chore(3p): Bump nixpkgs to nixos-unstable from 2020-11-21
Included fixes for random breakage: * 3p/awscli: pick from the stable channel; it is broken on unstable * 3p/googletest: bumped version & removed patches that nixpkgs applies * 3p/lisp/cffi: bumped library version for SBCL compat * 3p/nix: fix libsystemd attribute * 3p/nix: reformatted (clang-format handling of ternaries changed) * glittershark/home: Use home-manager from nixkpgs * glittershark/kernel: bumped linux-ck patch hash * glittershark/kernel: removed "patch patch" * multi/whitby: Use home-manager from nixpkgs * tazjin/frog: drop Sourcetrail (it doesn't build currently) Note that in addition to these changes, some previous CLs updated the versions of git and cgit which was necessary for this channel bump, but which could not be done in the same commit due to the nature of the subtree merges. Change-Id: If2563e8a68e2750c4b913a976ff7b93b42e8b7f3 Reviewed-on: https://cl.tvl.fyi/c/depot/+/2110 Tested-by: BuildkiteCI Reviewed-by: multi <depot@in-addr.xyz> Reviewed-by: glittershark <grfn@gws.fyi>
This commit is contained in:
parent
e908882610
commit
5a00e58904
17 changed files with 71 additions and 91 deletions
15
third_party/default.nix
vendored
15
third_party/default.nix
vendored
|
|
@ -5,11 +5,11 @@
|
||||||
{ ... }:
|
{ ... }:
|
||||||
|
|
||||||
let
|
let
|
||||||
# Tracking nixos-unstable as of 2020-08-16.
|
# Tracking nixos-unstable as of 2020-11-21.
|
||||||
nixpkgsCommit = "16fc531784ac226fb268cc59ad573d2746c109c1";
|
nixpkgsCommit = "a322b32e9d74fb476944ff6cfb55833dc69cfaaa";
|
||||||
nixpkgsSrc = fetchTarball {
|
nixpkgsSrc = fetchTarball {
|
||||||
url = "https://github.com/NixOS/nixpkgs-channels/archive/${nixpkgsCommit}.tar.gz";
|
url = "https://github.com/NixOS/nixpkgs/archive/${nixpkgsCommit}.tar.gz";
|
||||||
sha256 = "0qw1jpdfih9y0dycslapzfp8bl4z7vfg9c7qz176wghwybm4sx0a";
|
sha256 = "1r0mkiqxija75spnyksmh8x5j4smnrxv5f7768s81gsl570kls0l";
|
||||||
};
|
};
|
||||||
nixpkgs = import nixpkgsSrc {
|
nixpkgs = import nixpkgsSrc {
|
||||||
config.allowUnfree = true;
|
config.allowUnfree = true;
|
||||||
|
|
@ -38,7 +38,6 @@ let
|
||||||
autoreconfHook
|
autoreconfHook
|
||||||
avrdude
|
avrdude
|
||||||
avrlibc
|
avrlibc
|
||||||
awscli
|
|
||||||
bashInteractive
|
bashInteractive
|
||||||
bat
|
bat
|
||||||
buildBazelPackage
|
buildBazelPackage
|
||||||
|
|
@ -159,6 +158,12 @@ let
|
||||||
zlib
|
zlib
|
||||||
zstd;
|
zstd;
|
||||||
|
|
||||||
|
# Inherit packages from the stable channel for things that are
|
||||||
|
# broken on unstable
|
||||||
|
inherit (stableNixpkgs)
|
||||||
|
awscli # TODO(grfn): Move back to unstable once it is fixed
|
||||||
|
;
|
||||||
|
|
||||||
# Required by //third_party/nix
|
# Required by //third_party/nix
|
