mirror of
https://github.com/NixOS/nixpkgs.git
synced 2025-06-08 02:38:11 +09:00

This allows on-the-fly rewriting of URLs before they are passed from fetchurl (or fetchurlBoot) to curl. The intended use is to allow inserting company-internal mirrors, or working around company firewalls and similar network restrictions, without having to extensively patch across all of nixpkgs. Instead, users can pass a function in their nixpkgs that performs the necessary URL rewrites. Co-authored-by: Alexander Bantyev <balsoft@balsoft.ru>
262 lines
7.6 KiB
Nix
262 lines
7.6 KiB
Nix
# This file defines the structure of the `config` nixpkgs option.
|
|
|
|
# This file is tested in `pkgs/test/config.nix`.
|
|
# Run tests with:
|
|
#
|
|
# nix-build -A tests.config
|
|
#
|
|
|
|
{ config, lib, ... }:
|
|
|
|
let
|
|
inherit (lib)
|
|
literalExpression
|
|
mapAttrsToList
|
|
mkOption
|
|
optionals
|
|
types
|
|
;
|
|
|
|
mkMassRebuild =
|
|
args:
|
|
mkOption (
|
|
builtins.removeAttrs args [ "feature" ]
|
|
// {
|
|
type = args.type or (types.uniq types.bool);
|
|
default = args.default or false;
|
|
description = (
|
|
(args.description or ''
|
|
Whether to ${args.feature} while building nixpkgs packages.
|
|
''
|
|
)
|
|
+ ''
|
|
Changing the default may cause a mass rebuild.
|
|
''
|
|
);
|
|
}
|
|
);
|
|
|
|
options = {
|
|
|
|
# Internal stuff
|
|
|
|
# Hide built-in module system options from docs.
|
|
_module.args = mkOption {
|
|
internal = true;
|
|
};
|
|
|
|
warnings = mkOption {
|
|
type = types.listOf types.str;
|
|
default = [ ];
|
|
internal = true;
|
|
};
|
|
|
|
# Config options
|
|
|
|
warnUndeclaredOptions = mkOption {
|
|
description = "Whether to warn when `config` contains an unrecognized attribute.";
|
|
type = types.bool;
|
|
default = false;
|
|
};
|
|
|
|
doCheckByDefault = mkMassRebuild {
|
|
feature = "run `checkPhase` by default";
|
|
};
|
|
|
|
strictDepsByDefault = mkMassRebuild {
|
|
feature = "set `strictDeps` to true by default";
|
|
};
|
|
|
|
structuredAttrsByDefault = mkMassRebuild {
|
|
feature = "set `__structuredAttrs` to true by default";
|
|
};
|
|
|
|
enableParallelBuildingByDefault = mkMassRebuild {
|
|
feature = "set `enableParallelBuilding` to true by default";
|
|
};
|
|
|
|
configurePlatformsByDefault = mkMassRebuild {
|
|
feature = "set `configurePlatforms` to `[\"build\" \"host\"]` by default";
|
|
};
|
|
|
|
contentAddressedByDefault = mkMassRebuild {
|
|
feature = "set `__contentAddressed` to true by default";
|
|
};
|
|
|
|
allowAliases = mkOption {
|
|
type = types.bool;
|
|
default = true;
|
|
description = ''
|
|
Whether to expose old attribute names for compatibility.
|
|
|
|
The recommended setting is to enable this, as it
|
|
improves backward compatibility, easing updates.
|
|
|
|
The only reason to disable aliases is for continuous
|
|
integration purposes. For instance, Nixpkgs should
|
|
not depend on aliases in its internal code. Projects
|
|
that aren't Nixpkgs should be cautious of instantly
|
|
removing all usages of aliases, as migrating too soon
|
|
can break compatibility with the stable Nixpkgs releases.
|
|
'';
|
|
};
|
|
|
|
allowUnfree = mkOption {
|
|
type = types.bool;
|
|
default = false;
|
|
# getEnv part is in check-meta.nix
|
|
defaultText = literalExpression ''false || builtins.getEnv "NIXPKGS_ALLOW_UNFREE" == "1"'';
|
|
description = ''
|
|
Whether to allow unfree packages.
|
|
|
|
See [Installing unfree packages](https://nixos.org/manual/nixpkgs/stable/#sec-allow-unfree) in the NixOS manual.
|
|
'';
|
|
};
|
|
|
|
allowBroken = mkOption {
|
|
type = types.bool;
|
|
default = false;
|
|
# getEnv part is in check-meta.nix
|
|
defaultText = literalExpression ''false || builtins.getEnv "NIXPKGS_ALLOW_BROKEN" == "1"'';
|
|
description = ''
|
|
Whether to allow broken packages.
|
|
|
|
See [Installing broken packages](https://nixos.org/manual/nixpkgs/stable/#sec-allow-broken) in the NixOS manual.
