Merge pull request #33681 from obsidiansystems/fixed-output-deps

Fixed output deps

authored by John Ericson and committed by GitHub e017a027 577f672a

+94 -95
+2 -2
pkgs/applications/networking/browsers/chromium/update.nix
··· 145 145 outputHashMode = "flat"; 146 146 outputHashAlgo = "md5"; 147 147 148 - buildInputs = [ curl ]; 148 + nativeBuildInputs = [ curl ]; 149 149 preferLocalBuild = true; 150 150 151 151 buildCommand = '' ··· 178 178 179 179 getHash = path: import (runCommand "gethash.nix" { 180 180 inherit path; 181 - buildInputs = [ nix ]; 181 + nativeBuildInputs = [ nix ]; 182 182 } '' 183 183 sha256="$(nix-hash --flat --base32 --type sha256 "$path")" 184 184 echo "\"$sha256\"" > "$out"
+1 -1
pkgs/applications/networking/cluster/chronos/chronos-deps.nix
··· 8 8 outputHashMode = "recursive"; 9 9 outputHash = "0mm2sb1p5zz6b0z2s4zhdlix6fafydsxmqjy8zbkwzw4f6lazzyl"; 10 10 11 - buildInputs = [ curl ]; 11 + nativeBuildInputs = [ curl ]; 12 12 13 13 impureEnvVars = stdenv.lib.fetchers.proxyImpureEnvVars; 14 14 }
+1 -1
pkgs/applications/networking/cluster/mesos/mesos-deps.nix
··· 8 8 outputHashMode = "recursive"; 9 9 outputHash = "10h0qs7svw0cqjkyxs8z6s3qraa8ga920zfrr59rdlanbwg4klly"; 10 10 11 - buildInputs = [ curl ]; 11 + nativeBuildInputs = [ curl ]; 12 12 13 13 impureEnvVars = stdenv.lib.fetchers.proxyImpureEnvVars; 14 14 }
+1 -1
pkgs/build-support/docker/pull.nix
··· 14 14 15 15 builder = ./pull.sh; 16 16 17 - buildInputs = [ curl utillinux docker kmod dhcp cacert e2fsprogs ]; 17 + nativeBuildInputs = [ curl utillinux docker kmod dhcp cacert e2fsprogs ]; 18 18 19 19 outputHashAlgo = "sha256"; 20 20 outputHash = sha256;
+3 -3
pkgs/build-support/fetchbower/default.nix
··· 1 - { stdenv, lib, bower2nix, cacert }: 1 + { stdenvNoCC, lib, bower2nix, cacert }: 2 2 let 3 3 bowerVersion = version: 4 4 let ··· 9 9 10 10 cleanName = name: lib.replaceStrings ["/" ":"] ["-" "-"] name; 11 11 12 - fetchbower = name: version: target: outputHash: stdenv.mkDerivation { 12 + fetchbower = name: version: target: outputHash: stdenvNoCC.mkDerivation { 13 13 name = "${cleanName name}-${bowerVersion version}"; 14 14 SSL_CERT_FILE = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 15 15 buildCommand = '' ··· 23 23 outputHashMode = "recursive"; 24 24 outputHashAlgo = "sha256"; 25 25 inherit outputHash; 26 - buildInputs = [ bower2nix ]; 26 + nativeBuildInputs = [ bower2nix ]; 27 27 }; 28 28 29 29 in fetchbower
+3 -3
pkgs/build-support/fetchbzr/default.nix
··· 1 - { stdenv, bazaar }: 1 + { stdenvNoCC, bazaar }: 2 2 { url, rev, sha256 }: 3 3 4 - stdenv.mkDerivation { 4 + stdenvNoCC.mkDerivation { 5 5 name = "bzr-export"; 6 6 7 7 builder = ./builder.sh; 8 - buildInputs = [ bazaar ]; 8 + nativeBuildInputs = [ bazaar ]; 9 9 10 10 outputHashAlgo = "sha256"; 11 11 outputHashMode = "recursive";
+3 -3
pkgs/build-support/fetchcvs/default.nix
