summaryrefslogtreecommitdiffstats
path: root/pkgs/applications/networking/cloudflared/default.nix
diff options
context:
space:
mode:
authorPiper McCorkle <contact@piperswe.me>2022-09-04 19:33:21 -0500
committerPiper McCorkle <contact@piperswe.me>2022-12-13 18:31:54 -0600
commit91ccc070208d5a27df308dad2e751209e69d9aba (patch)
tree0437ae7fe0aa0c44ee2b45cf2b522deffdd61adc /pkgs/applications/networking/cloudflared/default.nix
parente3e35e40579a9ac0ed8493168c2b66f5791e4bb7 (diff)
cloudflared: 2022.8.2 -> 2022.11.1, add tests and additional platforms
Diffstat (limited to 'pkgs/applications/networking/cloudflared/default.nix')
-rw-r--r--pkgs/applications/networking/cloudflared/default.nix60
1 files changed, 47 insertions, 13 deletions
diff --git a/pkgs/applications/networking/cloudflared/default.nix b/pkgs/applications/networking/cloudflared/default.nix
index 0ae2d3b35884..3930a2d4879b 100644
--- a/pkgs/applications/networking/cloudflared/default.nix
+++ b/pkgs/applications/networking/cloudflared/default.nix
@@ -1,14 +1,14 @@
-{ lib, buildGoModule, fetchFromGitHub, stdenv }:
+{ lib, buildGoModule, fetchFromGitHub, stdenv, callPackage }:
buildGoModule rec {
pname = "cloudflared";
- version = "2022.8.2";
+ version = "2022.11.1";
src = fetchFromGitHub {
- owner = "cloudflare";
- repo = "cloudflared";
- rev = version;
- hash = "sha256-Kyt5d3KmLefTVVUmUUU23UV0lghzhLFCKLlmwTjN68I=";
+ owner = "cloudflare";
+ repo = "cloudflared";
+ rev = version;
+ hash = "sha256-aG63CEJfEL9r0SviZu9VzArtt3e4VuAbOMaYk9atSGo=";
};
vendorSha256 = null;
@@ -17,22 +17,56 @@ buildGoModule rec {
preCheck = ''
# Workaround for: sshgen_test.go:74: mkdir /homeless-shelter/.cloudflared: no such file or directory
- export HOME="$(mktemp -d)";
+ export HOME="$(mktemp -d)"
# Workaround for: protocol_test.go:11:
# lookup protocol-v2.argotunnel.com on [::1]:53: read udp [::1]:51876->[::1]:53: read: connection refused
-
substituteInPlace "edgediscovery/protocol_test.go" \
--replace "TestProtocolPercentage" "SkipProtocolPercentage"
+
+ # Workaround for: origin_icmp_proxy_test.go:46:
+ # cannot create ICMPv4 proxy: socket: permission denied nor ICMPv6 proxy: socket: permission denied
+ substituteInPlace "ingress/origin_icmp_proxy_test.go" \
+ --replace "TestICMPRouterEcho" "SkipICMPRouterEcho"
+
+ # Workaround for: origin_icmp_proxy_test.go:110:
+ # cannot create ICMPv4 proxy: socket: permission denied nor ICMPv6 proxy: socket: permission denied
+ substituteInPlace "ingress/origin_icmp_proxy_test.go" \
+ --replace "TestConcurrentRequestsToSameDst" "SkipConcurrentRequestsToSameDst"
+
+ # Workaround for: origin_icmp_proxy_test.go:242:
+ # cannot create ICMPv4 proxy: socket: permission denied nor ICMPv6 proxy: socket: permission denied
+ substituteInPlace "ingress/origin_icmp_proxy_test.go" \
+ --replace "TestICMPRouterRejectNotEcho" "SkipICMPRouterRejectNotEcho"
+
+ # Workaround for: origin_icmp_proxy_test.go:108:
+ # Received unexpected error: cannot create ICMPv4 proxy: Group ID 100 is not between ping group 65534 to 65534 nor ICMPv6 proxy: socket: permission denied
+ substituteInPlace "ingress/origin_icmp_proxy_test.go" \
+ --replace "TestTraceICMPRouterEcho" "SkipTraceICMPRouterEcho"
+
+ # Workaround for: icmp_posix_test.go:28: socket: permission denied
+ substituteInPlace "ingress/icmp_posix_test.go" \
+ --replace "TestFunnelIdleTimeout" "SkipFunnelIdleTimeout"
+
+ # Workaround for: icmp_posix_test.go:88: Received unexpected error: Group ID 100 is not between ping group 65534 to 65534
+ substituteInPlace "ingress/icmp_posix_test.go" \
+ --replace "TestReuseFunnel" "SkipReuseFunnel"
+
+ # Workaround for: supervisor_test.go:49:
+ # Expected nil, but got: Could not lookup srv records on _us-v2-origintunneld._tcp.argotunnel.com: lookup _us-v2-origintunneld._tcp.argotunnel.com on [::1]:53: read udp [::1]:49342->[::1]:53: read: connection refused
+ substituteInPlace "supervisor/supervisor_test.go" \
+ --replace "Test_Initialize_Same_Protocol" "Skip_Initialize_Same_Protocol"
'';
doCheck = !stdenv.isDarwin;
+ passthru.tests.simple = callPackage ./tests.nix { inherit version; };
+
meta = with lib; {
- description = "CloudFlare Tunnel daemon (and DNS-over-HTTPS client)";
- homepage = "https://www.cloudflare.com/products/tunnel";
- license = licenses.asl20;
- platforms = platforms.unix;
- maintainers = with maintainers; [ bbigras enorris thoughtpolice ];
+ description = "Cloudflare Tunnel daemon, Cloudflare Access toolkit, and DNS-over-HTTPS client";
+ homepage = "https://www.cloudflare.com/products/tunnel";
+ license = licenses.asl20;
+ platforms = platforms.unix ++ platforms.windows;
+ maintainers = with maintainers; [ bbigras enorris thoughtpolice piperswe ];
};
}