Merge staging-next into staging

authored by

github-actions[bot] and committed by
GitHub
9a10c236 e8599765

+50 -35
+41 -26
nixos/modules/virtualisation/cri-o.nix
··· 6 6 7 7 crioPackage = (pkgs.cri-o.override { inherit (cfg) extraPackages; }); 8 8 9 + format = pkgs.formats.toml { }; 10 + 11 + cfgFile = format.generate "00-default.conf" cfg.settings; 9 12 in 10 13 { 11 14 imports = [ ··· 13 16 ]; 14 17 15 18 meta = { 16 - maintainers = lib.teams.podman.members; 19 + maintainers = teams.podman.members; 17 20 }; 18 21 19 22 options.virtualisation.cri-o = { ··· 55 58 extraPackages = mkOption { 56 59 type = with types; listOf package; 57 60 default = [ ]; 58 - example = lib.literalExample '' 61 + example = literalExample '' 59 62 [ 60 63 pkgs.gvisor 61 64 ] ··· 65 68 ''; 66 69 }; 67 70 68 - package = lib.mkOption { 71 + package = mkOption { 69 72 type = types.package; 70 73 default = crioPackage; 71 74 internal = true; ··· 80 83 description = "Override the network_dir option."; 81 84 internal = true; 82 85 }; 86 + 87 + settings = mkOption { 88 + type = format.type; 89 + default = { }; 90 + description = '' 91 + Configuration for cri-o, see 92 + <link xlink:href="https://github.com/cri-o/cri-o/blob/master/docs/crio.conf.5.md"/>. 93 + ''; 94 + }; 83 95 }; 84 96 85 97 config = mkIf cfg.enable { ··· 87 99 88 100 environment.etc."crictl.yaml".source = utils.copyFile "${pkgs.cri-o-unwrapped.src}/crictl.yaml"; 89 101 90 - environment.etc."crio/crio.conf.d/00-default.conf".text = '' 91 - [crio] 92 - storage_driver = "${cfg.storageDriver}" 102 + virtualisation.cri-o.settings.crio = { 103 + storage_driver = cfg.storageDriver; 93 104 94 - [crio.image] 95 - ${optionalString (cfg.pauseImage != null) ''pause_image = "${cfg.pauseImage}"''} 96 - ${optionalString (cfg.pauseCommand != null) ''pause_command = "${cfg.pauseCommand}"''} 105 + image = { 106 + pause_image = mkIf (cfg.pauseImage != null) cfg.pauseImage; 107 + pause_command = mkIf (cfg.pauseCommand != null) cfg.pauseCommand; 108 + }; 97 109 98 - [crio.network] 99 - plugin_dirs = ["${pkgs.cni-plugins}/bin/"] 100 - ${optionalString (cfg.networkDir != null) ''network_dir = "${cfg.networkDir}"''} 110 + network = { 111 + plugin_dirs = [ "${pkgs.cni-plugins}/bin" ]; 112 + network_dir = mkIf (cfg.networkDir != null) cfg.networkDir; 113 + }; 101 114 102 - [crio.runtime] 103 - cgroup_manager = "systemd" 104 - log_level = "${cfg.logLevel}" 105 - pinns_path = "${cfg.package}/bin/pinns" 106 - hooks_dir = [ 107 - ${lib.optionalString config.virtualisation.containers.ociSeccompBpfHook.enable 108 - ''"${config.boot.kernelPackages.oci-seccomp-bpf-hook}",''} 109 - ] 115 + runtime = { 116 + cgroup_manager = "systemd"; 117 + log_level = cfg.logLevel; 118 + manage_ns_lifecycle = true; 119 + pinns_path = "${cfg.package}/bin/pinns"; 120 + hooks_dir = 121 + optional (config.virtualisation.containers.ociSeccompBpfHook.enable) 122 + config.boot.kernelPackages.oci-seccomp-bpf-hook; 110 123 111 - ${optionalString (cfg.runtime != null) '' 112 - default_runtime = "${cfg.runtime}" 113 - [crio.runtime.runtimes] 114 - [crio.runtime.runtimes.${cfg.runtime}] 115 - ''} 116 - ''; 124 + default_runtime = mkIf (cfg.runtime != null) cfg.runtime; 125 + runtimes = mkIf (cfg.runtime != null) { 126 + "${cfg.runtime}" = { }; 127 + }; 128 + }; 129 + }; 117 130 118 131 environment.etc."cni/net.d/10-crio-bridge.conf".source = utils.copyFile "${pkgs.cri-o-unwrapped.src}/contrib/cni/10-crio-bridge.conf"; 119 132 environment.etc."cni/net.d/99-loopback.conf".source = utils.copyFile "${pkgs.cri-o-unwrapped.src}/contrib/cni/99-loopback.conf"; 133 + environment.etc."crio/crio.conf.d/00-default.conf".source = cfgFile; 120 134 121 135 # Enable common /etc/containers configuration 122 136 virtualisation.containers.enable = true; ··· 139 153 TimeoutStartSec = "0"; 140 154 Restart = "on-abnormal"; 141 155 }; 156 + restartTriggers = [ cfgFile ]; 142 157 }; 143 158 }; 144 159 }
+2 -2
pkgs/applications/audio/csound/default.nix
··· 17 17 # When updating, please check if https://github.com/csound/csound/issues/1078 18 18 # has been fixed in the new version so we can use the normal fluidsynth 19 19 # version and remove fluidsynth 1.x from nixpkgs again. 20 - version = "6.16.0"; 20 + version = "6.16.2"; 21 21 22 22 hardeningDisable = [ "format" ]; 23 23 ··· 25 25 owner = "csound"; 26 26 repo = "csound"; 27 27 rev = version; 28 - sha256 = "sha256-1+P2W8auc34sNJdKHUcilOBCK+Is9GHnM+J+M4oNR3U="; 28 + sha256 = "sha256-1rcS3kOspU9ACx45yB8betph4G0hso1OSJQRiabX6tE="; 29 29 }; 30 30 31 31 cmakeFlags = [ "-DBUILD_CSOUND_AC=0" ] # fails to find Score.hpp
+2 -2
pkgs/applications/virtualization/containerd/default.nix
··· 10 10 11 11 buildGoModule rec { 12 12 pname = "containerd"; 13 - version = "1.5.2"; 13 + version = "1.5.4"; 14 14 15 15 outputs = [ "out" "man" ]; 16 16 ··· 18 18 owner = "containerd"; 19 19 repo = "containerd"; 20 20 rev = "v${version}"; 21 - sha256 = "sha256-RDLAmPBjDHCx9al+gstUTrvKc/L0vAm8IEd/mvX5Als="; 21 + sha256 = "sha256-VV1cxA8tDRiPDxKV8OGu3T7sgutmyL+VPNqTeFcVjJA="; 22 22 }; 23 23 24 24 vendorSha256 = null;
+2 -2
pkgs/development/tools/analysis/flow/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "flow"; 5 - version = "0.155.0"; 5 + version = "0.155.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "facebook"; 9 9 repo = "flow"; 10 10 rev = "refs/tags/v${version}"; 11 - sha256 = "sha256-NMqglKpVrGgkxnrxSKKUeQ9RZ3eamlO6CDlaHjwKA3I="; 11 + sha256 = "sha256-tlnABN/mcUsR8tgqgrQT+t6joo6wJMeGKtcbjyiVbbE="; 12 12 }; 13 13 14 14 installPhase = ''
+3 -3
pkgs/servers/althttpd/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "althttpd"; 5 - version = "unstable-2021-05-07"; 5 + version = "unstable-2021-06-09"; 6 6 7 7 src = fetchfossil { 8 8 url = "https://sqlite.org/althttpd/"; 9 - rev = "2c5e3f9f7051a578"; 10 - sha256 = "sha256-+RuogtQAc+zjCWTOiOunu1pXf3LxfdWYQX+24ysJ7uY="; 9 + rev = "0d3b5e232c57e188"; 10 + sha256 = "sha256-vZwpjYYMdP/FgPTAQ9Kdh2RRMovpONqu2v73cCoYyxE="; 11 11 }; 12 12 13 13 installPhase = ''