-
-
Notifications
You must be signed in to change notification settings - Fork 15.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
solr: 8.6.3 -> 8.11.1 #161875
solr: 8.6.3 -> 8.11.1 #161875
Conversation
There is quite a lot of CVE fixed since v8.6.3, most recent ones being the Log4shell family of vulns. |
I think doing #120556 (comment) to fix the test would be fine. I think the problem mostly is that nobody who commented is using solr and cares enough but with some additional testing I think merging would be fine. E.g. I personally just triaged the other PR because it fixes security issues but I never used solr. |
I'm not a Solr user either. The maintainer is probably the best person to test and approve this. @aanderse |
I apologize but I don't provide |
At the same time we can mark this with |
The solr update in NixOS#161875 has gone nowhere sofar, while multiple CVEs are lingering, which makes this a prime candidate to mark insecure. The maintainer has indicated they wanted to remove themself, which has not happened yet, so this takes care of that. NixOS#161875 (comment)
If the package is practically broken, we don't need to keep an update PR alive. |
Automatic update generated by nixpkgs-update tools. This update was made based on information from https://repology.org/metapackage/solr/versions.
meta.description for solr is: "Open source enterprise search platform from the Apache Lucene project"
meta.homepage for solr is: "https://lucene.apache.org/solr/"
meta.changelog for solr is: ""
Updates performed
To inspect upstream changes
Impact
Checks done (click to expand)
passthru.tests
did not passRebuild report (if merged into master) (click to expand)
Instructions to test this update (click to expand)
Either download from Cachix:
(The Cachix cache is only trusted for this store-path realization.)
For the Cachix download to work, your user must be in the
trusted-users
list or you can usesudo
since root is effectively trusted.Or, build yourself:
After you've downloaded or built it, look at the files and if there are any, run the binaries:
Pre-merge build results
We have automatically built all packages that will get rebuilt due to
this change.
This gives evidence on whether the upgrade will break dependent packages.
Note sometimes packages show up as failed to build independent of the
change, simply because they are already broken on the target branch.
Result of
nixpkgs-review
run on x86_64-linux 11 package built:
Maintainer pings
cc @aanderse for testing.