··· 3 3 # tag="<tagname>" (get version by tag name) 4 4 # If you don't specify neither one date="NOW" will be used (get latest) 5 5 6 - {stdenv, cvs}: 6 + {stdenvNoCC, cvs}: 7 7 8 8 {cvsRoot, module, tag ? null, date ? null, sha256}: 9 9 10 - stdenv.mkDerivation { 10 + stdenvNoCC.mkDerivation { 11 11 name = "cvs-export"; 12 12 builder = ./builder.sh; 13 - buildInputs = [cvs]; 13 + nativeBuildInputs = [cvs]; 14 14 15 15 outputHashAlgo = "sha256"; 16 16 outputHashMode = "recursive";
+3 -3
pkgs/build-support/fetchdarcs/default.nix
··· 1 - {stdenv, darcs, nix, cacert}: 1 + {stdenvNoCC, darcs, nix, cacert}: 2 2 3 3 {url, rev ? null, context ? null, md5 ? "", sha256 ? ""}: 4 4 5 5 if md5 != "" then 6 6 throw "fetchdarcs does not support md5 anymore, please use sha256" 7 7 else 8 - stdenv.mkDerivation { 8 + stdenvNoCC.mkDerivation { 9 9 name = "fetchdarcs"; 10 10 NIX_SSL_CERT_FILE = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 11 11 builder = ./builder.sh; 12 - buildInputs = [darcs]; 12 + nativeBuildInputs = [darcs]; 13 13 14 14 outputHashAlgo = "sha256"; 15 15 outputHashMode = "recursive";
+4 -4
pkgs/build-support/fetchegg/default.nix
··· 1 1 # Fetches a chicken egg from henrietta using `chicken-install -r' 2 2 # See: http://wiki.call-cc.org/chicken-projects/egg-index-4.html 3 3 4 - { stdenv, chicken }: 4 + { stdenvNoCC, chicken }: 5 5 { name, version, md5 ? "", sha256 ? "" }: 6 6 7 7 if md5 != "" then 8 8 throw "fetchegg does not support md5 anymore, please use sha256" 9 9 else 10 - stdenv.mkDerivation { 10 + stdenvNoCC.mkDerivation { 11 11 name = "chicken-${name}-export"; 12 12 builder = ./builder.sh; 13 - buildInputs = [ chicken ]; 13 + nativeBuildInputs = [ chicken ]; 14 14 15 15 outputHashAlgo = "sha256"; 16 16 outputHashMode = "recursive"; ··· 20 20 21 21 eggName = name; 22 22 23 - impureEnvVars = stdenv.lib.fetchers.proxyImpureEnvVars; 23 + impureEnvVars = stdenvNoCC.lib.fetchers.proxyImpureEnvVars; 24 24 } 25 25
+1 -1
pkgs/build-support/fetchfossil/default.nix
··· 5 5 stdenv.mkDerivation { 6 6 name = "fossil-archive" + (if name != null then "-${name}" else ""); 7 7 builder = ./builder.sh; 8 - buildInputs = [fossil]; 8 + nativeBuildInputs = [fossil]; 9 9 10 10 # Envvar docs are hard to find. A link for the future: 11 11 # https://www.fossil-scm.org/index.html/doc/trunk/www/env-opts.md
+5 -5
pkgs/build-support/fetchgit/default.nix
··· 1 - {stdenv, git, cacert}: let 1 + {stdenvNoCC, git, cacert}: let 2 2 urlToName = url: rev: let 3 - inherit (stdenv.lib) removeSuffix splitString last; 3 + inherit (stdenvNoCC.lib) removeSuffix splitString last; 4 4 base = last (splitString ":" (baseNameOf (removeSuffix "/" url))); 5 5 6 6 matched = builtins.match "(.*).git" base; ··· 48 48 if md5 != "" then 49 49 throw "fetchgit does not support md5 anymore, please use sha256" 50 50 else 51 - stdenv.mkDerivation { 51 + stdenvNoCC.mkDerivation { 52 52 inherit name; 53 53 builder = ./builder.sh; 54 54 fetcher = "${./nix-prefetch-git}"; # This must be a string to ensure it's called with bash. 55 - buildInputs = [git]; 55 + nativeBuildInputs = [git]; 56 56 57 57 outputHashAlgo = "sha256"; 58 58 outputHashMode = "recursive"; ··· 62 62 63 63 GIT_SSL_CAINFO = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 64 64 65 - impureEnvVars = stdenv.lib.fetchers.proxyImpureEnvVars ++ [ 65 + impureEnvVars = stdenvNoCC.lib.fetchers.proxyImpureEnvVars ++ [ 66 66 "GIT_PROXY_COMMAND" "SOCKS_SERVER" 67 67 ]; 68 68
