mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-22 06:53:01 +00:00
Merge pull request #332764 from NixOS/staging-next
staging-next 2024-08-06
This commit is contained in:
commit
9ccfa87721
@ -159,3 +159,6 @@ fbdcdde04a7caa007e825a8b822c75fab9adb2d6
|
||||
|
||||
# step-cli: format package.nix with nixfmt (#331629)
|
||||
fc7a83f8b62e90de5679e993d4d49ca014ea013d
|
||||
|
||||
# darwin.stdenv: format with nixfmt-rfc-style (#333962)
|
||||
93c10ac9e561c6594d3baaeaff2341907390d9b8
|
||||
|
@ -477,7 +477,6 @@ are used in [`buildPythonPackage`](#buildpythonpackage-function).
|
||||
See [example usage](#using-pythonrelaxdepshook).
|
||||
- `pythonRemoveBinBytecode` to remove bytecode from the `/bin` folder.
|
||||
- `setuptoolsBuildHook` to build a wheel using `setuptools`.
|
||||
- `setuptoolsCheckHook` to run tests with `python setup.py test`.
|
||||
- `sphinxHook` to build documentation and manpages using Sphinx.
|
||||
- `venvShellHook` to source a Python 3 `venv` at the `venvDir` location. A
|
||||
`venv` is created if it does not yet exist. `postVenvCreation` can be used to
|
||||
|
@ -1538,6 +1538,16 @@ Adds the `-fPIE` compiler and `-pie` linker options. Position Independent Execut
|
||||
Static libraries need to be compiled with `-fPIE` so that executables can link them in with the `-pie` linker option.
|
||||
If the libraries lack `-fPIE`, you will get the error `recompile with -fPIE`.
|
||||
|
||||
#### `shadowstack` {#shadowstack}
|
||||
|
||||
Adds the `-fcf-protection=return` compiler option. This enables the Shadow Stack feature supported by some newer processors, which maintains a user-inaccessible copy of the program's stack containing only return-addresses. When returning from a function, the processor compares the return-address value on the two stacks and throws an error if they do not match, considering it a sign of corruption and possible tampering. This should significantly increase the difficulty of ROP attacks.
|
||||
|
||||
For the Shadow Stack to be enabled at runtime, all code linked into a process must be built with Shadow Stack enabled, so this is probably only useful to enable on a wide scale, so that all of a packages dependencies also have the feature enabled.
|
||||
|
||||
This is currently only supported on some newer Intel and AMD processors as part of the Intel CET set of features. However, the generated code should continue to work on older processors which will simply omit any of this checking.
|
||||
|
||||
This breaks some code that does advanced stack management or exception handling. If enabling this hardening flag it is important to test the result on a system that has known working and enabled CET support, so that any such breakage can be discovered.
|
||||
|
||||
#### `trivialautovarinit` {#trivialautovarinit}
|
||||
|
||||
Adds the `-ftrivial-auto-var-init=pattern` compiler option. This causes "trivially-initializable" uninitialized stack variables to be forcibly initialized with a nonzero value that is likely to cause a crash (and therefore be noticed). Uninitialized variables generally take on their values based on fragments of previous program state, and attackers can carefully manipulate that state to craft malicious initial values for these variables.
|
||||
@ -1554,6 +1564,14 @@ sorry, unimplemented: __builtin_clear_padding not supported for variable length
|
||||
|
||||
This flag adds the `-fstack-clash-protection` compiler option, which causes growth of a program's stack to access each successive page in order. This should force the guard page to be accessed and cause an attempt to "jump over" this guard page to crash.
|
||||
|
||||
#### `pacret` {#pacret}
|
||||
|
||||
This flag adds the `-mbranch-protection=pac-ret` compiler option on aarch64-linux targets. This uses ARM v8.3's Pointer Authentication feature to sign function return pointers before adding them to the stack. The pointer's authenticity is then validated before returning to its destination. This dramatically increases the difficulty of ROP exploitation techniques.
|
||||
|
||||
This may cause problems with code that does advanced stack manipulation, and debugging/stack-unwinding tools need to be pac-ret aware to work correctly when these features are in operation.
|
||||
|
||||
Pre-ARM v8.3 processors will ignore Pointer Authentication instructions, so code built with this flag will continue to work on older processors, though without any of the intended protections. If enabling this flag, it is recommended to ensure the resultant packages are tested against an ARM v8.3+ linux system with known-working Pointer Authentication support so that any breakage caused by this feature is actually detected.
|
||||
|
||||
[^footnote-stdenv-ignored-build-platform]: The build platform is ignored because it is a mere implementation detail of the package satisfying the dependency: As a general programming principle, dependencies are always *specified* as interfaces, not concrete implementation.
|
||||
[^footnote-stdenv-native-dependencies-in-path]: Currently, this means for native builds all dependencies are put on the `PATH`. But in the future that may not be the case for sake of matching cross: the platforms would be assumed to be unique for native and cross builds alike, so only the `depsBuild*` and `nativeBuildInputs` would be added to the `PATH`.
|
||||
[^footnote-stdenv-propagated-dependencies]: Nix itself already takes a package’s transitive dependencies into account, but this propagation ensures nixpkgs-specific infrastructure like [setup hooks](#ssec-setup-hooks) also are run as if it were a propagated dependency.
|
||||
|
@ -10,6 +10,8 @@
|
||||
This also allows configuring runtime settings of AMDVLK and enabling experimental features.
|
||||
- The `moonlight-qt` package ([Moonlight game streaming](https://moonlight-stream.org/)) now has HDR support on Linux systems.
|
||||
|
||||
- PostgreSQL now defaults to major version 16.
|
||||
|
||||
- `authelia` has been upgraded to version 4.38. This version brings several features and improvements which are detailed in the [release blog post](https://www.authelia.com/blog/4.38-release-notes/).
|
||||
This release also deprecates some configuration keys, which are likely to be removed in future version 5.0, but they are still supported and expected to be working in the current version.
|
||||
|
||||
@ -317,6 +319,8 @@
|
||||
|
||||
- The `stackclashprotection` hardening flag has been added, though disabled by default.
|
||||
|
||||
- The `pacret` hardening flag has been added, though disabled by default.
|
||||
|
||||
- `cargoSha256` in `rustPlatform.buildRustPackage` has been deprecated in favor
|
||||
of `cargoHash` which supports SRI hashes. See
|
||||
[buildRustPackage: Compiling Rust applications with Cargo](https://nixos.org/manual/nixpkgs/unstable/#compiling-rust-applications-with-cargo)
|
||||
@ -336,6 +340,9 @@
|
||||
The derivation now installs "impl" headers selectively instead of by a wildcard.
|
||||
Use `imgui.src` if you just want to access the unpacked sources.
|
||||
|
||||
- Unprivileged access to the kernel syslog via `dmesg` is now restricted by default. Users wanting to keep an
|
||||
unrestricted access to it can set `boot.kernel.sysctl."kernel.dmesg_restrict" = false`.
|
||||
|
||||
- The `i18n.inputMethod` module introduces two new properties:
|
||||
`enable` and `type`, for declaring whether to enable an alternative input method and defining which input method respectfully. The options available in `type` are the same as the existing `enabled` option. `enabled` is now deprecated, and will be removed in a future release.
|
||||
|
||||
@ -351,6 +358,8 @@
|
||||
- Nemo is now built with gtk-layer-shell support, note that for now it will be expected to see nemo-desktop
|
||||
listed as a regular entry in Cinnamon Wayland session's window list applet.
|
||||
|
||||
- The `shadowstack` hardening flag has been added, though disabled by default.
|
||||
|
||||
- `restic` module now has an option for inhibiting system sleep while backups are running, defaulting to off (not inhibiting sleep), available as [`services.restic.backups.<name>.inhibitsSleep`](#opt-services.restic.backups._name_.inhibitsSleep).
|
||||
|
||||
- Support for *runner registration tokens* has been [deprecated](https://gitlab.com/gitlab-org/gitlab/-/issues/380872)
|
||||
|
@ -483,7 +483,8 @@ in
|
||||
|
||||
services.postgresql.package = let
|
||||
mkThrow = ver: throw "postgresql_${ver} was removed, please upgrade your postgresql version.";
|
||||
base = if versionAtLeast config.system.stateVersion "23.11" then pkgs.postgresql_15
|
||||
base = if versionAtLeast config.system.stateVersion "24.11" then pkgs.postgresql_16
|
||||
else if versionAtLeast config.system.stateVersion "23.11" then pkgs.postgresql_15
|
||||
else if versionAtLeast config.system.stateVersion "22.05" then pkgs.postgresql_14
|
||||
else if versionAtLeast config.system.stateVersion "21.11" then pkgs.postgresql_13
|
||||
else if versionAtLeast config.system.stateVersion "20.03" then mkThrow "11"
|
||||
|
@ -764,6 +764,7 @@ in {
|
||||
php81 = handleTest ./php { php = pkgs.php81; };
|
||||
php82 = handleTest ./php { php = pkgs.php82; };
|
||||
php83 = handleTest ./php { php = pkgs.php83; };
|
||||
php84 = handleTest ./php { php = pkgs.php84; };
|
||||
phylactery = handleTest ./web-apps/phylactery.nix {};
|
||||
pict-rs = handleTest ./pict-rs.nix {};
|
||||
pinnwand = handleTest ./pinnwand.nix {};
|
||||
|
@ -241,18 +241,31 @@ in
|
||||
testScript = ''
|
||||
machine.succeed("mount -o remount,rw /boot")
|
||||
|
||||
# Replace version inside sd-boot with something older. See magic[] string in systemd src/boot/efi/boot.c
|
||||
machine.succeed(
|
||||
"""
|
||||
find /boot -iname '*boot*.efi' -print0 | \
|
||||
xargs -0 -I '{}' sed -i 's/#### LoaderInfo: systemd-boot .* ####/#### LoaderInfo: systemd-boot 000.0-1-notnixos ####/' '{}'
|
||||
"""
|
||||
)
|
||||
def switch():
|
||||
# Replace version inside sd-boot with something older. See magic[] string in systemd src/boot/efi/boot.c
|
||||
machine.succeed(
|
||||
"""
|
||||
find /boot -iname '*boot*.efi' -print0 | \
|
||||
xargs -0 -I '{}' sed -i 's/#### LoaderInfo: systemd-boot .* ####/#### LoaderInfo: systemd-boot 000.0-1-notnixos ####/' '{}'
|
||||
"""
|
||||
)
|
||||
return machine.succeed("/run/current-system/bin/switch-to-configuration boot 2>&1")
|
||||
|
||||
output = machine.succeed("/run/current-system/bin/switch-to-configuration boot 2>&1")
|
||||
output = switch()
|
||||
assert "updating systemd-boot from 000.0-1-notnixos to " in output, "Couldn't find systemd-boot update message"
|
||||
assert 'to "/boot/EFI/systemd/systemd-bootx64.efi"' in output, "systemd-boot not copied to to /boot/EFI/systemd/systemd-bootx64.efi"
|
||||
assert 'to "/boot/EFI/BOOT/BOOTX64.EFI"' in output, "systemd-boot not copied to to /boot/EFI/BOOT/BOOTX64.EFI"
|
||||
|
||||
with subtest("Test that updating works with lowercase bootx64.efi"):
|
||||
machine.succeed(
|
||||
# Move to tmp file name first, otherwise mv complains the new location is the same
|
||||
"mv /boot/EFI/BOOT/BOOTX64.EFI /boot/EFI/BOOT/bootx64.efi.new",
|
||||
"mv /boot/EFI/BOOT/bootx64.efi.new /boot/EFI/BOOT/bootx64.efi",
|
||||
)
|
||||
output = switch()
|
||||
assert "updating systemd-boot from 000.0-1-notnixos to " in output, "Couldn't find systemd-boot update message"
|
||||
assert 'to "/boot/EFI/systemd/systemd-bootx64.efi"' in output, "systemd-boot not copied to to /boot/EFI/systemd/systemd-bootx64.efi"
|
||||
assert 'to "/boot/EFI/BOOT/BOOTX64.EFI"' in output, "systemd-boot not copied to to /boot/EFI/BOOT/BOOTX64.EFI"
|
||||
'';
|
||||
};
|
||||
|
||||
|
@ -21,6 +21,7 @@ let
|
||||
in python3.pkgs.buildPythonApplication rec {
|
||||
pname = "whipper";
|
||||
version = "0.10.0";
|
||||
pyproject = true;
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "whipper-team";
|
||||
@ -38,14 +39,15 @@ in python3.pkgs.buildPythonApplication rec {
|
||||
})
|
||||
];
|
||||
|
||||
nativeBuildInputs = with python3.pkgs; [
|
||||
nativeBuildInputs = [
|
||||
installShellFiles
|
||||
wrapGAppsNoGuiHook
|
||||
gobject-introspection
|
||||
];
|
||||
|
||||
setuptools-scm
|
||||
build-system = with python3.pkgs; [
|
||||
docutils
|
||||
setuptoolsCheckHook
|
||||
setuptools-scm
|
||||
];
|
||||
|
||||
propagatedBuildInputs = with python3.pkgs; [
|
||||
@ -63,6 +65,7 @@ in python3.pkgs.buildPythonApplication rec {
|
||||
|
||||
nativeCheckInputs = with python3.pkgs; [
|
||||
twisted
|
||||
pytestCheckHook
|
||||
] ++ bins;
|
||||
|
||||
makeWrapperArgs = [
|
||||
|
@ -1,10 +1,10 @@
|
||||
# builder for Emacs packages built for packages.el
|
||||
|
||||
{ lib, stdenv, emacs, texinfo, writeText, gcc }:
|
||||
{ lib, stdenv, emacs, texinfo, writeText }:
|
||||
|
||||
let
|
||||
handledArgs = [ "meta" ];
|
||||
genericBuild = import ./generic.nix { inherit lib stdenv emacs texinfo writeText gcc; };
|
||||
genericBuild = import ./generic.nix { inherit lib stdenv emacs texinfo writeText; };
|
||||
|
||||
in
|
||||
|
||||
|
@ -1,11 +1,11 @@
|
||||
# generic builder for Emacs packages
|
||||
|
||||
{ lib, stdenv, emacs, texinfo, writeText, gcc, ... }:
|
||||
{ lib, stdenv, emacs, texinfo, writeText, ... }:
|
||||
|
||||
let
|
||||
inherit (lib) optionalAttrs getLib;
|
||||
handledArgs = [ "buildInputs" "packageRequires" "propagatedUserEnvPkgs" "meta" ]
|
||||
++ lib.optionals (emacs.withNativeCompilation or false) [ "nativeBuildInputs" "postInstall" ];
|
||||
inherit (lib) optionalAttrs;
|
||||
handledArgs = [ "buildInputs" "nativeBuildInputs" "packageRequires" "propagatedUserEnvPkgs" "meta" ]
|
||||
++ lib.optionals (emacs.withNativeCompilation or false) [ "postInstall" ];
|
||||
|
||||
setupHook = writeText "setup-hook.sh" ''
|
||||
source ${./emacs-funcs.sh}
|
||||
@ -55,7 +55,8 @@ stdenv.mkDerivation (finalAttrs: ({
|
||||
esac
|
||||
'';
|
||||
|
||||
buildInputs = [emacs texinfo] ++ packageRequires ++ buildInputs;
|
||||
buildInputs = packageRequires ++ buildInputs;
|
||||
nativeBuildInputs = [ emacs texinfo ] ++ nativeBuildInputs;
|
||||
propagatedBuildInputs = packageRequires;
|
||||
propagatedUserEnvPkgs = packageRequires ++ propagatedUserEnvPkgs;
|
||||
|
||||
@ -73,10 +74,6 @@ stdenv.mkDerivation (finalAttrs: ({
|
||||
|
||||
// optionalAttrs (emacs.withNativeCompilation or false) {
|
||||
|
||||
LIBRARY_PATH = "${getLib stdenv.cc.libc}/lib";
|
||||
|
||||
nativeBuildInputs = [ gcc ] ++ nativeBuildInputs;
|
||||
|
||||
addEmacsNativeLoadPath = true;
|
||||
|
||||
inherit turnCompilationWarningToError ignoreCompilationError;
|
||||
|
@ -1,11 +1,11 @@
|
||||
# builder for Emacs packages built for packages.el
|
||||
# using MELPA package-build.el
|
||||
|
||||
{ lib, stdenv, fetchFromGitHub, emacs, texinfo, writeText, gcc }:
|
||||
{ lib, stdenv, fetchFromGitHub, emacs, texinfo, writeText }:
|
||||
|
||||
let
|
||||
handledArgs = [ "meta" "preUnpack" "postUnpack" ];
|
||||
genericBuild = import ./generic.nix { inherit lib stdenv emacs texinfo writeText gcc; };
|
||||
genericBuild = import ./generic.nix { inherit lib stdenv emacs texinfo writeText; };
|
||||
|
||||
packageBuild = stdenv.mkDerivation {
|
||||
name = "package-build";
|
||||
|
@ -32,7 +32,7 @@ in customEmacsPackages.withPackages (epkgs: [ epkgs.evil epkgs.magit ])
|
||||
|
||||
*/
|
||||
|
||||
{ lib, lndir, makeBinaryWrapper, runCommand, gcc }:
|
||||
{ lib, lndir, makeBinaryWrapper, runCommand }:
|
||||
self:
|
||||
let
|
||||
inherit (self) emacs;
|
||||
@ -60,7 +60,6 @@ runCommand
|
||||
deps = runCommand "emacs-packages-deps"
|
||||
({
|
||||
inherit explicitRequires lndir emacs;
|
||||
nativeBuildInputs = lib.optional withNativeCompilation gcc;
|
||||
} // lib.optionalAttrs withNativeCompilation {
|
||||
inherit (emacs) LIBRARY_PATH;
|
||||
})
|
||||
|
@ -53,8 +53,6 @@
|
||||
, libaom
|
||||
, portmidi
|
||||
, lua
|
||||
, dav1d
|
||||
, libyuv
|
||||
}:
|
||||
|
||||
stdenv.mkDerivation rec {
|
||||
@ -108,8 +106,6 @@ stdenv.mkDerivation rec {
|
||||
libaom
|
||||
portmidi
|
||||
lua
|
||||
dav1d
|
||||
libyuv
|
||||
] ++ lib.optionals stdenv.isLinux [
|
||||
colord
|
||||
colord-gtk
|
||||
|
@ -138,6 +138,11 @@ python3.pkgs.buildPythonApplication {
|
||||
disabledTests = [
|
||||
"test_loop" # test tries to bind 127.0.0.1 causing permission error
|
||||
"test_is_ip_address" # fails spuriously https://github.com/spesmilo/electrum/issues/7307
|
||||
# electrum_ltc.lnutil.RemoteMisbehaving: received commitment_signed without pending changes
|
||||
"test_reestablish_replay_messages_rev_then_sig"
|
||||
"test_reestablish_replay_messages_sig_then_rev"
|
||||
# stuck on hydra
|
||||
"test_reestablish_with_old_state"
|
||||
];
|
||||
|
||||
postCheck = ''
|
||||
|
@ -8,16 +8,13 @@
|
||||
, unicode-emoji
|
||||
, unicode-character-database
|
||||
, cmake
|
||||
, dav1d
|
||||
, ninja
|
||||
, pkg-config
|
||||
, libaom
|
||||
, libavif
|
||||
, libjxl
|
||||
, libtiff
|
||||
, libwebp
|
||||
, libxcrypt
|
||||
, libyuv
|
||||
, python3
|
||||
, qt6Packages
|
||||
, woff2
|
||||
@ -137,14 +134,11 @@ stdenv.mkDerivation (finalAttrs: {
|
||||
];
|
||||
|
||||
buildInputs = with qt6Packages; [
|
||||
dav1d
|
||||
ffmpeg
|
||||
libaom
|
||||
libavif
|
||||
libjxl
|
||||
libwebp
|
||||
libxcrypt
|
||||
libyuv
|
||||
qtbase
|
||||
qtmultimedia
|
||||
simdutf
|
||||
@ -178,7 +172,7 @@ stdenv.mkDerivation (finalAttrs: {
|
||||
'';
|
||||
|
||||
# Only Ladybird and WebContent need wrapped, if Qt is enabled.
|
||||
# On linux we end up wrapping some non-Qt apps, like headless-browser.
|
||||
# On linux we end up wraping some non-Qt apps, like headless-browser.
|
||||
dontWrapQtApps = stdenv.isDarwin;
|
||||
|
||||
passthru.tests = {
|
||||
|
@ -5,7 +5,7 @@
|
||||
, x11Support ? graphicsSupport, libX11
|
||||
, mouseSupport ? !stdenv.isDarwin, gpm-ncurses
|
||||
, perl, man, pkg-config, buildPackages, w3m
|
||||
, testers
|
||||
, testers, updateAutotoolsGnuConfigScriptsHook
|
||||
}:
|
||||
|
||||
let
|
||||
@ -53,7 +53,9 @@ in stdenv.mkDerivation rec {
|
||||
sed -ie 's!mktable.*:.*!mktable:!' Makefile.in
|
||||
'';
|
||||
|
||||
nativeBuildInputs = [ pkg-config gettext ];
|
||||
# updateAutotoolsGnuConfigScriptsHook necessary to build on FreeBSD native pending inclusion of
|
||||
# https://git.savannah.gnu.org/cgit/config.git/commit/?id=e4786449e1c26716e3f9ea182caf472e4dbc96e0
|
||||
nativeBuildInputs = [ pkg-config gettext updateAutotoolsGnuConfigScriptsHook ];
|
||||
buildInputs = [ ncurses boehmgc zlib ]
|
||||
++ lib.optional sslSupport openssl
|
||||
++ lib.optional mouseSupport gpm-ncurses
|
||||
|
@ -1,6 +1,7 @@
|
||||
{ lib
|
||||
, stdenv
|
||||
, fetchFromGitLab
|
||||
, fetchpatch2
|
||||
, appstream-glib
|
||||
, cargo
|
||||
, desktop-file-utils
|
||||
@ -33,14 +34,23 @@ stdenv.mkDerivation rec {
|
||||
hash = "sha256-GRxZ3y1PdJpBDnGCfmOmZgN8n1aaYf9IhyszRwo3MjQ=";
|
||||
};
|
||||
|
||||
patches = [
|
||||
# https://gitlab.gnome.org/World/warp/-/merge_requests/74
|
||||
(fetchpatch2 {
|
||||
name = "rust-1.80-compat.patch";
|
||||
url = "https://gitlab.gnome.org/World/warp/-/commit/38747cc2dde79089df53fd8451ea2db13f9f3714.patch";
|
||||
hash = "sha256-9P5LwCHaC6J5WR2OnjCaNE+4de/Jv6XGXS7bOfYrM7w=";
|
||||
})
|
||||
];
|
||||
|
||||
postPatch = ''
|
||||
patchShebangs build-aux
|
||||
'';
|
||||
|
||||
cargoDeps = rustPlatform.fetchCargoTarball {
|
||||
inherit src;
|
||||
inherit src patches;
|
||||
name = "${pname}-${version}";
|
||||
hash = "sha256-v/MhVcQmMYD/n/8wmPCYUy4YpXhL0v4fq8h6cllo/pw=";
|
||||
hash = "sha256-xF9AzcO2uawHu7XZay7Wwr2r+OVLbXhfSynnBYbVkZM=";
|
||||
};
|
||||
|
||||
nativeBuildInputs = [
|
||||
|
@ -10,7 +10,7 @@
|
||||
}:
|
||||
|
||||
let
|
||||
version = "5.12.205";
|
||||
version = "5.13.11";
|
||||
in
|
||||
rustPlatform.buildRustPackage {
|
||||
pname = "git-mit";
|
||||
@ -20,10 +20,10 @@ rustPlatform.buildRustPackage {
|
||||
owner = "PurpleBooth";
|
||||
repo = "git-mit";
|
||||
rev = "v${version}";
|
||||
hash = "sha256-I9tIw7ZtQ85L1Pt0+/CxugtmnClbEbn4xKjSkBqBa0o=";
|
||||
hash = "sha256-sLSPnr89AvosutY8jw0KiiXihVT+A+fuHs6AKvMEUF4=";
|
||||
};
|
||||
|
||||
cargoHash = "sha256-GWoh//sHhIVxmFuyAHRot/JG5wL3Zn2yIeRncaPENN4=";
|
||||
cargoHash = "sha256-iaAxwUtGKG3AG3mdiKveZekFSEqHBf4O9WLs23YeSPs=";
|
||||
|
||||
nativeBuildInputs = [ pkg-config ];
|
||||
|
||||
|
@ -1,6 +1,7 @@
|
||||
{ stdenv
|
||||
, lib
|
||||
, fetchFromGitHub
|
||||
, fetchpatch2
|
||||
, rustPlatform
|
||||
, Security
|
||||
, SystemConfiguration
|
||||
@ -28,7 +29,15 @@ rustPlatform.buildRustPackage rec {
|
||||
hash = "sha256-1lONtpataRi0yE6LpN6oNnC3OAW918v8GFCUwinYJWI=";
|
||||
};
|
||||
|
||||
cargoHash = "sha256-dRbOTxlFXfmeHUKH2UeN84OwlQ1urCND/Nfk9vSeLwA=";
|
||||
cargoPatches = [
|
||||
# cargo: bump `git2` to 0.19.0
|
||||
(fetchpatch2 {
|
||||
url = "https://github.com/martinvonz/jj/commit/38f6ee89183d886e432472c5888908c9900c9c18.patch?full_index=1";
|
||||
hash = "sha256-BVcak7uIEhwoO0f9hf0GVKKSVmp/ueKD5C9F8J0iL3w=";
|
||||
})
|
||||
];
|
||||
|
||||
cargoHash = "sha256-FxcvLT0YnXcjDCKxuyijYsVSMLjx1glDzmFH5ctSx6s=";
|
||||
|
||||
cargoBuildFlags = [ "--bin" "jj" ]; # don't install the fake editors
|
||||
useNextest = false; # nextest is the upstream integration framework, but is problematic for test skipping
|
||||
|
@ -21,11 +21,11 @@ let
|
||||
|
||||
self = python3Packages.buildPythonApplication rec {
|
||||
pname = "mercurial${lib.optionalString fullBuild "-full"}";
|
||||
version = "6.8";
|
||||
version = "6.8.1";
|
||||
|
||||
src = fetchurl {
|
||||
url = "https://mercurial-scm.org/release/mercurial-${version}.tar.gz";
|
||||
hash = "sha256-COTQ5dqK8RMrUea8M1AYCtV63Nk18Je20LwRmiwsChA=";
|
||||
hash = "sha256-Aw6Kem1ZDk6utAPuJWdWFc2A0jbzq4oLVtzIQYEViwU=";
|
||||
};
|
||||
|
||||
format = "other";
|
||||
@ -35,7 +35,7 @@ let
|
||||
cargoDeps = if rustSupport then rustPlatform.fetchCargoTarball {
|
||||
inherit src;
|
||||
name = "mercurial-${version}";
|
||||
hash = "sha256-mP82UtASD0Fh8ilDDCB6ubY7/MGPoRP6hg6/xRwzwAw=";
|
||||
hash = "sha256-i5AVyi9m7qLLubhV8fBhhZ6/RYOjMdwmv9Bek9pT/xo=";
|
||||
sourceRoot = "mercurial-${version}/rust";
|
||||
} else null;
|
||||
cargoRoot = if rustSupport then "rust" else null;
|
||||
|
@ -226,12 +226,6 @@ if [[ "$NIX_DONT_SET_RPATH_@suffixSalt@" != 1 && "$linkType" != static-pie ]]; t
|
||||
|
||||
fi
|
||||
|
||||
# This is outside the DONT_SET_RPATH branch because it's more targeted and we
|
||||
# usually want it (on Darwin) even if DONT_SET_RPATH is set.
|
||||
if [ -n "${NIX_COREFOUNDATION_RPATH:-}" ]; then
|
||||
extraAfter+=(-rpath $NIX_COREFOUNDATION_RPATH)
|
||||
fi
|
||||
|
||||
# Only add --build-id if this is a final link. FIXME: should build gcc
|
||||
# with --enable-linker-build-id instead?
|
||||
#
|
||||
|
@ -6,6 +6,6 @@ for p in "${params[@]}"; do
|
||||
esac
|
||||
done
|
||||
|
||||
if $needsTarget; then
|
||||
if $needsTarget && [[ $0 != *cpp ]]; then
|
||||
extraBefore+=(-target @defaultTarget@ @machineFlags@)
|
||||
fi
|
||||
|
@ -27,8 +27,11 @@ for var in "${var_templates_bool[@]}"; do
|
||||
mangleVarBool "$var" ${role_suffixes[@]+"${role_suffixes[@]}"}
|
||||
done
|
||||
|
||||
# `-B@out@/bin' forces cc to use ld-wrapper.sh when calling ld.
|
||||
NIX_CFLAGS_COMPILE_@suffixSalt@="-B@out@/bin/ $NIX_CFLAGS_COMPILE_@suffixSalt@"
|
||||
# Arocc does not support "-B"
|
||||
if [[ -z "@isArocc@" ]]; then
|
||||
# `-B@bintools@/bin' forces cc to use ld-wrapper.sh when calling ld.
|
||||
NIX_CFLAGS_COMPILE_@suffixSalt@="-B@bintools@/bin/ $NIX_CFLAGS_COMPILE_@suffixSalt@"
|
||||
fi
|
||||
|
||||
# Export and assign separately in order that a failing $(..) will fail
|
||||
# the script.
|
||||
|
@ -32,7 +32,7 @@ if [[ -n "${hardeningEnableMap[fortify3]-}" ]]; then
|
||||
fi
|
||||
|
||||
if (( "${NIX_DEBUG:-0}" >= 1 )); then
|
||||
declare -a allHardeningFlags=(fortify fortify3 stackprotector stackclashprotection pie pic strictoverflow format trivialautovarinit zerocallusedregs)
|
||||
declare -a allHardeningFlags=(fortify fortify3 shadowstack stackprotector stackclashprotection pacret pie pic strictoverflow format trivialautovarinit zerocallusedregs)
|
||||
declare -A hardeningDisableMap=()
|
||||
|
||||
# Determine which flags were effectively disabled so we can report below.
|
||||
@ -75,6 +75,14 @@ for flag in "${!hardeningEnableMap[@]}"; do
|
||||
;;
|
||||
esac
|
||||
;;
|
||||
shadowstack)
|
||||
if (( "${NIX_DEBUG:-0}" >= 1 )); then echo HARDENING: enabling shadowstack >&2; fi
|
||||
hardeningCFlagsBefore+=('-fcf-protection=return')
|
||||
;;
|
||||
pacret)
|
||||
if (( "${NIX_DEBUG:-0}" >= 1 )); then echo HARDENING: enabling pacret >&2; fi
|
||||
hardeningCFlagsBefore+=('-mbranch-protection=pac-ret')
|
||||
;;
|
||||
stackprotector)
|
||||
if (( "${NIX_DEBUG:-0}" >= 1 )); then echo HARDENING: enabling stackprotector >&2; fi
|
||||
hardeningCFlagsBefore+=('-fstack-protector-strong' '--param' 'ssp-buffer-size=4')
|
||||
|
@ -79,6 +79,11 @@ if [ "$nonFlagArgs" = 0 ]; then
|
||||
dontLink=1
|
||||
fi
|
||||
|
||||
# Arocc does not link
|
||||
if [ "@isArocc@" = 1 ]; then
|
||||
dontLink=1
|
||||
fi
|
||||
|
||||
# Optionally filter out paths not refering to the store.
|
||||
if [[ "${NIX_ENFORCE_PURITY:-}" = 1 && -n "$NIX_STORE" ]]; then
|
||||
kept=()
|
||||
|
@ -15,7 +15,9 @@
|
||||
, propagateDoc ? cc != null && cc ? man
|
||||
, extraTools ? [], extraPackages ? [], extraBuildCommands ? ""
|
||||
, nixSupport ? {}
|
||||
, isGNU ? false, isClang ? cc.isClang or false, isCcache ? cc.isCcache or false, gnugrep ? null
|
||||
, isGNU ? false, isClang ? cc.isClang or false, isZig ? cc.isZig or false
|
||||
, isArocc ? cc.isArocc or false, isCcache ? cc.isCcache or false
|
||||
, gnugrep ? null
|
||||
, expand-response-params
|
||||
, libcxx ? null
|
||||
|
||||
@ -304,6 +306,9 @@ stdenvNoCC.mkDerivation {
|
||||
|
||||
outputs = [ "out" ] ++ optionals propagateDoc [ "man" "info" ];
|
||||
|
||||
# Cannot be in "passthru" due to "substituteAll"
|
||||
inherit isArocc;
|
||||
|
||||
passthru = {
|
||||
inherit targetPrefix suffixSalt;
|
||||
# "cc" is the generic name for a C compiler, but there is no one for package
|
||||
@ -311,7 +316,7 @@ stdenvNoCC.mkDerivation {
|
||||
# Binutils, and Apple's "cctools"; "bintools" as an attempt to find an
|
||||
# unused middle-ground name that evokes both.
|
||||
inherit bintools;
|
||||
inherit cc libc libcxx nativeTools nativeLibc nativePrefix isGNU isClang;
|
||||
inherit cc libc libcxx nativeTools nativeLibc nativePrefix isGNU isClang isZig;
|
||||
|
||||
emacsBufferSetup = pkgs: ''
|
||||
; We should handle propagation here too
|
||||
@ -391,6 +396,10 @@ stdenvNoCC.mkDerivation {
|
||||
ln -s ${targetPrefix}clang $out/bin/${targetPrefix}cc
|
||||
export named_cc=${targetPrefix}clang
|
||||
export named_cxx=${targetPrefix}clang++
|
||||
elif [ -e $ccPath/arocc ]; then
|
||||
wrap ${targetPrefix}arocc $wrapper $ccPath/arocc
|
||||
ln -s ${targetPrefix}arocc $out/bin/${targetPrefix}cc
|
||||
export named_cc=${targetPrefix}arocc
|
||||
fi
|
||||
|
||||
if [ -e $ccPath/${targetPrefix}g++ ]; then
|
||||
@ -475,7 +484,7 @@ stdenvNoCC.mkDerivation {
|
||||
#
|
||||
# TODO(@Ericson2314): Remove this after stable release and force
|
||||
# everyone to refer to bintools-wrapper directly.
|
||||
+ ''
|
||||
+ optionalString (!isArocc) ''
|
||||
if [[ -f "$bintools/nix-support/dynamic-linker" ]]; then
|
||||
ln -s "$bintools/nix-support/dynamic-linker" "$out/nix-support"
|
||||
fi
|
||||
@ -491,7 +500,7 @@ stdenvNoCC.mkDerivation {
|
||||
|
||||
echo "-B${gccForLibs}/lib/gcc/${targetPlatform.config}/${gccForLibs.version}" >> $out/nix-support/cc-cflags
|
||||
''
|
||||
+ optionalString useGccForLibs ''
|
||||
+ optionalString (useGccForLibs && !isArocc) ''
|
||||
echo "-L${gccForLibs}/lib/gcc/${targetPlatform.config}/${gccForLibs.version}" >> $out/nix-support/cc-ldflags
|
||||
echo "-L${gccForLibs_solib}/lib" >> $out/nix-support/cc-ldflags
|
||||
''
|
||||
@ -517,9 +526,9 @@ stdenvNoCC.mkDerivation {
|
||||
''
|
||||
# this ensures that when clang passes -lgcc_s to lld (as it does
|
||||
# when building e.g. firefox), lld is able to find libgcc_s.so
|
||||
+ concatMapStrings (libgcc: ''
|
||||
+ optionals (!isArocc) (concatMapStrings (libgcc: ''
|
||||
echo "-L${libgcc}/lib" >> $out/nix-support/cc-ldflags
|
||||
'') (toList (gccForLibs.libgcc or [])))
|
||||
'') (toList (gccForLibs.libgcc or []))))
|
||||
|
||||
##
|
||||
## General libc support
|
||||
@ -539,9 +548,10 @@ stdenvNoCC.mkDerivation {
|
||||
+ optionalString (libc != null) (''
|
||||
touch "$out/nix-support/libc-cflags"
|
||||
touch "$out/nix-support/libc-ldflags"
|
||||
'' + optionalString (!isArocc) ''
|
||||
echo "-B${libc_lib}${libc.libdir or "/lib/"}" >> $out/nix-support/libc-crt1-cflags
|
||||
'' + optionalString (!(cc.langD or false)) ''
|
||||
echo "-idirafter ${libc_dev}${libc.incdir or "/include"}" >> $out/nix-support/libc-cflags
|
||||
echo "-${if isArocc then "I" else "idirafter"} ${libc_dev}${libc.incdir or "/include"}" >> $out/nix-support/libc-cflags
|
||||
'' + optionalString (isGNU && (!(cc.langD or false))) ''
|
||||
for dir in "${cc}"/lib/gcc/*/*/include-fixed; do
|
||||
echo '-idirafter' ''${dir} >> $out/nix-support/libc-cflags
|
||||
@ -597,7 +607,7 @@ stdenvNoCC.mkDerivation {
|
||||
# ${cc_solib}/lib64 (even though it does actually search there...)..
|
||||
# This confuses libtool. So add it to the compiler tool search
|
||||
# path explicitly.
|
||||
+ optionalString (!nativeTools) ''
|
||||
+ optionalString (!nativeTools && !isArocc) ''
|
||||
if [ -e "${cc_solib}/lib64" -a ! -L "${cc_solib}/lib64" ]; then
|
||||
ccLDFlags+=" -L${cc_solib}/lib64"
|
||||
ccCFlags+=" -B${cc_solib}/lib64"
|
||||
@ -605,7 +615,7 @@ stdenvNoCC.mkDerivation {
|
||||
ccLDFlags+=" -L${cc_solib}/lib"
|
||||
ccCFlags+=" -B${cc_solib}/lib"
|
||||
|
||||
'' + optionalString cc.langAda or false ''
|
||||
'' + optionalString (cc.langAda or false && !isArocc) ''
|
||||
touch "$out/nix-support/gnat-cflags"
|
||||
touch "$out/nix-support/gnat-ldflags"
|
||||
basePath=$(echo $cc/lib/*/*/*)
|
||||
@ -626,7 +636,7 @@ stdenvNoCC.mkDerivation {
|
||||
+ optionalString propagateDoc ''
|
||||
ln -s ${cc.man} $man
|
||||
ln -s ${cc.info} $info
|
||||
'' + optionalString (cc.langD or cc.langJava or false) ''
|
||||
'' + optionalString (cc.langD or cc.langJava or false && !isArocc) ''
|
||||
echo "-B${zlib}${zlib.libdir or "/lib/"}" >> $out/nix-support/libc-cflags
|
||||
''
|
||||
|
||||
@ -667,7 +677,7 @@ stdenvNoCC.mkDerivation {
|
||||
hardening_unsupported_flags+=" stackprotector"
|
||||
''
|
||||
|
||||
+ optionalString (libc != null && targetPlatform.isAvr) ''
|
||||
+ optionalString (libc != null && targetPlatform.isAvr && !isArocc) ''
|
||||
for isa in avr5 avr3 avr4 avr6 avr25 avr31 avr35 avr51 avrxmega2 avrxmega4 avrxmega5 avrxmega6 avrxmega7 tiny-stack; do
|
||||
echo "-B${getLib libc}/avr/lib/$isa" >> $out/nix-support/libc-crt1-cflags
|
||||
done
|
||||
|
28
pkgs/by-name/cm/cmake/000-nixpkgs-cmake-prefix-path.diff
Normal file
28
pkgs/by-name/cm/cmake/000-nixpkgs-cmake-prefix-path.diff
Normal file
@ -0,0 +1,28 @@
|
||||
diff --git a/Source/cmFindBase.cxx b/Source/cmFindBase.cxx
|
||||
index 8840cdcb..c34b7ee9 100644
|
||||
--- a/Source/cmFindBase.cxx
|
||||
+++ b/Source/cmFindBase.cxx
|
||||
@@ -280,6 +280,11 @@ void cmFindBase::FillCMakeEnvironmentPath()
|
||||
// Add CMAKE_*_PATH environment variables
|
||||
std::string var = cmStrCat("CMAKE_", this->CMakePathName, "_PATH");
|
||||
paths.AddEnvPrefixPath("CMAKE_PREFIX_PATH");
|
||||
+ if (this->CMakePathName != "PROGRAM") {
|
||||
+ // Like CMAKE_PREFIX_PATH except when searching for programs. Programs need
|
||||
+ // to be located via PATH
|
||||
+ paths.AddEnvPrefixPath("NIXPKGS_CMAKE_PREFIX_PATH");
|
||||
+ }
|
||||
paths.AddEnvPath(var);
|
||||
|
||||
if (this->CMakePathName == "PROGRAM") {
|
||||
diff --git a/Source/cmFindPackageCommand.cxx b/Source/cmFindPackageCommand.cxx
|
||||
index 9b51b1ad..6acc676c 100644
|
||||
--- a/Source/cmFindPackageCommand.cxx
|
||||
+++ b/Source/cmFindPackageCommand.cxx
|
||||
@@ -2039,6 +2039,7 @@ void cmFindPackageCommand::FillPrefixesCMakeEnvironment()
|
||||
|
||||
// And now the general CMake environment variables
|
||||
paths.AddEnvPath("CMAKE_PREFIX_PATH");
|
||||
+ paths.AddEnvPath("NIXPKGS_CMAKE_PREFIX_PATH");
|
||||
if (this->DebugMode) {
|
||||
debugBuffer = cmStrCat(debugBuffer,
|
||||
"CMAKE_PREFIX_PATH env variable "
|
@ -56,6 +56,9 @@ stdenv.mkDerivation (finalAttrs: {
|
||||
};
