From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mp1.migadu.com ([2001:41d0:403:58f0::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by ms1.migadu.com with LMTPS id INnwJGiEGmbEVwAA62LTzQ:P1 (envelope-from ) for ; Sat, 13 Apr 2024 15:11:04 +0200 Received: from aspmx1.migadu.com ([2001:41d0:403:58f0::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by mp1.migadu.com with LMTPS id INnwJGiEGmbEVwAA62LTzQ (envelope-from ) for ; Sat, 13 Apr 2024 15:11:04 +0200 X-Envelope-To: larch@yhetil.org Authentication-Results: aspmx1.migadu.com; dkim=fail ("headers rsa verify failed") header.d=web.de header.s=s29768273 header.b=Jvay1XIm; dmarc=pass (policy=none) header.from=gnu.org; spf=pass (aspmx1.migadu.com: domain of "guix-patches-bounces+larch=yhetil.org@gnu.org" designates 209.51.188.17 as permitted sender) smtp.mailfrom="guix-patches-bounces+larch=yhetil.org@gnu.org" ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=yhetil.org; s=key1; t=1713013864; h=from:from:sender:sender:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:mime-version:mime-version: content-type:content-type:resent-cc:resent-from:resent-sender: resent-message-id:list-id:list-help:list-unsubscribe:list-subscribe: list-post:dkim-signature; bh=LqHiYV9kWEl0T69k7sWoeSoTJp5PFlF1LAGXAmB3f7o=; b=tcyb7cYYDAxd0hk6XaMw6LotjCOl+ANetlnGTQYIcCXIDRe41IVFz1VZDC9IwIdPqPnum8 GVvuMI7h5Vx2+jt3THyCIk3HLMHNCL5KATZeCdXJb3/cV7QKnABixhuWl9rV3Yb//ps0le eYadolqskLDOnjZ8LnH2fytPUw7AKrIGFn7CbRUXI/7Zvw4zfcGR9Zu6+mMnRBcKqO+iYd YZukdaTp8msA+LIUJsALSuOV6LWuaYPM9B9o+wIeVL1QJ7E2xZM5sFvh9PLfBxpF+K0jQc u2pW+J0pJJI6j0TYRFmqjXGwBPzHtMiLAYMqahps3HEUMytm6YkfpoQeFATW+Q== ARC-Authentication-Results: i=1; aspmx1.migadu.com; dkim=fail ("headers rsa verify failed") header.d=web.de header.s=s29768273 header.b=Jvay1XIm; dmarc=pass (policy=none) header.from=gnu.org; spf=pass (aspmx1.migadu.com: domain of "guix-patches-bounces+larch=yhetil.org@gnu.org" designates 209.51.188.17 as permitted sender) smtp.mailfrom="guix-patches-bounces+larch=yhetil.org@gnu.org" ARC-Seal: i=1; s=key1; d=yhetil.org; t=1713013864; a=rsa-sha256; cv=none; b=MTE7gFmY9k9R4IEaji9Es1w3MO4nw51eGkjwfjz3LYOz0tdzOtdZTw26d0Sd0MtFX1DTEf 49RCCIwhO/0OkvXhEHD2d6qLkv5Gt4tJkHoRUp40DV/GZf16U4ZL4aBtQfRpcAmm076dMe SAJQFd+Qif+/VgS9Ishl7lHG/eg6tEFR4To8hO6HPGtC34RQSwyWSUaYu7eUz85ZB+abXb dbYwOgsqGhzgFVwDEhoveEb//sbPQfysHNthx14Pb8xLKL8HwGSg11THcZMbHdfqGIfzXo I0BwfDjMNwGo8yC/+x4R/36ikVEJdH2P52zLPuPRmvspgrrx4upLorwfD550Kg== Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by aspmx1.migadu.com (Postfix) with ESMTPS id 2B96763FDF for ; Sat, 13 Apr 2024 15:11:04 +0200 (CEST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1rvd9k-0001ma-5m; Sat, 13 Apr 2024 09:10:56 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1rvd9g-0001mC-L7 for guix-patches@gnu.org; Sat, 13 Apr 2024 09:10:53 -0400 Received: from debbugs.gnu.org ([2001:470:142:5::43]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1rvd9g-0004h5-Cx for guix-patches@gnu.org; Sat, 13 