Merge commit '3ab2949' from staging into master

Conflicts:
pkgs/development/compilers/llvm/6/llvm.nix
pkgs/servers/home-assistant/component-packages.nix

Changed files
+2064 -3432
doc
languages-frameworks
nixos
pkgs
applications
display-managers
lightdm-gtk-greeter
misc
pytrainer
science
spyder
version-management
nbstripout
build-support
data
misc
cacert
poppler-data
tzdata
development
compilers
interpreters
libraries
atk
audio
libgme
boost
dbus
epoxy
fontconfig
gnutls
gobject-introspection
gtk+
harfbuzz
http-parser
imlib2
jansson
lcms2
libatomic_ops
libdrm
libdvdcss
libevdev
libgcrypt
libgsf
libidn2
libinput
libkate
libmbim
libmicrohttpd
libmng
libmodplug
libqmi
libraw1394
libseccomp
libspatialite
libunistring
libunwind
libuv
libva
libva-utils
libwacom
libxkbcommon
mesa
ncurses
newt
nspr
p11-kit
pixman
poppler
protobuf
qt-5
sqlite
vaapi-intel
wayland
zziplib
perl-modules
python-modules
MechanicalSoup
absl-py
affinity
aiohttp-jinja2
aniso8601
apsw
asgiref
astral
asynctest
behave
bibtexparser
binaryornot
blaze
blinkstick
bootstrapped-pip
boto3
botocore
buildout-nix
cached-property
cachetools
can
cffi
chainer
codecov
cram
csvkit
cupy
curtsies
daphne
dask
dbf
deluge-client
dj-database-url
django
django-polymorphic
ecpy
faker
flask-script
fonttools
ftputil
google_cloud_core
google_cloud_speech
gpy
green
guessit
ha-ffmpeg
hyperlink
ipykernel
kafka-python
konfig
ldappool
llvmlite
marionette-harness
miniupnpc
mozterm
msgpack
neovim
netdisco
networkx
nipype
numba
numpy
paramz
pendulum
phonenumbers
plotly
pomegranate
prov
pybfd
pycups
pydub
pymongo
pyopencl
pytest
pytest-mock
pytest-xdist
python-daemon
python-oauth2
pytools
rednose
regex
restructuredtext_lint
setuptools
sphinx
sqlalchemy
sqlmap
sseclient
stripe
termstyle
text-unidecode
textacy
tifffile
tmdb3
tqdm
tunigo
txtorcon
virtual-display
wrapt
xarray
xdot
yahooweather
zeroconf
tools
analysis
autoflake
build-managers
misc
autogen
automake
strace
parsing
pew
pipenv
vcstool
yq
misc
os-specific
linux
apparmor
fuse
iputils
kernel-headers
libaio
systemd
util-linux
servers
dns
home-assistant
http
nginx
sql
postgresql
shells
stdenv
tools
admin
awscli
compression
filesystems
btrfs-progs
e2fsprogs
misc
you-get
networking
security
text
typesetting
docbook2x
tex
top-level
+14
doc/languages-frameworks/perl.xml
···
</section>
+
<section xml:id="ssec-perl-cross-compilation"><title>Cross-compiling modules</title>
+
+
<para>Nixpkgs has experimental support for cross-compiling Perl
+
modules. In many cases, it will just work out of the box, even for
+
modules with native extensions. Sometimes, however, the Makefile.PL
+
for a module may (indirectly) import a native module. In that case,
+
you will need to make a stub for that module that will satisfy the
+
Makefile.PL and install it into
+
<filename>lib/perl5/site_perl/cross_perl/${perl.version}</filename>.
+
See the <varname>postInstall</varname> for <varname>DBI</varname> for
+
an example.</para>
+
+
</section>
+
</section>
+5 -5
nixos/doc/manual/default.nix
···
echo "for hints about the offending path)."
exit 1
fi
-
${libxslt.bin}/bin/xsltproc \
+
${buildPackages.libxslt.bin}/bin/xsltproc \
--stringparam revision '${revision}' \
-o $out ${./options-to-docbook.xsl} $optionsXML
'';
···
manual-combined = runCommand "nixos-manual-combined"
{ inherit sources;
-
buildInputs = [ libxml2 libxslt ];
+
nativeBuildInputs = [ buildPackages.libxml2 buildPackages.libxslt ];
meta.description = "The NixOS manual as plain docbook XML";
}
''
···
olinkDB = runCommand "manual-olinkdb"
{ inherit sources;
-
buildInputs = [ libxml2 libxslt ];
+
nativeBuildInputs = [ buildPackages.libxml2 buildPackages.libxslt ];
}
''
xsltproc \
···
# Generate the NixOS manual.
manual = runCommand "nixos-manual"
{ inherit sources;
-
buildInputs = [ libxml2 libxslt ];
+
nativeBuildInputs = [ buildPackages.libxml2 buildPackages.libxslt ];
meta.description = "The NixOS manual in HTML format";
allowedReferences = ["out"];
}
···
# Generate the NixOS manpages.
manpages = runCommand "nixos-manpages"
{ inherit sources;
-
buildInputs = [ libxml2 libxslt ];
+
nativeBuildInputs = [ buildPackages.libxml2 buildPackages.libxslt ];
allowedReferences = ["out"];
}
''
+1 -1
nixos/modules/config/i18n.nix
···
i18n = {
glibcLocales = mkOption {
type = types.path;
-
default = pkgs.glibcLocales.override {
+
default = pkgs.buildPackages.glibcLocales.override {
allLocales = any (x: x == "all") config.i18n.supportedLocales;
locales = config.i18n.supportedLocales;
};
+1
nixos/modules/config/no-x-libs.nix
···
networkmanager-vpnc = pkgs.networkmanager-vpnc.override { withGnome = false; };
networkmanager-iodine = pkgs.networkmanager-iodine.override { withGnome = false; };
pinentry = pkgs.pinentry_ncurses;
+
gobjectIntrospection = pkgs.gobjectIntrospection.override { x11Support = false; };
};
};
}
+1 -1
nixos/modules/config/zram.nix
···
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
-
ExecStop = "${pkgs.stdenv.shell} -c 'echo 1 > /sys/class/block/${dev}/reset'";
+
ExecStop = "${pkgs.runtimeShell} -c 'echo 1 > /sys/class/block/${dev}/reset'";
};
script = ''
set -u
+4 -4
nixos/modules/hardware/video/nvidia.nix
···
# Create /dev/nvidia-uvm when the nvidia-uvm module is loaded.
services.udev.extraRules =
''
-
KERNEL=="nvidia", RUN+="${pkgs.stdenv.shell} -c 'mknod -m 666 /dev/nvidiactl c $(grep nvidia-frontend /proc/devices | cut -d \ -f 1) 255'"
-
KERNEL=="nvidia_modeset", RUN+="${pkgs.stdenv.shell} -c 'mknod -m 666 /dev/nvidia-modeset c $(grep nvidia-frontend /proc/devices | cut -d \ -f 1) 254'"
-
KERNEL=="card*", SUBSYSTEM=="drm", DRIVERS=="nvidia", RUN+="${pkgs.stdenv.shell} -c 'mknod -m 666 /dev/nvidia%n c $(grep nvidia-frontend /proc/devices | cut -d \ -f 1) %n'"
-
KERNEL=="nvidia_uvm", RUN+="${pkgs.stdenv.shell} -c 'mknod -m 666 /dev/nvidia-uvm c $(grep nvidia-uvm /proc/devices | cut -d \ -f 1) 0'"
+
KERNEL=="nvidia", RUN+="${pkgs.runtimeShell} -c 'mknod -m 666 /dev/nvidiactl c $(grep nvidia-frontend /proc/devices | cut -d \ -f 1) 255'"
+
KERNEL=="nvidia_modeset", RUN+="${pkgs.runtimeShell} -c 'mknod -m 666 /dev/nvidia-modeset c $(grep nvidia-frontend /proc/devices | cut -d \ -f 1) 254'"
+
KERNEL=="card*", SUBSYSTEM=="drm", DRIVERS=="nvidia", RUN+="${pkgs.runtimeShell} -c 'mknod -m 666 /dev/nvidia%n c $(grep nvidia-frontend /proc/devices | cut -d \ -f 1) %n'"
+
KERNEL=="nvidia_uvm", RUN+="${pkgs.runtimeShell} -c 'mknod -m 666 /dev/nvidia-uvm c $(grep nvidia-uvm /proc/devices | cut -d \ -f 1) 0'"
'';
boot.blacklistedKernelModules = [ "nouveau" "nvidiafb" ];
+13 -1
nixos/modules/misc/nixpkgs.nix
···
inherit (config.nixpkgs) config overlays system;
}
'';
-
default = import ../../.. { inherit (cfg) config overlays system; };
+
default = import ../../.. { inherit (cfg) config overlays system crossSystem; };
type = pkgsType;
example = literalExample ''import <nixpkgs> {}'';
description = ''
···
takes as an argument the <emphasis>original</emphasis> Nixpkgs.
The first argument should be used for finding dependencies, and
the second should be used for overriding recipes.
+
+
Ignored when <code>nixpkgs.pkgs</code> is set.
+
'';
+
};
+
+
crossSystem = mkOption {
+
type = types.nullOr types.attrs;
+
default = null;
+
description = ''
+
The description of the system we're cross-compiling to, or null
+
if this isn't a cross-compile. See the description of the
+
crossSystem argument in the nixpkgs manual.
Ignored when <code>nixpkgs.pkgs</code> is set.
'';
+1 -1
nixos/modules/programs/rootston.nix
···
cfg = config.programs.rootston;
rootstonWrapped = pkgs.writeScriptBin "rootston" ''
-
#! ${pkgs.stdenv.shell}
+
#! ${pkgs.runtimeShell}
if [[ "$#" -ge 1 ]]; then
exec ${pkgs.rootston}/bin/rootston "$@"
else
+1 -1
nixos/modules/programs/ssh.nix
···
askPasswordWrapper = pkgs.writeScript "ssh-askpass-wrapper"
''
-
#! ${pkgs.stdenv.shell} -e
+
#! ${pkgs.runtimeShell} -e
export DISPLAY="$(systemctl --user show-environment | ${pkgs.gnused}/bin/sed 's/^DISPLAY=\(.*\)/\1/; t; d')"
exec ${askPassword}
'';
+3 -3
nixos/modules/security/audit.nix
···
};
disableScript = pkgs.writeScript "audit-disable" ''
-
#!${pkgs.stdenv.shell} -eu
+
#!${pkgs.runtimeShell} -eu
# Explicitly disable everything, as otherwise journald might start it.
auditctl -D
auditctl -e 0 -a task,never
···
# put in the store like this. At the same time, it doesn't feel like a huge deal and working
# around that is a pain so I'm leaving it like this for now.
startScript = pkgs.writeScript "audit-start" ''
-
#!${pkgs.stdenv.shell} -eu
+
#!${pkgs.runtimeShell} -eu
# Clear out any rules we may start with
auditctl -D
···
'';
stopScript = pkgs.writeScript "audit-stop" ''
-
#!${pkgs.stdenv.shell} -eu
+
#!${pkgs.runtimeShell} -eu
# Clear the rules
auditctl -D
+1 -1
nixos/modules/security/sudo.nix
···
{ src = pkgs.writeText "sudoers-in" cfg.configFile; }
# Make sure that the sudoers file is syntactically valid.
# (currently disabled - NIXOS-66)
-
"${pkgs.sudo}/sbin/visudo -f $src -c && cp $src $out";
+
"${pkgs.buildPackages.sudo}/sbin/visudo -f $src -c && cp $src $out";
target = "sudoers";
mode = "0440";
};
+1 -1
nixos/modules/services/continuous-integration/buildkite-agent.nix
···
hooksDir = let
mkHookEntry = name: value: ''
cat > $out/${name} <<EOF
-
#! ${pkgs.stdenv.shell}
+
#! ${pkgs.runtimeShell}
set -e
${value}
EOF
+1 -1
nixos/modules/services/databases/4store-endpoint.nix
···
let
cfg = config.services.fourStoreEndpoint;
endpointUser = "fourstorehttp";
-
run = "${pkgs.su}/bin/su -s ${pkgs.stdenv.shell} ${endpointUser} -c";
+
run = "${pkgs.su}/bin/su -s ${pkgs.runtimeShell} ${endpointUser} -c";
in
with lib;
{
+1 -1
nixos/modules/services/databases/4store.nix
···
cfg = config.services.fourStore;
stateDir = "/var/lib/4store";
fourStoreUser = "fourstore";
-
run = "${pkgs.su}/bin/su -s ${pkgs.stdenv.shell} ${fourStoreUser}";
+
run = "${pkgs.su}/bin/su -s ${pkgs.runtimeShell} ${fourStoreUser}";
in
with lib;
{
+1 -1
nixos/modules/services/editors/emacs.nix
···
cfg = config.services.emacs;
editorScript = pkgs.writeScriptBin "emacseditor" ''
-
#!${pkgs.stdenv.shell}
+
#!${pkgs.runtimeShell}
if [ -z "$1" ]; then
exec ${cfg.package}/bin/emacsclient --create-frame --alternate-editor ${cfg.package}/bin/emacs
else
+1 -1
nixos/modules/services/hardware/udev.nix
···
echo "Generating hwdb database..."
# hwdb --update doesn't return error code even on errors!
-
res="$(${udev}/bin/udevadm hwdb --update --root=$(pwd) 2>&1)"
+
res="$(${pkgs.buildPackages.udev}/bin/udevadm hwdb --update --root=$(pwd) 2>&1)"
echo "$res"
[ -z "$(echo "$res" | egrep '^Error')" ]
mv etc/udev/hwdb.bin $out
+1 -1
nixos/modules/services/misc/folding-at-home.nix
···
chown ${fahUser} ${stateDir}
cp -f ${pkgs.writeText "client.cfg" cfg.config} ${stateDir}/client.cfg
'';
-
script = "${pkgs.su}/bin/su -s ${pkgs.stdenv.shell} ${fahUser} -c 'cd ${stateDir}; ${pkgs.foldingathome}/bin/fah6'";
+
script = "${pkgs.su}/bin/su -s ${pkgs.runtimeShell} ${fahUser} -c 'cd ${stateDir}; ${pkgs.foldingathome}/bin/fah6'";
};
services.foldingAtHome.config = ''
+1 -1
nixos/modules/services/misc/geoip-updater.nix
···
# ExecStart= command with '@' doesn't work because we start a shell (new
# process) that creates a new argv[0].)
geoip-updater = pkgs.writeScriptBin "geoip-updater" ''
-
#!${pkgs.stdenv.shell}
+
#!${pkgs.runtimeShell}
skipExisting=0
debug()
{
+1 -1
nixos/modules/services/misc/gitit.nix
···
gititSh = hsPkgs: extras: with pkgs; let
env = gititWithPkgs hsPkgs extras;
in writeScript "gitit" ''
-
#!${stdenv.shell}
+
#!${runtimeShell}
cd $HOME
export NIX_GHC="${env}/bin/ghc"
export NIX_GHCPKG="${env}/bin/ghc-pkg"
+1 -1
nixos/modules/services/misc/ihaskell.nix
···
serviceConfig = {
User = config.users.extraUsers.ihaskell.name;
Group = config.users.extraGroups.ihaskell.name;
-
ExecStart = "${pkgs.stdenv.shell} -c \"cd $HOME;${ihaskell}/bin/ihaskell-notebook\"";
+
ExecStart = "${pkgs.runtimeShell} -c \"cd $HOME;${ihaskell}/bin/ihaskell-notebook\"";
};
};
};
+1 -1
nixos/modules/services/misc/mesos-slave.nix
···
description = "Mesos Slave";
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
-
path = [ pkgs.stdenv.shellPackage ];
+
path = [ pkgs.runtimeShellPackage ];
serviceConfig = {
ExecStart = ''
${pkgs.mesos}/bin/mesos-slave \
+1 -1
nixos/modules/services/misc/nix-daemon.nix
···
# /bin/sh in the sandbox as a bind-mount to bash. This means we
# also need to include the entire closure of bash. Nix >= 2.0
# provides a /bin/sh by default.
-
sh = pkgs.stdenv.shell;
+
sh = pkgs.runtimeShell;
binshDeps = pkgs.writeReferencesToFile sh;
in
pkgs.runCommand "nix.conf" { extraOptions = cfg.extraOptions; } ''
+1 -1
nixos/modules/services/misc/nixos-manual.nix
···
helpScript = pkgs.writeScriptBin "nixos-help"
''
-
#! ${pkgs.stdenv.shell} -e
+
#! ${pkgs.runtimeShell} -e
browser="$BROWSER"
if [ -z "$browser" ]; then
browser="$(type -P xdg-open || true)"
+1 -1
nixos/modules/services/misc/ssm-agent.nix
···
# in nixpkgs doesn't seem to work properly on NixOS, so let's just fake the two fields SSM
# looks for. See https://github.com/aws/amazon-ssm-agent/issues/38 for upstream fix.
fake-lsb-release = pkgs.writeScriptBin "lsb_release" ''
-
#!${pkgs.stdenv.shell}
+
#!${pkgs.runtimeShell}
case "$1" in
-i) echo "nixos";;
+1 -1
nixos/modules/services/monitoring/apcupsd.nix
···
];
shellCmdsForEventScript = eventname: commands: ''
-
echo "#!${pkgs.stdenv.shell}" > "$out/${eventname}"
+
echo "#!${pkgs.runtimeShell}" > "$out/${eventname}"
echo '${commands}' >> "$out/${eventname}"
chmod a+x "$out/${eventname}"
'';
+1 -1
nixos/modules/services/monitoring/smartd.nix
···
nx = cfg.notifications.x11;
smartdNotify = pkgs.writeScript "smartd-notify.sh" ''
-
#! ${pkgs.stdenv.shell}
+
#! ${pkgs.runtimeShell}
${optionalString nm.enable ''
{
${pkgs.coreutils}/bin/cat << EOF
+1 -1
nixos/modules/services/network-filesystems/xtreemfs.nix
···
home = cfg.homeDir;
startupScript = class: configPath: pkgs.writeScript "xtreemfs-osd.sh" ''
-
#! ${pkgs.stdenv.shell}
+
#! ${pkgs.runtimeShell}
JAVA_HOME="${pkgs.jdk}"
JAVADIR="${xtreemfs}/share/java"
JAVA_CALL="$JAVA_HOME/bin/java -ea -cp $JAVADIR/XtreemFS.jar:$JAVADIR/BabuDB.jar:$JAVADIR/Flease.jar:$JAVADIR/protobuf-java-2.5.0.jar:$JAVADIR/Foundation.jar:$JAVADIR/jdmkrt.jar:$JAVADIR/jdmktk.jar:$JAVADIR/commons-codec-1.3.jar"
+2 -2
nixos/modules/services/network-filesystems/yandex-disk.nix
···
exit 1
fi
-
${pkgs.su}/bin/su -s ${pkgs.stdenv.shell} ${u} \
+
${pkgs.su}/bin/su -s ${pkgs.runtimeShell} ${u} \
-c '${pkgs.yandex-disk}/bin/yandex-disk token -p ${cfg.password} ${cfg.username} ${dir}/token'
-
${pkgs.su}/bin/su -s ${pkgs.stdenv.shell} ${u} \
+
${pkgs.su}/bin/su -s ${pkgs.runtimeShell} ${u} \
-c '${pkgs.yandex-disk}/bin/yandex-disk start --no-daemon -a ${dir}/token -d ${cfg.directory} --exclude-dirs=${cfg.excludes}'
'';
+1 -1
nixos/modules/services/networking/amuled.nix
···
'';
script = ''
-
${pkgs.su}/bin/su -s ${pkgs.stdenv.shell} ${user} \
+
${pkgs.su}/bin/su -s ${pkgs.runtimeShell} ${user} \
-c 'HOME="${cfg.dataDir}" ${pkgs.amuleDaemon}/bin/amuled'
'';
};
+1 -1
nixos/modules/services/networking/firewall.nix
···
'';
writeShScript = name: text: let dir = pkgs.writeScriptBin name ''
-
#! ${pkgs.stdenv.shell} -e
+
#! ${pkgs.runtimeShell} -e
${text}
''; in "${dir}/bin/${name}";
+1 -1
nixos/modules/services/networking/flashpolicyd.nix
···
flashpolicydWrapper = pkgs.writeScriptBin "flashpolicyd"
''
-
#! ${pkgs.stdenv.shell}
+
#! ${pkgs.runtimeShell}
exec ${flashpolicyd}/Perl_xinetd/in.flashpolicyd.pl \
--file=${pkgs.writeText "flashpolixy.xml" cfg.policy} \
2> /dev/null
+1 -1
nixos/modules/services/networking/nftables.nix
···
include "${cfg.rulesetFile}"
'';
checkScript = pkgs.writeScript "nftables-check" ''
-
#! ${pkgs.stdenv.shell} -e
+
#! ${pkgs.runtimeShell} -e
if $(${pkgs.kmod}/bin/lsmod | grep -q ip_tables); then
echo "Unload ip_tables before using nftables!" 1>&2
exit 1
+1 -1
nixos/modules/services/networking/rdnssd.nix
···
with lib;
let
mergeHook = pkgs.writeScript "rdnssd-merge-hook" ''
-
#! ${pkgs.stdenv.shell} -e
+
#! ${pkgs.runtimeShell} -e
${pkgs.openresolv}/bin/resolvconf -u
'';
in
+5 -2
nixos/modules/services/printing/cupsd.nix
···
listenAddresses = mkOption {
type = types.listOf types.str;
-
default = [ "127.0.0.1:631" ];
+
default = [ "localhost:631" ];
example = [ "*:631" ];
description = ''
A list of addresses and ports on which to listen.
···
''}
'';
-
serviceConfig.PrivateTmp = true;
+
serviceConfig = {
+
PrivateTmp = true;
+
RuntimeDirectory = [ "cups" ];
+
};
};
systemd.services.cups-browsed = mkIf avahiEnabled
+1 -1
nixos/modules/services/security/torify.nix
···
torify = pkgs.writeTextFile {
name = "tsocks";
text = ''
-
#!${pkgs.stdenv.shell}
+
#!${pkgs.runtimeShell}
TSOCKS_CONF_FILE=${pkgs.writeText "tsocks.conf" cfg.tsocks.config} LD_PRELOAD="${pkgs.tsocks}/lib/libtsocks.so $LD_PRELOAD" "$@"
'';
executable = true;
+1 -1
nixos/modules/services/security/torsocks.nix
···
wrapTorsocks = name: server: pkgs.writeTextFile {
name = name;
text = ''
-
#!${pkgs.stdenv.shell}
+
#!${pkgs.runtimeShell}
TORSOCKS_CONF_FILE=${pkgs.writeText "torsocks.conf" (configFile server)} ${pkgs.torsocks}/bin/torsocks "$@"
'';
executable = true;
+1 -1
nixos/modules/services/torrent/transmission.nix
···
# 1) Only the "transmission" user and group have access to torrents.
# 2) Optionally update/force specific fields into the configuration file.
serviceConfig.ExecStartPre = ''
-
${pkgs.stdenv.shell} -c "mkdir -p ${homeDir} ${settingsDir} ${fullSettings.download-dir} ${fullSettings.incomplete-dir} && chmod 770 ${homeDir} ${settingsDir} ${fullSettings.download-dir} ${fullSettings.incomplete-dir} && rm -f ${settingsDir}/settings.json && cp -f ${settingsFile} ${settingsDir}/settings.json"
+
${pkgs.runtimeShell} -c "mkdir -p ${homeDir} ${settingsDir} ${fullSettings.download-dir} ${fullSettings.incomplete-dir} && chmod 770 ${homeDir} ${settingsDir} ${fullSettings.download-dir} ${fullSettings.incomplete-dir} && rm -f ${settingsDir}/settings.json && cp -f ${settingsFile} ${settingsDir}/settings.json"
'';
serviceConfig.ExecStart = "${pkgs.transmission}/bin/transmission-daemon -f --port ${toString config.services.transmission.port}";
serviceConfig.ExecReload = "${pkgs.coreutils}/bin/kill -HUP $MAINPID";
+1 -1
nixos/modules/services/web-servers/apache-httpd/owncloud.nix
···
postgresql = serverInfo.fullConfig.services.postgresql.package;
setupDb = pkgs.writeScript "setup-owncloud-db" ''
-
#!${pkgs.stdenv.shell}
+
#!${pkgs.runtimeShell}
PATH="${postgresql}/bin"
createuser --no-superuser --no-createdb --no-createrole "${config.dbUser}" || true
createdb "${config.dbName}" -O "${config.dbUser}" || true
+1 -1
nixos/modules/services/x11/desktop-managers/xfce.nix
···
# Set GTK_DATA_PREFIX so that GTK+ can find the Xfce themes.
export GTK_DATA_PREFIX=${config.system.path}
-
${pkgs.stdenv.shell} ${pkgs.xfce.xinitrc} &
+
${pkgs.runtimeShell} ${pkgs.xfce.xinitrc} &
waitPID=$!
'';
}];
+1 -1
nixos/modules/services/x11/display-managers/slim.nix
···
default_xserver ${dmcfg.xserverBin}
xserver_arguments ${toString dmcfg.xserverArgs}
sessiondir ${dmcfg.session.desktops}
-
login_cmd exec ${pkgs.stdenv.shell} ${dmcfg.session.script} "%session"
+
login_cmd exec ${pkgs.runtimeShell} ${dmcfg.session.script} "%session"
halt_cmd ${config.systemd.package}/sbin/shutdown -h now
reboot_cmd ${config.systemd.package}/sbin/shutdown -r now
logfile /dev/stderr
+1 -1
nixos/modules/system/activation/activation-script.nix
···
apply = set: {
script =
''
-
#! ${pkgs.stdenv.shell}
+
#! ${pkgs.runtimeShell}
systemConfig=@out@
+19 -18
nixos/modules/system/boot/kexec.nix
···
-
{ config, pkgs, ... }:
+
{ config, pkgs, lib, ... }:
{
-
environment.systemPackages = [ pkgs.kexectools ];
+
config = lib.mkIf (pkgs.kexectools != null) {
+
environment.systemPackages = [ pkgs.kexectools ];
-
systemd.services."prepare-kexec" =
-
{ description = "Preparation for kexec";
-
wantedBy = [ "kexec.target" ];
-
before = [ "systemd-kexec.service" ];
-
unitConfig.DefaultDependencies = false;
-
serviceConfig.Type = "oneshot";
-
path = [ pkgs.kexectools ];
-
script =
-
''
-
p=$(readlink -f /nix/var/nix/profiles/system)
-
if ! [ -d $p ]; then exit 1; fi
-
exec kexec --load $p/kernel --initrd=$p/initrd --append="$(cat $p/kernel-params) init=$p/init"
-
'';
-
};
-
-
}
+
systemd.services."prepare-kexec" =
+
{ description = "Preparation for kexec";
+
wantedBy = [ "kexec.target" ];
+
before = [ "systemd-kexec.service" ];
+
unitConfig.DefaultDependencies = false;
+
serviceConfig.Type = "oneshot";
+
path = [ pkgs.kexectools ];
+
script =
+
''
+
p=$(readlink -f /nix/var/nix/profiles/system)
+
if ! [ -d $p ]; then exit 1; fi
+
exec kexec --load $p/kernel --initrd=$p/initrd --append="$(cat $p/kernel-params) init=$p/init"
+
'';
+
};
+
};
+
}
+2 -2
nixos/modules/system/boot/loader/grub/grub.nix
···
{ splashImage = f cfg.splashImage;
grub = f grub;
grubTarget = f (grub.grubTarget or "");
-
shell = "${pkgs.stdenv.shell}";
+
shell = "${pkgs.runtimeShell}";
fullName = (builtins.parseDrvName realGrub.name).name;
fullVersion = (builtins.parseDrvName realGrub.name).version;
grubEfi = f grubEfi;
···
btrfsprogs = pkgs.btrfs-progs;
};
in pkgs.writeScript "install-grub.sh" (''
-
#!${pkgs.stdenv.shell}
+
#!${pkgs.runtimeShell}
set -e
export PERL5LIB=${makePerlPath (with pkgs.perlPackages; [ FileSlurp XMLLibXML XMLSAX XMLSAXBase ListCompare ])}
${optionalString cfg.enableCryptodisk "export GRUB_ENABLE_CRYPTODISK=y"}
+49 -5
nixos/modules/system/boot/stage-1.nix
···
# mounting `/`, like `/` on a loopback).
fileSystems = filter utils.fsNeededForBoot config.system.build.fileSystems;
+
# A utility for enumerating the shared-library dependencies of a program
+
findLibs = pkgs.writeShellScriptBin "find-libs" ''
+
set -euo pipefail
+
+
declare -A seen
+
declare -a left
+
+
patchelf="${pkgs.buildPackages.patchelf}/bin/patchelf"
+
+
function add_needed {
+
rpath="$($patchelf --print-rpath $1)"
+
dir="$(dirname $1)"
+
for lib in $($patchelf --print-needed $1); do
+
left+=("$lib" "$rpath" "$dir")
+
done
+
}
+
+
add_needed $1
+
+
while [ ''${#left[@]} -ne 0 ]; do
+
next=''${left[0]}
+
rpath=''${left[1]}
+
ORIGIN=''${left[2]}
+
left=("''${left[@]:3}")
+
if [ -z ''${seen[$next]+x} ]; then
+
seen[$next]=1
+
IFS=: read -ra paths <<< $rpath
+
res=
+
for path in "''${paths[@]}"; do
+
path=$(eval "echo $path")
+
if [ -f "$path/$next" ]; then
+
res="$path/$next"
+
echo "$res"
+
add_needed "$res"
+
break
+
fi
+
done
+
if [ -z "$res" ]; then
+
echo "Couldn't satisfy dependency $next" >&2
+
exit 1
+
fi
+
fi
+
done
+
'';
# Some additional utilities needed in stage 1, like mount, lvm, fsck
# etc. We don't want to bring in all of those packages, so we just
···
# we just copy what we need from Glibc and use patchelf to make it
# work.
extraUtils = pkgs.runCommandCC "extra-utils"
-
{ buildInputs = [pkgs.nukeReferences];
+
{ nativeBuildInputs = [pkgs.buildPackages.nukeReferences];
allowedReferences = [ "out" ]; # prevent accidents like glibc being included in the initrd
}
''
···
# Copy all of the needed libraries
find $out/bin $out/lib -type f | while read BIN; do
echo "Copying libs for executable $BIN"
-
LDD="$(ldd $BIN)" || continue
-
LIBS="$(echo "$LDD" | awk '{print $3}' | sed '/^$/d')"
-
for LIB in $LIBS; do
+
for LIB in $(${findLibs}/bin/find-libs $BIN); do
TGT="$out/lib/$(basename $LIB)"
if [ ! -f "$TGT" ]; then
SRC="$(readlink -e $LIB)"
···
fi
done
+
if [ -z "${toString pkgs.stdenv.isCross}" ]; then
# Make sure that the patchelf'ed binaries still work.
echo "testing patched programs..."
$out/bin/ash -c 'echo hello world' | grep "hello world"
···
$out/bin/mdadm --version
${config.boot.initrd.extraUtilsCommandsTest}
+
fi
''; # */
···
{ src = "${pkgs.kmod-blacklist-ubuntu}/modprobe.conf"; }
''
target=$out
-
${pkgs.perl}/bin/perl -0pe 's/## file: iwlwifi.conf(.+?)##/##/s;' $src > $out
+
${pkgs.buildPackages.perl}/bin/perl -0pe 's/## file: iwlwifi.conf(.+?)##/##/s;' $src > $out
'';
symlink = "/etc/modprobe.d/ubuntu.conf";
}
+1
nixos/modules/system/boot/stage-2.nix
···
bootStage2 = pkgs.substituteAll {
src = ./stage-2-init.sh;
shellDebug = "${pkgs.bashInteractive}/bin/bash";
+
shell = "${pkgs.bash}/bin/bash";
isExecutable = true;
inherit (config.nix) readOnlyStore;
inherit (config.networking) useHostResolvConf;
+6 -6
nixos/modules/system/boot/systemd.nix
···
}
(mkIf (config.preStart != "")
{ serviceConfig.ExecStartPre = makeJobScript "${name}-pre-start" ''
-
#! ${pkgs.stdenv.shell} -e
+
#! ${pkgs.runtimeShell} -e
${config.preStart}
'';
})
(mkIf (config.script != "")
{ serviceConfig.ExecStart = makeJobScript "${name}-start" ''
-
#! ${pkgs.stdenv.shell} -e
+
#! ${pkgs.runtimeShell} -e
${config.script}
'' + " " + config.scriptArgs;
})
(mkIf (config.postStart != "")
{ serviceConfig.ExecStartPost = makeJobScript "${name}-post-start" ''
-
#! ${pkgs.stdenv.shell} -e
+
#! ${pkgs.runtimeShell} -e
${config.postStart}
'';
})
(mkIf (config.reload != "")
{ serviceConfig.ExecReload = makeJobScript "${name}-reload" ''
-
#! ${pkgs.stdenv.shell} -e
+
#! ${pkgs.runtimeShell} -e
${config.reload}
'';
})
(mkIf (config.preStop != "")
{ serviceConfig.ExecStop = makeJobScript "${name}-pre-stop" ''
-
#! ${pkgs.stdenv.shell} -e
+
#! ${pkgs.runtimeShell} -e
${config.preStop}
'';
})
(mkIf (config.postStop != "")
{ serviceConfig.ExecStopPost = makeJobScript "${name}-post-stop" ''
-
#! ${pkgs.stdenv.shell} -e
+
#! ${pkgs.runtimeShell} -e
${config.postStop}
'';
})
+1 -1
nixos/modules/tasks/kbd.nix
···
isUnicode = hasSuffix "UTF-8" (toUpper config.i18n.defaultLocale);
optimizedKeymap = pkgs.runCommand "keymap" {
-
nativeBuildInputs = [ pkgs.kbd ];
+
nativeBuildInputs = [ pkgs.buildPackages.kbd ];
LOADKEYS_KEYMAP_PATH = "${kbdEnv}/share/keymaps/**";
} ''
loadkeys -b ${optionalString isUnicode "-u"} "${config.i18n.consoleKeyMap}" > $out
+4 -4
nixos/modules/tasks/network-interfaces.nix
···
executable = true;
destination = "/bin/bridge-stp";
text = ''
-
#!${pkgs.stdenv.shell} -e
+
#!${pkgs.runtimeShell} -e
export PATH="${pkgs.mstpd}/bin"
BRIDGES=(${concatStringsSep " " (attrNames rstpBridges)})
···
# udev script that configures a physical wlan device and adds virtual interfaces
wlanDeviceUdevScript = device: interfaceList: pkgs.writeScript "wlan-${device}-udev-script" ''
-
#!${pkgs.stdenv.shell}
+
#!${pkgs.runtimeShell}
# Change the wireless phy device to a predictable name.
if [ -e "/sys/class/net/${device}/phy80211/name" ]; then
···
# The script creates the required, new WLAN interfaces interfaces and configures the
# existing, default interface.
curInterfaceScript = device: current: new: pkgs.writeScript "udev-run-script-wlan-interfaces-${device}.sh" ''
-
#!${pkgs.stdenv.shell}
+
#!${pkgs.runtimeShell}
# Change the wireless phy device to a predictable name.
${pkgs.iw}/bin/iw phy `${pkgs.coreutils}/bin/cat /sys/class/net/$INTERFACE/phy80211/name` set name ${device}
···
# Udev script to execute for a new WLAN interface. The script configures the new WLAN interface.
newInterfaceScript = device: new: pkgs.writeScript "udev-run-script-wlan-interfaces-${new._iName}.sh" ''
-
#!${pkgs.stdenv.shell}
+
#!${pkgs.runtimeShell}
# Configure the new interface
${pkgs.iw}/bin/iw dev ${new._iName} set type ${new.type}
${optionalString (new.type == "mesh" && new.meshID!=null) "${pkgs.iw}/bin/iw dev ${device} set meshid ${new.meshID}"}
+1 -1
nixos/modules/virtualisation/amazon-init.nix
···
let
script = ''
-
#!${pkgs.stdenv.shell} -eu
+
#!${pkgs.runtimeShell} -eu
echo "attempting to fetch configuration from EC2 user data..."
+1 -1
nixos/modules/virtualisation/azure-agent.nix
···
};
provisionedHook = pkgs.writeScript "provisioned-hook" ''
-
#!${pkgs.stdenv.shell}
+
#!${pkgs.runtimeShell}
${config.systemd.package}/bin/systemctl start provisioned.target
'';
+2 -2
nixos/modules/virtualisation/containers.nix
···
in
pkgs.writeScript "container-init"
''
-
#! ${pkgs.stdenv.shell} -e
+
#! ${pkgs.runtimeShell} -e
# Initialise the container side of the veth pair.
if [ "$PRIVATE_NETWORK" = 1 ]; then
···
serviceDirectives = cfg: {
ExecReload = pkgs.writeScript "reload-container"
''
-
#! ${pkgs.stdenv.shell} -e
+
#! ${pkgs.runtimeShell} -e
${pkgs.nixos-container}/bin/nixos-container run "$INSTANCE" -- \
bash --login -c "''${SYSTEM_PATH:-/nix/var/nix/profiles/system}/bin/switch-to-configuration test"
'';
+1 -1
nixos/modules/virtualisation/openvswitch.nix
···
mkdir -p ${runDir}/ipsec/{etc/racoon,etc/init.d/,usr/sbin/}
ln -fs ${pkgs.ipsecTools}/bin/setkey ${runDir}/ipsec/usr/sbin/setkey
ln -fs ${pkgs.writeScript "racoon-restart" ''
-
#!${pkgs.stdenv.shell}
+
#!${pkgs.runtimeShell}
/var/run/current-system/sw/bin/systemctl $1 racoon
''} ${runDir}/ipsec/etc/init.d/racoon
'';
+1 -1
nixos/modules/virtualisation/qemu-vm.nix
···
# Shell script to start the VM.
startVM =
''
-
#! ${pkgs.stdenv.shell}
+
#! ${pkgs.runtimeShell}
NIX_DISK_IMAGE=$(readlink -f ''${NIX_DISK_IMAGE:-${config.virtualisation.diskImage}})
+3 -1
nixos/tests/printing.nix
···
$client->waitForUnit("cups.service");
$client->sleep(10); # wait until cups is fully initialized
$client->succeed("lpstat -r") =~ /scheduler is running/ or die;
-
$client->succeed("lpstat -H") =~ "localhost:631" or die;
+
# Test that UNIX socket is used for connections.
+
$client->succeed("lpstat -H") =~ "/var/run/cups/cups.sock" or die;
+
# Test that HTTP server is available too.
$client->succeed("curl --fail http://localhost:631/");
$client->succeed("curl --fail http://server:631/");
$server->fail("curl --fail --connect-timeout 2 http://client:631/");
+2
pkgs/applications/display-managers/lightdm-gtk-greeter/default.nix
···
"--sysconfdir=/etc"
] ++ stdenv.lib.optional useGTK2 "--with-gtk2";
+
NIX_CFLAGS_COMPILE = [ "-Wno-error=deprecated-declarations" ];
+
installFlags = [
"localstatedir=\${TMPDIR}"
"sysconfdir=\${out}/etc"
+9 -5
pkgs/applications/misc/pytrainer/default.nix
···
-
{ stdenv, fetchFromGitHub, perl, python2Packages, sqlite, gpsbabel
+
{ stdenv, fetchFromGitHub, perl, python, sqlite, gpsbabel
, withWebKit ? false }:
let
# Pytrainer needs a matplotlib with GTK backend. Also ensure we are
# using the pygtk with glade support as needed by pytrainer.
-
matplotlibGtk = python2Packages.matplotlib.override {
+
matplotlibGtk = python.pkgs.matplotlib.override {
enableGtk2 = true;
-
pygtk = python2Packages.pyGtkGlade;
+
pygtk = python.pkgs.pyGtkGlade;
};
in
-
python2Packages.buildPythonApplication rec {
+
python.pkgs.buildPythonApplication rec {
name = "pytrainer-${version}";
version = "1.12.0";
···
--replace "'mysqlclient'," ""
'';
-
propagatedBuildInputs = with python2Packages; [
+
propagatedBuildInputs = with python.pkgs; [
dateutil lxml matplotlibGtk pyGtkGlade sqlalchemy sqlalchemy_migrate psycopg2
] ++ stdenv.lib.optional withWebKit [ pywebkitgtk ];
···
# This package contains no binaries to patch or strip.
dontPatchELF = true;
dontStrip = true;
+
+
checkPhase = ''
+
${python.interpreter} -m unittest discover
+
'';
meta = with stdenv.lib; {
homepage = https://github.com/pytrainer/pytrainer/wiki;
+2 -2
pkgs/applications/science/spyder/default.nix
···
buildPythonApplication rec {
pname = "spyder";
-
version = "3.2.6";
+
version = "3.2.7";
src = fetchPypi {
inherit pname version;
-
sha256 = "87d6a4f5ee1aac4284461ee3584c3ade50cb53feb3fe35abebfdfb9be18c526a";
+
sha256 = "b5bb8fe0a556930dc09b68fa2741a0de3da6488843ec960e0c62f1f3b2e08e2f";
};
# Somehow setuptools can't find pyqt5. Maybe because the dist-info folder is missing?
+2 -2
pkgs/applications/version-management/nbstripout/default.nix
···
with python2Packages;
buildPythonApplication rec {
name = "${pname}-${version}";
-
version = "0.3.0";
+
version = "0.3.1";
pname = "nbstripout";
# Mercurial should be added as a build input but because it's a Python
···
src = fetchPypi {
inherit pname version;
-
sha256 = "126xhjma4a0k7gq58hbqglhb3rai0a576azz7g8gmqjr3kl0264v";
+
sha256 = "b997c99b8bbb865988202d2f005cdaabb2598b07dad891c302a147a5871a4a95";
};
# for some reason, darwin uses /bin/sh echo native instead of echo binary, so
+13 -13
pkgs/build-support/bintools-wrapper/default.nix
···
# script that sets up the right environment variables so that the
# compiler and the linker just "work".
-
{ name ? "", stdenvNoCC, nativeTools, noLibc ? false, nativeLibc, nativePrefix ? ""
+
{ name ? ""
+
, stdenvNoCC, nativeTools, propagateDoc ? !nativeTools, noLibc ? false, nativeLibc, nativePrefix ? ""
, bintools ? null, libc ? null
, coreutils ? null, shell ? stdenvNoCC.shell, gnugrep ? null
, extraPackages ? [], extraBuildCommands ? ""
···
with stdenvNoCC.lib;
-
assert nativeTools -> nativePrefix != "";
+
assert nativeTools -> !propagateDoc && nativePrefix != "";
assert !nativeTools ->
bintools != null && coreutils != null && gnugrep != null;
assert !(nativeLibc && noLibc);
···
inherit targetPrefix infixSalt;
-
outputs = [ "out" "info" "man" ];
+
outputs = [ "out" ] ++ optionals propagateDoc [ "man" "info" ];
passthru = {
inherit bintools libc nativeTools nativeLibc nativePrefix;
···
''
set -u
-
mkdir -p $out/bin {$out,$info,$man}/nix-support
+
mkdir -p $out/bin $out/nix-support
wrap() {
local dst="$1"
···
'')
+ optionalString (!nativeTools) ''
-
##
## User env support
##
# Propagate the underling unwrapped bintools so that if you
-
# install the wrapper, you get tools like objdump, the manpages,
-
# etc. as well (same for any binaries of libc).
+
# install the wrapper, you get tools like objdump (same for any
+
# binaries of libc).
printWords ${bintools_bin} ${if libc == null then "" else libc_bin} > $out/nix-support/propagated-user-env-packages
+
''
+
+ optionalString propagateDoc ''
##
## Man page and info support
##
-
printWords ${bintools.info or ""} \
-
>> $info/nix-support/propagated-build-inputs
-
printWords ${bintools.man or ""} \
-
>> $man/nix-support/propagated-build-inputs
+
mkdir -p $man/nix-support $info/nix-support
+
printWords ${bintools.man or ""} >> $man/nix-support/propagated-build-inputs
+
printWords ${bintools.info or ""} >> $info/nix-support/propagated-build-inputs
''
+ ''
-
##
## Hardening support
##
···
##
## Extra custom steps
##
-
''
+
+ extraBuildCommands;
inherit dynamicLinker expand-response-params;
-5
pkgs/build-support/cc-wrapper/add-flags.sh
···
NIX+CFLAGS_LINK
NIX+CXXSTDLIB_COMPILE
NIX+CXXSTDLIB_LINK
-
NIX+GNATFLAGS_COMPILE
)
var_templates_bool=(
NIX+ENFORCE_NO_NATIVE
···
if [ -e @out@/nix-support/cc-cflags ]; then
NIX_@infixSalt@_CFLAGS_COMPILE="$(< @out@/nix-support/cc-cflags) $NIX_@infixSalt@_CFLAGS_COMPILE"
-
fi
-
-
if [ -e @out@/nix-support/gnat-cflags ]; then
-
NIX_@infixSalt@_GNATFLAGS_COMPILE="$(< @out@/nix-support/gnat-cflags) $NIX_@infixSalt@_GNATFLAGS_COMPILE"
fi
if [ -e @out@/nix-support/cc-ldflags ]; then
+12 -38
pkgs/build-support/cc-wrapper/default.nix
···
# script that sets up the right environment variables so that the
# compiler and the linker just "work".
-
{ name ? "", stdenvNoCC, nativeTools, noLibc ? false, nativeLibc, nativePrefix ? ""
+
{ name ? ""
+
, stdenvNoCC, nativeTools, propagateDoc ? !nativeTools, noLibc ? false, nativeLibc, nativePrefix ? ""
, cc ? null, libc ? null, bintools, coreutils ? null, shell ? stdenvNoCC.shell
-
, zlib ? null, extraPackages ? [], extraBuildCommands ? ""
+
, extraPackages ? [], extraBuildCommands ? ""
, isGNU ? false, isClang ? cc.isClang or false, gnugrep ? null
, buildPackages ? {}
}:
with stdenvNoCC.lib;
-
assert nativeTools -> nativePrefix != "";
+
assert nativeTools -> !propagateDoc && nativePrefix != "";
assert !nativeTools ->
cc != null && coreutils != null && gnugrep != null;
assert !(nativeLibc && noLibc);
assert (noLibc || nativeLibc) == (libc == null);
-
-
# For ghdl (the vhdl language provider to gcc) we need zlib in the wrapper.
-
assert cc.langVhdl or false -> zlib != null;
let
stdenv = stdenvNoCC;
···
inherit targetPrefix infixSalt;
-
outputs = [ "out" "man" ];
+
outputs = [ "out" ] ++ optionals propagateDoc [ "man" "info" ];
passthru = {
# "cc" is the generic name for a C compiler, but there is no one for package
···
''
set -u
-
mkdir -p $out/bin $out/nix-support $man/nix-support
+
mkdir -p $out/bin $out/nix-support
wrap() {
local dst="$1"
···
+ optionalString cc.langGo or false ''
wrap ${targetPrefix}gccgo ${./cc-wrapper.sh} $ccPath/${targetPrefix}gccgo
-
''
-
-
+ optionalString cc.langAda or false ''
-
wrap ${targetPrefix}gnatgcc ${./cc-wrapper.sh} $ccPath/${targetPrefix}gnatgcc
-
wrap ${targetPrefix}gnatmake ${./gnat-wrapper.sh} $ccPath/${targetPrefix}gnatmake
-
wrap ${targetPrefix}gnatbind ${./gnat-wrapper.sh} $ccPath/${targetPrefix}gnatbind
-
wrap ${targetPrefix}gnatlink ${./gnatlink-wrapper.sh} $ccPath/${targetPrefix}gnatlink
-
''
-
-
+ optionalString cc.langVhdl or false ''
-
ln -s $ccPath/${targetPrefix}ghdl $out/bin/${targetPrefix}ghdl
'';
propagatedBuildInputs = [ bintools ];
···
''
+ optionalString (!nativeTools) ''
-
##
## Initial CFLAGS
##
···
fi
ccLDFlags+=" -L${cc_solib}/lib"
ccCFlags+=" -B${cc_solib}/lib"
-
-
${optionalString cc.langVhdl or false ''
-
ccLDFlags+=" -L${zlib.out}/lib"
-
''}
-
-
# Find the gcc libraries path (may work only without multilib).
-
${optionalString cc.langAda or false ''
-
basePath=`echo ${cc_solib}/lib/*/*/*`
-
ccCFlags+=" -B$basePath -I$basePath/adainclude"
-
gnatCFlags="-aI$basePath/adainclude -aO$basePath/adalib"
-
echo "$gnatCFlags" > $out/nix-support/gnat-cflags
-
''}
echo "$ccLDFlags" > $out/nix-support/cc-ldflags
echo "$ccCFlags" > $out/nix-support/cc-cflags
+
''
+
+ optionalString propagateDoc ''
