Skip to content

Commit

Permalink
Merge branch 'staging'
Browse files Browse the repository at this point in the history
There are some Darwin regressions and a mysterious Lisp issue,
but also a security update of curl...
  • Loading branch information
vcunat committed Feb 3, 2018
2 parents 84fb5c6 + 55e0f12 commit dd57c63
Show file tree
Hide file tree
Showing 68 changed files with 438 additions and 161 deletions.
1 change: 0 additions & 1 deletion nixos/modules/misc/nixpkgs.nix
Expand Up @@ -69,7 +69,6 @@ in
[ (self: super: {
openssh = super.openssh.override {
hpnSupport = true;
withKerberos = true;
kerberos = self.libkrb5;
};
};
Expand Down
3 changes: 2 additions & 1 deletion pkgs/applications/science/logic/lean/default.nix
Expand Up @@ -11,7 +11,8 @@ stdenv.mkDerivation rec {
sha256 = "0irh9b4haz0pzzxrb4hwcss91a0xb499kjrcrmr2s59p3zq8bbd9";
};

buildInputs = [ gmp cmake ];
nativeBuildInputs = [ cmake ];
buildInputs = [ gmp ];
enableParallelBuilding = true;

preConfigure = ''
Expand Down
2 changes: 0 additions & 2 deletions pkgs/applications/window-managers/awesome/default.nix
Expand Up @@ -41,7 +41,6 @@ with luaPackages; stdenv.mkDerivation rec {
#cmakeFlags = "-DGENERATE_MANPAGES=ON";
cmakeFlags = "-DOVERRIDE_VERSION=${version}";

LD_LIBRARY_PATH = "${stdenv.lib.makeLibraryPath [ cairo pango gobjectIntrospection ]}";
GI_TYPELIB_PATH = "${pango.out}/lib/girepository-1.0";
LUA_CPATH = "${lgi}/lib/lua/${lua.luaversion}/?.so";
LUA_PATH = "${lgi}/share/lua/${lua.luaversion}/?.lua;${lgi}/share/lua/${lua.luaversion}/lgi/?.lua";
Expand All @@ -52,7 +51,6 @@ with luaPackages; stdenv.mkDerivation rec {
--add-flags '--search ${lgi}/lib/lua/${lua.luaversion}' \
--add-flags '--search ${lgi}/share/lua/${lua.luaversion}' \
--prefix GI_TYPELIB_PATH : "$GI_TYPELIB_PATH" \
--prefix LD_LIBRARY_PATH : "$LD_LIBRARY_PATH" \
--prefix PATH : "${stdenv.lib.makeBinPath [ compton unclutter procps iproute coreutils curl alsaUtils findutils xterm ]}"
wrapProgram $out/bin/awesome-client \
Expand Down
4 changes: 4 additions & 0 deletions pkgs/build-support/setup-hooks/patch-shebangs.sh
Expand Up @@ -54,7 +54,11 @@ patchShebangs() {
echo "$f: interpreter directive changed from \"$oldInterpreterLine\" to \"$newInterpreterLine\""
# escape the escape chars so that sed doesn't interpret them
escapedInterpreterLine=$(echo "$newInterpreterLine" | sed 's|\\|\\\\|g')
# Preserve times, see: https://github.com/NixOS/nixpkgs/pull/33281
touch -r "$f" "$f.timestamp"
sed -i -e "1 s|.*|#\!$escapedInterpreterLine|" "$f"
touch -r "$f.timestamp" "$f"
rm "$f.timestamp"
fi
fi
done
Expand Down
15 changes: 13 additions & 2 deletions pkgs/data/sgml+xml/stylesheets/xslt/docbook-xsl/default.nix
@@ -1,15 +1,17 @@
{ lib, stdenv, fetchurl, findXMLCatalogs, writeScriptBin, ruby, bash }:
{ lib, stdenv, fetchurl, fetchpatch, findXMLCatalogs, writeScriptBin, ruby, bash }:

let

common = { pname, sha256 }: let self = stdenv.mkDerivation rec {
common = { pname, sha256, patches ? [] }: let self = stdenv.mkDerivation rec {
name = "${pname}-1.79.1";

src = fetchurl {
url = "mirror://sourceforge/docbook/${name}.tar.bz2";
inherit sha256;
};

inherit patches;

propagatedBuildInputs = [ findXMLCatalogs ];

dontBuild = true;
Expand Down Expand Up @@ -44,6 +46,15 @@ in {
docbook_xsl = common {
pname = "docbook-xsl";
sha256 = "0s59lihif2fr7rznckxr2kfyrvkirv76r1zvidp9b5mj28p4apvj";

patches = [(fetchpatch {
name = "potential-infinite-template-recursion.patch";
url = "https://src.fedoraproject.org/cgit/rpms/docbook-style-xsl.git/"
+ "plain/docbook-style-xsl-non-recursive-string-subst.patch?id=bf9e5d16fd";
sha256 = "1pfb468bsj3j879ip0950waih0r1s6rzfbm2p70glbz0g3903p7h";
stripLen = "1";
})];

};

docbook_xsl_ns = common {
Expand Down
11 changes: 9 additions & 2 deletions pkgs/desktops/plasma-5/kwin/default.nix
@@ -1,5 +1,5 @@
{
mkDerivation, lib, copyPathsToStore,
mkDerivation, lib, copyPathsToStore, fetchpatch,
extra-cmake-modules, kdoctools,

epoxy,libICE, libSM, libinput, libxkbcommon, udev, wayland, xcb-util-cursor,
Expand Down Expand Up @@ -29,7 +29,14 @@ mkDerivation {
kwayland kwidgetsaddons kwindowsystem kxmlgui plasma-framework
];
outputs = [ "bin" "dev" "out" ];
patches = copyPathsToStore (lib.readPathsFromFile ./. ./series);
patches = copyPathsToStore (lib.readPathsFromFile ./. ./series)
++ [(fetchpatch {
name = "cmake-3.10.diff";
# included upstream for kwin >= 5.11.95
url = "https://github.com/KDE/kwin/commit/cd544890ced4192.diff";
sha256 = "0z5nbcg712v10mskb7r9v0jcx5h8q4ixb7fjbb0kicmzsc266yd5";
})]
;
CXXFLAGS = [
''-DNIXPKGS_XWAYLAND=\"${lib.getBin xwayland}/bin/Xwayland\"''
];
Expand Down
3 changes: 0 additions & 3 deletions pkgs/development/compilers/llvm/4/clang/default.nix
Expand Up @@ -37,9 +37,6 @@ let

patches = [ ./purity.patch ];

# XXX: TODO: This should be removed on next rebuild
postBuild = "";

postPatch = ''
sed -i -e 's/Args.hasArg(options::OPT_nostdlibinc)/true/' lib/Driver/Tools.cpp
sed -i -e 's/DriverArgs.hasArg(options::OPT_nostdlibinc)/true/' lib/Driver/ToolChains.cpp
Expand Down
4 changes: 1 addition & 3 deletions pkgs/development/compilers/llvm/4/llvm.nix
@@ -1,8 +1,6 @@
{ stdenv
, fetch
, fetchpatch
, perl
, groff
, cmake
, python
, libffi
Expand Down Expand Up @@ -41,7 +39,7 @@ in stdenv.mkDerivation (rec {
outputs = [ "out" ]
++ stdenv.lib.optional enableSharedLibraries "lib";

nativeBuildInputs = [ perl groff cmake python ]
nativeBuildInputs = [ cmake python ]
++ stdenv.lib.optional enableManpages python.pkgs.sphinx;

buildInputs = [ libxml2 libffi ]
Expand Down
3 changes: 0 additions & 3 deletions pkgs/development/compilers/llvm/5/clang/default.nix
Expand Up @@ -37,9 +37,6 @@ let

patches = [ ./purity.patch ];

# XXX: TODO: This should be removed on next rebuild
postBuild = "";

postPatch = ''
sed -i -e 's/DriverArgs.hasArg(options::OPT_nostdlibinc)/true/' \
-e 's/Args.hasArg(options::OPT_nostdlibinc)/true/' \
Expand Down
4 changes: 1 addition & 3 deletions pkgs/development/compilers/llvm/5/llvm.nix
@@ -1,8 +1,6 @@
{ stdenv
, fetch
, fetchpatch
, perl
, groff
, cmake
, python
, libffi
Expand Down Expand Up @@ -41,7 +39,7 @@ in stdenv.mkDerivation (rec {
outputs = [ "out" ]
++ stdenv.lib.optional enableSharedLibraries "lib";

nativeBuildInputs = [ perl groff cmake python ]
nativeBuildInputs = [ cmake python ]
++ stdenv.lib.optional enableManpages python.pkgs.sphinx;

buildInputs = [ libxml2 libffi ]
Expand Down
2 changes: 1 addition & 1 deletion pkgs/development/libraries/aspell/default.nix
Expand Up @@ -15,7 +15,7 @@ stdenv.mkDerivation rec {
patch -p1 < ${./data-dirs-from-nix-profiles.patch}
'';

buildInputs = [ perl ];
nativeBuildInputs = [ perl ];

doCheck = true;

Expand Down
15 changes: 11 additions & 4 deletions pkgs/development/libraries/glib/default.nix
Expand Up @@ -43,15 +43,15 @@ let
'';

ver_maj = "2.54";
ver_min = "2";
ver_min = "3";
in

stdenv.mkDerivation rec {
name = "glib-${ver_maj}.${ver_min}";

src = fetchurl {
url = "mirror://gnome/sources/glib/${ver_maj}/${name}.tar.xz";
sha256 = "bb89e5c5aad33169a8c7f28b45671c7899c12f74caf707737f784d7102758e6c";
sha256 = "963fdc6685dc3da8e5381dfb9f15ca4b5709b28be84d9d05a9bb8e446abac0a8";
};

patches = optional stdenv.isDarwin ./darwin-compilation.patch
Expand All @@ -75,8 +75,15 @@ stdenv.mkDerivation rec {
# internal pcre would only add <200kB, but it's relatively common
configureFlags = [ "--with-pcre=system" ]
++ optional stdenv.isDarwin "--disable-compile-warnings"
++ optional (stdenv.isFreeBSD || stdenv.isSunOS) "--with-libiconv=gnu"
++ optional stdenv.isSunOS "--disable-dtrace";
# glibc inclues GNU libiconv, but Darwin's iconv function is good enonugh.
++ optional (stdenv.hostPlatform.libc != "glibc" && !stdenv.hostPlatform.isDarwin)
"--with-libiconv=gnu"
++ optional stdenv.isSunOS "--disable-dtrace"
# Can't run this test when cross-compiling
++ optionals (stdenv.hostPlatform != stdenv.buildPlatform)
[ "glib_cv_stack_grows=no" "glib_cv_uscore=no" ]
# GElf only supports elf64 hosts
++ optional (!stdenv.hostPlatform.is64bit) "--disable-libelf";

NIX_CFLAGS_COMPILE = optional stdenv.isDarwin "-lintl"
++ optional stdenv.isSunOS "-DBSD_COMP";
Expand Down
3 changes: 2 additions & 1 deletion pkgs/development/libraries/gnutls/3.6.nix
Expand Up @@ -11,9 +11,10 @@ callPackage ./generic.nix (args // rec {
# Skip two tests introduced in 3.5.11. Probable reasons of failure:
# - pkgconfig: building against the result won't work before installing
# - trust-store: default trust store path (/etc/ssl/...) is missing in sandbox
# Change p11-kit test to use pkg-config to find p11-kit
postPatch = ''
sed '2iexit 77' -i tests/pkgconfig.sh
sed '/^void doit(void)/,$s/{/{ exit(77);/; t' -i tests/trust-store.c
# TODO: remove just this line on some rebuild
sed 's:/usr/lib64/pkcs11/ /usr/lib/pkcs11/ /usr/lib/x86_64-linux-gnu/pkcs11/:`pkg-config --variable=p11_module_path p11-kit-1`:' -i tests/p11-kit-trust.sh
'';
})
@@ -0,0 +1,11 @@
--- a/gir/cairo-1.0.gir.in
+++ b/gir/cairo-1.0.gir.in
@@ -5,7 +5,7 @@
xmlns:glib="http://www.gtk.org/introspection/glib/1.0">
<package name="%CAIRO_GIR_PACKAGE%"/>
<namespace name="cairo" version="1.0"
- shared-library="%CAIRO_SHARED_LIBRARY%"
+ shared-library="@cairoLib@/%CAIRO_SHARED_LIBRARY%"
c:identifier-prefixes="cairo"
c:symbol-prefixes="cairo">
<record name="Context" c:type="cairo_t" foreign="1"
17 changes: 12 additions & 5 deletions pkgs/development/libraries/gobject-introspection/default.nix
@@ -1,5 +1,5 @@
{ stdenv, fetchurl, glib, flex, bison, pkgconfig, libffi, python
, libintlOrEmpty, cctools
, libintlOrEmpty, cctools, cairo
, substituteAll, nixStoreDir ? builtins.storeDir
}:
# now that gobjectIntrospection creates large .gir files (eg gtk3 case)
Expand Down Expand Up @@ -38,10 +38,17 @@ stdenv.mkDerivation rec {

setupHook = ./setup-hook.sh;

patches = stdenv.lib.singleton (substituteAll {
src = ./absolute_shlib_path.patch;
inherit nixStoreDir;
});
patches = [
(substituteAll {
src = ./absolute_shlib_path.patch;
inherit nixStoreDir;
})
# https://github.com/NixOS/nixpkgs/issues/34080
(substituteAll {
src = ./absolute_gir_path.patch;
cairoLib = "${getLib cairo}/lib";
})
];

meta = with stdenv.lib; {
description = "A middleware layer between C libraries and language bindings";
Expand Down
4 changes: 2 additions & 2 deletions pkgs/development/libraries/gtk+/2.x.nix
Expand Up @@ -12,11 +12,11 @@ assert cupsSupport -> cups != null;
with stdenv.lib;

stdenv.mkDerivation rec {
name = "gtk+-2.24.31";
name = "gtk+-2.24.32";

src = fetchurl {
url = "mirror://gnome/sources/gtk+/2.24/${name}.tar.xz";
sha256 = "68c1922732c7efc08df4656a5366dcc3afdc8791513400dac276009b40954658";
sha256 = "b6c8a93ddda5eabe3bfee1eb39636c9a03d2a56c7b62828b359bf197943c582e";
};

outputs = [ "out" "dev" "devdoc" ];
Expand Down
6 changes: 6 additions & 0 deletions pkgs/development/libraries/icu/base.nix
Expand Up @@ -34,6 +34,9 @@ stdenv.mkDerivation {

preConfigure = ''
sed -i -e "s|/bin/sh|${stdenv.shell}|" configure
# $(includedir) is different from $(prefix)/include due to multiple outputs
sed -i -e 's|^\(CPPFLAGS = .*\) -I\$(prefix)/include|\1 -I$(includedir)|' config/Makefile.inc.in
'' + stdenv.lib.optionalString stdenv.isArm ''
# From https://archlinuxarm.org/packages/armv7h/icu/files/icudata-stdlibs.patch
sed -e 's/LDFLAGSICUDT=-nodefaultlibs -nostdlib/LDFLAGSICUDT=/' -i config/mh-linux
Expand All @@ -45,6 +48,9 @@ stdenv.mkDerivation {
# remove dependency on bootstrap-tools in early stdenv build
postInstall = stdenv.lib.optionalString stdenv.isDarwin ''
sed -i 's/INSTALL_CMD=.*install/INSTALL_CMD=install/' $out/lib/icu/${version}/pkgdata.inc
'' + ''
substituteInPlace "$dev/bin/icu-config" \
--replace \''${pkglibdir}/Makefile.inc "$dev/lib/icu/Makefile.inc"
'';

postFixup = ''moveToOutput lib/icu "$dev" '';
Expand Down
6 changes: 5 additions & 1 deletion pkgs/development/libraries/libdaemon/default.nix
Expand Up @@ -8,7 +8,11 @@ stdenv.mkDerivation rec {
sha256 = "0d5qlq5ab95wh1xc87rqrh1vx6i8lddka1w3f1zcqvcqdxgyn8zx";
};

configureFlags = [ "--disable-lynx" ];
configureFlags = [ "--disable-lynx" ]
++ stdenv.lib.optional (stdenv.hostPlatform != stdenv.buildPlatform)
[ # Can't run this test while cross-compiling
"ac_cv_func_setpgrp_void=yes"
];

meta = {
description = "Lightweight C library that eases the writing of UNIX daemons";
Expand Down
2 changes: 1 addition & 1 deletion pkgs/development/libraries/libedit/default.nix
Expand Up @@ -11,7 +11,7 @@ stdenv.mkDerivation rec {
outputs = [ "out" "dev" ];

# Have `configure' avoid `/usr/bin/nroff' in non-chroot builds.
NROFF = "${groff}/bin/nroff";
# NROFF = "${groff}/bin/nroff";

patches = [ ./01-cygwin.patch ];

