diff --git a/configuration.nix b/configuration.nix
index 238fef3a27492539f79ea4e543c44c283b3a38cb..9a90f7847fbab87c02b96aff737429c9ec9facc9 100644
--- a/configuration.nix
+++ b/configuration.nix
@@ -18,11 +18,11 @@ final: prev: {
 
   nonempty-vector = dontCheck (doJailbreak prev.nonempty-vector);
 
-  plutus-core = setBuildTarget (disableLibraryProfiling (dontBenchmark prev.plutus-core)) "plc";
+  plutus-core = setBuildTarget (dontBenchmark prev.plutus-core) "plc";
 
-  plutus-ledger-api = disableLibraryProfiling (dontBenchmark prev.plutus-ledger-api);
+  plutus-ledger-api = dontBenchmark prev.plutus-ledger-api;
 
-  plutus-tx = disableLibraryProfiling (dontBenchmark prev.plutus-tx);
+  plutus-tx = dontBenchmark prev.plutus-tx;
 
   secp256k1 = pkgs.secp256k1;
 
diff --git a/flake.lock b/flake.lock
index 6e1e6f933b6e0b686b076979863b7cd64ef0f167..38f57247b125495664e40249d5f10056b3083ec0 100644
--- a/flake.lock
+++ b/flake.lock
@@ -76,11 +76,11 @@
     "horizon-gen-nix": {
       "flake": false,
       "locked": {
-        "lastModified": 1666986763,
-        "narHash": "sha256-/veAWnKs7u+e2j1kXXm3iMiKa/YOl5pacyLuV5jYOfw=",
+        "lastModified": 1667395887,
+        "narHash": "sha256-nt7s8W11pQlWm2MCCWCa5wv+coH4fTXvhWXyaiILawk=",
         "ref": "refs/heads/master",
-        "rev": "a5ed1b6ae187c8c398b8cd43d9341437ced4c03b",
-        "revCount": 21,
+        "rev": "72d206ab4bf308fa3366e0cc9458b080b86f2baf",
+        "revCount": 24,
         "type": "git",
         "url": "https://gitlab.homotopic.tech/horizon/horizon-gen-nix"
       },
diff --git a/manifest.dhall b/manifest.dhall
index 082be982f37de873d8af3212356ac2f4b40b28c6..70a80d544c7b243179ee437cc4f548ab65bc27fc 100644
--- a/manifest.dhall
+++ b/manifest.dhall
@@ -47,13 +47,18 @@ let callCardanoLedger
         callCabal2nix
           name
           "https://github.com/milloni/cardano-ledger"
-          (Some "e95d4aa2d7e39c856e8b0aaae3610ffb2391ac19")
+          (Some "0d12cfa23aed9c355f66f69d7a1fcc6e82b68ea9")
           (Some subdir)
 
 in  [ callHackage "PyF" "0.11.0.0"
     , callHackage "Unique" "0.4.7.9"
     , callHackage "algebraic-graphs" "0.7"
     , callHackage "base64-bytestring-type" "1.0.1"
+    , callCabal2nix
+        "base-deriving-via"
+        "https://github.com/input-output-hk/cardano-base"
+        (Some "46cd4c97cff9f1f0a0da976aa9e32bd2899c85ee")
+        (Some "base-deriving-via")
     , callHackage "bech32" "1.1.2"
     , callCardanoLedger "byron-spec-chain" "eras/byron/chain/executable-spec"
     , callCardanoLedger "byron-spec-ledger" "eras/byron/ledger/executable-spec"
@@ -86,10 +91,13 @@ in  [ callHackage "PyF" "0.11.0.0"
     , callCardanoLedger "cardano-crypto-test" "eras/byron/crypto/test"
     , callCardanoLedger "cardano-crypto-wrapper" "eras/byron/crypto"
     , callCardanoLedger "cardano-data" "libs/cardano-data"
+    , callCardanoLedger "cardano-ledger-babbage" "eras/babbage/impl"
     , callCardanoLedger "cardano-ledger-byron" "eras/byron/ledger/impl"
+    , callCardanoLedger "cardano-ledger-conway" "eras/conway/impl"
     , callCardanoLedger "cardano-ledger-core" "libs/cardano-ledger-core"
     , callCardanoLedger "cardano-ledger-shelley" "eras/shelley/impl"
     , callCardanoLedger "cardano-ledger-shelley-ma" "eras/shelley-ma/impl"
+    , callCardanoLedger "cardano-ledger-alonzo" "eras/alonzo/impl"
     , callCabal2nix
         "cardano-slotting"
         "https://github.com/input-output-hk/cardano-base"
@@ -146,6 +154,11 @@ in  [ callHackage "PyF" "0.11.0.0"
         "https://github.com/tweag/HaskellR"
         (Some "fe9b5bd06cd4d3988e47b9933b11d83b6108e255")
         (Some "inline-r")
+    , callCabal2nix
+        "measures"
+        "https://github.com/input-output-hk/cardano-base"
+        (Some "46cd4c97cff9f1f0a0da976aa9e32bd2899c85ee")
+        (Some "measures")
     , callCabal2nix
         "moo"
         "https://github.com/milloni/moo"
@@ -185,6 +198,7 @@ in  [ callHackage "PyF" "0.11.0.0"
     , callHackage "singletons-th" "3.1.1"
     , callCardanoLedger "small-steps" "libs/small-steps"
     , callCardanoLedger "small-steps-test" "libs/small-steps-test"
+    , callHackage "streaming-binary" "0.3.0.1"
     , callHackage "streaming-bytestring" "0.2.4"
     , callCabal2nix
         "strict-containers"
diff --git a/overlay.nix b/overlay.nix
index b267de4ff90b9c63bad35ac1ff1973866583b59c..5b5088d1bac0d4ccac2abf6f12bb50f03d63ffd5 100644
--- a/overlay.nix
+++ b/overlay.nix
@@ -7,6 +7,8 @@ final: prev: with pkgs.haskell.lib; {
 
   algebraic-graphs = prev.callPackage (./pkgs/algebraic-graphs.nix) { };
 
+  base-deriving-via = prev.callPackage (./pkgs/base-deriving-via.nix) { };
+
   base64-bytestring-type = prev.callPackage (./pkgs/base64-bytestring-type.nix) { };
 
   bech32 = prev.callPackage (./pkgs/bech32.nix) { };
@@ -33,8 +35,14 @@ final: prev: with pkgs.haskell.lib; {
 
   cardano-data = prev.callPackage (./pkgs/cardano-data.nix) { };
 
+  cardano-ledger-alonzo = prev.callPackage (./pkgs/cardano-ledger-alonzo.nix) { };
+
+  cardano-ledger-babbage = prev.callPackage (./pkgs/cardano-ledger-babbage.nix) { };
+
   cardano-ledger-byron = prev.callPackage (./pkgs/cardano-ledger-byron.nix) { };
 
+  cardano-ledger-conway = prev.callPackage (./pkgs/cardano-ledger-conway.nix) { };
+
   cardano-ledger-core = prev.callPackage (./pkgs/cardano-ledger-core.nix) { };
 
   cardano-ledger-shelley = prev.callPackage (./pkgs/cardano-ledger-shelley.nix) { };
@@ -65,6 +73,8 @@ final: prev: with pkgs.haskell.lib; {
 
   inline-r = prev.callPackage (./pkgs/inline-r.nix) { };
 
+  measures = prev.callPackage (./pkgs/measures.nix) { };
+
   moo = prev.callPackage (./pkgs/moo.nix) { };
 
   non-integral = prev.callPackage (./pkgs/non-integral.nix) { };
@@ -95,6 +105,8 @@ final: prev: with pkgs.haskell.lib; {
 
   small-steps-test = prev.callPackage (./pkgs/small-steps-test.nix) { };
 
+  streaming-binary = prev.callPackage (./pkgs/streaming-binary.nix) { };
+
   streaming-bytestring = prev.callPackage (./pkgs/streaming-bytestring.nix) { };
 
   strict-containers = prev.callPackage (./pkgs/strict-containers.nix) { };
diff --git a/pkgs/PyF.nix b/pkgs/PyF.nix
index 2eb2c5313d826859659e6a4ca24cbcbcc0097a23..235754be03af1efd9e8e678e7e025a43ad24a253 100644
--- a/pkgs/PyF.nix
+++ b/pkgs/PyF.nix
@@ -22,6 +22,9 @@ mkDerivation {
   sha256 = "aa9a5ef335f5f380e1e534335f6e8cb0979fb897b1226d76c8369ba62254ad30";
   revision = "1";
   editedCabalFile = "091gbpmwhzvkmsk1kpsczwqb02vyw3603mqxflrajg9h2idgsdkd";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     base
     bytestring
@@ -46,10 +49,14 @@ mkDerivation {
     text
     time
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   description = "Quasiquotations for a python like interpolated string formatter";
   license = lib.licenses.bsd3;
+  broken = false;
 }
diff --git a/pkgs/Unique.nix b/pkgs/Unique.nix
index 204c2ec5b995a7141c944e4fcdbd391527825467..53e60a48d312a4f497d7ec4a1a8428550d6f90a2 100644
--- a/pkgs/Unique.nix
+++ b/pkgs/Unique.nix
@@ -15,6 +15,9 @@ mkDerivation {
   pname = "Unique";
   version = "0.4.7.9";
   sha256 = "34e8247ef2769cae219ff05bed0c8269d680396c451c1d31aa6ad506abc5c191";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     base
     containers
@@ -31,10 +34,14 @@ mkDerivation {
     QuickCheck
     quickcheck-instances
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   description = "It provides the functionality like unix \"uniq\" utility";
   license = lib.licenses.bsd3;
+  broken = false;
 }
diff --git a/pkgs/algebraic-graphs.nix b/pkgs/algebraic-graphs.nix
index afaf60f2c0cf6121e45d7bf6e598cd9a0ad05e90..06994faafa9a5ed495a3a9c4e85541f1e37940fc 100644
--- a/pkgs/algebraic-graphs.nix
+++ b/pkgs/algebraic-graphs.nix
@@ -13,6 +13,9 @@ mkDerivation {
   pname = "algebraic-graphs";
   version = "0.7";
   sha256 = "51159a0d18690ab51e6709e3c576275402f96f57d901f87d734da6854582e568";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     array
     base
@@ -30,11 +33,15 @@ mkDerivation {
     QuickCheck
     transformers
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   homepage = "https://github.com/snowleopard/alga";
   description = "A library for algebraic graph construction and transformation";
   license = lib.licenses.mit;
+  broken = false;
 }
diff --git a/pkgs/base-deriving-via.nix b/pkgs/base-deriving-via.nix
new file mode 100644
index 0000000000000000000000000000000000000000..b0a5c3f84e938bd6f1094f1a8b1145c04d652d78
--- /dev/null
+++ b/pkgs/base-deriving-via.nix
@@ -0,0 +1,26 @@
+{ mkDerivation, base, fetchgit, lib }:
+mkDerivation {
+  pname = "base-deriving-via";
+  version = "0.1.0.1";
+  src = fetchgit {
+    url = "https://github.com/input-output-hk/cardano-base";
+    sha256 = "0qn56ahqmy79riwyaq5m0d4vpamdjkkk04b0x8zwlyd5y3pg58xd";
+    rev = "46cd4c97cff9f1f0a0da976aa9e32bd2899c85ee";
+    fetchSubmodules = true;
+  };
+  postUnpack = "sourceRoot+=/base-deriving-via/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
+  libraryHaskellDepends = [ base ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
+  doHaddock = false;
+  jailbreak = true;
+  doCheck = false;
+  doBenchmark = false;
+  hyperlinkSource = false;
+  description = "A general hook newtype for use with deriving via";
+  license = lib.licenses.asl20;
+  broken = false;
+}
diff --git a/pkgs/base64-bytestring-type.nix b/pkgs/base64-bytestring-type.nix
index 94f7d22457cc3310cc636a6abb54c432c8ad484a..2adaa55ae0eaa66abd0cf55f8598c5788e1475ad 100644
--- a/pkgs/base64-bytestring-type.nix
+++ b/pkgs/base64-bytestring-type.nix
@@ -20,8 +20,11 @@ mkDerivation {
   pname = "base64-bytestring-type";
   version = "1.0.1";
   sha256 = "f607d07c4aab227b4536c495fa7c07b35ddc9c2c013d385c16c02f236526780e";
-  revision = "14";
-  editedCabalFile = "0pfj807231v2jn5067yhn13f6qq3d77fqnglmzh5wp445ikd5q0s";
+  revision = "15";
+  editedCabalFile = "0yka3aazfd5jj0dqh89cpjc8sgx3yhiiqfhrpb9z5p4zvbyvym6g";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     aeson
     base
@@ -48,11 +51,15 @@ mkDerivation {
     tasty
     tasty-quickcheck
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   homepage = "https://github.com/phadej/base64-bytestring-type#readme";
   description = "A newtype around ByteString, for base64 encoding";
   license = lib.licenses.bsd3;
+  broken = false;
 }
diff --git a/pkgs/bech32.nix b/pkgs/bech32.nix
index f0bb9b96405d780a37d9dd192f51405f76e594d2..cdfe23cc06701f4c997efa896c53c3a47cf294b7 100644
--- a/pkgs/bech32.nix
+++ b/pkgs/bech32.nix
@@ -22,6 +22,7 @@ mkDerivation {
   sha256 = "489e1922dce97ce59f72d87b17480eb0087b6661d4bcb7be124e027abcb7d2c7";
   isLibrary = true;
   isExecutable = true;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     array
     base
@@ -54,12 +55,16 @@ mkDerivation {
     vector
   ];
   testToolDepends = [ hspec-discover ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   homepage = "https://github.com/input-output-hk/bech32";
   description = "Implementation of the Bech32 cryptocurrency address format (BIP 0173)";
   license = lib.licenses.asl20;
   mainProgram = "bech32";
+  broken = false;
 }
diff --git a/pkgs/byron-spec-chain.nix b/pkgs/byron-spec-chain.nix
index 9967b935c1a31e90cc5ec95bb768b08a2c4eb272..cc194c89b31c02b5531caf8be4e0b2378d39cfa1 100644
--- a/pkgs/byron-spec-chain.nix
+++ b/pkgs/byron-spec-chain.nix
@@ -27,6 +27,9 @@ mkDerivation {
     fetchSubmodules = true;
   };
   postUnpack = "sourceRoot+=/eras/byron/chain/executable-spec/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     base
     bimap
@@ -53,11 +56,15 @@ mkDerivation {
     tasty-hedgehog
     tasty-hunit
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   homepage = "https://github.com/input-output-hk/cardano-legder";
   description = "Executable specification of the Cardano blockchain";
   license = lib.licenses.asl20;
+  broken = false;
 }
diff --git a/pkgs/byron-spec-ledger.nix b/pkgs/byron-spec-ledger.nix
index b1acac6343c14f4b8245a6f01348ad99d4f81fce..1bbb0e0b3bb3f81dba74b70ebdff9ac09867c9b8 100644
--- a/pkgs/byron-spec-ledger.nix
+++ b/pkgs/byron-spec-ledger.nix
@@ -30,6 +30,9 @@ mkDerivation {
     fetchSubmodules = true;
   };
   postUnpack = "sourceRoot+=/eras/byron/ledger/executable-spec/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     base
     bimap
@@ -61,11 +64,15 @@ mkDerivation {
     tasty-hunit
     Unique
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   homepage = "https://github.com/input-output-hk/cardano-legder";
   description = "Executable specification of Cardano ledger";
   license = lib.licenses.asl20;
+  broken = false;
 }
