uboot: (firmwareOdroidC2/C4) don't invoke patch tool, use patches = [] instead
https://github.com/NixOS/nixpkgs/blob/master/pkgs/stdenv/generic/setup.sh#L948 this can do it nicely. Signed-off-by: Anton Arapov <anton@deadbeef.mx>
This commit is contained in:
commit
56de2bcd43
30691 changed files with 3076956 additions and 0 deletions
|
|
@ -0,0 +1,13 @@
|
|||
diff --git a/gir/cairo-1.0.gir.in b/gir/cairo-1.0.gir.in
|
||||
index e4c9fb3d..3351b184 100644
|
||||
--- a/gir/cairo-1.0.gir.in
|
||||
+++ b/gir/cairo-1.0.gir.in
|
||||
@@ -6,7 +6,7 @@
|
||||
<package name="@CAIRO_GIR_PACKAGE@"/>
|
||||
<c:include name="cairo-gobject.h"/>
|
||||
<namespace name="cairo" version="1.0"
|
||||
- shared-library="@CAIRO_SHARED_LIBRARY@"
|
||||
+ shared-library="@cairoLib@/@CAIRO_SHARED_LIBRARY@"
|
||||
c:identifier-prefixes="cairo"
|
||||
c:symbol-prefixes="cairo">
|
||||
<record name="Context" c:type="cairo_t" foreign="1"
|
||||
|
|
@ -0,0 +1,192 @@
|
|||
diff --git a/giscanner/scannermain.py b/giscanner/scannermain.py
|
||||
index 64575557..1eb0a2b4 100644
|
||||
--- a/giscanner/scannermain.py
|
||||
+++ b/giscanner/scannermain.py
|
||||
@@ -95,6 +95,39 @@ def get_windows_option_group(parser):
|
||||
return group
|
||||
|
||||
|
||||
+def _get_default_fallback_libpath():
|
||||
+ # Newer multiple-output-optimized stdenv has an environment variable
|
||||
+ # $outputLib which in turn specifies another variable which then is used as
|
||||
+ # the destination for the library contents (${!outputLib}/lib).
|
||||
+ store_path = os.environ.get(os.environ.get("outputLib")) if "outputLib" in os.environ else None
|
||||
+ if store_path is None:
|
||||
+ outputs = os.environ.get("outputs", "out").split()
|
||||
+ if "lib" in outputs:
|
||||
+ # For multiple output derivations let's try whether there is a $lib
|
||||
+ # environment variable and use that as the base store path.
|
||||
+ store_path = os.environ.get("lib")
|
||||
+ elif "out" in outputs:
|
||||
+ # Otherwise we have a single output derivation, so the libraries
|
||||
+ # most certainly will end up in "$out/lib".
|
||||
+ store_path = os.environ.get("out")
|
||||
+
|
||||
+ if store_path is not None:
|
||||
+ # Even if we have a $lib as output, there still should be a $lib/lib
|
||||
+ # directory.
|
||||
+ return os.path.join(store_path, 'lib')
|
||||
+ else:
|
||||
+ # If we haven't found a possible scenario, let's return an empty string
|
||||
+ # so that the shared library won't be prepended with a path.
|
||||
+ #
|
||||
+ # Note that this doesn't mean that all hope is lost, because after all
|
||||
+ # we can still use --fallback-library-path to set one.
|
||||
+ #
|
||||
+ # Also, we're not returning None, because that would make it very
|
||||
+ # difficult to disable adding fallback paths altogether using something
|
||||
+ # like: --fallback-library-path=""
|
||||
+ return ""
|
||||
+
|
||||
+
|
||||
def _get_option_parser():
|
||||
parser = optparse.OptionParser('%prog [options] sources',
|
||||
version='%prog ' + giscanner.__version__)
|
||||
@@ -214,6 +247,10 @@ match the namespace prefix.""")