+1 -1
pkgs/build-support/fetchgit/private.nix
··· 17 17 in builtins.toString sshConfigFile}''; 18 18 19 19 ssh-wrapped = runCommand "fetchgit-ssh" { 20 - buildInputs = [ makeWrapper ]; 20 + nativeBuildInputs = [ makeWrapper ]; 21 21 } '' 22 22 mkdir -p $out/bin 23 23 makeWrapper ${openssh}/bin/ssh $out/bin/ssh --prefix PATH : "$out/bin" --add-flags "-F ${config}" "$@"
+3 -3
pkgs/build-support/fetchgx/default.nix
··· 1 - { stdenv, gx, gx-go, go, cacert }: 1 + { stdenvNoCC, gx, gx-go, go, cacert }: 2 2 3 3 { name, src, sha256 }: 4 4 5 - stdenv.mkDerivation { 5 + stdenvNoCC.mkDerivation { 6 6 name = "${name}-gxdeps"; 7 7 inherit src; 8 8 9 - buildInputs = [ go gx gx-go ]; 9 + nativeBuildInputs = [ go gx gx-go ]; 10 10 11 11 outputHashAlgo = "sha256"; 12 12 outputHashMode = "recursive";
+4 -4
pkgs/build-support/fetchhg/default.nix
··· 1 - {stdenv, mercurial, nix}: {name ? null, url, rev ? null, md5 ? null, sha256 ? null, fetchSubrepos ? false}: 1 + {stdenvNoCC, mercurial, nix}: {name ? null, url, rev ? null, md5 ? null, sha256 ? null, fetchSubrepos ? false}: 2 2 3 3 if md5 != null then 4 4 throw "fetchhg does not support md5 anymore, please use sha256" 5 5 else 6 6 # TODO: statically check if mercurial as the https support if the url starts woth https. 7 - stdenv.mkDerivation { 7 + stdenvNoCC.mkDerivation { 8 8 name = "hg-archive" + (if name != null then "-${name}" else ""); 9 9 builder = ./builder.sh; 10 - buildInputs = [mercurial]; 10 + nativeBuildInputs = [mercurial]; 11 11 12 - impureEnvVars = stdenv.lib.fetchers.proxyImpureEnvVars; 12 + impureEnvVars = stdenvNoCC.lib.fetchers.proxyImpureEnvVars; 13 13 14 14 subrepoClause = if fetchSubrepos then "S" else ""; 15 15
+1 -1
pkgs/build-support/fetchipfs/default.nix
··· 28 28 if (!hasHash) then throw "Specify sha for fetchipfs fixed-output derivation" else stdenv.mkDerivation { 29 29 name = ipfs; 30 30 builder = ./builder.sh; 31 - buildInputs = [ curl ]; 31 + nativeBuildInputs = [ curl ]; 32 32 33 33 # New-style output content requirements. 34 34 outputHashAlgo = if outputHashAlgo != "" then outputHashAlgo else
+3 -3
pkgs/build-support/fetchmtn/default.nix
··· 1 1 # You can specify some extra mirrors and a cache DB via options 2 - {stdenv, monotone, defaultDBMirrors ? [], cacheDB ? "./mtn-checkout.db"}: 2 + {stdenvNoCC, monotone, defaultDBMirrors ? [], cacheDB ? "./mtn-checkout.db"}: 3 3 # dbs is a list of strings 4 4 # each is an url for sync 5 5 ··· 8 8 {name ? "mtn-checkout", dbs ? [], sha256 9 9 , selector ? "h:" + branch, branch}: 10 10 11 - stdenv.mkDerivation { 11 + stdenvNoCC.mkDerivation { 12 12 builder = ./builder.sh; 13 13 nativeBuildInputs = [monotone]; 14 14 ··· 19 19 dbs = defaultDBMirrors ++ dbs; 20 20 inherit branch cacheDB name selector; 21 21 22 - impureEnvVars = stdenv.lib.fetchers.proxyImpureEnvVars; 22 + impureEnvVars = stdenvNoCC.lib.fetchers.proxyImpureEnvVars; 23 23 24 24 } 25 25
