Merge #171497: staging-next 2022-05-04

+597 -300
+3
nixos/modules/services/desktops/pipewire/daemon/pipewire-pulse.conf.json
··· 62 62 "application.process.binary": "teams" 63 63 }, 64 64 { 65 + "application.process.binary": "teams-insiders" 66 + }, 67 + { 65 68 "application.process.binary": "skypeforlinux" 66 69 } 67 70 ],
+22
pkgs/applications/audio/cdparanoia/configure.patch
··· 1 + diff --git a/configure.in b/configure.ac 2 + similarity index 90% 3 + rename from configure.in 4 + rename to configure.ac 5 + index 3ad98ca11da..8fad378faf4 100644 6 + --- a/configure.in 7 + +++ b/configure.ac 8 + @@ -1,13 +1,8 @@ 9 + AC_INIT(interface/interface.c) 10 + 11 + -cp $srcdir/configure.guess $srcdir/config.guess 12 + -cp $srcdir/configure.sub $srcdir/config.sub 13 + - 14 + AC_CANONICAL_HOST 15 + 16 + -if test -z "$CC"; then 17 + - AC_PROG_CC 18 + -fi 19 + +AC_PROG_CC 20 + AC_PROG_RANLIB 21 + AC_CHECK_PROG(AR,ar,ar) 22 + AC_CHECK_PROG(INSTALL,install,install)
+21 -12
pkgs/applications/audio/cdparanoia/default.nix
··· 1 - { lib, stdenv, fetchurl, gnu-config, IOKit, Carbon }: 1 + { lib, stdenv, fetchurl, fetchpatch 2 + , updateAutotoolsGnuConfigScriptsHook, autoreconfHook 3 + , IOKit, Carbon 4 + }: 2 5 3 6 stdenv.mkDerivation rec { 4 7 pname = "cdparanoia-III"; ··· 10 13 }; 11 14 12 15 patches = lib.optionals stdenv.isDarwin [ 13 - (fetchurl { 16 + (fetchpatch { 14 17 url = "https://trac.macports.org/export/70964/trunk/dports/audio/cdparanoia/files/osx_interface.patch"; 15 - sha256 = "1n86kzm2ssl8fdf5wlhp6ncb2bf6b9xlb5vg0mhc85r69prqzjiy"; 18 + sha256 = "0hq3lvfr0h1m3p0r33jij0s1aspiqlpy533rwv19zrfllb39qvr8"; 19 + # Our configure patch will subsume it, but we want our configure 20 + # patch to be used on all platforms so we cannot just start where 21 + # this leaves off. 22 + excludes = [ "configure.in" ]; 16 23 }) 17 24 (fetchurl { 18 25 url = "https://trac.macports.org/export/70964/trunk/dports/audio/cdparanoia/files/patch-paranoia_paranoia.c.10.4.diff"; 19 26 sha256 = "17l2qhn8sh4jy6ryy5si6ll6dndcm0r537rlmk4a6a8vkn852vad"; 20 27 }) 21 - ] ++ lib.optional stdenv.hostPlatform.isMusl ./utils.patch 22 - ++ [./fix_private_keyword.patch]; 28 + ] ++ [ 29 + # Has to come after darwin patches 30 + ./fix_private_keyword.patch 31 + # Order does not matter 32 + ./configure.patch 33 + ] ++ lib.optional stdenv.hostPlatform.isMusl ./utils.patch; 34 + 35 + nativeBuildInputs = [ 36 + updateAutotoolsGnuConfigScriptsHook 37 + autoreconfHook 38 + ]; 23 39 24 40 propagatedBuildInputs = lib.optionals stdenv.isDarwin [ 25 41 Carbon ··· 27 43 ]; 28 44 29 45 hardeningDisable = [ "format" ]; 30 - 31 - preConfigure = '' 32 - unset CC 33 - '' + lib.optionalString (!stdenv.hostPlatform.isx86) '' 34 - cp ${gnu-config}/config.sub configure.sub 35 - cp ${gnu-config}/config.guess configure.guess 36 - ''; 37 46 38 47 # Build system reuses the same object file names for shared and static 39 48 # library. Occasionally fails in the middle:
+2 -2
pkgs/applications/audio/fluidsynth/default.nix
··· 16 16 17 17 nativeBuildInputs = [ buildPackages.stdenv.cc pkg-config cmake ]; 18 18 19 - buildInputs = [ glib libsndfile libpulseaudio libjack2 ] 20 - ++ lib.optionals stdenv.isLinux [ alsa-lib ] 19 + buildInputs = [ glib libsndfile libjack2 ] 20 + ++ lib.optionals stdenv.isLinux [ alsa-lib libpulseaudio ] 21 21 ++ lib.optionals stdenv.isDarwin [ AudioUnit CoreAudio CoreMIDI CoreServices ]; 22 22 23 23 cmakeFlags = [ "-Denable-framework=off" ];
+2 -2
pkgs/applications/editors/vim/common.nix
··· 1 1 { lib, fetchFromGitHub }: 2 2 rec { 3 - version = "8.2.4609"; 3 + version = "8.2.4816"; 4 4 5 5 src = fetchFromGitHub { 6 6 owner = "vim"; 7 7 repo = "vim"; 8 8 rev = "v${version}"; 9 - sha256 = "sha256-IiWZJ4zT+VbcxwKChl847pS9jU9AlxZ/yQUIL8I2MhQ="; 9 + sha256 = "1lgqr3ki50hwkz4vhdyaryirrs99qq4kgkhmpx7ygvn6aj2wapg5"; 10 10 }; 11 11 12 12 enableParallelBuilding = true;
+2 -4
pkgs/applications/editors/vim/configurable.nix
··· 3 3 , libX11, libXext, libSM, libXpm, libXt, libXaw, libXau, libXmu 4 4 , libICE 5 5 , vimPlugins 6 - , makeWrapper, makeBinaryWrapper 6 + , makeWrapper 7 7 , wrapGAppsHook 8 8 , runtimeShell 9 9 ··· 133 133 ++ lib.optional wrapPythonDrv makeWrapper 134 134 ++ lib.optional nlsSupport gettext 135 135 ++ lib.optional perlSupport perl 136 - # Make the inner wrapper binary to avoid double wrapping issues with wrapPythonDrv 137 - # (https://github.com/NixOS/nixpkgs/pull/164163) 138 - ++ lib.optional (guiSupport == "gtk3") (wrapGAppsHook.override { makeWrapper = makeBinaryWrapper; }) 136 + ++ lib.optional (guiSupport == "gtk3") wrapGAppsHook 139 137 ; 140 138 141 139 buildInputs = [
+6 -5
pkgs/applications/graphics/sane/backends/default.nix
··· 40 40 buildInputs = [ 41 41 avahi 42 42 libgphoto2 43 - libieee1284 44 43 libjpeg 45 44 libpng 46 45 libtiff 47 46 libusb1 48 - libv4l 49 - net-snmp 50 47 curl 51 - systemd 52 48 libxml2 53 49 poppler 54 50 gawk 51 + ] ++ lib.optionals stdenv.isLinux [ 52 + libieee1284 53 + libv4l 54 + net-snmp 55 + systemd 55 56 ]; 56 57 57 58 enableParallelBuilding = true; ··· 113 114 ''; 114 115 homepage = "http://www.sane-project.org/"; 115 116 license = licenses.gpl2Plus; 116 - platforms = platforms.linux; 117 + platforms = platforms.linux ++ platforms.darwin; 117 118 }; 118 119 }
+3 -15
pkgs/applications/misc/archivy/default.nix
··· 49 49 hash = "sha256-o5dVJDbdKgo6hMMU9mKzoouSgVWl7xSAp+Aq61VcfeU="; 50 50 }; 51 51 52 - # Relax some dependencies 53 - postPatch = '' 54 - substituteInPlace requirements.txt \ 55 - --replace 'WTForms ==' 'WTForms >=' \ 56 - --replace 'attrs == 20.2.0' 'attrs' \ 57 - --replace 'elasticsearch ==' 'elasticsearch >=' \ 58 - --replace 'python_dotenv ==' 'python_dotenv >=' \ 59 - --replace 'python_frontmatter == 0.5.0' 'python_frontmatter' \ 60 - --replace 'requests ==' 'requests >=' \ 61 - --replace 'validators ==' 'validators >=' \ 62 - --replace 'flask-login == ' 'flask-login >= ' \ 63 - --replace 'tinydb ==' 'tinydb >=' \ 64 - --replace 'Flask_WTF == 0.14.3' 'Flask_WTF' \ 65 - --replace 'Flask ==' 'Flask >=' 66 - ''; 52 + nativeBuildInputs = [ pythonRelaxDepsHook ]; 53 + 54 + pythonRelaxDeps = true; 67 55 68 56 propagatedBuildInputs = [ 69 57 appdirs
+34 -33
pkgs/applications/networking/browsers/firefox/wrapper.nix
··· 1 1 { stdenv, lib, makeDesktopItem, makeWrapper, lndir, config 2 - , replace, fetchurl, zip, unzip, jq, xdg-utils, writeText 2 + , fetchurl, zip, unzip, jq, xdg-utils, writeText 3 3 4 4 ## various stuff that can be plugged in 5 5 , ffmpeg, xorg, alsa-lib, libpulseaudio, libcanberra-gtk3, libglvnd, libnotify, opensc ··· 176 176 startupWMClass = wmClass; 177 177 }; 178 178 179 - nativeBuildInputs = [ makeWrapper lndir replace jq ]; 179 + nativeBuildInputs = [ makeWrapper lndir jq ]; 180 180 buildInputs = [ browser.gtk3 ]; 181 181 182 182 ··· 206 206 done 207 207 208 208 # fix links and absolute references 209 - cd "${browser}" 210 209 211 210 find . -type l -print0 | while read -d $'\0' l; do 212 - target="$(readlink "$l" | replace-literal -es -- "${browser}" "$out")" 211 + target="$(readlink "$l")" 212 + target=''${target/#"${browser}"/"$out"} 213 213 ln -sfT "$target" "$out/$l" 214 214 done 215 215 216 - # This will not patch binaries, only "text" files. 217 - # Its there for the wrapper mostly. 218 - cd "$out" 219 - replace-literal -esfR -- "${browser}" "$out" 220 - 221 216 # create the wrapper 222 217 223 218 executablePrefix="$out/bin" 224 219 executablePath="$executablePrefix/${applicationName}" 220 + oldWrapperArgs=() 225 221 226 - if [ ! -x "$executablePath" ] 227 - then 228 - echo "cannot find executable file \`${browser}/bin/${applicationName}'" 229 - exit 1 230 - fi 231 - 232 - if [ ! -L "$executablePath" ] 233 - then 234 - # Careful here, the file at executablePath may already be 235 - # a wrapper. That is why we postfix it with -old instead 236 - # of -wrapped. 