|
||||
|
||||
patches = [
|
||||
# Add NIXPKGS_CMAKE_PREFIX_PATH to cmake which is like CMAKE_PREFIX_PATH
|
||||
# except it is not searched for programs
|
||||
./000-nixpkgs-cmake-prefix-path.diff
|
||||
# Don't search in non-Nix locations such as /usr, but do search in our libc.
|
||||
./001-search-path.diff
|
||||
# Don't depend on frameworks.
|
||||
|
@ -1,5 +1,7 @@
|
||||
addCMakeParams() {
|
||||
addToSearchPath CMAKE_PREFIX_PATH $1
|
||||
# NIXPKGS_CMAKE_PREFIX_PATH is like CMAKE_PREFIX_PATH except cmake
|
||||
# will not search it for programs
|
||||
addToSearchPath NIXPKGS_CMAKE_PREFIX_PATH $1
|
||||
}
|
||||
|
||||
fixCmakeFiles() {
|
||||
@ -151,22 +153,22 @@ makeCmakeFindLibs(){
|
||||
for flag in ${NIX_CFLAGS_COMPILE-} ${NIX_LDFLAGS-}; do
|
||||
if test -n "$isystem_seen" && test -d "$flag"; then
|
||||
isystem_seen=
|
||||
export CMAKE_INCLUDE_PATH="${CMAKE_INCLUDE_PATH-}${CMAKE_INCLUDE_PATH:+:}${flag}"
|
||||
addToSearchPath CMAKE_INCLUDE_PATH "${flag}"
|
||||
elif test -n "$iframework_seen" && test -d "$flag"; then
|
||||
iframework_seen=
|
||||
export CMAKE_FRAMEWORK_PATH="${CMAKE_FRAMEWORK_PATH-}${CMAKE_FRAMEWORK_PATH:+:}${flag}"
|
||||
addToSearchPath CMAKE_FRAMEWORK_PATH "${flag}"
|
||||
else
|
||||
isystem_seen=
|
||||
iframework_seen=
|
||||
case $flag in
|
||||
-I*)
|
||||
export CMAKE_INCLUDE_PATH="${CMAKE_INCLUDE_PATH-}${CMAKE_INCLUDE_PATH:+:}${flag:2}"
|
||||
addToSearchPath CMAKE_INCLUDE_PATH "${flag:2}"
|
||||
;;
|
||||
-L*)
|
||||
export CMAKE_LIBRARY_PATH="${CMAKE_LIBRARY_PATH-}${CMAKE_LIBRARY_PATH:+:}${flag:2}"
|
||||
addToSearchPath CMAKE_LIBRARY_PATH "${flag:2}"
|
||||
;;
|
||||
-F*)
|
||||
export CMAKE_FRAMEWORK_PATH="${CMAKE_FRAMEWORK_PATH-}${CMAKE_FRAMEWORK_PATH:+:}${flag:2}"
|
||||
addToSearchPath CMAKE_FRAMEWORK_PATH "${flag:2}"
|
||||
;;
|
||||
-isystem)
|
||||
isystem_seen=1
|
||||
|
3674
pkgs/by-name/co/cosmic-comp/Cargo.lock
generated
3674
pkgs/by-name/co/cosmic-comp/Cargo.lock
generated
File diff suppressed because it is too large
Load Diff
@ -3,6 +3,7 @@
|
||||
, rustPlatform
|
||||
, fetchFromGitHub
|
||||
, makeBinaryWrapper
|
||||
, pixman
|
||||
, pkg-config
|
||||
, libinput
|
||||
, libglvnd
|
||||
@ -18,27 +19,34 @@
|
||||
, useSystemd ? lib.meta.availableOn stdenv.hostPlatform systemd
|
||||
}:
|
||||
|
||||
rustPlatform.buildRustPackage {
|
||||
rustPlatform.buildRustPackage rec {
|
||||
pname = "cosmic-comp";
|
||||
version = "unstable-2023-11-13";
|
||||
version = "1.0.0-alpha.1";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "pop-os";
|
||||
repo = "cosmic-comp";
|
||||
rev = "d051d141979820f50b75bd686c745fb7f84fcd05";
|
||||
hash = "sha256-8okRiVVPzmuPJjnv1YoQPQFI8g0j1DQhwUoO51dHgGA=";
|
||||
rev = "epoch-${version}";
|
||||
hash = "sha256-4NAIpyaITFNaTDBcsleIwKPq8nHNa77C7y+5hCIYXZE=";
|
||||
};
|
||||
|
||||
cargoLock = {
|
||||
lockFile = ./Cargo.lock;
|
||||
outputHashes = {
|
||||
"cosmic-config-0.1.0" = "sha256-5WajbfcfCc0ZRpJfysqEydthOsF04ipb35QVWuWKrEs=";
|
||||
"cosmic-protocols-0.1.0" = "sha256-st46wmOncJvu0kj6qaot6LT/ojmW/BwXbbGf8s0mdZ8=";
|
||||
"atomicwrites-0.4.2" = "sha256-QZSuGPrJXh+svMeFWqAXoqZQxLq/WfIiamqvjJNVhxA=";
|
||||
"clipboard_macos-0.1.0" = "sha256-cG5vnkiyDlQnbEfV2sPbmBYKv1hd3pjJrymfZb8ziKk=";
|
||||
"cosmic-config-0.1.0" = "sha256-nZCefRCq40K0Mcsav+akZbX89kHnliqAkB7vKx5WIwY=";
|
||||
"cosmic-protocols-0.1.0" = "sha256-qgo8FMKo/uCbhUjfykRRN8KSavbyhZpu82M8npLcIPI=";
|
||||
"cosmic-settings-config-0.1.0" = "sha256-/Qav6r4VQ8ZDSs/tqHeutxYH3u4HiTBFWTfAYUSl2HQ=";
|
||||
"cosmic-text-0.12.1" = "sha256-x0XTxzbmtE2d4XCG/Nuq3DzBpz15BbnjRRlirfNJEiU=";
|
||||
"d3d12-0.19.0" = "sha256-usrxQXWLGJDjmIdw1LBXtBvX+CchZDvE8fHC0LjvhD4=";
|
||||
"glyphon-0.5.0" = "sha256-j1HrbEpUBqazWqNfJhpyjWuxYAxkvbXzRKeSouUoPWg=";
|
||||
"id_tree-1.8.0" = "sha256-uKdKHRfPGt3vagOjhnri3aYY5ar7O3rp2/ivTfM2jT0=";
|
||||
"smithay-0.3.0" = "sha256-e6BSrsrVSBcOuF8m21m74h7DWZnYHGIYs/4D4ABvqNM=";
|
||||
"smithay-0.3.0" = "sha256-puo6xbWRTIco8luz3Jz83VXoRMkyb0ZH7kKHGlTzS5Q=";
|
||||
"smithay-clipboard-0.8.0" = "sha256-4InFXm0ahrqFrtNLeqIuE3yeOpxKZJZx+Bc0yQDtv34=";
|
||||
"smithay-egui-0.1.0" = "sha256-FcSoKCwYk3okwQURiQlDUcfk9m/Ne6pSblGAzHDaVHg=";
|
||||
"softbuffer-0.2.0" = "sha256-VD2GmxC58z7Qfu/L+sfENE+T8L40mvUKKSfgLmCTmjY=";
|
||||
"taffy-0.3.11" = "sha256-0hXOEj6IjSW8e1t+rvxBFX6V9XRum3QO2Des1XlHJEw=";
|
||||
"softbuffer-0.4.1" = "sha256-a0bUFz6O8CWRweNt/OxTvflnPYwO5nm6vsyc/WcXyNg=";
|
||||
"taffy-0.3.11" = "sha256-SCx9GEIJjWdoNVyq+RZAGn0N71qraKZxf9ZWhvyzLaI=";
|
||||
};
|
||||
};
|
||||
|
||||
@ -50,6 +58,7 @@ rustPlatform.buildRustPackage {
|
||||
libinput
|
||||
libxkbcommon
|
||||
mesa
|
||||
pixman
|
||||
seatd
|
||||
udev
|
||||
wayland
|
||||
|
37
pkgs/by-name/ew/eww/lockfile.patch
Normal file
37
pkgs/by-name/ew/eww/lockfile.patch
Normal file
@ -0,0 +1,37 @@
|
||||
diff --git a/Cargo.lock b/Cargo.lock
|
||||
index 5d94bd4..acd2c8d 100644
|
||||
--- a/Cargo.lock
|
||||
+++ b/Cargo.lock
|
||||
@@ -1676,7 +1676,7 @@ dependencies = [
|
||||
"libm",
|
||||
"log",
|
||||
"regex",
|
||||
- "time 0.3.34",
|
||||
+ "time 0.3.36",
|
||||
"urlencoding",
|
||||
]
|
||||
|
||||
@@ -2893,9 +2893,9 @@ dependencies = [
|
||||
|
||||
[[package]]
|
||||
name = "time"
|
||||
-version = "0.3.34"
|
||||
+version = "0.3.36"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
-checksum = "c8248b6521bb14bc45b4067159b9b6ad792e2d6d754d6c41fb50e29fefe38749"
|
||||
+checksum = "5dfd88e563464686c916c7e46e623e520ddc6d79fa6641390f2e3fa86e83e885"
|
||||
dependencies = [
|
||||
"deranged",
|
||||
"itoa",
|
||||
@@ -2914,9 +2914,9 @@ checksum = "ef927ca75afb808a4d64dd374f00a2adf8d0fcff8e7b184af886c3c87ec4a3f3"
|
||||
|
||||
[[package]]
|
||||
name = "time-macros"
|
||||
-version = "0.2.17"
|
||||
+version = "0.2.18"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
-checksum = "7ba3a3ef41e6672a2f0f001392bb5dcd3ff0a9992d618ca761a11c3121547774"
|
||||
+checksum = "3f252a68540fde3a3877aeea552b832b40ab9a69e318efd078774a01ddee1ccf"
|
||||
dependencies = [
|
||||
"num-conv",
|
||||
"time-core",
|
@ -1,18 +1,20 @@
|
||||
{ lib
|
||||
, rustPlatform
|
||||
, fetchFromGitHub
|
||||
, pkg-config
|
||||
, wrapGAppsHook3
|
||||
, gtk3
|
||||
, librsvg
|
||||
, gtk-layer-shell
|
||||
, stdenv
|
||||
, libdbusmenu-gtk3
|
||||
{
|
||||
lib,
|
||||
rustPlatform,
|
||||
fetchFromGitHub,
|
||||
pkg-config,
|
||||
wrapGAppsHook3,
|
||||
gtk3,
|
||||
librsvg,
|
||||
gtk-layer-shell,
|
||||
stdenv,
|
||||
libdbusmenu-gtk3,
|
||||
nix-update-script,
|
||||
}:
|
||||
|
||||
rustPlatform.buildRustPackage rec {
|
||||
pname = "eww";
|
||||
version = "0.6.0-unstable-2024-04-26";
|
||||
version = "0.6.0-unstable-2024-07-05";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "elkowar";
|
||||
@ -20,11 +22,13 @@ rustPlatform.buildRustPackage rec {
|
||||
# FIXME: change to a release tag once a new release is available
|
||||
# https://github.com/elkowar/eww/pull/1084
|
||||
# using the revision to fix string truncation issue in eww config
|
||||
rev = "2c8811512460ce6cc75e021d8d081813647699dc";
|
||||
hash = "sha256-eDOg5Ink3iWT/B1WpD9po5/UxS4DEaVO4NPIRyjSheM=";
|
||||
rev = "4d55e9ad63d1fae887726dffcd25a32def23d34f";
|
||||
hash = "sha256-LTSFlW/46hl1u9SzqnvbtNxswCW05bhwOY6CzVEJC5o=";
|
||||
};
|
||||
|
||||
cargoHash = "sha256-ClnIW7HxbQcC85OyoMhBLFjVtdEUCOARuimfS4uRi+E=";
|
||||
# needed to fix build errors with rust 1.80 due to outdated time crate
|
||||
cargoPatches = [ ./lockfile.patch ];
|
||||
cargoHash = "sha256-55lmQl5pJwrEj5RlSG8b0PqtZVrASxTmX4Qdk090DZo=";
|
||||
|
||||
nativeBuildInputs = [
|
||||
pkg-config
|
||||
@ -48,6 +52,8 @@ rustPlatform.buildRustPackage rec {
|
||||
# requires unstable rust features
|
||||
RUSTC_BOOTSTRAP = 1;
|
||||
|
||||
passthru.updateScript = nix-update-script { extraArgs = [ "--version=branch" ]; };
|
||||
|
||||
meta = {
|
||||
description = "Widget system made in Rust to create widgets for any WM";
|
||||
longDescription = ''
|
||||
|
89
pkgs/by-name/gd/gdbm/package.nix
Normal file
89
pkgs/by-name/gd/gdbm/package.nix
Normal file
@ -0,0 +1,89 @@
|
||||
{
|
||||
lib,
|
||||
fetchurl,
|
||||
stdenv,
|
||||
testers,
|
||||
updateAutotoolsGnuConfigScriptsHook,
|
||||
}:
|
||||
|
||||
stdenv.mkDerivation (finalAttrs: {
|
||||
pname = "gdbm";
|
||||
version = "1.24";
|
||||
|
||||
src = fetchurl {
|
||||
url = "mirror://gnu/gdbm/gdbm-${finalAttrs.version}.tar.gz";
|
||||
hash = "sha256-aV6YJ/33Y1E/EzkQvH5s/bkYeUOk/slD5XRJcj0rjb8=";
|
||||
};
|
||||
|
||||
nativeBuildInputs = [ updateAutotoolsGnuConfigScriptsHook ];
|
||||
|
||||
configureFlags = [ (lib.enableFeature true "libgdbm-compat") ];
|
||||
|
||||
outputs = [
|
||||
"out"
|
||||
"dev"
|
||||
"info"
|
||||
"lib"
|
||||
"man"
|
||||
];
|
||||
|
||||
doCheck = true;
|
||||
|
||||
enableParallelBuilding = true;
|
||||
|
||||
# 1. Linking static stubs on cygwin requires correct ordering. Consider
|
||||
# upstreaming this.
|
||||
#
|
||||
# 2. Disable dbmfetch03.at test because it depends on unlink() failing on a
|
||||
# link in a chmod -w directory, which cygwin apparently allows.
|
||||
postPatch = lib.optionalString stdenv.buildPlatform.isCygwin ''
|
||||
substituteInPlace tests/Makefile.in \
|
||||
--replace-fail '_LDADD = ../src/libgdbm.la ../compat/libgdbm_compat.la' \
|
||||
'_LDADD = ../compat/libgdbm_compat.la ../src/libgdbm.la'
|
||||
substituteInPlace tests/testsuite.at
|
||||
--replace-fail 'm4_include([dbmfetch03.at])' ""
|
||||
'';
|
||||
|
||||
# create symlinks for compatibility
|
||||
postInstall = ''
|
||||
install -dm755 ''${!outputDev}/include/gdbm
|
||||
pushd ''${!outputDev}/include/gdbm
|
||||
ln -s ../dbm.h dbm.h
|
||||
ln -s ../gdbm.h gdbm.h
|
||||
ln -s ../ndbm.h ndbm.h
|
||||
popd
|
||||
'';
|
||||
|
||||
passthru = {
|
||||
tests.version = testers.testVersion {
|
||||
package = finalAttrs.finalPackage;
|
||||
command = "gdbmtool --version";
|
||||
};
|
||||
};
|
||||
|
||||
meta = {
|
||||
homepage = "https://www.gnu.org/software/gdbm/";
|
||||
description = "GNU dbm key/value database library";
|
||||
longDescription = ''
|
||||
GNU dbm (or GDBM, for short) is a library of database functions that use
|
||||
extensible hashing and work similar to the standard UNIX dbm. These
|
||||
routines are provided to a programmer needing to create and manipulate a
|
||||
hashed database.
|
||||
|
||||
The basic use of GDBM is to store key/data pairs in a data file. Each
|
||||
key must be unique and each key is paired with only one data item.
|
||||
|
||||
The library provides primitives for storing key/data pairs, searching and
|
||||
retrieving the data by its key and deleting a key along with its data.
|
||||
It also support sequential iteration over all key/data pairs in a
|
||||
database.
|
||||
|
||||
For compatibility with programs using old UNIX dbm function, the package
|
||||
also provides traditional dbm and ndbm interfaces.
|
||||
'';
|
||||
license = lib.licenses.gpl3Plus;
|
||||
mainProgram = "gdbmtool";
|
||||
maintainers = with lib.maintainers; [ AndersonTorres ];
|
||||
platforms = lib.platforms.all;
|
||||
};
|
||||
})
|
69
pkgs/by-name/li/libtheora/package.nix
Normal file
69
pkgs/by-name/li/libtheora/package.nix
Normal file
@ -0,0 +1,69 @@
|
||||
{
|
||||
lib,
|
||||
stdenv,
|
||||
fetchurl,
|
||||
fetchpatch,
|
||||
autoreconfHook,
|
||||
libogg,
|
||||
libvorbis,
|
||||
pkg-config,
|
||||
testers,
|
||||
validatePkgConfig,
|
||||
}:
|
||||
|
||||
stdenv.mkDerivation (finalAttrs: {
|
||||
pname = "libtheora";
|
||||
version = "1.1.1";
|
||||
|
||||
src = fetchurl {
|
||||
url = "https://downloads.xiph.org/releases/theora/libtheora-${finalAttrs.version}.tar.gz";
|
||||
hash = "sha256-QJUpVsR4EZKNHnkizaO8H0J+t1aAw8NySckelJBUkWs=";
|
||||
};
|
||||
|
||||
patches = [
|
||||
# fix error in autoconf scripts
|
||||
(fetchpatch {
|
||||
url = "https://github.com/xiph/theora/commit/28cc6dbd9b2a141df94f60993256a5fca368fa54.diff";
|
||||
hash = "sha256-M/UULkiklvEay7LyOuCamxWCSvt37QSMzHOsAAnOWJo=";
|
||||
})
|
||||
] ++ lib.optionals stdenv.hostPlatform.isMinGW [ ./mingw-remove-export.patch ];
|
||||
|
||||
configureFlags = [ "--disable-examples" ];
|
||||
|
||||
outputs = [
|
||||
"out"
|
||||
"dev"
|
||||
"devdoc"
|
||||
];
|
||||
outputDoc = "devdoc";
|
||||
|
||||
nativeBuildInputs = [
|
||||
autoreconfHook
|
||||
pkg-config
|
||||
validatePkgConfig
|
||||
];
|
||||
|
||||
propagatedBuildInputs = [
|
||||
libogg
|
||||
libvorbis
|
||||
];
|
||||
|
||||
passthru = {
|
||||
tests.pkg-config = testers.hasPkgConfigModules {
|
||||
package = finalAttrs.finalPackage;
|
||||
moduleNames = [
|
||||
"theora"
|
||||
"theoradec"
|
||||
"theoraenc"
|
||||
];
|
||||
};
|
||||
};
|
||||
|
||||
meta = {
|
||||
description = "Library for Theora, a free and open video compression format";
|
||||
homepage = "https://www.theora.org/";
|
||||
license = lib.licenses.bsd3;
|
||||
maintainers = with lib.maintainers; [ getchoo ];
|
||||
platforms = lib.platforms.unix ++ lib.platforms.windows;
|
||||
};
|
||||
})
|
12
pkgs/by-name/me/meson/000-nixpkgs-cmake-prefix-path.patch
Normal file
12
pkgs/by-name/me/meson/000-nixpkgs-cmake-prefix-path.patch
Normal file
@ -0,0 +1,12 @@
|
||||
diff --git a/mesonbuild/dependencies/data/CMakePathInfo.txt b/mesonbuild/dependencies/data/CMakePathInfo.txt
|
||||
index 662ec58..4d5f4e4 100644
|
||||
--- a/mesonbuild/dependencies/data/CMakePathInfo.txt
|
||||
+++ b/mesonbuild/dependencies/data/CMakePathInfo.txt
|
||||
@@ -5,6 +5,7 @@ list(APPEND TMP_PATHS_LIST ${CMAKE_PREFIX_PATH})
|
||||
list(APPEND TMP_PATHS_LIST ${CMAKE_FRAMEWORK_PATH})
|
||||
list(APPEND TMP_PATHS_LIST ${CMAKE_APPBUNDLE_PATH})
|
||||
list(APPEND TMP_PATHS_LIST $ENV{CMAKE_PREFIX_PATH})
|
||||
+list(APPEND TMP_PATHS_LIST $ENV{NIXPKGS_CMAKE_PREFIX_PATH})
|
||||
list(APPEND TMP_PATHS_LIST $ENV{CMAKE_FRAMEWORK_PATH})
|
||||
list(APPEND TMP_PATHS_LIST $ENV{CMAKE_APPBUNDLE_PATH})
|
||||
list(APPEND TMP_PATHS_LIST ${CMAKE_SYSTEM_PREFIX_PATH})
|
87
pkgs/by-name/me/meson/007-case-sensitive-fs.patch
Normal file
87
pkgs/by-name/me/meson/007-case-sensitive-fs.patch
Normal file
@ -0,0 +1,87 @@
|
||||
From a6fb2c165cda4bbf315424c96165ec9cc7052363 Mon Sep 17 00:00:00 2001
|
||||
From: Randy Eckenrode <randy@largeandhighquality.com>
|
||||
Date: Wed, 3 Apr 2024 17:35:56 -0400
|
||||
Subject: [PATCH] dependencies: find extraframeworks on case-sensitive
|
||||
filesystems
|
||||
|
||||
Fixes a test failure on case-sensitive filesystems when a CMake
|
||||
dependency is turned into an Apple framework.
|
||||
---
|
||||
mesonbuild/dependencies/framework.py | 9 +++++++--
|
||||
test cases/osx/11 case sensitive apfs/meson.build | 5 +++++
|
||||
test cases/osx/11 case sensitive apfs/prog.c | 3 +++
|
||||
test cases/osx/11 case sensitive apfs/test.json | 5 +++++
|
||||
4 files changed, 20 insertions(+), 2 deletions(-)
|
||||
create mode 100644 test cases/osx/11 case sensitive apfs/meson.build
|
||||
create mode 100644 test cases/osx/11 case sensitive apfs/prog.c
|
||||
create mode 100644 test cases/osx/11 case sensitive apfs/test.json
|
||||
|
||||
diff --git a/mesonbuild/dependencies/framework.py b/mesonbuild/dependencies/framework.py
|
||||
index 3c880c7430af..1fbd628235ba 100644
|
||||
--- a/mesonbuild/dependencies/framework.py
|
||||
+++ b/mesonbuild/dependencies/framework.py
|
||||
@@ -47,6 +47,7 @@ def detect(self, name: str, paths: T.List[str]) -> None:
|
||||
framework_path = self._get_framework_path(p, name)
|
||||
if framework_path is None:
|
||||
continue
|
||||
+ framework_name = framework_path.stem
|
||||
# We want to prefer the specified paths (in order) over the system
|
||||
# paths since these are "extra" frameworks.
|
||||
# For example, Python2's framework is in /System/Library/Frameworks and
|
||||
@@ -54,11 +55,15 @@ def detect(self, name: str, paths: T.List[str]) -> None:
|
||||
# Python.framework. We need to know for sure that the framework was
|
||||
# found in the path we expect.
|
||||
allow_system = p in self.system_framework_paths
|
||||
- args = self.clib_compiler.find_framework(name, self.env, [p], allow_system)
|
||||
+ args = self.clib_compiler.find_framework(framework_name, self.env, [p], allow_system)
|
||||
if args is None:
|
||||
continue
|
||||
self.link_args = args
|
||||
self.framework_path = framework_path.as_posix()
|
||||
+ # The search is done case-insensitively, so the found name may differ
|
||||
+ # from the one that was requested. Setting the name ensures the correct
|
||||
+ # one is used when linking on case-sensitive filesystems.
