nix_2_24: remove
This commit is contained in:
@@ -147,7 +147,7 @@ rec {
|
|||||||
parse = pkgs.lib.recurseIntoAttrs {
|
parse = pkgs.lib.recurseIntoAttrs {
|
||||||
latest = pkgs.callPackage ./parse.nix { nix = pkgs.nixVersions.latest; };
|
latest = pkgs.callPackage ./parse.nix { nix = pkgs.nixVersions.latest; };
|
||||||
lix = pkgs.callPackage ./parse.nix { nix = pkgs.lix; };
|
lix = pkgs.callPackage ./parse.nix { nix = pkgs.lix; };
|
||||||
nix_2_24 = pkgs.callPackage ./parse.nix { nix = pkgs.nixVersions.nix_2_24; };
|
nix_2_28 = pkgs.callPackage ./parse.nix { nix = pkgs.nixVersions.nix_2_28; };
|
||||||
};
|
};
|
||||||
shell = import ../shell.nix { inherit nixpkgs system; };
|
shell = import ../shell.nix { inherit nixpkgs system; };
|
||||||
tarball = import ../pkgs/top-level/make-tarball.nix {
|
tarball = import ../pkgs/top-level/make-tarball.nix {
|
||||||
|
|||||||
@@ -9,7 +9,7 @@
|
|||||||
pkgsBB ? pkgs.pkgsBuildBuild,
|
pkgsBB ? pkgs.pkgsBuildBuild,
|
||||||
nix ? pkgs-nixVersions.stable,
|
nix ? pkgs-nixVersions.stable,
|
||||||
nixVersions ? [
|
nixVersions ? [
|
||||||
pkgs-nixVersions.nix_2_24
|
pkgs-nixVersions.nix_2_28
|
||||||
nix
|
nix
|
||||||
pkgs-nixVersions.latest
|
pkgs-nixVersions.latest
|
||||||
],
|
],
|
||||||
|
|||||||
@@ -1,323 +0,0 @@
|
|||||||
{
|
|
||||||
lib,
|
|
||||||
fetchFromGitHub,
|
|
||||||
version,
|
|
||||||
suffix ? "",
|
|
||||||
hash ? null,
|
|
||||||
src ? fetchFromGitHub {
|
|
||||||
owner = "NixOS";
|
|
||||||
repo = "nix";
|
|
||||||
rev = version;
|
|
||||||
inherit hash;
|
|
||||||
},
|
|
||||||
patches ? [ ],
|
|
||||||
knownVulnerabilities ? [ ],
|
|
||||||
maintainers ? [
|
|
||||||
lib.maintainers.lovesegfault
|
|
||||||
lib.maintainers.artturin
|
|
||||||
],
|
|
||||||
teams ? [ lib.teams.nix ],
|
|
||||||
self_attribute_name,
|
|
||||||
}@args:
|
|
||||||
assert (hash == null) -> (src != null);
|
|
||||||
let
|
|
||||||
atLeast24 = lib.versionAtLeast version "2.4";
|
|
||||||
atLeast225 = lib.versionAtLeast version "2.25pre";
|
|
||||||
in
|
|
||||||
{
|
|
||||||
stdenv,
|
|
||||||
autoconf-archive,
|
|
||||||
autoreconfHook,
|
|
||||||
bash,
|
|
||||||
bison,
|
|
||||||
boehmgc,
|
|
||||||
boost,
|
|
||||||
brotli,
|
|
||||||
busybox-sandbox-shell,
|
|
||||||
bzip2,
|
|
||||||
callPackage,
|
|
||||||
coreutils,
|
|
||||||
curl,
|
|
||||||
docbook_xsl_ns,
|
|
||||||
docbook5,
|
|
||||||
editline,
|
|
||||||
flex,
|
|
||||||
git,
|
|
||||||
gnutar,
|
|
||||||
gtest,
|
|
||||||
gzip,
|
|
||||||
jq,
|
|
||||||
lib,
|
|
||||||
libarchive,
|
|
||||||
libcpuid,
|
|
||||||
libgit2,
|
|
||||||
libsodium,
|
|
||||||
libxml2,
|
|
||||||
libxslt,
|
|
||||||
lowdown,
|
|
||||||
lowdown-unsandboxed,
|
|
||||||
toml11,
|
|
||||||
man,
|
|
||||||
mdbook,
|
|
||||||
mdbook-linkcheck,
|
|
||||||
nlohmann_json,
|
|
||||||
nixosTests,
|
|
||||||
openssl,
|
|
||||||
perl,
|
|
||||||
python3,
|
|
||||||
pkg-config,
|
|
||||||
rapidcheck,
|
|
||||||
sqlite,
|
|
||||||
util-linuxMinimal,
|
|
||||||
xz,
|
|
||||||
enableDocumentation ? stdenv.buildPlatform.canExecute stdenv.hostPlatform,
|
|
||||||
enableStatic ? stdenv.hostPlatform.isStatic,
|
|
||||||
withAWS ?
|
|
||||||
lib.meta.availableOn stdenv.hostPlatform aws-c-common
|
|
||||||
&& !enableStatic
|
|
||||||
&& (stdenv.hostPlatform.isLinux || stdenv.hostPlatform.isDarwin)
|
|
||||||
&& atLeast24,
|
|
||||||
aws-c-common,
|
|
||||||
aws-sdk-cpp,
|
|
||||||
withLibseccomp ? lib.meta.availableOn stdenv.hostPlatform libseccomp,
|
|
||||||
libseccomp,
|
|
||||||
|
|
||||||
confDir,
|
|
||||||
stateDir,
|
|
||||||
storeDir,
|
|
||||||
|
|
||||||
# passthru tests
|
|
||||||
pkgsi686Linux,
|
|
||||||
pkgsStatic,
|
|
||||||
runCommand,
|
|
||||||
pkgs,
|
|
||||||
}:
|
|
||||||
let
|
|
||||||
self = stdenv.mkDerivation {
|
|
||||||
pname = "nix";
|
|
||||||
|
|
||||||
version = "${version}${suffix}";
|
|
||||||
VERSION_SUFFIX = suffix;
|
|
||||||
|
|
||||||
inherit src patches;
|
|
||||||
|
|
||||||
outputs = [
|
|
||||||
"out"
|
|
||||||
"dev"
|
|
||||||
]
|
|
||||||
++ lib.optionals enableDocumentation [
|
|
||||||
"man"
|
|
||||||
"doc"
|
|
||||||
];
|
|
||||||
|
|
||||||
hardeningEnable = lib.optionals (!stdenv.hostPlatform.isDarwin) [ "pie" ];
|
|
||||||
|
|
||||||
hardeningDisable = [
|
|
||||||
"shadowstack"
|
|
||||||
]
|
|
||||||
++ lib.optional stdenv.hostPlatform.isMusl "fortify";
|
|
||||||
|
|
||||||
nativeInstallCheckInputs = [
|
|
||||||
git
|
|
||||||
man
|
|
||||||
];
|
|
||||||
|
|
||||||
nativeBuildInputs = [
|
|
||||||
pkg-config
|
|
||||||
autoconf-archive
|
|
||||||
autoreconfHook
|
|
||||||
bison
|
|
||||||
flex
|
|
||||||
jq
|
|
||||||
]
|
|
||||||
++ lib.optionals enableDocumentation [
|
|
||||||
(lib.getBin lowdown-unsandboxed)
|
|
||||||
mdbook
|
|
||||||
mdbook-linkcheck
|
|
||||||
]
|
|
||||||
++ lib.optionals stdenv.hostPlatform.isLinux [
|
|
||||||
util-linuxMinimal
|
|
||||||
];
|
|
||||||
|
|
||||||
buildInputs = [
|
|
||||||
boost
|
|
||||||
brotli
|
|
||||||
bzip2
|
|
||||||
curl
|
|
||||||
editline
|
|
||||||
libsodium
|
|
||||||
openssl
|
|
||||||
sqlite
|
|
||||||
xz
|
|
||||||
gtest
|
|
||||||
libarchive
|
|
||||||
lowdown
|
|
||||||
libgit2
|
|
||||||
toml11
|
|
||||||
rapidcheck
|
|
||||||
]
|
|
||||||
++ lib.optionals (atLeast225 && enableDocumentation) [
|
|
||||||
python3
|
|
||||||
]
|
|
||||||
++ lib.optionals (stdenv.hostPlatform.isx86_64) [
|
|
||||||
libcpuid
|
|
||||||
]
|
|
||||||
++ lib.optionals withLibseccomp [
|
|
||||||
libseccomp
|
|
||||||
]
|
|
||||||
++ lib.optionals withAWS [
|
|
||||||
aws-sdk-cpp
|
|
||||||
];
|
|
||||||
|
|
||||||
propagatedBuildInputs = [
|
|
||||||
boehmgc
|
|
||||||
nlohmann_json
|
|
||||||
];
|
|
||||||
|
|
||||||
postPatch = ''
|
|
||||||
patchShebangs --build tests
|
|
||||||
'';
