···5858a re-usable environment in a single-file Python script; then we will create a
5959full Python environment for development with this same environment.
60606161-Philosphically, this should be familiar to users who are used to a `venv` style
6161+Philosophically, this should be familiar to users who are used to a `venv` style
6262of development: individual projects create their own Python environments without
6363impacting the global environment or each other.
6464
···11#!/usr/bin/env nix-shell
22#!nix-shell -I nixpkgs=../../../../../ -i bash -p nix wget prefetch-yarn-deps nix-prefetch-github
3344-# FIXME should fix itself on the next release -> remove the warning if that's the case
55-echo "WARNING: on the last update, the yarn.lock had to be patched. Please be careful when updating the hashes!"
66-74if [ "$#" -gt 1 ] || [[ "$1" == -* ]]; then
85 echo "Regenerates packaging data for the element packages."
96 echo "Usage: $0 [git release tag]"
···119119 # or ${with_sysroot}${native_system_header_dir}
120120 # While native build (build == host == target) uses passed headers
121121 # path as is:
122122- # ${native_system_header_dir}
122122+ # ${with_build_sysroot}${native_system_header_dir}
123123 #
124124 # Nixpkgs uses flat directory structure for both native and cross
125125 # cases. As a result libc headers don't get found for cross case
+69
pkgs/development/compilers/zig/0.10.nix
···11+{ lib
22+, stdenv
33+, fetchFromGitHub
44+, cmake
55+, coreutils
66+, llvmPackages
77+, libxml2
88+, zlib
99+}:
1010+1111+stdenv.mkDerivation rec {
1212+ pname = "zig";
1313+ version = "0.10.1";
1414+1515+ src = fetchFromGitHub {
1616+ owner = "ziglang";
1717+ repo = pname;
1818+ rev = version;
1919+ hash = "sha256-69QIkkKzApOGfrBdgtmxFMDytRkSh+0YiaJQPbXsBeo=";
2020+ };
2121+2222+ nativeBuildInputs = [
2323+ cmake
2424+ llvmPackages.llvm.dev
2525+ ];
2626+2727+ buildInputs = [
2828+ coreutils
2929+ libxml2
3030+ zlib
3131+ ] ++ (with llvmPackages; [
3232+ libclang
3333+ lld
3434+ llvm
3535+ ]);
3636+3737+ preBuild = ''
3838+ export HOME=$TMPDIR;
3939+ '';
4040+4141+ postPatch = ''
4242+ # Zig's build looks at /usr/bin/env to find dynamic linking info. This
4343+ # doesn't work in Nix' sandbox. Use env from our coreutils instead.
4444+ substituteInPlace lib/std/zig/system/NativeTargetInfo.zig --replace "/usr/bin/env" "${coreutils}/bin/env"
4545+ '';
4646+4747+ cmakeFlags = [
4848+ # file RPATH_CHANGE could not write new RPATH
4949+ "-DCMAKE_SKIP_BUILD_RPATH=ON"
5050+ ];
5151+5252+ doCheck = true;
5353+ installCheckPhase = ''
5454+ $out/bin/zig test --cache-dir "$TMPDIR" -I $src/test $src/test/behavior.zig
5555+ '';
5656+5757+ meta = with lib; {
5858+ homepage = "https://ziglang.org/";
5959+ description =
6060+ "General-purpose programming language and toolchain for maintaining robust, optimal, and reusable software";
6161+ license = licenses.mit;
6262+ maintainers = with maintainers; [ aiotter andrewrk AndersonTorres ];
6363+ platforms = platforms.unix;
6464+ # Build fails on Darwin on both AArch64 and x86_64:
6565+ # https://github.com/NixOS/nixpkgs/pull/210324#issuecomment-1381313616
6666+ # https://github.com/NixOS/nixpkgs/pull/210324#issuecomment-1381236045
6767+ broken = stdenv.isDarwin;
6868+ };
6969+}
···55, nixosTests
66}:
7788+let
99+ tag = "0.3.0";
1010+in
811stdenv.mkDerivation {
912 pname = "apfs";
1010- version = "unstable-2022-10-20-${kernel.version}";
1313+ version = "${tag}-${kernel.version}";
11141215 src = fetchFromGitHub {
1316 owner = "linux-apfs";
1417 repo = "linux-apfs-rw";
1515- rev = "e6eb67c92d425d395eac1c4403629391bdd5064d";
1616- sha256 = "sha256-6rv5qZCjOqt0FaNFhA3tYg6/SdssvoT8kPVhalajgOo=";
1818+ rev = "v${tag}";
1919+ sha256 = "sha256-ABFqkiIJuFapFsUIFHfw8+TujePZm7ZX/qHuFO2KdnQ=";
1720 };
18211922 hardeningDisable = [ "pic" ];
···29323033 meta = with lib; {
3134 description = "APFS module for linux";
3535+ longDescription = ''
3636+ The Apple File System (APFS) is the copy-on-write filesystem currently
3737+ used on all Apple devices. This module provides a degree of experimental
3838+ support on Linux.
3939+ If you make use of the write support, expect data corruption.
4040+ Read-only support is somewhat more complete, with sealed volumes,
4141+ snapshots, and all the missing compression algorithms recently added.
4242+ Encryption is still not in the works though.
4343+ '';
3244 homepage = "https://github.com/linux-apfs/linux-apfs-rw";
3345 license = licenses.gpl2Only;
3446 platforms = platforms.linux;
+2-7
pkgs/os-specific/linux/busybox/default.nix
···50505151stdenv.mkDerivation rec {
5252 pname = "busybox";
5353- version = "1.35.0";
5353+ version = "1.36.0";
54545555 # Note to whoever is updating busybox: please verify that:
5656 # nix-build pkgs/stdenv/linux/make-bootstrap-tools.nix -A test
5757 # still builds after the update.
5858 src = fetchurl {
5959 url = "https://busybox.net/downloads/${pname}-${version}.tar.bz2";
6060- sha256 = "sha256-+u6yRMNaNIozT0pZ5EYm7ocPsHtohNaMEK6LwZ+DppQ=";
6060+ sha256 = "sha256-VCdQyK98smMOIBeAtPmfPczusG9QW0eexoJBweavYaU=";
6161 };
62626363 hardeningDisable = [ "format" "pie" ]
···7474 name = "CVE-2022-28391.patch";
7575 url = "https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch?id=ed92963eb55bbc8d938097b9ccb3e221a94653f4";
7676 sha256 = "sha256-vl1wPbsHtXY9naajjnTicQ7Uj3N+EQ8pRNnrdsiow+w=";
7777- })
7878- (fetchurl {
7979- name = "CVE-2022-30065.patch";
8080- url = "https://git.alpinelinux.org/aports/plain/main/busybox/CVE-2022-30065.patch?id=4ffd996b3f8298c7dd424b912c245864c816e354";
8181- sha256 = "sha256-+WSYxI6eF8S0tya/S62f9Nc6jVMnHO0q1OyM69GlNTY=";
8277 })
8378 ] ++ lib.optional (stdenv.hostPlatform != stdenv.buildPlatform) ./clang-cross.patch;
8479