237 - oldExe="$executablePrefix"/".${applicationName}"-old 222 + if [[ -L $executablePath ]]; then 223 + # Symbolic link: wrap the link's target. 224 + oldExe="$(readlink -v --canonicalize-existing "$executablePath")" 225 + rm "$executablePath" 226 + elif wrapperCmd=$(strings -dw "$executablePath" | sed -n '/^makeCWrapper/,/^$/ p'); [[ $wrapperCmd ]]; then 227 + # If the executable is a binary wrapper, we need to update its target to 228 + # point to $out, but we can't just edit the binary in-place because of length 229 + # issues. So we extract the command used to create the wrapper and add the 230 + # arguments to our wrapper. 231 + parseMakeCWrapperCall() { 232 + shift # makeCWrapper 233 + oldExe=$1; shift 234 + for arg do case $arg in 235 + --inherit-argv0) oldWrapperArgs+=(--argv0 '$0');; # makeWrapper doesn't understand --inherit-argv0 236 + *) oldWrapperArgs+=("$arg");; 237 + esac done 238 + } 239 + eval "parseMakeCWrapperCall ''${wrapperCmd//"${browser}"/"$out"}" 240 + rm "$executablePath" 241 + else 242 + if read -rn2 shebang < "$executablePath" && [[ $shebang == '#!' ]]; then 243 + # Shell wrapper: patch in place to point to $out. 244 + sed -i "s@${browser}@$out@g" "$executablePath" 245 + fi 246 + # Suffix the executable with -old, because -wrapped might already be used by the old wrapper. 247 + oldExe="$executablePrefix/.${applicationName}"-old 238 248 mv "$executablePath" "$oldExe" 239 - else 240 - oldExe="$(readlink -v --canonicalize-existing "$executablePath")" 241 - fi 242 - 243 - if [ ! -x "${browser}/bin/${applicationName}" ] 244 - then 245 - echo "cannot find executable file \`${browser}/bin/${applicationName}'" 246 - exit 1 247 249 fi 248 250 249 251 makeWrapper "$oldExe" \ 250 - "$out/bin/${applicationName}${nameSuffix}" \ 252 + "''${executablePath}${nameSuffix}" \ 251 253 --prefix LD_LIBRARY_PATH ':' "$libs" \ 252 254 --suffix-each GTK_PATH ':' "$gtk_modules" \ 253 255 --prefix PATH ':' "${xdg-utils}/bin" \ ··· 258 260 --set MOZ_ALLOW_DOWNGRADE 1 \ 259 261 --prefix XDG_DATA_DIRS : "$GSETTINGS_SCHEMAS_PATH" \ 260 262 --suffix XDG_DATA_DIRS : '${gnome.adwaita-icon-theme}/share' \ 261 - ${lib.optionalString forceWayland '' 262 - --set MOZ_ENABLE_WAYLAND "1" \ 263 - ''} 263 + ${lib.optionalString forceWayland "--set MOZ_ENABLE_WAYLAND 1"} \ 264 + "''${oldWrapperArgs[@]}" 264 265 ############################# 265 266 # # 266 267 # END EXTRA PREF CHANGES #
+5
pkgs/applications/networking/mailreaders/notmuch/default.nix
··· 79 79 in '' 80 80 mkdir -p test/test-databases 81 81 ln -s ${test-database} test/test-databases/database-v1.tar.xz 82 + '' 83 + # TODO: restore after resolved upstream 84 + # https://www.mail-archive.com/notmuch@notmuchmail.org/msg52808.html 85 + + '' 86 + rm test/T355-smime.sh 82 87 ''; 83 88 84 89 doCheck = !stdenv.hostPlatform.isDarwin && (lib.versionAtLeast gmime.version "3.0.3");
+3 -4
pkgs/applications/version-management/gitless/default.nix
··· 15 15 hash = "sha256-xo5EWtP2aN8YzP8ro3bnxZwUGUp0PHD0g8hk+Y+gExE="; 16 16 }; 17 17 18 + nativeBuildInputs = [ python3.pkgs.pythonRelaxDepsHook ]; 19 + 18 20 propagatedBuildInputs = with python3.pkgs; [ 19 21 sh 20 22 pygit2 21 23 clint 22 24 ]; 23 25 24 - postPatch = '' 25 - substituteInPlace setup.py \ 26 - --replace "pygit2==0.28.2" "pygit2>=0.28.2" 27 - ''; 26 + pythonRelaxDeps = [ "pygit2" ]; 28 27 29 28 doCheck = false; 30 29
+2
pkgs/build-support/setup-hooks/make-binary-wrapper.sh
··· 33 33 # To troubleshoot a binary wrapper after you compiled it, 34 34 # use the `strings` command or open the binary file in a text editor. 35 35 makeWrapper() { 36 + local NIX_CFLAGS_COMPILE= NIX_CFLAGS_LINK= 36 37 local original="$1" 37 38 local wrapper="$2" 38 39 shift 2 ··· 44 45 makeDocumentedCWrapper "$original" "$@" | \ 45 46 @CC@ \ 46 47 -Wall -Werror -Wpedantic \ 48 + -Wno-overlength-strings \ 47 49 -Os \ 48 50 -x c \ 49 51 -o "$wrapper" -
+10 -10
pkgs/build-support/setup-hooks/wrap-gapps-hook/default.nix
··· 1 1 { stdenv 2 2 , lib 3 3 , makeSetupHook 4 - , makeWrapper 4 + , makeBinaryWrapper 5 5 , gobject-introspection 6 6 , isGraphical ? true 7 7 , gtk3 ··· 34 34 ] ++ [ 35 35 36 36 # We use the wrapProgram function. 37 - makeWrapper 37 + makeBinaryWrapper 38 38 ]; 39 39 substitutions = { 40 40 passthru.tests = let ··· 59 59 tested = basic; 60 60 in testLib.runTest "basic-contains-dconf" ( 61 61 testLib.skip stdenv.isDarwin '' 62 - ${expectSomeLineContainingYInFileXToMentionZ "${tested}/bin/foo" "GIO_EXTRA_MODULES=" "${dconf.lib}/lib/gio/modules"} 63 - ${expectSomeLineContainingYInFileXToMentionZ "${tested}/libexec/bar" "GIO_EXTRA_MODULES=" "${dconf.lib}/lib/gio/modules"} 62 + ${expectSomeLineContainingYInFileXToMentionZ "${tested}/bin/foo" "GIO_EXTRA_MODULES" "${dconf.lib}/lib/gio/modules"} 63 + ${expectSomeLineContainingYInFileXToMentionZ "${tested}/libexec/bar" "GIO_EXTRA_MODULES" "${dconf.lib}/lib/gio/modules"} 64 64 '' 65 65 ); 66 66 ··· 98 98 typelib-user-has-gi-typelib-path = let 99 99 tested = typelib-user; 100 100 in testLib.runTest "typelib-user-has-gi-typelib-path" '' 101 - ${expectSomeLineContainingYInFileXToMentionZ "${tested}/bin/foo" "GI_TYPELIB_PATH=" "${typelib-Mahjong}/lib/girepository-1.0"} 102 - ${expectSomeLineContainingYInFileXToMentionZ "${tested}/libexec/bar" "GI_TYPELIB_PATH=" "${typelib-Mahjong}/lib/girepository-1.0"} 101 + ${expectSomeLineContainingYInFileXToMentionZ "${tested}/bin/foo" "GI_TYPELIB_PATH" "${typelib-Mahjong}/lib/girepository-1.0"} 102 + ${expectSomeLineContainingYInFileXToMentionZ "${tested}/libexec/bar" "GI_TYPELIB_PATH" "${typelib-Mahjong}/lib/girepository-1.0"} 103 103 ''; 104 104 105 105 # Simple derivation containing a gobject-introspection typelib in lib output. ··· 143 143 typelib-multiout-user-has-gi-typelib-path = let 144 144 tested = typelib-multiout-user; 145 145 in testLib.runTest "typelib-multiout-user-has-gi-typelib-path" '' 146 - ${expectSomeLineContainingYInFileXToMentionZ "${tested}/bin/foo" "GI_TYPELIB_PATH=" "${typelib-Bechamel.lib}/lib/girepository-1.0"} 147 - ${expectSomeLineContainingYInFileXToMentionZ "${tested}/libexec/bar" "GI_TYPELIB_PATH=" "${typelib-Bechamel.lib}/lib/girepository-1.0"} 146 + ${expectSomeLineContainingYInFileXToMentionZ "${tested}/bin/foo" "GI_TYPELIB_PATH" "${typelib-Bechamel.lib}/lib/girepository-1.0"} 147 + ${expectSomeLineContainingYInFileXToMentionZ "${tested}/libexec/bar" "GI_TYPELIB_PATH" "${typelib-Bechamel.lib}/lib/girepository-1.0"} 148 148 ''; 149 149 150 150 # Simple derivation that contains a typelib as well as a program using it. ··· 169 169 typelib-self-user-has-gi-typelib-path = let 170 170 tested = typelib-self-user; 171 171 in testLib.runTest "typelib-self-user-has-gi-typelib-path" '' 172 - ${expectSomeLineContainingYInFileXToMentionZ "${tested}/bin/foo" "GI_TYPELIB_PATH=" "${typelib-self-user}/lib/girepository-1.0"} 173 - ${expectSomeLineContainingYInFileXToMentionZ "${tested}/libexec/bar" "GI_TYPELIB_PATH=" "${typelib-self-user}/lib/girepository-1.0"} 172 + ${expectSomeLineContainingYInFileXToMentionZ "${tested}/bin/foo" "GI_TYPELIB_PATH" "${typelib-self-user}/lib/girepository-1.0"} 173 + ${expectSomeLineContainingYInFileXToMentionZ "${tested}/libexec/bar" "GI_TYPELIB_PATH" "${typelib-self-user}/lib/girepository-1.0"} 174 174 ''; 175 175 }; 176 176 };
+7 -6
pkgs/build-support/setup-hooks/wrap-gapps-hook/tests/lib.nix
