mirror of
https://git.in.rschanz.org/ryan77627/guix.git
synced 2024-12-29 07:42:23 -05:00
7f037dfcdc
* gnu/packages/package-management.scm (guix-modules)[description]: Remove instructions to set GUIX_EXTENSIONS_PATH. Signed-off-by: Efraim Flashner <efraim@flashner.co.il>
2153 lines
91 KiB
Scheme
2153 lines
91 KiB
Scheme
;;; GNU Guix --- Functional package management for GNU
|
||
;;; Copyright © 2013-2022 Ludovic Courtès <ludo@gnu.org>
|
||
;;; Copyright © 2015, 2017, 2020, 2021, 2022 Ricardo Wurmus <rekado@elephly.net>
|
||
;;; Copyright © 2017 Muriithi Frederick Muriuki <fredmanglis@gmail.com>
|
||
;;; Copyright © 2017, 2018 Oleg Pykhalov <go.wigust@gmail.com>
|
||
;;; Copyright © 2017 Roel Janssen <roel@gnu.org>
|
||
;;; Copyright © 2017–2022 Tobias Geerinckx-Rice <me@tobias.gr>
|
||
;;; Copyright © 2018 Julien Lepiller <julien@lepiller.eu>
|
||
;;; Copyright © 2018, 2019 Rutger Helling <rhelling@mykolab.com>
|
||
;;; Copyright © 2018 Sou Bunnbu <iyzsong@member.fsf.org>
|
||
;;; Copyright © 2018, 2019 Eric Bavier <bavier@member.fsf.org>
|
||
;;; Copyright © 2019, 2020, 2021, 2022 Efraim Flashner <efraim@flashner.co.il>
|
||
;;; Copyright © 2019 Jonathan Brielmaier <jonathan.brielmaier@web.de>
|
||
;;; Copyright © 2020 Mathieu Othacehe <m.othacehe@gmail.com>
|
||
;;; Copyright © 2020 Jan (janneke) Nieuwenhuizen <janneke@gnu.org>
|
||
;;; Copyright © 2020 Giacomo Leidi <goodoldpaul@autistici.org>
|
||
;;; Copyright © 2020 Jesse Gibbons <jgibbons2357+guix@gmail.com>
|
||
;;; Copyright © 2020 Martin Becze <mjbecze@riseup.net>
|
||
;;; Copyright © 2020 Vincent Legoll <vincent.legoll@gmail.com>
|
||
;;; Copyright © 2021 Ivan Gankevich <i.gankevich@spbu.ru>
|
||
;;; Copyright © 2021, 2022 Maxim Cournoyer <maxim.cournoyer@gmail.com>
|
||
;;; Copyright © 2021 John Kehayias <john.kehayias@protonmail.com>
|
||
;;; Copyright © 2022 Zhu Zihao <all_but_last@163.com>
|
||
;;;
|
||
;;; This file is part of GNU Guix.
|
||
;;;
|
||
;;; GNU Guix is free software; you can redistribute it and/or modify it
|
||
;;; under the terms of the GNU General Public License as published by
|
||
;;; the Free Software Foundation; either version 3 of the License, or (at
|
||
;;; your option) any later version.
|
||
;;;
|
||
;;; GNU Guix is distributed in the hope that it will be useful, but
|
||
;;; WITHOUT ANY WARRANTY; without even the implied warranty of
|
||
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||
;;; GNU General Public License for more details.
|
||
;;;
|
||
;;; You should have received a copy of the GNU General Public License
|
||
;;; along with GNU Guix. If not, see <http://www.gnu.org/licenses/>.
|
||
|
||
(define-module (gnu packages package-management)
|
||
#:use-module (gnu artwork)
|
||
#:use-module (gnu packages)
|
||
#:use-module (gnu packages acl)
|
||
#:use-module (gnu packages attr)
|
||
#:use-module (gnu packages avahi)
|
||
#:use-module (gnu packages autotools)
|
||
#:use-module (gnu packages backup)
|
||
#:use-module (gnu packages base)
|
||
#:use-module (gnu packages bash)
|
||
#:use-module (gnu packages bdw-gc)
|
||
#:use-module (gnu packages bison)
|
||
#:use-module (gnu packages boost)
|
||
#:use-module (gnu packages bootstrap) ;for 'bootstrap-guile-origin'
|
||
#:use-module (gnu packages build-tools)
|
||
#:use-module (gnu packages check)
|
||
#:use-module (gnu packages compression)
|
||
#:use-module (gnu packages cmake)
|
||
#:use-module (gnu packages cpio)
|
||
#:use-module (gnu packages crypto)
|
||
#:use-module (gnu packages curl)
|
||
#:use-module (gnu packages databases)
|
||
#:use-module (gnu packages dejagnu)
|
||
#:use-module (gnu packages dbm)
|
||
#:use-module (gnu packages docbook)
|
||
#:use-module (gnu packages file)
|
||
#:use-module (gnu packages flex)
|
||
#:use-module (gnu packages gcc)
|
||
#:use-module (gnu packages gettext)
|
||
#:use-module (gnu packages glib)
|
||
#:use-module (gnu packages gnome)
|
||
#:use-module (gnu packages gnupg)
|
||
#:use-module (gnu packages graphviz)
|
||
#:use-module (gnu packages gtk)
|
||
#:use-module (gnu packages guile)
|
||
#:use-module (gnu packages guile-xyz)
|
||
#:use-module (gnu packages hardware)
|
||
#:use-module (gnu packages hurd)
|
||
#:use-module (gnu packages imagemagick)
|
||
#:use-module (gnu packages less)
|
||
#:use-module (gnu packages libedit)
|
||
#:use-module (gnu packages linux)
|
||
#:use-module (gnu packages lisp)
|
||
#:use-module (gnu packages lua)
|
||
#:use-module (gnu packages man)
|
||
#:use-module (gnu packages markup)
|
||
#:use-module (gnu packages nettle)
|
||
#:use-module (gnu packages networking)
|
||
#:use-module (gnu packages ninja)
|
||
#:use-module (gnu packages nss)
|
||
#:use-module (gnu packages patchutils)
|
||
#:use-module (gnu packages perl)
|
||
#:use-module (gnu packages perl-check)
|
||
#:use-module (gnu packages pkg-config)
|
||
#:use-module (gnu packages popt)
|
||
#:use-module (gnu packages python)
|
||
#:use-module (gnu packages python-build)
|
||
#:use-module (gnu packages python-check)
|
||
#:use-module (gnu packages python-web)
|
||
#:use-module (gnu packages python-xyz)
|
||
#:use-module (gnu packages serialization)
|
||
#:use-module (gnu packages sqlite)
|
||
#:use-module (gnu packages ssh)
|
||
#:use-module (gnu packages tcl)
|
||
#:use-module (gnu packages texinfo)
|
||
#:use-module (gnu packages time)
|
||
#:use-module (gnu packages tls)
|
||
#:use-module (gnu packages vim)
|
||
#:use-module (gnu packages virtualization)
|
||
#:use-module (gnu packages web)
|
||
#:use-module (gnu packages xml)
|
||
#:use-module (gnu packages xorg)
|
||
#:use-module (gnu packages version-control)
|
||
#:autoload (guix build-system channel) (channel-build-system)
|
||
#:use-module (guix build-system glib-or-gtk)
|
||
#:use-module (guix build-system gnu)
|
||
#:use-module (guix build-system guile)
|
||
#:use-module (guix build-system meson)
|
||
#:use-module (guix build-system python)
|
||
#:use-module (guix build-system trivial)
|
||
#:use-module (guix download)
|
||
#:use-module (guix gexp)
|
||
#:use-module (guix git-download)
|
||
#:autoload (guix describe) (current-channels)
|
||
#:autoload (guix channels) (channel?
|
||
guix-channel?
|
||
repository->guix-channel)
|
||
#:use-module ((guix licenses) #:prefix license:)
|
||
#:use-module (guix packages)
|
||
#:use-module (guix utils)
|
||
#:use-module ((guix search-paths) #:select ($SSL_CERT_DIR $SSL_CERT_FILE))
|
||
#:use-module (ice-9 match)
|
||
#:use-module (srfi srfi-1))
|
||
|
||
(define (boot-guile-uri arch)
|
||
"Return the URI for the bootstrap Guile tarball for ARCH."
|
||
(cond ((string=? "armhf" arch)
|
||
(string-append "http://alpha.gnu.org/gnu/guix/bootstrap/"
|
||
arch "-linux"
|
||
"/20150101/guile-2.0.11.tar.xz"))
|
||
((string=? "aarch64" arch)
|
||
(string-append "http://alpha.gnu.org/gnu/guix/bootstrap/"
|
||
arch "-linux/20170217/guile-2.0.14.tar.xz"))
|
||
(else
|
||
(string-append "http://alpha.gnu.org/gnu/guix/bootstrap/"
|
||
arch "-linux"
|
||
"/20131110/guile-2.0.9.tar.xz"))))
|
||
|
||
;; NOTE: The commit IDs used here form a linked list threaded through the git
|
||
;; history. In a phenomenon known as boot-stripping, not only the head of this
|
||
;; list is used, but also a few older versions, when a guix from this package is
|
||
;; used to build something also depending on guix.
|
||
;;
|
||
;; Therefore, if, by accident, you set this package to a non-existent commit ID,
|
||
;; it is insufficient to simply correct it with the latest commit.
|
||
;; Instead, please push one commit that rolls back Guix to before the mistake,
|
||
;; and then another that points to the first one. That way, the faulty commit
|
||
;; won't appear on the linked list.
|
||
;;
|
||
;; If you are updating this package because it fails to build, you need to
|
||
;; actually update it *twice*, as the installer is pointing to the N-1 guix
|
||
;; package revision.
|
||
(define-public guix
|
||
;; Latest version of Guix, which may or may not correspond to a release.
|
||
;; Note: the 'update-guix-package.scm' script expects this definition to
|
||
;; start precisely like this.
|
||
(let ((version "1.3.0")
|
||
(commit "9e4632081ff31bf0d1715edd66f514614c6dc4bb")
|
||
(revision 29))
|
||
(package
|
||
(name "guix")
|
||
|
||
(version (if (zero? revision)
|
||
version
|
||
(string-append version "-"
|
||
(number->string revision)
|
||
"." (string-take commit 7))))
|
||
(source (origin
|
||
(method git-fetch)
|
||
(uri (git-reference
|
||
(url "https://git.savannah.gnu.org/git/guix.git")
|
||
(commit commit)))
|
||
(sha256
|
||
(base32
|
||
"1x32l8szclv8zlwdjr8yfidxxm4n7dgm6j7xypmx5mg5pkakyan5"))
|
||
(file-name (string-append "guix-" version "-checkout"))))
|
||
(build-system gnu-build-system)
|
||
(arguments
|
||
`(#:configure-flags (list
|
||
|
||
;; Provide channel metadata for 'guix describe'.
|
||
;; Don't pass '--with-channel-url' and
|
||
;; '--with-channel-introduction' and instead use
|
||
;; the defaults.
|
||
,(string-append "--with-channel-commit=" commit)
|
||
|
||
"--localstatedir=/var"
|
||
"--sysconfdir=/etc"
|
||
(string-append "--with-bash-completion-dir="
|
||
(assoc-ref %outputs "out")
|
||
"/etc/bash_completion.d")
|
||
|
||
;; Set 'DOT_USER_PROGRAM' to the empty string so
|
||
;; we don't keep a reference to Graphviz, whose
|
||
;; closure is pretty big (too big for the Guix
|
||
;; system installation image.)
|
||
"ac_cv_path_DOT_USER_PROGRAM=dot"
|
||
|
||
;; To avoid problems with the length of shebangs,
|
||
;; choose a fixed-width and short directory name
|
||
;; for tests.
|
||
"ac_cv_guix_test_root=/tmp/guix-tests"
|
||
,@(if (hurd-target?) '("--with-courage") '()))
|
||
#:parallel-tests? #f ;work around <http://bugs.gnu.org/21097>
|
||
|
||
#:modules ((guix build gnu-build-system)
|
||
(guix build utils)
|
||
(srfi srfi-26)
|
||
(ice-9 popen)
|
||
(ice-9 rdelim))
|
||
|
||
#:phases (modify-phases %standard-phases
|
||
(replace 'bootstrap
|
||
(lambda _
|
||
;; Make sure 'msgmerge' can modify the PO files.
|
||
(for-each (lambda (po)
|
||
(chmod po #o666))
|
||
(find-files "." "\\.po$"))
|
||
|
||
(patch-shebang "build-aux/git-version-gen")
|
||
|
||
(call-with-output-file ".tarball-version"
|
||
(lambda (port)
|
||
(display ,version port)))
|
||
|
||
;; Install SysV init files to $(prefix)/etc rather
|
||
;; than to /etc.
|
||
(substitute* "nix/local.mk"
|
||
(("^sysvinitservicedir = .*$")
|
||
(string-append "sysvinitservicedir = \
|
||
$(prefix)/etc/init.d\n")))
|
||
|
||
;; Install OpenRC init files to $(prefix)/etc rather
|
||
;; than to /etc.
|
||
(substitute* "nix/local.mk"
|
||
(("^openrcservicedir = .*$")
|
||
(string-append "openrcservicedir = \
|
||
$(prefix)/etc/openrc\n")))
|
||
|
||
(invoke "sh" "bootstrap")))
|
||
,@(if (target-riscv64?)
|
||
`((add-after 'unpack 'use-correct-guile-version-for-tests
|
||
(lambda _
|
||
(substitute* "tests/gexp.scm"
|
||
(("2\\.0") "3.0")))))
|
||
'())
|
||
(add-before 'build 'use-host-compressors
|
||
(lambda* (#:key inputs target #:allow-other-keys)
|
||
(when target
|
||
;; Use host compressors.
|
||
(let ((bzip2 (assoc-ref inputs "bzip2"))
|
||
(gzip (assoc-ref inputs "gzip"))
|
||
(xz (assoc-ref inputs "xz")))
|
||
(substitute* "guix/config.scm"
|
||
(("\"[^\"]*/bin/bzip2")
|
||
(string-append "\"" bzip2 "/bin/bzip2"))
|
||
(("\"[^\"]*/bin/gzip") gzip
|
||
(string-append "\"" gzip "/bin/gzip"))
|
||
(("\"[^\"]*/bin//xz")
|
||
(string-append "\"" xz "/bin/xz")))))
|
||
#t))
|
||
(add-before 'check 'copy-bootstrap-guile
|
||
(lambda* (#:key system target inputs #:allow-other-keys)
|
||
;; Copy the bootstrap guile tarball in the store
|
||
;; used by the test suite.
|
||
(define (intern file recursive?)
|
||
;; Note: don't use 'guix download' here because we
|
||
;; need to set the 'recursive?' argument.
|
||
(define base
|
||
(strip-store-file-name file))
|
||
|
||
(define code
|
||
`(begin
|
||
(use-modules (guix))
|
||
(with-store store
|
||
(let* ((item (add-to-store store ,base
|
||
,recursive?
|
||
"sha256" ,file))
|
||
(root (string-append "/tmp/gc-root-"
|
||
(basename item))))
|
||
;; Register a root so that the GC tests
|
||
;; don't delete those.
|
||
(symlink item root)
|
||
(add-indirect-root store root)))))
|
||
|
||
(invoke "./test-env" "guile" "-c"
|
||
(object->string code)))
|
||
|
||
(unless target
|
||
(intern (assoc-ref inputs "boot-guile") #f)
|
||
|
||
;; On x86_64 some tests need the i686 Guile.
|
||
(when (and (not target)
|
||
(string=? system "x86_64-linux"))
|
||
(intern (assoc-ref inputs "boot-guile/i686") #f))
|
||
|
||
;; Copy the bootstrap executables.
|
||
(for-each (lambda (input)
|
||
(intern (assoc-ref inputs input) #t))
|
||
'("bootstrap/bash" "bootstrap/mkdir"
|
||
"bootstrap/tar" "bootstrap/xz")))
|
||
#t))
|
||
(add-after 'unpack 'disable-failing-tests
|
||
;; XXX FIXME: These tests fail within the build container.
|
||
(lambda _
|
||
(substitute* "tests/syscalls.scm"
|
||
(("^\\(test-(assert|equal) \"(clone|setns|pivot-root)\"" all)
|
||
(string-append "(test-skip 1)\n" all)))
|
||
(substitute* "tests/containers.scm"
|
||
(("^\\(test-(assert|equal)" all)
|
||
(string-append "(test-skip 1)\n" all)))
|
||
(when (file-exists? "tests/guix-environment-container.sh")
|
||
(substitute* "tests/guix-environment-container.sh"
|
||
(("guix environment --version")
|
||
"exit 77\n")))
|
||
#t))
|
||
(add-before 'check 'set-SHELL
|
||
(lambda _
|
||
;; 'guix environment' tests rely on 'SHELL' having a
|
||
;; correct value, so set it.
|
||
(setenv "SHELL" (which "sh"))
|
||
#t))
|
||
(add-after 'install 'wrap-program
|
||
(lambda* (#:key inputs native-inputs outputs target
|
||
#:allow-other-keys)
|
||
;; Make sure the 'guix' command finds GnuTLS,
|
||
;; Guile-JSON, and Guile-Git automatically.
|
||
(let* ((out (assoc-ref outputs "out"))
|
||
(guile (assoc-ref (or native-inputs inputs)
|
||
"guile"))
|
||
(avahi (assoc-ref inputs "guile-avahi"))
|
||
(gcrypt (assoc-ref inputs "guile-gcrypt"))
|
||
(guile-lib (assoc-ref inputs "guile-lib"))
|
||
(json (assoc-ref inputs "guile-json"))
|
||
(sqlite (assoc-ref inputs "guile-sqlite3"))
|
||
(zlib (assoc-ref inputs "guile-zlib"))
|
||
(lzlib (assoc-ref inputs "guile-lzlib"))
|
||
(zstd (assoc-ref inputs "guile-zstd"))
|
||
(git (assoc-ref inputs "guile-git"))
|
||
(bs (assoc-ref inputs
|
||
"guile-bytestructures"))
|
||
(ssh (assoc-ref inputs "guile-ssh"))
|
||
(gnutls (assoc-ref inputs "gnutls"))
|
||
(disarchive (assoc-ref inputs "disarchive"))
|
||
(lzma (assoc-ref inputs "guile-lzma"))
|
||
(locales (assoc-ref inputs "glibc-utf8-locales"))
|
||
(deps (list gcrypt json sqlite gnutls git
|
||
bs ssh zlib lzlib zstd guile-lib
|
||
disarchive lzma))
|
||
(deps* (if avahi (cons avahi deps) deps))
|
||
(effective
|
||
(read-line
|
||
(open-pipe* OPEN_READ
|
||
(string-append guile "/bin/guile")
|
||
"-c" "(display (effective-version))")))
|
||
(path (map (cut string-append <>
|
||
"/share/guile/site/"
|
||
effective)
|
||
(delete #f deps*)))
|
||
(gopath (map (cut string-append <>
|
||
"/lib/guile/" effective
|
||
"/site-ccache")
|
||
(delete #f deps*)))
|
||
(locpath (string-append locales "/lib/locale")))
|
||
|
||
;; Modify 'guix' directly instead of using
|
||
;; 'wrap-program'. This avoids the indirection
|
||
;; through Bash, which in turn avoids getting Bash's
|
||
;; own locale warnings.
|
||
(substitute* (string-append out "/bin/guix")
|
||
(("!#")
|
||
(string-append
|
||
"!#\n\n"
|
||
(object->string
|
||
`(set! %load-path (append ',path %load-path)))
|
||
"\n"
|
||
(object->string
|
||
`(set! %load-compiled-path
|
||
(append ',gopath %load-compiled-path)))
|
||
"\n"
|
||
(object->string
|
||
`(let ((path (getenv "GUIX_LOCPATH")))
|
||
(setenv "GUIX_LOCPATH"
|
||
(if path
|
||
(string-append path ":" ,locpath)
|
||
,locpath))))
|
||
"\n\n"))))))
|
||
|
||
;; The 'guix' executable has 'OUT/libexec/guix/guile' as
|
||
;; its shebang; that should remain unchanged, thus remove
|
||
;; the 'patch-shebangs' phase, which would otherwise
|
||
;; change it to 'GUILE/bin/guile'.
|
||
(delete 'patch-shebangs))))
|
||
(native-inputs `(("pkg-config" ,pkg-config)
|
||
|
||
;; Guile libraries are needed here for
|
||
;; cross-compilation.
|
||
("guile" ,guile-3.0-latest) ;for faster builds
|
||
("gnutls" ,gnutls)
|
||
,@(if (%current-target-system)
|
||
'()
|
||
`(("guile-avahi" ,guile-avahi)))
|
||
("guile-gcrypt" ,guile-gcrypt)
|
||
("guile-json" ,guile-json-4)
|
||
("guile-lib" ,guile-lib)
|
||
("guile-sqlite3" ,guile-sqlite3)
|
||
("guile-zlib" ,guile-zlib)
|
||
("guile-lzlib" ,guile-lzlib)
|
||
("guile-zstd" ,guile-zstd)
|
||
("guile-ssh" ,guile-ssh)
|
||
("guile-git" ,guile-git)
|
||
|
||
;; XXX: Keep the development inputs here even though
|
||
;; they're unnecessary, just so that 'guix environment
|
||
;; guix' always contains them.
|
||
("autoconf" ,autoconf)
|
||
("automake" ,automake)
|
||
("gettext" ,gettext-minimal)
|
||
("texinfo" ,texinfo)
|
||
("graphviz" ,graphviz)
|
||
("help2man" ,help2man)
|
||
("po4a" ,po4a)))
|
||
(inputs
|
||
`(("bzip2" ,bzip2)
|
||
("gzip" ,gzip)
|
||
("sqlite" ,sqlite)
|
||
("libgcrypt" ,libgcrypt)
|
||
|
||
("guile" ,guile-3.0-latest)
|
||
|
||
;; Some of the tests use "unshare" when it is available.
|
||
("util-linux" ,util-linux)
|
||
|
||
;; Many tests rely on the 'guile-bootstrap' package, which is why we
|
||
;; have it here.
|
||
("boot-guile" ,(bootstrap-guile-origin (%current-system)))
|
||
,@(if (and (not (%current-target-system))
|
||
(string=? (%current-system) "x86_64-linux"))
|
||
`(("boot-guile/i686" ,(bootstrap-guile-origin "i686-linux")))
|
||
'())
|
||
,@(if (%current-target-system)
|
||
`(("xz" ,xz))
|
||
'())
|
||
|
||
;; Tests also rely on these bootstrap executables.
|
||
("bootstrap/bash" ,(bootstrap-executable "bash" (%current-system)))
|
||
("bootstrap/mkdir" ,(bootstrap-executable "mkdir" (%current-system)))
|
||
("bootstrap/tar" ,(bootstrap-executable "tar" (%current-system)))
|
||
("bootstrap/xz" ,(bootstrap-executable "xz" (%current-system)))
|
||
|
||
("disarchive" ,disarchive) ;for 'guix perform-download'
|
||
("guile-lzma" ,guile-lzma) ;for Disarchive
|
||
|
||
("glibc-utf8-locales" ,glibc-utf8-locales)))
|
||
(propagated-inputs
|
||
`(("gnutls" ,gnutls)
|
||
;; Avahi requires "glib" which doesn't cross-compile yet.
|
||
,@(if (%current-target-system)
|
||
'()
|
||
`(("guile-avahi" ,guile-avahi)))
|
||
("guile-gcrypt" ,guile-gcrypt)
|
||
("guile-json" ,guile-json-4)
|
||
("guile-lib" ,guile-lib)
|
||
("guile-sqlite3" ,guile-sqlite3)
|
||
("guile-ssh" ,guile-ssh)
|
||
("guile-git" ,guile-git)
|
||
("guile-zlib" ,guile-zlib)
|
||
("guile-lzlib" ,guile-lzlib)
|
||
("guile-zstd" ,guile-zstd)))
|
||
(native-search-paths
|
||
(list (search-path-specification
|
||
(variable "GUIX_EXTENSIONS_PATH")
|
||
(files '("share/guix/extensions")))
|
||
;; (guix git) and (guix build download) honor this variable whose
|
||
;; name comes from OpenSSL.
|
||
$SSL_CERT_DIR))
|
||
(home-page "https://www.gnu.org/software/guix/")
|
||
(synopsis "Functional package manager for installed software packages and versions")
|
||
(description
|
||
"GNU Guix is a functional package manager for the GNU system, and is
|
||
also a distribution thereof. It includes a virtual machine image. Besides
|
||
the usual package management features, it also supports transactional
|
||
upgrades and roll-backs, per-user profiles, and much more. It is based on
|
||
the Nix package manager.")
|
||
(license license:gpl3+)
|
||
(properties '((ftp-server . "alpha.gnu.org"))))))
|
||
|
||
(define* (channel-source->package source #:key commit)
|
||
"Return a package for the given channel SOURCE, a lowerable object."
|
||
(package
|
||
(inherit guix)
|
||
(version (string-append (package-version guix) "."
|
||
(if commit (string-take commit 7) "")))
|
||
(build-system channel-build-system)
|
||
(arguments `(#:source ,source
|
||
#:commit ,commit))
|
||
(inputs '())
|
||
(native-inputs '())
|
||
(propagated-inputs '())))
|
||
|
||
(export channel-source->package)
|
||
|
||
(define-public guix-for-cuirass
|
||
;; Known-good revision before commit
|
||
;; bd86bbd300474204878e927f6cd3f0defa1662a5, which introduced
|
||
;; 'primitive-fork' in 'open-inferior'.
|
||
(let ((version "1.3.0")
|
||
(commit "a27e47f9d1e22dc32bb250cfeef88cfacb930e23")
|
||
(revision 23))
|
||
(package
|
||
(inherit guix)
|
||
(version (string-append version "-"
|
||
(number->string revision)
|
||
"." (string-take commit 7)))
|
||
(source (origin
|
||
(method git-fetch)
|
||
(uri (git-reference
|
||
(url "https://git.savannah.gnu.org/git/guix.git")
|
||
(commit commit)))
|
||
(sha256
|
||
(base32
|
||
"12jmvagbw05hmmlrb82i0qazhlv7mcfnl4dmknwx3a9hd760g9y1"))
|
||
(file-name (string-append "guix-" version "-checkout"))))
|
||
(properties `((hidden? . #t)
|
||
,@(package-properties guix))))))
|
||
|
||
(define-public guix-daemon
|
||
;; This package is for internal consumption: it allows us to quickly build
|
||
;; the 'guix-daemon' program and use that in (guix self), used by 'guix
|
||
;; pull'.
|
||
(package
|
||
(inherit guix)
|
||
(properties `((hidden? . #t)))
|
||
(name "guix-daemon")
|
||
|
||
;; Use a minimum set of dependencies.
|
||
(native-inputs
|
||
(modify-inputs (package-native-inputs guix)
|
||
(delete "po4a" "graphviz" "help2man")))
|
||
(inputs
|
||
(modify-inputs (package-inputs guix)
|
||
(delete "boot-guile" "boot-guile/i686" "util-linux")
|
||
(prepend gnutls guile-git guile-json-3 guile-gcrypt)))
|
||
|
||
(propagated-inputs '())
|
||
|
||
(arguments
|
||
(substitute-keyword-arguments (package-arguments guix)
|
||
((#:configure-flags flags '())
|
||
;; Pretend we have those libraries; we don't actually need them.
|
||
`(append ,flags
|
||
'("guix_cv_have_recent_guile_sqlite3=yes"
|
||
"guix_cv_have_recent_guile_ssh=yes")))
|
||
((#:tests? #f #f)
|
||
#f)
|
||
((#:phases phases '%standard-phases)
|
||
`(modify-phases ,phases
|
||
(add-after 'unpack 'change-default-guix
|
||
(lambda _
|
||
;; We need to tell 'guix-daemon' which 'guix' command to use.
|
||
;; Here we use a questionable hack where we hard-code root's
|
||
;; current guix, which could be wrong (XXX). Note that scripts
|
||
;; like 'guix perform-download' do not run as root so we assume
|
||
;; that they have access to /var/guix/profiles/per-user/root.
|
||
(substitute* "nix/libstore/globals.cc"
|
||
(("guixProgram = (.*)nixBinDir + \"/guix\"" _ before)
|
||
(string-append "guixProgram = " before
|
||
"/var/guix/profiles/per-user/root\
|
||
/current-guix/bin/guix")))
|
||
#t))
|
||
(replace 'build
|
||
(lambda _
|
||
(invoke "make" "nix/libstore/schema.sql.hh")
|
||
(invoke "make" "-j" (number->string
|
||
(parallel-job-count))
|
||
"guix-daemon")))
|
||
(delete 'copy-bootstrap-guile)
|
||
(replace 'install
|
||
(lambda* (#:key outputs #:allow-other-keys)
|
||
(invoke "make" "install-binPROGRAMS")))
|
||
(delete 'wrap-program)))))))
|
||
|
||
(define-public guix-minimal
|
||
;; A version of Guix which is built with the minimal set of dependencies, as
|
||
;; outlined in the README "Requirements" section. Intended as a CI job, so
|
||
;; marked as hidden.
|
||
(hidden-package
|
||
(package
|
||
(inherit guix)
|
||
(name "guix-minimal")
|
||
(native-inputs
|
||
(modify-inputs (package-native-inputs guix)
|
||
(delete "guile-ssh")))
|
||
(propagated-inputs
|
||
(modify-inputs (package-propagated-inputs guix)
|
||
(delete "guile-ssh"))))))
|
||
|
||
(define-public current-guix-package
|
||
;; This parameter allows callers to override the package that 'current-guix'
|
||
;; returns. This is useful when 'current-guix' cannot compute it by itself,
|
||
;; for instance because it's not running from a source code checkout.
|
||
;;
|
||
;; The default value is obtained by creating a package from the 'guix'
|
||
;; channel returned by 'current-channels' or, if that's the empty list, that
|
||
;; returned by 'repository->guix-channel' for the current directory (which
|
||
;; assumes that we're running from a Git checkout). Delay computation so
|
||
;; that the relevant modules can be loaded lazily.
|
||
(make-parameter
|
||
(delay (match (or (find guix-channel? (current-channels))
|
||
(repository->guix-channel
|
||
(current-source-directory)))
|
||
((? channel? source)
|
||
(package
|
||
(inherit guix)
|
||
(source source)
|
||
(build-system channel-build-system)
|
||
(inputs '())
|
||
(native-inputs '())
|
||
(propagated-inputs '())))
|
||
(#f #f)))))
|
||
|
||
(define-public current-guix
|
||
(lambda ()
|
||
"Return a package representing the currently-used Guix. It can be
|
||
overridden by setting the 'current-guix-package' parameter."
|
||
(match (current-guix-package)
|
||
((? promise? package) (force package))
|
||
(package package))))
|
||
|
||
(define-public guix-icons
|
||
(package
|
||
(inherit guix)
|
||
(name "guix-icons")
|
||
(version "0.1")
|
||
(source %artwork-repository)
|
||
(build-system trivial-build-system)
|
||
(native-inputs
|
||
(list imagemagick))
|
||
(inputs
|
||
'())
|
||
(arguments
|
||
`(#:modules ((guix build utils)
|
||
(gnu build svg))
|
||
#:builder
|
||
,(with-extensions (list guile-rsvg guile-cairo)
|
||
#~(begin
|
||
(use-modules (guix build utils)
|
||
(gnu build svg))
|
||
(let* ((logo (string-append #$source "/logo/Guix.svg"))
|
||
(logo-white
|
||
(string-append #$source
|
||
"/logo/Guix-horizontal-white.svg"))
|
||
(theme "hicolor")
|
||
(category "apps")
|
||
(sizes '(16 24 32 48 64 72 96 128 256 512 1024))
|
||
(icons
|
||
(string-append #$output "/share/icons/" theme))
|
||
(scalable-dir
|
||
(string-append icons "/scalable/" category)))
|
||
(setenv "XDG_CACHE_HOME" (getcwd))
|
||
|
||
;; Create the scalable icon files.
|
||
(mkdir-p scalable-dir)
|
||
(copy-file logo
|
||
(string-append scalable-dir "/guix-icon.svg"))
|
||
(copy-file logo-white
|
||
(string-append scalable-dir
|
||
"/guix-white-icon.svg"))
|
||
|
||
;; Create the fixed dimensions icon files.
|
||
(for-each
|
||
(lambda (size)
|
||
(let* ((dimension
|
||
(format #f "~ax~a" size size))
|
||
(file
|
||
(string-append icons "/" dimension "/" category
|
||
"/guix-icon.png")))
|
||
(mkdir-p (dirname file))
|
||
(svg->png logo file
|
||
#:width size
|
||
#:height size)))
|
||
sizes))))))
|
||
(synopsis "GNU Guix icons")
|
||
(description "This package contains GNU Guix icons organized according to
|
||
the Icon Theme Specification. They can be used by applications querying the
|
||
GTK icon cache for instance.")))
|
||
|
||
(define-public guix-modules
|
||
(package
|
||
(name "guix-modules")
|
||
(version "0.1.0")
|
||
(home-page "https://gitlab.inria.fr/guix-hpc/guix-modules")
|
||
(source (origin
|
||
(method git-fetch)
|
||
(uri (git-reference (url home-page)
|
||
(commit (string-append "v" version))))
|
||
(file-name (string-append "guix-modules-" version "-checkout"))
|
||
(sha256
|
||
(base32
|
||
"1ckvrrmkgzz93i35sj1372wxs7ln4gzszpri1pcdf473z0p7nh7w"))))
|
||
(build-system guile-build-system)
|
||
(arguments
|
||
'(#:phases (modify-phases %standard-phases
|
||
(add-after 'install 'move-to-extension-directory
|
||
(lambda* (#:key outputs #:allow-other-keys)
|
||
(let* ((out (assoc-ref outputs "out"))
|
||
(target (string-append
|
||
out
|
||
"/share/guix/extensions/module.scm")))
|
||
(mkdir-p (dirname target))
|
||
(rename-file (car (find-files out "module.scm"))
|
||
target)))))))
|
||
(native-inputs (list (lookup-package-input guix "guile") guix))
|
||
(synopsis "Generate environment modules from Guix packages")
|
||
(description
|
||
"Guix-Modules is an extension of Guix that provides a new @command{guix
|
||
module} command. The @command{guix module create} sub-command creates
|
||
@dfn{environment modules}, allowing you to manipulate software environments
|
||
with the @command{module} command commonly found on @acronym{HPC,
|
||
high-performance computing} clusters.")
|
||
(license license:gpl3+)))
|
||
|
||
|
||
;;;
|
||
;;; Other tools.
|
||
;;;
|
||
|
||
(define-public nix
|
||
(package
|
||
(name "nix")
|
||
(version "2.5.1")
|
||
(source
|
||
(origin
|
||
(method git-fetch)
|
||
(uri (git-reference
|
||
(url "http://github.com/NixOS/nix")
|
||
(commit version)))
|
||
(file-name (git-file-name name version))
|
||
(sha256
|
||
(base32 "1m8rmv8i6lg83pmalvjlq1fn8mcghn3ngjv3kw1kqsa45ymj5sqq"))
|
||
(patches
|
||
(search-patches "nix-dont-build-html-doc.diff"))))
|
||
(build-system gnu-build-system)
|
||
(arguments
|
||
(list
|
||
#:configure-flags #~(list "--sysconfdir=/etc" "--enable-gc")
|
||
#:phases
|
||
#~(modify-phases %standard-phases
|
||
(replace 'install
|
||
;; Don't try & fail to create subdirectories in /etc, but keep them
|
||
;; in the output as examples.
