Commit Graph

335 Commits

Author SHA1 Message Date
Sascha Grunert
1f74e97fe8 cri-tools: 1.18.0 -> 1.19.0
Signed-off-by: Sascha Grunert <sgrunert@suse.com>
2020-08-28 21:11:46 +10:00
zowoq
a83a88db05 buildGoPackage: remove platform.all from packages 2020-08-15 19:34:47 -07:00
R. RyanTM
b6d309c8cf rootlesskit: 0.3.0-alpha.2 -> 0.10.0 2020-07-31 08:30:20 +00:00
R. RyanTM
f5112ccf45 govc: 0.22.1 -> 0.23.0 2020-06-14 16:34:20 +00:00
Jörg Thalheim
9df4eba48b
Merge pull request #85673 from Mic92/nixos-shell 2020-05-24 08:08:59 +01:00
Florian Klink
927b7795cb
Merge pull request #88492 from flokli/current-system-systemctl
tree-wide: use systemctl of running system
2020-05-21 20:22:26 +02:00
Florian Klink
4f6cd4f6c6
Merge pull request #88507 from r-ryantm/auto-update/google-compute-engine-oslogin
google-compute-engine-oslogin: 20200325.00 -> 20200507.00
2020-05-21 18:53:04 +02:00
Florian Klink
5fdf6a6f92 google-compute-engine-oslogin: add test passthru 2020-05-21 18:49:26 +02:00
adisbladis
4fab50325f
google-compute-engine-oslogin: Remove myself as maintainer 2020-05-21 17:06:13 +01:00
R. RyanTM
444b84a8fb google-compute-engine-oslogin: 20200325.00 -> 20200507.00 2020-05-21 11:26:16 +00:00
Florian Klink
d69f95e2fe google-compute-engine: run systemctl of the currently running systemd 2020-05-21 10:35:34 +02:00
Aaron Andersen
a1ebd82176
Merge pull request #87893 from aanderse/govc
govc: 0.21.0 -> 0.22.1
2020-05-16 21:13:45 -04:00
Aaron Andersen
0666f6277b govc: 0.21.0 -> 0.22.1 2020-05-15 12:50:41 -04:00
zowoq
64ce60e2b3 cri-tools: switch to buildGoModule 2020-05-14 17:37:51 +10:00
zowoq
f8d9d72f0e cri-tools: install completion 2020-05-06 16:43:15 +10:00
Frederik Rietdijk
9875bbae75 Merge master into staging-next 2020-05-05 19:51:09 +02:00
Daniel KT
362a0a2eea linode-cli: pin linode openapi version
Pull linode openapi spec from a fixed version in github, and so the
sha256 hash will not break on each new release of the api spec.

Replaced the hash for the openapi spec with a working hash.

Attempting to install linode-cli was failing, with the following
message:

hash mismatch in fixed-output derivation '/nix/store/px3cdbcb84bvw6xslr1k6hszyxpdis6j-openapi.yaml':
  wanted: sha256:1l2fahdcmv7sp1qkwr5nv2vls8fypvlybwylqfzhyjmn7jqkw4hq
  got:    sha256:03ngzbq24zazfqmfd7xjmxixkcb9vv1jgamplsj633j7sjj708s0
cannot build derivation '/nix/store/49xrq47id66kwszyaqg1qapknc3i8mmx-linode-cli-2.14.1.drv': 1 dependencies couldn't be built
2020-05-04 16:08:56 -04:00
zimbatm
662ecb74aa
vpsfree-client: init at 0.11.0 (#86046) 2020-05-02 19:11:23 +00:00
Frederik Rietdijk
484ee79050 Merge staging-next into staging 2020-05-01 08:57:10 +02:00
Florian Klink
5506463c2f google-compute-engine-oslogin: 1.5.3 -> 20200325.00
Google moved their oslogin guest tools to another repository.
Point src to there, and bump to the latest version
There's now a Makefile, so we can avoid having our own custom
installPhase, and we also get manpages.