|
||||
parser.add_option("", "--c-include",
|
||||
action="append", dest="c_includes", default=[],
|
||||
help="headers which should be included in C programs")
|
||||
+ parser.add_option("", "--fallback-library-path",
|
||||
+ action="store", dest="fallback_libpath",
|
||||
+ default=_get_default_fallback_libpath(),
|
||||
+ help="Path to prepend to unknown shared libraries")
|
||||
parser.add_option("", "--filelist",
|
||||
action="store", dest="filelist", default=[],
|
||||
help="file containing headers and sources to be scanned")
|
||||
diff --git a/giscanner/shlibs.py b/giscanner/shlibs.py
|
||||
index 9f8ab5df..af325022 100644
|
||||
--- a/giscanner/shlibs.py
|
||||
+++ b/giscanner/shlibs.py
|
||||
@@ -57,6 +57,12 @@ def _ldd_library_pattern(library_name):
|
||||
$""" % re.escape(library_name), re.VERBOSE)
|
||||
|
||||
|
||||
+def _ldd_library_nix_pattern(library_name):
|
||||
+ nix_store_dir = re.escape('@nixStoreDir@'.rstrip('/'))
|
||||
+ pattern = r'(%s(?:/[^/]*)+lib%s[^A-Za-z0-9_-][^\s\(\)]*)'
|
||||
+ return re.compile(pattern % (nix_store_dir, re.escape(library_name)))
|
||||
+
|
||||
+
|
||||
# This is a what we do for non-la files. We assume that we are on an
|
||||
# ELF-like system where ldd exists and the soname extracted with ldd is
|
||||
# a filename that can be opened with dlopen().
|
||||
@@ -108,7 +114,8 @@ def _resolve_non_libtool(options, binary, libraries):
|
||||
output = output.decode("utf-8", "replace")
|
||||
|
||||
shlibs = resolve_from_ldd_output(libraries, output)
|
||||
- return list(map(sanitize_shlib_path, shlibs))
|
||||
+ fallback_libpath = options.fallback_libpath or "";
|
||||
+ return list(map(lambda p: os.path.join(fallback_libpath, p), map(sanitize_shlib_path, shlibs)))
|
||||
|
||||
|
||||
def sanitize_shlib_path(lib):
|
||||
@@ -117,19 +124,18 @@ def sanitize_shlib_path(lib):
|
||||
# In case we get relative paths on macOS (like @rpath) then we fall
|
||||
# back to the basename as well:
|
||||
# https://gitlab.gnome.org/GNOME/gobject-introspection/issues/222
|
||||
- if sys.platform == "darwin":
|
||||
- if not os.path.isabs(lib):
|
||||
- return os.path.basename(lib)
|
||||
- return lib
|
||||
- else:
|
||||
+
|
||||
+ # Always use absolute paths if available
|
||||
+ if not os.path.isabs(lib):
|
||||
return os.path.basename(lib)
|
||||
+ return lib
|
||||
|
||||
|
||||
def resolve_from_ldd_output(libraries, output):
|
||||
patterns = {}
|
||||
for library in libraries:
|
||||
if not os.path.isfile(library):
|
||||
- patterns[library] = _ldd_library_pattern(library)
|
||||
+ patterns[library] = (_ldd_library_pattern(library), _ldd_library_nix_pattern(library))
|
||||
if len(patterns) == 0:
|
||||
return []
|
||||
|
||||
@@ -141,8 +147,11 @@ def resolve_from_ldd_output(libraries, output):
|
||||
if line.endswith(':'):
|
||||
continue
|
||||
for word in line.split():
|
||||
- for library, pattern in patterns.items():
|
||||
- m = pattern.match(word)
|
||||
+ for library, (pattern, nix_pattern) in patterns.items():
|
||||
+ if line.find('@nixStoreDir@') != -1:
|
||||
+ m = nix_pattern.match(word)
|
||||
+ else:
|
||||
+ m = pattern.match(word)
|
||||
if m:
|
||||
del patterns[library]
|
||||
shlibs.append(m.group())
|
||||
diff --git a/giscanner/utils.py b/giscanner/utils.py
|
||||
index 31c7ea48..630002a8 100644
|
||||
--- a/giscanner/utils.py
|
||||
+++ b/giscanner/utils.py
|
||||