|
||
(lambda* (#:key (make-flags '()) outputs #:allow-other-keys)
|
||
(let ((etc (string-append #$output "/etc")))
|
||
(apply invoke "make" "install"
|
||
(string-append "sysconfdir=" etc)
|
||
(string-append "profiledir=" etc "/profile.d")
|
||
make-flags)))))))
|
||
(native-inputs
|
||
(list autoconf
|
||
autoconf-archive
|
||
automake
|
||
bison
|
||
flex
|
||
googletest
|
||
jq
|
||
libtool
|
||
pkg-config))
|
||
(inputs
|
||
(append (list boost
|
||
brotli
|
||
bzip2
|
||
curl
|
||
editline
|
||
libarchive
|
||
libgc
|
||
libseccomp
|
||
libsodium
|
||
lowdown
|
||
openssl
|
||
sqlite
|
||
xz
|
||
zlib)
|
||
(if (or (target-x86-64?)
|
||
(target-x86-32?))
|
||
(list libcpuid)
|
||
'())))
|
||
(home-page "https://nixos.org/nix/")
|
||
(synopsis "The Nix package manager")
|
||
(description
|
||
"Nix is a purely functional package manager. This means that it treats
|
||
packages like values in purely functional programming languages such as
|
||
Haskell—they are built by functions that don't have side-effects, and they
|
||
never change after they have been built. Nix stores packages in the Nix
|
||
store, usually the directory /nix/store, where each package has its own unique
|
||
sub-directory.")
|
||
(license license:lgpl2.1+)))
|
||
|
||
(define-public stow
|
||
(package
|
||
(name "stow")
|
||
(version "2.3.1")
|
||
(source (origin
|
||
(method url-fetch)
|
||
(uri (string-append "mirror://gnu/stow/stow-"
|
||
version ".tar.gz"))
|
||
(sha256
|
||
(base32
|
||
"0jrxy12ywn7smdzdnvwzjw77l6knx6jkj2rckgykg1dpf6bdkm89"))))
|
||
(build-system gnu-build-system)
|
||
(inputs
|
||
(list perl))
|
||
(native-inputs
|
||
(list perl-test-simple perl-test-output perl-capture-tiny
|
||
perl-io-stringy))
|
||
(home-page "https://www.gnu.org/software/stow/")
|
||
(synopsis "Managing installed software packages")
|
||
(description
|
||
"GNU Stow is a symlink manager. It generates symlinks to directories
|
||
of data and makes them appear to be merged into the same directory. It is
|
||
typically used for managing software packages installed from source, by
|
||
letting you install them apart in distinct directories and then create
|
||
symlinks to the files in a common directory such as /usr/local.")
|
||
(license license:gpl3+)))
|
||
|
||
(define-public xstow
|
||
(package
|
||
(name "xstow")
|
||
(version "1.0.2")
|
||
(source (origin
|
||
(method url-fetch)
|
||
(uri (string-append "mirror://sourceforge/xstow/xstow-"
|
||
version ".tar.bz2"))
|
||
(sha256
|
||
(base32
|
||
"1vy6lcswpkixh7h5mvsmq2wbcih6lpsmcva3m7v6f5npllciy13g"))))
|
||
(build-system gnu-build-system)
|
||
(synopsis "Replacement of GNU Stow written in C++")
|
||
(description
|
||
"XStow is a replacement of GNU Stow written in C++. It supports all
|
||
features of Stow with some extensions.")
|
||
(home-page "http://xstow.sourceforge.net/")
|
||
(license license:gpl2)))
|
||
|
||
(define-public rpm
|
||
(package
|
||
(name "rpm")
|
||
(version "4.17.1")
|
||
(source (origin
|
||
(method url-fetch)
|
||
(uri (string-append "http://ftp.rpm.org/releases/rpm-"
|
||
(version-major+minor version) ".x/rpm-"
|
||
version ".tar.bz2"))
|
||
(sha256
|
||
(base32
|
||
"0pbfj94ha59lbnd8dk0aqyxjv37xixfdcazq3y2mhwkf8s9vf48c"))))
|
||
(build-system gnu-build-system)
|
||
(arguments
|
||
'(#:configure-flags '("--with-external-db" ;use the system's bdb
|
||
"--enable-python")
|
||
#:phases (modify-phases %standard-phases
|
||
(add-after 'unpack 'fix-lua-check
|
||
(lambda _
|
||
(substitute* "configure"
|
||
(("lua >= 5.3")
|
||
"lua-5.3 >= 5.3"))))
|
||
(add-before 'configure 'set-nss-library-path
|
||
(lambda* (#:key inputs #:allow-other-keys)
|
||
(let ((nss (assoc-ref inputs "nss")))
|
||
(setenv "LIBRARY_PATH"
|
||
(string-append (getenv "LIBRARY_PATH") ":"
|
||
nss "/lib/nss"))))))))
|
||
(native-inputs
|
||
(list pkg-config))
|
||
(inputs
|
||
(list bdb
|
||
bzip2
|
||
cpio
|
||
file
|
||
libarchive
|
||
libgcrypt
|
||
lua
|
||
nspr
|
||
nss
|
||
python
|
||
sqlite
|
||
xz
|
||
zlib))
|
||
(propagated-inputs
|
||
;; popt is listed in the 'Requires' of rpm.pc.
|
||
(list popt))
|
||
(home-page "https://rpm.org/")
|
||
(synopsis "The RPM Package Manager")
|
||
(description
|
||
"The RPM Package Manager (RPM) is a command-line driven package
|
||
management system capable of installing, uninstalling, verifying, querying,
|
||
and updating computer software packages. Each software package consists of an
|
||
archive of files along with information about the package like its version, a
|
||
description. There is also a library permitting developers to manage such
|
||
transactions from C or Python.")
|
||
|
||
;; The whole is GPLv2+; librpm itself is dual-licensed LGPLv2+ | GPLv2+.
|
||
(license license:gpl2+)))
|
||
|
||
(define-public python-anaconda-client
|
||
(package
|
||
(name "python-anaconda-client")
|
||
(version "1.8.0")
|
||
(source
|
||
(origin
|
||
(method git-fetch)
|
||
(uri (git-reference
|
||
(url "https://github.com/Anaconda-Platform/anaconda-client")
|
||
(commit version)))
|
||
(file-name (git-file-name name version))
|
||
(sha256
|
||
(base32
|
||
"1vyk0g0gci4z9psisb8h50zi3j1nwfdg1jw3j76cxv0brln0v3fw"))))
|
||
(build-system python-build-system)
|
||
(propagated-inputs
|
||
(list python-clyent python-nbformat python-pyyaml python-requests))
|
||
(native-inputs
|
||
(list python-coverage
|
||
python-dateutil
|
||
python-freezegun
|
||
python-mock
|
||
python-pillow
|
||
python-pytz))
|
||
(arguments
|
||
`(#:phases
|
||
(modify-phases %standard-phases
|
||
;; This is needed for some tests.
|
||
(add-before 'check 'set-up-home
|
||
(lambda* _ (setenv "HOME" "/tmp") #t))
|
||
(add-before 'check 'remove-network-tests
|
||
(lambda* _
|
||
;; Remove tests requiring a network connection
|
||
(let ((network-tests '("tests/test_upload.py"
|
||
"tests/test_authorizations.py"
|
||
"tests/test_login.py"
|
||
"tests/test_whoami.py"
|
||
"utils/notebook/tests/test_data_uri.py"
|
||
"utils/notebook/tests/test_base.py"
|
||
"utils/notebook/tests/test_downloader.py"
|
||
"inspect_package/tests/test_conda.py")))
|
||
(with-directory-excursion "binstar_client"
|
||
(for-each delete-file network-tests)))
|
||
#t)))))
|
||
(home-page "https://github.com/Anaconda-Platform/anaconda-client")
|
||
(synopsis "Anaconda Cloud command line client library")
|
||
(description
|
||
"Anaconda Cloud command line client library provides an interface to
|
||
Anaconda Cloud. Anaconda Cloud is useful for sharing packages, notebooks and
|
||
environments.")
|
||
(license license:bsd-3)))
|
||
|
||
(define-public python-conda-package-handling
|
||
(package
|
||
(name "python-conda-package-handling")
|
||
(version "1.7.3")
|
||
(source
|
||
(origin
|
||
(method git-fetch)
|
||
(uri (git-reference
|
||
(url "https://github.com/conda/conda-package-handling/")
|
||
(commit version)))
|
||
(file-name (git-file-name name version))
|
||
(sha256
|
||
(base32
|
||
"1dq6f5ks3cinb355x712bls9bvv6bli6x3c43sdkqvawdw8xgv9j"))))
|
||
(build-system python-build-system)
|
||
(arguments
|
||
`(#:phases
|
||
(modify-phases %standard-phases
|
||
(add-after 'unpack 'use-unmodified-libarchive
|
||
(lambda _
|
||
(substitute* "setup.py"
|
||
(("archive_and_deps") "archive"))))
|
||
(replace 'check
|
||
(lambda* (#:key inputs outputs #:allow-other-keys)
|
||
(add-installed-pythonpath inputs outputs)
|
||
(invoke "pytest" "-vv" "tests"))))))
|
||
(propagated-inputs
|
||
(list python-six python-tqdm))
|
||
(inputs
|
||
(list libarchive))
|
||
(native-inputs
|
||
(list python-cython python-pytest python-pytest-cov
|
||
python-pytest-mock python-mock))
|
||
(home-page "https://conda.io")
|
||
(synopsis "Create and extract conda packages of various formats")
|
||
(description
|
||
"This library is an abstraction of Conda package handling and a tool for
|
||
extracting, creating, and converting between formats.")
|
||
(license license:bsd-3)))
|
||
|
||
(define-public conda
|
||
(package
|
||
(name "conda")
|
||
(version "4.10.3")
|
||
(source
|
||
(origin
|
||
(method git-fetch)
|
||
(uri (git-reference
|
||
(url "https://github.com/conda/conda")
|
||
(commit version)))
|
||
(file-name (git-file-name name version))
|
||
(sha256
|
||
(base32
|
||
"1w4yy62bsvkybjvcm5fspck4ns5j16nplzpbx6bxv7zhx69pcp4n"))))
|
||
(build-system python-build-system)
|
||
(arguments
|
||
`(#:phases
|
||
(modify-phases %standard-phases
|
||
(add-after 'unpack 'fix-permissions
|
||
(lambda _
|
||
;; This file is no longer writable after downloading with
|
||
;; 'git-fetch'
|
||
(make-file-writable
|
||
"tests/conda_env/support/saved-env/environment.yml")))
|
||
(add-after 'unpack 'fix-ruamel-yaml-dependency
|
||
(lambda _
|
||
(substitute* "setup.py"
|
||
(("ruamel_yaml_conda") "ruamel.yaml"))))
|
||
(add-after 'unpack 'correct-python-executable-name
|
||
(lambda* (#:key inputs #:allow-other-keys)
|
||
(let ((python (assoc-ref inputs "python-wrapper")))
|
||
#;
|
||
(substitute* "conda/common/path.py"
|
||
(("python_version or ''")
|
||
"python_version or '3'"))
|
||
(substitute* "conda/core/initialize.py"
|
||
(("python_exe = join")
|
||
(format #f "python_exe = \"~a/bin/python\" #"
|
||
python))))
|
||
#t))
|
||
(add-after 'unpack 'do-not-use-python-root-as-prefix
|
||
(lambda* (#:key inputs outputs #:allow-other-keys)
|
||
(let ((out (assoc-ref outputs "out"))
|
||
(python (assoc-ref inputs "python-wrapper")))
|
||
(substitute* "tests/core/test_initialize.py"
|
||
(("\"\"\"\\) % conda_prefix")
|
||
(format #f "\"\"\") % \"~a\"" python))
|
||
(("CONDA_PYTHON_EXE \"%s\"' % join\\(conda_prefix")
|
||
(format #f "CONDA_PYTHON_EXE \"%s\"' % join(\"~a\""
|
||
python))
|
||
(("conda_prefix = abspath\\(sys.prefix\\)")
|
||
(format #f "conda_prefix = abspath(\"~a\")" out)))
|
||
(substitute* "conda/base/context.py"
|
||
(("os.chdir\\(sys.prefix\\)")
|
||
(format #f "os.chdir(\"~a\")" out))
|
||
(("sys.prefix, '.condarc'")
|
||
(format #f "\"~a\", '.condarc'" out))
|
||
(("return abspath\\(sys.prefix\\)")
|
||
(format #f "return abspath(\"~a\")" out))
|
||
(("os.path.join\\(sys.prefix, bin_dir, exe\\)")
|
||
(format #f "\"~a/bin/conda\"" out))
|
||
(("'CONDA_EXE', sys.executable")
|
||
(format #f "'CONDA_EXE', \"~a/bin/conda\"" out))))
|
||
#t))
|
||
(add-before 'build 'create-version-file
|
||
(lambda _
|
||
(with-output-to-file "conda/.version"
|
||
(lambda () (display ,version)))
|
||
#t))
|
||
(replace 'check
|
||
(lambda _
|
||
(setenv "HOME" "/tmp")
|
||
(invoke "py.test" "-vv"
|
||
"-k"
|
||
(string-append
|
||
"not integration"
|
||
;; This one reports a newer version of conda than
|
||
;; expected.
