Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Automatic update generated by nixpkgs-update tools. This update was made based on information from passthru.updateScript.
meta.description for sipvicious is: " Set of tools to audit SIP based VoIP systems"
meta.homepage for sipvicious is: "https://github.com/EnableSecurity/sipvicious"
meta.changelog for sipvicious is: ""
Updates performed
To inspect upstream changes
Release on GitHub
Compare changes on GitHub
Impact
Checks done (click to expand)
built on NixOS
The tests defined in
passthru.tests
, if any, passed/nix/store/gnb44i1zs0rr4jv34ndlxbxfw4wbvp1n-sipvicious-0.3.3/bin/sipvicious_svcrack passed the binary check.
/nix/store/gnb44i1zs0rr4jv34ndlxbxfw4wbvp1n-sipvicious-0.3.3/bin/sipvicious_svcrash passed the binary check.
/nix/store/gnb44i1zs0rr4jv34ndlxbxfw4wbvp1n-sipvicious-0.3.3/bin/sipvicious_svmap passed the binary check.
/nix/store/gnb44i1zs0rr4jv34ndlxbxfw4wbvp1n-sipvicious-0.3.3/bin/sipvicious_svreport passed the binary check.
/nix/store/gnb44i1zs0rr4jv34ndlxbxfw4wbvp1n-sipvicious-0.3.3/bin/sipvicious_svwar passed the binary check.
/nix/store/gnb44i1zs0rr4jv34ndlxbxfw4wbvp1n-sipvicious-0.3.3/bin/.sipvicious_svcrack-wrapped passed the binary check.
/nix/store/gnb44i1zs0rr4jv34ndlxbxfw4wbvp1n-sipvicious-0.3.3/bin/.sipvicious_svcrash-wrapped passed the binary check.
/nix/store/gnb44i1zs0rr4jv34ndlxbxfw4wbvp1n-sipvicious-0.3.3/bin/.sipvicious_svmap-wrapped passed the binary check.
/nix/store/gnb44i1zs0rr4jv34ndlxbxfw4wbvp1n-sipvicious-0.3.3/bin/.sipvicious_svreport-wrapped passed the binary check.
/nix/store/gnb44i1zs0rr4jv34ndlxbxfw4wbvp1n-sipvicious-0.3.3/bin/.sipvicious_svwar-wrapped passed the binary check.
8 of 10 passed binary check by having a zero exit code.
2 of 10 passed binary check by having the new version present in output.
found 0.3.3 with grep in /nix/store/gnb44i1zs0rr4jv34ndlxbxfw4wbvp1n-sipvicious-0.3.3
found 0.3.3 in filename of file in /nix/store/gnb44i1zs0rr4jv34ndlxbxfw4wbvp1n-sipvicious-0.3.3
directory tree listing: https://gist.github.com/83de0bd557cacf701bf8c375e8b191fc
du listing: https://gist.github.com/259c2c1dbe3186e81cccfb4f0854c64c
Rebuild report (if merged into master) (click to expand)
Instructions to test this update (click to expand)
Either download from Cachix:
(The Cachix cache is only trusted for this store-path realization.)
For the Cachix download to work, your user must be in the
trusted-users
list or you can usesudo
since root is effectively trusted.Or, build yourself:
After you've downloaded or built it, look at the files and if there are any, run the binaries:
Pre-merge build results
We have automatically built all packages that will get rebuilt due to
this change.
This gives evidence on whether the upgrade will break dependent packages.
Note sometimes packages show up as failed to build independent of the
change, simply because they are already broken on the target branch.
Result of
nixpkgs-review
run on x86_64-linux 11 package built:
Maintainer pings
cc @fabaff for testing.