mirror of https://github.com/m-labs/artiq.git
remove nix scripts (moved to dedicated repository)
This commit is contained in:
parent
1cd0f5a552
commit
861ad0a62c
|
@ -33,7 +33,7 @@ This sets up an environment suitable for using ARTIQ, including the ARTIQ-Python
|
||||||
ARTIQ development environment with Nix
|
ARTIQ development environment with Nix
|
||||||
======================================
|
======================================
|
||||||
|
|
||||||
Run ``nix-shell shell-dev.nix`` to obtain an environment containing Migen, MiSoC, Microscope, jesd204b, Clang, Rust, Cargo, and OpenOCD in addition to the user environment above.
|
Run ``nix-shell -I artiqSrc=path_to_artiq_sources shell-dev.nix`` to obtain an environment containing Migen, MiSoC, Microscope, jesd204b, Clang, Rust, Cargo, and OpenOCD in addition to the user environment above.
|
||||||
|
|
||||||
This creates a FHS chroot environment in order to simplify the installation and patching of Xilinx Vivado (it needs to be installed manually e.g. in your home folder).
|
This creates a FHS chroot environment in order to simplify the installation and patching of Xilinx Vivado (it needs to be installed manually e.g. in your home folder).
|
||||||
|
|
|
@ -1,60 +0,0 @@
|
||||||
# Install Vivado in /opt and add to /etc/nixos/configuration.nix:
|
|
||||||
# nix.sandboxPaths = ["/opt"];
|
|
||||||
|
|
||||||
{ pkgs ? import <nixpkgs> {}}:
|
|
||||||
{ target, variant, buildCommand ? "python -m artiq.gateware.targets.${target} -V ${variant}" }:
|
|
||||||
|
|
||||||
let
|
|
||||||
artiqPkgs = import ./default.nix { inherit pkgs; };
|
|
||||||
fetchcargo = import ./fetchcargo.nix {
|
|
||||||
inherit (pkgs) stdenv cacert git cargo cargo-vendor;
|
|
||||||
};
|
|
||||||
cargoDeps = fetchcargo rec {
|
|
||||||
name = "artiq-firmware-cargo-deps";
|
|
||||||
src = ../artiq/firmware;
|
|
||||||
sha256 = "1xzjn9i4rkd9124v2gbdplsgsvp1hlx7czdgc58n316vsnrkbr86";
|
|
||||||
};
|
|
||||||
|
|
||||||
cargoVendored = pkgs.stdenv.mkDerivation {
|
|
||||||
name = "artiq-firmware-cargo-vendored";
|
|
||||||
src = cargoDeps;
|
|
||||||
phases = [ "unpackPhase" "installPhase" ];
|
|
||||||
installPhase =
|
|
||||||
''
|
|
||||||
mkdir -p $out/registry
|
|
||||||
cat << EOF > $out/config
|
|
||||||
[source.crates-io]
|
|
||||||
registry = "https://github.com/rust-lang/crates.io-index"
|
|
||||||
replace-with = "vendored-sources"
|
|
||||||
|
|
||||||
[source."https://github.com/m-labs/libfringe"]
|
|
||||||
git = "https://github.com/m-labs/libfringe"
|
|
||||||
rev = "b8a6d8f"
|
|
||||||
replace-with = "vendored-sources"
|
|
||||||
|
|
||||||
[source.vendored-sources]
|
|
||||||
directory = "$out/registry"
|
|
||||||
EOF
|
|
||||||
cp -R * $out/registry
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
|
|
||||||
buildenv = import ./artiq-dev.nix { inherit pkgs; };
|
|
||||||
|
|
||||||
in pkgs.stdenv.mkDerivation {
|
|
||||||
name = "artiq-board-${target}-${variant}";
|
|
||||||
src = null;
|
|
||||||
phases = [ "buildPhase" "installPhase" ];
|
|
||||||
buildPhase =
|
|
||||||
''
|
|
||||||
${buildenv}/bin/artiq-dev -c "CARGO_HOME=${cargoVendored} ${buildCommand}"
|
|
||||||
'';
|
|
||||||
installPhase =
|
|
||||||
''
|
|
||||||
TARGET_DIR=$out/${pkgs.python3Packages.python.sitePackages}/artiq/binaries/${target}-${variant}
|
|
||||||
mkdir -p $TARGET_DIR
|
|
||||||
cp artiq_${target}/${variant}/gateware/top.bit $TARGET_DIR
|
|
||||||
cp artiq_${target}/${variant}/software/bootloader/bootloader.bin $TARGET_DIR
|
|
||||||
cp artiq_${target}/${variant}/software/runtime/runtime.{elf,fbi} $TARGET_DIR
|
|
||||||
'';
|
|
||||||
}
|
|
|
@ -1,35 +0,0 @@
|
||||||
{ pkgs ? import <nixpkgs> {}}:
|
|
||||||
|
|
||||||
let
|
|
||||||
artiqpkgs = import ./default.nix { inherit pkgs; };
|
|
||||||
in
|
|
||||||
pkgs.buildFHSUserEnv {
|
|
||||||
name = "artiq-dev";
|
|
||||||
targetPkgs = pkgs: (
|
|
||||||
with pkgs; [
|
|
||||||
ncurses5
|
|
||||||
gnumake
|
|
||||||
zlib
|
|
||||||
libuuid
|
|
||||||
xorg.libSM
|
|
||||||
xorg.libICE
|
|
||||||
xorg.libXrender
|
|
||||||
xorg.libX11
|
|
||||||
xorg.libXext
|
|
||||||
xorg.libXtst
|
|
||||||
xorg.libXi
|
|
||||||
(python3.withPackages(ps: with ps; [ jinja2 numpy artiqpkgs.migen artiqpkgs.microscope artiqpkgs.misoc artiqpkgs.jesd204b artiqpkgs.artiq ]))
|
|
||||||
git
|
|
||||||
cargo
|
|
||||||
] ++
|
|
||||||
(with artiqpkgs; [
|
|
||||||
rustc
|
|
||||||
binutils-or1k
|
|
||||||
llvm-or1k
|
|
||||||
openocd
|
|
||||||
])
|
|
||||||
);
|
|
||||||
profile = ''
|
|
||||||
export TARGET_AR=${artiqpkgs.binutils-or1k}/bin/or1k-linux-ar
|
|
||||||
'';
|
|
||||||
}
|
|
|
@ -1,57 +0,0 @@
|
||||||
{ pkgs ? import <nixpkgs> {}}:
|
|
||||||
{ artiqSrc, boardBinaries, target, variant }:
|
|
||||||
|
|
||||||
with pkgs;
|
|
||||||
|
|
||||||
let
|
|
||||||
fakeCondaSource = runCommand "fake-conda-source-${target}-${variant}" { }
|
|
||||||
''
|
|
||||||
cp --no-preserve=mode,ownership -R ${artiqSrc} $out
|
|
||||||
mkdir $out/fake-conda;
|
|
||||||
|
|
||||||
cat << EOF > $out/fake-conda/meta.yaml
|
|
||||||
package:
|
|
||||||
name: artiq-board-${target}-${variant}
|
|
||||||
version: {{ environ["GIT_DESCRIBE_TAG"] }}
|
|
||||||
|
|
||||||
source:
|
|
||||||
git_url: ..
|
|
||||||
|
|
||||||
build:
|
|
||||||
noarch: python
|
|
||||||
number: {{ environ["GIT_DESCRIBE_NUMBER"] }}
|
|
||||||
string: {{ environ["GIT_DESCRIBE_NUMBER"] }}+git{{ environ["GIT_FULL_HASH"][:8] }}
|
|
||||||
ignore_prefix_files: True
|
|
||||||
|
|
||||||
outputs:
|
|
||||||
- name: artiq-board-${target}-${variant}
|
|
||||||
noarch: python
|
|
||||||
files:
|
|
||||||
- site-packages
|
|
||||||
requirements:
|
|
||||||
run:
|
|
||||||
- artiq
|
|
||||||
ignore_prefix_files: True
|
|
||||||
|
|
||||||
about:
|
|
||||||
home: https://m-labs.hk/artiq
|
|
||||||
license: LGPL
|
|
||||||
summary: 'Bitstream, BIOS and firmware for the ${target}-${variant} board variant'
|
|
||||||
EOF
|
|
||||||
|
|
||||||
cat << EOF > $out/fake-conda/build.sh
|
|
||||||
#!/bin/bash
|
|
||||||
set -e
|
|
||||||
SOC_PREFIX=\$PREFIX/site-packages/artiq/binaries/${target}-${variant}
|
|
||||||
mkdir -p \$SOC_PREFIX
|
|
||||||
cp ${boardBinaries}/${pkgs.python3Packages.python.sitePackages}/artiq/binaries/${target}-${variant}/* \$SOC_PREFIX
|
|
||||||
EOF
|
|
||||||
chmod 755 $out/fake-conda/build.sh
|
|
||||||
'';
|
|
||||||
conda-board = import ./conda-build.nix { inherit pkgs; } {
|
|
||||||
name = "conda-artiq-board-${target}-${variant}";
|
|
||||||
src = fakeCondaSource;
|
|
||||||
recipe = "fake-conda";
|
|
||||||
};
|
|
||||||
in
|
|
||||||
conda-board
|
|
|
@ -1,65 +0,0 @@
|
||||||
# We need to pass the whole source to conda for the git variables to work.
|
|
||||||
# recipe must be a string pointing to a path within the source.
|
|
||||||
|
|
||||||
{ pkgs ? import <nixpkgs> {}}:
|
|
||||||
{ name, src, recipe }:
|
|
||||||
|
|
||||||
with pkgs;
|
|
||||||
|
|
||||||
let
|
|
||||||
condaDeps = [ stdenv.cc xorg.libSM xorg.libICE xorg.libXrender libselinux ];
|
|
||||||
# Use the full Anaconda distribution, which already contains conda-build and its many dependencies,
|
|
||||||
# so we don't have to manually deal with them.
|
|
||||||
condaInstaller = fetchurl {
|
|
||||||
url = "https://repo.anaconda.com/archive/Anaconda3-2018.12-Linux-x86_64.sh";
|
|
||||||
sha256 = "006fgyz75ihd00qzbr1cny97xf1mwnzibbqyhskghraqgs2x068h";
|
|
||||||
};
|
|
||||||
condaSrcChmod = runCommand "conda-src-chmod" { } "mkdir $out; cp ${condaInstaller} $out/conda-installer.sh; chmod +x $out/conda-installer.sh";
|
|
||||||
condaInstallerEnv = buildFHSUserEnv {
|
|
||||||
name = "conda-installer-env";
|
|
||||||
targetPkgs = pkgs: ([ condaSrcChmod ] ++ condaDeps);
|
|
||||||
};
|
|
||||||
|
|
||||||
# Git depends on libiconv
|
|
||||||
condaIconv = fetchurl {
|
|
||||||
url = "https://anaconda.org/conda-forge/libiconv/1.15/download/linux-64/libiconv-1.15-h14c3975_1004.tar.bz2";
|
|
||||||
sha256 = "167j8jpr6mnyrzwp18dr52xr3xjsf39q452ag247ijlmp092v8ns";
|
|
||||||
};
|
|
||||||
condaGit = fetchurl {
|
|
||||||
url = "https://anaconda.org/conda-forge/git/2.20.1/download/linux-64/git-2.20.1-pl526hc122a05_1001.tar.bz2";
|
|
||||||
sha256 = "03s01xq2jj7zbx7jfzz6agy40jj7xkq6dwar3lw1z5j2rbmh8h0h";
|
|
||||||
};
|
|
||||||
condaInstalled = runCommand "conda-installed" { }
|
|
||||||
''
|
|
||||||
${condaInstallerEnv}/bin/conda-installer-env -c "${condaSrcChmod}/conda-installer.sh -p $out -b"
|
|
||||||
${condaInstallerEnv}/bin/conda-installer-env -c "$out/bin/conda install ${condaIconv}"
|
|
||||||
${condaInstallerEnv}/bin/conda-installer-env -c "$out/bin/conda install ${condaGit}"
|
|
||||||
'';
|
|
||||||
condaBuilderEnv = buildFHSUserEnv {
|
|
||||||
name = "conda-builder-env";
|
|
||||||
targetPkgs = pkgs: [ condaInstalled ] ++ condaDeps;
|
|
||||||
};
|
|
||||||
|
|
||||||
in stdenv.mkDerivation {
|
|
||||||
inherit name src;
|
|
||||||
buildInputs = [ condaBuilderEnv ];
|
|
||||||
buildCommand =
|
|
||||||
''
|
|
||||||
HOME=`pwd`
|
|
||||||
# Build requirements make conda-build fail when disconnected from the internet, e.g. in the nix sandbox.
|
|
||||||
# Just ignore them - python and setuptools are installed anyway.
|
|
||||||
cat << EOF > clobber.yaml
|
|
||||||
requirements:
|
|
||||||
build:
|
|
||||||
|
|
||||||
build:
|
|
||||||
script_env:
|
|
||||||
- PYTHON
|
|
||||||
EOF
|
|
||||||
mkdir $out
|
|
||||||
${condaBuilderEnv}/bin/conda-builder-env -c "PYTHON=python conda build --clobber-file clobber.yaml --no-anaconda-upload --no-test --output-folder $out $src/${recipe}"
|
|
||||||
|
|
||||||
mkdir -p $out/nix-support
|
|
||||||
echo file conda $out/noarch/*.tar.bz2 >> $out/nix-support/hydra-build-products
|
|
||||||
'';
|
|
||||||
}
|
|
|
@ -1,18 +0,0 @@
|
||||||
{ pkgs ? import <nixpkgs> {}}:
|
|
||||||
with pkgs;
|
|
||||||
let
|
|
||||||
# this code was copied from nipxkgs rev. ffafe9 (nixcloud team) and slightly modified
|
|
||||||
rust = callPackage ./pkgs/rust
|
|
||||||
(stdenv.lib.optionalAttrs (stdenv.cc.isGNU && stdenv.hostPlatform.isi686) {
|
|
||||||
stdenv = overrideCC stdenv gcc6; # with gcc-7: undefined reference to `__divmoddi4'
|
|
||||||
});
|
|
||||||
llvm-src = callPackage ./fetch-llvm-clang.nix {};
|
|
||||||
in rec {
|
|
||||||
inherit (rust) rustc;
|
|
||||||
inherit (callPackage ./pkgs/python3Packages.nix {}) migen microscope misoc jesd204b;
|
|
||||||
binutils-or1k = callPackage ./pkgs/binutils-or1k.nix {};
|
|
||||||
llvm-or1k = callPackage ./pkgs/llvm-or1k.nix { inherit llvm-src; };
|
|
||||||
llvmlite = callPackage ./pkgs/llvmlite.nix { inherit llvm-or1k; };
|
|
||||||
artiq = callPackage ./pkgs/artiq.nix { inherit binutils-or1k; inherit llvm-or1k; inherit llvmlite; };
|
|
||||||
openocd = callPackage ./pkgs/openocd.nix {};
|
|
||||||
}
|
|
|
@ -1,22 +0,0 @@
|
||||||
{ runCommand, fetchFromGitHub, git }:
|
|
||||||
|
|
||||||
let
|
|
||||||
llvm-src = fetchFromGitHub {
|
|
||||||
rev = "527aa86b578da5dfb9cf4510b71f0f46a11249f7";
|
|
||||||
owner = "m-labs";
|
|
||||||
repo = "llvm-or1k";
|
|
||||||
sha256 = "0lmcg9xj66pf4mb6racipw67vm8kwm84dl861hyqnywd61kvhrwa";
|
|
||||||
};
|
|
||||||
clang-src = fetchFromGitHub {
|
|
||||||
rev = "9e996136d52ed506ed8f57ef8b13b0f0f735e6a3";
|
|
||||||
owner = "m-labs";
|
|
||||||
repo = "clang-or1k";
|
|
||||||
sha256 = "0w5f450i76y162aswi2c7jip8x3arzljaxhbqp8qfdffm0rdbjp4";
|
|
||||||
};
|
|
||||||
in
|
|
||||||
runCommand "llvm_or1k_src" {}''
|
|
||||||
mkdir -p $out
|
|
||||||
mkdir -p $out/tools/clang
|
|
||||||
cp -r ${llvm-src}/* $out/
|
|
||||||
cp -r ${clang-src}/* $out/tools/clang
|
|
||||||
''
|
|
|
@ -1,35 +0,0 @@
|
||||||
{ stdenv, cacert, git, cargo, cargo-vendor }:
|
|
||||||
{ name, src, sha256 }:
|
|
||||||
stdenv.mkDerivation {
|
|
||||||
name = "${name}-vendor";
|
|
||||||
nativeBuildInputs = [ cacert git cargo cargo-vendor ];
|
|
||||||
inherit src;
|
|
||||||
|
|
||||||
phases = "unpackPhase patchPhase installPhase";
|
|
||||||
|
|
||||||
installPhase = ''
|
|
||||||
if [[ ! -f Cargo.lock ]]; then
|
|
||||||
echo
|
|
||||||
echo "ERROR: The Cargo.lock file doesn't exist"
|
|
||||||
echo
|
|
||||||
echo "Cargo.lock is needed to make sure that cargoSha256 doesn't change"
|
|
||||||
echo "when the registry is updated."
