nym: 0.10.0 -> 0.11.0 (#130994)

Co-authored-by: Ethan Creeger <ethan.creeger@gmail.com>

authored by

ethancreeger
Ethan Creeger
and committed by
GitHub
c6de8182 a460862e

+11 -127
+11 -4
pkgs/applications/networking/nym/default.nix
··· 10 11 rustPlatform.buildRustPackage rec { 12 pname = "nym"; 13 - version = "0.10.0"; 14 15 src = fetchFromGitHub { 16 owner = "nymtech"; 17 repo = "nym"; 18 rev = "v${version}"; 19 - sha256 = "sha256-7x+B+6T0cnEOjXevA5n1k/SY1Q2tcu0bbZ9gIGoljw0="; 20 }; 21 22 - cargoSha256 = "0a7yja0ihjc66fqlshlaxpnpcpdy7h7gbv6120w2cr605qdnqvkx"; 23 24 nativeBuildInputs = [ pkg-config ]; 25 26 buildInputs = [ openssl ] ++ lib.optionals stdenv.isDarwin [ Security libiconv ]; 27 28 - patches = [ ./ignore-networking-tests.patch ]; 29 checkType = "debug"; 30 31 passthru.updateScript = ./update.sh; 32 33 meta = with lib; { 34 description = "A mixnet providing IP-level privacy";
··· 10 11 rustPlatform.buildRustPackage rec { 12 pname = "nym"; 13 + version = "0.11.0"; 14 15 src = fetchFromGitHub { 16 owner = "nymtech"; 17 repo = "nym"; 18 rev = "v${version}"; 19 + sha256 = "sha256-bZXbteryXkOxft63zUMWdpBgbDSvrBHQY3f70/+mBtI="; 20 }; 21 22 + cargoSha256 = "0xwa114fs4h6y2a3nrl2dp0rv0k336xy9y330g9yix4g34qmrynq"; 23 24 nativeBuildInputs = [ pkg-config ]; 25 26 buildInputs = [ openssl ] ++ lib.optionals stdenv.isDarwin [ Security libiconv ]; 27 28 checkType = "debug"; 29 30 passthru.updateScript = ./update.sh; 31 + 32 + checkFlags = [ 33 + "--skip commands::upgrade::upgrade_tests" 34 + "--skip allowed_hosts::tests::creating_a_new_host_store" 35 + "--skip allowed_hosts::tests::getting_the_domain_root" 36 + "--skip allowed_hosts::tests::requests_to_allowed_hosts" 37 + "--skip allowed_hosts::tests::requests_to_unknown_hosts" 38 + ]; 39 40 meta = with lib; { 41 description = "A mixnet providing IP-level privacy";
-123
pkgs/applications/networking/nym/ignore-networking-tests.patch
··· 1 - diff --git a/service-providers/network-requester/src/allowed_hosts.rs b/service-providers/network-requester/src/allowed_hosts.rs 2 - index 3026b4ee..fd156682 100644 3 - --- a/service-providers/network-requester/src/allowed_hosts.rs 4 - +++ b/service-providers/network-requester/src/allowed_hosts.rs 5 - @@ -306,6 +306,7 @@ mod tests { 6 - } 7 - 8 - #[test] 9 - + #[ignore] 10 - fn leaves_a_com_alone() { 11 - let filter = setup(); 12 - assert_eq!( 13 - @@ -315,6 +316,7 @@ mod tests { 14 - } 15 - 16 - #[test] 17 - + #[ignore] 18 - fn trims_subdomains_from_com() { 19 - let filter = setup(); 20 - assert_eq!( 21 - @@ -324,6 +326,7 @@ mod tests { 22 - } 23 - 24 - #[test] 25 - + #[ignore] 26 - fn works_for_non_com_roots() { 27 - let filter = setup(); 28 - assert_eq!( 29 - @@ -333,6 +336,7 @@ mod tests { 30 - } 31 - 32 - #[test] 33 - + #[ignore] 34 - fn works_for_non_com_roots_with_subdomains() { 35 - let filter = setup(); 36 - assert_eq!( 37 - @@ -342,12 +346,14 @@ mod tests { 38 - } 39 - 40 - #[test] 41 - + #[ignore] 42 - fn returns_none_on_garbage() { 43 - let filter = setup(); 44 - assert_eq!(None, filter.get_domain_root("::/&&%@")); 45 - } 46 - 47 - #[test] 48 - + #[ignore] 49 - fn returns_none_on_nonsense_domains() { 50 - let filter = setup(); 51 - assert_eq!(None, filter.get_domain_root("flappappa")); 52 - @@ -368,6 +374,7 @@ mod tests { 53 - } 54 - 55 - #[test] 56 - + #[ignore] 57 - fn are_not_allowed() { 58 - let host = "unknown.com"; 59 - let mut filter = setup(); 60 - @@ -375,6 +382,7 @@ mod tests { 61 - } 62 - 63 - #[test] 64 - + #[ignore] 65 - fn get_appended_once_to_the_unknown_hosts_list() { 66 - let host = "unknown.com"; 67 - let mut filter = setup(); 68 - @@ -405,6 +413,7 @@ mod tests { 69 - } 70 - 71 - #[test] 72 - + #[ignore] 73 - fn are_allowed() { 74 - let host = "nymtech.net"; 75 - 76 - @@ -413,6 +422,7 @@ mod tests { 77 - } 78 - 79 - #[test] 80 - + #[ignore] 81 - fn are_allowed_for_subdomains() { 82 - let host = "foomp.nymtech.net"; 83 - 84 - @@ -421,6 +431,7 @@ mod tests { 85 - } 86 - 87 - #[test] 88 - + #[ignore] 89 - fn are_not_appended_to_file() { 90 - let mut filter = setup(&["nymtech.net"]); 91 - 92 - @@ -436,6 +447,7 @@ mod tests { 93 - } 94 - 95 - #[test] 96 - + #[ignore] 97 - fn are_allowed_for_ipv4_addresses() { 98 - let address_good = "1.1.1.1"; 99 - let address_good_port = "1.1.1.1:1234"; 100 - @@ -448,6 +460,7 @@ mod tests { 101 - } 102 - 103 - #[test] 104 - + #[ignore] 105 - fn are_allowed_for_ipv6_addresses() { 106 - let ip_v6_full = "2001:0db8:85a3:0000:0000:8a2e:0370:7334"; 107 - let ip_v6_full_rendered = "2001:0db8:85a3::8a2e:0370:7334"; 108 - @@ -477,6 +490,7 @@ mod tests { 109 - } 110 - 111 - #[test] 112 - + #[ignore] 113 - fn are_allowed_for_ipv4_address_ranges() { 114 - let range1 = "127.0.0.1/32"; 115 - let range2 = "1.2.3.4/24"; 116 - @@ -495,6 +509,7 @@ mod tests { 117 - } 118 - 119 - #[test] 120 - + #[ignore] 121 - fn are_allowed_for_ipv6_address_ranges() { 122 - let range = "2620:0:2d0:200::7/32"; 123 -
···