lol

Merge commit '2e56ba' from staging into master

+230 -304
+1 -1
pkgs/applications/misc/gnuradio/default.nix
··· 63 addGRCBlocksPath() { 64 addToSearchPath GRC_BLOCKS_PATH $1/share/gnuradio/grc/blocks 65 } 66 - envHooks+=(addGRCBlocksPath) 67 ''; 68 69 setupHook = [ grcSetupHook ];
··· 63 addGRCBlocksPath() { 64 addToSearchPath GRC_BLOCKS_PATH $1/share/gnuradio/grc/blocks 65 } 66 + addEnvHooks "$targetOffset" addGRCBlocksPath 67 ''; 68 69 setupHook = [ grcSetupHook ];
-1
pkgs/applications/video/gnome-mpv/default.nix
··· 26 ''; 27 28 doCheck = true; 29 - checkPhase = "meson test"; 30 31 meta = with stdenv.lib; { 32 description = "Simple GTK+ frontend for the mpv video player";
··· 26 ''; 27 28 doCheck = true; 29 30 meta = with stdenv.lib; { 31 description = "Simple GTK+ frontend for the mpv video player";
+1 -2
pkgs/build-support/fetchbower/default.nix
··· 11 12 fetchbower = name: version: target: outputHash: stdenvNoCC.mkDerivation { 13 name = "${cleanName name}-${bowerVersion version}"; 14 - SSL_CERT_FILE = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 15 buildCommand = '' 16 fetch-bower --quiet --out=$PWD/out "${name}" "${target}" "${version}" 17 # In some cases, the result of fetchBower is different depending ··· 23 outputHashMode = "recursive"; 24 outputHashAlgo = "sha256"; 25 inherit outputHash; 26 - nativeBuildInputs = [ bower2nix ]; 27 }; 28 29 in fetchbower
··· 11 12 fetchbower = name: version: target: outputHash: stdenvNoCC.mkDerivation { 13 name = "${cleanName name}-${bowerVersion version}"; 14 buildCommand = '' 15 fetch-bower --quiet --out=$PWD/out "${name}" "${target}" "${version}" 16 # In some cases, the result of fetchBower is different depending ··· 22 outputHashMode = "recursive"; 23 outputHashAlgo = "sha256"; 24 inherit outputHash; 25 + nativeBuildInputs = [ bower2nix cacert ]; 26 }; 27 28 in fetchbower
+1 -2
pkgs/build-support/fetchdarcs/default.nix
··· 7 else 8 stdenvNoCC.mkDerivation { 9 name = "fetchdarcs"; 10 - NIX_SSL_CERT_FILE = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 11 builder = ./builder.sh; 12 - nativeBuildInputs = [darcs]; 13 14 outputHashAlgo = "sha256"; 15 outputHashMode = "recursive";
··· 7 else 8 stdenvNoCC.mkDerivation { 9 name = "fetchdarcs"; 10 builder = ./builder.sh; 11 + nativeBuildInputs = [cacert darcs]; 12 13 outputHashAlgo = "sha256"; 14 outputHashMode = "recursive";
+1 -3
pkgs/build-support/fetchgx/default.nix
··· 6 name = "${name}-gxdeps"; 7 inherit src; 8 9 - nativeBuildInputs = [ go gx gx-go ]; 10 11 outputHashAlgo = "sha256"; 12 outputHashMode = "recursive"; 13 outputHash = sha256; 14 15 phases = [ "unpackPhase" "buildPhase" "installPhase" ]; 16 - 17 - NIX_SSL_CERT_FILE = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 18 19 buildPhase = '' 20 export GOPATH=$(pwd)/vendor
··· 6 name = "${name}-gxdeps"; 7 inherit src; 8 9 + nativeBuildInputs = [ cacert go gx gx-go ]; 10 11 outputHashAlgo = "sha256"; 12 outputHashMode = "recursive"; 13 outputHash = sha256; 14 15 phases = [ "unpackPhase" "buildPhase" "installPhase" ]; 16 17 buildPhase = '' 18 export GOPATH=$(pwd)/vendor
+1 -2
pkgs/build-support/rust/default.nix
··· 32 33 patchRegistryDeps = ./patch-registry-deps; 34 35 - buildInputs = [ git rust.cargo rust.rustc ] ++ buildInputs; 36 37 configurePhase = args.configurePhase or '' 38 runHook preConfigure ··· 60 unset cargoDepsCopy 61 62 export RUST_LOG=${logLevel} 63 - export SSL_CERT_FILE=${cacert}/etc/ssl/certs/ca-bundle.crt 64 '' + (args.postUnpack or ""); 65 66 buildPhase = with builtins; args.buildPhase or ''
··· 32 33 patchRegistryDeps = ./patch-registry-deps; 34 35 + buildInputs = [ cacert git rust.cargo rust.rustc ] ++ buildInputs; 36 37 configurePhase = args.configurePhase or '' 38 runHook preConfigure ··· 60 unset cargoDepsCopy 61 62 export RUST_LOG=${logLevel} 63 '' + (args.postUnpack or ""); 64 65 buildPhase = with builtins; args.buildPhase or ''
-1
pkgs/build-support/rust/fetchcargo.nix
··· 19 exit 1 20 fi 21 22 - export SSL_CERT_FILE=${cacert}/etc/ssl/certs/ca-bundle.crt 23 export CARGO_HOME=$(mktemp -d cargo-home.XXX) 24 25 cargo vendor
··· 19 exit 1 20 fi 21 22 export CARGO_HOME=$(mktemp -d cargo-home.XXX) 23 24 cargo vendor
+2
pkgs/data/misc/cacert/default.nix
··· 52 cp -v ca-bundle.crt $out/etc/ssl/certs 53 ''; 54 55 meta = { 56 homepage = https://curl.haxx.se/docs/caextract.html; 57 description = "A bundle of X.509 certificates of public Certificate Authorities (CA)";
··· 52 cp -v ca-bundle.crt $out/etc/ssl/certs 53 ''; 54 55 + setupHook = ./setup-hook.sh; 56 + 57 meta = { 58 homepage = https://curl.haxx.se/docs/caextract.html; 59 description = "A bundle of X.509 certificates of public Certificate Authorities (CA)";
+5
pkgs/data/misc/cacert/setup-hook.sh
···
··· 1 + cacertHook() { 2 + export SSL_CERT_FILE=@out@/etc/ssl/certs/ca-bundle.crt 3 + } 4 + 5 + addEnvHooks "$targetOffset" cacertHook
+2 -2
pkgs/data/misc/iana-etc/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 name = "iana-etc-${version}"; 5 - version = "20171106"; 6 7 src = fetchurl { 8 url = "https://github.com/Mic92/iana-etc/releases/download/${version}/iana-etc-${version}.tar.gz"; 9 - sha256 = "0pbmq95gdkp66cljwklv4gzh8lvl30l4k77hfwvrxz5mfqia6qdd"; 10 }; 11 12 installPhase = ''
··· 2 3 stdenv.mkDerivation rec { 4 name = "iana-etc-${version}"; 5 + version = "20180108"; 6 7 src = fetchurl { 8 url = "https://github.com/Mic92/iana-etc/releases/download/${version}/iana-etc-${version}.tar.gz"; 9 + sha256 = "1x4jacrvjwcsan88rg2wf2a8bajsglg6w4396vbr18zh0sya84a2"; 10 }; 11 12 installPhase = ''
+1 -2
pkgs/data/misc/tzdata/tzdata-setup-hook.sh
··· 2 export TZDIR=@out@/share/zoneinfo 3 } 4 5 - envHooks+=(tzdataHook) 6 - crossEnvHooks+=(tzdataHook)
··· 2 export TZDIR=@out@/share/zoneinfo 3 } 4 5 + addEnvHooks "$targetOffset" tzdataHook
-1
pkgs/desktops/gnome-3/apps/bijiben/default.nix
··· 8 inherit (import ./src.nix fetchurl) name src; 9 10 doCheck = true; 11 - checkPhase = "meson test"; 12 13 patches = [ 14 ./no-update-icon-cache.patch
··· 8 inherit (import ./src.nix fetchurl) name src; 9 10 doCheck = true; 11 12 patches = [ 13 ./no-update-icon-cache.patch
-2
pkgs/desktops/gnome-3/apps/gnome-clocks/default.nix
··· 18 19 prePatch = "patchShebangs build-aux/"; 20 21 - checkPhase = "meson test"; 22 - 23 meta = with stdenv.lib; { 24 homepage = https://wiki.gnome.org/Apps/Clocks; 25 description = "Clock application designed for GNOME 3";
··· 18 19 prePatch = "patchShebangs build-aux/"; 20 21 meta = with stdenv.lib; { 22 homepage = https://wiki.gnome.org/Apps/Clocks; 23 description = "Clock application designed for GNOME 3";
+2 -4
pkgs/desktops/gnome-3/apps/nautilus-sendto/default.nix
··· 1 - { stdenv, fetchurl, meson, ninja, glib, pkgconfig, gnome3, appstream-glib 2 - , gettext, gobjectIntrospection 3 - }: 4 5 stdenv.mkDerivation rec { 6 name = "nautilus-sendto-${version}"; ··· 12 sha256 = "164d7c6e8bae29c4579bcc67a7bf50d783662b1545b62f3008e7ea3c0410e04d"; 13 }; 14 15 - nativeBuildInputs = [ meson ninja pkgconfig appstream-glib gettext gobjectIntrospection ]; 16 buildInputs = [ glib ]; 17 18 meta = with stdenv.lib; {
··· 1 + { stdenv, fetchurl, meson, ninja, glib, pkgconfig, gnome3, appstream-glib, gettext }: 2 3 stdenv.mkDerivation rec { 4 name = "nautilus-sendto-${version}"; ··· 10 sha256 = "164d7c6e8bae29c4579bcc67a7bf50d783662b1545b62f3008e7ea3c0410e04d"; 11 }; 12 13 + nativeBuildInputs = [ meson ninja pkgconfig appstream-glib gettext ]; 14 buildInputs = [ glib ]; 15 16 meta = with stdenv.lib; {
-2
pkgs/desktops/gnome-3/core/gnome-dictionary/default.nix
··· 14 desktop_file_utils appstream-glib libxslt docbook_xsl docbook_xml_dtd_43]; 15 buildInputs = [ gtk glib gnome3.gsettings_desktop_schemas ]; 16 17 - checkPhase = "meson test"; 18 - 19 meta = with stdenv.lib; { 20 homepage = https://wiki.gnome.org/Apps/Dictionary; 21 description = "Dictionary is the GNOME application to look up definitions";
··· 14 desktop_file_utils appstream-glib libxslt docbook_xsl docbook_xml_dtd_43]; 15 buildInputs = [ gtk glib gnome3.gsettings_desktop_schemas ]; 16 17 meta = with stdenv.lib; { 18 homepage = https://wiki.gnome.org/Apps/Dictionary; 19 description = "Dictionary is the GNOME application to look up definitions";
-2
pkgs/desktops/gnome-3/core/gnome-font-viewer/default.nix
··· 7 8 doCheck = true; 9 10 - checkPhase = "meson test"; 11 - 12 nativeBuildInputs = [ meson ninja pkgconfig gettext wrapGAppsHook libxml2 ]; 13 buildInputs = [ gtk3 glib gnome3.gnome_desktop gnome3.defaultIconTheme ]; 14
··· 7 8 doCheck = true; 9 10 nativeBuildInputs = [ meson ninja pkgconfig gettext wrapGAppsHook libxml2 ]; 11 buildInputs = [ gtk3 glib gnome3.gnome_desktop gnome3.defaultIconTheme ]; 12
+2 -6
pkgs/desktops/gnome-3/core/gnome-screenshot/default.nix
··· 1 { stdenv, gettext, libxml2, fetchurl, pkgconfig, libcanberra_gtk3 2 , bash, gtk3, glib, meson, ninja, wrapGAppsHook, appstream-glib 3 - , gnome3, librsvg, gdk_pixbuf, gobjectIntrospection }: 4 5 stdenv.mkDerivation rec { 6 inherit (import ./src.nix fetchurl) name src; 7 8 doCheck = true; 9 10 - checkPhase = "meson test"; 11 - 12 - 13 postPatch = '' 14 chmod +x build-aux/postinstall.py # patchShebangs requires executable file 15 patchShebangs build-aux/postinstall.py ··· 18 propagatedUserEnvPkgs = [ gnome3.gnome_themes_standard ]; 19 propagatedBuildInputs = [ gdk_pixbuf gnome3.defaultIconTheme librsvg ]; 20 21 - nativeBuildInputs = [ meson ninja pkgconfig gettext appstream-glib libxml2 22 - wrapGAppsHook gobjectIntrospection ]; 23 buildInputs = [ bash gtk3 glib libcanberra_gtk3 24 gnome3.gsettings_desktop_schemas ]; 25
··· 1 { stdenv, gettext, libxml2, fetchurl, pkgconfig, libcanberra_gtk3 2 , bash, gtk3, glib, meson, ninja, wrapGAppsHook, appstream-glib 3 + , gnome3, librsvg, gdk_pixbuf }: 4 5 stdenv.mkDerivation rec { 6 inherit (import ./src.nix fetchurl) name src; 7 8 doCheck = true; 9 10 postPatch = '' 11 chmod +x build-aux/postinstall.py # patchShebangs requires executable file 12 patchShebangs build-aux/postinstall.py ··· 15 propagatedUserEnvPkgs = [ gnome3.gnome_themes_standard ]; 16 propagatedBuildInputs = [ gdk_pixbuf gnome3.defaultIconTheme librsvg ]; 17 18 + nativeBuildInputs = [ meson ninja pkgconfig gettext appstream-glib libxml2 wrapGAppsHook ]; 19 buildInputs = [ bash gtk3 glib libcanberra_gtk3 20 gnome3.gsettings_desktop_schemas ]; 21
-2
pkgs/desktops/gnome-3/core/libgepub/default.nix
··· 11 12 doCheck = true; 13 14 - checkPhase = "meson test"; 15 - 16 nativeBuildInputs = [ meson ninja pkgconfig gobjectIntrospection ]; 17 buildInputs = [ glib webkitgtk libsoup libxml2 libarchive ]; 18
··· 11 12 doCheck = true; 13 14 nativeBuildInputs = [ meson ninja pkgconfig gobjectIntrospection ]; 15 buildInputs = [ glib webkitgtk libsoup libxml2 libarchive ]; 16
-2
pkgs/desktops/gnome-3/core/simple-scan/default.nix
··· 39 40 doCheck = true; 41 42 - checkPhase = "meson test"; 43 - 44 meta = with stdenv.lib; { 45 description = "Simple scanning utility"; 46 longDescription = ''
··· 39 40 doCheck = true; 41 42 meta = with stdenv.lib; { 43 description = "Simple scanning utility"; 44 longDescription = ''
-2
pkgs/desktops/gnome-3/core/totem/default.nix
··· 27 28 propagatedBuildInputs = [ gobjectIntrospection python3Packages.pylint python3Packages.pygobject2 ]; 29 30 - checkPhase = "meson test"; 31 - 32 patches = [ 33 (fetchurl { 34 name = "remove-pycompile.patch";
··· 27 28 propagatedBuildInputs = [ gobjectIntrospection python3Packages.pylint python3Packages.pygobject2 ]; 29 30 patches = [ 31 (fetchurl { 32 name = "remove-pycompile.patch";
+1 -3
pkgs/development/compilers/go/1.7.nix
··· 35 36 # perl is used for testing go vet 37 nativeBuildInputs = [ perl which pkgconfig patch ]; 38 - buildInputs = [ pcre ]; 39 propagatedBuildInputs = optionals stdenv.isDarwin [ Security Foundation ]; 40 41 hardeningDisable = [ "all" ]; ··· 115 sha256 = "1ny5l3f8a9dpjjrnjnsplb66308a0x13sa0wwr4j6yrkc8j4qxqi"; 116 }) 117 ]; 118 - 119 - NIX_SSL_CERT_FILE = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 120 121 GOOS = if stdenv.isDarwin then "darwin" else "linux"; 122 GOARCH = if stdenv.isDarwin then "amd64"
··· 35 36 # perl is used for testing go vet 37 nativeBuildInputs = [ perl which pkgconfig patch ]; 38 + buildInputs = [ cacert pcre ]; 39 propagatedBuildInputs = optionals stdenv.isDarwin [ Security Foundation ]; 40 41 hardeningDisable = [ "all" ]; ··· 115 sha256 = "1ny5l3f8a9dpjjrnjnsplb66308a0x13sa0wwr4j6yrkc8j4qxqi"; 116 }) 117 ]; 118 119 GOOS = if stdenv.isDarwin then "darwin" else "linux"; 120 GOARCH = if stdenv.isDarwin then "amd64"
+1 -3
pkgs/development/compilers/go/1.8.nix
··· 37 # perl is used for testing go vet 38 nativeBuildInputs = [ perl which pkgconfig patch makeWrapper ] 39 ++ optionals stdenv.isLinux [ procps ]; 40 - buildInputs = [ pcre ] 41 ++ optionals stdenv.isLinux [ stdenv.glibc.out stdenv.glibc.static ]; 42 propagatedBuildInputs = optionals stdenv.isDarwin [ Security Foundation ]; 43 ··· 121 echo "substitute hardcoded dsymutil with ${llvm}/bin/llvm-dsymutil" 122 substituteInPlace "src/cmd/link/internal/ld/lib.go" --replace dsymutil ${llvm}/bin/llvm-dsymutil 123 ''; 124 - 125 - NIX_SSL_CERT_FILE = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 126 127 GOOS = if stdenv.isDarwin then "darwin" else "linux"; 128 GOARCH = if stdenv.isDarwin then "amd64"
··· 37 # perl is used for testing go vet 38 nativeBuildInputs = [ perl which pkgconfig patch makeWrapper ] 39 ++ optionals stdenv.isLinux [ procps ]; 40 + buildInputs = [ cacert pcre ] 41 ++ optionals stdenv.isLinux [ stdenv.glibc.out stdenv.glibc.static ]; 42 propagatedBuildInputs = optionals stdenv.isDarwin [ Security Foundation ]; 43 ··· 121 echo "substitute hardcoded dsymutil with ${llvm}/bin/llvm-dsymutil" 122 substituteInPlace "src/cmd/link/internal/ld/lib.go" --replace dsymutil ${llvm}/bin/llvm-dsymutil 123 ''; 124 125 GOOS = if stdenv.isDarwin then "darwin" else "linux"; 126 GOARCH = if stdenv.isDarwin then "amd64"
+1 -3
pkgs/development/compilers/go/1.9.nix
··· 37 # perl is used for testing go vet 38 nativeBuildInputs = [ perl which pkgconfig patch makeWrapper ] 39 ++ optionals stdenv.isLinux [ procps ]; 40 - buildInputs = [ pcre ] 41 ++ optionals stdenv.isLinux [ stdenv.glibc.out stdenv.glibc.static ]; 42 propagatedBuildInputs = optionals stdenv.isDarwin [ Security Foundation ]; 43 ··· 127 echo "substitute hardcoded dsymutil with ${llvm}/bin/llvm-dsymutil" 128 substituteInPlace "src/cmd/link/internal/ld/lib.go" --replace dsymutil ${llvm}/bin/llvm-dsymutil 129 ''; 130 - 131 - NIX_SSL_CERT_FILE = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 132 133 GOOS = if stdenv.isDarwin then "darwin" else "linux"; 134 GOARCH = if stdenv.isDarwin then "amd64"
··· 37 # perl is used for testing go vet 38 nativeBuildInputs = [ perl which pkgconfig patch makeWrapper ] 39 ++ optionals stdenv.isLinux [ procps ]; 40 + buildInputs = [ cacert pcre ] 41 ++ optionals stdenv.isLinux [ stdenv.glibc.out stdenv.glibc.static ]; 42 propagatedBuildInputs = optionals stdenv.isDarwin [ Security Foundation ]; 43 ··· 127 echo "substitute hardcoded dsymutil with ${llvm}/bin/llvm-dsymutil" 128 substituteInPlace "src/cmd/link/internal/ld/lib.go" --replace dsymutil ${llvm}/bin/llvm-dsymutil 129 ''; 130 131 GOOS = if stdenv.isDarwin then "darwin" else "linux"; 132 GOARCH = if stdenv.isDarwin then "amd64"
+4 -2
pkgs/development/compilers/llvm/3.8/clang/default.nix
··· 29 sed -i -e 's/DriverArgs.hasArg(options::OPT_nostdlibinc)/true/' lib/Driver/ToolChains.cpp 30 ''; 31 32 - outputs = [ "out" "python" ]; 33 34 # Clang expects to find LLVMgold in its own prefix 35 # Clang expects to find sanitizer libraries in its own prefix ··· 37 ln -sv ${llvm}/lib/LLVMgold.so $out/lib 38 ln -sv ${llvm}/lib/clang/${version}/lib $out/lib/clang/${version}/ 39 ln -sv $out/bin/clang $out/bin/cpp 40 41 mkdir -p $python/bin $python/share/clang/ 42 mv $out/bin/{git-clang-format,scan-view} $python/bin ··· 51 enableParallelBuilding = true; 52 53 passthru = { 54 - lib = self; # compatibility with gcc, so that `stdenv.cc.cc.lib` works on both 55 isClang = true; 56 inherit llvm; 57 } // stdenv.lib.optionalAttrs stdenv.isLinux {
··· 29 sed -i -e 's/DriverArgs.hasArg(options::OPT_nostdlibinc)/true/' lib/Driver/ToolChains.cpp 30 ''; 31 32 + outputs = [ "out" "lib" "python" ]; 33 34 # Clang expects to find LLVMgold in its own prefix 35 # Clang expects to find sanitizer libraries in its own prefix ··· 37 ln -sv ${llvm}/lib/LLVMgold.so $out/lib 38 ln -sv ${llvm}/lib/clang/${version}/lib $out/lib/clang/${version}/ 39 ln -sv $out/bin/clang $out/bin/cpp 40 + 41 + # Move libclang to 'lib' output 42 + moveToOutput "lib/libclang.*" "$lib" 43 44 mkdir -p $python/bin $python/share/clang/ 45 mv $out/bin/{git-clang-format,scan-view} $python/bin ··· 54 enableParallelBuilding = true; 55 56 passthru = { 57 isClang = true; 58 inherit llvm; 59 } // stdenv.lib.optionalAttrs stdenv.isLinux {
+2
pkgs/development/compilers/llvm/3.8/default.nix
··· 22 inherit clang-tools-extra_src stdenv; 23 }; 24 25 clang = if stdenv.cc.isGNU then self.libstdcxxClang else self.libcxxClang; 26 27 libstdcxxClang = ccWrapperFun {
··· 22 inherit clang-tools-extra_src stdenv; 23 }; 24 25 + libclang = self.clang-unwrapped.lib; 26 + 27 clang = if stdenv.cc.isGNU then self.libstdcxxClang else self.libcxxClang; 28 29 libstdcxxClang = ccWrapperFun {
+4 -2
pkgs/development/compilers/llvm/3.9/clang/default.nix
··· 31 sed -i -e 's/DriverArgs.hasArg(options::OPT_nostdlibinc)/true/' lib/Driver/ToolChains.cpp 32 ''; 33 34 - outputs = [ "out" "python" ]; 35 36 # Clang expects to find LLVMgold in its own prefix 37 # Clang expects to find sanitizer libraries in its own prefix ··· 39 ln -sv ${llvm}/lib/LLVMgold.so $out/lib 40 ln -sv ${llvm}/lib/clang/${version}/lib $out/lib/clang/${version}/ 41 ln -sv $out/bin/clang $out/bin/cpp 42 43 mkdir -p $python/bin $python/share/clang/ 44 mv $out/bin/{git-clang-format,scan-view} $python/bin ··· 53 enableParallelBuilding = true; 54 55 passthru = { 56 - lib = self; # compatibility with gcc, so that `stdenv.cc.cc.lib` works on both 57 isClang = true; 58 inherit llvm; 59 } // stdenv.lib.optionalAttrs stdenv.isLinux {
··· 31 sed -i -e 's/DriverArgs.hasArg(options::OPT_nostdlibinc)/true/' lib/Driver/ToolChains.cpp 32 ''; 33 34 + outputs = [ "out" "lib" "python" ]; 35 36 # Clang expects to find LLVMgold in its own prefix 37 # Clang expects to find sanitizer libraries in its own prefix ··· 39 ln -sv ${llvm}/lib/LLVMgold.so $out/lib 40 ln -sv ${llvm}/lib/clang/${version}/lib $out/lib/clang/${version}/ 41 ln -sv $out/bin/clang $out/bin/cpp 42 + 43 + # Move libclang to 'lib' output 44 + moveToOutput "lib/libclang.*" "$lib" 45 46 mkdir -p $python/bin $python/share/clang/ 47 mv $out/bin/{git-clang-format,scan-view} $python/bin ··· 56 enableParallelBuilding = true; 57 58 passthru = { 59 isClang = true; 60 inherit llvm; 61 } // stdenv.lib.optionalAttrs stdenv.isLinux {
+2
pkgs/development/compilers/llvm/3.9/default.nix
··· 22 inherit clang-tools-extra_src stdenv; 23 }; 24 25 clang = if stdenv.cc.isGNU then self.libstdcxxClang else self.libcxxClang; 26 27 libstdcxxClang = ccWrapperFun {
··· 22 inherit clang-tools-extra_src stdenv; 23 }; 24 25 + libclang = self.clang-unwrapped.lib; 26 + 27 clang = if stdenv.cc.isGNU then self.libstdcxxClang else self.libcxxClang; 28 29 libstdcxxClang = ccWrapperFun {
+4 -3
pkgs/development/compilers/llvm/4/clang/default.nix
··· 49 sed -i '1s,^,find_package(Sphinx REQUIRED)\n,' docs/CMakeLists.txt 50 ''; 51 52 - outputs = [ "out" "python" ] 53 ++ stdenv.lib.optional enableManpages "man"; 54 55 # Clang expects to find LLVMgold in its own prefix ··· 59 ln -sv ${llvm}/lib/clang/${release_version}/lib $out/lib/clang/${release_version}/ 60 ln -sv $out/bin/clang $out/bin/cpp 61 62 mkdir -p $python/bin $python/share/clang/ 63 mv $out/bin/{git-clang-format,scan-view} $python/bin 64 if [ -e $out/bin/set-xcode-analyzer ]; then 65 mv $out/bin/set-xcode-analyzer $python/bin 66 fi 67 mv $out/share/clang/*.py $python/share/clang 68 - 69 rm $out/bin/c-index-test 70 '' 71 + stdenv.lib.optionalString enableManpages '' ··· 79 enableParallelBuilding = true; 80 81 passthru = { 82 - lib = self; # compatibility with gcc, so that `stdenv.cc.cc.lib` works on both 83 isClang = true; 84 inherit llvm; 85 } // stdenv.lib.optionalAttrs stdenv.isLinux {
··· 49 sed -i '1s,^,find_package(Sphinx REQUIRED)\n,' docs/CMakeLists.txt 50 ''; 51 52 + outputs = [ "out" "lib" "python" ] 53 ++ stdenv.lib.optional enableManpages "man"; 54 55 # Clang expects to find LLVMgold in its own prefix ··· 59 ln -sv ${llvm}/lib/clang/${release_version}/lib $out/lib/clang/${release_version}/ 60 ln -sv $out/bin/clang $out/bin/cpp 61 62 + # Move libclang to 'lib' output 63 + moveToOutput "lib/libclang.*" "$lib" 64 + 65 mkdir -p $python/bin $python/share/clang/ 66 mv $out/bin/{git-clang-format,scan-view} $python/bin 67 if [ -e $out/bin/set-xcode-analyzer ]; then 68 mv $out/bin/set-xcode-analyzer $python/bin 69 fi 70 mv $out/share/clang/*.py $python/share/clang 71 rm $out/bin/c-index-test 72 '' 73 + stdenv.lib.optionalString enableManpages '' ··· 81 enableParallelBuilding = true; 82 83 passthru = { 84 isClang = true; 85 inherit llvm; 86 } // stdenv.lib.optionalAttrs stdenv.isLinux {
+1
pkgs/development/compilers/llvm/4/default.nix
··· 34 llvm = overrideManOutput llvm; 35 clang-unwrapped = overrideManOutput clang-unwrapped; 36 37 llvm-manpages = lowPrio self.llvm.man; 38 clang-manpages = lowPrio self.clang-unwrapped.man; 39
··· 34 llvm = overrideManOutput llvm; 35 clang-unwrapped = overrideManOutput clang-unwrapped; 36 37 + libclang = self.clang-unwrapped.lib; 38 llvm-manpages = lowPrio self.llvm.man; 39 clang-manpages = lowPrio self.clang-unwrapped.man; 40
+4 -3
pkgs/development/compilers/llvm/5/clang/default.nix
··· 50 sed -i '1s,^,find_package(Sphinx REQUIRED)\n,' docs/CMakeLists.txt 51 ''; 52 53 - outputs = [ "out" "python" ] 54 ++ stdenv.lib.optional enableManpages "man"; 55 56 # Clang expects to find LLVMgold in its own prefix ··· 60 ln -sv ${llvm}/lib/clang/${release_version}/lib $out/lib/clang/${release_version}/ 61 ln -sv $out/bin/clang $out/bin/cpp 62 63 mkdir -p $python/bin $python/share/clang/ 64 mv $out/bin/{git-clang-format,scan-view} $python/bin 65 if [ -e $out/bin/set-xcode-analyzer ]; then 66 mv $out/bin/set-xcode-analyzer $python/bin 67 fi 68 mv $out/share/clang/*.py $python/share/clang 69 - 70 rm $out/bin/c-index-test 71 '' 72 + stdenv.lib.optionalString enableManpages '' ··· 80 enableParallelBuilding = true; 81 82 passthru = { 83 - lib = self; # compatibility with gcc, so that `stdenv.cc.cc.lib` works on both 84 isClang = true; 85 inherit llvm; 86 } // stdenv.lib.optionalAttrs stdenv.isLinux {
··· 50 sed -i '1s,^,find_package(Sphinx REQUIRED)\n,' docs/CMakeLists.txt 51 ''; 52 53 + outputs = [ "out" "lib" "python" ] 54 ++ stdenv.lib.optional enableManpages "man"; 55 56 # Clang expects to find LLVMgold in its own prefix ··· 60 ln -sv ${llvm}/lib/clang/${release_version}/lib $out/lib/clang/${release_version}/ 61 ln -sv $out/bin/clang $out/bin/cpp 62 63 + # Move libclang to 'lib' output 64 + moveToOutput "lib/libclang.*" "$lib" 65 + 66 mkdir -p $python/bin $python/share/clang/ 67 mv $out/bin/{git-clang-format,scan-view} $python/bin 68 if [ -e $out/bin/set-xcode-analyzer ]; then 69 mv $out/bin/set-xcode-analyzer $python/bin 70 fi 71 mv $out/share/clang/*.py $python/share/clang 72 rm $out/bin/c-index-test 73 '' 74 + stdenv.lib.optionalString enableManpages '' ··· 82 enableParallelBuilding = true; 83 84 passthru = { 85 isClang = true; 86 inherit llvm; 87 } // stdenv.lib.optionalAttrs stdenv.isLinux {
+1
pkgs/development/compilers/llvm/5/default.nix
··· 34 llvm = overrideManOutput llvm; 35 clang-unwrapped = overrideManOutput clang-unwrapped; 36 37 llvm-manpages = lowPrio self.llvm.man; 38 clang-manpages = lowPrio self.clang-unwrapped.man; 39
··· 34 llvm = overrideManOutput llvm; 35 clang-unwrapped = overrideManOutput clang-unwrapped; 36 37 + libclang = self.clang-unwrapped.lib; 38 llvm-manpages = lowPrio self.llvm.man; 39 clang-manpages = lowPrio self.clang-unwrapped.man; 40
+1 -3
pkgs/development/compilers/rust/cargo.nix
··· 24 passthru.rustc = rustc; 25 26 nativeBuildInputs = [ pkgconfig ]; 27 - buildInputs = [ file curl python openssl cmake zlib makeWrapper libgit2 ] 28 ++ stdenv.lib.optionals stdenv.isDarwin [ CoreFoundation libiconv ]; 29 30 LIBGIT2_SYS_USE_PKG_CONFIG=1; ··· 48 ''; 49 50 checkPhase = '' 51 - # Export SSL_CERT_FILE as without it one test fails with SSL verification error 52 - export SSL_CERT_FILE=${cacert}/etc/ssl/certs/ca-bundle.crt 53 # Disable cross compilation tests 54 export CFG_DISABLE_CROSS_TESTS=1 55 cargo test
··· 24 passthru.rustc = rustc; 25 26 nativeBuildInputs = [ pkgconfig ]; 27 + buildInputs = [ cacert file curl python openssl cmake zlib makeWrapper libgit2 ] 28 ++ stdenv.lib.optionals stdenv.isDarwin [ CoreFoundation libiconv ]; 29 30 LIBGIT2_SYS_USE_PKG_CONFIG=1; ··· 48 ''; 49 50 checkPhase = '' 51 # Disable cross compilation tests 52 export CFG_DISABLE_CROSS_TESTS=1 53 cargo test
+1 -1
pkgs/development/interpreters/erlang/R16B02-basho.nix
··· 36 tar xf "${manpages}" -C "$out/lib/erlang" 37 for i in "$out"/lib/erlang/man/man[0-9]/*.[0-9]; do 38 prefix="''${i%/*}" 39 - ensureDir "$out/share/man/''${prefix##*/}" 40 ln -s "$i" "$out/share/man/''${prefix##*/}/''${i##*/}erl" 41 done 42 '';
··· 36 tar xf "${manpages}" -C "$out/lib/erlang" 37 for i in "$out"/lib/erlang/man/man[0-9]/*.[0-9]; do 38 prefix="''${i%/*}" 39 + mkdir -p "$out/share/man/''${prefix##*/}" 40 ln -s "$i" "$out/share/man/''${prefix##*/}/''${i##*/}erl" 41 done 42 '';
+7 -9
pkgs/development/libraries/boehm-gc/default.nix
··· 3 }: 4 5 stdenv.mkDerivation rec { 6 - name = "boehm-gc-7.6.0"; 7 8 src = fetchurl { 9 - url = http://www.hboehm.info/gc/gc_source/gc-7.6.0.tar.gz; 10 - sha256 = "143x7g0d0k6250ai6m2x3l4y352mzizi4wbgrmahxscv2aqjhjm1"; 11 }; 12 13 buildInputs = [ libatomic_ops ]; ··· 24 25 # Don't run the native `strip' when cross-compiling. 26 dontStrip = hostPlatform != buildPlatform; 27 - 28 - postInstall = 29 - '' 30 - mkdir -p $out/share/doc 31 - mv $out/share/gc $out/share/doc/gc 32 - ''; 33 34 enableParallelBuilding = true; 35
··· 3 }: 4 5 stdenv.mkDerivation rec { 6 + name = "boehm-gc-${version}"; 7 + version = "7.6.2"; 8 9 src = fetchurl { 10 + urls = [ 11 + "http://www.hboehm.info/gc/gc_source/gc-${version}.tar.gz" 12 + "https://github.com/ivmai/bdwgc/releases/download/v${version}/gc-${version}.tar.gz" 13 + ]; 14 + sha256 = "07nli9hgdzc09qzw169sn7gchkrn5kqgyniv2rspcy1xaq2j04dx"; 15 }; 16 17 buildInputs = [ libatomic_ops ]; ··· 28 29 # Don't run the native `strip' when cross-compiling. 30 dontStrip = hostPlatform != buildPlatform; 31 32 enableParallelBuilding = true; 33
+1 -2
pkgs/development/libraries/dleyna-core/setup-hook.sh
··· 5 fi 6 } 7 8 - envHooks+=(addDleynaConnectorPath) 9 -
··· 5 fi 6 } 7 8 + addEnvHooks "$targetOffset" addDleynaConnectorPath
+2 -2
pkgs/development/libraries/gdbm/default.nix
··· 1 { stdenv, lib, buildPlatform, fetchurl }: 2 3 stdenv.mkDerivation rec { 4 - name = "gdbm-1.13"; 5 6 src = fetchurl { 7 url = "mirror://gnu/gdbm/${name}.tar.gz"; 8 - sha256 = "0lx201q20dvc70f8a3c9s7s18z15inlxvbffph97ngvrgnyjq9cx"; 9 }; 10 11 doCheck = true; # not cross;
··· 1 { stdenv, lib, buildPlatform, fetchurl }: 2 3 stdenv.mkDerivation rec { 4 + name = "gdbm-1.14"; 5 6 src = fetchurl { 7 url = "mirror://gnu/gdbm/${name}.tar.gz"; 8 + sha256 = "02dakgrq93xwgln8qfv3vs5jyz5yvds5nyzkx6rhg9v585x478dd"; 9 }; 10 11 doCheck = true; # not cross;
+1 -1
pkgs/development/libraries/gettext/gettext-setup-hook.sh
··· 4 fi 5 } 6 7 - envHooks+=(gettextDataDirsHook)
··· 4 fi 5 } 6 7 + addEnvHooks "$hostOffset" gettextDataDirsHook
+2 -3
pkgs/development/libraries/glib/setup-hook.sh
··· 11 glibPreInstallPhase() { 12 installFlagsArray+=("gsettingsschemadir=${!outputLib}/share/gsettings-schemas/$name/glib-2.0/schemas/") 13 } 14 - preInstallPhases+=(glibPreInstallPhase) 15 16 glibPreFixupPhase() { 17 # Move gschemas in case the install flag didn't help ··· 22 23 addToSearchPath GSETTINGS_SCHEMAS_PATH "${!outputLib}/share/gsettings-schemas/$name" 24 } 25 - preFixupPhases+=(glibPreFixupPhase) 26 -
··· 11 glibPreInstallPhase() { 12 installFlagsArray+=("gsettingsschemadir=${!outputLib}/share/gsettings-schemas/$name/glib-2.0/schemas/") 13 } 14 + preInstallPhases+=" glibPreInstallPhase" 15 16 glibPreFixupPhase() { 17 # Move gschemas in case the install flag didn't help ··· 22 23 addToSearchPath GSETTINGS_SCHEMAS_PATH "${!outputLib}/share/gsettings-schemas/$name" 24 } 25 + preFixupPhases+=" glibPreFixupPhase"
pkgs/development/libraries/glibc/2.26-115to131.diff.gz

This is a binary file and will not be displayed.

+5 -2
pkgs/development/libraries/glibc/common.nix
··· 20 21 let 22 version = "2.26"; 23 - patchSuffix = "-115"; 24 sha256 = "1ggnj1hzjym7sn93rbwydcqd562q73lsb7g7kd199g6j9j9hlkp5"; 25 cross = if buildPlatform != hostPlatform then hostPlatform else null; 26 in ··· 48 */ 49 ./2.26-75.patch.gz 50 ./2.26-75to115.diff.gz 51 52 /* Have rpcgen(1) look for cpp(1) in $PATH. */ 53 ./rpcgen-path.patch ··· 73 and we lose early mismatch detection on 2.6.32. 74 75 On major glibc updates we should check that the patched kernel supports 76 - all the required features. ATM it's verified up to glibc-2.26-115. 77 # HOWTO: check glibc sources for changes in kernel requirements 78 git log -p glibc-2.25.. sysdeps/unix/sysv/linux/x86_64/kernel-features.h sysdeps/unix/sysv/linux/kernel-features.h 79 # get kernel sources (update the URL)
··· 20 21 let 22 version = "2.26"; 23 + patchSuffix = "-131"; 24 sha256 = "1ggnj1hzjym7sn93rbwydcqd562q73lsb7g7kd199g6j9j9hlkp5"; 25 cross = if buildPlatform != hostPlatform then hostPlatform else null; 26 in ··· 48 */ 49 ./2.26-75.patch.gz 50 ./2.26-75to115.diff.gz 51 + # contains fix for CVE-2018-1000001 as the last commit: 52 + # https://sourceware.org/git/?p=glibc.git;a=commit;h=fabef2edbc 53 + ./2.26-115to131.diff.gz 54 55 /* Have rpcgen(1) look for cpp(1) in $PATH. */ 56 ./rpcgen-path.patch ··· 76 and we lose early mismatch detection on 2.6.32. 77 78 On major glibc updates we should check that the patched kernel supports 79 + all the required features. ATM it's verified up to glibc-2.26-131. 80 # HOWTO: check glibc sources for changes in kernel requirements 81 git log -p glibc-2.25.. sysdeps/unix/sysv/linux/x86_64/kernel-features.h sysdeps/unix/sysv/linux/kernel-features.h 82 # get kernel sources (update the URL)
-2
pkgs/development/libraries/json-glib/default.nix
··· 27 28 doCheck = true; 29 30 - checkPhase = "meson test"; 31 - 32 meta = with stdenv.lib; { 33 homepage = http://live.gnome.org/JsonGlib; 34 description = "A library providing (de)serialization support for the JavaScript Object Notation (JSON) format";
··· 27 28 doCheck = true; 29 30 meta = with stdenv.lib; { 31 homepage = http://live.gnome.org/JsonGlib; 32 description = "A library providing (de)serialization support for the JavaScript Object Notation (JSON) format";
+2 -2
pkgs/development/libraries/libatomic_ops/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 name = "libatomic_ops-${version}"; 5 - version = "7.6.0"; 6 7 src = fetchurl { 8 urls = [ 9 "http://www.ivmaisoft.com/_bin/atomic_ops/libatomic_ops-${version}.tar.gz" 10 "https://github.com/ivmai/libatomic_ops/releases/download/v${version}/libatomic_ops-${version}.tar.gz" 11 ]; 12 - sha256 ="03ylfr29g9zc0r6b6axz3i68alj5qmxgzknxwam3jlx0sz8hcb4f"; 13 }; 14 15 nativeBuildInputs = stdenv.lib.optionals stdenv.isCygwin [ autoconf automake libtool ];
··· 2 3 stdenv.mkDerivation rec { 4 name = "libatomic_ops-${version}"; 5 + version = "7.6.2"; 6 7 src = fetchurl { 8 urls = [ 9 "http://www.ivmaisoft.com/_bin/atomic_ops/libatomic_ops-${version}.tar.gz" 10 "https://github.com/ivmai/libatomic_ops/releases/download/v${version}/libatomic_ops-${version}.tar.gz" 11 ]; 12 + sha256 ="1rif2hjscq5mh639nsnjhb90c01gnmy1sbmj6x6hsn1xmpnj95r1"; 13 }; 14 15 nativeBuildInputs = stdenv.lib.optionals stdenv.isCygwin [ autoconf automake libtool ];
-2
pkgs/development/libraries/libinput/default.nix
··· 50 51 doCheck = testsSupport; 52 53 - checkPhase = "meson test"; 54 - 55 meta = { 56 description = "Handles input devices in Wayland compositors and provides a generic X.Org input driver"; 57 homepage = http://www.freedesktop.org/wiki/Software/libinput;
··· 50 51 doCheck = testsSupport; 52 53 meta = { 54 description = "Handles input devices in Wayland compositors and provides a generic X.Org input driver"; 55 homepage = http://www.freedesktop.org/wiki/Software/libinput;
+2 -2
pkgs/development/python-modules/aniso8601/default.nix
··· 3 4 buildPythonPackage rec { 5 pname = "aniso8601"; 6 - version = "1.3.0"; 7 name = "${pname}-${version}"; 8 9 meta = with stdenv.lib; { ··· 16 17 src = fetchPypi { 18 inherit pname version; 19 - sha256 = "c3b5246f5601b6ae5671911bc4ee5b3e3fe94752e8afab5ce074d8b1232952f1"; 20 }; 21 }
··· 3 4 buildPythonPackage rec { 5 pname = "aniso8601"; 6 + version = "2.0.0"; 7 name = "${pname}-${version}"; 8 9 meta = with stdenv.lib; { ··· 16 17 src = fetchPypi { 18 inherit pname version; 19 + sha256 = "085786415d3550e89785ffbedaa9bb37d41de0707a1268bdbba11249064b71d1"; 20 }; 21 }
+2 -2
pkgs/development/python-modules/argon2_cffi/default.nix
··· 10 11 buildPythonPackage rec { 12 pname = "argon2_cffi"; 13 - version = "16.3.0"; 14 name = "${pname}-${version}"; 15 16 src = fetchPypi { 17 inherit pname version; 18 - sha256 = "1ap3il3j1pjyprrhpfyhc21izpmhzhfb5s69vlzc65zvd1nj99cr"; 19 }; 20 21 propagatedBuildInputs = [ cffi six ];
··· 10 11 buildPythonPackage rec { 12 pname = "argon2_cffi"; 13 + version = "18.1.0"; 14 name = "${pname}-${version}"; 15 16 src = fetchPypi { 17 inherit pname version; 18 + sha256 = "7e4b75611b73f53012117ad21cdde7a17b32d1e99ff6799f22d827eb83a2a59b"; 19 }; 20 21 propagatedBuildInputs = [ cffi six ];
+2 -2
pkgs/development/python-modules/backports_lzma/default.nix
··· 8 9 buildPythonPackage rec { 10 pname = "backports.lzma"; 11 - version = "0.0.8"; 12 13 disabled = isPy3k; 14 15 src = fetchPypi { 16 inherit pname version; 17 - sha256 = "200584ad5079d8ca6b1bfe14890c7be58666ab0128d8ca26cfb2669b476085f3"; 18 }; 19 20 buildInputs = [ lzma ];
··· 8 9 buildPythonPackage rec { 10 pname = "backports.lzma"; 11 + version = "0.0.9"; 12 13 disabled = isPy3k; 14 15 src = fetchPypi { 16 inherit pname version; 17 + sha256 = "9ba5d94214a79900ee297a594b8e154cd8e4a54d26eb06243c0e2f3ad5286539"; 18 }; 19 20 buildInputs = [ lzma ];
+2 -2
pkgs/development/python-modules/bootstrapped-pip/default.nix
··· 9 }; 10 setuptools_source = fetchPypi { 11 pname = "setuptools"; 12 - version = "38.2.5"; 13 format = "wheel"; 14 - sha256 = "bcf0d4f3e2f7890e658db11e218b8643afffb905a0e2f2a7d5a6a3e949bb87e6"; 15 }; 16 17 # TODO: Shouldn't be necessary anymore for pip > 9.0.1!
··· 9 }; 10 setuptools_source = fetchPypi { 11 pname = "setuptools"; 12 + version = "38.4.0"; 13 format = "wheel"; 14 + sha256 = "155c2ec9fdcc00c3973d966b416e1cf3a1e7ce75f4c09fb760b23f94b935926e"; 15 }; 16 17 # TODO: Shouldn't be necessary anymore for pip > 9.0.1!
+6
pkgs/development/python-modules/cytoolz/default.nix
··· 23 checkInputs = [ nose ]; 24 propagatedBuildInputs = [ toolz ]; 25 26 # Disable failing test https://github.com/pytoolz/cytoolz/issues/97 27 checkPhase = '' 28 NOSE_EXCLUDE=test_curried_exceptions nosetests -v $out/${python.sitePackages}
··· 23 checkInputs = [ nose ]; 24 propagatedBuildInputs = [ toolz ]; 25 26 + # File as accidentally included in release 27 + # See https://github.com/pytoolz/cytoolz/issues/116#issuecomment-355770073 28 + postPatch = '' 29 + rm cytoolz/tests/test_curried_doctests.py 30 + ''; 31 + 32 # Disable failing test https://github.com/pytoolz/cytoolz/issues/97 33 checkPhase = '' 34 NOSE_EXCLUDE=test_curried_exceptions nosetests -v $out/${python.sitePackages}
+2 -2
pkgs/development/python-modules/daphne/default.nix
··· 4 buildPythonPackage rec { 5 pname = "daphne"; 6 name = "${pname}-${version}"; 7 - version = "1.3.0"; 8 9 src = fetchPypi { 10 inherit pname version; 11 - sha256 = "1xmmjp21m1w88ljsgnkf6cbzw5nxamh9cfmfgzxffpn4cdmvn96i"; 12 }; 13 14 buildInputs = [ hypothesis ];
··· 4 buildPythonPackage rec { 5 pname = "daphne"; 6 name = "${pname}-${version}"; 7 + version = "1.4.2"; 8 9 src = fetchPypi { 10 inherit pname version; 11 + sha256 = "302725f223853b05688f28c361e050f8db9568b1ce27340c76272c26b49e6d72"; 12 }; 13 14 buildInputs = [ hypothesis ];
+16 -6
pkgs/development/python-modules/datashape/default.nix
··· 1 { lib 2 , buildPythonPackage 3 - , fetchPypi 4 , pytest 5 , mock 6 , numpy ··· 8 , dateutil 9 }: 10 11 - buildPythonPackage rec { 12 pname = "datashape"; 13 - version = "0.5.2"; 14 - name = "${pname}-${version}"; 15 16 - src = fetchPypi { 17 inherit pname version; 18 - sha256 = "2356ea690c3cf003c1468a243a9063144235de45b080b3652de4f3d44e57d783"; 19 }; 20 21 checkInputs = [ pytest mock ];
··· 1 { lib 2 , buildPythonPackage 3 + , fetchFromGitHub 4 , pytest 5 , mock 6 , numpy ··· 8 , dateutil 9 }: 10 11 + let 12 + # Fetcher function looks similar to fetchPypi. 13 + # Allows for easier overriding, without having to know 14 + # how the source is actually fetched. 15 + fetcher = {pname, version, sha256}: fetchFromGitHub { 16 + owner = "blaze"; 17 + repo = pname; 18 + rev = version; 19 + inherit sha256; 20 + }; 21 + 22 + in buildPythonPackage rec { 23 pname = "datashape"; 24 + version = "0.5.4"; 25 26 + src = fetcher { 27 inherit pname version; 28 + sha256 = "0rhlj2kjj1vx5m73wnc5518rd6cs1zsbgpsvzk893n516k69shcf"; 29 }; 30 31 checkInputs = [ pytest mock ];
+2 -2
pkgs/development/python-modules/dyn/default.nix
··· 3 4 buildPythonPackage rec { 5 pname = "dyn"; 6 - version = "1.8.0"; 7 name = "${pname}-${version}"; 8 9 src = fetchPypi { 10 inherit pname version; 11 - sha256 = "4ab3cd9a1478674cf2d2aa6740fb0ddf77daaa9ab3e35e5d2bc92f60301f8523"; 12 }; 13 14 buildInputs = [ glibcLocales ];
··· 3 4 buildPythonPackage rec { 5 pname = "dyn"; 6 + version = "1.8.1"; 7 name = "${pname}-${version}"; 8 9 src = fetchPypi { 10 inherit pname version; 11 + sha256 = "e112149d48b4500c18b3cfb6e0e6e780bb5aa0e56ff87cac412280200b9ec8bf"; 12 }; 13 14 buildInputs = [ glibcLocales ];
+2 -2
pkgs/development/python-modules/filelock/default.nix
··· 2 3 buildPythonPackage rec { 4 pname = "filelock"; 5 - version = "2.0.14"; 6 7 src = fetchPypi { 8 inherit pname version; 9 - sha256 = "ee355eb66e4c2e5d95689e1253515aad5b3177c274abdd00a57d5ab1aa6d071a"; 10 }; 11 12 meta = with stdenv.lib; {
··· 2 3 buildPythonPackage rec { 4 pname = "filelock"; 5 + version = "3.0.0"; 6 7 src = fetchPypi { 8 inherit pname version; 9 + sha256 = "b3ad481724adfb2280773edd95ce501e497e88fa4489c6e41e637ab3fd9a456c"; 10 }; 11 12 meta = with stdenv.lib; {
+2 -2
pkgs/development/python-modules/grpcio/default.nix
··· 3 4 buildPythonPackage rec { 5 pname = "grpcio"; 6 - version = "1.8.2"; 7 8 src = fetchPypi { 9 inherit pname version; 10 - sha256 = "1ea1336f0d1158c4e00e96a94df84b75f6bbff9816abb6cc68cbdc9442a9ac55"; 11 }; 12 13 propagatedBuildInputs = [ six protobuf ]
··· 3 4 buildPythonPackage rec { 5 pname = "grpcio"; 6 + version = "1.8.3"; 7 8 src = fetchPypi { 9 inherit pname version; 10 + sha256 = "6ce5fd3093ddc09a152981d5c477ac645eda19dfcc819e45d8c57da6b743bd53"; 11 }; 12 13 propagatedBuildInputs = [ six protobuf ]
+2 -6
pkgs/development/python-modules/jupyter_client/default.nix
··· 15 16 buildPythonPackage rec { 17 pname = "jupyter_client"; 18 - version = "5.2.0"; 19 20 src = fetchPypi { 21 inherit pname version; 22 - sha256 = "ca30cf1786047925ebacd6f6faa3a993efaa004b584f7d83bc8b807f7cd3f6bb"; 23 }; 24 25 checkInputs = [ ipykernel ipython mock pytest ]; ··· 28 checkPhase = '' 29 py.test 30 ''; 31 - 32 - patches = [ 33 - ./wheel_workaround.patch 34 - ]; 35 36 # Circular dependency with ipykernel 37 doCheck = false;
··· 15 16 buildPythonPackage rec { 17 pname = "jupyter_client"; 18 + version = "5.2.1"; 19 20 src = fetchPypi { 21 inherit pname version; 22 + sha256 = "462790d46b244f0a631ea5e3cd5cdbad6874d5d24cc0ff512deb7c16cdf8653d"; 23 }; 24 25 checkInputs = [ ipykernel ipython mock pytest ]; ··· 28 checkPhase = '' 29 py.test 30 ''; 31 32 # Circular dependency with ipykernel 33 doCheck = false;
-13
pkgs/development/python-modules/jupyter_client/wheel_workaround.patch
··· 1 - diff --git a/setup.py b/setup.py 2 - index 95d4774..ee72cbc 100644 3 - --- a/setup.py 4 - +++ b/setup.py 5 - @@ -86,7 +86,7 @@ setup_args = dict( 6 - extras_require = { 7 - 'test': ['ipykernel', 'ipython', 'mock'], 8 - 'test:python_version == "3.3"': ['pytest<3.3.0'], 9 - - 'test:python_version >= "3.4" or python_version == "2.7"': ['pytest'], 10 - + 'test:(python_version >= "3.4" or python_version == "2.7")': ['pytest'], 11 - }, 12 - cmdclass = { 13 - 'bdist_egg': bdist_egg if 'bdist_egg' in sys.argv else bdist_egg_disabled,
···
+11 -6
pkgs/development/python-modules/pillow/default.nix
··· 1 - { stdenv, buildPythonPackage, fetchPypi, isPyPy, 2 - nose, olefile, 3 - freetype, libjpeg, zlib, libtiff, libwebp, tcl, lcms2, tk, libX11}: 4 buildPythonPackage rec { 5 pname = "Pillow"; 6 - version = "4.3.0"; 7 name = "${pname}-${version}"; 8 9 src = fetchPypi { 10 inherit pname version; 11 - sha256 = "a97c715d44efd5b4aa8d739b8fad88b93ed79f1b33fc2822d5802043f3b1b527"; 12 }; 13 14 doCheck = !stdenv.isDarwin && !isPyPy; ··· 21 22 propagatedBuildInputs = [ olefile ]; 23 24 buildInputs = [ 25 - freetype libjpeg zlib libtiff libwebp tcl nose lcms2 ] 26 ++ stdenv.lib.optionals (isPyPy) [ tk libX11 ]; 27 28 # NOTE: we use LCMS_ROOT as WEBP root since there is not other setting for webp.
··· 1 + { stdenv, buildPythonPackage, fetchPypi, isPyPy 2 + , olefile 3 + , freetype, libjpeg, zlib, libtiff, libwebp, tcl, lcms2, tk, libX11 4 + , pytestrunner 5 + , pytest 6 + }: 7 buildPythonPackage rec { 8 pname = "Pillow"; 9 + version = "5.0.0"; 10 name = "${pname}-${version}"; 11 12 src = fetchPypi { 13 inherit pname version; 14 + sha256 = "12f29d6c23424f704c66b5b68c02fe0b571504459605cfe36ab8158359b0e1bb"; 15 }; 16 17 doCheck = !stdenv.isDarwin && !isPyPy; ··· 24 25 propagatedBuildInputs = [ olefile ]; 26 27 + checkInputs = [ pytest pytestrunner ]; 28 + 29 buildInputs = [ 30 + freetype libjpeg zlib libtiff libwebp tcl lcms2 ] 31 ++ stdenv.lib.optionals (isPyPy) [ tk libX11 ]; 32 33 # NOTE: we use LCMS_ROOT as WEBP root since there is not other setting for webp.
+2 -2
pkgs/development/python-modules/psutil/default.nix
··· 7 8 buildPythonPackage rec { 9 pname = "psutil"; 10 - version = "5.4.2"; 11 name = "${pname}-${version}"; 12 13 src = fetchPypi { 14 inherit pname version; 15 - sha256 = "00a1f9ff8d1e035fba7bfdd6977fa8ea7937afdb4477339e5df3dba78194fe11"; 16 }; 17 18 # No tests in archive
··· 7 8 buildPythonPackage rec { 9 pname = "psutil"; 10 + version = "5.4.3"; 11 name = "${pname}-${version}"; 12 13 src = fetchPypi { 14 inherit pname version; 15 + sha256 = "e2467e9312c2fa191687b89ff4bc2ad8843be4af6fb4dc95a7cc5f7d7a327b18"; 16 }; 17 18 # No tests in archive
+2 -2
pkgs/development/python-modules/pwntools/default.nix
··· 5 , requests, tox, pandoc, unicorn, intervaltree }: 6 7 buildPythonPackage rec { 8 - version = "3.10.0"; 9 pname = "pwntools"; 10 name = pname + "-" + version; 11 12 src = fetchPypi { 13 inherit pname version; 14 - sha256 = "1l8hb30mwxqd1y7r5ihd7kzmjm2mz6m5aiphd3hwzmxkmxbxj8zk"; 15 }; 16 17 propagatedBuildInputs = [ Mako packaging pysocks pygments ROPGadget capstone paramiko pip psutil pyelftools pypandoc pyserial dateutil requests tox pandoc unicorn intervaltree ];
··· 5 , requests, tox, pandoc, unicorn, intervaltree }: 6 7 buildPythonPackage rec { 8 + version = "3.11.0"; 9 pname = "pwntools"; 10 name = pname + "-" + version; 11 12 src = fetchPypi { 13 inherit pname version; 14 + sha256 = "609b3f0ba47c975f4dbedd3da2af4c5ca1b3a2aa13fb99240531b6a68edb87be"; 15 }; 16 17 propagatedBuildInputs = [ Mako packaging pysocks pygments ROPGadget capstone paramiko pip psutil pyelftools pypandoc pyserial dateutil requests tox pandoc unicorn intervaltree ];
+2 -2
pkgs/development/python-modules/pytest/default.nix
··· 2 , setuptools_scm, setuptools, six, pluggy, funcsigs, isPy3k 3 }: 4 buildPythonPackage rec { 5 - version = "3.3.1"; 6 pname = "pytest"; 7 8 preCheck = '' ··· 12 13 src = fetchPypi { 14 inherit pname version; 15 - sha256 = "cf8436dc59d8695346fcd3ab296de46425ecab00d64096cebe79fb51ecb2eb93"; 16 }; 17 18 checkInputs = [ hypothesis ];
··· 2 , setuptools_scm, setuptools, six, pluggy, funcsigs, isPy3k 3 }: 4 buildPythonPackage rec { 5 + version = "3.3.2"; 6 pname = "pytest"; 7 8 preCheck = '' ··· 12 13 src = fetchPypi { 14 inherit pname version; 15 + sha256 = "53548280ede7818f4dc2ad96608b9f08ae2cc2ca3874f2ceb6f97e3583f25bc4"; 16 }; 17 18 checkInputs = [ hypothesis ];
+2 -2
pkgs/development/python-modules/python-stdnum/default.nix
··· 1 { lib, fetchurl, buildPythonPackage, isPy3k }: 2 3 buildPythonPackage rec { 4 - version = "1.7"; 5 pname = "python-stdnum"; 6 name = "${pname}-${version}"; 7 # Failing tests and dependency issue on Py3k 8 disabled = isPy3k; 9 src = fetchurl { 10 url = "mirror://pypi/p/python-stdnum/${name}.tar.gz"; 11 - sha256 = "987c25e1047e8742131bcf29dac7a406987adb1463465749e2daaba8cb19d264"; 12 }; 13 meta = { 14 homepage = http://arthurdejong.org/python-stdnum/;
··· 1 { lib, fetchurl, buildPythonPackage, isPy3k }: 2 3 buildPythonPackage rec { 4 + version = "1.8.1"; 5 pname = "python-stdnum"; 6 name = "${pname}-${version}"; 7 # Failing tests and dependency issue on Py3k 8 disabled = isPy3k; 9 src = fetchurl { 10 url = "mirror://pypi/p/python-stdnum/${name}.tar.gz"; 11 + sha256 = "d7162fdb29337aebed65700cc7297016f6cd32cae4ad7aed8f7e7531f0217943"; 12 }; 13 meta = { 14 homepage = http://arthurdejong.org/python-stdnum/;
+2 -2
pkgs/development/python-modules/ropper/default.nix
··· 8 9 buildPythonApplication rec { 10 pname = "ropper"; 11 - version = "1.11.2"; 12 13 src = fetchPypi { 14 inherit pname version; 15 - sha256 = "2183feedfe8b01a27301eee07383b481ece01b2319bdba3afebe33e19ca14aa3"; 16 }; 17 # XXX tests rely on user-writeable /dev/shm to obtain process locks and return PermissionError otherwise 18 # workaround: sudo chmod 777 /dev/shm
··· 8 9 buildPythonApplication rec { 10 pname = "ropper"; 11 + version = "1.11.3"; 12 13 src = fetchPypi { 14 inherit pname version; 15 + sha256 = "77d9b03083d0a098261a1d2856cd330ea3db520511a78472e421a00526aa220c"; 16 }; 17 # XXX tests rely on user-writeable /dev/shm to obtain process locks and return PermissionError otherwise 18 # workaround: sudo chmod 777 /dev/shm
+2 -2
pkgs/development/python-modules/setuptools/default.nix
··· 8 # Should use buildPythonPackage here somehow 9 stdenv.mkDerivation rec { 10 pname = "setuptools"; 11 - version = "38.2.5"; 12 name = "${python.libPrefix}-${pname}-${version}"; 13 14 src = fetchPypi { 15 inherit pname version; 16 extension = "zip"; 17 - sha256 = "b080f276cc868670540b2c03cee06cc14d2faf9da7bec0f15058d1b402c94507"; 18 }; 19 20 buildInputs = [ python wrapPython unzip ];
··· 8 # Should use buildPythonPackage here somehow 9 stdenv.mkDerivation rec { 10 pname = "setuptools"; 11 + version = "38.4.0"; 12 name = "${python.libPrefix}-${pname}-${version}"; 13 14 src = fetchPypi { 15 inherit pname version; 16 extension = "zip"; 17 + sha256 = "6501fc32f505ec5b3ed36ec65ba48f1b975f52cf2ea101c7b73a08583fd12f75"; 18 }; 19 20 buildInputs = [ python wrapPython unzip ];
+2 -2
pkgs/development/python-modules/sqlmap/default.nix
··· 5 6 buildPythonPackage rec { 7 pname = "sqlmap"; 8 - version = "1.1.12"; 9 name = "${pname}-${version}"; 10 11 src = fetchPypi { 12 inherit pname version; 13 - sha256 = "86a1078ceb1e79f891633c7e4c7b07949fd9135a0e4c0738abd5111e2e6b96c0"; 14 }; 15 16 # No tests in archive
··· 5 6 buildPythonPackage rec { 7 pname = "sqlmap"; 8 + version = "1.2"; 9 name = "${pname}-${version}"; 10 11 src = fetchPypi { 12 inherit pname version; 13 + sha256 = "18ac6392a710f0cc106c28c4e27e43e8f1b25cb46fb8b6714836212607c07b10"; 14 }; 15 16 # No tests in archive
+2 -2
pkgs/development/python-modules/texttable/default.nix
··· 5 6 buildPythonPackage rec { 7 pname = "texttable"; 8 - version = "1.1.1"; 9 10 src = fetchPypi { 11 inherit pname version; 12 - sha256 = "44674d1d470a9fc264c4d1eba44b74463ca0066d7b954453dd5a4f8057779c9c"; 13 }; 14 15 meta = {
··· 5 6 buildPythonPackage rec { 7 pname = "texttable"; 8 + version = "1.2.1"; 9 10 src = fetchPypi { 11 inherit pname version; 12 + sha256 = "c89dc0148ae29645917aab7e970a30d1af565b3ca276cef8ab1a60469f0d8100"; 13 }; 14 15 meta = {
+2 -2
pkgs/development/python-modules/tornado/default.nix
··· 10 11 buildPythonPackage rec { 12 pname = "tornado"; 13 - version = "4.5.2"; 14 name = "${pname}-${version}"; 15 16 propagatedBuildInputs = [ backports_abc backports_ssl_match_hostname certifi singledispatch ]; ··· 23 24 src = fetchPypi { 25 inherit pname version; 26 - sha256 = "1fb8e494cd46c674d86fac5885a3ff87b0e283937a47d74eb3c02a48c9e89ad0"; 27 }; 28 }
··· 10 11 buildPythonPackage rec { 12 pname = "tornado"; 13 + version = "4.5.3"; 14 name = "${pname}-${version}"; 15 16 propagatedBuildInputs = [ backports_abc backports_ssl_match_hostname certifi singledispatch ]; ··· 23 24 src = fetchPypi { 25 inherit pname version; 26 + sha256 = "6d14e47eab0e15799cf3cdcc86b0b98279da68522caace2bd7ce644287685f0a"; 27 }; 28 }
+2 -2
pkgs/development/python-modules/typeguard/default.nix
··· 9 buildPythonPackage rec { 10 name = "${pname}-${version}"; 11 pname = "typeguard"; 12 - version = "2.1.3"; 13 14 src = fetchPypi { 15 inherit pname version; 16 - sha256 = "0l3pih5ca469v7if255h5rqymirsw46bi6s7p885jxhq1gv6cfpk"; 17 }; 18 19 buildInputs = [ setuptools_scm ];
··· 9 buildPythonPackage rec { 10 name = "${pname}-${version}"; 11 pname = "typeguard"; 12 + version = "2.1.4"; 13 14 src = fetchPypi { 15 inherit pname version; 16 + sha256 = "40b22d18d2215b76b3ddda2564acfbddfa6e702968637fbd969187c2a6fb99da"; 17 }; 18 19 buildInputs = [ setuptools_scm ];
+2 -2
pkgs/development/python-modules/unidecode/default.nix
··· 3 buildPythonPackage rec { 4 name = "${pname}-${version}"; 5 pname = "Unidecode"; 6 - version = "0.04.21"; 7 8 src = fetchPypi { 9 inherit pname version; 10 - sha256 = "0lfhp9c5xrbpjvbpr12ji52g1lx04404bzzdg6pvabhzisw6l2i8"; 11 }; 12 13 LC_ALL="en_US.UTF-8";
··· 3 buildPythonPackage rec { 4 name = "${pname}-${version}"; 5 pname = "Unidecode"; 6 + version = "1.0.22"; 7 8 src = fetchPypi { 9 inherit pname version; 10 + sha256 = "8c33dd588e0c9bc22a76eaa0c715a5434851f726131bd44a6c26471746efabf5"; 11 }; 12 13 LC_ALL="en_US.UTF-8";
+2 -2
pkgs/development/python-modules/zeep/default.nix
··· 25 26 let 27 pname = "zeep"; 28 - version = "2.4.0"; 29 in buildPythonPackage { 30 name = "${pname}-${version}"; 31 32 src = fetchPypi { 33 inherit pname version; 34 - sha256 = "8631e2735c5f2219eb18ca4f0615ae482455628518508f69c3690dbfb8238aee"; 35 }; 36 37 propagatedBuildInputs = [
··· 25 26 let 27 pname = "zeep"; 28 + version = "2.5.0"; 29 in buildPythonPackage { 30 name = "${pname}-${version}"; 31 32 src = fetchPypi { 33 inherit pname version; 34 + sha256 = "4f9db52c7d269813fc6251da4cb050869158858aeea75a055b4550f19e52ac84"; 35 }; 36 37 propagatedBuildInputs = [
+2 -4
pkgs/development/r-modules/default.nix
··· 3 { R, pkgs, overrides }: 4 5 let 6 - inherit (pkgs) fetchurl stdenv lib; 7 8 buildRPackage = pkgs.callPackage ./generic-builder.nix { 9 inherit R; ··· 912 }); 913 914 geojsonio = old.geojsonio.overrideDerivation (attrs: { 915 - preConfigure = '' 916 - export SSL_CERT_FILE=${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt 917 - ''; 918 }); 919 920 rstan = old.rstan.overrideDerivation (attrs: {
··· 3 { R, pkgs, overrides }: 4 5 let 6 + inherit (pkgs) cacert fetchurl stdenv lib; 7 8 buildRPackage = pkgs.callPackage ./generic-builder.nix { 9 inherit R; ··· 912 }); 913 914 geojsonio = old.geojsonio.overrideDerivation (attrs: { 915 + buildInputs = [ cacert ] ++ attrs.buildInputs; 916 }); 917 918 rstan = old.rstan.overrideDerivation (attrs: {
+1 -1
pkgs/development/tools/build-managers/cmake/setup-hook.sh
··· 43 # libraries are in a system path or in the same directory as the 44 # executable. This flag makes the shared library accessible from its 45 # nix/store directory. 46 - cmakeFlags="-DCMAKE_INSTALL_NAME_DIR=$prefix/lib $cmakeFlags" 47 cmakeFlags="-DCMAKE_INSTALL_LIBDIR=${!outputLib}/lib $cmakeFlags" 48 cmakeFlags="-DCMAKE_INSTALL_INCLUDEDIR=${!outputDev}/include $cmakeFlags" 49
··· 43 # libraries are in a system path or in the same directory as the 44 # executable. This flag makes the shared library accessible from its 45 # nix/store directory. 46 + cmakeFlags="-DCMAKE_INSTALL_NAME_DIR=${!outputLib}/lib $cmakeFlags" 47 cmakeFlags="-DCMAKE_INSTALL_LIBDIR=${!outputLib}/lib $cmakeFlags" 48 cmakeFlags="-DCMAKE_INSTALL_INCLUDEDIR=${!outputDev}/include $cmakeFlags" 49
+12
pkgs/development/tools/build-managers/meson/setup-hook.sh
··· 25 setOutputFlags= 26 configurePhase=mesonConfigurePhase 27 fi
··· 25 setOutputFlags= 26 configurePhase=mesonConfigurePhase 27 fi 28 + 29 + mesonCheckPhase() { 30 + runHook preCheck 31 + 32 + meson test 33 + 34 + runHook postCheck 35 + } 36 + 37 + if [ -z "$dontUseMesonCheck" -a -z "$checkPhase" ]; then 38 + checkPhase=mesonCheckPhase 39 + fi
+7 -5
pkgs/os-specific/linux/apparmor/default.nix
··· 9 }: 10 11 let 12 - apparmor-series = "2.10"; 13 - apparmor-version = apparmor-series; 14 15 apparmor-meta = component: with stdenv.lib; { 16 homepage = http://apparmor.net/; ··· 21 }; 22 23 apparmor-sources = fetchurl { 24 - url = "https://launchpad.net/apparmor/${apparmor-series}/${apparmor-version}/+download/apparmor-${apparmor-version}.tar.gz"; 25 - sha256 = "1x06qmmbha9krx7880pxj2k3l8fxy3nm945xjjv735m2ax1243jd"; 26 }; 27 28 prePatchCommon = '' ··· 96 wrapProgram $out/bin/$prog --prefix PYTHONPATH : "$out/lib/${pythonPackages.python.libPrefix}/site-packages:$PYTHONPATH" 97 done 98 99 - for prog in aa-exec aa-notify ; do 100 wrapProgram $out/bin/$prog --prefix PERL5LIB : "${libapparmor}/lib/perl5:$PERL5LIB" 101 done 102 '';
··· 9 }: 10 11 let 12 + 13 + apparmor-series = "2.12"; 14 + apparmor-patchver = "0"; 15 + apparmor-version = apparmor-series + "." + apparmor-patchver; 16 17 apparmor-meta = component: with stdenv.lib; { 18 homepage = http://apparmor.net/; ··· 23 }; 24 25 apparmor-sources = fetchurl { 26 + url = "https://launchpad.net/apparmor/${apparmor-series}/${apparmor-version}/+download/apparmor-${apparmor-series}.tar.gz"; 27 + sha256 = "0mm0mcp0w18si9wl15drndysm7v27az2942p1xjd197shg80qawa"; 28 }; 29 30 prePatchCommon = '' ··· 98 wrapProgram $out/bin/$prog --prefix PYTHONPATH : "$out/lib/${pythonPackages.python.libPrefix}/site-packages:$PYTHONPATH" 99 done 100 101 + for prog in aa-notify ; do 102 wrapProgram $out/bin/$prog --prefix PERL5LIB : "${libapparmor}/lib/perl5:$PERL5LIB" 103 done 104 '';
+3 -3
pkgs/os-specific/linux/bluez/default.nix
··· 5 assert stdenv.isLinux; 6 7 stdenv.mkDerivation rec { 8 - name = "bluez-5.47"; 9 10 src = fetchurl { 11 url = "mirror://kernel/linux/bluetooth/${name}.tar.xz"; 12 - sha256 = "1j22hfjz0fp4pgclgz9mfcwjbr4wqgah3gd2qhfg4r6msmybyxfg"; 13 }; 14 15 pythonPath = with pythonPackages; 16 - [ dbus pygobject2 pygobject3 recursivePthLoader ]; 17 18 buildInputs = [ 19 pkgconfig dbus glib alsaLib pythonPackages.python pythonPackages.wrapPython
··· 5 assert stdenv.isLinux; 6 7 stdenv.mkDerivation rec { 8 + name = "bluez-5.48"; 9 10 src = fetchurl { 11 url = "mirror://kernel/linux/bluetooth/${name}.tar.xz"; 12 + sha256 = "140fjyxa2q4y35d9n52vki649jzb094pf71hxkkvlrpgf8q75a5r"; 13 }; 14 15 pythonPath = with pythonPackages; 16 + [ dbus-python pygobject2 pygobject3 recursivePthLoader ]; 17 18 buildInputs = [ 19 pkgconfig dbus glib alsaLib pythonPackages.python pythonPackages.wrapPython
+1 -2
pkgs/os-specific/linux/firmware/firmware-linux-nonfree/default.nix
··· 32 # traffic, so don't do that. 33 preferLocalBuild = true; 34 35 - nativeBuildInputs = [ git gnupg ]; 36 - NIX_SSL_CERT_FILE = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 37 } '' 38 git init src && ( 39 cd src
··· 32 # traffic, so don't do that. 33 preferLocalBuild = true; 34 35 + nativeBuildInputs = [ cacert git gnupg ]; 36 } '' 37 git init src && ( 38 cd src
+7 -6
pkgs/os-specific/linux/kernel/common-config.nix
··· 51 52 # Bump the maximum number of CPUs to support systems like EC2 x1.* 53 # instances and Xeon Phi. 54 - ${optionalString (stdenv.system == "x86_64-linux" || stdenv.system == "aarch64-linux") '' 55 NR_CPUS 384 56 ''} 57 ··· 347 SECURITY_SELINUX_BOOTPARAM_VALUE 0 # Disable SELinux by default 348 SECURITY_YAMA? y # Prevent processes from ptracing non-children processes 349 DEVKMEM n # Disable /dev/kmem 350 - ${if versionOlder version "3.14" then '' 351 - CC_STACKPROTECTOR? y # Detect buffer overflows on the stack 352 - '' else '' 353 - CC_STACKPROTECTOR_REGULAR? y 354 - ''} 355 ${optionalString (versionAtLeast version "3.12") '' 356 USER_NS y # Support for user namespaces 357 ''}
··· 51 52 # Bump the maximum number of CPUs to support systems like EC2 x1.* 53 # instances and Xeon Phi. 54 + ${optionalString (stdenv.hostPlatform.system == "x86_64-linux" || stdenv.hostPlatform.system == "aarch64-linux") '' 55 NR_CPUS 384 56 ''} 57 ··· 347 SECURITY_SELINUX_BOOTPARAM_VALUE 0 # Disable SELinux by default 348 SECURITY_YAMA? y # Prevent processes from ptracing non-children processes 349 DEVKMEM n # Disable /dev/kmem 350 + ${optionalString (! stdenv.hostPlatform.isArm) 351 + (if versionOlder version "3.14" then '' 352 + CC_STACKPROTECTOR? y # Detect buffer overflows on the stack 353 + '' else '' 354 + CC_STACKPROTECTOR_REGULAR? y 355 + '')} 356 ${optionalString (versionAtLeast version "3.12") '' 357 USER_NS y # Support for user namespaces 358 ''}
+16 -47
pkgs/os-specific/linux/kernel/generic.nix
··· 1 - { stdenv, perl, buildLinux 2 3 , # The kernel source tarball. 4 src ··· 23 # symbolic name and `patch' is the actual patch. The patch may 24 # optionally be compressed with gzip or bzip2. 25 kernelPatches ? [] 26 - , ignoreConfigErrors ? stdenv.platform.name != "pc" 27 , extraMeta ? {} 28 , hostPlatform 29 , ... ··· 43 netfilterRPFilter = true; 44 } // features) kernelPatches; 45 46 - configWithPlatform = kernelPlatform: import ./common-config.nix { 47 - inherit stdenv version kernelPlatform extraConfig; 48 features = kernelFeatures; # Ensure we know of all extra patches, etc. 49 }; 50 - 51 - config = configWithPlatform stdenv.platform; 52 - configCross = configWithPlatform hostPlatform.platform; 53 54 kernelConfigFun = baseConfig: 55 let ··· 65 66 kernelConfig = kernelConfigFun config; 67 68 nativeBuildInputs = [ perl ]; 69 70 - platformName = stdenv.platform.name; 71 - kernelBaseConfig = stdenv.platform.kernelBaseConfig; 72 - kernelTarget = stdenv.platform.kernelTarget; 73 - autoModules = stdenv.platform.kernelAutoModules; 74 - preferBuiltin = stdenv.platform.kernelPreferBuiltin or false; 75 - arch = stdenv.platform.kernelArch; 76 - 77 - crossAttrs = let 78 - cp = hostPlatform.platform; 79 - in { 80 - arch = cp.kernelArch; 81 - platformName = cp.name; 82 - kernelBaseConfig = cp.kernelBaseConfig; 83 - kernelTarget = cp.kernelTarget; 84 - autoModules = cp.kernelAutoModules; 85 - 86 - # Just ignore all options that don't apply (We are lazy). 87 - ignoreConfigErrors = true; 88 - 89 - kernelConfig = kernelConfigFun configCross; 90 - 91 - inherit (kernel.crossDrv) src patches preUnpack; 92 - }; 93 94 prePatch = kernel.prePatch + '' 95 # Patch kconfig to print "###" after every question so that ··· 103 cd $buildRoot 104 105 # Get a basic config file for later refinement with $generateConfig. 106 - make -C ../$sourceRoot O=$PWD $kernelBaseConfig ARCH=$arch 107 108 # Create the config file. 109 echo "generating kernel configuration..." ··· 118 }; 119 120 kernel = buildLinux { 121 - inherit version modDirVersion src kernelPatches stdenv extraMeta; 122 - 123 - configfile = configfile.nativeDrv or configfile; 124 - 125 - crossConfigfile = configfile.crossDrv or configfile; 126 127 config = { CONFIG_MODULES = "y"; CONFIG_FW_LOADER = "m"; }; 128 - 129 - crossConfig = { CONFIG_MODULES = "y"; CONFIG_FW_LOADER = "m"; }; 130 }; 131 132 passthru = { ··· 134 passthru = kernel.passthru // (removeAttrs passthru [ "passthru" ]); 135 }; 136 137 - addPassthru' = lib.extendDerivation true passthru; 138 - 139 - nativeDrv = addPassthru' kernel.nativeDrv; 140 - 141 - crossDrv = addPassthru' kernel.crossDrv; 142 - 143 - in if kernel ? crossDrv 144 - then nativeDrv // { inherit nativeDrv crossDrv; } 145 - else addPassthru' kernel
··· 1 + { stdenv, buildPackages, perl, buildLinux 2 3 , # The kernel source tarball. 4 src ··· 23 # symbolic name and `patch' is the actual patch. The patch may 24 # optionally be compressed with gzip or bzip2. 25 kernelPatches ? [] 26 + , ignoreConfigErrors ? hostPlatform.platform.name != "pc" || 27 + hostPlatform != stdenv.buildPlatform 28 , extraMeta ? {} 29 , hostPlatform 30 , ... ··· 44 netfilterRPFilter = true; 45 } // features) kernelPatches; 46 47 + config = import ./common-config.nix { 48 + inherit stdenv version extraConfig; 49 + kernelPlatform = hostPlatform; 50 features = kernelFeatures; # Ensure we know of all extra patches, etc. 51 }; 52 53 kernelConfigFun = baseConfig: 54 let ··· 64 65 kernelConfig = kernelConfigFun config; 66 67 + depsBuildBuild = [ buildPackages.stdenv.cc ]; 68 nativeBuildInputs = [ perl ]; 69 70 + platformName = hostPlatform.platform.name; 71 + kernelBaseConfig = hostPlatform.platform.kernelBaseConfig; 72 + kernelTarget = hostPlatform.platform.kernelTarget; 73 + autoModules = hostPlatform.platform.kernelAutoModules; 74 + preferBuiltin = hostPlatform.platform.kernelPreferBuiltin or false; 75 + arch = hostPlatform.platform.kernelArch; 76 77 prePatch = kernel.prePatch + '' 78 # Patch kconfig to print "###" after every question so that ··· 86 cd $buildRoot 87 88 # Get a basic config file for later refinement with $generateConfig. 89 + make HOSTCC=${buildPackages.stdenv.cc.targetPrefix}gcc -C ../$sourceRoot O=$PWD $kernelBaseConfig ARCH=$arch 90 91 # Create the config file. 92 echo "generating kernel configuration..." ··· 101 }; 102 103 kernel = buildLinux { 104 + inherit version modDirVersion src kernelPatches stdenv extraMeta configfile; 105 106 config = { CONFIG_MODULES = "y"; CONFIG_FW_LOADER = "m"; }; 107 }; 108 109 passthru = { ··· 111 passthru = kernel.passthru // (removeAttrs passthru [ "passthru" ]); 112 }; 113 114 + in lib.extendDerivation true passthru kernel
+1 -1
pkgs/os-specific/linux/kernel/linux-4.13.nix
··· 1 - { stdenv, hostPlatform, fetchurl, perl, buildLinux, ... } @ args: 2 3 import ./generic.nix (args // rec { 4 version = "4.13.16";
··· 1 + { stdenv, buildPackages, hostPlatform, fetchurl, perl, buildLinux, ... } @ args: 2 3 import ./generic.nix (args // rec { 4 version = "4.13.16";
+1 -1
pkgs/os-specific/linux/kernel/linux-4.14.nix
··· 1 - { stdenv, hostPlatform, fetchurl, perl, buildLinux, ... } @ args: 2 3 with stdenv.lib; 4
··· 1 + { stdenv, buildPackages, hostPlatform, fetchurl, perl, buildLinux, ... } @ args: 2 3 with stdenv.lib; 4
+1 -1
pkgs/os-specific/linux/kernel/linux-4.4.nix
··· 1 - { stdenv, hostPlatform, fetchurl, perl, buildLinux, ... } @ args: 2 3 import ./generic.nix (args // rec { 4 version = "4.4.111";
··· 1 + { stdenv, buildPackages, hostPlatform, fetchurl, perl, buildLinux, ... } @ args: 2 3 import ./generic.nix (args // rec { 4 version = "4.4.111";
+1 -1
pkgs/os-specific/linux/kernel/linux-4.9.nix
··· 1 - { stdenv, hostPlatform, fetchurl, perl, buildLinux, ... } @ args: 2 3 import ./generic.nix (args // rec { 4 version = "4.9.76";
··· 1 + { stdenv, buildPackages, hostPlatform, fetchurl, perl, buildLinux, ... } @ args: 2 3 import ./generic.nix (args // rec { 4 version = "4.9.76";
+1 -1
pkgs/os-specific/linux/kernel/linux-beagleboard.nix
··· 1 - { stdenv, hostPlatform, fetchFromGitHub, perl, buildLinux, ... } @ args: 2 3 let 4 modDirVersion = "4.9.61";
··· 1 + { stdenv, buildPackages, hostPlatform, fetchFromGitHub, perl, buildLinux, ... } @ args: 2 3 let 4 modDirVersion = "4.9.61";
+1 -1
pkgs/os-specific/linux/kernel/linux-hardened-copperhead.nix
··· 1 - { stdenv, hostPlatform, fetchFromGitHub, perl, buildLinux, ... } @ args: 2 3 with stdenv.lib; 4
··· 1 + { stdenv, buildPackages, hostPlatform, fetchFromGitHub, perl, buildLinux, ... } @ args: 2 3 with stdenv.lib; 4
+1 -1
pkgs/os-specific/linux/kernel/linux-mptcp.nix
··· 1 - { stdenv, hostPlatform, fetchFromGitHub, perl, buildLinux, ... } @ args: 2 3 import ./generic.nix (rec { 4 mptcpVersion = "0.93";
··· 1 + { stdenv, buildPackages, hostPlatform, fetchFromGitHub, perl, buildLinux, ... } @ args: 2 3 import ./generic.nix (rec { 4 mptcpVersion = "0.93";
+1 -1
pkgs/os-specific/linux/kernel/linux-rpi.nix
··· 1 - { stdenv, hostPlatform, fetchFromGitHub, perl, buildLinux, ... } @ args: 2 3 let 4 modDirVersion = "4.9.59";
··· 1 + { stdenv, buildPackages, hostPlatform, fetchFromGitHub, perl, buildLinux, ... } @ args: 2 3 let 4 modDirVersion = "4.9.59";
+1 -1
pkgs/os-specific/linux/kernel/linux-samus-4.12.nix
··· 1 - { stdenv, hostPlatform, fetchFromGitHub, perl, buildLinux, ncurses, ... } @ args: 2 3 import ./generic.nix (args // rec { 4 version = "4.12.2";
··· 1 + { stdenv, buildPackages, hostPlatform, fetchFromGitHub, perl, buildLinux, ncurses, ... } @ args: 2 3 import ./generic.nix (args // rec { 4 version = "4.12.2";
+1 -1
pkgs/os-specific/linux/kernel/linux-testing-bcachefs.nix
··· 1 - { stdenv, hostPlatform, fetchgit, perl, buildLinux, ... } @ args: 2 3 import ./generic.nix (args // rec { 4 version = "4.11.2017.08.23";
··· 1 + { stdenv, buildPackages, hostPlatform, fetchgit, perl, buildLinux, ... } @ args: 2 3 import ./generic.nix (args // rec { 4 version = "4.11.2017.08.23";
+1 -1
pkgs/os-specific/linux/kernel/linux-testing.nix
··· 1 - { stdenv, hostPlatform, fetchurl, perl, buildLinux, libelf, utillinux, ... } @ args: 2 3 import ./generic.nix (args // rec { 4 version = "4.15-rc8";
··· 1 + { stdenv, buildPackages, hostPlatform, fetchurl, perl, buildLinux, libelf, utillinux, ... } @ args: 2 3 import ./generic.nix (args // rec { 4 version = "4.15-rc8";
+16 -32
pkgs/os-specific/linux/kernel/manual-config.nix
··· 1 - { runCommand, nettools, bc, perl, gmp, libmpc, mpfr, kmod, openssl 2 - , libelf ? null 3 - , utillinux ? null 4 , writeTextFile, ubootTools 5 , hostPlatform 6 }: ··· 26 src, 27 # Any patches 28 kernelPatches ? [], 29 - # Patches for native compiling only 30 - nativeKernelPatches ? [], 31 - # Patches for cross compiling only 32 - crossKernelPatches ? [], 33 - # The native kernel .config file 34 configfile, 35 - # The cross kernel .config file 36 - crossConfigfile ? configfile, 37 # Manually specified nixexpr representing the config 38 # If unspecified, this will be autodetected from the .config 39 config ? stdenv.lib.optionalAttrs allowImportFromDerivation (readConfig configfile), 40 - # Cross-compiling config 41 - crossConfig ? if allowImportFromDerivation then (readConfig crossConfigfile) else config, 42 # Use defaultMeta // extraMeta 43 extraMeta ? {}, 44 # Whether to utilize the controversial import-from-derivation feature to parse the config ··· 61 62 commonMakeFlags = [ 63 "O=$(buildRoot)" 64 - ] ++ stdenv.lib.optionals (stdenv.platform ? kernelMakeFlags) 65 - stdenv.platform.kernelMakeFlags; 66 67 drvAttrs = config_: platform: kernelPatches: configfile: 68 let ··· 105 echo "stripping FHS paths in \`$mf'..." 106 sed -i "$mf" -e 's|/usr/bin/||g ; s|/bin/||g ; s|/sbin/||g' 107 done 108 - sed -i Makefile -e 's|= depmod|= ${kmod}/bin/depmod|' 109 ''; 110 111 configurePhase = '' ··· 211 find -empty -type d -delete 212 213 # Remove reference to kmod 214 - sed -i Makefile -e 's|= ${kmod}/bin/depmod|= depmod|' 215 '' else optionalString installsFirmware '' 216 make firmware_install $makeFlags "''${makeFlagsArray[@]}" \ 217 $installFlags "''${installFlagsArray[@]}" ··· 239 240 assert stdenv.lib.versionAtLeast version "4.14" -> libelf != null; 241 assert stdenv.lib.versionAtLeast version "4.15" -> utillinux != null; 242 - stdenv.mkDerivation ((drvAttrs config stdenv.platform (kernelPatches ++ nativeKernelPatches) configfile) // { 243 name = "linux-${version}"; 244 245 enableParallelBuilding = true; 246 247 nativeBuildInputs = [ perl bc nettools openssl gmp libmpc mpfr ] 248 - ++ optional (stdenv.platform.kernelTarget == "uImage") ubootTools 249 ++ optional (stdenv.lib.versionAtLeast version "4.14") libelf 250 ++ optional (stdenv.lib.versionAtLeast version "4.15") utillinux 251 ; ··· 253 hardeningDisable = [ "bindnow" "format" "fortify" "stackprotector" "pic" ]; 254 255 makeFlags = commonMakeFlags ++ [ 256 - "ARCH=${stdenv.platform.kernelArch}" 257 ]; 258 259 - karch = stdenv.platform.kernelArch; 260 - 261 - crossAttrs = let cp = hostPlatform.platform; in 262 - (drvAttrs crossConfig cp (kernelPatches ++ crossKernelPatches) crossConfigfile) // { 263 - makeFlags = commonMakeFlags ++ [ 264 - "ARCH=${cp.kernelArch}" 265 - "CROSS_COMPILE=$(crossConfig)-" 266 - ]; 267 - 268 - karch = cp.kernelArch; 269 - 270 - nativeBuildInputs = optional (cp.kernelTarget == "uImage") ubootTools; 271 - }; 272 })
