forked from mirrors/nixpkgs
go: Fix the build in non-root sandboxes
Workaround for <https://github.com/golang/go/issues/42525> (Also related to <https://github.com/NixOS/nix/issues/3245>)
This commit is contained in:
parent
30ea86e22d
commit
af3cd7c1f8
42
pkgs/development/compilers/go/skip-chown-tests-1.16.patch
Normal file
42
pkgs/development/compilers/go/skip-chown-tests-1.16.patch
Normal file
|
@ -0,0 +1,42 @@
|
|||
From 9a6718a6355d89b73011fbd1eb1bba8dcfa021e6 Mon Sep 17 00:00:00 2001
|
||||
From: regnat <rg@regnat.ovh>
|
||||
Date: Wed, 3 Nov 2021 10:17:28 +0100
|
||||
Subject: [PATCH] Disable the chown tests
|
||||
|
||||
See https://github.com/golang/go/issues/42525 and
|
||||
https://github.com/NixOS/nix/issues/3245
|
||||
---
|
||||
os/os_unix_test.go | 3 +++
|
||||
1 file changed, 3 insertions(+)
|
||||
|
||||
diff --git a/os/os_unix_test.go b/os/os_unix_test.go
|
||||
index 51693fd..0936542 100644
|
||||
--- a/src/os/os_unix_test.go
|
||||
+++ b/src/os/os_unix_test.go
|
||||
@@ -40,6 +40,7 @@ func checkUidGid(t *testing.T, path string, uid, gid int) {
|
||||
}
|
||||
|
||||
func TestChown(t *testing.T) {
|
||||
+ t.Skipf("https://github.com/golang/go/issues/42525")
|
||||
// Use TempDir() to make sure we're on a local file system,
|
||||
// so that the group ids returned by Getgroups will be allowed
|
||||
// on the file. On NFS, the Getgroups groups are
|
||||
@@ -83,6 +84,7 @@ func TestChown(t *testing.T) {
|
||||
}
|
||||
|
||||
func TestFileChown(t *testing.T) {
|
||||
+ t.Skipf("https://github.com/golang/go/issues/42525")
|
||||
// Use TempDir() to make sure we're on a local file system,
|
||||
// so that the group ids returned by Getgroups will be allowed
|
||||
// on the file. On NFS, the Getgroups groups are
|
||||
@@ -126,6 +128,7 @@ func TestFileChown(t *testing.T) {
|
||||
}
|
||||
|
||||
func TestLchown(t *testing.T) {
|
||||
+ t.Skipf("https://github.com/golang/go/issues/42525")
|
||||
// Use TempDir() to make sure we're on a local file system,
|
||||
// so that the group ids returned by Getgroups will be allowed
|
||||
// on the file. On NFS, the Getgroups groups are
|
||||
--
|
||||
2.31.1
|
||||
|
Loading…
Reference in a new issue