about summary refs log tree commit diff
AgeCommit message (Collapse)AuthorFilesLines
2019-01-31 Add builtins.appendContext.Shea Levy2-4/+61
A partner of builtins.getContext, useful for the same reasons.
2019-01-14 Add builtins.getContext.Shea Levy5-38/+158
This can be very helpful when debugging, as well as enabling complex black magic like surgically removing a single dependency from a string's context.
2019-01-13 Treat plain derivation paths in context as normal paths.Shea Levy2-17/+6
Previously, plain derivation paths in the string context (e.g. those that arose from builtins.storePath on a drv file, not those that arose from accessing .drvPath of a derivation) were treated somewhat like derivaiton paths derived from .drvPath, except their dependencies weren't recursively added to the input set. With this change, such plain derivation paths are simply treated as paths and added to the source inputs set accordingly, simplifying context handling code and removing the inconsistency. If drvPath-like behavior is desired, the .drv file can be imported and then .drvPath can be accessed. This is a backwards-incompatibility, but storePath is never used on drv files within nixpkgs and almost never used elsewhere.
2019-01-11 install: Use base-16 hashesEelco Dolstra1-1/+1
Issue #2623.
2019-01-11 Bump versionEelco Dolstra1-1/+1
2019-01-10 Add 2.2 release notesEelco Dolstra1-4/+118
2019-01-10 Revert "Remove some bashisms from configure.ac"Eelco Dolstra1-11/+6
This reverts commit e8b0efdcc9d6329b299937790360cac8b9b256c9.
2019-01-10 Revert "Escape square brackets in configure.ac"Eelco Dolstra1-1/+1
This reverts commit 80f464d9d72839841422f75e78ce725365cc3d71.
2019-01-10 Merge pull request #2608 from dtzWill/fix/issue-2546Eelco Dolstra1-0/+1
EvalState::resetFileCache: clear parse cache as well as eval cache
2019-01-10 Merge pull request #2617 from veprbl/pr/V547_nix_repl.ccEelco Dolstra1-18/+1
remove some dead code in nix/repl.cc
2019-01-09 Merge pull request #2618 from 0mp/fix-configure.acEelco Dolstra1-1/+1
Escape square brackets in configure.ac
2019-01-09 Escape square brackets in configure.acMateusz Piotrowski1-1/+1
This patch attempts to solve the regression introduced in e8b0efdc (#2607).
2019-01-07 Merge pull request #2601 from dtzWill/update/json-3.5.0Eelco Dolstra1-2649/+8181
Update nlohmann-json 3.0.1 -> 3.5.0
2019-01-07 Merge pull request #2607 from 0mp/configure.ac-fixEelco Dolstra1-6/+11
Remove some bashisms from configure.ac
2019-01-07 Merge pull request #2612 from Ericson2314/remove-dead-dynlib_suffixEelco Dolstra9-26/+5
[Needs testing and review] Remove dead code
2019-01-07 Don't look for a "pv" program, or mention it in the manual sourceJohn Ericson2-10/+0
The manual reference was commented out, and the sole reference to this program other than the configure script. Removed both.
2019-01-05 Remove mentions of `libformat`, it no longer existsJohn Ericson6-7/+5
2019-01-05 brotli is only used as a library nowJohn Ericson3-4/+0
2019-01-05 Remove dead code computing `dynlib_suffix` from comfigure.acJohn Ericson1-5/+0
2018-12-31 EvalState::resetFileCache: clear parse cache as well as eval cacheWill Dietz1-0/+1
Fixes #2546. (at least the basic reproduction I've been testing)
2018-12-30 Remove some bashisms from configure.acMateusz Piotrowski1-6/+11
"configure.ac" is used to generate "configure", which is supposed to be run with /bin/sh (as suggested by the shebang line of "configure"). As a result it is a good idea to remove any /bin/sh-incompatible syntax from configure.ac. Otherwise, systems that do not use Bash as their /bin/sh are unable to run "configure" due to syntax errors.
