You need to sign in or sign up before continuing.
- May 17, 2021
-
-
regnat authored
-
- Dec 02, 2020
-
-
Eelco Dolstra authored
-
- Oct 18, 2020
-
-
Eelco Dolstra authored
-
- Oct 06, 2020
-
-
Eelco Dolstra authored
-
- Sep 17, 2020
-
-
Eelco Dolstra authored
This isn't used anywhere except in the configure script of the Perl bindings. I've changed the latter to use the C++ API's Settings object at runtime.
-
- Sep 15, 2020
-
-
Eelco Dolstra authored
-
- Sep 13, 2020
-
-
Brian Leung authored
-
- Aug 24, 2020
-
-
Eelco Dolstra authored
-
- Aug 19, 2020
-
-
Eelco Dolstra authored
This means we don't have two (divergent) sets of option descriptions anymore.
-
- Aug 17, 2020
-
-
Eelco Dolstra authored
-
- Jul 24, 2020
-
-
Eelco Dolstra authored
-
- Jun 04, 2020
-
-
John Ericson authored
I gather this comes from the new unit tests.
-
- Apr 06, 2020
-
-
Ben Burdette authored
-
- Mar 24, 2020
-
-
Eelco Dolstra authored
-
- Nov 28, 2019
-
-
Eelco Dolstra authored
Closes #3225. Closes #3226.
-
- Nov 26, 2019
-
-
Eelco Dolstra authored
This is no longer needed.
-
Eelco Dolstra authored
-
- Nov 08, 2019
-
-
zimbatm authored
-
- Apr 08, 2019
-
-
Eelco Dolstra authored
-
- Jan 13, 2019
-
-
Shea Levy authored
Previously, plain derivation paths in the string context (e.g. those that arose from builtins.storePath on a drv file, not those that arose from accessing .drvPath of a derivation) were treated somewhat like derivaiton paths derived from .drvPath, except their dependencies weren't recursively added to the input set. With this change, such plain derivation paths are simply treated as paths and added to the source inputs set accordingly, simplifying context handling code and removing the inconsistency. If drvPath-like behavior is desired, the .drv file can be imported and then .drvPath can be accessed. This is a backwards-incompatibility, but storePath is never used on drv files within nixpkgs and almost never used elsewhere.
-
- Mar 20, 2018
-
-
Eelco Dolstra authored
This avoids sandbox annoyances.
-
- Feb 08, 2018
-
-
Shea Levy authored
All plugins in plugin-files will be dlopened, allowing them to statically construct instances of the various Register* types Nix supports.
-
- Oct 03, 2017
-
-
Dan Peebles authored
It was getting too much like whac-a-mole listing all the retriable error conditions, so we now retry by default and list the cases where retrying is almost certainly hopeless.
-
- Jun 06, 2017
-
-
Eelco Dolstra authored
Even with "build-use-sandbox = false", we now use sandboxing with a permissive profile that allows everything except the creation of setuid/setgid binaries.
-
- May 31, 2017
-
-
Eelco Dolstra authored
Also, add rules to allow fixed-output derivations to access the network. These rules are sufficient to build stdenvDarwin without any __sandboxProfile magic.
-
- May 30, 2017
-
-
Eelco Dolstra authored
Issue #759. Also, remove nix.conf from the sandbox since I don't really see a legitimate reason for builders to access the Nix configuration.
-
- Feb 07, 2017
-
-
Shea Levy authored
-
Eelco Dolstra authored
Replaced by SSHStore.
-
Eelco Dolstra authored
-
- Jan 20, 2017
-
-
Shea Levy authored
Tests fail currently because the database is not given proper hashes in the VM
-
- Nov 10, 2016
-
-
Shea Levy authored
-
- Oct 16, 2016
-
-
Alexander Ried authored
-
- Aug 11, 2016
- Aug 10, 2016
- Aug 09, 2016
-
-
Shea Levy authored
This was a dumb line-for-line rewrite, because nix build/nix run/etc. will replace it.
-
- Jul 21, 2016
-
-
Shea Levy authored
-
- Jun 02, 2016
-
-
Eelco Dolstra authored
This is primarily to subsume the functionality of the copy-from-other-stores substituter. For example, in the NixOS installer, we can now do (assuming we're in the target chroot, and the Nix store of the installation CD is bind-mounted on /tmp/nix): $ nix-build ... --option substituters 'local?state=/tmp/nix/var&real=/tmp/nix/store' However, unlike copy-from-other-stores, this also allows write access to such a store. One application might be fetching substitutes for /nix/store in a situation where the user doesn't have sufficient privileges to create /nix, e.g.: $ NIX_REMOTE="local?state=/home/alice/nix/var&real=/home/alice/nix/store" nix-build ...
-
- Apr 25, 2016
-
-
Eelco Dolstra authored
-