Merge pull request #33681 from obsidiansystems/fixed-output-deps

Fixed output deps

authored by John Ericson and committed by GitHub e017a027 577f672a

+94 -95
+2 -2
pkgs/applications/networking/browsers/chromium/update.nix
··· 145 outputHashMode = "flat"; 146 outputHashAlgo = "md5"; 147 148 - buildInputs = [ curl ]; 149 preferLocalBuild = true; 150 151 buildCommand = '' ··· 178 179 getHash = path: import (runCommand "gethash.nix" { 180 inherit path; 181 - buildInputs = [ nix ]; 182 } '' 183 sha256="$(nix-hash --flat --base32 --type sha256 "$path")" 184 echo "\"$sha256\"" > "$out"
··· 145 outputHashMode = "flat"; 146 outputHashAlgo = "md5"; 147 148 + nativeBuildInputs = [ curl ]; 149 preferLocalBuild = true; 150 151 buildCommand = '' ··· 178 179 getHash = path: import (runCommand "gethash.nix" { 180 inherit path; 181 + nativeBuildInputs = [ nix ]; 182 } '' 183 sha256="$(nix-hash --flat --base32 --type sha256 "$path")" 184 echo "\"$sha256\"" > "$out"
+1 -1
pkgs/applications/networking/cluster/chronos/chronos-deps.nix
··· 8 outputHashMode = "recursive"; 9 outputHash = "0mm2sb1p5zz6b0z2s4zhdlix6fafydsxmqjy8zbkwzw4f6lazzyl"; 10 11 - buildInputs = [ curl ]; 12 13 impureEnvVars = stdenv.lib.fetchers.proxyImpureEnvVars; 14 }
··· 8 outputHashMode = "recursive"; 9 outputHash = "0mm2sb1p5zz6b0z2s4zhdlix6fafydsxmqjy8zbkwzw4f6lazzyl"; 10 11 + nativeBuildInputs = [ curl ]; 12 13 impureEnvVars = stdenv.lib.fetchers.proxyImpureEnvVars; 14 }
+1 -1
pkgs/applications/networking/cluster/mesos/mesos-deps.nix
··· 8 outputHashMode = "recursive"; 9 outputHash = "10h0qs7svw0cqjkyxs8z6s3qraa8ga920zfrr59rdlanbwg4klly"; 10 11 - buildInputs = [ curl ]; 12 13 impureEnvVars = stdenv.lib.fetchers.proxyImpureEnvVars; 14 }
··· 8 outputHashMode = "recursive"; 9 outputHash = "10h0qs7svw0cqjkyxs8z6s3qraa8ga920zfrr59rdlanbwg4klly"; 10 11 + nativeBuildInputs = [ curl ]; 12 13 impureEnvVars = stdenv.lib.fetchers.proxyImpureEnvVars; 14 }
+1 -1
pkgs/build-support/docker/pull.nix
··· 14 15 builder = ./pull.sh; 16 17 - buildInputs = [ curl utillinux docker kmod dhcp cacert e2fsprogs ]; 18 19 outputHashAlgo = "sha256"; 20 outputHash = sha256;
··· 14 15 builder = ./pull.sh; 16 17 + nativeBuildInputs = [ curl utillinux docker kmod dhcp cacert e2fsprogs ]; 18 19 outputHashAlgo = "sha256"; 20 outputHash = sha256;
+3 -3
pkgs/build-support/fetchbower/default.nix
··· 1 - { stdenv, lib, bower2nix, cacert }: 2 let 3 bowerVersion = version: 4 let ··· 9 10 cleanName = name: lib.replaceStrings ["/" ":"] ["-" "-"] name; 11 12 - fetchbower = name: version: target: outputHash: stdenv.mkDerivation { 13 name = "${cleanName name}-${bowerVersion version}"; 14 SSL_CERT_FILE = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 15 buildCommand = '' ··· 23 outputHashMode = "recursive"; 24 outputHashAlgo = "sha256"; 25 inherit outputHash; 26 - buildInputs = [ bower2nix ]; 27 }; 28 29 in fetchbower
··· 1 + { stdenvNoCC, lib, bower2nix, cacert }: 2 let 3 bowerVersion = version: 4 let ··· 9 10 cleanName = name: lib.replaceStrings ["/" ":"] ["-" "-"] name; 11 12 + fetchbower = name: version: target: outputHash: stdenvNoCC.mkDerivation { 13 name = "${cleanName name}-${bowerVersion version}"; 14 SSL_CERT_FILE = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 15 buildCommand = '' ··· 23 outputHashMode = "recursive"; 24 outputHashAlgo = "sha256"; 25 inherit outputHash; 26 + nativeBuildInputs = [ bower2nix ]; 27 }; 28 29 in fetchbower
+3 -3
pkgs/build-support/fetchbzr/default.nix
··· 1 - { stdenv, bazaar }: 2 { url, rev, sha256 }: 3 4 - stdenv.mkDerivation { 5 name = "bzr-export"; 6 7 builder = ./builder.sh; 8 - buildInputs = [ bazaar ]; 9 10 outputHashAlgo = "sha256"; 11 outputHashMode = "recursive";
··· 1 + { stdenvNoCC, bazaar }: 2 { url, rev, sha256 }: 3 4 + stdenvNoCC.mkDerivation { 5 name = "bzr-export"; 6 7 builder = ./builder.sh; 8 + nativeBuildInputs = [ bazaar ]; 9 10 outputHashAlgo = "sha256"; 11 outputHashMode = "recursive";
+3 -3
pkgs/build-support/fetchcvs/default.nix
··· 3 # tag="<tagname>" (get version by tag name) 4 # If you don't specify neither one date="NOW" will be used (get latest) 5 6 - {stdenv, cvs}: 7 8 {cvsRoot, module, tag ? null, date ? null, sha256}: 9 10 - stdenv.mkDerivation { 11 name = "cvs-export"; 12 builder = ./builder.sh; 13 - buildInputs = [cvs]; 14 15 outputHashAlgo = "sha256"; 16 outputHashMode = "recursive";