+1 -1
pkgs/build-support/fetchnuget/default.nix
··· 1 - { stdenv, fetchurl, buildDotnetPackage, unzip }: 1 + { stdenvNoCC, fetchurl, buildDotnetPackage, unzip }: 2 2 3 3 attrs @ 4 4 { baseName
+4 -4
pkgs/build-support/fetchrepoproject/default.nix
··· 1 - { stdenv, gitRepo, cacert, copyPathsToStore }: 1 + { stdenvNoCC, gitRepo, cacert, copyPathsToStore }: 2 2 3 3 { name, manifest, rev ? "HEAD", sha256 4 4 # Optional parameters: ··· 9 9 assert repoRepoRev != "" -> repoRepoURL != ""; 10 10 assert createMirror -> !useArchive; 11 11 12 - with stdenv.lib; 12 + with stdenvNoCC.lib; 13 13 14 14 let 15 15 extraRepoInitFlags = [ ··· 28 28 29 29 local_manifests = copyPathsToStore localManifests; 30 30 31 - in stdenv.mkDerivation { 31 + in stdenvNoCC.mkDerivation { 32 32 inherit name; 33 33 34 34 inherit cacert manifest rev repoRepoURL repoRepoRev referenceDir; # TODO ··· 44 44 "GIT_PROXY_COMMAND" "SOCKS_SERVER" 45 45 ]; 46 46 47 - buildInputs = [ gitRepo cacert ]; 47 + nativeBuildInputs = [ gitRepo cacert ]; 48 48 49 49 GIT_SSL_CAINFO = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 50 50
+3 -3
pkgs/build-support/fetchs3/default.nix
··· 1 - { stdenv, runCommand, awscli }: 1 + { stdenvNoCC, runCommand, awscli }: 2 2 3 3 { s3url 4 4 , sha256 ··· 10 10 }: 11 11 12 12 let 13 - credentialAttrs = stdenv.lib.optionalAttrs (credentials != null) { 13 + credentialAttrs = stdenvNoCC.lib.optionalAttrs (credentials != null) { 14 14 AWS_ACCESS_KEY_ID = credentials.access_key_id; 15 15 AWS_SECRET_ACCESS_KEY = credentials.secret_access_key; 16 16 AWS_SESSION_TOKEN = credentials.session_token ? null; 17 17 }; 18 18 in runCommand "foo" ({ 19 - buildInputs = [ awscli ]; 19 + nativeBuildInputs = [ awscli ]; 20 20 outputHashAlgo = "sha256"; 21 21 outputHash = sha256; 22 22 outputHashMode = if recursiveHash then "recursive" else "flat";
+5 -5
pkgs/build-support/fetchsvn/default.nix
··· 1 - {stdenv, subversion, glibcLocales, sshSupport ? false, openssh ? null}: 1 + {stdenvNoCC, subversion, glibcLocales, sshSupport ? false, openssh ? null}: 2 2 {url, rev ? "HEAD", md5 ? "", sha256 ? "", 3 3 ignoreExternals ? false, ignoreKeywords ? false, name ? null}: 4 4 5 5 let 6 - repoName = with stdenv.lib; 6 + repoName = with stdenvNoCC.lib; 7 7 let 8 8 fst = head; 9 9 snd = l: head (tail l); ··· 28 28 if md5 != "" then 29 29 throw "fetchsvn does not support md5 anymore, please use sha256" 30 30 else 31 - stdenv.mkDerivation { 31 + stdenvNoCC.mkDerivation { 32 32 name = name_; 33 33 builder = ./builder.sh; 34 - buildInputs = [ subversion glibcLocales ]; 34 + nativeBuildInputs = [ subversion glibcLocales ]; 35 35 36 36 outputHashAlgo = "sha256"; 37 37 outputHashMode = "recursive"; ··· 39 39 40 40 inherit url rev sshSupport openssh ignoreExternals ignoreKeywords; 41 41 42 - impureEnvVars = stdenv.lib.fetchers.proxyImpureEnvVars; 42 + impureEnvVars = stdenvNoCC.lib.fetchers.proxyImpureEnvVars; 43 43 preferLocalBuild = true; 44 44 }
