uboot: (firmwareOdroidC2/C4) don't invoke patch tool, use patches = [] instead

https://github.com/NixOS/nixpkgs/blob/master/pkgs/stdenv/generic/setup.sh#L948
this can do it nicely.

Signed-off-by: Anton Arapov <anton@deadbeef.mx>
This commit is contained in:
Anton Arapov 2021-04-03 12:58:10 +02:00 committed by Alan Daniels
commit 56de2bcd43
30691 changed files with 3076956 additions and 0 deletions

View file

@ -0,0 +1,64 @@
{ lib
, fetchFromGitHub
, fetchpatch
, python3
}:
python3.pkgs.buildPythonApplication rec {
pname = "cantoolz";
version = "3.7.0";
src = fetchFromGitHub {
owner = "CANToolz";
repo = "CANToolz";
rev = "v${version}";
sha256 = "sha256-0ROWx1CsKtjxmbCgPYZpvr37VKsEsWCwMehf0/0/cnY=";
};
patches = [
(fetchpatch {
# Replace time.clock() which was removed, https://github.com/CANToolz/CANToolz/pull/30
url = "https://github.com/CANToolz/CANToolz/pull/30/commits/d75574523d3b273c40fb714532c4de27f9e6dd3e.patch";
sha256 = "0g91hywg5q6f2qk1awgklywigclrbhh6a6mwd0kpbkk1wawiiwbc";
})
];
propagatedBuildInputs = with python3.pkgs; [
flask
pyserial
mido
numpy
bitstring
];
checkInputs = with python3.pkgs; [
pytestCheckHook
];
disabledTests = [
"test_process"
# Sandbox issue
"test_server"
];
pythonImportsCheck = [
"cantoolz"
];
meta = with lib; {
description = "Black-box CAN network analysis framework";
longDescription = ''
CANToolz is a framework for analysing CAN networks and devices. It
provides multiple modules that can be chained using CANToolz's pipe
system and used by security researchers, automotive/OEM security
testers in black-box analysis.
CANToolz can be used for ECU discovery, MitM testing, fuzzing, brute
forcing, scanning or R&D, testing and validation. More can easily be
implemented with a new module.
'';
homepage = "https://github.com/CANToolz/CANToolz";
license = with licenses; [ asl20 ];
maintainers = with maintainers; [ fab ];
};
}