Re: [Nix-dev] fetchgit

2017-03-15 Thread Teo Klestrup
Is bcupkgs a fork of Nixpkgs? If so then you probably want to override Nixpkgs in your NIX_PATH by setting NIX_PATH=nixpkgs=~/local/bcupkgs. On 9 Mar 2017 11:53 AM, "Sébastien Petitdemange" < sebastien.petitdema...@esrf.fr> wrote: Hi, I've modify fetchgit module to add an optional argument to

Re: [Nix-dev] fetchgit

2017-03-10 Thread Sébastien Petitdemange
Hi Profpatsch, Here is the tree of my private package: ./local/bcupkgs/ ├── default.nix └── pkgs ├── build-support │ └── fetchgit │ ├── builder.sh │ ├── default.nix │ └── nix-prefetch-git └── development └── libraries └── lima-core

Re: [Nix-dev] fetchgit

2017-03-09 Thread Profpatsch
On 17-03-09 04:31pm, Sébastien Petitdemange wrote: > Hi Profpatsch, > > Yes I'm in the folder where I changed fetchgit but it doesn't call my > modification version. > How can I make sure that my package (lima-core) call my modify version? > Is there a way to do that? I cannot tell you anything

Re: [Nix-dev] fetchgit

2017-03-09 Thread Sébastien Petitdemange
Hi Profpatsch, Yes I'm in the folder where I changed fetchgit but it doesn't call my modification version. How can I make sure that my package (lima-core) call my modify version? Is there a way to do that? SEB On 03/09/2017 12:08 PM, Profpatsch wrote: > If you’re in the folder of the nixpkgs

Re: [Nix-dev] fetchgit

2017-03-09 Thread Sébastien Petitdemange
Hi Teo, No, it's not a fork. It contain only few private package + fetchgit with the modification. SEB On 03/09/2017 11:57 AM, Teo Klestrup wrote: > Is bcupkgs a fork of Nixpkgs? If so then you probably want to override > Nixpkgs in your NIX_PATH by setting NIX_PATH=nixpkgs=~/local/bcupkgs. <>

Re: [Nix-dev] fetchgit

2017-03-09 Thread Profpatsch
On 17-03-09 11:52am, Sébastien Petitdemange wrote: > Hi, > > I've modify fetchgit module to add an optional argument to filter > submodule. And I would like to use this optional argument to build my > local package. Unfortunately, nix-build still get fetchgit from the main > channel instead of

[Nix-dev] fetchgit

2017-03-09 Thread Sébastien Petitdemange
Hi, I've modify fetchgit module to add an optional argument to filter submodule. And I would like to use this optional argument to build my local package. Unfortunately, nix-build still get fetchgit from the main channel instead of ~/local/bcupckgs: -> nix-build --show-trace ~/local/bcupkgs

Re: [Nix-dev] fetchgit with ssh

2014-01-13 Thread aszlig
On Mon, Jan 13, 2014 at 01:40:55PM +0800, S??nke Hahn wrote: I also tried out https-urls. The problem is that not all repos that I need to access are public. So I have to provide some authentication. For ssh I can just put keys in .ssh, but for https in this setting, I'm not sure if it's even

Re: [Nix-dev] fetchgit with ssh

2014-01-13 Thread Sönke Hahn
Thomas Bereknyei wrote: I'm not positive this is the problem, but take a look at another example. No quotes around the url and different format. src = fetchgit { url = git://git.gnupg.org/libgcrypt.git; rev = 99b18aa53; sha256 =

Re: [Nix-dev] fetchgit with ssh

2014-01-13 Thread Vladimír Čunát
On 01/13/2014 04:09 PM, Sönke Hahn wrote: Omitting the username does not seem to work for bitbucket, though. Nixops just hangs after initializing the git repo. I guess, github has 'git' set as the default user. Different providers have different URI schemes, example from nixpkgs: src =

Re: [Nix-dev] fetchgit with ssh

2014-01-13 Thread Sönke Hahn
Vladimír Čunát wrote: Maybe it's easy to add the support, I'll look again at it this evening (I hope), if noone else solves it beforehand. The main problem is the purity of ~/.ssh -- this directory just shouldn't be considered, as the behavior inherently impure. Adding key/password to

Re: [Nix-dev] fetchgit with ssh

2014-01-13 Thread Sönke Hahn
Aristid Breitkreuz wrote: A noteworthy workaround would be that you can just have a manual checkout of your private repos and then do src = ./path/to/repo; Thanks. Yes, that's what we're doing right now. (And it's not even that inconvenient, but I thought fetchgit could be better.) Am

