From 1f4212d792f0844d5109f879286ea5afbda02c10 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Robert=20Sch=C3=BCtz?= Date: Thu, 13 Apr 2023 14:05:36 -0700 Subject: [PATCH 01/72] python310Packages.pytz: 2023.2 -> 2023.3 --- pkgs/development/python-modules/pytz/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/python-modules/pytz/default.nix b/pkgs/development/python-modules/pytz/default.nix index 474403355f53..ad4f76baf667 100644 --- a/pkgs/development/python-modules/pytz/default.nix +++ b/pkgs/development/python-modules/pytz/default.nix @@ -2,13 +2,13 @@ buildPythonPackage rec { pname = "pytz"; - version = "2023.2"; + version = "2023.3"; format = "setuptools"; src = fetchPypi { inherit pname version; - hash = "sha256-on3PYSwF0uveYm99UGVV8Q38gVs+3cz6rfx9mbEcmgc="; + hash = "sha256-HYzinbGJGR+1UzjubQOH2Cq1nz0A6sEDQS1k4OvQxYg="; }; nativeCheckInputs = [ unittestCheckHook ]; From 040f19b5cd7c5e45f481a6ca2af09d4346028723 Mon Sep 17 00:00:00 2001 From: "R. Ryantm" Date: Thu, 20 Apr 2023 00:30:10 +0000 Subject: [PATCH 02/72] opencl-headers: 2023.02.06 -> 2023.04.17 --- pkgs/development/libraries/opencl-headers/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/libraries/opencl-headers/default.nix b/pkgs/development/libraries/opencl-headers/default.nix index 6bb2b4c235ac..ca5e24e85570 100644 --- a/pkgs/development/libraries/opencl-headers/default.nix +++ b/pkgs/development/libraries/opencl-headers/default.nix @@ -3,13 +3,13 @@ stdenv.mkDerivation rec { pname = "opencl-headers"; - version = "2023.02.06"; + version = "2023.04.17"; src = fetchFromGitHub { owner = "KhronosGroup"; repo = "OpenCL-Headers"; rev = "v${version}"; - sha256 = "sha256-BJDaDokyHgmyl+bGqCwG1J7iOvu0E3P3iYZ1/krot8s="; + sha256 = "sha256-FK6pbIqNVVW9p6ozUVzuRxfxvibCA4cNFfhT22WjSzE="; }; installPhase = '' From 2bb0f80dad467d0b2460c26a5b812506034a954e Mon Sep 17 00:00:00 2001 From: Christian Bourjau Date: Tue, 25 Apr 2023 23:11:35 +0200 Subject: [PATCH 03/72] gtest: 1.12.1 -> 1.13.0 Co-authored-by: Sandro --- pkgs/development/libraries/gtest/default.nix | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/pkgs/development/libraries/gtest/default.nix b/pkgs/development/libraries/gtest/default.nix index 80013e3613d0..4bdf8fcf06e4 100644 --- a/pkgs/development/libraries/gtest/default.nix +++ b/pkgs/development/libraries/gtest/default.nix @@ -8,15 +8,15 @@ stdenv.mkDerivation rec { pname = "gtest"; - version = "1.12.1"; + version = "1.13.0"; outputs = [ "out" "dev" ]; src = fetchFromGitHub { owner = "google"; repo = "googletest"; - rev = "release-${version}"; - hash = "sha256-W+OxRTVtemt2esw4P7IyGWXOonUN5ZuscjvzqkYvZbM="; + rev = "v${version}"; + hash = "sha256-LVLEn+e7c8013pwiLzJiiIObyrlbBHYaioO/SWbItPQ="; }; patches = [ From 293b0f4b1c8efb99f49fe26ae6af4f75bb81b8fc Mon Sep 17 00:00:00 2001 From: "R. Ryantm" Date: Thu, 27 Apr 2023 07:36:13 +0000 Subject: [PATCH 04/72] libcap: 2.67 -> 2.68 --- pkgs/os-specific/linux/libcap/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/os-specific/linux/libcap/default.nix b/pkgs/os-specific/linux/libcap/default.nix index fcd42e3279a0..553331ab5993 100644 --- a/pkgs/os-specific/linux/libcap/default.nix +++ b/pkgs/os-specific/linux/libcap/default.nix @@ -7,11 +7,11 @@ assert usePam -> pam != null; stdenv.mkDerivation rec { pname = "libcap"; - version = "2.67"; + version = "2.68"; src = fetchurl { url = "mirror://kernel/linux/libs/security/linux-privs/libcap2/${pname}-${version}.tar.xz"; - sha256 = "sha256-zpsi/cJxvrba51Q9pfdM8ky4LmhIz9CIpaBp3sXqUZg="; + sha256 = "sha256-kL47bUG+X4GuSwPsdgErDSfIKSk2hPbAW2XV+cznJLI="; }; outputs = [ "out" "dev" "lib" "man" "doc" ] From 626819899dd035b9c5b43d1208a2735765112253 Mon Sep 17 00:00:00 2001 From: "R. Ryantm" Date: Fri, 28 Apr 2023 15:19:25 +0000 Subject: [PATCH 05/72] harfbuzz: 7.1.0 -> 7.2.0 https://github.com/harfbuzz/harfbuzz/releases/tag/7.2.0 --- pkgs/development/libraries/harfbuzz/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/libraries/harfbuzz/default.nix b/pkgs/development/libraries/harfbuzz/default.nix index 32d8ae0bafeb..c8902cc5224f 100644 --- a/pkgs/development/libraries/harfbuzz/default.nix +++ b/pkgs/development/libraries/harfbuzz/default.nix @@ -34,11 +34,11 @@ stdenv.mkDerivation rec { pname = "harfbuzz${lib.optionalString withIcu "-icu"}"; - version = "7.1.0"; + version = "7.2.0"; src = fetchurl { url = "https://github.com/harfbuzz/harfbuzz/releases/download/${version}/harfbuzz-${version}.tar.xz"; - hash = "sha256-8TWmHNRkye1ryYI3ZMGI8nbDhQqNyQRijeKoeWa3B3s="; + hash = "sha256-/FVgyAfq4O/V+VtapMZYAMeo7tZkIAimsefj//94c8w="; }; postPatch = '' From 352e17b8d080269e6be2e607581df499acf649b2 Mon Sep 17 00:00:00 2001 From: "R. Ryantm" Date: Sat, 29 Apr 2023 13:13:49 +0000 Subject: [PATCH 06/72] iproute2: 6.2.0 -> 6.3.0 --- pkgs/os-specific/linux/iproute/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/os-specific/linux/iproute/default.nix b/pkgs/os-specific/linux/iproute/default.nix index 7a1f81999618..18b314067961 100644 --- a/pkgs/os-specific/linux/iproute/default.nix +++ b/pkgs/os-specific/linux/iproute/default.nix @@ -6,11 +6,11 @@ stdenv.mkDerivation rec { pname = "iproute2"; - version = "6.2.0"; + version = "6.3.0"; src = fetchurl { url = "mirror://kernel/linux/utils/net/${pname}/${pname}-${version}.tar.xz"; - sha256 = "sha256-TXJzAgDsWyqrqhovIFU8Z0gpLwZdmhVMfV4iVZ35/WI="; + sha256 = "sha256-37KpjbluemU8/8ZpMzWhpGbimjS2rFKL5I814dJ2ZzI="; }; patches = [ From de9cb16e77745c80cb05e8a816e0fef92109f8b2 Mon Sep 17 00:00:00 2001 From: Fabian Affolter Date: Sun, 30 Apr 2023 01:21:03 +0200 Subject: [PATCH 07/72] python310Packages.beautifulsoup4: 4.11.2 -> 4.12.2 Changelog: https://git.launchpad.net/beautifulsoup/tree/CHANGELOG?h=4.12.2 --- .../python-modules/beautifulsoup4/default.nix | 23 +++++++++++++------ 1 file changed, 16 insertions(+), 7 deletions(-) diff --git a/pkgs/development/python-modules/beautifulsoup4/default.nix b/pkgs/development/python-modules/beautifulsoup4/default.nix index 09d2e90e16e0..4a9063365d68 100644 --- a/pkgs/development/python-modules/beautifulsoup4/default.nix +++ b/pkgs/development/python-modules/beautifulsoup4/default.nix @@ -2,6 +2,7 @@ , buildPythonPackage , fetchPypi , chardet +, hatchling , html5lib , lxml , pytestCheckHook @@ -12,8 +13,8 @@ buildPythonPackage rec { pname = "beautifulsoup4"; - version = "4.11.2"; - format = "setuptools"; + version = "4.12.2"; + format = "pyproject"; outputs = ["out" "doc"]; @@ -21,23 +22,31 @@ buildPythonPackage rec { src = fetchPypi { inherit pname version; - hash = "sha256-vEvdpnF95aKYdDb7jXL0XckN2Fa9/VEqExTOkDSaAQY="; + hash = "sha256-SSu8adyjXRLarHHE2xv/8Mh2wA70ov+sziJtRjjrcto="; }; nativeBuildInputs = [ + hatchling sphinxHook ]; propagatedBuildInputs = [ chardet - html5lib - lxml soupsieve ]; + passthru.optional-dependencies = { + html5lib = [ + html5lib + ]; + lxml = [ + lxml + ]; + }; + nativeCheckInputs = [ pytestCheckHook - ]; + ] ++ lib.flatten (builtins.attrValues passthru.optional-dependencies); pythonImportsCheck = [ "bs4" @@ -45,8 +54,8 @@ buildPythonPackage rec { meta = with lib; { changelog = "https://git.launchpad.net/beautifulsoup/tree/CHANGELOG?h=${version}"; - homepage = "http://crummy.com/software/BeautifulSoup/bs4/"; description = "HTML and XML parser"; + homepage = "http://crummy.com/software/BeautifulSoup/bs4/"; license = licenses.mit; maintainers = with maintainers; [ domenkozar ]; }; From d0f13efc061536af2ea1bf95c369d825def789ec Mon Sep 17 00:00:00 2001 From: Fabian Affolter Date: Sun, 30 Apr 2023 01:36:29 +0200 Subject: [PATCH 08/72] python310Packages.responses: 0.22.0 -> 0.23.1 Changelog: https://github.com/getsentry/responses/blob/0.23.1/CHANGES --- .../python-modules/responses/default.nix | 18 +++++++++++++----- 1 file changed, 13 insertions(+), 5 deletions(-) diff --git a/pkgs/development/python-modules/responses/default.nix b/pkgs/development/python-modules/responses/default.nix index c549b86bbf16..a1e21b8fbcdc 100644 --- a/pkgs/development/python-modules/responses/default.nix +++ b/pkgs/development/python-modules/responses/default.nix @@ -5,8 +5,11 @@ , pytest-httpserver , pytestCheckHook , pythonOlder +, pyyaml , requests -, toml +, tomli +, tomli-w +, types-pyyaml , types-toml , typing-extensions , urllib3 @@ -14,7 +17,7 @@ buildPythonPackage rec { pname = "responses"; - version = "0.22.0"; + version = "0.23.1"; format = "setuptools"; disabled = pythonOlder "3.7"; @@ -24,13 +27,14 @@ buildPythonPackage rec { src = fetchFromGitHub { owner = "getsentry"; repo = pname; - rev = version; - hash = "sha256-VOIpowxPvYmufnj9MM/vMtZQDIOxorAhMCNK0fX/j1U="; + rev = "refs/tags/${version}"; + hash = "sha256-BU90nUZVqowFMn78KfbBEf59X7Q/1itvkGFdOzy4D2c="; }; propagatedBuildInputs = [ + pyyaml requests - toml + types-pyyaml types-toml urllib3 ] ++ lib.optionals (pythonOlder "3.8") [ @@ -42,6 +46,9 @@ buildPythonPackage rec { pytest-asyncio pytest-httpserver pytestCheckHook + tomli-w + ] ++ lib.optionals (pythonOlder "3.11") [ + tomli ]; pythonImportsCheck = [ @@ -51,6 +58,7 @@ buildPythonPackage rec { meta = with lib; { description = "Python module for mocking out the requests Python library"; homepage = "https://github.com/getsentry/responses"; + changelog = "https://github.com/getsentry/responses/blob/${version}/CHANGES"; license = licenses.asl20; maintainers = with maintainers; [ fab ]; }; From 4a7ab822a6dbe90b2c08f662dcad7dc607ad718f Mon Sep 17 00:00:00 2001 From: Mario Rodas Date: Sun, 30 Apr 2023 04:20:00 +0000 Subject: [PATCH 09/72] icu73: init at 73.1 https://icu.unicode.org/download/73 --- pkgs/development/libraries/icu/73.nix | 4 ++++ pkgs/top-level/all-packages.nix | 3 +++ 2 files changed, 7 insertions(+) create mode 100644 pkgs/development/libraries/icu/73.nix diff --git a/pkgs/development/libraries/icu/73.nix b/pkgs/development/libraries/icu/73.nix new file mode 100644 index 000000000000..1a5536c0ce84 --- /dev/null +++ b/pkgs/development/libraries/icu/73.nix @@ -0,0 +1,4 @@ +import ./base.nix { + version = "73.1"; + sha256 = "sha256-pFdDHeFktKp+ygDtE00A37+Ip3xphqEK53dPwHa7jEU="; +} diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 4f6585d4f5a0..1bd4f74ad58a 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -20910,6 +20910,9 @@ with pkgs; icu72 = callPackage ../development/libraries/icu/72.nix ({ nativeBuildRoot = buildPackages.icu72.override { buildRootOnly = true; }; }); + icu73 = callPackage ../development/libraries/icu/73.nix ({ + nativeBuildRoot = buildPackages.icu72.override { buildRootOnly = true; }; + }); icu = icu72; From e89be8188504a19de9f3256981cf6c6363ec8939 Mon Sep 17 00:00:00 2001 From: Mario Rodas Date: Sun, 30 Apr 2023 04:20:00 +0000 Subject: [PATCH 10/72] icu: 72.1 -> 73.1 --- pkgs/top-level/all-packages.nix | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 1bd4f74ad58a..13dbbc4a42d0 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -20914,7 +20914,7 @@ with pkgs; nativeBuildRoot = buildPackages.icu72.override { buildRootOnly = true; }; }); - icu = icu72; + icu = icu73; id3lib = callPackage ../development/libraries/id3lib { }; From 2222808e838289613600b35d8f037e34f6ee7353 Mon Sep 17 00:00:00 2001 From: Mario Rodas Date: Mon, 1 May 2023 04:20:00 +0000 Subject: [PATCH 11/72] libimagequant: 4.1.1 -> 4.2.0 https://github.com/ImageOptim/libimagequant/compare/4.1.1...4.2.0 --- .../libraries/libimagequant/Cargo.lock | 37 +++++-------------- .../libraries/libimagequant/default.nix | 8 ++-- 2 files changed, 12 insertions(+), 33 deletions(-) diff --git a/pkgs/development/libraries/libimagequant/Cargo.lock b/pkgs/development/libraries/libimagequant/Cargo.lock index e98ae261a70d..d85dfcde626f 100644 --- a/pkgs/development/libraries/libimagequant/Cargo.lock +++ b/pkgs/development/libraries/libimagequant/Cargo.lock @@ -74,9 +74,9 @@ dependencies = [ [[package]] name = "crossbeam-channel" -version = "0.5.7" +version = "0.5.8" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "cf2b3e8478797446514c91ef04bafcb59faba183e621ad488df88983cc14128c" +checksum = "a33c2bf77f2df06183c3aa30d1e96c0695a313d4f9c453cc3762a6db39f99200" dependencies = [ "cfg-if", "crossbeam-utils", @@ -132,9 +132,9 @@ dependencies = [ [[package]] name = "flate2" -version = "1.0.25" +version = "1.0.26" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "a8a2db397cb1c8772f31494cb8917e48cd1e64f0fa7efac59fbd741a0a8ce841" +checksum = "3b9429470923de8e8cbd4d2dc513535400b4b3fef0319fb5c4e1f520a7bef743" dependencies = [ "crc32fast", "miniz_oxide", @@ -160,11 +160,10 @@ dependencies = [ [[package]] name = "imagequant" -version = "4.1.1" +version = "4.2.0" dependencies = [ "arrayvec", "lodepng", - "noisy_float", "num_cpus", "once_cell", "rayon", @@ -183,9 +182,9 @@ dependencies = [ [[package]] name = "libc" -version = "0.2.140" +version = "0.2.142" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "99227334921fae1a979cf0bfdfcc6b3e5ce376ef57e16fb6fb3ea2ed6095f80c" +checksum = "6a987beff54b60ffa6d51982e1aa1146bc42f19bd26be28b0586f252fccf5317" [[package]] name = "lodepng" @@ -211,31 +210,13 @@ dependencies = [ [[package]] name = "miniz_oxide" -version = "0.6.2" +version = "0.7.1" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "b275950c28b37e794e8c55d88aeb5e139d0ce23fdbbeda68f8d7174abdf9e8fa" +checksum = "e7810e0be55b428ada41041c41f32c9f1a42817901b4ccf45fa3d4b6561e74c7" dependencies = [ "adler", ] -[[package]] -name = "noisy_float" -version = "0.2.0" -source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "978fe6e6ebc0bf53de533cd456ca2d9de13de13856eda1518a285d7705a213af" -dependencies = [ - "num-traits", -] - -[[package]] -name = "num-traits" -version = "0.2.15" -source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "578ede34cf02f8924ab9447f50c28075b4d3e5b269972345e7e0372b38c6cdcd" -dependencies = [ - "autocfg", -] - [[package]] name = "num_cpus" version = "1.15.0" diff --git a/pkgs/development/libraries/libimagequant/default.nix b/pkgs/development/libraries/libimagequant/default.nix index 43e4b447ae78..088936115076 100644 --- a/pkgs/development/libraries/libimagequant/default.nix +++ b/pkgs/development/libraries/libimagequant/default.nix @@ -5,13 +5,13 @@ let in rustPlatform.buildRustPackage rec { pname = "libimagequant"; - version = "4.1.1"; + version = "4.2.0"; src = fetchFromGitHub { owner = "ImageOptim"; repo = pname; rev = version; - hash = "sha256-sCxscs4D2p7LNDpcrKfAc315/NbxbQXtsyc33zUmccM="; + hash = "sha256-51xTCymZKLuw1Xeje6EyKqHdbmqBV1Fdhx+OsO3bZ6Q="; }; cargoLock = { @@ -19,11 +19,9 @@ rustPlatform.buildRustPackage rec { }; postPatch = '' - cp ${./Cargo.lock} Cargo.lock + ln -s ${./Cargo.lock} Cargo.lock ''; - cargoHash = "sha256-0HOmItooNsGq6iTIb9M5IPXMwYh2nQ03qfjomkg0d00="; - nativeBuildInputs = [ cargo-c ]; postBuild = '' From 3455cf2a7221ebd1987cb325f30669bed4d183aa Mon Sep 17 00:00:00 2001 From: Mario Rodas Date: Mon, 1 May 2023 04:20:00 +0000 Subject: [PATCH 12/72] harfbuzz: add changelog to meta --- pkgs/development/libraries/harfbuzz/default.nix | 1 + 1 file changed, 1 insertion(+) diff --git a/pkgs/development/libraries/harfbuzz/default.nix b/pkgs/development/libraries/harfbuzz/default.nix index c8902cc5224f..24d00992eaab 100644 --- a/pkgs/development/libraries/harfbuzz/default.nix +++ b/pkgs/development/libraries/harfbuzz/default.nix @@ -108,6 +108,7 @@ stdenv.mkDerivation rec { meta = with lib; { description = "An OpenType text shaping engine"; homepage = "https://harfbuzz.github.io/"; + changelog = "https://github.com/harfbuzz/harfbuzz/raw/${version}/NEWS"; maintainers = [ maintainers.eelco ]; license = licenses.mit; platforms = platforms.unix; From 5d6f02349bd0b531cc5f8289d9e9f111fa340315 Mon Sep 17 00:00:00 2001 From: MaxHearnden Date: Tue, 2 May 2023 20:18:26 +0100 Subject: [PATCH 13/72] meson: apply fix for detect_voidp_size see https://github.com/mesonbuild/meson/pull/11761 --- pkgs/development/tools/build-managers/meson/default.nix | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/pkgs/development/tools/build-managers/meson/default.nix b/pkgs/development/tools/build-managers/meson/default.nix index fb0c5d45fb9e..3cd5eceb5128 100644 --- a/pkgs/development/tools/build-managers/meson/default.nix +++ b/pkgs/development/tools/build-managers/meson/default.nix @@ -72,6 +72,13 @@ python3.pkgs.buildPythonApplication rec { "docs/yaml/objects/dep.yaml" ]; }) + + # Fix regression in precomputing CMAKE_SIZEOF_VOID_P + # See https://github.com/mesonbuild/meson/pull/11761 + (fetchpatch { + url = "https://github.com/mesonbuild/meson/commit/7c78c2b5a0314078bdabb998ead56925dc8b0fc0.patch"; + sha256 = "sha256-vSnHhuOIXf/1X+bUkUmGND5b30ES0O8EDArwb4p2/w4="; + }) ]; setupHook = ./setup-hook.sh; From 02dfea94468f8b795b0e1347745c1d06b48a4a88 Mon Sep 17 00:00:00 2001 From: "R. Ryantm" Date: Wed, 3 May 2023 08:07:09 +0000 Subject: [PATCH 14/72] libjpeg: 2.1.4 -> 2.1.5.1 --- pkgs/development/libraries/libjpeg-turbo/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/libraries/libjpeg-turbo/default.nix b/pkgs/development/libraries/libjpeg-turbo/default.nix index ab08435721fd..b6902050b5d5 100644 --- a/pkgs/development/libraries/libjpeg-turbo/default.nix +++ b/pkgs/development/libraries/libjpeg-turbo/default.nix @@ -31,13 +31,13 @@ assert !(enableJpeg7 && enableJpeg8); # pick only one or none, not both stdenv.mkDerivation rec { pname = "libjpeg-turbo"; - version = "2.1.4"; + version = "2.1.5.1"; src = fetchFromGitHub { owner = "libjpeg-turbo"; repo = "libjpeg-turbo"; rev = version; - sha256 = "sha256-1NRoVIL3zXX1D6iOf2FCrwBEcDW7TYFbdIbCTjY1m8Q="; + sha256 = "sha256-96SBBZp+/4WkXLvHKSPItNi5WuzdVccI/ZcbJOFjYYk="; }; # This is needed by freeimage From 83d1459330ec3da2111a512074895435e0f7390a Mon Sep 17 00:00:00 2001 From: Alyssa Ross Date: Sun, 30 Apr 2023 20:12:21 +0000 Subject: [PATCH 15/72] llvmPackages_git.llvm: backport patch for musl 1.2.4 --- pkgs/development/compilers/llvm/git/llvm/default.nix | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/pkgs/development/compilers/llvm/git/llvm/default.nix b/pkgs/development/compilers/llvm/git/llvm/default.nix index ae8e1385bd8f..634cd7829533 100644 --- a/pkgs/development/compilers/llvm/git/llvm/default.nix +++ b/pkgs/development/compilers/llvm/git/llvm/default.nix @@ -134,6 +134,13 @@ in stdenv.mkDerivation (rec { # It's not clear to me why this isn't an issue for LLVM developers running # on macOS (nothing about this _seems_ nix specific).. ./lit-shell-script-runner-set-dyld-library-path.patch + + # Fix musl build. + (fetchpatch { + url = "https://github.com/llvm/llvm-project/commit/5cd554303ead0f8891eee3cd6d25cb07f5a7bf67.patch"; + relative = "llvm"; + hash = "sha256-XPbvNJ45SzjMGlNUgt/IgEvM2dHQpDOe6woUJY+nUYA="; + }) ] ++ lib.optionals enablePolly [ ./gnu-install-dirs-polly.patch From 776ba7a41013ff4c6de306d1f63815bf15e5f5ab Mon Sep 17 00:00:00 2001 From: Alyssa Ross Date: Sun, 30 Apr 2023 20:12:45 +0000 Subject: [PATCH 16/72] llvm_15: backport patch for musl 1.2.4 --- pkgs/development/compilers/llvm/15/llvm/default.nix | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/pkgs/development/compilers/llvm/15/llvm/default.nix b/pkgs/development/compilers/llvm/15/llvm/default.nix index de98c4361531..7742fc0a186c 100644 --- a/pkgs/development/compilers/llvm/15/llvm/default.nix +++ b/pkgs/development/compilers/llvm/15/llvm/default.nix @@ -142,6 +142,13 @@ in stdenv.mkDerivation (rec { # It's not clear to me why this isn't an issue for LLVM developers running # on macOS (nothing about this _seems_ nix specific).. ./lit-shell-script-runner-set-dyld-library-path.patch + + # Fix musl build. + (fetchpatch { + url = "https://github.com/llvm/llvm-project/commit/5cd554303ead0f8891eee3cd6d25cb07f5a7bf67.patch"; + relative = "llvm"; + hash = "sha256-XPbvNJ45SzjMGlNUgt/IgEvM2dHQpDOe6woUJY+nUYA="; + }) ] ++ lib.optionals enablePolly [ ./gnu-install-dirs-polly.patch From 7a9443a4fefe5118e4d45b70cdaab4edd2cd11b1 Mon Sep 17 00:00:00 2001 From: Alyssa Ross Date: Sun, 30 Apr 2023 20:12:54 +0000 Subject: [PATCH 17/72] llvm_14: backport patch for musl 1.2.4 --- pkgs/development/compilers/llvm/14/llvm/default.nix | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/pkgs/development/compilers/llvm/14/llvm/default.nix b/pkgs/development/compilers/llvm/14/llvm/default.nix index e4c004d24ac3..06b549983527 100644 --- a/pkgs/development/compilers/llvm/14/llvm/default.nix +++ b/pkgs/development/compilers/llvm/14/llvm/default.nix @@ -87,6 +87,13 @@ in stdenv.mkDerivation (rec { patches = [ ./gnu-install-dirs.patch + + # Fix musl build. + (fetchpatch { + url = "https://github.com/llvm/llvm-project/commit/5cd554303ead0f8891eee3cd6d25cb07f5a7bf67.patch"; + relative = "llvm"; + hash = "sha256-XPbvNJ45SzjMGlNUgt/IgEvM2dHQpDOe6woUJY+nUYA="; + }) ] ++ lib.optional enablePolly ./gnu-install-dirs-polly.patch; postPatch = optionalString stdenv.isDarwin '' From 0bcf8ae82b1fbae1e9d3796445a0f297a853a749 Mon Sep 17 00:00:00 2001 From: Alyssa Ross Date: Sun, 30 Apr 2023 20:13:02 +0000 Subject: [PATCH 18/72] llvm_13: backport patch for musl 1.2.4 --- pkgs/development/compilers/llvm/13/llvm/default.nix | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/pkgs/development/compilers/llvm/13/llvm/default.nix b/pkgs/development/compilers/llvm/13/llvm/default.nix index f3a9ced70e19..0977f2f2caff 100644 --- a/pkgs/development/compilers/llvm/13/llvm/default.nix +++ b/pkgs/development/compilers/llvm/13/llvm/default.nix @@ -91,6 +91,13 @@ in stdenv.mkDerivation (rec { sha256 = "18l6mrvm2vmwm77ckcnbjvh6ybvn72rhrb799d4qzwac4x2ifl7g"; stripLen = 1; }) + + # Fix musl build. + (fetchpatch { + url = "https://github.com/llvm/llvm-project/commit/5cd554303ead0f8891eee3cd6d25cb07f5a7bf67.patch"; + relative = "llvm"; + hash = "sha256-XPbvNJ45SzjMGlNUgt/IgEvM2dHQpDOe6woUJY+nUYA="; + }) ] ++ lib.optional enablePolly ./gnu-install-dirs-polly.patch; postPatch = optionalString stdenv.isDarwin '' From 45093ead781069fbfccd89e53d9d701f81f27c20 Mon Sep 17 00:00:00 2001 From: Alyssa Ross Date: Sun, 30 Apr 2023 20:13:17 +0000 Subject: [PATCH 19/72] llvm_12: backport patch for musl 1.2.4 --- pkgs/development/compilers/llvm/12/llvm/default.nix | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/pkgs/development/compilers/llvm/12/llvm/default.nix b/pkgs/development/compilers/llvm/12/llvm/default.nix index 2d7f70540dd8..5edc5c136d57 100644 --- a/pkgs/development/compilers/llvm/12/llvm/default.nix +++ b/pkgs/development/compilers/llvm/12/llvm/default.nix @@ -100,6 +100,13 @@ in stdenv.mkDerivation (rec { sha256 = "sha256:12s8vr6ibri8b48h2z38f3afhwam10arfiqfy4yg37bmc054p5hi"; stripLen = 1; }) + + # Fix musl build. + (fetchpatch { + url = "https://github.com/llvm/llvm-project/commit/5cd554303ead0f8891eee3cd6d25cb07f5a7bf67.patch"; + relative = "llvm"; + hash = "sha256-XPbvNJ45SzjMGlNUgt/IgEvM2dHQpDOe6woUJY+nUYA="; + }) ] ++ lib.optional enablePolly ./gnu-install-dirs-polly.patch; postPatch = optionalString stdenv.isDarwin '' From 2a859f5366a641224d64f2d747b2ef95a908b3d6 Mon Sep 17 00:00:00 2001 From: Alyssa Ross Date: Sun, 30 Apr 2023 20:13:27 +0000 Subject: [PATCH 20/72] llvm_11: backport patch for musl 1.2.4 --- pkgs/development/compilers/llvm/11/llvm/default.nix | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/pkgs/development/compilers/llvm/11/llvm/default.nix b/pkgs/development/compilers/llvm/11/llvm/default.nix index df9749fe1c27..beab3c885ab1 100644 --- a/pkgs/development/compilers/llvm/11/llvm/default.nix +++ b/pkgs/development/compilers/llvm/11/llvm/default.nix @@ -116,6 +116,13 @@ in stdenv.mkDerivation (rec { sha256 = "1kckghvsngs51mqm82asy0s9vr19h8aqbw43a0w44mccqw6bzrwf"; stripLen = 1; }) + + # Fix musl build. + (fetchpatch { + url = "https://github.com/llvm/llvm-project/commit/5cd554303ead0f8891eee3cd6d25cb07f5a7bf67.patch"; + relative = "llvm"; + hash = "sha256-XPbvNJ45SzjMGlNUgt/IgEvM2dHQpDOe6woUJY+nUYA="; + }) ] ++ lib.optional enablePolly ./gnu-install-dirs-polly.patch; postPatch = optionalString stdenv.isDarwin '' From fe6541184747f872eec66610886ea63d1f2b304f Mon Sep 17 00:00:00 2001 From: Alyssa Ross Date: Sun, 30 Apr 2023 20:13:36 +0000 Subject: [PATCH 21/72] llvm_10: backport patch for musl 1.2.4 --- pkgs/development/compilers/llvm/10/llvm/default.nix | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/pkgs/development/compilers/llvm/10/llvm/default.nix b/pkgs/development/compilers/llvm/10/llvm/default.nix index fba387adf867..ec494f4afce5 100644 --- a/pkgs/development/compilers/llvm/10/llvm/default.nix +++ b/pkgs/development/compilers/llvm/10/llvm/default.nix @@ -118,6 +118,13 @@ in stdenv.mkDerivation (rec { sha256 = "1kckghvsngs51mqm82asy0s9vr19h8aqbw43a0w44mccqw6bzrwf"; stripLen = 1; }) + + # Fix musl build. + (fetchpatch { + url = "https://github.com/llvm/llvm-project/commit/5cd554303ead0f8891eee3cd6d25cb07f5a7bf67.patch"; + relative = "llvm"; + hash = "sha256-XPbvNJ45SzjMGlNUgt/IgEvM2dHQpDOe6woUJY+nUYA="; + }) ] ++ lib.optional enablePolly ./gnu-install-dirs-polly.patch; postPatch = optionalString stdenv.isDarwin '' From 768007c210be99c50549564224625a092df9525e Mon Sep 17 00:00:00 2001 From: Alyssa Ross Date: Sun, 30 Apr 2023 20:13:51 +0000 Subject: [PATCH 22/72] llvm_9: backport patch for musl 1.2.4 --- pkgs/development/compilers/llvm/9/llvm/default.nix | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/pkgs/development/compilers/llvm/9/llvm/default.nix b/pkgs/development/compilers/llvm/9/llvm/default.nix index 0838fd8c5844..b7259ac19150 100644 --- a/pkgs/development/compilers/llvm/9/llvm/default.nix +++ b/pkgs/development/compilers/llvm/9/llvm/default.nix @@ -108,6 +108,13 @@ in stdenv.mkDerivation (rec { sha256 = "0zjfjgavqzi2ypqwqnlvy6flyvdz8hi1anwv0ybwnm2zqixg7za3"; stripLen = 1; }) + + # Fix musl build. + (fetchpatch { + url = "https://github.com/llvm/llvm-project/commit/5cd554303ead0f8891eee3cd6d25cb07f5a7bf67.patch"; + relative = "llvm"; + hash = "sha256-XPbvNJ45SzjMGlNUgt/IgEvM2dHQpDOe6woUJY+nUYA="; + }) ] ++ lib.optional enablePolly ./gnu-install-dirs-polly.patch; postPatch = optionalString stdenv.isDarwin '' From d93bd8e23d4e6bae55b3eb9eacefe10edc24faf8 Mon Sep 17 00:00:00 2001 From: Alyssa Ross Date: Sun, 30 Apr 2023 20:13:59 +0000 Subject: [PATCH 23/72] llvm_8: backport patch for musl 1.2.4 --- pkgs/development/compilers/llvm/8/llvm/default.nix | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/pkgs/development/compilers/llvm/8/llvm/default.nix b/pkgs/development/compilers/llvm/8/llvm/default.nix index 3b0877115e06..f95cefb9addd 100644 --- a/pkgs/development/compilers/llvm/8/llvm/default.nix +++ b/pkgs/development/compilers/llvm/8/llvm/default.nix @@ -110,6 +110,13 @@ in stdenv.mkDerivation (rec { sha256 = "0zjfjgavqzi2ypqwqnlvy6flyvdz8hi1anwv0ybwnm2zqixg7za3"; stripLen = 1; }) + + # Fix musl build. + (fetchpatch { + url = "https://github.com/llvm/llvm-project/commit/5cd554303ead0f8891eee3cd6d25cb07f5a7bf67.patch"; + relative = "llvm"; + hash = "sha256-XPbvNJ45SzjMGlNUgt/IgEvM2dHQpDOe6woUJY+nUYA="; + }) ] ++ lib.optional enablePolly ./gnu-install-dirs-polly.patch; postPatch = optionalString stdenv.isDarwin '' From f6b50611084d4015355ccc52033d4abdbf0efdae Mon Sep 17 00:00:00 2001 From: Alyssa Ross Date: Sun, 30 Apr 2023 20:14:06 +0000 Subject: [PATCH 24/72] llvm_7: backport patch for musl 1.2.4 --- .../compilers/llvm/7/llvm/default.nix | 2 + .../compilers/llvm/llvm-7-musl.patch | 92 +++++++++++++++++++ 2 files changed, 94 insertions(+) create mode 100644 pkgs/development/compilers/llvm/llvm-7-musl.patch diff --git a/pkgs/development/compilers/llvm/7/llvm/default.nix b/pkgs/development/compilers/llvm/7/llvm/default.nix index 185ae884442e..7bfaef7d00b0 100644 --- a/pkgs/development/compilers/llvm/7/llvm/default.nix +++ b/pkgs/development/compilers/llvm/7/llvm/default.nix @@ -108,6 +108,8 @@ in stdenv.mkDerivation (rec { sha256 = "0zjfjgavqzi2ypqwqnlvy6flyvdz8hi1anwv0ybwnm2zqixg7za3"; stripLen = 1; }) + + ../../llvm-7-musl.patch ] ++ lib.optional enablePolly ./gnu-install-dirs-polly.patch; postPatch = optionalString stdenv.isDarwin '' diff --git a/pkgs/development/compilers/llvm/llvm-7-musl.patch b/pkgs/development/compilers/llvm/llvm-7-musl.patch new file mode 100644 index 000000000000..0dac12cc20d6 --- /dev/null +++ b/pkgs/development/compilers/llvm/llvm-7-musl.patch @@ -0,0 +1,92 @@ +From 8c747d3157df2830eed9205e7caf1203b345de17 Mon Sep 17 00:00:00 2001 +From: Khem Raj +Date: Sat, 4 Feb 2023 13:54:41 -0800 +Subject: [PATCH] cmake: Enable 64bit off_t on 32bit glibc systems + +Pass -D_FILE_OFFSET_BITS=64 to compiler flags on 32bit glibc based +systems. This will make sure that 64bit versions of LFS functions are +used e.g. seek will behave same as lseek64. Also revert [1] partially +because this added a cmake test to detect lseek64 but then forgot to +pass the needed macro to actual compile, this test was incomplete too +since libc implementations like musl has 64bit off_t by default on 32bit +systems and does not bundle[2] -D_LARGEFILE64_SOURCE under -D_GNU_SOURCE +like glibc, which means the compile now fails on musl because the cmake +check passes but we do not have _LARGEFILE64_SOURCE defined. Using the +*64 function was transitional anyways so use -D_FILE_OFFSET_BITS=64 +instead + +[1] https://github.com/llvm/llvm-project/commit/8db7e5e4eed4c4e697dc3164f2c9351d8c3e942b +[2] https://git.musl-libc.org/cgit/musl/commit/?id=25e6fee27f4a293728dd15b659170e7b9c7db9bc + +Reviewed By: MaskRay + +Differential Revision: https://reviews.llvm.org/D139752 + +(cherry picked from commit 5cd554303ead0f8891eee3cd6d25cb07f5a7bf67) +--- + cmake/config-ix.cmake | 13 ++++++++++--- + include/llvm/Config/config.h.cmake | 3 --- + lib/Support/raw_ostream.cpp | 2 -- + 3 files changed, 10 insertions(+), 8 deletions(-) + +diff --git a/cmake/config-ix.cmake b/cmake/config-ix.cmake +index 18977d9950ff..b558aa83fa62 100644 +--- a/cmake/config-ix.cmake ++++ b/cmake/config-ix.cmake +@@ -197,9 +197,6 @@ check_symbol_exists(posix_fallocate fcntl.h HAVE_POSIX_FALLOCATE) + if( HAVE_SIGNAL_H AND NOT LLVM_USE_SANITIZER MATCHES ".*Address.*" AND NOT APPLE ) + check_symbol_exists(sigaltstack signal.h HAVE_SIGALTSTACK) + endif() +-set(CMAKE_REQUIRED_DEFINITIONS "-D_LARGEFILE64_SOURCE") +-check_symbol_exists(lseek64 "sys/types.h;unistd.h" HAVE_LSEEK64) +-set(CMAKE_REQUIRED_DEFINITIONS "") + check_symbol_exists(mallctl malloc_np.h HAVE_MALLCTL) + check_symbol_exists(mallinfo malloc.h HAVE_MALLINFO) + check_symbol_exists(malloc_zone_statistics malloc/malloc.h +@@ -237,6 +234,16 @@ if( PURE_WINDOWS ) + check_function_exists(__main HAVE___MAIN) + check_function_exists(__cmpdi2 HAVE___CMPDI2) + endif() ++ ++check_symbol_exists(__GLIBC__ stdio.h LLVM_USING_GLIBC) ++if( LLVM_USING_GLIBC ) ++# enable 64bit off_t on 32bit systems using glibc ++ if (CMAKE_SIZEOF_VOID_P EQUAL 4) ++ add_compile_definitions(_FILE_OFFSET_BITS=64) ++ list(APPEND CMAKE_REQUIRED_DEFINITIONS "-D_FILE_OFFSET_BITS=64") ++ endif() ++endif() ++ + if( HAVE_DLFCN_H ) + if( HAVE_LIBDL ) + list(APPEND CMAKE_REQUIRED_LIBRARIES dl) +diff --git a/include/llvm/Config/config.h.cmake b/include/llvm/Config/config.h.cmake +index e934617d7ec7..3c39c373b3c1 100644 +--- a/include/llvm/Config/config.h.cmake ++++ b/include/llvm/Config/config.h.cmake +@@ -112,9 +112,6 @@ + /* Define to 1 if you have the header file. */ + #cmakedefine HAVE_LINK_H ${HAVE_LINK_H} + +-/* Define to 1 if you have the `lseek64' function. */ +-#cmakedefine HAVE_LSEEK64 ${HAVE_LSEEK64} +- + /* Define to 1 if you have the header file. */ + #cmakedefine HAVE_MACH_MACH_H ${HAVE_MACH_MACH_H} + +diff --git a/lib/Support/raw_ostream.cpp b/lib/Support/raw_ostream.cpp +index 038ad00bd608..921ab8409008 100644 +--- a/lib/Support/raw_ostream.cpp ++++ b/lib/Support/raw_ostream.cpp +@@ -677,8 +677,6 @@ uint64_t raw_fd_ostream::seek(uint64_t off) { + flush(); + #ifdef _WIN32 + pos = ::_lseeki64(FD, off, SEEK_SET); +-#elif defined(HAVE_LSEEK64) +- pos = ::lseek64(FD, off, SEEK_SET); + #else + pos = ::lseek(FD, off, SEEK_SET); + #endif +-- +2.37.1 + From 12d4b4ad2fd38386cda87b155031797264b50b70 Mon Sep 17 00:00:00 2001 From: Alyssa Ross Date: Sun, 30 Apr 2023 20:14:29 +0000 Subject: [PATCH 25/72] llvm_6: backport patch for musl 1.2.4 --- pkgs/development/compilers/llvm/6/llvm/default.nix | 2 ++ 1 file changed, 2 insertions(+) diff --git a/pkgs/development/compilers/llvm/6/llvm/default.nix b/pkgs/development/compilers/llvm/6/llvm/default.nix index 22a3970f76ce..1c75660c20f5 100644 --- a/pkgs/development/compilers/llvm/6/llvm/default.nix +++ b/pkgs/development/compilers/llvm/6/llvm/default.nix @@ -105,6 +105,8 @@ stdenv.mkDerivation (rec { sha256 = "0zjfjgavqzi2ypqwqnlvy6flyvdz8hi1anwv0ybwnm2zqixg7za3"; stripLen = 1; }) + + ../../llvm-7-musl.patch ] ++ lib.optional enablePolly ./gnu-install-dirs-polly.patch; postPatch = optionalString stdenv.isDarwin '' From ad10899abf3897cd4a2688782bfd74500b1babca Mon Sep 17 00:00:00 2001 From: Alyssa Ross Date: Sun, 30 Apr 2023 20:14:37 +0000 Subject: [PATCH 26/72] llvm_5: backport patch for musl 1.2.4 --- pkgs/development/compilers/llvm/5/llvm/default.nix | 2 ++ 1 file changed, 2 insertions(+) diff --git a/pkgs/development/compilers/llvm/5/llvm/default.nix b/pkgs/development/compilers/llvm/5/llvm/default.nix index 31b88098c83a..219ae190e955 100644 --- a/pkgs/development/compilers/llvm/5/llvm/default.nix +++ b/pkgs/development/compilers/llvm/5/llvm/default.nix @@ -82,6 +82,8 @@ stdenv.mkDerivation (rec { sha256 = "0zjfjgavqzi2ypqwqnlvy6flyvdz8hi1anwv0ybwnm2zqixg7za3"; stripLen = 1; }) + + ../../llvm-7-musl.patch ] ++ lib.optional enablePolly ./gnu-install-dirs-polly.patch; postPatch = optionalString stdenv.isDarwin '' From 668b20d59d589cd67716b28336c16cdbe976bcfe Mon Sep 17 00:00:00 2001 From: Yueh-Shun Li <44064051+ShamrockLee@users.noreply.github.com> Date: Wed, 3 May 2023 13:03:01 +0000 Subject: [PATCH 27/72] Revert "git: fix in completion scripts references to environment utils" "git grep" (__gitcomp_builtin grep) is not grep, and thus cannot be substituted by the GNU grep binary. The command patching needs to be done with special care, which includes manual examination of the diff result before and after patching. This reverts commit b5d052d438df99d5a80e7c126551656d5ba74f75. --- pkgs/applications/version-management/git/default.nix | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/pkgs/applications/version-management/git/default.nix b/pkgs/applications/version-management/git/default.nix index e3dd18e80c26..a296b5fe41a6 100644 --- a/pkgs/applications/version-management/git/default.nix +++ b/pkgs/applications/version-management/git/default.nix @@ -185,7 +185,6 @@ stdenv.mkDerivation (finalAttrs: { # Fix references to the perl, sed, awk and various coreutil binaries used by # shell scripts that git calls (e.g. filter-branch) - # and completion scripts SCRIPT="$(cat <<'EOS' BEGIN{ @a=( @@ -203,8 +202,7 @@ stdenv.mkDerivation (finalAttrs: { EOS )" perl -0777 -i -pe "$SCRIPT" \ - $out/libexec/git-core/git-{sh-setup,filter-branch,merge-octopus,mergetool,quiltimport,request-pull,submodule,subtree,web--browse} \ - $out/share/bash-completion/completions/{git,gitk} + $out/libexec/git-core/git-{sh-setup,filter-branch,merge-octopus,mergetool,quiltimport,request-pull,submodule,subtree,web--browse} # Also put git-http-backend into $PATH, so that we can use smart From b03cc9ce119e686283b3017c7bc0414c635bd044 Mon Sep 17 00:00:00 2001 From: Yueh-Shun Li <44064051+ShamrockLee@users.noreply.github.com> Date: Tue, 2 May 2023 19:34:34 +0000 Subject: [PATCH 28/72] Revert "git: also patch the ls command for git-core scripts" Prevent the command patching from breaking the definition of __git_complete_revlist_file, where there's a local varible named "ls" This reverts commit 820dc2a56057bcc396dbddbff6be91e1cec73f6f. --- pkgs/applications/version-management/git/default.nix | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/pkgs/applications/version-management/git/default.nix b/pkgs/applications/version-management/git/default.nix index a296b5fe41a6..9de49f698aa5 100644 --- a/pkgs/applications/version-management/git/default.nix +++ b/pkgs/applications/version-management/git/default.nix @@ -190,8 +190,7 @@ stdenv.mkDerivation (finalAttrs: { @a=( '${gnugrep}/bin/grep', '${gnused}/bin/sed', '${gawk}/bin/awk', '${coreutils}/bin/cut', '${coreutils}/bin/basename', '${coreutils}/bin/dirname', - '${coreutils}/bin/wc', '${coreutils}/bin/tr', - '${coreutils}/bin/ls' + '${coreutils}/bin/wc', '${coreutils}/bin/tr' ${lib.optionalString perlSupport ", '${perlPackages.perl}/bin/perl'"} ); } From 834b6fbf2bd872f9a0efbca673d11086183a9b27 Mon Sep 17 00:00:00 2001 From: MaxHearnden Date: Wed, 3 May 2023 19:34:52 +0100 Subject: [PATCH 29/72] Revert "tomlplusplus: apply fix for detect_voidp_size" This reverts commit 41a5d6578054e3244de88080f09869791edd0f92. --- .../libraries/tomlplusplus/default.nix | 19 ++----------------- 1 file changed, 2 insertions(+), 17 deletions(-) diff --git a/pkgs/development/libraries/tomlplusplus/default.nix b/pkgs/development/libraries/tomlplusplus/default.nix index b86da24d43ab..a865f88f707d 100644 --- a/pkgs/development/libraries/tomlplusplus/default.nix +++ b/pkgs/development/libraries/tomlplusplus/default.nix @@ -1,26 +1,11 @@ { lib , stdenv -, buildPackages +, meson , cmake , ninja , fetchFromGitHub -, fetchpatch }: -# Fix regression in precomputing CMAKE_SIZEOF_VOID_P -# See https://github.com/mesonbuild/meson/pull/11761 -let fixedMeson = - buildPackages.meson.overrideAttrs ( - {patches ? [], ...