diff --git a/pkgs/canonical-json.nix b/pkgs/canonical-json.nix
index a28390ea487c2377bed8299e07f86bfc481865ba..6016ff36210101e6806ea640df62bf9808a0c14a 100644
--- a/pkgs/canonical-json.nix
+++ b/pkgs/canonical-json.nix
@@ -18,6 +18,9 @@ mkDerivation {
   pname = "canonical-json";
   version = "0.6.0.1";
   sha256 = "33df39d9058d33357956cdf7f911184a26da20c49b90f844ec6374f6bf5ace7e";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     base
     bytestring
@@ -38,11 +41,15 @@ mkDerivation {
     vector
   ];
   benchmarkHaskellDepends = [ base bytestring containers criterion ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   homepage = "https://github.com/well-typed/canonical-json";
   description = "Canonical JSON for signing and hashing JSON values";
   license = lib.licenses.bsd3;
+  broken = false;
 }
diff --git a/pkgs/cardano-binary-test.nix b/pkgs/cardano-binary-test.nix
index 299692c725590fa6c448e327c7ae1cbecd8e84bc..6bb7a05ba5be044ba0d67981a3685d0374bf6638 100644
--- a/pkgs/cardano-binary-test.nix
+++ b/pkgs/cardano-binary-test.nix
@@ -27,6 +27,9 @@ mkDerivation {
     fetchSubmodules = true;
   };
   postUnpack = "sourceRoot+=/binary/test/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     base
     bytestring
@@ -44,10 +47,14 @@ mkDerivation {
     time
     vector
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   description = "Test helpers from cardano-binary exposed to other packages";
   license = lib.licenses.mit;
+  broken = false;
 }
diff --git a/pkgs/cardano-binary.nix b/pkgs/cardano-binary.nix
index 4856b94e8cfe57b6b0e21881ae5fa5d531973648..9e84b060b77044d3e11ce2f3b89c49d62c1bbe0b 100644
--- a/pkgs/cardano-binary.nix
+++ b/pkgs/cardano-binary.nix
@@ -34,6 +34,9 @@ mkDerivation {
     fetchSubmodules = true;
   };
   postUnpack = "sourceRoot+=/binary/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     aeson
     base
@@ -69,10 +72,14 @@ mkDerivation {
     time
     vector
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   description = "Binary serialization for Cardano";
   license = lib.licenses.asl20;
+  broken = false;
 }
diff --git a/pkgs/cardano-crypto-class.nix b/pkgs/cardano-crypto-class.nix
index 26d3513f426d7db2266b5d198bd3c229a5067e7b..6ec17f8b00bb419c5b691b0348aac49f66cb4f5a 100644
--- a/pkgs/cardano-crypto-class.nix
+++ b/pkgs/cardano-crypto-class.nix
@@ -33,6 +33,9 @@ mkDerivation {
     fetchSubmodules = true;
   };
   postUnpack = "sourceRoot+=/cardano-crypto-class/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     aeson
     base
@@ -55,10 +58,14 @@ mkDerivation {
   ];
   libraryPkgconfigDepends = [ libsodium secp256k1 ];
   testHaskellDepends = [ base bytestring unix ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   description = "Type classes abstracting over cryptography primitives for Cardano";
   license = lib.licenses.asl20;
+  broken = false;
 }
diff --git a/pkgs/cardano-crypto-praos.nix b/pkgs/cardano-crypto-praos.nix
index 4563e4cb259e905e36c37096c95ae4ef772e2b30..ade244d003bd469504c5cd45cdf3bb62a065c672 100644
--- a/pkgs/cardano-crypto-praos.nix
+++ b/pkgs/cardano-crypto-praos.nix
@@ -19,6 +19,9 @@ mkDerivation {
     fetchSubmodules = true;
   };
   postUnpack = "sourceRoot+=/cardano-crypto-praos/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     base
     bytestring
@@ -28,10 +31,14 @@ mkDerivation {
     nothunks
   ];
   libraryPkgconfigDepends = [ libsodium ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   description = "Crypto primitives from libsodium";
   license = lib.licenses.asl20;
+  broken = false;
 }
diff --git a/pkgs/cardano-crypto-test.nix b/pkgs/cardano-crypto-test.nix
index ef66e84bc0c3f7dbf153e9f0d76de706657393ed..96e4136bd9afd72695d4a8894f7dbe0aefc7fbcb 100644
--- a/pkgs/cardano-crypto-test.nix
+++ b/pkgs/cardano-crypto-test.nix
@@ -23,6 +23,8 @@ mkDerivation {
     fetchSubmodules = true;
   };
   postUnpack = "sourceRoot+=/eras/byron/crypto/test/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
   enableSeparateDataOutput = true;
   libraryHaskellDepends = [
     base
@@ -37,10 +39,14 @@ mkDerivation {
     hedgehog
     memory
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   description = "Test helpers from cardano-crypto exposed to other packages";
   license = lib.licenses.asl20;
+  broken = false;
 }
diff --git a/pkgs/cardano-crypto-wrapper.nix b/pkgs/cardano-crypto-wrapper.nix
index 30fbaea387a180024156775ce34d6b5a4ea26f5e..542e96abe3950d336085690b262999045e7097e6 100644
--- a/pkgs/cardano-crypto-wrapper.nix
+++ b/pkgs/cardano-crypto-wrapper.nix
@@ -34,6 +34,8 @@ mkDerivation {
     fetchSubmodules = true;
   };
   postUnpack = "sourceRoot+=/eras/byron/crypto/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
   enableSeparateDataOutput = true;
   libraryHaskellDepends = [
     aeson
@@ -69,10 +71,14 @@ mkDerivation {
     hedgehog
     memory
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   description = "Cryptographic primitives used in the Cardano project";
   license = lib.licenses.asl20;
+  broken = false;
 }
diff --git a/pkgs/cardano-crypto.nix b/pkgs/cardano-crypto.nix
index d8d6ab92d22993bf757f7bc5541c19832160f269..e6a9933945ad9489e1f40e222cffa1cf318f8383 100644
--- a/pkgs/cardano-crypto.nix
+++ b/pkgs/cardano-crypto.nix
@@ -23,6 +23,7 @@ mkDerivation {
   };
   isLibrary = true;
   isExecutable = true;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     base
     basement
@@ -49,11 +50,15 @@ mkDerivation {
     gauge
     memory
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   homepage = "https://github.com/input-output-hk/cardano-crypto#readme";
   description = "Cryptography primitives for cardano";
   license = lib.licenses.mit;
+  broken = false;
 }
diff --git a/pkgs/cardano-data.nix b/pkgs/cardano-data.nix
index 71caad74031d68320c91bf531a7a3818dad0eddb..1e4145da6f399e412dfa8555fb7771bead5f8413 100644
--- a/pkgs/cardano-data.nix
+++ b/pkgs/cardano-data.nix
@@ -33,6 +33,9 @@ mkDerivation {
     fetchSubmodules = true;
   };
   postUnpack = "sourceRoot+=/libs/cardano-data/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     aeson
     base
@@ -66,11 +69,15 @@ mkDerivation {
     tasty-quickcheck
     text
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   homepage = "https://github.com/input-output-hk/cardano-ledger";
   description = "Specialized data for Cardano project";
   license = lib.licenses.asl20;
+  broken = false;
 }
diff --git a/pkgs/cardano-ledger-alonzo.nix b/pkgs/cardano-ledger-alonzo.nix
new file mode 100644
index 0000000000000000000000000000000000000000..041803d515c2f8f009d386066ce864573a3e4fed
--- /dev/null
+++ b/pkgs/cardano-ledger-alonzo.nix
@@ -0,0 +1,98 @@
+{ mkDerivation
+, aeson
+, array
+, base
+, base-deriving-via
+, base64-bytestring
