···4949 };
50505151 extraConfig = mkOption {
5252- type = types.str;
5252+ type = types.lines;
5353 default = "";
5454 description = ''
5555 Extra directives added to to the end of MPD's configuration file,
+1
nixos/modules/services/backup/bacula.nix
···340340341341 extraConfig = mkOption {
342342 default = "";
343343+ type = types.lines;
343344 description = ''
344345 Extra configuration for Bacula Director Daemon.
345346 '';
···2828 };
2929 serviceConfig = {
3030 ExecStart = "${pkgs.brltty}/bin/brltty --no-daemon";
3131- Type = "simple"; # Change to notidy after next releae
3131+ Type = "notify";
3232 TimeoutStartSec = 5;
3333 TimeoutStopSec = 10;
3434 Restart = "always";
+1-1
nixos/modules/services/hardware/tlp.nix
···4040 };
41414242 extraConfig = mkOption {
4343- type = types.str;
4343+ type = types.lines;
4444 default = "";
4545 description = "Additional configuration variables for TLP";
4646 };
+1-1
nixos/modules/services/mail/dovecot.nix
···111111 };
112112113113 extraConfig = mkOption {
114114- type = types.str;
114114+ type = types.lines;
115115 default = "";
116116 example = "mail_debug = yes";
117117 description = "Additional entries to put verbatim into Dovecot's config file.";
+1-1
nixos/modules/services/misc/bepasty.nix
···5353 };
54545555 extraConfig = mkOption {
5656- type = types.str;
5656+ type = types.lines;
5757 description = ''
5858 Extra configuration for bepasty server to be appended on the
5959 configuration.
···7171 };
72727373 extraConfig = mkOption {
7474- type = types.str;
7474+ type = types.lines;
7575 default = "";
7676 description = "Extra configuration in configuration.yml";
7777 };
+1-1
nixos/modules/services/monitoring/bosun.nix
···107107 };
108108109109 extraConfig = mkOption {
110110- type = types.string;
110110+ type = types.lines;
111111 default = "";
112112 description = ''
113113 Extra configuration options for Bosun. You should describe your
···153153 '';
154154 };
155155 extraConfig = mkOption {
156156+ type = types.lines;
156157 default = "";
157158 example = ''
158159 # specify whether SSL is required
···173174 replication = {
174175 enable = mkEnableOption "XtreemFS DIR replication plugin";
175176 extraConfig = mkOption {
177177+ type = types.lines;
176178 example = ''
177179 # participants of the replication including this replica
178180 babudb.repl.participant.0 = 192.168.0.10
···269271 '';
270272 };
271273 extraConfig = mkOption {
274274+ type = types.lines;
272275 example = ''
273276 osd_check_interval = 300
274277 no_atime = true
···307310 replication = {
308311 enable = mkEnableOption "XtreemFS MRC replication plugin";
309312 extraConfig = mkOption {
313313+ type = types.lines;
310314 example = ''
311315 # participants of the replication including this replica
312316 babudb.repl.participant.0 = 192.168.0.10
···385389 '';
386390 };
387391 extraConfig = mkOption {
392392+ type = types.lines;
388393 example = ''
389394 local_clock_renewal = 0
390395 remote_time_sync = 30000
+19-5
nixos/modules/services/networking/atftpd.nix
···2020 default = false;
2121 type = types.bool;
2222 description = ''
2323- Whenever to enable the atftpd TFTP server.
2323+ Whether to enable the atftpd TFTP server. By default, the server
2424+ binds to address 0.0.0.0.
2525+ '';
2626+ };
2727+2828+ extraOptions = mkOption {
2929+ default = [];
3030+ type = types.listOf types.str;
3131+ example = literalExample ''
3232+ [ "--bind-address 192.168.9.1"
3333+ "--verbose=7"
3434+ ]
3535+ '';
3636+ description = ''
3737+ Extra command line arguments to pass to atftp.
