cloudflared 2023.4.2 -> 2023.5.0 https://github.com/cloudflare/cloudflared/releases attrpath: cloudflared Checking auto update branch... No auto update branch exists [version] [version] generic version rewriter does not support multiple hashes [rustCrateVersion] [rustCrateVersion] No cargoSha256 or cargoHash found [golangModuleVersion] [golangModuleVersion] Found old vendorHash = null [golangModuleVersion] Set vendorHash to null [golangModuleVersion] Finished updating vendorHash [updateScript] [updateScript] skipping because derivation has no updateScript [quotedUrls] [quotedUrls] nothing found to replace Diff after rewrites: diff --git a/pkgs/applications/networking/cloudflared/default.nix b/pkgs/applications/networking/cloudflared/default.nix index 9d296c5fb47..aeca482b53f 100644 --- a/pkgs/applications/networking/cloudflared/default.nix +++ b/pkgs/applications/networking/cloudflared/default.nix @@ -7,13 +7,13 @@ buildGoModule rec { pname = "cloudflared"; - version = "2023.4.2"; + version = "2023.5.0"; src = fetchFromGitHub { owner = "cloudflare"; repo = "cloudflared"; rev = "refs/tags/${version}"; - hash = "sha256-oHiaRdTEiTcGQkYoGw8TT0KZMFR8Rkce/4+cxSXAHMM="; + hash = "sha256-0zUKlacB6aTj0UQ8dIQSU8F6SvVOTAU/GdbUqbJ8okI="; }; vendorHash = null; Successfully finished processing cachix "/nix/store/snkyw1vw4krxy9w49a3g87626x6z7m1f-cloudflared-2023.5.0" [check][nixpkgs-review] Result of `nixpkgs-review` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://github.com/cloudflare/cloudflared/releases. meta.description for cloudflared is: Cloudflare Tunnel daemon, Cloudflare Access toolkit, and DNS-over-HTTPS client meta.homepage for cloudflared is: https://www.cloudflare.com/products/tunnel meta.changelog for cloudflared is: https://github.com/cloudflare/cloudflared/releases/tag/2023.5.0 ###### Updates performed - Golang update ###### To inspect upstream changes ###### Impact
Checks done (click to expand) --- - built on NixOS - The tests defined in `passthru.tests`, if any, passed - found 2023.5.0 with grep in /nix/store/snkyw1vw4krxy9w49a3g87626x6z7m1f-cloudflared-2023.5.0 - found 2023.5.0 in filename of file in /nix/store/snkyw1vw4krxy9w49a3g87626x6z7m1f-cloudflared-2023.5.0 ---
Rebuild report (if merged into master) (click to expand) ``` 1 total rebuild path(s) 1 package rebuild(s) First fifty rebuilds by attrpath cloudflared ```
Instructions to test this update (click to expand) --- Either **download from Cachix**: ``` nix-store -r /nix/store/snkyw1vw4krxy9w49a3g87626x6z7m1f-cloudflared-2023.5.0 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A cloudflared https://github.com/r-ryantm/nixpkgs/archive/5f64875eced45367a7995316e8e680d00716cdc6.tar.gz ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/snkyw1vw4krxy9w49a3g87626x6z7m1f-cloudflared-2023.5.0 ls -la /nix/store/snkyw1vw4krxy9w49a3g87626x6z7m1f-cloudflared-2023.5.0/bin ``` ---