|
|
||||||
echo
|
|
||||||
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
|
|
||||||
export CARGO_HOME=$(mktemp -d cargo-home.XXX)
|
|
||||||
|
|
||||||
cargo vendor
|
|
||||||
|
|
||||||
cp -ar vendor $out
|
|
||||||
'';
|
|
||||||
|
|
||||||
outputHashAlgo = "sha256";
|
|
||||||
outputHashMode = "recursive";
|
|
||||||
outputHash = sha256;
|
|
||||||
|
|
||||||
impureEnvVars = stdenv.lib.fetchers.proxyImpureEnvVars;
|
|
||||||
preferLocalBuild = true;
|
|
||||||
}
|
|
|
@ -1,81 +0,0 @@
|
||||||
{ stdenv, git, fetchFromGitHub, python3Packages, qt5Full, binutils-or1k, llvm-or1k, llvmlite, python3 }:
|
|
||||||
|
|
||||||
let
|
|
||||||
|
|
||||||
levenshtein = python3Packages.buildPythonPackage rec {
|
|
||||||
name = "levenshtein";
|
|
||||||
src = fetchFromGitHub {
|
|
||||||
owner = "ztane";
|
|
||||||
repo = "python-Levenshtein";
|
|
||||||
rev = "854e61a05bb8b750e990add96df412cd5448b75e";
|
|
||||||
sha256 = "1yf21kg1g2ivm5a4dx1jra9k0c33np54d0hk5ymnfyc4f6pg386q";
|
|
||||||
};
|
|
||||||
doCheck = false;
|
|
||||||
};
|
|
||||||
|
|
||||||
pythonparser = python3Packages.buildPythonPackage rec {
|
|
||||||
name = "pythonparser";
|
|
||||||
src = fetchFromGitHub {
|
|
||||||
owner = "m-labs";
|
|
||||||
repo = "pythonparser";
|
|
||||||
rev = "5b391fe86f43bb9f4f96c5bc0532e2a112db2936";
|
|
||||||
sha256 = "1gw1fk4y2l6bwq0fg2a9dfc1rvq8cv492dyil96amjdhsxvnx35b";
|
|
||||||
};
|
|
||||||
propagatedBuildInputs = with python3Packages; [ regex ];
|
|
||||||
};
|
|
||||||
|
|
||||||
asyncserial = python3Packages.buildPythonPackage rec {
|
|
||||||
name = "asyncserial";
|
|
||||||
src = fetchFromGitHub {
|
|
||||||
owner = "m-labs";
|
|
||||||
repo = "asyncserial";
|
|
||||||
rev = "d95bc1d6c791b0e9785935d2f62f628eb5cdf98d";
|
|
||||||
sha256 = "0yzkka9jk3612v8gx748x6ziwykq5lr7zmr9wzkcls0v2yilqx9k";
|
|
||||||
};
|
|
||||||
propagatedBuildInputs = with python3Packages; [ pyserial ];
|
|
||||||
doCheck = false;
|
|
||||||
};
|
|
||||||
|
|
||||||
quamash = python3Packages.buildPythonPackage rec {
|
|
||||||
name = "quamash";
|
|
||||||
src = fetchFromGitHub {
|
|
||||||
owner = "harvimt";
|
|
||||||
repo = "quamash";
|
|
||||||
rev = "e513b30f137415c5e098602fa383e45debab85e7";
|
|
||||||
sha256 = "117rp9r4lz0kfz4dmmpa35hp6nhbh6b4xq0jmgvqm68g9hwdxmqa";
|
|
||||||
};
|
|
||||||
propagatedBuildInputs = with python3Packages; [ pyqt5 ];
|
|
||||||
doCheck = false;
|
|
||||||
};
|
|
||||||
|
|
||||||
pyqtgraph-qt5 = python3Packages.buildPythonPackage rec {
|
|
||||||
name = "pyqtgraph_qt5-${version}";
|
|
||||||
version = "0.10.0";
|
|
||||||
doCheck = false;
|
|
||||||
src = fetchFromGitHub {
|
|
||||||
owner = "pyqtgraph";
|
|
||||||
repo = "pyqtgraph";
|
|
||||||
rev = "1426e334e1d20542400d77c72c132b04c6d17ddb";
|
|
||||||
sha256 = "1079haxyr316jf0wpirxdj0ry6j8mr16cqr0dyyrd5cnxwl7zssh";
|
|
||||||
};
|
|
||||||
propagatedBuildInputs = with python3Packages; [ scipy numpy pyqt5 pyopengl ];
|
|
||||||
};
|
|
||||||
|
|
||||||
in
|
|
||||||
|
|
||||||
python3Packages.buildPythonPackage rec {
|
|
||||||
name = "artiq";
|
|
||||||
src = builtins.filterSource
|
|
||||||
(path: type: type != "directory" || builtins.baseNameOf path != ".nix")
|
|
||||||
./../..;
|
|
||||||
buildInputs = [ git ];
|
|
||||||
propagatedBuildInputs = with python3Packages; [ binutils-or1k llvm-or1k llvmlite levenshtein pyqtgraph-qt5 aiohttp pygit2 pythonparser numpy dateutil quamash scipy prettytable pyserial asyncserial h5py cython regex qt5Full pyqt5 ];
|
|
||||||
checkPhase = "python -m unittest discover -v artiq.test";
|
|
||||||
meta = with stdenv.lib; {
|
|
||||||
description = "A leading-edge control system for quantum information experiments";
|
|
||||||
homepage = https://m-labs/artiq;
|
|
||||||
license = licenses.lgpl3;
|
|
||||||
#maintainers = [ maintainers.sb0 ];
|
|
||||||
platforms = [ "x86_64-linux" ];
|
|
||||||
};
|
|
||||||
}
|
|
|
@ -1,34 +0,0 @@
|
||||||
{ stdenv, buildPackages
|
|
||||||
, fetchurl, zlib
|
|
||||||
}:
|
|
||||||
|
|
||||||
stdenv.mkDerivation rec {
|
|
||||||
basename = "binutils";
|
|
||||||
platform = "or1k";
|
|
||||||
version = "2.30";
|
|
||||||
name = "${basename}_${platform}-${version}";
|
|
||||||
src = fetchurl {
|
|
||||||
url = "https://ftp.gnu.org/gnu/binutils/binutils-${version}.tar.bz2";
|
|
||||||
sha256 = "028cklfqaab24glva1ks2aqa1zxa6w6xmc8q34zs1sb7h22dxspg";
|
|
||||||
};
|
|
||||||
configureFlags =
|
|
||||||
[ "--enable-shared" "--enable-deterministic-archives" "--target=or1k-linux"];
|
|
||||||
outputs = [ "out" "info" "man" ];
|
|
||||||
depsBuildBuild = [ buildPackages.stdenv.cc ];
|
|
||||||
buildInputs = [ zlib ];
|
|
||||||
enableParallelBuilding = true;
|
|
||||||
meta = {
|
|
||||||
description = "Tools for manipulating binaries (linker, assembler, etc.)";
|
|
||||||
longDescription = ''
|
|
||||||
The GNU Binutils are a collection of binary tools. The main
|
|
||||||
ones are `ld' (the GNU linker) and `as' (the GNU assembler).
|
|
||||||
They also include the BFD (Binary File Descriptor) library,
|
|
||||||
`gprof', `nm', `strip', etc.
|
|
||||||
'';
|
|
||||||
homepage = http://www.gnu.org/software/binutils/;
|
|
||||||
license = stdenv.lib.licenses.gpl3Plus;
|
|
||||||
/* Give binutils a lower priority than gcc-wrapper to prevent a
|
|
||||||
collision due to the ld/as wrappers/symlinks in the latter. */
|
|
||||||
priority = "10";
|
|
||||||
};
|
|
||||||
}
|
|
|
@ -1,45 +0,0 @@
|
||||||
{ stdenv
|
|
||||||
, git
|
|
||||||
, llvm-src
|
|
||||||
, perl, groff, cmake, libxml2, python, libffi, valgrind
|
|
||||||
, ...
|
|
||||||
}:
|
|
||||||
|
|
||||||
stdenv.mkDerivation rec {
|
|
||||||
name = "llvm_or1k";
|
|
||||||
src = llvm-src;
|
|
||||||
|
|
||||||
buildInputs = [ perl groff cmake libxml2 python libffi ] ++ stdenv.lib.optional stdenv.isLinux valgrind;
|
|
||||||
|
|
||||||
preBuild = ''
|
|
||||||
NIX_BUILD_CORES=4
|
|
||||||
makeFlagsArray=(-j''$NIX_BUILD_CORES)
|
|
||||||
mkdir -p $out/
|
|
||||||
'';
|
|
||||||
|
|
||||||
cmakeFlags = with stdenv; [
|
|
||||||
"-DCMAKE_BUILD_TYPE=Release"
|
|
||||||
"-DLLVM_BUILD_LLVM_DYLIB=ON"
|
|
||||||
"-DLLVM_LINK_LLVM_DYLIB=ON"
|
|
||||||
"-DLLVM_TARGETS_TO_BUILD=X86"
|
|
||||||
"-DLLVM_EXPERIMENTAL_TARGETS_TO_BUILD=OR1K"
|
|
||||||
"-DLLVM_ENABLE_ASSERTIONS=OFF"
|
|
||||||
"-DLLVM_INSTALL_UTILS=ON"
|
|
||||||
"-DLLVM_INCLUDE_TESTS=OFF"
|
|
||||||
"-DLLVM_INCLUDE_DOCS=OFF"
|
|
||||||
"-DLLVM_INCLUDE_EXAMPLES=OFF"
|
|
||||||
"-DCLANG_ENABLE_ARCMT=OFF"
|
|
||||||
"-DCLANG_ENABLE_STATIC_ANALYZER=OFF"
|
|
||||||
"-DCLANG_INCLUDE_TESTS=OFF"
|
|
||||||
"-DCLANG_INCLUDE_DOCS=OFF"
|
|
||||||
];
|
|
||||||
|
|
||||||
enableParallelBuilding = true;
|
|
||||||
meta = {
|
|
||||||
description = "Collection of modular and reusable compiler and toolchain technologies";
|
|
||||||
homepage = http://llvm.org/;
|
|
||||||
license = stdenv.lib.licenses.bsd3;
|
|
||||||
#maintainers = with stdenv.lib.maintainers; [ sb0 ];
|
|
||||||
platforms = stdenv.lib.platforms.all;
|
|
||||||
};
|
|
||||||
}
|
|
|
@ -1,25 +0,0 @@
|
||||||
{ stdenv, fetchFromGitHub, llvm-or1k, makeWrapper, python3, ncurses, zlib, python3Packages }:
|
|
||||||
stdenv.mkDerivation rec {
|
|
||||||
name = "llvmlite";
|
|
||||||
src = fetchFromGitHub {
|
|
||||||
rev = "1d167be4eec5d6c32498952be8b3ac17dd30df8d";
|
|
||||||
owner = "m-labs";
|
|
||||||
repo = "llvmlite";
|
|
||||||
sha256 = "0ranbjhcz2v3crmdbw1sxdwqwqbbm7dd53d8qaqb69ma9fkxy8x7";
|
|
||||||
};
|
|
||||||
|
|
||||||
buildInputs = [ makeWrapper python3 ncurses zlib llvm-or1k python3Packages.setuptools ];
|
|
||||||
|
|
||||||
installPhase = ''
|
|
||||||
LLVM_CONFIG=${llvm-or1k}/bin/llvm-config
|
|
||||||
python3 setup.py install --prefix=$out
|
|
||||||
'';
|
|
||||||
|
|
||||||
meta = with stdenv.lib; {
|
|
||||||
description = "A lightweight LLVM python binding for writing JIT compilers";
|
|
||||||
homepage = "http://llvmlite.pydata.org/";
|
|
||||||
#maintainers = with maintainers; [ sb0 ];
|
|
||||||
license = licenses.bsd2;
|
|
||||||
platforms = platforms.unix;
|
|
||||||
};
|
|
||||||
}
|
|
|
@ -1,72 +0,0 @@
|
||||||
{ stdenv, fetchFromGitHub, autoreconfHook, libftdi, libusb1, pkgconfig, hidapi }:
|
|
||||||
|
|
||||||