Apr 2024 09:10:52 -0400 Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84_2) (envelope-from ) id 1rvd9q-000347-JR for guix-patches@gnu.org; Sat, 13 Apr 2024 09:11:02 -0400 X-Loop: help-debbugs@gnu.org Subject: [bug#70366] Update Mercurial to 6.7.2 and python-hg-evolve to 11.1.3 Resent-From: "Dr. Arne Babenhauserheide" Original-Sender: "Debbugs-submit" Resent-CC: guix-patches@gnu.org Resent-Date: Sat, 13 Apr 2024 13:11:02 +0000 Resent-Message-ID: Resent-Sender: help-debbugs@gnu.org X-GNU-PR-Message: report 70366 X-GNU-PR-Package: guix-patches X-GNU-PR-Keywords: To: 70366@debbugs.gnu.org X-Debbugs-Original-To: guix-patches@gnu.org Received: via spool by submit@debbugs.gnu.org id=B.171301386111771 (code B ref -1); Sat, 13 Apr 2024 13:11:02 +0000 Received: (at submit) by debbugs.gnu.org; 13 Apr 2024 13:11:01 +0000 Received: from localhost ([127.0.0.1]:60322 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1rvd9n-00033h-PA for submit@debbugs.gnu.org; Sat, 13 Apr 2024 09:11:00 -0400 Received: from lists.gnu.org ([2001:470:142::17]:48562) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1rvd9j-00031x-ND for submit@debbugs.gnu.org; Sat, 13 Apr 2024 09:10:58 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1rvd9R-0001lV-3D for guix-patches@gnu.org; Sat, 13 Apr 2024 09:10:38 -0400 Received: from mout.web.de ([217.72.192.78]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1rvd9M-0004eR-PO for guix-patches@gnu.org; Sat, 13 Apr 2024 09:10:35 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=web.de; s=s29768273; t=1713013828; x=1713618628; i=arne_bab@web.de; bh=LqHiYV9kWEl0T69k7sWoeSoTJp5PFlF1LAGXAmB3f7o=; h=X-UI-Sender-Class:From:To:Subject:Date; b=Jvay1XImxdCAWgfW5MjRxGwSM0jg5YIDIbCjJjgZ7tAPLOMRujsYLBbVWCl6oSlD Dhjtqk5rSCcF0BQlypxUdeeL1culoJ50F6jx6uBXL8sNprKVxvgKnzv7T9cvEmL72 Vz1UKnq/zkIvDx2qbnDZX/eoua5Necu0hl3c3x+1jl5lnvICNYbm1E5AQV4JX6phM uCi5vZC4L5cZsEHssVlhKUHGJLr4s7TnkmFq+h8+Mb1BBFaPwAaYG2sTJ0GFvpvtM FY1mcubqs64R+h0UuZqCq2dU7RubG6rP4Ki5vT2mD1nl9E8YKuu+l2fgEXYyG/9W4 DENX5/ODVe7l2rBAGw== X-UI-Sender-Class: 814a7b36-bfc1-4dae-8640-3722d8ec6cd6 Received: from fluss ([84.165.16.40]) by smtp.web.de (mrweb106 [213.165.67.124]) with ESMTPSA (Nemesis) id 1MrOdp-1sZxzP0n3v-00oBw4; Sat, 13 Apr 2024 15:10:28 +0200 User-Agent: mu4e 1.12.2; emacs 30.0.50 Date: Sat, 13 Apr 2024 15:10:15 +0200 Message-ID: <87sezp1k94.fsf@web.de> MIME-Version: 1.0 Content-Type: multipart/signed; boundary="==-=-="; micalg=pgp-sha256; protocol="application/pgp-signature" X-Provags-ID: V03:K1:YRPZ5/rDDgApEp1AcL03CyWJ+Y6RQ4VrbMjrgTOxgekQpM/90Gw u7tDNThxrwtddRdFWuCL+QGvpYQ489NpFpYCAtlEI2q8Izhw2bttCHDNqfcuEADUqcQiP02 lZNIEjyborZckh5qCq3mgieTmG3HEFciWLQXroqS1tS+QPth4UKEEghmXNWe4T4uWM1uoin a/yemPmfOyGN5pp86CIFA== UI-OutboundReport: notjunk:1;M01:P0:fUTG7smn/GY=;APK88kffg67BV2GbRBiqeho4b3+ GsCxHh4bgU3HQgfKftHH7dabXGlwYcB5OtfdnwvccpAmWqxpMSAFgpsvYezesSFc1tP764c3F PGHG5V7bqtt5RLV/gT/8NW5mL3vFrytLkt4WglJVCu4g1OljAyLSK6sbOn9Ejq42VygmIQZMw