2022-11-26T10:41:01 kops 1.25.2 -> 1.25.3 https://github.com/kubernetes/kops/releases
2022-11-26T10:41:03 attrpath: kops
2022-11-26T10:41:03 Checking auto update branch...
2022-11-26T10:41:03 No auto update branch exists
2022-11-26T10:41:07 [version]
2022-11-26T10:41:07 [version] generic version rewriter does not support multiple hashes
2022-11-26T10:41:07 [rustCrateVersion]
2022-11-26T10:41:07 [rustCrateVersion] No cargoSha256 found
2022-11-26T10:41:07 [golangModuleVersion]
2022-11-26T10:41:22 [golangModuleVersion] Found old vendorSha256 = null
2022-11-26T10:42:18 [golangModuleVersion] Set vendorSha256 to null
2022-11-26T10:42:18 [golangModuleVersion] Finished updating vendorSha256
2022-11-26T10:42:18 [updateScript]
2022-11-26T10:42:18 [updateScript] skipping because derivation has no updateScript
2022-11-26T10:42:18
2022-11-26T10:42:18 [quotedUrls]
2022-11-26T10:42:18 [quotedUrls] nothing found to replace
2022-11-26T10:42:18 Diff after rewrites:
diff --git a/pkgs/applications/networking/cluster/kops/default.nix b/pkgs/applications/networking/cluster/kops/default.nix
index 6dff7385d70..555af740b92 100644
--- a/pkgs/applications/networking/cluster/kops/default.nix
+++ b/pkgs/applications/networking/cluster/kops/default.nix
@@ -62,8 +62,8 @@ rec {
};
kops_1_25 = mkKops rec {
- version = "1.25.2";
- sha256 = "sha256-JJGb12uuOvZQ+bA82nrs9vKRT2hEvnPrOH8XNHfYVD8=";
+ version = "1.25.3";
+ sha256 = "sha256-Q40d62D+H7CpLmrjweCy75U3LgnHEV2pFZs2Ze+koqo=";
rev = "v${version}";
};
}
2022-11-26T10:43:50 Successfully finished processing
2022-11-26T10:43:50 cachix "/nix/store/x5gb7iwbc4qqir4wd06afrzjl0frld21-kops-1.25.3"
2022-11-26T10:44:04 [check][nixpkgs-review]
2022-11-26T10:46:55 Result of `nixpkgs-review` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
2022-11-26T10:46:58 Automatic update generated by [nixpkgs-update](https://github.com/ryantm/nixpkgs-update) tools. This update was made based on information from https://github.com/kubernetes/kops/releases.
meta.description for kops is: "Easiest way to get a production Kubernetes up and running"
meta.homepage for kops is: "https://github.com/kubernetes/kops"
meta.changelog for kops is: "https://github.com/kubernetes/kops/tree/master/docs/releases"
###### Updates performed
- Golang update
###### To inspect upstream changes
- [Release on GitHub](https://github.com/kubernetes/kops/releases/tag/v1.25.3)
- [Compare changes on GitHub](https://github.com/kubernetes/kops/compare/v1.25.2...v1.25.3)
###### Impact
Checks done (click to expand)
---
- built on NixOS
- The tests defined in `passthru.tests`, if any, passed
- found 1.25.3 with grep in /nix/store/x5gb7iwbc4qqir4wd06afrzjl0frld21-kops-1.25.3
- found 1.25.3 in filename of file in /nix/store/x5gb7iwbc4qqir4wd06afrzjl0frld21-kops-1.25.3
---
Rebuild report (if merged into master) (click to expand)
```
2 total rebuild path(s)
2 package rebuild(s)
First fifty rebuilds by attrpath
kops
kops_1_25
```
Instructions to test this update (click to expand)
---
Either **download from Cachix**:
```
nix-store -r /nix/store/x5gb7iwbc4qqir4wd06afrzjl0frld21-kops-1.25.3 \
--option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \
--option trusted-public-keys '
nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=
cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=
'
```
(The Cachix cache is only trusted for this store-path realization.)
For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted.
Or, **build yourself**:
```
nix-build -A kops https://github.com/r-ryantm/nixpkgs/archive/b999c7059ad76650ec979493da64309847ff5791.tar.gz
```
After you've downloaded or built it, look at the files and if there are any, run the binaries:
```
ls -la /nix/store/x5gb7iwbc4qqir4wd06afrzjl0frld21-kops-1.25.3
ls -la /nix/store/x5gb7iwbc4qqir4wd06afrzjl0frld21-kops-1.25.3/bin
```
---
### Pre-merge build results
We have automatically built all packages that will get rebuilt due to
this change.
This gives evidence on whether the upgrade will break dependent packages.
Note sometimes packages show up as _failed to build_ independent of the
change, simply because they are already broken on the target branch.
Result of `nixpkgs-review` run on x86_64-linux [1](https://github.com/Mic92/nixpkgs-review)
1 package built:
---
###### Maintainer pings
cc @offlinehacker @zimbatm @DiegoLelis @yurrriq for [testing](https://github.com/ryantm/nixpkgs-update/blob/master/doc/nixpkgs-maintainer-faq.md#r-ryantm-opened-a-pr-for-my-package-what-do-i-do).
2022-11-26T10:47:02 https://api.github.com/repos/NixOS/nixpkgs/pulls/203024