Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

wireguard: 0.0.20180524 -> 0.0.20180531 #41649

Merged
merged 2 commits into from Jun 8, 2018
Merged

Conversation

zx2c4
Copy link
Contributor

@zx2c4 zx2c4 commented Jun 7, 2018

Simple version bump.

@Mic92
Copy link
Member

Mic92 commented Jun 8, 2018

@GrahamcOfBorg build wireguard-tools

@GrahamcOfBorg
Copy link

Failure on aarch64-linux (full log)

Attempted: wireguard-tools

Partial log (click to expand)

building '/nix/store/z91vl2ky6n722lyk6zx8ry8qvzpidag2-source.drv'...

trying https://git.zx2c4.com/WireGuard/snapshot/WireGuard-0.0.20180531.tar.xz
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100  263k    0  263k    0     0   341k      0 --:--:-- --:--:-- --:--:--  340k
unpacking source archive /build/WireGuard-0.0.20180531.tar.xz
fixed-output derivation produced path '/nix/store/1dcjqlhl9sgqrcdmrj802c7jqi8wcdi4-source' with sha256 hash '0944zxmpx2cs71nxl7rcyhpqlwplkzd7jsf1n66vflngw2sjxm03' instead of the expected hash '0g227wv20cm7fclbjzwlizs0gchxbpgms2fdnqd4jk0frjak0rgz'
cannot build derivation '/nix/store/2i8bpsl8j6w57dcqvnhlaqgd7ja1ys0y-wireguard-tools-0.0.20180531.drv': 1 dependencies couldn't be built
error: build of '/nix/store/2i8bpsl8j6w57dcqvnhlaqgd7ja1ys0y-wireguard-tools-0.0.20180531.drv' failed

@GrahamcOfBorg
Copy link

Failure on x86_64-linux (full log)

Attempted: wireguard-tools

Partial log (click to expand)

building '/nix/store/09ic2kakv5yv5lcxx33pcd3hsh7bfb33-source.drv'...

trying https://git.zx2c4.com/WireGuard/snapshot/WireGuard-0.0.20180531.tar.xz
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100  263k    0  263k    0     0   108k      0 --:--:--  0:00:02 --:--:--  108k
unpacking source archive /build/WireGuard-0.0.20180531.tar.xz
fixed-output derivation produced path '/nix/store/1dcjqlhl9sgqrcdmrj802c7jqi8wcdi4-source' with sha256 hash '0944zxmpx2cs71nxl7rcyhpqlwplkzd7jsf1n66vflngw2sjxm03' instead of the expected hash '0g227wv20cm7fclbjzwlizs0gchxbpgms2fdnqd4jk0frjak0rgz'
cannot build derivation '/nix/store/bbfa8apjv5rvm30jvk71g37im8kw9p8i-wireguard-tools-0.0.20180531.drv': 1 dependencies couldn't be built
error: build of '/nix/store/bbfa8apjv5rvm30jvk71g37im8kw9p8i-wireguard-tools-0.0.20180531.drv' failed

@GrahamcOfBorg
Copy link

Failure on x86_64-darwin (full log)

Attempted: wireguard-tools

Partial log (click to expand)

building '/nix/store/p8zidqkpjbsy56jydq1fsvigbx90gkaa-source.drv'...

trying https://git.zx2c4.com/WireGuard/snapshot/WireGuard-0.0.20180531.tar.xz
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100  263k    0  263k    0     0   382k      0 --:--:-- --:--:-- --:--:--  381k
unpacking source archive /private/tmp/nix-build-source.drv-0/WireGuard-0.0.20180531.tar.xz
fixed-output derivation produced path '/nix/store/1dcjqlhl9sgqrcdmrj802c7jqi8wcdi4-source' with sha256 hash '0944zxmpx2cs71nxl7rcyhpqlwplkzd7jsf1n66vflngw2sjxm03' instead of the expected hash '0g227wv20cm7fclbjzwlizs0gchxbpgms2fdnqd4jk0frjak0rgz'
cannot build derivation '/nix/store/ifm89l8vqcr58rg7g87a39nml9dvc7ji-wireguard-tools-0.0.20180531.drv': 1 dependencies couldn't be built
error: build of '/nix/store/ifm89l8vqcr58rg7g87a39nml9dvc7ji-wireguard-tools-0.0.20180531.drv' failed

@@ -8,7 +8,7 @@ stdenv.mkDerivation rec {

src = fetchzip {
url = "https://git.zx2c4.com/WireGuard/snapshot/WireGuard-${version}.tar.xz";
sha256 = "ff653095cc0e4c491ab6cd095ddf5d1db207f48f947fb92873a73220363f423c";
sha256 = "0944zxmpx2cs71nxl7rcyhpqlwplkzd7jsf1n66vflngw2sjxm03";
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The checksum is calculated over the content of the zip archive as it was unclear whether cgit might regenerate archives resulting in a different hash. nix-prefetch-url --unpack url can be used to generate those.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Interesting. I didn't know Nix could do this. How does it know which type of checksum it is? Does it just trial check all possibilities? Or does that hex string have a type built in somewhere?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It depends on the fetcher used. The default one is fetchurl. Here fetchzip is used.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Neat.

@Mic92 Mic92 merged commit 95f97cb into NixOS:master Jun 8, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants