2020-12-16 18:36:46 +01:00
# Fetchers {#chap-pkgs-fetchers}
2022-08-02 18:50:05 +02:00
Building software with Nix often requires downloading source code and other files from the internet.
2023-11-02 18:27:39 +01:00
To this end, Nixpkgs provides *fetchers* : functions to obtain remote sources via various protocols and services.
2020-12-16 18:36:46 +01:00
2023-11-02 18:27:39 +01:00
Nixpkgs fetchers differ from built-in fetchers such as [`builtins.fetchTarball` ](https://nixos.org/manual/nix/stable/language/builtins.html#builtins-fetchTarball ):
- A built-in fetcher will download and cache files at evaluation time and produce a [store path ](https://nixos.org/manual/nix/stable/glossary#gloss-store-path ).
A Nixpkgs fetcher will create a ([fixed-output](https://nixos.org/manual/nix/stable/glossary#gloss-fixed-output-derivation)) [derivation ](https://nixos.org/manual/nix/stable/language/derivations ), and files are downloaded at build time.
- Built-in fetchers will invalidate their cache after [`tarball-ttl` ](https://nixos.org/manual/nix/stable/command-ref/conf-file#conf-tarball-ttl ) expires, and will require network activity to check if the cache entry is up to date.
Nixpkgs fetchers only re-download if the specified hash changes or the store object is not otherwise available.
- Built-in fetchers do not use [substituters ](https://nixos.org/manual/nix/stable/command-ref/conf-file#conf-substituters ).
Derivations produced by Nixpkgs fetchers will use any configured binary cache transparently.
This significantly reduces the time needed to evaluate the entirety of Nixpkgs, and allows [Hydra ](https://nixos.org/hydra ) to retain and re-distribute sources used by Nixpkgs in the [public binary cache ](https://cache.nixos.org ).
For these reasons, built-in fetchers are not allowed in Nixpkgs source code.
The following table shows an overview of the differences:
2021-09-19 19:32:35 +02:00
2023-11-02 18:27:39 +01:00
| Fetchers | Download | Output | Cache | Re-download when |
|-|-|-|-|-|
| `builtins.fetch*` | evaluation time | store path | `/nix/store` , `~/.cache/nix` | `tarball-ttl` expires, cache miss in `~/.cache/nix` , output store object not in local store |
| `pkgs.fetch*` | build time | derivation | `/nix/store` , substituters | output store object not available |
## Caveats {#chap-pkgs-fetchers-caveats}
2022-08-02 18:52:08 +02:00
The fact that the hash belongs to the Nix derivation output and not the file itself can lead to confusion.
For example, consider the following fetcher:
2021-09-19 19:32:35 +02:00
2022-06-22 18:13:16 +02:00
```nix
fetchurl {
url = "http://www.example.org/hello-1.0.tar.gz";
doc: use sri hash syntax
The nixpkgs manual contains references to both sri hash and explicit
sha256 attributes. This is at best confusing to new users. Since the
final destination is exclusive use of sri hashes, see nixos/rfcs#131,
might as well push new users in that direction gently.
Notable exceptions to sri hash support are builtins.fetchTarball,
cataclysm-dda, coq, dockerTools.pullimage, elixir.override, and
fetchCrate. None, other than builtins.fetchTarball, are fundamentally
incompatible, but all currently accept explicit sha256 attributes as
input. Because adding backwards compatibility is out of scope for this
change, they have been left intact, but migration to sri format has been
made for any using old hash formats.
All hashes have been manually tested to be accurate, and updates were
only made for missing upstream artefacts or bugs.
2022-12-03 20:49:00 +01:00
hash = "sha256-lTeyxzJNQeMdu1IVdovNMtgn77jRIhSybLdMbTkf2Ww=";
2024-03-27 19:10:27 +01:00
}
2022-06-22 18:13:16 +02:00
```
A common mistake is to update a fetcher’ s URL, or a version parameter, without updating the hash.
```nix
fetchurl {
url = "http://www.example.org/hello-1.1.tar.gz";
doc: use sri hash syntax
The nixpkgs manual contains references to both sri hash and explicit
sha256 attributes. This is at best confusing to new users. Since the
final destination is exclusive use of sri hashes, see nixos/rfcs#131,
might as well push new users in that direction gently.
Notable exceptions to sri hash support are builtins.fetchTarball,
cataclysm-dda, coq, dockerTools.pullimage, elixir.override, and
fetchCrate. None, other than builtins.fetchTarball, are fundamentally
incompatible, but all currently accept explicit sha256 attributes as
input. Because adding backwards compatibility is out of scope for this
change, they have been left intact, but migration to sri format has been
made for any using old hash formats.
All hashes have been manually tested to be accurate, and updates were
only made for missing upstream artefacts or bugs.
