lol

Merge commit '2e56ba' from staging into master

+230 -304
+1 -1
pkgs/applications/misc/gnuradio/default.nix
··· 63 63 addGRCBlocksPath() { 64 64 addToSearchPath GRC_BLOCKS_PATH $1/share/gnuradio/grc/blocks 65 65 } 66 - envHooks+=(addGRCBlocksPath) 66 + addEnvHooks "$targetOffset" addGRCBlocksPath 67 67 ''; 68 68 69 69 setupHook = [ grcSetupHook ];
-1
pkgs/applications/video/gnome-mpv/default.nix
··· 26 26 ''; 27 27 28 28 doCheck = true; 29 - checkPhase = "meson test"; 30 29 31 30 meta = with stdenv.lib; { 32 31 description = "Simple GTK+ frontend for the mpv video player";
+1 -2
pkgs/build-support/fetchbower/default.nix
··· 11 11 12 12 fetchbower = name: version: target: outputHash: stdenvNoCC.mkDerivation { 13 13 name = "${cleanName name}-${bowerVersion version}"; 14 - SSL_CERT_FILE = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 15 14 buildCommand = '' 16 15 fetch-bower --quiet --out=$PWD/out "${name}" "${target}" "${version}" 17 16 # In some cases, the result of fetchBower is different depending ··· 23 22 outputHashMode = "recursive"; 24 23 outputHashAlgo = "sha256"; 25 24 inherit outputHash; 26 - nativeBuildInputs = [ bower2nix ]; 25 + nativeBuildInputs = [ bower2nix cacert ]; 27 26 }; 28 27 29 28 in fetchbower
+1 -2
pkgs/build-support/fetchdarcs/default.nix
··· 7 7 else 8 8 stdenvNoCC.mkDerivation { 9 9 name = "fetchdarcs"; 10 - NIX_SSL_CERT_FILE = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 11 10 builder = ./builder.sh; 12 - nativeBuildInputs = [darcs]; 11 + nativeBuildInputs = [cacert darcs]; 13 12 14 13 outputHashAlgo = "sha256"; 15 14 outputHashMode = "recursive";
+1 -3
pkgs/build-support/fetchgx/default.nix
··· 6 6 name = "${name}-gxdeps"; 7 7 inherit src; 8 8 9 - nativeBuildInputs = [ go gx gx-go ]; 9 + nativeBuildInputs = [ cacert go gx gx-go ]; 10 10 11 11 outputHashAlgo = "sha256"; 12 12 outputHashMode = "recursive"; 13 13 outputHash = sha256; 14 14 15 15 phases = [ "unpackPhase" "buildPhase" "installPhase" ]; 16 - 17 - NIX_SSL_CERT_FILE = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 18 16 19 17 buildPhase = '' 20 18 export GOPATH=$(pwd)/vendor
+1 -2
pkgs/build-support/rust/default.nix
··· 32 32 33 33 patchRegistryDeps = ./patch-registry-deps; 34 34 35 - buildInputs = [ git rust.cargo rust.rustc ] ++ buildInputs; 35 + buildInputs = [ cacert git rust.cargo rust.rustc ] ++ buildInputs; 36 36 37 37 configurePhase = args.configurePhase or '' 38 38 runHook preConfigure ··· 60 60 unset cargoDepsCopy 61 61 62 62 export RUST_LOG=${logLevel} 63 - export SSL_CERT_FILE=${cacert}/etc/ssl/certs/ca-bundle.crt 64 63 '' + (args.postUnpack or ""); 65 64 66 65 buildPhase = with builtins; args.buildPhase or ''
-1
pkgs/build-support/rust/fetchcargo.nix
··· 19 19 exit 1 20 20 fi 21 21 22 - export SSL_CERT_FILE=${cacert}/etc/ssl/certs/ca-bundle.crt 23 22 export CARGO_HOME=$(mktemp -d cargo-home.XXX) 24 23 25 24 cargo vendor
+2
pkgs/data/misc/cacert/default.nix
··· 52 52 cp -v ca-bundle.crt $out/etc/ssl/certs 53 53 ''; 54 54 55 + setupHook = ./setup-hook.sh; 56 + 55 57 meta = { 56 58 homepage = https://curl.haxx.se/docs/caextract.html; 57 59 description = "A bundle of X.509 certificates of public Certificate Authorities (CA)";
+5
pkgs/data/misc/cacert/setup-hook.sh
··· 1 + cacertHook() { 2 + export SSL_CERT_FILE=@out@/etc/ssl/certs/ca-bundle.crt 3 + } 4 + 5 + addEnvHooks "$targetOffset" cacertHook
+2 -2
pkgs/data/misc/iana-etc/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "iana-etc-${version}"; 5 - version = "20171106"; 5 + version = "20180108"; 6 6 7 7 src = fetchurl { 8 8 url = "https://github.com/Mic92/iana-etc/releases/download/${version}/iana-etc-${version}.tar.gz"; 9 - sha256 = "0pbmq95gdkp66cljwklv4gzh8lvl30l4k77hfwvrxz5mfqia6qdd"; 9 + sha256 = "1x4jacrvjwcsan88rg2wf2a8bajsglg6w4396vbr18zh0sya84a2"; 10 10 }; 11 11 12 12 installPhase = ''
+1 -2
pkgs/data/misc/tzdata/tzdata-setup-hook.sh
··· 2 2 export TZDIR=@out@/share/zoneinfo 3 3 } 4 4 5 - envHooks+=(tzdataHook) 6 - crossEnvHooks+=(tzdataHook) 5 + addEnvHooks "$targetOffset" tzdataHook
-1
pkgs/desktops/gnome-3/apps/bijiben/default.nix
··· 8 8 inherit (import ./src.nix fetchurl) name src; 9 9 10 10 doCheck = true; 11 - checkPhase = "meson test"; 12 11 13 12 patches = [ 14 13 ./no-update-icon-cache.patch
-2
pkgs/desktops/gnome-3/apps/gnome-clocks/default.nix
··· 18 18 19 19 prePatch = "patchShebangs build-aux/"; 20 20 21 - checkPhase = "meson test"; 22 - 23 21 meta = with stdenv.lib; { 24 22 homepage = https://wiki.gnome.org/Apps/Clocks; 25 23 description = "Clock application designed for GNOME 3";
+2 -4
pkgs/desktops/gnome-3/apps/nautilus-sendto/default.nix
··· 1 - { stdenv, fetchurl, meson, ninja, glib, pkgconfig, gnome3, appstream-glib 2 - , gettext, gobjectIntrospection 3 - }: 1 + { stdenv, fetchurl, meson, ninja, glib, pkgconfig, gnome3, appstream-glib, gettext }: 4 2 5 3 stdenv.mkDerivation rec { 6 4 name = "nautilus-sendto-${version}"; ··· 12 10 sha256 = "164d7c6e8bae29c4579bcc67a7bf50d783662b1545b62f3008e7ea3c0410e04d"; 13 11 }; 14 12 15 - nativeBuildInputs = [ meson ninja pkgconfig appstream-glib gettext gobjectIntrospection ]; 13 + nativeBuildInputs = [ meson ninja pkgconfig appstream-glib gettext ]; 16 14 buildInputs = [ glib ]; 17 15 18 16 meta = with stdenv.lib; {
-2
pkgs/desktops/gnome-3/core/gnome-dictionary/default.nix
··· 14 14 desktop_file_utils appstream-glib libxslt docbook_xsl docbook_xml_dtd_43]; 15 15 buildInputs = [ gtk glib gnome3.gsettings_desktop_schemas ]; 16 16 17 - checkPhase = "meson test"; 18 - 19 17 meta = with stdenv.lib; { 20 18 homepage = https://wiki.gnome.org/Apps/Dictionary; 21 19 description = "Dictionary is the GNOME application to look up definitions";
-2
pkgs/desktops/gnome-3/core/gnome-font-viewer/default.nix
··· 7 7 8 8 doCheck = true; 9 9 10 - checkPhase = "meson test"; 11 - 12 10 nativeBuildInputs = [ meson ninja pkgconfig gettext wrapGAppsHook libxml2 ]; 13 11 buildInputs = [ gtk3 glib gnome3.gnome_desktop gnome3.defaultIconTheme ]; 14 12
+2 -6
pkgs/desktops/gnome-3/core/gnome-screenshot/default.nix
··· 1 1 { stdenv, gettext, libxml2, fetchurl, pkgconfig, libcanberra_gtk3 2 2 , bash, gtk3, glib, meson, ninja, wrapGAppsHook, appstream-glib 3 - , gnome3, librsvg, gdk_pixbuf, gobjectIntrospection }: 3 + , gnome3, librsvg, gdk_pixbuf }: 4 4 5 5 stdenv.mkDerivation rec { 6 6 inherit (import ./src.nix fetchurl) name src; 7 7 8 8 doCheck = true; 9 9 10 - checkPhase = "meson test"; 11 - 12 - 13 10 postPatch = '' 14 11 chmod +x build-aux/postinstall.py # patchShebangs requires executable file 15 12 patchShebangs build-aux/postinstall.py ··· 18 15 propagatedUserEnvPkgs = [ gnome3.gnome_themes_standard ]; 19 16 propagatedBuildInputs = [ gdk_pixbuf gnome3.defaultIconTheme librsvg ]; 20 17 21 - nativeBuildInputs = [ meson ninja pkgconfig gettext appstream-glib libxml2 22 - wrapGAppsHook gobjectIntrospection ]; 18 + nativeBuildInputs = [ meson ninja pkgconfig gettext appstream-glib libxml2 wrapGAppsHook ]; 23 19 buildInputs = [ bash gtk3 glib libcanberra_gtk3 24 20 gnome3.gsettings_desktop_schemas ]; 25 21
-2
pkgs/desktops/gnome-3/core/libgepub/default.nix
··· 11 11 12 12 doCheck = true; 13 13 14 - checkPhase = "meson test"; 15 - 16 14 nativeBuildInputs = [ meson ninja pkgconfig gobjectIntrospection ]; 17 15 buildInputs = [ glib webkitgtk libsoup libxml2 libarchive ]; 18 16
-2
pkgs/desktops/gnome-3/core/simple-scan/default.nix
··· 39 39 40 40 doCheck = true; 41 41 42 - checkPhase = "meson test"; 43 - 44 42 meta = with stdenv.lib; { 45 43 description = "Simple scanning utility"; 46 44 longDescription = ''
-2
pkgs/desktops/gnome-3/core/totem/default.nix
··· 27 27 28 28 propagatedBuildInputs = [ gobjectIntrospection python3Packages.pylint python3Packages.pygobject2 ]; 29 29 30 - checkPhase = "meson test"; 31 - 32 30 patches = [ 33 31 (fetchurl { 34 32 name = "remove-pycompile.patch";
+1 -3
pkgs/development/compilers/go/1.7.nix
··· 35 35 36 36 # perl is used for testing go vet 37 37 nativeBuildInputs = [ perl which pkgconfig patch ]; 38 - buildInputs = [ pcre ]; 38 + buildInputs = [ cacert pcre ]; 39 39 propagatedBuildInputs = optionals stdenv.isDarwin [ Security Foundation ]; 40 40 41 41 hardeningDisable = [ "all" ]; ··· 115 115 sha256 = "1ny5l3f8a9dpjjrnjnsplb66308a0x13sa0wwr4j6yrkc8j4qxqi"; 116 116 }) 117 117 ]; 118 - 119 - NIX_SSL_CERT_FILE = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 120 118 121 119 GOOS = if stdenv.isDarwin then "darwin" else "linux"; 122 120 GOARCH = if stdenv.isDarwin then "amd64"
+1 -3
pkgs/development/compilers/go/1.8.nix
··· 37 37 # perl is used for testing go vet 38 38 nativeBuildInputs = [ perl which pkgconfig patch makeWrapper ] 39 39 ++ optionals stdenv.isLinux [ procps ]; 40 - buildInputs = [ pcre ] 40 + buildInputs = [ cacert pcre ] 41 41 ++ optionals stdenv.isLinux [ stdenv.glibc.out stdenv.glibc.static ]; 42 42 propagatedBuildInputs = optionals stdenv.isDarwin [ Security Foundation ]; 43 43 ··· 121 121 echo "substitute hardcoded dsymutil with ${llvm}/bin/llvm-dsymutil" 122 122 substituteInPlace "src/cmd/link/internal/ld/lib.go" --replace dsymutil ${llvm}/bin/llvm-dsymutil 123 123 ''; 124 - 125 - NIX_SSL_CERT_FILE = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 126 124 127 125 GOOS = if stdenv.isDarwin then "darwin" else "linux"; 128 126 GOARCH = if stdenv.isDarwin then "amd64"
+1 -3
pkgs/development/compilers/go/1.9.nix
··· 37 37 # perl is used for testing go vet 38 38 nativeBuildInputs = [ perl which pkgconfig patch makeWrapper ] 39 39 ++ optionals stdenv.isLinux [ procps ]; 40 - buildInputs = [ pcre ] 40 + buildInputs = [ cacert pcre ] 41 41 ++ optionals stdenv.isLinux [ stdenv.glibc.out stdenv.glibc.static ]; 42 42 propagatedBuildInputs = optionals stdenv.isDarwin [ Security Foundation ]; 43 43 ··· 127 127 echo "substitute hardcoded dsymutil with ${llvm}/bin/llvm-dsymutil" 128 128 substituteInPlace "src/cmd/link/internal/ld/lib.go" --replace dsymutil ${llvm}/bin/llvm-dsymutil 129 129 ''; 130 - 131 - NIX_SSL_CERT_FILE = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 132 130 133 131 GOOS = if stdenv.isDarwin then "darwin" else "linux"; 134 132 GOARCH = if stdenv.isDarwin then "amd64"
+4 -2
pkgs/development/compilers/llvm/3.8/clang/default.nix
··· 29 29 sed -i -e 's/DriverArgs.hasArg(options::OPT_nostdlibinc)/true/' lib/Driver/ToolChains.cpp 30 30 ''; 31 31 32 - outputs = [ "out" "python" ]; 32 + outputs = [ "out" "lib" "python" ]; 33 33 34 34 # Clang expects to find LLVMgold in its own prefix 35 35 # Clang expects to find sanitizer libraries in its own prefix ··· 37 37 ln -sv ${llvm}/lib/LLVMgold.so $out/lib 38 38 ln -sv ${llvm}/lib/clang/${version}/lib $out/lib/clang/${version}/ 39 39 ln -sv $out/bin/clang $out/bin/cpp 40 + 41 + # Move libclang to 'lib' output 42 + moveToOutput "lib/libclang.*" "$lib" 40 43 41 44 mkdir -p $python/bin $python/share/clang/ 42 45 mv $out/bin/{git-clang-format,scan-view} $python/bin ··· 51 54 enableParallelBuilding = true; 52 55 53 56 passthru = { 54 - lib = self; # compatibility with gcc, so that `stdenv.cc.cc.lib` works on both 55 57 isClang = true; 56 58 inherit llvm; 57 59 } // stdenv.lib.optionalAttrs stdenv.isLinux {
+2
pkgs/development/compilers/llvm/3.8/default.nix
··· 22 22 inherit clang-tools-extra_src stdenv; 23 23 }; 24 24 25 + libclang = self.clang-unwrapped.lib; 26 + 25 27 clang = if stdenv.cc.isGNU then self.libstdcxxClang else self.libcxxClang; 26 28 27 29 libstdcxxClang = ccWrapperFun {
+4 -2
pkgs/development/compilers/llvm/3.9/clang/default.nix
··· 31 31 sed -i -e 's/DriverArgs.hasArg(options::OPT_nostdlibinc)/true/' lib/Driver/ToolChains.cpp 32 32 ''; 33 33 34 - outputs = [ "out" "python" ]; 34 + outputs = [ "out" "lib" "python" ]; 35 35 36 36 # Clang expects to find LLVMgold in its own prefix 37 37 # Clang expects to find sanitizer libraries in its own prefix ··· 39 39 ln -sv ${llvm}/lib/LLVMgold.so $out/lib 40 40 ln -sv ${llvm}/lib/clang/${version}/lib $out/lib/clang/${version}/ 41 41 ln -sv $out/bin/clang $out/bin/cpp 42 + 43 + # Move libclang to 'lib' output 44 + moveToOutput "lib/libclang.*" "$lib" 42 45 43 46 mkdir -p $python/bin $python/share/clang/ 44 47 mv $out/bin/{git-clang-format,scan-view} $python/bin ··· 53 56 enableParallelBuilding = true; 54 57 55 58 passthru = { 56 - lib = self; # compatibility with gcc, so that `stdenv.cc.cc.lib` works on both 57 59 isClang = true; 58 60 inherit llvm; 59 61 } // stdenv.lib.optionalAttrs stdenv.isLinux {
+2
pkgs/development/compilers/llvm/3.9/default.nix
··· 22 22 inherit clang-tools-extra_src stdenv; 23 23 }; 24 24 25 + libclang = self.clang-unwrapped.lib; 26 + 25 27 clang = if stdenv.cc.isGNU then self.libstdcxxClang else self.libcxxClang; 26 28 27 29 libstdcxxClang = ccWrapperFun {
+4 -3
pkgs/development/compilers/llvm/4/clang/default.nix
