{ lib, config, aws-sdk-cpp, boehmgc, callPackage, fetchFromGitHub, fetchpatch, fetchpatch2, runCommand, Security, storeDir ? "/nix/store", stateDir ? "/nix/var", confDir ? "/etc", path, }: let boehmgc-nix_2_3 = boehmgc.override { enableLargeConfig = true; }; boehmgc-nix = boehmgc-nix_2_3.overrideAttrs (drv: { patches = (drv.patches or [ ]) ++ [ # Part of the GC solution in https://github.com/NixOS/nix/pull/4944 ./patches/boehmgc-coroutine-sp-fallback.patch ]; }); # old nix fails to build with newer aws-sdk-cpp and the patch doesn't apply aws-sdk-cpp-old-nix = (aws-sdk-cpp.override { apis = [ "s3" "transfer" ]; customMemoryManagement = false; }).overrideAttrs (args: rec { # intentionally overriding postPatch version = "1.9.294"; src = fetchFromGitHub { owner = "aws"; repo = "aws-sdk-cpp"; rev = version; hash = "sha256-Z1eRKW+8nVD53GkNyYlZjCcT74MqFqqRMeMc33eIQ9g="; }; postPatch = '' # Avoid blanket -Werror to evade build failures on less # tested compilers. substituteInPlace cmake/compiler_settings.cmake \ --replace '"-Werror"' ' ' # Missing includes for GCC11 sed '5i#include ' -i \ aws-cpp-sdk-cloudfront-integration-tests/CloudfrontOperationTest.cpp \ aws-cpp-sdk-cognitoidentity-integration-tests/IdentityPoolOperationTest.cpp \ aws-cpp-sdk-dynamodb-integration-tests/TableOperationTest.cpp \ aws-cpp-sdk-elasticfilesystem-integration-tests/ElasticFileSystemTest.cpp \ aws-cpp-sdk-lambda-integration-tests/FunctionTest.cpp \ aws-cpp-sdk-mediastore-data-integration-tests/MediaStoreDataTest.cpp \ aws-cpp-sdk-queues/source/sqs/SQSQueue.cpp \ aws-cpp-sdk-redshift-integration-tests/RedshiftClientTest.cpp \ aws-cpp-sdk-s3-crt-integration-tests/BucketAndObjectOperationTest.cpp \ aws-cpp-sdk-s3-integration-tests/BucketAndObjectOperationTest.cpp \ aws-cpp-sdk-s3control-integration-tests/S3ControlTest.cpp \ aws-cpp-sdk-sqs-integration-tests/QueueOperationTest.cpp \ aws-cpp-sdk-transfer-tests/TransferTests.cpp # Flaky on Hydra rm aws-cpp-sdk-core-tests/aws/auth/AWSCredentialsProviderTest.cpp # Includes aws-c-auth private headers, so only works with submodule build rm aws-cpp-sdk-core-tests/aws/auth/AWSAuthSignerTest.cpp # TestRandomURLMultiThreaded fails rm aws-cpp-sdk-core-tests/http/HttpClientTest.cpp '' + lib.optionalString aws-sdk-cpp.stdenv.isi686 '' # EPSILON is exceeded rm aws-cpp-sdk-core-tests/aws/client/AdaptiveRetryStrategyTest.cpp ''; patches = (args.patches or [ ]) ++ [ ./patches/aws-sdk-cpp-TransferManager-ContentEncoding.patch ]; # only a stripped down version is build which takes a lot less resources to build requiredSystemFeatures = [ ]; }); aws-sdk-cpp-nix = (aws-sdk-cpp.override { apis = [ "s3" "transfer" ]; customMemoryManagement = false; }).overrideAttrs { # only a stripped down version is build which takes a lot less resources to build requiredSystemFeatures = [ ]; }; common = args: callPackage (import ./common.nix ({ inherit lib fetchFromGitHub; } // args)) { inherit Security storeDir stateDir confDir ; boehmgc = boehmgc-nix; aws-sdk-cpp = if lib.versionAtLeast args.version "2.12pre" then aws-sdk-cpp-nix else aws-sdk-cpp-old-nix; }; # https://github.com/NixOS/nix/pull/7585 patch-monitorfdhup = fetchpatch2 { name = "nix-7585-monitor-fd-hup.patch"; url = "https://github.com/NixOS/nix/commit/1df3d62c769dc68c279e89f68fdd3723ed3bcb5a.patch"; hash = "sha256-f+F0fUO+bqyPXjt+IXJtISVr589hdc3y+Cdrxznb+Nk="; }; # Intentionally does not support overrideAttrs etc # Use only for tests that are about the package relation to `pkgs` and/or NixOS. addTestsShallowly = tests: pkg: pkg // { tests = pkg.tests // tests; # In case someone reads the wrong attribute passthru.tests = pkg.tests // tests; }; addFallbackPathsCheck = pkg: addTestsShallowly { nix-fallback-paths = runCommand "test-nix-fallback-paths-version-equals-nix-stable" { paths = lib.concatStringsSep "\n" (builtins.attrValues (import ./nix-fallback-paths.nix)); } '' if [[ "" != $(grep -v 'nix-${pkg.version}$' <<< "$paths") ]]; then echo "nix-fallback-paths not up to date with nixVersions.stable (nix-${pkg.version})" echo "The following paths are not up to date:" grep -v 'nix-${pkg.version}$' <<< "$paths" echo echo "Fix it by running in nixpkgs:" echo echo "curl https://releases.nixos.org/nix/nix-${pkg.version}/fallback-paths.nix >nixos/modules/installer/tools/nix-fallback-paths.nix" echo exit 1 else echo "nix-fallback-paths versions up to date" touch $out fi ''; } pkg; in lib.makeExtensible ( self: ( { nix_2_3 = ( (common { version = "2.3.18"; hash = "sha256-jBz2Ub65eFYG+aWgSI3AJYvLSghio77fWQiIW1svA9U="; patches = [ patch-monitorfdhup ]; maintainers = with lib.maintainers; [ flokli raitobezarius ]; }).override { boehmgc = boehmgc-nix_2_3; } ).overrideAttrs { # https://github.com/NixOS/nix/issues/10222 # spurious test/add.sh failures enableParallelChecking = false; }; nix_2_18 = common { version = "2.18.2"; hash = "sha256-8gNJlBlv2bnffRg0CejiBXc6U/S6YeCLAdHrYvTPyoY="; }; nix_2_19 = common { version = "2.19.4"; hash = "sha256-qXjyVmDm1SFWk1az3GWIsJ0fVG0nWet2FdldFOnUydI="; }; nix_2_20 = common { version = "2.20.6"; hash = "sha256-BSl8Jijq1A4n1ToQy0t0jDJCXhJK+w1prL8QMHS5t54="; }; nix_2_21 = common { version = "2.21.2"; hash = "sha256-ObaVDDPtnOeIE0t7m4OVk5G+OS6d9qYh+ktK67Fe/zE="; }; nix_2_22 = common { version = "2.22.0"; hash = "sha256-Ugcc+lSq8nJP+mddMlGFnoG4Ix1lRFHWOal3299bqR8="; }; git = common rec { version = "2.23.0"; suffix = "pre20240502_${lib.substring 0 8 src.rev}"; src = fetchFromGitHub { owner = "NixOS"; repo = "nix"; rev = "00ca2b05b8fbbef09be5d1e4820857605d4c31b6"; hash = "sha256-trTxWfGElp0rkjquqG5I5RYVoxo8foCflxJFUtHwnOQ="; }; }; latest = self.nix_2_22; # The minimum Nix version supported by Nixpkgs # Note that some functionality *might* have been backported into this Nix version, # making this package an inaccurate representation of what features are available # in the actual lowest minver.nix *patch* version. minimum = let minver = import (path + "/lib/minver.nix"); major = lib.versions.major minver; minor = lib.versions.minor minver; attribute = "nix_${major}_${minor}"; nix = self.${attribute}; in if !self ? ${attribute} then throw "The minimum supported Nix version is ${minver} (declared in lib/minver.nix), but pkgs.nixVersions.${attribute} does not exist." else nix; stable = addFallbackPathsCheck self.nix_2_18; } // lib.optionalAttrs config.allowAliases ( lib.listToAttrs ( map ( minor: let attr = "nix_2_${toString minor}"; in lib.nameValuePair attr (throw "${attr} has been removed") ) (lib.range 4 17) ) // { unstable = throw "nixVersions.unstable has been removed. For bleeding edge (Nix master, roughly weekly updated) use nixVersions.git, otherwise use nixVersions.latest."; } ) ) )