||||||
inherit (nixpkgs)
|
inherit (nixpkgs)
|
||||||
aws-sdk-cpp
|
aws-sdk-cpp
|
||||||
|
|
|
||||||
5
third_party/gtest/default.nix
vendored
5
third_party/gtest/default.nix
vendored
|
|
@ -6,7 +6,8 @@
|
||||||
src = pkgs.fetchFromGitHub {
|
src = pkgs.fetchFromGitHub {
|
||||||
owner = "google";
|
owner = "google";
|
||||||
repo = "googletest";
|
repo = "googletest";
|
||||||
rev = "a781fe29bcf73003559a3583167fe3d647518464";
|
rev = "9dce5e5d878176dc0054ef381f5c6e705f43ef99";
|
||||||
sha256 = "0zny8kgbkslazzsnskygj3pkcj7l13xhgcwjyxswxymxq8m41kgy";
|
sha256 = "05xi61j7j251dzkgk9965lqpbacsy44iblzql941kw9d4nk0q6jl";
|
||||||
};
|
};
|
||||||
|
patches = [];
|
||||||
})
|
})
|
||||||
|
|
|
||||||
2
third_party/lisp/cffi.nix
vendored
2
third_party/lisp/cffi.nix
vendored
|
|
@ -4,7 +4,7 @@
|
||||||
with depot.nix;
|
with depot.nix;
|
||||||
let src = builtins.fetchGit {
|
let src = builtins.fetchGit {
|
||||||
url = "https://github.com/cffi/cffi.git";
|
url = "https://github.com/cffi/cffi.git";
|
||||||
rev = "5e838bf46d0089c43ebd3ea014a207c403e29c61";
|
rev = "a49ff36a95cb62ffa6cb069d98378d665769926b";
|
||||||
};
|
};
|
||||||
in buildLisp.library {
|
in buildLisp.library {
|
||||||
name = "cffi";
|
name = "cffi";
|
||||||
|
|
|
||||||
2
third_party/nix/default.nix
vendored
2
third_party/nix/default.nix
vendored
|
|
@ -61,7 +61,7 @@ in lib.fix (self: pkgs.llvmPackages.libcxxStdenv.mkDerivation {
|
||||||
grpc
|
grpc
|
||||||
libseccomp
|
libseccomp
|
||||||
libsodium
|
libsodium
|
||||||
systemd.lib.dev
|
systemd.dev
|
||||||
openssl
|
openssl
|
||||||
protobuf
|
protobuf
|
||||||
sqlite
|
sqlite
|
||||||
|
|
|
||||||
16
third_party/nix/src/libexpr/primops.cc
vendored
16
third_party/nix/src/libexpr/primops.cc
vendored
|
|
@ -964,12 +964,10 @@ static void prim_readDir(EvalState& state, const Pos& pos, Value** args,
|
||||||
if (ent.type == DT_UNKNOWN) {
|
if (ent.type == DT_UNKNOWN) {
|
||||||
ent.type = getFileType(path + "/" + ent.name);
|
ent.type = getFileType(path + "/" + ent.name);
|
||||||
}
|
}
|
||||||
mkStringNoCopy(*ent_val,
|
mkStringNoCopy(*ent_val, ent.type == DT_REG ? "regular"
|
||||||
ent.type == DT_REG
|
: ent.type == DT_DIR ? "directory"
|
||||||
? "regular"
|
: ent.type == DT_LNK ? "symlink"
|
||||||
: ent.type == DT_DIR
|
: "unknown");
|
||||||
? "directory"
|
|
||||||
: ent.type == DT_LNK ? "symlink" : "unknown");
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
@ -1055,10 +1053,8 @@ static void addPath(EvalState& state, const Pos& pos, const std::string& name,
|
||||||
state.callFunction(*filterFun, arg1, fun2, noPos);
|
state.callFunction(*filterFun, arg1, fun2, noPos);
|
||||||
|
|
||||||
Value arg2;
|
Value arg2;
|
||||||
mkString(arg2, S_ISREG(st.st_mode)
|
mkString(arg2, S_ISREG(st.st_mode) ? "regular"
|
||||||
? "regular"
|
: S_ISDIR(st.st_mode) ? "directory"
|
||||||
: S_ISDIR(st.st_mode)
|
|
||||||
? "directory"
|
|
||||||
: S_ISLNK(st.st_mode)
|
: S_ISLNK(st.st_mode)
|
||||||
? "symlink"
|
? "symlink"
|
||||||
: "unknown" /* not supported, will fail! */);
|
: "unknown" /* not supported, will fail! */);
|
||||||
|
|
|
||||||
|
|
@ -215,9 +215,9 @@ void BinaryCacheStore::addToStore(const ValidPathInfo& info,
|
||||||
/* Atomically write the NAR file. */
|
/* Atomically write the NAR file. */
|
||||||
narInfo->url = "nar/" + narInfo->fileHash.to_string(Base32, false) + ".nar" +
|
narInfo->url = "nar/" + narInfo->fileHash.to_string(Base32, false) + ".nar" +
|
||||||
(compression == "xz" ? ".xz"
|
(compression == "xz" ? ".xz"
|
||||||
: compression == "bzip2"
|
: compression == "bzip2" ? ".bz2"
|
||||||
? ".bz2"
|
: compression == "br" ? ".br"
|
||||||
: compression == "br" ? ".br" : "");
|
: "");
|
||||||
if ((repair != 0u) || !fileExists(narInfo->url)) {
|
if ((repair != 0u) || !fileExists(narInfo->url)) {
|
||||||
stats.narWrite++;
|
stats.narWrite++;
|
||||||
upsertFile(narInfo->url, *narCompressed, "application/x-nix-nar");
|
upsertFile(narInfo->url, *narCompressed, "application/x-nix-nar");
|
||||||
|
|
|
||||||
9
third_party/nix/src/libstore/build.cc
vendored
9
third_party/nix/src/libstore/build.cc
vendored
|
|
@ -1462,10 +1462,8 @@ void DerivationGoal::tryToBuild() {
|
||||||
bool buildLocally = buildMode != bmNormal || parsedDrv->willBuildLocally();
|
bool buildLocally = buildMode != bmNormal || parsedDrv->willBuildLocally();
|
||||||
|
|
||||||
auto started = [&]() {
|
auto started = [&]() {
|
||||||
auto msg = fmt(buildMode == bmRepair
|
auto msg = fmt(buildMode == bmRepair ? "repairing outputs of '%s'"
|
||||||
? "repairing outputs of '%s'"
|
: buildMode == bmCheck ? "checking outputs of '%s'"
|
||||||
: buildMode == bmCheck
|
|
||||||
? "checking outputs of '%s'"
|
|
||||||
: nrRounds > 1 ? "building '%s' (round %d/%d)"
|
: nrRounds > 1 ? "building '%s' (round %d/%d)"
|
||||||
: "building '%s'",
|
: "building '%s'",
|
||||||
drvPath, curRound, nrRounds);
|
drvPath, curRound, nrRounds);
|
||||||
|
|
@ -1748,8 +1746,7 @@ void DerivationGoal::buildDone() {
|
||||||
else {
|
else {
|
||||||
st = dynamic_cast<NotDeterministic*>(&e) != nullptr
|
st = dynamic_cast<NotDeterministic*>(&e) != nullptr
|
||||||
? BuildResult::NotDeterministic
|
? BuildResult::NotDeterministic
|
||||||
: statusOk(status)
|
: statusOk(status) ? BuildResult::OutputRejected
|
||||||
? BuildResult::OutputRejected
|
|
||||||
: fixedOutput || diskFull ? BuildResult::TransientFailure
|
: fixedOutput || diskFull ? BuildResult::TransientFailure
|
||||||
: BuildResult::PermanentFailure;
