lol
0
fork

Configure Feed

Select the types of activity you want to include in your feed.

Merge pull request #256517 from aaronjheng/k3s

k3s: vendorSha256 -> vendorHash

authored by

Weijia Wang and committed by
GitHub
43caa972 6e474282

+19 -19
+4 -4
pkgs/applications/networking/cluster/k3s/1_24/default.nix
··· 51 51 k3sVersion = "1.24.10+k3s1"; # k3s git tag 52 52 k3sCommit = "546a94e9ae1c3be6f9c0dcde32a6e6672b035bc8"; # k3s git commit at the above version 53 53 k3sRepoSha256 = "sha256-HfkGb3GtR2wQkVIze26aFh6A6W0fegr8ovpSel7oujQ="; 54 - k3sVendorSha256 = "sha256-YAerisDr/knlKPaO2fVMZA4FUpwshFmkpi3mJAmLqKM="; 54 + k3sVendorHash = "sha256-YAerisDr/knlKPaO2fVMZA4FUpwshFmkpi3mJAmLqKM="; 55 55 56 56 # Based on the traefik charts here: https://github.com/k3s-io/k3s/blob/v1.24.10%2Bk3s1/scripts/download#L29-L32 57 57 # see also https://github.com/k3s-io/k3s/blob/v1.24.10%2Bk3s1/manifests/traefik.yaml#L8-L16 ··· 170 170 version = k3sVersion; 171 171 172 172 src = k3sRepo; 173 - vendorSha256 = k3sVendorSha256; 173 + vendorHash = k3sVendorHash; 174 174 175 175 nativeBuildInputs = [ pkg-config ]; 176 176 buildInputs = [ libseccomp sqlite.dev ]; ··· 221 221 version = k3sVersion; 222 222 223 223 src = k3sRepo; 224 - vendorSha256 = k3sVendorSha256; 224 + vendorHash = k3sVendorHash; 225 225 226 226 postPatch = '' 227 227 # Nix prefers dynamically linked binaries over static binary. ··· 279 279 # Specifically, it has a 'go generate' which runs part of the package. See 280 280 # this comment: 281 281 # https://github.com/NixOS/nixpkgs/pull/158089#discussion_r799965694 282 - # So, why do we use buildGoModule at all? For the `vendorSha256` / `go mod download` stuff primarily. 282 + # So, why do we use buildGoModule at all? For the `vendorHash` / `go mod download` stuff primarily. 283 283 buildPhase = '' 284 284 patchShebangs ./scripts/package-cli ./scripts/download ./scripts/build-upload 285 285
+4 -4
pkgs/applications/networking/cluster/k3s/1_25/default.nix
··· 51 51 k3sVersion = "1.25.3+k3s1"; # k3s git tag 52 52 k3sCommit = "f2585c1671b31b4b34bddbb3bf4e7d69662b0821"; # k3s git commit at the above version 53 53 k3sRepoSha256 = "0zwf3iwjcidx14zw36s1hr0q8wmmbfc0rfqwd7fmpjq597h8zkms"; 54 - k3sVendorSha256 = "sha256-U67tJRGqPFk5AfRe7I50zKGC9HJ2oh+iI/C7qF/76BQ="; 54 + k3sVendorHash = "sha256-U67tJRGqPFk5AfRe7I50zKGC9HJ2oh+iI/C7qF/76BQ="; 55 55 56 56 # taken from ./manifests/traefik.yaml, extracted from '.spec.chart' https://github.com/k3s-io/k3s/blob/v1.23.3%2Bk3s1/scripts/download#L9 57 57 # The 'patch' and 'minor' versions are currently hardcoded as single digits only, so ignore the trailing two digits. Weird, I know. ··· 169 169 version = k3sVersion; 170 170 171 171 src = k3sRepo; 172 - vendorSha256 = k3sVendorSha256; 172 + vendorHash = k3sVendorHash; 173 173 174 174 nativeBuildInputs = [ pkg-config ]; 175 175 buildInputs = [ libseccomp sqlite.dev ]; ··· 219 219 version = k3sVersion; 220 220 221 221 src = k3sRepo; 222 - vendorSha256 = k3sVendorSha256; 222 + vendorHash = k3sVendorHash; 223 223 224 224 patches = [ 225 225 ./0001-script-download-strip-downloading-just-package-CRD.patch ··· 281 281 # Specifically, it has a 'go generate' which runs part of the package. See 282 282 # this comment: 283 283 # https://github.com/NixOS/nixpkgs/pull/158089#discussion_r799965694 284 - # So, why do we use buildGoModule at all? For the `vendorSha256` / `go mod download` stuff primarily. 284 + # So, why do we use buildGoModule at all? For the `vendorHash` / `go mod download` stuff primarily. 285 285 buildPhase = '' 286 286 patchShebangs ./scripts/package-cli ./scripts/download ./scripts/build-upload 287 287
+1 -1
pkgs/applications/networking/cluster/k3s/1_26/versions.nix
