nixpkgs mirror (for testing) github.com/NixOS/nixpkgs
nix

[bot]: remove unreferenced code

volth 87f5930c a7e5927b

+16 -449
-2
doc/default.nix
··· 1 1 let 2 2 pkgs = import ./.. { }; 3 3 lib = pkgs.lib; 4 - sources = lib.sourceFilesBySuffices ./. [".xml"]; 5 - sources-langs = ./languages-frameworks; 6 4 in 7 5 pkgs.stdenv.mkDerivation { 8 6 name = "nixpkgs-manual";
-2
lib/generators.nix
··· 19 19 libStr = lib.strings; 20 20 libAttr = lib.attrsets; 21 21 22 - flipMapAttrs = flip libAttr.mapAttrs; 23 - 24 22 inherit (lib) isFunction; 25 23 in 26 24
-1
lib/lists.nix
··· 64 64 */ 65 65 foldl = op: nul: list: 66 66 let 67 - len = length list; 68 67 foldl' = n: 69 68 if n == -1 70 69 then nul
-1
lib/modules.nix
··· 670 670 { config, options, ... }: 671 671 let 672 672 fromOpt = getAttrFromPath from options; 673 - toOpt = getAttrFromPath to options; 674 673 toOf = attrByPath to 675 674 (abort "Renaming error: option `${showOption to}' does not exist."); 676 675 in
-4
lib/tests/misc.nix
··· 380 380 381 381 resRem7 = res6.replace (a: removeAttrs a ["a"]); 382 382 383 - resReplace6 = let x = defaultOverridableDelayableArgs id { a = 7; mergeAttrBy = { a = builtins.add; }; }; 384 - x2 = x.merge { a = 20; }; # now we have 27 385 - in (x2.replace) { a = 10; }; # and override the value by 10 386 - 387 383 # fixed tests (delayed args): (when using them add some comments, please) 388 384 resFixed1 = 389 385 let x = defaultOverridableDelayableArgs id ( x: { a = 7; c = x.fixed.b; });
-1
lib/types.nix
··· 309 309 } 310 310 else 311 311 def; 312 - listOnly = listOf elemType; 313 312 attrOnly = attrsOf elemType; 314 313 in mkOptionType rec { 315 314 name = "loaOf";
+1 -3
nixos/modules/config/fonts/fontconfig-ultimate.nix
··· 2 2 3 3 with lib; 4 4 5 - let fcBool = x: if x then "<bool>true</bool>" else "<bool>false</bool>"; 6 - 7 - cfg = config.fonts.fontconfig.ultimate; 5 + let cfg = config.fonts.fontconfig.ultimate; 8 6 9 7 latestVersion = pkgs.fontconfig.configVersion; 10 8
-2
nixos/modules/installer/tools/tools.nix
··· 6 6 with lib; 7 7 8 8 let 9 - cfg = config.installer; 10 - 11 9 makeProg = args: pkgs.substituteAll (args // { 12 10 dir = "bin"; 13 11 isExecutable = true;
-1
nixos/modules/profiles/clone-config.nix
··· 31 31 let 32 32 relocateNixOS = path: 33 33 "<nixpkgs/nixos" + removePrefix nixosPath (toString path) + ">"; 34 - relocateOthers = null; 35 34 in 36 35 { nixos = map relocateNixOS partitionedModuleFiles.nixos; 37 36 others = []; # TODO: copy the modules to the install-device repository.
-1
nixos/modules/programs/nylas-mail.nix
··· 4 4 5 5 let 6 6 cfg = config.services.nylas-mail; 7 - defaultUser = "nylas-mail"; 8 7 in { 9 8 ###### interface 10 9 options = {
-6
nixos/modules/programs/shell.nix
··· 4 4 5 5 with lib; 6 6 7 - let 8 - 9 - cfg = config.environment; 10 - 11 - in 12 - 13 7 { 14 8 15 9 config = {
-1
nixos/modules/programs/ssh.nix
··· 7 7 let 8 8 9 9 cfg = config.programs.ssh; 10 - cfgd = config.services.openssh; 11 10 12 11 askPassword = cfg.askPassword; 13 12
-2
nixos/modules/programs/xonsh.nix
··· 6 6 7 7 let 8 8 9 - cfge = config.environment; 10 - 11 9 cfg = config.programs.xonsh; 12 10 13 11 in
-1
nixos/modules/security/acme.nix
··· 209 209 servicesLists = mapAttrsToList certToServices cfg.certs; 210 210 certToServices = cert: data: 211 211 let 212 - domain = if data.domain != null then data.domain else cert; 213 212 cpath = lpath + optionalString (data.activationDelay != null) ".staging"; 214 213 lpath = "${cfg.directory}/${cert}"; 215 214 rights = if data.allowKeysForGroup then "750" else "700";
-11
nixos/modules/services/backup/bacula.nix
··· 97 97 ${dir_cfg.extraConfig} 98 98 ''; 99 99 100 - # TODO: by default use this config 101 - bconsole_conf = pkgs.writeText "bconsole.conf" 102 - '' 103 - Director { 104 - Name = ${dir_cfg.name}; 105 - Address = "localhost"; 106 - DirPort = ${toString dir_cfg.port}; 107 - Password = "${dir_cfg.password}"; 108 - } 109 - ''; 110 - 111 100 directorOptions = {name, config, ...}: 112 101 { 113 102 options = {
-1
nixos/modules/services/backup/crashplan-small-business.nix
··· 3 3 let 4 4 cfg = config.services.crashplansb; 5 5 crashplansb = pkgs.crashplansb.override { maxRam = cfg.maxRam; }; 6 - varDir = "/var/lib/crashplan"; 7 6 in 8 7 9 8 with lib;
-1
nixos/modules/services/backup/crashplan.nix
··· 3 3 let 4 4 cfg = config.services.crashplan; 5 5 crashplan = pkgs.crashplan; 6 - varDir = "/var/lib/crashplan"; 7 6 in 8 7 9 8 with lib;
-1
nixos/modules/services/backup/restic.nix
··· 127 127 mapAttrs' (name: backup: 128 128 let 129 129 extraOptions = concatMapStrings (arg: " -o ${arg}") backup.extraOptions; 130 - connectTo = elemAt (splitString ":" backup.repository) 1; 131 130 resticCmd = "${pkgs.restic}/bin/restic${extraOptions}"; 132 131 in nameValuePair "restic-backups-${name}" ({ 133 132 environment = {
-7
nixos/modules/services/backup/znapzend.nix
··· 5 5 6 6 let 7 7 8 - # Converts a plan like 9 - # { "1d" = "1h"; "1w" = "1d"; } 10 - # into 11 - # "1d=>1h,1w=>1d" 12 - attrToPlan = attrs: concatStringsSep "," (builtins.attrValues ( 13 - mapAttrs (n: v: "${n}=>${v}") attrs)); 14 - 15 8 planDescription = '' 16 9 The znapzend backup plan to use for the source. 17 10 </para>
+1 -4
nixos/modules/services/cluster/hadoop/default.nix
··· 1 1 { config, lib, pkgs, ...}: 2 - let 3 - cfg = config.services.hadoop; 4 - hadoopConf = import ./conf.nix { hadoop = cfg; pkgs = pkgs; }; 5 - in 2 + 6 3 with lib; 7 4 { 8 5 imports = [ ./yarn.nix ./hdfs.nix ];
-3
nixos/modules/services/cluster/kubernetes/default.nix
··· 36 36 })} 37 37 ''; 38 38 39 - skipAttrs = attrs: map (filterAttrs (k: v: k != "enable")) 40 - (filter (v: !(hasAttr "enable" v) || v.enable) attrs); 41 - 42 39 infraContainer = pkgs.dockerTools.buildImage { 43 40 name = "pause"; 44 41 tag = "latest";
