;;; GNU Guix --- Functional package management for GNU ;;; Copyright © 2013 Nikita Karetnikov ;;; Copyright © 2013 Cyril Roelandt ;;; Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Ludovic Courtès ;;; Copyright © 2013, 2014 Andreas Enge ;;; Copyright © 2015, 2016 Mathieu Lirzin ;;; Copyright © 2014, 2015, 2016 Mark H Weaver ;;; Copyright © 2014, 2016 Eric Bavier ;;; Copyright © 2015, 2016, 2017, 2018 Efraim Flashner ;;; Copyright © 2015 Kyle Meyer ;;; Copyright © 2015, 2017 Ricardo Wurmus ;;; Copyright © 2016, 2017 Leo Famulari ;;; Copyright © 2016, 2017, 2018 Nils Gillmann ;;; Copyright © 2017, 2018 Tobias Geerinckx-Rice ;;; Copyright © 2017 Vasile Dumitrascu ;;; Copyright © 2017 Clément Lassieur ;;; Copyright © 2017 André ;;; Copyright © 2017, 2018 Marius Bakke ;;; Copyright © 2017 Stefan Reichör ;;; Copyright © 2017 Oleg Pykhalov ;;; Copyright © 2018 Sou Bunnbu ;;; ;;; This file is part of GNU Guix. ;;; ;;; GNU Guix is free software; you can redistribute it and/or modify it ;;; under the terms of the GNU General Public License as published by ;;; the Free Software Foundation; either version 3 of the License, or (at ;;; your option) any later version. ;;; ;;; GNU Guix is distributed in the hope that it will be useful, but ;;; WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the ;;; GNU General Public License for more details. ;;; ;;; You should have received a copy of the GNU General Public License ;;; along with GNU Guix. If not, see . (define-module (gnu packages version-control) #:use-module ((guix licenses) #:prefix license:) #:use-module (guix utils) #:use-module (guix packages) #:use-module (guix download) #:use-module (guix git-download) #:use-module (guix build-system ant) #:use-module (guix build-system cmake) #:use-module (guix build-system gnu) #:use-module (guix build-system haskell) #:use-module (guix build-system python) #:use-module (guix build-system trivial) #:use-module (gnu packages apr) #:use-module (gnu packages autotools) #:use-module (gnu packages documentation) #:use-module (gnu packages base) #:use-module (gnu packages bison) #:use-module (gnu packages boost) #:use-module (gnu packages check) #:use-module (gnu packages cook) #:use-module (gnu packages curl) #:use-module (gnu packages docbook) #:use-module (gnu packages ed) #:use-module (gnu packages file) #:use-module (gnu packages flex) #:use-module (gnu packages gettext) #:use-module (gnu packages gl) #:use-module (gnu packages groff) #:use-module (gnu packages haskell) #:use-module (gnu packages haskell-check) #:use-module (gnu packages haskell-crypto) #:use-module (gnu packages haskell-web) #:use-module (gnu packages image) #:use-module (gnu packages java) #:use-module (gnu packages linux) #:use-module (gnu packages maths) #:use-module (gnu packages nano) #:use-module (gnu packages ncurses) #:use-module (gnu packages ssh) #:use-module (gnu packages web) #:use-module (gnu packages openstack) #:use-module (gnu packages pcre) #:use-module (gnu packages perl) #:use-module (gnu packages perl-check) #:use-module (gnu packages pkg-config) #:use-module (gnu packages python) #:use-module (gnu packages python-web) #:use-module (gnu packages readline) #:use-module (gnu packages databases) #:use-module (gnu packages admin) #:use-module (gnu packages xml) #:use-module (gnu packages emacs) #:use-module (gnu packages compression) #:use-module (gnu packages sdl) #:use-module (gnu packages swig) #:use-module (gnu packages tcl) #:use-module (gnu packages textutils) #:use-module (gnu packages time) #:use-module (gnu packages tls) #:use-module (gnu packages) #:use-module (ice-9 match) #:use-module (srfi srfi-1)) (define-public bazaar (package (name "bazaar") (version "2.7.0") (source (origin (method url-fetch) (uri (string-append "https://launchpad.net/bzr/" (version-major+minor version) "/" version "/+download/bzr-" version ".tar.gz")) (patches (search-patches "bazaar-CVE-2017-14176.patch")) (sha256 (base32 "1cysix5k3wa6y7jjck3ckq3abls4gvz570s0v0hxv805nwki4i8d")))) (build-system python-build-system) (inputs ;; Note: 'tools/packaging/lp-upload-release' and 'tools/weavemerge.sh' ;; require Zsh. `(("gettext" ,gettext-minimal))) (arguments `(#:tests? #f ; no test target #:python ,python-2 ; Python 3 apparently not yet supported, see ; https://answers.launchpad.net/bzr/+question/229048 #:phases (modify-phases %standard-phases (add-after 'unpack 'fix-mandir (lambda _ (substitute* "setup.py" (("man/man1") "share/man/man1")) #t))))) (home-page "https://gnu.org/software/bazaar") (synopsis "Version control system supporting both distributed and centralized workflows") (description "GNU Bazaar is a version control system that allows you to record changes to project files over time. It supports both a distributed workflow as well as the classic centralized workflow.") (license license:gpl2+))) (define-public git (package (name "git") ;; XXX When updating Git, check if the special 'git:src' input to cgit needs ;; to be updated as well. (version "2.17.0") (source (origin (method url-fetch) (uri (string-append "mirror://kernel.org/software/scm/git/git-" version ".tar.xz")) (sha256 (base32 "1ismz7nsz8dgjmk782xr9s0mr2qh06f72pdcgbxfmnw1bvlya5p9")))) (build-system gnu-build-system) (native-inputs `(("native-perl" ,perl) ("gettext" ,gettext-minimal) ("git-manpages" ,(origin (method url-fetch) (uri (string-append "mirror://kernel.org/software/scm/git/git-manpages-" version ".tar.xz")) (sha256 (base32 "09rpjj0m97h5lpzpwk47m6xsz9gb8wqf1s3dfqma3mwav2pb3njb")))))) (inputs `(("curl" ,curl) ("expat" ,expat) ("openssl" ,openssl) ("perl" ,perl) ("python" ,python-2) ; CAVEAT: incompatible with python-3 according to INSTALL ("zlib" ,zlib) ;; For 'gitweb.cgi' ("perl-cgi" ,perl-cgi) ;; For 'git-svn'. ("subversion" ,subversion) ("perl-term-readkey" ,perl-term-readkey) ;; For 'git-send-email' ("perl-authen-sasl" ,perl-authen-sasl) ("perl-net-smtp-ssl" ,perl-net-smtp-ssl) ("perl-io-socket-ssl" ,perl-io-socket-ssl) ;; For 'git gui', 'gitk', and 'git citool'. ("tcl" ,tcl) ("tk" ,tk))) (outputs '("out" ; the core "send-email" ; for git-send-email "svn" ; git-svn "gui")) ; gitk, git gui (arguments `(#:make-flags `("V=1" ;more verbose compilation ;; By default 'make install' creates hard links for ;; things in 'libexec/git-core', which leads to huge ;; nars; see . "NO_INSTALL_HARDLINKS=indeed") #:test-target "test" ;; Tests fail randomly when parallel: . #:parallel-tests? #f ;; The explicit --with-tcltk forces the build system to hardcode the ;; absolute file name to 'wish'. #:configure-flags (list (string-append "--with-tcltk=" (assoc-ref %build-inputs "tk") "/bin/wish8.6")) ; XXX #:modules ((srfi srfi-1) ,@%gnu-build-system-modules) #:phases (modify-phases %standard-phases (add-after 'configure 'patch-makefiles (lambda _ (substitute* "Makefile" (("/bin/sh") (which "sh")) (("/usr/bin/perl") (which "perl")) (("/usr/bin/python") (which "python"))) #t)) (add-after 'configure 'add-PM.stamp (lambda _ ;; Add the "PM.stamp" to avoid "no rule to make target". (call-with-output-file "perl/PM.stamp" (const #t)) #t)) (add-before 'check 'patch-tests (lambda _ (let ((store-directory (%store-directory))) ;; These files contain some funny bytes that Guile is unable ;; to decode for shebang patching. Just delete them. (for-each delete-file '("t/t4201-shortlog.sh" "t/t7813-grep-icase-iso.sh")) ;; Many tests contain inline shell scripts (hooks etc). (substitute* (find-files "t" "\\.sh$") (("#!/bin/sh") (string-append "#!" (which "sh")))) ;; Un-do shebang patching here to prevent checksum mismatch. (substitute* '("t/t4034/perl/pre" "t/t4034/perl/post") (("^#!.*/bin/perl") "#!