|
||
" and not test_auto_update_conda"
|
||
;; This fails because the output directory is not a
|
||
;; Conda environment.
|
||
" and not test_list"
|
||
;; This fails because we patched the default root
|
||
;; prefix.
|
||
" and not test_default_target_is_root_prefix"
|
||
|
||
;; These fail because ...
|
||
;; TODO: conda patches its own shebang to
|
||
;; $conda-prefix/bin/python, which is obviously wrong.
|
||
" and not test_run_returns_int"
|
||
" and not test_run_returns_zero_errorlevel"
|
||
" and not test_run_returns_nonzero_errorlevel"
|
||
|
||
;; TODO: I don't understand what this failure means
|
||
" and not test_PrefixData_return_value_contract"
|
||
;; TODO: same here
|
||
" and not test_install_1"
|
||
;; Not sure if this is really wrong. This fails because
|
||
;; /gnu/store/...python-conda-4.8.3/bin/python
|
||
;; is not /gnu/store/...python-wrapper-3.8.2/bin/python
|
||
" and not test_make_entry_point"))))
|
||
(add-after 'install 'init
|
||
;; This writes a whole bunch of shell initialization files to the
|
||
;; prefix directory. Many features of conda can only be used after
|
||
;; running "conda init".
|
||
(lambda* (#:key inputs outputs #:allow-other-keys)
|
||
(add-installed-pythonpath inputs outputs)
|
||
(setenv "HOME" "/tmp")
|
||
(invoke (string-append (assoc-ref outputs "out")
|
||
"/bin/conda")
|
||
"init"))))))
|
||
(inputs
|
||
(list python-wrapper))
|
||
(propagated-inputs
|
||
(list python-anaconda-client
|
||
python-conda-package-handling
|
||
python-cytoolz
|
||
python-pycosat
|
||
python-pytest
|
||
python-pyyaml
|
||
python-requests
|
||
python-responses
|
||
python-ruamel.yaml
|
||
python-tqdm
|
||
;; XXX: This is dragged in by libarchive and is needed at runtime.
|
||
zstd))
|
||
(native-inputs
|
||
(list python-pytest-timeout))
|
||
(home-page "https://github.com/conda/conda")
|
||
(synopsis "Cross-platform, OS-agnostic, system-level binary package manager")
|
||
(description
|
||
"Conda is a cross-platform, Python-agnostic binary package manager. It
|
||
is the package manager used by Anaconda installations, but it may be used for
|
||
other systems as well. Conda makes environments first-class citizens, making
|
||
it easy to create independent environments even for C libraries. Conda is
|
||
written entirely in Python.")
|
||
(license license:bsd-3)))
|
||
|
||
(define-public conan
|
||
(package
|
||
(name "conan")
|
||
(version "1.50.0")
|
||
(source
|
||
(origin
|
||
(method git-fetch) ;no tests in PyPI archive
|
||
(uri (git-reference
|
||
(url "https://github.com/conan-io/conan")
|
||
(commit version)))
|
||
(file-name (git-file-name name version))
|
||
(sha256
|
||
(base32
|
||
"1jjrinz5wkcxfvwdpldrv4h7vacdyz88cc4af5vi3sdnjra0i0m5"))))
|
||
(build-system python-build-system)
|
||
(arguments
|
||
`(#:phases
|
||
(modify-phases %standard-phases
|
||
(add-after 'unpack 'relax-requirements
|
||
(lambda _
|
||
(substitute* "conans/requirements.txt"
|
||
(("node-semver==0.6.1")
|
||
"node-semver>=0.6.1")
|
||
(("Jinja2>=2.9, <3")
|
||
"Jinja2>=2.9")
|
||
(("PyYAML>=3.11, <6.0")
|
||
"PyYAML"))))
|
||
(add-after 'unpack 'patch-paths
|
||
(lambda* (#:key inputs #:allow-other-keys)
|
||
(let ((coreutils (assoc-ref inputs "coreutils")))
|
||
;; It seems that PATH is manipulated, as printenv is not found
|
||
;; during tests. Patch in its exact location.
|
||
(substitute* "conan/tools/env/environment.py"
|
||
(("printenv")
|
||
(string-append coreutils "/bin/printenv")))
|
||
(substitute* "conans/client/envvars/environment.py"
|
||
(("#!/usr/bin/env")
|
||
(string-append "#!" coreutils "/bin/env"))))))
|
||
(add-before 'check 'set-home
|
||
(lambda _
|
||
(setenv "HOME" "/tmp")))
|
||
(replace 'check
|
||
(lambda* (#:key tests? outputs #:allow-other-keys)
|
||
(define system ,(or (%current-target-system)
|
||
(%current-system)))
|
||
(when tests?
|
||
(setenv "PATH" (string-append (getenv "PATH") ":"
|
||
(assoc-ref outputs "out") "/bin"))
|
||
(invoke "python" "-m" "pytest"
|
||
"-n" "auto" ;parallelize tests
|
||
"-m" "not slow and not tool_svn"
|
||
;; Disable problematic tests.
|
||
"-k"
|
||
(string-append
|
||
;; These tests rely on networking.
|
||
"not shallow_clone_remote "
|
||
"and not remote_build "
|
||
"and not download_retries_errors "
|
||
"and not ftp "
|
||
"and not build_local_different_folders "
|
||
;; These expect CMake available at fixed versions.
|
||
"and not custom_cmake "
|
||
"and not default_cmake "
|
||
"and not bazel " ;bazel is not packaged
|
||
;; Guix sets PKG_CONFIG_PATH itself, which is not
|
||
;; expected by the following test.
|
||
"and not pkg_config_path "
|
||
"and not compare " ;caused by newer node-semver?
|
||
;; Guix is not currently a supported package manager.
|
||
"and not system_package_tool "
|
||
;; These expect GCC 5 to be available.
|
||
"and not test_reuse "
|
||
"and not test_install "
|
||
;; The installed configure script trips on the /bin/sh
|
||
;; shebang. We'd have to patch it in the Python code.
|
||
"and not test_autotools "
|
||
"and not test_use_build_virtualenv "
|
||
;; This test is architecture-dependent.
|
||
"and not test_toolchain_linux "
|
||
;; This one fails for unknown reasons (see:
|
||
;; https://github.com/conan-io/conan/issues/9671).
|
||
"and not test_build "
|
||
;; These tests expect the 'apt' command to be available.
|
||
"and not test_apt_check "
|
||
"and not test_apt_install_substitutes "
|
||
(if (not (string-prefix? "x86_64" system))
|
||
;; These tests either assume the machine is
|
||
;; x86_64, or require a cross-compiler to target
|
||
;; it.
|
||
(string-append
|
||
"and not cpp_package "
|
||
"and not exclude_code_analysis "
|
||
"and not cmakedeps_multi "
|
||
"and not locally_build_linux "
|
||
"and not custom_configuration "
|
||
"and not package_from_system "
|
||
"and not cross_build_command "
|
||
"and not test_package "
|
||
"and not test_deleted_os "
|
||
"and not test_same ")
|
||
"")
|
||
(if (not (or (string-prefix? "x86_64" system)
|
||
(string-prefix? "i686" system)))
|
||
;; These tests either assume the machine is i686,
|
||
;; or require a cross-compiler to target it.
|
||
(string-append
|
||
"and not vcvars_raises_when_not_found "
|
||
"and not conditional_generators "
|
||
"and not test_folders "
|
||
"and not settings_as_a_dict_conanfile ")
|
||
"")))))))))
|
||
(propagated-inputs
|
||
(list python-bottle
|
||
python-colorama
|
||
python-dateutil
|
||
python-distro
|
||
python-fasteners
|
||
python-future
|
||
python-jinja2
|
||
python-node-semver
|
||
python-patch-ng
|
||
python-pluginbase
|
||
python-pygments
|
||
python-pyjwt
|
||
python-pyyaml-5
|
||
python-requests
|
||
python-six
|
||
python-tqdm
|
||
python-urllib3))
|
||
(inputs
|
||
(list coreutils)) ;for printenv
|
||
(native-inputs
|
||
`(("autoconf" ,autoconf)
|
||
("automake" ,automake)
|
||
("cmake" ,cmake)
|
||
("git" ,git-minimal)
|
||
("meson" ,meson)
|
||
("ninja",ninja)
|
||
("pkg-config" ,pkg-config)
|
||
("python-bottle" ,python-bottle)
|
||
("python-mock" ,python-mock)
|
||
("python-parameterized" ,python-parameterized)
|
||
("python-pytest" ,python-pytest)
|
||
("python-pytest-xdist" ,python-pytest-xdist)
|
||
("python-webtest" ,python-webtest)
|
||
("which" ,which)))
|
||
(home-page "https://conan.io")
|
||
(synopsis "Decentralized C/C++ package manager")
|
||
(description "Conan is a package manager for C and C++ developers that
|
||
boasts the following features:
|
||
@itemize
|
||
@item
|
||
It is fully decentralized. Users can host their packages on their own private
|
||
servers.
|
||
@item
|
||
It can create, upload and download binaries for any configuration and
|
||
platform, including cross-compiled ones.
|
||
@item
|
||
It integrates with any build system, including CMake, Makefiles, Meson, etc.
|
||
@item
|
||
It is extensible; its Python-based recipes, together with extensions points
|
||
allow for great power and flexibility.
|
||
@end itemize")
|
||
(license license:expat)))
|
||
|
||
(define-public gwl
|
||
(package
|
||
(name "gwl")
|
||
(version "0.5.0")
|
||
(source (origin
|
||
(method url-fetch)
|
||
(uri (string-append "mirror://gnu/gwl/gwl-" version ".tar.gz"))
|
||
(sha256
|
||
(base32
|
||
"09r22gqgaj2mxvlwvfach5j1n66y3yggmzc6d2gxq7lyywbcvjvs"))))
|
||
(build-system gnu-build-system)
|
||
(arguments
|
||
`(#:parallel-build? #false ; for reproducibility
|
||
#:make-flags
|
||
'("GUILE_AUTO_COMPILE=0" "GWL_SKIP_INTEGRATION_TESTS=1")))
|
||
(native-inputs
|
||
(list autoconf automake pkg-config texinfo graphviz))
|
||
(inputs
|
||
(let ((p (package-input-rewriting
|
||
`((,guile-3.0 . ,guile-3.0-latest))
|
||
#:deep? #false)))
|
||
(list guix
|
||
guile-3.0-latest
|
||
(p guile-commonmark)
|
||
(p guile-config)
|
||
(p guile-drmaa)
|
||
(p guile-gcrypt)
|
||
(p guile-pfds)
|
||
(p guile-syntax-highlight)
|
||
(p guile-wisp))))
|
||
(home-page "https://workflows.guix.info")
|
||
(synopsis "Workflow management extension for GNU Guix")
|
||
(description "The @dfn{Guix Workflow Language} (GWL) provides an
|
||
extension to GNU Guix's declarative language for package management to
|
||
automate the execution of programs in scientific workflows. The GWL
|
||
can use process engines to integrate with various computing
|
||
environments.")