##
-
## User env support
+
## Man page and info support
##
-
# Propagate the wrapped cc so that if you install the wrapper,
-
# you get tools like gcov, the manpages, etc. as well (including
-
# for binutils and Glibc).
+
mkdir -p $man/nix-support $info/nix-support
printWords ${cc.man or ""} > $man/nix-support/propagated-user-env-packages
+
printWords ${cc.info or ""} > $info/nix-support/propagated-user-env-packages
''
+ ''
-
##
## Hardening support
##
···
##
## Extra custom steps
##
-
''
+
+ extraBuildCommands;
inherit expand-response-params;
-122
pkgs/build-support/cc-wrapper/gnat-wrapper.sh
···
-
#! @shell@
-
set -eu -o pipefail +o posix
-
shopt -s nullglob
-
-
if (( "${NIX_DEBUG:-0}" >= 7 )); then
-
set -x
-
fi
-
-
# N.B. Gnat is not used during bootstrapping, so we don't need to
-
# worry about the old bash empty array `set -u` workarounds.
-
-
path_backup="$PATH"
-
-
# phase separation makes this look useless
-
# shellcheck disable=SC2157
-
if [ -n "@coreutils_bin@" ]; then
-
PATH="@coreutils_bin@/bin"
-
fi
-
-
source @out@/nix-support/utils.sh
-
-
if [ -z "${NIX_@infixSalt@_GNAT_WRAPPER_FLAGS_SET:-}" ]; then
-
source @out@/nix-support/add-flags.sh
-
fi
-
-
-
# Figure out if linker flags should be passed. GCC prints annoying
-
# warnings when they are not needed.
-
dontLink=0
-
nonFlagArgs=0
-
-
for i in "$@"; do
-
if [ "$i" = -c ]; then
-
dontLink=1
-
elif [ "$i" = -M ]; then
-
dontLink=1
-
elif [ "${i:0:1}" != - ]; then
-
nonFlagArgs=1
-
fi
-
done
-
-
# If we pass a flag like -Wl, then gcc will call the linker unless it
-
# can figure out that it has to do something else (e.g., because of a
-
# "-c" flag). So if no non-flag arguments are given, don't pass any
-
# linker flags. This catches cases like "gcc" (should just print
-
# "gcc: no input files") and "gcc -v" (should print the version).
-
if [ "$nonFlagArgs" = 0 ]; then
-
dontLink=1
-
fi
-
-
-
# Optionally filter out paths not refering to the store.
-
params=("$@")
-
if [[ "${NIX_ENFORCE_PURITY:-}" = 1 && -n "$NIX_STORE" ]]; then
-
rest=()
-
for p in "${params[@]}"; do
-
if [ "${p:0:3}" = -L/ ] && badPath "${p:2}"; then
-
skip "${p:2}"
-
elif [ "${p:0:3}" = -I/ ] && badPath "${p:2}"; then
-
skip "${p:2}"
-
elif [ "${p:0:4}" = -aI/ ] && badPath "${p:3}"; then
-
skip "${p:2}"
-
elif [ "${p:0:4}" = -aO/ ] && badPath "${p:3}"; then
-
skip "${p:2}"
-
else
-
rest+=("$p")
-
fi
-
done
-
params=("${rest[@]}")
-
fi
-
-
-
# Clear march/mtune=native -- they bring impurity.
-
if [ "$NIX_@infixSalt@_ENFORCE_NO_NATIVE" = 1 ]; then
-
rest=()
-
for p in "${params[@]}"; do
-
if [[ "$p" = -m*=native ]]; then
-
skip "$p"
-
else
-
rest+=("$p")
-
fi
-
done
-
params=("${rest[@]}")
-
fi
-
-
-
# Add the flags for the GNAT compiler proper.
-
extraAfter=($NIX_@infixSalt@_GNATFLAGS_COMPILE)
-
extraBefore=()
-
-
if [ "$(basename "$0")x" = "gnatmakex" ]; then
-
extraBefore=("--GNATBIND=@out@/bin/gnatbind" "--GNATLINK=@out@/bin/gnatlink ")
-
fi
-
-
#if [ "$dontLink" != 1 ]; then
-
# # Add the flags that should be passed to the linker (and prevent
-
# # `ld-wrapper' from adding NIX_@infixSalt@_LDFLAGS again).
-
# for i in $NIX_@infixSalt@_LDFLAGS_BEFORE; do
-
# extraBefore+=("-largs" "$i")
-
# done
-
# for i in $NIX_@infixSalt@_LDFLAGS; do
-
# if [ "${i:0:3}" = -L/ ]; then
-
# extraAfter+=("$i")
-
# else
-
# extraAfter+=("-largs" "$i")
-
# fi
-
# done
-
# export NIX_@infixSalt@_LDFLAGS_SET=1
-
#fi
-
-
# Optionally print debug info.
-
if (( "${NIX_DEBUG:-0}" >= 1 )); then
-
echo "extra flags before to @prog@:" >&2
-
printf " %q\n" "${extraBefore[@]}" >&2
-
echo "original flags to @prog@:" >&2
-
printf " %q\n" "${params[@]}" >&2
-
echo "extra flags after to @prog@:" >&2
-
printf " %q\n" "${extraAfter[@]}" >&2
-
fi
-
-
PATH="$path_backup"
-
exec @prog@ "${extraBefore[@]}" "${params[@]}" "${extraAfter[@]}"
-40
pkgs/build-support/cc-wrapper/gnatlink-wrapper.sh
···
-
#! @shell@
-
set -eu -o pipefail +o posix
-
shopt -s nullglob
-
-
if (( "${NIX_DEBUG:-0}" >= 7 )); then
-
set -x
-
fi
-
-
# N.B. Gnat is not used during bootstrapping, so we don't need to
-
# worry about the old bash empty array `set -u` workarounds.
-
-
# Add the flags for the GNAT compiler proper.
-
extraAfter=("--GCC=@out@/bin/gcc")
-
extraBefore=()
-
-
## Add the flags that should be passed to the linker (and prevent
-
## `ld-wrapper' from adding NIX_@infixSalt@_LDFLAGS again).
-
#for i in $NIX_@infixSalt@_LDFLAGS_BEFORE; do
-
# extraBefore+=("-largs" "$i")
-
#done
-
#for i in $NIX_@infixSalt@_LDFLAGS; do
-
# if [ "${i:0:3}" = -L/ ]; then
-
# extraAfter+=("$i")
-
# else
-
# extraAfter+=("-largs" "$i")
-
# fi
-
#done
-
#export NIX_@infixSalt@_LDFLAGS_SET=1
-
-
# Optionally print debug info.
-
if (( "${NIX_DEBUG:-0}" >= 1 )); then
-
echo "extra flags before to @prog@:" >&2
-
printf " %q\n" "${extraBefore[@]}" >&2
-
echo "original flags to @prog@:" >&2
-
printf " %q\n" "$@" >&2
-
echo "extra flags after to @prog@:" >&2
-
printf " %q\n" "${extraAfter[@]}" >&2
-
fi
-
-
exec @prog@ "${extraBefore[@]}" "$@" "${extraAfter[@]}"
+5 -1
pkgs/build-support/cc-wrapper/utils.sh
···
for infix in "${role_infixes[@]}"; do
local inputVar="${var/+/${infix}}"
if [ -v "$inputVar" ]; then
-
let "${outputVar} |= ${!inputVar}"
+
# "1" in the end makes `let` return success error code when
+
# expression itself evaluates to zero.
+
# We don't use `|| true` because that would silence actual
+
# syntax errors from bad variable values.
+
let "${outputVar} |= ${!inputVar:-0}" "1"
fi
done
}
-28
pkgs/build-support/gcc-wrapper-old/add-flags
···
-
# `-B@out@/bin' forces cc to use ld-wrapper.sh when calling ld.
-
export NIX_CFLAGS_COMPILE="-B@out@/bin/ $NIX_CFLAGS_COMPILE"
-
-
if test -e @out@/nix-support/libc-cflags; then
-
export NIX_CFLAGS_COMPILE="$(cat @out@/nix-support/libc-cflags) $NIX_CFLAGS_COMPILE"
-
fi
-
-
if test -e @out@/nix-support/cc-cflags; then
-
export NIX_CFLAGS_COMPILE="$(cat @out@/nix-support/cc-cflags) $NIX_CFLAGS_COMPILE"
-
fi
-
-
if test -e @out@/nix-support/gnat-cflags; then
-
export NIX_GNATFLAGS_COMPILE="$(cat @out@/nix-support/gnat-cflags) $NIX_GNATFLAGS_COMPILE"
-
fi
-
-
if test -e @out@/nix-support/libc-ldflags; then
-
export NIX_LDFLAGS="$NIX_LDFLAGS $(cat @out@/nix-support/libc-ldflags)"
-
fi
-
-
if test -e @out@/nix-support/cc-ldflags; then
-
export NIX_LDFLAGS="$NIX_LDFLAGS $(cat @out@/nix-support/cc-ldflags)"
-
fi
-
-
if test -e @out@/nix-support/libc-ldflags-before; then
-
export NIX_LDFLAGS_BEFORE="$(cat @out@/nix-support/libc-ldflags-before) $NIX_LDFLAGS_BEFORE"
-
fi
-
-
export NIX_CC_WRAPPER_FLAGS_SET=1
-215
pkgs/build-support/gcc-wrapper-old/builder.sh
···
-
source $stdenv/setup
-
-
-
mkdir -p $out/bin
-
mkdir -p $out/nix-support
-
-
-
if test -z "$nativeLibc"; then
-
dynamicLinker="$libc/lib/$dynamicLinker"
-
echo $dynamicLinker > $out/nix-support/dynamic-linker
-
-
if test -e $libc/lib/32/ld-linux.so.2; then
-
echo $libc/lib/32/ld-linux.so.2 > $out/nix-support/dynamic-linker-m32
-
fi
-
-
# The "-B$libc/lib/" flag is a quick hack to force gcc to link
-
# against the crt1.o from our own glibc, rather than the one in
-
# /usr/lib. (This is only an issue when using an `impure'
-
# compiler/linker, i.e., one that searches /usr/lib and so on.)
-
#
-
# Unfortunately, setting -B appears to override the default search
-
# path. Thus, the gcc-specific "../includes-fixed" directory is
-
# now longer searched and glibc's <limits.h> header fails to
-
# compile, because it uses "#include_next <limits.h>" to find the
-
# limits.h file in ../includes-fixed. To remedy the problem,
-
# another -idirafter is necessary to add that directory again.
-
echo "-B$libc/lib/ -idirafter $libc_dev/include -idirafter $gcc/lib/gcc/*/*/include-fixed" > $out/nix-support/libc-cflags
-
-
echo "-L$libc/lib" > $out/nix-support/libc-ldflags
-
-
# The dynamic linker is passed in `ldflagsBefore' to allow
-
# explicit overrides of the dynamic linker by callers to gcc/ld
-
# (the *last* value counts, so ours should come first).
-
echo "-dynamic-linker" $dynamicLinker > $out/nix-support/libc-ldflags-before
-
fi
-
-
if test -n "$nativeTools"; then
-
gccPath="$nativePrefix/bin"
-
ldPath="$nativePrefix/bin"
-
else
-
if test -e "$gcc/lib64"; then
-
gccLDFlags="$gccLDFlags -L$gcc_lib/lib64"
-
fi
-
gccLDFlags="$gccLDFlags -L$gcc_lib/lib"
-
if [ -n "$langVhdl" ]; then
-
gccLDFlags="$gccLDFlags -L$zlib/lib"
-
fi
-
echo "$gccLDFlags" > $out/nix-support/cc-ldflags
-
-
# GCC shows $gcc/lib in `gcc -print-search-dirs', but not
-
# $gcc/lib64 (even though it does actually search there...)..
-
# This confuses libtool. So add it to the compiler tool search
-
# path explicitly.
-
if test -e "$gcc/lib64"; then
-
gccCFlags="$gccCFlags -B$gcc/lib64"
-
fi
-
-
# Find the gcc libraries path (may work only without multilib)
-
if [ -n "$langAda" ]; then
-
basePath=`echo $gcc/lib/*/*/*`
-
gccCFlags="$gccCFlags -B$basePath -I$basePath/adainclude"
-
-
gnatCFlags="-aI$basePath/adainclude -aO$basePath/adalib"
-
echo "$gnatCFlags" > $out/nix-support/gnat-cflags
-
fi
-
echo "$gccCFlags" > $out/nix-support/cc-cflags
-
-
gccPath="$gcc/bin"
-
# On Illumos/Solaris we might prefer native ld
-
if test -n "$nativePrefix"; then
-
ldPath="$nativePrefix/bin"
-
else
-
ldPath="$binutils/bin"
-
fi;
-
fi
-
-
-
doSubstitute() {
-
local src=$1
-
local dst=$2
-
local ld="$ldPath/ld"
-
if $ld -V 2>&1 |grep Solaris; then
-
# Use Solaris specific linker wrapper
-
ld="$out/bin/ld-solaris"
-
fi
-
# Can't use substitute() here, because replace may not have been
-
# built yet (in the bootstrap).
-
sed \
-
-e "s^@out@^$out^g" \
-
-e "s^@shell@^$shell^g" \
-
-e "s^@gcc@^$gcc^g" \
-
-e "s^@gccProg@^$gccProg^g" \
-
-e "s^@gnatProg@^$gnatProg^g" \
-
-e "s^@gnatlinkProg@^$gnatlinkProg^g" \
-
-e "s^@binutils@^$binutils^g" \
-
-e "s^@coreutils@^$coreutils^g" \
-
-e "s^@libc@^$libc^g" \
-
-e "s^@libc_bin@^$libc_bin^g" \
-
-e "s^@ld@^$ld^g" \
-
< "$src" > "$dst"
-
}
-
-
-
# Make wrapper scripts around gcc, g++, and gfortran. Also make symlinks
-
# cc, c++, and f77.
-
mkGccWrapper() {
-
local dst=$1
-
local src=$2
-
-
if ! test -f "$src"; then
-
echo "$src does not exist (skipping)"
-
return 1
-
fi
-
-
gccProg="$src"
-
doSubstitute "$gccWrapper" "$dst"
-
chmod +x "$dst"
-
}
-
-
mkGnatWrapper() {
-
local dst=$1
-
local src=$2
-
-
if ! test -f "$src"; then
-
echo "$src does not exist (skipping)"
-
return 1
-
fi
-
-
gnatProg="$src"
-
doSubstitute "$gnatWrapper" "$dst"
-
chmod +x "$dst"
-
}
-
-
mkGnatLinkWrapper() {
-
local dst=$1
-
local src=$2
-
-
if ! test -f "$src"; then
-
echo "$src does not exist (skipping)"
-
return 1
-
fi
-
-
gnatlinkProg="$src"
-
doSubstitute "$gnatlinkWrapper" "$dst"
-
chmod +x "$dst"
-
}
-
-
if mkGccWrapper $out/bin/gcc $gccPath/gcc
-
then
-
ln -sv gcc $out/bin/cc
-
fi
-
-
if mkGccWrapper $out/bin/g++ $gccPath/g++
-
then
-
ln -sv g++ $out/bin/c++
-
fi
-
-
mkGccWrapper $out/bin/cpp $gccPath/cpp || true
-
-
if mkGccWrapper $out/bin/gfortran $gccPath/gfortran
-
then
-
ln -sv gfortran $out/bin/g77
-
ln -sv gfortran $out/bin/f77
-
fi
-
-
mkGccWrapper $out/bin/gcj $gccPath/gcj || true
-
-
mkGccWrapper $out/bin/gccgo $gccPath/gccgo || true
-
-
mkGccWrapper $out/bin/gnatgcc $gccPath/gnatgcc || true
-
mkGnatWrapper $out/bin/gnatmake $gccPath/gnatmake || true
-
mkGnatWrapper $out/bin/gnatbind $gccPath/gnatbind || true
-
mkGnatLinkWrapper $out/bin/gnatlink $gccPath/gnatlink || true
-
-
if [ -f $gccPath/ghdl ]; then
-
ln -sf $gccPath/ghdl $out/bin/ghdl
-
fi
-
-
-
# Create a symlink to as (the assembler). This is useful when a
-
# gcc-wrapper is installed in a user environment, as it ensures that
-
# the right assembler is called.
-
ln -s $ldPath/as $out/bin/as
-
-
-
# Make a wrapper around the linker.
-
doSubstitute "$ldWrapper" "$out/bin/ld"
-
chmod +x "$out/bin/ld"
-
-
# Copy solaris ld wrapper if needed
-
if $ldPath/ld -V 2>&1 |grep Solaris; then
-
# Use Solaris specific linker wrapper
-
sed -e "s^@ld@^$ldPath/ld^g" < "$ldSolarisWrapper" > "$out/bin/ld-solaris"
-
chmod +x "$out/bin/ld-solaris"
-
fi
-
-
-
# Emit a setup hook. Also store the path to the original GCC and
-
# Glibc.
-
test -n "$gcc" && echo $gcc > $out/nix-support/orig-cc
-
test -n "$libc" && echo $libc > $out/nix-support/orig-libc
-
-
doSubstitute "$addFlags" "$out/nix-support/add-flags.sh"
-
-
doSubstitute "$setupHook" "$out/nix-support/setup-hook"
-
-
cp -p $utils $out/nix-support/utils.sh
-
-
-
# Propagate the wrapped gcc so that if you install the wrapper, you get
-
# tools like gcov, the manpages, etc. as well (including for binutils
-
# and Glibc).
-
if test -z "$nativeTools"; then
-
printWords $gcc $binutils $libc $libc_bin > $out/nix-support/propagated-user-env-packages
-
fi
-76
pkgs/build-support/gcc-wrapper-old/default.nix
···
-
# The Nix `gcc' stdenv.mkDerivation is not directly usable, since it doesn't
-
# know where the C library and standard header files are. Therefore
-
# the compiler produced by that package cannot be installed directly
-
# in a user environment and used from the command line. This
-
# stdenv.mkDerivation provides a wrapper that sets up the right environment
-
# variables so that the compiler and the linker just "work".
-
-
{ name ? "", stdenv, lib, nativeTools, nativeLibc, nativePrefix ? ""
-
, gcc ? null, libc ? null, binutils ? null, coreutils ? null, shell ? stdenv.shell
-
, zlib ? null
-
, hostPlatform, targetPlatform, targetPackages
-
}:
-
-
assert nativeTools -> nativePrefix != "";
-
assert !nativeTools -> gcc != null && binutils != null && coreutils != null;
-
assert !nativeLibc -> libc != null;
-
-
# For ghdl (the vhdl language provider to gcc) we need zlib in the wrapper
-
assert (gcc != null && gcc ? langVhdl && gcc.langVhdl) -> zlib != null;
-
-
let
-
-
gccVersion = (builtins.parseDrvName gcc.name).version;
-
gccName = (builtins.parseDrvName gcc.name).name;
-
-
langGo = if nativeTools then false else gcc ? langGo && gcc.langGo;
-
in
-
-
stdenv.mkDerivation {
-
name =
-
(if name != "" then name else gccName + "-wrapper") +
-
(if gcc != null && gccVersion != "" then "-" + gccVersion else "");
-
-
builder = ./builder.sh;
-
setupHook = ./setup-hook.sh;
-
gccWrapper = ./gcc-wrapper.sh;
-
gnatWrapper = ./gnat-wrapper.sh;
-
gnatlinkWrapper = ./gnatlink-wrapper.sh;
-
ldWrapper = ./ld-wrapper.sh;
-
ldSolarisWrapper = ./ld-solaris-wrapper.sh;
-
utils = ./utils.sh;
-
addFlags = ./add-flags;
-
-
inherit nativeTools nativeLibc nativePrefix gcc;
-
gcc_lib = lib.getLib gcc;
-
libc = if nativeLibc then null else libc;
-
libc_dev = if nativeLibc then null else lib.getDev libc;
-
libc_bin = if nativeLibc then null else lib.getBin libc;
-
binutils = if nativeTools then null else lib.getBin binutils;
-
# The wrapper scripts use 'cat', so we may need coreutils
-
coreutils = if nativeTools then null else lib.getBin coreutils;
-
-
langC = if nativeTools then true else gcc.langC;
-
langCC = if nativeTools then true else gcc.langCC;
-
langFortran = if nativeTools then false else gcc ? langFortran;
-
langAda = if nativeTools then false else gcc ? langAda && gcc.langAda;
-
langVhdl = if nativeTools then false else gcc ? langVhdl && gcc.langVhdl;
-
zlib = if gcc != null && gcc ? langVhdl then zlib else null;
-
shell = shell + shell.shellPath or "";
-
-
preferLocalBuild = true;
-
-
meta =
-
let gcc_ = if gcc != null then gcc else {}; in
-
(if gcc_ ? meta then removeAttrs gcc.meta ["priority"] else {}) //
-
{ description =
-
stdenv.lib.attrByPath ["meta" "description"] "System C compiler" gcc_
-
+ " (wrapper script)";
-
};
-
-
# The dynamic linker has different names on different platforms.
-
dynamicLinker =
-
if !nativeLibc then
-
targetPackages.stdenv.cc.bintools.dynamicLinker
-
else "";
-
}
-146
pkgs/build-support/gcc-wrapper-old/gcc-wrapper-old.sh
···
-
#! @shell@ -e
-
-
if [ -n "$NIX_CC_WRAPPER_START_HOOK" ]; then
-
source "$NIX_CC_WRAPPER_START_HOOK"
-
fi
-
-
if [ -z "$NIX_CC_WRAPPER_FLAGS_SET" ]; then
-
source @out@/nix-support/add-flags.sh
-
fi
-
-
source @out@/nix-support/utils.sh
-
-
-
# Figure out if linker flags should be passed. GCC prints annoying
-
# warnings when they are not needed.
-
dontLink=0
-
getVersion=0
-
nonFlagArgs=0
-
-
for i in "$@"; do
-
if [ "$i" = -c ]; then
-
dontLink=1
-
elif [ "$i" = -S ]; then
-
dontLink=1
-
elif [ "$i" = -E ]; then
-
dontLink=1
-
elif [ "$i" = -E ]; then
-
dontLink=1
-
elif [ "$i" = -M ]; then
-
dontLink=1
-
elif [ "$i" = -MM ]; then
-
dontLink=1
-
elif [ "$i" = -x ]; then
-
# At least for the cases c-header or c++-header we should set dontLink.
-
# I expect no one use -x other than making precompiled headers.
-
dontLink=1
-
elif [ "${i:0:1}" != - ]; then
-
nonFlagArgs=1
-
elif [ "$i" = -m32 ]; then
-
if [ -e @out@/nix-support/dynamic-linker-m32 ]; then
-
NIX_LDFLAGS="$NIX_LDFLAGS -dynamic-linker $(cat @out@/nix-support/dynamic-linker-m32)"
-
fi
-
fi
-
done
-
-
# If we pass a flag like -Wl, then gcc will call the linker unless it
-
# can figure out that it has to do something else (e.g., because of a
-
# "-c" flag). So if no non-flag arguments are given, don't pass any
-
# linker flags. This catches cases like "gcc" (should just print
-
# "gcc: no input files") and "gcc -v" (should print the version).
-
if [ "$nonFlagArgs" = 0 ]; then
-
dontLink=1
-
fi
-
-
-
# Optionally filter out paths not refering to the store.
-
params=("$@")
-
if [ "$NIX_ENFORCE_PURITY" = 1 -a -n "$NIX_STORE" ]; then
-
rest=()
-
n=0
-
while [ $n -lt ${#params[*]} ]; do
-
p=${params[n]}
-
p2=${params[$((n+1))]}
-
if [ "${p:0:3}" = -L/ ] && badPath "${p:2}"; then
-
skip $p
-
elif [ "$p" = -L ] && badPath "$p2"; then
-
n=$((n + 1)); skip $p2
-
elif [ "${p:0:3}" = -I/ ] && badPath "${p:2}"; then
-
skip $p
-
elif [ "$p" = -I ] && badPath "$p2"; then
-
n=$((n + 1)); skip $p2
-
elif [ "$p" = -isystem ] && badPath "$p2"; then
-
n=$((n + 1)); skip $p2
-
else
-
rest=("${rest[@]}" "$p")
-
fi
-
n=$((n + 1))
-
done
-
params=("${rest[@]}")
-
fi
-
-
-
# Add the flags for the C compiler proper.
-
extraAfter=($NIX_CFLAGS_COMPILE)
-
extraBefore=()
-
-
# When enforcing purity, pretend gcc can't find the current date and
-
# time
-
if [ "$NIX_ENFORCE_PURITY" = 1 ]; then
-
extraAfter+=('-D__DATE__="Jan 01 1970"'
-
'-D__TIME__="00:00:01"'
-
)
-
fi
-
-
-
if [ "$dontLink" != 1 ]; then
-
-
# Add the flags that should only be passed to the compiler when
-
# linking.
-
extraAfter+=($NIX_CFLAGS_LINK)
-
-
# Add the flags that should be passed to the linker (and prevent
-
# `ld-wrapper' from adding NIX_LDFLAGS again).
-
for i in $NIX_LDFLAGS_BEFORE; do
-
extraBefore=(${extraBefore[@]} "-Wl,$i")
-
done
-
for i in $NIX_LDFLAGS; do
-
if [ "${i:0:3}" = -L/ ]; then
-
extraAfter+=("$i")
-
else
-
extraAfter+=("-Wl,$i")
-
fi
-
done
-
export NIX_LDFLAGS_SET=1
-
fi
-
-
# As a very special hack, if the arguments are just `-v', then don't
-
# add anything. This is to prevent `gcc -v' (which normally prints
-
# out the version number and returns exit code 0) from printing out
-
# `No input files specified' and returning exit code 1.
-
if [ "$*" = -v ]; then
-
extraAfter=()
-
extraBefore=()
-
fi
-
-
# Optionally print debug info.
-
if [ -n "$NIX_DEBUG" ]; then
-
echo "original flags to @prog@:" >&2
-
for i in "${params[@]}"; do
-
echo " $i" >&2
-
done
-
echo "extraBefore flags to @prog@:" >&2
-
for i in ${extraBefore[@]}; do
-
echo " $i" >&2
-
done
-
echo "extraAfter flags to @prog@:" >&2
-
for i in ${extraAfter[@]}; do
-
echo " $i" >&2
-
done
-
fi
-
-
if [ -n "$NIX_CC_WRAPPER_EXEC_HOOK" ]; then
-
source "$NIX_CC_WRAPPER_EXEC_HOOK"
-
fi
-
-
exec @prog@ ${extraBefore[@]} "${params[@]}" "${extraAfter[@]}"
-147
pkgs/build-support/gcc-wrapper-old/gcc-wrapper.sh
···
-
#! @shell@ -e
-
-
if test -n "$NIX_CC_WRAPPER_START_HOOK"; then
-
source "$NIX_CC_WRAPPER_START_HOOK"
-
fi
-
-
if test -z "$NIX_CC_WRAPPER_FLAGS_SET"; then
-
source @out@/nix-support/add-flags.sh
-
fi
-
-
source @out@/nix-support/utils.sh
-
-
-
# Figure out if linker flags should be passed. GCC prints annoying
-
# warnings when they are not needed.
-
dontLink=0
-
getVersion=0
-
nonFlagArgs=0
-
-
for i in "$@"; do
-
if test "$i" = "-c"; then
-
dontLink=1
-
elif test "$i" = "-S"; then
-
dontLink=1
-
elif test "$i" = "-E"; then
-
dontLink=1
-
elif test "$i" = "-E"; then
-
dontLink=1
-
elif test "$i" = "-M"; then
-
dontLink=1
-
elif test "$i" = "-MM"; then
-
dontLink=1
-
elif test "$i" = "-x"; then
-
# At least for the cases c-header or c++-header we should set dontLink.
-
# I expect no one use -x other than making precompiled headers.
-
dontLink=1
-
elif test "${i:0:1}" != "-"; then
-
nonFlagArgs=1
-
elif test "$i" = "-m32"; then
-
if test -e @out@/nix-support/dynamic-linker-m32; then
-
NIX_LDFLAGS="$NIX_LDFLAGS -dynamic-linker $(cat @out@/nix-support/dynamic-linker-m32)"
-
fi
-
fi
-
done
-
-
# If we pass a flag like -Wl, then gcc will call the linker unless it
-
# can figure out that it has to do something else (e.g., because of a
-
# "-c" flag). So if no non-flag arguments are given, don't pass any
-
# linker flags. This catches cases like "gcc" (should just print
-
# "gcc: no input files") and "gcc -v" (should print the version).
-
if test "$nonFlagArgs" = "0"; then
-
dontLink=1
-
fi
-
-
-
# Optionally filter out paths not refering to the store.
-
params=("$@")
-
if test "$NIX_ENFORCE_PURITY" = "1" -a -n "$NIX_STORE"; then
-
rest=()
-
n=0
-
while test $n -lt ${#params[*]}; do
-
p=${params[n]}
-
p2=${params[$((n+1))]}
-
if test "${p:0:3}" = "-L/" && badPath "${p:2}"; then
-
skip $p
-
elif test "$p" = "-L" && badPath "$p2"; then
-
n=$((n + 1)); skip $p2
-
elif test "${p:0:3}" = "-I/" && badPath "${p:2}"; then
-
skip $p
-
elif test "$p" = "-I" && badPath "$p2"; then
-
n=$((n + 1)); skip $p2
-
elif test "$p" = "-isystem" && badPath "$p2"; then
-
n=$((n + 1)); skip $p2
-
else
-
rest=("${rest[@]}" "$p")
-
fi
-
n=$((n + 1))
-
done
-
params=("${rest[@]}")
-
fi
-
-
-
# Add the flags for the C compiler proper.
-
extraAfter=($NIX_CFLAGS_COMPILE)
-
extraBefore=()
-
-
if test "$dontLink" != "1"; then
-
-
# Add the flags that should only be passed to the compiler when
-
# linking.
-
extraAfter=(${extraAfter[@]} $NIX_CFLAGS_LINK)
-
-
# Add the flags that should be passed to the linker (and prevent
-
# `ld-wrapper' from adding NIX_LDFLAGS again).
-
for i in $NIX_LDFLAGS_BEFORE; do
-
extraBefore=(${extraBefore[@]} "-Wl,$i")
-
done
-
for i in $NIX_LDFLAGS; do
-
if test "${i:0:3}" = "-L/"; then
-
extraAfter=(${extraAfter[@]} "$i")
-
else
-
extraAfter=(${extraAfter[@]} "-Wl,$i")
-
fi
-
done
-
export NIX_LDFLAGS_SET=1
-
fi
-
-
# As a very special hack, if the arguments are just `-v', then don't
-
# add anything. This is to prevent `gcc -v' (which normally prints
-
# out the version number and returns exit code 0) from printing out
-
# `No input files specified' and returning exit code 1.
-
if test "$*" = "-v"; then
-
extraAfter=()
-
extraBefore=()
-
fi
-
-
# Optionally print debug info.
-
if test "$NIX_DEBUG" = "1"; then
-
echo "original flags to @gccProg@:" >&2
-
for i in "${params[@]}"; do
-
echo " $i" >&2
-
done
-
echo "extraBefore flags to @gccProg@:" >&2
-
for i in ${extraBefore[@]}; do
-
echo " $i" >&2
-
done
-
echo "extraAfter flags to @gccProg@:" >&2
-
for i in ${extraAfter[@]}; do
-
echo " $i" >&2
-
done
-
fi
-
-
if test -n "$NIX_CC_WRAPPER_EXEC_HOOK"; then
-
source "$NIX_CC_WRAPPER_EXEC_HOOK"
-
fi
-
-
-
# Call the real `gcc'. Filter out warnings from stderr about unused
-
# `-B' flags, since they confuse some programs. Deep bash magic to
-
# apply grep to stderr (by swapping stdin/stderr twice).
-
if test -z "$NIX_CC_NEEDS_GREP"; then
-
@gccProg@ ${extraBefore[@]} "${params[@]}" ${extraAfter[@]}
-
else
-
(@gccProg@ ${extraBefore[@]} "${params[@]}" ${extraAfter[@]} 3>&2 2>&1 1>&3- \
-
| (grep -v 'file path prefix' || true); exit ${PIPESTATUS[0]}) 3>&2 2>&1 1>&3-
-
exit $?
-
fi
-113
pkgs/build-support/gcc-wrapper-old/gnat-wrapper.sh
···
-
#! @shell@ -e
-
-
if test -n "$NIX_GNAT_WRAPPER_START_HOOK"; then
-
source "$NIX_GNAT_WRAPPER_START_HOOK"
-
fi
-
-
if test -z "$NIX_GNAT_WRAPPER_FLAGS_SET"; then
-
source @out@/nix-support/add-flags.sh
-
fi
-
-
source @out@/nix-support/utils.sh
-
-
-
# Figure out if linker flags should be passed. GCC prints annoying
-
# warnings when they are not needed.
-
dontLink=0
-
getVersion=0
-
nonFlagArgs=0
-
-
for i in "$@"; do
-
if test "$i" = "-c"; then
-
dontLink=1
-
elif test "$i" = "-M"; then
-
dontLink=1
-
elif test "${i:0:1}" != "-"; then
-
nonFlagArgs=1
-
elif test "$i" = "-m32"; then
-
if test -e @out@/nix-support/dynamic-linker-m32; then
-
NIX_LDFLAGS="$NIX_LDFLAGS -dynamic-linker $(cat @out@/nix-support/dynamic-linker-m32)"
-
fi
-
fi
-
done
-
-
# If we pass a flag like -Wl, then gcc will call the linker unless it
-
# can figure out that it has to do something else (e.g., because of a
-
# "-c" flag). So if no non-flag arguments are given, don't pass any
-
# linker flags. This catches cases like "gcc" (should just print
-
# "gcc: no input files") and "gcc -v" (should print the version).
-
if test "$nonFlagArgs" = "0"; then
-
dontLink=1
-
fi
-
-
-
# Optionally filter out paths not refering to the store.
-
params=("$@")
-
if test "$NIX_ENFORCE_PURITY" = "1" -a -n "$NIX_STORE"; then
-
rest=()
-
n=0
-
while test $n -lt ${#params[*]}; do
-
p=${params[n]}
-
p2=${params[$((n+1))]}
-
if test "${p:0:3}" = "-L/" && badPath "${p:2}"; then
-
skip $p
-
elif test "${p:0:3}" = "-I/" && badPath "${p:2}"; then
-
skip $p
-
elif test "${p:0:4}" = "-aI/" && badPath "${p:3}"; then
-
skip $p
-
elif test "${p:0:4}" = "-aO/" && badPath "${p:3}"; then
-
skip $p
-
else
-
rest=("${rest[@]}" "$p")
-
fi
-
n=$((n + 1))
-
done
-
params=("${rest[@]}")
-
fi
-
-
-
# Add the flags for the GNAT compiler proper.
-
extraAfter=($NIX_GNATFLAGS_COMPILE)
-
extraBefore=()
-
-
if [ "`basename $0`x" = "gnatmakex" ]; then
-
extraBefore=("--GNATBIND=@out@/bin/gnatbind --GNATLINK=@out@/bin/gnatlink ")
-
fi
-
-
# Add the flags that should be passed to the linker (and prevent
-
# `ld-wrapper' from adding NIX_LDFLAGS again).
-
#for i in $NIX_LDFLAGS_BEFORE; do
-
# extraBefore=(${extraBefore[@]} "-largs $i")
-
#done
-
-
# Optionally print debug info.
-
if test "$NIX_DEBUG" = "1"; then
-
echo "original flags to @gnatProg@:" >&2
-
for i in "${params[@]}"; do
-
echo " $i" >&2
-
done
-
echo "extraBefore flags to @gnatProg@:" >&2
-
for i in ${extraBefore[@]}; do
-
echo " $i" >&2
-
done
-
echo "extraAfter flags to @gnatProg@:" >&2
-
for i in ${extraAfter[@]}; do
-
echo " $i" >&2
-
done
-
fi
-
-
if test -n "$NIX_GNAT_WRAPPER_EXEC_HOOK"; then
-
source "$NIX_GNAT_WRAPPER_EXEC_HOOK"
-
fi
-
-
-
# Call the real `gcc'. Filter out warnings from stderr about unused
-
# `-B' flags, since they confuse some programs. Deep bash magic to
-
# apply grep to stderr (by swapping stdin/stderr twice).
-
if test -z "$NIX_GNAT_NEEDS_GREP"; then
-
@gnatProg@ ${extraBefore[@]} "${params[@]}" ${extraAfter[@]}
-
else
-
(@gnatProg@ ${extraBefore[@]} "${params[@]}" ${extraAfter[@]} 3>&2 2>&1 1>&3- \
-
| (grep -v 'file path prefix' || true); exit ${PIPESTATUS[0]}) 3>&2 2>&1 1>&3-
-
exit $?
-
fi
-43
pkgs/build-support/gcc-wrapper-old/gnatlink-wrapper.sh
···
-
#! @shell@ -e
-
-
# Add the flags for the GNAT compiler proper.
-
extraAfter="--GCC=@out@/bin/gcc"
-
extraBefore=()
-
-
# Add the flags that should be passed to the linker (and prevent
-
# `ld-wrapper' from adding NIX_LDFLAGS again).
-
#for i in $NIX_LDFLAGS_BEFORE; do
-
# extraBefore=(${extraBefore[@]} "-largs $i")
-
#done
-
-
# Optionally print debug info.
-
if test "$NIX_DEBUG" = "1"; then
-
echo "original flags to @gnatlinkProg@:" >&2
-
for i in "$@"; do
-
echo " $i" >&2
-
done
-
echo "extraBefore flags to @gnatlinkProg@:" >&2
-
for i in ${extraBefore[@]}; do
-
echo " $i" >&2
-
done
-
echo "extraAfter flags to @gnatlinkProg@:" >&2
-
for i in ${extraAfter[@]}; do
-
echo " $i" >&2
-
done
-
fi
-
-
if test -n "$NIX_GNAT_WRAPPER_EXEC_HOOK"; then
-
source "$NIX_GNAT_WRAPPER_EXEC_HOOK"
-
fi
-
-
-
# Call the real `gcc'. Filter out warnings from stderr about unused
-
# `-B' flags, since they confuse some programs. Deep bash magic to
-
# apply grep to stderr (by swapping stdin/stderr twice).
-
if test -z "$NIX_GNAT_NEEDS_GREP"; then
-
@gnatlinkProg@ ${extraBefore[@]} "$@" ${extraAfter[@]}
-
else
-
(@gnatlinkProg@ ${extraBefore[@]} "$@" ${extraAfter[@]} 3>&2 2>&1 1>&3- \
-
| (grep -v 'file path prefix' || true); exit ${PIPESTATUS[0]}) 3>&2 2>&1 1>&3-
-
exit $?
-
fi
-40
pkgs/build-support/gcc-wrapper-old/ld-solaris-wrapper.sh
···
-
#!@shell@
-
-
set -e
-
set -u
-
-
# I've also tried adding -z direct and -z lazyload, but it gave too many problems with C++ exceptions :'(
-
# Also made sure libgcc would not be lazy-loaded, as suggested here: https://www.illumos.org/issues/2534#note-3
-
# but still no success.
-
cmd="@ld@ -z ignore"
-
-
args=("$@");
-
-
# This loop makes sure all -L arguments are before -l arguments, or ld may complain it cannot find a library.
-
# GNU binutils does not have this problem:
-
# http://stackoverflow.com/questions/5817269/does-the-order-of-l-and-l-options-in-the-gnu-linker-matter
-
i=0;
-
while [[ $i -lt $# ]]; do
-
case "${args[$i]}" in
-
-L) cmd="$cmd ${args[$i]} ${args[($i+1)]}"; i=($i+1); ;;
-
-L*) cmd="$cmd ${args[$i]}" ;;
-
*) ;;
-
esac
-
i=($i+1);
-
done
-
-
i=0;
-
while [[ $i -lt $# ]]; do
-
case "${args[$i]}" in
-
-L) i=($i+1); ;;
-
-L*) ;;
-
*) cmd="$cmd ${args[$i]}" ;;
-
esac
-
i=($i+1);
-
done
-
-
# Trace:
-
set -x
-
exec $cmd
-
-
exit 0
-166
pkgs/build-support/gcc-wrapper-old/ld-wrapper.sh
···
-
#! @shell@ -e
-
-
if test -n "$NIX_LD_WRAPPER_START_HOOK"; then
-
source "$NIX_LD_WRAPPER_START_HOOK"
-
fi
-
-
if test -z "$NIX_CC_WRAPPER_FLAGS_SET"; then
-
source @out@/nix-support/add-flags.sh
-
fi
-
-
source @out@/nix-support/utils.sh
-
-
-
# Optionally filter out paths not refering to the store.
-
params=("$@")
-
if test "$NIX_ENFORCE_PURITY" = "1" -a -n "$NIX_STORE" \
-
-a \( -z "$NIX_IGNORE_LD_THROUGH_GCC" -o -z "$NIX_LDFLAGS_SET" \); then
-
rest=()
-
n=0
-
while test $n -lt ${#params[*]}; do
-
p=${params[n]}
-
p2=${params[$((n+1))]}
-
if test "${p:0:3}" = "-L/" && badPath "${p:2}"; then
-
skip $p
-
elif test "$p" = "-L" && badPath "$p2"; then
-
n=$((n + 1)); skip $p2
-
elif test "$p" = "-rpath" && badPath "$p2"; then
-
n=$((n + 1)); skip $p2
-
elif test "$p" = "-dynamic-linker" && badPath "$p2"; then
-
n=$((n + 1)); skip $p2
-
elif test "${p:0:1}" = "/" && badPath "$p"; then
-
# We cannot skip this; barf.
-
echo "impure path \`$p' used in link" >&2
-
exit 1
-
elif test "${p:0:9}" = "--sysroot"; then
-
# Our ld is not built with sysroot support (Can we fix that?)
-
:
-
else
-
rest=("${rest[@]}" "$p")
-
fi
-
n=$((n + 1))
-
done
-
params=("${rest[@]}")
-
fi
-
-
-
extra=()
-
extraBefore=()
-
-
if test -z "$NIX_LDFLAGS_SET"; then
-
extra+=($NIX_LDFLAGS)
-
extraBefore+=($NIX_LDFLAGS_BEFORE)
-
fi
-
-
extra+=($NIX_LDFLAGS_AFTER)
-
-
-
# Add all used dynamic libraries to the rpath.
-
if test "$NIX_DONT_SET_RPATH" != "1"; then
-
-
libPath=""
-
addToLibPath() {
-
local path="$1"
-
if test "${path:0:1}" != "/"; then return 0; fi
-
case "$path" in
-
*..*|*./*|*/.*|*//*)
-
local path2
-
if path2=$(readlink -f "$path"); then
-
path="$path2"
-
fi
-
;;
-
esac
-
case $libPath in
-
*\ $path\ *) return 0 ;;
-
esac
-
libPath="$libPath $path "
-
}
-
-
addToRPath() {
-
# If the path is not in the store, don't add it to the rpath.
-
# This typically happens for libraries in /tmp that are later
-
# copied to $out/lib. If not, we're screwed.
-
if test "${1:0:${#NIX_STORE}}" != "$NIX_STORE"; then return 0; fi
-
case $rpath in
-
*\ $1\ *) return 0 ;;
-
esac
-
rpath="$rpath $1 "
-
}
-
-
libs=""
-
addToLibs() {
-
libs="$libs $1"
-
}
-
-
rpath=""
-
-
# First, find all -L... switches.
-
allParams=("${params[@]}" ${extra[@]})
-
n=0
-
while test $n -lt ${#allParams[*]}; do
-
p=${allParams[n]}
-
p2=${allParams[$((n+1))]}
-
if test "${p:0:3}" = "-L/"; then
-
addToLibPath ${p:2}
-
elif test "$p" = "-L"; then
-
addToLibPath ${p2}
-
n=$((n + 1))
-
elif test "$p" = "-l"; then
-
addToLibs ${p2}
-
n=$((n + 1))
-
elif test "${p:0:2}" = "-l"; then
-
addToLibs ${p:2}
-
elif test "$p" = "-dynamic-linker"; then
-
# Ignore the dynamic linker argument, or it
-
# will get into the next 'elif'. We don't want
-
# the dynamic linker path rpath to go always first.
-
n=$((n + 1))
-
elif [[ "$p" =~ ^[^-].*\.so($|\.) ]]; then
-
# This is a direct reference to a shared library, so add
-
# its directory to the rpath.
-
path="$(dirname "$p")";
-
addToRPath "${path}"
-
fi
-
n=$((n + 1))
-
done
-
-
# Second, for each directory in the library search path (-L...),
-
# see if it contains a dynamic library used by a -l... flag. If
-
# so, add the directory to the rpath.
-
# It's important to add the rpath in the order of -L..., so
-
# the link time chosen objects will be those of runtime linking.
-
-
for i in $libPath; do
-
for j in $libs; do
-
if test -f "$i/lib$j.so"; then
-
addToRPath $i
-
break
-
fi
-
done
-
done
-
-
-
# Finally, add `-rpath' switches.
-
for i in $rpath; do
-
extra=(${extra[@]} -rpath $i)
-
done
-
fi
-
-
-
# Optionally print debug info.
-
if test "$NIX_DEBUG" = "1"; then
-
echo "original flags to @ld@:" >&2
-
for i in "${params[@]}"; do
-
echo " $i" >&2
-
done
-
echo "extra flags to @ld@:" >&2
-
for i in ${extra[@]}; do
-
echo " $i" >&2
-
done
-
fi
-
-
if test -n "$NIX_LD_WRAPPER_EXEC_HOOK"; then
-
source "$NIX_LD_WRAPPER_EXEC_HOOK"
-
fi
-
-
exec @ld@ ${extraBefore[@]} "${params[@]}" ${extra[@]}
-33
pkgs/build-support/gcc-wrapper-old/setup-hook.sh
···
-
gccWrapperOld_addCVars () {
-
if test -d $1/include; then
-
export NIX_CFLAGS_COMPILE="$NIX_CFLAGS_COMPILE -isystem $1/include"
-
fi
-
-
if test -d $1/lib64; then
-
export NIX_LDFLAGS="$NIX_LDFLAGS -L$1/lib64"
-
fi
-
-
if test -d $1/lib; then
-
export NIX_LDFLAGS="$NIX_LDFLAGS -L$1/lib"
-
fi
-
}
-
-
envBuildBuildHooks+=(gccWrapperOld_addCVars)