|
: BuildResult::PermanentFailure;
|
||||||
}
|
}
|
||||||
|
|
|
||||||
14
third_party/nix/src/libstore/download.cc
vendored
14
third_party/nix/src/libstore/download.cc
vendored
|
|
@ -437,15 +437,15 @@ struct CurlDownloader : public Downloader {
|
||||||
request.verb(), request.uri))
|
request.verb(), request.uri))
|
||||||
: httpStatus != 0
|
: httpStatus != 0
|
||||||
? DownloadError(
|
? DownloadError(
|
||||||
err, fmt("unable to %s '%s': HTTP error %d",
|
err,
|
||||||
request.verb(), request.uri, httpStatus) +
|
fmt("unable to %s '%s': HTTP error %d", request.verb(),
|
||||||
(code == CURLE_OK
|
request.uri, httpStatus) +
|
||||||
? ""
|
(code == CURLE_OK ? ""
|
||||||
: fmt(" (curl error: %s)",
|
: fmt(" (curl error: %s)",
|
||||||
curl_easy_strerror(code))))
|
curl_easy_strerror(code))))
|
||||||
: DownloadError(err, fmt("unable to %s '%s': %s (%d)",
|
: DownloadError(
|
||||||
request.verb(), request.uri,
|
err, fmt("unable to %s '%s': %s (%d)", request.verb(),
|
||||||
curl_easy_strerror(code), code));
|
request.uri, curl_easy_strerror(code), code));
|
||||||
|
|
||||||
/* If this is a transient error, then maybe retry the
|
/* If this is a transient error, then maybe retry the
|
||||||
download after a while. If we're writing to a
|
download after a while. If we're writing to a
|
||||||
|
|
|
||||||
|
|
@ -38,9 +38,9 @@ struct LocalStoreAccessor : public FSAccessor {
|
||||||
throw Error(format("file '%1%' has unsupported type") % path);
|
throw Error(format("file '%1%' has unsupported type") % path);
|
||||||
}
|
}
|
||||||
|
|
||||||
return {S_ISREG(st.st_mode)
|
return {S_ISREG(st.st_mode) ? Type::tRegular
|
||||||
? Type::tRegular
|
: S_ISLNK(st.st_mode) ? Type::tSymlink
|
||||||
: S_ISLNK(st.st_mode) ? Type::tSymlink : Type::tDirectory,
|
: Type::tDirectory,
|
||||||
S_ISREG(st.st_mode) ? static_cast<uint64_t>(st.st_size) : 0,
|
S_ISREG(st.st_mode) ? static_cast<uint64_t>(st.st_size) : 0,
|
||||||
S_ISREG(st.st_mode) && ((st.st_mode & S_IXUSR) != 0u)};
|
S_ISREG(st.st_mode) && ((st.st_mode & S_IXUSR) != 0u)};
|
||||||
}
|
}
|
||||||
|
|
|
||||||
9
third_party/nix/src/nix-env/nix-env.cc
vendored
9
third_party/nix/src/nix-env/nix-env.cc
vendored
|
|
@ -260,12 +260,9 @@ static DrvInfos filterBySelector(EvalState& state, const DrvInfos& allElems,
|
||||||
auto k = newest.find(drvName.name);
|
auto k = newest.find(drvName.name);
|
||||||
|
|
||||||
if (k != newest.end()) {
|
if (k != newest.end()) {
|
||||||
d = j.first.querySystem() == k->second.first.querySystem()
|
d = j.first.querySystem() == k->second.first.querySystem() ? 0
|
||||||
? 0
|
: j.first.querySystem() == settings.thisSystem ? 1
|
||||||
: j.first.querySystem() == settings.thisSystem
|
