-
-
Notifications
You must be signed in to change notification settings - Fork 14.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
nc4nix: 0-unstable-2024-03-01 -> 0-unstable-2024-05-24; nextcloudPackages: update #326442
Conversation
Updates mainly to include a commit that generates SRI hashes instead of sha256 hashes for extensions.
Result of 1 package built:
|
This is great, thank you :) |
Quite the opposite. It causes everything to fail to build. How was this not even tested?? |
Testing does not help for FODs when the thing with the specified hash (in this case, the zip file fetched by upstream nc4nix) is already in the store. |
But it's not. The hashes aren't the same. |
Upstream nc4nix uses |
That doesn't excuse @onny merging this without testing. |
I pushed an updated one that mimics fetchzip, please go to that. I apologize for not testing this more thoroughly, but what's done is done. |
Updates nc2nix to include a commit that generates SRI hashes instead of sha256 hashes for extensions.
Also updates the nextcloud2{8,9}Packages package sets, in order to have those new hashes. This causes no rebuilds of the derivations besides those that are updated.
Note that out-of-tree usages of
fetchNextcloudApp
will not throw an error withsha256
, but this is one step towards being able to do that(per #325892)Description of changes
Things done
nix.conf
? (See Nix manual)sandbox = relaxed
sandbox = true
nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD"
. Note: all changes have to be committed, also see nixpkgs-review usage./result/bin/
)Add a 👍 reaction to pull requests you find important.