Skip to content

Commit

Permalink
Merge branch 'staging'
Browse files Browse the repository at this point in the history
Hydra looks very good: https://hydra.nixos.org/eval/1409475?compare=1409440
There's mainly some fallout from aarch64-linux not building `go`
on the first attempt.
  • Loading branch information
vcunat committed Nov 12, 2017
2 parents a41478c + 8559b6d commit ab1859e
Show file tree
Hide file tree
Showing 9 changed files with 31 additions and 25 deletions.
Expand Up @@ -53,9 +53,6 @@ stdenv.mkDerivation {
NIX_LDFLAGS = stdenv.lib.optionalString (!stdenv.cc.isClang) "-lgcc_s"
+ stdenv.lib.optionalString (stdenv.isFreeBSD) "-lthr";

# without this, git fails when trying to check for /etc/gitconfig existence
propagatedSandboxProfile = stdenv.lib.sandbox.allowDirectoryList "/etc";

makeFlags = "prefix=\${out} PERL_PATH=${perl}/bin/perl SHELL_PATH=${stdenv.shell} "
+ (if pythonSupport then "PYTHON_PATH=${python}/bin/python" else "NO_PYTHON=1")
+ (if stdenv.isSunOS then " INSTALL=install NO_INET_NTOP= NO_INET_PTON=" else "")
Expand Down
7 changes: 3 additions & 4 deletions pkgs/data/misc/iana-etc/default.nix
Expand Up @@ -2,16 +2,15 @@

stdenv.mkDerivation rec {
name = "iana-etc-${version}";
version = "20170512";
version = "20171106";

src = fetchurl {
url = "https://github.com/Mic92/iana-etc/releases/download/${version}/iana-etc-${version}.tar.gz";
sha256 = "0zx2ag894qldvrv8f4hs84644kdcp8a83gjg33xsw8rrn38gll2a";
sha256 = "0pbmq95gdkp66cljwklv4gzh8lvl30l4k77hfwvrxz5mfqia6qdd";
};

installPhase = ''
mkdir -p $out/etc
cp services protocols $out/etc/
install -D -t $out/etc services protocols
'';

meta = with stdenv.lib; {
Expand Down
Expand Up @@ -128,7 +128,7 @@ let
++ optional hostPlatform.isCygwin expat
++ [ db gdbm ncurses sqlite readline ]
++ optionals x11Support [ tcl tk xlibsWrapper libX11 ]
++ optionals stdenv.isDarwin [ CF configd ];
++ optionals stdenv.isDarwin ([ CF ] ++ optional (configd != null) configd);

mkPaths = paths: {
C_INCLUDE_PATH = makeSearchPathOutput "dev" "include" paths;
Expand Down
4 changes: 2 additions & 2 deletions pkgs/development/libraries/webkitgtk/2.18.nix
Expand Up @@ -12,7 +12,7 @@ assert enableGeoLocation -> geoclue2 != null;
with stdenv.lib;
stdenv.mkDerivation rec {
name = "webkitgtk-${version}";
version = "2.18.1";
version = "2.18.2";

meta = {
description = "Web content rendering engine, GTK+ port";
Expand Down Expand Up @@ -42,7 +42,7 @@ stdenv.mkDerivation rec {

src = fetchurl {
url = "http://webkitgtk.org/releases/${name}.tar.xz";
sha256 = "15fp7szmkpannx7avsynf0nv3y343qwq0fvq3rz2m2mw5wq7pnww";
sha256 = "1ry8zvv6k01g9p7agg326n0ziqpqjxd49h5w1b2is6rjnpqv6k5i";
};

# see if we can clean this up....
Expand Down
11 changes: 7 additions & 4 deletions pkgs/os-specific/darwin/apple-sdk/default.nix
Expand Up @@ -136,10 +136,13 @@ let
# don't use pure CF for dylibs that depend on frameworks
setupHook = ./framework-setup-hook.sh;

# allows building the symlink tree
__impureHostDeps = [ "/System/Library/Frameworks/${name}.framework" ];

__propagatedImpureHostDeps = stdenv.lib.optional (name != "Kernel") "/System/Library/Frameworks/${name}.framework/${name}";
# Not going to be more specific than this for now
__propagatedImpureHostDeps = stdenv.lib.optionals (name != "Kernel") [
# The setup-hook ensures that everyone uses the impure CoreFoundation who uses these SDK frameworks, so let's expose it
"/System/Library/Frameworks/CoreFoundation.framework"
"/System/Library/Frameworks/${name}.framework"
"/System/Library/Frameworks/${name}.framework/${name}"
];

meta = with stdenv.lib; {
description = "Apple SDK framework ${name}";
Expand Down
Expand Up @@ -84,9 +84,6 @@ in appleDerivation {
];
setOutputFlags = false;