|
|
||||||
|
|
||||||
preConfigure =
|
|
||||||
# Copy libboost_context so we don't get all of Boost in our closure.
|
|
||||||
# https://github.com/NixOS/nixpkgs/issues/45462
|
|
||||||
lib.optionalString (!enableStatic) ''
|
|
||||||
mkdir -p $out/lib
|
|
||||||
cp -pd ${boost}/lib/{libboost_context*,libboost_thread*,libboost_system*} $out/lib
|
|
||||||
rm -f $out/lib/*.a
|
|
||||||
${lib.optionalString stdenv.hostPlatform.isLinux ''
|
|
||||||
chmod u+w $out/lib/*.so.*
|
|
||||||
patchelf --set-rpath $out/lib:${lib.getLib stdenv.cc.cc}/lib $out/lib/libboost_thread.so.*
|
|
||||||
''}
|
|
||||||
'';
|
|
||||||
|
|
||||||
configureFlags = [
|
|
||||||
"--with-store-dir=${storeDir}"
|
|
||||||
"--localstatedir=${stateDir}"
|
|
||||||
"--sysconfdir=${confDir}"
|
|
||||||
"--enable-gc"
|
|
||||||
]
|
|
||||||
++ lib.optionals (!enableDocumentation) [
|
|
||||||
"--disable-doc-gen"
|
|
||||||
]
|
|
||||||
++ lib.optionals stdenv.hostPlatform.isLinux [
|
|
||||||
"--with-sandbox-shell=${busybox-sandbox-shell}/bin/busybox"
|
|
||||||
]
|
|
||||||
++ lib.optionals (stdenv.hostPlatform.isLinux && stdenv.hostPlatform.isStatic) [
|
|
||||||
"--enable-embedded-sandbox-shell"
|
|
||||||
]
|
|
||||||
++
|
|
||||||
lib.optionals
|
|
||||||
(
|
|
||||||
stdenv.hostPlatform != stdenv.buildPlatform
|
|
||||||
&& stdenv.hostPlatform ? nix
|
|
||||||
&& stdenv.hostPlatform.nix ? system
|
|
||||||
)
|
|
||||||
[
|
|
||||||
"--with-system=${stdenv.hostPlatform.nix.system}"
|
|
||||||
]
|
|
||||||
++ lib.optionals (!withLibseccomp) [
|
|
||||||
# RISC-V support in progress https://github.com/seccomp/libseccomp/pull/50
|
|
||||||
"--disable-seccomp-sandboxing"
|
|
||||||
]
|
|
||||||
++ lib.optionals (stdenv.cc.isGNU && !enableStatic) [
|
|
||||||
"--enable-lto"
|
|
||||||
];
