treewide: use https for nixos.org and hydra.nixos.org

tarballs.nixos.org is omitted from the change because urls from there
are always hashed and checked

Changed files
+44 -44
.github
doc
maintainers
nixos
pkgs
applications
networking
cluster
chronos
instant-messengers
vacuum
build-support
fetchurl
development
haskell-modules
interpreters
picoc
libraries
check
gmp
gnutls
gnutls-kdh
libgpg-error
python-modules
eggdeps
pyopenssl
games
dwarf-fortress
tools
package-management
typesetting
tex
texlive
top-level
+1 -1
.github/PULL_REQUEST_TEMPLATE.md
···
<!-- Please check what applies. Note that these are not hard requirements but merely serve as information for reviewers. -->
-
- [ ] Tested using sandboxing ([nix.useSandbox](http://nixos.org/nixos/manual/options.html#opt-nix.useSandbox) on NixOS, or option `sandbox` in [`nix.conf`](http://nixos.org/nix/manual/#sec-conf-file) on non-NixOS linux)
- Built on platform(s)
- [ ] NixOS
- [ ] macOS
···
<!-- Please check what applies. Note that these are not hard requirements but merely serve as information for reviewers. -->
+
- [ ] Tested using sandboxing ([nix.useSandbox](https://nixos.org/nixos/manual/options.html#opt-nix.useSandbox) on NixOS, or option `sandbox` in [`nix.conf`](https://nixos.org/nix/manual/#sec-conf-file) on non-NixOS linux)
- Built on platform(s)
- [ ] NixOS
- [ ] macOS
+1 -1
doc/contributing/quick-start.xml
···
</para>
<para>
The exact syntax and semantics of the Nix expression language, including the built-in function, are described in the Nix manual in the <link
-
xlink:href="http://hydra.nixos.org/job/nix/trunk/tarball/latest/download-by-type/doc/manual/#chap-writing-nix-expressions">chapter on writing Nix expressions</link>.
</para>
</listitem>
<listitem>
···
</para>
<para>
The exact syntax and semantics of the Nix expression language, including the built-in function, are described in the Nix manual in the <link
+
xlink:href="https://hydra.nixos.org/job/nix/trunk/tarball/latest/download-by-type/doc/manual/#chap-writing-nix-expressions">chapter on writing Nix expressions</link>.
</para>
</listitem>
<listitem>
+1 -1
doc/languages-frameworks/android.section.md
···
previous section) supports.
This build function is particularly useful when it is desired to use
-
[Hydra](http://nixos.org/hydra): the Nix-based continuous integration solution
to build Android apps. An Android APK gets exposed as a build product and can be
installed on any Android device with a web browser by navigating to the build
result page.
···
previous section) supports.
This build function is particularly useful when it is desired to use
+
[Hydra](https://nixos.org/hydra): the Nix-based continuous integration solution
to build Android apps. An Android APK gets exposed as a build product and can be
installed on any Android device with a web browser by navigating to the build
result page.
+1 -1
doc/languages-frameworks/ios.section.md
···
specify how iOS apps can be built from source code, and to automatically spawn
iOS simulator instances for testing.
-
This component also makes it possible to use [Hydra](http://nixos.org/hydra),
the Nix-based continuous integration server to regularly build iOS apps and to
do wireless ad-hoc installations of enterprise IPAs on iOS devices through
Hydra.
···
specify how iOS apps can be built from source code, and to automatically spawn
iOS simulator instances for testing.
+
This component also makes it possible to use [Hydra](https://nixos.org/hydra),
the Nix-based continuous integration server to regularly build iOS apps and to
do wireless ad-hoc installations of enterprise IPAs on iOS devices through
Hydra.
+1 -1
doc/preface.chapter.md
···
[this table](https://hydra.nixos.org/job/nixpkgs/trunk/unstable#tabs-constituents)
shows the status of tests for the `nixpkgs` channel.
-
The tests are conducted by a cluster called [Hydra](http://nixos.org/hydra/),
which also builds binary packages from the Nix expressions in Nixpkgs for
`x86_64-linux`, `i686-linux` and `x86_64-darwin`.
The binaries are made available via a [binary cache](https://cache.nixos.org).
···
[this table](https://hydra.nixos.org/job/nixpkgs/trunk/unstable#tabs-constituents)
shows the status of tests for the `nixpkgs` channel.