|
||||
+ self.name = framework_name
|
||||
self.compile_args = ['-F' + self.framework_path]
|
||||
# We need to also add -I includes to the framework because all
|
||||
# cross-platform projects such as OpenGL, Python, Qt, GStreamer,
|
||||
@@ -74,7 +79,7 @@ def _get_framework_path(self, path: str, name: str) -> T.Optional[Path]:
|
||||
p = Path(path)
|
||||
lname = name.lower()
|
||||
for d in p.glob('*.framework/'):
|
||||
- if lname == d.name.rsplit('.', 1)[0].lower():
|
||||
+ if lname == d.stem.lower():
|
||||
return d
|
||||
return None
|
||||
|
||||
diff --git a/test cases/osx/11 case sensitive apfs/meson.build b/test cases/osx/11 case sensitive apfs/meson.build
|
||||
new file mode 100644
|
||||
index 000000000000..dd566b185f28
|
||||
--- /dev/null
|
||||
+++ b/test cases/osx/11 case sensitive apfs/meson.build
|
||||
@@ -0,0 +1,5 @@
|
||||
+project('case-sensitive APFS with extra frameworks test', 'c')
|
||||
+
|
||||
+dep = dependency('FoUnDaTiOn')
|
||||
+
|
||||
+exe = executable('prog', 'prog.c', install : true, dependencies: dep)
|
||||
diff --git a/test cases/osx/11 case sensitive apfs/prog.c b/test cases/osx/11 case sensitive apfs/prog.c
|
||||
new file mode 100644
|
||||
index 000000000000..9b6bdc2ec2f0
|
||||
--- /dev/null
|
||||
+++ b/test cases/osx/11 case sensitive apfs/prog.c
|
||||
@@ -0,0 +1,3 @@
|
||||
+int main(void) {
|
||||
+ return 0;
|
||||
+}
|
||||
diff --git a/test cases/osx/11 case sensitive apfs/test.json b/test cases/osx/11 case sensitive apfs/test.json
|
||||
new file mode 100644
|
||||
index 000000000000..a883714eaa27
|
||||
--- /dev/null
|
||||
+++ b/test cases/osx/11 case sensitive apfs/test.json
|
||||
@@ -0,0 +1,5 @@
|
||||
+{
|
||||
+ "installed": [
|
||||
+ {"type": "file", "file": "usr/bin/prog"}
|
||||
+ ]
|
||||
+}
|
@ -21,16 +21,19 @@ let
|
||||
in
|
||||
python3.pkgs.buildPythonApplication rec {
|
||||
pname = "meson";
|
||||
version = "1.4.1";
|
||||
version = "1.5.1";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "mesonbuild";
|
||||
repo = "meson";
|
||||
rev = "refs/tags/${version}";
|
||||
hash = "sha256-RBE4AUF5fymUA87JEDWtpUFXmVPFzdhZgDI7/kscTx4=";
|
||||
hash = "sha256-BqsEO1a93a8d7/UH232buSPBt+WSNJbw1DGYA2nm9rs=";
|
||||
};
|
||||
|
||||
patches = [
|
||||
# Nixpkgs cmake uses NIXPKGS_CMAKE_PREFIX_PATH for the search path
|
||||
./000-nixpkgs-cmake-prefix-path.patch
|
||||
|
||||
# In typical distributions, RPATH is only needed for internal libraries so
|
||||
# meson removes everything else. With Nix, the locations of libraries
|
||||
# are not as predictable, therefore we need to keep them in the RPATH.
|
||||
@ -72,14 +75,22 @@ python3.pkgs.buildPythonApplication rec {
|
||||
# This edge case is explicitly part of meson but is wrong for nix
|
||||
./007-freebsd-pkgconfig-path.patch
|
||||
|
||||
# Find boost via pkg-config
|
||||
# https://github.com/NixOS/nixpkgs/issues/86131
|
||||
# Already merged upstream PR: https://github.com/mesonbuild/meson/pull/13272
|
||||
# FIXME: Will be in meson 1.5.0
|
||||
(fetchpatch {
|
||||
name = "find-boost-pkg-config.patch";
|
||||
url = "https://github.com/mesonbuild/meson/commit/c21b886ba8a60cce7fa56e4be40bd7547129fb00.patch";
|
||||
hash = "sha256-uSilNuSx9yd1cxs0XVLcLw4MOXEd2uIe2g+wk+SBqeU=";
|
||||
name = "tests-skip-framework-recasting-if-CMake-unavailable.patch";
|
||||
url = "https://github.com/mesonbuild/meson/commit/8a8a3a0578fd8d5a8720a7a706f6f3b99e857f9c.patch";
|
||||
hash = "sha256-XkwNQ5eg/fVekhsFg/V2/S2LbIVGz3H0wsSFlUT3ZZE=";
|
||||
})
|
||||
|
||||
# Fix extraframework lookup on case-sensitive APFS.
|
||||
# https://github.com/mesonbuild/meson/pull/13038
|
||||
./007-case-sensitive-fs.patch
|
||||
|
||||
# Fix meson's detection for zig's linker
|
||||
# https://github.com/mesonbuild/meson/pull/12293
|
||||
(fetchpatch {
|
||||
name = "linker-support-zig-cc.patch";
|
||||
url = "https://github.com/mesonbuild/meson/pull/12293/commits/2baae244c995794d9addfe6ed924dfa72f01be82.patch";
|
||||
hash = "sha256-dDOmSRBKl/gs7I3kmLXIyQk3zsOdlaYov72pPSel4+I=";
|
||||
})
|
||||
];
|
||||
|
||||
@ -133,6 +144,9 @@ python3.pkgs.buildPythonApplication rec {
|
||||
''test cases/linuxlike/14 static dynamic linkage''
|
||||
# Nixpkgs cctools does not have bitcode support.
|
||||
''test cases/osx/7 bitcode''
|
||||
] ++ lib.optionals stdenv.isDarwin [
|
||||
# requires llvmPackages.openmp, creating cyclic dependency
|
||||
''test cases/common/184 openmp''
|
||||
] ++ lib.optionals stdenv.isFreeBSD [
|
||||
# pch doesn't work quite right on FreeBSD, I think
|
||||
''test cases/common/13 pch''
|
||||
|
@ -36,6 +36,11 @@ stdenv.mkDerivation rec {
|
||||
url = "https://github.com/acmel/dwarves/commit/6a2b27c0f512619b0e7a769a18a0fb05bb3789a5.patch";
|
||||
hash = "sha256-Le1BAew/a/QKkYNLgSQxEvZ9mEEglUw8URwz1kiheeE=";
|
||||
})
|
||||
(fetchpatch {
|
||||
name = "fix-clang-btf-generation-bug-2.patch";
|
||||
url = "https://github.com/acmel/dwarves/commit/94a01bde592c555b3eb526aeb4c2ad695c5660d8.patch";
|
||||
hash = "sha256-SMIxLEBjBkprAqVNX1h7nXxAsgbwvCD/Bz7c1ekwg5w=";
|
||||
})
|
||||
];
|
||||
|
||||
# Put libraries in "lib" subdirectory, not top level of $out
|
||||
|
@ -10,13 +10,13 @@
|
||||
|
||||
stdenv.mkDerivation (finalAttrs: {
|
||||
pname = "waf";
|
||||
version = "2.1.1";
|
||||
version = "2.1.2";
|
||||
|
||||
src = fetchFromGitLab {
|
||||
owner = "ita1024";
|
||||
repo = "waf";
|
||||
rev = "waf-${finalAttrs.version}";
|
||||
hash = "sha256-38u8DJ1KLkb7FfeCr+1e5UBE3Qkx1q2FBsm5HDXnunQ=";
|
||||
hash = "sha256-/7V+GA3YBhdaJkDlZ1k4IUYkgh0yuTG09G+frnnMoIw=";
|
||||
};
|
||||
|
||||
nativeBuildInputs = [
|
||||
|
1464
pkgs/by-name/ze/zed-editor/Cargo.lock
generated
1464
pkgs/by-name/ze/zed-editor/Cargo.lock
generated
File diff suppressed because it is too large
Load Diff
@ -35,13 +35,13 @@ assert withGLES -> stdenv.isLinux;
|
||||
|
||||
rustPlatform.buildRustPackage rec {
|
||||
pname = "zed";
|
||||
version = "0.146.5";
|
||||
version = "0.147.2";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "zed-industries";
|
||||
repo = "zed";
|
||||
rev = "refs/tags/v${version}";
|
||||
hash = "sha256-rHdvANczB2ccLOCNh1ZgkkknCNbTaPPODT72WjuOezs=";
|
||||
hash = "sha256-Qjorf5cqfEnvlKX0WaE0VNJr99AGJsAJ/BEf8yfPv7E=";
|
||||
fetchSubmodules = true;
|
||||
};
|
||||
|
||||
@ -55,13 +55,11 @@ rustPlatform.buildRustPackage rec {
|
||||
"font-kit-0.14.1" = "sha256-qUKvmi+RDoyhMrZ7T6SoVAyMc/aasQ9Y/okzre4SzXo=";
|
||||
"lsp-types-0.95.1" = "sha256-N4MKoU9j1p/Xeowki/+XiNQPwIcTm9DgmfM/Eieq4js=";
|
||||
"nvim-rs-0.6.0-pre" = "sha256-bdWWuCsBv01mnPA5e5zRpq48BgOqaqIcAu+b7y1NnM8=";
|
||||
"tree-sitter-0.20.100" = "sha256-xZDWAjNIhWC2n39H7jJdKDgyE/J6+MAVSa8dHtZ6CLE=";
|
||||
"tree-sitter-go-0.20.0" = "sha256-/mE21JSa3LWEiOgYPJcq0FYzTbBuNwp9JdZTZqmDIUU=";
|
||||
"tree-sitter-gowork-0.0.1" = "sha256-lM4L4Ap/c8uCr4xUw9+l/vaGb3FxxnuZI0+xKYFDPVg=";
|
||||
"tree-sitter-heex-0.0.1" = "sha256-6LREyZhdTDt3YHVRPDyqCaDXqcsPlHOoMFDb2B3+3xM=";
|
||||
"tree-sitter-jsdoc-0.20.0" = "sha256-fKscFhgZ/BQnYnE5EwurFZgiE//O0WagRIHVtDyes/Y=";
|
||||
"tree-sitter-markdown-0.0.1" = "sha256-F8VVd7yYa4nCrj/HEC13BTC7lkV3XSb2Z3BNi/VfSbs=";
|
||||
"tree-sitter-proto-0.0.2" = "sha256-W0diP2ByAXYrc7Mu/sbqST6lgVIyHeSBmH7/y/X3NhU=";
|
||||
"tree-sitter-0.22.6" = "sha256-P9pQcofDCIhOYWA1OC8TzB5UgWpD5GlDzX2DOS8SsH0=";
|
||||
"tree-sitter-gomod-1.0.2" = "sha256-/sjC117YAFniFws4F/8+Q5Wrd4l4v4nBUaO9IdkixSE=";
|
||||
"tree-sitter-gowork-0.0.1" = "sha256-803ujH5qwejQ2vQDDpma4JDC9a+vFX8ZQmr+77VyL2M=";
|
||||
"tree-sitter-heex-0.0.1" = "sha256-VakMZtWQ/h7dNy5ehk2Bh14a5s878AUgwY3Ipq8tPec=";
|
||||
"tree-sitter-md-0.2.3" = "sha256-Fa73P1h5GvKV3SxXr0KzHuNp4xa5wxUzI8ecXbGdrYE=";
|
||||
"xim-0.4.0" = "sha256-vxu3tjkzGeoRUj7vyP0vDGI7fweX8Drgy9hwOUOEQIA=";
|
||||
"xkbcommon-0.7.0" = "sha256-2RjZWiAaz8apYTrZ82qqH4Gv20WyCtPT+ldOzm0GWMo=";
|
||||
};
|
||||
|
@ -1,14 +1,14 @@
|
||||
{ lib, stdenvNoCC, fetchFromGitHub }:
|
||||
{ lib, stdenvNoCC, fetchFromGitHub, unstableGitUpdater }:
|
||||
|
||||
stdenvNoCC.mkDerivation {
|
||||
pname = "publicsuffix-list";
|
||||
version = "0-unstable-2024-01-07";
|
||||
version = "0-unstable-2024-06-19";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "publicsuffix";
|
||||
repo = "list";
|
||||
rev = "5db9b65997e3c9230ac4353b01994c2ae9667cb9";
|
||||
hash = "sha256-kIJVS2ETAXQa1MMG8cjRUSFUn+jm9jBWH8go3L+lqHE=";
|
||||
rev = "92c74a6cde6092a5e80531c0662e1055abeb975e";
|
||||
hash = "sha256-fkfjR2A2nf3/F16Pn0hCwXtAd26TbUVA5gIv+J4DOjc=";
|
||||
};
|
||||
|
||||
dontBuild = true;
|
||||
@ -21,6 +21,8 @@ stdenvNoCC.mkDerivation {
|
||||
runHook postInstall
|
||||
'';
|
||||
|
||||
passthru.updateScript = unstableGitUpdater { };
|
||||
|
||||
meta = with lib; {
|
||||
homepage = "https://publicsuffix.org/";
|
||||
description = "Cross-vendor public domain suffix database";
|
||||
|
44
pkgs/development/compilers/arocc/default.nix
Normal file
44
pkgs/development/compilers/arocc/default.nix
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
lib,
|
||||
fetchFromGitHub,
|
||||
callPackage,
|
||||
zig_0_13,
|
||||
}:
|
||||
let
|
||||
versions = [
|
||||
{
|
||||
zig = zig_0_13;
|
||||
version = "0-unstable-06-01";
|
||||
src = fetchFromGitHub {
|
||||
owner = "Vexu";
|
||||
repo = "arocc";
|
||||
rev = "55cb6d1b682b83f75ad4f60e34c6fcd2336e8531";
|
||||
hash = "sha256-xs3zNQIC5drrQYT4nxL7Q69xSEdbdMv5+3hQpsX3q5A=";
|
||||
};
|
||||
}
|
||||
];
|
||||
|
||||
mkPackage =
|
||||
{
|
||||
zig,
|
||||
version,
|
||||
src,
|
||||
}:
|
||||
callPackage ./package.nix { inherit zig version src; };
|
||||
|
||||
pkgsList = lib.map mkPackage versions;
|
||||
|
||||
pkgsAttrsUnwrapped = lib.listToAttrs (
|
||||
lib.map (pkg: lib.nameValuePair "${pkg.version}-unwrapped" pkg) pkgsList
|
||||
);
|
||||
pkgsAttrsWrapped = lib.listToAttrs (
|
||||
lib.map (pkg: lib.nameValuePair pkg.version pkg.wrapped) pkgsList
|
||||
);
|
||||
|
||||
pkgsAttrs = pkgsAttrsWrapped // pkgsAttrsUnwrapped;
|
||||
in
|
||||
{
|
||||
latest-unwrapped = lib.last pkgsList;
|
||||
latest = (lib.last pkgsList).wrapped;
|
||||
}
|
||||
// pkgsAttrs
|
33
pkgs/development/compilers/arocc/package.nix
Normal file
33
pkgs/development/compilers/arocc/package.nix
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
lib,
|
||||
stdenv,
|
||||
wrapCCWith,
|
||||
overrideCC,
|
||||
zig,
|
||||
version,
|
||||
src,
|
||||
}:
|
||||
stdenv.mkDerivation (finalAttrs: {
|
||||
pname = "arocc";
|
||||
inherit version src;
|
||||
|
||||
nativeBuildInputs = [ zig.hook ];
|
||||
|
||||
passthru = {
|
||||
inherit zig;
|
||||
isArocc = true;
|
||||
wrapped = wrapCCWith { cc = finalAttrs.finalPackage; };
|
||||
stdenv = overrideCC stdenv finalAttrs.passthru.wrapped;
|
||||
};
|
||||
|
||||
meta = {
|
||||
description = "C compiler written in Zig.";
|
||||
homepage = "http://aro.vexu.eu/";
|
||||
license = with lib.licenses; [
|
||||
mit
|
||||
unicode-30
|
||||
];
|
||||
maintainers = with lib.maintainers; [ RossComputerGuy ];
|
||||
mainProgram = "arocc";
|
||||
};
|
||||
})
|
@ -435,6 +435,13 @@ pipe ((callFile ./common/builder.nix {}) ({
|
||||
) "stackclashprotection"
|
||||
++ optional (!atLeast11) "zerocallusedregs"
|
||||
++ optionals (!atLeast12) [ "fortify3" "trivialautovarinit" ]
|
||||
++ optional (!(
|
||||
atLeast8
|
||||
&& targetPlatform.isLinux
|
||||
&& targetPlatform.isx86_64
|
||||
&& targetPlatform.libc == "glibc"
|
||||
)) "shadowstack"
|
||||
++ optional (!(atLeast9 && targetPlatform.isLinux && targetPlatform.isAarch64)) "pacret"
|
||||
++ optionals (langFortran) [ "fortify" "format" ];
|
||||
};
|
||||
|
||||
|
@ -18,6 +18,8 @@ stdenv.mkDerivation rec {
|
||||
hash = "sha256-slKBFq6NyWHQmJq/YR3LmbGnHyZgRg0hej90tZDOGzA=";
|
||||
};
|
||||
|
||||
outputs = [ "bin" "out" "dev" ];
|
||||
|
||||
# These get set at all-packages, keep onto them for child drvs
|
||||
passthru = {
|
||||
spirv-tools = spirv-tools;
|
||||
@ -33,16 +35,19 @@ stdenv.mkDerivation rec {
|
||||
|
||||
# This is a dirty fix for lib/cmake/SPIRVTargets.cmake:51 which includes this directory
|
||||
postInstall = ''
|
||||
mkdir $out/include/External
|
||||
mkdir -p $dev/include/External
|
||||
moveToOutput lib/pkgconfig "''${!outputDev}"
|
||||
moveToOutput lib/cmake "''${!outputDev}"
|
||||
'';
|
||||
|
||||
# Fix the paths in .pc, even though it's unclear if these .pc are really useful.
|
||||
postFixup = ''
|
||||
substituteInPlace $out/lib/pkgconfig/*.pc \
|
||||
--replace '=''${prefix}//' '=/'
|
||||
substituteInPlace $dev/lib/pkgconfig/*.pc \
|
||||
--replace-fail '=''${prefix}//' '=/' \
|
||||
--replace-fail "includedir=$dev/$dev" "includedir=$dev"
|
||||
|
||||
# add a symlink for backwards compatibility
|
||||
ln -s $out/bin/glslang $out/bin/glslangValidator
|
||||
ln -s $bin/bin/glslang $bin/bin/glslangValidator
|
||||
'';
|
||||
|
||||
meta = with lib; {
|
||||
|
@ -138,6 +138,16 @@ let
|
||||
isClang = true;
|
||||
hardeningUnsupportedFlagsByTargetPlatform = targetPlatform:
|
||||
[ "fortify3" ]
|
||||
++ lib.optional (
|
||||
(lib.versionOlder release_version "7")
|
||||
|| !targetPlatform.isLinux
|
||||
|| !targetPlatform.isx86_64
|
||||
) "shadowstack"
|
||||
++ lib.optional (
|
||||
(lib.versionOlder release_version "8")
|
||||
|| !targetPlatform.isAarch64
|
||||
|| !targetPlatform.isLinux
|
||||
) "pacret"
|
||||
++ lib.optional (
|
||||
(lib.versionOlder release_version "11")
|
||||
|| (targetPlatform.isAarch64 && (lib.versionOlder release_version "18.1"))
|
||||
|
@ -104,6 +104,7 @@ stdenv.mkDerivation (rec {
|
||||
|
||||
hardeningDisable = [
|
||||
"trivialautovarinit"
|
||||
"shadowstack"
|
||||
];
|
||||
|
||||
nativeBuildInputs = [ cmake ]