··· 1 + { buildPackages, runCommand, nettools, bc, perl, gmp, libmpc, mpfr, openssl 2 + , libelf 3 + , utillinux 4 , writeTextFile, ubootTools 5 , hostPlatform 6 }: ··· 26 src, 27 # Any patches 28 kernelPatches ? [], 29 + # The kernel .config file 30 configfile, 31 # Manually specified nixexpr representing the config 32 # If unspecified, this will be autodetected from the .config 33 config ? stdenv.lib.optionalAttrs allowImportFromDerivation (readConfig configfile), 34 # Use defaultMeta // extraMeta 35 extraMeta ? {}, 36 # Whether to utilize the controversial import-from-derivation feature to parse the config ··· 53 54 commonMakeFlags = [ 55 "O=$(buildRoot)" 56 + ] ++ stdenv.lib.optionals (hostPlatform.platform ? kernelMakeFlags) 57 + hostPlatform.platform.kernelMakeFlags; 58 59 drvAttrs = config_: platform: kernelPatches: configfile: 60 let ··· 97 echo "stripping FHS paths in \`$mf'..." 98 sed -i "$mf" -e 's|/usr/bin/||g ; s|/bin/||g ; s|/sbin/||g' 99 done 100 + sed -i Makefile -e 's|= depmod|= ${buildPackages.kmod}/bin/depmod|' 101 ''; 102 103 configurePhase = '' ··· 203 find -empty -type d -delete 204 205 # Remove reference to kmod 206 + sed -i Makefile -e 's|= ${buildPackages.kmod}/bin/depmod|= depmod|' 207 '' else optionalString installsFirmware '' 208 make firmware_install $makeFlags "''${makeFlagsArray[@]}" \ 209 $installFlags "''${installFlagsArray[@]}" ··· 231 232 assert stdenv.lib.versionAtLeast version "4.14" -> libelf != null; 233 assert stdenv.lib.versionAtLeast version "4.15" -> utillinux != null; 234 + stdenv.mkDerivation ((drvAttrs config hostPlatform.platform kernelPatches configfile) // { 235 name = "linux-${version}"; 236 237 enableParallelBuilding = true; 238 239 + depsBuildBuild = [ buildPackages.stdenv.cc ]; 240 nativeBuildInputs = [ perl bc nettools openssl gmp libmpc mpfr ] 241 + ++ optional (stdenv.hostPlatform.platform.kernelTarget == "uImage") buildPackages.ubootTools 242 ++ optional (stdenv.lib.versionAtLeast version "4.14") libelf 243 ++ optional (stdenv.lib.versionAtLeast version "4.15") utillinux 244 ; ··· 246 hardeningDisable = [ "bindnow" "format" "fortify" "stackprotector" "pic" ]; 247 248 makeFlags = commonMakeFlags ++ [ 249 + "HOSTCC=${buildPackages.stdenv.cc.targetPrefix}gcc" 250 + "ARCH=${stdenv.hostPlatform.platform.kernelArch}" 251 + ] ++ stdenv.lib.optional (stdenv.hostPlatform != stdenv.buildPlatform) [ 252 + "CROSS_COMPILE=${stdenv.cc.targetPrefix}" 253 ]; 254 255 + karch = hostPlatform.platform.kernelArch; 256 })
+4 -14
pkgs/os-specific/linux/kernel/perf.nix
··· 1 { lib, stdenv, kernel, elfutils, python, perl, newt, slang, asciidoc, xmlto, makeWrapper 2 , docbook_xsl, docbook_xml_dtd_45, libxslt, flex, bison, pkgconfig, libunwind, binutils 3 - , libiberty, libaudit 4 , zlib, withGtk ? false, gtk2 ? null }: 5 6 with lib; ··· 11 stdenv.mkDerivation { 12 name = "perf-linux-${kernel.version}"; 13 14 - inherit (kernel) src; 15 16 preConfigure = '' 17 cd tools/perf ··· 21 ''; 22 23 # perf refers both to newt and slang 24 - # binutils is required for libbfd. 25 nativeBuildInputs = [ asciidoc xmlto docbook_xsl docbook_xml_dtd_45 libxslt 26 - flex bison libiberty libaudit makeWrapper pkgconfig ]; 27 - buildInputs = [ elfutils python perl newt slang libunwind binutils zlib ] ++ 28 stdenv.lib.optional withGtk gtk2; 29 30 # Note: we don't add elfutils to buildInputs, since it provides a ··· 46 wrapProgram $out/bin/perf \ 47 --prefix PATH : "${binutils}/bin" 48 ''; 49 - 50 - crossAttrs = { 51 - /* I don't want cross-python or cross-perl - 52 - I don't know if cross-python even works */ 53 - propagatedBuildInputs = [ elfutils.crossDrv newt.crossDrv ]; 54 - makeFlags = "CROSS_COMPILE=${stdenv.cc.targetPrefix}"; 55 - elfutils = elfutils.crossDrv; 56 - inherit (kernel.crossDrv) src patches; 57 - }; 58 59 meta = { 60 homepage = https://perf.wiki.kernel.org/;
··· 1 { lib, stdenv, kernel, elfutils, python, perl, newt, slang, asciidoc, xmlto, makeWrapper 2 , docbook_xsl, docbook_xml_dtd_45, libxslt, flex, bison, pkgconfig, libunwind, binutils 3 + , libiberty, libaudit, libbfd 4 , zlib, withGtk ? false, gtk2 ? null }: 5 6 with lib; ··· 11 stdenv.mkDerivation { 12 name = "perf-linux-${kernel.version}"; 13 14 + inherit (kernel) src makeFlags; 15 16 preConfigure = '' 17 cd tools/perf ··· 21 ''; 22 23 # perf refers both to newt and slang 24 nativeBuildInputs = [ asciidoc xmlto docbook_xsl docbook_xml_dtd_45 libxslt 25 + flex bison libiberty libaudit makeWrapper pkgconfig python perl ]; 26 + buildInputs = [ elfutils newt slang libunwind libbfd zlib ] ++ 27 stdenv.lib.optional withGtk gtk2; 28 29 # Note: we don't add elfutils to buildInputs, since it provides a ··· 45 wrapProgram $out/bin/perf \ 46 --prefix PATH : "${binutils}/bin" 47 ''; 48 49 meta = { 50 homepage = https://perf.wiki.kernel.org/;
+1 -1
pkgs/servers/x11/xorg/overrides.nix
··· 546 "--with-sha1=CommonCrypto" 547 ]; 548 preConfigure = '' 549 - ensureDir $out/Applications 550 export NIX_CFLAGS_COMPILE="$NIX_CFLAGS_COMPILE -Wno-error" 551 substituteInPlace hw/xquartz/pbproxy/Makefile.in --replace -F/System -F${args.apple_sdk.frameworks.ApplicationServices} 552 '';
··· 546 "--with-sha1=CommonCrypto" 547 ]; 548 preConfigure = '' 549 + mkdir -p $out/Applications 550 export NIX_CFLAGS_COMPILE="$NIX_CFLAGS_COMPILE -Wno-error" 551 substituteInPlace hw/xquartz/pbproxy/Makefile.in --replace -F/System -F${args.apple_sdk.frameworks.ApplicationServices} 552 '';
+1 -1
pkgs/stdenv/darwin/default.nix
··· 375 xz.out xz.bin libcxx libcxxabi gmp.out gnumake findutils bzip2.out 376 bzip2.bin llvmPackages.llvm llvmPackages.llvm.lib zlib.out zlib.dev libffi.out coreutils ed diffutils gnutar 377 gzip ncurses.out ncurses.dev ncurses.man gnused bash gawk 378 - gnugrep llvmPackages.clang-unwrapped patch pcre.out gettext 379 binutils-raw.bintools binutils binutils.bintools 380 cc.expand-response-params 381 ]) ++ (with pkgs.darwin; [
··· 375 xz.out xz.bin libcxx libcxxabi gmp.out gnumake findutils bzip2.out 376 bzip2.bin llvmPackages.llvm llvmPackages.llvm.lib zlib.out zlib.dev libffi.out coreutils ed diffutils gnutar 377 gzip ncurses.out ncurses.dev ncurses.man gnused bash gawk 378 + gnugrep llvmPackages.clang-unwrapped llvmPackages.clang-unwrapped.lib patch pcre.out gettext 379 binutils-raw.bintools binutils binutils.bintools 380 cc.expand-response-params 381 ]) ++ (with pkgs.darwin; [
-10
pkgs/stdenv/generic/setup.sh
··· 188 addToSearchPathWithCustomDelimiter "${PATH_DELIMITER}" "$@" 189 } 190 191 - 192 - ensureDir() { 193 - echo "warning: ‘ensureDir’ is deprecated; use ‘mkdir’ instead" >&2 194 - local dir 195 - for dir in "$@"; do 196 - if ! [ -x "$dir" ]; then mkdir -p "$dir"; fi 197 - done 198 - } 199 - 200 - 201 # Add $1/lib* into rpaths. 202 # The function is used in multiple-outputs.sh hook, 203 # so it is defined here but tried after the hook.
··· 188 addToSearchPathWithCustomDelimiter "${PATH_DELIMITER}" "$@" 189 } 190 191 # Add $1/lib* into rpaths. 192 # The function is used in multiple-outputs.sh hook, 193 # so it is defined here but tried after the hook.
+2
pkgs/tools/archivers/sharutils/default.nix
··· 28 in '' 29 substituteInPlace tests/shar-1 --replace '${shar_sub}' '${shar_sub} -s submitter' 30 substituteInPlace tests/shar-2 --replace '${shar_sub}' '${shar_sub} -s submitter' 31 ''; 32 33 doCheck = true;
··· 28 in '' 29 substituteInPlace tests/shar-1 --replace '${shar_sub}' '${shar_sub} -s submitter' 30 substituteInPlace tests/shar-2 --replace '${shar_sub}' '${shar_sub} -s submitter' 31 + 32 + substituteInPlace intl/Makefile.in --replace "AR = ar" "" 33 ''; 34 35 doCheck = true;
-4
pkgs/tools/compression/brotli/default.nix
··· 21 # and the wonderful bazel BUILD file is already there (yay case-insensitivity?) 22 prePatch = "rm BUILD"; 23 24 - preConfigure = stdenv.lib.optionalString stdenv.isDarwin '' 25 - cmakeFlagsArray+=("-DCMAKE_INSTALL_NAME_DIR=$lib/lib") 26 - ''; 27 - 28 meta = with stdenv.lib; { 29 inherit (src.meta) homepage; 30
··· 21 # and the wonderful bazel BUILD file is already there (yay case-insensitivity?) 22 prePatch = "rm BUILD"; 23 24 meta = with stdenv.lib; { 25 inherit (src.meta) homepage; 26
+2 -2
pkgs/tools/filesystems/e2fsprogs/default.nix
··· 1 { stdenv, fetchurl, pkgconfig, libuuid, gettext, texinfo }: 2 3 stdenv.mkDerivation rec { 4 - name = "e2fsprogs-1.43.7"; 5 6 src = fetchurl { 7 url = "mirror://sourceforge/e2fsprogs/${name}.tar.gz"; 8 - sha256 = "1i51w5l45zhz3i98k92xbbvkqklvjrvw3zvqky3gk9cdmqp5y0w7"; 9 }; 10 11 outputs = [ "bin" "dev" "out" "man" "info" ];
··· 1 { stdenv, fetchurl, pkgconfig, libuuid, gettext, texinfo }: 2 3 stdenv.mkDerivation rec { 4 + name = "e2fsprogs-1.43.8"; 5 6 src = fetchurl { 7 url = "mirror://sourceforge/e2fsprogs/${name}.tar.gz"; 8 + sha256 = "1pn33rap3lcjm3gx07pmgyhx4j634gja63phmi4g5dq8yj0z8ciz"; 9 }; 10 11 outputs = [ "bin" "dev" "out" "man" "info" ];
+2 -2
pkgs/tools/networking/bud/default.nix
··· 14 buildInputs = [ 15 python gyp 16 ] ++ lib.optional stdenv.isLinux utillinux; 17 - 18 buildPhase = '' 19 python ./gyp_bud -f make 20 make -C out 21 ''; 22 23 installPhase = '' 24 - ensureDir $out/bin 25 cp out/Release/bud $out/bin 26 ''; 27
··· 14 buildInputs = [ 15 python gyp 16 ] ++ lib.optional stdenv.isLinux utillinux; 17 + 18 buildPhase = '' 19 python ./gyp_bud -f make 20 make -C out 21 ''; 22 23 installPhase = '' 24 + mkdir -p $out/bin 25 cp out/Release/bud $out/bin 26 ''; 27
+1 -1
pkgs/top-level/all-packages.nix
··· 10275 10276 ncurses5 = callPackage ../development/libraries/ncurses { abiVersion = "5"; }; 10277 ncurses6 = callPackage ../development/libraries/ncurses { abiVersion = "6"; }; 10278 - ncurses = if stdenv.isDarwin then ncurses5 else ncurses6; 10279 10280 neardal = callPackage ../development/libraries/neardal { }; 10281
··· 10275 10276 ncurses5 = callPackage ../development/libraries/ncurses { abiVersion = "5"; }; 10277 ncurses6 = callPackage ../development/libraries/ncurses { abiVersion = "6"; }; 10278 + ncurses = ncurses6; 10279 10280 neardal = callPackage ../development/libraries/neardal { }; 10281