··· 49 49 sed -i '1s,^,find_package(Sphinx REQUIRED)\n,' docs/CMakeLists.txt 50 50 ''; 51 51 52 - outputs = [ "out" "python" ] 52 + outputs = [ "out" "lib" "python" ] 53 53 ++ stdenv.lib.optional enableManpages "man"; 54 54 55 55 # Clang expects to find LLVMgold in its own prefix ··· 59 59 ln -sv ${llvm}/lib/clang/${release_version}/lib $out/lib/clang/${release_version}/ 60 60 ln -sv $out/bin/clang $out/bin/cpp 61 61 62 + # Move libclang to 'lib' output 63 + moveToOutput "lib/libclang.*" "$lib" 64 + 62 65 mkdir -p $python/bin $python/share/clang/ 63 66 mv $out/bin/{git-clang-format,scan-view} $python/bin 64 67 if [ -e $out/bin/set-xcode-analyzer ]; then 65 68 mv $out/bin/set-xcode-analyzer $python/bin 66 69 fi 67 70 mv $out/share/clang/*.py $python/share/clang 68 - 69 71 rm $out/bin/c-index-test 70 72 '' 71 73 + stdenv.lib.optionalString enableManpages '' ··· 79 81 enableParallelBuilding = true; 80 82 81 83 passthru = { 82 - lib = self; # compatibility with gcc, so that `stdenv.cc.cc.lib` works on both 83 84 isClang = true; 84 85 inherit llvm; 85 86 } // stdenv.lib.optionalAttrs stdenv.isLinux {
+1
pkgs/development/compilers/llvm/4/default.nix
··· 34 34 llvm = overrideManOutput llvm; 35 35 clang-unwrapped = overrideManOutput clang-unwrapped; 36 36 37 + libclang = self.clang-unwrapped.lib; 37 38 llvm-manpages = lowPrio self.llvm.man; 38 39 clang-manpages = lowPrio self.clang-unwrapped.man; 39 40
+4 -3
pkgs/development/compilers/llvm/5/clang/default.nix
··· 50 50 sed -i '1s,^,find_package(Sphinx REQUIRED)\n,' docs/CMakeLists.txt 51 51 ''; 52 52 53 - outputs = [ "out" "python" ] 53 + outputs = [ "out" "lib" "python" ] 54 54 ++ stdenv.lib.optional enableManpages "man"; 55 55 56 56 # Clang expects to find LLVMgold in its own prefix ··· 60 60 ln -sv ${llvm}/lib/clang/${release_version}/lib $out/lib/clang/${release_version}/ 61 61 ln -sv $out/bin/clang $out/bin/cpp 62 62 63 + # Move libclang to 'lib' output 64 + moveToOutput "lib/libclang.*" "$lib" 65 + 63 66 mkdir -p $python/bin $python/share/clang/ 64 67 mv $out/bin/{git-clang-format,scan-view} $python/bin 65 68 if [ -e $out/bin/set-xcode-analyzer ]; then 66 69 mv $out/bin/set-xcode-analyzer $python/bin 67 70 fi 68 71 mv $out/share/clang/*.py $python/share/clang 69 - 70 72 rm $out/bin/c-index-test 71 73 '' 72 74 + stdenv.lib.optionalString enableManpages '' ··· 80 82 enableParallelBuilding = true; 81 83 82 84 passthru = { 83 - lib = self; # compatibility with gcc, so that `stdenv.cc.cc.lib` works on both 84 85 isClang = true; 85 86 inherit llvm; 86 87 } // stdenv.lib.optionalAttrs stdenv.isLinux {
+1
pkgs/development/compilers/llvm/5/default.nix
··· 34 34 llvm = overrideManOutput llvm; 35 35 clang-unwrapped = overrideManOutput clang-unwrapped; 36 36 37 + libclang = self.clang-unwrapped.lib; 37 38 llvm-manpages = lowPrio self.llvm.man; 38 39 clang-manpages = lowPrio self.clang-unwrapped.man; 39 40
+1 -3
pkgs/development/compilers/rust/cargo.nix
··· 24 24 passthru.rustc = rustc; 25 25 26 26 nativeBuildInputs = [ pkgconfig ]; 27 - buildInputs = [ file curl python openssl cmake zlib makeWrapper libgit2 ] 27 + buildInputs = [ cacert file curl python openssl cmake zlib makeWrapper libgit2 ] 28 28 ++ stdenv.lib.optionals stdenv.isDarwin [ CoreFoundation libiconv ]; 29 29 30 30 LIBGIT2_SYS_USE_PKG_CONFIG=1; ··· 48 48 ''; 49 49 50 50 checkPhase = '' 51 - # Export SSL_CERT_FILE as without it one test fails with SSL verification error 52 - export SSL_CERT_FILE=${cacert}/etc/ssl/certs/ca-bundle.crt 53 51 # Disable cross compilation tests 54 52 export CFG_DISABLE_CROSS_TESTS=1 55 53 cargo test
+1 -1
pkgs/development/interpreters/erlang/R16B02-basho.nix
··· 36 36 tar xf "${manpages}" -C "$out/lib/erlang" 37 37 for i in "$out"/lib/erlang/man/man[0-9]/*.[0-9]; do 38 38 prefix="''${i%/*}" 39 - ensureDir "$out/share/man/''${prefix##*/}" 39 + mkdir -p "$out/share/man/''${prefix##*/}" 40 40 ln -s "$i" "$out/share/man/''${prefix##*/}/''${i##*/}erl" 41 41 done 42 42 '';
+7 -9
pkgs/development/libraries/boehm-gc/default.nix
··· 3 3 }: 4 4 5 5 stdenv.mkDerivation rec { 6 - name = "boehm-gc-7.6.0"; 6 + name = "boehm-gc-${version}"; 7 + version = "7.6.2"; 7 8 8 9 src = fetchurl { 9 - url = http://www.hboehm.info/gc/gc_source/gc-7.6.0.tar.gz; 10 - sha256 = "143x7g0d0k6250ai6m2x3l4y352mzizi4wbgrmahxscv2aqjhjm1"; 10 + urls = [ 11 + "http://www.hboehm.info/gc/gc_source/gc-${version}.tar.gz" 12 + "https://github.com/ivmai/bdwgc/releases/download/v${version}/gc-${version}.tar.gz" 13 + ]; 14 + sha256 = "07nli9hgdzc09qzw169sn7gchkrn5kqgyniv2rspcy1xaq2j04dx"; 11 15 }; 12 16 13 17 buildInputs = [ libatomic_ops ]; ··· 24 28 25 29 # Don't run the native `strip' when cross-compiling. 26 30 dontStrip = hostPlatform != buildPlatform; 27 - 28 - postInstall = 29 - '' 30 - mkdir -p $out/share/doc 31 - mv $out/share/gc $out/share/doc/gc 32 - ''; 33 31 34 32 enableParallelBuilding = true; 35 33
+1 -2
pkgs/development/libraries/dleyna-core/setup-hook.sh
··· 5 5 fi 6 6 } 7 7 8 - envHooks+=(addDleynaConnectorPath) 9 - 8 + addEnvHooks "$targetOffset" addDleynaConnectorPath
+2 -2
pkgs/development/libraries/gdbm/default.nix
··· 1 1 { stdenv, lib, buildPlatform, fetchurl }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "gdbm-1.13"; 4 + name = "gdbm-1.14"; 5 5 6 6 src = fetchurl { 7 7 url = "mirror://gnu/gdbm/${name}.tar.gz"; 8 - sha256 = "0lx201q20dvc70f8a3c9s7s18z15inlxvbffph97ngvrgnyjq9cx"; 8 + sha256 = "02dakgrq93xwgln8qfv3vs5jyz5yvds5nyzkx6rhg9v585x478dd"; 9 9 }; 10 10 11 11 doCheck = true; # not cross;
+1 -1
pkgs/development/libraries/gettext/gettext-setup-hook.sh
··· 4 4 fi 5 5 } 6 6 7 - envHooks+=(gettextDataDirsHook) 7 + addEnvHooks "$hostOffset" gettextDataDirsHook
+2 -3
pkgs/development/libraries/glib/setup-hook.sh
··· 11 11 glibPreInstallPhase() { 12 12 installFlagsArray+=("gsettingsschemadir=${!outputLib}/share/gsettings-schemas/$name/glib-2.0/schemas/") 13 13 } 14 - preInstallPhases+=(glibPreInstallPhase) 14 + preInstallPhases+=" glibPreInstallPhase" 15 15 16 16 glibPreFixupPhase() { 17 17 # Move gschemas in case the install flag didn't help ··· 22 22 23 23 addToSearchPath GSETTINGS_SCHEMAS_PATH "${!outputLib}/share/gsettings-schemas/$name" 24 24 } 25 - preFixupPhases+=(glibPreFixupPhase) 26 - 25 + preFixupPhases+=" glibPreFixupPhase"
pkgs/development/libraries/glibc/2.26-115to131.diff.gz

This is a binary file and will not be displayed.