-2
nixos/modules/services/mail/dovecot.nix
··· 9 9 baseDir = "/run/dovecot2"; 10 10 stateDir = "/var/lib/dovecot"; 11 11 12 - canCreateMailUserGroup = cfg.mailUser != null && cfg.mailGroup != null; 13 - 14 12 dovecotConf = concatStrings [ 15 13 '' 16 14 base_dir = ${baseDir}
-10
nixos/modules/services/misc/disnix.nix
··· 7 7 8 8 cfg = config.services.disnix; 9 9 10 - dysnomia = pkgs.dysnomia.override (origArgs: { 11 - enableApacheWebApplication = config.services.httpd.enable; 12 - enableAxis2WebService = config.services.tomcat.axis2.enable; 13 - enableEjabberdDump = config.services.ejabberd.enable; 14 - enableMySQLDatabase = config.services.mysql.enable; 15 - enablePostgreSQLDatabase = config.services.postgresql.enable; 16 - enableSubversionRepository = config.services.svnserve.enable; 17 - enableTomcatWebApplication = config.services.tomcat.enable; 18 - enableMongoDatabase = config.services.mongodb.enable; 19 - }); 20 10 in 21 11 22 12 {
-37
nixos/modules/services/misc/docker-registry.nix
··· 5 5 let 6 6 cfg = config.services.dockerRegistry; 7 7 8 - blobCache = if cfg.enableRedisCache 9 - then "redis" 10 - else "inmemory"; 11 - 12 - registryConfig = { 13 - version = "0.1"; 14 - log.fields.service = "registry"; 15 - storage = { 16 - cache.blobdescriptor = blobCache; 17 - filesystem.rootdirectory = cfg.storagePath; 18 - delete.enabled = cfg.enableDelete; 19 - }; 20 - http = { 21 - addr = ":${builtins.toString cfg.port}"; 22 - headers.X-Content-Type-Options = ["nosniff"]; 23 - }; 24 - health.storagedriver = { 25 - enabled = true; 26 - interval = "10s"; 27 - threshold = 3; 28 - }; 29 - }; 30 - 31 - registryConfig.redis = mkIf cfg.enableRedisCache { 32 - addr = "${cfg.redisUrl}"; 33 - password = "${cfg.redisPassword}"; 34 - db = 0; 35 - dialtimeout = "10ms"; 36 - readtimeout = "10ms"; 37 - writetimeout = "10ms"; 38 - pool = { 39 - maxidle = 16; 40 - maxactive = 64; 41 - idletimeout = "300s"; 42 - }; 43 - }; 44 - 45 8 configFile = pkgs.writeText "docker-registry-config.yml" (builtins.toJSON (recursiveUpdate registryConfig cfg.extraConfig)); 46 9 47 10 in {
-3
nixos/modules/services/misc/dysnomia.nix
··· 62 62 cd $out 63 63 64 64 ${concatMapStrings (containerName: 65 - let 66 - components = cfg.components."${containerName}"; 67 - in 68 65 linkMutableComponents { inherit containerName; } 69 66 ) (builtins.attrNames cfg.components)} 70 67 '';
-1
nixos/modules/services/misc/emby.nix
··· 4 4 5 5 let 6 6 cfg = config.services.emby; 7 - emby = pkgs.emby; 8 7 in 9 8 { 10 9 options = {
-1
nixos/modules/services/misc/exhibitor.nix
··· 4 4 5 5 let 6 6 cfg = config.services.exhibitor; 7 - exhibitor = cfg.package; 8 7 exhibitorConfig = '' 9 8 zookeeper-install-directory=${cfg.baseDir}/zookeeper 10 9 zookeeper-data-directory=${cfg.zkDataDir}
-1
nixos/modules/services/misc/mediatomb.nix
··· 4 4 5 5 let 6 6 7 - uid = config.ids.uids.mediatomb; 8 7 gid = config.ids.gids.mediatomb; 9 8 cfg = config.services.mediatomb; 10 9
+1 -1
nixos/modules/services/misc/nzbget.nix
··· 4 4 5 5 let 6 6 cfg = config.services.nzbget; 7 - nzbget = pkgs.nzbget; in { 7 + in { 8 8 options = { 9 9 services.nzbget = { 10 10 enable = mkEnableOption "NZBGet";
-1
nixos/modules/services/misc/plex.nix
··· 4 4 5 5 let 6 6 cfg = config.services.plex; 7 - plex = pkgs.plex; 8 7 in 9 8 { 10 9 options = {
-10
nixos/modules/services/misc/taskserver/default.nix
··· 7 7 8 8 taskd = "${pkgs.taskserver}/bin/taskd"; 9 9 10 - mkVal = val: 11 - if val == true then "true" 12 - else if val == false then "false" 13 - else if isList val then concatStringsSep ", " val 14 - else toString val; 15 - 16 - mkConfLine = key: val: let 17 - result = "${key} = ${mkVal val}"; 18 - in optionalString (val != null && val != []) result; 19 - 20 10 mkManualPkiOption = desc: mkOption { 21 11 type = types.nullOr types.path; 22 12 default = null;
-3
nixos/modules/services/networking/gdomap.nix
··· 2 2 3 3 with lib; 4 4 5 - let 6 - cfg = config.services.gdomap; 7 - in 8 5 { 9 6 # 10 7 # interface
+2 -2
nixos/modules/services/networking/i2pd.nix
··· 103 103 104 104 ${flip concatMapStrings 105 105 (collect (proto: proto ? port && proto ? address && proto ? name) cfg.proto) 106 - (proto: let portStr = toString proto.port; in '' 106 + (proto: '' 107 107 [${proto.name}] 108 108 enabled = ${boolToString proto.enable} 109 109 address = ${proto.address} ··· 122 122 # DO NOT EDIT -- this file has been generated automatically. 123 123 ${flip concatMapStrings 124 124 (collect (tun: tun ? port && tun ? destination) cfg.outTunnels) 125 - (tun: let portStr = toString tun.port; in '' 125 + (tun: '' 126 126 [${tun.name}] 127 127 type = client 128 128 destination = ${tun.destination}
-2
nixos/modules/services/networking/morty.nix
··· 6 6 7 7 cfg = config.services.morty; 8 8 9 - configFile = cfg.configFile; 10 - 11 9 in 12 10 13 11 {
-1
nixos/modules/services/networking/znc.nix
··· 26 26 }; 27 27 28 28 # Keep znc.conf in nix store, then symlink or copy into `dataDir`, depending on `mutable`. 29 - notNull = a: ! isNull a; 30 29 mkZncConf = confOpts: '' 31 30 Version = 1.6.3 32 31 ${concatMapStrings (n: "LoadModule = ${n}\n") confOpts.modules}
-1
nixos/modules/services/system/saslauthd.nix
··· 4 4 5 5 let 6 6 7 - nssModulesPath = config.system.nssModules.path; 8 7 cfg = config.services.saslauthd; 9 8 10 9 in
-6
nixos/modules/services/torrent/transmission.nix
··· 13 13 settingsDir = "${homeDir}/.config/transmission-daemon"; 14 14 settingsFile = pkgs.writeText "settings.json" (builtins.toJSON fullSettings); 15 15 16 - # Strings must be quoted, ints and bools must not (for settings.json). 17 - toOption = x: 18 - if isBool x then boolToString x 19 - else if isInt x then toString x 20 - else toString ''"${x}"''; 21 - 22 16 # for users in group "transmission" to have access to torrents 23 17 fullSettings = { umask = 2; download-dir = downloadDir; incomplete-dir = incompleteDir; } // cfg.settings; 24 18