I successfully ran the oslogin tests, so assuming the google cloud
metadata server still behaves like in our test, logins should work.
I saw a nscd segfault, not sure if it's caused by this or was already
the case before.
It'd be great if someone could test this on an actual VM.
2020-04-29 14:36:35 +02:00
zowoq
b5dc07a4b4 treewide: use $out instead of $bin with buildGoPackage 2020-04-28 20:30:29 +10:00
zowoq
d8e8169bb0 cri-tools: update maintainers 2020-04-24 08:09:03 +10:00
Mario Rodas
f9ee56ff2e
Merge pull request #83936 from saschagrunert/cri-tools
cri-tools: v1.17.0 -> v1.18.0
2020-04-21 18:20:30 -05:00
Jörg Thalheim
f2a77c764d
nixos-shell: init at 0.1.1 2020-04-21 13:17:28 +01:00
Ryan Mulligan
ccd6892678 linode-cli: remove deprecated perl version, init python version at 2.14.1 2020-04-15 09:19:34 -07:00
Michael Reilly
84cf00f980
treewide: Per RFC45, remove all unquoted URLs 2020-04-10 17:54:53 +01:00
Frederik Rietdijk
92124ed660 Merge master into staging-next 2020-04-03 21:54:40 +02:00
zimbatm
4ebd229369
google-compute-engine-oslogin: fix bash reference
This is the bash that is being called when logging into the VM. This
fixes prompt escaping issues and also restores tab completion to the
logged-in user.
2020-04-01 13:15:47 +02:00
Sascha Grunert
4c31f28fa1
cri-tools: v1.17.0 -> v1.18.0
Signed-off-by: Sascha Grunert <sgrunert@suse.com>
2020-04-01 10:01:22 +02:00
Frederik Rietdijk
46ec52f329 buildPython*: use pname 2020-03-30 17:07:41 +02:00
Thibault Gagnaux
99a2467722 amazon-ecs-cli: 1.18.0 -> 1.18.1 2020-03-27 13:32:40 -07:00
Maximilian Bosch
ebb6e385ea
Revert "nixos-container: use systemd-run instead of nsenter"
This reverts commit 7cb100b683.

See also #83432.

This appears to break at least the `container`-backend of `nixops`: when
running `switch-to-configuration` within `nixos-container run`, the
running `systemd`-instance gets reloaded which appears to kill the
`systemd-run` command and causes `nixos-container run` to hang.

The full issue is reported in the original PR[1].

[1] https://github.com/NixOS/nixpkgs/pull/67332#issuecomment-604145869

(cherry picked from commit 7f1ba606ac)
2020-03-26 17:55:12 +01:00
Danylo Hlynskyi
9336b084ae
Merge pull request #79736 from Ma27/minor-imperative-container-fixes
nixos-container: minor fixes
2020-02-22 21:26:04 +02:00
Sarah Zhang
a279b68571 Fixed typo 2020-02-12 16:22:47 +01:00
Maximilian Bosch
31bbcc21d3
nixos/nixos-container: use custom path if specified by --nixos-path 2020-02-11 14:44:38 +01:00
Maximilian Bosch
93943acbc5
nixos/nixos-container: ensure that the state-dir is cleaned up if a build fails 2020-02-11 14:42:30 +01:00
Eelco Dolstra
fb051f0dec nixos-{rebuild,container}: Use flakeref#attrpath syntax
This makes them consistent with the 'nix' command line.
2020-02-05 23:15:18 +01:00
Eelco Dolstra
20087bd553 nixos-container: Add flake support
E.g. to create a container that runs the NixOS homepage:

  $ nixos-container create homepage --flake nixos-homepage

And to upgrade it:

  $ nixos-container update homepage
2020-02-05 23:15:18 +01:00
Sascha Grunert
16bca7814a
cri-tools: 1.16.1 -> v1.17.0
Signed-off-by: Sascha Grunert <sgrunert@suse.com>
2019-12-16 09:48:03 +01:00
gege251
a1c8ec7c32
amazon-ecs-cli: enable on darwin 2019-12-15 22:16:34 -05:00
Renaud
0b6d3933cb
ec2-utils: fix meta.license
It's licensed under Apache License 2.0 (asl20) and not under
the Apple Public License 2.0 (apsl20)
2019-11-29 15:13:34 +01:00
R. RyanTM
1eb951d217 amazon-ecs-cli: 1.17.0 -> 1.18.0 2019-11-28 12:22:06 -08:00
Sarah Brofeldt
6a0486b206
Merge pull request #69098 from saschagrunert/cri-tools
cri-tools: 1.15.0 -> 1.16.1
2019-11-19 08:33:10 +01:00
Jörg Thalheim
b55a7a3a57
ec2-utils: init at 0.5.1, include in amazon-image profile (#67347)
ec2-utils: init at 0.5.1, include in amazon-image profile
2019-11-01 20:57:44 +00:00
R. RyanTM
99df22190c amazon-ecs-cli: 1.16.0 -> 1.17.0 (#71485)
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/amazon-ecs-cli/versions
2019-10-23 16:58:23 +02:00
Sascha Grunert
10fe9b16b8
cri-tools: 1.15.0 -> 1.16.1
Signed-off-by: Sascha Grunert <sgrunert@suse.com>
2019-10-02 11:28:28 +02:00
R. RyanTM
3970bded3e amazon-ecs-cli: 1.15.1 -> 1.16.0
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/amazon-ecs-cli/versions
2019-09-25 22:01:15 -07:00
Franz Pletz
a0a3f5c86c
Merge pull request #67332 from uvNikita/nixos-container/run
nixos-container: use systemd-run instead of nsenter
2019-09-14 13:22:35 +00:00
Vladimír Čunát
f21211ebfe
Merge branch 'master' into staging 2019-09-02 23:25:24 +02:00
Maximilian Bosch
ad70c1ca54
Merge pull request #67904 from sigma/pr/govmomi-0.21.0
govc: 0.20.0 -> 0.21.0
2019-09-01 23:34:27 +02:00
Yann Hodique
94387290a3 govc: 0.20.0 -> 0.21.0 2019-09-01 13:52:56 -07:00
Florian Klink
e95d4c734a google-compute-config.nix: use sysctl snippets from gce
We make them available at ${gce}/sysctl.d and add them to
environments.etc, like we do with the systemd ones.
2019-09-01 02:55:28 +02:00
Florian Klink
10f5f8c5d8 google-compute-engine: patch shebangs in $out/bin, properly patch systemctl 2019-09-01 01:23:18 +02:00
volth
08f68313a4 treewide: remove redundant rec 2019-08-28 11:07:32 +00:00
Andrew Childs
a5ca97028f ec2-utils: init at 0.5.1 2019-08-23 23:27:49 +09:00
Nikita Uvarov
7cb100b683
nixos-container: use systemd-run instead of nsenter
This is the first step for unprivileged nixos containers support.
Fixes #30019. See also #18825, #57083, and #67130.
2019-08-23 12:21:22 +02:00
volth
c814d72b51 treewide: name -> pname 2019-08-17 10:54:38 +00:00
volth
46420bbaa3 treewide: name -> pname (easy cases) (#66585)
treewide replacement of

stdenv.mkDerivation rec {
  name = "*-${version}";
  version = "*";

to pname
2019-08-15 13:41:18 +01:00
Sascha Grunert
3efc04c41d
cri-tools: 1.14.0 -> 1.15.0
- Fix go build process to include critest as well.
- Fix GitHub repo location to be `kubernetes-sigs`
- Add me as maintainer

Signed-off-by: Sascha Grunert <sgrunert@suse.com>
2019-08-14 09:16:31 +02:00
Matthieu Coudron
f0ccd4002b mininet: 2.3.0d4 -> 2.3.0d6 2019-08-05 21:20:43 +09:00
Orivej Desh
a1d9aca602 google-compute-engine-oslogin: update /bin/bash substitution 2019-07-29 23:28:40 +00:00
Orivej Desh
cf979f246e google-compute-engine-oslogin: 1.4.3 -> 1.5.3 2019-07-29 16:01:50 +00:00
Meghea Iulian
6510c45b56 distrobuilder: 2018_10_04 -> 2019_10_07 2019-07-19 11:06:13 +03:00
R. RyanTM
6f8a7408d9 amazon-ecs-cli: 1.14.1 -> 1.15.1
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/amazon-ecs-cli/versions
2019-07-14 22:24:43 -07:00
worldofpeace
3f4a353737 treewide: use dontUnpack 2019-07-01 04:23:51 -04:00
volth
b3cc65f8b9 buildPerlPackage: name -> (pname, version) 2019-06-20 15:56:50 +00:00
volth
f3282c8d1e treewide: remove unused variables (#63177)
* treewide: remove unused variables

