[Nix-commits] SVN commit: nix - r30877 - in nixpkgs/trunk/pkgs: development/libraries/haskell/bson development/libraries/haskell/compact-string-fix development/libraries/haskell/data-binary-ieee754 de

2011-12-13 Thread Andres Loeh
Author: andres
Date: Wed Dec 14 07:57:52 2011
New Revision: 30877
URL: https://nixos.org/websvn/nix/?rev=30877&sc=1

Log:
Added haskell-mongoDB and dependencies.

Added:
   nixpkgs/trunk/pkgs/development/libraries/haskell/bson/
   nixpkgs/trunk/pkgs/development/libraries/haskell/bson/default.nix
   nixpkgs/trunk/pkgs/development/libraries/haskell/compact-string-fix/
   
nixpkgs/trunk/pkgs/development/libraries/haskell/compact-string-fix/default.nix
   nixpkgs/trunk/pkgs/development/libraries/haskell/data-binary-ieee754/
   
nixpkgs/trunk/pkgs/development/libraries/haskell/data-binary-ieee754/default.nix
   nixpkgs/trunk/pkgs/development/libraries/haskell/mongoDB/
   nixpkgs/trunk/pkgs/development/libraries/haskell/mongoDB/default.nix
Modified:
   nixpkgs/trunk/pkgs/top-level/haskell-packages.nix

Added: nixpkgs/trunk/pkgs/development/libraries/haskell/bson/default.nix
==
--- /dev/null   00:00:00 1970   (empty, because file is newly added)
+++ nixpkgs/trunk/pkgs/development/libraries/haskell/bson/default.nix   Wed Dec 
14 07:57:52 2011(r30877)
@@ -0,0 +1,23 @@
+{ cabal, binary, compactStringFix, cryptohash, dataBinaryIeee754
+, mtl, network, time
+}:
+
+cabal.mkDerivation (self: {
+  pname = "bson";
+  version = "0.1.6";
+  sha256 = "0w9dab8x6b3dwk2afy0gnmrvcvx2dshwhjvlr2k69nchid4wh823";
+  buildDepends = [
+binary compactStringFix cryptohash dataBinaryIeee754 mtl network
+time
+  ];
+  meta = {
+homepage = "http://github.com/TonyGen/bson-haskell";;
+description = "BSON documents are JSON-like objects with a standard binary 
encoding";
+license = "unknown";
+platforms = self.ghc.meta.platforms;
+maintainers = [
+  self.stdenv.lib.maintainers.andres
+  self.stdenv.lib.maintainers.simons
+];
+  };
+})

Added: 
nixpkgs/trunk/pkgs/development/libraries/haskell/compact-string-fix/default.nix
==
--- /dev/null   00:00:00 1970   (empty, because file is newly added)
+++ 
nixpkgs/trunk/pkgs/development/libraries/haskell/compact-string-fix/default.nix 
Wed Dec 14 07:57:52 2011(r30877)
@@ -0,0 +1,17 @@
+{ cabal }:
+
+cabal.mkDerivation (self: {
+  pname = "compact-string-fix";
+  version = "0.3.2";
+  sha256 = "161z0lmrrqvy77ppdgz7m6nazcmlmy1azxa8rx0cgpqmyxzkf87n";
+  meta = {
+homepage = "http://twan.home.fmf.nl/compact-string/";;
+description = "Same as compact-string except with a small fix so it builds 
on ghc-6.12";
+license = self.stdenv.lib.licenses.bsd3;
+platforms = self.ghc.meta.platforms;
+maintainers = [
+  self.stdenv.lib.maintainers.andres
+  self.stdenv.lib.maintainers.simons
+];
+  };
+})

Added: 
nixpkgs/trunk/pkgs/development/libraries/haskell/data-binary-ieee754/default.nix
==
--- /dev/null   00:00:00 1970   (empty, because file is newly added)
+++ 
nixpkgs/trunk/pkgs/development/libraries/haskell/data-binary-ieee754/default.nix
Wed Dec 14 07:57:52 2011(r30877)
@@ -0,0 +1,20 @@
+{ cabal, binary }:
+
+cabal.mkDerivation (self: {
+  pname = "data-binary-ieee754";
+  version = "0.4.2.1";
+  sha256 = "0i0nclq8858flpp2sl3czwz6rfaykjrlzpvlfr6vlxzf8zvah9kz";
+  isLibrary = true;
+  isExecutable = true;
+  buildDepends = [ binary ];
+  meta = {
+homepage = "http://john-millikin.com/software/data-binary-ieee754/";;
+description = "Parser/Serialiser for IEEE-754 floating-point values";
+license = self.stdenv.lib.licenses.mit;
+platforms = self.ghc.meta.platforms;
+maintainers = [
+  self.stdenv.lib.maintainers.andres
+  self.stdenv.lib.maintainers.simons
+];
+  };
+})

Added: nixpkgs/trunk/pkgs/development/libraries/haskell/mongoDB/default.nix
==
--- /dev/null   00:00:00 1970   (empty, because file is newly added)
+++ nixpkgs/trunk/pkgs/development/libraries/haskell/mongoDB/default.nix
Wed Dec 14 07:57:52 2011(r30877)
@@ -0,0 +1,23 @@
+{ cabal, binary, bson, cryptohash, monadControl, mtl, network
+, parsec, random, randomShuffle
+}:
+
+cabal.mkDerivation (self: {
+  pname = "mongoDB";
+  version = "1.1.1";
+  sha256 = "0hy47kvswm4g85c3lb75fvdrcnrcbmjrhk15r1jjriwzqicgiimz";
+  buildDepends = [
+binary bson cryptohash monadControl mtl network parsec random
+randomShuffle
+  ];
+  meta = {
+homepage = "http://github.com/TonyGen/mongoDB-haskell";;
+description = "Driver (client) for MongoDB, a free, scalable, fast, 
document DBMS";
+license = "unknown";
+platforms = self.ghc.meta.platforms;
+maintainers = [
+  self.stdenv.lib.maintainers.andres
+  self.stdenv.lib.maintainers.simons
+];
+  };
+})

Modified: nixpkgs/trunk/pkgs/top-level/haskell-packages.nix
=

[Nix-dev] nixos-rebuild switch fails

2011-12-13 Thread Florian Friesdorf

Hi Peter,

nixos-rebuild switch failed for me (see below), reverting your
cryptsetup upgrade (30839) "solves" it. Anything I can do to help debug?