+5 -2
pkgs/development/libraries/glibc/common.nix
··· 20 20 21 21 let 22 22 version = "2.26"; 23 - patchSuffix = "-115"; 23 + patchSuffix = "-131"; 24 24 sha256 = "1ggnj1hzjym7sn93rbwydcqd562q73lsb7g7kd199g6j9j9hlkp5"; 25 25 cross = if buildPlatform != hostPlatform then hostPlatform else null; 26 26 in ··· 48 48 */ 49 49 ./2.26-75.patch.gz 50 50 ./2.26-75to115.diff.gz 51 + # contains fix for CVE-2018-1000001 as the last commit: 52 + # https://sourceware.org/git/?p=glibc.git;a=commit;h=fabef2edbc 53 + ./2.26-115to131.diff.gz 51 54 52 55 /* Have rpcgen(1) look for cpp(1) in $PATH. */ 53 56 ./rpcgen-path.patch ··· 73 76 and we lose early mismatch detection on 2.6.32. 74 77 75 78 On major glibc updates we should check that the patched kernel supports 76 - all the required features. ATM it's verified up to glibc-2.26-115. 79 + all the required features. ATM it's verified up to glibc-2.26-131. 77 80 # HOWTO: check glibc sources for changes in kernel requirements 78 81 git log -p glibc-2.25.. sysdeps/unix/sysv/linux/x86_64/kernel-features.h sysdeps/unix/sysv/linux/kernel-features.h 79 82 # get kernel sources (update the URL)
-2
pkgs/development/libraries/json-glib/default.nix
··· 27 27 28 28 doCheck = true; 29 29 30 - checkPhase = "meson test"; 31 - 32 30 meta = with stdenv.lib; { 33 31 homepage = http://live.gnome.org/JsonGlib; 34 32 description = "A library providing (de)serialization support for the JavaScript Object Notation (JSON) format";
+2 -2
pkgs/development/libraries/libatomic_ops/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "libatomic_ops-${version}"; 5 - version = "7.6.0"; 5 + version = "7.6.2"; 6 6 7 7 src = fetchurl { 8 8 urls = [ 9 9 "http://www.ivmaisoft.com/_bin/atomic_ops/libatomic_ops-${version}.tar.gz" 10 10 "https://github.com/ivmai/libatomic_ops/releases/download/v${version}/libatomic_ops-${version}.tar.gz" 11 11 ]; 12 - sha256 ="03ylfr29g9zc0r6b6axz3i68alj5qmxgzknxwam3jlx0sz8hcb4f"; 12 + sha256 ="1rif2hjscq5mh639nsnjhb90c01gnmy1sbmj6x6hsn1xmpnj95r1"; 13 13 }; 14 14 15 15 nativeBuildInputs = stdenv.lib.optionals stdenv.isCygwin [ autoconf automake libtool ];
-2
pkgs/development/libraries/libinput/default.nix
··· 50 50 51 51 doCheck = testsSupport; 52 52 53 - checkPhase = "meson test"; 54 - 55 53 meta = { 56 54 description = "Handles input devices in Wayland compositors and provides a generic X.Org input driver"; 57 55 homepage = http://www.freedesktop.org/wiki/Software/libinput;
+2 -2
pkgs/development/python-modules/aniso8601/default.nix
··· 3 3 4 4 buildPythonPackage rec { 5 5 pname = "aniso8601"; 6 - version = "1.3.0"; 6 + version = "2.0.0"; 7 7 name = "${pname}-${version}"; 8 8 9 9 meta = with stdenv.lib; { ··· 16 16 17 17 src = fetchPypi { 18 18 inherit pname version; 19 - sha256 = "c3b5246f5601b6ae5671911bc4ee5b3e3fe94752e8afab5ce074d8b1232952f1"; 19 + sha256 = "085786415d3550e89785ffbedaa9bb37d41de0707a1268bdbba11249064b71d1"; 20 20 }; 21 21 }
+2 -2
pkgs/development/python-modules/argon2_cffi/default.nix
··· 10 10 11 11 buildPythonPackage rec { 12 12 pname = "argon2_cffi"; 13 - version = "16.3.0"; 13 + version = "18.1.0"; 14 14 name = "${pname}-${version}"; 15 15 16 16 src = fetchPypi { 17 17 inherit pname version; 18 - sha256 = "1ap3il3j1pjyprrhpfyhc21izpmhzhfb5s69vlzc65zvd1nj99cr"; 18 + sha256 = "7e4b75611b73f53012117ad21cdde7a17b32d1e99ff6799f22d827eb83a2a59b"; 19 19 }; 20 20 21 21 propagatedBuildInputs = [ cffi six ];
+2 -2
pkgs/development/python-modules/backports_lzma/default.nix
··· 8 8 9 9 buildPythonPackage rec { 10 10 pname = "backports.lzma"; 11 - version = "0.0.8"; 11 + version = "0.0.9"; 12 12 13 13 disabled = isPy3k; 14 14 15 15 src = fetchPypi { 16 16 inherit pname version; 17 - sha256 = "200584ad5079d8ca6b1bfe14890c7be58666ab0128d8ca26cfb2669b476085f3"; 17 + sha256 = "9ba5d94214a79900ee297a594b8e154cd8e4a54d26eb06243c0e2f3ad5286539"; 18 18 }; 19 19 20 20 buildInputs = [ lzma ];
+2 -2
pkgs/development/python-modules/bootstrapped-pip/default.nix
··· 9 9 }; 10 10 setuptools_source = fetchPypi { 11 11 pname = "setuptools"; 12 - version = "38.2.5"; 12 + version = "38.4.0"; 13 13 format = "wheel"; 14 - sha256 = "bcf0d4f3e2f7890e658db11e218b8643afffb905a0e2f2a7d5a6a3e949bb87e6"; 14 + sha256 = "155c2ec9fdcc00c3973d966b416e1cf3a1e7ce75f4c09fb760b23f94b935926e"; 15 15 }; 16 16 17 17 # TODO: Shouldn't be necessary anymore for pip > 9.0.1!
+6
pkgs/development/python-modules/cytoolz/default.nix
··· 23 23 checkInputs = [ nose ]; 24 24 propagatedBuildInputs = [ toolz ]; 25 25 26 + # File as accidentally included in release 27 + # See https://github.com/pytoolz/cytoolz/issues/116#issuecomment-355770073 28 + postPatch = '' 29 + rm cytoolz/tests/test_curried_doctests.py 30 + ''; 31 + 26 32 # Disable failing test https://github.com/pytoolz/cytoolz/issues/97 27 33 checkPhase = '' 28 34 NOSE_EXCLUDE=test_curried_exceptions nosetests -v $out/${python.sitePackages}
+2 -2
pkgs/development/python-modules/daphne/default.nix
··· 4 4 buildPythonPackage rec { 5 5 pname = "daphne"; 6 6 name = "${pname}-${version}"; 7 - version = "1.3.0"; 7 + version = "1.4.2"; 8 8 9 9 src = fetchPypi { 10 10 inherit pname version; 11 - sha256 = "1xmmjp21m1w88ljsgnkf6cbzw5nxamh9cfmfgzxffpn4cdmvn96i"; 11 + sha256 = "302725f223853b05688f28c361e050f8db9568b1ce27340c76272c26b49e6d72"; 12 12 }; 13 13 14 14 buildInputs = [ hypothesis ];
+16 -6
pkgs/development/python-modules/datashape/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 - , fetchPypi 3 + , fetchFromGitHub 4 4 , pytest 5 5 , mock 6 6 , numpy ··· 8 8 , dateutil 9 9 }: 10 10 11 - buildPythonPackage rec { 11 + let 12 + # Fetcher function looks similar to fetchPypi. 13 + # Allows for easier overriding, without having to know 14 + # how the source is actually fetched. 15 + fetcher = {pname, version, sha256}: fetchFromGitHub { 16 + owner = "blaze"; 17 + repo = pname; 18 + rev = version; 19 + inherit sha256; 20 + }; 21 + 22 + in buildPythonPackage rec { 12 23 pname = "datashape"; 13 - version = "0.5.2"; 14 - name = "${pname}-${version}"; 24 + version = "0.5.4"; 15 25 16 - src = fetchPypi { 26 + src = fetcher { 17 27 inherit pname version; 18 - sha256 = "2356ea690c3cf003c1468a243a9063144235de45b080b3652de4f3d44e57d783"; 28 + sha256 = "0rhlj2kjj1vx5m73wnc5518rd6cs1zsbgpsvzk893n516k69shcf"; 19 29 }; 20 30 21 31 checkInputs = [ pytest mock ];
+2 -2
pkgs/development/python-modules/dyn/default.nix
··· 3 3 4 4 buildPythonPackage rec { 5 5 pname = "dyn"; 6 - version = "1.8.0"; 6 + version = "1.8.1"; 7 7 name = "${pname}-${version}"; 8 8 9 9 src = fetchPypi { 10 10 inherit pname version; 11 - sha256 = "4ab3cd9a1478674cf2d2aa6740fb0ddf77daaa9ab3e35e5d2bc92f60301f8523"; 11 + sha256 = "e112149d48b4500c18b3cfb6e0e6e780bb5aa0e56ff87cac412280200b9ec8bf"; 12 12 }; 13 13 14 14 buildInputs = [ glibcLocales ];
+2 -2
pkgs/development/python-modules/filelock/default.nix
··· 2 2 3 3 buildPythonPackage rec { 4 4 pname = "filelock"; 5 - version = "2.0.14"; 5 + version = "3.0.0"; 6 6 7 7 src = fetchPypi { 8 8 inherit pname version; 9 - sha256 = "ee355eb66e4c2e5d95689e1253515aad5b3177c274abdd00a57d5ab1aa6d071a"; 9 + sha256 = "b3ad481724adfb2280773edd95ce501e497e88fa4489c6e41e637ab3fd9a456c"; 10 10 }; 11 11 12 12 meta = with stdenv.lib; {
+2 -2
pkgs/development/python-modules/grpcio/default.nix
··· 3 3 4 4 buildPythonPackage rec { 5 5 pname = "grpcio"; 6 - version = "1.8.2"; 6 + version = "1.8.3"; 7 7 8 8 src = fetchPypi { 9 9 inherit pname version; 10 - sha256 = "1ea1336f0d1158c4e00e96a94df84b75f6bbff9816abb6cc68cbdc9442a9ac55"; 10 + sha256 = "6ce5fd3093ddc09a152981d5c477ac645eda19dfcc819e45d8c57da6b743bd53"; 11 11 }; 12 12 13 13 propagatedBuildInputs = [ six protobuf ]
+2 -6
pkgs/development/python-modules/jupyter_client/default.nix
··· 15 15 16 16 buildPythonPackage rec { 17 17 pname = "jupyter_client"; 18 - version = "5.2.0"; 18 + version = "5.2.1"; 19 19 20 20 src = fetchPypi { 21 21 inherit pname version; 22 - sha256 = "ca30cf1786047925ebacd6f6faa3a993efaa004b584f7d83bc8b807f7cd3f6bb"; 22 + sha256 = "462790d46b244f0a631ea5e3cd5cdbad6874d5d24cc0ff512deb7c16cdf8653d"; 23 23 }; 24 24 25 25 checkInputs = [ ipykernel ipython mock pytest ]; ··· 28 28 checkPhase = '' 29 29 py.test 30 30 ''; 31 - 32 - patches = [ 33 - ./wheel_workaround.patch 34 - ]; 35 31 36 32 # Circular dependency with ipykernel 37 33 doCheck = false;
-13
pkgs/development/python-modules/jupyter_client/wheel_workaround.patch
··· 1 - diff --git a/setup.py b/setup.py 2 - index 95d4774..ee72cbc 100644 3 - --- a/setup.py 4 - +++ b/setup.py 5 - @@ -86,7 +86,7 @@ setup_args = dict( 6 - extras_require = { 7 - 'test': ['ipykernel', 'ipython', 'mock'], 8 - 'test:python_version == "3.3"': ['pytest<3.3.0'], 9 - - 'test:python_version >= "3.4" or python_version == "2.7"': ['pytest'], 10 - + 'test:(python_version >= "3.4" or python_version == "2.7")': ['pytest'], 11 - }, 12 - cmdclass = { 13 - 'bdist_egg': bdist_egg if 'bdist_egg' in sys.argv else bdist_egg_disabled,
+11 -6
pkgs/development/python-modules/pillow/default.nix
··· 1 - { stdenv, buildPythonPackage, fetchPypi, isPyPy, 2 - nose, olefile, 3 - freetype, libjpeg, zlib, libtiff, libwebp, tcl, lcms2, tk, libX11}: 1 + { stdenv, buildPythonPackage, fetchPypi, isPyPy 2 + , olefile 3 + , freetype, libjpeg, zlib, libtiff, libwebp, tcl, lcms2, tk, libX11 4 + , pytestrunner 5 + , pytest 6 + }: 4 7 buildPythonPackage rec { 5 8 pname = "Pillow"; 6 - version = "4.3.0"; 9 + version = "5.0.0"; 7 10 name = "${pname}-${version}"; 8 11 9 12 src = fetchPypi { 10 13 inherit pname version; 11 - sha256 = "a97c715d44efd5b4aa8d739b8fad88b93ed79f1b33fc2822d5802043f3b1b527"; 14 + sha256 = "12f29d6c23424f704c66b5b68c02fe0b571504459605cfe36ab8158359b0e1bb"; 12 15 }; 13 16 14 17 doCheck = !stdenv.isDarwin && !isPyPy; ··· 21 24 22 25 propagatedBuildInputs = [ olefile ]; 23 26 27 + checkInputs = [ pytest pytestrunner ]; 28 + 24 29 buildInputs = [ 25 - freetype libjpeg zlib libtiff libwebp tcl nose lcms2 ] 30 + freetype libjpeg zlib libtiff libwebp tcl lcms2 ] 26 31 ++ stdenv.lib.optionals (isPyPy) [ tk libX11 ]; 27 32 28 33 # NOTE: we use LCMS_ROOT as WEBP root since there is not other setting for webp.
+2 -2
pkgs/development/python-modules/psutil/default.nix
··· 7 7 8 8 buildPythonPackage rec { 9 9 pname = "psutil"; 10 - version = "5.4.2"; 10 + version = "5.4.3"; 11 11 name = "${pname}-${version}"; 12 12 13 13 src = fetchPypi { 14 14 inherit pname version; 15 - sha256 = "00a1f9ff8d1e035fba7bfdd6977fa8ea7937afdb4477339e5df3dba78194fe11"; 15 + sha256 = "e2467e9312c2fa191687b89ff4bc2ad8843be4af6fb4dc95a7cc5f7d7a327b18"; 16 16 }; 17 17 18 18 # No tests in archive
+2 -2
pkgs/development/python-modules/pwntools/default.nix
··· 5 5 , requests, tox, pandoc, unicorn, intervaltree }: 6 6 7 7 buildPythonPackage rec { 8 - version = "3.10.0"; 8 + version = "3.11.0"; 9 9 pname = "pwntools"; 10 10 name = pname + "-" + version; 11 11 12 12 src = fetchPypi { 13 13 inherit pname version; 14 - sha256 = "1l8hb30mwxqd1y7r5ihd7kzmjm2mz6m5aiphd3hwzmxkmxbxj8zk"; 14 + sha256 = "609b3f0ba47c975f4dbedd3da2af4c5ca1b3a2aa13fb99240531b6a68edb87be"; 15 15 }; 16 16 17 17 propagatedBuildInputs = [ Mako packaging pysocks pygments ROPGadget capstone paramiko pip psutil pyelftools pypandoc pyserial dateutil requests tox pandoc unicorn intervaltree ];
+2 -2
pkgs/development/python-modules/pytest/default.nix
··· 2 2 , setuptools_scm, setuptools, six, pluggy, funcsigs, isPy3k 3 3 }: 4 4 buildPythonPackage rec { 5 - version = "3.3.1"; 5 + version = "3.3.2"; 6 6 pname = "pytest"; 7 7 8 8 preCheck = '' ··· 12 12 13 13 src = fetchPypi { 14 14 inherit pname version; 15 - sha256 = "cf8436dc59d8695346fcd3ab296de46425ecab00d64096cebe79fb51ecb2eb93"; 15 + sha256 = "53548280ede7818f4dc2ad96608b9f08ae2cc2ca3874f2ceb6f97e3583f25bc4"; 16 16 }; 17 17 18 18 checkInputs = [ hypothesis ];
+2 -2
pkgs/development/python-modules/python-stdnum/default.nix
··· 1 1 { lib, fetchurl, buildPythonPackage, isPy3k }: 2 2 3 3 buildPythonPackage rec { 4 - version = "1.7"; 4 + version = "1.8.1"; 5 5 pname = "python-stdnum"; 6 6 name = "${pname}-${version}"; 7 7 # Failing tests and dependency issue on Py3k 8 8 disabled = isPy3k; 9 9 src = fetchurl { 10 10 url = "mirror://pypi/p/python-stdnum/${name}.tar.gz"; 11 - sha256 = "987c25e1047e8742131bcf29dac7a406987adb1463465749e2daaba8cb19d264"; 11 + sha256 = "d7162fdb29337aebed65700cc7297016f6cd32cae4ad7aed8f7e7531f0217943"; 12 12 }; 13 13 meta = { 14 14 homepage = http://arthurdejong.org/python-stdnum/;
+2 -2
pkgs/development/python-modules/ropper/default.nix
··· 8 8 9 9 buildPythonApplication rec { 10 10 pname = "ropper"; 11 - version = "1.11.2"; 11 + version = "1.11.3"; 12 12 13 13 src = fetchPypi { 14 14 inherit pname version; 15 - sha256 = "2183feedfe8b01a27301eee07383b481ece01b2319bdba3afebe33e19ca14aa3"; 15 + sha256 = "77d9b03083d0a098261a1d2856cd330ea3db520511a78472e421a00526aa220c"; 16 16 }; 17 17 # XXX tests rely on user-writeable /dev/shm to obtain process locks and return PermissionError otherwise 18 18 # workaround: sudo chmod 777 /dev/shm
+2 -2
pkgs/development/python-modules/setuptools/default.nix
··· 8 8 # Should use buildPythonPackage here somehow 9 9 stdenv.mkDerivation rec { 10 10 pname = "setuptools"; 11 - version = "38.2.5"; 11 + version = "38.4.0"; 12 12 name = "${python.libPrefix}-${pname}-${version}"; 13 13 14 14 src = fetchPypi { 15 15 inherit pname version; 16 16 extension = "zip"; 17 - sha256 = "b080f276cc868670540b2c03cee06cc14d2faf9da7bec0f15058d1b402c94507"; 17 + sha256 = "6501fc32f505ec5b3ed36ec65ba48f1b975f52cf2ea101c7b73a08583fd12f75"; 18 18 }; 19 19 20 20 buildInputs = [ python wrapPython unzip ];
+2 -2
pkgs/development/python-modules/sqlmap/default.nix
··· 5 5 6 6 buildPythonPackage rec { 7 7 pname = "sqlmap"; 8 - version = "1.1.12"; 8 + version = "1.2"; 9 9 name = "${pname}-${version}"; 10 10 11 11 src = fetchPypi { 12 12 inherit pname version; 13 - sha256 = "86a1078ceb1e79f891633c7e4c7b07949fd9135a0e4c0738abd5111e2e6b96c0"; 13 + sha256 = "18ac6392a710f0cc106c28c4e27e43e8f1b25cb46fb8b6714836212607c07b10"; 14 14 }; 15 15 16 16 # No tests in archive
+2 -2
pkgs/development/python-modules/texttable/default.nix
··· 5 5 6 6 buildPythonPackage rec { 7 7 pname = "texttable"; 8 - version = "1.1.1"; 8 + version = "1.2.1"; 9 9 10 10 src = fetchPypi { 11 11 inherit pname version; 12 - sha256 = "44674d1d470a9fc264c4d1eba44b74463ca0066d7b954453dd5a4f8057779c9c"; 12 + sha256 = "c89dc0148ae29645917aab7e970a30d1af565b3ca276cef8ab1a60469f0d8100"; 13 13 }; 14 14 15 15 meta = {
+2 -2
pkgs/development/python-modules/tornado/default.nix
··· 10 10 11 11 buildPythonPackage rec { 12 12 pname = "tornado"; 13 - version = "4.5.2"; 13 + version = "4.5.3"; 14 14 name = "${pname}-${version}"; 15 15 16 16 propagatedBuildInputs = [ backports_abc backports_ssl_match_hostname certifi singledispatch ]; ··· 23 23 24 24 src = fetchPypi { 25 25 inherit pname version; 26 - sha256 = "1fb8e494cd46c674d86fac5885a3ff87b0e283937a47d74eb3c02a48c9e89ad0"; 26 + sha256 = "6d14e47eab0e15799cf3cdcc86b0b98279da68522caace2bd7ce644287685f0a"; 27 27 }; 28 28 }
+2 -2
pkgs/development/python-modules/typeguard/default.nix
··· 9 9 buildPythonPackage rec { 10 10 name = "${pname}-${version}"; 11 11 pname = "typeguard"; 12 - version = "2.1.3"; 12 + version = "2.1.4"; 13 13 14 14 src = fetchPypi { 15 15 inherit pname version; 16 - sha256 = "0l3pih5ca469v7if255h5rqymirsw46bi6s7p885jxhq1gv6cfpk"; 16 + sha256 = "40b22d18d2215b76b3ddda2564acfbddfa6e702968637fbd969187c2a6fb99da"; 17 17 }; 18 18 19 19 buildInputs = [ setuptools_scm ];
+2 -2
pkgs/development/python-modules/unidecode/default.nix
··· 3 3 buildPythonPackage rec { 4 4 name = "${pname}-${version}"; 5 5 pname = "Unidecode"; 6 - version = "0.04.21"; 6 + version = "1.0.22"; 7 7 8 8 src = fetchPypi { 9 9 inherit pname version; 10 - sha256 = "0lfhp9c5xrbpjvbpr12ji52g1lx04404bzzdg6pvabhzisw6l2i8"; 10 + sha256 = "8c33dd588e0c9bc22a76eaa0c715a5434851f726131bd44a6c26471746efabf5"; 11 11 }; 12 12 13 13 LC_ALL="en_US.UTF-8";
+2 -2
pkgs/development/python-modules/zeep/default.nix
··· 25 25 26 26 let 27 27 pname = "zeep"; 28 - version = "2.4.0"; 28 + version = "2.5.0"; 29 29 in buildPythonPackage { 30 30 name = "${pname}-${version}"; 31 31 32 32 src = fetchPypi { 33 33 inherit pname version; 34 - sha256 = "8631e2735c5f2219eb18ca4f0615ae482455628518508f69c3690dbfb8238aee"; 34 + sha256 = "4f9db52c7d269813fc6251da4cb050869158858aeea75a055b4550f19e52ac84"; 35 35 }; 36 36 37 37 propagatedBuildInputs = [
+2 -4
pkgs/development/r-modules/default.nix
··· 3 3 { R, pkgs, overrides }: 4 4 5 5 let 6 - inherit (pkgs) fetchurl stdenv lib; 6 + inherit (pkgs) cacert fetchurl stdenv lib; 7 7 8 8 buildRPackage = pkgs.callPackage ./generic-builder.nix { 9 9 inherit R; ··· 912 912 }); 913 913 914 914 geojsonio = old.geojsonio.overrideDerivation (attrs: { 915 - preConfigure = '' 916 - export SSL_CERT_FILE=${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt 917 - ''; 915 + buildInputs = [ cacert ] ++ attrs.buildInputs; 918 916 }); 919 917 920 918 rstan = old.rstan.overrideDerivation (attrs: {