Re: [Nix-dev] fetchgit with ssh

2014-01-13 Thread Sönke Hahn
Yes, that helps, thanks! It's actually not github, we are using bitbucket for internal repos, but bitbucket seems to have similar possibilities: https://confluence.atlassian.com/display/BITBUCKET/OAuth+on+Bitbucket I'm going to look into this tomorrow. Cheers, Sönke aszlig wrote: On Mon,

Re: [Nix-dev] fetchgit with ssh

2014-01-13 Thread Corey O'Connor
Previously I've had success accessing private git repos via ssh using: 1. a ssh:// URL. EG: ssh://g...@git.corp.ooyala.com/qa/tools/jenkins-ci.git 2. Patching fetchgit to pass the GIT_SSH env variable and configuring GIT_SSH to propagate the keys as expected. Part #2 is much like Azlig

[Nix-dev] fetchgit with ssh

2014-01-12 Thread Sönke Hahn
Hi, I am trying to use fetchgit to package code that is available in git-repos. I am using for example this expression: pkgs.fetchgit { url = g...@github.com:jekor/haskell-sscgi.git; rev = 1547156d7199bdf40a837040a905d9b6b771dd26; } This does not work, the error message being: error:

Re: [Nix-dev] fetchgit with ssh

2014-01-12 Thread Thomas Bereknyei
I'm not positive this is the problem, but take a look at another example. No quotes around the url and different format. src = fetchgit { url = git://git.gnupg.org/libgcrypt.git; rev = 99b18aa53; sha256 = 1rhbpxqrkfszlv8jvw8s4apwklal07k8zxv5q555l7binc1j1j3z; }; On Mon, Jan

Re: [Nix-dev] fetchgit with ssh

2014-01-12 Thread Vladimír Čunát
Hi. On 01/13/2014 07:52 AM, Thomas Bereknyei wrote: I'm not positive this is the problem, but take a look at another example. No quotes around the url and different format. src = fetchgit { url = git://git.gnupg.org/libgcrypt.git; rev = 99b18aa53; sha256 =

Re: [Nix-dev] fetchgit with ssh

2014-01-12 Thread Aristid Breitkreuz
A noteworthy workaround would be that you can just have a manual checkout of your private repos and then do src = ./path/to/repo; Am 13.01.2014 08:49 schrieb Vladimír Čunát vcu...@gmail.com: Hi. On 01/13/2014 07:52 AM, Thomas Bereknyei wrote: I'm not positive this is the problem, but take a

Re: [Nix-dev] fetchgit - why sha256 protection?

2012-11-19 Thread Eelco Dolstra
Hi, On 19/11/12 07:11, Marc Weber wrote: Isn't it enough to depend on the git's hash value, No, because Nix's fixed-output derivation feature requires a md5/sha1/sha256 hash of the expected contents. -- Eelco Dolstra | LogicBlox, Inc. | http://nixos.org/~eelco/

Re: [Nix-dev] fetchgit - why sha256 protection?

2012-11-19 Thread Marc Weber
Excerpts from Eelco Dolstra's message of Mon Nov 19 11:01:39 +0100 2012: No, because Nix's fixed-output derivation feature requires a md5/sha1/sha256 hash of the expected contents. I know what the current implementation requires. Just wondering whether this should be relaxed for git (like) VCS

Re: [Nix-dev] fetchgit - why sha256 protection?

2012-11-19 Thread Eelco Dolstra
Hi, On 19/11/12 11:25, Marc Weber wrote: Excerpts from Eelco Dolstra's message of Mon Nov 19 11:01:39 +0100 2012: No, because Nix's fixed-output derivation feature requires a md5/sha1/sha256 hash of the expected contents. I know what the current implementation requires. Just wondering

Re: [Nix-dev] fetchgit - why sha256 protection?

2012-11-19 Thread Marc Weber
Excerpts from Eelco Dolstra's message of Mon Nov 19 11:36:00 +0100 2012: No. fetchgit won't work if it's not a fixed-output derivation, because it won't necessarily have network access (it might run in a chroot). Again: I'm not talking about the current state. I'm aware about how it works. I'm

Re: [Nix-dev] fetchgit - why sha256 protection?

2012-11-19 Thread Joachim Schiele
- Original message - Excerpts from Eelco Dolstra's message of Mon Nov 19 11:36:00 +0100 2012: No.  fetchgit won't work if it's not a fixed-output derivation, because it won't necessarily have network access (it might run in a chroot). Again: I'm not talking about the current

Re: [Nix-dev] fetchgit - why sha256 protection?

