aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2015-10-30<nix/fetchurl.nix>: Support xz-compressed NARsEelco Dolstra
2015-10-30<nix/fetchurl.nix>: Support downloading and unpacking NARsEelco Dolstra
This removes the need to have multiple downloads in the stdenv bootstrap process (like a separate busybox binary for Linux, or curl/mkdir/sh/bzip2 for Darwin). Now all those files can be combined into a single NAR.
2015-10-29int2String() -> std::to_string()Eelco Dolstra
2015-10-26Merge branch 'emacs-mode-keywords' of https://github.com/pSub/nixEelco Dolstra
2015-10-26Merge pull request #667 from Ericson2314/mk-distEelco Dolstra
Don't depend on .git/ when generating source tarball V2
2015-10-26Merge pull request #668 from svanderburg/masterEelco Dolstra
Fix compilation error due to missing ENOENT on cygwin
2015-10-21resolve-system-dependencies.pl: Simplify union implShea Levy
Patch by @pikajude
2015-10-21use nixDataDir instead of appending /share to PREFIXJude Taylor
2015-10-21revert libutil changeJude Taylor
2015-10-21clarifying commentJude Taylor
2015-10-21move preBuildHook defaulting to globals.ccJude Taylor
2015-10-21restore old DEFAULT_ALLOWED_IMPURE_PREFIXESJude Taylor
2015-10-21appropriately handle lock acquisition failures in resolve-system-dependencies.plJude Taylor
2015-10-21now that resolve-system-dependencies exists, remove redundant impureHostDeps ↵Jude Taylor
from buildenv
2015-10-21Add resolve-system-dependencies.plJude Taylor
2015-10-21remove usr paths from allowed inputsJude Taylor
2015-10-21allow access to SystemVersion for python buildersJude Taylor
2015-10-21fix line reading in preBuildHookJude Taylor
2015-10-21remove sandbox defaults into a new fileJude Taylor
2015-10-21restore allowed impure prefixesJude Taylor
2015-10-21remove an unneeded default impure-depJude Taylor
2015-10-21make sandbox builds more permissiveJude Taylor
2015-10-21give buildenv __impureHostDepsJude Taylor
2015-10-21add a few more permissionsJude Taylor
2015-10-21Allow builtin fetchurl regardless of the derivation's system attributeEelco Dolstra
2015-10-21Show progress indicator for builtin fetchurlEelco Dolstra
2015-10-21Disable TLS verification for builtin fetchurlEelco Dolstra
This makes it consistent with the Nixpkgs fetchurl and makes it work in chroots. We don't need verification because the hash of the result is checked anyway.
2015-10-21Fix segfault in builtin fetchurlEelco Dolstra
The stack allocated for the builder was way too small (32 KB). This is sufficient for normal derivations, because they just do some setup and then exec() the actual builder. But for the fetchurl builtin derivation it's not enough. Also, allocating the stack on the caller's stack was fishy business.
2015-10-18Fix compilation error due to missing ENOENT on cygwinSander van der Burg
2015-10-15Don't depend on git when generating source tarballJohn Ericson
2015-10-15Simplify source tarball postUnpack cleanupxJohn Ericson
2015-10-10emacs mode: match keywords on the start/end of symbolsPascal Wittmann
If keywords are matched on the start/end of words then keywords are also matched if they are surrounded by dashes or underscores. For example the keyword with is highlighted in geany-with-vte. When matching on the start/end of symbols the keyword is only highlighted if it is not part of an other identifier.
2015-10-09Provide addTempRoot in the Perl APIEelco Dolstra
Needed by Hydra.
2015-10-08Allow building ARMv6 stuff on ARMv7Tuomas Tynkkynen
This allows building a Raspberry Pi image on modern, faster boards.
2015-10-08isFunctor: SimplifyEelco Dolstra
2015-10-08forceFunction: allow functors as wellMathnerd314
2015-10-08Fix typo in doc for nix-copy-closureAnders Claesson
2015-10-08Revert to CURLOPT_PROGRESSFUNCTIONEelco Dolstra
CURLOPT_XFERINFOFUNCTION isn't widely supported yet. http://hydra.nixos.org/build/26679495
2015-10-07Show progress during downloadsEelco Dolstra
2015-10-07nix-prefetch-url: Add --name optionEelco Dolstra
This allows overriding the name component of the resulting Nix store path, which is necessary if the base name of the URI contains "illegal" characters.
2015-10-07nix-prefetch-url -A: Use "name" attribute from Nix expressionEelco Dolstra
This is in particular useful for fetchFromGitHub et al., ensuring that the store path produced by nix-prefetch-url corresponds to what those functions expect.
2015-10-07nix-prefetch-url: Support unpacking tarballsEelco Dolstra
This allows nix-prefetch-url to prefetch the output of fetchzip and its wrappers (like fetchFromGitHub). For example: $ nix-prefetch-url --unpack https://github.com/NixOS/patchelf/archive/0.8.tar.gz or from a Nix expression: $ nix-prefetch-url -A nix-repl.src In the latter case, --unpack can be omitted because nix-repl.src is a fetchFromGitHub derivation and thus has "outputHashMode" set to "recursive".
2015-10-06nix-store --serve: Implement log size limitEelco Dolstra
2015-10-05Don't mention Fedora/Debian packages in the installation sectionEelco Dolstra
See https://github.com/NixOS/nixos-homepage/commit/d4a88df9d6114f609da889db62ef0a3bf6e4ef27
2015-10-05Merge pull request #645 from acowley/patch-1Eelco Dolstra
Update prerequisites-source.xml
2015-10-01nix-prefetch-url: Support prefetching from a Nix expressionEelco Dolstra
For example, $ nix-prefetch-url -A hello.src will prefetch the file specified by the fetchurl call in the attribute ‘hello.src’ from the Nix expression in the current directory. This differs from ‘nix-build -A hello.src’ in that it doesn't verify the hash. You can also specify a path to the Nix expression: $ nix-prefetch-url ~/Dev/nixpkgs -A hello.src List elements (typically used in ‘patches’ attributes) also work: $ nix-prefetch-url -A portmidi.patches.0
2015-10-01nix-prefetch-url: $PRINT_PATH -> --print-pathEelco Dolstra
2015-10-01nix-prefetch-url: Rewrite in C++Eelco Dolstra
2015-09-27Merge pull request #654 from utdemir/more-insecure-verify-https-binary-cachesEelco Dolstra
Also set CURLOPT_SSL_VERIFYHOST=0 when "verify-https-binary-caches" is false
2015-09-25Also set CURLOPT_SSL_VERIFYHOST=0 when "verify-https-binary-caches" is falseUtku Demir
This makes that option even more insecure, by also not checking the SSL host. But without this parameter, one can still get SSL errors even when "verify-https-binary-caches" is false, which is unexpected IMO.