uboot: (firmwareOdroidC2/C4) don't invoke patch tool, use patches = [] instead
https://github.com/NixOS/nixpkgs/blob/master/pkgs/stdenv/generic/setup.sh#L948 this can do it nicely. Signed-off-by: Anton Arapov <anton@deadbeef.mx>
This commit is contained in:
commit
56de2bcd43
30691 changed files with 3076956 additions and 0 deletions
4
pkgs/servers/nosql/cassandra/2.1.json
Normal file
4
pkgs/servers/nosql/cassandra/2.1.json
Normal file
|
|
@ -0,0 +1,4 @@
|
|||
{
|
||||
"version": "2.1.22",
|
||||
"sha256": "1wk57dz0kmc6d5y8d8dkx269lzh3ark3751z734gxncwdlclcyz3"
|
||||
}
|
||||
12
pkgs/servers/nosql/cassandra/2.1.nix
Normal file
12
pkgs/servers/nosql/cassandra/2.1.nix
Normal file
|
|
@ -0,0 +1,12 @@
|
|||
{ callPackage, ... } @ args:
|
||||
|
||||
callPackage ./generic.nix (
|
||||
args
|
||||
// builtins.fromJSON (builtins.readFile ./2.1.json)
|
||||
// {
|
||||
generation = "2_1";
|
||||
extraMeta.knownVulnerabilities = [
|
||||
# Fixed in 3.* but 2.* hasn't been released since
|
||||
"CVE-2020-17516"
|
||||
];
|
||||
})
|
||||
4
pkgs/servers/nosql/cassandra/2.2.json
Normal file
4
pkgs/servers/nosql/cassandra/2.2.json
Normal file
|
|
@ -0,0 +1,4 @@
|
|||
{
|
||||
"version": "2.2.14",
|
||||
"sha256": "1b2x3q1ach44qg07sh8wr7d8a10n36w5522drd3p35djbiwa3d9q"
|
||||
}
|
||||
12
pkgs/servers/nosql/cassandra/2.2.nix
Normal file
12
pkgs/servers/nosql/cassandra/2.2.nix
Normal file
|
|
@ -0,0 +1,12 @@
|
|||
{ callPackage, ... } @ args:
|
||||
|
||||
callPackage ./generic.nix (
|
||||
args
|
||||
// builtins.fromJSON (builtins.readFile ./2.2.json)
|
||||
// {
|
||||
generation = "2_2";
|
||||
extraMeta.knownVulnerabilities = [
|
||||
# Fixed in 3.* but 2.* hasn't been released since
|
||||
"CVE-2020-17516"
|
||||
];
|
||||
})
|
||||
4
pkgs/servers/nosql/cassandra/3.0.json
Normal file
4
pkgs/servers/nosql/cassandra/3.0.json
Normal file
|
|
@ -0,0 +1,4 @@
|
|||
{
|
||||
"version": "3.0.26",
|
||||
"sha256": "09wim1w2yizcqpja62jk64fhaw3jgnrgrjlrm4kgmcc3g3bsmw6i"
|
||||
}
|
||||
7
pkgs/servers/nosql/cassandra/3.0.nix
Normal file
7
pkgs/servers/nosql/cassandra/3.0.nix
Normal file
|
|
@ -0,0 +1,7 @@
|
|||
{ callPackage, ... } @ args:
|
||||
callPackage ./generic.nix (
|
||||
args
|
||||
// builtins.fromJSON (builtins.readFile ./3.0.json)
|
||||
// {
|
||||
generation = "3_0";
|
||||
})
|
||||
4
pkgs/servers/nosql/cassandra/3.11.json
Normal file
4
pkgs/servers/nosql/cassandra/3.11.json
Normal file
|
|
@ -0,0 +1,4 @@
|
|||
{
|
||||
"version": "3.11.12",
|
||||
"sha256": "16j58l7r47qrfh8q7fm92y935ykgvnbj3qn984c42qda15x92hkw"
|
||||
}
|
||||
7
pkgs/servers/nosql/cassandra/3.11.nix
Normal file
7
pkgs/servers/nosql/cassandra/3.11.nix
Normal file
|
|
@ -0,0 +1,7 @@
|
|||
{ callPackage, ... } @ args:
|
||||
callPackage ./generic.nix (
|
||||
args
|
||||
// builtins.fromJSON (builtins.readFile ./3.11.json)
|
||||
// {
|
||||
generation = "3_11";
|
||||
})
|
||||
127
pkgs/servers/nosql/cassandra/generic.nix
Normal file
127
pkgs/servers/nosql/cassandra/generic.nix
Normal file
|
|
@ -0,0 +1,127 @@
|
|||
{ lib
|
||||
, stdenv
|
||||
, fetchurl
|
||||
, python2
|
||||
, makeWrapper
|
||||
, gawk
|
||||
, bash
|
||||
, getopt
|
||||
, procps
|
||||
, which
|
||||
, jre
|
||||
, nixosTests
|
||||
# generation is the attribute version suffix such as 3_11 in pkgs.cassandra_3_11
|
||||
, generation
|
||||
, version
|
||||
, sha256
|
||||
, extraMeta ? { }
|
||||
, callPackage
|
||||
, ...