|
||
;; The Scheme modules in guix/ and gnu/ are licensed GPL3+,
|
||
;; the web interface modules in gwl/ are licensed AGPL3+,
|
||
;; and the fonts included in this package are licensed OFL1.1.
|
||
(license (list license:gpl3+ license:agpl3+ license:silofl1.1))))
|
||
|
||
(define-public gwl/next
|
||
(let ((commit "706a0895f639ed3ed77d0fe88382f51a6638b514")
|
||
(revision "1"))
|
||
(package
|
||
(inherit gwl)
|
||
(name "gwl-next")
|
||
(version (git-version "0.5.0" revision commit))
|
||
(source (origin
|
||
(method git-fetch)
|
||
(uri (git-reference
|
||
(url "https://git.savannah.gnu.org/git/gwl.git")
|
||
(commit commit)))
|
||
(file-name (git-file-name name version))
|
||
(sha256
|
||
(base32
|
||
"0k9zkdyyzir3fvlbcfcqy17k28b51i20rpbjwlx2i1mwd2pw9cxc")))))))
|
||
|
||
(define-public guix-build-coordinator
|
||
(let ((commit "31b3ab65da2d9a02f0453d12a81816b25c8ad75d")
|
||
(revision "60"))
|
||
(package
|
||
(name "guix-build-coordinator")
|
||
(version (git-version "0" revision commit))
|
||
(source (origin
|
||
(method git-fetch)
|
||
(uri (git-reference
|
||
(url "https://git.cbaines.net/git/guix/build-coordinator")
|
||
(commit commit)))
|
||
(sha256
|
||
(base32
|
||
"1hh1qy3xqpani3zfbm3wi4zw7f8cnbfjk4q1z7ynailadlfrkblk"))
|
||
(file-name (string-append name "-" version "-checkout"))))
|
||
(build-system gnu-build-system)
|
||
(arguments
|
||
`(#:modules (((guix build guile-build-system)
|
||
#:select (target-guile-effective-version))
|
||
,@%gnu-build-system-modules)
|
||
#:imported-modules ((guix build guile-build-system)
|
||
,@%gnu-build-system-modules)
|
||
#:phases
|
||
(modify-phases %standard-phases
|
||
(add-before 'build 'set-GUILE_AUTO_COMPILE
|
||
(lambda _
|
||
;; To avoid warnings relating to 'guild'.
|
||
(setenv "GUILE_AUTO_COMPILE" "0")
|
||
#t))
|
||
(add-after 'install 'wrap-executable
|
||
(lambda* (#:key inputs outputs target #:allow-other-keys)
|
||
(let* ((out (assoc-ref outputs "out"))
|
||
(bin (string-append out "/bin"))
|
||
(guile (assoc-ref inputs "guile"))
|
||
(version (target-guile-effective-version))
|
||
(scm (string-append out "/share/guile/site/" version))
|
||
(go (string-append out "/lib/guile/" version "/site-ccache")))
|
||
(for-each
|
||
(lambda (file)
|
||
(simple-format (current-error-port) "wrapping: ~A\n" file)
|
||
(let ((guile-inputs (list
|
||
"guile-json"
|
||
"guile-gcrypt"
|
||
"guix"
|
||
"guile-prometheus"
|
||
"guile-lib"
|
||
"guile-lzlib"
|
||
"guile-zlib"
|
||
"guile-sqlite3"
|
||
"gnutls"
|
||
,@(if (hurd-target?)
|
||
'()
|
||
'("guile-fibers")))))
|
||
(wrap-program file
|
||
`("PATH" ":" prefix
|
||
(,bin
|
||
;; Support building without sqitch as an input, as it
|
||
;; can't be cross-compiled yet
|
||
,@(or (and=> (assoc-ref inputs "sqitch")
|
||
list)
|
||
'())))
|
||
`("GUILE_LOAD_PATH" ":" prefix
|
||
(,scm ,(string-join
|
||
(map (lambda (input)
|
||
(simple-format
|
||
#f "~A/share/guile/site/~A"
|
||
(assoc-ref inputs input)
|
||
version))
|
||
guile-inputs)
|
||
":")))
|
||
`("GUILE_LOAD_COMPILED_PATH" ":" prefix
|
||
(,go ,(string-join
|
||
(map (lambda (input)
|
||
(simple-format
|
||
#f "~A/lib/guile/~A/site-ccache"
|
||
(assoc-ref inputs input)
|
||
version))
|
||
guile-inputs)
|
||
":"))))
|
||
(when target
|
||
;; XXX work around wrap-program picking bash for the
|
||
;; host rather than target
|
||
(let ((bash (assoc-ref inputs "bash")))
|
||
(substitute* file
|
||
(("^#!.*/bash")
|
||
(string-append "#! " bash "/bin/bash")))))))
|
||
(find-files bin)))
|
||
#t))
|
||
(delete 'strip)))) ; As the .go files aren't compatible
|
||
(native-inputs
|
||
(list pkg-config
|
||
autoconf
|
||
automake
|
||
gnutls
|
||
|
||
;; Guile libraries are needed here for cross-compilation.
|
||
guile-json-4
|
||
guile-gcrypt
|
||
guix
|
||
guile-prometheus
|
||
guile-fibers-1.1
|
||
guile-lib
|
||
(first (assoc-ref (package-native-inputs guix) "guile"))))
|
||
(inputs
|
||
(append
|
||
(list (first (assoc-ref (package-native-inputs guix) "guile"))
|
||
sqlite
|
||
bash-minimal)
|
||
(if (hurd-target?)
|
||
'()
|
||
(list sqitch))))
|
||
(propagated-inputs
|
||
(append
|
||
(list guile-prometheus
|
||
guile-gcrypt
|
||
guile-json-4
|
||
guile-lib
|
||
guile-lzlib
|
||
guile-zlib
|
||
guile-sqlite3
|
||
guix
|
||
gnutls)
|
||
(if (hurd-target?)
|
||
'()
|
||
(list guile-fibers-1.1))))
|
||
(home-page "https://git.cbaines.net/guix/build-coordinator/")
|
||
(synopsis "Tool to help build derivations")
|
||
(description
|
||
"The Guix Build Coordinator helps with performing lots of builds across
|
||
potentially many machines, and with doing something with the results and
|
||
outputs of those builds.")
|
||
(license license:gpl3+))))
|
||
|
||
(define-public guix-build-coordinator/agent-only
|
||
(package
|
||
(inherit guix-build-coordinator)
|
||
(name "guix-build-coordinator-agent-only")
|
||
(arguments
|
||
`(#:modules (((guix build guile-build-system)
|
||
#:select (target-guile-effective-version))
|
||
,@%gnu-build-system-modules)
|
||
#:imported-modules ((guix build guile-build-system)
|
||
,@%gnu-build-system-modules)
|
||
#:phases
|
||
(modify-phases %standard-phases
|
||
(add-before 'build 'set-GUILE_AUTO_COMPILE
|
||
(lambda _
|
||
;; To avoid warnings relating to 'guild'.
|
||
(setenv "GUILE_AUTO_COMPILE" "0")
|
||
#t))
|
||
(add-after 'install 'wrap-executable
|
||
(lambda* (#:key inputs outputs target #:allow-other-keys)
|
||
(let* ((out (assoc-ref outputs "out"))
|
||
(bin (string-append out "/bin"))
|
||
(guile (assoc-ref inputs "guile"))
|
||
(version (target-guile-effective-version))
|
||
(scm (string-append out "/share/guile/site/" version))
|
||
(go (string-append out "/lib/guile/" version "/site-ccache")))
|
||
(for-each
|
||
(lambda (file)
|
||
(simple-format (current-error-port) "wrapping: ~A\n" file)
|
||
(let ((guile-inputs (list
|
||
"guile-json"
|
||
"guile-gcrypt"
|
||
"guix"
|
||
"guile-prometheus"
|
||
"guile-lib"
|
||
"guile-lzlib"
|
||
"guile-zlib"
|
||
"guile-sqlite3"
|
||
"gnutls")))
|
||
(wrap-program file
|
||
`("PATH" ":" prefix (,bin))
|
||
`("GUILE_LOAD_PATH" ":" prefix
|
||
(,scm ,(string-join
|
||
(map (lambda (input)
|
||
(simple-format
|
||
#f "~A/share/guile/site/~A"
|
||
(assoc-ref inputs input)
|
||
version))
|
||
guile-inputs)
|
||
":")))
|
||
`("GUILE_LOAD_COMPILED_PATH" ":" prefix
|
||
(,go ,(string-join
|
||
(map (lambda (input)
|
||
(simple-format
|
||
#f "~A/lib/guile/~A/site-ccache"
|
||
(assoc-ref inputs input)
|
||
version))
|
||
guile-inputs)
|
||
":"))))))
|
||
(find-files bin)))
|
||
#t))
|
||
(delete 'strip)))) ; As the .go files aren't compatible
|
||
(native-inputs
|
||
(list pkg-config
|
||
autoconf
|
||
automake
|
||
gnutls
|
||
|
||
;; Guile libraries are needed here for cross-compilation.
|
||
guile-json-4
|
||
guile-gcrypt
|
||
guix
|
||
guile-prometheus
|
||
guile-lib
|
||
(first (assoc-ref (package-native-inputs guix) "guile"))))
|
||
(inputs
|
||
(list (first (assoc-ref (package-native-inputs guix) "guile"))
|
||
bash-minimal))
|
||
(propagated-inputs
|
||
(append
|
||
(list guile-prometheus
|
||
guile-gcrypt
|
||
guile-json-4
|
||
guile-lib
|
||
guile-lzlib
|
||
guile-zlib
|
||
guix
|
||
gnutls)))
|
||
(description
|
||
"The Guix Build Coordinator helps with performing lots of builds across
|
||
potentially many machines, and with doing something with the results and
|
||
outputs of those builds.
|
||
|
||
This package just includes the agent component.")))
