chore(3p): Bump nixpkgs to nixos-unstable from 2020-11-21

Included fixes for random breakage:

* 3p/awscli: pick from the stable channel; it is broken on unstable
* 3p/googletest: bumped version & removed patches that nixpkgs applies
* 3p/lisp/cffi: bumped library version for SBCL compat
* 3p/nix: fix libsystemd attribute
* 3p/nix: reformatted (clang-format handling of ternaries changed)
* glittershark/home: Use home-manager from nixkpgs
* glittershark/kernel: bumped linux-ck patch hash
* glittershark/kernel: removed "patch patch"
* multi/whitby: Use home-manager from nixpkgs
* tazjin/frog: drop Sourcetrail (it doesn't build currently)

Note that in addition to these changes, some previous CLs updated the
versions of git and cgit which was necessary for this channel bump,
but which could not be done in the same commit due to the nature of
the subtree merges.

Change-Id: If2563e8a68e2750c4b913a976ff7b93b42e8b7f3
Reviewed-on: https://cl.tvl.fyi/c/depot/+/2110
Tested-by: BuildkiteCI
Reviewed-by: multi <depot@in-addr.xyz>
Reviewed-by: glittershark <grfn@gws.fyi>
This commit is contained in:
Vincent Ambo 2020-11-21 18:22:54 +01:00 committed by tazjin
parent e908882610
commit 5a00e58904
17 changed files with 71 additions and 91 deletions

View file

@ -5,11 +5,11 @@
{ ... }: { ... }:
let let
# Tracking nixos-unstable as of 2020-08-16. # Tracking nixos-unstable as of 2020-11-21.
nixpkgsCommit = "16fc531784ac226fb268cc59ad573d2746c109c1"; nixpkgsCommit = "a322b32e9d74fb476944ff6cfb55833dc69cfaaa";
nixpkgsSrc = fetchTarball { nixpkgsSrc = fetchTarball {
url = "https://github.com/NixOS/nixpkgs-channels/archive/${nixpkgsCommit}.tar.gz"; url = "https://github.com/NixOS/nixpkgs/archive/${nixpkgsCommit}.tar.gz";
sha256 = "0qw1jpdfih9y0dycslapzfp8bl4z7vfg9c7qz176wghwybm4sx0a"; sha256 = "1r0mkiqxija75spnyksmh8x5j4smnrxv5f7768s81gsl570kls0l";
}; };
nixpkgs = import nixpkgsSrc { nixpkgs = import nixpkgsSrc {
config.allowUnfree = true; config.allowUnfree = true;
@ -38,7 +38,6 @@ let
autoreconfHook autoreconfHook
avrdude avrdude
avrlibc avrlibc
awscli
bashInteractive bashInteractive
bat bat
buildBazelPackage buildBazelPackage
@ -159,6 +158,12 @@ let
zlib zlib
zstd; zstd;
# Inherit packages from the stable channel for things that are
# broken on unstable
inherit (stableNixpkgs)
awscli # TODO(grfn): Move back to unstable once it is fixed
;
# Required by //third_party/nix # Required by //third_party/nix
inherit (nixpkgs) inherit (nixpkgs)
aws-sdk-cpp aws-sdk-cpp

View file

@ -6,7 +6,8 @@
src = pkgs.fetchFromGitHub { src = pkgs.fetchFromGitHub {
owner = "google"; owner = "google";
repo = "googletest"; repo = "googletest";
rev = "a781fe29bcf73003559a3583167fe3d647518464"; rev = "9dce5e5d878176dc0054ef381f5c6e705f43ef99";
sha256 = "0zny8kgbkslazzsnskygj3pkcj7l13xhgcwjyxswxymxq8m41kgy"; sha256 = "05xi61j7j251dzkgk9965lqpbacsy44iblzql941kw9d4nk0q6jl";
}; };
patches = [];
}) })

View file

@ -4,7 +4,7 @@
with depot.nix; with depot.nix;
let src = builtins.fetchGit { let src = builtins.fetchGit {
url = "https://github.com/cffi/cffi.git"; url = "https://github.com/cffi/cffi.git";
rev = "5e838bf46d0089c43ebd3ea014a207c403e29c61"; rev = "a49ff36a95cb62ffa6cb069d98378d665769926b";
}; };
in buildLisp.library { in buildLisp.library {
name = "cffi"; name = "cffi";

View file

@ -61,7 +61,7 @@ in lib.fix (self: pkgs.llvmPackages.libcxxStdenv.mkDerivation {
grpc grpc
libseccomp libseccomp
libsodium libsodium
systemd.lib.dev systemd.dev
openssl openssl
protobuf protobuf
sqlite sqlite

