mirror of
https://github.com/NixOS/nixpkgs.git
synced 2025-02-08 05:03:40 +00:00
Merge staging-next into staging
This commit is contained in:
commit
aef671963d
@ -43,14 +43,6 @@ Note: Assigning either role will also default both
|
|||||||
and [](#opt-services.kubernetes.easyCerts)
|
and [](#opt-services.kubernetes.easyCerts)
|
||||||
to true. This sets up flannel as CNI and activates automatic PKI bootstrapping.
|
to true. This sets up flannel as CNI and activates automatic PKI bootstrapping.
|
||||||
|
|
||||||
As of kubernetes 1.10.X it has been deprecated to open non-tls-enabled
|
|
||||||
ports on kubernetes components. Thus, from NixOS 19.03 all plain HTTP
|
|
||||||
ports have been disabled by default. While opening insecure ports is
|
|
||||||
still possible, it is recommended not to bind these to other interfaces
|
|
||||||
than loopback. To re-enable the insecure port on the apiserver, see options:
|
|
||||||
[](#opt-services.kubernetes.apiserver.insecurePort) and
|
|
||||||
[](#opt-services.kubernetes.apiserver.insecureBindAddress)
|
|
||||||
|
|
||||||
::: {.note}
|
::: {.note}
|
||||||
As of NixOS 19.03, it is mandatory to configure:
|
As of NixOS 19.03, it is mandatory to configure:
|
||||||
[](#opt-services.kubernetes.masterAddress).
|
[](#opt-services.kubernetes.masterAddress).
|
||||||
|
@ -47,17 +47,6 @@ services.kubernetes.roles = [ "master" "node" ];
|
|||||||
<xref linkend="opt-services.kubernetes.easyCerts" /> to true. This
|
<xref linkend="opt-services.kubernetes.easyCerts" /> to true. This
|
||||||
sets up flannel as CNI and activates automatic PKI bootstrapping.
|
sets up flannel as CNI and activates automatic PKI bootstrapping.
|
||||||
</para>
|
</para>
|
||||||
<para>
|
|
||||||
As of kubernetes 1.10.X it has been deprecated to open
|
|
||||||
non-tls-enabled ports on kubernetes components. Thus, from NixOS
|
|
||||||
19.03 all plain HTTP ports have been disabled by default. While
|
|
||||||
opening insecure ports is still possible, it is recommended not to
|
|
||||||
bind these to other interfaces than loopback. To re-enable the
|
|
||||||
insecure port on the apiserver, see options:
|
|
||||||
<xref linkend="opt-services.kubernetes.apiserver.insecurePort" />
|
|
||||||
and
|
|
||||||
<xref linkend="opt-services.kubernetes.apiserver.insecureBindAddress" />
|
|
||||||
</para>
|
|
||||||
<note>
|
<note>
|
||||||
<para>
|
<para>
|
||||||
As of NixOS 19.03, it is mandatory to configure:
|
As of NixOS 19.03, it is mandatory to configure:
|
||||||
|
@ -18,7 +18,8 @@ in
|
|||||||
imports = [
|
imports = [
|
||||||
(mkRenamedOptionModule [ "services" "kubernetes" "apiserver" "admissionControl" ] [ "services" "kubernetes" "apiserver" "enableAdmissionPlugins" ])
|
(mkRenamedOptionModule [ "services" "kubernetes" "apiserver" "admissionControl" ] [ "services" "kubernetes" "apiserver" "enableAdmissionPlugins" ])
|
||||||
(mkRenamedOptionModule [ "services" "kubernetes" "apiserver" "address" ] ["services" "kubernetes" "apiserver" "bindAddress"])
|
(mkRenamedOptionModule [ "services" "kubernetes" "apiserver" "address" ] ["services" "kubernetes" "apiserver" "bindAddress"])
|
||||||
(mkRenamedOptionModule [ "services" "kubernetes" "apiserver" "port" ] ["services" "kubernetes" "apiserver" "insecurePort"])
|
(mkRemovedOptionModule [ "services" "kubernetes" "apiserver" "insecureBindAddress" ] "")
|
||||||
|
(mkRemovedOptionModule [ "services" "kubernetes" "apiserver" "insecurePort" ] "")
|
||||||
(mkRemovedOptionModule [ "services" "kubernetes" "apiserver" "publicAddress" ] "")
|
(mkRemovedOptionModule [ "services" "kubernetes" "apiserver" "publicAddress" ] "")
|
||||||
(mkRenamedOptionModule [ "services" "kubernetes" "etcd" "servers" ] [ "services" "kubernetes" "apiserver" "etcd" "servers" ])
|
(mkRenamedOptionModule [ "services" "kubernetes" "etcd" "servers" ] [ "services" "kubernetes" "apiserver" "etcd" "servers" ])
|
||||||
(mkRenamedOptionModule [ "services" "kubernetes" "etcd" "keyFile" ] [ "services" "kubernetes" "apiserver" "etcd" "keyFile" ])
|
(mkRenamedOptionModule [ "services" "kubernetes" "etcd" "keyFile" ] [ "services" "kubernetes" "apiserver" "etcd" "keyFile" ])
|