2022-12-03 20:49:00 +01:00
hash = "sha256-lTeyxzJNQeMdu1IVdovNMtgn77jRIhSybLdMbTkf2Ww=";
2024-03-27 19:10:27 +01:00
}
2022-06-22 18:13:16 +02:00
```
2022-08-02 18:51:38 +02:00
**This will reuse the old contents**.
doc: use sri hash syntax
The nixpkgs manual contains references to both sri hash and explicit
sha256 attributes. This is at best confusing to new users. Since the
final destination is exclusive use of sri hashes, see nixos/rfcs#131,
might as well push new users in that direction gently.
Notable exceptions to sri hash support are builtins.fetchTarball,
cataclysm-dda, coq, dockerTools.pullimage, elixir.override, and
fetchCrate. None, other than builtins.fetchTarball, are fundamentally
incompatible, but all currently accept explicit sha256 attributes as
input. Because adding backwards compatibility is out of scope for this
change, they have been left intact, but migration to sri format has been
made for any using old hash formats.
All hashes have been manually tested to be accurate, and updates were
only made for missing upstream artefacts or bugs.
2022-12-03 20:49:00 +01:00
Remember to invalidate the hash argument, in this case by setting the `hash` attribute to an empty string.
2022-06-22 18:13:16 +02:00
```nix
fetchurl {
url = "http://www.example.org/hello-1.1.tar.gz";
doc: use sri hash syntax
The nixpkgs manual contains references to both sri hash and explicit
sha256 attributes. This is at best confusing to new users. Since the
final destination is exclusive use of sri hashes, see nixos/rfcs#131,
might as well push new users in that direction gently.
Notable exceptions to sri hash support are builtins.fetchTarball,
cataclysm-dda, coq, dockerTools.pullimage, elixir.override, and
fetchCrate. None, other than builtins.fetchTarball, are fundamentally
incompatible, but all currently accept explicit sha256 attributes as
input. Because adding backwards compatibility is out of scope for this
change, they have been left intact, but migration to sri format has been
made for any using old hash formats.
All hashes have been manually tested to be accurate, and updates were
only made for missing upstream artefacts or bugs.
2022-12-03 20:49:00 +01:00
hash = "";
2024-03-27 19:10:27 +01:00
}
2022-06-22 18:13:16 +02:00
```
2022-08-02 18:51:09 +02:00
Use the resulting error message to determine the correct hash.
2022-08-02 19:07:36 +02:00
```
error: hash mismatch in fixed-output derivation '/path/to/my.drv':
specified: sha256-AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
doc: use sri hash syntax
The nixpkgs manual contains references to both sri hash and explicit
sha256 attributes. This is at best confusing to new users. Since the
final destination is exclusive use of sri hashes, see nixos/rfcs#131,
might as well push new users in that direction gently.
Notable exceptions to sri hash support are builtins.fetchTarball,
cataclysm-dda, coq, dockerTools.pullimage, elixir.override, and
fetchCrate. None, other than builtins.fetchTarball, are fundamentally
incompatible, but all currently accept explicit sha256 attributes as
input. Because adding backwards compatibility is out of scope for this
change, they have been left intact, but migration to sri format has been
made for any using old hash formats.
All hashes have been manually tested to be accurate, and updates were
only made for missing upstream artefacts or bugs.
2022-12-03 20:49:00 +01:00
got: sha256-lTeyxzJNQeMdu1IVdovNMtgn77jRIhSybLdMbTkf2Ww=
2022-08-02 19:07:36 +02:00
```
2022-06-22 18:13:16 +02:00
2022-08-02 18:50:22 +02:00
A similar problem arises while testing changes to a fetcher's implementation. If the output of the derivation already exists in the Nix store, test failures can go undetected. The [`invalidateFetcherByDrvHash` ](#tester-invalidateFetcherByDrvHash ) function helps prevent reusing cached derivations.
2021-09-19 19:32:35 +02:00
## `fetchurl` and `fetchzip` {#fetchurl}
doc: use sri hash syntax
The nixpkgs manual contains references to both sri hash and explicit
sha256 attributes. This is at best confusing to new users. Since the
final destination is exclusive use of sri hashes, see nixos/rfcs#131,
might as well push new users in that direction gently.
Notable exceptions to sri hash support are builtins.fetchTarball,
cataclysm-dda, coq, dockerTools.pullimage, elixir.override, and
fetchCrate. None, other than builtins.fetchTarball, are fundamentally
incompatible, but all currently accept explicit sha256 attributes as
input. Because adding backwards compatibility is out of scope for this
change, they have been left intact, but migration to sri format has been
made for any using old hash formats.
All hashes have been manually tested to be accurate, and updates were
only made for missing upstream artefacts or bugs.
2022-12-03 20:49:00 +01:00
Two basic fetchers are `fetchurl` and `fetchzip` . Both of these have two required arguments, a URL and a hash. The hash is typically `hash` , although many more hash algorithms are supported. Nixpkgs contributors are currently recommended to use `hash` . This hash will be used by Nix to identify your source. A typical usage of `fetchurl` is provided below.
