nixpkgs/pkgs/tools/admin/salt/default.nix

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

67 lines
1.7 KiB
Nix
Raw Normal View History

2020-04-19 16:19:26 +03:00
{ lib
, python3
, openssl
# Many Salt modules require various Python modules to be installed,
# passing them in this array enables Salt to find them.
2020-04-19 16:19:26 +03:00
, extraInputs ? []
}:
2021-10-23 12:08:19 +03:00
let
py = python3.override {
packageOverrides = self: super: {
# Incompatible with pyzmq 22
pyzmq = super.pyzmq.overridePythonAttrs (oldAttrs: rec {
version = "21.0.2";
src = oldAttrs.src.override {
inherit version;
sha256 = "CYwTxhmJE8KgaQI1+nTS5JFhdV9mtmO+rsiWUVVMx5w=";
};
});
};
};
in
py.pkgs.buildPythonApplication rec {
2017-05-19 10:33:32 +03:00
pname = "salt";
2022-03-28 23:03:28 +03:00
version = "3004.1";
2021-10-23 12:08:19 +03:00
src = py.pkgs.fetchPypi {
2017-05-19 10:33:32 +03:00
inherit pname version;
2022-03-28 23:03:28 +03:00
hash = "sha256-fzRKJDJkik8HjapazMaNzf/hCVzqE+wh5QQTVg8Ewpg=";
};
2021-10-23 12:08:19 +03:00
propagatedBuildInputs = with py.pkgs; [
2020-06-18 22:38:54 +03:00
distro
jinja2
markupsafe
2018-07-08 17:34:10 +03:00
msgpack
2021-10-23 12:08:19 +03:00
psutil
2020-06-18 22:38:54 +03:00
pycryptodomex
pyyaml
pyzmq
requests
2020-08-29 15:04:05 +03:00
tornado
] ++ extraInputs;
patches = [ ./fix-libcrypto-loading.patch ];
postPatch = ''
substituteInPlace "salt/utils/rsax931.py" \
treewide: use lib.getLib for OpenSSL libraries At some point, I'd like to make another attempt at 71f1f4884b5 ("openssl: stop static binaries referencing libs"), which was reverted in 195c7da07df. One problem with my previous attempt is that I moved OpenSSL's libraries to a lib output, but many dependent packages were hardcoding the out output as the location of the libraries. This patch fixes every such case I could find in the tree. It won't have any effect immediately, but will mean these packages will automatically use an OpenSSL lib output if it is reintroduced in future. This patch should cause very few rebuilds, because it shouldn't make any change at all to most packages I'm touching. The few rebuilds that are introduced come from when I've changed a package builder not to use variable names like openssl.out in scripts / substitution patterns, which would be confusing since they don't hardcode the output any more. I started by making the following global replacements: ${pkgs.openssl.out}/lib -> ${lib.getLib pkgs.openssl}/lib ${openssl.out}/lib -> ${lib.getLib openssl}/lib Then I removed the ".out" suffix when part of the argument to lib.makeLibraryPath, since that function uses lib.getLib internally. Then I fixed up cases where openssl was part of the -L flag to the compiler/linker, since that unambigously is referring to libraries. Then I manually investigated and fixed the following packages: - pycurl - citrix-workspace - ppp - wraith - unbound - gambit - acl2 I'm reasonably confindent in my fixes for all of them. For acl2, since the openssl library paths are manually provided above anyway, I don't think openssl is required separately as a build input at all. Removing it doesn't make a difference to the output size, the file list, or the closure. I've tested evaluation with the OfBorg meta checks, to protect against introducing evaluation failures.
2022-03-25 18:33:21 +03:00
--subst-var-by "libcrypto" "${lib.getLib openssl}/lib/libcrypto.so"
substituteInPlace requirements/base.txt \
--replace contextvars ""
'';
# The tests fail due to socket path length limits at the very least;
# possibly there are more issues but I didn't leave the test suite running
# as is it rather long.
doCheck = false;
2020-04-19 16:19:26 +03:00
meta = with lib; {
homepage = "https://saltproject.io/";
changelog = "https://docs.saltproject.io/en/latest/topics/releases/${version}.html";
description = "Portable, distributed, remote execution and configuration management system";
maintainers = with maintainers; [ Flakebi ];
license = licenses.asl20;
};
}