oVoV0MmcHhCv247dYHfm3btXHq7dGZwUJV4ECvoaqb2r68+uR5xN2WNGreyckec3vPFvWKw41 H/Smi/l4MKEPzPkX4uNdPz7C0tnpTKL/JwTjUUcqixk3eNbvCFzRb3Hbq110V5d6gOli6TEMm +CAISQZ4Mxp5o1Mvj8d0eZmTpDcurfFsIcTIfYasp13UNN78fWqcbhoz3991ZfKcPkH+Ksnnf WdB+TAiTLhWTTzDmYK7XsQH2IVSZPl5pY149qqBntH2WRWuc10N81bB7t/nUx/TetLmAmcTbX n6h/ciqV1usnTJ98asUIdQHovfneJ8Uq8D9cDPXrFNS+AU0mAhCLN4cIXF2H0+X/MCa+siwHR +23lIYaXtXEMlYFxuavGPl54RbrPCDjhKiW2xVCNopr9A24J482YXUmWbvMLAkeZn5HIo+Ws6 98AbfNY7VN6SddulDdZG/nkltyjU9MoOcabNlxfZewD47o9aE9t27N3ugua2Czm/2ybkZsGeZ 7YzoqAk5C2OrRogjQQQjFjkQoSGAEX32aok2PZxGnIaB0ImyguRjnqZSnY0hxNmnDSYvem7I1 tY38kYz//hoeSWroCctRR16A+b+HUIX6yg9fLcvam6cKjeXBBzSME7srMlZjgtcowQ6zU8y1f mQ1GWXZTJoA0CD1SGDFHq/cGllilUbUnh1qolB6Pml0iE= Received-SPF: pass client-ip=217.72.192.78; envelope-from=arne_bab@web.de; helo=mout.web.de X-Spam_score_int: -27 X-Spam_score: -2.8 X-Spam_bar: -- X-Spam_report: (-2.8 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list X-BeenThere: guix-patches@gnu.org List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Reply-to: "Dr. Arne Babenhauserheide" X-ACL-Warn: , "Dr. Arne Babenhauserheide via Guix-patches" From: "Dr. Arne Babenhauserheide via Guix-patches" via Errors-To: guix-patches-bounces+larch=yhetil.org@gnu.org Sender: guix-patches-bounces+larch=yhetil.org@gnu.org X-Migadu-Flow: FLOW_IN X-Migadu-Country: US X-Migadu-Spam-Score: -8.08 X-Migadu-Scanner: mx11.migadu.com X-Spam-Score: -8.08 X-Migadu-Queue-Id: 2B96763FDF X-TUID: F5YdOHVZCDW8 --==-=-= Content-Type: multipart/mixed; boundary="=-=-=" --=-=-= Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Hi, the attached patch updates both Mercurial and python-hg-evolve to their respective newest version. Both need to be in compatible versions, so I=E2=80=99m sending both togethe= r. Best wishes, Arne --=-=-= Content-Type: text/x-patch Content-Disposition: inline; filename=0001-gnu-mercurial-and-python-hg-evolve-Update-to-6.7.2-a.patch Content-Transfer-Encoding: quoted-printable From=209a5aea3eaad92caf8800f0dff7240e8ca77e9416 Mon Sep 17 00:00:00 2001 Message-ID: <9a5aea3eaad92caf8800f0dff7240e8ca77e9416.1713013282.git.arne_b= ab@web.de> From: Arne Babenhauserheide Date: Sat, 13 Apr 2024 14:58:08 +0200 Subject: [PATCH] gnu: mercurial and python-hg-evolve: Update to 6.7.2 and 11.1.3 * gnu/packages/version-control.scm (mercurial): Update to 6.7.2. * gnu/packages/version-control.scm (python-hg-evolve): Update to 11.1.3. * gnu/packages/patches/mercurial-hg-extension-path.patch: adapt for mer= curial 6.7.2 * gnu/packages/patches/mercurial-openssl-compat.patch: delete file * gnu/local.mk (dist_patch_DATA): remove mercurial-openssl-compat.patch Change-Id: I1e22d7f38e264576bfa3adef7004fef582a1137e =2D-- gnu/local.mk | 1 - .../patches/mercurial-hg-extension-path.patch | 14 +-- .../patches/mercurial-openssl-compat.patch | 89 ------------------- gnu/packages/version-control.scm | 11 ++- 4 files changed, 8 insertions(+), 107 deletions(-) delete mode 100644 gnu/packages/patches/mercurial-openssl-compat.patch diff --git a/gnu/local.mk b/gnu/local.mk index e08b0d1c75..a9f388d06d 100644 =2D-- a/gnu/local.mk +++ b/gnu/local.mk @@ -1700,7 +1700,6 @@ dist_patch_DATA =3D \ %D%/packages/patches/mecab-variable-param.patch \ %D%/packages/patches/memtest86+-build-reproducibly.patch \ %D%/packages/patches/mercurial-hg-extension-path.patch \ =2D %D%/packages/patches/mercurial-openssl-compat.patch \ %D%/packages/patches/mhash-keygen-test-segfault.patch \ %D%/packages/patches/mia-fix-boost-headers.patch \ %D%/packages/patches/mia-vtk9.patch \ diff --git a/gnu/packages/patches/mercurial-hg-extension-path.patch b/gnu/p= ackages/patches/mercurial-hg-extension-path.patch index d1073dd01c..8b9d185a89 100644 =2D-- a/gnu/packages/patches/mercurial-hg-extension-path.patch +++ b/gnu/packages/patches/mercurial-hg-extension-path.patch @@ -7,15 +7,7 @@ will get this into Mercurial proper. diff --git a/mercurial/extensions.py b/mercurial/extensions.py --- a/mercurial/extensions.py +++ b/mercurial/extensions.py =2D@@ -13,6 +13,7 @@ =2D import imp =2D import inspect =2D import os =2D+import sys =2D=20 =2D from .i18n import ( =2D _, =2D@@ -108,6 +109,11 @@ +@@ -103,6 +103,11 @@ =20=20 def _importh(name): """import and return the module""" @@ -24,6 +16,6 @@ diff --git a/mercurial/extensions.py b/mercurial/extensio= ns.py + if extension_path is not None: + for path in extension_path: + sys.path.append(path) =2D mod =3D __import__(pycompat.sysstr(name)) =2D components =3D name.split(b'.') + mod =3D __import__(name) + components =3D name.split('.') for comp in components[1:]: diff --git a/gnu/packages/patches/mercurial-openssl-compat.patch b/gnu/pack= ages/patches/mercurial-openssl-compat.patch deleted file mode 100644 index 139356f285..0000000000 =2D-- a/gnu/packages/patches/mercurial-openssl-compat.patch +++ /dev/null @@ -1,89 +0,0 @@ =2DTweak cipher selection to make TLS < 1.2 work with OpenSSL 3. =2D =2DTaken from Debian: =2D =2D https://salsa.debian.org/python-team/packages/mercurial/-/blob/debian/= master/debian/patches/openssl_3_cipher_tlsv1.patch =2D =2D--- a/mercurial/sslutil.py =2D+++ b/mercurial/sslutil.py =2D@@ -117,17 +117,17 @@ def _hostsettings(ui, hostname): =2D ciphers =3D ui.config(b'hostsecurity', b'%s:ciphers' % bhostname, c= iphers) =2D=20 =2D # If --insecure is used, we allow the use of TLS 1.0 despite config= options. =2D # We always print a "connection security to %s is disabled..." mess= age when =2D # --insecure is used. So no need to print anything more here. =2D if ui.insecureconnections: =2D minimumprotocol =3D b'tls1.0' =2D if not ciphers: =2D- ciphers =3D b'DEFAULT' =2D+ ciphers =3D b'DEFAULT:@SECLEVEL=3D0' =2D=20 =2D s[b'minimumprotocol'] =3D minimumprotocol =2D s[b'ciphers'] =3D ciphers =2D=20 =2D # Look for fingerprints in [hostsecurity] section. Value is a list =2D # of : strings. =2D fingerprints =3D ui.configlist( =2D b'hostsecurity', b'%s:fingerprints' % bhostname =2D@@ -621,17 +621,17 @@ def wrapserversocket( =2D=20 =2D # Improve forward