2012-11-19 Thread Shea Levy
Is it terribly difficult to run nix-prefetch-git? Built-in vcs-specific support doesn't strike me as simplification. On Nov 19, 2012, at 7:10 AM, Joachim Schiele j...@lastlog.de wrote: - Original message - Excerpts from Eelco Dolstra's message of Mon Nov 19 11:36:00 +0100 2012:

Re: [Nix-dev] fetchgit - why sha256 protection?

2012-11-19 Thread Malcolm Matalka
Could fetchgit handle that on its own though? Also, at least for github, if you want to install a specific tag, which isn't always the case, you can link to the .zip copy of it from the github page. /M Shea Levy s...@shealevy.com writes: Is it terribly difficult to run nix-prefetch-git?

Re: [Nix-dev] fetchgit - why sha256 protection?

2012-11-19 Thread Marc Weber
Excerpts from Shea Levy's message of Mon Nov 19 13:38:37 +0100 2012: Is it terribly difficult to run nix-prefetch-git? YES: I'm talking about such configurations: http://gembundler.com/ And here you have git repo and hash. Trying to semi automatically package such things requires much overhead

Re: [Nix-dev] fetchgit - why sha256 protection?

2012-11-19 Thread Mathijs Kwik
Marc Weber marco-owe...@gmx.de writes: Excerpts from Shea Levy's message of Mon Nov 19 13:38:37 +0100 2012: Is it terribly difficult to run nix-prefetch-git? YES: I'm talking about such configurations: http://gembundler.com/ And here you have git repo and hash. Trying to semi automatically

Re: [Nix-dev] fetchgit - why sha256 protection?

2012-11-19 Thread Marc Weber
A similar solution for rubygems would probably not be too hard. As rubygems itself is written in ruby, you can probably plug in to its dependency resolution and downloading capabilities so you can focus on generating the sha256 and the nix expression. If you still haven't got it: I worte

Re: [Nix-dev] fetchgit - why sha256 protection?

2012-11-19 Thread Marc Weber
Excerpts from Eelco Dolstra's message of Mon Nov 19 16:31:26 +0100 2012: Why would you need a double fetch? After running fetchgit, the Git tree is in the Nix store and shouldn't be downloaded again unless you do a garbage collect in between. You're right about this. I want to make bundler

Re: [Nix-dev] fetchgit - why sha256 protection?

2012-11-19 Thread Michael Raskin
Of course running nix-prefetch-git is an option, however checking whether a store path representing { url = ..; hash = .. } already exists is harder. If you run nix-prefetch-git twice it will fetch twice (waste). I haven't looked for options. nix-store --check-validity $(nix-store -q --outputs

[Nix-dev] fetchgit - why sha256 protection?

2012-11-18 Thread Marc Weber
Isn't it enough to depend on the git's hash value, eg fetchgit { git_hash = xxx; url = yyy; } Is compromising a git repository (even using shallow clones) that much easier than compromising a .tar.* file protected by sha256? In anyway you have to find a hash collision. A lot of foreign tools

Re: [Nix-dev] fetchgit - why sha256 protection?

2012-11-18 Thread Nicolas Pierron
On Sun, Nov 18, 2012 at 10:11 PM, Marc Weber marco-owe...@gmx.de wrote: Isn't it enough to depend on the git's hash value, eg fetchgit { git_hash = xxx; url = yyy; } Is compromising a git repository (even using shallow clones) that much easier than compromising a .tar.* file protected by

Re: [Nix-dev] fetchgit - why sha256 protection?

2012-11-18 Thread Nicolas Pierron
On Sun, Nov 18, 2012 at 10:24 PM, Nicolas Pierron nicolas.b.pier...@gmail.com wrote: On Sun, Nov 18, 2012 at 10:11 PM, Marc Weber marco-owe...@gmx.de wrote: Isn't it enough to depend on the git's hash value, eg fetchgit { git_hash = xxx; url = yyy; } Is compromising a git repository (even

[Nix-dev] fetchgit vs tarball creation, privately maintained infrastructure

2011-09-24 Thread Florian Friesdorf
I messed up Subject and Cc m( Now, with Marc's permission publicly. My original mail: Hi Marc, there are currently several expressions pointing to your server resulting in 404s. Why do you prefer to put sources on your private server instead of public infrastructure? Maybe we can