··· 1 - { runCommand 2 - }: 1 + { lib, runCommand }: 3 2 4 3 rec { 5 4 runTest = name: body: runCommand name { } '' ··· 19 18 ''; 20 19 21 20 expectSomeLineContainingYInFileXToMentionZ = file: filter: expected: '' 22 - if ! cat "${file}" | grep "${filter}"; then 23 - ${fail "The file “${file}” should include a line containing “${filter}”."} 21 + file=${lib.escapeShellArg file} filter=${lib.escapeShellArg filter} expected=${lib.escapeShellArg expected} 22 + 23 + if ! grep --text --quiet "$filter" "$file"; then 24 + ${fail "The file “$file” should include a line containing “$filter”."} 24 25 fi 25 26 26 - if ! cat "${file}" | grep "${filter}" | grep ${expected}; then 27 - ${fail "The file “${file}” should include a line containing “${filter}” that also contains “${expected}”."} 27 + if ! grep --text "$filter" "$file" | grep --text --quiet "$expected"; then 28 + ${fail "The file “$file” should include a line containing “$filter” that also contains “$expected”."} 28 29 fi 29 30 ''; 30 31 }
+10 -2
pkgs/development/compilers/gcc/11/default.nix
··· 52 52 with builtins; 53 53 54 54 let majorVersion = "11"; 55 - version = "${majorVersion}.2.0"; 55 + # The patch below for aarch64-darwin does not apply to 11.3.0 and an 56 + # updated version is not available. Keep aarch64-darwin on 11.2.0 so the 57 + # large body of packages which depend on gfortran are still functional 58 + # until GCC 12 is the default. 59 + # On x86_64-darwin, building libgcc suffers from some different issues with 11.3.0. 60 + version = if stdenv.isDarwin then 61 + "${majorVersion}.2.0" else "${majorVersion}.3.0"; 56 62 57 63 inherit (stdenv) buildPlatform hostPlatform targetPlatform; 58 64 ··· 91 97 92 98 src = fetchurl { 93 99 url = "mirror://gcc/releases/gcc-${version}/gcc-${version}.tar.xz"; 94 - sha256 = "sha256-0I7cU2tUw3KhAQ/2YZ3SdMDxYDqkkhK6IPeqLNo2+os="; 100 + sha256 = if stdenv.isDarwin 101 + then "sha256-0I7cU2tUw3KhAQ/2YZ3SdMDxYDqkkhK6IPeqLNo2+os=" 102 + else "sha256-tHzygYaR9bHiHfK7OMeV+sLPvWQO3i0KXhyJ4zijrDk="; 95 103 }; 96 104 97 105 inherit patches;
+11 -2
pkgs/development/interpreters/python/hooks/default.nix
··· 124 124 }; 125 125 } ./python-recompile-bytecode-hook.sh ) {}; 126 126 127 + pythonRelaxDepsHook = callPackage ({ wheel }: 128 + makeSetupHook { 129 + name = "python-relax-deps-hook"; 130 + deps = [ wheel ]; 131 + substitutions = { 132 + inherit pythonInterpreter; 133 + }; 134 + } ./python-relax-deps-hook.sh) {}; 135 + 127 136 pythonRemoveBinBytecodeHook = callPackage ({ }: 128 137 makeSetupHook { 129 138 name = "python-remove-bin-bytecode-hook"; ··· 161 170 deps = [ ensureNewerSourcesForZipFilesHook ]; 162 171 substitutions = { 163 172 inherit pythonInterpreter; 164 - }; 165 - } ./venv-shell-hook.sh) {}); 173 + }; 174 + } ./venv-shell-hook.sh) {}); 166 175 167 176 wheelUnpackHook = callPackage ({ wheel }: 168 177 makeSetupHook {
+83
pkgs/development/interpreters/python/hooks/python-relax-deps-hook.sh
··· 1 + # shellcheck shell=bash 2 + 3 + # Setup hook that modifies Python dependencies versions. 4 + # 5 + # Example usage in a derivation: 6 + # 7 + # { …, pythonPackages, … }: 8 + # 9 + # pythonPackages.buildPythonPackage { 10 + # … 11 + # nativeBuildInputs = [ pythonPackages.pythonRelaxDepsHook ]; 12 + # 13 + # # This will relax the dependency restrictions 14 + # # e.g.: abc>1,<=2 -> abc 15 + # pythonRelaxDeps = [ "abc" ]; 16 + # # This will relax all dependencies restrictions instead 17 + # # pythonRelaxDeps = true; 18 + # # This will remove the dependency 19 + # # e.g.: cde>1,<=2 -> <nothing> 20 + # pythonRemoveDeps = [ "cde" ]; 21 + # # This will remove all dependencies from the project 22 + # # pythonRemoveDeps = true; 23 + # … 24 + # } 25 + 26 + _pythonRelaxDeps() { 27 + local -r metadata_file="$1" 28 + 29 + if [[ -z "${pythonRelaxDeps:-}" ]] || [[ "$pythonRelaxDeps" == 0 ]]; then 30 + return 31 + elif [[ "$pythonRelaxDeps" == 1 ]]; then 32 + sed -i "$metadata_file" -r \ 33 + -e 's/(Requires-Dist: \S*) \(.*\)/\1/' 34 + else 35 + for dep in $pythonRelaxDeps; do 36 + sed -i "$metadata_file" -r \ 37 + -e "s/(Requires-Dist: $dep) \(.*\)/\1/" 38 + done 39 + fi 40 + } 41 + 42 + _pythonRemoveDeps() { 43 + local -r metadata_file="$1" 44 + 45 + if [[ -z "${pythonRemoveDeps:-}" ]] || [[ "$pythonRemoveDeps" == 0 ]]; then 46 + return 47 + elif [[ "$pythonRemoveDeps" == 1 ]]; then 48 + sed -i "$metadata_file" \ 49 + -e '/Requires-Dist:.*/d' 50 + else 51 + for dep in $pythonRemoveDeps; do 52 + sed -i "$metadata_file" \ 53 + -e "/Requires-Dist: $dep/d" 54 + done 55 + fi 56 + 57 + } 58 + 59 + pythonRelaxDepsHook() { 60 + pushd dist 61 + 62 + local -r package="$pname-$version" 63 + local -r unpack_dir="unpacked" 64 + local -r metadata_file="$unpack_dir/$package/$package.dist-info/METADATA" 65 + local -r wheel=$(echo "$package"*".whl") 66 + 67 + @pythonInterpreter@ -m wheel unpack --dest "$unpack_dir" "$wheel" 68 + rm -rf "$wheel" 69 + 70 + _pythonRelaxDeps "$metadata_file" 71 + _pythonRemoveDeps "$metadata_file" 72 + 73 + if (( "${NIX_DEBUG:-0}" >= 1 )); then 74 + echo "pythonRelaxDepsHook: resulting METADATA:" 75 + cat "$unpack_dir/$package/$package.dist-info/METADATA" 76 + fi 77 + 78 + @pythonInterpreter@ -m wheel pack "$unpack_dir/$package" 79 + 80 + popd 81 + } 82 + 83 + postBuild+=" pythonRelaxDepsHook"
+2 -2
pkgs/development/interpreters/python/hooks/setuptools-build-hook.sh
··· 12 12 args+="$setupPyGlobalFlags" 13 13 fi 14 14 if [ -n "$enableParallelBuilding" ]; then 15 - setupPyBuildFlags+="--parallel $NIX_BUILD_CORES" 15 + setupPyBuildFlags+=" --parallel $NIX_BUILD_CORES" 16 16 fi 17 17 if [ -n "$setupPyBuildFlags" ]; then 18 - args+="build_ext $setupPyBuildFlags" 18 + args+=" build_ext $setupPyBuildFlags" 19 19 fi 20 20 eval "@pythonInterpreter@ nix_run_setup $args bdist_wheel" 21 21
+2 -2
pkgs/development/libraries/audio/libopenmpt/default.nix
··· 16 16 17 17 stdenv.mkDerivation rec { 18 18 pname = "libopenmpt"; 19 - version = "0.6.2"; 19 + version = "0.6.3"; 20 20 21 21 outputs = [ "out" "dev" "bin" ]; 22 22 23 23 src = fetchurl { 24 24 url = "https://lib.openmpt.org/files/libopenmpt/src/libopenmpt-${version}+release.autotools.tar.gz"; 25 - sha256 = "1dp645gg6d3pzjh82srq1d7qvyxi5h22k7yfdjiyzbyry8pxdh2h"; 25 + sha256 = "pBCv63zVlwsWuabOfazPSVsaXpEhqdZELeDAKP1Uols="; 26 26 }; 27 27 28 28 enableParallelBuilding = true;
+2 -2
pkgs/development/libraries/expat/default.nix
··· 16 16 17 17 stdenv.mkDerivation rec { 18 18 pname = "expat"; 19 - version = "2.4.7"; 19 + version = "2.4.8"; 20 20 21 21 src = fetchurl { 22 22 url = "https://github.com/libexpat/libexpat/releases/download/R_${lib.replaceStrings ["."] ["_"] version}/${pname}-${version}.tar.xz"; 23 - sha256 = "0zbss0dssn17mjmvk17qfi5cmvm0lcyzs62cwvqr219hhl864xcq"; 23 + sha256 = "sha256-95uPkEt0nj4NIK/q3s+CScVbLjLU67CJrjeN9HncryU="; 24 24 }; 25 25 26 26 outputs = [ "out" "dev" ]; # TODO: fix referrers
+4 -4
pkgs/development/libraries/gmime/3.nix
··· 2 2 , vala }: 3 3 4 4 stdenv.mkDerivation rec { 5 - version = "3.2.7"; 5 + version = "3.2.11"; 6 6 pname = "gmime"; 7 7 8 - src = fetchurl { 9 - url = "mirror://gnome/sources/gmime/3.2/${pname}-${version}.tar.xz"; 10 - sha256 = "0i3xfc84qn1z99i70q68kbnp9rmgqrnprqb418ba52s6g9j9dsia"; 8 + src = fetchurl { # https://github.com/jstedfast/gmime/releases 9 + url = "https://github.com/jstedfast/gmime/releases/download/${version}/gmime-${version}.tar.xz"; 10 + sha256 = "5e023855a215b427645b400f5e55cf19cfd229f971317007e03e7bae72569bf8"; 11 11 }; 12 12 13 13 outputs = [ "out" "dev" ];
+10 -2
pkgs/development/libraries/gtk/3.x.nix
··· 30 30 , gnome 31 31 , gsettings-desktop-schemas 32 32 , sassc 33 - , trackerSupport ? stdenv.isLinux 33 + , trackerSupport ? stdenv.isLinux && (stdenv.buildPlatform == stdenv.hostPlatform) 34 34 , tracker 35 35 , x11Support ? stdenv.isLinux 36 36 , waylandSupport ? stdenv.isLinux ··· 39 39 , wayland-protocols 40 40 , xineramaSupport ? stdenv.isLinux 41 41 , cupsSupport ? stdenv.isLinux 42 - , withGtkDoc ? stdenv.isLinux 42 + , withGtkDoc ? stdenv.isLinux && (stdenv.buildPlatform == stdenv.hostPlatform) 43 43 , cups 44 44 , AppKit 45 45 , Cocoa 46 46 , QuartzCore 47 47 , broadwaySupport ? true 48 + , wayland-scanner 48 49 }: 49 50 50 51 let ··· 85 86 ./patches/3.0-darwin-x11.patch 86 87 ]; 87 88 89 + depsBuildBuild = [ 90 + pkg-config 91 + ]; 88 92 nativeBuildInputs = [ 89 93 gettext 90 94 gobject-introspection ··· 94 98 pkg-config 95 99 python3 96 100 sassc 101 + gdk-pixbuf 97 102 ] ++ setupHooks ++ lib.optionals withGtkDoc [ 98 103 docbook_xml_dtd_43 99 104 docbook-xsl-nons 100 105 gtk-doc 101 106 # For xmllint 102 107 libxml2 108 + ] ++ lib.optionals waylandSupport [ 109 + wayland-scanner 103 110 ]; 104 111 105 112 buildInputs = [ ··· 151 158 "-Dbroadway_backend=${lib.boolToString broadwaySupport}" 152 159 "-Dx11_backend=${lib.boolToString x11Support}" 153 160 "-Dquartz_backend=${lib.boolToString (stdenv.isDarwin && !x11Support)}" 161 + "-Dintrospection=${lib.boolToString (stdenv.buildPlatform == stdenv.hostPlatform)}" 154 162 ]; 155 163 156 164 doCheck = false; # needs X11
+4
pkgs/development/libraries/icu/71.nix
··· 1 + import ./base.nix { 2 + version = "71.1"; 3 + sha256 = "sha256-Z6fm5R9h+vEwa2k1Mz4TssSKvY2m0vRs5q3KJLHiHr8="; 4 + }
+12 -4
pkgs/development/libraries/imlib2/default.nix
··· 2 2 # Image file formats 3 3 , libjpeg, libtiff, giflib, libpng, libwebp 4 4 # imlib2 can load images from ID3 tags. 5 - , libid3tag 5 + , libid3tag, librsvg, libheif 6 6 , freetype , bzip2, pkg-config 7 7 , x11Support ? true, xlibsWrapper ? null 8 + # Compilation error on Darwin with librsvg. For more information see: 9 + # https://github.com/NixOS/nixpkgs/pull/166452#issuecomment-1090725613 10 + , svgSupport ? !stdenv.isDarwin 11 + , heifSupport ? !stdenv.isDarwin 8 12 }: 9 13 10 14 let ··· 12 16 in 13 17 stdenv.mkDerivation rec { 14 18 pname = "imlib2"; 15 - version = "1.7.5"; 19 + version = "1.8.1"; 16 20 17 21 src = fetchurl { 18 22 url = "mirror://sourceforge/enlightenment/${pname}-${version}.tar.xz"; 19 - hash = "sha256-RY2DAKp6bUzjU1GDi7pdn9+wiES9WxU8WTjs/kP/Ngo="; 23 + hash = "sha256-Ui4ecOZbwO3f4gdhfRXJo5VmKnwJBmHaqiwpT7fZ/ao="; 20 24 }; 21 25 22 26 buildInputs = [ 23 27 libjpeg libtiff giflib libpng libwebp 24 28 bzip2 freetype libid3tag 25 - ] ++ optional x11Support xlibsWrapper; 29 + ] ++ optional x11Support xlibsWrapper 30 + ++ optional heifSupport libheif 31 + ++ optional svgSupport librsvg; 26 32 27 33 nativeBuildInputs = [ pkg-config ]; 28 34 ··· 31 37 # Do not build amd64 assembly code on Darwin, because it fails to compile 32 38 # with unknow directive errors 33 39 configureFlags = optional stdenv.isDarwin "--enable-amd64=no" 40 + ++ optional (!svgSupport) "--without-svg" 41 + ++ optional (!heifSupport) "--without-heif" 34 42 ++ optional (!x11Support) "--without-x"; 35 43 36 44 outputs = [ "bin" "out" "dev" ];
+10 -7
pkgs/development/libraries/libarchive/default.nix
··· 40 40 postPatch = '' 41 41 substituteInPlace Makefile.am --replace '/bin/pwd' "$(type -P pwd)" 42 42 43 - declare -a skip_tests=( 43 + declare -a skip_test_paths=( 44 44 # test won't work in nix sandbox 45 - 'test_write_disk_perms' 45 + 'libarchive/test/test_write_disk_perms.c' 46 46 # can't be sure builder will have sparse-capable fs 47 - 'test_sparse_basic' 47 + 'libarchive/test/test_sparse_basic.c' 48 48 # can't even be sure builder will have hardlink-capable fs 49 - 'test_write_disk_hardlink' 49 + 'libarchive/test/test_write_disk_hardlink.c' 50 + # access-time-related tests flakey on some systems 51 + 'cpio/test/test_option_a.c' 52 + 'cpio/test/test_option_t.c' 50 53 ) 51 54 52 - for test_name in "''${skip_tests[@]}" ; do 53 - sed -i "/$test_name/d" Makefile.am 54 - rm "libarchive/test/$test_name.c" 55 + for test_path in "''${skip_test_paths[@]}" ; do 56 + substituteInPlace Makefile.am --replace "$test_path" "" 57 + rm "$test_path" 55 58 done 56 59 ''; 57 60
+2 -2
pkgs/development/libraries/libnotify/default.nix
··· 14 14 15 15 stdenv.mkDerivation rec { 16 16 pname = "libnotify"; 17 - version = "0.7.9"; 17 + version = "0.7.11"; 18 18 19 19 outputs = [ "out" "man" "dev" ]; 20 20 21 21 src = fetchurl { 22 22 url = "mirror://gnome/sources/${pname}/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; 23 - sha256 = "0qa7cx6ra5hwqnxw95b9svgjg5q6ynm8y843iqjszxvds5z53h36"; 23 + sha256 = "3VaC7GgiAznhHFFZt+ASIEoxjdGzaDoJxILKQhqwc3U="; 24 24 }; 25 25 26 26 mesonFlags = [
+2 -2
pkgs/development/libraries/librsvg/default.nix
··· 27 27 28 28 stdenv.mkDerivation rec { 29 29 pname = "librsvg"; 30 - version = "2.54.0"; 30 + version = "2.54.1"; 31 31 32 32 outputs = [ "out" "dev" "installedTests" ] ++ lib.optionals withIntrospection [ 33 33 "devdoc" ··· 35 35 36 36 src = fetchurl { 37 37 url = "mirror://gnome/sources/${pname}/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; 38 - sha256 = "uvjrwUfxRrQmG7PQzQ+slEv427Sx8jR9IzQfl03MMIU="; 38 + sha256 = "1VV++9zEFaQYDhEWt/c2y3EbJT0RDZX6huyDD3ACZiU="; 39 39 }; 40 40 41 41 cargoVendorDir = "vendor";
+3 -3
pkgs/development/libraries/libseccomp/default.nix
··· 1 - { lib, stdenv, fetchurl, getopt, util-linux, gperf, nix-update-script }: 1 + { lib, stdenv, fetchurl, getopt, util-linuxMinimal, which, gperf, nix-update-script }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "libseccomp"; ··· 18 18 patchShebangs . 19 19 ''; 20 20 21 - checkInputs = [ util-linux ]; 22 - doCheck = false; # dependency cycle 21 + checkInputs = [ util-linuxMinimal which ]; 22 + doCheck = true; 23 23 24 24 # Hack to ensure that patchelf --shrink-rpath get rids of a $TMPDIR reference. 25 25 preFixup = "rm -rfv src";
+2 -2
pkgs/development/libraries/libsndfile/default.nix
··· 4 4 5 5 stdenv.mkDerivation rec { 6 6 pname = "libsndfile"; 7 - version = "1.0.31"; 7 + version = "1.1.0"; 8 8 9 9 src = fetchFromGitHub { 10 10 owner = pname; 11 11 repo = pname; 12 12 rev = version; 13 - sha256 = "1alba3iv8i7i2jb5fd6q5s7j9bcj48sf28nfjd3qigz2n2is5jl2"; 13 + sha256 = "sha256-bhIXVSKuUnUzs5aaLDHt21RcnqekEpLU414sFtl2Lro="; 14 14 }; 15 15 16 16 nativeBuildInputs = [ autoreconfHook autogen pkg-config python3 ];
+2 -2
pkgs/development/libraries/libxml2/default.nix
··· 21 21 22 22 stdenv.mkDerivation rec { 23 23 pname = "libxml2"; 24 - version = "2.9.13"; 24 + version = "2.9.14"; 25 25 26 26 outputs = [ "bin" "dev" "out" "man" "doc" ] 27 27 ++ lib.optional pythonSupport "py" ··· 29 29 30 30 src = fetchurl { 31 31 url = "mirror://gnome/sources/${pname}/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; 32 - sha256 = "J2EwYC0S/khOzANEfuXnWdBGVVj7yda9FE43RTBuvw4="; 32 + sha256 = "1vnzk33wfms348lgz9pvkq9li7jm44pvm73lbr3w1khwgljlmmv0"; 33 33 }; 34 34 35 35 patches = [
+2 -2
pkgs/development/libraries/openssl/default.nix
··· 178 178 179 179 180 180 openssl_1_1 = common rec { 181 - version = "1.1.1n"; 182 - sha256 = "sha256-QNzrUaT2pSdb3g5r8g70uRv8Mu1XwFUuLo4VRjNysXo="; 181 + version = "1.1.1o"; 182 + sha256 = "sha256-k4SisFcN2ANYhBRkZ3EV33he25QccSEfdQdtcv5rQ48="; 183 183 patches = [ 184 184 ./1.1/nix-ssl-cert-file.patch 185 185
+2 -9
pkgs/development/libraries/pipewire/default.nix
··· 2 2 , lib 3 3 , buildPackages 4 4 , fetchFromGitLab 5 - , fetchpatch 6 5 , removeReferencesTo 7 6 , python3 8 7 , meson ··· 68 67 69 68 self = stdenv.mkDerivation rec { 70 69 pname = "pipewire"; 71 - version = "0.3.49"; 70 + version = "0.3.51"; 72 71 73 72 outputs = [ 74 73 "out" ··· 86 85 owner = "pipewire"; 87 86 repo = "pipewire"; 88 87 rev = version; 89 - sha256 = "sha256-8heX/9BsPguIOzHOuqEQdt6MS3eS4HxR4A+FUZKNpdo="; 88 + sha256 = "sha256-k5OdKgkQUaelvrGS4KtO0MtSJg6cF2Nf8RrsR8Kf+C8="; 90 89 }; 91 90 92 91 patches = [ ··· 102 101 ./0090-pipewire-config-template-paths.patch 103 102 # Place SPA data files in lib output to avoid dependency cycles 104 103 ./0095-spa-data-dir.patch 105 - # Fixes missing function declarations in pipewire headers 106 - # Should be removed after the next release 107 - (fetchpatch { 108 - url = "https://gitlab.freedesktop.org/pipewire/pipewire/-/commit/a2e98e28c1e6fb58b273ef582398d8bee4d2b769.patch"; 109 - sha256 = "sha256-tqiiAW2fTEp23HT59XR2D/G08pVENJtpxUI7UVufj/A="; 110 - }) 111 104 ]; 112 105 113 106 nativeBuildInputs = [
+2 -2
pkgs/development/libraries/protobuf/3.19.nix
··· 1 1 { callPackage, ... }: 2 2 3 3 callPackage ./generic-v3.nix { 4 - version = "3.19.3"; 5 - sha256 = "sha256-nA6L064MuyP5Si4MCLk2yg8PDM7RWggFEGQyibputYQ="; 4 + version = "3.19.4"; 5 + sha256 = "sha256-mxQ8XonVgctfaNAyd3vqQHMLHVnkjBa9EObk47vxH24="; 6 6 }
+2 -2
pkgs/development/libraries/signond/default.nix
··· 2 2 3 3 mkDerivation rec { 4 4 pname = "signond"; 5 - version = "8.60"; 5 + version = "8.61"; 6 6 7 7 src = fetchFromGitLab { 8 8 owner = "accounts-sso"; 9 9 repo = pname; 10 10 rev = "VERSION_${version}"; 11 - sha256 = "pFpeJ13ut5EoP37W33WrYL2LzkX/k7ZKJcRpPO5l8i4="; 11 + sha256 = "sha256-d7JZmGpjIvSN9l1nvKbBZjF0OR5L5frPTGHF/pNEqHE="; 12 12 }; 13 13 14 14 nativeBuildInputs = [
+2 -2
pkgs/development/libraries/sqlite/default.nix
··· 12 12 13 13 stdenv.mkDerivation rec { 14 14 pname = "sqlite${optionalString interactive "-interactive"}"; 15 - version = "3.38.2"; 15 + version = "3.38.3"; 16 16 17 17 # nixpkgs-update: no auto update 18 18 # NB! Make sure to update ./tools.nix src (in the same directory). 19 19 src = fetchurl { 20 20 url = "https://sqlite.org/2022/sqlite-autoconf-${archiveVersion version}.tar.gz"; 21 - sha256 = "sha256-55dKoUMLrWkKXp95pu5chJKtqCadxnWHWtD7dH18raQ="; 21 + sha256 = "sha256-YfLdk6LjjDNGi3EllnwyGL+fTdg2Xe9gJeMU+QXclC4="; 22 22 }; 23 23 24 24 outputs = [ "bin" "dev" "out" ];
+2 -2
pkgs/development/libraries/sqlite/tools.nix
··· 4 4 archiveVersion = import ./archive-version.nix lib; 5 5 mkTool = { pname, makeTarget, description, homepage, mainProgram }: stdenv.mkDerivation rec { 6 6 inherit pname; 7 - version = "3.38.2"; 7 + version = "3.38.3"; 8 8 9 9 # nixpkgs-update: no auto update 10 10 src = assert version == sqlite.version; fetchurl { 11 11 url = "https://sqlite.org/2022/sqlite-src-${archiveVersion version}.zip"; 12 - sha256 = "sha256-x8DwcKM4yS6wiAWQXAXyVPpG0cTdo1SKAkdPb7VnMpo="; 12 + sha256 = "sha256-oQTUk+CEAGvXT/H/esLrKzh8fAo7Y7pv6i+vtBGDE68="; 13 13 }; 14 14 15 15 nativeBuildInputs = [ unzip ];
+4 -1
pkgs/development/libraries/webrtc-audio-processing/0.3.nix
··· 9 9 sha256 = "1gsx7k77blfy171b6g3m0k0s0072v6jcawhmx1kjs9w5zlwdkzd0"; 10 10 }; 11 11 12 - patches = [ ./enable-riscv.patch ]; 12 + patches = [ 13 + ./enable-riscv.patch 14 + ./enable-powerpc.patch 15 + ]; 13 16 14 17 buildInputs = lib.optionals stdenv.isDarwin (with darwin.apple_sdk.frameworks; [ ApplicationServices ]); 15 18
+37
pkgs/development/libraries/webrtc-audio-processing/enable-powerpc.patch
··· 1 + This patch was extracted from the Gentoo powerpc64le-qtwebengine 2 + patchset, referenced here: 3 + 4 + https://gitweb.gentoo.org/repo/gentoo.git/tree/dev-qt/qtwebengine/qtwebengine-5.15.3_p20220406.ebuild 5 + 6 + and downloaded from here: 7 + 8 + https://dev.gentoo.org/~asturm/distfiles/${PN}-5.15.3_p20220406-patchset.tar.xz 9 + 10 + From 4bbb4482e14ad27cf0bd5032b1b5d4abba29dc99 Mon Sep 17 00:00:00 2001 11 + From: Georgy Yakovlev <gyakovlev@gentoo.org> 12 + Date: Fri, 27 Nov 2020 13:05:45 -0800 13 + Subject: [PATCH] 5.15.2 ppc64le patchet 14 + 15 + diff --git a/webrtc/typedefs.h b/webrtc/typedefs.h 16 + index ce1f3e8..fd39a16 100644 17 + --- a/webrtc/typedefs.h 18 + +++ b/webrtc/typedefs.h 19 + @@ -38,6 +38,18 @@ 20 + #define WEBRTC_ARCH_X86 21 + #define WEBRTC_ARCH_32_BITS 22 + #define WEBRTC_ARCH_LITTLE_ENDIAN 23 + +#elif defined(__PPC__) 24 + +#define WEBRTC_ARCH_PPC_FAMILY 25 + +#if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__ 26 + +#define WEBRTC_ARCH_LITTLE_ENDIAN 27 + +#else 28 + +#define WEBRTC_ARCH_BIG_ENDIAN 29 + +#endif 30 + +#if defined(__LP64__) 31 + +#define WEBRTC_ARCH_64_BITS 32 + +#else 33 + +#define WEBRTC_ARCH_32_BITS 34 + +#endif 35 + #elif defined(__ARMEL__) 36 + // TODO(ajm): We'd prefer to control platform defines here, but this is 37 + // currently provided by the Android makefiles. Commented to avoid duplicate
+2 -2
pkgs/development/libraries/zimg/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "zimg"; 5 - version = "3.0.3"; 5 + version = "3.0.4"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "sekrit-twc"; 9 9 repo = "zimg"; 10 10 rev = "release-${version}"; 11 - sha256 = "0pwgf1mybpa3fs13p6jryzm32vfldyql9biwaypqdcimlnlmyk20"; 11 + sha256 = "1069x49l7kh1mqcq1h3f0m5j0h832jp5x230bh4c613ymgg5kn00"; 12 12 }; 13 13 14 14 nativeBuildInputs = [ autoreconfHook ];
+2 -1
pkgs/development/python-modules/curio/default.nix
··· 26 26 27 27 disabledTests = [ 28 28 "test_aside_basic" # times out 29 + "test_write_timeout" # flaky, does not always time out 29 30 "test_aside_cancel" # fails because modifies PYTHONPATH and cant find pytest 30 31 "test_ssl_outgoing" # touches network 31 - ] ++ lib.optionals (stdenv.isDarwin) [ 32 + ] ++ lib.optionals stdenv.isDarwin [ 32 33 "test_unix_echo" # socket bind error on hydra when built with other packages 33 34 "test_unix_ssl_server" # socket bind error on hydra when built with other packages 34 35 ];
+20 -10
pkgs/development/python-modules/flask-restful/default.nix
··· 1 1 { lib 2 + , aniso8601 3 + , blinker 2 4 , buildPythonPackage 3 5 , fetchPypi 4 - , aniso8601 5 6 , flask 6 - , pytz 7 - , six 8 - , blinker 9 7 , mock 10 8 , nose 11 9 , pytestCheckHook 10 + , pythonOlder 11 + , pytz 12 + , six 12 13 }: 13 14 14 15 buildPythonPackage rec { 15 - pname = "Flask-RESTful"; 16 + pname = "flask-restful"; 16 17 version = "0.3.9"; 18 + format = "setuptools"; 19 + 20 + disabled = pythonOlder "3.7"; 17 21 18 22 src = fetchPypi { 19 - inherit pname version; 20 - sha256 = "0gm5dz088v3d2k1dkcp9b3nnqpkk0fp2jly870hijj2xhc5nbv6c"; 23 + pname = "Flask-RESTful"; 24 + inherit version; 25 + hash = "sha256-zOxlC4NdSBkhOMhTKa4Dc15s7VjpstnCFG1shMBvpT4="; 21 26 }; 22 27 23 28 patches = [ ··· 32 37 ]; 33 38 34 39 checkInputs = [ 35 - pytestCheckHook 40 + blinker 36 41 mock 37 42 nose 38 - blinker 43 + pytestCheckHook 44 + ]; 45 + 46 + pythonImportsCheck = [ 47 + "flask_restful" 39 48 ]; 40 49 41 50 meta = with lib; { 51 + description = "Framework for creating REST APIs"; 42 52 homepage = "https://flask-restful.readthedocs.io"; 43 - description = "Simple framework for creating REST APIs"; 44 53 longDescription = '' 45 54 Flask-RESTful provides the building blocks for creating a great 46 55 REST API. 47 56 ''; 48 57 license = licenses.bsd3; 58 + maintainers = with maintainers; [ ]; 49 59 }; 50 60 }
+71 -8
pkgs/development/python-modules/limits/default.nix
··· 1 - { lib, fetchPypi, buildPythonPackage, six }: 1 + { lib 2 + , buildPythonPackage 3 + , deprecated 4 + , fetchFromGitHub 5 + , hiro 6 + , packaging 7 + , pymemcache 8 + , pymongo 9 + , pytest-asyncio 10 + , pytest-lazy-fixture 11 + , pytestCheckHook 12 + , pythonOlder 13 + , redis 14 + , setuptools 15 + , typing-extensions 16 + }: 2 17 3 18 buildPythonPackage rec { 4 19 pname = "limits"; 5 - version = "2.4.0"; 20 + version = "2.6.1"; 21 + format = "setuptools"; 6 22 7 - src = fetchPypi { 8 - inherit pname version; 9 - sha256 = "sha256-jiK2PfJjECB6d7db1HRZnwpGE6fZFjZQ7TpCjpzHrjU="; 23 + disabled = pythonOlder "3.7"; 24 + 25 + src = fetchFromGitHub { 26 + owner = "alisaifee"; 27 + repo = pname; 28 + rev = version; 29 + # Upstream uses versioneer, which relies on git attributes substitution. 30 + # This leads to non-reproducible archives on github. Remove the substituted 31 + # file here, and recreate it later based on our version info. 32 + extraPostFetch = '' 33 + rm "$out/limits/_version.py" 34 + ''; 35 + hash = "sha256-ja+YbRHCcZ5tFnoofdR44jbkkdDroVUdKeDOt6yE0LI="; 10 36 }; 11 37 12 - propagatedBuildInputs = [ six ]; 38 + propagatedBuildInputs = [ 39 + deprecated 40 + packaging 41 + setuptools 42 + typing-extensions 43 + ]; 44 + 45 + checkInputs = [ 46 + hiro 47 + pymemcache 48 + pymongo 49 + pytest-asyncio 50 + pytest-lazy-fixture 51 + pytestCheckHook 52 + redis 53 + ]; 54 + 55 + postPatch = '' 56 + substituteInPlace pytest.ini \ 57 + --replace "--cov=limits" "" \ 58 + --replace "-K" "" 59 + # redis-py-cluster doesn't support redis > 4 60 + substituteInPlace tests/conftest.py \ 61 + --replace "import rediscluster" "" 62 + 63 + # Recreate _version.py, deleted at fetch time due to non-reproducibility. 64 + echo 'def get_versions(): return {"version": "${version}"}' > limits/_version.py 65 + ''; 13 66 14 - doCheck = false; # ifilter 67 + pythonImportsCheck = [ 68 + "limits" 69 + ]; 70 + 71 + pytestFlagsArray = [ 72 + # All other tests require a running Docker instance 73 + "tests/test_limits.py" 74 + "tests/test_ratelimit_parser.py" 75 + "tests/test_limit_granularities.py" 76 + ]; 15 77 16 78 meta = with lib; { 17 79 description = "Rate limiting utilities"; 80 + homepage = "https://limits.readthedocs.org/"; 18 81 license = licenses.mit; 19 - homepage = "https://limits.readthedocs.org/"; 82 + maintainers = with maintainers; [ ]; 20 83 }; 21 84 }
+2 -2
pkgs/development/python-modules/matplotlib/default.nix
··· 17 17 in 18 18 19 19 buildPythonPackage rec { 20 - version = "3.5.1"; 20 + version = "3.5.2"; 21 21 pname = "matplotlib"; 22 22 format = "setuptools"; 23 23 ··· 25 25 26 26 src = fetchPypi { 27 27 inherit pname version; 28 - sha256 = "b2e9810e09c3a47b73ce9cab5a72243a1258f61e7900969097a817232246ce1c"; 28 + sha256 = "18h78s5ld1i6mz00w258hy29909nfr3ddq6ry9kq18agw468bks8"; 29 29 }; 30 30 31 31 XDG_RUNTIME_DIR = "/tmp";
+29 -11
pkgs/development/python-modules/pkgconfig/default.nix
··· 1 - { lib, buildPythonPackage, fetchPypi, pkg-config }: 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + , poetry-core 5 + , pkg-config 6 + , pytestCheckHook 7 + }: 2 8 3 9 buildPythonPackage rec { 4 10 pname = "pkgconfig"; 5 11 version = "1.5.5"; 12 + format = "pyproject"; 6 13 7 14 inherit (pkg-config) 8 15 setupHooks ··· 10 17 suffixSalt 11 18 targetPrefix 12 19 baseBinName 13 - ; 20 + ; 14 21 15 - src = fetchPypi { 16 - inherit pname version; 17 - sha256 = "deb4163ef11f75b520d822d9505c1f462761b4309b1bb713d08689759ea8b899"; 22 + src = fetchFromGitHub { 23 + owner = "matze"; 24 + repo = "pkgconfig"; 25 + rev = "v${version}"; 26 + sha256 = "sha256-uuLUGRNLCR3NS9g6OPCI+qG7tPWsLhI3OE5WmSI3vm8="; 18 27 }; 19 28 20 - 21 - propagatedNativeBuildInputs = [ pkg-config ]; 29 + patches = [ ./executable.patch ]; 22 30 23 - doCheck = false; 24 - 25 - patches = [ ./executable.patch ]; 26 31 postPatch = '' 27 - substituteInPlace pkgconfig/pkgconfig.py --replace 'PKG_CONFIG_EXE = "pkg-config"' 'PKG_CONFIG_EXE = "${pkg-config}/bin/${pkg-config.targetPrefix}pkg-config"' 32 + rm pkgconfig/pkgconfig.py.orig 33 + substituteInPlace pkgconfig/pkgconfig.py \ 34 + --replace 'PKG_CONFIG_EXE = "pkg-config"' 'PKG_CONFIG_EXE = "${pkg-config}/bin/${pkg-config.targetPrefix}pkg-config"' 35 + 36 + # those pc files are missing and pkg-config validates that they exist 37 + substituteInPlace data/fake-openssl.pc \ 38 + --replace "Requires: libssl libcrypto" "" 28 39 ''; 29 40 41 + nativeBuildInputs = [ poetry-core ]; 42 + 43 + propagatedNativeBuildInputs = [ pkg-config ]; 44 + 45 + checkInputs = [ pytestCheckHook ]; 46 + 30 47 pythonImportsCheck = [ "pkgconfig" ]; 31 48 32 49 meta = with lib; { 33 50 description = "Interface Python with pkg-config"; 34 51 homepage = "https://github.com/matze/pkgconfig"; 35 52 license = licenses.mit; 53 + maintainers = with maintainers; [ SuperSandro2000 ]; 36 54 }; 37 55 }
+11
pkgs/development/python-modules/pycurl/default.nix
··· 2 2 , buildPythonPackage 3 3 , isPyPy 4 4 , fetchPypi 5 + , fetchpatch 5 6 , pythonOlder 6 7 , curl 7 8 , openssl ··· 19 20 inherit pname version; 20 21 sha256 = "sha256-qGOtGP9Hj1VFkkBXiHza5CLhsnRuQWdGFfaHSY6luIo="; 21 22 }; 23 + 24 + patches = [ 25 + # Pull upstream patch for curl-3.83: 26 + # https://github.com/pycurl/pycurl/pull/753 27 + (fetchpatch { 28 + name = "curl-3.83.patch"; 29 + url = "https://github.com/pycurl/pycurl/commit/d47c68b1364f8a1a45ab8c584c291d44b762f7b1.patch"; 30 + sha256 = "sha256-/lGq7O7ZyytzBAxWJPigcWdvypM7OHLBcp9ItmX7z1g="; 31 + }) 32 + ]; 22 33 23 34 preConfigure = '' 24 35 substituteInPlace setup.py --replace '--static-libs' '--libs'
+2 -2
pkgs/development/python-modules/pyicu/default.nix
··· 8 8 9 9 buildPythonPackage rec { 10 10 pname = "PyICU"; 11 - version = "2.8.1"; 11 + version = "2.9"; 12 12 13 13 src = fetchPypi { 14 14 inherit pname version; 15 - sha256 = "sha256-8LlUmof4e6fEE/E2edE3Jx4LN/HzmwEJrOOCV9TRSNY="; 15 + sha256 = "sha256-PCnWzmVUYVcReho0ejA+zfzxp1ke1nn8iM3vQQiEWHg="; 16 16 }; 17 17 18 18 nativeBuildInputs = [ icu ]; # for icu-config, but should be replaced with pkg-config
+2 -2
pkgs/development/python-modules/rich/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "rich"; 15 - version = "12.2.0"; 15 + version = "12.3.0"; 16 16 format = "pyproject"; 17 17 disabled = pythonOlder "3.6"; 18 18 ··· 20 20 owner = "Textualize"; 21 21 repo = pname; 22 22 rev = "v${version}"; 23 - sha256 = "02zypmnc9sijlipki0riywh82piamd3hlrl5xbg2bxlldnlnwx1d"; 23 + sha256 = "sha256-/BPJcFjUldbTa/M3i9jGGU7apbrTcWbF+yrrFuLXcHY="; 24 24 }; 25 25 26 26 nativeBuildInputs = [ poetry-core ];
+2 -2
pkgs/development/python-modules/setuptools-rust/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "setuptools-rust"; 15 - version = "1.2.0"; 15 + version = "1.3.0"; 16 16 disabled = pythonOlder "3.6"; 17 17 18 18 src = fetchPypi { 19 19 inherit pname version; 20 - sha256 = "sha256-CkraR56Mfj2L18tW4aKazCsruYwjJQUbDNy1fX8Fbeg="; 20 + sha256 = "sha256-lYxb9Ktkg9Wdq4iFOBIYccxQBjVKQvsPvVCs8Dyq0d4="; 21 21 }; 22 22 23 23 nativeBuildInputs = [ setuptools-scm ];
+3 -4
pkgs/development/python-modules/testtools/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 3 , fetchPypi 4 + , pythonRelaxDepsHook 4 5 , pbr 5 6 , python-mimeparse 6 7 , extras ··· 20 21 21 22 propagatedBuildInputs = [ pbr python-mimeparse extras ]; 22 23 buildInputs = [ traceback2 ]; 24 + nativeBuildInputs = [ pythonRelaxDepsHook ]; 23 25 24 26 # testscenarios has a circular dependency on testtools 25 27 doCheck = false; 26 28 checkInputs = [ testscenarios ]; 27 29 28 - # testtools 2.0.0 and up has a circular run-time dependency on futures 29 - postPatch = '' 30 - substituteInPlace requirements.txt --replace "fixtures>=1.3.0" "" 31 - ''; 30 + pythonRemoveDeps = [ "fixtures" ]; 32 31 33 32 meta = { 34 33 description = "A set of extensions to the Python standard library's unit testing framework";
+2
pkgs/development/tools/misc/elfutils/default.nix
··· 85 85 homepage = "https://sourceware.org/elfutils/"; 86 86 description = "A set of utilities to handle ELF objects"; 87 87 platforms = platforms.linux; 88 + # https://lists.fedorahosted.org/pipermail/elfutils-devel/2014-November/004223.html 89 + broken = stdenv.hostPlatform.isStatic; 88 90 # licenses are GPL2 or LGPL3+ for libraries, GPL3+ for bins, 89 91 # but since this package isn't split that way, all three are listed. 90 92 license = with licenses; [ gpl2Only lgpl3Plus gpl3Plus ];
+6 -2
pkgs/development/tools/misc/help2man/default.nix
··· 1 - { lib, stdenv, fetchurl, perlPackages, gettext }: 1 + { lib, stdenv, fetchurl, perlPackages, gettext, libintl }: 2 2 3 3 # Note: this package is used for bootstrapping fetchurl, and thus 4 4 # cannot use fetchpatch! All mutable patches (generated by GitHub or ··· 17 17 strictDeps = true; 18 18 19 19 nativeBuildInputs = [ gettext perlPackages.perl perlPackages.LocaleGettext ]; 20 - buildInputs = [ perlPackages.LocaleGettext ]; 20 + buildInputs = [ perlPackages.LocaleGettext libintl ]; 21 + 22 + configureFlags = [ 23 + "--enable-nls" 24 + ]; 21 25 22 26 doCheck = false; # target `check' is missing 23 27
+1 -4
pkgs/development/tools/pandoc/default.nix
··· 13 13 remove-references-to \ 14 14 -t ${haskellPackages.pandoc-types} \ 15 15 $out/bin/pandoc 16 - remove-references-to \ 17 - -t ${haskellPackages.HTTP} \ 18 - $out/bin/pandoc 19 16 ''; 20 17 }) static).overrideAttrs (drv: { 21 18 # These libraries are still referenced, because they generate ··· 25 22 # lead to a transitive runtime dependency on the whole GHC distribution. 26 23 # This should ideally be fixed in haskellPackages (or even Cabal), 27 24 # but a minimal pandoc is important enough to patch it manually. 28 - disallowedReferences = [ haskellPackages.pandoc-types haskellPackages.HTTP ]; 25 + disallowedReferences = [ haskellPackages.pandoc-types ]; 29 26 })
+5 -11
pkgs/misc/ghostscript/default.nix
··· 1 1 { config, stdenv, lib, fetchurl, pkg-config, zlib, expat, openssl, autoconf 2 2 , libjpeg, libpng, libtiff, freetype, fontconfig, libpaper, jbig2dec 3 - , libiconv, ijs, lcms2, fetchpatch, callPackage, bash, buildPackages 3 + , libiconv, ijs, lcms2, callPackage, bash, buildPackages, openjpeg 4 4 , cupsSupport ? config.ghostscript.cups or (!stdenv.isDarwin), cups 5 5 , x11Support ? cupsSupport, xlibsWrapper # with CUPS, X11 only adds very little 6 6 }: ··· 30 30 in 31 31 stdenv.mkDerivation rec { 32 32 pname = "ghostscript${lib.optionalString (x11Support) "-with-X"}"; 33 - version = "9.55.0"; 33 + version = "9.56.1"; 34 34 35 35 src = fetchurl { 36 36 url = "https://github.com/ArtifexSoftware/ghostpdl-downloads/releases/download/gs9${lib.versions.minor version}${lib.versions.patch version}/ghostscript-${version}.tar.xz"; 37 - sha512 = "27g72152mlwlalg232jxdhaf3ykgmqwi2pccbkwfygql1h9iz40plfbwbs1n0fkvm4zwzg5r9cr8g7w2dxih4jldiidv7rflxdy1is2"; 37 + sha512 = "22ysgdprh960rxmxyk2fy2my47cdrhfhbrwar1955hvad54iw79l916drp92wh3qzbxw6z40i70wk00vz8bn2ryig7qgpc1q01m2npy"; 38 38 }; 39 39 40 40 patches = [ 41 - (fetchpatch { 42 - name = "fix-non-vendored-lcms2-typo.patch"; 43 - url = "https://github.com/ArtifexSoftware/ghostpdl/commit/830afae5454dea3bff903869d82022306890a96c.patch"; 44 - sha256 = "1w9yspsgxyabvrw9ld6pv6pb7708c44ihjqvag7qqh9v1lhm48j0"; 45 - }) 46 41 ./urw-font-files.patch 47 42 ./doc-no-ref.diff 48 43 ]; ··· 61 56 buildInputs = [ 62 57 zlib expat openssl 63 58 libjpeg libpng libtiff freetype fontconfig libpaper jbig2dec 64 - libiconv ijs lcms2 bash 59 + libiconv ijs lcms2 bash openjpeg 65 60 ] 66 61 ++ lib.optional x11Support xlibsWrapper 67 62 ++ lib.optional cupsSupport cups ··· 72 67 export CCAUX=$CC_FOR_BUILD 73 68 ${lib.optionalString cupsSupport ''export CUPSCONFIG="${cups.dev}/bin/cups-config"''} 74 69 75 - # requires in-tree (heavily patched) openjpeg 76 - rm -rf jpeg libpng zlib jasper expat tiff lcms2mt jbig2dec freetype cups/libs ijs 70 + rm -rf jpeg libpng zlib jasper expat tiff lcms2mt jbig2dec freetype cups/libs ijs openjpeg 77 71 78 72 sed "s@if ( test -f \$(INCLUDE)[^ ]* )@if ( true )@; s@INCLUDE=/usr/include@INCLUDE=/no-such-path@" -i base/unix-aux.mak 79 73 sed "s@^ZLIBDIR=.*@ZLIBDIR=${zlib.dev}/include@" -i configure.ac
+12
pkgs/os-specific/linux/bluez/default.nix
··· 1 1 { stdenv 2 2 , lib 3 3 , fetchurl 4 + , fetchpatch 4 5 , alsa-lib 5 6 , dbus 6 7 , ell ··· 48 49 ]; 49 50 50 51 outputs = [ "out" "dev" ] ++ lib.optional doCheck "test"; 52 + 53 + patches = [ 54 + # https://github.com/bluez/bluez/commit/0905a06410d4a5189f0be81e25eb3c3e8a2199c5 55 + # which fixes https://github.com/bluez/bluez/issues/329 56 + # and is already merged upstream and not yet in a release. 57 + (fetchpatch { 58 + name = "StateDirectory_and_ConfigurationDirectory.patch"; 59 + url = "https://github.com/bluez/bluez/commit/0905a06410d4a5189f0be81e25eb3c3e8a2199c5.patch"; 60 + sha256 = "sha256-MI6yPTiDLHsSTjLvNqtWnuy2xUMYpSat1WhMbeoedSM="; 61 + }) 62 + ]; 51 63 52 64 postPatch = '' 53 65 substituteInPlace tools/hid2hci.rules \
+1
pkgs/os-specific/linux/kbd/default.nix
··· 63 63 ''; 64 64 65 65 buildInputs = [ check pam ]; 66 + NIX_LDFLAGS = lib.optional stdenv.hostPlatform.isStatic "-laudit"; 66 67 nativeBuildInputs = [ autoreconfHook pkg-config flex ]; 67 68 68 69 passthru.tests = {
+14
pkgs/os-specific/linux/systemd/default.nix
··· 666 666 rm -rf $out/share/doc 667 667 ''; 668 668 669 + # Avoid *.EFI binary stripping. At least on aarch64-linux strip 670 + # removes too much from PE32+ files: 671 + # https://github.com/NixOS/nixpkgs/issues/169693 672 + # The hack is to move EFI file out of lib/ before doStrip 673 + # run and return it after doStrip run. 674 + preFixup = lib.optionalString withEfi '' 675 + mv $out/lib/systemd/boot/efi $out/dont-strip-me 676 + ''; 677 + postFixup = lib.optionalString withEfi '' 678 + mv $out/dont-strip-me $out/lib/systemd/boot/efi 679 + ''; 680 + 669 681 passthru = { 670 682 # The interface version prevents NixOS from switching to an 671 683 # incompatible systemd at runtime. (Switching across reboots is ··· 687 699 description = "A system and service manager for Linux"; 688 700 license = licenses.lgpl21Plus; 689 701 platforms = platforms.linux; 702 + # https://github.com/systemd/systemd/issues/20600#issuecomment-912338965 703 + broken = stdenv.hostPlatform.isStatic; 690 704 priority = 10; 691 705 maintainers = with maintainers; [ flokli kloenk mic92 ]; 692 706 };
+1 -1
pkgs/os-specific/linux/util-linux/default.nix
··· 1 1 { lib, stdenv, fetchurl, pkg-config, zlib, shadow, libcap_ng 2 2 , ncursesSupport ? true 3 3 , ncurses, pam 4 - , systemdSupport ? stdenv.isLinux 4 + , systemdSupport ? stdenv.isLinux && !stdenv.hostPlatform.isStatic 5 5 , systemd 6 6 , nlsSupport ? true 7 7 }:
+3 -1
pkgs/servers/pulseaudio/default.nix
··· 114 114 ''; 115 115 116 116 postInstall = lib.optionalString libOnly '' 117 - rm -rf $out/{bin,share,etc,lib/{pulse-*,systemd}} 117 + find $out/share -maxdepth 1 -mindepth 1 ! -name "vala" -prune -exec rm -r {} \; 118 + find $out/share/vala -maxdepth 1 -mindepth 1 ! -name "vapi" -prune -exec rm -r {} \; 119 + rm -r $out/{bin,etc,lib/pulse-*} 118 120 '' 119 121 + '' 120 122 moveToOutput lib/cmake "$dev"
+23 -52
pkgs/stdenv/darwin/default.nix
··· 98 98 99 99 doSign = localSystem.isAarch64 && last != null; 100 100 doUpdateAutoTools = localSystem.isAarch64 && last != null; 101 + inherit (last.pkgs) runCommandLocal; 101 102 102 103 mkExtraBuildCommands = cc: '' 103 104 rsrc="$out/resource-root" ··· 223 224 ''; 224 225 }; 225 226 226 - pbzx = stdenv.mkDerivation { 227 - name = "bootstrap-stage0-pbzx"; 228 - phases = [ "installPhase" ]; 229 - installPhase = '' 230 - mkdir -p $out/bin 231 - ln -s ${bootstrapTools}/bin/pbzx $out/bin 232 - ''; 233 - }; 227 + pbzx = self.runCommandLocal "bootstrap-stage0-pbzx" { } '' 228 + mkdir -p $out/bin 229 + ln -s ${bootstrapTools}/bin/pbzx $out/bin 230 + ''; 234 231 235 - cpio = stdenv.mkDerivation { 236 - name = "bootstrap-stage0-cpio"; 237 - phases = [ "installPhase" ]; 238 - installPhase = '' 239 - mkdir -p $out/bin 240 - ln -s ${bootstrapFiles.cpio} $out/bin/cpio 241 - ''; 242 - }; 232 + cpio = self.runCommandLocal "bootstrap-stage0-cpio" { } '' 233 + mkdir -p $out/bin 234 + ln -s ${bootstrapFiles.cpio} $out/bin/cpio 235 + ''; 243 236 244 237 darwin = super.darwin.overrideScope (selfDarwin: superDarwin: { 245 238 darwin-stubs = superDarwin.darwin-stubs.override { inherit (self) stdenvNoCC fetchurl; }; ··· 253 246 ''; 254 247 }; 255 248 256 - sigtool = stdenv.mkDerivation { 257 - name = "bootstrap-stage0-sigtool"; 258 - phases = [ "installPhase" ]; 259 - installPhase = '' 260 - mkdir -p $out/bin 261 - ln -s ${bootstrapTools}/bin/sigtool $out/bin 249 + sigtool = self.runCommandLocal "bootstrap-stage0-sigtool" { } '' 250 + mkdir -p $out/bin 251 + ln -s ${bootstrapTools}/bin/sigtool $out/bin 252 + ln -s ${bootstrapTools}/bin/codesign $out/bin 253 + ''; 262 254 263 - # Rewrite nuked references 264 - sed -e "s|[^( ]*\bsigtool\b|$out/bin/sigtool|g" \ 265 - ${bootstrapTools}/bin/codesign > $out/bin/codesign 266 - chmod a+x $out/bin/codesign 267 - ''; 268 - # on next bootstrap tools update, use the following: 269 - # installPhase = '' 270 - # mkdir -p $out/bin 271 - # ln -s ${bootstrapTools}/bin/sigtool $out/bin 272 - # ln -s ${bootstrapTools}/bin/codesign $out/bin 273 - # ''; 274 - }; 255 + print-reexports = self.runCommandLocal "bootstrap-stage0-print-reexports" { } '' 256 + mkdir -p $out/bin 257 + ln -s ${bootstrapTools}/bin/print-reexports $out/bin 258 + ''; 275 259 276 - print-reexports = stdenv.mkDerivation { 277 - name = "bootstrap-stage0-print-reexports"; 278 - phases = [ "installPhase" ]; 279 - installPhase = '' 280 - mkdir -p $out/bin 281 - ln -s ${bootstrapTools}/bin/print-reexports $out/bin 282 - ''; 283 - }; 284 - 285 - rewrite-tbd = stdenv.mkDerivation { 286 - name = "bootstrap-stage0-rewrite-tbd"; 287 - phases = [ "installPhase" ]; 288 - installPhase = '' 289 - mkdir -p $out/bin 290 - ln -s ${bootstrapTools}/bin/rewrite-tbd $out/bin 291 - ''; 292 - }; 260 + rewrite-tbd = self.runCommandLocal "bootstrap-stage0-rewrite-tbd" { } '' 261 + mkdir -p $out/bin 262 + ln -s ${bootstrapTools}/bin/rewrite-tbd $out/bin 263 + ''; 293 264 294 265 binutils-unwrapped = { name = "bootstrap-stage0-binutils"; outPath = bootstrapTools; }; 295 266 ··· 359 330 360 331 libcxx = stdenv.mkDerivation { 361 332 name = "bootstrap-stage0-libcxx"; 362 - phases = [ "installPhase" "fixupPhase" ]; 333 + dontUnpack = true; 363 334 installPhase = '' 364 335 mkdir -p $out/lib $out/include 365 336 ln -s ${bootstrapTools}/lib/libc++.dylib $out/lib/libc++.dylib
+1
pkgs/test/make-binary-wrapper/default.nix
··· 44 44 "invalid-env" 45 45 "prefix" 46 46 "suffix" 47 + "overlength-strings" 47 48 ]; 48 49 f = name: lib.nameValuePair name (makeGoldenTest name); 49 50 in builtins.listToAttrs (builtins.map f names);
+25
pkgs/test/make-binary-wrapper/overlength-strings.c
··· 1 + #define _GNU_SOURCE /* See feature_test_macros(7) */ 2 + #include <unistd.h> 3 + #include <stdlib.h> 4 + #include <assert.h> 5 + #include <stdio.h> 6 + 7 + #define assert_success(e) do { if ((e) < 0) { perror(#e); abort(); } } while (0) 8 + 9 + void set_env_prefix(char *env, char *sep, char *prefix) { 10 + char *existing = getenv(env); 11 + if (existing) { 12 + char *val; 13 + assert_success(asprintf(&val, "%s%s%s", prefix, sep, existing)); 14 + assert_success(setenv(env, val, 1)); 15 + free(val); 16 + } else { 17 + assert_success(setenv(env, prefix, 1)); 18 + } 19 + } 20 + 21 + int main(int argc, char **argv) { 22 + set_env_prefix("PATH", ":", "/nix/store/00000000000000000000000000000000-loooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooong"); 23 + argv[0] = "/send/me/flags"; 24 + return execv("/send/me/flags", argv); 25 + }
+1
pkgs/test/make-binary-wrapper/overlength-strings.cmdline
··· 1 + --prefix PATH : /nix/store/00000000000000000000000000000000-loooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooong
+3
pkgs/test/make-binary-wrapper/overlength-strings.env
··· 1 + PATH=/nix/store/00000000000000000000000000000000-loooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooong 2 + CWD=SUBST_CWD 3 + SUBST_ARGV0
-30
pkgs/tools/networking/curl/7.82.0-openssl-fix-CN-check.patch
··· 1 - From 911714d617c106ed5d553bf003e34ec94ab6a136 Mon Sep 17 00:00:00 2001 2 - From: Daniel Stenberg <daniel@haxx.se> 3 - Date: Tue, 8 Mar 2022 13:38:13 +0100 4 - Subject: [PATCH] openssl: fix CN check error code 5 - 6 - Due to a missing 'else' this returns error too easily. 7 - 8 - Regressed in: d15692ebb 9 - 10 - Reported-by: Kristoffer Gleditsch 11 - Fixes #8559 12 - Closes #8560 13 - --- 14 - lib/vtls/openssl.c | 3 ++- 15 - 1 file changed, 2 insertions(+), 1 deletion(-) 16 - 17 - diff --git a/lib/vtls/openssl.c b/lib/vtls/openssl.c 18 - index 0b79fc50a9c5..4618beeb3867 100644 19 - --- a/lib/vtls/openssl.c 20 - +++ b/lib/vtls/openssl.c 21 - @@ -1817,7 +1817,8 @@ CURLcode Curl_ossl_verifyhost(struct Curl_easy *data, struct connectdata *conn, 22 - memcpy(peer_CN, ASN1_STRING_get0_data(tmp), peerlen); 23 - peer_CN[peerlen] = '\0'; 24 - } 25 - - result = CURLE_OUT_OF_MEMORY; 26 - + else 27 - + result = CURLE_OUT_OF_MEMORY; 28 - } 29 - } 30 - else /* not a UTF8 name */
+2 -3
pkgs/tools/networking/curl/default.nix
··· 54 54 55 55 stdenv.mkDerivation rec { 56 56 pname = "curl"; 57 - version = "7.82.0"; 57 + version = "7.83.0"; 58 58 59 59 src = fetchurl { 60 60 urls = [ 61 61 "https://curl.haxx.se/download/${pname}-${version}.tar.bz2" 62 62 "https://github.com/curl/curl/releases/download/${lib.replaceStrings ["."] ["_"] pname}-${version}/${pname}-${version}.tar.bz2" 63 63 ]; 64 - sha256 = "sha256-RtmgQAozQI/ZkncLBKRKdDSzA28ugImsKLV1c9WdNx8="; 64 + sha256 = "sha256-JHx+x1IcQljmVjTlKScNIU/jKWmXHMy3KEXnqkaDH5Y="; 65 65 }; 66 66 67 67 patches = [ 68 68 ./7.79.1-darwin-no-systemconfiguration.patch 69 - ./7.82.0-openssl-fix-CN-check.patch 70 69 ]; 71 70 72 71 outputs = [ "bin" "dev" "out" "man" "devdoc" ];
+8
pkgs/tools/wayland/wlogout/default.nix
··· 10 10 , wayland 11 11 , wayland-protocols 12 12 , gtk-layer-shell 13 + # gtk-layer-shell fails to cross-compile due to a hard dependency 14 + # on gobject-introspection. 15 + # Disable it when cross-compiling since it's an optional dependency. 16 + # This disables transparency support. 17 + , withGtkLayerShell ? (stdenv.buildPlatform == stdenv.hostPlatform) 13 18 }: 14 19 15 20 stdenv.mkDerivation rec { ··· 23 28 sha256 = "cTscfx+erHVFHwwYpN7pADQWt5sq75sQSyXSP/H8kOs="; 24 29 }; 25 30 31 + strictDeps = true; 32 + depsBuildBuild = [ pkg-config ]; 26 33 nativeBuildInputs = [ pkg-config meson ninja scdoc ]; 27 34 buildInputs = [ 28 35 gtk3 29 36 libxkbcommon 30 37 wayland 31 38 wayland-protocols 39 + ] ++ lib.optionals withGtkLayerShell [ 32 40 gtk-layer-shell 33 41 ]; 34 42
+6 -1
pkgs/top-level/all-packages.nix
··· 17911 17911 } // (lib.optionalAttrs (stdenv.hostPlatform.isi686 && stdenv.cc.isGNU) { 17912 17912 stdenv = gcc6Stdenv; # with gcc-7: undefined reference to `__divmoddi4' 17913 17913 })); 17914 + icu71 = callPackage ../development/libraries/icu/71.nix ({ 17915 + nativeBuildRoot = buildPackages.icu71.override { buildRootOnly = true; }; 17916 + } // (lib.optionalAttrs (stdenv.hostPlatform.isi686 && stdenv.cc.isGNU) { 17917 + stdenv = gcc6Stdenv; # with gcc-7: undefined reference to `__divmoddi4' 17918 + })); 17914 17919 17915 - icu = icu70; 17920 + icu = icu71; 17916 17921 17917 17922 id3lib = callPackage ../development/libraries/id3lib { }; 17918 17923
+1
pkgs/top-level/python-packages.nix
··· 120 120 pythonImportsCheckHook 121 121 pythonNamespacesHook 122 122 pythonRecompileBytecodeHook 123 + pythonRelaxDepsHook 123 124 pythonRemoveBinBytecodeHook 124 125 pythonRemoveTestsDirHook 125 126 setuptoolsBuildHook