stdenv.mkDerivation rec {
|
|
||||||
name = "openocd-mlabs-${version}";
|
|
||||||
version = "0.10.0";
|
|
||||||
|
|
||||||
src = fetchFromGitHub {
|
|
||||||
owner = "m-labs";
|
|
||||||
repo = "openocd";
|
|
||||||
fetchSubmodules = true;
|
|
||||||
rev = "c383a57adcff332b2c5cf8d55a84626285b42c2c";
|
|
||||||
sha256 = "0xlj9cs72acx3zqagvr7f1c0v6lnqhl8fgrlhgmhmvk5n9knk492";
|
|
||||||
};
|
|
||||||
bscan_spi_bitstreams = fetchFromGitHub {
|
|
||||||
owner = "quartiq";
|
|
||||||
repo = "bscan_spi_bitstreams";
|
|
||||||
rev = "a628956da7dc794e6e3c95b31ff9ce3af58bc763";
|
|
||||||
sha256 = "1cydbym3wv9jwxh6lw9im1mjzr7w8rzzx95bxkjschmzjq4h13vk";
|
|
||||||
};
|
|
||||||
|
|
||||||
nativeBuildInputs = [ pkgconfig ];
|
|
||||||
buildInputs = [ autoreconfHook libftdi libusb1 hidapi ];
|
|
||||||
|
|
||||||
configureFlags = [
|
|
||||||
"--enable-jtag_vpi"
|
|
||||||
"--enable-usb_blaster_libftdi"
|
|
||||||
"--enable-amtjtagaccel"
|
|
||||||
"--enable-gw16012"
|
|
||||||
"--enable-presto_libftdi"
|
|
||||||
"--enable-openjtag_ftdi"
|
|
||||||
"--enable-oocd_trace"
|
|
||||||
"--enable-buspirate"
|
|
||||||
"--enable-sysfsgpio"
|
|
||||||
"--enable-remote-bitbang"
|
|
||||||
];
|
|
||||||
|
|
||||||
NIX_CFLAGS_COMPILE = [
|
|
||||||
"-Wno-implicit-fallthrough"
|
|
||||||
"-Wno-format-truncation"
|
|
||||||
"-Wno-format-overflow"
|
|
||||||
];
|
|
||||||
|
|
||||||
postInstall = ''
|
|
||||||
mkdir -p "$out/etc/udev/rules.d"
|
|
||||||
rules="$out/share/openocd/contrib/60-openocd.rules"
|
|
||||||
if [ ! -f "$rules" ]; then
|
|
||||||
echo "$rules is missing, must update the Nix file."
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
ln -s "$rules" "$out/etc/udev/rules.d/"
|
|
||||||
|
|
||||||
mkdir -p "$out/share/bscan-spi-bitstreams"
|
|
||||||
cp ${bscan_spi_bitstreams}/*.bit "$out/share/bscan-spi-bitstreams"
|
|
||||||
'';
|
|
||||||
|
|
||||||
meta = with stdenv.lib; {
|
|
||||||
description = "Free and Open On-Chip Debugging, In-System Programming and Boundary-Scan Testing";
|
|
||||||
longDescription = ''
|
|
||||||
OpenOCD provides on-chip programming and debugging support with a layered
|
|
||||||
architecture of JTAG interface and TAP support, debug target support
|
|
||||||
(e.g. ARM, MIPS), and flash chip drivers (e.g. CFI, NAND, etc.). Several
|
|
||||||
network interfaces are available for interactiving with OpenOCD: HTTP,
|
|
||||||
telnet, TCL, and GDB. The GDB server enables OpenOCD to function as a
|
|
||||||
"remote target" for source-level debugging of embedded systems using the
|
|
||||||
GNU GDB program.
|
|
||||||
'';
|
|
||||||
homepage = http://openocd.sourceforge.net/;
|
|
||||||
license = licenses.gpl2Plus;
|
|
||||||
#maintainers = with maintainers; [ sb0 ];
|
|
||||||
platforms = platforms.linux;
|
|
||||||
};
|
|
||||||
}
|
|
|
@ -1,107 +0,0 @@
|
||||||
{ pkgs, stdenv, fetchFromGitHub, python, python3Packages }:
|
|
||||||
|
|
||||||
rec {
|
|
||||||
asyncserial = python3Packages.buildPythonPackage rec {
|
|
||||||
name = "asyncserial";
|
|
||||||
|
|
||||||
src = fetchFromGitHub {
|
|
||||||
owner = "m-labs";
|
|
||||||
repo = "asyncserial";
|
|
||||||
rev = "d95bc1d6c791b0e9785935d2f62f628eb5cdf98d";
|
|
||||||
sha256 = "0yzkka9jk3612v8gx748x6ziwykq5lr7zmr9wzkcls0v2yilqx9k";
|
|
||||||
fetchSubmodules = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
propagatedBuildInputs = with python3Packages; [ pyserial ] ++ (with pkgs; [ ]);
|
|
||||||
|
|
||||||
meta = with stdenv.lib; {
|
|
||||||
description = "asyncio support for pyserial";
|
|
||||||
homepage = "https://m-labs.hk";
|
|
||||||
license = licenses.bsd2;
|
|
||||||
platforms = platforms.unix;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
misoc = python3Packages.buildPythonPackage rec {
|
|
||||||
name = "misoc";
|
|
||||||
|
|
||||||
src = fetchFromGitHub {
|
|
||||||
owner = "m-labs";
|
|
||||||
repo = "misoc";
|
|
||||||
rev = "8e033c2cb77f78c95d2b2e08125324891d07fa34";
|
|
||||||
sha256 = "0pv1akhvr85iswqmhzcqh9gfnyha11k68qmhqizma8fdccvvzm4y";
|
|
||||||
fetchSubmodules = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
# TODO: fix misoc bitrot and re-enable tests
|
|
||||||
doCheck = false;
|
|
||||||
|
|
||||||
propagatedBuildInputs = with python3Packages; [ pyserial jinja2 numpy asyncserial migen ];
|
|
||||||
|
|
||||||
meta = with stdenv.lib; {
|
|
||||||
description = "A high performance and small footprint system-on-chip based on Migen";
|
|
||||||
homepage = "https://m-labs.hk/migen";
|
|
||||||
license = licenses.bsd2;
|
|
||||||
platforms = platforms.unix;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
migen = python3Packages.buildPythonPackage rec {
|
|
||||||
name = "migen";
|
|
||||||
|
|
||||||
src = fetchFromGitHub {
|
|
||||||
owner = "m-labs";
|
|
||||||
repo = "migen";
|
|
||||||
rev = "afe4405becdbc76539f0195c319367187012b05e";
|
|
||||||
sha256 = "1f288a7ll1d1gjmml716wsjf1jyq9y903i2312bxb8pwrg7fwgvz";
|
|
||||||
};
|
|
||||||
|
|
||||||
# TODO: fix migen platform issues and re-enable tests
|
|
||||||
doCheck = false;
|
|
||||||
|
|
||||||
propagatedBuildInputs = with python3Packages; [ colorama sphinx sphinx_rtd_theme ] ++ (with pkgs; [ verilator ]);
|
|
||||||
|
|
||||||
meta = with stdenv.lib; {
|
|
||||||
description = "A Python toolbox for building complex digital hardware";
|
|
||||||
homepage = "https://m-labs.hk/migen";
|
|
||||||
license = licenses.bsd2;
|
|
||||||
platforms = platforms.unix;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
microscope = python3Packages.buildPythonPackage rec {
|
|
||||||
name = "microscope";
|
|
||||||
|
|
||||||
src = fetchFromGitHub {
|
|
||||||
owner = "m-labs";
|
|
||||||
repo = "microscope";
|
|
||||||
rev = "02cffc360ec5a234c589de6cb9616b057ed22253";
|
|
||||||
sha256 = "09yvgk16xfv5r5cf55vcg0f14wam42w53r4snlalcyw5gkm0rlhq";
|
|
||||||
};
|
|
||||||
|
|
||||||
propagatedBuildInputs = with python3Packages; [ pyserial prettytable msgpack-python migen ];
|
|
||||||
|
|
||||||
meta = with stdenv.lib; {
|
|
||||||
description = "Finding the bacteria in rotting FPGA designs";
|
|
||||||
homepage = "https://m-labs.hk/migen";
|
|
||||||
license = licenses.bsd2;
|
|
||||||
platforms = platforms.unix;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
jesd204b = python3Packages.buildPythonPackage rec {
|
|
||||||
name = "jesd204b";
|
|
||||||
|
|
||||||
src = fetchFromGitHub {
|
|
||||||
owner = "m-labs";
|
|
||||||
repo = "jesd204b";
|
|
||||||
rev = "2fd6391c0a9197580d60f7d8a146191dc7337b03";
|
|
||||||
sha256 = "1lhw8f0dp42xx4g6d7hyhqhrnd6i5ll4a1wcg265rqz3600i4009";
|
|
||||||
};
|
|
||||||
|
|
||||||
propagatedBuildInputs = with python3Packages; [ migen misoc ];
|
|
||||||
|
|
||||||
meta = with stdenv.lib; {
|
|
||||||
description = "JESD204B core for Migen/MiSoC";
|
|
||||||
homepage = "https://m-labs.hk/migen";
|
|
||||||
license = licenses.bsd2;
|
|
||||||
platforms = platforms.unix;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
|
@ -1,117 +0,0 @@
|
||||||
{ stdenv, makeWrapper, bash, buildRustPackage, curl, darwin
|
|
||||||
, version
|
|
||||||
, src
|
|
||||||
, platform
|
|
||||||
, versionType
|
|
||||||
}:
|
|
||||||
|
|
||||||
let
|
|
||||||
inherit (stdenv.lib) optionalString;
|
|
||||||
inherit (darwin.apple_sdk.frameworks) Security;
|
|
||||||
|
|
||||||
bootstrapping = versionType == "bootstrap";
|
|
||||||
|
|
||||||
installComponents
|
|
||||||
= "rustc,rust-std-${platform}"
|
|
||||||
+ (optionalString bootstrapping ",cargo")
|
|
||||||
;
|
|
||||||
in
|
|
||||||
|
|
||||||
rec {
|
|
||||||
inherit buildRustPackage;
|
|
||||||
|
|
||||||
rustc = stdenv.mkDerivation rec {
|
|
||||||
name = "rustc-${versionType}-${version}";
|
|
||||||
|
|
||||||
inherit version;
|
|
||||||
inherit src;
|
|
||||||
|
|
||||||
meta = with stdenv.lib; {
|
|
||||||
homepage = http://www.rust-lang.org/;
|
|
||||||
description = "A safe, concurrent, practical language";
|
|
||||||
#maintainers = with maintainers; [ sb0 ];
|
|
||||||
license = [ licenses.mit licenses.asl20 ];
|
|
||||||
};
|
|
||||||
|
|
||||||
buildInputs = [ bash ] ++ stdenv.lib.optional stdenv.isDarwin Security;
|
|
||||||
|
|
||||||
postPatch = ''
|
|
||||||
patchShebangs .