··· 2 2 k3sVersion = "1.26.6+k3s1"; 3 3 k3sCommit = "3b1919b0d55811707bd1168f0abf11cccc656c26"; 4 4 k3sRepoSha256 = "1g82bkq4w0jpfn1fanj1d24bj46rw908wk50p3cm47rqiqlys72y"; 5 - k3sVendorSha256 = "sha256-+a9/q5a28zA9SmAdp2IItHR1MdJvlbMW5796bHTfKBw="; 5 + k3sVendorHash = "sha256-+a9/q5a28zA9SmAdp2IItHR1MdJvlbMW5796bHTfKBw="; 6 6 chartVersions = import ./chart-versions.nix; 7 7 k3sRootVersion = "0.12.2"; 8 8 k3sRootSha256 = "1gjynvr350qni5mskgm7pcc7alss4gms4jmkiv453vs8mmma9c9k";
+1 -1
pkgs/applications/networking/cluster/k3s/1_27/versions.nix
··· 2 2 k3sVersion = "1.27.6+k3s1"; 3 3 k3sCommit = "bd04941a294793ec92e8703d5e5da14107902e88"; 4 4 k3sRepoSha256 = "04chr8gp0yprihigy1yzhvi2baby053fav384gq0sjq6bkp3fzd8"; 5 - k3sVendorSha256 = "sha256-LH9OsBK0Pq/NGEHprbIgYKQsslYdR3i4LYVvo5P0K+8="; 5 + k3sVendorHash = "sha256-LH9OsBK0Pq/NGEHprbIgYKQsslYdR3i4LYVvo5P0K+8="; 6 6 chartVersions = import ./chart-versions.nix; 7 7 k3sRootVersion = "0.12.2"; 8 8 k3sRootSha256 = "1gjynvr350qni5mskgm7pcc7alss4gms4jmkiv453vs8mmma9c9k";
+4 -4
pkgs/applications/networking/cluster/k3s/builder.nix
··· 5 5 # commit hash 6 6 k3sCommit, 7 7 k3sRepoSha256 ? lib.fakeHash, 8 - k3sVendorSha256 ? lib.fakeHash, 8 + k3sVendorHash ? lib.fakeHash, 9 9 # taken from ./scripts/version.sh VERSION_ROOT https://github.com/k3s-io/k3s/blob/v1.23.3%2Bk3s1/scripts/version.sh#L47 10 10 k3sRootVersion, 11 11 k3sRootSha256 ? lib.fakeHash, ··· 182 182 version = k3sVersion; 183 183 184 184 src = k3sRepo; 185 - vendorSha256 = k3sVendorSha256; 185 + vendorHash = k3sVendorHash; 186 186 187 187 nativeBuildInputs = [ pkg-config ]; 188 188 buildInputs = [ libseccomp sqlite.dev ]; ··· 238 238 239 239 tags = [ "libsqlite3" "linux" "ctrd" ]; 240 240 src = k3sRepo; 241 - vendorSha256 = k3sVendorSha256; 241 + vendorHash = k3sVendorHash; 242 242 243 243 postPatch = '' 244 244 # Nix prefers dynamically linked binaries over static binary. ··· 296 296 # Specifically, it has a 'go generate' which runs part of the package. See 297 297 # this comment: 298 298 # https://github.com/NixOS/nixpkgs/pull/158089#discussion_r799965694 299 - # So, why do we use buildGoModule at all? For the `vendorSha256` / `go mod download` stuff primarily. 299 + # So, why do we use buildGoModule at all? For the `vendorHash` / `go mod download` stuff primarily. 300 300 buildPhase = '' 301 301 patchShebangs ./scripts/package-cli ./scripts/download ./scripts/build-upload 302 302
+5 -5
pkgs/applications/networking/cluster/k3s/update-script.sh
··· 101 101 k3sVersion = "${K3S_VERSION}"; 102 102 k3sCommit = "${K3S_COMMIT}"; 103 103 k3sRepoSha256 = "${K3S_REPO_SHA256}"; 104 - k3sVendorSha256 = "${FAKE_HASH}"; 104 + k3sVendorHash = "${FAKE_HASH}"; 105 105 chartVersions = import ./chart-versions.nix; 106 106 k3sRootVersion = "${K3S_ROOT_VERSION}"; 107 107 k3sRootSha256 = "${K3S_ROOT_SHA256}"; ··· 114 114 EOF 115 115 116 116 set +e 117 - K3S_VENDOR_SHA256=$(nix-prefetch -I nixpkgs=${NIXPKGS_ROOT} "{ sha256 }: (import ${NIXPKGS_ROOT}. {}).k3s_1_${MINOR_VERSION}.goModules.overrideAttrs (_: { vendorSha256 = sha256; })") 117 + K3S_VENDOR_HASH=$(nix-prefetch -I nixpkgs=${NIXPKGS_ROOT} "{ sha256 }: (import ${NIXPKGS_ROOT}. {}).k3s_1_${MINOR_VERSION}.goModules.overrideAttrs (_: { vendorHash = sha256; })") 118 118 set -e 119 119 120 - if [ -n "${K3S_VENDOR_SHA256:-}" ]; then 121 - sed -i "s|${FAKE_HASH}|${K3S_VENDOR_SHA256}|g" ./versions.nix 120 + if [ -n "${K3S_VENDOR_HASH:-}" ]; then 121 + sed -i "s|${FAKE_HASH}|${K3S_VENDOR_HASH}|g" ./versions.nix 122 122 else 123 - echo "Update failed. K3S_VENDOR_SHA256 is empty." 123 + echo "Update failed. K3S_VENDOR_HASH is empty." 124 124 exit 1 125 125 fi 126 126