|
|
'';
|
|
};
|
|
|
|
allowUnsupportedSystem = mkOption {
|
|
type = types.bool;
|
|
default = false;
|
|
# getEnv part is in check-meta.nix
|
|
defaultText = literalExpression ''false || builtins.getEnv "NIXPKGS_ALLOW_UNSUPPORTED_SYSTEM" == "1"'';
|
|
description = ''
|
|
Whether to allow unsupported packages.
|
|
|
|
See [Installing packages on unsupported systems](https://nixos.org/manual/nixpkgs/stable/#sec-allow-unsupported-system) in the NixOS manual.
|
|
'';
|
|
};
|
|
|
|
allowVariants = mkOption {
|
|
type = types.bool;
|
|
default = true;
|
|
description = ''
|
|
Whether to expose the nixpkgs variants.
|
|
|
|
Variants are instances of the current nixpkgs instance with different stdenvs or other applied options.
|
|
This allows for using different toolchains, libcs, or global build changes across nixpkgs.
|
|
Disabling can ensure nixpkgs is only building for the platform which you specified.
|
|
'';
|
|
};
|
|
|
|
cudaSupport = mkMassRebuild {
|
|
type = types.bool;
|
|
default = false;
|
|
feature = "build packages with CUDA support by default";
|
|
};
|
|
|
|
replaceBootstrapFiles = mkMassRebuild {
|
|
type = types.functionTo (types.attrsOf types.package);
|
|
default = lib.id;
|
|
defaultText = literalExpression "lib.id";
|
|
description = ''
|
|
Use the bootstrap files returned instead of the default bootstrap
|
|
files.
|
|
The default bootstrap files are passed as an argument.
|
|
'';
|
|
example = literalExpression ''
|
|
prevFiles:
|
|
let
|
|
replacements = {
|
|
"sha256-YQlr088HPoVWBU2jpPhpIMyOyoEDZYDw1y60SGGbUM0=" = import <nix/fetchurl.nix> {
|
|
url = "(custom glibc linux x86_64 bootstrap-tools.tar.xz)";
|
|
hash = "(...)";
|
|
};
|
|
"sha256-QrTEnQTBM1Y/qV9odq8irZkQSD9uOMbs2Q5NgCvKCNQ=" = import <nix/fetchurl.nix> {
|
|
url = "(custom glibc linux x86_64 busybox)";
|
|
hash = "(...)";
|
|
executable = true;
|
|
};
|
|
};
|
|
in
|
|
builtins.mapAttrs (name: prev: replacements.''${prev.outputHash} or prev) prevFiles
|
|
'';
|
|
};
|
|
|
|
rocmSupport = mkMassRebuild {
|
|
type = types.bool;
|
|
default = false;
|
|
feature = "build packages with ROCm support by default";
|
|
};
|
|
|
|
showDerivationWarnings = mkOption {
|
|
type = types.listOf (types.enum [ "maintainerless" ]);
|
|
default = [ ];
|
|
description = ''
|
|
Which warnings to display for potentially dangerous
|
|
or deprecated values passed into `stdenv.mkDerivation`.
|
|
|
|
A list of warnings can be found in
|
|
[/pkgs/stdenv/generic/check-meta.nix](https://github.com/NixOS/nixpkgs/blob/master/pkgs/stdenv/generic/check-meta.nix).
|
|
|
|
This is not a stable interface; warnings may be added, changed
|
|
or removed without prior notice.
|
|
'';
|
|
};
|
|
|
|
checkMeta = mkOption {
|
|
type = types.bool;
|
|
default = false;
|
|
description = ''
|
|
Whether to check that the `meta` attribute of derivations are correct during evaluation time.
|
|
'';
|
|
};
|
|
|
|
rewriteURL = mkOption {
|
|
type = types.functionTo (types.nullOr types.str);
|
|
description = ''
|
|
A hook to rewrite/filter URLs before they are fetched.
|
|
|
|
The function is passed the URL as a string, and is expected to return a new URL, or null if the given URL should not be attempted.
|
|
|
|
This function is applied _prior_ to resolving mirror:// URLs.
|
|
|
|
The intended use is to allow URL rewriting to insert company-internal mirrors, or work around company firewalls and similar network restrictions.
|
|
'';
|
|
default = lib.id;
|
|
defaultText = literalExpression "(url: url)";
|
|
example = literalExpression ''
|
|
{
|
|
# Use Nix like it's 2024! ;-)
|
|
rewriteURL = url: "https://web.archive.org/web/2024/''${url}";
|
|
}
|
|
'';
|
|
};
|
|
};
|
|
|
|
in
|
|
{
|
|
|
|
freeformType =
|
|
let
|
|
t = types.lazyAttrsOf types.raw;
|
|
in
|
|
t
|
|
// {
|
|
merge =
|
|
loc: defs:
|
|
let
|
|
r = t.merge loc defs;
|
|
in
|
|
r // { _undeclared = r; };
|
|
};
|
|
|
|
inherit options;
|
|
|
|
config = {
|
|
warnings = optionals config.warnUndeclaredOptions (
|
|
mapAttrsToList (k: v: "undeclared Nixpkgs option set: config.${k}") config._undeclared or { }
|
|
);
|
|
};
|
|
|
|
}
|