||
state = fs "800001ed" {
|
state = fs "800001ed" {
|
||||||
|
".keep" = fs "80001ff" null "";
|
||||||
home-manager = fs "800001ed" { gcroots = fs "800001ed" { current-home = fs "80001ff" null null; } null; } null;
|
home-manager = fs "800001ed" { gcroots = fs "800001ed" { current-home = fs "80001ff" null null; } null; } null;
|
||||||
nix = fs "800001ed" {
|
nix = fs "800001ed" {
|
||||||
profiles = fs "800001ed" {
|
profiles = fs "800001ed" {
|
||||||
|
Loading…
x
Reference in New Issue
Block a user