+, bytestring
+, cardano-binary
+, cardano-crypto-class
+, cardano-data
+, cardano-ledger-core
+, cardano-ledger-shelley
+, cardano-ledger-shelley-ma
+, cardano-slotting
+, cardano-strict-containers
+, containers
+, data-default
+, deepseq
+, fetchgit
+, heapwords
+, lib
+, measures
+, microlens
+, mtl
+, nothunks
+, plutus-core
+, plutus-ledger-api
+, prettyprinter
+, scientific
+, serialise
+, set-algebra
+, small-steps
+, text
+, time
+, transformers
+, utf8-string
+, validation-selective
+}:
+mkDerivation {
+  pname = "cardano-ledger-alonzo";
+  version = "0.1.0.0";
+  src = fetchgit {
+    url = "https://github.com/milloni/cardano-ledger";
+    sha256 = "0ay0m3shr9pjigah21d4ysv0y3khw4741l38kdrs5725w0yc2sgy";
+    rev = "a77172d7d3446634600689f17eaa9e5b48a28b5d";
+    fetchSubmodules = true;
+  };
+  postUnpack = "sourceRoot+=/eras/alonzo/impl/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
+  libraryHaskellDepends = [
+    aeson
+    array
+    base
+    base-deriving-via
+    base64-bytestring
+    bytestring
+    cardano-binary
+    cardano-crypto-class
+    cardano-data
+    cardano-ledger-core
+    cardano-ledger-shelley
+    cardano-ledger-shelley-ma
+    cardano-slotting
+    cardano-strict-containers
+    containers
+    data-default
+    deepseq
+    heapwords
+    measures
+    microlens
+    mtl
+    nothunks
+    plutus-core
+    plutus-ledger-api
+    prettyprinter
+    scientific
+    serialise
+    set-algebra
+    small-steps
+    text
+    time
+    transformers
+    utf8-string
+    validation-selective
+  ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
+  doHaddock = false;
+  jailbreak = true;
+  doCheck = false;
+  doBenchmark = false;
+  hyperlinkSource = false;
+  description = "Cardano ledger introducing Plutus Core";
+  license = lib.licenses.asl20;
+  broken = false;
+}
diff --git a/pkgs/cardano-ledger-babbage.nix b/pkgs/cardano-ledger-babbage.nix
new file mode 100644
index 0000000000000000000000000000000000000000..797ef26cce4e2fe1eff67b5e863b54ed3883e1da
--- /dev/null
+++ b/pkgs/cardano-ledger-babbage.nix
@@ -0,0 +1,74 @@
+{ mkDerivation
+, base
+, bytestring
+, cardano-binary
+, cardano-crypto-class
+, cardano-data
+, cardano-ledger-alonzo
+, cardano-ledger-core
+, cardano-ledger-shelley
+, cardano-ledger-shelley-ma
+, cardano-slotting
+, cardano-strict-containers
+, containers
+, data-default
+, deepseq
+, fetchgit
+, lib
+, microlens
+, nothunks
+, plutus-ledger-api
+, set-algebra
+, small-steps
+, text
+, transformers
+, validation-selective
+}:
+mkDerivation {
+  pname = "cardano-ledger-babbage";
+  version = "0.1.0.0";
+  src = fetchgit {
+    url = "https://github.com/milloni/cardano-ledger";
+    sha256 = "1gjfjbsj9zglxy2aas06nmr22629j1pd1nl3q584v5is6k8nxlsj";
+    rev = "0d12cfa23aed9c355f66f69d7a1fcc6e82b68ea9";
+    fetchSubmodules = true;
+  };
+  postUnpack = "sourceRoot+=/eras/babbage/impl/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
+  libraryHaskellDepends = [
+    base
+    bytestring
+    cardano-binary
+    cardano-crypto-class
+    cardano-data
+    cardano-ledger-alonzo
+    cardano-ledger-core
+    cardano-ledger-shelley
+    cardano-ledger-shelley-ma
+    cardano-slotting
+    cardano-strict-containers
+    containers
+    data-default
+    deepseq
+    microlens
+    nothunks
+    plutus-ledger-api
+    set-algebra
+    small-steps
+    text
+    transformers
+    validation-selective
+  ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
+  doHaddock = false;
+  jailbreak = true;
+  doCheck = false;
+  doBenchmark = false;
+  hyperlinkSource = false;
+  description = "TODO";
+  license = lib.licenses.asl20;
+  broken = false;
+}
diff --git a/pkgs/cardano-ledger-byron.nix b/pkgs/cardano-ledger-byron.nix
index c418e33054db09a1faf650de33c6da7d2c36f544..cc52daabd2fb3cd2c3cc428037a1e8956ae8179c 100644
--- a/pkgs/cardano-ledger-byron.nix
+++ b/pkgs/cardano-ledger-byron.nix
@@ -55,6 +55,8 @@ mkDerivation {
     fetchSubmodules = true;
   };
   postUnpack = "sourceRoot+=/eras/byron/ledger/impl/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
   enableSeparateDataOutput = true;
   libraryHaskellDepends = [
     aeson
@@ -120,10 +122,14 @@ mkDerivation {
     time
     vector
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   description = "The blockchain layer of Cardano during the Byron era";
   license = lib.licenses.asl20;
+  broken = false;
 }
diff --git a/pkgs/cardano-ledger-conway.nix b/pkgs/cardano-ledger-conway.nix
new file mode 100644
index 0000000000000000000000000000000000000000..2dd625b47fac94ac7c9cbcd7499c2f5a23d5a5b7
--- /dev/null
+++ b/pkgs/cardano-ledger-conway.nix
@@ -0,0 +1,56 @@
+{ mkDerivation
+, aeson
+, base
+, bytestring
+, cardano-binary
+, cardano-ledger-alonzo
+, cardano-ledger-babbage
+, cardano-ledger-core
+, cardano-ledger-shelley
+, cardano-ledger-shelley-ma
+, cardano-strict-containers
+, containers
+, fetchgit
+, lib
+, microlens
+, nothunks
+}:
+mkDerivation {
+  pname = "cardano-ledger-conway";
+  version = "0.1.0.0";
+  src = fetchgit {
+    url = "https://github.com/milloni/cardano-ledger";
+    sha256 = "1gjfjbsj9zglxy2aas06nmr22629j1pd1nl3q584v5is6k8nxlsj";
+    rev = "0d12cfa23aed9c355f66f69d7a1fcc6e82b68ea9";
+    fetchSubmodules = true;
+  };
+  postUnpack = "sourceRoot+=/eras/conway/impl/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
+  libraryHaskellDepends = [
+    aeson
+    base
+    bytestring
+    cardano-binary
+    cardano-ledger-alonzo
+    cardano-ledger-babbage
+    cardano-ledger-core
+    cardano-ledger-shelley
+    cardano-ledger-shelley-ma
+    cardano-strict-containers
+    containers
+    microlens
+    nothunks
+  ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
+  doHaddock = false;
+  jailbreak = true;
+  doCheck = false;
+  doBenchmark = false;
+  hyperlinkSource = false;
+  description = "TODO";
+  license = lib.licenses.asl20;
+  broken = false;
+}
diff --git a/pkgs/cardano-ledger-core.nix b/pkgs/cardano-ledger-core.nix
index 2c547699438f0e1d6bbe9ccb35d8de69c8c74adb..8b3747af3c9015ceae332ffb33547666e00474f6 100644
--- a/pkgs/cardano-ledger-core.nix
+++ b/pkgs/cardano-ledger-core.nix
@@ -49,6 +49,9 @@ mkDerivation {
     fetchSubmodules = true;
   };
   postUnpack = "sourceRoot+=/libs/cardano-ledger-core/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     aeson
     base
@@ -88,10 +91,14 @@ mkDerivation {
     transformers
     validation-selective
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   description = "Core components of Cardano ledgers from the Shelley release on";
   license = lib.licenses.asl20;
+  broken = false;
 }
diff --git a/pkgs/cardano-ledger-shelley-ma.nix b/pkgs/cardano-ledger-shelley-ma.nix