-1
nixos/modules/services/web-apps/frab.nix
··· 6 6 cfg = config.services.frab; 7 7 8 8 package = pkgs.frab; 9 - ruby = package.ruby; 10 9 11 10 databaseConfig = builtins.toJSON { production = cfg.database; }; 12 11
-5
nixos/modules/services/web-servers/apache-httpd/default.nix
··· 98 98 allSubservices = mainSubservices ++ concatMap subservicesFor mainCfg.virtualHosts; 99 99 100 100 101 - # !!! should be in lib 102 - writeTextInDir = name: text: 103 - pkgs.runCommand name {inherit text;} "mkdir -p $out; echo -n \"$text\" > $out/$name"; 104 - 105 - 106 101 enableSSL = any (vhost: vhost.enableSSL) allHosts; 107 102 108 103
-11
nixos/modules/services/web-servers/apache-httpd/owncloud.nix
··· 4 4 5 5 let 6 6 7 - httpd = serverInfo.serverConfig.package; 8 - 9 - version24 = !versionOlder httpd.version "2.4"; 10 - 11 - allGranted = if version24 then '' 12 - Require all granted 13 - '' else '' 14 - Order allow,deny 15 - Allow from all 16 - ''; 17 - 18 7 owncloudConfig = pkgs.writeText "config.php" 19 8 '' 20 9 <?php
-2
nixos/modules/services/web-servers/apache-httpd/trac.nix
··· 12 12 apacheHttpd = httpd; 13 13 }; 14 14 15 - pythonLib = p: "${p}/"; 16 - 17 15 httpd = serverInfo.serverConfig.package; 18 16 19 17 versionPre24 = versionOlder httpd.version "2.4";
-4
nixos/modules/services/web-servers/uwsgi.nix
··· 27 27 else if hasPython3 then uwsgi.python3 28 28 else null; 29 29 30 - pythonPackages = pkgs.pythonPackages.override { 31 - inherit python; 32 - }; 33 - 34 30 pythonEnv = python.withPackages (c.pythonPackages or (self: [])); 35 31 36 32 uwsgiCfg = {
-1
nixos/modules/services/x11/desktop-managers/gnome3.nix
··· 10 10 let 11 11 pkgName = drv: (builtins.parseDrvName drv.name).name; 12 12 ysNames = map pkgName ys; 13 - res = (filter (x: !(builtins.elem (pkgName x) ysNames)) xs); 14 13 in 15 14 filter (x: !(builtins.elem (pkgName x) ysNames)) xs; 16 15
-1
nixos/modules/system/boot/stage-1.nix
··· 11 11 12 12 udev = config.systemd.package; 13 13 14 - kernelPackages = config.boot.kernelPackages; 15 14 modulesTree = config.system.modulesTree; 16 15 firmware = config.hardware.firmware; 17 16
-3
nixos/modules/system/boot/stage-2.nix
··· 4 4 5 5 let 6 6 7 - kernel = config.boot.kernelPackages.kernel; 8 - activateConfiguration = config.system.activationScripts.script; 9 - 10 7 bootStage2 = pkgs.substituteAll { 11 8 src = ./stage-2-init.sh; 12 9 shellDebug = "${pkgs.bashInteractive}/bin/bash";
-3
nixos/modules/system/boot/systemd-nspawn.nix
··· 6 6 7 7 let 8 8 cfg = config.systemd.nspawn; 9 - assertions = [ 10 - # boot = true -> processtwo != true 11 - ]; 12 9 13 10 checkExec = checkUnitConfig "Exec" [ 14 11 (assertOnlyFields [
-2
nixos/modules/system/boot/systemd.nix
··· 188 188 "timers.target" 189 189 ]; 190 190 191 - boolToString = value: if value then "yes" else "no"; 192 - 193 191 makeJobScript = name: text: 194 192 let mkScriptName = s: (replaceChars [ "\\" ] [ "-" ] (shellEscape s) ); 195 193 x = pkgs.writeTextFile { name = "unit-script"; executable = true; destination = "/bin/${mkScriptName name}"; inherit text; };
-1
nixos/modules/tasks/encrypted-devices.nix
··· 7 7 encDevs = filter (dev: dev.encrypted.enable) fileSystems; 8 8 keyedEncDevs = filter (dev: dev.encrypted.keyFile != null) encDevs; 9 9 keylessEncDevs = filter (dev: dev.encrypted.keyFile == null) encDevs; 10 - isIn = needle: haystack: filter (p: p == needle) haystack != []; 11 10 anyEncrypted = 12 11 fold (j: v: v || j.encrypted.enable) false encDevs; 13 12
-1
nixos/modules/tasks/filesystems/zfs.nix
··· 9 9 10 10 let 11 11 12 - cfgSpl = config.boot.spl; 13 12 cfgZfs = config.boot.zfs; 14 13 cfgSnapshots = config.services.zfs.autoSnapshot; 15 14 cfgSnapFlags = cfgSnapshots.flags;
-1
nixos/modules/tasks/network-interfaces-scripted.nix
··· 7 7 8 8 cfg = config.networking; 9 9 interfaces = attrValues cfg.interfaces; 10 - hasVirtuals = any (i: i.virtual) interfaces; 11 10 12 11 slaves = concatMap (i: i.interfaces) (attrValues cfg.bonds) 13 12 ++ concatMap (i: i.interfaces) (attrValues cfg.bridges)
-4
nixos/modules/testing/test-instrumentation.nix
··· 6 6 with lib; 7 7 with import ../../lib/qemu-flags.nix { inherit pkgs; }; 8 8 9 - let 10 - kernel = config.boot.kernelPackages.kernel; 11 - in 12 - 13 9 { 14 10 15 11 # This option is a dummy that if used in conjunction with
-3
nixos/modules/virtualisation/openvswitch.nix
··· 51 51 # Where the communication sockets live 52 52 runDir = "/var/run/openvswitch"; 53 53 54 - # Where the config database live (can't be in nix-store) 55 - stateDir = "/var/db/openvswitch"; 56 - 57 54 # The path to the an initialized version of the database 58 55 db = pkgs.stdenv.mkDerivation { 59 56 name = "vswitch.db";
+2 -8
nixos/tests/cjdns.nix
··· 2 2 carolKey = "2d2a338b46f8e4a8c462f0c385b481292a05f678e19a2b82755258cf0f0af7e2"; 3 3 carolPubKey = "n932l3pjvmhtxxcdrqq2qpw5zc58f01vvjx01h4dtd1bb0nnu2h0.k"; 4 4 carolPassword = "678287829ce4c67bc8b227e56d94422ee1b85fa11618157b2f591de6c6322b52"; 5 - carolIp4 = "192.168.0.9"; 6 5 7 6 basicConfig = 8 7 { config, pkgs, ... }: ··· 43 44 bob = 44 45 { config, lib, nodes, ... }: 45 46 46 - let carolIp4 = lib.mkForce nodes.carol.config.networking.interfaces.eth1; in 47 - 48 - { imports = [ basicConfig ]; 47 + { imports = [ basicConfig ]; 49 48 50 49 networking.interfaces.eth1.ipv4.addresses = [ 51 50 { address = "192.168.0.2"; prefixLength = 24; } ··· 64 67 # but knows neither Alice or Bob. 65 68 carol = 66 69 { config, lib, nodes, ... }: 67 - let 68 - carolIp4 = (lib.mkForce nodes.carol.config.networking.interfaces.eth1); 69 - in 70 - { imports = [ basicConfig ]; 70 + { imports = [ basicConfig ]; 71 71 72 72 environment.etc."cjdns.keys".text = '' 73 73 CJDNS_PRIVATE_KEY=${carolKey}