: k->second.first.querySystem() == settings.thisSystem ? -1
|
||||||
? 1
|
|
||||||
: k->second.first.querySystem() == settings.thisSystem
|
|
||||||
? -1
|
|
||||||
: 0;
|
: 0;
|
||||||
if (d == 0) {
|
if (d == 0) {
|
||||||
d = comparePriorities(state, j.first, k->second.first);
|
d = comparePriorities(state, j.first, k->second.first);
|
||||||
|
|
|
||||||
16
third_party/nix/src/nix/hash.cc
vendored
16
third_party/nix/src/nix/hash.cc
vendored
|
|
@ -58,18 +58,18 @@ struct CmdToBase final : Command {
|
||||||
}
|
}
|
||||||
|
|
||||||
std::string name() override {
|
std::string name() override {
|
||||||
return base == Base16
|
return base == Base16 ? "to-base16"
|
||||||
? "to-base16"
|
|
||||||
: base == Base32 ? "to-base32"
|
: base == Base32 ? "to-base32"
|
||||||
: base == Base64 ? "to-base64" : "to-sri";
|
: base == Base64 ? "to-base64"
|
||||||
|
: "to-sri";
|
||||||
}
|
}
|
||||||
|
|
||||||
std::string description() override {
|
std::string description() override {
|
||||||
return fmt(
|
return fmt("convert a hash to %s representation",
|
||||||
"convert a hash to %s representation",
|
base == Base16 ? "base-16"
|
||||||
base == Base16
|
: base == Base32 ? "base-32"
|
||||||
? "base-16"
|
: base == Base64 ? "base-64"
|
||||||
: base == Base32 ? "base-32" : base == Base64 ? "base-64" : "SRI");
|
: "SRI");
|
||||||
}
|
}
|
||||||
|
|
||||||
void run() override {
|
void run() override {
|
||||||
|
|
|
||||||
3
third_party/nix/src/nix/ls.cc
vendored
3
third_party/nix/src/nix/ls.cc
vendored
|
|
@ -31,8 +31,7 @@ struct MixLs : virtual Args, MixJSON {
|
||||||
auto st = accessor->stat(curPath);
|
auto st = accessor->stat(curPath);
|
||||||
std::string tp = st.type == FSAccessor::Type::tRegular
|
std::string tp = st.type == FSAccessor::Type::tRegular
|
||||||
? (st.isExecutable ? "-r-xr-xr-x" : "-r--r--r--")
|
? (st.isExecutable ? "-r-xr-xr-x" : "-r--r--r--")
|
||||||
: st.type == FSAccessor::Type::tSymlink
|
: st.type == FSAccessor::Type::tSymlink ? "lrwxrwxrwx"
|
||||||
? "lrwxrwxrwx"
|
|
||||||
: "dr-xr-xr-x";
|
: "dr-xr-xr-x";
|
||||||
std::cout << (format("%s %20d %s") % tp % st.fileSize % relPath);
|
std::cout << (format("%s %20d %s") % tp % st.fileSize % relPath);
|
||||||
if (st.type == FSAccessor::Type::tSymlink) {
|
if (st.type == FSAccessor::Type::tSymlink) {
|
||||||
|
|
|
||||||
|
|
@ -5,12 +5,7 @@ with lib;
|
||||||
rec {
|
rec {
|
||||||
nixpkgs = import pkgs.nixpkgsSrc {};
|
nixpkgs = import pkgs.nixpkgsSrc {};
|
||||||
|
|
||||||
home-manager = (fetchTarball {
|
home = confPath: (import "${nixpkgs.home-manager.src}/modules" {
|
||||||
url = "https://github.com/rycee/home-manager/archive/152769aed96d4d6f005ab40daf03ec4f5102c763.tar.gz";
|
|
||||||
sha256 = "10svwspmsf46rijzsh0h9nmz1mq2998wcml8yp36mwksgi8695pc";
|
|
||||||
});
|
|
||||||
|
|
||||||
home = confPath: (import "${home-manager}/modules" {
|
|
||||||
pkgs = nixpkgs;
|
pkgs = nixpkgs;
|
||||||
configuration = { config, lib, ... }: {
|
configuration = { config, lib, ... }: {
|
||||||
imports = [confPath];
|
imports = [confPath];
|
||||||
|
|
|
||||||
|
|
@ -11,20 +11,13 @@ let
|
||||||
name = "linux-ck-patch-${mm}-ck1.xz";
|
name = "linux-ck-patch-${mm}-ck1.xz";
|
||||||
# example: http://ck.kolivas.org/patches/5.0/5.4/5.4-ck1/patch-5.4-ck1.xz
|
# example: http://ck.kolivas.org/patches/5.0/5.4/5.4-ck1/patch-5.4-ck1.xz
|
||||||
url = "http://ck.kolivas.org/patches/${mj}.0/${mm}/${mm}-ck1/patch-${mm}-ck1.xz";
|
url = "http://ck.kolivas.org/patches/${mj}.0/${mm}/${mm}-ck1/patch-${mm}-ck1.xz";
|
||||||
sha256 = "01jyg9x2ligr0gjic8lg4f7hw3isz94kqwdbzdk9n8nghklh38p4";
|
sha256 = "0cv1ayj9akl83q2whabj8v3qygkkfwvzcjqx539sw6j3r9qhrs64";
|
||||||
};
|
};
|
||||||
|
|
||||||
unpackPhase = ''
|
unpackPhase = ''
|
||||||
${pkgs.xz}/bin/unxz -kfdc $src > patch-${mm}-ck1
|
${pkgs.xz}/bin/unxz -kfdc $src > patch-${mm}-ck1
|
||||||
'';
|
'';
|
||||||
|
|
||||||
patches = [
|
|
||||||
(builtins.fetchurl {
|
|
||||||
url = "https://aur.archlinux.org/cgit/aur.git/plain/fix_ck1_for_5.7.14.patch\?h\=linux-ck";
|
|
||||||
sha256 = "0l8f2kph4f2lvcjn0s2fg6n9xa6f4khjz7rqc4zxk58r7fh4s5v4";
|
|
||||||
})
|
|
||||||
];
|
|
||||||
|
|
||||||
installPhase = ''
|
installPhase = ''
|
||||||
cp patch-${mm}-ck1 $out
|
cp patch-${mm}-ck1 $out
|
||||||
'';
|
'';
|
||||||
|
|
|
||||||
|
|
@ -1,11 +1,6 @@
|
||||||
{ config ? throw "not a readTree target", ... }:
|
{ config ? throw "not a readTree target", ... }:
|
||||||
|
|
||||||
let
|
let
|
||||||
homeManagerSrc = (fetchTarball {
|
|
||||||
url = "https://github.com/nix-community/home-manager/archive/9b1b55ba0264a55add4b7b4e022bdc2832b531f6.tar.gz";
|
|
||||||
sha256 = "1lvnprvqfsjhi811ldagvfy4ilysxdj4arzi0f0gskll6czwjdr7";
|
|
||||||
});
|
|
||||||
|
|
||||||
depot = import <depot> {};
|
depot = import <depot> {};
|
||||||
pkgs = import <nixpkgs> {};
|
pkgs = import <nixpkgs> {};
|
||||||
|
|
||||||
|
|
@ -14,7 +9,10 @@ in
|
||||||
|
|
||||||
{
|
{
|
||||||
programs = {
|
programs = {
|
||||||
home-manager = { enable = true; path = homeManagerSrc; };
|
home-manager = {
|
||||||
|
enable = true;
|
||||||
|
path = pkgs.home-manager.src;
|
||||||
|
};
|
||||||
|
|
||||||
bash = {
|
bash = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
|
|
||||||
|
|
@ -280,7 +280,6 @@ in depot.lib.fix(self: {
|
||||||
rustup
|
rustup
|
||||||
screen
|
screen
|
||||||
scrot
|
scrot
|
||||||
sourcetrail
|
|
||||||
spotify
|
spotify
|
||||||
steam
|
steam
|
||||||
tokei
|
tokei
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue