Merge branch 'staging' into staging-next

+1331 -2337
+11
doc/languages-frameworks/python.section.md
··· 734 734 with the exception of `other` (see `format` in 735 735 [`buildPythonPackage` parameters](#buildpythonpackage-parameters) for more details). 736 736 737 + ### Using unittestCheckHook {#using-unittestcheckhook} 738 + 739 + `unittestCheckHook` is a hook which will substitute the setuptools `test` command for a `checkPhase` which runs `python -m unittest discover`: 740 + 741 + ``` 742 + checkInputs = [ unittestCheckHook ]; 743 + 744 + unittestFlags = [ "-s" "tests" "-v" ]; 745 + ``` 746 + 737 747 ### Develop local package {#develop-local-package} 738 748 739 749 As a Python developer you're likely aware of [development mode](http://setuptools.readthedocs.io/en/latest/setuptools.html#development-mode) ··· 1270 1280 with the `pipInstallHook`. 1271 1281 - `pythonRelaxDepsHook` will relax Python dependencies restrictions for the package. 1272 1282 See [example usage](#using-pythonrelaxdepshook). 1283 + - `unittestCheckHook` will run tests with `python -m unittest discover`. See [example usage](#using-unittestcheckhook). 1273 1284 1274 1285 ### Development mode {#development-mode} 1275 1286
+7 -1
lib/systems/default.nix
··· 65 65 # is why we use the more obscure "bfd" and not "binutils" for this 66 66 # choice. 67 67 else "bfd"; 68 - extensions = { 68 + extensions = rec { 69 69 sharedLibrary = 70 70 /**/ if final.isDarwin then ".dylib" 71 71 else if final.isWindows then ".dll" 72 72 else ".so"; 73 + staticLibrary = 74 + /**/ if final.isWindows then ".lib" 75 + else ".a"; 76 + library = 77 + /**/ if final.isStatic then staticLibrary 78 + else sharedLibrary; 73 79 executable = 74 80 /**/ if final.isWindows then ".exe" 75 81 else "";
+3 -4
pkgs/applications/audio/whipper/default.nix
··· 37 37 nativeBuildInputs = with python3.pkgs; [ 38 38 setuptools-scm 39 39 docutils 40 + setuptoolsCheckHook 40 41 ]; 41 42 42 43 propagatedBuildInputs = with python3.pkgs; [ ··· 64 65 export SETUPTOOLS_SCM_PRETEND_VERSION="${version}" 65 66 ''; 66 67 67 - checkPhase = '' 68 - runHook preCheck 68 + preCheck = '' 69 69 # disable tests that require internet access 70 70 # https://github.com/JoeLametta/whipper/issues/291 71 71 substituteInPlace whipper/test/test_common_accurip.py \ 72 72 --replace "test_AccurateRipResponse" "dont_test_AccurateRipResponse" 73 - HOME=$TMPDIR ${python3.interpreter} -m unittest discover 74 - runHook postCheck 73 + export HOME=$TMPDIR 75 74 ''; 76 75 77 76 passthru.tests.version = testers.testVersion {
+3 -3
pkgs/applications/editors/vim/common.nix
··· 1 1 { lib, fetchFromGitHub }: 2 2 rec { 3 - version = "9.0.0135"; 3 + version = "9.0.0180"; 4 4 5 5 src = fetchFromGitHub { 6 6 owner = "vim"; 7 7 repo = "vim"; 8 8 rev = "v${version}"; 9 - sha256 = "sha256-xAIfGNJIPO9XoSbAQTRa36Tjln3y+oWQk0lADCnL25g="; 9 + hash = "sha256-38l97auTi6cue457bfRHme5fvsAmvk1MT2va1E/qguw="; 10 10 }; 11 11 12 12 enableParallelBuilding = true; ··· 24 24 description = "The most popular clone of the VI editor"; 25 25 homepage = "http://www.vim.org"; 26 26 license = licenses.vim; 27 - maintainers = with maintainers; [ lovek323 equirosa ]; 27 + maintainers = with maintainers; [ das_j equirosa ]; 28 28 platforms = platforms.unix; 29 29 }; 30 30 }
+2 -4
pkgs/applications/misc/haxor-news/default.nix
··· 52 52 # will fail without pre-seeded config files 53 53 doCheck = false; 54 54 55 - checkInputs = [ mock ]; 55 + checkInputs = [ unittestCheckHook mock ]; 56 56 57 - checkPhase = '' 58 - ${python.interpreter} -m unittest discover -s tests -v 59 - ''; 57 + unittestFlagsArray = [ "-s" "tests" "-v" ]; 60 58 61 59 meta = with lib; { 62 60 homepage = "https://github.com/donnemartin/haxor-news";
+1 -3
pkgs/applications/misc/pyditz/default.nix
··· 15 15 nativeBuildInputs = [ setuptools-scm ]; 16 16 propagatedBuildInputs = [ pyyaml six jinja2 cerberus_1_1 ]; 17 17 18 - checkPhase = '' 19 - ${python.interpreter} -m unittest discover 20 - ''; 18 + checkInputs = [ unittestCheckHook ]; 21 19 22 20 meta = with lib; { 23 21 homepage = "https://pythonhosted.org/pyditz/";
+4 -5
pkgs/applications/misc/topydo/default.nix
··· 1 - { lib, python3Packages, fetchFromGitHub, glibcLocales }: 1 + { lib, python3Packages, fetchFromGitHub, glibcLocales, unittestCheckHook }: 2 2 3 3 with python3Packages; 4 4 ··· 22 22 watchdog 23 23 ]; 24 24 25 - checkInputs = [ mock freezegun pylint ]; 25 + checkInputs = [ unittestCheckHook mock freezegun pylint ]; 26 26 27 27 # Skip test that has been reported multiple times upstream without result: 28 28 # bram85/topydo#271, bram85/topydo#274. 29 - checkPhase = '' 29 + preCheck = '' 30 30 substituteInPlace test/test_revert_command.py --replace 'test_revert_ls' 'dont_test_revert_ls' 31 - python -m unittest discover 32 31 ''; 33 32 34 - LC_ALL="en_US.UTF-8"; 33 + LC_ALL = "en_US.UTF-8"; 35 34 36 35 meta = with lib; { 37 36 description = "A cli todo application compatible with the todo.txt format";
-1
pkgs/applications/networking/browsers/firefox/common.nix
··· 531 531 header "separating debug info from $i (build ID $id)" 532 532 mkdir -p "$dst/''${id:0:2}" 533 533 $OBJCOPY --only-keep-debug "$i" "$dst/''${id:0:2}/''${id:2}.debug" 534 - $STRIP --strip-debug "$i" 535 534 536 535 # Also a create a symlink <original-name>.debug. 537 536 ln -sfn ".build-id/''${id:0:2}/''${id:2}.debug" "$dst/../$(basename "$i")"
+6 -1
pkgs/applications/networking/mailreaders/claws-mail/default.nix
··· 1 - { stdenv, lib, fetchgit, wrapGAppsHook, autoreconfHook, bison, flex 1 + { stdenv, lib, fetchgit, fetchurl, wrapGAppsHook, autoreconfHook, bison, flex 2 2 , curl, gtk3, pkg-config, python3, shared-mime-info 3 3 , glib-networking, gsettings-desktop-schemas 4 4 ··· 110 110 111 111 patches = [ 112 112 ./mime.patch 113 + # fix build with perl 5.36+ 114 + (fetchurl { 115 + url = "https://raw.githubusercontent.com/archlinux/svntogit-packages/packages/claws-mail/trunk/20cope_with_fix_for_1009149.patch"; 116 + hash = "sha256-/WBslmoFvja2v2GEBntxvNtG0I3xtkUUqXO5gl5pqqs="; 117 + }) 113 118 ]; 114 119 115 120 preConfigure = ''
+2 -2
pkgs/applications/version-management/git-and-tools/git/default.nix
··· 28 28 assert svnSupport -> perlSupport; 29 29 30 30 let 31 - version = "2.37.1"; 31 + version = "2.37.2"; 32 32 svn = subversionClient.override { perlBindings = perlSupport; }; 33 33 gitwebPerlLibs = with perlPackages; [ CGI HTMLParser CGIFast FCGI FCGIProcManager HTMLTagCloud ]; 34 34 in ··· 41 41 42 42 src = fetchurl { 43 43 url = "https://www.kernel.org/pub/software/scm/git/git-${version}.tar.xz"; 44 - sha256 = "sha256-yBYsa4uPHF23BqsBtO4p4xBhGCE13CfEhgIkquwbNQA="; 44 + sha256 = "sha256-HD2cghxFOOem2sMKSvi9jc/k9lH5VHTFJrUvg0BtsAM="; 45 45 }; 46 46 47 47 outputs = [ "out" ] ++ lib.optional withManual "doc";
+2 -2
pkgs/applications/window-managers/gamescope/default.nix
··· 15 15 , udev 16 16 , pixman 17 17 , libinput 18 - , libseat 18 + , seatd 19 19 , xwayland 20 20 , glslang 21 21 , stb ··· 65 65 wayland-protocols 66 66 wlroots 67 67 xwayland 68 - libseat 68 + seatd 69 69 libinput 70 70 libxkbcommon 71 71 udev
+1 -1
pkgs/build-support/bintools-wrapper/default.nix
··· 365 365 ## 366 366 + extraBuildCommands; 367 367 368 - inherit dynamicLinker expand-response-params; 368 + inherit dynamicLinker; 369 369 370 370 # for substitution in utils.bash 371 371 expandResponseParams = "${expand-response-params}/bin/expand-response-params";
+2 -1
pkgs/build-support/cc-wrapper/default.nix
··· 157 157 '(${concatStringsSep " " (map (pkg: "\"${pkg}\"") pkgs)})) 158 158 ''; 159 159 160 + inherit expand-response-params; 161 + 160 162 inherit nixSupport; 161 163 }; 162 164 ··· 540 542 (name: value: "echo ${toString value} >> $out/nix-support/${name}") 541 543 nixSupport); 542 544 543 - inherit expand-response-params; 544 545 545 546 # for substitution in utils.bash 546 547 expandResponseParams = "${expand-response-params}/bin/expand-response-params";
+1 -4
pkgs/build-support/rust/hooks/default.nix
··· 75 75 ${lib.optionalString (stdenv.buildPlatform.config != stdenv.hostPlatform.config) '' 76 76 [target."${shortTarget}"] 77 77 "linker" = "${ccForHost}" 78 - ${# https://github.com/rust-lang/rust/issues/46651#issuecomment-433611633 79 - lib.optionalString (stdenv.hostPlatform.isMusl && stdenv.hostPlatform.isAarch64) '' 80 - "rustflags" = [ "-C", "target-feature=+crt-static", "-C", "link-arg=-lgcc" ] 81 - ''} 82 78 ''} 79 + "rustflags" = [ "-C", "target-feature=${if stdenv.hostPlatform.isStatic then "+" else "-"}crt-static" ] 83 80 ''; 84 81 }; 85 82 } ./cargo-setup-hook.sh) {};
-2
pkgs/build-support/setup-hooks/separate-debug-info.sh
··· 2 2 export NIX_LDFLAGS+=" --compress-debug-sections=zlib" 3 3 export NIX_CFLAGS_COMPILE+=" -ggdb -Wa,--compress-debug-sections" 4 4 export RUSTFLAGS+=" -g" 5 - dontStrip=1 6 5 7 6 fixupOutputHooks+=(_separateDebugInfo) 8 7 ··· 35 34 # firmware blobs in QEMU.) 36 35 ( 37 36 $OBJCOPY --only-keep-debug "$i" "$dst/${id:0:2}/${id:2}.debug" 38 - $STRIP --strip-debug "$i" 39 37 40 38 # Also a create a symlink <original-name>.debug. 41 39 ln -sfn ".build-id/${id:0:2}/${id:2}.debug" "$dst/../$(basename "$i")"
+12 -11
pkgs/build-support/setup-hooks/strip.sh
··· 38 38 stripDirs() { 39 39 local cmd="$1" 40 40 local ranlibCmd="$2" 41 - local dirs="$3" 41 + local paths="$3" 42 42 local stripFlags="$4" 43 - local dirsNew= 43 + local pathsNew= 44 44 45 - local d 46 - for d in ${dirs}; do 47 - if [ -d "$prefix/$d" ]; then 48 - dirsNew="${dirsNew} $prefix/$d " 45 + local p 46 + for p in ${paths}; do 47 + if [ -e "$prefix/$p" ]; then 48 + pathsNew="${pathsNew} $prefix/$p" 49 49 fi 50 50 done 51 - dirs=${dirsNew} 51 + paths=${pathsNew} 52 52 53 - if [ -n "${dirs}" ]; then 54 - echo "stripping (with command $cmd and flags $stripFlags) in$dirs" 55 - find $dirs -type f -exec $cmd $stripFlags '{}' \; 2>/dev/null 53 + if [ -n "${paths}" ]; then 54 + echo "stripping (with command $cmd and flags $stripFlags) in $paths" 55 + # Do not strip lib/debug. This is a directory used by setup-hooks/separate-debug-info.sh. 56 + find $paths -type f -a '!' -wholename "$prefix/lib/debug/*" -exec $cmd $stripFlags '{}' \; 2>/dev/null 56 57 # 'strip' does not normally preserve archive index in .a files. 57 58 # This usually causes linking failures against static libs like: 58 59 # ld: ...-i686-w64-mingw32-stage-final-gcc-13.0.0-lib/i686-w64-mingw32/lib/libstdc++.dll.a: 59 60 # error adding symbols: archive has no index; run ranlib to add one 60 61 # Restore the index by running 'ranlib'. 61 - find $dirs -name '*.a' -type f -exec $ranlibCmd '{}' \; 2>/dev/null 62 + find $paths -name '*.a' -type f -exec $ranlibCmd '{}' \; 2>/dev/null 62 63 fi 63 64 }
+11 -11
pkgs/data/misc/tzdata/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "tzdata"; 5 - version = "2022a"; 5 + version = "2022b"; 6 6 7 - srcs = 8 - [ (fetchurl { 9 - url = "https://data.iana.org/time-zones/releases/tzdata${version}.tar.gz"; 10 - sha256 = "0r0nhwpk9nyxj5kkvjy58nr5d85568m04dcb69c4y3zmykczyzzg"; 11 - }) 12 - (fetchurl { 13 - url = "https://data.iana.org/time-zones/releases/tzcode${version}.tar.gz"; 14 - sha256 = "1iysv8fdkm79k8wh8jizmjmq075q4qjhk090vxjy57my6dz5wmzq"; 15 - }) 16 - ]; 7 + srcs = [ 8 + (fetchurl { 9 + url = "https://data.iana.org/time-zones/releases/tzdata${version}.tar.gz"; 10 + hash = "sha256-9ZDq8Eo5UkVCbCvk+uccFDrqXOvBEIi3oKVwRGHfOX0="; 11 + }) 12 + (fetchurl { 13 + url = "https://data.iana.org/time-zones/releases/tzcode${version}.tar.gz"; 14 + hash = "sha256-urINlD5ZoyGENfSNhopOVS8Y1tfz3RKGYMVmDIC4oF8="; 15 + }) 16 + ]; 17 17 18 18 sourceRoot = "."; 19 19
+1 -3
pkgs/development/compilers/gcc/10/default.nix
··· 188 188 189 189 preConfigure = import ../common/pre-configure.nix { 190 190 inherit lib; 191 - inherit version targetPlatform hostPlatform gnatboot langAda langGo langJit crossStageStatic; 191 + inherit version targetPlatform hostPlatform gnatboot langAda langGo langJit crossStageStatic enableMultilib; 192 192 }; 193 193 194 194 dontDisableStatic = true; ··· 267 267 268 268 enableParallelBuilding = true; 269 269 inherit enableMultilib enableShared; 270 - 271 - inherit (stdenv) is64bit; 272 270 273 271 meta = { 274 272 homepage = "https://gcc.gnu.org/";
+3 -5
pkgs/development/compilers/gcc/11/default.nix
··· 74 74 ++ optional (targetPlatform.libc == "musl" && targetPlatform.isPower) ../ppc-musl.patch 75 75 76 76 ++ optional (stdenv.isDarwin && stdenv.isAarch64) (fetchpatch { 77 - url = "https://github.com/fxcoudert/gcc/compare/releases/gcc-11.1.0...gcc-11.1.0-arm-20210504.diff"; 78 - sha256 = "sha256-JqCGJAfbOxSmkNyq49aFHteK/RFsCSLQrL9mzUCnaD0="; 77 + url = "https://github.com/fxcoudert/gcc/compare/releases/gcc-11.2.0...gcc-11.2.0-arm-20211201.diff"; 78 + sha256 = "sha256-z62s/cXuH9Kgq/oD/OiiZ8LWnX1xl1D43sONnwaEW1w="; 79 79 }) 80 80 81 81 # Obtain latest patch with ../update-mcfgthread-patches.sh ··· 196 196 197 197 preConfigure = import ../common/pre-configure.nix { 198 198 inherit lib; 199 - inherit version targetPlatform hostPlatform gnatboot langAda langGo langJit crossStageStatic; 199 + inherit version targetPlatform hostPlatform gnatboot langAda langGo langJit crossStageStatic enableMultilib; 200 200 }; 201 201 202 202 dontDisableStatic = true; ··· 275 275 276 276 enableParallelBuilding = true; 277 277 inherit enableShared enableMultilib; 278 - 279 - inherit (stdenv) is64bit; 280 278 281 279 meta = { 282 280 homepage = "https://gcc.gnu.org/";
+1 -3
pkgs/development/compilers/gcc/12/default.nix
··· 191 191 192 192 preConfigure = import ../common/pre-configure.nix { 193 193 inherit lib; 194 - inherit version targetPlatform hostPlatform gnatboot langAda langGo langJit crossStageStatic; 194 + inherit version targetPlatform hostPlatform gnatboot langAda langGo langJit crossStageStatic enableMultilib; 195 195 }; 196 196 197 197 dontDisableStatic = true; ··· 270 270 271 271 enableParallelBuilding = true; 272 272 inherit enableShared enableMultilib; 273 - 274 - inherit (stdenv) is64bit; 275 273 276 274 meta = { 277 275 homepage = "https://gcc.gnu.org/";
+1 -3
pkgs/development/compilers/gcc/4.8/default.nix
··· 195 195 196 196 preConfigure = import ../common/pre-configure.nix { 197 197 inherit lib; 198 - inherit version targetPlatform hostPlatform langJava langGo crossStageStatic; 198 + inherit version targetPlatform hostPlatform langJava langGo crossStageStatic enableMultilib; 199 199 }; 200 200 201 201 dontDisableStatic = true; ··· 290 290 291 291 enableParallelBuilding = true; 292 292 inherit enableShared enableMultilib; 293 - 294 - inherit (stdenv) is64bit; 295 293 296 294 meta = { 297 295 homepage = "https://gcc.gnu.org/";
+1 -3
pkgs/development/compilers/gcc/4.9/default.nix
··· 215 215 216 216 preConfigure = import ../common/pre-configure.nix { 217 217 inherit lib; 218 - inherit version targetPlatform hostPlatform langJava langGo crossStageStatic; 218 + inherit version targetPlatform hostPlatform langJava langGo crossStageStatic enableMultilib; 219 219 }; 220 220 221 221 dontDisableStatic = true; ··· 309 309 310 310 enableParallelBuilding = true; 311 311 inherit enableShared enableMultilib; 312 - 313 - inherit (stdenv) is64bit; 314 312 315 313 meta = { 316 314 homepage = "https://gcc.gnu.org/";
+1 -3
pkgs/development/compilers/gcc/6/default.nix
··· 227 227 228 228 preConfigure = import ../common/pre-configure.nix { 229 229 inherit lib; 230 - inherit version targetPlatform hostPlatform gnatboot langJava langAda langGo crossStageStatic; 230 + inherit version targetPlatform hostPlatform gnatboot langJava langAda langGo crossStageStatic enableMultilib; 231 231 }; 232 232 233 233 dontDisableStatic = true; ··· 321 321 322 322 enableParallelBuilding = true; 323 323 inherit enableShared enableMultilib; 324 - 325 - inherit (stdenv) is64bit; 326 324 327 325 meta = { 328 326 homepage = "https://gcc.gnu.org/";
+1 -3
pkgs/development/compilers/gcc/7/default.nix
··· 194 194 195 195 preConfigure = import ../common/pre-configure.nix { 196 196 inherit lib; 197 - inherit version targetPlatform hostPlatform langGo crossStageStatic; 197 + inherit version targetPlatform hostPlatform langGo crossStageStatic enableMultilib; 198 198 }; 199 199 200 200 dontDisableStatic = true; ··· 275 275 276 276 enableParallelBuilding = true; 277 277 inherit enableShared enableMultilib; 278 - 279 - inherit (stdenv) is64bit; 280 278 281 279 meta = { 282 280 homepage = "https://gcc.gnu.org/";
+1 -3
pkgs/development/compilers/gcc/8/default.nix
··· 177 177 178 178 preConfigure = import ../common/pre-configure.nix { 179 179 inherit lib; 180 - inherit version targetPlatform hostPlatform langGo crossStageStatic; 180 + inherit version targetPlatform hostPlatform langGo crossStageStatic enableMultilib; 181 181 }; 182 182 183 183 dontDisableStatic = true; ··· 254 254 255 255 enableParallelBuilding = true; 256 256 inherit enableShared enableMultilib; 257 - 258 - inherit (stdenv) is64bit; 259 257 260 258 meta = { 261 259 homepage = "https://gcc.gnu.org/";
+1 -3
pkgs/development/compilers/gcc/9/default.nix
··· 190 190 191 191 preConfigure = import ../common/pre-configure.nix { 192 192 inherit lib; 193 - inherit version targetPlatform hostPlatform gnatboot langAda langGo langJit crossStageStatic; 193 + inherit version targetPlatform hostPlatform gnatboot langAda langGo langJit crossStageStatic enableMultilib; 194 194 }; 195 195 196 196 dontDisableStatic = true; ··· 269 269 270 270 enableParallelBuilding = true; 271 271 inherit enableShared enableMultilib; 272 - 273 - inherit (stdenv) is64bit; 274 272 275 273 meta = { 276 274 homepage = "https://gcc.gnu.org/";
+6 -1
pkgs/development/compilers/gcc/builder.sh
··· 193 193 mkdir -p "$out/${targetConfig}/lib" 194 194 mkdir -p "${!outputLib}/${targetConfig}/lib" 195 195 # Make ‘lib64’ symlinks to ‘lib’. 196 - if [ -n "$is64bit" -a -z "$enableMultilib" ]; then 196 + if [ -n "$linkLib64toLib" ]; then 197 197 ln -s lib "$out/${targetConfig}/lib64" 198 198 ln -s lib "${!outputLib}/${targetConfig}/lib64" 199 + fi 200 + # Make ‘lib32’ symlinks to ‘lib’. 201 + if [ -n "$linkLib32toLib" ]; then 202 + ln -s lib "$out/${targetConfig}/lib32" 203 + ln -s lib "${!outputLib}/${targetConfig}/lib32" 199 204 fi 200 205 } 201 206
+15
pkgs/development/compilers/gcc/common/pre-configure.nix
··· 5 5 , langJit ? false 6 6 , langGo 7 7 , crossStageStatic 8 + , enableMultilib 8 9 }: 9 10 10 11 assert langJava -> lib.versionOlder version "7"; ··· 78 79 + lib.optionalString (targetPlatform != hostPlatform && crossStageStatic) '' 79 80 export inhibit_libc=true 80 81 '' 82 + 83 + + lib.optionalString (!enableMultilib && hostPlatform.is64bit && !hostPlatform.isMips64n32) '' 84 + export linkLib64toLib=1 85 + '' 86 + 87 + # On mips platforms, gcc follows the IRIX naming convention: 88 + # 89 + # $PREFIX/lib = mips32 90 + # $PREFIX/lib32 = mips64n32 91 + # $PREFIX/lib64 = mips64 92 + # 93 + + lib.optionalString (!enableMultilib && targetPlatform.isMips64n32) '' 94 + export linkLib32toLib=1 95 + ''
+26 -11
pkgs/development/compilers/gcc/common/strip-attributes.nix
··· 8 8 # Example ARM breakage by x86_64 strip: https://bugs.gentoo.org/697428 9 9 # 10 10 # Let's recap the file layout for directories with object files for a 11 - # cross-compiler (host != target): 11 + # cross-compiler: 12 + # 13 + # $out (host != target) 12 14 # `- bin: HOST 13 15 # lib/*.{a,o}: HOST 14 16 # `- gcc/<TARGET>/<VERSION>/*.{a,o}: TARGET ··· 17 19 # `- libexec/: HOST 18 20 # `- <TARGET>/: TARGET 19 21 # 20 - # (host == target) has identical directory layout. 22 + # $out (host == target) has identical directory layout. 23 + # 24 + # $lib (host != target): 25 + # `- <TARGET>/lib/*.{la,so}: TARGET 26 + # 27 + # $lib (host == target): 28 + # `- lib/*.{la,so}: HOST 21 29 22 30 # The rest of stripDebugList{Host,Target} will be populated in 23 - # postInstall. 31 + # postInstall to disambiguate lib/ object files. 24 32 stripDebugList = [ "bin" "libexec" ]; 25 33 stripDebugListTarget = [ stdenv.targetPlatform.config ]; 26 34 ··· 32 40 shopt -s nullglob 33 41 34 42 pushd $out 35 - 36 - local -ar hostFiles=( 37 - lib{,32,64}/*.{a.o} 43 + local -ar outHostFiles=( 44 + lib{,32,64}/*.{a,o,so*} 38 45 lib{,32,64}/gcc/${stdenv.targetPlatform.config}/*/plugin 39 46 ) 40 - local -ar targetFiles=( 41 - lib{,32,64}/gcc/${stdenv.targetPlatform.config}/*/*.{a.o} 47 + local -ar outTargetFiles=( 48 + lib{,32,64}/gcc/${stdenv.targetPlatform.config}/*/*.{a,o,so*} 42 49 ) 50 + popd 43 51 44 - stripDebugList="$stripDebugList ''${hostFiles[*]}" 45 - stripDebugListTarget="$stripDebugListTarget ''${targetFiles[*]}" 46 - 52 + pushd $lib 53 + local -ar libHostFiles=( 54 + lib{,32,64}/*.{a,o,so*} 55 + ) 56 + local -ar libTargetFiles=( 57 + lib{,32,64}/${stdenv.targetPlatform.config}/*.{a,o,so*} 58 + ) 47 59 popd 48 60 49 61 eval "$oldOpts" 62 + 63 + stripDebugList="$stripDebugList ''${outHostFiles[*]} ''${libHostFiles[*]}" 64 + stripDebugListTarget="$stripDebugListTarget ''${outTargetFiles[*]} ''${libTargetFiles[*]}" 50 65 } 51 66 updateDebugListPaths 52 67 '';
+2 -2
pkgs/development/compilers/glslang/default.nix
··· 9 9 }: 10 10 stdenv.mkDerivation rec { 11 11 pname = "glslang"; 12 - version = "1.3.211.0"; 12 + version = "1.3.216.0"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "KhronosGroup"; 16 16 repo = "glslang"; 17 17 rev = "sdk-${version}"; 18 - sha256 = "sha256-YLn/Mxuk6mXPGtBBgfwky5Nl1TCAW6i2g+AZLzqVz+A="; 18 + hash = "sha256-sjidkiPtRADhyOEKDb2cHCBXnFjLwk2F5Lppv5/fwNQ="; 19 19 }; 20 20 21 21 # These get set at all-packages, keep onto them for child drvs
+5 -10
pkgs/development/compilers/go/1.17.nix
··· 3 3 , fetchurl 4 4 , tzdata 5 5 , iana-etc 6 - , runCommand 7 6 , perl 8 7 , which 9 8 , pkg-config ··· 21 20 }: 22 21 23 22 let 24 - go_bootstrap = buildPackages.callPackage ./bootstrap116.nix { }; 25 - 26 - goBootstrap = runCommand "go-bootstrap" { } '' 27 - mkdir $out 28 - cp -rf ${go_bootstrap}/* $out/ 29 - chmod -R u+w $out 30 - find $out -name "*.c" -delete 31 - cp -rf $out/bin/* $out/share/go/bin/ 32 - ''; 23 + goBootstrap = buildPackages.callPackage ./bootstrap116.nix { }; 33 24 34 25 goarch = platform: { 35 26 "aarch64" = "arm64"; ··· 276 267 ''; 277 268 278 269 disallowedReferences = [ goBootstrap ]; 270 + 271 + passthru = { 272 + inherit goBootstrap; 273 + }; 279 274 280 275 meta = with lib; { 281 276 description = "The Go Programming language";
+37 -137
pkgs/development/compilers/go/1.18.nix
··· 2 2 , stdenv 3 3 , fetchurl 4 4 , tzdata 5 + , substituteAll 5 6 , iana-etc 6 - , runCommand 7 - , perl 8 - , which 9 - , pkg-config 10 - , procps 11 - , pcre 12 - , cacert 13 7 , Security 14 8 , Foundation 15 9 , xcbuild 16 10 , mailcap 17 - , runtimeShell 18 11 , buildPackages 19 12 , pkgsBuildTarget 20 13 , threadsCross 14 + , testers 15 + , skopeo 16 + , buildGo118Module 21 17 }: 22 18 23 19 let 24 - go_bootstrap = buildPackages.callPackage ./bootstrap116.nix { }; 20 + goBootstrap = buildPackages.callPackage ./bootstrap116.nix { }; 25 21 26 - goBootstrap = runCommand "go-bootstrap" { } '' 27 - mkdir $out 28 - cp -rf ${go_bootstrap}/* $out/ 29 - chmod -R u+w $out 30 - find $out -name "*.c" -delete 31 - cp -rf $out/bin/* $out/share/go/bin/ 32 - ''; 22 + skopeoTest = skopeo.override { buildGoModule = buildGo118Module; }; 33 23 34 24 goarch = platform: { 35 25 "aarch64" = "arm64"; ··· 63 53 }; 64 54 65 55 strictDeps = true; 66 - # perl is used for testing go vet 67 - nativeBuildInputs = [ perl which pkg-config procps ]; 68 - buildInputs = [ cacert pcre ] 56 + buildInputs = [ ] 69 57 ++ lib.optionals stdenv.isLinux [ stdenv.cc.libc.out ] 70 58 ++ lib.optionals (stdenv.hostPlatform.libc == "glibc") [ stdenv.cc.libc.static ]; 71 59 72 - propagatedBuildInputs = lib.optionals stdenv.isDarwin [ xcbuild ]; 73 - 74 - depsTargetTargetPropagated = lib.optionals stdenv.isDarwin [ Security Foundation ]; 60 + depsTargetTargetPropagated = lib.optionals stdenv.isDarwin [ Foundation Security xcbuild ]; 75 61 76 62 depsBuildTarget = lib.optional isCross targetCC; 77 63 78 64 depsTargetTarget = lib.optional stdenv.targetPlatform.isWindows threadsCross; 79 65 80 - hardeningDisable = [ "all" ]; 81 - 82 - prePatch = '' 83 - patchShebangs ./ # replace /bin/bash 66 + postPatch = '' 67 + patchShebangs . 68 + ''; 84 69 85 - # This source produces shell script at run time, 86 - # and thus it is not corrected by patchShebangs. 87 - substituteInPlace misc/cgo/testcarchive/carchive_test.go \ 88 - --replace '#!/usr/bin/env bash' '#!${runtimeShell}' 89 - 70 + patches = [ 71 + (substituteAll { 72 + src = ./iana-etc-1.17.patch; 73 + iana = iana-etc; 74 + }) 90 75 # Patch the mimetype database location which is missing on NixOS. 91 76 # but also allow static binaries built with NixOS to run outside nix 92 - sed -i 's,\"/etc/mime.types,"${mailcap}/etc/mime.types\"\,\n\t&,' src/mime/type_unix.go 93 - 94 - # Disabling the 'os/http/net' tests (they want files not available in 95 - # chroot builds) 96 - rm src/net/{listen,parse}_test.go 97 - rm src/syscall/exec_linux_test.go 98 - 99 - # !!! substituteInPlace does not seems to be effective. 100 - # The os test wants to read files in an existing path. Just don't let it be /usr/bin. 101 - sed -i 's,/usr/bin,'"`pwd`", src/os/os_test.go 102 - sed -i 's,/bin/pwd,'"`type -P pwd`", src/os/os_test.go 103 - # Fails on aarch64 104 - sed -i '/TestFallocate/aif true \{ return\; \}' src/cmd/link/internal/ld/fallocate_test.go 105 - # Skip this test since ssl patches mess it up. 106 - sed -i '/TestLoadSystemCertsLoadColonSeparatedDirs/aif true \{ return\; \}' src/crypto/x509/root_unix_test.go 107 - # Disable another PIE test which breaks. 108 - sed -i '/TestTrivialPIE/aif true \{ return\; \}' misc/cgo/testshared/shared_test.go 109 - # Disable the BuildModePie test 110 - sed -i '/TestBuildmodePIE/aif true \{ return\; \}' src/cmd/go/go_test.go 111 - # Disable the unix socket test 112 - sed -i '/TestShutdownUnix/aif true \{ return\; \}' src/net/net_test.go 113 - # Disable the hostname test 114 - sed -i '/TestHostname/aif true \{ return\; \}' src/os/os_test.go 115 - # ParseInLocation fails the test 116 - sed -i '/TestParseInSydney/aif true \{ return\; \}' src/time/format_test.go 117 - # Remove the api check as it never worked 118 - sed -i '/src\/cmd\/api\/run.go/ireturn nil' src/cmd/dist/test.go 119 - # Remove the coverage test as we have removed this utility 120 - sed -i '/TestCoverageWithCgo/aif true \{ return\; \}' src/cmd/go/go_test.go 121 - # Remove the timezone naming test 122 - sed -i '/TestLoadFixed/aif true \{ return\; \}' src/time/time_test.go 123 - # Remove disable setgid test 124 - sed -i '/TestRespectSetgidDir/aif true \{ return\; \}' src/cmd/go/internal/work/build_test.go 125 - # Remove cert tests that conflict with NixOS's cert resolution 126 - sed -i '/TestEnvVars/aif true \{ return\; \}' src/crypto/x509/root_unix_test.go 127 - # TestWritevError hangs sometimes 128 - sed -i '/TestWritevError/aif true \{ return\; \}' src/net/writev_test.go 129 - # TestVariousDeadlines fails sometimes 130 - sed -i '/TestVariousDeadlines/aif true \{ return\; \}' src/net/timeout_test.go 131 - 132 - sed -i 's,/etc/protocols,${iana-etc}/etc/protocols,' src/net/lookup_unix.go 133 - sed -i 's,/etc/services,${iana-etc}/etc/services,' src/net/port_unix.go 134 - 135 - # Disable cgo lookup tests not works, they depend on resolver 136 - rm src/net/cgo_unix_test.go 137 - 77 + (substituteAll { 78 + src = ./mailcap-1.17.patch; 79 + inherit mailcap; 80 + }) 138 81 # prepend the nix path to the zoneinfo files but also leave the original value for static binaries 139 82 # that run outside a nix server 140 - sed -i 's,\"/usr/share/zoneinfo/,"${tzdata}/share/zoneinfo/\"\,\n\t&,' src/time/zoneinfo_unix.go 141 - 142 - '' + lib.optionalString stdenv.isAarch32 '' 143 - echo '#!${runtimeShell}' > misc/cgo/testplugin/test.bash 144 - '' + lib.optionalString stdenv.isDarwin '' 145 - substituteInPlace src/race.bash --replace \ 146 - "sysctl machdep.cpu.extfeatures | grep -qv EM64T" true 147 - sed -i 's,strings.Contains(.*sysctl.*,true {,' src/cmd/dist/util.go 148 - sed -i 's,"/etc","'"$TMPDIR"'",' src/os/os_test.go 149 - sed -i 's,/_go_os_test,'"$TMPDIR"'/_go_os_test,' src/os/path_test.go 150 - 151 - sed -i '/TestChdirAndGetwd/aif true \{ return\; \}' src/os/os_test.go 152 - sed -i '/TestCredentialNoSetGroups/aif true \{ return\; \}' src/os/exec/exec_posix_test.go 153 - sed -i '/TestRead0/aif true \{ return\; \}' src/os/os_test.go 154 - sed -i '/TestSystemRoots/aif true \{ return\; \}' src/crypto/x509/root_darwin_test.go 155 - 156 - sed -i '/TestGoInstallRebuildsStalePackagesInOtherGOPATH/aif true \{ return\; \}' src/cmd/go/go_test.go 157 - sed -i '/TestBuildDashIInstallsDependencies/aif true \{ return\; \}' src/cmd/go/go_test.go 158 - 159 - sed -i '/TestDisasmExtld/aif true \{ return\; \}' src/cmd/objdump/objdump_test.go 160 - 161 - sed -i 's/unrecognized/unknown/' src/cmd/link/internal/ld/lib.go 162 - 163 - # TestCurrent fails because Current is not implemented on Darwin 164 - sed -i 's/TestCurrent/testCurrent/g' src/os/user/user_test.go 165 - sed -i 's/TestLookup/testLookup/g' src/os/user/user_test.go 166 - 167 - touch $TMPDIR/group $TMPDIR/hosts $TMPDIR/passwd 168 - ''; 169 - 170 - patches = [ 83 + (substituteAll { 84 + src = ./tzdata-1.17.patch; 85 + inherit tzdata; 86 + }) 171 87 ./remove-tools-1.11.patch 172 - ./ssl-cert-file-1.16.patch 173 - ./remove-test-pie-1.15.patch 174 - ./creds-test.patch 175 - ./skip-chown-tests-1.16.patch 176 - ./skip-external-network-tests-1.16.patch 177 - ./skip-nohup-tests.patch 178 - ./skip-cgo-tests-1.15.patch 179 88 ./go_no_vendor_checks-1.16.patch 180 89 ]; 181 90 182 - postPatch = '' 183 - find . -name '*.orig' -exec rm {} ';' 184 - ''; 185 - 186 91 GOOS = stdenv.targetPlatform.parsed.kernel.name; 187 92 GOARCH = goarch stdenv.targetPlatform; 188 93 # GOHOSTOS/GOHOSTARCH must match the building system, not the host system. ··· 207 112 GOARM = toString (lib.intersectLists [ (stdenv.hostPlatform.parsed.cpu.version or "") ] [ "5" "6" "7" ]); 208 113 GO386 = "softfloat"; # from Arch: don't assume sse2 on i686 209 114 CGO_ENABLED = 1; 210 - # Hopefully avoids test timeouts on Hydra 211 - GO_TEST_TIMEOUT_SCALE = 3; 212 - 213 - # Indicate that we are running on build infrastructure 214 - # Some tests assume things like home directories and users exists 215 - GO_BUILDER_NAME = "nix"; 216 115 217 116 GOROOT_BOOTSTRAP = "${goBootstrap}/share/go"; 218 117 219 - postConfigure = '' 118 + buildPhase = '' 119 + runHook preBuild 220 120 export GOCACHE=$TMPDIR/go-cache 221 121 # this is compiled into the binary 222 122 export GOROOT_FINAL=$out/share/go ··· 229 129 export CC=${buildPackages.stdenv.cc}/bin/cc 230 130 ''} 231 131 ulimit -a 232 - ''; 233 132 234 - postBuild = '' 235 - (cd src && ./make.bash) 236 - ''; 237 - 238 - doCheck = stdenv.hostPlatform == stdenv.targetPlatform && !stdenv.isDarwin; 239 - 240 - checkPhase = '' 241 - runHook preCheck 242 - (cd src && HOME=$TMPDIR GOCACHE=$TMPDIR/go-cache ./run.bash --no-rebuild) 243 - runHook postCheck 133 + pushd src 134 + ./make.bash 135 + popd 136 + runHook postBuild 244 137 ''; 245 138 246 139 preInstall = '' ··· 270 163 ''; 271 164 272 165 disallowedReferences = [ goBootstrap ]; 166 + 167 + passthru = { 168 + inherit goBootstrap skopeoTest; 169 + tests = { 170 + skopeo = testers.testVersion { package = skopeoTest; }; 171 + }; 172 + }; 273 173 274 174 meta = with lib; { 275 175 description = "The Go Programming language";
+37 -136
pkgs/development/compilers/go/1.19.nix
··· 2 2 , stdenv 3 3 , fetchurl 4 4 , tzdata 5 + , substituteAll 5 6 , iana-etc 6 - , runCommand 7 - , perl 8 - , which 9 - , pkg-config 10 - , procps 11 - , pcre 12 - , cacert 13 7 , Security 14 8 , Foundation 15 9 , xcbuild 16 10 , mailcap 17 - , runtimeShell 18 11 , buildPackages 19 12 , pkgsBuildTarget 20 13 , threadsCross 14 + , testers 15 + , skopeo 16 + , buildGo119Module 21 17 }: 22 18 23 19 let 24 - go_bootstrap = buildPackages.callPackage ./bootstrap116.nix { }; 20 + goBootstrap = buildPackages.callPackage ./bootstrap116.nix { }; 25 21 26 - goBootstrap = runCommand "go-bootstrap" { } '' 27 - mkdir $out 28 - cp -rf ${go_bootstrap}/* $out/ 29 - chmod -R u+w $out 30 - find $out -name "*.c" -delete 31 - cp -rf $out/bin/* $out/share/go/bin/ 32 - ''; 22 + skopeoTest = skopeo.override { buildGoModule = buildGo119Module; }; 33 23 34 24 goarch = platform: { 35 25 "aarch64" = "arm64"; ··· 63 53 }; 64 54 65 55 strictDeps = true; 66 - # perl is used for testing go vet 67 - nativeBuildInputs = [ perl which pkg-config procps ]; 68 - buildInputs = [ cacert pcre ] 56 + buildInputs = [ ] 69 57 ++ lib.optionals stdenv.isLinux [ stdenv.cc.libc.out ] 70 58 ++ lib.optionals (stdenv.hostPlatform.libc == "glibc") [ stdenv.cc.libc.static ]; 71 59 72 - propagatedBuildInputs = lib.optionals stdenv.isDarwin [ xcbuild ]; 73 - 74 - depsTargetTargetPropagated = lib.optionals stdenv.isDarwin [ Security Foundation ]; 60 + depsTargetTargetPropagated = lib.optionals stdenv.isDarwin [ Foundation Security xcbuild ]; 75 61 76 62 depsBuildTarget = lib.optional isCross targetCC; 77 63 78 64 depsTargetTarget = lib.optional stdenv.targetPlatform.isWindows threadsCross; 79 65 80 - hardeningDisable = [ "all" ]; 81 - 82 - prePatch = '' 83 - patchShebangs ./ # replace /bin/bash 66 + postPatch = '' 67 + patchShebangs . 68 + ''; 84 69 85 - # This source produces shell script at run time, 86 - # and thus it is not corrected by patchShebangs. 87 - substituteInPlace misc/cgo/testcarchive/carchive_test.go \ 88 - --replace '#!/usr/bin/env bash' '#!${runtimeShell}' 89 - 70 + patches = [ 71 + (substituteAll { 72 + src = ./iana-etc-1.17.patch; 73 + iana = iana-etc; 74 + }) 90 75 # Patch the mimetype database location which is missing on NixOS. 91 76 # but also allow static binaries built with NixOS to run outside nix 92 - sed -i 's,\"/etc/mime.types,"${mailcap}/etc/mime.types\"\,\n\t&,' src/mime/type_unix.go 93 - 94 - # Disabling the 'os/http/net' tests (they want files not available in 95 - # chroot builds) 96 - rm src/net/{listen,parse}_test.go 97 - rm src/syscall/exec_linux_test.go 98 - 99 - # !!! substituteInPlace does not seems to be effective. 100 - # The os test wants to read files in an existing path. Just don't let it be /usr/bin. 101 - sed -i 's,/usr/bin,'"`pwd`", src/os/os_test.go 102 - sed -i 's,/bin/pwd,'"`type -P pwd`", src/os/os_test.go 103 - # Fails on aarch64 104 - sed -i '/TestFallocate/aif true \{ return\; \}' src/cmd/link/internal/ld/fallocate_test.go 105 - # Skip this test since ssl patches mess it up. 106 - sed -i '/TestLoadSystemCertsLoadColonSeparatedDirs/aif true \{ return\; \}' src/crypto/x509/root_unix_test.go 107 - # Disable another PIE test which breaks. 108 - sed -i '/TestTrivialPIE/aif true \{ return\; \}' misc/cgo/testshared/shared_test.go 109 - # Disable the BuildModePie test 110 - sed -i '/TestBuildmodePIE/aif true \{ return\; \}' src/cmd/go/go_test.go 111 - # Disable the unix socket test 112 - sed -i '/TestShutdownUnix/aif true \{ return\; \}' src/net/net_test.go 113 - # Disable the hostname test 114 - sed -i '/TestHostname/aif true \{ return\; \}' src/os/os_test.go 115 - # ParseInLocation fails the test 116 - sed -i '/TestParseInSydney/aif true \{ return\; \}' src/time/format_test.go 117 - # Remove the api check as it never worked 118 - sed -i '/src\/cmd\/api\/run.go/ireturn nil' src/cmd/dist/test.go 119 - # Remove the coverage test as we have removed this utility 120 - sed -i '/TestCoverageWithCgo/aif true \{ return\; \}' src/cmd/go/go_test.go 121 - # Remove the timezone naming test 122 - sed -i '/TestLoadFixed/aif true \{ return\; \}' src/time/time_test.go 123 - # Remove disable setgid test 124 - sed -i '/TestRespectSetgidDir/aif true \{ return\; \}' src/cmd/go/internal/work/build_test.go 125 - # Remove cert tests that conflict with NixOS's cert resolution 126 - sed -i '/TestEnvVars/aif true \{ return\; \}' src/crypto/x509/root_unix_test.go 127 - # TestWritevError hangs sometimes 128 - sed -i '/TestWritevError/aif true \{ return\; \}' src/net/writev_test.go 129 - # TestVariousDeadlines fails sometimes 130 - sed -i '/TestVariousDeadlines/aif true \{ return\; \}' src/net/timeout_test.go 131 - 132 - sed -i 's,/etc/protocols,${iana-etc}/etc/protocols,' src/net/lookup_unix.go 133 - sed -i 's,/etc/services,${iana-etc}/etc/services,' src/net/port_unix.go 134 - 135 - # Disable cgo lookup tests not works, they depend on resolver 136 - rm src/net/cgo_unix_test.go 137 - 77 + (substituteAll { 78 + src = ./mailcap-1.17.patch; 79 + inherit mailcap; 80 + }) 138 81 # prepend the nix path to the zoneinfo files but also leave the original value for static binaries 139 82 # that run outside a nix server 140 - sed -i 's,\"/usr/share/zoneinfo/,"${tzdata}/share/zoneinfo/\"\,\n\t&,' src/time/zoneinfo_unix.go 141 - 142 - '' + lib.optionalString stdenv.isAarch32 '' 143 - echo '#!${runtimeShell}' > misc/cgo/testplugin/test.bash 144 - '' + lib.optionalString stdenv.isDarwin '' 145 - substituteInPlace src/race.bash --replace \ 146 - "sysctl machdep.cpu.extfeatures | grep -qv EM64T" true 147 - sed -i 's,strings.Contains(.*sysctl.*,true {,' src/cmd/dist/util.go 148 - sed -i 's,"/etc","'"$TMPDIR"'",' src/os/os_test.go 149 - sed -i 's,/_go_os_test,'"$TMPDIR"'/_go_os_test,' src/os/path_test.go 150 - 151 - sed -i '/TestChdirAndGetwd/aif true \{ return\; \}' src/os/os_test.go 152 - sed -i '/TestCredentialNoSetGroups/aif true \{ return\; \}' src/os/exec/exec_posix_test.go 153 - sed -i '/TestRead0/aif true \{ return\; \}' src/os/os_test.go 154 - sed -i '/TestSystemRoots/aif true \{ return\; \}' src/crypto/x509/root_darwin_test.go 155 - 156 - sed -i '/TestGoInstallRebuildsStalePackagesInOtherGOPATH/aif true \{ return\; \}' src/cmd/go/go_test.go 157 - sed -i '/TestBuildDashIInstallsDependencies/aif true \{ return\; \}' src/cmd/go/go_test.go 158 - 159 - sed -i '/TestDisasmExtld/aif true \{ return\; \}' src/cmd/objdump/objdump_test.go 160 - 161 - sed -i 's/unrecognized/unknown/' src/cmd/link/internal/ld/lib.go 162 - 163 - # TestCurrent fails because Current is not implemented on Darwin 164 - sed -i 's/TestCurrent/testCurrent/g' src/os/user/user_test.go 165 - sed -i 's/TestLookup/testLookup/g' src/os/user/user_test.go 166 - 167 - touch $TMPDIR/group $TMPDIR/hosts $TMPDIR/passwd 168 - ''; 169 - 170 - patches = [ 83 + (substituteAll { 84 + src = ./tzdata-1.19.patch; 85 + inherit tzdata; 86 + }) 171 87 ./remove-tools-1.11.patch 172 - ./ssl-cert-file-1.16.patch 173 - ./remove-test-pie-1.15.patch 174 - ./skip-chown-tests-1.16.patch 175 - ./skip-external-network-tests-1.16.patch 176 - ./skip-nohup-tests.patch 177 - ./skip-cgo-tests-1.19.patch 178 88 ./go_no_vendor_checks-1.16.patch 179 89 ]; 180 90 181 - postPatch = '' 182 - find . -name '*.orig' -exec rm {} ';' 183 - ''; 184 - 185 91 GOOS = stdenv.targetPlatform.parsed.kernel.name; 186 92 GOARCH = goarch stdenv.targetPlatform; 187 93 # GOHOSTOS/GOHOSTARCH must match the building system, not the host system. ··· 206 112 GOARM = toString (lib.intersectLists [ (stdenv.hostPlatform.parsed.cpu.version or "") ] [ "5" "6" "7" ]); 207 113 GO386 = "softfloat"; # from Arch: don't assume sse2 on i686 208 114 CGO_ENABLED = 1; 209 - # Hopefully avoids test timeouts on Hydra 210 - GO_TEST_TIMEOUT_SCALE = 3; 211 - 212 - # Indicate that we are running on build infrastructure 213 - # Some tests assume things like home directories and users exists 214 - GO_BUILDER_NAME = "nix"; 215 115 216 116 GOROOT_BOOTSTRAP = "${goBootstrap}/share/go"; 217 117 218 - postConfigure = '' 118 + buildPhase = '' 119 + runHook preBuild 219 120 export GOCACHE=$TMPDIR/go-cache 220 121 # this is compiled into the binary 221 122 export GOROOT_FINAL=$out/share/go ··· 228 129 export CC=${buildPackages.stdenv.cc}/bin/cc 229 130 ''} 230 131 ulimit -a 231 - ''; 232 132 233 - postBuild = '' 234 - (cd src && ./make.bash) 235 - ''; 236 - 237 - doCheck = stdenv.hostPlatform == stdenv.targetPlatform && !stdenv.isDarwin; 238 - 239 - checkPhase = '' 240 - runHook preCheck 241 - (cd src && HOME=$TMPDIR GOCACHE=$TMPDIR/go-cache ./run.bash --no-rebuild) 242 - runHook postCheck 133 + pushd src 134 + ./make.bash 135 + popd 136 + runHook postBuild 243 137 ''; 244 138 245 139 preInstall = '' ··· 269 163 ''; 270 164 271 165 disallowedReferences = [ goBootstrap ]; 166 + 167 + passthru = { 168 + inherit goBootstrap skopeoTest; 169 + tests = { 170 + skopeo = testers.testVersion { package = skopeoTest; }; 171 + }; 172 + }; 272 173 273 174 meta = with lib; { 274 175 description = "The Go Programming language";
+4 -7
pkgs/development/compilers/go/binary.nix
··· 1 - { lib, stdenv, fetchurl, version, hashes }: 1 + { lib, stdenv, fetchurl, version, hashes, autoPatchelfHook }: 2 2 let 3 3 toGoKernel = platform: 4 4 if platform.isDarwin then "darwin" ··· 25 25 sha256 = hashes.${platform} or (throw "Missing Go bootstrap hash for platform ${platform}"); 26 26 }; 27 27 28 + nativeBuildInputs = lib.optionals stdenv.isLinux [ autoPatchelfHook ]; 29 + 28 30 # We must preserve the signature on Darwin 29 31 dontStrip = stdenv.hostPlatform.isDarwin; 30 32 31 33 installPhase = '' 32 34 runHook preInstall 33 35 mkdir -p $out/share/go $out/bin 34 - mv bin/* $out/bin 35 36 cp -r . $out/share/go 36 - ${lib.optionalString stdenv.isLinux ('' 37 - patchelf \ 38 - --set-interpreter $(cat $NIX_CC/nix-support/dynamic-linker) \ 39 - $out/bin/go 40 - '')} 37 + ln -s $out/share/go/bin/go $out/bin/go 41 38 runHook postInstall 42 39 ''; 43 40 }
+26
pkgs/development/compilers/go/iana-etc-1.17.patch
··· 1 + diff --git a/src/net/lookup_unix.go b/src/net/lookup_unix.go 2 + index 8030e3d99e..5a7472d933 100644 3 + --- a/src/net/lookup_unix.go 4 + +++ b/src/net/lookup_unix.go 5 + @@ -21,7 +21,7 @@ var onceReadProtocols sync.Once 6 + // readProtocols loads contents of /etc/protocols into protocols map 7 + // for quick access. 8 + func readProtocols() { 9 + - file, err := open("/etc/protocols") 10 + + file, err := open("@iana@/etc/protocols") 11 + if err != nil { 12 + return 13 + } 14 + diff --git a/src/net/port_unix.go b/src/net/port_unix.go 15 + index a9a96a2323..0df6efe9e5 100644 16 + --- a/src/net/port_unix.go 17 + +++ b/src/net/port_unix.go 18 + @@ -17,7 +17,7 @@ import ( 19 + var onceReadServices sync.Once 20 + 21 + func readServices() { 22 + - file, err := open("/etc/services") 23 + + file, err := open("@iana@/etc/services") 24 + if err != nil { 25 + return 26 + }
+12
pkgs/development/compilers/go/mailcap-1.17.patch
··· 1 + diff --git a/src/mime/type_unix.go b/src/mime/type_unix.go 2 + index f954bc8a1f..06d897bfbf 100644 3 + --- a/src/mime/type_unix.go 4 + +++ b/src/mime/type_unix.go 5 + @@ -26,6 +26,7 @@ var mimeGlobs = []string{ 6 + 7 + // Common locations for mime.types files on unix. 8 + var typeFiles = []string{ 9 + + "@mailcap@/etc/mime.types", 10 + "/etc/mime.types", 11 + "/etc/apache2/mime.types", 12 + "/etc/apache/mime.types",
-13
pkgs/development/compilers/go/skip-cgo-tests-1.19.patch
··· 1 - diff --git a/src/cmd/dist/test.go b/src/cmd/dist/test.go 2 - index e1cd4965c3..0980d044df 100644 3 - --- a/src/cmd/dist/test.go 4 - +++ b/src/cmd/dist/test.go 5 - @@ -1136,7 +1136,7 @@ func (t *tester) cgoTest(dt *distTest) error { 6 - t.addCmd(dt, "misc/cgo/test", t.goTest(), "-buildmode=pie", "-ldflags=-linkmode=internal") 7 - } 8 - t.addCmd(dt, "misc/cgo/testtls", t.goTest(), "-buildmode=pie", ".") 9 - - t.addCmd(dt, "misc/cgo/nocgo", t.goTest(), "-buildmode=pie", ".") 10 - + //t.addCmd(dt, "misc/cgo/nocgo", t.goTest(), "-buildmode=pie", ".") 11 - } 12 - } 13 - }
+12
pkgs/development/compilers/go/tzdata-1.17.patch
··· 1 + diff --git a/src/time/zoneinfo_unix.go b/src/time/zoneinfo_unix.go 2 + index 4ea029dbde..af94a4d90b 100644 3 + --- a/src/time/zoneinfo_unix.go 4 + +++ b/src/time/zoneinfo_unix.go 5 + @@ -20,6 +20,7 @@ import ( 6 + // Many systems use /usr/share/zoneinfo, Solaris 2 has 7 + // /usr/share/lib/zoneinfo, IRIX 6 has /usr/lib/locale/TZ. 8 + var zoneSources = []string{ 9 + + "@tzdata@/share/zoneinfo/", 10 + "/usr/share/zoneinfo/", 11 + "/usr/share/lib/zoneinfo/", 12 + "/usr/lib/locale/TZ/",
+12
pkgs/development/compilers/go/tzdata-1.19.patch
··· 1 + diff --git a/src/time/zoneinfo_unix.go b/src/time/zoneinfo_unix.go 2 + index 67b8beb47b..5cd1fb1759 100644 3 + --- a/src/time/zoneinfo_unix.go 4 + +++ b/src/time/zoneinfo_unix.go 5 + @@ -18,6 +18,7 @@ import ( 6 + // Many systems use /usr/share/zoneinfo, Solaris 2 has 7 + // /usr/share/lib/zoneinfo, IRIX 6 has /usr/lib/locale/TZ. 8 + var platformZoneSources = []string{ 9 + + "@tzdata@/share/zoneinfo/", 10 + "/usr/share/zoneinfo/", 11 + "/usr/share/lib/zoneinfo/", 12 + "/usr/lib/locale/TZ/",
-64
pkgs/development/compilers/rust/1_62.nix
··· 1 - # New rust versions should first go to staging. 2 - # Things to check after updating: 3 - # 1. Rustc should produce rust binaries on x86_64-linux, aarch64-linux and x86_64-darwin: 4 - # i.e. nix-shell -p fd or @GrahamcOfBorg build fd on github 5 - # This testing can be also done by other volunteers as part of the pull 6 - # request review, in case platforms cannot be covered. 7 - # 2. The LLVM version used for building should match with rust upstream. 8 - # Check the version number in the src/llvm-project git submodule in: 9 - # https://github.com/rust-lang/rust/blob/<version-tag>/.gitmodules 10 - # 3. Firefox and Thunderbird should still build on x86_64-linux. 11 - 12 - { stdenv, lib 13 - , buildPackages 14 - , newScope, callPackage 15 - , CoreFoundation, Security, SystemConfiguration 16 - , pkgsBuildTarget, pkgsBuildBuild, pkgsBuildHost 17 - , makeRustPlatform 18 - , llvmPackages_11 19 - , llvmPackages_14, llvm_14 20 - } @ args: 21 - 22 - import ./default.nix { 23 - rustcVersion = "1.62.1"; 24 - rustcSha256 = "sha256-cqy+b/zZT1mDgqdDCw2F7o9nnm0LJ/P1Zu0cFsl4Ez8="; 25 - 26 - llvmSharedForBuild = pkgsBuildBuild.llvmPackages_14.libllvm.override { enableSharedLibraries = true; }; 27 - llvmSharedForHost = pkgsBuildHost.llvmPackages_14.libllvm.override { enableSharedLibraries = true; }; 28 - llvmSharedForTarget = pkgsBuildTarget.llvmPackages_14.libllvm.override { enableSharedLibraries = true; }; 29 - 30 - llvmBootstrapForDarwin = llvmPackages_11; 31 - 32 - # For use at runtime 33 - llvmShared = llvm_14.override { enableSharedLibraries = true; }; 34 - 35 - # Expose llvmPackages used for rustc from rustc via passthru for LTO in Firefox 36 - llvmPackages = llvmPackages_14; 37 - 38 - # Note: the version MUST be one version prior to the version we're 39 - # building 40 - bootstrapVersion = "1.61.0"; 41 - 42 - # fetch hashes by running `print-hashes.sh ${bootstrapVersion}` 43 - bootstrapHashes = { 44 - i686-unknown-linux-gnu = "b15eb0ad44b7253e0b5b1a8cd285feb10e9fb0402840dba9a13112c3349a4b39"; 45 - x86_64-unknown-linux-gnu = "066b324239d30787ce64142d7e04912f2e1850c07db3b2354d8654e02ff8b23a"; 46 - x86_64-unknown-linux-musl = "0904f6b769ae28c259e0e25a41e99290a4ae2a36bca63ae153790b2ebbc427bf"; 47 - arm-unknown-linux-gnueabihf = "cc32705cd1b583aaac74e6663f71392131dc0355a0f484cb56f0378b71ea7ebc"; 48 - armv7-unknown-linux-gnueabihf = "2782ec75ea4abb402513e2e57becc6c14e67b492d57228cddedef6db0853b165"; 49 - aarch64-unknown-linux-gnu = "261cd47bc3c98c9f97b601d1ad2a7d9b33c9ea63c9a351119c2f6d4e82f5d436"; 50 - aarch64-unknown-linux-musl = "feb79985cb161a10b252236852df8db3bf3593c78905b84c7e94cd4454327e47"; 51 - x86_64-apple-darwin = "d851f1a473926a5d8f111ed08002047a5dc4ad944a5b7f8d5d2f1f266b51e66a"; 52 - aarch64-apple-darwin = "2dbafd13d007543aada47179fa273f9a3865f27e0a07bd69be61801232a0819e"; 53 - powerpc64le-unknown-linux-gnu = "6d5cd579b68a2adc20384406c69a92beaaf4941056e126ff0ed1ec2f3a4e721f"; 54 - riscv64gc-unknown-linux-gnu = "3d0f3b1a8522e09fffdf920a061794ac3107410eb1fe8f5d62a7aae3c6dcb81e"; 55 - mips64el-unknown-linux-gnuabi64 = "6ed5b6492e68f45488108abd06dbcd4b89c46cdbd4715331bb11e88f18500815"; 56 - }; 57 - 58 - selectRustPackage = pkgs: pkgs.rust_1_62; 59 - 60 - rustcPatches = [ 61 - ]; 62 - } 63 - 64 - (builtins.removeAttrs args [ "fetchpatch" "pkgsBuildHost" "llvmPackages_11" "llvmPackages_14" "llvm_14"])
+64
pkgs/development/compilers/rust/1_63.nix
··· 1 + # New rust versions should first go to staging. 2 + # Things to check after updating: 3 + # 1. Rustc should produce rust binaries on x86_64-linux, aarch64-linux and x86_64-darwin: 4 + # i.e. nix-shell -p fd or @GrahamcOfBorg build fd on github 5 + # This testing can be also done by other volunteers as part of the pull 6 + # request review, in case platforms cannot be covered. 7 + # 2. The LLVM version used for building should match with rust upstream. 8 + # Check the version number in the src/llvm-project git submodule in: 9 + # https://github.com/rust-lang/rust/blob/<version-tag>/.gitmodules 10 + # 3. Firefox and Thunderbird should still build on x86_64-linux. 11 + 12 + { stdenv, lib 13 + , buildPackages 14 + , newScope, callPackage 15 + , CoreFoundation, Security, SystemConfiguration 16 + , pkgsBuildTarget, pkgsBuildBuild, pkgsBuildHost 17 + , makeRustPlatform 18 + , llvmPackages_11 19 + , llvmPackages_14, llvm_14 20 + } @ args: 21 + 22 + import ./default.nix { 23 + rustcVersion = "1.63.0"; 24 + rustcSha256 = "1l4rrbzhxv88pnfq94nbyb9m6lfnjwixma3mwjkmvvs2aqlq158z"; 25 + 26 + llvmSharedForBuild = pkgsBuildBuild.llvmPackages_14.libllvm.override { enableSharedLibraries = true; }; 27 + llvmSharedForHost = pkgsBuildHost.llvmPackages_14.libllvm.override { enableSharedLibraries = true; }; 28 + llvmSharedForTarget = pkgsBuildTarget.llvmPackages_14.libllvm.override { enableSharedLibraries = true; }; 29 + 30 + llvmBootstrapForDarwin = llvmPackages_11; 31 + 32 + # For use at runtime 33 + llvmShared = llvm_14.override { enableSharedLibraries = true; }; 34 + 35 + # Expose llvmPackages used for rustc from rustc via passthru for LTO in Firefox 36 + llvmPackages = llvmPackages_14; 37 + 38 + # Note: the version MUST be one version prior to the version we're 39 + # building 40 + bootstrapVersion = "1.62.1"; 41 + 42 + # fetch hashes by running `print-hashes.sh ${bootstrapVersion}` 43 + bootstrapHashes = { 44 + i686-unknown-linux-gnu = "1669163ffe01e252ffb62da7d84949378fc274931a65ac827d54059a5ffc542c"; 45 + x86_64-unknown-linux-gnu = "dd7d82b8fa8eae59729e1c31fe59a9de6ee61d08ab40ce016185653beebe04d2"; 46 + x86_64-unknown-linux-musl = "32bee487074b105e2582cddce35934a6019eec74bae3f9300fdc3edfcf5b66d4"; 47 + arm-unknown-linux-gnueabihf = "5c735e8174d394936d7b499c2d147ddadf3c4d77e652d1e0b0a72d9d09f81ea4"; 48 + armv7-unknown-linux-gnueabihf = "26fa731385f1a71211ba8e3c94f3bb3b1a82bde89f8d4dcf75b4b463b57b0f88"; 49 + aarch64-unknown-linux-gnu = "1311fa8204f895d054c23a3481de3b158a5cd3b3a6338761fee9cdf4dbf075a5"; 50 + aarch64-unknown-linux-musl = "73bbab4d8a9e3c416035d40406e656ab37e785df35fa069a33af52e931a24b12"; 51 + x86_64-apple-darwin = "0a04dcf2b521239826f3eaa66d77169d91e68087ccc3107b54e8aba7c02c9adf"; 52 + aarch64-apple-darwin = "6d1671ea31b05cab5e2587cc2b295b3e7232b0135f0977355618e2a01933ff0a"; 53 + powerpc64le-unknown-linux-gnu = "1d3248e1a673cda87cf443cd4334ff5fb53e6f87c72d3587b07e5c0cb507f3ae"; 54 + riscv64gc-unknown-linux-gnu = "fd378d0bf866689e8111aba0e2b020da87f32f70fb11d98a575d42dc05978c2a"; 55 + mips64el-unknown-linux-gnuabi64 = "b7c47dd94728161aa96762fb7bc51b6ab0feba7c5215d06eaea5b78649815a96"; 56 + }; 57 + 58 + selectRustPackage = pkgs: pkgs.rust_1_63; 59 + 60 + rustcPatches = [ 61 + ]; 62 + } 63 + 64 + (builtins.removeAttrs args [ "fetchpatch" "pkgsBuildHost" "llvmPackages_11" "llvmPackages_14" "llvm_14"])
+8 -26
pkgs/development/compilers/rust/binary.nix
··· 1 1 { lib, stdenv, makeWrapper, bash, curl, darwin, zlib 2 + , autoPatchelfHook, gcc 2 3 , version 3 4 , src 4 5 , platform ··· 31 32 license = [ licenses.mit licenses.asl20 ]; 32 33 }; 33 34 35 + nativeBuildInputs = lib.optional (!stdenv.isDarwin) autoPatchelfHook; 34 36 buildInputs = [ bash ] 37 + ++ lib.optionals (!stdenv.isDarwin) [ gcc.cc.lib zlib ] 35 38 ++ lib.optional stdenv.isDarwin Security; 36 39 37 40 postPatch = '' ··· 42 45 ./install.sh --prefix=$out \ 43 46 --components=${installComponents} 44 47 45 - ${optionalString (stdenv.isLinux && bootstrapping) ('' 46 - patchelf \ 47 - --set-interpreter $(cat $NIX_CC/nix-support/dynamic-linker) \ 48 - "$out/bin/rustc" 49 - '' + optionalString (lib.versionAtLeast version "1.46") 50 - # rustc bootstrap needs libz starting from 1.46 51 - '' 52 - ln -s ${zlib}/lib/libz.so.1 $out/lib/libz.so.1 53 - ln -s ${zlib}/lib/libz.so $out/lib/libz.so 54 - '' + '' 55 - patchelf \ 56 - --set-interpreter $(cat $NIX_CC/nix-support/dynamic-linker) \ 57 - "$out/bin/rustdoc" 58 - patchelf \ 59 - --set-interpreter $(cat $NIX_CC/nix-support/dynamic-linker) \ 60 - "$out/bin/cargo" 61 - '')} 62 - 63 48 # Do NOT, I repeat, DO NOT use `wrapProgram` on $out/bin/rustc 64 49 # (or similar) here. It causes strange effects where rustc loads 65 50 # the wrong libraries in a bootstrap-build causing failures that ··· 83 68 license = [ licenses.mit licenses.asl20 ]; 84 69 }; 85 70 86 - nativeBuildInputs = [ makeWrapper ]; 87 - buildInputs = [ bash ] ++ lib.optional stdenv.isDarwin Security; 71 + nativeBuildInputs = [ makeWrapper ] 72 + ++ lib.optional (!stdenv.isDarwin) autoPatchelfHook; 73 + buildInputs = [ bash ] 74 + ++ lib.optional (!stdenv.isDarwin) gcc.cc.lib 75 + ++ lib.optional stdenv.isDarwin Security; 88 76 89 77 postPatch = '' 90 78 patchShebangs . ··· 94 82 patchShebangs ./install.sh 95 83 ./install.sh --prefix=$out \ 96 84 --components=cargo 97 - 98 - ${optionalString (stdenv.isLinux && bootstrapping) '' 99 - patchelf \ 100 - --set-interpreter $(cat $NIX_CC/nix-support/dynamic-linker) \ 101 - "$out/bin/cargo" 102 - ''} 103 85 104 86 wrapProgram "$out/bin/cargo" \ 105 87 --suffix PATH : "${rustc}/bin"
+2
pkgs/development/compilers/rust/cargo.nix
··· 72 72 maintainers = with maintainers; [ retrry ]; 73 73 license = [ licenses.mit licenses.asl20 ]; 74 74 platforms = platforms.unix; 75 + # weird segfault in a build script 76 + broken = stdenv.targetPlatform.isMusl && !stdenv.targetPlatform.isStatic; 75 77 }; 76 78 }
+4 -3
pkgs/development/compilers/rust/rustc.nix
··· 87 87 "${setBuild}.cxx=${cxxForBuild}" 88 88 "${setHost}.cxx=${cxxForHost}" 89 89 "${setTarget}.cxx=${cxxForTarget}" 90 + 91 + "${setBuild}.crt-static=${lib.boolToString stdenv.buildPlatform.isStatic}" 92 + "${setHost}.crt-static=${lib.boolToString stdenv.hostPlatform.isStatic}" 93 + "${setTarget}.crt-static=${lib.boolToString stdenv.targetPlatform.isStatic}" 90 94 ] ++ optionals (!withBundledLLVM) [ 91 95 "--enable-llvm-link-shared" 92 96 "${setBuild}.llvm-config=${llvmSharedForBuild.dev}/bin/llvm-config" ··· 188 192 maintainers = with maintainers; [ madjar cstrahan globin havvy ]; 189 193 license = [ licenses.mit licenses.asl20 ]; 190 194 platforms = platforms.linux ++ platforms.darwin; 191 - # rustc can't generate binaries for dynamically linked Musl. 192 - # https://github.com/NixOS/nixpkgs/issues/179242 193 - broken = stdenv.targetPlatform.isMusl && !stdenv.targetPlatform.isStatic; 194 195 }; 195 196 }
+3 -3
pkgs/development/interpreters/evcxr/default.nix
··· 3 3 4 4 rustPlatform.buildRustPackage rec { 5 5 pname = "evcxr"; 6 - version = "0.12.0"; 6 + version = "0.13.0"; 7 7 8 8 src = fetchFromGitHub { 9 9 owner = "google"; 10 10 repo = "evcxr"; 11 11 rev = "v${version}"; 12 - sha256 = "sha256-sD/eykXoeJq43o3xyFx2VIoH+xZrMmb6vZKVt4CO7B4="; 12 + sha256 = "sha256-n9wDO4HIWLINbqGVxaZyAEFVDLLnSpQLKlFf20jLq6o="; 13 13 }; 14 14 15 - cargoSha256 = "sha256-eySdhzavm9NGv2xjgdq/C2iv6lxdulhgYNs9ehnSzKQ="; 15 + cargoSha256 = "sha256-zdIJb9fXRByyAJ32RL9lQh6oS1K78IlZfWdJyj+MMZM="; 16 16 17 17 RUST_SRC_PATH = "${rustPlatform.rustLibSrc}"; 18 18
-5
pkgs/development/interpreters/python/cpython/default.nix
··· 430 430 # This allows build Python to import host Python's sysconfigdata 431 431 mkdir -p "$out/${sitePackages}" 432 432 ln -s "$out/lib/${libPrefix}/"_sysconfigdata*.py "$out/${sitePackages}/" 433 - 434 - # debug info can't be separated from a static library and would otherwise be 435 - # left in place by a separateDebugInfo build. force its removal here to save 436 - # space in output. 437 - $STRIP -S $out/lib/${libPrefix}/config-*/libpython*.a || true 438 433 '' + optionalString stripConfig '' 439 434 rm -R $out/bin/python*-config $out/lib/python*/config-* 440 435 '' + optionalString stripIdlelib ''
+8
pkgs/development/interpreters/python/hooks/default.nix
··· 164 164 }; 165 165 } ./setuptools-check-hook.sh) {}; 166 166 167 + unittestCheckHook = callPackage ({ }: 168 + makeSetupHook { 169 + name = "unittest-check-hook"; 170 + substitutions = { 171 + inherit pythonCheckInterpreter; 172 + }; 173 + } ./unittest-check-hook.sh) {}; 174 + 167 175 venvShellHook = disabledIf (!isPy3k) (callPackage ({ }: 168 176 makeSetupHook { 169 177 name = "venv-shell-hook";
+29
pkgs/development/interpreters/python/hooks/unittest-check-hook.sh
··· 1 + # Setup hook for unittest. 2 + echo "Sourcing unittest-check-hook" 3 + 4 + unittestCheckPhase() { 5 + echo "Executing unittestCheckPhase" 6 + runHook preCheck 7 + 8 + eval "@pythonCheckInterpreter@ -m unittest discover $unittestFlagsArray" 9 + 10 + runHook postCheck 11 + echo "Finished executing unittestCheckPhase" 12 + } 13 + 14 + if [ -z "${dontUseUnittestCheck-}" ] && [ -z "${installCheckPhase-}" ]; then 15 + echo "Using unittestCheckPhase" 16 + preDistPhases+=" unittestCheckPhase" 17 + 18 + # It's almost always the case that setuptoolsCheckPhase should not be ran 19 + # when the unittestCheckHook is being ran 20 + if [ -z "${useSetuptoolsCheck-}" ]; then 21 + dontUseSetuptoolsCheck=1 22 + 23 + # Remove command if already injected into preDistPhases 24 + if [[ "$preDistPhases" =~ "setuptoolsCheckPhase" ]]; then 25 + echo "Removing setuptoolsCheckPhase" 26 + preDistPhases=${preDistPhases/setuptoolsCheckPhase/} 27 + fi 28 + fi 29 + fi
+2 -8
pkgs/development/interpreters/ruby/default.nix
··· 19 19 20 20 generic = { version, sha256 }: let 21 21 ver = version; 22 - tag = ver.gitTag; 23 22 atLeast30 = lib.versionAtLeast ver.majMin "3.0"; 24 23 self = lib.makeOverridable ( 25 24 { stdenv, buildPackages, lib ··· 225 224 ++ op useBaseRuby baseRuby; 226 225 227 226 meta = with lib; { 228 - description = "The Ruby language"; 229 - homepage = "http://www.ruby-lang.org/en/"; 227 + description = "An object-oriented language for quick and easy programming"; 228 + homepage = "https://www.ruby-lang.org/"; 230 229 license = licenses.ruby; 231 230 maintainers = with maintainers; [ vrthra manveru marsam ]; 232 231 platforms = platforms.all; ··· 248 247 ruby = self; 249 248 }) withPackages gems; 250 249 251 - # deprecated 2016-09-21 252 - majorVersion = ver.major; 253 - minorVersion = ver.minor; 254 - teenyVersion = ver.tiny; 255 - patchLevel = ver.patchLevel; 256 250 } // lib.optionalAttrs useBaseRuby { 257 251 inherit baseRuby; 258 252 };
+11 -6
pkgs/development/interpreters/ruby/patchsets.nix
··· 2 2 3 3 { 4 4 "2.7.6" = ops useRailsExpress [ 5 - "${patchSet}/patches/ruby/2.7/head/railsexpress/01-fix-broken-tests-caused-by-ad.patch" 6 - "${patchSet}/patches/ruby/2.7/head/railsexpress/02-improve-gc-stats.patch" 7 - "${patchSet}/patches/ruby/2.7/head/railsexpress/03-more-detailed-stacktrace.patch" 5 + "${patchSet}/patches/ruby/2.7/head/railsexpress/01-fix-with-openssl-dir-option.patch" 6 + "${patchSet}/patches/ruby/2.7/head/railsexpress/02-fix-broken-tests-caused-by-ad.patch" 7 + "${patchSet}/patches/ruby/2.7/head/railsexpress/03-improve-gc-stats.patch" 8 + "${patchSet}/patches/ruby/2.7/head/railsexpress/04-more-detailed-stacktrace.patch" 9 + "${patchSet}/patches/ruby/2.7/head/railsexpress/05-malloc-trim.patch" 8 10 ]; 9 11 "3.0.4" = ops useRailsExpress [ 10 - "${patchSet}/patches/ruby/3.0/head/railsexpress/01-improve-gc-stats.patch" 11 - "${patchSet}/patches/ruby/3.0/head/railsexpress/02-malloc-trim.patch" 12 + "${patchSet}/patches/ruby/3.0/head/railsexpress/01-fix-with-openssl-dir-option.patch" 13 + "${patchSet}/patches/ruby/3.0/head/railsexpress/02-improve-gc-stats.patch" 14 + "${patchSet}/patches/ruby/3.0/head/railsexpress/03-malloc-trim.patch" 12 15 ]; 13 - "3.1.2" = ops useRailsExpress [ # no patches yet (2021-12-25) 16 + "3.1.2" = ops useRailsExpress [ 17 + "${patchSet}/patches/ruby/3.1/head/railsexpress/01-improve-gc-stats.patch" 18 + "${patchSet}/patches/ruby/3.1/head/railsexpress/02-malloc-trim.patch" 14 19 ]; 15 20 }
+2 -2
pkgs/development/interpreters/ruby/rubygems/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "rubygems"; 5 - version = "3.2.26"; 5 + version = "3.3.20"; 6 6 7 7 src = fetchurl { 8 8 url = "https://rubygems.org/rubygems/rubygems-${version}.tgz"; 9 - sha256 = "sha256-9wa6lOWnua8zBblQKRgjjiTVPYp2TW0n7XOvgW7u1e8="; 9 + sha256 = "sha256-VTUMZ2mqbszM7uXOYV6Grg7dkeGAGVXYjBX0hA/vOTg="; 10 10 }; 11 11 12 12 patches = [
+2 -2
pkgs/development/interpreters/ruby/rvm-patchsets.nix
··· 3 3 fetchFromGitHub { 4 4 owner = "skaes"; 5 5 repo = "rvm-patchsets"; 6 - rev = "0251817e2b9d5f73370bbbb12fdf7f7089bd1ac3"; 7 - sha256 = "1biiq5xzzdfb4hr1sgmx14i2nr05xa9w21pc7dl8c5n4f2ilg8ss"; 6 + rev = "a6429bb1a7fb9b5798c22f43338739a6c192b42d"; 7 + sha256 = "sha256-NpSa+uGQA1rfHNcLzPNTK65J+Wk9ZlzhHFePDA4uuo0="; 8 8 }
-2
pkgs/development/libraries/giflib/default.nix
··· 31 31 32 32 nativeBuildInputs = lib.optionals stdenv.isDarwin [ fixDarwinDylibNames ]; 33 33 34 - buildInputs = [ xmlto docbook_xml_dtd_412 docbook_xsl libxml2 ]; 35 - 36 34 passthru.tests.static = pkgsStatic.giflib; 37 35 38 36 meta = {
+2 -2
pkgs/development/libraries/gjs/default.nix
··· 31 31 ]; 32 32 in stdenv.mkDerivation rec { 33 33 pname = "gjs"; 34 - version = "1.72.1"; 34 + version = "1.72.2"; 35 35 36 36 outputs = [ "out" "dev" "installedTests" ]; 37 37 38 38 src = fetchurl { 39 39 url = "mirror://gnome/sources/gjs/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; 40 - sha256 = "sha256-F8Cx7D8JZnH/i/q6bku/FBmMcBPGBL/Wd6mFjaB5wKs="; 40 + sha256 = "sha256-3e43m9xafTA6XYlL4rKBvrisVFCGBOfT8geBqGnaOXc="; 41 41 }; 42 42 43 43 patches = [
+19 -2
pkgs/development/libraries/glib/default.nix
··· 1 1 { config, lib, stdenv, fetchurl, gettext, meson, ninja, pkg-config, perl, python3 2 - , libiconv, zlib, libffi, pcre, libelf, gnome, libselinux, bash, gnum4, gtk-doc, docbook_xsl, docbook_xml_dtd_45 2 + , libiconv, zlib, libffi, pcre, libelf, gnome, libselinux, bash, gnum4, gtk-doc, docbook_xsl, docbook_xml_dtd_45, libxslt 3 3 # use util-linuxMinimal to avoid circular dependency (util-linux, systemd, glib) 4 4 , util-linuxMinimal ? null 5 5 , buildPackages ··· 124 124 (buildPackages.meson.override { 125 125 withDarwinFrameworksGtkDocPatch = stdenv.isDarwin; 126 126 }) 127 - ninja pkg-config perl python3 gettext gtk-doc docbook_xsl docbook_xml_dtd_45 libxml2 127 + ninja pkg-config perl python3 gettext gtk-doc docbook_xsl docbook_xml_dtd_45 libxml2 libxslt 128 128 ]; 129 129 130 130 propagatedBuildInputs = [ zlib libffi gettext libiconv ]; ··· 135 135 "-Dgtk_doc=${boolToString (stdenv.hostPlatform == stdenv.buildPlatform)}" 136 136 "-Dnls=enabled" 137 137 "-Ddevbindir=${placeholder "dev"}/bin" 138 + ] ++ optionals (!stdenv.isDarwin) [ 139 + "-Dman=true" # broken on Darwin 138 140 ]; 139 141 140 142 NIX_CFLAGS_COMPILE = toString [ ··· 167 169 # This file is *included* in gtk3 and would introduce runtime reference via __FILE__. 168 170 sed '1i#line 1 "${pname}-${version}/include/glib-2.0/gobject/gobjectnotifyqueue.c"' \ 169 171 -i "$dev"/include/glib-2.0/gobject/gobjectnotifyqueue.c 172 + for i in $bin/bin/*; do 173 + moveToOutput "share/bash-completion/completions/''${i##*/}" "$bin" 174 + done 175 + for i in $dev/bin/*; do 176 + moveToOutput "share/bash-completion/completions/''${i##*/}" "$dev" 177 + done 170 178 '' + optionalString (stdenv.hostPlatform != stdenv.buildPlatform) '' 171 179 cp -r ${buildPackages.glib.devdoc} $devdoc 180 + ''; 181 + 182 + # Move man pages to the same output as their binaries (needs to be 183 + # done after preFixupHooks which moves man pages too - in 184 + # _multioutDocs) 185 + postFixup = '' 186 + for i in $dev/bin/*; do 187 + moveToOutput "share/man/man1/''${i##*/}.1.*" "$dev" 188 + done 172 189 ''; 173 190 174 191 checkInputs = [ tzdata desktop-file-utils shared-mime-info ];
-9
pkgs/development/libraries/glibc/default.nix
··· 127 127 ln -sf $out/lib/libdl.so.2 $out/lib/libdl.so 128 128 ln -sf $out/lib/libutil.so.1 $out/lib/libutil.so 129 129 touch $out/lib/libpthread.a 130 - '' 131 - # For some reason these aren't stripped otherwise and retain reference 132 - # to bootstrap-tools; on cross-arm this stripping would break objects. 133 - + lib.optionalString (stdenv.hostPlatform == stdenv.buildPlatform) '' 134 - 135 - for i in "$out"/lib/*.a; do 136 - [ "$i" = "$out/lib/libm.a" ] || $STRIP -S "$i" 137 - done 138 - '' + '' 139 130 140 131 # Put libraries for static linking in a separate output. Note 141 132 # that libc_nonshared.a and libpthread_nonshared.a are required
+2 -12
pkgs/development/libraries/gnu-efi/default.nix
··· 5 5 6 6 stdenv.mkDerivation rec { 7 7 pname = "gnu-efi"; 8 - version = "3.0.14"; 8 + version = "3.0.15"; 9 9 10 10 src = fetchurl { 11 11 url = "mirror://sourceforge/gnu-efi/${pname}-${version}.tar.bz2"; 12 - sha256 = "tztkOg1Wl9HzltdDFEjoht2AVmh4lXjj4aKCd8lShDU="; 12 + sha256 = "sha256-kxole5xcG6Zf9Rnxg3PEOKJoJfLbeGaxY+ltGxaPIOo="; 13 13 }; 14 - 15 - patches = [ 16 - # Pull fix pending upstream inclusion for parallel builds 17 - # https://sourceforge.net/p/gnu-efi/patches/84/ 18 - (fetchurl { 19 - name = "parallel-build.patch"; 20 - url = "https://sourceforge.net/p/gnu-efi/patches/84/attachment/0001-lib-Makefile-add-.o-file-dependency-on-libsubdirs-ta.patch"; 21 - sha256 = "sha256-+2UwV2lopdB/tazib1BLzO1E3GgB1L8dZsSQKWVoLwA="; 22 - }) 23 - ]; 24 14 25 15 buildInputs = [ pciutils ]; 26 16
+2 -2
pkgs/development/libraries/gnutls/default.nix
··· 22 22 23 23 stdenv.mkDerivation rec { 24 24 pname = "gnutls"; 25 - version = "3.7.6"; 25 + version = "3.7.7"; 26 26 27 27 src = fetchurl { 28 28 url = "mirror://gnupg/gnutls/v${lib.versions.majorMinor version}/gnutls-${version}.tar.xz"; 29 - sha256 = "1zv2097v9f6f4c66q7yn3c6gggjk9jz38095ma7v3gs5lccmf1kp"; 29 + sha256 = "sha256-vpFD0NWOq2TbqbdxFKqvrFKbbA1+gd5r3xybWQJ9IQY="; 30 30 }; 31 31 32 32 outputs = [ "bin" "dev" "out" "man" "devdoc" ];
+4 -4
pkgs/development/libraries/gperftools/default.nix
··· 8 8 9 9 stdenv.mkDerivation rec { 10 10 pname = "gperftools"; 11 - version = "2.9.1"; 11 + version = "2.10"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = pname; 15 15 repo = pname; 16 16 rev = "${pname}-${version}"; 17 - sha256 = "sha256-loUlC6mtR3oyS5opSmicCnfUqcefSk8+kKDcHNmC/oo="; 17 + sha256 = "sha256-lUX9T31cYZEi+0DgF52EDSL9yiSHa8ToMxhpQFKHOGk="; 18 18 }; 19 19 20 20 patches = [ ··· 28 28 29 29 nativeBuildInputs = [ autoreconfHook ]; 30 30 31 - # tcmalloc uses libunwind in a way that works correctly only on non-ARM linux 32 - buildInputs = lib.optional (stdenv.isLinux && !stdenv.hostPlatform.isAarch) libunwind; 31 + # tcmalloc uses libunwind in a way that works correctly only on non-ARM dynamically linked linux 32 + buildInputs = lib.optional (stdenv.isLinux && !(stdenv.hostPlatform.isAarch || stdenv.hostPlatform.isStatic )) libunwind; 33 33 34 34 # Disable general dynamic TLS on AArch to support dlopen()'ing the library: 35 35 # https://bugzilla.redhat.com/show_bug.cgi?id=1483558
+2 -2
pkgs/development/libraries/gpgme/default.nix
··· 27 27 in 28 28 stdenv.mkDerivation rec { 29 29 pname = "gpgme"; 30 - version = "1.17.1"; 30 + version = "1.18.0"; 31 31 32 32 src = fetchurl { 33 33 url = "mirror://gnupg/gpgme/${pname}-${version}.tar.bz2"; 34 - hash = "sha256-cR6r9d1mG5sEvp7cms4qe8Ax9r2dN6do0C0O/e8Qj18="; 34 + hash = "sha256-Nh1OrkfOkl26DqVpr0DntSxkXEri5l5WIb8bbN2LDp4="; 35 35 }; 36 36 37 37 patches = [
+2 -2
pkgs/development/libraries/gsm/default.nix
··· 10 10 11 11 stdenv.mkDerivation rec { 12 12 pname = "gsm"; 13 - version = "1.0.19"; 13 + version = "1.0.20"; 14 14 15 15 src = fetchurl { 16 16 url = "http://www.quut.com/gsm/${pname}-${version}.tar.gz"; 17 - sha256 = "1xkha9ss5g5qnfaybi8il0mcvp8knwg9plgh8404vh58d0pna0s9"; 17 + sha256 = "sha256-YxXDhRi4HomcP8LtRjzGI68pxcIxpIwTeyQwIjSukL8="; 18 18 }; 19 19 20 20 patchPhase = ''
+1 -1
pkgs/development/libraries/gsound/default.nix
··· 31 31 description = "Small library for playing system sounds"; 32 32 maintainers = teams.gnome.members; 33 33 license = licenses.gpl2; 34 - platforms = platforms.linux; 34 + platforms = platforms.unix; 35 35 }; 36 36 }
+2 -2
pkgs/development/libraries/gstreamer/bad/default.nix
··· 98 98 99 99 stdenv.mkDerivation rec { 100 100 pname = "gst-plugins-bad"; 101 - version = "1.20.1"; 101 + version = "1.20.3"; 102 102 103 103 outputs = [ "out" "dev" ]; 104 104 105 105 src = fetchurl { 106 106 url = "https://gstreamer.freedesktop.org/src/${pname}/${pname}-${version}.tar.xz"; 107 - sha256 = "0j1q89dl8369djibc5p27lyj8y8p4maplmdzlryvrw0ib77w5lq9"; 107 + sha256 = "sha256-ehHBO1XdHSOG3ZAiGeQcv83ajh4Ko+c4GGyVB0s12k8="; 108 108 }; 109 109 110 110 nativeBuildInputs = [
+2 -2
pkgs/development/libraries/gstreamer/base/default.nix
··· 41 41 42 42 stdenv.mkDerivation rec { 43 43 pname = "gst-plugins-base"; 44 - version = "1.20.1"; 44 + version = "1.20.3"; 45 45 46 46 outputs = [ "out" "dev" ]; 47 47 48 48 src = fetchurl { 49 49 url = "https://gstreamer.freedesktop.org/src/${pname}/${pname}-${version}.tar.xz"; 50 - sha256 = "0162ly7pscymq6bsf1d5fva2k9s16zvfwyi1q6z4yfd97d0sdn4n"; 50 + sha256 = "sha256-fjCz3YGnA4D/dVT5mEcdaZb/drvm/FRHCW+FHiRHPJ8="; 51 51 }; 52 52 53 53 strictDeps = true;
+2 -2
pkgs/development/libraries/gstreamer/core/default.nix
··· 21 21 22 22 stdenv.mkDerivation rec { 23 23 pname = "gstreamer"; 24 - version = "1.20.1"; 24 + version = "1.20.3"; 25 25 26 26 outputs = [ 27 27 "bin" ··· 34 34 35 35 src = fetchurl { 36 36 url = "https://gstreamer.freedesktop.org/src/${pname}/${pname}-${version}.tar.xz"; 37 - sha256 = "0cghi6n4nhdbajz3wqcgbh5xm94myvnqgsi9g2bz9n1s9904l2fy"; 37 + sha256 = "sha256-YH2vZLu9X7GK+dF+IcDSLE1wL//oOyPLItGxryyiOio="; 38 38 }; 39 39 40 40 depsBuildBuild = [
+6 -2
pkgs/development/libraries/gstreamer/devtools/default.nix
··· 6 6 , pkg-config 7 7 , gstreamer 8 8 , gst-plugins-base 9 + , gst-plugins-bad 10 + , gst-rtsp-server 9 11 , python3 10 12 , gobject-introspection 11 13 , json-glib ··· 13 15 14 16 stdenv.mkDerivation rec { 15 17 pname = "gst-devtools"; 16 - version = "1.20.1"; 18 + version = "1.20.3"; 17 19 18 20 src = fetchurl { 19 21 url = "https://gstreamer.freedesktop.org/src/${pname}/${pname}-${version}.tar.xz"; 20 - sha256 = "0asbapgf485h2gqq0sn9c4qknwi0ccpraf1685ixp2sv23pwgwc1"; 22 + sha256 = "sha256-u71F6tcDNn6o9L6bPAgte2K+9HskCjkIPyeETih1jEc="; 21 23 }; 22 24 23 25 outputs = [ ··· 50 52 propagatedBuildInputs = [ 51 53 gstreamer 52 54 gst-plugins-base 55 + gst-plugins-bad 56 + gst-rtsp-server 53 57 ]; 54 58 55 59 mesonFlags = [
+2 -2
pkgs/development/libraries/gstreamer/ges/default.nix
··· 16 16 17 17 stdenv.mkDerivation rec { 18 18 pname = "gst-editing-services"; 19 - version = "1.20.1"; 19 + version = "1.20.3"; 20 20 21 21 outputs = [ 22 22 "out" ··· 26 26 27 27 src = fetchurl { 28 28 url = "https://gstreamer.freedesktop.org/src/${pname}/${pname}-${version}.tar.xz"; 29 - sha256 = "1ps887yyj6jkj8a2613n43b4fbvynxwryinxvavi00cfnlhipkka"; 29 + sha256 = "sha256-X9iW3mn74kQh62sP+NL4tMPLo/MCXOrNMCFy85qKuqI="; 30 30 }; 31 31 32 32 nativeBuildInputs = [
+2 -2
pkgs/development/libraries/gstreamer/good/default.nix
··· 49 49 50 50 stdenv.mkDerivation rec { 51 51 pname = "gst-plugins-good"; 52 - version = "1.20.1"; 52 + version = "1.20.3"; 53 53 54 54 outputs = [ "out" "dev" ]; 55 55 56 56 src = fetchurl { 57 57 url = "https://gstreamer.freedesktop.org/src/${pname}/${pname}-${version}.tar.xz"; 58 - sha256 = "1al4f35mx41cy2h6agvmsqkjfchsyfs0iyxzpv6pnl0xh9pqfriw"; 58 + sha256 = "sha256-+PPCBr9c2rwAlTkgtHs1da8O8V6fhxwLaWb20KpYaLc="; 59 59 }; 60 60 61 61 strictDeps = true;
+2 -2
pkgs/development/libraries/gstreamer/libav/default.nix
··· 16 16 17 17 stdenv.mkDerivation rec { 18 18 pname = "gst-libav"; 19 - version = "1.20.1"; 19 + version = "1.20.3"; 20 20 21 21 src = fetchurl { 22 22 url = "https://gstreamer.freedesktop.org/src/${pname}/${pname}-${version}.tar.xz"; 23 - sha256 = "1iwz7928yi48xia5kfkj54x5dfmhbj25g9125vainpmp6fv1z9wi"; 23 + sha256 = "sha256-P+3RBWD836obZGLL95o4xOe1fX85A1k5P8DO9tvyff4="; 24 24 }; 25 25 26 26 outputs = [ "out" "dev" ];
+2 -2
pkgs/development/libraries/gstreamer/rtsp-server/default.nix
··· 13 13 14 14 stdenv.mkDerivation rec { 15 15 pname = "gst-rtsp-server"; 16 - version = "1.20.1"; 16 + version = "1.20.3"; 17 17 18 18 src = fetchurl { 19 19 url = "https://gstreamer.freedesktop.org/src/${pname}/${pname}-${version}.tar.xz"; 20 - sha256 = "028maajlvfn96v3gqk2ws1k6w9hjfk7dsxnm84d73pnpi99bqia7"; 20 + sha256 = "sha256-7kAnGL6bEn8OXmbKTBtPQuSSbsk7owe3zMpdxsyXlMo="; 21 21 }; 22 22 23 23 outputs = [
+2 -2
pkgs/development/libraries/gstreamer/ugly/default.nix
··· 24 24 25 25 stdenv.mkDerivation rec { 26 26 pname = "gst-plugins-ugly"; 27 - version = "1.20.1"; 27 + version = "1.20.3"; 28 28 29 29 outputs = [ "out" "dev" ]; 30 30 31 31 src = fetchurl { 32 32 url = "https://gstreamer.freedesktop.org/src/${pname}/${pname}-${version}.tar.xz"; 33 - sha256 = "06fvgyjwcf4paqxgp1xmgd0d0glkxys7n818526k10wrw92m20s2"; 33 + sha256 = "sha256-jKogeJoJwwS0nPVj0zzKlCGxh1uE/MGH5KOF+gHWrv0="; 34 34 }; 35 35 36 36 nativeBuildInputs = [
+2 -2
pkgs/development/libraries/gstreamer/vaapi/default.nix
··· 21 21 22 22 stdenv.mkDerivation rec { 23 23 pname = "gstreamer-vaapi"; 24 - version = "1.20.1"; 24 + version = "1.20.3"; 25 25 26 26 src = fetchurl { 27 27 url = "https://gstreamer.freedesktop.org/src/${pname}/${pname}-${version}.tar.xz"; 28 - sha256 = "0dqiy8mhcpq3yla8dk69pkjid7hiv98ykvwskb4pk45g6z2zdyw7"; 28 + sha256 = "sha256-bumesxar3emtNwApFb2MOGeRj2/cdLfPKsTBrg1pC0U="; 29 29 }; 30 30 31 31 outputs = [
+11 -2
pkgs/development/libraries/harfbuzz/default.nix
··· 1 1 { lib 2 2 , stdenv 3 3 , fetchFromGitHub 4 + , fetchpatch 4 5 , pkg-config 5 6 , glib 6 7 , freetype ··· 30 31 }: 31 32 32 33 let 33 - version = "5.0.1"; 34 + version = "5.1.0"; 34 35 inherit (lib) optional optionals optionalString; 35 36 mesonFeatureFlag = opt: b: 36 37 "-D${opt}=${if b then "enabled" else "disabled"}"; ··· 44 45 owner = "harfbuzz"; 45 46 repo = "harfbuzz"; 46 47 rev = version; 47 - sha256 = "sha256-01hpSTesPpUO2T9v1sq3VvCSFEOMyaxbHhX0vS1ms/k="; 48 + sha256 = "sha256-K6iScmg1vNfwb1UYqtXsnijLVpcC+am2ZL+W5bLFzsI="; 48 49 }; 50 + 51 + patches = [ 52 + (fetchpatch { 53 + name = "aarch64-test-narrowing.diff"; 54 + url = "https://github.com/harfbuzz/harfbuzz/commit/04d28d94e576aab099891e6736fd0088dfac3366.diff"; 55 + sha256 = "sha256-099GP8t1G0kyYl79A6xJhfyrs3WXYitvn+He7sEz+Oo="; 56 + }) 57 + ]; 49 58 50 59 postPatch = '' 51 60 patchShebangs src/*.py test
+2 -2
pkgs/development/libraries/iso-codes/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "iso-codes"; 5 - version = "4.9.0"; 5 + version = "4.11.0"; 6 6 7 7 src = fetchurl { 8 8 url = "https://salsa.debian.org/iso-codes-team/iso-codes/-/archive/v${version}/${pname}-v${version}.tar.gz"; 9 - sha256 = "02lq602ghws423w04jsyjr92p0nmrfp59n1m5hbbi1c6fhxryghc"; 9 + sha256 = "sha256-QI95nfQTVGj6fKNetrBcQAS+pEPYHKWLibLkgkAagrs="; 10 10 }; 11 11 12 12 patchPhase = ''
+13 -9
pkgs/development/libraries/libcanberra/default.nix
··· 1 1 { stdenv, lib, fetchurl, fetchpatch, pkg-config, libtool 2 2 , gtk2-x11, gtk3-x11 , gtkSupport ? null 3 3 , libpulseaudio, gst_all_1, libvorbis, libcap 4 - , Carbon, CoreServices 4 + , Carbon, CoreServices, AppKit 5 5 , withAlsa ? stdenv.isLinux, alsa-lib }: 6 6 7 7 stdenv.mkDerivation rec { ··· 21 21 ] ++ (with gst_all_1; [ gstreamer gst-plugins-base ]) 22 22 ++ lib.optional (gtkSupport == "gtk2") gtk2-x11 23 23 ++ lib.optional (gtkSupport == "gtk3") gtk3-x11 24 - ++ lib.optionals stdenv.isDarwin [Carbon CoreServices] 24 + ++ lib.optionals stdenv.isDarwin [ Carbon CoreServices AppKit ] 25 25 ++ lib.optional stdenv.isLinux libcap 26 26 ++ lib.optional withAlsa alsa-lib; 27 27 ··· 33 33 url = "http://git.0pointer.net/libcanberra.git/patch/?id=c0620e432650e81062c1967cc669829dbd29b310"; 34 34 sha256 = "0rc7zwn39yxzxp37qh329g7375r5ywcqcaak8ryd0dgvg8m5hcx9"; 35 35 }) 36 + ] ++ lib.optionals stdenv.isDarwin [ 37 + (fetchpatch { 38 + url = "https://github.com/macports/macports-ports/raw/5a7965dfea7727d1ceedee46c7b0ccee9cb23468/audio/libcanberra/files/patch-configure.diff"; 39 + sha256 = "sha256-pEJy1krciUEg5BFIS8FJ4BubjfS/nt9aqi6BLnS1+4M="; 40 + extraPrefix = ""; 41 + }) 42 + (fetchpatch { 43 + url = "https://github.com/macports/macports-ports/raw/5a7965dfea7727d1ceedee46c7b0ccee9cb23468/audio/libcanberra/files/dynamic_lookup-11.patch"; 44 + sha256 = "sha256-nUjha2pKh5VZl0ZZzcr9NTo1TVuMqF4OcLiztxW+ofQ="; 45 + extraPrefix = ""; 46 + }) 36 47 ]; 37 - 38 - postPatch = lib.optionalString stdenv.isDarwin '' 39 - patch -p0 < ${fetchpatch { 40 - url = "https://raw.githubusercontent.com/macports/macports-ports/master/audio/libcanberra/files/patch-configure.diff"; 41 - sha256 = "1f7h7ifpqvbfhqygn1b7klvwi80zmpv3538vbmq7ql7bkf1q8h31"; 42 - }} 43 - ''; 44 48 45 49 postInstall = '' 46 50 for f in $out/lib/*.la; do
+2 -2
pkgs/development/libraries/libevdev/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "libevdev"; 5 - version = "1.12.1"; 5 + version = "1.13.0"; 6 6 7 7 src = fetchurl { 8 8 url = "https://www.freedesktop.org/software/${pname}/${pname}-${version}.tar.xz"; 9 - sha256 = "sha256-HbukG8UW08p6vA2luGLv4+qKcBj6bpuXzp05QBsiQmw="; 9 + sha256 = "sha256-nt8gBsyGpQVSeWR8OOySPRGoIe5NwsMDPo0g6O4jfNk="; 10 10 }; 11 11 12 12 nativeBuildInputs = [ python3 ];
+2 -18
pkgs/development/libraries/libgpg-error/default.nix
··· 17 17 }; 18 18 in stdenv.mkDerivation (rec { 19 19 pname = "libgpg-error"; 20 - version = "1.42"; 20 + version = "1.45"; 21 21 22 22 src = fetchurl { 23 23 url = "mirror://gnupg/${pname}/${pname}-${version}.tar.bz2"; 24 - sha256 = "sha256-/AfnD2xhX4xPWQqON6m43S4soelAj45gRZxnRSuSXiM="; 24 + sha256 = "sha256-Vw+O5PtL/3t0lc/5IMJ1ACrqIUfpodIgwGghMmf4CiY="; 25 25 }; 26 26 27 - # 1.42 breaks (some?) cross-compilation (e.g. x86_64 -> aarch64). 28 - # Backporting this fix (merged in upstream master but no release cut) by David Michael <fedora.dm0@gmail.com> https://dev.gnupg.org/rE33593864cd54143db594c4237bba41e14179061c 29 - patches = [ ./fix-1.42-cross-compilation.patch ]; 30 - 31 27 postPatch = '' 32 28 sed '/BUILD_TIMESTAMP=/s/=.*/=1970-01-01T00:01+0000/' -i ./configure 33 - '' + lib.optionalString (stdenv.hostPlatform.isAarch32 && stdenv.buildPlatform != stdenv.hostPlatform) '' 34 - ln -s lock-obj-pub.arm-unknown-linux-gnueabi.h src/syscfg/lock-obj-pub.linux-gnueabihf.h 35 - ln -s lock-obj-pub.arm-unknown-linux-gnueabi.h src/syscfg/lock-obj-pub.linux-gnueabi.h 36 - '' + lib.optionalString (stdenv.hostPlatform.isx86_64 && stdenv.hostPlatform.isMusl) '' 37 - ln -s lock-obj-pub.x86_64-pc-linux-musl.h src/syscfg/lock-obj-pub.linux-musl.h 38 - '' + lib.optionalString (stdenv.hostPlatform.isi686 && stdenv.hostPlatform.isMusl) '' 39 - ln -s lock-obj-pub.i686-unknown-linux-gnu.h src/syscfg/lock-obj-pub.linux-musl.h 40 - '' + lib.optionalString (stdenv.hostPlatform.isAarch32 && stdenv.hostPlatform.isMusl) '' 41 - ln -s lock-obj-pub.arm-unknown-linux-gnueabi.h src/syscfg/lock-obj-pub.arm-unknown-linux-musleabihf.h 42 - ln -s lock-obj-pub.arm-unknown-linux-gnueabi.h src/syscfg/lock-obj-pub.linux-musleabihf.h 43 - '' + lib.optionalString (stdenv.hostPlatform.isAarch64 && stdenv.hostPlatform.isMusl) '' 44 - ln -s lock-obj-pub.aarch64-unknown-linux-gnu.h src/syscfg/lock-obj-pub.linux-musl.h 45 29 ''; 46 30 47 31 outputs = [ "out" "dev" "info" ];
-142
pkgs/development/libraries/libgpg-error/fix-1.42-cross-compilation.patch
··· 1 - diff --git a/src/gen-lock-obj.sh b/src/gen-lock-obj.sh 2 - index a710f0c..258eec6 100755 3 - --- a/src/gen-lock-obj.sh 4 - +++ b/src/gen-lock-obj.sh 5 - @@ -1,136 +1,136 @@ 6 - #! /bin/sh 7 - # 8 - # gen-lock-obj.sh - Build tool to construct the lock object. 9 - # 10 - # Copyright (C) 2020, 2021 g10 Code GmbH 11 - # 12 - # This file is part of libgpg-error. 13 - # 14 - # libgpg-error is free software; you can redistribute it and/or 15 - # modify it under the terms of the GNU Lesser General Public License 16 - # as published by the Free Software Foundation; either version 2.1 of 17 - # the License, or (at your option) any later version. 18 - # 19 - # libgpg-error is distributed in the hope that it will be useful, but 20 - # WITHOUT ANY WARRANTY; without even the implied warranty of 21 - # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU 22 - # Lesser General Public License for more details. 23 - # 24 - # You should have received a copy of the GNU Lesser General Public 25 - # License along with this program; if not, see <https://www.gnu.org/licenses/>. 26 - # 27 - 28 - # 29 - # Following variables should be defined to invoke this script 30 - # 31 - # CC 32 - # OBJDUMP 33 - # AWK 34 - # ac_ext 35 - # ac_object 36 - # host 37 - # LOCK_ABI_VERSION 38 - # 39 - # An example: 40 - # 41 - # LOCK_ABI_VERSION=1 host=x86_64-pc-linux-gnu host_alias=x86_64-linux-gnu \ 42 - # CC=$host_alias-gcc OBJDUMP=$host_alias-objdump ac_ext=c ac_objext=o \ 43 - # AWK=gawk ./gen-lock-obj.sh 44 - # 45 - 46 - -if test -n `echo -n`; then 47 - +if test -n "`echo -n`"; then 48 - ECHO_C='\c' 49 - ECHO_N='' 50 - else 51 - ECHO_C='' 52 - ECHO_N='-n' 53 - fi 54 - 55 - if test "$1" = --disable-threads; then 56 - cat <<EOF 57 - ## lock-obj-pub.$host.h - NO LOCK SUPPORT 58 - ## File created by gen-lock-obj.sh - DO NOT EDIT 59 - ## To be included by mkheader into gpg-error.h 60 - 61 - /* Dummy object - no locking available. */ 62 - typedef struct 63 - { 64 - long _vers; 65 - } gpgrt_lock_t; 66 - 67 - #define GPGRT_LOCK_INITIALIZER {-1} 68 - EOF 69 - else 70 - AWK_VERSION_OUTPUT=$($AWK 'BEGIN { print PROCINFO["version"] }') 71 - if test -n "$AWK_VERSION_OUTPUT"; then 72 - # It's GNU awk, which supports PROCINFO. 73 - AWK_OPTION=--non-decimal-data 74 - fi 75 - 76 - cat <<'EOF' >conftest.$ac_ext 77 - #include <pthread.h> 78 - pthread_mutex_t mtx = PTHREAD_MUTEX_INITIALIZER; 79 - EOF 80 - 81 - if $CC -c conftest.$ac_ext; then : 82 - ac_mtx_size=$($OBJDUMP -j .bss -t conftest.$ac_objext \ 83 - | $AWK $AWK_OPTION ' 84 - /mtx$/ { mtx_size = int("0x" $5) } 85 - END { print mtx_size }') 86 - else 87 - echo "Can't determine mutex size" 88 - exit 1 89 - fi 90 - rm -f core conftest.err conftest.$ac_objext conftest.$ac_ext 91 - 92 - cat <<EOF 93 - ## lock-obj-pub.$host.h 94 - ## File created by gen-lock-obj.sh - DO NOT EDIT 95 - ## To be included by mkheader into gpg-error.h 96 - 97 - typedef struct 98 - { 99 - long _vers; 100 - union { 101 - volatile char _priv[$ac_mtx_size]; 102 - long _x_align; 103 - long *_xp_align; 104 - } u; 105 - } gpgrt_lock_t; 106 - 107 - EOF 108 - 109 - # FIXME: Support different alignment conditions of: 110 - # 111 - # USE_16BYTE_ALIGNMENT 112 - # USE_DOUBLE_FOR_ALIGNMENT 113 - # USE_LONG_DOUBLE_FOR_ALIGNMENT 114 - # 115 - 116 - echo ${ECHO_N} "#define GPGRT_LOCK_INITIALIZER {$LOCK_ABI_VERSION,{{${ECHO_C}" 117 - 118 - i=0 119 - while test "$i" -lt $ac_mtx_size; do 120 - if test "$i" -ne 0 -a "$(( $i % 8 ))" -eq 0; then 121 - echo ' \' 122 - echo ${ECHO_N} " ${ECHO_C}" 123 - fi 124 - echo ${ECHO_N} "0${ECHO_C}" 125 - if test "$i" -lt $(($ac_mtx_size - 1)); then 126 - echo ${ECHO_N} ",${ECHO_C}" 127 - fi 128 - i=$(( i + 1 )) 129 - done 130 - fi 131 - 132 - cat <<'EOF' 133 - }}} 134 - ## 135 - ## Local Variables: 136 - ## mode: c 137 - ## buffer-read-only: t 138 - ## End: 139 - ## 140 - EOF 141 - 142 - exit 0
+9 -4
pkgs/development/libraries/libhwy/default.nix
··· 23 23 24 24 nativeBuildInputs = [ cmake ninja ]; 25 25 26 - checkInputs = [ gtest ]; 27 - 28 26 # Required for case-insensitive filesystems ("BUILD" exists) 29 27 dontUseCmakeBuildDir = true; 30 28 31 - cmakeFlags = [ 29 + cmakeFlags = let 30 + libExt = stdenv.hostPlatform.extensions.library; 31 + in [ 32 32 "-GNinja" 33 33 "-DCMAKE_INSTALL_LIBDIR=lib" 34 34 "-DCMAKE_INSTALL_INCLUDEDIR=include" 35 - ] ++ lib.optional doCheck "-DHWY_SYSTEM_GTEST:BOOL=ON"; 35 + ] ++ lib.optionals doCheck [ 36 + "-DHWY_SYSTEM_GTEST:BOOL=ON" 37 + "-DGTEST_INCLUDE_DIR=${lib.getDev gtest}/include" 38 + "-DGTEST_LIBRARY=${lib.getLib gtest}/lib/libgtest${libExt}" 39 + "-DGTEST_MAIN_LIBRARY=${lib.getLib gtest}/lib/libgtest_main${libExt}" 40 + ]; 36 41 37 42 # hydra's darwin machines run into https://github.com/libjxl/libjxl/issues/408 38 43 doCheck = !stdenv.hostPlatform.isDarwin;
+2 -2
pkgs/development/libraries/libidn/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "libidn"; 5 - version = "1.38"; 5 + version = "1.41"; 6 6 7 7 src = fetchurl { 8 8 url = "mirror://gnu/libidn/${pname}-${version}.tar.gz"; 9 - sha256 = "sha256-3gC4QPdXzTuxTdmiDVk2RzI13cugbUvC2oBGVLi78PY="; 9 + sha256 = "sha256-iE1wY2S4Gr3Re+6Whtj/KudDHFoUZRBHxorfizH9iUU="; 10 10 }; 11 11 12 12 outputs = [ "bin" "dev" "out" "info" "devdoc" ];
+2 -2
pkgs/development/libraries/libjpeg-turbo/default.nix
··· 31 31 stdenv.mkDerivation rec { 32 32 33 33 pname = "libjpeg-turbo"; 34 - version = "2.1.3"; 34 + version = "2.1.4"; 35 35 36 36 src = fetchFromGitHub { 37 37 owner = "libjpeg-turbo"; 38 38 repo = "libjpeg-turbo"; 39 39 rev = version; 40 - sha256 = "sha256-GbOYoCNAsOESXrEsBb6OHVB4TKhPUEU04PBp8qXVMug="; 40 + sha256 = "sha256-1NRoVIL3zXX1D6iOf2FCrwBEcDW7TYFbdIbCTjY1m8Q="; 41 41 }; 42 42 43 43 # This is needed by freeimage
+8 -1
pkgs/development/libraries/libjxl/default.nix
··· 23 23 pname = "libjxl"; 24 24 version = "0.6.1"; 25 25 26 + outputs = [ "out" "dev" ]; 27 + 26 28 src = fetchFromGitHub { 27 29 owner = "libjxl"; 28 30 repo = "libjxl"; ··· 67 69 pkg-config 68 70 ] ++ lib.optionals buildDocs [ 69 71 asciidoc 70 - graphviz 71 72 doxygen 72 73 python3 73 74 ]; 74 75 76 + depsBuildBuild = lib.optionals buildDocs [ 77 + graphviz 78 + ]; 79 + 75 80 # Functionality not currently provided by this package 76 81 # that the cmake build can apparently use: 77 82 # OpenGL/GLUT (for Examples -> comparison with sjpeg) ··· 123 128 # * the `gdk-pixbuf` one, which allows applications like `eog` to load jpeg-xl files 124 129 # * the `gimp` one, which allows GIMP to load jpeg-xl files 125 130 # "-DJPEGXL_ENABLE_PLUGINS=ON" 131 + ] ++ lib.optionals stdenv.hostPlatform.isStatic [ 132 + "-DJPEGXL_STATIC=ON" 126 133 ]; 127 134 128 135 LDFLAGS = lib.optionalString stdenv.hostPlatform.isRiscV "-latomic";
+2
pkgs/development/libraries/liblqr-1/default.nix
··· 4 4 pname = "liblqr-1"; 5 5 version = "0.4.2"; 6 6 7 + outputs = [ "out" "dev" ]; 8 + 7 9 src = fetchFromGitHub { 8 10 owner = "carlobaldassi"; 9 11 repo = "liblqr";
+2 -2
pkgs/development/libraries/libnftnl/default.nix
··· 1 1 { lib, stdenv, fetchurl, pkg-config, libmnl }: 2 2 3 3 stdenv.mkDerivation rec { 4 - version = "1.2.2"; 4 + version = "1.2.3"; 5 5 pname = "libnftnl"; 6 6 7 7 src = fetchurl { 8 8 url = "https://netfilter.org/projects/${pname}/files/${pname}-${version}.tar.bz2"; 9 - hash = "sha256-nvwAT50VkY1o+emOGU1V4DAWjzO7Z8PnpUW3QMntbQo="; 9 + hash = "sha256-6Rbqm3n5UYVguaGHJRp8BCRCqey85/Nr55CIiGBdAlU="; 10 10 }; 11 11 12 12 nativeBuildInputs = [ pkg-config ];
+2 -2
pkgs/development/libraries/libvpx/default.nix
··· 56 56 57 57 stdenv.mkDerivation rec { 58 58 pname = "libvpx"; 59 - version = "1.11.0"; 59 + version = "1.12.0"; 60 60 61 61 src = fetchFromGitHub { 62 62 owner = "webmproject"; 63 63 repo = pname; 64 64 rev = "v${version}"; 65 - sha256 = "00f1jrclai2b6ys78dpsg6r1mvcyxlna93vxcz8zjyia24c2pjsb"; 65 + sha256 = "sha256-9SFFE2GfYYMgxp1dpmL3STTU2ea1R5vFKA1L0pZwIvQ="; 66 66 }; 67 67 68 68 postPatch = ''
+2 -4
pkgs/development/libraries/libwebp/default.nix
··· 27 27 28 28 stdenv.mkDerivation rec { 29 29 pname = "libwebp"; 30 - version = "1.2.3"; 30 + version = "1.2.4"; 31 31 32 32 src = fetchFromGitHub { 33 33 owner = "webmproject"; 34 34 repo = pname; 35 35 rev = "v${version}"; 36 - hash = "sha256-t27d+eJR4iTHSLlI3J7RqHgsWACThjsI9O6R2Zb9F1g="; 36 + hash = "sha256-XX6qOWlIl8TqOQMiGpmmDVKwQnM1taG6lrqq1ZFVk5s="; 37 37 }; 38 - 39 - prePatch = "patchShebangs ."; 40 38 41 39 configureFlags = [ 42 40 (lib.enableFeature threadingSupport "threading")
+8 -8
pkgs/development/libraries/mesa/default.nix
··· 34 34 let 35 35 # Release calendar: https://www.mesa3d.org/release-calendar.html 36 36 # Release frequency: https://www.mesa3d.org/releasing.html#schedule 37 - # 22.1 on darwin won't build: https://gitlab.freedesktop.org/mesa/mesa/-/issues/6519 38 - version = if stdenv.isDarwin then "22.0.4" else "22.1.4"; 37 + version = "22.1.6"; 39 38 branch = versions.major version; 40 39 41 40 self = stdenv.mkDerivation { ··· 49 48 "ftp://ftp.freedesktop.org/pub/mesa/${version}/mesa-${version}.tar.xz" 50 49 "ftp://ftp.freedesktop.org/pub/mesa/older-versions/${branch}.x/${version}/mesa-${version}.tar.xz" 51 50 ]; 52 - sha256 = { 53 - "22.1.4" = "0xhbcjqy3g5dfxhr4flmqncmsjnwljfqm9idx92jm43jifz8q3b7"; 54 - "22.0.4" = "1m0y8wgy48hmcidsr7sbk5hcw3v0qr8359fd2x34fvl2z9c1z5y7"; 55 - }.${version}; 51 + sha256 = "22ced061eb9adab8ea35368246c1995c09723f3f71653cd5050c5cec376e671a"; 56 52 }; 57 53 58 54 # TODO: ··· 63 59 ./musl.patch 64 60 (fetchpatch { 65 61 url = "https://raw.githubusercontent.com/void-linux/void-packages/b9f58f303ae23754c95d5d1fe87a98b5a2d8f271/srcpkgs/mesa/patches/musl-endian.patch"; 66 - sha256 = "sha256-eRc91qCaFlVzrxFrNUPpAHd1gsqKsLCCN0IW8pBQcqk="; 62 + hash = "sha256-eRc91qCaFlVzrxFrNUPpAHd1gsqKsLCCN0IW8pBQcqk="; 67 63 }) 68 64 (fetchpatch { 69 65 url = "https://raw.githubusercontent.com/void-linux/void-packages/b9f58f303ae23754c95d5d1fe87a98b5a2d8f271/srcpkgs/mesa/patches/musl-stacksize.patch"; 70 - sha256 = "sha256-bEp0AWddsw1Pc3rxdKN8fsrX4x2TQEzMUa5afhLXGsg="; 66 + hash = "sha256-bEp0AWddsw1Pc3rxdKN8fsrX4x2TQEzMUa5afhLXGsg="; 71 67 }) 72 68 73 69 ./opencl.patch ··· 76 72 # Fix aarch64-darwin build, remove when upstreaam supports it out of the box. 77 73 # See: https://gitlab.freedesktop.org/mesa/mesa/-/issues/1020 78 74 ./aarch64-darwin.patch 75 + ] ++ optionals stdenv.isDarwin [ 76 + # 22.1 on darwin won't build: https://gitlab.freedesktop.org/mesa/mesa/-/issues/6519 77 + # (already in-tree for 22.2) 78 + ./drop-dri2.patch 79 79 ]; 80 80 81 81 postPatch = ''
+40
pkgs/development/libraries/mesa/drop-dri2.patch
··· 1 + diff --git a/a/src/gallium/frontends/dri/dri_util.c b/b/src/gallium/frontends/dri/dri_util.c 2 + index 8d60526..782360d 100644 3 + --- a/src/gallium/frontends/dri/dri_util.c 4 + +++ b/src/gallium/frontends/dri/dri_util.c 5 + @@ -808,35 +808,6 @@ const __DRIcoreExtension driCoreExtension = { 6 + .unbindContext = driUnbindContext 7 + }; 8 + 9 + -/** DRI2 interface */ 10 + -const __DRIdri2Extension driDRI2Extension = { 11 + - .base = { __DRI_DRI2, 4 }, 12 + - 13 + - .createNewScreen = dri2CreateNewScreen, 14 + - .createNewDrawable = driCreateNewDrawable, 15 + - .createNewContext = driCreateNewContext, 16 + - .getAPIMask = driGetAPIMask, 17 + - .createNewContextForAPI = driCreateNewContextForAPI, 18 + - .allocateBuffer = dri2AllocateBuffer, 19 + - .releaseBuffer = dri2ReleaseBuffer, 20 + - .createContextAttribs = driCreateContextAttribs, 21 + - .createNewScreen2 = driCreateNewScreen2, 22 + -}; 23 + - 24 + -const __DRIdri2Extension swkmsDRI2Extension = { 25 + - .base = { __DRI_DRI2, 4 }, 26 + - 27 + - .createNewScreen = swkmsCreateNewScreen, 28 + - .createNewDrawable = driCreateNewDrawable, 29 + - .createNewContext = driCreateNewContext, 30 + - .getAPIMask = driGetAPIMask, 31 + - .createNewContextForAPI = driCreateNewContextForAPI, 32 + - .allocateBuffer = dri2AllocateBuffer, 33 + - .releaseBuffer = dri2ReleaseBuffer, 34 + - .createContextAttribs = driCreateContextAttribs, 35 + - .createNewScreen2 = driCreateNewScreen2, 36 + -}; 37 + - 38 + const __DRIswrastExtension driSWRastExtension = { 39 + .base = { __DRI_SWRAST, 4 }, 40 +
+3 -7
pkgs/development/libraries/openexr/3.nix
··· 27 27 done 28 28 ''; 29 29 30 - nativeBuildInputs = [ 31 - cmake 32 - ]; 30 + cmakeFlags = lib.optional stdenv.hostPlatform.isStatic "-DCMAKE_SKIP_RPATH=ON"; 33 31 34 - propagatedBuildInputs = [ 35 - imath 36 - zlib 37 - ]; 32 + nativeBuildInputs = [ cmake ]; 33 + propagatedBuildInputs = [ imath zlib ]; 38 34 39 35 doCheck = true; 40 36
+4 -7
pkgs/development/libraries/openexr/default.nix
··· 9 9 10 10 stdenv.mkDerivation rec { 11 11 pname = "openexr"; 12 - version = "2.5.7"; 12 + version = "2.5.8"; 13 13 14 14 outputs = [ "bin" "dev" "out" "doc" ]; 15 15 ··· 17 17 owner = "AcademySoftwareFoundation"; 18 18 repo = "openexr"; 19 19 rev = "v${version}"; 20 - sha256 = "1vja0rbilcd1wn184w8nbcmck00n7bfwlddwiaxw8dhj64nx4468"; 20 + sha256 = "sha256-N7XdDaDsYdx4TXvHplQDTvhHNUmW5rntdaTKua4C0es="; 21 21 }; 22 22 23 23 patches = [ 24 - # Fix pkg-config paths 25 - (fetchpatch { 26 - url = "https://github.com/AcademySoftwareFoundation/openexr/commit/2f19a01923885fda75ec9d19332de080ec7102bd.patch"; 27 - sha256 = "1yxmrdzq1x1911wdzwnzr29jmg2r4wd4yx3vhjn0y5dpny0ri5y5"; 28 - }) 29 24 (fetchpatch { 30 25 name = "CVE-2021-45942.patch"; 31 26 url = "https://github.com/AcademySoftwareFoundation/openexr/commit/11cad77da87c4fa2aab7d58dd5339e254db7937e.patch"; ··· 34 29 sha256 = "1wa2jn6sa0n3phaqvklnlbgk1bz60y756ad4jk4d757pzpnannsy"; 35 30 }) 36 31 ]; 32 + 33 + cmakeFlags = lib.optional stdenv.hostPlatform.isStatic "-DCMAKE_SKIP_RPATH=ON"; 37 34 38 35 nativeBuildInputs = [ cmake ]; 39 36 propagatedBuildInputs = [ ilmbase zlib ];
+4 -5
pkgs/development/libraries/polkit/default.nix
··· 57 57 url = "https://gitlab.freedesktop.org/polkit/polkit/-/commit/7ba07551dfcd4ef9a87b8f0d9eb8b91fabcb41b3.patch"; 58 58 sha256 = "ebbLILncq1hAZTBMsLm+vDGw6j0iQ0crGyhzyLZQgKA="; 59 59 }) 60 - ] ++ lib.optionals stdenv.hostPlatform.isMusl [ 61 60 # Make netgroup support optional (musl does not have it) 62 61 # Upstream MR: https://gitlab.freedesktop.org/polkit/polkit/merge_requests/10 63 - # We use the version of the patch that Alpine uses successfully. 62 + # NOTE: Remove after the next release 64 63 (fetchpatch { 65 64 name = "make-innetgr-optional.patch"; 66 - url = "https://git.alpinelinux.org/aports/plain/community/polkit/make-innetgr-optional.patch?id=424ecbb6e9e3a215c978b58c05e5c112d88dddfc"; 67 - sha256 = "0iyiksqk29sizwaa4623bv683px1fny67639qpb1him89hza00wy"; 65 + url = "https://gitlab.freedesktop.org/polkit/polkit/-/commit/b57deee8178190a7ecc75290fa13cf7daabc2c66.patch"; 66 + sha256 = "8te6gatT9Fp+fIT05fQBym5mEwHeHfaUNUNEMfSbtLc="; 68 67 }) 69 68 ]; 70 69 ··· 153 152 --replace /bin/false ${coreutils}/bin/false 154 153 ''; 155 154 156 - postConfigure = '' 155 + postConfigure = lib.optionalString (!stdenv.hostPlatform.isMusl) '' 157 156 # Unpacked by meson 158 157 chmod +x subprojects/mocklibc-1.0/bin/mocklibc 159 158 patchShebangs subprojects/mocklibc-1.0/bin/mocklibc
+18 -6
pkgs/development/libraries/slang/default.nix
··· 5 5 , pcre 6 6 , readline 7 7 , zlib 8 + , writeScript 8 9 }: 9 10 10 11 stdenv.mkDerivation rec { 11 12 pname = "slang"; 12 - version = "2.3.2"; 13 + version = "2.3.3"; 13 14 14 15 src = fetchurl { 15 16 url = "https://www.jedsoft.org/releases/slang/${pname}-${version}.tar.bz2"; 16 - sha256 = "sha256-/J47D8T2fDwfbUPJDBalxC0Re44oRXxbRoMbi1064xo="; 17 + sha256 = "sha256-+RRQVK4TGXPGEgjqgkhtXdEOPFza0jt8SgYXdDyPWhg="; 17 18 }; 18 19 19 20 outputs = [ "out" "dev" "man" "doc" ]; 20 - 21 - patches = [ ./terminfo-dirs.patch ]; 22 21 23 22 # Fix some wrong hardcoded paths 24 23 preConfigure = '' ··· 51 50 makeFlagsArray+=(AR_CR="${stdenv.cc.targetPrefix}ar cr") 52 51 ''; 53 52 54 - # slang 2.3.2 does not support parallel building 55 - enableParallelBuilding = false; 53 + enableParallelBuilding = true; 56 54 57 55 postInstall = '' 58 56 find "$out"/lib/ -name '*.so' -exec chmod +x "{}" \; 59 57 sed '/^Libs:/s/$/ -lncurses/' -i "$dev"/lib/pkgconfig/slang.pc 60 58 ''; 59 + 60 + passthru = { 61 + updateScript = writeScript "update-slang" '' 62 + #!/usr/bin/env nix-shell 63 + #!nix-shell -i bash -p curl pcre common-updater-scripts 64 + 65 + set -eu -o pipefail 66 + 67 + # Expect the text in format of 'Version 2.3.3</td>' 68 + new_version="$(curl -s https://www.jedsoft.org/slang/ | 69 + pcregrep -o1 'Version ([0-9.]+)</td>')" 70 + update-source-version ${pname} "$new_version" 71 + ''; 72 + }; 61 73 62 74 meta = with lib; { 63 75 description = "A small, embeddable multi-platform programming library";
-172
pkgs/development/libraries/slang/terminfo-dirs.patch
··· 1 - commit c7aa0c07b6522fbbb47ef47bd22f47f1611e7423 2 - Author: John E. Davis <jed@jedsoft.org> 3 - Date: Wed Nov 28 00:46:28 2018 -0500 4 - 5 - pre2.3.3-5: Added support for TERMINFO_DIRS env var 6 - 7 - Modified: removed changes to changelog and version number. 8 - 9 - diff --git a/src/sltermin.c b/src/sltermin.c 10 - index a06d0e4..65d3bbc 100644 11 - --- a/src/sltermin.c 12 - +++ b/src/sltermin.c 13 - @@ -133,6 +133,9 @@ static FILE *open_terminfo (char *file, SLterminfo_Type *h) 14 - unsigned char buf[12]; 15 - int magic; 16 - 17 - +#ifdef SLANG_UNTIC 18 - + (void) fprintf (stdout,"# Trying %s\n", file); 19 - +#endif 20 - /* Alan Cox reported a security problem here if the application using the 21 - * library is setuid. So, I need to make sure open the file as a normal 22 - * user. Unfortunately, there does not appear to be a portable way of 23 - @@ -269,10 +272,73 @@ static char *read_string_table (FILE *fp, SLterminfo_Type *t) 24 - * are implemented by multiple links to the same compiled file. 25 - */ 26 - 27 - +static FILE *try_open_tidir (SLterminfo_Type *ti, const char *tidir, const char *term) 28 - +{ 29 - + char file[1024]; 30 - + 31 - + if (sizeof (file) > strlen (tidir) + 5 + strlen (term)) 32 - + { 33 - + FILE *fp; 34 - + 35 - + sprintf (file, "%s/%c/%s", tidir, *term, term); 36 - + if (NULL != (fp = open_terminfo (file, ti))) 37 - + return fp; 38 - + 39 - + sprintf (file, "%s/%02x/%s", tidir, (unsigned char)*term, term); 40 - + if (NULL != (fp = open_terminfo (file, ti))) 41 - + return fp; 42 - + } 43 - + 44 - + return NULL; 45 - +} 46 - + 47 - +static FILE *try_open_env (SLterminfo_Type *ti, const char *term, const char *envvar) 48 - +{ 49 - + char *tidir; 50 - + 51 - + if (NULL == (tidir = _pSLsecure_getenv (envvar))) 52 - + return NULL; 53 - + 54 - + return try_open_tidir (ti, tidir, term); 55 - +} 56 - + 57 - +static FILE *try_open_home (SLterminfo_Type *ti, const char *term) 58 - +{ 59 - + char home_ti[1024]; 60 - + char *env; 61 - + 62 - + if (NULL == (env = _pSLsecure_getenv ("HOME"))) 63 - + return NULL; 64 - + 65 - + strncpy (home_ti, env, sizeof (home_ti) - 11); 66 - + home_ti [sizeof(home_ti) - 11] = 0; 67 - + strcat (home_ti, "/.terminfo"); 68 - + 69 - + return try_open_tidir (ti, home_ti, term); 70 - +} 71 - + 72 - +static FILE *try_open_env_path (SLterminfo_Type *ti, const char *term, const char *envvar) 73 - +{ 74 - + char tidir[1024]; 75 - + char *env; 76 - + unsigned int i; 77 - + 78 - + if (NULL == (env = _pSLsecure_getenv (envvar))) 79 - + return NULL; 80 - + 81 - + i = 0; 82 - + while (-1 != SLextract_list_element (env, i, ':', tidir, sizeof(tidir))) 83 - + { 84 - + FILE *fp = try_open_tidir (ti, tidir, term); 85 - + if (fp != NULL) return fp; 86 - + i++; 87 - + } 88 - + 89 - + return NULL; 90 - +} 91 - + 92 - static SLCONST char *Terminfo_Dirs [] = 93 - { 94 - - "", /* $TERMINFO */ 95 - - "", /* $HOME/.terminfo */ 96 - #ifdef MISC_TERMINFO_DIRS 97 - MISC_TERMINFO_DIRS, 98 - #endif 99 - @@ -287,6 +353,23 @@ static SLCONST char *Terminfo_Dirs [] = 100 - NULL, 101 - }; 102 - 103 - +static FILE *try_open_hardcoded (SLterminfo_Type *ti, const char *term) 104 - +{ 105 - + const char *tidir, **tidirs; 106 - + 107 - + tidirs = Terminfo_Dirs; 108 - + while (NULL != (tidir = *tidirs++)) 109 - + { 110 - + FILE *fp; 111 - + 112 - + if ((*tidir != 0) 113 - + && (NULL != (fp = try_open_tidir (ti, tidir, term)))) 114 - + return fp; 115 - + } 116 - + 117 - + return NULL; 118 - +} 119 - + 120 - void _pSLtt_tifreeent (SLterminfo_Type *t) 121 - { 122 - if (t == NULL) 123 - @@ -305,11 +388,7 @@ void _pSLtt_tifreeent (SLterminfo_Type *t) 124 - 125 - SLterminfo_Type *_pSLtt_tigetent (SLCONST char *term) 126 - { 127 - - SLCONST char **tidirs, *tidir; 128 - FILE *fp = NULL; 129 - - char file[1024]; 130 - - static char home_ti [1024]; 131 - - char *env; 132 - SLterminfo_Type *ti; 133 - 134 - if ( 135 - @@ -341,33 +420,10 @@ SLterminfo_Type *_pSLtt_tigetent (SLCONST char *term) 136 - /* If we are on a termcap based system, use termcap */ 137 - if (0 == tcap_getent (term, ti)) return ti; 138 - 139 - - if (NULL != (env = _pSLsecure_getenv ("TERMINFO"))) 140 - - Terminfo_Dirs[0] = env; 141 - - 142 - - if (NULL != (env = _pSLsecure_getenv ("HOME"))) 143 - - { 144 - - strncpy (home_ti, env, sizeof (home_ti) - 11); 145 - - home_ti [sizeof(home_ti) - 11] = 0; 146 - - strcat (home_ti, "/.terminfo"); 147 - - Terminfo_Dirs [1] = home_ti; 148 - - } 149 - - 150 - - tidirs = Terminfo_Dirs; 151 - - while (NULL != (tidir = *tidirs++)) 152 - - { 153 - - if (*tidir == 0) 154 - - continue; 155 - - 156 - - if (sizeof (file) > strlen (tidir) + 5 + strlen (term)) 157 - - { 158 - - sprintf (file, "%s/%c/%s", tidir, *term, term); 159 - - if (NULL != (fp = open_terminfo (file, ti))) 160 - - break; 161 - - sprintf (file, "%s/%02x/%s", tidir, (unsigned char)*term, term); 162 - - if (NULL != (fp = open_terminfo (file, ti))) 163 - - break; 164 - - } 165 - - } 166 - + fp = try_open_env_path (ti, term, "TERMINFO_DIRS"); 167 - + if (fp == NULL) fp = try_open_env (ti, term, "TERMINFO"); 168 - + if (fp == NULL) fp = try_open_home (ti, term); 169 - + if (fp == NULL) fp = try_open_hardcoded (ti, term); 170 - 171 - #ifdef SLANG_UNTIC 172 - fp_open_label:
+2 -2
pkgs/development/libraries/speexdsp/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "speexdsp"; 5 - version = "1.2.0"; 5 + version = "1.2.1"; 6 6 7 7 src = fetchurl { 8 8 url = "https://downloads.xiph.org/releases/speex/${pname}-${version}.tar.gz"; 9 - sha256 = "0wa7sqpk3x61zz99m7lwkgr6yv62ml6lfgs5xja65vlvdzy44838"; 9 + sha256 = "sha256-jHdzQ+SmOZVpxyq8OKlbJNtWiCyD29tsZCSl9K61TT0="; 10 10 }; 11 11 12 12 patches = [ ./build-fix.patch ];
+2 -2
pkgs/development/libraries/spirv-headers/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "spirv-headers"; 5 - version = "1.3.211.0"; 5 + version = "1.3.216.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "KhronosGroup"; 9 9 repo = "SPIRV-Headers"; 10 10 rev = "sdk-${version}"; 11 - sha256 = "sha256-LkIrTFWYvZffLVJJW3152um5LTEsMJEDEsIhBAdhBlk="; 11 + hash = "sha256-qYhFoRrQOlvYvVXhIFsa3dZuORDpZyVC5peeYmGNimw="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ cmake ];
+3 -3
pkgs/development/libraries/ti-rpc/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "libtirpc"; 5 - version = "1.2.7-rc4"; 5 + version = "1.3.3"; 6 6 7 7 src = fetchurl { 8 - url = "http://git.linux-nfs.org/?p=steved/libtirpc.git;a=snapshot;h=5ca4ca92f629d9d83e83544b9239abaaacf0a527;sf=tgz"; 9 - sha256 = "0w26yf9bwkpqj52sqd3n250dg9jlqnr8bjv0kc4fl5hkrv8akj8i"; 8 + url = "http://git.linux-nfs.org/?p=steved/libtirpc.git;a=snapshot;h=0fb94eef5062d2657d75eee686fa47238fafa312;sf=tgz"; 9 + sha256 = "sha256-3P3xYKeAmLbBI4TdsG1VZBO7py9ktiwhXNtGsnryGNI="; 10 10 name = "${pname}-${version}.tar.gz"; 11 11 }; 12 12
+2 -2
pkgs/development/libraries/vulkan-headers/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, cmake }: 2 2 stdenv.mkDerivation rec { 3 3 pname = "vulkan-headers"; 4 - version = "1.3.211.0"; 4 + version = "1.3.216.0"; 5 5 6 6 nativeBuildInputs = [ cmake ]; 7 7 ··· 9 9 owner = "KhronosGroup"; 10 10 repo = "Vulkan-Headers"; 11 11 rev = "sdk-${version}"; 12 - sha256 = "sha256-FqrcFHsUS8e4ZgZpxVc8nNZWdNltniFmMjyyWVoNc7w="; 12 + hash = "sha256-jHzW3m9smuzEGbZrSyBI74K9rFozxiG3M5Xql/WOw7U="; 13 13 }; 14 14 15 15 meta = with lib; {
+2 -2
pkgs/development/libraries/vulkan-loader/default.nix
··· 3 3 4 4 stdenv.mkDerivation rec { 5 5 pname = "vulkan-loader"; 6 - version = "1.3.211.0"; 6 + version = "1.3.216.0"; 7 7 8 8 src = (assert version == vulkan-headers.version; 9 9 fetchFromGitHub { 10 10 owner = "KhronosGroup"; 11 11 repo = "Vulkan-Loader"; 12 12 rev = "sdk-${version}"; 13 - sha256 = "sha256-NQu98wA7UK231rpoKDs1yQ6pEyB4wZg7MjFC3JwS2BY="; 13 + hash = "sha256-EcsJzY/R9rreWvYTgoxHNloR5n2xaR/0rouDJVAGaxs="; 14 14 }); 15 15 16 16 patches = [ ./fix-pkgconfig.patch ];
-346
pkgs/development/libraries/zlib/CVE-2018-25032-1.patch
··· 1 - From 5c44459c3b28a9bd3283aaceab7c615f8020c531 Mon Sep 17 00:00:00 2001 2 - From: Mark Adler <madler@alumni.caltech.edu> 3 - Date: Tue, 17 Apr 2018 22:09:22 -0700 4 - Subject: [PATCH 1/2] Fix a bug that can crash deflate on some input when using 5 - Z_FIXED. 6 - 7 - This bug was reported by Danilo Ramos of Eideticom, Inc. It has 8 - lain in wait 13 years before being found! The bug was introduced 9 - in zlib 1.2.2.2, with the addition of the Z_FIXED option. That 10 - option forces the use of fixed Huffman codes. For rare inputs with 11 - a large number of distant matches, the pending buffer into which 12 - the compressed data is written can overwrite the distance symbol 13 - table which it overlays. That results in corrupted output due to 14 - invalid distances, and can result in out-of-bound accesses, 15 - crashing the application. 16 - 17 - The fix here combines the distance buffer and literal/length 18 - buffers into a single symbol buffer. Now three bytes of pending 19 - buffer space are opened up for each literal or length/distance 20 - pair consumed, instead of the previous two bytes. This assures 21 - that the pending buffer cannot overwrite the symbol table, since 22 - the maximum fixed code compressed length/distance is 31 bits, and 23 - since there are four bytes of pending space for every three bytes 24 - of symbol space. 25 - --- 26 - deflate.c | 74 ++++++++++++++++++++++++++++++++++++++++--------------- 27 - deflate.h | 25 +++++++++---------- 28 - trees.c | 50 +++++++++++-------------------------- 29 - 3 files changed, 79 insertions(+), 70 deletions(-) 30 - 31 - diff --git a/deflate.c b/deflate.c 32 - index 425babc..19cba87 100644 33 - --- a/deflate.c 34 - +++ b/deflate.c 35 - @@ -255,11 +255,6 @@ int ZEXPORT deflateInit2_(strm, level, method, windowBits, memLevel, strategy, 36 - int wrap = 1; 37 - static const char my_version[] = ZLIB_VERSION; 38 - 39 - - ushf *overlay; 40 - - /* We overlay pending_buf and d_buf+l_buf. This works since the average 41 - - * output size for (length,distance) codes is <= 24 bits. 42 - - */ 43 - - 44 - if (version == Z_NULL || version[0] != my_version[0] || 45 - stream_size != sizeof(z_stream)) { 46 - return Z_VERSION_ERROR; 47 - @@ -329,9 +324,47 @@ int ZEXPORT deflateInit2_(strm, level, method, windowBits, memLevel, strategy, 48 - 49 - s->lit_bufsize = 1 << (memLevel + 6); /* 16K elements by default */ 50 - 51 - - overlay = (ushf *) ZALLOC(strm, s->lit_bufsize, sizeof(ush)+2); 52 - - s->pending_buf = (uchf *) overlay; 53 - - s->pending_buf_size = (ulg)s->lit_bufsize * (sizeof(ush)+2L); 54 - + /* We overlay pending_buf and sym_buf. This works since the average size 55 - + * for length/distance pairs over any compressed block is assured to be 31 56 - + * bits or less. 57 - + * 58 - + * Analysis: The longest fixed codes are a length code of 8 bits plus 5 59 - + * extra bits, for lengths 131 to 257. The longest fixed distance codes are 60 - + * 5 bits plus 13 extra bits, for distances 16385 to 32768. The longest 61 - + * possible fixed-codes length/distance pair is then 31 bits total. 62 - + * 63 - + * sym_buf starts one-fourth of the way into pending_buf. So there are 64 - + * three bytes in sym_buf for every four bytes in pending_buf. Each symbol 65 - + * in sym_buf is three bytes -- two for the distance and one for the 66 - + * literal/length. As each symbol is consumed, the pointer to the next 67 - + * sym_buf value to read moves forward three bytes. From that symbol, up to 68 - + * 31 bits are written to pending_buf. The closest the written pending_buf 69 - + * bits gets to the next sym_buf symbol to read is just before the last 70 - + * code is written. At that time, 31*(n-2) bits have been written, just 71 - + * after 24*(n-2) bits have been consumed from sym_buf. sym_buf starts at 72 - + * 8*n bits into pending_buf. (Note that the symbol buffer fills when n-1 73 - + * symbols are written.) The closest the writing gets to what is unread is 74 - + * then n+14 bits. Here n is lit_bufsize, which is 16384 by default, and 75 - + * can range from 128 to 32768. 76 - + * 77 - + * Therefore, at a minimum, there are 142 bits of space between what is 78 - + * written and what is read in the overlain buffers, so the symbols cannot 79 - + * be overwritten by the compressed data. That space is actually 139 bits, 80 - + * due to the three-bit fixed-code block header. 81 - + * 82 - + * That covers the case where either Z_FIXED is specified, forcing fixed 83 - + * codes, or when the use of fixed codes is chosen, because that choice 84 - + * results in a smaller compressed block than dynamic codes. That latter 85 - + * condition then assures that the above analysis also covers all dynamic 86 - + * blocks. A dynamic-code block will only be chosen to be emitted if it has 87 - + * fewer bits than a fixed-code block would for the same set of symbols. 88 - + * Therefore its average symbol length is assured to be less than 31. So 89 - + * the compressed data for a dynamic block also cannot overwrite the 90 - + * symbols from which it is being constructed. 91 - + */ 92 - + 93 - + s->pending_buf = (uchf *) ZALLOC(strm, s->lit_bufsize, 4); 94 - + s->pending_buf_size = (ulg)s->lit_bufsize * 4; 95 - 96 - if (s->window == Z_NULL || s->prev == Z_NULL || s->head == Z_NULL || 97 - s->pending_buf == Z_NULL) { 98 - @@ -340,8 +373,12 @@ int ZEXPORT deflateInit2_(strm, level, method, windowBits, memLevel, strategy, 99 - deflateEnd (strm); 100 - return Z_MEM_ERROR; 101 - } 102 - - s->d_buf = overlay + s->lit_bufsize/sizeof(ush); 103 - - s->l_buf = s->pending_buf + (1+sizeof(ush))*s->lit_bufsize; 104 - + s->sym_buf = s->pending_buf + s->lit_bufsize; 105 - + s->sym_end = (s->lit_bufsize - 1) * 3; 106 - + /* We avoid equality with lit_bufsize*3 because of wraparound at 64K 107 - + * on 16 bit machines and because stored blocks are restricted to 108 - + * 64K-1 bytes. 109 - + */ 110 - 111 - s->level = level; 112 - s->strategy = strategy; 113 - @@ -552,7 +589,7 @@ int ZEXPORT deflatePrime (strm, bits, value) 114 - 115 - if (deflateStateCheck(strm)) return Z_STREAM_ERROR; 116 - s = strm->state; 117 - - if ((Bytef *)(s->d_buf) < s->pending_out + ((Buf_size + 7) >> 3)) 118 - + if (s->sym_buf < s->pending_out + ((Buf_size + 7) >> 3)) 119 - return Z_BUF_ERROR; 120 - do { 121 - put = Buf_size - s->bi_valid; 122 - @@ -1113,7 +1150,6 @@ int ZEXPORT deflateCopy (dest, source) 123 - #else 124 - deflate_state *ds; 125 - deflate_state *ss; 126 - - ushf *overlay; 127 - 128 - 129 - if (deflateStateCheck(source) || dest == Z_NULL) { 130 - @@ -1133,8 +1169,7 @@ int ZEXPORT deflateCopy (dest, source) 131 - ds->window = (Bytef *) ZALLOC(dest, ds->w_size, 2*sizeof(Byte)); 132 - ds->prev = (Posf *) ZALLOC(dest, ds->w_size, sizeof(Pos)); 133 - ds->head = (Posf *) ZALLOC(dest, ds->hash_size, sizeof(Pos)); 134 - - overlay = (ushf *) ZALLOC(dest, ds->lit_bufsize, sizeof(ush)+2); 135 - - ds->pending_buf = (uchf *) overlay; 136 - + ds->pending_buf = (uchf *) ZALLOC(dest, ds->lit_bufsize, 4); 137 - 138 - if (ds->window == Z_NULL || ds->prev == Z_NULL || ds->head == Z_NULL || 139 - ds->pending_buf == Z_NULL) { 140 - @@ -1148,8 +1183,7 @@ int ZEXPORT deflateCopy (dest, source) 141 - zmemcpy(ds->pending_buf, ss->pending_buf, (uInt)ds->pending_buf_size); 142 - 143 - ds->pending_out = ds->pending_buf + (ss->pending_out - ss->pending_buf); 144 - - ds->d_buf = overlay + ds->lit_bufsize/sizeof(ush); 145 - - ds->l_buf = ds->pending_buf + (1+sizeof(ush))*ds->lit_bufsize; 146 - + ds->sym_buf = ds->pending_buf + ds->lit_bufsize; 147 - 148 - ds->l_desc.dyn_tree = ds->dyn_ltree; 149 - ds->d_desc.dyn_tree = ds->dyn_dtree; 150 - @@ -1925,7 +1959,7 @@ local block_state deflate_fast(s, flush) 151 - FLUSH_BLOCK(s, 1); 152 - return finish_done; 153 - } 154 - - if (s->last_lit) 155 - + if (s->sym_next) 156 - FLUSH_BLOCK(s, 0); 157 - return block_done; 158 - } 159 - @@ -2056,7 +2090,7 @@ local block_state deflate_slow(s, flush) 160 - FLUSH_BLOCK(s, 1); 161 - return finish_done; 162 - } 163 - - if (s->last_lit) 164 - + if (s->sym_next) 165 - FLUSH_BLOCK(s, 0); 166 - return block_done; 167 - } 168 - @@ -2131,7 +2165,7 @@ local block_state deflate_rle(s, flush) 169 - FLUSH_BLOCK(s, 1); 170 - return finish_done; 171 - } 172 - - if (s->last_lit) 173 - + if (s->sym_next) 174 - FLUSH_BLOCK(s, 0); 175 - return block_done; 176 - } 177 - @@ -2170,7 +2204,7 @@ local block_state deflate_huff(s, flush) 178 - FLUSH_BLOCK(s, 1); 179 - return finish_done; 180 - } 181 - - if (s->last_lit) 182 - + if (s->sym_next) 183 - FLUSH_BLOCK(s, 0); 184 - return block_done; 185 - } 186 - diff --git a/deflate.h b/deflate.h 187 - index 23ecdd3..d4cf1a9 100644 188 - --- a/deflate.h 189 - +++ b/deflate.h 190 - @@ -217,7 +217,7 @@ typedef struct internal_state { 191 - /* Depth of each subtree used as tie breaker for trees of equal frequency 192 - */ 193 - 194 - - uchf *l_buf; /* buffer for literals or lengths */ 195 - + uchf *sym_buf; /* buffer for distances and literals/lengths */ 196 - 197 - uInt lit_bufsize; 198 - /* Size of match buffer for literals/lengths. There are 4 reasons for 199 - @@ -239,13 +239,8 @@ typedef struct internal_state { 200 - * - I can't count above 4 201 - */ 202 - 203 - - uInt last_lit; /* running index in l_buf */ 204 - - 205 - - ushf *d_buf; 206 - - /* Buffer for distances. To simplify the code, d_buf and l_buf have 207 - - * the same number of elements. To use different lengths, an extra flag 208 - - * array would be necessary. 209 - - */ 210 - + uInt sym_next; /* running index in sym_buf */ 211 - + uInt sym_end; /* symbol table full when sym_next reaches this */ 212 - 213 - ulg opt_len; /* bit length of current block with optimal trees */ 214 - ulg static_len; /* bit length of current block with static trees */ 215 - @@ -325,20 +320,22 @@ void ZLIB_INTERNAL _tr_stored_block OF((deflate_state *s, charf *buf, 216 - 217 - # define _tr_tally_lit(s, c, flush) \ 218 - { uch cc = (c); \ 219 - - s->d_buf[s->last_lit] = 0; \ 220 - - s->l_buf[s->last_lit++] = cc; \ 221 - + s->sym_buf[s->sym_next++] = 0; \ 222 - + s->sym_buf[s->sym_next++] = 0; \ 223 - + s->sym_buf[s->sym_next++] = cc; \ 224 - s->dyn_ltree[cc].Freq++; \ 225 - - flush = (s->last_lit == s->lit_bufsize-1); \ 226 - + flush = (s->sym_next == s->sym_end); \ 227 - } 228 - # define _tr_tally_dist(s, distance, length, flush) \ 229 - { uch len = (uch)(length); \ 230 - ush dist = (ush)(distance); \ 231 - - s->d_buf[s->last_lit] = dist; \ 232 - - s->l_buf[s->last_lit++] = len; \ 233 - + s->sym_buf[s->sym_next++] = dist; \ 234 - + s->sym_buf[s->sym_next++] = dist >> 8; \ 235 - + s->sym_buf[s->sym_next++] = len; \ 236 - dist--; \ 237 - s->dyn_ltree[_length_code[len]+LITERALS+1].Freq++; \ 238 - s->dyn_dtree[d_code(dist)].Freq++; \ 239 - - flush = (s->last_lit == s->lit_bufsize-1); \ 240 - + flush = (s->sym_next == s->sym_end); \ 241 - } 242 - #else 243 - # define _tr_tally_lit(s, c, flush) flush = _tr_tally(s, 0, c) 244 - diff --git a/trees.c b/trees.c 245 - index 4f4a650..decaeb7 100644 246 - --- a/trees.c 247 - +++ b/trees.c 248 - @@ -416,7 +416,7 @@ local void init_block(s) 249 - 250 - s->dyn_ltree[END_BLOCK].Freq = 1; 251 - s->opt_len = s->static_len = 0L; 252 - - s->last_lit = s->matches = 0; 253 - + s->sym_next = s->matches = 0; 254 - } 255 - 256 - #define SMALLEST 1 257 - @@ -948,7 +948,7 @@ void ZLIB_INTERNAL _tr_flush_block(s, buf, stored_len, last) 258 - 259 - Tracev((stderr, "\nopt %lu(%lu) stat %lu(%lu) stored %lu lit %u ", 260 - opt_lenb, s->opt_len, static_lenb, s->static_len, stored_len, 261 - - s->last_lit)); 262 - + s->sym_next / 3)); 263 - 264 - if (static_lenb <= opt_lenb) opt_lenb = static_lenb; 265 - 266 - @@ -1017,8 +1017,9 @@ int ZLIB_INTERNAL _tr_tally (s, dist, lc) 267 - unsigned dist; /* distance of matched string */ 268 - unsigned lc; /* match length-MIN_MATCH or unmatched char (if dist==0) */ 269 - { 270 - - s->d_buf[s->last_lit] = (ush)dist; 271 - - s->l_buf[s->last_lit++] = (uch)lc; 272 - + s->sym_buf[s->sym_next++] = dist; 273 - + s->sym_buf[s->sym_next++] = dist >> 8; 274 - + s->sym_buf[s->sym_next++] = lc; 275 - if (dist == 0) { 276 - /* lc is the unmatched char */ 277 - s->dyn_ltree[lc].Freq++; 278 - @@ -1033,30 +1034,7 @@ int ZLIB_INTERNAL _tr_tally (s, dist, lc) 279 - s->dyn_ltree[_length_code[lc]+LITERALS+1].Freq++; 280 - s->dyn_dtree[d_code(dist)].Freq++; 281 - } 282 - - 283 - -#ifdef TRUNCATE_BLOCK 284 - - /* Try to guess if it is profitable to stop the current block here */ 285 - - if ((s->last_lit & 0x1fff) == 0 && s->level > 2) { 286 - - /* Compute an upper bound for the compressed length */ 287 - - ulg out_length = (ulg)s->last_lit*8L; 288 - - ulg in_length = (ulg)((long)s->strstart - s->block_start); 289 - - int dcode; 290 - - for (dcode = 0; dcode < D_CODES; dcode++) { 291 - - out_length += (ulg)s->dyn_dtree[dcode].Freq * 292 - - (5L+extra_dbits[dcode]); 293 - - } 294 - - out_length >>= 3; 295 - - Tracev((stderr,"\nlast_lit %u, in %ld, out ~%ld(%ld%%) ", 296 - - s->last_lit, in_length, out_length, 297 - - 100L - out_length*100L/in_length)); 298 - - if (s->matches < s->last_lit/2 && out_length < in_length/2) return 1; 299 - - } 300 - -#endif 301 - - return (s->last_lit == s->lit_bufsize-1); 302 - - /* We avoid equality with lit_bufsize because of wraparound at 64K 303 - - * on 16 bit machines and because stored blocks are restricted to 304 - - * 64K-1 bytes. 305 - - */ 306 - + return (s->sym_next == s->sym_end); 307 - } 308 - 309 - /* =========================================================================== 310 - @@ -1069,13 +1047,14 @@ local void compress_block(s, ltree, dtree) 311 - { 312 - unsigned dist; /* distance of matched string */ 313 - int lc; /* match length or unmatched char (if dist == 0) */ 314 - - unsigned lx = 0; /* running index in l_buf */ 315 - + unsigned sx = 0; /* running index in sym_buf */ 316 - unsigned code; /* the code to send */ 317 - int extra; /* number of extra bits to send */ 318 - 319 - - if (s->last_lit != 0) do { 320 - - dist = s->d_buf[lx]; 321 - - lc = s->l_buf[lx++]; 322 - + if (s->sym_next != 0) do { 323 - + dist = s->sym_buf[sx++] & 0xff; 324 - + dist += (unsigned)(s->sym_buf[sx++] & 0xff) << 8; 325 - + lc = s->sym_buf[sx++]; 326 - if (dist == 0) { 327 - send_code(s, lc, ltree); /* send a literal byte */ 328 - Tracecv(isgraph(lc), (stderr," '%c' ", lc)); 329 - @@ -1100,11 +1079,10 @@ local void compress_block(s, ltree, dtree) 330 - } 331 - } /* literal or match pair ? */ 332 - 333 - - /* Check that the overlay between pending_buf and d_buf+l_buf is ok: */ 334 - - Assert((uInt)(s->pending) < s->lit_bufsize + 2*lx, 335 - - "pendingBuf overflow"); 336 - + /* Check that the overlay between pending_buf and sym_buf is ok: */ 337 - + Assert(s->pending < s->lit_bufsize + sx, "pendingBuf overflow"); 338 - 339 - - } while (lx < s->last_lit); 340 - + } while (sx < s->sym_next); 341 - 342 - send_code(s, END_BLOCK, ltree); 343 - } 344 - -- 345 - 2.33.1 346 -
-27
pkgs/development/libraries/zlib/CVE-2018-25032-2.patch
··· 1 - From 4346a16853e19b45787ce933666026903fb8f3f8 Mon Sep 17 00:00:00 2001 2 - From: Mark Adler <madler@alumni.caltech.edu> 3 - Date: Tue, 17 Apr 2018 22:44:41 -0700 4 - Subject: [PATCH 2/2] Assure that the number of bits for deflatePrime() is 5 - valid. 6 - 7 - --- 8 - deflate.c | 3 ++- 9 - 1 file changed, 2 insertions(+), 1 deletion(-) 10 - 11 - diff --git a/deflate.c b/deflate.c 12 - index 19cba87..23aef18 100644 13 - --- a/deflate.c 14 - +++ b/deflate.c 15 - @@ -589,7 +589,8 @@ int ZEXPORT deflatePrime (strm, bits, value) 16 - 17 - if (deflateStateCheck(strm)) return Z_STREAM_ERROR; 18 - s = strm->state; 19 - - if (s->sym_buf < s->pending_out + ((Buf_size + 7) >> 3)) 20 - + if (bits < 0 || bits > 16 || 21 - + s->sym_buf < s->pending_out + ((Buf_size + 7) >> 3)) 22 - return Z_BUF_ERROR; 23 - do { 24 - put = Buf_size - s->bi_valid; 25 - -- 26 - 2.33.1 27 -
+62
pkgs/development/libraries/zlib/CVE-2022-37434.patch
··· 1 + From eff308af425b67093bab25f80f1ae950166bece1 Mon Sep 17 00:00:00 2001 2 + From: Mark Adler <fork@madler.net> 3 + Date: Sat, 30 Jul 2022 15:51:11 -0700 4 + Subject: [PATCH] Fix a bug when getting a gzip header extra field with 5 + inflate(). 6 + 7 + If the extra field was larger than the space the user provided with 8 + inflateGetHeader(), and if multiple calls of inflate() delivered 9 + the extra header data, then there could be a buffer overflow of the 10 + provided space. This commit assures that provided space is not 11 + exceeded. 12 + --- 13 + inflate.c | 5 +++-- 14 + 1 file changed, 3 insertions(+), 2 deletions(-) 15 + 16 + diff --git a/inflate.c b/inflate.c 17 + index 7be8c6366..7a7289749 100644 18 + --- a/inflate.c 19 + +++ b/inflate.c 20 + @@ -763,9 +763,10 @@ int flush; 21 + copy = state->length; 22 + if (copy > have) copy = have; 23 + if (copy) { 24 + + len = state->head->extra_len - state->length; 25 + if (state->head != Z_NULL && 26 + - state->head->extra != Z_NULL) { 27 + - len = state->head->extra_len - state->length; 28 + + state->head->extra != Z_NULL && 29 + + len < state->head->extra_max) { 30 + zmemcpy(state->head->extra + len, next, 31 + len + copy > state->head->extra_max ? 32 + state->head->extra_max - len : copy); 33 + 34 + From 1eb7682f845ac9e9bf9ae35bbfb3bad5dacbd91d Mon Sep 17 00:00:00 2001 35 + From: Mark Adler <fork@madler.net> 36 + Date: Mon, 8 Aug 2022 10:50:09 -0700 37 + Subject: [PATCH] Fix extra field processing bug that dereferences NULL 38 + state->head. 39 + 40 + The recent commit to fix a gzip header extra field processing bug 41 + introduced the new bug fixed here. 42 + --- 43 + inflate.c | 4 ++-- 44 + 1 file changed, 2 insertions(+), 2 deletions(-) 45 + 46 + diff --git a/inflate.c b/inflate.c 47 + index 7a7289749..2a3c4fe98 100644 48 + --- a/inflate.c 49 + +++ b/inflate.c 50 + @@ -763,10 +763,10 @@ int flush; 51 + copy = state->length; 52 + if (copy > have) copy = have; 53 + if (copy) { 54 + - len = state->head->extra_len - state->length; 55 + if (state->head != Z_NULL && 56 + state->head->extra != Z_NULL && 57 + - len < state->head->extra_max) { 58 + + (len = state->head->extra_len - state->length) < 59 + + state->head->extra_max) { 60 + zmemcpy(state->head->extra + len, next, 61 + len + copy > state->head->extra_max ? 62 + state->head->extra_max - len : copy);
+1
pkgs/development/libraries/zlib/default.nix
··· 48 48 # TODO: remove the patch if upstream releases https://github.com/madler/zlib/commit/ec3df00224d4b396e2ac6586ab5d25f673caa4c2 49 49 # see https://github.com/NixOS/nixpkgs/issues/170539 for history. 50 50 ./comprehensive-crc-validation-for-wrong-implementations.patch 51 + ./CVE-2022-37434.patch 51 52 ]; 52 53 53 54 strictDeps = true;
+5 -5
pkgs/development/python-modules/aioitertools/default.nix
··· 12 12 , typing-extensions 13 13 14 14 # tests 15 - , python 15 + , unittestCheckHook 16 16 }: 17 17 18 18 buildPythonPackage rec { ··· 35 35 typing-extensions 36 36 ]; 37 37 38 + checkInputs = [ 39 + unittestCheckHook 40 + ]; 41 + 38 42 pythonImportsCheck = [ 39 43 "aioitertools" 40 44 ]; 41 - 42 - checkPhase = '' 43 - ${python.interpreter} -m unittest discover 44 - ''; 45 45 46 46 meta = with lib; { 47 47 description = "Implementation of itertools, builtins, and more for AsyncIO and mixed-type iterables";
+6 -4
pkgs/development/python-modules/arxiv2bib/default.nix
··· 1 - { buildPythonPackage, python, lib, fetchFromGitHub 1 + { buildPythonPackage 2 + , lib 3 + , fetchFromGitHub 2 4 , mock 5 + , unittestCheckHook 3 6 }: 4 7 5 8 buildPythonPackage rec { ··· 14 17 sha256 = "1kp2iyx20lpc9dv4qg5fgwf83a1wx6f7hj1ldqyncg0kn9xcrhbg"; 15 18 }; 16 19 17 - checkInputs = [ mock ]; 18 - 19 - checkPhase = "${python.interpreter} -m unittest discover -s tests"; 20 + checkInputs = [ unittestCheckHook mock ]; 21 + unittestFlagsArray = [ "-s" "tests" ]; 20 22 21 23 meta = with lib; { 22 24 description = "Get a BibTeX entry from an arXiv id number, using the arxiv.org API";
+2 -4
pkgs/development/python-modules/awesome-slugify/default.nix
··· 1 - { lib, buildPythonPackage, fetchPypi, unidecode, regex, python }: 1 + { lib, buildPythonPackage, fetchPypi, unidecode, regex, unittestCheckHook }: 2 2 3 3 buildPythonPackage rec { 4 4 pname = "awesome-slugify"; ··· 20 20 21 21 propagatedBuildInputs = [ unidecode regex ]; 22 22 23 - checkPhase = '' 24 - ${python.interpreter} -m unittest discover 25 - ''; 23 + checkInputs = [ unittestCheckHook ]; 26 24 27 25 meta = with lib; { 28 26 homepage = "https://github.com/dimka665/awesome-slugify";
+2 -4
pkgs/development/python-modules/backports_abc/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 3 , fetchPypi 4 - , python 4 + , unittestCheckHook 5 5 }: 6 6 7 7 buildPythonPackage rec { ··· 13 13 sha256 = "033be54514a03e255df75c5aee8f9e672f663f93abb723444caec8fe43437bde"; 14 14 }; 15 15 16 - checkPhase = '' 17 - ${python.interpreter} -m unittest discover 18 - ''; 16 + checkInputs = [ unittestCheckHook ]; 19 17 20 18 meta = { 21 19 homepage = "https://github.com/cython/backports_abc";
+5 -5
pkgs/development/python-modules/backports_tempfile/default.nix
··· 1 1 { lib 2 - , python 2 + , unittestCheckHook 3 3 , buildPythonPackage 4 4 , fetchPypi 5 5 , setuptools-scm ··· 19 19 20 20 propagatedBuildInputs = [ backports_weakref ]; 21 21 22 - checkPhase = '' 23 - ${python.interpreter} -m unittest discover -s tests 24 - ''; 25 - 26 22 # requires https://pypi.org/project/backports.test.support 27 23 doCheck = false; 24 + 25 + checkInputs = [ unittestCheckHook ]; 26 + 27 + unittestFlagsArray = [ "-s" "tests" ]; 28 28 29 29 meta = { 30 30 description = "Backport of new features in Python's tempfile module";
+4 -4
pkgs/development/python-modules/backports_weakref/default.nix
··· 3 3 , fetchPypi 4 4 , setuptools-scm 5 5 # , backports 6 - , python 6 + , unittestCheckHook 7 7 }: 8 8 9 9 buildPythonPackage rec { ··· 20 20 # Requires backports package 21 21 doCheck = false; 22 22 23 - checkPhase = '' 24 - ${python.interpreter} -m unittest discover tests 25 - ''; 23 + checkInputs = [ unittestCheckHook ]; 24 + 25 + unittestFlagsArray = [ "tests" ]; 26 26 27 27 meta = with lib; { 28 28 description = "Backports of new features in Python’s weakref module";
+4 -5
pkgs/development/python-modules/bitstring/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 3 , fetchFromGitHub 4 - , python 4 + , unittestCheckHook 5 5 }: 6 6 7 7 buildPythonPackage rec { ··· 15 15 sha256 = "0y2kcq58psvl038r6dhahhlhp1wjgr5zsms45wyz1naq6ri8x9qa"; 16 16 }; 17 17 18 - checkPhase = '' 19 - cd test 20 - ${python.interpreter} -m unittest discover 21 - ''; 18 + checkInputs = [ unittestCheckHook ]; 19 + 20 + unittestFlagsArray = [ "-s" "test" ]; 22 21 23 22 pythonImportsCheck = [ "bitstring" ]; 24 23
+11 -7
pkgs/development/python-modules/clevercsv/default.nix
··· 9 9 , regex 10 10 , tabview 11 11 , python 12 + , unittestCheckHook 12 13 }: 13 14 14 15 buildPythonPackage rec { ··· 33 34 tabview 34 35 ]; 35 36 37 + checkInputs = [ unittestCheckHook ]; 38 + 36 39 pythonImportsCheck = [ 37 40 "clevercsv" 38 41 "clevercsv.cparser" 39 42 ]; 40 43 41 - checkPhase = '' 44 + preCheck = '' 42 45 # by linking the installed version the tests also have access to compiled native libraries 43 46 rm -r clevercsv 44 47 ln -s $out/${python.sitePackages}/clevercsv/ clevercsv 45 - # their ci only runs unit tests, there are also integration and fuzzing tests 46 - ${python.interpreter} -m unittest discover -v -f -s ./tests/test_unit 47 48 ''; 49 + 50 + # their ci only runs unit tests, there are also integration and fuzzing tests 51 + unittestFlagsArray = [ "-v" "-f" "-s" "./tests/test_unit" ]; 48 52 49 53 meta = with lib; { 50 54 description = "CleverCSV is a Python package for handling messy CSV files"; 51 55 longDescription = '' 52 - CleverCSV is a Python package for handling messy CSV files. It provides 53 - a drop-in replacement for the builtin CSV module with improved dialect 54 - detection, and comes with a handy command line application for working 55 - with CSV files. 56 + CleverCSV is a Python package for handling messy CSV files. It provides 57 + a drop-in replacement for the builtin CSV module with improved dialect 58 + detection, and comes with a handy command line application for working 59 + with CSV files. 56 60 ''; 57 61 homepage = "https://github.com/alan-turing-institute/CleverCSV"; 58 62 changelog = "https://github.com/alan-turing-institute/CleverCSV/blob/master/CHANGELOG.md";
+2 -5
pkgs/development/python-modules/contextlib2/default.nix
··· 3 3 , fetchPypi 4 4 , python 5 5 , pythonOlder 6 + , unittestCheckHook 6 7 }: 7 8 8 9 buildPythonPackage rec { ··· 17 18 hash = "sha256-qx4r/h0B2Wjht+jZAjvFHvNQm7ohe7cwzuOCfh7oKGk="; 18 19 }; 19 20 20 - checkPhase = '' 21 - runHook preCheck 22 - ${python.interpreter} -m unittest discover 23 - runHook postCheck 24 - ''; 21 + checkInputs = [ unittestCheckHook ]; 25 22 26 23 pythonImportsCheck = [ 27 24 "contextlib2"
+6 -4
pkgs/development/python-modules/cvxopt/default.nix
··· 3 3 , fetchPypi 4 4 , isPyPy 5 5 , python 6 - , blas, lapack # build segfaults with 64-bit blas 6 + , blas 7 + , lapack # build segfaults with 64-bit blas 7 8 , suitesparse 9 + , unittestCheckHook 8 10 , glpk ? null 9 11 , gsl ? null 10 12 , fftw ? null ··· 49 51 export CVXOPT_FFTW_INC_DIR=${fftw.dev}/include 50 52 ''; 51 53 52 - checkPhase = '' 53 - ${python.interpreter} -m unittest discover -s tests 54 - ''; 54 + checkInputs = [ unittestCheckHook ]; 55 + 56 + unittestFlagsArray = [ "-s" "tests" ]; 55 57 56 58 meta = with lib; { 57 59 homepage = "http://cvxopt.org/";
+5 -7
pkgs/development/python-modules/cyclonedx-python-lib/default.nix
··· 14 14 , toml 15 15 , types-setuptools 16 16 , types-toml 17 + , unittestCheckHook 17 18 , xmldiff 18 19 }: 19 20 ··· 47 48 ]; 48 49 49 50 checkInputs = [ 51 + unittestCheckHook 50 52 jsonschema 51 53 lxml 52 54 xmldiff ··· 56 58 "cyclonedx" 57 59 ]; 58 60 59 - checkPhase = '' 60 - runHook preCheck 61 - # Tests require network access 62 - rm tests/test_output_json.py 63 - ${python.interpreter} -m unittest discover -s tests -v 64 - runHook postCheck 65 - ''; 61 + preCheck = '' 62 + rm tests/test_output_json.py 63 + ''; 66 64 67 65 meta = with lib; { 68 66 description = "Python library for generating CycloneDX SBOMs";
+4 -5
pkgs/development/python-modules/cymem/default.nix
··· 2 2 , buildPythonPackage 3 3 , fetchFromGitHub 4 4 , cython 5 - , python 5 + , unittestCheckHook 6 6 }: 7 7 8 8 buildPythonPackage rec { ··· 25 25 --replace "wheel>=0.32.0,<0.33.0" "wheel>=0.31.0" 26 26 ''; 27 27 28 - checkPhase = '' 29 - cd cymem/tests 30 - ${python.interpreter} -m unittest discover -p "*test*" 31 - ''; 28 + checkInputs = [ unittestCheckHook ]; 29 + 30 + unittestFlagsArray = [ "-s" "cymem/tests" "-p" "*test*" ]; 32 31 33 32 meta = with lib; { 34 33 description = "Cython memory pool for RAII-style memory management";
+2 -2
pkgs/development/python-modules/ddt/default.nix
··· 9 9 10 10 buildPythonPackage rec { 11 11 pname = "ddt"; 12 - version = "1.5.0"; 12 + version = "1.6.0"; 13 13 14 14 src = fetchPypi { 15 15 inherit pname version; 16 - sha256 = "sha256-2q1rxfx2GeWqfu1sOU4Fv4KUYWChPl3y4m3hdsuvNH4="; 16 + sha256 = "sha256-9xs0hzG4x4wxAL/72VGnafvUOQiNH9uzhB7uAZr4Cs0="; 17 17 }; 18 18 19 19 propagatedBuildInputs = lib.optionals (!isPy3k) [
+2 -5
pkgs/development/python-modules/deprecation/default.nix
··· 5 5 , pythonAtLeast 6 6 , pythonOlder 7 7 , unittest2 8 + , unittestCheckHook 8 9 }: 9 10 10 11 buildPythonPackage rec { ··· 29 30 30 31 # avoiding mass rebuilds for python3.9, but no longer 31 32 # needed with patch 32 - checkInputs = lib.optional (pythonOlder "3.10") [ 33 + checkInputs = [ unittestCheckHook ] ++ lib.optional (pythonOlder "3.10") [ 33 34 unittest2 34 35 ]; 35 - 36 - checkPhase = '' 37 - ${python.interpreter} -m unittest discover 38 - ''; 39 36 40 37 meta = with lib; { 41 38 description = "A library to handle automated deprecations";
+3 -5
pkgs/development/python-modules/emailthreads/default.nix
··· 1 1 { lib, fetchFromGitHub, buildPythonPackage 2 - , python, isPy3k }: 2 + , python, isPy3k, unittestCheckHook }: 3 3 4 4 buildPythonPackage rec { 5 5 pname = "emailthreads"; ··· 14 14 sha256 = "sha256-7BhYS1DQCW9QpG31asPCq5qPyJy+WW2onZpvEHhwQCs="; 15 15 }; 16 16 17 - PKGVER = version; 17 + checkInputs = [ unittestCheckHook ]; 18 18 19 - checkPhase = '' 20 - ${python.interpreter} -m unittest discover test 21 - ''; 19 + PKGVER = version; 22 20 23 21 meta = with lib; { 24 22 homepage = "https://github.com/emersion/python-emailthreads";
+2 -4
pkgs/development/python-modules/enum34/default.nix
··· 2 2 , buildPythonPackage 3 3 , fetchPypi 4 4 , pythonAtLeast 5 - , python 5 + , unittestCheckHook 6 6 }: 7 7 8 8 if pythonAtLeast "3.4" then null else buildPythonPackage rec { ··· 14 14 sha256 = "cce6a7477ed816bd2542d03d53db9f0db935dd013b70f336a95c73979289f248"; 15 15 }; 16 16 17 - checkPhase = '' 18 - ${python.interpreter} -m unittest discover 19 - ''; 17 + checkInputs = [ unittestCheckHook ]; 20 18 21 19 meta = with lib; { 22 20 homepage = "https://pypi.python.org/pypi/enum34";
+2 -4
pkgs/development/python-modules/fastimport/default.nix
··· 2 2 , pythonOlder 3 3 , buildPythonPackage 4 4 , fetchPypi 5 - , python 5 + , unittestCheckHook 6 6 }: 7 7 8 8 buildPythonPackage rec { ··· 16 16 sha256 = "6ac99dda4e7b0b3ae831507b6d0094802e6dd95891feafde8cc5c405b6c149ca"; 17 17 }; 18 18 19 - checkPhase = '' 20 - ${python.interpreter} -m unittest discover 21 - ''; 19 + checkInputs = [ unittestCheckHook ]; 22 20 23 21 pythonImportsCheck = [ "fastimport" ]; 24 22
+3 -10
pkgs/development/python-modules/fido2/default.nix
··· 5 5 , cryptography 6 6 , mock 7 7 , pyfakefs 8 + , unittestCheckHook 8 9 }: 9 10 10 11 buildPythonPackage rec { ··· 18 19 19 20 propagatedBuildInputs = [ six cryptography ]; 20 21 21 - checkInputs = [ mock pyfakefs ]; 22 - 23 - # Testing with `python setup.py test` doesn't work: 24 - # https://github.com/Yubico/python-fido2/issues/108#issuecomment-763513576 25 - checkPhase = '' 26 - runHook preCheck 27 - 28 - python -m unittest discover -v 22 + checkInputs = [ unittestCheckHook mock pyfakefs ]; 29 23 30 - runHook postCheck 31 - ''; 24 + unittestFlagsArray = [ "-v" ]; 32 25 33 26 pythonImportsCheck = [ "fido2" ]; 34 27
+2 -4
pkgs/development/python-modules/flask-babel/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 - , python 3 + , unittestCheckHook 4 4 , fetchPypi 5 5 , flask 6 6 , babel ··· 26 26 speaklater 27 27 ]; 28 28 29 - checkPhase = '' 30 - ${python.interpreter} -m unittest discover -s tests 31 - ''; 29 + unittestFlagsArray = [ "-s" "tests" ]; 32 30 33 31 meta = with lib; { 34 32 description = "Adds i18n/l10n support to Flask applications";
+2 -6
pkgs/development/python-modules/flask-bcrypt/default.nix
··· 3 3 , fetchFromGitHub 4 4 , flask 5 5 , bcrypt 6 - , python 6 + , unittestCheckHook 7 7 }: 8 8 9 9 buildPythonPackage rec { ··· 22 22 bcrypt 23 23 ]; 24 24 25 - checkPhase = '' 26 - runHook preCheck 27 - ${python.interpreter} -m unittest discover 28 - runHook postCheck 29 - ''; 25 + checkInputs = [ unittestCheckHook ]; 30 26 31 27 pythonImportsCheck = [ 32 28 "flask_bcrypt"
+2 -7
pkgs/development/python-modules/flask-migrate/default.nix
··· 6 6 , flask 7 7 , flask_script 8 8 , flask-sqlalchemy 9 - , python 9 + , unittestCheckHook 10 10 }: 11 11 12 12 buildPythonPackage rec { ··· 33 33 ]; 34 34 35 35 checkInputs = [ 36 + unittestCheckHook 36 37 flask_script 37 38 ]; 38 - 39 - checkPhase = '' 40 - runHook preCheck 41 - ${python.interpreter} -m unittest discover 42 - runHook postCheck 43 - ''; 44 39 45 40 meta = with lib; { 46 41 description = "SQLAlchemy database migrations for Flask applications using Alembic";
+2 -7
pkgs/development/python-modules/flask-seasurf/default.nix
··· 1 - { lib, fetchFromGitHub, buildPythonPackage, isPy3k, flask, mock, python }: 1 + { lib, fetchFromGitHub, buildPythonPackage, isPy3k, flask, mock, unittestCheckHook }: 2 2 3 3 buildPythonPackage rec { 4 4 pname = "Flask-SeaSurf"; ··· 15 15 propagatedBuildInputs = [ flask ]; 16 16 17 17 checkInputs = [ 18 + unittestCheckHook 18 19 mock 19 20 ]; 20 - 21 - checkPhase = '' 22 - runHook preCheck 23 - ${python.interpreter} -m unittest discover 24 - runHook postCheck 25 - ''; 26 21 27 22 pythonImportsCheck = [ "flask_seasurf" ]; 28 23
+2 -3
pkgs/development/python-modules/gb-io/default.nix
··· 4 4 , buildPythonPackage 5 5 , rustPlatform 6 6 , setuptools-rust 7 + , unittestCheckHook 7 8 }: 8 9 9 10 buildPythonPackage rec { ··· 31 32 rust.rustc 32 33 ]); 33 34 34 - checkPhase = '' 35 - python -m unittest discover 36 - ''; 35 + checkInputs = [ unittestCheckHook ]; 37 36 38 37 pythonImportsCheck = [ "gb_io" ]; 39 38
+6 -8
pkgs/development/python-modules/greenlet/default.nix
··· 2 2 , buildPythonPackage 3 3 , fetchPypi 4 4 , isPyPy 5 - , python 5 + , unittestCheckHook 6 6 }: 7 7 8 8 9 9 buildPythonPackage rec { 10 10 pname = "greenlet"; 11 11 version = "1.1.2"; 12 - disabled = isPyPy; # builtin for pypy 12 + disabled = isPyPy; # builtin for pypy 13 13 14 14 src = fetchPypi { 15 15 inherit pname version; 16 16 sha256 = "e30f5ea4ae2346e62cedde8794a56858a67b878dd79f7df76a0767e356b1744a"; 17 17 }; 18 18 19 - checkPhase = '' 20 - runHook preCheck 21 - ${python.interpreter} -m unittest discover -v greenlet.tests 22 - runHook postCheck 23 - ''; 19 + checkInputs = [ unittestCheckHook ]; 20 + 21 + unittestFlagsArray = [ "-v" "greenlet.tests" ]; 24 22 25 23 meta = with lib; { 26 24 homepage = "https://github.com/python-greenlet/greenlet"; 27 25 description = "Module for lightweight in-process concurrent programming"; 28 26 license = with licenses; [ 29 - psfl # src/greenlet/slp_platformselect.h & files in src/greenlet/platform/ directory 27 + psfl # src/greenlet/slp_platformselect.h & files in src/greenlet/platform/ directory 30 28 mit 31 29 ]; 32 30 };
+2 -5
pkgs/development/python-modules/gruut-ipa/default.nix
··· 4 4 , espeak 5 5 , numpy 6 6 , python 7 + , unittestCheckHook 7 8 }: 8 9 9 10 buildPythonPackage rec { ··· 29 30 numpy 30 31 ]; 31 32 32 - checkPhase = '' 33 - runHook preCheck 34 - ${python.interpreter} -m unittest discover 35 - runHook postCheck 36 - ''; 33 + checkInputs = [ unittestCheckHook ]; 37 34 38 35 pythonImportsCheck = [ 39 36 "gruut_ipa"
+4 -4
pkgs/development/python-modules/importlib-resources/default.nix
··· 6 6 , importlib-metadata 7 7 , typing ? null 8 8 , pythonOlder 9 - , python 9 + , unittestCheckHook 10 10 }: 11 11 12 12 buildPythonPackage rec { ··· 31 31 typing 32 32 ]; 33 33 34 - checkPhase = '' 35 - ${python.interpreter} -m unittest discover 36 - ''; 34 + checkInputs = [ 35 + unittestCheckHook 36 + ]; 37 37 38 38 pythonImportsCheck = [ 39 39 "importlib_resources"
+4 -4
pkgs/development/python-modules/isodate/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 3 , fetchPypi 4 - , python 4 + , unittestCheckHook 5 5 , six 6 6 }: 7 7 ··· 16 16 17 17 propagatedBuildInputs = [ six ]; 18 18 19 - checkPhase = '' 20 - ${python.interpreter} -m unittest discover -s src/isodate/tests 21 - ''; 19 + checkInputs = [ unittestCheckHook ]; 20 + 21 + unittestFlagsArray = [ "-s" "src/isodate/tests" ]; 22 22 23 23 meta = with lib; { 24 24 description = "ISO 8601 date/time parser";
+4 -6
pkgs/development/python-modules/jxmlease/default.nix
··· 2 2 , buildPythonPackage 3 3 , fetchPypi 4 4 , lxml 5 - , python 5 + , unittestCheckHook 6 6 }: 7 7 8 8 buildPythonPackage rec { ··· 22 22 # https://github.com/Juniper/jxmlease/issues/26 23 23 doCheck = false; 24 24 25 - checkPhase = '' 26 - runHook preCheck 27 - ${python.interpreter} -m unittest discover -v 28 - runHook postCheck 29 - ''; 25 + checkInputs = [ unittestCheckHook ]; 26 + 27 + unittestFlagsArray = [ "-v" ]; 30 28 31 29 meta = with lib; { 32 30 description = "Converts between XML and intelligent Python data structures";
+2 -6
pkgs/development/python-modules/karton-asciimagic/default.nix
··· 2 2 , buildPythonPackage 3 3 , fetchFromGitHub 4 4 , karton-core 5 - , python 5 + , unittestCheckHook 6 6 }: 7 7 8 8 buildPythonPackage rec { ··· 20 20 karton-core 21 21 ]; 22 22 23 - checkPhase = '' 24 - runHook preCheck 25 - ${python.interpreter} -m unittest discover 26 - runHook postCheck 27 - ''; 23 + checkInputs = [ unittestCheckHook ]; 28 24 29 25 pythonImportsCheck = [ "karton.asciimagic" ]; 30 26
+2 -6
pkgs/development/python-modules/karton-core/default.nix
··· 2 2 , boto3 3 3 , buildPythonPackage 4 4 , fetchFromGitHub 5 - , python 5 + , unittestCheckHook 6 6 , redis 7 7 }: 8 8 ··· 22 22 redis 23 23 ]; 24 24 25 - checkPhase = '' 26 - runHook preCheck 27 - ${python.interpreter} -m unittest discover 28 - runHook postCheck 29 - ''; 25 + checkInputs = [ unittestCheckHook ]; 30 26 31 27 pythonImportsCheck = [ 32 28 "karton.core"
+2 -6
pkgs/development/python-modules/karton-yaramatcher/default.nix
··· 2 2 , buildPythonPackage 3 3 , fetchFromGitHub 4 4 , karton-core 5 - , python 5 + , unittestCheckHook 6 6 , yara-python 7 7 }: 8 8 ··· 22 22 yara-python 23 23 ]; 24 24 25 - checkPhase = '' 26 - runHook preCheck 27 - ${python.interpreter} -m unittest discover 28 - runHook postCheck 29 - ''; 25 + checkInputs = [ unittestCheckHook ]; 30 26 31 27 pythonImportsCheck = [ "karton.yaramatcher" ]; 32 28
+2 -7
pkgs/development/python-modules/kbcstorage/default.nix
··· 12 12 13 13 # tests 14 14 , responses 15 - , python 15 + , unittestCheckHook 16 16 }: 17 17 18 18 buildPythonPackage rec { ··· 44 44 doCheck = false; 45 45 46 46 checkInputs = [ 47 + unittestCheckHook 47 48 responses 48 49 ]; 49 - 50 - checkPhase = '' 51 - runHook preCheck 52 - ${python.interpreter} -m unittest discover 53 - runHook postCheck 54 - ''; 55 50 56 51 pythonImportsCheck = [ 57 52 "kbcstorage"
+2 -6
pkgs/development/python-modules/markdown/default.nix
··· 4 4 , fetchPypi 5 5 , importlib-metadata 6 6 , pyyaml 7 - , python 7 + , unittestCheckHook 8 8 }: 9 9 10 10 buildPythonPackage rec { ··· 25 25 importlib-metadata 26 26 ]; 27 27 28 - checkInputs = [ pyyaml ]; 29 - 30 - checkPhase = '' 31 - ${python.interpreter} -m unittest discover 32 - ''; 28 + checkInputs = [ unittestCheckHook pyyaml ]; 33 29 34 30 pythonImportsCheck = [ "markdown" ]; 35 31
+6 -5
pkgs/development/python-modules/mat2/default.nix
··· 1 1 { lib 2 2 , stdenv 3 3 , buildPythonPackage 4 - , python 4 + , unittestCheckHook 5 5 , pythonOlder 6 6 , fetchFromGitLab 7 7 , substituteAll ··· 17 17 , mutagen 18 18 , pygobject3 19 19 , pycairo 20 - , dolphinIntegration ? false, plasma5Packages 20 + , dolphinIntegration ? false 21 + , plasma5Packages 21 22 }: 22 23 23 24 buildPythonPackage rec { ··· 92 93 install -Dm 444 dolphin/mat2.desktop -t "$out/share/kservices5/ServiceMenus" 93 94 ''; 94 95 95 - checkPhase = '' 96 - ${python.interpreter} -m unittest discover -v 97 - ''; 96 + checkInputs = [ unittestCheckHook ]; 97 + 98 + unittestFlagsArray = [ "-v" ]; 98 99 99 100 meta = with lib; { 100 101 description = "A handy tool to trash your metadata";
+3 -7
pkgs/development/python-modules/maxcube-api/default.nix
··· 2 2 , buildPythonPackage 3 3 , pythonOlder 4 4 , fetchFromGitHub 5 - , python 5 + , unittestCheckHook 6 6 }: 7 7 8 8 buildPythonPackage rec { ··· 22 22 substituteInPlace setup.py --replace "license=license" "license='MIT'" 23 23 ''; 24 24 25 + checkInputs = [ unittestCheckHook ]; 26 + 25 27 pythonImportsCheck = [ 26 28 "maxcube" 27 29 "maxcube.cube" 28 30 ]; 29 - 30 - checkPhase = '' 31 - runHook preCheck 32 - ${python.interpreter} -m unittest discover 33 - runHook postCheck 34 - ''; 35 31 36 32 meta = with lib; { 37 33 description = "eQ-3/ELV MAX! Cube Python API";
+2 -6
pkgs/development/python-modules/mdutils/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 3 , fetchFromGitHub 4 - , python 4 + , unittestCheckHook 5 5 }: 6 6 7 7 buildPythonPackage rec { ··· 15 15 sha256 = "sha256-regIrMWbGmW574dfojxZFJoivpaqOpN1I6YsqLEp8BM="; 16 16 }; 17 17 18 - checkPhase = '' 19 - runHook preCheck 20 - ${python.interpreter} -m unittest discover 21 - runHook postCheck 22 - ''; 18 + checkInputs = [ unittestCheckHook ]; 23 19 24 20 meta = with lib; { 25 21 description = "Set of basic tools that can help to create Markdown files";
+3 -11
pkgs/development/python-modules/mkdocs/default.nix
··· 18 18 # testing deps 19 19 , babel 20 20 , mock 21 - , pytestCheckHook 21 + , unittestCheckHook 22 22 }: 23 23 24 24 buildPythonPackage rec { ··· 47 47 ]; 48 48 49 49 checkInputs = [ 50 + unittestCheckHook 50 51 babel 51 52 mock 52 53 ]; 53 54 54 - 55 - checkPhase = '' 56 - set -euo pipefail 57 - 58 - runHook preCheck 59 - 60 - python -m unittest discover -v -p '*tests.py' mkdocs --top-level-directory . 61 - 62 - runHook postCheck 63 - ''; 55 + unittestFlagsArray = [ "-v" "-p" "'*tests.py'" "mkdocs" ]; 64 56 65 57 pythonImportsCheck = [ "mkdocs" ]; 66 58
+2 -4
pkgs/development/python-modules/mock/default.nix
··· 5 5 , python 6 6 , pythonOlder 7 7 , pytest 8 + , unittestCheckHook 8 9 }: 9 10 10 11 buildPythonPackage rec { ··· 26 27 }) 27 28 ]; 28 29 29 - checkPhase = '' 30 - ${python.interpreter} -m unittest discover 31 - ''; 32 - 33 30 checkInputs = [ 31 + unittestCheckHook 34 32 pytest 35 33 ]; 36 34
+2 -6
pkgs/development/python-modules/mwdblib/default.nix
··· 6 6 , fetchFromGitHub 7 7 , humanize 8 8 , keyring 9 - , python 9 + , unittestCheckHook 10 10 , python-dateutil 11 11 , pythonOlder 12 12 , requests ··· 36 36 requests 37 37 ]; 38 38 39 - checkPhase = '' 40 - runHook preCheck 41 - ${python.interpreter} -m unittest discover 42 - runHook postCheck 43 - ''; 39 + checkInputs = [ unittestCheckHook ]; 44 40 45 41 pythonImportsCheck = [ 46 42 "mwdblib"
+4 -4
pkgs/development/python-modules/mypy/extensions.nix
··· 2 2 , fetchFromGitHub 3 3 , buildPythonPackage 4 4 , typing 5 - , python 5 + , unittestCheckHook 6 6 , pythonOlder 7 7 }: 8 8 ··· 19 19 20 20 propagatedBuildInputs = lib.optional (pythonOlder "3.5") typing; 21 21 22 - checkPhase = '' 23 - ${python.interpreter} -m unittest discover tests 24 - ''; 22 + checkInputs = [ unittestCheckHook ]; 23 + 24 + unittestFlagsArray = [ "tests" ]; 25 25 26 26 pythonImportsCheck = [ "mypy_extensions" ]; 27 27
+2 -4
pkgs/development/python-modules/nix-prefetch-github/default.nix
··· 4 4 , git 5 5 , which 6 6 , pythonOlder 7 + , unittestCheckHook 7 8 }: 8 9 9 10 buildPythonPackage rec { ··· 19 20 sha256 = "etmlRavPzJKLmyw3PYMgeMveFj4aVi38crHjdtDuaLg="; 20 21 }; 21 22 22 - checkInputs = [ git which ]; 23 + checkInputs = [ unittestCheckHook git which ]; 23 24 24 - checkPhase = '' 25 - python -m unittest discover 26 - ''; 27 25 # ignore tests which are impure 28 26 DISABLED_TESTS = "network requires_nix_build"; 29 27
+2 -4
pkgs/development/python-modules/pathlib/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 3 , fetchPypi 4 - , python 4 + , unittestCheckHook 5 5 , pythonAtLeast 6 6 }: 7 7 ··· 15 15 sha256 = "17zajiw4mjbkkv6ahp3xf025qglkj0805m9s41c45zryzj6p2h39"; 16 16 }; 17 17 18 - checkPhase = '' 19 - ${python.interpreter} -m unittest discover 20 - ''; 18 + checkInputs = [ unittestCheckHook ]; 21 19 22 20 meta = { 23 21 description = "Object-oriented filesystem paths";
+4 -6
pkgs/development/python-modules/pgsanity/default.nix
··· 2 2 , python 3 3 , fetchPypi 4 4 , buildPythonPackage 5 - , postgresql }: 5 + , postgresql 6 + , unittestCheckHook 7 + }: 6 8 7 9 buildPythonPackage rec { 8 10 pname = "pgsanity"; ··· 13 15 sha256 = "de0bbd6fe4f98bf5139cb5f466eac2e2abaf5a7b050b9e4867b87bf360873173"; 14 16 }; 15 17 16 - checkPhase = '' 17 - ${python.interpreter} -m unittest discover -s test 18 - ''; 19 - 20 - checkInputs = [ postgresql ]; 18 + checkInputs = [ unittestCheckHook postgresql ]; 21 19 propagatedBuildInputs = [ postgresql ]; 22 20 23 21 meta = with lib; {
+4 -5
pkgs/development/python-modules/plac/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 3 , fetchPypi 4 - , python 4 + , unittestCheckHook 5 5 , pythonOlder 6 6 }: 7 7 ··· 17 17 hash = "sha256-OL3YZNBFD7dIGTqoF7nEWKj1MZ+/l7ImEVHPwKWBIJA="; 18 18 }; 19 19 20 - checkPhase = '' 21 - cd doc 22 - ${python.interpreter} -m unittest discover -p "*test_plac*" 23 - ''; 20 + checkInputs = [ unittestCheckHook ]; 21 + 22 + unittestFlagsArray = [ "-s" "doc" "-p" "*test_plac*" ]; 24 23 25 24 pythonImportsCheck = [ 26 25 "plac"
+3 -4
pkgs/development/python-modules/pulsectl/default.nix
··· 1 - { lib, buildPythonPackage, fetchPypi, libpulseaudio, glibc, substituteAll, stdenv, pulseaudio, python }: 1 + { lib, buildPythonPackage, fetchPypi, libpulseaudio, glibc, substituteAll, stdenv, pulseaudio, unittestCheckHook }: 2 2 3 3 buildPythonPackage rec { 4 4 pname = "pulsectl"; ··· 22 22 "pulsectl" 23 23 ]; 24 24 25 - checkInputs = [ pulseaudio ]; 25 + checkInputs = [ unittestCheckHook pulseaudio ]; 26 26 27 - checkPhase = '' 27 + preCheck = '' 28 28 export HOME=$TMPDIR 29 - ${python.interpreter} -m unittest discover 30 29 ''; 31 30 32 31 meta = with lib; {
+6 -2
pkgs/development/python-modules/pybind11/default.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "pybind11"; 16 - version = "2.9.2"; 16 + version = "2.10.0"; 17 17 18 18 src = fetchFromGitHub { 19 19 owner = "pybind"; 20 20 repo = pname; 21 21 rev = "v${version}"; 22 - hash = "sha256-O3bkexUBa+gfiJEM6KSR8y/iVqHqlCFmz/9EghxdIpw="; 22 + hash = "sha256-/X8DZPFsNrKGbhjZ1GFOj17/NU6p4R+saCW3pLKVNeA="; 23 23 }; 24 + 25 + postPatch = '' 26 + sed -i "/^timeout/d" pyproject.toml 27 + ''; 24 28 25 29 nativeBuildInputs = [ cmake ]; 26 30
+4 -4
pkgs/development/python-modules/pycparser/default.nix
··· 1 - { lib, buildPythonPackage, fetchPypi, python }: 1 + { lib, buildPythonPackage, fetchPypi, unittestCheckHook }: 2 2 3 3 buildPythonPackage rec { 4 4 pname = "pycparser"; ··· 9 9 sha256 = "e644fdec12f7872f86c58ff790da456218b10f863970249516d60a5eaca77206"; 10 10 }; 11 11 12 - checkPhase = '' 13 - ${python.interpreter} -m unittest discover -s tests 14 - ''; 12 + checkInputs = [ unittestCheckHook ]; 13 + 14 + unittestFlagsArray = [ "-s" "tests" ]; 15 15 16 16 meta = with lib; { 17 17 description = "C parser in Python";
+1 -1
pkgs/development/python-modules/pyelftools/default.nix
··· 20 20 hash = "sha256-+T5C0ah2oj5E8fWaQbuzYRVgD5bSiUbaArrlxNLojvw="; 21 21 }; 22 22 23 - doCheck = stdenv.hostPlatform.system == "x86_64-linux"; 23 + doCheck = stdenv.hostPlatform.system == "x86_64-linux" && stdenv.hostPlatform.isGnu; 24 24 25 25 checkPhase = '' 26 26 patchelf --set-interpreter "$(cat $NIX_CC/nix-support/dynamic-linker)" test/external_tools/readelf
+3 -5
pkgs/development/python-modules/pypdf2/default.nix
··· 4 4 , pythonOlder 5 5 , glibcLocales 6 6 , typing-extensions 7 - , python 7 + , unittestCheckHook 8 8 , isPy3k 9 9 }: 10 10 ··· 24 24 typing-extensions 25 25 ]; 26 26 27 - checkPhase = '' 28 - ${python.interpreter} -m unittest discover 29 - ''; 30 - 31 27 # Tests broken on Python 3.x 32 28 #doCheck = !(isPy3k); 29 + 30 + checkInputs = [ unittestCheckHook ]; 33 31 34 32 meta = with lib; { 35 33 description = "A Pure-Python library built as a PDF toolkit";
+4 -6
pkgs/development/python-modules/pyrad/default.nix
··· 5 5 , poetry-core 6 6 , netaddr 7 7 , six 8 - , python 8 + , unittestCheckHook 9 9 }: 10 10 11 11 buildPythonPackage rec { ··· 43 43 --replace "def testBindv6(self):" "def dontTestBindv6(self):" 44 44 ''; 45 45 46 - checkPhase = '' 47 - runHook preCheck 48 - ${python.interpreter} -m unittest discover 49 - runHook postCheck 50 - ''; 46 + checkInputs = [ 47 + unittestCheckHook 48 + ]; 51 49 52 50 pythonImportsCheck = [ 53 51 "pyrad"
+4 -5
pkgs/development/python-modules/pysensors/default.nix
··· 1 - { lib, buildPythonPackage, python, fetchFromGitHub, lm_sensors }: 1 + { lib, buildPythonPackage, unittestCheckHook, fetchFromGitHub, lm_sensors }: 2 2 buildPythonPackage { 3 3 version = "2017-07-13"; 4 4 pname = "pysensors"; ··· 17 17 # due to sandboxing 18 18 doCheck = false; 19 19 20 - checkPhase = '' 21 - cd tests 22 - ${python.interpreter} -m unittest discover 23 - ''; 20 + checkInputs = [ unittestCheckHook ]; 21 + 22 + unittestFlagsArray = [ "-s" "tests" ]; 24 23 25 24 meta = with lib; { 26 25 maintainers = with maintainers; [ guibou ];
+4 -6
pkgs/development/python-modules/pyserial/default.nix
··· 2 2 , stdenv 3 3 , buildPythonPackage 4 4 , fetchPypi 5 - , python 5 + , unittestCheckHook 6 6 , pythonOlder 7 7 , isPy3k 8 8 }: ··· 27 27 28 28 doCheck = !stdenv.hostPlatform.isDarwin; # broken on darwin 29 29 30 - checkPhase = '' 31 - runHook preCheck 32 - ${python.interpreter} -m unittest discover -s test 33 - runHook postCheck 34 - ''; 30 + checkInputs = [ unittestCheckHook ]; 31 + 32 + unittestFlagsArray = [ "-s" "test" ]; 35 33 36 34 pythonImportsCheck = [ 37 35 "serial"
+3 -5
pkgs/development/python-modules/pystache/default.nix
··· 1 - { lib, buildPythonPackage, python, fetchPypi, isPy3k, glibcLocales }: 1 + { lib, buildPythonPackage, unittestCheckHook, fetchPypi, isPy3k, glibcLocales }: 2 2 3 3 buildPythonPackage rec { 4 4 pname = "pystache"; ··· 13 13 14 14 buildInputs = [ glibcLocales ]; 15 15 16 - checkPhase = '' 17 - ${python.interpreter} -m unittest discover 18 - ''; 19 - 20 16 # SyntaxError Python 3 21 17 # https://github.com/defunkt/pystache/issues/181 22 18 doCheck = !isPy3k; 19 + 20 + checkInputs = [ unittestCheckHook ]; 23 21 24 22 meta = with lib; { 25 23 description = "A framework-agnostic, logic-free templating system inspired by ctemplate and et";
+2 -4
pkgs/development/python-modules/python-keycloak/default.nix
··· 4 4 , requests 5 5 , python-jose 6 6 , httmock 7 + , unittestCheckHook 7 8 }: 8 9 9 10 buildPythonPackage rec { ··· 23 24 ]; 24 25 25 26 checkInputs = [ 27 + unittestCheckHook 26 28 httmock 27 29 ]; 28 - 29 - checkPhase = '' 30 - python -m unittest discover 31 - ''; 32 30 33 31 pythonImportsCheck = [ "keycloak" ]; 34 32
+2 -6
pkgs/development/python-modules/python-snappy/default.nix
··· 4 4 , isPyPy 5 5 , snappy 6 6 , cffi 7 - , python 7 + , unittestCheckHook 8 8 }: 9 9 10 10 buildPythonPackage rec { ··· 21 21 22 22 propagatedBuildInputs = lib.optional isPyPy cffi; 23 23 24 - checkPhase = '' 25 - runHook preCheck 26 - ${python.interpreter} -m unittest discover 27 - runHook postCheck 28 - ''; 24 + checkInputs = [ unittestCheckHook ]; 29 25 30 26 meta = with lib; { 31 27 description = "Python library for the snappy compression library from Google";
+2 -4
pkgs/development/python-modules/pytidylib/default.nix
··· 1 - { lib, stdenv, buildPythonPackage, fetchPypi, python, html-tidy }: 1 + { lib, stdenv, buildPythonPackage, fetchPypi, unittestCheckHook, html-tidy }: 2 2 3 3 buildPythonPackage rec { 4 4 pname = "pytidylib"; ··· 21 21 $' @unittest.skip("")\n def test_large_document(self):' 22 22 ''; 23 23 24 - checkPhase = '' 25 - ${python.interpreter} -m unittest discover 26 - ''; 24 + checkInputs = [ unittestCheckHook ]; 27 25 28 26 meta = with lib; { 29 27 description = "Python wrapper for HTML Tidy (tidylib) on Python 2 and 3";
+4 -4
pkgs/development/python-modules/pytz/default.nix
··· 1 - { lib, buildPythonPackage, fetchPypi, python }: 1 + { lib, buildPythonPackage, fetchPypi, unittestCheckHook }: 2 2 3 3 buildPythonPackage rec { 4 4 pname = "pytz"; ··· 9 9 sha256 = "sha256-HnYOL+aoFjvAs9mhnE+ENCr6Cir/6/qoSwG5eKAuyqc="; 10 10 }; 11 11 12 - checkPhase = '' 13 - ${python.interpreter} -m unittest discover -s pytz/tests 14 - ''; 12 + checkInputs = [ unittestCheckHook ]; 13 + 14 + unittestFlagsArray = [ "-s" "pytz/tests" ]; 15 15 16 16 pythonImportsCheck = [ "pytz" ]; 17 17
+4 -4
pkgs/development/python-modules/readlike/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 3 , fetchFromGitHub 4 - , python 4 + , unittestCheckHook 5 5 }: 6 6 7 7 buildPythonPackage rec { ··· 15 15 sha256 = "1mw8j8ads8hqdbz42siwpffi4wi5s33z9g14a5c2i7vxp8m68qc1"; 16 16 }; 17 17 18 - checkPhase = '' 19 - ${python.interpreter} -m unittest discover -s tests 20 - ''; 18 + checkInputs = [ unittestCheckHook ]; 19 + 20 + unittestFlagsArray = [ "-s" "tests" ]; 21 21 22 22 meta = with lib; { 23 23 description = "GNU Readline-like line editing module";
+1 -1
pkgs/development/python-modules/recursive-pth-loader/default.nix
··· 10 10 11 11 patchPhase = "cat ${./sitecustomize.py} > sitecustomize.py"; 12 12 13 - buildPhase = "${python}/bin/${python.executable} -m compileall ."; 13 + buildPhase = "${python.pythonForBuild}/bin/${python.pythonForBuild.executable} -m compileall ."; 14 14 15 15 installPhase = 16 16 ''
+2 -3
pkgs/development/python-modules/setuptools-rust/default.nix
··· 7 7 , setuptools 8 8 , setuptools-scm 9 9 , typing-extensions 10 - , toml 11 10 }: 12 11 13 12 buildPythonPackage rec { 14 13 pname = "setuptools-rust"; 15 - version = "1.4.1"; 14 + version = "1.5.0"; 16 15 disabled = pythonOlder "3.6"; 17 16 18 17 src = fetchPypi { 19 18 inherit pname version; 20 - sha256 = "sha256-GP+FCDH1juIdV4OCXJn61jLaIeR2RelCf9fewEgCnnY="; 19 + sha256 = "sha256-C4rrgUr+Dp18MVaewJNtH1IBmTUwY5JE+pc+F0IAVnE="; 21 20 }; 22 21 23 22 nativeBuildInputs = [ setuptools-scm ];
+2 -6
pkgs/development/python-modules/sjcl/default.nix
··· 3 3 , fetchFromGitHub 4 4 , pythonOlder 5 5 , pycryptodome 6 - , python 6 + , unittestCheckHook 7 7 }: 8 8 9 9 buildPythonPackage rec { ··· 23 23 24 24 propagatedBuildInputs = [ pycryptodome ]; 25 25 26 - checkPhase = '' 27 - runHook preCheck 28 - ${python.interpreter} -m unittest discover 29 - runHook postCheck 30 - ''; 26 + checkInputs = [ unittestCheckHook ]; 31 27 32 28 pythonImportsCheck = [ 33 29 "sjcl"
+2 -2
pkgs/development/python-modules/sphinx-autodoc-typehints/default.nix
··· 8 8 9 9 let 10 10 pname = "sphinx-autodoc-typehints"; 11 - version = "1.19.1"; 11 + version = "1.19.2"; 12 12 in 13 13 14 14 buildPythonPackage { ··· 20 20 src = fetchPypi { 21 21 pname = "sphinx_autodoc_typehints"; 22 22 inherit version; 23 - hash = "sha256-bIQdtV4Om+BIP/OWKiFStg55MG9CiNjE5+hqyESGpeo="; 23 + hash = "sha256-hy+y17PXlIJsKONu32c56TVJSRRH3KvrB8WIVen5FN4="; 24 24 }; 25 25 26 26 propagatedBuildInputs = [
+3 -5
pkgs/development/python-modules/sphinx-testing/default.nix
··· 4 4 , mock 5 5 , sphinx 6 6 , six 7 - , python 7 + , unittestCheckHook 8 8 }: 9 9 10 10 buildPythonPackage rec { ··· 16 16 sha256 = "ef661775b5722d7b00f67fc229104317d35637a4fb4434bf2c005afdf1da4d09"; 17 17 }; 18 18 19 - checkInputs = [ mock ]; 19 + checkInputs = [ unittestCheckHook mock ]; 20 20 propagatedBuildInputs = [ sphinx six ]; 21 21 22 - checkPhase = '' 23 - ${python.interpreter} -m unittest discover -s tests 24 - ''; 22 + unittestFlagsArray = [ "-s" "tests" ]; 25 23 26 24 # Test failures https://github.com/sphinx-doc/sphinx-testing/issues/5 27 25 doCheck = false;
+10 -14
pkgs/development/python-modules/sphinx/default.nix
··· 4 4 , pythonOlder 5 5 , fetchFromGitHub 6 6 , fetchpatch 7 + 7 8 # propagatedBuildInputs 8 9 , babel 9 10 , alabaster ··· 23 24 , sphinxcontrib-qthelp 24 25 , sphinxcontrib-serializinghtml 25 26 , sphinxcontrib-websupport 27 + 26 28 # check phase 29 + , cython 27 30 , html5lib 28 31 , pytestCheckHook 29 32 , typed-ast ··· 31 34 32 35 buildPythonPackage rec { 33 36 pname = "sphinx"; 34 - version = "5.0.2"; 37 + version = "5.1.1"; 35 38 format = "setuptools"; 36 39 37 40 disabled = pythonOlder "3.6"; ··· 40 43 owner = "sphinx-doc"; 41 44 repo = pname; 42 45 rev = "refs/tags/v${version}"; 43 - hash = "sha256-kdwznYvs4szhC+qoL2Zsib9cU69fag1KhCXl8qIGkZU="; 46 + hash = "sha256-dTgQNMRIn7ETm+1HgviOkWWOCmLX7Ez6DM9ChlI32mY="; 44 47 postFetch = '' 45 48 cd $out 46 49 mv tests/roots/test-images/testimäge.png \ ··· 49 52 ''; 50 53 }; 51 54 52 - patches = [ 53 - # https://github.com/sphinx-doc/sphinx/pull/10624 54 - (fetchpatch { 55 - name = "avoid-deprecated-docutils-0.19-api.patch"; 56 - sha256 = "sha256-QIrLkxnexNcfuI00UOeCpAamMLqqt4wxoVY1VA72jIw="; 57 - url = "https://github.com/sphinx-doc/sphinx/commit/8d99168794ab8be0de1e6281d1b76af8177acd3d.patch"; 58 - }) 59 - ]; 60 - 61 55 postPatch = '' 62 - substituteInPlace setup.py \ 63 - --replace "docutils>=0.14,<0.19" "docutils>=0.14" 64 - 65 56 # remove impurity caused by date inclusion 66 57 # https://github.com/sphinx-doc/sphinx/blob/master/setup.cfg#L4-L6 67 58 substituteInPlace setup.cfg \ ··· 95 86 ]; 96 87 97 88 checkInputs = [ 89 + cython 98 90 html5lib 99 91 pytestCheckHook 100 92 ] ++ lib.optionals (pythonOlder "3.8") [ 101 93 typed-ast 102 94 ]; 95 + 96 + preCheck = '' 97 + export HOME=$(mktemp -d) 98 + ''; 103 99 104 100 disabledTests = [ 105 101 # requires network access
+5 -4
pkgs/development/python-modules/sphinxcontrib-blockdiag/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 3 , fetchPypi 4 - , python 4 + , unittestCheckHook 5 5 , mock 6 6 , sphinx-testing 7 7 , sphinx ··· 22 22 23 23 # Seems to look for files in the wrong dir 24 24 doCheck = false; 25 - checkPhase = '' 26 - ${python.interpreter} -m unittest discover -s tests 27 - ''; 25 + 26 + checkInputs = [ unittestCheckHook ]; 27 + 28 + unittestFlagsArray = [ "-s" "tests" ]; 28 29 29 30 meta = with lib; { 30 31 description = "Sphinx blockdiag extension";
+2 -2
pkgs/development/python-modules/sqlalchemy/default.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "SQLAlchemy"; 16 - version = "1.4.39"; 16 + version = "1.4.40"; 17 17 18 18 src = fetchPypi { 19 19 inherit pname version; 20 - hash = "sha256-gZSJYDh1O0awigsK6JpdgMiX+2Ad1R4kPtVyDx8VXSc="; 20 + hash = "sha256-RKZgUGCAzJdeHfpXdv5fYxXdxiane1C/Du4YsDieomU="; 21 21 }; 22 22 23 23 propagatedBuildInputs = [
+2 -4
pkgs/development/python-modules/tabview/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 3 , fetchFromGitHub 4 - , python 4 + , unittestCheckHook 5 5 }: 6 6 7 7 buildPythonPackage rec { ··· 17 17 sha256 = "1d1l8fhdn3w2zg7wakvlmjmgjh9lh9h5fal1clgyiqmhfix4cn4m"; 18 18 }; 19 19 20 - checkPhase = '' 21 - ${python.interpreter} -m unittest discover 22 - ''; 20 + checkInputs = [ unittestCheckHook ]; 23 21 24 22 meta = with lib; { 25 23 description = "Python curses command line CSV and tabular data viewer";
+4 -8
pkgs/development/python-modules/tomli/default.nix
··· 3 3 , callPackage 4 4 , fetchFromGitHub 5 5 , flit-core 6 - , python 6 + , unittestCheckHook 7 7 8 - # important downstream dependencies 8 + # important downstream dependencies 9 9 , flit 10 10 , black 11 11 , mypy ··· 26 26 27 27 nativeBuildInputs = [ flit-core ]; 28 28 29 - pythonImportsCheck = [ "tomli" ]; 29 + checkInputs = [ unittestCheckHook ]; 30 30 31 - checkPhase = '' 32 - runHook preCheck 33 - ${python.interpreter} -m unittest discover 34 - runHook postCheck 35 - ''; 31 + pythonImportsCheck = [ "tomli" ]; 36 32 37 33 passthru.tests = { 38 34 # test downstream dependencies
+9 -8
pkgs/development/python-modules/tornado/4.nix
··· 1 1 { lib 2 - , python 2 + , unittestCheckHook 3 3 , buildPythonPackage 4 4 , fetchPypi 5 5 , isPy27 6 + , pythonAtLeast 6 7 }: 7 8 8 9 buildPythonPackage rec { 9 10 pname = "tornado"; 10 11 version = "4.5.3"; 11 - disabled = isPy27 || python.pythonAtLeast "3.10"; 12 - 13 - # We specify the name of the test files to prevent 14 - # https://github.com/NixOS/nixpkgs/issues/14634 15 - checkPhase = '' 16 - ${python.interpreter} -m unittest discover *_test.py 17 - ''; 12 + disabled = isPy27 || pythonAtLeast "3.10"; 18 13 19 14 src = fetchPypi { 20 15 inherit pname version; 21 16 sha256 = "02jzd23l4r6fswmwxaica9ldlyc2p6q8dk6dyff7j58fmdzf853d"; 22 17 }; 18 + 19 + checkInputs = [ unittestCheckHook ]; 20 + 21 + # We specify the name of the test files to prevent 22 + # https://github.com/NixOS/nixpkgs/issues/14634 23 + unittestFlagsArray = [ "*_test.py" ]; 23 24 24 25 __darwinAllowLocalNetworking = true; 25 26
+7 -7
pkgs/development/python-modules/tornado/5.nix
··· 1 1 { lib 2 - , python 2 + , unittestCheckHook 3 3 , buildPythonPackage 4 4 , fetchPypi 5 5 , isPy27 ··· 11 11 version = "5.1.1"; 12 12 disabled = isPy27 || pythonAtLeast "3.10"; 13 13 14 - # We specify the name of the test files to prevent 15 - # https://github.com/NixOS/nixpkgs/issues/14634 16 - checkPhase = '' 17 - ${python.interpreter} -m unittest discover *_test.py 18 - ''; 19 - 20 14 src = fetchPypi { 21 15 inherit pname version; 22 16 sha256 = "4e5158d97583502a7e2739951553cbd88a72076f152b4b11b64b9a10c4c49409"; 23 17 }; 18 + 19 + checkInputs = [ unittestCheckHook ]; 20 + 21 + # We specify the name of the test files to prevent 22 + # https://github.com/NixOS/nixpkgs/issues/14634 23 + unittestFlagsArray = [ "*_test.py" ]; 24 24 25 25 __darwinAllowLocalNetworking = true; 26 26
+10 -10
pkgs/development/python-modules/trytond/default.nix
··· 18 18 , weasyprint 19 19 , gevent 20 20 , pillow 21 - , withPostgresql ? true, psycopg2 22 - , python 21 + , withPostgresql ? true 22 + , psycopg2 23 + , unittestCheckHook 23 24 }: 24 25 25 26 buildPythonPackage rec { ··· 54 55 gevent 55 56 pillow 56 57 ] ++ relatorio.optional-dependencies.fodt 57 - ++ passlib.optional-dependencies.bcrypt 58 - ++ passlib.optional-dependencies.argon2 59 - ++ lib.optional withPostgresql psycopg2; 58 + ++ passlib.optional-dependencies.bcrypt 59 + ++ passlib.optional-dependencies.argon2 60 + ++ lib.optional withPostgresql psycopg2; 60 61 61 - checkPhase = '' 62 - runHook preCheck 62 + checkInputs = [ unittestCheckHook ]; 63 63 64 + preCheck = '' 64 65 export HOME=$(mktemp -d) 65 66 export TRYTOND_DATABASE_URI="sqlite://" 66 67 export DB_NAME=":memory:"; 67 - ${python.interpreter} -m unittest discover -s trytond.tests 68 + ''; 68 69 69 - runHook postCheck 70 - ''; 70 + unittestFlagsArray = [ "-s" "trytond.tests" ]; 71 71 72 72 meta = with lib; { 73 73 description = "The server of the Tryton application platform";
+2 -4
pkgs/development/python-modules/txrequests/default.nix
··· 4 4 , twisted 5 5 , requests 6 6 , cryptography 7 - , python 7 + , unittestCheckHook 8 8 }: 9 9 10 10 buildPythonPackage rec { ··· 21 21 # Require network access 22 22 doCheck = false; 23 23 24 - checkPhase = '' 25 - ${python.interpreter} -m unittest discover 26 - ''; 24 + checkInputs = [ unittestCheckHook ]; 27 25 28 26 meta = with lib; { 29 27 description = "Asynchronous Python HTTP for Humans.";
+2 -4
pkgs/development/python-modules/u-msgpack-python/default.nix
··· 2 2 , lib 3 3 , fetchPypi 4 4 , glibcLocales 5 - , python 5 + , unittestCheckHook 6 6 }: 7 7 8 8 buildPythonPackage rec { ··· 18 18 19 19 buildInputs = [ glibcLocales ]; 20 20 21 - checkPhase = '' 22 - ${python.interpreter} -m unittest discover 23 - ''; 21 + checkInputs = [ unittestCheckHook ]; 24 22 25 23 meta = { 26 24 description = "A portable, lightweight MessagePack serializer and deserializer written in pure Python";
+4 -4
pkgs/development/python-modules/unidiff/default.nix
··· 1 - { lib, buildPythonPackage, fetchPypi, python }: 1 + { lib, buildPythonPackage, fetchPypi, unittestCheckHook }: 2 2 3 3 buildPythonPackage rec { 4 4 pname = "unidiff"; ··· 9 9 sha256 = "2bbcbc986e1fb97f04b1d7b864aa6002ab02f4d8a996bf03aa6e5a81447d1fc5"; 10 10 }; 11 11 12 - checkPhase = '' 13 - ${python.interpreter} -m unittest discover -s tests/ 14 - ''; 12 + checkInputs = [ unittestCheckHook ]; 13 + 14 + unittestFlagsArray = [ "-s" "tests" ]; 15 15 16 16 pythonImportsCheck = [ "unidiff" ]; 17 17
+2 -2
pkgs/development/python-modules/unify/default.nix
··· 2 2 , buildPythonPackage 3 3 , fetchFromGitHub 4 4 , untokenize 5 - , python 5 + , unittestCheckHook 6 6 }: 7 7 8 8 buildPythonPackage rec { ··· 19 19 20 20 propagatedBuildInputs = [ untokenize ]; 21 21 22 - checkPhase = "${python.interpreter} -m unittest discover"; 22 + checkInputs = [ unittestCheckHook ]; 23 23 24 24 meta = with lib; { 25 25 description = "Modifies strings to all use the same quote where possible";
+4 -4
pkgs/development/python-modules/untangle/default.nix
··· 1 - { lib, buildPythonPackage, fetchFromGitHub, python, defusedxml }: 1 + { lib, buildPythonPackage, fetchFromGitHub, unittestCheckHook, defusedxml }: 2 2 3 3 buildPythonPackage rec { 4 4 pname = "untangle"; ··· 16 16 defusedxml 17 17 ]; 18 18 19 - checkPhase = '' 20 - ${python.interpreter} -m unittest discover -s tests 21 - ''; 19 + checkInputs = [ unittestCheckHook ]; 20 + 21 + unittestFlagsArray = [ "-s" "tests" ]; 22 22 23 23 meta = with lib; { 24 24 description = "Convert XML documents into Python objects";
+2 -2
pkgs/development/python-modules/untokenize/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 3 , fetchPypi 4 - , python 4 + , unittestCheckHook 5 5 }: 6 6 7 7 buildPythonPackage rec { ··· 13 13 sha256 = "3865dbbbb8efb4bb5eaa72f1be7f3e0be00ea8b7f125c69cbd1f5fda926f37a2"; 14 14 }; 15 15 16 - checkPhase = "${python.interpreter} -m unittest discover"; 16 + checkInputs = [ unittestCheckHook ]; 17 17 18 18 meta = with lib; { 19 19 description = "Transforms tokens into original source code while preserving whitespace";
+6 -4
pkgs/development/python-modules/vapoursynth/default.nix
··· 1 - { vapoursynth, cython, buildPythonPackage, python }: 1 + { vapoursynth, cython, buildPythonPackage, unittestCheckHook }: 2 2 3 3 buildPythonPackage { 4 4 pname = "vapoursynth"; ··· 13 13 vapoursynth 14 14 ]; 15 15 16 - checkPhase = '' 17 - ${python.interpreter} -m unittest discover -s $src/test -p "*test.py" 18 - ''; 16 + checkInputs = [ 17 + unittestCheckHook 18 + ]; 19 + 20 + unittestFlagsArray = [ "-s" "$src/test" "-p" "'*test.py'" ]; 19 21 20 22 inherit (vapoursynth) meta; 21 23 }
+4 -4
pkgs/development/python-modules/webcolors/default.nix
··· 2 2 , buildPythonPackage 3 3 , fetchPypi 4 4 , pythonOlder 5 - , python 5 + , unittestCheckHook 6 6 }: 7 7 8 8 buildPythonPackage rec { ··· 17 17 hash = "sha256-FtBD06CP1qGxt+Pp5iZA0JeQ3OgNK91HkqF1s1/nlKk="; 18 18 }; 19 19 20 - checkPhase = '' 21 - ${python.interpreter} -m unittest discover -s tests 22 - ''; 20 + checkInputs = [ unittestCheckHook ]; 21 + 22 + unittestFlagsArray = [ "-s" "tests" ]; 23 23 24 24 pythonImportsCheck = [ 25 25 "webcolors"
+2 -6
pkgs/development/python-modules/websockets/default.nix
··· 2 2 , stdenv 3 3 , buildPythonPackage 4 4 , fetchFromGitHub 5 - , python 5 + , unittestCheckHook 6 6 , pythonOlder 7 7 }: 8 8 ··· 44 44 done 45 45 ''; 46 46 47 - checkPhase = '' 48 - runHook preCheck 49 - ${python.interpreter} -m unittest discover 50 - runHook postCheck 51 - ''; 47 + checkInputs = [ unittestCheckHook ]; 52 48 53 49 pythonImportsCheck = [ 54 50 "websockets"
+5 -4
pkgs/development/python-modules/zake/default.nix
··· 4 4 , kazoo 5 5 , six 6 6 , testtools 7 - , python 7 + , unittestCheckHook 8 8 }: 9 9 10 10 buildPythonPackage rec { ··· 18 18 19 19 propagatedBuildInputs = [ kazoo six ]; 20 20 buildInputs = [ testtools ]; 21 - checkPhase = '' 21 + checkInputs = [ unittestCheckHook ]; 22 + preCheck = '' 22 23 # Skip test - fails with our new kazoo version 23 24 substituteInPlace zake/tests/test_client.py \ 24 25 --replace "test_child_watch_no_create" "_test_child_watch_no_create" 26 + ''; 25 27 26 - ${python.interpreter} -m unittest discover zake/tests 27 - ''; 28 + unittestFlagsArray = [ "zake/tests" ]; 28 29 29 30 meta = with lib; { 30 31 homepage = "https://github.com/yahoo/Zake";
+3 -4
pkgs/development/python-modules/zope_copy/default.nix
··· 5 5 , zope_interface 6 6 , zope_location 7 7 , zope_schema 8 + , unittestCheckHook 8 9 }: 9 10 10 11 ··· 20 21 propagatedBuildInputs = [ zope_interface ]; 21 22 22 23 doCheck = !isPy27; # namespace conflicts 23 - checkInputs = [ zope_location zope_schema ]; 24 + checkInputs = [ unittestCheckHook zope_location zope_schema ]; 24 25 25 - checkPhase = '' 26 - python -m unittest discover -s src/zope/copy 27 - ''; 26 + unittestFlagsArray = [ "-s" "src/zope/copy" ]; 28 27 29 28 meta = { 30 29 maintainers = with lib.maintainers; [ domenkozar ];
+2 -5
pkgs/development/python2-modules/mock/default.nix
··· 5 5 , funcsigs 6 6 , six 7 7 , pbr 8 - , python 8 + , unittestCheckHook 9 9 , pytest 10 10 }: 11 11 ··· 27 27 #doCheck = !(python.isPyPy && python.isPy27); 28 28 doCheck = false; # Infinite recursion pytest 29 29 30 - checkPhase = '' 31 - ${python.interpreter} -m unittest discover 32 - ''; 33 - 34 30 checkInputs = [ 31 + unittestCheckHook 35 32 pytest 36 33 ]; 37 34
+4 -5
pkgs/development/python2-modules/typing/default.nix
··· 1 - { lib, buildPythonPackage, fetchPypi, pythonOlder, isPy3k, isPyPy, python 1 + { lib, buildPythonPackage, fetchPypi, pythonOlder, isPy3k, isPyPy, unittestCheckHook 2 2 , pythonAtLeast }: 3 3 4 4 let ··· 20 20 # Also, don't bother on PyPy: AssertionError: TypeError not raised 21 21 doCheck = pythonOlder "3.6" && !isPyPy; 22 22 23 - checkPhase = '' 24 - cd ${testDir} 25 - ${python.interpreter} -m unittest discover 26 - ''; 23 + checkInputs = [ unittestCheckHook ]; 24 + 25 + unittestFlagsArray = [ "-s" testDir ]; 27 26 28 27 meta = with lib; { 29 28 description = "Backport of typing module to Python versions older than 3.5";
+29 -11
pkgs/development/tools/build-managers/cmake/001-search-path.diff
··· 1 1 diff --git a/Modules/Platform/UnixPaths.cmake b/Modules/Platform/UnixPaths.cmake 2 - index b9381c3d7d..cecc40a89e 100644 2 + index b9381c3d7d..5e944640b5 100644 3 3 --- a/Modules/Platform/UnixPaths.cmake 4 4 +++ b/Modules/Platform/UnixPaths.cmake 5 5 @@ -26,9 +26,6 @@ get_filename_component(_CMAKE_INSTALL_DIR "${_CMAKE_INSTALL_DIR}" PATH) ··· 12 12 # CMake install location 13 13 "${_CMAKE_INSTALL_DIR}" 14 14 ) 15 - @@ -47,24 +44,19 @@ endif() 15 + @@ -47,48 +44,46 @@ endif() 16 16 17 17 # Non "standard" but common install prefixes 18 18 list(APPEND CMAKE_SYSTEM_PREFIX_PATH ··· 22 22 ) 23 23 24 24 # List common include file locations not under the common prefixes. 25 + +if(IS_DIRECTORY $ENV{NIX_CC}) 26 + + file(STRINGS "$ENV{NIX_CC}/nix-support/orig-libc" _nix_cmake_libc) 27 + + file(STRINGS "$ENV{NIX_CC}/nix-support/orig-libc-dev" _nix_cmake_libc_dev) 28 + +else() 29 + + set(_nix_cmake_libc @libc_lib@) 30 + + set(_nix_cmake_libc_dev @libc_dev@) 31 + +endif() 32 + + 25 33 list(APPEND CMAKE_SYSTEM_INCLUDE_PATH 26 34 - # X11 27 35 - /usr/include/X11 28 - + @libc_dev@/include 36 + + "${_nix_cmake_libc_dev}/include" 29 37 ) 30 38 31 39 list(APPEND CMAKE_SYSTEM_LIBRARY_PATH 32 40 - # X11 33 41 - /usr/lib/X11 34 - + @libc_lib@/lib 42 + + "${_nix_cmake_libc}/lib" 35 43 ) 36 44 37 45 list(APPEND CMAKE_PLATFORM_IMPLICIT_LINK_DIRECTORIES 38 46 - /lib /lib32 /lib64 /usr/lib /usr/lib32 /usr/lib64 39 - + @libc_lib@/lib 47 + + "${_nix_cmake_libc}/lib" 40 48 ) 41 49 42 - if(CMAKE_SYSROOT_COMPILE) 43 - @@ -77,15 +69,15 @@ endif() 50 + -if(CMAKE_SYSROOT_COMPILE) 51 + - set(_cmake_sysroot_compile "${CMAKE_SYSROOT_COMPILE}") 52 + -else() 53 + - set(_cmake_sysroot_compile "${CMAKE_SYSROOT}") 54 + -endif() 55 + - 56 + # Default per-language values. These may be later replaced after 44 57 # parsing the implicit directory information from compiler output. 45 58 set(_CMAKE_C_IMPLICIT_INCLUDE_DIRECTORIES_INIT 46 59 ${CMAKE_C_IMPLICIT_INCLUDE_DIRECTORIES} 47 60 - "${_cmake_sysroot_compile}/usr/include" 48 - + @libc_dev@/include 61 + + "${_nix_cmake_libc_dev}/include" 49 62 ) 50 63 set(_CMAKE_CXX_IMPLICIT_INCLUDE_DIRECTORIES_INIT 51 64 ${CMAKE_CXX_IMPLICIT_INCLUDE_DIRECTORIES} 52 65 - "${_cmake_sysroot_compile}/usr/include" 53 - + @libc_dev@/include 66 + + "${_nix_cmake_libc_dev}/include" 54 67 ) 55 68 set(_CMAKE_CUDA_IMPLICIT_INCLUDE_DIRECTORIES_INIT 56 69 ${CMAKE_CUDA_IMPLICIT_INCLUDE_DIRECTORIES} 57 70 - "${_cmake_sysroot_compile}/usr/include" 58 - + @libc_dev@/include 71 + + "${_nix_cmake_libc_dev}/include" 59 72 ) 60 73 61 - unset(_cmake_sysroot_compile) 74 + -unset(_cmake_sysroot_compile) 75 + +unset(_nix_cmake_libc) 76 + +unset(_nix_cmake_libc_dev) 77 + 78 + # Reminder when adding new locations computed from environment variables 79 + # please make sure to keep Help/variable/CMAKE_SYSTEM_PREFIX_PATH.rst 62 80 diff --git a/Modules/Platform/WindowsPaths.cmake b/Modules/Platform/WindowsPaths.cmake 63 81 index b9e2f17979..ab517cd4a7 100644 64 82 --- a/Modules/Platform/WindowsPaths.cmake
-19
pkgs/development/tools/build-managers/meson/allow-dirs-outside-of-prefix.patch
··· 1 - --- a/mesonbuild/coredata.py 2 - +++ b/mesonbuild/coredata.py 3 - @@ -506,7 +506,6 @@ class CoreData: 4 - return value 5 - if option.name.endswith('dir') and value.is_absolute() and \ 6 - option not in BULITIN_DIR_NOPREFIX_OPTIONS: 7 - - # Value must be a subdir of the prefix 8 - # commonpath will always return a path in the native format, so we 9 - # must use pathlib.PurePath to do the same conversion before 10 - # comparing. 11 - @@ -518,7 +517,7 @@ class CoreData: 12 - try: 13 - value = value.relative_to(prefix) 14 - except ValueError: 15 - - raise MesonException(msg.format(option, value, prefix)) 16 - + pass 17 - if '..' in str(value): 18 - raise MesonException(msg.format(option, value, prefix)) 19 - return value.as_posix()
+18 -24
pkgs/development/tools/build-managers/meson/default.nix
··· 10 10 11 11 python3.pkgs.buildPythonApplication rec { 12 12 pname = "meson"; 13 - version = "0.61.2"; 13 + version = "0.63.1"; 14 14 15 15 src = python3.pkgs.fetchPypi { 16 16 inherit pname version; 17 - hash = "sha256-AjOn+NlZB5MY9gUrCTnCf2il3oa6YB8lye5oaftfWIk="; 17 + sha256 = "Bv4TKXIT1v8BIcXVqrJaVu+Tj/7FdBTtYIb9onLLZek="; 18 18 }; 19 19 20 20 patches = [ 21 - # Upstream insists on not allowing bindir and other dir options 22 - # outside of prefix for some reason: 23 - # https://github.com/mesonbuild/meson/issues/2561 24 - # We remove the check so multiple outputs can work sanely. 25 - ./allow-dirs-outside-of-prefix.patch 26 - 27 21 # Meson is currently inspecting fewer variables than autoconf does, which 28 22 # makes it harder for us to use setup hooks, etc. Taken from 29 23 # https://github.com/mesonbuild/meson/pull/6827 30 24 ./more-env-vars.patch 31 - 32 - # Use more binutils variables, so we don't have to define them in stdenv. 33 - # pr has been merged 34 - # https://github.com/mesonbuild/meson/pull/10640 35 - (fetchpatch { 36 - url = "https://github.com/mesonbuild/meson/commit/8a8ab9a8e0c2cefb6faa0734e52803c74790576c.patch"; 37 - sha256 = "sha256-BdBf1NB4SZLFyFRDzD0p//XUgUeAHpo6XXUtsHdCgKE="; 38 - }) 39 25 40 26 # Unlike libtool, vanilla Meson does not pass any information 41 27 # about the path library will be installed to to g-ir-scanner, ··· 67 53 # https://github.com/NixOS/nixpkgs/issues/86131#issuecomment-711051774 68 54 ./boost-Do-not-add-system-paths-on-nix.patch 69 55 70 - # https://github.com/mesonbuild/meson/pull/9841 71 - # cross-compilation fix 56 + # Prevent Meson from passing -O0 in buildtype=plain. 57 + # Nixpkgs enables fortifications which do not work without optimizations. 58 + # https://github.com/mesonbuild/meson/pull/10593 72 59 (fetchpatch { 73 - url = "https://github.com/mesonbuild/meson/commit/266e8acb5807b38a550cb5145cea0e19545a21d7.patch"; 74 - sha256 = "sha256-1GdKsm2xvq2GxTNeTyBH5O73hxboL0YI+w2BCoUeWXM="; 60 + url = "https://github.com/mesonbuild/meson/commit/f9bfeb2add70973113ab4a98454a5c5d7e3a26ae.patch"; 61 + revert = true; 62 + sha256 = "VKXUwdS+zMp1y+5GrV2inESUpUUp+OL3aI4wOXHxOeo="; 63 + }) 64 + 65 + # Fix passing multiple --define-variable arguments to pkg-config. 66 + # https://github.com/mesonbuild/meson/pull/10670 67 + (fetchpatch { 68 + url = "https://github.com/mesonbuild/meson/commit/d5252c5d4cf1c1931fef0c1c98dd66c000891d21.patch"; 69 + sha256 = "GiUNVul1N5Fl8mfqM7vA/r1FdKqImiDYLXMVDt77gvw="; 70 + excludes = [ 71 + "docs/yaml/objects/dep.yaml" 72 + ]; 75 73 }) 76 - ] ++ lib.optionals withDarwinFrameworksGtkDocPatch [ 77 - # Fix building gtkdoc for GLib 78 - # https://github.com/mesonbuild/meson/pull/10186 79 - ./fix-gtkdoc-when-using-multiple-apple-frameworks.patch 80 74 ]; 81 75 82 76 setupHook = ./setup-hook.sh;
-162
pkgs/development/tools/build-managers/meson/fix-gtkdoc-when-using-multiple-apple-frameworks.patch
··· 1 - From b8ba462ae72e0818898357464263ec84722f6d4c Mon Sep 17 00:00:00 2001 2 - From: Jan Tojnar <jtojnar@gmail.com> 3 - Date: Sat, 26 Mar 2022 02:26:27 +0100 4 - Subject: [PATCH] gnome: Fix gtkdoc when using multiple Apple frameworks 5 - 6 - The `-framework Foundation -framework CoreFoundation` ended up 7 - de-duplicated by OrderedSet into `-framework Foundation CoreFoundation`. 8 - 9 - Picked from https://github.com/mesonbuild/meson/pull/10186 10 - 11 - Also pick https://github.com/mesonbuild/meson/commit/68e684d51f1e469e0d9f4b499ffda15146cad98a when resolving conflict. 12 - 13 - diff --git a/mesonbuild/modules/gnome.py b/mesonbuild/modules/gnome.py 14 - index 214f97ac3..0521b2605 100644 15 - --- a/mesonbuild/modules/gnome.py 16 - +++ b/mesonbuild/modules/gnome.py 17 - @@ -593,15 +593,16 @@ class GnomeModule(ExtensionModule): 18 - lib: T.Union[build.SharedLibrary, build.StaticLibrary], 19 - depends: T.List[build.BuildTarget], 20 - include_rpath: bool = False, 21 - - use_gir_args: bool = False) -> T.List[str]: 22 - + use_gir_args: bool = False) -> T.Tuple[T.List[str], T.List[T.Union[build.BuildTarget, 'build.GeneratedTypes', 'FileOrString']]]: 23 - link_command: T.List[str] = [] 24 - + new_depends = list(depends) 25 - # Construct link args 26 - if isinstance(lib, build.SharedLibrary): 27 - libdir = os.path.join(state.environment.get_build_dir(), state.backend.get_target_dir(lib)) 28 - link_command.append('-L' + libdir) 29 - if include_rpath: 30 - link_command.append('-Wl,-rpath,' + libdir) 31 - - depends.append(lib) 32 - + new_depends.append(lib) 33 - # Needed for the following binutils bug: 34 - # https://github.com/mesonbuild/meson/issues/1911 35 - # However, g-ir-scanner does not understand -Wl,-rpath 36 - @@ -615,19 +616,19 @@ class GnomeModule(ExtensionModule): 37 - link_command.append('--extra-library=' + lib.name) 38 - else: 39 - link_command.append('-l' + lib.name) 40 - - return link_command 41 - + return link_command, new_depends 42 - 43 - - def _get_dependencies_flags( 44 - + def _get_dependencies_flags_raw( 45 - self, deps: T.Sequence[T.Union['Dependency', build.SharedLibrary, build.StaticLibrary]], 46 - - state: 'ModuleState', depends: T.List[build.BuildTarget], include_rpath: bool = False, 47 - - use_gir_args: bool = False, separate_nodedup: bool = False 48 - - ) -> T.Tuple[OrderedSet[str], OrderedSet[str], OrderedSet[str], T.Optional[T.List[str]], OrderedSet[str]]: 49 - + state: 'ModuleState', depends: T.List[build.BuildTarget], include_rpath: bool, 50 - + use_gir_args: bool 51 - + ) -> T.Tuple[OrderedSet[str], OrderedSet[T.Union[str, T.Tuple[str, str]]], OrderedSet[T.Union[str, T.Tuple[str, str]]], T.Optional[T.List[str]], OrderedSet[str], 52 - + T.List[T.Union[build.BuildTarget, 'build.GeneratedTypes', 'FileOrString']]]: 53 - cflags: OrderedSet[str] = OrderedSet() 54 - - internal_ldflags: OrderedSet[str] = OrderedSet() 55 - - external_ldflags: OrderedSet[str] = OrderedSet() 56 - # External linker flags that can't be de-duped reliably because they 57 - - # require two args in order, such as -framework AVFoundation 58 - - external_ldflags_nodedup: T.List[str] = [] 59 - + # require two args in order, such as -framework AVFoundation will be stored as a tuple. 60 - + internal_ldflags: OrderedSet[T.Union[str, T.Tuple[str, str]]] = OrderedSet() 61 - + external_ldflags: OrderedSet[T.Union[str, T.Tuple[str, str]]] = OrderedSet() 62 - gi_includes: OrderedSet[str] = OrderedSet() 63 - deps = mesonlib.listify(deps) 64 - 65 - @@ -642,21 +643,20 @@ class GnomeModule(ExtensionModule): 66 - cflags.update(state.get_include_args(dep.include_directories)) 67 - for lib in dep.libraries: 68 - if isinstance(lib, build.SharedLibrary): 69 - - internal_ldflags.update(self._get_link_args(state, lib, depends, include_rpath)) 70 - - libdepflags = self._get_dependencies_flags(lib.get_external_deps(), state, depends, include_rpath, 71 - - use_gir_args, True) 72 - + _ld, depends = self._get_link_args(state, lib, depends, include_rpath) 73 - + internal_ldflags.update(_ld) 74 - + libdepflags = self._get_dependencies_flags_raw(lib.get_external_deps(), state, depends, include_rpath, 75 - + use_gir_args) 76 - cflags.update(libdepflags[0]) 77 - internal_ldflags.update(libdepflags[1]) 78 - external_ldflags.update(libdepflags[2]) 79 - - external_ldflags_nodedup += libdepflags[3] 80 - - gi_includes.update(libdepflags[4]) 81 - - extdepflags = self._get_dependencies_flags(dep.ext_deps, state, depends, include_rpath, 82 - - use_gir_args, True) 83 - + gi_includes.update(libdepflags[3]) 84 - + extdepflags = self._get_dependencies_flags_raw(dep.ext_deps, state, depends, include_rpath, 85 - + use_gir_args) 86 - cflags.update(extdepflags[0]) 87 - internal_ldflags.update(extdepflags[1]) 88 - external_ldflags.update(extdepflags[2]) 89 - - external_ldflags_nodedup += extdepflags[3] 90 - - gi_includes.update(extdepflags[4]) 91 - + gi_includes.update(extdepflags[3]) 92 - for source in dep.sources: 93 - if isinstance(source, GirTarget): 94 - gi_includes.update([os.path.join(state.environment.get_build_dir(), 95 - @@ -684,7 +684,7 @@ class GnomeModule(ExtensionModule): 96 - # If it's a framework arg, slurp the framework name too 97 - # to preserve the order of arguments 98 - if flag == '-framework': 99 - - external_ldflags_nodedup += [flag, next(ldflags)] 100 - + external_ldflags.update([(flag, next(ldflags))]) 101 - else: 102 - external_ldflags.update([flag]) 103 - elif isinstance(dep, (build.StaticLibrary, build.SharedLibrary)): 104 - @@ -695,21 +695,41 @@ class GnomeModule(ExtensionModule): 105 - continue 106 - 107 - if use_gir_args and self._gir_has_option('--extra-library'): 108 - - def fix_ldflags(ldflags: T.Iterable[str]) -> OrderedSet[str]: 109 - - fixed_ldflags: OrderedSet[str] = OrderedSet() 110 - + def fix_ldflags(ldflags: T.Iterable[T.Union[str, T.Tuple[str, str]]]) -> OrderedSet[T.Union[str, T.Tuple[str, str]]]: 111 - + fixed_ldflags: OrderedSet[T.Union[str, T.Tuple[str, str]]] = OrderedSet() 112 - for ldflag in ldflags: 113 - - if ldflag.startswith("-l"): 114 - + if isinstance(ldflag, str) and ldflag.startswith("-l"): 115 - ldflag = ldflag.replace('-l', '--extra-library=', 1) 116 - fixed_ldflags.add(ldflag) 117 - return fixed_ldflags 118 - internal_ldflags = fix_ldflags(internal_ldflags) 119 - external_ldflags = fix_ldflags(external_ldflags) 120 - - if not separate_nodedup: 121 - - external_ldflags.update(external_ldflags_nodedup) 122 - - return cflags, internal_ldflags, external_ldflags, None, gi_includes 123 - - else: 124 - - return cflags, internal_ldflags, external_ldflags, external_ldflags_nodedup, gi_includes 125 - + return cflags, internal_ldflags, external_ldflags, gi_includes, depends 126 - + 127 - + def _get_dependencies_flags( 128 - + self, deps: T.Sequence[T.Union['Dependency', build.SharedLibrary, build.StaticLibrary]], 129 - + state: 'ModuleState', depends: T.List[build.BuildTarget], include_rpath: bool = False, 130 - + use_gir_args: bool = False 131 - + ) -> T.Tuple[OrderedSet[str], T.List[str], T.List[str], OrderedSet[str], 132 - + T.List[T.Union[build.BuildTarget, 'build.GeneratedTypes', 'FileOrString']]]: 133 - + 134 - + cflags, internal_ldflags_raw, external_ldflags_raw, gi_includes, depends = self._get_dependencies_flags_raw(deps, state, depends, include_rpath, use_gir_args) 135 - + internal_ldflags: T.List[str] = [] 136 - + external_ldflags: T.List[str] = [] 137 - + 138 - + # Extract non-deduplicable argument groups out of the tuples. 139 - + for ldflag in internal_ldflags_raw: 140 - + if isinstance(ldflag, str): 141 - + internal_ldflags.append(ldflag) 142 - + else: 143 - + internal_ldflags.extend(ldflag) 144 - + for ldflag in external_ldflags_raw: 145 - + if isinstance(ldflag, str): 146 - + external_ldflags.append(ldflag) 147 - + else: 148 - + external_ldflags.extend(ldflag) 149 - 150 - + return cflags, internal_ldflags, external_ldflags, gi_includes, depends 151 - def _unwrap_gir_target(self, girtarget: T.Union[build.Executable, build.StaticLibrary, build.SharedLibrary], state: 'ModuleState' 152 - ) -> T.Union[build.Executable, build.StaticLibrary, build.SharedLibrary]: 153 - if not isinstance(girtarget, (build.Executable, build.SharedLibrary, 154 - @@ -1056,7 +1076,7 @@ class GnomeModule(ExtensionModule): 155 - # ldflags will be misinterpreted by gir scanner (showing 156 - # spurious dependencies) but building GStreamer fails if they 157 - # are not used here. 158 - - dep_cflags, dep_internal_ldflags, dep_external_ldflags, _, gi_includes = \ 159 - + dep_cflags, dep_internal_ldflags, dep_external_ldflags, gi_includes, depends = \ 160 - self._get_dependencies_flags(deps, state, depends, use_gir_args=True) 161 - scan_cflags = [] 162 - scan_cflags += list(self._get_scanner_cflags(cflags))
+2 -2
pkgs/development/tools/build-managers/ninja/default.nix
··· 4 4 5 5 stdenv.mkDerivation rec { 6 6 pname = "ninja"; 7 - version = "1.10.2"; 7 + version = "1.11.0"; 8 8 9 9 src = fetchFromGitHub { 10 10 owner = "ninja-build"; 11 11 repo = "ninja"; 12 12 rev = "v${version}"; 13 - sha256 = "0mspq4mvx41qri2v2zlg2y3znx5gfw6d8s3czbcfpr2218qbpz55"; 13 + sha256 = "sha256-xZwMdwvg29lauHKk9M318Vz7pXZFhf3kFcyOTBdjmJM="; 14 14 }; 15 15 16 16 nativeBuildInputs = [ python3 re2c ] ++ optionals buildDocs [ asciidoc docbook_xml_dtd_45 docbook_xsl libxslt.bin ];
+5 -10
pkgs/development/tools/parsing/tree-sitter/grammar.nix
··· 30 30 CFLAGS = [ "-I${src}/src" "-O2" ]; 31 31 CXXFLAGS = [ "-I${src}/src" "-O2" ]; 32 32 33 + stripDebugList = [ "parser" ]; 34 + 33 35 # When both scanner.{c,cc} exist, we should not link both since they may be the same but in 34 36 # different languages. Just randomly prefer C++ if that happens. 35 37 buildPhase = '' 36 38 runHook preBuild 37 39 if [[ -e "$src/src/scanner.cc" ]]; then 38 - $CXX -c "$src/src/scanner.cc" -o scanner.o $CXXFLAGS 40 + $CXX -fPIC -c "$src/src/scanner.cc" -o scanner.o $CXXFLAGS 39 41 elif [[ -e "$src/src/scanner.c" ]]; then 40 - $CC -c "$src/src/scanner.c" -o scanner.o $CFLAGS 42 + $CC -fPIC -c "$src/src/scanner.c" -o scanner.o $CFLAGS 41 43 fi 42 - $CC -c "$src/src/parser.c" -o parser.o $CFLAGS 44 + $CC -fPIC -c "$src/src/parser.c" -o parser.o $CFLAGS 43 45 $CXX -shared -o parser *.o 44 46 runHook postBuild 45 47 ''; ··· 49 51 mkdir $out 50 52 mv parser $out/ 51 53 runHook postInstall 52 - ''; 53 - 54 - # Strip failed on darwin: strip: error: symbols referenced by indirect symbol table entries that can't be stripped 55 - fixupPhase = lib.optionalString stdenv.isLinux '' 56 - runHook preFixup 57 - $STRIP $out/parser 58 - runHook postFixup 59 54 ''; 60 55 }
+9 -7
pkgs/development/tools/spirv-tools/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "spirv-tools"; 5 - version = "1.3.211.0"; 5 + version = "1.3.216.0"; 6 6 7 - src = fetchFromGitHub { 8 - owner = "KhronosGroup"; 9 - repo = "SPIRV-Tools"; 10 - rev = "sdk-${version}"; 11 - sha256 = "sha256-DoE+UCJOTB8JidC208wgfV1trZC4r9uFvwRPUhJVaII="; 12 - }; 7 + src = (assert version == spirv-headers.version; 8 + fetchFromGitHub { 9 + owner = "KhronosGroup"; 10 + repo = "SPIRV-Tools"; 11 + rev = "sdk-${version}"; 12 + hash = "sha256-NWpFSRoxtYWi+hLUt9gpw0YScM3shcUwv9yUmbivRb0="; 13 + } 14 + ); 13 15 14 16 nativeBuildInputs = [ cmake python3 ]; 15 17
+2 -2
pkgs/development/tools/vulkan-validation-layers/default.nix
··· 22 22 in 23 23 stdenv.mkDerivation rec { 24 24 pname = "vulkan-validation-layers"; 25 - version = "1.3.211.0"; 25 + version = "1.3.216.0"; 26 26 27 27 # If we were to use "dev" here instead of headers, the setupHook would be 28 28 # placed in that output instead of "out". ··· 34 34 owner = "KhronosGroup"; 35 35 repo = "Vulkan-ValidationLayers"; 36 36 rev = "sdk-${version}"; 37 - sha256 = "sha256-NGpFfekZtB0rvnGxYVDo808xzgBuo8ZC4bjXjQnTpxU="; 37 + hash = "sha256-ri6ImAuskbvYL/ZM8kaVDZRP2v1qfSaafVacwwRF424="; 38 38 }); 39 39 40 40 # Include absolute paths to layer libraries in their associated
+23 -7
pkgs/development/tools/xcbuild/wrapper.nix
··· 1 - { stdenv, makeWrapper, writeText, runCommand 1 + { lib, stdenv, makeWrapper, writeText, writeShellScriptBin, runCommand 2 2 , CoreServices, ImageIO, CoreGraphics 3 3 , runtimeShell, callPackage 4 4 , xcodePlatform ? stdenv.targetPlatform.xcodePlatform or "MacOSX" ··· 9 9 10 10 toolchainName = "com.apple.dt.toolchain.XcodeDefault"; 11 11 sdkName = "${xcodePlatform}${sdkVer}"; 12 + xcrunSdkName = lib.toLower xcodePlatform; 12 13 13 14 # TODO: expose MACOSX_DEPLOYMENT_TARGET in nix so we can use it here. 14 15 sdkBuildVersion = "17E189"; ··· 50 51 done 51 52 ''; 52 53 53 - xcrun = writeText "xcrun" '' 54 - #!${runtimeShell} 54 + xcrun = writeShellScriptBin "xcrun" '' 55 + args=( "$@" ) 56 + 57 + # If an SDK was requested, check that it matches. 58 + for ((i = 0; i < ''${#args[@]}; i++)); do 59 + case "''${args[i]}" in 60 + --sdk | -sdk) 61 + i=$((i + 1)) 62 + if [[ "''${args[i]}" != '${xcrunSdkName}' ]]; then 63 + echo >&2 "xcodebuild: error: SDK \"''${args[i]}\" cannot be located." 64 + exit 1 65 + fi 66 + ;; 67 + esac 68 + done 69 + 55 70 while [ $# -gt 0 ]; do 56 71 case "$1" in 57 72 --sdk | -sdk) shift ;; 58 - --find | -find) 73 + --toolchain | -toolchain) shift ;; 74 + --find | -find | -f) 59 75 shift 60 76 command -v $1 ;; 61 77 --log | -log) ;; # noop ··· 74 90 esac 75 91 shift 76 92 done 93 + 77 94 if ! [[ -z "$@" ]]; then 78 95 exec "$@" 79 96 fi ··· 89 106 propagatedBuildInputs = [ "${toolchains}/XcodeDefault.xctoolchain" ]; 90 107 91 108 passthru = { 92 - inherit xcbuild; 109 + inherit xcbuild xcrun; 93 110 toolchain = "${toolchains}/XcodeDefault.xctoolchain"; 94 111 sdk = "${sdks}/${sdkName}"; 95 112 platform = "${platforms}/${xcodePlatform}.platform"; ··· 126 143 --subst-var-by DEVELOPER_DIR $out/Applications/Xcode.app/Contents/Developer 127 144 chmod +x $out/bin/xcode-select 128 145 129 - substitute ${xcrun} $out/bin/xcrun 130 - chmod +x $out/bin/xcrun 146 + cp ${xcrun}/bin/xcrun $out/bin/xcrun 131 147 132 148 for bin in PlistBuddy actool builtin-copy builtin-copyPlist \ 133 149 builtin-copyStrings builtin-copyTiff \
+1
pkgs/os-specific/darwin/apple-sdk-11.0/libSystem.nix
··· 39 39 40 40 cp -d \ 41 41 ${MacOSX-SDK}/usr/include/*.h \ 42 + ${MacOSX-SDK}/usr/include/*.modulemap \ 42 43 $out/include 43 44 44 45 rm $out/include/tk*.h $out/include/tcl*.h
+2 -2
pkgs/os-specific/linux/apparmor/default.nix
··· 21 21 }: 22 22 23 23 let 24 - apparmor-version = "3.0.4"; 24 + apparmor-version = "3.0.7"; 25 25 26 26 apparmor-meta = component: with lib; { 27 27 homepage = "https://apparmor.net/"; ··· 35 35 owner = "apparmor"; 36 36 repo = "apparmor"; 37 37 rev = "v${apparmor-version}"; 38 - sha256 = "1a217j28rgfq4lsmpn0wv1xgmdr9ba8iysv9i6q477kj6z77zrb9"; 38 + hash = "sha256-iLZY0wZQr+YvR8JCwTeECDuqFb1sQCQtkiUksiYCvWs="; 39 39 }; 40 40 41 41 aa-teardown = writeShellScript "aa-teardown" ''
+9 -9
pkgs/os-specific/linux/cryptsetup/default.nix
··· 1 - { lib, stdenv, fetchurl, lvm2, json_c 1 + { lib, stdenv, fetchurl, lvm2, json_c, asciidoctor 2 2 , openssl, libuuid, pkg-config, popt }: 3 3 4 4 stdenv.mkDerivation rec { 5 5 pname = "cryptsetup"; 6 - version = "2.4.3"; 6 + version = "2.5.0"; 7 7 8 8 outputs = [ "bin" "out" "dev" "man" ]; 9 9 separateDebugInfo = true; 10 10 11 11 src = fetchurl { 12 - url = "mirror://kernel/linux/utils/cryptsetup/v2.4/${pname}-${version}.tar.xz"; 13 - sha256 = "sha256-/A35RRiBciZOxb8dC9oIJk+tyKP4VtR+upHzH+NUtQc="; 12 + url = "mirror://kernel/linux/utils/cryptsetup/v2.5/${pname}-${version}.tar.xz"; 13 + sha256 = "sha256-kYSm672c5+shEVLn90GmyC8tHMDiSoTsnFKTnu4PBUI="; 14 14 }; 15 - 16 - # Disable 4 test cases that fail in a sandbox 17 - patches = [ ./disable-failing-tests.patch ]; 18 15 19 16 postPatch = '' 20 17 patchShebangs tests ··· 39 36 "--with-luks2-external-tokens-path=/" 40 37 ]; 41 38 42 - nativeBuildInputs = [ pkg-config ]; 39 + nativeBuildInputs = [ pkg-config asciidoctor ]; 43 40 buildInputs = [ lvm2 json_c openssl libuuid popt ]; 44 41 45 - doCheck = true; 42 + # The test [7] header backup in compat-test fails with a mysterious 43 + # "out of memory" error, even though tons of memory is available. 44 + # Issue filed upstream: https://gitlab.com/cryptsetup/cryptsetup/-/issues/763 45 + doCheck = !stdenv.hostPlatform.isMusl; 46 46 47 47 meta = { 48 48 homepage = "https://gitlab.com/cryptsetup/cryptsetup/";
-19
pkgs/os-specific/linux/cryptsetup/disable-failing-tests.patch
··· 1 - diff -ur a/tests/blockwise-compat b/tests/blockwise-compat 2 - --- a/tests/blockwise-compat 2018-09-08 12:23:11.706555098 +0200 3 - +++ b/tests/blockwise-compat 2018-09-08 12:24:24.444393460 +0200 4 - @@ -148,15 +148,11 @@ 5 - # device/file fn_name length 6 - RUN "P" $1 read_buffer $BSIZE 7 - RUN "P" $1 read_buffer $((2*BSIZE)) 8 - - RUN "F" $1 read_buffer $((BSIZE-1)) 9 - - RUN "F" $1 read_buffer $((BSIZE+1)) 10 - RUN "P" $1 read_buffer 0 11 - 12 - RUN "P" $1 write_buffer $BSIZE 13 - RUN "P" $1 write_buffer $((2*BSIZE)) 14 - 15 - - RUN "F" $1 write_buffer $((BSIZE-1)) 16 - - RUN "F" $1 write_buffer $((BSIZE+1)) 17 - RUN "F" $1 write_buffer 0 18 - 19 - # basic blockwise functions
+2 -2
pkgs/os-specific/linux/iproute/default.nix
··· 6 6 7 7 stdenv.mkDerivation rec { 8 8 pname = "iproute2"; 9 - version = "5.18.0"; 9 + version = "5.19.0"; 10 10 11 11 src = fetchurl { 12 12 url = "mirror://kernel/linux/utils/net/${pname}/${pname}-${version}.tar.xz"; 13 - sha256 = "W6PUZNUcjCg1UNUH/6w9EPeuxYe3xmsMy2lQZDZGOJ4="; 13 + sha256 = "JrejTWp/0vekLis5xakMthusUi0QlgZ//rGV5Wk9d5E="; 14 14 }; 15 15 16 16 patches = [
+2 -6
pkgs/os-specific/linux/musl/default.nix
··· 102 102 # Apparently glibc provides scsi itself? 103 103 (cd $dev/include && ln -s $(ls -d ${linuxHeaders}/include/* | grep -v "scsi$") .) 104 104 105 - # Strip debug out of the static library 106 - $STRIP -S $out/lib/libc.a 107 105 mkdir -p $out/bin 108 106 109 107 110 - ${if (stdenv.targetPlatform.libc == "musl" && stdenv.targetPlatform.isx86_32) then 111 - "install -D libssp_nonshared.a $out/lib/libssp_nonshared.a 112 - $STRIP -S $out/lib/libssp_nonshared.a" 113 - else "" 108 + ${lib.optionalString (stdenv.targetPlatform.libc == "musl" && stdenv.targetPlatform.isx86_32) 109 + "install -D libssp_nonshared.a $out/lib/libssp_nonshared.a" 114 110 } 115 111 116 112 # Create 'ldd' symlink, builtin
+2 -2
pkgs/os-specific/linux/nftables/default.nix
··· 9 9 }: 10 10 11 11 stdenv.mkDerivation rec { 12 - version = "1.0.4"; 12 + version = "1.0.5"; 13 13 pname = "nftables"; 14 14 15 15 src = fetchurl { 16 16 url = "https://netfilter.org/projects/nftables/files/${pname}-${version}.tar.bz2"; 17 - hash = "sha256-kn+x/qH2haMowQz3ketlXX4e1J0xDupcsxAd/Y1sujU="; 17 + hash = "sha256-jRtLGDk69DaY0QuqJdK5tjl5ab7srHgWw13QcU5N5Qo="; 18 18 }; 19 19 20 20 nativeBuildInputs = [
+3 -3
pkgs/os-specific/linux/systemd/default.nix
··· 89 89 , withMachined ? true 90 90 , withNetworkd ? true 91 91 , withNss ? !stdenv.hostPlatform.isMusl 92 - , withOomd ? false 92 + , withOomd ? true 93 93 , withPCRE2 ? true 94 94 , withPolkit ? true 95 95 , withPortabled ? false ··· 127 127 let 128 128 wantCurl = withRemote || withImportd; 129 129 wantGcrypt = withResolved || withImportd; 130 - version = "251.3"; 130 + version = "251.4"; 131 131 132 132 # Bump this variable on every (major) version change. See below (in the meson options list) for why. 133 133 # command: ··· 144 144 owner = "systemd"; 145 145 repo = "systemd-stable"; 146 146 rev = "v${version}"; 147 - sha256 = "sha256-vcj+k/duRID2R+wGQIyq+dVRrFYNQTsjHya6k0hmZxk="; 147 + sha256 = "sha256-lfG6flT1k8LZBAdDK+cF9RjmJMkHMJquMjQK3MINFd8="; 148 148 }; 149 149 150 150 # On major changes, or when otherwise required, you *must* reformat the patches,
+2 -4
pkgs/servers/monitoring/prometheus/xmpp-alerts.nix
··· 2 2 , fetchFromGitHub 3 3 , python3Packages 4 4 , prometheus-alertmanager 5 + , unittestCheckHook 5 6 }: 6 7 7 8 python3Packages.buildPythonApplication rec { ··· 25 26 ]); 26 27 27 28 checkInputs = with python3Packages; [ 29 + unittestCheckHook 28 30 pytz 29 31 ]; 30 - 31 - checkPhase = '' 32 - ${python3Packages.python.interpreter} -m unittest discover 33 - ''; 34 32 35 33 meta = { 36 34 description = "XMPP Web hook for Prometheus";
+26
pkgs/servers/pulseaudio/0001-Make-gio-2.0-optional-16.patch
··· 1 + From 72f3fe059f031f24c5ad026cb2fc16318f227c09 Mon Sep 17 00:00:00 2001 2 + From: Andrew Childs <andrew.childs@bibo.com.ph> 3 + Date: Tue, 19 Apr 2022 16:29:58 +0900 4 + Subject: [PATCH 1/8] Make gio-2.0 optional when gsettings is disabled 5 + 6 + Derived from https://gitlab.freedesktop.org/pulseaudio/pulseaudio/-/merge_requests/654 7 + --- 8 + meson.build | 2 +- 9 + 1 file changed, 1 insertion(+), 1 deletion(-) 10 + 11 + diff --git a/meson.build b/meson.build 12 + index c5135330f..340f58e17 100644 13 + --- a/meson.build 14 + +++ b/meson.build 15 + @@ -683,7 +683,7 @@ if get_option('daemon') 16 + cdata.set('HAVE_ALSA_UCM', 1) 17 + endif 18 + 19 + - gio_dep = dependency('gio-2.0', version : '>= 2.26.0') 20 + + gio_dep = dependency('gio-2.0', version : '>= 2.26.0', required : false) 21 + if get_option('gsettings').enabled() 22 + assert(gio_dep.found(), 'GSettings support needs glib I/O library (GIO)') 23 + cdata.set('HAVE_GSETTINGS', 1) 24 + -- 25 + 2.35.1 26 +
pkgs/servers/pulseaudio/0001-Make-gio-2.0-optional-when-gsettings-is-disabled.patch pkgs/servers/pulseaudio/0001-Make-gio-2.0-optional-15.patch
pkgs/servers/pulseaudio/0002-Ignore-SCM_CREDS-on-macOS.patch pkgs/servers/pulseaudio/0002-Ignore-SCM_CREDS-on-darwin.patch
-26
pkgs/servers/pulseaudio/0003-Disable-z-nodelete-on-darwin.patch
··· 1 - From 3f1abb55f4eb985fd0715b2b2ca45dcce3a56824 Mon Sep 17 00:00:00 2001 2 - From: Andrew Childs <andrew.childs@bibo.com.ph> 3 - Date: Tue, 19 Apr 2022 17:06:50 +0900 4 - Subject: [PATCH 3/8] Disable `-z nodelete` on darwin 5 - 6 - Not supported[citation needed]. 7 - --- 8 - meson.build | 2 +- 9 - 1 file changed, 1 insertion(+), 1 deletion(-) 10 - 11 - diff --git a/meson.build b/meson.build 12 - index f7adf1413..d4bece11a 100644 13 - --- a/meson.build 14 - +++ b/meson.build 15 - @@ -404,7 +404,7 @@ cdata.set('MESON_BUILD', 1) 16 - # so we request the nodelete flag to be enabled. 17 - # On other systems, we don't really know how to do that, but it's welcome if somebody can tell. 18 - # Windows doesn't support this flag. 19 - -if host_machine.system() != 'windows' 20 - +if host_machine.system() != 'windows' and host_machine.system() != 'darwin' 21 - nodelete_link_args = ['-Wl,-z,nodelete'] 22 - else 23 - nodelete_link_args = [] 24 - -- 25 - 2.35.1 26 -
+26
pkgs/servers/pulseaudio/0003-Ignore-HAVE_CPUID_H-on-aarch64-darwin.patch
··· 1 + diff --git a/src/pulsecore/core-util.c b/src/pulsecore/core-util.c 2 + index c383a61c0..3d0a68c2e 100644 3 + --- a/src/pulsecore/core-util.c 4 + +++ b/src/pulsecore/core-util.c 5 + @@ -110,7 +110,7 @@ 6 + #include <sys/personality.h> 7 + #endif 8 + 9 + -#ifdef HAVE_CPUID_H 10 + +#if defined(HAVE_CPUID_H) && !(defined(__APPLE__) && defined(__aarch64__)) 11 + #include <cpuid.h> 12 + #endif 13 + 14 + diff --git a/src/pulsecore/cpu-x86.c b/src/pulsecore/cpu-x86.c 15 + index 317a0101e..d1eb95d2b 100644 16 + --- a/src/pulsecore/cpu-x86.c 17 + +++ b/src/pulsecore/cpu-x86.c 18 + @@ -24,7 +24,7 @@ 19 + 20 + #include <stdint.h> 21 + 22 + -#ifdef HAVE_CPUID_H 23 + +#if defined(HAVE_CPUID_H) && !(defined(__APPLE__) && defined(__aarch64__)) 24 + #include <cpuid.h> 25 + #endif 26 +
+13
pkgs/servers/pulseaudio/0004-Prefer-HAVE_CLOCK_GETTIME-on-darwin.patch
··· 1 + diff --git a/src/pulsecore/core-rtclock.c b/src/pulsecore/core-rtclock.c 2 + index 2c2e28631..b946a3fb1 100644 3 + --- a/src/pulsecore/core-rtclock.c 4 + +++ b/src/pulsecore/core-rtclock.c 5 + @@ -65,7 +65,7 @@ pa_usec_t pa_rtclock_age(const struct timeval *tv) { 6 + 7 + struct timeval *pa_rtclock_get(struct timeval *tv) { 8 + 9 + -#if defined(OS_IS_DARWIN) 10 + +#if defined(OS_IS_DARWIN) && !defined(HAVE_CLOCK_GETTIME) 11 + uint64_t val, abs_time = mach_absolute_time(); 12 + Nanoseconds nanos; 13 +
-57
pkgs/servers/pulseaudio/0004-Prefer-clock_gettime.patch
··· 1 - From 0bd3b613ac3bf16a73b3223fa1b961da3a0db1b2 Mon Sep 17 00:00:00 2001 2 - From: Andrew Childs <andrew.childs@bibo.com.ph> 3 - Date: Tue, 19 Apr 2022 17:12:52 +0900 4 - Subject: [PATCH 4/8] Prefer clock_gettime 5 - 6 - Available in darwin since 10.12 (released in 2016). 7 - --- 8 - src/pulsecore/core-rtclock.c | 26 +++++++++++++------------- 9 - 1 file changed, 13 insertions(+), 13 deletions(-) 10 - 11 - diff --git a/src/pulsecore/core-rtclock.c b/src/pulsecore/core-rtclock.c 12 - index 2c2e28631..a08d4b391 100644 13 - --- a/src/pulsecore/core-rtclock.c 14 - +++ b/src/pulsecore/core-rtclock.c 15 - @@ -65,19 +65,7 @@ pa_usec_t pa_rtclock_age(const struct timeval *tv) { 16 - 17 - struct timeval *pa_rtclock_get(struct timeval *tv) { 18 - 19 - -#if defined(OS_IS_DARWIN) 20 - - uint64_t val, abs_time = mach_absolute_time(); 21 - - Nanoseconds nanos; 22 - - 23 - - nanos = AbsoluteToNanoseconds(*(AbsoluteTime *) &abs_time); 24 - - val = *(uint64_t *) &nanos; 25 - - 26 - - tv->tv_sec = val / PA_NSEC_PER_SEC; 27 - - tv->tv_usec = (val % PA_NSEC_PER_SEC) / PA_NSEC_PER_USEC; 28 - - 29 - - return tv; 30 - - 31 - -#elif defined(HAVE_CLOCK_GETTIME) 32 - +#if defined(HAVE_CLOCK_GETTIME) 33 - struct timespec ts; 34 - 35 - #ifdef CLOCK_MONOTONIC 36 - @@ -109,6 +97,18 @@ struct timeval *pa_rtclock_get(struct timeval *tv) { 37 - 38 - return tv; 39 - } 40 - +#elif defined(OS_IS_DARWIN) 41 - + uint64_t val, abs_time = mach_absolute_time(); 42 - + Nanoseconds nanos; 43 - + 44 - + nanos = AbsoluteToNanoseconds(*(AbsoluteTime *) &abs_time); 45 - + val = *(uint64_t *) &nanos; 46 - + 47 - + tv->tv_sec = val / PA_NSEC_PER_SEC; 48 - + tv->tv_usec = (val % PA_NSEC_PER_SEC) / PA_NSEC_PER_USEC; 49 - + 50 - + return tv; 51 - + 52 - #endif /* HAVE_CLOCK_GETTIME */ 53 - 54 - return pa_gettimeofday(tv); 55 - -- 56 - 2.35.1 57 -
+31
pkgs/servers/pulseaudio/0005-Enable-CoreAudio-on-darwin.patch
··· 1 + diff --git a/meson.build b/meson.build 2 + index c5135330f..055567479 100644 3 + --- a/meson.build 4 + +++ b/meson.build 5 + @@ -185,6 +185,7 @@ endif 6 + # rather than ending up in the config.h file? 7 + if host_machine.system() == 'darwin' 8 + cdata.set('OS_IS_DARWIN', 1) 9 + + cdata.set('HAVE_COREAUDIO', 1) 10 + cdata.set('_DARWIN_C_SOURCE', '200112L') # Needed to get NSIG on Mac OS 11 + elif host_machine.system() == 'windows' 12 + cdata.set('OS_IS_WIN32', 1) 13 + diff --git a/src/modules/meson.build b/src/modules/meson.build 14 + index 1e12569dc..53a800927 100644 15 + --- a/src/modules/meson.build 16 + +++ b/src/modules/meson.build 17 + @@ -63,6 +63,14 @@ all_modules = [ 18 + [ 'module-volume-restore', 'module-volume-restore.c' ], 19 + ] 20 + 21 + +if host_machine.system() == 'darwin' 22 + + coreaudio_dep = dependency('appleframeworks', modules : ['AudioUnit', 'Cocoa', 'CoreServices', 'CoreAudio']) 23 + + all_modules += [ 24 + + [ 'module-coreaudio-detect', 'macosx/module-coreaudio-detect.c', [], [], [coreaudio_dep] ], 25 + + [ 'module-coreaudio-device', 'macosx/module-coreaudio-device.c', [], [], [coreaudio_dep] ], 26 + + ] 27 + +endif 28 + + 29 + if host_machine.system() == 'windows' 30 + winmm_dep = meson.get_compiler('c').find_library('winmm') 31 + ksuser_dep = meson.get_compiler('c').find_library('ksuser')
-24
pkgs/servers/pulseaudio/0005-Include-poll-posix.c-on-darwin.patch
··· 1 - From 8dee473920d3a331b73a415b37e7e0b01f014110 Mon Sep 17 00:00:00 2001 2 - From: Andrew Childs <andrew.childs@bibo.com.ph> 3 - Date: Tue, 19 Apr 2022 17:22:23 +0900 4 - Subject: [PATCH 5/8] Include poll-posix.c on darwin 5 - 6 - --- 7 - src/meson.build | 1 + 8 - 1 file changed, 1 insertion(+) 9 - 10 - diff --git a/src/meson.build b/src/meson.build 11 - index e2860811b..5bd68cb12 100644 12 - --- a/src/meson.build 13 - +++ b/src/meson.build 14 - @@ -182,6 +182,7 @@ if host_machine.system() == 'windows' 15 - else 16 - libpulsecommon_sources += [ 17 - 'pulsecore/mutex-posix.c', 18 - + 'pulsecore/poll-posix.c', 19 - 'pulsecore/semaphore-posix.c', 20 - 'pulsecore/thread-posix.c' 21 - ] 22 - -- 23 - 2.35.1 24 -
+18
pkgs/servers/pulseaudio/0006-Fix-libpulsecommon-sources-on-darwin.patch
··· 1 + diff --git a/src/meson.build b/src/meson.build 2 + index 9efb561d8..d181f4867 100644 3 + --- a/src/meson.build 4 + +++ b/src/meson.build 5 + @@ -179,6 +179,13 @@ if host_machine.system() == 'windows' 6 + 'pulsecore/semaphore-win32.c', 7 + 'pulsecore/thread-win32.c', 8 + ] 9 + +elif host_machine.system() == 'darwin' 10 + + libpulsecommon_sources += [ 11 + + 'pulsecore/mutex-posix.c', 12 + + 'pulsecore/poll-posix.c', 13 + + 'pulsecore/semaphore-osx.c', 14 + + 'pulsecore/thread-posix.c' 15 + + ] 16 + else 17 + libpulsecommon_sources += [ 18 + 'pulsecore/mutex-posix.c',
-29
pkgs/servers/pulseaudio/0006-Only-use-version-script-on-GNU-ish-linkers.patch
··· 1 - From 419258112b9d90d149ebbd5c657a36d8532b78a2 Mon Sep 17 00:00:00 2001 2 - From: Andrew Childs <andrew.childs@bibo.com.ph> 3 - Date: Tue, 19 Apr 2022 17:31:36 +0900 4 - Subject: [PATCH 6/8] Only use version-script on GNU-ish linkers 5 - 6 - --- 7 - src/pulse/meson.build | 6 +++++- 8 - 1 file changed, 5 insertions(+), 1 deletion(-) 9 - 10 - diff --git a/src/pulse/meson.build b/src/pulse/meson.build 11 - index c2128e087..a5e47867e 100644 12 - --- a/src/pulse/meson.build 13 - +++ b/src/pulse/meson.build 14 - @@ -74,7 +74,11 @@ run_target('update-map-file', 15 - command : [ join_paths(meson.source_root(), 'scripts/generate-map-file.sh'), 'map-file', 16 - [ libpulse_headers, 'simple.h', join_paths(meson.build_root(), 'src', 'pulse', 'version.h') ] ]) 17 - 18 - -versioning_link_args = '-Wl,-version-script=' + join_paths(meson.source_root(), 'src', 'pulse', 'map-file') 19 - +if meson.get_compiler('c').get_linker_id().startswith('ld.') 20 - + versioning_link_args = '-Wl,-version-script=' + join_paths(meson.source_root(), 'src', 'pulse', 'map-file') 21 - +else 22 - + versioning_link_args = [] 23 - +endif 24 - 25 - libpulse = shared_library('pulse', 26 - libpulse_sources, 27 - -- 28 - 2.35.1 29 -
-31
pkgs/servers/pulseaudio/0008-Use-correct-semaphore-on-darwin.patch
··· 1 - From 1a840b6e517004c902dfbea3d358b344c9588978 Mon Sep 17 00:00:00 2001 2 - From: Andrew Childs <andrew.childs@bibo.com.ph> 3 - Date: Tue, 19 Apr 2022 17:49:08 +0900 4 - Subject: [PATCH 8/8] Use correct semaphore on darwin 5 - 6 - --- 7 - src/meson.build | 6 +++++- 8 - 1 file changed, 5 insertions(+), 1 deletion(-) 9 - 10 - diff --git a/src/meson.build b/src/meson.build 11 - index 5bd68cb12..041e2fab4 100644 12 - --- a/src/meson.build 13 - +++ b/src/meson.build 14 - @@ -183,9 +183,13 @@ else 15 - libpulsecommon_sources += [ 16 - 'pulsecore/mutex-posix.c', 17 - 'pulsecore/poll-posix.c', 18 - - 'pulsecore/semaphore-posix.c', 19 - 'pulsecore/thread-posix.c' 20 - ] 21 - + if host_machine.system() == 'darwin' 22 - + libpulsecommon_sources += [ 'pulsecore/semaphore-osx.c' ] 23 - + else 24 - + libpulsecommon_sources += [ 'pulsecore/semaphore-posix.c' ] 25 - + endif 26 - endif 27 - # FIXME: Do SIMD things 28 - 29 - -- 30 - 2.35.1 31 -
+31 -20
pkgs/servers/pulseaudio/default.nix
··· 9 9 10 10 , x11Support ? false 11 11 12 - , useSystemd ? true 12 + , useSystemd ? stdenv.isLinux 13 13 14 14 , # Whether to support the JACK sound system as a backend. 15 15 jackaudioSupport ? false ··· 19 19 20 20 , airtunesSupport ? false 21 21 22 - , bluetoothSupport ? true 22 + , bluetoothSupport ? stdenv.isLinux 23 23 , advancedBluetoothCodecs ? false 24 24 25 25 , remoteControlSupport ? false 26 26 27 27 , zeroconfSupport ? false 28 + 29 + , alsaSupport ? stdenv.isLinux 30 + , udevSupport ? stdenv.isLinux 28 31 29 32 , # Whether to build only the library. 30 33 libOnly ? false 31 34 32 - , AudioUnit, Cocoa, CoreServices 35 + , AudioUnit, Cocoa, CoreServices, CoreAudio 33 36 }: 34 37 35 38 stdenv.mkDerivation rec { 36 39 pname = "${if libOnly then "lib" else ""}pulseaudio"; 37 - version = "15.0"; 40 + version = "16.1"; 38 41 39 42 src = fetchurl { 40 43 url = "http://freedesktop.org/software/pulseaudio/releases/pulseaudio-${version}.tar.xz"; 41 - sha256 = "pAuIejupjMJpdusRvbZhOYjxRbGQJNG2VVxqA8nLoaA="; 44 + sha256 = "sha256-ju8yzpHUeXn5X9mpNec4zX63RjQw2rxyhjJRdR5QSuQ="; 42 45 }; 43 46 44 47 patches = [ 45 48 # Install sysconfdir files inside of the nix store, 46 49 # but use a conventional runtime sysconfdir outside the store 47 50 ./add-option-for-installation-sysconfdir.patch 48 - ] ++ lib.optionals stdenv.isDarwin [ 49 51 # https://gitlab.freedesktop.org/pulseaudio/pulseaudio/-/merge_requests/654 50 - ./0001-Make-gio-2.0-optional-when-gsettings-is-disabled.patch 51 - 52 + (./0001-Make-gio-2.0-optional-${lib.versions.major version}.patch) 52 53 # TODO (not sent upstream) 53 - ./0002-Ignore-SCM_CREDS-on-macOS.patch 54 - ./0003-Disable-z-nodelete-on-darwin.patch 55 - ./0004-Prefer-clock_gettime.patch 56 - ./0005-Include-poll-posix.c-on-darwin.patch 57 - ./0006-Only-use-version-script-on-GNU-ish-linkers.patch 58 - ./0007-Adapt-undefined-link-args-per-linker.patch 59 - ./0008-Use-correct-semaphore-on-darwin.patch 54 + ./0002-Ignore-SCM_CREDS-on-darwin.patch 55 + ./0003-Ignore-HAVE_CPUID_H-on-aarch64-darwin.patch 56 + ./0004-Prefer-HAVE_CLOCK_GETTIME-on-darwin.patch 57 + ./0005-Enable-CoreAudio-on-darwin.patch 58 + ./0006-Fix-libpulsecommon-sources-on-darwin.patch 59 + ./0007-Fix-link-args-on-darwin.patch 60 60 ]; 61 61 62 62 outputs = [ "out" "dev" ]; ··· 72 72 buildInputs = 73 73 [ libtool libsndfile soxr speexdsp fftwFloat check ] 74 74 ++ lib.optionals stdenv.isLinux [ glib dbus ] 75 - ++ lib.optionals stdenv.isDarwin [ AudioUnit Cocoa CoreServices libintl ] 75 + ++ lib.optionals stdenv.isDarwin [ AudioUnit Cocoa CoreServices CoreAudio libintl ] 76 76 ++ lib.optionals (!libOnly) ( 77 77 [ libasyncns webrtc-audio-processing ] 78 78 ++ lib.optional jackaudioSupport libjack2 ··· 88 88 ); 89 89 90 90 mesonFlags = [ 91 - "-Dalsa=${if !libOnly then "enabled" else "disabled"}" 91 + "-Dalsa=${if !libOnly && alsaSupport then "enabled" else "disabled"}" 92 92 "-Dasyncns=${if !libOnly then "enabled" else "disabled"}" 93 93 "-Davahi=${if zeroconfSupport then "enabled" else "disabled"}" 94 94 "-Dbluez5=${if !libOnly && bluetoothSupport then "enabled" else "disabled"}" ··· 107 107 "-Dorc=disabled" 108 108 "-Dsystemd=${if useSystemd && !libOnly then "enabled" else "disabled"}" 109 109 "-Dtcpwrap=disabled" 110 - "-Dudev=${if !libOnly then "enabled" else "disabled"}" 110 + "-Dudev=${if !libOnly && udevSupport then "enabled" else "disabled"}" 111 111 "-Dvalgrind=disabled" 112 112 "-Dwebrtc-aec=${if !libOnly then "enabled" else "disabled"}" 113 113 "-Dx11=${if x11Support then "enabled" else "disabled"}" ··· 118 118 "-Dudevrulesdir=${placeholder "out"}/lib/udev/rules.d" 119 119 ] 120 120 ++ lib.optional (stdenv.isLinux && useSystemd) "-Dsystemduserunitdir=${placeholder "out"}/lib/systemd/user" 121 - ++ lib.optionals (stdenv.isDarwin) [ 121 + ++ lib.optionals stdenv.isDarwin [ 122 122 "-Ddbus=disabled" 123 123 "-Dglib=disabled" 124 124 "-Doss-output=disabled" ··· 144 144 wrapProgram $out/libexec/pulse/gsettings-helper \ 145 145 --prefix XDG_DATA_DIRS : "$out/share/gsettings-schemas/${pname}-${version}" \ 146 146 --prefix GIO_EXTRA_MODULES : "${lib.getLib dconf}/lib/gio/modules" 147 + '' 148 + # add .so symlinks for modules to be found under macOS 149 + + lib.optionalString stdenv.isDarwin '' 150 + for file in $out/${passthru.pulseDir}/modules/*.dylib; do 151 + ln -s "''$file" "''${file%.dylib}.so" 152 + ln -s "''$file" "$out/lib/pulseaudio/''$(basename ''$file .dylib).so" 153 + done 147 154 ''; 148 155 149 156 passthru = { 150 - pulseDir = "lib/pulse-" + lib.versions.majorMinor version; 157 + pulseDir = 158 + if (lib.versionAtLeast version "16.0") then 159 + "lib/pulseaudio" 160 + else 161 + "lib/pulse-" + lib.versions.majorMinor version; 151 162 }; 152 163 153 164 meta = {
+12 -12
pkgs/servers/sql/postgresql/default.nix
··· 14 14 , this, self, newScope, buildEnv 15 15 16 16 # source specification 17 - , version, sha256, psqlSchema, 17 + , version, hash, psqlSchema, 18 18 19 19 # for tests 20 20 nixosTests, thisAttr ··· 30 30 31 31 src = fetchurl { 32 32 url = "mirror://postgresql/source/v${version}/${pname}-${version}.tar.bz2"; 33 - inherit sha256; 33 + inherit hash; 34 34 }; 35 35 36 36 hardeningEnable = lib.optionals (!stdenv.cc.isClang) [ "pie" ]; ··· 201 201 in self: { 202 202 203 203 postgresql_10 = self.callPackage generic { 204 - version = "10.21"; 204 + version = "10.22"; 205 205 psqlSchema = "10.0"; # should be 10, but changing it is invasive 206 - sha256 = "sha256-0yGYhW1Sqab11QZC74ZoesBYvW78pcntV754CElvRdE="; 206 + hash = "sha256-lVl3VVxp3xpk9EuB1KGYfrdKu9GHBXn1rZ2UYTPdjk0="; 207 207 this = self.postgresql_10; 208 208 thisAttr = "postgresql_10"; 209 209 inherit self; ··· 211 211 }; 212 212 213 213 postgresql_11 = self.callPackage generic { 214 - version = "11.16"; 214 + version = "11.17"; 215 215 psqlSchema = "11.1"; # should be 11, but changing it is invasive 216 - sha256 = "sha256-LdnhEfCllJ7nyswGXOoPshCSkpuuMQzgW/AbT/xRA6U="; 216 + hash = "sha256-bphJY64HZeYVd5lRA6fmWU2w8L0BUorBI+DeSmpMtMQ="; 217 217 this = self.postgresql_11; 218 218 thisAttr = "postgresql_11"; 219 219 inherit self; 220 220 }; 221 221 222 222 postgresql_12 = self.callPackage generic { 223 - version = "12.11"; 223 + version = "12.12"; 224 224 psqlSchema = "12"; 225 - sha256 = "sha256-ECYkil/Svur0PkxyNqyBflbVi2gaM1hWRl37x1s+gwI="; 225 + hash = "sha256-NLPxxpQI4iBowMcbGCdpHxyJFTsK1XbBpE+JIKhYA5w="; 226 226 this = self.postgresql_12; 227 227 thisAttr = "postgresql_12"; 228 228 inherit self; 229 229 }; 230 230 231 231 postgresql_13 = self.callPackage generic { 232 - version = "13.7"; 232 + version = "13.8"; 233 233 psqlSchema = "13"; 234 - sha256 = "sha256-G5Bb9PPYNhSjk7PFH9NFkQ/SYeT1Ekpo2aH906KkY5k="; 234 + hash = "sha256-c4dv3TpRcIc0BFjcpM4VuNKk286zNMBEFCRVGubEze0="; 235 235 this = self.postgresql_13; 236 236 thisAttr = "postgresql_13"; 237 237 inherit self; 238 238 }; 239 239 240 240 postgresql_14 = self.callPackage generic { 241 - version = "14.4"; 241 + version = "14.5"; 242 242 psqlSchema = "14"; 243 - sha256 = "sha256-wjtiN8UjHHkVEb3HkJhhfWhS6eO982Dv2LXRWho9j2o="; 243 + hash = "sha256-1PcstfuFfJqfdeyM8JGhdxJygC8hePCy5lt7b/ZPSjA="; 244 244 this = self.postgresql_14; 245 245 thisAttr = "postgresql_14"; 246 246 inherit self;
+2 -2
pkgs/tools/graphics/vulkan-extension-layer/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "vulkan-extension-layer"; 5 - version = "1.3.211.0"; 5 + version = "1.3.216.0"; 6 6 7 7 src = (assert version == vulkan-headers.version; 8 8 fetchFromGitHub { 9 9 owner = "KhronosGroup"; 10 10 repo = "Vulkan-ExtensionLayer"; 11 11 rev = "sdk-${version}"; 12 - sha256 = "sha256-ixCfHnp6YAOuR4NMTGjhhqkfm0H7ZcO/8xKFJqw16YE="; 12 + hash = "sha256-h38LxV8G72Xxh44212IoGKQ0tKXwBnSpBjTB2gsr1zA="; 13 13 }); 14 14 15 15 nativeBuildInputs = [ cmake jq ];
+2 -2
pkgs/tools/graphics/vulkan-tools-lunarg/default.nix
··· 23 23 stdenv.mkDerivation rec { 24 24 pname = "vulkan-tools-lunarg"; 25 25 # The version must match that in vulkan-headers 26 - version = "1.3.211.0"; 26 + version = "1.3.216.0"; 27 27 28 28 src = (assert version == vulkan-headers.version; 29 29 fetchFromGitHub { 30 30 owner = "LunarG"; 31 31 repo = "VulkanTools"; 32 32 rev = "sdk-${version}"; 33 - sha256 = "sha256-Pkz2FV0AnTKm/4jVmkQNkYzpxpKJaSoy2fRAhVh5OKU="; 33 + hash = "sha256-NhYQSL5iU7iSO5Q6lp1iwhbi5GEfD11MDmBn9Uk1jm0="; 34 34 fetchSubmodules = true; 35 35 }); 36 36
+2 -2
pkgs/tools/graphics/vulkan-tools/default.nix
··· 21 21 22 22 stdenv.mkDerivation rec { 23 23 pname = "vulkan-tools"; 24 - version = "1.3.211.0"; 24 + version = "1.3.216.0"; 25 25 26 26 # It's not strictly necessary to have matching versions here, however 27 27 # since we're using the SDK version we may as well be consistent with ··· 31 31 owner = "KhronosGroup"; 32 32 repo = "Vulkan-Tools"; 33 33 rev = "sdk-${version}"; 34 - sha256 = "sha256-iXsWTKNllPZy1Kpo3JHzEEus3Hu9LofvMB3c4Gn6/DM="; 34 + hash = "sha256-VEMeURNboiOwPGrtFGUt9ZyChj8pV0xcpydrarcwtF0="; 35 35 }); 36 36 37 37 nativeBuildInputs = [
+2 -2
pkgs/tools/misc/man-db/default.nix
··· 2 2 , db 3 3 , fetchurl 4 4 , groff 5 + , gzip 5 6 , lib 6 7 , libiconv 7 8 , libpipeline ··· 68 69 # make sure that we don't wrap symlinks (since that changes argv[0] to the -wrapped name) 69 70 find "$out/bin" -type f | while read file; do 70 71 wrapProgram "$file" \ 71 - --prefix PATH : "${lib.getBin groff}/bin" \ 72 - --prefix PATH : "${lib.getBin zstd}/bin" 72 + --prefix PATH : "${lib.makeBinPath [ groff gzip zstd ]}" 73 73 done 74 74 ''; 75 75
+2 -2
pkgs/tools/networking/inetutils/default.nix
··· 4 4 5 5 stdenv.mkDerivation rec { 6 6 pname = "inetutils"; 7 - version = "2.2"; 7 + version = "2.3"; 8 8 9 9 src = fetchurl { 10 10 url = "mirror://gnu/${pname}/${pname}-${version}.tar.xz"; 11 - sha256 = "sha256-1Uf2kXLfc6/vaRoPeIYoD9eBrOoo3vT/S0shIIaonYA"; 11 + sha256 = "sha256-CwG7COKWI8TjuUDyM8lhRR2a+MUGYwGt12pSqV1Rdyw="; 12 12 }; 13 13 14 14 outputs = ["out" "apparmor"];
+1 -2
pkgs/tools/networking/wifite2/default.nix
··· 42 42 pixiewps 43 43 ]; 44 44 45 - checkInputs = propagatedBuildInputs; 46 - checkPhase = "python -m unittest discover tests -v"; 45 + checkInputs = propagatedBuildInputs ++ [ python3.pkgs.unittestCheckHook ]; 47 46 48 47 meta = with lib; { 49 48 homepage = "https://github.com/kimocoder/wifite2";
+2 -2
pkgs/tools/system/pciutils/default.nix
··· 6 6 7 7 stdenv.mkDerivation rec { 8 8 pname = "pciutils"; 9 - version = "3.7.0"; # with release-date database 9 + version = "3.8.0"; # with release-date database 10 10 11 11 src = fetchurl { 12 12 url = "mirror://kernel/software/utils/pciutils/pciutils-${version}.tar.xz"; 13 - sha256 = "1ss0rnfsx8gvqjxaji4mvbhf9xyih4cadmgadbwwv8mnx1xvjh4x"; 13 + sha256 = "sha256-ke29BCmoRwXJrRVtT/OMzHJNQepUxMW4jjjplvijTwU="; 14 14 }; 15 15 16 16 nativeBuildInputs = [ pkg-config ];
+7 -7
pkgs/top-level/all-packages.nix
··· 13986 13986 stdenv = gcc7Stdenv; 13987 13987 })); 13988 13988 13989 - llvmPackages_latest = llvmPackages_13; 13989 + llvmPackages_latest = llvmPackages_14; 13990 13990 13991 13991 llvmPackages_rocm = recurseIntoAttrs (callPackage ../development/compilers/llvm/rocm { }); 13992 13992 ··· 14192 14192 inherit (darwin) apple_sdk; 14193 14193 }; 14194 14194 14195 - rust_1_62 = callPackage ../development/compilers/rust/1_62.nix { 14195 + rust_1_63 = callPackage ../development/compilers/rust/1_63.nix { 14196 14196 inherit (darwin.apple_sdk.frameworks) CoreFoundation Security SystemConfiguration; 14197 14197 llvm_14 = llvmPackages_14.libllvm; 14198 14198 }; 14199 - rust = rust_1_62; 14199 + rust = rust_1_63; 14200 14200 14201 14201 mrustc = callPackage ../development/compilers/mrustc { }; 14202 14202 mrustc-minicargo = callPackage ../development/compilers/mrustc/minicargo.nix { }; 14203 14203 mrustc-bootstrap = callPackage ../development/compilers/mrustc/bootstrap.nix { stdenv = gcc10StdenvCompat; }; 14204 14204 14205 - rustPackages_1_62 = rust_1_62.packages.stable; 14206 - rustPackages = rustPackages_1_62; 14205 + rustPackages_1_63 = rust_1_63.packages.stable; 14206 + rustPackages = rustPackages_1_63; 14207 14207 14208 14208 inherit (rustPackages) cargo clippy rustc rustPlatform; 14209 14209 ··· 18883 18883 libcamera = callPackage ../development/libraries/libcamera { }; 18884 18884 18885 18885 libcanberra = callPackage ../development/libraries/libcanberra { 18886 - inherit (darwin.apple_sdk.frameworks) Carbon CoreServices; 18886 + inherit (darwin.apple_sdk.frameworks) Carbon CoreServices AppKit; 18887 18887 }; 18888 18888 libcanberra-gtk2 = pkgs.libcanberra.override { 18889 18889 gtkSupport = "gtk2"; ··· 22858 22858 hsphfpd = callPackage ../servers/pulseaudio/hsphfpd.nix { }; 22859 22859 22860 22860 pulseaudio = callPackage ../servers/pulseaudio { 22861 - inherit (darwin.apple_sdk.frameworks) CoreServices AudioUnit Cocoa; 22861 + inherit (darwin.apple_sdk.frameworks) CoreServices AudioUnit Cocoa CoreAudio; 22862 22862 }; 22863 22863 22864 22864 qpaeq = libsForQt5.callPackage ../servers/pulseaudio/qpaeq.nix { };
+1
pkgs/top-level/python-packages.nix
··· 125 125 pythonRemoveTestsDirHook 126 126 setuptoolsBuildHook 127 127 setuptoolsCheckHook 128 + unittestCheckHook 128 129 venvShellHook 129 130 wheelUnpackHook; 130 131