|
||||
|
@ -1,60 +0,0 @@
|
||||
# New rust versions should first go to staging.
|
||||
# Things to check after updating:
|
||||
# 1. Rustc should produce rust binaries on x86_64-linux, aarch64-linux and x86_64-darwin:
|
||||
# i.e. nix-shell -p fd or @GrahamcOfBorg build fd on github
|
||||
# This testing can be also done by other volunteers as part of the pull
|
||||
# request review, in case platforms cannot be covered.
|
||||
# 2. The LLVM version used for building should match with rust upstream.
|
||||
# Check the version number in the src/llvm-project git submodule in:
|
||||
# https://github.com/rust-lang/rust/blob/<version-tag>/.gitmodules
|
||||
# 3. Firefox and Thunderbird should still build on x86_64-linux.
|
||||
|
||||
{ stdenv, lib
|
||||
, newScope, callPackage
|
||||
, CoreFoundation, Security, SystemConfiguration
|
||||
, pkgsBuildTarget, pkgsBuildBuild, pkgsBuildHost, pkgsTargetTarget
|
||||
, makeRustPlatform
|
||||
, wrapRustcWith
|
||||
, llvmPackages_18, llvm_18
|
||||
} @ args:
|
||||
|
||||
import ./default.nix {
|
||||
rustcVersion = "1.79.0";
|
||||
rustcSha256 = "sha256-Fy7PPH0fnZ+xbNKmKIaXgmcEFt7QEp5SSoZ1H5YUSMA=";
|
||||
|
||||
llvmSharedForBuild = pkgsBuildBuild.llvmPackages_18.libllvm.override { enableSharedLibraries = true; };
|
||||
llvmSharedForHost = pkgsBuildHost.llvmPackages_18.libllvm.override { enableSharedLibraries = true; };
|
||||
llvmSharedForTarget = pkgsBuildTarget.llvmPackages_18.libllvm.override { enableSharedLibraries = true; };
|
||||
|
||||
# For use at runtime
|
||||
llvmShared = llvm_18.override { enableSharedLibraries = true; };
|
||||
|
||||
# Expose llvmPackages used for rustc from rustc via passthru for LTO in Firefox
|
||||
llvmPackages = llvmPackages_18;
|
||||
|
||||
# Note: the version MUST be one version prior to the version we're
|
||||
# building
|
||||
bootstrapVersion = "1.78.0";
|
||||
|
||||
# fetch hashes by running `print-hashes.sh ${bootstrapVersion}`
|
||||
bootstrapHashes = {
|
||||
i686-unknown-linux-gnu = "8f3f5d2ab7b609ab30d584cfb5cecc3d8b16d2620fffb7643383c8a0a3881e21";
|
||||
x86_64-unknown-linux-gnu = "1307747915e8bd925f4d5396ab2ae3d8d9c7fad564afbc358c081683d0f22e87";
|
||||
x86_64-unknown-linux-musl = "c11ab908cbffbe98097d99ed62f5db00aa98496520b1e09583a151d36df7fca4";
|
||||
arm-unknown-linux-gnueabihf = "2a2b1cf93b31e429624380e5b0d2bcce327274f8593b63657b863e38831f6421";
|
||||
armv7-unknown-linux-gnueabihf = "fcce5ddb4f55bbdc9a1359a4cb6e65f2ff790d59ad228102cd472112ea65d3fe";
|
||||
aarch64-unknown-linux-gnu = "131eda738cd977fff2c912e5838e8e9b9c260ecddc1247c0fe5473bf09c594af";
|
||||
aarch64-unknown-linux-musl = "f328bcf109bf3eae01559b53939a9afbdb70ef30429f95109f7ea21030d60dfa";
|
||||
x86_64-apple-darwin = "6c91ed3bd90253961fcb4a2991b8b22e042e2aaa9aba9f389f1e17008171d898";
|
||||
aarch64-apple-darwin = "3be74c31ee8dc4f1d49e2f2888228de374138eaeca1876d0c1b1a61df6023b3b";
|
||||
powerpc64le-unknown-linux-gnu = "c5aedb12c552daa18072e386697205fb7b91cef1e8791fe6fb74834723851388";
|
||||
riscv64gc-unknown-linux-gnu = "847a925ace172d4c0a8d3da8d755b8678071ef73e659886128a3103bb896dcd9";
|
||||
x86_64-unknown-freebsd = "b9cc84c60deb8da08a6c876426f8721758f4c7e7c553b4554385752ad37c63df";
|
||||
};
|
||||
|
||||
selectRustPackage = pkgs: pkgs.rust_1_79;
|
||||
|
||||
rustcPatches = [ ];
|
||||
}
|
||||
|
||||
(builtins.removeAttrs args [ "llvmPackages_18" "llvm_18"])
|
137
pkgs/development/compilers/rust/1_80.nix
Normal file
137
pkgs/development/compilers/rust/1_80.nix
Normal file
@ -0,0 +1,137 @@
|
||||
# New rust versions should first go to staging.
|
||||
# Things to check after updating:
|
||||
# 1. Rustc should produce rust binaries on x86_64-linux, aarch64-linux and x86_64-darwin:
|
||||
# i.e. nix-shell -p fd or @GrahamcOfBorg build fd on github
|
||||
# This testing can be also done by other volunteers as part of the pull
|
||||
# request review, in case platforms cannot be covered.
|
||||
# 2. The LLVM version used for building should match with rust upstream.
|
||||
# Check the version number in the src/llvm-project git submodule in:
|
||||
# https://github.com/rust-lang/rust/blob/<version-tag>/.gitmodules
|
||||
# 3. Firefox and Thunderbird should still build on x86_64-linux.
|
||||
|
||||
{
|
||||
stdenv,
|
||||
lib,
|
||||
newScope,
|
||||
callPackage,
|
||||
CoreFoundation,
|
||||
Security,
|
||||
SystemConfiguration,
|
||||
pkgsBuildTarget,
|
||||
pkgsBuildBuild,
|
||||
pkgsBuildHost,
|
||||
pkgsTargetTarget,
|
||||
makeRustPlatform,
|
||||
wrapRustcWith,
|
||||
llvmPackages_18,
|
||||
llvm_18,
|
||||
wrapCCWith,
|
||||
overrideCC,
|
||||
}@args:
|
||||
let
|
||||
llvmSharedFor =
|
||||
pkgSet:
|
||||
pkgSet.llvmPackages_18.libllvm.override (
|
||||
{
|
||||
enableSharedLibraries = true;
|
||||
}
|
||||
// lib.optionalAttrs (stdenv.targetPlatform.useLLVM or false) {
|
||||
# Force LLVM to compile using clang + LLVM libs when targeting pkgsLLVM
|
||||
stdenv = pkgSet.stdenv.override {
|
||||
allowedRequisites = null;
|
||||
cc = pkgSet.llvmPackages_18.clangUseLLVM;
|
||||
};
|
||||
}
|
||||
);
|
||||
in
|
||||
import ./default.nix
|
||||
{
|
||||
rustcVersion = "1.80.1";
|
||||
rustcSha256 = "sha256-LAuPZDlC3LgQy8xQ8pJWSxtuRNtdX0UJEVOZbfldLcQ=";
|
||||
|
||||
llvmSharedForBuild = llvmSharedFor pkgsBuildBuild;
|
||||
llvmSharedForHost = llvmSharedFor pkgsBuildHost;
|
||||
llvmSharedForTarget = llvmSharedFor pkgsBuildTarget;
|
||||
|
||||
# For use at runtime
|
||||
llvmShared = llvmSharedFor { inherit llvmPackages_18 stdenv; };
|
||||
|
||||
# Expose llvmPackages used for rustc from rustc via passthru for LTO in Firefox
|
||||
llvmPackages =
|
||||
if (stdenv.targetPlatform.useLLVM or false) then
|
||||
callPackage (
|
||||
{
|
||||
pkgs,
|
||||
bootBintoolsNoLibc ? if stdenv.targetPlatform.linker == "lld" then null else pkgs.bintoolsNoLibc,
|
||||
bootBintools ? if stdenv.targetPlatform.linker == "lld" then null else pkgs.bintools,
|
||||
}:
|
||||
let
|
||||
llvmPackages = llvmPackages_18;
|
||||
|
||||
setStdenv =
|
||||
pkg:
|
||||
pkg.override {
|
||||
stdenv = stdenv.override {
|
||||
allowedRequisites = null;
|
||||
cc = llvmPackages.clangUseLLVM;
|
||||
};
|
||||
};
|
||||
in
|
||||
rec {
|
||||
inherit (llvmPackages) bintools;
|
||||
|
||||
libunwind = setStdenv llvmPackages.libunwind;
|
||||
llvm = setStdenv llvmPackages.llvm;
|
||||
|
||||
libcxx = llvmPackages.libcxx.override {
|
||||
stdenv = stdenv.override {
|
||||
allowedRequisites = null;
|
||||
cc = llvmPackages.clangNoLibcxx;
|
||||
hostPlatform = stdenv.hostPlatform // {
|
||||
useLLVM = !stdenv.isDarwin;
|
||||
};
|
||||
};
|
||||
inherit libunwind;
|
||||
};
|
||||
|
||||
clangUseLLVM = llvmPackages.clangUseLLVM.override { inherit libcxx; };
|
||||
|
||||
stdenv = overrideCC args.stdenv clangUseLLVM;
|
||||
}
|
||||
) { }
|
||||
else
|
||||
llvmPackages_18;
|
||||
|
||||
# Note: the version MUST be one version prior to the version we're
|
||||
# building
|
||||
bootstrapVersion = "1.79.0";
|
||||
|
||||
# fetch hashes by running `print-hashes.sh ${bootstrapVersion}`
|
||||
bootstrapHashes = {
|
||||
i686-unknown-linux-gnu = "0a1e371809446cd77dba7abce2afb4efac8d8b2e63483cfe19f1c98bf9ab7855";
|
||||
x86_64-unknown-linux-gnu = "628efa8ef0658a7c4199883ee132281f19931448d3cfee4ecfd768898fe74c18";
|
||||
x86_64-unknown-linux-musl = "2e4b0e40d027e2b31a40163986b4c04dfd0bce41c706a99f2e82ba473a4383de";
|
||||
arm-unknown-linux-gnueabihf = "ce8d8d296277a06e0d2f63a21a0586717e09be3df28c0d1a04bc2c6f85eecc15";
|
||||
armv7-unknown-linux-gnueabihf = "31968f88b22058e384dfb3cdf3efe7f60c03481d790300fcffc420d5ba3851f2";
|
||||
aarch64-unknown-linux-gnu = "f7d3b31581331b54af97cf3162e65b8c26c8aa14d42f71c1ce9adc1078ef54e5";
|
||||
aarch64-unknown-linux-musl = "f8100c806754cd21600ded26546467a1a242db9b9ab8a6a666656e3cc4edfa52";
|
||||
x86_64-apple-darwin = "62f018aad30bafa0ef8bff0ed60d5d45e6cadc799769aad9d945509203e9f921";
|
||||
aarch64-apple-darwin = "e70a9362975b94df7dbc6e2ed5ceab4254dd32f72ba497ff4a70440ace3f729f";
|
||||
powerpc64le-unknown-linux-gnu = "9865eeebb5bb20006367d3148d9116576499ec958d847e22b645f008a1bc4170";
|
||||
riscv64gc-unknown-linux-gnu = "c8d38e600ef4dea8b375df2d08153393816ffd3dcab18e4d081ddc19e28b5a40";
|
||||
x86_64-unknown-freebsd = "3c8005f488b8dda0fc6d47928868200852106cac2b568934ae9a2e5c89d3a50d";
|
||||
};
|
||||
|
||||
selectRustPackage = pkgs: pkgs.rust_1_80;
|
||||
|
||||
rustcPatches = [ ];
|
||||
}
|
||||
|
||||
(
|
||||
builtins.removeAttrs args [
|
||||
"llvmPackages_18"
|
||||
"llvm_18"
|
||||
"wrapCCWith"
|
||||
"overrideCC"
|
||||
]
|
||||
)
|
@ -1,8 +1,8 @@
|
||||
{ lib, stdenv, removeReferencesTo, pkgsBuildBuild, pkgsBuildHost, pkgsBuildTarget, targetPackages
|
||||
, llvmShared, llvmSharedForBuild, llvmSharedForHost, llvmSharedForTarget, llvmPackages
|
||||
, fetchurl, file, python3
|
||||
, runCommandLocal, fetchurl, file, python3
|
||||
, darwin, cargo, cmake, rustc, rustfmt
|
||||
, pkg-config, openssl, xz
|
||||
, pkg-config, openssl, xz, zlib
|
||||
, libiconv
|
||||
, which, libffi
|
||||
, withBundledLLVM ? false
|
||||
@ -24,6 +24,7 @@
|
||||
let
|
||||
inherit (lib) optionals optional optionalString concatStringsSep;
|
||||
inherit (darwin.apple_sdk.frameworks) Security;
|
||||
useLLVM = stdenv.targetPlatform.useLLVM or false;
|
||||
in stdenv.mkDerivation (finalAttrs: {
|
||||
pname = "${targetPackages.stdenv.cc.targetPrefix}rustc";
|
||||
inherit version;
|
||||
@ -66,14 +67,16 @@ in stdenv.mkDerivation (finalAttrs: {
|
||||
# when linking stage1 libstd: cc: undefined reference to `__cxa_begin_catch'
|
||||
# This doesn't apply to cross-building for FreeBSD because the host
|
||||
# uses libstdc++, but the target (used for building std) uses libc++
|
||||
optional (stdenv.isLinux && !withBundledLLVM && !stdenv.targetPlatform.isFreeBSD) "--push-state --as-needed -lstdc++ --pop-state"
|
||||
optional (stdenv.isLinux && !withBundledLLVM && !stdenv.targetPlatform.isFreeBSD && !useLLVM)
|
||||
"--push-state --as-needed -lstdc++ --pop-state"
|
||||
++ optional (stdenv.isLinux && !withBundledLLVM && !stdenv.targetPlatform.isFreeBSD && useLLVM)
|
||||
"--push-state --as-needed -L${llvmPackages.libcxx}/lib -lc++ -lc++abi -lLLVM-${lib.versions.major llvmPackages.llvm.version} --pop-state"
|
||||
++ optional (stdenv.isDarwin && !withBundledLLVM) "-lc++ -lc++abi"
|
||||
++ optional stdenv.isFreeBSD "-rpath ${llvmPackages.libunwind}/lib"
|
||||
++ optional stdenv.isDarwin "-rpath ${llvmSharedForHost}/lib");
|
||||
++ optional stdenv.isDarwin "-rpath ${llvmSharedForHost.lib}/lib");
|
||||
|
||||
# Increase codegen units to introduce parallelism within the compiler.
|
||||
RUSTFLAGS = "-Ccodegen-units=10";
|
||||
|
||||
RUSTDOCFLAGS = "-A rustdoc::broken-intra-doc-links";
|
||||
|
||||
# We need rust to build rust. If we don't provide it, configure will try to download it.
|
||||
@ -152,7 +155,7 @@ in stdenv.mkDerivation (finalAttrs: {
|
||||
# Since fastCross only builds std, it doesn't make sense (and
|
||||
# doesn't work) to build a linker.
|
||||
"--disable-llvm-bitcode-linker"
|
||||
] ++ optionals (stdenv.isLinux && !stdenv.targetPlatform.isRedox) [
|
||||
] ++ optionals (stdenv.isLinux && !stdenv.targetPlatform.isRedox && !(stdenv.targetPlatform.useLLVM or false)) [
|
||||
"--enable-profiler" # build libprofiler_builtins
|
||||
] ++ optionals stdenv.buildPlatform.isMusl [
|
||||
"${setBuild}.musl-root=${pkgsBuildBuild.targetPackages.stdenv.cc.libc}"
|
||||
@ -165,6 +168,10 @@ in stdenv.mkDerivation (finalAttrs: {
|
||||
] ++ optionals (stdenv.isDarwin && stdenv.isx86_64) [
|
||||
# https://github.com/rust-lang/rust/issues/92173
|
||||
"--set rust.jemalloc"
|
||||
] ++ optionals useLLVM [
|
||||
# https://github.com/NixOS/nixpkgs/issues/311930
|
||||
"--llvm-libunwind=${if withBundledLLVM then "in-tree" else "system"}"
|
||||
"--enable-use-libcxx"
|
||||
];
|
||||
|
||||
# if we already have a rust compiler for build just compile the target std
|
||||
@ -189,6 +196,7 @@ in stdenv.mkDerivation (finalAttrs: {
|
||||
python ./x.py --keep-stage=0 --stage=1 install library/std
|
||||
mkdir -v $out/bin $doc $man
|
||||
ln -s ${rustc.unwrapped}/bin/{rustc,rustdoc} $out/bin
|
||||
rm -rf -v $out/lib/rustlib/{manifest-rust-std-,}${stdenv.hostPlatform.rust.rustcTargetSpec}
|
||||
ln -s ${rustc.unwrapped}/lib/rustlib/{manifest-rust-std-,}${stdenv.hostPlatform.rust.rustcTargetSpec} $out/lib/rustlib/
|
||||
echo rust-std-${stdenv.hostPlatform.rust.rustcTargetSpec} >> $out/lib/rustlib/components
|
||||
lndir ${rustc.doc} $doc
|
||||
@ -247,8 +255,17 @@ in stdenv.mkDerivation (finalAttrs: {
|
||||
++ optionals fastCross [ lndir makeWrapper ];
|
||||
|
||||
buildInputs = [ openssl ]
|
||||
++ optionals stdenv.isDarwin [ libiconv Security ]
|
||||
++ optional (!withBundledLLVM) llvmShared;
|
||||
++ optionals stdenv.isDarwin [ libiconv Security zlib ]
|
||||
++ optional (!withBundledLLVM) llvmShared.lib
|
||||
++ optional (useLLVM && !withBundledLLVM) [
|
||||
llvmPackages.libunwind
|
||||
# Hack which is used upstream https://github.com/gentoo/gentoo/blob/master/dev-lang/rust/rust-1.78.0.ebuild#L284
|
||||
(runCommandLocal "libunwind-libgcc" {} ''
|
||||
mkdir -p $out/lib
|
||||
ln -s ${llvmPackages.libunwind}/lib/libunwind.so $out/lib/libgcc_s.so
|
||||
ln -s ${llvmPackages.libunwind}/lib/libunwind.so $out/lib/libgcc_s.so.1
|
||||
'')
|
||||
];
|
||||
|
||||
outputs = [ "out" "man" "doc" ];
|
||||
setOutputFlags = false;
|
||||
|
@ -7,15 +7,6 @@ make_vala_find_vapi_files() {
|
||||
|
||||
addEnvHooks "$targetOffset" make_vala_find_vapi_files
|
||||
|
||||
disable_incompabile_pointer_conversion_warning() {
|
||||
# Work around incompatible function pointer conversion errors with clang 16
|
||||
# by setting ``-Wno-incompatible-function-pointer-types` in an env hook.
|
||||
# See https://gitlab.gnome.org/GNOME/vala/-/issues/1413.
|
||||
NIX_CFLAGS_COMPILE+=" -Wno-incompatible-function-pointer-types"
|
||||
}
|
||||
|
||||
addEnvHooks "$hostOffset" disable_incompabile_pointer_conversion_warning
|
||||
|
||||
_multioutMoveVapiDirs() {
|
||||
moveToOutput share/vala/vapi "${!outputDev}"
|
||||
moveToOutput share/vala-@apiVersion@/vapi "${!outputDev}"
|
||||
|
@ -89,6 +89,8 @@ stdenv.mkDerivation (finalAttrs: {
|
||||
|
||||
passthru = {
|
||||
hook = callPackage ./hook.nix { zig = finalAttrs.finalPackage; };
|
||||
cc = callPackage ../cc.nix { zig = finalAttrs.finalPackage; };
|
||||
stdenv = callPackage ../stdenv.nix { zig = finalAttrs.finalPackage; };
|
||||
tests = {
|
||||
version = testers.testVersion {
|
||||
package = finalAttrs.finalPackage;
|
||||
|
@ -83,6 +83,8 @@ stdenv.mkDerivation (finalAttrs: {
|
||||
|
||||
passthru = {
|
||||
hook = callPackage ./hook.nix { zig = finalAttrs.finalPackage; };
|
||||
cc = callPackage ../cc.nix { zig = finalAttrs.finalPackage; };
|
||||
stdenv = callPackage ../stdenv.nix { zig = finalAttrs.finalPackage; };
|
||||
tests = {
|
||||
version = testers.testVersion {
|
||||
package = finalAttrs.finalPackage;
|
||||
|
@ -95,6 +95,8 @@ stdenv.mkDerivation (finalAttrs: {
|
||||
|
||||
passthru = {
|
||||
hook = callPackage ./hook.nix { zig = finalAttrs.finalPackage; };
|
||||
cc = callPackage ../cc.nix { zig = finalAttrs.finalPackage; };
|
||||
stdenv = callPackage ../stdenv.nix { zig = finalAttrs.finalPackage; };
|
||||
tests = {
|
||||
version = testers.testVersion {
|
||||
package = finalAttrs.finalPackage;
|
||||
|
@ -95,6 +95,8 @@ stdenv.mkDerivation (finalAttrs: {
|
||||
|
||||
passthru = {
|
||||
hook = callPackage ./hook.nix { zig = finalAttrs.finalPackage; };
|
||||
cc = callPackage ../cc.nix { zig = finalAttrs.finalPackage; };
|
||||
stdenv = callPackage ../stdenv.nix { zig = finalAttrs.finalPackage; };
|
||||
tests = {
|
||||
version = testers.testVersion {
|
||||
package = finalAttrs.finalPackage;
|
||||
|
@ -91,6 +91,8 @@ stdenv.mkDerivation (finalAttrs: {
|
||||
|
||||
passthru = {
|
||||
hook = callPackage ./hook.nix { zig = finalAttrs.finalPackage; };
|
||||
cc = callPackage ../cc.nix { zig = finalAttrs.finalPackage; };
|
||||
stdenv = callPackage ../stdenv.nix { zig = finalAttrs.finalPackage; };
|
||||
tests = {
|
||||
version = testers.testVersion {
|
||||
package = finalAttrs.finalPackage;
|
||||
|
42
pkgs/development/compilers/zig/cc.nix
Normal file
42
pkgs/development/compilers/zig/cc.nix
Normal file
@ -0,0 +1,42 @@
|
||||
{
|
||||
lib,
|
||||
wrapCCWith,
|
||||
makeWrapper,
|
||||
runCommand,
|
||||
targetPlatform,
|
||||
targetPackages,
|
||||
zig,
|
||||
}:
|
||||
wrapCCWith {
|
||||
cc =
|
||||
runCommand "zig-cc-${zig.version}"
|
||||
{
|
||||
pname = "zig-cc";
|
||||
inherit (zig) version meta;
|
||||
|
||||
nativeBuildInputs = [ makeWrapper ];
|
||||
|
||||
passthru.isZig = true;
|
||||
inherit zig;
|
||||
}
|
||||
''
|
||||
mkdir -p $out/bin
|
||||
for tool in ar cc c++ objcopy; do
|
||||
makeWrapper "$zig/bin/zig" "$out/bin/$tool" \
|
||||
--add-flags "$tool" \
|
||||
--run "export ZIG_GLOBAL_CACHE_DIR=\$(mktemp -d)"
|
||||
done
|
||||
|
||||
mv $out/bin/c++ $out/bin/clang++
|
||||
mv $out/bin/cc $out/bin/clang
|
||||
'';
|
||||
|
||||
nixSupport.cc-cflags =
|
||||
[
|
||||
"-target"
|
||||
"${targetPlatform.parsed.cpu.name}-${targetPlatform.parsed.kernel.name}-${targetPlatform.parsed.abi.name}"
|
||||
]
|
||||
++ lib.optional (
|
||||
targetPlatform.isLinux && !(targetPackages.isStatic or false)
|
||||
) "-Wl,-dynamic-linker=${targetPackages.stdenv.cc.bintools.dynamicLinker}";
|
||||
}
|
@ -71,6 +71,12 @@ stdenv.mkDerivation (finalAttrs: {
|
||||
hook = callPackage ./hook.nix {
|
||||
zig = finalAttrs.finalPackage;
|
||||
};
|
||||
cc = callPackage ./cc.nix {
|
||||
zig = finalAttrs.finalPackage;
|
||||
};
|
||||
stdenv = callPackage ./stdenv.nix {
|
||||
zig = finalAttrs.finalPackage;
|
||||
};
|
||||
};
|
||||
|
||||
meta = {
|
||||
|
6
pkgs/development/compilers/zig/stdenv.nix
Normal file
6
pkgs/development/compilers/zig/stdenv.nix
Normal file
@ -0,0 +1,6 @@
|
||||
{
|
||||
stdenv,
|
||||
overrideCC,
|
||||
zig,
|
||||
}:
|
||||
overrideCC stdenv zig.cc
|
@ -150,35 +150,6 @@ assert stdenv.hostPlatform.isWasm -> enableStaticLibraries == false;
|
||||
|
||||
let
|
||||
|
||||
# This is a workaround for the 2024-07-20 staging-next cycle to avoid causing mass rebuilds.
|
||||
# todo(@reckenrode) Remove this workaround and remove `NIX_COREFOUNDATION_RPATH`, the related hooks, and ld-wrapper support.