|
||
|
||
(define-public guix-jupyter
|
||
(package
|
||
(name "guix-jupyter")
|
||
(version "0.2.2")
|
||
(home-page "https://gitlab.inria.fr/guix-hpc/guix-kernel")
|
||
(source (origin
|
||
(method git-fetch)
|
||
(uri (git-reference (url home-page)
|
||
(commit (string-append "v" version))))
|
||
(sha256
|
||
(base32
|
||
"17m6970wnvwlbarq4gxz5bakhzyhq5ch8qd8jw55ydccpv6473kq"))
|
||
(file-name (string-append "guix-jupyter-" version "-checkout"))))
|
||
(build-system gnu-build-system)
|
||
(arguments
|
||
`(#:modules ((srfi srfi-26)
|
||
(ice-9 match)
|
||
(ice-9 popen)
|
||
(ice-9 rdelim)
|
||
(guix build utils)
|
||
(guix build gnu-build-system))
|
||
#:phases
|
||
(modify-phases %standard-phases
|
||
(add-after 'install 'sed-kernel-json
|
||
(lambda* (#:key inputs outputs #:allow-other-keys)
|
||
(let* ((out (assoc-ref outputs "out"))
|
||
(guix (assoc-ref inputs "guix"))
|
||
(guile (assoc-ref inputs "guile"))
|
||
(json (assoc-ref inputs "guile-json"))
|
||
(git (assoc-ref inputs "guile-git"))
|
||
(bs (assoc-ref inputs "guile-bytestructures"))
|
||
(s-zmq (assoc-ref inputs "guile-simple-zmq"))
|
||
(gcrypt (assoc-ref inputs "guile-gcrypt"))
|
||
(deps (list out s-zmq guix json git bs gcrypt))
|
||
(effective
|
||
(read-line
|
||
(open-pipe* OPEN_READ
|
||
(string-append guile "/bin/guile")
|
||
"-c" "(display (effective-version))")))
|
||
(path (map (cut string-append "-L\", \"" <>
|
||
"/share/guile/site/"
|
||
effective)
|
||
deps))
|
||
(gopath (map (cut string-append "-C\", \"" <>
|
||
"/lib/guile/" effective
|
||
"/site-ccache")
|
||
deps))
|
||
(kernel-dir (string-append out "/share/jupyter/kernels/guix/")))
|
||
(substitute* (string-append kernel-dir "kernel.json")
|
||
(("-s")
|
||
(string-join
|
||
(list (string-join path "\",\n\t\t\"")
|
||
(string-join gopath "\",\n\t\t\"")
|
||
"-s")
|
||
"\",\n\t\t\""))
|
||
(("guix-jupyter-kernel.scm")
|
||
(string-append out "/share/guile/site/3.0/"
|
||
"guix-jupyter-kernel.scm")))
|
||
#t))))))
|
||
(native-inputs
|
||
(list autoconf
|
||
automake
|
||
pkg-config
|
||
;; For testing.
|
||
jupyter
|
||
python-ipython
|
||
python-ipykernel))
|
||
(inputs
|
||
`(("guix" ,guix)
|
||
("guile" ,@(assoc-ref (package-native-inputs guix) "guile"))))
|
||
(propagated-inputs
|
||
(list guile-json-4 guile-simple-zmq guile-gcrypt))
|
||
(synopsis "Guix kernel for Jupyter")
|
||
(description
|
||
"Guix-Jupyter is a Jupyter kernel. It allows you to annotate notebooks
|
||
with information about their software dependencies, such that code is executed
|
||
in the right software environment. Guix-Jupyter spawns the actual kernels
|
||
such as @code{python-ipykernel} on behalf of the notebook user and runs them
|
||
in an isolated environment, in separate namespaces.")
|
||
(license license:gpl3+)))
|
||
|
||
(define-public nar-herder
|
||
(let ((commit "5acfcc0a9d99d78a167c365534aa5bf592f5625e")
|
||
(revision "9"))
|
||
(package
|
||
(name "nar-herder")
|
||
(version (git-version "0" revision commit))
|
||
(source (origin
|
||
(method git-fetch)
|
||
(uri (git-reference
|
||
(url "https://git.cbaines.net/git/guix/nar-herder")
|
||
(commit commit)))
|
||
(sha256
|
||
(base32
|
||
"1mxdkay3l1la7b6m0455s8cansd6qcdhv0k231aik0ayhbck8kby"))
|
||
(file-name (string-append name "-" version "-checkout"))))
|
||
(build-system gnu-build-system)
|
||
(arguments
|
||
`(#:modules (((guix build guile-build-system)
|
||
#:select (target-guile-effective-version))
|
||
,@%gnu-build-system-modules)
|
||
#:imported-modules ((guix build guile-build-system)
|
||
,@%gnu-build-system-modules)
|
||
#:phases
|
||
(modify-phases %standard-phases
|
||
(add-before 'build 'set-GUILE_AUTO_COMPILE
|
||
(lambda _
|
||
;; To avoid warnings relating to 'guild'.
|
||
(setenv "GUILE_AUTO_COMPILE" "0")))
|
||
(add-after 'install 'wrap-executable
|
||
(lambda* (#:key inputs outputs target #:allow-other-keys)
|
||
(let* ((out (assoc-ref outputs "out"))
|
||
(bin (string-append out "/bin"))
|
||
(guile (assoc-ref inputs "guile"))
|
||
(version (target-guile-effective-version))
|
||
(scm (string-append out "/share/guile/site/" version))
|
||
(go (string-append out "/lib/guile/" version "/site-ccache")))
|
||
(for-each
|
||
(lambda (file)
|
||
(simple-format (current-error-port) "wrapping: ~A\n" file)
|
||
(let ((guile-inputs (list
|
||
"guile-json"
|
||
"guile-gcrypt"
|
||
"guix"
|
||
"guile-lib"
|
||
"guile-lzlib"
|
||
"guile-prometheus"
|
||
"guile-sqlite3"
|
||
"gnutls"
|
||
"guile-fibers")))
|
||
(wrap-program file
|
||
`("GUILE_LOAD_PATH" ":" prefix
|
||
(,scm ,(string-join
|
||
(map (lambda (input)
|
||
(string-append
|
||
(assoc-ref inputs input)
|
||
"/share/guile/site/"
|
||
version))
|
||
guile-inputs)
|
||
":")))
|
||
`("GUILE_LOAD_COMPILED_PATH" ":" prefix
|
||
(,go ,(string-join
|
||
(map (lambda (input)
|
||
(string-append
|
||
(assoc-ref inputs input)
|
||
"/lib/guile/" version "/site-ccache"))
|
||
guile-inputs)
|
||
":"))))))
|
||
(find-files bin)))
|
||
#t))
|
||
(delete 'strip)))) ; As the .go files aren't compatible
|
||
(native-inputs
|
||
(list pkg-config
|
||
autoconf
|
||
automake
|
||
gnutls
|
||
|
||
;; Guile libraries are needed here for cross-compilation.
|
||
(car (assoc-ref (package-native-inputs guix) "guile"))
|
||
guile-json-4
|
||
guile-gcrypt
|
||
guix
|
||
guile-fibers-1.1
|
||
guile-prometheus
|
||
guile-lib
|
||
guile-lzlib
|
||
guile-sqlite3))
|
||
(inputs
|
||
(list bash-minimal
|
||
(car (assoc-ref (package-native-inputs guix) "guile"))))
|
||
(propagated-inputs
|
||
(list guile-json-4
|
||
guile-gcrypt
|
||
guix
|
||
guile-fibers-1.1
|
||
guile-prometheus
|
||
guile-lib
|
||
guile-lzlib
|
||
guile-sqlite3
|
||
gnutls))
|
||
(home-page "https://git.cbaines.net/guix/nar-herder")
|
||
(synopsis "Utility for managing and serving nars")
|
||
(description
|
||
"The Nar Herder is a utility for managing a collection of
|
||
nars (normalized archives, in the context of Guix) along with the
|
||
corresponding narinfo files which contain some signed metadata.
|
||
|
||
It can assist in serving a collection of nars, moving them between machines,
|
||
or mirroring an existing collection of nars.
|
||
|
||
It's currently a working prototype, many designed features aren't implemented,
|
||
and the error handling is very rough.")
|
||
(license license:agpl3+))))
|
||
|
||
(define-public gcab
|
||
(package
|
||
(name "gcab")
|
||
(version "1.4")
|
||
(source (origin
|
||
(method url-fetch)
|
||
(uri (string-append "mirror://gnome/sources/gcab/"
|
||
version "/gcab-" version ".tar.xz"))
|
||
(sha256
|
||
(base32
|
||
"13q43iqld4l50yra45lhvkd376pn6qpk7rkx374zn8y9wsdzm9b7"))))
|
||
(build-system meson-build-system)
|
||
(native-inputs
|
||
`(("glib:bin" ,glib "bin") ; for glib-mkenums
|
||
("intltool" ,intltool)
|
||
("pkg-config" ,pkg-config)
|
||
("vala" ,vala)))
|
||
(inputs
|
||
(list glib zlib))
|
||
(arguments
|
||
`(#:configure-flags
|
||
;; XXX This ‘documentation’ is for developers, and fails informatively:
|
||
;; Error in gtkdoc helper script: 'gtkdoc-mkhtml' failed with status 5
|
||
(list "-Ddocs=false"
|
||
"-Dintrospection=false")))
|
||
(home-page "https://wiki.gnome.org/msitools") ; no dedicated home page
|
||
(synopsis "Microsoft Cabinet file manipulation library")
|
||
(description
|
||
"The libgcab library provides GObject functions to read, write, and modify
|
||
Microsoft cabinet (.@dfn{CAB}) files.")
|
||
(license (list license:gpl2+ ; tests/testsuite.at
|
||
license:lgpl2.1+)))) ; the rest
|
||
|
||
(define-public msitools
|
||
(package
|
||
(name "msitools")
|
||
(version "0.100")
|
||
(source (origin
|
||
(method url-fetch)
|
||
(uri (string-append "mirror://gnome/sources/msitools/"
|
||
version "/msitools-" version ".tar.xz"))
|
||
(sha256
|
||
(base32
|
||
"1skq17qr2ic4qr3779j49byfm8rncwbsq9rj1a33ncn2m7isdwdv"))))
|
||
(build-system gnu-build-system)
|
||
(native-inputs
|
||
(list bison pkg-config))
|
||
(inputs
|
||
(list gcab glib libgsf libxml2
|
||
`(,util-linux "lib")))
|
||
(home-page "https://wiki.gnome.org/msitools")
|
||
(synopsis "Windows Installer file manipulation tool")
|
||
(description
|
||
"msitools is a collection of command-line tools to inspect, extract, build,
|
||
and sign Windows@tie{}Installer (.@dfn{MSI}) files. It aims to be a solution
|
||
for packaging and deployment of cross-compiled Windows applications.")
|
||
(license license:lgpl2.1+)))
|
||
|
||
(define-public libostree
|
||
(package
|
||
(name "libostree")
|
||
(version "2022.5")
|
||
(source
|
||
(origin
|
||
(method url-fetch)
|
||
(uri (string-append
|
||
"https://github.com/ostreedev/ostree/releases/download/v"
|
||
(version-major+minor version) "/libostree-" version ".tar.xz"))
|
||
(sha256
|
||
(base32 "0gq53g601x09gc4ips6n3zmmdaz8zyv235xf63fxf4f17fclsk4i"))))
|
||
(build-system gnu-build-system)
|
||
(arguments
|
||
'(#:phases
|
||
(modify-phases %standard-phases
|
||
(add-before 'check 'pre-check
|
||
(lambda _
|
||
;; Don't try to use the non-existing '/var/tmp' as test
|
||
;; directory.
|
||
(setenv "TEST_TMPDIR" (getenv "TMPDIR")))))
|
||
;; XXX: fails with:
|
||
;; tap-driver.sh: missing test plan
|
||
;; tap-driver.sh: internal error getting exit status
|
||
;; tap-driver.sh: fatal: I/O or internal error
|
||
#:tests? #f))
|
||
(native-inputs
|
||
(list attr ; for tests
|
||
bison
|
||
`(,glib "bin") ; for 'glib-mkenums'
|
||
gobject-introspection
|
||
pkg-config
|
||
libxslt))
|
||
(inputs
|
||
(list avahi
|
||
docbook-xml
|
||
docbook-xsl
|
||
e2fsprogs
|
||
fuse
|
||
glib
|
||
gpgme
|
||
libarchive
|
||
libsoup-minimal-2 ; needs libsoup-2.4
|
||
util-linux))
|
||
(home-page "https://ostree.readthedocs.io/en/latest/")
|
||
(synopsis "Operating system and container binary deployment and upgrades")
|
||
(description
|
||
"@code{libostree} is both a shared library and suite of command line
|
||
tools that combines a \"git-like\" model for committing and downloading
|
||
bootable file system trees, along with a layer for deploying them and managing
|
||
the boot loader configuration.")