+3 -3
pkgs/build-support/fetchsvnssh/default.nix
··· 1 - {stdenv, subversion, sshSupport ? false, openssh ? null, expect}: 1 + {stdenvNoCC, subversion, sshSupport ? false, openssh ? null, expect}: 2 2 {username, password, url, rev ? "HEAD", md5 ? "", sha256 ? ""}: 3 3 4 4 5 5 if md5 != "" then 6 6 throw "fetchsvnssh does not support md5 anymore, please use sha256" 7 7 else 8 - stdenv.mkDerivation { 8 + stdenvNoCC.mkDerivation { 9 9 name = "svn-export-ssh"; 10 10 builder = ./builder.sh; 11 - buildInputs = [subversion expect]; 11 + nativeBuildInputs = [subversion expect]; 12 12 13 13 outputHashAlgo = "sha256"; 14 14 outputHashMode = "recursive";
+6 -6
pkgs/build-support/fetchurl/default.nix
··· 1 - { stdenv, curl }: # Note that `curl' may be `null', in case of the native stdenv. 1 + { stdenvNoCC, curl }: # Note that `curl' may be `null', in case of the native stdenvNoCC. 2 2 3 3 let 4 4 ··· 10 10 # resulting store derivations (.drv files) much smaller, which in 11 11 # turn makes nix-env/nix-instantiate faster. 12 12 mirrorsFile = 13 - stdenv.mkDerivation ({ 13 + stdenvNoCC.mkDerivation ({ 14 14 name = "mirrors-list"; 15 15 builder = ./write-mirror-list.sh; 16 16 preferLocalBuild = true; ··· 20 20 # "gnu", etc.). 21 21 sites = builtins.attrNames mirrors; 22 22 23 - impureEnvVars = stdenv.lib.fetchers.proxyImpureEnvVars ++ [ 23 + impureEnvVars = stdenvNoCC.lib.fetchers.proxyImpureEnvVars ++ [ 24 24 # This variable allows the user to pass additional options to curl 25 25 "NIX_CURL_FLAGS" 26 26 ··· 103 103 in 104 104 105 105 if md5 != "" then throw "fetchurl does not support md5 anymore, please use sha256 or sha512" 106 - else if (!hasHash) then throw "Specify hash for fetchurl fixed-output derivation: ${stdenv.lib.concatStringsSep ", " urls_}" 107 - else stdenv.mkDerivation { 106 + else if (!hasHash) then throw "Specify hash for fetchurl fixed-output derivation: ${stdenvNoCC.lib.concatStringsSep ", " urls_}" 107 + else stdenvNoCC.mkDerivation { 108 108 name = 109 109 if showURLs then "urls" 110 110 else if name != "" then name ··· 112 112 113 113 builder = ./builder.sh; 114 114 115 - buildInputs = [ curl ]; 115 + nativeBuildInputs = [ curl ]; 116 116 117 117 urls = urls_; 118 118
+1 -1
pkgs/build-support/rust/fetchcargo.nix
··· 2 2 { name ? "cargo-deps", src, srcs, sourceRoot, sha256, cargoUpdateHook ? "" }: 3 3 stdenv.mkDerivation { 4 4 name = "${name}-vendor"; 5 - buildInputs = [ cacert cargoVendor git rust.cargo ]; 5 + nativeBuildInputs = [ cacert cargoVendor git rust.cargo ]; 6 6 inherit src srcs sourceRoot; 7 7 8 8 phases = "unpackPhase installPhase";
+1 -1
pkgs/data/fonts/clearlyU/default.nix
··· 8 8 sha256 = "1xn14jbv3m1khy7ydvad9ydkn7yygdbhjy9wm1v000jzjwr3lv21"; 9 9 }; 10 10 11 - buildInputs = [ mkfontdir mkfontscale ]; 11 + nativeBuildInputs = [ mkfontdir mkfontscale ]; 12 12 13 13 installPhase = 14 14 ''
+1 -1
pkgs/data/fonts/corefonts/default.nix
