The tests defined in passthru.tests, if any, passed
found 21.2.0 with grep in /nix/store/gca0sw3z18vsn5y4ghl213jhmrvi8bb6-python3.11-azure-mgmt-storage-21.2.0
found 21.2.0 in filename of file in /nix/store/gca0sw3z18vsn5y4ghl213jhmrvi8bb6-python3.11-azure-mgmt-storage-21.2.0
Rebuild report (if merged into master) (click to expand)
```
4 total rebuild path(s)
4 package rebuild(s)
First fifty rebuilds by attrpath
prowler
python311Packages.azure-mgmt-storage
python312Packages.azure-mgmt-storage
```
Instructions to test this update (click to expand)
---
Either **download from Cachix**:
```
nix-store -r /nix/store/gca0sw3z18vsn5y4ghl213jhmrvi8bb6-python3.11-azure-mgmt-storage-21.2.0 \
--option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \
--option trusted-public-keys '
nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs=
cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=
'
```
(The Cachix cache is only trusted for this store-path realization.)
For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted.
Or, **build yourself**:
```
nix-build -A python311Packages.azure-mgmt-storage https://github.com/r-ryantm/nixpkgs/archive/cafd423de34de5ce2da64226b0c6be2eedffb30f.tar.gz
```
Or:
```
nix build github:r-ryantm/nixpkgs/cafd423de34de5ce2da64226b0c6be2eedffb30f#python311Packages.azure-mgmt-storage
```
After you've downloaded or built it, look at the files and if there are any, run the binaries:
```
ls -la /nix/store/gca0sw3z18vsn5y4ghl213jhmrvi8bb6-python3.11-azure-mgmt-storage-21.2.0
ls -la /nix/store/gca0sw3z18vsn5y4ghl213jhmrvi8bb6-python3.11-azure-mgmt-storage-21.2.0/bin
```
---
Pre-merge build results
We have automatically built all packages that will get rebuilt due to
this change.
This gives evidence on whether the upgrade will break dependent packages.
Note sometimes packages show up as failed to build independent of the
change, simply because they are already broken on the target branch.
Result of nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }' run on x86_64-linux 1
Automatic update generated by nixpkgs-update tools. This update was made based on information from passthru.updateScript.
meta.description for python311Packages.azure-mgmt-storage is: This is the Microsoft Azure Storage Management Client Library
meta.homepage for python311Packages.azure-mgmt-storage is: https://github.com/Azure/azure-sdk-for-python
Updates performed
To inspect upstream changes
Impact
Checks done
passthru.tests
, if any, passedRebuild report (if merged into master) (click to expand)
``` 4 total rebuild path(s) 4 package rebuild(s) First fifty rebuilds by attrpath prowler python311Packages.azure-mgmt-storage python312Packages.azure-mgmt-storage ```Instructions to test this update (click to expand)
--- Either **download from Cachix**: ``` nix-store -r /nix/store/gca0sw3z18vsn5y4ghl213jhmrvi8bb6-python3.11-azure-mgmt-storage-21.2.0 \ --option binary-caches 'https://cache.nixos.org/ https://nix-community.cachix.org/' \ --option trusted-public-keys ' nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs= cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY= ' ``` (The Cachix cache is only trusted for this store-path realization.) For the Cachix download to work, your user must be in the `trusted-users` list or you can use `sudo` since root is effectively trusted. Or, **build yourself**: ``` nix-build -A python311Packages.azure-mgmt-storage https://github.com/r-ryantm/nixpkgs/archive/cafd423de34de5ce2da64226b0c6be2eedffb30f.tar.gz ``` Or: ``` nix build github:r-ryantm/nixpkgs/cafd423de34de5ce2da64226b0c6be2eedffb30f#python311Packages.azure-mgmt-storage ``` After you've downloaded or built it, look at the files and if there are any, run the binaries: ``` ls -la /nix/store/gca0sw3z18vsn5y4ghl213jhmrvi8bb6-python3.11-azure-mgmt-storage-21.2.0 ls -la /nix/store/gca0sw3z18vsn5y4ghl213jhmrvi8bb6-python3.11-azure-mgmt-storage-21.2.0/bin ``` ---Pre-merge build results
We have automatically built all packages that will get rebuilt due to this change.
This gives evidence on whether the upgrade will break dependent packages. Note sometimes packages show up as failed to build independent of the change, simply because they are already broken on the target branch.
Result of
nixpkgs-review --extra-nixpkgs-config '{ allowInsecurePredicate = x: true; }'
run on x86_64-linux 12 packages failed to build:
4 packages built:
Maintainer pings
cc @jonringer @olcai @mwilsoncoding for testing.