index 6ce903fedcbde4be0c4e7e77cbc4f047c65e76d2..b5adafb49749812c01eaa7d1408b9ea0537acc69 100644
--- a/pkgs/cardano-ledger-shelley-ma.nix
+++ b/pkgs/cardano-ledger-shelley-ma.nix
@@ -34,6 +34,9 @@ mkDerivation {
     fetchSubmodules = true;
   };
   postUnpack = "sourceRoot+=/eras/shelley-ma/impl/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     base
     base16-bytestring
@@ -58,10 +61,14 @@ mkDerivation {
     transformers
     validation-selective
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   description = "Shelley ledger with multiasset and time lock support";
   license = lib.licenses.asl20;
+  broken = false;
 }
diff --git a/pkgs/cardano-ledger-shelley.nix b/pkgs/cardano-ledger-shelley.nix
index 4205138da329db07abbcc9790a47a7a53cb98e70..a41ccac73f06a16b1ac8d4232b33ae8beb7a739e 100644
--- a/pkgs/cardano-ledger-shelley.nix
+++ b/pkgs/cardano-ledger-shelley.nix
@@ -43,6 +43,9 @@ mkDerivation {
     fetchSubmodules = true;
   };
   postUnpack = "sourceRoot+=/eras/shelley/impl/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     aeson
     base
@@ -76,10 +79,14 @@ mkDerivation {
     validation-selective
     vector-map
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   description = "Shelley Ledger Executable Model";
   license = lib.licenses.asl20;
+  broken = false;
 }
diff --git a/pkgs/cardano-prelude-test.nix b/pkgs/cardano-prelude-test.nix
index 57cb69ffb63c24370ed5884029b5fb7e12e9a0c7..a4871b024d824751ab3ff4721488e100cb4970f5 100644
--- a/pkgs/cardano-prelude-test.nix
+++ b/pkgs/cardano-prelude-test.nix
@@ -34,6 +34,9 @@ mkDerivation {
     fetchSubmodules = true;
   };
   postUnpack = "sourceRoot+=/cardano-prelude-test/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     aeson
     aeson-pretty
@@ -65,10 +68,14 @@ mkDerivation {
     hedgehog
     text
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   description = "Utility types and functions for testing Cardano";
   license = lib.licenses.mit;
+  broken = false;
 }
diff --git a/pkgs/cardano-prelude.nix b/pkgs/cardano-prelude.nix
index 90b7c60afacd29f1c7aa3e419e41472ecb756521..85af7429caaf0b2f20232b1447ea42182a1eb346 100644
--- a/pkgs/cardano-prelude.nix
+++ b/pkgs/cardano-prelude.nix
@@ -29,6 +29,9 @@ mkDerivation {
     fetchSubmodules = true;
   };
   postUnpack = "sourceRoot+=/cardano-prelude/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     aeson
     base
@@ -48,10 +51,14 @@ mkDerivation {
     text
     time
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   description = "A Prelude replacement for the Cardano project";
   license = lib.licenses.mit;
+  broken = false;
 }
diff --git a/pkgs/cardano-slotting.nix b/pkgs/cardano-slotting.nix
index cdfac90a0cbeb24ba8ae78fc8541731675960e87..7f1c34d2f2256f88c72e770b4fdb1110d86f95b3 100644
--- a/pkgs/cardano-slotting.nix
+++ b/pkgs/cardano-slotting.nix
@@ -23,6 +23,9 @@ mkDerivation {
     fetchSubmodules = true;
   };
   postUnpack = "sourceRoot+=/slotting/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     aeson
     base
@@ -35,10 +38,14 @@ mkDerivation {
     time
   ];
   testHaskellDepends = [ base tasty tasty-quickcheck ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   description = "Key slotting types for cardano libraries";
   license = lib.licenses.asl20;
+  broken = false;
 }
diff --git a/pkgs/cardano-strict-containers.nix b/pkgs/cardano-strict-containers.nix
index 9a3c54d551a42a15674fe7a204395e50c36ba9c5..548514bd4ad2f31db6f15cbb9fab811969b5df08 100644
--- a/pkgs/cardano-strict-containers.nix
+++ b/pkgs/cardano-strict-containers.nix
@@ -22,6 +22,9 @@ mkDerivation {
     fetchSubmodules = true;
   };
   postUnpack = "sourceRoot+=/cardano-strict-containers/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     aeson
     base
@@ -34,10 +37,14 @@ mkDerivation {
     nothunks
     serialise
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   description = "Various strict container types";
   license = lib.licenses.asl20;
+  broken = false;
 }
diff --git a/pkgs/flat.nix b/pkgs/flat.nix
index 46e198525a8f616f97ad0d662f6ed0154142f3e9..86f2d0795ef5808cce719a5c332a2984be988499 100644
--- a/pkgs/flat.nix
+++ b/pkgs/flat.nix
@@ -33,6 +33,9 @@ mkDerivation {
     rev = "2121ee96201e39764e3a6fcbc53241afb0050647";
     fetchSubmodules = true;
   };
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     array
     base
@@ -72,11 +75,15 @@ mkDerivation {
     unordered-containers
     vector
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   homepage = "http://quid2.org";
   description = "Principled and efficient bit-oriented binary serialization";
   license = lib.licenses.bsd3;
+  broken = false;
 }
diff --git a/pkgs/generic-monoid.nix b/pkgs/generic-monoid.nix
index ba11a480a6d4336371964c26f26aaf0ce2be3b71..55c9fa13993946008812fb5466e7954424eb247a 100644
--- a/pkgs/generic-monoid.nix
+++ b/pkgs/generic-monoid.nix
@@ -3,13 +3,20 @@ mkDerivation {
   pname = "generic-monoid";
   version = "0.1.0.1";
   sha256 = "cfd072ad70af41c1b94ac24e42e2635f37ed2a54e8f4be871be78b18b66b2adf";
-  revision = "1";
-  editedCabalFile = "17dfarnbv6si8rgajb3jqsbc4k1nxmvga2h1lhmpnq43n2fdkqkq";
+  revision = "2";
+  editedCabalFile = "0p3hk9c6qn5kbgi3a4my3rq5cc43wcl93hx6axgzi5wkvimpv653";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [ base ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   description = "Derive monoid instances for product types";
   license = lib.licenses.bsd3;
+  broken = false;
 }
diff --git a/pkgs/ghc-typelits-knownnat.nix b/pkgs/ghc-typelits-knownnat.nix
index 909a09cba01bc2ee0ae39fd57ba1bceca65f5c8a..5f241f15c8d834f01c8c2434dea80117ddd1d76b 100644
--- a/pkgs/ghc-typelits-knownnat.nix
+++ b/pkgs/ghc-typelits-knownnat.nix
@@ -21,6 +21,9 @@ mkDerivation {
     rev = "1bc4ee33e005e96d1f7785c715588a289707cd48";
     fetchSubmodules = true;
   };
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     base
     ghc
@@ -37,11 +40,15 @@ mkDerivation {
     tasty-hunit
     tasty-quickcheck
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   homepage = "http://clash-lang.org/";
   description = "Derive KnownNat constraints from other KnownNat constraints";
   license = lib.licenses.bsd2;
+  broken = false;
 }
diff --git a/pkgs/ghc-typelits-natnormalise.nix b/pkgs/ghc-typelits-natnormalise.nix
index 16b12dc85b5e9a1cf01b13bf1a30bdf163b4fab8..64852ccaa8597f8deb87110c2c6409a5ca487241 100644
--- a/pkgs/ghc-typelits-natnormalise.nix
+++ b/pkgs/ghc-typelits-natnormalise.nix
@@ -21,6 +21,9 @@ mkDerivation {
     rev = "e0af5b3c69a7d8e1dd402eb727631801e7d9be3d";
     fetchSubmodules = true;
   };
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     base
     containers
@@ -36,11 +39,15 @@ mkDerivation {
     tasty-hunit
     template-haskell
