+9
nixos/doc/manual/release-notes/rl-2105.xml
+9
nixos/doc/manual/release-notes/rl-2105.xml
···+Kubernetes has <link xlink:href="https://kubernetes.io/blog/2020/12/02/dont-panic-kubernetes-and-docker/">deprecated docker</link> as container runtime.+As a consequence, the Kubernetes module now has support for configuration of custom remote container runtimes and enables containerd by default.+As an example, images with CMD or ENTRYPOINT defined as strings (not lists) will fail on containerd, while working fine on docker.
+1
nixos/modules/module-list.nix
+1
nixos/modules/module-list.nix
···
+3
-4
nixos/modules/services/cluster/kubernetes/addons/dns.nix
+3
-4
nixos/modules/services/cluster/kubernetes/addons/dns.nix
·········
+35
-7
nixos/modules/services/cluster/kubernetes/apiserver.nix
+35
-7
nixos/modules/services/cluster/kubernetes/apiserver.nix
······
+25
-8
nixos/modules/services/cluster/kubernetes/default.nix
+25
-8
nixos/modules/services/cluster/kubernetes/default.nix
·········
+2
-38
nixos/modules/services/cluster/kubernetes/flannel.nix
+2
-38
nixos/modules/services/cluster/kubernetes/flannel.nix
···-makeWrapper ${pkgs.bashInteractive}/bin/bash $out/mk-docker-opts --add-flags "${pkgs.kubernetes}/bin/mk-docker-opts.sh"···
+33
-6
nixos/modules/services/cluster/kubernetes/kubelet.nix
+33
-6
nixos/modules/services/cluster/kubernetes/kubelet.nix
··················
+1
nixos/modules/services/cluster/kubernetes/pki.nix
+1
nixos/modules/services/cluster/kubernetes/pki.nix
···
+2
-4
nixos/modules/services/networking/flannel.nix
+2
-4
nixos/modules/services/networking/flannel.nix
···until ${pkgs.etcdctl}/bin/etcdctl set /coreos.com/network/config '${builtins.toJSON networkConfig}'···
+60
nixos/modules/virtualisation/containerd.nix
+60
nixos/modules/virtualisation/containerd.nix
···+containerdConfigChecked = pkgs.runCommand "containerd-config-checked.toml" { nativeBuildInputs = [pkgs.containerd]; } ''+virtualisation.containerd.args.config = lib.mkIf (cfg.configFile != null) (toString containerdConfigChecked);+ExecStart = ''${pkgs.containerd}/bin/containerd ${lib.concatStringsSep " " (lib.cli.toGNUCommandLine {} cfg.args)}'';+# "limits" defined below are adopted from upstream: https://github.com/containerd/containerd/blob/master/containerd.service
+7
-8
nixos/tests/kubernetes/dns.nix
+7
-8
nixos/tests/kubernetes/dns.nix
······-# virtualisation.docker.extraOptions = "--dns=${config.services.kubernetes.addons.dns.clusterIp}";············
+3
-3
nixos/tests/kubernetes/rbac.nix
+3
-3
nixos/tests/kubernetes/rbac.nix
·········
+2
-2
pkgs/applications/blockchains/particl/particl-core.nix
+2
-2
pkgs/applications/blockchains/particl/particl-core.nix
···
+3
-6
pkgs/applications/networking/browsers/tor-browser-bundle-bin/default.nix
+3
-6
pkgs/applications/networking/browsers/tor-browser-bundle-bin/default.nix
······url = "https://dist.torproject.org/torbrowser/${version}/tor-browser-linux64-${version}_${lang}.tar.xz";url = "https://dist.torproject.org/torbrowser/${version}/tor-browser-linux32-${version}_${lang}.tar.xz";
+13
-6
pkgs/applications/networking/cluster/kubernetes/default.nix
+13
-6
pkgs/applications/networking/cluster/kubernetes/default.nix
·········+# Unfortunately, kube-addons-main.sh only looks for the lib file in either the current working dir
+23
pkgs/applications/networking/cluster/kubernetes/fixup-addonmanager-lib-path.patch
+23
pkgs/applications/networking/cluster/kubernetes/fixup-addonmanager-lib-path.patch
···+diff --git a/cluster/addons/addon-manager/kube-addons-main.sh b/cluster/addons/addon-manager/kube-addons-main.sh+- log ERR "== Could not find kube-addons.sh (not in working directory or /opt) at $(date -Is) =="
-113
pkgs/applications/networking/cluster/kubernetes/mk-docker-opts.sh
-113
pkgs/applications/networking/cluster/kubernetes/mk-docker-opts.sh
···
+44
pkgs/applications/networking/cluster/ssm-agent/0001-Disable-NIC-tests-that-fail-in-the-Nix-sandbox.patch
+44
pkgs/applications/networking/cluster/ssm-agent/0001-Disable-NIC-tests-that-fail-in-the-Nix-sandbox.patch
···+diff --git a/agent/managedInstances/fingerprint/fingerprint_integ_test.go b/agent/managedInstances/fingerprint/fingerprint_integ_test.go+// Give mock value to test UpdateInstanceInformation, assert the error is nil, assert the log.Debug function get called.+response, err := suite.sdkService.UpdateInstanceInformation(suite.logMock, "2.2.3.2", "active", "Amazon-ssm-agent")
+46
pkgs/applications/networking/cluster/ssm-agent/0002-version-gen-don-t-use-unnecessary-constants.patch
+46
pkgs/applications/networking/cluster/ssm-agent/0002-version-gen-don-t-use-unnecessary-constants.patch
···+diff --git a/agent/version/versiongenerator/version-gen.go b/agent/version/versiongenerator/version-gen.go+- if err := ioutil.WriteFile(filepath.Join("VERSION"), []byte(versionStr), appconfig.ReadWriteAccess); err != nil {+- if err = ioutil.WriteFile(filepath.Join(releaseNotesFile), []byte(releaseNoteOutFile), appconfig.ReadWriteAccess); err != nil {++ if err = ioutil.WriteFile(filepath.Join(releaseNotesFile), []byte(releaseNoteOutFile), 0600); err != nil {
+84
-37
pkgs/applications/networking/cluster/ssm-agent/default.nix
+84
-37
pkgs/applications/networking/cluster/ssm-agent/default.nix
···
+1
-1
pkgs/applications/networking/instant-messengers/mirage/default.nix
+1
-1
pkgs/applications/networking/instant-messengers/mirage/default.nix
···
+131
pkgs/applications/science/math/sage/patches/eclib-20210223-test-formatting.patch
+131
pkgs/applications/science/math/sage/patches/eclib-20210223-test-formatting.patch
···
+3
pkgs/applications/science/math/sage/sage-src.nix
+3
pkgs/applications/science/math/sage/sage-src.nix
···
+28
-77
pkgs/applications/video/kodi/default.nix
+28
-77
pkgs/applications/video/kodi/default.nix
···-{ stdenv, lib, fetchurl, fetchFromGitHub, autoconf, automake, libtool, makeWrapper, linuxHeaders···-url = "https://raw.githubusercontent.com/pramsey/libght/ca9b1121c352ea10170636e170040e1af015bad1/cmake/modules/CheckPrototypeExists.cmake";············---prefix PATH ":" "${lib.makeBinPath ([ python3Packages.python glxinfo ] ++ lib.optional x11Support xdpyinfo)}" \+--prefix PATH ":" "${lib.makeBinPath ([ python3Packages.python glxinfo ] ++ lib.optional x11Support xdpyinfo ++ lib.optional sambaSupport samba)}" \
+32
-22
pkgs/applications/video/natron/default.nix
+32
-22
pkgs/applications/video/natron/default.nix
···-url = "https://github.com/MrKepzie/OpenColorIO-Configs/archive/Natron-v${minorVersion}.tar.gz";+url = "https://github.com/NatronGitHub/OpenColorIO-Configs/archive/Natron-v${minorVersion}.tar.gz";···-buildPlugin = { pluginName, sha256, nativeBuildInputs ? [], buildInputs ? [], preConfigure ? "" }:+buildPlugin = { pluginName, sha256, nativeBuildInputs ? [], buildInputs ? [], preConfigure ? "", postPatch ? "" }:-url = "https://github.com/MrKepzie/Natron/releases/download/${version}/openfx-${pluginName}-${version}.tar.xz";+url = "https://github.com/NatronGitHub/openfx-${pluginName}/releases/download/Natron-${version}/openfx-${pluginName}-Natron-${version}.tar.xz";···url = "https://raw.githubusercontent.com/lvandeve/lodepng/a70c086077c0eaecbae3845e4da4424de5f43361/lodepng.h";-url = "https://raw.githubusercontent.com/dtschump/CImg/572c12d82b2f59ece21be8f52645c38f1dd407e6/CImg.h";···+patch -p0 -dCImg < CImg/Inpaint/inpaint.h.patch # taken from the Makefile; it gets skipped if the file already exists-url = "https://github.com/MrKepzie/Natron/releases/download/${version}/Natron-${version}.tar.xz";···
