about summary refs log tree commit diff
AgeCommit message (Collapse)AuthorFilesLines
2017-11-20 Test: Replace --option with the corresponding flagEelco Dolstra11-45/+45
2017-11-20 signed-binary-caches -> require-sigsEelco Dolstra5-17/+25
Unlike signed-binary-caches (which could only be '*' or ''), require-sigs is a proper Boolean option. The default is true.
2017-11-20 CleanupEelco Dolstra1-2/+2
2017-11-20 binary-cache-public-keys -> trusted-public-keysEelco Dolstra5-19/+20
The name had become a misnomer since it's not only for substitution from binary caches, but when adding/copying any (non-content-addressed) path to a store.
2017-11-20 install-darwin-multi-user.sh: Remove superfluous nix.conf settingsEelco Dolstra1-8/+0
2017-11-20 Merge pull request #1645 from twhitehead/stat-raceEelco Dolstra1-12/+11
Fix (highly unlikely) race condition in readLink
2017-11-20 nix copy: Abbreviate "daemon"Eelco Dolstra1-2/+2
2017-11-15 Add a "profile" option to S3BinaryCacheStoreEelco Dolstra3-5/+14
This allows specifying the AWS configuration profile to use. E.g. nix copy --from s3://my-cache?profile=aws-dev-account /nix/store/cf3isrlqavvd5w7rpky1fa8j9lcnlggm-...
2017-11-15 Merge pull request #1678 from dtzWill/feature/anchor-exit-exceptionEelco Dolstra2-0/+2
anchor nix::Exit exception
2017-11-15 DohEelco Dolstra1-0/+11
2017-11-14 anchor nix::Exit exceptionWill Dietz2-0/+2
2017-11-14 Add dependencies for coverage testEelco Dolstra1-1/+1
2017-11-14 Update lcov filterEelco Dolstra1-1/+1
2017-11-14 nix sign-paths: Support binary cachesEelco Dolstra3-15/+43
2017-11-14 Add tests for "nix verify", "nix sign-paths" etc.Eelco Dolstra2-1/+64
2017-11-14 Revert "Don't parse "x:x" as a URI"Eelco Dolstra3-4/+3
This reverts commit f90f660b243866b8860eeb24cc4a345d32cc7ce7. This broke Hydra's release.nix, which contained preCheck = ''export LOGNAME=${LOGNAME:-foo}'';
2017-11-14 nix ls-{nar,store}: Don't abort on missing filesEelco Dolstra2-1/+5
2017-11-14 Add some testsEelco Dolstra1-4/+15
2017-11-14 nix ls-{nar,store} --json: Respect -REelco Dolstra4-6/+13
2017-11-14 Don't indent JSON outputEelco Dolstra4-4/+4
2017-11-14 nix ls-{store,nar}: Add --json flagEelco Dolstra4-40/+53
2017-11-14 Remove ncurses-binEelco Dolstra1-1/+1
2017-11-14 Make config options available to legacy commandsEelco Dolstra2-4/+4
2017-11-14 Rename tests/nar-index -> tests/nar-accessEelco Dolstra3-3/+3
2017-11-08 Remove extraneous commentEelco Dolstra1-3/+0
2017-11-08 Merge pull request #1650 from copumpkin/darwin-sandbox-unix-socketEelco Dolstra1-1/+8
Always allow builds to use unix domain sockets in Darwin sandbox
2017-11-07 Show when tests are skippedEelco Dolstra3-9/+11
Also, don't depend on tput (ncurses). It's really not needed since ANSI escape sequences have been standardized for 35 years or so.
2017-11-06 Merge pull request #1632 from AmineChikhaoui/sigint-copyEelco Dolstra1-1/+9
run query paths in parallel during nix copy and handle SIGINT
2017-11-03 fetchgit.cc -> fetchGit.ccEelco Dolstra1-0/+0
2017-11-03 Remove git:// support in NIX_PATHEelco Dolstra4-38/+9
This didn't support specifying a revision/branch, and was restricted to git:// URIs (since https:// or ssh:// would be ambiguous).
2017-11-03 fetchGit/fetchMercurial: Filter out directories with untracked filesEelco Dolstra4-14/+28
2017-11-03 fetchGit: Add a testEelco Dolstra6-2/+90
2017-11-03 fetchGit: Don't do a remote fetch if we already have the revEelco Dolstra1-15/+23
2017-11-03 Merge pull request #1651 from LnL7/darwin-sandbox-getpwuidEelco Dolstra1-0/+3
Allow getpwuid in the darwin sandbox
2017-11-03 Allow getpwuid in the darwin sandbox.Daiderd Jordan1-0/+3
2017-11-03 Merge pull request #1660 from 4z3/patch-1Eelco Dolstra1-1/+1
fetchMercurial: fix error message
2017-11-03 Merge pull request #1655 from copumpkin/patch-1Eelco Dolstra1-2/+2
Don't freak out if we get a 403 from S3
2017-11-03 Don't freak out if we get a 403 from S3Daniel Peebles1-2/+2
As far as we're concerned, not being able to access a file just means the file is missing. Plus, AWS explicitly goes out of its way to return a 403 if the file is missing and the requester doesn't have permission to list the bucket. Also getting rid of an old hack that Eelco said was only relevant to an older AWS SDK.
2017-11-02 fetchMercurial: fix error messagetv1-1/+1
2017-11-02 Merge pull request #1657 from plesiv/docs-typeof-fixEelco Dolstra1-8/+19
Mention "float" type in the docs
2017-11-01 Mention isFloat function in "Built-in Functions" sectionZoran Plesivčak1-0/+10
2017-11-01 Mention "float" type in builtins.typeOf section of the docsZoran Plesivčak1-8/+9
+ remove trailing whitespace from the file
2017-11-01 Fix buildEelco Dolstra2-2/+2
https://hydra.nixos.org/build/63172338
2017-11-01 fetchMercurial: Don't fetch hashes we already haveEelco Dolstra4-29/+75
2017-11-01 Add fetchMercurial primopEelco Dolstra7-5/+269
E.g. $ nix eval '(fetchMercurial https://www.mercurial-scm.org/repo/hello)' { branch = "default"; outPath = "/nix/store/alvb9y1kfz42bjishqmyy3pphnrh1pfa-source"; rev = "82e55d328c8ca4ee16520036c0aaace03a5beb65"; revCount = 1; shortRev = "82e55d328c8c"; } $ nix eval '(fetchMercurial { url = https://www.mercurial-scm.org/repo/hello; rev = "0a04b987be5ae354b710cefeba0e2d9de7ad41a9"; })' { branch = "default"; outPath = "/nix/store/alvb9y1kfz42bjishqmyy3pphnrh1pfa-source"; rev = "0a04b987be5ae354b710cefeba0e2d9de7ad41a9"; revCount = 0; shortRev = "0a04b987be5a"; } $ nix eval '(fetchMercurial /tmp/unclean-hg-tree)' { branch = "default"; outPath = "/nix/store/cm750cdw1x8wfpm3jq7mz09r30l9r024-source"; rev = "0000000000000000000000000000000000000000"; revCount = 0; shortRev = "000000000000"; }
2017-10-31 Fix filterSourceEelco Dolstra1-32/+14
2017-10-31 Always allow builds to use unix domain sockets in Darwin sandboxDan Peebles1-1/+8
2017-10-30 builtins.fetchgit: Support importing a working treeEelco Dolstra7-17/+54
For example, you can write src = fetchgit ./.; and if ./. refers to an unclean working tree, that tree will be copied to the Nix store. This removes the need for "cleanSource".
2017-10-30 Merge pull request #1646 from copumpkin/optional-sandbox-local-networkEelco Dolstra2-5/+33
Allow optional localhost network access to sandboxed derivations
2017-10-30 Allow optional localhost network access to sandboxed derivationsDan Peebles2-5/+33
This will allow bind and connect to 127.0.0.1, which can reduce purity/ security (if you're running a vulnerable service on localhost) but is also needed for a ton of test suites, so I'm leaving it turned off by default but allowing certain derivations to turn it on as needed. It also allows DNS resolution of arbitrary hostnames but I haven't found a way to avoid that. In principle I'd just want to allow resolving localhost but that doesn't seem to be possible. I don't think this belongs under `build-use-sandbox = relaxed` because we want it on Hydra and I don't think it's the end of the world.