View file

@ -964,12 +964,10 @@ static void prim_readDir(EvalState& state, const Pos& pos, Value** args,
if (ent.type == DT_UNKNOWN) { if (ent.type == DT_UNKNOWN) {
ent.type = getFileType(path + "/" + ent.name); ent.type = getFileType(path + "/" + ent.name);
} }
mkStringNoCopy(*ent_val, mkStringNoCopy(*ent_val, ent.type == DT_REG ? "regular"
ent.type == DT_REG : ent.type == DT_DIR ? "directory"
? "regular" : ent.type == DT_LNK ? "symlink"
: ent.type == DT_DIR : "unknown");
? "directory"
: ent.type == DT_LNK ? "symlink" : "unknown");
} }
} }
@ -1055,13 +1053,11 @@ static void addPath(EvalState& state, const Pos& pos, const std::string& name,
state.callFunction(*filterFun, arg1, fun2, noPos); state.callFunction(*filterFun, arg1, fun2, noPos);
Value arg2; Value arg2;
mkString(arg2, S_ISREG(st.st_mode) mkString(arg2, S_ISREG(st.st_mode) ? "regular"
? "regular" : S_ISDIR(st.st_mode) ? "directory"
: S_ISDIR(st.st_mode) : S_ISLNK(st.st_mode)
? "directory" ? "symlink"
: S_ISLNK(st.st_mode) : "unknown" /* not supported, will fail! */);
? "symlink"
: "unknown" /* not supported, will fail! */);
Value res; Value res;
state.callFunction(fun2, arg2, res, noPos); state.callFunction(fun2, arg2, res, noPos);

View file

@ -214,10 +214,10 @@ void BinaryCacheStore::addToStore(const ValidPathInfo& info,
/* Atomically write the NAR file. */ /* Atomically write the NAR file. */
narInfo->url = "nar/" + narInfo->fileHash.to_string(Base32, false) + ".nar" + narInfo->url = "nar/" + narInfo->fileHash.to_string(Base32, false) + ".nar" +
(compression == "xz" ? ".xz" (compression == "xz" ? ".xz"
: compression == "bzip2" : compression == "bzip2" ? ".bz2"
? ".bz2" : compression == "br" ? ".br"
: compression == "br" ? ".br" : ""); : "");
if ((repair != 0u) || !fileExists(narInfo->url)) { if ((repair != 0u) || !fileExists(narInfo->url)) {
stats.narWrite++; stats.narWrite++;
upsertFile(narInfo->url, *narCompressed, "application/x-nix-nar"); upsertFile(narInfo->url, *narCompressed, "application/x-nix-nar");

View file

@ -1462,12 +1462,10 @@ void DerivationGoal::tryToBuild() {
bool buildLocally = buildMode != bmNormal || parsedDrv->willBuildLocally(); bool buildLocally = buildMode != bmNormal || parsedDrv->willBuildLocally();
auto started = [&]() { auto started = [&]() {
auto msg = fmt(buildMode == bmRepair auto msg = fmt(buildMode == bmRepair ? "repairing outputs of '%s'"
? "repairing outputs of '%s'" : buildMode == bmCheck ? "checking outputs of '%s'"
: buildMode == bmCheck : nrRounds > 1 ? "building '%s' (round %d/%d)"
? "checking outputs of '%s'" : "building '%s'",
: nrRounds > 1 ? "building '%s' (round %d/%d)"
: "building '%s'",
drvPath, curRound, nrRounds); drvPath, curRound, nrRounds);
if (hook) { if (hook) {
@ -1748,10 +1746,9 @@ void DerivationGoal::buildDone() {
else { else {
st = dynamic_cast<NotDeterministic*>(&e) != nullptr st = dynamic_cast<NotDeterministic*>(&e) != nullptr
? BuildResult::NotDeterministic ? BuildResult::NotDeterministic
: statusOk(status) : statusOk(status) ? BuildResult::OutputRejected
? BuildResult::OutputRejected : fixedOutput || diskFull ? BuildResult::TransientFailure
: fixedOutput || diskFull ? BuildResult::TransientFailure : BuildResult::PermanentFailure;
: BuildResult::PermanentFailure;
} }
done(st, e.msg()); done(st, e.msg());

