From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mp12.migadu.com ([2001:41d0:2:4a6f::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by ms9.migadu.com with LMTPS id sDMgGhqvjGRplQAASxT56A (envelope-from ) for ; Fri, 16 Jun 2023 20:51:06 +0200 Received: from aspmx1.migadu.com ([2001:41d0:2:4a6f::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by mp12.migadu.com with LMTPS id 8JbrGRqvjGS03wAAauVa8A (envelope-from ) for ; Fri, 16 Jun 2023 20:51:06 +0200 Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by aspmx1.migadu.com (Postfix) with ESMTPS id 0F44812D6C for ; Fri, 16 Jun 2023 20:51:06 +0200 (CEST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1qAEXI-0004lP-LE; Fri, 16 Jun 2023 14:51:04 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1qAEXG-0004l0-Bm for guix-patches@gnu.org; Fri, 16 Jun 2023 14:51:02 -0400 Received: from debbugs.gnu.org ([209.51.188.43]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1qAEXG-00039Q-3I for guix-patches@gnu.org; Fri, 16 Jun 2023 14:51:02 -0400 Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84_2) (envelope-from ) id 1qAEXF-0001TR-SJ for guix-patches@gnu.org; Fri, 16 Jun 2023 14:51:01 -0400 X-Loop: help-debbugs@gnu.org Subject: [bug#64068] [PATCH] gnu: Add u-boot-lichee-rv-dock. Resent-From: Vagrant Cascadian Original-Sender: "Debbugs-submit" Resent-CC: guix-patches@gnu.org Resent-Date: Fri, 16 Jun 2023 18:51:01 +0000 Resent-Message-ID: Resent-Sender: help-debbugs@gnu.org X-GNU-PR-Message: followup 64068 X-GNU-PR-Package: guix-patches X-GNU-PR-Keywords: patch To: Z572 <873216071@qq.com>, 64068@debbugs.gnu.org Cc: Ludovic =?UTF-8?Q?Court=C3=A8s?= , Efraim Flashner Received: via spool by 64068-submit@debbugs.gnu.org id=B64068.16869414035578 (code B ref 64068); Fri, 16 Jun 2023 18:51:01 +0000 Received: (at 64068) by debbugs.gnu.org; 16 Jun 2023 18:50:03 +0000 Received: from localhost ([127.0.0.1]:50365 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1qAEWJ-0001Ru-5p for submit@debbugs.gnu.org; Fri, 16 Jun 2023 14:50:03 -0400 Received: from cascadia.aikidev.net ([173.255.214.101]:45588) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1qAEWG-0001RA-Vf for 64068@debbugs.gnu.org; Fri, 16 Jun 2023 14:50:02 -0400 Received: from localhost (unknown [IPv6:2600:3c01:e000:21:7:77:0:50]) (Authenticated sender: vagrant@cascadia.debian.net) by cascadia.aikidev.net (Postfix) with ESMTPSA id B9C9D1AC0C; Fri, 16 Jun 2023 11:49:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=debian.org; s=1.vagrant.user; t=1686941391; bh=CAvTobHphm+s7HwfDkHHxkgs7onanQbnssXdfHQ907Q=; h=From:To:Cc:Subject:In-Reply-To:References:Date:From; b=bQMBKWK5I+dXIJ9Eysakv7YAtIZAh16oc0JbjiumwgWSL4aknWZB0zS6rFJXv7uKs nzs4RGHn0iuT9kvbHwg2DnnOTjIKapI3OdAEbtRoXbNAKqCbWIt8d49rjbAEsEFbq+ TjId9f+fAezfjboe2Sc0eRFysCefyunaI7lv9NbEfboWc7+3iydmBL0g2KFrQyiu2Z OZJ9G3RU+KzuREttYJENzQWNYLFGgL7/gUfyxEPXXRUbi/vFEkavg9RG+NuRrIMuJZ 2a7Zl+LxTuCOcUQcPwXh0jjS8MdHngb8IVxXN+8Ade86dMsUvWNKR5OYA3IC6lQKP7 ySOO8DuSASxeg== From: Vagrant Cascadian In-Reply-To: References: Date: Fri, 16 Jun 2023 11:49:45 -0700 Message-ID: <87a5wzb5ti.fsf@wireframe> MIME-Version: 1.0 Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha512; protocol="application/pgp-signature" X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list X-BeenThere: guix-patches@gnu.org List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: guix-patches-bounces+larch=yhetil.org@gnu.org Sender: guix-patches-bounces+larch=yhetil.org@gnu.org X-Migadu-Country: US X-Migadu-Flow: FLOW_IN ARC-Seal: i=1; s=key1; d=yhetil.org; t=1686941466; a=rsa-sha256; cv=none; b=gFc8ZA2kb31hAFc+J32u1F8u16vQlglya98Kwk27jr9UukD6VsXisMgYGEYIzd/QNG9E4b kCoCUo2tKNkMz8mOsmhhnitx+boZYp1kZpf1oTZ+kI4N6Sapg/fq0UV+A1Xt1bdH4b2XtA O2Nfin30EVBvvynbjST1d4ebSqA1YCEMgY4nAq9qRpuwvtPR5TKBXja2Annqlq6d5FYnz7 g0EifRPKnyDyGi9qkadY/SFxesdCAISHsPrlHIINXHAeEpSwd9oCasZmAKo2xN045TtdIQ ecaHl4KlKgMet0XOm6Oy6vKkLosOaOC0icURQ6m2LiyGBrxvp8JeSErEunk5RA== ARC-Authentication-Results: i=1; aspmx1.migadu.com; dkim=fail ("headers rsa verify failed") header.d=debian.org header.s=1.vagrant.user header.b=bQMBKWK5; dmarc=none; spf=pass (aspmx1.migadu.com: domain of "guix-patches-bounces+larch=yhetil.org@gnu.org" designates 209.51.188.17 as permitted sender) smtp.mailfrom="guix-patches-bounces+larch=yhetil.org@gnu.org" ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=yhetil.org; s=key1; t=1686941466; h=from:from:sender:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:resent-cc:resent-from:resent-sender: resent-message-id:in-reply-to:in-reply-to:references:references: list-id:list-help:list-unsubscribe:list-subscribe:list-post: dkim-signature; bh=Ysd5FQYNW+JzyJNH7stGg9GBKoTS+Ouq6fqGg9o1FRo=; b=Puw5tI7ylJMh0Rx8rrRWeGBWQL2gk+7jnWVCCjxZqCM8dnAlzuiVRE73SQ+Nktu3pBI0jf 37dwvk1TJjPOR7K3HhkrqTEaHd1vKJWPF2XYHtyMaXTtYHTVappsqzG4VT8gCK0Vn6GXHx VizPhbcQbdTuS2bQfvVZI5oI/pron2ZNMACxM/75TKah8SThvwXJoCuHCaevL1+8MNUz/e PNMJ4jNdaYngG6d4auOWsUzblk6bvFgfB4LhbVREQ1djhOfQ+TSwnvd++U5pIBGcXKQnXZ kA+B/XHd+04Vaa7gJV4Cp34Ahqqbv8At2RnsgM9sTldjML8+4t5hYViJ9kS9uQ== Authentication-Results: aspmx1.migadu.com; dkim=fail ("headers rsa verify failed") header.d=debian.org header.s=1.vagrant.user header.b=bQMBKWK5; dmarc=none; spf=pass (aspmx1.migadu.com: domain of "guix-patches-bounces+larch=yhetil.org@gnu.org" designates 209.51.188.17 as permitted sender) smtp.mailfrom="guix-patches-bounces+larch=yhetil.org@gnu.org" X-Migadu-Scanner: scn0.migadu.com X-Migadu-Spam-Score: -2.63 X-Spam-Score: -2.63 X-Migadu-Queue-Id: 0F44812D6C X-TUID: Z3eY2hyuzh6l --=-=-= Content-Type: text/plain On 2023-06-14, Z572 wrote: > * gnu/packages/bootloaders.scm (u-boot-lichee-rv-dock): New variable. > * gnu/packages/patches/u-boot-lichee-rv-dock-disable-openssl.patch: New file. > * gnu/local.mk(dist_patch_DATA): register it. Thanks for the patches! This also reminds me that u-boot is falling a little behind (there is 2023.01, 2023.04 and soon 2023.07)... and while I would not want to block adding support for this board, I would be curious if it still works with newer u-boot versions... > +(define-public u-boot-lichee-rv-dock ... > + (search-patches > + "u-boot-lichee-rv-dock-disable-openssl.patch") > + ;;; rebase from %u-boot-allow-disabling-openssl-patch > + (filter (negate (cut string-contains <> "openssl")) > + (origin-patches (package-source base))))) This seems a little tricky and possibly error-prone if another patch with openssl in the name is included at a later time, it could break this package. I almost wonder if it wouldn't be better to merge the functionality of the two patches disabling openssl than applying a board-specific patch? I have not had a chance to test that this package builds; I presume you have tested that it actually boots? live well, vagrant --=-=-= Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iHUEARYKAB0WIQRlgHNhO/zFx+LkXUXcUY/If5cWqgUCZIyuyQAKCRDcUY/If5cW qvW7AP40m1is/1r2ifZ4aWerkeFyRtIwzuNqAkwvxZcm74r8xgD7BH+nzePSx0YG z5+Bm/wQFU6TS1zyihNZpGSwUWgPTwk= =rmm6 -----END PGP SIGNATURE----- --=-=-=--