|
||||
nixCoreFoundationRpathWorkaround = stdenv.mkDerivation {
|
||||
name = "nix-corefoundation-rpath-workaround";
|
||||
buildCommand = ''
|
||||
mkdir -p "$out/nix-support"
|
||||
cat <<-EOF > "$out/nix-support/setup-hook"
|
||||
removeUseSystemCoreFoundationFrameworkHook() {
|
||||
unset NIX_COREFOUNDATION_RPATH
|
||||
local _hook
|
||||
for _hook in envBuildBuildHooks envBuildHostHooks envBuildTargetHooks envHostHostHooks envHostTargetHooks envTargetTargetHooks; do
|
||||
local _index=0
|
||||
local _var="\$_hook[@]"
|
||||
for _var in "\''${!_var}"; do
|
||||
if [ "\$_var" = "useSystemCoreFoundationFramework" ]; then
|
||||
unset "\$_hook[\$_index]"
|
||||
fi
|
||||
((++_index))
|
||||
done
|
||||
unset _index
|
||||
unset _var
|
||||
done
|
||||
unset _hook
|
||||
}
|
||||
addEnvHooks "\$hostOffset" removeUseSystemCoreFoundationFrameworkHook
|
||||
EOF
|
||||
'';
|
||||
};
|
||||
|
||||
inherit (lib) optional optionals optionalString versionAtLeast
|
||||
concatStringsSep enableFeature optionalAttrs;
|
||||
|
||||
@ -459,8 +430,7 @@ stdenv.mkDerivation ({
|
||||
inherit depsBuildBuild nativeBuildInputs;
|
||||
buildInputs = otherBuildInputs ++ optionals (!isLibrary) propagatedBuildInputs
|
||||
# For patchShebangsAuto in fixupPhase
|
||||
++ optionals stdenv.hostPlatform.isGhcjs [ nodejs ]
|
||||
++ optionals (stdenv.isDarwin && stdenv.isx86_64) [ nixCoreFoundationRpathWorkaround ];
|
||||
++ optionals stdenv.hostPlatform.isGhcjs [ nodejs ];
|
||||
propagatedBuildInputs = optionals isLibrary propagatedBuildInputs;
|
||||
|
||||
LANG = "en_US.UTF-8"; # GHC needs the locale configured during the Haddock phase.
|
||||
|
61
pkgs/development/interpreters/php/8.4.nix
Normal file
61
pkgs/development/interpreters/php/8.4.nix
Normal file
@ -0,0 +1,61 @@
|
||||
{ callPackage, fetchurl, ... }@_args:
|
||||
|
||||
let
|
||||
base = callPackage ./generic.nix (
|
||||
_args
|
||||
// {
|
||||
version = "8.4.0alpha4";
|
||||
phpSrc = fetchurl {
|
||||
url = "https://downloads.php.net/~saki/php-8.4.0alpha4.tar.xz";
|
||||
hash = "sha256-v411aNKrbteDZnkfpai8SqUgWFQbqZJbzPF5mdCr2Og=";
|
||||
};
|
||||
}
|
||||
);
|
||||
in
|
||||
base.withExtensions (
|
||||
{ all, ... }:
|
||||
with all;
|
||||
[
|
||||
bcmath
|
||||
calendar
|
||||
curl
|
||||
ctype
|
||||
dom
|
||||
exif
|
||||
fileinfo
|
||||
filter
|
||||
ftp
|
||||
gd
|
||||
gettext
|
||||
gmp
|
||||
iconv
|
||||
intl
|
||||
ldap
|
||||
mbstring
|
||||
mysqli
|
||||
mysqlnd
|
||||
opcache
|
||||
openssl
|
||||
pcntl
|
||||
pdo
|
||||
pdo_mysql
|
||||
pdo_odbc
|
||||
pdo_pgsql
|
||||
pdo_sqlite
|
||||
pgsql
|
||||
posix
|
||||
readline
|
||||
session
|
||||
simplexml
|
||||
sockets
|
||||
soap
|
||||
sodium
|
||||
sysvsem
|
||||
sqlite3
|
||||
tokenizer
|
||||
xmlreader
|
||||
xmlwriter
|
||||
zip
|
||||
zlib
|
||||
]
|
||||
)
|
@ -200,14 +200,7 @@ in {
|
||||
};
|
||||
} ./setuptools-build-hook.sh) {};
|
||||
|
||||
setuptoolsCheckHook = callPackage ({ makePythonHook, setuptools }:
|
||||
makePythonHook {
|
||||
name = "setuptools-check-hook";
|
||||
propagatedBuildInputs = [ setuptools ];
|
||||
substitutions = {
|
||||
inherit pythonCheckInterpreter setuppy;
|
||||
};
|
||||
} ./setuptools-check-hook.sh) {};
|
||||
setuptoolsCheckHook = throw "The setuptoolsCheckHook has been removed, since the test command has been removed in setuptools 72.0";
|
||||
|
||||
setuptoolsRustBuildHook = callPackage ({ makePythonHook, setuptools-rust }:
|
||||
makePythonHook {
|
||||
|
@ -59,16 +59,4 @@ function pytestCheckPhase() {
|
||||
if [ -z "${dontUsePytestCheck-}" ] && [ -z "${installCheckPhase-}" ]; then
|
||||
echo "Using pytestCheckPhase"
|
||||
preDistPhases+=" pytestCheckPhase"
|
||||
|
||||
# It's almost always the case that setuptoolsCheckPhase should not be ran
|
||||
# when the pytestCheckHook is being ran
|
||||
if [ -z "${useSetuptoolsCheck-}" ]; then
|
||||
dontUseSetuptoolsCheck=1
|
||||
|
||||
# Remove command if already injected into preDistPhases
|
||||
if [[ "$preDistPhases" =~ "setuptoolsCheckPhase" ]]; then
|
||||
echo "Removing setuptoolsCheckPhase"
|
||||
preDistPhases=${preDistPhases/setuptoolsCheckPhase/}
|
||||
fi
|
||||
fi
|
||||
fi
|
||||
|
@ -1,18 +0,0 @@
|
||||
# Setup hook for setuptools.
|
||||
echo "Sourcing setuptools-check-hook"
|
||||
|
||||
setuptoolsCheckPhase() {
|
||||
echo "Executing setuptoolsCheckPhase"
|
||||
runHook preCheck
|
||||
|
||||
cp -f @setuppy@ nix_run_setup
|
||||
@pythonCheckInterpreter@ nix_run_setup test
|
||||
|
||||
runHook postCheck
|
||||
echo "Finished executing setuptoolsCheckPhase"
|
||||
}
|
||||
|
||||
if [ -z "${dontUseSetuptoolsCheck-}" ] && [ -z "${installCheckPhase-}" ]; then
|
||||
echo "Using setuptoolsCheckPhase"
|
||||
preDistPhases+=" setuptoolsCheckPhase"
|
||||
fi
|
@ -14,16 +14,4 @@ unittestCheckPhase() {
|
||||
if [ -z "${dontUseUnittestCheck-}" ] && [ -z "${installCheckPhase-}" ]; then
|
||||
echo "Using unittestCheckPhase"
|
||||
preDistPhases+=" unittestCheckPhase"
|
||||
|
||||
# It's almost always the case that setuptoolsCheckPhase should not be ran
|
||||
# when the unittestCheckHook is being ran
|
||||
if [ -z "${useSetuptoolsCheck-}" ]; then
|
||||
dontUseSetuptoolsCheck=1
|
||||
|
||||
# Remove command if already injected into preDistPhases
|
||||
if [[ "$preDistPhases" =~ "setuptoolsCheckPhase" ]]; then
|
||||
echo "Removing setuptoolsCheckPhase"
|
||||
preDistPhases=${preDistPhases/setuptoolsCheckPhase/}
|
||||
fi
|
||||
fi
|
||||
fi
|
||||
|
@ -22,7 +22,6 @@
|
||||
, pythonRemoveTestsDirHook
|
||||
, pythonRuntimeDepsCheckHook
|
||||
, setuptoolsBuildHook
|
||||
, setuptoolsCheckHook
|
||||
, wheelUnpackHook
|
||||
, eggUnpackHook
|
||||
, eggBuildHook
|
||||
@ -313,13 +312,7 @@ let
|
||||
# Python packages don't have a checkPhase, only an installCheckPhase
|
||||
doCheck = false;
|
||||
doInstallCheck = attrs.doCheck or true;
|
||||
nativeInstallCheckInputs = [
|
||||
] ++ optionals (format' == "setuptools") [
|
||||
# Longer-term we should get rid of this and require
|
||||
# users of this function to set the `installCheckPhase` or
|
||||
# pass in a hook that sets it.
|
||||
setuptoolsCheckHook
|
||||
] ++ nativeCheckInputs;
|
||||
nativeInstallCheckInputs = nativeCheckInputs;
|
||||
installCheckInputs = checkInputs;
|
||||
|
||||
postFixup = optionalString (!dontWrapPythonPrograms) ''
|
||||
|
@ -19,7 +19,6 @@
|
||||
, pythonRemoveBinBytecodeHook
|
||||
, pythonRemoveTestsDirHook
|
||||
, setuptoolsBuildHook
|
||||
, setuptoolsCheckHook
|
||||
, wheelUnpackHook
|
||||
, eggUnpackHook
|
||||
, eggBuildHook
|
||||
@ -210,13 +209,7 @@ let
|
||||
# Python packages don't have a checkPhase, only an installCheckPhase
|
||||
doCheck = false;
|
||||
doInstallCheck = attrs.doCheck or true;
|
||||
nativeInstallCheckInputs = [
|
||||
] ++ lib.optionals (format == "setuptools") [
|
||||
# Longer-term we should get rid of this and require
|
||||
# users of this function to set the `installCheckPhase` or
|
||||
# pass in a hook that sets it.
|
||||
setuptoolsCheckHook
|
||||
] ++ nativeCheckInputs;
|
||||
nativeInstallCheckInputs = nativeCheckInputs;
|
||||
installCheckInputs = checkInputs;
|
||||
|
||||
postFixup = lib.optionalString (!dontWrapPythonPrograms) ''
|
||||
|
@ -173,14 +173,6 @@ let
|
||||
export HOME=$TMPDIR
|
||||
'';
|
||||
|
||||
# Work around useSystemCoreFoundationFramework hook causing issues with the ld64 upgrade.
|
||||
# This will be fixed on staging in https://github.com/NixOS/nixpkgs/pull/329529
|
||||
preBuild =
|
||||
if lib.versionAtLeast ver.majMin "3.3" && stdenv.isDarwin && stdenv.isx86_64 then
|
||||
"unset NIX_COREFOUNDATION_RPATH"
|
||||
else
|
||||
null;
|
||||
|
||||
# fails with "16993 tests, 2229489 assertions, 105 failures, 14 errors, 89 skips"
|
||||
# mostly TZ- and patch-related tests
|
||||
# TZ- failures are caused by nix sandboxing, I didn't investigate others
|
||||
|
@ -1,65 +1,66 @@
|
||||
{ lib
|
||||
, stdenv
|
||||
, config
|
||||
, fetchFromGitHub
|
||||
, nix-update-script
|
||||
, pkg-config
|
||||
, libGLSupported ? lib.elem stdenv.hostPlatform.system lib.platforms.mesaPlatforms
|
||||
, openglSupport ? libGLSupported
|
||||
, libGL
|
||||
, alsaSupport ? stdenv.isLinux && !stdenv.hostPlatform.isAndroid
|
||||
, alsa-lib
|
||||
, x11Support ? !stdenv.hostPlatform.isWindows && !stdenv.hostPlatform.isAndroid
|
||||
, libX11
|
||||
, xorgproto
|
||||
, libICE
|
||||
, libXi
|
||||
, libXScrnSaver
|
||||
, libXcursor
|
||||
, libXinerama
|
||||
, libXext
|
||||
, libXxf86vm
|
||||
, libXrandr
|
||||
, waylandSupport ? stdenv.isLinux && !stdenv.hostPlatform.isAndroid
|
||||
, wayland
|
||||
, wayland-protocols
|
||||
, wayland-scanner
|
||||
, drmSupport ? false
|
||||
, libdrm
|
||||
, mesa
|
||||
, libxkbcommon
|
||||
, dbusSupport ? stdenv.isLinux && !stdenv.hostPlatform.isAndroid
|
||||
, dbus
|
||||
, udevSupport ? stdenv.isLinux && !stdenv.hostPlatform.isAndroid
|
||||
, udev
|
||||
, ibusSupport ? false
|
||||
, ibus
|
||||
, libdecorSupport ? stdenv.isLinux && !stdenv.hostPlatform.isAndroid
|
||||
, libdecor
|
||||
, pipewireSupport ? stdenv.isLinux && !stdenv.hostPlatform.isAndroid
|
||||
, pipewire # NOTE: must be built with SDL2 without pipewire support
|
||||
, pulseaudioSupport ? config.pulseaudio or stdenv.isLinux && !stdenv.hostPlatform.isAndroid
|
||||
, libpulseaudio
|
||||
, AudioUnit
|
||||
, Cocoa
|
||||
, CoreAudio
|
||||
, CoreServices
|
||||
, ForceFeedback
|
||||
, OpenGL
|
||||
, audiofile
|
||||
, libiconv
|
||||
, withStatic ? stdenv.hostPlatform.isMinGW
|
||||
{
|
||||
lib,
|
||||
stdenv,
|
||||
config,
|
||||
fetchFromGitHub,
|
||||
nix-update-script,
|
||||
pkg-config,
|
||||
libGLSupported ? lib.elem stdenv.hostPlatform.system lib.platforms.mesaPlatforms,
|
||||
openglSupport ? libGLSupported,
|
||||
libGL,
|
||||
alsaSupport ? stdenv.isLinux && !stdenv.hostPlatform.isAndroid,
|
||||
alsa-lib,
|
||||
x11Support ? !stdenv.hostPlatform.isWindows && !stdenv.hostPlatform.isAndroid,
|
||||
libX11,
|
||||
xorgproto,
|
||||
libICE,
|
||||
libXi,
|
||||
libXScrnSaver,
|
||||
libXcursor,
|
||||
libXinerama,
|
||||
libXext,
|
||||
libXxf86vm,
|
||||
libXrandr,
|
||||
waylandSupport ? stdenv.isLinux && !stdenv.hostPlatform.isAndroid,
|
||||
wayland,
|
||||
wayland-protocols,
|
||||
wayland-scanner,
|
||||
drmSupport ? false,
|
||||
libdrm,
|
||||
mesa,
|
||||
libxkbcommon,
|
||||
dbusSupport ? stdenv.isLinux && !stdenv.hostPlatform.isAndroid,
|
||||
dbus,
|
||||
udevSupport ? stdenv.isLinux && !stdenv.hostPlatform.isAndroid,
|
||||
udev,
|
||||
ibusSupport ? false,
|
||||
ibus,
|
||||
libdecorSupport ? stdenv.isLinux && !stdenv.hostPlatform.isAndroid,
|
||||
libdecor,
|
||||
pipewireSupport ? stdenv.isLinux && !stdenv.hostPlatform.isAndroid,
|
||||
pipewire, # NOTE: must be built with SDL2 without pipewire support
|
||||
pulseaudioSupport ? config.pulseaudio or stdenv.isLinux && !stdenv.hostPlatform.isAndroid,
|
||||
libpulseaudio,
|
||||
AudioUnit,
|
||||
Cocoa,
|
||||
CoreAudio,
|
||||
CoreServices,
|
||||
ForceFeedback,
|
||||
OpenGL,
|
||||
audiofile,
|
||||
libiconv,
|
||||
withStatic ? stdenv.hostPlatform.isMinGW,
|
||||
# passthru.tests
|
||||
, testers
|
||||
, guile-sdl2
|
||||
, jazz2
|
||||
, SDL2_ttf
|
||||
, SDL2_net
|
||||
, SDL2_gfx
|
||||
, SDL2_sound
|
||||
, SDL2_mixer
|
||||
, SDL2_image
|
||||
, python3Packages
|
||||
testers,
|
||||
guile-sdl2,
|
||||
jazz2,
|
||||
SDL2_ttf,
|
||||
SDL2_net,
|
||||
SDL2_gfx,
|
||||
SDL2_sound,
|
||||
SDL2_mixer,
|
||||
SDL2_image,
|
||||
python3Packages,
|
||||
}:
|
||||
|
||||
# NOTE: When editing this expression see if the same change applies to
|
||||
@ -67,16 +68,19 @@
|
||||
|
||||
stdenv.mkDerivation (finalAttrs: {
|
||||
pname = "SDL2";
|
||||
version = "2.30.4";
|
||||
version = "2.30.5";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "libsdl-org";
|
||||
repo = "SDL";
|
||||
rev = "release-${finalAttrs.version}";
|
||||
hash = "sha256-RhqbmS+mPVlXlo4/jrqPqtyGzvfaPTozlUEeAjHUBoA=";
|
||||
hash = "sha256-ZonlvXAAWCTfDYf/w5RxP1Av67v89kex4H43xkbPYEA=";
|
||||
};
|
||||
dontDisableStatic = if withStatic then 1 else 0;
|
||||
outputs = [ "out" "dev" ];
|
||||
outputs = [
|
||||
"out"
|
||||
"dev"
|
||||
];
|
||||
outputBin = "dev"; # sdl-config
|
||||
|
||||
patches = [
|
||||
@ -98,41 +102,74 @@ stdenv.mkDerivation (finalAttrs: {
|
||||
|
||||
depsBuildBuild = [ pkg-config ];
|
||||
|
||||
nativeBuildInputs = [ pkg-config ] ++ lib.optionals waylandSupport [ wayland wayland-scanner ];
|
||||
nativeBuildInputs =
|
||||
[ pkg-config ]
|
||||
++ lib.optionals waylandSupport [
|
||||
wayland
|
||||
wayland-scanner
|
||||
];
|
||||
|
||||
dlopenPropagatedBuildInputs = [ ]
|
||||
dlopenPropagatedBuildInputs =
|
||||
[ ]
|
||||
# Propagated for #include <GLES/gl.h> in SDL_opengles.h.
|
||||
++ lib.optional (openglSupport && !stdenv.isDarwin) libGL
|
||||
# Propagated for #include <X11/Xlib.h> and <X11/Xatom.h> in SDL_syswm.h.
|
||||
++ lib.optionals x11Support [ libX11 ];
|
||||
|
||||
propagatedBuildInputs = lib.optionals x11Support [ xorgproto ]
|
||||
++ finalAttrs.dlopenPropagatedBuildInputs;
|
||||
propagatedBuildInputs =
|
||||
lib.optionals x11Support [ xorgproto ] ++ finalAttrs.dlopenPropagatedBuildInputs;
|
||||
|
||||
dlopenBuildInputs = lib.optionals alsaSupport [ alsa-lib audiofile ]
|
||||
dlopenBuildInputs =
|
||||
lib.optionals alsaSupport [
|
||||
alsa-lib
|
||||
audiofile
|
||||
]
|
||||
++ lib.optional dbusSupport dbus
|
||||
++ lib.optional libdecorSupport libdecor
|
||||
++ lib.optional pipewireSupport pipewire
|
||||
++ lib.optional pulseaudioSupport libpulseaudio
|
||||
++ lib.optional udevSupport udev
|
||||
++ lib.optionals waylandSupport [ wayland libxkbcommon ]
|
||||
++ lib.optionals x11Support [ libICE libXi libXScrnSaver libXcursor libXinerama libXext libXrandr libXxf86vm ]
|
||||
++ lib.optionals drmSupport [ libdrm mesa ];
|
||||
++ lib.optionals waylandSupport [
|
||||
wayland
|
||||
libxkbcommon
|
||||
]
|
||||
++ lib.optionals x11Support [
|
||||
libICE
|
||||
libXi
|
||||
libXScrnSaver
|
||||
libXcursor
|
||||
libXinerama
|
||||
libXext
|
||||
libXrandr
|
||||
libXxf86vm
|
||||
]
|
||||
++ lib.optionals drmSupport [
|
||||
libdrm
|
||||
mesa
|
||||
];
|
||||
|
||||
buildInputs = [ libiconv ]
|
||||
buildInputs =
|
||||
[ libiconv ]
|
||||
++ finalAttrs.dlopenBuildInputs
|
||||
++ lib.optional ibusSupport ibus
|
||||
++ lib.optionals waylandSupport [ wayland-protocols ]
|
||||
++ lib.optionals stdenv.isDarwin [ AudioUnit Cocoa CoreAudio CoreServices ForceFeedback OpenGL ];
|
||||
++ lib.optionals stdenv.isDarwin [
|
||||
AudioUnit
|
||||
Cocoa
|
||||
CoreAudio
|
||||
CoreServices
|
||||
ForceFeedback
|
||||
OpenGL
|
||||
];
|
||||
|
||||
enableParallelBuilding = true;
|
||||
|
||||
configureFlags = [
|
||||
"--disable-oss"
|
||||
] ++ lib.optional (!x11Support) "--without-x"
|
||||
++ lib.optional alsaSupport "--with-alsa-prefix=${alsa-lib.out}/lib"
|
||||
++ lib.optional stdenv.hostPlatform.isWindows "--disable-video-opengles"
|
||||
++ lib.optional stdenv.isDarwin "--disable-sdltest";
|
||||
configureFlags =
|
||||
[ "--disable-oss" ]
|
||||
++ lib.optional (!x11Support) "--without-x"
|
||||
++ lib.optional alsaSupport "--with-alsa-prefix=${alsa-lib.out}/lib"
|
||||
++ lib.optional stdenv.hostPlatform.isWindows "--disable-video-opengles"
|
||||
++ lib.optional stdenv.isDarwin "--disable-sdltest";