··· 3 # tag="<tagname>" (get version by tag name) 4 # If you don't specify neither one date="NOW" will be used (get latest) 5 6 + {stdenvNoCC, cvs}: 7 8 {cvsRoot, module, tag ? null, date ? null, sha256}: 9 10 + stdenvNoCC.mkDerivation { 11 name = "cvs-export"; 12 builder = ./builder.sh; 13 + nativeBuildInputs = [cvs]; 14 15 outputHashAlgo = "sha256"; 16 outputHashMode = "recursive";
+3 -3
pkgs/build-support/fetchdarcs/default.nix
··· 1 - {stdenv, darcs, nix, cacert}: 2 3 {url, rev ? null, context ? null, md5 ? "", sha256 ? ""}: 4 5 if md5 != "" then 6 throw "fetchdarcs does not support md5 anymore, please use sha256" 7 else 8 - stdenv.mkDerivation { 9 name = "fetchdarcs"; 10 NIX_SSL_CERT_FILE = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 11 builder = ./builder.sh; 12 - buildInputs = [darcs]; 13 14 outputHashAlgo = "sha256"; 15 outputHashMode = "recursive";
··· 1 + {stdenvNoCC, darcs, nix, cacert}: 2 3 {url, rev ? null, context ? null, md5 ? "", sha256 ? ""}: 4 5 if md5 != "" then 6 throw "fetchdarcs does not support md5 anymore, please use sha256" 7 else 8 + stdenvNoCC.mkDerivation { 9 name = "fetchdarcs"; 10 NIX_SSL_CERT_FILE = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 11 builder = ./builder.sh; 12 + nativeBuildInputs = [darcs]; 13 14 outputHashAlgo = "sha256"; 15 outputHashMode = "recursive";
+4 -4
pkgs/build-support/fetchegg/default.nix
··· 1 # Fetches a chicken egg from henrietta using `chicken-install -r' 2 # See: http://wiki.call-cc.org/chicken-projects/egg-index-4.html 3 4 - { stdenv, chicken }: 5 { name, version, md5 ? "", sha256 ? "" }: 6 7 if md5 != "" then 8 throw "fetchegg does not support md5 anymore, please use sha256" 9 else 10 - stdenv.mkDerivation { 11 name = "chicken-${name}-export"; 12 builder = ./builder.sh; 13 - buildInputs = [ chicken ]; 14 15 outputHashAlgo = "sha256"; 16 outputHashMode = "recursive"; ··· 20 21 eggName = name; 22 23 - impureEnvVars = stdenv.lib.fetchers.proxyImpureEnvVars; 24 } 25
··· 1 # Fetches a chicken egg from henrietta using `chicken-install -r' 2 # See: http://wiki.call-cc.org/chicken-projects/egg-index-4.html 3 4 + { stdenvNoCC, chicken }: 5 { name, version, md5 ? "", sha256 ? "" }: 6 7 if md5 != "" then 8 throw "fetchegg does not support md5 anymore, please use sha256" 9 else 10 + stdenvNoCC.mkDerivation { 11 name = "chicken-${name}-export"; 12 builder = ./builder.sh; 13 + nativeBuildInputs = [ chicken ]; 14 15 outputHashAlgo = "sha256"; 16 outputHashMode = "recursive"; ··· 20 21 eggName = name; 22 23 + impureEnvVars = stdenvNoCC.lib.fetchers.proxyImpureEnvVars; 24 } 25
+1 -1
pkgs/build-support/fetchfossil/default.nix
··· 5 stdenv.mkDerivation { 6 name = "fossil-archive" + (if name != null then "-${name}" else ""); 7 builder = ./builder.sh; 8 - buildInputs = [fossil]; 9 10 # Envvar docs are hard to find. A link for the future: 11 # https://www.fossil-scm.org/index.html/doc/trunk/www/env-opts.md
··· 5 stdenv.mkDerivation { 6 name = "fossil-archive" + (if name != null then "-${name}" else ""); 7 builder = ./builder.sh; 8 + nativeBuildInputs = [fossil]; 9 10 # Envvar docs are hard to find. A link for the future: 11 # https://www.fossil-scm.org/index.html/doc/trunk/www/env-opts.md
+5 -5
pkgs/build-support/fetchgit/default.nix
··· 1 - {stdenv, git, cacert}: let 2 urlToName = url: rev: let 3 - inherit (stdenv.lib) removeSuffix splitString last; 4 base = last (splitString ":" (baseNameOf (removeSuffix "/" url))); 5 6 matched = builtins.match "(.*).git" base; ··· 48 if md5 != "" then 49 throw "fetchgit does not support md5 anymore, please use sha256" 50 else 51 - stdenv.mkDerivation { 52 inherit name; 53 builder = ./builder.sh; 54 fetcher = "${./nix-prefetch-git}"; # This must be a string to ensure it's called with bash. 55 - buildInputs = [git]; 56 57 outputHashAlgo = "sha256"; 58 outputHashMode = "recursive"; ··· 62 63 GIT_SSL_CAINFO = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 64 65 - impureEnvVars = stdenv.lib.fetchers.proxyImpureEnvVars ++ [ 66 "GIT_PROXY_COMMAND" "SOCKS_SERVER" 67 ]; 68