Expand Down
8 changes: 4 additions & 4 deletions pkgs/development/libraries/libgpg-error/default.nix
@@ -1,4 +1,4 @@
{ stdenv, fetchurl, gettext }:
{ stdenv, buildPackages, fetchurl, gettext }:

stdenv.mkDerivation rec {
name = "libgpg-error-${version}";
Expand All @@ -16,7 +16,8 @@ stdenv.mkDerivation rec {

# If architecture-dependent MO files aren't available, they're generated
# during build, so we need gettext for cross-builds.
crossAttrs.buildInputs = [ gettext ];
depsBuildBuild = [ buildPackages.stdenv.cc ];
nativeBuildInputs = [ gettext ];

postConfigure =
stdenv.lib.optionalString stdenv.isSunOS
Expand All @@ -27,7 +28,7 @@ stdenv.mkDerivation rec {
# Thus, re-run it with Bash.
"${stdenv.shell} config.status";

doCheck = true;
doCheck = true; # not cross

meta = with stdenv.lib; {
homepage = https://www.gnupg.org/related_software/libgpg-error/index.html;
Expand All @@ -45,4 +46,3 @@ stdenv.mkDerivation rec {
maintainers = [ maintainers.fuuzetsu maintainers.vrthra ];
};
}

4 changes: 2 additions & 2 deletions pkgs/development/libraries/libinput/default.nix
Expand Up @@ -16,11 +16,11 @@ in
with stdenv.lib;
stdenv.mkDerivation rec {
name = "libinput-${version}";
version = "1.9.3";
version = "1.9.4";

src = fetchurl {
url = "http://www.freedesktop.org/software/libinput/${name}.tar.xz";
sha256 = "09wkc5qqk1k2a68cwfy4x853z8z35wf2qkijh66kacsvc2fjq394";
sha256 = "142icwzpirwddl7ghfmynxpnsbjg53rjxpzv4arjsaiw9r6bvk8b";
};

outputs = [ "out" "dev" ];
Expand Down
4 changes: 2 additions & 2 deletions pkgs/development/libraries/libogg/default.nix
@@ -1,11 +1,11 @@
{ stdenv, fetchurl }:

stdenv.mkDerivation rec {
name = "libogg-1.3.2";
name = "libogg-1.3.3";

src = fetchurl {
url = "http://downloads.xiph.org/releases/ogg/${name}.tar.xz";
sha256 = "16z74q422jmprhyvy7c9x909li8cqzmvzyr8cgbm52xcsp6pqs1z";
sha256 = "022wjlzn8fx7mfby4pcgyjwx8zir7jr7cizichh3jgaki8bwcgsg";
};

outputs = [ "out" "dev" "doc" ];
Expand Down
5 changes: 4 additions & 1 deletion pkgs/development/libraries/libomxil-bellagio/default.nix
Expand Up @@ -8,7 +8,10 @@ stdenv.mkDerivation rec {
url = "mirror://sourceforge/omxil/omxil/Bellagio%20${version}/${name}.tar.gz";
sha256 = "0k6p6h4npn8p1qlgq6z3jbfld6n1bqswzvxzndki937gr0lhfg2r";
};


configureFlags =
stdenv.lib.optionals (stdenv.hostPlatform != stdenv.buildPlatform) [ "ac_cv_func_malloc_0_nonnull=yes" ];

patches = [ ./fedora-fixes.patch ];

meta = with stdenv.lib; {
Expand Down
4 changes: 2 additions & 2 deletions pkgs/development/libraries/libseccomp/default.nix
Expand Up @@ -2,11 +2,11 @@

stdenv.mkDerivation rec {
name = "libseccomp-${version}";
version = "2.3.2";
version = "2.3.3";

src = fetchurl {
url = "https://github.com/seccomp/libseccomp/releases/download/v${version}/libseccomp-${version}.tar.gz";
sha256 = "3ddc8c037956c0a5ac19664ece4194743f59e1ccd4adde848f4f0dae7f77bca1";
sha256 = "0mdiyfljrkfl50q1m3ws8yfcyfjwf1zgkvcva8ffcwncji18zhkz";
};

buildInputs = [ getopt makeWrapper ];
Expand Down

0 comments on commit dd57c63

Please sign in to comment.