-
-
# Note: these come *after* $out in the PATH (see setup.sh).
-
-
if test -n "@gcc@"; then
-
addToSearchPath PATH @gcc@/bin
-
fi
-
-
if test -n "@binutils@"; then
-
addToSearchPath PATH @binutils@/bin
-
fi
-
-
if test -n "@libc@"; then
-
addToSearchPath PATH @libc_bin@/bin
-
fi
-
-
if test -n "@coreutils@"; then
-
addToSearchPath PATH @coreutils@/bin
-
fi
-26
pkgs/build-support/gcc-wrapper-old/utils.sh
···
-
skip () {
-
if test "$NIX_DEBUG" = "1"; then
-
echo "skipping impure path $1" >&2
-
fi
-
}
-
-
-
# Checks whether a path is impure. E.g., `/lib/foo.so' is impure, but
-
# `/nix/store/.../lib/foo.so' isn't.
-
badPath() {
-
local p=$1
-
-
# Relative paths are okay (since they're presumably relative to
-
# the temporary build directory).
-
if test "${p:0:1}" != "/"; then return 1; fi
-
-
@extraPathTests@
-
-
# Otherwise, the path should refer to the store or some temporary
-
# directory (including the build directory).
-
test \
-
"$p" != "/dev/null" -a \
-
"${p:0:${#NIX_STORE}}" != "$NIX_STORE" -a \
-
"${p:0:4}" != "/tmp" -a \
-
"${p:0:${#NIX_BUILD_TOP}}" != "$NIX_BUILD_TOP"
-
}
+1 -1
pkgs/build-support/kernel/modules-closure.nix
···
stdenvNoCC.mkDerivation {
name = kernel.name + "-shrunk";
builder = ./modules-closure.sh;
-
buildInputs = [ nukeReferences kmod ];
+
nativeBuildInputs = [ nukeReferences kmod ];
inherit kernel firmware rootModules allowMissing;
allowedReferences = ["out"];
}
+6
pkgs/data/misc/cacert/default.nix
···
src = nss.src;
+
outputs = [ "out" "unbundled" ];
+
nativeBuildInputs = [ python ];
configurePhase = ''
···
installPhase = ''
mkdir -pv $out/etc/ssl/certs
cp -v ca-bundle.crt $out/etc/ssl/certs
+
# install individual certs in unbundled output
+
mkdir -pv $unbundled/etc/ssl/certs
+
cp -v *.crt $unbundled/etc/ssl/certs
+
rm -f $unbundled/etc/ssl/certs/ca-bundle.crt # not wanted in unbundled
'';
setupHook = ./setup-hook.sh;
+4 -8
pkgs/data/misc/poppler-data/default.nix
···
-
{ fetchurl, stdenv }:
+
{ fetchurl, stdenv, cmake, ninja }:
stdenv.mkDerivation rec {
-
name = "poppler-data-0.4.7";
+
name = "poppler-data-0.4.8";
src = fetchurl {
url = "http://poppler.freedesktop.org/${name}.tar.gz";
-
sha256 = "1pm7wg6xqj4sppb5az4pa7psfdk4yxxkw52j85bm9fksibcb0lp7";
+
sha256 = "0wi8yyynladny51r4q53z7ygh7y491ayp8nqqv6wqqzjc60s35hh";
};
-
postPatch = ''
-
sed -i 's,$(datadir)/pkgconfig,$(prefix)/lib/pkgconfig,g' Makefile
-
'';
-
-
installFlags = [ "prefix=$(out)" ];
+
nativeBuildInputs = [ cmake ninja ];
meta = with stdenv.lib; {
homepage = https://poppler.freedesktop.org/;
+16 -1
pkgs/data/misc/tzdata/default.nix
···
-
{ stdenv, fetchurl }:
+
{ stdenv, fetchurl, buildPackages }:
stdenv.mkDerivation rec {
name = "tzdata-${version}";
···
"MANDIR=$(man)/share/man"
"AWK=awk"
"CFLAGS=-DHAVE_LINK=0"
+
"cc=${stdenv.cc.targetPrefix}cc"
+
"AR=${stdenv.cc.targetPrefix}ar"
];
+
+
depsBuildBuild = [ buildPackages.stdenv.cc ];
+
+
installFlags = [ "ZIC=./zic-native" ];
+
+
preInstall = ''
+
mv zic.o zic.o.orig
+
mv zic zic.orig
+
make $makeFlags cc=cc AR=ar zic
+
mv zic zic-native
+
mv zic.o.orig zic.o
+
mv zic.orig zic
+
'';
postInstall =
''
-472
pkgs/development/compilers/gcc/4.5/default.nix
···
-
{ stdenv, targetPackages, fetchurl, noSysDirs
-
, langC ? true, langCC ? true, langFortran ? false
-
, langJava ? false
-
, langAda ? false
-
, langVhdl ? false
-
, profiledCompiler ? false
-
, staticCompiler ? false
-
, enableShared ? true
-
, texinfo ? null
-
, perl ? null # optional, for texi2pod (then pod2man); required for Java
-
, gmp, mpfr, libmpc, gettext, which
-
, libelf # optional, for link-time optimizations (LTO)
-
, ppl ? null, cloogppl ? null # optional, for the Graphite optimization framework
-
, zlib ? null, boehmgc ? null
-
, zip ? null, unzip ? null, pkgconfig ? null, gtk2 ? null, libart_lgpl ? null
-
, libX11 ? null, libXt ? null, libSM ? null, libICE ? null, libXtst ? null
-
, libXrender ? null, xproto ? null, renderproto ? null, xextproto ? null
-
, libXrandr ? null, libXi ? null, inputproto ? null, randrproto ? null
-
, gnatboot ? null
-
, enableMultilib ? false
-
, name ? "gcc"
-
, libcCross ? null
-
, crossStageStatic ? false
-
, gnat ? null
-
, libpthread ? null, libpthreadCross ? null # required for GNU/Hurd
-
, stripped ? true
-
, buildPlatform, hostPlatform, targetPlatform
-
, buildPackages
-
}:
-
-
assert langJava -> zip != null && unzip != null
-
&& zlib != null && boehmgc != null
-
&& perl != null; # for `--enable-java-home'
-
assert langAda -> gnatboot != null;
-
assert langVhdl -> gnat != null;
-
-
# LTO needs libelf and zlib.
-
assert libelf != null -> zlib != null;
-
-
with stdenv.lib;
-
with builtins;
-
-
let version = "4.5.4";
-
javaEcj = fetchurl {
-
# The `$(top_srcdir)/ecj.jar' file is automatically picked up at
-
# `configure' time.
-
-
# XXX: Eventually we might want to take it from upstream.
-
url = "ftp://sourceware.org/pub/java/ecj-4.3.jar";
-
sha256 = "0jz7hvc0s6iydmhgh5h2m15yza7p2rlss2vkif30vm9y77m97qcx";
-
};
-
-
# Antlr (optional) allows the Java `gjdoc' tool to be built. We want a
-
# binary distribution here to allow the whole chain to be bootstrapped.
-
javaAntlr = fetchurl {
-
url = http://www.antlr.org/download/antlr-3.1.3.jar;
-
sha256 = "1f41j0y4kjydl71lqlvr73yagrs2jsg1fjymzjz66mjy7al5lh09";
-
};
-
-
xlibs = [
-
libX11 libXt libSM libICE libXtst libXrender libXrandr libXi
-
xproto renderproto xextproto inputproto randrproto
-
];
-
-
javaAwtGtk = langJava && gtk2 != null;
-
-
/* Platform flags */
-
platformFlags = let
-
gccArch = targetPlatform.platform.gcc.arch or null;
-
gccCpu = targetPlatform.platform.gcc.cpu or null;
-
gccAbi = targetPlatform.platform.gcc.abi or null;
-
gccFpu = targetPlatform.platform.gcc.fpu or null;
-
gccFloat = targetPlatform.platform.gcc.float or null;
-
gccMode = targetPlatform.platform.gcc.mode or null;
-
in
-
optional (gccArch != null) "--with-arch=${gccArch}" ++
-
optional (gccCpu != null) "--with-cpu=${gccCpu}" ++
-
optional (gccAbi != null) "--with-abi=${gccAbi}" ++
-
optional (gccFpu != null) "--with-fpu=${gccFpu}" ++
-
optional (gccFloat != null) "--with-float=${gccFloat}" ++
-
optional (gccMode != null) "--with-mode=${gccMode}";
-
-
/* Cross-gcc settings */
-
crossMingw = (targetPlatform != hostPlatform && targetPlatform.libc == "msvcrt");
-
-
crossConfigureFlags =
-
# Ensure that -print-prog-name is able to find the correct programs.
-
[ "--with-as=${targetPackages.stdenv.cc.bintools}/bin/${targetPlatform.config}-as"
-
"--with-ld=${targetPackages.stdenv.cc.bintools}/bin/${targetPlatform.config}-ld" ] ++
-
(if crossMingw && crossStageStatic then [
-
"--with-headers=${libcCross}/include"
-
"--with-gcc"
-
"--with-gnu-as"
-
"--with-gnu-ld"
-
"--with-gnu-ld"
-
"--disable-shared"
-
"--disable-nls"
-
"--disable-debug"
-
"--enable-sjlj-exceptions"
-
"--enable-threads=win32"
-
"--disable-win32-registry"
-
] else if crossStageStatic then [
-
"--disable-libssp"
-
"--disable-nls"
-
"--without-headers"
-
"--disable-threads"
-
"--disable-libmudflap"
-
"--disable-libgomp"
-
"--disable-shared"
-
"--disable-decimal-float" # libdecnumber requires libc
-
] else [
-
"--with-headers=${libcCross}/include"
-
"--enable-__cxa_atexit"
-
"--enable-long-long"
-
] ++
-
(if crossMingw then [
-
"--enable-threads=win32"
-
"--enable-sjlj-exceptions"
-
"--enable-hash-synchronization"
-
"--enable-version-specific-runtime-libs"
-
"--enable-libssp"
-
"--disable-nls"
-
"--with-dwarf2"
-
] else [
-
"--enable-threads=posix"
-
"--enable-nls"
-
"--disable-decimal-float" # No final libdecnumber (it may work only in 386)
-
]));
-
stageNameAddon = if crossStageStatic then "-stage-static" else
-
"-stage-final";
-
crossNameAddon = if targetPlatform != hostPlatform then "-${targetPlatform.config}" + stageNameAddon else "";
-
-
in
-
-
# We need all these X libraries when building AWT with GTK+.
-
assert gtk2 != null -> (filter (x: x == null) xlibs) == [];
-
-
stdenv.mkDerivation ({
-
name = "${name}-${version}" + crossNameAddon;
-
-
builder = ../builder.sh;
-
-
src = (import ./sources.nix) {
-
inherit fetchurl optional version;
-
inherit langC langCC langFortran langJava langAda;
-
};
-
-
hardeningDisable = [ "format" ] ++ optional (name != "gnat") "all";
-
-
outputs = [ "out" "man" "info" ]
-
++ optional (!(hostPlatform.is64bit && langAda)) "lib";
-
-
setOutputFlags = false;
-
NIX_NO_SELF_RPATH = true;
-
-
libc_dev = stdenv.cc.libc_dev;
-
-
patches =
-
[ ]
-
++ optional (targetPlatform != hostPlatform) ../libstdc++-target.patch
-
++ optional noSysDirs ./no-sys-dirs.patch
-
# The GNAT Makefiles did not pay attention to CFLAGS_FOR_TARGET for its
-
# target libraries and tools.
-
++ optional langAda ../gnat-cflags.patch
-
++ optional langVhdl ./ghdl-ortho-cflags.patch
-
++ [ ../struct-ucontext-4.5.patch ] # glibc-2.26
-
;
-
-
postPatch =
-
if (stdenv.system == "i586-pc-gnu"
-
|| (libcCross != null # e.g., building `gcc.crossDrv'
-
&& libcCross ? crossConfig
-
&& libcCross.crossConfig == "i586-pc-gnu")
-
|| (targetPlatform != hostPlatform && targetPlatform.config == "i586-pc-gnu"
-
&& libcCross != null))
-
then
-
# On GNU/Hurd glibc refers to Hurd & Mach headers and libpthread is not
-
# in glibc, so add the right `-I' flags to the default spec string.
-
assert libcCross != null -> libpthreadCross != null;
-
let
-
libc = if libcCross != null then libcCross else stdenv.glibc;
-
gnu_h = "gcc/config/gnu.h";
-
i386_gnu_h = "gcc/config/i386/gnu.h";
-
extraCPPDeps =
-
libc.propagatedBuildInputs
-
++ stdenv.lib.optional (libpthreadCross != null) libpthreadCross
-
++ stdenv.lib.optional (libpthread != null) libpthread;
-
extraCPPSpec =
-
concatStrings (intersperse " "
-
(map (x: "-I${x.dev or x}/include") extraCPPDeps));
-
extraLibSpec =
-
if libpthreadCross != null
-
then "-L${libpthreadCross}/lib ${libpthreadCross.TARGET_LDFLAGS}"
-
else "-L${libpthread}/lib";
-
in
-
'' echo "augmenting \`CPP_SPEC' in \`${i386_gnu_h}' with \`${extraCPPSpec}'..."
-
sed -i "${i386_gnu_h}" \
-
-es'|CPP_SPEC *"\(.*\)$|CPP_SPEC "${extraCPPSpec} \1|g'
-
-
echo "augmenting \`LIB_SPEC' in \`${gnu_h}' with \`${extraLibSpec}'..."
-
sed -i "${gnu_h}" \
-
-es'|LIB_SPEC *"\(.*\)$|LIB_SPEC "${extraLibSpec} \1|g'
-
-
echo "setting \`NATIVE_SYSTEM_HEADER_DIR' and \`STANDARD_INCLUDE_DIR' to \`${libc.dev}/include'..."
-
sed -i "${gnu_h}" \
-
-es'|#define STANDARD_INCLUDE_DIR.*$|#define STANDARD_INCLUDE_DIR "${libc.dev}/include"|g'
-
sed -i gcc/config/t-gnu \
-
-es'|NATIVE_SYSTEM_HEADER_DIR.*$|NATIVE_SYSTEM_HEADER_DIR = ${libc.dev}/include|g'
-
''
-
else if targetPlatform != hostPlatform || stdenv.cc.libc != null then
-
# On NixOS, use the right path to the dynamic linker instead of
-
# `/lib/ld*.so'.
-
let
-
libc = if libcCross != null then libcCross else stdenv.cc.libc;
-
in
-
'' echo "fixing the \`GLIBC_DYNAMIC_LINKER' and \`UCLIBC_DYNAMIC_LINKER' macros..."
-
for header in "gcc/config/"*-gnu.h "gcc/config/"*"/"*.h
-
do
-
grep -q LIBC_DYNAMIC_LINKER "$header" || continue
-
echo " fixing \`$header'..."
-
sed -i "$header" \
-
-e 's|define[[:blank:]]*\([UCG]\+\)LIBC_DYNAMIC_LINKER\([0-9]*\)[[:blank:]]"\([^\"]\+\)"$|define \1LIBC_DYNAMIC_LINKER\2 "${libc.out}\3"|g'
-
done
-
''
-
else null;
-
-
# TODO(@Ericson2314): Make passthru instead. Weird to avoid mass rebuild,
-
crossStageStatic = targetPlatform == hostPlatform || crossStageStatic;
-
inherit noSysDirs profiledCompiler staticCompiler langJava
-
libcCross crossMingw;
-
-
depsBuildBuild = [ buildPackages.stdenv.cc ];
-
nativeBuildInputs = [ texinfo which gettext ]
-
++ optional (perl != null) perl;
-
-
# For building runtime libs
-
depsBuildTarget =
-
if hostPlatform == buildPlatform then [
-
targetPackages.stdenv.cc.bintools # newly-built gcc will be used
-
] else assert targetPlatform == hostPlatform; [ # build != host == target
-
stdenv.cc
-
];
-
-
buildInputs = [
-
gmp mpfr libmpc libelf
-
targetPackages.stdenv.cc.bintools # For linking code at run-time
-
] ++ (optional (ppl != null) ppl)
-
++ (optional (cloogppl != null) cloogppl)
-
++ (optional (zlib != null) zlib)
-
++ (optional langJava boehmgc)
-
++ (optionals langJava [zip unzip])
-
++ (optionals javaAwtGtk ([gtk2 pkgconfig libart_lgpl] ++ xlibs))
-
++ (optionals (targetPlatform != hostPlatform) [targetPackages.stdenv.cc.bintools])
-
++ (optionals langAda [gnatboot])
-
++ (optionals langVhdl [gnat])
-
;
-
-
# TODO(@Ericson2314): Always pass "--target" and always prefix.
-
configurePlatforms =
-
# TODO(@Ericson2314): Figure out what's going wrong with Arm
-
if buildPlatform == hostPlatform && hostPlatform == targetPlatform && targetPlatform.isArm
-
then []
-
else [ "build" "host" ] ++ stdenv.lib.optional (targetPlatform != hostPlatform) "target";
-
-
configureFlags =
-
# Basic dependencies
-
[
-
"--with-gmp=${gmp.dev}"
-
"--with-mpfr=${mpfr.dev}"
-
"--with-mpc=${libmpc}"
-
] ++
-
optional (libelf != null) "--with-libelf=${libelf}" ++
-
optional (!(crossMingw && crossStageStatic))
-
"--with-native-system-header-dir=${getDev stdenv.cc.libc}/include" ++
-
-
# Basic configuration
-
[
-
"--disable-libstdcxx-pch"
-
"--without-included-gettext"
-
"--with-system-zlib"
-
"--enable-languages=${
-
concatStrings (intersperse ","
-
( optional langC "c"
-
++ optional langCC "c++"
-
++ optional langFortran "fortran"
-
++ optional langJava "java"
-
++ optional langAda "ada"
-
++ optional langVhdl "vhdl"
-
)
-
)
-
}"
-
] ++
-
optional (!enableMultilib) "--disable-multilib" ++
-
optional (!enableShared) "--disable-shared" ++
-
-
# Optional features
-
optional (cloogppl != null) "--with-cloog=${cloogppl}" ++
-
optional (ppl != null) "--with-ppl=${ppl}" ++
-
-
# Java options
-
optionals langJava [
-
"--with-ecj-jar=${javaEcj}"
-
-
# Follow Sun's layout for the convenience of IcedTea/OpenJDK. See
-
# <http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2010-April/008888.html>.
-
"--enable-java-home"
-
"--with-java-home=\${prefix}/lib/jvm/jre"
-
] ++
-
optional javaAwtGtk "--enable-java-awt=gtk" ++
-
optional (langJava && javaAntlr != null) "--with-antlr-jar=${javaAntlr}" ++
-
-
# Ada
-
optional langAda "--enable-libada" ++
-
-
platformFlags ++
-
optional (targetPlatform != hostPlatform) crossConfigureFlags ++
-
-
# Platform-specific flags
-
optional (targetPlatform == hostPlatform && targetPlatform.isi686) "--with-arch=i686" ++
-
# Trick that should be taken out once we have a mipsel-linux not loongson2f
-
optional (targetPlatform == hostPlatform && stdenv.system == "mipsel-linux") "--with-arch=loongson2f"
-
;
-
-
targetConfig = if targetPlatform != hostPlatform then targetPlatform.config else null;
-
-
/* For cross-built gcc (build != host == target) */
-
crossAttrs = {
-
dontStrip = true;
-
};
-
-
# Setting $CPATH and $LIBRARY_PATH to make sure both `gcc' and `xgcc' find the
-
# library headers and binaries, regarless of the language being compiled.
-
#
-
# Note: When building the Java AWT GTK+ peer, the build system doesn't honor
-
# `--with-gmp' et al., e.g., when building
-
# `libjava/classpath/native/jni/java-math/gnu_java_math_GMP.c', so we just add
-
# them to $CPATH and $LIBRARY_PATH in this case.
-
#
-
# Likewise, the LTO code doesn't find zlib.
-
#
-
# Cross-compiling, we need gcc not to read ./specs in order to build the g++
-
# compiler (after the specs for the cross-gcc are created). Having
-
# LIBRARY_PATH= makes gcc read the specs from ., and the build breaks.
-
-
CPATH = optionals (targetPlatform == hostPlatform) (makeSearchPathOutput "dev" "include" ([]
-
++ optional (zlib != null) zlib
-
++ optional langJava boehmgc
-
++ optionals javaAwtGtk xlibs
-
++ optionals javaAwtGtk [ gmp mpfr ]
-
++ optional (libpthread != null) libpthread
-
++ optional (libpthreadCross != null) libpthreadCross
-
-
# On GNU/Hurd glibc refers to Mach & Hurd
-
# headers.
-
++ optionals (libcCross != null && libcCross ? propagatedBuildInputs)
-
libcCross.propagatedBuildInputs
-
));
-
-
LIBRARY_PATH = optionals (targetPlatform == hostPlatform) (makeLibraryPath ([]
-
++ optional (zlib != null) zlib
-
++ optional langJava boehmgc
-
++ optionals javaAwtGtk xlibs
-
++ optionals javaAwtGtk [ gmp mpfr ]
-
++ optional (libpthread != null) libpthread)
-
);
-
-
EXTRA_TARGET_FLAGS = optionals
-
(targetPlatform != hostPlatform && libcCross != null)
-
([
-
"-idirafter ${libcCross.dev}/include"
-
] ++ optionals (! crossStageStatic) [
-
"-B${libcCross.out}/lib"
-
]);
-
-
EXTRA_TARGET_LDFLAGS = optionals
-
(targetPlatform != hostPlatform && libcCross != null)
-
([
-
"-Wl,-L${libcCross.out}/lib"
-
] ++ (if crossStageStatic then [
-
"-B${libcCross.out}/lib"
-
] else [
-
"-Wl,-rpath,${libcCross.out}/lib"
-
"-Wl,-rpath-link,${libcCross.out}/lib"
-
]) ++ optionals (libpthreadCross != null) [
-
"-L${libpthreadCross}/lib"
-
"-Wl,${libpthreadCross.TARGET_LDFLAGS}"
-
]);
-
-
passthru = {
-
inherit langC langCC langAda langFortran langVhdl enableMultilib version;
-
isGNU = true;
-
hardeningUnsupportedFlags = [ "stackprotector" ];
-
};
-
-
enableParallelBuilding = !langAda;
-
-
meta = {
-
homepage = http://gcc.gnu.org/;
-
license = stdenv.lib.licenses.gpl3Plus; # runtime support libraries are typically LGPLv3+
-
description = "GNU Compiler Collection, version ${version}"
-
+ (if stripped then "" else " (with debugging info)");
-
-
longDescription = ''
-
The GNU Compiler Collection includes compiler front ends for C, C++,
-
Objective-C, Fortran, OpenMP for C/C++/Fortran, Java, and Ada, as well
-
as libraries for these languages (libstdc++, libgcj, libgomp,...).
-
-
GCC development is a part of the GNU Project, aiming to improve the
-
compiler used in the GNU system including the GNU/Linux variant.
-
'';
-
-
maintainers = [
-
stdenv.lib.maintainers.viric
-
];
-
-
# Volunteers needed for the {Cyg,Dar}win ports of *PPL.
-
# gnatboot is not available out of linux platforms, so we disable the darwin build
-
# for the gnat (ada compiler).
-
platforms = stdenv.lib.platforms.linux ++ optionals (langAda == false) [ "i686-darwin" ];
-
};
-
}
-
-
// optionalAttrs (targetPlatform != hostPlatform || libcCross != null) {
-
# `builder.sh' sets $CPP, which leads configure to use "gcc -E" instead of,
-
# say, "i586-pc-gnu-gcc -E" when building `gcc.crossDrv'.
-
# FIXME: Fix `builder.sh' directly in the next stdenv-update.
-
postUnpack = "unset CPP";
-
}
-
-
// optionalAttrs (targetPlatform != hostPlatform && targetPlatform.libc == "msvcrt" && crossStageStatic) {
-
makeFlags = [ "all-gcc" "all-target-libgcc" ];
-
installTargets = "install-gcc install-target-libgcc";
-
}
-
-
# GCC 4.5.2 doesn't support the `install-strip' target, so let `stdenv' do
-
# the stripping by default.
-
// optionalAttrs (!stripped) { dontStrip = true; }
-
-
// optionalAttrs langVhdl rec {
-
name = "ghdl-0.29";
-
-
ghdlSrc = fetchurl {
-
url = "http://ghdl.free.fr/ghdl-0.29.tar.bz2";
-
sha256 = "15mlinr1lwljwll9ampzcfcrk9bk0qpdks1kxlvb70xf9zhh2jva";
-
};
-
-
# Ghdl has some timestamps checks, storing file timestamps in '.cf' files.
-
# As we will change the timestamps to 1970-01-01 00:00:01, we also set the
-
# content of that .cf to that value. This way ghdl does not complain on
-
# the installed object files from the basic libraries (ieee, ...)
-
postInstallGhdl = ''
-
pushd $out
-
find . -name "*.cf" -exec \
-
sed 's/[0-9]*\.000" /19700101000001.000" /g' -i {} \;
-
popd
-
'';
-
-
postUnpack = ''
-
tar xvf ${ghdlSrc}
-
mv ghdl-*/vhdl gcc*/gcc
-
rm -Rf ghdl-*
-
'';
-
-
meta = {
-
homepage = http://ghdl.free.fr/;
-
license = stdenv.lib.licenses.gpl2Plus;
-
description = "Complete VHDL simulator, using the GCC technology (gcc ${version})";
-
maintainers = with stdenv.lib.maintainers; [viric];
-
platforms = with stdenv.lib.platforms; linux;
-
};
-
-
})
-111
pkgs/development/compilers/gcc/4.5/ghdl-ortho-cflags.patch
···
-
diff --git a/gcc/vhdl/Make-lang.in b/gcc/vhdl/Make-lang.in
-
index 8f481df..681ac59 100644
-
--- a/gcc/vhdl/Make-lang.in
-
+++ b/gcc/vhdl/Make-lang.in
-
@@ -96,7 +96,7 @@ AGCC_GCCOBJ_DIR=../
-
AGCC_INC_FLAGS=-I$(AGCC_GCCOBJ_DIR)/gcc -I$(AGCC_GCCSRC_DIR)/include \
-
-I$(AGCC_GCCSRC_DIR)/gcc -I$(AGCC_GCCSRC_DIR)/gcc/config \
-
-I$(AGCC_GCCSRC_DIR)/libcpp/include
-
-AGCC_CFLAGS=-g -Wall -DIN_GCC $(AGCC_INC_FLAGS)
-
+AGCC_CFLAGS=-g -Wall -DIN_GCC $(AGCC_INC_FLAGS) $(CFLAGS) $(INCLUDES)
-
-
AGCC_LOCAL_OBJS=ortho-lang.o
-
-
@@ -140,7 +140,7 @@ ghdl$(exeext): force
-
-
# Ghdl libraries.
-
ghdllib: ghdl$(exeext) $(GCC_PASSES) force
-
- $(MAKE_IN_VHDL) GRT_FLAGS="-O -g" ghdllib
-
+ $(MAKE_IN_VHDL) GRT_FLAGS="-O -g $(CFLAGS)" ghdllib
-
-
# Build hooks:
-
-
diff --git a/gcc/vhdl/Makefile.in b/gcc/vhdl/Makefile.in
-
index d754c6c..07abc4a 100644
-
--- a/gcc/vhdl/Makefile.in
-
+++ b/gcc/vhdl/Makefile.in
-
@@ -80,7 +80,8 @@ T_CPPFLAGS =
-
X_ADAFLAGS =
-
T_ADAFLAGS =
-
-
-ADAC = $(CC)
-
+# Never use the bootstrapped compiler, as it may not be built for ada
-
+ADAC = gcc
-
-
ECHO = echo
-
CHMOD = chmod
-
diff --git a/gcc/vhdl/ortho-lang.c b/gcc/vhdl/ortho-lang.c
-
index 84aeb92..8eddd42 100644
-
--- a/gcc/vhdl/ortho-lang.c
-
+++ b/gcc/vhdl/ortho-lang.c
-
@@ -16,6 +16,7 @@
-
#include "options.h"
-
#include "real.h"
-
-#include "tree-gimple.h"
-
+#include "gimple.h"
-
+#include "tree.h"
-
#include "function.h"
-
#include "cgraph.h"
-
#include "target.h"
-
@@ -680,38 +681,10 @@ type_for_mode (enum machine_mode mode, int unsignedp)
-
-
const struct lang_hooks lang_hooks = LANG_HOOKS_INITIALIZER;
-
-
-/* Tree code classes. */
-
-
-
-#define DEFTREECODE(SYM, NAME, TYPE, LENGTH) TYPE,
-
-
-
-const enum tree_code_class tree_code_type[] = {
-
-#include "tree.def"
-
- 'x'
-
-};
-
-#undef DEFTREECODE
-
-
-
-/* Table indexed by tree code giving number of expression
-
- operands beyond the fixed part of the node structure.
-
- Not used for types or decls. */
-
-
-
-#define DEFTREECODE(SYM, NAME, TYPE, LENGTH) LENGTH,
-
-
-
-const unsigned char tree_code_length[] = {
-
-#include "tree.def"
-
- 0
-
-};
-
-#undef DEFTREECODE
-
-
-
-#define DEFTREECODE(SYM, NAME, TYPE, LENGTH) NAME,
-
-const char * const tree_code_name[] = {
-
-#include "tree.def"
-
- "@@dummy"
-
-};
-
-#undef DEFTREECODE
-
-
union lang_tree_node
-
GTY((desc ("0"),
-
- chain_next ("(union lang_tree_node *) GENERIC_NEXT (&%h.generic)")))
-
+ chain_next ("(union lang_tree_node *) TREE_CHAIN (&%h.generic)")))
-
{
-
union tree_node GTY ((tag ("0"))) generic;
-
};
-
@@ -1162,7 +1135,7 @@ new_access_type (tree dtype)
-
res = make_node (POINTER_TYPE);
-
TREE_TYPE (res) = NULL_TREE;
-
/* Seems necessary. */
-
- TYPE_MODE (res) = Pmode;
-
+ SET_TYPE_MODE (res, Pmode);
-
layout_type (res);
-
return res;
-
}
-
diff --git a/gcc/vhdl/Make-lang.in b/gcc/vhdl/Make-lang.in
-
index e201f64..f36fb97 100644
-
--- a/gcc/vhdl/Make-lang.in
-
+++ b/gcc/vhdl/Make-lang.in
-
@@ -132,7 +132,7 @@ ghdl1$(exeext): $(AGCC_OBJS) $(AGCC_DEPS) force
-
-cargs $(CFLAGS) $(GHDL_ADAFLAGS)
-
$(GNATMAKE) -o $@ -aI$(srcdir)/vhdl -aOvhdl ortho_gcc-main \
-
-bargs -E -cargs $(CFLAGS) $(GHDL_ADAFLAGS) \
-
- -largs $(AGCC_OBJS) $(LIBS) $(GMPLIBS)
-
+ -largs $(AGCC_OBJS) $(LIBS) $(GMPLIBS) $(CLOOGLIBS) $(PPLLIBS)
-
-
# The driver for ghdl.
-
ghdl$(exeext): force
-54
pkgs/development/compilers/gcc/4.5/no-sys-dirs.patch
···
-
diff -ru gcc-4.3.1-orig/gcc/cppdefault.c gcc-4.3.1/gcc/cppdefault.c
-
--- gcc-4.3.1-orig/gcc/cppdefault.c 2007-07-26 10:37:01.000000000 +0200
-
+++ gcc-4.3.1/gcc/cppdefault.c 2008-06-25 17:48:23.000000000 +0200
-
@@ -41,6 +41,10 @@
-
# undef CROSS_INCLUDE_DIR
-
#endif
-
-
+#undef LOCAL_INCLUDE_DIR
-
+#undef SYSTEM_INCLUDE_DIR
-
+#undef STANDARD_INCLUDE_DIR
-
+
-
const struct default_include cpp_include_defaults[]
-
#ifdef INCLUDE_DEFAULTS
-
= INCLUDE_DEFAULTS;
-
diff -ru gcc-4.3.1-orig/gcc/gcc.c gcc-4.3.1/gcc/gcc.c
-
--- gcc-4.3.1-orig/gcc/gcc.c 2008-03-02 23:55:19.000000000 +0100
-
+++ gcc-4.3.1/gcc/gcc.c 2008-06-25 17:52:53.000000000 +0200
-
@@ -1478,10 +1478,10 @@
-
/* Default prefixes to attach to command names. */
-
-
#ifndef STANDARD_STARTFILE_PREFIX_1
-
-#define STANDARD_STARTFILE_PREFIX_1 "/lib/"
-
+#define STANDARD_STARTFILE_PREFIX_1 ""
-
#endif
-
#ifndef STANDARD_STARTFILE_PREFIX_2
-
-#define STANDARD_STARTFILE_PREFIX_2 "/usr/lib/"
-
+#define STANDARD_STARTFILE_PREFIX_2 ""
-
#endif
-
-
#ifdef CROSS_DIRECTORY_STRUCTURE /* Don't use these prefixes for a cross compiler. */
-
--- gcc-4.3.1-orig/gcc/Makefile.in 2008-05-11 20:54:15.000000000 +0200
-
+++ gcc-4.3.1/gcc/Makefile.in 2008-06-25 17:48:23.000000000 +0200
-
@@ -378,7 +378,11 @@
-
MD5_H = $(srcdir)/../include/md5.h
-
-
# Default native SYSTEM_HEADER_DIR, to be overridden by targets.
-
-NATIVE_SYSTEM_HEADER_DIR = /usr/include
-
+# Nix: we override NATIVE_SYSTEM_HEADER_DIR in order to prevent
-
+# `fixinc' from fixing header files in /usr/include. However,
-
+# NATIVE_SYSTEM_HEADER_DIR must point to an existing directory, so set
-
+# it to some dummy directory.
-
+NATIVE_SYSTEM_HEADER_DIR = $(NIX_FIXINC_DUMMY)
-
# Default cross SYSTEM_HEADER_DIR, to be overridden by targets.
-
CROSS_SYSTEM_HEADER_DIR = @CROSS_SYSTEM_HEADER_DIR@
-
-
@@ -3277,7 +3281,7 @@
-
-DGPLUSPLUS_INCLUDE_DIR=\"$(gcc_gxx_include_dir)\" \
-
-DGPLUSPLUS_TOOL_INCLUDE_DIR=\"$(gcc_gxx_include_dir)/$(target_noncanonical)\" \
-
-DGPLUSPLUS_BACKWARD_INCLUDE_DIR=\"$(gcc_gxx_include_dir)/backward\" \
-
- -DLOCAL_INCLUDE_DIR=\"$(local_includedir)\" \
-
+ -DLOCAL_INCLUDE_DIR=\"/no-such-dir\" \
-
-DCROSS_INCLUDE_DIR=\"$(CROSS_SYSTEM_HEADER_DIR)\" \
-
-DTOOL_INCLUDE_DIR=\"$(gcc_tooldir)/include\" \
-
-DPREFIX=\"$(prefix)/\" \
-26
pkgs/development/compilers/gcc/4.5/sources.nix
···
-
/* Automatically generated by `update-gcc.sh', do not edit.
-
For GCC 4.5.4. */
-
{ fetchurl, optional, version, langC, langCC, langFortran, langJava, langAda }:
-
-
assert version == "4.5.4";
-
optional /* langC */ true (fetchurl {
-
url = "mirror://gcc/releases/gcc-${version}/gcc-core-${version}.tar.bz2";
-
sha256 = "894d90f72cbfc8707e330fa2b1847c443fa97cf9b7f26e86be554709510e624a";
-
}) ++
-
optional langCC (fetchurl {
-
url = "mirror://gcc/releases/gcc-${version}/gcc-g++-${version}.tar.bz2";
-
sha256 = "f7e3bab5e22713fbce46c2acb35fb727748473a34a942ce00393d75e1b09b6b9";
-
}) ++
-
optional langFortran (fetchurl {
-
url = "mirror://gcc/releases/gcc-${version}/gcc-fortran-${version}.tar.bz2";
-
sha256 = "cf0803b4f5334a526dd8da1b2171d6724f50c17346b2d5c509b6abc973d2ef34";
-
}) ++
-
optional langJava (fetchurl {
-
url = "mirror://gcc/releases/gcc-${version}/gcc-java-${version}.tar.bz2";
-
sha256 = "c98398da6f8c4c7d1758e291089d99853fdd27112cd3f146b7a8c26e6d762a23";
-
}) ++
-
optional langAda (fetchurl {
-
url = "mirror://gcc/releases/gcc-${version}/gcc-ada-${version}.tar.bz2";
-
sha256 = "8abddae15be65572b4d639bd9818057019bb4a45da4decfc6451511c8d580c5e";
-
}) ++
-
[]
+2 -20
pkgs/development/compilers/gcc/4.8/default.nix
···
, langObjC ? targetPlatform.isDarwin
, langObjCpp ? targetPlatform.isDarwin
, langJava ? false
-
, langAda ? false
-
, langVhdl ? false
, langGo ? false
, profiledCompiler ? false
, staticCompiler ? false
···
, libXrender ? null, xproto ? null, renderproto ? null, xextproto ? null
, libXrandr ? null, libXi ? null, inputproto ? null, randrproto ? null
, x11Support ? langJava
-
, gnatboot ? null
, enableMultilib ? false
, enablePlugin ? hostPlatform == buildPlatform # Whether to support user-supplied plug-ins
, name ? "gcc"
, libcCross ? null
, crossStageStatic ? false
-
, gnat ? null
, libpthread ? null, libpthreadCross ? null # required for GNU/Hurd
, stripped ? true
, gnused ? null
···
assert langJava -> zip != null && unzip != null
&& zlib != null && boehmgc != null
&& perl != null; # for `--enable-java-home'
-
assert langAda -> gnatboot != null;
-
assert langVhdl -> gnat != null;
# We enable the isl cloog backend.
assert cloog != null -> isl != null;
···
++ optional enableParallelBuilding ../parallel-bconfig.patch
++ optional (targetPlatform != hostPlatform) ../libstdc++-target.patch
++ optional noSysDirs ../no-sys-dirs.patch
-
# The GNAT Makefiles did not pay attention to CFLAGS_FOR_TARGET for its
-
# target libraries and tools.
-
++ optional langAda ../gnat-cflags.patch
++ optional langFortran ../gfortran-driving.patch
++ optional hostPlatform.isDarwin ../gfortran-darwin-NXConstStr.patch
++ [(fetchpatch {
···
++ (optionals langJava [ boehmgc zip unzip ])
++ (optionals javaAwtGtk ([ gtk2 libart_lgpl ] ++ xlibs))
++ (optionals (targetPlatform != hostPlatform) [targetPackages.stdenv.cc.bintools])
-
++ (optionals langAda [gnatboot])
-
++ (optionals langVhdl [gnat])
# The builder relies on GNU sed (for instance, Darwin's `sed' fails with
# "-i may not be used with stdin"), and `stdenvNative' doesn't provide it.
···
++ optional langCC "c++"
++ optional langFortran "fortran"
++ optional langJava "java"
-
++ optional langAda "ada"
-
++ optional langVhdl "vhdl"
++ optional langGo "go"
++ optional langObjC "objc"
++ optional langObjCpp "obj-c++"
···
] ++
optional javaAwtGtk "--enable-java-awt=gtk" ++
optional (langJava && javaAntlr != null) "--with-antlr-jar=${javaAntlr}" ++
-
-
# Ada
-
optional langAda "--enable-libada" ++
platformFlags ++
optional (targetPlatform != hostPlatform) crossConfigureFlags ++
···
]);
passthru = {
-
inherit langC langCC langObjC langObjCpp langAda langFortran langVhdl langGo version;
+
inherit langC langCC langObjC langObjCpp langFortran langGo version;
isGNU = true;
hardeningUnsupportedFlags = [ "stackprotector" ];
};
···
maintainers = with stdenv.lib.maintainers; [ viric peti ];
-
# gnatboot is not available out of linux platforms, so we disable the darwin build
-
# for the gnat (ada compiler).
platforms =
stdenv.lib.platforms.linux ++
stdenv.lib.platforms.freebsd ++
stdenv.lib.platforms.illumos ++
-
optionals (langAda == false) stdenv.lib.platforms.darwin;
+
stdenv.lib.platforms.darwin;
};
}
+2 -20
pkgs/development/compilers/gcc/4.9/default.nix
···
, langObjC ? targetPlatform.isDarwin
, langObjCpp ? targetPlatform.isDarwin
, langJava ? false
-
, langAda ? false
-
, langVhdl ? false
, langGo ? false
, profiledCompiler ? false
, staticCompiler ? false
···
, libXrender ? null, xproto ? null, renderproto ? null, xextproto ? null
, libXrandr ? null, libXi ? null, inputproto ? null, randrproto ? null
, x11Support ? langJava
-
, gnatboot ? null
, enableMultilib ? false
, enablePlugin ? hostPlatform == buildPlatform # Whether to support user-supplied plug-ins
, name ? "gcc"
, libcCross ? null
, crossStageStatic ? false
-
, gnat ? null
, libpthread ? null, libpthreadCross ? null # required for GNU/Hurd
, stripped ? true
, gnused ? null
···
assert langJava -> zip != null && unzip != null
&& zlib != null && boehmgc != null
&& perl != null; # for `--enable-java-home'
-
assert langAda -> gnatboot != null;
-
assert langVhdl -> gnat != null;
# We enable the isl cloog backend.
assert cloog != null -> isl != null;
···
++ optionals enableParallelBuilding [ ../parallel-bconfig.patch ./parallel-strsignal.patch ]
++ optional (targetPlatform != hostPlatform) ../libstdc++-target.patch
++ optional noSysDirs ../no-sys-dirs.patch
-
# The GNAT Makefiles did not pay attention to CFLAGS_FOR_TARGET for its
-
# target libraries and tools.
-
++ optional langAda ../gnat-cflags.patch
++ optional langFortran ../gfortran-driving.patch
++ [ ../struct-ucontext.patch ../struct-sigaltstack-4.9.patch ] # glibc-2.26
;
···
++ (optionals langJava [ boehmgc zip unzip ])
++ (optionals javaAwtGtk ([ gtk2 libart_lgpl ] ++ xlibs))
++ (optionals (targetPlatform != hostPlatform) [targetPackages.stdenv.cc.bintools])
-
++ (optionals langAda [gnatboot])
-
++ (optionals langVhdl [gnat])
# The builder relies on GNU sed (for instance, Darwin's `sed' fails with
# "-i may not be used with stdin"), and `stdenvNative' doesn't provide it.
···
++ optional langCC "c++"
++ optional langFortran "fortran"
++ optional langJava "java"
-
++ optional langAda "ada"
-
++ optional langVhdl "vhdl"
++ optional langGo "go"
++ optional langObjC "objc"
++ optional langObjCpp "obj-c++"
···
] ++
optional javaAwtGtk "--enable-java-awt=gtk" ++
optional (langJava && javaAntlr != null) "--with-antlr-jar=${javaAntlr}" ++
-
-
# Ada
-
optional langAda "--enable-libada" ++
platformFlags ++
optional (targetPlatform != hostPlatform) crossConfigureFlags ++
···
]);
passthru =
-
{ inherit langC langCC langObjC langObjCpp langAda langFortran langVhdl langGo version; isGNU = true; };
+
{ inherit langC langCC langObjC langObjCpp langFortran langGo version; isGNU = true; };
inherit enableParallelBuilding enableMultilib;
···
maintainers = with stdenv.lib.maintainers; [ viric peti ];
-
# gnatboot is not available out of linux platforms, so we disable the darwin build
-
# for the gnat (ada compiler).
platforms =
stdenv.lib.platforms.linux ++
stdenv.lib.platforms.freebsd ++
stdenv.lib.platforms.illumos ++
-
optionals (langAda == false) stdenv.lib.platforms.darwin;
+
stdenv.lib.platforms.darwin;
};
}
+2 -20
pkgs/development/compilers/gcc/5/default.nix
···
, langObjC ? targetPlatform.isDarwin
, langObjCpp ? targetPlatform.isDarwin
, langJava ? false
-
, langAda ? false
-
, langVhdl ? false
, langGo ? false
, profiledCompiler ? false
, staticCompiler ? false
···
, libXrender ? null, xproto ? null, renderproto ? null, xextproto ? null
, libXrandr ? null, libXi ? null, inputproto ? null, randrproto ? null
, x11Support ? langJava
-
, gnatboot ? null
, enableMultilib ? false
, enablePlugin ? hostPlatform == buildPlatform # Whether to support user-supplied plug-ins
, name ? "gcc"
, libcCross ? null
, crossStageStatic ? false
-
, gnat ? null
, libpthread ? null, libpthreadCross ? null # required for GNU/Hurd
, stripped ? true
, gnused ? null
···
assert langJava -> zip != null && unzip != null
&& zlib != null && boehmgc != null
&& perl != null; # for `--enable-java-home'
-
assert langAda -> gnatboot != null;
-
assert langVhdl -> gnat != null;
# LTO needs libelf and zlib.
assert libelf != null -> zlib != null;
···
[ ../use-source-date-epoch.patch ]
++ optional (targetPlatform != hostPlatform) ../libstdc++-target.patch
++ optional noSysDirs ../no-sys-dirs.patch
-
# The GNAT Makefiles did not pay attention to CFLAGS_FOR_TARGET for its
-
# target libraries and tools.
-
++ optional langAda ../gnat-cflags.patch
++ optional langFortran ../gfortran-driving.patch
# This could be applied unconditionally but I don't want to cause a full
···
++ (optionals langJava [ boehmgc zip unzip ])
++ (optionals javaAwtGtk ([ gtk2 libart_lgpl ] ++ xlibs))
++ (optionals (targetPlatform != hostPlatform) [targetPackages.stdenv.cc.bintools])
-
++ (optionals langAda [gnatboot])
-
++ (optionals langVhdl [gnat])
# The builder relies on GNU sed (for instance, Darwin's `sed' fails with
# "-i may not be used with stdin"), and `stdenvNative' doesn't provide it.
···
++ optional langCC "c++"
++ optional langFortran "fortran"
++ optional langJava "java"
-
++ optional langAda "ada"
-
++ optional langVhdl "vhdl"
++ optional langGo "go"
++ optional langObjC "objc"
++ optional langObjCpp "obj-c++"
···
] ++
optional javaAwtGtk "--enable-java-awt=gtk" ++
optional (langJava && javaAntlr != null) "--with-antlr-jar=${javaAntlr}" ++
-
-
# Ada
-
optional langAda "--enable-libada" ++
platformFlags ++
optional (targetPlatform != hostPlatform) crossConfigureFlags ++
···
]);
passthru =
-
{ inherit langC langCC langObjC langObjCpp langAda langFortran langVhdl langGo version; isGNU = true; };
+
{ inherit langC langCC langObjC langObjCpp langFortran langGo version; isGNU = true; };
inherit enableParallelBuilding enableMultilib;
···
maintainers = with stdenv.lib.maintainers; [ viric peti ];
-
# gnatboot is not available out of linux platforms, so we disable the darwin build
-
# for the gnat (ada compiler).
platforms =
stdenv.lib.platforms.linux ++
stdenv.lib.platforms.freebsd ++
-
optionals (langAda == false) stdenv.lib.platforms.darwin;
+
stdenv.lib.platforms.darwin;
};
}
+2 -20
pkgs/development/compilers/gcc/6/default.nix
···
, langObjC ? targetPlatform.isDarwin
, langObjCpp ? targetPlatform.isDarwin
, langJava ? false
-
, langAda ? false
-
, langVhdl ? false
, langGo ? false
, profiledCompiler ? false
, staticCompiler ? false
···
, libXrender ? null, xproto ? null, renderproto ? null, xextproto ? null
, libXrandr ? null, libXi ? null, inputproto ? null, randrproto ? null
, x11Support ? langJava
-
, gnatboot ? null
, enableMultilib ? false
, enablePlugin ? hostPlatform == buildPlatform # Whether to support user-supplied plug-ins
, name ? "gcc"
, libcCross ? null
, crossStageStatic ? false
-
, gnat ? null
, libpthread ? null, libpthreadCross ? null # required for GNU/Hurd
, stripped ? true
, gnused ? null
···
assert langJava -> zip != null && unzip != null
&& zlib != null && boehmgc != null
&& perl != null; # for `--enable-java-home'
-
assert langAda -> gnatboot != null;
-
assert langVhdl -> gnat != null;
# LTO needs libelf and zlib.
assert libelf != null -> zlib != null;
···
[ ../use-source-date-epoch.patch ]
++ optional (targetPlatform != hostPlatform) ../libstdc++-target.patch
++ optional noSysDirs ../no-sys-dirs.patch
-
# The GNAT Makefiles did not pay attention to CFLAGS_FOR_TARGET for its
-
# target libraries and tools.
-
++ optional langAda ../gnat-cflags.patch
++ optional langFortran ../gfortran-driving.patch
++ [ ../struct-ucontext.patch ../struct-sigaltstack.patch ] # glibc-2.26
++ optional langJava [ ../struct-ucontext-libjava.patch ] # glibc-2.26
···
++ (optionals langJava [ boehmgc zip unzip ])
++ (optionals javaAwtGtk ([ gtk2 libart_lgpl ] ++ xlibs))
++ (optionals (targetPlatform != hostPlatform) [targetPackages.stdenv.cc.bintools])
-
++ (optionals langAda [gnatboot])
-
++ (optionals langVhdl [gnat])
# The builder relies on GNU sed (for instance, Darwin's `sed' fails with
# "-i may not be used with stdin"), and `stdenvNative' doesn't provide it.
···
++ optional langCC "c++"
++ optional langFortran "fortran"
++ optional langJava "java"
-
++ optional langAda "ada"
-
++ optional langVhdl "vhdl"
++ optional langGo "go"
++ optional langObjC "objc"
++ optional langObjCpp "obj-c++"
···
] ++
optional javaAwtGtk "--enable-java-awt=gtk" ++
optional (langJava && javaAntlr != null) "--with-antlr-jar=${javaAntlr}" ++
-
-
# Ada
-
optional langAda "--enable-libada" ++
platformFlags ++
optional (targetPlatform != hostPlatform) crossConfigureFlags ++
···
]);
passthru =
-
{ inherit langC langCC langObjC langObjCpp langAda langFortran langVhdl langGo version; isGNU = true; };
+
{ inherit langC langCC langObjC langObjCpp langFortran langGo version; isGNU = true; };
inherit enableParallelBuilding enableMultilib;
···
maintainers = with stdenv.lib.maintainers; [ viric peti ];
-
# gnatboot is not available out of linux platforms, so we disable the darwin build
-
# for the gnat (ada compiler).
platforms =
stdenv.lib.platforms.linux ++
stdenv.lib.platforms.freebsd ++
-
optionals (langAda == false) stdenv.lib.platforms.darwin;
+
stdenv.lib.platforms.darwin;
};
}
+5 -20
pkgs/development/compilers/gcc/7/default.nix
···
, langObjC ? targetPlatform.isDarwin
, langObjCpp ? targetPlatform.isDarwin
, langJava ? false
-
, langAda ? false
-
, langVhdl ? false
, langGo ? false
, profiledCompiler ? false
, staticCompiler ? false
···
, libXrender ? null, xproto ? null, renderproto ? null, xextproto ? null
, libXrandr ? null, libXi ? null, inputproto ? null, randrproto ? null
, x11Support ? langJava
-
, gnatboot ? null
, enableMultilib ? false
, enablePlugin ? hostPlatform == buildPlatform # Whether to support user-supplied plug-ins
, name ? "gcc"
, libcCross ? null
, crossStageStatic ? false
-
, gnat ? null
, libpthread ? null, libpthreadCross ? null # required for GNU/Hurd
, stripped ? true
, gnused ? null
···
assert langJava -> zip != null && unzip != null
&& zlib != null && boehmgc != null
&& perl != null; # for `--enable-java-home'
-
assert langAda -> gnatboot != null;
-
assert langVhdl -> gnat != null;
# LTO needs libelf and zlib.
assert libelf != null -> zlib != null;
···
url = "https://git.busybox.net/buildroot/plain/package/gcc/7.1.0/0900-remove-selftests.patch?id=11271540bfe6adafbc133caf6b5b902a816f5f02";
sha256 = "0mrvxsdwip2p3l17dscpc1x8vhdsciqw1z5q9i6p5g9yg1cqnmgs";
})