### Pre-merge build results We have automatically built all packages that will get rebuilt due to this change. This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as _failed to build_ independent of the change, simply because they are already broken on the target branch. Result of `nixpkgs-review` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
--- ###### Maintainer pings cc @bbigras @ericnorris @thoughtpolice @piperswe for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do). https://api.github.com/repos/NixOS/nixpkgs/pulls/230268 cloudflared 2023.4.2 -> 2023.5.0 https://repology.org/project/cloudflared/versions attrpath: cloudflared Checking auto update branch... No auto update branch exists Old version 2023.4.2" not present in master derivation file with contents: { lib , stdenv , buildGoModule , fetchFromGitHub , callPackage }: buildGoModule rec { pname = "cloudflared"; version = "2023.5.0"; src = fetchFromGitHub { owner = "cloudflare"; repo = "cloudflared"; rev = "refs/tags/${version}"; hash = "sha256-0zUKlacB6aTj0UQ8dIQSU8F6SvVOTAU/GdbUqbJ8okI="; }; vendorHash = null; ldflags = [ "-s" "-w" "-X main.Version=${version}" "-X github.com/cloudflare/cloudflared/cmd/cloudflared/updater.BuiltForPackageManager=nixpkgs" ]; preCheck = '' # Workaround for: sshgen_test.go:74: mkdir /homeless-shelter/.cloudflared: no such file or directory export HOME="$(mktemp -d)" # Workaround for: protocol_test.go:11: # lookup protocol-v2.argotunnel.com on [::1]:53: read udp [::1]:51876->[::1]:53: read: connection refused substituteInPlace "edgediscovery/protocol_test.go" \ --replace "TestProtocolPercentage" "SkipProtocolPercentage" # Workaround for: origin_icmp_proxy_test.go:46: # cannot create ICMPv4 proxy: socket: permission denied nor ICMPv6 proxy: socket: permission denied substituteInPlace "ingress/origin_icmp_proxy_test.go" \ --replace "TestICMPRouterEcho" "SkipICMPRouterEcho" # Workaround for: origin_icmp_proxy_test.go:110: # cannot create ICMPv4 proxy: socket: permission denied nor ICMPv6 proxy: socket: permission denied substituteInPlace "ingress/origin_icmp_proxy_test.go" \ --replace "TestConcurrentRequestsToSameDst" "SkipConcurrentRequestsToSameDst" # Workaround for: origin_icmp_proxy_test.go:242: # cannot create ICMPv4 proxy: socket: permission denied nor ICMPv6 proxy: socket: permission denied substituteInPlace "ingress/origin_icmp_proxy_test.go" \ --replace "TestICMPRouterRejectNotEcho" "SkipICMPRouterRejectNotEcho" # Workaround for: origin_icmp_proxy_test.go:108: # Received unexpected error: cannot create ICMPv4 proxy: Group ID 100 is not between ping group 65534 to 65534 nor ICMPv6 proxy: socket: permission denied substituteInPlace "ingress/origin_icmp_proxy_test.go" \ --replace "TestTraceICMPRouterEcho" "SkipTraceICMPRouterEcho" # Workaround for: icmp_posix_test.go:28: socket: permission denied substituteInPlace "ingress/icmp_posix_test.go" \ --replace "TestFunnelIdleTimeout" "SkipFunnelIdleTimeout" # Workaround for: icmp_posix_test.go:88: Received unexpected error: Group ID 100 is not between ping group 65534 to 65534 substituteInPlace "ingress/icmp_posix_test.go" \ --replace "TestReuseFunnel" "SkipReuseFunnel" # Workaround for: manager_test.go:197: # Should be false substituteInPlace "datagramsession/manager_test.go" \ --replace "TestManagerCtxDoneCloseSessions" "SkipManagerCtxDoneCloseSessions" ''; doCheck = !stdenv.isDarwin; passthru.tests.simple = callPackage ./tests.nix { inherit version; }; meta = with lib; { description = "Cloudflare Tunnel daemon, Cloudflare Access toolkit, and DNS-over-HTTPS client"; homepage = "https://www.cloudflare.com/products/tunnel"; changelog = "https://github.com/cloudflare/cloudflared/releases/tag/${version}"; license = licenses.asl20; platforms = platforms.unix ++ platforms.windows; maintainers = with maintainers; [ bbigras enorris thoughtpolice piperswe ]; }; }