+33
-8
pkgs/build-support/cc-wrapper/default.nix
+33
-8
pkgs/build-support/cc-wrapper/default.nix
···············+ optionalString (libcxx == null && isClang && (useGccForLibs && gccForLibs.langCC or false)) ''···
+9
pkgs/build-support/cc-wrapper/setup-hook.sh
+9
pkgs/build-support/cc-wrapper/setup-hook.sh
···
-2
pkgs/by-name/ed/edencommon/package.nix
-2
pkgs/by-name/ed/edencommon/package.nix
-2
pkgs/by-name/fb/fbthrift/package.nix
-2
pkgs/by-name/fb/fbthrift/package.nix
-2
pkgs/by-name/fi/fizz/package.nix
-2
pkgs/by-name/fi/fizz/package.nix
-2
pkgs/by-name/fo/folly/package.nix
-2
pkgs/by-name/fo/folly/package.nix
-2
pkgs/by-name/gt/gtest/package.nix
-2
pkgs/by-name/gt/gtest/package.nix
······
-2
pkgs/by-name/mv/mvfst/package.nix
-2
pkgs/by-name/mv/mvfst/package.nix
-18
pkgs/by-name/sa/sanitiseHeaderPathsHook/package.nix
-18
pkgs/by-name/sa/sanitiseHeaderPathsHook/package.nix
···-description = "Setup hook to sanitise header file paths to avoid leaked references through `__FILE__`";
-10
pkgs/by-name/sa/sanitiseHeaderPathsHook/sanitise-header-paths-hook.bash
-10
pkgs/by-name/sa/sanitiseHeaderPathsHook/sanitise-header-paths-hook.bash
···
-2
pkgs/by-name/wa/wangle/package.nix
-2
pkgs/by-name/wa/wangle/package.nix
-5
pkgs/development/compilers/gcc/common/dependencies.nix
-5
pkgs/development/compilers/gcc/common/dependencies.nix
······
-2
pkgs/development/compilers/gcc/default.nix
-2
pkgs/development/compilers/gcc/default.nix
···|| (stdenv.targetPlatform.isAvr && stdenv.hostPlatform.isDarwin && stdenv.hostPlatform.isAarch64),···
+4
pkgs/development/compilers/gcc/patches/default.nix
+4
pkgs/development/compilers/gcc/patches/default.nix
···
-8
pkgs/development/libraries/boost/generic.nix
-8
pkgs/development/libraries/boost/generic.nix
·········