Clone of https://github.com/NixOS/nixpkgs.git (to stress-test knotserver)

Merge master into staging-next

authored by github-actions[bot] and committed by GitHub 9b53839f f3c3f0f9

+1912 -1267
+3
.git-blame-ignore-revs
··· 108 108 109 109 # postgresql: move packages.nix to ext/default.nix 110 110 719034f6f6749d624faa28dff259309fc0e3e730 111 + 112 + # pkgs/os-specific/bsd: Reformat with nixfmt-rfc-style 2024-03-01 113 + 3fe3b055adfc020e6a923c466b6bcd978a13069a
+1
.github/workflows/check-nix-format.yml
··· 32 32 # Each environment variable beginning with NIX_FMT_PATHS_ is a list of 33 33 # paths to check with nixfmt. 34 34 env: 35 + NIX_FMT_PATHS_BSD: pkgs/os-specific/bsd 35 36 NIX_FMT_PATHS_MPVSCRIPTS: pkgs/applications/video/mpv/scripts 36 37 # Format paths related to the Nixpkgs CUDA ecosystem. 37 38 NIX_FMT_PATHS_CUDA: |
+2
nixos/doc/manual/release-notes/rl-2405.section.md
··· 285 285 "mysecret"` becomes `services.aria2.rpcSecretFile = "/path/to/secret_file"` 286 286 where the file `secret_file` contains the string `mysecret`. 287 287 288 + - The `system.forbiddenDependenciesRegex` option has been renamed to `system.forbiddenDependenciesRegexes` and now has the type of `listOf string` instead of `string` to accept multiple regexes. 289 + 288 290 - `openssh`, `openssh_hpn` and `openssh_gssapi` are now compiled without support for the DSA signature algorithm as it is being deprecated upstream. Users still relying on DSA keys should consider upgrading 289 291 to another signature algorithm. However, for the time being it is possible to restore DSA key support using `override` to set `dsaKeysSupport = true`. 290 292
+1 -1
nixos/modules/profiles/perlless.nix
··· 26 26 27 27 # Check that the system does not contain a Nix store path that contains the 28 28 # string "perl". 29 - system.forbiddenDependenciesRegex = "perl"; 29 + system.forbiddenDependenciesRegexes = ["perl"]; 30 30 31 31 }
+1 -1
nixos/modules/services/misc/zoneminder.nix
··· 350 350 RestartSec = "10s"; 351 351 CacheDirectory = dirs cacheDirs; 352 352 RuntimeDirectory = dirName; 353 - ReadWriteDirectories = lib.mkIf useCustomDir [ cfg.storageDir ]; 353 + ReadWritePaths = lib.mkIf useCustomDir [ cfg.storageDir ]; 354 354 StateDirectory = dirs (lib.optionals (!useCustomDir) libDirs); 355 355 LogsDirectory = dirName; 356 356 PrivateTmp = true;
+1 -1
nixos/modules/services/security/oauth2-proxy.nix
··· 17 17 inherit (cfg.github) org team; 18 18 }; }; 19 19 20 - google = cfg: { google = with cfg.google; optionalAttrs (groups != []) { 20 + google = cfg: { google = with cfg.google; lib.optionalAttrs (groups != []) { 21 21 admin-email = adminEmail; 22 22 service-account = serviceAccountJSON; 23 23 group = groups;
+1 -1
nixos/modules/services/security/step-ca.nix
··· 107 107 UMask = "0077"; 108 108 Environment = "HOME=%S/step-ca"; 109 109 WorkingDirectory = ""; # override upstream 110 - ReadWriteDirectories = ""; # override upstream 110 + ReadWritePaths = ""; # override upstream 111 111 112 112 # LocalCredential handles file permission problems arising from the use of DynamicUser. 113 113 LoadCredential = "intermediate_password:${cfg.intermediatePasswordFile}";
+2 -1
nixos/modules/services/web-servers/caddy/default.nix
··· 360 360 serviceConfig = let 361 361 runOptions = ''--config ${configPath} ${optionalString (cfg.adapter != null) "--adapter ${cfg.adapter}"}''; 362 362 in { 363 + # Override the `ExecStart` line from upstream's systemd unit file by our own: 363 364 # https://www.freedesktop.org/software/systemd/man/systemd.service.html#ExecStart= 364 365 # If the empty string is assigned to this option, the list of commands to start is reset, prior assignments of this option will have no effect. 365 366 ExecStart = [ "" ''${cfg.package}/bin/caddy run ${runOptions} ${optionalString cfg.resume "--resume"}'' ]; ··· 367 368 ExecReload = [ "" ''${cfg.package}/bin/caddy reload ${runOptions} --force'' ]; 368 369 User = cfg.user; 369 370 Group = cfg.group; 370 - ReadWriteDirectories = cfg.dataDir; 371 + ReadWritePaths = [ cfg.dataDir ]; 371 372 StateDirectory = mkIf (cfg.dataDir == "/var/lib/caddy") [ "caddy" ]; 372 373 LogsDirectory = mkIf (cfg.logDir == "/var/log/caddy") [ "caddy" ]; 373 374 Restart = "on-failure";
+1 -1
nixos/modules/services/web-servers/traefik.nix
··· 170 170 PrivateDevices = true; 171 171 ProtectHome = true; 172 172 ProtectSystem = "full"; 173 - ReadWriteDirectories = cfg.dataDir; 173 + ReadWritePaths = [ cfg.dataDir ]; 174 174 RuntimeDirectory = "traefik"; 175 175 }; 176 176 };
+2 -2
nixos/modules/system/activation/test.nix
··· 5 5 }: 6 6 let 7 7 node-forbiddenDependencies-fail = nixos ({ ... }: { 8 - system.forbiddenDependenciesRegex = "-dev$"; 8 + system.forbiddenDependenciesRegexes = ["-dev$"]; 9 9 environment.etc."dev-dependency" = { 10 10 text = "${expect.dev}"; 11 11 }; ··· 14 14 boot.loader.grub.enable = false; 15 15 }); 16 16 node-forbiddenDependencies-succeed = nixos ({ ... }: { 17 - system.forbiddenDependenciesRegex = "-dev$"; 17 + system.forbiddenDependenciesRegexes = ["-dev$"]; 18 18 system.extraDependencies = [ expect.dev ]; 19 19 documentation.enable = false; 20 20 fileSystems."/".device = "ignore-root-device";
+11 -12
nixos/modules/system/activation/top-level.nix
··· 86 86 ../build.nix 87 87 (mkRemovedOptionModule [ "nesting" "clone" ] "Use `specialisation.«name» = { inheritParentConfig = true; configuration = { ... }; }` instead.") 88 88 (mkRemovedOptionModule [ "nesting" "children" ] "Use `specialisation.«name».configuration = { ... }` instead.") 89 + (mkRenamedOptionModule [ "system" "forbiddenDependenciesRegex" ] [ "system" "forbiddenDependenciesRegexes" ]) 89 90 ]; 90 91 91 92 options = { ··· 160 161 ''; 161 162 }; 162 163 163 - system.forbiddenDependenciesRegex = mkOption { 164 - default = ""; 165 - example = "-dev$"; 166 - type = types.str; 164 + system.forbiddenDependenciesRegexes = mkOption { 165 + default = []; 166 + example = ["-dev$"]; 167 + type = types.listOf types.str; 167 168 description = '' 168 - A POSIX Extended Regular Expression that matches store paths that 169 + POSIX Extended Regular Expressions that match store paths that 169 170 should not appear in the system closure, with the exception of {option}`system.extraDependencies`, which is not checked. 170 171 ''; 171 172 }; ··· 289 290 "$out/configuration.nix" 290 291 '' + 291 292 optionalString 292 - (config.system.forbiddenDependenciesRegex != "") 293 - '' 294 - if [[ $forbiddenDependenciesRegex != "" && -n $closureInfo ]]; then 295 - if forbiddenPaths="$(grep -E -- "$forbiddenDependenciesRegex" $closureInfo/store-paths)"; then 293 + (config.system.forbiddenDependenciesRegexes != []) (lib.concatStringsSep "\n" (map (regex: '' 294 + if [[ ${regex} != "" && -n $closureInfo ]]; then 295 + if forbiddenPaths="$(grep -E -- "${regex}" $closureInfo/store-paths)"; then 296 296 echo -e "System closure $out contains the following disallowed paths:\n$forbiddenPaths" 297 297 exit 1 298 298 fi 299 299 fi 300 - ''; 300 + '') config.system.forbiddenDependenciesRegexes)); 301 301 302 302 system.systemBuilderArgs = { 303 303 ··· 319 319 # option, as opposed to `system.extraDependencies`. 320 320 passedChecks = concatStringsSep " " config.system.checks; 321 321 } 322 - // lib.optionalAttrs (config.system.forbiddenDependenciesRegex != "") { 323 - inherit (config.system) forbiddenDependenciesRegex; 322 + // lib.optionalAttrs (config.system.forbiddenDependenciesRegexes != []) { 324 323 closureInfo = pkgs.closureInfo { rootPaths = [ 325 324 # override to avoid infinite recursion (and to allow using extraDependencies to add forbidden dependencies) 326 325 (config.system.build.toplevel.overrideAttrs (_: { extraDependencies = []; closureInfo = null; }))
+2 -2
pkgs/applications/misc/flowtime/default.nix pkgs/by-name/fl/flowtime/package.nix
··· 17 17 18 18 stdenv.mkDerivation rec { 19 19 pname = "flowtime"; 20 - version = "6.1"; 20 + version = "6.5"; 21 21 22 22 src = fetchFromGitHub { 23 23 owner = "Diego-Ivan"; 24 24 repo = "Flowtime"; 25 25 rev = "v${version}"; 26 - hash = "sha256-wTqHTkt1O3Da2fzxf6DiQjrqOt65ZEhLOkGK5C6HzIk="; 26 + hash = "sha256-J0Pscv0ZOpA/LV2mPTLOmDPQpfZhizTghatGnrJHToE="; 27 27 }; 28 28 29 29 nativeBuildInputs = [
-76
pkgs/applications/misc/kdbplus/default.nix
··· 1 - { lib, stdenv, requireFile, unzip, rlwrap, bash, zlib }: 2 - 3 - assert (stdenv.hostPlatform.system == "i686-linux"); 4 - 5 - let 6 - libPath = lib.makeLibraryPath 7 - [ stdenv.cc.libc stdenv.cc.cc zlib ]; 8 - in 9 - stdenv.mkDerivation rec { 10 - pname = "kdbplus"; 11 - version = "3.6"; 12 - 13 - src = requireFile rec { 14 - message = '' 15 - Nix can't download kdb+ for you automatically. Go to 16 - http://kx.com and download the free, 32-bit version for 17 - Linux. Then run "nix-prefetch-url file://\$PWD/${name}" in 18 - the directory where you saved it. Note you need version ${version}. 19 - ''; 20 - name = "linuxx86.zip"; 21 - sha256 = "0w6znd9warcqx28vf648n0vgmxyyy9kvsfpsfw37d1kp5finap4p"; 22 - }; 23 - 24 - dontStrip = true; 25 - nativeBuildInputs = [ unzip ]; 26 - 27 - phases = "unpackPhase installPhase"; 28 - unpackPhase = "mkdir ${pname}-${version} && cd ${pname}-${version} && unzip -qq ${src}"; 29 - installPhase = '' 30 - mkdir -p $out/bin $out/libexec 31 - 32 - patchelf \ 33 - --interpreter "$(cat $NIX_CC/nix-support/dynamic-linker)" \ 34 - --set-rpath ${libPath} \ 35 - ./q/l32/q 36 - mv ./q/l32/q $out/libexec/q 37 - 38 - # Shell script wrappers to make things more convenient... 39 - 40 - cat > $out/bin/q-install <<- EOF 41 - #!${bash}/bin/bash 42 - if [ -f \$HOME/q/q.k ]; then 43 - echo "kdb has already been unpacked in \$HOME. Skipping..." 44 - exit 0 45 - fi 46 - echo -n "Unzipping ${src} into \$HOME... " 47 - cd \$HOME && ${unzip}/bin/unzip -qq ${src} 48 - echo "Done" 49 - EOF 50 - 51 - cat > $out/bin/q <<- EOF 52 - #!${bash}/bin/bash 53 - if [ ! -f \$HOME/q/q.k ]; then 54 - echo "ERROR: You need to unzip the Q sources into \$HOME before running q." 55 - echo 56 - echo "Try:" 57 - echo " cd \$HOME && unzip ${src}" 58 - echo "(or run q-install)" 59 - exit 1 60 - fi 61 - 62 - exec ${rlwrap}/bin/rlwrap $out/libexec/q \$@ 63 - EOF 64 - 65 - chmod +x $out/bin/q $out/bin/q-install 66 - ''; 67 - 68 - meta = { 69 - description = "Analytics and time-series database"; 70 - homepage = "http://www.kx.com/"; 71 - sourceProvenance = with lib.sourceTypes; [ binaryNativeCode ]; 72 - license = lib.licenses.unfree; 73 - platforms = [ "i686-linux" ]; 74 - maintainers = [ lib.maintainers.thoughtpolice ]; 75 - }; 76 - }
+4 -4
pkgs/applications/version-management/gitnuro/default.nix
··· 9 9 10 10 stdenv.mkDerivation rec { 11 11 pname = "gitnuro"; 12 - version = "1.1.1"; 12 + version = "1.3.1"; 13 13 14 14 src = fetchurl { 15 - url = "https://github.com/JetpackDuba/Gitnuro/releases/download/v${version}/Gitnuro-linux-${version}.jar"; 16 - hash = "sha256-ugZBk/aQ2pjL9xY66g20MorAQ02GHIdJTv8ejadaBgY="; 15 + url = "https://github.com/JetpackDuba/Gitnuro/releases/download/v${version}/Gitnuro-linux-x86_64-${version}.jar"; 16 + hash = "sha256-7yne9dD/7VT+H4tIBJvpOf8ksECCpoNAa8TSmFmjYMw="; 17 17 }; 18 18 19 19 icon = fetchurl { ··· 50 50 description = "A FOSS Git multiplatform client based on Compose and JGit"; 51 51 homepage = "https://gitnuro.com/"; 52 52 license = licenses.gpl3Plus; 53 - platforms = platforms.unix; 53 + platforms = [ "x86_64-linux" ]; 54 54 maintainers = with maintainers; [ zendo ]; 55 55 mainProgram = "gitnuro"; 56 56 };
+1 -1
pkgs/applications/virtualization/dumb-init/default.nix
··· 30 30 homepage = "https://github.com/Yelp/dumb-init"; 31 31 license = licenses.mit; 32 32 maintainers = [ ]; 33 - platforms = platforms.linux; 33 + platforms = platforms.unix; 34 34 mainProgram = "dumb-init"; 35 35 }; 36 36 }
+5 -5
pkgs/by-name/fl/flashprog/package.nix
··· 12 12 , withGpio ? stdenv.isLinux 13 13 }: 14 14 15 - stdenv.mkDerivation { 15 + stdenv.mkDerivation (finalAttrs: { 16 16 pname = "flashprog"; 17 - version = "1.0.1"; 17 + version = "1.1"; 18 18 19 19 src = fetchgit { 20 20 url = "https://review.sourcearcade.org/flashprog"; 21 - rev = "2ca11f9a4101ea230081d448ab2b570425b7f0bd"; 22 - hash = "sha256-pm9g9iOJAKnzzY9couzt8RmqZFbIpKcO++zsUJ9o49U="; 21 + rev = "v${finalAttrs.version}"; 22 + hash = "sha256-CLwaGxVOo8FJaWfvrJ2hAm7XonP5nHT6YTsaw7scKCM="; 23 23 }; 24 24 25 25 nativeBuildInputs = [ ··· 60 60 platforms = platforms.all; 61 61 mainProgram = "flashprog"; 62 62 }; 63 - } 63 + })
+3 -3
pkgs/by-name/ho/home-manager/package.nix
··· 16 16 17 17 stdenvNoCC.mkDerivation (finalAttrs: { 18 18 pname = "home-manager"; 19 - version = "0-unstable-2024-04-29"; 19 + version = "0-unstable-2024-05-05"; 20 20 21 21 src = fetchFromGitHub { 22 22 name = "home-manager-source"; 23 23 owner = "nix-community"; 24 24 repo = "home-manager"; 25 - rev = "9fe79591c1005ce6f93084ae7f7dab0a2891440d"; 26 - hash = "sha256-OzD1P0o46uD3Ix4ZI/g9z3YAeg+4g+W3qctB6bNOReo="; 25 + rev = "3dfe05aa9b5646995ace887931fa60269a039777"; 26 + hash = "sha256-QXpLmgmisNK2Zgpnu9DiO9ScrKJuJ4zmiMTNpObVIuk="; 27 27 }; 28 28 29 29 nativeBuildInputs = [
+3 -3
pkgs/by-name/me/melonDS/package.nix
··· 23 23 in 24 24 stdenv.mkDerivation (finalAttrs: { 25 25 pname = "melonDS"; 26 - version = "0.9.5-unstable-2024-04-18"; 26 + version = "0.9.5-unstable-2024-05-05"; 27 27 28 28 src = fetchFromGitHub { 29 29 owner = "melonDS-emu"; 30 30 repo = "melonDS"; 31 - rev = "ba8d547dfa81539f4e8474152d92e866ad89241b"; 32 - hash = "sha256-va4KegM2z0GSA43goUynRPNPvQnrV2b8oNOfLKPE+Zc="; 31 + rev = "10798c3464ca0e199087960fda918ed99acc2e21"; 32 + hash = "sha256-5GbJKhICrbVfnfZt6Ni4uNbodH3rJY5lKoQRgiPXWCg="; 33 33 }; 34 34 35 35 nativeBuildInputs = [
+99
pkgs/by-name/op/openturns/package.nix
··· 1 + { 2 + lib, 3 + boost, 4 + ceres-solver, 5 + cmake, 6 + cminpack, 7 + darwin, 8 + dlib, 9 + fetchFromGitHub, 10 + fetchpatch, 11 + hdf5, 12 + hmat-oss, 13 + ipopt, 14 + libxml2, 15 + nlopt, 16 + pagmo2, 17 + primesieve, 18 + python3Packages, 19 + spectra, 20 + stdenv, 21 + swig, 22 + tbb, 23 + # Boolean flags 24 + runTests ? false, # tests take an hour to build on a 48-core machine 25 + enablePython ? false, 26 + }: 27 + 28 + let 29 + inherit (darwin.apple_sdk.frameworks) Accelerate; 30 + in 31 + stdenv.mkDerivation (finalAttrs: { 32 + pname = "openturns"; 33 + version = "1.22"; 34 + 35 + src = fetchFromGitHub { 36 + owner = "openturns"; 37 + repo = "openturns"; 38 + rev = "v${finalAttrs.version}"; 39 + hash = "sha256-ku3/mPoa1YJVJB99R/kWlOubIO+OZAiKfPqS/DrtJQk="; 40 + }; 41 + 42 + nativeBuildInputs = [ 43 + cmake 44 + ] 45 + ++ lib.optionals enablePython [ python3Packages.sphinx ]; 46 + 47 + buildInputs = [ 48 + (lib.getLib primesieve) 49 + boost 50 + ceres-solver 51 + cminpack 52 + dlib 53 + hdf5 54 + hmat-oss 55 + ipopt 56 + libxml2 57 + nlopt 58 + pagmo2 59 + spectra 60 + swig 61 + tbb 62 + ] 63 + ++ lib.optionals enablePython [ 64 + python3Packages.dill 65 + python3Packages.matplotlib 66 + python3Packages.psutil 67 + python3Packages.python 68 + ] 69 + ++ lib.optionals stdenv.isDarwin [ 70 + Accelerate 71 + ]; 72 + 73 + cmakeFlags = [ 74 + (lib.cmakeBool "BUILD_PYTHON" enablePython) 75 + (lib.cmakeBool "CMAKE_UNITY_BUILD" true) 76 + (lib.cmakeBool "USE_SPHINX" enablePython) 77 + (lib.cmakeFeature "CMAKE_UNITY_BUILD_BATCH_SIZE" "32") 78 + (lib.cmakeFeature "SWIG_COMPILE_FLAGS" "-O1") 79 + (lib.cmakeOptionType "PATH" "OPENTURNS_SYSCONFIG_PATH" "$out/etc") 80 + ]; 81 + 82 + checkTarget = lib.concatStringsSep " " [ 83 + "tests" 84 + "check" 85 + ]; 86 + 87 + strictDeps = true; 88 + 89 + doCheck = runTests; 90 + 91 + meta = { 92 + homepage = "https://openturns.github.io/www/"; 93 + description = "Multivariate probabilistic modeling and uncertainty treatment library"; 94 + changelog = "https://github.com/openturns/openturns/raw/v${finalAttrs.version}/ChangeLog"; 95 + license = with lib.licenses; [ lgpl3Plus gpl3Plus ]; 96 + maintainers = with lib.maintainers; [ gdinh ]; 97 + platforms = lib.platforms.unix; 98 + }; 99 + })
