Merge pull request #258943 from techknowlogick/bump-teleport
teleport_11: 11.3.10 -> 11.3.25, teleport_12: 12.4.7 -> 12.4.20, teleport_13: init at 13.4.1, teleport_14: init at 14.0.1
This commit is contained in:
@@ -418,3 +418,6 @@ The module update takes care of the new config syntax and the data itself (user
|
||||
`virtualisation.fileSystems = lib.mkForce { };`.
|
||||
|
||||
- The `electron` packages now places its application files in `$out/libexec/electron` instead of `$out/lib/electron`. Packages using electron-builder will fail to build and need to be adjusted by changing `lib` to `libexec`.
|
||||
|
||||
- `teleport` has been upgraded from major version 12 to major version 14. Please see upstream [upgrade instructions](https://goteleport.com/docs/management/operations/upgrading/) and release notes for versions [13](https://goteleport.com/docs/changelog/#1300-050823) and [14](https://goteleport.com/docs/changelog/#1400-092023). Note that Teleport does not officially support upgrades across more than one major version at a time. If you're running Teleport server components, it is recommended to first upgrade to an intermediate 13.x version by setting `services.teleport.package = pkgs.teleport_13`. Afterwards, this option can be removed to upgrade to the default version (14).
|
||||
|
||||
|
||||
@@ -1,13 +1,19 @@
|
||||
{ callPackage, ... }@args:
|
||||
callPackage ../generic.nix ({
|
||||
version = "11.3.10";
|
||||
hash = "sha256-h7G+VPVG+swBo0VHDIQiCDPhsK7MHfkF8/Bagh/KzCg=";
|
||||
vendorHash = "sha256-GB024L8c8YRNUySZEPB5HEXss1wcT1gUxM4wUoB4zpQ=";
|
||||
yarnHash = "sha256-6qaXHFMhlAhDo6drjUfvgQHgpMbeO8+Y1MZXVCHfelE=";
|
||||
version = "11.3.25";
|
||||
hash = "sha256-KIbRn90BUJp8Uc8GMHuIMMSn5tJQbxzE0ntngx1ELaE=";
|
||||
vendorHash = "sha256-hjMv/H4dlinlv3ku7i1km2/b+6uCdbznHtVOMIjDlUc=";
|
||||
yarnHash = "sha256-hip0WQVZpx2qfVDmEy4nk4UFYEjX1Xhj8HsIIQ8PF1Y=";
|
||||
cargoLock = {
|
||||
lockFile = ./Cargo.lock;
|
||||
outputHashes = {
|
||||
"rdp-rs-0.1.0" = "sha256-GJfUyiYQwcDTMqt+iik3mFI0f6mu13RJ2XuoDzlg9sU=";
|
||||
};
|
||||
};
|
||||
extPatches = [
|
||||
# https://github.com/NixOS/nixpkgs/issues/120738
|
||||
../tsh.patch
|
||||
# https://github.com/NixOS/nixpkgs/issues/132652
|
||||
../test.patch
|
||||
];
|
||||
} // builtins.removeAttrs args [ "callPackage" ])
|
||||
|
||||
@@ -1,13 +1,19 @@
|
||||
{ callPackage, ... }@args:
|
||||
callPackage ../generic.nix ({
|
||||
version = "12.4.7";
|
||||
hash = "sha256-Ut+IOLEfRNWmI0G4CPm76SEvhYdAbwtHDSsc+tcGDqA=";
|
||||
vendorHash = "sha256-GZmMjIyYNQ6dr8jvB9TjFjnK5iY5FFH/54Qhfp1/ZYY=";
|
||||
yarnHash = "sha256-bcozPAIWUWSiANEd98veBtWMvf1EfE6CCBxZhCHOQ7k=";
|
||||
version = "12.4.20";
|