2018-12-25 remove some dead code in nix/repl.ccDmitry Kalinkin1-18/+1
Fixes a static analyzer warning: Expression 'isDrv' is always false. Fixes: 3beb6f6e7 ('Show derivations more concisely')
2018-12-21 nlohmann-json: 3.4.0 -> 3.5.0Will Dietz1-129/+261
https://github.com/nlohmann/json/releases/tag/v3.5.0
2018-12-21 nlohmann: 3.0.1 -> 3.4.0Will Dietz1-2634/+8034
``` $ curl -L "https://github.com/nlohmann/json/releases/download/v3.4.0/json.hpp" -o src/nlohmann/json.hpp ```
2018-12-19 Merge pull request #2586 from dtzWill/fix/remove-debug-print-nix-storeShea Levy1-3/+0
nix-store: remove debugging print
2018-12-15 Merge pull request #2584 from dtzWill/fix/test-sri-512-256Shea Levy1-1/+1
tests/fetchurl: fix after changing default hash from 512 to 256
2018-12-15 nix-store: remove debugging printWill Dietz1-3/+0
2018-12-14 tests/fetchurl: fix after changing default hash from 512 to 256Will Dietz1-1/+1
2018-12-14 Merge pull request #2580 from Synthetica9/nix-instantiate-rwm-docfixEelco Dolstra1-1/+3
Clarify nix-instantiate --read-write-mode
2018-12-14 Clarify nix-instantiate --read-write-modePatrick Hilhorst1-1/+3
2018-12-13 Support SRI hashesEelco Dolstra8-35/+73
SRI hashes (https://www.w3.org/TR/SRI/) combine the hash algorithm and a base-64 hash. This allows more concise and standard hash specifications. For example, instead of import <nix/fetchurl.nl> { url = https://nixos.org/releases/nix/nix-2.1.3/nix-2.1.3.tar.xz; sha256 = "5d22dad058d5c800d65a115f919da22938c50dd6ba98c5e3a183172d149840a4"; }; you can write import <nix/fetchurl.nl> { url = https://nixos.org/releases/nix/nix-2.1.3/nix-2.1.3.tar.xz; hash = "sha256-XSLa0FjVyADWWhFfkZ2iKTjFDda6mMXjoYMXLRSYQKQ="; }; In fixed-output derivations, the outputHashAlgo is no longer mandatory if outputHash specifies the hash (either as an SRI or in the old "<type>:<hash>" format). 'nix hash-{file,path}' now print hashes in SRI format by default. I also reverted them to use SHA-256 by default because that's what we're using most of the time in Nixpkgs. Suggested by @zimbatm.
2018-12-13 Merge pull request #2569 from veprbl/pr/update_prerequisitesEelco Dolstra1-0/+19
docs: add missing prerequisites: brotli, boost, libseccomp
2018-12-13 Merge pull request #2576 from LnL7/repl-no-linkEelco Dolstra1-1/+1
nix repl: don't create result symlinks
2018-12-13 Merge pull request #2578 from volth/patch-5Eelco Dolstra1-1/+1
probably typo
2018-12-13 docs: raise minimal boost version to 1.66Dmitry Kalinkin1-1/+1
2018-12-13 probably typovolth1-1/+1
...at least MSVC unable to compile this
2018-12-12 nix repl: don't create result symlinksDaiderd Jordan1-1/+1
2018-12-12 Merge pull request #2574 from zimbatm/multi-line-expected-sha256Eelco Dolstra3-6/+6
libstore: improve hash mismatch error messages
2018-12-12 libstore: improve hash mismatch error messageszimbatm3-6/+6
Use the same output ordering and format everywhere. This is such a common issue that we trade the single-line error message for more readability. Old message: ``` fixed-output derivation produced path '/nix/store/d4nw9x2sy9q3r32f3g5l5h1k833c01vq-example.com' with sha256 hash '08y4734bm2zahw75b16bcmcg587vvyvh0n11gwiyir70divwp1rm' instead of the expected hash '1xzwnipjd54wl8g93vpw6hxnpmdabq0wqywriiwmh7x8k0lvpq5m' ``` New message: ``` hash mismatch in fixed-output derivation '/nix/store/d4nw9x2sy9q3r32f3g5l5h1k833c01vq-example.com': wanted: sha256:1xzwnipjd54wl8g93vpw6hxnpmdabq0wqywriiwmh7x8k0lvpq5m got: sha256:08y4734bm2zahw75b16bcmcg587vvyvh0n11gwiyir70divwp1rm ```
2018-12-12 Fix assertion failure in NarInfoDiskCacheEelco Dolstra1-15/+15
https://hydra.nixos.org/build/85827920
2018-12-12 Merge pull request #2572 from LnL7/narinfo-caEelco Dolstra1-2/+5
nar-info-disk-cache: include ca in the cache entries
2018-12-12 nar-info-disk-cache: include ca in the cache entriesDaiderd Jordan1-2/+5
Without this information the content addressable state and hashes are lost after the first request, this causes signatures to be required for everything even tho the path could be verified without signing.
2018-12-10 docs: add missing prerequisites: brotli, boost, libseccompDmitry Kalinkin1-0/+19
2018-12-09 Merge pull request #2566 from LnL7/s3-schemeEelco Dolstra4-8/+24
s3: make scheme configurable
2018-12-08 s3: document scheme query parameterDaiderd Jordan1-1/+13
2018-12-07 s3: make scheme configurableDaiderd Jordan3-7/+11
This enables using for http for S3 request for debugging or implementations that don't have https configured. This is not a problem for binary caches since they should not contain sensitive information. Both package signatures and AWS auth already protect against tampering.
2018-12-07 Merge pull request #2562 from chawki008/masterEelco Dolstra1-1/+16
Solve hg "abandoned transaction" issue
2018-12-06 Solve hg "abandoned transaction" issueCHEIKH Chawki1-1/+16
2018-11-20 fetchGit: Drop unnecessary localRefEelco Dolstra1-4/+4
2018-11-20 Merge branch 'better-git-cache' of https://github.com/graham-at-target/nixEelco Dolstra2-3/+5