|
||||
|
||||
# We remove libtool .la files when static libs are requested,
|
||||
# because they make the builds of downstream libs like `SDL_tff`
|
||||
@ -167,7 +204,9 @@ stdenv.mkDerivation (finalAttrs: {
|
||||
# list the symbols used in this way.
|
||||
postFixup =
|
||||
let
|
||||
rpath = lib.makeLibraryPath (finalAttrs.dlopenPropagatedBuildInputs ++ finalAttrs.dlopenBuildInputs);
|
||||
rpath = lib.makeLibraryPath (
|
||||
finalAttrs.dlopenPropagatedBuildInputs ++ finalAttrs.dlopenBuildInputs
|
||||
);
|
||||
in
|
||||
lib.optionalString (stdenv.hostPlatform.extensions.sharedLibrary == ".so") ''
|
||||
for lib in $out/lib/*.so* ; do
|
||||
@ -181,11 +220,14 @@ stdenv.mkDerivation (finalAttrs: {
|
||||
|
||||
passthru = {
|
||||
inherit openglSupport;
|
||||
updateScript = nix-update-script { extraArgs = [ "--version-regex" "release-(.*)" ]; };
|
||||
updateScript = nix-update-script {
|
||||
extraArgs = [
|
||||
"--version-regex"
|
||||
"release-(.*)"
|
||||
];
|
||||
};
|
||||
tests = {
|
||||
pkg-config = testers.hasPkgConfigModules {
|
||||
package = finalAttrs.finalPackage;
|
||||
};
|
||||
pkg-config = testers.hasPkgConfigModules { package = finalAttrs.finalPackage; };
|
||||
inherit
|
||||
guile-sdl2
|
||||
jazz2
|
||||
@ -196,11 +238,7 @@ stdenv.mkDerivation (finalAttrs: {
|
||||
SDL2_mixer
|
||||
SDL2_image
|
||||
;
|
||||
inherit (python3Packages)
|
||||
pygame
|
||||
pygame-ce
|
||||
pygame-sdl2
|
||||
;
|
||||
inherit (python3Packages) pygame pygame-ce pygame-sdl2;
|
||||
};
|
||||
};
|
||||
|
||||
|
@ -32,11 +32,11 @@ stdenv.mkDerivation (finalAttrs: {
|
||||
|
||||
buildInputs = [ gtest ];
|
||||
|
||||
meta = with lib; {
|
||||
meta = {
|
||||
description = "Open-source collection of C++ code designed to augment the C++ standard library";
|
||||
homepage = "https://abseil.io/";
|
||||
license = licenses.asl20;
|
||||
platforms = platforms.all;
|
||||
maintainers = [ maintainers.GaetanLepage ];
|
||||
license = lib.licenses.asl20;
|
||||
platforms = lib.platforms.all;
|
||||
maintainers = [ lib.maintainers.GaetanLepage ];
|
||||
};
|
||||
})
|
||||
|
42
pkgs/development/libraries/abseil-cpp/202407.nix
Normal file
42
pkgs/development/libraries/abseil-cpp/202407.nix
Normal file
@ -0,0 +1,42 @@
|
||||
{ lib
|
||||
, stdenv
|
||||
, fetchFromGitHub
|
||||
, cmake
|
||||
, gtest
|
||||
, static ? stdenv.hostPlatform.isStatic
|
||||
, cxxStandard ? null
|
||||
}:
|
||||
|
||||
stdenv.mkDerivation (finalAttrs: {
|
||||
pname = "abseil-cpp";
|
||||
version = "20240722.0";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "abseil";
|
||||
repo = "abseil-cpp";
|
||||
rev = "refs/tags/${finalAttrs.version}";
|
||||
hash = "sha256-51jpDhdZ0n+KLmxh8KVaTz53pZAB0dHjmILFX+OLud4=";
|
||||
};
|
||||
|
||||
cmakeFlags = [
|
||||
"-DABSL_BUILD_TEST_HELPERS=ON"
|
||||
"-DABSL_USE_EXTERNAL_GOOGLETEST=ON"
|
||||
"-DBUILD_SHARED_LIBS=${if static then "OFF" else "ON"}"
|
||||
] ++ lib.optionals (cxxStandard != null) [
|
||||
"-DCMAKE_CXX_STANDARD=${cxxStandard}"
|
||||
];
|
||||
|
||||
strictDeps = true;
|
||||
|
||||
nativeBuildInputs = [ cmake ];
|
||||
|
||||
buildInputs = [ gtest ];
|
||||
|
||||
meta = {
|
||||
description = "Open-source collection of C++ code designed to augment the C++ standard library";
|
||||
homepage = "https://abseil.io/";
|
||||
license = lib.licenses.asl20;
|
||||
platforms = lib.platforms.all;
|
||||
maintainers = [ lib.maintainers.GaetanLepage ];
|
||||
};
|
||||
})
|
@ -16,13 +16,13 @@
|
||||
|
||||
stdenv.mkDerivation rec {
|
||||
pname = "libopenmpt";
|
||||
version = "0.7.8";
|
||||
version = "0.7.9";
|
||||
|
||||
outputs = [ "out" "dev" "bin" ];
|
||||
|
||||
src = fetchurl {
|
||||
url = "https://lib.openmpt.org/files/libopenmpt/src/libopenmpt-${version}+release.autotools.tar.gz";
|
||||
hash = "sha256-h3eMgEaiJsbL+xFPTI4+J8Eht7PczOXLfeRYmSUCdMw=";
|
||||
hash = "sha256-A4bpGNddeX551bFO3QhHFl2LNZ6YEe9XZSwKNWot/PQ=";
|
||||
};
|
||||
|
||||
enableParallelBuilding = true;
|
||||
|
@ -14,13 +14,13 @@
|
||||
|
||||
stdenv.mkDerivation rec {
|
||||
pname = "aws-c-auth";
|
||||
version = "0.7.22";
|
||||
version = "0.7.23";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "awslabs";
|
||||
repo = "aws-c-auth";
|
||||
rev = "v${version}";
|
||||
hash = "sha256-8+SFag3hRQ+1aOK2vuHOV/gXE1qUIlAW5LNJDmUORLs=";
|
||||
hash = "sha256-WQ5mJrPGsjsBGUHGott0wiDbgMbPMgOEt0TkHOvAR9w=";
|
||||
};
|
||||
|
||||
nativeBuildInputs = [
|
||||
|
@ -153,22 +153,42 @@ diff -ur a/dist/aclocal/clock.m4 b/dist/aclocal/clock.m4
|
||||
diff -ur a/dist/aclocal/mutex.m4 b/dist/aclocal/mutex.m4
|
||||
--- a/dist/aclocal/mutex.m4 1969-12-31 19:00:01.000000000 -0500
|
||||
+++ b/dist/aclocal/mutex.m4 2023-06-05 19:14:47.214158196 -0400
|
||||
@@ -4,6 +4,7 @@
|
||||
@@ -3,7 +3,9 @@
|
||||
# POSIX pthreads tests: inter-process safe and intra-process only.
|
||||
AC_DEFUN(AM_PTHREADS_SHARED, [
|
||||
AC_TRY_RUN([
|
||||
+#include <stdlib.h>
|
||||
#include <pthread.h>
|
||||
+int
|
||||
main() {
|
||||
pthread_cond_t cond;
|
||||
pthread_mutex_t mutex;
|
||||
@@ -46,6 +47,7 @@
|
||||
@@ -24,6 +26,7 @@ main() {
|
||||
pthread_mutexattr_destroy(&mutexattr));
|
||||
}], [db_cv_mutex="$1"],,
|
||||
AC_TRY_LINK([
|
||||
+#include <stdlib.h>
|
||||
#include <pthread.h>],[
|
||||
pthread_cond_t cond;
|
||||
pthread_mutex_t mutex;
|
||||
@@ -45,7 +48,9 @@ AC_TRY_LINK([
|
||||
], [db_cv_mutex="$1"]))])
|
||||
AC_DEFUN(AM_PTHREADS_PRIVATE, [
|
||||
AC_TRY_RUN([
|
||||
+#include <stdlib.h>
|
||||
#include <pthread.h>
|
||||
+int
|
||||
main() {
|
||||
pthread_cond_t cond;
|
||||
pthread_mutex_t mutex;
|
||||
@@ -64,6 +69,7 @@ main() {
|
||||
pthread_mutexattr_destroy(&mutexattr));
|
||||
}], [db_cv_mutex="$1"],,
|
||||
AC_TRY_LINK([
|
||||
+#include <stdlib.h>
|
||||
#include <pthread.h>],[
|
||||
pthread_cond_t cond;
|
||||
pthread_mutex_t mutex;
|
||||
diff -ur a/dist/aclocal/sequence.m4 b/dist/aclocal/sequence.m4
|
||||
--- a/dist/aclocal/sequence.m4 1969-12-31 19:00:01.000000000 -0500
|
||||
+++ b/dist/aclocal/sequence.m4 2023-06-05 19:14:02.007869956 -0400
|
||||
@ -183,7 +203,7 @@ diff -ur a/dist/aclocal/sequence.m4 b/dist/aclocal/sequence.m4
|
||||
$db_cv_seq_type l;
|
||||
unsigned $db_cv_seq_type u;
|
||||
@@ -59,7 +62,9 @@
|
||||
return (1);
|
||||
return (1);
|
||||
return (0);
|
||||
}],, [db_cv_build_sequence="no"],
|
||||
- AC_TRY_LINK(,[
|
||||
|
@ -1,6 +1,6 @@
|
||||
{ lib, stdenv, fetchurl, autoreconfHook, targetPlatform, ... } @ args:
|
||||
{ lib, stdenv, fetchurl, autoreconfHook, ... } @ args:
|
||||
|
||||
import ./generic.nix (builtins.removeAttrs args ["targetPlatform"] // {
|
||||
import ./generic.nix (args // {
|
||||
version = "4.8.30";
|
||||
sha256 = "0ampbl2f0hb1nix195kz1syrqqxpmvnvnfvphambj7xjrl3iljg0";
|
||||
extraPatches = [
|
||||
@ -9,8 +9,6 @@ import ./generic.nix (builtins.removeAttrs args ["targetPlatform"] // {
|
||||
./darwin-mutexes-4.8.patch
|
||||
];
|
||||
|
||||
drvArgs.configureFlags = lib.optional (targetPlatform.useLLVM or false) "--with-mutex=POSIX/pthreads";
|
||||
|
||||
drvArgs.hardeningDisable = [ "format" ];
|
||||
drvArgs.doCheck = false;
|
||||
})
|
||||
|
@ -67,8 +67,7 @@ stdenv.mkDerivation (rec {
|
||||
(if compat185 then "--enable-compat185" else "--disable-compat185")
|
||||
]
|
||||
++ lib.optional dbmSupport "--enable-dbm"
|
||||
++ lib.optional stdenv.isFreeBSD "--with-pic"
|
||||
++ (drvArgs.configureFlags or []);
|
||||
++ lib.optional stdenv.isFreeBSD "--with-pic";
|
||||
|
||||
preConfigure = ''
|
||||
cd build_unix
|
||||
@ -93,4 +92,4 @@ stdenv.mkDerivation (rec {
|
||||
license = license;
|
||||
platforms = platforms.unix;
|
||||
};
|
||||
} // builtins.removeAttrs drvArgs [ "configureFlags" ])
|
||||
} // drvArgs)
|
||||
|
@ -33,6 +33,8 @@ stdenv.mkDerivation (finalAttrs: {
|
||||
|
||||
nativeBuildInputs = [
|
||||
cmake
|
||||
] ++ lib.optionals pythonSupport [
|
||||
python3Packages.python
|
||||
];
|
||||
|
||||
buildInputs = lib.optionals pythonSupport [
|
||||
|
@ -18,8 +18,8 @@ let
|
||||
);
|
||||
|
||||
v4 = {
|
||||
version = "4.4.4";
|
||||
hash = "sha256-Q8bkuF/1uJfqttJJoObnnLX3BEduv+qxsvOrVhMvRjA=";
|
||||
version = "4.4.5";
|
||||
hash = "sha256-GrKNGYI8kO47Yoi82dMV30ymuXSjxo4gH+yB8jIUa2A=";
|
||||
};
|
||||
|
||||
v6 = {
|
||||
|
@ -34,7 +34,7 @@
|
||||
|
||||
# Feature flags
|
||||
, withAlsa ? withHeadlessDeps && stdenv.isLinux # Alsa in/output supporT
|
||||
, withAom ? withFullDeps # AV1 reference encoder
|
||||
, withAom ? withHeadlessDeps # AV1 reference encoder
|
||||
, withAppKit ? withHeadlessDeps && stdenv.isDarwin # Apple AppKit framework
|
||||
, withAribcaption ? withFullDeps && lib.versionAtLeast version "6.1" # ARIB STD-B24 Caption Decoder/Renderer
|
||||
, withAss ? withHeadlessDeps && stdenv.hostPlatform == stdenv.buildPlatform # (Advanced) SubStation Alpha subtitle rendering
|
||||
@ -45,7 +45,7 @@
|
||||
, withBs2b ? withFullDeps # bs2b DSP library
|
||||
, withBzlib ? withHeadlessDeps
|
||||
, withCaca ? withFullDeps # Textual display (ASCII art)
|
||||
, withCelt ? withFullDeps # CELT decoder
|
||||
, withCelt ? withHeadlessDeps # CELT decoder
|
||||
, withChromaprint ? withFullDeps # Audio fingerprinting
|
||||
, withCodec2 ? withFullDeps # codec2 en/decoding
|
||||
, withCoreImage ? withHeadlessDeps && stdenv.isDarwin # Apple CoreImage framework
|
||||
@ -88,7 +88,7 @@
|
||||
, withOpencoreAmrwb ? withFullDeps && withVersion3 # AMR-WB decoder
|
||||
, withOpengl ? withFullDeps && !stdenv.isDarwin # OpenGL rendering
|
||||
, withOpenh264 ? withFullDeps # H.264/AVC encoder
|
||||
, withOpenjpeg ? withFullDeps # JPEG 2000 de/encoder
|
||||
, withOpenjpeg ? withHeadlessDeps # JPEG 2000 de/encoder
|
||||
, withOpenmpt ? withFullDeps # Tracked music files decoder
|
||||
, withOpus ? withHeadlessDeps # Opus de/encoder
|
||||
, withPlacebo ? withFullDeps && !stdenv.isDarwin # libplacebo video processing library
|
||||
@ -121,7 +121,7 @@
|
||||
, withVpl ? false # Hardware acceleration via intel libvpl
|
||||
, withVpx ? withHeadlessDeps && stdenv.buildPlatform == stdenv.hostPlatform # VP8 & VP9 de/encoding
|
||||
, withVulkan ? withSmallDeps && !stdenv.isDarwin
|
||||
, withWebp ? withFullDeps # WebP encoder
|
||||
, withWebp ? withHeadlessDeps # WebP encoder
|
||||
, withX264 ? withHeadlessDeps && withGPL # H.264/AVC encoder
|
||||
, withX265 ? withHeadlessDeps && withGPL # H.265/HEVC encoder
|
||||
, withXavs ? withFullDeps && withGPL # AVS encoder
|
||||
@ -402,36 +402,6 @@ stdenv.mkDerivation (finalAttrs: {
|
||||
'';
|
||||
|
||||
patches = []
|
||||
++ optionals (versionOlder version "5") [
|
||||
(fetchpatch2 {
|
||||
name = "libsvtav1-1.5.0-compat-compressed_ten_bit_format.patch";
|
||||
url = "https://git.ffmpeg.org/gitweb/ffmpeg.git/patch/031f1561cd286596cdb374da32f8aa816ce3b135";
|
||||
hash = "sha256-agJgzIzrBTQBAypuCmGXXFo7vw6Iodw5Ny5O5QCKCn8=";
|
||||
})
|
||||
(fetchpatch2 {
|
||||
# Backport fix for binutils-2.41.
|
||||
name = "binutils-2.41.patch";
|
||||
url = "https://git.ffmpeg.org/gitweb/ffmpeg.git/patch/effadce6c756247ea8bae32dc13bb3e6f464f0eb";
|
||||
hash = "sha256-vLSltvZVMcQ0CnkU0A29x6fJSywE8/aU+Mp9os8DZYY=";
|
||||
})
|
||||
# The upstream patch isn’t for ffmpeg 4, but it will apply with a few tweaks.
|
||||
# Fixes a crash when built with clang 16 due to UB in ff_seek_frame_binary.
|
||||
(fetchpatch2 {
|
||||
name = "utils-fix_crash_in_ff_seek_frame_binary.patch";
|
||||
url = "https://git.ffmpeg.org/gitweb/ffmpeg.git/patch/ab792634197e364ca1bb194f9abe36836e42f12d";
|
||||
hash = "sha256-vqqVACjbCcGL9Qvmg1QArSKqVmOqr8BEr+OxTBDt6mA=";
|
||||
postFetch = ''
|
||||
substituteInPlace "$out" \
|
||||
--replace libavformat/seek.c libavformat/utils.c \
|
||||
--replace 'const AVInputFormat *const ' 'const AVInputFormat *'
|
||||
'';
|
||||
})
|
||||
(fetchpatch2 {
|
||||
name = "CVE-2023-51794.patch";
|
||||
url = "https://git.ffmpeg.org/gitweb/ffmpeg.git/patch/50f0f8c53c818f73fe2d752708e2fa9d2a2d8a07";
|
||||
hash = "sha256-5G9lmKjMEa0+vqbA8EEiNIr6QG+PeEoIL+uZP4Hlo28=";
|
||||
})
|
||||
]
|
||||
++ optionals (lib.versionAtLeast version "6.1" && lib.versionOlder version "6.2") [
|
||||
(fetchpatch2 { # this can be removed post 6.1
|
||||
name = "fix_build_failure_due_to_PropertyKey_EncoderID";
|
||||
|
@ -11,14 +11,14 @@
|
||||
|
||||
stdenv.mkDerivation (finalAttrs: {
|
||||
pname = "fribidi";
|
||||
version = "1.0.14";
|
||||
version = "1.0.15";
|
||||
|
||||
outputs = [ "out" "dev" "devdoc" ];
|
||||
|
||||
# NOTE: Only URL tarball has "Have pre-generated man pages: true", which works-around upstream usage of some rare ancient `c2man` fossil application.
|
||||
src = fetchurl {
|
||||
url = with finalAttrs; "https://github.com/fribidi/fribidi/releases/download/v${version}/${pname}-${version}.tar.xz";
|
||||
sha256 = "sha256-dq4gSnAnZSrDmBufpYF8CDuiMRQ0AoTFjnVrJZzSJZo=";
|
||||
sha256 = "sha256-C7x/9jO/ogiuMtfjac9afSDV0lV6CwZ8mqmLy/mWdYc=";
|
||||
};
|
||||
|
||||
postPatch = ''
|
||||
|
@ -1,69 +0,0 @@
|
||||
{ stdenv, lib, fetchurl, updateAutotoolsGnuConfigScriptsHook }:
|
||||
|
||||
stdenv.mkDerivation rec {
|
||||
pname = "gdbm";
|
||||
version = "1.23";
|
||||
|
||||
src = fetchurl {
|
||||
url = "mirror://gnu/gdbm/${pname}-${version}.tar.gz";
|
||||
sha256 = "sha256-dLEIHSH/8TrkvXwW5dblBKTCb3zeHcoNljpIQXS7ys0=";
|
||||
};
|
||||
|
||||
nativeBuildInputs = [ updateAutotoolsGnuConfigScriptsHook ];
|
||||
|
||||
doCheck = true; # not cross;
|
||||
|
||||
# Linking static stubs on cygwin requires correct ordering.
|
||||
# Consider upstreaming this.
|
||||
|
||||
# Disable dbmfetch03.at test because it depends on unlink()
|
||||
# failing on a link in a chmod -w directory, which cygwin
|
||||
# apparently allows.
|
||||
postPatch = lib.optionalString stdenv.buildPlatform.isCygwin ''
|
||||
substituteInPlace tests/Makefile.in --replace \
|
||||
'_LDADD = ../src/libgdbm.la ../compat/libgdbm_compat.la' \
|
||||
'_LDADD = ../compat/libgdbm_compat.la ../src/libgdbm.la'
|
||||
substituteInPlace tests/testsuite.at --replace \
|
||||
'm4_include([dbmfetch03.at])' ""
|
||||
'';
|
||||
|
||||
enableParallelBuilding = true;
|
||||
configureFlags = [ "--enable-libgdbm-compat" ];
|
||||
|
||||
# create symlinks for compatibility
|
||||
postInstall = ''
|
||||
install -dm755 $out/include/gdbm
|
||||
(
|
||||
cd $out/include/gdbm
|
||||
ln -s ../gdbm.h gdbm.h
|
||||
ln -s ../ndbm.h ndbm.h
|
||||
ln -s ../dbm.h dbm.h
|
||||
)
|
||||
'';
|
||||
|
||||
meta = with lib; {
|
||||
description = "GNU dbm key/value database library";
|
||||
longDescription = ''
|
||||
GNU dbm (or GDBM, for short) is a library of database functions that
|
||||
use extensible hashing and work similar to the standard UNIX dbm.
|
||||
These routines are provided to a programmer needing to create and
|
||||
manipulate a hashed database.
|
||||
|
||||
The basic use of GDBM is to store key/data pairs in a data file.
|
||||
Each key must be unique and each key is paired with only one data
|
||||
item.