2438 '';
2539 };
26402741 root = mkOption {
2828- default = "/var/empty";
2929- type = types.str;
4242+ default = "/srv/tftp";
4343+ type = types.path;
3044 description = ''
3145 Document root directory for the atftpd.
3246 '';
···3953 config = mkIf cfg.enable {
40544155 systemd.services.atftpd = {
4242- description = "atftpd TFTP server";
5656+ description = "TFTP Server";
4357 after = [ "network.target" ];
4458 wantedBy = [ "multi-user.target" ];
4559 # runs as nobody
4646- serviceConfig.ExecStart = "${pkgs.atftp}/sbin/atftpd --daemon --no-fork --bind-address 0.0.0.0 ${cfg.root}";
6060+ serviceConfig.ExecStart = "${pkgs.atftp}/sbin/atftpd --daemon --no-fork ${lib.concatStringsSep " " cfg.extraOptions} ${cfg.root}";
4761 };
48624963 };
+1
nixos/modules/services/networking/bind.nix
···113113 };
114114115115 extraConfig = mkOption {
116116+ type = types.lines;
116117 default = "";
117118 description = "
118119 Extra lines to be added verbatim to the generated named configuration file.
+1
nixos/modules/services/networking/chrony.nix
···5151 };
52525353 extraConfig = mkOption {
5454+ type = types.lines;
5455 default = "";
5556 description = ''
5657 Extra configuration directives that should be added to
···89899090 extraConfig = mkOption {
9191 default = "";
9292- type = str;
9292+ type = lines;
9393 description = ''
9494 Extra configuration. Contents will be added verbatim to the configuration file.
9595 '';
···140140 ieee80211n=1
141141 ht_capab=[HT40-][SHORT-GI-40][DSSS_CCK-40]
142142 '';
143143- type = types.string;
143143+ type = types.lines;
144144 description = "Extra configuration options to put in hostapd.conf.";
145145 };
146146 };
+1-1
nixos/modules/services/networking/kippo.nix
···4646 };
4747 extraConfig = mkOption {
4848 default = "";
4949- type = types.string;
4949+ type = types.lines;
5050 description = ''Extra verbatim configuration added to the end of kippo.cfg.'';
5151 };
5252 };
+1-1
nixos/modules/services/networking/murmur.nix
···230230 };
231231232232 extraConfig = mkOption {
233233- type = types.str;
233233+ type = types.lines;
234234 default = "";
235235 description = "Extra configuration to put into mumur.ini.";
236236 };
+1-1
nixos/modules/services/networking/openfire.nix
···4747 export HOME=/tmp
4848 mkdir /var/log/openfire || true
4949 mkdir /etc/openfire || true
5050- for i in ${openfire}/conf.inst/*; do
5050+ for i in ${pkgs.openfire}/conf.inst/*; do
5151 if ! test -f /etc/openfire/$(basename $i); then
5252 cp $i /etc/openfire/
5353 fi
+1
nixos/modules/services/networking/prayer.nix
···5656 };
57575858 extraConfig = mkOption {
5959+ type = types.lines;
5960 default = "" ;
6061 description = ''
6162 Extra configuration. Contents will be added verbatim to the configuration file.
···1313 default = false;
1414 description = ''
1515 Whether to enable tftpd, a Trivial File Transfer Protocol server.
1616+ The server will be run as an xinetd service.
1617 '';
1718 };
18191920 services.tftpd.path = mkOption {
2021 type = types.path;
2121- default = "/home/tftp";
2222+ default = "/srv/tftp";
2223 description = ''
2324 Where the tftp server files are stored.
2425 '';
+1-1
nixos/modules/services/networking/unbound.nix
···79798080 extraConfig = mkOption {
8181 default = "";
8282- type = types.str;
8282+ type = types.lines;
8383 description = ''
8484 Extra unbound config. See
8585 <citerefentry><refentrytitle>unbound.conf</refentrytitle><manvolnum>8
+1-1
nixos/modules/services/networking/xinetd.nix
···124124 };
125125126126 extraConfig = mkOption {
127127- type = types.string;
127127+ type = types.lines;
128128 default = "";
129129 description = "Extra configuration-lines added to the section of the service.";
130130 };
+111-61
nixos/modules/services/networking/znc.nix
···2626 };
27272828 # Keep znc.conf in nix store, then symlink or copy into `dataDir`, depending on `mutable`.
2929+ notNull = a: ! isNull a;
2930 mkZncConf = confOpts: ''
3030- // Also check http://en.znc.in/wiki/Configuration
3131-3232- AnonIPLimit = 10
3333- ConnectDelay = 5
3434- # Add `LoadModule = x` for each module...
3131+ Version = 1.6.3
3532 ${concatMapStrings (n: "LoadModule = ${n}\n") confOpts.modules}
3636- MaxBufferSize = 500
3737- ProtectWebSessions = true
3838- SSLCertFile = ${cfg.dataDir}/znc.pem
3939- ServerThrottle = 30
4040- Skin = dark-clouds
4141- StatusPrefix = *
4242- Version = 1.2
43334444- <Listener listener0>
4545- AllowIRC = true
4646- AllowWeb = true
3434+ <Listener l>
3535+ Port = ${toString confOpts.port}
4736 IPv4 = true
4848- IPv6 = false
4949- Port = ${if confOpts.useSSL then "+" else ""}${toString confOpts.port}
3737+ IPv6 = true
5038 SSL = ${if confOpts.useSSL then "true" else "false"}
5139 </Listener>
52405341 <User ${confOpts.userName}>
4242+ ${confOpts.passBlock}
5443 Admin = true
5555- Allow = *
4444+ Nick = ${confOpts.nick}
5645 AltNick = ${confOpts.nick}_
5757- AppendTimestamp = false
5858- AutoClearChanBuffer = false
5959- Buffer = 150
6060- ChanModes = +stn
6161- DenyLoadMod = false
6262- DenySetBindHost = false
6363- Ident = ident
6464- JoinTries = 10
6565- MaxJoins = 0
6666- MaxNetworks = 1
6767- MultiClients = true
6868- Nick = ${confOpts.nick}
6969- PrependTimestamp = true
7070- QuitMsg = Quit
4646+ Ident = ${confOpts.nick}
7147 RealName = ${confOpts.nick}
7272- TimestampFormat = [%H:%M:%S]
7348 ${concatMapStrings (n: "LoadModule = ${n}\n") confOpts.userModules}
7474-7575- ${confOpts.passBlock}
4949+5050+ ${ lib.concatStringsSep "\n" (lib.mapAttrsToList (name: net: ''
5151+ <Network ${name}>
5252+ ${concatMapStrings (m: "LoadModule = ${m}\n") net.modules}
5353+ Server = ${net.server} ${if net.useSSL then "+" else ""}${toString net.port}
5454+5555+ ${concatMapStrings (c: "<Chan #${c}>\n</Chan>\n") net.channels}
5656+ </Network>
5757+ '') confOpts.networks) }
7658 </User>
7759 ${confOpts.extraZncConf}
7860 '';
···8466 else mkZncConf cfg.confOptions;
8567 };
86686969+ networkOpts = { ... }: {
7070+ options = {
7171+ server = mkOption {
7272+ type = types.str;
7373+ example = "chat.freenode.net";
7474+ description = ''
7575+ IRC server address.
7676+ '';
7777+ };
7878+7979+ port = mkOption {
8080+ type = types.int;
8181+ default = 6697;
8282+ example = 6697;
8383+ description = ''
8484+ IRC server port.
8585+ '';
8686+ };
8787+8888+ useSSL = mkOption {
8989+ type = types.bool;
9090+ default = true;
9191+ description = ''
9292+ Whether to use SSL to connect to the IRC server.
9393+ '';
9494+ };
9595+9696+ modulePackages = mkOption {
9797+ type = types.listOf types.package;
9898+ default = [];
9999+ example = [ "pkgs.zncModules.push" "pkgs.zncModules.fish" ];
100100+ description = ''
101101+ External ZNC modules to build.
102102+ '';
103103+ };
104104+105105+ modules = mkOption {
106106+ type = types.listOf types.str;
107107+ default = [ "simple_away" ];
108108+ example = literalExample "[ simple_away sasl ]";
109109+ description = ''
110110+ ZNC modules to load.
111111+ '';
112112+ };
113113+114114+ channels = mkOption {
115115+ type = types.listOf types.str;
116116+ default = [];
117117+ example = [ "nixos" ];
118118+ description = ''
119119+ IRC channels to join.
120120+ '';
121121+ };
122122+ };
123123+ };
124124+87125in
8812689127{
···111149 '';
112150 };
113151152152+ group = mkOption {
153153+ default = "";
154154+ example = "users";
155155+ type = types.string;
156156+ description = ''
157157+ Group to own the ZNCserver process.
158158+ '';
159159+ };
160160+114161 dataDir = mkOption {
115162 default = "/var/lib/znc/";
116163 example = "/home/john/.znc/";
···125172 example = "See: http://wiki.znc.in/Configuration";
126173 type = types.lines;
127174 description = ''
128128- The contents of the `znc.conf` file to use when creating it.