+2 -2
pkgs/development/interpreters/clojure/default.nix
··· 2 2 3 3 stdenv.mkDerivation (finalAttrs: { 4 4 pname = "clojure"; 5 - version = "1.11.3.1456"; 5 + version = "1.11.3.1463"; 6 6 7 7 src = fetchurl { 8 8 # https://github.com/clojure/brew-install/releases 9 9 url = "https://github.com/clojure/brew-install/releases/download/${finalAttrs.version}/clojure-tools-${finalAttrs.version}.tar.gz"; 10 - hash = "sha256-ymOkUUDSj5KzFMBY1D7gErjPAK5E/QjFDGcwDo5fzW0="; 10 + hash = "sha256-26QZ3j54XztpW2WJ1xg0Gc+OwrsvmfK4iv0GsLV8FIc="; 11 11 }; 12 12 13 13 nativeBuildInputs = [
+8 -1
pkgs/development/libraries/cegui/default.nix
··· 1 1 { lib 2 2 , stdenv 3 3 , fetchFromGitHub 4 + , writeShellScript 4 5 , cmake 5 6 , ogre 6 7 , freetype ··· 13 14 14 15 stdenv.mkDerivation { 15 16 pname = "cegui"; 16 - version = "unstable-2023-03-18"; 17 + version = "0-unstable-2023-03-18"; 17 18 18 19 src = fetchFromGitHub { 19 20 owner = "paroj"; ··· 47 48 48 49 passthru.updateScript = unstableGitUpdater { 49 50 branch = "v0"; 51 + # The above branch is separate from the branch with the latest tags, so the updater doesn't pick them up 52 + # This is what would be used to handle upstream's format, if it was able to see the tags 53 + # tagConverter = writeShellScript "cegui-tag-converter.sh" '' 54 + # sed -e 's/^v//g' -e 's/-/./g' 55 + # ''; 56 + hardcodeZeroVersion = true; 50 57 }; 51 58 52 59 meta = with lib; {
+4 -2
pkgs/development/libraries/crossguid/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "crossguid"; 5 - version = "unstable-2019-05-29"; 5 + version = "0.2.2-unstable-2019-05-29"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "graeme-hill"; ··· 24 24 nativeBuildInputs = [ cmake ]; 25 25 buildInputs = lib.optional stdenv.isLinux libuuid; 26 26 27 - passthru.updateScript = unstableGitUpdater { }; 27 + passthru.updateScript = unstableGitUpdater { 28 + tagPrefix = "v"; 29 + }; 28 30 29 31 meta = with lib; { 30 32 description = "Lightweight cross platform C++ GUID/UUID library";
+1 -1
pkgs/development/libraries/gl3w/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "gl3w"; 5 - version = "unstable-2023-10-10"; 5 + version = "0-unstable-2023-10-10"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "skaslev";
+4 -2
pkgs/development/libraries/gtk-frdp/default.nix
··· 15 15 16 16 stdenv.mkDerivation rec { 17 17 pname = "gtk-frdp"; 18 - version = "unstable-2024-03-01"; 18 + version = "3.37.1-unstable-2024-03-01"; 19 19 20 20 src = fetchFromGitLab { 21 21 domain = "gitlab.gnome.org"; ··· 41 41 ]; 42 42 43 43 passthru = { 44 - updateScript = unstableGitUpdater { }; 44 + updateScript = unstableGitUpdater { 45 + tagPrefix = "v"; 46 + }; 45 47 }; 46 48 47 49 env.NIX_CFLAGS_COMPILE = toString (lib.optionals stdenv.isDarwin [
+1 -1
pkgs/development/libraries/hax11/default.nix
··· 9 9 10 10 multiStdenv.mkDerivation (finalAttrs: { 11 11 pname = "hax11"; 12 - version = "unstable-2023-09-25"; 12 + version = "0-unstable-2023-09-25"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "CyberShadow";
+1 -1
pkgs/development/libraries/libcxxrt/default.nix
··· 2 2 3 3 stdenv.mkDerivation { 4 4 pname = "libcxxrt"; 5 - version = "unstable-2024-04-15"; 5 + version = "4.0.10-unstable-2024-04-15"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "libcxxrt";
+1 -1
pkgs/development/libraries/libsegfault/default.nix
··· 10 10 11 11 stdenv.mkDerivation rec { 12 12 pname = "libsegfault"; 13 - version = "unstable-2022-11-13"; 13 + version = "0-unstable-2022-11-13"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "jonathanpoelen";
+1 -1
pkgs/development/libraries/libvgm/default.nix
··· 42 42 in 43 43 stdenv.mkDerivation { 44 44 pname = "libvgm"; 45 - version = "unstable-2024-04-24"; 45 + version = "0-unstable-2024-04-24"; 46 46 47 47 src = fetchFromGitHub { 48 48 owner = "ValleyBell";
+4 -2
pkgs/development/libraries/libz/default.nix
··· 6 6 7 7 stdenv.mkDerivation (finalAttrs: { 8 8 pname = "libz"; 9 - version = "unstable-2018-03-31"; 9 + version = "1.2.8.2015.12.26-unstable-2018-03-31"; 10 10 11 11 src = fetchFromGitLab { 12 12 owner = "sortix"; ··· 18 18 outputs = [ "out" "dev" ]; 19 19 outputDoc = "dev"; # single tiny man3 page 20 20 21 - passthru.updateScript = unstableGitUpdater { }; 21 + passthru.updateScript = unstableGitUpdater { 22 + tagPrefix = "libz-"; 23 + }; 22 24 23 25 meta = { 24 26 homepage = "https://sortix.org/libz/";
+1 -1
pkgs/development/libraries/minilibx/default.nix
··· 9 9 10 10 stdenv.mkDerivation { 11 11 pname = "minilibx"; 12 - version = "unstable-2021-10-30"; 12 + version = "0-unstable-2021-10-30"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "42Paris";
-82
pkgs/development/libraries/openturns/default.nix
··· 1 - { lib 2 - , stdenv 3 - , fetchFromGitHub 4 - , fetchpatch 5 - , cmake 6 - , swig 7 - , boost 8 - , spectra 9 - , libxml2 10 - , tbb 11 - , hmat-oss 12 - , nlopt 13 - , cminpack 14 - , ceres-solver 15 - , dlib 16 - , hdf5 17 - , primesieve 18 - , pagmo2 19 - , ipopt 20 - , Accelerate 21 - # tests take an hour to build on a 48-core machine 22 - , runTests ? false 23 - , enablePython ? false 24 - , python3Packages 25 - }: 26 - 27 - stdenv.mkDerivation rec { 28 - pname = "openturns"; 29 - version = "1.22"; 30 - 31 - src = fetchFromGitHub { 32 - owner = "openturns"; 33 - repo = "openturns"; 34 - rev = "v${version}"; 35 - sha256 = "sha256-ku3/mPoa1YJVJB99R/kWlOubIO+OZAiKfPqS/DrtJQk="; 36 - }; 37 - 38 - nativeBuildInputs = [ cmake ] ++ lib.optional enablePython python3Packages.sphinx; 39 - buildInputs = [ 40 - swig 41 - boost 42 - spectra 43 - libxml2 44 - tbb 45 - hmat-oss 46 - nlopt 47 - cminpack 48 - ceres-solver 49 - dlib 50 - hdf5 51 - primesieve 52 - pagmo2 53 - ipopt 54 - ] ++ lib.optionals enablePython [ 55 - python3Packages.python 56 - python3Packages.matplotlib 57 - python3Packages.psutil 58 - python3Packages.dill 59 - ] ++ lib.optional stdenv.isDarwin Accelerate; 60 - 61 - cmakeFlags = [ 62 - "-DOPENTURNS_SYSCONFIG_PATH=$out/etc" 63 - "-DCMAKE_UNITY_BUILD=ON" 64 - "-DCMAKE_UNITY_BUILD_BATCH_SIZE=32" 65 - "-DSWIG_COMPILE_FLAGS='-O1'" 66 - "-DUSE_SPHINX=${if enablePython then "ON" else "OFF"}" 67 - "-DBUILD_PYTHON=${if enablePython then "ON" else "OFF"}" 68 - ]; 69 - 70 - doCheck = runTests; 71 - 72 - checkTarget = "tests check"; 73 - 74 - meta = with lib; { 75 - description = "Multivariate probabilistic modeling and uncertainty treatment library"; 76 - license = with licenses; [ lgpl3 gpl3 ]; 77 - homepage = "https://openturns.github.io/www/"; 78 - changelog = "https://github.com/openturns/openturns/raw/v${version}/ChangeLog"; 79 - maintainers = with maintainers; [ gdinh ]; 80 - platforms = platforms.unix; 81 - }; 82 - }
+1 -1
pkgs/development/libraries/rapidcheck/default.nix
··· 8 8 9 9 stdenv.mkDerivation (finalAttrs: { 10 10 pname = "rapidcheck"; 11 - version = "unstable-2023-12-14"; 11 + version = "0-unstable-2023-12-14"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "emil-e";
+3 -3
pkgs/development/python-modules/airthings-ble/default.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "airthings-ble"; 16 - version = "0.8.0"; 16 + version = "0.9.0"; 17 17 pyproject = true; 18 18 19 19 disabled = pythonOlder "3.9"; ··· 22 22 owner = "vincegio"; 23 23 repo = "airthings-ble"; 24 24 rev = "refs/tags/${version}"; 25 - hash = "sha256-BgjfvKrVpw/cP93JCloZKq+PIyS/w7/v6+obfgDT64A="; 25 + hash = "sha256-920Vgk8kY5NsjYrOGYoRtcdHl4KKO7ytieH8cJ0S3RE="; 26 26 }; 27 27 28 28 postPatch = '' ··· 45 45 meta = with lib; { 46 46 description = "Library for Airthings BLE devices"; 47 47 homepage = "https://github.com/vincegio/airthings-ble"; 48 - changelog = "https://github.com/vincegio/airthings-ble/releases/tag/v${version}"; 48 + changelog = "https://github.com/vincegio/airthings-ble/releases/tag/${version}"; 49 49 license = with licenses; [ mit ]; 50 50 maintainers = with maintainers; [ fab ]; 51 51 };
+20 -18
pkgs/development/python-modules/bitbox02/default.nix
··· 1 - { lib 2 - , buildPythonPackage 3 - , pythonOlder 4 - , fetchPypi 5 - , base58 6 - , ecdsa 7 - , hidapi 8 - , noiseprotocol 9 - , protobuf 10 - , semver 11 - , typing-extensions 1 + { 2 + lib, 3 + base58, 4 + buildPythonPackage, 5 + ecdsa, 6 + fetchPypi, 7 + hidapi, 8 + noiseprotocol, 9 + protobuf, 10 + pythonOlder, 11 + semver, 12 + setuptools, 13 + typing-extensions, 12 14 }: 13 15 14 16 buildPythonPackage rec { 15 17 pname = "bitbox02"; 16 - version = "6.2.0"; 17 - format = "setuptools"; 18 + version = "6.3.0"; 19 + pyproject = true; 18 20 19 21 disabled = pythonOlder "3.7"; 20 22 21 23 src = fetchPypi { 22 24 inherit pname version; 23 - hash = "sha256-zt4G45nJjtU2/tbYpCEgjaoA+Xtpe9g2OpQaxfMzCb8="; 25 + hash = "sha256-0D+yIovlYw8dfDUeW+vcualbvmLs+IySkTpmHwk2meM="; 24 26 }; 25 27 26 - propagatedBuildInputs = [ 28 + build-system = [ setuptools ]; 29 + 30 + dependencies = [ 27 31 base58 28 32 ecdsa 29 33 hidapi ··· 36 40 # does not contain tests 37 41 doCheck = false; 38 42 39 - pythonImportsCheck = [ 40 - "bitbox02" 41 - ]; 43 + pythonImportsCheck = [ "bitbox02" ]; 42 44 43 45 meta = with lib; { 44 46 description = "Firmware code of the BitBox02 hardware wallet";
+2 -2
pkgs/development/python-modules/bluetooth-adapters/default.nix
··· 19 19 20 20 buildPythonPackage rec { 21 21 pname = "bluetooth-adapters"; 22 - version = "0.19.1"; 22 + version = "0.19.2"; 23 23 pyproject = true; 24 24 25 25 disabled = pythonOlder "3.9"; ··· 28 28 owner = "Bluetooth-Devices"; 29 29 repo = "bluetooth-adapters"; 30 30 rev = "refs/tags/v${version}"; 31 - hash = "sha256-r+Ll9ODFal+I2MwrwHakPFWD3GiE/n0f/dYs69jmmpU="; 31 + hash = "sha256-hPs6YnmndJ2Z5RotcIRIYWPdvMyX56ul84l1Cs8kqH0="; 32 32 }; 33 33 34 34 postPatch = ''
+2 -2
pkgs/development/python-modules/boto3-stubs/default.nix
··· 366 366 367 367 buildPythonPackage rec { 368 368 pname = "boto3-stubs"; 369 - version = "1.34.98"; 369 + version = "1.34.99"; 370 370 pyproject = true; 371 371 372 372 disabled = pythonOlder "3.7"; ··· 374 374 src = fetchPypi { 375 375 pname = "boto3_stubs"; 376 376 inherit version; 377 - hash = "sha256-LhkC5wBmIBa3M5wOwCqCqL+hJ3Dc2Ga1WoWY+A7nNUs="; 377 + hash = "sha256-uOVKyGfZ9gzsIhqLtsmyljzj4pcTTxgdQp003UDWGWk="; 378 378 }; 379 379 380 380 build-system = [ setuptools ];
+31 -37
pkgs/development/python-modules/cyclonedx-python-lib/default.nix
··· 1 - { lib 2 - , buildPythonPackage 3 - , ddt 4 - , fetchFromGitHub 5 - , importlib-metadata 6 - , jsonschema 7 - , license-expression 8 - , lxml 9 - , packageurl-python 10 - , py-serializable 11 - , pythonRelaxDepsHook 12 - , poetry-core 13 - , pytestCheckHook 14 - , pythonOlder 15 - , requirements-parser 16 - , sortedcontainers 17 - , setuptools 18 - , toml 19 - , types-setuptools 20 - , types-toml 21 - , xmldiff 1 + { 2 + lib, 3 + buildPythonPackage, 4 + ddt, 5 + fetchFromGitHub, 6 + importlib-metadata, 7 + jsonschema, 8 + license-expression, 9 + lxml, 10 + packageurl-python, 11 + py-serializable, 12 + pythonRelaxDepsHook, 13 + poetry-core, 14 + pytestCheckHook, 15 + pythonOlder, 16 + requirements-parser, 17 + sortedcontainers, 18 + setuptools, 19 + toml, 20 + types-setuptools, 21 + types-toml, 22 + xmldiff, 22 23 }: 23 24 24 25 buildPythonPackage rec { 25 26 pname = "cyclonedx-python-lib"; 26 - version = "6.4.4"; 27 + version = "7.3.2"; 27 28 pyproject = true; 28 29 29 30 disabled = pythonOlder "3.9"; ··· 32 33 owner = "CycloneDX"; 33 34 repo = "cyclonedx-python-lib"; 34 35 rev = "refs/tags/v${version}"; 35 - hash = "sha256-PNacp16WZHNblFyA117hSL87IKGMrW0OYNXCSoBoO8Q="; 36 + hash = "sha256-z+QBjMT0L7dqCJvbwok9TWQajIPzmAq3XPLWFxmhPsk="; 36 37 }; 37 38 38 - nativeBuildInputs = [ 39 - poetry-core 40 - pythonRelaxDepsHook 41 - ]; 39 + build-system = [ poetry-core ]; 40 + 41 + nativeBuildInputs = [ pythonRelaxDepsHook ]; 42 42 43 - propagatedBuildInputs = [ 43 + dependencies = [ 44 44 importlib-metadata 45 45 license-expression 46 46 packageurl-python ··· 61 61 xmldiff 62 62 ]; 63 63 64 - pythonImportsCheck = [ 65 - "cyclonedx" 66 - ]; 64 + pythonImportsCheck = [ "cyclonedx" ]; 67 65 68 - pythonRelaxDeps = [ 69 - "py-serializable" 70 - ]; 66 + pythonRelaxDeps = [ "py-serializable" ]; 71 67 72 68 preCheck = '' 73 69 export PYTHONPATH=tests''${PYTHONPATH+:$PYTHONPATH} 74 70 ''; 75 71 76 - pytestFlagsArray = [ 77 - "tests/" 78 - ]; 72 + pytestFlagsArray = [ "tests/" ]; 79 73 80 74 disabledTests = [ 81 75 # These tests require network access
+7 -13
pkgs/development/python-modules/django/5.nix
··· 1 1 { lib 2 2 , stdenv 3 3 , buildPythonPackage 4 - , fetchPypi 4 + , fetchFromGitHub 5 5 , fetchpatch2 6 6 , pythonAtLeast 7 7 , pythonOlder ··· 44 44 45 45 buildPythonPackage rec { 46 46 pname = "django"; 47 - version = "5.0.4"; 47 + version = "5.0.5"; 48 48 pyproject = true; 49 49 50 50 disabled = pythonOlder "3.10"; 51 51 52 - src = fetchPypi { 53 - pname = "Django"; 54 - inherit version; 55 - hash = "sha256-S9AajIMLt3qKOw59iyW4h+U2rReoG6Lc5UdhNcczEr0="; 52 + src = fetchFromGitHub { 53 + owner = "django"; 54 + repo = "django"; 55 + rev = "refs/tags/${version}"; 56 + hash = "sha256-0/AbPmTl38E9BpHVKs0r79fISjEa1d4XO/se1pA7zxg="; 56 57 }; 57 58 58 59 patches = [ ··· 64 65 ./django_5_tests_pythonpath.patch 65 66 # disable test that excpects timezone issues 66 67 ./django_5_disable_failing_tests.patch 67 - 68 - (fetchpatch2 { 69 - # https://github.com/django/django/pull/17979 70 - name = "django-mime-utf8-surrogates.patch"; 71 - url = "https://github.com/django/django/commit/b231bcd19e57267ce1fc21d42d46f0b65fdcfcf8.patch"; 72 - hash = "sha256-HhmRwi24VkoPoh+NygAThCoMywoMwrLijU4ZsDfVU34="; 73 - }) 74 68 75 69 ] ++ lib.optionals withGdal [ 76 70 (substituteAll {
+2 -2
pkgs/development/python-modules/holidays/default.nix
··· 14 14 15 15 buildPythonPackage rec { 16 16 pname = "holidays"; 17 - version = "0.47"; 17 + version = "0.48"; 18 18 pyproject = true; 19 19 20 20 disabled = pythonOlder "3.8"; ··· 23 23 owner = "vacanza"; 24 24 repo = "python-holidays"; 25 25 rev = "refs/tags/v${version}"; 26 - hash = "sha256-A4viSzUia4QBdD0svkqYtsCq/la7Nrf2xu/fVDZHb00="; 26 + hash = "sha256-PKa4knEUkULeGbwjEViF2J3QyUOOvKHYxy0ChmRQf6A="; 27 27 }; 28 28 29 29 build-system = [
+2 -2
pkgs/development/python-modules/meraki/default.nix
··· 8 8 9 9 buildPythonPackage rec { 10 10 pname = "meraki"; 11 - version = "1.45.0"; 11 + version = "1.46.0"; 12 12 format = "setuptools"; 13 13 14 14 disabled = pythonOlder "3.8"; 15 15 16 16 src = fetchPypi { 17 17 inherit pname version; 18 - hash = "sha256-PBeeohKNzAMlEdAjzB8fsVPc+ml+mcaWHoVWPeP93Bo="; 18 + hash = "sha256-f3K+59+9NO33GO1SBZhKfqHPO9p5kivDeLNd780cZu8="; 19 19 }; 20 20 21 21 propagatedBuildInputs = [
+1 -1
pkgs/development/python-modules/piep/default.nix
··· 10 10 version = "0.10.0"; 11 11 format = "setuptools"; 12 12 pname = "piep"; 13 - disabled = isPy3k; 13 + disabled = !isPy3k; 14 14 15 15 src = fetchPypi { 16 16 inherit pname version;
+2 -2
pkgs/development/python-modules/publicsuffixlist/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "publicsuffixlist"; 14 - version = "0.10.0.20240502"; 14 + version = "0.10.0.20240506"; 15 15 pyproject = true; 16 16 17 17 disabled = pythonOlder "3.7"; 18 18 19 19 src = fetchPypi { 20 20 inherit pname version; 21 - hash = "sha256-Hy0DmawyjUXn35tTV39Mpp+Xe16hDTbkyQoBdKS/d0o="; 21 + hash = "sha256-gg1UcELZ8+gQg4VcBsagHhtUc9i6/d03q9oanyDT6K8="; 22 22 }; 23 23 24 24 build-system = [ setuptools ];
