Clone of https://github.com/NixOS/nixpkgs.git (to stress-test knotserver)

nginxMainline: 1.27.5 -> 1.29.1

This change was already accepted in #433600 but reverted in
106b1418bc30cbae35addcb643a883e22de9573b.

Changes:
```
Changes with nginx 1.29.1 13 Aug 2025

*) Security: processing of a specially crafted login/password when using
the "none" authentication method in the ngx_mail_smtp_module might
cause worker process memory disclosure to the authentication server
(CVE-2025-53859).

*) Change: now TLSv1.3 certificate compression is disabled by default.

*) Feature: the "ssl_certificate_compression" directive.

*) Feature: support for 0-RTT in QUIC when using OpenSSL 3.5.1 or newer.

*) Bugfix: the 103 response might be buffered when using HTTP/2 and the
"early_hints" directive.

*) Bugfix: in handling "Host" and ":authority" header lines with equal
values when using HTTP/2; the bug had appeared in 1.17.9.

*) Bugfix: in handling "Host" header lines with a port when using
HTTP/3.

*) Bugfix: nginx could not be built on NetBSD 10.0.

*) Bugfix: in the "none" parameter of the "smtp_auth" directive.

Changes with nginx 1.29.0 24 Jun 2025

*) Feature: support for response code 103 from proxy and gRPC backends;
the "early_hints" directive.

*) Feature: loading of secret keys from hardware tokens with OpenSSL
provider.

*) Feature: support for the "so_keepalive" parameter of the "listen"
directive on macOS.

*) Change: the logging level of SSL errors in a QUIC handshake has been
changed from "error" to "crit" for critical errors, and to "info" for
the rest; the logging level of unsupported QUIC transport parameters
has been lowered from "info" to "debug".

*) Change: the native nginx/Windows binary release is now built using
Windows SDK 10.

*) Bugfix: nginx could not be built by gcc 15 if ngx_http_v2_module or
ngx_http_v3_module modules were used.

*) Bugfix: nginx might not be built by gcc 14 or newer with -O3 -flto
optimization if ngx_http_v3_module was used.

*) Bugfixes and improvements in HTTP/3.
```

+10 -10
-7
pkgs/servers/http/nginx/generic.nix
··· 218 218 ./nix-etag-1.15.4.patch 219 219 ./nix-skip-check-logs-path.patch 220 220 ] 221 - ++ lib.optionals (!lib.versionAtLeast version "1.29.1") [ 222 - (fetchpatch { 223 - name = "CVE-2025-53859.patch"; 224 - url = "https://nginx.org/download/patch.2025.smtp.txt"; 225 - hash = "sha256-v49sLskFNMoKuG8HQISw8ST7ga6DS+ngJiL0D3sUyGk="; 226 - }) 227 - ] 228 221 ++ lib.optionals (stdenv.hostPlatform != stdenv.buildPlatform) [ 229 222 (fetchpatch { 230 223 url = "https://raw.githubusercontent.com/openwrt/packages/c057dfb09c7027287c7862afab965a4cd95293a3/net/nginx/patches/102-sizeof_test_fix.patch";
+2 -2
pkgs/servers/http/nginx/mainline.nix
··· 1 1 { callPackage, ... }@args: 2 2 3 3 callPackage ./generic.nix args { 4 - version = "1.27.5"; 5 - hash = "sha256-6WrOu5wqbbigAMPdGzLsuhuBDwzVhiMtTZIeN2Z03Q4="; 4 + version = "1.29.1"; 5 + hash = "sha256-xYn35+2AHdvZBK+/PeJq4k6wzOJ8dxei6U33+xLWrSc="; 6 6 }
+8 -1
pkgs/servers/http/nginx/stable.nix
··· 1 - { callPackage, ... }@args: 1 + { callPackage, fetchpatch, ... }@args: 2 2 3 3 callPackage ./generic.nix args { 4 4 version = "1.28.0"; 5 5 hash = "sha256-xrXGsIbA3508o/9eCEwdDvkJ5gOCecccHD6YX1dv92o="; 6 + extraPatches = [ 7 + (fetchpatch { 8 + name = "CVE-2025-53859.patch"; 9 + url = "https://nginx.org/download/patch.2025.smtp.txt"; 10 + hash = "sha256-v49sLskFNMoKuG8HQISw8ST7ga6DS+ngJiL0D3sUyGk="; 11 + }) 12 + ]; 6 13 }