}: { - patches = patches ++ [ - (fetchpatch { - url = "https://github.com/mesonbuild/meson/commit/7c78c2b5a0314078bdabb998ead56925dc8b0fc0.patch"; - sha256 = "sha256-vSnHhuOIXf/1X+bUkUmGND5b30ES0O8EDArwb4p2/w4="; - }) - ]; - } - ); in - stdenv.mkDerivation rec { pname = "tomlplusplus"; version = "3.3.0"; @@ -32,7 +17,7 @@ stdenv.mkDerivation rec { hash = "sha256-INX8TOEumz4B5coSxhiV7opc3rYJuQXT2k1BJ3Aje1M="; }; - nativeBuildInputs = [ fixedMeson cmake ninja ]; + nativeBuildInputs = [ meson cmake ninja ]; meta = with lib;{ homepage = "https://github.com/marzer/tomlplusplus"; From 094aeff17c046b38c54a327c73dbaaa23c9a078d Mon Sep 17 00:00:00 2001 From: zowoq <59103226+zowoq@users.noreply.github.com> Date: Wed, 3 May 2023 09:35:54 +1000 Subject: [PATCH 30/72] go_1_20: 1.20.3 -> 1.20.4 Changelog: https://go.dev/doc/devel/release#go1.20 --- pkgs/development/compilers/go/1.20.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/compilers/go/1.20.nix b/pkgs/development/compilers/go/1.20.nix index 3570f9efedf3..ad5a5e5944a9 100644 --- a/pkgs/development/compilers/go/1.20.nix +++ b/pkgs/development/compilers/go/1.20.nix @@ -46,11 +46,11 @@ let in stdenv.mkDerivation rec { pname = "go"; - version = "1.20.3"; + version = "1.20.4"; src = fetchurl { url = "https://go.dev/dl/go${version}.src.tar.gz"; - hash = "sha256-5Ee0mM3lAhXE92GeUSSw/E4l+10W6kcnHEfyeOeqdjo="; + hash = "sha256-nzSs4Sh2S3o6SyOLgFhWzBshhDBN+eVpCCWwcQ9CAtY="; }; strictDeps = true; From 53b268ad4a513decaad91d69483ac48319ed54cb Mon Sep 17 00:00:00 2001 From: Rahul Butani Date: Wed, 3 May 2023 16:42:11 -0500 Subject: [PATCH 31/72] cc-wrapper: support `--` Fixes #228136. --- pkgs/build-support/cc-wrapper/cc-wrapper.sh | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) diff --git a/pkgs/build-support/cc-wrapper/cc-wrapper.sh b/pkgs/build-support/cc-wrapper/cc-wrapper.sh index e8eb579e15ad..5350fc3cc9ae 100644 --- a/pkgs/build-support/cc-wrapper/cc-wrapper.sh +++ b/pkgs/build-support/cc-wrapper/cc-wrapper.sh @@ -33,6 +33,7 @@ cInclude=1 expandResponseParams "$@" linkType=$(checkLinkType "${params[@]}") +declare -ag positionalArgs=() declare -i n=0 nParams=${#params[@]} while (( "$n" < "$nParams" )); do @@ -54,6 +55,17 @@ while (( "$n" < "$nParams" )); do c++*) isCxx=1 ;; esac ;; + --) # Everything else is positional args! + # See: https://github.com/llvm/llvm-project/commit/ed1d07282cc9d8e4c25d585e03e5c8a1b6f63a74 + + # Any positional arg (i.e. any argument after `--`) will be + # interpreted as a "non flag" arg: + if [[ -v "params[$n]" ]]; then nonFlagArgs=1; fi + + positionalArgs=("${params[@]:$n}") + params=("${params[@]:0:$((n - 1))}") + break; + ;; -?*) ;; *) nonFlagArgs=1 ;; # Includes a solitary dash (`-`) which signifies standard input; it is not a flag esac @@ -207,6 +219,12 @@ if [ "$cc1" = 1 ]; then extraBefore=() fi +# Finally, if we got any positional args, append them to `extraAfter` +# now: +if [[ "${#positionalArgs[@]}" -gt 0 ]]; then + extraAfter+=(-- "${positionalArgs[@]}") +fi + # Optionally print debug info. if (( "${NIX_DEBUG:-0}" >= 1 )); then # Old bash workaround, see ld-wrapper for explanation. From 40c914f1be018545992a5b2e3182f3b940f907ce Mon Sep 17 00:00:00 2001 From: Rahul Butani Date: Wed, 3 May 2023 16:45:21 -0500 Subject: [PATCH 32/72] cc-wrapper-test: add tests for `--` --- pkgs/test/cc-wrapper/default.nix | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) diff --git a/pkgs/test/cc-wrapper/default.nix b/pkgs/test/cc-wrapper/default.nix index 6fd7d9f45db8..43e8e7a21426 100644 --- a/pkgs/test/cc-wrapper/default.nix +++ b/pkgs/test/cc-wrapper/default.nix @@ -13,6 +13,8 @@ in stdenv.mkDerivation { name = "cc-wrapper-test"; buildCommand = '' + set -o pipefail + NIX_DEBUG=1 $CC -v NIX_DEBUG=1 $CXX -v @@ -43,6 +45,27 @@ in stdenv.mkDerivation { ''} ''} + ${# See: https://github.com/llvm/llvm-project/commit/ed1d07282cc9d8e4c25d585e03e5c8a1b6f63a74 + # `gcc` does not support this so we gate the test on `clang` + lib.optionalString stdenv.cc.isClang '' + printf "checking whether cc-wrapper accepts -- followed by positional (file) args..." >&2 + mkdir -p positional + + # Make sure `--` is not parsed as a "non flag arg"; we should get an + # input file error here and *not* a linker error. + { ! $CC --; } |& grep -q "no input files" + + # And that positional file args _must_ be files (this is just testing + # that we remembered to put the `--` back in the args to the compiler): + { ! $CC -c -- -o foo ${./foo.c}; } \ + |& grep -q "no such file or directory: '-o'" + + # Now check that we accept single and multiple positional file args: + $CC -c -DVALUE=42 -o positional/foo.o -- ${./foo.c} + $CC -o positional/main -- positional/foo.o ${./ldflags-main.c} + ${emulator} ./positional/main + ''} + printf "checking whether compiler uses NIX_CFLAGS_COMPILE... " >&2 mkdir -p foo/include cp ${./foo.c} foo/include/foo.h From 08b4149d34f7b1bbcef63f79904de9eac1d5ee9f Mon Sep 17 00:00:00 2001 From: Fabian Affolter Date: Thu, 4 May 2023 00:19:43 +0200 Subject: [PATCH 33/72] python311Packages.rich: 13.3.1 -> 13.3.5 Diff: https://github.com/Textualize/rich/compare/refs/tags/v13.3.1...v13.3.5 Changelog: https://github.com/Textualize/rich/blob/v13.3.5/CHANGELOG.md --- pkgs/development/python-modules/rich/default.nix | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/pkgs/development/python-modules/rich/default.nix b/pkgs/development/python-modules/rich/default.nix index d334ce183951..24a25e2756a5 100644 --- a/pkgs/development/python-modules/rich/default.nix +++ b/pkgs/development/python-modules/rich/default.nix @@ -7,6 +7,7 @@ , pygments , typing-extensions , pytestCheckHook +, setuptools # for passthru.tests , enrich @@ -17,7 +18,7 @@ buildPythonPackage rec { pname = "rich"; - version = "13.3.1"; + version = "13.3.5"; format = "pyproject"; disabled = pythonOlder "3.7"; @@ -26,14 +27,17 @@ buildPythonPackage rec { owner = "Textualize"; repo = pname; rev = "refs/tags/v${version}"; - hash = "sha256-1soeb3aD4wB4stILvfOga/YZtyH6jd0XvnxkLmbW4G0="; + hash = "sha256-PnyO5u0gxfYKT6xr0k3H0lbLl9wKPl6oxR1mM9A0Hys="; }; - nativeBuildInputs = [ poetry-core ]; + nativeBuildInputs = [ + poetry-core + ]; propagatedBuildInputs = [ markdown-it-py pygments + setuptools ] ++ lib.optionals (pythonOlder "3.9") [ typing-extensions ]; From 1df91a6cbaea034b1020e42b85a90b8b369d47fd Mon Sep 17 00:00:00 2001 From: Fabian Affolter Date: Thu, 4 May 2023 00:21:25 +0200 Subject: [PATCH 34/72] python311Packages.textual: 0.15.1 -> 0.23.0 Diff: https://github.com/Textualize/textual/compare/refs/tags/v0.15.1...v0.23.0 Changelog: https://github.com/Textualize/textual/releases/tag/v0.23.0 --- pkgs/development/python-modules/textual/default.nix | 10 +++------- 1 file changed, 3 insertions(+), 7 deletions(-) diff --git a/pkgs/development/python-modules/textual/default.nix b/pkgs/development/python-modules/textual/default.nix index 3465fdc974fe..5e7237ce919d 100644 --- a/pkgs/development/python-modules/textual/default.nix +++ b/pkgs/development/python-modules/textual/default.nix @@ -22,7 +22,7 @@ buildPythonPackage rec { pname = "textual"; - version = "0.15.1"; + version = "0.23.0"; format = "pyproject"; disabled = pythonOlder "3.7"; @@ -31,18 +31,13 @@ buildPythonPackage rec { owner = "Textualize"; repo = pname; rev = "refs/tags/v${version}"; - hash = "sha256-UT+ApD/TTb5cxIdgK+n3B2J3z/nEwVXtuyPHpGCv6Tg="; + hash = "sha256-XgJ43yyiwzSH22NzidJ7z+Qh6+pOuAdfL7ZxabJkd3U="; }; nativeBuildInputs = [ poetry-core ]; - postPatch = '' - substituteInPlace pyproject.toml \ - --replace 'importlib-metadata = "^4.11.3"' 'importlib-metadata = "*"' - ''; - propagatedBuildInputs = [ rich markdown-it-py @@ -77,6 +72,7 @@ buildPythonPackage rec { meta = with lib; { description = "TUI framework for Python inspired by modern web development"; homepage = "https://github.com/Textualize/textual"; + changelog = "https://github.com/Textualize/textual/releases/tag/v${version}"; license = licenses.mit; maintainers = with maintainers; [ joelkoen ]; }; From 59e3c779d3e37760d7b48ea77790a3ad828351d4 Mon Sep 17 00:00:00 2001 From: Fabian Affolter Date: Sun, 30 Apr 2023 16:38:35 +0200 Subject: [PATCH 35/72] python310Packages.pyasn1-modules: 0.2.8 -> 0.3.0 Diff: pyasn1/pyasn1-modules@refs/tags/v0.2.8...v0.3.0 Changelog: https://github.com/pyasn1/pyasn1-modules/releases/tag/v0.3.0 --- .../python-modules/pyasn1-modules/default.nix | 40 +++++++++++-------- 1 file changed, 23 insertions(+), 17 deletions(-) diff --git a/pkgs/development/python-modules/pyasn1-modules/default.nix b/pkgs/development/python-modules/pyasn1-modules/default.nix index de87a9b5eeff..7a0735269897 100644 --- a/pkgs/development/python-modules/pyasn1-modules/default.nix +++ b/pkgs/development/python-modules/pyasn1-modules/default.nix @@ -1,35 +1,41 @@ { lib , buildPythonPackage -, fetchPypi +, fetchFromGitHub , pyasn1 -, pytest +, pytestCheckHook +, pythonOlder }: buildPythonPackage rec { pname = "pyasn1-modules"; - version = "0.2.8"; + version = "0.3.0"; - src = fetchPypi { - inherit pname version; - sha256 = "905f84c712230b2c592c19470d3ca8d552de726050d1d1716282a1f6146be65e"; + disabled = pythonOlder "3.7"; + + src = fetchFromGitHub { + owner = "pyasn1"; + repo = pname; + rev = "refs/tags/v${version}"; + hash = "sha256-AAS1VuppCIxgswpLSHFAc6q9cyJBLpdDuU9D1KU13vg="; }; - propagatedBuildInputs = [ pyasn1 ]; - - nativeCheckInputs = [ - pytest + propagatedBuildInputs = [ + pyasn1 ]; - # running tests through setup.py fails only for python2 for some reason: - # AttributeError: 'module' object has no attribute 'suitetests' - checkPhase = '' - py.test - ''; + nativeCheckInputs = [ + pytestCheckHook + ]; + + pythonImportsCheck = [ + "pyasn1_modules" + ]; meta = with lib; { description = "A collection of ASN.1-based protocols modules"; - homepage = "https://pypi.python.org/pypi/pyasn1-modules"; + homepage = "https://github.com/pyasn1/pyasn1-modules"; + changelog = "https://github.com/pyasn1/pyasn1-modules/releases/tag/v${version}"; license = licenses.bsd3; - platforms = platforms.unix; # same as pyasn1 + maintainers = with maintainers; [ ]; }; } From f99abaaa6c71fef62400339353b74a1d86d2c2b2 Mon Sep 17 00:00:00 2001 From: Fabian Affolter Date: Sun, 30 Apr 2023 16:44:42 +0200 Subject: [PATCH 36/72] python310Packages.pyasn1: 0.4.8 -> 0.5.0 Changelog: https://github.com/etingof/pyasn1/blob/master/CHANGES.rst --- .../python-modules/pyasn1/default.nix | 20 ++++++++++++++----- 1 file changed, 15 insertions(+), 5 deletions(-) diff --git a/pkgs/development/python-modules/pyasn1/default.nix b/pkgs/development/python-modules/pyasn1/default.nix index a3dbc7396b0d..ccdff83be1cd 100644 --- a/pkgs/development/python-modules/pyasn1/default.nix +++ b/pkgs/development/python-modules/pyasn1/default.nix @@ -1,19 +1,29 @@ -{ lib, buildPythonPackage, fetchPypi, }: +{ lib +, buildPythonPackage +, fetchPypi +, pythonOlder +}: buildPythonPackage rec { pname = "pyasn1"; - version = "0.4.8"; + version = "0.5.0"; + format = "setuptools"; + + disabled = pythonOlder "3.7"; src = fetchPypi { inherit pname version; - sha256 = "aef77c9fb94a3ac588e87841208bdec464471d9871bd5050a287cc9a475cd0ba"; + hash = "sha256-l7cpDKaOYqgyVY7Dl28Vy/kRv118cDnYuGHCoOzmn94="; }; - pythonImportsCheck = [ "pyasn1" ]; + pythonImportsCheck = [ + "pyasn1" + ]; meta = with lib; { description = "Generic ASN.1 library for Python"; - homepage = "https://github.com/etingof/pyasn1"; + homepage = "https://pyasn1.readthedocs.io"; + changelog = "https://github.com/etingof/pyasn1/blob/master/CHANGES.rst"; license = licenses.bsd2; maintainers = with maintainers; [ SuperSandro2000 ]; }; From 9edd42ed406fa8c4dcc7806c2b93604b438e5cb1 Mon Sep 17 00:00:00 2001 From: Fabian Affolter Date: Thu, 4 May 2023 00:58:13 +0200 Subject: [PATCH 37/72] python310Packages.requests: 2.28.2 -> 2.29.0 Changelog: https://github.com/psf/requests/blob/v2.29.0/HISTORY.md --- pkgs/development/python-modules/requests/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/python-modules/requests/default.nix b/pkgs/development/python-modules/requests/default.nix index dfa4b16c8e98..23506a63f1ae 100644 --- a/pkgs/development/python-modules/requests/default.nix +++ b/pkgs/development/python-modules/requests/default.nix @@ -18,7 +18,7 @@ buildPythonPackage rec { pname = "requests"; - version = "2.28.2"; + version = "2.29.0"; format = "setuptools"; disabled = pythonOlder "3.7"; @@ -27,7 +27,7 @@ buildPythonPackage rec { src = fetchPypi { inherit pname version; - hash = "sha256-mLGyeC48bEkEk4uEwOuTJyEGnf25E0MTvv98g8LfJL8="; + hash = "sha256-8uNKdfR0kBm7Dj7/tmaDYw5P/q91gZ+1G+vvG/Wu8Fk="; }; propagatedBuildInputs = [ From 12a4c5db1560da968c33ca976951692ca8f55ea6 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?PedroHLC=20=E2=98=AD?= Date: Wed, 3 May 2023 21:09:49 -0300 Subject: [PATCH 38/72] hwdata: 0.369 -> 0.370 --- pkgs/os-specific/linux/hwdata/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/os-specific/linux/hwdata/default.nix b/pkgs/os-specific/linux/hwdata/default.nix index da382581ed53..59f9d368f2fd 100644 --- a/pkgs/os-specific/linux/hwdata/default.nix +++ b/pkgs/os-specific/linux/hwdata/default.nix @@ -2,13 +2,13 @@ stdenv.mkDerivation rec { pname = "hwdata"; - version = "0.369"; + version = "0.370"; src = fetchFromGitHub { owner = "vcrhonek"; repo = "hwdata"; rev = "v${version}"; - sha256 = "sha256-0AyWRir2pT4wBf2/06zVDIUWru8oGaIHoKXVz/3CiSc="; + sha256 = "sha256-fqhYPKqtuI+7h/SgdWI4i7jBTgluy/hI8Q6pq4LKtY4="; }; postPatch = '' From d0ef78a36d63728582dd5fd7612622f085d338eb Mon Sep 17 00:00:00 2001 From: Martin Weinelt Date: Thu, 4 May 2023 07:26:44 +0200 Subject: [PATCH 39/72] python310Packages.orjson: 3.8.9 -> 3.8.11 https://github.com/ijl/orjson/releases/tag/3.8.10 https://github.com/ijl/orjson/releases/tag/3.8.11 --- pkgs/development/python-modules/orjson/default.nix | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/pkgs/development/python-modules/orjson/default.nix b/pkgs/development/python-modules/orjson/default.nix index 61a545b0d481..dc081c385d6c 100644 --- a/pkgs/development/python-modules/orjson/default.nix +++ b/pkgs/development/python-modules/orjson/default.nix @@ -16,7 +16,7 @@ buildPythonPackage rec { pname = "orjson"; - version = "3.8.9"; + version = "3.8.11"; format = "pyproject"; disabled = pythonOlder "3.7"; @@ -25,13 +25,13 @@ buildPythonPackage rec { owner = "ijl"; repo = pname; rev = "refs/tags/${version}"; - hash = "sha256-0/yvXXj+z2jBEAGxO4BxMnx1zqUoultYSYfSkKs+hKY="; + hash = "sha256-TFoagWUtd/nJceNaptgPp4aTR/tBCmxpiZIVJwOlia4="; }; cargoDeps = rustPlatform.fetchCargoTarball { inherit src; name = "${pname}-${version}"; - hash = "sha256-ogkTRRykLF2dTOxilsfwsRH+Au/O0e1kL1e9sFOFLeY="; + hash = "sha256-/x+0/I3WFxPwVu2LliTgr42SuJX7VjOLe/SGai5OgAw="; }; nativeBuildInputs = [ From 8f73b48cadb899e4121de6e66a0871d523790f6b Mon Sep 17 00:00:00 2001 From: "R. Ryantm" Date: Thu, 4 May 2023 05:50:03 +0000 Subject: [PATCH 40/72] imlib2: 1.10.0 -> 1.11.1 --- pkgs/development/libraries/imlib2/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/libraries/imlib2/default.nix b/pkgs/development/libraries/imlib2/default.nix index c178da90a0df..d3bb37d26808 100644 --- a/pkgs/development/libraries/imlib2/default.nix +++ b/pkgs/development/libraries/imlib2/default.nix @@ -29,11 +29,11 @@ let in stdenv.mkDerivation (finalAttrs: { pname = "imlib2"; - version = "1.10.0"; + version = "1.11.1"; src = fetchurl { url = "mirror://sourceforge/enlightenment/${finalAttrs.pname}-${finalAttrs.version}.tar.xz"; - hash = "sha256-cnwak3yIXAgMNyF+R23Ii1o+YNc38b8ECzQ1ILeBy7o="; + hash = "sha256-9xK2u53K1G2Lj0rVJhDcu667TMgLX9EvkxJNOjgPpr8="; }; buildInputs = [ From d36cd8587bc765aa57d9748cacbbf3f1e3e4ffaa Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Vladim=C3=ADr=20=C4=8Cun=C3=A1t?= Date: Thu, 4 May 2023 11:06:54 +0200 Subject: [PATCH 41/72] Revert "linux_6_1: rebuild on x86_64-linux" This reverts commit fa8367c2d50781f3e49ed424ea61af0c77615069. --- pkgs/os-specific/linux/kernel/linux-6.1.nix | 2 -- 1 file changed, 2 deletions(-) diff --git a/pkgs/os-specific/linux/kernel/linux-6.1.nix b/pkgs/os-specific/linux/kernel/linux-6.1.nix index 9b9c772b6435..bac200d06076 100644 --- a/pkgs/os-specific/linux/kernel/linux-6.1.nix +++ b/pkgs/os-specific/linux/kernel/linux-6.1.nix @@ -15,6 +15,4 @@ buildLinux (args // rec { url = "mirror://kernel/linux/kernel/v6.x/linux-${version}.tar.xz"; sha256 = "01grx5y48scyyihpj176knn5yvgpxv2gfkli03rwj31xvnb4pdy2"; }; - # TODO: possible to remove after any rebuild, e.g. after update. - extraConfig = lib.optionalString (buildPackages.stdenv.system == "x86_64-linux") "\n"; } // (args.argsOverride or { })) From 4e84de9755438acd60f3690020c736e2b649c987 Mon Sep 17 00:00:00 2001 From: Nick Cao Date: Thu, 4 May 2023 20:18:01 +0800 Subject: [PATCH 42/72] ruby_3_0: unpin openssl_1_1 --- pkgs/development/interpreters/ruby/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/interpreters/ruby/default.nix b/pkgs/development/interpreters/ruby/default.nix index 806b1382bf9e..daa512500a41 100644 --- a/pkgs/development/interpreters/ruby/default.nix +++ b/pkgs/development/interpreters/ruby/default.nix @@ -84,8 +84,8 @@ let ++ (op fiddleSupport libffi) ++ (ops cursesSupport [ ncurses readline ]) ++ (op zlibSupport zlib) - ++ (op (lib.versionOlder ver.majMin "3.0" && opensslSupport) openssl_1_1) - ++ (op (atLeast30 && opensslSupport) openssl_1_1) + ++ (op (!atLeast30 && opensslSupport) openssl_1_1) + ++ (op (atLeast30 && opensslSupport) openssl) ++ (op gdbmSupport gdbm) ++ (op yamlSupport libyaml) # Looks like ruby fails to build on darwin without readline even if curses From 6538d97fd4bdb2104f397d245614c46fe7d14629 Mon Sep 17 00:00:00 2001 From: Martin Weinelt Date: Thu, 4 May 2023 14:36:25 +0200 Subject: [PATCH 43/72] python310Packages.django_3: 3.2.18 -> 3.2.19 https://docs.djangoproject.com/en/dev/releases/3.2.19/ Fixes: CVE-2023-31047 --- pkgs/development/python-modules/django/3.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/python-modules/django/3.nix b/pkgs/development/python-modules/django/3.nix index de1424bb0ec4..cd07c13358d5 100644 --- a/pkgs/development/python-modules/django/3.nix +++ b/pkgs/development/python-modules/django/3.nix @@ -15,14 +15,14 @@ buildPythonPackage rec { pname = "django"; - version = "3.2.18"; + version = "3.2.19"; disabled = pythonOlder "3.7"; src = fetchPypi { pname = "Django"; inherit version; - hash = "sha256-CCCN/okutk//BzynQ7O5UjERBPk55/ba6VT+ctzFM7o="; + hash = "sha256-AxNluuloFNoZwQcGIYxE3/O2VMxN4gqYvS0pub3kafA="; }; patches = [ From 3d2bdd0788d7fa05883cafc1f8c2ab29527ef4f1 Mon Sep 17 00:00:00 2001 From: Jonas Chevalier Date: Thu, 4 May 2023 18:30:25 +0200 Subject: [PATCH 44/72] python: implement PEP 668 (#229166) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Add a marker file to the python outputs that tells pip and other tooling following PEP 668 that they should not be installing things system-wide. This provides better feedback to the user and also potentially avoids issues in single-user installs where the /nix/store is owned by the user. For more details, see Here is how it currently looks like: $ pip install requests error: externally-managed-environment × This environment is externally managed ╰─> This command has been disabled as it tries to modify the immutable `/nix/store` filesystem. To use Python with Nix and nixpkgs, have a look at the online documentation: . --- nixos/doc/manual/release-notes/rl-2305.section.md | 2 ++ .../interpreters/python/cpython/default.nix | 10 ++++++++++ 2 files changed, 12 insertions(+) diff --git a/nixos/doc/manual/release-notes/rl-2305.section.md b/nixos/doc/manual/release-notes/rl-2305.section.md index e937f756991a..3d5dea7d8856 100644 --- a/nixos/doc/manual/release-notes/rl-2305.section.md +++ b/nixos/doc/manual/release-notes/rl-2305.section.md @@ -24,6 +24,8 @@ In addition to numerous new and upgraded packages, this release has the followin - KDE Plasma has been updated to v5.27, see [the release notes](https://kde.org/announcements/plasma/5/5.27.0/) for what is changed. +- Python implements [PEP 668](https://peps.python.org/pep-0668/), providing better feedback to users that try to run `pip install` system-wide. + - `nixos-rebuild` now supports an extra `--specialisation` option that can be used to change specialisation for `switch` and `test` commands. - `libxcrypt`, the library providing the `crypt(3)` password hashing function, is now built without support for algorithms not flagged [`strong`](https://github.com/besser82/libxcrypt/blob/v4.4.33/lib/hashes.conf#L48). This affects the availability of password hashing algorithms used for system login (`login(1)`, `passwd(1)`), but also Apache2 Basic-Auth, Samba, OpenLDAP, Dovecot, and [many other packages](https://github.com/search?q=repo%3ANixOS%2Fnixpkgs%20libxcrypt&type=code). diff --git a/pkgs/development/interpreters/python/cpython/default.nix b/pkgs/development/interpreters/python/cpython/default.nix index 3f48b2c6eb20..a089dbf2002b 100644 --- a/pkgs/development/interpreters/python/cpython/default.nix +++ b/pkgs/development/interpreters/python/cpython/default.nix @@ -486,6 +486,16 @@ in with passthru; stdenv.mkDerivation { # bytecode compilations for the same reason - we don't want bytecode generated. mkdir -p $out/share/gdb sed '/^#!/d' Tools/gdb/libpython.py > $out/share/gdb/libpython.py + + # Disable system-wide pip installation. See https://peps.python.org/pep-0668/. + cat <<'EXTERNALLY_MANAGED' > $out/lib/${libPrefix}/EXTERNALLY-MANAGED + [externally-managed] + Error=This command has been disabled as it tries to modify the immutable + `/nix/store` filesystem. + + To use Python with Nix and nixpkgs, have a look at the online documentation: + . + EXTERNALLY_MANAGED ''; preFixup = lib.optionalString (stdenv.hostPlatform != stdenv.buildPlatform) '' From ad6906feb7db94531a3cc3077be07ef544bb7352 Mon Sep 17 00:00:00 2001 From: "Travis A. Everett" Date: Thu, 20 Apr 2023 23:18:24 -0500 Subject: [PATCH 45/72] doxygen: enable sqlite3 output --- .../tools/documentation/doxygen/default.nix | 20 +++++++++++++++---- 1 file changed, 16 insertions(+), 4 deletions(-) diff --git a/pkgs/development/tools/documentation/doxygen/default.nix b/pkgs/development/tools/documentation/doxygen/default.nix index 1b128a51d0b1..2790c3341754 100644 --- a/pkgs/development/tools/documentation/doxygen/default.nix +++ b/pkgs/development/tools/documentation/doxygen/default.nix @@ -1,4 +1,15 @@ -{ lib, stdenv, cmake, fetchFromGitHub, python3, flex, bison, qt5, CoreServices, libiconv }: +{ lib +, stdenv +, cmake +, fetchFromGitHub +, python3 +, flex +, bison +, qt5 +, CoreServices +, libiconv +, withSqlite ? true, sqlite +}: stdenv.mkDerivation rec { pname = "doxygen"; @@ -19,12 +30,13 @@ stdenv.mkDerivation rec { ]; buildInputs = [ libiconv ] + ++ lib.optionals withSqlite [ sqlite ] ++ lib.optionals (qt5 != null) (with qt5; [ qtbase wrapQtAppsHook ]) ++ lib.optionals stdenv.isDarwin [ CoreServices ]; - cmakeFlags = - [ "-DICONV_INCLUDE_DIR=${libiconv}/include" ] ++ - lib.optional (qt5 != null) "-Dbuild_wizard=YES"; + cmakeFlags = [ "-DICONV_INCLUDE_DIR=${libiconv}/include" ] + ++ lib.optional withSqlite "-Duse_sqlite3=ON" + ++ lib.optional (qt5 != null) "-Dbuild_wizard=YES"; env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-mmacosx-version-min=10.9"; From a6a8834043fd746f69ae0f4693d8e6857269be0c Mon Sep 17 00:00:00 2001 From: "Travis A. Everett" Date: Fri, 21 Apr 2023 19:49:08 -0500 Subject: [PATCH 46/72] doxygen: use apple_sdk_11_0 I tried to build the upstream's master branch and am getting failures on missing utimensat on intel-based mac. (Basically just preparing for the next release, which I imagine is nigh.) --- pkgs/top-level/all-packages.