+1 -1
pkgs/development/tools/build-managers/cmake/setup-hook.sh
··· 43 43 # libraries are in a system path or in the same directory as the 44 44 # executable. This flag makes the shared library accessible from its 45 45 # nix/store directory. 46 - cmakeFlags="-DCMAKE_INSTALL_NAME_DIR=$prefix/lib $cmakeFlags" 46 + cmakeFlags="-DCMAKE_INSTALL_NAME_DIR=${!outputLib}/lib $cmakeFlags" 47 47 cmakeFlags="-DCMAKE_INSTALL_LIBDIR=${!outputLib}/lib $cmakeFlags" 48 48 cmakeFlags="-DCMAKE_INSTALL_INCLUDEDIR=${!outputDev}/include $cmakeFlags" 49 49
+12
pkgs/development/tools/build-managers/meson/setup-hook.sh
··· 25 25 setOutputFlags= 26 26 configurePhase=mesonConfigurePhase 27 27 fi 28 + 29 + mesonCheckPhase() { 30 + runHook preCheck 31 + 32 + meson test 33 + 34 + runHook postCheck 35 + } 36 + 37 + if [ -z "$dontUseMesonCheck" -a -z "$checkPhase" ]; then 38 + checkPhase=mesonCheckPhase 39 + fi
+7 -5
pkgs/os-specific/linux/apparmor/default.nix
··· 9 9 }: 10 10 11 11 let 12 - apparmor-series = "2.10"; 13 - apparmor-version = apparmor-series; 12 + 13 + apparmor-series = "2.12"; 14 + apparmor-patchver = "0"; 15 + apparmor-version = apparmor-series + "." + apparmor-patchver; 14 16 15 17 apparmor-meta = component: with stdenv.lib; { 16 18 homepage = http://apparmor.net/; ··· 21 23 }; 22 24 23 25 apparmor-sources = fetchurl { 24 - url = "https://launchpad.net/apparmor/${apparmor-series}/${apparmor-version}/+download/apparmor-${apparmor-version}.tar.gz"; 25 - sha256 = "1x06qmmbha9krx7880pxj2k3l8fxy3nm945xjjv735m2ax1243jd"; 26 + url = "https://launchpad.net/apparmor/${apparmor-series}/${apparmor-version}/+download/apparmor-${apparmor-series}.tar.gz"; 27 + sha256 = "0mm0mcp0w18si9wl15drndysm7v27az2942p1xjd197shg80qawa"; 26 28 }; 27 29 28 30 prePatchCommon = '' ··· 96 98 wrapProgram $out/bin/$prog --prefix PYTHONPATH : "$out/lib/${pythonPackages.python.libPrefix}/site-packages:$PYTHONPATH" 97 99 done 98 100 99 - for prog in aa-exec aa-notify ; do 101 + for prog in aa-notify ; do 100 102 wrapProgram $out/bin/$prog --prefix PERL5LIB : "${libapparmor}/lib/perl5:$PERL5LIB" 101 103 done 102 104 '';
+3 -3
pkgs/os-specific/linux/bluez/default.nix
··· 5 5 assert stdenv.isLinux; 6 6 7 7 stdenv.mkDerivation rec { 8 - name = "bluez-5.47"; 8 + name = "bluez-5.48"; 9 9 10 10 src = fetchurl { 11 11 url = "mirror://kernel/linux/bluetooth/${name}.tar.xz"; 12 - sha256 = "1j22hfjz0fp4pgclgz9mfcwjbr4wqgah3gd2qhfg4r6msmybyxfg"; 12 + sha256 = "140fjyxa2q4y35d9n52vki649jzb094pf71hxkkvlrpgf8q75a5r"; 13 13 }; 14 14 15 15 pythonPath = with pythonPackages; 16 - [ dbus pygobject2 pygobject3 recursivePthLoader ]; 16 + [ dbus-python pygobject2 pygobject3 recursivePthLoader ]; 17 17 18 18 buildInputs = [ 19 19 pkgconfig dbus glib alsaLib pythonPackages.python pythonPackages.wrapPython
+1 -2
pkgs/os-specific/linux/firmware/firmware-linux-nonfree/default.nix
··· 32 32 # traffic, so don't do that. 33 33 preferLocalBuild = true; 34 34 35 - nativeBuildInputs = [ git gnupg ]; 36 - NIX_SSL_CERT_FILE = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 35 + nativeBuildInputs = [ cacert git gnupg ]; 37 36 } '' 38 37 git init src && ( 39 38 cd src
+7 -6
pkgs/os-specific/linux/kernel/common-config.nix
··· 51 51 52 52 # Bump the maximum number of CPUs to support systems like EC2 x1.* 53 53 # instances and Xeon Phi. 54 - ${optionalString (stdenv.system == "x86_64-linux" || stdenv.system == "aarch64-linux") '' 54 + ${optionalString (stdenv.hostPlatform.system == "x86_64-linux" || stdenv.hostPlatform.system == "aarch64-linux") '' 55 55 NR_CPUS 384 56 56 ''} 57 57 ··· 347 347 SECURITY_SELINUX_BOOTPARAM_VALUE 0 # Disable SELinux by default 348 348 SECURITY_YAMA? y # Prevent processes from ptracing non-children processes 349 349 DEVKMEM n # Disable /dev/kmem 350 - ${if versionOlder version "3.14" then '' 351 - CC_STACKPROTECTOR? y # Detect buffer overflows on the stack 352 - '' else '' 353 - CC_STACKPROTECTOR_REGULAR? y 354 - ''} 350 + ${optionalString (! stdenv.hostPlatform.isArm) 351 + (if versionOlder version "3.14" then '' 352 + CC_STACKPROTECTOR? y # Detect buffer overflows on the stack 353 + '' else '' 354 + CC_STACKPROTECTOR_REGULAR? y 355 + '')} 355 356 ${optionalString (versionAtLeast version "3.12") '' 356 357 USER_NS y # Support for user namespaces 357 358 ''}
+16 -47
pkgs/os-specific/linux/kernel/generic.nix
··· 1 - { stdenv, perl, buildLinux 1 + { stdenv, buildPackages, perl, buildLinux 2 2 3 3 , # The kernel source tarball. 4 4 src ··· 23 23 # symbolic name and `patch' is the actual patch. The patch may 24 24 # optionally be compressed with gzip or bzip2. 25 25 kernelPatches ? [] 26 - , ignoreConfigErrors ? stdenv.platform.name != "pc" 26 + , ignoreConfigErrors ? hostPlatform.platform.name != "pc" || 27 + hostPlatform != stdenv.buildPlatform 27 28 , extraMeta ? {} 28 29 , hostPlatform 29 30 , ... ··· 43 44 netfilterRPFilter = true; 44 45 } // features) kernelPatches; 45 46 46 - configWithPlatform = kernelPlatform: import ./common-config.nix { 47 - inherit stdenv version kernelPlatform extraConfig; 47 + config = import ./common-config.nix { 48 + inherit stdenv version extraConfig; 49 + kernelPlatform = hostPlatform; 48 50 features = kernelFeatures; # Ensure we know of all extra patches, etc. 49 51 }; 50 - 51 - config = configWithPlatform stdenv.platform; 52 - configCross = configWithPlatform hostPlatform.platform; 53 52 54 53 kernelConfigFun = baseConfig: 55 54 let ··· 65 64 66 65 kernelConfig = kernelConfigFun config; 67 66 67 + depsBuildBuild = [ buildPackages.stdenv.cc ]; 68 68 nativeBuildInputs = [ perl ]; 69 69 70 - platformName = stdenv.platform.name; 71 - kernelBaseConfig = stdenv.platform.kernelBaseConfig; 72 - kernelTarget = stdenv.platform.kernelTarget; 73 - autoModules = stdenv.platform.kernelAutoModules; 74 - preferBuiltin = stdenv.platform.kernelPreferBuiltin or false; 75 - arch = stdenv.platform.kernelArch; 76 - 77 - crossAttrs = let 78 - cp = hostPlatform.platform; 79 - in { 80 - arch = cp.kernelArch; 81 - platformName = cp.name; 82 - kernelBaseConfig = cp.kernelBaseConfig; 83 - kernelTarget = cp.kernelTarget; 84 - autoModules = cp.kernelAutoModules; 85 - 86 - # Just ignore all options that don't apply (We are lazy). 87 - ignoreConfigErrors = true; 88 - 89 - kernelConfig = kernelConfigFun configCross; 90 - 91 - inherit (kernel.crossDrv) src patches preUnpack; 92 - }; 70 + platformName = hostPlatform.platform.name; 71 + kernelBaseConfig = hostPlatform.platform.kernelBaseConfig; 72 + kernelTarget = hostPlatform.platform.kernelTarget; 73 + autoModules = hostPlatform.platform.kernelAutoModules; 74 + preferBuiltin = hostPlatform.platform.kernelPreferBuiltin or false; 75 + arch = hostPlatform.platform.kernelArch; 93 76 94 77 prePatch = kernel.prePatch + '' 95 78 # Patch kconfig to print "###" after every question so that ··· 103 86 cd $buildRoot 104 87 105 88 # Get a basic config file for later refinement with $generateConfig. 