go: 1.7.4 -> 1.7.5
This commit is contained in:
parent
0a4cf89ae4
commit
19ebff1d95
@ -24,13 +24,13 @@ in
|
|||||||
|
|
||||||
stdenv.mkDerivation rec {
|
stdenv.mkDerivation rec {
|
||||||
name = "go-${version}";
|
name = "go-${version}";
|
||||||
version = "1.7.4";
|
version = "1.7.5";
|
||||||
|
|
||||||
src = fetchFromGitHub {
|
src = fetchFromGitHub {
|
||||||
owner = "golang";
|
owner = "golang";
|
||||||
repo = "go";
|
repo = "go";
|
||||||
rev = "go${version}";
|
rev = "go${version}";
|
||||||
sha256 = "1ks3xph20afrfp3vqs1sjnkpjb0lgxblv8706wa3iiyg7rka4axv";
|
sha256 = "00radlwbrssn0x3naamb33cfx7ap2jv7s51bqr705nmn2j5yyblk";
|
||||||
};
|
};
|
||||||
|
|
||||||
# perl is used for testing go vet
|
# perl is used for testing go vet
|
||||||
@ -105,7 +105,7 @@ stdenv.mkDerivation rec {
|
|||||||
|
|
||||||
patches =
|
patches =
|
||||||
[ ./remove-tools-1.7.patch
|
[ ./remove-tools-1.7.patch
|
||||||
./ssl-cert-file-1.7.patch
|
./ssl-cert-file.patch
|
||||||
./creds-test.patch
|
./creds-test.patch
|
||||||
|
|
||||||
# This test checks for the wrong thing with recent tzdata. It's been fixed in master but the patch
|
# This test checks for the wrong thing with recent tzdata. It's been fixed in master but the patch
|
||||||
|
@ -107,7 +107,7 @@ stdenv.mkDerivation rec {
|
|||||||
|
|
||||||
patches =
|
patches =
|
||||||
[ ./remove-tools-1.8.patch
|
[ ./remove-tools-1.8.patch
|
||||||
./ssl-cert-file-1.8.patch
|
./ssl-cert-file.patch
|
||||||
./creds-test.patch
|
./creds-test.patch
|
||||||
./remove-test-pie-1.8.patch
|
./remove-test-pie-1.8.patch
|
||||||
|
|
||||||
|
@ -1,78 +0,0 @@
|
|||||||
diff --git a/src/crypto/x509/root_cgo_darwin.go b/src/crypto/x509/root_cgo_darwin.go
|
|
||||||
index a4b33c7..9700b75 100644
|
|
||||||
--- a/src/crypto/x509/root_cgo_darwin.go
|
|
||||||
+++ b/src/crypto/x509/root_cgo_darwin.go
|
|
||||||
@@ -151,11 +151,20 @@ int FetchPEMRoots(CFDataRef *pemRoots) {
|
|
||||||
import "C"
|
|
||||||
import (
|
|
||||||
"errors"
|
|
||||||
+ "io/ioutil"
|
|
||||||
+ "os"
|
|
||||||
"unsafe"
|
|
||||||
)
|
|
||||||
|
|
||||||
func loadSystemRoots() (*CertPool, error) {
|
|
||||||
roots := NewCertPool()
|
|
||||||
+ if file := os.Getenv("NIX_SSL_CERT_FILE"); file != "" {
|
|
||||||
+ data, err := ioutil.ReadFile(file)
|
|
||||||
+ if err == nil {
|
|
||||||
+ roots.AppendCertsFromPEM(data)
|
|
||||||
+ return roots, nil
|
|
||||||
+ }
|
|
||||||
+ }
|
|
||||||
|
|
||||||
var data C.CFDataRef = nil
|
|
||||||
err := C.FetchPEMRoots(&data)
|
|
||||||
diff --git a/src/crypto/x509/root_darwin.go b/src/crypto/x509/root_darwin.go
|
|
||||||
index 59b303d..d4a34ac 100644
|
|
||||||
--- a/src/crypto/x509/root_darwin.go
|
|
||||||
+++ b/src/crypto/x509/root_darwin.go
|
|
||||||
@@ -28,16 +28,25 @@ func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate
|
|
||||||
// The linker will not include these unused functions in binaries built with cgo enabled.
|
|
||||||
|
|
||||||
func execSecurityRoots() (*CertPool, error) {
|
|
||||||
+ var (
|
|
||||||
+ mu sync.Mutex
|
|
||||||
+ roots = NewCertPool()
|
|
||||||
+ )
|
|
||||||
+
|
|
||||||
+ if file := os.Getenv("NIX_SSL_CERT_FILE"); file != "" {
|
|
||||||
+ data, err := ioutil.ReadFile(file)
|
|
||||||
+ if err == nil {
|
|
||||||
+ roots.AppendCertsFromPEM(data)
|
|
||||||
+ return roots, nil
|
|
||||||
+ }
|
|
||||||
+ }
|
|
||||||
+
|
|
||||||
cmd := exec.Command("/usr/bin/security", "find-certificate", "-a", "-p", "/System/Library/Keychains/SystemRootCertificates.keychain")
|
|
||||||
data, err := cmd.Output()
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
- var (
|
|
||||||
- mu sync.Mutex
|
|
||||||
- roots = NewCertPool()
|
|
||||||
- )
|
|
||||||
add := func(cert *Certificate) {
|
|
||||||
mu.Lock()
|
|
||||||
defer mu.Unlock()
|
|
||||||
diff --git a/src/crypto/x509/root_unix.go b/src/crypto/x509/root_unix.go
|
|
||||||
index 7bcb3d6..3986e1a 100644
|
|
||||||
--- a/src/crypto/x509/root_unix.go
|
|
||||||
+++ b/src/crypto/x509/root_unix.go
|
|
||||||
@@ -24,6 +24,14 @@ func (c *Certificate) systemVerify(opts *VerifyOptions) (chains [][]*Certificate
|
|
||||||
|
|
||||||
func loadSystemRoots() (*CertPool, error) {
|
|
||||||
roots := NewCertPool()
|
|
||||||
+ if file := os.Getenv("NIX_SSL_CERT_FILE"); file != "" {
|
|
||||||
+ data, err := ioutil.ReadFile(file)
|
|
||||||
+ if err == nil {
|
|
||||||
+ roots.AppendCertsFromPEM(data)
|
|
||||||
+ return roots, nil
|
|
||||||
+ }
|
|
||||||
+ }
|
|
||||||
+
|
|
||||||
var firstErr error
|
|
||||||
for _, file := range certFiles {
|
|
||||||
data, err := ioutil.ReadFile(file)
|
|
@ -5348,11 +5348,9 @@ with pkgs;
|
|||||||
inherit (darwin.apple_sdk.frameworks) Security Foundation;
|
inherit (darwin.apple_sdk.frameworks) Security Foundation;
|
||||||
};
|
};
|
||||||
|
|
||||||
go_1_7 = callPackage ../development/compilers/go/1.7.nix ({
|
go_1_7 = callPackage ../development/compilers/go/1.7.nix {
|
||||||
inherit (darwin.apple_sdk.frameworks) Security Foundation;
|
inherit (darwin.apple_sdk.frameworks) Security Foundation;
|
||||||
} // stdenv.lib.optionalAttrs stdenv.isDarwin {
|
};
|
||||||
stdenv = stdenvAdapters.overrideCC pkgs.stdenv pkgs.clang_38;
|
|
||||||
});
|
|
||||||
|
|
||||||
go_1_8 = callPackage ../development/compilers/go/1.8.nix ({
|
go_1_8 = callPackage ../development/compilers/go/1.8.nix ({
|
||||||
inherit (darwin.apple_sdk.frameworks) Security Foundation;
|
inherit (darwin.apple_sdk.frameworks) Security Foundation;
|
||||||
|
Loading…
Reference in New Issue
Block a user