diff --git a/configuration.nix b/configuration.nix index 238fef3a27492539f79ea4e543c44c283b3a38cb..9a90f7847fbab87c02b96aff737429c9ec9facc9 100644 --- a/configuration.nix +++ b/configuration.nix @@ -18,11 +18,11 @@ final: prev: { nonempty-vector = dontCheck (doJailbreak prev.nonempty-vector); - plutus-core = setBuildTarget (disableLibraryProfiling (dontBenchmark prev.plutus-core)) "plc"; + plutus-core = setBuildTarget (dontBenchmark prev.plutus-core) "plc"; - plutus-ledger-api = disableLibraryProfiling (dontBenchmark prev.plutus-ledger-api); + plutus-ledger-api = dontBenchmark prev.plutus-ledger-api; - plutus-tx = disableLibraryProfiling (dontBenchmark prev.plutus-tx); + plutus-tx = dontBenchmark prev.plutus-tx; secp256k1 = pkgs.secp256k1; diff --git a/flake.lock b/flake.lock index 6e1e6f933b6e0b686b076979863b7cd64ef0f167..38f57247b125495664e40249d5f10056b3083ec0 100644 --- a/flake.lock +++ b/flake.lock @@ -76,11 +76,11 @@ "horizon-gen-nix": { "flake": false, "locked": { - "lastModified": 1666986763, - "narHash": "sha256-/veAWnKs7u+e2j1kXXm3iMiKa/YOl5pacyLuV5jYOfw=", + "lastModified": 1667395887, + "narHash": "sha256-nt7s8W11pQlWm2MCCWCa5wv+coH4fTXvhWXyaiILawk=", "ref": "refs/heads/master", - "rev": "a5ed1b6ae187c8c398b8cd43d9341437ced4c03b", - "revCount": 21, + "rev": "72d206ab4bf308fa3366e0cc9458b080b86f2baf", + "revCount": 24, "type": "git", "url": "https://gitlab.homotopic.tech/horizon/horizon-gen-nix" }, diff --git a/manifest.dhall b/manifest.dhall index 082be982f37de873d8af3212356ac2f4b40b28c6..70a80d544c7b243179ee437cc4f548ab65bc27fc 100644 --- a/manifest.dhall +++ b/manifest.dhall @@ -47,13 +47,18 @@ let callCardanoLedger callCabal2nix name "https://github.com/milloni/cardano-ledger" - (Some "e95d4aa2d7e39c856e8b0aaae3610ffb2391ac19") + (Some "0d12cfa23aed9c355f66f69d7a1fcc6e82b68ea9") (Some subdir) in [ callHackage "PyF" "0.11.0.0" , callHackage "Unique" "0.4.7.9" , callHackage "algebraic-graphs" "0.7" , callHackage "base64-bytestring-type" "1.0.1" + , callCabal2nix + "base-deriving-via" + "https://github.com/input-output-hk/cardano-base" + (Some "46cd4c97cff9f1f0a0da976aa9e32bd2899c85ee") + (Some "base-deriving-via") , callHackage "bech32" "1.1.2" , callCardanoLedger "byron-spec-chain" "eras/byron/chain/executable-spec" , callCardanoLedger "byron-spec-ledger" "eras/byron/ledger/executable-spec" @@ -86,10 +91,13 @@ in [ callHackage "PyF" "0.11.0.0" , callCardanoLedger "cardano-crypto-test" "eras/byron/crypto/test" , callCardanoLedger "cardano-crypto-wrapper" "eras/byron/crypto" , callCardanoLedger "cardano-data" "libs/cardano-data" + , callCardanoLedger "cardano-ledger-babbage" "eras/babbage/impl" , callCardanoLedger "cardano-ledger-byron" "eras/byron/ledger/impl" + , callCardanoLedger "cardano-ledger-conway" "eras/conway/impl" , callCardanoLedger "cardano-ledger-core" "libs/cardano-ledger-core" , callCardanoLedger "cardano-ledger-shelley" "eras/shelley/impl" , callCardanoLedger "cardano-ledger-shelley-ma" "eras/shelley-ma/impl" + , callCardanoLedger "cardano-ledger-alonzo" "eras/alonzo/impl" , callCabal2nix "cardano-slotting" "https://github.com/input-output-hk/cardano-base" @@ -146,6 +154,11 @@ in [ callHackage "PyF" "0.11.0.0" "https://github.com/tweag/HaskellR" (Some "fe9b5bd06cd4d3988e47b9933b11d83b6108e255") (Some "inline-r") + , callCabal2nix + "measures" + "https://github.com/input-output-hk/cardano-base" + (Some "46cd4c97cff9f1f0a0da976aa9e32bd2899c85ee") + (Some "measures") , callCabal2nix "moo" "https://github.com/milloni/moo" @@ -185,6 +198,7 @@ in [ callHackage "PyF" "0.11.0.0" , callHackage "singletons-th" "3.1.1" , callCardanoLedger "small-steps" "libs/small-steps" , callCardanoLedger "small-steps-test" "libs/small-steps-test" + , callHackage "streaming-binary" "0.3.0.1" , callHackage "streaming-bytestring" "0.2.4" , callCabal2nix "strict-containers" diff --git a/overlay.nix b/overlay.nix index b267de4ff90b9c63bad35ac1ff1973866583b59c..5b5088d1bac0d4ccac2abf6f12bb50f03d63ffd5 100644 --- a/overlay.nix +++ b/overlay.nix @@ -7,6 +7,8 @@ final: prev: with pkgs.haskell.lib; { algebraic-graphs = prev.callPackage (./pkgs/algebraic-graphs.nix) { }; + base-deriving-via = prev.callPackage (./pkgs/base-deriving-via.nix) { }; + base64-bytestring-type = prev.callPackage (./pkgs/base64-bytestring-type.nix) { }; bech32 = prev.callPackage (./pkgs/bech32.nix) { }; @@ -33,8 +35,14 @@ final: prev: with pkgs.haskell.lib; { cardano-data = prev.callPackage (./pkgs/cardano-data.nix) { }; + cardano-ledger-alonzo = prev.callPackage (./pkgs/cardano-ledger-alonzo.nix) { }; + + cardano-ledger-babbage = prev.callPackage (./pkgs/cardano-ledger-babbage.nix) { }; + cardano-ledger-byron = prev.callPackage (./pkgs/cardano-ledger-byron.nix) { }; + cardano-ledger-conway = prev.callPackage (./pkgs/cardano-ledger-conway.nix) { }; + cardano-ledger-core = prev.callPackage (./pkgs/cardano-ledger-core.nix) { }; cardano-ledger-shelley = prev.callPackage (./pkgs/cardano-ledger-shelley.nix) { }; @@ -65,6 +73,8 @@ final: prev: with pkgs.haskell.lib; { inline-r = prev.callPackage (./pkgs/inline-r.nix) { }; + measures = prev.callPackage (./pkgs/measures.nix) { }; + moo = prev.callPackage (./pkgs/moo.nix) { }; non-integral = prev.callPackage (./pkgs/non-integral.nix) { }; @@ -95,6 +105,8 @@ final: prev: with pkgs.haskell.lib; { small-steps-test = prev.callPackage (./pkgs/small-steps-test.nix) { }; + streaming-binary = prev.callPackage (./pkgs/streaming-binary.nix) { }; + streaming-bytestring = prev.callPackage (./pkgs/streaming-bytestring.nix) { }; strict-containers = prev.callPackage (./pkgs/strict-containers.nix) { }; diff --git a/pkgs/PyF.nix b/pkgs/PyF.nix index 2eb2c5313d826859659e6a4ca24cbcbcc0097a23..235754be03af1efd9e8e678e7e025a43ad24a253 100644 --- a/pkgs/PyF.nix +++ b/pkgs/PyF.nix @@ -22,6 +22,9 @@ mkDerivation { sha256 = "aa9a5ef335f5f380e1e534335f6e8cb0979fb897b1226d76c8369ba62254ad30"; revision = "1"; editedCabalFile = "091gbpmwhzvkmsk1kpsczwqb02vyw3603mqxflrajg9h2idgsdkd"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ base bytestring @@ -46,10 +49,14 @@ mkDerivation { text time ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; description = "Quasiquotations for a python like interpolated string formatter"; license = lib.licenses.bsd3; + broken = false; } diff --git a/pkgs/Unique.nix b/pkgs/Unique.nix index 204c2ec5b995a7141c944e4fcdbd391527825467..53e60a48d312a4f497d7ec4a1a8428550d6f90a2 100644 --- a/pkgs/Unique.nix +++ b/pkgs/Unique.nix @@ -15,6 +15,9 @@ mkDerivation { pname = "Unique"; version = "0.4.7.9"; sha256 = "34e8247ef2769cae219ff05bed0c8269d680396c451c1d31aa6ad506abc5c191"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ base containers @@ -31,10 +34,14 @@ mkDerivation { QuickCheck quickcheck-instances ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; description = "It provides the functionality like unix \"uniq\" utility"; license = lib.licenses.bsd3; + broken = false; } diff --git a/pkgs/algebraic-graphs.nix b/pkgs/algebraic-graphs.nix index afaf60f2c0cf6121e45d7bf6e598cd9a0ad05e90..06994faafa9a5ed495a3a9c4e85541f1e37940fc 100644 --- a/pkgs/algebraic-graphs.nix +++ b/pkgs/algebraic-graphs.nix @@ -13,6 +13,9 @@ mkDerivation { pname = "algebraic-graphs"; version = "0.7"; sha256 = "51159a0d18690ab51e6709e3c576275402f96f57d901f87d734da6854582e568"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ array base @@ -30,11 +33,15 @@ mkDerivation { QuickCheck transformers ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; homepage = "https://github.com/snowleopard/alga"; description = "A library for algebraic graph construction and transformation"; license = lib.licenses.mit; + broken = false; } diff --git a/pkgs/base-deriving-via.nix b/pkgs/base-deriving-via.nix new file mode 100644 index 0000000000000000000000000000000000000000..b0a5c3f84e938bd6f1094f1a8b1145c04d652d78 --- /dev/null +++ b/pkgs/base-deriving-via.nix @@ -0,0 +1,26 @@ +{ mkDerivation, base, fetchgit, lib }: +mkDerivation { + pname = "base-deriving-via"; + version = "0.1.0.1"; + src = fetchgit { + url = "https://github.com/input-output-hk/cardano-base"; + sha256 = "0qn56ahqmy79riwyaq5m0d4vpamdjkkk04b0x8zwlyd5y3pg58xd"; + rev = "46cd4c97cff9f1f0a0da976aa9e32bd2899c85ee"; + fetchSubmodules = true; + }; + postUnpack = "sourceRoot+=/base-deriving-via/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; + libraryHaskellDepends = [ base ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; + doHaddock = false; + jailbreak = true; + doCheck = false; + doBenchmark = false; + hyperlinkSource = false; + description = "A general hook newtype for use with deriving via"; + license = lib.licenses.asl20; + broken = false; +} diff --git a/pkgs/base64-bytestring-type.nix b/pkgs/base64-bytestring-type.nix index 94f7d22457cc3310cc636a6abb54c432c8ad484a..2adaa55ae0eaa66abd0cf55f8598c5788e1475ad 100644 --- a/pkgs/base64-bytestring-type.nix +++ b/pkgs/base64-bytestring-type.nix @@ -20,8 +20,11 @@ mkDerivation { pname = "base64-bytestring-type"; version = "1.0.1"; sha256 = "f607d07c4aab227b4536c495fa7c07b35ddc9c2c013d385c16c02f236526780e"; - revision = "14"; - editedCabalFile = "0pfj807231v2jn5067yhn13f6qq3d77fqnglmzh5wp445ikd5q0s"; + revision = "15"; + editedCabalFile = "0yka3aazfd5jj0dqh89cpjc8sgx3yhiiqfhrpb9z5p4zvbyvym6g"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ aeson base @@ -48,11 +51,15 @@ mkDerivation { tasty tasty-quickcheck ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; homepage = "https://github.com/phadej/base64-bytestring-type#readme"; description = "A newtype around ByteString, for base64 encoding"; license = lib.licenses.bsd3; + broken = false; } diff --git a/pkgs/bech32.nix b/pkgs/bech32.nix index f0bb9b96405d780a37d9dd192f51405f76e594d2..cdfe23cc06701f4c997efa896c53c3a47cf294b7 100644 --- a/pkgs/bech32.nix +++ b/pkgs/bech32.nix @@ -22,6 +22,7 @@ mkDerivation { sha256 = "489e1922dce97ce59f72d87b17480eb0087b6661d4bcb7be124e027abcb7d2c7"; isLibrary = true; isExecutable = true; + enableSeparateDataOutput = false; libraryHaskellDepends = [ array base @@ -54,12 +55,16 @@ mkDerivation { vector ]; testToolDepends = [ hspec-discover ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; homepage = "https://github.com/input-output-hk/bech32"; description = "Implementation of the Bech32 cryptocurrency address format (BIP 0173)"; license = lib.licenses.asl20; mainProgram = "bech32"; + broken = false; } diff --git a/pkgs/byron-spec-chain.nix b/pkgs/byron-spec-chain.nix index 9967b935c1a31e90cc5ec95bb768b08a2c4eb272..cc194c89b31c02b5531caf8be4e0b2378d39cfa1 100644 --- a/pkgs/byron-spec-chain.nix +++ b/pkgs/byron-spec-chain.nix @@ -27,6 +27,9 @@ mkDerivation { fetchSubmodules = true; }; postUnpack = "sourceRoot+=/eras/byron/chain/executable-spec/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ base bimap @@ -53,11 +56,15 @@ mkDerivation { tasty-hedgehog tasty-hunit ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; homepage = "https://github.com/input-output-hk/cardano-legder"; description = "Executable specification of the Cardano blockchain"; license = lib.licenses.asl20; + broken = false; } diff --git a/pkgs/byron-spec-ledger.nix b/pkgs/byron-spec-ledger.nix index b1acac6343c14f4b8245a6f01348ad99d4f81fce..1bbb0e0b3bb3f81dba74b70ebdff9ac09867c9b8 100644 --- a/pkgs/byron-spec-ledger.nix +++ b/pkgs/byron-spec-ledger.nix @@ -30,6 +30,9 @@ mkDerivation { fetchSubmodules = true; }; postUnpack = "sourceRoot+=/eras/byron/ledger/executable-spec/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ base bimap @@ -61,11 +64,15 @@ mkDerivation { tasty-hunit Unique ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; homepage = "https://github.com/input-output-hk/cardano-legder"; description = "Executable specification of Cardano ledger"; license = lib.licenses.asl20; + broken = false; } diff --git a/pkgs/canonical-json.nix b/pkgs/canonical-json.nix index a28390ea487c2377bed8299e07f86bfc481865ba..6016ff36210101e6806ea640df62bf9808a0c14a 100644 --- a/pkgs/canonical-json.nix +++ b/pkgs/canonical-json.nix @@ -18,6 +18,9 @@ mkDerivation { pname = "canonical-json"; version = "0.6.0.1"; sha256 = "33df39d9058d33357956cdf7f911184a26da20c49b90f844ec6374f6bf5ace7e"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ base bytestring @@ -38,11 +41,15 @@ mkDerivation { vector ]; benchmarkHaskellDepends = [ base bytestring containers criterion ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; homepage = "https://github.com/well-typed/canonical-json"; description = "Canonical JSON for signing and hashing JSON values"; license = lib.licenses.bsd3; + broken = false; } diff --git a/pkgs/cardano-binary-test.nix b/pkgs/cardano-binary-test.nix index 299692c725590fa6c448e327c7ae1cbecd8e84bc..6bb7a05ba5be044ba0d67981a3685d0374bf6638 100644 --- a/pkgs/cardano-binary-test.nix +++ b/pkgs/cardano-binary-test.nix @@ -27,6 +27,9 @@ mkDerivation { fetchSubmodules = true; }; postUnpack = "sourceRoot+=/binary/test/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ base bytestring @@ -44,10 +47,14 @@ mkDerivation { time vector ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; description = "Test helpers from cardano-binary exposed to other packages"; license = lib.licenses.mit; + broken = false; } diff --git a/pkgs/cardano-binary.nix b/pkgs/cardano-binary.nix index 4856b94e8cfe57b6b0e21881ae5fa5d531973648..9e84b060b77044d3e11ce2f3b89c49d62c1bbe0b 100644 --- a/pkgs/cardano-binary.nix +++ b/pkgs/cardano-binary.nix @@ -34,6 +34,9 @@ mkDerivation { fetchSubmodules = true; }; postUnpack = "sourceRoot+=/binary/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ aeson base @@ -69,10 +72,14 @@ mkDerivation { time vector ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; description = "Binary serialization for Cardano"; license = lib.licenses.asl20; + broken = false; } diff --git a/pkgs/cardano-crypto-class.nix b/pkgs/cardano-crypto-class.nix index 26d3513f426d7db2266b5d198bd3c229a5067e7b..6ec17f8b00bb419c5b691b0348aac49f66cb4f5a 100644 --- a/pkgs/cardano-crypto-class.nix +++ b/pkgs/cardano-crypto-class.nix @@ -33,6 +33,9 @@ mkDerivation { fetchSubmodules = true; }; postUnpack = "sourceRoot+=/cardano-crypto-class/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ aeson base @@ -55,10 +58,14 @@ mkDerivation { ]; libraryPkgconfigDepends = [ libsodium secp256k1 ]; testHaskellDepends = [ base bytestring unix ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; description = "Type classes abstracting over cryptography primitives for Cardano"; license = lib.licenses.asl20; + broken = false; } diff --git a/pkgs/cardano-crypto-praos.nix b/pkgs/cardano-crypto-praos.nix index 4563e4cb259e905e36c37096c95ae4ef772e2b30..ade244d003bd469504c5cd45cdf3bb62a065c672 100644 --- a/pkgs/cardano-crypto-praos.nix +++ b/pkgs/cardano-crypto-praos.nix @@ -19,6 +19,9 @@ mkDerivation { fetchSubmodules = true; }; postUnpack = "sourceRoot+=/cardano-crypto-praos/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ base bytestring @@ -28,10 +31,14 @@ mkDerivation { nothunks ]; libraryPkgconfigDepends = [ libsodium ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; description = "Crypto primitives from libsodium"; license = lib.licenses.asl20; + broken = false; } diff --git a/pkgs/cardano-crypto-test.nix b/pkgs/cardano-crypto-test.nix index ef66e84bc0c3f7dbf153e9f0d76de706657393ed..96e4136bd9afd72695d4a8894f7dbe0aefc7fbcb 100644 --- a/pkgs/cardano-crypto-test.nix +++ b/pkgs/cardano-crypto-test.nix @@ -23,6 +23,8 @@ mkDerivation { fetchSubmodules = true; }; postUnpack = "sourceRoot+=/eras/byron/crypto/test/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; enableSeparateDataOutput = true; libraryHaskellDepends = [ base @@ -37,10 +39,14 @@ mkDerivation { hedgehog memory ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; description = "Test helpers from cardano-crypto exposed to other packages"; license = lib.licenses.asl20; + broken = false; } diff --git a/pkgs/cardano-crypto-wrapper.nix b/pkgs/cardano-crypto-wrapper.nix index 30fbaea387a180024156775ce34d6b5a4ea26f5e..542e96abe3950d336085690b262999045e7097e6 100644 --- a/pkgs/cardano-crypto-wrapper.nix +++ b/pkgs/cardano-crypto-wrapper.nix @@ -34,6 +34,8 @@ mkDerivation { fetchSubmodules = true; }; postUnpack = "sourceRoot+=/eras/byron/crypto/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; enableSeparateDataOutput = true; libraryHaskellDepends = [ aeson @@ -69,10 +71,14 @@ mkDerivation { hedgehog memory ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; description = "Cryptographic primitives used in the Cardano project"; license = lib.licenses.asl20; + broken = false; } diff --git a/pkgs/cardano-crypto.nix b/pkgs/cardano-crypto.nix index d8d6ab92d22993bf757f7bc5541c19832160f269..e6a9933945ad9489e1f40e222cffa1cf318f8383 100644 --- a/pkgs/cardano-crypto.nix +++ b/pkgs/cardano-crypto.nix @@ -23,6 +23,7 @@ mkDerivation { }; isLibrary = true; isExecutable = true; + enableSeparateDataOutput = false; libraryHaskellDepends = [ base basement @@ -49,11 +50,15 @@ mkDerivation { gauge memory ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; homepage = "https://github.com/input-output-hk/cardano-crypto#readme"; description = "Cryptography primitives for cardano"; license = lib.licenses.mit; + broken = false; } diff --git a/pkgs/cardano-data.nix b/pkgs/cardano-data.nix index 71caad74031d68320c91bf531a7a3818dad0eddb..1e4145da6f399e412dfa8555fb7771bead5f8413 100644 --- a/pkgs/cardano-data.nix +++ b/pkgs/cardano-data.nix @@ -33,6 +33,9 @@ mkDerivation { fetchSubmodules = true; }; postUnpack = "sourceRoot+=/libs/cardano-data/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ aeson base @@ -66,11 +69,15 @@ mkDerivation { tasty-quickcheck text ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; homepage = "https://github.com/input-output-hk/cardano-ledger"; description = "Specialized data for Cardano project"; license = lib.licenses.asl20; + broken = false; } diff --git a/pkgs/cardano-ledger-alonzo.nix b/pkgs/cardano-ledger-alonzo.nix new file mode 100644 index 0000000000000000000000000000000000000000..041803d515c2f8f009d386066ce864573a3e4fed --- /dev/null +++ b/pkgs/cardano-ledger-alonzo.nix @@ -0,0 +1,98 @@ +{ mkDerivation +, aeson +, array +, base +, base-deriving-via +, base64-bytestring +, bytestring +, cardano-binary +, cardano-crypto-class +, cardano-data +, cardano-ledger-core +, cardano-ledger-shelley +, cardano-ledger-shelley-ma +, cardano-slotting +, cardano-strict-containers +, containers +, data-default +, deepseq +, fetchgit +, heapwords +, lib +, measures +, microlens +, mtl +, nothunks +, plutus-core +, plutus-ledger-api +, prettyprinter +, scientific +, serialise +, set-algebra +, small-steps +, text +, time +, transformers +, utf8-string +, validation-selective +}: +mkDerivation { + pname = "cardano-ledger-alonzo"; + version = "0.1.0.0"; + src = fetchgit { + url = "https://github.com/milloni/cardano-ledger"; + sha256 = "0ay0m3shr9pjigah21d4ysv0y3khw4741l38kdrs5725w0yc2sgy"; + rev = "a77172d7d3446634600689f17eaa9e5b48a28b5d"; + fetchSubmodules = true; + }; + postUnpack = "sourceRoot+=/eras/alonzo/impl/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; + libraryHaskellDepends = [ + aeson + array + base + base-deriving-via + base64-bytestring + bytestring + cardano-binary + cardano-crypto-class + cardano-data + cardano-ledger-core + cardano-ledger-shelley + cardano-ledger-shelley-ma + cardano-slotting + cardano-strict-containers + containers + data-default + deepseq + heapwords + measures + microlens + mtl + nothunks + plutus-core + plutus-ledger-api + prettyprinter + scientific + serialise + set-algebra + small-steps + text + time + transformers + utf8-string + validation-selective + ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; + doHaddock = false; + jailbreak = true; + doCheck = false; + doBenchmark = false; + hyperlinkSource = false; + description = "Cardano ledger introducing Plutus Core"; + license = lib.licenses.asl20; + broken = false; +} diff --git a/pkgs/cardano-ledger-babbage.nix b/pkgs/cardano-ledger-babbage.nix new file mode 100644 index 0000000000000000000000000000000000000000..797ef26cce4e2fe1eff67b5e863b54ed3883e1da --- /dev/null +++ b/pkgs/cardano-ledger-babbage.nix @@ -0,0 +1,74 @@ +{ mkDerivation +, base +, bytestring +, cardano-binary +, cardano-crypto-class +, cardano-data +, cardano-ledger-alonzo +, cardano-ledger-core +, cardano-ledger-shelley +, cardano-ledger-shelley-ma +, cardano-slotting +, cardano-strict-containers +, containers +, data-default +, deepseq +, fetchgit +, lib +, microlens +, nothunks +, plutus-ledger-api +, set-algebra +, small-steps +, text +, transformers +, validation-selective +}: +mkDerivation { + pname = "cardano-ledger-babbage"; + version = "0.1.0.0"; + src = fetchgit { + url = "https://github.com/milloni/cardano-ledger"; + sha256 = "1gjfjbsj9zglxy2aas06nmr22629j1pd1nl3q584v5is6k8nxlsj"; + rev = "0d12cfa23aed9c355f66f69d7a1fcc6e82b68ea9"; + fetchSubmodules = true; + }; + postUnpack = "sourceRoot+=/eras/babbage/impl/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; + libraryHaskellDepends = [ + base + bytestring + cardano-binary + cardano-crypto-class + cardano-data + cardano-ledger-alonzo + cardano-ledger-core + cardano-ledger-shelley + cardano-ledger-shelley-ma + cardano-slotting + cardano-strict-containers + containers + data-default + deepseq + microlens + nothunks + plutus-ledger-api + set-algebra + small-steps + text + transformers + validation-selective + ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; + doHaddock = false; + jailbreak = true; + doCheck = false; + doBenchmark = false; + hyperlinkSource = false; + description = "TODO"; + license = lib.licenses.asl20; + broken = false; +} diff --git a/pkgs/cardano-ledger-byron.nix b/pkgs/cardano-ledger-byron.nix index c418e33054db09a1faf650de33c6da7d2c36f544..cc52daabd2fb3cd2c3cc428037a1e8956ae8179c 100644 --- a/pkgs/cardano-ledger-byron.nix +++ b/pkgs/cardano-ledger-byron.nix @@ -55,6 +55,8 @@ mkDerivation { fetchSubmodules = true; }; postUnpack = "sourceRoot+=/eras/byron/ledger/impl/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; enableSeparateDataOutput = true; libraryHaskellDepends = [ aeson @@ -120,10 +122,14 @@ mkDerivation { time vector ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; description = "The blockchain layer of Cardano during the Byron era"; license = lib.licenses.asl20; + broken = false; } diff --git a/pkgs/cardano-ledger-conway.nix b/pkgs/cardano-ledger-conway.nix new file mode 100644 index 0000000000000000000000000000000000000000..2dd625b47fac94ac7c9cbcd7499c2f5a23d5a5b7 --- /dev/null +++ b/pkgs/cardano-ledger-conway.nix @@ -0,0 +1,56 @@ +{ mkDerivation +, aeson +, base +, bytestring +, cardano-binary +, cardano-ledger-alonzo +, cardano-ledger-babbage +, cardano-ledger-core +, cardano-ledger-shelley +, cardano-ledger-shelley-ma +, cardano-strict-containers +, containers +, fetchgit +, lib +, microlens +, nothunks +}: +mkDerivation { + pname = "cardano-ledger-conway"; + version = "0.1.0.0"; + src = fetchgit { + url = "https://github.com/milloni/cardano-ledger"; + sha256 = "1gjfjbsj9zglxy2aas06nmr22629j1pd1nl3q584v5is6k8nxlsj"; + rev = "0d12cfa23aed9c355f66f69d7a1fcc6e82b68ea9"; + fetchSubmodules = true; + }; + postUnpack = "sourceRoot+=/eras/conway/impl/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; + libraryHaskellDepends = [ + aeson + base + bytestring + cardano-binary + cardano-ledger-alonzo + cardano-ledger-babbage + cardano-ledger-core + cardano-ledger-shelley + cardano-ledger-shelley-ma + cardano-strict-containers + containers + microlens + nothunks + ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; + doHaddock = false; + jailbreak = true; + doCheck = false; + doBenchmark = false; + hyperlinkSource = false; + description = "TODO"; + license = lib.licenses.asl20; + broken = false; +} diff --git a/pkgs/cardano-ledger-core.nix b/pkgs/cardano-ledger-core.nix index 2c547699438f0e1d6bbe9ccb35d8de69c8c74adb..8b3747af3c9015ceae332ffb33547666e00474f6 100644 --- a/pkgs/cardano-ledger-core.nix +++ b/pkgs/cardano-ledger-core.nix @@ -49,6 +49,9 @@ mkDerivation { fetchSubmodules = true; }; postUnpack = "sourceRoot+=/libs/cardano-ledger-core/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ aeson base @@ -88,10 +91,14 @@ mkDerivation { transformers validation-selective ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; description = "Core components of Cardano ledgers from the Shelley release on"; license = lib.licenses.asl20; + broken = false; } diff --git a/pkgs/cardano-ledger-shelley-ma.nix b/pkgs/cardano-ledger-shelley-ma.nix index 6ce903fedcbde4be0c4e7e77cbc4f047c65e76d2..b5adafb49749812c01eaa7d1408b9ea0537acc69 100644 --- a/pkgs/cardano-ledger-shelley-ma.nix +++ b/pkgs/cardano-ledger-shelley-ma.nix @@ -34,6 +34,9 @@ mkDerivation { fetchSubmodules = true; }; postUnpack = "sourceRoot+=/eras/shelley-ma/impl/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ base base16-bytestring @@ -58,10 +61,14 @@ mkDerivation { transformers validation-selective ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; description = "Shelley ledger with multiasset and time lock support"; license = lib.licenses.asl20; + broken = false; } diff --git a/pkgs/cardano-ledger-shelley.nix b/pkgs/cardano-ledger-shelley.nix index 4205138da329db07abbcc9790a47a7a53cb98e70..a41ccac73f06a16b1ac8d4232b33ae8beb7a739e 100644 --- a/pkgs/cardano-ledger-shelley.nix +++ b/pkgs/cardano-ledger-shelley.nix @@ -43,6 +43,9 @@ mkDerivation { fetchSubmodules = true; }; postUnpack = "sourceRoot+=/eras/shelley/impl/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ aeson base @@ -76,10 +79,14 @@ mkDerivation { validation-selective vector-map ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; description = "Shelley Ledger Executable Model"; license = lib.licenses.asl20; + broken = false; } diff --git a/pkgs/cardano-prelude-test.nix b/pkgs/cardano-prelude-test.nix index 57cb69ffb63c24370ed5884029b5fb7e12e9a0c7..a4871b024d824751ab3ff4721488e100cb4970f5 100644 --- a/pkgs/cardano-prelude-test.nix +++ b/pkgs/cardano-prelude-test.nix @@ -34,6 +34,9 @@ mkDerivation { fetchSubmodules = true; }; postUnpack = "sourceRoot+=/cardano-prelude-test/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ aeson aeson-pretty @@ -65,10 +68,14 @@ mkDerivation { hedgehog text ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; description = "Utility types and functions for testing Cardano"; license = lib.licenses.mit; + broken = false; } diff --git a/pkgs/cardano-prelude.nix b/pkgs/cardano-prelude.nix index 90b7c60afacd29f1c7aa3e419e41472ecb756521..85af7429caaf0b2f20232b1447ea42182a1eb346 100644 --- a/pkgs/cardano-prelude.nix +++ b/pkgs/cardano-prelude.nix @@ -29,6 +29,9 @@ mkDerivation { fetchSubmodules = true; }; postUnpack = "sourceRoot+=/cardano-prelude/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ aeson base @@ -48,10 +51,14 @@ mkDerivation { text time ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; description = "A Prelude replacement for the Cardano project"; license = lib.licenses.mit; + broken = false; } diff --git a/pkgs/cardano-slotting.nix b/pkgs/cardano-slotting.nix index cdfac90a0cbeb24ba8ae78fc8541731675960e87..7f1c34d2f2256f88c72e770b4fdb1110d86f95b3 100644 --- a/pkgs/cardano-slotting.nix +++ b/pkgs/cardano-slotting.nix @@ -23,6 +23,9 @@ mkDerivation { fetchSubmodules = true; }; postUnpack = "sourceRoot+=/slotting/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ aeson base @@ -35,10 +38,14 @@ mkDerivation { time ]; testHaskellDepends = [ base tasty tasty-quickcheck ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; description = "Key slotting types for cardano libraries"; license = lib.licenses.asl20; + broken = false; } diff --git a/pkgs/cardano-strict-containers.nix b/pkgs/cardano-strict-containers.nix index 9a3c54d551a42a15674fe7a204395e50c36ba9c5..548514bd4ad2f31db6f15cbb9fab811969b5df08 100644 --- a/pkgs/cardano-strict-containers.nix +++ b/pkgs/cardano-strict-containers.nix @@ -22,6 +22,9 @@ mkDerivation { fetchSubmodules = true; }; postUnpack = "sourceRoot+=/cardano-strict-containers/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ aeson base @@ -34,10 +37,14 @@ mkDerivation { nothunks serialise ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; description = "Various strict container types"; license = lib.licenses.asl20; + broken = false; } diff --git a/pkgs/flat.nix b/pkgs/flat.nix index 46e198525a8f616f97ad0d662f6ed0154142f3e9..86f2d0795ef5808cce719a5c332a2984be988499 100644 --- a/pkgs/flat.nix +++ b/pkgs/flat.nix @@ -33,6 +33,9 @@ mkDerivation { rev = "2121ee96201e39764e3a6fcbc53241afb0050647"; fetchSubmodules = true; }; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ array base @@ -72,11 +75,15 @@ mkDerivation { unordered-containers vector ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; homepage = "http://quid2.org"; description = "Principled and efficient bit-oriented binary serialization"; license = lib.licenses.bsd3; + broken = false; } diff --git a/pkgs/generic-monoid.nix b/pkgs/generic-monoid.nix index ba11a480a6d4336371964c26f26aaf0ce2be3b71..55c9fa13993946008812fb5466e7954424eb247a 100644 --- a/pkgs/generic-monoid.nix +++ b/pkgs/generic-monoid.nix @@ -3,13 +3,20 @@ mkDerivation { pname = "generic-monoid"; version = "0.1.0.1"; sha256 = "cfd072ad70af41c1b94ac24e42e2635f37ed2a54e8f4be871be78b18b66b2adf"; - revision = "1"; - editedCabalFile = "17dfarnbv6si8rgajb3jqsbc4k1nxmvga2h1lhmpnq43n2fdkqkq"; + revision = "2"; + editedCabalFile = "0p3hk9c6qn5kbgi3a4my3rq5cc43wcl93hx6axgzi5wkvimpv653"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ base ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; description = "Derive monoid instances for product types"; license = lib.licenses.bsd3; + broken = false; } diff --git a/pkgs/ghc-typelits-knownnat.nix b/pkgs/ghc-typelits-knownnat.nix index 909a09cba01bc2ee0ae39fd57ba1bceca65f5c8a..5f241f15c8d834f01c8c2434dea80117ddd1d76b 100644 --- a/pkgs/ghc-typelits-knownnat.nix +++ b/pkgs/ghc-typelits-knownnat.nix @@ -21,6 +21,9 @@ mkDerivation { rev = "1bc4ee33e005e96d1f7785c715588a289707cd48"; fetchSubmodules = true; }; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ base ghc @@ -37,11 +40,15 @@ mkDerivation { tasty-hunit tasty-quickcheck ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; homepage = "http://clash-lang.org/"; description = "Derive KnownNat constraints from other KnownNat constraints"; license = lib.licenses.bsd2; + broken = false; } diff --git a/pkgs/ghc-typelits-natnormalise.nix b/pkgs/ghc-typelits-natnormalise.nix index 16b12dc85b5e9a1cf01b13bf1a30bdf163b4fab8..64852ccaa8597f8deb87110c2c6409a5ca487241 100644 --- a/pkgs/ghc-typelits-natnormalise.nix +++ b/pkgs/ghc-typelits-natnormalise.nix @@ -21,6 +21,9 @@ mkDerivation { rev = "e0af5b3c69a7d8e1dd402eb727631801e7d9be3d"; fetchSubmodules = true; }; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ base containers @@ -36,11 +39,15 @@ mkDerivation { tasty-hunit template-haskell ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; homepage = "http://www.clash-lang.org/"; description = "GHC typechecker plugin for types of kind GHC.TypeLits.Nat"; license = lib.licenses.bsd2; + broken = false; } diff --git a/pkgs/goblins.nix b/pkgs/goblins.nix index b8e519b382bd6f169aea13ea85986e5de2972335..1c613b139822fc45347588a7f1a17c3cb2b868c5 100644 --- a/pkgs/goblins.nix +++ b/pkgs/goblins.nix @@ -31,6 +31,9 @@ mkDerivation { rev = "a315f41ec7250097fa6073b5ef4773e45758578f"; fetchSubmodules = true; }; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ base bimap @@ -53,11 +56,15 @@ mkDerivation { typerep-map ]; testHaskellDepends = [ base hedgehog temporary ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; homepage = "https://github.com/input-output-hk/goblins"; description = "Genetic algorithm based randomised testing"; license = lib.licenses.bsd3; + broken = false; } diff --git a/pkgs/gray-code.nix b/pkgs/gray-code.nix index ba6a0a089cd9f7a8e265f10f368a7f0141dff26a..c2c6eea8ffbf5c21a791a9f8ffd2334fa52a190b 100644 --- a/pkgs/gray-code.nix +++ b/pkgs/gray-code.nix @@ -8,12 +8,19 @@ mkDerivation { rev = "f310a19e44416206633cfd084f10ffb7cfea9f1d"; fetchSubmodules = true; }; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ base ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; homepage = "http://bitbucket.org/astanin/hs-gray-code"; description = "Gray code encoder/decoder"; license = lib.licenses.bsd3; + broken = false; } diff --git a/pkgs/heapwords.nix b/pkgs/heapwords.nix index c0b938d05c98f9f23c746f4045f66feaa3d631a4..db5ce67434ed0a0ce6aacc0aefaabd9228f744d2 100644 --- a/pkgs/heapwords.nix +++ b/pkgs/heapwords.nix @@ -20,6 +20,9 @@ mkDerivation { fetchSubmodules = true; }; postUnpack = "sourceRoot+=/heapwords/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ array base @@ -30,10 +33,14 @@ mkDerivation { time vector ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; description = "Heapwords"; license = lib.licenses.asl20; + broken = false; } diff --git a/pkgs/inline-r.nix b/pkgs/inline-r.nix index bb3ff3144280c86f4cac2eaae1cdce679759dffe..ec50d523d2ff52aead76eb1ba18f7dae5c24837b 100644 --- a/pkgs/inline-r.nix +++ b/pkgs/inline-r.nix @@ -50,6 +50,9 @@ mkDerivation { fetchSubmodules = true; }; postUnpack = "sourceRoot+=/inline-r/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ aeson base @@ -112,11 +115,15 @@ mkDerivation { template-haskell vector ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; homepage = "https://tweag.github.io/HaskellR"; description = "Seamlessly call R from Haskell and vice versa. No FFI required."; license = lib.licenses.bsd3; + broken = false; } diff --git a/pkgs/measures.nix b/pkgs/measures.nix new file mode 100644 index 0000000000000000000000000000000000000000..515ec6ae8d2ab58fca03055e4240281be0bf73f2 --- /dev/null +++ b/pkgs/measures.nix @@ -0,0 +1,35 @@ +{ mkDerivation +, base +, base-deriving-via +, fetchgit +, lib +, QuickCheck +, tasty +, tasty-quickcheck +}: +mkDerivation { + pname = "measures"; + version = "0.1.0.1"; + src = fetchgit { + url = "https://github.com/input-output-hk/cardano-base"; + sha256 = "0qn56ahqmy79riwyaq5m0d4vpamdjkkk04b0x8zwlyd5y3pg58xd"; + rev = "46cd4c97cff9f1f0a0da976aa9e32bd2899c85ee"; + fetchSubmodules = true; + }; + postUnpack = "sourceRoot+=/measures/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; + libraryHaskellDepends = [ base base-deriving-via ]; + testHaskellDepends = [ base QuickCheck tasty tasty-quickcheck ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; + doHaddock = false; + jailbreak = true; + doCheck = false; + doBenchmark = false; + hyperlinkSource = false; + description = "An abstraction for (tuples of) measured quantities"; + license = lib.licenses.asl20; + broken = false; +} diff --git a/pkgs/moo.nix b/pkgs/moo.nix index d59be907c2576b6a02c2c75a9b698269ae369b70..f17daff3fd98b6fbc34af1357dceb3820667ed07 100644 --- a/pkgs/moo.nix +++ b/pkgs/moo.nix @@ -24,6 +24,9 @@ mkDerivation { rev = "20e4c6ee880e7d62b18b995750063dd7349a3f8e"; fetchSubmodules = true; }; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ array base @@ -53,11 +56,15 @@ mkDerivation { time vector ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; homepage = "http://www.github.com/astanin/moo/"; description = "Genetic algorithm library"; license = lib.licenses.bsd3; + broken = false; } diff --git a/pkgs/non-integral.nix b/pkgs/non-integral.nix index b687ec0a83bfc115bc6e7d991c4d5c3507401b7b..ada0033b57de88e425d54dbbb6341c5a8f5132db 100644 --- a/pkgs/non-integral.nix +++ b/pkgs/non-integral.nix @@ -9,11 +9,18 @@ mkDerivation { fetchSubmodules = true; }; postUnpack = "sourceRoot+=/libs/non-integral/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ base ]; testHaskellDepends = [ base QuickCheck ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; license = lib.licenses.asl20; + broken = false; } diff --git a/pkgs/nothunks.nix b/pkgs/nothunks.nix index 27c0ddeb1449aa622c18fb8a8fc5ff26b0457703..b97d51ccea03efb4a922ac716173b2449eede83d 100644 --- a/pkgs/nothunks.nix +++ b/pkgs/nothunks.nix @@ -24,6 +24,9 @@ mkDerivation { rev = "0d7e3565407aa4eb21d861d075dff6f20d090f97"; fetchSubmodules = true; }; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ base bytestring @@ -44,10 +47,14 @@ mkDerivation { tasty tasty-hedgehog ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; description = "Examine values for unexpected thunks"; license = lib.licenses.mit; + broken = false; } diff --git a/pkgs/plutus-core.nix b/pkgs/plutus-core.nix index d4010ec8299072eb4172573c979c5ff291acf0e1..17901ebd458056245f4ca379e584574ad878dbca 100644 --- a/pkgs/plutus-core.nix +++ b/pkgs/plutus-core.nix @@ -102,6 +102,7 @@ mkDerivation { postUnpack = "sourceRoot+=/plutus-core/; echo source root reset to $sourceRoot"; isLibrary = true; isExecutable = true; + enableSeparateDataOutput = false; libraryHaskellDepends = [ aeson algebraic-graphs @@ -268,10 +269,14 @@ mkDerivation { text vector ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; description = "Language library for Plutus Core"; license = lib.licenses.asl20; + broken = false; } diff --git a/pkgs/plutus-ledger-api.nix b/pkgs/plutus-ledger-api.nix index 84ff4e97f5ee16a04a2864ab688234b887cce4ad..2589bc4dd6df3c8d58b1d42ecf8d7c53541a5830 100644 --- a/pkgs/plutus-ledger-api.nix +++ b/pkgs/plutus-ledger-api.nix @@ -43,6 +43,7 @@ mkDerivation { postUnpack = "sourceRoot+=/plutus-ledger-api/; echo source root reset to $sourceRoot"; isLibrary = true; isExecutable = true; + enableSeparateDataOutput = false; libraryHaskellDepends = [ base base16-bytestring @@ -94,11 +95,15 @@ mkDerivation { tasty-quickcheck text ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; description = "Interface to the Plutus ledger for the Cardano ledger"; license = lib.licenses.asl20; mainProgram = "evaluation-test"; + broken = false; } diff --git a/pkgs/plutus-tx.nix b/pkgs/plutus-tx.nix index 4f58ede7b57997764b48eb8dd5d4c2366ce9a2d8..8ffa723787939ff714c9c9c4e6b423af63341380 100644 --- a/pkgs/plutus-tx.nix +++ b/pkgs/plutus-tx.nix @@ -44,6 +44,9 @@ mkDerivation { fetchSubmodules = true; }; postUnpack = "sourceRoot+=/plutus-tx/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ aeson base @@ -89,10 +92,14 @@ mkDerivation { transformers ]; testToolDepends = [ doctest ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; description = "Libraries for Plutus Tx and its prelude"; license = lib.licenses.asl20; + broken = false; } diff --git a/pkgs/prettyprinter-configurable.nix b/pkgs/prettyprinter-configurable.nix index 3886d138bdf3fc368b28708cc7ecde0c837abe05..0d51f83ec2b29b4ab792772f9d103954fae6f62d 100644 --- a/pkgs/prettyprinter-configurable.nix +++ b/pkgs/prettyprinter-configurable.nix @@ -27,6 +27,9 @@ mkDerivation { fetchSubmodules = true; }; postUnpack = "sourceRoot+=/prettyprinter-configurable/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; setupHaskellDepends = [ base Cabal cabal-doctest ]; libraryHaskellDepends = [ base microlens mtl prettyprinter text ]; testHaskellDepends = [ @@ -42,9 +45,13 @@ mkDerivation { tasty-quickcheck text ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; license = "unknown"; + broken = false; } diff --git a/pkgs/protolude.nix b/pkgs/protolude.nix index ebe04dc6d518f358a08cad2ba81114503ffda737..5e2cf19451eb24bae56891025279cecd1d0743f4 100644 --- a/pkgs/protolude.nix +++ b/pkgs/protolude.nix @@ -19,6 +19,9 @@ mkDerivation { pname = "protolude"; version = "0.3.2"; sha256 = "7ec019f3d445563a54fad8ba89564bffaae6028798a1cc3f033f5b425ef7a344"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ array async @@ -35,11 +38,15 @@ mkDerivation { transformers transformers-compat ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; homepage = "https://github.com/sdiehl/protolude"; description = "A small prelude"; license = lib.licenses.mit; + broken = false; } diff --git a/pkgs/ral.nix b/pkgs/ral.nix index 87162fa4f745b311edfa1aa58be4e4ca0348f0d1..21a3fa8de6cb108f501829cf87e2c0770bd4c337 100644 --- a/pkgs/ral.nix +++ b/pkgs/ral.nix @@ -18,6 +18,9 @@ mkDerivation { sha256 = "048cf2b5b394229503bdd748c93cc19650b4223d01e11e954b373f7595c21241"; revision = "2"; editedCabalFile = "0a3ryzcmjgyp64f8s2pl95pkz8zddq9qsn76dlimg23gczf1cql4"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ adjunctions base @@ -30,11 +33,15 @@ mkDerivation { semigroupoids ]; benchmarkHaskellDepends = [ base criterion vector ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; homepage = "https://github.com/phadej/vec"; description = "Random access lists"; license = lib.licenses.gpl2Plus; + broken = false; } diff --git a/pkgs/recursion-schemes.nix b/pkgs/recursion-schemes.nix index c608d8f3b8ebf5350b862e64fbfd2b5dcd49d634..d5fc9dec020227559fba2b12ac8a1895d603ce40 100644 --- a/pkgs/recursion-schemes.nix +++ b/pkgs/recursion-schemes.nix @@ -17,6 +17,9 @@ mkDerivation { sha256 = "66c3492a2fb10cea81348d0828c518b96b39f354d9e37d028a3fa279933c1405"; revision = "1"; editedCabalFile = "1l6wbzx8804pb6p8gvk45hal6sz8r1gvyxb8aa9ih6j8pqv4q04c"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ base base-orphans @@ -29,11 +32,15 @@ mkDerivation { transformers ]; testHaskellDepends = [ base HUnit template-haskell transformers ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; homepage = "http://github.com/ekmett/recursion-schemes/"; description = "Representing common recursion patterns as higher-order functions"; license = lib.licenses.bsd2; + broken = false; } diff --git a/pkgs/ref-tf.nix b/pkgs/ref-tf.nix index 8c3e9d7ae665a71d42066f0ef9072afe06a028b9..15e104a6c8ddc4c01bfd4eacafba833487105e06 100644 --- a/pkgs/ref-tf.nix +++ b/pkgs/ref-tf.nix @@ -3,11 +3,18 @@ mkDerivation { pname = "ref-tf"; version = "0.5.0.1"; sha256 = "a5c3243c30119be1cc53d04fddc3f3a3969c72912a52a111f45f04bed8a35147"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ base stm transformers ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; description = "A type class for monads with references using type families"; license = lib.licenses.bsd3; + broken = false; } diff --git a/pkgs/set-algebra.nix b/pkgs/set-algebra.nix index d2fede3672775c3c6697ad65d7e7d51286daadaf..f98c53ac4b2e3ca885e115916a2edb8abeef1ebb 100644 --- a/pkgs/set-algebra.nix +++ b/pkgs/set-algebra.nix @@ -19,6 +19,9 @@ mkDerivation { fetchSubmodules = true; }; postUnpack = "sourceRoot+=/libs/set-algebra/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ ansi-wl-pprint base @@ -33,11 +36,15 @@ mkDerivation { tasty-hunit tasty-quickcheck ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; homepage = "https://github.com/input-output-hk/cardano-ledger"; description = "Set Algebra"; license = lib.licenses.asl20; + broken = false; } diff --git a/pkgs/singletons-th.nix b/pkgs/singletons-th.nix index 9d481e1ab247cc0f283bf34eb81854c611b2f528..f508ab90a58d87f25210f8a497ef1b72df54942d 100644 --- a/pkgs/singletons-th.nix +++ b/pkgs/singletons-th.nix @@ -15,6 +15,9 @@ mkDerivation { pname = "singletons-th"; version = "3.1.1"; sha256 = "466b91be35ee07bc06f5bf01d15f4bd9dc99a1151deb09ee114d99b9e052e9ae"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ base containers @@ -27,11 +30,15 @@ mkDerivation { th-orphans transformers ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; homepage = "http://www.github.com/goldfirere/singletons"; description = "A framework for generating singleton types"; license = lib.licenses.bsd3; + broken = false; } diff --git a/pkgs/small-steps-test.nix b/pkgs/small-steps-test.nix index 9bd891aa15eca8184088922f7c7d02ed0e084471..0ed79ac01585a934253b34cc304fa7f080b69d42 100644 --- a/pkgs/small-steps-test.nix +++ b/pkgs/small-steps-test.nix @@ -32,6 +32,9 @@ mkDerivation { fetchSubmodules = true; }; postUnpack = "sourceRoot+=/libs/small-steps-test/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ base cardano-strict-containers @@ -62,11 +65,15 @@ mkDerivation { tasty-quickcheck Unique ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; homepage = "https://github.com/input-output-hk/cardano-ledger"; description = "Small step semantics testing library"; license = lib.licenses.asl20; + broken = false; } diff --git a/pkgs/small-steps.nix b/pkgs/small-steps.nix index 07ba41a9efca124e31b7eab894ec42c7dc09d3a4..b6c15e13ab99e2ba2793c2c20098a78e92622b17 100644 --- a/pkgs/small-steps.nix +++ b/pkgs/small-steps.nix @@ -23,6 +23,9 @@ mkDerivation { fetchSubmodules = true; }; postUnpack = "sourceRoot+=/libs/small-steps/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ aeson base @@ -36,11 +39,15 @@ mkDerivation { transformers validation-selective ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; homepage = "https://github.com/input-output-hk/cardano-ledger"; description = "Small step semantics"; license = lib.licenses.asl20; + broken = false; } diff --git a/pkgs/streaming-binary.nix b/pkgs/streaming-binary.nix new file mode 100644 index 0000000000000000000000000000000000000000..d80207fb4a6d9c1728e002cce966ab1751d5fecd --- /dev/null +++ b/pkgs/streaming-binary.nix @@ -0,0 +1,43 @@ +{ mkDerivation +, base +, binary +, bytestring +, hspec +, lib +, streaming +, streaming-bytestring +}: +mkDerivation { + pname = "streaming-binary"; + version = "0.3.0.1"; + sha256 = "cd2bfd355bae40ccf834e40baa2cbd40ff014d30b5674c64d8e6725987566958"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; + libraryHaskellDepends = [ + base + binary + bytestring + streaming + streaming-bytestring + ]; + testHaskellDepends = [ + base + binary + bytestring + hspec + streaming + streaming-bytestring + ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; + doHaddock = false; + jailbreak = true; + doCheck = false; + doBenchmark = false; + hyperlinkSource = false; + homepage = "https://github.com/mboes/streaming-binary#readme"; + description = "Streaming interface to binary"; + license = lib.licenses.bsd3; + broken = false; +} diff --git a/pkgs/streaming-bytestring.nix b/pkgs/streaming-bytestring.nix index 7f39720d333a8425134aebd2809c0f5be3bdfe08..db5d3c008e61e49d4bd793c75be5f2a60d8e0a52 100644 --- a/pkgs/streaming-bytestring.nix +++ b/pkgs/streaming-bytestring.nix @@ -20,6 +20,9 @@ mkDerivation { pname = "streaming-bytestring"; version = "0.2.4"; sha256 = "b0dfd86f8ee711dbbd7b51d04531cf2e1c79c6dc05f23bb3902b35175481e447"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ base bytestring @@ -44,11 +47,15 @@ mkDerivation { tasty-smallcheck transformers ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; homepage = "https://github.com/haskell-streaming/streaming-bytestring"; description = "Fast, effectful byte streams"; license = lib.licenses.bsd3; + broken = false; } diff --git a/pkgs/strict-containers.nix b/pkgs/strict-containers.nix index 47c31c1213d0e89e1c8f079a46621027272da580..46903cb759491c7ee0a70c547708a103f030313c 100644 --- a/pkgs/strict-containers.nix +++ b/pkgs/strict-containers.nix @@ -37,6 +37,9 @@ mkDerivation { fetchSubmodules = true; }; postUnpack = "sourceRoot+=/strict-containers/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ array base @@ -74,11 +77,15 @@ mkDerivation { unordered-containers vector ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; homepage = "https://github.com/haskellari/strict-containers"; description = "Strict containers"; license = lib.licenses.bsd3; + broken = false; } diff --git a/pkgs/th-desugar.nix b/pkgs/th-desugar.nix index 2b335eaf486415ede77de34996bd435c81d4d1a3..7f9ca0697db9f3c91c8c22f764823b62e6e27f74 100644 --- a/pkgs/th-desugar.nix +++ b/pkgs/th-desugar.nix @@ -18,6 +18,9 @@ mkDerivation { pname = "th-desugar"; version = "1.14"; sha256 = "dfb2d3c5f3ffec189452b1db7edb743b9b7b006cc16c19a9ece083de4bd8a7ac"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ base containers @@ -43,11 +46,15 @@ mkDerivation { th-lift th-orphans ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; homepage = "https://github.com/goldfirere/th-desugar"; description = "Functions to desugar Template Haskell"; license = lib.licenses.bsd3; + broken = false; } diff --git a/pkgs/typerep-map.nix b/pkgs/typerep-map.nix index 11e7fd10fcd7eeab35dc015f7aea23625bd0f2c9..09f5b2abadf30645717ee7ad89351899953343e7 100644 --- a/pkgs/typerep-map.nix +++ b/pkgs/typerep-map.nix @@ -24,6 +24,9 @@ mkDerivation { rev = "75b7cd5d45986be07420a6821d352ad2adc0b697"; fetchSubmodules = true; }; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ base containers @@ -47,11 +50,15 @@ mkDerivation { dependent-sum ghc-typelits-knownnat ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; homepage = "https://github.com/kowainik/typerep-map"; description = "Efficient implementation of a dependent map with types as keys"; license = lib.licenses.mpl20; + broken = false; } diff --git a/pkgs/vector-map.nix b/pkgs/vector-map.nix index fae6dcc2003d1354d933d13aad4ff4b0a43cf986..9b19adc94a2be4f577c8387fd86f48cf4714d003 100644 --- a/pkgs/vector-map.nix +++ b/pkgs/vector-map.nix @@ -26,6 +26,9 @@ mkDerivation { fetchSubmodules = true; }; postUnpack = "sourceRoot+=/libs/vector-map/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ base cardano-binary @@ -45,11 +48,15 @@ mkDerivation { tasty-quickcheck ]; benchmarkHaskellDepends = [ base containers criterion random ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; homepage = "https://github.com/input-output-hk/cardano-ledger"; description = "An efficient VMap that is backed by two vectors: one for keys and another for values"; license = lib.licenses.asl20; + broken = false; } diff --git a/pkgs/word-array.nix b/pkgs/word-array.nix index d11de84ffbc960045fb1851584196d518482204a..7c252b599a698a9596046415d4a4e9e197cf86ad 100644 --- a/pkgs/word-array.nix +++ b/pkgs/word-array.nix @@ -21,6 +21,9 @@ mkDerivation { fetchSubmodules = true; }; postUnpack = "sourceRoot+=/word-array/; echo source root reset to $sourceRoot"; + isLibrary = true; + isExecutable = false; + enableSeparateDataOutput = false; libraryHaskellDepends = [ base deepseq @@ -36,10 +39,14 @@ mkDerivation { vector ]; benchmarkHaskellDepends = [ base primitive tasty-bench ]; + enableLibraryProfiling = false; + enableExecutableProfiling = false; doHaddock = false; jailbreak = true; doCheck = false; + doBenchmark = false; hyperlinkSource = false; homepage = "https://github.com/plutus"; license = lib.licenses.asl20; + broken = false; }