|
|
||||||
|
|
||||||
env.CXXFLAGS = toString (
|
|
||||||
lib.optionals (lib.versionAtLeast lowdown.version "1.4.0") [
|
|
||||||
# Autotools based build system wasn't updated with the backport of
|
|
||||||
# https://github.com/NixOS/nix/pull/12115, so set the define explicitly.
|
|
||||||
"-DHAVE_LOWDOWN_1_4"
|
|
||||||
]
|
|
||||||
);
|
|
||||||
|
|
||||||
makeFlags = [
|
|
||||||
# gcc runs multi-threaded LTO using make and does not yet detect the new fifo:/path style
|
|
||||||
# of make jobserver. until gcc adds support for this we have to instruct make to use this
|
|
||||||
# old style or LTO builds will run their linking on only one thread, which takes forever.
|
|
||||||
"--jobserver-style=pipe"
|
|
||||||
"profiledir=$(out)/etc/profile.d"
|
|
||||||
]
|
|
||||||
++ lib.optional (stdenv.hostPlatform != stdenv.buildPlatform) "PRECOMPILE_HEADERS=0"
|
|
||||||
++ lib.optional (stdenv.hostPlatform.isDarwin) "PRECOMPILE_HEADERS=1";
|
|
||||||
|
|
||||||
installFlags = [ "sysconfdir=$(out)/etc" ];
|
|
||||||
|
|
||||||
doInstallCheck = true;
|
|
||||||
installCheckTarget = "installcheck";
|
|
||||||
|
|
||||||
# socket path becomes too long otherwise
|
|
||||||
preInstallCheck =
|
|
||||||
lib.optionalString stdenv.hostPlatform.isDarwin ''
|
|
||||||
export TMPDIR=$NIX_BUILD_TOP
|
|
||||||
''
|
|
||||||
# Prevent crashes in libcurl due to invoking Objective-C `+initialize` methods after `fork`.
|
|
||||||
# See http://sealiesoftware.com/blog/archive/2017/6/5/Objective-C_and_fork_in_macOS_1013.html.
|
|
||||||
+ lib.optionalString stdenv.hostPlatform.isDarwin ''
|
|
||||||
export OBJC_DISABLE_INITIALIZE_FORK_SAFETY=YES
|
|
||||||
''
|
|
||||||
# See https://github.com/NixOS/nix/issues/5687
|
|
||||||
+ lib.optionalString (stdenv.hostPlatform.isDarwin) ''
|
|
||||||
echo "exit 99" > tests/gc-non-blocking.sh
|
|
||||||
'' # TODO: investigate why this broken
|
|
||||||
+ lib.optionalString (stdenv.hostPlatform.system == "aarch64-linux") ''
|
|
||||||
echo "exit 0" > tests/functional/flakes/show.sh
|
|
||||||
''
|
|
||||||
+ ''
|
|
||||||
# nixStatic otherwise does not find its man pages in tests.
|
|
||||||
export MANPATH=$man/share/man:$MANPATH
|
|
||||||
'';
|
|
||||||
|
|
||||||
separateDebugInfo = stdenv.hostPlatform.isLinux && !enableStatic;
|
|
||||||
|
|
||||||
enableParallelBuilding = true;
|
|
||||||
|
|
||||||
passthru = {
|
|
||||||
inherit aws-sdk-cpp boehmgc;
|
|
||||||
|
|
||||||
perl-bindings = perl.pkgs.toPerlModule (
|
|
||||||
callPackage ./nix-perl.nix {
|
|
||||||
nix = self;
|
|
||||||
}
|
|
||||||
);
|
|
||||||
|
|
||||||
tests = import ./tests.nix {
|
|
||||||
inherit
|
|
||||||
runCommand
|
|
||||||
version
|
|
||||||
src
|
|
||||||
lib
|
|
||||||
stdenv
|
|
||||||
pkgs
|
|
||||||
pkgsi686Linux
|
|
||||||
pkgsStatic
|
|
||||||
nixosTests
|
|
||||||
self_attribute_name
|
|
||||||
;
|
|
||||||
nix = self;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
# point 'nix edit' and ofborg at the file that defines the attribute,
|
|
||||||
# not this common file.
|
|
||||||
pos = builtins.unsafeGetAttrPos "version" args;
|
|
||||||
meta = with lib; {
|
|
||||||
description = "Powerful package manager that makes package management reliable and reproducible";
|
|
||||||
longDescription = ''
|
|
||||||
Nix is a powerful package manager for Linux and other Unix systems that
|
|
||||||
makes package management reliable and reproducible. It provides atomic
|
|
||||||
upgrades and rollbacks, side-by-side installation of multiple versions of
|
|
||||||
a package, multi-user package management and easy setup of build
|
|
||||||
environments.
