···351351352352 new_response="$(ykchalresp -${toString dev.yubikey.slot} -x $new_challenge 2>/dev/null)"
353353354354+ if [ -z "$new_response" ]; then
355355+ echo "Warning: Unable to generate new challenge response, current challenge persists!"
356356+ umount /crypt-storage
357357+ return
358358+ fi
359359+354360 if [ ! -z "$k_user" ]; then
355361 new_k_luks="$(echo -n $k_user | pbkdf2-sha512 ${toString dev.yubikey.keyLength} $new_iterations $new_response | rbtohex)"
356362 else
+7-1
nixos/modules/system/boot/resolved.nix
···6666 };
67676868 services.resolved.dnssec = mkOption {
6969- default = "allow-downgrade";
6969+ default = "false";
7070 example = "true";
7171 type = types.enum [ "true" "allow-downgrade" "false" ];
7272 description = lib.mdDoc ''
···8585 synthesizing a DNS response that suggests DNSSEC was not
8686 supported.
8787 - `"false"`: DNS lookups are not DNSSEC validated.
8888+8989+ At the time of September 2023, systemd upstream advise
9090+ to disable DNSSEC by default as the current code
9191+ is not robust enough to deal with "in the wild" non-compliant
9292+ servers, which will usually give you a broken bad experience
9393+ in addition of insecure.
8894 '';
8995 };
9096
···11-diff --git a/test/lsp.py b/test/lsp.py
22-index 669951ca4..11007ae82 100755
33---- a/test/lsp.py
44-+++ b/test/lsp.py
55-@@ -28,7 +28,8 @@ else:
66- import tty
77- # Turn off user input buffering so we get the input immediately,
88- # not only after a line break
99-- tty.setcbreak(sys.stdin.fileno())
1010-+ if os.isatty(sys.stdin.fileno()):
1111-+ tty.setcbreak(sys.stdin.fileno())
1212-1313-1414- # Type for the pure test name without .sol suffix or sub directory
···11+{ lib
22+, stdenv
33+, buildPythonPackage
44+, fetchPypi
55+, pythonOlder
66+, dbus
77+, pkgsLibpcap
88+, pkg-about
99+, setuptools
1010+, tox
1111+}:
1212+1313+buildPythonPackage rec {
1414+ pname = "libpcap";
1515+ version = "1.11.0b7";
1616+ format = "pyproject";
1717+1818+ disabled = pythonOlder "3.7";
1919+2020+ src = fetchPypi {
2121+ inherit pname version;
2222+ extension = "zip";
2323+ hash = "sha256-gEWFqmeOJTVHdjcSOxfVLZtrNSO3CTY1L2VcXOu7q7k=";
2424+ };
2525+2626+ nativeBuildInputs = [
2727+ setuptools
2828+ tox
2929+ ];
3030+3131+ postPatch = ''
3232+ cat <<EOF >src/libpcap/libpcap.cfg
3333+ [libpcap]
3434+ LIBPCAP = ${pkgsLibpcap}/lib/libpcap${stdenv.hostPlatform.extensions.sharedLibrary}
3535+ EOF
3636+ '';
3737+3838+ propagatedBuildInputs = [
3939+ dbus.lib
4040+ pkgsLibpcap
4141+ pkg-about
4242+ ];
4343+4444+ # Project has tests, but I can't get them to run even outside of nix
4545+ doCheck = false;
4646+4747+ pythonImportsCheck = [
4848+ "libpcap"
4949+ ];
5050+5151+ meta = with lib; {
5252+ description = "Python binding for the libpcap C library";
5353+ longDescription = ''
5454+ Python libpcap module is a low-level binding for libpcap C library.
5555+5656+ It is an effort to allow python programs full access to the API provided by the well known libpcap Unix C library and by its implementations provided under Win32 systems by such packet capture systems as: Npcap, WinPcap
5757+5858+ libpcap is a lightweight Python package, based on the ctypes library.
5959+6060+ It is fully compliant implementation of the original C libpcap from 1.0.0 up to 1.9.0 API and the WinPcap’s 4.1.3 libpcap (1.0.0rel0b) API by implementing whole its functionality in a clean Python instead of C.
6161+ '';
6262+ homepage = "https://github.com/karpierz/libpcap/";
6363+ license = licenses.bsd3;
6464+ maintainers = [ teams.ororatech ];
6565+ };
6666+}