Clone of https://github.com/NixOS/nixpkgs.git (to stress-test knotserver)

Merge master into staging-next

authored by github-actions[bot] and committed by GitHub 9b53839f f3c3f0f9

+1912 -1267
+3
.git-blame-ignore-revs
··· 108 109 # postgresql: move packages.nix to ext/default.nix 110 719034f6f6749d624faa28dff259309fc0e3e730
··· 108 109 # postgresql: move packages.nix to ext/default.nix 110 719034f6f6749d624faa28dff259309fc0e3e730 111 + 112 + # pkgs/os-specific/bsd: Reformat with nixfmt-rfc-style 2024-03-01 113 + 3fe3b055adfc020e6a923c466b6bcd978a13069a
+1
.github/workflows/check-nix-format.yml
··· 32 # Each environment variable beginning with NIX_FMT_PATHS_ is a list of 33 # paths to check with nixfmt. 34 env: 35 NIX_FMT_PATHS_MPVSCRIPTS: pkgs/applications/video/mpv/scripts 36 # Format paths related to the Nixpkgs CUDA ecosystem. 37 NIX_FMT_PATHS_CUDA: |
··· 32 # Each environment variable beginning with NIX_FMT_PATHS_ is a list of 33 # paths to check with nixfmt. 34 env: 35 + NIX_FMT_PATHS_BSD: pkgs/os-specific/bsd 36 NIX_FMT_PATHS_MPVSCRIPTS: pkgs/applications/video/mpv/scripts 37 # Format paths related to the Nixpkgs CUDA ecosystem. 38 NIX_FMT_PATHS_CUDA: |
+2
nixos/doc/manual/release-notes/rl-2405.section.md
··· 285 "mysecret"` becomes `services.aria2.rpcSecretFile = "/path/to/secret_file"` 286 where the file `secret_file` contains the string `mysecret`. 287 288 - `openssh`, `openssh_hpn` and `openssh_gssapi` are now compiled without support for the DSA signature algorithm as it is being deprecated upstream. Users still relying on DSA keys should consider upgrading 289 to another signature algorithm. However, for the time being it is possible to restore DSA key support using `override` to set `dsaKeysSupport = true`. 290
··· 285 "mysecret"` becomes `services.aria2.rpcSecretFile = "/path/to/secret_file"` 286 where the file `secret_file` contains the string `mysecret`. 287 288 + - The `system.forbiddenDependenciesRegex` option has been renamed to `system.forbiddenDependenciesRegexes` and now has the type of `listOf string` instead of `string` to accept multiple regexes. 289 + 290 - `openssh`, `openssh_hpn` and `openssh_gssapi` are now compiled without support for the DSA signature algorithm as it is being deprecated upstream. Users still relying on DSA keys should consider upgrading 291 to another signature algorithm. However, for the time being it is possible to restore DSA key support using `override` to set `dsaKeysSupport = true`. 292
+1 -1
nixos/modules/profiles/perlless.nix
··· 26 27 # Check that the system does not contain a Nix store path that contains the 28 # string "perl". 29 - system.forbiddenDependenciesRegex = "perl"; 30 31 }
··· 26 27 # Check that the system does not contain a Nix store path that contains the 28 # string "perl". 29 + system.forbiddenDependenciesRegexes = ["perl"]; 30 31 }
+1 -1
nixos/modules/services/misc/zoneminder.nix
··· 350 RestartSec = "10s"; 351 CacheDirectory = dirs cacheDirs; 352 RuntimeDirectory = dirName; 353 - ReadWriteDirectories = lib.mkIf useCustomDir [ cfg.storageDir ]; 354 StateDirectory = dirs (lib.optionals (!useCustomDir) libDirs); 355 LogsDirectory = dirName; 356 PrivateTmp = true;
··· 350 RestartSec = "10s"; 351 CacheDirectory = dirs cacheDirs; 352 RuntimeDirectory = dirName; 353 + ReadWritePaths = lib.mkIf useCustomDir [ cfg.storageDir ]; 354 StateDirectory = dirs (lib.optionals (!useCustomDir) libDirs); 355 LogsDirectory = dirName; 356 PrivateTmp = true;
+1 -1
nixos/modules/services/security/oauth2-proxy.nix
··· 17 inherit (cfg.github) org team; 18 }; }; 19 20 - google = cfg: { google = with cfg.google; optionalAttrs (groups != []) { 21 admin-email = adminEmail; 22 service-account = serviceAccountJSON; 23 group = groups;
··· 17 inherit (cfg.github) org team; 18 }; }; 19 20 + google = cfg: { google = with cfg.google; lib.optionalAttrs (groups != []) { 21 admin-email = adminEmail; 22 service-account = serviceAccountJSON; 23 group = groups;
+1 -1
nixos/modules/services/security/step-ca.nix
··· 107 UMask = "0077"; 108 Environment = "HOME=%S/step-ca"; 109 WorkingDirectory = ""; # override upstream 110 - ReadWriteDirectories = ""; # override upstream 111 112 # LocalCredential handles file permission problems arising from the use of DynamicUser. 113 LoadCredential = "intermediate_password:${cfg.intermediatePasswordFile}";
··· 107 UMask = "0077"; 108 Environment = "HOME=%S/step-ca"; 109 WorkingDirectory = ""; # override upstream 110 + ReadWritePaths = ""; # override upstream 111 112 # LocalCredential handles file permission problems arising from the use of DynamicUser. 113 LoadCredential = "intermediate_password:${cfg.intermediatePasswordFile}";
+2 -1
nixos/modules/services/web-servers/caddy/default.nix
··· 360 serviceConfig = let 361 runOptions = ''--config ${configPath} ${optionalString (cfg.adapter != null) "--adapter ${cfg.adapter}"}''; 362 in { 363 # https://www.freedesktop.org/software/systemd/man/systemd.service.html#ExecStart= 364 # If the empty string is assigned to this option, the list of commands to start is reset, prior assignments of this option will have no effect. 365 ExecStart = [ "" ''${cfg.package}/bin/caddy run ${runOptions} ${optionalString cfg.resume "--resume"}'' ]; ··· 367 ExecReload = [ "" ''${cfg.package}/bin/caddy reload ${runOptions} --force'' ]; 368 User = cfg.user; 369 Group = cfg.group; 370 - ReadWriteDirectories = cfg.dataDir; 371 StateDirectory = mkIf (cfg.dataDir == "/var/lib/caddy") [ "caddy" ]; 372 LogsDirectory = mkIf (cfg.logDir == "/var/log/caddy") [ "caddy" ]; 373 Restart = "on-failure";
··· 360 serviceConfig = let 361 runOptions = ''--config ${configPath} ${optionalString (cfg.adapter != null) "--adapter ${cfg.adapter}"}''; 362 in { 363 + # Override the `ExecStart` line from upstream's systemd unit file by our own: 364 # https://www.freedesktop.org/software/systemd/man/systemd.service.html#ExecStart= 365 # If the empty string is assigned to this option, the list of commands to start is reset, prior assignments of this option will have no effect. 366 ExecStart = [ "" ''${cfg.package}/bin/caddy run ${runOptions} ${optionalString cfg.resume "--resume"}'' ]; ··· 368 ExecReload = [ "" ''${cfg.package}/bin/caddy reload ${runOptions} --force'' ]; 369 User = cfg.user; 370 Group = cfg.group; 371 + ReadWritePaths = [ cfg.dataDir ]; 372 StateDirectory = mkIf (cfg.dataDir == "/var/lib/caddy") [ "caddy" ]; 373 LogsDirectory = mkIf (cfg.logDir == "/var/log/caddy") [ "caddy" ]; 374 Restart = "on-failure";
+1 -1
nixos/modules/services/web-servers/traefik.nix
··· 170 PrivateDevices = true; 171 ProtectHome = true; 172 ProtectSystem = "full"; 173 - ReadWriteDirectories = cfg.dataDir; 174 RuntimeDirectory = "traefik"; 175 }; 176 };
··· 170 PrivateDevices = true; 171 ProtectHome = true; 172 ProtectSystem = "full"; 173 + ReadWritePaths = [ cfg.dataDir ]; 174 RuntimeDirectory = "traefik"; 175 }; 176 };
+2 -2
nixos/modules/system/activation/test.nix
··· 5 }: 6 let 7 node-forbiddenDependencies-fail = nixos ({ ... }: { 8 - system.forbiddenDependenciesRegex = "-dev$"; 9 environment.etc."dev-dependency" = { 10 text = "${expect.dev}"; 11 }; ··· 14 boot.loader.grub.enable = false; 15 }); 16 node-forbiddenDependencies-succeed = nixos ({ ... }: { 17 - system.forbiddenDependenciesRegex = "-dev$"; 18 system.extraDependencies = [ expect.dev ]; 19 documentation.enable = false; 20 fileSystems."/".device = "ignore-root-device";
··· 5 }: 6 let 7 node-forbiddenDependencies-fail = nixos ({ ... }: { 8 + system.forbiddenDependenciesRegexes = ["-dev$"]; 9 environment.etc."dev-dependency" = { 10 text = "${expect.dev}"; 11 }; ··· 14 boot.loader.grub.enable = false; 15 }); 16 node-forbiddenDependencies-succeed = nixos ({ ... }: { 17 + system.forbiddenDependenciesRegexes = ["-dev$"]; 18 system.extraDependencies = [ expect.dev ]; 19 documentation.enable = false; 20 fileSystems."/".device = "ignore-root-device";
+11 -12
nixos/modules/system/activation/top-level.nix
··· 86 ../build.nix 87 (mkRemovedOptionModule [ "nesting" "clone" ] "Use `specialisation.«name» = { inheritParentConfig = true; configuration = { ... }; }` instead.") 88 (mkRemovedOptionModule [ "nesting" "children" ] "Use `specialisation.«name».configuration = { ... }` instead.") 89 ]; 90 91 options = { ··· 160 ''; 161 }; 162 163 - system.forbiddenDependenciesRegex = mkOption { 164 - default = ""; 165 - example = "-dev$"; 166 - type = types.str; 167 description = '' 168 - A POSIX Extended Regular Expression that matches store paths that 169 should not appear in the system closure, with the exception of {option}`system.extraDependencies`, which is not checked. 170 ''; 171 }; ··· 289 "$out/configuration.nix" 290 '' + 291 optionalString 292 - (config.system.forbiddenDependenciesRegex != "") 293 - '' 294 - if [[ $forbiddenDependenciesRegex != "" && -n $closureInfo ]]; then 295 - if forbiddenPaths="$(grep -E -- "$forbiddenDependenciesRegex" $closureInfo/store-paths)"; then 296 echo -e "System closure $out contains the following disallowed paths:\n$forbiddenPaths" 297 exit 1 298 fi 299 fi 300 - ''; 301 302 system.systemBuilderArgs = { 303 ··· 319 # option, as opposed to `system.extraDependencies`. 320 passedChecks = concatStringsSep " " config.system.checks; 321 } 322 - // lib.optionalAttrs (config.system.forbiddenDependenciesRegex != "") { 323 - inherit (config.system) forbiddenDependenciesRegex; 324 closureInfo = pkgs.closureInfo { rootPaths = [ 325 # override to avoid infinite recursion (and to allow using extraDependencies to add forbidden dependencies) 326 (config.system.build.toplevel.overrideAttrs (_: { extraDependencies = []; closureInfo = null; }))
··· 86 ../build.nix 87 (mkRemovedOptionModule [ "nesting" "clone" ] "Use `specialisation.«name» = { inheritParentConfig = true; configuration = { ... }; }` instead.") 88 (mkRemovedOptionModule [ "nesting" "children" ] "Use `specialisation.«name».configuration = { ... }` instead.") 89 + (mkRenamedOptionModule [ "system" "forbiddenDependenciesRegex" ] [ "system" "forbiddenDependenciesRegexes" ]) 90 ]; 91 92 options = { ··· 161 ''; 162 }; 163 164 + system.forbiddenDependenciesRegexes = mkOption { 165 + default = []; 166 + example = ["-dev$"]; 167 + type = types.listOf types.str; 168 description = '' 169 + POSIX Extended Regular Expressions that match store paths that 170 should not appear in the system closure, with the exception of {option}`system.extraDependencies`, which is not checked. 171 ''; 172 }; ··· 290 "$out/configuration.nix" 291 '' + 292 optionalString 293 + (config.system.forbiddenDependenciesRegexes != []) (lib.concatStringsSep "\n" (map (regex: '' 294 + if [[ ${regex} != "" && -n $closureInfo ]]; then 295 + if forbiddenPaths="$(grep -E -- "${regex}" $closureInfo/store-paths)"; then 296 echo -e "System closure $out contains the following disallowed paths:\n$forbiddenPaths" 297 exit 1 298 fi 299 fi 300 + '') config.system.forbiddenDependenciesRegexes)); 301 302 system.systemBuilderArgs = { 303 ··· 319 # option, as opposed to `system.extraDependencies`. 320 passedChecks = concatStringsSep " " config.system.checks; 321 } 322 + // lib.optionalAttrs (config.system.forbiddenDependenciesRegexes != []) { 323 closureInfo = pkgs.closureInfo { rootPaths = [ 324 # override to avoid infinite recursion (and to allow using extraDependencies to add forbidden dependencies) 325 (config.system.build.toplevel.overrideAttrs (_: { extraDependencies = []; closureInfo = null; }))
+2 -2
pkgs/applications/misc/flowtime/default.nix pkgs/by-name/fl/flowtime/package.nix
··· 17 18 stdenv.mkDerivation rec { 19 pname = "flowtime"; 20 - version = "6.1"; 21 22 src = fetchFromGitHub { 23 owner = "Diego-Ivan"; 24 repo = "Flowtime"; 25 rev = "v${version}"; 26 - hash = "sha256-wTqHTkt1O3Da2fzxf6DiQjrqOt65ZEhLOkGK5C6HzIk="; 27 }; 28 29 nativeBuildInputs = [
··· 17 18 stdenv.mkDerivation rec { 19 pname = "flowtime"; 20 + version = "6.5"; 21 22 src = fetchFromGitHub { 23 owner = "Diego-Ivan"; 24 repo = "Flowtime"; 25 rev = "v${version}"; 26 + hash = "sha256-J0Pscv0ZOpA/LV2mPTLOmDPQpfZhizTghatGnrJHToE="; 27 }; 28 29 nativeBuildInputs = [
-76
pkgs/applications/misc/kdbplus/default.nix
··· 1 - { lib, stdenv, requireFile, unzip, rlwrap, bash, zlib }: 2 - 3 - assert (stdenv.hostPlatform.system == "i686-linux"); 4 - 5 - let 6 - libPath = lib.makeLibraryPath 7 - [ stdenv.cc.libc stdenv.cc.cc zlib ]; 8 - in 9 - stdenv.mkDerivation rec { 10 - pname = "kdbplus"; 11 - version = "3.6"; 12 - 13 - src = requireFile rec { 14 - message = '' 15 - Nix can't download kdb+ for you automatically. Go to 16 - http://kx.com and download the free, 32-bit version for 17 - Linux. Then run "nix-prefetch-url file://\$PWD/${name}" in 18 - the directory where you saved it. Note you need version ${version}. 19 - ''; 20 - name = "linuxx86.zip"; 21 - sha256 = "0w6znd9warcqx28vf648n0vgmxyyy9kvsfpsfw37d1kp5finap4p"; 22 - }; 23 - 24 - dontStrip = true; 25 - nativeBuildInputs = [ unzip ]; 26 - 27 - phases = "unpackPhase installPhase"; 28 - unpackPhase = "mkdir ${pname}-${version} && cd ${pname}-${version} && unzip -qq ${src}"; 29 - installPhase = '' 30 - mkdir -p $out/bin $out/libexec 31 - 32 - patchelf \ 33 - --interpreter "$(cat $NIX_CC/nix-support/dynamic-linker)" \ 34 - --set-rpath ${libPath} \ 35 - ./q/l32/q 36 - mv ./q/l32/q $out/libexec/q 37 - 38 - # Shell script wrappers to make things more convenient... 39 - 40 - cat > $out/bin/q-install <<- EOF 41 - #!${bash}/bin/bash 42 - if [ -f \$HOME/q/q.k ]; then 43 - echo "kdb has already been unpacked in \$HOME. Skipping..." 44 - exit 0 45 - fi 46 - echo -n "Unzipping ${src} into \$HOME... " 47 - cd \$HOME && ${unzip}/bin/unzip -qq ${src} 48 - echo "Done" 49 - EOF 50 - 51 - cat > $out/bin/q <<- EOF 52 - #!${bash}/bin/bash 53 - if [ ! -f \$HOME/q/q.k ]; then 54 - echo "ERROR: You need to unzip the Q sources into \$HOME before running q." 55 - echo 56 - echo "Try:" 57 - echo " cd \$HOME && unzip ${src}" 58 - echo "(or run q-install)" 59 - exit 1 60 - fi 61 - 62 - exec ${rlwrap}/bin/rlwrap $out/libexec/q \$@ 63 - EOF 64 - 65 - chmod +x $out/bin/q $out/bin/q-install 66 - ''; 67 - 68 - meta = { 69 - description = "Analytics and time-series database"; 70 - homepage = "http://www.kx.com/"; 71 - sourceProvenance = with lib.sourceTypes; [ binaryNativeCode ]; 72 - license = lib.licenses.unfree; 73 - platforms = [ "i686-linux" ]; 74 - maintainers = [ lib.maintainers.thoughtpolice ]; 75 - }; 76 - }
···
+4 -4
pkgs/applications/version-management/gitnuro/default.nix
··· 9 10 stdenv.mkDerivation rec { 11 pname = "gitnuro"; 12 - version = "1.1.1"; 13 14 src = fetchurl { 15 - url = "https://github.com/JetpackDuba/Gitnuro/releases/download/v${version}/Gitnuro-linux-${version}.jar"; 16 - hash = "sha256-ugZBk/aQ2pjL9xY66g20MorAQ02GHIdJTv8ejadaBgY="; 17 }; 18 19 icon = fetchurl { ··· 50 description = "A FOSS Git multiplatform client based on Compose and JGit"; 51 homepage = "https://gitnuro.com/"; 52 license = licenses.gpl3Plus; 53 - platforms = platforms.unix; 54 maintainers = with maintainers; [ zendo ]; 55 mainProgram = "gitnuro"; 56 };
··· 9 10 stdenv.mkDerivation rec { 11 pname = "gitnuro"; 12 + version = "1.3.1"; 13 14 src = fetchurl { 15 + url = "https://github.com/JetpackDuba/Gitnuro/releases/download/v${version}/Gitnuro-linux-x86_64-${version}.jar"; 16 + hash = "sha256-7yne9dD/7VT+H4tIBJvpOf8ksECCpoNAa8TSmFmjYMw="; 17 }; 18 19 icon = fetchurl { ··· 50 description = "A FOSS Git multiplatform client based on Compose and JGit"; 51 homepage = "https://gitnuro.com/"; 52 license = licenses.gpl3Plus; 53 + platforms = [ "x86_64-linux" ]; 54 maintainers = with maintainers; [ zendo ]; 55 mainProgram = "gitnuro"; 56 };
+1 -1
pkgs/applications/virtualization/dumb-init/default.nix
··· 30 homepage = "https://github.com/Yelp/dumb-init"; 31 license = licenses.mit; 32 maintainers = [ ]; 33 - platforms = platforms.linux; 34 mainProgram = "dumb-init"; 35 }; 36 }
··· 30 homepage = "https://github.com/Yelp/dumb-init"; 31 license = licenses.mit; 32 maintainers = [ ]; 33 + platforms = platforms.unix; 34 mainProgram = "dumb-init"; 35 }; 36 }
+5 -5
pkgs/by-name/fl/flashprog/package.nix
··· 12 , withGpio ? stdenv.isLinux 13 }: 14 15 - stdenv.mkDerivation { 16 pname = "flashprog"; 17 - version = "1.0.1"; 18 19 src = fetchgit { 20 url = "https://review.sourcearcade.org/flashprog"; 21 - rev = "2ca11f9a4101ea230081d448ab2b570425b7f0bd"; 22 - hash = "sha256-pm9g9iOJAKnzzY9couzt8RmqZFbIpKcO++zsUJ9o49U="; 23 }; 24 25 nativeBuildInputs = [ ··· 60 platforms = platforms.all; 61 mainProgram = "flashprog"; 62 }; 63 - }
··· 12 , withGpio ? stdenv.isLinux 13 }: 14 15 + stdenv.mkDerivation (finalAttrs: { 16 pname = "flashprog"; 17 + version = "1.1"; 18 19 src = fetchgit { 20 url = "https://review.sourcearcade.org/flashprog"; 21 + rev = "v${finalAttrs.version}"; 22 + hash = "sha256-CLwaGxVOo8FJaWfvrJ2hAm7XonP5nHT6YTsaw7scKCM="; 23 }; 24 25 nativeBuildInputs = [ ··· 60 platforms = platforms.all; 61 mainProgram = "flashprog"; 62 }; 63 + })
+3 -3
pkgs/by-name/ho/home-manager/package.nix
··· 16 17 stdenvNoCC.mkDerivation (finalAttrs: { 18 pname = "home-manager"; 19 - version = "0-unstable-2024-04-29"; 20 21 src = fetchFromGitHub { 22 name = "home-manager-source"; 23 owner = "nix-community"; 24 repo = "home-manager"; 25 - rev = "9fe79591c1005ce6f93084ae7f7dab0a2891440d"; 26 - hash = "sha256-OzD1P0o46uD3Ix4ZI/g9z3YAeg+4g+W3qctB6bNOReo="; 27 }; 28 29 nativeBuildInputs = [
··· 16 17 stdenvNoCC.mkDerivation (finalAttrs: { 18 pname = "home-manager"; 19 + version = "0-unstable-2024-05-05"; 20 21 src = fetchFromGitHub { 22 name = "home-manager-source"; 23 owner = "nix-community"; 24 repo = "home-manager"; 25 + rev = "3dfe05aa9b5646995ace887931fa60269a039777"; 26 + hash = "sha256-QXpLmgmisNK2Zgpnu9DiO9ScrKJuJ4zmiMTNpObVIuk="; 27 }; 28 29 nativeBuildInputs = [
+3 -3
pkgs/by-name/me/melonDS/package.nix
··· 23 in 24 stdenv.mkDerivation (finalAttrs: { 25 pname = "melonDS"; 26 - version = "0.9.5-unstable-2024-04-18"; 27 28 src = fetchFromGitHub { 29 owner = "melonDS-emu"; 30 repo = "melonDS"; 31 - rev = "ba8d547dfa81539f4e8474152d92e866ad89241b"; 32 - hash = "sha256-va4KegM2z0GSA43goUynRPNPvQnrV2b8oNOfLKPE+Zc="; 33 }; 34 35 nativeBuildInputs = [
··· 23 in 24 stdenv.mkDerivation (finalAttrs: { 25 pname = "melonDS"; 26 + version = "0.9.5-unstable-2024-05-05"; 27 28 src = fetchFromGitHub { 29 owner = "melonDS-emu"; 30 repo = "melonDS"; 31 + rev = "10798c3464ca0e199087960fda918ed99acc2e21"; 32 + hash = "sha256-5GbJKhICrbVfnfZt6Ni4uNbodH3rJY5lKoQRgiPXWCg="; 33 }; 34 35 nativeBuildInputs = [
+99
pkgs/by-name/op/openturns/package.nix
···
··· 1 + { 2 + lib, 3 + boost, 4 + ceres-solver, 5 + cmake, 6 + cminpack, 7 + darwin, 8 + dlib, 9 + fetchFromGitHub, 10 + fetchpatch, 11 + hdf5, 12 + hmat-oss, 13 + ipopt, 14 + libxml2, 15 + nlopt, 16 + pagmo2, 17 + primesieve, 18 + python3Packages, 19 + spectra, 20 + stdenv, 21 + swig, 22 + tbb, 23 + # Boolean flags 24 + runTests ? false, # tests take an hour to build on a 48-core machine 25 + enablePython ? false, 26 + }: 27 + 28 + let 29 + inherit (darwin.apple_sdk.frameworks) Accelerate; 30 + in 31 + stdenv.mkDerivation (finalAttrs: { 32 + pname = "openturns"; 33 + version = "1.22"; 34 + 35 + src = fetchFromGitHub { 36 + owner = "openturns"; 37 + repo = "openturns"; 38 + rev = "v${finalAttrs.version}"; 39 + hash = "sha256-ku3/mPoa1YJVJB99R/kWlOubIO+OZAiKfPqS/DrtJQk="; 40 + }; 41 + 42 + nativeBuildInputs = [ 43 + cmake 44 + ] 45 + ++ lib.optionals enablePython [ python3Packages.sphinx ]; 46 + 47 + buildInputs = [ 48 + (lib.getLib primesieve) 49 + boost 50 + ceres-solver 51 + cminpack 52 + dlib 53 + hdf5 54 + hmat-oss 55 + ipopt 56 + libxml2 57 + nlopt 58 + pagmo2 59 + spectra 60 + swig 61 + tbb 62 + ] 63 + ++ lib.optionals enablePython [ 64 + python3Packages.dill 65 + python3Packages.matplotlib 66 + python3Packages.psutil 67 + python3Packages.python 68 + ] 69 + ++ lib.optionals stdenv.isDarwin [ 70 + Accelerate 71 + ]; 72 + 73 + cmakeFlags = [ 74 + (lib.cmakeBool "BUILD_PYTHON" enablePython) 75 + (lib.cmakeBool "CMAKE_UNITY_BUILD" true) 76 + (lib.cmakeBool "USE_SPHINX" enablePython) 77 + (lib.cmakeFeature "CMAKE_UNITY_BUILD_BATCH_SIZE" "32") 78 + (lib.cmakeFeature "SWIG_COMPILE_FLAGS" "-O1") 79 + (lib.cmakeOptionType "PATH" "OPENTURNS_SYSCONFIG_PATH" "$out/etc") 80 + ]; 81 + 82 + checkTarget = lib.concatStringsSep " " [ 83 + "tests" 84 + "check" 85 + ]; 86 + 87 + strictDeps = true; 88 + 89 + doCheck = runTests; 90 + 91 + meta = { 92 + homepage = "https://openturns.github.io/www/"; 93 + description = "Multivariate probabilistic modeling and uncertainty treatment library"; 94 + changelog = "https://github.com/openturns/openturns/raw/v${finalAttrs.version}/ChangeLog"; 95 + license = with lib.licenses; [ lgpl3Plus gpl3Plus ]; 96 + maintainers = with lib.maintainers; [ gdinh ]; 97 + platforms = lib.platforms.unix; 98 + }; 99 + })
+2 -2
pkgs/development/interpreters/clojure/default.nix
··· 2 3 stdenv.mkDerivation (finalAttrs: { 4 pname = "clojure"; 5 - version = "1.11.3.1456"; 6 7 src = fetchurl { 8 # https://github.com/clojure/brew-install/releases 9 url = "https://github.com/clojure/brew-install/releases/download/${finalAttrs.version}/clojure-tools-${finalAttrs.version}.tar.gz"; 10 - hash = "sha256-ymOkUUDSj5KzFMBY1D7gErjPAK5E/QjFDGcwDo5fzW0="; 11 }; 12 13 nativeBuildInputs = [
··· 2 3 stdenv.mkDerivation (finalAttrs: { 4 pname = "clojure"; 5 + version = "1.11.3.1463"; 6 7 src = fetchurl { 8 # https://github.com/clojure/brew-install/releases 9 url = "https://github.com/clojure/brew-install/releases/download/${finalAttrs.version}/clojure-tools-${finalAttrs.version}.tar.gz"; 10 + hash = "sha256-26QZ3j54XztpW2WJ1xg0Gc+OwrsvmfK4iv0GsLV8FIc="; 11 }; 12 13 nativeBuildInputs = [
+8 -1
pkgs/development/libraries/cegui/default.nix
··· 1 { lib 2 , stdenv 3 , fetchFromGitHub 4 , cmake 5 , ogre 6 , freetype ··· 13 14 stdenv.mkDerivation { 15 pname = "cegui"; 16 - version = "unstable-2023-03-18"; 17 18 src = fetchFromGitHub { 19 owner = "paroj"; ··· 47 48 passthru.updateScript = unstableGitUpdater { 49 branch = "v0"; 50 }; 51 52 meta = with lib; {
··· 1 { lib 2 , stdenv 3 , fetchFromGitHub 4 + , writeShellScript 5 , cmake 6 , ogre 7 , freetype ··· 14 15 stdenv.mkDerivation { 16 pname = "cegui"; 17 + version = "0-unstable-2023-03-18"; 18 19 src = fetchFromGitHub { 20 owner = "paroj"; ··· 48 49 passthru.updateScript = unstableGitUpdater { 50 branch = "v0"; 51 + # The above branch is separate from the branch with the latest tags, so the updater doesn't pick them up 52 + # This is what would be used to handle upstream's format, if it was able to see the tags 53 + # tagConverter = writeShellScript "cegui-tag-converter.sh" '' 54 + # sed -e 's/^v//g' -e 's/-/./g' 55 + # ''; 56 + hardcodeZeroVersion = true; 57 }; 58 59 meta = with lib; {
+4 -2
pkgs/development/libraries/crossguid/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "crossguid"; 5 - version = "unstable-2019-05-29"; 6 7 src = fetchFromGitHub { 8 owner = "graeme-hill"; ··· 24 nativeBuildInputs = [ cmake ]; 25 buildInputs = lib.optional stdenv.isLinux libuuid; 26 27 - passthru.updateScript = unstableGitUpdater { }; 28 29 meta = with lib; { 30 description = "Lightweight cross platform C++ GUID/UUID library";
··· 2 3 stdenv.mkDerivation rec { 4 pname = "crossguid"; 5 + version = "0.2.2-unstable-2019-05-29"; 6 7 src = fetchFromGitHub { 8 owner = "graeme-hill"; ··· 24 nativeBuildInputs = [ cmake ]; 25 buildInputs = lib.optional stdenv.isLinux libuuid; 26 27 + passthru.updateScript = unstableGitUpdater { 28 + tagPrefix = "v"; 29 + }; 30 31 meta = with lib; { 32 description = "Lightweight cross platform C++ GUID/UUID library";
+1 -1
pkgs/development/libraries/gl3w/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "gl3w"; 5 - version = "unstable-2023-10-10"; 6 7 src = fetchFromGitHub { 8 owner = "skaslev";
··· 2 3 stdenv.mkDerivation rec { 4 pname = "gl3w"; 5 + version = "0-unstable-2023-10-10"; 6 7 src = fetchFromGitHub { 8 owner = "skaslev";
+4 -2
pkgs/development/libraries/gtk-frdp/default.nix
··· 15 16 stdenv.mkDerivation rec { 17 pname = "gtk-frdp"; 18 - version = "unstable-2024-03-01"; 19 20 src = fetchFromGitLab { 21 domain = "gitlab.gnome.org"; ··· 41 ]; 42 43 passthru = { 44 - updateScript = unstableGitUpdater { }; 45 }; 46 47 env.NIX_CFLAGS_COMPILE = toString (lib.optionals stdenv.isDarwin [
··· 15 16 stdenv.mkDerivation rec { 17 pname = "gtk-frdp"; 18 + version = "3.37.1-unstable-2024-03-01"; 19 20 src = fetchFromGitLab { 21 domain = "gitlab.gnome.org"; ··· 41 ]; 42 43 passthru = { 44 + updateScript = unstableGitUpdater { 45 + tagPrefix = "v"; 46 + }; 47 }; 48 49 env.NIX_CFLAGS_COMPILE = toString (lib.optionals stdenv.isDarwin [
+1 -1
pkgs/development/libraries/hax11/default.nix
··· 9 10 multiStdenv.mkDerivation (finalAttrs: { 11 pname = "hax11"; 12 - version = "unstable-2023-09-25"; 13 14 src = fetchFromGitHub { 15 owner = "CyberShadow";
··· 9 10 multiStdenv.mkDerivation (finalAttrs: { 11 pname = "hax11"; 12 + version = "0-unstable-2023-09-25"; 13 14 src = fetchFromGitHub { 15 owner = "CyberShadow";
+1 -1
pkgs/development/libraries/libcxxrt/default.nix
··· 2 3 stdenv.mkDerivation { 4 pname = "libcxxrt"; 5 - version = "unstable-2024-04-15"; 6 7 src = fetchFromGitHub { 8 owner = "libcxxrt";
··· 2 3 stdenv.mkDerivation { 4 pname = "libcxxrt"; 5 + version = "4.0.10-unstable-2024-04-15"; 6 7 src = fetchFromGitHub { 8 owner = "libcxxrt";
+1 -1
pkgs/development/libraries/libsegfault/default.nix
··· 10 11 stdenv.mkDerivation rec { 12 pname = "libsegfault"; 13 - version = "unstable-2022-11-13"; 14 15 src = fetchFromGitHub { 16 owner = "jonathanpoelen";
··· 10 11 stdenv.mkDerivation rec { 12 pname = "libsegfault"; 13 + version = "0-unstable-2022-11-13"; 14 15 src = fetchFromGitHub { 16 owner = "jonathanpoelen";
+1 -1
pkgs/development/libraries/libvgm/default.nix
··· 42 in 43 stdenv.mkDerivation { 44 pname = "libvgm"; 45 - version = "unstable-2024-04-24"; 46 47 src = fetchFromGitHub { 48 owner = "ValleyBell";
··· 42 in 43 stdenv.mkDerivation { 44 pname = "libvgm"; 45 + version = "0-unstable-2024-04-24"; 46 47 src = fetchFromGitHub { 48 owner = "ValleyBell";
+4 -2
pkgs/development/libraries/libz/default.nix
··· 6 7 stdenv.mkDerivation (finalAttrs: { 8 pname = "libz"; 9 - version = "unstable-2018-03-31"; 10 11 src = fetchFromGitLab { 12 owner = "sortix"; ··· 18 outputs = [ "out" "dev" ]; 19 outputDoc = "dev"; # single tiny man3 page 20 21 - passthru.updateScript = unstableGitUpdater { }; 22 23 meta = { 24 homepage = "https://sortix.org/libz/";
··· 6 7 stdenv.mkDerivation (finalAttrs: { 8 pname = "libz"; 9 + version = "1.2.8.2015.12.26-unstable-2018-03-31"; 10 11 src = fetchFromGitLab { 12 owner = "sortix"; ··· 18 outputs = [ "out" "dev" ]; 19 outputDoc = "dev"; # single tiny man3 page 20 21 + passthru.updateScript = unstableGitUpdater { 22 + tagPrefix = "libz-"; 23 + }; 24 25 meta = { 26 homepage = "https://sortix.org/libz/";
+1 -1
pkgs/development/libraries/minilibx/default.nix
··· 9 10 stdenv.mkDerivation { 11 pname = "minilibx"; 12 - version = "unstable-2021-10-30"; 13 14 src = fetchFromGitHub { 15 owner = "42Paris";
··· 9 10 stdenv.mkDerivation { 11 pname = "minilibx"; 12 + version = "0-unstable-2021-10-30"; 13 14 src = fetchFromGitHub { 15 owner = "42Paris";
-82
pkgs/development/libraries/openturns/default.nix
··· 1 - { lib 2 - , stdenv 3 - , fetchFromGitHub 4 - , fetchpatch 5 - , cmake 6 - , swig 7 - , boost 8 - , spectra 9 - , libxml2 10 - , tbb 11 - , hmat-oss 12 - , nlopt 13 - , cminpack 14 - , ceres-solver 15 - , dlib 16 - , hdf5 17 - , primesieve 18 - , pagmo2 19 - , ipopt 20 - , Accelerate 21 - # tests take an hour to build on a 48-core machine 22 - , runTests ? false 23 - , enablePython ? false 24 - , python3Packages 25 - }: 26 - 27 - stdenv.mkDerivation rec { 28 - pname = "openturns"; 29 - version = "1.22"; 30 - 31 - src = fetchFromGitHub { 32 - owner = "openturns"; 33 - repo = "openturns"; 34 - rev = "v${version}"; 35 - sha256 = "sha256-ku3/mPoa1YJVJB99R/kWlOubIO+OZAiKfPqS/DrtJQk="; 36 - }; 37 - 38 - nativeBuildInputs = [ cmake ] ++ lib.optional enablePython python3Packages.sphinx; 39 - buildInputs = [ 40 - swig 41 - boost 42 - spectra 43 - libxml2 44 - tbb 45 - hmat-oss 46 - nlopt 47 - cminpack 48 - ceres-solver 49 - dlib 50 - hdf5 51 - primesieve 52 - pagmo2 53 - ipopt 54 - ] ++ lib.optionals enablePython [ 55 - python3Packages.python 56 - python3Packages.matplotlib 57 - python3Packages.psutil 58 - python3Packages.dill 59 - ] ++ lib.optional stdenv.isDarwin Accelerate; 60 - 61 - cmakeFlags = [ 62 - "-DOPENTURNS_SYSCONFIG_PATH=$out/etc" 63 - "-DCMAKE_UNITY_BUILD=ON" 64 - "-DCMAKE_UNITY_BUILD_BATCH_SIZE=32" 65 - "-DSWIG_COMPILE_FLAGS='-O1'" 66 - "-DUSE_SPHINX=${if enablePython then "ON" else "OFF"}" 67 - "-DBUILD_PYTHON=${if enablePython then "ON" else "OFF"}" 68 - ]; 69 - 70 - doCheck = runTests; 71 - 72 - checkTarget = "tests check"; 73 - 74 - meta = with lib; { 75 - description = "Multivariate probabilistic modeling and uncertainty treatment library"; 76 - license = with licenses; [ lgpl3 gpl3 ]; 77 - homepage = "https://openturns.github.io/www/"; 78 - changelog = "https://github.com/openturns/openturns/raw/v${version}/ChangeLog"; 79 - maintainers = with maintainers; [ gdinh ]; 80 - platforms = platforms.unix; 81 - }; 82 - }
···
+1 -1
pkgs/development/libraries/rapidcheck/default.nix
··· 8 9 stdenv.mkDerivation (finalAttrs: { 10 pname = "rapidcheck"; 11 - version = "unstable-2023-12-14"; 12 13 src = fetchFromGitHub { 14 owner = "emil-e";
··· 8 9 stdenv.mkDerivation (finalAttrs: { 10 pname = "rapidcheck"; 11 + version = "0-unstable-2023-12-14"; 12 13 src = fetchFromGitHub { 14 owner = "emil-e";
+3 -3
pkgs/development/python-modules/airthings-ble/default.nix
··· 13 14 buildPythonPackage rec { 15 pname = "airthings-ble"; 16 - version = "0.8.0"; 17 pyproject = true; 18 19 disabled = pythonOlder "3.9"; ··· 22 owner = "vincegio"; 23 repo = "airthings-ble"; 24 rev = "refs/tags/${version}"; 25 - hash = "sha256-BgjfvKrVpw/cP93JCloZKq+PIyS/w7/v6+obfgDT64A="; 26 }; 27 28 postPatch = '' ··· 45 meta = with lib; { 46 description = "Library for Airthings BLE devices"; 47 homepage = "https://github.com/vincegio/airthings-ble"; 48 - changelog = "https://github.com/vincegio/airthings-ble/releases/tag/v${version}"; 49 license = with licenses; [ mit ]; 50 maintainers = with maintainers; [ fab ]; 51 };
··· 13 14 buildPythonPackage rec { 15 pname = "airthings-ble"; 16 + version = "0.9.0"; 17 pyproject = true; 18 19 disabled = pythonOlder "3.9"; ··· 22 owner = "vincegio"; 23 repo = "airthings-ble"; 24 rev = "refs/tags/${version}"; 25 + hash = "sha256-920Vgk8kY5NsjYrOGYoRtcdHl4KKO7ytieH8cJ0S3RE="; 26 }; 27 28 postPatch = '' ··· 45 meta = with lib; { 46 description = "Library for Airthings BLE devices"; 47 homepage = "https://github.com/vincegio/airthings-ble"; 48 + changelog = "https://github.com/vincegio/airthings-ble/releases/tag/${version}"; 49 license = with licenses; [ mit ]; 50 maintainers = with maintainers; [ fab ]; 51 };
+20 -18
pkgs/development/python-modules/bitbox02/default.nix
··· 1 - { lib 2 - , buildPythonPackage 3 - , pythonOlder 4 - , fetchPypi 5 - , base58 6 - , ecdsa 7 - , hidapi 8 - , noiseprotocol 9 - , protobuf 10 - , semver 11 - , typing-extensions 12 }: 13 14 buildPythonPackage rec { 15 pname = "bitbox02"; 16 - version = "6.2.0"; 17 - format = "setuptools"; 18 19 disabled = pythonOlder "3.7"; 20 21 src = fetchPypi { 22 inherit pname version; 23 - hash = "sha256-zt4G45nJjtU2/tbYpCEgjaoA+Xtpe9g2OpQaxfMzCb8="; 24 }; 25 26 - propagatedBuildInputs = [ 27 base58 28 ecdsa 29 hidapi ··· 36 # does not contain tests 37 doCheck = false; 38 39 - pythonImportsCheck = [ 40 - "bitbox02" 41 - ]; 42 43 meta = with lib; { 44 description = "Firmware code of the BitBox02 hardware wallet";
··· 1 + { 2 + lib, 3 + base58, 4 + buildPythonPackage, 5 + ecdsa, 6 + fetchPypi, 7 + hidapi, 8 + noiseprotocol, 9 + protobuf, 10 + pythonOlder, 11 + semver, 12 + setuptools, 13 + typing-extensions, 14 }: 15 16 buildPythonPackage rec { 17 pname = "bitbox02"; 18 + version = "6.3.0"; 19 + pyproject = true; 20 21 disabled = pythonOlder "3.7"; 22 23 src = fetchPypi { 24 inherit pname version; 25 + hash = "sha256-0D+yIovlYw8dfDUeW+vcualbvmLs+IySkTpmHwk2meM="; 26 }; 27 28 + build-system = [ setuptools ]; 29 + 30 + dependencies = [ 31 base58 32 ecdsa 33 hidapi ··· 40 # does not contain tests 41 doCheck = false; 42 43 + pythonImportsCheck = [ "bitbox02" ]; 44 45 meta = with lib; { 46 description = "Firmware code of the BitBox02 hardware wallet";
+2 -2
pkgs/development/python-modules/bluetooth-adapters/default.nix
··· 19 20 buildPythonPackage rec { 21 pname = "bluetooth-adapters"; 22 - version = "0.19.1"; 23 pyproject = true; 24 25 disabled = pythonOlder "3.9"; ··· 28 owner = "Bluetooth-Devices"; 29 repo = "bluetooth-adapters"; 30 rev = "refs/tags/v${version}"; 31 - hash = "sha256-r+Ll9ODFal+I2MwrwHakPFWD3GiE/n0f/dYs69jmmpU="; 32 }; 33 34 postPatch = ''
··· 19 20 buildPythonPackage rec { 21 pname = "bluetooth-adapters"; 22 + version = "0.19.2"; 23 pyproject = true; 24 25 disabled = pythonOlder "3.9"; ··· 28 owner = "Bluetooth-Devices"; 29 repo = "bluetooth-adapters"; 30 rev = "refs/tags/v${version}"; 31 + hash = "sha256-hPs6YnmndJ2Z5RotcIRIYWPdvMyX56ul84l1Cs8kqH0="; 32 }; 33 34 postPatch = ''
+2 -2
pkgs/development/python-modules/boto3-stubs/default.nix
··· 366 367 buildPythonPackage rec { 368 pname = "boto3-stubs"; 369 - version = "1.34.98"; 370 pyproject = true; 371 372 disabled = pythonOlder "3.7"; ··· 374 src = fetchPypi { 375 pname = "boto3_stubs"; 376 inherit version; 377 - hash = "sha256-LhkC5wBmIBa3M5wOwCqCqL+hJ3Dc2Ga1WoWY+A7nNUs="; 378 }; 379 380 build-system = [ setuptools ];
··· 366 367 buildPythonPackage rec { 368 pname = "boto3-stubs"; 369 + version = "1.34.99"; 370 pyproject = true; 371 372 disabled = pythonOlder "3.7"; ··· 374 src = fetchPypi { 375 pname = "boto3_stubs"; 376 inherit version; 377 + hash = "sha256-uOVKyGfZ9gzsIhqLtsmyljzj4pcTTxgdQp003UDWGWk="; 378 }; 379 380 build-system = [ setuptools ];
+31 -37
pkgs/development/python-modules/cyclonedx-python-lib/default.nix
··· 1 - { lib 2 - , buildPythonPackage 3 - , ddt 4 - , fetchFromGitHub 5 - , importlib-metadata 6 - , jsonschema 7 - , license-expression 8 - , lxml 9 - , packageurl-python 10 - , py-serializable 11 - , pythonRelaxDepsHook 12 - , poetry-core 13 - , pytestCheckHook 14 - , pythonOlder 15 - , requirements-parser 16 - , sortedcontainers 17 - , setuptools 18 - , toml 19 - , types-setuptools 20 - , types-toml 21 - , xmldiff 22 }: 23 24 buildPythonPackage rec { 25 pname = "cyclonedx-python-lib"; 26 - version = "6.4.4"; 27 pyproject = true; 28 29 disabled = pythonOlder "3.9"; ··· 32 owner = "CycloneDX"; 33 repo = "cyclonedx-python-lib"; 34 rev = "refs/tags/v${version}"; 35 - hash = "sha256-PNacp16WZHNblFyA117hSL87IKGMrW0OYNXCSoBoO8Q="; 36 }; 37 38 - nativeBuildInputs = [ 39 - poetry-core 40 - pythonRelaxDepsHook 41 - ]; 42 43 - propagatedBuildInputs = [ 44 importlib-metadata 45 license-expression 46 packageurl-python ··· 61 xmldiff 62 ]; 63 64 - pythonImportsCheck = [ 65 - "cyclonedx" 66 - ]; 67 68 - pythonRelaxDeps = [ 69 - "py-serializable" 70 - ]; 71 72 preCheck = '' 73 export PYTHONPATH=tests''${PYTHONPATH+:$PYTHONPATH} 74 ''; 75 76 - pytestFlagsArray = [ 77 - "tests/" 78 - ]; 79 80 disabledTests = [ 81 # These tests require network access
··· 1 + { 2 + lib, 3 + buildPythonPackage, 4 + ddt, 5 + fetchFromGitHub, 6 + importlib-metadata, 7 + jsonschema, 8 + license-expression, 9 + lxml, 10 + packageurl-python, 11 + py-serializable, 12 + pythonRelaxDepsHook, 13 + poetry-core, 14 + pytestCheckHook, 15 + pythonOlder, 16 + requirements-parser, 17 + sortedcontainers, 18 + setuptools, 19 + toml, 20 + types-setuptools, 21 + types-toml, 22 + xmldiff, 23 }: 24 25 buildPythonPackage rec { 26 pname = "cyclonedx-python-lib"; 27 + version = "7.3.2"; 28 pyproject = true; 29 30 disabled = pythonOlder "3.9"; ··· 33 owner = "CycloneDX"; 34 repo = "cyclonedx-python-lib"; 35 rev = "refs/tags/v${version}"; 36 + hash = "sha256-z+QBjMT0L7dqCJvbwok9TWQajIPzmAq3XPLWFxmhPsk="; 37 }; 38 39 + build-system = [ poetry-core ]; 40 + 41 + nativeBuildInputs = [ pythonRelaxDepsHook ]; 42 43 + dependencies = [ 44 importlib-metadata 45 license-expression 46 packageurl-python ··· 61 xmldiff 62 ]; 63 64 + pythonImportsCheck = [ "cyclonedx" ]; 65 66 + pythonRelaxDeps = [ "py-serializable" ]; 67 68 preCheck = '' 69 export PYTHONPATH=tests''${PYTHONPATH+:$PYTHONPATH} 70 ''; 71 72 + pytestFlagsArray = [ "tests/" ]; 73 74 disabledTests = [ 75 # These tests require network access
+7 -13
pkgs/development/python-modules/django/5.nix
··· 1 { lib 2 , stdenv 3 , buildPythonPackage 4 - , fetchPypi 5 , fetchpatch2 6 , pythonAtLeast 7 , pythonOlder ··· 44 45 buildPythonPackage rec { 46 pname = "django"; 47 - version = "5.0.4"; 48 pyproject = true; 49 50 disabled = pythonOlder "3.10"; 51 52 - src = fetchPypi { 53 - pname = "Django"; 54 - inherit version; 55 - hash = "sha256-S9AajIMLt3qKOw59iyW4h+U2rReoG6Lc5UdhNcczEr0="; 56 }; 57 58 patches = [ ··· 64 ./django_5_tests_pythonpath.patch 65 # disable test that excpects timezone issues 66 ./django_5_disable_failing_tests.patch 67 - 68 - (fetchpatch2 { 69 - # https://github.com/django/django/pull/17979 70 - name = "django-mime-utf8-surrogates.patch"; 71 - url = "https://github.com/django/django/commit/b231bcd19e57267ce1fc21d42d46f0b65fdcfcf8.patch"; 72 - hash = "sha256-HhmRwi24VkoPoh+NygAThCoMywoMwrLijU4ZsDfVU34="; 73 - }) 74 75 ] ++ lib.optionals withGdal [ 76 (substituteAll {
··· 1 { lib 2 , stdenv 3 , buildPythonPackage 4 + , fetchFromGitHub 5 , fetchpatch2 6 , pythonAtLeast 7 , pythonOlder ··· 44 45 buildPythonPackage rec { 46 pname = "django"; 47 + version = "5.0.5"; 48 pyproject = true; 49 50 disabled = pythonOlder "3.10"; 51 52 + src = fetchFromGitHub { 53 + owner = "django"; 54 + repo = "django"; 55 + rev = "refs/tags/${version}"; 56 + hash = "sha256-0/AbPmTl38E9BpHVKs0r79fISjEa1d4XO/se1pA7zxg="; 57 }; 58 59 patches = [ ··· 65 ./django_5_tests_pythonpath.patch 66 # disable test that excpects timezone issues 67 ./django_5_disable_failing_tests.patch 68 69 ] ++ lib.optionals withGdal [ 70 (substituteAll {
+2 -2
pkgs/development/python-modules/holidays/default.nix
··· 14 15 buildPythonPackage rec { 16 pname = "holidays"; 17 - version = "0.47"; 18 pyproject = true; 19 20 disabled = pythonOlder "3.8"; ··· 23 owner = "vacanza"; 24 repo = "python-holidays"; 25 rev = "refs/tags/v${version}"; 26 - hash = "sha256-A4viSzUia4QBdD0svkqYtsCq/la7Nrf2xu/fVDZHb00="; 27 }; 28 29 build-system = [
··· 14 15 buildPythonPackage rec { 16 pname = "holidays"; 17 + version = "0.48"; 18 pyproject = true; 19 20 disabled = pythonOlder "3.8"; ··· 23 owner = "vacanza"; 24 repo = "python-holidays"; 25 rev = "refs/tags/v${version}"; 26 + hash = "sha256-PKa4knEUkULeGbwjEViF2J3QyUOOvKHYxy0ChmRQf6A="; 27 }; 28 29 build-system = [
+2 -2
pkgs/development/python-modules/meraki/default.nix
··· 8 9 buildPythonPackage rec { 10 pname = "meraki"; 11 - version = "1.45.0"; 12 format = "setuptools"; 13 14 disabled = pythonOlder "3.8"; 15 16 src = fetchPypi { 17 inherit pname version; 18 - hash = "sha256-PBeeohKNzAMlEdAjzB8fsVPc+ml+mcaWHoVWPeP93Bo="; 19 }; 20 21 propagatedBuildInputs = [
··· 8 9 buildPythonPackage rec { 10 pname = "meraki"; 11 + version = "1.46.0"; 12 format = "setuptools"; 13 14 disabled = pythonOlder "3.8"; 15 16 src = fetchPypi { 17 inherit pname version; 18 + hash = "sha256-f3K+59+9NO33GO1SBZhKfqHPO9p5kivDeLNd780cZu8="; 19 }; 20 21 propagatedBuildInputs = [
+1 -1
pkgs/development/python-modules/piep/default.nix
··· 10 version = "0.10.0"; 11 format = "setuptools"; 12 pname = "piep"; 13 - disabled = isPy3k; 14 15 src = fetchPypi { 16 inherit pname version;
··· 10 version = "0.10.0"; 11 format = "setuptools"; 12 pname = "piep"; 13 + disabled = !isPy3k; 14 15 src = fetchPypi { 16 inherit pname version;
+2 -2
pkgs/development/python-modules/publicsuffixlist/default.nix
··· 11 12 buildPythonPackage rec { 13 pname = "publicsuffixlist"; 14 - version = "0.10.0.20240502"; 15 pyproject = true; 16 17 disabled = pythonOlder "3.7"; 18 19 src = fetchPypi { 20 inherit pname version; 21 - hash = "sha256-Hy0DmawyjUXn35tTV39Mpp+Xe16hDTbkyQoBdKS/d0o="; 22 }; 23 24 build-system = [ setuptools ];
··· 11 12 buildPythonPackage rec { 13 pname = "publicsuffixlist"; 14 + version = "0.10.0.20240506"; 15 pyproject = true; 16 17 disabled = pythonOlder "3.7"; 18 19 src = fetchPypi { 20 inherit pname version; 21 + hash = "sha256-gg1UcELZ8+gQg4VcBsagHhtUc9i6/d03q9oanyDT6K8="; 22 }; 23 24 build-system = [ setuptools ];
+14 -17
pkgs/development/python-modules/rns/default.nix
··· 1 - { lib 2 - , buildPythonPackage 3 - , cryptography 4 - , fetchFromGitHub 5 - , netifaces 6 - , pyserial 7 - , pythonOlder 8 - , setuptools 9 }: 10 11 buildPythonPackage rec { 12 pname = "rns"; 13 - version = "0.7.3"; 14 pyproject = true; 15 16 disabled = pythonOlder "3.7"; ··· 19 owner = "markqvist"; 20 repo = "Reticulum"; 21 rev = "refs/tags/${version}"; 22 - hash = "sha256-QcYjqqeXBKx+Ef00Bw1OJMWDMdQgp/fqh3r5yhsa0Kg="; 23 }; 24 25 - nativeBuildInputs = [ 26 - setuptools 27 - ]; 28 29 - propagatedBuildInputs = [ 30 cryptography 31 netifaces 32 pyserial ··· 35 # Module has no tests 36 doCheck = false; 37 38 - pythonImportsCheck = [ 39 - "RNS" 40 - ]; 41 42 meta = with lib; { 43 description = "Cryptography-based networking stack for wide-area networks";
··· 1 + { 2 + lib, 3 + buildPythonPackage, 4 + cryptography, 5 + fetchFromGitHub, 6 + netifaces, 7 + pyserial, 8 + pythonOlder, 9 + setuptools, 10 }: 11 12 buildPythonPackage rec { 13 pname = "rns"; 14 + version = "0.7.4"; 15 pyproject = true; 16 17 disabled = pythonOlder "3.7"; ··· 20 owner = "markqvist"; 21 repo = "Reticulum"; 22 rev = "refs/tags/${version}"; 23 + hash = "sha256-M6iI554lv6PF5sIdOoaMIlQHP5YU8WM8YxfHMWhLSdE="; 24 }; 25 26 + build-system = [ setuptools ]; 27 28 + dependencies = [ 29 cryptography 30 netifaces 31 pyserial ··· 34 # Module has no tests 35 doCheck = false; 36 37 + pythonImportsCheck = [ "RNS" ]; 38 39 meta = with lib; { 40 description = "Cryptography-based networking stack for wide-area networks";
+8
pkgs/development/python-modules/validator-collection/default.nix
··· 135 136 pythonImportsCheck = [ "validator_collection" ]; 137 138 meta = with lib; { 139 description = "Python library of 60+ commonly-used validator functions"; 140 homepage = "https://github.com/insightindustry/validator-collection/";
··· 135 136 pythonImportsCheck = [ "validator_collection" ]; 137 138 + disabledTests = [ 139 + # Issues with fake filesystem /var/data 140 + "test_writeable" 141 + "test_executable" 142 + "test_readable" 143 + "test_is_readable" 144 + ]; 145 + 146 meta = with lib; { 147 description = "Python library of 60+ commonly-used validator functions"; 148 homepage = "https://github.com/insightindustry/validator-collection/";
+1
pkgs/development/tools/analysis/checkov/default.nix
··· 23 "bc-python-hcl2" 24 "boto3" 25 "botocore" 26 "dpath" 27 "igraph" 28 "license-expression"
··· 23 "bc-python-hcl2" 24 "boto3" 25 "botocore" 26 + "cyclonedx-python-lib" 27 "dpath" 28 "igraph" 29 "license-expression"
+2 -2
pkgs/development/tools/build-managers/sbt/default.nix
··· 8 9 stdenv.mkDerivation (finalAttrs: { 10 pname = "sbt"; 11 - version = "1.9.9"; 12 13 src = fetchurl { 14 url = "https://github.com/sbt/sbt/releases/download/v${finalAttrs.version}/sbt-${finalAttrs.version}.tgz"; 15 - hash = "sha256-xXyuYMISLKG7p3GE37TQ0l/GwYgFOUqzarYgiwwPJi8="; 16 }; 17 18 postPatch = ''
··· 8 9 stdenv.mkDerivation (finalAttrs: { 10 pname = "sbt"; 11 + version = "1.10.0"; 12 13 src = fetchurl { 14 url = "https://github.com/sbt/sbt/releases/download/v${finalAttrs.version}/sbt-${finalAttrs.version}.tgz"; 15 + hash = "sha256-FUt95sGSB8c9CjBPkByMS26tmpw6mamKnXKsGUGdJkA="; 16 }; 17 18 postPatch = ''
+9 -2
pkgs/os-specific/bsd/freebsd/evdev-proto/default.nix
··· 1 - { lib, stdenv, linuxHeaders, freebsd, runCommandCC, buildPackages }: 2 3 stdenv.mkDerivation { 4 pname = "evdev-proto"; ··· 28 TOUCH = "touch"; 29 XARGS = "xargs"; 30 31 - ABI_FILE = runCommandCC "abifile" {} "$CC -shared -o $out"; 32 CLEAN_FETCH_ENV = true; 33 INSTALL_AS_USER = true; 34 NO_CHECKSUM = true;
··· 1 + { 2 + lib, 3 + stdenv, 4 + linuxHeaders, 5 + freebsd, 6 + runCommandCC, 7 + buildPackages, 8 + }: 9 10 stdenv.mkDerivation { 11 pname = "evdev-proto"; ··· 35 TOUCH = "touch"; 36 XARGS = "xargs"; 37 38 + ABI_FILE = runCommandCC "abifile" { } "$CC -shared -o $out"; 39 CLEAN_FETCH_ENV = true; 40 INSTALL_AS_USER = true; 41 NO_CHECKSUM = true;
+10 -8
pkgs/os-specific/bsd/freebsd/lib/default.nix
··· 3 { 4 inherit version; 5 6 - mkBsdArch = stdenv': { 7 - x86_64 = "amd64"; 8 - aarch64 = "arm64"; 9 - i486 = "i386"; 10 - i586 = "i386"; 11 - i686 = "i386"; 12 - }.${stdenv'.hostPlatform.parsed.cpu.name} 13 - or stdenv'.hostPlatform.parsed.cpu.name; 14 15 install-wrapper = builtins.readFile ./install-wrapper.sh; 16 }
··· 3 { 4 inherit version; 5 6 + mkBsdArch = 7 + stdenv': 8 + { 9 + x86_64 = "amd64"; 10 + aarch64 = "arm64"; 11 + i486 = "i386"; 12 + i586 = "i386"; 13 + i686 = "i386"; 14 + } 15 + .${stdenv'.hostPlatform.parsed.cpu.name} or stdenv'.hostPlatform.parsed.cpu.name; 16 17 install-wrapper = builtins.readFile ./install-wrapper.sh; 18 }
+28 -17
pkgs/os-specific/bsd/freebsd/package-set.nix
··· 1 - { stdenv, lib, stdenvNoCC 2 - , fetchzip 3 - , sourceData, versionData, buildFreebsd, patchesRoot 4 }: 5 6 self: ··· 8 lib.packagesFromDirectoryRecursive { 9 callPackage = self.callPackage; 10 directory = ./pkgs; 11 - } // { 12 inherit sourceData patchesRoot versionData; 13 14 # Keep the crawled portion of Nixpkgs finite. ··· 21 22 compatIfNeeded = lib.optional (!stdenvNoCC.hostPlatform.isFreeBSD) self.compat; 23 freebsd-lib = import ./lib { 24 - version = lib.concatStringsSep "." (map toString (lib.filter (x: x != null) [ 25 - self.versionData.major 26 - self.versionData.minor 27 - self.versionData.patch or null 28 - ])); 29 }; 30 31 # The manual callPackages below should in principle be unnecessary, but are ··· 51 }; 52 53 libc = self.callPackage ./pkgs/libc/package.nix { 54 - inherit (buildFreebsd) makeMinimal install gencat rpcgen; 55 inherit (self) csu include; 56 }; 57 58 - libnetbsd = self.callPackage ./pkgs/libnetbsd/package.nix { 59 - inherit (buildFreebsd) makeMinimal; 60 - }; 61 62 mkDerivation = self.callPackage ./pkgs/mkDerivation.nix { 63 inherit stdenv; 64 inherit (buildFreebsd) makeMinimal install tsort; 65 }; 66 67 - makeMinimal = self.callPackage ./pkgs/makeMinimal.nix { 68 - inherit (self) make; 69 - }; 70 - 71 }
··· 1 + { 2 + stdenv, 3 + lib, 4 + stdenvNoCC, 5 + fetchzip, 6 + sourceData, 7 + versionData, 8 + buildFreebsd, 9 + patchesRoot, 10 }: 11 12 self: ··· 14 lib.packagesFromDirectoryRecursive { 15 callPackage = self.callPackage; 16 directory = ./pkgs; 17 + } 18 + // { 19 inherit sourceData patchesRoot versionData; 20 21 # Keep the crawled portion of Nixpkgs finite. ··· 28 29 compatIfNeeded = lib.optional (!stdenvNoCC.hostPlatform.isFreeBSD) self.compat; 30 freebsd-lib = import ./lib { 31 + version = lib.concatStringsSep "." ( 32 + map toString ( 33 + lib.filter (x: x != null) [ 34 + self.versionData.major 35 + self.versionData.minor 36 + self.versionData.patch or null 37 + ] 38 + ) 39 + ); 40 }; 41 42 # The manual callPackages below should in principle be unnecessary, but are ··· 62 }; 63 64 libc = self.callPackage ./pkgs/libc/package.nix { 65 + inherit (buildFreebsd) 66 + makeMinimal 67 + install 68 + gencat 69 + rpcgen 70 + ; 71 inherit (self) csu include; 72 }; 73 74 + libnetbsd = self.callPackage ./pkgs/libnetbsd/package.nix { inherit (buildFreebsd) makeMinimal; }; 75 76 mkDerivation = self.callPackage ./pkgs/mkDerivation.nix { 77 inherit stdenv; 78 inherit (buildFreebsd) makeMinimal install tsort; 79 }; 80 81 + makeMinimal = self.callPackage ./pkgs/makeMinimal.nix { inherit (self) make; }; 82 }
+6 -3
pkgs/os-specific/bsd/freebsd/pkgs/boot-install.nix
··· 1 { buildPackages, freebsd-lib }: 2 3 # Wrap NetBSD's install 4 - buildPackages.writeShellScriptBin "boot-install" (freebsd-lib.install-wrapper + '' 5 6 - ${buildPackages.netbsd.install}/bin/xinstall "''${args[@]}" 7 - '')
··· 1 { buildPackages, freebsd-lib }: 2 3 # Wrap NetBSD's install 4 + buildPackages.writeShellScriptBin "boot-install" ( 5 + freebsd-lib.install-wrapper 6 + + '' 7 8 + ${buildPackages.netbsd.install}/bin/xinstall "''${args[@]}" 9 + '' 10 + )
+102 -83
pkgs/os-specific/bsd/freebsd/pkgs/compat/package.nix
··· 1 - { lib, stdenv, mkDerivation, patchesRoot 2 - , bsdSetupHook, freebsdSetupHook 3 - , makeMinimal, boot-install 4 - , which 5 - , freebsd-lib 6 - , expat, zlib, 7 }: 8 9 let ··· 13 mkDerivation rec { 14 pname = "compat"; 15 path = "tools/build"; 16 - extraPaths = [ 17 - "lib/libc/db" 18 - "lib/libc/stdlib" # getopt 19 - "lib/libc/gen" # getcap 20 - "lib/libc/locale" # rpmatch 21 - ] ++ lib.optionals stdenv.hostPlatform.isLinux [ 22 - "lib/libc/string" # strlcpy 23 - "lib/libutil" 24 - ] ++ [ 25 - "contrib/libc-pwcache" 26 - "contrib/libc-vis" 27 - "sys/libkern" 28 - "sys/kern/subr_capability.c" 29 30 - # Take only individual headers, or else we will clobber native libc, etc. 31 32 - "sys/rpc/types.h" 33 34 - # Listed in Makekfile as INC 35 - "include/mpool.h" 36 - "include/ndbm.h" 37 - "include/err.h" 38 - "include/stringlist.h" 39 - "include/a.out.h" 40 - "include/nlist.h" 41 - "include/db.h" 42 - "include/getopt.h" 43 - "include/nl_types.h" 44 - "include/elf.h" 45 - "sys/sys/ctf.h" 46 47 - # Listed in Makekfile as SYSINC 48 49 - "sys/sys/capsicum.h" 50 - "sys/sys/caprights.h" 51 - "sys/sys/imgact_aout.h" 52 - "sys/sys/nlist_aout.h" 53 - "sys/sys/nv.h" 54 - "sys/sys/dnv.h" 55 - "sys/sys/cnv.h" 56 57 - "sys/sys/elf32.h" 58 - "sys/sys/elf64.h" 59 - "sys/sys/elf_common.h" 60 - "sys/sys/elf_generic.h" 61 - "sys/${mkBsdArch stdenv}/include" 62 - ] ++ lib.optionals stdenv.hostPlatform.isx86 [ 63 - "sys/x86/include" 64 - ] ++ [ 65 66 - "sys/sys/queue.h" 67 - "sys/sys/md5.h" 68 - "sys/sys/sbuf.h" 69 - "sys/sys/tree.h" 70 - "sys/sys/font.h" 71 - "sys/sys/consio.h" 72 - "sys/sys/fnv_hash.h" 73 74 - "sys/crypto/chacha20/_chacha.h" 75 - "sys/crypto/chacha20/chacha.h" 76 - # included too, despite ".c" 77 - "sys/crypto/chacha20/chacha.c" 78 79 - "sys/fs" 80 - "sys/ufs" 81 - "sys/sys/disk" 82 83 - "lib/libcapsicum" 84 - "lib/libcasper" 85 - ]; 86 87 patches = [ 88 /${patchesRoot}/compat-install-dirs.patch 89 /${patchesRoot}/compat-fix-typedefs-locations.patch 90 ]; 91 92 - preBuild = '' 93 - NIX_CFLAGS_COMPILE+=' -I../../include -I../../sys' 94 95 - cp ../../sys/${mkBsdArch stdenv}/include/elf.h ../../sys/sys 96 - cp ../../sys/${mkBsdArch stdenv}/include/elf.h ../../sys/sys/${mkBsdArch stdenv} 97 - '' + lib.optionalString stdenv.hostPlatform.isx86 '' 98 - cp ../../sys/x86/include/elf.h ../../sys/x86 99 - ''; 100 101 setupHooks = [ 102 ../../../../../build-support/setup-hooks/role.bash ··· 109 ''; 110 111 nativeBuildInputs = [ 112 - bsdSetupHook freebsdSetupHook 113 makeMinimal 114 boot-install 115 116 which 117 ]; 118 - buildInputs = [ expat zlib ]; 119 120 makeFlags = [ 121 "STRIP=-s" # flag to install, not command ··· 124 "INSTALL=boot-install" 125 ]; 126 127 - preIncludes = '' 128 - mkdir -p $out/{0,1}-include 129 - cp --no-preserve=mode -r cross-build/include/common/* $out/0-include 130 - '' + lib.optionalString stdenv.hostPlatform.isLinux '' 131 - cp --no-preserve=mode -r cross-build/include/linux/* $out/1-include 132 - '' + lib.optionalString stdenv.hostPlatform.isDarwin '' 133 - cp --no-preserve=mode -r cross-build/include/darwin/* $out/1-include 134 - ''; 135 }
··· 1 + { 2 + lib, 3 + stdenv, 4 + mkDerivation, 5 + patchesRoot, 6 + bsdSetupHook, 7 + freebsdSetupHook, 8 + makeMinimal, 9 + boot-install, 10 + which, 11 + freebsd-lib, 12 + expat, 13 + zlib, 14 }: 15 16 let ··· 20 mkDerivation rec { 21 pname = "compat"; 22 path = "tools/build"; 23 + extraPaths = 24 + [ 25 + "lib/libc/db" 26 + "lib/libc/stdlib" # getopt 27 + "lib/libc/gen" # getcap 28 + "lib/libc/locale" # rpmatch 29 + ] 30 + ++ lib.optionals stdenv.hostPlatform.isLinux [ 31 + "lib/libc/string" # strlcpy 32 + "lib/libutil" 33 + ] 34 + ++ [ 35 + "contrib/libc-pwcache" 36 + "contrib/libc-vis" 37 + "sys/libkern" 38 + "sys/kern/subr_capability.c" 39 40 + # Take only individual headers, or else we will clobber native libc, etc. 41 42 + "sys/rpc/types.h" 43 44 + # Listed in Makekfile as INC 45 + "include/mpool.h" 46 + "include/ndbm.h" 47 + "include/err.h" 48 + "include/stringlist.h" 49 + "include/a.out.h" 50 + "include/nlist.h" 51 + "include/db.h" 52 + "include/getopt.h" 53 + "include/nl_types.h" 54 + "include/elf.h" 55 + "sys/sys/ctf.h" 56 57 + # Listed in Makekfile as SYSINC 58 59 + "sys/sys/capsicum.h" 60 + "sys/sys/caprights.h" 61 + "sys/sys/imgact_aout.h" 62 + "sys/sys/nlist_aout.h" 63 + "sys/sys/nv.h" 64 + "sys/sys/dnv.h" 65 + "sys/sys/cnv.h" 66 67 + "sys/sys/elf32.h" 68 + "sys/sys/elf64.h" 69 + "sys/sys/elf_common.h" 70 + "sys/sys/elf_generic.h" 71 + "sys/${mkBsdArch stdenv}/include" 72 + ] 73 + ++ lib.optionals stdenv.hostPlatform.isx86 [ "sys/x86/include" ] 74 + ++ [ 75 76 + "sys/sys/queue.h" 77 + "sys/sys/md5.h" 78 + "sys/sys/sbuf.h" 79 + "sys/sys/tree.h" 80 + "sys/sys/font.h" 81 + "sys/sys/consio.h" 82 + "sys/sys/fnv_hash.h" 83 84 + "sys/crypto/chacha20/_chacha.h" 85 + "sys/crypto/chacha20/chacha.h" 86 + # included too, despite ".c" 87 + "sys/crypto/chacha20/chacha.c" 88 89 + "sys/fs" 90 + "sys/ufs" 91 + "sys/sys/disk" 92 93 + "lib/libcapsicum" 94 + "lib/libcasper" 95 + ]; 96 97 patches = [ 98 /${patchesRoot}/compat-install-dirs.patch 99 /${patchesRoot}/compat-fix-typedefs-locations.patch 100 ]; 101 102 + preBuild = 103 + '' 104 + NIX_CFLAGS_COMPILE+=' -I../../include -I../../sys' 105 106 + cp ../../sys/${mkBsdArch stdenv}/include/elf.h ../../sys/sys 107 + cp ../../sys/${mkBsdArch stdenv}/include/elf.h ../../sys/sys/${mkBsdArch stdenv} 108 + '' 109 + + lib.optionalString stdenv.hostPlatform.isx86 '' 110 + cp ../../sys/x86/include/elf.h ../../sys/x86 111 + ''; 112 113 setupHooks = [ 114 ../../../../../build-support/setup-hooks/role.bash ··· 121 ''; 122 123 nativeBuildInputs = [ 124 + bsdSetupHook 125 + freebsdSetupHook 126 makeMinimal 127 boot-install 128 129 which 130 ]; 131 + buildInputs = [ 132 + expat 133 + zlib 134 + ]; 135 136 makeFlags = [ 137 "STRIP=-s" # flag to install, not command ··· 140 "INSTALL=boot-install" 141 ]; 142 143 + preIncludes = 144 + '' 145 + mkdir -p $out/{0,1}-include 146 + cp --no-preserve=mode -r cross-build/include/common/* $out/0-include 147 + '' 148 + + lib.optionalString stdenv.hostPlatform.isLinux '' 149 + cp --no-preserve=mode -r cross-build/include/linux/* $out/1-include 150 + '' 151 + + lib.optionalString stdenv.hostPlatform.isDarwin '' 152 + cp --no-preserve=mode -r cross-build/include/darwin/* $out/1-include 153 + ''; 154 }
+27 -9
pkgs/os-specific/bsd/freebsd/pkgs/config.nix
··· 1 - { mkDerivation 2 - , bsdSetupHook, freebsdSetupHook 3 - , makeMinimal, install, mandoc, groff 4 - , flex, byacc, file2c 5 - , compatIfNeeded, libnv, libsbuf 6 }: 7 8 mkDerivation { 9 path = "usr.sbin/config"; 10 nativeBuildInputs = [ 11 - bsdSetupHook freebsdSetupHook 12 - makeMinimal install mandoc groff 13 14 - flex byacc file2c 15 ]; 16 - buildInputs = compatIfNeeded ++ [ libnv libsbuf ]; 17 }
··· 1 + { 2 + mkDerivation, 3 + bsdSetupHook, 4 + freebsdSetupHook, 5 + makeMinimal, 6 + install, 7 + mandoc, 8 + groff, 9 + flex, 10 + byacc, 11 + file2c, 12 + compatIfNeeded, 13 + libnv, 14 + libsbuf, 15 }: 16 17 mkDerivation { 18 path = "usr.sbin/config"; 19 nativeBuildInputs = [ 20 + bsdSetupHook 21 + freebsdSetupHook 22 + makeMinimal 23 + install 24 + mandoc 25 + groff 26 27 + flex 28 + byacc 29 + file2c 30 + ]; 31 + buildInputs = compatIfNeeded ++ [ 32 + libnv 33 + libsbuf 34 ]; 35 }
+16 -8
pkgs/os-specific/bsd/freebsd/pkgs/csu.nix
··· 1 - { lib, mkDerivation 2 - , bsdSetupHook, freebsdSetupHook 3 - , makeMinimal 4 - , install 5 - , flex, byacc, gencat 6 - , include 7 }: 8 9 mkDerivation { ··· 13 "lib/libc/include/libc_private.h" 14 ]; 15 nativeBuildInputs = [ 16 - bsdSetupHook freebsdSetupHook 17 makeMinimal 18 install 19 20 - flex byacc gencat 21 ]; 22 buildInputs = [ include ]; 23 MK_TESTS = "no";
··· 1 + { 2 + lib, 3 + mkDerivation, 4 + bsdSetupHook, 5 + freebsdSetupHook, 6 + makeMinimal, 7 + install, 8 + flex, 9 + byacc, 10 + gencat, 11 + include, 12 }: 13 14 mkDerivation { ··· 18 "lib/libc/include/libc_private.h" 19 ]; 20 nativeBuildInputs = [ 21 + bsdSetupHook 22 + freebsdSetupHook 23 makeMinimal 24 install 25 26 + flex 27 + byacc 28 + gencat 29 ]; 30 buildInputs = [ include ]; 31 MK_TESTS = "no";
+25 -7
pkgs/os-specific/bsd/freebsd/pkgs/ctfconvert.nix
··· 1 - { lib, stdenv, mkDerivation 2 - , bsdSetupHook, freebsdSetupHook 3 - , makeMinimal, install, mandoc, groff 4 - , compatIfNeeded, libelf, libdwarf, zlib, libspl 5 }: 6 7 mkDerivation { ··· 16 OPENSOLARIS_USR_DISTDIR = "$(SRCTOP)/cddl/contrib/opensolaris"; 17 OPENSOLARIS_SYS_DISTDIR = "$(SRCTOP)/sys/cddl/contrib/opensolaris"; 18 nativeBuildInputs = [ 19 - bsdSetupHook freebsdSetupHook 20 - makeMinimal install mandoc groff 21 22 # flex byacc file2c 23 ]; 24 buildInputs = compatIfNeeded ++ [ 25 - libelf libdwarf zlib libspl 26 ]; 27 meta.license = lib.licenses.cddl; 28 }
··· 1 + { 2 + lib, 3 + stdenv, 4 + mkDerivation, 5 + bsdSetupHook, 6 + freebsdSetupHook, 7 + makeMinimal, 8 + install, 9 + mandoc, 10 + groff, 11 + compatIfNeeded, 12 + libelf, 13 + libdwarf, 14 + zlib, 15 + libspl, 16 }: 17 18 mkDerivation { ··· 27 OPENSOLARIS_USR_DISTDIR = "$(SRCTOP)/cddl/contrib/opensolaris"; 28 OPENSOLARIS_SYS_DISTDIR = "$(SRCTOP)/sys/cddl/contrib/opensolaris"; 29 nativeBuildInputs = [ 30 + bsdSetupHook 31 + freebsdSetupHook 32 + makeMinimal 33 + install 34 + mandoc 35 + groff 36 37 # flex byacc file2c 38 ]; 39 buildInputs = compatIfNeeded ++ [ 40 + libelf 41 + libdwarf 42 + zlib 43 + libspl 44 ]; 45 meta.license = lib.licenses.cddl; 46 }
+1 -3
pkgs/os-specific/bsd/freebsd/pkgs/freebsdSetupHook/package.nix
··· 1 { makeSetupHook }: 2 3 - makeSetupHook { 4 - name = "freebsd-setup-hook"; 5 - } ./setup-hook.sh
··· 1 { makeSetupHook }: 2 3 + makeSetupHook { name = "freebsd-setup-hook"; } ./setup-hook.sh
+1 -3
pkgs/os-specific/bsd/freebsd/pkgs/gencat.nix
··· 1 { mkDerivation }: 2 3 - mkDerivation { 4 - path = "usr.bin/gencat"; 5 - }
··· 1 { mkDerivation }: 2 3 + mkDerivation { path = "usr.bin/gencat"; }
+22 -15
pkgs/os-specific/bsd/freebsd/pkgs/include/package.nix
··· 1 - { lib, mkDerivation, patchesRoot 2 - , buildPackages 3 - , bsdSetupHook, freebsdSetupHook 4 - , makeMinimal 5 - , install 6 - , mandoc, groff, rsync /*, nbperf*/, rpcgen 7 }: 8 9 mkDerivation { ··· 15 "sys" 16 ]; 17 18 - nativeBuildInputs = [ 19 - bsdSetupHook freebsdSetupHook 20 makeMinimal 21 install 22 - mandoc groff rsync /*nbperf*/ rpcgen 23 24 # HACK use NetBSD's for now 25 buildPackages.netbsd.mtree 26 ]; 27 28 - patches = [ 29 - /${patchesRoot}/no-perms-BSD.include.dist.patch 30 - ]; 31 32 # The makefiles define INCSDIR per subdirectory, so we have to set 33 # something else on the command line so those definitions aren't ··· 39 {} \; 40 ''; 41 42 - makeFlags = [ 43 - "RPCGEN_CPP=${buildPackages.stdenv.cc.cc}/bin/cpp" 44 - ]; 45 46 # multiple header dirs, see above 47 postConfigure = ''
··· 1 + { 2 + lib, 3 + mkDerivation, 4 + patchesRoot, 5 + buildPackages, 6 + bsdSetupHook, 7 + freebsdSetupHook, 8 + makeMinimal, 9 + install, 10 + mandoc, 11 + groff, 12 + rsync, # , nbperf 13 + rpcgen, 14 }: 15 16 mkDerivation { ··· 22 "sys" 23 ]; 24 25 + nativeBuildInputs = [ 26 + bsdSetupHook 27 + freebsdSetupHook 28 makeMinimal 29 install 30 + mandoc 31 + groff 32 + rsync # nbperf 33 + rpcgen 34 35 # HACK use NetBSD's for now 36 buildPackages.netbsd.mtree 37 ]; 38 39 + patches = [ /${patchesRoot}/no-perms-BSD.include.dist.patch ]; 40 41 # The makefiles define INCSDIR per subdirectory, so we have to set 42 # something else on the command line so those definitions aren't ··· 48 {} \; 49 ''; 50 51 + makeFlags = [ "RPCGEN_CPP=${buildPackages.stdenv.cc.cc}/bin/cpp" ]; 52 53 # multiple header dirs, see above 54 postConfigure = ''
+40 -18
pkgs/os-specific/bsd/freebsd/pkgs/install.nix
··· 1 - { lib, stdenv, mkDerivation, writeShellScript 2 - , freebsd-lib 3 - , mtree 4 - , bsdSetupHook, freebsdSetupHook 5 - , makeMinimal, mandoc, groff 6 - , boot-install, install 7 - , compatIfNeeded, libmd, libnetbsd 8 }: 9 10 # HACK: to ensure parent directories exist. This emulates GNU 11 # install’s -D option. No alternative seems to exist in BSD install. 12 let 13 - binstall = writeShellScript "binstall" (freebsd-lib.install-wrapper + '' 14 15 - @out@/bin/xinstall "''${args[@]}" 16 - ''); 17 - in mkDerivation { 18 path = "usr.bin/xinstall"; 19 extraPaths = [ mtree.path ]; 20 nativeBuildInputs = [ 21 - bsdSetupHook freebsdSetupHook 22 - makeMinimal mandoc groff 23 - (if stdenv.hostPlatform == stdenv.buildPlatform 24 - then boot-install 25 - else install) 26 ]; 27 skipIncludesPhase = true; 28 - buildInputs = compatIfNeeded ++ [ libmd libnetbsd ]; 29 makeFlags = [ 30 "STRIP=-s" # flag to install, not command 31 "MK_WERROR=no" ··· 37 mv $out/bin/install $out/bin/xinstall 38 ln -s ./binstall $out/bin/install 39 ''; 40 - outputs = [ "out" "man" "test" ]; 41 }
··· 1 + { 2 + lib, 3 + stdenv, 4 + mkDerivation, 5 + writeShellScript, 6 + freebsd-lib, 7 + mtree, 8 + bsdSetupHook, 9 + freebsdSetupHook, 10 + makeMinimal, 11 + mandoc, 12 + groff, 13 + boot-install, 14 + install, 15 + compatIfNeeded, 16 + libmd, 17 + libnetbsd, 18 }: 19 20 # HACK: to ensure parent directories exist. This emulates GNU 21 # install’s -D option. No alternative seems to exist in BSD install. 22 let 23 + binstall = writeShellScript "binstall" ( 24 + freebsd-lib.install-wrapper 25 + + '' 26 27 + @out@/bin/xinstall "''${args[@]}" 28 + '' 29 + ); 30 + in 31 + mkDerivation { 32 path = "usr.bin/xinstall"; 33 extraPaths = [ mtree.path ]; 34 nativeBuildInputs = [ 35 + bsdSetupHook 36 + freebsdSetupHook 37 + makeMinimal 38 + mandoc 39 + groff 40 + (if stdenv.hostPlatform == stdenv.buildPlatform then boot-install else install) 41 ]; 42 skipIncludesPhase = true; 43 + buildInputs = compatIfNeeded ++ [ 44 + libmd 45 + libnetbsd 46 + ]; 47 makeFlags = [ 48 "STRIP=-s" # flag to install, not command 49 "MK_WERROR=no" ··· 55 mv $out/bin/install $out/bin/xinstall 56 ln -s ./binstall $out/bin/install 57 ''; 58 + outputs = [ 59 + "out" 60 + "man" 61 + "test" 62 + ]; 63 }
+25 -10
pkgs/os-specific/bsd/freebsd/pkgs/libc/package.nix
··· 1 - { lib, stdenv, mkDerivation 2 - , patchesRoot 3 4 - , bsdSetupHook, freebsdSetupHook 5 - , makeMinimal 6 - , install 7 - , flex, byacc, gencat, rpcgen 8 9 - , csu, include 10 }: 11 12 mkDerivation rec { ··· 63 ''; 64 65 nativeBuildInputs = [ 66 - bsdSetupHook freebsdSetupHook 67 makeMinimal 68 install 69 70 - flex byacc gencat rpcgen 71 ]; 72 - buildInputs = [ include csu ]; 73 env.NIX_CFLAGS_COMPILE = "-B${csu}/lib"; 74 75 # Suppress lld >= 16 undefined version errors
··· 1 + { 2 + lib, 3 + stdenv, 4 + mkDerivation, 5 + patchesRoot, 6 7 + bsdSetupHook, 8 + freebsdSetupHook, 9 + makeMinimal, 10 + install, 11 + flex, 12 + byacc, 13 + gencat, 14 + rpcgen, 15 16 + csu, 17 + include, 18 }: 19 20 mkDerivation rec { ··· 71 ''; 72 73 nativeBuildInputs = [ 74 + bsdSetupHook 75 + freebsdSetupHook 76 makeMinimal 77 install 78 79 + flex 80 + byacc 81 + gencat 82 + rpcgen 83 ]; 84 + buildInputs = [ 85 + include 86 + csu 87 + ]; 88 env.NIX_CFLAGS_COMPILE = "-B${csu}/lib"; 89 90 # Suppress lld >= 16 undefined version errors
+20 -10
pkgs/os-specific/bsd/freebsd/pkgs/libdwarf.nix
··· 1 - { lib, stdenv, mkDerivation 2 - , bsdSetupHook, freebsdSetupHook 3 - , makeMinimal, install, mandoc, groff 4 - , m4 5 - , compatIfNeeded, libelf 6 }: 7 8 mkDerivation { ··· 15 "sys/sys/elf_common.h" 16 ]; 17 nativeBuildInputs = [ 18 - bsdSetupHook freebsdSetupHook 19 - makeMinimal install mandoc groff 20 21 m4 22 ]; 23 - buildInputs = compatIfNeeded ++ [ 24 - libelf 25 - ]; 26 MK_TESTS = "no"; 27 }
··· 1 + { 2 + lib, 3 + stdenv, 4 + mkDerivation, 5 + bsdSetupHook, 6 + freebsdSetupHook, 7 + makeMinimal, 8 + install, 9 + mandoc, 10 + groff, 11 + m4, 12 + compatIfNeeded, 13 + libelf, 14 }: 15 16 mkDerivation { ··· 23 "sys/sys/elf_common.h" 24 ]; 25 nativeBuildInputs = [ 26 + bsdSetupHook 27 + freebsdSetupHook 28 + makeMinimal 29 + install 30 + mandoc 31 + groff 32 33 m4 34 ]; 35 + buildInputs = compatIfNeeded ++ [ libelf ]; 36 MK_TESTS = "no"; 37 }
+17 -6
pkgs/os-specific/bsd/freebsd/pkgs/libelf.nix
··· 1 - { lib, stdenv, mkDerivation 2 - , bsdSetupHook, freebsdSetupHook 3 - , makeMinimal, install, mandoc, groff 4 - , m4 5 }: 6 7 mkDerivation { ··· 15 ]; 16 BOOTSTRAPPING = !stdenv.isFreeBSD; 17 nativeBuildInputs = [ 18 - bsdSetupHook freebsdSetupHook 19 - makeMinimal install mandoc groff 20 21 m4 22 ];
··· 1 + { 2 + lib, 3 + stdenv, 4 + mkDerivation, 5 + bsdSetupHook, 6 + freebsdSetupHook, 7 + makeMinimal, 8 + install, 9 + mandoc, 10 + groff, 11 + m4, 12 }: 13 14 mkDerivation { ··· 22 ]; 23 BOOTSTRAPPING = !stdenv.isFreeBSD; 24 nativeBuildInputs = [ 25 + bsdSetupHook 26 + freebsdSetupHook 27 + makeMinimal 28 + install 29 + mandoc 30 + groff 31 32 m4 33 ];
+19 -10
pkgs/os-specific/bsd/freebsd/pkgs/libnetbsd/package.nix
··· 1 - { lib, stdenv 2 - , mkDerivation, patchesRoot 3 - , bsdSetupHook, freebsdSetupHook, makeMinimal, mandoc, groff 4 - , boot-install, install 5 - , compatIfNeeded 6 }: 7 8 mkDerivation { 9 path = "lib/libnetbsd"; 10 nativeBuildInputs = [ 11 - bsdSetupHook freebsdSetupHook 12 - makeMinimal mandoc groff 13 - (if stdenv.hostPlatform == stdenv.buildPlatform 14 - then boot-install 15 - else install) 16 ]; 17 patches = lib.optionals (!stdenv.hostPlatform.isFreeBSD) [ 18 /${patchesRoot}/libnetbsd-do-install.patch
··· 1 + { 2 + lib, 3 + stdenv, 4 + mkDerivation, 5 + patchesRoot, 6 + bsdSetupHook, 7 + freebsdSetupHook, 8 + makeMinimal, 9 + mandoc, 10 + groff, 11 + boot-install, 12 + install, 13 + compatIfNeeded, 14 }: 15 16 mkDerivation { 17 path = "lib/libnetbsd"; 18 nativeBuildInputs = [ 19 + bsdSetupHook 20 + freebsdSetupHook 21 + makeMinimal 22 + mandoc 23 + groff 24 + (if stdenv.hostPlatform == stdenv.buildPlatform then boot-install else install) 25 ]; 26 patches = lib.optionals (!stdenv.hostPlatform.isFreeBSD) [ 27 /${patchesRoot}/libnetbsd-do-install.patch
+1 -3
pkgs/os-specific/bsd/freebsd/pkgs/libsbuf.nix
··· 2 3 mkDerivation { 4 path = "lib/libsbuf"; 5 - extraPaths = [ 6 - "sys/kern" 7 - ]; 8 MK_TESTS = "no"; 9 }
··· 2 3 mkDerivation { 4 path = "lib/libsbuf"; 5 + extraPaths = [ "sys/kern" ]; 6 MK_TESTS = "no"; 7 }
+6 -2
pkgs/os-specific/bsd/freebsd/pkgs/libutil.nix
··· 1 - { mkDerivation, lib, stdenv }: 2 mkDerivation { 3 path = "lib/libutil"; 4 - extraPaths = ["lib/libc/gen"]; 5 clangFixup = true; 6 MK_TESTS = "no"; 7 }
··· 1 + { 2 + mkDerivation, 3 + lib, 4 + stdenv, 5 + }: 6 mkDerivation { 7 path = "lib/libutil"; 8 + extraPaths = [ "lib/libc/gen" ]; 9 clangFixup = true; 10 MK_TESTS = "no"; 11 }
+11 -5
pkgs/os-specific/bsd/freebsd/pkgs/lorder.nix
··· 1 - { mkDerivation 2 - , bsdSetupHook, freebsdSetupHook 3 }: 4 5 mkDerivation rec { ··· 13 mv "lorder.1" "$man/share/man" 14 ''; 15 nativeBuildInputs = [ 16 - bsdSetupHook freebsdSetupHook 17 ]; 18 - buildInputs = []; 19 - outputs = [ "out" "man" ]; 20 }
··· 1 + { 2 + mkDerivation, 3 + bsdSetupHook, 4 + freebsdSetupHook, 5 }: 6 7 mkDerivation rec { ··· 15 mv "lorder.1" "$man/share/man" 16 ''; 17 nativeBuildInputs = [ 18 + bsdSetupHook 19 + freebsdSetupHook 20 ]; 21 + buildInputs = [ ]; 22 + outputs = [ 23 + "out" 24 + "man" 25 + ]; 26 }
+16 -11
pkgs/os-specific/bsd/freebsd/pkgs/make.nix
··· 1 - { lib, mkDerivation, stdenv }: 2 3 mkDerivation { 4 path = "contrib/bmake"; 5 version = "9.2"; 6 - postPatch = '' 7 - # make needs this to pick up our sys make files 8 - export NIX_CFLAGS_COMPILE+=" -D_PATH_DEFSYSPATH=\"$out/share/mk\"" 9 10 - '' + lib.optionalString stdenv.isDarwin '' 11 - substituteInPlace $BSDSRCDIR/share/mk/bsd.sys.mk \ 12 - --replace '-Wl,--fatal-warnings' "" \ 13 - --replace '-Wl,--warn-shared-textrel' "" 14 - ''; 15 postInstall = '' 16 make -C $BSDSRCDIR/share/mk FILESDIR=$out/share/mk install 17 ''; 18 - extraPaths = [ "share/mk" ] 19 - ++ lib.optional (!stdenv.hostPlatform.isFreeBSD) "tools/build/mk"; 20 }
··· 1 + { 2 + lib, 3 + mkDerivation, 4 + stdenv, 5 + }: 6 7 mkDerivation { 8 path = "contrib/bmake"; 9 version = "9.2"; 10 + postPatch = 11 + '' 12 + # make needs this to pick up our sys make files 13 + export NIX_CFLAGS_COMPILE+=" -D_PATH_DEFSYSPATH=\"$out/share/mk\"" 14 15 + '' 16 + + lib.optionalString stdenv.isDarwin '' 17 + substituteInPlace $BSDSRCDIR/share/mk/bsd.sys.mk \ 18 + --replace '-Wl,--fatal-warnings' "" \ 19 + --replace '-Wl,--warn-shared-textrel' "" 20 + ''; 21 postInstall = '' 22 make -C $BSDSRCDIR/share/mk FILESDIR=$out/share/mk install 23 ''; 24 + extraPaths = [ "share/mk" ] ++ lib.optional (!stdenv.hostPlatform.isFreeBSD) "tools/build/mk"; 25 }
+11 -6
pkgs/os-specific/bsd/freebsd/pkgs/makeMinimal.nix
··· 1 - { lib, stdenv, mkDerivation 2 - , make 3 - , bsdSetupHook, freebsdSetupHook 4 }: 5 6 mkDerivation rec { 7 inherit (make) path; 8 9 - buildInputs = []; 10 nativeBuildInputs = [ 11 - bsdSetupHook freebsdSetupHook 12 ]; 13 14 skipIncludesPhase = true; 15 16 - makeFlags = []; 17 18 postPatch = '' 19 patchShebangs configure
··· 1 + { 2 + lib, 3 + stdenv, 4 + mkDerivation, 5 + make, 6 + bsdSetupHook, 7 + freebsdSetupHook, 8 }: 9 10 mkDerivation rec { 11 inherit (make) path; 12 13 + buildInputs = [ ]; 14 nativeBuildInputs = [ 15 + bsdSetupHook 16 + freebsdSetupHook 17 ]; 18 19 skipIncludesPhase = true; 20 21 + makeFlags = [ ]; 22 23 postPatch = '' 24 patchShebangs configure
+86 -65
pkgs/os-specific/bsd/freebsd/pkgs/mkDerivation.nix
··· 1 - { lib, stdenv, stdenvNoCC 2 - , compatIfNeeded 3 - , runCommand, rsync 4 - , freebsd-lib 5 - , source 6 - , bsdSetupHook, freebsdSetupHook 7 - , makeMinimal 8 - , install, tsort, lorder, mandoc, groff 9 }: 10 11 - lib.makeOverridable (attrs: let 12 - stdenv' = if attrs.noCC or false then stdenvNoCC else stdenv; 13 - in stdenv'.mkDerivation (rec { 14 - pname = "${attrs.pname or (baseNameOf attrs.path)}-freebsd"; 15 - inherit (freebsd-lib) version; 16 - src = runCommand "${pname}-filtered-src" { 17 - nativeBuildInputs = [ rsync ]; 18 - } '' 19 - for p in ${lib.concatStringsSep " " ([ attrs.path ] ++ attrs.extraPaths or [])}; do 20 - set -x 21 - path="$out/$p" 22 - mkdir -p "$(dirname "$path")" 23 - src_path="${source}/$p" 24 - if [[ -d "$src_path" ]]; then src_path+=/; fi 25 - rsync --chmod="+w" -r "$src_path" "$path" 26 - set +x 27 - done 28 - ''; 29 30 - extraPaths = [ ]; 31 32 - nativeBuildInputs = [ 33 - bsdSetupHook freebsdSetupHook 34 - makeMinimal 35 - install tsort lorder mandoc groff #statHook 36 - ]; 37 - buildInputs = compatIfNeeded; 38 39 - HOST_SH = stdenv'.shell; 40 41 - # Since STRIP below is the flag 42 - STRIPBIN = "${stdenv.cc.bintools.targetPrefix}strip"; 43 44 - makeFlags = [ 45 - "STRIP=-s" # flag to install, not command 46 - ] ++ lib.optional (!stdenv.hostPlatform.isFreeBSD) "MK_WERROR=no"; 47 48 - # amd64 not x86_64 for this on unlike NetBSD 49 - MACHINE_ARCH = freebsd-lib.mkBsdArch stdenv'; 50 51 - MACHINE = freebsd-lib.mkBsdArch stdenv'; 52 53 - MACHINE_CPUARCH = MACHINE_ARCH; 54 55 - COMPONENT_PATH = attrs.path or null; 56 57 - strictDeps = true; 58 59 - meta = with lib; { 60 - maintainers = with maintainers; [ ericson2314 ]; 61 - platforms = platforms.unix; 62 - license = licenses.bsd2; 63 - }; 64 - } // lib.optionalAttrs stdenv'.hasCC { 65 - # TODO should CC wrapper set this? 66 - CPP = "${stdenv'.cc.targetPrefix}cpp"; 67 - } // lib.optionalAttrs stdenv'.isDarwin { 68 - MKRELRO = "no"; 69 - } // lib.optionalAttrs (stdenv'.cc.isClang or false) { 70 - HAVE_LLVM = lib.versions.major (lib.getVersion stdenv'.cc.cc); 71 - } // lib.optionalAttrs (stdenv'.cc.isGNU or false) { 72 - HAVE_GCC = lib.versions.major (lib.getVersion stdenv'.cc.cc); 73 - } // lib.optionalAttrs (stdenv'.isx86_32) { 74 - USE_SSP = "no"; 75 - } // lib.optionalAttrs (attrs.headersOnly or false) { 76 - installPhase = "includesPhase"; 77 - dontBuild = true; 78 - } // attrs))
··· 1 + { 2 + lib, 3 + stdenv, 4 + stdenvNoCC, 5 + compatIfNeeded, 6 + runCommand, 7 + rsync, 8 + freebsd-lib, 9 + source, 10 + bsdSetupHook, 11 + freebsdSetupHook, 12 + makeMinimal, 13 + install, 14 + tsort, 15 + lorder, 16 + mandoc, 17 + groff, 18 }: 19 20 + lib.makeOverridable ( 21 + attrs: 22 + let 23 + stdenv' = if attrs.noCC or false then stdenvNoCC else stdenv; 24 + in 25 + stdenv'.mkDerivation ( 26 + rec { 27 + pname = "${attrs.pname or (baseNameOf attrs.path)}-freebsd"; 28 + inherit (freebsd-lib) version; 29 + src = runCommand "${pname}-filtered-src" { nativeBuildInputs = [ rsync ]; } '' 30 + for p in ${lib.concatStringsSep " " ([ attrs.path ] ++ attrs.extraPaths or [ ])}; do 31 + set -x 32 + path="$out/$p" 33 + mkdir -p "$(dirname "$path")" 34 + src_path="${source}/$p" 35 + if [[ -d "$src_path" ]]; then src_path+=/; fi 36 + rsync --chmod="+w" -r "$src_path" "$path" 37 + set +x 38 + done 39 + ''; 40 41 + extraPaths = [ ]; 42 43 + nativeBuildInputs = [ 44 + bsdSetupHook 45 + freebsdSetupHook 46 + makeMinimal 47 + install 48 + tsort 49 + lorder 50 + mandoc 51 + groff # statHook 52 + ]; 53 + buildInputs = compatIfNeeded; 54 55 + HOST_SH = stdenv'.shell; 56 57 + # Since STRIP below is the flag 58 + STRIPBIN = "${stdenv.cc.bintools.targetPrefix}strip"; 59 60 + makeFlags = [ 61 + "STRIP=-s" # flag to install, not command 62 + ] ++ lib.optional (!stdenv.hostPlatform.isFreeBSD) "MK_WERROR=no"; 63 64 + # amd64 not x86_64 for this on unlike NetBSD 65 + MACHINE_ARCH = freebsd-lib.mkBsdArch stdenv'; 66 67 + MACHINE = freebsd-lib.mkBsdArch stdenv'; 68 69 + MACHINE_CPUARCH = MACHINE_ARCH; 70 71 + COMPONENT_PATH = attrs.path or null; 72 73 + strictDeps = true; 74 75 + meta = with lib; { 76 + maintainers = with maintainers; [ ericson2314 ]; 77 + platforms = platforms.unix; 78 + license = licenses.bsd2; 79 + }; 80 + } 81 + // lib.optionalAttrs stdenv'.hasCC { 82 + # TODO should CC wrapper set this? 83 + CPP = "${stdenv'.cc.targetPrefix}cpp"; 84 + } 85 + // lib.optionalAttrs stdenv'.isDarwin { MKRELRO = "no"; } 86 + // lib.optionalAttrs (stdenv'.cc.isClang or false) { 87 + HAVE_LLVM = lib.versions.major (lib.getVersion stdenv'.cc.cc); 88 + } 89 + // lib.optionalAttrs (stdenv'.cc.isGNU or false) { 90 + HAVE_GCC = lib.versions.major (lib.getVersion stdenv'.cc.cc); 91 + } 92 + // lib.optionalAttrs (stdenv'.isx86_32) { USE_SSP = "no"; } 93 + // lib.optionalAttrs (attrs.headersOnly or false) { 94 + installPhase = "includesPhase"; 95 + dontBuild = true; 96 + } 97 + // attrs 98 + ) 99 + )
+1 -3
pkgs/os-specific/bsd/freebsd/pkgs/mknod.nix
··· 1 { mkDerivation }: 2 3 - mkDerivation { 4 - path = "sbin/mknod"; 5 - }
··· 1 { mkDerivation }: 2 3 + mkDerivation { path = "sbin/mknod"; }
+6 -1
pkgs/os-specific/bsd/freebsd/pkgs/rpcgen/package.nix
··· 1 - { lib, mkDerivation, stdenv, patchesRoot }: 2 3 mkDerivation rec { 4 path = "usr.bin/rpcgen";
··· 1 + { 2 + lib, 3 + mkDerivation, 4 + stdenv, 5 + patchesRoot, 6 + }: 7 8 mkDerivation rec { 9 path = "usr.bin/rpcgen";
+14 -5
pkgs/os-specific/bsd/freebsd/pkgs/stat.nix
··· 1 - { mkDerivation 2 - , bsdSetupHook, freebsdSetupHook 3 - , makeMinimal, install, mandoc, groff 4 }: 5 6 # Don't add this to nativeBuildInputs directly. Use statHook instead. 7 mkDerivation { 8 path = "usr.bin/stat"; 9 nativeBuildInputs = [ 10 - bsdSetupHook freebsdSetupHook 11 - makeMinimal install mandoc groff 12 ]; 13 }
··· 1 + { 2 + mkDerivation, 3 + bsdSetupHook, 4 + freebsdSetupHook, 5 + makeMinimal, 6 + install, 7 + mandoc, 8 + groff, 9 }: 10 11 # Don't add this to nativeBuildInputs directly. Use statHook instead. 12 mkDerivation { 13 path = "usr.bin/stat"; 14 nativeBuildInputs = [ 15 + bsdSetupHook 16 + freebsdSetupHook 17 + makeMinimal 18 + install 19 + mandoc 20 + groff 21 ]; 22 }
+10 -6
pkgs/os-specific/bsd/freebsd/pkgs/statHook.nix
··· 1 - { makeSetupHook, writeText, stat }: 2 3 # stat isn't in POSIX, and NetBSD stat supports a completely 4 # different range of flags than GNU stat, so including it in PATH 5 # breaks stdenv. Work around that with a hook that will point 6 # NetBSD's build system and NetBSD stat without including it in 7 # PATH. 8 - makeSetupHook { 9 - name = "netbsd-stat-hook"; 10 - } (writeText "netbsd-stat-hook-impl" '' 11 - makeFlagsArray+=(TOOL_STAT=${stat}/bin/stat) 12 - '')
··· 1 + { 2 + makeSetupHook, 3 + writeText, 4 + stat, 5 + }: 6 7 # stat isn't in POSIX, and NetBSD stat supports a completely 8 # different range of flags than GNU stat, so including it in PATH 9 # breaks stdenv. Work around that with a hook that will point 10 # NetBSD's build system and NetBSD stat without including it in 11 # PATH. 12 + makeSetupHook { name = "netbsd-stat-hook"; } ( 13 + writeText "netbsd-stat-hook-impl" '' 14 + makeFlagsArray+=(TOOL_STAT=${stat}/bin/stat) 15 + '' 16 + )
+75 -50
pkgs/os-specific/bsd/freebsd/pkgs/sys/package.nix
··· 1 - { stdenv, mkDerivation, freebsd-lib, patchesRoot 2 - , buildPackages 3 - , bsdSetupHook, freebsdSetupHook 4 - , makeMinimal, install, mandoc, groff 5 - , config, rpcgen, file2c, gawk, uudecode, xargs-j #, ctfconvert 6 }: 7 8 - mkDerivation (let 9 - cfg = "MINIMAL"; 10 - in rec { 11 - path = "sys"; 12 13 - nativeBuildInputs = [ 14 - bsdSetupHook freebsdSetupHook 15 - makeMinimal install mandoc groff 16 17 - config rpcgen file2c gawk uudecode xargs-j 18 - #ctfconvert 19 - ]; 20 21 - patches = [ 22 - /${patchesRoot}/sys-gnu-date.patch 23 - /${patchesRoot}/sys-no-explicit-intrinsics-dep.patch 24 - ]; 25 26 - # --dynamic-linker /red/herring is used when building the kernel. 27 - NIX_ENFORCE_PURITY = 0; 28 29 - AWK = "${buildPackages.gawk}/bin/awk"; 30 31 - CWARNEXTRA = "-Wno-error=shift-negative-value -Wno-address-of-packed-member"; 32 33 - MK_CTF = "no"; 34 35 - KODIR = "${builtins.placeholder "out"}/kernel"; 36 - KMODDIR = "${builtins.placeholder "out"}/kernel"; 37 - DTBDIR = "${builtins.placeholder"out"}/dbt"; 38 39 - KERN_DEBUGDIR = "${builtins.placeholder "out"}/debug"; 40 - KERN_DEBUGDIR_KODIR = "${KERN_DEBUGDIR}/kernel"; 41 - KERN_DEBUGDIR_KMODDIR = "${KERN_DEBUGDIR}/kernel"; 42 43 - skipIncludesPhase = true; 44 45 - configurePhase = '' 46 - runHook preConfigure 47 48 - for f in conf/kmod.mk contrib/dev/acpica/acpica_prep.sh; do 49 - substituteInPlace "$f" --replace 'xargs -J' 'xargs-j ' 50 - done 51 52 - for f in conf/*.mk; do 53 - substituteInPlace "$f" --replace 'KERN_DEBUGDIR}''${' 'KERN_DEBUGDIR_' 54 - done 55 56 - cd ${freebsd-lib.mkBsdArch stdenv}/conf 57 - sed -i ${cfg} \ 58 - -e 's/WITH_CTF=1/WITH_CTF=0/' \ 59 - -e '/KDTRACE/d' 60 - config ${cfg} 61 62 - runHook postConfigure 63 - ''; 64 - preBuild = '' 65 - cd ../compile/${cfg} 66 - ''; 67 - })
··· 1 + { 2 + stdenv, 3 + mkDerivation, 4 + freebsd-lib, 5 + patchesRoot, 6 + buildPackages, 7 + bsdSetupHook, 8 + freebsdSetupHook, 9 + makeMinimal, 10 + install, 11 + mandoc, 12 + groff, 13 + config, 14 + rpcgen, 15 + file2c, 16 + gawk, 17 + uudecode, 18 + xargs-j, # , ctfconvert 19 }: 20 21 + mkDerivation ( 22 + let 23 + cfg = "MINIMAL"; 24 + in 25 + rec { 26 + path = "sys"; 27 28 + nativeBuildInputs = [ 29 + bsdSetupHook 30 + freebsdSetupHook 31 + makeMinimal 32 + install 33 + mandoc 34 + groff 35 36 + config 37 + rpcgen 38 + file2c 39 + gawk 40 + uudecode 41 + xargs-j 42 + #ctfconvert 43 + ]; 44 45 + patches = [ 46 + /${patchesRoot}/sys-gnu-date.patch 47 + /${patchesRoot}/sys-no-explicit-intrinsics-dep.patch 48 + ]; 49 50 + # --dynamic-linker /red/herring is used when building the kernel. 51 + NIX_ENFORCE_PURITY = 0; 52 53 + AWK = "${buildPackages.gawk}/bin/awk"; 54 55 + CWARNEXTRA = "-Wno-error=shift-negative-value -Wno-address-of-packed-member"; 56 57 + MK_CTF = "no"; 58 59 + KODIR = "${builtins.placeholder "out"}/kernel"; 60 + KMODDIR = "${builtins.placeholder "out"}/kernel"; 61 + DTBDIR = "${builtins.placeholder "out"}/dbt"; 62 63 + KERN_DEBUGDIR = "${builtins.placeholder "out"}/debug"; 64 + KERN_DEBUGDIR_KODIR = "${KERN_DEBUGDIR}/kernel"; 65 + KERN_DEBUGDIR_KMODDIR = "${KERN_DEBUGDIR}/kernel"; 66 67 + skipIncludesPhase = true; 68 69 + configurePhase = '' 70 + runHook preConfigure 71 72 + for f in conf/kmod.mk contrib/dev/acpica/acpica_prep.sh; do 73 + substituteInPlace "$f" --replace 'xargs -J' 'xargs-j ' 74 + done 75 76 + for f in conf/*.mk; do 77 + substituteInPlace "$f" --replace 'KERN_DEBUGDIR}''${' 'KERN_DEBUGDIR_' 78 + done 79 80 + cd ${freebsd-lib.mkBsdArch stdenv}/conf 81 + sed -i ${cfg} \ 82 + -e 's/WITH_CTF=1/WITH_CTF=0/' \ 83 + -e '/KDTRACE/d' 84 + config ${cfg} 85 86 + runHook postConfigure 87 + ''; 88 + preBuild = '' 89 + cd ../compile/${cfg} 90 + ''; 91 + } 92 + )
+15 -6
pkgs/os-specific/bsd/freebsd/pkgs/tsort.nix
··· 1 - { mkDerivation 2 - , bsdSetupHook, freebsdSetupHook 3 - , makeMinimal, install, mandoc, groff 4 }: 5 6 mkDerivation { 7 path = "usr.bin/tsort"; 8 - nativeBuildInputs = [ 9 - bsdSetupHook freebsdSetupHook 10 - makeMinimal install mandoc groff 11 ]; 12 }
··· 1 + { 2 + mkDerivation, 3 + bsdSetupHook, 4 + freebsdSetupHook, 5 + makeMinimal, 6 + install, 7 + mandoc, 8 + groff, 9 }: 10 11 mkDerivation { 12 path = "usr.bin/tsort"; 13 + nativeBuildInputs = [ 14 + bsdSetupHook 15 + freebsdSetupHook 16 + makeMinimal 17 + install 18 + mandoc 19 + groff 20 ]; 21 }
+161 -111
pkgs/os-specific/bsd/netbsd/default.nix
··· 1 - { stdenv, lib, stdenvNoCC 2 - , makeScopeWithSplicing', generateSplicesForMkScope 3 - , buildPackages 4 - , fetchcvs 5 }: 6 7 makeScopeWithSplicing' { 8 otherSplices = generateSplicesForMkScope "netbsd"; 9 - f = (self: lib.packagesFromDirectoryRecursive { 10 - callPackage = self.callPackage; 11 - directory = ./pkgs; 12 - } // (let inherit (self) mkDerivation; in { 13 - 14 - fetchNetBSD = path: version: sha256: fetchcvs { 15 - cvsRoot = ":pserver:anoncvs@anoncvs.NetBSD.org:/cvsroot"; 16 - module = "src/${path}"; 17 - inherit sha256; 18 - tag = "netbsd-${lib.replaceStrings ["."] ["-"] version}-RELEASE"; 19 - }; 20 - 21 - defaultMakeFlags = [ 22 - "MKSOFTFLOAT=${if stdenv.hostPlatform.gcc.float or (stdenv.hostPlatform.parsed.abi.float or "hard") == "soft" 23 - then "yes" 24 - else "no"}" 25 - ]; 26 27 - compatIfNeeded = lib.optional (!stdenvNoCC.hostPlatform.isNetBSD) self.compat; 28 29 - # The manual callPackages below should in principle be unnecessary because 30 - # they're just selecting arguments that would be selected anyway. However, 31 - # if we don't perform these manual calls, we get infinite recursion issues 32 - # because of the splices. 33 34 - mkDerivation = self.callPackage ./pkgs/mkDerivation.nix { 35 - inherit stdenv stdenvNoCC; 36 - inherit (buildPackages.netbsd) netbsdSetupHook makeMinimal install tsort lorder; 37 - inherit (buildPackages) mandoc; 38 - inherit (buildPackages.buildPackages) rsync; 39 40 - }; 41 42 - makeMinimal = self.callPackage ./pkgs/makeMinimal.nix { 43 - inherit (self) make; 44 - }; 45 46 - compat = self.callPackage ./pkgs/compat/package.nix { 47 - inherit (buildPackages) coreutils; 48 - inherit (buildPackages.darwin) cctools-port; 49 - inherit (buildPackages.buildPackages) rsync; 50 - inherit (buildPackages.netbsd) makeMinimal; 51 - inherit (self) install include libc libutil; 52 - }; 53 54 - install = self.callPackage ./pkgs/install/package.nix { 55 - inherit (self) fts mtree make compatIfNeeded; 56 - inherit (buildPackages.buildPackages) rsync; 57 - inherit (buildPackages.netbsd) makeMinimal; 58 - }; 59 60 - # See note in pkgs/stat/package.nix 61 - stat = self.callPackage ./pkgs/stat/package.nix { 62 - inherit (buildPackages.netbsd) makeMinimal install; 63 - inherit (buildPackages.buildPackages) rsync; 64 - }; 65 66 - # See note in pkgs/stat/hook.nix 67 - statHook = self.callPackage ./pkgs/stat/hook.nix { 68 - inherit (self) stat; 69 - }; 70 71 - tsort = self.callPackage ./pkgs/tsort.nix { 72 - inherit (buildPackages.netbsd) makeMinimal install; 73 - inherit (buildPackages.buildPackages) rsync; 74 - }; 75 76 - lorder = self.callPackage ./pkgs/lorder.nix { 77 - inherit (buildPackages.netbsd) makeMinimal install; 78 - inherit (buildPackages.buildPackages) rsync; 79 - }; 80 81 - config = self.callPackage ./pkgs/config.nix { 82 - inherit (buildPackages.netbsd) makeMinimal install; 83 - inherit (buildPackages.buildPackages) rsync; 84 - inherit (self) cksum; 85 - }; 86 87 - include = self.callPackage ./pkgs/include.nix { 88 - inherit (buildPackages.netbsd) 89 - makeMinimal install nbperf rpcgen; 90 - inherit (buildPackages) stdenv; 91 - inherit (buildPackages.buildPackages) rsync; 92 - }; 93 94 - sys-headers = self.callPackage ./pkgs/sys/headers.nix { 95 - inherit (buildPackages.netbsd) 96 - makeMinimal install tsort lorder statHook uudecode config genassym; 97 - inherit (buildPackages.buildPackages) rsync; 98 - }; 99 100 - libutil = self.callPackage ./pkgs/libutil.nix { 101 - inherit (self) libc sys; 102 - }; 103 104 - libpthread-headers = self.callPackage ./pkgs/libpthread/headers.nix { }; 105 106 - csu = self.callPackage ./pkgs/csu.nix { 107 - inherit (self) headers sys ld_elf_so; 108 - inherit (buildPackages.netbsd) 109 - netbsdSetupHook 110 - makeMinimal 111 - install 112 - genassym gencat lorder tsort statHook; 113 - inherit (buildPackages.buildPackages) rsync; 114 - }; 115 116 - _mainLibcExtraPaths = with self; [ 117 - common i18n_module.src sys.src 118 - ld_elf_so.src libpthread.src libm.src libresolv.src 119 - librpcsvc.src libutil.src librt.src libcrypt.src 120 - ]; 121 122 - libc = self.callPackage ./pkgs/libc.nix { 123 - inherit (self) headers csu librt; 124 - inherit (buildPackages.netbsd) 125 - netbsdSetupHook 126 - makeMinimal 127 - install 128 - genassym gencat lorder tsort statHook rpcgen; 129 - inherit (buildPackages.buildPackages) rsync; 130 - }; 131 132 - mtree = self.callPackage ./pkgs/mtree.nix { 133 - inherit (self) mknod; 134 - }; 135 136 - })); 137 }
··· 1 + { 2 + stdenv, 3 + lib, 4 + stdenvNoCC, 5 + makeScopeWithSplicing', 6 + generateSplicesForMkScope, 7 + buildPackages, 8 + fetchcvs, 9 }: 10 11 makeScopeWithSplicing' { 12 otherSplices = generateSplicesForMkScope "netbsd"; 13 + f = ( 14 + self: 15 + lib.packagesFromDirectoryRecursive { 16 + callPackage = self.callPackage; 17 + directory = ./pkgs; 18 + } 19 + // { 20 21 + fetchNetBSD = 22 + path: version: sha256: 23 + fetchcvs { 24 + cvsRoot = ":pserver:anoncvs@anoncvs.NetBSD.org:/cvsroot"; 25 + module = "src/${path}"; 26 + inherit sha256; 27 + tag = "netbsd-${lib.replaceStrings [ "." ] [ "-" ] version}-RELEASE"; 28 + }; 29 30 + defaultMakeFlags = [ 31 + "MKSOFTFLOAT=${ 32 + if stdenv.hostPlatform.gcc.float or (stdenv.hostPlatform.parsed.abi.float or "hard") == "soft" then 33 + "yes" 34 + else 35 + "no" 36 + }" 37 + ]; 38 39 + compatIfNeeded = lib.optional (!stdenvNoCC.hostPlatform.isNetBSD) self.compat; 40 41 + # The manual callPackages below should in principle be unnecessary because 42 + # they're just selecting arguments that would be selected anyway. However, 43 + # if we don't perform these manual calls, we get infinite recursion issues 44 + # because of the splices. 45 46 + mkDerivation = self.callPackage ./pkgs/mkDerivation.nix { 47 + inherit stdenv stdenvNoCC; 48 + inherit (buildPackages.netbsd) 49 + netbsdSetupHook 50 + makeMinimal 51 + install 52 + tsort 53 + lorder 54 + ; 55 + inherit (buildPackages) mandoc; 56 + inherit (buildPackages.buildPackages) rsync; 57 + }; 58 59 + makeMinimal = self.callPackage ./pkgs/makeMinimal.nix { inherit (self) make; }; 60 61 + compat = self.callPackage ./pkgs/compat/package.nix { 62 + inherit (buildPackages) coreutils; 63 + inherit (buildPackages.darwin) cctools-port; 64 + inherit (buildPackages.buildPackages) rsync; 65 + inherit (buildPackages.netbsd) makeMinimal; 66 + inherit (self) 67 + install 68 + include 69 + libc 70 + libutil 71 + ; 72 + }; 73 74 + install = self.callPackage ./pkgs/install/package.nix { 75 + inherit (self) 76 + fts 77 + mtree 78 + make 79 + compatIfNeeded 80 + ; 81 + inherit (buildPackages.buildPackages) rsync; 82 + inherit (buildPackages.netbsd) makeMinimal; 83 + }; 84 85 + # See note in pkgs/stat/package.nix 86 + stat = self.callPackage ./pkgs/stat/package.nix { 87 + inherit (buildPackages.netbsd) makeMinimal install; 88 + inherit (buildPackages.buildPackages) rsync; 89 + }; 90 91 + # See note in pkgs/stat/hook.nix 92 + statHook = self.callPackage ./pkgs/stat/hook.nix { inherit (self) stat; }; 93 94 + tsort = self.callPackage ./pkgs/tsort.nix { 95 + inherit (buildPackages.netbsd) makeMinimal install; 96 + inherit (buildPackages.buildPackages) rsync; 97 + }; 98 99 + lorder = self.callPackage ./pkgs/lorder.nix { 100 + inherit (buildPackages.netbsd) makeMinimal install; 101 + inherit (buildPackages.buildPackages) rsync; 102 + }; 103 104 + config = self.callPackage ./pkgs/config.nix { 105 + inherit (buildPackages.netbsd) makeMinimal install; 106 + inherit (buildPackages.buildPackages) rsync; 107 + inherit (self) cksum; 108 + }; 109 110 + include = self.callPackage ./pkgs/include.nix { 111 + inherit (buildPackages.netbsd) 112 + makeMinimal 113 + install 114 + nbperf 115 + rpcgen 116 + ; 117 + inherit (buildPackages) stdenv; 118 + inherit (buildPackages.buildPackages) rsync; 119 + }; 120 121 + sys-headers = self.callPackage ./pkgs/sys/headers.nix { 122 + inherit (buildPackages.netbsd) 123 + makeMinimal 124 + install 125 + tsort 126 + lorder 127 + statHook 128 + uudecode 129 + config 130 + genassym 131 + ; 132 + inherit (buildPackages.buildPackages) rsync; 133 + }; 134 135 + libutil = self.callPackage ./pkgs/libutil.nix { inherit (self) libc sys; }; 136 137 + libpthread-headers = self.callPackage ./pkgs/libpthread/headers.nix { }; 138 139 + csu = self.callPackage ./pkgs/csu.nix { 140 + inherit (self) headers sys ld_elf_so; 141 + inherit (buildPackages.netbsd) 142 + netbsdSetupHook 143 + makeMinimal 144 + install 145 + genassym 146 + gencat 147 + lorder 148 + tsort 149 + statHook 150 + ; 151 + inherit (buildPackages.buildPackages) rsync; 152 + }; 153 154 + _mainLibcExtraPaths = with self; [ 155 + common 156 + i18n_module.src 157 + sys.src 158 + ld_elf_so.src 159 + libpthread.src 160 + libm.src 161 + libresolv.src 162 + librpcsvc.src 163 + libutil.src 164 + librt.src 165 + libcrypt.src 166 + ]; 167 168 + libc = self.callPackage ./pkgs/libc.nix { 169 + inherit (self) headers csu librt; 170 + inherit (buildPackages.netbsd) 171 + netbsdSetupHook 172 + makeMinimal 173 + install 174 + genassym 175 + gencat 176 + lorder 177 + tsort 178 + statHook 179 + rpcgen 180 + ; 181 + inherit (buildPackages.buildPackages) rsync; 182 + }; 183 184 + mtree = self.callPackage ./pkgs/mtree.nix { inherit (self) mknod; }; 185 + } 186 + ); 187 }
+99 -73
pkgs/os-specific/bsd/netbsd/pkgs/compat/package.nix
··· 1 - { lib, mkDerivation, stdenv 2 - , zlib 3 - , defaultMakeFlags 4 - , coreutils 5 - , cctools-port 6 - , include, libc, libutil 7 - , install 8 - , bsdSetupHook, netbsdSetupHook 9 - , makeMinimal 10 - , rsync 11 - , fetchNetBSD 12 - , _mainLibcExtraPaths 13 }: 14 15 - mkDerivation (let 16 version = "9.2"; 17 commonDeps = [ zlib ]; 18 - in { 19 path = "tools/compat"; 20 sha256 = "1vsxg7136nlhc72vpa664vs22874xh7ila95nkmsd8crn3z3cyn0"; 21 inherit version; ··· 29 make include/.stamp configure nbtool_config.h.in defs.mk.in 30 ''; 31 32 - configurePlatforms = [ "build" "host" ]; 33 - configureFlags = [ 34 - "--cache-file=config.cache" 35 - ] ++ lib.optionals stdenv.hostPlatform.isMusl [ 36 - # We include this header in our musl package only for legacy 37 - # compatibility, and compat works fine without it (and having it 38 - # know about sys/cdefs.h breaks packages like glib when built 39 - # statically). 40 - "ac_cv_header_sys_cdefs_h=no" 41 ]; 42 43 nativeBuildInputs = commonDeps ++ [ 44 - bsdSetupHook netbsdSetupHook 45 makeMinimal 46 rsync 47 ]; ··· 50 51 # temporarily use gnuinstall for bootstrapping 52 # bsdinstall will be built later 53 - makeFlags = defaultMakeFlags ++ [ 54 - "INSTALL=${coreutils}/bin/install" 55 - "DATADIR=$(out)/share" 56 - # Can't sort object files yet 57 - "LORDER=echo" 58 - "TSORT=cat" 59 - # Can't process man pages yet 60 - "MKSHARE=no" 61 - ] ++ lib.optionals stdenv.hostPlatform.isDarwin [ 62 - # GNU objcopy produces broken .a libs which won't link into dependers. 63 - # Makefiles only invoke `$OBJCOPY -x/-X`, so cctools strip works here. 64 - "OBJCOPY=${cctools-port}/bin/strip" 65 - ]; 66 RENAME = "-D"; 67 68 - passthru.tests = { netbsd-install = install; }; 69 70 patches = [ 71 ./compat-cxx-safe-header.patch ··· 79 makeFlagsArray+=('INSTALL_SYMLINK=''${INSTALL} ''${SYMLINK} ''${RENAME}') 80 ''; 81 82 - postInstall = '' 83 - # why aren't these installed by netbsd? 84 - install -D compat_defs.h $out/include/compat_defs.h 85 - install -D $BSDSRCDIR/include/cdbw.h $out/include/cdbw.h 86 - install -D $BSDSRCDIR/sys/sys/cdbr.h $out/include/cdbr.h 87 - install -D $BSDSRCDIR/sys/sys/featuretest.h \ 88 - $out/include/sys/featuretest.h 89 - install -D $BSDSRCDIR/sys/sys/md5.h $out/include/md5.h 90 - install -D $BSDSRCDIR/sys/sys/rmd160.h $out/include/rmd160.h 91 - install -D $BSDSRCDIR/sys/sys/sha1.h $out/include/sha1.h 92 - install -D $BSDSRCDIR/sys/sys/sha2.h $out/include/sha2.h 93 - install -D $BSDSRCDIR/sys/sys/queue.h $out/include/sys/queue.h 94 - install -D $BSDSRCDIR/include/vis.h $out/include/vis.h 95 - install -D $BSDSRCDIR/include/db.h $out/include/db.h 96 - install -D $BSDSRCDIR/include/netconfig.h $out/include/netconfig.h 97 - install -D $BSDSRCDIR/include/utmpx.h $out/include/utmpx.h 98 - install -D $BSDSRCDIR/include/tzfile.h $out/include/tzfile.h 99 - install -D $BSDSRCDIR/sys/sys/tree.h $out/include/sys/tree.h 100 - install -D $BSDSRCDIR/include/nl_types.h $out/include/nl_types.h 101 - install -D $BSDSRCDIR/include/stringlist.h $out/include/stringlist.h 102 103 - # Collapse includes slightly to fix dangling reference 104 - install -D $BSDSRCDIR/common/include/rpc/types.h $out/include/rpc/types.h 105 - sed -i '1s;^;#include "nbtool_config.h"\n;' $out/include/rpc/types.h 106 - '' + lib.optionalString stdenv.isDarwin '' 107 - mkdir -p $out/include/ssp 108 - touch $out/include/ssp/ssp.h 109 - '' + '' 110 - mkdir -p $out/lib/pkgconfig 111 - substitute ${./libbsd-overlay.pc} $out/lib/pkgconfig/libbsd-overlay.pc \ 112 - --subst-var-by out $out \ 113 - --subst-var-by version ${version} 114 - ''; 115 - extraPaths = [ include.src libc.src libutil.src 116 (fetchNetBSD "external/bsd/flex" "9.2" "0h98jpfj7vx5zh7vd7bk6b1hmzgkcb757a8j6d9zgygxxv13v43m") 117 (fetchNetBSD "sys/sys" "9.2" "0zawhw51klaigqqwkx0lzrx3mim2jywrc24cm7c66qsf1im9awgd") 118 - (fetchNetBSD "common/include/rpc/types.h" "9.2" "0n2df12mlc3cbc48jxq35yzl1y7ghgpykvy7jnfh898rdhac7m9a") 119 ] ++ libutil.extraPaths ++ _mainLibcExtraPaths; 120 - })
··· 1 + { 2 + lib, 3 + mkDerivation, 4 + stdenv, 5 + zlib, 6 + defaultMakeFlags, 7 + coreutils, 8 + cctools-port, 9 + include, 10 + libc, 11 + libutil, 12 + install, 13 + bsdSetupHook, 14 + netbsdSetupHook, 15 + makeMinimal, 16 + rsync, 17 + fetchNetBSD, 18 + _mainLibcExtraPaths, 19 }: 20 21 + mkDerivation ( 22 + let 23 version = "9.2"; 24 commonDeps = [ zlib ]; 25 + in 26 + { 27 path = "tools/compat"; 28 sha256 = "1vsxg7136nlhc72vpa664vs22874xh7ila95nkmsd8crn3z3cyn0"; 29 inherit version; ··· 37 make include/.stamp configure nbtool_config.h.in defs.mk.in 38 ''; 39 40 + configurePlatforms = [ 41 + "build" 42 + "host" 43 ]; 44 + configureFlags = 45 + [ "--cache-file=config.cache" ] 46 + ++ lib.optionals stdenv.hostPlatform.isMusl [ 47 + # We include this header in our musl package only for legacy 48 + # compatibility, and compat works fine without it (and having it 49 + # know about sys/cdefs.h breaks packages like glib when built 50 + # statically). 51 + "ac_cv_header_sys_cdefs_h=no" 52 + ]; 53 54 nativeBuildInputs = commonDeps ++ [ 55 + bsdSetupHook 56 + netbsdSetupHook 57 makeMinimal 58 rsync 59 ]; ··· 62 63 # temporarily use gnuinstall for bootstrapping 64 # bsdinstall will be built later 65 + makeFlags = 66 + defaultMakeFlags 67 + ++ [ 68 + "INSTALL=${coreutils}/bin/install" 69 + "DATADIR=$(out)/share" 70 + # Can't sort object files yet 71 + "LORDER=echo" 72 + "TSORT=cat" 73 + # Can't process man pages yet 74 + "MKSHARE=no" 75 + ] 76 + ++ lib.optionals stdenv.hostPlatform.isDarwin [ 77 + # GNU objcopy produces broken .a libs which won't link into dependers. 78 + # Makefiles only invoke `$OBJCOPY -x/-X`, so cctools strip works here. 79 + "OBJCOPY=${cctools-port}/bin/strip" 80 + ]; 81 RENAME = "-D"; 82 83 + passthru.tests = { 84 + netbsd-install = install; 85 + }; 86 87 patches = [ 88 ./compat-cxx-safe-header.patch ··· 96 makeFlagsArray+=('INSTALL_SYMLINK=''${INSTALL} ''${SYMLINK} ''${RENAME}') 97 ''; 98 99 + postInstall = 100 + '' 101 + # why aren't these installed by netbsd? 102 + install -D compat_defs.h $out/include/compat_defs.h 103 + install -D $BSDSRCDIR/include/cdbw.h $out/include/cdbw.h 104 + install -D $BSDSRCDIR/sys/sys/cdbr.h $out/include/cdbr.h 105 + install -D $BSDSRCDIR/sys/sys/featuretest.h \ 106 + $out/include/sys/featuretest.h 107 + install -D $BSDSRCDIR/sys/sys/md5.h $out/include/md5.h 108 + install -D $BSDSRCDIR/sys/sys/rmd160.h $out/include/rmd160.h 109 + install -D $BSDSRCDIR/sys/sys/sha1.h $out/include/sha1.h 110 + install -D $BSDSRCDIR/sys/sys/sha2.h $out/include/sha2.h 111 + install -D $BSDSRCDIR/sys/sys/queue.h $out/include/sys/queue.h 112 + install -D $BSDSRCDIR/include/vis.h $out/include/vis.h 113 + install -D $BSDSRCDIR/include/db.h $out/include/db.h 114 + install -D $BSDSRCDIR/include/netconfig.h $out/include/netconfig.h 115 + install -D $BSDSRCDIR/include/utmpx.h $out/include/utmpx.h 116 + install -D $BSDSRCDIR/include/tzfile.h $out/include/tzfile.h 117 + install -D $BSDSRCDIR/sys/sys/tree.h $out/include/sys/tree.h 118 + install -D $BSDSRCDIR/include/nl_types.h $out/include/nl_types.h 119 + install -D $BSDSRCDIR/include/stringlist.h $out/include/stringlist.h 120 121 + # Collapse includes slightly to fix dangling reference 122 + install -D $BSDSRCDIR/common/include/rpc/types.h $out/include/rpc/types.h 123 + sed -i '1s;^;#include "nbtool_config.h"\n;' $out/include/rpc/types.h 124 + '' 125 + + lib.optionalString stdenv.isDarwin '' 126 + mkdir -p $out/include/ssp 127 + touch $out/include/ssp/ssp.h 128 + '' 129 + + '' 130 + mkdir -p $out/lib/pkgconfig 131 + substitute ${./libbsd-overlay.pc} $out/lib/pkgconfig/libbsd-overlay.pc \ 132 + --subst-var-by out $out \ 133 + --subst-var-by version ${version} 134 + ''; 135 + extraPaths = [ 136 + include.src 137 + libc.src 138 + libutil.src 139 (fetchNetBSD "external/bsd/flex" "9.2" "0h98jpfj7vx5zh7vd7bk6b1hmzgkcb757a8j6d9zgygxxv13v43m") 140 (fetchNetBSD "sys/sys" "9.2" "0zawhw51klaigqqwkx0lzrx3mim2jywrc24cm7c66qsf1im9awgd") 141 + (fetchNetBSD "common/include/rpc/types.h" "9.2" 142 + "0n2df12mlc3cbc48jxq35yzl1y7ghgpykvy7jnfh898rdhac7m9a" 143 + ) 144 ] ++ libutil.extraPaths ++ _mainLibcExtraPaths; 145 + } 146 + )
+20 -7
pkgs/os-specific/bsd/netbsd/pkgs/config.nix
··· 1 - { mkDerivation 2 - , bsdSetupHook, netbsdSetupHook 3 - , makeMinimal, install, mandoc, byacc, flex, rsync 4 - , compatIfNeeded 5 - , cksum 6 }: 7 mkDerivation { 8 path = "usr.bin/config"; ··· 10 sha256 = "1yz3n4hncdkk6kp595fh2q5lg150vpqg8iw2dccydkyw4y3hgsjj"; 11 env.NIX_CFLAGS_COMPILE = toString [ "-DMAKE_BOOTSTRAP" ]; 12 nativeBuildInputs = [ 13 - bsdSetupHook netbsdSetupHook 14 - makeMinimal install mandoc byacc flex rsync 15 ]; 16 buildInputs = compatIfNeeded; 17 extraPaths = [ cksum.src ];
··· 1 + { 2 + mkDerivation, 3 + bsdSetupHook, 4 + netbsdSetupHook, 5 + makeMinimal, 6 + install, 7 + mandoc, 8 + byacc, 9 + flex, 10 + rsync, 11 + compatIfNeeded, 12 + cksum, 13 }: 14 mkDerivation { 15 path = "usr.bin/config"; ··· 17 sha256 = "1yz3n4hncdkk6kp595fh2q5lg150vpqg8iw2dccydkyw4y3hgsjj"; 18 env.NIX_CFLAGS_COMPILE = toString [ "-DMAKE_BOOTSTRAP" ]; 19 nativeBuildInputs = [ 20 + bsdSetupHook 21 + netbsdSetupHook 22 + makeMinimal 23 + install 24 + mandoc 25 + byacc 26 + flex 27 + rsync 28 ]; 29 buildInputs = compatIfNeeded; 30 extraPaths = [ cksum.src ];
+37 -12
pkgs/os-specific/bsd/netbsd/pkgs/csu.nix
··· 1 - { lib, mkDerivation 2 - , bsdSetupHook, netbsdSetupHook 3 - , makeMinimal 4 - , install, mandoc, groff, flex 5 - , byacc, genassym, gencat, lorder, tsort, statHook, rsync 6 - , headers 7 - , sys 8 - , ld_elf_so 9 }: 10 11 mkDerivation { ··· 14 sha256 = "0al5jfazvhlzn9hvmnrbchx4d0gm282hq5gp4xs2zmj9ycmf6d03"; 15 meta.platforms = lib.platforms.netbsd; 16 nativeBuildInputs = [ 17 - bsdSetupHook netbsdSetupHook 18 makeMinimal 19 - install mandoc groff flex 20 - byacc genassym gencat lorder tsort statHook rsync 21 ]; 22 buildInputs = [ headers ]; 23 - extraPaths = [ sys.src ld_elf_so.src ]; 24 }
··· 1 + { 2 + lib, 3 + mkDerivation, 4 + bsdSetupHook, 5 + netbsdSetupHook, 6 + makeMinimal, 7 + install, 8 + mandoc, 9 + groff, 10 + flex, 11 + byacc, 12 + genassym, 13 + gencat, 14 + lorder, 15 + tsort, 16 + statHook, 17 + rsync, 18 + headers, 19 + sys, 20 + ld_elf_so, 21 }: 22 23 mkDerivation { ··· 26 sha256 = "0al5jfazvhlzn9hvmnrbchx4d0gm282hq5gp4xs2zmj9ycmf6d03"; 27 meta.platforms = lib.platforms.netbsd; 28 nativeBuildInputs = [ 29 + bsdSetupHook 30 + netbsdSetupHook 31 makeMinimal 32 + install 33 + mandoc 34 + groff 35 + flex 36 + byacc 37 + genassym 38 + gencat 39 + lorder 40 + tsort 41 + statHook 42 + rsync 43 ]; 44 buildInputs = [ headers ]; 45 + extraPaths = [ 46 + sys.src 47 + ld_elf_so.src 48 + ]; 49 }
+13 -6
pkgs/os-specific/bsd/netbsd/pkgs/fts/package.nix
··· 1 - { mkDerivation 2 - , bsdSetupHook, netbsdSetupHook, rsync 3 - , compatIfNeeded 4 - , fetchNetBSD 5 }: 6 7 mkDerivation { ··· 10 sha256 = "01d4fpxvz1pgzfk5xznz5dcm0x0gdzwcsfm1h3d0xc9kc6hj2q77"; 11 version = "9.2"; 12 nativeBuildInputs = [ 13 - bsdSetupHook netbsdSetupHook rsync 14 ]; 15 propagatedBuildInputs = compatIfNeeded; 16 extraPaths = [ 17 (fetchNetBSD "lib/libc/gen/fts.c" "9.2" "1a8hmf26242nmv05ipn3ircxb0jqmmi66rh78kkyi9vjwkfl3qn7") 18 - (fetchNetBSD "lib/libc/include/namespace.h" "9.2" "0kksr3pdwdc1cplqf5z12ih4cml6l11lqrz91f7hjjm64y7785kc") 19 (fetchNetBSD "lib/libc/gen/fts.3" "9.2" "1asxw0n3fhjdadwkkq3xplfgqgl3q32w1lyrvbakfa3gs0wz5zc1") 20 ]; 21 skipIncludesPhase = true;
··· 1 + { 2 + mkDerivation, 3 + bsdSetupHook, 4 + netbsdSetupHook, 5 + rsync, 6 + compatIfNeeded, 7 + fetchNetBSD, 8 }: 9 10 mkDerivation { ··· 13 sha256 = "01d4fpxvz1pgzfk5xznz5dcm0x0gdzwcsfm1h3d0xc9kc6hj2q77"; 14 version = "9.2"; 15 nativeBuildInputs = [ 16 + bsdSetupHook 17 + netbsdSetupHook 18 + rsync 19 ]; 20 propagatedBuildInputs = compatIfNeeded; 21 extraPaths = [ 22 (fetchNetBSD "lib/libc/gen/fts.c" "9.2" "1a8hmf26242nmv05ipn3ircxb0jqmmi66rh78kkyi9vjwkfl3qn7") 23 + (fetchNetBSD "lib/libc/include/namespace.h" "9.2" 24 + "0kksr3pdwdc1cplqf5z12ih4cml6l11lqrz91f7hjjm64y7785kc" 25 + ) 26 (fetchNetBSD "lib/libc/gen/fts.3" "9.2" "1asxw0n3fhjdadwkkq3xplfgqgl3q32w1lyrvbakfa3gs0wz5zc1") 27 ]; 28 skipIncludesPhase = true;
+7 -1
pkgs/os-specific/bsd/netbsd/pkgs/headers.nix
··· 1 - { lib, symlinkJoin, include, sys-headers, libpthread-headers }: 2 3 symlinkJoin { 4 name = "netbsd-headers-9.2";
··· 1 + { 2 + lib, 3 + symlinkJoin, 4 + include, 5 + sys-headers, 6 + libpthread-headers, 7 + }: 8 9 symlinkJoin { 10 name = "netbsd-headers-9.2";
+5 -1
pkgs/os-specific/bsd/netbsd/pkgs/i18n_module.nix
··· 1 - { lib, mkDerivation, libc }: 2 3 mkDerivation { 4 path = "lib/i18n_module";
··· 1 + { 2 + lib, 3 + mkDerivation, 4 + libc, 5 + }: 6 7 mkDerivation { 8 path = "lib/i18n_module";
+23 -9
pkgs/os-specific/bsd/netbsd/pkgs/include.nix
··· 1 - { lib, mkDerivation 2 - , bsdSetupHook, netbsdSetupHook 3 - , makeMinimal 4 - , install, mandoc, groff, rsync, nbperf, rpcgen 5 - , common 6 - , defaultMakeFlags 7 - , stdenv 8 }: 9 10 mkDerivation { ··· 12 version = "9.2"; 13 sha256 = "0nxnmj4c8s3hb9n3fpcmd0zl3l1nmhivqgi9a35sis943qvpgl9h"; 14 nativeBuildInputs = [ 15 - bsdSetupHook netbsdSetupHook 16 makeMinimal 17 - install mandoc groff rsync nbperf rpcgen 18 ]; 19 20 # The makefiles define INCSDIR per subdirectory, so we have to set
··· 1 + { 2 + lib, 3 + mkDerivation, 4 + bsdSetupHook, 5 + netbsdSetupHook, 6 + makeMinimal, 7 + install, 8 + mandoc, 9 + groff, 10 + rsync, 11 + nbperf, 12 + rpcgen, 13 + common, 14 + defaultMakeFlags, 15 + stdenv, 16 }: 17 18 mkDerivation { ··· 20 version = "9.2"; 21 sha256 = "0nxnmj4c8s3hb9n3fpcmd0zl3l1nmhivqgi9a35sis943qvpgl9h"; 22 nativeBuildInputs = [ 23 + bsdSetupHook 24 + netbsdSetupHook 25 makeMinimal 26 + install 27 + mandoc 28 + groff 29 + rsync 30 + nbperf 31 + rpcgen 32 ]; 33 34 # The makefiles define INCSDIR per subdirectory, so we have to set
+47 -34
pkgs/os-specific/bsd/netbsd/pkgs/install/package.nix
··· 1 - { mkDerivation 2 - , writeShellScript 3 - , mtree, make 4 - , bsdSetupHook, netbsdSetupHook 5 - , makeMinimal 6 - , mandoc, groff, rsync 7 - , compatIfNeeded, fts 8 9 }: 10 ··· 18 @out@/bin/xinstall "$@" 19 ''; 20 in 21 - mkDerivation { 22 - path = "usr.bin/xinstall"; 23 - version = "9.2"; 24 - sha256 = "1f6pbz3qv1qcrchdxif8p5lbmnwl8b9nq615hsd3cyl4avd5bfqj"; 25 - extraPaths = [ mtree.src make.src ]; 26 - nativeBuildInputs = [ 27 - bsdSetupHook netbsdSetupHook 28 - makeMinimal 29 - mandoc groff rsync 30 - ]; 31 - skipIncludesPhase = true; 32 - buildInputs = compatIfNeeded 33 - # fts header is needed. glibc already has this header, but musl doesn't, 34 - # so make sure pkgsMusl.netbsd.install still builds in case you want to 35 - # remove it! 36 - ++ [ fts ]; 37 - installPhase = '' 38 - runHook preInstall 39 40 - install -D install.1 $out/share/man/man1/install.1 41 - install -D xinstall $out/bin/xinstall 42 - install -D -m 0550 ${binstall} $out/bin/binstall 43 - substituteInPlace $out/bin/binstall --subst-var out 44 - ln -s $out/bin/binstall $out/bin/install 45 46 - runHook postInstall 47 - ''; 48 - setupHook = ./install-setup-hook.sh; 49 - }
··· 1 + { 2 + mkDerivation, 3 + writeShellScript, 4 + mtree, 5 + make, 6 + bsdSetupHook, 7 + netbsdSetupHook, 8 + makeMinimal, 9 + mandoc, 10 + groff, 11 + rsync, 12 + compatIfNeeded, 13 + fts, 14 15 }: 16 ··· 24 @out@/bin/xinstall "$@" 25 ''; 26 in 27 + mkDerivation { 28 + path = "usr.bin/xinstall"; 29 + version = "9.2"; 30 + sha256 = "1f6pbz3qv1qcrchdxif8p5lbmnwl8b9nq615hsd3cyl4avd5bfqj"; 31 + extraPaths = [ 32 + mtree.src 33 + make.src 34 + ]; 35 + nativeBuildInputs = [ 36 + bsdSetupHook 37 + netbsdSetupHook 38 + makeMinimal 39 + mandoc 40 + groff 41 + rsync 42 + ]; 43 + skipIncludesPhase = true; 44 + buildInputs = 45 + compatIfNeeded 46 + # fts header is needed. glibc already has this header, but musl doesn't, 47 + # so make sure pkgsMusl.netbsd.install still builds in case you want to 48 + # remove it! 49 + ++ [ fts ]; 50 + installPhase = '' 51 + runHook preInstall 52 53 + install -D install.1 $out/share/man/man1/install.1 54 + install -D xinstall $out/bin/xinstall 55 + install -D -m 0550 ${binstall} $out/bin/binstall 56 + substituteInPlace $out/bin/binstall --subst-var out 57 + ln -s $out/bin/binstall $out/bin/install 58 59 + runHook postInstall 60 + ''; 61 + setupHook = ./install-setup-hook.sh; 62 + }
+10 -6
pkgs/os-specific/bsd/netbsd/pkgs/ld_elf_so.nix
··· 1 - { lib 2 - , mkDerivation 3 - , libc 4 - , defaultMakeFlags 5 }: 6 7 mkDerivation { 8 - path = "libexec/ld.elf_so"; 9 version = "9.2"; 10 sha256 = "0ia9mqzdljly0vqfwflm5mzz55k7qsr4rw2bzhivky6k30vgirqa"; 11 meta.platforms = lib.platforms.netbsd; ··· 13 # Hack to prevent a symlink being installed here for compatibility. 14 SHLINKINSTALLDIR = "/usr/libexec"; 15 USE_FORT = "yes"; 16 - makeFlags = defaultMakeFlags ++ [ "BINDIR=$(out)/libexec" "CLIBOBJ=${libc}/lib" ]; 17 extraPaths = [ libc.src ] ++ libc.extraPaths; 18 }
··· 1 + { 2 + lib, 3 + mkDerivation, 4 + libc, 5 + defaultMakeFlags, 6 }: 7 8 mkDerivation { 9 + path = "libexec/ld.elf_so"; 10 version = "9.2"; 11 sha256 = "0ia9mqzdljly0vqfwflm5mzz55k7qsr4rw2bzhivky6k30vgirqa"; 12 meta.platforms = lib.platforms.netbsd; ··· 14 # Hack to prevent a symlink being installed here for compatibility. 15 SHLINKINSTALLDIR = "/usr/libexec"; 16 USE_FORT = "yes"; 17 + makeFlags = defaultMakeFlags ++ [ 18 + "BINDIR=$(out)/libexec" 19 + "CLIBOBJ=${libc}/lib" 20 + ]; 21 extraPaths = [ libc.src ] ++ libc.extraPaths; 22 }
+43 -16
pkgs/os-specific/bsd/netbsd/pkgs/libc.nix
··· 1 - { lib 2 - , mkDerivation 3 - , defaultMakeFlags 4 - , _mainLibcExtraPaths 5 - , fetchNetBSD 6 - , bsdSetupHook, netbsdSetupHook 7 - , makeMinimal 8 - , install, mandoc, groff, flex 9 - , byacc, genassym, gencat, lorder, tsort, statHook, rsync, rpcgen 10 - , csu, headers 11 - , librt 12 }: 13 14 mkDerivation { ··· 21 (fetchNetBSD "external/bsd/jemalloc" "9.2" "0cq704swa0h2yxv4gc79z2lwxibk9k7pxh3q5qfs7axx3jx3n8kb") 22 ]; 23 nativeBuildInputs = [ 24 - bsdSetupHook netbsdSetupHook 25 makeMinimal 26 - install mandoc groff flex 27 - byacc genassym gencat lorder tsort statHook rsync rpcgen 28 ]; 29 - buildInputs = [ headers csu ]; 30 env.NIX_CFLAGS_COMPILE = "-B${csu}/lib -fcommon"; 31 meta.platforms = lib.platforms.netbsd; 32 SHLIBINSTALLDIR = "$(out)/lib"; 33 MKPICINSTALL = "yes"; 34 NLSDIR = "$(out)/share/nls"; 35 - makeFlags = defaultMakeFlags ++ [ "FILESDIR=$(out)/var/db"]; 36 postInstall = '' 37 pushd ${headers} 38 find . -type d -exec mkdir -p $out/\{} \;
··· 1 + { 2 + lib, 3 + mkDerivation, 4 + defaultMakeFlags, 5 + _mainLibcExtraPaths, 6 + fetchNetBSD, 7 + bsdSetupHook, 8 + netbsdSetupHook, 9 + makeMinimal, 10 + install, 11 + mandoc, 12 + groff, 13 + flex, 14 + byacc, 15 + genassym, 16 + gencat, 17 + lorder, 18 + tsort, 19 + statHook, 20 + rsync, 21 + rpcgen, 22 + csu, 23 + headers, 24 + librt, 25 }: 26 27 mkDerivation { ··· 34 (fetchNetBSD "external/bsd/jemalloc" "9.2" "0cq704swa0h2yxv4gc79z2lwxibk9k7pxh3q5qfs7axx3jx3n8kb") 35 ]; 36 nativeBuildInputs = [ 37 + bsdSetupHook 38 + netbsdSetupHook 39 makeMinimal 40 + install 41 + mandoc 42 + groff 43 + flex 44 + byacc 45 + genassym 46 + gencat 47 + lorder 48 + tsort 49 + statHook 50 + rsync 51 + rpcgen 52 ]; 53 + buildInputs = [ 54 + headers 55 + csu 56 + ]; 57 env.NIX_CFLAGS_COMPILE = "-B${csu}/lib -fcommon"; 58 meta.platforms = lib.platforms.netbsd; 59 SHLIBINSTALLDIR = "$(out)/lib"; 60 MKPICINSTALL = "yes"; 61 NLSDIR = "$(out)/share/nls"; 62 + makeFlags = defaultMakeFlags ++ [ "FILESDIR=$(out)/var/db" ]; 63 postInstall = '' 64 pushd ${headers} 65 find . -type d -exec mkdir -p $out/\{} \;
+15 -9
pkgs/os-specific/bsd/netbsd/pkgs/libcurses.nix
··· 1 - { lib, mkDerivation, stdenv 2 - , libterminfo 3 - , compatIfNeeded 4 - , defaultMakeFlags 5 }: 6 7 mkDerivation { ··· 9 version = "9.2"; 10 sha256 = "0pd0dggl3w4bv5i5h0s1wrc8hr66n4hkv3zlklarwfdhc692fqal"; 11 buildInputs = [ libterminfo ]; 12 - env.NIX_CFLAGS_COMPILE = toString ([ 13 - "-D__scanflike(a,b)=" 14 - "-D__va_list=va_list" 15 - "-D__warn_references(a,b)=" 16 - ] ++ lib.optional stdenv.isDarwin "-D__strong_alias(a,b)="); 17 propagatedBuildInputs = compatIfNeeded; 18 MKDOC = "no"; # missing vfontedpr 19 makeFlags = defaultMakeFlags ++ [ "LIBDO.terminfo=${libterminfo}/lib" ];
··· 1 + { 2 + lib, 3 + mkDerivation, 4 + stdenv, 5 + libterminfo, 6 + compatIfNeeded, 7 + defaultMakeFlags, 8 }: 9 10 mkDerivation { ··· 12 version = "9.2"; 13 sha256 = "0pd0dggl3w4bv5i5h0s1wrc8hr66n4hkv3zlklarwfdhc692fqal"; 14 buildInputs = [ libterminfo ]; 15 + env.NIX_CFLAGS_COMPILE = toString ( 16 + [ 17 + "-D__scanflike(a,b)=" 18 + "-D__va_list=va_list" 19 + "-D__warn_references(a,b)=" 20 + ] 21 + ++ lib.optional stdenv.isDarwin "-D__strong_alias(a,b)=" 22 + ); 23 propagatedBuildInputs = compatIfNeeded; 24 MKDOC = "no"; # missing vfontedpr 25 makeFlags = defaultMakeFlags ++ [ "LIBDO.terminfo=${libterminfo}/lib" ];
+29 -23
pkgs/os-specific/bsd/netbsd/pkgs/libedit.nix
··· 1 - { lib, mkDerivation 2 - , libterminfo, libcurses 3 - , compatIfNeeded 4 - , defaultMakeFlags 5 }: 6 7 mkDerivation { 8 - path = "lib/libedit"; 9 - version = "9.2"; 10 - sha256 = "1wqhngraxwqk4jgrf5f18jy195yrp7c06n1gf31pbplq79mg1bcj"; 11 - buildInputs = [ libterminfo libcurses ]; 12 - propagatedBuildInputs = compatIfNeeded; 13 - SHLIBINSTALLDIR = "$(out)/lib"; 14 - makeFlags = defaultMakeFlags ++ [ "LIBDO.terminfo=${libterminfo}/lib" ]; 15 - postPatch = '' 16 - sed -i '1i #undef bool_t' $COMPONENT_PATH/el.h 17 - substituteInPlace $COMPONENT_PATH/config.h \ 18 - --replace "#define HAVE_STRUCT_DIRENT_D_NAMLEN 1" "" 19 - substituteInPlace $COMPONENT_PATH/readline/Makefile --replace /usr/include "$out/include" 20 - ''; 21 - env.NIX_CFLAGS_COMPILE = toString [ 22 - "-D__noinline=" 23 - "-D__scanflike(a,b)=" 24 - "-D__va_list=va_list" 25 - ]; 26 - }
··· 1 + { 2 + lib, 3 + mkDerivation, 4 + libterminfo, 5 + libcurses, 6 + compatIfNeeded, 7 + defaultMakeFlags, 8 }: 9 10 mkDerivation { 11 + path = "lib/libedit"; 12 + version = "9.2"; 13 + sha256 = "1wqhngraxwqk4jgrf5f18jy195yrp7c06n1gf31pbplq79mg1bcj"; 14 + buildInputs = [ 15 + libterminfo 16 + libcurses 17 + ]; 18 + propagatedBuildInputs = compatIfNeeded; 19 + SHLIBINSTALLDIR = "$(out)/lib"; 20 + makeFlags = defaultMakeFlags ++ [ "LIBDO.terminfo=${libterminfo}/lib" ]; 21 + postPatch = '' 22 + sed -i '1i #undef bool_t' $COMPONENT_PATH/el.h 23 + substituteInPlace $COMPONENT_PATH/config.h \ 24 + --replace "#define HAVE_STRUCT_DIRENT_D_NAMLEN 1" "" 25 + substituteInPlace $COMPONENT_PATH/readline/Makefile --replace /usr/include "$out/include" 26 + ''; 27 + env.NIX_CFLAGS_COMPILE = toString [ 28 + "-D__noinline=" 29 + "-D__scanflike(a,b)=" 30 + "-D__va_list=va_list" 31 + ]; 32 + }
+5 -1
pkgs/os-specific/bsd/netbsd/pkgs/libm.nix
··· 1 - { lib, mkDerivation, sys }: 2 3 mkDerivation { 4 path = "lib/libm";
··· 1 + { 2 + lib, 3 + mkDerivation, 4 + sys, 5 + }: 6 7 mkDerivation { 8 path = "lib/libm";
+5 -1
pkgs/os-specific/bsd/netbsd/pkgs/libpci.nix
··· 1 - { lib, mkDerivation, sys }: 2 3 mkDerivation { 4 pname = "libpci";
··· 1 + { 2 + lib, 3 + mkDerivation, 4 + sys, 5 + }: 6 7 mkDerivation { 8 pname = "libpci";
-1
pkgs/os-specific/bsd/netbsd/pkgs/libpthread/base.nix
··· 3 version = "9.2"; 4 sha256 = "0mlmc31k509dwfmx5s2x010wxjc44mr6y0cbmk30cfipqh8c962h"; 5 } 6 -
··· 3 version = "9.2"; 4 sha256 = "0mlmc31k509dwfmx5s2x010wxjc44mr6y0cbmk30cfipqh8c962h"; 5 }
+10 -7
pkgs/os-specific/bsd/netbsd/pkgs/libpthread/headers.nix
··· 1 { lib, mkDerivation }: 2 3 - mkDerivation (import ./base.nix // { 4 - pname = "libpthread-headers"; 5 - installPhase = "includesPhase"; 6 - dontBuild = true; 7 - noCC = true; 8 - meta.platforms = lib.platforms.netbsd; 9 - })
··· 1 { lib, mkDerivation }: 2 3 + mkDerivation ( 4 + import ./base.nix 5 + // { 6 + pname = "libpthread-headers"; 7 + installPhase = "includesPhase"; 8 + dontBuild = true; 9 + noCC = true; 10 + meta.platforms = lib.platforms.netbsd; 11 + } 12 + )
+26 -13
pkgs/os-specific/bsd/netbsd/pkgs/libpthread/package.nix
··· 1 - { lib, mkDerivation 2 - , headers 3 - , common, libc, librt, sys 4 }: 5 6 - mkDerivation (import ./base.nix // { 7 - pname = "libpthread"; 8 - installPhase = null; 9 - noCC = false; 10 - dontBuild = false; 11 - buildInputs = [ headers ]; 12 - SHLIBINSTALLDIR = "$(out)/lib"; 13 - extraPaths = [ common libc.src librt.src sys.src ]; 14 - meta.platforms = lib.platforms.netbsd; 15 - })
··· 1 + { 2 + lib, 3 + mkDerivation, 4 + headers, 5 + common, 6 + libc, 7 + librt, 8 + sys, 9 }: 10 11 + mkDerivation ( 12 + import ./base.nix 13 + // { 14 + pname = "libpthread"; 15 + installPhase = null; 16 + noCC = false; 17 + dontBuild = false; 18 + buildInputs = [ headers ]; 19 + SHLIBINSTALLDIR = "$(out)/lib"; 20 + extraPaths = [ 21 + common 22 + libc.src 23 + librt.src 24 + sys.src 25 + ]; 26 + meta.platforms = lib.platforms.netbsd; 27 + } 28 + )
+5 -1
pkgs/os-specific/bsd/netbsd/pkgs/libresolv.nix
··· 1 - { lib, mkDerivation, libc }: 2 3 mkDerivation { 4 path = "lib/libresolv";
··· 1 + { 2 + lib, 3 + mkDerivation, 4 + libc, 5 + }: 6 7 mkDerivation { 8 path = "lib/libresolv";
+19 -9
pkgs/os-specific/bsd/netbsd/pkgs/librpcsvc.nix
··· 1 - { lib 2 - , mkDerivation 3 - , defaultMakeFlags 4 - , bsdSetupHook, netbsdSetupHook 5 - , makeMinimal 6 - , install, tsort, lorder, rpcgen, statHook 7 }: 8 9 mkDerivation { ··· 13 makeFlags = defaultMakeFlags ++ [ "INCSDIR=$(out)/include/rpcsvc" ]; 14 meta.platforms = lib.platforms.netbsd; 15 nativeBuildInputs = [ 16 - bsdSetupHook netbsdSetupHook 17 makeMinimal 18 - install tsort lorder rpcgen statHook 19 ]; 20 } 21 -
··· 1 + { 2 + lib, 3 + mkDerivation, 4 + defaultMakeFlags, 5 + bsdSetupHook, 6 + netbsdSetupHook, 7 + makeMinimal, 8 + install, 9 + tsort, 10 + lorder, 11 + rpcgen, 12 + statHook, 13 }: 14 15 mkDerivation { ··· 19 makeFlags = defaultMakeFlags ++ [ "INCSDIR=$(out)/include/rpcsvc" ]; 20 meta.platforms = lib.platforms.netbsd; 21 nativeBuildInputs = [ 22 + bsdSetupHook 23 + netbsdSetupHook 24 makeMinimal 25 + install 26 + tsort 27 + lorder 28 + rpcgen 29 + statHook 30 ]; 31 }
+6 -1
pkgs/os-specific/bsd/netbsd/pkgs/librt.nix
··· 1 - { lib, mkDerivation, libc, headers }: 2 3 mkDerivation { 4 path = "lib/librt";
··· 1 + { 2 + lib, 3 + mkDerivation, 4 + libc, 5 + headers, 6 + }: 7 8 mkDerivation { 9 path = "lib/librt";
+26 -7
pkgs/os-specific/bsd/netbsd/pkgs/libterminfo.nix
··· 1 - { mkDerivation 2 - , bsdSetupHook, netbsdSetupHook 3 - , makeMinimal, install, tsort, lorder, mandoc, statHook, nbperf, tic, rsync 4 - , compatIfNeeded 5 - , fetchNetBSD 6 }: 7 8 mkDerivation { ··· 10 version = "9.2"; 11 sha256 = "0pq05k3dj0dfsczv07frnnji92mazmy2qqngqbx2zgqc1x251414"; 12 nativeBuildInputs = [ 13 - bsdSetupHook netbsdSetupHook 14 - makeMinimal install tsort lorder mandoc statHook nbperf tic rsync 15 ]; 16 buildInputs = compatIfNeeded; 17 SHLIBINSTALLDIR = "$(out)/lib";
··· 1 + { 2 + mkDerivation, 3 + bsdSetupHook, 4 + netbsdSetupHook, 5 + makeMinimal, 6 + install, 7 + tsort, 8 + lorder, 9 + mandoc, 10 + statHook, 11 + nbperf, 12 + tic, 13 + rsync, 14 + compatIfNeeded, 15 + fetchNetBSD, 16 }: 17 18 mkDerivation { ··· 20 version = "9.2"; 21 sha256 = "0pq05k3dj0dfsczv07frnnji92mazmy2qqngqbx2zgqc1x251414"; 22 nativeBuildInputs = [ 23 + bsdSetupHook 24 + netbsdSetupHook 25 + makeMinimal 26 + install 27 + tsort 28 + lorder 29 + mandoc 30 + statHook 31 + nbperf 32 + tic 33 + rsync 34 ]; 35 buildInputs = compatIfNeeded; 36 SHLIBINSTALLDIR = "$(out)/lib";
+30 -9
pkgs/os-specific/bsd/netbsd/pkgs/libutil.nix
··· 1 - { mkDerivation 2 - , common, libc, sys 3 - , bsdSetupHook, netbsdSetupHook 4 - , makeMinimal 5 - , byacc, install, tsort, lorder, mandoc, statHook, rsync 6 - , headers 7 }: 8 9 mkDerivation { 10 path = "lib/libutil"; 11 version = "9.2"; 12 sha256 = "02gm5a5zhh8qp5r5q5r7x8x6x50ir1i0ncgsnfwh1vnrz6mxbq7z"; 13 - extraPaths = [ common libc.src sys.src ]; 14 nativeBuildInputs = [ 15 - bsdSetupHook netbsdSetupHook 16 makeMinimal 17 - byacc install tsort lorder mandoc statHook rsync 18 ]; 19 buildInputs = [ headers ]; 20 SHLIBINSTALLDIR = "$(out)/lib";
··· 1 + { 2 + mkDerivation, 3 + common, 4 + libc, 5 + sys, 6 + bsdSetupHook, 7 + netbsdSetupHook, 8 + makeMinimal, 9 + byacc, 10 + install, 11 + tsort, 12 + lorder, 13 + mandoc, 14 + statHook, 15 + rsync, 16 + headers, 17 }: 18 19 mkDerivation { 20 path = "lib/libutil"; 21 version = "9.2"; 22 sha256 = "02gm5a5zhh8qp5r5q5r7x8x6x50ir1i0ncgsnfwh1vnrz6mxbq7z"; 23 + extraPaths = [ 24 + common 25 + libc.src 26 + sys.src 27 + ]; 28 nativeBuildInputs = [ 29 + bsdSetupHook 30 + netbsdSetupHook 31 makeMinimal 32 + byacc 33 + install 34 + tsort 35 + lorder 36 + mandoc 37 + statHook 38 + rsync 39 ]; 40 buildInputs = [ headers ]; 41 SHLIBINSTALLDIR = "$(out)/lib";
+15 -6
pkgs/os-specific/bsd/netbsd/pkgs/lorder.nix
··· 1 - { mkDerivation 2 - , bsdSetupHook, netbsdSetupHook 3 - , makeMinimal 4 - , install, mandoc, groff, rsync 5 }: 6 7 mkDerivation { ··· 9 version = "9.2"; 10 sha256 = "0rjf9blihhm0n699vr2bg88m4yjhkbxh6fxliaay3wxkgnydjwn2"; 11 nativeBuildInputs = [ 12 - bsdSetupHook netbsdSetupHook 13 makeMinimal 14 - install mandoc groff rsync 15 ]; 16 }
··· 1 + { 2 + mkDerivation, 3 + bsdSetupHook, 4 + netbsdSetupHook, 5 + makeMinimal, 6 + install, 7 + mandoc, 8 + groff, 9 + rsync, 10 }: 11 12 mkDerivation { ··· 14 version = "9.2"; 15 sha256 = "0rjf9blihhm0n699vr2bg88m4yjhkbxh6fxliaay3wxkgnydjwn2"; 16 nativeBuildInputs = [ 17 + bsdSetupHook 18 + netbsdSetupHook 19 makeMinimal 20 + install 21 + mandoc 22 + groff 23 + rsync 24 ]; 25 }
+52 -45
pkgs/os-specific/bsd/netbsd/pkgs/make.nix
··· 1 - { lib, mkDerivation, fetchNetBSD, stdenv }: 2 3 mkDerivation { 4 path = "usr.bin/make"; 5 sha256 = "0vi73yicbmbp522qzqvd979cx6zm5jakhy77xh73c1kygf8klccs"; 6 version = "9.2"; 7 8 - postPatch = '' 9 - substituteInPlace $BSDSRCDIR/share/mk/bsd.doc.mk \ 10 - --replace '-o ''${DOCOWN}' "" \ 11 - --replace '-g ''${DOCGRP}' "" 12 - for mk in $BSDSRCDIR/share/mk/bsd.inc.mk $BSDSRCDIR/share/mk/bsd.kinc.mk; do 13 - substituteInPlace $mk \ 14 - --replace '-o ''${BINOWN}' "" \ 15 - --replace '-g ''${BINGRP}' "" 16 - done 17 - substituteInPlace $BSDSRCDIR/share/mk/bsd.kmodule.mk \ 18 - --replace '-o ''${KMODULEOWN}' "" \ 19 - --replace '-g ''${KMODULEGRP}' "" 20 - substituteInPlace $BSDSRCDIR/share/mk/bsd.lib.mk \ 21 - --replace '-o ''${LIBOWN}' "" \ 22 - --replace '-g ''${LIBGRP}' "" \ 23 - --replace '-o ''${DEBUGOWN}' "" \ 24 - --replace '-g ''${DEBUGGRP}' "" 25 - substituteInPlace $BSDSRCDIR/share/mk/bsd.lua.mk \ 26 - --replace '-o ''${LIBOWN}' "" \ 27 - --replace '-g ''${LIBGRP}' "" 28 - substituteInPlace $BSDSRCDIR/share/mk/bsd.man.mk \ 29 - --replace '-o ''${MANOWN}' "" \ 30 - --replace '-g ''${MANGRP}' "" 31 - substituteInPlace $BSDSRCDIR/share/mk/bsd.nls.mk \ 32 - --replace '-o ''${NLSOWN}' "" \ 33 - --replace '-g ''${NLSGRP}' "" 34 - substituteInPlace $BSDSRCDIR/share/mk/bsd.prog.mk \ 35 - --replace '-o ''${BINOWN}' "" \ 36 - --replace '-g ''${BINGRP}' "" \ 37 - --replace '-o ''${RUMPBINOWN}' "" \ 38 - --replace '-g ''${RUMPBINGRP}' "" \ 39 - --replace '-o ''${DEBUGOWN}' "" \ 40 - --replace '-g ''${DEBUGGRP}' "" 41 42 - # make needs this to pick up our sys make files 43 - export NIX_CFLAGS_COMPILE+=" -D_PATH_DEFSYSPATH=\"$out/share/mk\"" 44 45 - substituteInPlace $BSDSRCDIR/share/mk/bsd.lib.mk \ 46 - --replace '_INSTRANLIB=''${empty(PRESERVE):?-a "''${RANLIB} -t":}' '_INSTRANLIB=' 47 - substituteInPlace $BSDSRCDIR/share/mk/bsd.kinc.mk \ 48 - --replace /bin/rm rm 49 - '' + lib.optionalString stdenv.isDarwin '' 50 - substituteInPlace $BSDSRCDIR/share/mk/bsd.sys.mk \ 51 - --replace '-Wl,--fatal-warnings' "" \ 52 - --replace '-Wl,--warn-shared-textrel' "" 53 - ''; 54 postInstall = '' 55 make -C $BSDSRCDIR/share/mk FILESDIR=$out/share/mk install 56 '';
··· 1 + { 2 + lib, 3 + mkDerivation, 4 + fetchNetBSD, 5 + stdenv, 6 + }: 7 8 mkDerivation { 9 path = "usr.bin/make"; 10 sha256 = "0vi73yicbmbp522qzqvd979cx6zm5jakhy77xh73c1kygf8klccs"; 11 version = "9.2"; 12 13 + postPatch = 14 + '' 15 + substituteInPlace $BSDSRCDIR/share/mk/bsd.doc.mk \ 16 + --replace '-o ''${DOCOWN}' "" \ 17 + --replace '-g ''${DOCGRP}' "" 18 + for mk in $BSDSRCDIR/share/mk/bsd.inc.mk $BSDSRCDIR/share/mk/bsd.kinc.mk; do 19 + substituteInPlace $mk \ 20 + --replace '-o ''${BINOWN}' "" \ 21 + --replace '-g ''${BINGRP}' "" 22 + done 23 + substituteInPlace $BSDSRCDIR/share/mk/bsd.kmodule.mk \ 24 + --replace '-o ''${KMODULEOWN}' "" \ 25 + --replace '-g ''${KMODULEGRP}' "" 26 + substituteInPlace $BSDSRCDIR/share/mk/bsd.lib.mk \ 27 + --replace '-o ''${LIBOWN}' "" \ 28 + --replace '-g ''${LIBGRP}' "" \ 29 + --replace '-o ''${DEBUGOWN}' "" \ 30 + --replace '-g ''${DEBUGGRP}' "" 31 + substituteInPlace $BSDSRCDIR/share/mk/bsd.lua.mk \ 32 + --replace '-o ''${LIBOWN}' "" \ 33 + --replace '-g ''${LIBGRP}' "" 34 + substituteInPlace $BSDSRCDIR/share/mk/bsd.man.mk \ 35 + --replace '-o ''${MANOWN}' "" \ 36 + --replace '-g ''${MANGRP}' "" 37 + substituteInPlace $BSDSRCDIR/share/mk/bsd.nls.mk \ 38 + --replace '-o ''${NLSOWN}' "" \ 39 + --replace '-g ''${NLSGRP}' "" 40 + substituteInPlace $BSDSRCDIR/share/mk/bsd.prog.mk \ 41 + --replace '-o ''${BINOWN}' "" \ 42 + --replace '-g ''${BINGRP}' "" \ 43 + --replace '-o ''${RUMPBINOWN}' "" \ 44 + --replace '-g ''${RUMPBINGRP}' "" \ 45 + --replace '-o ''${DEBUGOWN}' "" \ 46 + --replace '-g ''${DEBUGGRP}' "" 47 48 + # make needs this to pick up our sys make files 49 + export NIX_CFLAGS_COMPILE+=" -D_PATH_DEFSYSPATH=\"$out/share/mk\"" 50 51 + substituteInPlace $BSDSRCDIR/share/mk/bsd.lib.mk \ 52 + --replace '_INSTRANLIB=''${empty(PRESERVE):?-a "''${RANLIB} -t":}' '_INSTRANLIB=' 53 + substituteInPlace $BSDSRCDIR/share/mk/bsd.kinc.mk \ 54 + --replace /bin/rm rm 55 + '' 56 + + lib.optionalString stdenv.isDarwin '' 57 + substituteInPlace $BSDSRCDIR/share/mk/bsd.sys.mk \ 58 + --replace '-Wl,--fatal-warnings' "" \ 59 + --replace '-Wl,--warn-shared-textrel' "" 60 + ''; 61 postInstall = '' 62 make -C $BSDSRCDIR/share/mk FILESDIR=$out/share/mk install 63 '';
+10 -5
pkgs/os-specific/bsd/netbsd/pkgs/makeMinimal.nix
··· 1 - { mkDerivation 2 - , bsdSetupHook, netbsdSetupHook, rsync 3 - , make 4 }: 5 6 mkDerivation { ··· 8 sha256 = "0fh0nrnk18m613m5blrliq2aydciv51qhc0ihsj4k63incwbk90n"; 9 version = "9.2"; 10 11 - buildInputs = []; 12 nativeBuildInputs = [ 13 - bsdSetupHook netbsdSetupHook rsync 14 ]; 15 16 skipIncludesPhase = true;
··· 1 + { 2 + mkDerivation, 3 + bsdSetupHook, 4 + netbsdSetupHook, 5 + rsync, 6 + make, 7 }: 8 9 mkDerivation { ··· 11 sha256 = "0fh0nrnk18m613m5blrliq2aydciv51qhc0ihsj4k63incwbk90n"; 12 version = "9.2"; 13 14 + buildInputs = [ ]; 15 nativeBuildInputs = [ 16 + bsdSetupHook 17 + netbsdSetupHook 18 + rsync 19 ]; 20 21 skipIncludesPhase = true;
+102 -71
pkgs/os-specific/bsd/netbsd/pkgs/mkDerivation.nix
··· 1 - { lib 2 - , stdenvNoCC, stdenv 3 - , fetchNetBSD 4 - , bsdSetupHook, netbsdSetupHook 5 - , makeMinimal 6 - , install, tsort, lorder 7 - , mandoc, groff, statHook, rsync 8 - , compatIfNeeded 9 - , defaultMakeFlags 10 }: 11 12 - lib.makeOverridable (attrs: let 13 - stdenv' = if attrs.noCC or false then stdenvNoCC else stdenv; 14 - in stdenv'.mkDerivation ({ 15 - pname = "${attrs.pname or (baseNameOf attrs.path)}-netbsd"; 16 - inherit (attrs) version; 17 - src = fetchNetBSD attrs.path attrs.version attrs.sha256; 18 19 - extraPaths = [ ]; 20 21 - nativeBuildInputs = [ 22 - bsdSetupHook netbsdSetupHook 23 - makeMinimal 24 - install tsort lorder mandoc groff statHook rsync 25 - ]; 26 - buildInputs = compatIfNeeded; 27 28 - HOST_SH = stdenv'.shell; 29 30 - MACHINE_ARCH = { 31 - i486 = "i386"; 32 - i586 = "i386"; 33 - i686 = "i386"; 34 - }.${stdenv'.hostPlatform.parsed.cpu.name} 35 - or stdenv'.hostPlatform.parsed.cpu.name; 36 37 - MACHINE = { 38 - x86_64 = "amd64"; 39 - aarch64 = "evbarm64"; 40 - i486 = "i386"; 41 - i586 = "i386"; 42 - i686 = "i386"; 43 - }.${stdenv'.hostPlatform.parsed.cpu.name} 44 - or stdenv'.hostPlatform.parsed.cpu.name; 45 46 - COMPONENT_PATH = attrs.path; 47 - 48 - makeFlags = defaultMakeFlags; 49 50 - strictDeps = true; 51 52 - meta = with lib; { 53 - maintainers = with maintainers; [ matthewbauer qyliss ]; 54 - platforms = platforms.unix; 55 - license = licenses.bsd2; 56 - }; 57 58 - } // lib.optionalAttrs stdenv'.hasCC { 59 - # TODO should CC wrapper set this? 60 - CPP = "${stdenv'.cc.targetPrefix}cpp"; 61 - } // lib.optionalAttrs stdenv'.isDarwin { 62 - MKRELRO = "no"; 63 - } // lib.optionalAttrs (stdenv'.cc.isClang or false) { 64 - HAVE_LLVM = lib.versions.major (lib.getVersion stdenv'.cc.cc); 65 - } // lib.optionalAttrs (stdenv'.cc.isGNU or false) { 66 - HAVE_GCC = lib.versions.major (lib.getVersion stdenv'.cc.cc); 67 - } // lib.optionalAttrs (stdenv'.isx86_32) { 68 - USE_SSP = "no"; 69 - } // lib.optionalAttrs (attrs.headersOnly or false) { 70 - installPhase = "includesPhase"; 71 - dontBuild = true; 72 - } // attrs // { 73 - # Files that use NetBSD-specific macros need to have nbtool_config.h 74 - # included ahead of them on non-NetBSD platforms. 75 - postPatch = lib.optionalString (!stdenv'.hostPlatform.isNetBSD) '' 76 - set +e 77 - grep -Zlr "^__RCSID 78 - ^__BEGIN_DECLS" $COMPONENT_PATH | xargs -0r grep -FLZ nbtool_config.h | 79 - xargs -0tr sed -i '0,/^#/s//#include <nbtool_config.h>\n\0/' 80 - set -e 81 - '' + attrs.postPatch or ""; 82 - }))
··· 1 + { 2 + lib, 3 + stdenvNoCC, 4 + stdenv, 5 + fetchNetBSD, 6 + bsdSetupHook, 7 + netbsdSetupHook, 8 + makeMinimal, 9 + install, 10 + tsort, 11 + lorder, 12 + mandoc, 13 + groff, 14 + statHook, 15 + rsync, 16 + compatIfNeeded, 17 + defaultMakeFlags, 18 }: 19 20 + lib.makeOverridable ( 21 + attrs: 22 + let 23 + stdenv' = if attrs.noCC or false then stdenvNoCC else stdenv; 24 + in 25 + stdenv'.mkDerivation ( 26 + { 27 + pname = "${attrs.pname or (baseNameOf attrs.path)}-netbsd"; 28 + inherit (attrs) version; 29 + src = fetchNetBSD attrs.path attrs.version attrs.sha256; 30 31 + extraPaths = [ ]; 32 33 + nativeBuildInputs = [ 34 + bsdSetupHook 35 + netbsdSetupHook 36 + makeMinimal 37 + install 38 + tsort 39 + lorder 40 + mandoc 41 + groff 42 + statHook 43 + rsync 44 + ]; 45 + buildInputs = compatIfNeeded; 46 47 + HOST_SH = stdenv'.shell; 48 49 + MACHINE_ARCH = 50 + { 51 + i486 = "i386"; 52 + i586 = "i386"; 53 + i686 = "i386"; 54 + } 55 + .${stdenv'.hostPlatform.parsed.cpu.name} or stdenv'.hostPlatform.parsed.cpu.name; 56 57 + MACHINE = 58 + { 59 + x86_64 = "amd64"; 60 + aarch64 = "evbarm64"; 61 + i486 = "i386"; 62 + i586 = "i386"; 63 + i686 = "i386"; 64 + } 65 + .${stdenv'.hostPlatform.parsed.cpu.name} or stdenv'.hostPlatform.parsed.cpu.name; 66 67 + COMPONENT_PATH = attrs.path; 68 69 + makeFlags = defaultMakeFlags; 70 71 + strictDeps = true; 72 73 + meta = with lib; { 74 + maintainers = with maintainers; [ 75 + matthewbauer 76 + qyliss 77 + ]; 78 + platforms = platforms.unix; 79 + license = licenses.bsd2; 80 + }; 81 + } 82 + // lib.optionalAttrs stdenv'.hasCC { 83 + # TODO should CC wrapper set this? 84 + CPP = "${stdenv'.cc.targetPrefix}cpp"; 85 + } 86 + // lib.optionalAttrs stdenv'.isDarwin { MKRELRO = "no"; } 87 + // lib.optionalAttrs (stdenv'.cc.isClang or false) { 88 + HAVE_LLVM = lib.versions.major (lib.getVersion stdenv'.cc.cc); 89 + } 90 + // lib.optionalAttrs (stdenv'.cc.isGNU or false) { 91 + HAVE_GCC = lib.versions.major (lib.getVersion stdenv'.cc.cc); 92 + } 93 + // lib.optionalAttrs (stdenv'.isx86_32) { USE_SSP = "no"; } 94 + // lib.optionalAttrs (attrs.headersOnly or false) { 95 + installPhase = "includesPhase"; 96 + dontBuild = true; 97 + } 98 + // attrs 99 + // { 100 + # Files that use NetBSD-specific macros need to have nbtool_config.h 101 + # included ahead of them on non-NetBSD platforms. 102 + postPatch = 103 + lib.optionalString (!stdenv'.hostPlatform.isNetBSD) '' 104 + set +e 105 + grep -Zlr "^__RCSID 106 + ^__BEGIN_DECLS" $COMPONENT_PATH | xargs -0r grep -FLZ nbtool_config.h | 107 + xargs -0tr sed -i '0,/^#/s//#include <nbtool_config.h>\n\0/' 108 + set -e 109 + '' 110 + + attrs.postPatch or ""; 111 + } 112 + ) 113 + )
-1
pkgs/os-specific/bsd/netbsd/pkgs/nbperf.nix
··· 5 version = "9.2"; 6 sha256 = "1nxc302vgmjhm3yqdivqyfzslrg0vjpbss44s74rcryrl19mma9r"; 7 } 8 -
··· 5 version = "9.2"; 6 sha256 = "1nxc302vgmjhm3yqdivqyfzslrg0vjpbss44s74rcryrl19mma9r"; 7 }
+1 -3
pkgs/os-specific/bsd/netbsd/pkgs/netbsdSetupHook/package.nix
··· 1 { makeSetupHook }: 2 3 - makeSetupHook { 4 - name = "netbsd-setup-hook"; 5 - } ./setup-hook.sh
··· 1 { makeSetupHook }: 2 3 + makeSetupHook { name = "netbsd-setup-hook"; } ./setup-hook.sh
+10 -7
pkgs/os-specific/bsd/netbsd/pkgs/stat/hook.nix
··· 1 - { makeSetupHook, writeText, stat }: 2 3 # stat isn't in POSIX, and NetBSD stat supports a completely 4 # different range of flags than GNU stat, so including it in PATH ··· 6 # NetBSD's build system and NetBSD stat without including it in 7 # PATH. 8 9 - makeSetupHook { 10 - name = "netbsd-stat-hook"; 11 - } (writeText "netbsd-stat-hook-impl" '' 12 - makeFlagsArray+=(TOOL_STAT=${stat}/bin/stat) 13 - '') 14 -
··· 1 + { 2 + makeSetupHook, 3 + writeText, 4 + stat, 5 + }: 6 7 # stat isn't in POSIX, and NetBSD stat supports a completely 8 # different range of flags than GNU stat, so including it in PATH ··· 10 # NetBSD's build system and NetBSD stat without including it in 11 # PATH. 12 13 + makeSetupHook { name = "netbsd-stat-hook"; } ( 14 + writeText "netbsd-stat-hook-impl" '' 15 + makeFlagsArray+=(TOOL_STAT=${stat}/bin/stat) 16 + '' 17 + )
+15 -6
pkgs/os-specific/bsd/netbsd/pkgs/stat/package.nix
··· 1 - { mkDerivation 2 - , bsdSetupHook, netbsdSetupHook 3 - , makeMinimal 4 - , install, mandoc, groff, rsync 5 }: 6 7 # Don't add this to nativeBuildInputs directly. ··· 12 version = "9.2"; 13 sha256 = "18nqwlndfc34qbbgqx5nffil37jfq9aw663ippasfxd2hlyc106x"; 14 nativeBuildInputs = [ 15 - bsdSetupHook netbsdSetupHook 16 makeMinimal 17 - install mandoc groff rsync 18 ]; 19 }
··· 1 + { 2 + mkDerivation, 3 + bsdSetupHook, 4 + netbsdSetupHook, 5 + makeMinimal, 6 + install, 7 + mandoc, 8 + groff, 9 + rsync, 10 }: 11 12 # Don't add this to nativeBuildInputs directly. ··· 17 version = "9.2"; 18 sha256 = "18nqwlndfc34qbbgqx5nffil37jfq9aw663ippasfxd2hlyc106x"; 19 nativeBuildInputs = [ 20 + bsdSetupHook 21 + netbsdSetupHook 22 makeMinimal 23 + install 24 + mandoc 25 + groff 26 + rsync 27 ]; 28 }
+38 -17
pkgs/os-specific/bsd/netbsd/pkgs/sys/base.nix
··· 1 - { lib, mkDerivation 2 - , include 3 - , bsdSetupHook, netbsdSetupHook 4 - , makeMinimal, install, tsort, lorder, statHook, rsync, uudecode, config, genassym 5 - , defaultMakeFlags 6 - , common 7 }: 8 { 9 path = "sys"; ··· 29 '' 30 substituteInPlace sys/arch/i386/stand/efiboot/Makefile.efiboot \ 31 --replace "-nocombreloc" "-z nocombreloc" 32 - '' + 33 - # multiple header dirs, see above 34 - include.postPatch; 35 36 CONFIG = "GENERIC"; 37 38 propagatedBuildInputs = [ include ]; 39 nativeBuildInputs = [ 40 - bsdSetupHook netbsdSetupHook 41 - makeMinimal install tsort lorder statHook rsync uudecode config genassym 42 ]; 43 44 - postConfigure = '' 45 - pushd arch/$MACHINE/conf 46 - config $CONFIG 47 - popd 48 - '' 49 # multiple header dirs, see above 50 + include.postConfigure; 51 ··· 68 69 meta.platforms = lib.platforms.netbsd; 70 extraPaths = [ common ]; 71 - 72 }
··· 1 + { 2 + lib, 3 + mkDerivation, 4 + include, 5 + bsdSetupHook, 6 + netbsdSetupHook, 7 + makeMinimal, 8 + install, 9 + tsort, 10 + lorder, 11 + statHook, 12 + rsync, 13 + uudecode, 14 + config, 15 + genassym, 16 + defaultMakeFlags, 17 + common, 18 }: 19 { 20 path = "sys"; ··· 40 '' 41 substituteInPlace sys/arch/i386/stand/efiboot/Makefile.efiboot \ 42 --replace "-nocombreloc" "-z nocombreloc" 43 + '' 44 + + 45 + # multiple header dirs, see above 46 + include.postPatch; 47 48 CONFIG = "GENERIC"; 49 50 propagatedBuildInputs = [ include ]; 51 nativeBuildInputs = [ 52 + bsdSetupHook 53 + netbsdSetupHook 54 + makeMinimal 55 + install 56 + tsort 57 + lorder 58 + statHook 59 + rsync 60 + uudecode 61 + config 62 + genassym 63 ]; 64 65 + postConfigure = 66 + '' 67 + pushd arch/$MACHINE/conf 68 + config $CONFIG 69 + popd 70 + '' 71 # multiple header dirs, see above 72 + include.postConfigure; 73 ··· 90 91 meta.platforms = lib.platforms.netbsd; 92 extraPaths = [ common ]; 93 }
+39 -11
pkgs/os-specific/bsd/netbsd/pkgs/sys/headers.nix
··· 1 - { lib, mkDerivation 2 - , include 3 - , bsdSetupHook, netbsdSetupHook 4 - , makeMinimal, install, tsort, lorder, statHook, rsync, uudecode, config, genassym 5 - , defaultMakeFlags 6 - , common 7 }: 8 let 9 base = import ./base.nix { 10 inherit 11 - lib mkDerivation include bsdSetupHook netbsdSetupHook makeMinimal install 12 - tsort lorder statHook rsync uudecode config genassym defaultMakeFlags 13 - common; 14 }; 15 in 16 - mkDerivation (base // { 17 pname = "sys-headers"; 18 installPhase = "includesPhase"; 19 dontBuild = true; 20 noCC = true; 21 - })
··· 1 + { 2 + lib, 3 + mkDerivation, 4 + include, 5 + bsdSetupHook, 6 + netbsdSetupHook, 7 + makeMinimal, 8 + install, 9 + tsort, 10 + lorder, 11 + statHook, 12 + rsync, 13 + uudecode, 14 + config, 15 + genassym, 16 + defaultMakeFlags, 17 + common, 18 }: 19 let 20 base = import ./base.nix { 21 inherit 22 + lib 23 + mkDerivation 24 + include 25 + bsdSetupHook 26 + netbsdSetupHook 27 + makeMinimal 28 + install 29 + tsort 30 + lorder 31 + statHook 32 + rsync 33 + uudecode 34 + config 35 + genassym 36 + defaultMakeFlags 37 + common 38 + ; 39 }; 40 in 41 + mkDerivation ( 42 + base 43 + // { 44 pname = "sys-headers"; 45 installPhase = "includesPhase"; 46 dontBuild = true; 47 noCC = true; 48 + } 49 + )
+39 -11
pkgs/os-specific/bsd/netbsd/pkgs/sys/package.nix
··· 1 - { lib, mkDerivation 2 - , include 3 - , bsdSetupHook, netbsdSetupHook 4 - , makeMinimal, install, tsort, lorder, statHook, rsync, uudecode, config, genassym 5 - , defaultMakeFlags 6 - , common 7 }: 8 let 9 base = import ./base.nix { 10 inherit 11 - lib mkDerivation include bsdSetupHook netbsdSetupHook makeMinimal install 12 - tsort lorder statHook rsync uudecode config genassym defaultMakeFlags 13 - common; 14 }; 15 in 16 - mkDerivation (base // { 17 pname = "sys"; 18 installPhase = null; 19 noCC = false; 20 dontBuild = false; 21 - })
··· 1 + { 2 + lib, 3 + mkDerivation, 4 + include, 5 + bsdSetupHook, 6 + netbsdSetupHook, 7 + makeMinimal, 8 + install, 9 + tsort, 10 + lorder, 11 + statHook, 12 + rsync, 13 + uudecode, 14 + config, 15 + genassym, 16 + defaultMakeFlags, 17 + common, 18 }: 19 let 20 base = import ./base.nix { 21 inherit 22 + lib 23 + mkDerivation 24 + include 25 + bsdSetupHook 26 + netbsdSetupHook 27 + makeMinimal 28 + install 29 + tsort 30 + lorder 31 + statHook 32 + rsync 33 + uudecode 34 + config 35 + genassym 36 + defaultMakeFlags 37 + common 38 + ; 39 }; 40 in 41 + mkDerivation ( 42 + base 43 + // { 44 pname = "sys"; 45 installPhase = null; 46 noCC = false; 47 dontBuild = false; 48 + } 49 + )
+21 -10
pkgs/os-specific/bsd/netbsd/pkgs/tic.nix
··· 1 - { mkDerivation 2 - , bsdSetupHook, netbsdSetupHook 3 - , makeMinimal 4 - , install, mandoc, groff, nbperf, rsync 5 - , compatIfNeeded 6 - , defaultMakeFlags 7 - , libterminfo 8 - , fetchNetBSD 9 }: 10 11 mkDerivation { ··· 15 HOSTPROG = "tic"; 16 buildInputs = compatIfNeeded; 17 nativeBuildInputs = [ 18 - bsdSetupHook netbsdSetupHook 19 makeMinimal 20 - install mandoc groff nbperf rsync 21 ]; 22 makeFlags = defaultMakeFlags ++ [ "TOOLDIR=$(out)" ]; 23 extraPaths = [
··· 1 + { 2 + mkDerivation, 3 + bsdSetupHook, 4 + netbsdSetupHook, 5 + makeMinimal, 6 + install, 7 + mandoc, 8 + groff, 9 + nbperf, 10 + rsync, 11 + compatIfNeeded, 12 + defaultMakeFlags, 13 + libterminfo, 14 + fetchNetBSD, 15 }: 16 17 mkDerivation { ··· 21 HOSTPROG = "tic"; 22 buildInputs = compatIfNeeded; 23 nativeBuildInputs = [ 24 + bsdSetupHook 25 + netbsdSetupHook 26 makeMinimal 27 + install 28 + mandoc 29 + groff 30 + nbperf 31 + rsync 32 ]; 33 makeFlags = defaultMakeFlags ++ [ "TOOLDIR=$(out)" ]; 34 extraPaths = [
+15 -6
pkgs/os-specific/bsd/netbsd/pkgs/tsort.nix
··· 1 - { mkDerivation 2 - , bsdSetupHook, netbsdSetupHook 3 - , makeMinimal 4 - , install, mandoc, groff, rsync 5 }: 6 7 mkDerivation { ··· 9 version = "9.2"; 10 sha256 = "1dqvf9gin29nnq3c4byxc7lfd062pg7m84843zdy6n0z63hnnwiq"; 11 nativeBuildInputs = [ 12 - bsdSetupHook netbsdSetupHook 13 makeMinimal 14 - install mandoc groff rsync 15 ]; 16 }
··· 1 + { 2 + mkDerivation, 3 + bsdSetupHook, 4 + netbsdSetupHook, 5 + makeMinimal, 6 + install, 7 + mandoc, 8 + groff, 9 + rsync, 10 }: 11 12 mkDerivation { ··· 14 version = "9.2"; 15 sha256 = "1dqvf9gin29nnq3c4byxc7lfd062pg7m84843zdy6n0z63hnnwiq"; 16 nativeBuildInputs = [ 17 + bsdSetupHook 18 + netbsdSetupHook 19 makeMinimal 20 + install 21 + mandoc 22 + groff 23 + rsync 24 ]; 25 }
+5 -2
pkgs/os-specific/bsd/netbsd/pkgs/uudecode.nix
··· 1 - { lib, mkDerivation, stdenv }: 2 3 mkDerivation { 4 path = "usr.bin/uudecode"; ··· 7 env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isLinux "-DNO_BASE64"; 8 NIX_LDFLAGS = lib.optional stdenv.isDarwin "-lresolv"; 9 } 10 -
··· 1 + { 2 + lib, 3 + mkDerivation, 4 + stdenv, 5 + }: 6 7 mkDerivation { 8 path = "usr.bin/uudecode"; ··· 11 env.NIX_CFLAGS_COMPILE = lib.optionalString stdenv.isLinux "-DNO_BASE64"; 12 NIX_LDFLAGS = lib.optional stdenv.isDarwin "-lresolv"; 13 }
+1 -1
pkgs/servers/home-assistant/component-packages.nix
··· 2 # Do not edit! 3 4 { 5 - version = "2024.5.1"; 6 components = { 7 "3_day_blinds" = ps: with ps; [ 8 ];
··· 2 # Do not edit! 3 4 { 5 + version = "2024.5.2"; 6 components = { 7 "3_day_blinds" = ps: with ps; [ 8 ];
+3 -3
pkgs/servers/home-assistant/default.nix
··· 476 extraBuildInputs = extraPackages python.pkgs; 477 478 # Don't forget to run update-component-packages.py after updating 479 - hassVersion = "2024.5.1"; 480 481 in python.pkgs.buildPythonApplication rec { 482 pname = "homeassistant"; ··· 494 owner = "home-assistant"; 495 repo = "core"; 496 rev = "refs/tags/${version}"; 497 - hash = "sha256-/JuKN0V2wMZW56l2nt4T3cpDnQiHeC27+QVBi3j3aDI="; 498 }; 499 500 # Secondary source is pypi sdist for translations 501 sdist = fetchPypi { 502 inherit pname version; 503 - hash = "sha256-3Tqs+69e1ESOcEMCx3LTt1c04pG5pK/RGX30x8WRegQ="; 504 }; 505 506 build-system = with python.pkgs; [
··· 476 extraBuildInputs = extraPackages python.pkgs; 477 478 # Don't forget to run update-component-packages.py after updating 479 + hassVersion = "2024.5.2"; 480 481 in python.pkgs.buildPythonApplication rec { 482 pname = "homeassistant"; ··· 494 owner = "home-assistant"; 495 repo = "core"; 496 rev = "refs/tags/${version}"; 497 + hash = "sha256-OdtkkZ8Yl6H2dUBILrT/02ML3MnptdBydVzKhxoKjAY="; 498 }; 499 500 # Secondary source is pypi sdist for translations 501 sdist = fetchPypi { 502 inherit pname version; 503 + hash = "sha256-5ASuTREkAUCS94Ur5yNHU8ISrASGl90scyYWBHiKlKI="; 504 }; 505 506 build-system = with python.pkgs; [
+2 -2
pkgs/servers/home-assistant/frontend.nix
··· 4 # the frontend version corresponding to a specific home-assistant version can be found here 5 # https://github.com/home-assistant/home-assistant/blob/master/homeassistant/components/frontend/manifest.json 6 pname = "home-assistant-frontend"; 7 - version = "20240501.0"; 8 format = "wheel"; 9 10 src = fetchPypi { ··· 12 pname = "home_assistant_frontend"; 13 dist = "py3"; 14 python = "py3"; 15 - hash = "sha256-W3EiDkm/Se63/Ph4HUSRj2pY+y/pyCqecs4azYcxsaw="; 16 }; 17 18 # there is nothing to strip in this package
··· 4 # the frontend version corresponding to a specific home-assistant version can be found here 5 # https://github.com/home-assistant/home-assistant/blob/master/homeassistant/components/frontend/manifest.json 6 pname = "home-assistant-frontend"; 7 + version = "20240501.1"; 8 format = "wheel"; 9 10 src = fetchPypi { ··· 12 pname = "home_assistant_frontend"; 13 dist = "py3"; 14 python = "py3"; 15 + hash = "sha256-d/mlZfMri0E4lgMrIt3cRqpF3F12Xr7YuHqTogFON9E="; 16 }; 17 18 # there is nothing to strip in this package
+11 -4
pkgs/servers/psitransfer/default.nix
··· 1 { lib 2 , buildNpmPackage 3 , fetchFromGitHub 4 }: 5 6 let 7 pname = "psitransfer"; 8 - version = "2.1.2"; 9 src = fetchFromGitHub { 10 owner = "psi-4ward"; 11 repo = "psitransfer"; 12 rev = "v${version}"; 13 - hash = "sha256-dBAieXIwCEstR9m+6+2/OLPKo2qHynZ1t372Il0mkXk="; 14 }; 15 app = buildNpmPackage { 16 pname = "${pname}-app"; 17 inherit version src; 18 19 - npmDepsHash = "sha256-iCd+I/aTMwQqAMRHan3T191XNz4S3Cy6CDxSLIYY7IA="; 20 21 postPatch = '' 22 # https://github.com/psi-4ward/psitransfer/pull/284 ··· 31 in buildNpmPackage { 32 inherit pname version src; 33 34 - npmDepsHash = "sha256-H22T5IU8bjbsWhwhchDqppvYfcatbXSWqp6gdoek1Z8="; 35 36 postPatch = '' 37 rm -r public/app
··· 1 { lib 2 , buildNpmPackage 3 , fetchFromGitHub 4 + , pkg-config 5 + , vips 6 }: 7 8 let 9 pname = "psitransfer"; 10 + version = "2.2.0"; 11 src = fetchFromGitHub { 12 owner = "psi-4ward"; 13 repo = "psitransfer"; 14 rev = "v${version}"; 15 + hash = "sha256-5o4QliAXgSZekIy0CNWfEuOxNl0uetL8C8RKUJ8HsNA="; 16 }; 17 app = buildNpmPackage { 18 pname = "${pname}-app"; 19 inherit version src; 20 21 + npmDepsHash = "sha256-q7E+osWIf6VZ3JvxCXoZYeF28aMgmKP6EzQkksUUjeY="; 22 23 postPatch = '' 24 # https://github.com/psi-4ward/psitransfer/pull/284 ··· 33 in buildNpmPackage { 34 inherit pname version src; 35 36 + npmDepsHash = "sha256-EW/Fej58LE/nbJomPtWvEjDveAUdo0jIWwC+ziN0gy0="; 37 + 38 + nativeBuildInputs = [ pkg-config ]; 39 + buildInputs = [ 40 + vips # for 'sharp' dependency 41 + ]; 42 43 postPatch = '' 44 rm -r public/app
+2 -2
pkgs/servers/roon-server/default.nix
··· 15 , stdenv 16 }: 17 let 18 - version = "2.0-1392"; 19 urlVersion = builtins.replaceStrings [ "." "-" ] [ "00" "0" ] version; 20 in 21 stdenv.mkDerivation { ··· 24 25 src = fetchurl { 26 url = "https://download.roonlabs.com/updates/production/RoonServer_linuxx64_${urlVersion}.tar.bz2"; 27 - hash = "sha256-S6p2xlWa1Xgp+umRx1KCs4g1u7JZTByNBNUSJBQweUs="; 28 }; 29 30 dontConfigure = true;
··· 15 , stdenv 16 }: 17 let 18 + version = "2.0-1407"; 19 urlVersion = builtins.replaceStrings [ "." "-" ] [ "00" "0" ] version; 20 in 21 stdenv.mkDerivation { ··· 24 25 src = fetchurl { 26 url = "https://download.roonlabs.com/updates/production/RoonServer_linuxx64_${urlVersion}.tar.bz2"; 27 + hash = "sha256-PW28Rw0prHS/q879GYVKaiXe0i2w6BVwgcTWOUhAhOk="; 28 }; 29 30 dontConfigure = true;
+1
pkgs/top-level/aliases.nix
··· 586 kube3d = k3d; # Added 2022-0705 587 kafkacat = kcat; # Added 2021-10-07 588 kak-lsp = kakoune-lsp; # Added 2024-04-01 589 kdeconnect = plasma5Packages.kdeconnect-kde; # Added 2020-10-28 590 keepassx = throw "KeePassX is no longer actively developed. Please consider KeePassXC as a maintained alternative."; # Added 2023-02-17 591 keepassx2 = throw "KeePassX is no longer actively developed. Please consider KeePassXC as a maintained alternative."; # Added 2023-02-17
··· 586 kube3d = k3d; # Added 2022-0705 587 kafkacat = kcat; # Added 2021-10-07 588 kak-lsp = kakoune-lsp; # Added 2024-04-01 589 + kdbplus = throw "'kdbplus' has been removed from nixpkgs"; # Added 2024-05-06 590 kdeconnect = plasma5Packages.kdeconnect-kde; # Added 2020-10-28 591 keepassx = throw "KeePassX is no longer actively developed. Please consider KeePassXC as a maintained alternative."; # Added 2023-02-17 592 keepassx2 = throw "KeePassX is no longer actively developed. Please consider KeePassXC as a maintained alternative."; # Added 2023-02-17
-8
pkgs/top-level/all-packages.nix
··· 9583 9584 kdoctor = callPackage ../development/tools/kdoctor { }; 9585 9586 - kdbplus = pkgsi686Linux.callPackage ../applications/misc/kdbplus { }; 9587 - 9588 kdigger = callPackage ../tools/security/kdigger { }; 9589 9590 kdiskmark = libsForQt5.callPackage ../tools/filesystems/kdiskmark { }; ··· 23803 23804 opensupaplex = callPackage ../games/opensupaplex { }; 23805 23806 - openturns = callPackage ../development/libraries/openturns { 23807 - inherit (darwin.apple_sdk.frameworks) Accelerate; 23808 - }; 23809 - 23810 open-wbo = callPackage ../applications/science/logic/open-wbo { }; 23811 23812 openwsman = callPackage ../development/libraries/openwsman { }; ··· 30673 exercism = callPackage ../applications/misc/exercism { }; 30674 30675 expenses = callPackage ../applications/misc/expenses { }; 30676 - 30677 - flowtime = callPackage ../applications/misc/flowtime { }; 30678 30679 furnace = callPackage ../applications/audio/furnace { 30680 inherit (darwin.apple_sdk.frameworks) Cocoa;
··· 9583 9584 kdoctor = callPackage ../development/tools/kdoctor { }; 9585 9586 kdigger = callPackage ../tools/security/kdigger { }; 9587 9588 kdiskmark = libsForQt5.callPackage ../tools/filesystems/kdiskmark { }; ··· 23801 23802 opensupaplex = callPackage ../games/opensupaplex { }; 23803 23804 open-wbo = callPackage ../applications/science/logic/open-wbo { }; 23805 23806 openwsman = callPackage ../development/libraries/openwsman { }; ··· 30667 exercism = callPackage ../applications/misc/exercism { }; 30668 30669 expenses = callPackage ../applications/misc/expenses { }; 30670 30671 furnace = callPackage ../applications/audio/furnace { 30672 inherit (darwin.apple_sdk.frameworks) Cocoa;