···201201 # it only produces an empty json object `{ }`.
202202 ./serialize_nulls.patch
203203204204+ # Bazel integrates with apple IOKit to inhibit and track system sleep.
205205+ # Inside the darwin sandbox, these API calls are blocked, and bazel
206206+ # crashes. It seems possible to allow these APIs inside the sandbox, but it
207207+ # feels simpler to patch bazel not to use it at all. So our bazel is
208208+ # incapable of preventing system sleep, which is a small price to pay to
209209+ # guarantee that it will always run in any nix context.
210210+ #
211211+ # If you want to investigate the sandbox profile path,
212212+ # IORegisterForSystemPower can be allowed with
213213+ #
214214+ # propagatedSandboxProfile = ''
215215+ # (allow iokit-open (iokit-user-client-class "RootDomainUserClient"))
216216+ # '';
217217+ #
218218+ # I do not know yet how to allow IOPMAssertion{CreateWithName,Release}
204219 ./darwin_sleep.patch
205220206221 # On Darwin, the last argument to gcc is coming up as an empty string. i.e: ''
···258273 inherit Foundation bazel_self distDir repoCache runJdk;
259274 };
260275261261- src_for_updater = stdenv.mkDerivation rec {
262262- name = "updater-sources";
263263- inherit src;
264264- nativeBuildInputs = [ unzip ];
265265- inherit sourceRoot;
266266- installPhase = ''
267267- runHook preInstall
268268-269269- cp -r . "$out"
270270-271271- runHook postInstall
272272- '';
273273- };
276276+ passthru.updater = throw "TODO";
274277275278 # Bazel starts a local server and needs to bind a local address.
276279 __darwinAllowLocalNetworking = true;
277277- # XXX: For IORegisterForSystemPower
278278- # propagatedSandboxProfile = ''
279279- # (allow iokit-open (iokit-user-client-class "RootDomainUserClient"))
280280- # '';
281280282281 postPatch =
283282 let