* making ofborg happy
2019-06-16 19:59:05 +00:00
Franz Pletz
ff05703611
Merge pull request #62701 from dtzWill/update/podman-cni-and-containers-oh-my
podman, cni{,-plugins}, cri*: updates
2019-06-07 11:54:52 +00:00
Will Dietz
159b0ccbd8
Merge pull request #62699 from dtzWill/update/udocker-1.1.3
udocker: 1.1.1 -> 1.1.3
2019-06-06 23:33:24 -05:00
Robin Gloster
2cca7180c1
Merge pull request #60029 from Ma27/configure-ipv4-for-imperative-container
nixos-container: allow setting custom local and host address
2019-06-06 07:35:07 +00:00
Will Dietz
786bfe0c27
cri-tools: nixpkgs-fmt 2019-06-04 15:47:22 -05:00
Will Dietz
56cc125368
cri-tools: 1.0.0-alpha.0 -> 1.14.0 2019-06-04 15:46:16 -05:00
Will Dietz
0a51adea73
udocker: 1.1.1 -> 1.1.3
https://github.com/indigo-dc/udocker/releases/tag/v1.1.3
2019-06-04 15:36:13 -05:00
R. RyanTM
292c1d3774 amazon-ecs-cli: 1.14.0 -> 1.14.1
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/amazon-ecs-cli/versions
2019-05-31 20:46:38 -07:00
R. RyanTM
41c65fa5ac amazon-ecs-cli: 1.13.1 -> 1.14.0
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/amazon-ecs-cli/versions
2019-04-29 21:09:40 -07:00
Daniel Schaefer
92cccb6f83 treewide: Use HTTPS for readthedocs URLs 2019-04-22 20:46:18 +02:00
Maximilian Bosch
c957341ef5
nixos-container: allow setting custom local and host address
I have a nixops network where I deploy containers using the `container`
backend which uses `nixos-container` intenrally to deploy several
containers to a certain host.

During that time I removed and added new containers and while trying to
deploy those to a different host I realized that it isn't guaranteed
that each container gets the same IP address which is a problem as some
parts of the deployment need to know which container is using which IP
(i.e. to configure port forwarding on the host).

With this change you can specify the container's IP like this (and don't
have to use the arbitrarily used 10.233.0.0/16 subnet):

```
$ nixos-container create test --config-file test-container.nix \
    --local-address 10.235.1.2 --host-address 10.235.1.1
```
2019-04-22 18:13:45 +02:00
Nick Novitski
33870626e6 govc: 0.16.0 -> 0.20.0 (#58986) 2019-04-08 12:26:39 +02:00
R. RyanTM
b10b7c4074 amazon-ecs-cli: 1.12.1 -> 1.13.1 (#58620)
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/amazon-ecs-cli/versions
2019-04-07 16:01:32 +02:00
Jaka Hudoklin
0a06afa7ed
Merge pull request #55898 from xtruder/pkgs/rootlesskit/init
feat(roolesskit): init at 0.3.0-alpha.2
2019-03-26 12:58:30 +01:00
Josef Kemetmüller
61a8aca8e5 udocker: Fix build (#57002)
The latest changes to support better cross-compilation compatibility
have introduced a stricter handling of dependency specifications in
python. Since b4acd97, mock and nosetest should be checkInputs, since
they are used for testing.

