nixpkgs mirror (for testing) github.com/NixOS/nixpkgs
nix
fork

Configure Feed

Select the types of activity you want to include in your feed.

guile: 2.0 -> 2.2

+14 -64
-14
pkgs/development/interpreters/guile/clang.patch
··· 1 - diff --git a/lib/stdint.in.h b/lib/stdint.in.h 2 - index 889bca7..15d39b0 100644 3 - --- a/lib/stdint.in.h 4 - +++ b/lib/stdint.in.h 5 - @@ -74,7 +74,8 @@ 6 - in <inttypes.h> would reinclude us, skipping our contents because 7 - _@GUARD_PREFIX@_STDINT_H is defined. 8 - The include_next requires a split double-inclusion guard. */ 9 - -# @INCLUDE_NEXT@ @NEXT_STDINT_H@ 10 - +# include <inttypes.h> 11 - +// # @INCLUDE_NEXT@ @NEXT_STDINT_H@ 12 - #endif 13 - 14 - #if ! defined _@GUARD_PREFIX@_STDINT_H && ! defined _GL_JUST_INCLUDE_SYSTEM_STDINT_H
+9 -20
pkgs/development/interpreters/guile/default.nix
··· 7 7 else stdenv.mkDerivation) 8 8 9 9 (rec { 10 - name = "guile-2.0.13"; 10 + name = "guile-${version}"; 11 + version = "2.2.0"; 11 12 12 13 src = fetchurl { 13 14 url = "mirror://gnu/guile/${name}.tar.xz"; 14 - sha256 = "12yqkr974y91ylgw6jnmci2v90i90s7h9vxa4zk0sai8vjnz4i1p"; 15 + sha256 = "05dmvhd1y135x7w5qfw4my42cfp6l8bbhjfxvchcc1cbdvzri0f1"; 15 16 }; 16 17 17 18 outputs = [ "out" "dev" "info" ]; ··· 33 32 34 33 enableParallelBuilding = true; 35 34 36 - patches = [ ./disable-gc-sensitive-tests.patch ./eai_system.patch ./clang.patch 37 - (fetchpatch { 38 - # Fixes stability issues with 00-repl-server.test 39 - url = "http://git.savannah.gnu.org/cgit/guile.git/patch/?id=2fbde7f02adb8c6585e9baf6e293ee49cd23d4c4"; 40 - sha256 = "0p6c1lmw1iniq03z7x5m65kg3lq543kgvdb4nrxsaxjqf3zhl77v"; 41 - }) 35 + patches = [ 36 + ./eai_system.patch 42 37 ] ++ 43 38 (stdenv.lib.optional (coverageAnalysis != null) ./gcov-file-name.patch); 44 39 ··· 44 47 # don't have "libgcc_s.so.1" on darwin 45 48 LDFLAGS = stdenv.lib.optionalString (!stdenv.isDarwin) "-lgcc_s"; 46 49 47 - configureFlags = [ "--with-libreadline-prefix" ] 50 + configureFlags = [ "--with-libreadline-prefix=${readline.dev}" ] 48 51 ++ stdenv.lib.optionals stdenv.isSunOS [ 49 52 # Make sure the right <gmp.h> is found, and not the incompatible 50 53 # /usr/include/mp.h from OpenSolaris. See ··· 53 56 "--with-libgmp-prefix=${gmp.dev}" 54 57 55 58 # Same for these (?). 56 - "--with-libreadline-prefix=${readline.dev}" 57 59 "--with-libunistring-prefix=${libunistring}" 58 60 59 61 # See below. ··· 65 69 # XXX: See http://thread.gmane.org/gmane.comp.lib.gnulib.bugs/18903 for 66 70 # why `--with-libunistring-prefix' and similar options coming from 67 71 # `AC_LIB_LINKFLAGS_BODY' don't work on NixOS/x86_64. 68 - sed -i "$out/lib/pkgconfig/guile-2.0.pc" \ 72 + sed -i "$out/lib/pkgconfig/guile-2.2.pc" \ 69 73 -e "s|-lunistring|-L${libunistring}/lib -lunistring|g ; 70 74 s|^Cflags:\(.*\)$|Cflags: -I${libunistring}/include \1|g ; 71 75 s|-lltdl|-L${libtool.lib}/lib -lltdl|g ; ··· 77 81 # On Linuxes+Hydra the tests are flaky; feel free to investigate deeper. 78 82 doCheck = false; 79 83 80 - setupHook = ./setup-hook-2.0.sh; 84 + setupHook = ./setup-hook-2.2.sh; 81 85 82 86 crossAttrs.preConfigure = 83 87 stdenv.lib.optionalString (stdenv.cross.config == "i586-pc-gnu") ··· 92 96 description = "Embeddable Scheme implementation"; 93 97 homepage = http://www.gnu.org/software/guile/; 94 98 license = stdenv.lib.licenses.lgpl3Plus; 95 - maintainers = with stdenv.lib.maintainers; [ ludo lovek323 ]; 99 + maintainers = with stdenv.lib.maintainers; [ ludo lovek323 vrthra ]; 96 100 platforms = stdenv.lib.platforms.all; 97 101 98 102 longDescription = '' ··· 107 111 }; 108 112 }) 109 113 110 - // 111 - 112 - (stdenv.lib.optionalAttrs (!stdenv.isLinux) { 113 - # Work around <http://bugs.gnu.org/14201>. 114 - SHELL = "/bin/sh"; 115 - CONFIG_SHELL = "/bin/sh"; 116 - })
-25
pkgs/development/interpreters/guile/disable-gc-sensitive-tests.patch
··· 1 - This patch disable GC-sensitive tests. This is particularly useful when 2 - compiling with `-O0' (as is done with coverage analysis) since there may 3 - be many false references held on the stack, leading to the failure of 4 - such tests. 5 - 6 - --- a/test-suite/tests/gc.test 7 - +++ b/test-suite/tests/gc.test 8 - @@ -67,6 +67,7 @@ 9 - 10 - (with-test-prefix "gc" 11 - (pass-if "Unused modules are removed" 12 - + (throw 'unresolved) 13 - (let* ((guard (make-guardian)) 14 - (total 1000)) 15 - 16 - --- a/test-suite/tests/threads.test 17 - +++ b/test-suite/tests/threads.test 18 - @@ -366,6 +366,7 @@ 19 - (not (mutex-owner m)))) 20 - 21 - (pass-if "mutex with owner not retained (bug #27450)" 22 - + (throw 'unresolved) 23 - (let ((g (make-guardian))) 24 - (g (let ((m (make-mutex))) (lock-mutex m) m)) 25 -
+3 -3
pkgs/development/interpreters/guile/setup-hook-2.0.sh pkgs/development/interpreters/guile/setup-hook-2.2.sh
··· 1 1 addGuileLibPath () { 2 - if test -d "$1/share/guile/site/2.0" 2 + if test -d "$1/share/guile/site/2.2" 3 3 then 4 - export GUILE_LOAD_PATH="${GUILE_LOAD_PATH}${GUILE_LOAD_PATH:+:}$1/share/guile/site/2.0" 5 - export GUILE_LOAD_COMPILED_PATH="${GUILE_LOAD_COMPILED_PATH}${GUILE_LOAD_COMPILED_PATH:+:}$1/share/guile/site/2.0" 4 + export GUILE_LOAD_PATH="${GUILE_LOAD_PATH}${GUILE_LOAD_PATH:+:}$1/share/guile/site/2.2" 5 + export GUILE_LOAD_COMPILED_PATH="${GUILE_LOAD_COMPILED_PATH}${GUILE_LOAD_COMPILED_PATH:+:}$1/share/guile/site/2.2" 6 6 elif test -d "$1/share/guile/site" 7 7 then 8 8 export GUILE_LOAD_PATH="${GUILE_LOAD_PATH}${GUILE_LOAD_PATH:+:}$1/share/guile/site"
+2 -2
pkgs/top-level/all-packages.nix
··· 5790 5790 5791 5791 guile_1_8 = callPackage ../development/interpreters/guile/1.8.nix { }; 5792 5792 5793 - guile_2_0 = callPackage ../development/interpreters/guile { }; 5793 + guile_2_2 = callPackage ../development/interpreters/guile { }; 5794 5794 5795 - guile = guile_2_0; 5795 + guile = guile_2_2; 5796 5796 5797 5797 hadoop = callPackage ../applications/networking/cluster/hadoop { }; 5798 5798