|
||||
}:
|
||||
|
||||
let
|
||||
libPath = lib.makeLibraryPath [ stdenv.cc.cc ];
|
||||
binPath = lib.makeBinPath [
|
||||
bash
|
||||
getopt
|
||||
gawk
|
||||
which
|
||||
jre
|
||||
procps
|
||||
];
|
||||
in
|
||||
|
||||
stdenv.mkDerivation rec {
|
||||
pname = "cassandra";
|
||||
inherit version;
|
||||
|
||||
src = fetchurl {
|
||||
inherit sha256;
|
||||
url = "mirror://apache/cassandra/${version}/apache-cassandra-${version}-bin.tar.gz";
|
||||
};
|
||||
|
||||
nativeBuildInputs = [ makeWrapper ];
|
||||
|
||||
installPhase = ''
|
||||
runHook preInstall
|
||||
|
||||
mkdir $out
|
||||
mv * $out
|
||||
|
||||
# Clean up documentation.
|
||||
mkdir -p $out/share/doc/${pname}-${version}
|
||||
mv $out/CHANGES.txt \
|
||||
$out/LICENSE.txt \
|
||||
$out/NEWS.txt \
|
||||
$out/NOTICE.txt \
|
||||
$out/share/doc/${pname}-${version}
|
||||
|
||||
if [[ -d $out/doc ]]; then
|
||||
mv "$out/doc/"* $out/share/doc/${pname}-${version}
|
||||
rmdir $out/doc
|
||||
fi
|
||||
|
||||
|
||||
for cmd in bin/cassandra \
|
||||
bin/nodetool \
|
||||
bin/sstablekeys \
|
||||
bin/sstableloader \
|
||||
bin/sstablescrub \
|
||||
bin/sstableupgrade \
|
||||
bin/sstableutil \
|
||||
bin/sstableverify; do
|
||||
# Check if file exists because some don't exist across all versions
|
||||
if [ -f $out/$cmd ]; then
|
||||
wrapProgram $out/bin/$(basename "$cmd") \
|
||||
--suffix-each LD_LIBRARY_PATH : ${libPath} \
|
||||
--prefix PATH : ${binPath} \
|
||||
--set JAVA_HOME ${jre}
|
||||
fi
|
||||
done
|
||||
|
||||
for cmd in tools/bin/cassandra-stress \
|
||||
tools/bin/cassandra-stressd \
|
||||
tools/bin/sstabledump \
|
||||
tools/bin/sstableexpiredblockers \
|
||||
tools/bin/sstablelevelreset \
|
||||
tools/bin/sstablemetadata \
|
||||
tools/bin/sstableofflinerelevel \
|
||||
tools/bin/sstablerepairedset \
|
||||
tools/bin/sstablesplit \
|
||||
tools/bin/token-generator; do
|
||||
# Check if file exists because some don't exist across all versions
|
||||
if [ -f $out/$cmd ]; then
|
||||
makeWrapper $out/$cmd $out/bin/$(basename "$cmd") \
|
||||
--suffix-each LD_LIBRARY_PATH : ${libPath} \
|
||||
--prefix PATH : ${binPath} \
|
||||
--set JAVA_HOME ${jre}
|
||||
fi
|
||||
done
|
||||
|
||||
wrapProgram $out/bin/cqlsh --prefix PATH : ${python2}/bin
|
||||
|
||||
runHook postInstall
|
||||
'';
|
||||
|
||||
passthru = {
|
||||
tests =
|
||||
let
|
||||
test = nixosTests."cassandra_${generation}";
|
||||
in
|
||||
{
|
||||
nixos =
|
||||
assert test.testPackage.version == version;
|
||||
test;
|
||||
};
|
||||
|
||||
updateScript = callPackage ./update-script.nix { inherit generation; };
|
||||
};
|
||||
|
||||
meta = with lib; {
|
||||
homepage = "https://cassandra.apache.org/";
|
||||
description = "A massively scalable open source NoSQL database";
|
||||
platforms = platforms.unix;
|
||||
license = licenses.asl20;
|
||||
maintainers = [ maintainers.roberth ];
|
||||
} // extraMeta;
|
||||
}
|
||||
55
pkgs/servers/nosql/cassandra/update-script.nix
Normal file
55
pkgs/servers/nosql/cassandra/update-script.nix
Normal file
|
|
@ -0,0 +1,55 @@
|
|||
{ git
|
||||
, lib
|
||||
, runtimeShell
|
||||
, writeScript
|
||||
, generation
|
||||
, gnupg
|
||||
}:
|
||||
let
|
||||
inherit (lib) makeBinPath;
|
||||
filename = lib.strings.replaceStrings [ "_" ] [ "." ] generation + ".json";
|
||||
regex = lib.strings.replaceStrings [ "_" ] [ "[.]" ] generation;
|
||||
in
|
||||
writeScript "update-cassandra_${generation}" ''
|
||||
#!${runtimeShell}
|
||||
set -eux -o pipefail
|
||||
test -d pkgs -a -d nixos -a -d lib || {
|
||||
echo >&2 "$0 expects to be run in a nixpkgs checkout"
|
||||
exit 1
|
||||
}
|
||||
cd pkgs/servers/nosql/cassandra
|
||||
PATH="${makeBinPath [git gnupg]}:$PATH"
|
||||
|
||||
tmp="$(mktemp -d)"
|
||||
cleanup() {
|
||||
rm -rf "$tmp"
|
||||
}
|
||||
trap cleanup EXIT
|
||||
|
||||
# get numeric-only versions, sort them latest first
|
||||
git ls-remote --tags https://github.com/apache/cassandra \
|
||||
| awk '{ if (match($0, /refs.tags.cassandra-([0-9.]*)$/, m)) print m[1] }' \
|
||||
| sort -V \
|
||||
| tac >$tmp/versions
|
||||
|
||||
version="$(grep -E '^${regex}' <$tmp/versions | head -n 1)"
|
||||
path="cassandra/$version/apache-cassandra-$version-bin.tar.gz"
|
||||
curl "https://downloads.apache.org/$path" >$tmp/src.tar.gz
|
||||
curl "https://downloads.apache.org/$path.asc" >$tmp/src.tar.gz.asc
|
||||
|
||||
# See https://downloads.apache.org/cassandra/KEYS
|
||||
# Make sure that any new key corresponds to someone on the project
|
||||
for key in A4C465FEA0C552561A392A61E91335D77E3E87CB; do
|
||||
gpg --trustdb-name "$tmp/trust.db" --batch --recv-keys "$key"
|
||||
echo "$key:5:" | gpg --trustdb-name "$tmp/trust.db" --batch --import-ownertrust
|
||||
done
|
||||
gpg --trustdb-name "$tmp/trust.db" --batch --verify --trust-model direct $tmp/src.tar.gz.asc $tmp/src.tar.gz
|
||||
|
||||
hash="$(nix-prefetch-url "file://$tmp/src.tar.gz")"
|
||||
cat >${filename} <<EOF
|
||||
{
|
||||
"version": "$version",
|
||||
"sha256": "$hash"
|
||||
}
|
||||
EOF
|
||||
''
|
||||
Loading…
Add table
Add a link
Reference in a new issue