··· 32 32 inherit sha256; 33 33 }) fonts; 34 34 35 - buildInputs = [cabextract]; 35 + nativeBuildInputs = [cabextract]; 36 36 37 37 buildCommand = '' 38 38 for i in $exes; do
+1 -1
pkgs/data/fonts/dejavu-fonts/default.nix
··· 25 25 26 26 full-ttf = stdenv.mkDerivation { 27 27 name = "dejavu-fonts-full-${version}"; 28 - buildInputs = [fontforge perl FontTTF]; 28 + nativeBuildInputs = [fontforge perl FontTTF]; 29 29 30 30 src = fetchFromGitHub { 31 31 owner = "dejavu-fonts";
+1 -1
pkgs/data/fonts/dina-pcf/default.nix
··· 9 9 sha256 = "1kq86lbxxgik82aywwhawmj80vsbz3hfhdyhicnlv9km7yjvnl8z"; 10 10 }; 11 11 12 - buildInputs = [ unzip bdftopcf mkfontdir mkfontscale ]; 12 + nativeBuildInputs = [ unzip bdftopcf mkfontdir mkfontscale ]; 13 13 14 14 dontBuild = true; 15 15 patchPhase = "sed -i 's/microsoft-cp1252/ISO8859-1/' *.bdf";
+1 -1
pkgs/data/fonts/envypn-font/default.nix
··· 8 8 sha256 = "bda67b6bc6d5d871a4d46565d4126729dfb8a0de9611dae6c68132a7b7db1270"; 9 9 }; 10 10 11 - buildInputs = [ mkfontdir mkfontscale ]; 11 + nativeBuildInputs = [ mkfontdir mkfontscale ]; 12 12 13 13 unpackPhase = '' 14 14 tar -xzf $src --strip-components=1
+1 -1
pkgs/data/fonts/gohufont/default.nix
··· 13 13 sha256 = "0rqqavhqbs7pajcblg92mjlz2dxk8b60vgdh271axz7kjs2wf9mr"; 14 14 }; 15 15 16 - buildInputs = [ mkfontdir mkfontscale bdf2psf ]; 16 + nativeBuildInputs = [ mkfontdir mkfontscale bdf2psf ]; 17 17 18 18 unpackPhase = '' 19 19 mkdir pcf bdf
+1 -1
pkgs/data/fonts/inconsolata/lgc.nix
··· 11 11 sha256 = "0dqjj3mlc28s8ljnph6l086b4j9r5dly4fldq59crycwys72zzai"; 12 12 }; 13 13 14 - buildInputs = [ fontforge ]; 14 + nativeBuildInputs = [ fontforge ]; 15 15 16 16 installPhase = '' 17 17 mkdir -p $out/share/fonts/truetype
+1 -1
pkgs/data/fonts/kochi-substitute/default.nix
··· 15 15 sha256 = "91ce6c993a3a0f77ed85db76f62ce18632b4c0cbd8f864676359a17ae5e6fa3c"; 16 16 }; 17 17 18 - buildInputs = [ dpkg ]; 18 + nativeBuildInputs = [ dpkg ]; 19 19 20 20 unpackCmd = '' 21 21 dpkg-deb --fsys-tarfile $src | tar xf - ./usr/share/fonts/truetype/kochi/kochi-gothic-subst.ttf
+1 -1
pkgs/data/fonts/league-of-moveable-type/default.nix
··· 17 17 18 18 srcs = fonts; 19 19 20 - buildInputs = [ unzip ]; 20 + nativeBuildInputs = [ unzip ]; 21 21 sourceRoot = "."; 22 22 23 23 installPhase = ''
+1 -1
pkgs/data/fonts/meslo-lg/default.nix
··· 17 17 sha256="0lnbkrvcpgz9chnvix79j6fiz36wj6n46brb7b1746182rl1l875"; 18 18 }; 19 19 20 - buildInputs = [ unzip ]; 20 + nativeBuildInputs = [ unzip ]; 21 21 22 22 sourceRoot = "."; 23 23
+1 -1
pkgs/data/fonts/nafees/default.nix
··· 28 28 }) 29 29 ]; 30 30 31 - buildInputs = [unzip]; 31 + nativeBuildInputs = [unzip]; 32 32 33 33 sourceRoot = "."; 34 34
+1 -1
pkgs/data/fonts/poly/default.nix
··· 15 15 sha256 = "1chzcy3kyi7wpr4iq4aj1v24fq1wwph1v5z96dimlqcrnvm66h2l"; 16 16 }; 17 17 18 - buildInputs = [unzip]; 18 + nativeBuildInputs = [unzip]; 19 19 20 20 sourceRoot = "."; 21 21
+1 -1
pkgs/data/fonts/proggyfonts/default.nix
··· 10 10 sha256 = "1plcm1sjpa3hdqhhin48fq6zmz3ndm4md72916hd8ff0w6596q0n"; 11 11 }; 12 12 13 - buildInputs = [ mkfontdir mkfontscale ]; 13 + nativeBuildInputs = [ mkfontdir mkfontscale ]; 14 14 15 15 installPhase = 16 16 ''
+6 -6
pkgs/data/fonts/redhat-liberation-fonts/default.nix
··· 4 4 inherit (python2.pkgs) fonttools; 5 5 6 6 common = 7 - {version, url, sha256, buildInputs, postPatch ? null, outputHash}: 7 + {version, url, sha256, nativeBuildInputs, postPatch ? null, outputHash}: 8 8 stdenv.mkDerivation rec { 9 9 name = "liberation-fonts-${version}"; 10 10 src = fetchurl { 11 11 inherit url sha256; 12 12 }; 13 13 14 - inherit buildInputs postPatch; 14 + inherit nativeBuildInputs postPatch; 15 15 16 16 installPhase = '' 17 17 mkdir -p $out/share/fonts/truetype ··· 53 53 version = "1.07.4"; 54 54 url = "https://releases.pagure.org/liberation-fonts/liberation-fonts-${version}.tar.gz"; 55 55 sha256 = "01jlg88q2s6by7qv6fmnrlx0lwjarrjrpxv811zjz6f2im4vg65d"; 56 - buildInputs = [ fontforge ]; 56 + nativeBuildInputs = [ fontforge ]; 57 57 outputHash = "1q102rmg4004p74f8m4y8a6iklmnva0q39sq260jsq3lhcfypg7p"; 58 58 }; 59 59 liberation_ttf_v1_binary = common rec { 60 60 version = "1.07.4"; 61 61 url = "https://releases.pagure.org/liberation-fonts/liberation-fonts-ttf-${version}.tar.gz"; 62 62 sha256 = "0p7frz29pmjlk2d0j2zs5kfspygwdnpzxkb2hwzcfhrafjvf59v1"; 63 - buildInputs = [ ]; 63 + nativeBuildInputs = [ ]; 64 64 outputHash = "12gwb9b4ij9d93ky4c9ykgp03fqr62axy37pds88q7y6zgciwkab"; 65 65 }; 66 66 liberation_ttf_v2_from_source = common rec { 67 67 version = "2.00.1"; 68 68 url = "https://releases.pagure.org/liberation-fonts/liberation-fonts-${version}.tar.gz"; 69 69 sha256 = "1ymryvd2nw4jmw4w5y1i3ll2dn48rpkqzlsgv7994lk6qc9cdjvs"; 70 - buildInputs = [ fontforge fonttools ]; 70 + nativeBuildInputs = [ fontforge fonttools ]; 71 71 postPatch = '' 72 72 substituteInPlace scripts/setisFixedPitch-fonttools.py --replace \ 73 73 'font = ttLib.TTFont(fontfile)' \ ··· 79 79 version = "2.00.1"; 80 80 url = "https://releases.pagure.org/liberation-fonts/liberation-fonts-ttf-${version}.tar.gz"; 81 81 sha256 = "010m4zfqan4w04b6bs9pm3gapn9hsb18bmwwgp2p6y6idj52g43q"; 82 - buildInputs = [ ]; 82 + nativeBuildInputs = [ ]; 83 83 outputHash = "19jky9li345zsig9pcb0rnlsjqqclh7r60vbi4pwh16f14850gpk"; 84 84 }; 85 85 }
+2 -2
pkgs/data/fonts/tempora-lgc/default.nix
··· 18 18 sha256 = "0iwa8wyydcpjss6d1jy4jibqxpvzph4vmaxwwmndpsqy1fz64y9i"; 19 19 }) 20 20 ]; 21 - buildInputs = [ 21 + nativeBuildInputs = [ 22 22 ]; 23 23 in 24 24 stdenv.mkDerivation { 25 25 name = "tempora-lgc"; 26 - inherit buildInputs; 26 + inherit nativeBuildInputs; 27 27 inherit srcs; 28 28 phases = "installPhase"; 29 29 installPhase = ''
+1 -1
pkgs/data/fonts/tewi/default.nix
··· 10 10 sha256 = "0c7k847cp68w20frzsdknpss2cwv3lp970asyybv65jxyl2jz3iq"; 11 11 }; 12 12 13 - buildInputs = [ bdftopcf mkfontdir mkfontscale ]; 13 + nativeBuildInputs = [ bdftopcf mkfontdir mkfontscale ]; 14 14 buildPhase = '' 15 15 for i in *.bdf; do 16 16 bdftopcf -o ''${i/bdf/pcf} $i
+1 -1
pkgs/data/fonts/ucs-fonts/default.nix
