Skip to content

Commit

Permalink
Merge branch 'staging-next' (PR #62209)
Browse files Browse the repository at this point in the history
  • Loading branch information
vcunat committed Jun 7, 2019
2 parents 276dc23 + 326148e commit 8f5edef
Show file tree
Hide file tree
Showing 50 changed files with 284 additions and 254 deletions.
3 changes: 3 additions & 0 deletions pkgs/applications/video/aegisub/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -48,6 +48,9 @@ stdenv.mkDerivation rec {

hardeningDisable = [ "bindnow" "relro" ];

# compat with icu61+ https://github.com/unicode-org/icu/blob/release-64-2/icu4c/readme.html#L554
CXXFLAGS = [ "-DU_USING_ICU_NAMESPACE=1" ];

# this is fixed upstream though not yet in an officially released version,
# should be fine remove on next release (if one ever happens)
NIX_LDFLAGS = [
Expand Down
10 changes: 2 additions & 8 deletions pkgs/applications/virtualization/qemu/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ let
in

stdenv.mkDerivation rec {
version = "3.1.0";
version = "4.0.0";
name = "qemu-"
+ stdenv.lib.optionalString xenSupport "xen-"
+ stdenv.lib.optionalString hostCpuOnly "host-cpu-only-"
Expand All @@ -44,7 +44,7 @@ stdenv.mkDerivation rec {

src = fetchurl {
url = "https://wiki.qemu.org/download/qemu-${version}.tar.bz2";
sha256 = "08frr1fdjx8qcfh3fafn10kibdwbvkqqvfl7hpqbm7i9dg4f1zlq";
sha256 = "085g6f75si8hbn94mnnjn1r7ysixn5bqj4bhqwvadj00fhzp2zvd";
};

nativeBuildInputs = [ python2 pkgconfig flex bison ];
Expand Down Expand Up @@ -78,13 +78,7 @@ stdenv.mkDerivation rec {
./no-etc-install.patch
./fix-qemu-ga.patch
./9p-ignore-noatime.patch
(fetchpatch {
name = "CVE-2019-3812.patch";
url = "https://git.qemu.org/?p=qemu.git;a=patch;h=b05b267840515730dbf6753495d5b7bd8b04ad1c";
sha256 = "03a5vc5wvirbyi5r8kb2r4m2w6f1zmh9bqsr2psh4pblwar0nf55";
})
] ++ optional nixosTestRunner ./force-uid0-on-9p.patch
++ optional pulseSupport ./fix-hda-recording.patch
++ optionals stdenv.hostPlatform.isMusl [
(fetchpatch {
url = https://raw.githubusercontent.com/alpinelinux/aports/2bb133986e8fa90e2e76d53369f03861a87a74ef/main/qemu/xattr_size_max.patch;
Expand Down
34 changes: 0 additions & 34 deletions pkgs/applications/virtualization/qemu/fix-hda-recording.patch

This file was deleted.

19 changes: 17 additions & 2 deletions pkgs/applications/virtualization/qemu/no-etc-install.patch
Original file line number Diff line number Diff line change
@@ -1,10 +1,25 @@
From 98b3e5993bbdb0013b6cc1814e0ad9555290c3af Mon Sep 17 00:00:00 2001
From: Will Dietz <w@wdtz.org>
Date: Tue, 23 Apr 2019 21:31:45 -0500
Subject: [PATCH] no install localstatedir

---
Makefile | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/Makefile b/Makefile
index 04a0d45050..5dc82d0eb7 100644
--- a/Makefile
+++ b/Makefile
@@ -597,7 +597,7 @@
@@ -786,7 +786,7 @@ endif

ICON_SIZES=16x16 24x24 32x32 48x48 64x64 128x128 256x256 512x512

-install: all $(if $(BUILD_DOCS),install-doc) install-datadir install-localstatedir
+install: all $(if $(BUILD_DOCS),install-doc) install-datadir
ifneq ($(TOOLS),)
$(call install-prog,$(subst qemu-ga,qemu-ga$(EXESUF),$(TOOLS)),$(DESTDIR)$(bindir))
$(call install-prog,$(subst qemu-ga,qemu-ga$(EXESUF),$(TOOLS)),$(DESTDIR)$(bindir))
endif
--
2.21.GIT