+
The tests are conducted by a cluster called [Hydra](https://nixos.org/hydra/),
which also builds binary packages from the Nix expressions in Nixpkgs for
`x86_64-linux`, `i686-linux` and `x86_64-darwin`.
The binaries are made available via a [binary cache](https://cache.nixos.org).
+2 -2
doc/release-notes.xml
···
<note>
<para>
This release of Nixpkgs requires <link
-
xlink:href='http://nixos.org/releases/nix/nix-0.10/'>Nix 0.10</link> or higher.
</para>
</note>
···
<listitem>
<para>
Distribution files have been moved to <link
-
xlink:href="http://nixos.org/" />.
</para>
</listitem>
<listitem>
···
<note>
<para>
This release of Nixpkgs requires <link
+
xlink:href='https://nixos.org/releases/nix/nix-0.10/'>Nix 0.10</link> or higher.
</para>
</note>
···
<listitem>
<para>
Distribution files have been moved to <link
+
xlink:href="https://nixos.org/" />.
</para>
</listitem>
<listitem>
+1 -1
maintainers/scripts/hydra-eval-failures.py
···
and print a summary of failed builds
"""
-
url = "http://hydra.nixos.org/jobset/{}".format(jobset)
# get the last evaluation
click.echo(click.style(
···
and print a summary of failed builds
"""
+
url = "https://hydra.nixos.org/jobset/{}".format(jobset)
# get the last evaluation
click.echo(click.style(
+1 -1
nixos/README
···
NixOS is a Linux distribution based on the purely functional package
management system Nix. More information can be found at
-
http://nixos.org/nixos and in the manual in doc/manual.
···
NixOS is a Linux distribution based on the purely functional package
management system Nix. More information can be found at
+
https://nixos.org/nixos and in the manual in doc/manual.
+1 -1
nixos/doc/manual/configuration/adding-custom-packages.xml
···
the package to your clone, and (optionally) submit a patch or pull request to
have it accepted into the main Nixpkgs repository. This is described in
detail in the <link
-
xlink:href="http://nixos.org/nixpkgs/manual">Nixpkgs
manual</link>. In short, you clone Nixpkgs:
<screen>
<prompt>$ </prompt>git clone https://github.com/NixOS/nixpkgs
···
the package to your clone, and (optionally) submit a patch or pull request to
have it accepted into the main Nixpkgs repository. This is described in
detail in the <link
+
xlink:href="https://nixos.org/nixpkgs/manual">Nixpkgs
manual</link>. In short, you clone Nixpkgs:
<screen>
<prompt>$ </prompt>git clone https://github.com/NixOS/nixpkgs
+1 -1
nixos/doc/manual/configuration/config-syntax.xml
···
when managing complex systems. The syntax and semantics of the Nix language
are fully described in the
<link
-
xlink:href="http://nixos.org/nix/manual/#chap-writing-nix-expressions">Nix
manual</link>, but here we give a short overview of the most important
constructs useful in NixOS configuration files.
</para>
···
when managing complex systems. The syntax and semantics of the Nix language
are fully described in the
<link
+
xlink:href="https://nixos.org/nix/manual/#chap-writing-nix-expressions">Nix
manual</link>, but here we give a short overview of the most important
constructs useful in NixOS configuration files.
</para>
+1 -1
nixos/doc/manual/configuration/summary.xml
···
expression language. It’s not complete. In particular, there are many other
built-in functions. See the
<link
-
xlink:href="http://nixos.org/nix/manual/#chap-writing-nix-expressions">Nix
manual</link> for the rest.
</para>
···
expression language. It’s not complete. In particular, there are many other
built-in functions. See the
<link
+
xlink:href="https://nixos.org/nix/manual/#chap-writing-nix-expressions">Nix
manual</link> for the rest.
</para>
+1 -1
nixos/doc/manual/development/releases.xml
···
<listitem>
<para>
<link xlink:href="https://github.com/NixOS/nixos-org-configurations/pull/18">
-
Make sure a channel is created at http://nixos.org/channels/. </link>
</para>
</listitem>
<listitem>
···
<listitem>
<para>
<link xlink:href="https://github.com/NixOS/nixos-org-configurations/pull/18">
+
Make sure a channel is created at https://nixos.org/channels/. </link>
</para>
</listitem>
<listitem>
+1 -1
nixos/doc/manual/development/replace-modules.xml
···
imports =
[ # Use postgresql service from nixos-unstable channel.
-
# sudo nix-channel --add http://nixos.org/channels/nixos-unstable nixos-unstable
&lt;nixos-unstable/nixos/modules/services/databases/postgresql.nix&gt;
];
···
imports =
[ # Use postgresql service from nixos-unstable channel.
+
# sudo nix-channel --add https://nixos.org/channels/nixos-unstable nixos-unstable
&lt;nixos-unstable/nixos/modules/services/databases/postgresql.nix&gt;
];
+2 -2
nixos/doc/manual/installation/obtaining.xml
···
<para>
NixOS ISO images can be downloaded from the
<link
-
xlink:href="http://nixos.org/nixos/download.html">NixOS download
page</link>. There are a number of installation options. If you happen to
have an optical drive and a spare CD, burning the image to CD and booting
from that is probably the easiest option. Most people will need to prepare a
···
<para>
Using virtual appliances in Open Virtualization Format (OVF) that can be
imported into VirtualBox. These are available from the
-
<link xlink:href="http://nixos.org/nixos/download.html">NixOS download
page</link>.
</para>
</listitem>
···
<para>
NixOS ISO images can be downloaded from the
<link
+
xlink:href="https://nixos.org/nixos/download.html">NixOS download
page</link>. There are a number of installation options. If you happen to
have an optical drive and a spare CD, burning the image to CD and booting
from that is probably the easiest option. Most people will need to prepare a
···
<para>
Using virtual appliances in Open Virtualization Format (OVF) that can be
imported into VirtualBox. These are available from the
+
<link xlink:href="https://nixos.org/nixos/download.html">NixOS download
page</link>.
</para>
</listitem>
+1 -1
nixos/doc/manual/release-notes/rl-1404.xml
···
<para>
Nix has been updated to 1.7
(<link
-
xlink:href="http://nixos.org/nix/manual/#ssec-relnotes-1.7">details</link>).
</para>
</listitem>
<listitem>
···
<para>
Nix has been updated to 1.7
(<link
+
xlink:href="https://nixos.org/nix/manual/#ssec-relnotes-1.7">details</link>).
</para>
</listitem>
<listitem>
+2 -2
nixos/doc/manual/release-notes/rl-1509.xml
···
in excess of 8,000 Haskell packages. Detailed instructions on how to use
that infrastructure can be found in the
<link
-
xlink:href="http://nixos.org/nixpkgs/manual/#users-guide-to-the-haskell-infrastructure">User's
Guide to the Haskell Infrastructure</link>. Users migrating from an earlier
release may find helpful information below, in the list of
backwards-incompatible changes. Furthermore, we distribute 51(!) additional
···
the compiler now is the <literal>haskellPackages.ghcWithPackages</literal>
function. The
<link
-
xlink:href="http://nixos.org/nixpkgs/manual/#users-guide-to-the-haskell-infrastructure">User's
Guide to the Haskell Infrastructure</link> provides more information about
this subject.
</para>
···
in excess of 8,000 Haskell packages. Detailed instructions on how to use
that infrastructure can be found in the
<link
+
xlink:href="https://nixos.org/nixpkgs/manual/#users-guide-to-the-haskell-infrastructure">User's
Guide to the Haskell Infrastructure</link>. Users migrating from an earlier
release may find helpful information below, in the list of
backwards-incompatible changes. Furthermore, we distribute 51(!) additional
···
the compiler now is the <literal>haskellPackages.ghcWithPackages</literal>
function. The
<link
+
xlink:href="https://nixos.org/nixpkgs/manual/#users-guide-to-the-haskell-infrastructure">User's
Guide to the Haskell Infrastructure</link> provides more information about
this subject.
</para>
+1 -1
nixos/doc/manual/release-notes/rl-1603.xml
···
xlink:href="https://reproducible-builds.org/specs/source-date-epoch/">SOURCE_DATE_EPOCH</envar>
to a deterministic value, and Nix has
<link
-
xlink:href="http://nixos.org/nix/manual/#ssec-relnotes-1.11">gained
an option</link> to repeat a build a number of times to test determinism.
An ongoing project, the goal of exact reproducibility is to allow binaries
to be verified independently (e.g., a user might only trust binaries that
···
xlink:href="https://reproducible-builds.org/specs/source-date-epoch/">SOURCE_DATE_EPOCH</envar>
to a deterministic value, and Nix has
<link
+
xlink:href="https://nixos.org/nix/manual/#ssec-relnotes-1.11">gained
an option</link> to repeat a build a number of times to test determinism.
An ongoing project, the goal of exact reproducibility is to allow binaries
to be verified independently (e.g., a user might only trust binaries that
+1 -1
nixos/modules/programs/venus.nix
···
};
link = mkOption {
-
default = "http://planet.nixos.org";
type = types.str;
description = ''
Link to the main page.
···
};
link = mkOption {
+
default = "https://planet.nixos.org";
type = types.str;
description = ''
Link to the main page.
+1 -1
nixos/modules/services/editors/emacs.xml
···
If you are not on NixOS or want to install this particular Emacs only for
yourself, you can do so by adding it to your
<filename>~/.config/nixpkgs/config.nix</filename> (see
-
<link xlink:href="http://nixos.org/nixpkgs/manual/#sec-modify-via-packageOverrides">Nixpkgs
manual</link>):
<example xml:id="module-services-emacs-config-nix">
<title>Custom Emacs in <filename>~/.config/nixpkgs/config.nix</filename></title>
···
If you are not on NixOS or want to install this particular Emacs only for
yourself, you can do so by adding it to your
<filename>~/.config/nixpkgs/config.nix</filename> (see
+
<link xlink:href="https://nixos.org/nixpkgs/manual/#sec-modify-via-packageOverrides">Nixpkgs
manual</link>):
<example xml:id="module-services-emacs-config-nix">
<title>Custom Emacs in <filename>~/.config/nixpkgs/config.nix</filename></title>
+1 -1
nixos/modules/services/misc/nix-daemon.nix
···
trustedBinaryCaches = mkOption {
type = types.listOf types.str;
default = [ ];
-
example = [ "http://hydra.nixos.org/" ];
description = ''
List of binary cache URLs that non-root users can use (in
addition to those specified using
···
trustedBinaryCaches = mkOption {
type = types.listOf types.str;
default = [ ];
+
example = [ "https://hydra.nixos.org/" ];
description = ''
List of binary cache URLs that non-root users can use (in
addition to those specified using
+1 -1
nixos/tests/chromium.nix
···
</head>
<body onload="javascript:document.title='startup done'">
<img src="file://${pkgs.fetchurl {
-
url = "http://nixos.org/logo/nixos-hex.svg";
sha256 = "07ymq6nw8kc22m7kzxjxldhiq8gzmc7f45kq2bvhbdm0w5s112s4";
}}" />
</body>
···
</head>
<body onload="javascript:document.title='startup done'">
<img src="file://${pkgs.fetchurl {
+
url = "https://nixos.org/logo/nixos-hex.svg";
sha256 = "07ymq6nw8kc22m7kzxjxldhiq8gzmc7f45kq2bvhbdm0w5s112s4";
}}" />
</body>
+1 -1
nixos/tests/ec2.nix
···
inherit image;
sshPublicKey = snakeOilPublicKey;
-
# ### http://nixos.org/channels/nixos-unstable nixos
userData = ''
{ pkgs, ... }:
···
inherit image;
sshPublicKey = snakeOilPublicKey;
+
# ### https://nixos.org/channels/nixos-unstable nixos
userData = ''
{ pkgs, ... }:
+1 -1
nixos/tests/udisks2.nix
···
let
stick = pkgs.fetchurl {
-
url = "http://nixos.org/~eelco/nix/udisks-test.img.xz";
sha256 = "0was1xgjkjad91nipzclaz5biv3m4b2nk029ga6nk7iklwi19l8b";
};
···
let
stick = pkgs.fetchurl {
+
url = "https://nixos.org/~eelco/nix/udisks-test.img.xz";
sha256 = "0was1xgjkjad91nipzclaz5biv3m4b2nk029ga6nk7iklwi19l8b";
};
+1 -1
pkgs/applications/networking/cluster/chronos/default.nix
···
description = "Fault tolerant job scheduler for Mesos which handles dependencies and ISO8601 based schedules";
maintainers = with maintainers; [ offline ];
platforms = platforms.unix;
-
broken = true; # doesn't build http://hydra.nixos.org/build/25768319
};
}
···
description = "Fault tolerant job scheduler for Mesos which handles dependencies and ISO8601 based schedules";
maintainers = with maintainers; [ offline ];
platforms = platforms.unix;
+
broken = true; # doesn't build https://hydra.nixos.org/build/25768319
};
}
+1 -1
pkgs/applications/networking/instant-messengers/vacuum/default.nix
···
];
# hack: needed to fix build issues in
-
# http://hydra.nixos.org/build/38322959/nixlog/1
# should be an upstream issue but it's easy to fix
NIX_LDFLAGS = "-lz";
···
];
# hack: needed to fix build issues in
+
# https://hydra.nixos.org/build/38322959/nixlog/1
# should be an upstream issue but it's easy to fix
NIX_LDFLAGS = "-lz";
+1 -1
pkgs/build-support/fetchurl/default.nix
···
, # Shell code to build a netrc file for BASIC auth
netrcPhase ? null
-
, # Impure env vars (http://nixos.org/nix/manual/#sec-advanced-attributes)
# needed for netrcPhase
netrcImpureEnvVars ? []
···
, # Shell code to build a netrc file for BASIC auth
netrcPhase ? null
+
, # Impure env vars (https://nixos.org/nix/manual/#sec-advanced-attributes)
# needed for netrcPhase
netrcImpureEnvVars ? []
+1 -1
pkgs/development/haskell-modules/configuration-common.nix
···
static-resources = dontCheck super.static-resources;
strive = dontCheck super.strive; # fails its own hlint test with tons of warnings
svndump = dontCheck super.svndump;
-
tar = dontCheck super.tar; #http://hydra.nixos.org/build/25088435/nixlog/2 (fails only on 32-bit)
th-printf = dontCheck super.th-printf;
thumbnail-plus = dontCheck super.thumbnail-plus;
tickle = dontCheck super.tickle;
···
static-resources = dontCheck super.static-resources;
strive = dontCheck super.strive; # fails its own hlint test with tons of warnings
svndump = dontCheck super.svndump;
+
tar = dontCheck super.tar; #https://hydra.nixos.org/build/25088435/nixlog/2 (fails only on 32-bit)
th-printf = dontCheck super.th-printf;
thumbnail-plus = dontCheck super.thumbnail-plus;
tickle = dontCheck super.tickle;
+1 -1
pkgs/development/interpreters/picoc/default.nix
···
enableParallelBuilding = true;
# Tests are currently broken on i686 see
-
# http://hydra.nixos.org/build/24003763/nixlog/1
doCheck = if stdenv.isi686 then false else true;
checkTarget = "test";
···
enableParallelBuilding = true;
# Tests are currently broken on i686 see
+
# https://hydra.nixos.org/build/24003763/nixlog/1
doCheck = if stdenv.isi686 then false else true;
checkTarget = "test";
+1 -1
pkgs/development/libraries/check/default.nix
···
sha256 = "02zkfiyklckmivrfvdsrlzvzphkdsgjrz3igncw05dv5pshhq3xx";
};
-
# Test can randomly fail: http://hydra.nixos.org/build/7243912
doCheck = false;
buildInputs = stdenv.lib.optional stdenv.isDarwin CoreServices;
···
sha256 = "02zkfiyklckmivrfvdsrlzvzphkdsgjrz3igncw05dv5pshhq3xx";
};
+
# Test can randomly fail: https://hydra.nixos.org/build/7243912
doCheck = false;
buildInputs = stdenv.lib.optional stdenv.isDarwin CoreServices;
+1 -1
pkgs/development/libraries/gmp/5.1.x.nix
···
(stdenv.lib.enableFeature cxx "cxx")
# Build a "fat binary", with routines for several sub-architectures
# (x86), except on Solaris where some tests crash with "Memory fault".
-
# See <http://hydra.nixos.org/build/2760931>, for instance.
#
# no darwin because gmp uses ASM that clang doesn't like
(stdenv.lib.enableFeature (!stdenv.isSunOS && stdenv.hostPlatform.isx86) "fat")
···
(stdenv.lib.enableFeature cxx "cxx")
