forked from dan/liminix
1
0
Fork 0

alphabetize derivations in overlay

This commit is contained in:
Daniel Barlow 2023-12-02 17:08:59 +00:00
parent bb335050fd
commit cb6ebbdc60
1 changed files with 70 additions and 67 deletions

View File

@ -44,20 +44,12 @@ let
lua = let s = lua_no_readline.override { self = s; }; in s; lua = let s = lua_no_readline.override { self = s; }; in s;
in in
extraPkgs // { extraPkgs // {
mtdutils = prev.mtdutils.overrideAttrs(o: { # liminix library functions
patches = (if o ? patches then o.patches else []) ++ [ lim = {
./pkgs/mtdutils/0001-mkfs.jffs2-add-graft-option.patch parseInt = s : (builtins.fromTOML "r=${s}").r;
]; };
});
rsyncSmall =
let r = prev.rsync.overrideAttrs(o: {
configureFlags = o.configureFlags ++ [
"--disable-openssl"
];
});
in r.override { openssl = null; };
# keep these alphabetical
chrony = chrony =
let chrony' = prev.chrony.overrideAttrs(o: { let chrony' = prev.chrony.overrideAttrs(o: {
configureFlags = [ configureFlags = [
@ -79,49 +71,6 @@ extraPkgs // {
}; };
strace = prev.strace.override { libunwind = null; };
kexec-tools-static = prev.kexec-tools.overrideAttrs(o: {
# For kexecboot we copy kexec into a ramdisk on the system being
# upgraded from. This is more likely to work if kexec is
# statically linked so doesn't have dependencies on store paths that
# may not exist on that machine. (We can't nix-copy-closure as
# the store may not be on a writable filesystem)
LDFLAGS = "-static";
patches = o.patches ++ [
(fetchpatch {
# merge user command line options into DTB chosen
url = "https://patch-diff.githubusercontent.com/raw/horms/kexec-tools/pull/3.patch";
hash = "sha256-MvlJhuex9dlawwNZJ1sJ33YPWn1/q4uKotqkC/4d2tk=";
})
pkgs/kexec-map-file.patch
];
});
luaFull = prev.lua;
inherit lua;
inherit s6;
s6-linux-init = prev.s6-linux-init.override {
skawarePackages = prev.skawarePackages // {
inherit s6;
};
};
s6-rc = prev.s6-rc.override {
skawarePackages = prev.skawarePackages // {
inherit s6;
};
};
nftables = prev.nftables.overrideAttrs(o: {
configureFlags = [
"--disable-debug"
"--disable-python"
"--with-mini-gmp"
"--without-cli"
];
});
dnsmasq = dnsmasq =
let d = prev.dnsmasq.overrideAttrs(o: { let d = prev.dnsmasq.overrideAttrs(o: {
@ -134,6 +83,15 @@ extraPkgs // {
nettle = null; nettle = null;
}; };
dropbear = prev.dropbear.overrideAttrs (o: {
postPatch = ''
(echo '#define DSS_PRIV_FILENAME "/run/dropbear/dropbear_dss_host_key"'
echo '#define RSA_PRIV_FILENAME "/run/dropbear/dropbear_rsa_host_key"'
echo '#define ECDSA_PRIV_FILENAME "/run/dropbear/dropbear_ecdsa_host_key"'
echo '#define ED25519_PRIV_FILENAME "/run/dropbear/dropbear_ed25519_host_key"') > localoptions.h
'';
});
hostapd = hostapd =
let let
config = [ config = [
@ -161,13 +119,40 @@ extraPkgs // {
}); });
in h.override { openssl = null; sqlite = null; }; in h.override { openssl = null; sqlite = null; };
dropbear = prev.dropbear.overrideAttrs (o: { kexec-tools-static = prev.kexec-tools.overrideAttrs(o: {
postPatch = '' # For kexecboot we copy kexec into a ramdisk on the system being
(echo '#define DSS_PRIV_FILENAME "/run/dropbear/dropbear_dss_host_key"' # upgraded from. This is more likely to work if kexec is
echo '#define RSA_PRIV_FILENAME "/run/dropbear/dropbear_rsa_host_key"' # statically linked so doesn't have dependencies on store paths that
echo '#define ECDSA_PRIV_FILENAME "/run/dropbear/dropbear_ecdsa_host_key"' # may not exist on that machine. (We can't nix-copy-closure as
echo '#define ED25519_PRIV_FILENAME "/run/dropbear/dropbear_ed25519_host_key"') > localoptions.h # the store may not be on a writable filesystem)
''; LDFLAGS = "-static";
patches = o.patches ++ [
(fetchpatch {
# merge user command line options into DTB chosen
url = "https://patch-diff.githubusercontent.com/raw/horms/kexec-tools/pull/3.patch";
hash = "sha256-MvlJhuex9dlawwNZJ1sJ33YPWn1/q4uKotqkC/4d2tk=";
})
pkgs/kexec-map-file.patch
];
});
luaFull = prev.lua;
inherit lua;
mtdutils = prev.mtdutils.overrideAttrs(o: {
patches = (if o ? patches then o.patches else []) ++ [
./pkgs/mtdutils/0001-mkfs.jffs2-add-graft-option.patch
];
});
nftables = prev.nftables.overrideAttrs(o: {
configureFlags = [
"--disable-debug"
"--disable-python"
"--with-mini-gmp"
"--without-cli"
];
}); });
openssl = prev.openssl.overrideAttrs (o: { openssl = prev.openssl.overrideAttrs (o: {
@ -183,6 +168,8 @@ extraPkgs // {
"\nsed -i.bak 's/linux.*-mips/linux-mops/' Configure\n"); "\nsed -i.bak 's/linux.*-mips/linux-mops/' Configure\n");
}); });
pppBuild = prev.ppp;
qemu = prev.qemu.overrideAttrs (o: { qemu = prev.qemu.overrideAttrs (o: {
patches = o.patches ++ [ patches = o.patches ++ [
./pkgs/qemu/arm-image-friendly-load-addr.patch ./pkgs/qemu/arm-image-friendly-load-addr.patch
@ -190,10 +177,26 @@ extraPkgs // {
]; ];
}); });
pppBuild = prev.ppp; rsyncSmall =
let r = prev.rsync.overrideAttrs(o: {
configureFlags = o.configureFlags ++ [
"--disable-openssl"
];
});
in r.override { openssl = null; };
# liminix library functions
lim = { inherit s6;
parseInt = s : (builtins.fromTOML "r=${s}").r; s6-linux-init = prev.s6-linux-init.override {
skawarePackages = prev.skawarePackages // {
inherit s6;
};
}; };
s6-rc = prev.s6-rc.override {
skawarePackages = prev.skawarePackages // {
inherit s6;
};
};
strace = prev.strace.override { libunwind = null; };
} }