uboot: (firmwareOdroidC2/C4) don't invoke patch tool, use patches = [] instead

https://github.com/NixOS/nixpkgs/blob/master/pkgs/stdenv/generic/setup.sh#L948
this can do it nicely.

Signed-off-by: Anton Arapov <anton@deadbeef.mx>
This commit is contained in:
Anton Arapov 2021-04-03 12:58:10 +02:00 committed by Alan Daniels
commit 56de2bcd43
30691 changed files with 3076956 additions and 0 deletions

View file

@ -0,0 +1,4 @@
{
"version": "2.1.22",
"sha256": "1wk57dz0kmc6d5y8d8dkx269lzh3ark3751z734gxncwdlclcyz3"
}

View file

@ -0,0 +1,12 @@
{ callPackage, ... } @ args:
callPackage ./generic.nix (
args
// builtins.fromJSON (builtins.readFile ./2.1.json)
// {
generation = "2_1";
extraMeta.knownVulnerabilities = [
# Fixed in 3.* but 2.* hasn't been released since
"CVE-2020-17516"
];
})

View file

@ -0,0 +1,4 @@
{
"version": "2.2.14",
"sha256": "1b2x3q1ach44qg07sh8wr7d8a10n36w5522drd3p35djbiwa3d9q"
}

View file

@ -0,0 +1,12 @@
{ callPackage, ... } @ args:
callPackage ./generic.nix (
args
// builtins.fromJSON (builtins.readFile ./2.2.json)
// {
generation = "2_2";
extraMeta.knownVulnerabilities = [
# Fixed in 3.* but 2.* hasn't been released since
"CVE-2020-17516"
];
})

View file

@ -0,0 +1,4 @@
{
"version": "3.0.26",
"sha256": "09wim1w2yizcqpja62jk64fhaw3jgnrgrjlrm4kgmcc3g3bsmw6i"
}

View file

@ -0,0 +1,7 @@
{ callPackage, ... } @ args:
callPackage ./generic.nix (
args
// builtins.fromJSON (builtins.readFile ./3.0.json)
// {
generation = "3_0";
})

View file

@ -0,0 +1,4 @@
{
"version": "3.11.12",
"sha256": "16j58l7r47qrfh8q7fm92y935ykgvnbj3qn984c42qda15x92hkw"
}

View file

@ -0,0 +1,7 @@
{ callPackage, ... } @ args:
callPackage ./generic.nix (
args
// builtins.fromJSON (builtins.readFile ./3.11.json)
// {
generation = "3_11";
})