4 changes: 2 additions & 2 deletions pkgs/build-support/nuke-references/builder.sh
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ cat > $out/bin/nuke-refs <<EOF
excludes=""
while getopts e: o; do
case "\$o" in
e) storeId=\$(echo "\$OPTARG" | sed -n "s|^$NIX_STORE/\\([a-z0-9]\{32\}\\)-.*|\1|p")
e) storeId=\$(echo "\$OPTARG" | $perl/bin/perl -ne "print \"\\\$1\" if m|^\Q$NIX_STORE\E/([a-z0-9]{32})-.*|")
if [ -z "\$storeId" ]; then
echo "-e argument must be a Nix store path"
exit 1
Expand All @@ -20,7 +20,7 @@ shift \$((\$OPTIND-1))
for i in "\$@"; do
if test ! -L "\$i" -a -f "\$i"; then
cat "\$i" | $perl/bin/perl -pe "s|$NIX_STORE/\$excludes[a-z0-9]{32}-|$NIX_STORE/eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee-|g" > "\$i.tmp"
cat "\$i" | $perl/bin/perl -pe "s|\Q$NIX_STORE\E/\$excludes[a-z0-9]{32}-|$NIX_STORE/eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee-|g" > "\$i.tmp"
if test -x "\$i"; then chmod +x "\$i.tmp"; fi
mv "\$i.tmp" "\$i"
fi
Expand Down
2 changes: 2 additions & 0 deletions pkgs/data/misc/cacert/setup-hook.sh
Original file line number Diff line number Diff line change
@@ -1,4 +1,6 @@
cacertHook() {
export NIX_SSL_CERT_FILE=@out@/etc/ssl/certs/ca-bundle.crt
# left for compatibility
export SSL_CERT_FILE=@out@/etc/ssl/certs/ca-bundle.crt
}

Expand Down
25 changes: 25 additions & 0 deletions pkgs/data/misc/publicsuffix-list/default.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
{ lib, fetchFromGitHub }:

let
pname = "publicsuffix-list";
version = "2019-05-24";
in fetchFromGitHub rec {
name = "${pname}-${version}";
owner = "publicsuffix";
repo = "list";
rev = "a1db0e898956e126de65be1a5e977fbbbbeebe33";
sha256 = "092153w2jr7nx28p9wc9k6b5azi9c39ghnqfnfiwfzv1j8jm3znq";

postFetch = ''
tar xf $downloadedFile --strip=1
install -Dm0444 public_suffix_list.dat tests/test_psl.txt -t $out/share/publicsuffix
'';

meta = with lib; {
homepage = "https://publicsuffix.org/";
description = "Cross-vendor public domain suffix database";
platforms = platforms.all;
license = licenses.mpl20;
maintainers = [ maintainers.c0bw3b ];
};
}
6 changes: 3 additions & 3 deletions pkgs/development/compilers/go/1.11.nix
Original file line number Diff line number Diff line change
Expand Up @@ -29,12 +29,12 @@ let
in

stdenv.mkDerivation rec {
name = "go-${version}";
version = "1.11.6";
pname = "go";
version = "1.11.10";

src = fetchurl {
url = "https://dl.google.com/go/go${version}.src.tar.gz";
sha256 = "0cz1sdhxf9283p1p4jxb020pym0ncd0qlfh36r3hkv6bbm1a2vd9";
sha256 = "06rw962xigbrxblp942jbh7k133blpxg2xfrxi32qdhxkmmfj9yz";
};

# perl is used for testing go vet
Expand Down
6 changes: 3 additions & 3 deletions pkgs/development/compilers/go/1.12.nix
Original file line number Diff line number Diff line change
Expand Up @@ -29,12 +29,12 @@ let
in

stdenv.mkDerivation rec {
name = "go-${version}";
version = "1.12.1";
pname = "go";
version = "1.12.5";

src = fetchurl {
url = "https://dl.google.com/go/go${version}.src.tar.gz";
sha256 = "12l12mmgqvy3nbscy7sz83qj4m6iz5a322aq9sk45f7l9ml2gq8b";
sha256 = "1s034pr60h20lsw171vbzqxqvcqn0s04dxfyqczyfcmkrf4g199a";
};

# perl is used for testing go vet
Expand Down
2 changes: 1 addition & 1 deletion pkgs/development/interpreters/gauche/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ stdenv.mkDerivation rec {
"--with-iconv=${libiconv}"
"--with-dbm=gdbm"
"--with-zlib=${zlib}"
"--with-ca-bundle=$SSL_CERT_FILE"
"--with-ca-bundle=$NIX_SSL_CERT_FILE"
# TODO: Enable slib
# Current slib in nixpkgs is specialized to Guile
# "--with-slib=${slibGuile}/lib/slib"
Expand Down
15 changes: 11 additions & 4 deletions pkgs/development/interpreters/perl/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -171,11 +171,11 @@ let
priority = 6; # in `buildEnv' (including the one inside `perl.withPackages') the library files will have priority over files in `perl`
};
} // stdenv.lib.optionalAttrs (stdenv.buildPlatform != stdenv.hostPlatform) rec {
crossVersion = "9e4051cd28b7b3afb162776f5627c7abe4c7b9ea"; # Apr 21, 2019
crossVersion = "2152db1ea241f796206ab309036be1a7d127b370"; # May 25, 2019

perl-cross-src = fetchurl {
url = "https://github.com/arsv/perl-cross/archive/${crossVersion}.tar.gz";
sha256 = "0dj99w2dicbp3c3wn0k32785pc4c68iqnlyxswnza6mhw6wvl9v7";
sha256 = "1k08iqdkf9q00hbcq2b933w3vmds7xkfr90phhk0qf64l18wdrkf";
};

depsBuildBuild = [ buildPackages.stdenv.cc makeWrapper ];
Expand All @@ -199,11 +199,18 @@ in {
sha256 = "1iynpsxdym4h76kgndmn3ykvwxhqz444xvaz8z2irsxkvmnlb5da";
};

perl530 = common {
perl = pkgs.perl530;
buildPerl = buildPackages.perl530;
version = "5.30.0";
sha256 = "1wkmz6xn3fswpqhz29akiklcxclnlykhp96a8bqcz36rak3i64l5";
};

# the latest Devel version
perldevel = common {
perl = pkgs.perldevel;
buildPerl = buildPackages.perldevel;
version = "5.29.9";
sha256 = "017x3nghyc5m8q1yqnrdma96b3d5rlfx87vv5mi64jq0r8k6zppm";
version = "5.30.0";
sha256 = "1wkmz6xn3fswpqhz29akiklcxclnlykhp96a8bqcz36rak3i64l5";
};
}
17 changes: 11 additions & 6 deletions pkgs/development/libraries/boost/generic.nix
Original file line number Diff line number Diff line change
Expand Up @@ -97,9 +97,9 @@ let
in

stdenv.mkDerivation {
name = "boost-${version}";
pname = "boost";

inherit src;
inherit src version;

patchFlags = "";

Expand All @@ -112,11 +112,10 @@ stdenv.mkDerivation {
meta = {
homepage = http://boost.org/;
description = "Collection of C++ libraries";
license = stdenv.lib.licenses.boost;

license = licenses.boost;
platforms = platforms.unix ++ platforms.windows;
badPlatforms = stdenv.lib.optional (versionOlder version "1.59") "aarch64-linux"
++ stdenv.lib.optional ((versionOlder version "1.57") || version == "1.58") "x86_64-darwin";
badPlatforms = optional (versionOlder version "1.59") "aarch64-linux"
++ optional ((versionOlder version "1.57") || version == "1.58") "x86_64-darwin";
maintainers = with maintainers; [ peti ];
};

Expand Down Expand Up @@ -158,16 +157,22 @@ stdenv.mkDerivation {
++ optional (toolset != null) "--with-toolset=${toolset}";

buildPhase = ''
runHook preBuild
./b2 ${b2Args}
runHook postBuild
'';

installPhase = ''
runHook preInstall
# boostbook is needed by some applications
mkdir -p $dev/share/boostbook
cp -a tools/boostbook/{xsl,dtd} $dev/share/boostbook/
# Let boost install everything else
./b2 ${b2Args} install
runHook postInstall
'';

postFixup = ''
Expand Down
40 changes: 21 additions & 19 deletions pkgs/development/libraries/gdbm/default.nix
Original file line number Diff line number Diff line change
@@ -1,12 +1,14 @@
{ stdenv, lib, fetchurl }:

stdenv.mkDerivation rec {
name = "gdbm-1.18.1";
pname = "gdbm";
version = "1.18.1";

# FIXME: remove on update to > 1.18.1
NIX_CFLAGS_COMPILE = if stdenv.cc.isClang then "-Wno-error=return-type" else null;

src = fetchurl {
url = "mirror://gnu/gdbm/${name}.tar.gz";
url = "mirror://gnu/gdbm/${pname}-${version}.tar.gz";
sha256 = "1p4ibds6z3ccy65lkmd6lm7js0kwifvl53r0fd759fjxgr917rl6";
};

Expand All @@ -25,10 +27,12 @@ stdenv.mkDerivation rec {
substituteInPlace tests/testsuite.at --replace \
'm4_include([dbmfetch03.at])' ""
'';

enableParallelBuilding = true;
configureFlags = [ "--enable-libgdbm-compat" ];

# create symlinks for compatibility
postInstall = ''
# create symlinks for compatibility
install -dm755 $out/include/gdbm
(
cd $out/include/gdbm
Expand All @@ -40,26 +44,24 @@ stdenv.mkDerivation rec {

meta = with lib; {
description = "GNU dbm key/value database library";
longDescription = ''
GNU dbm (or GDBM, for short) is a library of database functions that
use extensible hashing and work similar to the standard UNIX dbm.
These routines are provided to a programmer needing to create and
manipulate a hashed database.
longDescription =
'' GNU dbm (or GDBM, for short) is a library of database functions that
use extensible hashing and work similar to the standard UNIX dbm.
These routines are provided to a programmer needing to create and
manipulate a hashed database.
The basic use of GDBM is to store key/data pairs in a data file.
Each key must be unique and each key is paired with only one data
item.
The basic use of GDBM is to store key/data pairs in a data file.
Each key must be unique and each key is paired with only one data
item.
The library provides primitives for storing key/data pairs,
searching and retrieving the data by its key and deleting a key
along with its data. It also support sequential iteration over all
key/data pairs in a database.
The library provides primitives for storing key/data pairs,
searching and retrieving the data by its key and deleting a key
along with its data. It also support sequential iteration over all
key/data pairs in a database.
For compatibility with programs using old UNIX dbm function, the
package also provides traditional dbm and ndbm interfaces.
For compatibility with programs using old UNIX dbm function, the
package also provides traditional dbm and ndbm interfaces.
'';

homepage = https://www.gnu.org/software/gdbm/;
license = licenses.gpl3Plus;
platforms = platforms.all;
Expand Down
9 changes: 6 additions & 3 deletions pkgs/development/libraries/gnutls/default.nix
Original file line number Diff line number Diff line change
@@ -1,14 +1,14 @@
{ config, lib, stdenv, fetchurl, zlib, lzo, libtasn1, nettle, pkgconfig, lzip
, perl, gmp, autoconf, autogen, automake, libidn, p11-kit, libiconv
, unbound, dns-root-data, gettext
, unbound, dns-root-data, gettext, cacert
, guileBindings ? config.gnutls.guile or false, guile
, tpmSupport ? false, trousers, which, nettools, libunistring
, withSecurity ? false, Security # darwin Security.framework
}:

assert guileBindings -> guile != null;
let
version = "3.6.7";
version = "3.6.8";

# XXX: Gnulib's `test-select' fails on FreeBSD:
# http://hydra.nixos.org/build/2962084/nixlog/1/raw .
Expand All @@ -24,7 +24,7 @@ stdenv.mkDerivation {

src = fetchurl {
url = "mirror://gnupg/gnutls/v3.6/gnutls-${version}.tar.xz";
sha256 = "1ql8l6l5bxks2pgpwb1602zc0j6ivhpy27hdfc49h8xgbanhjd2v";
sha256 = "10ry71sy8zbksa905bjryphafcg25gkmfa3pf48ripimar7990da";
};

outputs = [ "bin" "dev" "out" "man" "devdoc" ];
Expand Down Expand Up @@ -72,6 +72,9 @@ stdenv.mkDerivation {
propagatedBuildInputs = [ nettle ];

inherit doCheck;
# stdenv's `NIX_SSL_CERT_FILE=/no-cert-file.crt` broke tests with:
# Error setting the x509 trust file: Error while reading file.
checkInputs = [ cacert ];

# Fixup broken libtool and pkgconfig files
preFixup = lib.optionalString (!isDarwin) ''
Expand Down
4 changes: 4 additions & 0 deletions pkgs/development/libraries/icu/64.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
import ./base.nix {
version = "64.2";
sha256 = "0v0xsf14xwlj125y9fd8lrhsaych4d8liv8gr746zng6g225szb2";
}
Loading

0 comments on commit 8f5edef

Please sign in to comment.