|
|
||||||
'';
|
|
||||||
|
|
||||||
installPhase = ''
|
|
||||||
./install.sh --prefix=$out \
|
|
||||||
--components=${installComponents}
|
|
||||||
|
|
||||||
${optionalString (stdenv.isLinux && bootstrapping) ''
|
|
||||||
patchelf \
|
|
||||||
--set-interpreter $(cat $NIX_CC/nix-support/dynamic-linker) \
|
|
||||||
"$out/bin/rustc"
|
|
||||||
patchelf \
|
|
||||||
--set-interpreter $(cat $NIX_CC/nix-support/dynamic-linker) \
|
|
||||||
"$out/bin/rustdoc"
|
|
||||||
patchelf \
|
|
||||||
--set-interpreter $(cat $NIX_CC/nix-support/dynamic-linker) \
|
|
||||||
"$out/bin/cargo"
|
|
||||||
''}
|
|
||||||
|
|
||||||
${optionalString (stdenv.isDarwin && bootstrapping) ''
|
|
||||||
install_name_tool -change /usr/lib/libresolv.9.dylib '${darwin.libresolv}/lib/libresolv.9.dylib' "$out/bin/rustc"
|
|
||||||
install_name_tool -change /usr/lib/libresolv.9.dylib '${darwin.libresolv}/lib/libresolv.9.dylib' "$out/bin/rustdoc"
|
|
||||||
install_name_tool -change /usr/lib/libiconv.2.dylib '${darwin.libiconv}/lib/libiconv.2.dylib' "$out/bin/cargo"
|
|
||||||
install_name_tool -change /usr/lib/libresolv.9.dylib '${darwin.libresolv}/lib/libresolv.9.dylib' "$out/bin/cargo"
|
|
||||||
install_name_tool -change /usr/lib/libcurl.4.dylib '${stdenv.lib.getLib curl}/lib/libcurl.4.dylib' "$out/bin/cargo"
|
|
||||||
for f in $out/lib/lib*.dylib; do
|
|
||||||
install_name_tool -change /usr/lib/libresolv.9.dylib '${darwin.libresolv}/lib/libresolv.9.dylib' "$f"
|
|
||||||
done
|
|
||||||
''}
|
|
||||||
|
|
||||||
# Do NOT, I repeat, DO NOT use `wrapProgram` on $out/bin/rustc
|
|
||||||
# (or similar) here. It causes strange effects where rustc loads
|
|
||||||
# the wrong libraries in a bootstrap-build causing failures that
|
|
||||||
# are very hard to track down. For details, see
|
|
||||||
# https://github.com/rust-lang/rust/issues/34722#issuecomment-232164943
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
|
|
||||||
cargo = stdenv.mkDerivation rec {
|
|
||||||
name = "cargo-${versionType}-${version}";
|
|
||||||
|
|
||||||
inherit version;
|
|
||||||
inherit src;
|
|
||||||
|
|
||||||
meta = with stdenv.lib; {
|
|
||||||
homepage = http://www.rust-lang.org/;
|
|
||||||
description = "A safe, concurrent, practical language";
|
|
||||||
#maintainers = with maintainers; [ sb0 ];
|
|
||||||
license = [ licenses.mit licenses.asl20 ];
|
|
||||||
};
|
|
||||||
|
|
||||||
buildInputs = [ makeWrapper bash ] ++ stdenv.lib.optional stdenv.isDarwin Security;
|
|
||||||
|
|
||||||
postPatch = ''
|
|
||||||
patchShebangs .
|
|
||||||
'';
|
|
||||||
|
|
||||||
installPhase = ''
|
|
||||||
patchShebangs ./install.sh
|
|
||||||
./install.sh --prefix=$out \
|
|
||||||
--components=cargo
|
|
||||||
|
|
||||||
${optionalString (stdenv.isLinux && bootstrapping) ''
|
|
||||||
patchelf \
|
|
||||||
--set-interpreter $(cat $NIX_CC/nix-support/dynamic-linker) \
|
|
||||||
"$out/bin/cargo"
|
|
||||||
''}
|
|
||||||
|
|
||||||
${optionalString (stdenv.isDarwin && bootstrapping) ''
|
|
||||||
install_name_tool -change /usr/lib/libiconv.2.dylib '${darwin.libiconv}/lib/libiconv.2.dylib' "$out/bin/cargo"
|
|
||||||
install_name_tool -change /usr/lib/libresolv.9.dylib '${darwin.libresolv}/lib/libresolv.9.dylib' "$out/bin/cargo"
|
|
||||||
install_name_tool -change /usr/lib/libcurl.4.dylib '${stdenv.lib.getLib curl}/lib/libcurl.4.dylib' "$out/bin/cargo"
|
|
||||||
''}
|
|
||||||
|
|
||||||
wrapProgram "$out/bin/cargo" \
|
|
||||||
--suffix PATH : "${rustc}/bin"
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
}
|
|
|
@ -1,42 +0,0 @@
|
||||||
{ stdenv, fetchurl, callPackage }:
|
|
||||||
|
|
||||||
let
|
|
||||||
# Note: the version MUST be one version prior to the version we're
|
|
||||||
# building
|
|
||||||
version = "1.28.0";
|
|
||||||
|
|
||||||
# fetch hashes by running `print-hashes.sh 1.24.1`
|
|
||||||
hashes = {
|
|
||||||
i686-unknown-linux-gnu = "de7cdb4e665e897ea9b10bf6fd545f900683296456d6a11d8510397bb330455f";
|
|
||||||
x86_64-unknown-linux-gnu = "2a1390340db1d24a9498036884e6b2748e9b4b057fc5219694e298bdaa37b810";
|
|
||||||
armv7-unknown-linux-gnueabihf = "346558d14050853b87049e5e1fbfae0bf0360a2f7c57433c6985b1a879c349a2";
|
|
||||||
aarch64-unknown-linux-gnu = "9b6fbcee73070332c811c0ddff399fa31965bec62ef258656c0c90354f6231c1";
|
|
||||||
i686-apple-darwin = "752e2c9182e057c4a54152d1e0b3949482c225d02bb69d9d9a4127dc2a65fb68";
|
|
||||||
x86_64-apple-darwin = "5d7a70ed4701fe9410041c1eea025c95cad97e5b3d8acc46426f9ac4f9f02393";
|
|
||||||
};
|
|
||||||
|
|
||||||
platform =
|
|
||||||
if stdenv.hostPlatform.system == "i686-linux"
|
|
||||||
then "i686-unknown-linux-gnu"
|
|
||||||
else if stdenv.hostPlatform.system == "x86_64-linux"
|
|
||||||
then "x86_64-unknown-linux-gnu"
|
|
||||||
else if stdenv.hostPlatform.system == "armv7l-linux"
|
|
||||||
then "armv7-unknown-linux-gnueabihf"
|
|
||||||
else if stdenv.hostPlatform.system == "aarch64-linux"
|
|
||||||
then "aarch64-unknown-linux-gnu"
|
|
||||||
else if stdenv.hostPlatform.system == "i686-darwin"
|
|
||||||
then "i686-apple-darwin"
|
|
||||||
else if stdenv.hostPlatform.system == "x86_64-darwin"
|
|
||||||
then "x86_64-apple-darwin"
|
|
||||||
else throw "missing bootstrap url for platform ${stdenv.hostPlatform.system}";
|
|
||||||
|
|
||||||
src = fetchurl {
|
|
||||||
url = "https://static.rust-lang.org/dist/rust-${version}-${platform}.tar.gz";
|
|
||||||
sha256 = hashes."${platform}";
|
|
||||||
};
|
|
||||||
|
|
||||||
in callPackage ./binaryBuild.nix
|
|
||||||
{ inherit version src platform;
|
|
||||||
buildRustPackage = null;
|
|
||||||
versionType = "bootstrap";
|
|
||||||
}
|
|
|
@ -1,88 +0,0 @@
|
||||||
{ stdenv, callPackage, recurseIntoAttrs, makeRustPlatform, llvm, fetchurl
|
|
||||||
, targets ? []
|
|
||||||
, targetToolchains ? []
|
|
||||||
, targetPatches ? []
|
|
||||||
, fetchFromGitHub
|
|
||||||
}:
|
|
||||||
|
|
||||||
let
|
|
||||||
rustPlatform = recurseIntoAttrs (makeRustPlatform (callPackage ./bootstrap.nix {}));
|
|
||||||
version = "1.28.0";
|
|
||||||
src = fetchFromGitHub {
|
|
||||||
owner = "m-labs";
|
|
||||||
repo = "rust";
|
|
||||||
sha256 = "03lfps3xvvv7wv1nnwn3n1ji13z099vx8c3fpbzp9rnasrwzp5jy";
|
|
||||||
rev = "f305fb024318e96997fbe6e4a105b0cc1052aad4"; # artiq-1.28.0 branch
|
|
||||||
fetchSubmodules = true;
|
|
||||||
};
|
|
||||||
in rec {
|
|
||||||
# nixcloud team code
|
|
||||||
or1k-crates = stdenv.mkDerivation {
|
|
||||||
name = "or1k-crates";
|
|
||||||
inherit src;
|
|
||||||
phases = [ "unpackPhase" "buildPhase" ];
|
|
||||||
buildPhase = ''
|
|
||||||
destdir=$out
|
|
||||||
rustc="${rustc_internal}/bin/rustc --out-dir ''${destdir} -L ''${destdir} --target or1k-unknown-none -g -C target-feature=+mul,+div,+ffl1,+cmov,+addc -C opt-level=s --crate-type rlib"
|
|
||||||
|
|
||||||