# Build a "fat binary", with routines for several sub-architectures
# (x86), except on Solaris where some tests crash with "Memory fault".
+
# See <https://hydra.nixos.org/build/2760931>, for instance.
#
# no darwin because gmp uses ASM that clang doesn't like
(stdenv.lib.enableFeature (!stdenv.isSunOS && stdenv.hostPlatform.isx86) "fat")
+1 -1
pkgs/development/libraries/gmp/6.x.nix
···
(stdenv.lib.enableFeature cxx "cxx")
# Build a "fat binary", with routines for several sub-architectures
# (x86), except on Solaris where some tests crash with "Memory fault".
-
# See <http://hydra.nixos.org/build/2760931>, for instance.
#
# no darwin because gmp uses ASM that clang doesn't like
(stdenv.lib.enableFeature (!stdenv.isSunOS && stdenv.hostPlatform.isx86) "fat")
···
(stdenv.lib.enableFeature cxx "cxx")
# Build a "fat binary", with routines for several sub-architectures
# (x86), except on Solaris where some tests crash with "Memory fault".
+
# See <https://hydra.nixos.org/build/2760931>, for instance.
#
# no darwin because gmp uses ASM that clang doesn't like
(stdenv.lib.enableFeature (!stdenv.isSunOS && stdenv.hostPlatform.isx86) "fat")
+1 -1
pkgs/development/libraries/gnutls-kdh/generic.nix
···
assert guileBindings -> guile != null;
let
# XXX: Gnulib's `test-select' fails on FreeBSD:
-
# http://hydra.nixos.org/build/2962084/nixlog/1/raw .
doCheck = !stdenv.isFreeBSD && !stdenv.isDarwin && lib.versionAtLeast version "3.4";
in
stdenv.mkDerivation {
···
assert guileBindings -> guile != null;
let
# XXX: Gnulib's `test-select' fails on FreeBSD:
+
# https://hydra.nixos.org/build/2962084/nixlog/1/raw .
doCheck = !stdenv.isFreeBSD && !stdenv.isDarwin && lib.versionAtLeast version "3.4";
in
stdenv.mkDerivation {
+1 -1
pkgs/development/libraries/gnutls/default.nix
···
version = "3.6.13";
# XXX: Gnulib's `test-select' fails on FreeBSD:
-
# http://hydra.nixos.org/build/2962084/nixlog/1/raw .
doCheck = !stdenv.isFreeBSD && !stdenv.isDarwin && lib.versionAtLeast version "3.4"
&& stdenv.buildPlatform == stdenv.hostPlatform;
···
version = "3.6.13";
# XXX: Gnulib's `test-select' fails on FreeBSD:
+
# https://hydra.nixos.org/build/2962084/nixlog/1/raw .
doCheck = !stdenv.isFreeBSD && !stdenv.isDarwin && lib.versionAtLeast version "3.4"
&& stdenv.buildPlatform == stdenv.hostPlatform;
+1 -1
pkgs/development/libraries/libgpg-error/default.nix
···
# For some reason, /bin/sh on OpenIndiana leads to this at the end of the
# `config.status' run:
# ./config.status[1401]: shift: (null): bad number
-
# (See <http://hydra.nixos.org/build/2931046/nixlog/1/raw>.)
# Thus, re-run it with Bash.
"${stdenv.shell} config.status";
···
# For some reason, /bin/sh on OpenIndiana leads to this at the end of the
# `config.status' run:
# ./config.status[1401]: shift: (null): bad number
+
# (See <https://hydra.nixos.org/build/2931046/nixlog/1/raw>.)
# Thus, re-run it with Bash.
"${stdenv.shell} config.status";
+1 -1
pkgs/development/python-modules/eggdeps/default.nix
···
propagatedBuildInputs = [ zope_interface zope_testing ];
-
# tests fail, see http://hydra.nixos.org/build/4316603/log/raw
doCheck = false;
meta = with stdenv.lib; {
···
propagatedBuildInputs = [ zope_interface zope_testing ];
+
# tests fail, see https://hydra.nixos.org/build/4316603/log/raw
doCheck = false;
meta = with stdenv.lib; {
+1 -1
pkgs/development/python-modules/pyopenssl/default.nix
···
})
];
