aboutsummaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)Author
2017-04-19getDerivations(): Filter out packages with bad derivation namesEelco Dolstra
In particular, this disallows attribute names containing dots or starting with dots. Hydra already disallowed these. This affects the following packages in Nixpkgs master: 2048-in-terminal 2bwm 389-ds-base 90secondportraits lispPackages.3bmd lispPackages.hu.dwim.asdf lispPackages.hu.dwim.def Closes #1342.
2017-04-18Merge pull request #1321 from shlevy/channel-direct-tarball-errorEelco Dolstra
nix-channel: error out if direct tarball unpack fails.
2017-04-14Shut up some warningsEelco Dolstra
2017-04-14DohEelco Dolstra
2017-04-14Fix 32-bit buildEelco Dolstra
http://hydra.nixos.org/build/51569816
2017-04-14Minor cleanupEelco Dolstra
2017-04-14nix-daemon: Don't set untrusted-* settingsEelco Dolstra
These are no longer used anywhere.
2017-04-14nix-daemon: Don't die if the user sends an unknown settingEelco Dolstra
2017-04-13Add "nix show-config" commandEelco Dolstra
This dumps the entire Nix configuration, including all options that have default values.
2017-04-13Convert Settings to the new config systemEelco Dolstra
This makes all config options self-documenting. Unknown or unparseable config settings and --option flags now cause a warning.
2017-04-13Support arbitrary numeric types for settingsEelco Dolstra
2017-04-13Validate Boolean settings betterEelco Dolstra
2017-04-13Merge branch 'rework-options' of https://github.com/copumpkin/nixEelco Dolstra
2017-04-13Add a Config class to simplify adding configuration settingsEelco Dolstra
The typical use is to inherit Config and add Setting<T> members: class MyClass : private Config { Setting<int> foo{this, 123, "foo", "the number of foos to use"}; Setting<std::string> bar{this, "blabla", "bar", "the name of the bar"}; MyClass() : Config(readConfigFile("/etc/my-app.conf")) { std::cout << foo << "\n"; // will print 123 unless overriden } }; Currently, this is used by Store and its subclasses for store parameters. You now get a warning if you specify a non-existant store parameter in a store URI.
2017-04-13canonPath(): Check against empty pathsEelco Dolstra
2017-04-13Add warn functionEelco Dolstra
2017-04-13Initialise loggerEelco Dolstra
2017-04-12Merge pull request #1302 from dtzWill/fix/nix-optionsEelco Dolstra
Process nix.conf options in "new" commands, add test
2017-04-10nix-channel: error out if direct tarball unpack fails.Shea Levy
It's very unlikely a path ending in .tar.gz is a directory Fixes #1318
2017-04-10Merge pull request #1316 from copumpkin/nix-retries-defaultEelco Dolstra
Default to 5 download retries
2017-04-10Add CURLE_WRITE_ERROR as a transient error conditionDan Peebles
We've observed it failing downloads in the wild and retrying the same URL a few moments later seemed to fix it.
2017-04-10Default to 5 download retriesDan Peebles
This should help certain downloaders that don't request anything special for the number of retries, like nix-channel.
2017-04-10Minor cleanupEelco Dolstra
Also, possible fix for #1310 on 32-bit systems.
2017-04-10Allow "auto" as a store URIEelco Dolstra
Using the empty string is likely to be ambiguous in some contexts.
2017-04-08Process nix.conf options in "new" nix commands, add test.Will Dietz
Without this (minor) change, the options set using "--option" or read from nix.conf were parsed but not used.
2017-04-06Retry downloads on transient SSL errors tooDan Peebles
2017-04-06Implement RemoteStore::queryMissing()Eelco Dolstra
This provides a significant speedup, e.g. 64 s -> 12 s for nix-build --dry-run -I nixpkgs=channel:nixos-16.03 '<nixpkgs/nixos/tests/misc.nix>' -A test on a cold local and CloudFront cache. The alternative is to use lots of concurrent daemon connections but that seems wasteful.
2017-04-06Fix bogus "unexpected Nix daemon error: interrupted by the user"Eelco Dolstra
2017-04-06Add a method to allow hydra-queue-runner to flush the path info cacheEelco Dolstra
2017-04-06nix-daemon: Disable path info cacheEelco Dolstra
This is useless because the client also caches path info, and can cause problems for long-running clients like hydra-queue-runner (i.e. it may return cached info about paths that have been garbage-collected).
2017-04-04Allow default sandbox paths to be overridenEelco Dolstra
E.g. you can now redirect /etc/resolv.conf to a different file.
2017-04-04Make /var/run/nscd/socket optionalEelco Dolstra
Not every distribution uses nscd.
2017-03-31Sandbox: Fix /dev/ptmx on recent kernelsEelco Dolstra
This fixes "No such file or directory" when opening /dev/ptmx (e.g. http://hydra.nixos.org/build/51094249). The reason appears to be some changes to /dev/ptmx / /dev/pts handling between Linux 4.4 and 4.9. See https://patchwork.kernel.org/patch/7832531/. The fix is to go back to mounting a proper /dev/pts instance inside the sandbox. Happily, this now works inside user namespaces, even for unprivileged users. So NIX_REMOTE=local?root=/tmp/nix nix-build \ '<nixpkgs/nixos/tests/misc.nix>' -A test works for non-root users. The downside is that the fix breaks sandbox builds on older kernels (probably pre-4.6), since mounting a devpts fails inside user namespaces for some reason I've never been able to figure out. Builds on those systems will fail with error: while setting up the build environment: mounting /dev/pts: Invalid argument Ah well.
2017-03-31builtins.exec: Make the argument just a listShea Levy
2017-03-31Merge branch 'builtins.exec'Shea Levy
2017-03-31Retry curl error 16Eelco Dolstra
2017-03-31Merge branch 'remove-perl' of https://github.com/shlevy/nixEelco Dolstra
2017-03-30Add exec primop behind allow-unsafe-native-code-during-evaluation.Shea Levy
Execute a given program with the (optional) given arguments as the user running the evaluation, parsing stdout as an expression to be evaluated. There are many use cases for nix that would benefit from being able to run arbitrary code during evaluation, including but not limited to: * Automatic git fetching to get a sha256 from a git revision * git rev-parse HEAD * Automatic extraction of information from build specifications from other tools, particularly language-specific package managers like cabal or npm * Secrets decryption (e.g. with nixops) * Private repository fetching Ideally, we would add this functionality in a more principled way to nix, but in the mean time 'builtins.exec' can be used to get these tasks done. The primop is only available when the 'allow-unsafe-native-code-during-evaluation' nix option is true. That flag also enables the 'importNative' primop, which is strictly more powerful but less convenient (since it requires compiling a plugin against the running version of nix).
2017-03-28Ignore broken "Deriver: unknown-deriver" fields in .narinfoEelco Dolstra
These were generated by a legacy tool.
2017-03-24use std::tuple for ValueMap allocatorDaiderd Jordan
2017-03-22Fix xz decompressionEelco Dolstra
Fixes #1285.
2017-03-21LocalFSStore::getBuildLog(): Handle corrupted logsEelco Dolstra
2017-03-21Don't hang in decompression if bzip2 data ends prematurelyEelco Dolstra
2017-03-21Only use cache.nixos.org when the store is /nix/storeEelco Dolstra
This is consistent with the behaviour of the old download-from-binary-cache substituter.
2017-03-21Require signatures by defaultEelco Dolstra
This corresponds to the NixOS default.
2017-03-21Restore cache.nixos.org as the default substituterEelco Dolstra
Fixes #1283.
2017-03-21Move istringstream_nocopy to a separate fileEelco Dolstra
2017-03-21Honor $NIX_SSHOPTS againEelco Dolstra
NixOps needs this.
2017-03-20Merge branch 'darwin-s3-binary-cache-store' of https://github.com/shlevy/nixEelco Dolstra
2017-03-20Merge pull request #1275 from steveeJ/patch-1Eelco Dolstra
nix-shell/pure: keep environment variable SHLVL