175175+ Config file as generated with `znc --makeconf` to use for the whole ZNC configuration.
129176 If specified, `confOptions` will be ignored, and this value, as-is, will be used.
130177 If left empty, a conf file with default values will be used.
131131- Recommended to generate with `znc --makeconf` command.
132178 '';
133179 };
134180135135- /* TODO: add to the documentation of the current module:
136136-137137- Values to use when creating a `znc.conf` file.
138138-139139- confOptions = {
140140- modules = [ "log" ];
141141- userName = "john";
142142- nick = "johntron";
143143- };
144144- */
145181 confOptions = {
146182 modules = mkOption {
147183 type = types.listOf types.str;
148148- default = [ "partyline" "webadmin" "adminlog" "log" ];
184184+ default = [ "webadmin" "adminlog" ];
149185 example = [ "partyline" "webadmin" "adminlog" "log" ];
150186 description = ''
151187 A list of modules to include in the `znc.conf` file.
···154190155191 userModules = mkOption {
156192 type = types.listOf types.str;
157157- default = [ ];
158158- example = [ "fish" "push" ];
193193+ default = [ "chansaver" "controlpanel" ];
194194+ example = [ "chansaver" "controlpanel" "fish" "push" ];
159195 description = ''
160196 A list of user modules to include in the `znc.conf` file.
161197 '';
···166202 example = "johntron";
167203 type = types.string;
168204 description = ''
169169- The user name to use when generating the `znc.conf` file.
170170- This is the user name used by the user logging into the ZNC web admin.
205205+ The user name used to log in to the ZNC web admin interface.
171206 '';
172207 };
173208209209+ networks = mkOption {
210210+ default = { };
211211+ type = types.loaOf types.optionSet;
212212+ description = ''
213213+ IRC networks to connect the user to.
214214+ '';
215215+ options = [ networkOpts ];
216216+ example = {
217217+ "freenode" = {
218218+ server = "chat.freenode.net";
219219+ port = 6697;
220220+ ssl = true;
221221+ modules = [ "simple_away" ];
222222+ };
223223+ };
224224+ };
225225+174226 nick = mkOption {
175227 default = "znc-user";
176228 example = "john";
177229 type = types.string;
178230 description = ''
179179- The IRC nick to use when generating the `znc.conf` file.
231231+ The IRC nick.
180232 '';
181233 };
182234183235 passBlock = mkOption {
184184- default = defaultPassBlock;
185185- example = "Must be the block generated by the `znc --makepass` command.";
236236+ example = defaultPassBlock;
186237 type = types.string;
187238 description = ''
188188- The pass block to use when generating the `znc.conf` file.
189189- This is the password used by the user logging into the ZNC web admin.
190190- This is the block generated by the `znc --makepass` command.
191191- !!! If not specified, please change this after starting the service. !!!
239239+ Generate with znc --makepass.
240240+ This is the password used to log in to the ZNC web admin interface.
192241 '';
193242 };
194243···206255 example = true;
207256 type = types.bool;
208257 description = ''
209209- Indicates whether the ZNC server should use SSL when listening on the specified port.
258258+ Indicates whether the ZNC server should use SSL when listening on the specified port. A self-signed certificate will be generated.
210259 '';
211260 };
212261···214263 default = "";
215264 type = types.lines;
216265 description = ''
217217- Extra config to `znc.conf` file
266266+ Extra config to `znc.conf` file.
218267 '';
219268 };
220269 };
···265314 after = [ "network.service" ];
266315 serviceConfig = {
267316 User = cfg.user;
317317+ Group = cfg.group;
268318 Restart = "always";
269319 ExecReload = "${pkgs.coreutils}/bin/kill -HUP $MAINPID";
270320 ExecStop = "${pkgs.coreutils}/bin/kill -INT $MAINPID";
···438438 < image/repositories)
439439440440 for l in image/*/layer.tar; do
441441- ls_tar image/*/layer.tar >> baseFiles
441441+ ls_tar $l >> baseFiles
442442 done
443443 fi
444444
···11+Change the name of the library directory to match the version of the package.
22+33+diff -Naur ATS2-Postiats-0.2.11/configure postiats-new/configure
44+--- ATS2-Postiats-0.2.11/configure 2016-10-13 12:03:20.000000000 -0400
55++++ postiats-new/configure 2016-10-23 20:17:29.912579618 -0400
66+@@ -1,6 +1,6 @@
77+ #! /bin/sh
88+ # Guess values for system-dependent variables and create Makefiles.
