about summary refs log tree commit diff
path: root/configure.ac
AgeCommit message (Collapse)AuthorFilesLines
2007-11-01 * A rule to make a PDF version of the manual.Eelco Dolstra1-0/+1
2007-10-29 * Depend on bash instead of sh (since we use a few bashisms).Eelco Dolstra1-1/+1
2007-10-29 * On FreeBSD, sys/mount.h needs sys/param.h.Eelco Dolstra1-2/+7
2007-10-27 * Detect whether chroot / bind-mount support is available.Eelco Dolstra1-0/+5
2007-05-01 * Give unpacked channels more sensible names than 0, 1, ... They nowEelco Dolstra1-0/+1
get the basename of the channel URL (e.g., nixpkgs-unstable). The top-level Nix expression of the channel is now an attribute set, the attributes of which are the individual channels (e.g., {nixpkgs_unstable = ...; strategoxt_unstable = ...}). This makes attribute paths ("nix-env -qaA" and "nix-env -iA") more sensible, e.g., "nix-env -iA nixpkgs_unstable.subversion".
2007-04-16 * It seems that svnversion prints a carriage return on Cygwin, so weEelco Dolstra1-2/+2
get a invalid #define VERSION. Use "svnversion -n" to leave out the newline. Fix provided by Marc Weber.
2007-03-01 * Look for the openssl program at compile time. If not found, callEelco Dolstra1-0/+4
openssl through $PATH at runtime.
2006-12-07 * Check for lchown.Eelco Dolstra1-9/+1
2006-12-06 * Start of the setuid helper (the program that performs the operationsEelco Dolstra1-0/+1
that have to be done as root: running builders under different uids, changing ownership of build results, and deleting paths in the store with the wrong ownership).
2006-12-03 * Use setreuid if setresuid is not available.Eelco Dolstra1-1/+5
2006-11-30 * Skeleton of the privileged worker program.Eelco Dolstra1-0/+1
* Some refactoring: put the NAR archive integer/string serialisation code in a separate file so it can be reused by the worker protocol implementation.
2006-11-29 * Remove --enable-setuid, --with-nix-user and --with-nix-group.Eelco Dolstra1-21/+1
Rather, setuid support is now always compiled in (at least on platforms that have the setresuid system call, e.g., Linux and FreeBSD), but it must enabled by chowning/chmodding the Nix binaries.
2006-11-13 * Don't use the result of `uname -p' on x86_64 as it gives wackyEelco Dolstra1-0/+3
results on some machines. (NIX-69)
2006-10-19 * Require Perl 5.8.0 or newer. I mean, it *is* more than four yearsEelco Dolstra1-1/+9
old...
2006-10-06 * Bumped the version number to 0.11.Eelco Dolstra1-1/+1
2006-09-22 * Build with -D_FILE_OFFSET_BITS=64 to support files >= 2^31 bytesEelco Dolstra1-0/+5
(NIX-22).
2006-09-20 * Check for patch (NIX-59).Eelco Dolstra1-0/+1
2006-09-04 * Store the Nix libraries in ${libdir}/nix instead of ${libdir}.Eelco Dolstra1-0/+1
2006-08-25 * Map "ppc" to "powerpc" so that Linux on PowerPC will be reported asEelco Dolstra1-0/+3
"powerpc-linux".
2006-08-21 * Convert to DocBook 5.Eelco Dolstra1-4/+5
* Use Jing for RelaxNG validation, xmllint seems buggy.
2006-05-31 * On Cygwin, set the system type to i686-cygwin, and disable dynamicEelco Dolstra1-2/+28
linking.
2006-04-25 * Unless --with-bzip2 is specified, use a copy of bzip2 in theEelco Dolstra1-11/+15
externals directory. This is in particular useful because though most systems have bzip2/bunzip2, they don't always have libbz2, which we need for bsdiff/bspatch.
2006-03-01 * Make it easy to run individual tests from the command line.Eelco Dolstra1-3/+5
2006-02-22 * Check whether "nix-store -q --graph" generates a valid dot graph.Eelco Dolstra1-0/+1
* Test "nix-store -q --tree" as well.
2006-02-13 * Optional switch "--with-openssl=<PATH>" to use OpenSSL'sEelco Dolstra1-0/+11
implementations of MD5, SHA-1 and SHA-256. The main benefit is that we get assembler-optimised implementations of MD5 and SHA-1 (though not SHA-256 (at least on x86), unfortunately). OpenSSL's SHA-1 implementation on Intel is twice as fast as ours.