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   homepage = "http://www.clash-lang.org/";
   description = "GHC typechecker plugin for types of kind GHC.TypeLits.Nat";
   license = lib.licenses.bsd2;
+  broken = false;
 }
diff --git a/pkgs/goblins.nix b/pkgs/goblins.nix
index b8e519b382bd6f169aea13ea85986e5de2972335..1c613b139822fc45347588a7f1a17c3cb2b868c5 100644
--- a/pkgs/goblins.nix
+++ b/pkgs/goblins.nix
@@ -31,6 +31,9 @@ mkDerivation {
     rev = "a315f41ec7250097fa6073b5ef4773e45758578f";
     fetchSubmodules = true;
   };
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     base
     bimap
@@ -53,11 +56,15 @@ mkDerivation {
     typerep-map
   ];
   testHaskellDepends = [ base hedgehog temporary ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   homepage = "https://github.com/input-output-hk/goblins";
   description = "Genetic algorithm based randomised testing";
   license = lib.licenses.bsd3;
+  broken = false;
 }
diff --git a/pkgs/gray-code.nix b/pkgs/gray-code.nix
index ba6a0a089cd9f7a8e265f10f368a7f0141dff26a..c2c6eea8ffbf5c21a791a9f8ffd2334fa52a190b 100644
--- a/pkgs/gray-code.nix
+++ b/pkgs/gray-code.nix
@@ -8,12 +8,19 @@ mkDerivation {
     rev = "f310a19e44416206633cfd084f10ffb7cfea9f1d";
     fetchSubmodules = true;
   };
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [ base ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   homepage = "http://bitbucket.org/astanin/hs-gray-code";
   description = "Gray code encoder/decoder";
   license = lib.licenses.bsd3;
+  broken = false;
 }
diff --git a/pkgs/heapwords.nix b/pkgs/heapwords.nix
index c0b938d05c98f9f23c746f4045f66feaa3d631a4..db5ce67434ed0a0ce6aacc0aefaabd9228f744d2 100644
--- a/pkgs/heapwords.nix
+++ b/pkgs/heapwords.nix
@@ -20,6 +20,9 @@ mkDerivation {
     fetchSubmodules = true;
   };
   postUnpack = "sourceRoot+=/heapwords/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     array
     base
@@ -30,10 +33,14 @@ mkDerivation {
     time
     vector
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   description = "Heapwords";
   license = lib.licenses.asl20;
+  broken = false;
 }
diff --git a/pkgs/inline-r.nix b/pkgs/inline-r.nix
index bb3ff3144280c86f4cac2eaae1cdce679759dffe..ec50d523d2ff52aead76eb1ba18f7dae5c24837b 100644
--- a/pkgs/inline-r.nix
+++ b/pkgs/inline-r.nix
@@ -50,6 +50,9 @@ mkDerivation {
     fetchSubmodules = true;
   };
   postUnpack = "sourceRoot+=/inline-r/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     aeson
     base
@@ -112,11 +115,15 @@ mkDerivation {
     template-haskell
     vector
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   homepage = "https://tweag.github.io/HaskellR";
   description = "Seamlessly call R from Haskell and vice versa. No FFI required.";
   license = lib.licenses.bsd3;
+  broken = false;
 }
diff --git a/pkgs/measures.nix b/pkgs/measures.nix
new file mode 100644
index 0000000000000000000000000000000000000000..515ec6ae8d2ab58fca03055e4240281be0bf73f2
--- /dev/null
+++ b/pkgs/measures.nix
@@ -0,0 +1,35 @@
+{ mkDerivation
+, base
+, base-deriving-via
+, fetchgit
+, lib
+, QuickCheck
+, tasty
+, tasty-quickcheck
+}:
+mkDerivation {
+  pname = "measures";
+  version = "0.1.0.1";
+  src = fetchgit {
+    url = "https://github.com/input-output-hk/cardano-base";
+    sha256 = "0qn56ahqmy79riwyaq5m0d4vpamdjkkk04b0x8zwlyd5y3pg58xd";
+    rev = "46cd4c97cff9f1f0a0da976aa9e32bd2899c85ee";
+    fetchSubmodules = true;
+  };
+  postUnpack = "sourceRoot+=/measures/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
+  libraryHaskellDepends = [ base base-deriving-via ];
+  testHaskellDepends = [ base QuickCheck tasty tasty-quickcheck ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
+  doHaddock = false;
+  jailbreak = true;
+  doCheck = false;
+  doBenchmark = false;
+  hyperlinkSource = false;
+  description = "An abstraction for (tuples of) measured quantities";
+  license = lib.licenses.asl20;
+  broken = false;
+}
diff --git a/pkgs/moo.nix b/pkgs/moo.nix
index d59be907c2576b6a02c2c75a9b698269ae369b70..f17daff3fd98b6fbc34af1357dceb3820667ed07 100644
--- a/pkgs/moo.nix
+++ b/pkgs/moo.nix
@@ -24,6 +24,9 @@ mkDerivation {
     rev = "20e4c6ee880e7d62b18b995750063dd7349a3f8e";
     fetchSubmodules = true;
   };
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     array
     base
@@ -53,11 +56,15 @@ mkDerivation {
     time
     vector
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   homepage = "http://www.github.com/astanin/moo/";
   description = "Genetic algorithm library";
   license = lib.licenses.bsd3;
+  broken = false;
 }
diff --git a/pkgs/non-integral.nix b/pkgs/non-integral.nix
index b687ec0a83bfc115bc6e7d991c4d5c3507401b7b..ada0033b57de88e425d54dbbb6341c5a8f5132db 100644
--- a/pkgs/non-integral.nix
+++ b/pkgs/non-integral.nix
@@ -9,11 +9,18 @@ mkDerivation {
     fetchSubmodules = true;
   };
   postUnpack = "sourceRoot+=/libs/non-integral/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [ base ];
   testHaskellDepends = [ base QuickCheck ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   license = lib.licenses.asl20;
+  broken = false;
 }
diff --git a/pkgs/nothunks.nix b/pkgs/nothunks.nix
index 27c0ddeb1449aa622c18fb8a8fc5ff26b0457703..b97d51ccea03efb4a922ac716173b2449eede83d 100644
--- a/pkgs/nothunks.nix
+++ b/pkgs/nothunks.nix
@@ -24,6 +24,9 @@ mkDerivation {
     rev = "0d7e3565407aa4eb21d861d075dff6f20d090f97";
     fetchSubmodules = true;
   };
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     base
     bytestring
@@ -44,10 +47,14 @@ mkDerivation {
     tasty
     tasty-hedgehog
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   description = "Examine values for unexpected thunks";
   license = lib.licenses.mit;
+  broken = false;
 }
diff --git a/pkgs/plutus-core.nix b/pkgs/plutus-core.nix
index d4010ec8299072eb4172573c979c5ff291acf0e1..17901ebd458056245f4ca379e584574ad878dbca 100644
--- a/pkgs/plutus-core.nix
+++ b/pkgs/plutus-core.nix
@@ -102,6 +102,7 @@ mkDerivation {
   postUnpack = "sourceRoot+=/plutus-core/; echo source root reset to $sourceRoot";
   isLibrary = true;
   isExecutable = true;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     aeson
     algebraic-graphs
@@ -268,10 +269,14 @@ mkDerivation {
     text
     vector
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   description = "Language library for Plutus Core";
   license = lib.licenses.asl20;
+  broken = false;
 }
diff --git a/pkgs/plutus-ledger-api.nix b/pkgs/plutus-ledger-api.nix
index 84ff4e97f5ee16a04a2864ab688234b887cce4ad..2589bc4dd6df3c8d58b1d42ecf8d7c53541a5830 100644
--- a/pkgs/plutus-ledger-api.nix
+++ b/pkgs/plutus-ledger-api.nix
@@ -43,6 +43,7 @@ mkDerivation {
   postUnpack = "sourceRoot+=/plutus-ledger-api/; echo source root reset to $sourceRoot";
   isLibrary = true;
   isExecutable = true;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     base
     base16-bytestring
@@ -94,11 +95,15 @@ mkDerivation {
     tasty-quickcheck
     text
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   description = "Interface to the Plutus ledger for the Cardano ledger";
   license = lib.licenses.asl20;
   mainProgram = "evaluation-test";
+  broken = false;
 }
diff --git a/pkgs/plutus-tx.nix b/pkgs/plutus-tx.nix
index 4f58ede7b57997764b48eb8dd5d4c2366ce9a2d8..8ffa723787939ff714c9c9c4e6b423af63341380 100644
--- a/pkgs/plutus-tx.nix
+++ b/pkgs/plutus-tx.nix
@@ -44,6 +44,9 @@ mkDerivation {
     fetchSubmodules = true;
   };
   postUnpack = "sourceRoot+=/plutus-tx/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     aeson
     base
@@ -89,10 +92,14 @@ mkDerivation {
     transformers
   ];
   testToolDepends = [ doctest ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   description = "Libraries for Plutus Tx and its prelude";
   license = lib.licenses.asl20;
+  broken = false;
 }
diff --git a/pkgs/prettyprinter-configurable.nix b/pkgs/prettyprinter-configurable.nix
index 3886d138bdf3fc368b28708cc7ecde0c837abe05..0d51f83ec2b29b4ab792772f9d103954fae6f62d 100644
--- a/pkgs/prettyprinter-configurable.nix
+++ b/pkgs/prettyprinter-configurable.nix
@@ -27,6 +27,9 @@ mkDerivation {
     fetchSubmodules = true;
   };
   postUnpack = "sourceRoot+=/prettyprinter-configurable/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   setupHaskellDepends = [ base Cabal cabal-doctest ];
   libraryHaskellDepends = [ base microlens mtl prettyprinter text ];
   testHaskellDepends = [
@@ -42,9 +45,13 @@ mkDerivation {
     tasty-quickcheck
     text
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   license = "unknown";
+  broken = false;
 }
diff --git a/pkgs/protolude.nix b/pkgs/protolude.nix
index ebe04dc6d518f358a08cad2ba81114503ffda737..5e2cf19451eb24bae56891025279cecd1d0743f4 100644
--- a/pkgs/protolude.nix
+++ b/pkgs/protolude.nix
@@ -19,6 +19,9 @@ mkDerivation {
   pname = "protolude";
   version = "0.3.2";
   sha256 = "7ec019f3d445563a54fad8ba89564bffaae6028798a1cc3f033f5b425ef7a344";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     array
     async
@@ -35,11 +38,15 @@ mkDerivation {
     transformers
     transformers-compat
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   homepage = "https://github.com/sdiehl/protolude";
   description = "A small prelude";
   license = lib.licenses.mit;
+  broken = false;
 }
diff --git a/pkgs/ral.nix b/pkgs/ral.nix
index 87162fa4f745b311edfa1aa58be4e4ca0348f0d1..21a3fa8de6cb108f501829cf87e2c0770bd4c337 100644
--- a/pkgs/ral.nix
+++ b/pkgs/ral.nix
@@ -18,6 +18,9 @@ mkDerivation {
   sha256 = "048cf2b5b394229503bdd748c93cc19650b4223d01e11e954b373f7595c21241";
   revision = "2";
   editedCabalFile = "0a3ryzcmjgyp64f8s2pl95pkz8zddq9qsn76dlimg23gczf1cql4";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     adjunctions
     base
@@ -30,11 +33,15 @@ mkDerivation {
     semigroupoids
   ];
   benchmarkHaskellDepends = [ base criterion vector ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   homepage = "https://github.com/phadej/vec";
   description = "Random access lists";
   license = lib.licenses.gpl2Plus;
+  broken = false;
 }
diff --git a/pkgs/recursion-schemes.nix b/pkgs/recursion-schemes.nix
index c608d8f3b8ebf5350b862e64fbfd2b5dcd49d634..d5fc9dec020227559fba2b12ac8a1895d603ce40 100644
--- a/pkgs/recursion-schemes.nix
+++ b/pkgs/recursion-schemes.nix
@@ -17,6 +17,9 @@ mkDerivation {
   sha256 = "66c3492a2fb10cea81348d0828c518b96b39f354d9e37d028a3fa279933c1405";
   revision = "1";
   editedCabalFile = "1l6wbzx8804pb6p8gvk45hal6sz8r1gvyxb8aa9ih6j8pqv4q04c";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     base
     base-orphans
@@ -29,11 +32,15 @@ mkDerivation {
     transformers
   ];
   testHaskellDepends = [ base HUnit template-haskell transformers ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   homepage = "http://github.com/ekmett/recursion-schemes/";
   description = "Representing common recursion patterns as higher-order functions";
   license = lib.licenses.bsd2;
+  broken = false;
 }
diff --git a/pkgs/ref-tf.nix b/pkgs/ref-tf.nix
index 8c3e9d7ae665a71d42066f0ef9072afe06a028b9..15e104a6c8ddc4c01bfd4eacafba833487105e06 100644
--- a/pkgs/ref-tf.nix
+++ b/pkgs/ref-tf.nix
@@ -3,11 +3,18 @@ mkDerivation {
   pname = "ref-tf";
   version = "0.5.0.1";
   sha256 = "a5c3243c30119be1cc53d04fddc3f3a3969c72912a52a111f45f04bed8a35147";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [ base stm transformers ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   description = "A type class for monads with references using type families";
   license = lib.licenses.bsd3;
+  broken = false;
 }
diff --git a/pkgs/set-algebra.nix b/pkgs/set-algebra.nix
index d2fede3672775c3c6697ad65d7e7d51286daadaf..f98c53ac4b2e3ca885e115916a2edb8abeef1ebb 100644
--- a/pkgs/set-algebra.nix
+++ b/pkgs/set-algebra.nix
@@ -19,6 +19,9 @@ mkDerivation {
     fetchSubmodules = true;
   };
   postUnpack = "sourceRoot+=/libs/set-algebra/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     ansi-wl-pprint
     base
@@ -33,11 +36,15 @@ mkDerivation {
     tasty-hunit
     tasty-quickcheck
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   homepage = "https://github.com/input-output-hk/cardano-ledger";
   description = "Set Algebra";
   license = lib.licenses.asl20;
+  broken = false;
 }
diff --git a/pkgs/singletons-th.nix b/pkgs/singletons-th.nix
index 9d481e1ab247cc0f283bf34eb81854c611b2f528..f508ab90a58d87f25210f8a497ef1b72df54942d 100644
--- a/pkgs/singletons-th.nix
+++ b/pkgs/singletons-th.nix
@@ -15,6 +15,9 @@ mkDerivation {
   pname = "singletons-th";
   version = "3.1.1";
   sha256 = "466b91be35ee07bc06f5bf01d15f4bd9dc99a1151deb09ee114d99b9e052e9ae";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     base
     containers
@@ -27,11 +30,15 @@ mkDerivation {
     th-orphans
     transformers
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   homepage = "http://www.github.com/goldfirere/singletons";
   description = "A framework for generating singleton types";
   license = lib.licenses.bsd3;
+  broken = false;
 }
diff --git a/pkgs/small-steps-test.nix b/pkgs/small-steps-test.nix
index 9bd891aa15eca8184088922f7c7d02ed0e084471..0ed79ac01585a934253b34cc304fa7f080b69d42 100644
--- a/pkgs/small-steps-test.nix
+++ b/pkgs/small-steps-test.nix
@@ -32,6 +32,9 @@ mkDerivation {
     fetchSubmodules = true;
   };
   postUnpack = "sourceRoot+=/libs/small-steps-test/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     base
     cardano-strict-containers
@@ -62,11 +65,15 @@ mkDerivation {
     tasty-quickcheck
     Unique
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   homepage = "https://github.com/input-output-hk/cardano-ledger";
   description = "Small step semantics testing library";
   license = lib.licenses.asl20;
+  broken = false;
 }
diff --git a/pkgs/small-steps.nix b/pkgs/small-steps.nix
index 07ba41a9efca124e31b7eab894ec42c7dc09d3a4..b6c15e13ab99e2ba2793c2c20098a78e92622b17 100644
--- a/pkgs/small-steps.nix
+++ b/pkgs/small-steps.nix
@@ -23,6 +23,9 @@ mkDerivation {
     fetchSubmodules = true;
   };
   postUnpack = "sourceRoot+=/libs/small-steps/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     aeson
     base
@@ -36,11 +39,15 @@ mkDerivation {
     transformers
     validation-selective
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   homepage = "https://github.com/input-output-hk/cardano-ledger";
   description = "Small step semantics";
   license = lib.licenses.asl20;
+  broken = false;
 }
diff --git a/pkgs/streaming-binary.nix b/pkgs/streaming-binary.nix
new file mode 100644
index 0000000000000000000000000000000000000000..d80207fb4a6d9c1728e002cce966ab1751d5fecd
--- /dev/null
+++ b/pkgs/streaming-binary.nix
@@ -0,0 +1,43 @@
+{ mkDerivation
+, base
+, binary
+, bytestring
+, hspec
+, lib
+, streaming
+, streaming-bytestring
+}:
+mkDerivation {
+  pname = "streaming-binary";
+  version = "0.3.0.1";
+  sha256 = "cd2bfd355bae40ccf834e40baa2cbd40ff014d30b5674c64d8e6725987566958";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
+  libraryHaskellDepends = [
+    base
+    binary
+    bytestring
+    streaming
+    streaming-bytestring
+  ];
+  testHaskellDepends = [
+    base
+    binary
+    bytestring
+    hspec
+    streaming
+    streaming-bytestring
+  ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
+  doHaddock = false;
+  jailbreak = true;
+  doCheck = false;
+  doBenchmark = false;
+  hyperlinkSource = false;
+  homepage = "https://github.com/mboes/streaming-binary#readme";
+  description = "Streaming interface to binary";
+  license = lib.licenses.bsd3;
+  broken = false;
+}
diff --git a/pkgs/streaming-bytestring.nix b/pkgs/streaming-bytestring.nix
index 7f39720d333a8425134aebd2809c0f5be3bdfe08..db5d3c008e61e49d4bd793c75be5f2a60d8e0a52 100644
--- a/pkgs/streaming-bytestring.nix
+++ b/pkgs/streaming-bytestring.nix
@@ -20,6 +20,9 @@ mkDerivation {
   pname = "streaming-bytestring";
   version = "0.2.4";
   sha256 = "b0dfd86f8ee711dbbd7b51d04531cf2e1c79c6dc05f23bb3902b35175481e447";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     base
     bytestring
@@ -44,11 +47,15 @@ mkDerivation {
     tasty-smallcheck
     transformers
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   homepage = "https://github.com/haskell-streaming/streaming-bytestring";
   description = "Fast, effectful byte streams";
   license = lib.licenses.bsd3;
+  broken = false;
 }
diff --git a/pkgs/strict-containers.nix b/pkgs/strict-containers.nix
index 47c31c1213d0e89e1c8f079a46621027272da580..46903cb759491c7ee0a70c547708a103f030313c 100644
--- a/pkgs/strict-containers.nix
+++ b/pkgs/strict-containers.nix
@@ -37,6 +37,9 @@ mkDerivation {
     fetchSubmodules = true;
   };
   postUnpack = "sourceRoot+=/strict-containers/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     array
     base
@@ -74,11 +77,15 @@ mkDerivation {
     unordered-containers
     vector
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   homepage = "https://github.com/haskellari/strict-containers";
   description = "Strict containers";
   license = lib.licenses.bsd3;
+  broken = false;
 }
diff --git a/pkgs/th-desugar.nix b/pkgs/th-desugar.nix
index 2b335eaf486415ede77de34996bd435c81d4d1a3..7f9ca0697db9f3c91c8c22f764823b62e6e27f74 100644
--- a/pkgs/th-desugar.nix
+++ b/pkgs/th-desugar.nix
@@ -18,6 +18,9 @@ mkDerivation {
   pname = "th-desugar";
   version = "1.14";
   sha256 = "dfb2d3c5f3ffec189452b1db7edb743b9b7b006cc16c19a9ece083de4bd8a7ac";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     base
     containers
@@ -43,11 +46,15 @@ mkDerivation {
     th-lift
     th-orphans
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   homepage = "https://github.com/goldfirere/th-desugar";
   description = "Functions to desugar Template Haskell";
   license = lib.licenses.bsd3;
+  broken = false;
 }
diff --git a/pkgs/typerep-map.nix b/pkgs/typerep-map.nix
index 11e7fd10fcd7eeab35dc015f7aea23625bd0f2c9..09f5b2abadf30645717ee7ad89351899953343e7 100644
--- a/pkgs/typerep-map.nix
+++ b/pkgs/typerep-map.nix
@@ -24,6 +24,9 @@ mkDerivation {
     rev = "75b7cd5d45986be07420a6821d352ad2adc0b697";
     fetchSubmodules = true;
   };
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     base
     containers
@@ -47,11 +50,15 @@ mkDerivation {
     dependent-sum
     ghc-typelits-knownnat
   ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   homepage = "https://github.com/kowainik/typerep-map";
   description = "Efficient implementation of a dependent map with types as keys";
   license = lib.licenses.mpl20;
+  broken = false;
 }
diff --git a/pkgs/vector-map.nix b/pkgs/vector-map.nix
index fae6dcc2003d1354d933d13aad4ff4b0a43cf986..9b19adc94a2be4f577c8387fd86f48cf4714d003 100644
--- a/pkgs/vector-map.nix
+++ b/pkgs/vector-map.nix
@@ -26,6 +26,9 @@ mkDerivation {
     fetchSubmodules = true;
   };
   postUnpack = "sourceRoot+=/libs/vector-map/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     base
     cardano-binary
@@ -45,11 +48,15 @@ mkDerivation {
     tasty-quickcheck
   ];
   benchmarkHaskellDepends = [ base containers criterion random ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   homepage = "https://github.com/input-output-hk/cardano-ledger";
   description = "An efficient VMap that is backed by two vectors: one for keys and another for values";
   license = lib.licenses.asl20;
+  broken = false;
 }
diff --git a/pkgs/word-array.nix b/pkgs/word-array.nix
index d11de84ffbc960045fb1851584196d518482204a..7c252b599a698a9596046415d4a4e9e197cf86ad 100644
--- a/pkgs/word-array.nix
+++ b/pkgs/word-array.nix
@@ -21,6 +21,9 @@ mkDerivation {
     fetchSubmodules = true;
   };
   postUnpack = "sourceRoot+=/word-array/; echo source root reset to $sourceRoot";
+  isLibrary = true;
+  isExecutable = false;
+  enableSeparateDataOutput = false;
   libraryHaskellDepends = [
     base
     deepseq
@@ -36,10 +39,14 @@ mkDerivation {
     vector
   ];
   benchmarkHaskellDepends = [ base primitive tasty-bench ];
+  enableLibraryProfiling = false;
+  enableExecutableProfiling = false;
   doHaddock = false;
   jailbreak = true;
   doCheck = false;
+  doBenchmark = false;
   hyperlinkSource = false;
   homepage = "https://github.com/plutus";
   license = lib.licenses.asl20;
+  broken = false;
 }