106 - make -C ../$sourceRoot O=$PWD $kernelBaseConfig ARCH=$arch 89 + make HOSTCC=${buildPackages.stdenv.cc.targetPrefix}gcc -C ../$sourceRoot O=$PWD $kernelBaseConfig ARCH=$arch 107 90 108 91 # Create the config file. 109 92 echo "generating kernel configuration..." ··· 118 101 }; 119 102 120 103 kernel = buildLinux { 121 - inherit version modDirVersion src kernelPatches stdenv extraMeta; 122 - 123 - configfile = configfile.nativeDrv or configfile; 124 - 125 - crossConfigfile = configfile.crossDrv or configfile; 104 + inherit version modDirVersion src kernelPatches stdenv extraMeta configfile; 126 105 127 106 config = { CONFIG_MODULES = "y"; CONFIG_FW_LOADER = "m"; }; 128 - 129 - crossConfig = { CONFIG_MODULES = "y"; CONFIG_FW_LOADER = "m"; }; 130 107 }; 131 108 132 109 passthru = { ··· 134 111 passthru = kernel.passthru // (removeAttrs passthru [ "passthru" ]); 135 112 }; 136 113 137 - addPassthru' = lib.extendDerivation true passthru; 138 - 139 - nativeDrv = addPassthru' kernel.nativeDrv; 140 - 141 - crossDrv = addPassthru' kernel.crossDrv; 142 - 143 - in if kernel ? crossDrv 144 - then nativeDrv // { inherit nativeDrv crossDrv; } 145 - else addPassthru' kernel 114 + in lib.extendDerivation true passthru kernel
+1 -1
pkgs/os-specific/linux/kernel/linux-4.13.nix
··· 1 - { stdenv, hostPlatform, fetchurl, perl, buildLinux, ... } @ args: 1 + { stdenv, buildPackages, hostPlatform, fetchurl, perl, buildLinux, ... } @ args: 2 2 3 3 import ./generic.nix (args // rec { 4 4 version = "4.13.16";
+1 -1
pkgs/os-specific/linux/kernel/linux-4.14.nix
··· 1 - { stdenv, hostPlatform, fetchurl, perl, buildLinux, ... } @ args: 1 + { stdenv, buildPackages, hostPlatform, fetchurl, perl, buildLinux, ... } @ args: 2 2 3 3 with stdenv.lib; 4 4
+1 -1
pkgs/os-specific/linux/kernel/linux-4.4.nix
··· 1 - { stdenv, hostPlatform, fetchurl, perl, buildLinux, ... } @ args: 1 + { stdenv, buildPackages, hostPlatform, fetchurl, perl, buildLinux, ... } @ args: 2 2 3 3 import ./generic.nix (args // rec { 4 4 version = "4.4.111";
+1 -1
pkgs/os-specific/linux/kernel/linux-4.9.nix
··· 1 - { stdenv, hostPlatform, fetchurl, perl, buildLinux, ... } @ args: 1 + { stdenv, buildPackages, hostPlatform, fetchurl, perl, buildLinux, ... } @ args: 2 2 3 3 import ./generic.nix (args // rec { 4 4 version = "4.9.76";
+1 -1
pkgs/os-specific/linux/kernel/linux-beagleboard.nix
··· 1 - { stdenv, hostPlatform, fetchFromGitHub, perl, buildLinux, ... } @ args: 1 + { stdenv, buildPackages, hostPlatform, fetchFromGitHub, perl, buildLinux, ... } @ args: 2 2 3 3 let 4 4 modDirVersion = "4.9.61";
+1 -1
pkgs/os-specific/linux/kernel/linux-hardened-copperhead.nix
··· 1 - { stdenv, hostPlatform, fetchFromGitHub, perl, buildLinux, ... } @ args: 1 + { stdenv, buildPackages, hostPlatform, fetchFromGitHub, perl, buildLinux, ... } @ args: 2 2 3 3 with stdenv.lib; 4 4
+1 -1
pkgs/os-specific/linux/kernel/linux-mptcp.nix
··· 1 - { stdenv, hostPlatform, fetchFromGitHub, perl, buildLinux, ... } @ args: 1 + { stdenv, buildPackages, hostPlatform, fetchFromGitHub, perl, buildLinux, ... } @ args: 2 2 3 3 import ./generic.nix (rec { 4 4 mptcpVersion = "0.93";
+1 -1
pkgs/os-specific/linux/kernel/linux-rpi.nix
··· 1 - { stdenv, hostPlatform, fetchFromGitHub, perl, buildLinux, ... } @ args: 1 + { stdenv, buildPackages, hostPlatform, fetchFromGitHub, perl, buildLinux, ... } @ args: 2 2 3 3 let 4 4 modDirVersion = "4.9.59";
+1 -1
pkgs/os-specific/linux/kernel/linux-samus-4.12.nix
··· 1 - { stdenv, hostPlatform, fetchFromGitHub, perl, buildLinux, ncurses, ... } @ args: 1 + { stdenv, buildPackages, hostPlatform, fetchFromGitHub, perl, buildLinux, ncurses, ... } @ args: 2 2 3 3 import ./generic.nix (args // rec { 4 4 version = "4.12.2";
+1 -1
pkgs/os-specific/linux/kernel/linux-testing-bcachefs.nix
··· 1 - { stdenv, hostPlatform, fetchgit, perl, buildLinux, ... } @ args: 1 + { stdenv, buildPackages, hostPlatform, fetchgit, perl, buildLinux, ... } @ args: 2 2 3 3 import ./generic.nix (args // rec { 4 4 version = "4.11.2017.08.23";
+1 -1
pkgs/os-specific/linux/kernel/linux-testing.nix
··· 1 - { stdenv, hostPlatform, fetchurl, perl, buildLinux, libelf, utillinux, ... } @ args: 1 + { stdenv, buildPackages, hostPlatform, fetchurl, perl, buildLinux, libelf, utillinux, ... } @ args: 2 2 3 3 import ./generic.nix (args // rec { 4 4 version = "4.15-rc8";
+16 -32
pkgs/os-specific/linux/kernel/manual-config.nix
··· 1 - { runCommand, nettools, bc, perl, gmp, libmpc, mpfr, kmod, openssl 2 - , libelf ? null 3 - , utillinux ? null 1 + { buildPackages, runCommand, nettools, bc, perl, gmp, libmpc, mpfr, openssl 2 + , libelf 3 + , utillinux 4 4 , writeTextFile, ubootTools 5 5 , hostPlatform 6 6 }: ··· 26 26 src, 27 27 # Any patches 28 28 kernelPatches ? [], 29 - # Patches for native compiling only 30 - nativeKernelPatches ? [], 31 - # Patches for cross compiling only 32 - crossKernelPatches ? [], 33 - # The native kernel .config file 29 + # The kernel .config file 34 30 configfile, 35 - # The cross kernel .config file 36 - crossConfigfile ? configfile, 37 31 # Manually specified nixexpr representing the config 38 32 # If unspecified, this will be autodetected from the .config 39 33 config ? stdenv.lib.optionalAttrs allowImportFromDerivation (readConfig configfile), 40 - # Cross-compiling config 41 - crossConfig ? if allowImportFromDerivation then (readConfig crossConfigfile) else config, 42 34 # Use defaultMeta // extraMeta 43 35 extraMeta ? {}, 44 36 # Whether to utilize the controversial import-from-derivation feature to parse the config ··· 61 53 62 54 commonMakeFlags = [ 63 55 "O=$(buildRoot)" 64 - ] ++ stdenv.lib.optionals (stdenv.platform ? kernelMakeFlags) 65 - stdenv.platform.kernelMakeFlags; 56 + ] ++ stdenv.lib.optionals (hostPlatform.platform ? kernelMakeFlags) 57 + hostPlatform.platform.kernelMakeFlags; 66 58 67 59 drvAttrs = config_: platform: kernelPatches: configfile: 68 60 let ··· 105 97 echo "stripping FHS paths in \`$mf'..." 