2006-02-01 * bsdiff updated to 4.3. This makes Nix depend on libbz2.Eelco Dolstra1-3/+21
2005-10-05 * log2xml -> nix-log2xml.Eelco Dolstra1-1/+1
2005-09-21 * Use -all_load on Mac OS X.Eelco Dolstra1-0/+7
2005-09-16 * Bump the version number to 0.10.Eelco Dolstra1-1/+1
2005-09-15 * Check for w3m.Eelco Dolstra1-0/+1
2005-09-15 * This is not a GNU project :-PEelco Dolstra1-1/+1
2005-07-22 * Build dynamic libraries.Eelco Dolstra1-1/+5
2005-05-07 * Build .tar.bz2 files in `make dist'.Eelco Dolstra1-1/+1
2005-04-11 * Bump the version number to 0.9.Eelco Dolstra1-1/+1
2005-04-08 * Doh.Eelco Dolstra1-1/+0
2005-03-21 * Fink compatibility.Eelco Dolstra1-3/+3
2005-03-15 * Remove Docbook EBNF dependency.Eelco Dolstra1-5/+0
2005-03-15 * Purify all corepkgs builders.Eelco Dolstra1-0/+7
2005-01-12 * Bump version number to 0.8.Eelco Dolstra1-1/+1
2004-12-29 * Integrated bsdiff/bspatch 4.2 (fromEelco Dolstra1-0/+1
http://www.daemonology.net/bsdiff/bsdiff-4.2.tar.gz) into the source tree. The license is a bit peculiar, but it does allow verbatim copying, which is what we do here (i.e., so don't make any changes to the sources).
2004-12-20 * Place manifests in /nix/var/nix/manifests.Eelco Dolstra1-1/+0
* Use the new patch downloader.
2004-11-14 * Bump version number to 0.7.Eelco Dolstra1-1/+1
2004-10-27 * Use `atdiff' instead of `cmp' for checking test output.Eelco Dolstra1-0/+3
* Don't use local file names in tests since they will produce different parse trees depending on the current directory.
2004-10-25 * Revert r1594 - it didn't solve the problem. Instead addEelco Dolstra1-2/+0
svn-revision to distributions, which should fix it.
2004-10-25 * Make sure that the prerelease version is included in `--version'.Eelco Dolstra1-0/+2
2004-09-09 * A very dirty hack to make setuid installations a bit nicer to use.Eelco Dolstra1-4/+4
Previously there was the problem that all files read by nix-env etc. should be reachable and readable by the Nix user. So for instance building a Nix expression in your home directory meant that the home directory should have at least g+x or o+x permission so that the Nix user could reach the Nix expression. Now we just switch back to the original user just prior to reading sources and the like. The places where this happens are somewhat arbitrary, however. Any scope that has a live SwitchToOriginalUser object in it is executed as the original user. * Back out r1385. setreuid() sets the saved uid to the new real/effective uid, which prevents us from switching back to the original uid. setresuid() doesn't have this problem (although the manpage has a bug: specifying -1 for the saved uid doesn't leave it unchanged; an explicit value must be specified).
2004-09-09 * Use setre[ug]id() instead of setres[ug]id(), since the former isEelco Dolstra1-4/+4
more common than the latter (which exists only on Linux and FreeBSD). We don't really care about dropping the saved IDs since there apparently is no way to quiry them in any case, so it can't influence the build (unlike the effective IDs which are checked by Perl for instance).
2004-08-20 * On systems that have the setresuid() and setresgid() system calls toEelco Dolstra1-0/+6
set the real uid and gid to the effective uid and gid, the Nix binaries can be installed as owned by the Nix user and group instead of root, so no root involvement of any kind is necessary. Linux and FreeBSD have these functions.
2004-08-20 * Setuid support for sharing a Nix installation between multipleEelco Dolstra1-0/+22
users. If the configure flag `--enable-setuid' is used, the Nix programs nix-env, nix-store, etc. are installed with the setuid bit turned on so that they are executed as the user and group specified by `--with-nix-user=USER' and `--with-nix-group=GROUP', respectively (with defaults `nix' and `nix'). The setuid programs drop all special privileges if they are executed by a user who is not a member of the Nix group. The setuid feature is a quick hack to enable sharing of a Nix installation between users who trust each other. It is not generally secure, since any user in the Nix group can modify (by building an appropriate derivation) any object in the store, and for instance inject trojans into binaries used by other users. The setuid programs are owned by root, not the Nix user. This is because on Unix normal users cannot change the real uid, only the effective uid. Many programs don't work properly when the real uid differs from the effective uid. For instance, Perl will turn on taint mode. However, the setuid programs drop all root privileges immediately, changing all uids and gids to the Nix user and group.
2004-08-13 * WTF? More canonical system name problems ("athlon-linux" instead ofEelco Dolstra1-4/+14
"i686-linux").