-
# The GNAT Makefiles did not pay attention to CFLAGS_FOR_TARGET for its
-
# target libraries and tools.
-
++ optional langAda ../gnat-cflags.patch
-
++ optional langFortran ../gfortran-driving.patch;
+
++ optional langFortran ../gfortran-driving.patch
+
# https://gcc.gnu.org/ml/gcc-patches/2018-02/msg00633.html
+
++ optional targetPlatform.isRiscV ./riscv-pthread-reentrant.patch;
javaEcj = fetchurl {
# The `$(top_srcdir)/ecj.jar' file is automatically picked up at
···
++ (optionals langJava [ boehmgc zip unzip ])
++ (optionals javaAwtGtk ([ gtk2 libart_lgpl ] ++ xlibs))
++ (optionals (targetPlatform != hostPlatform) [targetPackages.stdenv.cc.bintools])
-
++ (optionals langAda [gnatboot])
-
++ (optionals langVhdl [gnat])
# The builder relies on GNU sed (for instance, Darwin's `sed' fails with
# "-i may not be used with stdin"), and `stdenvNative' doesn't provide it.
···
++ optional langCC "c++"
++ optional langFortran "fortran"
++ optional langJava "java"
-
++ optional langAda "ada"
-
++ optional langVhdl "vhdl"
++ optional langGo "go"
++ optional langObjC "objc"
++ optional langObjCpp "obj-c++"
···
optional javaAwtGtk "--enable-java-awt=gtk" ++
optional (langJava && javaAntlr != null) "--with-antlr-jar=${javaAntlr}" ++
-
# Ada
-
optional langAda "--enable-libada" ++
platformFlags ++
optional (targetPlatform != hostPlatform) crossConfigureFlags ++
···
]);
passthru =
-
{ inherit langC langCC langObjC langObjCpp langAda langFortran langVhdl langGo version; isGNU = true; };
+
{ inherit langC langCC langObjC langObjCpp langFortran langGo version; isGNU = true; };
inherit enableParallelBuilding enableMultilib;
···
maintainers = with stdenv.lib.maintainers; [ ];
-
# gnatboot is not available out of linux platforms, so we disable the darwin build
-
# for the gnat (ada compiler).
platforms =
stdenv.lib.platforms.linux ++
stdenv.lib.platforms.freebsd ++
-
optionals (langAda == false) stdenv.lib.platforms.darwin;
+
stdenv.lib.platforms.darwin;
};
}
+13
pkgs/development/compilers/gcc/7/riscv-pthread-reentrant.patch
···
+
Index: gcc/config/riscv/linux.h
+
===================================================================
+
--- a/gcc/config/riscv/linux.h (revision 257620)
+
+++ b/gcc/config/riscv/linux.h (revision 257621)
+
@@ -47,6 +47,8 @@
+
+
#define ICACHE_FLUSH_FUNC "__riscv_flush_icache"
+
+
+#define CPP_SPEC "%{pthread:-D_REENTRANT}"
+
+
+
#define LINK_SPEC "\
+
-melf" XLEN_SPEC "lriscv \
+
%{shared} \
-2
pkgs/development/compilers/gcc/builder.sh
···
# See https://bugs.gentoo.org/show_bug.cgi?id=301299#c31
paxmark r $out/libexec/gcc/*/*/{cc1,cc1plus}
-
eval "$postInstallGhdl"
-
# Two identical man pages are shipped (moving and compressing is done later)
ln -sf gcc.1 "$out"/share/man/man1/g++.1
}
-33
pkgs/development/compilers/gcc/gnat-cflags.patch
···
-
diff --git a/libada/Makefile.in b/libada/Makefile.in
-
index f5057a0..337e0c6 100644
-
--- a/libada/Makefile.in
-
+++ b/libada/Makefile.in
-
@@ -55,7 +55,7 @@ GCC_WARN_CFLAGS = $(LOOSE_WARN)
-
WARN_CFLAGS = @warn_cflags@
-
-
TARGET_LIBGCC2_CFLAGS=
-
-GNATLIBCFLAGS= -g -O2
-
+GNATLIBCFLAGS= -g -O2 $(CFLAGS)
-
GNATLIBCFLAGS_FOR_C = $(GNATLIBCFLAGS) $(TARGET_LIBGCC2_CFLAGS) -fexceptions \
-
-DIN_RTS @have_getipinfo@
-
-
--- a/gcc/ada/gcc-interface/Makefile.in
-
+++ b/gcc/ada/gcc-interface/Makefile.in
-
@@ -105,7 +105,7 @@ ADAFLAGS = -W -Wall -gnatpg -gnata
-
SOME_ADAFLAGS =-gnata
-
FORCE_DEBUG_ADAFLAGS = -g
-
GNATLIBFLAGS = -gnatpg -nostdinc
-
-GNATLIBCFLAGS = -g -O2
-
+GNATLIBCFLAGS = -g -O2 $(CFLAGS_FOR_TARGET)
-
# Pretend that _Unwind_GetIPInfo is available for the target by default. This
-
# should be autodetected during the configuration of libada and passed down to
-
# here, but we need something for --disable-libada and hope for the best.
-
@@ -193,7 +193,7 @@ RTSDIR = rts$(subst /,_,$(MULTISUBDIR))
-
# Link flags used to build gnat tools. By default we prefer to statically
-
# link with libgcc to avoid a dependency on shared libgcc (which is tricky
-
# to deal with as it may conflict with the libgcc provided by the system).
-
-GCC_LINK_FLAGS=-static-libgcc
-
+GCC_LINK_FLAGS=-static-libgcc $(CFLAGS_FOR_TARGET)
-
-
# End of variables for you to override.
-
+2 -20
pkgs/development/compilers/gcc/snapshot/default.nix
···
, langObjC ? targetPlatform.isDarwin
, langObjCpp ? targetPlatform.isDarwin
, langJava ? false
-
, langAda ? false
-
, langVhdl ? false
, langGo ? false
, profiledCompiler ? false
, staticCompiler ? false
···
, libXrender ? null, xproto ? null, renderproto ? null, xextproto ? null
, libXrandr ? null, libXi ? null, inputproto ? null, randrproto ? null
, x11Support ? langJava
-
, gnatboot ? null
, enableMultilib ? false
, enablePlugin ? hostPlatform == buildPlatform # Whether to support user-supplied plug-ins
, name ? "gcc"
, libcCross ? null
, crossStageStatic ? false
-
, gnat ? null
, libpthread ? null, libpthreadCross ? null # required for GNU/Hurd
, stripped ? true
, gnused ? null
···
assert langJava -> zip != null && unzip != null
&& zlib != null && boehmgc != null
&& perl != null; # for `--enable-java-home'
-
assert langAda -> gnatboot != null;
-
assert langVhdl -> gnat != null;
# LTO needs libelf and zlib.
assert libelf != null -> zlib != null;
···
[ ]
++ optional (targetPlatform != hostPlatform) ../libstdc++-target.patch
++ optional noSysDirs ../no-sys-dirs.patch
-
# The GNAT Makefiles did not pay attention to CFLAGS_FOR_TARGET for its
-
# target libraries and tools.
-
++ optional langAda ../gnat-cflags.patch
++ optional langFortran ../gfortran-driving.patch;
javaEcj = fetchurl {
···
++ (optionals langJava [ boehmgc zip unzip ])
++ (optionals javaAwtGtk ([ gtk2 libart_lgpl ] ++ xlibs))
++ (optionals (targetPlatform != hostPlatform) [targetPackages.stdenv.cc.bintools])
-
++ (optionals langAda [gnatboot])
-
++ (optionals langVhdl [gnat])
# The builder relies on GNU sed (for instance, Darwin's `sed' fails with
# "-i may not be used with stdin"), and `stdenvNative' doesn't provide it.
···
++ optional langCC "c++"
++ optional langFortran "fortran"
++ optional langJava "java"
-
++ optional langAda "ada"
-
++ optional langVhdl "vhdl"
++ optional langGo "go"
++ optional langObjC "objc"
++ optional langObjCpp "obj-c++"
···
] ++
optional javaAwtGtk "--enable-java-awt=gtk" ++
optional (langJava && javaAntlr != null) "--with-antlr-jar=${javaAntlr}" ++
-
-
# Ada
-
optional langAda "--enable-libada" ++
platformFlags ++
optional (targetPlatform != hostPlatform) crossConfigureFlags ++
···
]);
passthru =
-
{ inherit langC langCC langObjC langObjCpp langAda langFortran langVhdl langGo version; isGNU = true; };
+
{ inherit langC langCC langObjC langObjCpp langFortran langGo version; isGNU = true; };
inherit enableParallelBuilding enableMultilib;
···
maintainers = with stdenv.lib.maintainers; [ ];
-
# gnatboot is not available out of linux platforms, so we disable the darwin build
-
# for the gnat (ada compiler).
platforms =
stdenv.lib.platforms.linux ++
stdenv.lib.platforms.freebsd ++
-
optionals (langAda == false) stdenv.lib.platforms.darwin;
+
stdenv.lib.platforms.darwin;
broken = true;
};
-44
pkgs/development/compilers/ghdl/default.nix
···
-
{ stdenv, fetchFromGitHub, gnat, zlib, llvm_35, ncurses, clang, flavour ? "mcode" }:
-
-
# mcode only works on x86, while the llvm flavour works on both x86 and x86_64.
-
-
-
assert flavour == "llvm" || flavour == "mcode";
-
-
let
-
inherit (stdenv.lib) optional;
-
inherit (stdenv.lib) optionals;
-
version = "0.33";
-
in
-
stdenv.mkDerivation rec {
-
name = "ghdl-${flavour}-${version}";
-
-
src = fetchFromGitHub {
-
owner = "tgingold";
-
repo = "ghdl";
-
rev = "v${version}";
-
sha256 = "0g72rk2yzr0lrpncq2c1qcv71w3mi2hjq84r1yzgjr6d0qm87r2a";
-
};
-
-
buildInputs = [ gnat zlib ] ++ optionals (flavour == "llvm") [ clang ncurses ];
-
-
configureFlags = optional (flavour == "llvm") "--with-llvm=${llvm_35}";
-
-
patchPhase = ''
-
# Disable warnings-as-errors, because there are warnings (unused things)
-
sed -i s/-gnatwae/-gnatwa/ Makefile.in ghdl.gpr.in
-
'';
-
-
hardeningDisable = [ "all" ];
-
-
enableParallelBuilding = true;
-
-
meta = {
-
homepage = https://sourceforge.net/p/ghdl-updates/wiki/Home/;
-
description = "Free VHDL simulator";
-
maintainers = with stdenv.lib.maintainers; [viric];
-
platforms = with stdenv.lib.platforms; (if flavour == "llvm" then [ "i686-linux" "x86_64-linux" ]
-
else [ "i686-linux" ]);
-
license = stdenv.lib.licenses.gpl2Plus;
-
};
-
}
-48
pkgs/development/compilers/gnatboot/default.nix
···
-
{stdenv, fetchurl}:
-
-
stdenv.mkDerivation {
-
name = "gentoo-gnatboot-4.1";
-
-
src = if stdenv.system == "i686-linux" then
-
fetchurl {
-
url = "mirror://gentoo/distfiles/gnatboot-4.1-i386.tar.bz2";
-
sha256 = "0665zk71598204bf521vw68i5y6ccqarq9fcxsqp7ccgycb4lysr";
-
}
-
else if stdenv.system == "x86_64-linux" then
-
fetchurl {
-
url = "mirror://gentoo/distfiles/gnatboot-4.1-amd64.tar.bz2";
-
sha256 = "1li4d52lmbnfs6llcshlbqyik2q2q4bvpir0f7n38nagp0h6j0d4";
-
} else throw "Platform not supported";
-
-
dontStrip=1;
-
-
installPhase = ''
-
mkdir -p $out
-
cp -R * $out
-
set +e
-
for a in $out/bin/* ; do
-
patchelf --interpreter $(cat $NIX_CC/nix-support/dynamic-linker) \
-
--set-rpath $(cat $NIX_CC/nix-support/orig-libc)/lib:$(cat $NIX_CC/nix-support/orig-cc)/lib64:$(cat $NIX_CC/nix-support/orig-cc)/lib $a
-
done
-
set -e
-
mv $out/bin/gnatgcc_2wrap $out/bin/gnatgcc
-
ln -s $out/bin/gnatgcc $out/bin/gcc
-
'';
-
-
passthru = {
-
langC = true; /* TRICK for gcc-wrapper to wrap it */
-
langCC = false;
-
langFortran = false;
-
langAda = true;
-
};
-
-
meta = {
-
homepage = http://gentoo.org;
-
license = stdenv.lib.licenses.gpl3Plus; # runtime support libraries are typically LGPLv3+
-
maintainers = [
-
stdenv.lib.maintainers.viric
-
];
-
-
platforms = stdenv.lib.platforms.linux;
-
};
-
}
+39
pkgs/development/compilers/llvm/4/cmdline-help.patch
···
+
From c7a9aa3a697c81432786a5583bf973771c7be15e Mon Sep 17 00:00:00 2001
+
From: Don Hinton <hintonda@gmail.com>
+
Date: Wed, 12 Jul 2017 01:15:46 +0000
+
Subject: [PATCH] Fix minor typo introduced in r276404
+
+
Summary:
+
A space was added between '-' and 'help' when emitting help output.
+
+
See https://reviews.llvm.org/D22621 for details.
+
+
Reviewers: MaggieYi, vsk
+
+
Reviewed By: vsk
+
+
Subscribers: llvm-commits
+
+
Differential Revision: https://reviews.llvm.org/D35283
+
+
git-svn-id: https://llvm.org/svn/llvm-project/llvm/trunk@307745 91177308-0d34-0410-b5e6-96231b3b80d8
+
---
+
lib/Support/CommandLine.cpp | 2 +-
+
1 file changed, 1 insertion(+), 1 deletion(-)
+
+
diff --git a/lib/Support/CommandLine.cpp b/lib/Support/CommandLine.cpp
+
index 3889902eea5..79defa5c36c 100644
+
--- a/lib/Support/CommandLine.cpp
+
+++ b/lib/Support/CommandLine.cpp
+
@@ -1236,7 +1236,7 @@ bool CommandLineParser::ParseCommandLineOptions(int argc,
+
<< ": Not enough positional command line arguments specified!\n"
+
<< "Must specify at least " << NumPositionalRequired
+
<< " positional argument" << (NumPositionalRequired > 1 ? "s" : "")
+
- << ": See: " << argv[0] << " - help\n";
+
+ << ": See: " << argv[0] << " -help\n";
+
}
+
+
ErrorParsing = true;
+
--
+
2.14.0
+
+3
pkgs/development/compilers/llvm/4/llvm.nix
···
substituteInPlace lib/esan/esan_sideline_linux.cpp \
--replace 'struct sigaltstack' 'stack_t'
)
+
'' + # Fix extra space printed in commandline help sometimes, "- help"
+
''
+
patch -p1 -i ${./cmdline-help.patch}
'' + stdenv.lib.optionalString stdenv.isAarch64 ''
patch -p0 < ${../aarch64.patch}
'' + stdenv.lib.optionalString stdenv.hostPlatform.isMusl ''
+4 -1
pkgs/development/compilers/llvm/6/llvm.nix
···
, debugVersion ? false
, enableManpages ? false
, enableSharedLibraries ? true
+
, enableWasm ? true
, darwin
}:
···
"-DLLVM_HOST_TRIPLE=${stdenv.hostPlatform.config}"
"-DLLVM_DEFAULT_TARGET_TRIPLE=${stdenv.targetPlatform.config}"
"-DTARGET_TRIPLE=${stdenv.targetPlatform.config}"
-
];
+
] ++ stdenv.lib.optional enableWasm
+
"-DLLVM_EXPERIMENTAL_TARGETS_TO_BUILD=WebAssembly"
+
;
postBuild = ''
rm -fR $out
+2 -2
pkgs/development/compilers/nasm/default.nix
···
stdenv.mkDerivation rec {
name = "nasm-${version}";
-
version = "2.13.02";
+
version = "2.13.03";
src = fetchurl {
url = "http://www.nasm.us/pub/nasm/releasebuilds/${version}/${name}.tar.bz2";
-
sha256 = "1gmvjckxvkmx1kbglgrakc98qhy55xlqlk5flrdihz5yhv92hc4d";
+
sha256 = "04bh736zfj3xy5ihh1whshpjxsisv7hqkz954clzdw6kg93qdv33";
};
nativeBuildInputs = [ perl ];
+2 -2
pkgs/development/compilers/openjdk/8.nix
···
* The JRE libraries are in directories that depend on the CPU.
*/
architecture =
-
if stdenv.system == "i686-linux" then
+
if stdenv.hostPlatform.system == "i686-linux" then
"i386"
-
else if stdenv.system == "x86_64-linux" then
+
else if stdenv.hostPlatform.system == "x86_64-linux" then
"amd64"
else
throw "openjdk requires i686-linux or x86_64 linux";
+14 -15
pkgs/development/compilers/openjdk/bootstrap.nix
···
-
{ stdenv, runCommand, glibc, fetchurl, file
+
{ stdenv
+
, runCommand, fetchurl, file
, version
}:
+
assert stdenv.hostPlatform.libc == "glibc";
+
let
# !!! These should be on nixos.org
-
src = if glibc.system == "x86_64-linux" then
+
src = if stdenv.hostPlatform.system == "x86_64-linux" then
(if version == "8" then
fetchurl {
url = "https://www.dropbox.com/s/a0lsq2ig4uguky5/openjdk8-bootstrap-x86_64-linux.tar.xz?dl=1";
···
sha256 = "024gg2sgg4labxbc1nhn8lxls2p7d9h3b82hnsahwaja2pm1hbra";
}
else throw "No bootstrap for version")
-
else if glibc.system == "i686-linux" then
+
else if stdenv.hostPlatform.system == "i686-linux" then
(if version == "8" then
fetchurl {
url = "https://www.dropbox.com/s/rneqjhlerijsw74/openjdk8-bootstrap-i686-linux.tar.xz?dl=1";
···
LIBDIRS="$(find $out -name \*.so\* -exec dirname {} \; | sort | uniq | tr '\n' ':')"
-
for i in $out/bin/*; do
-
patchelf --set-interpreter ${glibc.out}/lib/ld-linux*.so.2 $i || true
-
patchelf --set-rpath "${glibc.out}/lib:$LIBDIRS" $i || true
-
done
-
-
find $out -name \*.so\* | while read lib; do
-
patchelf --set-interpreter ${glibc.out}/lib/ld-linux*.so.2 $lib || true
-
patchelf --set-rpath "${glibc.out}/lib:${stdenv.cc.cc.lib}/lib:$LIBDIRS" $lib || true
+
find "$out" -type f -print0 | while IFS= read -r -d "" elf; do
+
isELF "$elf" || continue
+
patchelf --set-interpreter $(cat "${stdenv.cc}/nix-support/dynamic-linker") "$elf" || true
+
patchelf --set-rpath "${stdenv.cc.libc}/lib:${stdenv.cc.cc.lib}/lib:$LIBDIRS" "$elf" || true
done
# Temporarily, while NixOS's OpenJDK bootstrap tarball doesn't have PaX markings:
-
exes=$(${file}/bin/file $out/bin/* 2> /dev/null | grep -E 'ELF.*(executable|shared object)' | sed -e 's/: .*$//')
-
for file in $exes; do
-
paxmark m "$file"
+
find "$out/bin" -type f -print0 | while IFS= read -r -d "" elf; do
+
isELF "$elf" || continue
+
paxmark m "$elf"
# On x86 for heap sizes over 700MB disable SEGMEXEC and PAGEEXEC as well.
-
${stdenv.lib.optionalString stdenv.isi686 ''paxmark msp "$file"''}
+
${stdenv.lib.optionalString stdenv.isi686 ''paxmark msp "$elf"''}
done
'';
in bootstrap
+22 -15
pkgs/development/interpreters/guile/1.8.nix
···
-
{ fetchurl, stdenv, libtool, readline, gmp
-
, gawk, makeWrapper }:
+
{ stdenv, buildPackages
+
, buildPlatform, hostPlatform
+
, fetchurl, makeWrapper, gawk, pkgconfig
+
, libtool, readline, gmp
+
}:
stdenv.mkDerivation rec {
name = "guile-1.8.8";
src = fetchurl {
-
url = "mirror://gnu/guile/" + name + ".tar.gz";
+
url = "mirror://gnu/guile/${name}.tar.gz";
sha256 = "0l200a0v7h8bh0cwz6v7hc13ds39cgqsmfrks55b1rbj5vniyiy3";
};
-
patches = [ ./cpp-4.5.patch ];
-
outputs = [ "out" "dev" "info" ];
setOutputFlags = false; # $dev gets into the library otherwise
# GCC 4.6 raises a number of set-but-unused warnings.
configureFlags = [ "--disable-error-on-warning" ];
-
nativeBuildInputs = [ makeWrapper gawk ];
-
propagatedBuildInputs = [ readline gmp libtool ];
-
selfNativeBuildInput = true;
+
depsBuildBuild = [ buildPackages.stdenv.cc ]
+
++ stdenv.lib.optional (hostPlatform != buildPlatform)
+
buildPackages.buildPackages.guile_1_8;
+
nativeBuildInputs = [ makeWrapper gawk pkgconfig ];
+
buildInputs = [ readline libtool ];
+
+
propagatedBuildInputs = [ gmp ];
+
+
patches = [ ./cpp-4.5.patch ];
+
postInstall = ''
wrapProgram $out/bin/guile-snarf --prefix PATH : "${gawk}/bin"
···
setupHook = ./setup-hook.sh;
meta = {
-
description = "GNU Guile, an embeddable Scheme interpreter";
+
description = "Embeddable Scheme implementation";
+
homepage = http://www.gnu.org/software/guile/;
+
license = stdenv.lib.licenses.lgpl2Plus;
+
maintainers = [ stdenv.lib.maintainers.ludo ];
+
platforms = stdenv.lib.platforms.unix;
+
longDescription = ''
GNU Guile is an interpreter for the Scheme programming language,
packaged as a library that can be embedded into programs to make
them extensible. It supports many SRFIs.
'';
-
-
homepage = http://www.gnu.org/software/guile/;
-
license = stdenv.lib.licenses.lgpl2Plus;
-
-
maintainers = [ stdenv.lib.maintainers.ludo ];
-
platforms = stdenv.lib.platforms.unix;
};
}
+10 -7
pkgs/development/interpreters/guile/2.0.nix
···
-
{ fetchurl, stdenv, libtool, readline, gmp, pkgconfig, boehmgc, libunistring
-
, libffi, gawk, makeWrapper, fetchpatch, coverageAnalysis ? null, gnu ? null
-
, hostPlatform
+
{ stdenv, buildPackages
+
, buildPlatform, hostPlatform
+
, fetchpatch, fetchurl, makeWrapper, gawk, pkgconfig
+
, libffi, libtool, readline, gmp, boehmgc, libunistring
+
, coverageAnalysis ? null, gnu ? null
}:
# Do either a coverage analysis build or a standard build.
···
outputs = [ "out" "dev" "info" ];
setOutputFlags = false; # $dev gets into the library otherwise
+
depsBuildBuild = [ buildPackages.stdenv.cc ]
+
++ stdenv.lib.optional (hostPlatform != buildPlatform)
+
buildPackages.buildPackages.guile_2_0;
nativeBuildInputs = [ makeWrapper gawk pkgconfig ];
buildInputs = [ readline libtool libunistring libffi ];
-
propagatedBuildInputs = [ gmp boehmgc ]
+
propagatedBuildInputs = [ gmp boehmgc ]
# XXX: These ones aren't normally needed here, but since
# `libguile-2.0.la' reads `-lltdl -lunistring', adding them here will add
# the needed `-L' flags. As for why the `.la' file lacks the `-L' flags,
# see below.
++ [ libtool libunistring ];
-
# A native Guile 2.0 is needed to cross-build Guile.
-
selfNativeBuildInput = true;
-
enableParallelBuilding = true;
patches = [ ./disable-gc-sensitive-tests.patch ./eai_system.patch ./clang.patch
···
url = "http://git.savannah.gnu.org/cgit/guile.git/patch/?id=2fbde7f02adb8c6585e9baf6e293ee49cd23d4c4";
sha256 = "0p6c1lmw1iniq03z7x5m65kg3lq543kgvdb4nrxsaxjqf3zhl77v";
})
+
./riscv.patch
] ++
(stdenv.lib.optional (coverageAnalysis != null) ./gcov-file-name.patch);
+9 -6
pkgs/development/interpreters/guile/default.nix
···
-
{ fetchurl, stdenv, libtool, readline, gmp, pkgconfig, boehmgc, libunistring
-
, libffi, gawk, makeWrapper, fetchpatch, coverageAnalysis ? null, gnu ? null
-
, hostPlatform
+
{ stdenv, buildPackages
+
, buildPlatform, hostPlatform
+
, fetchurl, makeWrapper, gawk, pkgconfig
+
, libffi, libtool, readline, gmp, boehmgc, libunistring
+
, coverageAnalysis ? null, gnu ? null
}:
# Do either a coverage analysis build or a standard build.
···
outputs = [ "out" "dev" "info" ];
setOutputFlags = false; # $dev gets into the library otherwise
+
depsBuildBuild = [ buildPackages.stdenv.cc ]
+
++ stdenv.lib.optional (hostPlatform != buildPlatform)
+
buildPackages.buildPackages.guile;
nativeBuildInputs = [ makeWrapper gawk pkgconfig ];
buildInputs = [ readline libtool libunistring libffi ];
···
# see below.
++ [ libtool libunistring ];
-
# A native Guile 2.0 is needed to cross-build Guile.
-
selfNativeBuildInput = true;
-
enableParallelBuilding = true;
patches = [
./eai_system.patch
+
./riscv.patch
] ++
(stdenv.lib.optional (coverageAnalysis != null) ./gcov-file-name.patch);
+13
pkgs/development/interpreters/guile/riscv.patch
···
+
diff --git a/module/system/base/target.scm b/module/system/base/target.scm
+
index 95ab8d8c9..93616f4a3 100644
+
--- a/module/system/base/target.scm
+
+++ b/module/system/base/target.scm
+
@@ -86,6 +86,8 @@
+
(endianness big))
+
((string=? "aarch64" cpu)
+
(endianness little))
+
+ ((string-match "riscv[1-9][0-9]*" cpu)
+
+ (endianness little))
+
(else
+
(error "unknown CPU endianness" cpu)))))
+
+17
pkgs/development/interpreters/perl/MakeMaker-cross.patch
···
+
diff -Naur a/cpan/ExtUtils-MakeMaker/lib/ExtUtils/MakeMaker.pm b/cpan/ExtUtils-MakeMaker/lib/ExtUtils/MakeMaker.pm
+
--- a/cpan/ExtUtils-MakeMaker/lib/ExtUtils/MakeMaker.pm 2017-06-30 17:03:20.000000000 -0400
+
+++ b/cpan/ExtUtils-MakeMaker/lib/ExtUtils/MakeMaker.pm 2018-02-28 10:06:37.031237946 -0500
+
@@ -1267,7 +1267,12 @@
+
my $value = shift;
+
return $value if $UNDER_CORE;
+
my $tvalue = '';
+
- require B;
+
+ eval {
+
+ require B;
+
+ };
+
+ if ($@) {
+
+ return $tvalue;
+
+ }
+
my $sv = B::svref_2object(\$value);
+
my $magic = ref($sv) eq 'B::PVMG' ? $sv->MAGIC : undef;
+
while ( $magic ) {
+35 -4
pkgs/development/interpreters/perl/default.nix
···
-
{ lib, stdenv, fetchurlBoot, buildPackages, enableThreading ? stdenv ? glibc, fetchpatch }:
+
{ lib, stdenv, fetchurlBoot, buildPackages
+
, enableThreading ? stdenv ? glibc, fetchpatch, makeWrapper
+
}:
with lib;
···
};
# TODO: Add a "dev" output containing the header files.
-
outputs = [ "out" "man" "devdoc" ];
+
outputs = [ "out" "man" "devdoc" ] ++
+
stdenv.lib.optional crossCompiling "dev";
setOutputFlags = false;
patches =
···
})
++ optional stdenv.isSunOS ./ld-shared.patch
++ optional stdenv.isDarwin ./cpp-precomp.patch
-
++ optional (stdenv.isDarwin && versionAtLeast version "5.24") ./sw_vers.patch;
+
++ optional (stdenv.isDarwin && versionAtLeast version "5.24") ./sw_vers.patch
+
++ optional crossCompiling ./MakeMaker-cross.patch;
postPatch = ''
pwd="$(type -P pwd)"
···
if stdenv.cc.cc or null != null then stdenv.cc.cc else "/no-such-path"
}" /no-such-path \
--replace "$man" /no-such-path
+
'' + stdenv.lib.optionalString crossCompiling
+
''
+
mkdir -p $dev/lib/perl5/cross_perl/${version}
+
for dir in cnf/{stub,cpan}; do
+
cp -r $dir/* $dev/lib/perl5/cross_perl/${version}
+
done
+
+
mkdir -p $dev/bin
+
install -m755 miniperl $dev/bin/perl
+
+
export runtimeArch="$(ls $out/lib/perl5/site_perl/${version})"
+
# wrapProgram should use a runtime-native SHELL by default, but
+
# it actually uses a buildtime-native one. If we ever fix that,
+
# we'll need to fix this to use a buildtime-native one.
+
#
+
# Adding the arch-specific directory is morally incorrect, as
+
# miniperl can't load the native modules there. However, it can
+
# (and sometimes needs to) load and run some of the pure perl
+
# code there, so we add it anyway. When needed, stubs can be put
+
# into $dev/lib/perl5/cross_perl/${version}.
+
wrapProgram $dev/bin/perl --prefix PERL5LIB : \
+
"$dev/lib/perl5/cross_perl/${version}:$out/lib/perl5/${version}:$out/lib/perl5/${version}/$runtimeArch"
''; # */
meta = {
···
sha256 = "1gh8w9m5if2s0lrx2x8f8grp74d1l6d46m8jglpjm5a1kf55j810";
};
-
depsBuildBuild = [ buildPackages.stdenv.cc ];
+
depsBuildBuild = [ buildPackages.stdenv.cc makeWrapper ];
postUnpack = ''
unpackFile ${perl-cross-src}
···
'';
configurePlatforms = [ "build" "host" "target" ];
+
+
inherit version;
+
+
# TODO merge setup hooks
+
setupHook = ./setup-hook-cross.sh;
});
in rec {
perl = perl524;
+12
pkgs/development/interpreters/perl/setup-hook-cross.sh
···
+
addPerlLibPath () {
+
addToSearchPath PERL5LIB $1/lib/perl5/site_perl/@version@
+
addToSearchPath PERL5LIB $1/lib/perl5/site_perl/cross_perl/@version@
+
# Adding the arch-specific directory is morally incorrect, as
+
# miniperl can't load the native modules there. However, it can
+
# (and sometimes needs to) load and run some of the pure perl
+
# code there, so we add it anyway. When needed, stubs can be put
+
# into $1/lib/perl5/site_perl/cross_perl/@version@
+
addToSearchPath PERL5LIB $1/lib/perl5/site_perl/@version@/@runtimeArch@
+
}
+
+
addEnvHooks "$targetOffset" addPerlLibPath
+2 -2
pkgs/development/libraries/atk/default.nix
···
let
pname = "atk";
-
version = "2.26.1";
+
version = "2.28.1";
in
stdenv.mkDerivation rec {
name = "${pname}-${version}";
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${gnome3.versionBranch version}/${name}.tar.xz";
-
sha256 = "1jwpx8az0iifw176dc2hl4mmg6gvxzxdkd1qvg4ds7c5hdmzy07g";
+
sha256 = "1z7laf6qwv5zsqcnj222dm5f43c6f3liil0cgx4s4s62xjk1wfnd";
};
enableParallelBuilding = true;
+2 -2
pkgs/development/libraries/audio/libgme/default.nix
···
{ stdenv, fetchFromBitbucket, cmake }:
let
-
version = "0.6.1";
+
version = "0.6.2";
in stdenv.mkDerivation {
name = "libgme-${version}";
···
owner = "mpyne";
repo = "game-music-emu";
rev = version;
-
sha256 = "04vwpv3pmjcil1jw5vcnlg45nch5awqs06y3xqdlp3ibx5i4k199";
+
sha256 = "00vlbfk5h99dq5rbwxk20dv72dig6wdwpgf83q451avsscky0jvk";
};
buildInputs = [ cmake ];
+2 -1
pkgs/development/libraries/boost/1.66.nix
···
-
{ stdenv, callPackage, fetchurl, ... } @ args:
+
{ stdenv, callPackage, fetchurl, hostPlatform, buildPlatform, ... } @ args:
callPackage ./generic.nix (args // rec {
version = "1.66_0";
···
sha256 = "5721818253e6a0989583192f96782c4a98eb6204965316df9f5ad75819225ca9";
};
+
toolset = if stdenv.cc.isClang then "clang" else null;
})
+3 -2
pkgs/development/libraries/dbus/make-dbus-conf.nix
···
rewritePrefix="file://${dbus}/share/xml/dbus/"/>
</catalog>
'';
+
nativeBuildInputs = [ libxslt ];
}
''
mkdir -p $out
-
${libxslt.bin}/bin/xsltproc --nonet \
+
xsltproc --nonet \
--stringparam serviceDirectories "$serviceDirectories" \
--stringparam suidHelper "$suidHelper" \
${./make-system-conf.xsl} ${dbus}/share/dbus-1/system.conf \
> $out/system.conf
-
${libxslt.bin}/bin/xsltproc --nonet \
+
xsltproc --nonet \
--stringparam serviceDirectories "$serviceDirectories" \
${./make-session-conf.xsl} ${dbus}/share/dbus-1/session.conf \
> $out/session.conf
+10 -5
pkgs/development/libraries/epoxy/default.nix
···
{ stdenv, fetchFromGitHub, autoreconfHook, pkgconfig, utilmacros, python
-
, libGLU_combined, libX11
+
, libGL, libX11
}:
stdenv.mkDerivation rec {
name = "epoxy-${version}";
-
version = "1.3.1";
+
version = "1.5.0";
src = fetchFromGitHub {
owner = "anholt";
repo = "libepoxy";
-
rev = "v${version}";
-
sha256 = "0dfkd4xbp7v5gwsf6qwaraz54yzizf3lj5ymyc0msjn0adq3j5yl";
+
rev = "${version}";
+
sha256 = "1ixpqb10pmdy3n9nxd5inflig9dal5502ggadcns5b58j6jr0yv0";
};
outputs = [ "out" "dev" ];
nativeBuildInputs = [ autoreconfHook pkgconfig utilmacros python ];
-
buildInputs = [ libGLU_combined libX11 ];
+
buildInputs = [ libGL libX11 ];
preConfigure = stdenv.lib.optional stdenv.isDarwin ''
substituteInPlace configure --replace build_glx=no build_glx=yes
substituteInPlace src/dispatch_common.h --replace "PLATFORM_HAS_GLX 0" "PLATFORM_HAS_GLX 1"
+
'';
+
+
# add libGL to rpath because libepoxy dlopen()s libEGL
+
postFixup = ''
+
patchelf --set-rpath "${stdenv.lib.makeLibraryPath [ libGL ]}:$(patchelf --print-rpath $out/lib/libepoxy.so.0.0.0)" $out/lib/libepoxy.so.0.0.0
'';
meta = with stdenv.lib; {
+2 -1
pkgs/development/libraries/fontconfig/default.nix
···
# additionally required for the glibc-2.25 patch; avoid requiring gperf
postPatch = ''
sed s/CHAR_WIDTH/CHARWIDTH/g -i src/fcobjshash.{h,gperf}
-
touch src/*
+
sleep 2
+
touch src/fcobjshash.h
'';
outputs = [ "bin" "dev" "lib" "out" ]; # $out contains all the config
+2 -2
pkgs/development/libraries/gnutls/3.6.nix
···
{ callPackage, fetchurl, ... } @ args:
callPackage ./generic.nix (args // rec {
-
version = "3.6.1";
+
version = "3.6.2";
src = fetchurl {
url = "mirror://gnupg/gnutls/v3.6/gnutls-${version}.tar.xz";
-
sha256 = "1vdsir53ddxyapnxh5fpnfyij3scx3818iri4hl07g4lk4n0vc90";
+
sha256 = "07wdffklwmxpa9i50sh5nwrc5ajb47skrldm6rzjc0jf4dxxpmdw";
};
# Skip two tests introduced in 3.5.11. Probable reasons of failure:
+3 -3
pkgs/development/libraries/gobject-introspection/default.nix
···
{ stdenv, fetchurl, glib, flex, bison, pkgconfig, libffi, python
, libintlOrEmpty, cctools, cairo, gnome3
, substituteAll, nixStoreDir ? builtins.storeDir
+
, x11Support ? true
}:
# now that gobjectIntrospection creates large .gir files (eg gtk3 case)
# it may be worth thinking about using multiple derivation outputs
···
src = ./absolute_shlib_path.patch;
inherit nixStoreDir;
})
-
# https://github.com/NixOS/nixpkgs/issues/34080
+
] ++ stdenv.lib.optional x11Support # https://github.com/NixOS/nixpkgs/issues/34080
(substituteAll {
src = ./absolute_gir_path.patch;
cairoLib = "${getLib cairo}/lib";
-
})
-
];
+
});
passthru = {
updateScript = gnome3.updateScript {
+2 -4
pkgs/development/libraries/gtk+/3.x.nix
···
with stdenv.lib;
-
let
-
version = "3.22.26";
-
in
stdenv.mkDerivation rec {
name = "gtk+3-${version}";
+
version = "3.22.28";
src = fetchurl {
url = "mirror://gnome/sources/gtk+/${gnome3.versionBranch version}/gtk+-${version}.tar.xz";
-
sha256 = "61eef0d320e541976e2dfe445729f12b5ade53050ee9de6184235cb60cd4b967";
+
sha256 = "d299612b018cfed7b2c689168ab52b668023708e17c335eb592260d186f15e1f";
};
outputs = [ "out" "dev" ];
+2 -2
pkgs/development/libraries/harfbuzz/default.nix
···
}:
let
-
version = "1.7.1";
+
version = "1.7.5";
inherit (stdenv.lib) optional optionals optionalString;
in
···
src = fetchurl {
url = "http://www.freedesktop.org/software/harfbuzz/release/harfbuzz-${version}.tar.bz2";
-
sha256 = "9645a6e83313b690602017f18d4eb2adf81f2e54c6fc4471e19331304965154e";
+
sha256 = "84574e1b1f65ca694cb8fb6905309665c0368af18a312357f8ff886ee2f29563";
};
outputs = [ "out" "dev" ];
+2 -2
pkgs/development/libraries/http-parser/default.nix
···
{ stdenv, fetchurl, python2Packages, utillinux, fixDarwinDylibNames }:
let
-
version = "2.7.0";
+
version = "2.8.0";
in stdenv.mkDerivation {
name = "http-parser-${version}";
src = fetchurl {
url = "https://github.com/joyent/http-parser/archive/v${version}.tar.gz";
-
sha256 = "0rqij6v6wv1giwx4prfa082kw1nka5d9vlb06zkc8mwszq1vzidh";
+
sha256 = "17a7k3nxv2p1sp2x5d89wr51vk770753vz6qnlp2gz7nkgwwcxvj";
};
patches = [ ./build-shared.patch ];
+2 -2
pkgs/development/libraries/imlib2/default.nix
···
with stdenv.lib;
stdenv.mkDerivation rec {
-
name = "imlib2-1.4.10";
+
name = "imlib2-1.5.0";
src = fetchurl {
url = "mirror://sourceforge/enlightenment/${name}.tar.bz2";
-
sha256 = "0wm2q2xlkbm71k7mw2jyzbxgzylrkcj5yh6nq58w5gybhp98qs9z";
+
sha256 = "0kg28b5wp886hiy12v7abdybrvlymb7g3nvg0ysn2y8h883s5w8m";
};
buildInputs = [ libjpeg libtiff giflib libpng bzip2 freetype libid3tag ]
+2 -2
pkgs/development/libraries/jansson/default.nix
···
{stdenv, fetchurl}:
stdenv.mkDerivation rec {
-
name = "jansson-2.10";
+
name = "jansson-2.11";
src = fetchurl {
url = "http://www.digip.org/jansson/releases/${name}.tar.gz";
-
sha256 = "0iv4rxsnamqm3ldpg7dyhjq0x9cp023nc7ac820jdd3pwb8ml8bq";
+
sha256 = "1x5jllzzqamq6kahx9d9a5mrarm9m3f30vfxvcqpi6p4mcnz91bf";
};
meta = with stdenv.lib; {
+2 -2
pkgs/development/libraries/lcms2/default.nix
···
{ stdenv, fetchurl, libtiff, libjpeg, zlib }:
stdenv.mkDerivation rec {
-
name = "lcms2-2.8";
+
name = "lcms2-2.9";
src = fetchurl {
url = "mirror://sourceforge/lcms/${name}.tar.gz";
-
sha256 = "08pvl289g0mbznzx5l6ibhaldsgx41kwvdn2c974ga9fkli2pl36";
+
sha256 = "083xisy6z01zhm7p7rgk4bx9d6zlr8l20qkfv1g29ylnhgwzvij8";
};
outputs = [ "bin" "dev" "out" ];
+2
pkgs/development/libraries/libatomic_ops/default.nix
···
sha256 ="1rif2hjscq5mh639nsnjhb90c01gnmy1sbmj6x6hsn1xmpnj95r1";
};
+
outputs = [ "out" "dev" "doc" ];
+
# https://github.com/ivmai/libatomic_ops/pull/32
patches = if hostPlatform.isRiscV then [ ./riscv.patch ] else null;
+2 -2
pkgs/development/libraries/libdrm/default.nix
···
{ stdenv, fetchurl, pkgconfig, libpthreadstubs, libpciaccess, valgrind-light }:
stdenv.mkDerivation rec {
-
name = "libdrm-2.4.89";
+
name = "libdrm-2.4.90";
src = fetchurl {
url = "http://dri.freedesktop.org/libdrm/${name}.tar.bz2";
-
sha256 = "629f9782aabbb4809166de5f24d26fe0766055255038f16935602d89f136a02e";
+
sha256 = "db37ec8f1dbaa2c192ad9903c8d0988b858ae88031e96f169bf76aaf705db68b";
};
outputs = [ "out" "dev" "bin" ];
+2 -2
pkgs/development/libraries/libdvdcss/default.nix
···
stdenv.mkDerivation rec {
name = "libdvdcss-${version}";
-
version = "1.4.0";
+
version = "1.4.1";
buildInputs = stdenv.lib.optional stdenv.isDarwin IOKit;
src = fetchurl {
url = "http://get.videolan.org/libdvdcss/${version}/${name}.tar.bz2";
-
sha256 = "0nl45ifc4xcb196snv9d6hinfw614cqpzcqp92dg43c0hickg290";
+
sha256 = "1b7awvyahivglp7qmgx2g5005kc5npv257gw7wxdprjsnx93f1zb";
};
meta = with stdenv.lib; {
+2 -2
pkgs/development/libraries/libevdev/default.nix
···
{ stdenv, fetchurl, python }:
stdenv.mkDerivation rec {
-
name = "libevdev-1.5.7";
+
name = "libevdev-1.5.8";
src = fetchurl {
url = "https://www.freedesktop.org/software/libevdev/${name}.tar.xz";
-
sha256 = "08nl3p6226k51zph52fhilxvi3b31spp6fz8szzrglzhl8vrxrd1";
+
sha256 = "0vac7n1miqdprikq4g63vsk681q8v416r0nbh2xai7b08qgdi0v0";
};
buildInputs = [ python ];
+3 -3
pkgs/development/libraries/libgcrypt/default.nix
···
# The build enables -O2 by default for everything else.
hardeningDisable = stdenv.lib.optional stdenv.cc.isClang "fortify";
-
depsBuildBuild = stdenv.lib.optional stdenv.isCross buildPackages.stdenv.cc;
+
depsBuildBuild = [ buildPackages.stdenv.cc ];
buildInputs = [ libgpgerror ]
++ stdenv.lib.optional stdenv.isDarwin gettext
++ stdenv.lib.optional enableCapabilities libcap;
-
preConfigure = if stdenv.isCross then ''
+
preConfigure = stdenv.lib.optionalString stdenv.isCross ''
# This is intentional: gpg-error-config is a shell script that will work during the build
mkdir -p "$NIX_BUILD_TOP"/bin
ln -s ${libgpgerror.dev}/bin/gpg-error-config "$NIX_BUILD_TOP/bin"
export PATH="$NIX_BUILD_TOP/bin:$PATH"
-
'' else null;
+
'';
# Make sure libraries are correct for .pc and .la files
# Also make sure includes are fixed for callers who don't use libgpgcrypt-config
+2 -2
pkgs/development/libraries/libgsf/default.nix
···
let inherit (stdenv.lib) optionals; in
stdenv.mkDerivation rec {
-
name = "libgsf-1.14.41";
+
name = "libgsf-1.14.42";
src = fetchurl {
url = "mirror://gnome/sources/libgsf/1.14/${name}.tar.xz";
-
sha256 = "1lq87wnrsjbjafpk3c8xwd56gqx319fhck9xkg2da88hd9c9h2qm";
+
sha256 = "1hhdz0ymda26q6bl5ygickkgrh998lxqq4z9i8dzpcvqna3zpzr9";
};
nativeBuildInputs = [ pkgconfig intltool ];
+5 -3
pkgs/development/libraries/libidn2/default.nix
···
-
{ fetchurl, stdenv, libiconv, libunistring, help2man, ronn }:
+
{ fetchurl, stdenv, libiconv, libunistring, help2man, ronn, buildPackages }:
with stdenv.lib;
···
patches = optional stdenv.isDarwin ./fix-error-darwin.patch;
-
buildInputs = [ libunistring ronn ]
-
++ optionals stdenv.isDarwin [ libiconv help2man ];
+
nativeBuildInputs = [ ronn ]
+
++ optional stdenv.isDarwin help2man;
+
buildInputs = [ libunistring ] ++ optional stdenv.isDarwin libiconv;
+
depsBuildBuild = [ buildPackages.stdenv.cc ];
meta = {
homepage = "https://www.gnu.org/software/libidn/#libidn2";
+2 -2
pkgs/development/libraries/libinput/default.nix
···
with stdenv.lib;
stdenv.mkDerivation rec {
name = "libinput-${version}";
-
version = "1.9.4";
+
version = "1.10.0";
src = fetchurl {
url = "http://www.freedesktop.org/software/libinput/${name}.tar.xz";
-
sha256 = "142icwzpirwddl7ghfmynxpnsbjg53rjxpzv4arjsaiw9r6bvk8b";
+
sha256 = "0mrzsf0349d1g68lizkzxw7vaw459fl8xhl7v0s8njb31hp2riy2";
};
outputs = [ "out" "dev" ];
+2 -2
pkgs/development/libraries/libkate/default.nix
···
{ stdenv, fetchurl, libogg, libpng }:
stdenv.mkDerivation rec {
-
name = "libkate-0.3.8";
+
name = "libkate-0.4.1";
src = fetchurl {
url = "https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/libkate/${name}.tar.gz";
-
sha256 = "00d6561g31la9bb8q99b7l4rvi67yiwm50ky8dhlsjd88h7rks2n";
+
sha256 = "0s3vr2nxfxlf1k75iqpp4l78yf4gil3f0v778kvlngbchvaq23n4";
};
buildInputs = [ libogg libpng ];
+2 -2
pkgs/development/libraries/libmbim/default.nix
···
{ stdenv, fetchurl, pkgconfig, glib, python, udev, libgudev }:
stdenv.mkDerivation rec {
-
name = "libmbim-1.14.2";
+
name = "libmbim-1.16.0";
src = fetchurl {
url = "https://www.freedesktop.org/software/libmbim/${name}.tar.xz";
-
sha256 = "1krirl9881dnx7l29zhvagk2qlhi26vpvkzdifjklhrjhimzxji2";
+
sha256 = "1hpsjc7bzmakzvj8z9fffvqknc38fa8ridpmklq46jyxxnz51jn8";
};
outputs = [ "out" "dev" "man" ];
+2 -2
pkgs/development/libraries/libmicrohttpd/default.nix
···
stdenv.mkDerivation rec {
name = "libmicrohttpd-${version}";
-
version = "0.9.58";
+
version = "0.9.59";
src = fetchurl {
url = "mirror://gnu/libmicrohttpd/${name}.tar.gz";
-
sha256 = "1wq17qvizis7bsyvyw1gnfycvivssncngziddnyrbzv2dhvy24bs";
+
sha256 = "0g4jgnv43yddr9yxrqg11632rip0lg5c53gmy5wy3c0i1dywv74v";
};
outputs = [ "out" "dev" "devdoc" "info" ];
+2 -2
pkgs/development/libraries/libmng/default.nix
···
{ stdenv, fetchurl, zlib, libpng, libjpeg, lcms2 }:
stdenv.mkDerivation rec {
-
name = "libmng-2.0.2";
+
name = "libmng-2.0.3";
src = fetchurl {
url = "mirror://sourceforge/libmng/${name}.tar.xz";
-
sha256 = "0l5wa3b9rr4zl49zbbjpapqyccqjwzkzw1ph3p4pk9p5h73h9317";
+
sha256 = "1lvxnpds0vcf0lil6ia2036ghqlbl740c4d2sz0q5g6l93fjyija";
};
outputs = [ "out" "dev" "devdoc" ];
+2 -2
pkgs/development/libraries/libmodplug/default.nix
···
{ stdenv, fetchurl }:
let
-
version = "0.8.8.5";
+
version = "0.8.9.0";
in stdenv.mkDerivation rec {
name = "libmodplug-${version}";
···
src = fetchurl {
url = "mirror://sourceforge/project/modplug-xmms/libmodplug/${version}/${name}.tar.gz";
-
sha256 = "1bfsladg7h6vnii47dd66f5vh1ir7qv12mfb8n36qiwrxq92sikp";
+
sha256 = "1pnri98a603xk47smnxr551svbmgbzcw018mq1k6srbrq6kaaz25";
};
}
+2 -2
pkgs/development/libraries/libqmi/default.nix
···
{ stdenv, fetchurl, pkgconfig, glib, python, libgudev, libmbim }:
stdenv.mkDerivation rec {
-
name = "libqmi-1.18.0";
+
name = "libqmi-1.20.0";
src = fetchurl {
url = "https://www.freedesktop.org/software/libqmi/${name}.tar.xz";
-
sha256 = "1v4cz3nsmh7nn3smhlhwzrb7yh6l1f270bwf40qacxayjdajr950";
+
sha256 = "1d3fca477sdwbv4bsq1cl98qc8sixrzp0gqjcmjj8mlwfk9qqhi1";
};
outputs = [ "out" "dev" "devdoc" ];
+2 -2
pkgs/development/libraries/libraw1394/default.nix
···
{ stdenv, fetchurl }:
stdenv.mkDerivation rec {
-
name = "libraw1394-2.1.1";
+
name = "libraw1394-2.1.2";
src = fetchurl {
url = "mirror://kernel/linux/libs/ieee1394/${name}.tar.gz";
-
sha256 = "0x6az154wr7wv3945485grjvpk604khv34dbaph6vmc1zdasqq59";
+
sha256 = "0z5md84941ky5l7afayx2z6j0sk0mildxbjajq6niznd44ky7i6x";
};
meta = with stdenv.lib; {
+2
pkgs/development/libraries/libseccomp/default.nix
···
sha256 = "0mdiyfljrkfl50q1m3ws8yfcyfjwf1zgkvcva8ffcwncji18zhkz";
};
+
outputs = [ "out" "lib" "dev" "man" ];
+
buildInputs = [ getopt makeWrapper ];
patchPhase = ''
+2 -2
pkgs/development/libraries/libspatialite/default.nix
···
with lib;
stdenv.mkDerivation rec {
-
name = "libspatialite-4.2.0";
+
name = "libspatialite-4.3.0a";
src = fetchurl {
url = "http://www.gaia-gis.it/gaia-sins/libspatialite-sources/${name}.tar.gz";
-
sha256 = "0b9ipmp09y2ij7yajyjsh0zcwps8n5g88lzfzlkph33lail8l4wz";
+
sha256 = "16d4lpl7xrm9zy4gphy6nwanpjp8wn9g4wq2i2kh8abnlhq01448";
};
nativeBuildInputs = [ pkgconfig ];
+2 -2
pkgs/development/libraries/libunistring/default.nix
···
stdenv.mkDerivation rec {
name = "libunistring-${version}";
-
version = "0.9.8";
+
version = "0.9.9";
src = fetchurl {
url = "mirror://gnu/libunistring/${name}.tar.gz";
-
sha256 = "1x9wnpzg7vxyjpnzab6vw0afbcijfbd57qrrkqrppynh0nyz54mp";
+
sha256 = "0jm8pr469y7ybb90ll8k1585rciqm8ckzif0laipqhp5z440rsgm";
};
outputs = [ "out" "dev" "info" "doc" ];
+2
pkgs/development/libraries/libunwind/default.nix
···
platforms = platforms.linux;
license = licenses.mit;
};
+
+
passthru.supportsHost = !stdenv.hostPlatform.isRiscV;
}
+2 -2
pkgs/development/libraries/libuv/default.nix
···
, ApplicationServices, CoreServices }:
stdenv.mkDerivation rec {
-
version = "1.19.1";
+
version = "1.19.2";
name = "libuv-${version}";
src = fetchFromGitHub {
owner = "libuv";
repo = "libuv";
rev = "v${version}";
-
sha256 = "020jap4xvjns1rgb2kvpf1nib3f2d5fyqh04afgkk32hiag0kn66";
+
sha256 = "118r8wigm65107fm7kzfz7gc4awy8xxg0knvwnshx1j40ks08x9z";
};
postPatch = let
+1 -1
pkgs/development/libraries/libva-utils/default.nix
···
owner = "01org";
repo = "libva-utils";
rev = version;
-
sha256 = "02n51cvp8bzzjk4fargwvgh7z71y8spg24hqgaawbp3p3ahh7xxi";
+
sha256 = "113wdmi4r0qligizj9zmd4a8ml1996x9g2zp2i4pmhb8frv9m8j2";
};
nativeBuildInputs = [ autoreconfHook pkgconfig ];
+3 -2
pkgs/development/libraries/libva/default.nix
···
stdenv.mkDerivation rec {
name = "libva-${lib.optionalString (!minimal) "full-"}${version}";
-
version = "2.0.0";
+
version = "2.1.0";
+
# update libva-utils and vaapiIntel as well
src = fetchFromGitHub {
owner = "01org";
repo = "libva";
rev = version;
-
sha256 = "1x8rlmv5wfqjz3j87byrxb4d9vp5b4lrrin2fx254nwl3aqy15hy";
+
sha256 = "1a60lrgr65hx9b2qp0gjky1298c4d4zp3ap6vnmmz850sxx5rm8w";
};
outputs = [ "dev" "out" ];
+2 -2
pkgs/development/libraries/libwacom/default.nix
···
stdenv.mkDerivation rec {
name = "libwacom-${version}";
-
version = "0.26";
+
version = "0.28";
src = fetchurl {
url = "mirror://sourceforge/linuxwacom/libwacom/${name}.tar.bz2";
-
sha256 = "0xpvkjvzaj9blcmw8ha46616bzfivj99kwzvr91clxd6iaf11r63";
+
sha256 = "1vv768870597rvwxdb59v6pjn1pxaxg4r6znbb5j3cl828q35mp7";
};
nativeBuildInputs = [ pkgconfig ];
+19 -14
pkgs/development/libraries/libxkbcommon/default.nix
···
-
{ stdenv, fetchurl, pkgconfig, yacc, flex, xkeyboard_config, libxcb, libX11 }:
+
{ stdenv, fetchurl, fetchpatch, meson, ninja, pkgconfig, yacc, xkeyboard_config, libxcb, libX11, doxygen }:
stdenv.mkDerivation rec {
-
name = "libxkbcommon-0.7.2";
+
name = "libxkbcommon-0.8.0";
src = fetchurl {
-
url = "http://xkbcommon.org/download/${name}.tar.xz";
-
sha256 = "1n5rv5n210kjnkyrvbh04gfwaa7zrmzy1393p8nyqfw66lkxr918";
+
url = "https://xkbcommon.org/download/${name}.tar.xz";
+
sha256 = "0vgy84vfbig5bqznr137h5arjidnfwrxrdli0pxyn2jfn1fjcag8";
};
-
outputs = [ "out" "dev" ];
+
outputs = [ "out" "dev" "doc" ];
-
nativeBuildInputs = [ pkgconfig ];
-
buildInputs = [ yacc flex xkeyboard_config libxcb ];
+
nativeBuildInputs = [ meson ninja pkgconfig yacc doxygen ];
+
buildInputs = [ xkeyboard_config libxcb ];
-
configureFlags = [
-
"--with-xkb-config-root=${xkeyboard_config}/etc/X11/xkb"
-
"--with-x-locale-root=${libX11.out}/share/X11/locale"
+
patches = [
+
# darwin compatibility
+
(fetchpatch {
+
url = https://github.com/xkbcommon/libxkbcommon/commit/edb1c662394578a54b7bbed231d918925e5d8150.patch;
+
sha256 = "0ydjlir32r3xfsbqhnsx1bz6ags2m908yhf9i09i1s7sgcimbcx5";
+
})
];
-
preBuild = stdenv.lib.optionalString stdenv.isDarwin ''
-
sed -i 's/,--version-script=.*$//' Makefile
-
'';
+
mesonFlags = [
+
"-Denable-wayland=false"
+
"-Dxkb-config-root=${xkeyboard_config}/etc/X11/xkb"
+
"-Dx-locale-root=${libX11.out}/share/X11/locale"
+
];
meta = with stdenv.lib; {
description = "A library to handle keyboard descriptions";
-
homepage = http://xkbcommon.org;
+
homepage = https://xkbcommon.org;
license = licenses.mit;
maintainers = with maintainers; [ garbas ttuegel ];
platforms = with platforms; unix;
+2 -2
pkgs/development/libraries/mesa/default.nix
···
in
let
-
version = "17.3.3";
+
version = "17.3.6";
branch = head (splitString "." version);
driverLink = "/run/opengl-driver" + optionalString stdenv.isi686 "-32";
in
···
"ftp://ftp.freedesktop.org/pub/mesa/older-versions/${branch}.x/${version}/mesa-${version}.tar.xz"
"https://mesa.freedesktop.org/archive/mesa-${version}.tar.xz"
];
-
sha256 = "16rpm4rwmzd4kdgipa1gw262jqg3346gih0y3bsc3bgn1vgcbfj1";
+
sha256 = "e5915680d44ac9d05defdec529db7459ac9edd441c9845266eff2e2d3e57fbf8";
};
prePatch = "patchShebangs .";
+5 -9
pkgs/development/libraries/ncurses/default.nix
···
}:
stdenv.mkDerivation rec {
-
version = "6.0-20171125";
+
version = "6.1";
name = "ncurses-${version}" + lib.optionalString (abiVersion == "5") "-abi5-compat";
src = fetchurl {
-
urls = [
-
# Remove this mirror on next upgrade, it's only needed because upstream took ncurses-6.0-20171125.tgz down!
-
"http://bld1.alpinelinux.org/distfiles/v3.5/ncurses-${version}.tgz"
-
-
"ftp://ftp.invisible-island.net/ncurses/current/ncurses-${version}.tgz"
-
"https://invisible-mirror.net/archives/ncurses/current/ncurses-${version}.tgz"
-
];
-
sha256 = "11adzj0k82nlgpfrflabvqn2m7fmhp2y6pd7ivmapynxqb9vvb92";
+
url = "mirror://gnu/ncurses/ncurses-${version}.tar.gz";
+
sha256 = "05qdmbmrrn88ii9f66rkcmcyzp1kb1ymkx7g040lfkd1nkp7w1da";
};
patches = lib.optional (!stdenv.cc.isClang) ./clang.patch;
···
moveToOutput "bin/tic" "$out"
moveToOutput "bin/tput" "$out"
moveToOutput "bin/tset" "$out"
+
moveToOutput "bin/captoinfo" "$out"
+
moveToOutput "bin/infotocap" "$out"
'';
preFixup = lib.optionalString (!hostPlatform.isCygwin) ''
+2 -2
pkgs/development/libraries/newt/default.nix
···
{ fetchurl, stdenv, slang, popt }:
stdenv.mkDerivation rec {
-
name = "newt-0.52.15";
+
name = "newt-0.52.20";
src = fetchurl {
url = "https://fedorahosted.org/releases/n/e/newt/${name}.tar.gz";
-
sha256 = "0hg2l0siriq6qrz6mmzr6l7rpl40ay56c8cak87rb2ks7s952qbs";
+
sha256 = "1g3dpfnvaw7vljbr7nzq1rl88d6r8cmrvvng9inphgzwxxmvlrld";
};
patchPhase = ''
+2 -2
pkgs/development/libraries/nspr/default.nix
···
{ stdenv, fetchurl
, CoreServices ? null }:
-
let version = "4.17"; in
+
let version = "4.18"; in
stdenv.mkDerivation {
name = "nspr-${version}";
src = fetchurl {
url = "mirror://mozilla/nspr/releases/v${version}/src/nspr-${version}.tar.gz";
-
sha256 = "158hdn285dsb5rys8wl1wi32dd1axwhqq0r8fwny4aj157m0l2jr";
+
sha256 = "0d7vr3wrgp73qbywrvdkikk8vq1s1n9vhf62db80g1zqkg05g5mq";
};
outputs = [ "out" "dev" ];
+2 -2
pkgs/development/libraries/p11-kit/default.nix
···
stdenv.mkDerivation rec {
name = "p11-kit-${version}";
-
version = "0.23.9";
+
version = "0.23.10";
src = fetchFromGitHub {
owner = "p11-glue";
repo = "p11-kit";
rev = version;
-
sha256 = "0lyv6m2jflvs23m0i6l64d470p5a315lz6vs4bflsqv8i1zrrcsh";
+
sha256 = "0n0wqv028flzvnxllqv8i6x9nv705csl7ddzi0fzvppc9fp2yinp";
};
outputs = [ "out" "dev"];
+2 -2
pkgs/development/libraries/pixman/default.nix
···
-
{ stdenv, fetchurl, fetchpatch, autoconf, automake, libtool, pkgconfig, libpng, glib /*just passthru*/ }:
+
{ stdenv, fetchurl, fetchpatch, autoconf, automake, libtool, autoreconfHook, pkgconfig, libpng, glib /*just passthru*/ }:
stdenv.mkDerivation rec {
name = "pixman-${version}";
···
];
nativeBuildInputs = [ pkgconfig ]
-
++ stdenv.lib.optionals stdenv.cc.isClang [ autoconf automake libtool ];
+
++ stdenv.lib.optionals stdenv.cc.isClang [ autoconf automake libtool autoreconfHook ];
buildInputs = stdenv.lib.optional doCheck libpng;
+13 -32
pkgs/development/libraries/poppler/default.nix
···
-
{ stdenv, lib, fetchurl, fetchpatch, pkgconfig, libiconv, libintlOrEmpty
+
{ stdenv, lib, fetchurl, cmake, ninja, pkgconfig, libiconv, libintlOrEmpty
, zlib, curl, cairo, freetype, fontconfig, lcms, libjpeg, openjpeg
, withData ? true, poppler_data
-
, qt4Support ? false, qt4 ? null
, qt5Support ? false, qtbase ? null
, introspectionSupport ? false, gobjectIntrospection ? null
, utils ? false
, minimal ? false, suffix ? "glib"
-
, hostPlatform
}:
let # beware: updates often break cups-filters build
-
version = "0.56.0";
-
sha256 = "0wviayidfv2ix2ql0d4nl9r1ia6qi5kc1nybd9vjx27dk7gvm7c6";
+
version = "0.62.0";
+
mkFlag = optset: flag: "-DENABLE_${flag}=${if optset then "on" else "off"}";
in
stdenv.mkDerivation rec {
name = "poppler-${suffix}-${version}";
src = fetchurl {
url = "${meta.homepage}/poppler-${version}.tar.xz";
-
inherit sha256;
+
sha256 = "1ii9ly1pngyvs0aiq2wxpya08hidpl54y7nsb8b1vxnnskgp76jv";
};
outputs = [ "out" "dev" ];
···
propagatedBuildInputs = with lib;
[ zlib freetype fontconfig libjpeg openjpeg ]
++ optionals (!minimal) [ cairo lcms curl ]
-
++ optional qt4Support qt4
++ optional qt5Support qtbase
++ optional introspectionSupport gobjectIntrospection;
-
nativeBuildInputs = [ pkgconfig ];
+
nativeBuildInputs = [ cmake ninja pkgconfig ];
-
NIX_CFLAGS_COMPILE = [ "-DQT_NO_DEBUG" ];
-
-
CXXFLAGS = lib.optional qt5Support "-std=c++11";
-
-
configureFlags = with lib;
-
[
-
"--enable-xpdf-headers"
-
"--enable-libcurl"
-
"--enable-zlib"
-
"--enable-build-type=release"
-
]
-
++ optionals minimal [
-
"--disable-poppler-glib" "--disable-poppler-cpp"
-
"--disable-libcurl"
-
]
-
++ optional (!utils) "--disable-utils"
-
++ optional introspectionSupport "--enable-introspection";
-
-
enableParallelBuilding = true;
-
-
crossAttrs.postPatch =
-
# there are tests using `strXXX_s` functions that are missing apparently
-
stdenv.lib.optionalString (hostPlatform.libc or null == "msvcrt")
-
"sed '/^SUBDIRS =/s/ test / /' -i Makefile.in";
+
cmakeFlags = [
+
(mkFlag true "XPDF_HEADERS")
+
(mkFlag (!minimal) "GLIB")
+
(mkFlag (!minimal) "CPP")
+
(mkFlag (!minimal) "LIBCURL")
+
(mkFlag utils "UTILS")
+
(mkFlag qt5Support "QT5")
+
];
meta = with lib; {
homepage = https://poppler.freedesktop.org/;
+44
pkgs/development/libraries/poppler/qt4.nix
···
+
# TODO: get rid of this (https://github.com/NixOS/nixpkgs/issues/32883)
+
{ stdenv, lib, fetchurl, cmake, ninja, pkgconfig, libiconv, libintlOrEmpty
+
, zlib, curl, cairo, freetype, fontconfig, lcms2, libjpeg, openjpeg
+
, poppler_data, qt4
+
}:
+
+
let
+
# Last version supporting QT4
+
version = "0.61.1";
+
in
+
stdenv.mkDerivation rec {
+
name = "poppler-qt4-${version}";
+
+
src = fetchurl {
+
url = "${meta.homepage}/poppler-${version}.tar.xz";
+
sha256 = "1afdrxxkaivvviazxkg5blsf2x24sjkfj92ib0d3q5pm8dihjrhj";
+
};
+
+
outputs = [ "out" "dev" ];
+
+
buildInputs = [ libiconv poppler_data ] ++ libintlOrEmpty;
+
+
propagatedBuildInputs = [ zlib freetype fontconfig libjpeg openjpeg cairo lcms2 curl qt4 ];
+
+
nativeBuildInputs = [ cmake ninja pkgconfig ];
+
+
cmakeFlags = [
+
"-DENABLE_XPDF_HEADERS=on"
+
"-DENABLE_UTILS=off"
+
];
+
+
meta = with lib; {
+
homepage = https://poppler.freedesktop.org/;
+
description = "A PDF rendering library";
+
+
longDescription = ''
+
Poppler is a PDF rendering library based on the xpdf-3.0 code base.
+
'';
+
+
license = licenses.gpl2;
+
platforms = platforms.all;
+
maintainers = with maintainers; [ ttuegel ];
+
};
+
}
+2 -2
pkgs/development/libraries/protobuf/3.4.nix
···
{ callPackage, lib, ... }:
lib.overrideDerivation (callPackage ./generic-v3.nix {
-
version = "3.4.0";
-
sha256 = "0385j54kgr71h0cxh5vqr81qs57ack2g2k9mcdbq188v4ckjacyx";
+
version = "3.4.1";
+
sha256 = "1lzxmbqlnmi34kymnf399azv86gmdbrf71xiad6wc24bzpkzqybb";
}) (attrs: { NIX_CFLAGS_COMPILE = "-Wno-error"; })
+6
pkgs/development/libraries/protobuf/3.5.nix
···
+
{ callPackage, lib, ... }:
+
+
lib.overrideDerivation (callPackage ./generic-v3.nix {
+
version = "3.5.1.1";
+
sha256 = "1h4xydr5j2zg1888ncn8a1jvqq8fgpgckrmjg6lqzy9jpkvqvfdk";
+
}) (attrs: { NIX_CFLAGS_COMPILE = "-Wno-error"; })
+3 -1
pkgs/development/libraries/qt-5/5.10/default.nix
···
srcs = import ./srcs.nix { inherit fetchurl; inherit mirror; };
patches = {
-
qtbase = [ ./qtbase.patch ] ++ optional stdenv.isDarwin ./qtbase-darwin.patch;
+
qtbase = [ ./qtbase.patch ] ++
+
optionals stdenv.isDarwin [ ./qtbase-darwin.patch
+
./restore-pc-files.patch ];
qtdeclarative = [ ./qtdeclarative.patch ];
qtscript = [ ./qtscript.patch ];
qtserialport = [ ./qtserialport.patch ];
+27
pkgs/development/libraries/qt-5/5.10/restore-pc-files.patch
···
+
diff --git a/mkspecs/features/qt_module.prf b/mkspecs/features/qt_module.prf
+
index e6a0d97f1a..b50ce77d51 100644
+
--- a/mkspecs/features/qt_module.prf
+
+++ b/mkspecs/features/qt_module.prf
+
@@ -266,7 +266,7 @@ load(qt_installs)
+
load(qt_targets)
+
+
# this builds on top of qt_common
+
-!internal_module:!lib_bundle:if(unix|mingw) {
+
+!internal_module:if(unix|mingw) {
+
CONFIG += create_pc
+
QMAKE_PKGCONFIG_DESTDIR = pkgconfig
+
host_build: \
+
diff --git a/mkspecs/features/qt_module_headers.prf b/mkspecs/features/qt_module_headers.prf
+
index 62b88c6fe2..f302f1e202 100644
+
--- a/mkspecs/features/qt_module_headers.prf
+
+++ b/mkspecs/features/qt_module_headers.prf
+
@@ -102,8 +102,7 @@ git_build: \
+
else: \
+
INC_PATH = $$MODULE_BASE_INDIR
+
include($$INC_PATH/include/$$MODULE_INCNAME/headers.pri, "", true)
+
-!lib_bundle: \ # Headers are embedded into the bundle, so don't install them separately.
+
- CONFIG += qt_install_headers
+
+CONFIG += qt_install_headers
+
+
alien_syncqt: return()
+
+5 -3
pkgs/development/libraries/sqlite/default.nix
···
assert interactive -> readline != null && ncurses != null;
stdenv.mkDerivation {
-
name = "sqlite-3.21.0";
+
name = "sqlite-3.22.0";
src = fetchurl {
-
url = "http://sqlite.org/2017/sqlite-autoconf-3210000.tar.gz";
-
sha256 = "1qxvzdjwzw6k0kqjfabj86rnq87xdbwbca7laxxdhnh0fmkm3pfp";
+
url = "http://sqlite.org/2018/sqlite-autoconf-3220000.tar.gz";
+
sha256 = "04n6hnw2g818d7r92cp2608kd5mhzyysy83k29kbq1mp709an918";
};
outputs = [ "bin" "dev" "out" ];
···
"-DSQLITE_ENABLE_UNLOCK_NOTIFY"
"-DSQLITE_SOUNDEX"
"-DSQLITE_SECURE_DELETE"
+
"-DSQLITE_MAX_VARIABLE_NUMBER=250000"
+
"-DSQLITE_MAX_EXPR_DEPTH=10000"
];
# Test for features which may not be available at compile time
+3 -3
pkgs/development/libraries/sqlite/sqlite3_analyzer.nix
···
{ lib, stdenv, fetchurl, unzip, tcl }:
stdenv.mkDerivation {
-
name = "sqlite3_analyzer-3.20.1";
+
name = "sqlite3_analyzer-3.22.0";
src = fetchurl {
-
url = "https://www.sqlite.org/2017/sqlite-src-3200100.zip";
-
sha256 = "0aicmapa99141hjncyxwg66ndhr16nwpbqy27x79fg1ikzhwlnv6";
+
url = "https://www.sqlite.org/2018/sqlite-src-3220000.zip";
+
sha256 = "04w97jj1659vl84rr73wg1mhj6by8r5075rzpn2xp42n537a7ibv";
};
nativeBuildInputs = [ unzip ];
+1 -1
pkgs/development/libraries/vaapi-intel/default.nix
···
owner = "01org";
repo = "libva-intel-driver";
rev = version;
-
sha256 = "1832nnva3d33wv52bj59bv62q7a807sdxjqqq0my7l9x7a4qdkzz";
+
sha256 = "15ag4al9h6b8f8sw1zpighyhsmr5qfqp1882q7r3gsh5g4cnj763";
};
patchPhase = ''
+2 -2
pkgs/development/libraries/wayland/protocols.nix
···
stdenv.mkDerivation rec {
name = "wayland-protocols-${version}";
-
version = "1.11";
+
version = "1.13";
src = fetchurl {
url = "http://wayland.freedesktop.org/releases/${name}.tar.xz";
-
sha256 = "0138psvx6fv8z5x2p6xi4iij6m5k62c0qyfsb45xgcf5a4fyxz1s";
+
sha256 = "0f4gqvmz53q9d8h0ilhf4z773nb4vskzx11a3d1jycym120bqn07";
};
nativeBuildInputs = [ pkgconfig ];
+11 -6
pkgs/development/libraries/zziplib/default.nix
···
-
{ fetchurl, stdenv, perl, python2, zip, xmlto, zlib }:
+
{ docbook_xml_dtd_412, fetchurl, stdenv, perl, python2, zip, xmlto, zlib }:
stdenv.mkDerivation rec {
name = "zziplib-${version}";
-
version = "0.13.67";
+
version = "0.13.68";
src = fetchurl {
url = "https://github.com/gdraheim/zziplib/archive/v${version}.tar.gz";
-
sha256 = "0802kdxwxx9zanpwb4w4wfi3blwhv0ri05mzdgd35j5sva5ify0j";
+
sha256 = "0chhl6m02562z6c4hjy568mh11pbq2qngw6g2x924ajr8sdr2q4l";
};
-
patchPhase = ''
+
postPatch = ''
sed -i -e s,--export-dynamic,, configure
'';
-
buildInputs = [ perl python2 zip xmlto zlib ];
+
# TODO: still an issue: https://github.com/gdraheim/zziplib/issues/27
-
doCheck = true;
+
buildInputs = [ docbook_xml_dtd_412 perl python2 zip xmlto zlib ];
+
+
# tests are broken (https://github.com/gdraheim/zziplib/issues/20),
+
# and test/zziptests.py requires network access
+
# (https://github.com/gdraheim/zziplib/issues/24)
+
doCheck = false;
meta = with stdenv.lib; {
description = "Library to extract data from files archived in a zip file";
+1 -1
pkgs/development/perl-modules/generic/builder.sh
···
fi
done
-
perl Makefile.PL PREFIX=$out INSTALLDIRS=site $makeMakerFlags
+
perl Makefile.PL PREFIX=$out INSTALLDIRS=site $makeMakerFlags PERL=$(type -P perl) FULLPERL=$perl/bin/perl
}
+3 -2
pkgs/development/perl-modules/generic/default.nix
···
perl:
-
{ buildInputs ? [], name, ... } @ attrs:
+
{ nativeBuildInputs ? [], name, ... } @ attrs:
perl.stdenv.mkDerivation (
{
···
{
name = "perl-" + name;
builder = ./builder.sh;
-
buildInputs = buildInputs ++ [ perl ];
+
nativeBuildInputs = nativeBuildInputs ++ [ (perl.dev or perl) ];
+
inherit perl;
}
)
+2 -4
pkgs/development/python-modules/MechanicalSoup/default.nix
···
, pytestrunner, requests-mock, pytestcov, pytest
}:
-
buildPythonPackage rec {
-
name = "${pname}-${version}";
pname = "MechanicalSoup";
-
version = "0.9.0.post4";
+
version = "0.10.0";
src = fetchPypi {
inherit pname version;
-
sha256 = "ce8f822afbc9bef1499be417e8d5deecd0cd32606420165700e89477955f03ab";
+
sha256 = "22423efd025c3eedb06f41d3ff1127174a59f40dc560e82dce143956976195bf";
};
checkInputs = [ pytest pytestrunner requests-mock pytestcov ];
+2 -3
pkgs/development/python-modules/absl-py/default.nix
···
buildPythonPackage rec {
pname = "absl-py";
-
version = "0.1.9";
-
name = "${pname}-${version}";
+
version = "0.1.10";
src = fetchPypi {
inherit pname version;
-
sha256 = "1c787e3bc7ef8fea7a8a79cf36b0c550b4bd66e13c05d1352fbc5786488befb0";
+
sha256 = "908eba9a96a37c10f10074aba57d685070b814906b02a1ea2cf54bb10a6b8c74";
};
propagatedBuildInputs = [ six ];
+6 -2
pkgs/development/python-modules/affinity/default.nix
···
-
{ lib, buildPythonPackage, fetchPypi }:
+
{ lib, buildPythonPackage, fetchPypi, isPy3k }:
buildPythonPackage rec {
-
name = "${pname}-${version}";
pname = "affinity";
version = "0.1.0";
+
+
# syntax error
+
disabled = isPy3k;
+
src = fetchPypi {
inherit pname version;
sha256 = "1i6j7kszvnzh5vh9k48cqwx2kzf73a6abgv9s6bf0j2zmfjl2wb6";
};
+
meta = {
description = "control processor affinity on windows and linux";
homepage = http://cheeseshop.python.org/pypi/affinity;
+26
pkgs/development/python-modules/aiohttp-jinja2/default.nix
···
+
{ lib, stdenv, buildPythonPackage, fetchPypi, aiohttp, jinja2, pytest, pytest-aiohttp }:
+
+
buildPythonPackage rec {
+
pname = "aiohttp-jinja2";
+
version = "0.16.0";
+
+
src = fetchPypi {
+
inherit pname version;
+
sha256 = "1ps182yrc5g9ph55927a7ssqx6m9kx0bivfxpaj8sa3znrdkl94d";
+
};
+
+
propagatedBuildInputs = [ aiohttp jinja2 ];
+
+
checkInputs = [ pytest pytest-aiohttp ];
+
+
checkPhase = ''
+
py.test
+
'';
+
+
meta = with lib; {
+
description = "Jinja2 support for aiohttp";
+
homepage = https://github.com/aio-libs/aiohttp_jinja2;
+
license = licenses.asl20;
+
maintainers = with maintainers; [ peterhoeg ];
+
};
+
}
+2 -2
pkgs/development/python-modules/aniso8601/default.nix
···
buildPythonPackage rec {
pname = "aniso8601";
-
version = "2.0.0";
+
version = "2.0.1";
name = "${pname}-${version}";
meta = with stdenv.lib; {
···
src = fetchPypi {
inherit pname version;
-
sha256 = "085786415d3550e89785ffbedaa9bb37d41de0707a1268bdbba11249064b71d1";
+
sha256 = "b7215a41e5194a829dc87d1ea5039315be85a6158ba15c8157a284c29fa6808b";
};
}
+6 -7
pkgs/development/python-modules/apsw/default.nix
···
-
{ stdenv, buildPythonPackage, fetchurl
+
{ stdenv, buildPythonPackage, fetchPypi
, sqlite, isPyPy }:
buildPythonPackage rec {
pname = "apsw";
-
version = "3.7.6.2-r1";
-
name = "${pname}-${version}";
+
version = "3.9.2-r1";
disabled = isPyPy;
-
src = fetchurl {
-
url = "http://apsw.googlecode.com/files/${name}.zip";
-
sha256 = "cb121b2bce052609570a2f6def914c0aa526ede07b7096dddb78624d77f013eb";
+
src = fetchPypi {
+
inherit pname version;
+
sha256 = "dab96fd164dde9e59f7f27228291498217fa0e74048e2c08c7059d7e39589270";
};
buildInputs = [ sqlite ];
# python: double free or corruption (fasttop): 0x0000000002fd4660 ***
-
doCheck = false;
+
# doCheck = false;
meta = with stdenv.lib; {
description = "A Python wrapper for the SQLite embedded relational database engine";
+14 -6
pkgs/development/python-modules/asgiref/default.nix
···
-
{ stdenv, buildPythonPackage, fetchurl, six, async-timeout }:
+
{ stdenv, buildPythonPackage, fetchFromGitHub, async-timeout, pytest, pytest-asyncio }:
buildPythonPackage rec {
version = "2.2.0";
pname = "asgiref";
-
name = "${pname}-${version}";
-
src = fetchurl {
-
url = "mirror://pypi/a/asgiref/${name}.tar.gz";
-
sha256 = "1fmrd749hqxwicnivvgrcw812gbj2zm49zcnkghh9yxbkjfcvxcv";
+
# PyPI tarball doesn't include tests directory
+
src = fetchFromGitHub {
+
owner = "django";
+
repo = pname;
+
rev = version;
+
sha256 = "0jsdkgwzswm1jbfm6d100yfvfzpic8v6ysydcnn798bbpwclj8ip";
};
-
propagatedBuildInputs = [ six async-timeout ];
+
propagatedBuildInputs = [ async-timeout ];
+
+
checkInputs = [ pytest pytest-asyncio ];
+
+
checkPhase = ''
+
py.test
+
'';
meta = with stdenv.lib; {
description = "Reference ASGI adapters and channel layers";
+7 -5
pkgs/development/python-modules/astral/default.nix
···
-
{ stdenv, buildPythonPackage, fetchPypi, pytz, pytest }:
+
{ stdenv, buildPythonPackage, fetchPypi, pytz, requests, pytest }:
buildPythonPackage rec {
pname = "astral";
-
version = "1.5";
+
version = "1.6";
src = fetchPypi {
inherit pname version;
-
sha256 = "527628fbfe90c1596c3950ff84ebd07ecc10c8fb1044c903a0519b5057700cb6";
+
sha256 = "874b397ddbf0a4c1d8d644b21c2481e8a96b61343f820ad52d8a322d61a15083";
};
-
propagatedBuildInputs = [ pytz ];
+
propagatedBuildInputs = [ pytz requests ];
checkInputs = [ pytest ];
checkPhase = ''
-
py.test -k "not test_GoogleLocator"
+
# https://github.com/sffjunkie/astral/pull/13
+
touch src/test/.api_key
+
py.test -m "not webtest"
'';
meta = with stdenv.lib; {
+2 -2
pkgs/development/python-modules/asynctest/default.nix
···
buildPythonPackage rec {
pname = "asynctest";
-
version = "0.11.1";
+
version = "0.12.0";
disabled = pythonOlder "3.4";
···
owner = "Martiusweb";
repo = pname;
rev = "v${version}";
-
sha256 = "1vvh5vbq2fbz6426figs85z8779r7svb4dp2v3xynhhv05nh2y6v";
+
sha256 = "0rcb3kz2m0iwvgxpx2avfz9cqsd9xbaq93zykr2fki3ikmnp3vyg";
};
postPatch = ''
+2 -2
pkgs/development/python-modules/behave/default.nix
···
}:
buildPythonApplication rec {
pname = "behave";
-
version = "1.2.5";
+
version = "1.2.6";
name = "${pname}-${version}";
disabled = pythonAtLeast "3.6";
src = fetchPypi {
inherit pname version;
-
sha256 = "81b731ac5187e31e4aad2594944fa914943683a9818320846d037c5ebd6d5d0b";
+
sha256 = "b9662327aa53294c1351b0a9c369093ccec1d21026f050c3bd9b3e5cccf81a86";
};
checkInputs = [ mock nose pyhamcrest ];
+18 -7
pkgs/development/python-modules/bibtexparser/default.nix
···
{ lib
, buildPythonPackage
-
, fetchPypi
+
, fetchFromGitHub
+
, pyparsing
+
, future
+
, nose
+
, glibcLocales
}:
buildPythonPackage rec {
pname = "bibtexparser";
version = "1.0.1";
-
name = "${pname}-${version}";
-
src = fetchPypi {
-
inherit pname version;
-
sha256 = "cc41cdd8332c2bf44b97daf1f135f4f267c3b744c33976655cd270b66f964c0a";
+
# PyPI tarball does not ship tests
+
src = fetchFromGitHub {
+
owner = "sciunto-org";
+
repo = "python-${pname}";
+
rev = "v${version}";
+
sha256 = "0lmlarkfbq2hp1wa04a62245jr2mqizqsdlgilj5aq6vy92gr6ai";
};
-
# No tests in archive
-
doCheck = false;
+
propagatedBuildInputs = [ pyparsing future ];
+
+
checkInputs = [ nose glibcLocales ];
+
+
checkPhase = ''
+
LC_ALL="en_US.UTF-8" nosetests
+
'';
meta = {
description = "Bibtex parser for python 2.7 and 3.3 and newer";
+27
pkgs/development/python-modules/binaryornot/default.nix
···
+
{ lib, buildPythonPackage, fetchPypi, chardet, hypothesis }:
+
+
buildPythonPackage rec {
+
pname = "binaryornot";
+
version = "0.4.4";
+
+
src = fetchPypi {
+
inherit pname version;
+
sha256 = "359501dfc9d40632edc9fac890e19542db1a287bbcfa58175b66658392018061";
+
};
+
+
prePatch = ''
+
# See https://github.com/audreyr/binaryornot/issues/40
+
substituteInPlace tests/test_check.py \
+
--replace "average_size=512" "average_size=128"
+
'';
+
+
propagatedBuildInputs = [ chardet ];
+
+
checkInputs = [ hypothesis ];
+
+
meta = with lib; {
+
homepage = https://github.com/audreyr/binaryornot;
+
description = "Ultra-lightweight pure Python package to check if a file is binary or text";
+
license = licenses.bsd3;
+
};
+
}
+6 -4
pkgs/development/python-modules/blaze/default.nix
···
{ lib
, buildPythonPackage
-
, fetchurl
+
, fetchFromGitHub
, pytest
, contextlib2
, cytoolz
···
pname = "blaze";
version = "0.11.3";
-
src = fetchurl {
-
url = "https://github.com/blaze/blaze/archive/${version}.tar.gz";
-
sha256 = "075gqc9d7g284z4nfwv5zbq99ln22w25l4lcndjg3v10kmsjadww";
+
src = fetchFromGitHub {
+
owner = pname;
+
repo = pname;
+
rev = version;
+
sha256 = "0w916k125058p40cf7i090f75pgv3cqdb8vwjzqhb9r482fa6717";
};
checkInputs = [ pytest ];
+31
pkgs/development/python-modules/blinkstick/default.nix
···
+
{ lib, buildPythonPackage, fetchPypi, fetchpatch, pyusb }:
+
+
buildPythonPackage rec {
+
pname = "BlinkStick";
+
version = "1.1.8";
+
+
src = fetchPypi {
+
inherit pname version;
+
sha256 = "3edf4b83a3fa1a7bd953b452b76542d54285ff6f1145b6e19f9b5438120fa408";
+
};
+
+
patches = [
+
(fetchpatch {
+
url = https://github.com/arvydas/blinkstick-python/commit/a9227d0.patch;
+
sha256 = "1mcmxlnkbfxwp84qz32l5rlc7r9anh9yhnqaj1y8rny5s13jb01f";
+
})
+
(fetchpatch {
+
url = https://github.com/arvydas/blinkstick-python/pull/54.patch;
+
sha256 = "1gjq6xbai794bbdyrv82i96l1a7qkwvlhzd6sa937dy5ivv6s6hl";
+
})
+
];
+
+
propagatedBuildInputs = [ pyusb ];
+
+
meta = with lib; {
+
description = "Python package to control BlinkStick USB devices";
+
homepage = https://pypi.python.org/pypi/BlinkStick/;
+
license = licenses.bsd3;
+
maintainers = with maintainers; [ np ];
+
};
+
}
+2 -2
pkgs/development/python-modules/bootstrapped-pip/default.nix
···
};
setuptools_source = fetchPypi {
pname = "setuptools";
-
version = "38.4.0";
+
version = "38.4.1";
format = "wheel";
-
sha256 = "155c2ec9fdcc00c3973d966b416e1cf3a1e7ce75f4c09fb760b23f94b935926e";
+
sha256 = "22f8bcff5ce7fd1867785701769eaba42b79331d0abf890974a9288787dc015b";
};
# TODO: Shouldn't be necessary anymore for pip > 9.0.1!
+2 -2
pkgs/development/python-modules/boto3/default.nix
···
buildPythonPackage rec {
pname = "boto3";
-
version = "1.4.8";
+
version = "1.6.0";
src = fetchFromGitHub {
owner = "boto";
repo = "boto3";
rev = version;
-
sha256 = "11ysd7a9l5y98q7b7az56phsj2m7w90abf4jabwrknp2c43sq9bi";
+
sha256 = "14d60wc5kff2gjkrm0yfz0179s0qg3f1qqldv8hnf37ny6yvfwn3";
};
propagatedBuildInputs = [ botocore jmespath s3transfer ] ++ lib.optionals (!isPy3k) [ futures ];
+2 -2
pkgs/development/python-modules/botocore/default.nix
···
buildPythonPackage rec {
name = "${pname}-${version}";
pname = "botocore";
-
version = "1.8.45";
+
version = "1.9.3";
src = fetchPypi {
inherit pname version;
-
sha256 = "8f91b648a216dc945783d1539c013fc08a9e65ecc4fc5aae017bdd5961fd3468";
+
sha256 = "d5b892ab86cd3e8d6cb570dd5275bf1c600cbbf9f07a40a22bcdd9023c0e844f";
};
propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/buildout-nix/default.nix
···
buildPythonPackage rec {
pname = "zc.buildout";
-
version = "2.11.0";
+
version = "2.11.1";
name = "${pname}-nix-${version}";
src = fetchurl {
url = "mirror://pypi/${builtins.substring 0 1 pname}/${pname}/${pname}-${version}.tar.gz";
-
sha256 = "092b0a147d5fb4e79ee0afde665570f85738e714463854f9e4f7f38d0b27ea82";
+
sha256 = "08017dcd8f4b60b48b7d830da835a9350c07e7f383fa56d45925ab5144400281";
};
patches = [ ./nix.patch ];
+16 -7
pkgs/development/python-modules/cached-property/default.nix
···
{ lib
, buildPythonPackage
-
, fetchPypi
+
, fetchFromGitHub
+
, pytest
, freezegun
}:
buildPythonPackage rec {
pname = "cached-property";
-
version = "1.3.1";
+
version = "1.4.0";
-
src = fetchPypi {
-
inherit pname version;
-
sha256 = "6562f0be134957547421dda11640e8cadfa7c23238fc4e0821ab69efdb1095f3";
+
# conftest.py is missing in PyPI tarball
+
# https://github.com/pydanny/cached-property/pull/87
+
src = fetchFromGitHub {
+
owner = "pydanny";
+
repo = pname;
+
rev = version;
+
sha256 = "0w7709grs4yqhfbnn7lva2fgyphvh43xcfqhi95lhh8sjad3xwkw";
};
-
checkInputs = [ freezegun ];
+
checkInputs = [ pytest freezegun ];
+
+
checkPhase = ''
+
py.test
+
'';
meta = {
description = "A decorator for caching properties in classes";
···
platforms = lib.platforms.unix;
maintainers = with lib.maintainers; [ ericsagnes ];
};
-
}
+
}
+2 -2
pkgs/development/python-modules/cachetools/1.nix
···
buildPythonPackage rec {
name = "${pname}-${version}";
pname = "cachetools";
-
version = "1.1.3";
+
version = "2.0.1";
disabled = isPyPy; # a test fails
src = fetchPypi {
inherit pname version;
-
sha256 = "0js7qx5pa8ibr8487lcf0x3a7w0xml0wa17snd6hjs0857kqhn20";
+
sha256 = "ede01f2d3cbd6ddc9e35e16c2b0ce011d8bb70ce0dbaf282f5b4df24b213bc5d";
};
meta = with stdenv.lib; {
+2 -2
pkgs/development/python-modules/can/default.nix
···
buildPythonPackage rec {
pname = "python-can";
-
version = "2.0.0";
+
version = "2.1.0";
src = fetchPypi {
inherit pname version;
-
sha256 = "1c6zfd29ck9ffdklfb5xgxvfl52xdaqd89isykkypm1ll97yk2fs";
+
sha256 = "4a5c01dd67feeda35f88e6c12ea14ac8cabd426b9be0cc5f9fd083fe90a9dbfc";
};
propagatedBuildInputs = [ pyserial ];
+2 -2
pkgs/development/python-modules/cffi/default.nix
···
if isPyPy then null else buildPythonPackage rec {
pname = "cffi";
-
version = "1.11.4";
+
version = "1.11.5";
name = "${pname}-${version}";
src = fetchPypi {
inherit pname version;
-
sha256 = "df9083a992b17a28cd4251a3f5c879e0198bb26c9e808c4647e0a18739f1d11d";
+
sha256 = "e90f17980e6ab0f3c2f3730e56d1fe9bcba1891eeea58966e89d352492cc74f4";
};
outputs = [ "out" "dev" ];
+2 -2
pkgs/development/python-modules/chainer/default.nix
···
buildPythonPackage rec {
pname = "chainer";
-
version = "3.3.0";
+
version = "3.4.0";
src = fetchPypi {
inherit pname version;
-
sha256 = "0669375e5b09d687781a37d6c025ee0a6015f575b4d2c70a2ad09c33b8228f86";
+
sha256 = "b7bcd8fc1a39b3602b4a78a0be6012721ba6c8792c4d14773496a4c6d038f886";
};
checkInputs = [
+6 -4
pkgs/development/python-modules/codecov/default.nix
···
buildPythonPackage rec {
pname = "codecov";
-
version = "2.0.9";
-
name = "${pname}-${version}";
+
version = "2.0.15";
src = fetchPypi {
inherit pname version;
-
sha256 = "037h4dcl8xshlq3rj8409p11rpgnyqrhlhfq8j34s94nm0n1h76v";
+
sha256 = "8ed8b7c6791010d359baed66f84f061bba5bd41174bf324c31311e8737602788";
};
-
buildInputs = [ unittest2 ]; # Tests only
+
checkInputs = [ unittest2 ]; # Tests only
propagatedBuildInputs = [ requests coverage ];
postPatch = ''
sed -i 's/, "argparse"//' setup.py
'';
+
+
# No tests in archive
+
doCheck = false;
meta = {
description = "Python report uploader for Codecov";
+4 -12
pkgs/development/python-modules/cram/default.nix
···
-
{stdenv, lib, buildPythonPackage, fetchPypi, coverage, bash, which, writeText}:
+
{stdenv, lib, buildPythonPackage, fetchPypi, bash, which, writeText}:
buildPythonPackage rec {
-
name = "${pname}-${version}";
version = "0.7";
pname = "cram";
-
buildInputs = [ coverage which ];
+
checkInputs = [ which ];
src = fetchPypi {
inherit pname version;
···
};
postPatch = ''
+
patchShebangs scripts/cram
substituteInPlace tests/test.t \
--replace "/bin/bash" "${bash}/bin/bash"
'';
-
# This testing is copied from Makefile. Simply using `make test` doesn't work
-
# because it uses the unpatched `scripts/cram` executable which has a bad
-
# shebang. Also, for some reason, coverage fails on one file so let's just
-
# ignore that one.
checkPhase = ''
-
# scripts/cram tests
-
#COVERAGE=${coverage}/bin/coverage $out/bin/cram tests
-
#${coverage}/bin/coverage report --fail-under=100
-
COVERAGE=coverage $out/bin/cram tests
-
coverage report --fail-under=100 --omit="*/_encoding.py,*/__main__.py"
+
scripts/cram tests
'';
meta = {
+31 -21
pkgs/development/python-modules/csvkit/default.nix
···
-
{ stdenv, fetchPypi, buildPythonPackage,
-
dateutil, dbf, xlrd, sqlalchemy, openpyxl,
-
agate-excel, agate-dbf, agate-sql, isPy3k }:
+
{ lib, fetchPypi, buildPythonPackage, isPy3k
+
, agate, agate-excel, agate-dbf, agate-sql, six
+
, argparse, ordereddict, simplejson
+
, glibcLocales, nose, mock, unittest2
+
}:
buildPythonPackage rec {
-
name = "${pname}-${version}";
-
pname = "csvkit";
-
version = "1.0.2";
+
pname = "csvkit";
+
version = "1.0.2";
-
src = fetchPypi {
-
inherit pname version;
-
sha256 = "05vfsba9nwh4islszgs18rq8sjkpzqni0cdwvvkw7pi0r63pz2as";
-
};
+
src = fetchPypi {
+
inherit pname version;
+
sha256 = "05vfsba9nwh4islszgs18rq8sjkpzqni0cdwvvkw7pi0r63pz2as";
+
};
-
propagatedBuildInputs = [ dateutil dbf xlrd sqlalchemy openpyxl
-
agate-excel agate-dbf agate-sql ];
+
propagatedBuildInputs = [
+
agate agate-excel agate-dbf agate-sql six
+
] ++ lib.optionals (!isPy3k) [
+
argparse ordereddict simplejson
+
];
-
doCheck = !isPy3k;
-
# (only) python 3 we had 9 failures and 57 errors out of a much larger
-
# number of tests.
+
checkInputs = [
+
glibcLocales nose
+
] ++ lib.optionals (!isPy3k) [
+
mock unittest2
+
];
-
meta = with stdenv.lib; {
-
description = "A library of utilities for working with CSV, the king of tabular file formats";
-
maintainers = with maintainers; [ vrthra ];
-
license = with licenses; [ mit ];
-
homepage = https://github.com/wireservice/csvkit;
-
};
+
checkPhase = ''
+
LC_ALL="en_US.UTF-8" nosetests -e test_csvsql
+
'';
+
+
meta = with lib; {
+
description = "A library of utilities for working with CSV, the king of tabular file formats";
+
maintainers = with maintainers; [ vrthra ];
+
license = with licenses; [ mit ];
+
homepage = https://github.com/wireservice/csvkit;
+
};
}
+2 -2
pkgs/development/python-modules/cupy/default.nix
···
buildPythonPackage rec {
pname = "cupy";
-
version = "2.3.0";
+
version = "2.4.0";
src = fetchPypi {
inherit pname version;
-
sha256 = "7426f6332cb01513d2a6a687792dfa17c678ff64dd1b19b04559ddd5672c833f";
+
sha256 = "96ac44dface1a73673e9c0549fc897f8fa31a7648ff9963dff799ddabd67fde2";
};
checkInputs = [
+4 -4
pkgs/development/python-modules/curtsies/default.nix
···
-
{ stdenv, buildPythonPackage, fetchPypi, blessings, mock, nose, pyte, pytest, wcwidth }:
+
{ stdenv, buildPythonPackage, fetchPypi, blessings, mock, nose, pyte, wcwidth, typing }:
buildPythonPackage rec {
pname = "curtsies";
···
sha256 = "89c802ec051d01dec6fc983e9856a3706e4ea8265d2940b1f6d504a9e26ed3a9";
};
-
propagatedBuildInputs = [ blessings wcwidth pyte ];
+
propagatedBuildInputs = [ blessings wcwidth typing ];
-
checkInputs = [ nose mock pytest ];
+
checkInputs = [ mock pyte nose ];
checkPhase = ''
-
py.test
+
nosetests tests
'';
meta = with stdenv.lib; {
+19 -7
pkgs/development/python-modules/daphne/default.nix
···
-
{ stdenv, buildPythonPackage, fetchPypi,
-
asgiref, autobahn, twisted, hypothesis
+
{ stdenv, buildPythonPackage, isPy3k, fetchFromGitHub
+
, asgiref, autobahn, twisted, pytestrunner
+
, hypothesis, pytest, pytest-asyncio
}:
buildPythonPackage rec {
pname = "daphne";
-
name = "${pname}-${version}";
version = "2.1.0";
-
src = fetchPypi {
-
inherit pname version;
-
sha256 = "13jv8jn8nf522smwpqdy4lq6cpd06fcgwvgl67i622rid51fj5gb";
+
disabled = !isPy3k;
+
+
src = fetchFromGitHub {
+
owner = "django";
+
repo = pname;
+
rev = version;
+
sha256 = "1lbpn0l796ar77amqy8dap30zxmsn6as8y2lbmp4lk8m9awscwi8";
};
-
buildInputs = [ hypothesis ];
+
nativeBuildInputs = [ pytestrunner ];
+
propagatedBuildInputs = [ asgiref autobahn twisted ];
+
+
checkInputs = [ hypothesis pytest pytest-asyncio ];
+
+
checkPhase = ''
+
# Other tests fail, seems to be due to filesystem access
+
py.test -k "test_cli or test_utils"
+
'';
meta = with stdenv.lib; {
description = "Django ASGI (HTTP/WebSocket) server";
+2 -2
pkgs/development/python-modules/dask/default.nix
···
buildPythonPackage rec {
pname = "dask";
-
version = "0.17.0";
+
version = "0.17.1";
name = "${pname}-${version}";
src = fetchPypi {
inherit pname version;
-
sha256 = "4d2b0754d16ddc3f87026c1fc4fa3b589d7604a41d3f6510268f172abc1d0a5e";
+
sha256 = "0a6aec8b3489419c97486afd46e30b63caafc642205726a884b7fe488906d359";
};
checkInputs = [ pytest ];
+6 -3
pkgs/development/python-modules/dbf/default.nix
···
-
{ stdenv, fetchPypi, buildPythonPackage, aenum, isPy3k }:
+
{ stdenv, fetchPypi, buildPythonPackage, aenum, isPy3k, pythonOlder, enum34, python }:
buildPythonPackage rec {
pname = "dbf";
version = "0.96.8";
-
name = "${pname}-${version}";
src = fetchPypi {
inherit pname version;
sha256 = "1z8n7s4cka6x9ybh4qpfhj51v2qrk38h2f06npizzhm0hmn6r3v1";
};
-
propagatedBuildInputs = [ aenum ];
+
propagatedBuildInputs = [ aenum ] ++ stdenv.lib.optional (pythonOlder "3.4") [ enum34 ];
doCheck = !isPy3k;
# tests are not yet ported.
# https://groups.google.com/forum/#!topic/python-dbase/96rx2xmCG4w
+
+
checkPhase = ''
+
${python.interpreter} dbf/test.py
+
'';
meta = with stdenv.lib; {
description = "Pure python package for reading/writing dBase, FoxPro, and Visual FoxPro .dbf files";
+21
pkgs/development/python-modules/deluge-client/default.nix
···
+
{ stdenv, buildPythonPackage, fetchPypi }:
+
+
buildPythonPackage rec {
+
pname = "deluge-client";
+
version = "1.2.0";
+
+
src = fetchPypi {
+
inherit pname version;
+
sha256 = "048zfidv08sr4hivdd3xxf1pywhqbnszj5qcn51h2f4y1588fhpf";
+
};
+
+
# it will try to connect to a running instance
+
doCheck = false;
+
+
meta = with stdenv.lib; {
+
description = "Lightweight pure-python rpc client for deluge";
+
homepage = https://github.com/JohnDoee/deluge-client;
+
license = licenses.mit;
+
maintainers = with maintainers; [ peterhoeg ];
+
};
+
}
+20
pkgs/development/python-modules/dj-database-url/default.nix
···
+
{ lib, buildPythonPackage, fetchPypi }:
+
+
buildPythonPackage rec {
+
pname = "dj-database-url";
+
version = "0.5.0";
+
+
src = fetchPypi {
+
inherit pname version;
+
sha256 = "4aeaeb1f573c74835b0686a2b46b85990571159ffc21aa57ecd4d1e1cb334163";
+
};
+
+
# Tests access a DB via network
+
doCheck = false;
+
+
meta = with lib; {
+
description = "Use Database URLs in your Django Application";
+
homepage = https://github.com/kennethreitz/dj-database-url;
+
license = licenses.bsd2;
+
};
+
}
+12 -6
pkgs/development/python-modules/django-polymorphic/default.nix
···
-
{ stdenv, buildPythonPackage, fetchPypi, django }:
+
{ stdenv, buildPythonPackage, fetchFromGitHub, python, django, dj-database-url }:
buildPythonPackage rec {
pname = "django-polymorphic";
version = "2.0.2";
-
name = "${pname}-${version}";
-
src = fetchPypi {
-
inherit pname version;
-
sha256 = "e1821d7b5874509a158a0f22bebf544330e0944c481c5a3e6da6cac8887e4e88";
+
# PyPI tarball is missing some test files
+
src = fetchFromGitHub {
+
owner = pname;
+
repo = pname;
+
rev = "v${version}";
+
sha256 = "18p84kdwpfp423vb2n38h840mj3bq0j57jx3cry7c8dznpi0vfi2";
};
-
checkInputs = [ django ];
+
checkInputs = [ dj-database-url ];
propagatedBuildInputs = [ django ];
+
+
checkPhase = ''
+
${python.interpreter} runtests.py
+
'';
meta = {
homepage = https://github.com/django-polymorphic/django-polymorphic;
+2 -2
pkgs/development/python-modules/django/2_0.nix
···
buildPythonPackage rec {
pname = "Django";
name = "${pname}-${version}";
-
version = "2.0.1";
+
version = "2.0.2";
disabled = !isPy3k;
src = fetchPypi {
inherit pname version;
-
sha256 = "0by1gswkrzxn594fa26llkzsc410999fq8s0b5d1598jwi5q0syr";
+
sha256 = "dc3b61d054f1bced64628c62025d480f655303aea9f408e5996c339a543b45f0";
};
patches = stdenv.lib.optionals withGdal [
+3 -2
pkgs/development/python-modules/ecpy/default.nix
···
-
{ stdenv, fetchPypi, buildPythonPackage, hidapi
+
{ stdenv, fetchPypi, buildPythonPackage, isPy3k, hidapi
, pycrypto, pillow, protobuf, future, ecpy
}:
buildPythonPackage rec {
-
name = "${pname}-${version}";
pname = "ECPy";
version = "0.8.3";
+
+
disabled = !isPy3k;
src = fetchPypi {
inherit pname version;
+4 -4
pkgs/development/python-modules/faker/default.nix
···
{ lib, buildPythonPackage, fetchPypi, pythonOlder,
# Build inputs
-
dateutil, six, ipaddress ? null,
+
dateutil, six, text-unidecode, ipaddress ? null,
# Test inputs
email_validator, nose, mock, ukpostcodeparser }:
···
buildPythonPackage rec {
pname = "Faker";
-
version = "0.8.8";
-
name = "${pname}-${version}";
+
version = "0.8.11";
src = fetchPypi {
inherit pname version;
-
sha256 = "e928cf853ef69d7471421f2a3716a1239e43de0fa9855f4016ee0c9f1057328a";
+
sha256 = "126kdy6lj10rwgchzz0lzjabx0zcyskamhn0qib67k69fcksjmq8";
};
checkInputs = [
···
propagatedBuildInputs = [
dateutil
six
+
text-unidecode
] ++ lib.optional (pythonOlder "3.3") ipaddress;
meta = with lib; {
+7 -4
pkgs/development/python-modules/flask-script/default.nix
···
-
{ lib, buildPythonPackage, fetchurl, flask, pytest }:
+
{ lib, buildPythonPackage, fetchPypi, flask, pytest }:
buildPythonPackage rec {
-
name = "Flask-Script-${version}";
+
pname = "Flask-Script";
version = "2.0.6";
-
src = fetchurl {
-
url = "mirror://pypi/F/Flask-Script/${name}.tar.gz";
+
src = fetchPypi {
+
inherit pname version;
sha256 = "0zqh2yq8zk7m9b4xw1ryqmrljkdigfb3hk5155a3b5hkfnn6xxyf";
};
propagatedBuildInputs = [ flask ];
checkInputs = [ pytest ];
+
+
# No tests in archive
+
doCheck = false;
meta = with lib; {
homepage = http://github.com/smurfix/flask-script;
+8 -3
pkgs/development/python-modules/fonttools/default.nix
···
, numpy
, pytest
, pytestrunner
+
, glibcLocales
}:
buildPythonPackage rec {
pname = "fonttools";
-
version = "3.22.0";
-
name = "${pname}-${version}";
+
version = "3.24.0";
src = fetchPypi {
inherit pname version;
-
sha256 = "01640dfbc0ba752181b21fe74240b8a7bbf7af75581737245836ada5565bd549";
+
sha256 = "d09126f443bc8797d1b7e76274e65f4c169c04722745953ecf536451b1d9a15f";
extension = "zip";
};
···
checkInputs = [
pytest
pytestrunner
+
glibcLocales
];
+
+
preCheck = ''
+
export LC_ALL="en_US.UTF-8"
+
'';
meta = {
homepage = https://github.com/fonttools/fonttools;
+27
pkgs/development/python-modules/ftputil/default.nix
···
+
{ lib, buildPythonPackage, fetchPypi, pytest }:
+
+
buildPythonPackage rec {
+
version = "3.4";
+
pname = "ftputil";
+
+
src = fetchPypi {
+
inherit pname version;
+
sha256 = "374b01e174079e91babe2a462fbd6f6c00dbfbfa299dec04239ca4229fbf8762";
+
};
+
+
checkInputs = [ pytest ];
+
+
checkPhase = ''
+
touch Makefile
+
# Disable tests that require network access or access /home
+
py.test test \
+
-k "not test_public_servers and not test_real_ftp \
+
and not test_set_parser and not test_repr"
+
'';
+
+
meta = with lib; {
+
description = "High-level FTP client library (virtual file system and more)";
+
homepage = http://ftputil.sschwarzer.net/;
+
license = licenses.bsd2; # "Modified BSD license, says pypi"
+
};
+
}
+2 -2
pkgs/development/python-modules/google_cloud_core/default.nix
···
buildPythonPackage rec {
pname = "google-cloud-core";
-
version = "0.28.0";
+
version = "0.28.1";
src = fetchPypi {
inherit pname version;
-
sha256 = "1h8bx99ksla48zkb7bhkqy66b8prg49dp15alh851vzi9ii2zii7";
+
sha256 = "89e8140a288acec20c5e56159461d3afa4073570c9758c05d4e6cb7f2f8cc440";
};
propagatedBuildInputs = [ google_api_core grpcio ];
+2 -2
pkgs/development/python-modules/google_cloud_speech/default.nix
···
buildPythonPackage rec {
pname = "google-cloud-speech";
-
version = "0.32.0";
+
version = "0.32.1";
src = fetchPypi {
inherit pname version;
-
sha256 = "2513725e693c3a2fdf22cb3065f3fcb39de2ab962a0cbc5de11a3889834189e1";
+
sha256 = "4f9a8ab3eb6630d0c0ca6ac15230dceba7d55d6707d162a84f255139ff780ee9";
};
propagatedBuildInputs = [ setuptools google_api_core google_gax google_cloud_core ];
+2 -2
pkgs/development/python-modules/gpy/default.nix
···
buildPythonPackage rec {
pname = "GPy";
-
version = "1.8.5";
+
version = "1.9.2";
name = "${pname}-${version}";
src = fetchPypi {
inherit pname version;
-
sha256 = "1562e34629192f209273f454e41614a127c6ef04144cd0eb5992d484721d55d3";
+
sha256 = "372e43d41df5c90e0958d3073070994b351a7409c2e5fbd349cffe13bc24c10a";
};
# running tests produces "ImportError: cannot import name 'linalg_cython'"
+21
pkgs/development/python-modules/green/default.nix
···
+
{ lib, buildPythonPackage, fetchPypi, isPy3k, colorama, coverage, termstyle, unidecode, mock, backports_shutil_get_terminal_size }:
+
+
buildPythonPackage rec {
+
pname = "green";
+
version = "2.12.1";
+
+
src = fetchPypi {
+
inherit pname version;
+
sha256 = "4c0c163bd2ce2da1f201eb69fd92fc24aaeab884f9e5c5a8c23d507a53336fa8";
+
};
+
+
propagatedBuildInputs = [
+
colorama coverage termstyle unidecode
+
] ++ lib.optionals (!isPy3k) [ mock backports_shutil_get_terminal_size ];
+
+
meta = with lib; {
+
description = "Python test runner";
+
homepage = https://github.com/CleanCut/green;
+
license = licenses.mit;
+
};
+
}
+2 -2
pkgs/development/python-modules/guessit/2.0.nix
···
buildPythonPackage rec {
pname = "guessit";
-
version = "2.0.4";
+
version = "2.1.4";
name = "${pname}-${version}";
src = fetchPypi {
inherit pname version;
-
sha256 = "1cfcgb0px6i9jl8nwkx8j06j4y6p5975a9pfmd8lcacwr8gy4wjg";
+
sha256 = "90e6f9fb49246ad27f34f8b9984357e22562ccc3059241cbc08b4fac1d401c56";
};
# Tests require more packages.
+28
pkgs/development/python-modules/ha-ffmpeg/default.nix
···
+
{ stdenv, buildPythonPackage, fetchPypi, isPy3k
+
, ffmpeg, async-timeout }:
+
+
buildPythonPackage rec {
+
pname = "ha-ffmpeg";
+
version = "1.9";
+
+
disabled = !isPy3k;
+
+
src = fetchPypi {
+
inherit pname version;
+
sha256 = "0644j5fqw8p6li6nrnm1rw7nhvsixq1c7gik3f1yx50776yg05i8";
+
};
+
+
buildInputs = [ ffmpeg ];
+
+
propagatedBuildInputs = [ async-timeout ];
+
+
# only manual tests
+
doCheck = false;
+
+
meta = with stdenv.lib; {
+
homepage = https://github.com/pvizeli/ha-ffmpeg;
+
description = "Library for home-assistant to handle ffmpeg";
+
license = licenses.bsd3;
+
maintainers = with maintainers; [ peterhoeg ];
+
};
+
}
+7 -6
pkgs/development/python-modules/hyperlink/default.nix
···
-
{ stdenv, buildPythonPackage, fetchurl, pytest }:
+
{ stdenv, buildPythonPackage, fetchPypi, idna, pytest }:
buildPythonPackage rec {
pname = "hyperlink";
-
version = "17.3.1";
-
name = pname + "-" + version;
+
version = "18.0.0";
-
src = fetchurl {
-
url = "mirror://pypi/h/hyperlink/${name}.tar.gz";
-
sha256 = "bc4ffdbde9bdad204d507bd8f554f16bba82dd356f6130cb16f41422909c33bc";
+
src = fetchPypi {
+
inherit pname version;
+
sha256 = "f01b4ff744f14bc5d0a22a6b9f1525ab7d6312cb0ff967f59414bbac52f0a306";
};
+
+
propagatedBuildInputs = [ idna ];
checkInputs = [ pytest ];
+2 -2
pkgs/development/python-modules/ipykernel/default.nix
···
buildPythonPackage rec {
pname = "ipykernel";
-
version = "4.8.1";
+
version = "4.8.2";
name = "${pname}-${version}";
src = fetchPypi {
inherit pname version;
-
sha256 = "fe2837622a4121cbe42b354db1e2ab46c91e807ffcb92f4c2cfd323a75f8737f";
+
sha256 = "c091449dd0fad7710ddd9c4a06e8b9e15277da306590bc07a3a1afa6b4453c8f";
};
buildInputs = [ nose ] ++ lib.optional isPy27 mock;
+2 -2
pkgs/development/python-modules/kafka-python/default.nix
···
buildPythonPackage rec {
name = "${pname}-${version}";
-
version = "1.3.5";
+
version = "1.4.1";
pname = "kafka-python";
src = fetchPypi {
inherit pname version;
-
sha256 = "19m9fdckxqngrgh0www7g8rgi7z0kq13wkhcqy1r8aa4sxad0f5j";
+
sha256 = "596e9b4e302a0dc04d35be159cf23d31c4cba73a218e16fc8cd1be0ad57f8c22";
};
checkInputs = [ pytest six mock ];
+48
pkgs/development/python-modules/konfig/default.nix
···
+
{ lib, buildPythonPackage, fetchFromGitHub, isPy3k, writeText, configparser, six, pytest, glibcLocales }:
+
+
buildPythonPackage rec {
+
pname = "konfig";
+
version = "1.1";
+
+
# konfig unconditionaly depend on configparser, even if it is part of
+
# the standard library in python 3.2 or above.
+
disabled = isPy3k;
+
+
# PyPI tarball is missing utf8.ini, required for tests
+
src = fetchFromGitHub {
+
owner = "mozilla-services";
+
repo = pname;
+
rev = version;
+
sha256 = "1h780fbrv275dcik4cs3rincza805z6q726b48r4a0qmh5d8160c";
+
};
+
+
propagatedBuildInputs = [ configparser six ];
+
+
patches = [ (writeText "konfig.patch" ''
+
diff --git a/setup.py b/setup.py
+
index 96fd858..bb4db06 100644
+
--- a/setup.py
+
+++ b/setup.py
+
@@ -20,7 +20,7 @@ setup(name='konfig',
+
author_email="tarek@mozilla.com",
+
include_package_data=True,
+
install_requires = [
+
- 'configparser', 'argparse', 'six'
+
+ 'configparser', 'six'
+
],
+
zip_safe=False,
+
classifiers=classifiers,
+
'') ];
+
+
checkInputs = [ pytest glibcLocales ];
+
+
checkPhase = ''
+
LC_ALL=en_US.utf8 pytest -v konfig/tests
+
'';
+
+
meta = with lib; {
+
description = "Yet Another Config Parser";
+
homepage = "https://github.com/mozilla-services/konfig";
+
license = licenses.mpl20;
+
};
+
}
+25
pkgs/development/python-modules/ldappool/default.nix
···
+
{ lib, buildPythonPackage, fetchPypi, isPy3k
+
, pbr, ldap, fixtures, testresources, testtools }:
+
+
buildPythonPackage rec {
+
name = "ldappool-${version}";
+
version = "2.2.0";
+
+
src = fetchPypi {
+
pname = "ldappool";
+
inherit version;
+
sha256 = "1akmzf51cjfvmd0nvvm562z1w9vq45zsx6fa72kraqgsgxhnrhqz";
+
};
+
+
nativeBuildInputs = [ pbr ];
+
+
propagatedBuildInputs = [ ldap ];
+
+
checkInputs = [ fixtures testresources testtools ];
+
+
meta = with lib; {
+
description = "A simple connector pool for python-ldap";
+
homepage = https://git.openstack.org/cgit/openstack/ldappool;
+
license = licenses.mpl20;
+
};
+
}
+2 -2
pkgs/development/python-modules/llvmlite/default.nix
···
buildPythonPackage rec {
pname = "llvmlite";
-
version = "0.21.0";
+
version = "0.22.0";
disabled = isPyPy;
src = fetchPypi {
inherit pname version;
-
sha256 = "3a5dd0695fdfb9fd47464cd71791b84935bf9642e11f4811d57aa1f2da8cdaa8";
+
sha256 = "a0a875f3d502f41f4a24444aa98fbf076a6bf36e2a0b3b4481b22e1c4a3acdc2";
};
propagatedBuildInputs = [ llvm ] ++ stdenv.lib.optional (pythonOlder "3.4") enum34;
+2 -2
pkgs/development/python-modules/marionette-harness/mozdevice.nix
···
buildPythonPackage rec {
pname = "mozdevice";
-
version = "0.50";
+
version = "0.52";
name = "${pname}-${version}";
src = fetchPypi {
inherit pname version;
-
sha256 = "0cfxzhfxdphlzj80vkd3h7m0mg5w7zhb8h6f5lmybliqdiv9vz20";
+
sha256 = "5b6fcbc7179c0f09bd99f7f7c42b614bce5f39543fb18b190e408488f987d6b5";
};
propagatedBuildInputs = [ moznetwork mozprocess ];
+7 -4
pkgs/development/python-modules/marionette-harness/mozlog.nix
···
, fetchPypi
, isPy3k
, blessings
+
, mozterm
+
, six
, mozfile
}:
buildPythonPackage rec {
pname = "mozlog";
-
version = "3.4";
-
name = "${pname}-${version}";
+
version = "3.7";
disabled = isPy3k;
src = fetchPypi {
inherit pname version;
-
sha256 = "1m4d9i1kzcmkhipfd5czv05f2s84j1byx3cv4y2irjmwq5v6cyiq";
+
sha256 = "414141131c4f5e7242e69a939d2b74f4ed8dbac12bef93eee4e7125cd1a131e9";
};
-
propagatedBuildInputs = [ blessings mozfile ];
+
propagatedBuildInputs = [ blessings mozterm six ];
+
+
checkInputs = [ mozfile ];
meta = {
description = "Mozilla logging library";
+2 -2
pkgs/development/python-modules/marionette-harness/mozprocess.nix
···
buildPythonPackage rec {
pname = "mozprocess";
-
version = "0.25";
+
version = "0.26";
name = "${pname}-${version}";
src = fetchPypi {
inherit pname version;
-
sha256 = "0lfflwjkwvc8bqvsgdib3b78w2pms8nharh3sc3zgsrmqb1mbzks";
+
sha256 = "9f471c45bee9ff14e936c6ee216a6cc4941223659c01fa626bce628001d8485c";
};
propagatedBuildInputs = [ mozinfo ];
+2 -2
pkgs/development/python-modules/marionette-harness/mozprofile.nix
···
buildPythonPackage rec {
pname = "mozprofile";
-
version = "0.28";
+
version = "0.29";
name = "${pname}-${version}";
src = fetchPypi {
inherit pname version;
-
sha256 = "15xsdhrpbg7hlr6nvb3k3ci33h786hrv12az8j2k7aa9gzjcf8nh";
+
sha256 = "92af4b9f527a18997dccb60e846e1844b2428668dadf3ccb1a8cd30c706b25c1";
};
propagatedBuildInputs = [ mozlog mozfile mozhttpd ];
+2 -2
pkgs/development/python-modules/marionette-harness/mozrunner.nix
···
buildPythonPackage rec {
pname = "mozrunner";
-
version = "6.13";
+
version = "6.14";
name = "${pname}-${version}";
src = fetchPypi {
inherit pname version;
-
sha256 = "1d5k3a0w1iyyk6l28l65j47grq87zd207h369x4vahq02nrx2g6l";
+
sha256 = "a401ea5141cdd15d8f047f19a30ccbeabeb0aea079674b684121acddc5dcf810";
};
propagatedBuildInputs = [ mozdevice mozfile mozinfo mozlog mozprocess
+2 -2
pkgs/development/python-modules/marionette-harness/mozversion.nix
···
buildPythonPackage rec {
pname = "mozversion";
-
version = "1.4";
+
version = "1.5";
name = "${pname}-${version}";
src = fetchPypi {
inherit pname version;
-
sha256 = "15ipddn6bpqxl590cy37fj52vgpa4faw2dax1mwvdxj7b18s3pwh";
+
sha256 = "e9b11e4a46bf7a4a11469ea4589c75f3ba50b34b7801e7edf1a09147af8bf70f";
};
propagatedBuildInputs = [ mozlog mozdevice ];
+18
pkgs/development/python-modules/miniupnpc/default.nix
···
+
{ stdenv, buildPythonPackage, fetchPypi }:
+
+
buildPythonPackage rec {
+
pname = "miniupnpc";
+
version = "2.0.2";
+
+
src = fetchPypi {
+
inherit pname version;
+
sha256 = "0ca94zz7sr2x57j218aypxqcwkr23n8js30f3yrvvqbg929nr93y";
+
};
+
+
meta = with stdenv.lib; {
+
description = "miniUPnP client";
+
homepage = http://miniupnp.free.fr/;
+
license = licenses.mit;
+
maintainers = with maintainers; [ peterhoeg ];
+
};
+
}
+16
pkgs/development/python-modules/mozterm/default.nix
···
+
{ lib, buildPythonPackage, fetchPypi }:
+
+
buildPythonPackage rec {
+
pname = "mozterm";
+
version = "0.1.0";
+
+
src = fetchPypi {
+
inherit pname version;
+
sha256 = "4ebf8bd772d97c0f557184173f0f96cfca0abfc07e1ae975fbcfa76be50b5561";
+
};
+
+
meta = with lib; {
+
description = "Terminal abstractions built around the blessings module";
+
license = licenses.mpl20;
+
};
+
}
+2 -2
pkgs/development/python-modules/msgpack/default.nix
···
buildPythonPackage rec {
pname = "msgpack";
-
version = "0.5.4";
+
version = "0.5.6";
src = fetchPypi {
inherit pname version;
-
sha256 = "13ckbs2qc4dww7fddnm9cw116j4spgxqab49ijmj6jr178ypwl80";
+
sha256 = "0ee8c8c85aa651be3aa0cd005b5931769eaa658c948ce79428766f1bd46ae2c3";
};
checkPhase = ''
+2 -2
pkgs/development/python-modules/neovim/default.nix
···
buildPythonPackage rec {
pname = "neovim";
-
version = "0.2.1";
+
version = "0.2.3";
src = fetchPypi {
inherit pname version;
-
sha256 = "16vzxmp7f6dl20n30j5cwwvrjj5h3c2ch8ldbss31anf36nirsdp";
+
sha256 = "989d720dc7636aa4260aa7774fa79aa524f51515b262eb8d7e9ba4336f758a99";
};
checkInputs = [ nose ];
+8 -2
pkgs/development/python-modules/netdisco/default.nix
···
-
{ stdenv, buildPythonPackage, isPy3k, fetchFromGitHub, requests, zeroconf, netifaces, pytest }:
+
{ stdenv, buildPythonPackage, isPy3k, fetchFromGitHub, fetchpatch, requests, zeroconf, netifaces, pytest }:
buildPythonPackage rec {
pname = "netdisco";
···
sha256 = "170s9py8rw07cfgwvv7mf69g8jjg32m2rgw8x3kbvjqlmrdijxmm";
};
+
# Allow newer zeroconf versions
+
patches = fetchpatch {
+
url = "${meta.homepage}/commit/78f83046a2a0d77527274c8be9c3fd75737c19d0.patch";
+
sha256 = "098zkwqg9181vavw97yhi9rsdsf023gnapg4gkr1n0awz3f3l9nm";
+
};
+
propagatedBuildInputs = [ requests zeroconf netifaces ];
checkInputs = [ pytest ];
···
meta = with stdenv.lib; {
description = "Python library to scan local network for services and devices";
-
homepage = https://github.com/home-assistant/netdisco/;
+
homepage = https://github.com/home-assistant/netdisco;
license = licenses.asl20;
platforms = platforms.unix;
maintainers = with maintainers; [ dotlambda ];
+4 -12
pkgs/development/python-modules/networkx/default.nix
···
, fetchPypi
, nose
, decorator
-
, isPy36
-
, isPyPy
}:
buildPythonPackage rec {
pname = "networkx";
-
version = "1.11";
-
-
# Currently broken on PyPy.
-
# https://github.com/networkx/networkx/pull/1361
-
disabled = isPyPy;
+
version = "2.1";
src = fetchPypi {
inherit pname version;
-
sha256 = "1f74s56xb4ggixiq0vxyfxsfk8p20c7a099lpcf60izv1php03hd";
+
extension = "zip";
+
sha256 = "64272ca418972b70a196cb15d9c85a5a6041f09a2f32e0d30c0255f25d458bb1";
};
checkInputs = [ nose ];
propagatedBuildInputs = [ decorator ];
-
# 17 failures with 3.6 https://github.com/networkx/networkx/issues/2396#issuecomment-304437299
-
doCheck = !(isPy36);
-
meta = {
homepage = "https://networkx.github.io/";
description = "Library for the creation, manipulation, and study of the structure, dynamics, and functions of complex networks";
license = lib.licenses.bsd3;
};
-
}
+
}
+2 -2
pkgs/development/python-modules/nipype/default.nix
···
buildPythonPackage rec {
pname = "nipype";
-
version = "1.0.0";
+
version = "1.0.1";
src = fetchPypi {
inherit pname version;
-
sha256 = "4c14c6cae1f530f89d76fa8136d52488b1daf3a02179da65121b76eaf4a6f0ea";
+
sha256 = "47f62fda3d6b9a37aa407a6b78c80e91240aa71e61191ed00da68b02839fe258";
};
doCheck = false; # fails with TypeError: None is not callable
+2 -2
pkgs/development/python-modules/numba/default.nix
···
}:
buildPythonPackage rec {
-
version = "0.36.2";
+
version = "0.37.0";
pname = "numba";
src = fetchPypi {
inherit pname version;
-
sha256 = "d61597808ce511e81b64e32da664f52beb7d947bf834dde8b8b60b29d205e5c2";
+
sha256 = "c62121b2d384d8b4d244ef26c1cf8bb5cb819278a80b893bf41918ad6d391258";
};
NIX_CFLAGS_COMPILE = stdenv.lib.optionalString stdenv.isDarwin "-I${libcxx}/include/c++/v1";
+2 -2
pkgs/development/python-modules/numpy/default.nix
···
buildPythonPackage rec {
pname = "numpy";
-
version = "1.14.0";
+
version = "1.14.1";
name = "${pname}-${version}";
src = fetchPypi {
inherit pname version;
extension = "zip";
-
sha256 = "3de643935b212307b420248018323a44ec51987a336d1d747c1322afc3c099fb";
+
sha256 = "fa0944650d5d3fb95869eaacd8eedbd2d83610c85e271bd9d3495ffa9bc4dc9c";
};
disabled = isPyPy;
+2 -2
pkgs/development/python-modules/paramz/default.nix
···
buildPythonPackage rec {
pname = "paramz";
-
version = "0.8.5";
+
version = "0.9.1";
name = "${pname}-${version}";
src = fetchPypi {
inherit pname version;
-
sha256 = "297e59b48e57e78e15f547b1af8b21ddfd19a6312d70b9dc07c7262711adfed9";
+
sha256 = "8a5a2fe5cdb033eb869c49e81fde2a9d0055fadb53a8af1665a7f48f320179cf";
};
propagatedBuildInputs = [ numpy scipy six decorator ];
+2 -2
pkgs/development/python-modules/pendulum/default.nix
···
buildPythonPackage rec {
pname = "pendulum";
-
version = "1.4.1";
+
version = "1.4.2";
src = fetchPypi {
inherit pname version;
-
sha256 = "3f16fb759e6126dd89d49886f8100caa72e5ab36563bc148b4f7eddfa0099c0f";
+
sha256 = "39a255776528afe11ea0d57814f9bf3729c1e0b99063af2e5c6cfd750c3e1f7f";
};
propagatedBuildInputs = [ dateutil pytzdata tzlocal ];
+2 -2
pkgs/development/python-modules/phonenumbers/default.nix
···
buildPythonPackage rec {
pname = "phonenumbers";
-
version = "8.8.9";
+
version = "8.9.0";
name = "${pname}-${version}";
src = fetchPypi {
inherit pname version;
-
sha256 = "d819299c3aa8f85f248295ab8559e202af429b4017301b122a0b4c387aed10d2";
+
sha256 = "2cb4822ba895200b06f46a788e852d6ae8200fdc97e1d7c86b0ee10c99d4ff3a";
};
meta = {
+2 -2
pkgs/development/python-modules/plotly/default.nix
···
buildPythonPackage rec {
pname = "plotly";
-
version = "2.4.0";
+
version = "2.4.1";
name = "${pname}-${version}";
src = fetchPypi {
inherit pname version;
-
sha256 = "8e7ee039231fec52b0b38d45e7470f70b117f6527b08cc922d74992f4d082858";
+
sha256 = "f588991dce15437debd825eca935c8cfbabf438cdc0dcd2ce7a88f429d982f69";
};
propagatedBuildInputs = [
+4 -1
pkgs/development/python-modules/pomegranate/default.nix
···
buildPythonPackage rec {
pname = "pomegranate";
version = "0.8.1";
-
name = "${pname}-${version}";
src = fetchFromGitHub {
repo = pname;
···
homepage = https://github.com/jmschrei/pomegranate;
license = licenses.mit;
maintainers = with maintainers; [ rybern ];
+
+
# "pomegranate does not yet work with networkx 2.0"
+
# see https://github.com/jmschrei/pomegranate/issues/209
+
broken = true;
};
}
+15 -1
pkgs/development/python-modules/prov/default.nix
···
, six
, pydotplus
, rdflib
+
, pydot
+
, glibcLocales
}:
buildPythonPackage rec {
···
sha256 = "640dc158d931403bc6c1a0ad80702caae71f810bac21f90ec605865c8444b7bb";
};
+
prePatch = ''
+
substituteInPlace setup.py --replace "six==1.10.0" "six>=1.10.0"
+
'';
+
propagatedBuildInputs = [
lxml
networkx
···
pydotplus
rdflib
];
-
doCheck = false; # takes ~60 mins
+
+
checkInputs = [
+
pydot
+
glibcLocales
+
];
+
+
preCheck = ''
+
export LC_ALL="en_US.utf-8"
+
'';
meta = with stdenv.lib; {
description = "A Python library for W3C Provenance Data Model (PROV)";
+2 -1
pkgs/development/python-modules/pybfd/default.nix
···
{ lib, fetchFromGitHub, buildPythonPackage, isPyPy, isPy3k, libbfd, libopcodes }:
buildPythonPackage rec {
-
name = "pybfd-0.1.1.2017-12-31";
+
pname = "pybfd";
+
version = "-0.1.1.2017-12-31";
disabled = isPyPy || isPy3k;
+22
pkgs/development/python-modules/pycups/default.nix
···
+
{ stdenv, lib, buildPythonPackage, fetchurl, cups, libiconv }:
+
+
buildPythonPackage rec {
+
pname = "pycups";
+
version = "1.9.73";
+
+
src = fetchurl {
+
url = "http://cyberelk.net/tim/data/pycups/pycups-${version}.tar.bz2";
+
sha256 = "c381be011889ca6f728598578c89c8ac9f7ab1e95b614474df9f2fa831ae5335";
+
};
+
+
buildInputs = [ cups ] ++ lib.optional stdenv.isDarwin libiconv;
+
+
# Wants to connect to CUPS
+
doCheck = false;
+
+
meta = with lib; {
+
description = "Python bindings for libcups";
+
homepage = http://cyberelk.net/tim/software/pycups/;
+
license = with licenses; [ gpl2Plus ];
+
};
+
}
+2 -2
pkgs/development/python-modules/pydub/default.nix
···
buildPythonPackage rec {
name = "${pname}-${version}";
pname = "pydub";
-
version = "0.20.0";
+
version = "0.21.0";
src = fetchPypi {
inherit pname version;
-
sha256 = "0hqsvvph6ks4kxj0m2q1xvl5bllqmpk78rlqpqhh79schl344xkv";
+
sha256 = "27acc5977b0f5220682175d44fda737bbf818143b0832c0c3863b5dde38e197a";
};
patches = [
+2 -2
pkgs/development/python-modules/pymongo/default.nix
···
buildPythonPackage rec {
pname = "pymongo";
-
version = "3.6.0";
+
version = "3.6.1";
name = "${pname}-${version}";
src = fetchPypi {
inherit pname version;
-
sha256 = "c6de26d1e171cdc449745b82f1addbc873d105b8e7335097da991c0fc664a4a8";
+
sha256 = "f7ebcb846962ee40374db2d9014a89bea9c983ae63c1877957c3a0a756974796";
};
doCheck = false;
+2 -2
pkgs/development/python-modules/pyopencl/default.nix
···
buildPythonPackage rec {
pname = "pyopencl";
-
version = "2018.1";
+
version = "2018.1.1";
checkInputs = [ pytest ];
buildInputs = [ opencl-headers ocl-icd ];
···
src = fetchPypi {
inherit pname version;
-
sha256 = "b692966bbaaa65ef8949ee25660d6b0cc7cbadc7f4a35eb9c5139dfa4dde6d4a";
+
sha256 = "29683b47ec729c77a1be4d6fae2bd3718ca4cfcbe14655261a3a14d5bf55530a";
};
# py.test is not needed during runtime, so remove it from `install_requires`
+1 -1
pkgs/development/python-modules/pytest-mock/default.nix
···
-
{ lib, buildPythonPackage, fetchPypi, isPy3k, pytest, mock, setuptools_scm }:
+
{ lib, buildPythonPackage, fetchPypi, fetchpatch, isPy3k, pytest, mock, setuptools_scm }:
buildPythonPackage rec {
pname = "pytest-mock";
+2 -2
pkgs/development/python-modules/pytest-xdist/default.nix
···
buildPythonPackage rec {
pname = "pytest-xdist";
-
version = "1.22.0";
+
version = "1.22.2";
src = fetchPypi {
inherit pname version;
-
sha256 = "65228a859191f2c74ee68c127317eefe35eedd3d43fc1431f19240663b0cafcd";
+
sha256 = "e8f5744acc270b3e7d915bdb4d5f471670f049b6fbd163d4cbd52203b075d30f";
};
nativeBuildInputs = [ setuptools_scm ];
+2 -2
pkgs/development/python-modules/pytest/default.nix
···
, setuptools_scm, setuptools, six, pluggy, funcsigs, isPy3k
}:
buildPythonPackage rec {
-
version = "3.4.0";
+
version = "3.4.1";
pname = "pytest";
preCheck = ''
···
src = fetchPypi {
inherit pname version;
-
sha256 = "6074ea3b9c999bd6d0df5fa9d12dd95ccd23550df2a582f5f5b848331d2e82ca";
+
sha256 = "9ddcb879c8cc859d2540204b5399011f842e5e8823674bf429f70ada281b3cc6";
};
checkInputs = [ hypothesis ];
+23
pkgs/development/python-modules/python-daemon/default.nix
···
+
{ lib, buildPythonPackage, fetchPypi, mock, testscenarios, docutils, lockfile }:
+
+
buildPythonPackage rec {
+
pname = "python-daemon";
+
version = "2.1.2";
+
+
src = fetchPypi {
+
inherit pname version;
+
sha256 = "261c859be5c12ae7d4286dc6951e87e9e1a70a882a8b41fd926efc1ec4214f73";
+
};
+
+
# A test fail within chroot builds.
+
doCheck = false;
+
+
buildInputs = [ mock testscenarios ];
+
propagatedBuildInputs = [ docutils lockfile ];
+
+
meta = with lib; {
+
description = "Library to implement a well-behaved Unix daemon process";
+
homepage = https://alioth.debian.org/projects/python-daemon/;
+
license = [ licenses.gpl3Plus licenses.asl20 ];
+
};
+
}
+2 -2
pkgs/development/python-modules/python-oauth2/default.nix
···
buildPythonPackage rec {
pname = "python-oauth2";
-
version = "1.0.1";
+
version = "1.1.0";
src = fetchPypi {
inherit pname version;
-
sha256 = "0a1d0qnlgm07wq9r9bbm5jqkqry73w34m87p0141bk76lg7bb0sm";
+
sha256 = "b24da812837c19183df1924e80a22ba0a1869582dea8b04a9ecd807b04dbc525";
};
# attempts to run mysql
doCheck = false;
+2 -2
pkgs/development/python-modules/pytools/default.nix
···
buildPythonPackage rec {
pname = "pytools";
-
version = "2017.6";
+
version = "2018.1";
src = fetchPypi {
inherit pname version;
-
sha256 = "80f1bba4469d473c1b3969bc8e188c03bcc94d35807a889ceebbfc78e3208115";
+
sha256 = "0063b87285cb1172e3602a996bfd7342bf407361cf67b562cb6d806f70422e71";
};
checkInputs = [ pytest ];
+24
pkgs/development/python-modules/rednose/default.nix
···
+
{ lib, buildPythonPackage, fetchPypi, nose, six, colorama, termstyle }:
+
+
buildPythonPackage rec {
+
pname = "rednose";
+
version = "1.3.0";
+
+
src = fetchPypi {
+
inherit pname version;
+
sha256 = "6da77917788be277b70259edc0bb92fc6f28fe268b765b4ea88206cc3543a3e1";
+
};
+
+
prePatch = ''
+
substituteInPlace setup.py --replace "six==1.10.0" "six>=1.10.0"
+
'';
+
+
checkInputs = [ six ];
+
propagatedBuildInputs = [ nose colorama termstyle ];
+
+
meta = with lib; {
+
description = "A python nose plugin adding color to console results";
+
homepage = https://github.com/JBKahn/rednose;
+
license = licenses.mit;
+
};
+
}
+2 -2
pkgs/development/python-modules/regex/default.nix
···
buildPythonPackage rec {
pname = "regex";
-
version = "2018.02.08";
+
version = "2018.02.21";
src = fetchPypi {
inherit pname version;
-
sha256 = "2353c0e983c4029caf32016f1dddef623c3117ac282a818468c6d2f5d541698d";
+
sha256 = "b44624a38d07d3c954c84ad302c29f7930f4bf01443beef5589e9157b14e2a29";
};
postCheck = ''
+2 -2
pkgs/development/python-modules/restructuredtext_lint/default.nix
···
buildPythonPackage rec {
pname = "restructuredtext_lint";
-
version = "1.1.2";
+
version = "1.1.3";
name = "${pname}-${version}";
src = fetchPypi {
inherit pname version;
-
sha256 = "9201d354e22c27be61cf6d8212da6e10c875eec7ec8d1bdb1067b2a5ba931637";
+
sha256 = "c48ca9a84c312b262809f041fe47dcfaedc9ee4879b3e1f9532f745c182b4037";
};
checkInputs = [ nose flake8 pyyaml testtools ];
+2 -2
pkgs/development/python-modules/setuptools/default.nix
···
# Should use buildPythonPackage here somehow
stdenv.mkDerivation rec {
pname = "setuptools";
-
version = "38.4.0";
+
version = "38.4.1";
name = "${python.libPrefix}-${pname}-${version}";
src = fetchPypi {
inherit pname version;
extension = "zip";
-
sha256 = "6501fc32f505ec5b3ed36ec65ba48f1b975f52cf2ea101c7b73a08583fd12f75";
+
sha256 = "3b5f74bd33b046a121f052632f248b580f5e83848bb4cebda9e38741a445a969";
};
nativeBuildInputs = [ unzip wrapPython ];
+2 -2
pkgs/development/python-modules/sphinx/default.nix
···
buildPythonPackage rec {
name = "${pname}-${version}";
pname = "Sphinx";
-
version = "1.7.0";
+
version = "1.7.1";
src = fetchPypi {
inherit pname version;
-
sha256 = "278b7923f3f4ed2a1d1359f0ae94d89ac90ddd4189e8362f4b4d3baa2afe6b4a";
+
sha256 = "da987de5fcca21a4acc7f67a86a363039e67ac3e8827161e61b91deb131c0ee8";
};
LC_ALL = "en_US.UTF-8";
+2 -2
pkgs/development/python-modules/sqlalchemy/default.nix
···
buildPythonPackage rec {
pname = "SQLAlchemy";
name = "${pname}-${version}";
-
version = "1.2.3";
+
version = "1.2.4";
src = fetchPypi {
inherit pname version;
-
sha256 = "9e9ec143e2e246f385cfb2de8daa89d2fa466279addcb7be9e102988fdf33d24";
+
sha256 = "6997507af46b10630e13b605ac278b78885fd683d038896dbee0e7ec41d809d2";
};
checkInputs = [
+2 -2
pkgs/development/python-modules/sqlmap/default.nix
···
buildPythonPackage rec {
pname = "sqlmap";
-
version = "1.2.2";
+
version = "1.2.3";
name = "${pname}-${version}";
src = fetchPypi {
inherit pname version;
-
sha256 = "6256e0d5ab6d465152c8a8a21bdb97b50e155255d6bedd586ce214ed7a1fb9d7";
+
sha256 = "0db9d1dd2e9624befff25f7e1a356f32366e4f05fd7e1a1783499816416ae28e";
};
# No tests in archive
+24
pkgs/development/python-modules/sseclient/default.nix
···
+
{ stdenv, buildPythonPackage, fetchPypi
+
, requests, six
+
, backports_unittest-mock, pluggy, pytest, pytestrunner }:
+
+
buildPythonPackage rec {
+
pname = "sseclient";
+
version = "0.0.19";
+
+
src = fetchPypi {
+
inherit pname version;
+
sha256 = "7a2ea3f4c8525ae9a677bc8193df5db88e23bcaafcc34938a1ee665975703a9f";
+
};
+
+
propagatedBuildInputs = [ requests six ];
+
+
checkInputs = [ backports_unittest-mock pytest pytestrunner ];
+
+
meta = with stdenv.lib; {
+
description = "Client library for reading Server Sent Event streams";
+
homepage = https://github.com/btubbs/sseclient;
+
license = licenses.mit;
+
maintainers = with maintainers; [ peterhoeg ];
+
};
+
}
+7 -8
pkgs/development/python-modules/stripe/default.nix
···
-
{ stdenv, buildPythonPackage, fetchPypi
-
, unittest2, mock, requests }:
+
{ lib, buildPythonPackage, fetchPypi, isPy3k
+
, unittest2, mock, requests, simplejson }:
buildPythonPackage rec {
pname = "stripe";
-
version = "1.77.2";
-
name = "${pname}-${version}";
+
version = "1.79.1";
# Tests require network connectivity and there's no easy way to disable
# them. ~ C.
···
src = fetchPypi {
inherit pname version;
-
sha256 = "3bcd55108dd2c0e853a91147ee843bc375f35767e64d0f7680e5bd82ddb7fbf1";
+
sha256 = "2ec19bf8ad588ec04b36c35f359196fa1991f9ad911b1686ac2a12651a154947";
};
-
buildInputs = [ unittest2 mock ];
+
checkInputs = [ unittest2 mock ];
-
propagatedBuildInputs = [ requests ];
+
propagatedBuildInputs = [ requests ] ++ lib.optional (!isPy3k) simplejson;
-
meta = with stdenv.lib; {
+
meta = with lib; {
description = "Stripe Python bindings";
homepage = https://github.com/stripe/stripe-python;
license = licenses.mit;
+20
pkgs/development/python-modules/termstyle/default.nix
···
+
{ lib, buildPythonPackage, fetchPypi }:
+
+
buildPythonPackage rec {
+
pname = "termstyle";
+
version = "0.1.11";
+
+
src = fetchPypi {
+
inherit pname version;
+
sha256 = "ef74b83698ea014112040cf32b1a093c1ab3d91c4dd18ecc03ec178fd99c9f9f";
+
};
+
+
# Only manual tests
+
doCheck = false;
+
+
meta = with lib; {
+
description = "Console colouring for python";
+
homepage = "https://pypi.python.org/pypi/python-termstyle/0.1.10";
+
license = licenses.bsdOriginal;
+
};
+
}
+23
pkgs/development/python-modules/text-unidecode/default.nix
···
+
{ lib, buildPythonPackage, fetchPypi, pytest }:
+
+
buildPythonPackage rec {
+
pname = "text-unidecode";
+
version = "1.2";
+
+
src = fetchPypi {
+
inherit pname version;
+
sha256 = "5a1375bb2ba7968740508ae38d92e1f889a0832913cb1c447d5e2046061a396d";
+
};
+
+
checkInputs = [ pytest ];
+
+
checkPhase = ''
+
py.test
+
'';
+
+
meta = with lib; {
+
description = "The most basic Text::Unidecode port";
+
homepage = https://github.com/kmike/text-unidecode;
+
license = licenses.artistic1;
+
};
+
}
+2 -2
pkgs/development/python-modules/textacy/default.nix
···
buildPythonPackage rec {
name = "${pname}-${version}";
pname = "textacy";
-
version = "0.5.0";
+
version = "0.6.0";
src = fetchPypi {
inherit pname version;
-
sha256 = "6fc4603fd52c386081b063ef7aa15ca77e5e937a3064b197359659fccfdeb406";
+
sha256 = "70ebd8f6536c1536132c997988a4f27731a2db5a7ca7bab29fb33746b444959f";
};
disabled = isPy27; # 2.7 requires backports.csv
+2 -2
pkgs/development/python-modules/tifffile/default.nix
···
buildPythonPackage rec {
pname = "tifffile";
-
version = "0.13.5";
+
version = "0.14.0";
src = fetchPypi {
inherit pname version;
-
sha256 = "bca0fc9eaf609a27ebd99d8466e05d5a6e79389957f17582b70643dbca65e3d8";
+
sha256 = "eff44f71782dce38c604921a1b29ddad0d007ac9871d66e9c872fd6fc311334e";
};
checkInputs = [ nose ];
+20
pkgs/development/python-modules/tmdb3/default.nix
···
+
{ lib, buildPythonPackage, fetchPypi }:
+
+
buildPythonPackage rec {
+
pname = "tmdb3";
+
version = "0.7.2";
+
+
src = fetchPypi {
+
inherit pname version;
+
sha256 = "9b6e043b8a65d159e7fc8f720badc7ffee5109296e38676c107454e03a895983";
+
};
+
+
# no tests implemented
+
doCheck = false;
+
+
meta = with lib; {
+
description = "Python implementation of the v3 API for TheMovieDB.org, allowing access to movie and cast information";
+
homepage = https://pypi.python.org/pypi/tmdb3;
+
license = licenses.bsd3;
+
};
+
}
+2 -2
pkgs/development/python-modules/tqdm/default.nix
···
buildPythonPackage rec {
pname = "tqdm";
-
version = "4.19.5";
+
version = "4.19.6";
name = "${pname}-${version}";
src = fetchPypi {
inherit pname version;
-
sha256 = "df32e6f127dc0ccbc675eadb33f749abbcb8f174c5cb9ec49c0cdb73aa737377";
+
sha256 = "5ec0d4442358e55cdb4a0471d04c6c831518fd8837f259db5537d90feab380df";
};
buildInputs = [ nose coverage glibcLocales flake8 ];
+27
pkgs/development/python-modules/tunigo/default.nix
···
+
{ lib, buildPythonPackage, fetchFromGitHub, requests, mock, responses, pytest }:
+
+
buildPythonPackage rec {
+
pname = "tunigo";
+
version = "1.0.0";
+
+
propagatedBuildInputs = [ requests ];
+
+
src = fetchFromGitHub {
+
owner = "trygveaa";
+
repo = "python-tunigo";
+
rev = "v${version}";
+
sha256 = "07q9girrjjffzkn8xj4l3ynf9m4psi809zf6f81f54jdb330p2fs";
+
};
+
+
checkInputs = [ mock responses pytest ];
+
+
checkPhase = ''
+
py.test
+
'';
+
+
meta = with lib; {
+
description = "Python API for the browse feature of Spotify";
+
homepage = https://github.com/trygveaa/python-tunigo;
+
license = licenses.asl20;
+
};
+
}
+2 -10
pkgs/development/python-modules/txtorcon/default.nix
···
, GeoIP}:
buildPythonPackage rec {
-
name = "${pname}-${version}";
pname = "txtorcon";
-
version = "0.19.3";
+
version = "0.20.0";
checkInputs = [ pytest mock lsof GeoIP ];
propagatedBuildInputs = [
···
src = fetchPypi {
inherit pname version;
-
sha256 = "1za4qag4g2lbw695v4ssxqc2aspdyknnbn2diylwg8q9g5k9cczp";
+
sha256 = "dc80cb76b3ddacef6d671c0a088cb1a45274c0858554c32ce55d0f41421c740e";
};
-
-
# ipaddress isn't required for Python 3 although it's in requirements.txt.
-
# Because ipaddress doesn't install on Python 3, remove the requirement so the
-
# installation of this package doesn't fail on Python 3.
-
postPatch = "" + lib.optionalString isPy3k ''
-
substituteInPlace requirements.txt --replace "ipaddress>=1.0.16" ""
-
'';
# Skip a failing test until fixed upstream:
# https://github.com/meejah/txtorcon/issues/250
+23
pkgs/development/python-modules/virtual-display/default.nix
···
+
{ lib, buildPythonPackage, fetchPypi, EasyProcess }:
+
+
buildPythonPackage rec {
+
pname = "PyVirtualDisplay";
+
version = "0.2.1";
+
+
propagatedBuildInputs = [ EasyProcess ];
+
+
src = fetchPypi {
+
inherit pname version;
+
sha256 = "012883851a992f9c53f0dc6a512765a95cf241bdb734af79e6bdfef95c6e9982";
+
};
+
+
# requires X server
+
doCheck = false;
+
+
meta = with lib; {
+
description = "Python wrapper for Xvfb, Xephyr and Xvnc";
+
homepage = "https://github.com/ponty/pyvirtualdisplay";
+
license = licenses.bsdOriginal;
+
maintainers = with maintainers; [ layus ];
+
};
+
}
+23
pkgs/development/python-modules/wrapt/default.nix
···
+
{ lib
+
, buildPythonPackage
+
, fetchPypi
+
}:
+
+
buildPythonPackage rec {
+
pname = "wrapt";
+
version = "1.10.11";
+
+
# No tests in archive
+
doCheck = false;
+
+
src = fetchPypi {
+
inherit pname version;
+
sha256 = "d4d560d479f2c21e1b5443bbd15fe7ec4b37fe7e53d335d3b9b0a7b1226fe3c6";
+
};
+
+
meta = {
+
description = "Module for decorators, wrappers and monkey patching";
+
license = lib.licenses.bsd2;
+
homepage = https://github.com/GrahamDumpleton/wrapt;
+
};
+
}
+2 -2
pkgs/development/python-modules/xarray/default.nix
···
buildPythonPackage rec {
pname = "xarray";
-
version = "0.10.0";
+
version = "0.10.1";
src = fetchPypi {
inherit pname version;
-
sha256 = "af1449e8df84a6eb09eb1d56c1dc5ac7f24a9563d4f2b9391ff364dc0c62344c";
+
sha256 = "cc183c2d7b1788cdaeb895102b1b6c2b6a3544182ff714e92f404c29db93cc9d";
};
checkInputs = [ pytest ];
+21
pkgs/development/python-modules/xdot/default.nix
···
+
{ lib, buildPythonPackage, fetchPypi
+
, wrapGAppsHook, gobjectIntrospection, pygobject3, graphviz, gnome3 }:
+
+
buildPythonPackage rec {
+
pname = "xdot";
+
version = "0.9";
+
+
src = fetchPypi {
+
inherit pname version;
+
sha256 = "01v9vmgdxz1q2m2vq2b4aqx4ycw7grc0l4is673ygvyg9rk02dx3";
+
};
+
+
nativeBuildInputs = [ wrapGAppsHook ];
+
propagatedBuildInputs = [ gobjectIntrospection pygobject3 graphviz gnome3.gtk ];
+
+
meta = with lib; {
+
description = "xdot.py is an interactive viewer for graphs written in Graphviz's dot";
+
homepage = https://github.com/jrfonseca/xdot.py;
+
license = licenses.lgpl3Plus;
+
};
+
}
+23
pkgs/development/python-modules/yahooweather/default.nix
···
+
{ lib, buildPythonPackage, fetchPypi, isPy3k }:
+
+
buildPythonPackage rec {
+
pname = "yahooweather";
+
version = "0.10";
+
+
disabled = !isPy3k;
+
+
src = fetchPypi {
+
inherit pname version;
+
sha256 = "0bsxmngkpzvqm50i2cnxjzhpbdhb8s10ly8h5q08696cjihqdkpa";
+
};
+
+
# Tests require network access
+
doCheck = false;
+
+
meta = with lib; {
+
description = "Provide an interface to the Yahoo! Weather RSS feed";
+
homepage = https://github.com/pvizeli/yahooweather;
+
license = licenses.bsd2;
+
maintainers = with maintainers; [ peterhoeg ];
+
};
+
}
+2 -2
pkgs/development/python-modules/zeroconf/default.nix
···
buildPythonPackage rec {
pname = "zeroconf";
-
version = "0.19.1";
+
version = "0.20.0";
name = "${pname}-${version}";
src = fetchPypi {
inherit pname version;
-
sha256 = "0ykzg730n915qbrq9bn5pn06bv6rb5zawal4sqjyfnjjm66snkj3";
+
sha256 = "6e3f1e7b5871e3d1410ac29b9fb85aafc1e2d661ed596b07a6f84559a475efcb";
};
propagatedBuildInputs = [ netifaces six enum-compat ];
+2 -2
pkgs/development/tools/analysis/autoflake/default.nix
···
with python3Packages;
buildPythonApplication rec {
pname = "autoflake";
-
version = "1.0";
+
version = "1.1";
name = "${pname}-${version}";
src = fetchPypi {
inherit pname version;
-
sha256 = "12k4v8w7awqp83j727y0iwcbjqj3ccvbai7c9m0wgbmq5xkvav8a";
+
sha256 = "a74d684a7a02654f74582addc24a3016c06809316cc140457a4fe93a1e6ed131";
};
propagatedBuildInputs = [ pyflakes ];
+24 -2
pkgs/development/tools/build-managers/meson/default.nix
···
-
{ lib, python3Packages }:
-
python3Packages.buildPythonApplication rec {
+
{ lib, python3Packages, stdenv, targetPlatform, writeTextDir, m4 }: let
+
targetPrefix = lib.optionalString stdenv.isCross
+
(targetPlatform.config + "-");
+
in python3Packages.buildPythonApplication rec {
version = "0.44.0";
pname = "meson";
name = "${pname}-${version}";
···
'';
setupHook = ./setup-hook.sh;
+
+
crossFile = writeTextDir "cross-file.conf" ''
+
[binaries]
+
c = '${targetPrefix}cc'
+
cpp = '${targetPrefix}c++'
+
ar = '${targetPrefix}ar'
+
strip = '${targetPrefix}strip'
+
pkgconfig = 'pkg-config'
+
+
[properties]
+
needs_exe_wrapper = true
+
+
[host_machine]
+
system = '${targetPlatform.parsed.kernel.name}'
+
cpu_family = '${targetPlatform.parsed.cpu.family}'
+
cpu = '${targetPlatform.parsed.cpu.name}'
+
endian = ${if targetPlatform.isLittleEndian then "'little'" else "'big'"}
+
'';
+
+
inherit (stdenv) cc isCross;
meta = with lib; {
homepage = http://mesonbuild.com;
+7 -3
pkgs/development/tools/build-managers/meson/setup-hook.sh
···
fi
# Build release by default.
-
mesonFlags="--buildtype=${mesonBuildType:-release} $mesonFlags"
+
if [ -n "@isCross@" ]; then
+
crossMesonFlags="--cross-file=@crossFile@/cross-file.conf"
+
fi
+
+
mesonFlags="${crossMesonFlags+$crossMesonFlags }--buildtype=${mesonBuildType:-release} $mesonFlags"
echo "meson flags: $mesonFlags ${mesonFlagsArray[@]}"
-
meson build $mesonFlags "${mesonFlagsArray[@]}"
+
CC=@cc@/bin/cc CXX=@cc@/bin/c++ meson build $mesonFlags "${mesonFlagsArray[@]}"
cd build
if ! [[ -v enableParallelBuilding ]]; then
···
mesonCheckPhase() {
runHook preCheck
-
meson test
+
meson test --print-errorlogs
runHook postCheck
}
+1 -1
pkgs/development/tools/misc/autogen/default.nix
···
nativeBuildInputs = [ which pkgconfig perl ]
# autogen needs a build autogen when cross-compiling
++ stdenv.lib.optionals (stdenv.hostPlatform != stdenv.buildPlatform) [
-
buildPackages.autogen buildPackages.texinfo ];
+
buildPackages.buildPackages.autogen buildPackages.texinfo ];
buildInputs = [
guile libxml2
];
+2 -2
pkgs/development/tools/misc/automake/automake-1.15.x.nix pkgs/development/tools/misc/automake/automake-1.16.x.nix
···
{ stdenv, fetchurl, perl, autoconf, makeWrapper, doCheck ? false }:
stdenv.mkDerivation rec {
-
name = "automake-1.15.1";
+
name = "automake-1.16";
src = fetchurl {
url = "mirror://gnu/automake/${name}.tar.xz";
-
sha256 = "1bzd9g32dfm4rsbw93ld9x7b5nc1y6i4m6zp032qf1i28a8s6sxg";
+
sha256 = "12jvcmkcmd5p14b41w9f7ixd3sca97pymd6lqbkwnl8qn6bjv3zr";
};
nativeBuildInputs = [ autoconf perl ];
+4 -3
pkgs/development/tools/misc/strace/default.nix
···
-
{ stdenv, fetchurl, perl, libunwind }:
+
{ stdenv, fetchurl, perl, libunwind, buildPackages }:
stdenv.mkDerivation rec {
name = "strace-${version}";
···
sha256 = "0dsw6xcfrmygidp1dj2ch8cl8icrar7789snkb2r8gh78kdqhxjw";
};
+
depsBuildBuild = [ buildPackages.stdenv.cc ];
nativeBuildInputs = [ perl ];
-
buildInputs = [ libunwind ]; # support -k
+
buildInputs = stdenv.lib.optional libunwind.supportsHost [ libunwind ]; # support -k
-
configureFlags = stdenv.lib.optional stdenv.hostPlatform.isAarch64 "--enable-mpers=check";
+
configureFlags = stdenv.lib.optional (stdenv.hostPlatform.isAarch64 || stdenv.hostPlatform.isRiscV) "--enable-mpers=check";
meta = with stdenv.lib; {
homepage = http://strace.io/;
+2 -2
pkgs/development/tools/parsing/re2c/default.nix
···
stdenv.mkDerivation rec {
name = "re2c-${version}";
-
version = "0.16";
+
version = "1.0.3";
sourceRoot = "${src.name}/re2c";
···
owner = "skvadrik";
repo = "re2c";
rev = version;
-
sha256 = "0cijgmbyx34nwl2jmsswggkgvzy364871rkbxz8biq9x8xrhhjw5";
+
sha256 = "0grx7nl9fwcn880v5ssjljhcb9c5p2a6xpwil7zxpmv0rwnr3yqi";
};
nativeBuildInputs = [ autoreconfHook ];
+1 -1
pkgs/development/tools/pew/default.nix
···
platforms = platforms.all;
maintainers = with maintainers; [ berdario ];
};
-
}
+
}
+2 -2
pkgs/development/tools/pipenv/default.nix
···
with python3Packages; buildPythonApplication rec {
name = "${pname}-${version}";
pname = "pipenv";
-
version = "10.1.0";
+
version = "10.1.2";
src = fetchPypi {
inherit pname version;
-
sha256 = "3732350e3cd8cc033d66748c418bab4b018dc0a4fcf1687f17a103ac44eac0c6";
+
sha256 = "ce6dbb305fb1f262dba0dcb50c06591e4d146f7bfe079cc9f0ce3f89c7516ae9";
};
LC_ALL = "en_US.UTF-8";
+2 -2
pkgs/development/tools/vcstool/default.nix
···
buildPythonApplication rec {
name = "${pname}-${version}";
pname = "vcstool";
-
version = "0.1.31";
+
version = "0.1.33";
src = fetchPypi {
inherit pname version;
-
sha256 = "0n2zkvy2km9ky9lljf1mq5nqyqi5qqzfy2a6sgkjg2grvsk7abxc";
+
sha256 = "1140d3ecafb2c42c2c1a309950c7f327b09b548c00fbf6e37c8f44b8a610dfbc";
};
propagatedBuildInputs = [ pyyaml ];
+5 -7
pkgs/development/tools/yq/default.nix
···
-
{ stdenv, lib, buildPythonApplication, fetchPypi, pyyaml, jq }:
+
{ stdenv, lib, buildPythonApplication, fetchPypi, pyyaml, xmltodict, jq }:
buildPythonApplication rec {
-
pname = "yq";
-
version = "2.3.4";
+
version = "2.4.1";
-
propagatedBuildInputs = [ pyyaml jq ];
+
propagatedBuildInputs = [ pyyaml xmltodict jq ];
# ValueError: underlying buffer has been detached
doCheck = false;
src = fetchPypi {
inherit pname version;
-
sha256 = "04ckrlmin8m176iicyfhddp4r0yry5hx306vhfglf8mcp1jkga78";
+
sha256 = "4833d4055b0f1c1f1a2fd292421b3472da39c7dc2727d7819efd11065a5fd310";
};
meta = with lib; {
description = "Command-line YAML processor - jq wrapper for YAML documents.";
-
homepage = https://pypi.python.org/pypi/yq;
+
homepage = https://github.com/kislyuk/yq;
license = [ licenses.asl20 ];
maintainers = [ maintainers.womfoo ];
};
-
}
+13
pkgs/misc/cups/cups-clean-dirty.patch
···
+
diff --git a/scheduler/main.c b/scheduler/main.c
+
index 8925c8373..acf031684 100644
+
--- a/scheduler/main.c
+
+++ b/scheduler/main.c
+
@@ -893,7 +893,7 @@ main(int argc, /* I - Number of command-line args */
+
* Write dirty config/state files...
+
*/
+
+
- if (DirtyCleanTime && current_time >= DirtyCleanTime && cupsArrayCount(Clients) == 0)
+
+ if (DirtyCleanTime && current_time >= DirtyCleanTime)
+
cupsdCleanDirty();
+
+
#ifdef __APPLE__
+1 -1
pkgs/misc/cups/default.nix
···
url = "https://git.archlinux.org/svntogit/packages.git/plain/trunk/cups-systemd-socket.patch?h=packages/cups";
sha256 = "1ddgdlg9s0l2ph6l8lx1m1lx6k50gyxqi3qiwr44ppq1rxs80ny5";
})
+
./cups-clean-dirty.patch
];
nativeBuildInputs = [ pkgconfig removeReferencesTo ];
···
configureFlags = [
"--localstatedir=/var"
"--sysconfdir=/etc"
-
"--with-rundir=/run"
"--enable-raw-printing"
"--enable-threads"
] ++ optionals stdenv.isLinux [
+9 -6
pkgs/os-specific/linux/apparmor/default.nix
···
, swig
, ncurses
, pam
+
, buildPackages
}:
let
···
};
prePatchCommon = ''
-
substituteInPlace ./common/Make.rules --replace "/usr/bin/pod2man" "${perl}/bin/pod2man"
-
substituteInPlace ./common/Make.rules --replace "/usr/bin/pod2html" "${perl}/bin/pod2html"
+
substituteInPlace ./common/Make.rules --replace "/usr/bin/pod2man" "${buildPackages.perl}/bin/pod2man"
+
substituteInPlace ./common/Make.rules --replace "/usr/bin/pod2html" "${buildPackages.perl}/bin/pod2html"
substituteInPlace ./common/Make.rules --replace "/usr/include/linux/capability.h" "${linuxHeaders}/include/linux/capability.h"
substituteInPlace ./common/Make.rules --replace "/usr/share/man" "share/man"
'';
···
swig
ncurses
which
+
perl
];
-
buildInputs = [
+
buildInputs = stdenv.lib.optionals (!stdenv.isCross) [
perl
python
];
···
inherit patches;
postPatch = "cd ./libraries/libapparmor";
-
configureFlags = "--with-python --with-perl";
+
# https://gitlab.com/apparmor/apparmor/issues/1
+
configureFlags = stdenv.lib.optionalString (!stdenv.isCross) "--with-python --with-perl";
-
outputs = [ "out" "python" ];
+
outputs = if stdenv.isCross then [ "out" ] else [ "out" "python" ];
-
postInstall = ''
+
postInstall = stdenv.lib.optionalString (!stdenv.isCross) ''
mkdir -p $python/lib
mv $out/lib/python* $python/lib/
'';
+4 -2
pkgs/os-specific/linux/fuse/common.nix
···
, fusePackages, utillinux, gettext
, autoconf, automake, libtool
, meson, ninja, pkgconfig
+
, autoreconfHook
}:
let
···
rev = name;
sha256 = sha256Hash;
};
+
+
preAutoreconf = "touch config.rpath";
patches =
stdenv.lib.optional
···
nativeBuildInputs = if isFuse3
then [ meson ninja pkgconfig ]
-
else [ autoconf automake libtool ];
-
buildInputs = stdenv.lib.optional (!isFuse3) gettext;
+
else [ autoreconfHook gettext ];
outputs = [ "out" ] ++ stdenv.lib.optional isFuse3 "common";
+8 -3
pkgs/os-specific/linux/iputils/default.nix
···
# Disable idn usage w/musl: https://github.com/iputils/iputils/pull/111
makeFlags = [ "USE_GNUTLS=no" ] ++ stdenv.lib.optional stdenv.hostPlatform.isMusl "USE_IDN=no";
+
depsBuildBuild = [ opensp SGMLSpm docbook_sgml_dtd_31 ];
buildInputs = [
-
libsysfs opensp openssl libcap docbook_sgml_dtd_31 SGMLSpm libgcrypt nettle
+
libsysfs openssl libcap libgcrypt nettle
] ++ stdenv.lib.optional (!stdenv.hostPlatform.isMusl) libidn;
-
buildFlags = "man all ninfod";
+
# ninfod probably could build on cross, but the Makefile doesn't pass --host etc to the sub configure...
+
buildFlags = "man all" + stdenv.lib.optionalString (!stdenv.isCross) " ninfod";
installPhase =
''
mkdir -p $out/bin
-
cp -p ping tracepath clockdiff arping rdisc ninfod/ninfod $out/bin/
+
cp -p ping tracepath clockdiff arping rdisc $out/bin/
+
if [ -x ninfod/ninfod ]; then
+
cp -p ninfod/ninfod $out/bin
+
fi
mkdir -p $out/share/man/man8
cp -p \
-8
pkgs/os-specific/linux/kernel-headers/default.nix
···
echo "${version}-default" > $out/include/config/kernel.release
'';
-
# !!! hacky
-
fixupPhase = ''
-
ln -s asm $out/include/asm-$platform
-
if test "$platform" = "i386" -o "$platform" = "x86_64"; then
-
ln -s asm $out/include/asm-x86
-
fi
-
'';
-
meta = with lib; {
description = "Header files and scripts for Linux kernel";
license = licenses.gpl2;
+6 -1
pkgs/os-specific/linux/libaio/default.nix
···
-
{ stdenv, fetchurl }:
+
{ stdenv, fetchurl, fetchpatch }:
stdenv.mkDerivation rec {
version = "0.3.110";
···
url = "https://fedorahosted.org/releases/l/i/libaio/${name}.tar.gz";
sha256 = "0zjzfkwd1kdvq6zpawhzisv7qbq1ffs343i5fs9p498pcf7046g0";
};
+
+
patches = [ (fetchpatch {
+
url = https://pagure.io/libaio/c/da47c32b2ff39e52fbed1622c34b86bc88d7c217.patch;
+
sha256 = "1kqpiswjn549s3w3m89bw5qkl7bw5pvq6gp5cdzd926ymlgivj5c";
+
}) ];
makeFlags = "prefix=$(out)";
+14 -5
pkgs/os-specific/linux/systemd/default.nix
···
, patchelf
, getent
, hostPlatform
+
, buildPackages
}:
assert stdenv.isLinux;
let
-
pythonLxmlEnv = python3Packages.python.withPackages ( ps: with ps; [ python3Packages.lxml ]);
+
pythonLxmlEnv = buildPackages.python3Packages.python.withPackages ( ps: with ps; [ python3Packages.lxml ]);
in stdenv.mkDerivation rec {
version = "237";
···
[ pkgconfig intltool gperf libxslt gettext docbook_xsl docbook_xml_dtd_42 docbook_xml_dtd_45
ninja meson
coreutils # meson calls date, stat etc.
-
pythonLxmlEnv glibcLocales
-
patchelf getent
+
glibcLocales
+
patchelf getent m4
];
buildInputs =
[ linuxHeaders libcap kmod xz pam acl
-
/* cryptsetup */ libuuid m4 glib libgcrypt libgpgerror libidn2
+
/* cryptsetup */ libuuid glib libgcrypt libgpgerror libidn2
libmicrohttpd kexectools libseccomp libffi audit lz4 bzip2 libapparmor
iptables gnu-efi
+
# This is actually native, but we already pull it from buildPackages
+
pythonLxmlEnv
];
#dontAddPrefix = true;
···
"-Dsysvinit-path="
"-Dsysvrcnd-path="
+
+
"-Dkill-path=${coreutils}/bin/kill"
+
"-Dkmod-path=${kmod}/bin/kmod"
+
"-Dsulogin-path=${utillinux}/bin/sulogin"
+
"-Dmount-path=${utillinux}/bin/mount"
+
"-Dumount-path=${utillinux}/bin/umount"
];
preConfigure = ''
···
for i in src/basic/generate-gperfs.py src/resolve/generate-dns_type-gperf.py src/test/generate-sym-test.py ; do
substituteInPlace $i \
-
--replace "#!/usr/bin/env python" "#!${python3Packages.python}/bin/python"
+
--replace "#!/usr/bin/env python" "#!${buildPackages.python3Packages.python}/bin/python"
done
substituteInPlace src/journal/catalog.c \
+2 -1
pkgs/os-specific/linux/util-linux/default.nix
···
crossAttrs = {
# Work around use of `AC_RUN_IFELSE'.
-
preConfigure = "export scanf_cv_type_modifier=ms";
+
preConfigure = "export scanf_cv_type_modifier=ms" + lib.optionalString (systemd != null)
+
"\nconfigureFlags+=\" --with-systemd --with-systemdsystemunitdir=$bin/lib/systemd/system/\"";
};
preConfigure = lib.optionalString (systemd != null) ''
+9 -1
pkgs/servers/dns/bind/default.nix
···
{ stdenv, lib, fetchurl, openssl, libtool, perl, libxml2
-
, enableSeccomp ? false, libseccomp ? null }:
+
, enableSeccomp ? false, libseccomp ? null, buildPackages
+
}:
assert enableSeccomp -> libseccomp != null;
···
STD_CDEFINES = [ "-DDIG_SIGCHASE=1" ]; # support +sigchase
+
depsBuildBuild = [ buildPackages.stdenv.cc ];
+
configureFlags = [
"--localstatedir=/var"
"--with-libtool"
···
"--without-pkcs11"
"--without-purify"
"--without-python"
+
"--with-randomdev=/dev/random"
+
"--with-ecdsa"
+
"--with-gost"
+
"--without-eddsa"
+
"--with-aes"
] ++ lib.optional enableSeccomp "--enable-seccomp";
postInstall = ''
+62
pkgs/servers/home-assistant/appdaemon.nix
···
+
{ lib, python3, fetchpatch }:
+
+
let
+
python = python3.override {
+
packageOverrides = self: super: {
+
+
aiohttp = super.aiohttp.overridePythonAttrs (oldAttrs: rec {
+
version = "2.3.10";
+
src = oldAttrs.src.override {
+
inherit version;
+
sha256 = "8adda6583ba438a4c70693374e10b60168663ffa6564c5c75d3c7a9055290964";
+
};
+
});
+
+
yarl = super.yarl.overridePythonAttrs (oldAttrs: rec {
+
version = "1.1.0";
+
src = oldAttrs.src.override {
+
inherit version;
+
sha256 = "6af895b45bd49254cc309ac0fe6e1595636a024953d710e01114257736184698";
+
};
+
});
+
+
aiohttp-jinja2 = super.aiohttp-jinja2.overridePythonAttrs (oldAttrs: rec {
+
version = "0.15.0";
+
src = oldAttrs.src.override {
+
inherit version;
+
sha256 = "0f390693f46173d8ffb95669acbb0e2a3ec54ecce676703510ad47f1a6d9dc83";
+
};
+
});
+
+
};
+
};
+
+
in python.pkgs.buildPythonApplication rec {
+
pname = "appdaemon";
+
version = "3.0.0b4";
+
+
src = python.pkgs.fetchPypi {
+
inherit pname version;
+
sha256 = "0dfc37ecd8e1344001d4970d32813c581aba1385cf3b82c69f8b7df2eca6c019";
+
};
+
+
patches = fetchpatch {
+
url = "${meta.homepage}/pull/252.patch";
+
sha256 = "164qvgdibd2645yxm4n16bhnan13wrchfi70jp2ff806fwdg9mg0";
+
};
+
+
propagatedBuildInputs = with python.pkgs; [
+
aiohttp aiohttp-jinja2 astral bcrypt daemonize feedparser iso8601
+
jinja2 pyyaml requests sseclient voluptuous websocket_client yarl
+
];
+
+
# no tests implemented
+
doCheck = false;
+
+
meta = with lib; {
+
description = "Sandboxed python execution environment for writing automation apps for Home Assistant";
+
homepage = https://github.com/home-assistant/appdaemon;
+
license = licenses.mit;
+
maintainers = with maintainers; [ peterhoeg dotlambda ];
+
};
+
}
+7 -7
pkgs/servers/home-assistant/component-packages.nix
···
"envisalink" = ps: with ps; [ ];
"fan.xiaomi_miio" = ps: with ps; [ ];
"feedreader" = ps: with ps; [ feedparser ];
-
"ffmpeg" = ps: with ps; [ ];
-
"frontend" = ps: with ps; [ ];
+
"ffmpeg" = ps: with ps; [ ha-ffmpeg ];
+
"frontend" = ps: with ps; [ user-agents ];
"gc100" = ps: with ps; [ ];
"goalfeed" = ps: with ps; [ ];
"google" = ps: with ps; [ google_api_python_client oauth2client ];
···
"sensor.crimereports" = ps: with ps; [ ];
"sensor.cups" = ps: with ps; [ ];
"sensor.darksky" = ps: with ps; [ ];
-
"sensor.deluge" = ps: with ps; [ ];
+
"sensor.deluge" = ps: with ps; [ deluge-client ];
"sensor.deutsche_bahn" = ps: with ps; [ ];
"sensor.dht" = ps: with ps; [ ];
"sensor.discogs" = ps: with ps; [ discogs_client ];
···
"sensor.xbox_live" = ps: with ps; [ ];
"sensor.yahoo_finance" = ps: with ps; [ ];
"sensor.yr" = ps: with ps; [ xmltodict ];
-
"sensor.yweather" = ps: with ps; [ ];
+
"sensor.yweather" = ps: with ps; [ yahooweather ];
"sensor.zestimate" = ps: with ps; [ xmltodict ];
"shiftr" = ps: with ps; [ paho-mqtt ];
"skybell" = ps: with ps; [ ];
···
"switch.acer_projector" = ps: with ps; [ pyserial ];
"switch.anel_pwrctrl" = ps: with ps; [ ];
"switch.broadlink" = ps: with ps; [ ];
-
"switch.deluge" = ps: with ps; [ ];
+
"switch.deluge" = ps: with ps; [ deluge-client ];
"switch.digitalloggers" = ps: with ps; [ ];
"switch.dlink" = ps: with ps; [ ];
"switch.edimax" = ps: with ps; [ ];
···
"twilio" = ps: with ps; [ twilio ];
"upcloud" = ps: with ps; [ ];
"updater" = ps: with ps; [ distro ];
-
"upnp" = ps: with ps; [ ];
+
"upnp" = ps: with ps; [ miniupnpc ];
"usps" = ps: with ps; [ ];
"vacuum.roomba" = ps: with ps; [ ];
"vacuum.xiaomi_miio" = ps: with ps; [ ];
···
"weather.darksky" = ps: with ps; [ ];
"weather.metoffice" = ps: with ps; [ ];
"weather.openweathermap" = ps: with ps; [ ];
-
"weather.yweather" = ps: with ps; [ ];
+
"weather.yweather" = ps: with ps; [ yahooweather ];
"wemo" = ps: with ps; [ ];
"wink" = ps: with ps; [ ];
"xiaomi_aqara" = ps: with ps; [ ];
+7
pkgs/servers/home-assistant/default.nix
···
sha256 = "af7315c9fa99e0bfd195a21106c82c81619b42f0bd9b6e287b797c6b6b6a9918";
};
});
+
astral = super.astral.overridePythonAttrs (oldAttrs: rec {
+
version = "1.5";
+
src = oldAttrs.src.override {
+
inherit version;
+
sha256 = "527628fbfe90c1596c3950ff84ebd07ecc10c8fb1044c903a0519b5057700cb6";
+
};
+
});
hass-frontend = super.callPackage ./frontend.nix { };
};
};
+10 -6
pkgs/servers/http/nginx/modules.nix
···
{
brotli = {
-
src = fetchFromGitHub {
-
owner = "google";
+
src = let gitsrc = pkgs.fetchFromGitHub {
+
owner = "eustas";
repo = "ngx_brotli";
-
rev = "bfd2885b2da4d763fed18f49216bb935223cd34b";
-
sha256 = "04yx1n0wi3l2x37jd1ynl9951qxkn8xp42yv0mfp1qz9svips81n";
-
fetchSubmodules = true;
-
};
+
rev = "8cd9dd5fc232d3a01644584921e52dae99034779";
+
sha256 = "0ap1kf51hzb8yvvxjkcj9hnmsmmd5drcay64hd4n7vybf9dqw6g6";
+
}; in pkgs.runCommandNoCC "ngx_brotli-src" {} ''
+
cp -a ${gitsrc} $out
+
substituteInPlace $out/config \
+
--replace /usr/local ${lib.getDev pkgs.brotli}
+
'';
+
inputs = [ pkgs.brotli ];
};
rtmp ={
+10 -10
pkgs/servers/sql/postgresql/default.nix
···
in {
postgresql93 = common {
-
version = "9.3.20";
+
version = "9.3.21";
psqlSchema = "9.3";
-
sha256 = "1jp6lac4b0q6hb28yrdsl0ymzn75gg59hvp5zasarf3mf3b8l4zb";
+
sha256 = "1q2038rvqa00rpk8sjbnwb19x64fcyjphw9x087432hq918vrfmr";
};
postgresql94 = common {
-
version = "9.4.15";
+
version = "9.4.16";
psqlSchema = "9.4";
-
sha256 = "1i5c67gg4fj38hk07h6w6m4mqak84bhnblqsjbpiamg4x33v7gqj";
+
sha256 = "10ay2cy3m4g66jwvxknc0f0w6mv2v7vm0dzkq92s9n7446v65g6w";
};
postgresql95 = common {
-
version = "9.5.10";
+
version = "9.5.11";
psqlSchema = "9.5";
-
sha256 = "10gjfn16bhzkmlqfsn384w49db0j39bg3n4majwxdpjd17g7lpcl";
+
sha256 = "1pf8fwx8a6vn344b80a1bf2p4hjg06sh69kb2qwswxbsw9scv0l1";
};
postgresql96 = common {
-
version = "9.6.6";
+
version = "9.6.7";
psqlSchema = "9.6";
-
sha256 = "0m417h30s18rwa7yzkqqcdb22ifpcda2fpg2cyx8bxvjp3ydz71r";
+
sha256 = "1ii4lrw8sncnz5g0fss1011shjhmbajzzhxx4f0bgsniq7rkvgif";
};
postgresql100 = common {
-
version = "10.1";
+
version = "10.2";
psqlSchema = "10.0";
-
sha256 = "04z7lm4h94625vbncwv98svycqr942n3q47ailqaczkszqjlxjrw";
+
sha256 = "1bav2iyi93h866skrrlqlvsp4sfv1sfww1s305zpzffxcadh0cpy";
};
}
+1 -3
pkgs/shells/bash/4.4.nix
···
hardeningDisable = [ "format" ];
-
outputs = [ "out" "dev" "doc" "info" ]
-
# the man pages are small and useful enough, so include them in $out in interactive builds
-
++ stdenv.lib.optional (!interactive) "man";
+
outputs = [ "out" "dev" "man" "doc" "info" ];
NIX_CFLAGS_COMPILE = ''
-DSYS_BASHRC="/etc/bashrc"
+7
pkgs/shells/bash/bash-4.4-patches.nix
···
(patch "010" "01lfhrkdsdkdz8ypzapr614ras23x7ckjnr60aa5bzkaqprccrc4")
(patch "011" "038p7mhnq9m65g505hi3827jkf9f35nd1cy00w8mwafpyxp44mnx")
(patch "012" "0gh6lbb1rwpk44pvbamm6vzdfi50xnwkqd9v7s8cjwk3pz973hps")
+
(patch "013" "1djkx0w9v62q78gz3jsvamj1jq53i6hbfrfhhsw86ihwpjnfy98v")
+
(patch "014" "0z5ikcq9zyxw79d0z36r5p0mspnb5piavbv03jmlan1wnknmrxx7")
+
(patch "015" "09n307fi1j257abhm295k6ksmnzw47ka2zhnr0i5lbdnpvn04xnk")
+
(patch "016" "1cgi1y6mifm8hsgv4avj5ih76535js3qba1sqwbfvp7si76927sh")
+
(patch "017" "0w6jpj2giakji1ir83rpkx1y7n7xqppah3j748m6dm38hywr0gvp")
+
(patch "018" "1k58h4wxbsg7r4rwhrvzx5hfbapba2nxjysbhh6qp6ki5ys99i2v")
+
(patch "019" "07n1i5610lbs672x1s8g82qn3qfj06s0ip3z80sri0g8vxp0s5r7")
]
-11
pkgs/stdenv/adapters.nix
···
in stdenv // {
mkDerivation =
{ nativeBuildInputs ? []
-
, selfNativeBuildInput ? args.crossAttrs.selfNativeBuildInput or false
, ...
} @ args:
-
let
-
# *BuildInputs exists temporarily as another name for
-
# *HostInputs.
-
-
# The base stdenv already knows that nativeBuildInputs and
-
# buildInputs should be built with the usual gcc-wrapper
-
# And the same for propagatedBuildInputs.
-
nativeDrv = stdenv.mkDerivation args;
-
in
stdenv.mkDerivation (args // {
nativeBuildInputs = nativeBuildInputs
-
++ stdenv.lib.optional selfNativeBuildInput nativeDrv
# without proper `file` command, libtool sometimes fails
# to recognize 64-bit DLLs
++ stdenv.lib.optional (hostPlatform.config == "x86_64-w64-mingw32") pkgs.file
+14 -11
pkgs/stdenv/darwin/default.nix
···
libcxx,
allowedRequisites ? null}:
let
+
name = "bootstrap-stage${toString step}";
+
buildPackages = lib.optionalAttrs (last ? stdenv) {
inherit (last) stdenv;
};
-
coreutils = { name = "coreutils-9.9.9"; outPath = bootstrapTools; };
-
gnugrep = { name = "gnugrep-9.9.9"; outPath = bootstrapTools; };
+
coreutils = { name = "${name}-coreutils"; outPath = bootstrapTools; };
+
gnugrep = { name = "${name}-gnugrep"; outPath = bootstrapTools; };
bintools = import ../../build-support/bintools-wrapper {
inherit shell;
···
nativeLibc = false;
inherit buildPackages coreutils gnugrep;
libc = last.pkgs.darwin.Libsystem;
-
bintools = { name = "binutils-9.9.9"; outPath = bootstrapTools; };
+
bintools = { name = "${name}-binutils"; outPath = bootstrapTools; };
};
cc = if isNull last then "/dev/null" else import ../../build-support/cc-wrapper {
···
extraPackages = lib.optional (libcxx != null) libcxx;
nativeTools = false;
+
propagateDoc = false;
nativeLibc = false;
inherit buildPackages coreutils gnugrep bintools;
libc = last.pkgs.darwin.Libsystem;
isClang = true;
-
cc = { name = "clang-9.9.9"; outPath = bootstrapTools; };
+
cc = { name = "${name}-clang"; outPath = bootstrapTools; };
};
thisStdenv = import ../generic {
+
name = "${name}-stdenv-darwin";
+
inherit config shell extraNativeBuildInputs extraBuildInputs;
allowedRequisites = if allowedRequisites == null then null else allowedRequisites ++ [
cc.expand-response-params cc.bintools
];
-
-
name = "stdenv-darwin-boot-${toString step}";
buildPlatform = localSystem;
hostPlatform = localSystem;
···
overrides = self: super: with stage0; rec {
darwin = super.darwin // {
Libsystem = stdenv.mkDerivation {
-
name = "bootstrap-Libsystem";
+
name = "bootstrap-stage0-Libsystem";
buildCommand = ''
mkdir -p $out
ln -s ${bootstrapTools}/lib $out/lib
···
};
libcxx = stdenv.mkDerivation {
-
name = "bootstrap-libcxx";
+
name = "bootstrap-stage0-libcxx";
phases = [ "installPhase" "fixupPhase" ];
installPhase = ''
mkdir -p $out/lib $out/include
···
};
libcxxabi = stdenv.mkDerivation {
-
name = "bootstrap-libcxxabi";
+
name = "bootstrap-stage0-libcxxabi";
buildCommand = ''
mkdir -p $out/lib
ln -s ${bootstrapTools}/lib/libc++abi.dylib $out/lib/libc++abi.dylib
···
inherit binutils binutils-raw;
};
in import ../generic rec {
+
name = "stdenv-darwin";
+
inherit config;
inherit (pkgs.stdenv) fetchurlBoot;
-
-
name = "stdenv-darwin";
buildPlatform = localSystem;
hostPlatform = localSystem;
+12 -10
pkgs/stdenv/linux/default.nix
···
let
thisStdenv = import ../generic {
-
name = "stdenv-linux-boot";
+
name = "${name}-stdenv-linux";
buildPlatform = localSystem;
hostPlatform = localSystem;
targetPlatform = localSystem;
···
cc = if isNull prevStage.gcc-unwrapped
then null
else lib.makeOverridable (import ../../build-support/cc-wrapper) {
+
name = "${name}-gcc-wrapper";
nativeTools = false;
+
propagateDoc = false;
nativeLibc = false;
buildPackages = lib.optionalAttrs (prevStage ? stdenv) {
inherit (prevStage) stdenv;
···
isGNU = true;
libc = getLibc prevStage;
inherit (prevStage) coreutils gnugrep;
-
name = name;
stdenvNoCC = prevStage.ccWrapperStdenv;
};
···
# Build a dummy stdenv with no GCC or working fetchurl. This is
# because we need a stdenv to build the GCC wrapper and fetchurl.
(prevStage: stageFun prevStage {
-
name = null;
+
name = "bootstrap-stage0";
overrides = self: super: {
# We thread stage0's stdenv through under this name so downstream stages
···
# create a dummy Glibc here, which will be used in the stdenv of
# stage1.
${localSystem.libc} = self.stdenv.mkDerivation {
-
name = "bootstrap-${localSystem.libc}";
+
name = "bootstrap-stage0-${localSystem.libc}";
buildCommand = ''
mkdir -p $out
ln -s ${bootstrapTools}/lib $out/lib
···
};
gcc-unwrapped = bootstrapTools;
binutils = import ../../build-support/bintools-wrapper {
+
name = "bootstrap-stage0-binutils-wrapper";
nativeTools = false;
nativeLibc = false;
buildPackages = { };
libc = getLibc self;
inherit (self) stdenvNoCC coreutils gnugrep;
bintools = bootstrapTools;
-
name = "bootstrap-binutils-wrapper";
};
coreutils = bootstrapTools;
gnugrep = bootstrapTools;
···
# simply re-export those packages in the middle stage(s) using the
# overrides attribute and the inherit syntax.
(prevStage: stageFun prevStage {
-
name = "bootstrap-gcc-wrapper";
+
name = "bootstrap-stage1";
# Rebuild binutils to use from stage2 onwards.
overrides = self: super: {
···
# 2nd stdenv that contains our own rebuilt binutils and is used for
# compiling our own Glibc.
(prevStage: stageFun prevStage {
-
name = "bootstrap-gcc-wrapper";
+
name = "bootstrap-stage2";
overrides = self: super: {
inherit (prevStage)
···
# one uses the rebuilt Glibc from stage2. It still uses the recent
# binutils and rest of the bootstrap tools, including GCC.
(prevStage: stageFun prevStage {
-
name = "bootstrap-gcc-wrapper";
+
name = "bootstrap-stage3";
overrides = self: super: rec {
inherit (prevStage)
···
# Construct a fourth stdenv that uses the new GCC. But coreutils is
# still from the bootstrap tools.
(prevStage: stageFun prevStage {
-
name = "";
+
name = "bootstrap-stage4";
overrides = self: super: {
# Zlib has to be inherited and not rebuilt in this stage,
···
bintools = self.binutils;
libc = getLibc self;
inherit (self) stdenvNoCC coreutils gnugrep;
-
name = "";
shell = self.bash + "/bin/bash";
};
};
···
(prevStage: {
inherit config overlays;
stdenv = import ../generic rec {
+
name = "stdenv-linux";
+
buildPlatform = localSystem;
hostPlatform = localSystem;
targetPlatform = localSystem;
+20 -28
pkgs/tools/admin/awscli/default.nix
···
-
{ stdenv
-
, buildPythonPackage
-
, fetchPypi
-
, botocore
-
, bcdoc
-
, s3transfer
-
, six
-
, colorama
-
, docutils
-
, rsa
-
, pyyaml
+
{ lib
+
, python
, groff
, less
}:
let
-
colorama_3_7 = colorama.overrideAttrs (old: rec {
-
name = "${pname}-${version}";
-
pname = "colorama";
-
version = "0.3.7";
-
src = old.src.override {
-
inherit version;
-
sha256 = "0avqkn6362v7k2kg3afb35g4sfdvixjgy890clip4q174p9whhz0";
+
py = python.override {
+
packageOverrides = self: super: {
+
colorama = super.colorama.overridePythonAttrs (oldAttrs: rec {
+
version = "0.3.7";
+
src = oldAttrs.src.override {
+
inherit version;
+
sha256 = "0avqkn6362v7k2kg3afb35g4sfdvixjgy890clip4q174p9whhz0";
+
};
+
});
};
-
});
+
};
-
in buildPythonPackage rec {
+
in py.pkgs.buildPythonApplication rec {
pname = "awscli";
-
version = "1.14.41";
-
namePrefix = "";
+
version = "1.14.47";
-
src = fetchPypi {
+
src = py.pkgs.fetchPypi {
inherit pname version;
-
sha256 = "8cf2a52d56f26e22e2fbd7b72649ef1d3de8930df7a730d7f27418d129bb3a6a";
+
sha256 = "269483910c820ae5b4f60021375f07e4f1c23f86505e1b9e29243880a660c1d8";
};
# No tests included
doCheck = false;
-
propagatedBuildInputs = [
+
propagatedBuildInputs = with py.pkgs; [
botocore
bcdoc
s3transfer
six
-
colorama_3_7
+
colorama
docutils
rsa
pyyaml
···
rm $out/bin/aws.cmd
'';
-
meta = with stdenv.lib; {
+
meta = with lib; {
homepage = https://aws.amazon.com/cli/;
description = "Unified tool to manage your AWS services";
-
license = stdenv.lib.licenses.asl20;
+
license = licenses.asl20;
maintainers = with maintainers; [ muflax ];
};
}
+3 -3
pkgs/tools/compression/lzip/default.nix
···
stdenv.mkDerivation rec {
name = "lzip-${version}";
-
version = "1.19";
+
version = "1.20";
buildInputs = [ texinfo ];
src = fetchurl {
url = "mirror://savannah/lzip/${name}.tar.gz";
-
sha256 = "1abbch762gv8rjr579q3qyyk6c80plklbv2mw4x0vg71dgsw9bgz";
+
sha256 = "0319q59kb8g324wnj7xzbr7vvlx5bcs13lr34j0zb3kqlyjq2fy9";
};
-
configureFlags = "CPPFLAGS=-DNDEBUG CFLAGS=-O3 CXXFLAGS=-O3";
+
configureFlags = "CPPFLAGS=-DNDEBUG CFLAGS=-O3 CXXFLAGS=-O3" + stdenv.lib.optionalString stdenv.isCross " CXX=${stdenv.cc.targetPrefix}c++";
setupHook = ./lzip-setup-hook.sh;
+2 -2
pkgs/tools/filesystems/btrfs-progs/default.nix
···
, asciidoc, xmlto, docbook_xml_dtd_45, docbook_xsl, libxslt, zstd
}:
-
let version = "4.14.1"; in
+
let version = "4.15.1"; in
stdenv.mkDerivation rec {
name = "btrfs-progs-${version}";
src = fetchurl {
url = "mirror://kernel/linux/kernel/people/kdave/btrfs-progs/btrfs-progs-v${version}.tar.xz";
-
sha256 = "1palnddw3d50kyflwk1j4xapbc6jniid6j5i9dsr8l8a7nkv7ich";
+
sha256 = "15izak6jg6pqr6ha9447cdrdj9k6kfiarvwlrj53cpvrsv02l437";
};
nativeBuildInputs = [
+2 -2
pkgs/tools/filesystems/e2fsprogs/default.nix
···
{ stdenv, buildPackages, fetchurl, pkgconfig, libuuid, gettext, texinfo }:
stdenv.mkDerivation rec {
-
name = "e2fsprogs-1.43.8";
+
name = "e2fsprogs-1.43.9";
src = fetchurl {
url = "mirror://sourceforge/e2fsprogs/${name}.tar.gz";
-
sha256 = "1pn33rap3lcjm3gx07pmgyhx4j634gja63phmi4g5dq8yj0z8ciz";
+
sha256 = "15rqvkzylqqckshfy7vmk15k7wds2rh3k1pwrkrs684p3g0gzq2v";
};
outputs = [ "bin" "dev" "out" "man" "info" ];
+2 -2
pkgs/tools/misc/you-get/default.nix
···
buildPythonApplication rec {
pname = "you-get";
-
version = "0.4.1025";
+
version = "0.4.1040";
# Tests aren't packaged, but they all hit the real network so
# probably aren't suitable for a build environment anyway.
···
src = fetchPypi {
inherit pname version;
-
sha256 = "1dbalpwhzn39kgswjy84720wfjssa087adavbwig53krsjdvhj6k";
+
sha256 = "fdc9021e8b1cf936aad4bd6c74b80ea8fa3573b807c41242ba781e247f8c8ca8";
};
meta = with stdenv.lib; {
+3 -7
pkgs/tools/networking/dhcp/default.nix
···
stdenv.mkDerivation rec {
name = "dhcp-${version}";
-
version = "4.3.4";
+
version = "4.3.6-P1";
src = fetchurl {
url = "http://ftp.isc.org/isc/dhcp/${version}/${name}.tar.gz";
-
sha256 = "0zk0imll6bfyp9p4ndn8h6s4ifijnw5bhixswifr5rnk7pp5l4gm";
+
sha256 = "1hx3az6ckvgvybr1ag4k9kqr8zfcpzcww4vpw5gz0mi8y2z7gl9g";
};
patches =
-
[ # Don't bring down interfaces, because wpa_supplicant doesn't
-
# recover when the wlan interface goes down. Instead just flush
-
# all addresses, routes and neighbours of the interface.
-
./flush-if.patch
-
+
[
# Make sure that the hostname gets set on reboot. Without this
# patch, the hostname doesn't get set properly if the old
# hostname (i.e. before reboot) is equal to the new hostname.
-76
pkgs/tools/networking/dhcp/flush-if.patch
···
-
diff --exclude '*~' -rc dhcp-4.1.0p1-orig/client/scripts/linux dhcp-4.1.0p1/client/scripts/linux
-
*** dhcp-4.1.0p1-orig/client/scripts/linux 2008-05-23 15:56:07.000000000 +0200
-
--- dhcp-4.1.0p1/client/scripts/linux 2009-09-29 17:56:57.000000000 +0200
-
***************
-
*** 67,72 ****
-
--- 67,80 ----
-
exit $exit_status
-
}
-
-
+ # Delete the old addresses, routes and ARP information for this
-
+ # interface.
-
+ flush_if() {
-
+ ${ip} -4 address flush dev $interface
-
+ ${ip} -4 route flush dev $interface
-
+ ${ip} -4 neighbour flush dev $interface
-
+ }
-
+
-
# Invoke the local dhcp client enter hooks, if they exist.
-
if [ -f /etc/dhclient-enter-hooks ]; then
-
exit_status=0
-
***************
-
*** 150,159 ****
-
ifconfig $interface:0- inet 0
-
fi
-
if [ x$old_ip_address != x ] && [ x$old_ip_address != x$new_ip_address ]; then
-
! # IP address changed. Bringing down the interface will delete all routes,
-
! # and clear the ARP cache.
-
! ifconfig $interface inet 0 down
-
!
-
fi
-
if [ x$old_ip_address = x ] || [ x$old_ip_address != x$new_ip_address ] || \
-
[ x$reason = xBOUND ] || [ x$reason = xREBOOT ]; then
-
--- 158,165 ----
-
ifconfig $interface:0- inet 0
-
fi
-
if [ x$old_ip_address != x ] && [ x$old_ip_address != x$new_ip_address ]; then
-
! # IP address changed.
-
! flush_if
-
fi
-
if [ x$old_ip_address = x ] || [ x$old_ip_address != x$new_ip_address ] || \
-
[ x$reason = xBOUND ] || [ x$reason = xREBOOT ]; then
-
***************
-
*** 189,196 ****
-
ifconfig $interface:0- inet 0
-
fi
-
if [ x$old_ip_address != x ]; then
-
! # Shut down interface, which will delete routes and clear arp cache.
-
! ifconfig $interface inet 0 down
-
fi
-
if [ x$alias_ip_address != x ]; then
-
ifconfig $interface:0 inet $alias_ip_address $alias_subnet_arg
-
--- 195,201 ----
-
ifconfig $interface:0- inet 0
-
fi
-
if [ x$old_ip_address != x ]; then
-
! flush_if
-
fi
-
if [ x$alias_ip_address != x ]; then
-
ifconfig $interface:0 inet $alias_ip_address $alias_subnet_arg
-
***************
-
*** 225,231 ****
-
make_resolv_conf
-
exit_with_hooks 0
-
fi
-
! ifconfig $interface inet 0 down
-
exit_with_hooks 1
-
fi
-
-
--- 230,236 ----
-
make_resolv_conf
-
exit_with_hooks 0
-
fi
-
! flush_if
-
exit_with_hooks 1
-
fi
-
+11 -13
pkgs/tools/networking/dhcp/set-hostname.patch
···
-
diff -ru -x '*~' dhcp-4.1.2-P1-orig//client/scripts/linux dhcp-4.1.2-P1//client/scripts/linux
-
--- dhcp-4.1.2-P1-orig//client/scripts/linux 2010-09-15 00:49:48.000000000 +0200
-
+++ dhcp-4.1.2-P1//client/scripts/linux 2011-04-01 16:08:10.984372269 +0200
+
--- a/client/scripts/linux 2010-09-15 00:49:48.000000000 +0200
+
+++ b/client/scripts/linux 2011-04-01 16:08:10.984372269 +0200
@@ -133,9 +133,7 @@
-
[ x$current_hostname = "x(none)" ] || \
-
[ x$current_hostname = xlocalhost ] || \
-
[ x$current_hostname = x$old_host_name ]; then
-
- if [ x$new_host_name != x$old_host_name ]; then
-
- hostname "$new_host_name"
-
- fi
-
+ hostname "$new_host_name"
-
fi
-
-
if [ x$old_ip_address != x ] && [ x$alias_ip_address != x ] && \
+
[ "$current_hostname" = '(none)' ] ||
+
[ "$current_hostname" = 'localhost' ] ||
+
[ "$current_hostname" = "$old_host_name" ]; then
+
- if [ "$new_host_name" != "$old_host_name" ]; then
+
- hostname "$new_host_name"
+
- fi
+
+ hostname "$new_host_name"
+
fi
+
fi
+6 -1
pkgs/tools/networking/dhcpcd/default.nix
···
-
{ stdenv, fetchurl, pkgconfig, udev }:
+
{ stdenv, fetchurl, pkgconfig, udev, runtimeShellPackage }:
stdenv.mkDerivation rec {
# when updating this to >=7, check, see previous reverts:
···
# Check that the udev plugin got built.
postInstall = stdenv.lib.optional (udev != null) "[ -e $out/lib/dhcpcd/dev/udev.so ]";
+
+
# TODO shlevy remove once patchShebangs is fixed
+
postFixup = ''
+
find $out -type f -print0 | xargs --null sed -i 's|${stdenv.shellPackage}|${runtimeShellPackage}|'
+
'';
meta = {
description = "A client for the Dynamic Host Configuration Protocol (DHCP)";
+2 -2
pkgs/tools/security/gnupg/22.nix
···
stdenv.mkDerivation rec {
name = "gnupg-${version}";
-
version = "2.2.4";
+
version = "2.2.5";
src = fetchurl {
url = "mirror://gnupg/gnupg/${name}.tar.bz2";
-
sha256 = "1v7j8v2ww1knknbrhw3svfrqkmf9ll58iq0dczbsdpqgg1j3w6j0";
+
sha256 = "0mzgibq4dpxh3i9anmwg12xdjry28y83icafhx3j3djg5niqk89z";
};
nativeBuildInputs = [ pkgconfig ];
+3 -2
pkgs/tools/security/gnupg/fix-libusb-include-path.patch
···
--- a/configure
+++ b/configure
-
@@ -8872,7 +8872,7 @@
+
@@ -8987,8 +8987,7 @@
{ $as_echo "$as_me:${as_lineno-$LINENO}: checking libusb include dir" >&5
$as_echo_n "checking libusb include dir... " >&6; }
usb_incdir_found="no"
-
- for _incdir in "" "/usr/include/libusb-1.0" "/usr/local/include/libusb-1.0"; do
+
- for _incdir in "" "/usr/include/libusb-1.0" \
+
- "/usr/local/include/libusb-1.0" "/usr/pkg/include/libusb-1.0"; do
+ for _incdir in "$($PKG_CONFIG --variable=includedir libusb-1.0)/libusb-1.0"; do
_libusb_save_cppflags=$CPPFLAGS
if test -n "${_incdir}"; then
+2 -1
pkgs/tools/security/sudo/default.nix
···
installFlags="sudoers_uid=$(id -u) sudoers_gid=$(id -g) sysconfdir=$out/etc rundir=$TMPDIR/dummy vardir=$TMPDIR/dummy"
'';
-
buildInputs = [ coreutils pam groff ];
+
nativeBuildInputs = [ groff ];
+
buildInputs = [ pam ];
enableParallelBuilding = true;
+2 -2
pkgs/tools/text/gawk/default.nix
···
inherit (stdenv.lib) optional;
in
stdenv.mkDerivation rec {
-
name = "gawk-4.2.0";
+
name = "gawk-4.2.1";
src = fetchurl {
url = "mirror://gnu/gawk/${name}.tar.xz";
-
sha256 = "1wm9lqj77y7xz07zi0n187aqm8zavzxzpm1j53ahxz81q0qwvwyl";
+
sha256 = "0lam2zf3n7ak4pig8w46lhx9hzx50kj2v2yj1616mm26wy2rf4fi";
};
# When we do build separate interactive version, it makes sense to always include man.
+3 -1
pkgs/tools/text/groff/default.nix
···
] ++ stdenv.lib.optionals (ghostscript != null) [
"--with-gs=${ghostscript}/bin/gs"
] ++ stdenv.lib.optionals (stdenv.buildPlatform != stdenv.hostPlatform) [
-
"ac_cv_path_PERL=${perl}/bin/perl"
+
"ac_cv_path_PERL=${buildPackages.perl}/bin/perl"
];
doCheck = true;
···
substituteInPlace $perl/bin/grog \
--replace $out/lib/groff/grog $perl/lib/groff/grog
+
'' + stdenv.lib.optionalString (stdenv.buildPlatform != stdenv.hostPlatform) ''
+
find $perl/ -type f -print0 | xargs --null sed -i 's|${buildPackages.perl}|${perl}|'
'';
meta = with stdenv.lib; {
+2 -2
pkgs/tools/typesetting/docbook2x/default.nix
···
{ fetchurl, stdenv, texinfo, perl
-
, XMLSAX, XMLParser, XMLNamespaceSupport
+
, XMLSAX, XMLSAXBase, XMLParser, XMLNamespaceSupport
, groff, libxml2, libxslt, gnused, libiconv, opensp
, docbook_xml_dtd_43
, makeWrapper }:
···
# XXX: We work around the fact that `wrapProgram' doesn't support
# spaces below by inserting escaped backslashes.
wrapProgram $out/bin/$i --prefix PERL5LIB : \
-
"${XMLSAX}/lib/perl5/site_perl:${XMLParser}/lib/perl5/site_perl" \
+
"${XMLSAX}/lib/perl5/site_perl:${XMLSAXBase}/lib/perl5/site_perl:${XMLParser}/lib/perl5/site_perl" \
--prefix PERL5LIB : \
"${XMLNamespaceSupport}/lib/perl5/site_perl" \
--prefix XML_CATALOG_FILES "\ " \
+10 -2
pkgs/tools/typesetting/tex/texlive/bin.nix
···
sha256 = "1amjrxyasplv4alfwcxwnw4nrx7dz2ydmddkq16k6hg90i9njq81";
};
+
patches = [
+
(fetchurl {
+
name = "texlive-poppler-0.59.patch";
+
url = https://git.archlinux.org/svntogit/packages.git/plain/trunk/texlive-poppler-0.59.patch?h=packages/texlive-bin&id=6308ec39bce2a4d735f6ff8a4e94473748d7b450;
+
sha256 = "1c4ikq4kxw48bi3i33bzpabrjvbk01fwjr2lz20gkc9kv8l0bg3n";
+
})
+
];
+
configureFlags = [
"--with-banner-add=/NixOS.org"
"--disable-missing" "--disable-native-texlive-build"
···
core = stdenv.mkDerivation rec {
name = "texlive-bin-${version}";
-
inherit (common) src;
+
inherit (common) src patches;
outputs = [ "out" "doc" ];
···
# http://tex.stackexchange.com/questions/97999/when-to-use-luajittex-in-favour-of-luatex
];
-
patches = [ ./luatex-gcc7.patch ];
+
patches = common.patches ++ [ ./luatex-gcc7.patch ];
configureScript = ":";
+1 -7
pkgs/tools/typesetting/tex/texlive/default.nix
···
# remove dependency-heavy packages from the basic collections
collection-basic = orig.collection-basic // {
-
deps = removeAttrs orig.collection-basic.deps [ "luatex" "metafont" "xdvi" ];
-
};
-
latex = orig.latex // {
-
deps = removeAttrs orig.latex.deps [ "luatex" ];
+
deps = removeAttrs orig.collection-basic.deps [ "metafont" "xdvi" ];
};
# add them elsewhere so that collections cover all packages
-
collection-luatex = orig.collection-luatex // {
-
deps = orig.collection-luatex.deps // { inherit (tl) luatex; };
-
};
collection-metapost = orig.collection-metapost // {
deps = orig.collection-metapost.deps // { inherit (tl) metafont; };
};
+15 -58
pkgs/top-level/all-packages.nix
···
avfs = callPackage ../tools/filesystems/avfs { };
-
awscli = pythonPackages.callPackage ../tools/admin/awscli { };
+
awscli = callPackage ../tools/admin/awscli { };
awsebcli = callPackage ../tools/virtualization/awsebcli {};
···
doas = callPackage ../tools/security/doas { };
docbook2x = callPackage ../tools/typesetting/docbook2x {
-
inherit (perlPackages) XMLSAX XMLParser XMLNamespaceSupport;
+
inherit (perlPackages) XMLSAX XMLSAXBase XMLParser XMLNamespaceSupport;
};
docbook2mdoc = callPackage ../tools/misc/docbook2mdoc { };
···
### SHELLS
+
runtimeShell = "${runtimeShellPackage}/bin/bash";
+
runtimeShellPackage = bash;
+
bash = lowPrio (callPackage ../shells/bash/4.4.nix {
texinfo = null;
interactive = stdenv.isCygwin; # patch for cygwin requires readline support
···
inherit binutils;
};
-
gcc45 = lowPrio (wrapCC (callPackage ../development/compilers/gcc/4.5 {
-
inherit noSysDirs;
-
texinfo = texinfo4;
-
-
ppl = null;
-
cloogppl = null;
-
-
# bootstrapping a profiled compiler does not work in the sheevaplug:
-
# http://gcc.gnu.org/bugzilla/show_bug.cgi?id=43944
-
profiledCompiler = !stdenv.isArm;
-
-
libcCross = if targetPlatform != buildPlatform then libcCross else null;
-
}));
-
gcc48 = lowPrio (wrapCC (callPackage ../development/compilers/gcc/4.8 {
inherit noSysDirs;
···
inherit (gnome2) libart_lgpl;
});
-
gnat = gnat45; # failed to make 4.6 or 4.8 build
-
-
gnat45 = wrapCC (gcc45.cc.override {
-
name = "gnat";
-
langCC = false;
-
langC = true;
-
langAda = true;
-
profiledCompiler = false;
-
inherit gnatboot;
-
# We can't use the ppl stuff, because we would have
-
# libstdc++ problems.
-
cloogppl = null;
-
ppl = null;
-
});
-
-
gnatboot = wrapGCC-old (callPackage ../development/compilers/gnatboot {});
-
gnu-smalltalk = callPackage ../development/compilers/gnu-smalltalk {
emacsSupport = config.emacsSupport or false;
};
···
langGo = true;
profiledCompiler = false;
});
-
-
ghdl_mcode = callPackage_i686 ../development/compilers/ghdl {
-
flavour = "mcode";
-
};
-
-
ghdl_llvm = callPackage ../development/compilers/ghdl {
-
flavour = "llvm";
-
};
gcl = callPackage ../development/compilers/gcl {
gmp = gmp4;
···
bintools = if targetPlatform.isDarwin then darwin.binutils else binutils;
libc = if targetPlatform != hostPlatform then libcCross else stdenv.cc.libc;
};
-
# legacy version, used for gnat bootstrapping
-
wrapGCC-old = baseGCC: callPackage ../build-support/gcc-wrapper-old {
-
nativeTools = stdenv.cc.nativeTools or false;
-
nativeLibc = stdenv.cc.nativeLibc or false;
-
nativePrefix = stdenv.cc.nativePrefix or "";
-
gcc = baseGCC;
-
libc = glibc;
-
};
wrapBintoolsWith = { bintools, libc }: bintoolsWrapperFun {
nativeTools = targetPlatform == hostPlatform && stdenv.cc.nativeTools or false;
···
autocutsel = callPackage ../tools/X11/autocutsel{ };
-
automake = automake115x;
+
automake = automake116x;
automake111x = callPackage ../development/tools/misc/automake/automake-1.11.x.nix { };
-
automake115x = callPackage ../development/tools/misc/automake/automake-1.15.x.nix { };
+
automake116x = callPackage ../development/tools/misc/automake/automake-1.16.x.nix { };
automoc4 = callPackage ../development/tools/misc/automoc4 { };
···
yodl = callPackage ../development/tools/misc/yodl { };
yq = callPackage ../development/tools/yq {
-
inherit (python3Packages) buildPythonApplication fetchPypi pyyaml;
+
inherit (python3Packages) buildPythonApplication fetchPypi pyyaml xmltodict;
};
winpdb = callPackage ../development/tools/winpdb { };
···
suffix = "min";
-
poppler_qt4 = poppler.override {
-
qt4Support = true;
-
suffix = "qt4";
-
};
+
poppler_qt4 = callPackage ../development/libraries/poppler/qt4.nix { };
poppler_utils = poppler.override { suffix = "utils"; utils = true; };
···
postgis = callPackage ../development/libraries/postgis { };
-
protobuf = callPackage ../development/libraries/protobuf/3.4.nix { };
+
protobuf = protobuf3_4;
+
protobuf3_5 = callPackage ../development/libraries/protobuf/3.5.nix { };
+
protobuf3_4 = callPackage ../development/libraries/protobuf/3.4.nix { };
protobuf3_1 = callPackage ../development/libraries/protobuf/3.1.nix { };
protobuf2_5 = callPackage ../development/libraries/protobuf/2.5.nix { };
···
apacheHttpdPackages = apacheHttpdPackagesFor pkgs.apacheHttpd pkgs.apacheHttpdPackages;
apacheHttpdPackages_2_4 = apacheHttpdPackagesFor pkgs.apacheHttpd_2_4 pkgs.apacheHttpdPackages_2_4;
+
appdaemon = callPackage ../servers/home-assistant/appdaemon.nix { };
+
archiveopteryx = callPackage ../servers/mail/archiveopteryx/default.nix { };
atlassian-confluence = callPackage ../servers/atlassian/confluence.nix { };
···
iproute = callPackage ../os-specific/linux/iproute { };
iputils = callPackage ../os-specific/linux/iputils {
-
inherit (perlPackages) SGMLSpm;
+
inherit (buildPackages.buildPackages.perlPackages) SGMLSpm;
iptables = callPackage ../os-specific/linux/iptables { };
+71 -20
pkgs/top-level/perl-packages.nix
···
constant = buildPerlPackage rec {
name = "constant-1.33";
src = fetchurl {
-
url = "mirror://cpan/authors/id/R/RJ/RJBS/${name}.tar.gz";
+
url = mirror://cpan/authors/id/R/RJ/RJBS/constant-1.33.tar.gz;
sha256 = "015my616h5l2fswh52x4dp3n007gk5lax83ww9q6cmzb610mv5kr";
};
+
propagatedBuildInputs = [ TestSimple13 ];
+
buildInputs = [ ExtUtilsMakeMaker ];
};
constantboolean = buildPerlPackage {
···
};
DBI = buildPerlPackage rec {
-
name = "DBI-1.636";
+
name = "DBI-${version}";
+
version = "1.6.36";
src = fetchurl {
url = "mirror://cpan/authors/id/T/TI/TIMB/${name}.tar.gz";
sha256 = "8f7ddce97c04b4b7a000e65e5d05f679c964d62c8b02c94c1a7d815bb2dd676c";
};
+
postInstall = stdenv.lib.optionalString (perl ? crossVersion) ''
+
mkdir -p $out/lib/perl5/site_perl/cross_perl/${perl.version}/DBI
+
cat > $out/lib/perl5/site_perl/cross_perl/${perl.version}/DBI.pm <<EOF
+
package DBI;
+
BEGIN {
+
our \$VERSION = "$version";
+
}
+
1;
+
EOF
+
+
autodir=$(echo $out/lib/perl5/site_perl/${perl.version}/*/auto/DBI)
+
cat > $out/lib/perl5/site_perl/cross_perl/${perl.version}/DBI/DBD.pm <<EOF
+
package DBI::DBD;
+
use Exporter ();
+
use vars qw (@ISA @EXPORT);
+
@ISA = qw(Exporter);
+
@EXPORT = qw(dbd_postamble);
+
sub dbd_postamble {
+
return '
+
# --- This section was generated by DBI::DBD::dbd_postamble()
+
DBI_INSTARCH_DIR=$autodir
+
DBI_DRIVER_XST=$autodir/Driver.xst
+
+
# The main dependency (technically correct but probably not used)
+
\$(BASEEXT).c: \$(BASEEXT).xsi
+
+
# This dependency is needed since MakeMaker uses the .xs.o rule
+
\$(BASEEXT)\$(OBJ_EXT): \$(BASEEXT).xsi
+
+
\$(BASEEXT).xsi: \$(DBI_DRIVER_XST) $autodir/Driver_xst.h
+
\$(PERL) -p -e "s/~DRIVER~/\$(BASEEXT)/g" \$(DBI_DRIVER_XST) > \$(BASEEXT).xsi
+
+
# ---
+
';
+
}
+
1;
+
EOF
+
'';
meta = {
homepage = http://dbi.perl.org/;
description = "Database independent interface for Perl";
···
};
ExtUtilsMakeMaker = buildPerlPackage {
-
name = "ExtUtils-MakeMaker-6.98";
+
name = "ExtUtils-MakeMaker-7.32";
src = fetchurl {
-
url = mirror://cpan/authors/id/B/BI/BINGOS/ExtUtils-MakeMaker-6.98.tar.gz;
-
sha256 = "2eb023189e5fa6b9dcc66858b1fde953d1f1b86f971ec5ab42dd36c172da63ef";
+
url = mirror://cpan/authors/id/B/BI/BINGOS/ExtUtils-MakeMaker-7.32.tar.gz;
+
sha256 = "9a269f52ab59b125eb80b968271d9f49da0975d43e51363dbfd1695000ed69de";
};
-
propagatedBuildInputs =
-
[ ParseCPANMeta JSONPP JSONPPCompat5006 CPANMetaYAML FileCopyRecursive ];
meta = {
homepage = https://metacpan.org/release/ExtUtils-MakeMaker;
description = "Create a module Makefile";
···
url = mirror://cpan/authors/id/M/MA/MAKAMAKA/JSON-2.90.tar.gz;
sha256 = "127yppvr17qik9pkd1vy901hs4l13kg6rhp76jdgcyask35v7nsd";
};
+
preConfigure = ''
+
cp lib/JSON/backportPP.pm{,orig}
+
echo "1;" > lib/JSON/backportPP.pm
+
'';
+
postConfigure = ''
+
cp lib/JSON/backportPP.pm{,orig}
+
'';
buildInputs = [ TestPod ];
meta = {
description = "JSON (JavaScript Object Notation) encoder/decoder";
···
TestSimple = null;
TestSimple13 = buildPerlPackage rec {
-
name = "Test-Simple-1.302120";
+
name = "Test-Simple-1.302125";
src = fetchurl {
-
url = "mirror://cpan/authors/id/E/EX/EXODIST/${name}.tar.gz";
-
sha256 = "c82360092d4dacd6e3248b613fa00053072fe9cf55d022f1e0f427f51d04346c";
+
url = mirror://cpan/authors/id/E/EX/EXODIST/Test-Simple-1.302125.tar.gz;
+
sha256 = "8a3785a4fa60c4c5ae0c5cac2f3312242f2b36ca20e368d8a9ec22b4061aa317";
meta = {
description = "Basic utilities for writing tests";
license = with stdenv.lib.licenses; [ artistic1 gpl1Plus ];
maintainers = [ maintainers.rycee ];
+
buildInputs = [ ExtUtilsMakeMaker ];
TestSpec = buildPerlPackage rec {
···
XMLNamespaceSupport = buildPerlPackage {
-
name = "XML-NamespaceSupport-1.11";
+
name = "XML-NamespaceSupport-1.12";
src = fetchurl {
-
url = mirror://cpan/authors/id/P/PE/PERIGRIN/XML-NamespaceSupport-1.11.tar.gz;
-
sha256 = "1sklgcldl3w6gn706vx1cgz6pm4y5lfgsjxnfqyk20pilgq530bd";
+
url = mirror://cpan/authors/id/P/PE/PERIGRIN/XML-NamespaceSupport-1.12.tar.gz;
+
sha256 = "1vz5pbi4lm5fhq2slrs2hlp6bnk29863abgjlcx43l4dky2rbsa7";
+
propagatedBuildInputs = [ constant ];
+
buildInputs = [ ExtUtilsMakeMaker ];
XMLParser = buildPerlPackage {
···
XMLSAX = buildPerlPackage {
-
name = "XML-SAX-0.96";
+
name = "XML-SAX-1.00";
src = fetchurl {
-
url = mirror://cpan/authors/id/G/GR/GRANTM/XML-SAX-0.96.tar.gz;
-
sha256 = "024fbjgg6s87j0y3yik55plzf7d6qpn7slwd03glcb54mw9zdglv";
+
url = mirror://cpan/authors/id/G/GR/GRANTM/XML-SAX-1.00.tar.gz;
+
sha256 = "1qra9k3wszjxvsgbragl55z3qba4nri0ipmjaxfib4l6xxj6bsj5";
-
propagatedBuildInputs = [XMLNamespaceSupport];
+
propagatedBuildInputs = [ XMLNamespaceSupport XMLSAXBase ];
postInstall = ''
perl -MXML::SAX -e "XML::SAX->add_parser(q(XML::SAX::PurePerl))->save_parsers()"
'';
+
buildInputs = [ ExtUtilsMakeMaker ];
XMLSAXBase = buildPerlPackage {
-
name = "XML-SAX-Base-1.08";
+
name = "XML-SAX-Base-1.09";
src = fetchurl {
-
url = mirror://cpan/authors/id/G/GR/GRANTM/XML-SAX-Base-1.08.tar.gz;
-
sha256 = "666270318b15f88b8427e585198abbc19bc2e6ccb36dc4c0a4f2d9807330219e";
+
url = mirror://cpan/authors/id/G/GR/GRANTM/XML-SAX-Base-1.09.tar.gz;
+
sha256 = "66cb355ba4ef47c10ca738bd35999723644386ac853abbeb5132841f5e8a2ad0";
meta = {
description = "Base class for SAX Drivers and Filters";
homepage = https://github.com/grantm/XML-SAX-Base;
license = with stdenv.lib.licenses; [ artistic1 gpl1Plus ];
+
buildInputs = [ ExtUtilsMakeMaker TestSimple13 ];
XMLSAXWriter = buildPerlPackage {
+35 -335
pkgs/top-level/python-packages.nix
···
hdf5 = pkgs.hdf5-mpi;
};
+
ha-ffmpeg = callPackage ../development/python-modules/ha-ffmpeg { };
+
habanero = callPackage ../development/python-modules/habanero { };
i3ipc = callPackage ../development/python-modules/i3ipc { };
···
aiohttp-cors = callPackage ../development/python-modules/aiohttp/cors.nix { };
+
aiohttp-jinja2 = callPackage ../development/python-modules/aiohttp-jinja2 { };
+
alabaster = callPackage ../development/python-modules/alabaster {};
alembic = callPackage ../development/python-modules/alembic {};
···
gui = false;
};
+
deluge-client = callPackage ../development/python-modules/deluge-client { };
arrow = callPackage ../development/python-modules/arrow { };
-
-
async = buildPythonPackage rec {
-
name = "async-0.6.1";
-
disabled = isPy3k;
-
meta.maintainers = with maintainers; [ ];
-
-
buildInputs = with self; [ pkgs.zlib ];
-
doCheck = false;
-
-
src = pkgs.fetchurl {
-
url = "mirror://pypi/a/async/${name}.tar.gz";
-
sha256 = "1lfmjm8apy9qpnpbq8g641fd01qxh9jlya5g2d6z60vf8p04rla1";
-
};
-
};
asynctest = callPackage ../development/python-modules/asynctest { };
···
};
};
-
-
binaryornot = buildPythonPackage rec {
-
name = "binaryornot-${version}";
-
version = "0.4.0";
-
-
src = pkgs.fetchurl {
-
url ="mirror://pypi/b/binaryornot/${name}.tar.gz";
-
sha256 = "1j4f51dxic39mdwf6alj7gd769wy6mhk916v031wjali51xkh3xb";
-
};
-
-
buildInputs = with self; [ hypothesis ];
-
-
propagatedBuildInputs = with self; [ chardet ];
-
-
meta = {
-
homepage = https://github.com/audreyr/binaryornot;
-
description = "Ultra-lightweight pure Python package to check if a file is binary or text";
-
license = licenses.bsd3;
-
};
-
};
-
+
binaryornot = callPackage ../development/python-modules/binaryornot { };
bitbucket_api = buildPythonPackage rec {
name = "bitbucket-api-0.4.4";
···
maintainers = [ stdenv.lib.maintainers.tv ];
};
};
+
+
miniupnpc = callPackage ../development/python-modules/miniupnpc {};
mixpanel = buildPythonPackage rec {
version = "4.0.2";
···
};
};
-
ftputil = buildPythonPackage rec {
-
version = "3.3";
-
name = "ftputil-${version}";
-
-
src = pkgs.fetchurl {
-
url = "mirror://pypi/f/ftputil/${name}.tar.gz";
-
sha256 = "1714w0v6icw2xjx5m54yv2qgkq49qwxwllq4gdb7wkz25iiapr8b";
-
};
-
-
disabled = isPy3k;
-
-
meta = {
-
description = "High-level FTP client library (virtual file system and more)";
-
homepage = https://pypi.python.org/pypi/ftputil;
-
platforms = platforms.linux;
-
license = licenses.bsd2; # "Modified BSD license, says pypi"
-
};
-
};
+
ftputil = callPackage ../development/python-modules/ftputil { };
fudge = buildPythonPackage rec {
name = "fudge-1.1.0";
···
};
};
+
dj-database-url = callPackage ../development/python-modules/dj-database-url { };
+
djmail = callPackage ../development/python-modules/djmail { };
pillowfight = buildPythonPackage rec {
···
hg-git = buildPythonPackage rec {
name = "hg-git-${version}";
-
version = "0.8.10";
+
version = "0.8.11";
disabled = isPy3k;
src = pkgs.fetchurl {
url = "mirror://pypi/h/hg-git/${name}.tar.gz";
-
sha256 = "03dzcs4l7hzq59sgjhngxgmi34xfyd7jcxyjl0f68rwq8b1yqrp3";
+
sha256 = "08kw1sj3sq1q1571hwkc51w20ks9ysmlg93pcnmd6gr66bz02dyn";
};
propagatedBuildInputs = with self; [ dulwich ];
···
description = "Push and pull from a Git server using Mercurial";
homepage = http://hg-git.github.com/;
maintainers = with maintainers; [ koral ];
+
license = stdenv.lib.licenses.gpl2;
};
};
···
};
};
-
konfig = buildPythonPackage rec {
-
name = "konfig-${version}";
-
version = "1.1";
-
-
# konfig unconditionaly depend on configparser, even if it is part of
-
# the standard library in python 3.2 or above.
-
disabled = isPy3k;
-
-
src = pkgs.fetchgit {
-
url = https://github.com/mozilla-services/konfig.git;
-
rev = "refs/tags/${version}";
-
sha256 = "1h780fbrv275dcik4cs3rincza805z6q726b48r4a0qmh5d8160c";
-
};
-
-
propagatedBuildInputs = with self; [ configparser six ];
-
-
patches = [ (pkgs.writeText "konfig.patch" ''
-
diff --git a/setup.py b/setup.py
-
index 96fd858..bb4db06 100644
-
--- a/setup.py
-
+++ b/setup.py
-
@@ -20,7 +20,7 @@ setup(name='konfig',
-
author_email="tarek@mozilla.com",
-
include_package_data=True,
-
install_requires = [
-
- 'configparser', 'argparse', 'six'
-
+ 'configparser', 'six'
-
],
-
zip_safe=False,
-
classifiers=classifiers,
-
'') ];
-
-
meta = {
-
description = "Yet Another Config Parser";
-
homepage = "https://github.com/mozilla-services/konfig";
-
license = licenses.mpl20;
-
};
-
};
+
konfig = callPackage ../development/python-modules/konfig { };
kitchen = callPackage ../development/python-modules/kitchen/default.nix { };
···
license = licenses.mit;
};
};
+
+
mozterm = callPackage ../development/python-modules/mozterm { };
mplleaflet = callPackage ../development/python-modules/mplleaflet { };
···
mysql-connector = callPackage ../development/python-modules/mysql-connector { };
-
mysql_connector_repackaged = buildPythonPackage rec {
-
name = "mysql-connector-repackaged-0.3.1";
-
-
src = pkgs.fetchurl {
-
url = "mirror://pypi/m/mysql-connector-repackaged/${name}.tar.gz";
-
sha256 = "170fbf11c54def1b5fcc919be0a890b760bb2eca81f56123a5dda0c69b5b099e";
-
};
-
-
# Judging from SyntaxError
-
disabled = isPy3k;
-
-
meta = {
-
maintainers = with maintainers; [ garbas domenkozar ];
-
platforms = platforms.linux;
-
};
-
};
-
-
namebench = buildPythonPackage (rec {
name = "namebench-1.3.1";
disabled = isPy3k || isPyPy;
···
-
ldappool = buildPythonPackage rec {
-
name = "ldappool-${version}";
-
version = "1.0";
-
-
src = pkgs.fetchurl {
-
url = "mirror://pypi/l/ldappool/${name}.tar.gz";
-
sha256 = "1akmzf51cjfvmd0nvvm562z1w9vq45zsx6fa72kraqgsgxhnrhqz";
-
};
-
-
# Judging from SyntaxError
-
disabled = isPy3k;
-
-
meta = with stdenv.lib; {
-
homepage = "https://github.com/mozilla-services/ldappool";
-
};
-
};
-
+
ldappool = callPackage ../development/python-modules/ldappool { };
lz4 = buildPythonPackage rec {
name = "lz4-0.8.2";
···
doc8 = callPackage ../development/python-modules/doc8 { };
-
wrapt = buildPythonPackage rec {
-
name = "wrapt-${version}";
-
version = "1.10.5";
-
-
# No tests in archive
-
doCheck = false;
-
-
src = pkgs.fetchurl {
-
url = "mirror://pypi/w/wrapt/${name}.tar.gz";
-
sha256 = "0cq8rlpzkxzk48b50yrfhzn1d1hrq4gjcdqlrgq4v5palgiv9jwr";
-
};
-
};
+
wrapt = callPackage ../development/python-modules/wrapt { };
pagerduty = buildPythonPackage rec {
name = "pagerduty-${version}";
···
});
-
pycups = buildPythonPackage rec {
-
name = "pycups-${version}";
-
version = "1.9.73";
-
-
src = pkgs.fetchurl {
-
url = "http://cyberelk.net/tim/data/pycups/pycups-${version}.tar.bz2";
-
sha256 = "c381be011889ca6f728598578c89c8ac9f7ab1e95b614474df9f2fa831ae5335";
-
};
-
-
buildInputs = [ pkgs.cups ];
-
-
# Wants to connect to CUPS
-
doCheck = false;
-
-
meta = {
-
description = "Python bindings for libcups";
-
homepage = http://cyberelk.net/tim/software/pycups/;
-
license = with licenses; [ gpl2Plus ];
-
};
-
-
};
+
pycups = callPackage ../development/python-modules/pycups { };
pycurl = callPackage ../development/python-modules/pycurl { };
···
redis = callPackage ../development/python-modules/redis { };
-
rednose = buildPythonPackage rec {
-
name = "rednose-${version}";
-
version = "1.2.1";
-
-
src = pkgs.fetchurl {
-
url = "mirror://pypi/r/rednose/${name}.tar.gz";
-
sha256 = "0b0bsna217lr1nykyhl5fgjly15zhdvqd4prg4wy1zrgfv7al6m0";
-
};
-
-
meta = {
-
description = "A python nose plugin adding color to console results.";
-
};
-
-
buildInputs = with self; [ nose six ];
-
propagatedBuildInputs = with self; [ colorama termstyle ];
-
};
+
rednose = callPackage ../development/python-modules/rednose { };
reikna = callPackage ../development/python-modules/reikna { };
···
stevedore = callPackage ../development/python-modules/stevedore {};
+
text-unidecode = callPackage ../development/python-modules/text-unidecode { };
+
Theano = callPackage ../development/python-modules/Theano rec {
cudaSupport = pkgs.config.cudaSupport or false;
cudnnSupport = cudaSupport;
···
in if isPy3k then py3 else py2;
-
pythondaemon = buildPythonPackage rec {
-
name = "python-daemon-${version}";
-
version = "2.1.1";
-
-
src = pkgs.fetchurl {
-
url = "mirror://pypi/p/python-daemon/${name}.tar.gz";
-
sha256 = "17v80qb98p1gv4j9mq6wb55cv7hc4j1hzw5y2f4s5hrpxs3w3a2q";
-
};
-
-
# A test fail within chroot builds.
-
doCheck = false;
-
-
buildInputs = with self; [ mock testscenarios ];
-
propagatedBuildInputs = with self; [ docutils lockfile ];
-
-
meta = {
-
description = "Library to implement a well-behaved Unix daemon process";
-
homepage = https://alioth.debian.org/projects/python-daemon/;
-
license = [ licenses.gpl3Plus licenses.asl20 ];
-
};
-
};
+
pythondaemon = callPackage ../development/python-modules/python-daemon { };
sympy = callPackage ../development/python-modules/sympy { };
···
-
tmdb3 = buildPythonPackage rec {
-
name = "tmdb3-${version}";
-
version = "0.6.17";
-
-
src = pkgs.fetchurl {
-
url = "mirror://pypi/t/tmdb3/${name}.zip";
-
sha256 = "64a6c3f1a60a9d8bf18f96a5403f3735b334040345ac3646064931c209720972";
-
};
-
-
meta = {
-
description = "Python implementation of the v3 API for TheMovieDB.org, allowing access to movie and cast information";
-
homepage = https://pypi.python.org/pypi/tmdb3;
-
license = licenses.bsd3;
-
};
-
};
+
tmdb3 = callPackage ../development/python-modules/tmdb3 { };
toolz = callPackage ../development/python-modules/toolz { };
···
virtkey = callPackage ../development/python-modules/virtkey { };
-
virtual-display = buildPythonPackage rec {
-
name = "PyVirtualDisplay-0.1.5";
-
-
propagatedBuildInputs = with self; [ EasyProcess ];
-
-
src = pkgs.fetchurl {
-
url = "mirror://pypi/P/PyVirtualDisplay/${name}.tar.gz";
-
sha256 = "aa6aef08995e14c20cc670d933bfa6e70d736d0b555af309b2e989e2faa9ee53";
-
};
-
-
meta = {
-
description = "Python wrapper for Xvfb, Xephyr and Xvnc";
-
homepage = "https://github.com/ponty/pyvirtualdisplay";
-
license = licenses.bsdOriginal;
-
maintainers = with maintainers; [ layus ];
-
};
-
};
+
virtual-display = callPackage ../development/python-modules/virtual-display { };
virtualenv = callPackage ../development/python-modules/virtualenv { };
···
persistent = callPackage ../development/python-modules/persistent {};
-
xdot = buildPythonPackage rec {
-
name = "xdot-0.9";
-
-
src = pkgs.fetchurl {
-
url = "mirror://pypi/x/xdot/${name}.tar.gz";
-
sha256 = "01v9vmgdxz1q2m2vq2b4aqx4ycw7grc0l4is673ygvyg9rk02dx3";
-
};
-
-
nativeBuildInputs = with pkgs; [ wrapGAppsHook ];
-
propagatedBuildInputs = with self; [ pkgs.gobjectIntrospection pygobject3 pkgs.graphviz pkgs.gnome3.gtk ];
-
-
meta = {
-
description = "xdot.py is an interactive viewer for graphs written in Graphviz's dot";
-
homepage = https://github.com/jrfonseca/xdot.py;
-
license = licenses.lgpl3Plus;
-
};
-
};
+
xdot = callPackage ../development/python-modules/xdot { };
zetup = callPackage ../development/python-modules/zetup { };
···
propagatedBuildInputs = with self; [ requests webob ];
-
tunigo = buildPythonPackage rec {
-
name = "tunigo-${version}";
-
version = "1.0.0";
-
propagatedBuildInputs = with self; [ requests ];
-
-
src = pkgs.fetchFromGitHub {
-
owner = "trygveaa";
-
repo = "python-tunigo";
-
rev = "v${version}";
-
sha256 = "07q9girrjjffzkn8xj4l3ynf9m4psi809zf6f81f54jdb330p2fs";
-
};
-
-
buildInputs = with self; [ mock nose ];
-
-
meta = {
-
description = "Python API for the browse feature of Spotify";
-
homepage = https://github.com/trygveaa/python-tunigo;
-
license = licenses.asl20;
-
};
-
};
+
tunigo = callPackage ../development/python-modules/tunigo { };
tarman = buildPythonPackage rec {
version = "0.1.3";
···
pyusb = callPackage ../development/python-modules/pyusb { libusb1 = pkgs.libusb1; };
-
BlinkStick = buildPythonPackage rec {
-
name = "BlinkStick-${version}";
-
version = "1.1.8";
-
-
src = pkgs.fetchurl {
-
url = "mirror://pypi/B/BlinkStick/${name}.tar.gz";
-
sha256 = "3edf4b83a3fa1a7bd953b452b76542d54285ff6f1145b6e19f9b5438120fa408";
-
};
-
-
# Requires pyusb 1.0.0b1.
-
# Likely current pyusb will work but we need to patch the hard requirement then.
-
broken = true;
-
-
patchPhase = "substituteInPlace setup.py --replace pyusb==1.0.0b1 pyusb==1.0.0";
-
-
propagatedBuildInputs = with self; [ pyusb ];
-
-
meta = {
-
description = "Python package to control BlinkStick USB devices";
-
homepage = https://pypi.python.org/pypi/BlinkStick/;
-
license = licenses.bsd3;
-
maintainers = with maintainers; [ np ];
-
};
-
};
+
BlinkStick = callPackage ../development/python-modules/blinkstick { };
usbtmc = callPackage ../development/python-modules/usbtmc {};
···
-
termstyle = buildPythonPackage rec {
-
name = "python-termstyle-${version}";
-
version = "0.1.10";
-
src = pkgs.fetchurl {
-
url = "mirror://pypi/p/python-termstyle/${name}.tar.gz";
-
sha256 = "1qllzkx1alf14zcfapppf8w87si4cpa7lgjmdp3f5idzdyqnnapl";
-
};
-
-
meta = {
-
description = "Console colouring for python";
-
homepage = "https://pypi.python.org/pypi/python-termstyle/0.1.10";
-
license = licenses.bsdOriginal;
-
};
-
-
};
-
-
green = buildPythonPackage rec {
-
name = "green-${version}";
-
version = "2.3.0";
-
src = pkgs.fetchurl {
-
url = "mirror://pypi/g/green/${name}.tar.gz";
-
sha256 = "1888khfl9yxb8yfxq9b48dxwplqlxx8s0l530z5j7c6bx74v08b4";
-
};
+
termstyle = callPackage ../development/python-modules/termstyle { };
-
propagatedBuildInputs = with self; [ termstyle colorama ];
-
buildInputs = with self; [ mock ];
-
-
meta = {
-
description = "Python test runner";
-
homepage = "https://github.com/CleanCut/green";
-
license = licenses.mit;
-
};
-
};
+
green = callPackage ../development/python-modules/green { };
topydo = throw "python3Packages.topydo was moved to topydo"; # 2017-09-22
···
whitenoise = callPackage ../development/python-modules/whitenoise { };
-
wp_export_parser = buildPythonPackage rec {
-
name = "${pname}-${version}";
-
pname = "wp_export_parser";
-
version = "1.0";
-
src = pkgs.fetchFromGitHub {
-
owner = "RealGeeks";
-
repo = "wp_export_parser";
-
rev = "479211f6c5a7d034fd77762dfed381c3315cd773";
-
sha256 = "1ad0mkixc0s86djwsvhp1qlvcfs25086nh0qw7bys49gz8shczzi";
-
};
-
};
-
XlsxWriter = callPackage ../development/python-modules/XlsxWriter { };
yowsup = callPackage ../development/python-modules/yowsup { };
···
thinc = callPackage ../development/python-modules/thinc { };
+
yahooweather = callPackage ../development/python-modules/yahooweather { };
+
spacy = callPackage ../development/python-modules/spacy { };
spacy_models = callPackage ../development/python-modules/spacy/models.nix { };
+
+
sseclient = callPackage ../development/python-modules/sseclient { };
textacy = callPackage ../development/python-modules/textacy { };
-1
pkgs/top-level/release-small.nix
···
gcj = linux;
glibc = linux;
glibcLocales = linux;
-
gnat = linux;
gnugrep = all;
gnum4 = all;
gnumake = all;