regards
florian


# nixos-rebuild --show-trace switch 

  
fetching list of Nix archives at 
`http://nixos.org/releases/nixpkgs/channels/nixpkgs-unstable/MANIFEST.bz2'...
  % Total% Received % Xferd  Average Speed   TimeTime Time  Current
 Dload  Upload   Total   SpentLeft  Speed
  0 00 00 0  0  0 --:--:-- --:--:-- --:--:-- 0
building Nix...
building the system configuration...
these derivations will be built:
  /nix/store/9nfqbsgiy1a8wznn95gbwx4wm0acia3z-upstart-cupsd.conf.drv
  /nix/store/9xgkmlfz5ggsm2sb3vzb0nrszqhaf3pm-udev-rules.drv
  /nix/store/c7k8maw5kd6lf9807637xrzz50j4a8q9-etc.drv
  /nix/store/c95lhyxg8yic0n07zxq749rrjdh58i72-system-path.drv
  /nix/store/d0hrp2fd8pv4yghrd5wycjyfw3zivbh4-extra-utils.drv
  /nix/store/dpqw9dfr2ca47f39pbir86iyiifdb72f-system-crontab.drv
  /nix/store/dq5cklf92yss5iyssk65nxh3s6203sgk-udev-initrd.conf.drv
  /nix/store/k9lgzyb92qq3hjy1bqxxf1mmjqbsgxpr-initrd.drv
  /nix/store/kirbn9myf1xzqnm8sswcb88ddyvggx04-nixos-manpages.drv
  /nix/store/qwizk8nic2ygdhb8rbvgj4v9sqkb3v0r-dbus-conf.drv
  /nix/store/svqdc9jf8qqn89lv93pxqwgky00cylj2-stage-1-init.sh.drv
  /nix/store/xyjdb6yvxi32lkf0amm84i50742y6rx3-system.drv
these paths will be fetched (3.97 MiB download, 12.09 MiB unpacked):
  /nix/store/2riqbznwk4gr57iaxz8dg7inb374vwhs-git-1.7.8
fetching path `/nix/store/2riqbznwk4gr57iaxz8dg7inb374vwhs-git-1.7.8'...
building path(s) `/nix/store/cagqlrdam6k6kphvnrzk29j24c2sj085-nixos-manpages'
building path(s) `/nix/store/kqkgr9kg1hfk5bpi12q3g6ipqzxmjsh4-extra-utils'
building /nix/store/cagqlrdam6k6kphvnrzk29j24c2sj085-nixos-manpages
building /nix/store/kqkgr9kg1hfk5bpi12q3g6ipqzxmjsh4-extra-utils
`/nix/store/vxycd107wjbhcj720hzkw2px7s7kr724-glibc-2.12.2/lib/ld-linux-x86-64.so.2'
 -> 
`/nix/store/kqkgr9kg1hfk5bpi12q3g6ipqzxmjsh4-extra-utils/lib/ld-linux-x86-64.so.2'
`/nix/store/vxycd107wjbhcj720hzkw2px7s7kr724-glibc-2.12.2/lib/libc.so.6' -> 
`/nix/store/kqkgr9kg1hfk5bpi12q3g6ipqzxmjsh4-extra-utils/lib/libc.so.6'
`/nix/store/vxycd107wjbhcj720hzkw2px7s7kr724-glibc-2.12.2/lib/libpthread.so.0' 
-> `/nix/store/kqkgr9kg1hfk5bpi12q3g6ipqzxmjsh4-extra-utils/lib/libpthread.so.0'
`/nix/store/vxycd107wjbhcj720hzkw2px7s7kr724-glibc-2.12.2/lib/librt.so.1' -> 
`/nix/store/kqkgr9kg1hfk5bpi12q3g6ipqzxmjsh4-extra-utils/lib/librt.so.1'
`/nix/store/vxycd107wjbhcj720hzkw2px7s7kr724-glibc-2.12.2/lib/libdl.so.2' -> 
`/nix/store/kqkgr9kg1hfk5bpi12q3g6ipqzxmjsh4-extra-utils/lib/libdl.so.2'
`/nix/store/3r8kfi33y3lbrsvlx8vzwm74h8178y35-gcc-4.5.1/lib64/libgcc_s.so.1' -> 
`/nix/store/kqkgr9kg1hfk5bpi12q3g6ipqzxmjsh4-extra-utils/lib/libgcc_s.so.1'
`/nix/store/wg33bxhbdnb9hl6asn6gxwrnzfjhdv3w-util-linux-ng-2.18/bin/mount' -> 
`/nix/store/kqkgr9kg1hfk5bpi12q3g6ipqzxmjsh4-extra-utils/bin/mount'
`/nix/store/wg33bxhbdnb9hl6asn6gxwrnzfjhdv3w-util-linux-ng-2.18/bin/umount' -> 
`/nix/store/kqkgr9kg1hfk5bpi12q3g6ipqzxmjsh4-extra-utils/bin/umount'
`/nix/store/wg33bxhbdnb9hl6asn6gxwrnzfjhdv3w-util-linux-ng-2.18/sbin/fsck' -> 
`/nix/store/kqkgr9kg1hfk5bpi12q3g6ipqzxmjsh4-extra-utils/bin/fsck'
`/nix/store/wg33bxhbdnb9hl6asn6gxwrnzfjhdv3w-util-linux-ng-2.18/sbin/switch_root'
 -> `/nix/store/kqkgr9kg1hfk5bpi12q3g6ipqzxmjsh4-extra-utils/bin/switch_root'
`/nix/store/wg33bxhbdnb9hl6asn6gxwrnzfjhdv3w-util-linux-ng-2.18/sbin/blkid' -> 
`/nix/store/kqkgr9kg1hfk5bpi12q3g6ipqzxmjsh4-extra-utils/bin/blkid'
`/nix/store/wg33bxhbdnb9hl6asn6gxwrnzfjhdv3w-util-linux-ng-2.18/lib/libblkid.so.1'
 -> `/nix/store/kqkgr9kg1hfk5bpi12q3g6ipqzxmjsh4-extra-utils/lib/libblkid.so.1'
`/nix/store/wg33bxhbdnb9hl6asn6gxwrnzfjhdv3w-util-linux-ng-2.18/lib/libblkid.so.1.1.0'
 -> 
`/nix/store/kqkgr9kg1hfk5bpi12q3g6ipqzxmjsh4-extra-utils/lib/libblkid.so.1.1.0'
`/nix/store/wg33bxhbdnb9hl6asn6gxwrnzfjhdv3w-util-linux-ng-2.18/lib/libuuid.so.1'
 -> `/nix/store/kqkgr9kg1hfk5bpi12q3g6ipqzxmjsh4-extra-utils/lib/libuuid.so.1'
`/nix/store/wg33bxhbdnb9hl6asn6gxwrnzfjhdv3w-util-linux-ng-2.18/lib/libuuid.so.1.3.0'
 -> 
`/nix/store/kqkgr9kg1hfk5bpi12q3g6ipqzxmjsh4-extra-utils/lib/libuuid.so.1.3.0'
`/nix/store/7w8b9g33z1vffv6y2swr3dbiddsrysdl-coreutils-8.7/bin/basename' -> 
`/nix/store/kqkgr9kg1hfk5bpi12q3g6ipqzxmjsh4-extra-utils/bin/basename'
`/nix/store/7w8b9g33z1vffv6y2swr3dbiddsrysdl-coreutils-8.7/bin/mkdir' -> 
`/nix/store/kqkgr9kg1hfk5bpi12q3g6ipqzxmjsh4-extra-utils/bin/mkdir'
`/nix/store/7w8b9g33z1vffv6y2swr3dbiddsrysdl-coreutils-8.7/bin/mknod' -> 
`/nix/store/kqkgr9kg1hfk5bpi12q3g6ipqzxmjsh4-extra-utils/bin/mknod'
`/nix/store/7w8b9g33z1vffv6y2swr3dbiddsrysdl-coreutils-8.7/bin/chmod' -> 
`/nix/store/kqkgr9kg1hfk5bpi12q3g6ipqzxmjsh4-extra-utils/bin/chmod'
`/nix/store/7w8b9g33z1vffv6y2swr3dbiddsrysdl-coreutils-8.7/bin/cat' -

[Nix-commits] SVN commit: nix - r30876 - nixpkgs/trunk/pkgs/os-specific/linux/kernel

2011-12-13 Thread Michael Raskin
Author: raskin
Date: Wed Dec 14 07:27:58 2011
New Revision: 30876
URL: https://nixos.org/websvn/nix/?rev=30876&sc=1