+14 -17
pkgs/development/python-modules/rns/default.nix
··· 1 - { lib 2 - , buildPythonPackage 3 - , cryptography 4 - , fetchFromGitHub 5 - , netifaces 6 - , pyserial 7 - , pythonOlder 8 - , setuptools 1 + { 2 + lib, 3 + buildPythonPackage, 4 + cryptography, 5 + fetchFromGitHub, 6 + netifaces, 7 + pyserial, 8 + pythonOlder, 9 + setuptools, 9 10 }: 10 11 11 12 buildPythonPackage rec { 12 13 pname = "rns"; 13 - version = "0.7.3"; 14 + version = "0.7.4"; 14 15 pyproject = true; 15 16 16 17 disabled = pythonOlder "3.7"; ··· 19 20 owner = "markqvist"; 20 21 repo = "Reticulum"; 21 22 rev = "refs/tags/${version}"; 22 - hash = "sha256-QcYjqqeXBKx+Ef00Bw1OJMWDMdQgp/fqh3r5yhsa0Kg="; 23 + hash = "sha256-M6iI554lv6PF5sIdOoaMIlQHP5YU8WM8YxfHMWhLSdE="; 23 24 }; 24 25 25 - nativeBuildInputs = [ 26 - setuptools 27 - ]; 26 + build-system = [ setuptools ]; 28 27 29 - propagatedBuildInputs = [ 28 + dependencies = [ 30 29 cryptography 31 30 netifaces 32 31 pyserial ··· 35 34 # Module has no tests 36 35 doCheck = false; 37 36 38 - pythonImportsCheck = [ 39 - "RNS" 40 - ]; 37 + pythonImportsCheck = [ "RNS" ]; 41 38 42 39 meta = with lib; { 43 40 description = "Cryptography-based networking stack for wide-area networks";
+8
pkgs/development/python-modules/validator-collection/default.nix
··· 135 135 136 136 pythonImportsCheck = [ "validator_collection" ]; 137 137 138 + disabledTests = [ 139 + # Issues with fake filesystem /var/data 140 + "test_writeable" 141 + "test_executable" 142 + "test_readable" 143 + "test_is_readable" 144 + ]; 145 + 138 146 meta = with lib; { 139 147 description = "Python library of 60+ commonly-used validator functions"; 140 148 homepage = "https://github.com/insightindustry/validator-collection/";
+1
pkgs/development/tools/analysis/checkov/default.nix
··· 23 23 "bc-python-hcl2" 24 24 "boto3" 25 25 "botocore" 26 + "cyclonedx-python-lib" 26 27 "dpath" 27 28 "igraph" 28 29 "license-expression"
+2 -2
pkgs/development/tools/build-managers/sbt/default.nix
··· 8 8 9 9 stdenv.mkDerivation (finalAttrs: { 10 10 pname = "sbt"; 11 - version = "1.9.9"; 11 + version = "1.10.0"; 12 12 13 13 src = fetchurl { 14 14 url = "https://github.com/sbt/sbt/releases/download/v${finalAttrs.version}/sbt-${finalAttrs.version}.tgz"; 15 - hash = "sha256-xXyuYMISLKG7p3GE37TQ0l/GwYgFOUqzarYgiwwPJi8="; 15 + hash = "sha256-FUt95sGSB8c9CjBPkByMS26tmpw6mamKnXKsGUGdJkA="; 16 16 }; 17 17 18 18 postPatch = ''
+9 -2
pkgs/os-specific/bsd/freebsd/evdev-proto/default.nix
··· 1 - { lib, stdenv, linuxHeaders, freebsd, runCommandCC, buildPackages }: 1 + { 2 + lib, 3 + stdenv, 4 + linuxHeaders, 5 + freebsd, 6 + runCommandCC, 7 + buildPackages, 8 + }: 2 9 3 10 stdenv.mkDerivation { 4 11 pname = "evdev-proto"; ··· 28 35 TOUCH = "touch"; 29 36 XARGS = "xargs"; 30 37 31 - ABI_FILE = runCommandCC "abifile" {} "$CC -shared -o $out"; 38 + ABI_FILE = runCommandCC "abifile" { } "$CC -shared -o $out"; 32 39 CLEAN_FETCH_ENV = true; 33 40 INSTALL_AS_USER = true; 34 41 NO_CHECKSUM = true;
+10 -8
pkgs/os-specific/bsd/freebsd/lib/default.nix
··· 3 3 { 4 4 inherit version; 5 5 6 - mkBsdArch = stdenv': { 7 - x86_64 = "amd64"; 8 - aarch64 = "arm64"; 9 - i486 = "i386"; 10 - i586 = "i386"; 11 - i686 = "i386"; 12 - }.${stdenv'.hostPlatform.parsed.cpu.name} 13 - or stdenv'.hostPlatform.parsed.cpu.name; 6 + mkBsdArch = 7 + stdenv': 8 + { 9 + x86_64 = "amd64"; 10 + aarch64 = "arm64"; 11 + i486 = "i386"; 12 + i586 = "i386"; 13 + i686 = "i386"; 14 + } 15 + .${stdenv'.hostPlatform.parsed.cpu.name} or stdenv'.hostPlatform.parsed.cpu.name; 14 16 15 17 install-wrapper = builtins.readFile ./install-wrapper.sh; 16 18 }
+28 -17
pkgs/os-specific/bsd/freebsd/package-set.nix
··· 1 - { stdenv, lib, stdenvNoCC 2 - , fetchzip 3 - , sourceData, versionData, buildFreebsd, patchesRoot 1 + { 2 + stdenv, 3 + lib, 4 + stdenvNoCC, 5 + fetchzip, 6 + sourceData, 7 + versionData, 8 + buildFreebsd, 9 + patchesRoot, 4 10 }: 5 11 6 12 self: ··· 8 14 lib.packagesFromDirectoryRecursive { 9 15 callPackage = self.callPackage; 10 16 directory = ./pkgs; 11 - } // { 17 + } 18 + // { 12 19 inherit sourceData patchesRoot versionData; 13 20 14 21 # Keep the crawled portion of Nixpkgs finite. ··· 21 28 22 29 compatIfNeeded = lib.optional (!stdenvNoCC.hostPlatform.isFreeBSD) self.compat; 23 30 freebsd-lib = import ./lib { 24 - version = lib.concatStringsSep "." (map toString (lib.filter (x: x != null) [ 25 - self.versionData.major 26 - self.versionData.minor 27 - self.versionData.patch or null 28 - ])); 31 + version = lib.concatStringsSep "." ( 32 + map toString ( 33 + lib.filter (x: x != null) [ 34 + self.versionData.major 35 + self.versionData.minor 36 + self.versionData.patch or null 37 + ] 38 + ) 39 + ); 29 40 }; 30 41 31 42 # The manual callPackages below should in principle be unnecessary, but are ··· 51 62 }; 52 63 53 64 libc = self.callPackage ./pkgs/libc/package.nix { 54 - inherit (buildFreebsd) makeMinimal install gencat rpcgen; 65 + inherit (buildFreebsd) 66 + makeMinimal 67 + install 68 + gencat 69 + rpcgen 70 + ; 55 71 inherit (self) csu include; 56 72 }; 57 73 58 - libnetbsd = self.callPackage ./pkgs/libnetbsd/package.nix { 59 - inherit (buildFreebsd) makeMinimal; 60 - }; 74 + libnetbsd = self.callPackage ./pkgs/libnetbsd/package.nix { inherit (buildFreebsd) makeMinimal; }; 61 75 62 76 mkDerivation = self.callPackage ./pkgs/mkDerivation.nix { 63 77 inherit stdenv; 64 78 inherit (buildFreebsd) makeMinimal install tsort; 65 79 }; 66 80 67 - makeMinimal = self.callPackage ./pkgs/makeMinimal.nix { 68 - inherit (self) make; 69 - }; 70 - 81 + makeMinimal = self.callPackage ./pkgs/makeMinimal.nix { inherit (self) make; }; 71 82 }
+6 -3
pkgs/os-specific/bsd/freebsd/pkgs/boot-install.nix
··· 1 1 { buildPackages, freebsd-lib }: 2 2 3 3 # Wrap NetBSD's install 4 - buildPackages.writeShellScriptBin "boot-install" (freebsd-lib.install-wrapper + '' 4 + buildPackages.writeShellScriptBin "boot-install" ( 5 + freebsd-lib.install-wrapper 6 + + '' 5 7 6 - ${buildPackages.netbsd.install}/bin/xinstall "''${args[@]}" 7 - '') 8 + ${buildPackages.netbsd.install}/bin/xinstall "''${args[@]}" 9 + '' 10 + )
+102 -83
pkgs/os-specific/bsd/freebsd/pkgs/compat/package.nix
··· 1 - { lib, stdenv, mkDerivation, patchesRoot 2 - , bsdSetupHook, freebsdSetupHook 3 - , makeMinimal, boot-install 4 - , which 5 - , freebsd-lib 6 - , expat, zlib, 1 + { 2 + lib, 3 + stdenv, 4 + mkDerivation, 5 + patchesRoot, 6 + bsdSetupHook, 7 + freebsdSetupHook, 8 + makeMinimal, 9 + boot-install, 10 + which, 11 + freebsd-lib, 12 + expat, 13 + zlib, 7 14 }: 8 15 9 16 let ··· 13 20 mkDerivation rec { 14 21 pname = "compat"; 15 22 path = "tools/build"; 16 - extraPaths = [ 17 - "lib/libc/db" 18 - "lib/libc/stdlib" # getopt 19 - "lib/libc/gen" # getcap 20 - "lib/libc/locale" # rpmatch 21 - ] ++ lib.optionals stdenv.hostPlatform.isLinux [ 22 - "lib/libc/string" # strlcpy 23 - "lib/libutil" 24 - ] ++ [ 25 - "contrib/libc-pwcache" 26 - "contrib/libc-vis" 27 - "sys/libkern" 28 - "sys/kern/subr_capability.c" 23 + extraPaths = 24 + [ 25 + "lib/libc/db" 26 + "lib/libc/stdlib" # getopt 27 + "lib/libc/gen" # getcap 28 + "lib/libc/locale" # rpmatch 29 + ] 30 + ++ lib.optionals stdenv.hostPlatform.isLinux [ 31 + "lib/libc/string" # strlcpy 32 + "lib/libutil" 33 + ] 34 + ++ [ 35 + "contrib/libc-pwcache" 36 + "contrib/libc-vis" 37 + "sys/libkern" 38 + "sys/kern/subr_capability.c" 29 39 30 - # Take only individual headers, or else we will clobber native libc, etc. 40 + # Take only individual headers, or else we will clobber native libc, etc. 31 41 32 - "sys/rpc/types.h" 42 + "sys/rpc/types.h" 33 43 34 - # Listed in Makekfile as INC 35 - "include/mpool.h" 36 - "include/ndbm.h" 37 - "include/err.h" 38 - "include/stringlist.h" 39 - "include/a.out.h" 40 - "include/nlist.h" 41 - "include/db.h" 42 - "include/getopt.h" 43 - "include/nl_types.h" 44 - "include/elf.h" 45 - "sys/sys/ctf.h" 44 + # Listed in Makekfile as INC 45 + "include/mpool.h" 46 + "include/ndbm.h" 47 + "include/err.h" 48 + "include/stringlist.h" 49 + "include/a.out.h" 50 + "include/nlist.h" 51 + "include/db.h" 52 + "include/getopt.h" 53 + "include/nl_types.h" 54 + "include/elf.h" 55 + "sys/sys/ctf.h" 46 56 47 - # Listed in Makekfile as SYSINC 57 + # Listed in Makekfile as SYSINC 48 58 49 - "sys/sys/capsicum.h" 50 - "sys/sys/caprights.h" 51 - "sys/sys/imgact_aout.h" 52 - "sys/sys/nlist_aout.h" 53 - "sys/sys/nv.h" 54 - "sys/sys/dnv.h" 55 - "sys/sys/cnv.h" 59 + "sys/sys/capsicum.h" 60 + "sys/sys/caprights.h" 61 + "sys/sys/imgact_aout.h" 62 + "sys/sys/nlist_aout.h" 63 + "sys/sys/nv.h" 64 + "sys/sys/dnv.h" 65 + "sys/sys/cnv.h" 56 66 57 - "sys/sys/elf32.h" 58 - "sys/sys/elf64.h" 59 - "sys/sys/elf_common.h" 60 - "sys/sys/elf_generic.h" 61 - "sys/${mkBsdArch stdenv}/include" 62 - ] ++ lib.optionals stdenv.hostPlatform.isx86 [ 63 - "sys/x86/include" 64 - ] ++ [ 67 + "sys/sys/elf32.h" 68 + "sys/sys/elf64.h" 69 + "sys/sys/elf_common.h" 70 + "sys/sys/elf_generic.h" 71 + "sys/${mkBsdArch stdenv}/include" 72 + ] 73 + ++ lib.optionals stdenv.hostPlatform.isx86 [ "sys/x86/include" ] 74 + ++ [ 65 75 66 - "sys/sys/queue.h" 67 - "sys/sys/md5.h" 68 - "sys/sys/sbuf.h" 69 - "sys/sys/tree.h" 70 - "sys/sys/font.h" 71 - "sys/sys/consio.h" 72 - "sys/sys/fnv_hash.h" 76 + "sys/sys/queue.h" 77 + "sys/sys/md5.h" 78 + "sys/sys/sbuf.h" 79 + "sys/sys/tree.h" 80 + "sys/sys/font.h" 81 + "sys/sys/consio.h" 82 + "sys/sys/fnv_hash.h" 73 83 74 - "sys/crypto/chacha20/_chacha.h" 75 - "sys/crypto/chacha20/chacha.h" 76 - # included too, despite ".c" 77 - "sys/crypto/chacha20/chacha.c" 84 + "sys/crypto/chacha20/_chacha.h" 85 + "sys/crypto/chacha20/chacha.h" 86 + # included too, despite ".c" 87 + "sys/crypto/chacha20/chacha.c" 78 88 79 - "sys/fs" 80 - "sys/ufs" 81 - "sys/sys/disk" 89 + "sys/fs" 90 + "sys/ufs" 91 + "sys/sys/disk" 82 92 83 - "lib/libcapsicum" 84 - "lib/libcasper" 85 - ]; 93 + "lib/libcapsicum" 94 + "lib/libcasper" 95 + ]; 86 96 87 97 patches = [ 88 98 /${patchesRoot}/compat-install-dirs.patch 89 99 /${patchesRoot}/compat-fix-typedefs-locations.patch 90 100 ]; 91 101 92 - preBuild = '' 93 - NIX_CFLAGS_COMPILE+=' -I../../include -I../../sys' 102 + preBuild = 103 + '' 104 + NIX_CFLAGS_COMPILE+=' -I../../include -I../../sys' 94 105 95 - cp ../../sys/${mkBsdArch stdenv}/include/elf.h ../../sys/sys 96 - cp ../../sys/${mkBsdArch stdenv}/include/elf.h ../../sys/sys/${mkBsdArch stdenv} 97 - '' + lib.optionalString stdenv.hostPlatform.isx86 '' 98 - cp ../../sys/x86/include/elf.h ../../sys/x86 99 - ''; 106 + cp ../../sys/${mkBsdArch stdenv}/include/elf.h ../../sys/sys 107 + cp ../../sys/${mkBsdArch stdenv}/include/elf.h ../../sys/sys/${mkBsdArch stdenv} 108 + '' 109 + + lib.optionalString stdenv.hostPlatform.isx86 '' 110 + cp ../../sys/x86/include/elf.h ../../sys/x86 111 + ''; 100 112 101 113 setupHooks = [ 102 114 ../../../../../build-support/setup-hooks/role.bash ··· 109 121 ''; 110 122 111 123 nativeBuildInputs = [ 112 - bsdSetupHook freebsdSetupHook 124 + bsdSetupHook 125 + freebsdSetupHook 113 126 makeMinimal 114 127 boot-install 115 128 116 129 which 117 130 ]; 118 - buildInputs = [ expat zlib ]; 131 + buildInputs = [ 132 + expat 133 + zlib 134 + ]; 119 135 120 136 makeFlags = [ 121 137 "STRIP=-s" # flag to install, not command ··· 124 140 "INSTALL=boot-install" 125 141 ]; 126 142 127 - preIncludes = '' 128 - mkdir -p $out/{0,1}-include 129 - cp --no-preserve=mode -r cross-build/include/common/* $out/0-include 130 - '' + lib.optionalString stdenv.hostPlatform.isLinux '' 131 - cp --no-preserve=mode -r cross-build/include/linux/* $out/1-include 132 - '' + lib.optionalString stdenv.hostPlatform.isDarwin '' 133 - cp --no-preserve=mode -r cross-build/include/darwin/* $out/1-include 134 - ''; 143 + preIncludes = 144 + '' 145 + mkdir -p $out/{0,1}-include 146 + cp --no-preserve=mode -r cross-build/include/common/* $out/0-include 147 + '' 148 + + lib.optionalString stdenv.hostPlatform.isLinux '' 149 + cp --no-preserve=mode -r cross-build/include/linux/* $out/1-include 150 + '' 151 + + lib.optionalString stdenv.hostPlatform.isDarwin '' 152 + cp --no-preserve=mode -r cross-build/include/darwin/* $out/1-include 153 + ''; 135 154 }
+27 -9
pkgs/os-specific/bsd/freebsd/pkgs/config.nix
··· 1 - { mkDerivation 2 - , bsdSetupHook, freebsdSetupHook 3 - , makeMinimal, install, mandoc, groff 4 - , flex, byacc, file2c 5 - , compatIfNeeded, libnv, libsbuf 1 + { 2 + mkDerivation, 3 + bsdSetupHook, 4 + freebsdSetupHook, 5 + makeMinimal, 6 + install, 7 + mandoc, 8 + groff, 9 + flex, 10 + byacc, 11 + file2c, 12 + compatIfNeeded, 13 + libnv, 14 + libsbuf, 6 15 }: 7 16 8 17 mkDerivation { 9 18 path = "usr.sbin/config"; 10 19 nativeBuildInputs = [ 11 - bsdSetupHook freebsdSetupHook 12 - makeMinimal install mandoc groff 20 + bsdSetupHook 21 + freebsdSetupHook 22 + makeMinimal 23 + install 24 + mandoc 25 + groff 13 26 14 - flex byacc file2c 27 + flex 28 + byacc 29 + file2c 30 + ]; 31 + buildInputs = compatIfNeeded ++ [ 32 + libnv 33 + libsbuf 15 34 ]; 16 - buildInputs = compatIfNeeded ++ [ libnv libsbuf ]; 17 35 }
+16 -8
pkgs/os-specific/bsd/freebsd/pkgs/csu.nix
··· 1 - { lib, mkDerivation 2 - , bsdSetupHook, freebsdSetupHook 3 - , makeMinimal 4 - , install 5 - , flex, byacc, gencat 6 - , include 1 + { 2 + lib, 3 + mkDerivation, 4 + bsdSetupHook, 5 + freebsdSetupHook, 6 + makeMinimal, 7 + install, 8 + flex, 9 + byacc, 10 + gencat, 11 + include, 7 12 }: 8 13 9 14 mkDerivation { ··· 13 18 "lib/libc/include/libc_private.h" 14 19 ]; 15 20 nativeBuildInputs = [ 16 - bsdSetupHook freebsdSetupHook 21 + bsdSetupHook 22 + freebsdSetupHook 17 23 makeMinimal 18 24 install 19 25 20 - flex byacc gencat 26 + flex 27 + byacc 28 + gencat 21 29 ]; 22 30 buildInputs = [ include ]; 23 31 MK_TESTS = "no";
+25 -7
pkgs/os-specific/bsd/freebsd/pkgs/ctfconvert.nix
··· 1 - { lib, stdenv, mkDerivation 2 - , bsdSetupHook, freebsdSetupHook 3 - , makeMinimal, install, mandoc, groff 4 - , compatIfNeeded, libelf, libdwarf, zlib, libspl 1 + { 2 + lib, 3 + stdenv, 4 + mkDerivation, 5 + bsdSetupHook, 6 + freebsdSetupHook, 7 + makeMinimal, 8 + install, 9 + mandoc, 10 + groff, 11 + compatIfNeeded, 12 + libelf, 13 + libdwarf, 14 + zlib, 15 + libspl, 5 16 }: 6 17 7 18 mkDerivation { ··· 16 27 OPENSOLARIS_USR_DISTDIR = "$(SRCTOP)/cddl/contrib/opensolaris"; 17 28 OPENSOLARIS_SYS_DISTDIR = "$(SRCTOP)/sys/cddl/contrib/opensolaris"; 18 29 nativeBuildInputs = [ 19 - bsdSetupHook freebsdSetupHook 20 - makeMinimal install mandoc groff 30 + bsdSetupHook 31 + freebsdSetupHook 32 + makeMinimal 33 + install 34 + mandoc 35 + groff 21 36 22 37 # flex byacc file2c 23 38 ]; 24 39 buildInputs = compatIfNeeded ++ [ 25 - libelf libdwarf zlib libspl 40 + libelf 41 + libdwarf 42 + zlib 43 + libspl 26 44 ]; 27 45 meta.license = lib.licenses.cddl; 28 46 }
+1 -3
pkgs/os-specific/bsd/freebsd/pkgs/freebsdSetupHook/package.nix
··· 1 1 { makeSetupHook }: 2 2 3 - makeSetupHook { 4 - name = "freebsd-setup-hook"; 5 - } ./setup-hook.sh 3 + makeSetupHook { name = "freebsd-setup-hook"; } ./setup-hook.sh
+1 -3
pkgs/os-specific/bsd/freebsd/pkgs/gencat.nix
··· 1 1 { mkDerivation }: 2 2 3 - mkDerivation { 4 - path = "usr.bin/gencat"; 5 - } 3 + mkDerivation { path = "usr.bin/gencat"; }
+22 -15
pkgs/os-specific/bsd/freebsd/pkgs/include/package.nix
··· 1 - { lib, mkDerivation, patchesRoot 2 - , buildPackages 3 - , bsdSetupHook, freebsdSetupHook 4 - , makeMinimal 5 - , install 6 - , mandoc, groff, rsync /*, nbperf*/, rpcgen 1 + { 2 + lib, 3 + mkDerivation, 4 + patchesRoot, 5 + buildPackages, 6 + bsdSetupHook, 7 + freebsdSetupHook, 8 + makeMinimal, 9 + install, 10 + mandoc, 11 + groff, 12 + rsync, # , nbperf 13 + rpcgen, 7 14 }: 8 15 9 16 mkDerivation { ··· 15 22 "sys" 16 23 ]; 17 24 18 - nativeBuildInputs = [ 19 - bsdSetupHook freebsdSetupHook 25 + nativeBuildInputs = [ 26 + bsdSetupHook 27 + freebsdSetupHook 20 28 makeMinimal 21 29 install 22 - mandoc groff rsync /*nbperf*/ rpcgen 30 + mandoc 31 + groff 32 + rsync # nbperf 33 + rpcgen 23 34 24 35 # HACK use NetBSD's for now 25 36 buildPackages.netbsd.mtree 26 37 ]; 27 38 28 - patches = [ 29 - /${patchesRoot}/no-perms-BSD.include.dist.patch 30 - ]; 39 + patches = [ /${patchesRoot}/no-perms-BSD.include.dist.patch ]; 31 40 32 41 # The makefiles define INCSDIR per subdirectory, so we have to set 33 42 # something else on the command line so those definitions aren't ··· 39 48 {} \; 40 49 ''; 41 50 42 - makeFlags = [ 43 - "RPCGEN_CPP=${buildPackages.stdenv.cc.cc}/bin/cpp" 44 - ]; 51 + makeFlags = [ "RPCGEN_CPP=${buildPackages.stdenv.cc.cc}/bin/cpp" ]; 45 52 46 53 # multiple header dirs, see above 47 54 postConfigure = ''
+40 -18
pkgs/os-specific/bsd/freebsd/pkgs/install.nix
··· 1 - { lib, stdenv, mkDerivation, writeShellScript 2 - , freebsd-lib 3 - , mtree 4 - , bsdSetupHook, freebsdSetupHook 5 - , makeMinimal, mandoc, groff 6 - , boot-install, install 7 - , compatIfNeeded, libmd, libnetbsd 1 + { 2 + lib, 3 + stdenv, 4 + mkDerivation, 5 + writeShellScript, 6 + freebsd-lib, 7 + mtree, 8 + bsdSetupHook, 9 + freebsdSetupHook, 10 + makeMinimal, 11 + mandoc, 12 + groff, 13 + boot-install, 14 + install, 15 + compatIfNeeded, 16 + libmd, 17 + libnetbsd, 8 18 }: 9 19 10 20 # HACK: to ensure parent directories exist. This emulates GNU 11 21 # install’s -D option. No alternative seems to exist in BSD install. 12 22 let 13 - binstall = writeShellScript "binstall" (freebsd-lib.install-wrapper + '' 23 + binstall = writeShellScript "binstall" ( 24 + freebsd-lib.install-wrapper 25 + + '' 14 26 15 - @out@/bin/xinstall "''${args[@]}" 16 - ''); 17 - in mkDerivation { 27 + @out@/bin/xinstall "''${args[@]}" 28 + '' 29 + ); 30 + in 31 + mkDerivation { 18 32 path = "usr.bin/xinstall"; 19 33 extraPaths = [ mtree.path ]; 20 34 nativeBuildInputs = [ 21 - bsdSetupHook freebsdSetupHook 22 - makeMinimal mandoc groff 23 - (if stdenv.hostPlatform == stdenv.buildPlatform 24 - then boot-install 25 - else install) 35 + bsdSetupHook 36 + freebsdSetupHook 37 + makeMinimal 38 + mandoc 39 + groff 40 + (if stdenv.hostPlatform == stdenv.buildPlatform then boot-install else install) 26 41 ]; 27 42 skipIncludesPhase = true; 28 - buildInputs = compatIfNeeded ++ [ libmd libnetbsd ]; 43 + buildInputs = compatIfNeeded ++ [ 44 + libmd 45 + libnetbsd 46 + ]; 29 47 makeFlags = [ 30 48 "STRIP=-s" # flag to install, not command 31 49 "MK_WERROR=no" ··· 37 55 mv $out/bin/install $out/bin/xinstall 38 56 ln -s ./binstall $out/bin/install 39 57 ''; 40 - outputs = [ "out" "man" "test" ]; 58 + outputs = [ 59 + "out" 60 + "man" 61 + "test" 62 + ]; 41 63 }
+25 -10
pkgs/os-specific/bsd/freebsd/pkgs/libc/package.nix
··· 1 - { lib, stdenv, mkDerivation 2 - , patchesRoot 1 + { 2 + lib, 3 + stdenv, 4 + mkDerivation, 5 + patchesRoot, 3 6 4 - , bsdSetupHook, freebsdSetupHook 5 - , makeMinimal 6 - , install 7 - , flex, byacc, gencat, rpcgen 7 + bsdSetupHook, 8 + freebsdSetupHook, 9 + makeMinimal, 10 + install, 11 + flex, 12 + byacc, 13 + gencat, 14 + rpcgen, 8 15 9 - , csu, include 16 + csu, 17 + include, 10 18 }: 11 19 12 20 mkDerivation rec { ··· 63 71 ''; 64 72 65 73 nativeBuildInputs = [ 66 - bsdSetupHook freebsdSetupHook 74 + bsdSetupHook 75 + freebsdSetupHook 67 76 makeMinimal 68 77 install 69 78 70 - flex byacc gencat rpcgen 79 + flex 80 + byacc 81 + gencat 82 + rpcgen 71 83 ]; 72 - buildInputs = [ include csu ]; 84 + buildInputs = [ 85 + include 86 + csu 87 + ]; 73 88 env.NIX_CFLAGS_COMPILE = "-B${csu}/lib"; 74 89 75 90 # Suppress lld >= 16 undefined version errors
+20 -10
pkgs/os-specific/bsd/freebsd/pkgs/libdwarf.nix
··· 1 - { lib, stdenv, mkDerivation 2 - , bsdSetupHook, freebsdSetupHook 3 - , makeMinimal, install, mandoc, groff 4 - , m4 5 - , compatIfNeeded, libelf 1 + { 2 + lib, 3 + stdenv, 4 + mkDerivation, 5 + bsdSetupHook, 6 + freebsdSetupHook, 7 + makeMinimal, 8 + install, 9 + mandoc, 10 + groff, 11 + m4, 12 + compatIfNeeded, 13 + libelf, 6 14 }: 7 15 8 16 mkDerivation { ··· 15 23 "sys/sys/elf_common.h" 16 24 ]; 17 25 nativeBuildInputs = [ 18 - bsdSetupHook freebsdSetupHook 19 - makeMinimal install mandoc groff 26 + bsdSetupHook 27 + freebsdSetupHook 28 + makeMinimal 29 + install 30 + mandoc 31 + groff 20 32 21 33 m4 22 34 ]; 23 - buildInputs = compatIfNeeded ++ [ 24 - libelf 25 - ]; 35 + buildInputs = compatIfNeeded ++ [ libelf ]; 26 36 MK_TESTS = "no"; 27 37 }
+17 -6
pkgs/os-specific/bsd/freebsd/pkgs/libelf.nix
··· 1 - { lib, stdenv, mkDerivation 2 - , bsdSetupHook, freebsdSetupHook 3 - , makeMinimal, install, mandoc, groff 4 - , m4 1 + { 2 + lib, 3 + stdenv, 4 + mkDerivation, 5 + bsdSetupHook, 6 + freebsdSetupHook, 7 + makeMinimal, 8 + install, 9 + mandoc, 10 + groff, 11 + m4, 5 12 }: 6 13 7 14 mkDerivation { ··· 15 22 ]; 16 23 BOOTSTRAPPING = !stdenv.isFreeBSD; 17 24 nativeBuildInputs = [ 18 - bsdSetupHook freebsdSetupHook 19 - makeMinimal install mandoc groff 25 + bsdSetupHook 26 + freebsdSetupHook 27 + makeMinimal 28 + install 29 + mandoc 30 + groff 20 31 21 32 m4 22 33 ];
+19 -10
pkgs/os-specific/bsd/freebsd/pkgs/libnetbsd/package.nix
··· 1 - { lib, stdenv 2 - , mkDerivation, patchesRoot 3 - , bsdSetupHook, freebsdSetupHook, makeMinimal, mandoc, groff 4 - , boot-install, install 5 - , compatIfNeeded 1 + { 2 + lib, 3 + stdenv, 4 + mkDerivation, 5 + patchesRoot, 6 + bsdSetupHook, 7 + freebsdSetupHook, 8 + makeMinimal, 9 + mandoc, 10 + groff, 11 + boot-install, 12 + install, 13 + compatIfNeeded, 6 14 }: 7 15 8 16 mkDerivation { 9 17 path = "lib/libnetbsd"; 10 18 nativeBuildInputs = [ 11 - bsdSetupHook freebsdSetupHook 12 - makeMinimal mandoc groff 13 - (if stdenv.hostPlatform == stdenv.buildPlatform 14 - then boot-install 15 - else install) 19 + bsdSetupHook 20 + freebsdSetupHook 21 + makeMinimal 22 + mandoc 23 + groff 24 + (if stdenv.hostPlatform == stdenv.buildPlatform then boot-install else install) 16 25 ]; 17 26 patches = lib.optionals (!stdenv.hostPlatform.isFreeBSD) [ 18 27 /${patchesRoot}/libnetbsd-do-install.patch
+1 -3
pkgs/os-specific/bsd/freebsd/pkgs/libsbuf.nix
··· 2 2 3 3 mkDerivation { 4 4 path = "lib/libsbuf"; 5 - extraPaths = [ 6 - "sys/kern" 7 - ]; 5 + extraPaths = [ "sys/kern" ]; 8 6 MK_TESTS = "no"; 9 7 }
+6 -2
pkgs/os-specific/bsd/freebsd/pkgs/libutil.nix
··· 1 - { mkDerivation, lib, stdenv }: 1 + { 2 + mkDerivation, 3 + lib, 4 + stdenv, 5 + }: 2 6 mkDerivation { 3 7 path = "lib/libutil"; 4 - extraPaths = ["lib/libc/gen"]; 8 + extraPaths = [ "lib/libc/gen" ]; 5 9 clangFixup = true; 6 10 MK_TESTS = "no"; 7 11 }
+11 -5
pkgs/os-specific/bsd/freebsd/pkgs/lorder.nix
··· 1 - { mkDerivation 2 - , bsdSetupHook, freebsdSetupHook 1 + { 2 + mkDerivation, 3 + bsdSetupHook, 4 + freebsdSetupHook, 3 5 }: 4 6 5 7 mkDerivation rec { ··· 13 15 mv "lorder.1" "$man/share/man" 14 16 ''; 15 17 nativeBuildInputs = [ 16 - bsdSetupHook freebsdSetupHook 18 + bsdSetupHook 19 + freebsdSetupHook 17 20 ]; 18 - buildInputs = []; 19 - outputs = [ "out" "man" ]; 21 + buildInputs = [ ]; 22 + outputs = [ 23 + "out" 24 + "man" 25 + ]; 20 26 }
+16 -11
pkgs/os-specific/bsd/freebsd/pkgs/make.nix
··· 1 - { lib, mkDerivation, stdenv }: 1 + { 2 + lib, 3 + mkDerivation, 4 + stdenv, 5 + }: 2 6 3 7 mkDerivation { 4 8 path = "contrib/bmake"; 5 9 version = "9.2"; 6 - postPatch = '' 7 - # make needs this to pick up our sys make files 8 - export NIX_CFLAGS_COMPILE+=" -D_PATH_DEFSYSPATH=\"$out/share/mk\"" 10 + postPatch = 11 + '' 12 + # make needs this to pick up our sys make files 13 + export NIX_CFLAGS_COMPILE+=" -D_PATH_DEFSYSPATH=\"$out/share/mk\"" 9 14 10 - '' + lib.optionalString stdenv.isDarwin '' 11 - substituteInPlace $BSDSRCDIR/share/mk/bsd.sys.mk \ 12 - --replace '-Wl,--fatal-warnings' "" \ 13 - --replace '-Wl,--warn-shared-textrel' "" 14 - ''; 15 + '' 16 + + lib.optionalString stdenv.isDarwin '' 17 + substituteInPlace $BSDSRCDIR/share/mk/bsd.sys.mk \ 18 + --replace '-Wl,--fatal-warnings' "" \ 19 + --replace '-Wl,--warn-shared-textrel' "" 20 + ''; 15 21 postInstall = '' 16 22 make -C $BSDSRCDIR/share/mk FILESDIR=$out/share/mk install 17 23 ''; 18 - extraPaths = [ "share/mk" ] 19 - ++ lib.optional (!stdenv.hostPlatform.isFreeBSD) "tools/build/mk"; 24 + extraPaths = [ "share/mk" ] ++ lib.optional (!stdenv.hostPlatform.isFreeBSD) "tools/build/mk"; 20 25 }
+11 -6
pkgs/os-specific/bsd/freebsd/pkgs/makeMinimal.nix
··· 1 - { lib, stdenv, mkDerivation 2 - , make 3 - , bsdSetupHook, freebsdSetupHook 1 + { 2 + lib, 3 + stdenv, 4 + mkDerivation, 5 + make, 6 + bsdSetupHook, 7 + freebsdSetupHook, 4 8 }: 5 9 6 10 mkDerivation rec { 7 11 inherit (make) path; 8 12 9 - buildInputs = []; 13 + buildInputs = [ ]; 10 14 nativeBuildInputs = [ 11 - bsdSetupHook freebsdSetupHook 15 + bsdSetupHook 16 + freebsdSetupHook 12 17 ]; 13 18 14 19 skipIncludesPhase = true; 15 20 16 - makeFlags = []; 21 + makeFlags = [ ]; 17 22 18 23 postPatch = '' 19 24 patchShebangs configure
+86 -65
pkgs/os-specific/bsd/freebsd/pkgs/mkDerivation.nix
··· 1 - { lib, stdenv, stdenvNoCC 2 - , compatIfNeeded 3 - , runCommand, rsync 4 - , freebsd-lib 5 - , source 6 - , bsdSetupHook, freebsdSetupHook 7 - , makeMinimal 8 - , install, tsort, lorder, mandoc, groff 1 + { 2 + lib, 3 + stdenv, 4 + stdenvNoCC, 5 + compatIfNeeded, 6 + runCommand, 7 + rsync, 8 + freebsd-lib, 9 + source, 10 + bsdSetupHook, 11 + freebsdSetupHook, 12 + makeMinimal, 13 + install, 14 + tsort, 15 + lorder, 16 + mandoc, 17 + groff, 9 18 }: 10 19 11 - lib.makeOverridable (attrs: let 12 - stdenv' = if attrs.noCC or false then stdenvNoCC else stdenv; 13 - in stdenv'.mkDerivation (rec { 14 - pname = "${attrs.pname or (baseNameOf attrs.path)}-freebsd"; 15 - inherit (freebsd-lib) version; 16 - src = runCommand "${pname}-filtered-src" { 17 - nativeBuildInputs = [ rsync ]; 18 - } '' 19 - for p in ${lib.concatStringsSep " " ([ attrs.path ] ++ attrs.extraPaths or [])}; do 20 - set -x 21 - path="$out/$p" 22 - mkdir -p "$(dirname "$path")" 23 - src_path="${source}/$p" 24 - if [[ -d "$src_path" ]]; then src_path+=/; fi 25 - rsync --chmod="+w" -r "$src_path" "$path" 26 - set +x 27 - done 28 - ''; 20 + lib.makeOverridable ( 21 + attrs: 22 + let 23 + stdenv' = if attrs.noCC or false then stdenvNoCC else stdenv; 24 + in 25 + stdenv'.mkDerivation ( 26 + rec { 27 + pname = "${attrs.pname or (baseNameOf attrs.path)}-freebsd"; 28 + inherit (freebsd-lib) version; 29 + src = runCommand "${pname}-filtered-src" { nativeBuildInputs = [ rsync ]; } '' 30 + for p in ${lib.concatStringsSep " " ([ attrs.path ] ++ attrs.extraPaths or [ ])}; do 31 + set -x 32 + path="$out/$p" 33 + mkdir -p "$(dirname "$path")" 34 + src_path="${source}/$p" 35 + if [[ -d "$src_path" ]]; then src_path+=/; fi 36 + rsync --chmod="+w" -r "$src_path" "$path" 37 + set +x 38 + done 39 + ''; 29 40 30 - extraPaths = [ ]; 41 + extraPaths = [ ]; 31 42 32 - nativeBuildInputs = [ 33 - bsdSetupHook freebsdSetupHook 34 - makeMinimal 35 - install tsort lorder mandoc groff #statHook 36 - ]; 37 - buildInputs = compatIfNeeded; 43 + nativeBuildInputs = [ 44 + bsdSetupHook 45 + freebsdSetupHook 46 + makeMinimal 47 + install 48 + tsort 49 + lorder 50 + mandoc 51 + groff # statHook 52 + ]; 53 + buildInputs = compatIfNeeded; 38 54 39 - HOST_SH = stdenv'.shell; 55 + HOST_SH = stdenv'.shell; 40 56 41 - # Since STRIP below is the flag 42 - STRIPBIN = "${stdenv.cc.bintools.targetPrefix}strip"; 57 + # Since STRIP below is the flag 58 + STRIPBIN = "${stdenv.cc.bintools.targetPrefix}strip"; 43 59 44 - makeFlags = [ 45 - "STRIP=-s" # flag to install, not command 46 - ] ++ lib.optional (!stdenv.hostPlatform.isFreeBSD) "MK_WERROR=no"; 60 + makeFlags = [ 61 + "STRIP=-s" # flag to install, not command 62 + ] ++ lib.optional (!stdenv.hostPlatform.isFreeBSD) "MK_WERROR=no"; 47 63 48 - # amd64 not x86_64 for this on unlike NetBSD 49 - MACHINE_ARCH = freebsd-lib.mkBsdArch stdenv'; 64 + # amd64 not x86_64 for this on unlike NetBSD 65 + MACHINE_ARCH = freebsd-lib.mkBsdArch stdenv'; 50 66 51 - MACHINE = freebsd-lib.mkBsdArch stdenv'; 67 + MACHINE = freebsd-lib.mkBsdArch stdenv'; 52 68 53 - MACHINE_CPUARCH = MACHINE_ARCH; 69 + MACHINE_CPUARCH = MACHINE_ARCH; 54 70 55 - COMPONENT_PATH = attrs.path or null; 71 + COMPONENT_PATH = attrs.path or null; 56 72 57 - strictDeps = true; 73 + strictDeps = true; 58 74 59 - meta = with lib; { 60 - maintainers = with maintainers; [ ericson2314 ]; 61 - platforms = platforms.unix; 62 - license = licenses.bsd2; 63 - }; 64 - } // lib.optionalAttrs stdenv'.hasCC { 65 - # TODO should CC wrapper set this? 66 - CPP = "${stdenv'.cc.targetPrefix}cpp"; 67 - } // lib.optionalAttrs stdenv'.isDarwin { 68 - MKRELRO = "no"; 69 - } // lib.optionalAttrs (stdenv'.cc.isClang or false) { 70 - HAVE_LLVM = lib.versions.major (lib.getVersion stdenv'.cc.cc); 71 - } // lib.optionalAttrs (stdenv'.cc.isGNU or false) { 72 - HAVE_GCC = lib.versions.major (lib.getVersion stdenv'.cc.cc); 73 - } // lib.optionalAttrs (stdenv'.isx86_32) { 74 - USE_SSP = "no"; 75 - } // lib.optionalAttrs (attrs.headersOnly or false) { 76 - installPhase = "includesPhase"; 77 - dontBuild = true; 78 - } // attrs)) 75 + meta = with lib; { 76 + maintainers = with maintainers; [ ericson2314 ]; 77 + platforms = platforms.unix; 78 + license = licenses.bsd2; 79 + }; 80 + } 81 + // lib.optionalAttrs stdenv'.hasCC { 82 + # TODO should CC wrapper set this? 83 + CPP = "${stdenv'.cc.targetPrefix}cpp"; 84 + } 85 + // lib.optionalAttrs stdenv'.isDarwin { MKRELRO = "no"; } 86 + // lib.optionalAttrs (stdenv'.cc.isClang or false) { 87 + HAVE_LLVM = lib.versions.major (lib.getVersion stdenv'.cc.cc); 88 + } 89 + // lib.optionalAttrs (stdenv'.cc.isGNU or false) { 90 + HAVE_GCC = lib.versions.major (lib.getVersion stdenv'.cc.cc); 91 + } 92 + // lib.optionalAttrs (stdenv'.isx86_32) { USE_SSP = "no"; } 93 + // lib.optionalAttrs (attrs.headersOnly or false) { 94 + installPhase = "includesPhase"; 95 + dontBuild = true; 96 + } 97 + // attrs 98 + ) 99 + )
+1 -3
pkgs/os-specific/bsd/freebsd/pkgs/mknod.nix
··· 1 1 { mkDerivation }: 2 2 3 - mkDerivation { 4 - path = "sbin/mknod"; 5 - } 3 + mkDerivation { path = "sbin/mknod"; }
+6 -1
pkgs/os-specific/bsd/freebsd/pkgs/rpcgen/package.nix
··· 1 - { lib, mkDerivation, stdenv, patchesRoot }: 1 + { 2 + lib, 3 + mkDerivation, 4 + stdenv, 5 + patchesRoot, 6 + }: 2 7 3 8 mkDerivation rec { 4 9 path = "usr.bin/rpcgen";
+14 -5
pkgs/os-specific/bsd/freebsd/pkgs/stat.nix
··· 1 - { mkDerivation 2 - , bsdSetupHook, freebsdSetupHook 3 - , makeMinimal, install, mandoc, groff 1 + { 2 + mkDerivation, 3 + bsdSetupHook, 4 + freebsdSetupHook, 5 + makeMinimal, 6 + install, 7 + mandoc, 8 + groff, 4 9 }: 5 10 6 11 # Don't add this to nativeBuildInputs directly. Use statHook instead. 7 12 mkDerivation { 8 13 path = "usr.bin/stat"; 9 14 nativeBuildInputs = [ 10 - bsdSetupHook freebsdSetupHook 11 - makeMinimal install mandoc groff 15 + bsdSetupHook 16 + freebsdSetupHook 17 + makeMinimal 18 + install 19 + mandoc 20 + groff 12 21 ]; 13 22 }
+10 -6
pkgs/os-specific/bsd/freebsd/pkgs/statHook.nix
··· 1 - { makeSetupHook, writeText, stat }: 1 + { 2 + makeSetupHook, 3 + writeText, 4 + stat, 5 + }: 2 6 3 7 # stat isn't in POSIX, and NetBSD stat supports a completely 4 8 # different range of flags than GNU stat, so including it in PATH 5 9 # breaks stdenv. Work around that with a hook that will point 6 10 # NetBSD's build system and NetBSD stat without including it in 7 11 # PATH. 8 - makeSetupHook { 9 - name = "netbsd-stat-hook"; 10 - } (writeText "netbsd-stat-hook-impl" '' 11 - makeFlagsArray+=(TOOL_STAT=${stat}/bin/stat) 12 - '') 12 + makeSetupHook { name = "netbsd-stat-hook"; } ( 13 + writeText "netbsd-stat-hook-impl" '' 14 + makeFlagsArray+=(TOOL_STAT=${stat}/bin/stat) 15 + '' 16 + )
+75 -50
pkgs/os-specific/bsd/freebsd/pkgs/sys/package.nix
··· 1 - { stdenv, mkDerivation, freebsd-lib, patchesRoot 2 - , buildPackages 3 - , bsdSetupHook, freebsdSetupHook 4 - , makeMinimal, install, mandoc, groff 5 - , config, rpcgen, file2c, gawk, uudecode, xargs-j #, ctfconvert 1 + { 2 + stdenv, 3 + mkDerivation, 4 + freebsd-lib, 5 + patchesRoot, 6 + buildPackages, 7 + bsdSetupHook, 8 + freebsdSetupHook, 9 + makeMinimal, 10 + install, 11 + mandoc, 12 + groff, 13 + config, 14 + rpcgen, 15 + file2c, 16 + gawk, 17 + uudecode, 18 + xargs-j, # , ctfconvert 6 19 }: 7 20 8 - mkDerivation (let 9 - cfg = "MINIMAL"; 10 - in rec { 11 - path = "sys"; 21 + mkDerivation ( 22 + let 23 + cfg = "MINIMAL"; 24 + in 25 + rec { 26 + path = "sys"; 12 27 13 - nativeBuildInputs = [ 14 - bsdSetupHook freebsdSetupHook 15 - makeMinimal install mandoc groff 28 + nativeBuildInputs = [ 29 + bsdSetupHook 30 + freebsdSetupHook 31 + makeMinimal 32 + install 33 + mandoc 34 + groff 16 35 17 - config rpcgen file2c gawk uudecode xargs-j 18 - #ctfconvert 19 - ]; 36 + config 37 + rpcgen 38 + file2c 39 + gawk 40 + uudecode 41 + xargs-j 42 + #ctfconvert 43 + ]; 20 44 21 - patches = [ 22 - /${patchesRoot}/sys-gnu-date.patch 23 - /${patchesRoot}/sys-no-explicit-intrinsics-dep.patch 24 - ]; 45 + patches = [ 46 + /${patchesRoot}/sys-gnu-date.patch 47 + /${patchesRoot}/sys-no-explicit-intrinsics-dep.patch 48 + ]; 25 49 26 - # --dynamic-linker /red/herring is used when building the kernel. 27 - NIX_ENFORCE_PURITY = 0; 50 + # --dynamic-linker /red/herring is used when building the kernel. 51 + NIX_ENFORCE_PURITY = 0; 28 52 29 - AWK = "${buildPackages.gawk}/bin/awk"; 53 + AWK = "${buildPackages.gawk}/bin/awk"; 30 54 31 - CWARNEXTRA = "-Wno-error=shift-negative-value -Wno-address-of-packed-member"; 55 + CWARNEXTRA = "-Wno-error=shift-negative-value -Wno-address-of-packed-member"; 32 56 33 - MK_CTF = "no"; 57 + MK_CTF = "no"; 34 58 35 - KODIR = "${builtins.placeholder "out"}/kernel"; 36 - KMODDIR = "${builtins.placeholder "out"}/kernel"; 37 - DTBDIR = "${builtins.placeholder"out"}/dbt"; 59 + KODIR = "${builtins.placeholder "out"}/kernel"; 60 + KMODDIR = "${builtins.placeholder "out"}/kernel"; 61 + DTBDIR = "${builtins.placeholder "out"}/dbt"; 38 62 39 - KERN_DEBUGDIR = "${builtins.placeholder "out"}/debug"; 40 - KERN_DEBUGDIR_KODIR = "${KERN_DEBUGDIR}/kernel"; 41 - KERN_DEBUGDIR_KMODDIR = "${KERN_DEBUGDIR}/kernel"; 63 + KERN_DEBUGDIR = "${builtins.placeholder "out"}/debug"; 64 + KERN_DEBUGDIR_KODIR = "${KERN_DEBUGDIR}/kernel"; 65 + KERN_DEBUGDIR_KMODDIR = "${KERN_DEBUGDIR}/kernel"; 42 66 43 - skipIncludesPhase = true; 67 + skipIncludesPhase = true; 44 68 45 - configurePhase = '' 46 - runHook preConfigure 69 + configurePhase = '' 70 + runHook preConfigure 47 71 48 - for f in conf/kmod.mk contrib/dev/acpica/acpica_prep.sh; do 49 - substituteInPlace "$f" --replace 'xargs -J' 'xargs-j ' 50 - done 72 + for f in conf/kmod.mk contrib/dev/acpica/acpica_prep.sh; do 73 + substituteInPlace "$f" --replace 'xargs -J' 'xargs-j ' 74 + done 51 75 52 - for f in conf/*.mk; do 53 - substituteInPlace "$f" --replace 'KERN_DEBUGDIR}''${' 'KERN_DEBUGDIR_' 54 - done 76 + for f in conf/*.mk; do 77 + substituteInPlace "$f" --replace 'KERN_DEBUGDIR}''${' 'KERN_DEBUGDIR_' 78 + done 55 79 56 - cd ${freebsd-lib.mkBsdArch stdenv}/conf 57 - sed -i ${cfg} \ 58 - -e 's/WITH_CTF=1/WITH_CTF=0/' \ 59 - -e '/KDTRACE/d' 60 - config ${cfg} 80 + cd ${freebsd-lib.mkBsdArch stdenv}/conf 81 + sed -i ${cfg} \ 82 + -e 's/WITH_CTF=1/WITH_CTF=0/' \ 83 + -e '/KDTRACE/d' 84 + config ${cfg} 61 85 62 - runHook postConfigure 63 - ''; 64 - preBuild = '' 65 - cd ../compile/${cfg} 66 - ''; 67 - }) 86 + runHook postConfigure 87 + ''; 88 + preBuild = '' 89 + cd ../compile/${cfg} 90 + ''; 91 + } 92 + )
+15 -6
pkgs/os-specific/bsd/freebsd/pkgs/tsort.nix
··· 1 - { mkDerivation 2 - , bsdSetupHook, freebsdSetupHook 3 - , makeMinimal, install, mandoc, groff 1 + { 2 + mkDerivation, 3 + bsdSetupHook, 4 + freebsdSetupHook, 5 + makeMinimal, 6 + install, 7 + mandoc, 8 + groff, 4 9 }: 5 10 6 11 mkDerivation { 7 12 path = "usr.bin/tsort"; 8 - nativeBuildInputs = [ 9 - bsdSetupHook freebsdSetupHook 10 - makeMinimal install mandoc groff 13 + nativeBuildInputs = [ 14 + bsdSetupHook 15 + freebsdSetupHook 16 + makeMinimal 17 + install 18 + mandoc 19 + groff 11 20 ]; 12 21 }
+161 -111
pkgs/os-specific/bsd/netbsd/default.nix
··· 1 - { stdenv, lib, stdenvNoCC 2 - , makeScopeWithSplicing', generateSplicesForMkScope 3 - , buildPackages 4 - , fetchcvs 1 + { 2 + stdenv, 3 + lib, 4 + stdenvNoCC, 5 + makeScopeWithSplicing', 6 + generateSplicesForMkScope, 7 + buildPackages, 8 + fetchcvs, 5 9 }: 6 10 7 11 makeScopeWithSplicing' { 8 12 otherSplices = generateSplicesForMkScope "netbsd"; 9 - f = (self: lib.packagesFromDirectoryRecursive { 10 - callPackage = self.callPackage; 11 - directory = ./pkgs; 12 - } // (let inherit (self) mkDerivation; in { 13 - 14 - fetchNetBSD = path: version: sha256: fetchcvs { 15 - cvsRoot = ":pserver:anoncvs@anoncvs.NetBSD.org:/cvsroot"; 16 - module = "src/${path}"; 17 - inherit sha256; 18 - tag = "netbsd-${lib.replaceStrings ["."] ["-"] version}-RELEASE"; 19 - }; 20 - 21 - defaultMakeFlags = [ 22 - "MKSOFTFLOAT=${if stdenv.hostPlatform.gcc.float or (stdenv.hostPlatform.parsed.abi.float or "hard") == "soft" 23 - then "yes" 24 - else "no"}" 25 - ]; 13 + f = ( 14 + self: 15 + lib.packagesFromDirectoryRecursive { 16 + callPackage = self.callPackage; 17 + directory = ./pkgs; 18 + } 19 + // { 26 20 27 - compatIfNeeded = lib.optional (!stdenvNoCC.hostPlatform.isNetBSD) self.compat; 21 + fetchNetBSD = 22 + path: version: sha256: 23 + fetchcvs { 24 + cvsRoot = ":pserver:anoncvs@anoncvs.NetBSD.org:/cvsroot"; 25 + module = "src/${path}"; 26 + inherit sha256; 27 + tag = "netbsd-${lib.replaceStrings [ "." ] [ "-" ] version}-RELEASE"; 28 + }; 28 29 29 - # The manual callPackages below should in principle be unnecessary because 30 - # they're just selecting arguments that would be selected anyway. However, 31 - # if we don't perform these manual calls, we get infinite recursion issues 32 - # because of the splices. 30 + defaultMakeFlags = [ 31 + "MKSOFTFLOAT=${ 32 + if stdenv.hostPlatform.gcc.float or (stdenv.hostPlatform.parsed.abi.float or "hard") == "soft" then 33 + "yes" 34 + else 35 + "no" 36 + }" 37 + ]; 33 38 34 - mkDerivation = self.callPackage ./pkgs/mkDerivation.nix { 35 - inherit stdenv stdenvNoCC; 36 - inherit (buildPackages.netbsd) netbsdSetupHook makeMinimal install tsort lorder; 37 - inherit (buildPackages) mandoc; 38 - inherit (buildPackages.buildPackages) rsync; 39 + compatIfNeeded = lib.optional (!stdenvNoCC.hostPlatform.isNetBSD) self.compat; 39 40 40 - }; 41 + # The manual callPackages below should in principle be unnecessary because 42 + # they're just selecting arguments that would be selected anyway. However, 43 + # if we don't perform these manual calls, we get infinite recursion issues 44 + # because of the splices. 41 45 42 - makeMinimal = self.callPackage ./pkgs/makeMinimal.nix { 43 - inherit (self) make; 44 - }; 46 + mkDerivation = self.callPackage ./pkgs/mkDerivation.nix { 47 + inherit stdenv stdenvNoCC; 48 + inherit (buildPackages.netbsd) 49 + netbsdSetupHook 50 + makeMinimal 51 + install 52 + tsort 53 + lorder 54 + ; 55 + inherit (buildPackages) mandoc; 56 + inherit (buildPackages.buildPackages) rsync; 57 + }; 45 58 46 - compat = self.callPackage ./pkgs/compat/package.nix { 47 - inherit (buildPackages) coreutils; 48 - inherit (buildPackages.darwin) cctools-port; 49 - inherit (buildPackages.buildPackages) rsync; 50 - inherit (buildPackages.netbsd) makeMinimal; 51 - inherit (self) install include libc libutil; 52 - }; 59 + makeMinimal = self.callPackage ./pkgs/makeMinimal.nix { inherit (self) make; }; 53 60 54 - install = self.callPackage ./pkgs/install/package.nix { 55 - inherit (self) fts mtree make compatIfNeeded; 56 - inherit (buildPackages.buildPackages) rsync; 57 - inherit (buildPackages.netbsd) makeMinimal; 58 - }; 61 + compat = self.callPackage ./pkgs/compat/package.nix { 62 + inherit (buildPackages) coreutils; 63 + inherit (buildPackages.darwin) cctools-port; 64 + inherit (buildPackages.buildPackages) rsync; 65 + inherit (buildPackages.netbsd) makeMinimal; 66 + inherit (self) 67 + install 68 + include 69 + libc 70 + libutil 71 + ; 72 + }; 59 73 60 - # See note in pkgs/stat/package.nix 61 - stat = self.callPackage ./pkgs/stat/package.nix { 62 - inherit (buildPackages.netbsd) makeMinimal install; 63 - inherit (buildPackages.buildPackages) rsync; 64 - }; 74 + install = self.callPackage ./pkgs/install/package.nix { 75 + inherit (self) 76 + fts 77 + mtree 78 + make 79 + compatIfNeeded 80 + ; 81 + inherit (buildPackages.buildPackages) rsync; 82 + inherit (buildPackages.netbsd) makeMinimal; 83 + }; 65 84 66 - # See note in pkgs/stat/hook.nix 67 - statHook = self.callPackage ./pkgs/stat/hook.nix { 68 - inherit (self) stat; 69 - }; 85 + # See note in pkgs/stat/package.nix 86 + stat = self.callPackage ./pkgs/stat/package.nix { 87 + inherit (buildPackages.netbsd) makeMinimal install; 88 + inherit (buildPackages.buildPackages) rsync; 89 + }; 70 90 71 - tsort = self.callPackage ./pkgs/tsort.nix { 72 - inherit (buildPackages.netbsd) makeMinimal install; 73 - inherit (buildPackages.buildPackages) rsync; 74 - }; 91 + # See note in pkgs/stat/hook.nix 92 + statHook = self.callPackage ./pkgs/stat/hook.nix { inherit (self) stat; }; 75 93 76 - lorder = self.callPackage ./pkgs/lorder.nix { 77 - inherit (buildPackages.netbsd) makeMinimal install; 78 - inherit (buildPackages.buildPackages) rsync; 79 - }; 94 + tsort = self.callPackage ./pkgs/tsort.nix { 95 + inherit (buildPackages.netbsd) makeMinimal install; 96 + inherit (buildPackages.buildPackages) rsync; 97 + }; 80 98 81 - config = self.callPackage ./pkgs/config.nix { 82 - inherit (buildPackages.netbsd) makeMinimal install; 83 - inherit (buildPackages.buildPackages) rsync; 84 - inherit (self) cksum; 85 - }; 99 + lorder = self.callPackage ./pkgs/lorder.nix { 100 + inherit (buildPackages.netbsd) makeMinimal install; 101 + inherit (buildPackages.buildPackages) rsync; 102 + }; 86 103 87 - include = self.callPackage ./pkgs/include.nix { 88 - inherit (buildPackages.netbsd) 89 - makeMinimal install nbperf rpcgen; 90 - inherit (buildPackages) stdenv; 91 - inherit (buildPackages.buildPackages) rsync; 92 - }; 104 + config = self.callPackage ./pkgs/config.nix { 105 + inherit (buildPackages.netbsd) makeMinimal install; 106 + inherit (buildPackages.buildPackages) rsync; 107 + inherit (self) cksum; 108 + }; 93 109 94 - sys-headers = self.callPackage ./pkgs/sys/headers.nix { 95 - inherit (buildPackages.netbsd) 96 - makeMinimal install tsort lorder statHook uudecode config genassym; 97 - inherit (buildPackages.buildPackages) rsync; 98 - }; 110 + include = self.callPackage ./pkgs/include.nix { 111 + inherit (buildPackages.netbsd) 112 + makeMinimal 113 + install 114 + nbperf 115 + rpcgen 116 + ; 117 + inherit (buildPackages) stdenv; 118 + inherit (buildPackages.buildPackages) rsync; 119 + }; 99 120 100 - libutil = self.callPackage ./pkgs/libutil.nix { 101 - inherit (self) libc sys; 102 - }; 121 + sys-headers = self.callPackage ./pkgs/sys/headers.nix { 122 + inherit (buildPackages.netbsd) 123 + makeMinimal 124 + install 125 + tsort 126 + lorder 127 + statHook 128 + uudecode 129 + config 130 + genassym 131 + ; 132 + inherit (buildPackages.buildPackages) rsync; 133 + }; 103 134 104 - libpthread-headers = self.callPackage ./pkgs/libpthread/headers.nix { }; 135 + libutil = self.callPackage ./pkgs/libutil.nix { inherit (self) libc sys; }; 105 136 106 - csu = self.callPackage ./pkgs/csu.nix { 107 - inherit (self) headers sys ld_elf_so; 108 - inherit (buildPackages.netbsd) 109 - netbsdSetupHook 110 - makeMinimal 111 - install 112 - genassym gencat lorder tsort statHook; 113 - inherit (buildPackages.buildPackages) rsync; 114 - }; 137 + libpthread-headers = self.callPackage ./pkgs/libpthread/headers.nix { }; 115 138 116 - _mainLibcExtraPaths = with self; [ 117 - common i18n_module.src sys.src 118 - ld_elf_so.src libpthread.src libm.src libresolv.src 119 - librpcsvc.src libutil.src librt.src libcrypt.src 120 - ]; 139 + csu = self.callPackage ./pkgs/csu.nix { 140 + inherit (self) headers sys ld_elf_so; 141 + inherit (buildPackages.netbsd) 142 + netbsdSetupHook 143 + makeMinimal 144 + install 145 + genassym 146 + gencat 147 + lorder 148 + tsort 149 + statHook 150 + ; 151 + inherit (buildPackages.buildPackages) rsync; 152 + }; 121 153 122 - libc = self.callPackage ./pkgs/libc.nix { 123 - inherit (self) headers csu librt; 124 - inherit (buildPackages.netbsd) 125 - netbsdSetupHook 126 - makeMinimal 127 - install 128 - genassym gencat lorder tsort statHook rpcgen; 129 - inherit (buildPackages.buildPackages) rsync; 130 - }; 154 + _mainLibcExtraPaths = with self; [ 155 + common 156 + i18n_module.src 157 + sys.src 158 + ld_elf_so.src 159 + libpthread.src 160 + libm.src 161 + libresolv.src 162 + librpcsvc.src 163 + libutil.src 164 + librt.src 165 + libcrypt.src 166 + ]; 131 167 132 - mtree = self.callPackage ./pkgs/mtree.nix { 133 - inherit (self) mknod; 134 - }; 168 + libc = self.callPackage ./pkgs/libc.nix { 169 + inherit (self) headers csu librt; 170 + inherit (buildPackages.netbsd) 171 + netbsdSetupHook 172 + makeMinimal 173 + install 174 + genassym 175 + gencat 176 + lorder 177 + tsort 178 + statHook 179 + rpcgen 180 + ; 181 + inherit (buildPackages.buildPackages) rsync; 182 + }; 135 183 136 - })); 184 + mtree = self.callPackage ./pkgs/mtree.nix { inherit (self) mknod; }; 185 + } 186 + ); 137 187 }
+99 -73
pkgs/os-specific/bsd/netbsd/pkgs/compat/package.nix
··· 1 - { lib, mkDerivation, stdenv 2 - , zlib 3 - , defaultMakeFlags 4 - , coreutils 5 - , cctools-port 6 - , include, libc, libutil 7 - , install 8 - , bsdSetupHook, netbsdSetupHook 9 - , makeMinimal 10 - , rsync 11 - , fetchNetBSD 12 - , _mainLibcExtraPaths 1 + { 2 + lib, 3 + mkDerivation, 4 + stdenv, 5 + zlib, 6 + defaultMakeFlags, 7 + coreutils, 8 + cctools-port, 9 + include, 10 + libc, 11 + libutil, 12 + install, 13 + bsdSetupHook, 14 + netbsdSetupHook, 15 + makeMinimal, 16 + rsync, 17 + fetchNetBSD, 18 + _mainLibcExtraPaths, 13 19 }: 14 20 15 - mkDerivation (let 21 + mkDerivation ( 22 + let 16 23 version = "9.2"; 17 24 commonDeps = [ zlib ]; 18 - in { 25 + in 26 + { 19 27 path = "tools/compat"; 20 28 sha256 = "1vsxg7136nlhc72vpa664vs22874xh7ila95nkmsd8crn3z3cyn0"; 21 29 inherit version; ··· 29 37 make include/.stamp configure nbtool_config.h.in defs.mk.in 30 38 ''; 31 39 32 - configurePlatforms = [ "build" "host" ]; 33 - configureFlags = [ 34 - "--cache-file=config.cache" 35 - ] ++ lib.optionals stdenv.hostPlatform.isMusl [ 36 - # We include this header in our musl package only for legacy 37 - # compatibility, and compat works fine without it (and having it 38 - # know about sys/cdefs.h breaks packages like glib when built 39 - # statically). 40 - "ac_cv_header_sys_cdefs_h=no" 40 + configurePlatforms = [ 41 + "build" 42 + "host" 41 43 ]; 44 + configureFlags = 45 + [ "--cache-file=config.cache" ] 46 + ++ lib.optionals stdenv.hostPlatform.isMusl [ 47 + # We include this header in our musl package only for legacy 48 + # compatibility, and compat works fine without it (and having it 49 + # know about sys/cdefs.h breaks packages like glib when built 50 + # statically). 51 + "ac_cv_header_sys_cdefs_h=no" 52 + ]; 42 53 43 54 nativeBuildInputs = commonDeps ++ [ 44 - bsdSetupHook netbsdSetupHook 55 + bsdSetupHook 56 + netbsdSetupHook 45 57 makeMinimal 46 58 rsync 47 59 ]; ··· 50 62 51 63 # temporarily use gnuinstall for bootstrapping 52 64 # bsdinstall will be built later 53 - makeFlags = defaultMakeFlags ++ [ 54 - "INSTALL=${coreutils}/bin/install" 55 - "DATADIR=$(out)/share" 56 - # Can't sort object files yet 57 - "LORDER=echo" 58 - "TSORT=cat" 59 - # Can't process man pages yet 60 - "MKSHARE=no" 61 - ] ++ lib.optionals stdenv.hostPlatform.isDarwin [ 62 - # GNU objcopy produces broken .a libs which won't link into dependers. 63 - # Makefiles only invoke `$OBJCOPY -x/-X`, so cctools strip works here. 64 - "OBJCOPY=${cctools-port}/bin/strip" 65 - ]; 65 + makeFlags = 66 + defaultMakeFlags 67 + ++ [ 68 + "INSTALL=${coreutils}/bin/install" 69 + "DATADIR=$(out)/share" 70 + # Can't sort object files yet 71 + "LORDER=echo" 72 + "TSORT=cat" 73 + # Can't process man pages yet 74 + "MKSHARE=no" 75 + ] 76 + ++ lib.optionals stdenv.hostPlatform.isDarwin [ 77 + # GNU objcopy produces broken .a libs which won't link into dependers. 78 + # Makefiles only invoke `$OBJCOPY -x/-X`, so cctools strip works here. 79 + "OBJCOPY=${cctools-port}/bin/strip" 80 + ]; 66 81 RENAME = "-D"; 67 82 68 - passthru.tests = { netbsd-install = install; }; 83 + passthru.tests = { 84 + netbsd-install = install; 85 + }; 69 86 70 87 patches = [ 71 88 ./compat-cxx-safe-header.patch ··· 79 96 makeFlagsArray+=('INSTALL_SYMLINK=''${INSTALL} ''${SYMLINK} ''${RENAME}') 80 97 ''; 81 98 82 - postInstall = '' 83 - # why aren't these installed by netbsd? 84 - install -D compat_defs.h $out/include/compat_defs.h 85 - install -D $BSDSRCDIR/include/cdbw.h $out/include/cdbw.h 86 - install -D $BSDSRCDIR/sys/sys/cdbr.h $out/include/cdbr.h 87 - install -D $BSDSRCDIR/sys/sys/featuretest.h \ 88 - $out/include/sys/featuretest.h 89 - install -D $BSDSRCDIR/sys/sys/md5.h $out/include/md5.h 90 - install -D $BSDSRCDIR/sys/sys/rmd160.h $out/include/rmd160.h 91 - install -D $BSDSRCDIR/sys/sys/sha1.h $out/include/sha1.h 92 - install -D $BSDSRCDIR/sys/sys/sha2.h $out/include/sha2.h 93 - install -D $BSDSRCDIR/sys/sys/queue.h $out/include/sys/queue.h 94 - install -D $BSDSRCDIR/include/vis.h $out/include/vis.h 95 - install -D $BSDSRCDIR/include/db.h $out/include/db.h 96 - install -D $BSDSRCDIR/include/netconfig.h $out/include/netconfig.h 97 - install -D $BSDSRCDIR/include/utmpx.h $out/include/utmpx.h 98 - install -D $BSDSRCDIR/include/tzfile.h $out/include/tzfile.h 99 - install -D $BSDSRCDIR/sys/sys/tree.h $out/include/sys/tree.h 100 - install -D $BSDSRCDIR/include/nl_types.h $out/include/nl_types.h 101 - install -D $BSDSRCDIR/include/stringlist.h $out/include/stringlist.h 99 + postInstall = 100 + '' 101 + # why aren't these installed by netbsd? 102 + install -D compat_defs.h $out/include/compat_defs.h 103 + install -D $BSDSRCDIR/include/cdbw.h $out/include/cdbw.h 104 + install -D $BSDSRCDIR/sys/sys/cdbr.h $out/include/cdbr.h 105 + install -D $BSDSRCDIR/sys/sys/featuretest.h \ 106 + $out/include/sys/featuretest.h 107 + install -D $BSDSRCDIR/sys/sys/md5.h $out/include/md5.h 108 + install -D $BSDSRCDIR/sys/sys/rmd160.h $out/include/rmd160.h 109 + install -D $BSDSRCDIR/sys/sys/sha1.h $out/include/sha1.h 110 + install -D $BSDSRCDIR/sys/sys/sha2.h $out/include/sha2.h 111 + install -D $BSDSRCDIR/sys/sys/queue.h $out/include/sys/queue.h 112 + install -D $BSDSRCDIR/include/vis.h $out/include/vis.h 113 + install -D $BSDSRCDIR/include/db.h $out/include/db.h 114 + install -D $BSDSRCDIR/include/netconfig.h $out/include/netconfig.h 115 + install -D $BSDSRCDIR/include/utmpx.h $out/include/utmpx.h 116 + install -D $BSDSRCDIR/include/tzfile.h $out/include/tzfile.h 117 + install -D $BSDSRCDIR/sys/sys/tree.h $out/include/sys/tree.h 118 + install -D $BSDSRCDIR/include/nl_types.h $out/include/nl_types.h 119 + install -D $BSDSRCDIR/include/stringlist.h $out/include/stringlist.h 102 120 103 - # Collapse includes slightly to fix dangling reference 104 - install -D $BSDSRCDIR/common/include/rpc/types.h $out/include/rpc/types.h 105 - sed -i '1s;^;#include "nbtool_config.h"\n;' $out/include/rpc/types.h 106 - '' + lib.optionalString stdenv.isDarwin '' 107 - mkdir -p $out/include/ssp 108 - touch $out/include/ssp/ssp.h 109 - '' + '' 110 - mkdir -p $out/lib/pkgconfig 111 - substitute ${./libbsd-overlay.pc} $out/lib/pkgconfig/libbsd-overlay.pc \ 112 - --subst-var-by out $out \ 113 - --subst-var-by version ${version} 114 - ''; 115 - extraPaths = [ include.src libc.src libutil.src 121 + # Collapse includes slightly to fix dangling reference 122 + install -D $BSDSRCDIR/common/include/rpc/types.h $out/include/rpc/types.h 123 + sed -i '1s;^;#include "nbtool_config.h"\n;' $out/include/rpc/types.h 124 + '' 125 + + lib.optionalString stdenv.isDarwin '' 126 + mkdir -p $out/include/ssp 127 + touch $out/include/ssp/ssp.h 128 + '' 129 + + '' 130 + mkdir -p $out/lib/pkgconfig 131 + substitute ${./libbsd-overlay.pc} $out/lib/pkgconfig/libbsd-overlay.pc \ 132 + --subst-var-by out $out \ 133 + --subst-var-by version ${version} 134 + ''; 135 + extraPaths = [ 136 + include.src 137 + libc.src 138 + libutil.src 116 139 (fetchNetBSD "external/bsd/flex" "9.2" "0h98jpfj7vx5zh7vd7bk6b1hmzgkcb757a8j6d9zgygxxv13v43m") 117 140 (fetchNetBSD "sys/sys" "9.2" "0zawhw51klaigqqwkx0lzrx3mim2jywrc24cm7c66qsf1im9awgd") 118 - (fetchNetBSD "common/include/rpc/types.h" "9.2" "0n2df12mlc3cbc48jxq35yzl1y7ghgpykvy7jnfh898rdhac7m9a") 141 + (fetchNetBSD "common/include/rpc/types.h" "9.2" 142 + "0n2df12mlc3cbc48jxq35yzl1y7ghgpykvy7jnfh898rdhac7m9a" 143 + ) 119 144 ] ++ libutil.extraPaths ++ _mainLibcExtraPaths; 120 - }) 145 + } 146 + )
+20 -7
pkgs/os-specific/bsd/netbsd/pkgs/config.nix
··· 1 - { mkDerivation 2 - , bsdSetupHook, netbsdSetupHook 3 - , makeMinimal, install, mandoc, byacc, flex, rsync 4 - , compatIfNeeded 5 - , cksum 1 + { 2 + mkDerivation, 3 + bsdSetupHook, 4 + netbsdSetupHook, 5 + makeMinimal, 6 + install, 7 + mandoc, 8 + byacc, 9 + flex, 10 + rsync, 11 + compatIfNeeded, 12 + cksum, 6 13 }: 7 14 mkDerivation { 8 15 path = "usr.bin/config"; ··· 10 17 sha256 = "1yz3n4hncdkk6kp595fh2q5lg150vpqg8iw2dccydkyw4y3hgsjj"; 11 18 env.NIX_CFLAGS_COMPILE = toString [ "-DMAKE_BOOTSTRAP" ]; 12 19 nativeBuildInputs = [ 13 - bsdSetupHook netbsdSetupHook 14 - makeMinimal install mandoc byacc flex rsync 20 + bsdSetupHook 21 + netbsdSetupHook 22 + makeMinimal 23 + install 24 + mandoc 25 + byacc 26 + flex 27 + rsync 15 28 ]; 16 29 buildInputs = compatIfNeeded; 17 30 extraPaths = [ cksum.src ];
+37 -12
pkgs/os-specific/bsd/netbsd/pkgs/csu.nix
··· 1 - { lib, mkDerivation 2 - , bsdSetupHook, netbsdSetupHook 3 - , makeMinimal 4 - , install, mandoc, groff, flex 5 - , byacc, genassym, gencat, lorder, tsort, statHook, rsync 6 - , headers 7 - , sys 8 - , ld_elf_so 1 + { 2 + lib, 3 + mkDerivation, 4 + bsdSetupHook, 5 + netbsdSetupHook, 6 + makeMinimal, 7 + install, 8 + mandoc, 9 + groff, 10 + flex, 11 + byacc, 12 + genassym, 13 + gencat, 14 + lorder, 15 + tsort, 16 + statHook, 17 + rsync, 18 + headers, 19 + sys, 20 + ld_elf_so, 9 21 }: 10 22 11 23 mkDerivation { ··· 14 26 sha256 = "0al5jfazvhlzn9hvmnrbchx4d0gm282hq5gp4xs2zmj9ycmf6d03"; 15 27 meta.platforms = lib.platforms.netbsd; 16 28 nativeBuildInputs = [ 17 - bsdSetupHook netbsdSetupHook 29 + bsdSetupHook 30 + netbsdSetupHook 18 31 makeMinimal 19 - install mandoc groff flex 20 - byacc genassym gencat lorder tsort statHook rsync 32 + install 33 + mandoc 34 + groff 35 + flex 36 + byacc 37 + genassym 38 + gencat 39 + lorder 40 + tsort 41 + statHook 42 + rsync 21 43 ]; 22 44 buildInputs = [ headers ]; 23 - extraPaths = [ sys.src ld_elf_so.src ]; 45 + extraPaths = [ 46 + sys.src 47 + ld_elf_so.src 48 + ]; 24 49 }
+13 -6
pkgs/os-specific/bsd/netbsd/pkgs/fts/package.nix
··· 1 - { mkDerivation 2 - , bsdSetupHook, netbsdSetupHook, rsync 3 - , compatIfNeeded 4 - , fetchNetBSD 1 + { 2 + mkDerivation, 3 + bsdSetupHook, 4 + netbsdSetupHook, 5 + rsync, 6 + compatIfNeeded, 7 + fetchNetBSD, 5 8 }: 6 9 7 10 mkDerivation { ··· 10 13 sha256 = "01d4fpxvz1pgzfk5xznz5dcm0x0gdzwcsfm1h3d0xc9kc6hj2q77"; 11 14 version = "9.2"; 12 15 nativeBuildInputs = [ 13 - bsdSetupHook netbsdSetupHook rsync 16 + bsdSetupHook 17 + netbsdSetupHook 18 + rsync 14 19 ]; 15 20 propagatedBuildInputs = compatIfNeeded; 16 21 extraPaths = [ 17 22 (fetchNetBSD "lib/libc/gen/fts.c" "9.2" "1a8hmf26242nmv05ipn3ircxb0jqmmi66rh78kkyi9vjwkfl3qn7") 18 - (fetchNetBSD "lib/libc/include/namespace.h" "9.2" "0kksr3pdwdc1cplqf5z12ih4cml6l11lqrz91f7hjjm64y7785kc") 23 + (fetchNetBSD "lib/libc/include/namespace.h" "9.2" 24 + "0kksr3pdwdc1cplqf5z12ih4cml6l11lqrz91f7hjjm64y7785kc" 25 + ) 19 26 (fetchNetBSD "lib/libc/gen/fts.3" "9.2" "1asxw0n3fhjdadwkkq3xplfgqgl3q32w1lyrvbakfa3gs0wz5zc1") 20 27 ]; 21 28 skipIncludesPhase = true;
+7 -1
pkgs/os-specific/bsd/netbsd/pkgs/headers.nix
··· 1 - { lib, symlinkJoin, include, sys-headers, libpthread-headers }: 1 + { 2 + lib, 3 + symlinkJoin, 4 + include, 5 + sys-headers, 6 + libpthread-headers, 7 + }: 2 8 3 9 symlinkJoin { 4 10 name = "netbsd-headers-9.2";
+5 -1
pkgs/os-specific/bsd/netbsd/pkgs/i18n_module.nix
··· 1 - { lib, mkDerivation, libc }: 1 + { 2 + lib, 3 + mkDerivation, 4 + libc, 5 + }: 2 6 3 7 mkDerivation { 4 8 path = "lib/i18n_module";
+23 -9
pkgs/os-specific/bsd/netbsd/pkgs/include.nix
··· 1 - { lib, mkDerivation 2 - , bsdSetupHook, netbsdSetupHook 3 - , makeMinimal 4 - , install, mandoc, groff, rsync, nbperf, rpcgen 5 - , common 6 - , defaultMakeFlags 7 - , stdenv 1 + { 2 + lib, 3 + mkDerivation, 4 + bsdSetupHook, 5 + netbsdSetupHook, 6 + makeMinimal, 7 + install, 8 + mandoc, 9 + groff, 10 + rsync, 11 + nbperf, 12 + rpcgen, 13 + common, 14 + defaultMakeFlags, 15 + stdenv, 8 16 }: 9 17 10 18 mkDerivation { ··· 12 20 version = "9.2"; 13 21 sha256 = "0nxnmj4c8s3hb9n3fpcmd0zl3l1nmhivqgi9a35sis943qvpgl9h"; 14 22 nativeBuildInputs = [ 15 - bsdSetupHook netbsdSetupHook 23 + bsdSetupHook 24 + netbsdSetupHook 16 25 makeMinimal 17 - install mandoc groff rsync nbperf rpcgen 26 + install 27 + mandoc 28 + groff 29 + rsync 30 + nbperf 31 + rpcgen 18 32 ]; 19 33 20 34 # The makefiles define INCSDIR per subdirectory, so we have to set
+47 -34
pkgs/os-specific/bsd/netbsd/pkgs/install/package.nix
··· 1 - { mkDerivation 2 - , writeShellScript 3 - , mtree, make 4 - , bsdSetupHook, netbsdSetupHook 5 - , makeMinimal 6 - , mandoc, groff, rsync 7 - , compatIfNeeded, fts 1 + { 2 + mkDerivation, 3 + writeShellScript, 4 + mtree, 5 + make, 6 + bsdSetupHook, 7 + netbsdSetupHook, 8 + makeMinimal, 9 + mandoc, 10 + groff, 11 + rsync, 12 + compatIfNeeded, 13 + fts, 8 14 9 15 }: 10 16 ··· 18 24 @out@/bin/xinstall "$@" 19 25 ''; 20 26 in 21 - mkDerivation { 22 - path = "usr.bin/xinstall"; 23 - version = "9.2"; 24 - sha256 = "1f6pbz3qv1qcrchdxif8p5lbmnwl8b9nq615hsd3cyl4avd5bfqj"; 25 - extraPaths = [ mtree.src make.src ]; 26 - nativeBuildInputs = [ 27 - bsdSetupHook netbsdSetupHook 28 - makeMinimal 29 - mandoc groff rsync 30 - ]; 31 - skipIncludesPhase = true; 32 - buildInputs = compatIfNeeded 33 - # fts header is needed. glibc already has this header, but musl doesn't, 34 - # so make sure pkgsMusl.netbsd.install still builds in case you want to 35 - # remove it! 36 - ++ [ fts ]; 37 - installPhase = '' 38 - runHook preInstall 27 + mkDerivation { 28 + path = "usr.bin/xinstall"; 29 + version = "9.2"; 30 + sha256 = "1f6pbz3qv1qcrchdxif8p5lbmnwl8b9nq615hsd3cyl4avd5bfqj"; 31 + extraPaths = [ 32 + mtree.src 33 + make.src 34 + ]; 35 + nativeBuildInputs = [ 36 + bsdSetupHook 37 + netbsdSetupHook 38 + makeMinimal 39 + mandoc 40 + groff 41 + rsync 42 + ]; 43 + skipIncludesPhase = true; 44 + buildInputs = 45 + compatIfNeeded 46 + # fts header is needed. glibc already has this header, but musl doesn't, 47 + # so make sure pkgsMusl.netbsd.install still builds in case you want to 48 + # remove it! 49 + ++ [ fts ]; 50 + installPhase = '' 51 + runHook preInstall 39 52 40 - install -D install.1 $out/share/man/man1/install.1 41 - install -D xinstall $out/bin/xinstall 42 - install -D -m 0550 ${binstall} $out/bin/binstall 43 - substituteInPlace $out/bin/binstall --subst-var out 44 - ln -s $out/bin/binstall $out/bin/install 53 + install -D install.1 $out/share/man/man1/install.1 54 + install -D xinstall $out/bin/xinstall 55 + install -D -m 0550 ${binstall} $out/bin/binstall 56 + substituteInPlace $out/bin/binstall --subst-var out 57 + ln -s $out/bin/binstall $out/bin/install 45 58 46 - runHook postInstall 47 - ''; 48 - setupHook = ./install-setup-hook.sh; 49 - } 59 + runHook postInstall 60 + ''; 61 + setupHook = ./install-setup-hook.sh; 62 + }
+10 -6
pkgs/os-specific/bsd/netbsd/pkgs/ld_elf_so.nix
··· 1 - { lib 2 - , mkDerivation 3 - , libc 4 - , defaultMakeFlags 1 + { 2 + lib, 3 + mkDerivation, 4 + libc, 5 + defaultMakeFlags, 5 6 }: 6 7 7 8 mkDerivation { 8 - path = "libexec/ld.elf_so"; 9 + path = "libexec/ld.elf_so"; 9 10 version = "9.2"; 10 11 sha256 = "0ia9mqzdljly0vqfwflm5mzz55k7qsr4rw2bzhivky6k30vgirqa"; 11 12 meta.platforms = lib.platforms.netbsd; ··· 13 14 # Hack to prevent a symlink being installed here for compatibility. 14 15 SHLINKINSTALLDIR = "/usr/libexec"; 15 16 USE_FORT = "yes"; 16 - makeFlags = defaultMakeFlags ++ [ "BINDIR=$(out)/libexec" "CLIBOBJ=${libc}/lib" ]; 17 + makeFlags = defaultMakeFlags ++ [ 18 + "BINDIR=$(out)/libexec" 19 + "CLIBOBJ=${libc}/lib" 20 + ]; 17 21 extraPaths = [ libc.src ] ++ libc.extraPaths; 18 22 }
+43 -16
pkgs/os-specific/bsd/netbsd/pkgs/libc.nix
··· 1 - { lib 2 - , mkDerivation 3 - , defaultMakeFlags 4 - , _mainLibcExtraPaths 5 - , fetchNetBSD 6 - , bsdSetupHook, netbsdSetupHook 7 - , makeMinimal 8 - , install, mandoc, groff, flex 9 - , byacc, genassym, gencat, lorder, tsort, statHook, rsync, rpcgen 10 - , csu, headers 11 - , librt 1 + { 2 + lib, 3 + mkDerivation, 4 + defaultMakeFlags, 5 + _mainLibcExtraPaths, 6 + fetchNetBSD, 7 + bsdSetupHook, 8 + netbsdSetupHook, 9 + makeMinimal, 10 + install, 11 + mandoc, 12 + groff, 13 + flex, 14 + byacc, 15 + genassym, 16 + gencat, 17 + lorder, 18 + tsort, 19 + statHook, 20 + rsync, 21 + rpcgen, 22 + csu, 23 + headers, 24 + librt, 12 25 }: 13 26 14 27 mkDerivation { ··· 21 34 (fetchNetBSD "external/bsd/jemalloc" "9.2" "0cq704swa0h2yxv4gc79z2lwxibk9k7pxh3q5qfs7axx3jx3n8kb") 22 35 ]; 23 36 nativeBuildInputs = [ 24 - bsdSetupHook netbsdSetupHook 37 + bsdSetupHook 38 + netbsdSetupHook 25 39 makeMinimal 26 - install mandoc groff flex 27 - byacc genassym gencat lorder tsort statHook rsync rpcgen 40 + install 41 + mandoc 42 + groff 43 + flex 44 + byacc 45 + genassym 46 + gencat 47 + lorder 48 + tsort 49 + statHook 50 + rsync 51 + rpcgen 28 52 ]; 29 - buildInputs = [ headers csu ]; 53 + buildInputs = [ 54 + headers 55 + csu 56 + ]; 30 57 env.NIX_CFLAGS_COMPILE = "-B${csu}/lib -fcommon"; 31 58 meta.platforms = lib.platforms.netbsd; 32 59 SHLIBINSTALLDIR = "$(out)/lib"; 33 60 MKPICINSTALL = "yes"; 34 61 NLSDIR = "$(out)/share/nls"; 35 - makeFlags = defaultMakeFlags ++ [ "FILESDIR=$(out)/var/db"]; 62 + makeFlags = defaultMakeFlags ++ [ "FILESDIR=$(out)/var/db" ]; 36 63 postInstall = '' 37 64 pushd ${headers} 38 65 find . -type d -exec mkdir -p $out/\{} \;
+15 -9
pkgs/os-specific/bsd/netbsd/pkgs/libcurses.nix
··· 1 - { lib, mkDerivation, stdenv 2 - , libterminfo 3 - , compatIfNeeded 4 - , defaultMakeFlags 1 + { 2 + lib, 3 + mkDerivation, 4 + stdenv, 5 + libterminfo, 6 + compatIfNeeded, 7 + defaultMakeFlags, 5 8 }: 6 9 7 10 mkDerivation { ··· 9 12 version = "9.2"; 10 13 sha256 = "0pd0dggl3w4bv5i5h0s1wrc8hr66n4hkv3zlklarwfdhc692fqal"; 11 14 buildInputs = [ libterminfo ]; 12 - env.NIX_CFLAGS_COMPILE = toString ([ 13 - "-D__scanflike(a,b)=" 14 - "-D__va_list=va_list" 15 - "-D__warn_references(a,b)=" 16 - ] ++ lib.optional stdenv.isDarwin "-D__strong_alias(a,b)="); 15 + env.NIX_CFLAGS_COMPILE = toString ( 16 + [ 17 + "-D__scanflike(a,b)=" 18 + "-D__va_list=va_list" 19 + "-D__warn_references(a,b)=" 20 + ] 21 + ++ lib.optional stdenv.isDarwin "-D__strong_alias(a,b)=" 22 + ); 17 23 propagatedBuildInputs = compatIfNeeded; 18 24 MKDOC = "no"; # missing vfontedpr 19 25 makeFlags = defaultMakeFlags ++ [ "LIBDO.terminfo=${libterminfo}/lib" ];
+29 -23
pkgs/os-specific/bsd/netbsd/pkgs/libedit.nix
··· 1 - { lib, mkDerivation 2 - , libterminfo, libcurses 3 - , compatIfNeeded 4 - , defaultMakeFlags 1 + { 2 + lib, 3 + mkDerivation, 4 + libterminfo, 5 + libcurses, 6 + compatIfNeeded, 7 + defaultMakeFlags, 5 8 }: 6 9 7 10 mkDerivation { 8 - path = "lib/libedit"; 9 - version = "9.2"; 10 - sha256 = "1wqhngraxwqk4jgrf5f18jy195yrp7c06n1gf31pbplq79mg1bcj"; 11 - buildInputs = [ libterminfo libcurses ]; 12 - propagatedBuildInputs = compatIfNeeded; 13 - SHLIBINSTALLDIR = "$(out)/lib"; 14 - makeFlags = defaultMakeFlags ++ [ "LIBDO.terminfo=${libterminfo}/lib" ]; 15 - postPatch = '' 16 - sed -i '1i #undef bool_t' $COMPONENT_PATH/el.h 17 - substituteInPlace $COMPONENT_PATH/config.h \ 18 - --replace "#define HAVE_STRUCT_DIRENT_D_NAMLEN 1" "" 19 - substituteInPlace $COMPONENT_PATH/readline/Makefile --replace /usr/include "$out/include" 20 - ''; 21 - env.NIX_CFLAGS_COMPILE = toString [ 22 - "-D__noinline=" 23 - "-D__scanflike(a,b)=" 24 - "-D__va_list=va_list" 25 - ]; 26 - } 11 + path = "lib/libedit"; 12 + version = "9.2"; 13 + sha256 = "1wqhngraxwqk4jgrf5f18jy195yrp7c06n1gf31pbplq79mg1bcj"; 14 + buildInputs = [ 15 + libterminfo 16 + libcurses 17 + ]; 18 + propagatedBuildInputs = compatIfNeeded; 19 + SHLIBINSTALLDIR = "$(out)/lib"; 20 + makeFlags = defaultMakeFlags ++ [ "LIBDO.terminfo=${libterminfo}/lib" ]; 21 + postPatch = '' 22 + sed -i '1i #undef bool_t' $COMPONENT_PATH/el.h 23 + substituteInPlace $COMPONENT_PATH/config.h \ 24 + --replace "#define HAVE_STRUCT_DIRENT_D_NAMLEN 1" "" 25 + substituteInPlace $COMPONENT_PATH/readline/Makefile --replace /usr/include "$out/include" 26 + ''; 27 + env.NIX_CFLAGS_COMPILE = toString [ 28 + "-D__noinline=" 29 + "-D__scanflike(a,b)=" 30 + "-D__va_list=va_list" 31 + ]; 32 + }
+5 -1
pkgs/os-specific/bsd/netbsd/pkgs/libm.nix
··· 1 - { lib, mkDerivation, sys }: 1 + { 2 + lib, 3 + mkDerivation, 4 + sys, 5 + }: 2 6 3 7 mkDerivation { 4 8 path = "lib/libm";
+5 -1
pkgs/os-specific/bsd/netbsd/pkgs/libpci.nix
··· 1 - { lib, mkDerivation, sys }: 1 + { 2 + lib, 3 + mkDerivation, 4 + sys, 5 + }: 2 6 3 7 mkDerivation { 4 8 pname = "libpci";
-1
pkgs/os-specific/bsd/netbsd/pkgs/libpthread/base.nix
··· 3 3 version = "9.2"; 4 4 sha256 = "0mlmc31k509dwfmx5s2x010wxjc44mr6y0cbmk30cfipqh8c962h"; 5 5 } 6 -
+10 -7
pkgs/os-specific/bsd/netbsd/pkgs/libpthread/headers.nix
··· 1 1 { lib, mkDerivation }: 2 2 3 - mkDerivation (import ./base.nix // { 4 - pname = "libpthread-headers"; 5 - installPhase = "includesPhase"; 6 - dontBuild = true; 7 - noCC = true; 8 - meta.platforms = lib.platforms.netbsd; 9 - }) 3 + mkDerivation ( 4 + import ./base.nix 5 + // { 6 + pname = "libpthread-headers"; 7 + installPhase = "includesPhase"; 8 + dontBuild = true; 9 + noCC = true; 10 + meta.platforms = lib.platforms.netbsd; 11 + } 12 + )
+26 -13
pkgs/os-specific/bsd/netbsd/pkgs/libpthread/package.nix
··· 1 - { lib, mkDerivation 2 - , headers 3 - , common, libc, librt, sys 1 + { 2 + lib, 3 + mkDerivation, 4 + headers, 5 + common, 6 + libc, 7 + librt, 8 + sys, 4 9 }: 5 10 6 - mkDerivation (import ./base.nix // { 7 - pname = "libpthread"; 8 - installPhase = null; 9 - noCC = false; 10 - dontBuild = false; 11 - buildInputs = [ headers ]; 12 - SHLIBINSTALLDIR = "$(out)/lib"; 13 - extraPaths = [ common libc.src librt.src sys.src ]; 14 - meta.platforms = lib.platforms.netbsd; 15 - }) 11 + mkDerivation ( 12 + import ./base.nix 13 + // { 14 + pname = "libpthread"; 15 + installPhase = null; 16 + noCC = false; 17 + dontBuild = false; 18 + buildInputs = [ headers ]; 19 + SHLIBINSTALLDIR = "$(out)/lib"; 20 + extraPaths = [ 21 + common 22 + libc.src 23 + librt.src 24 + sys.src 25 + ]; 26 + meta.platforms = lib.platforms.netbsd; 27 + } 28 + )
+5 -1
pkgs/os-specific/bsd/netbsd/pkgs/libresolv.nix
··· 1 - { lib, mkDerivation, libc }: 1 + { 2 + lib, 3 + mkDerivation, 4 + libc, 5 + }: 2 6 3 7 mkDerivation { 4 8 path = "lib/libresolv";
+19 -9
pkgs/os-specific/bsd/netbsd/pkgs/librpcsvc.nix
··· 1 - { lib 2 - , mkDerivation 3 - , defaultMakeFlags 4 - , bsdSetupHook, netbsdSetupHook 5 - , makeMinimal 6 - , install, tsort, lorder, rpcgen, statHook 1 + { 2 + lib, 3 + mkDerivation, 4 + defaultMakeFlags, 5 + bsdSetupHook, 6 + netbsdSetupHook, 7 + makeMinimal, 8 + install, 9 + tsort, 10 + lorder, 11 + rpcgen, 12 + statHook, 7 13 }: 8 14 9 15 mkDerivation { ··· 13 19 makeFlags = defaultMakeFlags ++ [ "INCSDIR=$(out)/include/rpcsvc" ]; 14 20 meta.platforms = lib.platforms.netbsd; 15 21 nativeBuildInputs = [ 16 - bsdSetupHook netbsdSetupHook 22 + bsdSetupHook 23 + netbsdSetupHook 17 24 makeMinimal 18 - install tsort lorder rpcgen statHook 25 + install 26 + tsort 27 + lorder 28 + rpcgen 29 + statHook 19 30 ]; 20 31 } 21 -
+6 -1
pkgs/os-specific/bsd/netbsd/pkgs/librt.nix
··· 1 - { lib, mkDerivation, libc, headers }: 1 + { 2 + lib, 3 + mkDerivation, 4 + libc, 5 + headers, 6 + }: 2 7 3 8 mkDerivation { 4 9 path = "lib/librt";
+26 -7
pkgs/os-specific/bsd/netbsd/pkgs/libterminfo.nix
··· 1 - { mkDerivation 2 - , bsdSetupHook, netbsdSetupHook 3 - , makeMinimal, install, tsort, lorder, mandoc, statHook, nbperf, tic, rsync 4 - , compatIfNeeded 5 - , fetchNetBSD 1 + { 2 + mkDerivation, 3 + bsdSetupHook, 4 + netbsdSetupHook, 5 + makeMinimal, 6 + install, 7 + tsort, 8 + lorder, 9 + mandoc, 10 + statHook, 11 + nbperf, 12 + tic, 13 + rsync, 14 + compatIfNeeded, 15 + fetchNetBSD, 6 16 }: 7 17 8 18 mkDerivation { ··· 10 20 version = "9.2"; 11 21 sha256 = "0pq05k3dj0dfsczv07frnnji92mazmy2qqngqbx2zgqc1x251414"; 12 22 nativeBuildInputs = [ 13 - bsdSetupHook netbsdSetupHook 14 - makeMinimal install tsort lorder mandoc statHook nbperf tic rsync 23 + bsdSetupHook 24 + netbsdSetupHook 25 + makeMinimal 26 + install 27 + tsort 28 + lorder 29 + mandoc 30 + statHook 31 + nbperf 32 + tic 33 + rsync 15 34 ]; 16 35 buildInputs = compatIfNeeded; 17 36 SHLIBINSTALLDIR = "$(out)/lib";
+30 -9
pkgs/os-specific/bsd/netbsd/pkgs/libutil.nix
··· 1 - { mkDerivation 2 - , common, libc, sys 3 - , bsdSetupHook, netbsdSetupHook 4 - , makeMinimal 5 - , byacc, install, tsort, lorder, mandoc, statHook, rsync 6 - , headers 1 + { 2 + mkDerivation, 3 + common, 4 + libc, 5 + sys, 6 + bsdSetupHook, 7 + netbsdSetupHook, 8 + makeMinimal, 9 + byacc, 10 + install, 11 + tsort, 12 + lorder, 13 + mandoc, 14 + statHook, 15 + rsync, 16 + headers, 7 17 }: 8 18 9 19 mkDerivation { 10 20 path = "lib/libutil"; 11 21 version = "9.2"; 12 22 sha256 = "02gm5a5zhh8qp5r5q5r7x8x6x50ir1i0ncgsnfwh1vnrz6mxbq7z"; 13 - extraPaths = [ common libc.src sys.src ]; 23 + extraPaths = [ 24 + common 25 + libc.src 26 + sys.src 27 + ]; 14 28 nativeBuildInputs = [ 15 - bsdSetupHook netbsdSetupHook 29 + bsdSetupHook 30 + netbsdSetupHook 16 31 makeMinimal 17 - byacc install tsort lorder mandoc statHook rsync 32 + byacc 33 + install 34 + tsort 35 + lorder 36 + mandoc 37 + statHook 38 + rsync 18 39 ]; 19 40 buildInputs = [ headers ]; 20 41 SHLIBINSTALLDIR = "$(out)/lib";
+15 -6
pkgs/os-specific/bsd/netbsd/pkgs/lorder.nix
··· 1 - { mkDerivation 2 - , bsdSetupHook, netbsdSetupHook 3 - , makeMinimal 4 - , install, mandoc, groff, rsync 1 + { 2 + mkDerivation, 3 + bsdSetupHook, 4 + netbsdSetupHook, 5 + makeMinimal, 6 + install, 7 + mandoc, 8 + groff, 9 + rsync, 5 10 }: 6 11 7 12 mkDerivation { ··· 9 14 version = "9.2"; 10 15 sha256 = "0rjf9blihhm0n699vr2bg88m4yjhkbxh6fxliaay3wxkgnydjwn2"; 11 16 nativeBuildInputs = [ 12 - bsdSetupHook netbsdSetupHook 17 + bsdSetupHook 18 + netbsdSetupHook 13 19 makeMinimal 14 - install mandoc groff rsync 20 + install 21 + mandoc 22 + groff 23 + rsync 15 24 ]; 16 25 }
+52 -45
pkgs/os-specific/bsd/netbsd/pkgs/make.nix
··· 1 - { lib, mkDerivation, fetchNetBSD, stdenv }: 1 + { 2 + lib, 3 + mkDerivation, 4 + fetchNetBSD, 5 + stdenv, 6 + }: 2 7 3 8 mkDerivation { 4 9 path = "usr.bin/make"; 5 10 sha256 = "0vi73yicbmbp522qzqvd979cx6zm5jakhy77xh73c1kygf8klccs"; 6 11 version = "9.2"; 7 12 8 - postPatch = '' 9 - substituteInPlace $BSDSRCDIR/share/mk/bsd.doc.mk \ 10 - --replace '-o ''${DOCOWN}' "" \ 11 - --replace '-g ''${DOCGRP}' "" 12 - for mk in $BSDSRCDIR/share/mk/bsd.inc.mk $BSDSRCDIR/share/mk/bsd.kinc.mk; do 13 - substituteInPlace $mk \ 14 - --replace '-o ''${BINOWN}' "" \ 15 - --replace '-g ''${BINGRP}' "" 16 - done 17 - substituteInPlace $BSDSRCDIR/share/mk/bsd.kmodule.mk \ 18 - --replace '-o ''${KMODULEOWN}' "" \ 19 - --replace '-g ''${KMODULEGRP}' "" 20 - substituteInPlace $BSDSRCDIR/share/mk/bsd.lib.mk \ 21 - --replace '-o ''${LIBOWN}' "" \ 22 - --replace '-g ''${LIBGRP}' "" \ 23 - --replace '-o ''${DEBUGOWN}' "" \ 24 - --replace '-g ''${DEBUGGRP}' "" 25 - substituteInPlace $BSDSRCDIR/share/mk/bsd.lua.mk \ 26 - --replace '-o ''${LIBOWN}' "" \ 27 - --replace '-g ''${LIBGRP}' "" 28 - substituteInPlace $BSDSRCDIR/share/mk/bsd.man.mk \ 29 - --replace '-o ''${MANOWN}' "" \ 30 - --replace '-g ''${MANGRP}' "" 31 - substituteInPlace $BSDSRCDIR/share/mk/bsd.nls.mk \ 32 - --replace '-o ''${NLSOWN}' "" \ 33 - --replace '-g ''${NLSGRP}' "" 34 - substituteInPlace $BSDSRCDIR/share/mk/bsd.prog.mk \ 35 - --replace '-o ''${BINOWN}' "" \ 36 - --replace '-g ''${BINGRP}' "" \ 37 - --replace '-o ''${RUMPBINOWN}' "" \ 38 - --replace '-g ''${RUMPBINGRP}' "" \ 39 - --replace '-o ''${DEBUGOWN}' "" \ 40 - --replace '-g ''${DEBUGGRP}' "" 13 + postPatch = 14 + '' 15 + substituteInPlace $BSDSRCDIR/share/mk/bsd.doc.mk \ 16 + --replace '-o ''${DOCOWN}' "" \ 17 + --replace '-g ''${DOCGRP}' "" 18 + for mk in $BSDSRCDIR/share/mk/bsd.inc.mk $BSDSRCDIR/share/mk/bsd.kinc.mk; do 19 + substituteInPlace $mk \ 20 + --replace '-o ''${BINOWN}' "" \ 21 + --replace '-g ''${BINGRP}' "" 22 + done 23 + substituteInPlace $BSDSRCDIR/share/mk/bsd.kmodule.mk \ 24 + --replace '-o ''${KMODULEOWN}' "" \ 25 + --replace '-g ''${KMODULEGRP}' "" 26 + substituteInPlace $BSDSRCDIR/share/mk/bsd.lib.mk \ 27 + --replace '-o ''${LIBOWN}' "" \ 28 + --replace '-g ''${LIBGRP}' "" \ 29 + --replace '-o ''${DEBUGOWN}' "" \ 30 + --replace '-g ''${DEBUGGRP}' "" 31 + substituteInPlace $BSDSRCDIR/share/mk/bsd.lua.mk \ 32 + --replace '-o ''${LIBOWN}' "" \ 33 + --replace '-g ''${LIBGRP}' "" 34 + substituteInPlace $BSDSRCDIR/share/mk/bsd.man.mk \ 35 + --replace '-o ''${MANOWN}' "" \ 36 + --replace '-g ''${MANGRP}' "" 37 + substituteInPlace $BSDSRCDIR/share/mk/bsd.nls.mk \ 38 + --replace '-o ''${NLSOWN}' "" \ 39 + --replace '-g ''${NLSGRP}' "" 40 + substituteInPlace $BSDSRCDIR/share/mk/bsd.prog.mk \ 41 + --replace '-o ''${BINOWN}' "" \ 42 + --replace '-g ''${BINGRP}' "" \ 43 + --replace '-o ''${RUMPBINOWN}' "" \ 44 + --replace '-g ''${RUMPBINGRP}' "" \ 45 + --replace '-o ''${DEBUGOWN}' "" \ 46 + --replace '-g ''${DEBUGGRP}' "" 41 47 42 - # make needs this to pick up our sys make files 43 - export NIX_CFLAGS_COMPILE+=" -D_PATH_DEFSYSPATH=\"$out/share/mk\"" 48 + # make needs this to pick up our sys make files 49 + export NIX_CFLAGS_COMPILE+=" -D_PATH_DEFSYSPATH=\"$out/share/mk\"" 44 50 45 - substituteInPlace $BSDSRCDIR/share/mk/bsd.lib.mk \ 46 - --replace '_INSTRANLIB=''${empty(PRESERVE):?-a "''${RANLIB} -t":}' '_INSTRANLIB=' 47 - substituteInPlace $BSDSRCDIR/share/mk/bsd.kinc.mk \ 48 - --replace /bin/rm rm 49 - '' + lib.optionalString stdenv.isDarwin '' 50 - substituteInPlace $BSDSRCDIR/share/mk/bsd.sys.mk \ 51 - --replace '-Wl,--fatal-warnings' "" \ 52 - --replace '-Wl,--warn-shared-textrel' "" 53 - ''; 51 + substituteInPlace $BSDSRCDIR/share/mk/bsd.lib.mk \ 52 + --replace '_INSTRANLIB=''${empty(PRESERVE):?-a "''${RANLIB} -t":}' '_INSTRANLIB=' 53 + substituteInPlace $BSDSRCDIR/share/mk/bsd.kinc.mk \ 54 + --replace /bin/rm rm 55 + '' 56 + + lib.optionalString stdenv.isDarwin '' 57 + substituteInPlace $BSDSRCDIR/share/mk/bsd.sys.mk \ 58 + --replace '-Wl,--fatal-warnings' "" \ 59 + --replace '-Wl,--warn-shared-textrel' "" 60 + ''; 54 61 postInstall = '' 55 62 make -C $BSDSRCDIR/share/mk FILESDIR=$out/share/mk install 56 63 '';
+10 -5
pkgs/os-specific/bsd/netbsd/pkgs/makeMinimal.nix
··· 1 - { mkDerivation 2 - , bsdSetupHook, netbsdSetupHook, rsync 3 - , make 1 + { 2 + mkDerivation, 3 + bsdSetupHook, 4 + netbsdSetupHook, 5 + rsync, 6 + make, 4 7 }: 5 8 6 9 mkDerivation { ··· 8 11 sha256 = "0fh0nrnk18m613m5blrliq2aydciv51qhc0ihsj4k63incwbk90n"; 9 12 version = "9.2"; 10 13 11 - buildInputs = []; 14 + buildInputs = [ ]; 12 15 nativeBuildInputs = [ 13 - bsdSetupHook netbsdSetupHook rsync 16 + bsdSetupHook 17 + netbsdSetupHook 18 + rsync 14 19 ]; 15 20 16 21 skipIncludesPhase = true;
+102 -71
pkgs/os-specific/bsd/netbsd/pkgs/mkDerivation.nix
··· 1 - { lib 2 - , stdenvNoCC, stdenv 3 - , fetchNetBSD 4 - , bsdSetupHook, netbsdSetupHook 5 - , makeMinimal 6 - , install, tsort, lorder 7 - , mandoc, groff, statHook, rsync 8 - , compatIfNeeded 9 - , defaultMakeFlags 1 + { 2 + lib, 3 + stdenvNoCC, 4 + stdenv, 5 + fetchNetBSD, 6 + bsdSetupHook, 7 + netbsdSetupHook, 8 + makeMinimal, 9 + install, 10 + tsort, 11 + lorder, 12 + mandoc, 13 + groff, 14 + statHook, 15 + rsync, 16 + compatIfNeeded, 17 + defaultMakeFlags, 10 18 }: 11 19 12 - lib.makeOverridable (attrs: let 13 - stdenv' = if attrs.noCC or false then stdenvNoCC else stdenv; 14 - in stdenv'.mkDerivation ({ 15 - pname = "${attrs.pname or (baseNameOf attrs.path)}-netbsd"; 16 - inherit (attrs) version; 17 - src = fetchNetBSD attrs.path attrs.version attrs.sha256; 20 + lib.makeOverridable ( 21 + attrs: 22 + let 23 + stdenv' = if attrs.noCC or false then stdenvNoCC else stdenv; 24 + in 25 + stdenv'.mkDerivation ( 26 + { 27 + pname = "${attrs.pname or (baseNameOf attrs.path)}-netbsd"; 28 + inherit (attrs) version; 29 + src = fetchNetBSD attrs.path attrs.version attrs.sha256; 18 30 19 - extraPaths = [ ]; 31 + extraPaths = [ ]; 20 32 21 - nativeBuildInputs = [ 22 - bsdSetupHook netbsdSetupHook 23 - makeMinimal 24 - install tsort lorder mandoc groff statHook rsync 25 - ]; 26 - buildInputs = compatIfNeeded; 33 + nativeBuildInputs = [ 34 + bsdSetupHook 35 + netbsdSetupHook 36 + makeMinimal 37 + install 38 + tsort 39 + lorder 40 + mandoc 41 + groff 42 + statHook 43 + rsync 44 + ]; 45 + buildInputs = compatIfNeeded; 27 46 28 - HOST_SH = stdenv'.shell; 47 + HOST_SH = stdenv'.shell; 29 48 30 - MACHINE_ARCH = { 31 - i486 = "i386"; 32 - i586 = "i386"; 33 - i686 = "i386"; 34 - }.${stdenv'.hostPlatform.parsed.cpu.name} 35 - or stdenv'.hostPlatform.parsed.cpu.name; 49 + MACHINE_ARCH = 50 + { 51 + i486 = "i386"; 52 + i586 = "i386"; 53 + i686 = "i386"; 54 + } 55 + .${stdenv'.hostPlatform.parsed.cpu.name} or stdenv'.hostPlatform.parsed.cpu.name; 36 56 37 - MACHINE = { 38 - x86_64 = "amd64"; 39 - aarch64 = "evbarm64"; 40 - i486 = "i386"; 41 - i586 = "i386"; 42 - i686 = "i386"; 43 - }.${stdenv'.hostPlatform.parsed.cpu.name} 44 - or stdenv'.hostPlatform.parsed.cpu.name; 57 + MACHINE = 58 + { 59 + x86_64 = "amd64"; 60 + aarch64 = "evbarm64"; 61 + i486 = "i386"; 62 + i586 = "i386"; 63 + i686 = "i386"; 64 + } 65 + .${stdenv'.hostPlatform.parsed.cpu.name} or stdenv'.hostPlatform.parsed.cpu.name; 45 66 46 - COMPONENT_PATH = attrs.path; 47 - 48 - makeFlags = defaultMakeFlags; 67 + COMPONENT_PATH = attrs.path; 49 68 50 - strictDeps = true; 69 + makeFlags = defaultMakeFlags; 51 70 52 - meta = with lib; { 53 - maintainers = with maintainers; [ matthewbauer qyliss ]; 54 - platforms = platforms.unix; 55 - license = licenses.bsd2; 56 - }; 71 + strictDeps = true; 57 72 58 - } // lib.optionalAttrs stdenv'.hasCC { 59 - # TODO should CC wrapper set this? 60 - CPP = "${stdenv'.cc.targetPrefix}cpp"; 61 - } // lib.optionalAttrs stdenv'.isDarwin { 62 - MKRELRO = "no"; 63 - } // lib.optionalAttrs (stdenv'.cc.isClang or false) { 64 - HAVE_LLVM = lib.versions.major (lib.getVersion stdenv'.cc.cc); 65 - } // lib.optionalAttrs (stdenv'.cc.isGNU or false) { 66 - HAVE_GCC = lib.versions.major (lib.getVersion stdenv'.cc.cc); 67 - } // lib.optionalAttrs (stdenv'.isx86_32) { 68 - USE_SSP = "no"; 69 - } // lib.optionalAttrs (attrs.headersOnly or false) { 70 - installPhase = "includesPhase"; 71 - dontBuild = true; 72 - } // attrs // { 73 - # Files that use NetBSD-specific macros need to have nbtool_config.h 74 - # included ahead of them on non-NetBSD platforms. 75 - postPatch = lib.optionalString (!stdenv'.hostPlatform.isNetBSD) '' 76 - set +e 77 - grep -Zlr "^__RCSID 78 - ^__BEGIN_DECLS" $COMPONENT_PATH | xargs -0r grep -FLZ nbtool_config.h | 79 - xargs -0tr sed -i '0,/^#/s//#include <nbtool_config.h>\n\0/' 80 - set -e 81 - '' + attrs.postPatch or ""; 82 - })) 73 + meta = with lib; { 74 + maintainers = with maintainers; [ 75 + matthewbauer 76 + qyliss 77 + ]; 78 + platforms = platforms.unix; 79 + license = licenses.bsd2; 80 + }; 81 + } 82 + // lib.optionalAttrs stdenv'.hasCC { 83 + # TODO should CC wrapper set this? 84 + CPP = "${stdenv'.cc.targetPrefix}cpp"; 85 + } 86 + // lib.optionalAttrs stdenv'.isDarwin { MKRELRO = "no"; } 87 + // lib.optionalAttrs (stdenv'.cc.isClang or false) { 88 + HAVE_LLVM = lib.versions.major (lib.getVersion stdenv'.cc.cc); 89 + } 90 + // lib.optionalAttrs (stdenv'.cc.isGNU or false) { 91 + HAVE_GCC = lib.versions.major (lib.getVersion stdenv'.cc.cc); 92 + } 93 + // lib.optionalAttrs (stdenv'.isx86_32) { USE_SSP = "no"; } 94 + // lib.optionalAttrs (attrs.headersOnly or false) { 95 + installPhase = "includesPhase"; 96 + dontBuild = true; 97 + } 98 + // attrs 99 + // { 100 + # Files that use NetBSD-specific macros need to have nbtool_config.h 101 + # included ahead of them on non-NetBSD platforms. 102 + postPatch = 103 + lib.optionalString (!stdenv'.hostPlatform.isNetBSD) '' 104 + set +e 105 + grep -Zlr "^__RCSID 106 + ^__BEGIN_DECLS" $COMPONENT_PATH | xargs -0r grep -FLZ nbtool_config.h | 107 + xargs -0tr sed -i '0,/^#/s//#include <nbtool_config.h>\n\0/' 108 + set -e 109 + '' 110 + + attrs.postPatch or ""; 111 + } 112 + ) 113 + )
-1
pkgs/os-specific/bsd/netbsd/pkgs/nbperf.nix
··· 5 5 version = "9.2"; 6 6 sha256 = "1nxc302vgmjhm3yqdivqyfzslrg0vjpbss44s74rcryrl19mma9r"; 7 7 } 8 -
+1 -3
pkgs/os-specific/bsd/netbsd/pkgs/netbsdSetupHook/package.nix
··· 1 1 { makeSetupHook }: 2 2 3 - makeSetupHook { 4 - name = "netbsd-setup-hook"; 5 - } ./setup-hook.sh 3 + makeSetupHook { name = "netbsd-setup-hook"; } ./setup-hook.sh
+10 -7
pkgs/os-specific/bsd/netbsd/pkgs/stat/hook.nix
··· 1 - { makeSetupHook, writeText, stat }: 1 + { 2 + makeSetupHook, 3 + writeText, 4 + stat, 5 + }: 2 6 3 7 # stat isn't in POSIX, and NetBSD stat supports a completely 4 8 # different range of flags than GNU stat, so including it in PATH ··· 6 10 # NetBSD's build system and NetBSD stat without including it in 7 11 # PATH. 8 12 9 - makeSetupHook { 10 - name = "netbsd-stat-hook"; 11 - } (writeText "netbsd-stat-hook-impl" '' 12 - makeFlagsArray+=(TOOL_STAT=${stat}/bin/stat) 13 - '') 14 - 13 + makeSetupHook { name = "netbsd-stat-hook"; } ( 14 + writeText "netbsd-stat-hook-impl" '' 15 + makeFlagsArray+=(TOOL_STAT=${stat}/bin/stat) 16 + '' 17 + )
+15 -6
pkgs/os-specific/bsd/netbsd/pkgs/stat/package.nix
··· 1 - { mkDerivation 2 - , bsdSetupHook, netbsdSetupHook 3 - , makeMinimal 4 - , install, mandoc, groff, rsync 1 + { 2 + mkDerivation, 3 + bsdSetupHook, 4 + netbsdSetupHook, 5 + makeMinimal, 6 + install, 7 + mandoc, 8 + groff, 9 + rsync, 5 10 }: 6 11 7 12 # Don't add this to nativeBuildInputs directly. ··· 12 17 version = "9.2"; 13 18 sha256 = "18nqwlndfc34qbbgqx5nffil37jfq9aw663ippasfxd2hlyc106x"; 14 19 nativeBuildInputs = [ 15 - bsdSetupHook netbsdSetupHook 20 + bsdSetupHook 21 + netbsdSetupHook 16 22 makeMinimal 17 - install mandoc groff rsync 23 + install 24 + mandoc 25 + groff 26 + rsync 18 27 ]; 19 28 }
+38 -17
pkgs/os-specific/bsd/netbsd/pkgs/sys/base.nix
··· 1 - { lib, mkDerivation 2 - , include 3 - , bsdSetupHook, netbsdSetupHook 4 - , makeMinimal, install, tsort, lorder, statHook, rsync, uudecode, config, genassym 5 - , defaultMakeFlags 6 - , common 1 + { 2 + lib, 3 + mkDerivation, 4 + include, 5 + bsdSetupHook, 6 + netbsdSetupHook, 7 + makeMinimal, 8 + install, 9 + tsort, 10 + lorder, 11 + statHook, 12 + rsync, 13 + uudecode, 14 + config, 15 + genassym, 16 + defaultMakeFlags, 17 + common, 7 18 }: 8 19 { 9 20 path = "sys"; ··· 29 40 '' 30 41 substituteInPlace sys/arch/i386/stand/efiboot/Makefile.efiboot \ 31 42 --replace "-nocombreloc" "-z nocombreloc" 32 - '' + 33 - # multiple header dirs, see above 34 - include.postPatch; 43 + '' 44 + + 45 + # multiple header dirs, see above 46 + include.postPatch; 35 47 36 48 CONFIG = "GENERIC"; 37 49 38 50 propagatedBuildInputs = [ include ]; 39 51 nativeBuildInputs = [ 40 - bsdSetupHook netbsdSetupHook 41 - makeMinimal install tsort lorder statHook rsync uudecode config genassym 52 + bsdSetupHook 53 + netbsdSetupHook 54 + makeMinimal 55 + install 56 + tsort 57 + lorder 58 + statHook 59 + rsync 60 + uudecode 61 + config 62 + genassym 42 63 ]; 43 64 44 - postConfigure = '' 45 - pushd arch/$MACHINE/conf 46 - config $CONFIG 47 - popd 48 - '' 65 + postConfigure = 66 + '' 67 + pushd arch/$MACHINE/conf 68 + config $CONFIG 69 + popd 70 + '' 49 71 # multiple header dirs, see above 50 72 + include.postConfigure; 51 73 ··· 68 90 69 91 meta.platforms = lib.platforms.netbsd; 70 92 extraPaths = [ common ]; 71 - 72 93 }
+39 -11
pkgs/os-specific/bsd/netbsd/pkgs/sys/headers.nix
··· 1 - { lib, mkDerivation 2 - , include 3 - , bsdSetupHook, netbsdSetupHook 4 - , makeMinimal, install, tsort, lorder, statHook, rsync, uudecode, config, genassym 5 - , defaultMakeFlags 6 - , common 1 + { 2 + lib, 3 + mkDerivation, 4 + include, 5 + bsdSetupHook, 6 + netbsdSetupHook, 7 + makeMinimal, 8 + install, 9 + tsort, 10 + lorder, 11 + statHook, 12 + rsync, 13 + uudecode, 14 + config, 15 + genassym, 16 + defaultMakeFlags, 17 + common, 7 18 }: 8 19 let 9 20 base = import ./base.nix { 10 21 inherit 11 - lib mkDerivation include bsdSetupHook netbsdSetupHook makeMinimal install 12 - tsort lorder statHook rsync uudecode config genassym defaultMakeFlags 13 - common; 22 + lib 23 + mkDerivation 24 + include 25 + bsdSetupHook 26 + netbsdSetupHook 27 + makeMinimal 28 + install 29 + tsort 30 + lorder 31 + statHook 32 + rsync 33 + uudecode 34 + config 35 + genassym 36 + defaultMakeFlags 37 + common 38 + ; 14 39 }; 15 40 in 16 - mkDerivation (base // { 41 + mkDerivation ( 42 + base 43 + // { 17 44 pname = "sys-headers"; 18 45 installPhase = "includesPhase"; 19 46 dontBuild = true; 20 47 noCC = true; 21 - }) 48 + } 49 + )
+39 -11
pkgs/os-specific/bsd/netbsd/pkgs/sys/package.nix
··· 1 - { lib, mkDerivation 2 - , include 3 - , bsdSetupHook, netbsdSetupHook 4 - , makeMinimal, install, tsort, lorder, statHook, rsync, uudecode, config, genassym 5 - , defaultMakeFlags 6 - , common 1 + { 2 + lib, 3 + mkDerivation, 4 + include, 5 + bsdSetupHook, 6 + netbsdSetupHook, 7 + makeMinimal, 8 + install, 9 + tsort, 10 + lorder, 11 + statHook, 12 + rsync, 13 + uudecode, 14 + config, 15 + genassym, 16 + defaultMakeFlags, 17 + common, 7 18 }: 8 19 let 9 20 base = import ./base.nix { 10 21 inherit 11 - lib mkDerivation include bsdSetupHook netbsdSetupHook makeMinimal install 12 - tsort lorder statHook rsync uudecode config genassym defaultMakeFlags 13 - common; 22 + lib 23 + mkDerivation 24 + include 25 + bsdSetupHook 26 + netbsdSetupHook 27 + makeMinimal 28 + install 29 + tsort 30 + lorder 31 + statHook 32 + rsync 33 + uudecode 34 + config 35 + genassym 36 + defaultMakeFlags 37 + common 38 + ; 14 39 }; 15 40 in 16 - mkDerivation (base // { 41 + mkDerivation ( 42 + base 43 + // { 17 44 pname = "sys"; 18 45 installPhase = null; 19 46 noCC = false; 20 47 dontBuild = false; 21 - }) 48 + } 49 + )
+21 -10
pkgs/os-specific/bsd/netbsd/pkgs/tic.nix
··· 1 - { mkDerivation 2 - , bsdSetupHook, netbsdSetupHook 3 - , makeMinimal 4 - , install, mandoc, groff, nbperf, rsync 5 - , compatIfNeeded 6 - , defaultMakeFlags 7 - , libterminfo 8 - , fetchNetBSD 1 + { 2 + mkDerivation, 3 + bsdSetupHook, 4 + netbsdSetupHook, 5 + makeMinimal, 6 + install, 7 + mandoc, 8 + groff, 9 + nbperf, 10 + rsync, 11 + compatIfNeeded, 12 + defaultMakeFlags, 13 + libterminfo, 14 + fetchNetBSD, 9 15 }: 10 16 11 17 mkDerivation { ··· 15 21 HOSTPROG = "tic"; 16 22 buildInputs = compatIfNeeded; 17 23 nativeBuildInputs = [ 18 - bsdSetupHook netbsdSetupHook 24 + bsdSetupHook 25 + netbsdSetupHook 19 26 makeMinimal 20 - install mandoc groff nbperf rsync 27 + install 28 + mandoc 29 + groff 30 + nbperf 31 + rsync 21 32 ]; 22 33 makeFlags = defaultMakeFlags ++ [ "TOOLDIR=$(out)" ]; 23 34 extraPaths = [
+15 -6
pkgs/os-specific/bsd/netbsd/pkgs/tsort.nix
··· 1 - { mkDerivation 2 - , bsdSetupHook, netbsdSetupHook 3 - , makeMinimal 4 - , install, mandoc, groff, rsync 1 + { 2 + mkDerivation, 3 + bsdSetupHook, 4 + netbsdSetupHook, 5 + makeMinimal, 6 + install, 7 + mandoc, 8 + groff, 9 + rsync, 5 10 }: 6 11 7 12 mkDerivation { ··· 9 14 version = "9.2"; 10 15 sha256 = "1dqvf9gin29nnq3c4byxc7lfd062pg7m84843zdy6n0z63hnnwiq"; 11 16 nativeBuildInputs = [ 12 - bsdSetupHook netbsdSetupHook 17 + bsdSetupHook 18 + netbsdSetupHook 13 19 makeMinimal 14 - install mandoc groff rsync 20 + install 21 + mandoc 22 + groff 23 + rsync 15 24 ]; 16 25 }
+5 -2
pkgs/os-specific/bsd/netbsd/pkgs/uudecode.nix
··· 1 - { lib, mkDerivation, stdenv }: 1 + { 2 + lib, 3 + mkDerivation, 4 + stdenv, 5 + }: 2 6 3 7 mkDerivation { 4 8 path = "usr.bin/uudecode"; ··· 7 11 env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isLinux "-DNO_BASE64"; 8 12 NIX_LDFLAGS = lib.optional stdenv.isDarwin "-lresolv"; 9 13 } 10 -
+1 -1
pkgs/servers/home-assistant/component-packages.nix
··· 2 2 # Do not edit! 3 3 4 4 { 5 - version = "2024.5.1"; 5 + version = "2024.5.2"; 6 6 components = { 7 7 "3_day_blinds" = ps: with ps; [ 8 8 ];
+3 -3
pkgs/servers/home-assistant/default.nix
··· 476 476 extraBuildInputs = extraPackages python.pkgs; 477 477 478 478 # Don't forget to run update-component-packages.py after updating 479 - hassVersion = "2024.5.1"; 479 + hassVersion = "2024.5.2"; 480 480 481 481 in python.pkgs.buildPythonApplication rec { 482 482 pname = "homeassistant"; ··· 494 494 owner = "home-assistant"; 495 495 repo = "core"; 496 496 rev = "refs/tags/${version}"; 497 - hash = "sha256-/JuKN0V2wMZW56l2nt4T3cpDnQiHeC27+QVBi3j3aDI="; 497 + hash = "sha256-OdtkkZ8Yl6H2dUBILrT/02ML3MnptdBydVzKhxoKjAY="; 498 498 }; 499 499 500 500 # Secondary source is pypi sdist for translations 501 501 sdist = fetchPypi { 502 502 inherit pname version; 503 - hash = "sha256-3Tqs+69e1ESOcEMCx3LTt1c04pG5pK/RGX30x8WRegQ="; 503 + hash = "sha256-5ASuTREkAUCS94Ur5yNHU8ISrASGl90scyYWBHiKlKI="; 504 504 }; 505 505 506 506 build-system = with python.pkgs; [
+2 -2
pkgs/servers/home-assistant/frontend.nix
··· 4 4 # the frontend version corresponding to a specific home-assistant version can be found here 5 5 # https://github.com/home-assistant/home-assistant/blob/master/homeassistant/components/frontend/manifest.json 6 6 pname = "home-assistant-frontend"; 7 - version = "20240501.0"; 7 + version = "20240501.1"; 8 8 format = "wheel"; 9 9 10 10 src = fetchPypi { ··· 12 12 pname = "home_assistant_frontend"; 13 13 dist = "py3"; 14 14 python = "py3"; 15 - hash = "sha256-W3EiDkm/Se63/Ph4HUSRj2pY+y/pyCqecs4azYcxsaw="; 15 + hash = "sha256-d/mlZfMri0E4lgMrIt3cRqpF3F12Xr7YuHqTogFON9E="; 16 16 }; 17 17 18 18 # there is nothing to strip in this package
+11 -4
pkgs/servers/psitransfer/default.nix
··· 1 1 { lib 2 2 , buildNpmPackage 3 3 , fetchFromGitHub 4 + , pkg-config 5 + , vips 4 6 }: 5 7 6 8 let 7 9 pname = "psitransfer"; 8 - version = "2.1.2"; 10 + version = "2.2.0"; 9 11 src = fetchFromGitHub { 10 12 owner = "psi-4ward"; 11 13 repo = "psitransfer"; 12 14 rev = "v${version}"; 13 - hash = "sha256-dBAieXIwCEstR9m+6+2/OLPKo2qHynZ1t372Il0mkXk="; 15 + hash = "sha256-5o4QliAXgSZekIy0CNWfEuOxNl0uetL8C8RKUJ8HsNA="; 14 16 }; 15 17 app = buildNpmPackage { 16 18 pname = "${pname}-app"; 17 19 inherit version src; 18 20 19 - npmDepsHash = "sha256-iCd+I/aTMwQqAMRHan3T191XNz4S3Cy6CDxSLIYY7IA="; 21 + npmDepsHash = "sha256-q7E+osWIf6VZ3JvxCXoZYeF28aMgmKP6EzQkksUUjeY="; 20 22 21 23 postPatch = '' 22 24 # https://github.com/psi-4ward/psitransfer/pull/284 ··· 31 33 in buildNpmPackage { 32 34 inherit pname version src; 33 35 34 - npmDepsHash = "sha256-H22T5IU8bjbsWhwhchDqppvYfcatbXSWqp6gdoek1Z8="; 36 + npmDepsHash = "sha256-EW/Fej58LE/nbJomPtWvEjDveAUdo0jIWwC+ziN0gy0="; 37 + 38 + nativeBuildInputs = [ pkg-config ]; 39 + buildInputs = [ 40 + vips # for 'sharp' dependency 41 + ]; 35 42 36 43 postPatch = '' 37 44 rm -r public/app
+2 -2
pkgs/servers/roon-server/default.nix
··· 15 15 , stdenv 16 16 }: 17 17 let 18 - version = "2.0-1392"; 18 + version = "2.0-1407"; 19 19 urlVersion = builtins.replaceStrings [ "." "-" ] [ "00" "0" ] version; 20 20 in 21 21 stdenv.mkDerivation { ··· 24 24 25 25 src = fetchurl { 26 26 url = "https://download.roonlabs.com/updates/production/RoonServer_linuxx64_${urlVersion}.tar.bz2"; 27 - hash = "sha256-S6p2xlWa1Xgp+umRx1KCs4g1u7JZTByNBNUSJBQweUs="; 27 + hash = "sha256-PW28Rw0prHS/q879GYVKaiXe0i2w6BVwgcTWOUhAhOk="; 28 28 }; 29 29 30 30 dontConfigure = true;
+1
pkgs/top-level/aliases.nix
··· 586 586 kube3d = k3d; # Added 2022-0705 587 587 kafkacat = kcat; # Added 2021-10-07 588 588 kak-lsp = kakoune-lsp; # Added 2024-04-01 589 + kdbplus = throw "'kdbplus' has been removed from nixpkgs"; # Added 2024-05-06 589 590 kdeconnect = plasma5Packages.kdeconnect-kde; # Added 2020-10-28 590 591 keepassx = throw "KeePassX is no longer actively developed. Please consider KeePassXC as a maintained alternative."; # Added 2023-02-17 591 592 keepassx2 = throw "KeePassX is no longer actively developed. Please consider KeePassXC as a maintained alternative."; # Added 2023-02-17
-8
pkgs/top-level/all-packages.nix
··· 9583 9583 9584 9584 kdoctor = callPackage ../development/tools/kdoctor { }; 9585 9585 9586 - kdbplus = pkgsi686Linux.callPackage ../applications/misc/kdbplus { }; 9587 - 9588 9586 kdigger = callPackage ../tools/security/kdigger { }; 9589 9587 9590 9588 kdiskmark = libsForQt5.callPackage ../tools/filesystems/kdiskmark { }; ··· 23803 23801 23804 23802 opensupaplex = callPackage ../games/opensupaplex { }; 23805 23803 23806 - openturns = callPackage ../development/libraries/openturns { 23807 - inherit (darwin.apple_sdk.frameworks) Accelerate; 23808 - }; 23809 - 23810 23804 open-wbo = callPackage ../applications/science/logic/open-wbo { }; 23811 23805 23812 23806 openwsman = callPackage ../development/libraries/openwsman { }; ··· 30673 30667 exercism = callPackage ../applications/misc/exercism { }; 30674 30668 30675 30669 expenses = callPackage ../applications/misc/expenses { }; 30676 - 30677 - flowtime = callPackage ../applications/misc/flowtime { }; 30678 30670 30679 30671 furnace = callPackage ../applications/audio/furnace { 30680 30672 inherit (darwin.apple_sdk.frameworks) Cocoa;