Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions pkgs/applications/networking/browsers/chromium/update.nix
Original file line number Diff line number Diff line change
Expand Up @@ -145,7 +145,7 @@ in rec {
outputHashMode = "flat";
outputHashAlgo = "md5";

buildInputs = [ curl ];
nativeBuildInputs = [ curl ];
preferLocalBuild = true;

buildCommand = ''
Expand Down Expand Up @@ -178,7 +178,7 @@ in rec {

getHash = path: import (runCommand "gethash.nix" {
inherit path;
buildInputs = [ nix ];
nativeBuildInputs = [ nix ];
} ''
sha256="$(nix-hash --flat --base32 --type sha256 "$path")"
echo "\"$sha256\"" > "$out"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ stdenv.mkDerivation {
outputHashMode = "recursive";
outputHash = "0mm2sb1p5zz6b0z2s4zhdlix6fafydsxmqjy8zbkwzw4f6lazzyl";

buildInputs = [ curl ];
nativeBuildInputs = [ curl ];

impureEnvVars = stdenv.lib.fetchers.proxyImpureEnvVars;
}
2 changes: 1 addition & 1 deletion pkgs/applications/networking/cluster/mesos/mesos-deps.nix
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ stdenv.mkDerivation {
outputHashMode = "recursive";
outputHash = "10h0qs7svw0cqjkyxs8z6s3qraa8ga920zfrr59rdlanbwg4klly";

buildInputs = [ curl ];
nativeBuildInputs = [ curl ];

impureEnvVars = stdenv.lib.fetchers.proxyImpureEnvVars;
}
2 changes: 1 addition & 1 deletion pkgs/build-support/docker/pull.nix
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ let

builder = ./pull.sh;

buildInputs = [ curl utillinux docker kmod dhcp cacert e2fsprogs ];
nativeBuildInputs = [ curl utillinux docker kmod dhcp cacert e2fsprogs ];

outputHashAlgo = "sha256";
outputHash = sha256;
Expand Down
6 changes: 3 additions & 3 deletions pkgs/build-support/fetchbower/default.nix
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{ stdenv, lib, bower2nix, cacert }:
{ stdenvNoCC, lib, bower2nix, cacert }:
let
bowerVersion = version:
let
Expand All @@ -9,7 +9,7 @@ let

cleanName = name: lib.replaceStrings ["/" ":"] ["-" "-"] name;

fetchbower = name: version: target: outputHash: stdenv.mkDerivation {
fetchbower = name: version: target: outputHash: stdenvNoCC.mkDerivation {
name = "${cleanName name}-${bowerVersion version}";
SSL_CERT_FILE = "${cacert}/etc/ssl/certs/ca-bundle.crt";
buildCommand = ''
Expand All @@ -23,7 +23,7 @@ let
outputHashMode = "recursive";
outputHashAlgo = "sha256";
inherit outputHash;
buildInputs = [ bower2nix ];
nativeBuildInputs = [ bower2nix ];
};

in fetchbower
6 changes: 3 additions & 3 deletions pkgs/build-support/fetchbzr/default.nix
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
{ stdenv, bazaar }:
{ stdenvNoCC, bazaar }:
{ url, rev, sha256 }:

stdenv.mkDerivation {
stdenvNoCC.mkDerivation {
name = "bzr-export";

builder = ./builder.sh;
buildInputs = [ bazaar ];
nativeBuildInputs = [ bazaar ];

outputHashAlgo = "sha256";
outputHashMode = "recursive";
Expand Down
6 changes: 3 additions & 3 deletions pkgs/build-support/fetchcvs/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -3,14 +3,14 @@
# tag="<tagname>" (get version by tag name)
# If you don't specify neither one date="NOW" will be used (get latest)

{stdenv, cvs}:
{stdenvNoCC, cvs}:

{cvsRoot, module, tag ? null, date ? null, sha256}:

stdenv.mkDerivation {
stdenvNoCC.mkDerivation {
name = "cvs-export";
builder = ./builder.sh;
buildInputs = [cvs];
nativeBuildInputs = [cvs];

outputHashAlgo = "sha256";
outputHashMode = "recursive";
Expand Down
6 changes: 3 additions & 3 deletions pkgs/build-support/fetchdarcs/default.nix
Original file line number Diff line number Diff line change
@@ -1,15 +1,15 @@
{stdenv, darcs, nix, cacert}:
{stdenvNoCC, darcs, nix, cacert}:

{url, rev ? null, context ? null, md5 ? "", sha256 ? ""}:

if md5 != "" then
throw "fetchdarcs does not support md5 anymore, please use sha256"
else
stdenv.mkDerivation {
stdenvNoCC.mkDerivation {
name = "fetchdarcs";
NIX_SSL_CERT_FILE = "${cacert}/etc/ssl/certs/ca-bundle.crt";
builder = ./builder.sh;
buildInputs = [darcs];
nativeBuildInputs = [darcs];

outputHashAlgo = "sha256";
outputHashMode = "recursive";
Expand Down
8 changes: 4 additions & 4 deletions pkgs/build-support/fetchegg/default.nix
Original file line number Diff line number Diff line change
@@ -1,16 +1,16 @@
# Fetches a chicken egg from henrietta using `chicken-install -r'
# See: http://wiki.call-cc.org/chicken-projects/egg-index-4.html

{ stdenv, chicken }:
{ stdenvNoCC, chicken }:
{ name, version, md5 ? "", sha256 ? "" }:

if md5 != "" then
throw "fetchegg does not support md5 anymore, please use sha256"
else
stdenv.mkDerivation {
stdenvNoCC.mkDerivation {
name = "chicken-${name}-export";
builder = ./builder.sh;
buildInputs = [ chicken ];
nativeBuildInputs = [ chicken ];

outputHashAlgo = "sha256";
outputHashMode = "recursive";
Expand All @@ -20,6 +20,6 @@ stdenv.mkDerivation {

eggName = name;

impureEnvVars = stdenv.lib.fetchers.proxyImpureEnvVars;
impureEnvVars = stdenvNoCC.lib.fetchers.proxyImpureEnvVars;
}

2 changes: 1 addition & 1 deletion pkgs/build-support/fetchfossil/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
stdenv.mkDerivation {
name = "fossil-archive" + (if name != null then "-${name}" else "");
builder = ./builder.sh;
buildInputs = [fossil];
nativeBuildInputs = [fossil];

# Envvar docs are hard to find. A link for the future:
# https://www.fossil-scm.org/index.html/doc/trunk/www/env-opts.md
Expand Down
10 changes: 5 additions & 5 deletions pkgs/build-support/fetchgit/default.nix
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{stdenv, git, cacert}: let
{stdenvNoCC, git, cacert}: let
urlToName = url: rev: let
inherit (stdenv.lib) removeSuffix splitString last;
inherit (stdenvNoCC.lib) removeSuffix splitString last;
base = last (splitString ":" (baseNameOf (removeSuffix "/" url)));

matched = builtins.match "(.*).git" base;
Expand Down Expand Up @@ -48,11 +48,11 @@ assert deepClone -> leaveDotGit;
if md5 != "" then
throw "fetchgit does not support md5 anymore, please use sha256"
else
stdenv.mkDerivation {
stdenvNoCC.mkDerivation {
inherit name;
builder = ./builder.sh;
fetcher = "${./nix-prefetch-git}"; # This must be a string to ensure it's called with bash.
buildInputs = [git];
nativeBuildInputs = [git];

outputHashAlgo = "sha256";
outputHashMode = "recursive";
Expand All @@ -62,7 +62,7 @@ stdenv.mkDerivation {

GIT_SSL_CAINFO = "${cacert}/etc/ssl/certs/ca-bundle.crt";

impureEnvVars = stdenv.lib.fetchers.proxyImpureEnvVars ++ [
impureEnvVars = stdenvNoCC.lib.fetchers.proxyImpureEnvVars ++ [
"GIT_PROXY_COMMAND" "SOCKS_SERVER"
];