mkdir -p ''${destdir}
|
|
||||||
''${rustc} --crate-name core src/libcore/lib.rs
|
|
||||||
''${rustc} --crate-name compiler_builtins src/libcompiler_builtins/src/lib.rs --cfg 'feature="compiler-builtins"' --cfg 'feature="mem"'
|
|
||||||
''${rustc} --crate-name std_unicode src/libstd_unicode/lib.rs
|
|
||||||
''${rustc} --crate-name alloc src/liballoc/lib.rs
|
|
||||||
''${rustc} --crate-name libc src/liblibc_mini/lib.rs
|
|
||||||
''${rustc} --crate-name unwind src/libunwind/lib.rs
|
|
||||||
''${rustc} -Cpanic=abort --crate-name panic_abort src/libpanic_abort/lib.rs
|
|
||||||
''${rustc} -Cpanic=unwind --crate-name panic_unwind src/libpanic_unwind/lib.rs --cfg llvm_libunwind
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
# nixcloud team code
|
|
||||||
# this is basically a wrapper, which uses rustc_internal and inserts or1k-crates into it
|
|
||||||
rustc = stdenv.mkDerivation {
|
|
||||||
name = "rustc";
|
|
||||||
src = ./.;
|
|
||||||
installPhase = ''
|
|
||||||
mkdir $out
|
|
||||||
mkdir -p $out/lib/rustlib/or1k-unknown-none/lib/
|
|
||||||
cp -r ${or1k-crates}/* $out/lib/rustlib/or1k-unknown-none/lib/
|
|
||||||
cp -r ${rustc_internal}/* $out
|
|
||||||
'';
|
|
||||||
meta = with stdenv.lib; {
|
|
||||||
homepage = https://www.rust-lang.org/;
|
|
||||||
description = "A safe, concurrent, practical language";
|
|
||||||
#maintainers = with maintainers; [ sb0 ];
|
|
||||||
license = [ licenses.mit licenses.asl20 ];
|
|
||||||
platforms = platforms.linux ++ platforms.darwin;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
# nixcloud team code
|
|
||||||
# originally rustc but now renamed to rustc_internal
|
|
||||||
rustc_internal = callPackage ./rustc.nix {
|
|
||||||
inherit stdenv llvm targets targetPatches targetToolchains rustPlatform version src;
|
|
||||||
|
|
||||||
patches = [
|
|
||||||
./patches/net-tcp-disable-tests.patch
|
|
||||||
|
|
||||||
# Re-evaluate if this we need to disable this one
|
|
||||||
#./patches/stdsimd-disable-doctest.patch
|
|
||||||
|
|
||||||
# Fails on hydra - not locally; the exact reason is unknown.
|
|
||||||
# Comments in the test suggest that some non-reproducible environment
|
|
||||||
# variables such $RANDOM can make it fail.
|
|
||||||
./patches/disable-test-inherit-env.patch
|
|
||||||
];
|
|
||||||
|
|
||||||
forceBundledLLVM = true;
|
|
||||||
|
|
||||||
#configureFlags = [ "--release-channel=stable" ];
|
|
||||||
|
|
||||||
# 1. Upstream is not running tests on aarch64:
|
|
||||||
# see https://github.com/rust-lang/rust/issues/49807#issuecomment-380860567
|
|
||||||
# So we do the same.
|
|
||||||
# 2. Tests run out of memory for i686
|
|
||||||
#doCheck = !stdenv.isAarch64 && !stdenv.isi686;
|
|
||||||
|
|
||||||
# Disabled for now; see https://github.com/NixOS/nixpkgs/pull/42348#issuecomment-402115598.
|
|
||||||
doCheck = false;
|
|
||||||
};
|
|
||||||
}
|
|
|
@ -1,10 +0,0 @@
|
||||||
--- rustc-1.26.2-src.org/src/libstd/process.rs 2018-06-01 21:40:11.000000000 +0100
|
|
||||||
+++ rustc-1.26.2-src/src/libstd/process.rs 2018-06-08 07:50:23.023828658 +0100
|
|
||||||
@@ -1745,6 +1745,7 @@
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
+ #[ignore]
|
|
||||||
fn test_inherit_env() {
|
|
||||||
use env;
|
|
||||||
|
|
|
@ -1,104 +0,0 @@
|
||||||
diff --git a/src/libstd/net/tcp.rs b/src/libstd/net/tcp.rs
|
|
||||||
index 0f60b5b3e..9b08415e7 100644
|
|
||||||
--- a/src/libstd/net/tcp.rs
|
|
||||||
+++ b/src/libstd/net/tcp.rs
|
|
||||||
@@ -962,6 +962,7 @@ mod tests {
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
+ #[cfg_attr(target_os = "macos", ignore)]
|
|
||||||
#[test]
|
|
||||||
fn listen_localhost() {
|
|
||||||
let socket_addr = next_test_ip4();
|
|
||||||
@@ -1020,6 +1021,7 @@ mod tests {
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
+ #[cfg_attr(target_os = "macos", ignore)]
|
|
||||||
#[test]
|
|
||||||
fn read_eof() {
|
|
||||||
each_ip(&mut |addr| {
|
|
||||||
@@ -1039,6 +1041,7 @@ mod tests {
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
+ #[cfg_attr(target_os = "macos", ignore)]
|
|
||||||
#[test]
|
|
||||||
fn write_close() {
|
|
||||||
each_ip(&mut |addr| {
|
|
||||||
@@ -1065,6 +1068,7 @@ mod tests {
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
+ #[cfg_attr(target_os = "macos", ignore)]
|
|
||||||
#[test]
|
|
||||||
fn multiple_connect_serial() {
|
|
||||||
each_ip(&mut |addr| {
|
|
||||||
@@ -1087,6 +1091,7 @@ mod tests {
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
+ #[cfg_attr(target_os = "macos", ignore)]
|
|
||||||
#[test]
|
|
||||||
fn multiple_connect_interleaved_greedy_schedule() {
|
|
||||||
const MAX: usize = 10;
|
|
||||||
@@ -1123,6 +1128,7 @@ mod tests {
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
+ #[cfg_attr(target_os = "macos", ignore)]
|
|
||||||
fn multiple_connect_interleaved_lazy_schedule() {
|
|
||||||
const MAX: usize = 10;
|
|
||||||
each_ip(&mut |addr| {
|
|
||||||
@@ -1401,6 +1407,7 @@ mod tests {
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
+ #[cfg_attr(target_os = "macos", ignore)]
|
|
||||||
fn clone_while_reading() {
|
|
||||||
each_ip(&mut |addr| {
|
|
||||||
let accept = t!(TcpListener::bind(&addr));
|
|
||||||
@@ -1421,7 +1422,10 @@ mod tests {
|
|
||||||
|
|
||||||
// FIXME: re-enabled bitrig/openbsd tests once their socket timeout code
|
|
||||||
// no longer has rounding errors.
|
|
||||||
- #[cfg_attr(any(target_os = "bitrig", target_os = "netbsd", target_os = "openbsd"), ignore)]
|
|
||||||
+ #[cfg_attr(any(target_os = "bitrig",
|
|
||||||
+ target_os = "netbsd",
|
|
||||||
+ target_os = "openbsd",
|
|
||||||
+ target_os = "macos"), ignore)]
|
|
||||||
#[test]
|
|
||||||
fn timeouts() {
|
|
||||||
let addr = next_test_ip4();
|
|
||||||
@@ -1596,6 +1603,7 @@ mod tests {
|
|
||||||
drop(listener);
|
|
||||||
}
|
|
||||||
|
|
||||||
+ #[cfg_attr(target_os = "macos", ignore)]
|
|
||||||
#[test]
|
|
||||||
fn nodelay() {
|
|
||||||
let addr = next_test_ip4();
|
|
||||||
@@ -1610,6 +1618,7 @@ mod tests {
|
|
||||||
assert_eq!(false, t!(stream.nodelay()));
|
|
||||||
}
|
|
||||||
|
|
||||||
+ #[cfg_attr(target_os = "macos", ignore)]
|
|
||||||
#[test]
|
|
||||||
fn ttl() {
|
|
||||||
let ttl = 100;
|
|
||||||
@@ -1647,6 +1656,7 @@ mod tests {
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
+ #[cfg_attr(target_os = "macos", ignore)]
|
|
||||||
#[test]
|
|
||||||
fn peek() {
|
|
||||||
each_ip(&mut |addr| {
|
|
||||||
@@ -1679,6 +1689,7 @@ mod tests {
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test]
|
|
||||||
+ #[cfg_attr(any(target_os = "linux", target_os = "macos"), ignore)]
|
|
||||||
fn connect_timeout_unroutable() {
|
|
||||||
// this IP is unroutable, so connections should always time out,
|
|
||||||
// provided the network is reachable to begin with.