@@ -114,16 +114,11 @@ def extract_libtool_shlib(la_file):
|
||||
if dlname is None:
|
||||
return None
|
||||
|
||||
- # Darwin uses absolute paths where possible; since the libtool files never
|
||||
- # contain absolute paths, use the libdir field
|
||||
- if platform.system() == 'Darwin':
|
||||
- dlbasename = os.path.basename(dlname)
|
||||
- libdir = _extract_libdir_field(la_file)
|
||||
- if libdir is None:
|
||||
- return dlbasename
|
||||
- return libdir + '/' + dlbasename
|
||||
- # Older libtools had a path rather than the raw dlname
|
||||
- return os.path.basename(dlname)
|
||||
+ dlbasename = os.path.basename(dlname)
|
||||
+ libdir = _extract_libdir_field(la_file)
|
||||
+ if libdir is None:
|
||||
+ return dlbasename
|
||||
+ return libdir + '/' + dlbasename
|
||||
|
||||
|
||||
# Returns arguments for invoking libtool, if applicable, otherwise None
|
||||
diff --git a/tests/scanner/test_shlibs.py b/tests/scanner/test_shlibs.py
|
||||
index a8337c60..72789d76 100644
|
||||
--- a/tests/scanner/test_shlibs.py
|
||||
+++ b/tests/scanner/test_shlibs.py
|
||||
@@ -7,6 +7,30 @@ from giscanner.shlibs import resolve_from_ldd_output, sanitize_shlib_path
|
||||
|
||||
class TestLddParser(unittest.TestCase):
|
||||
|
||||
+ def test_resolve_from_ldd_output_nix(self):
|
||||
+ output = '''\
|
||||
+ libglib-2.0.so.0 => @nixStoreDir@/gmrf09y7sfxrr0mcx90dba7w41jj2kzk-glib-2.58.1/lib/libglib-2.0.so.0 (0x00007f0ee1b28000)
|
||||
+ libgobject-2.0.so.0 => @nixStoreDir@/gmrf09y7sfxrr0mcx90dba7w41jj2kzk-glib-2.58.1/lib/libgobject-2.0.so.0 (0x00007f0ee18cf000)
|
||||
+ libgio-2.0.so.0 => @nixStoreDir@/gmrf09y7sfxrr0mcx90dba7w41jj2kzk-glib-2.58.1/lib/libgio-2.0.so.0 (0x00007f0ee1502000)
|
||||
+ libxml2.so.2 => @nixStoreDir@/72mxkk74cv266snkjpz1kwl1i2rg8rpc-libxml2-2.9.8/lib/libxml2.so.2 (0x00007f0ee119c000)
|
||||
+ libsqlite3.so.0 => @nixStoreDir@/ck5ay23hsmlc67pg3m34kzd1k2hhvww0-sqlite-3.24.0/lib/libsqlite3.so.0 (0x00007f0ee0e98000)
|
||||
+ libpsl.so.5 => @nixStoreDir@/qn3l2gn7m76f318676wflrs2z6d4rrkj-libpsl-0.20.2-list-2017-02-03/lib/libpsl.so.5 (0x00007f0ee0c88000)
|
||||
+ libc.so.6 => @nixStoreDir@/g2yk54hifqlsjiha3szr4q3ccmdzyrdv-glibc-2.27/lib/libc.so.6 (0x00007f0ee08d4000)
|
||||
+ libpcre.so.1 => @nixStoreDir@/hxbq8lpc53qsf1bc0dfcsm47wmcxzjvh-pcre-8.42/lib/libpcre.so.1 (0x00007f0ee0662000)
|
||||
+ @nixStoreDir@/g2yk54hifqlsjiha3szr4q3ccmdzyrdv-glibc-2.27/lib64/ld-linux-x86-64.so.2 (0x00007f0ee20ff000)
|
||||
+ libblkid.so.1 => @nixStoreDir@/q0kgnq21j0l2yd77gdlld371246cwghh-util-linux-2.32.1/lib/libblkid.so.1 (0x00007f0edd0cd000)
|
||||
+ libuuid.so.1 => @nixStoreDir@/q0kgnq21j0l2yd77gdlld371246cwghh-util-linux-2.32.1/lib/libuuid.so.1 (0x00007f0edcec5000)
|
||||
+ librt.so.1 => @nixStoreDir@/g2yk54hifqlsjiha3szr4q3ccmdzyrdv-glibc-2.27/lib/librt.so.1 (0x00007f0edccbd000)
|
||||
+ libstdc++.so.6 => @nixStoreDir@/3v5r7fkrbkw2qajadvjbf6p6qriz9p1i-gcc-7.3.0-lib/lib/libstdc++.so.6 (0x00007f0edc936000)
|
||||
+ libgcc_s.so.1 => @nixStoreDir@/g2yk54hifqlsjiha3szr4q3ccmdzyrdv-glibc-2.27/lib/libgcc_s.so.1 (0x00007f0edc720000)
|
||||
+ '''
|
||||
+ libraries = ['glib-2.0', 'gio-2.0']
|
||||
+
|
||||
+ self.assertEqual(
|
||||
+ ['@nixStoreDir@/gmrf09y7sfxrr0mcx90dba7w41jj2kzk-glib-2.58.1/lib/libglib-2.0.so.0',
|
||||
+ '@nixStoreDir@/gmrf09y7sfxrr0mcx90dba7w41jj2kzk-glib-2.58.1/lib/libgio-2.0.so.0'],
|
||||
+ resolve_from_ldd_output(libraries, output))
|
||||
+
|
||||
