This commit changes callHackage to use a deterministic version of the Hackage
checkout from https://github.com/commercialhaskell/all-cabal-hashes by default.
This means that packages uploaded to Hackage after today will be available to
callHackage only after "pkgs/data/misc/hackage/default.nix" has been updated.
People who want the previous behavior where we always had the latest version of
Hackage available -- at the cost of frequent downloads from Github --, can add
the following override to their "~/.nixpkgs/config.nix" file:
{
packageOverrides = super: {
all-cabal-hashes = builtins.fetchTarball "https://github.com/commercialhaskell/all-cabal-hashes/archive/hackage.tar.gz";
};
}
In the `meta`data for the `google-fonts` package --
- the `homepage` field was set to the URL
<https://www.google.com/fontsl>, which would appear to be a
misspelt version of <https://www.google.com/fonts>, which now
redirects to <https://fonts.google.com>.
- the `description` field referred to Google Fonts as "Google Font".
This patch corrects these errors, and updates the `homepage` URL.
The raleway fonts need to be copied from their /share folder to be
included properly.
They are also `.otf`-fonts, so they should live in `opentype` folders.
`stripHash` documentation states that it prints out the stripped name to
the stdout, but the function stored the value in `strippedName`
instead.
Basically all usages did something like
`$(stripHash $foo | echo $strippedName)` which is just braindamaged.
Fixed the implementation and all invocations.
Add versioning using the date of revision on the git repository. Also
update to the latest revision, which includes a dark version of the icon
theme.
The cmake scripts install the icons at subdirectories 'maia' and
'maia-dark'. Also use these names. The difference is in the
capitalization of the names.
Previously, the list of CA certificates was generated with a perl script
which is included in curl. As this script is not very flexible, this commit
refactors the expression to use the python script that Debian uses to
generate their CA certificates from Mozilla's trust store in NSS.
Additionally, an option was added to the cacerts derivation and the
`security.pki` module to blacklist specific CAs.