|
|
|
@ -1,20 +0,0 @@
|
||||||
diff --git a/src/stdsimd/coresimd/x86/mod.rs b/src/stdsimd/coresimd/x86/mod.rs
|
|
||||||
index 32915c332..7cb54f31e 100644
|
|
||||||
--- a/src/stdsimd/coresimd/x86/mod.rs
|
|
||||||
+++ b/src/stdsimd/coresimd/x86/mod.rs
|
|
||||||
@@ -279,7 +279,6 @@ types! {
|
|
||||||
///
|
|
||||||
/// # Examples
|
|
||||||
///
|
|
||||||
- /// ```
|
|
||||||
/// # #![feature(cfg_target_feature, target_feature, stdsimd)]
|
|
||||||
/// # #![cfg_attr(not(dox), no_std)]
|
|
||||||
/// # #[cfg(not(dox))]
|
|
||||||
@@ -301,7 +300,6 @@ types! {
|
|
||||||
/// # }
|
|
||||||
/// # if is_x86_feature_detected!("sse") { unsafe { foo() } }
|
|
||||||
/// # }
|
|
||||||
- /// ```
|
|
||||||
pub struct __m256(f32, f32, f32, f32, f32, f32, f32, f32);
|
|
||||||
|
|
||||||
/// 256-bit wide set of four `f64` types, x86-specific
|
|
|
@ -1,38 +0,0 @@
|
||||||
#!/usr/bin/env bash
|
|
||||||
set -euo pipefail
|
|
||||||
|
|
||||||
# All rust-related downloads can be found at
|
|
||||||
# https://static.rust-lang.org/dist/index.html. To find the date on
|
|
||||||
# which a particular thing was last updated, look for the *-date.txt
|
|
||||||
# file, e.g.
|
|
||||||
# https://static.rust-lang.org/dist/channel-rust-beta-date.txt
|
|
||||||
|
|
||||||
PLATFORMS=(
|
|
||||||
i686-unknown-linux-gnu
|
|
||||||
x86_64-unknown-linux-gnu
|
|
||||||
armv7-unknown-linux-gnueabihf
|
|
||||||
aarch64-unknown-linux-gnu
|
|
||||||
i686-apple-darwin
|
|
||||||
x86_64-apple-darwin
|
|
||||||
)
|
|
||||||
BASEURL=https://static.rust-lang.org/dist
|
|
||||||
VERSION=${1:-}
|
|
||||||
DATE=${2:-}
|
|
||||||
|
|
||||||
if [[ -z $VERSION ]]
|
|
||||||
then
|
|
||||||
echo "No version supplied"
|
|
||||||
exit -1
|
|
||||||
fi
|
|
||||||
|
|
||||||
if [[ -n $DATE ]]
|
|
||||||
then
|
|
||||||
BASEURL=$BASEURL/$DATE
|
|
||||||
fi
|
|
||||||
|
|
||||||
for PLATFORM in "${PLATFORMS[@]}"
|
|
||||||
do
|
|
||||||
URL="$BASEURL/rust-$VERSION-$PLATFORM.tar.gz.sha256"
|
|
||||||
SHA256=$(curl -sSfL $URL | cut -d ' ' -f 1)
|
|
||||||
echo "$PLATFORM = \"$SHA256\";"
|
|
||||||
done
|
|
|
@ -1,11 +0,0 @@
|
||||||
{ stdenv, rustc }:
|
|
||||||
|
|
||||||
stdenv.mkDerivation {
|
|
||||||
name = "rust-src";
|
|
||||||
src = rustc.src;
|
|
||||||
phases = [ "unpackPhase" "installPhase" ];
|
|
||||||
installPhase = ''
|
|
||||||
mv src $out
|
|
||||||
rm -rf $out/{ci,doc,driver,etc,grammar,llvm,rt,rtstartup,rustllvm,test,tools,vendor}
|
|
||||||
'';
|
|
||||||
}
|
|
|
@ -1,199 +0,0 @@
|
||||||
{ stdenv, targetPackages
|
|
||||||
, fetchurl, fetchgit, fetchzip, file, python2, tzdata, ps
|
|
||||||
, llvm, jemalloc, ncurses, darwin, rustPlatform, git, cmake, curl
|
|
||||||
, which, libffi, gdb
|
|
||||||
, version
|
|
||||||
, forceBundledLLVM ? false
|
|
||||||
, src
|
|
||||||
, configureFlags ? []
|
|
||||||
, patches
|
|
||||||
, targets
|
|
||||||
, targetPatches
|
|
||||||
, targetToolchains
|
|
||||||
, doCheck ? true
|
|
||||||
, broken ? false
|
|
||||||
, pkgs
|
|
||||||
}:
|
|
||||||
|
|
||||||
let
|
|
||||||
inherit (stdenv.lib) optional optionalString;
|
|
||||||
inherit (darwin.apple_sdk.frameworks) Security;
|
|
||||||
|
|
||||||
llvmShared = llvm.override { enableSharedLibraries = true; };
|
|
||||||
llvmOR1k = (import ../../default.nix {}).llvm-or1k;
|
|
||||||
|
|
||||||
target = builtins.replaceStrings [" "] [","] (builtins.toString targets);
|
|
||||||
src_rustc = fetchurl {
|
|
||||||
url = "https://static.rust-lang.org/dist/rustc-1.28.0-src.tar.gz";
|
|
||||||
sha256 = "11k4rn77bca2rikykkk9fmprrgjswd4x4kaq7fia08vgkir82nhx";
|
|
||||||
};
|
|
||||||
|
|
||||||
in
|
|
||||||
|
|
||||||
stdenv.mkDerivation {
|
|
||||||
name = "rustc-${version}";
|
|
||||||
inherit version;
|
|
||||||
|
|
||||||
inherit src;
|
|
||||||
|
|
||||||
__darwinAllowLocalNetworking = true;
|
|
||||||
|
|
||||||
# rustc complains about modified source files otherwise
|
|
||||||
dontUpdateAutotoolsGnuConfigScripts = true;
|
|
||||||
|
|
||||||
# Running the default `strip -S` command on Darwin corrupts the
|
|
||||||
# .rlib files in "lib/".
|
|
||||||
#
|
|
||||||
# See https://github.com/NixOS/nixpkgs/pull/34227
|
|
||||||
stripDebugList = if stdenv.isDarwin then [ "bin" ] else null;
|
|
||||||
|
|
||||||
NIX_LDFLAGS = optionalString stdenv.isDarwin "-rpath ${llvmShared}/lib";
|
|
||||||
|
|
||||||
# Enable nightly features in stable compiles (used for
|
|
||||||
# bootstrapping, see https://github.com/rust-lang/rust/pull/37265).
|
|
||||||
# This loosens the hard restrictions on bootstrapping-compiler
|
|
||||||
# versions.
|
|
||||||
RUSTC_BOOTSTRAP = "1";
|
|
||||||
|
|
||||||
# Increase codegen units to introduce parallelism within the compiler.
|
|
||||||
RUSTFLAGS = "-Ccodegen-units=10";
|
|
||||||
|
|
||||||
# We need rust to build rust. If we don't provide it, configure will try to download it.
|
|
||||||
# Reference: https://github.com/rust-lang/rust/blob/master/src/bootstrap/configure.py
|
|
||||||
configureFlags = configureFlags
|
|
||||||
++ [ "--enable-local-rust" "--local-rust-root=${rustPlatform.rust.rustc}" "--enable-rpath" ]
|
|
||||||
++ [ "--enable-vendor" ]
|
|
||||||
# ++ [ "--jemalloc-root=${jemalloc}/lib"
|
|
||||||
++ [ "--default-linker=${targetPackages.stdenv.cc}/bin/cc" ]
|
|
||||||
++ optional (!forceBundledLLVM) [ "--enable-llvm-link-shared" ]
|
|
||||||
++ optional (targets != []) "--target=${target}"
|
|
||||||
#++ optional (!forceBundledLLVM) "--llvm-root=${llvmShared}"
|
|
||||||
++ [ "--llvm-root=${llvmOR1k}" ] ;
|
|
||||||
|
|
||||||
# The bootstrap.py will generated a Makefile that then executes the build.
|
|
||||||
# The BOOTSTRAP_ARGS used by this Makefile must include all flags to pass
|
|
||||||
# to the bootstrap builder.
|
|
||||||
postConfigure = ''
|
|
||||||
substituteInPlace Makefile --replace 'BOOTSTRAP_ARGS :=' 'BOOTSTRAP_ARGS := --jobs $(NIX_BUILD_CORES)'
|
|
||||||
'';
|
|
||||||
|
|
||||||
# FIXME: qknight, readd deleted vendor folder from 1.28 rustc
|
|
||||||
preConfigure = ''
|
|
||||||
export HOME=$out
|
|
||||||
# HACK: we add the vendor folder from rustc 1.28 to make the compiling work
|
|
||||||
tar xf ${src_rustc}
|
|
||||||
mv rustc-1.28.0-src/src/vendor/ src/vendor
|
|
||||||
cp -R ${llvmOR1k} src/llvm
|
|
||||||
'';
|
|
||||||
|
|
||||||
patches = patches ++ targetPatches;
|
|
||||||
|
|
||||||
# the rust build system complains that nix alters the checksums
|
|
||||||
dontFixLibtool = true;
|
|
||||||
|
|
||||||
passthru.target = target;
|
|
||||||
|
|
||||||
postPatch = ''
|
|
||||||
patchShebangs src/etc
|
|
||||||
|
|
||||||
# Fix dynamic linking against llvm
|
|
||||||
#${optionalString (!forceBundledLLVM) ''sed -i 's/, kind = \\"static\\"//g' src/etc/mklldeps.py''}
|
|
||||||
|
|
||||||
# Fix the configure script to not require curl as we won't use it
|
|
||||||
sed -i configure \
|
|
||||||
-e '/probe_need CFG_CURL curl/d'
|
|
||||||
|
|
||||||
# Fix the use of jemalloc prefixes which our jemalloc doesn't have
|
|
||||||
# TODO: reenable if we can figure out how to get our jemalloc to work
|
|
||||||
#[ -f src/liballoc_jemalloc/lib.rs ] && sed -i 's,je_,,g' src/liballoc_jemalloc/lib.rs
|
|
||||||
#[ -f src/liballoc/heap.rs ] && sed -i 's,je_,,g' src/liballoc/heap.rs # Remove for 1.4.0+
|
|
||||||
|
|
||||||
# Disable fragile tests.
|
|
||||||
rm -vr src/test/run-make/linker-output-non-utf8 || true
|
|
||||||
rm -vr src/test/run-make/issue-26092 || true
|
|
||||||
|
|
||||||
# Remove test targeted at LLVM 3.9 - https://github.com/rust-lang/rust/issues/36835
|
|
||||||
rm -vr src/test/run-pass/issue-36023.rs || true
|
|
||||||
|
|
||||||
# Disable test getting stuck on hydra - possible fix:
|
|
||||||
# https://reviews.llvm.org/rL281650
|
|
||||||
rm -vr src/test/run-pass/issue-36474.rs || true
|
|
||||||
|
|
||||||
# On Hydra: `TcpListener::bind(&addr)`: Address already in use (os error 98)'
|
|
||||||
sed '/^ *fn fast_rebind()/i#[ignore]' -i src/libstd/net/tcp.rs
|
|
||||||
|
|
||||||
# https://github.com/rust-lang/rust/issues/39522
|
|
||||||
echo removing gdb-version-sensitive tests...
|
|
||||||
find src/test/debuginfo -type f -execdir grep -q ignore-gdb-version '{}' \; -print -delete
|
|
||||||
rm src/test/debuginfo/{borrowed-c-style-enum.rs,c-style-enum-in-composite.rs,gdb-pretty-struct-and-enums-pre-gdb-7-7.rs,generic-enum-with-different-disr-sizes.rs}
|
|
||||||
|
|
||||||
# Useful debugging parameter
|
|
||||||
# export VERBOSE=1
|
|
||||||
'' + optionalString stdenv.isDarwin ''
|
|
||||||
# Disable all lldb tests.
|
|
||||||
# error: Can't run LLDB test because LLDB's python path is not set
|
|
||||||
rm -vr src/test/debuginfo/*
|
|
||||||
rm -v src/test/run-pass/backtrace-debuginfo.rs
|
|
||||||
|
|
||||||
# error: No such file or directory
|
|
||||||
rm -v src/test/run-pass/issue-45731.rs
|
|
||||||
|
|
||||||
# Disable tests that fail when sandboxing is enabled.
|
|
||||||
substituteInPlace src/libstd/sys/unix/ext/net.rs \
|
|
||||||
--replace '#[test]' '#[test] #[ignore]'
|
|
||||||
substituteInPlace src/test/run-pass/env-home-dir.rs \
|
|
||||||
--replace 'home_dir().is_some()' true
|
|
||||||
rm -v src/test/run-pass/fds-are-cloexec.rs # FIXME: pipes?
|
|
||||||
rm -v src/test/run-pass/sync-send-in-std.rs # FIXME: ???
|
|
||||||
'';
|
|
||||||
|
|
||||||
# rustc unfortunately need cmake for compiling llvm-rt but doesn't
|
|
||||||
# use it for the normal build. This disables cmake in Nix.
|
|
||||||
dontUseCmakeConfigure = true;
|
|
||||||
|
|
||||||
# ps is needed for one of the test cases
|
|
||||||
nativeBuildInputs =
|
|
||||||
[ file python2 ps rustPlatform.rust.rustc git cmake
|
|
||||||
which libffi
|
|
||||||
]
|
|
||||||
# Only needed for the debuginfo tests
|
|
||||||
++ optional (!stdenv.isDarwin) gdb;
|
|
||||||
|
|
||||||
buildInputs = [ ncurses pkgs.zlib ] ++ targetToolchains
|
|
||||||
++ optional stdenv.isDarwin Security
|
|
||||||
++ optional (!forceBundledLLVM) llvmShared;
|
|
||||||
|
|
||||||
outputs = [ "out" "man" "doc" ];
|
|
||||||
setOutputFlags = false;
|
|
||||||
|
|
||||||
# Disable codegen units and hardening for the tests.
|
|
||||||
preCheck = ''
|
|
||||||
export RUSTFLAGS=
|
|
||||||
export TZDIR=${tzdata}/share/zoneinfo
|
|
||||||
export hardeningDisable=all
|
|
||||||
'' +
|
|
||||||
# Ensure TMPDIR is set, and disable a test that removing the HOME
|
|
||||||
# variable from the environment falls back to another home
|
|
||||||
# directory.
|
|
||||||
optionalString stdenv.isDarwin ''
|
|
||||||
export TMPDIR=/tmp
|
|
||||||
sed -i '28s/home_dir().is_some()/true/' ./src/test/run-pass/env-home-dir.rs
|
|
||||||
'';
|
|
||||||
|
|
||||||
inherit doCheck;
|
|
||||||
|
|
||||||
configurePlatforms = [];
|
|
||||||
|
|
||||||
# https://github.com/NixOS/nixpkgs/pull/21742#issuecomment-272305764
|
|
||||||
# https://github.com/rust-lang/rust/issues/30181
|
|
||||||
# enableParallelBuilding = false;
|
|
||||||
|
|
||||||
meta = with stdenv.lib; {
|
|
||||||
homepage = https://www.rust-lang.org/;
|
|
||||||
description = "A safe, concurrent, practical language";
|
|
||||||
#maintainers = with maintainers; [ sb0 ];
|
|
||||||
license = [ licenses.mit licenses.asl20 ];
|
|
||||||
platforms = platforms.linux ++ platforms.darwin;
|
|
||||||
broken = broken;
|
|
||||||
};
|
|
||||||
}
|
|
|
@ -1,46 +0,0 @@
|
||||||
{ pkgs ? import <nixpkgs> {}}:
|
|
||||||
let
|
|
||||||
artiqPkgs = import ./default.nix { inherit pkgs; };
|
|
||||||
|
|
||||||
boards = [
|
|
||||||
{
|
|
||||||
target = "kasli";
|
|
||||||
variant = "tester";
|
|
||||||
}
|
|
||||||
{
|
|
||||||
target = "kc705";
|
|
||||||
variant = "nist_clock";
|
|
||||||
}
|
|
||||||
];
|
|
||||||
boardJobs = pkgs.lib.lists.foldr (board: start:
|
|
||||||
let
|
|
||||||
boardBinaries = import ./artiq-board.nix { inherit pkgs; } {
|
|
||||||
target = board.target;
|
|
||||||
variant = board.variant;
|
|
||||||
};
|
|
||||||
in
|
|
||||||
start // {
|
|
||||||
"artiq-board-${board.target}-${board.variant}" = boardBinaries;
|
|
||||||
"conda-artiq-board-${board.target}-${board.variant}" = import ./conda-board.nix { inherit pkgs; } {
|
|
||||||
artiqSrc = ../.;
|
|
||||||
boardBinaries = boardBinaries;
|
|
||||||
target = board.target;
|
|
||||||
variant = board.variant;
|
|
||||||
};
|
|
||||||
}) {} boards;
|
|
||||||
|
|
||||||
jobs = {
|
|
||||||
conda-artiq = import ./conda-build.nix { inherit pkgs; } {
|
|
||||||
name = "conda-artiq";
|
|
||||||
src = ../.;
|
|
||||||
recipe = "conda/artiq";
|
|
||||||
};
|
|
||||||
} // boardJobs // artiqPkgs;
|
|
||||||
in
|
|
||||||
jobs // {
|
|
||||||
channel = pkgs.releaseTools.channel {
|
|
||||||
name = "main";
|
|
||||||
src = ./.;
|
|
||||||
constituents = builtins.attrValues jobs;
|
|
||||||
};
|
|
||||||
}
|
|
|
@ -1,6 +0,0 @@
|
||||||
{ pkgs ? import <nixpkgs> {}}:
|
|
||||||
|
|
||||||
let
|
|
||||||
artiq-dev = import ./artiq-dev.nix { inherit pkgs; };
|
|
||||||
in
|
|
||||||
artiq-dev.env
|
|
|
@ -1,7 +0,0 @@
|
||||||
let
|
|
||||||
pkgs = import <nixpkgs> {};
|
|
||||||
artiqpkgs = import ./default.nix { inherit pkgs; };
|
|
||||||
in
|
|
||||||
pkgs.mkShell {
|
|
||||||
buildInputs = with artiqpkgs; [ binutils-or1k llvm-or1k llvmlite artiq ];
|
|
||||||
}
|
|
Loading…
Reference in New Issue