|
|
||||||
'';
|
|
||||||
homepage = "https://nixos.org/";
|
|
||||||
license = licenses.lgpl21Plus;
|
|
||||||
inherit knownVulnerabilities maintainers teams;
|
|
||||||
platforms = platforms.unix;
|
|
||||||
outputsToInstall = [ "out" ] ++ optional enableDocumentation "man";
|
|
||||||
mainProgram = "nix";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
in
|
|
||||||
self
|
|
||||||
@@ -5,7 +5,6 @@
|
|||||||
nixDependencies,
|
nixDependencies,
|
||||||
generateSplicesForMkScope,
|
generateSplicesForMkScope,
|
||||||
fetchFromGitHub,
|
fetchFromGitHub,
|
||||||
fetchpatch2,
|
|
||||||
runCommand,
|
runCommand,
|
||||||
pkgs,
|
pkgs,
|
||||||
pkgsi686Linux,
|
pkgsi686Linux,
|
||||||
@@ -17,21 +16,6 @@
|
|||||||
confDir ? "/etc",
|
confDir ? "/etc",
|
||||||
}:
|
}:
|
||||||
let
|
let
|
||||||
|
|
||||||
# Called for Nix < 2.26
|
|
||||||
commonAutoconf =
|
|
||||||
args:
|
|
||||||
nixDependencies.callPackage
|
|
||||||
(import ./common-autoconf.nix ({ inherit lib fetchFromGitHub; } // args))
|
|
||||||
{
|
|
||||||
inherit
|
|
||||||
storeDir
|
|
||||||
stateDir
|
|
||||||
confDir
|
|
||||||
;
|
|
||||||
inherit (nixDependencies) aws-sdk-cpp;
|
|
||||||
};
|
|
||||||
|
|
||||||
# Called for Nix == 2.28. Transitional until we always use
|
# Called for Nix == 2.28. Transitional until we always use
|
||||||
# per-component packages.
|
# per-component packages.
|
||||||
commonMeson =
|
commonMeson =
|
||||||
@@ -44,13 +28,6 @@ let
|
|||||||
;
|
;
|
||||||
};
|
};
|
||||||
|
|
||||||
# https://github.com/NixOS/nix/pull/7585
|
|
||||||
patch-monitorfdhup = fetchpatch2 {
|
|
||||||
name = "nix-7585-monitor-fd-hup.patch";
|
|
||||||
url = "https://github.com/NixOS/nix/commit/1df3d62c769dc68c279e89f68fdd3723ed3bcb5a.patch";
|
|
||||||
hash = "sha256-f+F0fUO+bqyPXjt+IXJtISVr589hdc3y+Cdrxznb+Nk=";
|
|
||||||
};
|
|
||||||
|
|
||||||
# Intentionally does not support overrideAttrs etc
|
# Intentionally does not support overrideAttrs etc
|
||||||
# Use only for tests that are about the package relation to `pkgs` and/or NixOS.
|
# Use only for tests that are about the package relation to `pkgs` and/or NixOS.
|
||||||
addTestsShallowly =
|
addTestsShallowly =
|
||||||
@@ -142,17 +119,17 @@ let
|
|||||||
nixComponentsAttributeName
|
nixComponentsAttributeName
|
||||||
];
|
];
|
||||||
|
|
||||||
|
maintainers = [
|
||||||
|
lib.maintainers.lovesegfault
|
||||||
|
lib.maintainers.artturin
|
||||||
|
];
|
||||||
|
teams = [ lib.teams.nix ];
|
||||||
|
|
||||||
in
|
in
|
||||||
lib.makeExtensible (
|
lib.makeExtensible (
|
||||||
self:
|
self:
|
||||||
(
|
(
|
||||||
{
|
{
|
||||||
nix_2_24 = commonAutoconf {
|
|
||||||
version = "2.24.15";
|
|
||||||
hash = "sha256-GHqFHLxvRID2IEPUwIfRMp8epYQMFcvG9ogLzfWRbPc=";
|
|
||||||
self_attribute_name = "nix_2_24";
|
|
||||||
};
|
|
||||||
|
|
||||||
nix_2_28 = commonMeson {
|
nix_2_28 = commonMeson {
|
||||||
version = "2.28.4";
|
version = "2.28.4";
|
||||||
hash = "sha256-V1tPrBkPteqF8VWUgpotNFYJ2Xm6WmB3aMPexuEHl9I=";
|
hash = "sha256-V1tPrBkPteqF8VWUgpotNFYJ2Xm6WmB3aMPexuEHl9I=";
|
||||||
@@ -161,7 +138,7 @@ lib.makeExtensible (
|
|||||||
|
|
||||||
nixComponents_2_29 = nixDependencies.callPackage ./modular/packages.nix {
|
nixComponents_2_29 = nixDependencies.callPackage ./modular/packages.nix {
|
||||||
version = "2.29.1";
|
version = "2.29.1";
|
||||||
inherit (self.nix_2_24.meta) maintainers teams;
|
inherit maintainers teams;
|
||||||
otherSplices = generateSplicesForNixComponents "nixComponents_2_29";
|
otherSplices = generateSplicesForNixComponents "nixComponents_2_29";
|
||||||
src = fetchFromGitHub {
|
src = fetchFromGitHub {
|
||||||
owner = "NixOS";
|
owner = "NixOS";
|
||||||
@@ -175,7 +152,7 @@ lib.makeExtensible (
|
|||||||
|
|
||||||
nixComponents_2_30 = nixDependencies.callPackage ./modular/packages.nix rec {
|
nixComponents_2_30 = nixDependencies.callPackage ./modular/packages.nix rec {
|
||||||
version = "2.30.2";
|
version = "2.30.2";
|
||||||
inherit (self.nix_2_24.meta) maintainers teams;
|
inherit maintainers teams;
|
||||||
otherSplices = generateSplicesForNixComponents "nixComponents_2_30";
|
otherSplices = generateSplicesForNixComponents "nixComponents_2_30";
|
||||||
src = fetchFromGitHub {
|
src = fetchFromGitHub {
|
||||||
owner = "NixOS";
|
owner = "NixOS";
|
||||||
@@ -189,7 +166,7 @@ lib.makeExtensible (
|
|||||||
|
|
||||||
nixComponents_git = nixDependencies.callPackage ./modular/packages.nix rec {
|
nixComponents_git = nixDependencies.callPackage ./modular/packages.nix rec {
|
||||||
version = "2.31pre20250712_${lib.substring 0 8 src.rev}";
|
version = "2.31pre20250712_${lib.substring 0 8 src.rev}";
|
||||||
inherit (self.nix_2_24.meta) maintainers teams;
|
inherit maintainers teams;
|
||||||
otherSplices = generateSplicesForNixComponents "nixComponents_git";
|
otherSplices = generateSplicesForNixComponents "nixComponents_git";
|
||||||
src = fetchFromGitHub {
|
src = fetchFromGitHub {
|
||||||
owner = "NixOS";
|
owner = "NixOS";
|
||||||
@@ -218,6 +195,7 @@ lib.makeExtensible (
|
|||||||
)
|
)
|
||||||
// {
|
// {
|
||||||
nixComponents_2_27 = throw "nixComponents_2_27 has been removed. use nixComponents_git.";
|
nixComponents_2_27 = throw "nixComponents_2_27 has been removed. use nixComponents_git.";
|
||||||
|
nix_2_24 = throw "nix_2_24 has been removed. use nix_2_28.";
|
||||||
nix_2_26 = throw "nix_2_26 has been removed. use nix_2_28.";
|
nix_2_26 = throw "nix_2_26 has been removed. use nix_2_28.";
|
||||||
nix_2_27 = throw "nix_2_27 has been removed. use nix_2_28.";
|
nix_2_27 = throw "nix_2_27 has been removed. use nix_2_28.";
|
||||||
nix_2_25 = throw "nix_2_25 has been removed. use nix_2_28.";
|
nix_2_25 = throw "nix_2_25 has been removed. use nix_2_28.";
|
||||||
|
|||||||
Reference in New Issue
Block a user