··· 1 + {stdenvNoCC, git, cacert}: let 2 urlToName = url: rev: let 3 + inherit (stdenvNoCC.lib) removeSuffix splitString last; 4 base = last (splitString ":" (baseNameOf (removeSuffix "/" url))); 5 6 matched = builtins.match "(.*).git" base; ··· 48 if md5 != "" then 49 throw "fetchgit does not support md5 anymore, please use sha256" 50 else 51 + stdenvNoCC.mkDerivation { 52 inherit name; 53 builder = ./builder.sh; 54 fetcher = "${./nix-prefetch-git}"; # This must be a string to ensure it's called with bash. 55 + nativeBuildInputs = [git]; 56 57 outputHashAlgo = "sha256"; 58 outputHashMode = "recursive"; ··· 62 63 GIT_SSL_CAINFO = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 64 65 + impureEnvVars = stdenvNoCC.lib.fetchers.proxyImpureEnvVars ++ [ 66 "GIT_PROXY_COMMAND" "SOCKS_SERVER" 67 ]; 68
+1 -1
pkgs/build-support/fetchgit/private.nix
··· 17 in builtins.toString sshConfigFile}''; 18 19 ssh-wrapped = runCommand "fetchgit-ssh" { 20 - buildInputs = [ makeWrapper ]; 21 } '' 22 mkdir -p $out/bin 23 makeWrapper ${openssh}/bin/ssh $out/bin/ssh --prefix PATH : "$out/bin" --add-flags "-F ${config}" "$@"
··· 17 in builtins.toString sshConfigFile}''; 18 19 ssh-wrapped = runCommand "fetchgit-ssh" { 20 + nativeBuildInputs = [ makeWrapper ]; 21 } '' 22 mkdir -p $out/bin 23 makeWrapper ${openssh}/bin/ssh $out/bin/ssh --prefix PATH : "$out/bin" --add-flags "-F ${config}" "$@"
+3 -3
pkgs/build-support/fetchgx/default.nix
··· 1 - { stdenv, gx, gx-go, go, cacert }: 2 3 { name, src, sha256 }: 4 5 - stdenv.mkDerivation { 6 name = "${name}-gxdeps"; 7 inherit src; 8 9 - buildInputs = [ go gx gx-go ]; 10 11 outputHashAlgo = "sha256"; 12 outputHashMode = "recursive";
··· 1 + { stdenvNoCC, gx, gx-go, go, cacert }: 2 3 { name, src, sha256 }: 4 5 + stdenvNoCC.mkDerivation { 6 name = "${name}-gxdeps"; 7 inherit src; 8 9 + nativeBuildInputs = [ go gx gx-go ]; 10 11 outputHashAlgo = "sha256"; 12 outputHashMode = "recursive";
+4 -4
pkgs/build-support/fetchhg/default.nix
··· 1 - {stdenv, mercurial, nix}: {name ? null, url, rev ? null, md5 ? null, sha256 ? null, fetchSubrepos ? false}: 2 3 if md5 != null then 4 throw "fetchhg does not support md5 anymore, please use sha256" 5 else 6 # TODO: statically check if mercurial as the https support if the url starts woth https. 7 - stdenv.mkDerivation { 8 name = "hg-archive" + (if name != null then "-${name}" else ""); 9 builder = ./builder.sh; 10 - buildInputs = [mercurial]; 11 12 - impureEnvVars = stdenv.lib.fetchers.proxyImpureEnvVars; 13 14 subrepoClause = if fetchSubrepos then "S" else ""; 15
··· 1 + {stdenvNoCC, mercurial, nix}: {name ? null, url, rev ? null, md5 ? null, sha256 ? null, fetchSubrepos ? false}: 2 3 if md5 != null then 4 throw "fetchhg does not support md5 anymore, please use sha256" 5 else 6 # TODO: statically check if mercurial as the https support if the url starts woth https. 7 + stdenvNoCC.mkDerivation { 8 name = "hg-archive" + (if name != null then "-${name}" else ""); 9 builder = ./builder.sh; 10 + nativeBuildInputs = [mercurial]; 11 12 + impureEnvVars = stdenvNoCC.lib.fetchers.proxyImpureEnvVars; 13 14 subrepoClause = if fetchSubrepos then "S" else ""; 15
+1 -1
pkgs/build-support/fetchipfs/default.nix
··· 28 if (!hasHash) then throw "Specify sha for fetchipfs fixed-output derivation" else stdenv.mkDerivation { 29 name = ipfs; 30 builder = ./builder.sh; 31 - buildInputs = [ curl ]; 32 33 # New-style output content requirements. 34 outputHashAlgo = if outputHashAlgo != "" then outputHashAlgo else
··· 28 if (!hasHash) then throw "Specify sha for fetchipfs fixed-output derivation" else stdenv.mkDerivation { 29 name = ipfs; 30 builder = ./builder.sh; 31 + nativeBuildInputs = [ curl ]; 32 33 # New-style output content requirements. 34 outputHashAlgo = if outputHashAlgo != "" then outputHashAlgo else
+3 -3
pkgs/build-support/fetchmtn/default.nix
··· 1 # You can specify some extra mirrors and a cache DB via options 2 - {stdenv, monotone, defaultDBMirrors ? [], cacheDB ? "./mtn-checkout.db"}: 3 # dbs is a list of strings 4 # each is an url for sync 5 ··· 8 {name ? "mtn-checkout", dbs ? [], sha256 9 , selector ? "h:" + branch, branch}: 10 11 - stdenv.mkDerivation { 12 builder = ./builder.sh; 13 nativeBuildInputs = [monotone]; 14 ··· 19 dbs = defaultDBMirrors ++ dbs; 20 inherit branch cacheDB name selector; 21 22 - impureEnvVars = stdenv.lib.fetchers.proxyImpureEnvVars; 23 24 } 25
··· 1 # You can specify some extra mirrors and a cache DB via options 2 + {stdenvNoCC, monotone, defaultDBMirrors ? [], cacheDB ? "./mtn-checkout.db"}: 3 # dbs is a list of strings 4 # each is an url for sync 5 ··· 8 {name ? "mtn-checkout", dbs ? [], sha256 9 , selector ? "h:" + branch, branch}: 10 11 + stdenvNoCC.mkDerivation { 12 builder = ./builder.sh; 13 nativeBuildInputs = [monotone]; 14 ··· 19 dbs = defaultDBMirrors ++ dbs; 20 inherit branch cacheDB name selector; 21 22 + impureEnvVars = stdenvNoCC.lib.fetchers.proxyImpureEnvVars; 23 24 } 25
