Clone of https://github.com/NixOS/nixpkgs.git (to stress-test knotserver)

Merge branch 'master.upstream' into staging.upstream

+64 -42
+2 -3
pkgs/applications/networking/browsers/chromium/browser.nix
··· 12 cp -v "$buildPath/"*.pak "$buildPath/"*.bin "$libExecPath/" 13 cp -v "$buildPath/icudtl.dat" "$libExecPath/" 14 cp -vLR "$buildPath/locales" "$buildPath/resources" "$libExecPath/" 15 - cp -v "$buildPath/libffmpegsumo.so" "$libExecPath/" 16 - ${optionalString (versionOlder base.version "42.0.0.0") '' 17 - cp -v "$buildPath/libpdf.so" "$libExecPath/" 18 ''} 19 cp -v "$buildPath/chrome" "$libExecPath/$packageName" 20
··· 12 cp -v "$buildPath/"*.pak "$buildPath/"*.bin "$libExecPath/" 13 cp -v "$buildPath/icudtl.dat" "$libExecPath/" 14 cp -vLR "$buildPath/locales" "$buildPath/resources" "$libExecPath/" 15 + ${optionalString (versionOlder base.version "45.0.0.0") '' 16 + cp -v "$buildPath/libffmpegsumo.so" "$libExecPath/" 17 ''} 18 cp -v "$buildPath/chrome" "$libExecPath/$packageName" 19
+3 -7
pkgs/applications/networking/browsers/chromium/common.nix
··· 21 # package customization 22 , enableSELinux ? false, libselinux ? null 23 , enableNaCl ? false 24 , useOpenSSL ? false, nss ? null, openssl ? null 25 , gnomeSupport ? false, gnome ? null 26 , gnomeKeyringSupport ? false, libgnome_keyring3 ? null ··· 130 chmod -R u+w third_party 131 ''; 132 133 - postPatch = optionalString (versionOlder version "42.0.0.0") '' 134 - sed -i -e '/base::FilePath exe_dir/,/^ *} *$/c \ 135 - sandbox_binary = base::FilePath(getenv("CHROMIUM_SANDBOX_BINARY_PATH")); 136 - ' sandbox/linux/suid/client/setuid_sandbox_client.cc 137 - '' + '' 138 sed -i -e '/module_path *=.*libexif.so/ { 139 s|= [^;]*|= base::FilePath().AppendASCII("${libexif}/lib/libexif.so")| 140 }' chrome/utility/media_galleries/image_metadata_extractor.cc ··· 158 use_pulseaudio = pulseSupport; 159 linux_link_pulseaudio = pulseSupport; 160 disable_nacl = !enableNaCl; 161 use_openssl = useOpenSSL; 162 selinux = enableSELinux; 163 use_cups = cupsSupport; 164 - } // optionalAttrs (versionOlder version "42.0.0.0") { 165 - linux_sandbox_chrome_path="${libExecPath}/${packageName}"; 166 } // { 167 werror = ""; 168 clang = false;
··· 21 # package customization 22 , enableSELinux ? false, libselinux ? null 23 , enableNaCl ? false 24 + , enableHotwording ? false 25 , useOpenSSL ? false, nss ? null, openssl ? null 26 , gnomeSupport ? false, gnome ? null 27 , gnomeKeyringSupport ? false, libgnome_keyring3 ? null ··· 131 chmod -R u+w third_party 132 ''; 133 134 + postPatch = '' 135 sed -i -e '/module_path *=.*libexif.so/ { 136 s|= [^;]*|= base::FilePath().AppendASCII("${libexif}/lib/libexif.so")| 137 }' chrome/utility/media_galleries/image_metadata_extractor.cc ··· 155 use_pulseaudio = pulseSupport; 156 linux_link_pulseaudio = pulseSupport; 157 disable_nacl = !enableNaCl; 158 + enable_hotwording = enableHotwording; 159 use_openssl = useOpenSSL; 160 selinux = enableSELinux; 161 use_cups = cupsSupport; 162 } // { 163 werror = ""; 164 clang = false;
