guix/gnu/packages/package-management.scm
Christopher Baines ce22a756d0
gnu: guile-fibers: Remove version from latest package.
As I think this makes more sense, the version is only specified when you need
a specific previous release.

* gnu/packages/guile-xyz.scm (guile-fibers): Rename to guile-fibers-1.0.
(guile-fibers-1.3): Rename to guile-fibers.
(guile-fibers-1.1): Inherit from guile-fibers.
* gnu/packages/admin.scm (shepherd-0.10)[native-inputs]: Replace
guile-fibers-1.3 with guile-fibers.
* gnu/packages/ci.scm (cuirass)[inputs]: Likewise.
* gnu/packages/gnunet.scm (gnunet-scheme)[propagated-inputs,native-inputs]:
Likewise.
* gnu/packages/package-management.scm (guix-build-coordinator)
[inputs,propagated-inputs]: Likewise.
* gnu/packages/package-management.scm (nar-herder)[inputs,propagated-inputs]:
Likewise.
* gnu/packages/web.scm (guix-data-service)[propagated-inputs]: Likewise.
2023-09-25 11:30:01 +01:00

2314 lines
98 KiB
Scheme
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

;;; GNU Guix --- Functional package management for GNU
;;; Copyright © 2013-2023 Ludovic Courtès <ludo@gnu.org>
;;; Copyright © 2015, 2017, 2020, 2021, 2022, 2023 Ricardo Wurmus <rekado@elephly.net>
;;; Copyright © 2017 Muriithi Frederick Muriuki <fredmanglis@gmail.com>
;;; Copyright © 2017, 2018 Oleg Pykhalov <go.wigust@gmail.com>
;;; Copyright © 2017 Roel Janssen <roel@gnu.org>
;;; Copyright © 20172022 Tobias Geerinckx-Rice <me@tobias.gr>
;;; Copyright © 2018 Julien Lepiller <julien@lepiller.eu>
;;; Copyright © 2018, 2019 Rutger Helling <rhelling@mykolab.com>
;;; Copyright © 2018 Sou Bunnbu <iyzsong@member.fsf.org>
;;; Copyright © 2018, 2019 Eric Bavier <bavier@member.fsf.org>
;;; Copyright © 2019-2023 Efraim Flashner <efraim@flashner.co.il>
;;; Copyright © 2019 Jonathan Brielmaier <jonathan.brielmaier@web.de>
;;; Copyright © 2020 Mathieu Othacehe <m.othacehe@gmail.com>
;;; Copyright © 2020, 2023 Janneke Nieuwenhuizen <janneke@gnu.org>
;;; Copyright © 2020 Giacomo Leidi <goodoldpaul@autistici.org>
;;; Copyright © 2020 Jesse Gibbons <jgibbons2357+guix@gmail.com>
;;; Copyright © 2020 Martin Becze <mjbecze@riseup.net>
;;; Copyright © 2020 Vincent Legoll <vincent.legoll@gmail.com>
;;; Copyright © 2021 Ivan Gankevich <i.gankevich@spbu.ru>
;;; Copyright © 2021, 2022, 2023 Maxim Cournoyer <maxim.cournoyer@gmail.com>
;;; Copyright © 2021 John Kehayias <john.kehayias@protonmail.com>
;;; Copyright © 2022, 2023 Zhu Zihao <all_but_last@163.com>
;;; Copyright © 2023 jgart <jgart@dismail.de>
;;; Copyright © 2023 Mădălin Ionel Patrașcu <madalinionel.patrascu@mdc-berlin.de>
;;;
;;; This file is part of GNU Guix.
;;;
;;; GNU Guix is free software; you can redistribute it and/or modify it
;;; under the terms of the GNU General Public License as published by
;;; the Free Software Foundation; either version 3 of the License, or (at
;;; your option) any later version.
;;;
;;; GNU Guix is distributed in the hope that it will be useful, but
;;; WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
;;; GNU General Public License for more details.
;;;
;;; You should have received a copy of the GNU General Public License
;;; along with GNU Guix. If not, see <http://www.gnu.org/licenses/>.
(define-module (gnu packages package-management)
#:use-module (gnu artwork)
#:use-module (gnu packages)
#:use-module (gnu packages acl)
#:use-module (gnu packages attr)
#:use-module (gnu packages avahi)
#:use-module (gnu packages autotools)
#:use-module (gnu packages backup)
#:use-module (gnu packages base)
#:use-module (gnu packages bash)
#:use-module (gnu packages bdw-gc)
#:use-module (gnu packages bison)
#:use-module (gnu packages boost)
#:use-module (gnu packages bootstrap) ;for 'bootstrap-guile-origin'
#:use-module (gnu packages build-tools)
#:use-module (gnu packages check)
#:use-module (gnu packages compression)
#:use-module (gnu packages cmake)
#:use-module (gnu packages cpio)
#:use-module (gnu packages cpp)
#:use-module (gnu packages crypto)
#:use-module (gnu packages curl)
#:use-module (gnu packages databases)
#:use-module (gnu packages debian)
#:use-module (gnu packages dejagnu)
#:use-module (gnu packages dbm)
#:use-module (gnu packages docbook)
#:use-module (gnu packages file)
#:use-module (gnu packages freedesktop)
#:use-module (gnu packages flex)
#:use-module (gnu packages gcc)
#:use-module (gnu packages gettext)
#:use-module (gnu packages ghostscript)
#:use-module (gnu packages glib)
#:use-module (gnu packages gnome)
#:use-module (gnu packages gnupg)
#:use-module (gnu packages graphviz)
#:use-module (gnu packages gtk)
#:use-module (gnu packages guile)
#:use-module (gnu packages guile-xyz)
#:use-module (gnu packages hardware)
#:use-module (gnu packages hurd)
#:use-module (gnu packages imagemagick)
#:use-module (gnu packages less)
#:use-module (gnu packages libedit)
#:use-module (gnu packages linux)
#:use-module (gnu packages lisp)
#:use-module (gnu packages lua)
#:use-module (gnu packages man)
#:use-module (gnu packages markup)
#:use-module (gnu packages nettle)
#:use-module (gnu packages networking)
#:use-module (gnu packages ninja)
#:use-module (gnu packages node)
#:use-module (gnu packages nss)
#:use-module (gnu packages patchutils)
#:use-module (gnu packages perl)
#:use-module (gnu packages perl-check)
#:use-module (gnu packages pkg-config)
#:use-module (gnu packages popt)
#:use-module (gnu packages python)
#:use-module (gnu packages python-build)
#:use-module (gnu packages python-check)
#:use-module (gnu packages python-web)
#:use-module (gnu packages python-xyz)
#:use-module (gnu packages ruby)
#:use-module (gnu packages serialization)
#:use-module (gnu packages sqlite)
#:use-module (gnu packages ssh)
#:use-module (gnu packages tcl)
#:use-module (gnu packages texinfo)
#:use-module (gnu packages time)
#:use-module (gnu packages tls)
#:use-module (gnu packages vim)
#:use-module (gnu packages virtualization)
#:use-module (gnu packages web)
#:use-module (gnu packages xml)
#:use-module (gnu packages xorg)
#:use-module (gnu packages version-control)
#:autoload (guix build-system channel) (channel-build-system)
#:use-module (guix build-system glib-or-gtk)
#:use-module (guix build-system gnu)
#:use-module (guix build-system guile)
#:use-module (guix build-system meson)
#:use-module (guix build-system pyproject)
#:use-module (guix build-system python)
#:use-module (guix build-system ruby)
#:use-module (guix build-system trivial)
#:use-module (guix download)
#:use-module (guix gexp)
#:use-module (guix git-download)
#:autoload (guix describe) (current-channels)
#:autoload (guix channels) (channel?
guix-channel?
repository->guix-channel)
#:use-module ((guix licenses) #:prefix license:)
#:use-module (guix packages)
#:use-module (guix utils)
#:use-module ((guix search-paths) #:select ($SSL_CERT_DIR $SSL_CERT_FILE))
#:use-module (ice-9 match)
#:use-module (srfi srfi-1))
(define (boot-guile-uri arch)
"Return the URI for the bootstrap Guile tarball for ARCH."
(cond ((string=? "armhf" arch)
(string-append "http://alpha.gnu.org/gnu/guix/bootstrap/"
arch "-linux"
"/20150101/guile-2.0.11.tar.xz"))
((string=? "aarch64" arch)
(string-append "http://alpha.gnu.org/gnu/guix/bootstrap/"
arch "-linux/20170217/guile-2.0.14.tar.xz"))
(else
(string-append "http://alpha.gnu.org/gnu/guix/bootstrap/"
arch "-linux"
"/20131110/guile-2.0.9.tar.xz"))))
;; NOTE: The commit IDs used here form a linked list threaded through the git
;; history. In a phenomenon known as boot-stripping, not only the head of this
;; list is used, but also a few older versions, when a guix from this package is
;; used to build something also depending on guix.
;;
;; Therefore, if, by accident, you set this package to a non-existent commit ID,
;; it is insufficient to simply correct it with the latest commit.
;; Instead, please push one commit that rolls back Guix to before the mistake,
;; and then another that points to the first one. That way, the faulty commit
;; won't appear on the linked list.
;;
;; If you are updating this package because it fails to build, you need to
;; actually update it *twice*, as the installer is pointing to the N-1 guix
;; package revision.
(define-public guix
;; Latest version of Guix, which may or may not correspond to a release.
;; Note: the 'update-guix-package.scm' script expects this definition to
;; start precisely like this.
(let ((version "1.4.0")
(commit "4dfdd822102690b5687acf28365ab707b68d9476")
(revision 10))
(package
(name "guix")
(version (if (zero? revision)
version
(string-append version "-"
(number->string revision)
"." (string-take commit 7))))
(source (origin
(method git-fetch)
(uri (git-reference
(url "https://git.savannah.gnu.org/git/guix.git")
(commit commit)))
(sha256
(base32
"1p21gz2lr7iqvma1m83k2r04w201rzvk31d5kfn2qkr9l0gds4cx"))
(file-name (string-append "guix-" version "-checkout"))))
(build-system gnu-build-system)
(arguments
`(#:configure-flags (list
;; Provide channel metadata for 'guix describe'.