+1 -1
pkgs/build-support/fetchnuget/default.nix
··· 1 - { stdenv, fetchurl, buildDotnetPackage, unzip }: 2 3 attrs @ 4 { baseName
··· 1 + { stdenvNoCC, fetchurl, buildDotnetPackage, unzip }: 2 3 attrs @ 4 { baseName
+4 -4
pkgs/build-support/fetchrepoproject/default.nix
··· 1 - { stdenv, gitRepo, cacert, copyPathsToStore }: 2 3 { name, manifest, rev ? "HEAD", sha256 4 # Optional parameters: ··· 9 assert repoRepoRev != "" -> repoRepoURL != ""; 10 assert createMirror -> !useArchive; 11 12 - with stdenv.lib; 13 14 let 15 extraRepoInitFlags = [ ··· 28 29 local_manifests = copyPathsToStore localManifests; 30 31 - in stdenv.mkDerivation { 32 inherit name; 33 34 inherit cacert manifest rev repoRepoURL repoRepoRev referenceDir; # TODO ··· 44 "GIT_PROXY_COMMAND" "SOCKS_SERVER" 45 ]; 46 47 - buildInputs = [ gitRepo cacert ]; 48 49 GIT_SSL_CAINFO = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 50
··· 1 + { stdenvNoCC, gitRepo, cacert, copyPathsToStore }: 2 3 { name, manifest, rev ? "HEAD", sha256 4 # Optional parameters: ··· 9 assert repoRepoRev != "" -> repoRepoURL != ""; 10 assert createMirror -> !useArchive; 11 12 + with stdenvNoCC.lib; 13 14 let 15 extraRepoInitFlags = [ ··· 28 29 local_manifests = copyPathsToStore localManifests; 30 31 + in stdenvNoCC.mkDerivation { 32 inherit name; 33 34 inherit cacert manifest rev repoRepoURL repoRepoRev referenceDir; # TODO ··· 44 "GIT_PROXY_COMMAND" "SOCKS_SERVER" 45 ]; 46 47 + nativeBuildInputs = [ gitRepo cacert ]; 48 49 GIT_SSL_CAINFO = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 50
+3 -3
pkgs/build-support/fetchs3/default.nix
··· 1 - { stdenv, runCommand, awscli }: 2 3 { s3url 4 , sha256 ··· 10 }: 11 12 let 13 - credentialAttrs = stdenv.lib.optionalAttrs (credentials != null) { 14 AWS_ACCESS_KEY_ID = credentials.access_key_id; 15 AWS_SECRET_ACCESS_KEY = credentials.secret_access_key; 16 AWS_SESSION_TOKEN = credentials.session_token ? null; 17 }; 18 in runCommand "foo" ({ 19 - buildInputs = [ awscli ]; 20 outputHashAlgo = "sha256"; 21 outputHash = sha256; 22 outputHashMode = if recursiveHash then "recursive" else "flat";
··· 1 + { stdenvNoCC, runCommand, awscli }: 2 3 { s3url 4 , sha256 ··· 10 }: 11 12 let 13 + credentialAttrs = stdenvNoCC.lib.optionalAttrs (credentials != null) { 14 AWS_ACCESS_KEY_ID = credentials.access_key_id; 15 AWS_SECRET_ACCESS_KEY = credentials.secret_access_key; 16 AWS_SESSION_TOKEN = credentials.session_token ? null; 17 }; 18 in runCommand "foo" ({ 19 + nativeBuildInputs = [ awscli ]; 20 outputHashAlgo = "sha256"; 21 outputHash = sha256; 22 outputHashMode = if recursiveHash then "recursive" else "flat";
+5 -5
pkgs/build-support/fetchsvn/default.nix
··· 1 - {stdenv, subversion, glibcLocales, sshSupport ? false, openssh ? null}: 2 {url, rev ? "HEAD", md5 ? "", sha256 ? "", 3 ignoreExternals ? false, ignoreKeywords ? false, name ? null}: 4 5 let 6 - repoName = with stdenv.lib; 7 let 8 fst = head; 9 snd = l: head (tail l); ··· 28 if md5 != "" then 29 throw "fetchsvn does not support md5 anymore, please use sha256" 30 else 31 - stdenv.mkDerivation { 32 name = name_; 33 builder = ./builder.sh; 34 - buildInputs = [ subversion glibcLocales ]; 35 36 outputHashAlgo = "sha256"; 37 outputHashMode = "recursive"; ··· 39 40 inherit url rev sshSupport openssh ignoreExternals ignoreKeywords; 41 42 - impureEnvVars = stdenv.lib.fetchers.proxyImpureEnvVars; 43 preferLocalBuild = true; 44 }
··· 1 + {stdenvNoCC, subversion, glibcLocales, sshSupport ? false, openssh ? null}: 2 {url, rev ? "HEAD", md5 ? "", sha256 ? "", 3 ignoreExternals ? false, ignoreKeywords ? false, name ? null}: 4 5 let 6 + repoName = with stdenvNoCC.lib; 7 let 8 fst = head; 9 snd = l: head (tail l); ··· 28 if md5 != "" then 29 throw "fetchsvn does not support md5 anymore, please use sha256" 30 else 31 + stdenvNoCC.mkDerivation { 32 name = name_; 33 builder = ./builder.sh; 34 + nativeBuildInputs = [ subversion glibcLocales ]; 35 36 outputHashAlgo = "sha256"; 37 outputHashMode = "recursive"; ··· 39 40 inherit url rev sshSupport openssh ignoreExternals ignoreKeywords; 41 42 + impureEnvVars = stdenvNoCC.lib.fetchers.proxyImpureEnvVars; 43 preferLocalBuild = true; 44 }