/usr/bin/perl")) (substitute* "t/t5003-archive-zip.sh" (("cp /bin/sh") (string-append "cp " (which "sh")))) (substitute* "t/t6030-bisect-porcelain.sh" (("\"/bin/sh\"") (string-append "\"" (which "sh") "\""))) ;; FIXME: This test runs `git commit` with a bogus EDITOR ;; and empty commit message, but does not fail the way it's ;; expected to. The test passes when invoked interactively. (substitute* "t/t7508-status.sh" (("\tcommit_template_commented") "\ttrue")) ;; More checksum mismatches due to odd shebangs. (substitute* "t/t9100-git-svn-basic.sh" (((string-append "\"#!" store-directory ".*/bin/sh")) "\"#!/bin/sh") ) (substitute* "t/t9300-fast-import.sh" (((string-append "\t#!" store-directory ".*/bin/sh")) "\t#!/bin/sh") (((string-append "'#!" store-directory ".*/bin/sh")) "'#!/bin/sh")) ;; FIXME: Some hooks fail with "basename: command not found". ;; See 't/trash directory.t9164.../svn-hook.log'. (delete-file "t/t9164-git-svn-dcommit-concurrent.sh") ;; XXX: These tests fail intermittently for unknown reasons: ;; . (for-each delete-file '("t/t9128-git-svn-cmd-branch.sh" "t/t9167-git-svn-cmd-branch-subproject.sh" "t/t9141-git-svn-multiple-branches.sh")) #t))) (add-after 'install 'install-shell-completion (lambda* (#:key outputs #:allow-other-keys) (let* ((out (assoc-ref outputs "out")) (completions (string-append out "/etc/bash_completion.d"))) ;; TODO: Install the tcsh and zsh completions in the right place. (mkdir-p completions) (copy-file "contrib/completion/git-completion.bash" (string-append completions "/git")) #t))) (add-after 'install 'split (lambda* (#:key inputs outputs #:allow-other-keys) ;; Split the binaries to the various outputs. (let* ((out (assoc-ref outputs "out")) (se (assoc-ref outputs "send-email")) (svn (assoc-ref outputs "svn")) (gui (assoc-ref outputs "gui")) (gitk (string-append out "/bin/gitk")) (gitk* (string-append gui "/bin/gitk")) (git-gui (string-append out "/libexec/git-core/git-gui")) (git-gui* (string-append gui "/libexec/git-core/git-gui")) (git-cit (string-append out "/libexec/git-core/git-citool")) (git-cit* (string-append gui "/libexec/git-core/git-citool")) (git-se (string-append out "/libexec/git-core/git-send-email")) (git-se* (string-append se "/libexec/git-core/git-send-email")) (git-svn (string-append out "/libexec/git-core/git-svn")) (git-svn* (string-append svn "/libexec/git-core/git-svn")) (git-sm (string-append out "/libexec/git-core/git-submodule"))) (mkdir-p (string-append gui "/bin")) (mkdir-p (string-append gui "/libexec/git-core")) (mkdir-p (string-append se "/libexec/git-core")) (mkdir-p (string-append svn "/libexec/git-core")) (for-each (lambda (old new) (copy-file old new) (delete-file old) (chmod new #o555)) (list gitk git-gui git-cit git-se git-svn) (list gitk* git-gui* git-cit* git-se* git-svn*)) ;; Tell 'git-svn' where Subversion and perl-term-readkey are. (wrap-program git-svn* `("PATH" ":" prefix (,(string-append (assoc-ref inputs "subversion") "/bin"))) `("PERL5LIB" ":" prefix ,(map (lambda (i) (string-append (assoc-ref inputs i) "/lib/perl5/site_perl")) '("subversion" "perl-term-readkey"))) ;; XXX: The .so for SVN/Core.pm lacks a RUNPATH, so ;; help it find 'libsvn_client-1.so'. `("LD_LIBRARY_PATH" ":" prefix (,(string-append (assoc-ref inputs "subversion") "/lib")))) ;; Tell 'git-send-email' where perl modules are. (wrap-program git-se* `("PERL5LIB" ":" prefix ,(map (lambda (o) (string-append o "/lib/perl5/site_perl")) (list ,@(transitive-input-references 'inputs (map (lambda (l) (assoc l (inputs))) '("perl-authen-sasl" "perl-net-smtp-ssl" "perl-io-socket-ssl"))))))) ;; Tell 'gitweb.cgi' where perl modules are. (wrap-program (string-append out "/share/gitweb/gitweb.cgi") `("PERL5LIB" ":" prefix ,(map (lambda (o) (string-append o "/lib/perl5/site_perl")) (list ,@(transitive-input-references 'inputs (map (lambda (l) (assoc l (inputs))) '("perl-cgi"))))))) ;; Tell 'git-submodule' where Perl is. (wrap-program git-sm `("PATH" ":" prefix (,(string-append (assoc-ref inputs "perl") "/bin")))) #t))) (add-after 'split 'install-man-pages (lambda* (#:key inputs outputs #:allow-other-keys) (let* ((out (assoc-ref outputs "out")) (man (string-append out "/share/man")) (manpages (assoc-ref inputs "git-manpages"))) (mkdir-p man) (with-directory-excursion man (invoke "tar" "xvf" manpages)))))))) (native-search-paths ;; For HTTPS access, Git needs a single-file certificate bundle, specified ;; with $GIT_SSL_CAINFO. (list (search-path-specification (variable "GIT_SSL_CAINFO") (file-type 'regular) (separator #f) ;single entry (files '("etc/ssl/certs/ca-certificates.crt"))) (search-path-specification (variable "GIT_EXEC_PATH") (separator #f) ;single entry (files '("libexec/git-core"))))) (synopsis "Distributed version control system") (description "Git is a free distributed version control system designed to handle everything from small to very large projects with speed and efficiency.") (license license:gpl2) (home-page "https://git-scm.com/"))) (define-public libgit2 (package (name "libgit2") (version "0.26.0") (source (origin (method url-fetch) (uri (string-append "https://github.com/libgit2/libgit2/" "archive/v" version ".tar.gz")) (file-name (string-append name "-" version ".tar.gz")) (sha256 (base32 "1b3figbhp5l83vd37vq6j2narrq4yl9pfw6mw0px0dzb1hz3jqka")) (patches (search-patches "libgit2-0.25.1-mtime-0.patch")) ;; Remove bundled software. (snippet '(begin (delete-file-recursively "deps") #t)) (modules '((guix build utils))))) (build-system cmake-build-system) (outputs '("out" "debug")) (arguments `(#:configure-flags '("-DUSE_SHA1DC=ON") ; SHA-1 collision detection #:phases (modify-phases %standard-phases (add-after 'unpack 'fix-hardcoded-paths (lambda _ (substitute* "tests/repo/init.c" (("#!/bin/sh") (string-append "#!" (which "sh")))) (substitute* "tests/clar/fs.h" (("/bin/cp") (which "cp")) (("/bin/rm") (which "rm"))) #t)) ;; Run checks more verbosely. (replace 'check (lambda _ (zero? (system* "./libgit2_clar" "-v" "-Q"))))))) (inputs `(("libssh2" ,libssh2) ("http-parser" ,http-parser) ("python" ,python-wrapper))) (native-inputs `(("pkg-config" ,pkg-config))) (propagated-inputs ;; These two libraries are in 'Requires.private' in libgit2.pc. `(("openssl" ,openssl) ("zlib" ,zlib))) (home-page "https://libgit2.github.com/") (synopsis "Library providing Git core methods") (description "Libgit2 is a portable, pure C implementation of the Git core methods provided as a re-entrant linkable library with a solid API, allowing you to write native speed custom Git applications in any language with bindings.") ;; GPLv2 with linking exception (license license:gpl2))) (define-public git-crypt (package (name "git-crypt") (version "0.5.0") (source (origin (method url-fetch) (uri (string-append "https://github.com/AGWA/git-crypt" "/archive/" version ".tar.gz")) (file-name (string-append name "-" version ".tar.gz")) (sha256 (base32 "0454fdmgm5f3razkn8n03lfqm5zyzvr4r2528zmlxiwba9518l2i")))) (build-system gnu-build-system) (inputs `(("git" ,git) ("openssl" ,openssl))) (arguments `(#:tests? #f ; No tests. #:phases (modify-phases %standard-phases (delete 'configure) (replace 'build (lambda _ (zero? (system* "make")))) (replace 'install (lambda* (#:key outputs #:allow-other-keys) (let ((out (assoc-ref outputs "out"))) (zero? (system* "make" "install" (string-append "PREFIX=" out))))))))) (home-page "https://www.agwa.name/projects/git-crypt") (synopsis "Transparent encryption of files in a git repository") (description "git-crypt enables transparent encryption and decryption of files in a git repository. Files which you choose to protect are encrypted when committed, and decrypted when checked out. git-crypt lets you freely share a repository containing a mix of public and private content. git-crypt gracefully degrades, so developers without the secret key can still clone and commit to a repository with encrypted files. This lets you store your secret material (such as keys or passwords) in the same repository as your code, without requiring you to lock down your entire repository.") (license license:gpl3+))) (define-public git-remote-gcrypt (package (name "git-remote-gcrypt") (version "1.0.3") (source (origin (method git-fetch) (uri (git-reference (url "https://git.spwhitton.name/git-remote-gcrypt") (commit version))) (file-name (string-append name "-" version "-checkout")) (sha256 (base32 "1vay3204729c7wajgn3nxf0s0hzwpdrw14pl6kd8w2ss25gvw2k1")))) (build-system trivial-build-system) (arguments `(#:modules ((guix build utils)) #:builder (begin (use-modules (guix build utils)) (let* ((source (assoc-ref %build-inputs "source")) (output (assoc-ref %outputs "out")) (bindir (string-append output "/bin"))) (install-file (string-append source "/git-remote-gcrypt") bindir) #t)))) (home-page "https://spwhitton.name/tech/code/git-remote-gcrypt/") (synopsis "Whole remote repository encryption") (description "git-remote-gcrypt is a Git remote helper to push and pull from repositories encrypted with GnuPG. It works with the standard Git transports, including repository hosting services like GitLab. Remote helper programs are invoked by Git to handle network transport. This helper handles @code{gcrypt:} URLs that access a remote repository encrypted with GPG, using our custom format. Supported locations are local, @code{rsync://} and @code{sftp://}, where the repository is stored as a set of files, or instead any Git URL where gcrypt will store the same representation in a Git repository, bridged over arbitrary Git transport. The aim is to provide confidential, authenticated Git storage and collaboration using typical untrusted file hosts or services.") (license license:gpl3+))) (define-public cgit (package (name "cgit") ;; XXX When updating cgit, try removing the special 'git:src' input and ;; using the source of the git package. (version "1.1") (source (origin (method url-fetch) (uri (string-append "https://git.zx2c4.com/cgit/snapshot/cgit-" version ".tar.xz")) (sha256 (base32 "142qcgs8dwnzhymn0a7xx47p9fc2z5wrb86ah4a9iz0mpqlsz288")))) (build-system gnu-build-system) (arguments '(#:tests? #f ; XXX: fail to build the in-source git. #:test-target "test" #:make-flags '("CC=gcc" "SHELL_PATH=sh") #:phases (modify-phases %standard-phases (add-after 'unpack 'unpack-git (lambda* (#:key inputs #:allow-other-keys) ;; Unpack the source of git into the 'git' directory. (zero? (system* "tar" "--strip-components=1" "-C" "git" "-xf" (assoc-ref inputs "git:src"))))) (add-after 'unpack 'patch-absolute-file-names (lambda* (#:key inputs #:allow-other-keys) (define (quoted-file-name input path) (string-append "\"" input path "\"")) (substitute* "ui-snapshot.c" (("\"gzip\"") (quoted-file-name (assoc-ref inputs "gzip") "/bin/gzip")) (("\"bzip2\"") (quoted-file-name (assoc-ref inputs "bzip2") "/bin/bzip2")) (("\"xz\"") (quoted-file-name (assoc-ref inputs "xz") "/bin/xz"))) #t)) (delete 'configure) ; no configure script (add-after 'build 'build-man (lambda* (#:key make-flags #:allow-other-keys) (zero? (apply system* `("make" ,@make-flags "doc-man"))))) (replace 'install (lambda* (#:key make-flags outputs #:allow-other-keys) (let ((out (assoc-ref outputs "out"))) (and (zero? (apply system* `("make" ,@make-flags ,(string-append "prefix=" out) ,(string-append "CGIT_SCRIPT_PATH=" out "/share/cgit") "install" "install-man"))) ;; Move the platform-dependent 'cgit.cgi' into lib ;; to get it stripped. (rename-file (string-append out "/share/cgit/cgit.cgi") (string-append out "/lib/cgit/cgit.cgi")) #t))))))) (native-inputs ;; For building manpage. `(("asciidoc" ,asciidoc) ("gzip" ,gzip) ("bzip2" ,bzip2) ("xz" ,xz))) (inputs `(;; Cgit directly accesses some internal Git interfaces that changed in ;; Git 2.12. Try removing this special input and using the source of the ;; Git package for cgit > 1.1. ("git:src" ,(origin (method url-fetch) (uri "mirror://kernel.org/software/scm/git/git-2.10.5.tar.xz") (sha256 (base32 "1r2aa19gnrvm2y4fqcvpw1g9l72n48axqmpgv18s6d0y2p72vhzj")))) ("openssl" ,openssl) ("zlib" ,zlib))) (home-page "https://git.zx2c4.com/cgit/") (synopsis "Web frontend for git repositories") (description "CGit is an attempt to create a fast web interface for the Git SCM, using a built-in cache to decrease server I/O pressure.") (license license:gpl2))) (define-public python-ghp-import (package (name "python-ghp-import") (version "0.5.5") (source (origin (method url-fetch) (uri (string-append "https://github.com/davisp/ghp-import/archive/" version ".tar.gz")) (file-name (string-append name "-" version ".tar.gz")) (sha256 (base32 "0x887v690xsac2hzjkpbvp3a6crh3m08mqbk3nb4xwc9dnk869q7")))) (build-system python-build-system) (arguments `(#:phases (modify-phases %standard-phases (add-after 'install 'install-documentation (lambda* (#:key outputs #:allow-other-keys) (let* ((out (assoc-ref outputs "out")) (doc (string-append out "/share/doc")) (licenses (string-append out "/share/licenses"))) (install-file "README.md" doc) (install-file "LICENSE" licenses))))))) (home-page "https://github.com/davisp/ghp-import") (synopsis "Copy directory to the gh-pages branch") (description "Script that copies a directory to the gh-pages branch (by default) of the repository.") ;; See . (license (license:non-copyleft "https://raw.githubusercontent.com/davisp/ghp-import/master/LICENSE" "Tumbolia Public License")))) (define-public python2-ghp-import (package-with-python2 (strip-python2-variant python-ghp-import))) (define-public python-gitdb (package (name "python-gitdb") (version "2.0.3") (source (origin (method url-fetch) (uri (pypi-uri "gitdb2" version)) (sha256 (base32 "02azg62mr99b7cllyjrly77np3vw32y8nrxpa2xjapiyaga2j3mn")))) (build-system python-build-system) (arguments `(#:phases (modify-phases %standard-phases (add-before 'check 'create-test-repository (lambda _ (mkdir "/tmp/testrepo") ;; Some tests require a git repository, so create one. (with-directory-excursion "/tmp/testrepo" (do ((filecount 1 (1+ filecount))) ((> filecount 1000)) (call-with-output-file (string-append "file" (number->string filecount)) (lambda (port) (format port "~a" filecount)))) (and (invoke "git" "init") (invoke "git" "config" "user.name" "Total Git") (invoke "git" "config" "user.email" "git@localhost") (invoke "git" "add" "-A") (invoke "git" "commit" "-q" "-m" "dummy commit"))) ;; The repository checkout must be a "bare" clone. (invoke "git" "clone" "--bare" "/tmp/testrepo" "/tmp/testrepo.git"))) (replace 'check (lambda _ (setenv "GITDB_TEST_GIT_REPO_BASE" "/tmp/testrepo.git") ;; Skip tests that must be run from the gitdb repository. (setenv "TRAVIS" "1") (invoke "nosetests" "-v")))))) (propagated-inputs `(("python-smmap2" ,python-smmap2))) (native-inputs `(("git" ,git) ("python-nose" ,python-nose))) (home-page "https://github.com/gitpython-developers/gitdb") (synopsis "Python implementation of the Git object database") (description "GitDB allows you to access @dfn{bare} Git repositories for reading and writing. It aims at allowing full access to loose objects as well as packs with performance and scalability in mind. It operates exclusively on streams, allowing to handle large objects with a small memory footprint.") (license license:bsd-3))) (define-public python2-gitdb (package-with-python2 python-gitdb)) (define-public python-gitpython (package (name "python-gitpython") (version "2.1.9") (source (origin (method url-fetch) (uri (pypi-uri "GitPython" version)) (sha256 (base32 "0a9in1jfv9ssxhckl6sasw45bhm762y2r5ikgb2pk2g8yqdc6z64")))) (build-system python-build-system) (arguments `(#:tests? #f ;XXX: Tests can only be run within the GitPython repository. #:phases (modify-phases %standard-phases (add-after 'unpack 'embed-git-reference (lambda* (#:key inputs #:allow-other-keys) (substitute* "git/cmd.py" (("git_exec_name = \"git\"") (string-append "git_exec_name = \"" (assoc-ref inputs "git") "/bin/git\""))) #t))))) (inputs `(("git" ,git))) (propagated-inputs `(("python-gitdb" ,python-gitdb))) (native-inputs `(("python-ddt" ,python-ddt) ("python-nose" ,python-nose))) (home-page "https://github.com/gitpython-developers/GitPython") (synopsis "Python