99+-# Generated by GNU Autoconf 2.69 for ATS2/Postiats 0.2.10.
1010++# Generated by GNU Autoconf 2.69 for ATS2/Postiats 0.2.11.
1111+ #
1212+ # Report bugs to <gmpostiats@gmail.com>.
1313+ #
1414+@@ -580,8 +580,8 @@
1515+ # Identity of this package.
1616+ PACKAGE_NAME='ATS2/Postiats'
1717+ PACKAGE_TARNAME='ats2-postiats'
1818+-PACKAGE_VERSION='0.2.10'
1919+-PACKAGE_STRING='ATS2/Postiats 0.2.10'
2020++PACKAGE_VERSION='0.2.11'
2121++PACKAGE_STRING='ATS2/Postiats 0.2.11'
2222+ PACKAGE_BUGREPORT='gmpostiats@gmail.com'
2323+ PACKAGE_URL=''
2424+2525+@@ -1242,7 +1242,7 @@
2626+ # Omit some internal or obsolete options to make the list less imposing.
2727+ # This message is too long to be a string in the A/UX 3.1 sh.
2828+ cat <<_ACEOF
2929+-\`configure' configures ATS2/Postiats 0.2.10 to adapt to many kinds of systems.
3030++\`configure' configures ATS2/Postiats 0.2.11 to adapt to many kinds of systems.
3131+3232+ Usage: $0 [OPTION]... [VAR=VALUE]...
3333+3434+@@ -1304,7 +1304,7 @@
3535+3636+ if test -n "$ac_init_help"; then
3737+ case $ac_init_help in
3838+- short | recursive ) echo "Configuration of ATS2/Postiats 0.2.10:";;
3939++ short | recursive ) echo "Configuration of ATS2/Postiats 0.2.11:";;
4040+ esac
4141+ cat <<\_ACEOF
4242+4343+@@ -1384,7 +1384,7 @@
4444+ test -n "$ac_init_help" && exit $ac_status
4545+ if $ac_init_version; then
4646+ cat <<\_ACEOF
4747+-ATS2/Postiats configure 0.2.10
4848++ATS2/Postiats configure 0.2.11
4949+ generated by GNU Autoconf 2.69
5050+5151+ Copyright (C) 2012 Free Software Foundation, Inc.
5252+@@ -1936,7 +1936,7 @@
5353+ This file contains any messages produced by compilers while
5454+ running configure, to aid debugging if configure makes a mistake.
5555+5656+-It was created by ATS2/Postiats $as_me 0.2.10, which was
5757++It was created by ATS2/Postiats $as_me 0.2.11, which was
5858+ generated by GNU Autoconf 2.69. Invocation command line was
5959+6060+ $ $0 $@
6161+@@ -4226,7 +4226,7 @@
6262+ # report actual input values of CONFIG_FILES etc. instead of their
6363+ # values after options handling.