Expand Down
2 changes: 1 addition & 1 deletion pkgs/build-support/fetchgit/private.nix
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@
in builtins.toString sshConfigFile}'';

ssh-wrapped = runCommand "fetchgit-ssh" {
buildInputs = [ makeWrapper ];
nativeBuildInputs = [ makeWrapper ];
} ''
mkdir -p $out/bin
makeWrapper ${openssh}/bin/ssh $out/bin/ssh --prefix PATH : "$out/bin" --add-flags "-F ${config}" "$@"
Expand Down
6 changes: 3 additions & 3 deletions pkgs/build-support/fetchgx/default.nix
Original file line number Diff line number Diff line change
@@ -1,12 +1,12 @@
{ stdenv, gx, gx-go, go, cacert }:
{ stdenvNoCC, gx, gx-go, go, cacert }:

{ name, src, sha256 }:

stdenv.mkDerivation {
stdenvNoCC.mkDerivation {
name = "${name}-gxdeps";
inherit src;

buildInputs = [ go gx gx-go ];
nativeBuildInputs = [ go gx gx-go ];

outputHashAlgo = "sha256";
outputHashMode = "recursive";
Expand Down
8 changes: 4 additions & 4 deletions pkgs/build-support/fetchhg/default.nix
Original file line number Diff line number Diff line change
@@ -1,15 +1,15 @@
{stdenv, mercurial, nix}: {name ? null, url, rev ? null, md5 ? null, sha256 ? null, fetchSubrepos ? false}:
{stdenvNoCC, mercurial, nix}: {name ? null, url, rev ? null, md5 ? null, sha256 ? null, fetchSubrepos ? false}:

if md5 != null then
throw "fetchhg does not support md5 anymore, please use sha256"
else
# TODO: statically check if mercurial as the https support if the url starts woth https.
stdenv.mkDerivation {
stdenvNoCC.mkDerivation {
name = "hg-archive" + (if name != null then "-${name}" else "");
builder = ./builder.sh;
buildInputs = [mercurial];
nativeBuildInputs = [mercurial];

impureEnvVars = stdenv.lib.fetchers.proxyImpureEnvVars;
impureEnvVars = stdenvNoCC.lib.fetchers.proxyImpureEnvVars;

subrepoClause = if fetchSubrepos then "S" else "";

Expand Down
2 changes: 1 addition & 1 deletion pkgs/build-support/fetchipfs/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ in
if (!hasHash) then throw "Specify sha for fetchipfs fixed-output derivation" else stdenv.mkDerivation {
name = ipfs;
builder = ./builder.sh;
buildInputs = [ curl ];
nativeBuildInputs = [ curl ];

# New-style output content requirements.
outputHashAlgo = if outputHashAlgo != "" then outputHashAlgo else
Expand Down
6 changes: 3 additions & 3 deletions pkgs/build-support/fetchmtn/default.nix
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
# You can specify some extra mirrors and a cache DB via options
{stdenv, monotone, defaultDBMirrors ? [], cacheDB ? "./mtn-checkout.db"}:
{stdenvNoCC, monotone, defaultDBMirrors ? [], cacheDB ? "./mtn-checkout.db"}:
# dbs is a list of strings
# each is an url for sync

Expand All @@ -8,7 +8,7 @@
{name ? "mtn-checkout", dbs ? [], sha256
, selector ? "h:" + branch, branch}:

stdenv.mkDerivation {
stdenvNoCC.mkDerivation {
builder = ./builder.sh;
nativeBuildInputs = [monotone];

Expand All @@ -19,7 +19,7 @@ stdenv.mkDerivation {
dbs = defaultDBMirrors ++ dbs;
inherit branch cacheDB name selector;

impureEnvVars = stdenv.lib.fetchers.proxyImpureEnvVars;
impureEnvVars = stdenvNoCC.lib.fetchers.proxyImpureEnvVars;

}

2 changes: 1 addition & 1 deletion pkgs/build-support/fetchnuget/default.nix
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{ stdenv, fetchurl, buildDotnetPackage, unzip }:
{ stdenvNoCC, fetchurl, buildDotnetPackage, unzip }:

attrs @
{ baseName
Expand Down
8 changes: 4 additions & 4 deletions pkgs/build-support/fetchrepoproject/default.nix
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{ stdenv, gitRepo, cacert, copyPathsToStore }:
{ stdenvNoCC, gitRepo, cacert, copyPathsToStore }:

{ name, manifest, rev ? "HEAD", sha256
# Optional parameters:
Expand All @@ -9,7 +9,7 @@
assert repoRepoRev != "" -> repoRepoURL != "";
assert createMirror -> !useArchive;

with stdenv.lib;
with stdenvNoCC.lib;

let
extraRepoInitFlags = [
Expand All @@ -28,7 +28,7 @@ let

local_manifests = copyPathsToStore localManifests;

in stdenv.mkDerivation {
in stdenvNoCC.mkDerivation {
inherit name;

inherit cacert manifest rev repoRepoURL repoRepoRev referenceDir; # TODO
Expand All @@ -44,7 +44,7 @@ in stdenv.mkDerivation {
"GIT_PROXY_COMMAND" "SOCKS_SERVER"
];

buildInputs = [ gitRepo cacert ];
nativeBuildInputs = [ gitRepo cacert ];

GIT_SSL_CAINFO = "${cacert}/etc/ssl/certs/ca-bundle.crt";

Expand Down
6 changes: 3 additions & 3 deletions pkgs/build-support/fetchs3/default.nix
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{ stdenv, runCommand, awscli }:
{ stdenvNoCC, runCommand, awscli }:

{ s3url
, sha256
Expand All @@ -10,13 +10,13 @@
}:

let
credentialAttrs = stdenv.lib.optionalAttrs (credentials != null) {
credentialAttrs = stdenvNoCC.lib.optionalAttrs (credentials != null) {
AWS_ACCESS_KEY_ID = credentials.access_key_id;
AWS_SECRET_ACCESS_KEY = credentials.secret_access_key;
AWS_SESSION_TOKEN = credentials.session_token ? null;
};
in runCommand "foo" ({
buildInputs = [ awscli ];
nativeBuildInputs = [ awscli ];
outputHashAlgo = "sha256";
outputHash = sha256;
outputHashMode = if recursiveHash then "recursive" else "flat";
Expand Down
10 changes: 5 additions & 5 deletions pkgs/build-support/fetchsvn/default.nix
Original file line number Diff line number Diff line change
@@ -1,9 +1,9 @@
{stdenv, subversion, glibcLocales, sshSupport ? false, openssh ? null}:
{stdenvNoCC, subversion, glibcLocales, sshSupport ? false, openssh ? null}:
{url, rev ? "HEAD", md5 ? "", sha256 ? "",
ignoreExternals ? false, ignoreKeywords ? false, name ? null}:

let
repoName = with stdenv.lib;
repoName = with stdenvNoCC.lib;
let
fst = head;
snd = l: head (tail l);
Expand All @@ -28,17 +28,17 @@ in
if md5 != "" then
throw "fetchsvn does not support md5 anymore, please use sha256"
else
stdenv.mkDerivation {
stdenvNoCC.mkDerivation {
name = name_;
builder = ./builder.sh;
buildInputs = [ subversion glibcLocales ];
nativeBuildInputs = [ subversion glibcLocales ];

outputHashAlgo = "sha256";
outputHashMode = "recursive";
outputHash = sha256;

inherit url rev sshSupport openssh ignoreExternals ignoreKeywords;

impureEnvVars = stdenv.lib.fetchers.proxyImpureEnvVars;
impureEnvVars = stdenvNoCC.lib.fetchers.proxyImpureEnvVars;
preferLocalBuild = true;
}
6 changes: 3 additions & 3 deletions pkgs/build-support/fetchsvnssh/default.nix
Original file line number Diff line number Diff line change
@@ -1,14 +1,14 @@
{stdenv, subversion, sshSupport ? false, openssh ? null, expect}:
{stdenvNoCC, subversion, sshSupport ? false, openssh ? null, expect}:
{username, password, url, rev ? "HEAD", md5 ? "", sha256 ? ""}:


if md5 != "" then
throw "fetchsvnssh does not support md5 anymore, please use sha256"
else
stdenv.mkDerivation {
stdenvNoCC.mkDerivation {
name = "svn-export-ssh";
builder = ./builder.sh;
buildInputs = [subversion expect];
nativeBuildInputs = [subversion expect];

outputHashAlgo = "sha256";
outputHashMode = "recursive";
Expand Down
Loading