# ps uses this syscall to get process info
propagatedSandboxProfile = stdenv.lib.sandbox.allow "mach-priv-task-port";

meta = {
platforms = stdenv.lib.platforms.darwin;
maintainers = with stdenv.lib.maintainers; [ gridaphobe ];
Expand Down
10 changes: 10 additions & 0 deletions pkgs/tools/archivers/sharutils/default.nix
Expand Up @@ -13,6 +13,16 @@ stdenv.mkDerivation rec {
# GNU Gettext is needed on non-GNU platforms.
buildInputs = [ coreutils gettext ];

# These tests try to hit /etc/passwd to find out your username if pass in a submitter
# name on the command line. Since we block access to /etc/passwd on the Darwin sandbox
# that cause shar to just segfault. It isn't a problem on Linux because their sandbox
# remaps /etc/passwd to a trivial file, but we can't do that on Darwin so I do this
# instead. In this case, I pass in the very imaginative "submitter" as the submitter name
patchPhase = ''
substituteInPlace tests/shar-1 --replace '$''\{SHAR}' '$''\{SHAR} -s submitter'
substituteInPlace tests/shar-2 --replace '$''\{SHAR}' '$''\{SHAR} -s submitter'
'';

doCheck = true;

crossAttrs = {
Expand Down
4 changes: 2 additions & 2 deletions pkgs/tools/misc/parallel/default.nix
@@ -1,11 +1,11 @@
{ fetchurl, stdenv, perl, makeWrapper, procps }:

stdenv.mkDerivation rec {
name = "parallel-20170722";
name = "parallel-20171022";

src = fetchurl {
url = "mirror://gnu/parallel/${name}.tar.bz2";
sha256 = "117g50bx1kcbrqix0f1539z5rzhvgsni2wddjv939wcxkrdb1idx";
sha256 = "18pq10npl7g764ww7cy9r5n5s3kiy984jclf932qfgndcxsbpqpp";
};

nativeBuildInputs = [ makeWrapper perl ];
Expand Down
12 changes: 6 additions & 6 deletions pkgs/tools/networking/openssh/default.nix
Expand Up @@ -13,11 +13,11 @@ assert withGssapiPatches -> withKerberos;
let

# **please** update this patch when you update to a new openssh release.
gssapiSrc = fetchpatch {
gssapiPatch = fetchpatch {
name = "openssh-gssapi.patch";
url = "https://anonscm.debian.org/cgit/pkg-ssh/openssh.git/plain/debian"
+ "/patches/gssapi.patch?id=db2122d97eb1ecdd8d99b7bf79b0dd2b5addfd92";
sha256 = "1rw10pmvjw55521ys59x1kabvbvmla506znakwwjijggdsakvsjm";
+ "/patches/gssapi.patch?id=1e0d55f9163793742d20eaadd4784db16fd3459d";
sha256 = "130phj87q87p9crigd6852nnaqsqkfg09h45a32lk4524h9kkxgb";
};

in
Expand All @@ -26,7 +26,7 @@ stdenv.mkDerivation rec {
# Please ensure that openssh_with_kerberos still builds when
# bumping the version here!
name = "openssh-${version}";
version = "7.5p1";
version = if hpnSupport then "7.5p1" else "7.6p1";

src = if hpnSupport then
fetchurl {
Expand All @@ -36,7 +36,7 @@ stdenv.mkDerivation rec {
else
fetchurl {
url = "mirror://openbsd/OpenSSH/portable/${name}.tar.gz";
sha256 = "1w7rb5gbrikxdkp8w7zxnci4549gk4bw1lml01s59w5rzb2y6ilq";
sha256 = "08qpsb8mrzcx8wgvz9insiyvq7sbg26yj5nvl2m5n57yvppcl8x3";
};

patches =
Expand All @@ -47,7 +47,7 @@ stdenv.mkDerivation rec {
# See discussion in https://github.com/NixOS/nixpkgs/pull/16966
./dont_create_privsep_path.patch
]
++ optional withGssapiPatches gssapiSrc;
++ optional withGssapiPatches gssapiPatch;

postPatch =
# On Hydra this makes installation fail (sometimes?),
Expand Down

0 comments on commit ab1859e

Please sign in to comment.