aboutsummaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)Author
2015-11-14simplify build.cc using modern C++ featuresJude Taylor
2015-11-14simplify build permissionsJude Taylor
2015-11-14remove sandbox-defaults.sbJude Taylor
2015-11-14use per-derivation sandbox profilesJude Taylor
2015-11-09Add option to verify build determinismEelco Dolstra
Passing "--option build-repeat <N>" will cause every build to be repeated N times. If the build output differs between any round, the build is rejected, and the output paths are not registered as valid. This is primarily useful to verify build determinism. (We already had a --check option to repeat a previously succeeded build. However, with --check, non-deterministic builds are registered in the DB. Preventing that is useful for Hydra to ensure that non-deterministic builds don't end up getting published at all.)
2015-11-09Revert "Allow using /bin and /usr/bin as impure prefixes on non-darwin by ↵Eelco Dolstra
default" This reverts commit 79ca5033329053caa364bb2f7e50953f859cc97f. Ouch, never noticed this. We definitely don't want to allow builds to have arbitrary access to /bin and /usr/bin, because then they can (for instance) bring in a bunch of setuid programs. Also, we shouldn't be encouraging the use of impurities in the default configuration.
2015-11-09optimizePath(): Detect some .links corruptionEelco Dolstra
If automatic store optimisation is enabled, and a hard-linked file in the store gets corrupted, then the corresponding .links entry will also be corrupted. In that case, trying to repair with --repair or --repair-path won't work, because the new "good" file will be replaced by a hard link to the corrupted file. We can catch most of these cases by doing a sanity-check on the file sizes.
2015-11-09Fix namespace issueEelco Dolstra
2015-11-04Merge branch 'master' of https://github.com/pikajude/nixShea Levy
> I made this change for two reasons: > 1. Darwin's locale data doesn't appear to be open source > 2. Privileged processes will always use /usr/share/locale regardless of environment variables
2015-11-04Support SHA-512 hashesEelco Dolstra
Fixes #679. Note: on x86_64, SHA-512 is considerably faster than SHA-256 (198 MB/s versus 131 MB/s).
2015-11-04Require OpenSSLEelco Dolstra
2015-11-03fix syntax errorJude Taylor
2015-11-03darwin: allow reading system locale and zoneinfoJude Taylor
2015-10-31allow reading ICU dataJude Taylor
2015-10-30add special devices to sandbox-defaultsJude Taylor
2015-10-30<nix/fetchurl.nix>: Support xz-compressed NARsEelco Dolstra
2015-10-30<nix/fetchurl.nix>: Support downloading and unpacking NARsEelco Dolstra
This removes the need to have multiple downloads in the stdenv bootstrap process (like a separate busybox binary for Linux, or curl/mkdir/sh/bzip2 for Darwin). Now all those files can be combined into a single NAR.
2015-10-29int2String() -> std::to_string()Eelco Dolstra
2015-10-26Merge pull request #668 from svanderburg/masterEelco Dolstra
Fix compilation error due to missing ENOENT on cygwin
2015-10-21use nixDataDir instead of appending /share to PREFIXJude Taylor
2015-10-21revert libutil changeJude Taylor
2015-10-21clarifying commentJude Taylor
2015-10-21move preBuildHook defaulting to globals.ccJude Taylor
2015-10-21restore old DEFAULT_ALLOWED_IMPURE_PREFIXESJude Taylor
2015-10-21Add resolve-system-dependencies.plJude Taylor
2015-10-21remove usr paths from allowed inputsJude Taylor
2015-10-21allow access to SystemVersion for python buildersJude Taylor
2015-10-21fix line reading in preBuildHookJude Taylor
2015-10-21remove sandbox defaults into a new fileJude Taylor
2015-10-21restore allowed impure prefixesJude Taylor
2015-10-21remove an unneeded default impure-depJude Taylor
2015-10-21make sandbox builds more permissiveJude Taylor
2015-10-21add a few more permissionsJude Taylor
2015-10-21Allow builtin fetchurl regardless of the derivation's system attributeEelco Dolstra
2015-10-21Show progress indicator for builtin fetchurlEelco Dolstra
2015-10-21Disable TLS verification for builtin fetchurlEelco Dolstra
This makes it consistent with the Nixpkgs fetchurl and makes it work in chroots. We don't need verification because the hash of the result is checked anyway.
2015-10-21Fix segfault in builtin fetchurlEelco Dolstra
The stack allocated for the builder was way too small (32 KB). This is sufficient for normal derivations, because they just do some setup and then exec() the actual builder. But for the fetchurl builtin derivation it's not enough. Also, allocating the stack on the caller's stack was fishy business.
2015-10-18Fix compilation error due to missing ENOENT on cygwinSander van der Burg
2015-10-08Allow building ARMv6 stuff on ARMv7Tuomas Tynkkynen
This allows building a Raspberry Pi image on modern, faster boards.
2015-10-08isFunctor: SimplifyEelco Dolstra
2015-10-08forceFunction: allow functors as wellMathnerd314
2015-10-08Revert to CURLOPT_PROGRESSFUNCTIONEelco Dolstra
CURLOPT_XFERINFOFUNCTION isn't widely supported yet. http://hydra.nixos.org/build/26679495
2015-10-07Show progress during downloadsEelco Dolstra
2015-10-07nix-prefetch-url: Add --name optionEelco Dolstra
This allows overriding the name component of the resulting Nix store path, which is necessary if the base name of the URI contains "illegal" characters.
2015-10-07nix-prefetch-url -A: Use "name" attribute from Nix expressionEelco Dolstra
This is in particular useful for fetchFromGitHub et al., ensuring that the store path produced by nix-prefetch-url corresponds to what those functions expect.
2015-10-07nix-prefetch-url: Support unpacking tarballsEelco Dolstra
This allows nix-prefetch-url to prefetch the output of fetchzip and its wrappers (like fetchFromGitHub). For example: $ nix-prefetch-url --unpack https://github.com/NixOS/patchelf/archive/0.8.tar.gz or from a Nix expression: $ nix-prefetch-url -A nix-repl.src In the latter case, --unpack can be omitted because nix-repl.src is a fetchFromGitHub derivation and thus has "outputHashMode" set to "recursive".
2015-10-06nix-store --serve: Implement log size limitEelco Dolstra
2015-10-01nix-prefetch-url: Support prefetching from a Nix expressionEelco Dolstra
For example, $ nix-prefetch-url -A hello.src will prefetch the file specified by the fetchurl call in the attribute ‘hello.src’ from the Nix expression in the current directory. This differs from ‘nix-build -A hello.src’ in that it doesn't verify the hash. You can also specify a path to the Nix expression: $ nix-prefetch-url ~/Dev/nixpkgs -A hello.src List elements (typically used in ‘patches’ attributes) also work: $ nix-prefetch-url -A portmidi.patches.0
2015-10-01nix-prefetch-url: $PRINT_PATH -> --print-pathEelco Dolstra
2015-10-01nix-prefetch-url: Rewrite in C++Eelco Dolstra