|
||||
|
||||
The library provides primitives for storing key/data pairs,
|
||||
searching and retrieving the data by its key and deleting a key
|
||||
along with its data. It also support sequential iteration over all
|
||||
key/data pairs in a database.
|
||||
|
||||
For compatibility with programs using old UNIX dbm function, the
|
||||
package also provides traditional dbm and ndbm interfaces.
|
||||
'';
|
||||
homepage = "https://www.gnu.org/software/gdbm/";
|
||||
license = licenses.gpl3Plus;
|
||||
platforms = platforms.all;
|
||||
maintainers = [ maintainers.vrthra ];
|
||||
};
|
||||
}
|
@ -0,0 +1,49 @@
|
||||
Revert 55d63e731253de82e96ed4ddca2e294076cd0bc5
|
||||
|
||||
--- b/sysdeps/x86/cpu-features.c
|
||||
+++ a/sysdeps/x86/cpu-features.c
|
||||
@@ -110,7 +110,7 @@
|
||||
if (!CPU_FEATURES_CPU_P (cpu_features, RTM_ALWAYS_ABORT))
|
||||
CPU_FEATURE_SET_ACTIVE (cpu_features, RTM);
|
||||
|
||||
+#if CET_ENABLED
|
||||
-#if CET_ENABLED && 0
|
||||
CPU_FEATURE_SET_ACTIVE (cpu_features, IBT);
|
||||
CPU_FEATURE_SET_ACTIVE (cpu_features, SHSTK);
|
||||
#endif
|
||||
reverted:
|
||||
--- b/sysdeps/x86/cpu-tunables.c
|
||||
+++ a/sysdeps/x86/cpu-tunables.c
|
||||
@@ -35,17 +35,6 @@
|
||||
break; \
|
||||
}
|
||||
|
||||
-#define CHECK_GLIBC_IFUNC_CPU_BOTH(f, cpu_features, name, len) \
|
||||
- _Static_assert (sizeof (#name) - 1 == len, #name " != " #len); \
|
||||
- if (tunable_str_comma_strcmp_cte (&f, #name)) \
|
||||
- { \
|
||||
- if (f.disable) \
|
||||
- CPU_FEATURE_UNSET (cpu_features, name) \
|
||||
- else \
|
||||
- CPU_FEATURE_SET_ACTIVE (cpu_features, name) \
|
||||
- break; \
|
||||
- }
|
||||
-
|
||||
/* Disable a preferred feature NAME. We don't enable a preferred feature
|
||||
which isn't available. */
|
||||
#define CHECK_GLIBC_IFUNC_PREFERRED_OFF(f, cpu_features, name, len) \
|
||||
@@ -142,13 +131,11 @@
|
||||
}
|
||||
break;
|
||||
case 5:
|
||||
- {
|
||||
- CHECK_GLIBC_IFUNC_CPU_BOTH (n, cpu_features, SHSTK, 5);
|
||||
- }
|
||||
if (n.disable)
|
||||
{
|
||||
CHECK_GLIBC_IFUNC_CPU_OFF (n, cpu_features, LZCNT, 5);
|
||||
CHECK_GLIBC_IFUNC_CPU_OFF (n, cpu_features, MOVBE, 5);
|
||||
+ CHECK_GLIBC_IFUNC_CPU_OFF (n, cpu_features, SHSTK, 5);
|
||||
CHECK_GLIBC_IFUNC_CPU_OFF (n, cpu_features, SSSE3, 5);
|
||||
CHECK_GLIBC_IFUNC_CPU_OFF (n, cpu_features, XSAVE, 5);
|
||||
}
|
@ -37,6 +37,7 @@
|
||||
, profilingLibraries ? false
|
||||
, withGd ? false
|
||||
, enableCET ? false
|
||||
, enableCETRuntimeDefault ? false
|
||||
, extraBuildInputs ? []
|
||||
, extraNativeBuildInputs ? []
|
||||
, ...
|
||||
@ -50,6 +51,7 @@ in
|
||||
|
||||
assert withLinuxHeaders -> linuxHeaders != null;
|
||||
assert withGd -> gd != null && libpng != null;
|
||||
assert enableCET == false -> !enableCETRuntimeDefault;
|
||||
|
||||
stdenv.mkDerivation ({
|
||||
version = version + patchSuffix;
|
||||
@ -114,7 +116,8 @@ stdenv.mkDerivation ({
|
||||
lib.optional (isAarch64 && isLinux) ./0001-aarch64-math-vector.h-add-NVCC-include-guard.patch
|
||||
)
|
||||
++ lib.optional stdenv.hostPlatform.isMusl ./fix-rpc-types-musl-conflicts.patch
|
||||
++ lib.optional stdenv.buildPlatform.isDarwin ./darwin-cross-build.patch;
|
||||
++ lib.optional stdenv.buildPlatform.isDarwin ./darwin-cross-build.patch
|
||||
++ lib.optional enableCETRuntimeDefault ./2.39-revert-cet-default-disable.patch;
|
||||
|
||||
postPatch =
|
||||
''
|
||||
|
@ -3,6 +3,7 @@
|
||||
, profilingLibraries ? false
|
||||
, withGd ? false
|
||||
, enableCET ? if stdenv.hostPlatform.isx86_64 then "permissive" else false
|
||||
, enableCETRuntimeDefault ? false
|
||||
, pkgsBuildBuild
|
||||
, libgcc
|
||||
}:
|
||||
@ -16,7 +17,7 @@ let
|
||||
in
|
||||
|
||||
(callPackage ./common.nix { inherit stdenv; } {
|
||||
inherit withLinuxHeaders withGd profilingLibraries enableCET;
|
||||
inherit withLinuxHeaders withGd profilingLibraries enableCET enableCETRuntimeDefault;
|
||||
pname = "glibc" + lib.optionalString withGd "-gd" + lib.optionalString (stdenv.cc.isGNU && libgcc==null) "-nolibgcc";
|
||||
}).overrideAttrs(previousAttrs: {
|
||||
|
||||
@ -41,9 +42,6 @@ in
|
||||
|
||||
# Apparently --bindir is not respected.
|
||||
makeFlagsArray+=("bindir=$bin/bin" "sbindir=$bin/sbin" "rootsbindir=$bin/sbin")
|
||||
'' + lib.optionalString stdenv.buildPlatform.isDarwin ''
|
||||
# ld-wrapper will otherwise attempt to inject CoreFoundation into ld-linux's RUNPATH
|
||||
export NIX_COREFOUNDATION_RPATH=
|
||||
'';
|
||||
|
||||
# The pie, stackprotector and fortify hardening flags are autodetected by
|
||||
|
@ -1,16 +1,24 @@
|
||||
{ fetchurl, lib, stdenv }:
|
||||
{ fetchurl, fetchpatch, lib, stdenv }:
|
||||
|
||||
stdenv.mkDerivation rec {
|
||||
pname = "gsl";
|
||||
version = "2.7.1";
|
||||
version = "2.8";
|
||||
|
||||
outputs = [ "out" "dev" ];
|
||||
|
||||
src = fetchurl {
|
||||
url = "mirror://gnu/gsl/${pname}-${version}.tar.gz";
|
||||
sha256 = "sha256-3LD71DBIgyt1f/mUJpGo3XACbV2g/4VgHlJof23us0s=";
|
||||
hash = "sha256-apnu7RVjLGNUiVsd1ULtWoVcDxXZrRMmxv4rLJ5CMZA=";
|
||||
};
|
||||
|
||||
patches = [
|
||||
(fetchpatch {
|
||||
url = "https://github.com/macports/macports-ports/raw/90be777d2ce451d3c23783cb2be0efab9732e4d0/math/gsl/files/patch-fix-linking.diff";
|
||||
extraPrefix = "";
|
||||
hash = "sha256-lweYndIxcM5+4ckIUubkD9XbJbqkfdK+y9c3aRzmq0M=";
|
||||
})
|
||||
];
|
||||
|
||||
preConfigure = if (lib.versionAtLeast stdenv.hostPlatform.darwinMinVersion "11" && stdenv.isDarwin) then ''
|
||||
MACOSX_DEPLOYMENT_TARGET=10.16
|
||||
'' else null;
|
||||
|
1257
pkgs/development/libraries/gstreamer/rs/Cargo.lock
generated
1257
pkgs/development/libraries/gstreamer/rs/Cargo.lock
generated
File diff suppressed because it is too large
Load Diff
@ -144,7 +144,7 @@ in
|
||||
|
||||
stdenv.mkDerivation (finalAttrs: {
|
||||
pname = "gst-plugins-rs";
|
||||
version = "0.12.4";
|
||||
version = "0.12.8";
|
||||
|
||||
outputs = [ "out" "dev" ];
|
||||
|
||||
@ -153,7 +153,7 @@ stdenv.mkDerivation (finalAttrs: {
|
||||
owner = "gstreamer";
|
||||
repo = "gst-plugins-rs";
|
||||
rev = finalAttrs.version;
|
||||
hash = "sha256-Qnp+e1Vww2kWjDG0x2tcigwDdG67I4xnm8+QrBI+o08=";
|
||||
hash = "sha256-AGXKI/0Y2BdaSnpQAt3T/rkYlM8UpQpKm4kMAGd6Dyk=";
|
||||
# TODO: temporary workaround for case-insensitivity problems with color-name crate - https://github.com/annymosse/color-name/pull/2
|
||||
postFetch = ''
|
||||
sedSearch="$(cat <<\EOF | sed -ze 's/\n/\\n/g'
|
||||
@ -178,12 +178,12 @@ stdenv.mkDerivation (finalAttrs: {
|
||||
cargoDeps = rustPlatform.importCargoLock {
|
||||
lockFile = ./Cargo.lock;
|
||||
outputHashes = {
|
||||
"cairo-rs-0.19.3" = "sha256-TjVXdnlYEfPLbUx1pC84rCC2MlNecECMK2Yo9XKwz9M=";
|
||||
"cairo-rs-0.19.8" = "sha256-AdIUcxxuZVAWQ+KOBTrtsvTu4KtFiXkQPYWT9Avt7Z0=";
|
||||
"color-name-1.1.0" = "sha256-RfMStbe2wX5qjPARHIFHlSDKjzx8DwJ+RjzyltM5K7A=";
|
||||
"ffv1-0.0.0" = "sha256-af2VD00tMf/hkfvrtGrHTjVJqbl+VVpLaR0Ry+2niJE=";
|
||||
"flavors-0.2.0" = "sha256-zBa0X75lXnASDBam9Kk6w7K7xuH9fP6rmjWZBUB5hxk=";
|
||||
"gdk4-0.8.1" = "sha256-VPmegFZ/bC8x1vkl3YU208jQ8FCEKLwe6ZDatz4mIvM=";
|
||||
"gstreamer-0.22.4" = "sha256-r5+wOEhTVztDMEu6t47yJ9HIlbXyjdvswUND4l7kPl8=";
|
||||
"gdk4-0.8.2" = "sha256-DZjHlhzrELZ8M5YUM5kSeOphjF7863DmywFgGbZL4Jo=";
|
||||
"gstreamer-0.22.7" = "sha256-vTEDqmyqhj9e7r7N0QfG4uTNBizrU0gTUfLOJ8kU1JE=";
|
||||
};
|
||||
};
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
{
|
||||
mkDerivation, lib,
|
||||
extra-cmake-modules,
|
||||
ilmbase, karchive, openexr, dav1d, libaom, libavif, libheif, libjxl, libraw, libyuv, qtbase
|
||||
ilmbase, karchive, openexr, libavif, libheif, libjxl, libraw, qtbase
|
||||
}:
|
||||
|
||||
let inherit (lib) getDev; in
|
||||
@ -10,7 +10,7 @@ mkDerivation {
|
||||
pname = "kimageformats";
|
||||
|
||||
nativeBuildInputs = [ extra-cmake-modules ];
|
||||
buildInputs = [ karchive openexr libaom libavif dav1d libheif libjxl libraw libyuv qtbase ];
|
||||
buildInputs = [ karchive openexr libavif libheif libjxl libraw qtbase ];
|
||||
outputs = [ "out" ]; # plugins only
|
||||
CXXFLAGS = "-I${getDev ilmbase}/include/OpenEXR";
|
||||
cmakeFlags = [
|
||||
|
@ -48,11 +48,14 @@ stdenv.mkDerivation rec {
|
||||
|
||||
buildInputs = [
|
||||
gdk-pixbuf
|
||||
libaom
|
||||
zlib
|
||||
libpng
|
||||
libjpeg
|
||||
];
|
||||
|
||||
propagatedBuildInputs = [
|
||||
dav1d
|
||||
libaom
|
||||
libyuv
|
||||
];
|
||||
|
||||
|
@ -13,6 +13,7 @@
|
||||
, libgit2
|
||||
, glib
|
||||
, python3
|
||||
, fetchpatch
|
||||
}:
|
||||
|
||||
stdenv.mkDerivation rec {
|
||||
@ -26,6 +27,15 @@ stdenv.mkDerivation rec {
|
||||
sha256 = "EzHa2oOPTh9ZGyZFnUQSajJd52LcPNJhU6Ma+9/hgZA=";
|
||||
};
|
||||
|
||||
patches = [
|
||||
(fetchpatch {
|
||||
name = "support-libgit2-1.8.patch";
|
||||
# https://gitlab.gnome.org/GNOME/libgit2-glib/-/merge_requests/40
|
||||
url = "https://gitlab.gnome.org/GNOME/libgit2-glib/-/commit/a76fdf96c3af9ce9d21a3985c4be8a1aa6eea661.patch";
|
||||
hash = "sha256-ysU8pAixyftensfEC9bE0RUFMPMei0jYT26WKN5uOFE=";
|
||||
})
|
||||
];
|
||||
|
||||
nativeBuildInputs = [
|
||||
meson
|
||||
ninja
|
||||
|
@ -8,7 +8,6 @@
|
||||
, libssh2
|
||||
, openssl
|
||||
, pcre
|
||||
, http-parser
|
||||
, libiconv
|
||||
, Security
|
||||
, staticBuild ? stdenv.hostPlatform.isStatic
|
||||
@ -16,11 +15,14 @@
|
||||
, libgit2-glib
|
||||
, python3Packages
|
||||
, gitstatus
|
||||
, llhttp
|
||||
, withGssapi ? false
|
||||
, krb5
|
||||
}:
|
||||
|
||||
stdenv.mkDerivation rec {
|
||||
stdenv.mkDerivation (finalAttrs: {
|
||||
pname = "libgit2";
|
||||
version = "1.7.2";
|
||||
version = "1.8.1";
|
||||
# also check the following packages for updates: python3Packages.pygit2 and libgit2-glib
|
||||
|
||||
outputs = ["lib" "dev" "out"];
|
||||
@ -28,13 +30,14 @@ stdenv.mkDerivation rec {
|
||||
src = fetchFromGitHub {
|
||||
owner = "libgit2";
|
||||
repo = "libgit2";
|
||||
rev = "v${version}";
|
||||
hash = "sha256-fVPY/byE2/rxmv/bUykcAbmUFMlF3UZogVuTzjOXJUU=";
|
||||
rev = "v${finalAttrs.version}";
|
||||
hash = "sha256-J2rCxTecyLbbDdsyBWn9w7r3pbKRMkI9E7RvRgAqBdY=";
|
||||
};
|
||||
|
||||
cmakeFlags = [
|
||||
"-DUSE_HTTP_PARSER=system"
|
||||
"-DUSE_SSH=ON"
|
||||
(lib.cmakeBool "USE_GSSAPI" withGssapi)
|
||||
"-DBUILD_SHARED_LIBS=${if staticBuild then "OFF" else "ON"}"
|
||||
] ++ lib.optionals stdenv.hostPlatform.isWindows [
|
||||
"-DDLLTOOL=${stdenv.cc.bintools.targetPrefix}dlltool"
|
||||
@ -44,7 +47,8 @@ stdenv.mkDerivation rec {
|
||||
|
||||
nativeBuildInputs = [ cmake python3 pkg-config ];
|
||||
|
||||
buildInputs = [ zlib libssh2 openssl pcre http-parser ]
|
||||
buildInputs = [ zlib libssh2 openssl pcre llhttp ]
|
||||
++ lib.optional withGssapi krb5
|
||||
++ lib.optional stdenv.isDarwin Security;
|
||||
|
||||
propagatedBuildInputs = lib.optional (!stdenv.isLinux) libiconv;
|
||||
@ -66,7 +70,7 @@ stdenv.mkDerivation rec {
|
||||
)
|
||||
'';
|
||||
|
||||
passthru.tests = {
|
||||
passthru.tests = lib.mapAttrs (_: v: v.override { libgit2 = finalAttrs.finalPackage; }) {
|
||||
inherit libgit2-glib;
|
||||
inherit (python3Packages) pygit2;
|
||||
inherit gitstatus;
|
||||
@ -80,4 +84,4 @@ stdenv.mkDerivation rec {
|
||||
platforms = platforms.all;
|
||||
maintainers = with maintainers; [ SuperSandro2000 ];
|
||||
};
|
||||
}
|
||||
})
|
||||
|
@ -41,6 +41,7 @@ stdenv.mkDerivation rec {
|
||||
|
||||
nativeBuildInputs = [
|
||||
cmake
|
||||
icu
|
||||
ninja
|
||||
perl
|
||||
pkg-config
|
||||
|
@ -1,4 +1,4 @@
|
||||
{ lib, stdenv, fetchFromGitHub, cmake }:
|
||||
{ lib, stdenv, fetchFromGitHub, cmake, freebsd }:
|
||||
|
||||
stdenv.mkDerivation rec {
|
||||
pname = "libipt";
|
||||
@ -12,6 +12,7 @@ stdenv.mkDerivation rec {
|
||||
};
|
||||
|
||||
nativeBuildInputs = [ cmake ];
|
||||
buildInputs = lib.optional stdenv.isFreeBSD freebsd.libstdthreads;
|
||||
|
||||
meta = with lib; {
|
||||
description = "Intel Processor Trace decoder library";
|
||||
|
@ -1,24 +1,34 @@
|
||||
{ lib
|
||||
, stdenv
|
||||
, fetchFromGitea
|
||||
{
|
||||
lib,
|
||||
stdenv,
|
||||
fetchFromGitea,
|
||||
jdupes,
|
||||
}:
|
||||
|
||||
stdenv.mkDerivation rec {
|
||||
pname = "libjodycode";
|
||||
version = "3.1";
|
||||
version = "3.1.1";
|
||||
|
||||
outputs = [ "out" "man" "dev" ];
|
||||
outputs = [
|
||||
"out"
|
||||
"man"
|
||||
"dev"
|
||||
];
|
||||
|
||||
src = fetchFromGitea {
|
||||
domain = "codeberg.org";
|
||||
owner = "jbruchon";
|
||||
repo = "libjodycode";
|
||||
rev = "v${version}";
|
||||
hash = "sha256-uhWQh5YwLwYRm34nY5HvcEepqlTSDt9s3PSoD403kQM=";
|
||||
hash = "sha256-sVEa2gNvgRJK1Ycmv4inbViTBPQFjzcZ8XHlAdsNzOk=";
|
||||
};
|
||||
|
||||
env.PREFIX = placeholder "out";
|
||||
|
||||
passthru.tests = {
|
||||
inherit jdupes;
|
||||
};
|
||||
|
||||
meta = with lib; {
|
||||
description = "Shared code used by several utilities written by Jody Bruchon";
|
||||
homepage = "https://github.com/jbruchon/libjodycode";
|
||||
|
@ -2,11 +2,11 @@
|
||||
|
||||
stdenv.mkDerivation rec {
|
||||
pname = "libksba";
|
||||
version = "1.6.6";
|
||||
version = "1.6.7";
|
||||
|
||||
src = fetchurl {
|
||||
url = "mirror://gnupg/libksba/libksba-${version}.tar.bz2";
|
||||
hash = "sha256-XewDPSEVWTOIOMDElXxz39w+6G9zl31ieWQMnNCM5qQ=";
|
||||
hash = "sha256-z3JRC467TrZpPu92V0nYNnegPHkpGjEQQKW/15uqt2M=";
|
||||
};
|
||||
|
||||
outputs = [ "out" "dev" "info" ];
|
||||
|
@ -1,4 +1,4 @@
|
||||
{ lib, stdenv, fetchurl }:
|
||||
{ lib, stdenv, fetchurl, updateAutotoolsGnuConfigScriptsHook }:
|
||||
|
||||
stdenv.mkDerivation rec {
|
||||
pname = "libpipeline";
|
||||
@ -11,6 +11,10 @@ stdenv.mkDerivation rec {
|
||||
|
||||
patches = lib.optionals stdenv.isDarwin [ ./fix-on-osx.patch ];
|
||||
|
||||
# necessary to build on FreeBSD native pending inclusion of
|
||||
# https://git.savannah.gnu.org/cgit/config.git/commit/?id=e4786449e1c26716e3f9ea182caf472e4dbc96e0
|
||||
nativeBuildInputs = [ updateAutotoolsGnuConfigScriptsHook ];
|
||||
|
||||
meta = with lib; {
|
||||
homepage = "http://libpipeline.nongnu.org";
|
||||
description = "C library for manipulating pipelines of subprocesses in a flexible and convenient way";
|
||||
|
@ -20,7 +20,7 @@
|
||||
|
||||
stdenv.mkDerivation (finalAttrs: {
|
||||
pname = "libproxy";
|
||||
version = "0.5.6";
|
||||
version = "0.5.7";
|
||||
|
||||
outputs = [ "out" "dev" "devdoc" ];
|
||||
|
||||
@ -28,7 +28,7 @@ stdenv.mkDerivation (finalAttrs: {
|
||||
owner = "libproxy";
|
||||
repo = "libproxy";
|
||||
rev = finalAttrs.version;
|
||||
hash = "sha256-2uDlKjxzrKlyZKV0BSUDzmLSo2voJKDerbZZkamgNYk=";
|
||||
hash = "sha256-VKVazLkmm1BZeGxrQmkpHors27bki0l8US3ZGI6OR0w=";
|
||||
};
|
||||
|
||||
patches = [
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue
Block a user