+2
-2
pkgs/development/libraries/botan/2.0.nix
+2
-2
pkgs/development/libraries/botan/2.0.nix
···
+2
-2
pkgs/development/libraries/smarty3/default.nix
+2
-2
pkgs/development/libraries/smarty3/default.nix
···
+3
-2
pkgs/development/python-modules/awkward/default.nix
+3
-2
pkgs/development/python-modules/awkward/default.nix
······
+2
-2
pkgs/development/python-modules/bitbox02/default.nix
+2
-2
pkgs/development/python-modules/bitbox02/default.nix
···
+35
pkgs/development/python-modules/bitlist/default.nix
+35
pkgs/development/python-modules/bitlist/default.nix
···+description = "Python library for working with little-endian list representation of bit strings";
+27
-8
pkgs/development/python-modules/cairosvg/default.nix
+27
-8
pkgs/development/python-modules/cairosvg/default.nix
···
+3
-2
pkgs/development/python-modules/celery/default.nix
+3
-2
pkgs/development/python-modules/celery/default.nix
······+propagatedBuildInputs = [ billiard click click-didyoumean click-plugins click-repl kombu pytz vine ];···
+34
pkgs/development/python-modules/certvalidator/default.nix
+34
pkgs/development/python-modules/certvalidator/default.nix
···+# We're skipping the few tests that rely on the network, fetching CRLs, OCSP or remote certificates+python -c 'import dev.tests; dev.tests.run("^(?!.*test_(basic_certificate_validator_tls|fetch|revocation|build_path)).*$")'
+2
-2
pkgs/development/python-modules/configshell/default.nix
+2
-2
pkgs/development/python-modules/configshell/default.nix
···
+2
-2
pkgs/development/python-modules/cypari2/default.nix
+2
-2
pkgs/development/python-modules/cypari2/default.nix
···
+30
-27
pkgs/development/python-modules/etebase/default.nix
+30
-27
pkgs/development/python-modules/etebase/default.nix
···
+39
pkgs/development/python-modules/fe25519/default.nix
+39
pkgs/development/python-modules/fe25519/default.nix
···
+3
-1
pkgs/development/python-modules/flower/default.nix
+3
-1
pkgs/development/python-modules/flower/default.nix
···-broken = (celery.version == "5.0.2"); # currently broken with celery>=5.0 by https://github.com/mher/flower/pull/1021+broken = (celery.version >= "5.0.2"); # currently broken with celery>=5.0 by https://github.com/mher/flower/pull/1021
+30
pkgs/development/python-modules/fountains/default.nix
+30
pkgs/development/python-modules/fountains/default.nix
···
+41
pkgs/development/python-modules/ge25519/default.nix
+41
pkgs/development/python-modules/ge25519/default.nix
···
+25
pkgs/development/python-modules/parts/default.nix
+25
pkgs/development/python-modules/parts/default.nix
···
+5
-5
pkgs/development/python-modules/pg8000/default.nix
+5
-5
pkgs/development/python-modules/pg8000/default.nix
···
+4
-2
pkgs/development/python-modules/pipx/default.nix
+4
-2
pkgs/development/python-modules/pipx/default.nix
······
+2
-2
pkgs/development/python-modules/pypugjs/default.nix
+2
-2
pkgs/development/python-modules/pypugjs/default.nix
···
+38
pkgs/development/python-modules/python-nmap/default.nix
+38
pkgs/development/python-modules/python-nmap/default.nix
···
+10
-3
pkgs/development/python-modules/scramp/default.nix
+10
-3
pkgs/development/python-modules/scramp/default.nix
···
+18
pkgs/development/python-modules/signify/certificate-expiration-date.patch
+18
pkgs/development/python-modules/signify/certificate-expiration-date.patch
···
+36
pkgs/development/python-modules/signify/default.nix
+36
pkgs/development/python-modules/signify/default.nix
···
+26
pkgs/development/tools/continuous-integration/drone-runner-exec/default.nix
+26
pkgs/development/tools/continuous-integration/drone-runner-exec/default.nix
···
+2
-2
pkgs/development/tools/rubocop/Gemfile.lock
+2
-2
pkgs/development/tools/rubocop/Gemfile.lock
-1
pkgs/development/tools/rubocop/default.nix
-1
pkgs/development/tools/rubocop/default.nix
+4
-4
pkgs/development/tools/rubocop/gemset.nix
+4
-4
pkgs/development/tools/rubocop/gemset.nix
······
+2
-2
pkgs/os-specific/linux/targetcli/default.nix
+2
-2
pkgs/os-specific/linux/targetcli/default.nix
···
+3
-3
pkgs/servers/consul/default.nix
+3
-3
pkgs/servers/consul/default.nix
·········
+3
-2
pkgs/servers/fishnet/assets.nix
+3
-2
pkgs/servers/fishnet/assets.nix
······
+4
-3
pkgs/servers/fishnet/default.nix
+4
-3
pkgs/servers/fishnet/default.nix
······
+1
-1
pkgs/servers/home-assistant/component-packages.nix
+1
-1
pkgs/servers/home-assistant/component-packages.nix
···
+4
-4
pkgs/servers/urserver/default.nix
+4
-4
pkgs/servers/urserver/default.nix
···-url = "https://www.unifiedremote.com/static/builds/server/linux-x64/745/urserver-${version}.tar.gz";+url = "https://www.unifiedremote.com/static/builds/server/linux-x64/${builtins.elemAt (builtins.splitVersion version) 3}/urserver-${version}.tar.gz";···
+6
-11
pkgs/tools/admin/awscli2/default.nix
+6
-11
pkgs/tools/admin/awscli2/default.nix
······
+6
-6
pkgs/tools/admin/nomachine-client/default.nix
+6
-6
pkgs/tools/admin/nomachine-client/default.nix
······url = "https://download.nomachine.com/download/${versionMajor}/Linux/nomachine_${version}_${versionBuild_x86_64}_x86_64.tar.gz";url = "https://download.nomachine.com/download/${versionMajor}/Linux/nomachine_${version}_${versionBuild_i686}_i686.tar.gz";
+9
-4
pkgs/tools/misc/dpt-rp1-py/default.nix
+9
-4
pkgs/tools/misc/dpt-rp1-py/default.nix
···
+3
-3
pkgs/tools/misc/mcfly/default.nix
+3
-3
pkgs/tools/misc/mcfly/default.nix
······
+2
-2
pkgs/tools/networking/dsniff/default.nix
+2
-2
pkgs/tools/networking/dsniff/default.nix
···
+36
pkgs/tools/networking/zs-wait4host/default.nix
+36
pkgs/tools/networking/zs-wait4host/default.nix
···
+48
pkgs/tools/security/prs/default.nix
+48
pkgs/tools/security/prs/default.nix
···
+16
-2
pkgs/tools/security/yara/default.nix
+16
-2
pkgs/tools/security/yara/default.nix
·········+url = "https://github.com/VirusTotal/yara/commit/52e6866023b9aca26571c78fb8759bc3a51ba6dc.diff";
+3
-1
pkgs/tools/text/kramdown-rfc2629/Gemfile.lock
+3
-1
pkgs/tools/text/kramdown-rfc2629/Gemfile.lock
+13
-3
pkgs/tools/text/kramdown-rfc2629/gemset.nix
+13
-3
pkgs/tools/text/kramdown-rfc2629/gemset.nix
······
+6
pkgs/top-level/all-packages.nix
+6
pkgs/top-level/all-packages.nix
···+drone-runner-exec = callPackage ../development/tools/continuous-integration/drone-runner-exec { };······
+16
pkgs/top-level/python-packages.nix
+16
pkgs/top-level/python-packages.nix
·········feedgenerator = callPackage ../development/python-modules/feedgenerator { inherit (pkgs) glibcLocales; };···foundationdb52 = callPackage ../servers/foundationdb/python.nix { foundationdb = pkgs.foundationdb52; };foundationdb60 = callPackage ../servers/foundationdb/python.nix { foundationdb = pkgs.foundationdb60; };foundationdb61 = callPackage ../servers/foundationdb/python.nix { foundationdb = pkgs.foundationdb61; };············