Fixes: #56972
2019-03-07 22:55:12 +01:00
Scott Dunlop
5f2252cc6a awless: 0.0.14 -> 0.1.11 (#54121) 2019-02-24 02:37:30 +01:00
Jaka Hudoklin
c460176ce4
feat(roolesskit): init at 0.3.0-alpha.2 2019-02-19 22:16:11 +01:00
Matthew Bauer
5c09d977c7 Merge remote-tracking branch 'origin/master' into staging 2019-02-09 12:14:06 -05:00
R. RyanTM
4cd3944a1b google-compute-engine: 20181206 -> 20190124 (#55312)
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/google-compute-engine/versions
2019-02-06 11:02:31 +00:00
Vladimír Čunát
3fe32b675e
Merge branch 'master' into staging 2019-01-22 15:59:42 +01:00
Raphael Borun Das Gupta
077a5cfedb udocker: change homepage to documentation on gitbooks.io
as that view, other than the gitbook.com one, is available to
readers not logged into GitBook, too.
2019-01-19 02:15:41 +01:00
rnhmjoj
bcf54ce5bb
treewide: use ${stdenv.shell} instead of /bin/sh where possible 2019-01-16 20:37:15 +01:00
Frederik Rietdijk
9618abe87c Merge master into staging-next 2019-01-04 21:13:19 +01:00
R. RyanTM
7ff3ccfa74 google-compute-engine: 20181023 -> 20181206 (#52894)
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/google-compute-engine/versions
2019-01-04 16:25:54 +01:00
Frederik Rietdijk
092e3b50a8 Merge master into staging-next 2019-01-02 21:08:27 +01:00
Joachim F
7db540633f
Merge pull request #52605 from Scriptkiddi/amazon-ecs-cli
amazon-ecs-cli: init at 1.12.1
2019-01-02 18:18:12 +00:00
Fritz Otlinghaus
8cb8b2be91 amazon-ecs-cli: init at 1.12.1 2018-12-28 08:32:40 +08:00
Jan Tojnar
ef935fa101
Merge branch 'master' into staging 2018-12-24 15:02:29 +01:00
Florian Klink
fb41136208 google-compute-engine-oslogin: init at 1.4.3 2018-12-21 17:52:37 +01:00
volth
fed7914539
Merge branch 'staging' into make-perl-pathd 2018-12-18 17:13:27 +00:00
volth
bb9557eb7c lib.makePerlPath -> perlPackages.makePerlPath 2018-12-15 03:50:31 +00:00
Meghea Iulian
efe8be7fd4 distrobuilder: 2018_06_29 -> 2018_10_04 2018-12-09 18:38:23 +02:00
Ding Xiang Fei
f4414da64a use interactive bash for gce 2018-12-05 09:47:01 +08:00
Frederik Rietdijk
c31cb577ae Merge master into staging-next 2018-11-22 09:57:08 +01:00
Matthieu Coudron
35f74c3608 mininet: init at 2.3.0d4 (#41261)
Mininet (https://github.com/mininet/mininet) is a popular network emulator that
glues several components such as network namespaces, traffic control
commands into a set of python bindings. It is then "easy" to describe a
topology and run experiments on it.
2018-11-21 23:33:10 +00:00
Frederik Rietdijk
aabf1a93bc Merge staging-next into staging 2018-11-20 11:51:11 +01:00
R. RyanTM
9434dc3dfb google-compute-engine: 20181011 -> 20181023 (#50751)
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/google-compute-engine/versions
2018-11-19 18:19:15 +01:00
Frederik Rietdijk
1d3bff25db Merge staging-next into staging 2018-11-11 14:28:08 +01:00
R. RyanTM
c5f42c7d35 google-compute-engine: 20180905 -> 20181011
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/google-compute-engine/versions
2018-11-09 19:03:58 -08:00
Patrick Hilhorst
9ec40cc3bf
treewide: Fix overrides having wrong versions 2018-11-06 00:06:21 +01:00
volth
f65dfb3caf buildPerlPackage -> perlPackages.buildPerlPackage 2018-10-14 09:10:41 +02:00
zimbatm
9fb79868ab google-compute-engine: 20180510 -> 20180905
The list of corresponding NixOS services are also updated
2018-09-26 11:48:16 +02:00
Maximilian Bosch
baa7e52fe0 python3Packages.google-compute-engine: fix build (#47267)
The dependency `distro` was missing.
See https://hydra.nixos.org/build/81330387