View file

@ -435,17 +435,17 @@ struct CurlDownloader : public Downloader {
code == CURLE_ABORTED_BY_CALLBACK && _isInterrupted code == CURLE_ABORTED_BY_CALLBACK && _isInterrupted
? DownloadError(Interrupted, fmt("%s of '%s' was interrupted", ? DownloadError(Interrupted, fmt("%s of '%s' was interrupted",
request.verb(), request.uri)) request.verb(), request.uri))
: httpStatus != 0 : httpStatus != 0
? DownloadError( ? DownloadError(
err, fmt("unable to %s '%s': HTTP error %d", err,
request.verb(), request.uri, httpStatus) + fmt("unable to %s '%s': HTTP error %d", request.verb(),
(code == CURLE_OK request.uri, httpStatus) +
? "" (code == CURLE_OK ? ""
: fmt(" (curl error: %s)", : fmt(" (curl error: %s)",
curl_easy_strerror(code)))) curl_easy_strerror(code))))
: DownloadError(err, fmt("unable to %s '%s': %s (%d)", : DownloadError(
request.verb(), request.uri, err, fmt("unable to %s '%s': %s (%d)", request.verb(),
curl_easy_strerror(code), code)); request.uri, curl_easy_strerror(code), code));
/* If this is a transient error, then maybe retry the /* If this is a transient error, then maybe retry the
download after a while. If we're writing to a download after a while. If we're writing to a

View file

@ -38,9 +38,9 @@ struct LocalStoreAccessor : public FSAccessor {
throw Error(format("file '%1%' has unsupported type") % path); throw Error(format("file '%1%' has unsupported type") % path);
} }
return {S_ISREG(st.st_mode) return {S_ISREG(st.st_mode) ? Type::tRegular
? Type::tRegular : S_ISLNK(st.st_mode) ? Type::tSymlink
: S_ISLNK(st.st_mode) ? Type::tSymlink : Type::tDirectory, : Type::tDirectory,
S_ISREG(st.st_mode) ? static_cast<uint64_t>(st.st_size) : 0, S_ISREG(st.st_mode) ? static_cast<uint64_t>(st.st_size) : 0,
S_ISREG(st.st_mode) && ((st.st_mode & S_IXUSR) != 0u)}; S_ISREG(st.st_mode) && ((st.st_mode & S_IXUSR) != 0u)};
} }

View file

@ -53,7 +53,7 @@ typedef enum {
} WorkerOp; } WorkerOp;
#define STDERR_NEXT 0x6f6c6d67 #define STDERR_NEXT 0x6f6c6d67
#define STDERR_READ 0x64617461 // data needed from source #define STDERR_READ 0x64617461 // data needed from source
#define STDERR_WRITE 0x64617416 // data for sink #define STDERR_WRITE 0x64617416 // data for sink
#define STDERR_LAST 0x616c7473 #define STDERR_LAST 0x616c7473
#define STDERR_ERROR 0x63787470 #define STDERR_ERROR 0x63787470

View file

@ -260,13 +260,10 @@ static DrvInfos filterBySelector(EvalState& state, const DrvInfos& allElems,
auto k = newest.find(drvName.name); auto k = newest.find(drvName.name);
if (k != newest.end()) { if (k != newest.end()) {
d = j.first.querySystem() == k->second.first.querySystem() d = j.first.querySystem() == k->second.first.querySystem() ? 0
? 0 : j.first.querySystem() == settings.thisSystem ? 1
: j.first.querySystem() == settings.thisSystem : k->second.first.querySystem() == settings.thisSystem ? -1
? 1 : 0;
: k->second.first.querySystem() == settings.thisSystem
? -1
: 0;
if (d == 0) { if (d == 0) {
d = comparePriorities(state, j.first, k->second.first); d = comparePriorities(state, j.first, k->second.first);
} }

View file

@ -58,18 +58,18 @@ struct CmdToBase final : Command {
} }
std::string name() override { std::string name() override {
return base == Base16 return base == Base16 ? "to-base16"
? "to-base16" : base == Base32 ? "to-base32"
: base == Base32 ? "to-base32" : base == Base64 ? "to-base64"
: base == Base64 ? "to-base64" : "to-sri"; : "to-sri";
} }
std::string description() override { std::string description() override {
return fmt( return fmt("convert a hash to %s representation",
"convert a hash to %s representation", base == Base16 ? "base-16"
base == Base16 : base == Base32 ? "base-32"
? "base-16" : base == Base64 ? "base-64"
: base == Base32 ? "base-32" : base == Base64 ? "base-64" : "SRI"); : "SRI");
} }
void run() override { void run() override {

