2015-01-01 14:34:56 +01:00
|
|
|
{stdenv, git, cacert}: let
|
|
|
|
urlToName = url: rev: let
|
2015-01-13 19:43:08 +01:00
|
|
|
base = baseNameOf (stdenv.lib.removeSuffix "/" url);
|
2015-01-01 14:34:56 +01:00
|
|
|
|
2015-01-13 19:43:08 +01:00
|
|
|
matched = builtins.match "(.*).git" base;
|
2015-01-01 14:34:56 +01:00
|
|
|
|
|
|
|
short = builtins.substring 0 7 rev;
|
|
|
|
|
|
|
|
appendShort = if (builtins.match "[a-f0-9]*" rev) != null
|
|
|
|
then "-${short}"
|
|
|
|
else "";
|
|
|
|
in "${if matched == null then base else builtins.head matched}${appendShort}";
|
2015-01-13 19:43:08 +01:00
|
|
|
in
|
2015-03-10 12:40:19 +01:00
|
|
|
{ url, rev ? "HEAD", md5 ? "", sha256 ? "", leaveDotGit ? deepClone
|
|
|
|
, fetchSubmodules ? true, deepClone ? false
|
2015-04-20 14:25:14 +02:00
|
|
|
, branchName ? null
|
2015-01-01 14:34:56 +01:00
|
|
|
, name ? urlToName url rev
|
2014-09-03 19:48:15 +02:00
|
|
|
}:
|
2009-06-24 14:48:01 +02:00
|
|
|
|
2009-11-08 04:02:10 +01:00
|
|
|
/* NOTE:
|
|
|
|
fetchgit has one problem: git fetch only works for refs.
|
|
|
|
This is because fetching arbitrary (maybe dangling) commits may be a security risk
|
|
|
|
and checking whether a commit belongs to a ref is expensive. This may
|
|
|
|
change in the future when some caching is added to git (?)
|
|
|
|
Usually refs are either tags (refs/tags/*) or branches (refs/heads/*)
|
|
|
|
Cloning branches will make the hash check fail when there is an update.
|
|
|
|
But not all patches we want can be accessed by tags.
|
|
|
|
|
|
|
|
The workaround is getting the last n commits so that it's likly that they
|
|
|
|
still contain the hash we want.
|
|
|
|
|
|
|
|
for now : increase depth iteratively (TODO)
|
|
|
|
|
|
|
|
real fix: ask git folks to add a
|
|
|
|
git fetch $HASH contained in $BRANCH
|
|
|
|
facility because checking that $HASH is contained in $BRANCH is less
|
|
|
|
expensive than fetching --depth $N.
|
|
|
|
Even if git folks implemented this feature soon it may take years until
|
|
|
|
server admins start using the new version?
|
|
|
|
*/
|
|
|
|
|
2014-02-18 19:11:57 +01:00
|
|
|
assert md5 != "" || sha256 != "";
|
2015-03-10 12:40:19 +01:00
|
|
|
assert deepClone -> leaveDotGit;
|
2014-02-18 19:11:57 +01:00
|
|
|
|
2009-06-24 14:48:01 +02:00
|
|
|
stdenv.mkDerivation {
|
2014-09-03 19:48:15 +02:00
|
|
|
inherit name;
|
2009-06-24 14:48:01 +02:00
|
|
|
builder = ./builder.sh;
|
2015-12-06 15:04:14 +01:00
|
|
|
fetcher = "${./nix-prefetch-git}"; # This must be a string to ensure it's called with bash.
|
2009-06-24 14:48:01 +02:00
|
|
|
buildInputs = [git];
|
|
|
|
|
|
|
|
outputHashAlgo = if sha256 == "" then "md5" else "sha256";
|
|
|
|
outputHashMode = "recursive";
|
|
|
|
outputHash = if sha256 == "" then md5 else sha256;
|
|
|
|
|
2015-04-20 14:25:14 +02:00
|
|
|
inherit url rev leaveDotGit fetchSubmodules deepClone branchName;
|
2009-06-24 14:48:01 +02:00
|
|
|
|
2015-06-05 22:00:52 +02:00
|
|
|
GIT_SSL_CAINFO = "${cacert}/etc/ssl/certs/ca-bundle.crt";
|
2011-08-28 18:03:14 +02:00
|
|
|
|
2009-06-24 14:48:01 +02:00
|
|
|
impureEnvVars = [
|
|
|
|
# We borrow these environment variables from the caller to allow
|
|
|
|
# easy proxy configuration. This is impure, but a fixed-output
|
|
|
|
# derivation like fetchurl is allowed to do so since its result is
|
|
|
|
# by definition pure.
|
2016-01-20 02:17:29 +01:00
|
|
|
"http_proxy" "https_proxy" "ftp_proxy" "all_proxy" "no_proxy" "GIT_PROXY_COMMAND" "SOCKS_SERVER"
|
2009-06-24 14:48:01 +02:00
|
|
|
];
|
2014-02-10 21:03:17 +01:00
|
|
|
|
|
|
|
preferLocalBuild = true;
|
2009-06-24 14:48:01 +02:00
|
|
|
}
|