Addresses #45960
2018-09-24 15:50:52 +02:00
R. RyanTM
035b2f5250 google-compute-engine: 20180129 -> 20180510 (#46278)
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
google-compute-engine
2018-09-13 20:09:08 +01:00
Markus Kowalewski
4f0010dbec
euca2ools: update homepage 2018-09-07 23:51:50 +02:00
Robert Schütz
dbd3d509e0 awsebcli: use python3
Its dependency cement is disabled on python2 since 36a4df6.
2018-09-01 10:41:37 +02:00
Markus Kowalewski
5c395d5095
cri-tools: add license 2018-08-15 21:55:04 +02:00
volth
cc55a3ebcb treewide: fix build with disallowed aliases (#43872)
fixes build with disallowed aliases
2018-07-21 22:03:24 -04:00
volth
52f53c69ce pkgs/*: remove unreferenced function arguments 2018-07-21 02:48:04 +00:00
Meghea Iulian
66e18c3aab distrobuilder: 2018_04_28 -> 2018_06_29 (#42810) 2018-06-30 18:46:00 +02:00
Silvan Mosberger
57bccb3cb8 treewide: http -> https sources (#42676)
* treewide: http -> https sources

This updates the source urls of all top-level packages from http to
https where possible.

* buildtorrent: fix url and tab -> spaces
2018-06-28 20:43:35 +02:00
Ryan Mulligan
0d5eb901ad treewide: http -> https 2018-06-23 04:34:55 -07:00
Ryan Mulligan
af9d10a91b treewide: fix derivation names 2018-05-28 05:59:57 -07:00
Unknown
37af5704f9 distrobuilder: init at HEAD
Implement feedback
2018-05-12 21:14:10 +03:00
Peter Hoeg
236a9189e3
Merge pull request #39717 from peterhoeg/f/container
nixos-container: support restarts
2018-05-02 07:33:42 +00:00
Ruben Maher
e8dcf87007 awsebcli: 3.12.3 -> 3.12.4 2018-04-27 10:29:19 +09:30
Ruben Maher
ffe9f0a2bb awsebcli: pin pathspec dependency to 0.5.5
pathspec has been bumped to 0.5.6 in c705acef and awsebcli's setup.py refuses to
use that version.
2018-04-27 10:29:19 +09:30
Ryan Mulligan
d32983a1ca google-compute-engine: 20170914 -> 20180129 (#36565)
Semi-automatic update. These checks were done:

- built on NixOS
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/optimize_local_ssd -h` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/optimize_local_ssd --help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/optimize_local_ssd help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/set_multiqueue -h` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/set_multiqueue --help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/set_multiqueue help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/set_multiqueue -V` and found version 20180129
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/set_multiqueue -v` and found version 20180129
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/set_multiqueue --version` and found version 20180129
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/set_multiqueue version` and found version 20180129
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/set_multiqueue -h` and found version 20180129
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/set_multiqueue --help` and found version 20180129
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/set_multiqueue help` and found version 20180129
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/.google_accounts_daemon-wrapped -h` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/.google_accounts_daemon-wrapped --help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/google_accounts_daemon -h` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/google_accounts_daemon --help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/.google_instance_setup-wrapped -h` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/.google_instance_setup-wrapped --help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/google_instance_setup -h` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/google_instance_setup --help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/.google_network_setup-wrapped -h` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/.google_network_setup-wrapped --help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/google_network_setup -h` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/google_network_setup --help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/.google_ip_forwarding_daemon-wrapped -h` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/.google_ip_forwarding_daemon-wrapped --help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/.google_ip_forwarding_daemon-wrapped help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/google_ip_forwarding_daemon -h` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/google_ip_forwarding_daemon --help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/google_ip_forwarding_daemon help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/.google_clock_skew_daemon-wrapped -h` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/.google_clock_skew_daemon-wrapped --help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/.google_clock_skew_daemon-wrapped help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/google_clock_skew_daemon -h` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/google_clock_skew_daemon --help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/google_clock_skew_daemon help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/.google_metadata_script_runner-wrapped -h` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/.google_metadata_script_runner-wrapped --help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/google_metadata_script_runner -h` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/google_metadata_script_runner --help` got 0 exit code
- found 20180129 with grep in /nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129
- found 20180129 in filename of file in /nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129