secrecy. =2D sslcontext.options |=3D getattr(ssl, 'OP_SINGLE_DH_USE', 0) =2D sslcontext.options |=3D getattr(ssl, 'OP_SINGLE_ECDH_USE', 0) =2D=20 =2D # In tests, allow insecure ciphers =2D # Otherwise, use the list of more secure ciphers if found in the ss= l module. =2D if exactprotocol: =2D- sslcontext.set_ciphers('DEFAULT') =2D+ sslcontext.set_ciphers('DEFAULT:@SECLEVEL=3D0') =2D elif util.safehasattr(ssl, b'_RESTRICTED_SERVER_CIPHERS'): =2D sslcontext.options |=3D getattr(ssl, 'OP_CIPHER_SERVER_PREFEREN= CE', 0) =2D # pytype: disable=3Dmodule-attr =2D sslcontext.set_ciphers(ssl._RESTRICTED_SERVER_CIPHERS) =2D # pytype: enable=3Dmodule-attr =2D=20 =2D if requireclientcert: =2D sslcontext.verify_mode =3D ssl.CERT_REQUIRED =2D--- a/tests/test-https.t =2D+++ b/tests/test-https.t =2D@@ -356,19 +356,19 @@ Start servers running supported TLS vers =2D $ cat ../hg1.pid >> $DAEMON_PIDS =2D $ hg serve -p $HGPORT2 -d --pid-file=3D../hg2.pid --certificate=3D$PR= IV \ =2D > --config devel.serverexactprotocol=3Dtls1.2 =2D $ cat ../hg2.pid >> $DAEMON_PIDS =2D $ cd .. =2D=20 =2D Clients talking same TLS versions work =2D=20 =2D- $ P=3D"$CERTSDIR" hg --config hostsecurity.minimumprotocol=3Dtls1.0 -= -config hostsecurity.ciphers=3DDEFAULT id https://localhost:$HGPORT/ =2D+ $ P=3D"$CERTSDIR" hg --config hostsecurity.minimumprotocol=3Dtls1.0 -= -config hostsecurity.ciphers=3DDEFAULT:@SECLEVEL=3D0 id https://localhost:$= HGPORT/ =2D 5fed3813f7f5 =2D- $ P=3D"$CERTSDIR" hg --config hostsecurity.minimumprotocol=3Dtls1.1 -= -config hostsecurity.ciphers=3DDEFAULT id https://localhost:$HGPORT1/ =2D+ $ P=3D"$CERTSDIR" hg --config hostsecurity.minimumprotocol=3Dtls1.1 -= -config hostsecurity.ciphers=3DDEFAULT:@SECLEVEL=3D0 id https://localhost:$= HGPORT1/ =2D 5fed3813f7f5 =2D $ P=3D"$CERTSDIR" hg --config hostsecurity.minimumprotocol=3Dtls1.2 i= d https://localhost:$HGPORT2/ =2D 5fed3813f7f5 =2D=20 =2D Clients requiring newer TLS version than what server supports fail =2D=20 =2D $ P=3D"$CERTSDIR" hg id https://localhost:$HGPORT/ =2D (could not negotiate a common security protocol (tls1.1+) with localh= ost; the likely cause is Mercurial is configured to be more secure than the= server can support) =2D@@ -400,17 +400,17 @@ Clients requiring newer TLS version than =2D=20 =2D $ hg --config hostsecurity.minimumprotocol=3Dtls1.2 id --insecure htt= ps://localhost:$HGPORT1/ =2D warning: connection security to localhost is disabled per current set= tings; communication is susceptible to eavesdropping and tampering =2D 5fed3813f7f5 =2D=20 =2D The per-host config option overrides the default =2D=20 =2D $ P=3D"$CERTSDIR" hg id https://localhost:$HGPORT/ \ =2D- > --config hostsecurity.ciphers=3DDEFAULT \ =2D+ > --config hostsecurity.ciphers=3DDEFAULT:@SECLEVEL=3D0 \ =2D > --config hostsecurity.minimumprotocol=3Dtls1.2 \ =2D > --config hostsecurity.localhost:minimumprotocol=3Dtls1.0 =2D 5fed3813f7f5 =2D=20 =2D The per-host config option by itself works =2D=20 =2D $ P=3D"$CERTSDIR" hg id https://localhost:$HGPORT/ \ =2D > --config hostsecurity.localhost:minimumprotocol=3Dtls1.2 diff --git a/gnu/packages/version-control.scm b/gnu/packages/version-contro= l.scm index 19f128d45f..d6fdb3fcec 100644 =2D-- a/gnu/packages/version-control.scm +++ b/gnu/packages/version-control.scm @@ -2084,16 +2084,15 @@ (define-public python-pre-commit (define-public mercurial (package (name "mercurial") =2D (version "6.2.2") + (version "6.7.2") (source (origin (method url-fetch) (uri (string-append "https://www.mercurial-scm.org/" "release/mercurial-" version ".tar.gz")) =2D (patches (search-patches "mercurial-hg-extension-path.patch" =2D "mercurial-openssl-compat.patch")) + (patches (search-patches "mercurial-hg-extension-path.patch")) (sha256 (base32 =2D "1pr00hdk3l9095fhq6302fgj0wmbqhqs93y4r457ba4pyjjrvyly")) + "01nqvp3cvidlz9z5vm05vpq81r6x10jwwfcaz0gw9anz0l60f8hw")) (modules '((guix build utils))) (snippet '(substitute* (find-files "tests" "\\.(t|sh)$") @@ -2195,7 +2194,7 @@ (define-public mercurial (define-public python-hg-evolve (package (name "python-hg-evolve") =2D (version "10.3.2") + (version "11.1.3") (source (origin (method hg-fetch) @@ -2205,7 +2204,7 @@ (define-public python-hg-evolve (file-name (hg-file-name name version)) (sha256 (base32 =2D "0qgk39s5pwxbshfa6x1f1ccxahja3fs265dddxy6q99spy3b3x5h")))) + "09rq3hgbb6qjws0kymnh8lbglsc5yjby3b2bc0savs2agf88j83z")))) (build-system python-build-system) (arguments ;; Tests need mercurial source code. base-commit: 15a523ea213065c275e4852673cbb27c72c0ad87 prerequisite-patch-id: 088a72da8c11e5d1c7087b4a5e8bb9c4a3b9b2af prerequisite-patch-id: a092dba2c994aba4c74f1484621cebe53f548492 prerequisite-patch-id: 09ee3fdfcc708aeec9e6a7a54e2993e857e19aca prerequisite-patch-id: 7957383d6685c848a7cbfa78e930adeaf528a2e1 =2D-=20 2.41.0 --=-=-=-- --==-=-= Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQJEBAEBCAAuFiEE801qEjXQSQPNItXAE++NRSQDw+sFAmYahDcQHGFybmVfYmFi QHdlYi5kZQAKCRAT741FJAPD6/8kEACvDXb5Qs+kcn96YBf4dBfCTj0MeweOfqVo vRObSrhmJ1P/fZYhCY8t9r8Oknxwa5yAJQTiTTPWmhPPcW8tQmI2HsdRfnpE7HDT X9+dSd8hrppO5/8nCOJWk+ggm1oOJkrChxwcH5j/jgJ2Tb6Jq1pKj2QK6ZHXQPEH 4t5+3/M7r2GkfEW4o4TxRcZaytKj7ivE+WYY/JOYx1xm1YEgkquJL3v+dMwSlEUN 33SEFaRxJmWA+FYMMPujgqQoAK7nJlf7b06RRfUj+su4EGbQp6Au25GRL+HoP8fj QNoJXwnhvs8XmB0IFwqm0EsyUIEeQJSOMuPFCJNTIewJ7JQ7cYKMsht1uUvQOGMx rdUwb7fHmlRitsbCSRKy64FVahw6GgfpAudg6f9b1KUlEy3v59/eiBrr7+K6YElp R1bizPjIolbxP4CkyjYbHo9L+yJrEYtUZUt6CnPpwND3lmrXSa5miSuB7Lr6oTRi evqfBFuJEnHpfgvh/g4puhXAmcibaDicj2FtIkQfPCgyL95Kstk4F3+LvG3jpvKQ OwZKJUf7sHnpq+sfIRZc3/v4QDDtbRtps8hQiddzllLCXMtrXZmTNtFR0T/LFop5 TKSt2ifGciMh/eOfnHmDmfOO4acHvcdOyVDP8HwbMkxmc5RLsq6e9LETU+N41cbx XahDzb9vY4jEBAEBCAAuFiEE3Si95tmHXKvOSosd3M8NswvBBUgFAmYahEMQHGFy bmVfYmFiQHdlYi5kZQAKCRDczw2zC8EFSMFvA/9Oh5T7c3rQ1p3PAYd5aEqIELdZ CbJ2v60L1vt24Rll0FbNeoqG9KVCorY7mCewrGuFkkJ18q2R/au8EgZy/s+K57tq I4eao3A0BpoytBIVII3zmSGKQToQt2WK7TAxgejiYoCMQVM3gMhB/FMYkFY9gGZ8 vCzmRtMmxHkcY4lfow== =6Vz1 -----END PGP SIGNATURE----- --==-=-=--