def test_resolve_from_ldd_output(self):
|
||||
output = '''\
|
||||
libglib-2.0.so.0 => /usr/lib/x86_64-linux-gnu/libglib-2.0.so.0 (0x00007fbe12d68000)
|
||||
@@ -40,7 +64,8 @@ class TestLddParser(unittest.TestCase):
|
||||
|
||||
self.assertEqual(
|
||||
sanitize_shlib_path('/foo/bar'),
|
||||
- '/foo/bar' if sys.platform == 'darwin' else 'bar')
|
||||
+ # NixOS always want the absolute path
|
||||
+ '/foo/bar')
|
||||
|
||||
def test_unresolved_library(self):
|
||||
output = ''
|
||||
137
pkgs/development/libraries/gobject-introspection/default.nix
Normal file
137
pkgs/development/libraries/gobject-introspection/default.nix
Normal file
|
|
@ -0,0 +1,137 @@
|
|||
{ stdenv
|
||||
, lib
|
||||
, fetchurl
|
||||
, glib
|
||||
, flex
|
||||
, bison
|
||||
, meson
|
||||
, ninja
|
||||
, gtk-doc
|
||||
, docbook-xsl-nons
|
||||
, docbook_xml_dtd_43
|
||||
, docbook_xml_dtd_45
|
||||
, pkg-config
|
||||
, libffi
|
||||
, python3
|
||||
, cctools
|
||||
, cairo
|
||||
, gnome
|
||||
, substituteAll
|
||||
, nixStoreDir ? builtins.storeDir
|
||||
, x11Support ? true
|
||||
}:
|
||||
|
||||
# now that gobject-introspection creates large .gir files (eg gtk3 case)
|
||||
# it may be worth thinking about using multiple derivation outputs
|
||||
# In that case its about 6MB which could be separated
|
||||
|
||||
stdenv.mkDerivation rec {
|
||||
pname = "gobject-introspection";
|
||||
version = "1.72.0";
|
||||
|
||||
# outputs TODO: share/gobject-introspection-1.0/tests is needed during build
|
||||
# by pygobject3 (and maybe others), but it's only searched in $out
|
||||
outputs = [ "out" "dev" "devdoc" "man" ];
|
||||
outputBin = "dev";
|
||||
|
||||
src = fetchurl {
|
||||
url = "mirror://gnome/sources/${pname}/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
|
||||
sha256 = "Av6OWQhh2I+DBg3TnNpcyqYLLaHSHQ+VSZMBsYa+qrw=";
|
||||
};
|
||||
|
||||
patches = [
|
||||
# Make g-ir-scanner put absolute path to GIR files it generates
|
||||
# so that programs can just dlopen them without having to muck
|
||||
# with LD_LIBRARY_PATH environment variable.
|
||||
(substituteAll {
|
||||
src = ./absolute_shlib_path.patch;
|
||||
inherit nixStoreDir;
|
||||
})
|
||||
] ++ lib.optionals x11Support [
|
||||
# Hardcode the cairo shared library path in the Cairo gir shipped with this package.
|
||||
# https://github.com/NixOS/nixpkgs/issues/34080
|
||||
(substituteAll {
|
||||
src = ./absolute_gir_path.patch;
|
||||
cairoLib = "${lib.getLib cairo}/lib";
|
||||
})
|
||||
];
|
||||
|
||||
nativeBuildInputs = [
|
||||
meson
|
||||
ninja
|
||||
pkg-config
|
||||
flex
|
||||
bison
|
||||
gtk-doc
|
||||
docbook-xsl-nons
|
||||
docbook_xml_dtd_45
|
||||
python3
|
||||
setupHook # move .gir files
|
||||
];
|
||||
|
||||
buildInputs = [
|
||||
python3
|
||||
];
|
||||
|
||||
checkInputs = lib.optionals stdenv.isDarwin [
|
||||
cctools # for otool
|
||||
];
|
||||
|
||||
propagatedBuildInputs = [
|
||||
libffi
|
||||
glib
|
||||
];
|
||||
|
||||
mesonFlags = [
|
||||
"--datadir=${placeholder "dev"}/share"
|
||||
"-Ddoctool=disabled"
|
||||
"-Dcairo=disabled"
|
||||
"-Dgtk_doc=true"
|
||||
];
|
||||
|
||||
doCheck = !stdenv.isAarch64;
|
||||
|
||||
# During configurePhase, two python scripts are generated and need this. See
|
||||
# https://github.com/NixOS/nixpkgs/pull/98316#issuecomment-695785692
|
||||
postConfigure = ''
|
||||
patchShebangs tools/*
|
||||
'';
|
||||
|
||||
preCheck = ''
