-
-
Notifications
You must be signed in to change notification settings - Fork 14.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
sonarr: 3.0.10.1567 -> 4.0.0.748 #278050
sonarr: 3.0.10.1567 -> 4.0.0.748 #278050
Conversation
Perhaps you'd like to give this a try, @dacioromero. |
Open questions from my side:
|
16e063e
to
615d5ce
Compare
Some points of note:
We probably need to add
We probably need to at least note the possible breakage in the 24.05 release notes. |
I've force-pushed a couple of changes trying to get this to run on my
In an ideal world we'd just build from source, but that started to feel painful. I pushed my changes to a branch in case anyone is interested. |
b14706f
to
1a12f0a
Compare
I think I have this working now, using the I also added a release note to flag the potential config issue, and rebased against |
One thing I decided not to do here was renaming the main executable we produce from |
@purcell Thanks for getting on this! I just tried importing my v4 backup from an OCI container I was running and it seems to have mostly worked except it failed to restart. Restarting the service manually seems to fix it.
Migrating from v3 to v4 also seems to work. I reverted to v3, restored my v3 backup, and then upgraded and all my series were still there. This is how I am testing v4 services.sonarr =
let
sonarr4 = import
(builtins.fetchTarball {
url = "https://github.com/purcell/nixpkgs/archive/16d725c6f48995ed905d0f70adf7f9a9a4445415.tar.gz";
sha256 = "02daj2xgq9k9mp7s3xdh7p6m0i4l8i3id7i7kxzgpfh9r8h6h3jl";
})
{
inherit (config.nixpkgs) config;
system = "x86_64-linux";
};
package = sonarr4.sonarr;
in
{
enable = true;
openFirewall = true;
user = "media";
group = "media";
inherit package;
}; |
Thanks for the extra data point, @dacioromero. Seems to still be happily running for me without issues, so I think this is ready for review and potential merge. |
@Sorixelle That's great, thanks so much for sharing! My suggestion would be that we merge this PR first, and then as one of the maintainers I'll definitely pursue getting the source build working based on your code. |
Resolved conflict in the changelog, still ready for merge. |
Since Sonarr v4 should be a drop-in replacement for Sonarr v3, perhaps we can keep the current v3
FWIW here is my take on source build: https://github.com/tie-infra/nix-config/tree/5db5a22c753c4b15549c750f75802c0049ab5671/parts/sonarr-v4 |
Thanks @tie: using your code the build failed for me locally (aarch64-darwin, sandboxed). 😔 https://gist.github.com/purcell/62d4bb42681e560a39035454f9f04243 |
Maybe? It's probably not for me to say, as a somewhat casual maintainer. It sounds reasonable but I am unfamiliar with the processes, conventions and logistics needed to make it happen. |
Uh, I think it would be easier to disable checks on Darwin, tie-infra/nix-config@b94250d |
In general, as long as the change is acceptable for releases (as in CONTRIBUTING.md), tagging the PR with backport release-YY.MM label is enough, and the bot then creates backport PR (that is merged separately). In this case, adding Regarding source build, I took some time to implement fixes for |
This would be the first time such a process has been used for either The only reason folks are suggesting the If the latter is sufficient to be considered a breaking change, and the release note isn't enough, I would personally suggest we not backport this rather than do the |
How to move this forward? I'm a maintainer for this derivation, but I don't have the commit bit. What buy-in is necessary for the change to get merged in its current form, or who decides what must or should be done here? |
I've been using this patch for some time now, and I don't think we should wait to merge this. Generally the move from mono to dotnet provides many benefits, one of them (and the reason I've started to use this patch), is because of IPv6 support. Adding it to the release notes should suffice, but, I'm not sure if we can get any higher power to look into this. |
Rebased to resolve conflict in release notes. |
This pull request has been mentioned on NixOS Discourse. There might be relevant details there: https://discourse.nixos.org/t/prs-ready-for-review/3032/3389 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
especially the version re-use must be fixed before this can be merged
Also switch to using assets attached to GitHub releases, which now seems to be the official download location.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
diff LGTM, didn't try myself but I want to free the author out of his waiting 🙈
Thanks @SuperSandro2000! ❤️ |
Description of changes
As pointed out in #278002 we were lagging a long way behind the latest releases, with v4 coming out in Nov 2022: https://forums.sonarr.tv/t/sonarr-v4-beta/31078
There's no longer a plain "linux" (actually cross-platform) package available for download, so I made an attempt to build from source (like jellyfin) but abandoned it due to obscure issues with an apparently-vendored .NET library, instead opting to follow the pattern of per-platform downloads used for
radarr
.Things done
nix.conf
? (See Nix manual)sandbox = relaxed
sandbox = true
nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD"
. Note: all changes have to be committed, also see nixpkgs-review usage./result/bin/
)Add a 👍 reaction to pull requests you find important.