-1
nixos/tests/containers-reloadable.nix
··· 45 45 }; 46 46 47 47 testScript = {nodes, ...}: let 48 - originalSystem = nodes.client.config.system.build.toplevel; 49 48 c1System = nodes.client_c1.config.system.build.toplevel; 50 49 c2System = nodes.client_c2.config.system.build.toplevel; 51 50 in ''
-3
nixos/tests/installer.nix
··· 58 58 ''; 59 59 60 60 61 - channelContents = [ pkgs.rlwrap ]; 62 - 63 - 64 61 # The test script boots a NixOS VM, installs NixOS on an empty hard 65 62 # disk, and then reboot from the hard disk. It's parameterized with 66 63 # a test script fragment `createPartitions', which must create
-2
nixos/tests/pam-oath-login.nix
··· 12 12 # and picking a the first 4: 13 13 oathSnakeOilPassword1 = "143349"; 14 14 oathSnakeOilPassword2 = "801753"; 15 - oathSnakeOilPassword3 = "019933"; 16 - oathSnakeOilPassword4 = "403895"; 17 15 18 16 alicePassword = "foobar"; 19 17 # Generated via: mkpasswd -m sha-512 and passing in "foobar"
+2 -2
pkgs/applications/altcoins/mist.nix
··· 26 26 }; 27 27 28 28 mist = stdenv.lib.appendToName "unwrapped" (stdenv.mkDerivation { 29 - inherit name version; 29 + inherit name version meta; 30 30 31 31 src = { 32 32 i686-linux = fetchurl { ··· 56 56 }); 57 57 in 58 58 buildFHSUserEnv { 59 - inherit name; 59 + inherit name meta; 60 60 61 61 targetPkgs = pkgs: with pkgs; [ 62 62 mist
-3
pkgs/applications/audio/clementine/default.nix
··· 4 4 , qca2, pkgconfig, sparsehash, config, makeWrapper, runCommand, gst_plugins }: 5 5 6 6 let 7 - withSpotify = config.clementine.spotify or false; 8 7 withIpod = config.clementine.ipod or false; 9 8 withMTP = config.clementine.mtp or true; 10 9 withCD = config.clementine.cd or true; 11 10 withCloud = config.clementine.cloud or true; 12 11 13 12 version = "1.3.1"; 14 - 15 - exeName = "clementine"; 16 13 17 14 src = fetchurl { 18 15 url = https://github.com/clementine-player/Clementine/archive/1.3.1.tar.gz;
-6
pkgs/applications/editors/emacs-modes/org-packages.nix
··· 23 23 24 24 super = imported; 25 25 26 - markBroken = pkg: pkg.override { 27 - elpaBuild = args: self.elpaBuild (args // { 28 - meta = (args.meta or {}) // { broken = true; }; 29 - }); 30 - }; 31 - 32 26 overrides = { 33 27 }; 34 28
-1
pkgs/applications/editors/textadept/default.nix
··· 56 56 gtdialog_zip = "gtdialog_1.3.zip"; 57 57 cdk_tgz = "cdk-5.0-20150928.tgz"; 58 58 termkey_tgz = "libtermkey-0.17.tar.gz"; 59 - bombay_zip = "bombay.zip"; 60 59 61 60 scinterm_url = "http://foicica.com/scinterm/download/" + scinterm_zip; 62 61 tre_url = "https://github.com/laurikari/tre/archive/" + tre_zip;
-1
pkgs/applications/misc/bitcoinarmory/default.nix
··· 6 6 let 7 7 8 8 version = "0.96.1"; 9 - sitePackages = pythonPackages.python.sitePackages; 10 9 inherit (pythonPackages) buildPythonApplication pyqt4 psutil twisted; 11 10 12 11 in buildPythonApplication {
+1 -2
pkgs/applications/misc/llpp/default.nix
··· 3 3 4 4 assert lib.versionAtLeast (lib.getVersion ocaml) "4.02"; 5 5 6 - let ocamlVersion = (builtins.parseDrvName (ocaml.name)).version; 7 - in stdenv.mkDerivation rec { 6 + stdenv.mkDerivation rec { 8 7 name = "llpp-${version}"; 9 8 version = "2018-03-02"; 10 9
-7
pkgs/applications/misc/tqsl/default.nix
··· 1 1 { stdenv, fetchurl, makeWrapper, cmake, expat, openssl, zlib, db, curl, wxGTK }: 2 2 3 - let 4 - lib_suffix = 5 - if stdenv.system == "x86_64-linux" then 6 - "64" 7 - else 8 - ""; 9 - in 10 3 stdenv.mkDerivation rec { 11 4 name = "tqsl-${version}"; 12 5 version = "2.3.1";
-4
pkgs/applications/networking/browsers/chromium/common.nix
··· 43 43 # source tree. 44 44 extraAttrs = buildFun base; 45 45 46 - gentooPatch = name: sha256: fetchpatch { 47 - url = "https://gitweb.gentoo.org/repo/gentoo.git/plain/www-client/chromium/files/${name}"; 48 - inherit sha256; 49 - }; 50 46 githubPatch = commit: sha256: fetchpatch { 51 47 url = "https://github.com/chromium/chromium/commit/${commit}.patch"; 52 48 inherit sha256;
-6
pkgs/applications/networking/browsers/mozilla-plugins/flashplayer/standalone.nix
··· 47 47 , debug ? false 48 48 }: 49 49 50 - let 51 - arch = 52 - if stdenv.system == "x86_64-linux" then 53 - "x86_64" 54 - else throw "Flash Player is not supported on this platform"; 55 - in 56 50 stdenv.mkDerivation rec { 57 51 name = "flashplayer-standalone-${version}"; 58 52 version = "30.0.0.134";
-1
pkgs/applications/office/mendeley/default.nix
··· 36 36 37 37 let 38 38 arch32 = "i686-linux"; 39 - arch64 = "x86_64-linux"; 40 39 41 40 arch = if stdenv.system == arch32 42 41 then "i386"
-4
pkgs/applications/science/electronics/bitscope/common.nix
··· 60 60 ${(wrapBinary libs) attrs.toolName} 61 61 ''; 62 62 }); 63 - fhs = target: buildFHSUserEnv { 64 - inherit (pkg) name; 65 - runScript = target; 66 - }; 67 63 in buildFHSUserEnv { 68 64 name = "${attrs.toolName}-${attrs.version}"; 69 65 runScript = "${pkg.outPath}/bin/${attrs.toolName}";
-4
pkgs/applications/science/electronics/bitscope/packages.nix
··· 6 6 }: 7 7 8 8 let 9 - wrapBinary = libPaths: binaryName: '' 10 - wrapProgram "$out/bin/${binaryName}" \ 11 - --prefix LD_LIBRARY_PATH : "${stdenv.lib.makeLibraryPath libPaths}" 12 - ''; 13 9 mkBitscope = callPackage (import ./common.nix) { }; 14 10 in { 15 11 chart = let
-6
pkgs/applications/science/math/mathematica/default.nix
··· 24 24 }: 25 25 26 26 let 27 - platform = 28 - if stdenv.system == "i686-linux" || stdenv.system == "x86_64-linux" then 29 - "Linux" 30 - else 31 - throw "Mathematica requires i686-linux or x86_64 linux"; 32 - 33 27 l10n = 34 28 with stdenv.lib; 35 29 with callPackage ./l10ns.nix {};
+1 -9
pkgs/applications/science/misc/golly/beta.nix
··· 2 2 , wxGTK, perl, python2, zlib, libGLU_combined, libX11 3 3 , automake, autoconf 4 4 }: 5 - let 6 - s = # Generated upstream information 7 - rec { 8 - baseName="golly"; 9 - version="2.8"; 10 - name="${baseName}-${version}"; 11 - hash="0a4vn2hm7h4b47v2iwip1z3n9y8isf79v08aipl2iqms2m3p5204"; 12 - }; 13 - in 5 + 14 6 stdenv.mkDerivation rec { 15 7 name = "golly-${version}"; 16 8 version = "2.8.99.2.20161122";
-5
pkgs/applications/virtualization/xen/4.10.nix
··· 22 22 # and try applying all the ones we don't have yet. 23 23 24 24 let 25 - xsaPatch = { name , sha256 }: (fetchpatch { 26 - url = "https://xenbits.xen.org/xsa/xsa${name}.patch"; 27 - inherit sha256; 28 - }); 29 - 30 25 xsa = import ./xsa-patches.nix { inherit fetchpatch; }; 31 26 32 27 qemuMemfdBuildFix = fetchpatch {
-5
pkgs/applications/virtualization/xen/4.8.nix
··· 22 22 # and try applying all the ones we don't have yet. 23 23 24 24 let 25 - xsaPatch = { name , sha256 }: (fetchpatch { 26 - url = "https://xenbits.xen.org/xsa/xsa${name}.patch"; 27 - inherit sha256; 28 - }); 29 - 30 25 xsa = import ./xsa-patches.nix { inherit fetchpatch; }; 31 26 32 27 xenlockprofpatch = (fetchpatch {
-7
pkgs/applications/window-managers/way-cooler/way-cooler.nix
··· 1 1 # Generated by carnix 0.6.5: carnix -o way-cooler.nix Cargo.lock 2 2 { lib, buildPlatform, buildRustCrate, fetchgit }: 3 3 let kernel = buildPlatform.parsed.kernel.name; 4 - abi = buildPlatform.parsed.abi.name; 5 - include = includedFiles: src: builtins.filterSource (path: type: 6 - lib.lists.any (f: 7 - let p = toString (src + ("/" + f)); in 8 - (path == p) || (type == "directory" && lib.strings.hasPrefix path p) 9 - ) includedFiles 10 - ) src; 11 4 updateFeatures = f: up: functions: builtins.deepSeq f (lib.lists.foldl' (features: fun: fun features) (lib.attrsets.recursiveUpdate f up) functions); 12 5 mapFeatures = features: map (fun: fun { features = features; }); 13 6 mkFeatures = feat: lib.lists.foldl (features: featureName:
-7
pkgs/applications/window-managers/way-cooler/wc-bg.nix
··· 1 1 # Generated by carnix 0.6.5: carnix -o wc-bg.nix Cargo.lock 2 2 { lib, buildPlatform, buildRustCrate, fetchgit }: 3 3 let kernel = buildPlatform.parsed.kernel.name; 4 - abi = buildPlatform.parsed.abi.name; 5 - include = includedFiles: src: builtins.filterSource (path: type: 6 - lib.lists.any (f: 7 - let p = toString (src + ("/" + f)); in 8 - (path == p) || (type == "directory" && lib.strings.hasPrefix path p) 9 - ) includedFiles 10 - ) src; 11 4 updateFeatures = f: up: functions: builtins.deepSeq f (lib.lists.foldl' (features: fun: fun features) (lib.attrsets.recursiveUpdate f up) functions); 12 5 mapFeatures = features: map (fun: fun { features = features; }); 13 6 mkFeatures = feat: lib.lists.foldl (features: featureName:
-7
pkgs/applications/window-managers/way-cooler/wc-grab.nix
··· 1 1 # Generated by carnix 0.6.5: carnix -o wc-grab.nix Cargo.lock 2 2 { lib, buildPlatform, buildRustCrate, fetchgit }: 3 3 let kernel = buildPlatform.parsed.kernel.name; 4 - abi = buildPlatform.parsed.abi.name; 5 - include = includedFiles: src: builtins.filterSource (path: type: 6 - lib.lists.any (f: 7 - let p = toString (src + ("/" + f)); in 8 - (path == p) || (type == "directory" && lib.strings.hasPrefix path p) 9 - ) includedFiles 10 - ) src; 11 4 updateFeatures = f: up: functions: builtins.deepSeq f (lib.lists.foldl' (features: fun: fun features) (lib.attrsets.recursiveUpdate f up) functions); 12 5 mapFeatures = features: map (fun: fun { features = features; }); 13 6 mkFeatures = feat: lib.lists.foldl (features: featureName:
-7
pkgs/applications/window-managers/way-cooler/wc-lock.nix
··· 1 1 # Generated by carnix 0.6.5: carnix -o wc-lock.nix Cargo.lock 2 2 { lib, buildPlatform, buildRustCrate, fetchgit }: 3 3 let kernel = buildPlatform.parsed.kernel.name; 4 - abi = buildPlatform.parsed.abi.name; 5 - include = includedFiles: src: builtins.filterSource (path: type: 6 - lib.lists.any (f: 7 - let p = toString (src + ("/" + f)); in 8 - (path == p) || (type == "directory" && lib.strings.hasPrefix path p) 9 - ) includedFiles 10 - ) src; 11 4 updateFeatures = f: up: functions: builtins.deepSeq f (lib.lists.foldl' (features: fun: fun features) (lib.attrsets.recursiveUpdate f up) functions); 12 5 mapFeatures = features: map (fun: fun { features = features; }); 13 6 mkFeatures = feat: lib.lists.foldl (features: featureName:
-3
pkgs/build-support/dotnetenv/build-solution.nix
··· 14 14 15 15 assert modifyPublicMain -> mainClassFile != null; 16 16 17 - let 18 - wrapperCS = ./Wrapper.cs.in; 19 - in 20 17 stdenv.mkDerivation { 21 18 inherit name src; 22 19
-2
pkgs/build-support/fetchdocker/generic-fetcher.nix
··· 2 2 let 3 3 awk = "${gawk}/bin/awk"; 4 4 dockerCredentialsFile = import ./credentials.nix; 5 - stripScheme = 6 - builtins.replaceStrings [ "https://" "http://" ] [ "" "" ]; 7 5 in 8 6 { fetcher 9 7 , name
+1 -10
pkgs/build-support/rust/build-rust-crate.nix
··· 187 187 crateType, metadata, crateBin, finalBins, 188 188 extraRustcOpts, verbose, colors }: 189 189 190 - let depsDir = lib.concatStringsSep " " dependencies; 191 - completeDepsDir = lib.concatStringsSep " " completeDeps; 192 - completeBuildDepsDir = lib.concatStringsSep " " completeBuildDeps; 193 - deps = makeDeps dependencies; 194 - optLevel = if release then 3 else 0; 190 + let deps = makeDeps dependencies; 195 191 rustcOpts = 196 192 lib.lists.foldl' (opts: opt: opts + " " + opt) 197 193 (if release then "-C opt-level=3" else "-C debuginfo=2") 198 194 (["-C codegen-units=1"] ++ extraRustcOpts); 199 195 rustcMeta = "-C metadata=${metadata} -C extra-filename=-${metadata}"; 200 - version_ = lib.splitString "-" crateVersion; 201 - versionPre = if lib.tail version_ == [] then "" else builtins.elemAt version_ 1; 202 - version = lib.splitString "." (lib.head version_); 203 - authors = lib.concatStringsSep ":" crateAuthors; 204 196 in '' 205 197 runHook preBuild 206 198 norm="" ··· 340 348 preConfigure, postConfigure, preBuild, postBuild, preInstall, postInstall }: 341 349 342 350 let crate = crate_ // (lib.attrByPath [ crate_.crateName ] (attr: {}) crateOverrides crate_); 343 - release_ = release; 344 351 dependencies_ = dependencies; 345 352 buildDependencies_ = buildDependencies; 346 353 processedAttrs = [
-6
pkgs/build-support/rust/carnix.nix
··· 2 2 { lib, buildPlatform, buildRustCrate, fetchgit }: 3 3 let kernel = buildPlatform.parsed.kernel.name; 4 4 abi = buildPlatform.parsed.abi.name; 5 - include = includedFiles: src: builtins.filterSource (path: type: 6 - lib.lists.any (f: 7 - let p = toString (src + ("/" + f)); in 8 - (path == p) || (type == "directory" && lib.strings.hasPrefix path p) 9 - ) includedFiles 10 - ) src; 11 5 updateFeatures = f: up: functions: builtins.deepSeq f (lib.lists.foldl' (features: fun: fun features) (lib.attrsets.recursiveUpdate f up) functions); 12 6 mapFeatures = features: map (fun: fun { features = features; }); 13 7 mkFeatures = feat: lib.lists.foldl (features: featureName:
-2
pkgs/build-support/rust/default.nix
··· 20 20 assert cargoVendorDir == null -> cargoSha256 != "unset"; 21 21 22 22 let 23 - lib = stdenv.lib; 24 - 25 23 cargoDeps = if cargoVendorDir == null 26 24 then fetchcargo { 27 25 inherit name src srcs sourceRoot cargoUpdateHook;
-5
pkgs/build-support/vm/windows/default.nix
··· 21 21 22 22 in { 23 23 runInWindowsVM = drv: let 24 - newDrv = drv.override { 25 - stdenv = drv.stdenv.override { 26 - shell = "/bin/sh"; 27 - }; 28 - }; 29 24 in pkgs.lib.overrideDerivation drv (attrs: let 30 25 bootstrap = bootstrapper attrs.windowsImage; 31 26 in {
-1
pkgs/development/compilers/chicken/eggDerivation.nix
··· 8 8 let 9 9 libPath = "${chicken}/var/lib/chicken/${toString chicken.binaryVersion}/"; 10 10 overrides = import ./overrides.nix; 11 - lib = stdenv.lib; 12 11 baseName = (builtins.parseDrvName name).name; 13 12 override = if builtins.hasAttr baseName overrides 14 13 then
-3
pkgs/development/compilers/gcc/4.8/default.nix
··· 54 54 55 55 let version = "4.8.5"; 56 56 57 - # Whether building a cross-compiler for GNU/Hurd. 58 - crossGNU = targetPlatform != hostPlatform && targetPlatform.config == "i586-pc-gnu"; 59 - 60 57 enableParallelBuilding = true; 61 58 62 59 patches = [ ]
-3
pkgs/development/compilers/gcc/4.9/default.nix
··· 54 54 55 55 let version = "4.9.4"; 56 56 57 - # Whether building a cross-compiler for GNU/Hurd. 58 - crossGNU = targetPlatform != hostPlatform && targetPlatform.config == "i586-pc-gnu"; 59 - 60 57 enableParallelBuilding = true; 61 58 62 59 patches =
-3
pkgs/development/compilers/gcc/5/default.nix
··· 53 53 let version = "5.5.0"; 54 54 sha256 = "11zd1hgzkli3b2v70qsm2hyqppngd4616qc96lmm9zl2kl9yl32k"; 55 55 56 - # Whether building a cross-compiler for GNU/Hurd. 57 - crossGNU = targetPlatform != hostPlatform && targetPlatform.config == "i586-pc-gnu"; 58 - 59 56 enableParallelBuilding = true; 60 57 61 58 patches =
-3
pkgs/development/compilers/gcc/6/default.nix
··· 52 52 53 53 let version = "6.4.0"; 54 54 55 - # Whether building a cross-compiler for GNU/Hurd. 56 - crossGNU = targetPlatform != hostPlatform && targetPlatform.config == "i586-pc-gnu"; 57 - 58 55 enableParallelBuilding = true; 59 56 60 57 patches =
-3
pkgs/development/compilers/gcc/7/default.nix
··· 41 41 42 42 let version = "7.3.0"; 43 43 44 - # Whether building a cross-compiler for GNU/Hurd. 45 - crossGNU = targetPlatform != hostPlatform && targetPlatform.config == "i586-pc-gnu"; 46 - 47 44 enableParallelBuilding = true; 48 45 49 46 patches =
-3
pkgs/development/compilers/gcc/8/default.nix
··· 41 41 42 42 let version = "8.1.0"; 43 43 44 - # Whether building a cross-compiler for GNU/Hurd. 45 - crossGNU = targetPlatform != hostPlatform && targetPlatform.config == "i586-pc-gnu"; 46 - 47 44 enableParallelBuilding = true; 48 45 49 46 patches =
-3
pkgs/development/compilers/gcc/snapshot/default.nix
··· 42 42 43 43 let version = "7-20170409"; 44 44 45 - # Whether building a cross-compiler for GNU/Hurd. 46 - crossGNU = targetPlatform != hostPlatform && targetPlatform.config == "i586-pc-gnu"; 47 - 48 45 enableParallelBuilding = true; 49 46 50 47 patches =
-1
pkgs/development/compilers/ocaml/ber-metaocaml-104.nix
··· 2 2 3 3 let 4 4 useX11 = stdenv.isi686 || stdenv.isx86_64; 5 - useNativeCompilers = stdenv.isi686 || stdenv.isx86_64 || stdenv.isMips; 6 5 inherit (stdenv.lib) optionals optionalString; 7 6 in 8 7
-4
pkgs/development/haskell-modules/hoogle.nix
··· 36 36 if !isGhcjs 37 37 then "haddock" 38 38 else "haddock-ghcjs"; 39 - ghcName = 40 - if !isGhcjs 41 - then "ghc" 42 - else "ghcjs"; 43 39 ghcDocLibDir = 44 40 if !isGhcjs 45 41 then ghc.doc + ''/share/doc/ghc*/html/libraries''
-5
pkgs/development/interpreters/python/cpython/2.7/default.nix
··· 33 33 majorVersion = "2.7"; 34 34 minorVersion = "15"; 35 35 minorVersionSuffix = ""; 36 - pythonVersion = majorVersion; 37 36 version = "${majorVersion}.${minorVersion}${minorVersionSuffix}"; 38 37 libPrefix = "python${majorVersion}"; 39 38 sitePackages = "lib/${libPrefix}/site-packages"; ··· 159 160 # Never even try to use lchmod on linux, 160 161 # don't rely on detecting glibc-isms. 161 162 ++ optional hostPlatform.isLinux "ac_cv_func_lchmod=no"; 162 - 163 - postConfigure = if hostPlatform.isCygwin then '' 164 - sed -i Makefile -e 's,PYTHONPATH="$(srcdir),PYTHONPATH="$(abs_srcdir),' 165 - '' else null; 166 163 167 164 buildInputs = 168 165 optional (stdenv ? cc && stdenv.cc.libc != null) stdenv.cc.libc ++
-1
pkgs/development/interpreters/python/cpython/3.4/default.nix
··· 29 29 majorVersion = "3.4"; 30 30 minorVersion = "8"; 31 31 minorVersionSuffix = ""; 32 - pythonVersion = majorVersion; 33 32 version = "${majorVersion}.${minorVersion}${minorVersionSuffix}"; 34 33 libPrefix = "python${majorVersion}"; 35 34 sitePackages = "lib/${libPrefix}/site-packages";
-1
pkgs/development/interpreters/python/cpython/3.5/default.nix
··· 29 29 majorVersion = "3.5"; 30 30 minorVersion = "5"; 31 31 minorVersionSuffix = ""; 32 - pythonVersion = majorVersion; 33 32 version = "${majorVersion}.${minorVersion}${minorVersionSuffix}"; 34 33 libPrefix = "python${majorVersion}"; 35 34 sitePackages = "lib/${libPrefix}/site-packages";
-1
pkgs/development/interpreters/python/cpython/3.6/default.nix
··· 29 29 majorVersion = "3.6"; 30 30 minorVersion = "6"; 31 31 minorVersionSuffix = ""; 32 - pythonVersion = majorVersion; 33 32 version = "${majorVersion}.${minorVersion}${minorVersionSuffix}"; 34 33 libPrefix = "python${majorVersion}"; 35 34 sitePackages = "lib/${libPrefix}/site-packages";
-1
pkgs/development/interpreters/python/cpython/3.7/default.nix
··· 29 29 majorVersion = "3.7"; 30 30 minorVersion = "0"; 31 31 minorVersionSuffix = ""; 32 - pythonVersion = majorVersion; 33 32 version = "${majorVersion}.${minorVersion}${minorVersionSuffix}"; 34 33 libPrefix = "python${majorVersion}"; 35 34 sitePackages = "lib/${libPrefix}/site-packages";
-2
pkgs/development/interpreters/ruby/default.nix
··· 32 32 generic = { version, sha256 }: let 33 33 ver = version; 34 34 tag = ver.gitTag; 35 - isRuby20 = ver.majMin == "2.0"; 36 - isRuby21 = ver.majMin == "2.1"; 37 35 isRuby25 = ver.majMin == "2.5"; 38 36 baseruby = self.override { useRailsExpress = false; }; 39 37 self = lib.makeOverridable (
-1
pkgs/development/libraries/wiredtiger/default.nix
··· 13 13 + optionalString (val != null && cond != false) "=${val}"; 14 14 mkEnable = mkFlag "enable-" "disable-"; 15 15 mkWith = mkFlag "with-" "without-"; 16 - mkOther = mkFlag "" "" true; 17 16 18 17 shouldUsePkg = pkg: if pkg != null && pkg.meta.available then pkg else null; 19 18
-1
pkgs/development/lisp-modules/quicklisp-to-nix-overrides.nix
··· 1 1 {pkgs, buildLispPackage, clwrapper, quicklisp-to-nix-packages}: 2 2 let 3 - addDeps = newdeps: x: {deps = x.deps ++ newdeps;}; 4 3 addNativeLibs = libs: x: { propagatedBuildInputs = libs; }; 5 4 skipBuildPhase = x: { 6 5 overrides = y: ((x.overrides y) // { buildPhase = "true"; });
-3
pkgs/development/mobile/androidenv/androidndk.nix
··· 25 25 sed_script_1 = 26 26 "'s|^PROGDIR=`dirname $0`" + 27 27 "|PROGDIR=`dirname $(readlink -f $(which $0))`|'"; 28 - sed_script_2 = 29 - "'s|^MYNDKDIR=`dirname $0`" + 30 - "|MYNDKDIR=`dirname $(readlink -f $(which $0))`|'"; 31 28 runtime_paths = (lib.makeBinPath [ 32 29 coreutils file findutils 33 30 gawk gnugrep gnused
-4
pkgs/development/mobile/androidenv/build-app.nix
··· 7 7 assert release -> keyStore != null && keyAlias != null && keyStorePassword != null && keyAliasPassword != null; 8 8 9 9 let 10 - platformName = if stdenv.system == "i686-linux" || stdenv.system == "x86_64-linux" then "linux" 11 - else if stdenv.system == "x86_64-darwin" then "macosx" 12 - else throw "Platform: ${stdenv.system} is not supported!"; 13 - 14 10 androidsdkComposition = androidsdk { 15 11 inherit platformVersions useGoogleAPIs; 16 12 abiVersions = [];
+1 -6
pkgs/development/ocaml-modules/pycaml/default.nix
··· 2 2 3 3 # This is the original pycaml version with patches from debian. 4 4 5 - let debian = fetchurl { 6 - url = "mirror://debian/pool/main/p/pycaml/pycaml_0.82-14.debian.tar.gz"; 7 - sha256 = "a763088ec1fa76c769bf586ed6692e7ac035b0a2bfd48a90a8e7a9539ec0c2f1"; 8 - }; 9 - 10 - in stdenv.mkDerivation { 5 + stdenv.mkDerivation { 11 6 name = "pycaml-0.82-14"; 12 7 13 8 srcs = [
+2 -5
pkgs/development/python-modules/gurobipy/linux.nix
··· 1 1 { fetchurl, python }: 2 2 assert python.pkgs.isPy27; 3 - let utf = 4 - if python.ucsEncoding == 2 then "16" 5 - else if python.ucsEncoding == 4 then "32" 6 - else throw "Unsupported python UCS encoding UCS${toString python.ucsEncoding}"; 7 - in python.pkgs.buildPythonPackage 3 + 4 + python.pkgs.buildPythonPackage 8 5 { pname = "gurobipy"; 9 6 version = "7.5.2"; 10 7 src = fetchurl
-3
pkgs/development/ruby-modules/testing/stubs.nix
··· 1 1 { stdenv, lib, ruby, callPackage, ... }: 2 2 let 3 - real = { 4 - inherit (stdenv) mkDerivation; 5 - }; 6 3 mkDerivation = {name, ...}@argSet: 7 4 derivation { 8 5 inherit name;
+1 -2
pkgs/development/tools/misc/dialog/default.nix
··· 3 3 , unicodeSupport ? true 4 4 }: 5 5 6 - let optional = stdenv.lib.optional; 7 - optStr = stdenv.lib.optionalString; 6 + let optStr = stdenv.lib.optionalString; 8 7 buildShared = !stdenv.isDarwin; 9 8 in 10 9
-18
pkgs/development/tools/phantomjs2/default.nix
··· 5 5 }: 6 6 7 7 let 8 - fakeXcrun = writeScriptBin "xcrun" '' 9 - #!${stdenv.shell} 10 - echo >&2 "Fake xcrun: ''$@" 11 - args=() 12 - while (("$#")); do 13 - case "$1" in 14 - -sdk*) shift;; 15 - -find*) shift;; 16 - *) args+=("$1");; 17 - esac 18 - shift 19 - done 20 - 21 - if [ "''${#args[@]}" -gt "0" ]; then 22 - echo >&2 "Fake xcrun: ''${args[@]}" 23 - exec "''${args[@]}" 24 - fi 25 - ''; 26 8 fakeClang = writeScriptBin "clang" '' 27 9 #!${stdenv.shell} 28 10 if [[ "$@" == *.c ]]; then
-3
pkgs/development/tools/selenium/server/default.nix
··· 6 6 let 7 7 minorVersion = "3.6"; 8 8 patchVersion = "0"; 9 - arch = if stdenv.system == "x86_64-linux" then "amd64" 10 - else if stdenv.system == "i686-linux" then "i386" 11 - else ""; 12 9 13 10 in stdenv.mkDerivation rec { 14 11 name = "selenium-server-standalone-${version}";
-2
pkgs/games/dwarf-fortress/wrapper/default.nix
··· 22 22 then builtins.getAttr theme themes 23 23 else theme; 24 24 25 - twbtOnlyWithDFHack = assert (enableDFHack || !enableTWBT); true; 26 - 27 25 unBool = b: if b then "YES" else "NO"; 28 26 29 27 # These are in inverse order for first packages to override the next ones.
-1
pkgs/games/simutrans/default.nix
··· 16 16 ver3 = "2"; 17 17 version = "${ver1}.${ver2}.${ver3}"; 18 18 ver_dash = "${ver1}-${ver2}-${ver3}"; 19 - ver2_dash = "${ver1}-${ver2}"; 20 19 21 20 binary_src = fetchurl { 22 21 url = "mirror://sourceforge/simutrans/simutrans/${ver_dash}/simutrans-src-${ver_dash}.zip";
-1
pkgs/misc/cups/drivers/canon/default.nix
··· 4 4 5 5 i686_NIX_GCC = pkgsi686Linux.callPackage ({gcc}: gcc) {}; 6 6 i686_libxml2 = pkgsi686Linux.callPackage ({libxml2}: libxml2) {}; 7 - i686_glibc = pkgsi686Linux.callPackage ({glibc}: glibc) {}; 8 7 9 8 src_canon = fetchurl { 10 9 url = "https://files.canon-europe.com/files/soft45378/software/o147jen_linuxufrII_0290.zip";
-12
pkgs/servers/x11/xorg/overrides.nix
··· 8 8 malloc0ReturnsNullCrossFlag = stdenv.lib.optional 9 9 (stdenv.hostPlatform != stdenv.buildPlatform) 10 10 "--enable-malloc0returnsnull"; 11 - 12 - gitRelease = { libName, version, rev, sha256 } : attrs : attrs // { 13 - name = libName + "-" + version; 14 - src = args.fetchgit { 15 - url = git://anongit.freedesktop.org/xorg/lib/ + libName; 16 - inherit rev sha256; 17 - }; 18 - buildInputs = attrs.buildInputs ++ [ xorg.utilmacros ]; 19 - preConfigure = (attrs.preConfigure or "") + "\n./autogen.sh"; 20 - }; 21 - 22 - compose = f: g: x: f (g x); 23 11 in 24 12 { 25 13 bdftopcf = attrs: attrs // {
-5
pkgs/tools/X11/bumblebee/default.nix
··· 36 36 let 37 37 version = "3.2.1"; 38 38 39 - primus = if useNvidia then primusLib else primusLib.override { nvidia_x11 = null; }; 40 - primus_i686 = if useNvidia then primusLib_i686 else primusLib_i686.override { nvidia_x11 = null; }; 41 - 42 - primusLibs = lib.makeLibraryPath ([ primus ] ++ lib.optional (primusLib_i686 != null) primus_i686); 43 - 44 39 nvidia_x11s = [ nvidia_x11 ] 45 40 ++ lib.optional nvidia_x11.useGLVND libglvnd 46 41 ++ lib.optionals (nvidia_x11_i686 != null)
-13
pkgs/tools/admin/ansible/default.nix
··· 3 3 }: 4 4 5 5 let 6 - oldJinja = python2.override { 7 - packageOverrides = self: super: { 8 - jinja2 = super.jinja2.overridePythonAttrs (oldAttrs: rec { 9 - version = "2.8.1"; 10 - src = oldAttrs.src.override { 11 - inherit version; 12 - sha256 = "14aqmhkc9rw5w0v311jhixdm6ym8vsm29dhyxyrjfqxljwx1yd1m"; 13 - }; 14 - doCheck = false; 15 - }); 16 - }; 17 - }; 18 - 19 6 generic = { version, sha256, py ? python2 }: py.pkgs.buildPythonPackage rec { 20 7 pname = "ansible"; 21 8 inherit version;
-5
pkgs/tools/filesystems/ceph/generic.nix
··· 44 44 optExpat = shouldUsePkg expat; 45 45 optCurl = shouldUsePkg curl; 46 46 optFuse = shouldUsePkg fuse; 47 - optLibibverbs = shouldUsePkg libibverbs; 48 - optLibrdmacm = shouldUsePkg librdmacm; 49 47 optLibedit = shouldUsePkg libedit; 50 48 optLibatomic_ops = shouldUsePkg libatomic_ops; 51 49 optKinetic-cpp-client = shouldUsePkg kinetic-cpp-client; ··· 60 62 optLibxfs = shouldUsePkg libxfs; 61 63 optZfs = shouldUsePkg zfs; 62 64 63 - hasMon = true; 64 - hasMds = true; 65 - hasOsd = true; 66 65 hasRadosgw = optFcgi != null && optExpat != null && optCurl != null && optLibedit != null; 67 66 68 67
-7
pkgs/tools/package-management/cargo-edit/cargo-edit.nix
··· 3 3 4 4 with pkgs; 5 5 let kernel = buildPlatform.parsed.kernel.name; 6 - abi = buildPlatform.parsed.abi.name; 7 - include = includedFiles: src: builtins.filterSource (path: type: 8 - lib.lists.any (f: 9 - let p = toString (src + ("/" + f)); in 10 - (path == p) || (type == "directory" && lib.strings.hasPrefix path p) 11 - ) includedFiles 12 - ) src; 13 6 updateFeatures = f: up: functions: builtins.deepSeq f (lib.lists.foldl' (features: fun: fun features) (lib.attrsets.recursiveUpdate f up) functions); 14 7 mapFeatures = features: map (fun: fun { features = features; }); 15 8 mkFeatures = feat: lib.lists.foldl (features: featureName:
-1
pkgs/top-level/haxe-packages.nix
··· 2 2 3 3 let 4 4 self = haxePackages; 5 - callPackage = newScope self; 6 5 haxePackages = with self; { 7 6 8 7 withCommas = stdenv.lib.replaceChars ["."] [","];
-1
pkgs/top-level/lua-packages.nix
··· 13 13 }: 14 14 15 15 let 16 - isLua51 = lua.luaversion == "5.1"; 17 16 isLua52 = lua.luaversion == "5.2"; 18 17 isLuaJIT = (builtins.parseDrvName lua.name).name == "luajit"; 19 18