|
||
(license license:lgpl2.0+)))
|
||
|
||
(define-public flatpak
|
||
(package
|
||
(name "flatpak")
|
||
(version "1.12.7")
|
||
(source
|
||
(origin
|
||
(method url-fetch)
|
||
(uri (string-append "https://github.com/flatpak/flatpak/releases/download/"
|
||
version "/flatpak-" version ".tar.xz"))
|
||
(sha256
|
||
(base32 "05lkpbjiwp69q924i1jfyk5frcqbdbv9kyzbqwm2hy723i9jmdbd"))
|
||
(patches
|
||
(search-patches "flatpak-fix-path.patch"
|
||
"flatpak-unset-gdk-pixbuf-for-sandbox.patch"))))
|
||
|
||
;; Wrap 'flatpak' so that GIO_EXTRA_MODULES is set, thereby allowing GIO to
|
||
;; find the TLS backend in glib-networking.
|
||
(build-system glib-or-gtk-build-system)
|
||
|
||
(arguments
|
||
(list
|
||
#:configure-flags
|
||
#~(list
|
||
"--enable-documentation=no" ;; FIXME
|
||
"--enable-system-helper=no"
|
||
"--localstatedir=/var"
|
||
(string-append "--with-system-bubblewrap="
|
||
(assoc-ref %build-inputs "bubblewrap")
|
||
"/bin/bwrap")
|
||
(string-append "--with-system-dbus-proxy="
|
||
(assoc-ref %build-inputs "xdg-dbus-proxy")
|
||
"/bin/xdg-dbus-proxy"))
|
||
#:phases
|
||
#~(modify-phases %standard-phases
|
||
(add-after 'unpack 'fix-tests
|
||
(lambda* (#:key inputs #:allow-other-keys)
|
||
(copy-recursively
|
||
(search-input-directory inputs "lib/locale")
|
||
"/tmp/locale")
|
||
(for-each make-file-writable (find-files "/tmp"))
|
||
(substitute* "tests/make-test-runtime.sh"
|
||
(("cp `which.*") "echo guix\n")
|
||
(("cp -r /usr/lib/locale/C\\.\\*")
|
||
(string-append "mkdir ${DIR}/usr/lib/locale/en_US; \
|
||
cp -r /tmp/locale/*/en_US.*")))
|
||
(substitute* "tests/libtest.sh"
|
||
(("/bin/kill") (which "kill"))
|
||
(("/usr/bin/python3") (which "python3")))
|
||
#t))
|
||
(add-after 'unpack 'p11-kit-fix
|
||
(lambda* (#:key inputs #:allow-other-keys)
|
||
(let ((p11-path (search-input-file inputs "/bin/p11-kit")))
|
||
(substitute* "session-helper/flatpak-session-helper.c"
|
||
(("\"p11-kit\",")
|
||
(string-append "\"" p11-path "\","))
|
||
(("if \\(g_find_program_in_path \\(\"p11-kit\"\\)\\)")
|
||
(string-append "if (g_find_program_in_path (\""
|
||
p11-path "\"))"))))))
|
||
;; Many tests fail for unknown reasons, so we just run a few basic
|
||
;; tests.
|
||
(replace 'check
|
||
(lambda _
|
||
(setenv "HOME" "/tmp")
|
||
(invoke "make" "check"
|
||
"TESTS=tests/test-basic.sh tests/test-config.sh testcommon"))))))
|
||
(native-inputs
|
||
(list bison
|
||
dbus ; for dbus-daemon
|
||
gettext-minimal
|
||
`(,glib "bin") ; for glib-mkenums + gdbus-codegen
|
||
glibc-utf8-locales
|
||
gobject-introspection
|
||
libcap
|
||
pkg-config
|
||
python
|
||
python-pyparsing
|
||
socat
|
||
which))
|
||
(inputs
|
||
(list appstream-glib
|
||
bubblewrap
|
||
dconf
|
||
fuse
|
||
gdk-pixbuf
|
||
gpgme
|
||
json-glib
|
||
libarchive
|
||
libostree
|
||
libseccomp
|
||
libsoup-minimal-2
|
||
libxau
|
||
libxml2
|
||
p11-kit-next
|
||
util-linux
|
||
xdg-dbus-proxy))
|
||
(propagated-inputs (list glib-networking gnupg gsettings-desktop-schemas))
|
||
(home-page "https://flatpak.org")
|
||
(synopsis "System for building, distributing, and running sandboxed desktop
|
||
applications")
|
||
(description "Flatpak is a system for building, distributing, and running
|
||
sandboxed desktop applications on GNU/Linux.")
|
||
(license license:lgpl2.1+)))
|
||
|
||
(define-public akku
|
||
(package
|
||
(name "akku")
|
||
(version "1.1.0")
|
||
(source (origin
|
||
(method git-fetch)
|
||
(uri (git-reference
|
||
(url "https://gitlab.com/akkuscm/akku.git")
|
||
(commit (string-append "v" version))))
|
||
(file-name (git-file-name name version))
|
||
(sha256 (base32 "1pi18aamg1fd6f9ynfl7zx92052xzf0zwmhi2pwcwjs1kbah19f5"))))
|
||
(build-system gnu-build-system)
|
||
(arguments
|
||
'(#:phases (modify-phases %standard-phases
|
||
(replace 'bootstrap
|
||
(lambda* (#:key outputs #:allow-other-keys)
|
||
(for-each patch-shebang
|
||
'("bootstrap"
|
||
".akku/env"))
|
||
(let* ((home "/tmp")
|
||
(datadir (string-append home "/.local/share/akku/")))
|
||
(mkdir-p datadir)
|
||
(invoke "touch" (string-append datadir "index.db"))
|
||
(setenv "HOME" home))
|
||
(invoke "./bootstrap")
|
||
#t))
|
||
(add-after 'install 'wrap-executables
|
||
(lambda* (#:key outputs inputs #:allow-other-keys)
|
||
(let ((out (assoc-ref outputs "out"))
|
||
(curl (assoc-ref inputs "curl")))
|
||
(wrap-program (string-append out "/bin/akku")
|
||
`("LD_LIBRARY_PATH" ":" prefix (,(string-append curl "/lib"))))
|
||
#t))))))
|
||
(native-inputs
|
||
(list which autoconf automake pkg-config))
|
||
(inputs
|
||
(list guile-3.0 curl))
|
||
(home-page "https://akkuscm.org/")
|
||
(synopsis "Language package manager for Scheme")
|
||
(description
|
||
"Akku.scm is a project-based language package manager for R6RS and R7RS Scheme.
|
||
It is mainly meant for programmers who develop portable programs or libraries in Scheme,
|
||
but could potentially work for end-users of those programs. It also has a translator
|
||
from R7RS, which allows most R7RS code to run on R6RS implementations.")
|
||
(license license:gpl3+)))
|
||
|
||
(define-public modules
|
||
(package
|
||
(name "modules")
|
||
(version "4.8.0")
|
||
(source
|
||
(origin
|
||
(method url-fetch)
|
||
(uri (string-append "mirror://sourceforge/modules/Modules/modules-"
|
||
version "/modules-" version ".tar.bz2"))
|
||
(sha256 (base32 "1amz8qdqbvfdc8jv0j4720vywbz2gi7l3sr1lh37ilfbxy9lq9g9"))))
|
||
(build-system gnu-build-system)
|
||
(arguments
|
||
`(#:configure-flags
|
||
(list (string-append "--with-bin-search-path="
|
||
(assoc-ref %build-inputs "tcl") "/bin" ":"
|
||
(assoc-ref %build-inputs "procps") "/bin" ":"
|
||
(assoc-ref %build-inputs "less") "/bin" ":"
|
||
(assoc-ref %build-inputs "coreutils") "/bin")
|
||
(string-append "--with-tcl=" (assoc-ref %build-inputs "tcl") "/lib")
|
||
"--disable-compat-version")
|
||
#:test-target "test"
|
||
#:phases
|
||
(modify-phases %standard-phases
|
||
(add-before 'configure 'patch-add-modules
|
||
(lambda* (#:key inputs #:allow-other-keys)
|
||
(let ((coreutils (assoc-ref inputs "coreutils")))
|
||
(substitute* "script/add.modules.in"
|
||
(("/bin/(cat|cp|rm)" _ command)
|
||
(string-append coreutils "/bin/" command))
|
||
(("/bin/echo")
|
||
"echo")))))
|
||
(add-before 'configure 'patch-scripts-for-python-3
|
||
(lambda _
|
||
;; Patch the script for python-3.
|
||
(substitute* "script/createmodule.py.in"
|
||
(("pathkeys.sort\\(\\)") "pathkeys = sorted(pathkeys)")
|
||
(("print\\(\"\\\\t\"\\*") "print(\"\\t\"*int")
|
||
(("@PYTHON@") (which "python3")))))
|
||
(add-before 'check 'patch-/bin/sh-and-nixbld-groups-in-tests
|
||
(lambda _
|
||
(use-modules (srfi srfi-1))
|
||
(let* ((groups-file (string-append (getcwd) "/nixbld-groups"))
|
||
(groups-file-z (string-append groups-file "-z"))
|
||
(nixbld-groups
|
||
(fold
|
||
(lambda (id prev)
|
||
(catch #t
|
||
(lambda () (cons (group:name (getgrnam id)) prev))
|
||
(lambda _ prev)))
|
||
'()
|
||
(vector->list (getgroups)))))
|
||
;; Simulate "id -G -n" command output.
|
||
(call-with-output-file groups-file
|
||
(lambda (port)
|
||
(display (string-join nixbld-groups " ") port)
|
||
(display #\newline port)))
|
||
;; Simulate "id -G -n -z" command output.
|
||
(call-with-output-file groups-file-z
|
||
(lambda (port)
|
||
(for-each
|
||
(lambda (group-name)
|
||
(display group-name port)
|
||
(display #\null port))
|
||
nixbld-groups)))
|
||
;; Generate "modulecmd-test.tcl" before running "make test".
|
||
(invoke "make" "modulecmd-test.tcl")
|
||
;; Substitute shell.
|
||
(substitute*
|
||
'("modulecmd-test.tcl"
|
||
"modulecmd.tcl"
|
||
"testsuite/modules.70-maint/380-edit.exp"
|
||
"compat/init/filter")
|
||
(("/bin/sh") (which "sh")))
|
||
;; Skip tests that use supplementary groups.
|
||
(for-each
|
||
delete-file
|
||
'("testsuite/modules.20-locate/112-hide-user-group.exp"
|
||
"testsuite/modules.20-locate/117-forbid-user-group.exp"
|
||
"testsuite/modules.20-locate/119-hide-cascading.exp"
|
||
"testsuite/modules.50-cmds/140-system.exp"
|
||
"testsuite/modules.50-cmds/287-info-usergroups.exp"
|
||
"testsuite/modules.50-cmds/440-module-tag.exp"
|
||
"testsuite/modules.70-maint/220-config.exp"))
|
||
(for-each
|
||
(lambda (file)
|
||
(substitute* file
|
||
(("/bin/sh") (which "bash"))
|
||
;; For some reason "kvm" group cannot be resolved for
|
||
;; "nixbld" user. We replace "id ..." commands with
|
||
;; "cat ..." that simulates them.
|
||
(("exec id -G -n -z") (string-append "exec cat " groups-file-z))
|
||
(("exec id -G -n") (string-append "exec cat " groups-file))))
|
||
'("testsuite/modules.00-init/005-init_ts.exp"
|
||
"testsuite/install.00-init/005-init_ts.exp"
|
||
"modulecmd-test.tcl"))))))))
|
||
(native-inputs
|
||
(list dejagnu autoconf which))
|
||
(inputs
|
||
(list tcl less procps coreutils python-3))
|
||
(home-page "http://modules.sourceforge.net/")
|
||
(synopsis "Shell environment variables and aliases management")
|
||
(description "Modules simplify shell initialization and let users
|
||
modify their environment during the session with modulefiles. Modules are
|
||
used on high-performance clusters to dynamically add and remove paths
|
||
to specific versions of applications.")
|
||
(license license:gpl2+)))
|