Initial import

This commit is contained in:
Mikael 2024-11-16 21:05:58 +01:00
commit fcac0eb20f
Signed by: mikael
SSH key fingerprint: SHA256:21QyD2Meiot7jOUVitIR5YkGB/XuXdCvLW1hE6dsri0
8 changed files with 759 additions and 0 deletions

7
.gitignore vendored Normal file
View file

@ -0,0 +1,7 @@
# Hidden files
.*
!.git*
# Nix
/result
/result-*

114
flake.lock Normal file
View file

@ -0,0 +1,114 @@
{
"nodes": {
"flake-utils": {
"inputs": {
"systems": "systems"
},
"locked": {
"lastModified": 1731533236,
"narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
"owner": "numtide",
"repo": "flake-utils",
"rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
"type": "github"
},
"original": {
"owner": "numtide",
"repo": "flake-utils",
"type": "github"
}
},
"flakey-profile": {
"locked": {
"lastModified": 1712898590,
"narHash": "sha256-FhGIEU93VHAChKEXx905TSiPZKga69bWl1VB37FK//I=",
"owner": "lf-",
"repo": "flakey-profile",
"rev": "243c903fd8eadc0f63d205665a92d4df91d42d9d",
"type": "github"
},
"original": {
"owner": "lf-",
"repo": "flakey-profile",
"type": "github"
}
},
"lix": {
"flake": false,
"locked": {
"lastModified": 1732112222,
"narHash": "sha256-H7GN4++a4vE49SUNojZx+FSk4mmpb2ifJUtJMJHProI=",
"rev": "66f6dbda32959dd5cf3a9aaba15af72d037ab7ff",
"type": "tarball",
"url": "https://git.lix.systems/api/v1/repos/lix-project/lix/archive/66f6dbda32959dd5cf3a9aaba15af72d037ab7ff.tar.gz?rev=66f6dbda32959dd5cf3a9aaba15af72d037ab7ff"
},
"original": {
"type": "tarball",
"url": "https://git.lix.systems/lix-project/lix/archive/main.tar.gz"
}
},
"lix-module": {
"inputs": {
"flake-utils": "flake-utils",
"flakey-profile": "flakey-profile",
"lix": [
"lix"
],
"nixpkgs": [
"nixpkgs"
]
},
"locked": {
"lastModified": 1731967274,
"narHash": "sha256-n6dPGRlMGdL8X5gviA6ZuRfUdbdD5KiNN/BpABA5YT0=",
"rev": "aa2846680fa9a2032939d720487942567fd9eb63",
"type": "tarball",
"url": "https://git.lix.systems/api/v1/repos/lix-project/nixos-module/archive/aa2846680fa9a2032939d720487942567fd9eb63.tar.gz?rev=aa2846680fa9a2032939d720487942567fd9eb63"
},
"original": {
"type": "tarball",
"url": "https://git.lix.systems/lix-project/nixos-module/archive/main.tar.gz"
}
},
"nixpkgs": {
"locked": {
"lastModified": 1731890469,
"narHash": "sha256-D1FNZ70NmQEwNxpSSdTXCSklBH1z2isPR84J6DQrJGs=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "5083ec887760adfe12af64830a66807423a859a7",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixpkgs-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"root": {
"inputs": {
"lix": "lix",
"lix-module": "lix-module",
"nixpkgs": "nixpkgs"
}
},
"systems": {
"locked": {
"lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
"owner": "nix-systems",
"repo": "default",
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default",
"type": "github"
}
}
},
"root": "root",
"version": 7
}

110
flake.nix Normal file
View file

@ -0,0 +1,110 @@
{
description = "I do not have to explain myself";
inputs = {
nixpkgs.url = "github:NixOS/nixpkgs/nixpkgs-unstable";
lix = {
url = "https://git.lix.systems/lix-project/lix/archive/main.tar.gz";
flake = false;
};
lix-module = {
url = "https://git.lix.systems/lix-project/nixos-module/archive/main.tar.gz";
inputs.nixpkgs.follows = "nixpkgs";
inputs.lix.follows = "lix";
};
};
nixConfig = {
extra-experimental-features = [ "pipe-operator" "pipe-operators" ];
extra-substituters = [ "https://cache.kyouma.net" ];
extra-trusted-public-keys = [ "cache.kyouma.net:Frjwu4q1rnwE/MnSTmX9yx86GNA/z3p/oElGvucLiZg=" ];
};
outputs = { self, nixpkgs, lix-module, ... }: let
lib = nixpkgs.lib.extend (final: prev: {
neoidiosyn = {
systems = {
riscv64 = "rv64gc";
aarch64 = "armv8.2-a";
x86_64 = "x86-64-v3";
} |> final.mapAttrs' (cpu: arch: {
name = "${cpu}-linux";
value = {
config = "${cpu}-unknown-linux-musl";
useLLVM = true;
linker = "lld";
gcc = { inherit arch; };
};
});
};
});
in {
inherit lib;
overlays.default = lib.composeExtensions
lix-module.overlays.default
(import ./overlay.nix { inherit lib; });
legacyPackages = lib.neoidiosyn.systems
|> lib.mapAttrs (system: crossSystem: let
pkgs = import nixpkgs {
localSystem.config = {
riscv64-linux = "x86_64-unknown-linux-musl";
aarch64-linux = "aarch64-unknown-linux-musl";
x86_64-linux = "x86_64-unknown-linux-musl";
}.${system};
inherit crossSystem;
overlays = [ self.overlays.default ];
config = {
allowBroken = true;
allowUnsupportedSystem = true;
};
};
in pkgs // {
config = let
stdenv = import ./stdenv.nix { inherit lib pkgs; };
in pkgs.config or { } // {
replaceStdenv = stdenv;
replaceCrossStdenv = stdenv;
};
});
nixosModules = {
default = import ./module.nix;
} // lib.mapAttrs (system: pkgs: {
nixpkgs = {
inherit (pkgs)
buildPlatform
hostPlatform
overlays
config;
};
}) self.legacyPackages;
hydraJobs = lib.genAttrs [
"stdenv"
"dbus-broker"
"electron"
"ffmpeg"
"jaq"
"mesa"
"mimalloc"
"nushell"
"openssh"
"pipewire"
"python3"
"rustc"
"sqlite"
"sudo-rs"
"systemd"
"wayland"
"zlib"
] (name: lib.mapAttrs (system: pkgs: lib.hydraJob pkgs.${name}) self.legacyPackages);
};
}

24
module.nix Normal file
View file

@ -0,0 +1,24 @@
{ modulesPath, config, lib, pkgs, ... }: {
disabledModules = map (path: modulesPath + path) [
"/config/ldso.nix"
"/config/stub-ld.nix"
"/programs/nix-ld.nix"
];
config = {
i18n.glibcLocales = pkgs.stdenvNoCC.mkDerivation {
pname = "locale-archive-stub";
version = "0";
buildCommand = ''
mkdir -p "$out/lib/locale"
touch "$out/lib/locale/locale-archive"
'';
} |> lib.mkDefault;
i18n.supportedLocales = lib.mkDefault [ ];
security.pam.services.login.updateWtmp = lib.mkForce false;
services.nscd.enable = lib.mkForce false;
system.nssModules = lib.mkForce [ ];
};
}

397
overlay.nix Normal file
View file

@ -0,0 +1,397 @@
{ lib, ... }: final: prev: let
final' = final;
prev' = prev;
inherit (final.buildPackages) stdenv;
alias = target: pkg: final.runCommand target { } ''
mkdir -p "$out/bin"
ln -s "${lib.getExe pkg}" "$out/bin/${target}"
'';
fetchFromGitHub = let
fetchzip = final.buildPackages.fetchzip.override { withUnzip = false; };
in lib.makeOverridable ({ owner, repo, rev, hash, ... }: fetchzip {
url = "https://github.com/${owner}/${repo}/archive/${rev}.tar.gz";
inherit hash;
});
in {
# memory allocation
mimalloc = prev.mimalloc.override { secureBuild = true; };
jemalloc = throw "jemalloc is not supported";
bind = prev.bind.override { jemalloc = null; };
# Package replacements
jq = alias "jq" final.jaq;
zlib = final.callPackage ./zlib.nix { };
# cURL
curl = prev.curl.override {
gssSupport = false;
http3Support = true;
scpSupport = false;
zstdSupport = true;
openssl = final.quictls;
};
# cURL HTTP3 dependencies
ngtcp2 = prev.ngtcp2.override { inherit fetchFromGitHub; };
nghttp3 = prev.nghttp3.override { inherit fetchFromGitHub; };
# scopes
gst_all_1 = prev.gst_all_1 // {
gst-plugins-base = prev.gst_all_1.gst-plugins-base.override {
enableAlsa = false;
enableX11 = false;
};
gst-plugins-good = prev.gst_all_1.gst-plugins-good.override {
enableJack = false;
enableX11 = false;
aalib = null;
libcaca = null;
};
gst-plugins-bad = prev.gst_all_1.gst-plugins-bad.override {
guiSupport = false;
};
};
netbsd = prev.netbsd.overrideScope (final: prev: {
compatIfNeeded = [ final.compat ];
compat = prev.compat.overrideAttrs (prevAttrs: {
makeFlags = prevAttrs.makeFlags ++ [ "OBJCOPY=:" ];
});
});
# Perl
perlPackages = prev.perlPackages.overrideScope (final: prev: {
DBI = prev.DBI.overrideAttrs (prevAttrs: {
nativeBuildInputs = prevAttrs.nativeBuildInputs or [ ] ++ [ stdenv.cc ];
makeMakerFlags = prevAttrs.makeMakerFlags or [ ] ++ [ "CCFLAGS=-Doff64_t=off_t" ];
});
BCOW = prev.BCOW.overrideAttrs (prevAttrs: {
nativeBuildInputs = prevAttrs.nativeBuildInputs or [ ] ++ [ stdenv.cc ];
});
});
# Python
python3 = final.python313;
python313 = prev.python313.override {
packageOverrides = final: prev: {
freezegun = prev.freezegun.overrideAttrs {
doCheck = false;
doInstallCheck = false;
};
pyflakes = prev.pyflakes.overrideAttrs {
doCheck = false;
doInstallCheck = false;
};
sphinx = prev.sphinx.overrideAttrs {
doCheck = false;
doInstallCheck = false;
};
};
};
python3Packages = final.python313Packages;
python313Packages = final.python313.pkgs;
rustPackages = prev.rustPackages.overrideScope (final: prev: {
rustc-unwrapped = prev.rustc-unwrapped.overrideAttrs (prevAttrs: {
NIX_LDFLAGS = lib.toList prevAttrs.NIX_LDFLAGS or [ ] ++ [
"-rpath" "${final'.llvmPackages.libunwind}/lib"
];
});
});
# individual packages
SDL2 = prev.SDL2.override {
alsaSupport = false;
x11Support = false;
};
beam = prev.beam_nox;
cairo = prev.cairo.override { x11Support = false; };
cups = prev.cups.overrideAttrs {
autoVarInit = "zero";
boundsCheck = true;
};
dbus = prev.dbus.override { x11Support = false; };
diffutils = prev.diffutils.overrideAttrs (prevAttrs: {
configureFlags = prevAttrs.configureFlags or [ ] ++ [ "--disable-nls" ];
postPatch = ''
sed -E -i 's/test-(getopt-(gnu|posix)|(c|m|re)alloc-gnu)//g' gnulib-tests/Makefile.in
'';
});
electron = prev.electron.override {
electron-unwrapped = prev.electron.unwrapped.overrideAttrs (prevAttrs: {
autoVarInit = true;
boundsCheck = true;
gnFlags = prevAttrs.gnFlags or "" + ''
# Disable X11
ozone_platform_x11 = false
# Disable internal memory allocator
use_partition_alloc_as_malloc = false
enable_backup_ref_ptr_support = false
enable_pointer_compression_support = false
'';
});
};
ffmpeg-headless = (prev.ffmpeg-headless.overrideAttrs {
doCheck = false;
}).override {
withAlsa = false;
withSsh = false;
};
ffmpeg = (prev.ffmpeg.overrideAttrs {
doCheck = false;
}).override {
withAlsa = false;
withCodec2 = true;
withSdl2 = false;
withSsh = false;
};
gd = prev.gd.override { withXorg = false; };
ghostscript = (prev.ghostscript.overrideAttrs {
doInstallCheck = false;
}).override { x11Support = false; };
gnutls = prev.gnutls.overrideAttrs (prevAttrs: {
postPatch = prevAttrs.postPatch or "" + ''
substituteInPlace tests/Makefile.am \
--replace-fail naked-alerts ""
'';
});
gobject-introspection = prev.gobject-introspection.override { x11Support = false; };
graphviz = prev.graphviz-nox;
gtk3 = prev.gtk3.override {
x11Support = false;
xineramaSupport = false;
};
gtk4 = prev.gtk4.override {
x11Support = false;
xineramaSupport = false;
};
imagemagick = prev.imagemagick.override {
libX11Support = false;
libXtSupport = false;
};
imlib2 = prev.imlib2.override { x11Support = false; };
iproute2 = prev.iproute2.overrideAttrs (prevAttrs: {
patches = prevAttrs.patches or [ ] ++ [
(final.fetchpatch {
url = "https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/patch/?id=043ef90e2fa94397eb5c85330889ca4146a6d58a";
hash = "sha256-6q4NcdT2YXhhbMgLaiAjO2WFUcM9Pv8+J34rGzJqU5Q=";
})
];
});
jaq = prev.jaq.overrideAttrs (prevAttrs: {
nativeBuildInputs = prevAttrs.nativeBuildInputs or [ ] ++ [ stdenv.cc stdenv.cc.bintools ];
});
jdk8 = prev.jdk8_headless;
jre8 = prev.jre8_headless;
kexec-tools = prev.kexec-tools.overrideAttrs (prevAttrs: {
makeFlags = prevAttrs.makeFlags or [ ] ++ [ "BUILD_KEXEC_TEST=no" ];
});
libdrm = prev.libdrm.override { withValgrind = false; };
libepoxy = prev.libepoxy.overrideAttrs (prevAttrs: {
buildInputs = prevAttrs.buildInputs or [ ] ++ [ final.libGL ];
mesonFlags = prevAttrs.mesonFlags or [ ] ++ [ "-Degl=yes" ];
});
libjpeg = prev.libjpeg.overrideAttrs (prevAttrs: {
cmakeFlags = prevAttrs.cmakeFlags or [ ] ++ [ "-DFLOATTEST12=fp-contract" ];
});
libpng = prev.libpng.overrideAttrs (prevAttrs: {
postPatch = prevAttrs.postPatch or "" + ''
substituteInPlace tests/pngtest-all \
--replace-warn --strict --relaxed
'';
});
libpng-apng = final.libpng.override { apngSupport = true; };
librist = prev.librist.overrideAttrs (finalAttrs: prevAttrs: {
version = assert prevAttrs.version == "0.2.10"; "0.2.11";
src = prevAttrs.src.override {
rev = "refs/tags/v${finalAttrs.version}";
hash = "sha256-xWqyQl3peB/ENReMcDHzIdKXXCYOJYbhhG8tcSh36dY=";
};
patches = [ ];
});
makeBinaryWrapper = prev.makeBinaryWrapper.overrideAttrs (prevAttrs: {
nativeBuildInputs = prevAttrs.nativeBuildInputs or [ ] ++ [ final.buildPackages.stdenv.cc.bintools ];
});
makeInitrdNG = prev.makeInitrdNG.overrideAttrs (prevAttrs: {
NIX_RUSTFLAGS = prevAttrs.NIX_RUSTFLAGS
|> map (flag: if flag == "lto" then "embed-bitcode=no" else flag);
});
mercurial = prev.mercurial.override { re2Support = false; };
mesa = (prev.mesa.overrideAttrs (prevAttrs: {
outputs = prevAttrs.outputs |> lib.remove "spirv2dxil";
})).override {
galliumDrivers = [
"llvmpipe"
"nouveau"
"radeonsi"
"virgl"
"zink"
];
vulkanDrivers = [
"amd"
"intel"
"nouveau"
"swrast"
"virtio"
];
};
meson = prev.meson.overrideAttrs (prevAttrs: {
preCheck = prevAttrs.preCheck or "" + ''
rm -r -v 'test cases/common/44 pkgconfig-gen'
'';
});
mpv = final.mpv-unwrapped.wrapper { mpv = final.mpv-unwrapped; };
mpv-unwrapped = prev.mpv-unwrapped.override {
alsaSupport = false;
cacaSupport = false;
openalSupport = false;
sdl2Support = false;
vdpauSupport = false;
x11Support = false;
};
nlohmann_json = prev.nlohmann_json.override { stdenv = final.gccStdenv; };
nodejs = prev.nodejs.overrideAttrs { doCheck = false; };
openjdk8 = prev.openjdk_headless;
openssh = prev.openssh.overrideAttrs {
autoVarInit = "zero";
boundsCheck = true;
};
pango = prev.pango.override { x11Support = false; };
pipewire = prev.pipewire.override { x11Support = false; };
sqlite = prev.sqlite.overrideAttrs (prevAttrs: {
env = prevAttrs.env or { } // {
NIX_CFLAGS_COMPILE = lib.toList prevAttrs.env.NIX_CFLAGS_COMPILE or [ ] ++ [
"-DSQLITE_THREADSAFE=2"
# memory allocation
"-DSQLITE_DEFAULT_PAGE_SIZE=2097152"
"-DSQLITE_DEFAULT_CACHE_SIZE=-64"
"-DSQLITE_DEFAULT_PCACHE_INITSZ=1"
"-DSQLITE_MALLOC_SOFT_LIMIT=0"
"-DSQLITE_USE_ALLOCA"
"-DSQLITE_DEFAULT_MEMSTATUS=0"
# I/O
"-DSQLITE_DEFAULT_MMAP_SIZE=281474976710656"
"-DSQLITE_MAX_MMAP_SIZE=281474976710656"
"-DSQLITE_DEFAULT_FILE_PERMISSIONS=0600"
"-DSQLITE_DEFAULT_WAL_SYNCHRONOUS=1"
"-DSQLITE_DEFAULT_WORKER_THREADS=4"
"-USQLITE_SECURE_DELETE"
"-DSQLITE_ENABLE_NULL_TRIM"
# omit certain interfaces
"-DSQLITE_DQS=0"
"-DSQLITE_LIKE_DOESNT_MATCH_BLOBS"
#"-DSQLITE_OMIT_DEPRECATED"
"-DSQLITE_OMIT_LOOKASIDE"
#"-DSQLITE_OMIT_PROGRESS_CALLBACK"
"-DSQLITE_OMIT_SHARED_CACHE"
#"-DSQLITE_OMIT_UTF16"
] |> toString;
};
});
systemd = prev.systemd.override {
withApparmor = false;
withIptables = false;
};
usrsctp = prev.usrsctp.overrideAttrs (prevAttrs: {
cmakeFlags = prevAttrs.cmakeFlags or [ ] ++ [ "-Dsctp_werror=0" ];
});
vim-full = prev.vim-full.override { guiSupport = false; };
wayland = prev.wayland.override { withDocumentation = false; };
w3m = prev.w3m.override {
x11Support = false;
imlib2 = final.imlib2;
};
wasilibc = prev.wasilibc.overrideAttrs (finalAttrs: prevAttrs: {
version = "24";
src = prevAttrs.src.override {
rev = "refs/tags/wasi-sdk-${finalAttrs.version}";
hash = "sha256-wfOvOWVJDH5+tC5pSTLV5FUPqf25W+A2N/vXlq4nSmk=";
};
});
xvfb-run = final.callPackage ./xvfb-run.nix {
cage = final.cage.override {
wlroots = final.wlroots.override { enableXWayland = false; };
xwayland = null;
};
};
} // lib.optionalAttrs (!prev.stdenv.buildPlatform.isx86) {
writeShellApplication = { ... }@args: prev.writeShellApplication (args // {
checkPhase = args.checkPhase or ''
runHook preCheck
${stdenv.shellDryRun} "$target"
runHook postCheck
'';
});
sudo-rs = (prev.sudo-rs.overrideAttrs {
postInstall = "";
}).override {
pandoc = null;
};
}

56
stdenv.nix Normal file
View file

@ -0,0 +1,56 @@
{ lib, pkgs, ... }: { ... }@attrs: let
stdenv' = attrs.stdenv or attrs.baseStdenv;
pkgs' = attrs.pkgs or attrs.buildPackages;
inherit (pkgs') stdenv;
inherit (stdenv) buildPlatform hostPlatform targetPlatform;
inherit (stdenv.cc) isClang nativePrefix targetPrefix;
inherit (stdenv.cc.bintools) isLLVM;
inherit (lib) optionals optionalAttrs toList;
in pkgs.addAttrsToDerivation (prevAttrs: let
autoVarInit = prevAttrs.autoVarInit or null;
boundsCheck = prevAttrs.boundsCheck or false;
overrideAlloc = prevAttrs.overrideAlloc or true;
cflags = [ "-pipe" "-fno-semantic-interposition" ]
++ optionals isClang [ "-ffp-contract=fast-honor-pragmas" ]
++ optionals isLLVM [ "-flto" ]
++ optionals (autoVarInit != null) [ "-ftrivial-auto-var-init=${autoVarInit}" ]
++ optionals boundsCheck [ "-fsanitize-trap=bounds,object-size,vla-bound" ];
ldflags = [ "-O2" "--hash-style=gnu" ]
++ optionals isLLVM [ "--icf=safe" "--lto-O2" ]
++ optionals overrideAlloc [ "-lmimalloc" ];
rustflags = [
"-C" "opt-level=2"
"-C" "linker-flavor=ld.lld"
"-C" "lto"
"-C" "linker-plugin-lto"
"-C" "target-cpu=${targetPlatform.gcc.arch}"
"-C" "link-arg=-O2"
"-C" "link-arg=--hash-style=gnu"
"-C" "link-arg=--icf=safe"
"-C" "link-arg=--lto-O2"
] ++ optionals overrideAlloc [ "-C" "link-arg=-lmimalloc" ];
goflags = [ "-ldflags=-linkmode=external" ];
in {
buildInputs = prevAttrs.buildInputs or [ ]
++ optionals overrideAlloc [ pkgs.mimalloc ];
env = prevAttrs.env or { }
// optionalAttrs (prevAttrs ? env.NIX_CFLAGS_COMPILE)
{ NIX_CFLAGS_COMPILE = toList prevAttrs.env.NIX_CFLAGS_COMPILE or [ ] ++ cflags |> toString; }
// optionalAttrs (prevAttrs ? env.NIX_LDFLAGS)
{ NIX_LDFLAGS = toList prevAttrs.env.NIX_LDFLAGS or [ ] ++ ldflags |> toString; };
NIX_RUSTFLAGS = toList prevAttrs.NIX_RUSTFLAGS or [ ] ++ rustflags;
GOFLAGS = toList prevAttrs.NIX_GOFLAGS or [ ] ++ goflags;
}
// optionalAttrs (!prevAttrs ? env.NIX_CFLAGS_COMPILE)
{ NIX_CFLAGS_COMPILE = toList prevAttrs.NIX_CFLAGS_COMPILE or [ ] ++ cflags; }
// optionalAttrs (!prevAttrs ? env.NIX_LDFLAGS)
{ NIX_LDFLAGS = toList prevAttrs.NIX_LDFLAGS or [ ] ++ ldflags; }
) stdenv';

20
xvfb-run.nix Normal file
View file

@ -0,0 +1,20 @@
{ lib, writeShellApplication, cage }:
writeShellApplication {
name = "xvfb-run";
text = ''
# Discard all options
while [[ "$1" =~ ^- ]]; do
case "$1" in
(-e|-f|-n|-p|-s|-w) shift ;&
(*) shift ;;
esac
done
WLR_BACKENDS=headless \
WLR_LIBINPUT_NO_DEVICES=1 \
WLR_RENDERER=pixman \
XDG_RUNTIME_DIR="$(mktemp -d)" \
exec '${lib.getExe cage}' -- "$@"
'';
}

31
zlib.nix Normal file
View file

@ -0,0 +1,31 @@
{ lib, stdenv, fetchurl, zlib-ng, ... }:
assert zlib-ng.version == "2.2.2";
stdenv.mkDerivation (finalAttrs: {
inherit (zlib-ng) pname version meta;
src = fetchurl {
url = "https://github.com/zlib-ng/zlib-ng/archive/refs/tags/${finalAttrs.version}.tar.gz";
hash = "sha256-/LQd1Zo/FwAq6xuyHwRpbJtyFASJC7lFxas50stpZUw=";
};
outputs = [ "out" "dev" "man" ];
setOutputFlags = false;
dontAddDisableDepTrack = true;
configurePlatforms = [ ];
env = {
CHOST = stdenv.hostPlatform.config;
};
configureFlags = [
"--libdir=${placeholder "dev"}/lib"
"--sharedlibdir=${placeholder "out"}/lib"
"--includedir=${placeholder "dev"}/include"
"--zlib-compat"
];
makeFlags = [ "mandir=$(man)/share/man" ];
})