View file

@ -31,9 +31,8 @@ struct MixLs : virtual Args, MixJSON {
auto st = accessor->stat(curPath); auto st = accessor->stat(curPath);
std::string tp = st.type == FSAccessor::Type::tRegular std::string tp = st.type == FSAccessor::Type::tRegular
? (st.isExecutable ? "-r-xr-xr-x" : "-r--r--r--") ? (st.isExecutable ? "-r-xr-xr-x" : "-r--r--r--")
: st.type == FSAccessor::Type::tSymlink : st.type == FSAccessor::Type::tSymlink ? "lrwxrwxrwx"
? "lrwxrwxrwx" : "dr-xr-xr-x";
: "dr-xr-xr-x";
std::cout << (format("%s %20d %s") % tp % st.fileSize % relPath); std::cout << (format("%s %20d %s") % tp % st.fileSize % relPath);
if (st.type == FSAccessor::Type::tSymlink) { if (st.type == FSAccessor::Type::tSymlink) {
std::cout << " -> " << accessor->readLink(curPath); std::cout << " -> " << accessor->readLink(curPath);

View file

@ -5,12 +5,7 @@ with lib;
rec { rec {
nixpkgs = import pkgs.nixpkgsSrc {}; nixpkgs = import pkgs.nixpkgsSrc {};
home-manager = (fetchTarball { home = confPath: (import "${nixpkgs.home-manager.src}/modules" {
url = "https://github.com/rycee/home-manager/archive/152769aed96d4d6f005ab40daf03ec4f5102c763.tar.gz";
sha256 = "10svwspmsf46rijzsh0h9nmz1mq2998wcml8yp36mwksgi8695pc";
});
home = confPath: (import "${home-manager}/modules" {
pkgs = nixpkgs; pkgs = nixpkgs;
configuration = { config, lib, ... }: { configuration = { config, lib, ... }: {
imports = [confPath]; imports = [confPath];

View file

@ -11,20 +11,13 @@ let
name = "linux-ck-patch-${mm}-ck1.xz"; name = "linux-ck-patch-${mm}-ck1.xz";
# example: http://ck.kolivas.org/patches/5.0/5.4/5.4-ck1/patch-5.4-ck1.xz # example: http://ck.kolivas.org/patches/5.0/5.4/5.4-ck1/patch-5.4-ck1.xz
url = "http://ck.kolivas.org/patches/${mj}.0/${mm}/${mm}-ck1/patch-${mm}-ck1.xz"; url = "http://ck.kolivas.org/patches/${mj}.0/${mm}/${mm}-ck1/patch-${mm}-ck1.xz";
sha256 = "01jyg9x2ligr0gjic8lg4f7hw3isz94kqwdbzdk9n8nghklh38p4"; sha256 = "0cv1ayj9akl83q2whabj8v3qygkkfwvzcjqx539sw6j3r9qhrs64";
}; };
unpackPhase = '' unpackPhase = ''
${pkgs.xz}/bin/unxz -kfdc $src > patch-${mm}-ck1 ${pkgs.xz}/bin/unxz -kfdc $src > patch-${mm}-ck1
''; '';
patches = [
(builtins.fetchurl {
url = "https://aur.archlinux.org/cgit/aur.git/plain/fix_ck1_for_5.7.14.patch\?h\=linux-ck";
sha256 = "0l8f2kph4f2lvcjn0s2fg6n9xa6f4khjz7rqc4zxk58r7fh4s5v4";
})
];
installPhase = '' installPhase = ''
cp patch-${mm}-ck1 $out cp patch-${mm}-ck1 $out
''; '';

View file

@ -1,11 +1,6 @@
{ config ? throw "not a readTree target", ... }: { config ? throw "not a readTree target", ... }:
let let
homeManagerSrc = (fetchTarball {
url = "https://github.com/nix-community/home-manager/archive/9b1b55ba0264a55add4b7b4e022bdc2832b531f6.tar.gz";
sha256 = "1lvnprvqfsjhi811ldagvfy4ilysxdj4arzi0f0gskll6czwjdr7";
});
depot = import <depot> {}; depot = import <depot> {};
pkgs = import <nixpkgs> {}; pkgs = import <nixpkgs> {};
@ -14,7 +9,10 @@ in
{ {
programs = { programs = {
home-manager = { enable = true; path = homeManagerSrc; }; home-manager = {
enable = true;
path = pkgs.home-manager.src;
};
bash = { bash = {
enable = true; enable = true;

View file

@ -280,7 +280,6 @@ in depot.lib.fix(self: {
rustup rustup
screen screen
scrot scrot
sourcetrail
spotify spotify
steam steam
tokei tokei