Commit Graph

258 Commits

Author SHA1 Message Date
zimbatm
4ebd229369
google-compute-engine-oslogin: fix bash reference
This is the bash that is being called when logging into the VM. This
fixes prompt escaping issues and also restores tab completion to the
logged-in user.
2020-04-01 13:15:47 +02:00
Sascha Grunert
4c31f28fa1
cri-tools: v1.17.0 -> v1.18.0
Signed-off-by: Sascha Grunert <sgrunert@suse.com>
2020-04-01 10:01:22 +02:00
Frederik Rietdijk
46ec52f329 buildPython*: use pname 2020-03-30 17:07:41 +02:00
Thibault Gagnaux
99a2467722 amazon-ecs-cli: 1.18.0 -> 1.18.1 2020-03-27 13:32:40 -07:00
Maximilian Bosch
ebb6e385ea
Revert "nixos-container: use systemd-run instead of nsenter"
This reverts commit 7cb100b683.

See also #83432.

This appears to break at least the `container`-backend of `nixops`: when
running `switch-to-configuration` within `nixos-container run`, the
running `systemd`-instance gets reloaded which appears to kill the
`systemd-run` command and causes `nixos-container run` to hang.

The full issue is reported in the original PR[1].

[1] https://github.com/NixOS/nixpkgs/pull/67332#issuecomment-604145869

(cherry picked from commit 7f1ba606ac632c50efd33c435aa59e69d4f58acc)
2020-03-26 17:55:12 +01:00
Danylo Hlynskyi
9336b084ae
Merge pull request #79736 from Ma27/minor-imperative-container-fixes
nixos-container: minor fixes
2020-02-22 21:26:04 +02:00
Sarah Zhang
a279b68571 Fixed typo 2020-02-12 16:22:47 +01:00
Maximilian Bosch
31bbcc21d3
nixos/nixos-container: use custom path if specified by --nixos-path 2020-02-11 14:44:38 +01:00
Maximilian Bosch
93943acbc5
nixos/nixos-container: ensure that the state-dir is cleaned up if a build fails 2020-02-11 14:42:30 +01:00
Eelco Dolstra
fb051f0dec nixos-{rebuild,container}: Use flakeref#attrpath syntax
This makes them consistent with the 'nix' command line.
2020-02-05 23:15:18 +01:00
Eelco Dolstra
20087bd553 nixos-container: Add flake support
E.g. to create a container that runs the NixOS homepage:

  $ nixos-container create homepage --flake nixos-homepage

And to upgrade it:

  $ nixos-container update homepage
2020-02-05 23:15:18 +01:00
Sascha Grunert
16bca7814a
cri-tools: 1.16.1 -> v1.17.0
Signed-off-by: Sascha Grunert <sgrunert@suse.com>
2019-12-16 09:48:03 +01:00
gege251
a1c8ec7c32
amazon-ecs-cli: enable on darwin 2019-12-15 22:16:34 -05:00
Renaud
0b6d3933cb
ec2-utils: fix meta.license
It's licensed under Apache License 2.0 (asl20) and not under
the Apple Public License 2.0 (apsl20)
2019-11-29 15:13:34 +01:00
R. RyanTM
1eb951d217 amazon-ecs-cli: 1.17.0 -> 1.18.0 2019-11-28 12:22:06 -08:00
Sarah Brofeldt
6a0486b206
Merge pull request #69098 from saschagrunert/cri-tools
cri-tools: 1.15.0 -> 1.16.1
2019-11-19 08:33:10 +01:00
Jörg Thalheim
b55a7a3a57
ec2-utils: init at 0.5.1, include in amazon-image profile (#67347)
ec2-utils: init at 0.5.1, include in amazon-image profile
2019-11-01 20:57:44 +00:00
R. RyanTM
99df22190c amazon-ecs-cli: 1.16.0 -> 1.17.0 (#71485)
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/amazon-ecs-cli/versions
2019-10-23 16:58:23 +02:00
Sascha Grunert
10fe9b16b8
cri-tools: 1.15.0 -> 1.16.1
Signed-off-by: Sascha Grunert <sgrunert@suse.com>
2019-10-02 11:28:28 +02:00
R. RyanTM
3970bded3e amazon-ecs-cli: 1.15.1 -> 1.16.0
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/amazon-ecs-cli/versions
2019-09-25 22:01:15 -07:00
Franz Pletz
a0a3f5c86c
Merge pull request #67332 from uvNikita/nixos-container/run
nixos-container: use systemd-run instead of nsenter
2019-09-14 13:22:35 +00:00
Vladimír Čunát
f21211ebfe
Merge branch 'master' into staging 2019-09-02 23:25:24 +02:00
Maximilian Bosch
ad70c1ca54
Merge pull request #67904 from sigma/pr/govmomi-0.21.0
govc: 0.20.0 -> 0.21.0
2019-09-01 23:34:27 +02:00
Yann Hodique
94387290a3 govc: 0.20.0 -> 0.21.0 2019-09-01 13:52:56 -07:00
Florian Klink
e95d4c734a google-compute-config.nix: use sysctl snippets from gce
We make them available at ${gce}/sysctl.d and add them to
environments.etc, like we do with the systemd ones.
2019-09-01 02:55:28 +02:00
Florian Klink
10f5f8c5d8 google-compute-engine: patch shebangs in $out/bin, properly patch systemctl 2019-09-01 01:23:18 +02:00
volth
08f68313a4 treewide: remove redundant rec 2019-08-28 11:07:32 +00:00
Andrew Childs
a5ca97028f ec2-utils: init at 0.5.1 2019-08-23 23:27:49 +09:00
Nikita Uvarov
7cb100b683
nixos-container: use systemd-run instead of nsenter
This is the first step for unprivileged nixos containers support.
Fixes #30019. See also #18825, #57083, and #67130.
2019-08-23 12:21:22 +02:00
volth
c814d72b51 treewide: name -> pname 2019-08-17 10:54:38 +00:00
volth
46420bbaa3 treewide: name -> pname (easy cases) (#66585)
treewide replacement of

stdenv.mkDerivation rec {
  name = "*-${version}";
  version = "*";

to pname
2019-08-15 13:41:18 +01:00
Sascha Grunert
3efc04c41d
cri-tools: 1.14.0 -> 1.15.0
- Fix go build process to include critest as well.
- Fix GitHub repo location to be `kubernetes-sigs`
- Add me as maintainer

Signed-off-by: Sascha Grunert <sgrunert@suse.com>
2019-08-14 09:16:31 +02:00
Matthieu Coudron
f0ccd4002b mininet: 2.3.0d4 -> 2.3.0d6 2019-08-05 21:20:43 +09:00
Orivej Desh
a1d9aca602 google-compute-engine-oslogin: update /bin/bash substitution 2019-07-29 23:28:40 +00:00
Orivej Desh
cf979f246e google-compute-engine-oslogin: 1.4.3 -> 1.5.3 2019-07-29 16:01:50 +00:00
Meghea Iulian
6510c45b56 distrobuilder: 2018_10_04 -> 2019_10_07 2019-07-19 11:06:13 +03:00
R. RyanTM
6f8a7408d9 amazon-ecs-cli: 1.14.1 -> 1.15.1
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/amazon-ecs-cli/versions
2019-07-14 22:24:43 -07:00
worldofpeace
3f4a353737 treewide: use dontUnpack 2019-07-01 04:23:51 -04:00
volth
b3cc65f8b9 buildPerlPackage: name -> (pname, version) 2019-06-20 15:56:50 +00:00
volth
f3282c8d1e treewide: remove unused variables (#63177)
* treewide: remove unused variables

* making ofborg happy
2019-06-16 19:59:05 +00:00
Franz Pletz
ff05703611
Merge pull request #62701 from dtzWill/update/podman-cni-and-containers-oh-my
podman, cni{,-plugins}, cri*: updates
2019-06-07 11:54:52 +00:00
Will Dietz
159b0ccbd8
Merge pull request #62699 from dtzWill/update/udocker-1.1.3
udocker: 1.1.1 -> 1.1.3
2019-06-06 23:33:24 -05:00
Robin Gloster
2cca7180c1
Merge pull request #60029 from Ma27/configure-ipv4-for-imperative-container
nixos-container: allow setting custom local and host address
2019-06-06 07:35:07 +00:00
Will Dietz
786bfe0c27
cri-tools: nixpkgs-fmt 2019-06-04 15:47:22 -05:00
Will Dietz
56cc125368
cri-tools: 1.0.0-alpha.0 -> 1.14.0 2019-06-04 15:46:16 -05:00
Will Dietz
0a51adea73
udocker: 1.1.1 -> 1.1.3
https://github.com/indigo-dc/udocker/releases/tag/v1.1.3
2019-06-04 15:36:13 -05:00
R. RyanTM
292c1d3774 amazon-ecs-cli: 1.14.0 -> 1.14.1
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/amazon-ecs-cli/versions
2019-05-31 20:46:38 -07:00
R. RyanTM
41c65fa5ac amazon-ecs-cli: 1.13.1 -> 1.14.0
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/amazon-ecs-cli/versions
2019-04-29 21:09:40 -07:00
Daniel Schaefer
92cccb6f83 treewide: Use HTTPS for readthedocs URLs 2019-04-22 20:46:18 +02:00
Maximilian Bosch
c957341ef5
nixos-container: allow setting custom local and host address
I have a nixops network where I deploy containers using the `container`
backend which uses `nixos-container` intenrally to deploy several
containers to a certain host.

During that time I removed and added new containers and while trying to
deploy those to a different host I realized that it isn't guaranteed
that each container gets the same IP address which is a problem as some
parts of the deployment need to know which container is using which IP
(i.e. to configure port forwarding on the host).

With this change you can specify the container's IP like this (and don't
have to use the arbitrarily used 10.233.0.0/16 subnet):

```
$ nixos-container create test --config-file test-container.nix \
    --local-address 10.235.1.2 --host-address 10.235.1.1
```
2019-04-22 18:13:45 +02:00
Nick Novitski
33870626e6 govc: 0.16.0 -> 0.20.0 (#58986) 2019-04-08 12:26:39 +02:00
R. RyanTM
b10b7c4074 amazon-ecs-cli: 1.12.1 -> 1.13.1 (#58620)
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/amazon-ecs-cli/versions
2019-04-07 16:01:32 +02:00
Jaka Hudoklin
0a06afa7ed
Merge pull request #55898 from xtruder/pkgs/rootlesskit/init
feat(roolesskit): init at 0.3.0-alpha.2
2019-03-26 12:58:30 +01:00
Josef Kemetmüller
61a8aca8e5 udocker: Fix build (#57002)
The latest changes to support better cross-compilation compatibility
have introduced a stricter handling of dependency specifications in
python. Since b4acd97, mock and nosetest should be checkInputs, since
they are used for testing.

Fixes: #56972
2019-03-07 22:55:12 +01:00
Scott Dunlop
5f2252cc6a awless: 0.0.14 -> 0.1.11 (#54121) 2019-02-24 02:37:30 +01:00
Jaka Hudoklin
c460176ce4
feat(roolesskit): init at 0.3.0-alpha.2 2019-02-19 22:16:11 +01:00
Matthew Bauer
5c09d977c7 Merge remote-tracking branch 'origin/master' into staging 2019-02-09 12:14:06 -05:00
R. RyanTM
4cd3944a1b google-compute-engine: 20181206 -> 20190124 (#55312)
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/google-compute-engine/versions
2019-02-06 11:02:31 +00:00
Vladimír Čunát
3fe32b675e
Merge branch 'master' into staging 2019-01-22 15:59:42 +01:00
Raphael Borun Das Gupta
077a5cfedb udocker: change homepage to documentation on gitbooks.io
as that view, other than the gitbook.com one, is available to
readers not logged into GitBook, too.
2019-01-19 02:15:41 +01:00
rnhmjoj
bcf54ce5bb
treewide: use ${stdenv.shell} instead of /bin/sh where possible 2019-01-16 20:37:15 +01:00
Frederik Rietdijk
9618abe87c Merge master into staging-next 2019-01-04 21:13:19 +01:00
R. RyanTM
7ff3ccfa74 google-compute-engine: 20181023 -> 20181206 (#52894)
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/google-compute-engine/versions
2019-01-04 16:25:54 +01:00
Frederik Rietdijk
092e3b50a8 Merge master into staging-next 2019-01-02 21:08:27 +01:00
Joachim F
7db540633f
Merge pull request #52605 from Scriptkiddi/amazon-ecs-cli
amazon-ecs-cli: init at 1.12.1
2019-01-02 18:18:12 +00:00
Fritz Otlinghaus
8cb8b2be91 amazon-ecs-cli: init at 1.12.1 2018-12-28 08:32:40 +08:00
Jan Tojnar
ef935fa101
Merge branch 'master' into staging 2018-12-24 15:02:29 +01:00
Florian Klink
fb41136208 google-compute-engine-oslogin: init at 1.4.3 2018-12-21 17:52:37 +01:00
volth
fed7914539
Merge branch 'staging' into make-perl-pathd 2018-12-18 17:13:27 +00:00
volth
bb9557eb7c lib.makePerlPath -> perlPackages.makePerlPath 2018-12-15 03:50:31 +00:00
Meghea Iulian
efe8be7fd4 distrobuilder: 2018_06_29 -> 2018_10_04 2018-12-09 18:38:23 +02:00
Ding Xiang Fei
f4414da64a use interactive bash for gce 2018-12-05 09:47:01 +08:00
Frederik Rietdijk
c31cb577ae Merge master into staging-next 2018-11-22 09:57:08 +01:00
Matthieu Coudron
35f74c3608 mininet: init at 2.3.0d4 (#41261)
Mininet (https://github.com/mininet/mininet) is a popular network emulator that
glues several components such as network namespaces, traffic control
commands into a set of python bindings. It is then "easy" to describe a
topology and run experiments on it.
2018-11-21 23:33:10 +00:00
Frederik Rietdijk
aabf1a93bc Merge staging-next into staging 2018-11-20 11:51:11 +01:00
R. RyanTM
9434dc3dfb google-compute-engine: 20181011 -> 20181023 (#50751)
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/google-compute-engine/versions
2018-11-19 18:19:15 +01:00
Frederik Rietdijk
1d3bff25db Merge staging-next into staging 2018-11-11 14:28:08 +01:00
R. RyanTM
c5f42c7d35 google-compute-engine: 20180905 -> 20181011
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/google-compute-engine/versions
2018-11-09 19:03:58 -08:00
Patrick Hilhorst
9ec40cc3bf
treewide: Fix overrides having wrong versions 2018-11-06 00:06:21 +01:00
volth
f65dfb3caf buildPerlPackage -> perlPackages.buildPerlPackage 2018-10-14 09:10:41 +02:00
zimbatm
9fb79868ab google-compute-engine: 20180510 -> 20180905
The list of corresponding NixOS services are also updated
2018-09-26 11:48:16 +02:00
Maximilian Bosch
baa7e52fe0 python3Packages.google-compute-engine: fix build (#47267)
The dependency `distro` was missing.
See https://hydra.nixos.org/build/81330387

Addresses #45960
2018-09-24 15:50:52 +02:00
R. RyanTM
035b2f5250 google-compute-engine: 20180129 -> 20180510 (#46278)
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
google-compute-engine
2018-09-13 20:09:08 +01:00
Markus Kowalewski
4f0010dbec
euca2ools: update homepage 2018-09-07 23:51:50 +02:00
Robert Schütz
dbd3d509e0 awsebcli: use python3
Its dependency cement is disabled on python2 since 36a4df6.
2018-09-01 10:41:37 +02:00
Markus Kowalewski
5c395d5095
cri-tools: add license 2018-08-15 21:55:04 +02:00
volth
cc55a3ebcb treewide: fix build with disallowed aliases (#43872)
fixes build with disallowed aliases
2018-07-21 22:03:24 -04:00
volth
52f53c69ce pkgs/*: remove unreferenced function arguments 2018-07-21 02:48:04 +00:00
Meghea Iulian
66e18c3aab distrobuilder: 2018_04_28 -> 2018_06_29 (#42810) 2018-06-30 18:46:00 +02:00
Silvan Mosberger
57bccb3cb8 treewide: http -> https sources (#42676)
* treewide: http -> https sources

This updates the source urls of all top-level packages from http to
https where possible.