-
# Seems to fail unpredictably on Darwin. See http://hydra.nixos.org/build/49877419/nixlog/1
# for one example, but I've also seen ContextTests.test_set_verify_callback_exception fail.
doCheck = !stdenv.isDarwin;
···
})
];
+
# Seems to fail unpredictably on Darwin. See https://hydra.nixos.org/build/49877419/nixlog/1
# for one example, but I've also seen ContextTests.test_set_verify_callback_exception fail.
doCheck = !stdenv.isDarwin;
+1 -1
pkgs/games/dwarf-fortress/df_permission
···
On Fri, Oct 29, 2010 at 6:56 AM, <roconnor@theorem.ca> wrote:
> I'd like to distribute a *slightly* modified version of Dwarf Fortress which
> is needed to run it under the NixOS distribution of Linux (see
-
> <http://nixos.org/>
>
> Modification: The interpreter location /lib/ld-linux.so.2 in
> lib/Dwarf_Fortress is replaced with the location of ld-linux.so.2 under the
···
On Fri, Oct 29, 2010 at 6:56 AM, <roconnor@theorem.ca> wrote:
> I'd like to distribute a *slightly* modified version of Dwarf Fortress which
> is needed to run it under the NixOS distribution of Linux (see
+
> <https://nixos.org/>
>
> Modification: The interpreter location /lib/ld-linux.so.2 in
> lib/Dwarf_Fortress is replaced with the location of ld-linux.so.2 under the
+1 -1
pkgs/tools/package-management/nix/default.nix
···
nixStable = callPackage common (rec {
name = "nix-2.3.4";
src = fetchurl {
-
url = "http://nixos.org/releases/nix/${name}/${name}.tar.xz";
sha256 = "1c626a0de0acc69830b1891ec4d3c96aabe673b2a9fd04cef84f2304d05ad00d";
};
···
nixStable = callPackage common (rec {
name = "nix-2.3.4";
src = fetchurl {
+
url = "https://nixos.org/releases/nix/${name}/${name}.tar.xz";
sha256 = "1c626a0de0acc69830b1891ec4d3c96aabe673b2a9fd04cef84f2304d05ad00d";
};
+1 -1
pkgs/tools/package-management/nixops/nixops-v1_6_1.nix
···
callPackage ./generic.nix (rec {
version = "1.6.1";
src = fetchurl {
-
url = "http://nixos.org/releases/nixops/nixops-${version}/nixops-${version}.tar.bz2";
sha256 = "0lfx5fhyg3z6725ydsk0ibg5qqzp5s0x9nbdww02k8s307axiah3";
};
nixopsAzurePackages = with python2Packages; [
···
callPackage ./generic.nix (rec {
version = "1.6.1";
src = fetchurl {
+
url = "https://nixos.org/releases/nixops/nixops-${version}/nixops-${version}.tar.bz2";
sha256 = "0lfx5fhyg3z6725ydsk0ibg5qqzp5s0x9nbdww02k8s307axiah3";
};
nixopsAzurePackages = with python2Packages; [
+1 -1
pkgs/tools/typesetting/tex/texlive/default.nix
···
/* TeX Live user docs
- source: ../../../../../doc/languages-frameworks/texlive.xml
-
- current html: http://nixos.org/nixpkgs/manual/#sec-language-texlive
*/
{ stdenv, lib, fetchurl, runCommand, writeText, buildEnv
, callPackage, ghostscriptX, harfbuzz, poppler_min
···
/* TeX Live user docs
- source: ../../../../../doc/languages-frameworks/texlive.xml
+
- current html: https://nixos.org/nixpkgs/manual/#sec-language-texlive
*/
{ stdenv, lib, fetchurl, runCommand, writeText, buildEnv
, callPackage, ghostscriptX, harfbuzz, poppler_min
+1 -1
pkgs/top-level/all-packages.nix
···
texFunctions = callPackage ../tools/typesetting/tex/nix pkgs;
-
# TeX Live; see http://nixos.org/nixpkgs/manual/#sec-language-texlive
texlive = recurseIntoAttrs
(callPackage ../tools/typesetting/tex/texlive { });
···
texFunctions = callPackage ../tools/typesetting/tex/nix pkgs;
+
# TeX Live; see https://nixos.org/nixpkgs/manual/#sec-language-texlive
texlive = recurseIntoAttrs
(callPackage ../tools/typesetting/tex/texlive { });