about summary refs log tree commit diff
AgeCommit message (Collapse)AuthorFilesLines
2018-12-14 Clarify nix-instantiate --read-write-modePatrick Hilhorst1-1/+3
2018-12-13 Support SRI hashesEelco Dolstra8-35/+73
SRI hashes (https://www.w3.org/TR/SRI/) combine the hash algorithm and a base-64 hash. This allows more concise and standard hash specifications. For example, instead of import <nix/fetchurl.nl> { url = https://nixos.org/releases/nix/nix-2.1.3/nix-2.1.3.tar.xz; sha256 = "5d22dad058d5c800d65a115f919da22938c50dd6ba98c5e3a183172d149840a4"; }; you can write import <nix/fetchurl.nl> { url = https://nixos.org/releases/nix/nix-2.1.3/nix-2.1.3.tar.xz; hash = "sha256-XSLa0FjVyADWWhFfkZ2iKTjFDda6mMXjoYMXLRSYQKQ="; }; In fixed-output derivations, the outputHashAlgo is no longer mandatory if outputHash specifies the hash (either as an SRI or in the old "<type>:<hash>" format). 'nix hash-{file,path}' now print hashes in SRI format by default. I also reverted them to use SHA-256 by default because that's what we're using most of the time in Nixpkgs. Suggested by @zimbatm.
2018-12-13 Merge pull request #2569 from veprbl/pr/update_prerequisitesEelco Dolstra1-0/+19
docs: add missing prerequisites: brotli, boost, libseccomp
2018-12-13 Merge pull request #2576 from LnL7/repl-no-linkEelco Dolstra1-1/+1
nix repl: don't create result symlinks
2018-12-13 Merge pull request #2578 from volth/patch-5Eelco Dolstra1-1/+1
probably typo
2018-12-13 docs: raise minimal boost version to 1.66Dmitry Kalinkin1-1/+1
2018-12-13 probably typovolth1-1/+1
...at least MSVC unable to compile this
2018-12-12 nix repl: don't create result symlinksDaiderd Jordan1-1/+1
2018-12-12 Merge pull request #2574 from zimbatm/multi-line-expected-sha256Eelco Dolstra3-6/+6
libstore: improve hash mismatch error messages
2018-12-12 libstore: improve hash mismatch error messageszimbatm3-6/+6
Use the same output ordering and format everywhere. This is such a common issue that we trade the single-line error message for more readability. Old message: ``` fixed-output derivation produced path '/nix/store/d4nw9x2sy9q3r32f3g5l5h1k833c01vq-example.com' with sha256 hash '08y4734bm2zahw75b16bcmcg587vvyvh0n11gwiyir70divwp1rm' instead of the expected hash '1xzwnipjd54wl8g93vpw6hxnpmdabq0wqywriiwmh7x8k0lvpq5m' ``` New message: ``` hash mismatch in fixed-output derivation '/nix/store/d4nw9x2sy9q3r32f3g5l5h1k833c01vq-example.com': wanted: sha256:1xzwnipjd54wl8g93vpw6hxnpmdabq0wqywriiwmh7x8k0lvpq5m got: sha256:08y4734bm2zahw75b16bcmcg587vvyvh0n11gwiyir70divwp1rm ```
2018-12-12 Fix assertion failure in NarInfoDiskCacheEelco Dolstra1-15/+15
https://hydra.nixos.org/build/85827920
2018-12-12 Merge pull request #2572 from LnL7/narinfo-caEelco Dolstra1-2/+5
nar-info-disk-cache: include ca in the cache entries
2018-12-12 nar-info-disk-cache: include ca in the cache entriesDaiderd Jordan1-2/+5
Without this information the content addressable state and hashes are lost after the first request, this causes signatures to be required for everything even tho the path could be verified without signing.
2018-12-10 docs: add missing prerequisites: brotli, boost, libseccompDmitry Kalinkin1-0/+19
2018-12-09 Merge pull request #2566 from LnL7/s3-schemeEelco Dolstra4-8/+24
s3: make scheme configurable
2018-12-08 s3: document scheme query parameterDaiderd Jordan1-1/+13
2018-12-07 s3: make scheme configurableDaiderd Jordan3-7/+11
This enables using for http for S3 request for debugging or implementations that don't have https configured. This is not a problem for binary caches since they should not contain sensitive information. Both package signatures and AWS auth already protect against tampering.
2018-12-07 Merge pull request #2562 from chawki008/masterEelco Dolstra1-1/+16
Solve hg "abandoned transaction" issue
2018-12-06 Solve hg "abandoned transaction" issueCHEIKH Chawki1-1/+16
2018-11-20 fetchGit: Drop unnecessary localRefEelco Dolstra1-4/+4
2018-11-20 Merge branch 'better-git-cache' of https://github.com/graham-at-target/nixEelco Dolstra2-3/+5
2018-11-20 Merge pull request #2216 from dtzWill/fix/curl-760-timeoutEelco Dolstra1-1/+2
download: if there are active requests, never sleep for 10s
2018-11-20 Fix typoEelco Dolstra1-1/+1
2018-11-20 Merge pull request #2551 from KaiHa/kaiha/libreadline_optionEelco Dolstra1-2/+9
repl: give user the choice between libeditline and libreadline
2018-11-20 repl: give user the choice between libeditline and libreadlineKai Harries1-0/+9
The goal is to support libeditline AND libreadline and let the user decide at compile time which one to use. Add a compile time option to use libreadline instead of libeditline. If compiled against libreadline completion functionality is lost because of a incompatibility between libeditlines and libreadlines completion function. Completion with libreadline is possible and can be added later. To use libreadline instead of libeditline the environment variables 'EDITLINE_LIBS' and 'EDITLINE_CFLAGS' have to been set during the ./configure step. Example: EDITLINE_LIBS="/usr/lib/x86_64-linux-gnu/libhistory.so /usr/lib/x86_64-linux-gnu/libreadline.so" EDITLINE_CFLAGS="-DREADLINE" The reason for this change is that for example on Debian already three different editline libraries exist but none of those is compatible the flavor used by nix. My hope is that with this change it would be easier to port nix to systems that have already libreadline available.
2018-11-20 repl: Remove code that was commented outKai Harries1-2/+0
2018-11-17 Merge pull request #2544 from mayflower/lsnar-allow-fifoEelco Dolstra1-1/+1
nix ls-nar: allow reading from FIFOs
2018-11-16 nix ls-nar: allow reading from FIFOsLinus Heckemann1-1/+1
fixes #2528
2018-11-15 Fix 'Read-only file system' when building a derivationEelco Dolstra3-1/+5
2018-11-15 Merge pull request #2432 from luke-clifton/fixsslEelco Dolstra1-4/+7
SSL certificate search failed to find user profile certificates.
2018-11-13 Remove editline expression, not needed anymoreEelco Dolstra2-26/+0
2018-11-13 Merge branch 'feature/editline-pr' of https://github.com/dtzWill/nixEelco Dolstra13-4648/+107
2018-11-13 Restore parent mount namespace before executing a child processEelco Dolstra8-4/+48
This ensures that they can't write to /nix/store. Fixes #2535.
2018-11-13 Merge pull request #2534 from obfusk/patch-2Eelco Dolstra1-1/+1
manual: quote $servlets
2018-11-13 manual: quote $servletsFelix C. Stegerman1-1/+1
2018-11-12 Merge pull request #2533 from obfusk/patch-1Eelco Dolstra1-2/+2
manual: fix typo (s/gift/git/)
2018-11-12 fix typo (s/gift/git/)Felix C. Stegerman1-2/+2
2018-11-09 Manual: build locally -> buildEelco Dolstra1-2/+1
2018-11-09 nix-prefetch-url: Stop progress bar before printing resultsEelco Dolstra1-0/+2
2018-11-09 Merge branch 'feature/prefetch-progress' of https://github.com/dtzWill/nixEelco Dolstra1-0/+7
2018-11-09 UrghEelco Dolstra3-20/+4
2018-11-09 Revert "Bump version"Eelco Dolstra1-1/+1
This reverts commit 5a1a870849d47e198d3690e4befae9b7cd79f098. Counting is hard.
2018-11-08 Merge pull request #2526 from mayflower/manual-fixEelco Dolstra1-1/+1
Fix manual build
2018-11-08 Fix manual buildLinus Heckemann1-1/+1
This was broken by some missing closing tags in 0bea4a50e03
2018-11-08 Merge pull request #2524 from domenkozar/deprecate-toPathEelco Dolstra1-23/+6
Deprecate builtins.toPath
2018-11-08 Deprecate builtins.toPathDomen Kožar1-23/+6
2018-11-07 Enable sandboxing by defaultEelco Dolstra5-10/+34
Closes #179.
2018-11-07 Document allowSubstitutesEelco Dolstra1-0/+14
2018-11-07 Fix preferLocalBuild descriptionEelco Dolstra1-3/+1
preferLocalBuild does not in fact prevent substitution.
2018-11-05 Bump versionEelco Dolstra1-1/+1