|
||||
# Our gobject-introspection patches make the shared library paths absolute
|
||||
# in the GIR files. When running tests, the library is not yet installed,
|
||||
# though, so we need to replace the absolute path with a local one during build.
|
||||
# We are using a symlink that we will delete before installation.
|
||||
mkdir -p $out/lib
|
||||
ln -s $PWD/tests/scanner/libregress-1.0${stdenv.targetPlatform.extensions.sharedLibrary} $out/lib/libregress-1.0${stdenv.targetPlatform.extensions.sharedLibrary}
|
||||
'';
|
||||
|
||||
postCheck = ''
|
||||
rm $out/lib/libregress-1.0${stdenv.targetPlatform.extensions.sharedLibrary}
|
||||
'';
|
||||
|
||||
setupHook = ./setup-hook.sh;
|
||||
|
||||
passthru = {
|
||||
updateScript = gnome.updateScript {
|
||||
packageName = pname;
|
||||
versionPolicy = "odd-unstable";
|
||||
};
|
||||
};
|
||||
|
||||
meta = with lib; {
|
||||
description = "A middleware layer between C libraries and language bindings";
|
||||
homepage = "https://gi.readthedocs.io/";
|
||||
maintainers = teams.gnome.members ++ (with maintainers; [ lovek323 ]);
|
||||
platforms = platforms.unix;
|
||||
license = with licenses; [ gpl2 lgpl2 ];
|
||||
|
||||
longDescription = ''
|
||||
GObject introspection is a middleware layer between C libraries (using
|
||||
GObject) and language bindings. The C library can be scanned at compile
|
||||
time and generate a metadata file, in addition to the actual native C
|
||||
library. Then at runtime, language bindings can read this metadata and
|
||||
automatically provide bindings to call into the C library.
|
||||
'';
|
||||
};
|
||||
}
|
||||
|
|
@ -0,0 +1,34 @@
|
|||
make_gobject_introspection_find_gir_files() {
|
||||
# required for .typelib files, eg mypaint git version
|
||||
if [ -d "$1/lib/girepository-1.0" ]; then
|
||||
addToSearchPath GI_TYPELIB_PATH $1/lib/girepository-1.0
|
||||
fi
|
||||
|
||||
# XDG_DATA_DIRS: required for finding .gir files
|
||||
if [ -d "$1/share/gir-1.0" ]; then
|
||||
addToSearchPath XDG_DATA_DIRS $1/share
|
||||
fi
|
||||
}
|
||||
|
||||
addEnvHooks "$hostOffset" make_gobject_introspection_find_gir_files
|
||||
|
||||
giDiscoverSelf() {
|
||||
if [ -d "$prefix/lib/girepository-1.0" ]; then
|
||||
addToSearchPath GI_TYPELIB_PATH $prefix/lib/girepository-1.0
|
||||
fi
|
||||
}
|
||||
|
||||
# gappsWrapperArgsHook expects GI_TYPELIB_PATH variable to be set by this.
|
||||
# Until we have dependency mechanism in generic builder, we need to use this ugly hack.
|
||||
if [[ " ${preFixupPhases:-} " =~ " gappsWrapperArgsHook " ]]; then
|
||||
preFixupPhases+=" "
|
||||
preFixupPhases="${preFixupPhases/ gappsWrapperArgsHook / giDiscoverSelf gappsWrapperArgsHook }"
|
||||
else
|
||||
preFixupPhases+=" giDiscoverSelf"
|
||||
fi
|
||||
|
||||
_multioutMoveGlibGir() {
|
||||
moveToOutput share/gir-1.0 "${!outputDev}"
|
||||
}
|
||||
|
||||
preFixupHooks+=(_multioutMoveGlibGir)
|
||||
Loading…
Add table
Add a link
Reference in a new issue