library for interacting with Git repositories") (description "GitPython is a python library used to interact with Git repositories, high-level like git-porcelain, or low-level like git-plumbing. It provides abstractions of Git objects for easy access of repository data, and additionally allows you to access the Git repository more directly using either a pure Python implementation, or the faster, but more resource intensive @command{git} command implementation.") (license license:bsd-3))) (define-public python2-gitpython (package-with-python2 python-gitpython)) (define-public shflags (package (name "shflags") (version "1.2.3") (source (origin (method url-fetch) (uri (string-append "https://github.com/kward/shflags/archive/v" version ".tar.gz")) (file-name (string-append name "-" version ".tar.gz")) (sha256 (base32 "1h9xfrwwdhzflipfwdcgcc3y7zapdslnyk1rg5y8jm7k144rfrs4")))) (build-system gnu-build-system) (native-inputs `(("tar" ,tar) ("gzip" ,gzip))) (arguments `(#:tests? #f ; no tests #:phases (modify-phases %standard-phases (delete 'configure) ; nothing to configure (delete 'build) ; nothing to build (replace 'install (lambda* (#:key outputs #:allow-other-keys) (let* ((out (assoc-ref outputs "out")) (src (string-append out "/src"))) (install-file "shflags" src) #t)))))) (home-page "https://github.com/kward/shflags") (synopsis "Command-line flags library for shell scripts") (description "Shell Flags (shFlags) is a library written to greatly simplify the handling of command-line flags in Bourne based Unix shell scripts (bash, dash, ksh, sh, zsh). Most shell scripts use getopt for flags processing, but the different versions of getopt on various OSes make writing portable shell scripts difficult. shFlags instead provides an API that doesn't change across shell and OS versions so the script writer can be confident that the script will work.") (license license:lgpl2.1))) (define-public git-flow (package (name "git-flow") ;; This version has not be officially released yet, so we build it ;; directly from the git repository. (version "0.4.2-pre") (source (origin (method git-fetch) (uri (git-reference (url "https://github.com/nvie/gitflow/") (commit "15aab26490facf285acef56cb5d61025eacb3a69"))) (file-name (git-file-name name version)) (sha256 (base32 "01fs97q76fdfnvmrh2cyjhywcs3pykf1dg58sy0frflnsdzs6prx")))) (build-system gnu-build-system) (inputs `(("shflags" ,shflags))) (arguments '(#:tests? #f ; no tests #:make-flags (list (string-append "prefix=" (assoc-ref %outputs "out"))) #:phases (modify-phases %standard-phases (add-after 'unpack 'reset-shFlags-link (lambda* (#:key inputs #:allow-other-keys) ;; The link points to a file in the shFlags submodule. ;; Redirect it to point to our system shFlags. (let ((shflags (assoc-ref inputs "shflags"))) (begin (delete-file "gitflow-shFlags") (symlink (string-append shflags "/src/shflags") "gitflow-shFlags"))))) (delete 'configure) (delete 'build)))) (home-page "http://nvie.com/posts/a-successful-git-branching-model/") (synopsis "Git extensions for Vincent Driessen's branching model") (description "Vincent Driessen's branching model is a git branching and release management strategy that helps developers keep track of features, hotfixes, and releases in bigger software projects. The git-flow library of git subcommands helps automate some parts of the flow to make working with it a lot easier.") (license license:bsd-2))) (define-public stgit (package (name "stgit") (version "0.18") (source (origin (method url-fetch) (uri (string-append "https://github.com/ctmarinas/stgit/archive/v" version ".tar.gz")) (file-name (string-append name "-" version ".tar.gz")) (sha256 (base32 "19fk6vw3pgp2a98wpd4j3kyiyll5dy9bi4921wq1mrky0l53mj00")))) (build-system python-build-system) (inputs `(("git" ,git))) (arguments `(#:python ,python-2 #:phases (modify-phases %standard-phases (replace 'check (lambda _ ;; two tests will fail -> disable them. TODO: fix the failing tests (delete-file "t/t3300-edit.sh") (delete-file "t/t7504-commit-msg-hook.sh") (zero? (system* "make" "test"))))))) (home-page "http://procode.org/stgit/") (synopsis "Stacked Git") (description "StGit is a command-line application that provides functionality similar to Quilt (i.e., pushing/popping patches to/from a stack), but using Git instead of @command{diff} and @command{patch}. StGit stores its patches in a Git repository as normal Git commits, and provides a number of commands to manipulate them in various ways.") (license license:gpl2))) (define-public vcsh (package (name "vcsh") (version "1.20151229") (source (origin (method url-fetch) (uri (string-append "https://github.com/RichiH/vcsh/archive/v" version ".tar.gz")) (file-name (string-append name "-" version ".tar.gz")) (sha256 (base32 "1ym3swkh738c3vciffvlr96vqzhwmzkb8ajqzap8f0j9n039a1mf")))) (build-system gnu-build-system) (native-inputs `(("which" ,which))) (inputs `(("git" ,git) ("perl" ,perl) ("perl-test-harness" ,perl-test-harness) ("perl-shell-command" ,perl-shell-command) ("perl-test-most" ,perl-test-most))) (arguments '(#:phases (modify-phases %standard-phases (delete 'configure) (delete 'build)) #:make-flags (list (string-append "PREFIX=" (assoc-ref %outputs "out"))) #:test-target "test")) (home-page "https://github.com/RichiH/vcsh") (synopsis "Version control system for @code{$HOME}") (description "vcsh version-controls configuration files in several Git repositories, all in one single directory. They all maintain their working trees without clobbering each other or interfering otherwise. By default, all Git repositories maintained via vcsh store the actual files in @code{$HOME}, though this can be overridden.") (license license:gpl2+))) (define-public git-test-sequence (let ((commit "48e5a2f5a13a5f30452647237e23362b459b9c76")) (package (name "git-test-sequence") (version (string-append "20140312." (string-take commit 7))) (source (origin (method git-fetch) (uri (git-reference ;; There are many other scripts in this directory; we ;; are interested in just one for this package. (url "https://github.com/dustin/bindir") (commit commit))) (file-name (git-file-name name version)) (sha256 (base32 "1dcq0y16yznbv4k9h8gg90kv1gkn8r8dbvl4m2rpfd7q5nqhn617")))) (build-system trivial-build-system) (arguments `(#:modules ((guix build utils)) #:builder (begin (use-modules (guix build utils)) (let* ((source (assoc-ref %build-inputs "source")) (output (assoc-ref %outputs "out")) (bindir (string-append output "/bin")) (script "git-test-sequence")) (install-file (string-append source "/" script) bindir) #t)))) (home-page "http://dustin.sallings.org/2010/03/28/git-test-sequence.html") (synopsis "Run a command over a sequence of commits") (description "git-test-sequence is similar to an automated git bisect except it’s linear. It will test every change between two points in the DAG. It will also walk each side of a merge and test those changes individually.") (license (license:x11-style "file://LICENSE"))))) (define-public gitolite (package (name "gitolite") (version "3.6.7") (source (origin (method url-fetch) (uri (string-append "https://github.com/sitaramc/gitolite/archive/v" version ".tar.gz")) (file-name (string-append name "-" version ".tar.gz")) (sha256 (base32 "1idxipg0df80bhjcxgwxs3lllqnkvhwpinmfv1xvg1l98fxiapgp")))) (build-system gnu-build-system) (arguments '(#:tests? #f ; no tests #:phases (modify-phases %standard-phases (delete 'configure) (delete 'build) (add-before 'install 'patch-scripts (lambda* (#:key inputs #:allow-other-keys) (let ((perl (string-append (assoc-ref inputs "perl") "/bin/perl"))) ;; This seems to take care of every shell script that ;; invokes Perl. (substitute* (find-files "." ".*") ((" perl -") (string-append " " perl " -"))) ;; Avoid references to the store in authorized_keys. ;; This works because gitolite-shell is in the PATH. (substitute* "src/triggers/post-compile/ssh-authkeys" (("\\$glshell \\$user") "gitolite-shell $user")) #t))) (replace 'install (lambda* (#:key outputs #:allow-other-keys) (let* ((output (assoc-ref outputs "out")) (sharedir (string-append output "/share/gitolite")) (bindir (string-append output "/bin"))) (mkdir-p sharedir) (mkdir-p bindir) (invoke "./install" "-to" sharedir) ;; Create symlinks for executable scripts in /bin. (for-each (lambda (script) (symlink (string-append sharedir "/" script) (string-append bindir "/" script))) '("gitolite" "gitolite-shell")) #t)))))) (inputs `(("perl" ,perl))) ;; git and openssh are propagated because trying to patch the source via ;; regexp matching is too brittle and prone to false positives. (propagated-inputs `(("git" ,git) ("openssh" ,openssh))) (home-page "http://gitolite.com") (synopsis "Git access control layer") (description "Gitolite is an access control layer on top of Git, providing fine access control to Git repositories.") (license license:gpl2))) (define-public mercurial (package (name "mercurial") (version "4.4.1") (source (origin (method url-fetch) (uri (string-append "https://www.mercurial-scm.org/" "release/mercurial-" version ".tar.gz")) (sha256 (base32 "0ik2ypzxjr6vpcghxvn39a73gw52629n7vwak04gnbycsq95aalg")))) (build-system python-build-system) (arguments `(;; Restrict to Python 2, as Python 3 would require ;; the argument --c2to3. #:python ,python-2 ;; FIXME: Disabled tests because they require the nose unit ;; testing framework: https://nose.readthedocs.org/en/latest/ . #:tests? #f)) (home-page "https://www.mercurial-scm.org/") (synopsis "Decentralized version control system") (description "Mercurial is a free, distributed source control management tool. It efficiently handles projects of any size and offers an easy and intuitive interface.") (license license:gpl2+))) (define-public neon (package (name "neon") (version "0.30.2") (source (origin (method url-fetch) (uri (string-append "http://www.webdav.org/neon/neon-" version ".tar.gz")) (sha256 (base32 "1jpvczcx658vimqm7c8my2q41fnmjaf1j03g7bsli6rjxk6xh2yv")))) (build-system gnu-build-system) (native-inputs `(("perl" ,perl) ("pkg-config" ,pkg-config))) (inputs `(("libxml2" ,libxml2) ("openssl" ,openssl) ("zlib" ,zlib))) (arguments `(;; FIXME: Add tests once reverse address lookup is fixed in glibc, see ;; https://sourceware.org/bugzilla/show_bug.cgi?id=16475 #:tests? #f #:configure-flags '("--enable-shared" ;; requires libgnutils-config, deprecated ;; in gnutls 2.8. ; "--with-ssl=gnutls"))) "--with-ssl=openssl"))) (home-page "http://www.webdav.org/neon/") (synopsis "HTTP and WebDAV client library") (description "Neon is an HTTP and WebDAV client library, with a C interface and the following features: @enumerate @item High-level wrappers for common HTTP and WebDAV operations (GET, MOVE, DELETE, etc.); @item low-level interface to the HTTP request/response engine, allowing the use of arbitrary HTTP methods, headers, etc.; @item authentication support including Basic and Digest support, along with GSSAPI-based Negotiate on Unix, and SSPI-based Negotiate/NTLM on Win32; @item SSL/TLS support using OpenSSL or GnuTLS, exposing an abstraction layer for verifying server certificates, handling client certificates, and examining certificate properties, smartcard-based client certificates are also supported via a PKCS#11 wrapper interface; @item abstract interface to parsing XML using libxml2 or expat, and wrappers for simplifying handling XML HTTP response bodies; @item WebDAV metadata support, wrappers for PROPFIND and PROPPATCH to simplify property manipulation. @end enumerate\n") (license license:gpl2+))) ; for documentation and tests; source under lgpl2.0+ (define-public subversion (package (name "subversion") (version "1.10.0") (source (origin (method url-fetch) (uri (list (string-append "https://archive.apache.org/dist/subversion/" "subversion-" version ".tar.bz2") (string-append "https://www-eu.apache.org/dist/subversion/" "subversion-" version ".tar.bz2"))) (sha256 (base32 "115mlvmf663w16mc3xyypnaizq401vbypc56hl2ylzc3pcx3zwic")))) (build-system gnu-build-system) (arguments '(#:phases (modify-phases %standard-phases (add-after 'configure 'patch-libtool-wrapper-ls (lambda* (#:key inputs #:allow-other-keys) ;; This substitution allows tests svnauthz_tests and svnlook_tests ;; to pass. These tests execute svnauthz and svnlook through ;; their libtool wrapper scripts from svn hooks, whose empty ;; environments cause "ls: command not found" errors. It would be ;; nice if this fix ultimately made its way into libtool. (let ((coreutils (assoc-ref inputs "coreutils"))) (substitute* "libtool" (("\\\\`ls") (string-append "\\`" coreutils "/bin/ls"))) #t))) (add-before 'build 'patch-test-sh (lambda _ (substitute* "subversion/tests/libsvn_repos/repos-test.c" (("#!/bin/sh") (string-append "#!" (which "sh")))) #t)) (add-after 'install 'install-perl-bindings (lambda* (#:key outputs #:allow-other-keys) ;; Follow the instructions from 'subversion/bindings/swig/INSTALL'. (let ((out (assoc-ref outputs "out"))) (invoke "make" "swig-pl-lib") ;; FIXME: Test failures. ;; (invoke "make" "check-swig-pl") (invoke "make" "install-swig-pl-lib") ;; Set the right installation prefix. (with-directory-excursion "subversion/bindings/swig/perl/native" (invoke "perl" "Makefile.PL" "NO_PERLLOCAL=1" (string-append "PREFIX=" out)) (invoke "make" "install" (string-append "OTHERLDFLAGS=" "-Wl,-rpath=" out "/lib"))))))))) (native-inputs `(("pkg-config" ,pkg-config) ;; For the Perl bindings. ("swig" ,swig))) (inputs `(("apr" ,apr) ("apr-util" ,apr-util) ("lz4" ,lz4) ("serf" ,serf) ("perl" ,perl) ("python" ,python-wrapper) ("sqlite" ,sqlite) ("utf8proc" ,utf8proc) ("zlib" ,zlib))) (home-page "https://subversion.apache.org/") (synopsis "Revision control system") (description "Subversion exists to be universally recognized and adopted as a centralized version control system characterized by its reliability as a safe haven for valuable data; the simplicity of its model and usage; and its ability to support the needs of a wide variety of users and projects, from individuals to large-scale enterprise operations.") (license license:asl2.0))) (define-public rcs (package (name "rcs") (version "5.9.4") (source (origin (method url-fetch) (uri (string-append "mirror://gnu/rcs/rcs-" version ".tar.xz")) (sha256 (base32 "1zsx7bb0rgvvvisiy4zlixf56ay8wbd9qqqcp1a1g0m1gl6mlg86")) (patches (search-patches "rcs-5.9.4-noreturn.patch")))) (build-system gnu-build-system) (native-inputs `(("ed" ,ed))) (home-page "https://www.gnu.org/software/rcs/") (synopsis "Per-file local revision control system") (description "RCS is the original Revision Control System. It works on a file-by-file basis, in contrast to subsequent version control systems such as CVS, Subversion, and Git. This can make it suitable for system administration files, for example, which are often inherently local to one machine.") (license license:gpl3+))) (define-public cvs (package (name "cvs") (version "1.12.13") (source (origin (method url-fetch) (uri (string-append "https://ftp.gnu.org/non-gnu/cvs/source/feature/" version "/cvs-" version ".tar.bz2")) (patches (search-patches "cvs-2017-12836.patch")) (sha256 (base32 "0pjir8cwn0087mxszzbsi1gyfc6373vif96cw4q3m1x6p49kd1bq")))) (build-system gnu-build-system) (arguments ;; XXX: The test suite looks flawed, and the package is obsolete anyway. '(#:tests? #f #:configure-flags (list "--with-external-zlib"))) (inputs `(("zlib" ,zlib) ("nano" ,nano))) ; the default editor (home-page "http://cvs.nongnu.org") (synopsis "Historical centralized version control system") (description "CVS is a version control system, an important component of Source Configuration Management (SCM). Using it, you can record the history of sources files, and documents. It fills a similar role to the free software RCS, PRCS, and Aegis packages.") (license license:gpl1+))) (define-public cvs-fast-export (package (name "cvs-fast-export") (version "1.43") (source (origin (method url-fetch) (uri (string-append "http://www.catb.org/~esr/" name "/" name "-" version ".tar.gz")) (sha256 (base32 "17xp5q4cxmd6z0ii1fdr4j1djb9mz1qv7hzr6fawdapjzahi65m3")))) (build-system gnu-build-system) (arguments '(#:phases (modify-phases %standard-phases (delete 'configure) (add-after 'unpack 'remove-optimizations (lambda _ ;; Don't optimize for a specific processor architecture. (substitute* "Makefile" (("CFLAGS \\+= -march=native") "")) ;; This code runs with Python2 or Python3 (substitute* "cvsreduce" (("python3") "python")) #t))) #:parallel-build? #f ; parallel a2x commands fail spectacularly #:make-flags (list "CC=gcc" (string-append "prefix?=" (assoc-ref %outputs "out"))))) (inputs `(("git" ,git))) (native-inputs `(("asciidoc" ,asciidoc) ;; These are needed for the tests. ("cvs" ,cvs) ("python" ,python-2) ("rcs" ,rcs))) (home-page "http://www.catb.org/esr/cvs-fast-export/") (synopsis "Export an RCS or CVS history as a fast-import stream") (description "This program analyzes a collection of RCS files in a CVS repository (or outside of one) and, when possible, emits an equivalent history in the form of a fast-import stream. Not all possible histories can be rendered this way; the program tries to emit useful warnings when it can't. The program can also produce a visualization of the resulting commit directed acyclic graph (DAG) in the input format of @uref{http://www.graphviz.org, Graphviz}. The package also includes @command{cvssync}, a tool for mirroring masters from remote CVS hosts.") (license license:gpl2+))) (define-public vc-dwim (package (name "vc-dwim") (version "1.8") (source (origin (method url-fetch) (uri (string-append "mirror://gnu/vc-dwim/vc-dwim-" version ".tar.xz")) (sha256 (base32 "0d5sqafc40l878m8wjr35jxmalj4kam1m6ph60v08ng4ml5g7931")))) (build-system gnu-build-system) (inputs `(("perl" ,perl) ("inetutils" ,inetutils))) ; for `hostname', used in the tests (native-inputs `(("emacs" ,emacs-minimal))) ; for `ctags' (home-page "https://www.gnu.org/software/vc-dwim/") (synopsis "Version-control-agnostic ChangeLog diff and commit tool") (description "The vc-dwim package contains two tools, \"vc-dwim\" and \"vc-chlog\". vc-dwim is a tool that simplifies the task of maintaining a ChangeLog and using version control at the same time, for example by printing a reminder when a file change has been described in the ChangeLog but the file has not been added to the VC. vc-chlog scans changed files and generates standards-compliant ChangeLog entries based on the changes that it detects.") (license license:gpl3+))) (define-public diffstat (package (name "diffstat") (version "1.61") (source (origin (method url-fetch) (uri (list (string-append "ftp://invisible-island.net/diffstat/" name "-" version ".tgz") (string-append "http://invisible-mirror.net/archives/diffstat/" name "-" version ".tgz"))) (sha256 (base32 "1vjmda2zfjxg0qkaj8hfqa8g6bfwnn1ja8696rxrjgqq4w69wd95")))) (build-system gnu-build-system) (home-page "https://invisible-island.net/diffstat/") (synopsis "Make histograms from the output of @command{diff}") (description "Diffstat reads the output of @command{diff} and displays a histogram of the insertions, deletions, and modifications per file. It is useful for reviewing large, complex patch files.") (license (license:x11-style "file://COPYING")))) (define-public cssc (package (name "cssc") (version "1.4.0") (source (origin (method url-fetch) (uri (string-append "mirror://gnu/" name "/CSSC-" version ".tar.gz")) (sha256 (base32 "15191dh8hr46cvssmv4v52gymiiyk6ca9j1bfimlqakcqab6y51h")))) (build-system gnu-build-system) (arguments `(#:phases (modify-phases %standard-phases (add-before 'check 'precheck (lambda _ (begin (substitute* "tests/common/test-common" (("/bin/pwd") (which "pwd"))) (substitute* "tests/prt/all-512.sh" (("/bin/sh") (which "sh"))) ;; XXX: This test has no hope of passing until there is a "nogroup" ;; entry (or at least some group to which the guix builder does ;; not belong) in the /etc/group file of the build environment. ;; Currently we do not have such a group. Disable this test for now. (substitute* "tests/Makefile" (("test-delta ") "")))))))) ;; These are needed for the tests (native-inputs `(("git" ,git) ("cvs" ,cvs))) (home-page "https://www.gnu.org/software/cssc/") (synopsis "File-based version control like SCCS") (description "GNU CSSC provides a replacement for the legacy Unix source code control system SCCS. This allows old code still under that system to be accessed and migrated on modern systems.") (license license:gpl3+))) ;; This package can unfortunately work only in -TEST mode, since Aegis ;; requires that it is installed setuid root. (define-public aegis (package (name "aegis") (version "4.24") (source (origin (method url-fetch) (uri (string-append "mirror://sourceforge/aegis/aegis/" version "/aegis-" version ".tar.gz")) (sha256 (base32 "18s86ssarfmc4l17gbpzybca29m5wa37cbaimdji8czlcry3mcjl")) (patches (search-patches "aegis-perl-tempdir1.patch" "aegis-perl-tempdir2.patch" "aegis-test-fixup-1.patch" "aegis-test-fixup-2.patch" "aegis-constness-error.patch")))) (build-system gnu-build-system) (inputs `(("e2fsprogs" ,e2fsprogs) ("curl" ,curl) ("file" ,file) ("libxml2" ,libxml2) ("zlib" ,zlib) ("gettext" ,gettext-minimal))) (native-inputs `(("bison" ,bison) ("groff" ,groff) ("perl" ,perl) ;; Various tests require the following: ("cvs" ,cvs) ("flex" ,flex) ("cook" ,cook) ("subversion" ,subversion) ("rcs" ,rcs) ("ed" ,ed))) (arguments `(#:configure-flags (list "--with-no-aegis-configured" "--sharedstatedir=/var/com/aegis") #:parallel-build? #f ; There are some nasty racy rules in the Makefile. #:phases (modify-phases %standard-phases (add-before 'configure 'pre-conf (lambda _ (substitute* (append '("configure" "etc/check-tar-gz.sh" "etc/patches.sh" "etc/test.sh" "script/aexver.in" "script/aebisect.in" "script/aeintegratq.in" "script/tkaegis.in" "script/test_funcs.in" "web/eg_oss_templ.sh" "web/webiface.html" "libaegis/getpw_cache.cc") (find-files "test" "\\.sh")) (("/bin/sh") (which "sh"))) (setenv "SH" (which "sh")))) (replace 'check (lambda _ (let ((home (string-append (getcwd) "/my-new-home"))) ;; Some tests need to write to $HOME. (mkdir home) (setenv "HOME" home) ;; This test assumes that flex has been symlinked to "lex". (substitute* "test/00/t0011a.sh" (("type lex") "type flex")) ;; The author decided to call the check rule "sure". (zero? (system* "make" "sure")))))))) (home-page "http://aegis.sourceforge.net") (synopsis "Project change supervisor") (description "Aegis is a project change supervisor, and performs some of the Software Configuration Management needed in a CASE environment. Aegis provides a framework within which a team of developers may work on many changes to a program independently, and Aegis coordinates integrating these changes back into the master source of the program, with as little disruption as possible. Resolution of contention for source files, a major headache for any project with more than one developer, is one of Aegis's major functions.") (license license:gpl3+))) (define-public reposurgeon (package (name "reposurgeon") (version "3.43") (source (origin (method url-fetch) (uri (string-append "http://www.catb.org/~esr/" name "/" name "-" version ".tar.xz")) (sha256 (base32 "1af0z14wcm4bk5a9ysinbwq2fp3lf5f7i8mvwh7286hr3fnagcaz")) (patches (search-patches "reposurgeon-add-missing-docbook-files.patch")))) (build-system gnu-build-system) (arguments `(#:make-flags (list "ECHO=echo" (string-append "target=" (assoc-ref %outputs "out"))) #:phases (modify-phases %standard-phases (add-after 'unpack 'patch-inputs (lambda* (#:key inputs #:allow-other-keys) (let ((tzdata (assoc-ref inputs "tzdata"))) (substitute* "reposurgeon" (("/usr/share/zoneinfo") (string-append tzdata "/share/zoneinfo"))) (substitute* "test/svn-to-svn" (("/bin/echo") "echo")) #t))) (delete 'configure) ; no configure script (add-before 'build 'fix-docbook (lambda* (#:key inputs #:allow-other-keys) (substitute* (find-files "." "\\.xml$") (("docbook/docbookx.dtd") (string-append (assoc-ref inputs "docbook-xml") "/xml/dtd/docbook/docbookx.dtd"))) #t)) (add-before 'check 'set-up-test-environment (lambda* (#:key inputs #:allow-other-keys) (let ((tzdata (assoc-ref inputs "tzdata"))) (setenv "TZDIR" (string-append tzdata "/share/zoneinfo")) #t))) (add-after 'install 'install-emacs-data (lambda* (#:key outputs #:allow-other-keys) (install-file "reposurgeon-mode.el" (string-append (assoc-ref outputs "out") "/share/emacs/site-lisp")) #t))))) (inputs `(("python" ,python-wrapper) ("tzdata" ,tzdata))) (native-inputs `( ;; For building documentation. ("asciidoc" ,asciidoc) ("docbook-xml" ,docbook-xml) ("docbook-xsl" ,docbook-xsl) ("libxml2" ,libxml2) ("xmlto" ,xmlto) ;; For tests. ("cvs" ,cvs) ("git" ,git) ("mercurial" ,mercurial) ("subversion" ,subversion))) (home-page "http://www.catb.org/~esr/reposurgeon/") (synopsis "Edit version-control repository history") (description "Reposurgeon enables risky operations that version-control systems don't want to let you do, such as editing past comments and metadata and removing commits. It works with any version control system that can export and import Git fast-import streams, including Git, Mercurial, Fossil, Bazaar, CVS, RCS, and Src. It can also read Subversion dump files directly and can thus be used to script production of very high-quality conversions from Subversion to any supported Distributed Version Control System (DVCS).") ;; Most files are distributed under bsd-2, except 'repocutter' which is ;; under bsd-3. (license (list license:bsd-2 license:bsd-3)))) (define-public tig (package (name "tig") (version "2.3.3") (source (origin (method url-fetch) (uri (string-append "https://github.com/jonas/tig/releases/download/tig-" version "/tig-" version ".tar.gz")) (sha256 (base32 "1skbhhj1narsnsff1azdylcy6xghxb18mzqysmipcyyvlv2i17fk")))) (build-system gnu-build-system) (native-inputs `(("asciidoc" ,asciidoc) ("xmlto" ,xmlto))) (inputs `(("ncurses" ,ncurses) ("readline" ,readline))) (arguments `(#:phases (modify-phases %standard-phases (add-after 'install 'install-doc (lambda _ (invoke "make" "install-doc")))) #:tests? #f)) ; tests require access to /dev/tty ;; #:test-target "test")) (home-page "https://jonas.github.io/tig/") (synopsis "Ncurses-based text user interface for Git") (description "Tig is an ncurses text user interface for Git, primarily intended as a history browser. It can also stage hunks for commit, or colorize the output of the 'git' command.") (license license:gpl2+))) (define-public findnewest (package (name "findnewest") (version "0.3") (source (origin (method url-fetch) (uri (string-append "https://github.com/0-wiz-0/findnewest/archive/findnewest-" version ".tar.gz")) (sha256 (base32 "1ydis4y0amkgfr4y60sn076f1l41ya2kn89kfd9fqf44f9ccgb5r")))) (build-system gnu-build-system) (native-inputs `(("autoconf" ,autoconf) ("automake" ,automake))) (home-page "https://github.com/0-wiz-0/findnewest/releases") (synopsis "Print the modification time of the latest file") (description "Recursively find the newest file in a file tree and print its modification time.") (license license:bsd-2))) (define-public myrepos (package (name "myrepos") (version "1.20171231") (source (origin (method git-fetch) (uri (git-reference (url "git://myrepos.branchable.com/myrepos") (commit version))) (file-name (string-append name "-" version "-checkout")) (sha256 (base32 "10q7lpx152xnkk701fscn4dq99q9znnmv3bc2482khhjg7z8rps0")))) (build-system gnu-build-system) (inputs `(("perl" ,perl))) (arguments '(#:test-target "test" #:phases (modify-phases %standard-phases (delete 'configure)) #:make-flags (list (string-append "PREFIX=" %output)))) (home-page "https://myrepos.branchable.com/") (synopsis "Multiple repository management tool") (description "Myrepos provides the @code{mr} command, which maps an operation (e.g., fetching updates) over a collection of version control repositories. It supports a large number of version control systems: Git, Subversion, Mercurial, Bazaar, Darcs, CVS, Fossil, and Veracity.") (license license:gpl2+))) (define-public git-annex-remote-hubic (package (name "git-annex-remote-hubic") (version "0.3.1") (source (origin (method url-fetch) (uri (string-append "https://github.com/Schnouki/" name "/archive/v" version ".tar.gz")) (file-name (string-append name "-" version ".tar.gz")) (sha256 (base32 "196g3jkaybjx11nbr51n0cjps3wjzb145ab76y717diqvvxp5v4r")))) (build-system python-build-system) (arguments `(#:python ,python-2)) (native-inputs `(;; for the tests ("python2-six" ,python2-six))) (propagated-inputs `(("python2-dateutil" ,python2-dateutil) ("python2-futures" ,python2-futures) ("python2-rauth" ,python2-rauth) ("python2-swiftclient" ,python2-swiftclient))) (home-page "https://github.com/Schnouki/git-annex-remote-hubic/") (synopsis "Use hubic as a git-annex remote") (description "This package allows you to use your hubic account as a \"special repository\" with git-annex.") (license license:gpl3+))) (define-public fossil (package (name "fossil") (version "2.5") (source (origin (method url-fetch) ;; Older downloads are moved to another URL. (uri (list (string-append "https://www.fossil-scm.org/index.html/uv/download/" "fossil-src-" version ".tar.gz") (string-append "https://www.fossil-scm.org/index.html/uv/" "fossil-src-" version ".tar.gz"))) (sha256 (base32 "1lxawkhr1ki9fqw8076fxib2b1w673449yzb6vxjshqzh5h77c7r")))) (build-system gnu-build-system) (native-inputs `(("tcl" ,tcl) ;for configuration only ("which" ,which) ;for tests only ("ed" ,ed))) ;ditto (inputs `(("openssl" ,openssl) ("zlib" ,zlib) ("sqlite" ,sqlite))) (arguments `(#:configure-flags (list "--with-openssl=auto" "--disable-internal-sqlite") #:test-target "test" #:phases (modify-phases %standard-phases (replace 'configure (lambda* (#:key outputs (configure-flags '()) #:allow-other-keys) ;; The 'configure' script is not an autoconf script and ;; chokes on unrecognized options. (apply invoke "./configure" (string-append "--prefix=" (assoc-ref outputs "out")) configure-flags) #t)) (add-before 'check 'test-setup (lambda _ (setenv "USER" "guix") (setenv "TZ" "UTC") #t))))) (home-page "https://fossil-scm.org") (synopsis "Software configuration management system") (description "Fossil is a distributed source control management system which supports access and administration over HTTP CGI or via a built-in HTTP server. It has a built-in wiki, built-in file browsing, built-in tickets system, etc.") (license (list license:public-domain ;src/miniz.c, src/shell.c license:bsd-2)))) (define-public stagit (package (name "stagit") (version "0.7.2") (source (origin (method url-fetch) (uri (string-append "https://dl.2f30.org/releases/" name "-" version ".tar.gz")) (sha256 (base32 "1m3s9g1z9szbjrhm8sic91xh6f2bfpi56rskdkqd5wc4wdycpyi5")))) (build-system gnu-build-system) (arguments `(#:tests? #f ; No tests #:make-flags (list "CC=gcc" (string-append "PREFIX=" %output)) #:phases (modify-phases %standard-phases (delete 'configure)))) ; No configure script (inputs `(("libgit2" ,libgit2))) (home-page "https://2f30.org/") (synopsis "Static git page generator") (description "Stagit creates static pages for git repositories, the results can be served with a HTTP file server of your choice.") (license license:expat))) ;; Darcs has no https support: http://irclog.perlgeek.de/darcs/2016-09-17 ;; http://darcs.net/manual/Configuring_darcs.html#SECTION00440070000000000000 ;; and results of search engines will show that if the protocol is http, https ;; is never mentioned. (define-public darcs (package (name "darcs") (version "2.12.5") (source (origin (method url-fetch) (uri (string-append "https://hackage.haskell.org/package/darcs/" "darcs-" version ".tar.gz")) (sha256 (base32 "0lrm0sal5pl453mkqn8b9fc9l7lwinc140iqihya9g17bk408nrm")) (modules '((guix build utils))) ;; Remove time-dependent code for reproducibility. (snippet '(begin (substitute* "darcs/darcs.hs" (("__DATE__") "\"1970-01-01\"") (("__TIME__") "\"00:00:00\"")) (substitute* "src/impossible.h" (("__DATE__") "\"\"") (("__TIME__") "\"\"")) #t)))) (build-system haskell-build-system) (arguments `(#:configure-flags '("-fpkgconfig" "-fcurl" "-flibiconv" "-fthreaded" "-fnetwork-uri" "-fhttp" "--flag=executable" "--flag=library" "--allow-newer=shelly") ;; FIXME: darcs is not compatible with the latest QuickCheck #:tests? #f)) (inputs `(("ghc-cmdargs" ,ghc-cmdargs) ("ghc-split" ,ghc-split) ("ghc-test-framework-quickcheck2" ,ghc-test-framework-quickcheck2) ("ghc-test-framework-hunit" ,ghc-test-framework-hunit) ("ghc-test-framework" ,ghc-test-framework) ("ghc-quickcheck" ,ghc-quickcheck) ("ghc-findbin" ,ghc-findbin) ("ghc-hunit" ,ghc-hunit) ("ghc-async" ,ghc-async) ("ghc-attoparsec" ,ghc-attoparsec) ("ghc-base16-bytestring" ,ghc-base16-bytestring) ("ghc-bytestring-builder" ,ghc-bytestring-builder) ("ghc-cryptohash" ,ghc-cryptohash) ("ghc-data-ordlist" ,ghc-data-ordlist) ("ghc-fgl" ,ghc-fgl) ("ghc-system-filepath" ,ghc-system-filepath) ("ghc-graphviz" ,ghc-graphviz) ("ghc-hashable" ,ghc-hashable) ("ghc-html" ,ghc-html) ("ghc-mmap" ,ghc-mmap) ("ghc-mtl" ,ghc-mtl) ("ghc-old-time" ,ghc-old-time) ("ghc-parsec" ,ghc-parsec) ("ghc-random" ,ghc-random) ("ghc-regex-applicative" ,ghc-regex-applicative) ("ghc-regex-compat-tdfa" ,ghc-regex-compat-tdfa) ("ghc-sandi" ,ghc-sandi) ("ghc-shelly" ,ghc-shelly) ("ghc-tar" ,ghc-tar) ("ghc-transformers-compat" ,ghc-transformers-compat) ("ghc-unix-compat" ,ghc-unix-compat) ("ghc-utf8-string" ,ghc-utf8-string) ("ghc-vector" ,ghc-vector) ("ghc-zip-archive" ,ghc-zip-archive) ("ghc-zlib" ,ghc-zlib) ("ghc-http" ,ghc-http) ("curl" ,curl) ("ghc" ,ghc) ("ncurses" ,ncurses) ("perl" ,perl) ("libiconv" ,libiconv) ("ghc-network" ,ghc-network) ("ghc-network-uri" ,ghc-network-uri))) (native-inputs `(("pkg-config" ,pkg-config))) (home-page "http://darcs.net") (synopsis "Distributed Revision Control System") (description "Darcs is a revision control system. It is: @enumerate @item Distributed: Every user has access to the full command set, removing boundaries between server and client or committer and non-committers. @item Interactive: Darcs is easy to learn and efficient to use because it asks you questions in response to simple commands, giving you choices in your work flow. You can choose to record one change in a file, while ignoring another. As you update from upstream, you can review each patch name, even the full diff for interesting patches. @item Smart: Originally developed by physicist David Roundy, darcs is based on a unique algebra of patches called @url{http://darcs.net/Theory,Patchtheory}. @end enumerate") (license license:gpl2))) (define-public java-jgit (package (name "java-jgit") (version "4.7.0.201704051617-r") (source (origin (method url-fetch) (uri (string-append "https://repo1.maven.org/maven2/" "org/eclipse/jgit/org.eclipse.jgit/" version "/org.eclipse.jgit-" version "-sources.jar")) (sha256 (base32 "13ii4jn02ynzq6i7gsyi21k2i94jpc85wf6bcm31q4cyvzv0mk4k")))) (build-system ant-build-system) (arguments `(#:tests? #f ; There are no tests to run. #:jar-name "jgit.jar" ;; JGit must be built with a JDK supporting Java 8. #:jdk ,icedtea-8 ;; Target our older default JDK. #:make-flags (list "-Dtarget=1.7") #:phases (modify-phases %standard-phases ;; The jar file generated by the default build.xml does not include ;; the text properties files, so we need to add them. (add-after 'build 'add-properties (lambda* (#:key jar-name #:allow-other-keys) (with-directory-excursion "src" (zero? (apply system* "jar" "-uf" (string-append "../build/jar/" jar-name) (find-files "." "\\.properties$"))))))))) (inputs `(("java-classpathx-servletapi" ,java-classpathx-servletapi) ("java-javaewah" ,java-javaewah) ("java-jsch" ,java-jsch) ("java-slf4j-api" ,java-slf4j-api))) (home-page "https://eclipse.org/jgit/") (synopsis "Java library implementing the Git version control system") (description "JGit is a lightweight, pure Java library implementing the Git version control system, providing repository access routines, support for network protocols, and core version control algorithms.") (license license:edl1.0))) ;; For axoloti. This package can still be built with icedtea-7, which is ;; currently used as the default JDK. (define-public java-jgit-4.2 (package (inherit java-jgit) (version "4.2.0.201601211800-r") (source (origin (method url-fetch) (uri (string-append "https://repo1.maven.org/maven2/" "org/eclipse/jgit/org.eclipse.jgit/" version "/org.eclipse.jgit-" version "-sources.jar")) (sha256 (base32 "15gm537iivhnzlkjym4x3wn5jqdjdragsw9pdpzqqg21nrc817mm")))) (build-system ant-build-system) (arguments (substitute-keyword-arguments (package-arguments java-jgit) ;; Build for default JDK. ((#:jdk _) icedtea-7) ((#:phases phases) `(modify-phases ,phases (add-after 'unpack 'use-latest-javaewah-API (lambda _ (substitute* "src/org/eclipse/jgit/internal/storage/file/BitmapIndexImpl.java" (("wordinbits") "WORD_IN_BITS")) #t)))))) (inputs `(("java-javaewah" ,java-javaewah) ("java-jsch" ,java-jsch) ("java-slf4j-api" ,java-slf4j-api))))) (define-public gource (package (name "gource") (version "0.48") (source (origin (method url-fetch) (uri (string-append "https://github.com/acaudwell/Gource/releases/download" "/gource-" version "/gource-" version ".tar.gz")) (sha256 (base32 "04qxcm05qiyr9rg2kv6abfy7kkzqr8ziw4iyp1d14lniv93m61dp")))) (build-system gnu-build-system) (arguments `(#:configure-flags (list (string-append "--with-boost-libdir=" (assoc-ref %build-inputs "boost") "/lib")))) (native-inputs `(("pkg-config" ,pkg-config))) (inputs `(("boost" ,boost) ("ftgl" ,ftgl) ("glew" ,glew) ("glm" ,glm) ("glu" ,glu) ("libpng" ,libpng) ("mesa" ,mesa) ("pcre" ,pcre) ("sdl-union" ,(sdl-union (list sdl2 sdl2-image))))) (home-page "http://gource.io/") (synopsis "3D visualisation tool for source control repositories") (description "@code{gource} provides a software version control visualization. The repository is displayed as a tree where the root of the repository is the centre, directories are branches and files are leaves. Contributors to the source code appear and disappear as they contribute to specific files and directories.") (license license:gpl3+))) (define-public src (package (name "src") (version "1.18") (source (origin (method url-fetch) (uri (string-append "http://www.catb.org/~esr/src/src-" version ".tar.gz")) (sha256 (base32 "0n0skhvya8w2az45h2gsafxy8m2mvqas64nrgxifcmrzfv0rf26c")))) (build-system gnu-build-system) (arguments '(#:make-flags (list (string-append "prefix=" (assoc-ref %outputs "out"))) #:phases (modify-phases %standard-phases (delete 'configure) ; no 'configure' script (add-after 'install 'wrap-program (lambda* (#:key inputs outputs #:allow-other-keys) (let* ((out (assoc-ref outputs "out")) (prog (string-append out "/bin/src")) (rcs (assoc-ref inputs "rcs"))) (wrap-program prog `("PATH" ":" prefix (,(string-append rcs "/bin")))) #t))) (replace 'check (lambda _ (setenv "HOME" (getenv "TMPDIR")) (invoke "git" "config" "--global" "user.name" "guix") (invoke "git" "config" "--global" "user.email" "guix") (invoke "./srctest")))))) (native-inputs ;; For testing. `(("git" ,git) ("perl" ,perl))) (inputs `(("python" ,python-wrapper) ("rcs" ,rcs))) (synopsis "Simple revision control") (home-page "http://www.catb.org/~esr/src/") (description "SRC (or src) is simple revision control, a version-control system for single-file projects by solo developers and authors. It modernizes the venerable RCS, hence the anagrammatic acronym. The design is tuned for use cases like all those little scripts in your @file{~/bin} directory, or a directory full of HOWTOs.") (license license:bsd-2)))