||||||
@ -164,18 +165,6 @@ in
|
|||||||
type = listOf str;
|
type = listOf str;
|
||||||
};
|
};
|
||||||
|
|
||||||
insecureBindAddress = mkOption {
|
|
||||||
description = lib.mdDoc "The IP address on which to serve the --insecure-port.";
|
|
||||||
default = "127.0.0.1";
|
|
||||||
type = str;
|
|
||||||
};
|
|
||||||
|
|
||||||
insecurePort = mkOption {
|
|
||||||
description = lib.mdDoc "Kubernetes apiserver insecure listening port. (0 = disabled)";
|
|
||||||
default = 0;
|
|
||||||
type = int;
|
|
||||||
};
|
|
||||||
|
|
||||||
kubeletClientCaFile = mkOption {
|
kubeletClientCaFile = mkOption {
|
||||||
description = lib.mdDoc "Path to a cert file for connecting to kubelet.";
|
description = lib.mdDoc "Path to a cert file for connecting to kubelet.";
|
||||||
default = top.caFile;
|
default = top.caFile;
|
||||||
@ -376,8 +365,6 @@ in
|
|||||||
"--proxy-client-cert-file=${cfg.proxyClientCertFile}"} \
|
"--proxy-client-cert-file=${cfg.proxyClientCertFile}"} \
|
||||||
${optionalString (cfg.proxyClientKeyFile != null)
|
${optionalString (cfg.proxyClientKeyFile != null)
|
||||||
"--proxy-client-key-file=${cfg.proxyClientKeyFile}"} \
|
"--proxy-client-key-file=${cfg.proxyClientKeyFile}"} \
|
||||||
--insecure-bind-address=${cfg.insecureBindAddress} \
|
|
||||||
--insecure-port=${toString cfg.insecurePort} \
|
|
||||||
${optionalString (cfg.runtimeConfig != "")
|
${optionalString (cfg.runtimeConfig != "")
|
||||||
"--runtime-config=${cfg.runtimeConfig}"} \
|
"--runtime-config=${cfg.runtimeConfig}"} \
|
||||||
--secure-port=${toString cfg.securePort} \
|
--secure-port=${toString cfg.securePort} \
|
||||||
|
@ -10,7 +10,7 @@ in
|
|||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
(mkRenamedOptionModule [ "services" "kubernetes" "controllerManager" "address" ] ["services" "kubernetes" "controllerManager" "bindAddress"])
|
(mkRenamedOptionModule [ "services" "kubernetes" "controllerManager" "address" ] ["services" "kubernetes" "controllerManager" "bindAddress"])
|
||||||
(mkRenamedOptionModule [ "services" "kubernetes" "controllerManager" "port" ] ["services" "kubernetes" "controllerManager" "insecurePort"])
|
(mkRemovedOptionModule [ "services" "kubernetes" "controllerManager" "insecurePort" ] "")
|
||||||
];
|
];
|
||||||
|
|
||||||
###### interface
|
###### interface
|
||||||
@ -50,12 +50,6 @@ in
|
|||||||
type = listOf str;
|
type = listOf str;
|
||||||
};
|
};
|
||||||
|
|
||||||
insecurePort = mkOption {
|
|
||||||
description = lib.mdDoc "Kubernetes controller manager insecure listening port.";
|
|
||||||
default = 0;
|
|
||||||
type = int;
|
|
||||||
};
|
|
||||||
|
|
||||||
kubeconfig = top.lib.mkKubeConfigOptions "Kubernetes controller manager";
|
kubeconfig = top.lib.mkKubeConfigOptions "Kubernetes controller manager";
|
||||||
|
|
||||||
leaderElect = mkOption {
|
leaderElect = mkOption {
|
||||||
@ -133,7 +127,6 @@ in
|
|||||||
--leader-elect=${boolToString cfg.leaderElect} \
|
--leader-elect=${boolToString cfg.leaderElect} \
|
||||||
${optionalString (cfg.rootCaFile!=null)
|
${optionalString (cfg.rootCaFile!=null)
|
||||||
"--root-ca-file=${cfg.rootCaFile}"} \
|
"--root-ca-file=${cfg.rootCaFile}"} \
|
||||||
--port=${toString cfg.insecurePort} \
|
|
||||||
--secure-port=${toString cfg.securePort} \
|
--secure-port=${toString cfg.securePort} \
|
||||||
${optionalString (cfg.serviceAccountKeyFile!=null)
|
${optionalString (cfg.serviceAccountKeyFile!=null)
|
||||||
"--service-account-private-key-file=${cfg.serviceAccountKeyFile}"} \
|
"--service-account-private-key-file=${cfg.serviceAccountKeyFile}"} \
|
||||||
|
@ -26,7 +26,6 @@ in
|
|||||||
};
|
};
|
||||||
|
|
||||||
services.kubernetes.kubelet = {
|
services.kubernetes.kubelet = {
|
||||||
networkPlugin = mkDefault "cni";
|
|
||||||
cni.config = mkDefault [{
|
cni.config = mkDefault [{
|
||||||
name = "mynet";
|
name = "mynet";
|
||||||
type = "flannel";
|
type = "flannel";
|
||||||
|
@ -62,6 +62,7 @@ in
|
|||||||
(mkRemovedOptionModule [ "services" "kubernetes" "kubelet" "applyManifests" ] "")
|
(mkRemovedOptionModule [ "services" "kubernetes" "kubelet" "applyManifests" ] "")
|
||||||
(mkRemovedOptionModule [ "services" "kubernetes" "kubelet" "cadvisorPort" ] "")
|
(mkRemovedOptionModule [ "services" "kubernetes" "kubelet" "cadvisorPort" ] "")
|
||||||
(mkRemovedOptionModule [ "services" "kubernetes" "kubelet" "allowPrivileged" ] "")
|
(mkRemovedOptionModule [ "services" "kubernetes" "kubelet" "allowPrivileged" ] "")
|
||||||
|
(mkRemovedOptionModule [ "services" "kubernetes" "kubelet" "networkPlugin" ] "")
|
||||||
];
|
];
|
||||||
|
|
||||||
###### interface
|
###### interface
|
||||||
@ -189,12 +190,6 @@ in
|
|||||||
default = {};
|
default = {};
|
||||||
};
|
};
|
||||||
|
|
||||||
networkPlugin = mkOption {
|
|
||||||
description = lib.mdDoc "Network plugin to use by Kubernetes.";
|
|
||||||
type = nullOr (enum ["cni" "kubenet"]);
|
|
||||||
default = "kubenet";
|
|
||||||
};
|
|
||||||
|
|
||||||
nodeIp = mkOption {
|
nodeIp = mkOption {
|
||||||
description = lib.mdDoc "IP address of the node. If set, kubelet will use this IP address for the node.";
|
description = lib.mdDoc "IP address of the node. If set, kubelet will use this IP address for the node.";
|
||||||
default = null;
|
default = null;
|
||||||
@ -315,7 +310,6 @@ in
|
|||||||
"--cluster-dns=${cfg.clusterDns}"} \
|
"--cluster-dns=${cfg.clusterDns}"} \
|
||||||
${optionalString (cfg.clusterDomain != "")
|
${optionalString (cfg.clusterDomain != "")
|
||||||
"--cluster-domain=${cfg.clusterDomain}"} \
|
"--cluster-domain=${cfg.clusterDomain}"} \
|
||||||
--cni-conf-dir=${cniConfig} \
|
|
||||||
${optionalString (cfg.featureGates != [])
|
${optionalString (cfg.featureGates != [])
|
||||||
"--feature-gates=${concatMapStringsSep "," (feature: "${feature}=true") cfg.featureGates}"} \
|
"--feature-gates=${concatMapStringsSep "," (feature: "${feature}=true") cfg.featureGates}"} \
|
||||||
--hairpin-mode=hairpin-veth \
|
--hairpin-mode=hairpin-veth \
|
||||||
@ -323,8 +317,6 @@ in
|
|||||||
--healthz-port=${toString cfg.healthz.port} \
|
--healthz-port=${toString cfg.healthz.port} \
|
||||||
--hostname-override=${cfg.hostname} \
|
--hostname-override=${cfg.hostname} \
|
||||||
--kubeconfig=${kubeconfig} \
|
--kubeconfig=${kubeconfig} \
|
||||||
${optionalString (cfg.networkPlugin != null)
|
|
||||||
"--network-plugin=${cfg.networkPlugin}"} \
|
|
||||||
${optionalString (cfg.nodeIp != null)
|
${optionalString (cfg.nodeIp != null)
|
||||||
"--node-ip=${cfg.nodeIp}"} \
|
"--node-ip=${cfg.nodeIp}"} \
|
||||||
--pod-infra-container-image=pause \
|
--pod-infra-container-image=pause \
|
||||||
|
@ -43,7 +43,7 @@ let
|
|||||||
trustedInterfaces = ["mynet"];
|
trustedInterfaces = ["mynet"];
|
||||||
|
|
||||||
extraCommands = concatMapStrings (node: ''
|
extraCommands = concatMapStrings (node: ''
|
||||||
iptables -A INPUT -s ${node.config.networking.primaryIPAddress} -j ACCEPT
|
iptables -A INPUT -s ${node.networking.primaryIPAddress} -j ACCEPT
|
||||||
'') (attrValues nodes);
|
'') (attrValues nodes);
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
@ -10,14 +10,14 @@
|
|||||||
|
|
||||||
python3Packages.buildPythonPackage rec {
|
python3Packages.buildPythonPackage rec {
|
||||||
pname = "hydrus";
|
pname = "hydrus";
|
||||||
version = "502";
|
version = "502a";
|
||||||
format = "other";
|
format = "other";
|
||||||
|
|
||||||
src = fetchFromGitHub {
|
src = fetchFromGitHub {
|
||||||
owner = "hydrusnetwork";
|
owner = "hydrusnetwork";
|
||||||
repo = "hydrus";
|
repo = "hydrus";
|
||||||
rev = "refs/tags/v${version}";
|
rev = "refs/tags/v${version}";
|
||||||
sha256 = "sha256-f3VnPmrRdo4PLQvS5pUafOh6ppq4hiwolz/FVVBNgxI=";
|
sha256 = "sha256-GmYjf2r5dyxkPWTmypChKbkeifCMFKi1lzRhPNe7Ckw=";
|
||||||
};
|
};
|
||||||
|
|
||||||
nativeBuildInputs = [
|
nativeBuildInputs = [
|
||||||
@ -30,6 +30,7 @@ python3Packages.buildPythonPackage rec {
|
|||||||
cbor2
|
cbor2
|
||||||
chardet
|
chardet
|
||||||
cloudscraper
|
cloudscraper
|
||||||
|
dateutil
|
||||||
html5lib
|
html5lib
|
||||||
lxml
|
lxml
|
||||||
lz4
|
lz4
|
||||||
|
@ -21,13 +21,13 @@
|
|||||||
|
|
||||||
buildGoModule rec {
|
buildGoModule rec {
|
||||||
pname = "kubernetes";
|
pname = "kubernetes";
|
||||||
version = "1.23.13";
|
version = "1.25.3";
|
||||||
|
|
||||||
src = fetchFromGitHub {
|
src = fetchFromGitHub {
|
||||||
owner = "kubernetes";
|
owner = "kubernetes";
|
||||||
repo = "kubernetes";
|
repo = "kubernetes";
|
||||||
rev = "v${version}";
|
rev = "v${version}";
|
||||||
sha256 = "sha256-Te31+geLT2hzyDfSGkCoXS0pXC1gbIJmpfC0DNDecAI=";
|
sha256 = "sha256-UDulyX1PXyAe4cqtekOY1nmQnmMqVLFuHnCswFfE6v0=";
|
||||||
};
|
};
|
||||||
|
|
||||||
vendorSha256 = null;
|
vendorSha256 = null;
|
||||||
|
@ -48,13 +48,13 @@
|
|||||||
"version": "2.4.2"
|
"version": "2.4.2"
|
||||||
},
|
},
|
||||||
"alicloud": {
|
"alicloud": {
|
||||||
"hash": "sha256-lJsCXLSIbb/jLjNsvU0GFljlrKBR2TDDOGXDhBTaIKI=",
|
"hash": "sha256-k5WZpqZvoL4R1kQ0CBWK8JLkWCvfpkl1b849ZbJsPxw=",
|
||||||
"owner": "aliyun",
|
"owner": "aliyun",
|
||||||
"provider-source-address": "registry.terraform.io/aliyun/alicloud",
|
"provider-source-address": "registry.terraform.io/aliyun/alicloud",
|
||||||
"repo": "terraform-provider-alicloud",
|
"repo": "terraform-provider-alicloud",
|
||||||
"rev": "v1.187.0",
|
"rev": "v1.188.0",
|
||||||
"vendorHash": null,
|
"vendorHash": null,
|
||||||
"version": "1.187.0"
|
"version": "1.188.0"
|
||||||
},
|
},
|
||||||
"ansible": {
|
"ansible": {
|
||||||
"hash": "sha256-3nha5V4rNgVzgqliebmbC5e12Lj/zlCsyyiIVFlmUrY=",
|
"hash": "sha256-3nha5V4rNgVzgqliebmbC5e12Lj/zlCsyyiIVFlmUrY=",
|
||||||
@ -515,13 +515,13 @@
|
|||||||
"version": "5.1.5"
|
"version": "5.1.5"
|
||||||
},
|
},
|
||||||
"hetznerdns": {
|
"hetznerdns": {
|
||||||
"hash": "sha256-QmD9UlQpyvEz4in1I960J0eC6xNtgk5z8tZUxaApOwE=",
|
"hash": "sha256-wmXZ6+5Ex3G2JUdw2is2VIo/X1X0V1Auw5KmYpGllug=",
|
||||||
"owner": "timohirt",
|
"owner": "timohirt",
|
||||||
"provider-source-address": "registry.terraform.io/timohirt/hetznerdns",
|
"provider-source-address": "registry.terraform.io/timohirt/hetznerdns",
|
||||||
"repo": "terraform-provider-hetznerdns",
|
"repo": "terraform-provider-hetznerdns",
|
||||||
"rev": "v2.1.0",
|
"rev": "v2.2.0",
|
||||||
"vendorHash": "sha256-Bat/S4e5vzT0/XOhJ9zCWLa4IE4owLC6ec1yvEh+c0Y=",
|
"vendorHash": "sha256-Bat/S4e5vzT0/XOhJ9zCWLa4IE4owLC6ec1yvEh+c0Y=",
|
||||||
"version": "2.1.0"
|
"version": "2.2.0"
|
||||||
},
|
},
|
||||||
"htpasswd": {
|
"htpasswd": {
|
||||||
"hash": "sha256-3Az8iNoau+2KGkdDjR+QAfuEcEhKfRmZFb5f4kaFyoU=",
|
"hash": "sha256-3Az8iNoau+2KGkdDjR+QAfuEcEhKfRmZFb5f4kaFyoU=",
|
||||||
@ -543,13 +543,13 @@
|
|||||||
"version": "3.1.0"
|
"version": "3.1.0"
|
||||||
},
|
},
|
||||||
"huaweicloud": {
|
"huaweicloud": {
|
||||||
"hash": "sha256-Hr60bx3fGpfSxQAwGckhmZ80Iw/bPKLNDXeVXV1GTdo=",
|
"hash": "sha256-QBRnlBR+gPMy9gtM2P93Lot4GDW94z7B4BgYs+lT5IQ=",
|
||||||
"owner": "huaweicloud",
|
"owner": "huaweicloud",
|
||||||
"provider-source-address": "registry.terraform.io/huaweicloud/huaweicloud",
|
"provider-source-address": "registry.terraform.io/huaweicloud/huaweicloud",
|
||||||
"repo": "terraform-provider-huaweicloud",
|
"repo": "terraform-provider-huaweicloud",
|
||||||
"rev": "v1.41.0",
|
"rev": "v1.41.1",
|
||||||
"vendorHash": null,
|
"vendorHash": null,
|
||||||
"version": "1.41.0"
|
"version": "1.41.1"
|
||||||
},
|
},
|
||||||
"huaweicloudstack": {
|
"huaweicloudstack": {
|
||||||
"hash": "sha256-WSJDp+LFjVPquQVMgib/YZV35kktLH2vMCIZJWqakXs=",
|
"hash": "sha256-WSJDp+LFjVPquQVMgib/YZV35kktLH2vMCIZJWqakXs=",
|
||||||
@ -741,13 +741,13 @@
|
|||||||
"version": "3.3.0"
|
"version": "3.3.0"
|
||||||
},
|
},
|
||||||
"minio": {
|
"minio": {
|
||||||
"hash": "sha256-57wks4TYv7+kUPEhlj8V/X1fQ0/J/kbsuFQFlPxXwns=",
|
"hash": "sha256-9EpVDRX5rPJ1TIlC+gI79AC442cBzWq76ebFLKPbwmc=",
|
||||||
"owner": "aminueza",
|
"owner": "aminueza",
|
||||||
"provider-source-address": "registry.terraform.io/aminueza/minio",
|
"provider-source-address": "registry.terraform.io/aminueza/minio",
|
||||||
"repo": "terraform-provider-minio",
|
"repo": "terraform-provider-minio",
|
||||||
"rev": "v1.6.0",
|
"rev": "v1.7.0",
|
||||||
"vendorHash": "sha256-0pWW7CDVwVombuKqAwzmkJmLpB1RCuV2SEoQnWppA1M=",
|
"vendorHash": "sha256-DDP/YAZ5CVcQWxG6+RTw8ihrk9wADAckpWx2x1I0MDE=",
|
||||||
"version": "1.6.0"
|
"version": "1.7.0"
|
||||||
},
|
},
|
||||||
"mongodbatlas": {
|
"mongodbatlas": {
|
||||||
"hash": "sha256-NVbUKSG5rGUtRlaJVND3nW+0Svc2d8R8uvxGKcQktco=",
|
"hash": "sha256-NVbUKSG5rGUtRlaJVND3nW+0Svc2d8R8uvxGKcQktco=",
|
||||||
@ -1093,13 +1093,13 @@
|
|||||||
"version": "1.4.0"
|
"version": "1.4.0"
|
||||||
},
|
},
|
||||||
"statuscake": {
|
"statuscake": {
|
||||||
"hash": "sha256-wpDe+mtFh96qIbtfg+uilklvFNftQxqF9DOuudKLMm0=",
|
"hash": "sha256-rT+NJBPA73WCctlZnu0i952fzrGCxVF2vIIvE0SzvNI=",
|
||||||
"owner": "StatusCakeDev",
|
"owner": "StatusCakeDev",
|
||||||
"provider-source-address": "registry.terraform.io/StatusCakeDev/statuscake",
|
"provider-source-address": "registry.terraform.io/StatusCakeDev/statuscake",
|
||||||
"repo": "terraform-provider-statuscake",
|
"repo": "terraform-provider-statuscake",
|
||||||
"rev": "v2.0.4",
|
"rev": "v2.0.5",
|
||||||
"vendorHash": "sha256-FxTGEeJkElMovd6VGUEGss0gjorZPSPc+whqeHe4s2Y=",
|
"vendorHash": "sha256-wPNMrHFCUn1AScxTwgRXHSGrs+6Ebm4c+cS5EwHUeUU=",
|
||||||
"version": "2.0.4"
|
"version": "2.0.5"
|
||||||
},
|
},
|
||||||
"sumologic": {
|
"sumologic": {
|
||||||
"hash": "sha256-DvEd1OdLmUEEmk0zl7jiTjdk/3Fp1Z/3KCpYRpxHTn4=",
|
"hash": "sha256-DvEd1OdLmUEEmk0zl7jiTjdk/3Fp1Z/3KCpYRpxHTn4=",
|
||||||
|
@ -9,7 +9,6 @@
|
|||||||
, file
|
, file
|
||||||
, freetype
|
, freetype
|
||||||
, fontconfig
|
, fontconfig
|
||||||
, xlibsWrapper
|
|
||||||
, alsa-lib
|
, alsa-lib
|
||||||
, libXrender
|
, libXrender
|
||||||
}:
|
}:
|
||||||
@ -35,7 +34,6 @@ stdenv.mkDerivation rec {
|
|||||||
xorg.xorgproto
|
xorg.xorgproto
|
||||||
freetype
|
freetype
|
||||||
fontconfig
|
fontconfig
|
||||||
xlibsWrapper
|
|
||||||
alsa-lib
|
alsa-lib
|
||||||
libXrender
|
libXrender
|
||||||
];
|
];
|
||||||
|
@ -1,33 +1,51 @@
|
|||||||
{ stdenv, lib, fetchFromGitLab, autoconf, gtk-doc, automake, libtool, pkg-config, glib, libsoup, gobject-introspection }:
|
{ stdenv
|
||||||
|
, lib
|
||||||
|
, fetchFromGitLab
|
||||||
|
, meson
|
||||||
|
, ninja
|
||||||
|
, pkg-config
|
||||||
|
, gobject-introspection
|
||||||
|
, vala
|
||||||
|
, gtk-doc
|
||||||
|
, docbook-xsl-nons
|
||||||
|
, glib
|
||||||
|
, libsoup
|
||||||
|
}:
|
||||||
|
|
||||||
stdenv.mkDerivation rec {
|
stdenv.mkDerivation rec {
|
||||||
version="0.5.0";
|
|
||||||
pname = "uhttpmock";
|
pname = "uhttpmock";
|
||||||
|
version = "0.5.5";
|
||||||
|
|
||||||
|
outputs = [ "out" "dev" "devdoc" ];
|
||||||
|
|
||||||
src = fetchFromGitLab {
|
src = fetchFromGitLab {
|
||||||
|
domain = "gitlab.freedesktop.org";
|
||||||
|
owner = "pwithnall";
|
||||||
repo = "uhttpmock";
|
repo = "uhttpmock";
|
||||||
owner = "uhttpmock";
|
|
||||||
rev = version;
|
rev = version;
|
||||||
sha256 = "0kkf670abkq5ikm3mqls475lydfsd9by1kv5im4k757xrl1br1d4";
|
sha256 = "NuxiVVowZ8ilP9rcgapCe9OzFCpoOfZxZiSyjTeOrts=";
|
||||||
};
|
};
|
||||||
|
|
||||||
nativeBuildInputs = [ pkg-config autoconf automake gtk-doc libtool gobject-introspection ];
|
nativeBuildInputs = [
|
||||||
buildInputs = [ glib libsoup ];
|
meson
|
||||||
|
ninja
|
||||||
|
pkg-config
|
||||||
|
gobject-introspection
|
||||||
|
vala
|
||||||
|
gtk-doc
|
||||||
|
docbook-xsl-nons
|
||||||
|
];
|
||||||
|
|
||||||
preConfigure = "NOCONFIGURE=1 ./autogen.sh";
|
buildInputs = [
|
||||||
|
glib
|
||||||
# while cross
|
libsoup
|
||||||
# /build/source/tmp-introspect3xf43lf3/.libs/Uhm-0.0: error while loading shared libraries: libuhttpmock-0.0.so.0: cannot open shared object file: No such file or directory
|
];
|
||||||
preBuild = ''
|
|
||||||
mkdir -p ${placeholder "out"}/lib
|
|
||||||
ln -s $PWD/libuhttpmock/.libs/libuhttpmock-0.0.so.0 ${placeholder "out"}/lib/libuhttpmock-0.0.so.0
|
|
||||||
'';
|
|
||||||
|
|
||||||
meta = with lib; {
|
meta = with lib; {
|
||||||
description = "Project for mocking web service APIs which use HTTP or HTTPS";
|
description = "Project for mocking web service APIs which use HTTP or HTTPS";
|
||||||
homepage = "https://gitlab.com/groups/uhttpmock/";
|
homepage = "https://gitlab.freedesktop.org/pwithnall/uhttpmock/";
|
||||||
license = licenses.lgpl21;
|
license = licenses.lgpl21Plus;
|
||||||
maintainers = with maintainers; [ ];
|
maintainers = with maintainers; [ ];
|
||||||
platforms = with platforms; linux;
|
platforms = platforms.linux;
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@ -12,7 +12,7 @@
|
|||||||
|
|
||||||
buildPythonPackage rec {
|
buildPythonPackage rec {
|
||||||
pname = "gcal-sync";
|
pname = "gcal-sync";
|
||||||
version = "0.11.0";
|
version = "1.0.0";
|
||||||
|
|
||||||
disabled = pythonOlder "3.9";
|
disabled = pythonOlder "3.9";
|
||||||
|
|
||||||
@ -20,7 +20,7 @@ buildPythonPackage rec {
|
|||||||
owner = "allenporter";
|
owner = "allenporter";
|
||||||
repo = "gcal_sync";
|
repo = "gcal_sync";
|
||||||
rev = "refs/tags/${version}";
|
rev = "refs/tags/${version}";
|
||||||
hash = "sha256-7eaAgGVPzBc2A57VAlLZvz+SYl8G7hv2iCDAOh8Gmoc=";
|
hash = "sha256-zBWYhCzQDpjlEP1CzimcXpEaNbMCbZTWWyWC+JNZENU=";
|
||||||
};
|
};
|
||||||
|
|
||||||
propagatedBuildInputs = [
|
propagatedBuildInputs = [
|
||||||
|
@ -14,7 +14,7 @@
|
|||||||
|
|
||||||
buildPythonPackage rec {
|
buildPythonPackage rec {
|
||||||
pname = "globus-sdk";
|
pname = "globus-sdk";
|
||||||
version = "3.12.0";
|
version = "3.13.0";
|
||||||
format = "setuptools";
|
format = "setuptools";
|
||||||
|
|
||||||
disabled = pythonOlder "3.6";
|
disabled = pythonOlder "3.6";
|
||||||
@ -23,7 +23,7 @@ buildPythonPackage rec {
|
|||||||
owner = "globus";
|
owner = "globus";
|
||||||
repo = "globus-sdk-python";
|
repo = "globus-sdk-python";
|
||||||
rev = "refs/tags/${version}";
|
rev = "refs/tags/${version}";
|
||||||
hash = "sha256-p5GsJRoOG1vV3+efHDUFdIkfXe75HvjI3h5mveFak/M=";
|
hash = "sha256-d8c/kMfDMz5Z9O7OtAz2hAXQHqTlJ8oKcL9Yk+6MsA4=";
|
||||||
};
|
};
|
||||||
|
|
||||||
propagatedBuildInputs = [
|
propagatedBuildInputs = [
|
||||||
|
@ -15,14 +15,14 @@
|
|||||||
|
|
||||||
buildPythonPackage rec {
|
buildPythonPackage rec {
|
||||||
pname = "google-cloud-pubsub";
|
pname = "google-cloud-pubsub";
|
||||||
version = "2.13.9";
|
version = "2.13.10";
|
||||||
format = "setuptools";
|
format = "setuptools";
|
||||||
|
|
||||||
disabled = pythonOlder "3.7";
|
disabled = pythonOlder "3.7";
|
||||||
|
|
||||||
src = fetchPypi {
|
src = fetchPypi {
|
||||||
inherit pname version;
|
inherit pname version;
|
||||||
hash = "sha256-5hD6Pi55OviEF0szcDu6j6ME4gOcr+8dBdBW4ohJzIE=";
|
hash = "sha256-PnRqGpfJa9xj/FSZUp7XJi8UZPbejIuuYjjBIgCRmsA=";
|
||||||
};
|
};
|
||||||
|
|
||||||
propagatedBuildInputs = [
|
propagatedBuildInputs = [
|
||||||
|
@ -17,16 +17,18 @@
|
|||||||
stdenv.mkDerivation (finalAttrs: {
|
stdenv.mkDerivation (finalAttrs: {
|
||||||
pname = "muon"
|
pname = "muon"
|
||||||
+ lib.optionalString embedSamurai "-embedded-samurai";
|
+ lib.optionalString embedSamurai "-embedded-samurai";
|
||||||
version = "unstable-2022-09-24";
|
version = "0.1.0";
|
||||||
|
|
||||||
src = fetchFromSourcehut {
|
src = fetchFromSourcehut {
|
||||||
name = "muon-src";
|
name = "muon-src";
|
||||||
owner = "~lattis";
|
owner = "~lattis";
|
||||||
repo = "muon";
|
repo = "muon";
|
||||||
rev = "f385c82a6104ea3341ca34756e2812d700bc43d8";
|
rev = finalAttrs.version;
|
||||||
hash = "sha256-Cr1r/sp6iVotU+n4bTzQiQl8Y+ShaqnnaWjL6gRW8p0=";
|
hash = "sha256-m382/Y+qOYk7hHdDdOpiYWNWrqpnWPCG4AKGGkmLt4o=";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
outputs = [ "out" ] ++ lib.optionals buildDocs [ "man" ];
|
||||||
|
|
||||||
nativeBuildInputs = [
|
nativeBuildInputs = [
|
||||||
pkgconf
|
pkgconf
|
||||||
samurai
|
samurai
|
||||||
@ -50,8 +52,8 @@ stdenv.mkDerivation (finalAttrs: {
|
|||||||
# URLs manually extracted from subprojects directory
|
# URLs manually extracted from subprojects directory
|
||||||
meson-docs-wrap = fetchurl {
|
meson-docs-wrap = fetchurl {
|
||||||
name = "meson-docs-wrap";
|
name = "meson-docs-wrap";
|
||||||
url = "https://mochiro.moe/wrap/meson-docs-0.63.0-116-g8a45c81cf.tar.gz";
|
url = "https://mochiro.moe/wrap/meson-docs-0.63.0-239-g41a05ff93.tar.gz";
|
||||||
hash = "sha256-fsXdhfBEXvw1mvqnPp2TgZnO5FaeHTNW3Nfd5qfTfxg=";
|
hash = "sha256-wg2mDkrkE1xVNXJf4sVm6cN1ozVeDbbw0CBYtixg5/Q=";
|
||||||
};
|
};
|
||||||
|
|
||||||
samurai-wrap = fetchurl {
|
samurai-wrap = fetchurl {
|
||||||
@ -79,14 +81,14 @@ stdenv.mkDerivation (finalAttrs: {
|
|||||||
'';
|
'';
|
||||||
|
|
||||||
buildPhase = let
|
buildPhase = let
|
||||||
featureFlag = feature: flag:
|
muonFeatureFlag = feature: flag:
|
||||||
"-D${feature}=${if flag then "enabled" else "disabled"}";
|
"-D${feature}=${if flag then "enabled" else "disabled"}";
|
||||||
conditionFlag = condition: flag:
|
muonConditionFlag = condition: flag:
|
||||||
"-D${condition}=${lib.boolToString flag}";
|
"-D${condition}=${lib.boolToString flag}";
|
||||||
cmdlineForMuon = lib.concatStringsSep " " [
|
cmdlineForMuon = lib.concatStringsSep " " [
|
||||||
(conditionFlag "static" stdenv.targetPlatform.isStatic)
|
(muonConditionFlag "static" stdenv.targetPlatform.isStatic)
|
||||||
(featureFlag "docs" buildDocs)
|
(muonFeatureFlag "docs" buildDocs)
|
||||||
(featureFlag "samurai" embedSamurai)
|
(muonFeatureFlag "samurai" embedSamurai)
|
||||||
];
|
];
|
||||||
cmdlineForSamu = "-j$NIX_BUILD_CORES";
|
cmdlineForSamu = "-j$NIX_BUILD_CORES";
|
||||||
in ''
|
in ''
|
||||||
@ -132,7 +134,6 @@ stdenv.mkDerivation (finalAttrs: {
|
|||||||
};
|
};
|
||||||
})
|
})
|
||||||
# TODO LIST:
|
# TODO LIST:
|
||||||
# 1. setup hook
|
# 1. automate sources acquisition (especially wraps)
|
||||||
# 2. multiple outputs
|
# 2. setup hook
|
||||||
# 3. automate sources acquisition (especially wraps)
|
# 3. tests
|
||||||
# 4. tests
|
|
||||||
|
@ -8,14 +8,14 @@
|
|||||||
|
|
||||||
buildPythonApplication rec {
|
buildPythonApplication rec {
|
||||||
pname = "gogdl";
|
pname = "gogdl";
|
||||||
version = "0.3";
|
version = "0.4";
|
||||||
format = "pyproject";
|
format = "pyproject";
|
||||||
|
|
||||||
src = fetchFromGitHub {
|
src = fetchFromGitHub {
|
||||||
owner = "Heroic-Games-Launcher";
|
owner = "Heroic-Games-Launcher";
|
||||||
repo = "heroic-gogdl";
|
repo = "heroic-gogdl";
|
||||||
rev = "v${version}";
|
rev = "refs/tags/v${version}";
|
||||||
sha256 = "sha256-lVNvmdUK7rjSNVdhDuSxyfuEw2FeZt0rVf9pdtsfgqE=";
|
sha256 = "sha256-4hWuGd0Alzd/ZqtN4zG2aid6C9lnT3Ihrrsjfg9PEYA=";
|
||||||
};
|
};
|
||||||
|
|
||||||
disabled = pythonOlder "3.8";
|
disabled = pythonOlder "3.8";
|
||||||
|
@ -53,6 +53,10 @@ let
|
|||||||
|
|
||||||
makeFlags = [
|
makeFlags = [
|
||||||
"CROSS_COMPILE=${stdenv.cc.targetPrefix}"
|
"CROSS_COMPILE=${stdenv.cc.targetPrefix}"
|
||||||
|
# binutils 2.39 regression
|
||||||
|
# `warning: /build/source/build/rk3399/release/bl31/bl31.elf has a LOAD segment with RWX permissions`
|
||||||
|
# See also: https://developer.trustedfirmware.org/T996
|
||||||
|
"LDFLAGS=-no-warn-rwx-segments"
|
||||||
] ++ (lib.optional (platform != null) "PLAT=${platform}")
|
] ++ (lib.optional (platform != null) "PLAT=${platform}")
|
||||||
++ extraMakeFlags;
|
++ extraMakeFlags;
|
||||||
|
|
||||||
|
@ -23,10 +23,10 @@
|
|||||||
}:
|
}:
|
||||||
|
|
||||||
let
|
let
|
||||||
defaultVersion = "2022.07";
|
defaultVersion = "2022.10";
|
||||||
defaultSrc = fetchurl {
|
defaultSrc = fetchurl {
|
||||||
url = "ftp://ftp.denx.de/pub/u-boot/u-boot-${defaultVersion}.tar.bz2";
|
url = "ftp://ftp.denx.de/pub/u-boot/u-boot-${defaultVersion}.tar.bz2";
|
||||||
hash = "sha256-krCOtJwk2hTBrb9wpxro83zFPutCMOhZrYtnM9E9z14=";
|
hash = "sha256-ULRIKlBbwoG6hHDDmaPCbhReKbI1ALw1xQ3r1/pGvfg=";
|
||||||
};
|
};
|
||||||
buildUBoot = lib.makeOverridable ({
|
buildUBoot = lib.makeOverridable ({
|
||||||
version ? null
|
version ? null
|
||||||
|
@ -15,7 +15,7 @@
|
|||||||
, docbook_xsl ? null , docbook_xml_dtd_44 ? null
|
, docbook_xsl ? null , docbook_xml_dtd_44 ? null
|
||||||
|
|
||||||
, ncursesSupport ? true , ncurses ? null
|
, ncursesSupport ? true , ncurses ? null
|
||||||
, x11Support ? true , xlibsWrapper ? null
|
, x11Support ? true , freetype, xorg
|
||||||
, xdamageSupport ? x11Support, libXdamage ? null
|
, xdamageSupport ? x11Support, libXdamage ? null
|
||||||
, doubleBufferSupport ? x11Support
|
, doubleBufferSupport ? x11Support
|
||||||
, imlib2Support ? x11Support, imlib2 ? null
|
, imlib2Support ? x11Support, imlib2 ? null
|
||||||
@ -43,7 +43,6 @@ assert docsSupport -> docbook2x != null && libxslt != null
|
|||||||
|
|
||||||
assert ncursesSupport -> ncurses != null;
|
assert ncursesSupport -> ncurses != null;
|
||||||
|
|
||||||
assert x11Support -> xlibsWrapper != null;
|
|
||||||
assert xdamageSupport -> x11Support && libXdamage != null;
|
assert xdamageSupport -> x11Support && libXdamage != null;
|
||||||
assert imlib2Support -> x11Support && imlib2 != null;
|
assert imlib2Support -> x11Support && imlib2 != null;
|
||||||
assert luaSupport -> lua != null;
|
assert luaSupport -> lua != null;
|
||||||
@ -95,7 +94,7 @@ stdenv.mkDerivation rec {
|
|||||||
buildInputs = [ glib libXinerama ]
|
buildInputs = [ glib libXinerama ]
|
||||||
++ optionals docsSupport [ docbook2x docbook_xsl docbook_xml_dtd_44 libxslt man less ]
|
++ optionals docsSupport [ docbook2x docbook_xsl docbook_xml_dtd_44 libxslt man less ]
|
||||||
++ optional ncursesSupport ncurses
|
++ optional ncursesSupport ncurses
|
||||||
++ optional x11Support xlibsWrapper
|
++ optionals x11Support [ freetype xorg.libICE xorg.libX11 xorg.libXext xorg.libXft xorg.libSM ]
|
||||||
++ optional xdamageSupport libXdamage
|
++ optional xdamageSupport libXdamage
|
||||||
++ optional imlib2Support imlib2
|
++ optional imlib2Support imlib2
|
||||||
++ optional luaSupport lua
|
++ optional luaSupport lua
|
||||||
|
@ -2,17 +2,17 @@
|
|||||||
|
|
||||||
buildGoModule rec {
|
buildGoModule rec {
|
||||||
pname = "aliyun-cli";
|
pname = "aliyun-cli";
|
||||||
version = "3.0.128";
|
version = "3.0.131";
|
||||||
|
|
||||||
src = fetchFromGitHub {
|
src = fetchFromGitHub {
|
||||||
rev = "v${version}";
|
rev = "v${version}";
|
||||||
owner = "aliyun";
|
owner = "aliyun";
|
||||||
repo = pname;
|
repo = pname;
|
||||||
fetchSubmodules = true;
|
fetchSubmodules = true;
|
||||||
sha256 = "sha256-FKynQXvxWU4adGzLTKkRpGCej1So8XbeqqGYu0RM4Rw=";
|
sha256 = "sha256-YE4+/pzUPk8wte+3ITFfhb9tn5RvaGCteAnirouITSo=";
|
||||||
};
|
};
|
||||||
|
|
||||||
vendorSha256 = "sha256-p1QRYXPetuC8jkPRx54jIKBN5WHgrw4/TZ2RUK2kzDU=";
|
vendorSha256 = "sha256-rUYlFM9OlPXGzxXyOxweUs6md7HhjocC56F+OtT/IXo=";
|
||||||
|
|
||||||
subPackages = [ "main" ];
|
subPackages = [ "main" ];
|
||||||
|
|
||||||
|
@ -5,13 +5,13 @@
|
|||||||
|
|
||||||
buildGoModule rec {
|
buildGoModule rec {
|
||||||
pname = "checkip";
|
pname = "checkip";
|
||||||
version = "0.40.4";
|
version = "0.41.0";
|
||||||
|
|
||||||
src = fetchFromGitHub {
|
src = fetchFromGitHub {
|
||||||
owner = "jreisinger";
|
owner = "jreisinger";
|
||||||
repo = pname;
|
repo = pname;
|
||||||
rev = "v${version}";
|
rev = "v${version}";
|
||||||
sha256 = "sha256-KGRcHtrmgUN7yi6SmJuckFOUec0Bhgz0iL6AUgdCWVw=";
|
sha256 = "sha256-n8dKt18Ak+H+6NKMamUaeuaPKylOxFWrLAjMg5iqEdk=";
|
||||||
};
|
};
|
||||||
|
|
||||||
vendorSha256 = "sha256-bFhSMjm9rqUUbCV9keeXm+yhzQMKrYKs1DbCt53J8aM=";
|
vendorSha256 = "sha256-bFhSMjm9rqUUbCV9keeXm+yhzQMKrYKs1DbCt53J8aM=";
|
||||||
|
@ -5,13 +5,13 @@
|
|||||||
|
|
||||||
buildGoModule rec {
|
buildGoModule rec {
|
||||||
pname = "cariddi";
|
pname = "cariddi";
|
||||||
version = "1.1.8";
|
version = "1.1.9";
|
||||||
|
|
||||||
src = fetchFromGitHub {
|
src = fetchFromGitHub {
|
||||||
owner = "edoardottt";
|
owner = "edoardottt";
|
||||||
repo = pname;
|
repo = pname;
|
||||||
rev = "v${version}";
|
rev = "v${version}";
|
||||||
sha256 = "sha256-e6mB1Z/PqxD3TbcfoPpWUrgDebcD+nadiTtx3reGqvk=";
|
sha256 = "sha256-OW6AdT2sF85WrICHiYMBLRT1lUQSgNNsXvCCs4xQceE=";
|
||||||
};
|
};
|
||||||
|
|
||||||
vendorSha256 = "sha256-mXzI3NF1afMvQ4STPpbehoarfOT35P01IotXPVYNnio=";
|
vendorSha256 = "sha256-mXzI3NF1afMvQ4STPpbehoarfOT35P01IotXPVYNnio=";
|
||||||
|
@ -29493,7 +29493,7 @@ with pkgs;
|
|||||||
|
|
||||||
kubeval-schema = callPackage ../applications/networking/cluster/kubeval/schema.nix { };
|
kubeval-schema = callPackage ../applications/networking/cluster/kubeval/schema.nix { };
|
||||||
|
|
||||||
kubernetes = callPackage ../applications/networking/cluster/kubernetes { };
|
kubernetes = callPackage ../applications/networking/cluster/kubernetes { buildGoModule = buildGo119Module; };
|
||||||
kubectl = callPackage ../applications/networking/cluster/kubernetes/kubectl.nix { };
|
kubectl = callPackage ../applications/networking/cluster/kubernetes/kubectl.nix { };
|
||||||
kubectl-convert = kubectl.convert;
|
kubectl-convert = kubectl.convert;
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user