+3 -3
pkgs/build-support/fetchsvnssh/default.nix
··· 1 - {stdenv, subversion, sshSupport ? false, openssh ? null, expect}: 2 {username, password, url, rev ? "HEAD", md5 ? "", sha256 ? ""}: 3 4 5 if md5 != "" then 6 throw "fetchsvnssh does not support md5 anymore, please use sha256" 7 else 8 - stdenv.mkDerivation { 9 name = "svn-export-ssh"; 10 builder = ./builder.sh; 11 - buildInputs = [subversion expect]; 12 13 outputHashAlgo = "sha256"; 14 outputHashMode = "recursive";
··· 1 + {stdenvNoCC, subversion, sshSupport ? false, openssh ? null, expect}: 2 {username, password, url, rev ? "HEAD", md5 ? "", sha256 ? ""}: 3 4 5 if md5 != "" then 6 throw "fetchsvnssh does not support md5 anymore, please use sha256" 7 else 8 + stdenvNoCC.mkDerivation { 9 name = "svn-export-ssh"; 10 builder = ./builder.sh; 11 + nativeBuildInputs = [subversion expect]; 12 13 outputHashAlgo = "sha256"; 14 outputHashMode = "recursive";
+6 -6
pkgs/build-support/fetchurl/default.nix
··· 1 - { stdenv, curl }: # Note that `curl' may be `null', in case of the native stdenv. 2 3 let 4 ··· 10 # resulting store derivations (.drv files) much smaller, which in 11 # turn makes nix-env/nix-instantiate faster. 12 mirrorsFile = 13 - stdenv.mkDerivation ({ 14 name = "mirrors-list"; 15 builder = ./write-mirror-list.sh; 16 preferLocalBuild = true; ··· 20 # "gnu", etc.). 21 sites = builtins.attrNames mirrors; 22 23 - impureEnvVars = stdenv.lib.fetchers.proxyImpureEnvVars ++ [ 24 # This variable allows the user to pass additional options to curl 25 "NIX_CURL_FLAGS" 26 ··· 103 in 104 105 if md5 != "" then throw "fetchurl does not support md5 anymore, please use sha256 or sha512" 106 - else if (!hasHash) then throw "Specify hash for fetchurl fixed-output derivation: ${stdenv.lib.concatStringsSep ", " urls_}" 107 - else stdenv.mkDerivation { 108 name = 109 if showURLs then "urls" 110 else if name != "" then name ··· 112 113 builder = ./builder.sh; 114 115 - buildInputs = [ curl ]; 116 117 urls = urls_; 118
··· 1 + { stdenvNoCC, curl }: # Note that `curl' may be `null', in case of the native stdenvNoCC. 2 3 let 4 ··· 10 # resulting store derivations (.drv files) much smaller, which in 11 # turn makes nix-env/nix-instantiate faster. 12 mirrorsFile = 13 + stdenvNoCC.mkDerivation ({ 14 name = "mirrors-list"; 15 builder = ./write-mirror-list.sh; 16 preferLocalBuild = true; ··· 20 # "gnu", etc.). 21 sites = builtins.attrNames mirrors; 22 23 + impureEnvVars = stdenvNoCC.lib.fetchers.proxyImpureEnvVars ++ [ 24 # This variable allows the user to pass additional options to curl 25 "NIX_CURL_FLAGS" 26 ··· 103 in 104 105 if md5 != "" then throw "fetchurl does not support md5 anymore, please use sha256 or sha512" 106 + else if (!hasHash) then throw "Specify hash for fetchurl fixed-output derivation: ${stdenvNoCC.lib.concatStringsSep ", " urls_}" 107 + else stdenvNoCC.mkDerivation { 108 name = 109 if showURLs then "urls" 110 else if name != "" then name ··· 112 113 builder = ./builder.sh; 114 115 + nativeBuildInputs = [ curl ]; 116 117 urls = urls_; 118
+1 -1
pkgs/build-support/rust/fetchcargo.nix
··· 2 { name ? "cargo-deps", src, srcs, sourceRoot, sha256, cargoUpdateHook ? "" }: 3 stdenv.mkDerivation { 4 name = "${name}-vendor"; 5 - buildInputs = [ cacert cargoVendor git rust.cargo ]; 6 inherit src srcs sourceRoot; 7 8 phases = "unpackPhase installPhase";
··· 2 { name ? "cargo-deps", src, srcs, sourceRoot, sha256, cargoUpdateHook ? "" }: 3 stdenv.mkDerivation { 4 name = "${name}-vendor"; 5 + nativeBuildInputs = [ cacert cargoVendor git rust.cargo ]; 6 inherit src srcs sourceRoot; 7 8 phases = "unpackPhase installPhase";
+1 -1
pkgs/data/fonts/clearlyU/default.nix
··· 8 sha256 = "1xn14jbv3m1khy7ydvad9ydkn7yygdbhjy9wm1v000jzjwr3lv21"; 9 }; 10 11 - buildInputs = [ mkfontdir mkfontscale ]; 12 13 installPhase = 14 ''
··· 8 sha256 = "1xn14jbv3m1khy7ydvad9ydkn7yygdbhjy9wm1v000jzjwr3lv21"; 9 }; 10 11 + nativeBuildInputs = [ mkfontdir mkfontscale ]; 12 13 installPhase = 14 ''
+1 -1
pkgs/data/fonts/corefonts/default.nix
··· 32 inherit sha256; 33 }) fonts; 34 35 - buildInputs = [cabextract]; 36 37 buildCommand = '' 38 for i in $exes; do
··· 32 inherit sha256; 33 }) fonts; 34 35 + nativeBuildInputs = [cabextract]; 36 37 buildCommand = '' 38 for i in $exes; do
+1 -1
pkgs/data/fonts/dejavu-fonts/default.nix
··· 25 26 full-ttf = stdenv.mkDerivation { 27 name = "dejavu-fonts-full-${version}"; 28 - buildInputs = [fontforge perl FontTTF]; 29 30 src = fetchFromGitHub { 31 owner = "dejavu-fonts";
··· 25 26 full-ttf = stdenv.mkDerivation { 27 name = "dejavu-fonts-full-${version}"; 28 + nativeBuildInputs = [fontforge perl FontTTF]; 29 30 src = fetchFromGitHub { 31 owner = "dejavu-fonts";
+1 -1
pkgs/data/fonts/dina-pcf/default.nix
··· 9 sha256 = "1kq86lbxxgik82aywwhawmj80vsbz3hfhdyhicnlv9km7yjvnl8z"; 10 }; 11 12 - buildInputs = [ unzip bdftopcf mkfontdir mkfontscale ]; 13 14 dontBuild = true; 15 patchPhase = "sed -i 's/microsoft-cp1252/ISO8859-1/' *.bdf";
··· 9 sha256 = "1kq86lbxxgik82aywwhawmj80vsbz3hfhdyhicnlv9km7yjvnl8z"; 10 }; 11 12 + nativeBuildInputs = [ unzip bdftopcf mkfontdir mkfontscale ]; 13 14 dontBuild = true; 15 patchPhase = "sed -i 's/microsoft-cp1252/ISO8859-1/' *.bdf";
+1 -1
pkgs/data/fonts/envypn-font/default.nix
··· 8 sha256 = "bda67b6bc6d5d871a4d46565d4126729dfb8a0de9611dae6c68132a7b7db1270"; 9 }; 10 11 - buildInputs = [ mkfontdir mkfontscale ]; 12 13 unpackPhase = '' 14 tar -xzf $src --strip-components=1
··· 8 sha256 = "bda67b6bc6d5d871a4d46565d4126729dfb8a0de9611dae6c68132a7b7db1270"; 9 }; 10 11 + nativeBuildInputs = [ mkfontdir mkfontscale ]; 12 13 unpackPhase = '' 14 tar -xzf $src --strip-components=1
+1 -1
pkgs/data/fonts/gohufont/default.nix
··· 13 sha256 = "0rqqavhqbs7pajcblg92mjlz2dxk8b60vgdh271axz7kjs2wf9mr"; 14 }; 15 16 - buildInputs = [ mkfontdir mkfontscale bdf2psf ]; 17 18 unpackPhase = '' 19 mkdir pcf bdf
··· 13 sha256 = "0rqqavhqbs7pajcblg92mjlz2dxk8b60vgdh271axz7kjs2wf9mr"; 14 }; 15 16 + nativeBuildInputs = [ mkfontdir mkfontscale bdf2psf ]; 17 18 unpackPhase = '' 19 mkdir pcf bdf
+1 -1
pkgs/data/fonts/inconsolata/lgc.nix
··· 11 sha256 = "0dqjj3mlc28s8ljnph6l086b4j9r5dly4fldq59crycwys72zzai"; 12 }; 13 14 - buildInputs = [ fontforge ]; 15 16 installPhase = '' 17 mkdir -p $out/share/fonts/truetype
··· 11 sha256 = "0dqjj3mlc28s8ljnph6l086b4j9r5dly4fldq59crycwys72zzai"; 12 }; 13 14 + nativeBuildInputs = [ fontforge ]; 15 16 installPhase = '' 17 mkdir -p $out/share/fonts/truetype
+1 -1
pkgs/data/fonts/kochi-substitute/default.nix
··· 15 sha256 = "91ce6c993a3a0f77ed85db76f62ce18632b4c0cbd8f864676359a17ae5e6fa3c"; 16 }; 17 18 - buildInputs = [ dpkg ]; 19 20 unpackCmd = '' 21 dpkg-deb --fsys-tarfile $src | tar xf - ./usr/share/fonts/truetype/kochi/kochi-gothic-subst.ttf
··· 15 sha256 = "91ce6c993a3a0f77ed85db76f62ce18632b4c0cbd8f864676359a17ae5e6fa3c"; 16 }; 17 18 + nativeBuildInputs = [ dpkg ]; 19 20 unpackCmd = '' 21 dpkg-deb --fsys-tarfile $src | tar xf - ./usr/share/fonts/truetype/kochi/kochi-gothic-subst.ttf
+1 -1
pkgs/data/fonts/league-of-moveable-type/default.nix
··· 17 18 srcs = fonts; 19 20 - buildInputs = [ unzip ]; 21 sourceRoot = "."; 22 23 installPhase = ''
··· 17 18 srcs = fonts; 19 20 + nativeBuildInputs = [ unzip ]; 21 sourceRoot = "."; 22 23 installPhase = ''
+1 -1
pkgs/data/fonts/meslo-lg/default.nix
··· 17 sha256="0lnbkrvcpgz9chnvix79j6fiz36wj6n46brb7b1746182rl1l875"; 18 }; 19 20 - buildInputs = [ unzip ]; 21 22 sourceRoot = "."; 23
··· 17 sha256="0lnbkrvcpgz9chnvix79j6fiz36wj6n46brb7b1746182rl1l875"; 18 }; 19 20 + nativeBuildInputs = [ unzip ]; 21 22 sourceRoot = "."; 23
+1 -1
pkgs/data/fonts/nafees/default.nix
··· 28 }) 29 ]; 30 31 - buildInputs = [unzip]; 32 33 sourceRoot = "."; 34
··· 28 }) 29 ]; 30 31 + nativeBuildInputs = [unzip]; 32 33 sourceRoot = "."; 34
+1 -1
pkgs/data/fonts/poly/default.nix
··· 15 sha256 = "1chzcy3kyi7wpr4iq4aj1v24fq1wwph1v5z96dimlqcrnvm66h2l"; 16 }; 17 18 - buildInputs = [unzip]; 19 20 sourceRoot = "."; 21
··· 15 sha256 = "1chzcy3kyi7wpr4iq4aj1v24fq1wwph1v5z96dimlqcrnvm66h2l"; 16 }; 17 18 + nativeBuildInputs = [unzip]; 19 20 sourceRoot = "."; 21
+1 -1
pkgs/data/fonts/proggyfonts/default.nix
··· 10 sha256 = "1plcm1sjpa3hdqhhin48fq6zmz3ndm4md72916hd8ff0w6596q0n"; 11 }; 12 13 - buildInputs = [ mkfontdir mkfontscale ]; 14 15 installPhase = 16 ''
··· 10 sha256 = "1plcm1sjpa3hdqhhin48fq6zmz3ndm4md72916hd8ff0w6596q0n"; 11 }; 12 13 + nativeBuildInputs = [ mkfontdir mkfontscale ]; 14 15 installPhase = 16 ''
+6 -6
pkgs/data/fonts/redhat-liberation-fonts/default.nix
··· 4 inherit (python2.pkgs) fonttools; 5 6 common = 7 - {version, url, sha256, buildInputs, postPatch ? null, outputHash}: 8 stdenv.mkDerivation rec { 9 name = "liberation-fonts-${version}"; 10 src = fetchurl { 11 inherit url sha256; 12 }; 13 14 - inherit buildInputs postPatch; 15 16 installPhase = '' 17 mkdir -p $out/share/fonts/truetype ··· 53 version = "1.07.4"; 54 url = "https://releases.pagure.org/liberation-fonts/liberation-fonts-${version}.tar.gz"; 55 sha256 = "01jlg88q2s6by7qv6fmnrlx0lwjarrjrpxv811zjz6f2im4vg65d"; 56 - buildInputs = [ fontforge ]; 57 outputHash = "1q102rmg4004p74f8m4y8a6iklmnva0q39sq260jsq3lhcfypg7p"; 58 }; 59 liberation_ttf_v1_binary = common rec { 60 version = "1.07.4"; 61 url = "https://releases.pagure.org/liberation-fonts/liberation-fonts-ttf-${version}.tar.gz"; 62 sha256 = "0p7frz29pmjlk2d0j2zs5kfspygwdnpzxkb2hwzcfhrafjvf59v1"; 63 - buildInputs = [ ]; 64 outputHash = "12gwb9b4ij9d93ky4c9ykgp03fqr62axy37pds88q7y6zgciwkab"; 65 }; 66 liberation_ttf_v2_from_source = common rec { 67 version = "2.00.1"; 68 url = "https://releases.pagure.org/liberation-fonts/liberation-fonts-${version}.tar.gz"; 69 sha256 = "1ymryvd2nw4jmw4w5y1i3ll2dn48rpkqzlsgv7994lk6qc9cdjvs"; 70 - buildInputs = [ fontforge fonttools ]; 71 postPatch = '' 72 substituteInPlace scripts/setisFixedPitch-fonttools.py --replace \ 73 'font = ttLib.TTFont(fontfile)' \ ··· 79 version = "2.00.1"; 80 url = "https://releases.pagure.org/liberation-fonts/liberation-fonts-ttf-${version}.tar.gz"; 81 sha256 = "010m4zfqan4w04b6bs9pm3gapn9hsb18bmwwgp2p6y6idj52g43q"; 82 - buildInputs = [ ]; 83 outputHash = "19jky9li345zsig9pcb0rnlsjqqclh7r60vbi4pwh16f14850gpk"; 84 }; 85 }
··· 4 inherit (python2.pkgs) fonttools; 5 6 common = 7 + {version, url, sha256, nativeBuildInputs, postPatch ? null, outputHash}: 8 stdenv.mkDerivation rec { 9 name = "liberation-fonts-${version}"; 10 src = fetchurl { 11 inherit url sha256; 12 }; 13 14 + inherit nativeBuildInputs postPatch; 15 16 installPhase = '' 17 mkdir -p $out/share/fonts/truetype ··· 53 version = "1.07.4"; 54 url = "https://releases.pagure.org/liberation-fonts/liberation-fonts-${version}.tar.gz"; 55 sha256 = "01jlg88q2s6by7qv6fmnrlx0lwjarrjrpxv811zjz6f2im4vg65d"; 56 + nativeBuildInputs = [ fontforge ]; 57 outputHash = "1q102rmg4004p74f8m4y8a6iklmnva0q39sq260jsq3lhcfypg7p"; 58 }; 59 liberation_ttf_v1_binary = common rec { 60 version = "1.07.4"; 61 url = "https://releases.pagure.org/liberation-fonts/liberation-fonts-ttf-${version}.tar.gz"; 62 sha256 = "0p7frz29pmjlk2d0j2zs5kfspygwdnpzxkb2hwzcfhrafjvf59v1"; 63 + nativeBuildInputs = [ ]; 64 outputHash = "12gwb9b4ij9d93ky4c9ykgp03fqr62axy37pds88q7y6zgciwkab"; 65 }; 66 liberation_ttf_v2_from_source = common rec { 67 version = "2.00.1"; 68 url = "https://releases.pagure.org/liberation-fonts/liberation-fonts-${version}.tar.gz"; 69 sha256 = "1ymryvd2nw4jmw4w5y1i3ll2dn48rpkqzlsgv7994lk6qc9cdjvs"; 70 + nativeBuildInputs = [ fontforge fonttools ]; 71 postPatch = '' 72 substituteInPlace scripts/setisFixedPitch-fonttools.py --replace \ 73 'font = ttLib.TTFont(fontfile)' \ ··· 79 version = "2.00.1"; 80 url = "https://releases.pagure.org/liberation-fonts/liberation-fonts-ttf-${version}.tar.gz"; 81 sha256 = "010m4zfqan4w04b6bs9pm3gapn9hsb18bmwwgp2p6y6idj52g43q"; 82 + nativeBuildInputs = [ ]; 83 outputHash = "19jky9li345zsig9pcb0rnlsjqqclh7r60vbi4pwh16f14850gpk"; 84 }; 85 }
+2 -2
pkgs/data/fonts/tempora-lgc/default.nix
··· 18 sha256 = "0iwa8wyydcpjss6d1jy4jibqxpvzph4vmaxwwmndpsqy1fz64y9i"; 19 }) 20 ]; 21 - buildInputs = [ 22 ]; 23 in 24 stdenv.mkDerivation { 25 name = "tempora-lgc"; 26 - inherit buildInputs; 27 inherit srcs; 28 phases = "installPhase"; 29 installPhase = ''
··· 18 sha256 = "0iwa8wyydcpjss6d1jy4jibqxpvzph4vmaxwwmndpsqy1fz64y9i"; 19 }) 20 ]; 21 + nativeBuildInputs = [ 22 ]; 23 in 24 stdenv.mkDerivation { 25 name = "tempora-lgc"; 26 + inherit nativeBuildInputs; 27 inherit srcs; 28 phases = "installPhase"; 29 installPhase = ''
+1 -1
pkgs/data/fonts/tewi/default.nix
··· 10 sha256 = "0c7k847cp68w20frzsdknpss2cwv3lp970asyybv65jxyl2jz3iq"; 11 }; 12 13 - buildInputs = [ bdftopcf mkfontdir mkfontscale ]; 14 buildPhase = '' 15 for i in *.bdf; do 16 bdftopcf -o ''${i/bdf/pcf} $i
··· 10 sha256 = "0c7k847cp68w20frzsdknpss2cwv3lp970asyybv65jxyl2jz3iq"; 11 }; 12 13 + nativeBuildInputs = [ bdftopcf mkfontdir mkfontscale ]; 14 buildPhase = '' 15 for i in *.bdf; do 16 bdftopcf -o ''${i/bdf/pcf} $i
+1 -1
pkgs/data/fonts/ucs-fonts/default.nix