Log:
Update Linux kernel to 3.1

Modified:
   nixpkgs/trunk/pkgs/os-specific/linux/kernel/linux-3.1.nix

Modified: nixpkgs/trunk/pkgs/os-specific/linux/kernel/linux-3.1.nix
==
--- nixpkgs/trunk/pkgs/os-specific/linux/kernel/linux-3.1.nix   Tue Dec 13 
22:19:06 2011(r30875)
+++ nixpkgs/trunk/pkgs/os-specific/linux/kernel/linux-3.1.nix   Wed Dec 14 
07:27:58 2011(r30876)
@@ -215,7 +215,7 @@
 import ./generic.nix (
 
   rec {
-version = "3.1.4";
+version = "3.1.5";
 
 preConfigure = ''
   substituteInPlace scripts/depmod.sh --replace '-b "$INSTALL_MOD_PATH"' ""
@@ -223,7 +223,7 @@
   
 src = fetchurl {
   url = "mirror://kernel/linux/kernel/v3.x/linux-${version}.tar.bz2";
-  sha256 = "0wd43q1m11d4s5ab2kwnga4jvi5racqwlg4pmcp4fqim0q8jl9g6";
+  sha256 = "0wdcpfjv56r5cc67ddhprc9vhjxj2qibhp0bl96p3hbqjjpwfpl6";
 };
 
 config = configWithPlatform stdenv.platform;
___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] SVN commit: nix - r30875 - nixpkgs/trunk/pkgs/applications/version-management/fossil

2011-12-13 Thread Marco Maggesi
Author: maggesi
Date: Tue Dec 13 22:19:06 2011
New Revision: 30875
URL: https://nixos.org/websvn/nix/?rev=30875&sc=1

Log:
Update fossil to version 1.21

Modified:
   nixpkgs/trunk/pkgs/applications/version-management/fossil/default.nix

Modified: nixpkgs/trunk/pkgs/applications/version-management/fossil/default.nix
==
--- nixpkgs/trunk/pkgs/applications/version-management/fossil/default.nix   
Tue Dec 13 21:00:42 2011(r30874)
+++ nixpkgs/trunk/pkgs/applications/version-management/fossil/default.nix   
Tue Dec 13 22:19:06 2011(r30875)
@@ -1,16 +1,11 @@
 {stdenv, fetchurl, zlib, openssl, tcl, readline, sqlite}:
 
-let
-  version = "1.20";
-  filedate = "20111021125253";
-in
-
 stdenv.mkDerivation {
-  name = "fossil-${version}";
+  name = "fossil-1.21";
 
   src = fetchurl {
-url = "http://www.fossil-scm.org/download/fossil-src-${filedate}.tar.gz";;
-sha256 = "0m75kw77iray3kbjm1xfn8hr116fn11yv1wr7adcwy314cgj0vv3";
+url = http://www.fossil-scm.org/download/fossil-src-20111213135356.tar.gz;
+sha256 = "07g78sf26v7zr4qzcwky4h4zzaaz8apy33d35bhc5ax63z6md1f9";
   };
 
   buildInputs = [ zlib openssl readline sqlite ];
___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


Re: [Nix-dev] garbage collecting source (was: btrfs-progs (was: contributing to nixpkgs/nixos))

2011-12-13 Thread Marc Weber
Excerpts from Florian Friesdorf's message of Tue Dec 13 22:42:47 +0100 2011:
> How difficult would it be to have a flag to keep garbage collection from
> removing sources?

There is an option
grep for those settings in nix docs or nix code:

  gc-keep-outputs = true
  gc-keep-derivations = true

Can't look it up right now. But there you'll find everything which does
exist right now. If nothing else works: create a new derivation
depending on all sources - install than and you're done.

There are various ways.

Marc Weber
___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


Re: [Nix-dev] garbage collecting source (was: btrfs-progs (was: contributing to nixpkgs/nixos))

2011-12-13 Thread Michael Raskin
>On Tue, 13 Dec 2011 01:29:39 +0400, Michael Raskin <7c6f4...@mail.ru> wrote:
>> >Does hydra keep mirrored copies of sources around for every binary it 
>> >serves?
>> >And I guess it won't build the same package every night if no inputs
>> >change, so if sources become unavailable, won't maintainers notice?
>> 
>> Hydra keeps sources for some time, but they are not GC-pinned.
>
>How difficult would it be to have a flag to keep garbage collection from
>removing sources?
>
>I like to garbage collect, but I don't like lacking sources of installed
>things when being offline.

It is one (documented) option of Nix + realising all dependencies of the
system derivation



___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


Re: [Nix-dev] garbage collecting source (was: btrfs-progs (was: contributing to nixpkgs/nixos))

2011-12-13 Thread Florian Friesdorf
On Tue, 13 Dec 2011 01:29:39 +0400, Michael Raskin <7c6f4...@mail.ru> wrote:
> >Does hydra keep mirrored copies of sources around for every binary it serves?
> >And I guess it won't build the same package every night if no inputs
> >change, so if sources become unavailable, won't maintainers notice?
> 
> Hydra keeps sources for some time, but they are not GC-pinned.

How difficult would it be to have a flag to keep garbage collection from
removing sources?

I like to garbage collect, but I don't like lacking sources of installed
things when being offline.

-- 
Florian Friesdorf 
  GPG FPR: 7A13 5EEE 1421 9FC2 108D  BAAF 38F8 99A3 0C45 F083
Jabber/XMPP: f...@chaoflow.net
IRC: chaoflow on freenode,ircnet,blafasel,OFTC


pgptjpgmD9MKW.pgp
Description: PGP signature
___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


[Nix-commits] SVN commit: nix - r30874 - nixpkgs/trunk/pkgs/applications/science/misc/golly

2011-12-13 Thread Michael Raskin
Author: raskin
Date: Tue Dec 13 21:00:42 2011
New Revision: 30874
URL: https://nixos.org/websvn/nix/?rev=30874&sc=1

Log:
Update Golly

Deleted:
   nixpkgs/trunk/pkgs/applications/science/misc/golly/make-install.make
Modified:
   nixpkgs/trunk/pkgs/applications/science/misc/golly/default.nix
   nixpkgs/trunk/pkgs/applications/science/misc/golly/src-for-default.nix
   nixpkgs/trunk/pkgs/applications/science/misc/golly/src-info-for-default.nix

Modified: nixpkgs/trunk/pkgs/applications/science/misc/golly/default.nix
==
--- nixpkgs/trunk/pkgs/applications/science/misc/golly/default.nix  Tue Dec 
13 21:00:26 2011(r30873)
+++ nixpkgs/trunk/pkgs/applications/science/misc/golly/default.nix  Tue Dec 
13 21:00:42 2011(r30874)
@@ -17,7 +17,7 @@
   inherit buildInputs;
 
   /* doConfigure should be removed if not needed */
-  phaseNames = ["setVars" "doMake" "doDeploy"];
+  phaseNames = ["setVars" "doConfigure" "doMakeInstall"];
   setVars = a.noDepEntry ''
 export NIX_LDFLAGS="$NIX_LDFLAGS -lperl -L$(echo 
"${perl}"/lib/perl5/5*/*/CORE)"
 pythonLib="$(echo "${python}"/lib/libpython*.so)"
@@ -26,14 +26,6 @@
 export NIX_LDFLAGS="$NIX_LDFLAGS -l$pythonLib"
 echo "Flags: $NIX_LDFLAGS"
   '';
-  goSrcDir = ''cd */'';
-  makeFlags = [
-"-f makefile-gtk"
-];
-  doDeploy = a.fullDepEntry ''
-cat < ${./make-install.make}  >> makefile-gtk
-make -f makefile-gtk out="$out" install
-  '' ["minInit" "doMake" "defEnsureDir"];
   
   meta = {
 description = "Cellular automata simulation program";

Modified: nixpkgs/trunk/pkgs/applications/science/misc/golly/src-for-default.nix
==
--- nixpkgs/trunk/pkgs/applications/science/misc/golly/src-for-default.nix  
Tue Dec 13 21:00:26 2011(r30873)
+++ nixpkgs/trunk/pkgs/applications/science/misc/golly/src-for-default.nix  
Tue Dec 13 21:00:42 2011(r30874)
@@ -1,9 +1,9 @@
 rec {
-   version="2.1-src";
-   name="golly-2.1-src";
-   hash="0m9sz0b7pwsxpgvscdvab2q8qnncr337gg3anzgzw83z5zyn3rdz";
-   
url="http://downloads.sourceforge.net/project/golly/golly/golly-2.1/golly-2.1-src.tar.gz";;
-   
advertisedUrl="http://downloads.sourceforge.net/project/golly/golly/golly-2.1/golly-2.1-src.tar.gz";;
+   version="2.3-src";
+   name="golly-2.3-src";
+   hash="12r1lrrn4c1kafzvz5mmfq3750smqv5dwl1xpj3753h0rl9a9gx1";
+   
url="http://downloads.sourceforge.net/project/golly/golly/golly-2.3/golly-2.3-src.tar.gz";;
+   
advertisedUrl="http://downloads.sourceforge.net/project/golly/golly/golly-2.3/golly-2.3-src.tar.gz";;
   
   
 }

Modified: 
nixpkgs/trunk/pkgs/applications/science/misc/golly/src-info-for-default.nix
==
--- nixpkgs/trunk/pkgs/applications/science/misc/golly/src-info-for-default.nix 
Tue Dec 13 21:00:26 2011(r30873)
+++ nixpkgs/trunk/pkgs/applications/science/misc/golly/src-info-for-default.nix 
Tue Dec 13 21:00:42 2011(r30874)
@@ -1,4 +1,5 @@
 {
-  downloadPage = "http://sourceforge.net/projects/golly/files/";;
-  method="fetchSF";
+  downloadPage = "http://sourceforge.net/projects/golly/files/golly";;
+  method="fetchSFdirs";
+  fileSuffix="-src.tar.gz";
 }
___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] SVN commit: nix - r30873 - nixpkgs/trunk/pkgs/build-support/upstream-updater

2011-12-13 Thread Michael Raskin
Author: raskin
Date: Tue Dec 13 21:00:26 2011
New Revision: 30873
URL: https://nixos.org/websvn/nix/?rev=30873&sc=1

Log:
Dir-per-version SF layout seems to be more relevant now

Modified:
   nixpkgs/trunk/pkgs/build-support/upstream-updater/update-upstream-data.sh

Modified: 
nixpkgs/trunk/pkgs/build-support/upstream-updater/update-upstream-data.sh
==
--- nixpkgs/trunk/pkgs/build-support/upstream-updater/update-upstream-data.sh   
Tue Dec 13 18:53:40 2011(r30872)
+++ nixpkgs/trunk/pkgs/build-support/upstream-updater/update-upstream-data.sh   
Tue Dec 13 21:00:26 2011(r30873)
@@ -36,6 +36,42 @@
 commonPrefetchVars=" version name hash"
 
 prefetchClause=""
+[ fetchSFdirs = "$method" ] && {
+if [ -z "$forcedUrl" ]; then 
+   freshUrl="$("$own_dir"/urls-from-page.sh "$(getAttr downloadPage)" |
+  eval "egrep '$(getAttr sourceRegexp '[-][0-9.]+/$')'" | 
+ eval "egrep -v '$(getAttr blacklistRegexp '^$')'" |
+ eval "$(getAttr choiceCommand 'head -n 1')" |
+ eval "$(getAttr versionToFileCommand "sed -re 
's@/([^/]*-[0-9.]+)/@/\1/\1$(getAttr fileSuffix .tar.gz)@'")" 
+   )"
+
+   if ! egrep ':' <<< "$freshUrl" ; then 
+   freshUrl="$(dirname "$(getAttr downloadPage).")/$freshUrl"
+   fi
+
+   echo "Found download link: $freshUrl" >&2
+else
+freshUrl="$forcedUrl"
+fi
+
+freshUrl="$(echo "$freshUrl" | sed -re "$skipRedirectSF")"
+echo "Sourceforge-corrected URL: $freshUrl" >&2
+
+version="$(echo "$freshUrl" | 
+  sed -re "$(getAttr versionExtractorSedScript "$extractVersionSF")")"
+baseName="$(getAttr baseName "$(echo "$freshUrl" | sed -re 
's@.*/project/([^/]+)/.*@\1@')")"
+url="$freshUrl"
+name="$baseName-$version"
+advertisedUrl="$freshUrl"
+
+if [ x"$freshUrl" = x"$(cat "$src_defs_dir"/advertisedUrl)" ]; then
+echo "Source link not changed" >&2
+exit
+fi
+hash=$(nix-prefetch-url "$freshUrl")
+
+prefetchVars="url advertisedUrl";
+}
 [ fetchSF = "$method" ] && {
 if [ -z "$forcedUrl" ]; then 
freshUrl="$("$own_dir"/urls-from-page.sh "$(getAttr downloadPage)" |
___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] Hydra job nixpkgs:trunk:tarball build 1610259: Success

2011-12-13 Thread Hydra Build Daemon
Hi,

This is to let you know that Hydra build 1610259 of job nixpkgs:trunk:tarball 
has changed from 'Failed with non-zero exit code' to 'Success'.

Complete build information can be found on this page: 
http://hydra.nixos.org/build/1610259

A summary of the build information follows:

Build ID:  | 1610259
Nix name:  | nixpkgs-tarball-0pre30872
Short description: | Build of a source distribution from a checkout
Maintainer(s): | Nix Committers 
System:| x86_64-linux
Derivation store path: | 
/nix/store/jplpf3gpn0y6whwnr5fsvflhzdf4l0qa-nixpkgs-tarball-0pre30872.drv
Output store path: | 
/nix/store/rd8kwm8ijbarzjrmzdnmi142n3az40n8-nixpkgs-tarball-0pre30872
Time added:| 2011-12-13 20:04:59
Build started: | 2011-12-13 20:02:46
Build finished:| 2011-12-13 20:04:59
Duration:  | 133s

The build inputs were:

Name| Type| Value
+-+
nixpkgs | svn | https://nixos.org/repos/nix/nixpkgs/trunk:30872
officialRelease | boolean | false

Regards,

The Hydra build daemon.
___
nix-commits mailing list
nix-comm...@cs.uu.nl
http://mail.cs.uu.nl/mailman/listinfo/nix-commits


Re: [Nix-dev] SVN commit: nix -r30864-nixpkgs/trunk/pkgs/tools/filesystems/btrfsprogs

2011-12-13 Thread Michael Raskin
<8739coibtw@write-only.cryp.to>
<87ty54ict9@write-only.cryp.to>
)
Mime-Version: 1.0
Content-type: text/plain; charset="UTF-8"

>No, unfortunately not:
>
>  # env -i PATH=/var/run/current-system/sw/bin nix-instantiate 
> /etc/nixos/nixpkgs/ -A btrfsProgs
>  error: undefined variable `attr'
>  (use `--show-trace' to show detailed location information)

Oops. Found an uncommitted change. Thanks



___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


[Nix-commits] SVN commit: nix - r30872 - nixpkgs/trunk/pkgs/top-level

2011-12-13 Thread Michael Raskin
Author: raskin
Date: Tue Dec 13 18:53:40 2011
New Revision: 30872
URL: https://nixos.org/websvn/nix/?rev=30872&sc=1

Log:
Oops, forgot to commit

Modified:
   nixpkgs/trunk/pkgs/top-level/all-packages.nix

Modified: nixpkgs/trunk/pkgs/top-level/all-packages.nix
==
--- nixpkgs/trunk/pkgs/top-level/all-packages.nix   Tue Dec 13 18:13:45 
2011(r30871)
+++ nixpkgs/trunk/pkgs/top-level/all-packages.nix   Tue Dec 13 18:53:40 
2011(r30872)
@@ -419,7 +419,7 @@
   bootchart = callPackage ../tools/system/bootchart { };
 
   btrfsProgs = builderDefsPackage (import ../tools/filesystems/btrfsprogs) {
-inherit libuuid zlib acl;
+inherit libuuid zlib acl attr fetchgit;
   };
 
   catdoc = callPackage ../tools/text/catdoc { };
___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


Re: [Nix-dev] SVN commit: nix - r30864-nixpkgs/trunk/pkgs/tools/filesystems/btrfsprogs

2011-12-13 Thread Peter Simons
Hi Michael,

 > env -i PATH=/var/run/current-system/sw/bin nix-instantiate 
 > /etc/nixos/nixpkgs/ -A btrfsProgs
 >
 > It succeeds on my nixpkgs SVN trunk HEAD checkout on x86_64.
 >
 > Does the exact same command work for you?

No, unfortunately not:

  # env -i PATH=/var/run/current-system/sw/bin nix-instantiate 
/etc/nixos/nixpkgs/ -A btrfsProgs
  error: undefined variable `attr'
  (use `--show-trace' to show detailed location information)

Hydra seems to have the same problem:

  http://hydra.nixos.org/build/1608747

Take care,
Peter

___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


Re: [Nix-dev] SVN commit: nix - r30864-nixpkgs/trunk/pkgs/tools/filesystems/btrfsprogs

2011-12-13 Thread Michael Raskin
<87ty54ict9@write-only.cryp.to>
<20111213043050.c780a108c...@mx3.tudelft.nl>
)
Mime-Version: 1.0
Content-type: text/plain; charset="UTF-8"

> > What is your system arch and nixpkgs.config ?
>
>I use x86_64-linux, and nixpkgs.config is empty.
>
>I hope this helps,

env -i PATH=/var/run/current-system/sw/bin nix-instantiate /etc/nixos/nixpkgs/ 
-A btrfsProgs

It succeeds on my nixpkgs SVN trunk HEAD checkout on x86_64.

Does the exact same command work for you?



___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


[Nix-commits] SVN commit: nix - r30871 - nixpkgs/branches/stdenv-updates/pkgs/development/tools/misc/binutils

2011-12-13 Thread Shea Levy
Author: shlevy
Date: Tue Dec 13 18:13:45 2011
New Revision: 30871
URL: https://nixos.org/websvn/nix/?rev=30871&sc=1

Log:
The GPL issue does not apply to this version of binutils

Modified:
   
nixpkgs/branches/stdenv-updates/pkgs/development/tools/misc/binutils/default.nix

Modified: 
nixpkgs/branches/stdenv-updates/pkgs/development/tools/misc/binutils/default.nix
==
--- 
nixpkgs/branches/stdenv-updates/pkgs/development/tools/misc/binutils/default.nix
Tue Dec 13 16:47:29 2011(r30870)
+++ 
nixpkgs/branches/stdenv-updates/pkgs/development/tools/misc/binutils/default.nix
Tue Dec 13 18:13:45 2011(r30871)
@@ -4,22 +4,6 @@
 stdenv.mkDerivation rec {
   name = basename + stdenv.lib.optionalString (cross != null) 
"-${cross.config}";
 
-  # WARNING: Upstream made a mistake in packaging that may mean anyone
-  # but the FSF hosting this tarball is accidentally in violation of
-  # the GPL. We can't update binutils until the next stdenv-updates,
-  # so we are stuck with this version. The issue is discussed in
-  # this email: http://sourceware.org/ml/binutils/2011-08/msg00198.html
-  # The tarball for this minor version will not be fixed, as only the
-  # tarballs for the latest minor version of each major version will
-  # be repackaged. The fixed sources for the closest version to this one
-  # can be found at mirror://gnu/binutils/binutils-2.21.1a.tar.bz2
-  # or http://ftp.gnu.org/gnu/binutils/binutils-2.21.1a.tar.bz2
-  # The sources missing from this tarball come from cgen. It is unclear
-  # WHICH sources should be included, but the cvs tree can be checked out
-  # by:
-  # cvs -z 9 -d :pserver:anon...@sourceware.org:/cvs/src login
-  # {enter "anoncvs" as the password}
-  # cvs -z 9 -d :pserver:anon...@sourceware.org:/cvs/src co cgen
   src = fetchurl {
 url = "mirror://gnu/binutils/${basename}.tar.bz2";
 sha256 = "0m7nmd7gc9d9md43wbrv65hz6lbi2crqwryzpigv19ray1lzmv6d";
___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


Re: [Nix-dev] SVN commit: nix - r30864 -nixpkgs/trunk/pkgs/tools/filesystems/btrfsprogs

2011-12-13 Thread Peter Simons
Hi Michael,

 > What is your system arch and nixpkgs.config ?

I use x86_64-linux, and nixpkgs.config is empty.

I hope this helps,
Peter

___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


Re: [Nix-dev] SVN commit: nix - r30864 -nixpkgs/trunk/pkgs/tools/filesystems/btrfsprogs

2011-12-13 Thread Michael Raskin
>Hi Michael,
>
> > Author: raskin
> > Date: Tue Dec 13 04:30:49 2011
> > New Revision: 30864
> > URL: https://nixos.org/websvn/nix/?rev=30864&sc=1
> >
> > Log:
> > Update BtrFS utilities to latest Git
>
>it seems that this change broke nixos-rebuild on my system:

Seems very strange. Works for me. What is your system arch and 
nixpkgs.config ?

> | [root@peti:~]# nixos-rebuild dry-run --no-pull --show-trace
> | building Nix...
> | building the system configuration...
> | error: while evaluating the builtin function `derivationStrict':
> | while instantiating the derivation named `system' at 
> `/etc/nixos/nixos/modules/system/activation/top-level.nix:146:5':
> | while evaluating the derivation attribute `buildCommand' at 
> `/etc/nixos/nixos/modules/system/activation/top-level.nix:147:5':
> | while evaluating the builtin function `derivationStrict':
> | while instantiating the derivation named `etc' at 
> `/etc/nixos/nixos/modules/system/etc/etc.nix:29:5':
> | while evaluating the derivation attribute `sources' at 
> `/etc/nixos/nixos/modules/system/etc/etc.nix:34:5':
> | while evaluating the builtin function `derivationStrict':
> | while instantiating the derivation named `upstart-cupsd.conf' at 
> `/etc/nixos/nixpkgs/pkgs/build-support/trivial-builders.nix:10:14':
> | while evaluating the derivation attribute `jobText' at 
> `/etc/nixos/nixos/modules/system/upstart/upstart.nix:113:43':
> | while evaluating the function at 
> `/etc/nixos/nixpkgs/pkgs/lib/strings.nix:40:28':
> ...
> | while evaluating the function at 
> `/etc/nixos/nixpkgs/pkgs/lib/lists.nix:17:19':
> | while evaluating the function at 
> `/etc/nixos/nixpkgs/pkgs/lib/strings.nix:14:32':
> | while evaluating the builtin function `head':
> | while evaluating the function at 
> `/etc/nixos/nixpkgs/pkgs/lib/strings.nix:41:32':
> | while evaluating the builtin function `derivationStrict':
> | while instantiating the derivation named `system-path' at 
> `/etc/nixos/nixpkgs/pkgs/build-support/trivial-builders.nix:10:14':
> | while evaluating the derivation attribute `paths' at 
> `/etc/nixos/nixpkgs/pkgs/build-support/buildenv/default.nix:29:12':
> | while evaluating the builtin function `derivationStrict':
> | while instantiating the derivation named `btrfs-progs-0.19' at 
> `/etc/nixos/nixpkgs/pkgs/build-support/builder-defs/builder-defs.nix:509:30':
> | while evaluating the derivation attribute `buildCommand' at 
> `/etc/nixos/nixpkgs/pkgs/build-support/builder-defs/builder-defs.nix:510:11':
> | while evaluating the function at 
> `/etc/nixos/nixpkgs/pkgs/build-support/builder-defs/builder-defs.nix:429:26':
> | while evaluating the function at 
> `/etc/nixos/nixpkgs/pkgs/lib/strings-with-deps.nix:69:35':
> | while evaluating the function at 
> `/etc/nixos/nixpkgs/pkgs/lib/strings.nix:33:33':
> ...
> | while evaluating the function at 
> `/etc/nixos/nixpkgs/pkgs/lib/lists.nix:17:19':
> | while evaluating the function at 
> `/etc/nixos/nixpkgs/pkgs/lib/strings.nix:14:32':
> | while evaluating the builtin function `head':
> | while evaluating the function at 
> `/etc/nixos/nixpkgs/pkgs/build-support/builder-defs/builder-defs.nix:428:20':
> | while evaluating the attribute `text' at 
> `/etc/nixos/nixpkgs/pkgs/lib/strings-with-deps.nix:73:38':
> | while evaluating the builtin function `toString':
> | while evaluating the function at 
> `/etc/nixos/nixpkgs/pkgs/lib/misc.nix:228:22':
> | while evaluating the function at 
> `/etc/nixos/nixpkgs/pkgs/lib/misc.nix:162:14':
> | while evaluating the function at 
> `/etc/nixos/nixpkgs/pkgs/lib/misc.nix:217:34':
> | while evaluating the function at 
> `/etc/nixos/nixpkgs/pkgs/lib/attrsets.nix:19:35':
> | while evaluating the function at 
> `/etc/nixos/nixpkgs/pkgs/lib/attrsets.nix:41:16':
> | while evaluating the builtin function `getAttr':
> | undefined variable `attr'



___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


Re: [Nix-dev] SVN commit: nix - r30864 - nixpkgs/trunk/pkgs/tools/filesystems/btrfsprogs

2011-12-13 Thread Peter Simons
Hi Michael,

 > Author: raskin
 > Date: Tue Dec 13 04:30:49 2011
 > New Revision: 30864
 > URL: https://nixos.org/websvn/nix/?rev=30864&sc=1
 >
 > Log:
 > Update BtrFS utilities to latest Git

it seems that this change broke nixos-rebuild on my system:

 | [root@peti:~]# nixos-rebuild dry-run --no-pull --show-trace
 | building Nix...
 | building the system configuration...
 | error: while evaluating the builtin function `derivationStrict':
 | while instantiating the derivation named `system' at 
`/etc/nixos/nixos/modules/system/activation/top-level.nix:146:5':
 | while evaluating the derivation attribute `buildCommand' at 
`/etc/nixos/nixos/modules/system/activation/top-level.nix:147:5':
 | while evaluating the builtin function `derivationStrict':
 | while instantiating the derivation named `etc' at 
`/etc/nixos/nixos/modules/system/etc/etc.nix:29:5':
 | while evaluating the derivation attribute `sources' at 
`/etc/nixos/nixos/modules/system/etc/etc.nix:34:5':
 | while evaluating the builtin function `derivationStrict':
 | while instantiating the derivation named `upstart-cupsd.conf' at 
`/etc/nixos/nixpkgs/pkgs/build-support/trivial-builders.nix:10:14':
 | while evaluating the derivation attribute `jobText' at 
`/etc/nixos/nixos/modules/system/upstart/upstart.nix:113:43':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/strings.nix:40:28':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/strings.nix:33:33':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/lists.nix:17:19':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/strings.nix:14:32':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/lists.nix:17:19':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/strings.nix:14:32':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/lists.nix:17:19':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/strings.nix:14:32':
 | while evaluating the builtin function `head':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/strings.nix:41:32':
 | while evaluating the builtin function `derivationStrict':
 | while instantiating the derivation named `system-path' at 
`/etc/nixos/nixpkgs/pkgs/build-support/trivial-builders.nix:10:14':
 | while evaluating the derivation attribute `paths' at 
`/etc/nixos/nixpkgs/pkgs/build-support/buildenv/default.nix:29:12':
 | while evaluating the builtin function `derivationStrict':
 | while instantiating the derivation named `btrfs-progs-0.19' at 
`/etc/nixos/nixpkgs/pkgs/build-support/builder-defs/builder-defs.nix:509:30':
 | while evaluating the derivation attribute `buildCommand' at 
`/etc/nixos/nixpkgs/pkgs/build-support/builder-defs/builder-defs.nix:510:11':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/build-support/builder-defs/builder-defs.nix:429:26':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/strings-with-deps.nix:69:35':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/strings.nix:33:33':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/lists.nix:17:19':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/strings.nix:14:32':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/lists.nix:17:19':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/strings.nix:14:32':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/lists.nix:17:19':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/strings.nix:14:32':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/lists.nix:17:19':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/strings.nix:14:32':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/lists.nix:17:19':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/strings.nix:14:32':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/lists.nix:17:19':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/strings.nix:14:32':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/lists.nix:17:19':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/strings.nix:14:32':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/lists.nix:17:19':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/strings.nix:14:32':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/lists.nix:17:19':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/strings.nix:14:32':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/lists.nix:17:19':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/strings.nix:14:32':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/lists.nix:17:19':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/pkgs/lib/strings.nix:14:32':
 | while evaluating the function at 
`/etc/nixos/nixpkgs/

[Nix-commits] SVN commit: nix - r30870 - nixpkgs/branches/stdenv-updates/pkgs/development/tools/misc/binutils

2011-12-13 Thread Eelco Dolstra
Author: eelco
Date: Tue Dec 13 16:47:29 2011
New Revision: 30870
URL: https://nixos.org/websvn/nix/?rev=30870&sc=1

Log:
* Revert to binutils 2.21.1.  Binutils 2.22 changes the default
  handling of dynamic libraries from --copy-dt-needed-entries to
  --no-copy-dt-needed-entries, which breaks stuff (e.g. GCC, see
  http://hydra.nixos.org/build/1608471).  So stick with 2.21.1 for
  now.

Modified:
   
nixpkgs/branches/stdenv-updates/pkgs/development/tools/misc/binutils/default.nix

Modified: 
nixpkgs/branches/stdenv-updates/pkgs/development/tools/misc/binutils/default.nix
==
--- 
nixpkgs/branches/stdenv-updates/pkgs/development/tools/misc/binutils/default.nix
Tue Dec 13 16:11:02 2011(r30869)
+++ 
nixpkgs/branches/stdenv-updates/pkgs/development/tools/misc/binutils/default.nix
Tue Dec 13 16:47:29 2011(r30870)
@@ -1,13 +1,28 @@
 { stdenv, fetchurl, noSysDirs, zlib, cross ? null, gold ? false, bison ? null, 
flex2535 ? null, bc ? null, dejagnu ? null }:
 
-let basename = "binutils-2.22"; in
-
+let basename = "binutils-2.21.1a"; in
 stdenv.mkDerivation rec {
   name = basename + stdenv.lib.optionalString (cross != null) 
"-${cross.config}";
 
+  # WARNING: Upstream made a mistake in packaging that may mean anyone
+  # but the FSF hosting this tarball is accidentally in violation of
+  # the GPL. We can't update binutils until the next stdenv-updates,
+  # so we are stuck with this version. The issue is discussed in
+  # this email: http://sourceware.org/ml/binutils/2011-08/msg00198.html
+  # The tarball for this minor version will not be fixed, as only the
+  # tarballs for the latest minor version of each major version will
+  # be repackaged. The fixed sources for the closest version to this one
+  # can be found at mirror://gnu/binutils/binutils-2.21.1a.tar.bz2
+  # or http://ftp.gnu.org/gnu/binutils/binutils-2.21.1a.tar.bz2
+  # The sources missing from this tarball come from cgen. It is unclear
+  # WHICH sources should be included, but the cvs tree can be checked out
+  # by:
+  # cvs -z 9 -d :pserver:anon...@sourceware.org:/cvs/src login
+  # {enter "anoncvs" as the password}
+  # cvs -z 9 -d :pserver:anon...@sourceware.org:/cvs/src co cgen
   src = fetchurl {
 url = "mirror://gnu/binutils/${basename}.tar.bz2";
-sha256 = "1a9w66v5dwvbnawshjwqcgz7km6kw6ihkzp6sswv9ycc3knzhykc";
+sha256 = "0m7nmd7gc9d9md43wbrv65hz6lbi2crqwryzpigv19ray1lzmv6d";
   };
 
   patches = [
___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] SVN commit: nix - r30869 - nixpkgs/trunk/maintainers/scripts/gnu

2011-12-13 Thread Ludovic Courtès
Author: ludo
Date: Tue Dec 13 16:11:02 2011
New Revision: 30869
URL: https://nixos.org/websvn/nix/?rev=30869&sc=1

Log:
gnupdate: Really select `stdenv' packages when asked for it.

* maintainers/scripts/gnu/gnupdate (gnupdate)[selected-gnu-packages]:
  Really limit to `stdenv' when ask for it.

Modified:
   nixpkgs/trunk/maintainers/scripts/gnu/gnupdate

Modified: nixpkgs/trunk/maintainers/scripts/gnu/gnupdate
==
--- nixpkgs/trunk/maintainers/scripts/gnu/gnupdate  Tue Dec 13 16:09:48 
2011(r30868)
+++ nixpkgs/trunk/maintainers/scripts/gnu/gnupdate  Tue Dec 13 16:11:02 
2011(r30869)
@@ -1065,7 +1065,10 @@
 
 (case selection
   ((stdenv)
-   gnu)
+   (filter (lambda (p)
+ (member (package-source-output-path p)
+ (force stdenv)))
+   gnu))
   ((non-stdenv)
(filter (lambda (p)
  (not (member (package-source-output-path p)
___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] SVN commit: nix - r30868 - nixpkgs/branches/stdenv-updates/pkgs/tools/text/gnugrep

2011-12-13 Thread Ludovic Courtès
Author: ludo
Date: Tue Dec 13 16:09:48 2011
New Revision: 30868
URL: https://nixos.org/websvn/nix/?rev=30868&sc=1

Log:
GNU grep 2.10.

Modified:
   nixpkgs/branches/stdenv-updates/pkgs/tools/text/gnugrep/default.nix

Modified: nixpkgs/branches/stdenv-updates/pkgs/tools/text/gnugrep/default.nix
==
--- nixpkgs/branches/stdenv-updates/pkgs/tools/text/gnugrep/default.nix Tue Dec 
13 14:54:15 2011(r30867)
+++ nixpkgs/branches/stdenv-updates/pkgs/tools/text/gnugrep/default.nix Tue Dec 
13 16:09:48 2011(r30868)
@@ -1,13 +1,13 @@
 { stdenv, fetchurl, pcre, libiconv ? null}:
 
-let version = "2.9"; in
+let version = "2.10"; in
 
 stdenv.mkDerivation ({
   name = "gnugrep-${version}";
 
   src = fetchurl {
-url = "mirror://gnu/grep/grep-${version}.tar.gz";
-sha256 = "0w3r6m597p3qgfj6jj1nsggkwr5p38v6cxasfa8i3izcfan8w4g9";
+url = "mirror://gnu/grep/grep-${version}.tar.xz";
+sha256 = "1cvsqyfzk1p38fcaav22dn76fkd02g7bjnqna6vrpk9vy9rnfybc";
   };
 
   buildInputs = [ pcre ]
___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] SVN commit: nix - r30867 - nixpkgs/trunk/pkgs/tools/networking/wicd

2011-12-13 Thread Ludovic Courtès
Author: ludo
Date: Tue Dec 13 14:54:15 2011
New Revision: 30867
URL: https://nixos.org/websvn/nix/?rev=30867&sc=1

Log:
Wicd: Protect the password in the WPA2-TTLS template.

Modified:
   nixpkgs/trunk/pkgs/tools/networking/wicd/wpa2-ttls

Modified: nixpkgs/trunk/pkgs/tools/networking/wicd/wpa2-ttls
==
--- nixpkgs/trunk/pkgs/tools/networking/wicd/wpa2-ttls  Tue Dec 13 12:57:32 
2011(r30866)
+++ nixpkgs/trunk/pkgs/tools/networking/wicd/wpa2-ttls  Tue Dec 13 14:54:15 
2011(r30867)
@@ -2,6 +2,7 @@
 author = various contributors
 version = 1
 require identity *Identity anonymous_identity *Anonymous_identity password 
*Password ca_cert *Path_to_CA_Cert
+protected password *Password
 -
 ctrl_interface=/var/run/wpa_supplicant
 network={
___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] SVN commit: nix - r30866 - in nixpkgs/branches/stdenv-updates/pkgs: build-support/vm os-specific/linux/hal os-specific/linux/nfs-utils os-specific/linux/pmount tools/misc/parted

2011-12-13 Thread Eelco Dolstra
Author: eelco
Date: Tue Dec 13 12:57:32 2011
New Revision: 30866
URL: https://nixos.org/websvn/nix/?rev=30866&sc=1

Log:
* Forgot a few utillinuxng references.

Modified:
   nixpkgs/branches/stdenv-updates/pkgs/build-support/vm/default.nix
   nixpkgs/branches/stdenv-updates/pkgs/os-specific/linux/hal/default.nix
   nixpkgs/branches/stdenv-updates/pkgs/os-specific/linux/nfs-utils/default.nix
   nixpkgs/branches/stdenv-updates/pkgs/os-specific/linux/pmount/default.nix
   nixpkgs/branches/stdenv-updates/pkgs/tools/misc/parted/2.3.nix
   nixpkgs/branches/stdenv-updates/pkgs/tools/misc/parted/default.nix

Modified: nixpkgs/branches/stdenv-updates/pkgs/build-support/vm/default.nix
==
--- nixpkgs/branches/stdenv-updates/pkgs/build-support/vm/default.nix   Tue Dec 
13 12:43:11 2011(r30865)
+++ nixpkgs/branches/stdenv-updates/pkgs/build-support/vm/default.nix   Tue Dec 
13 12:57:32 2011(r30866)
@@ -351,7 +351,7 @@
 with pkgs; runInLinuxVM (
 stdenv.mkDerivation {
   name = "extract-file";
-  buildInputs = [utillinuxng];
+  buildInputs = [ utillinux ];
   buildCommand = ''
 ln -s ${linux}/lib /lib
 ${module_init_tools}/sbin/modprobe loop
@@ -376,7 +376,7 @@
 with pkgs; runInLinuxVM (
 stdenv.mkDerivation {
   name = "extract-file-mtd";
-  buildInputs = [utillinuxng mtdutils];
+  buildInputs = [ utillinux mtdutils ];
   buildCommand = ''
 ln -s ${linux}/lib /lib
 ${module_init_tools}/sbin/modprobe mtd

Modified: nixpkgs/branches/stdenv-updates/pkgs/os-specific/linux/hal/default.nix
==
--- nixpkgs/branches/stdenv-updates/pkgs/os-specific/linux/hal/default.nix  
Tue Dec 13 12:43:11 2011(r30865)
+++ nixpkgs/branches/stdenv-updates/pkgs/os-specific/linux/hal/default.nix  
Tue Dec 13 12:57:32 2011(r30866)
@@ -1,7 +1,7 @@
 { stdenv, fetchurl, pkgconfig, python, pciutils, expat
 , libusb, dbus, dbus_glib, glib, libuuid, perl
 , perlXMLParser, gettext, zlib, gperf, consolekit, policykit
-, libsmbios, dmidecode, udev, utillinuxng, pmutils, usbutils
+, libsmbios, dmidecode, udev, utillinux, pmutils, usbutils
 , eject, upstart
 }:
 
@@ -51,8 +51,8 @@
   substituteInPlace $i \
 ${changeDmidecode} \
 ${if udev != null then "--replace /sbin/udevadm ${udev}/sbin/udevadm" 
else ""} \
---replace /bin/mount ${utillinuxng}/bin/mount \
---replace /bin/umount ${utillinuxng}/bin/umount \
+--replace /bin/mount ${utillinux}/bin/mount \
+--replace /bin/umount ${utillinux}/bin/umount \
 --replace /usr/bin/pm-is-supported ${pmutils}/bin/pm-is-supported \
 --replace /usr/sbin/pm ${pmutils}/sbin/pm \
 --replace /sbin/shutdown ${upstart}/sbin/shutdown

Modified: 
nixpkgs/branches/stdenv-updates/pkgs/os-specific/linux/nfs-utils/default.nix
==
--- 
nixpkgs/branches/stdenv-updates/pkgs/os-specific/linux/nfs-utils/default.nix
Tue Dec 13 12:43:11 2011(r30865)
+++ 
nixpkgs/branches/stdenv-updates/pkgs/os-specific/linux/nfs-utils/default.nix
Tue Dec 13 12:57:32 2011(r30866)
@@ -1,4 +1,4 @@
-{ fetchurl, stdenv, tcpWrapper, utillinuxng, libcap }:
+{ fetchurl, stdenv, tcpWrapper, utillinux, libcap }:
 
 stdenv.mkDerivation rec {
   name = "nfs-utils-1.2.3";
@@ -9,7 +9,7 @@
   };
 
   # Needs `libblkid' and `libcomerr' from `e2fsprogs' or `util-linux-ng'.
-  buildInputs = [ tcpWrapper utillinuxng libcap ];
+  buildInputs = [ tcpWrapper utillinux libcap ];
 
   # FIXME: Add the dependencies needed for NFSv4 and TI-RPC.
   configureFlags =

Modified: 
nixpkgs/branches/stdenv-updates/pkgs/os-specific/linux/pmount/default.nix
==
--- nixpkgs/branches/stdenv-updates/pkgs/os-specific/linux/pmount/default.nix   
Tue Dec 13 12:43:11 2011(r30865)
+++ nixpkgs/branches/stdenv-updates/pkgs/os-specific/linux/pmount/default.nix   
Tue Dec 13 12:57:32 2011(r30866)
@@ -1,4 +1,4 @@
-{stdenv, fetchurl, cryptsetup, dbus, dbus_glib, hal, intltool, ntfs3g, 
utillinuxng
+{ stdenv, fetchurl, cryptsetup, dbus, dbus_glib, hal, intltool, ntfs3g, 
utillinux
 , mediaDir ? "/media/"
 , lockDir ? "/var/lock/pmount"
 , whiteList ? "/etc/pmount.allow"
@@ -15,14 +15,14 @@
 sha256 = 
"db38fc290b710e8e9e9d442da2fb627d41e13b3ee80326c15cc2595ba00ea036";
   };
 
-  buildInputs = [ hal intltool utillinuxng ];
+  buildInputs = [ hal intltool utillinux ];
 
   configureFlags = ""
   + " --with-media-dir=${mediaDir}"
   + " --with-lock-dir=${lockDir}"
   + " --with-whitelist=${whiteList}"
-  + " --with-mount-prog=${utillinuxng}/bin/mount"
-  + " --with-umount-prog=${utillinuxng}/bin/umount"
+  + " --with-mount-prog=${utillinux}/bin/mount"
+  + " --with-umoun

[Nix-commits] SVN commit: nix - r30865 - nixpkgs/trunk/pkgs/servers/xinetd

2011-12-13 Thread Eelco Dolstra
Author: eelco
Date: Tue Dec 13 12:43:11 2011
New Revision: 30865
URL: https://nixos.org/websvn/nix/?rev=30865&sc=1

Log:
* Add xinetd to the channel.

Modified:
   nixpkgs/trunk/pkgs/servers/xinetd/default.nix

Modified: nixpkgs/trunk/pkgs/servers/xinetd/default.nix
==
--- nixpkgs/trunk/pkgs/servers/xinetd/default.nix   Tue Dec 13 04:30:49 
2011(r30864)
+++ nixpkgs/trunk/pkgs/servers/xinetd/default.nix   Tue Dec 13 12:43:11 
2011(r30865)
@@ -10,6 +10,7 @@
 
   meta = {
 description = "Secure replacement for inetd";
+platforms = stdenv.lib.platforms.linux;
 homepage = http://xinetd.org;
 license = "free";
   };
___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


Re: [Nix-dev] Sharing the Nix store between systems

2011-12-13 Thread Rickard Nilsson
Den 2011-12-13 09:20:32 skrev Lluís Batlle i Rossell :

> On Tue, Dec 13, 2011 at 12:39:40AM +0100, Rickard Nilsson wrote:
>> one x86_64). Unfortunately, the database got severly corrupted when both
>> machines was building things at the same time. I guess this is a feature
>> of sqlite+NFS+file locks.
>
> Afaik, NFS 'file locks' are rarely well implemented, and often work bad.  
> If you
> expect that they will automatically work in your setup, you may be wrong.

Yes, this was what I suspected from the very start. But I will at least  
try with NFS4, too.


>> One idea could be if slave build machines didn't build directly into the
>> store used by the host itself, but instead wrote to a temporary store,  
>> and
>> also to a temporary database (or maybe it doesn't need to write to any  
>> db
>> at all). The master host could then pick up the build results and put  
>> them
>> into its database and into the shared store. I think that, in theory,  
>> this
>> scheme could work. How about in practice?
>
> I don't know how much remote can NIX_REMOTE be.

NIX_REMOTE can actually be very remote. I have verified that it is no  
problem to tunnel the local Nix worker socket via TCP (with socat) to a  
Nix worker socket on another host. It actually works very good. However,  
this only solves half of my problem. You can delegate builds perfectly to  
one master host in this way, but if you want to mix in build slaves (which  
you need if you have mixed CPU architectures), then you get into the  
shared store/db problem. Maybe I should just settle for dedicated build  
slaves with local store and db.


   / Rickard
___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


Re: [Nix-dev] Sharing the Nix store between systems

2011-12-13 Thread Rickard Nilsson
Den 2011-12-13 05:41:30 skrev Michael Raskin <7c6f4...@mail.ru>:

>> One idea could be if slave build machines didn't build directly into the
>> store used by the host itself, but instead wrote to a temporary store,  
>> and
>> also to a temporary database (or maybe it doesn't need to write to any  
>> db
>> at all). The master host could then pick up the build results and put  
>> them
>> into its database and into the shared store. I think that, in theory,  
>> this
>> scheme could work. How about in practice?
>
> I guess you would need a chroot for this scheme. The simples way for
> nix-build I can imagine (my definition of simple may differ from yours)
> is a unionFS mount of the original filesystem and just an empty writable
> directory, chroot inside unionfs, building, exporting the built paths
> with nix-store --export, importing it on host, destroying the overlay
> directory.
>
> The "build" part of nixos-rebuild can be done in the same way.

Yes, something along those lines could work. I will think about how to  
implement it in a not too complex fashion.

   / Rickard
___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


Re: [Nix-dev] Sharing the Nix store between systems

2011-12-13 Thread Lluís Batlle i Rossell
On Tue, Dec 13, 2011 at 12:39:40AM +0100, Rickard Nilsson wrote:
> one x86_64). Unfortunately, the database got severly corrupted when both  
> machines was building things at the same time. I guess this is a feature  
> of sqlite+NFS+file locks.

Afaik, NFS 'file locks' are rarely well implemented, and often work bad. If you
expect that they will automatically work in your setup, you may be wrong.

> One idea could be if slave build machines didn't build directly into the  
> store used by the host itself, but instead wrote to a temporary store, and  
> also to a temporary database (or maybe it doesn't need to write to any db  
> at all). The master host could then pick up the build results and put them  
> into its database and into the shared store. I think that, in theory, this  
> scheme could work. How about in practice?

I don't know how much remote can NIX_REMOTE be.
___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev