;;; GNU Guix --- Functional package management for GNU ;;; Copyright © 2013-2024 Ludovic Courtès ;;; Copyright © 2015, 2017, 2020, 2021, 2022, 2023 Ricardo Wurmus ;;; Copyright © 2017 Muriithi Frederick Muriuki ;;; Copyright © 2017, 2018 Oleg Pykhalov ;;; Copyright © 2017 Roel Janssen ;;; Copyright © 2017–2022 Tobias Geerinckx-Rice ;;; Copyright © 2018 Julien Lepiller ;;; Copyright © 2018, 2019 Rutger Helling ;;; Copyright © 2018 Sou Bunnbu ;;; Copyright © 2018, 2019 Eric Bavier ;;; Copyright © 2019-2024 Efraim Flashner ;;; Copyright © 2019 Jonathan Brielmaier ;;; Copyright © 2020 Mathieu Othacehe ;;; Copyright © 2020, 2023 Janneke Nieuwenhuizen ;;; Copyright © 2020 Giacomo Leidi ;;; Copyright © 2020 Jesse Gibbons ;;; Copyright © 2020 Martin Becze ;;; Copyright © 2020 Vincent Legoll ;;; Copyright © 2021 Ivan Gankevich ;;; Copyright © 2021, 2022, 2023 Maxim Cournoyer ;;; Copyright © 2021 John Kehayias ;;; Copyright © 2022, 2023 Zhu Zihao ;;; Copyright © 2023 jgart ;;; Copyright © 2023 Mădălin Ionel Patrașcu ;;; Copyright © 2024 Arun Isaac ;;; Copyright © 2024 Zheng Junjie <873216071@qq.com> ;;; ;;; This file is part of GNU Guix. ;;; ;;; GNU Guix is free software; you can redistribute it and/or modify it ;;; under the terms of the GNU General Public License as published by ;;; the Free Software Foundation; either version 3 of the License, or (at ;;; your option) any later version. ;;; ;;; GNU Guix is distributed in the hope that it will be useful, but ;;; WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the ;;; GNU General Public License for more details. ;;; ;;; You should have received a copy of the GNU General Public License ;;; along with GNU Guix. If not, see . (define-module (gnu packages package-management) #:use-module (gnu artwork) #:use-module (gnu packages) #:use-module (gnu packages acl) #:use-module (gnu packages attr) #:use-module (gnu packages avahi) #:use-module (gnu packages autotools) #:use-module (gnu packages backup) #:use-module (gnu packages base) #:use-module (gnu packages bash) #:use-module (gnu packages bdw-gc) #:use-module (gnu packages bison) #:use-module (gnu packages boost) #:use-module (gnu packages bootstrap) ;for 'bootstrap-guile-origin' #:use-module (gnu packages build-tools) #:use-module (gnu packages check) #:use-module (gnu packages compression) #:use-module (gnu packages cmake) #:use-module (gnu packages cpio) #:use-module (gnu packages cpp) #:use-module (gnu packages crypto) #:use-module (gnu packages curl) #:use-module (gnu packages databases) #:use-module (gnu packages debian) #:use-module (gnu packages dejagnu) #:use-module (gnu packages dbm) #:use-module (gnu packages docbook) #:use-module (gnu packages file) #:use-module (gnu packages freedesktop) #:use-module (gnu packages flex) #:use-module (gnu packages gcc) #:use-module (gnu packages gettext) #:use-module (gnu packages ghostscript) #:use-module (gnu packages glib) #:use-module (gnu packages gnome) #:use-module (gnu packages gnupg) #:use-module (gnu packages graphviz) #:use-module (gnu packages gtk) #:use-module (gnu packages guile) #:use-module (gnu packages guile-xyz) #:use-module (gnu packages hardware) #:use-module (gnu packages hurd) #:use-module (gnu packages imagemagick) #:use-module (gnu packages less) #:use-module (gnu packages libedit) #:use-module (gnu packages linux) #:use-module (gnu packages lisp) #:use-module (gnu packages lua) #:use-module (gnu packages man) #:use-module (gnu packages markup) #:use-module (gnu packages nettle) #:use-module (gnu packages networking) #:use-module (gnu packages ninja) #:use-module (gnu packages node) #:use-module (gnu packages nss) #:use-module (gnu packages patchutils) #:use-module (gnu packages perl) #:use-module (gnu packages perl-check) #:use-module (gnu packages pkg-config) #:use-module (gnu packages polkit) #:use-module (gnu packages popt) #:use-module (gnu packages python) #:use-module (gnu packages python-build) #:use-module (gnu packages python-check) #:use-module (gnu packages python-web) #:use-module (gnu packages python-xyz) #:use-module (gnu packages ruby) #:use-module (gnu packages serialization) #:use-module (gnu packages sqlite) #:use-module (gnu packages ssh) #:use-module (gnu packages tcl) #:use-module (gnu packages texinfo) #:use-module (gnu packages time) #:use-module (gnu packages tls) #:use-module (gnu packages vim) #:use-module (gnu packages virtualization) #:use-module (gnu packages web) #:use-module (gnu packages xml) #:use-module (gnu packages xorg) #:use-module (gnu packages version-control) #:autoload (guix build-system channel) (channel-build-system) #:use-module (guix build-system copy) #:use-module (guix build-system glib-or-gtk) #:use-module (guix build-system gnu) #:use-module (guix build-system guile) #:use-module (guix build-system meson) #:use-module (guix build-system pyproject) #:use-module (guix build-system python) #:use-module (guix build-system ruby) #:use-module (guix build-system trivial) #:use-module (guix download) #:use-module (guix gexp) #:use-module (guix git-download) #:autoload (guix describe) (current-channels) #:autoload (guix channels) (channel? guix-channel? repository->guix-channel) #:use-module ((guix licenses) #:prefix license:) #:use-module (guix packages) #:use-module (guix utils) #:use-module ((guix search-paths) #:select ($SSL_CERT_DIR $SSL_CERT_FILE)) #:use-module (ice-9 match) #:use-module (srfi srfi-1)) (define (boot-guile-uri arch) "Return the URI for the bootstrap Guile tarball for ARCH." (cond ((string=? "armhf" arch) (string-append "http://alpha.gnu.org/gnu/guix/bootstrap/" arch "-linux" "/20150101/guile-2.0.11.tar.xz")) ((string=? "aarch64" arch) (string-append "http://alpha.gnu.org/gnu/guix/bootstrap/" arch "-linux/20170217/guile-2.0.14.tar.xz")) (else (string-append "http://alpha.gnu.org/gnu/guix/bootstrap/" arch "-linux" "/20131110/guile-2.0.9.tar.xz")))) ;; NOTE: The commit IDs used here form a linked list threaded through the git ;; history. In a phenomenon known as boot-stripping, not only the head of this ;; list is used, but also a few older versions, when a guix from this package is ;; used to build something also depending on guix. ;; ;; Therefore, if, by accident, you set this package to a non-existent commit ID, ;; it is insufficient to simply correct it with the latest commit. ;; Instead, please push one commit that rolls back Guix to before the mistake, ;; and then another that points to the first one. That way, the faulty commit ;; won't appear on the linked list. ;; ;; If you are updating this package because it fails to build, you need to ;; actually update it *twice*, as the installer is pointing to the N-1 guix ;; package revision. (define-public guix ;; Latest version of Guix, which may or may not correspond to a release. ;; Note: the 'update-guix-package.scm' script expects this definition to ;; start precisely like this. (let ((version "1.4.0") (commit "843b85c42745d65c93d6af81cd3a9d835ff1f51c") (revision 23)) (package (name "guix") (version (if (zero? revision) version (string-append version "-" (number->string revision) "." (string-take commit 7)))) (source (origin (method git-fetch) (uri (git-reference (url "https://git.savannah.gnu.org/git/guix.git") (commit commit))) (sha256 (base32 "080idxx8i0dkwsvbx3yw20fs16v0vfzc7vc30zbvc96nvw36ryqb")) (file-name (string-append "guix-" version "-checkout")))) (build-system gnu-build-system) (arguments `(#:configure-flags (list ;; Provide channel metadata for 'guix describe'. ;; Don't pass '--with-channel-url' and ;; '--with-channel-introduction' and instead use ;; the defaults. ,(string-append "--with-channel-commit=" commit) "--localstatedir=/var" "--sysconfdir=/etc" (string-append "--with-bash-completion-dir=" (assoc-ref %outputs "out") "/etc/bash_completion.d") ;; Set 'DOT_USER_PROGRAM' to the empty string so ;; we don't keep a reference to Graphviz, whose ;; closure is pretty big (too big for the Guix ;; system installation image.) "ac_cv_path_DOT_USER_PROGRAM=dot" ;; When cross-compiling, 'git' is not in $PATH ;; (because it's not a native input). Thus, ;; always explicitly pass its file name. (string-append "ac_cv_path_GIT=" (search-input-file %build-inputs "/bin/git")) ;; To avoid problems with the length of shebangs, ;; choose a fixed-width and short directory name ;; for tests. "ac_cv_guix_test_root=/tmp/guix-tests" ,@(if (target-hurd?) '("--with-courage") '())) #:parallel-tests? #f ;work around #:modules ((guix build gnu-build-system) (guix build utils) (srfi srfi-26) (ice-9 popen) (ice-9 rdelim)) #:phases (modify-phases %standard-phases (replace 'bootstrap (lambda _ ;; Make sure 'msgmerge' can modify the PO files. (for-each (lambda (po) (chmod po #o666)) (find-files "." "\\.po$")) (patch-shebang "build-aux/git-version-gen") (call-with-output-file ".tarball-version" (lambda (port) (display ,version port))) ;; Install SysV init files to $(prefix)/etc rather ;; than to /etc. (substitute* "nix/local.mk" (("^sysvinitservicedir = .*$") (string-append "sysvinitservicedir = \ $(prefix)/etc/init.d\n"))) ;; Install OpenRC init files to $(prefix)/etc rather ;; than to /etc. (substitute* "nix/local.mk" (("^openrcservicedir = .*$") (string-append "openrcservicedir = \ $(prefix)/etc/openrc\n"))) (invoke "sh" "bootstrap"))) ,@(if (target-riscv64?) `((add-after 'unpack 'use-correct-guile-version-for-tests (lambda _ (substitute* "tests/gexp.scm" (("2\\.0") "3.0"))))) '()) ,@(if (system-hurd?) `((add-after 'unpack 'disable-tests/hurd (lambda _ (substitute* "Makefile.am" (("tests/derivations.scm") "") (("tests/grafts.scm") "") (("tests/graph.scm") "") (("tests/lint.scm") "") (("tests/nar.scm") "") (("tests/offload.scm") "") (("tests/pack.scm") "") (("tests/packages.scm") "") (("tests/processes.scm") "") (("tests/publish.scm") "") (("tests/pypi.scm") "") (("tests/size.scm") "") (("tests/store.scm") "") (("tests/substitute.scm") "") (("tests/syscalls.scm") "") (("tests/union.scm") "") (("tests/guix-build.sh") "") (("tests/guix-build-branch.sh") "") (("tests/guix-hash.sh") "") (("tests/guix-locate.sh") "") (("tests/guix-pack.sh") "") (("tests/guix-pack-relocatable.sh") "") (("tests/guix-package-aliases.sh") "") (("tests/guix-package-net.sh") "") (("tests/guix-home.sh") "") (("tests/guix-archive.sh") "") (("tests/guix-environment.sh") "") (("tests/guix-package.sh") "") (("tests/guix-refresh.sh") "") (("tests/guix-shell.sh") "") (("tests/guix-shell-export-manifest.sh") "") (("tests/guix-system.sh") "") (("tests/guix-graph.sh") "") (("tests/guix-gc.sh") "") (("tests/guix-daemon.sh") ""))))) '()) (add-before 'build 'use-host-compressors (lambda* (#:key inputs target #:allow-other-keys) (when target ;; Use host compressors. (let ((bzip2 (assoc-ref inputs "bzip2")) (gzip (assoc-ref inputs "gzip")) (xz (assoc-ref inputs "xz"))) (substitute* "guix/config.scm" (("\"[^\"]*/bin/bzip2") (string-append "\"" bzip2 "/bin/bzip2")) (("\"[^\"]*/bin/gzip") gzip (string-append "\"" gzip "/bin/gzip")) (("\"[^\"]*/bin//xz") (string-append "\"" xz "/bin/xz"))))))) (add-before 'build 'set-font-path (lambda* (#:key native-inputs inputs #:allow-other-keys) ;; Tell 'dot' where to look for fonts. (setenv "XDG_DATA_DIRS" (dirname (search-input-directory (or native-inputs inputs) "share/fonts"))))) (add-before 'check 'copy-bootstrap-guile (lambda* (#:key system target inputs #:allow-other-keys) ;; Copy the bootstrap guile tarball in the store ;; used by the test suite. (define (intern file recursive?) ;; Note: don't use 'guix download' here because we ;; need to set the 'recursive?' argument. (define base (strip-store-file-name file)) (define code `(begin (use-modules (guix)) (with-store store (let* ((item (add-to-store store ,base ,recursive? "sha256" ,file)) (root (string-append "/tmp/gc-root-" (basename item)))) ;; Register a root so that the GC tests ;; don't delete those. (symlink item root) (add-indirect-root store root))))) (invoke "./test-env" "guile" "-c" (object->string code))) (unless target (intern (assoc-ref inputs "boot-guile") #f) ;; On x86_64 some tests need the i686 Guile. (when (and (not target) (string=? system "x86_64-linux")) (intern (assoc-ref inputs "boot-guile/i686") #f)) ;; Copy the bootstrap executables. (for-each (lambda (input) (intern (assoc-ref inputs input) #t)) '("bootstrap/bash" "bootstrap/mkdir" "bootstrap/tar" "bootstrap/xz"))))) (add-after 'unpack 'disable-failing-tests ;; XXX FIXME: These tests fail within the build container. (lambda _ (substitute* "tests/syscalls.scm" (("^\\(test-(assert|equal) \"(clone|setns|pivot-root)\"" all) (string-append "(test-skip 1)\n" all))) (substitute* "tests/containers.scm" (("^\\(test-(assert|equal)" all) (string-append "(test-skip 1)\n" all))) (when (file-exists? "tests/guix-environment-container.sh") (substitute* "tests/guix-environment-container.sh" (("guix environment --version") "exit 77\n"))))) (add-before 'check 'set-SHELL (lambda _ ;; 'guix environment' tests rely on 'SHELL' having a ;; correct value, so set it. (setenv "SHELL" (which "sh")))) (add-after 'install 'wrap-program (lambda* (#:key inputs native-inputs outputs target #:allow-other-keys) ;; Make sure the 'guix' command finds GnuTLS, ;; Guile-JSON, and Guile-Git automatically. (let* ((out (assoc-ref outputs "out")) (guile (assoc-ref (or native-inputs inputs) "guile")) (avahi (assoc-ref inputs "guile-avahi")) (gcrypt (assoc-ref inputs "guile-gcrypt")) (guile-lib (assoc-ref inputs "guile-lib")) (json (assoc-ref inputs "guile-json")) (sqlite (assoc-ref inputs "guile-sqlite3")) (zlib (assoc-ref inputs "guile-zlib")) (lzlib (assoc-ref inputs "guile-lzlib")) (zstd (assoc-ref inputs "guile-zstd")) (git (assoc-ref inputs "guile-git")) (bs (assoc-ref inputs "guile-bytestructures")) (ssh (assoc-ref inputs "guile-ssh")) (gnutls (assoc-ref inputs "guile-gnutls")) (disarchive (assoc-ref inputs "disarchive")) (bzip2 (assoc-ref inputs "guile-bzip2")) (lzma (assoc-ref inputs "guile-lzma")) (locales (assoc-ref inputs "glibc-utf8-locales")) (deps (list gcrypt json sqlite gnutls git bs ssh zlib lzlib zstd guile-lib disarchive bzip2 lzma)) (deps* (if avahi (cons avahi deps) deps)) (effective (read-line (open-pipe* OPEN_READ (string-append guile "/bin/guile") "-c" "(display (effective-version))"))) (path (map (cut string-append <> "/share/guile/site/" effective) (delete #f deps*))) (gopath (map (cut string-append <> "/lib/guile/" effective "/site-ccache") (delete #f deps*))) (locpath (string-append locales "/lib/locale"))) ;; Modify 'guix' directly instead of using ;; 'wrap-program'. This avoids the indirection ;; through Bash, which in turn avoids getting Bash's ;; own locale warnings. (substitute* (string-append out "/bin/guix") (("!#") (string-append "!#\n\n" (object->string `(set! %load-path (append ',path %load-path))) "\n" (object->string `(set! %load-compiled-path (append ',gopath %load-compiled-path))) "\n" (object->string `(let ((path (getenv "GUIX_LOCPATH"))) (setenv "GUIX_LOCPATH" (if path (string-append path ":" ,locpath) ,locpath)))) "\n\n")))))) ;; The 'guix' executable has 'OUT/libexec/guix/guile' as ;; its shebang; that should remain unchanged, thus remove ;; the 'patch-shebangs' phase, which would otherwise ;; change it to 'GUILE/bin/guile'. (delete 'patch-shebangs)))) (native-inputs `(("pkg-config" ,pkg-config) ;; Guile libraries are needed here for ;; cross-compilation. ("guile" ,guile-3.0-latest) ;for faster builds ("guile-gnutls" ,guile-gnutls) ,@(if (target-hurd?) '() `(("guile-avahi" ,guile-avahi))) ("guile-gcrypt" ,guile-gcrypt) ("guile-json" ,guile-json-4) ("guile-lib" ,guile-lib) ("guile-sqlite3" ,guile-sqlite3) ("guile-zlib" ,guile-zlib) ("guile-lzlib" ,guile-lzlib) ("guile-zstd" ,guile-zstd) ("guile-ssh" ,guile-ssh) ("guile-git" ,guile-git) ;; XXX: Keep the development inputs here even though ;; they're unnecessary, just so that 'guix environment ;; guix' always contains them. ("autoconf" ,autoconf) ("automake" ,automake) ("gettext" ,gettext-minimal) ("texinfo" ,texinfo) ("graphviz" ,graphviz) ;non-minimal for PDF support ("font-ghostscript" ,font-ghostscript) ;fonts for 'dot' ("imagemagick" ,imagemagick) ;for 'make dist' ("perl" ,perl) ;for 'make dist' ("help2man" ,help2man) ("po4a" ,po4a-minimal))) (inputs `(("bzip2" ,bzip2) ("gzip" ,gzip) ("sqlite" ,sqlite) ("libgcrypt" ,libgcrypt) ("zlib" ,zlib) ("guile" ,guile-3.0-latest) ;; Some of the tests use "unshare" when it is available. ("util-linux" ,util-linux) ;; Many tests rely on the 'guile-bootstrap' package, which is why we ;; have it here. ("boot-guile" ,(bootstrap-guile-origin (%current-system))) ,@(if (and (not (%current-target-system)) (string=? (%current-system) "x86_64-linux")) `(("boot-guile/i686" ,(bootstrap-guile-origin "i686-linux"))) '()) ,@(if (%current-target-system) `(("xz" ,xz)) '()) ;; Tests also rely on these bootstrap executables. ("bootstrap/bash" ,(bootstrap-executable "bash" (%current-system))) ("bootstrap/mkdir" ,(bootstrap-executable "mkdir" (%current-system))) ("bootstrap/tar" ,(bootstrap-executable "tar" (%current-system))) ("bootstrap/xz" ,(bootstrap-executable "xz" (%current-system))) ("disarchive" ,disarchive) ;for 'guix perform-download' ("guile-bzip2" ,guile-bzip2) ;for Disarchive ("guile-lzma" ,guile-lzma) ;for Disarchive ("git-minimal" ,git-minimal) ;for 'guix perform-download' ("glibc-utf8-locales" ,(libc-utf8-locales-for-target)))) (propagated-inputs `(("guile-gnutls" ,guile-gnutls) ;; Avahi requires "glib" which doesn't cross-compile yet. ,@(if (target-hurd?) '() `(("guile-avahi" ,guile-avahi))) ("guile-gcrypt" ,guile-gcrypt) ("guile-json" ,guile-json-4) ("guile-lib" ,guile-lib) ("guile-semver" ,guile-semver) ("guile-sqlite3" ,guile-sqlite3) ("guile-ssh" ,guile-ssh) ("guile-git" ,guile-git) ("guile-zlib" ,guile-zlib) ("guile-lzlib" ,guile-lzlib) ("guile-zstd" ,guile-zstd))) (native-search-paths (list (search-path-specification (variable "GUIX_EXTENSIONS_PATH") (files '("share/guix/extensions"))) ;; (guix git) and (guix build download) honor this variable whose ;; name comes from OpenSSL. $SSL_CERT_DIR)) (home-page "https://www.gnu.org/software/guix/") (synopsis "Functional package manager for installed software packages and versions") (description "GNU Guix is a functional package manager for the GNU system, and is also a distribution thereof. It includes a virtual machine image. Besides the usual package management features, it also supports transactional upgrades and roll-backs, per-user profiles, and much more. It is based on the Nix package manager.") (license license:gpl3+)))) (define* (channel-source->package source #:key commit) "Return a package for the given channel SOURCE, a lowerable object." (package (inherit guix) (version (string-append (package-version guix) "." (if commit (string-take commit 7) ""))) (build-system channel-build-system) (arguments `(#:source ,source #:commit ,commit)) (inputs '()) (native-inputs '()) (propagated-inputs '()))) (export channel-source->package) (define-public guix-daemon ;; This package is for internal consumption: it allows us to quickly build ;; the 'guix-daemon' program and use that in (guix self), used by 'guix ;; pull'. (package (inherit guix) (properties `((hidden? . #t))) (name "guix-daemon") ;; Use a minimum set of dependencies. (native-inputs (modify-inputs (package-native-inputs guix) (delete "po4a" "graphviz" "font-ghostscript" "help2man"))) (inputs (modify-inputs (package-inputs guix) (delete "boot-guile" "boot-guile/i686" "util-linux") (prepend guile-gnutls guile-git guile-json-3 guile-gcrypt))) (propagated-inputs '()) (arguments (substitute-keyword-arguments (package-arguments guix) ((#:configure-flags flags '()) ;; Pretend we have those libraries; we don't actually need them. `(append ,flags '("guix_cv_have_recent_guile_sqlite3=yes" "guix_cv_have_recent_guile_ssh=yes"))) ((#:tests? #f #f) #f) ((#:phases phases '%standard-phases) `(modify-phases ,phases (delete 'set-font-path) (add-after 'unpack 'change-default-guix (lambda _ ;; We need to tell 'guix-daemon' which 'guix' command to use. ;; Here we use a questionable hack where we hard-code root's ;; current guix, which could be wrong (XXX). Note that scripts ;; like 'guix perform-download' do not run as root so we assume ;; that they have access to /var/guix/profiles/per-user/root. (substitute* "nix/libstore/globals.cc" (("guixProgram = (.*)nixBinDir + \"/guix\"" _ before) (string-append "guixProgram = " before "/var/guix/profiles/per-user/root\ /current-guix/bin/guix"))) #t)) (replace 'build (lambda _ (invoke "make" "nix/libstore/schema.sql.hh") (invoke "make" "-j" (number->string (parallel-job-count)) "guix-daemon"))) (delete 'copy-bootstrap-guile) (replace 'install (lambda* (#:key outputs #:allow-other-keys) (invoke "make" "install-binPROGRAMS"))) (delete 'wrap-program))))))) (define-public guix-minimal ;; A version of Guix which is built with the minimal set of dependencies, as ;; outlined in the README "Requirements" section. Intended as a CI job, so ;; marked as hidden. (hidden-package (package (inherit guix) (name "guix-minimal") (native-inputs (modify-inputs (package-native-inputs guix) (delete "guile-ssh"))) (propagated-inputs (modify-inputs (package-propagated-inputs guix) (delete "guile-ssh")))))) (define-public (guix-for-channels channels) "Return a package corresponding to CHANNELS." (package (inherit guix) (source (find guix-channel? channels)) (build-system channel-build-system) (arguments `(#:channels ,(remove guix-channel? channels))) (inputs '()) (native-inputs '()) (propagated-inputs '()))) (define-public current-guix-package ;; This parameter allows callers to override the package that 'current-guix' ;; returns. This is useful when 'current-guix' cannot compute it by itself, ;; for instance because it's not running from a source code checkout. ;; ;; The default value is obtained by creating a package from the 'guix' ;; channel returned by 'current-channels' or, if that's the empty list, that ;; returned by 'repository->guix-channel' for the current directory (which ;; assumes that we're running from a Git checkout). Delay computation so ;; that the relevant modules can be loaded lazily. (make-parameter (delay (match (or (find guix-channel? (current-channels)) (repository->guix-channel (current-source-directory))) ((? channel? source) (package (inherit guix) (source source) (build-system channel-build-system) (inputs '()) (native-inputs '()) (propagated-inputs '()))) (#f #f))))) (define-public current-guix (lambda () "Return a package representing the currently-used Guix. It can be overridden by setting the 'current-guix-package' parameter." (match (current-guix-package) ((? promise? package) (force package)) (package package)))) (define-public guix-icons (package (name "guix-icons") (version "0.1") (source %artwork-repository) (build-system trivial-build-system) (native-inputs (list imagemagick)) (arguments `(#:modules ((guix build utils) (gnu build svg)) ;; There's no point in cross-compiling: a native build gives the same ;; result, independently of the system type. #:target #f #:builder ,(with-extensions (list guile-rsvg guile-cairo) #~(begin (use-modules (guix build utils) (gnu build svg)) (let* ((logo (string-append #$source "/logo/Guix.svg")) (logo-white (string-append #$source "/logo/Guix-horizontal-white.svg")) (theme "hicolor") (category "apps") (sizes '(16 24 32 48 64 72 96 128 256 512 1024)) (icons (string-append #$output "/share/icons/" theme)) (scalable-dir (string-append icons "/scalable/" category))) (setenv "XDG_CACHE_HOME" (getcwd)) ;; Create the scalable icon files. (mkdir-p scalable-dir) (copy-file logo (string-append scalable-dir "/guix-icon.svg")) (copy-file logo-white (string-append scalable-dir "/guix-white-icon.svg")) ;; Create the fixed dimensions icon files. (for-each (lambda (size) (let* ((dimension (format #f "~ax~a" size size)) (file (string-append icons "/" dimension "/" category "/guix-icon.png"))) (mkdir-p (dirname file)) (svg->png logo file #:width size #:height size))) sizes)))))) (home-page "https://www.gnu.org/software/guix/") (synopsis "GNU Guix icons") (description "This package contains GNU Guix icons organized according to the Icon Theme Specification. They can be used by applications querying the GTK icon cache for instance.") (license license:cc-by-sa4.0))) (define-public guix-backgrounds (package (name "guix-backgrounds") (version "0.1") (source %artwork-repository) (build-system copy-build-system) (arguments (list #:install-plan #~'(("backgrounds" "share/backgrounds/guix" #:exclude ("README"))))) (home-page "https://www.gnu.org/software/guix/") (synopsis "Background images for GNU Guix") (description "The SVG files in this directory are intended to be used as backgrounds for different components of the GNU system like login managers and desktop environments. The backgrounds are available in different aspect ratios which are indicated in the file name.") (license (list license:public-domain license:cc-by-sa4.0)))) (define-public guix-modules (package (name "guix-modules") (version "0.1.0") (home-page "https://gitlab.inria.fr/guix-hpc/guix-modules") (source (origin (method git-fetch) (uri (git-reference (url home-page) (commit (string-append "v" version)))) (file-name (string-append "guix-modules-" version "-checkout")) (sha256 (base32 "1ckvrrmkgzz93i35sj1372wxs7ln4gzszpri1pcdf473z0p7nh7w")))) (build-system guile-build-system) (arguments '(#:phases (modify-phases %standard-phases (add-after 'install 'move-to-extension-directory (lambda* (#:key outputs #:allow-other-keys) (let* ((out (assoc-ref outputs "out")) (target (string-append out "/share/guix/extensions/module.scm"))) (mkdir-p (dirname target)) (rename-file (car (find-files out "module.scm")) target))))))) (native-inputs (list (lookup-package-input guix "guile") guix)) (synopsis "Generate environment modules from Guix packages") (description "Guix-Modules is an extension of Guix that provides a new @command{guix module} command. The @command{guix module create} sub-command creates @dfn{environment modules}, allowing you to manipulate software environments with the @command{module} command commonly found on @acronym{HPC, high-performance computing} clusters.") (license license:gpl3+))) ;;; ;;; Other tools. ;;; (define-public nix (package (name "nix") (version "2.16.1") (source (origin (method git-fetch) (uri (git-reference (url "https://github.com/NixOS/nix") (commit version))) (file-name (git-file-name name version)) (sha256 (base32 "1rca8ljd33dmvh9bqk6sy1zxk97aawcr6k1f7hlm4d1cd9mrcw7x")) (patches (search-patches "nix-dont-build-html-doc.diff")))) (build-system gnu-build-system) (arguments (list #:configure-flags #~(list "--sysconfdir=/etc" "--enable-gc") #:phases #~(modify-phases %standard-phases (replace 'install ;; Don't try & fail to create subdirectories in /etc, but keep them ;; in the output as examples. (lambda* (#:key (make-flags '()) outputs #:allow-other-keys) (let ((etc (string-append #$output "/etc"))) (apply invoke "make" "install" (string-append "sysconfdir=" etc) (string-append "profiledir=" etc "/profile.d") make-flags)))) (replace 'check (lambda args ;; A few tests expect the environment variable NIX_STORE to be ;; "/nix/store" (let ((original-NIX_STORE (getenv "NIX_STORE"))) (dynamic-wind (lambda () (setenv "NIX_STORE" "/nix/store")) (lambda () (apply (assoc-ref %standard-phases 'check) args)) (lambda () (setenv "NIX_STORE" original-NIX_STORE))))))))) (native-inputs (list autoconf autoconf-archive automake bison flex googletest jq libtool pkg-config rapidcheck)) (inputs (append (list boost brotli bzip2 curl editline libarchive libgc libseccomp libsodium lowdown nlohmann-json openssl sqlite xz zlib) (if (or (target-x86-64?) (target-x86-32?)) (list libcpuid) '()))) (home-page "https://nixos.org/nix/") (synopsis "The Nix package manager") (description "Nix is a purely functional package manager. This means that it treats packages like values in purely functional programming languages such as Haskell—they are built by functions that don't have side-effects, and they never change after they have been built. Nix stores packages in the Nix store, usually the directory /nix/store, where each package has its own unique sub-directory.") (license license:lgpl2.1+))) (define-public stow (package (name "stow") (version "2.4.0") (source (origin (method url-fetch) (uri (string-append "mirror://gnu/stow/stow-" version ".tar.gz")) (sha256 (base32 "07bn3n5n8spl2vabgyl8db5dyp690qn3x92ij4ynvayyck7ngvbg")))) (build-system gnu-build-system) (inputs (list perl)) (native-inputs (list perl-test-simple perl-test-output perl-capture-tiny perl-io-stringy)) (home-page "https://www.gnu.org/software/stow/") (synopsis "Managing installed software packages") (description "GNU Stow is a symlink manager. It generates symlinks to directories of data and makes them appear to be merged into the same directory. It is typically used for managing software packages installed from source, by letting you install them apart in distinct directories and then create symlinks to the files in a common directory such as /usr/local.") (license license:gpl3+))) (define-public xstow (package (name "xstow") (version "1.0.2") (source (origin (method url-fetch) (uri (string-append "mirror://sourceforge/xstow/xstow-" version ".tar.bz2")) (sha256 (base32 "1vy6lcswpkixh7h5mvsmq2wbcih6lpsmcva3m7v6f5npllciy13g")))) (build-system gnu-build-system) (synopsis "Replacement of GNU Stow written in C++") (description "XStow is a replacement of GNU Stow written in C++. It supports all features of Stow with some extensions.") (home-page "https://xstow.sourceforge.net/") (license license:gpl2))) (define-public rpm (package (name "rpm") (version "4.18.0") (source (origin (method url-fetch) (uri (string-append "http://ftp.rpm.org/releases/rpm-" (version-major+minor version) ".x/rpm-" version ".tar.bz2")) (sha256 (base32 "0m250plyananjn0790xmwy6kixmxcdj5iyy2ybnk1aw7f4nia5ra")))) (outputs '("out" "debug")) (build-system gnu-build-system) (arguments '(#:configure-flags '("--enable-python" ;; The RPM database must be writable. "--localstatedir=/var") #:phases (modify-phases %standard-phases (add-after 'unpack 'fix-lua-check (lambda _ (substitute* "configure" (("lua >= ?.?") "lua-5.3 >= 5.3")))) (add-after 'unpack 'patch-build-system (lambda _ ;; The build system attempts to create /var in the build ;; chroot, and fails. (substitute* "Makefile.in" ((".*MKDIR_P) \\$\\(DESTDIR)\\$\\(localstatedir.*") ""))))))) (native-inputs (list pkg-config python)) (inputs (list bzip2 file libarchive libgcrypt lua sqlite xz zlib zstd)) (propagated-inputs ;; popt is listed in the 'Requires' of rpm.pc. (list popt)) (home-page "https://rpm.org/") (synopsis "The RPM Package Manager") (description "The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating computer software packages. Each software package consists of an archive of files along with information about the package like its version, a description. There is also a library permitting developers to manage such transactions from C or Python.") ;; The whole is GPLv2+; librpm itself is dual-licensed LGPLv2+ | GPLv2+. (license license:gpl2+))) (define-public bffe (let ((commit "7df2aa647d11342e3a446f44ef7626e58a1d5902") (revision "6")) (package (name "bffe") (version (git-version "0" revision commit)) (source (origin (method git-fetch) (uri (git-reference (url "https://git.cbaines.net/guix/bffe") (commit commit))) (sha256 (base32 "04gg21rjl3c1l8i2wnq8w1w6zfh2qmp9ay839ll90c1jf9bc3sn4")) (file-name (string-append name "-" version "-checkout")))) (build-system gnu-build-system) (native-inputs (list pkg-config autoconf automake ;; Guile libraries are needed here for cross-compilation. guile-next guile-gnutls guile-json-4 guix guix-data-service guix-build-coordinator guile-fibers guile-prometheus guile-lib)) (propagated-inputs (list guile-gnutls guile-json-4 guix guix-data-service guix-build-coordinator guile-fibers guile-prometheus guile-lib)) (home-page "https://git.cbaines.net/guix/bffe") (synopsis "Build Farm Front-end for Guix") (description "The BFFE of Build Farm Front-end is an experimental frontend for Guix build farms. It works together with the Guix Data Service and Guix Build Coordinator to submit builds and monitor the activity. It functions as a Guile library, with the @code{run-bffe-service} procedure in the @code{(bffe)} module as the entry point.") (license license:gpl3+)))) (define-public python-anaconda-client (package (name "python-anaconda-client") (version "1.8.0") (source (origin (method git-fetch) (uri (git-reference (url "https://github.com/Anaconda-Platform/anaconda-client") (commit version))) (file-name (git-file-name name version)) (sha256 (base32 "1vyk0g0gci4z9psisb8h50zi3j1nwfdg1jw3j76cxv0brln0v3fw")))) (build-system pyproject-build-system) (arguments (list #:test-flags ;; These tests require a network connection '(append (map (lambda (file) (string-append "--ignore=binstar_client/" file)) (list "tests/test_upload.py" "tests/test_authorizations.py" "tests/test_login.py" "tests/test_whoami.py" "utils/notebook/tests/test_data_uri.py" "utils/notebook/tests/test_base.py" "utils/notebook/tests/test_downloader.py" "inspect_package/tests/test_conda.py")) ;; get_conda_root returns None (list "-k" "not test_conda_root \ and not test_conda_root_outside_root_environment")) #:phases '(modify-phases %standard-phases (add-after 'unpack 'python3.10-compatibility (lambda _ (substitute* "binstar_client/utils/config.py" (("collections.Mapping") "collections.abc.Mapping")))) ;; This is needed for some tests. (add-before 'check 'set-HOME (lambda _ (setenv "HOME" "/tmp")))))) (propagated-inputs (list python-clyent python-nbformat python-pyyaml python-requests)) (native-inputs (list python-coverage python-dateutil python-freezegun python-mock python-pillow python-pytest python-pytz)) (home-page "https://github.com/Anaconda-Platform/anaconda-client") (synopsis "Anaconda Cloud command line client library") (description "Anaconda Cloud command line client library provides an interface to Anaconda Cloud. Anaconda Cloud is useful for sharing packages, notebooks and environments.") (license license:bsd-3))) (define-public python-conda-package-handling (package (name "python-conda-package-handling") (version "1.7.3") (source (origin (method git-fetch) (uri (git-reference (url "https://github.com/conda/conda-package-handling/") (commit version))) (file-name (git-file-name name version)) (sha256 (base32 "1dq6f5ks3cinb355x712bls9bvv6bli6x3c43sdkqvawdw8xgv9j")))) (build-system python-build-system) (arguments `(#:phases (modify-phases %standard-phases (add-after 'unpack 'use-unmodified-libarchive (lambda _ (substitute* "setup.py" (("archive_and_deps") "archive")))) (replace 'check (lambda* (#:key inputs outputs #:allow-other-keys) (add-installed-pythonpath inputs outputs) (invoke "pytest" "-vv" "tests")))))) (propagated-inputs (list python-six python-tqdm)) (inputs (list libarchive)) (native-inputs (list python-cython python-pytest python-pytest-cov python-pytest-mock python-mock)) (home-page "https://conda.io") (synopsis "Create and extract conda packages of various formats") (description "This library is an abstraction of Conda package handling and a tool for extracting, creating, and converting between formats.") (license license:bsd-3))) (define-public conda (package (name "conda") (version "22.9.0") (source (origin (method git-fetch) (uri (git-reference (url "https://github.com/conda/conda") (commit version))) (file-name (git-file-name name version)) (sha256 (base32 "16vz4vx311ry9w35mi5wna8p8n3abd6wdqrpqzjfdlwv7hcr44s4")))) (build-system python-build-system) (arguments `(#:phases (modify-phases %standard-phases ;; The default version of pytest does not support these options. (add-after 'unpack 'use-older-pytest (lambda _ (substitute* "setup.cfg" (("--xdoctest-.*") "")))) (add-after 'unpack 'fix-ruamel-yaml-dependency (lambda _ (substitute* "setup.py" (("ruamel_yaml_conda") "ruamel.yaml")))) (add-after 'unpack 'correct-python-executable-name (lambda* (#:key inputs #:allow-other-keys) (let ((python (assoc-ref inputs "python-wrapper"))) #; (substitute* "conda/common/path.py" (("python_version or ''") "python_version or '3'")) (substitute* "conda/core/initialize.py" (("python_exe = join") (format #f "python_exe = \"~a/bin/python\" #" python)))))) (add-after 'unpack 'do-not-use-python-root-as-prefix (lambda* (#:key inputs outputs #:allow-other-keys) (let ((out (assoc-ref outputs "out")) (python (assoc-ref inputs "python-wrapper"))) (substitute* "tests/core/test_initialize.py" (("\"\"\"\\) % conda_prefix") (format #f "\"\"\") % \"~a\"" python)) (("CONDA_PYTHON_EXE \"%s\"' % join\\(conda_prefix") (format #f "CONDA_PYTHON_EXE \"%s\"' % join(\"~a\"" python)) (("conda_prefix = abspath\\(sys.prefix\\)") (format #f "conda_prefix = abspath(\"~a\")" out))) (substitute* "conda/base/context.py" (("os.chdir\\(sys.prefix\\)") (format #f "os.chdir(\"~a\")" out)) (("sys.prefix, '.condarc'") (format #f "\"~a\", '.condarc'" out)) (("return abspath\\(sys.prefix\\)") (format #f "return abspath(\"~a\")" out)) (("os.path.join\\(sys.prefix, bin_dir, exe\\)") (format #f "\"~a/bin/conda\"" out)) (("'CONDA_EXE', sys.executable") (format #f "'CONDA_EXE', \"~a/bin/conda\"" out)))))) (add-before 'build 'create-version-file (lambda _ (with-output-to-file "conda/.version" (lambda () (display ,version))))) (replace 'check (lambda* (#:key tests? #:allow-other-keys) ;; These tests all require network access. (for-each delete-file '("tests/cli/test_main_clean.py" "tests/cli/test_main_rename.py")) (when tests? (setenv "HOME" "/tmp") (invoke "py.test" "-vv" "-k" (string-append "not integration" ;; This one reports a newer version of conda than ;; expected; conda-1.5.2-py27_0 instead of ;; conda-1.3.5-py27_0. " and not test_auto_update_conda" ;; This fails because the output directory is not a ;; Conda environment. " and not test_list" ;; This fails because we patched the default root ;; prefix. " and not test_default_target_is_root_prefix" ;; This fails because of missing features in python-flaky. " and not test_no_features" ;; These fail because they require network access " and not test_no_ssl" " and not test_run_readonly_env" " and not test_run_returns_int" " and not test_run_returns_nonzero_errorlevel" " and not test_run_returns_zero_errorlevel" " and not test_run_uncaptured" ;; TODO: I don't understand what this failure means " and not test_PrefixData_return_value_contract" ;; TODO: same here " and not test_install_1" ;; Not sure if this is really wrong. This fails because ;; /gnu/store/...conda-22.9.0/bin/python ;; is not /gnu/store/...python-wrapper-3.9.9/bin/python " and not test_make_entry_point"))))) (add-after 'install 'init ;; This writes a whole bunch of shell initialization files to the ;; prefix directory. Many features of conda can only be used after ;; running "conda init". (lambda* (#:key inputs outputs #:allow-other-keys) (add-installed-pythonpath inputs outputs) (setenv "HOME" "/tmp") (invoke (string-append (assoc-ref outputs "out") "/bin/conda") "init")))))) (inputs (list python-wrapper)) (propagated-inputs (list python-anaconda-client python-boto3 python-conda-package-handling python-cytoolz python-mock python-pluggy python-pycosat python-pytest python-pyyaml python-requests python-responses python-ruamel.yaml-0.16 python-tqdm ;; XXX: This is dragged in by libarchive and is needed at runtime. zstd)) (native-inputs (list python-coverage python-flaky python-pytest-timeout python-pytest-xprocess)) (home-page "https://github.com/conda/conda") (synopsis "Cross-platform, OS-agnostic, system-level binary package manager") (description "Conda is a cross-platform, Python-agnostic binary package manager. It is the package manager used by Anaconda installations, but it may be used for other systems as well. Conda makes environments first-class citizens, making it easy to create independent environments even for C libraries. Conda is written entirely in Python.") (license license:bsd-3))) (define-public conan (package (name "conan") (version "2.0.9") (source (origin (method git-fetch) ; no tests in PyPI archive (uri (git-reference (url "https://github.com/conan-io/conan") (commit version))) (file-name (git-file-name name version)) (sha256 (base32 "1ykfj7c3i0b57s7ql3p2lawxdzd2cn36f3k8p64lyzla8rwv4xdx")))) (build-system python-build-system) (arguments (list #:modules '((guix build python-build-system) (guix build utils) (ice-9 format)) #:phases #~(modify-phases %standard-phases (add-after 'unpack 'patch-paths (lambda* (#:key inputs #:allow-other-keys) ;; It seems that PATH is manipulated, as printenv is not found ;; during tests. Patch in its exact location. (substitute* "conan/tools/env/environment.py" (("printenv") (search-input-file inputs "bin/printenv"))))) (add-after 'unpack 'patch-hard-coded-GCC-references (lambda _ ;; The test suite expects GCC 9 to be used (see: ;; https://github.com/conan-io/conan/issues/13575). Render the ;; check version agnostic. (substitute* "conans/test/functional/toolchains/meson/_base.py" (("__GNUC__9") "__GNUC__")))) (add-after 'unpack 'use-current-cmake-for-tests (lambda _ (substitute* (find-files "conans/test" "\\.py$") (("@pytest.mark.tool\\(\"cmake\", \"3.23\")") "@pytest.mark.tool(\"cmake\")")))) (add-before 'check 'configure-tests (lambda _ (let* ((cmake-version #$(version-major+minor (package-version cmake))) (pkg-config-version #$(version-major+minor (package-version pkg-config)))) (call-with-output-file "conans/test/conftest_user.py" (lambda (port) (format port "\ tools_locations = { 'apt_get': {'disabled': True}, 'bazel': {'disabled': True}, 'cmake': {'default': '~a', '3.15': {'disabled': True}, '3.16': {'disabled': True}, '3.17': {'disabled': True}, '3.19': {'disabled': True}, '~:*~a': {}}, 'pkg_config': {'exe': 'pkg-config', 'default': '~a', '~:*~a': {}}, 'svn': {'disabled': True}}~%" cmake-version pkg-config-version)))))) (add-before 'check 'set-home (lambda _ (setenv "HOME" "/tmp"))) (replace 'check (lambda* (#:key tests? outputs #:allow-other-keys) (define system #$(or (%current-target-system) (%current-system))) (when tests? (setenv "CONFIG_SHELL" (which "sh")) (setenv "PATH" (string-append (getenv "PATH") ":" #$output "/bin")) (invoke "python" "-m" "pytest" "-vv" "-n" (number->string (parallel-job-count)) "-m" "not slow" ;; Disable problematic tests. "-k" (string-append ;; These tests rely on networking. "not download_retries_errors " "and not ftp " ;; Guix sets PKG_CONFIG_PATH itself, which is not ;; expected by the following test. "and not pkg_config_path " "and not compare " ;caused by newer node-semver? ;; This test hard-codes a compiler version. "and not test_toolchain " ;; The 'test_list' tests may fail ;; non-deterministically (see: ;; https://github.com/conan-io/conan/issues/13583). "and not test_list " ;; These tests fail when Autoconf attempt to load a ;; shared library in the same directory (see: ;; https://github.com/conan-io/conan/issues/13577). "and not test_other_client_can_link_autotools " "and not test_autotools_lib_template " ;; Sometimes fail: https://github.com/conan-io/conan/issues/15936 "and not test_basic_parallel_install " (if (not (string-prefix? "x86_64" system)) ;; These tests either assume the machine is ;; x86_64, or require a cross-compiler to target ;; it. (string-append "and not cpp_package " "and not exclude_code_analysis " "and not cmakedeps_multi " "and not locally_build_linux " "and not custom_configuration " "and not package_from_system " "and not cross_build_command " "and not test_package " "and not test_same ") "") (if (not (or (string-prefix? "x86_64" system) (string-prefix? "i686" system))) ;; This test only works with default arch "x86", ;; "x86_64", "sparc" or "sparcv9". "and not settings_as_a_dict_conanfile " ""))))))))) (propagated-inputs (list python-bottle python-colorama python-dateutil python-distro python-fasteners python-future python-jinja2 python-node-semver python-patch-ng python-pluginbase python-pygments python-pyjwt python-pyyaml python-requests python-six python-tqdm python-urllib3)) (inputs (list coreutils)) ;for printenv (native-inputs (list autoconf-wrapper automake cmake git-minimal libtool meson ninja pkg-config python-bottle python-mock python-parameterized python-pytest python-pytest-xdist python-webtest which)) (home-page "https://conan.io") (synopsis "Decentralized C/C++ package manager") (description "Conan is a package manager for C and C++ developers that boasts the following features: @itemize @item It is fully decentralized. Users can host their packages on their own private servers. @item It can create, upload and download binaries for any configuration and platform, including cross-compiled ones. @item It integrates with any build system, including CMake, Makefiles, Meson, etc. @item It is extensible; its Python-based recipes, together with extensions points allow for great power and flexibility. @end itemize") (license license:expat))) (define-public gwl (package (name "gwl") (version "0.5.1") (source (origin (method url-fetch) (uri (string-append "mirror://gnu/gwl/gwl-" version ".tar.gz")) (sha256 (base32 "08h76ib7hmqyj354aazxqyz0galhywz4093f8hc4py7hbg0rcm27")))) (build-system gnu-build-system) (arguments `(#:parallel-build? #false ; for reproducibility #:make-flags '("GUILE_AUTO_COMPILE=0" "GWL_SKIP_INTEGRATION_TESTS=1") #:phases (modify-phases %standard-phases (add-after 'unpack 'disable-test (lambda _ ;; This test loads a workflow, which requires a working Guix installation. (substitute* "tests/cache.scm" (("\\(test-assert \"workflows with same file name have different cache prefixes\"" m) (string-append "#;" m)))))))) (native-inputs (list autoconf automake pkg-config texinfo graphviz)) (inputs (let ((p (package-input-rewriting `((,guile-3.0 . ,guile-3.0-latest)) #:deep? #false))) (list guix guile-3.0-latest (p guile-commonmark) (p guile-config) (p guile-drmaa) (p guile-gcrypt) (p guile-pfds) (p guile-syntax-highlight) (p guile-wisp)))) (home-page "https://workflows.guix.info") (synopsis "Workflow management extension for GNU Guix") (description "The @dfn{Guix Workflow Language} (GWL) provides an extension to GNU Guix's declarative language for package management to automate the execution of programs in scientific workflows. The GWL can use process engines to integrate with various computing environments.") ;; The Scheme modules in guix/ and gnu/ are licensed GPL3+, ;; the web interface modules in gwl/ are licensed AGPL3+, ;; and the fonts included in this package are licensed OFL1.1. (license (list license:gpl3+ license:agpl3+ license:silofl1.1)))) (define-public gwl/next (let ((commit "706a0895f639ed3ed77d0fe88382f51a6638b514") (revision "1")) (package (inherit gwl) (name "gwl-next") (version (git-version "0.5.0" revision commit)) (source (origin (method git-fetch) (uri (git-reference (url "https://git.savannah.gnu.org/git/gwl.git") (commit commit))) (file-name (git-file-name name version)) (sha256 (base32 "0k9zkdyyzir3fvlbcfcqy17k28b51i20rpbjwlx2i1mwd2pw9cxc"))))))) (define-public guix-build-coordinator (let ((commit "406db8a8db53731de432c452902a098915e876c2") (revision "109")) (package (name "guix-build-coordinator") (version (git-version "0" revision commit)) (source (origin (method git-fetch) (uri (git-reference (url "https://git.savannah.gnu.org/git/guix/build-coordinator.git") (commit commit))) (sha256 (base32 "0yi3xji5qm6r5h6nmfbxqgaipp4al08h2mn6sci85ikm80vvy66a")) (file-name (string-append name "-" version "-checkout")))) (build-system gnu-build-system) (arguments (list #:modules `(((guix build guile-build-system) #:select (target-guile-effective-version)) ,@%gnu-build-system-modules) #:imported-modules `((guix build guile-build-system) ,@%gnu-build-system-modules) #:phases #~(modify-phases %standard-phases (add-before 'build 'set-GUILE_AUTO_COMPILE (lambda _ ;; To avoid warnings relating to 'guild'. (setenv "GUILE_AUTO_COMPILE" "0"))) (add-after 'install 'wrap-executable (lambda* (#:key inputs outputs target #:allow-other-keys) (let* ((out (assoc-ref outputs "out")) (bin (string-append out "/bin")) (guile (assoc-ref inputs "guile")) (version (target-guile-effective-version)) (scm (string-append out "/share/guile/site/" version)) (go (string-append out "/lib/guile/" version "/site-ccache"))) (for-each (lambda (file) (simple-format (current-error-port) "wrapping: ~A\n" file) (let ((guile-inputs (list "guile-json" "guile-gcrypt" "guix" "guile-prometheus" "guile-lib" "guile-lzlib" "guile-zlib" "guile-sqlite3" "guile-gnutls" #$@(if (target-hurd?) '() '("guile-fibers"))))) (wrap-program file `("PATH" ":" prefix (,bin ;; Support building without sqitch as an input, as it ;; can't be cross-compiled yet ,@(or (and=> (assoc-ref inputs "sqitch") list) '()))) `("GUIX_LOCPATH" ":" prefix (,(string-append (assoc-ref inputs "glibc-utf8-locales") "/lib/locale"))) `("GUILE_LOAD_PATH" ":" prefix (,scm ,(string-join (map (lambda (input) (simple-format #f "~A/share/guile/site/~A" (assoc-ref inputs input) version)) guile-inputs) ":"))) `("GUILE_LOAD_COMPILED_PATH" ":" prefix (,go ,(string-join (map (lambda (input) (simple-format #f "~A/lib/guile/~A/site-ccache" (assoc-ref inputs input) version)) guile-inputs) ":")))))) (find-files bin))))) (delete 'strip)))) ; As the .go files aren't compatible (native-inputs (list pkg-config autoconf automake guile-gnutls ;; Guile libraries are needed here for cross-compilation. guile-json-4 guile-gcrypt guix guile-prometheus guile-fibers guile-lib guile-next)) (inputs (list guile-next sqlite bash-minimal (libc-utf8-locales-for-target) sqitch)) (propagated-inputs (list guile-prometheus guile-gcrypt guile-json-4 guile-lib guile-lzlib guile-zlib guile-sqlite3 guix guile-gnutls guile-fibers)) (home-page "https://git.cbaines.net/guix/build-coordinator/") (synopsis "Tool to help build derivations") (description "The Guix Build Coordinator helps with performing lots of builds across potentially many machines, and with doing something with the results and outputs of those builds.") (license license:gpl3+)))) (define-public guix-build-coordinator/agent-only (package (inherit guix-build-coordinator) (name "guix-build-coordinator-agent-only") (arguments (substitute-keyword-arguments (package-arguments guix-build-coordinator) ((#:phases phases #~%standard-phases) #~(modify-phases #$phases (add-after 'install 'strip-non-agent-files (lambda _ (delete-file-recursively (string-append #$output "/share/guix-build-coordinator")) (delete-file (string-append #$output "/bin/guix-build-coordinator")))))))) (native-inputs (list pkg-config autoconf automake guile-gnutls ;; Guile libraries are needed here for cross-compilation. guile-json-4 guile-gcrypt guix guile-prometheus guile-lib guile-next)) (inputs (list guile-next guix guile-prometheus guile-gcrypt guile-json-4 guile-lib guile-lzlib guile-zlib guile-gnutls bash-minimal (libc-utf8-locales-for-target))) (description "The Guix Build Coordinator helps with performing lots of builds across potentially many machines, and with doing something with the results and outputs of those builds. This package just includes the agent component."))) (define-public guix-jupyter (package (name "guix-jupyter") (version "0.2.2") (home-page "https://gitlab.inria.fr/guix-hpc/guix-kernel") (source (origin (method git-fetch) (uri (git-reference (url home-page) (commit (string-append "v" version)))) (sha256 (base32 "17m6970wnvwlbarq4gxz5bakhzyhq5ch8qd8jw55ydccpv6473kq")) (file-name (string-append "guix-jupyter-" version "-checkout")))) (build-system gnu-build-system) (arguments `(#:modules ((srfi srfi-26) (ice-9 match) (ice-9 popen) (ice-9 rdelim) (guix build utils) (guix build gnu-build-system)) #:phases (modify-phases %standard-phases (add-after 'install 'sed-kernel-json (lambda* (#:key inputs outputs #:allow-other-keys) (let* ((out (assoc-ref outputs "out")) (guix (assoc-ref inputs "guix")) (guile (assoc-ref inputs "guile")) (json (assoc-ref inputs "guile-json")) (git (assoc-ref inputs "guile-git")) (bs (assoc-ref inputs "guile-bytestructures")) (s-zmq (assoc-ref inputs "guile-simple-zmq")) (gcrypt (assoc-ref inputs "guile-gcrypt")) (deps (list out s-zmq guix json git bs gcrypt)) (effective (read-line (open-pipe* OPEN_READ (string-append guile "/bin/guile") "-c" "(display (effective-version))"))) (path (map (cut string-append "-L\", \"" <> "/share/guile/site/" effective) deps)) (gopath (map (cut string-append "-C\", \"" <> "/lib/guile/" effective "/site-ccache") deps)) (kernel-dir (string-append out "/share/jupyter/kernels/guix/"))) (substitute* (string-append kernel-dir "kernel.json") (("-s") (string-join (list (string-join path "\",\n\t\t\"") (string-join gopath "\",\n\t\t\"") "-s") "\",\n\t\t\"")) (("guix-jupyter-kernel.scm") (string-append out "/share/guile/site/" effective "/guix-jupyter-kernel.scm")))))) (add-before 'check 'define-home (lambda _ ;; IPython goes awry when HOME points to a non-existent ;; directory: ;; ;; IPython/paths.py:70: UserWarning: IPython parent '/homeless-shelter' is not a writable location, using a temp directory. ;; ;; This in turn leads to test failures, so define HOME. (setenv "HOME" (getcwd))))))) (native-inputs (list autoconf automake pkg-config ;; For testing. jupyter python-ipython python-ipykernel)) (inputs (list guix (lookup-package-native-input guix "guile"))) (propagated-inputs (list guile-json-4 guile-simple-zmq guile-gcrypt)) (synopsis "Guix kernel for Jupyter") (description "Guix-Jupyter is a Jupyter kernel. It allows you to annotate notebooks with information about their software dependencies, such that code is executed in the right software environment. Guix-Jupyter spawns the actual kernels such as @code{python-ipykernel} on behalf of the notebook user and runs them in an isolated environment, in separate namespaces.") (license license:gpl3+))) (define-public nar-herder (let ((commit "82f9371c714f14ca59efb8d67b20e9c85b5c86d1") (revision "37")) (package (name "nar-herder") (version (git-version "0" revision commit)) (source (origin (method git-fetch) (uri (git-reference (url "https://git.savannah.gnu.org/git/guix/nar-herder.git") (commit commit))) (sha256 (base32 "0907hrb02qfa0xvkgzap7bwlx0w9ywfcfr6iw41w4rxarf7xkjlg")) (file-name (string-append name "-" version "-checkout")))) (build-system gnu-build-system) (arguments (list #:modules `(((guix build guile-build-system) #:select (target-guile-effective-version)) ,@%gnu-build-system-modules) #:imported-modules `((guix build guile-build-system) ,@%gnu-build-system-modules) #:phases #~(modify-phases %standard-phases (add-before 'build 'set-GUILE_AUTO_COMPILE (lambda _ ;; To avoid warnings relating to 'guild'. (setenv "GUILE_AUTO_COMPILE" "0"))) (add-after 'install 'wrap-executable (lambda* (#:key inputs outputs target #:allow-other-keys) (let* ((out (assoc-ref outputs "out")) (bin (string-append out "/bin")) (guile (assoc-ref inputs "guile")) (version (target-guile-effective-version)) (scm (string-append out "/share/guile/site/" version)) (go (string-append out "/lib/guile/" version "/site-ccache"))) (for-each (lambda (file) (simple-format (current-error-port) "wrapping: ~A\n" file) (let ((guile-inputs (list "guile-json" "guile-gcrypt" "guix" "guile-lib" "guile-lzlib" "guile-zstd" "guile-prometheus" "guile-sqlite3" "guile-gnutls" "guile-fibers"))) (wrap-program file `("GUILE_LOAD_PATH" ":" prefix (,scm ,(string-join (map (lambda (input) (string-append (assoc-ref inputs input) "/share/guile/site/" version)) guile-inputs) ":"))) `("GUILE_LOAD_COMPILED_PATH" ":" prefix (,go ,(string-join (map (lambda (input) (string-append (assoc-ref inputs input) "/lib/guile/" version "/site-ccache")) guile-inputs) ":")))))) (find-files bin))))) (delete 'strip)))) ; As the .go files aren't compatible (native-inputs (list pkg-config autoconf automake guile-gnutls ;; Guile libraries are needed here for cross-compilation. guile-next guile-json-4 guile-gcrypt guix guile-fibers guile-prometheus guile-lib guile-lzlib guile-zstd guile-sqlite3)) (inputs (list bash-minimal guile-next)) (propagated-inputs (list guile-json-4 guile-gcrypt guix guile-fibers guile-prometheus guile-lib guile-lzlib guile-zstd guile-sqlite3 guile-gnutls)) (home-page "https://git.cbaines.net/guix/nar-herder") (synopsis "Utility for managing and serving nars") (description "The Nar Herder is a utility for managing a collection of nars (normalized archives, in the context of Guix) along with the corresponding narinfo files which contain some signed metadata. It can assist in serving a collection of nars, moving them between machines, or mirroring an existing collection of nars. It's currently a working prototype, many designed features aren't implemented, and the error handling is very rough.") (license license:agpl3+)))) (define-public gcab (package (name "gcab") (version "1.6") (source (origin (method url-fetch) (uri (string-append "mirror://gnome/sources/gcab/" version "/gcab-" version ".tar.xz")) (sha256 (base32 "02sngv40zwadajsiav1paahyfgkccbh9s7r5ks82chbwawarc31g")))) (build-system meson-build-system) (native-inputs (list `(,glib "bin") ; for glib-mkenums intltool pkg-config vala)) (inputs (list glib zlib)) (arguments `(#:configure-flags ;; XXX This ‘documentation’ is for developers, and fails informatively: ;; Error in gtkdoc helper script: 'gtkdoc-mkhtml' failed with status 5 (list "-Ddocs=false" "-Dintrospection=false"))) (home-page "https://wiki.gnome.org/msitools") ; no dedicated home page (synopsis "Microsoft Cabinet file manipulation library") (description "The libgcab library provides GObject functions to read, write, and modify Microsoft cabinet (.@dfn{CAB}) files.") (license (list license:gpl2+ ; tests/testsuite.at license:lgpl2.1+)))) ; the rest (define-public msitools (package (name "msitools") (version "0.100") (source (origin (method url-fetch) (uri (string-append "mirror://gnome/sources/msitools/" version "/msitools-" version ".tar.xz")) (sha256 (base32 "1skq17qr2ic4qr3779j49byfm8rncwbsq9rj1a33ncn2m7isdwdv")))) (build-system gnu-build-system) (native-inputs (list bison pkg-config)) (inputs (list gcab glib libgsf libxml2 `(,util-linux "lib"))) (home-page "https://wiki.gnome.org/msitools") (synopsis "Windows Installer file manipulation tool") (description "msitools is a collection of command-line tools to inspect, extract, build, and sign Windows@tie{}Installer (.@dfn{MSI}) files. It aims to be a solution for packaging and deployment of cross-compiled Windows applications.") (license license:lgpl2.1+))) (define-public libostree (package (name "libostree") (version "2023.5") (source (origin (method url-fetch) (uri (string-append "https://github.com/ostreedev/ostree/releases/download/v" (version-major+minor version) "/libostree-" version ".tar.xz")) (sha256 (base32 "056v7bz40dx8k2j2pfypc4shl6ijzvx1gy8r0kaw66py67xklndw")))) (build-system gnu-build-system) (arguments '(#:phases (modify-phases %standard-phases (add-before 'check 'pre-check (lambda _ ;; Don't try to use the non-existing '/var/tmp' as test ;; directory. (setenv "TEST_TMPDIR" (getenv "TMPDIR"))))) ;; XXX: fails with: ;; tap-driver.sh: missing test plan ;; tap-driver.sh: internal error getting exit status ;; tap-driver.sh: fatal: I/O or internal error #:tests? #f)) (native-inputs (list attr ; for tests bison `(,glib "bin") ; for 'glib-mkenums' gobject-introspection pkg-config libxslt)) (inputs (list avahi docbook-xml docbook-xsl e2fsprogs fuse-2 glib gpgme libarchive libsoup-minimal-2 ; needs libsoup-2.4 util-linux)) (home-page "https://ostree.readthedocs.io/en/latest/") (synopsis "Operating system and container binary deployment and upgrades") (description "@code{libostree} is both a shared library and suite of command line tools that combines a \"git-like\" model for committing and downloading bootable file system trees, along with a layer for deploying them and managing the boot loader configuration.") (license license:lgpl2.0+))) (define-public flatpak (package (name "flatpak") (version "1.14.6") (source (origin (method url-fetch) (uri (string-append "https://github.com/flatpak/flatpak/releases/download/" version "/flatpak-" version ".tar.xz")) (sha256 (base32 "0ij93vl9skcfdfgkmgd80q0q4c6q39dss4rds7phxizqqsr3d3sk")) (patches (search-patches "flatpak-fix-fonts-icons.patch" "flatpak-fix-path.patch" "flatpak-unset-gdk-pixbuf-for-sandbox.patch")))) ;; Wrap 'flatpak' so that GIO_EXTRA_MODULES is set, thereby allowing GIO to ;; find the TLS backend in glib-networking. (build-system glib-or-gtk-build-system) (arguments (list #:configure-flags #~(list "--with-curl" "--enable-documentation=no" ;; FIXME "--enable-system-helper=no" "--localstatedir=/var" (string-append "--with-system-bubblewrap=" (assoc-ref %build-inputs "bubblewrap") "/bin/bwrap") (string-append "--with-system-dbus-proxy=" (assoc-ref %build-inputs "xdg-dbus-proxy") "/bin/xdg-dbus-proxy")) #:phases #~(modify-phases %standard-phases (add-after 'unpack 'fix-tests (lambda* (#:key inputs #:allow-other-keys) (copy-recursively (search-input-directory inputs "lib/locale") "/tmp/locale") (for-each make-file-writable (find-files "/tmp")) (substitute* "tests/make-test-runtime.sh" (("cp `which.*") "echo guix\n") (("cp -r /usr/lib/locale/C\\.\\*") (string-append "mkdir ${DIR}/usr/lib/locale/en_US; \ cp -r /tmp/locale/*/en_US.*"))) (substitute* "tests/libtest.sh" (("/bin/kill") (which "kill")) (("/usr/bin/python3") (which "python3"))) #t)) (add-after 'unpack 'p11-kit-fix (lambda* (#:key inputs #:allow-other-keys) (let ((p11-path (search-input-file inputs "/bin/p11-kit"))) (substitute* "session-helper/flatpak-session-helper.c" (("\"p11-kit\",") (string-append "\"" p11-path "\",")) (("if \\(g_find_program_in_path \\(\"p11-kit\"\\)\\)") (string-append "if (g_find_program_in_path (\"" p11-path "\"))")))))) ;; Many tests fail for unknown reasons, so we just run a few basic ;; tests. (replace 'check (lambda* (#:key tests? #:allow-other-keys) (when tests? (setenv "HOME" "/tmp") (invoke "make" "check" "TESTS=tests/test-basic.sh tests/test-config.sh testcommon"))))))) (native-inputs (list bison dbus ; for dbus-daemon gettext-minimal `(,glib "bin") ; for glib-mkenums + gdbus-codegen (libc-utf8-locales-for-target) gobject-introspection libcap pkg-config python python-pyparsing socat which)) (inputs (list appstream appstream-glib bubblewrap curl dconf fuse gdk-pixbuf gpgme json-glib libarchive libcap libostree libseccomp libsoup-minimal-2 libxau libxml2 p11-kit polkit util-linux xdg-dbus-proxy zstd)) (propagated-inputs (list glib-networking gnupg gsettings-desktop-schemas)) (home-page "https://flatpak.org") (synopsis "System for building, distributing, and running sandboxed desktop applications") (description "Flatpak is a system for building, distributing, and running sandboxed desktop applications on GNU/Linux.") (license license:lgpl2.1+))) (define-public fpm (package (name "fpm") (version "1.15.1") (source (origin (method git-fetch) ;for tests (uri (git-reference (url "https://github.com/jordansissel/fpm") (commit (string-append "v" version)))) (file-name (git-file-name name version)) (sha256 (base32 "1m2zxf7wyk7psvm611yxs68hnwm0pyqilsmcq3x791hz7rvbg68w")) (patches (search-patches "fpm-newer-clamp-fix.patch")))) (build-system ruby-build-system) (arguments (list #:phases #~(modify-phases %standard-phases (add-after 'extract-gemspec 'patch-paths (lambda* (#:key inputs #:allow-other-keys) (substitute* '("lib/fpm/util.rb" "spec/fpm/util_spec.rb" "spec/fpm/package/rpm_spec.rb") (("\"/bin/sh\"") (string-append "\"" (search-input-file inputs "bin/sh") "\""))))) (add-after 'extract-gemspec 'relax-requirements (lambda _ (substitute* "fpm.gemspec" (("\"clamp\", \"~> 1.0.0\"") "\"clamp\", \">= 1.0.0\"")))) (add-after 'extract-gemspec 'disable-problematic-tests ;; Disable some tests which are failing (see: ;; https://github.com/jordansissel/fpm/issues/2000). (lambda _ ;; There are 4 'NoMethodError' test failures in the ;; command_spec suite, for unknown reasons. (delete-file "spec/fpm/command_spec.rb") (substitute* "spec/fpm/package_spec.rb" (("@oldtmp = ENV\\[\"TMP\"]" all) "skip('fails with guix')")) (substitute* "spec/fpm/package/cpan_spec.rb" ;; This test is marked as expected to fail (pending) when ;; TRAVIS_OS_NAME is set, but passes with Guix; skip it. (("it \"should unpack tarball containing" all) (string-append "x" all))) (substitute* "spec/fpm/package/gem_spec.rb" ;; This test fails for unknown reason; perhaps a patched ;; shebang. (("it 'should not change the shebang'" all) (string-append "x" all))))) (replace 'check (lambda* (#:key tests? #:allow-other-keys) (when tests? ;; Set TRAVIS_OS_NAME to skip tests known to cause ;; problems in minimal environments. (setenv "TRAVIS_OS_NAME" "GNU Guix") (invoke "rspec"))))))) (native-inputs (list dpkg libarchive node perl-app-cpanminus python ruby-rspec squashfs-tools zstd)) (inputs (list bash-minimal ruby-arr-pm ruby-backports ruby-cabin ruby-clamp ruby-pleaserun ruby-rexml ruby-stud)) (home-page "https://github.com/jordansissel/fpm/") (synopsis "Package building and mangling tool") (description "@command{fpm} is a command to convert directories, RPMs, Python eggs, Ruby gems, and more to RPMs, debs, Solaris packages and more.") (license license:expat))) (define-public akku (package (name "akku") (version "1.1.0") (source (origin (method git-fetch) (uri (git-reference (url "https://gitlab.com/akkuscm/akku.git") (commit (string-append "v" version)))) (file-name (git-file-name name version)) (sha256 (base32 "1pi18aamg1fd6f9ynfl7zx92052xzf0zwmhi2pwcwjs1kbah19f5")))) (build-system gnu-build-system) (arguments '(#:phases (modify-phases %standard-phases (replace 'bootstrap (lambda* (#:key outputs #:allow-other-keys) (for-each patch-shebang '("bootstrap" ".akku/env")) (let* ((home "/tmp") (datadir (string-append home "/.local/share/akku/"))) (mkdir-p datadir) (invoke "touch" (string-append datadir "index.db")) (setenv "HOME" home)) (invoke "./bootstrap") #t)) (add-after 'install 'wrap-executables (lambda* (#:key outputs inputs #:allow-other-keys) (let ((out (assoc-ref outputs "out")) (curl (assoc-ref inputs "curl"))) (wrap-program (string-append out "/bin/akku") `("LD_LIBRARY_PATH" ":" prefix (,(string-append curl "/lib")))) #t)))))) (native-inputs (list which autoconf automake pkg-config)) (inputs (list guile-3.0 curl)) (home-page "https://akkuscm.org/") (synopsis "Language package manager for Scheme") (description "Akku.scm is a project-based language package manager for R6RS and R7RS Scheme. It is mainly meant for programmers who develop portable programs or libraries in Scheme, but could potentially work for end-users of those programs. It also has a translator from R7RS, which allows most R7RS code to run on R6RS implementations.") (license license:gpl3+))) (define-public modules (package (name "modules") (version "4.8.0") (source (origin (method url-fetch) (uri (string-append "mirror://sourceforge/modules/Modules/modules-" version "/modules-" version ".tar.bz2")) (sha256 (base32 "1amz8qdqbvfdc8jv0j4720vywbz2gi7l3sr1lh37ilfbxy9lq9g9")))) (build-system gnu-build-system) (arguments `(#:configure-flags (list (string-append "--with-bin-search-path=" (assoc-ref %build-inputs "tcl") "/bin" ":" (assoc-ref %build-inputs "procps") "/bin" ":" (assoc-ref %build-inputs "less") "/bin" ":" (assoc-ref %build-inputs "coreutils") "/bin") (string-append "--with-tcl=" (assoc-ref %build-inputs "tcl") "/lib") "--disable-compat-version") #:test-target "test" #:phases (modify-phases %standard-phases (add-before 'configure 'patch-add-modules (lambda* (#:key inputs #:allow-other-keys) (let ((coreutils (assoc-ref inputs "coreutils"))) (substitute* "script/add.modules.in" (("/bin/(cat|cp|rm)" _ command) (string-append coreutils "/bin/" command)) (("/bin/echo") "echo"))))) (add-before 'configure 'patch-scripts-for-python-3 (lambda _ ;; Patch the script for python-3. (substitute* "script/createmodule.py.in" (("pathkeys.sort\\(\\)") "pathkeys = sorted(pathkeys)") (("print\\(\"\\\\t\"\\*") "print(\"\\t\"*int") (("@PYTHON@") (which "python3"))))) (add-before 'check 'patch-/bin/sh-and-nixbld-groups-in-tests (lambda _ (use-modules (srfi srfi-1)) (let* ((groups-file (string-append (getcwd) "/nixbld-groups")) (groups-file-z (string-append groups-file "-z")) (nixbld-groups (fold (lambda (id prev) (catch #t (lambda () (cons (group:name (getgrnam id)) prev)) (lambda _ prev))) '() (vector->list (getgroups))))) ;; Simulate "id -G -n" command output. (call-with-output-file groups-file (lambda (port) (display (string-join nixbld-groups " ") port) (display #\newline port))) ;; Simulate "id -G -n -z" command output. (call-with-output-file groups-file-z (lambda (port) (for-each (lambda (group-name) (display group-name port) (display #\null port)) nixbld-groups))) ;; Generate "modulecmd-test.tcl" before running "make test". (invoke "make" "modulecmd-test.tcl") ;; Substitute shell. (substitute* '("modulecmd-test.tcl" "modulecmd.tcl" "testsuite/modules.70-maint/380-edit.exp" "compat/init/filter") (("/bin/sh") (which "sh"))) ;; Skip tests that use supplementary groups. (for-each delete-file '("testsuite/modules.20-locate/112-hide-user-group.exp" "testsuite/modules.20-locate/117-forbid-user-group.exp" "testsuite/modules.20-locate/119-hide-cascading.exp" "testsuite/modules.50-cmds/140-system.exp" "testsuite/modules.50-cmds/287-info-usergroups.exp" "testsuite/modules.50-cmds/440-module-tag.exp" "testsuite/modules.70-maint/220-config.exp")) (for-each (lambda (file) (substitute* file (("/bin/sh") (which "bash")) ;; For some reason "kvm" group cannot be resolved for ;; "nixbld" user. We replace "id ..." commands with ;; "cat ..." that simulates them. (("exec id -G -n -z") (string-append "exec cat " groups-file-z)) (("exec id -G -n") (string-append "exec cat " groups-file)))) '("testsuite/modules.00-init/005-init_ts.exp" "testsuite/install.00-init/005-init_ts.exp" "modulecmd-test.tcl")))))))) (native-inputs (list dejagnu autoconf which)) (inputs (list tcl less procps coreutils python-3)) (home-page "https://modules.sourceforge.net/") (synopsis "Shell environment variables and aliases management") (description "Modules simplify shell initialization and let users modify their environment during the session with modulefiles. Modules are used on high-performance clusters to dynamically add and remove paths to specific versions of applications.") (license license:gpl2+)))