||||
hash = "sha256-Qz+JOS4YPj2865Fkj7eVJMdilHMOGbTD179bQ5wHY7A=";
|
||||
vendorHash = "sha256-cS8ylLujgp9Is+D2JjoK4yGgWRCVRyRw3NPQAAuE2vY=";
|
||||
yarnHash = "sha256-tOdT7X8jM+tl1GZ7lBN2aW8KRiVW/zWK9fZIU7CSHVE=";
|
||||
cargoLock = {
|
||||
lockFile = ./Cargo.lock;
|
||||
outputHashes = {
|
||||
"rdp-rs-0.1.0" = "sha256-n4x4w7GZULxqaR109das12+ZGU0xvY3wGOTWngcwe4M=";
|
||||
};
|
||||
};
|
||||
extPatches = [
|
||||
# https://github.com/NixOS/nixpkgs/issues/120738
|
||||
../tsh.patch
|
||||
# https://github.com/NixOS/nixpkgs/issues/132652
|
||||
../test.patch
|
||||
];
|
||||
} // builtins.removeAttrs args [ "callPackage" ])
|
||||
|
||||
1937
pkgs/servers/teleport/13/Cargo.lock
generated
Normal file
1937
pkgs/servers/teleport/13/Cargo.lock
generated
Normal file
File diff suppressed because it is too large
Load Diff
19
pkgs/servers/teleport/13/default.nix
Normal file
19
pkgs/servers/teleport/13/default.nix
Normal file
@@ -0,0 +1,19 @@
|
||||
{ callPackage, ... }@args:
|
||||
callPackage ../generic.nix ({
|
||||
version = "13.4.1";
|
||||
hash = "sha256-wgSaek4eq5Jx9SZFenvdRSU1wEtfJHzTz9GdczzUU2w=";
|
||||
vendorHash = "sha256-DesT18nV/SxOsKCC+Nt0hgtH7CRtRL0B5FQhE1J148I=";
|
||||
yarnHash = "sha256-iyMcP9L6dwBhN8JL9eSVEzsXI2EOjfyxjF9Dm4Gs04s=";
|
||||
cargoLock = {
|
||||
lockFile = ./Cargo.lock;
|
||||
outputHashes = {
|
||||
"rdp-rs-0.1.0" = "sha256-n4x4w7GZULxqaR109das12+ZGU0xvY3wGOTWngcwe4M=";
|
||||
};
|
||||
};
|
||||
extPatches = [
|
||||
# https://github.com/NixOS/nixpkgs/issues/120738
|
||||
../tsh.patch
|
||||
# https://github.com/NixOS/nixpkgs/issues/132652
|
||||
../test.patch
|
||||
];
|
||||
} // builtins.removeAttrs args [ "callPackage" ])
|
||||
1982
pkgs/servers/teleport/14/Cargo.lock
generated
Normal file
1982
pkgs/servers/teleport/14/Cargo.lock
generated
Normal file
File diff suppressed because it is too large
Load Diff
17
pkgs/servers/teleport/14/default.nix
Normal file
17
pkgs/servers/teleport/14/default.nix
Normal file
@@ -0,0 +1,17 @@
|
||||
{ callPackage, ... }@args:
|
||||
callPackage ../generic.nix ({
|
||||
version = "14.0.1";
|
||||
hash = "sha256-esQwk2PFnk3/REzLr3ExtzEcUs2q4Tn/2KpfFWAx5uU=";
|
||||
vendorHash = "sha256-lzwrkW0dHxCHBSJjzNhXgq3Av8Zj8xEn3kfTRtT/q04=";
|
||||
yarnHash = "sha256-Y2dVxRyKPLD2xjwr0QqrKHf/4gnMCErmDzievu5zTGg=";
|
||||
cargoLock = {
|
||||
lockFile = ./Cargo.lock;
|
||||
outputHashes = {
|
||||
"rdp-rs-0.1.0" = "sha256-n4x4w7GZULxqaR109das12+ZGU0xvY3wGOTWngcwe4M=";
|
||||
};
|
||||
};
|
||||
extPatches = [
|
||||
# https://github.com/NixOS/nixpkgs/issues/120738
|
||||
../tsh_14.patch
|
||||
];
|
||||
} // builtins.removeAttrs args [ "callPackage" ])
|
||||
@@ -22,6 +22,7 @@
|
||||
, version
|
||||
, hash
|
||||
, vendorHash
|
||||
, extPatches ? null
|
||||
, cargoHash ? null
|
||||
, cargoLock ? null
|
||||
, yarnHash
|
||||
@@ -111,11 +112,7 @@ buildGoModule rec {
|
||||
++ lib.optionals (stdenv.isDarwin && withRdpClient) [ CoreFoundation Security AppKit ];
|
||||
nativeBuildInputs = [ makeWrapper pkg-config ];
|
||||
|
||||
patches = [
|
||||
# https://github.com/NixOS/nixpkgs/issues/120738
|
||||
./tsh.patch
|
||||
# https://github.com/NixOS/nixpkgs/issues/132652
|
||||
./test.patch
|
||||
patches = extPatches ++ [
|
||||
./0001-fix-add-nix-path-to-exec-env.patch
|
||||
./rdpclient.patch
|
||||
];
|
||||
@@ -158,7 +155,7 @@ buildGoModule rec {
|
||||
description = "Certificate authority and access plane for SSH, Kubernetes, web applications, and databases";
|
||||
homepage = "https://goteleport.com/";
|
||||
license = licenses.asl20;
|
||||
maintainers = with maintainers; [ arianvp justinas sigma tomberek freezeboy ];
|
||||
maintainers = with maintainers; [ arianvp justinas sigma tomberek freezeboy techknowlogick ];
|
||||
platforms = platforms.unix;
|
||||
# go-libfido2 is broken on platforms with less than 64-bit because it defines an array
|
||||
# which occupies more than 31 bits of address space.
|
||||
|
||||
17
pkgs/servers/teleport/tsh_14.patch
Normal file
17
pkgs/servers/teleport/tsh_14.patch
Normal file
@@ -0,0 +1,17 @@
|
||||
diff --git a/tool/tsh/common/tsh.go b/tool/tsh/common/tsh.go
|
||||
index 5de21c69d0..3995c19e3c 100644
|
||||
--- a/tool/tsh/common/tsh.go
|
||||
+++ b/tool/tsh/common/tsh.go
|
||||
@@ -1084,10 +1084,11 @@ func Run(ctx context.Context, args []string, opts ...CliOption) error {
|
||||
|
||||
var err error
|
||||
|
||||
- cf.executablePath, err = os.Executable()
|
||||
+ tempBinaryPath, err := os.Executable()
|
||||
if err != nil {
|
||||
return trace.Wrap(err)
|
||||
}
|
||||
+ cf.executablePath = path.Dir(tempBinaryPath) + "/tsh"
|
||||
|
||||
// configs
|
||||
setEnvFlags(&cf)
|
||||
@@ -13765,7 +13765,14 @@ with pkgs;
|
||||
teleport_12 = callPackage ../servers/teleport/12 {
|
||||
inherit (darwin.apple_sdk.frameworks) CoreFoundation Security AppKit;
|
||||
};
|
||||
teleport = teleport_12;
|
||||
teleport_13 = callPackage ../servers/teleport/13 {
|
||||
inherit (darwin.apple_sdk.frameworks) CoreFoundation Security AppKit;
|
||||
};
|
||||
teleport_14 = callPackage ../servers/teleport/14 {
|
||||
inherit (darwin.apple_sdk.frameworks) CoreFoundation Security AppKit;
|
||||
buildGoModule = buildGo121Module;
|
||||
};
|
||||
teleport = teleport_14;
|
||||
|
||||
telepresence = callPackage ../tools/networking/telepresence {
|
||||
pythonPackages = python3Packages;
|
||||
|
||||
Reference in New Issue
Block a user