View file

@ -0,0 +1,127 @@
{ lib
, stdenv
, fetchurl
, python2
, makeWrapper
, gawk
, bash
, getopt
, procps
, which
, jre
, nixosTests
# generation is the attribute version suffix such as 3_11 in pkgs.cassandra_3_11
, generation
, version
, sha256
, extraMeta ? { }
, callPackage
, ...
}:
let
libPath = lib.makeLibraryPath [ stdenv.cc.cc ];
binPath = lib.makeBinPath [
bash
getopt
gawk
which
jre
procps
];
in
stdenv.mkDerivation rec {
pname = "cassandra";
inherit version;
src = fetchurl {
inherit sha256;
url = "mirror://apache/cassandra/${version}/apache-cassandra-${version}-bin.tar.gz";
};
nativeBuildInputs = [ makeWrapper ];
installPhase = ''
runHook preInstall
mkdir $out
mv * $out
# Clean up documentation.
mkdir -p $out/share/doc/${pname}-${version}
mv $out/CHANGES.txt \
$out/LICENSE.txt \
$out/NEWS.txt \
$out/NOTICE.txt \
$out/share/doc/${pname}-${version}
if [[ -d $out/doc ]]; then
mv "$out/doc/"* $out/share/doc/${pname}-${version}
rmdir $out/doc
fi
for cmd in bin/cassandra \
bin/nodetool \
bin/sstablekeys \
bin/sstableloader \
bin/sstablescrub \
bin/sstableupgrade \
bin/sstableutil \
bin/sstableverify; do
# Check if file exists because some don't exist across all versions
if [ -f $out/$cmd ]; then
wrapProgram $out/bin/$(basename "$cmd") \
--suffix-each LD_LIBRARY_PATH : ${libPath} \
--prefix PATH : ${binPath} \
--set JAVA_HOME ${jre}
fi
done
for cmd in tools/bin/cassandra-stress \
tools/bin/cassandra-stressd \
tools/bin/sstabledump \
tools/bin/sstableexpiredblockers \
tools/bin/sstablelevelreset \
tools/bin/sstablemetadata \
tools/bin/sstableofflinerelevel \
tools/bin/sstablerepairedset \
tools/bin/sstablesplit \
tools/bin/token-generator; do
# Check if file exists because some don't exist across all versions
if [ -f $out/$cmd ]; then
makeWrapper $out/$cmd $out/bin/$(basename "$cmd") \
--suffix-each LD_LIBRARY_PATH : ${libPath} \
--prefix PATH : ${binPath} \
--set JAVA_HOME ${jre}
fi
done
wrapProgram $out/bin/cqlsh --prefix PATH : ${python2}/bin
runHook postInstall
'';
passthru = {
tests =
let
test = nixosTests."cassandra_${generation}";
in
{
nixos =
assert test.testPackage.version == version;
test;
};
updateScript = callPackage ./update-script.nix { inherit generation; };
};
meta = with lib; {
homepage = "https://cassandra.apache.org/";
description = "A massively scalable open source NoSQL database";
platforms = platforms.unix;
license = licenses.asl20;
maintainers = [ maintainers.roberth ];
} // extraMeta;
}

View file

@ -0,0 +1,55 @@
{ git
, lib
, runtimeShell
, writeScript
, generation
, gnupg
}:
let
inherit (lib) makeBinPath;
filename = lib.strings.replaceStrings [ "_" ] [ "." ] generation + ".json";
regex = lib.strings.replaceStrings [ "_" ] [ "[.]" ] generation;
in
writeScript "update-cassandra_${generation}" ''
#!${runtimeShell}
set -eux -o pipefail
test -d pkgs -a -d nixos -a -d lib || {
echo >&2 "$0 expects to be run in a nixpkgs checkout"
exit 1
}
cd pkgs/servers/nosql/cassandra
PATH="${makeBinPath [git gnupg]}:$PATH"
tmp="$(mktemp -d)"
cleanup() {
rm -rf "$tmp"
}
trap cleanup EXIT
# get numeric-only versions, sort them latest first
git ls-remote --tags https://github.com/apache/cassandra \
| awk '{ if (match($0, /refs.tags.cassandra-([0-9.]*)$/, m)) print m[1] }' \
| sort -V \
| tac >$tmp/versions
version="$(grep -E '^${regex}' <$tmp/versions | head -n 1)"
path="cassandra/$version/apache-cassandra-$version-bin.tar.gz"
curl "https://downloads.apache.org/$path" >$tmp/src.tar.gz
curl "https://downloads.apache.org/$path.asc" >$tmp/src.tar.gz.asc
# See https://downloads.apache.org/cassandra/KEYS
# Make sure that any new key corresponds to someone on the project
for key in A4C465FEA0C552561A392A61E91335D77E3E87CB; do
gpg --trustdb-name "$tmp/trust.db" --batch --recv-keys "$key"
echo "$key:5:" | gpg --trustdb-name "$tmp/trust.db" --batch --import-ownertrust
done
gpg --trustdb-name "$tmp/trust.db" --batch --verify --trust-model direct $tmp/src.tar.gz.asc $tmp/src.tar.gz
hash="$(nix-prefetch-url "file://$tmp/src.tar.gz")"
cat >${filename} <<EOF
{
"version": "$version",
"sha256": "$hash"
}
EOF
''