diff options
author | Vladimír Čunát <vcunat@gmail.com> | 2015-06-18 22:23:55 +0200 |
---|---|---|
committer | Vladimír Čunát <vcunat@gmail.com> | 2015-06-18 22:38:08 +0200 |
commit | 61596bf405de245c71630101869ea3f4e8f8a20a (patch) | |
tree | e712933bc34d25aba42b99907f879b5251585b29 /pkgs/tools | |
parent | 8e19ac8d7cc7018613ff51d9266dea81547df756 (diff) | |
parent | fe75f160324672d639469dc2da69f70d4eb466a4 (diff) | |
download | nixpkgs-61596bf405de245c71630101869ea3f4e8f8a20a.tar nixpkgs-61596bf405de245c71630101869ea3f4e8f8a20a.tar.gz nixpkgs-61596bf405de245c71630101869ea3f4e8f8a20a.tar.bz2 nixpkgs-61596bf405de245c71630101869ea3f4e8f8a20a.tar.lz nixpkgs-61596bf405de245c71630101869ea3f4e8f8a20a.tar.xz nixpkgs-61596bf405de245c71630101869ea3f4e8f8a20a.tar.zst nixpkgs-61596bf405de245c71630101869ea3f4e8f8a20a.zip |
Merge #8363: pure-darwin stdenv
Diffstat (limited to 'pkgs/tools')
27 files changed, 139 insertions, 60 deletions
diff --git a/pkgs/tools/X11/xcape/default.nix b/pkgs/tools/X11/xcape/default.nix index 272f1ca0907..35d353d9861 100644 --- a/pkgs/tools/X11/xcape/default.nix +++ b/pkgs/tools/X11/xcape/default.nix @@ -3,7 +3,7 @@ let s = rec { baseName = "xcape"; - version = "git-2013-05-30"; + version = "git-2015-03-01"; name = "${baseName}-${version}"; }; buildInputs = [ @@ -15,8 +15,8 @@ stdenv.mkDerivation { inherit buildInputs; src = fetchgit { url = https://github.com/alols/xcape; - rev = "39aa08c5da354a8fe495eba8787a01957cfa5fcb"; - sha256 = "1yh0vbaj4c5lflxm3d4xrfaric1lp0gfcyzq33bqphpsba439bmg"; + rev = "f3802fc086ce9d961d644a5d29ad5b650db56215"; + sha256 = "05mm4ap69ncwl4hhzf2dvbazqxjf27477cd3chpfc7qi7srqasvz"; }; preConfigure = '' makeFlags="$makeFlags PREFIX=$out" diff --git a/pkgs/tools/X11/xdg-utils/default.nix b/pkgs/tools/X11/xdg-utils/default.nix index 4d7ead019ce..f90de89adbd 100644 --- a/pkgs/tools/X11/xdg-utils/default.nix +++ b/pkgs/tools/X11/xdg-utils/default.nix @@ -1,13 +1,12 @@ -{ stdenv, fetchzip, file, libxslt, docbook_xml_dtd_412, docbook_xsl, xmlto, w3m }: - -let rev = "e8ee3b18d16e41b95148111b920a0c8beed3ac6c"; in +{ stdenv, fetchzip, file, libxslt, docbook_xml_dtd_412, docbook_xsl, xmlto +, w3m, which, gnugrep, gnused, coreutils }: stdenv.mkDerivation rec { name = "xdg-utils-1.1.0-rc3p7"; src = fetchzip { - name = "xdg-utils-${rev}.tar.gz"; - url = "http://cgit.freedesktop.org/xdg/xdg-utils/snapshot/${rev}.tar.gz"; + name = "${name}.tar.gz"; + url = "http://cgit.freedesktop.org/xdg/xdg-utils/snapshot/e8ee3b18d16e4.tar.gz"; sha256 = "1hz6rv45blcii1a8n1j45rg8vzm98vh4fvlca3zmay1kp57yr4jl"; }; @@ -15,7 +14,14 @@ stdenv.mkDerivation rec { buildInputs = [ libxslt docbook_xml_dtd_412 docbook_xsl xmlto w3m ]; postInstall = '' - substituteInPlace $out/bin/xdg-mime --replace /usr/bin/file ${file}/bin/file + for item in $out/bin/*; do + substituteInPlace $item --replace "cut " "${coreutils}/bin/cut " + substituteInPlace $item --replace "sed " "${gnused}/bin/sed " + substituteInPlace $item --replace "grep " "${gnugrep}/bin/grep " + substituteInPlace $item --replace "egrep " "${gnugrep}/bin/egrep " + substituteInPlace $item --replace "which " "${which}/bin/which " + substituteInPlace $item --replace "/usr/bin/file" "${file}/bin/file" + done ''; meta = { diff --git a/pkgs/tools/admin/nxproxy/0660_nxcomp_fix-negotiation-in-stage-10-error.full+lite.patch b/pkgs/tools/admin/nxproxy/0660_nxcomp_fix-negotiation-in-stage-10-error.full+lite.patch new file mode 100644 index 00000000000..3d4c584fb07 --- /dev/null +++ b/pkgs/tools/admin/nxproxy/0660_nxcomp_fix-negotiation-in-stage-10-error.full+lite.patch @@ -0,0 +1,67 @@ +commit f982cbc85e9ffff24a6a348c3637b54a7e8cbc34 +Author: Vadim Troshchinskiy <vtroshchinskiy@qindel.com> +Date: Wed May 20 15:47:45 2015 +0200 + +Fix negotiation in stage 10 error + +Problem fixed by adding a select() call to implement a timeout, +and retrying writes if needed. + +v2: backport to nx-libs 3.5.0.x (Mihai Moldovan) + +--- a/nxcomp/Loop.cpp ++++ b/nxcomp/Loop.cpp +@@ -8073,16 +8073,52 @@ int ReadRemoteData(int fd, char *buffer, + int WriteLocalData(int fd, const char *buffer, int size) + { + int position = 0; ++ int ret = 0; ++ fd_set writeSet; ++ struct timeval selectTs = {30, 0}; + + while (position < size) + { ++ ++ // A write to a non-blocking socket may fail with EAGAIN. The problem is ++ // that cache data is done in several writes, and there's no easy way ++ // to handle failure without rewriting a significant amount of code. ++ // ++ // Bailing out of the outer loop would result in restarting the sending ++ // of the entire cache list, which would confuse the other side. ++ ++ FD_ZERO(&writeSet); ++ FD_SET(fd, &writeSet); ++ ++ ret = select(fd+1, NULL, &writeSet, NULL, &selectTs); ++ ++ #ifdef DEBUG ++ *logofs << "Loop: WriteLocalData: select() returned with a code of " << ret << " and remaining timeout of " ++ << selectTs.tv_sec << " sec, " << selectTs.tv_usec << "usec\n" << logofs_flush; ++ #endif ++ ++ if ( ret < 0 ) ++ { ++ *logofs << "Loop: Error in select() when writing data to FD#" << fd << ": " << strerror(EGET()) << "\n" << logofs_flush; ++ ++ if ( EGET() == EINTR ) ++ continue; ++ ++ return -1; ++ } ++ else if ( ret == 0 ) ++ { ++ *logofs << "Loop: Timeout expired in select() when writing data to FD#" << fd << ": " << strerror(EGET()) << "\n" << logofs_flush; ++ return -1; ++ } ++ + int result = write(fd, buffer + position, size - position); + + getNewTimestamp(); + + if (result <= 0) + { +- if (result < 0 && EGET() == EINTR) ++ if (result < 0 && (EGET() == EINTR || EGET() == EAGAIN || EGET() == EWOULDBLOCK)) + { + continue; + } diff --git a/pkgs/tools/admin/nxproxy/default.nix b/pkgs/tools/admin/nxproxy/default.nix index e9fe8f8f9c7..20b8f4059ad 100644 --- a/pkgs/tools/admin/nxproxy/default.nix +++ b/pkgs/tools/admin/nxproxy/default.nix @@ -21,7 +21,8 @@ stdenv.mkDerivation { ./0660_nxcomp_fix-negotiation-in-stage-10-error.full+lite.patch ]; - buildInputs = [ autoreconfHook libxcomp ]; + buildInputs = [ libxcomp ]; + nativeBuildInputs = [ autoreconfHook ]; preAutoreconf = '' cd nxproxy/ diff --git a/pkgs/tools/archivers/gnutar/default.nix b/pkgs/tools/archivers/gnutar/default.nix index 00be3967768..71b43bf2de9 100644 --- a/pkgs/tools/archivers/gnutar/default.nix +++ b/pkgs/tools/archivers/gnutar/default.nix @@ -11,6 +11,12 @@ stdenv.mkDerivation rec { patches = stdenv.lib.optional stdenv.isDarwin ./gnutar-1.28-darwin.patch; + # avoid retaining reference to CF during stdenv bootstrap + configureFlags = stdenv.lib.optionals stdenv.isDarwin [ + "gt_cv_func_CFPreferencesCopyAppValue=no" + "gt_cv_func_CFLocaleCopyCurrent=no" + ]; + # gnutar tries to call into gettext between `fork` and `exec`, # which is not safe on darwin. # see http://article.gmane.org/gmane.os.macosx.fink.devel/21882 diff --git a/pkgs/tools/archivers/sharutils/default.nix b/pkgs/tools/archivers/sharutils/default.nix index 146f9bea87a..bfeda5085b6 100644 --- a/pkgs/tools/archivers/sharutils/default.nix +++ b/pkgs/tools/archivers/sharutils/default.nix @@ -12,7 +12,7 @@ stdenv.mkDerivation rec { '' # Fix for building on Glibc 2.16. Won't be needed once the # gnulib in sharutils is updated. - sed -i ${stdenv.lib.optionalString ((stdenv.isFreeBSD || stdenv.isOpenBSD || stdenv.isDarwin) && stdenv.cc.nativeTools) "''"} '/gets is a security hole/d' lib/stdio.in.h + sed -i ${stdenv.lib.optionalString ((stdenv.isFreeBSD || stdenv.isOpenBSD) && stdenv.cc.nativeTools) "''"} '/gets is a security hole/d' lib/stdio.in.h ''; # GNU Gettext is needed on non-GNU platforms. diff --git a/pkgs/tools/compression/xdelta/default.nix b/pkgs/tools/compression/xdelta/default.nix index 5355138ac8c..68c4ea809be 100644 --- a/pkgs/tools/compression/xdelta/default.nix +++ b/pkgs/tools/compression/xdelta/default.nix @@ -11,7 +11,7 @@ stdenv.mkDerivation rec { owner = "jmacd"; }; - buildInputs = [ autoreconfHook ]; + nativeBuildInputs = [ autoreconfHook ]; postPatch = '' cd xdelta3 diff --git a/pkgs/tools/filesystems/boxfs/default.nix b/pkgs/tools/filesystems/boxfs/default.nix index 69c2d046f1c..e82e720c11b 100644 --- a/pkgs/tools/filesystems/boxfs/default.nix +++ b/pkgs/tools/filesystems/boxfs/default.nix @@ -34,7 +34,8 @@ in stdenv.mkDerivation { patches = [ ./work-around-API-borkage.patch ]; - buildInputs = [ curl fuse libxml2 pkgconfig ]; + buildInputs = [ curl fuse libxml2 ]; + nativeBuildInputs = [ pkgconfig ]; buildFlags = "static"; diff --git a/pkgs/tools/filesystems/duff/default.nix b/pkgs/tools/filesystems/duff/default.nix index 59cb07dead0..edb69aaef5c 100644 --- a/pkgs/tools/filesystems/duff/default.nix +++ b/pkgs/tools/filesystems/duff/default.nix @@ -11,7 +11,7 @@ stdenv.mkDerivation rec { owner = "elmindreda"; }; - buildInputs = [ autoreconfHook gettext ]; + nativeBuildInputs = [ autoreconfHook gettext ]; preAutoreconf = '' # duff is currently badly packaged, requiring us to do extra work here that diff --git a/pkgs/tools/filesystems/encfs/default.nix b/pkgs/tools/filesystems/encfs/default.nix index 211690606ef..d85440c5475 100644 --- a/pkgs/tools/filesystems/encfs/default.nix +++ b/pkgs/tools/filesystems/encfs/default.nix @@ -12,7 +12,8 @@ stdenv.mkDerivation rec { owner = "vgough"; }; - buildInputs = [ autoreconfHook boost fuse openssl perl pkgconfig rlog ]; + buildInputs = [ boost fuse openssl rlog ]; + nativeBuildInputs = [ autoreconfHook perl pkgconfig ]; configureFlags = [ "--with-boost-serialization=boost_wserialization" diff --git a/pkgs/tools/filesystems/exfat-utils/default.nix b/pkgs/tools/filesystems/exfat-utils/default.nix index 3215b0d9174..eb7977c71a3 100644 --- a/pkgs/tools/filesystems/exfat-utils/default.nix +++ b/pkgs/tools/filesystems/exfat-utils/default.nix @@ -22,7 +22,7 @@ stdenv.mkDerivation rec { maintainers = with maintainers; [ nckx ]; }; - buildInputs = [ scons ]; + nativeBuildInputs = [ scons ]; buildPhase = '' export CCFLAGS="-std=c99" diff --git a/pkgs/tools/filesystems/fuse-exfat/default.nix b/pkgs/tools/filesystems/fuse-exfat/default.nix index ae9f9e32fa8..ef8bf5845dd 100644 --- a/pkgs/tools/filesystems/fuse-exfat/default.nix +++ b/pkgs/tools/filesystems/fuse-exfat/default.nix @@ -9,7 +9,8 @@ stdenv.mkDerivation rec { name = "${name}.tar.gz"; }; - buildInputs = [ pkgconfig fuse scons ]; + buildInputs = [ fuse ]; + nativeBuildInputs = [ pkgconfig scons ]; buildPhase = '' export CCFLAGS="-O2 -Wall -std=c99 -I${fuse}/include" diff --git a/pkgs/tools/filesystems/mp3fs/default.nix b/pkgs/tools/filesystems/mp3fs/default.nix index 23ee5558e14..8859aa003eb 100644 --- a/pkgs/tools/filesystems/mp3fs/default.nix +++ b/pkgs/tools/filesystems/mp3fs/default.nix @@ -11,7 +11,8 @@ stdenv.mkDerivation rec { patches = [ ./fix-statfs-operation.patch ]; - buildInputs = [ flac fuse lame libid3tag pkgconfig ]; + buildInputs = [ flac fuse lame libid3tag ]; + nativeBuildInputs = [ pkgconfig ]; enableParallelBuilding = true; diff --git a/pkgs/tools/misc/gparted/default.nix b/pkgs/tools/misc/gparted/default.nix index 464e40ec014..84709010118 100644 --- a/pkgs/tools/misc/gparted/default.nix +++ b/pkgs/tools/misc/gparted/default.nix @@ -12,9 +12,8 @@ stdenv.mkDerivation rec { configureFlags = "--disable-doc"; - buildInputs = [ - parted gtk glib intltool gettext libuuid pkgconfig gtkmm libxml2 hicolor_icon_theme - ]; + buildInputs = [ parted gtk glib libuuid gtkmm libxml2 hicolor_icon_theme ]; + nativeBuildInputs = [ intltool gettext pkgconfig ]; meta = with stdenv.lib; { description = "Graphical disk partitioning tool"; diff --git a/pkgs/tools/misc/tmux/default.nix b/pkgs/tools/misc/tmux/default.nix index f559c77712a..c906f0a2910 100644 --- a/pkgs/tools/misc/tmux/default.nix +++ b/pkgs/tools/misc/tmux/default.nix @@ -1,10 +1,11 @@ { stdenv, fetchurl, ncurses, libevent, pkgconfig }: stdenv.mkDerivation rec { - name = "tmux-2.0"; + name = "tmux-${version}"; + version = "2.0"; src = fetchurl { - url = "mirror://sourceforge/tmux/${name}.tar.gz"; + url = "https://github.com/tmux/tmux/releases/download/${version}/${name}.tar.gz"; sha256 = "0qnkda8kb747vmbldjpb23ksv9pq3s65xhh1ja5rdsmh8r24npvr"; }; @@ -23,7 +24,7 @@ stdenv.mkDerivation rec { ''; meta = { - homepage = http://tmux.sourceforge.net/; + homepage = http://tmux.github.io/; description = "Terminal multiplexer"; longDescription = diff --git a/pkgs/tools/misc/vdirsyncer/default.nix b/pkgs/tools/misc/vdirsyncer/default.nix index 86e424ad08b..abe6a8adc14 100644 --- a/pkgs/tools/misc/vdirsyncer/default.nix +++ b/pkgs/tools/misc/vdirsyncer/default.nix @@ -1,20 +1,20 @@ { stdenv, fetchurl, pythonPackages }: pythonPackages.buildPythonPackage rec { - version = "0.4.3"; + version = "0.5.2"; name = "vdirsyncer-${version}"; namePrefix = ""; src = fetchurl { url = "https://github.com/untitaker/vdirsyncer/archive/${version}.tar.gz"; - sha256 = "0jrxmq8lq0dvqflmh42hhyvc3jjrg1cg3gzfhdcsskj9zz0m6wai"; + sha256 = "02k6ijj0z0r08l50ignm2ngd4ax84l0r1wshh1is0wcfr70d94h9"; }; propagatedBuildInputs = with pythonPackages; [ - icalendar click lxml setuptools + setuptools_scm requests_toolbelt requests2 atomicwrites diff --git a/pkgs/tools/networking/httping/default.nix b/pkgs/tools/networking/httping/default.nix index 9243550a1b1..9389d17900b 100644 --- a/pkgs/tools/networking/httping/default.nix +++ b/pkgs/tools/networking/httping/default.nix @@ -10,7 +10,8 @@ stdenv.mkDerivation rec { sha256 = "1110r3gpsj9xmybdw7w4zkhj3zmn5mnv2nq0ijbvrywbn019zdfs"; }; - buildInputs = [ gettext ncurses ]; + buildInputs = [ ncurses ]; + nativeBuildInputs = [ gettext ]; makeFlags = [ "DESTDIR=$(out)" diff --git a/pkgs/tools/networking/ipv6calc/default.nix b/pkgs/tools/networking/ipv6calc/default.nix index f1abec0faf7..102d0688234 100644 --- a/pkgs/tools/networking/ipv6calc/default.nix +++ b/pkgs/tools/networking/ipv6calc/default.nix @@ -9,7 +9,8 @@ stdenv.mkDerivation rec { sha256 = "02r0r4lgz10ivbmgdzivj7dvry1aad75ik9vyy6irjvngjkzg5r3"; }; - buildInputs = [ geoip geolite-legacy getopt openssl perl ]; + buildInputs = [ geoip geolite-legacy getopt openssl ]; + nativeBuildInputs = [ perl ]; patchPhase = '' for i in {,databases/}lib/Makefile.in; do diff --git a/pkgs/tools/package-management/dpkg/default.nix b/pkgs/tools/package-management/dpkg/default.nix index e5be41ed7f6..022b8dfc2ca 100644 --- a/pkgs/tools/package-management/dpkg/default.nix +++ b/pkgs/tools/package-management/dpkg/default.nix @@ -33,7 +33,8 @@ stdenv.mkDerivation { done ''; - buildInputs = [ perl zlib bzip2 xz makeWrapper ]; + buildInputs = [ perl zlib bzip2 xz ]; + nativeBuildInputs = [ makeWrapper ]; postInstall = '' diff --git a/pkgs/tools/security/clamav/default.nix b/pkgs/tools/security/clamav/default.nix index 9a0b947e99b..1f36d54ff50 100644 --- a/pkgs/tools/security/clamav/default.nix +++ b/pkgs/tools/security/clamav/default.nix @@ -1,4 +1,5 @@ -{ stdenv, fetchurl, zlib, bzip2, libiconv, libxml2, openssl, ncurses, curl }: +{ stdenv, fetchurl, zlib, bzip2, libiconv, libxml2, openssl, ncurses, curl +, libmilter }: stdenv.mkDerivation rec { name = "clamav-${version}"; version = "0.98.7"; @@ -8,7 +9,7 @@ stdenv.mkDerivation rec { sha256 = "0wp2ad8km4cqmlndni5ljv7q3lfxm6y4r3giv0yf23bl0yvif918"; }; - buildInputs = [ zlib bzip2 libxml2 openssl ncurses curl libiconv ]; + buildInputs = [ zlib bzip2 libxml2 openssl ncurses curl libiconv libmilter ]; configureFlags = [ "--with-zlib=${zlib}" @@ -18,6 +19,7 @@ stdenv.mkDerivation rec { "--with-openssl=${openssl}" "--with-libncurses-prefix=${ncurses}" "--with-libcurl=${curl}" + "--enable-milter" "--disable-clamav" ]; diff --git a/pkgs/tools/security/eid-mw/default.nix b/pkgs/tools/security/eid-mw/default.nix index 1833d460081..e02c58d3825 100644 --- a/pkgs/tools/security/eid-mw/default.nix +++ b/pkgs/tools/security/eid-mw/default.nix @@ -12,7 +12,8 @@ stdenv.mkDerivation rec { owner = "Fedict"; }; - buildInputs = [ autoreconfHook gtk2 pcsclite pkgconfig ]; + buildInputs = [ gtk2 pcsclite ]; + nativeBuildInputs = [ autoreconfHook pkgconfig ]; enableParallelBuilding = true; diff --git a/pkgs/tools/security/eid-viewer/default.nix b/pkgs/tools/security/eid-viewer/default.nix index 06307263e52..f2dfd58a7fb 100644 --- a/pkgs/tools/security/eid-viewer/default.nix +++ b/pkgs/tools/security/eid-viewer/default.nix @@ -11,7 +11,8 @@ stdenv.mkDerivation rec { sha256 = "e263e6751ef7c185e278a607fdc46c207306d9a56c6ddb2ce6f58fb4464a2893"; }; - buildInputs = [ jre makeWrapper pcsclite ]; + buildInputs = [ jre pcsclite ]; + nativeBuildInputs = [ makeWrapper ]; unpackPhase = "tar -xzf ${src} --strip-components=1"; diff --git a/pkgs/tools/security/rhash/default.nix b/pkgs/tools/security/rhash/default.nix index 643053d9cac..40f5163d89d 100644 --- a/pkgs/tools/security/rhash/default.nix +++ b/pkgs/tools/security/rhash/default.nix @@ -29,5 +29,6 @@ stdenv.mkDerivation rec { homepage = http://rhash.anz.ru; description = "Console utility and library for computing and verifying hash sums of files"; platforms = platforms.linux; + maintainers = [ maintainers.andrewrk ]; }; } diff --git a/pkgs/tools/security/tor/torbrowser.nix b/pkgs/tools/security/tor/torbrowser.nix index 4ab0cabbcd3..34803f03cd1 100644 --- a/pkgs/tools/security/tor/torbrowser.nix +++ b/pkgs/tools/security/tor/torbrowser.nix @@ -20,13 +20,13 @@ let in stdenv.mkDerivation rec { name = "tor-browser-${version}"; - version = "4.5.1"; + version = "4.5.2"; src = fetchurl { url = "https://archive.torproject.org/tor-package-archive/torbrowser/${version}/tor-browser-linux${bits}-${version}_en-US.tar.xz"; sha256 = if bits == "64" then - "0nbjw04xbzb5d4q0j05nq9p8vdpzqxzhbywjxdgpc5mc73jyv8mr" else - "0fkzgdyxi7gl3kyfp0jmbky61a1b2yg9747h75bgkkndnqxnmkqw"; + "139c85096ee85a65222753fbbee7c04e8cc494021f9afaf5c1a0f520dd7869b9" else + "960277aea38a3958f3ac573535302e61b3b0137169e5d7b9687cee648a5d5bec"; }; patchPhase = '' diff --git a/pkgs/tools/system/rsyslog/default.nix b/pkgs/tools/system/rsyslog/default.nix index a9fdcf6fa64..0878902af86 100644 --- a/pkgs/tools/system/rsyslog/default.nix +++ b/pkgs/tools/system/rsyslog/default.nix @@ -11,11 +11,11 @@ let mkFlag = cond: name: if cond then "--enable-${name}" else "--disable-${name}"; in stdenv.mkDerivation rec { - name = "rsyslog-8.9.0"; + name = "rsyslog-8.10.0"; src = fetchurl { url = "http://www.rsyslog.com/files/download/rsyslog/${name}.tar.gz"; - sha256 = "1p3saxfs723479rbsdyvqwfrblcp0bw6mkz2ncrxvnccfn70xc7a"; + sha256 = "04k90v7fm1czg3lm5anfnf5cnxcxyhxldkgwzzi1k0hhczrz6bdr"; }; buildInputs = [ diff --git a/pkgs/tools/text/cheetah-template/2.0.1.nix b/pkgs/tools/text/cheetah-template/2.0.1.nix deleted file mode 100644 index 0bfa72ca00d..00000000000 --- a/pkgs/tools/text/cheetah-template/2.0.1.nix +++ /dev/null @@ -1,18 +0,0 @@ -args : with args; -rec { - src = fetchurl { - url = mirror://sourceforge/cheetahtemplate/Cheetah-2.0.1.tar.gz; - sha256 = "134k4s5f116k23vb7wf9bynlx3gf0wwl7y0zp9ciz0q66nh1idkh"; - }; - - buildInputs = [python makeWrapper]; - configureFlags = []; - - /* doConfigure should be specified separately */ - phaseNames = ["installPythonPackage" (makeManyWrappers ''$out/bin/*'' ''--prefix PYTHONPATH : $(toPythonPath $out)'')]; - - name = "cheetah-template-2.0.1"; - meta = { - description = "Templating engine"; - }; -} diff --git a/pkgs/tools/text/gawk/default.nix b/pkgs/tools/text/gawk/default.nix index c6eb7ba1101..001a50458e2 100644 --- a/pkgs/tools/text/gawk/default.nix +++ b/pkgs/tools/text/gawk/default.nix @@ -1,4 +1,5 @@ -{ stdenv, fetchurl, libsigsegv, readline, readlineSupport ? false }: +{ stdenv, fetchurl, libsigsegv, readline, readlineSupport ? false +, locale ? null }: stdenv.mkDerivation rec { name = "gawk-4.1.3"; @@ -8,10 +9,14 @@ stdenv.mkDerivation rec { sha256 = "09d6pmx6h3i2glafm0jd1v1iyrs03vcyv2rkz12jisii3vlmbkz3"; }; - doCheck = !stdenv.isCygwin; # XXX: `test-dup2' segfaults on Cygwin 6.1 + doCheck = !( + stdenv.isCygwin # XXX: `test-dup2' segfaults on Cygwin 6.1 + || stdenv.isDarwin # XXX: `locale' segfaults + ); buildInputs = stdenv.lib.optional (stdenv.system != "x86_64-cygwin") libsigsegv - ++ stdenv.lib.optional readlineSupport readline; + ++ stdenv.lib.optional readlineSupport readline + ++ stdenv.lib.optional stdenv.isDarwin locale; configureFlags = stdenv.lib.optional (stdenv.system != "x86_64-cygwin") "--with-libsigsegv-prefix=${libsigsegv}" ++ stdenv.lib.optional readlineSupport "--with-readline=${readline}" |