;; Don't pass '--with-channel-url' and
;; '--with-channel-introduction' and instead use
;; the defaults.
,(string-append "--with-channel-commit=" commit)
"--localstatedir=/var"
"--sysconfdir=/etc"
(string-append "--with-bash-completion-dir="
(assoc-ref %outputs "out")
"/etc/bash_completion.d")
;; Set 'DOT_USER_PROGRAM' to the empty string so
;; we don't keep a reference to Graphviz, whose
;; closure is pretty big (too big for the Guix
;; system installation image.)
"ac_cv_path_DOT_USER_PROGRAM=dot"
;; To avoid problems with the length of shebangs,
;; choose a fixed-width and short directory name
;; for tests.
"ac_cv_guix_test_root=/tmp/guix-tests"
,@(if (target-hurd?) '("--with-courage") '()))
#:parallel-tests? #f ;work around <http://bugs.gnu.org/21097>
#:modules ((guix build gnu-build-system)
(guix build utils)
(srfi srfi-26)
(ice-9 popen)
(ice-9 rdelim))
#:phases (modify-phases %standard-phases
(replace 'bootstrap
(lambda _
;; Make sure 'msgmerge' can modify the PO files.
(for-each (lambda (po)
(chmod po #o666))
(find-files "." "\\.po$"))
(patch-shebang "build-aux/git-version-gen")
(call-with-output-file ".tarball-version"
(lambda (port)
(display ,version port)))
;; Install SysV init files to $(prefix)/etc rather
;; than to /etc.
(substitute* "nix/local.mk"
(("^sysvinitservicedir = .*$")
(string-append "sysvinitservicedir = \
$(prefix)/etc/init.d\n")))
;; Install OpenRC init files to $(prefix)/etc rather
;; than to /etc.
(substitute* "nix/local.mk"
(("^openrcservicedir = .*$")
(string-append "openrcservicedir = \
$(prefix)/etc/openrc\n")))
(invoke "sh" "bootstrap")))
,@(if (target-riscv64?)
`((add-after 'unpack 'use-correct-guile-version-for-tests
(lambda _
(substitute* "tests/gexp.scm"
(("2\\.0") "3.0")))))
'())
,@(if (system-hurd?)
`((add-after 'unpack 'disable-tests/hurd
(lambda _
(substitute* "Makefile.am"
(("tests/derivations.scm") "")
(("tests/grafts.scm") "")
(("tests/graph.scm") "")
(("tests/lint.scm") "")
(("tests/nar.scm") "")
(("tests/offload.scm") "")
(("tests/pack.scm") "")
(("tests/packages.scm") "")
(("tests/processes.scm") "")
(("tests/publish.scm") "")
(("tests/pypi.scm") "")
(("tests/size.scm") "")
(("tests/store.scm") "")
(("tests/substitute.scm") "")
(("tests/syscalls.scm") "")
(("tests/union.scm") "")
(("tests/guix-build.sh") "")
(("tests/guix-build-branch.sh") "")
(("tests/guix-hash.sh") "")
(("tests/guix-locate.sh") "")
(("tests/guix-pack.sh") "")
(("tests/guix-pack-relocatable.sh") "")
(("tests/guix-package-aliases.sh") "")
(("tests/guix-package-net.sh") "")
(("tests/guix-home.sh") "")
(("tests/guix-archive.sh") "")
(("tests/guix-environment.sh") "")
(("tests/guix-package.sh") "")
(("tests/guix-refresh.sh") "")
(("tests/guix-shell.sh") "")
(("tests/guix-shell-export-manifest.sh") "")
(("tests/guix-system.sh") "")
(("tests/guix-graph.sh") "")
(("tests/guix-gc.sh") "")
(("tests/guix-daemon.sh") "")))))
'())
(add-before 'build 'use-host-compressors
(lambda* (#:key inputs target #:allow-other-keys)
(when target
;; Use host compressors.
(let ((bzip2 (assoc-ref inputs "bzip2"))
(gzip (assoc-ref inputs "gzip"))
(xz (assoc-ref inputs "xz")))
(substitute* "guix/config.scm"
(("\"[^\"]*/bin/bzip2")
(string-append "\"" bzip2 "/bin/bzip2"))
(("\"[^\"]*/bin/gzip") gzip
(string-append "\"" gzip "/bin/gzip"))
(("\"[^\"]*/bin//xz")
(string-append "\"" xz "/bin/xz")))))))
(add-before 'build 'set-font-path
(lambda* (#:key native-inputs inputs #:allow-other-keys)
;; Tell 'dot' where to look for fonts.
(setenv "XDG_DATA_DIRS"
(dirname
(search-input-directory (or native-inputs inputs)
"share/fonts")))))
(add-before 'check 'copy-bootstrap-guile
(lambda* (#:key system target inputs #:allow-other-keys)
;; Copy the bootstrap guile tarball in the store
;; used by the test suite.
(define (intern file recursive?)
;; Note: don't use 'guix download' here because we
;; need to set the 'recursive?' argument.
(define base
(strip-store-file-name file))
(define code
`(begin
(use-modules (guix))
(with-store store
(let* ((item (add-to-store store ,base
,recursive?
"sha256" ,file))
(root (string-append "/tmp/gc-root-"
(basename item))))
;; Register a root so that the GC tests
;; don't delete those.
(symlink item root)
(add-indirect-root store root)))))
(invoke "./test-env" "guile" "-c"
(object->string code)))
(unless target
(intern (assoc-ref inputs "boot-guile") #f)
;; On x86_64 some tests need the i686 Guile.
(when (and (not target)
(string=? system "x86_64-linux"))
(intern (assoc-ref inputs "boot-guile/i686") #f))
;; Copy the bootstrap executables.
(for-each (lambda (input)
(intern (assoc-ref inputs input) #t))
'("bootstrap/bash" "bootstrap/mkdir"
"bootstrap/tar" "bootstrap/xz")))))
(add-after 'unpack 'disable-failing-tests
;; XXX FIXME: These tests fail within the build container.
(lambda _
(substitute* "tests/syscalls.scm"
(("^\\(test-(assert|equal) \"(clone|setns|pivot-root)\"" all)
(string-append "(test-skip 1)\n" all)))
(substitute* "tests/containers.scm"
(("^\\(test-(assert|equal)" all)
(string-append "(test-skip 1)\n" all)))
(when (file-exists? "tests/guix-environment-container.sh")
(substitute* "tests/guix-environment-container.sh"
(("guix environment --version")
"exit 77\n")))))
(add-before 'check 'set-SHELL
(lambda _
;; 'guix environment' tests rely on 'SHELL' having a
;; correct value, so set it.
(setenv "SHELL" (which "sh"))))
(add-after 'install 'wrap-program
(lambda* (#:key inputs native-inputs outputs target
#:allow-other-keys)
;; Make sure the 'guix' command finds GnuTLS,
;; Guile-JSON, and Guile-Git automatically.
(let* ((out (assoc-ref outputs "out"))
(guile (assoc-ref (or native-inputs inputs)
"guile"))
(avahi (assoc-ref inputs "guile-avahi"))
(gcrypt (assoc-ref inputs "guile-gcrypt"))
(guile-lib (assoc-ref inputs "guile-lib"))
(json (assoc-ref inputs "guile-json"))
(sqlite (assoc-ref inputs "guile-sqlite3"))
(zlib (assoc-ref inputs "guile-zlib"))
(lzlib (assoc-ref inputs "guile-lzlib"))
(zstd (assoc-ref inputs "guile-zstd"))
(git (assoc-ref inputs "guile-git"))
(bs (assoc-ref inputs
"guile-bytestructures"))
(ssh (assoc-ref inputs "guile-ssh"))
(gnutls (assoc-ref inputs "guile-gnutls"))
(disarchive (assoc-ref inputs "disarchive"))
(lzma (assoc-ref inputs "guile-lzma"))
(locales (assoc-ref inputs "glibc-utf8-locales"))
(deps (list gcrypt json sqlite gnutls git
bs ssh zlib lzlib zstd guile-lib
disarchive lzma))
(deps* (if avahi (cons avahi deps) deps))
(effective
(read-line
(open-pipe* OPEN_READ
(string-append guile "/bin/guile")
"-c" "(display (effective-version))")))
(path (map (cut string-append <>
"/share/guile/site/"
effective)
(delete #f deps*)))
(gopath (map (cut string-append <>
"/lib/guile/" effective
"/site-ccache")
(delete #f deps*)))
(locpath (string-append locales "/lib/locale")))
;; Modify 'guix' directly instead of using
;; 'wrap-program'. This avoids the indirection
;; through Bash, which in turn avoids getting Bash's
;; own locale warnings.
(substitute* (string-append out "/bin/guix")
(("!#")
(string-append
"!#\n\n"
(object->string
`(set! %load-path (append ',path %load-path)))
"\n"
(object->string
`(set! %load-compiled-path
(append ',gopath %load-compiled-path)))
"\n"
(object->string
`(let ((path (getenv "GUIX_LOCPATH")))
(setenv "GUIX_LOCPATH"
(if path
(string-append path ":" ,locpath)
,locpath))))
"\n\n"))))))
;; The 'guix' executable has 'OUT/libexec/guix/guile' as
;; its shebang; that should remain unchanged, thus remove
;; the 'patch-shebangs' phase, which would otherwise
;; change it to 'GUILE/bin/guile'.
(delete 'patch-shebangs))))
(native-inputs `(("pkg-config" ,pkg-config)
;; Guile libraries are needed here for
;; cross-compilation.
("guile" ,guile-3.0-latest) ;for faster builds
("guile-gnutls" ,guile-gnutls)
,@(if (target-hurd?)
'()
`(("guile-avahi" ,guile-avahi)))
("guile-gcrypt" ,guile-gcrypt)
("guile-json" ,guile-json-4)
("guile-lib" ,guile-lib)
("guile-sqlite3" ,guile-sqlite3)
("guile-zlib" ,guile-zlib)
("guile-lzlib" ,guile-lzlib)
("guile-zstd" ,guile-zstd)
("guile-ssh" ,guile-ssh)
("guile-git" ,guile-git)
;; XXX: Keep the development inputs here even though
;; they're unnecessary, just so that 'guix environment
;; guix' always contains them.
("autoconf" ,autoconf)
("automake" ,automake)
("gettext" ,gettext-minimal)
("texinfo" ,texinfo)
("graphviz" ,graphviz-minimal)
("font-ghostscript" ,font-ghostscript) ;fonts for 'dot'
("help2man" ,help2man)
("po4a" ,po4a)))
(inputs
`(("bzip2" ,bzip2)
("gzip" ,gzip)
("sqlite" ,sqlite)
("libgcrypt" ,libgcrypt)
("zlib" ,zlib)
("guile" ,guile-3.0-latest)
;; Some of the tests use "unshare" when it is available.
("util-linux" ,util-linux)
;; Many tests rely on the 'guile-bootstrap' package, which is why we
;; have it here.
("boot-guile" ,(bootstrap-guile-origin (%current-system)))
,@(if (and (not (%current-target-system))
(string=? (%current-system) "x86_64-linux"))
`(("boot-guile/i686" ,(bootstrap-guile-origin "i686-linux")))
'())
,@(if (%current-target-system)
`(("xz" ,xz))
'())
;; Tests also rely on these bootstrap executables.
("bootstrap/bash" ,(bootstrap-executable "bash" (%current-system)))
("bootstrap/mkdir" ,(bootstrap-executable "mkdir" (%current-system)))
("bootstrap/tar" ,(bootstrap-executable "tar" (%current-system)))
("bootstrap/xz" ,(bootstrap-executable "xz" (%current-system)))
("disarchive" ,disarchive) ;for 'guix perform-download'
("guile-lzma" ,guile-lzma) ;for Disarchive
("glibc-utf8-locales" ,glibc-utf8-locales)))
(propagated-inputs
`(("guile-gnutls" ,guile-gnutls)
;; Avahi requires "glib" which doesn't cross-compile yet.
,@(if (target-hurd?)
'()
`(("guile-avahi" ,guile-avahi)))
("guile-gcrypt" ,guile-gcrypt)
("guile-json" ,guile-json-4)
("guile-lib" ,guile-lib)
("guile-semver" ,guile-semver)
("guile-sqlite3" ,guile-sqlite3)
("guile-ssh" ,guile-ssh)
("guile-git" ,guile-git)
("guile-zlib" ,guile-zlib)
("guile-lzlib" ,guile-lzlib)
("guile-zstd" ,guile-zstd)))
(native-search-paths
(list (search-path-specification
(variable "GUIX_EXTENSIONS_PATH")
(files '("share/guix/extensions")))
;; (guix git) and (guix build download) honor this variable whose
;; name comes from OpenSSL.
$SSL_CERT_DIR))
(home-page "https://www.gnu.org/software/guix/")
(synopsis "Functional package manager for installed software packages and versions")
(description
"GNU Guix is a functional package manager for the GNU system, and is
also a distribution thereof. It includes a virtual machine image. Besides
the usual package management features, it also supports transactional
upgrades and roll-backs, per-user profiles, and much more. It is based on
the Nix package manager.")
(license license:gpl3+))))
(define* (channel-source->package source #:key commit)
"Return a package for the given channel SOURCE, a lowerable object."
(package
(inherit guix)
(version (string-append (package-version guix) "."
(if commit (string-take commit 7) "")))
(build-system channel-build-system)
(arguments `(#:source ,source
#:commit ,commit))
(inputs '())
(native-inputs '())
(propagated-inputs '())))
(export channel-source->package)
(define-public guix-daemon
;; This package is for internal consumption: it allows us to quickly build
;; the 'guix-daemon' program and use that in (guix self), used by 'guix
;; pull'.
(package
(inherit guix)
(properties `((hidden? . #t)))
(name "guix-daemon")
;; Use a minimum set of dependencies.
(native-inputs
(modify-inputs (package-native-inputs guix)
(delete "po4a" "graphviz" "font-ghostscript" "help2man")))
(inputs
(modify-inputs (package-inputs guix)
(delete "boot-guile" "boot-guile/i686" "util-linux")
(prepend guile-gnutls guile-git guile-json-3 guile-gcrypt)))
(propagated-inputs '())
(arguments
(substitute-keyword-arguments (package-arguments guix)
((#:configure-flags flags '())
;; Pretend we have those libraries; we don't actually need them.
`(append ,flags
'("guix_cv_have_recent_guile_sqlite3=yes"
"guix_cv_have_recent_guile_ssh=yes")))
((#:tests? #f #f)
#f)
((#:phases phases '%standard-phases)
`(modify-phases ,phases
(delete 'set-font-path)
(add-after 'unpack 'change-default-guix
(lambda _
;; We need to tell 'guix-daemon' which 'guix' command to use.
;; Here we use a questionable hack where we hard-code root's
;; current guix, which could be wrong (XXX). Note that scripts
;; like 'guix perform-download' do not run as root so we assume
;; that they have access to /var/guix/profiles/per-user/root.
(substitute* "nix/libstore/globals.cc"
(("guixProgram = (.*)nixBinDir + \"/guix\"" _ before)
(string-append "guixProgram = " before
"/var/guix/profiles/per-user/root\
/current-guix/bin/guix")))
#t))
(replace 'build
(lambda _
(invoke "make" "nix/libstore/schema.sql.hh")
(invoke "make" "-j" (number->string
(parallel-job-count))
"guix-daemon")))
(delete 'copy-bootstrap-guile)
(replace 'install
(lambda* (#:key outputs #:allow-other-keys)
(invoke "make" "install-binPROGRAMS")))
(delete 'wrap-program)))))))
(define-public guix-minimal
;; A version of Guix which is built with the minimal set of dependencies, as
;; outlined in the README "Requirements" section. Intended as a CI job, so
;; marked as hidden.
(hidden-package
(package
(inherit guix)
(name "guix-minimal")
(native-inputs
(modify-inputs (package-native-inputs guix)
(delete "guile-ssh")))
(propagated-inputs
(modify-inputs (package-propagated-inputs guix)
(delete "guile-ssh"))))))
(define-public current-guix-package
;; This parameter allows callers to override the package that 'current-guix'
;; returns. This is useful when 'current-guix' cannot compute it by itself,
;; for instance because it's not running from a source code checkout.
;;
;; The default value is obtained by creating a package from the 'guix'
;; channel returned by 'current-channels' or, if that's the empty list, that
;; returned by 'repository->guix-channel' for the current directory (which
;; assumes that we're running from a Git checkout). Delay computation so
;; that the relevant modules can be loaded lazily.
(make-parameter
(delay (match (or (find guix-channel? (current-channels))
(repository->guix-channel
(current-source-directory)))
((? channel? source)
(package
(inherit guix)
(source source)
(build-system channel-build-system)
(inputs '())
(native-inputs '())
(propagated-inputs '())))
(#f #f)))))
(define-public current-guix
(lambda ()
"Return a package representing the currently-used Guix. It can be
overridden by setting the 'current-guix-package' parameter."
(match (current-guix-package)
((? promise? package) (force package))
(package package))))
(define-public guix-icons
(package
(inherit guix)
(name "guix-icons")
(version "0.1")
(source %artwork-repository)
(build-system trivial-build-system)
(native-inputs
(list imagemagick))
(inputs
'())
(arguments
`(#:modules ((guix build utils)
(gnu build svg))
;; There's no point in cross-compiling: a native build gives the same
;; result, independently of the system type.
#:target #f
#:builder
,(with-extensions (list guile-rsvg guile-cairo)
#~(begin
(use-modules (guix build utils)
(gnu build svg))
(let* ((logo (string-append #$source "/logo/Guix.svg"))
(logo-white
(string-append #$source
"/logo/Guix-horizontal-white.svg"))
(theme "hicolor")
(category "apps")
(sizes '(16 24 32 48 64 72 96 128 256 512 1024))
(icons
(string-append #$output "/share/icons/" theme))
(scalable-dir
(string-append icons "/scalable/" category)))
(setenv "XDG_CACHE_HOME" (getcwd))
;; Create the scalable icon files.
(mkdir-p scalable-dir)
(copy-file logo
(string-append scalable-dir "/guix-icon.svg"))
(copy-file logo-white
(string-append scalable-dir
"/guix-white-icon.svg"))
;; Create the fixed dimensions icon files.
(for-each
(lambda (size)
(let* ((dimension
(format #f "~ax~a" size size))
(file
(string-append icons "/" dimension "/" category
"/guix-icon.png")))
(mkdir-p (dirname file))
(svg->png logo file
#:width size
#:height size)))
sizes))))))
(synopsis "GNU Guix icons")
(description "This package contains GNU Guix icons organized according to
the Icon Theme Specification. They can be used by applications querying the
GTK icon cache for instance.")))
(define-public guix-modules
(package
(name "guix-modules")
(version "0.1.0")
(home-page "https://gitlab.inria.fr/guix-hpc/guix-modules")
(source (origin
(method git-fetch)
(uri (git-reference (url home-page)
(commit (string-append "v" version))))
(file-name (string-append "guix-modules-" version "-checkout"))
(sha256
(base32
"1ckvrrmkgzz93i35sj1372wxs7ln4gzszpri1pcdf473z0p7nh7w"))))
(build-system guile-build-system)
(arguments
'(#:phases (modify-phases %standard-phases
(add-after 'install 'move-to-extension-directory
(lambda* (#:key outputs #:allow-other-keys)
(let* ((out (assoc-ref outputs "out"))
(target (string-append
out
"/share/guix/extensions/module.scm")))
(mkdir-p (dirname target))
(rename-file (car (find-files out "module.scm"))
target)))))))
(native-inputs (list (lookup-package-input guix "guile") guix))
(synopsis "Generate environment modules from Guix packages")
(description
"Guix-Modules is an extension of Guix that provides a new @command{guix
module} command. The @command{guix module create} sub-command creates
@dfn{environment modules}, allowing you to manipulate software environments
with the @command{module} command commonly found on @acronym{HPC,
high-performance computing} clusters.")
(license license:gpl3+)))
;;;
;;; Other tools.
;;;
(define-public nix
(package
(name "nix")
(version "2.16.1")
(source
(origin
(method git-fetch)
(uri (git-reference
(url "https://github.com/NixOS/nix")
(commit version)))
(file-name (git-file-name name version))
(sha256
(base32 "1rca8ljd33dmvh9bqk6sy1zxk97aawcr6k1f7hlm4d1cd9mrcw7x"))
(patches
(search-patches "nix-dont-build-html-doc.diff"))))
(build-system gnu-build-system)
(arguments
(list
#:configure-flags #~(list "--sysconfdir=/etc" "--enable-gc")
#:phases
#~(modify-phases %standard-phases
(replace 'install
;; Don't try & fail to create subdirectories in /etc, but keep them
;; in the output as examples.
(lambda* (#:key (make-flags '()) outputs #:allow-other-keys)
(let ((etc (string-append #$output "/etc")))
(apply invoke "make" "install"
(string-append "sysconfdir=" etc)
(string-append "profiledir=" etc "/profile.d")
make-flags))))
(replace 'check
(lambda args
;; A few tests expect the environment variable NIX_STORE to be
;; "/nix/store"
(let ((original-NIX_STORE (getenv "NIX_STORE")))
(dynamic-wind
(lambda ()
(setenv "NIX_STORE" "/nix/store"))
(lambda ()
(apply (assoc-ref %standard-phases 'check) args))
(lambda ()
(setenv "NIX_STORE" original-NIX_STORE)))))))))
(native-inputs
(list autoconf
autoconf-archive
automake
bison
flex
googletest
jq
libtool
pkg-config
rapidcheck))
(inputs
(append (list boost
brotli
bzip2
curl
editline
libarchive
libgc
libseccomp
libsodium
lowdown
nlohmann-json
openssl
sqlite
xz
zlib)
(if (or (target-x86-64?)
(target-x86-32?))
(list libcpuid)
'())))
(home-page "https://nixos.org/nix/")
(synopsis "The Nix package manager")
(description
"Nix is a purely functional package manager. This means that it treats
packages like values in purely functional programming languages such as
Haskell—they are built by functions that don't have side-effects, and they
never change after they have been built. Nix stores packages in the Nix
store, usually the directory /nix/store, where each package has its own unique
sub-directory.")
(license license:lgpl2.1+)))
(define-public stow
(package
(name "stow")
(version "2.3.1")
(source (origin
(method url-fetch)
(uri (string-append "mirror://gnu/stow/stow-"
version ".tar.gz"))
(sha256
(base32
"0jrxy12ywn7smdzdnvwzjw77l6knx6jkj2rckgykg1dpf6bdkm89"))))
(build-system gnu-build-system)
(inputs
(list perl))
(native-inputs
(list perl-test-simple perl-test-output perl-capture-tiny
perl-io-stringy))
(home-page "https://www.gnu.org/software/stow/")
(synopsis "Managing installed software packages")
(description
"GNU Stow is a symlink manager. It generates symlinks to directories
of data and makes them appear to be merged into the same directory. It is
typically used for managing software packages installed from source, by
letting you install them apart in distinct directories and then create
symlinks to the files in a common directory such as /usr/local.")
(license license:gpl3+)))
(define-public xstow
(package
(name "xstow")
(version "1.0.2")
(source (origin
(method url-fetch)
(uri (string-append "mirror://sourceforge/xstow/xstow-"
version ".tar.bz2"))
(sha256
(base32
"1vy6lcswpkixh7h5mvsmq2wbcih6lpsmcva3m7v6f5npllciy13g"))))
(build-system gnu-build-system)
(synopsis "Replacement of GNU Stow written in C++")
(description
"XStow is a replacement of GNU Stow written in C++. It supports all
features of Stow with some extensions.")
(home-page "https://xstow.sourceforge.net/")
(license license:gpl2)))
(define-public rpm
(package
(name "rpm")
(version "4.18.0")
(source (origin
(method url-fetch)
(uri (string-append "http://ftp.rpm.org/releases/rpm-"
(version-major+minor version) ".x/rpm-"
version ".tar.bz2"))
(sha256
(base32
"0m250plyananjn0790xmwy6kixmxcdj5iyy2ybnk1aw7f4nia5ra"))))
(outputs '("out" "debug"))
(build-system gnu-build-system)
(arguments
'(#:configure-flags '("--enable-python"
;; The RPM database must be writable.
"--localstatedir=/var")
#:phases (modify-phases %standard-phases
(add-after 'unpack 'fix-lua-check
(lambda _
(substitute* "configure"
(("lua >= ?.?")
"lua-5.3 >= 5.3"))))
(add-after 'unpack 'patch-build-system
(lambda _
;; The build system attempts to create /var in the build
;; chroot, and fails.
(substitute* "Makefile.in"
((".*MKDIR_P) \\$\\(DESTDIR)\\$\\(localstatedir.*")
"")))))))
(native-inputs
(list pkg-config
python))
(inputs
(list bzip2
file
libarchive
libgcrypt
lua
sqlite
xz
zlib
zstd))
(propagated-inputs
;; popt is listed in the 'Requires' of rpm.pc.
(list popt))
(home-page "https://rpm.org/")
(synopsis "The RPM Package Manager")
(description
"The RPM Package Manager (RPM) is a command-line driven package
management system capable of installing, uninstalling, verifying, querying,
and updating computer software packages. Each software package consists of an
archive of files along with information about the package like its version, a
description. There is also a library permitting developers to manage such
transactions from C or Python.")
;; The whole is GPLv2+; librpm itself is dual-licensed LGPLv2+ | GPLv2+.
(license license:gpl2+)))
(define-public bffe
(let ((commit "722c37ec8a23835edfc85cba3d89868592a2ed2d")
(revision "2"))
(package
(name "bffe")
(version (git-version "0" revision commit))
(source (origin
(method git-fetch)
(uri (git-reference
(url "https://git.cbaines.net/guix/bffe")
(commit commit)))
(sha256
(base32
"05i4awyirp440pk4vwa0sf46gi801zv839qm1i2z7jipm1xfwaxx"))
(file-name (string-append name "-" version "-checkout"))))
(build-system gnu-build-system)
(native-inputs
(list pkg-config
autoconf
automake
;; Guile libraries are needed here for cross-compilation.
guile-next
guile-gnutls
guile-json-4
guix
guix-data-service
guix-build-coordinator
guile-fibers-1.3
guile-prometheus
guile-lib))
(propagated-inputs
(list guile-gnutls
guile-json-4
guix
guix-data-service
guix-build-coordinator
guile-fibers-1.3
guile-prometheus
guile-lib))
(home-page "https://git.cbaines.net/guix/bffe")
(synopsis "Build Farm Front-end for Guix")
(description
"The BFFE of Build Farm Front-end is an experimental frontend for Guix
build farms. It works together with the Guix Data Service and Guix Build
Coordinator to submit builds and monitor the activity.
It functions as a Guile library, with the @code{run-bffe-service} procedure in
the @code{(bffe)} module as the entry point.")
(license license:gpl3+))))
(define-public python-anaconda-client
(package
(name "python-anaconda-client")
(version "1.8.0")
(source
(origin
(method git-fetch)
(uri (git-reference
(url "https://github.com/Anaconda-Platform/anaconda-client")
(commit version)))
(file-name (git-file-name name version))
(sha256
(base32
"1vyk0g0gci4z9psisb8h50zi3j1nwfdg1jw3j76cxv0brln0v3fw"))))
(build-system pyproject-build-system)
(arguments
(list
#:test-flags
;; These tests require a network connection
'(append (map (lambda (file)
(string-append "--ignore=binstar_client/" file))
(list "tests/test_upload.py"
"tests/test_authorizations.py"
"tests/test_login.py"
"tests/test_whoami.py"
"utils/notebook/tests/test_data_uri.py"
"utils/notebook/tests/test_base.py"
"utils/notebook/tests/test_downloader.py"
"inspect_package/tests/test_conda.py"))
;; get_conda_root returns None
(list "-k"
"not test_conda_root \
and not test_conda_root_outside_root_environment"))
#:phases
'(modify-phases %standard-phases
(add-after 'unpack 'python3.10-compatibility
(lambda _
(substitute* "binstar_client/utils/config.py"
(("collections.Mapping") "collections.abc.Mapping"))))
;; This is needed for some tests.
(add-before 'check 'set-HOME
(lambda _ (setenv "HOME" "/tmp"))))))
(propagated-inputs
(list python-clyent python-nbformat python-pyyaml python-requests))
(native-inputs
(list python-coverage
python-dateutil
python-freezegun
python-mock
python-pillow
python-pytest
python-pytz))
(home-page "https://github.com/Anaconda-Platform/anaconda-client")
(synopsis "Anaconda Cloud command line client library")
(description
"Anaconda Cloud command line client library provides an interface to
Anaconda Cloud. Anaconda Cloud is useful for sharing packages, notebooks and
environments.")
(license license:bsd-3)))
(define-public python-conda-package-handling
(package
(name "python-conda-package-handling")
(version "1.7.3")
(source
(origin
(method git-fetch)
(uri (git-reference
(url "https://github.com/conda/conda-package-handling/")
(commit version)))
(file-name (git-file-name name version))
(sha256
(base32
"1dq6f5ks3cinb355x712bls9bvv6bli6x3c43sdkqvawdw8xgv9j"))))
(build-system python-build-system)
(arguments
`(#:phases
(modify-phases %standard-phases
(add-after 'unpack 'use-unmodified-libarchive
(lambda _
(substitute* "setup.py"
(("archive_and_deps") "archive"))))
(replace 'check
(lambda* (#:key inputs outputs #:allow-other-keys)
(add-installed-pythonpath inputs outputs)
(invoke "pytest" "-vv" "tests"))))))
(propagated-inputs
(list python-six python-tqdm))
(inputs
(list libarchive))
(native-inputs
(list python-cython python-pytest python-pytest-cov
python-pytest-mock python-mock))
(home-page "https://conda.io")
(synopsis "Create and extract conda packages of various formats")
(description
"This library is an abstraction of Conda package handling and a tool for
extracting, creating, and converting between formats.")
(license license:bsd-3)))
(define-public conda
(package
(name "conda")
(version "22.9.0")
(source
(origin
(method git-fetch)
(uri (git-reference
(url "https://github.com/conda/conda")
(commit version)))
(file-name (git-file-name name version))
(sha256
(base32
"16vz4vx311ry9w35mi5wna8p8n3abd6wdqrpqzjfdlwv7hcr44s4"))))
(build-system python-build-system)
(arguments
`(#:phases
(modify-phases %standard-phases
;; The default version of pytest does not support these options.
(add-after 'unpack 'use-older-pytest
(lambda _
(substitute* "setup.cfg"
(("--xdoctest-.*") ""))))
(add-after 'unpack 'fix-ruamel-yaml-dependency
(lambda _
(substitute* "setup.py"
(("ruamel_yaml_conda") "ruamel.yaml"))))
(add-after 'unpack 'correct-python-executable-name
(lambda* (#:key inputs #:allow-other-keys)
(let ((python (assoc-ref inputs "python-wrapper")))
#;
(substitute* "conda/common/path.py"
(("python_version or ''")
"python_version or '3'"))
(substitute* "conda/core/initialize.py"
(("python_exe = join")
(format #f "python_exe = \"~a/bin/python\" #"
python))))))
(add-after 'unpack 'do-not-use-python-root-as-prefix
(lambda* (#:key inputs outputs #:allow-other-keys)
(let ((out (assoc-ref outputs "out"))
(python (assoc-ref inputs "python-wrapper")))
(substitute* "tests/core/test_initialize.py"
(("\"\"\"\\) % conda_prefix")
(format #f "\"\"\") % \"~a\"" python))
(("CONDA_PYTHON_EXE \"%s\"' % join\\(conda_prefix")
(format #f "CONDA_PYTHON_EXE \"%s\"' % join(\"~a\""
python))
(("conda_prefix = abspath\\(sys.prefix\\)")
(format #f "conda_prefix = abspath(\"~a\")" out)))
(substitute* "conda/base/context.py"
(("os.chdir\\(sys.prefix\\)")
(format #f "os.chdir(\"~a\")" out))
(("sys.prefix, '.condarc'")
(format #f "\"~a\", '.condarc'" out))
(("return abspath\\(sys.prefix\\)")
(format #f "return abspath(\"~a\")" out))
(("os.path.join\\(sys.prefix, bin_dir, exe\\)")
(format #f "\"~a/bin/conda\"" out))
(("'CONDA_EXE', sys.executable")
(format #f "'CONDA_EXE', \"~a/bin/conda\"" out))))))
(add-before 'build 'create-version-file
(lambda _
(with-output-to-file "conda/.version"
(lambda () (display ,version)))))
(replace 'check
(lambda* (#:key tests? #:allow-other-keys)
;; These tests all require network access.
(for-each delete-file '("tests/cli/test_main_clean.py"
"tests/cli/test_main_rename.py"))
(when tests?
(setenv "HOME" "/tmp")
(invoke "py.test" "-vv"
"-k"
(string-append
"not integration"
;; This one reports a newer version of conda than
;; expected; conda-1.5.2-py27_0 instead of
;; conda-1.3.5-py27_0.
" and not test_auto_update_conda"
;; This fails because the output directory is not a
;; Conda environment.
" and not test_list"
;; This fails because we patched the default root
;; prefix.
" and not test_default_target_is_root_prefix"
;; This fails because of missing features in python-flaky.
" and not test_no_features"
;; These fail because they require network access
" and not test_no_ssl"
" and not test_run_readonly_env"
" and not test_run_returns_int"
" and not test_run_returns_nonzero_errorlevel"
" and not test_run_returns_zero_errorlevel"
" and not test_run_uncaptured"
;; TODO: I don't understand what this failure means
" and not test_PrefixData_return_value_contract"
;; TODO: same here
" and not test_install_1"
;; Not sure if this is really wrong. This fails because
;; /gnu/store/...conda-22.9.0/bin/python
;; is not /gnu/store/...python-wrapper-3.9.9/bin/python
" and not test_make_entry_point")))))
(add-after 'install 'init
;; This writes a whole bunch of shell initialization files to the
;; prefix directory. Many features of conda can only be used after
;; running "conda init".
(lambda* (#:key inputs outputs #:allow-other-keys)
(add-installed-pythonpath inputs outputs)
(setenv "HOME" "/tmp")
(invoke (string-append (assoc-ref outputs "out")
"/bin/conda")
"init"))))))
(inputs
(list python-wrapper))
(propagated-inputs
(list python-anaconda-client
python-boto3
python-conda-package-handling
python-cytoolz
python-mock
python-pluggy
python-pycosat
python-pytest
python-pyyaml
python-requests
python-responses
python-ruamel.yaml
python-tqdm
;; XXX: This is dragged in by libarchive and is needed at runtime.
zstd))
(native-inputs
(list python-coverage
python-flaky
python-pytest-timeout
python-pytest-xprocess))
(home-page "https://github.com/conda/conda")
(synopsis "Cross-platform, OS-agnostic, system-level binary package manager")
(description
"Conda is a cross-platform, Python-agnostic binary package manager. It
is the package manager used by Anaconda installations, but it may be used for
other systems as well. Conda makes environments first-class citizens, making
it easy to create independent environments even for C libraries. Conda is
written entirely in Python.")
(license license:bsd-3)))
(define-public conan
(package
(name "conan")
(version "2.0.9")
(source
(origin
(method git-fetch) ; no tests in PyPI archive
(uri (git-reference
(url "https://github.com/conan-io/conan")
(commit version)))
(file-name (git-file-name name version))
(sha256
(base32 "1ykfj7c3i0b57s7ql3p2lawxdzd2cn36f3k8p64lyzla8rwv4xdx"))))
(build-system python-build-system)
(arguments
(list
#:modules '((guix build python-build-system)
(guix build utils)
(ice-9 format))
#:phases
#~(modify-phases %standard-phases
(add-after 'unpack 'patch-paths
(lambda* (#:key inputs #:allow-other-keys)
;; It seems that PATH is manipulated, as printenv is not found
;; during tests. Patch in its exact location.
(substitute* "conan/tools/env/environment.py"
(("printenv")
(search-input-file inputs "bin/printenv")))))
(add-after 'unpack 'patch-hard-coded-GCC-references
(lambda _
;; The test suite expects GCC 9 to be used (see:
;; https://github.com/conan-io/conan/issues/13575). Render the
;; check version agnostic.
(substitute* "conans/test/functional/toolchains/meson/_base.py"
(("__GNUC__9")
"__GNUC__"))))
(add-after 'unpack 'use-current-cmake-for-tests
(lambda _
(substitute* (find-files "conans/test" "\\.py$")
(("@pytest.mark.tool\\(\"cmake\", \"3.23\")")
"@pytest.mark.tool(\"cmake\")"))))
(add-before 'check 'configure-tests
(lambda _
(let* ((cmake-version #$(version-major+minor
(package-version cmake)))
(pkg-config-version #$(version-major+minor
(package-version pkg-config))))
(call-with-output-file "conans/test/conftest_user.py"
(lambda (port)
(format port "\
tools_locations = {
'apt_get': {'disabled': True},
'bazel': {'disabled': True},
'cmake': {'default': '~a',
'3.15': {'disabled': True},
'3.16': {'disabled': True},
'3.17': {'disabled': True},
'3.19': {'disabled': True},
'~:*~a': {}},
'pkg_config': {'exe': 'pkg-config',
'default': '~a',
'~:*~a': {}},
'svn': {'disabled': True}}~%" cmake-version pkg-config-version))))))
(add-before 'check 'set-home
(lambda _
(setenv "HOME" "/tmp")))
(replace 'check
(lambda* (#:key tests? outputs #:allow-other-keys)
(define system #$(or (%current-target-system)
(%current-system)))
(when tests?
(setenv "CONFIG_SHELL" (which "sh"))
(setenv "PATH" (string-append (getenv "PATH") ":"
#$output "/bin"))
(invoke "python" "-m" "pytest" "-vv"
"-n" (number->string (parallel-job-count))
"-m" "not slow"
;; Disable problematic tests.
"-k"
(string-append
;; These tests rely on networking.
"not download_retries_errors "
"and not ftp "
;; Guix sets PKG_CONFIG_PATH itself, which is not
;; expected by the following test.
"and not pkg_config_path "
"and not compare " ;caused by newer node-semver?
;; This test hard-codes a compiler version.
"and not test_toolchain "
;; The 'test_list' tests may fail
;; non-deterministically (see:
;; https://github.com/conan-io/conan/issues/13583).
"and not test_list "
;; These tests fail when Autoconf attempt to load a
;; shared library in the same directory (see:
;; https://github.com/conan-io/conan/issues/13577).
"and not test_other_client_can_link_autotools "
"and not test_autotools_lib_template "
(if (not (string-prefix? "x86_64" system))
;; These tests either assume the machine is
;; x86_64, or require a cross-compiler to target
;; it.
(string-append
"and not cpp_package "
"and not exclude_code_analysis "
"and not cmakedeps_multi "
"and not locally_build_linux "
"and not custom_configuration "
"and not package_from_system "
"and not cross_build_command "
"and not test_package "
"and not test_same ")
"")
(if (not (or (string-prefix? "x86_64" system)
(string-prefix? "i686" system)))
;; This test only works with default arch "x86",
;; "x86_64", "sparc" or "sparcv9".
"and not settings_as_a_dict_conanfile "
"")))))))))
(propagated-inputs
(list python-bottle
python-colorama
python-dateutil
python-distro
python-fasteners
python-future
python-jinja2
python-node-semver
python-patch-ng
python-pluginbase
python-pygments
python-pyjwt
python-pyyaml
python-requests
python-six
python-tqdm
python-urllib3))
(inputs
(list coreutils)) ;for printenv
(native-inputs
(list autoconf-wrapper
automake
cmake
git-minimal
libtool
meson
ninja
pkg-config
python-bottle
python-mock
python-parameterized
python-pytest
python-pytest-xdist
python-webtest
which))
(home-page "https://conan.io")
(synopsis "Decentralized C/C++ package manager")
(description "Conan is a package manager for C and C++ developers that
boasts the following features:
@itemize
@item
It is fully decentralized. Users can host their packages on their own private
servers.
@item
It can create, upload and download binaries for any configuration and
platform, including cross-compiled ones.
@item
It integrates with any build system, including CMake, Makefiles, Meson, etc.
@item
It is extensible; its Python-based recipes, together with extensions points
allow for great power and flexibility.
@end itemize")
(license license:expat)))
(define-public gwl
(package
(name "gwl")
(version "0.5.1")
(source (origin
(method url-fetch)
(uri (string-append "mirror://gnu/gwl/gwl-" version ".tar.gz"))
(sha256
(base32
"08h76ib7hmqyj354aazxqyz0galhywz4093f8hc4py7hbg0rcm27"))))
(build-system gnu-build-system)
(arguments
`(#:parallel-build? #false ; for reproducibility
#:make-flags
'("GUILE_AUTO_COMPILE=0" "GWL_SKIP_INTEGRATION_TESTS=1")
#:phases
(modify-phases %standard-phases
(add-after 'unpack 'disable-test
(lambda _
;; This test loads a workflow, which requires a working Guix installation.
(substitute* "tests/cache.scm"
(("\\(test-assert \"workflows with same file name have different cache prefixes\"" m)
(string-append "#;" m))))))))
(native-inputs
(list autoconf automake pkg-config texinfo graphviz))
(inputs
(let ((p (package-input-rewriting
`((,guile-3.0 . ,guile-3.0-latest))
#:deep? #false)))
(list guix
guile-3.0-latest
(p guile-commonmark)
(p guile-config)
(p guile-drmaa)
(p guile-gcrypt)
(p guile-pfds)
(p guile-syntax-highlight)
(p guile-wisp))))
(home-page "https://workflows.guix.info")
(synopsis "Workflow management extension for GNU Guix")
(description "The @dfn{Guix Workflow Language} (GWL) provides an
extension to GNU Guix's declarative language for package management to
automate the execution of programs in scientific workflows. The GWL
can use process engines to integrate with various computing
environments.")
;; The Scheme modules in guix/ and gnu/ are licensed GPL3+,
;; the web interface modules in gwl/ are licensed AGPL3+,
;; and the fonts included in this package are licensed OFL1.1.
(license (list license:gpl3+ license:agpl3+ license:silofl1.1))))
(define-public gwl/next
(let ((commit "706a0895f639ed3ed77d0fe88382f51a6638b514")
(revision "1"))
(package
(inherit gwl)
(name "gwl-next")
(version (git-version "0.5.0" revision commit))
(source (origin
(method git-fetch)
(uri (git-reference
(url "https://git.savannah.gnu.org/git/gwl.git")
(commit commit)))
(file-name (git-file-name name version))
(sha256
(base32
"0k9zkdyyzir3fvlbcfcqy17k28b51i20rpbjwlx2i1mwd2pw9cxc")))))))
(define-public guix-build-coordinator
(let ((commit "9c42dcb726fc925606b12695e195ae1dc7e28cc3")
(revision "89"))
(package
(name "guix-build-coordinator")
(version (git-version "0" revision commit))
(source (origin
(method git-fetch)
(uri (git-reference
(url "https://git.savannah.gnu.org/git/guix/build-coordinator.git")
(commit commit)))
(sha256
(base32
"18m368rgmaiscmr1jlz77qkfw5fp4m8szgh90l6wbi9w68yfmr4n"))
(file-name (string-append name "-" version "-checkout"))))
(build-system gnu-build-system)
(arguments
(list
#:modules `(((guix build guile-build-system)
#:select (target-guile-effective-version))
,@%gnu-build-system-modules)
#:imported-modules `((guix build guile-build-system)
,@%gnu-build-system-modules)
#:phases
#~(modify-phases %standard-phases
(add-before 'build 'set-GUILE_AUTO_COMPILE
(lambda _
;; To avoid warnings relating to 'guild'.
(setenv "GUILE_AUTO_COMPILE" "0")))
(add-after 'install 'wrap-executable
(lambda* (#:key inputs outputs target #:allow-other-keys)
(let* ((out (assoc-ref outputs "out"))
(bin (string-append out "/bin"))
(guile (assoc-ref inputs "guile"))
(version (target-guile-effective-version))
(scm (string-append out "/share/guile/site/" version))
(go (string-append out "/lib/guile/" version "/site-ccache")))
(for-each
(lambda (file)
(simple-format (current-error-port) "wrapping: ~A\n" file)
(let ((guile-inputs (list
"guile-json"
"guile-gcrypt"
"guix"
"guile-prometheus"
"guile-lib"
"guile-lzlib"
"guile-zlib"
"guile-sqlite3"
"guile-gnutls"
#$@(if (target-hurd?)
'()
'("guile-fibers")))))
(wrap-program file
`("PATH" ":" prefix
(,bin
;; Support building without sqitch as an input, as it
;; can't be cross-compiled yet
,@(or (and=> (assoc-ref inputs "sqitch")
list)
'())))
`("GUILE_LOAD_PATH" ":" prefix
(,scm ,(string-join
(map (lambda (input)
(simple-format
#f "~A/share/guile/site/~A"
(assoc-ref inputs input)
version))
guile-inputs)
":")))
`("GUILE_LOAD_COMPILED_PATH" ":" prefix
(,go ,(string-join
(map (lambda (input)
(simple-format
#f "~A/lib/guile/~A/site-ccache"
(assoc-ref inputs input)
version))
guile-inputs)
":"))))))
(find-files bin)))))
(delete 'strip)))) ; As the .go files aren't compatible
(native-inputs
(list pkg-config
autoconf
automake
guile-gnutls
;; Guile libraries are needed here for cross-compilation.
guile-json-4
guile-gcrypt
guix
guile-prometheus
guile-fibers
guile-lib
(first (assoc-ref (package-native-inputs guix) "guile"))))
(inputs
(list (first (assoc-ref (package-native-inputs guix) "guile"))
sqlite
bash-minimal
sqitch))
(propagated-inputs
(list guile-prometheus
guile-gcrypt
guile-json-4
guile-lib
guile-lzlib
guile-zlib
guile-sqlite3
guix
guile-gnutls
guile-fibers))
(home-page "https://git.cbaines.net/guix/build-coordinator/")
(synopsis "Tool to help build derivations")
(description
"The Guix Build Coordinator helps with performing lots of builds across
potentially many machines, and with doing something with the results and
outputs of those builds.")
(license license:gpl3+))))
(define-public guix-build-coordinator/agent-only
(package
(inherit guix-build-coordinator)
(name "guix-build-coordinator-agent-only")
(native-inputs
(list pkg-config
autoconf
automake
guile-gnutls
;; Guile libraries are needed here for cross-compilation.
guile-json-4
guile-gcrypt
guix
guile-prometheus
guile-lib
(first (assoc-ref (package-native-inputs guix) "guile"))))
(inputs
(list (first (assoc-ref (package-native-inputs guix) "guile"))
bash-minimal))
(propagated-inputs
(list guile-prometheus
guile-gcrypt
guile-json-4
guile-lib
guile-lzlib
guile-zlib
guix
guile-gnutls))
(description
"The Guix Build Coordinator helps with performing lots of builds across
potentially many machines, and with doing something with the results and
outputs of those builds.
This package just includes the agent component.")))
(define-public guix-jupyter
(package
(name "guix-jupyter")
(version "0.2.2")
(home-page "https://gitlab.inria.fr/guix-hpc/guix-kernel")
(source (origin
(method git-fetch)
(uri (git-reference (url home-page)
(commit (string-append "v" version))))
(sha256
(base32
"17m6970wnvwlbarq4gxz5bakhzyhq5ch8qd8jw55ydccpv6473kq"))
(file-name (string-append "guix-jupyter-" version "-checkout"))))
(build-system gnu-build-system)
(arguments
`(#:modules ((srfi srfi-26)
(ice-9 match)
(ice-9 popen)
(ice-9 rdelim)
(guix build utils)
(guix build gnu-build-system))
#:phases
(modify-phases %standard-phases
(add-after 'install 'sed-kernel-json
(lambda* (#:key inputs outputs #:allow-other-keys)
(let* ((out (assoc-ref outputs "out"))
(guix (assoc-ref inputs "guix"))
(guile (assoc-ref inputs "guile"))
(json (assoc-ref inputs "guile-json"))
(git (assoc-ref inputs "guile-git"))
(bs (assoc-ref inputs "guile-bytestructures"))
(s-zmq (assoc-ref inputs "guile-simple-zmq"))
(gcrypt (assoc-ref inputs "guile-gcrypt"))
(deps (list out s-zmq guix json git bs gcrypt))
(effective
(read-line
(open-pipe* OPEN_READ
(string-append guile "/bin/guile")
"-c" "(display (effective-version))")))
(path (map (cut string-append "-L\", \"" <>
"/share/guile/site/"
effective)
deps))
(gopath (map (cut string-append "-C\", \"" <>
"/lib/guile/" effective
"/site-ccache")
deps))
(kernel-dir (string-append out "/share/jupyter/kernels/guix/")))
(substitute* (string-append kernel-dir "kernel.json")
(("-s")
(string-join
(list (string-join path "\",\n\t\t\"")
(string-join gopath "\",\n\t\t\"")
"-s")
"\",\n\t\t\""))
(("guix-jupyter-kernel.scm")
(string-append out "/share/guile/site/" effective
"/guix-jupyter-kernel.scm"))))))
(add-before 'check 'define-home
(lambda _
;; IPython goes awry when HOME points to a non-existent
;; directory:
;;
;; IPython/paths.py:70: UserWarning: IPython parent '/homeless-shelter' is not a writable location, using a temp directory.
;;
;; This in turn leads to test failures, so define HOME.
(setenv "HOME" (getcwd)))))))
(native-inputs
(list autoconf
automake
pkg-config
;; For testing.
jupyter
python-ipython
python-ipykernel))
(inputs
(list guix (lookup-package-native-input guix "guile")))
(propagated-inputs
(list guile-json-4 guile-simple-zmq guile-gcrypt))
(synopsis "Guix kernel for Jupyter")
(description
"Guix-Jupyter is a Jupyter kernel. It allows you to annotate notebooks
with information about their software dependencies, such that code is executed
in the right software environment. Guix-Jupyter spawns the actual kernels
such as @code{python-ipykernel} on behalf of the notebook user and runs them
in an isolated environment, in separate namespaces.")
(license license:gpl3+)))
(define-public nar-herder
(let ((commit "53682fac7e00cd2801406edbd014922c1720c347")
(revision "21"))
(package
(name "nar-herder")
(version (git-version "0" revision commit))
(source (origin
(method git-fetch)
(uri (git-reference
(url "https://git.savannah.gnu.org/git/guix/nar-herder.git")
(commit commit)))
(sha256
(base32
"18mzrpc5ni8d6xbp1bg0nzdj0brmnji4jm1gyiq77dm17c118zyz"))
(file-name (string-append name "-" version "-checkout"))))
(build-system gnu-build-system)
(arguments
(list
#:modules `(((guix build guile-build-system)
#:select (target-guile-effective-version))
,@%gnu-build-system-modules)
#:imported-modules `((guix build guile-build-system)
,@%gnu-build-system-modules)
#:phases
#~(modify-phases %standard-phases
(add-before 'build 'set-GUILE_AUTO_COMPILE
(lambda _
;; To avoid warnings relating to 'guild'.
(setenv "GUILE_AUTO_COMPILE" "0")))
(add-after 'install 'wrap-executable
(lambda* (#:key inputs outputs target #:allow-other-keys)
(let* ((out (assoc-ref outputs "out"))
(bin (string-append out "/bin"))
(guile (assoc-ref inputs "guile"))
(version (target-guile-effective-version))
(scm (string-append out "/share/guile/site/" version))
(go (string-append out "/lib/guile/" version "/site-ccache")))
(for-each
(lambda (file)
(simple-format (current-error-port) "wrapping: ~A\n" file)
(let ((guile-inputs (list
"guile-json"
"guile-gcrypt"
"guix"
"guile-lib"
"guile-lzlib"
"guile-zstd"
"guile-prometheus"
"guile-sqlite3"
"guile-gnutls"
"guile-fibers")))
(wrap-program file
`("GUILE_LOAD_PATH" ":" prefix
(,scm ,(string-join
(map (lambda (input)
(string-append
(assoc-ref inputs input)
"/share/guile/site/"
version))
guile-inputs)
":")))
`("GUILE_LOAD_COMPILED_PATH" ":" prefix
(,go ,(string-join
(map (lambda (input)
(string-append
(assoc-ref inputs input)
"/lib/guile/" version "/site-ccache"))
guile-inputs)
":"))))))
(find-files bin)))))
(delete 'strip)))) ; As the .go files aren't compatible
(native-inputs
(list pkg-config
autoconf
automake
guile-gnutls
;; Guile libraries are needed here for cross-compilation.
guile-next
guile-json-4
guile-gcrypt
guix
guile-fibers
guile-prometheus
guile-lib
guile-lzlib
guile-zstd
guile-sqlite3))
(inputs
(list bash-minimal
guile-next))
(propagated-inputs
(list guile-json-4
guile-gcrypt
guix
guile-fibers
guile-prometheus
guile-lib
guile-lzlib
guile-zstd
guile-sqlite3
guile-gnutls))
(home-page "https://git.cbaines.net/guix/nar-herder")
(synopsis "Utility for managing and serving nars")
(description
"The Nar Herder is a utility for managing a collection of
nars (normalized archives, in the context of Guix) along with the
corresponding narinfo files which contain some signed metadata.
It can assist in serving a collection of nars, moving them between machines,
or mirroring an existing collection of nars.
It's currently a working prototype, many designed features aren't implemented,
and the error handling is very rough.")
(license license:agpl3+))))
(define-public gcab
(package
(name "gcab")
(version "1.6")
(source (origin
(method url-fetch)
(uri (string-append "mirror://gnome/sources/gcab/"
version "/gcab-" version ".tar.xz"))
(sha256
(base32
"02sngv40zwadajsiav1paahyfgkccbh9s7r5ks82chbwawarc31g"))))
(build-system meson-build-system)
(native-inputs
(list `(,glib "bin") ; for glib-mkenums
intltool
pkg-config
vala))
(inputs
(list glib zlib))
(arguments
`(#:configure-flags
;; XXX This documentation is for developers, and fails informatively:
;; Error in gtkdoc helper script: 'gtkdoc-mkhtml' failed with status 5
(list "-Ddocs=false"
"-Dintrospection=false")))
(home-page "https://wiki.gnome.org/msitools") ; no dedicated home page
(synopsis "Microsoft Cabinet file manipulation library")
(description
"The libgcab library provides GObject functions to read, write, and modify
Microsoft cabinet (.@dfn{CAB}) files.")
(license (list license:gpl2+ ; tests/testsuite.at
license:lgpl2.1+)))) ; the rest
(define-public msitools
(package
(name "msitools")
(version "0.100")
(source (origin
(method url-fetch)
(uri (string-append "mirror://gnome/sources/msitools/"
version "/msitools-" version ".tar.xz"))
(sha256
(base32
"1skq17qr2ic4qr3779j49byfm8rncwbsq9rj1a33ncn2m7isdwdv"))))
(build-system gnu-build-system)
(native-inputs
(list bison pkg-config))
(inputs
(list gcab glib libgsf libxml2
`(,util-linux "lib")))
(home-page "https://wiki.gnome.org/msitools")
(synopsis "Windows Installer file manipulation tool")
(description
"msitools is a collection of command-line tools to inspect, extract, build,
and sign Windows@tie{}Installer (.@dfn{MSI}) files. It aims to be a solution
for packaging and deployment of cross-compiled Windows applications.")
(license license:lgpl2.1+)))
(define-public libostree
(package
(name "libostree")
(version "2023.5")
(source
(origin
(method url-fetch)
(uri (string-append
"https://github.com/ostreedev/ostree/releases/download/v"
(version-major+minor version) "/libostree-" version ".tar.xz"))
(sha256
(base32 "056v7bz40dx8k2j2pfypc4shl6ijzvx1gy8r0kaw66py67xklndw"))))
(build-system gnu-build-system)
(arguments
'(#:phases
(modify-phases %standard-phases
(add-before 'check 'pre-check
(lambda _
;; Don't try to use the non-existing '/var/tmp' as test
;; directory.
(setenv "TEST_TMPDIR" (getenv "TMPDIR")))))
;; XXX: fails with:
;; tap-driver.sh: missing test plan
;; tap-driver.sh: internal error getting exit status
;; tap-driver.sh: fatal: I/O or internal error
#:tests? #f))
(native-inputs
(list attr ; for tests
bison
`(,glib "bin") ; for 'glib-mkenums'
gobject-introspection
pkg-config
libxslt))
(inputs
(list avahi
docbook-xml
docbook-xsl
e2fsprogs
fuse-2
glib
gpgme
libarchive
libsoup-minimal-2 ; needs libsoup-2.4
util-linux))
(home-page "https://ostree.readthedocs.io/en/latest/")
(synopsis "Operating system and container binary deployment and upgrades")
(description
"@code{libostree} is both a shared library and suite of command line
tools that combines a \"git-like\" model for committing and downloading
bootable file system trees, along with a layer for deploying them and managing
the boot loader configuration.")
(license license:lgpl2.0+)))
(define-public flatpak
(package
(name "flatpak")
(version "1.14.4")
(source
(origin
(method url-fetch)
(uri (string-append "https://github.com/flatpak/flatpak/releases/download/"
version "/flatpak-" version ".tar.xz"))
(sha256
(base32 "16b7f7n2mms6zgm0lj3fn86ny11xjn8cd3mrk1slwhvwnv8dnd4a"))
(patches
(search-patches "flatpak-fix-path.patch"
"flatpak-unset-gdk-pixbuf-for-sandbox.patch"))))
;; Wrap 'flatpak' so that GIO_EXTRA_MODULES is set, thereby allowing GIO to
;; find the TLS backend in glib-networking.
(build-system glib-or-gtk-build-system)
(arguments
(list
#:configure-flags
#~(list
"--enable-documentation=no" ;; FIXME
"--enable-system-helper=no"
"--localstatedir=/var"
(string-append "--with-system-bubblewrap="
(assoc-ref %build-inputs "bubblewrap")
"/bin/bwrap")
(string-append "--with-system-dbus-proxy="
(assoc-ref %build-inputs "xdg-dbus-proxy")
"/bin/xdg-dbus-proxy"))
#:phases
#~(modify-phases %standard-phases
(add-after 'unpack 'fix-tests
(lambda* (#:key inputs #:allow-other-keys)
(copy-recursively
(search-input-directory inputs "lib/locale")
"/tmp/locale")
(for-each make-file-writable (find-files "/tmp"))
(substitute* "tests/make-test-runtime.sh"
(("cp `which.*") "echo guix\n")
(("cp -r /usr/lib/locale/C\\.\\*")
(string-append "mkdir ${DIR}/usr/lib/locale/en_US; \
cp -r /tmp/locale/*/en_US.*")))
(substitute* "tests/libtest.sh"
(("/bin/kill") (which "kill"))
(("/usr/bin/python3") (which "python3")))
#t))
(add-after 'unpack 'p11-kit-fix
(lambda* (#:key inputs #:allow-other-keys)
(let ((p11-path (search-input-file inputs "/bin/p11-kit")))
(substitute* "session-helper/flatpak-session-helper.c"
(("\"p11-kit\",")
(string-append "\"" p11-path "\","))
(("if \\(g_find_program_in_path \\(\"p11-kit\"\\)\\)")
(string-append "if (g_find_program_in_path (\""
p11-path "\"))"))))))
;; Many tests fail for unknown reasons, so we just run a few basic
;; tests.
(replace 'check
(lambda* (#:key tests? #:allow-other-keys)
(when tests?
(setenv "HOME" "/tmp")
(invoke "make" "check"
"TESTS=tests/test-basic.sh tests/test-config.sh
testcommon")))))))
(native-inputs
(list bison
dbus ; for dbus-daemon
gettext-minimal
`(,glib "bin") ; for glib-mkenums + gdbus-codegen
glibc-utf8-locales
gobject-introspection
libcap
pkg-config
python
python-pyparsing
socat
which))
(inputs
(list appstream
appstream-glib
bubblewrap
curl
dconf
fuse-2
gdk-pixbuf
gpgme
json-glib
libarchive
libostree
libseccomp
libsoup-minimal-2
libxau
libxml2
p11-kit
util-linux
xdg-dbus-proxy))
(propagated-inputs (list glib-networking gnupg gsettings-desktop-schemas))
(home-page "https://flatpak.org")
(synopsis "System for building, distributing, and running sandboxed desktop
applications")
(description "Flatpak is a system for building, distributing, and running
sandboxed desktop applications on GNU/Linux.")
(license license:lgpl2.1+)))
(define-public fpm
(package
(name "fpm")
(version "1.15.1")
(source (origin
(method git-fetch) ;for tests
(uri (git-reference
(url "https://github.com/jordansissel/fpm")
(commit (string-append "v" version))))
(file-name (git-file-name name version))
(sha256
(base32
"1m2zxf7wyk7psvm611yxs68hnwm0pyqilsmcq3x791hz7rvbg68w"))
(patches (search-patches "fpm-newer-clamp-fix.patch"))))
(build-system ruby-build-system)
(arguments
(list #:phases
#~(modify-phases %standard-phases
(add-after 'extract-gemspec 'patch-paths
(lambda* (#:key inputs #:allow-other-keys)
(substitute* '("lib/fpm/util.rb"
"spec/fpm/util_spec.rb"
"spec/fpm/package/rpm_spec.rb")
(("\"/bin/sh\"")
(string-append "\"" (search-input-file inputs "bin/sh")
"\"")))))
(add-after 'extract-gemspec 'relax-requirements
(lambda _
(substitute* "fpm.gemspec"
(("\"clamp\", \"~> 1.0.0\"")
"\"clamp\", \">= 1.0.0\""))))
(add-after 'extract-gemspec 'disable-problematic-tests
;; Disable some tests which are failing (see:
;; https://github.com/jordansissel/fpm/issues/2000).
(lambda _
;; There are 4 'NoMethodError' test failures in the
;; command_spec suite, for unknown reasons.
(delete-file "spec/fpm/command_spec.rb")
(substitute* "spec/fpm/package_spec.rb"
(("@oldtmp = ENV\\[\"TMP\"]" all)
"skip('fails with guix')"))
(substitute* "spec/fpm/package/cpan_spec.rb"
;; This test is marked as expected to fail (pending) when
;; TRAVIS_OS_NAME is set, but passes with Guix; skip it.
(("it \"should unpack tarball containing" all)
(string-append "x" all)))
(substitute* "spec/fpm/package/gem_spec.rb"
;; This test fails for unknown reason; perhaps a patched
;; shebang.
(("it 'should not change the shebang'" all)
(string-append "x" all)))))
(replace 'check
(lambda* (#:key tests? #:allow-other-keys)
(when tests?
;; Set TRAVIS_OS_NAME to skip tests known to cause
;; problems in minimal environments.
(setenv "TRAVIS_OS_NAME" "GNU Guix")
(invoke "rspec")))))))
(native-inputs
(list dpkg
libarchive
node
perl-app-cpanminus
python
ruby-rspec
squashfs-tools
zstd))
(inputs
(list bash-minimal
ruby-arr-pm
ruby-backports
ruby-cabin
ruby-clamp
ruby-pleaserun
ruby-rexml
ruby-stud))
(home-page "https://github.com/jordansissel/fpm/")
(synopsis "Package building and mangling tool")
(description "@command{fpm} is a command to convert directories, RPMs,
Python eggs, Ruby gems, and more to RPMs, debs, Solaris packages and more.")
(license license:expat)))
(define-public akku
(package
(name "akku")
(version "1.1.0")
(source (origin
(method git-fetch)
(uri (git-reference
(url "https://gitlab.com/akkuscm/akku.git")
(commit (string-append "v" version))))
(file-name (git-file-name name version))
(sha256 (base32 "1pi18aamg1fd6f9ynfl7zx92052xzf0zwmhi2pwcwjs1kbah19f5"))))
(build-system gnu-build-system)
(arguments
'(#:phases (modify-phases %standard-phases
(replace 'bootstrap
(lambda* (#:key outputs #:allow-other-keys)
(for-each patch-shebang
'("bootstrap"
".akku/env"))
(let* ((home "/tmp")
(datadir (string-append home "/.local/share/akku/")))
(mkdir-p datadir)
(invoke "touch" (string-append datadir "index.db"))
(setenv "HOME" home))
(invoke "./bootstrap")
#t))
(add-after 'install 'wrap-executables
(lambda* (#:key outputs inputs #:allow-other-keys)
(let ((out (assoc-ref outputs "out"))
(curl (assoc-ref inputs "curl")))
(wrap-program (string-append out "/bin/akku")
`("LD_LIBRARY_PATH" ":" prefix (,(string-append curl "/lib"))))
#t))))))
(native-inputs
(list which autoconf automake pkg-config))
(inputs
(list guile-3.0 curl))
(home-page "https://akkuscm.org/")
(synopsis "Language package manager for Scheme")
(description
"Akku.scm is a project-based language package manager for R6RS and R7RS Scheme.
It is mainly meant for programmers who develop portable programs or libraries in Scheme,
but could potentially work for end-users of those programs. It also has a translator
from R7RS, which allows most R7RS code to run on R6RS implementations.")
(license license:gpl3+)))
(define-public modules
(package
(name "modules")
(version "4.8.0")
(source
(origin
(method url-fetch)
(uri (string-append "mirror://sourceforge/modules/Modules/modules-"
version "/modules-" version ".tar.bz2"))
(sha256 (base32 "1amz8qdqbvfdc8jv0j4720vywbz2gi7l3sr1lh37ilfbxy9lq9g9"))))
(build-system gnu-build-system)
(arguments
`(#:configure-flags
(list (string-append "--with-bin-search-path="
(assoc-ref %build-inputs "tcl") "/bin" ":"
(assoc-ref %build-inputs "procps") "/bin" ":"
(assoc-ref %build-inputs "less") "/bin" ":"
(assoc-ref %build-inputs "coreutils") "/bin")
(string-append "--with-tcl=" (assoc-ref %build-inputs "tcl") "/lib")
"--disable-compat-version")
#:test-target "test"
#:phases
(modify-phases %standard-phases
(add-before 'configure 'patch-add-modules
(lambda* (#:key inputs #:allow-other-keys)
(let ((coreutils (assoc-ref inputs "coreutils")))
(substitute* "script/add.modules.in"
(("/bin/(cat|cp|rm)" _ command)
(string-append coreutils "/bin/" command))
(("/bin/echo")
"echo")))))
(add-before 'configure 'patch-scripts-for-python-3
(lambda _
;; Patch the script for python-3.
(substitute* "script/createmodule.py.in"
(("pathkeys.sort\\(\\)") "pathkeys = sorted(pathkeys)")
(("print\\(\"\\\\t\"\\*") "print(\"\\t\"*int")
(("@PYTHON@") (which "python3")))))
(add-before 'check 'patch-/bin/sh-and-nixbld-groups-in-tests
(lambda _
(use-modules (srfi srfi-1))
(let* ((groups-file (string-append (getcwd) "/nixbld-groups"))
(groups-file-z (string-append groups-file "-z"))
(nixbld-groups
(fold
(lambda (id prev)
(catch #t
(lambda () (cons (group:name (getgrnam id)) prev))
(lambda _ prev)))
'()
(vector->list (getgroups)))))
;; Simulate "id -G -n" command output.
(call-with-output-file groups-file
(lambda (port)
(display (string-join nixbld-groups " ") port)
(display #\newline port)))
;; Simulate "id -G -n -z" command output.
(call-with-output-file groups-file-z
(lambda (port)
(for-each
(lambda (group-name)
(display group-name port)
(display #\null port))
nixbld-groups)))
;; Generate "modulecmd-test.tcl" before running "make test".
(invoke "make" "modulecmd-test.tcl")
;; Substitute shell.
(substitute*
'("modulecmd-test.tcl"
"modulecmd.tcl"
"testsuite/modules.70-maint/380-edit.exp"
"compat/init/filter")
(("/bin/sh") (which "sh")))
;; Skip tests that use supplementary groups.
(for-each
delete-file
'("testsuite/modules.20-locate/112-hide-user-group.exp"
"testsuite/modules.20-locate/117-forbid-user-group.exp"
"testsuite/modules.20-locate/119-hide-cascading.exp"
"testsuite/modules.50-cmds/140-system.exp"
"testsuite/modules.50-cmds/287-info-usergroups.exp"
"testsuite/modules.50-cmds/440-module-tag.exp"
"testsuite/modules.70-maint/220-config.exp"))
(for-each
(lambda (file)
(substitute* file
(("/bin/sh") (which "bash"))
;; For some reason "kvm" group cannot be resolved for
;; "nixbld" user. We replace "id ..." commands with
;; "cat ..." that simulates them.
(("exec id -G -n -z") (string-append "exec cat " groups-file-z))
(("exec id -G -n") (string-append "exec cat " groups-file))))
'("testsuite/modules.00-init/005-init_ts.exp"
"testsuite/install.00-init/005-init_ts.exp"
"modulecmd-test.tcl"))))))))
(native-inputs
(list dejagnu autoconf which))
(inputs
(list tcl less procps coreutils python-3))
(home-page "https://modules.sourceforge.net/")
(synopsis "Shell environment variables and aliases management")
(description "Modules simplify shell initialization and let users
modify their environment during the session with modulefiles. Modules are
used on high-performance clusters to dynamically add and remove paths
to specific versions of applications.")
(license license:gpl2+)))