+4 -6
pkgs/applications/networking/browsers/chromium/default.nix
··· 4 , channel ? "stable" 5 , enableSELinux ? false 6 , enableNaCl ? false 7 , useOpenSSL ? false 8 , gnomeSupport ? false 9 , gnomeKeyringSupport ? false ··· 26 }; 27 28 mkChromiumDerivation = callPackage ./common.nix { 29 - inherit enableSELinux enableNaCl useOpenSSL gnomeSupport 30 - gnomeKeyringSupport proprietaryCodecs cupsSupport 31 - pulseSupport hiDPISupport; 32 }; 33 34 browser = callPackage ./browser.nix { }; ··· 73 sandboxBinary = "${chromium.sandbox}/bin/chromium-sandbox"; 74 mkEnvVar = key: val: "--set '${key}' '${val}'"; 75 envVars = chromium.plugins.settings.envVars or {}; 76 - isVer42 = !stdenv.lib.versionOlder chromium.browser.version "42.0.0.0"; 77 flags = chromium.plugins.settings.flags or []; 78 - setBinPath = "--set CHROMIUM_SANDBOX_BINARY_PATH \"${sandboxBinary}\""; 79 in with stdenv.lib; '' 80 mkdir -p "$out/bin" "$out/share/applications" 81 82 ln -s "${chromium.browser}/share" "$out/share" 83 makeWrapper "${browserBinary}" "$out/bin/chromium" \ 84 - ${optionalString (!isVer42) setBinPath} \ 85 ${concatStrings (mapAttrsToList mkEnvVar envVars)} \ 86 --add-flags "${concatStringsSep " " flags}" 87
··· 4 , channel ? "stable" 5 , enableSELinux ? false 6 , enableNaCl ? false 7 + , enableHotwording ? false 8 , useOpenSSL ? false 9 , gnomeSupport ? false 10 , gnomeKeyringSupport ? false ··· 27 }; 28 29 mkChromiumDerivation = callPackage ./common.nix { 30 + inherit enableSELinux enableNaCl enableHotwording useOpenSSL gnomeSupport 31 + gnomeKeyringSupport proprietaryCodecs cupsSupport pulseSupport 32 + hiDPISupport; 33 }; 34 35 browser = callPackage ./browser.nix { }; ··· 74 sandboxBinary = "${chromium.sandbox}/bin/chromium-sandbox"; 75 mkEnvVar = key: val: "--set '${key}' '${val}'"; 76 envVars = chromium.plugins.settings.envVars or {}; 77 flags = chromium.plugins.settings.flags or []; 78 in with stdenv.lib; '' 79 mkdir -p "$out/bin" "$out/share/applications" 80 81 ln -s "${chromium.browser}/share" "$out/share" 82 makeWrapper "${browserBinary}" "$out/bin/chromium" \ 83 ${concatStrings (mapAttrsToList mkEnvVar envVars)} \ 84 --add-flags "${concatStringsSep " " flags}" 85
+1 -2
pkgs/applications/networking/browsers/chromium/plugins.nix
··· 21 chan = if source.channel == "dev" then "chrome-unstable" 22 else if source.channel == "stable" then "chrome" 23 else "chrome-${source.channel}"; 24 - cext = if versionOlder source.version "41.0.0.0" then "lzma" else "xz"; 25 in '' 26 mkdir -p plugins 27 - ar p "$src" data.tar.${cext} | tar xJ -C plugins --strip-components=4 \ 28 ./opt/google/${chan}/PepperFlash \ 29 ./opt/google/${chan}/libwidevinecdm.so \ 30 ./opt/google/${chan}/libwidevinecdmadapter.so
··· 21 chan = if source.channel == "dev" then "chrome-unstable" 22 else if source.channel == "stable" then "chrome" 23 else "chrome-${source.channel}"; 24 in '' 25 mkdir -p plugins 26 + ar p "$src" data.tar.xz | tar xJ -C plugins --strip-components=4 \ 27 ./opt/google/${chan}/PepperFlash \ 28 ./opt/google/${chan}/libwidevinecdm.so \ 29 ./opt/google/${chan}/libwidevinecdmadapter.so
+35 -6
pkgs/applications/networking/browsers/chromium/source/default.nix
··· 1 - { stdenv, fetchurl, python 2 , channel ? "stable" 3 , useOpenSSL # XXX 4 }: ··· 19 ]); 20 21 pre44 = versionOlder version "44.0.0.0"; 22 23 in stdenv.mkDerivation { 24 name = "chromium-source-${version}"; ··· 47 done 48 ''; 49 50 - patches = if pre44 then [ 51 - ./nix_plugin_paths_42.patch 52 - ] else [ 53 - ./nix_plugin_paths_44.patch 54 - ]; 55 56 patchPhase = let 57 diffmod = sym: "/^${sym} /{s/^${sym} //;${transform ""};s/^/${sym} /}";
··· 1 + { stdenv, fetchurl, fetchpatch, patchutils, python 2 , channel ? "stable" 3 , useOpenSSL # XXX 4 }: ··· 19 ]); 20 21 pre44 = versionOlder version "44.0.0.0"; 22 + is44 = versionOlder version "45.0.0.0" && !pre44; 23 24 in stdenv.mkDerivation { 25 name = "chromium-source-${version}"; ··· 48 done 49 ''; 50 51 + patches = let 52 + baseURL = "https://codereview.chromium.org/download"; 53 + 54 + mkBlinkFix = issue: sha256: fetchpatch { 55 + url = "${baseURL}/issue${issue}.diff"; 56 + inherit sha256; 57 + postFetch = '' 58 + sed -i -e 's,^\(---\|+++\) *[ab]/,&third_party/WebKit/,' "$out" 59 + ''; 60 + }; 61 + 62 + fixes44 = [ 63 + # WebPluginContainer::setNeedsLayout 64 + # https://codereview.chromium.org/1157943002/ 65 + (mkBlinkFix "1157943002_20001" 66 + "0932yd15zlh2g5a5bbm6qrnfvv22jlfdg8pj0w9z58m5zdzw1p82") 67 + # WebRuntimeFeatures::enablePermissionsAPI 68 + # https://codereview.chromium.org/1156113007/ 69 + (mkBlinkFix "1156113007_1" 70 + "1v76brrgdziv1q62ba4bimg0my2dmnkyl68b21nv2vw661v0hzwh") 71 + # Revert of https://codereview.chromium.org/1150543002/ 72 + (fetchpatch { 73 + url = "${baseURL}/issue1150543002_1.diff"; 74 + sha256 = "0x9sya0m1zcb2vcp2vfss88qqdrh6bzcbx2ngfiql7rkbynnpqn6"; 75 + postFetch = '' 76 + ${patchutils}/bin/interdiff "$out" /dev/null > reversed.patch 77 + mv reversed.patch "$out" 78 + ''; 79 + }) 80 + ]; 81 + pluginPaths = if pre44 then singleton ./nix_plugin_paths_42.patch 82 + else singleton ./nix_plugin_paths_44.patch; 83 + in pluginPaths ++ optionals is44 fixes44; 84 85 patchPhase = let 86 diffmod = sym: "/^${sym} /{s/^${sym} //;${transform ""};s/^/${sym} /}";
+12 -12
pkgs/applications/networking/browsers/chromium/source/sources.nix
··· 1 # This file is autogenerated from update.sh in the parent directory. 2 { 3 dev = { 4 - version = "45.0.2421.0"; 5 - sha256 = "1qc80y0mhwnvxrvpc3csskgb536wq34c0fgk19h1qb4xc62lxhsk"; 6 - sha256bin32 = "1xqhyrlmh00md6i1q4wr0xihqbvcpshzscnjclrn53dlw5zs2s89"; 7 - sha256bin64 = "0akdhwwdfcbqfh65a82zigbhsi8sbhhw6904cjprb3bmv4l3c598"; 8 }; 9 beta = { 10 - version = "44.0.2403.39"; 11 - sha256 = "15c4adg0r9ym3pxya7vv4d148gv2pdwaaymxvvw511fjwffdv71n"; 12 - sha256bin32 = "1gaypkah10y31gb5f7vnyv0v73z5zjznmsp6vh2m4hfajx7s55jn"; 13 - sha256bin64 = "1j1ma6asl3ibjv3apyw24vhyi1qy64f586w8jizqzp4h962gj95c"; 14 }; 15 stable = { 16 - version = "43.0.2357.124"; 17 - sha256 = "09m8bb5f17mx6cd3h5irslw07h2s0drda35v17vcr7qfhk8jdh92"; 18 - sha256bin32 = "15n2fla1ixrqzi0in0vyl8n5wkv20fpd96lff65rwr9diylz287p"; 19 - sha256bin64 = "0x6igpcf29zmwqgphvy9nm527k9g7na2cvgc5nimw4fs5dakzzjr"; 20 }; 21 }
··· 1 # This file is autogenerated from update.sh in the parent directory. 2 { 3 dev = { 4 + version = "45.0.2431.0"; 5 + sha256 = "0irlrym8r1wa6zb5bg4paxy3h5fg300k5c9vkj3xmhdp567clfja"; 6 + sha256bin32 = "1lfrd7x7cav5mr7pg0a3d4a9dyy6f0rklarprfrcvqwipjkddb3f"; 7 + sha256bin64 = "1jzmkgiqn17ynbv0xljiifvlj1136jq98zrkd4hdmkgv8xrrzd74"; 8 }; 9 beta = { 10 + version = "44.0.2403.52"; 11 + sha256 = "0zgcqbxm2slxpj6i50w7r3xxql1k6kgd51qn8w8gwfzhmad4zxyx"; 12 + sha256bin32 = "1kfgl2l7j5fhj6wg4i3bsany2rlwspprypdy0z7k3pqiwwyiw658"; 13 + sha256bin64 = "1sabqqh1hii7appmx6xwabnapf4cv7smsy31nvz063fa5p6h21m8"; 14 }; 15 stable = { 16 + version = "43.0.2357.125"; 17 + sha256 = "01alba50zrc50bn4p3f298khk8fam2rv5wyysz7rq3zrjg8785xg"; 18 + sha256bin32 = "0527bdlf4nd4b1ydmwn6rnxy377388qb98v9anicfd4bc2p9jjml"; 19 + sha256bin64 = "0yhgcjaxcpgk32l1sjrgkq447ywcj156a7372v87m22dcwl8fi01"; 20 }; 21 }
+1
pkgs/build-support/fetchpatch/default.nix
··· 18 --strip=${toString stripLen} \ 19 --clean "$out" > "$tmpfile" 20 mv "$tmpfile" "$out" 21 ''; 22 } // builtins.removeAttrs args ["stripLen"])
··· 18 --strip=${toString stripLen} \ 19 --clean "$out" > "$tmpfile" 20 mv "$tmpfile" "$out" 21 + ${args.postFetch or ""} 22 ''; 23 } // builtins.removeAttrs args ["stripLen"])
+2 -2
pkgs/servers/nosql/cassandra/2.0.nix
··· 10 11 let 12 13 - version = "2.0.15"; 14 - sha256 = "00rxmf8il9w1fmfpxfy9gbhbvgid5h8d80g3ljw25jscr00lcyh0"; 15 16 in 17
··· 10 11 let 12 13 + version = "2.0.16"; 14 + sha256 = "1fpvgmakmxy1lnygccpc32q53pa36bwy0lqdvb6hsifkxymdw8y5"; 15 16 in 17
+2 -2
pkgs/servers/nosql/cassandra/2.1.nix
··· 10 11 let 12 13 - version = "2.1.6"; 14 - sha256 = "1xq96h33f4xmld114mrd57z396f9ykcj0xy50fnnhy5mhafkn4n2"; 15 16 in 17
··· 10 11 let 12 13 + version = "2.1.7"; 14 + sha256 = "12chnxcl9zg20d0l4rlzp13cnxvdqr8bx3bbvwbcpnh7ir5s7ldd"; 15 16 in 17
+2 -2
pkgs/servers/sql/mysql/5.5.x.nix
··· 4 5 stdenv.mkDerivation rec { 6 name = "mysql-${version}"; 7 - version = "5.5.43"; 8 9 src = fetchurl { 10 url = "http://mysql.mirrors.pair.com/Downloads/MySQL-5.5/${name}.tar.gz"; 11 - sha256 = "1kbl8xp6xi9yclc4q0q97s89rr498mm0avpbkmsa4ff8wmwxzls3"; 12 }; 13 14 patches = if stdenv.isCygwin then [
··· 4 5 stdenv.mkDerivation rec { 6 name = "mysql-${version}"; 7 + version = "5.5.44"; 8 9 src = fetchurl { 10 url = "http://mysql.mirrors.pair.com/Downloads/MySQL-5.5/${name}.tar.gz"; 11 + sha256 = "1pp5ngm4ibnp8xnn9haz1db0favd1i7cxdgl5z4677mkgljmpw45"; 12 }; 13 14 patches = if stdenv.isCygwin then [