only build on Linux
2018-04-23 22:03:19 +01:00
Peter Hoeg
b95a24fdf1 nixos-container: support restarts 2018-04-20 11:07:07 +08:00
Franz Pletz
5461e72cc9
Merge pull request #32992 from nh2/fix-32545-blocking-container-destroy
nixos-container: Fix `destroy` terminating before it's done. Fixes #32545
2018-03-12 21:27:50 +00:00
Ruben Maher
411b7869d2 awsebcli: clean up derivation 2018-02-28 10:10:05 +10:30
Ruben Maher
e5a64bd1f1 awsebcli: 3.12.2 -> 3.12.3 2018-02-22 15:04:58 +10:30
Nick Novitski
8c7af333df govc: init at 0.16.0 2018-02-16 11:59:07 -08:00
Ruben Maher
84f30286d2 awsebcli: 3.12.1 -> 3.12.2 2018-02-08 09:37:12 +10:30
Bruno Bzeznik
b2cf8cff7d udocker: init at 1.1.1 2018-02-02 13:59:59 +01:00
Shea Levy
f607771d0f
Add cri-tools 2018-01-09 11:18:25 -05:00
Samuel Dionne-Riel
7b97c8c0c8 treewide: homepage+src updates (found by repology, #33263) 2018-01-05 20:42:46 +01:00
Niklas Hambüchen
5d83988c1e nixos-container: Fix destroy terminating before it's done. Fixes #32545.
This also fixes the race condition found in #32551.

And it fixes nixops's repeated destroy/deploy being broken
(https://github.com/NixOS/nixops/issues/809).
2017-12-29 16:26:18 +01:00
Orivej Desh
3701531dbd google-compute-engine: fix build by disable check phase
after it was activated by #32244
2017-12-21 18:36:20 +00:00
pe@pijul.org
85c70266ea Fixing tests for Google Compute Engine 2017-12-21 18:49:26 +01:00
Ruben Maher
757725e071 awsebcli: 3.12.0 -> 3.12.1 2017-12-15 08:43:11 +10:30
Orivej Desh
8dd33e803e cloud-init: disable check after #32244 2017-12-11 11:04:06 +00:00
Martin Bornhold
ac7edeebfd nixos-container: Make show-ip work together with ipv4 + netmask
The containers local address can be given as ipv4 only or with a subnetmask in
CIDR notation in the container configuration, see [1]. This works fine but the
'nixos-container show-ip' only supports plain ipv4 addresses without the netmask
suffix.

Changed the regex to also match in case of a CIDR netmask suffix.

[1] 9939032e35/nixos/modules/virtualisation/containers.nix (L382)
2017-11-16 20:25:45 +01:00
Ruben Maher
47c000b894 awsebcli: 3.11.0 -> 3.12.0 2017-11-03 09:38:16 +10:30
Ruben Maher
fcf0df2cf6 awsebcli: tiny whitespace fix 2017-11-03 09:38:16 +10:30
Ruben Maher
054baf2cbe awsebcli: unbreak after cement update
awsebcli requests that the cement package be exactly at version 2.8.2 and won't
build without it.
2017-11-03 09:38:15 +10:30
Ruben Maher
b686f934c5 awsebcli: 3.10.5 -> 3.11.0 2017-10-13 09:44:25 +10:30
Nikolay Amiantov
8d53efb19c google-compute-engine: 20170523 -> 20170914 2017-09-25 22:46:44 +03:00
Ruben Maher
b1c4498b41 awsebcli: init at 3.10.5 2017-09-23 08:23:43 +02:00
Silvan Mosberger
f5fa5fa4d6 pkgs: refactor needless quoting of homepage meta attribute (#27809)
* pkgs: refactor needless quoting of homepage meta attribute

A lot of packages are needlessly quoting the homepage meta attribute
(about 1400, 22%), this commit refactors all of those instances.

* pkgs: Fixing some links that were wrongfully unquoted in the previous
commit

* Fixed some instances
2017-08-01 22:03:30 +02:00
zimbatm
812346c9c9 google-compute-engine: init at 20170523 2017-07-15 18:00:55 +01:00
Antoine Eiche
a4b8c214be cloud-init: remove argparse from requirements.txt
Argparse is part of python stdlib.
2017-06-05 21:44:05 +02:00
Kranium Gikos Mendoza
4126cc18be cloudmonkey: init at 5.3.3 2017-05-30 06:37:19 +10:00
Frederik Rietdijk
a2598e4ca1 Merge pull request #23024 from phile314/cloud-init-update
cloud-init: 0.7.6 -> 0.7.9 + module improvements
2017-05-22 16:33:31 +02:00