··· 21 22 sourceRoot = "."; 23 24 - buildInputs = [ mkfontdir mkfontscale ]; 25 26 phases = [ "unpackPhase" "installPhase" ]; 27
··· 21 22 sourceRoot = "."; 23 24 + nativeBuildInputs = [ mkfontdir mkfontscale ]; 25 26 phases = [ "unpackPhase" "installPhase" ]; 27
+1 -1
pkgs/data/fonts/uni-vga/default.nix
··· 8 sha256 = "05sns8h5yspa7xkl81ri7y1yxf5icgsnl497f3xnaryhx11s2rv6"; 9 }; 10 11 - buildInputs = [ mkfontdir mkfontscale ]; 12 13 installPhase = '' 14 mkdir -p $out/share/fonts
··· 8 sha256 = "05sns8h5yspa7xkl81ri7y1yxf5icgsnl497f3xnaryhx11s2rv6"; 9 }; 10 11 + nativeBuildInputs = [ mkfontdir mkfontscale ]; 12 13 installPhase = '' 14 mkdir -p $out/share/fonts
+1 -1
pkgs/data/fonts/unifont/default.nix
··· 14 sha256 = "0ypkmwyfrsnag69h1c0mx89ranz4f6jc9y1sqkpq2rbzg64maik0"; 15 }; 16 17 - buildInputs = [ mkfontscale mkfontdir ]; 18 19 phases = "installPhase"; 20
··· 14 sha256 = "0ypkmwyfrsnag69h1c0mx89ranz4f6jc9y1sqkpq2rbzg64maik0"; 15 }; 16 17 + nativeBuildInputs = [ mkfontscale mkfontdir ]; 18 19 phases = "installPhase"; 20
-1
pkgs/data/fonts/unscii/default.nix
··· 8 url = "http://pelulamu.net/${pname}/${name}-src.tar.gz"; 9 sha256 = "0qcxcnqz2nlwfzlrn115kkp3n8dd7593h762vxs6vfqm13i39lq1"; 10 }; 11 - buildInputs = []; 12 nativeBuildInputs = [perl bdftopcf perlPackages.TextCharWidth fontforge 13 SDL SDL_image]; 14 preConfigure = ''
··· 8 url = "http://pelulamu.net/${pname}/${name}-src.tar.gz"; 9 sha256 = "0qcxcnqz2nlwfzlrn115kkp3n8dd7593h762vxs6vfqm13i39lq1"; 10 }; 11 nativeBuildInputs = [perl bdftopcf perlPackages.TextCharWidth fontforge 12 SDL SDL_image]; 13 preConfigure = ''
+1 -1
pkgs/games/factorio/fetch.nix
··· 18 }: 19 20 stdenv.mkDerivation { 21 - buildInputs = [ curl xidel ]; 22 23 inherit name url loginUrl username password cacert; 24
··· 18 }: 19 20 stdenv.mkDerivation { 21 + nativeBuildInputs = [ curl xidel ]; 22 23 inherit name url loginUrl username password cacert; 24
+1 -1
pkgs/os-specific/linux/firmware/firmware-linux-nonfree/default.nix
··· 32 # traffic, so don't do that. 33 preferLocalBuild = true; 34 35 - buildInputs = [ git gnupg ]; 36 NIX_SSL_CERT_FILE = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 37 } '' 38 git init src && (
··· 32 # traffic, so don't do that. 33 preferLocalBuild = true; 34 35 + nativeBuildInputs = [ git gnupg ]; 36 NIX_SSL_CERT_FILE = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 37 } '' 38 git init src && (
+1 -1
pkgs/servers/xmpp/ejabberd/default.nix
··· 50 51 configureFlags = [ "--enable-all" "--with-sqlite3=${sqlite.dev}" ]; 52 53 - buildInputs = [ git erlang openssl expat libyaml sqlite pam zlib elixir ]; 54 55 GIT_SSL_CAINFO = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 56
··· 50 51 configureFlags = [ "--enable-all" "--with-sqlite3=${sqlite.dev}" ]; 52 53 + nativeBuildInputs = [ git erlang openssl expat libyaml sqlite pam zlib elixir ]; 54 55 GIT_SSL_CAINFO = "${cacert}/etc/ssl/certs/ca-bundle.crt"; 56
+2 -2
pkgs/stdenv/darwin/default.nix
··· 118 initialPath = [ bootstrapTools ]; 119 120 fetchurlBoot = import ../../build-support/fetchurl { 121 - stdenv = stage0.stdenv; 122 - curl = bootstrapTools; 123 }; 124 125 # The stdenvs themselves don't use mkDerivation, so I need to specify this here
··· 118 initialPath = [ bootstrapTools ]; 119 120 fetchurlBoot = import ../../build-support/fetchurl { 121 + stdenvNoCC = stage0.stdenv; 122 + curl = bootstrapTools; 123 }; 124 125 # The stdenvs themselves don't use mkDerivation, so I need to specify this here
+2 -2
pkgs/top-level/all-packages.nix
··· 180 181 # `fetchurl' downloads a file from the network. 182 fetchurl = import ../build-support/fetchurl { 183 - inherit stdenv; 184 # On darwin, libkrb5 needs bootstrap_cmds which would require 185 # converting many packages to fetchurl_boot to avoid evaluation cycles. 186 - curl = curl.override (lib.optionalAttrs stdenv.isDarwin { gssSupport = false; }); 187 }; 188 189 fetchRepoProject = callPackage ../build-support/fetchrepoproject { };
··· 180 181 # `fetchurl' downloads a file from the network. 182 fetchurl = import ../build-support/fetchurl { 183 + inherit stdenvNoCC; 184 # On darwin, libkrb5 needs bootstrap_cmds which would require 185 # converting many packages to fetchurl_boot to avoid evaluation cycles. 186 + curl = buildPackages.curl.override (lib.optionalAttrs stdenv.isDarwin { gssSupport = false; }); 187 }; 188 189 fetchRepoProject = callPackage ../build-support/fetchrepoproject { };