* buildtorrent: fix url and tab -> spaces
2018-06-28 20:43:35 +02:00
Ryan Mulligan
0d5eb901ad treewide: http -> https 2018-06-23 04:34:55 -07:00
Ryan Mulligan
af9d10a91b treewide: fix derivation names 2018-05-28 05:59:57 -07:00
Unknown
37af5704f9 distrobuilder: init at HEAD
Implement feedback
2018-05-12 21:14:10 +03:00
Peter Hoeg
236a9189e3
Merge pull request #39717 from peterhoeg/f/container
nixos-container: support restarts
2018-05-02 07:33:42 +00:00
Ruben Maher
e8dcf87007 awsebcli: 3.12.3 -> 3.12.4 2018-04-27 10:29:19 +09:30
Ruben Maher
ffe9f0a2bb awsebcli: pin pathspec dependency to 0.5.5
pathspec has been bumped to 0.5.6 in c705acef and awsebcli's setup.py refuses to
use that version.
2018-04-27 10:29:19 +09:30
Ryan Mulligan
d32983a1ca google-compute-engine: 20170914 -> 20180129 (#36565)
Semi-automatic update. These checks were done:

- built on NixOS
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/optimize_local_ssd -h` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/optimize_local_ssd --help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/optimize_local_ssd help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/set_multiqueue -h` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/set_multiqueue --help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/set_multiqueue help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/set_multiqueue -V` and found version 20180129
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/set_multiqueue -v` and found version 20180129
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/set_multiqueue --version` and found version 20180129
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/set_multiqueue version` and found version 20180129
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/set_multiqueue -h` and found version 20180129
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/set_multiqueue --help` and found version 20180129
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/set_multiqueue help` and found version 20180129
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/.google_accounts_daemon-wrapped -h` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/.google_accounts_daemon-wrapped --help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/google_accounts_daemon -h` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/google_accounts_daemon --help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/.google_instance_setup-wrapped -h` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/.google_instance_setup-wrapped --help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/google_instance_setup -h` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/google_instance_setup --help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/.google_network_setup-wrapped -h` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/.google_network_setup-wrapped --help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/google_network_setup -h` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/google_network_setup --help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/.google_ip_forwarding_daemon-wrapped -h` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/.google_ip_forwarding_daemon-wrapped --help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/.google_ip_forwarding_daemon-wrapped help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/google_ip_forwarding_daemon -h` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/google_ip_forwarding_daemon --help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/google_ip_forwarding_daemon help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/.google_clock_skew_daemon-wrapped -h` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/.google_clock_skew_daemon-wrapped --help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/.google_clock_skew_daemon-wrapped help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/google_clock_skew_daemon -h` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/google_clock_skew_daemon --help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/google_clock_skew_daemon help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/.google_metadata_script_runner-wrapped -h` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/.google_metadata_script_runner-wrapped --help` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/google_metadata_script_runner -h` got 0 exit code
- ran `/nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129/bin/google_metadata_script_runner --help` got 0 exit code
- found 20180129 with grep in /nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129
- found 20180129 in filename of file in /nix/store/xxf54yjdmhkmsy5h0rrh985lygpi3sjv-google-compute-engine-20180129

only build on Linux
2018-04-23 22:03:19 +01:00
Peter Hoeg
b95a24fdf1 nixos-container: support restarts 2018-04-20 11:07:07 +08:00
Franz Pletz
5461e72cc9
Merge pull request #32992 from nh2/fix-32545-blocking-container-destroy
nixos-container: Fix `destroy` terminating before it's done. Fixes #32545
2018-03-12 21:27:50 +00:00
Ruben Maher
411b7869d2 awsebcli: clean up derivation 2018-02-28 10:10:05 +10:30