106 98 sed -i "$mf" -e 's|/usr/bin/||g ; s|/bin/||g ; s|/sbin/||g' 107 99 done 108 - sed -i Makefile -e 's|= depmod|= ${kmod}/bin/depmod|' 100 + sed -i Makefile -e 's|= depmod|= ${buildPackages.kmod}/bin/depmod|' 109 101 ''; 110 102 111 103 configurePhase = '' ··· 211 203 find -empty -type d -delete 212 204 213 205 # Remove reference to kmod 214 - sed -i Makefile -e 's|= ${kmod}/bin/depmod|= depmod|' 206 + sed -i Makefile -e 's|= ${buildPackages.kmod}/bin/depmod|= depmod|' 215 207 '' else optionalString installsFirmware '' 216 208 make firmware_install $makeFlags "''${makeFlagsArray[@]}" \ 217 209 $installFlags "''${installFlagsArray[@]}" ··· 239 231 240 232 assert stdenv.lib.versionAtLeast version "4.14" -> libelf != null; 241 233 assert stdenv.lib.versionAtLeast version "4.15" -> utillinux != null; 242 - stdenv.mkDerivation ((drvAttrs config stdenv.platform (kernelPatches ++ nativeKernelPatches) configfile) // { 234 + stdenv.mkDerivation ((drvAttrs config hostPlatform.platform kernelPatches configfile) // { 243 235 name = "linux-${version}"; 244 236 245 237 enableParallelBuilding = true; 246 238 239 + depsBuildBuild = [ buildPackages.stdenv.cc ]; 247 240 nativeBuildInputs = [ perl bc nettools openssl gmp libmpc mpfr ] 248 - ++ optional (stdenv.platform.kernelTarget == "uImage") ubootTools 241 + ++ optional (stdenv.hostPlatform.platform.kernelTarget == "uImage") buildPackages.ubootTools 249 242 ++ optional (stdenv.lib.versionAtLeast version "4.14") libelf 250 243 ++ optional (stdenv.lib.versionAtLeast version "4.15") utillinux 251 244 ; ··· 253 246 hardeningDisable = [ "bindnow" "format" "fortify" "stackprotector" "pic" ]; 254 247 255 248 makeFlags = commonMakeFlags ++ [ 256 - "ARCH=${stdenv.platform.kernelArch}" 249 + "HOSTCC=${buildPackages.stdenv.cc.targetPrefix}gcc" 250 + "ARCH=${stdenv.hostPlatform.platform.kernelArch}" 251 + ] ++ stdenv.lib.optional (stdenv.hostPlatform != stdenv.buildPlatform) [ 252 + "CROSS_COMPILE=${stdenv.cc.targetPrefix}" 257 253 ]; 258 254 259 - karch = stdenv.platform.kernelArch; 260 - 261 - crossAttrs = let cp = hostPlatform.platform; in 262 - (drvAttrs crossConfig cp (kernelPatches ++ crossKernelPatches) crossConfigfile) // { 263 - makeFlags = commonMakeFlags ++ [ 264 - "ARCH=${cp.kernelArch}" 265 - "CROSS_COMPILE=$(crossConfig)-" 266 - ]; 267 - 268 - karch = cp.kernelArch; 269 - 270 - nativeBuildInputs = optional (cp.kernelTarget == "uImage") ubootTools; 271 - }; 255 + karch = hostPlatform.platform.kernelArch; 272 256 })
+4 -14
pkgs/os-specific/linux/kernel/perf.nix
··· 1 1 { lib, stdenv, kernel, elfutils, python, perl, newt, slang, asciidoc, xmlto, makeWrapper 2 2 , docbook_xsl, docbook_xml_dtd_45, libxslt, flex, bison, pkgconfig, libunwind, binutils 3 - , libiberty, libaudit 3 + , libiberty, libaudit, libbfd 4 4 , zlib, withGtk ? false, gtk2 ? null }: 5 5 6 6 with lib; ··· 11 11 stdenv.mkDerivation { 12 12 name = "perf-linux-${kernel.version}"; 13 13 14 - inherit (kernel) src; 14 + inherit (kernel) src makeFlags; 15 15 16 16 preConfigure = '' 17 17 cd tools/perf ··· 21 21 ''; 22 22 23 23 # perf refers both to newt and slang 24 - # binutils is required for libbfd. 25 24 nativeBuildInputs = [ asciidoc xmlto docbook_xsl docbook_xml_dtd_45 libxslt 26 - flex bison libiberty libaudit makeWrapper pkgconfig ]; 27 - buildInputs = [ elfutils python perl newt slang libunwind binutils zlib ] ++ 25 + flex bison libiberty libaudit makeWrapper pkgconfig python perl ]; 26 + buildInputs = [ elfutils newt slang libunwind libbfd zlib ] ++ 28 27 stdenv.lib.optional withGtk gtk2; 29 28 30 29 # Note: we don't add elfutils to buildInputs, since it provides a ··· 46 45 wrapProgram $out/bin/perf \ 47 46 --prefix PATH : "${binutils}/bin" 48 47 ''; 49 - 50 - crossAttrs = { 51 - /* I don't want cross-python or cross-perl - 52 - I don't know if cross-python even works */ 53 - propagatedBuildInputs = [ elfutils.crossDrv newt.crossDrv ]; 54 - makeFlags = "CROSS_COMPILE=${stdenv.cc.targetPrefix}"; 55 - elfutils = elfutils.crossDrv; 56 - inherit (kernel.crossDrv) src patches; 57 - }; 58 48 59 49 meta = { 60 50 homepage = https://perf.wiki.kernel.org/;
+1 -1
pkgs/servers/x11/xorg/overrides.nix
··· 546 546 "--with-sha1=CommonCrypto" 547 547 ]; 548 548 preConfigure = '' 549 - ensureDir $out/Applications 549 + mkdir -p $out/Applications 550 550 export NIX_CFLAGS_COMPILE="$NIX_CFLAGS_COMPILE -Wno-error" 551 551 substituteInPlace hw/xquartz/pbproxy/Makefile.in --replace -F/System -F${args.apple_sdk.frameworks.ApplicationServices} 552 552 '';
+1 -1
pkgs/stdenv/darwin/default.nix
··· 375 375 xz.out xz.bin libcxx libcxxabi gmp.out gnumake findutils bzip2.out 376 376 bzip2.bin llvmPackages.llvm llvmPackages.llvm.lib zlib.out zlib.dev libffi.out coreutils ed diffutils gnutar 377 377 gzip ncurses.out ncurses.dev ncurses.man gnused bash gawk 378 - gnugrep llvmPackages.clang-unwrapped patch pcre.out gettext 378 + gnugrep llvmPackages.clang-unwrapped llvmPackages.clang-unwrapped.lib patch pcre.out gettext 379 379 binutils-raw.bintools binutils binutils.bintools 380 380 cc.expand-response-params 381 381 ]) ++ (with pkgs.darwin; [
-10
pkgs/stdenv/generic/setup.sh
··· 188 188 addToSearchPathWithCustomDelimiter "${PATH_DELIMITER}" "$@" 189 189 } 190 190 191 - 192 - ensureDir() { 193 - echo "warning: ‘ensureDir’ is deprecated; use ‘mkdir’ instead" >&2 194 - local dir 195 - for dir in "$@"; do 196 - if ! [ -x "$dir" ]; then mkdir -p "$dir"; fi 197 - done 198 - } 199 - 200 - 201 191 # Add $1/lib* into rpaths. 202 192 # The function is used in multiple-outputs.sh hook, 203 193 # so it is defined here but tried after the hook.
+2
pkgs/tools/archivers/sharutils/default.nix
··· 28 28 in '' 29 29 substituteInPlace tests/shar-1 --replace '${shar_sub}' '${shar_sub} -s submitter' 30 30 substituteInPlace tests/shar-2 --replace '${shar_sub}' '${shar_sub} -s submitter' 31 + 32 + substituteInPlace intl/Makefile.in --replace "AR = ar" "" 31 33 ''; 32 34 33 35 doCheck = true;
-4
pkgs/tools/compression/brotli/default.nix
··· 21 21 # and the wonderful bazel BUILD file is already there (yay case-insensitivity?) 22 22 prePatch = "rm BUILD"; 23 23 24 - preConfigure = stdenv.lib.optionalString stdenv.isDarwin '' 25 - cmakeFlagsArray+=("-DCMAKE_INSTALL_NAME_DIR=$lib/lib") 26 - ''; 27 - 28 24 meta = with stdenv.lib; { 29 25 inherit (src.meta) homepage; 30 26
+2 -2
pkgs/tools/filesystems/e2fsprogs/default.nix
··· 1 1 { stdenv, fetchurl, pkgconfig, libuuid, gettext, texinfo }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "e2fsprogs-1.43.7"; 4 + name = "e2fsprogs-1.43.8"; 5 5 6 6 src = fetchurl { 7 7 url = "mirror://sourceforge/e2fsprogs/${name}.tar.gz"; 8 - sha256 = "1i51w5l45zhz3i98k92xbbvkqklvjrvw3zvqky3gk9cdmqp5y0w7"; 8 + sha256 = "1pn33rap3lcjm3gx07pmgyhx4j634gja63phmi4g5dq8yj0z8ciz"; 9 9 }; 10 10 11 11 outputs = [ "bin" "dev" "out" "man" "info" ];
+2 -2
pkgs/tools/networking/bud/default.nix
··· 14 14 buildInputs = [ 15 15 python gyp 16 16 ] ++ lib.optional stdenv.isLinux utillinux; 17 - 17 + 18 18 buildPhase = '' 19 19 python ./gyp_bud -f make 20 20 make -C out 21 21 ''; 22 22 23 23 installPhase = '' 24 - ensureDir $out/bin 24 + mkdir -p $out/bin 25 25 cp out/Release/bud $out/bin 26 26 ''; 27 27
+1 -1
pkgs/top-level/all-packages.nix
··· 10275 10275 10276 10276 ncurses5 = callPackage ../development/libraries/ncurses { abiVersion = "5"; }; 10277 10277 ncurses6 = callPackage ../development/libraries/ncurses { abiVersion = "6"; }; 10278 - ncurses = if stdenv.isDarwin then ncurses5 else ncurses6; 10278 + ncurses = ncurses6; 10279 10279 10280 10280 neardal = callPackage ../development/libraries/neardal { }; 10281 10281