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index a9cae64ed9a9..81ad6b915ecd 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -17982,9 +17982,9 @@ with pkgs; dot2tex = with python3.pkgs; toPythonApplication dot2tex; - doxygen = callPackage ../development/tools/documentation/doxygen { + doxygen = darwin.apple_sdk_11_0.callPackage ../development/tools/documentation/doxygen { qt5 = null; - inherit (darwin.apple_sdk.frameworks) CoreServices; + inherit (darwin.apple_sdk_11_0.frameworks) CoreServices; }; doxygen_gui = lowPrio (doxygen.override { inherit qt5; }); From e5c113e3e79047f1f60a551cbf28c2ca85853a05 Mon Sep 17 00:00:00 2001 From: "Travis A. Everett" Date: Fri, 21 Apr 2023 19:57:34 -0500 Subject: [PATCH 47/72] doxygen: add output for examples --- pkgs/development/tools/documentation/doxygen/default.nix | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/pkgs/development/tools/documentation/doxygen/default.nix b/pkgs/development/tools/documentation/doxygen/default.nix index 2790c3341754..29f4fcfd4ae8 100644 --- a/pkgs/development/tools/documentation/doxygen/default.nix +++ b/pkgs/development/tools/documentation/doxygen/default.nix @@ -41,6 +41,12 @@ stdenv.mkDerivation rec { env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isDarwin "-mmacosx-version-min=10.9"; + # put examples in an output so people/tools can test against them + outputs = [ "out" "examples" ]; + postInstall = '' + cp -r ../examples $examples + ''; + meta = { license = lib.licenses.gpl2Plus; homepage = "https://www.doxygen.nl/"; From 1b6078a24a42c0d809a8739ffd24758f857c52e4 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Sandro=20J=C3=A4ckel?= Date: Sun, 30 Apr 2023 02:47:14 +0200 Subject: [PATCH 48/72] nixos/no-x-libs: add pipewire --- nixos/modules/config/no-x-libs.nix | 1 + 1 file changed, 1 insertion(+) diff --git a/nixos/modules/config/no-x-libs.nix b/nixos/modules/config/no-x-libs.nix index 3ebe2fa9f164..fe9399c398c0 100644 --- a/nixos/modules/config/no-x-libs.nix +++ b/nixos/modules/config/no-x-libs.nix @@ -59,6 +59,7 @@ with lib; networkmanager-vpnc = super.networkmanager-vpnc.override { withGnome = false; }; pango = super.pango.override { x11Support = false; }; pinentry = super.pinentry.override { enabledFlavors = [ "curses" "tty" "emacs" ]; withLibsecret = false; }; + pipewire = super.pipewire.override { x11Support = false; }; qemu = super.qemu.override { gtkSupport = false; spiceSupport = false; sdlSupport = false; }; qrencode = super.qrencode.overrideAttrs (_: { doCheck = false; }); qt5 = super.qt5.overrideScope (const (super': { From 906390715c7815603bf217a949817f92b0759e91 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Sandro=20J=C3=A4ckel?= Date: Sun, 30 Apr 2023 02:47:21 +0200 Subject: [PATCH 49/72] pipewire: disable options which depend on x11 if it is disabled --- pkgs/development/libraries/pipewire/default.nix | 2 ++ 1 file changed, 2 insertions(+) diff --git a/pkgs/development/libraries/pipewire/default.nix b/pkgs/development/libraries/pipewire/default.nix index b9a2fdb5f0ef..8f74140ec68a 100644 --- a/pkgs/development/libraries/pipewire/default.nix +++ b/pkgs/development/libraries/pipewire/default.nix @@ -184,6 +184,8 @@ let "-Dsession-managers=" "-Dvulkan=enabled" "-Dx11=${mesonEnableFeature x11Support}" + "-Dx11-xfixes=${mesonEnableFeature x11Support}" + "-Dlibcanberra=${mesonEnableFeature x11Support}" "-Dlibmysofa=${mesonEnableFeature mysofaSupport}" "-Dsdl2=disabled" # required only to build examples, causes dependency loop "-Drlimits-install=false" # installs to /etc, we won't use this anyway From 576c04a3c8955ca746d7ebad871a2e18f798e3ea Mon Sep 17 00:00:00 2001 From: Elias Naur Date: Mon, 1 May 2023 16:50:18 -0600 Subject: [PATCH 50/72] cpio: 2.13 -> 2.14 Changelog: https://git.savannah.gnu.org/cgit/cpio.git/tree/NEWS#n7 Includes fix for CVE-2021-38185, https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=dd96882877721703e19272fe25034560b794061b For me, I'm interested in the `--reproducible` fix for hard link counts being dependent on the underlying filesystem. --- pkgs/tools/archivers/cpio/default.nix | 27 +++------------------------ 1 file changed, 3 insertions(+), 24 deletions(-) diff --git a/pkgs/tools/archivers/cpio/default.nix b/pkgs/tools/archivers/cpio/default.nix index 274fe0ac8326..da3a4a2114c9 100644 --- a/pkgs/tools/archivers/cpio/default.nix +++ b/pkgs/tools/archivers/cpio/default.nix @@ -1,35 +1,14 @@ -{ lib, stdenv, fetchurl, fetchpatch }: +{ lib, stdenv, fetchurl }: stdenv.mkDerivation rec { pname = "cpio"; - version = "2.13"; + version = "2.14"; src = fetchurl { url = "mirror://gnu/cpio/cpio-${version}.tar.bz2"; - sha256 = "0vbgnhkawdllgnkdn6zn1f56fczwk0518krakz2qbwhxmv2vvdga"; + sha256 = "/NwV1g9yZ6b8fvzWudt7bIlmxPL7u5ZMJNQTNv0/LBI="; }; - patches = let - fp = suffix: rev: sha256: fetchpatch { - name = "CVE-2021-38185-${suffix}.patch"; - url = "https://git.savannah.gnu.org/cgit/cpio.git/patch/?id=${rev}"; - inherit sha256; - }; - in [ - (fp "1" "dd96882877721703e19272fe25034560b794061b" - "0vmr0qjwj2ldnzsvccl105ckwgx3ssvn9mp3f27ss0kiyigrzz32") - (fp "2" "dfc801c44a93bed7b3951905b188823d6a0432c8" - "1qkrhi3lbxk6hflp6w3h4sgssc0wblv8r0qgxqzbjrm36pqwxiwh") - (fp "3" "236684f6deb3178043fe72a8e2faca538fa2aae1" - "0pidkbxalpj5yz4fr95x8h0rizgjij0xgvjgirfkjk460giawwg6") - (fetchpatch { - # upstream build fix against -fno-common compilers like >=gcc-10 - name = "fno-common-fix.patch"; - url = "https://git.savannah.gnu.org/cgit/cpio.git/patch/?id=641d3f489cf6238bb916368d4ba0d9325a235afb"; - sha256 = "1ffawzxjw72kzpdwffi2y7pvibrmwf4jzrxdq9f4a75q6crl66iq"; - }) - ]; - separateDebugInfo = true; preConfigure = lib.optionalString stdenv.isCygwin '' From 2376eb8d7e413a3f486ddc8075f856e62cb99ef5 Mon Sep 17 00:00:00 2001 From: Dominique Martinet Date: Tue, 2 May 2023 14:12:55 +0900 Subject: [PATCH 51/72] libbpf: 1.1.0 -> 1.2.0 --- pkgs/os-specific/linux/libbpf/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/os-specific/linux/libbpf/default.nix b/pkgs/os-specific/linux/libbpf/default.nix index d6bb9d4a431b..be1a1453e871 100644 --- a/pkgs/os-specific/linux/libbpf/default.nix +++ b/pkgs/os-specific/linux/libbpf/default.nix @@ -9,13 +9,13 @@ stdenv.mkDerivation rec { pname = "libbpf"; - version = "1.1.0"; + version = "1.2.0"; src = fetchFromGitHub { owner = "libbpf"; repo = "libbpf"; rev = "v${version}"; - sha256 = "sha256-/vt6IA1o0gjFtXUWhEKIZ1DUWIN2LOvrhLfFzJBACGY="; + sha256 = "sha256-NimK4pdYcai21hZHdP1mBX1MOlNY61iDJ+PDYwpRuVE="; }; nativeBuildInputs = [ pkg-config ]; From 5e8a27296be1eb559c0a727884a380ad65c31b3c Mon Sep 17 00:00:00 2001 From: Dominique Martinet Date: Sat, 4 Feb 2023 13:58:07 +0900 Subject: [PATCH 52/72] nixosTests.bpf: disable kfunc test on aarch64 commit fd5d7b258694 ("tests/bpf: add module BTF test") added a new test for module BTF, but that test does not work on aarch64. (merged in https://github.com/NixOS/nixpkgs/pull/214001 ) This is not a regression (kfuncs didn't work on bpftrace 0.16, even if you do not use features requiring BTF like argument name or type), so just disable the test on aarch64 until it is fixed. --- nixos/tests/bpf.nix | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/nixos/tests/bpf.nix b/nixos/tests/bpf.nix index 5dc97404772b..150ed0958862 100644 --- a/nixos/tests/bpf.nix +++ b/nixos/tests/bpf.nix @@ -26,8 +26,11 @@ import ./make-test-python.nix ({ pkgs, ... }: { " printf(\"tgid: %d\", ((struct task_struct*) curtask)->tgid); exit() " "}'")) # module BTF (bpftrace >= 0.17) - print(machine.succeed("bpftrace -e 'kfunc:nft_trans_alloc_gfp { " - " printf(\"portid: %d\\n\",args->ctx->portid); " + # test is currently disabled on aarch64 as kfunc does not work there yet + # https://github.com/iovisor/bpftrace/issues/2496 + print(machine.succeed("uname -m | grep aarch64 || " + "bpftrace -e 'kfunc:nft_trans_alloc_gfp { " + " printf(\"portid: %d\\n\", args->ctx->portid); " "} BEGIN { exit() }'")) ''; }) From bc4549fe3a13688aef1c486666b6ba351cc8b2bf Mon Sep 17 00:00:00 2001 From: Martin Weinelt Date: Sat, 6 May 2023 02:32:05 +0200 Subject: [PATCH 53/72] cacert: 3.86 -> 3.89.1 https://github.com/nss-dev/nss/blob/master/doc/rst/releases/nss_3_89_1.rst --- pkgs/data/misc/cacert/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/data/misc/cacert/default.nix b/pkgs/data/misc/cacert/default.nix index 2ae33c049bd2..baa714576b62 100644 --- a/pkgs/data/misc/cacert/default.nix +++ b/pkgs/data/misc/cacert/default.nix @@ -30,7 +30,7 @@ let ])); extraCertificatesBundle = writeText "cacert-extra-certificates-bundle.crt" (lib.concatStringsSep "\n\n" extraCertificateStrings); - srcVersion = "3.86"; + srcVersion = "3.89.1"; version = if nssOverride != null then nssOverride.version else srcVersion; meta = with lib; { homepage = "https://curl.haxx.se/docs/caextract.html"; @@ -45,7 +45,7 @@ let src = if nssOverride != null then nssOverride.src else fetchurl { url = "mirror://mozilla/security/nss/releases/NSS_${lib.replaceStrings ["."] ["_"] version}_RTM/src/nss-${version}.tar.gz"; - sha256 = "sha256-PzhfxoZHa7uoEQNfpoIbVCR11VdHsYwgwiHU1mVzuXU="; + hash = "sha256-OtrtuecMPF9AYDv2CgHjNhkKbb4Bkp05XxawH+hKAVY="; }; dontBuild = true; From 023a7822f81558c43870dfdb414bc2975b7e6f84 Mon Sep 17 00:00:00 2001 From: "R. Ryantm" Date: Sat, 6 May 2023 08:06:53 +0000 Subject: [PATCH 54/72] xz: 5.4.2 -> 5.4.3 --- pkgs/tools/compression/xz/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/tools/compression/xz/default.nix b/pkgs/tools/compression/xz/default.nix index 41237a953cb8..44bee00d0842 100644 --- a/pkgs/tools/compression/xz/default.nix +++ b/pkgs/tools/compression/xz/default.nix @@ -10,11 +10,11 @@ stdenv.mkDerivation rec { pname = "xz"; - version = "5.4.2"; + version = "5.4.3"; src = fetchurl { url = "https://tukaani.org/xz/xz-${version}.tar.bz2"; - sha256 = "sha256-qkmQnL2QKMRmajX6SXX5piA+2YFU+7giPuQ++c7ul8M="; + sha256 = "sha256-kkOgRZjXpwwfVnoBQ6JVWBrFxksUD9Vf1cvB4AsOb5A="; }; strictDeps = true; From aece2b1d78a7fe3ae5de3dcdaa7739f64eceaca7 Mon Sep 17 00:00:00 2001 From: "R. Ryantm" Date: Sun, 7 May 2023 15:05:19 +0000 Subject: [PATCH 55/72] libssh: 0.10.4 -> 0.10.5 --- pkgs/development/libraries/libssh/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/libraries/libssh/default.nix b/pkgs/development/libraries/libssh/default.nix index b1cb2fc4570c..417405f42652 100644 --- a/pkgs/development/libraries/libssh/default.nix +++ b/pkgs/development/libraries/libssh/default.nix @@ -15,11 +15,11 @@ stdenv.mkDerivation rec { pname = "libssh"; - version = "0.10.4"; + version = "0.10.5"; src = fetchurl { url = "https://www.libssh.org/files/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; - sha256 = "sha256-BzksVKthR2KI0cHwp8VXtQIReXrQDDTDryu8TbxL2X0="; + sha256 = "sha256-tg4v9/Nnue7itWNNOmMwPd/t4OahjfyojESodw5+QjQ="; }; postPatch = '' From 416f268c64baf844a81eacf9d946820a8f484ee7 Mon Sep 17 00:00:00 2001 From: Alyssa Ross Date: Sun, 30 Apr 2023 12:15:59 +0000 Subject: [PATCH 56/72] acl: backport patch for musl 1.2.4 --- pkgs/development/libraries/acl/LFS64.patch | 38 ++++++++++++++++++++++ pkgs/development/libraries/acl/default.nix | 6 +++- 2 files changed, 43 insertions(+), 1 deletion(-) create mode 100644 pkgs/development/libraries/acl/LFS64.patch diff --git a/pkgs/development/libraries/acl/LFS64.patch b/pkgs/development/libraries/acl/LFS64.patch new file mode 100644 index 000000000000..dee951f4121e --- /dev/null +++ b/pkgs/development/libraries/acl/LFS64.patch @@ -0,0 +1,38 @@ +From 2b42f64737adf6a2ddd491213580d6e9cdd2f5af Mon Sep 17 00:00:00 2001 +From: Khem Raj +Date: Thu, 10 Nov 2022 18:04:15 -0800 +Subject: chacl: Use portable version of dirent and readdir + +Using 64bit versions on 32bit architectures should be enabled with +--enable-largefile, this makes it portable across musl and glibc + +Signed-off-by: Khem Raj +--- + tools/chacl.c | 4 ++-- + 1 file changed, 2 insertions(+), 2 deletions(-) + +diff --git a/tools/chacl.c b/tools/chacl.c +index 525a7ff..8fff875 100644 +--- a/tools/chacl.c ++++ b/tools/chacl.c +@@ -320,7 +320,7 @@ walk_dir(acl_t acl, acl_t dacl, const char *fname) + { + int failed = 0; + DIR *dir; +- struct dirent64 *d; ++ struct dirent *d; + char *name; + + if ((dir = opendir(fname)) == NULL) { +@@ -332,7 +332,7 @@ walk_dir(acl_t acl, acl_t dacl, const char *fname) + return(0); /* got a file, not an error */ + } + +- while ((d = readdir64(dir)) != NULL) { ++ while ((d = readdir(dir)) != NULL) { + /* skip "." and ".." entries */ + if (strcmp(d->d_name, ".") == 0 || strcmp(d->d_name, "..") == 0) + continue; +-- +cgit v1.1 + diff --git a/pkgs/development/libraries/acl/default.nix b/pkgs/development/libraries/acl/default.nix index 5b31ba3a1c85..eccfef568e9c 100644 --- a/pkgs/development/libraries/acl/default.nix +++ b/pkgs/development/libraries/acl/default.nix @@ -14,6 +14,10 @@ stdenv.mkDerivation rec { sha256 = "sha256-dgxhxokBs3/dXu/ur0wMeia9/disdHoe3/HODiQ8Ea8="; }; + patches = [ + ./LFS64.patch + ]; + outputs = [ "bin" "dev" "out" "man" "doc" ]; nativeBuildInputs = [ gettext ]; @@ -24,7 +28,7 @@ stdenv.mkDerivation rec { # Upstream use C++-style comments in C code. Remove them. # This comment breaks compilation if too strict gcc flags are used. - patchPhase = '' + postPatch = '' echo "Removing C++-style comments from include/acl.h" sed -e '/^\/\//d' -i include/acl.h From 1124a754598516e85d39da3aa6cdf38113179aee Mon Sep 17 00:00:00 2001 From: Alyssa Ross Date: Sun, 30 Apr 2023 16:51:07 +0000 Subject: [PATCH 57/72] xorg.libpciaccess: backport patch for musl 1.2.4 --- pkgs/servers/x11/xorg/overrides.nix | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/pkgs/servers/x11/xorg/overrides.nix b/pkgs/servers/x11/xorg/overrides.nix index d22155c97a4b..dc7e65313e3a 100644 --- a/pkgs/servers/x11/xorg/overrides.nix +++ b/pkgs/servers/x11/xorg/overrides.nix @@ -332,6 +332,13 @@ self: super: }); libpciaccess = super.libpciaccess.overrideAttrs (attrs: { + patches = attrs.patches or [] ++ [ + (fetchpatch { + url = "https://gitlab.freedesktop.org/xorg/lib/libpciaccess/-/commit/833c86ce15cee2a84a37ae71015f236fd32615d9.patch"; + hash = "sha256-6koQV+Vse7/OWwuWYrWmBUebHBT+5F32Kkn9V9j+m+Q="; + }) + ]; + buildInputs = lib.optionals stdenv.hostPlatform.isNetBSD (with netbsd; [ libarch libpci ]); meta = attrs.meta // { From ad28c1ebcb3720cbda10a03442aab55331ae2738 Mon Sep 17 00:00:00 2001 From: Alyssa Ross Date: Wed, 3 May 2023 13:32:22 +0000 Subject: [PATCH 58/72] gdb: backport patch for musl 1.2.4 --- pkgs/development/tools/misc/gdb/default.nix | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/pkgs/development/tools/misc/gdb/default.nix b/pkgs/development/tools/misc/gdb/default.nix index 36076c4c2cdc..427333509969 100644 --- a/pkgs/development/tools/misc/gdb/default.nix +++ b/pkgs/development/tools/misc/gdb/default.nix @@ -48,6 +48,12 @@ stdenv.mkDerivation rec { patches = [ ./debug-info-from-env.patch + + # Backport musl fix + (fetchpatch { + url = "https://sourceware.org/git/?p=binutils-gdb.git;a=patch;h=2e977d9901393ea1bacbe1896af0929e968bc811"; + hash = "sha256-/+UYjiOxrszJy1x8xavs63/ptNZ+ISIAQhG+i86VDpA="; + }) ] ++ lib.optionals stdenv.isDarwin [ ./darwin-target-match.patch ]; From 34629fce5f0708fc2d6e833ef82252826d2bfbca Mon Sep 17 00:00:00 2001 From: Dmitry Bogatov Date: Tue, 3 Jan 2023 20:17:28 -0500 Subject: [PATCH 59/72] python3.pkgs.deprecated: build offline documentation --- .../python-modules/deprecated/default.nix | 17 ++++++++++++----- 1 file changed, 12 insertions(+), 5 deletions(-) diff --git a/pkgs/development/python-modules/deprecated/default.nix b/pkgs/development/python-modules/deprecated/default.nix index d172849d6c33..4c8dae04e7bd 100644 --- a/pkgs/development/python-modules/deprecated/default.nix +++ b/pkgs/development/python-modules/deprecated/default.nix @@ -1,20 +1,27 @@ { lib -, fetchPypi +, fetchFromGitHub , buildPythonPackage , wrapt , pytestCheckHook +, sphinxHook }: buildPythonPackage rec { pname = "deprecated"; version = "1.2.13"; + outputs = [ "out" "doc" ]; - src = fetchPypi { - pname = "Deprecated"; - inherit version; - hash = "sha256-Q6xTNdqQwxwkugKK9TapHUHVP55pAd2wIbzFcs5E440="; + src = fetchFromGitHub { + owner = "tantale"; + repo = "deprecated"; + rev = "v${version}"; + hash = "sha256-rCDUY/TVmJqhrxDah62lEhqpr05JNZSyiFNTlHvSnmw="; }; + nativeBuildInputs = [ + sphinxHook + ]; + propagatedBuildInputs = [ wrapt ]; From 4d15632cafdcd748d32076fd3f0ad0744f5dd7ec Mon Sep 17 00:00:00 2001 From: Alyssa Ross Date: Mon, 8 May 2023 13:08:44 +0000 Subject: [PATCH 60/72] linuxManualConfig: fix inaccurate FIXME comment I read this comment, checked out 4.19, saw that it didn't have any instances of /bin/pwd, and rejoiced, assuming that the removal must have been backported to the affected kernels. But actually, /bin/pwd was just removed earlier, in 4.15, so kernels older than that are still affected. Fix the version number in the comment so I don't go through exactly the same process again a few months from now next time I'm working on this file. --- pkgs/os-specific/linux/kernel/manual-config.nix | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pkgs/os-specific/linux/kernel/manual-config.nix b/pkgs/os-specific/linux/kernel/manual-config.nix index 656ca7086311..6d1ad766d684 100644 --- a/pkgs/os-specific/linux/kernel/manual-config.nix +++ b/pkgs/os-specific/linux/kernel/manual-config.nix @@ -141,7 +141,7 @@ stdenv.mkDerivation ({ postPatch = '' sed -i Makefile -e 's|= depmod|= ${buildPackages.kmod}/bin/depmod|' - # fixup for pre-5.4 kernels using the $(cd $foo && /bin/pwd) pattern + # fixup for pre-4.15 kernels using the $(cd $foo && /bin/pwd) pattern # FIXME: remove when no longer needed substituteInPlace Makefile tools/scripts/Makefile.include --replace /bin/pwd pwd From ee4a1a8b3f5d234a6fe9c951d575c38526b5a1ba Mon Sep 17 00:00:00 2001 From: Jonas Chevalier Date: Mon, 8 May 2023 18:43:27 +0200 Subject: [PATCH 61/72] flit: disable tests for PEP 668 (#230706) The install tests call `pip` directly, and that doesn't work with PEP 668 anymore. See #229166 --- pkgs/development/python-modules/flit/default.nix | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/pkgs/development/python-modules/flit/default.nix b/pkgs/development/python-modules/flit/default.nix index b28f4f6d5a61..58e10e22a47c 100644 --- a/pkgs/development/python-modules/flit/default.nix +++ b/pkgs/development/python-modules/flit/default.nix @@ -43,6 +43,11 @@ buildPythonPackage rec { disabledTests = [ # needs some ini file. "test_invalid_classifier" + # calls pip directly. disabled for PEP 668 + "test_install_data_dir" + "test_install_module_pep621" + "test_symlink_data_dir" + "test_symlink_module_pep621" ]; meta = with lib; { From 8d4f643c66fcda5b7e427e5ae82a26bc7b74f77d Mon Sep 17 00:00:00 2001 From: Jared Baur Date: Sun, 23 Apr 2023 19:30:36 -0700 Subject: [PATCH 62/72] linux: enable CR50 TPM found on chromebooks Along with other ChromeOS related configs, this change enables TPM support for Chromebook/Chromebox devices. --- pkgs/os-specific/linux/kernel/common-config.nix | 2 ++ 1 file changed, 2 insertions(+) diff --git a/pkgs/os-specific/linux/kernel/common-config.nix b/pkgs/os-specific/linux/kernel/common-config.nix index e6eff416a770..2083fe3e6071 100644 --- a/pkgs/os-specific/linux/kernel/common-config.nix +++ b/pkgs/os-specific/linux/kernel/common-config.nix @@ -1024,6 +1024,8 @@ let CROS_EC_ISHTP = module; CROS_KBD_LED_BACKLIGHT = module; + + TCG_TIS_SPI_CR50 = whenAtLeast "5.5" yes; } // optionalAttrs (versionAtLeast version "5.4" && stdenv.hostPlatform.system == "x86_64-linux") { CHROMEOS_LAPTOP = module; CHROMEOS_PSTORE = module; From f3995cee01fad5aeb5b67de8426a7a0321c74ebf Mon Sep 17 00:00:00 2001 From: Arnout Engelen Date: Thu, 4 May 2023 14:57:50 +0200 Subject: [PATCH 63/72] gcc: install info files serially installing info files in parallel is dangerous, because `install-info` will write to a `dir-file` as a side-effect, and it has no protection against multiple `install-info` processes running in parallel and overwriting each others' changes. Local fix until we can fix the `Makefile.in` generation upstream Fixes #229470 --- pkgs/development/compilers/gcc/10/default.nix | 1 + pkgs/development/compilers/gcc/11/default.nix | 1 + pkgs/development/compilers/gcc/12/default.nix | 1 + pkgs/development/compilers/gcc/4.8/default.nix | 1 + pkgs/development/compilers/gcc/4.9/default.nix | 1 + pkgs/development/compilers/gcc/6/default.nix | 1 + pkgs/development/compilers/gcc/7/default.nix | 1 + pkgs/development/compilers/gcc/8/default.nix | 1 + pkgs/development/compilers/gcc/9/default.nix | 1 + .../gcc/install-info-files-serially.patch | 15 +++++++++++++++ 10 files changed, 24 insertions(+) create mode 100644 pkgs/development/compilers/gcc/install-info-files-serially.patch diff --git a/pkgs/development/compilers/gcc/10/default.nix b/pkgs/development/compilers/gcc/10/default.nix index 40481d42ef7b..83a03cc56d6d 100644 --- a/pkgs/development/compilers/gcc/10/default.nix +++ b/pkgs/development/compilers/gcc/10/default.nix @@ -59,6 +59,7 @@ let majorVersion = "10"; sha256 = "0sd52c898msqg7m316zp0ryyj7l326cjcn2y19dcxqp15r74qj0g"; }) ../11/fix-struct-redefinition-on-glibc-2.36.patch + ../install-info-files-serially.patch ] ++ optional (targetPlatform != hostPlatform) ../libstdc++-target.patch ++ optional noSysDirs ../no-sys-dirs.patch ++ optional (noSysDirs && hostPlatform.isRiscV) ../no-sys-dirs-riscv.patch diff --git a/pkgs/development/compilers/gcc/11/default.nix b/pkgs/development/compilers/gcc/11/default.nix index 32742594666e..505b9abf06b0 100644 --- a/pkgs/development/compilers/gcc/11/default.nix +++ b/pkgs/development/compilers/gcc/11/default.nix @@ -63,6 +63,7 @@ let majorVersion = "11"; sha256 = "0sd52c898msqg7m316zp0ryyj7l326cjcn2y19dcxqp15r74qj0g"; }) ./fix-struct-redefinition-on-glibc-2.36.patch + ../install-info-files-serially.patch ] ++ optional (targetPlatform != hostPlatform) ../libstdc++-target.patch ++ optional noSysDirs ../no-sys-dirs.patch ++ optional (noSysDirs && hostPlatform.isRiscV) ../no-sys-dirs-riscv.patch diff --git a/pkgs/development/compilers/gcc/12/default.nix b/pkgs/development/compilers/gcc/12/default.nix index a3e8faaed460..9ed4b9125e8d 100644 --- a/pkgs/development/compilers/gcc/12/default.nix +++ b/pkgs/development/compilers/gcc/12/default.nix @@ -68,6 +68,7 @@ let majorVersion = "12"; ../gnat-cflags-11.patch ../gcc-12-gfortran-driving.patch ../ppc-musl.patch + ../install-info-files-serially.patch ] # We only apply this patch when building a native toolchain for aarch64-darwin, as it breaks building # a foreign one: https://github.com/iains/gcc-12-branch/issues/18 diff --git a/pkgs/development/compilers/gcc/4.8/default.nix b/pkgs/development/compilers/gcc/4.8/default.nix index 99c8ef399b5d..90489fd3fb1c 100644 --- a/pkgs/development/compilers/gcc/4.8/default.nix +++ b/pkgs/development/compilers/gcc/4.8/default.nix @@ -74,6 +74,7 @@ let majorVersion = "4"; ../struct-ucontext-4.8.patch ../sigsegv-not-declared.patch ../res_state-not-declared.patch + ../install-info-files-serially.patch # gcc-11 compatibility (fetchpatch { name = "gcc4-char-reload.patch"; diff --git a/pkgs/development/compilers/gcc/4.9/default.nix b/pkgs/development/compilers/gcc/4.9/default.nix index 90880752ca7a..ec0f4cde781d 100644 --- a/pkgs/development/compilers/gcc/4.9/default.nix +++ b/pkgs/development/compilers/gcc/4.9/default.nix @@ -63,6 +63,7 @@ let majorVersion = "4"; [ ../9/fix-struct-redefinition-on-glibc-2.36.patch ../use-source-date-epoch.patch ../parallel-bconfig.patch ./parallel-strsignal.patch ./libsanitizer.patch + ../install-info-files-serially.patch (fetchpatch { name = "avoid-ustat-glibc-2.28.patch"; url = "https://gitweb.gentoo.org/proj/gcc-patches.git/plain/4.9.4/gentoo/100_all_avoid-ustat-glibc-2.28.patch?id=55fcb515620a8f7d3bb77eba938aa0fcf0d67c96"; diff --git a/pkgs/development/compilers/gcc/6/default.nix b/pkgs/development/compilers/gcc/6/default.nix index 7e940f689bcb..82ca9fd967c0 100644 --- a/pkgs/development/compilers/gcc/6/default.nix +++ b/pkgs/development/compilers/gcc/6/default.nix @@ -72,6 +72,7 @@ let majorVersion = "6"; url = "https://gcc.gnu.org/git/?p=gcc.git;a=patch;h=de31f5445b12fd9ab9969dc536d821fe6f0edad0"; sha256 = "0sd52c898msqg7m316zp0ryyj7l326cjcn2y19dcxqp15r74qj0g"; }) + ../install-info-files-serially.patch ] ++ optional (targetPlatform != hostPlatform) ../libstdc++-target.patch ++ optional noSysDirs ../no-sys-dirs.patch ++ optional langAda ../gnat-cflags.patch diff --git a/pkgs/development/compilers/gcc/7/default.nix b/pkgs/development/compilers/gcc/7/default.nix index d6329c866146..50039e4c0317 100644 --- a/pkgs/development/compilers/gcc/7/default.nix +++ b/pkgs/development/compilers/gcc/7/default.nix @@ -65,6 +65,7 @@ let majorVersion = "7"; }) ../9/fix-struct-redefinition-on-glibc-2.36.patch + ../install-info-files-serially.patch ] ++ optional (targetPlatform != hostPlatform) ../libstdc++-target.patch ++ optionals targetPlatform.isNetBSD [ diff --git a/pkgs/development/compilers/gcc/8/default.nix b/pkgs/development/compilers/gcc/8/default.nix index 1484a9256572..483cc31ea44c 100644 --- a/pkgs/development/compilers/gcc/8/default.nix +++ b/pkgs/development/compilers/gcc/8/default.nix @@ -54,6 +54,7 @@ let majorVersion = "8"; sha256 = "0sd52c898msqg7m316zp0ryyj7l326cjcn2y19dcxqp15r74qj0g"; }) ../9/fix-struct-redefinition-on-glibc-2.36.patch + ../install-info-files-serially.patch ] ++ optional (targetPlatform != hostPlatform) ../libstdc++-target.patch ++ optional targetPlatform.isNetBSD ../libstdc++-netbsd-ctypes.patch ++ optional noSysDirs ../no-sys-dirs.patch diff --git a/pkgs/development/compilers/gcc/9/default.nix b/pkgs/development/compilers/gcc/9/default.nix index 1b1e4b787a6d..f541a83cdf46 100644 --- a/pkgs/development/compilers/gcc/9/default.nix +++ b/pkgs/development/compilers/gcc/9/default.nix @@ -63,6 +63,7 @@ let majorVersion = "9"; url = "https://gcc.gnu.org/git/?p=gcc.git;a=patch;h=de31f5445b12fd9ab9969dc536d821fe6f0edad0"; sha256 = "0sd52c898msqg7m316zp0ryyj7l326cjcn2y19dcxqp15r74qj0g"; }) + ../install-info-files-serially.patch ] ++ optional (targetPlatform != hostPlatform) ../libstdc++-target.patch ++ optional targetPlatform.isNetBSD ../libstdc++-netbsd-ctypes.patch ++ optional noSysDirs ../no-sys-dirs.patch diff --git a/pkgs/development/compilers/gcc/install-info-files-serially.patch b/pkgs/development/compilers/gcc/install-info-files-serially.patch new file mode 100644 index 000000000000..bec7c0a158d0 --- /dev/null +++ b/pkgs/development/compilers/gcc/install-info-files-serially.patch @@ -0,0 +1,15 @@ +diff -Naur gcc-12.2.0/gcc/Makefile.in gcc-12.2.0-new/gcc/Makefile.in +--- gcc-12.2.0/gcc/Makefile.in 2022-08-19 10:09:52.280658631 +0200 ++++ gcc-12.2.0-new/gcc/Makefile.in 2023-05-04 14:35:44.401420184 +0200 +@@ -3781,6 +3781,11 @@ + fi; \ + fi + ++# We don't care about the order in which the info files are built, but ++# install-info doesn't support multiple parallel invocations writing to ++# the same `dir-file`, so we have to disable parallelism for that reason: ++.NOTPARALLEL: install-info ++ + # Install the info files. + # $(INSTALL_DATA) might be a relative pathname, so we can't cd into srcdir + # to do the install. From 87681f75ebbd7618ac99067fcf42a05faf1d8d07 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Vladim=C3=ADr=20=C4=8Cun=C3=A1t?= Date: Wed, 10 May 2023 08:47:55 +0200 Subject: [PATCH 64/72] Revert "gnupg: 2.4.0 -> 2.4.1" --- pkgs/tools/security/gnupg/24.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/tools/security/gnupg/24.nix b/pkgs/tools/security/gnupg/24.nix index 691c7c5a720c..c8e313cd9cf5 100644 --- a/pkgs/tools/security/gnupg/24.nix +++ b/pkgs/tools/security/gnupg/24.nix @@ -12,11 +12,11 @@ assert guiSupport -> enableMinimal == false; stdenv.mkDerivation rec { pname = "gnupg"; - version = "2.4.1"; + version = "2.4.0"; src = fetchurl { url = "mirror://gnupg/gnupg/${pname}-${version}.tar.bz2"; - hash = "sha256-drceWutEO/2RDOnLyCgbYXyDQWh6+2e65FWHeXK1neg="; + hash = "sha256-HXkVjdAdmSQx3S4/rLif2slxJ/iXhOosthDGAPsMFIM="; }; depsBuildBuild = [ buildPackages.stdenv.cc ]; From 0f8d279ceb0d15ebe21f0393189352f564638549 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Sandro=20J=C3=A4ckel?= Date: Wed, 10 May 2023 15:22:33 +0200 Subject: [PATCH 65/72] python310Packages.aiohttp: remove pytest-xdist again and add a comment to not add it again This reverts commit d65445f5b241e87cd7fed8925eb8adb90735e286. --- pkgs/development/python-modules/aiohttp/default.nix | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/pkgs/development/python-modules/aiohttp/default.nix b/pkgs/development/python-modules/aiohttp/default.nix index 114077681c91..75449c9f625c 100644 --- a/pkgs/development/python-modules/aiohttp/default.nix +++ b/pkgs/development/python-modules/aiohttp/default.nix @@ -25,7 +25,6 @@ , freezegun , gunicorn , pytest-mock -, pytest-xdist , pytestCheckHook , re-assert , trustme @@ -81,12 +80,12 @@ buildPythonPackage rec { idna-ssl ]; + # NOTE: pytest-xdist cannot be added because it is flaky. See https://github.com/NixOS/nixpkgs/issues/230597 for more info. nativeCheckInputs = [ async_generator freezegun gunicorn pytest-mock - pytest-xdist pytestCheckHook re-assert ] ++ lib.optionals (!(stdenv.isDarwin && stdenv.isAarch64)) [ From bb7edf8b8f3a1f61fb4929ef7d056079e6733eae Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Vladim=C3=ADr=20=C4=8Cun=C3=A1t?= Date: Wed, 10 May 2023 23:13:49 +0200 Subject: [PATCH 66/72] Revert Merge #228209: gtest: 1.12.1 -> 1.13.0 This reverts commit 3c75a19be62086753705876cc93f2c280af68a04, reversing changes made to cfd87655c8c9d6dfef423f3a1be51a3ad92a3368. Doesn't seem suitable for nixpkgs 23.05 anymore, etc. See https://github.com/NixOS/nixpkgs/pull/228209#issuecomment-1536888736 --- pkgs/development/libraries/gtest/default.nix | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/pkgs/development/libraries/gtest/default.nix b/pkgs/development/libraries/gtest/default.nix index 4bdf8fcf06e4..80013e3613d0 100644 --- a/pkgs/development/libraries/gtest/default.nix +++ b/pkgs/development/libraries/gtest/default.nix @@ -8,15 +8,15 @@ stdenv.mkDerivation rec { pname = "gtest"; - version = "1.13.0"; + version = "1.12.1"; outputs = [ "out" "dev" ]; src = fetchFromGitHub { owner = "google"; repo = "googletest"; - rev = "v${version}"; - hash = "sha256-LVLEn+e7c8013pwiLzJiiIObyrlbBHYaioO/SWbItPQ="; + rev = "release-${version}"; + hash = "sha256-W+OxRTVtemt2esw4P7IyGWXOonUN5ZuscjvzqkYvZbM="; }; patches = [ From 5338975e0d35560c811981fd41a0d34dd1897f17 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Sandro=20J=C3=A4ckel?= Date: Thu, 11 May 2023 11:05:56 +0200 Subject: [PATCH 67/72] python310Packages.twisted: remove half broken pyasn1 integration --- pkgs/development/python-modules/twisted/default.nix | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/pkgs/development/python-modules/twisted/default.nix b/pkgs/development/python-modules/twisted/default.nix index bcd2f6d5e06b..f45acbe87a4e 100644 --- a/pkgs/development/python-modules/twisted/default.nix +++ b/pkgs/development/python-modules/twisted/default.nix @@ -69,6 +69,13 @@ buildPythonPackage rec { url = "https://github.com/mweinelt/twisted/commit/e69e652de671aac0abf5c7e6c662fc5172758c5a.patch"; hash = "sha256-LmvKUTViZoY/TPBmSlx4S9FbJNZfB5cxzn/YcciDmoI="; }) + # remove half broken pyasn1 integration that blow up with pyasn 0.5.0 + # https://github.com/twisted/twisted/pull/11843 + (fetchpatch { + url = "https://github.com/twisted/twisted/commit/bdee0eb835a76b2982beaf10c85269ff25ea09fa.patch"; + excludes = [ "pyproject.toml" "tox.ini" ]; + hash = "sha256-oGAHmZMpMWfK+2zEDjHD115sW7exCYqfORVOLw+Wa6M="; + }) ] ++ lib.optionals (pythonAtLeast "3.11") [ (fetchpatch { url = "https://github.com/twisted/twisted/pull/11734.diff"; @@ -95,6 +102,9 @@ buildPythonPackage rec { ]; postPatch = '' + substituteInPlace pyproject.toml \ + --replace '"pyasn1 >= 0.4",' "" + echo 'ListingTests.test_localeIndependent.skip = "Timezone issue"'>> src/twisted/conch/test/test_cftp.py echo 'ListingTests.test_newFile.skip = "Timezone issue"'>> src/twisted/conch/test/test_cftp.py echo 'ListingTests.test_newSingleDigitDayOfMonth.skip = "Timezone issue"'>> src/twisted/conch/test/test_cftp.py From 065a145ab5d4f0c2a7fd663acf134b4007f279bb Mon Sep 17 00:00:00 2001 From: Nick Cao Date: Thu, 11 May 2023 20:40:45 +0800 Subject: [PATCH 68/72] ruby_3_0: pin to openssl_1_1 fixup https://github.com/NixOS/nixpkgs/pull/229890 --- pkgs/development/interpreters/ruby/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/interpreters/ruby/default.nix b/pkgs/development/interpreters/ruby/default.nix index daa512500a41..f390e67182a3 100644 --- a/pkgs/development/interpreters/ruby/default.nix +++ b/pkgs/development/interpreters/ruby/default.nix @@ -84,8 +84,8 @@ let ++ (op fiddleSupport libffi) ++ (ops cursesSupport [ ncurses readline ]) ++ (op zlibSupport zlib) - ++ (op (!atLeast30 && opensslSupport) openssl_1_1) - ++ (op (atLeast30 && opensslSupport) openssl) + ++ (op (!atLeast31 && opensslSupport) openssl_1_1) + ++ (op (atLeast31 && opensslSupport) openssl) ++ (op gdbmSupport gdbm) ++ (op yamlSupport libyaml) # Looks like ruby fails to build on darwin without readline even if curses From 6b68b44e2db035ff76f98868179be8f3a0265e24 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Vladim=C3=ADr=20=C4=8Cun=C3=A1t?= Date: Thu, 11 May 2023 17:11:35 +0200 Subject: [PATCH 69/72] Revert Merge #227168: opencl-headers: 2023.02.06 -> 2023.04.17 This reverts commit 7d61d759fdedee5757089c7ad9142c0e1832421c, reversing changes made to 487f1a7723ed9728f76083a6de8dad7033f46dc1. https://github.com/NixOS/nixpkgs/pull/227168#issuecomment-1539171566 It broke build of ocl-icd, and breaking changes are now not allowed. --- pkgs/development/libraries/opencl-headers/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/development/libraries/opencl-headers/default.nix b/pkgs/development/libraries/opencl-headers/default.nix index ca5e24e85570..6bb2b4c235ac 100644 --- a/pkgs/development/libraries/opencl-headers/default.nix +++ b/pkgs/development/libraries/opencl-headers/default.nix @@ -3,13 +3,13 @@ stdenv.mkDerivation rec { pname = "opencl-headers"; - version = "2023.04.17"; + version = "2023.02.06"; src = fetchFromGitHub { owner = "KhronosGroup"; repo = "OpenCL-Headers"; rev = "v${version}"; - sha256 = "sha256-FK6pbIqNVVW9p6ozUVzuRxfxvibCA4cNFfhT22WjSzE="; + sha256 = "sha256-BJDaDokyHgmyl+bGqCwG1J7iOvu0E3P3iYZ1/krot8s="; }; installPhase = '' From 4b9439314a8f25f142cdf161aa0068c202ddb694 Mon Sep 17 00:00:00 2001 From: Martin Weinelt Date: Fri, 12 May 2023 12:39:15 +0200 Subject: [PATCH 70/72] python310Packages.cachecontrol: Fix tests with requests 2.29.0 Use the HTTPResponse from urllib3 directly, because requests stopped importing it. --- pkgs/development/python-modules/cachecontrol/default.nix | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/pkgs/development/python-modules/cachecontrol/default.nix b/pkgs/development/python-modules/cachecontrol/default.nix index bbe531015778..225ee7efd010 100644 --- a/pkgs/development/python-modules/cachecontrol/default.nix +++ b/pkgs/development/python-modules/cachecontrol/default.nix @@ -27,6 +27,13 @@ buildPythonPackage rec { hash = "sha256-uUPIQz/n347Q9G7NDOGuB760B/KxOglUxiS/rYjt5Po="; }; + postPatch = '' + # https://github.com/ionrock/cachecontrol/issues/297 + substituteInPlace tests/test_etag.py --replace \ + "requests.adapters.HTTPResponse.from_httplib" \ + "urllib3.response.HTTPResponse.from_httplib" + ''; + propagatedBuildInputs = [ msgpack requests From 2f14e73e15c056d60e250a1d08866e839c82bf08 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Vladim=C3=ADr=20=C4=8Cun=C3=A1t?= Date: Sat, 13 May 2023 09:59:05 +0200 Subject: [PATCH 71/72] python3Packages.python3-saml: patch a date-sensitive test --- pkgs/development/python-modules/python3-saml/default.nix | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/pkgs/development/python-modules/python3-saml/default.nix b/pkgs/development/python-modules/python3-saml/default.nix index 7f39eca6ad48..f3a55cfb7f56 100644 --- a/pkgs/development/python-modules/python3-saml/default.nix +++ b/pkgs/development/python-modules/python3-saml/default.nix @@ -1,6 +1,7 @@ { lib , buildPythonPackage , fetchFromGitHub +, fetchpatch , freezegun , isodate , lxml @@ -22,6 +23,14 @@ buildPythonPackage rec { hash = "sha256-xPPR2z3h8RpoAROpKpu9ZoDxGq5Stm9wQVt4Stj/6fg="; }; + patches = [ + (fetchpatch { + name = "test-expired.patch"; + url = "https://github.com/SAML-Toolkits/python3-saml/commit/bd65578e5a21494c89320094c61c1c77250bea33.diff"; + hash = "sha256-9Trew6R5JDjtc0NRGoklqMVDEI4IEqFOdK3ezyBU6gI="; + }) + ]; + propagatedBuildInputs = [ isodate lxml From 11572cfbdc88db6b49ef89c876d17f54e8994b29 Mon Sep 17 00:00:00 2001 From: Martin Weinelt Date: Sat, 13 May 2023 12:57:13 +0200 Subject: [PATCH 72/72] python310Packages.wagtail: relax beautifulsoup4 constraint This fixes the build. --- pkgs/development/python-modules/wagtail/default.nix | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/pkgs/development/python-modules/wagtail/default.nix b/pkgs/development/python-modules/wagtail/default.nix index afdd14ec9d74..54f5a8ce1790 100644 --- a/pkgs/development/python-modules/wagtail/default.nix +++ b/pkgs/development/python-modules/wagtail/default.nix @@ -30,6 +30,11 @@ buildPythonPackage rec { sha256 = "sha256-s89gs3H//Dc3k6BLZUC4APyDgiWY9LetWAkI+kXQTf8="; }; + postPatch = '' + substituteInPlace setup.py \ + --replace "beautifulsoup4>=4.8,<4.12" "beautifulsoup4>=4.8" + ''; + propagatedBuildInputs = [ django django-modelcluster