6464+ ac_log="
6565+-This file was extended by ATS2/Postiats $as_me 0.2.10, which was
6666++This file was extended by ATS2/Postiats $as_me 0.2.11, which was
6767+ generated by GNU Autoconf 2.69. Invocation command line was
6868+6969+ CONFIG_FILES = $CONFIG_FILES
7070+@@ -4288,7 +4288,7 @@
7171+ cat >>$CONFIG_STATUS <<_ACEOF || ac_write_fail=1
7272+ ac_cs_config="`$as_echo "$ac_configure_args" | sed 's/^ //; s/[\\""\`\$]/\\\\&/g'`"
7373+ ac_cs_version="\\
7474+-ATS2/Postiats config.status 0.2.10
7575++ATS2/Postiats config.status 0.2.11
7676+ configured by $0, generated by GNU Autoconf 2.69,
7777+ with options \\"\$ac_cs_config\\"
7878+7979+diff -Naur ATS2-Postiats-0.2.11/src/CBOOT/config.h postiats-new/src/CBOOT/config.h
8080+--- ATS2-Postiats-0.2.11/src/CBOOT/config.h 2016-10-13 12:03:20.000000000 -0400
8181++++ postiats-new/src/CBOOT/config.h 2016-10-23 20:16:34.613836556 -0400
8282+@@ -44,7 +44,7 @@
8383+ #define PACKAGE_NAME "ATS2/Postiats"
8484+8585+ /* Define to the full name and version of this package. */
8686+-#define PACKAGE_STRING "ATS2/Postiats 0.2.10"
8787++#define PACKAGE_STRING "ATS2/Postiats 0.2.11"
8888+8989+ /* Define to the one symbol short name of this package. */
9090+ #define PACKAGE_TARNAME "ats2-postiats"
9191+@@ -53,7 +53,7 @@
9292+ #define PACKAGE_URL ""
9393+9494+ /* Define to the version of this package. */
9595+-#define PACKAGE_VERSION "0.2.10"
9696++#define PACKAGE_VERSION "0.2.11"
9797+9898+ /* The size of `void*', as computed by sizeof. */
9999+ #define SIZEOF_VOIDP 8
···22index ce26bd7..9a98cc7 100644
33--- a/packages/net/_test.pony
44+++ b/packages/net/_test.pony
55-@@ -5,11 +5,7 @@ actor Main is TestList
55+@@ -5,9 +5,7 @@ actor Main is TestList
66 new make() => None
7788 fun tag tests(test: PonyTest) =>
99- test(_TestBroadcast)
1010- test(_TestTCPWritev)
1111-- ifdef not windows then
1212-- test(_TestTCPExpect)
1313-- end
1111+- test(_TestTCPExpect)
1412+ None
15131614 class _TestPing is UDPNotify
···6969 doCheck = false;
7070 doInstallCheck = doCheck;
71717272- postFixup = attrs.postFixup or ''
7272+ postFixup = ''
7373 wrapPythonPrograms
7474 '' + lib.optionalString catchConflicts ''
7575 # check if we have two packages with the same name in closure and fail
7676 # this shouldn't happen, something went wrong with dependencies specs
7777 ${python.interpreter} ${./catch_conflicts.py}
7878- '';
7878+ '' + attrs.postFixup or '''';
79798080 passthru = {
8181 inherit python; # The python interpreter
···11-WGET_ARGS=( http://download.kde.org/stable/frameworks/5.26/ -A '*.tar.xz' )
11+WGET_ARGS=( http://download.kde.org/stable/frameworks/5.27/ -A '*.tar.xz' )
···4141 sha256 = "1l0w12czavgs0wzw1c594g358ilvfg2fn32cn8z7pv84zxj4g429";
4242 };
43434444- postPatch =
4444+ preConfigure =
4545 let ippicvVersion = "20151201";
4646 ippicvPlatform = if stdenv.system == "x86_64-linux" || stdenv.system == "i686-linux" then "linux"
4747 else throw "ICV is not available for this platform (or not yet supported by this package)";
···34343535 inherit blas64;
36363737+ # Some hardening features are disabled due to sporadic failures in
3838+ # OpenBLAS-based programs. The problem may not be with OpenBLAS itself, but
3939+ # with how these flags interact with hardening measures used downstream.
4040+ # In either case, OpenBLAS must only be used by trusted code--it is
4141+ # inherently unsuitable for security-conscious applications--so there should
4242+ # be no objection to disabling these hardening measures.
4343+ hardeningDisable = [
4444+ # don't modify or move the stack
4545+ "stackprotector" "pic"
4646+ # don't alter index arithmetic
4747+ "strictoverflow"
4848+ # don't interfere with dynamic target detection.
4949+ "relro" "bindnow"
5050+ ];
5151+3752 nativeBuildInputs = optionals stdenv.isDarwin [coreutils] ++ [gfortran perl which];
38533954 makeFlags =
···11+--- a/configure
22++++ b/configure
33+@@ -8872,7 +8872,7 @@
44+ { $as_echo "$as_me:${as_lineno-$LINENO}: checking libusb include dir" >&5
55+ $as_echo_n "checking libusb include dir... " >&6; }
66+ usb_incdir_found="no"
77+- for _incdir in "" "/usr/include/libusb-1.0" "/usr/local/include/libusb-1.0"; do
88++ for _incdir in "$($PKG_CONFIG --variable=includedir libusb-1.0)/libusb-1.0"; do
99+ _libusb_save_cppflags=$CPPFLAGS
1010+ if test -n "${_incdir}"; then
1111+ CPPFLAGS="-I${_incdir} ${CPPFLAGS}"