··· 21 21 22 22 sourceRoot = "."; 23 23 24 - buildInputs = [ mkfontdir mkfontscale ]; 24 + nativeBuildInputs = [ mkfontdir mkfontscale ]; 25 25 26 26 phases = [ "unpackPhase" "installPhase" ]; 27 27
+1 -1
pkgs/data/fonts/uni-vga/default.nix
··· 8 8 sha256 = "05sns8h5yspa7xkl81ri7y1yxf5icgsnl497f3xnaryhx11s2rv6"; 9 9 }; 10 10 11 - buildInputs = [ mkfontdir mkfontscale ]; 11 + nativeBuildInputs = [ mkfontdir mkfontscale ]; 12 12 13 13 installPhase = '' 14 14 mkdir -p $out/share/fonts
+1 -1
pkgs/data/fonts/unifont/default.nix
··· 14 14 sha256 = "0ypkmwyfrsnag69h1c0mx89ranz4f6jc9y1sqkpq2rbzg64maik0"; 15 15 }; 16 16 17 - buildInputs = [ mkfontscale mkfontdir ]; 17 + nativeBuildInputs = [ mkfontscale mkfontdir ]; 18 18 19 19 phases = "installPhase"; 20 20
-1
pkgs/data/fonts/unscii/default.nix
··· 8 8 url = "http://pelulamu.net/${pname}/${name}-src.tar.gz"; 9 9 sha256 = "0qcxcnqz2nlwfzlrn115kkp3n8dd7593h762vxs6vfqm13i39lq1"; 10 10 }; 11 - buildInputs = []; 12 11 nativeBuildInputs = [perl bdftopcf perlPackages.TextCharWidth fontforge 13 12 SDL SDL_image]; 14 13 preConfigure = ''
+1 -1
pkgs/games/factorio/fetch.nix
··· 18 18 }: 19 19 20 20 stdenv.mkDerivation { 21 - buildInputs = [ curl xidel ]; 21 + nativeBuildInputs = [ curl xidel ]; 22 22 23 23 inherit name url loginUrl username password cacert; 24 24
+1 -1
pkgs/os-specific/linux/firmware/firmware-linux-nonfree/default.nix
··· 32 32 # traffic, so don't do that. 33 33 preferLocalBuild = true; 34 34 35 - buildInputs = [ git gnupg ]; 35 + nativeBuildInputs = [ git gnupg ]; 36 36 NIX_SSL_CERT_FILE = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 37 37 } '' 38 38 git init src && (
+1 -1
pkgs/servers/xmpp/ejabberd/default.nix
··· 50 50 51 51 configureFlags = [ "--enable-all" "--with-sqlite3=${sqlite.dev}" ]; 52 52 53 - buildInputs = [ git erlang openssl expat libyaml sqlite pam zlib elixir ]; 53 + nativeBuildInputs = [ git erlang openssl expat libyaml sqlite pam zlib elixir ]; 54 54 55 55 GIT_SSL_CAINFO = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 56 56
+2 -2
pkgs/stdenv/darwin/default.nix
··· 118 118 initialPath = [ bootstrapTools ]; 119 119 120 120 fetchurlBoot = import ../../build-support/fetchurl { 121 - stdenv = stage0.stdenv; 122 - curl = bootstrapTools; 121 + stdenvNoCC = stage0.stdenv; 122 + curl = bootstrapTools; 123 123 }; 124 124 125 125 # The stdenvs themselves don't use mkDerivation, so I need to specify this here
+2 -2
pkgs/top-level/all-packages.nix
··· 180 180 181 181 # `fetchurl' downloads a file from the network. 182 182 fetchurl = import ../build-support/fetchurl { 183 - inherit stdenv; 183 + inherit stdenvNoCC; 184 184 # On darwin, libkrb5 needs bootstrap_cmds which would require 185 185 # converting many packages to fetchurl_boot to avoid evaluation cycles. 186 - curl = curl.override (lib.optionalAttrs stdenv.isDarwin { gssSupport = false; }); 186 + curl = buildPackages.curl.override (lib.optionalAttrs stdenv.isDarwin { gssSupport = false; }); 187 187 }; 188 188 189 189 fetchRepoProject = callPackage ../build-support/fetchrepoproject { };