2020-12-16 18:36:46 +01:00
```nix
{ stdenv, fetchurl }:
stdenv.mkDerivation {
name = "hello";
src = fetchurl {
url = "http://www.example.org/hello.tar.gz";
doc: use sri hash syntax
The nixpkgs manual contains references to both sri hash and explicit
sha256 attributes. This is at best confusing to new users. Since the
final destination is exclusive use of sri hashes, see nixos/rfcs#131,
might as well push new users in that direction gently.
Notable exceptions to sri hash support are builtins.fetchTarball,
cataclysm-dda, coq, dockerTools.pullimage, elixir.override, and
fetchCrate. None, other than builtins.fetchTarball, are fundamentally
incompatible, but all currently accept explicit sha256 attributes as
input. Because adding backwards compatibility is out of scope for this
change, they have been left intact, but migration to sri format has been
made for any using old hash formats.
All hashes have been manually tested to be accurate, and updates were
only made for missing upstream artefacts or bugs.
2022-12-03 20:49:00 +01:00
hash = "sha256-BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB=";
2020-12-16 18:36:46 +01:00
};
}
```
2022-03-10 20:43:29 +01:00
The main difference between `fetchurl` and `fetchzip` is in how they store the contents. `fetchurl` will store the unaltered contents of the URL within the Nix store. `fetchzip` on the other hand, will decompress the archive for you, making files and directories directly accessible in the future. `fetchzip` can only be used with archives. Despite the name, `fetchzip` is not limited to .zip files and can also be used with any tarball.
2020-12-16 18:36:46 +01:00
2024-02-22 16:10:21 +01:00
Additional parameters to `fetchurl` :
- `downloadToTemp` : Defaults to `false` . If `true` , saves the source to `$downloadedFile` , to be used in conjunction with `postFetch`
- `postFetch` : Shell code executed after the file has been fetched successfully. Use it for postprocessing, to check or transform the file.
2022-06-03 11:17:25 +02:00
## `fetchpatch` {#fetchpatch}
2022-03-10 20:43:29 +01:00
`fetchpatch` works very similarly to `fetchurl` with the same arguments expected. It expects patch files as a source and performs normalization on them before computing the checksum. For example, it will remove comments or other unstable parts that are sometimes added by version control systems and can change over time.
2020-12-16 18:36:46 +01:00
2022-06-03 11:17:25 +02:00
- `relative` : Similar to using `git-diff` 's `--relative` flag, only keep changes inside the specified directory, making paths relative to it.
- `stripLen` : Remove the first `stripLen` components of pathnames in the patch.
2022-11-15 13:33:25 +01:00
- `decode` : Pipe the downloaded data through this command before processing it as a patch.
2022-06-03 11:17:25 +02:00
- `extraPrefix` : Prefix pathnames by this string.
- `excludes` : Exclude files matching these patterns (applies after the above arguments).
- `includes` : Include only files matching these patterns (applies after the above arguments).
- `revert` : Revert the patch.
doc: use sri hash syntax
The nixpkgs manual contains references to both sri hash and explicit
sha256 attributes. This is at best confusing to new users. Since the
final destination is exclusive use of sri hashes, see nixos/rfcs#131,
might as well push new users in that direction gently.
Notable exceptions to sri hash support are builtins.fetchTarball,
cataclysm-dda, coq, dockerTools.pullimage, elixir.override, and
fetchCrate. None, other than builtins.fetchTarball, are fundamentally
incompatible, but all currently accept explicit sha256 attributes as
input. Because adding backwards compatibility is out of scope for this
change, they have been left intact, but migration to sri format has been
made for any using old hash formats.
All hashes have been manually tested to be accurate, and updates were
only made for missing upstream artefacts or bugs.
2022-12-03 20:49:00 +01:00
Note that because the checksum is computed after applying these effects, using or modifying these arguments will have no effect unless the `hash` argument is changed as well.
2022-06-03 11:17:25 +02:00
2021-09-19 19:32:35 +02:00
Most other fetchers return a directory rather than a single file.
2020-12-16 18:36:46 +01:00
2023-08-30 00:01:30 +02:00
## `fetchDebianPatch` {#fetchdebianpatch}
A wrapper around `fetchpatch` , which takes:
2023-09-06 19:47:59 +02:00
- `patch` and `hash` : the patch's filename,
2023-08-30 00:01:30 +02:00
and its hash after normalization by `fetchpatch` ;
- `pname` : the Debian source package's name ;
- `version` : the upstream version number ;
- `debianRevision` : the [Debian revision number] if applicable ;
- the `area` of the Debian archive: `main` (default), `contrib` , or `non-free` .
Here is an example of `fetchDebianPatch` in action:
```nix
{ lib
, fetchDebianPatch
, buildPythonPackage
}:
buildPythonPackage rec {
pname = "pysimplesoap";
version = "1.16.2";
2024-03-27 19:39:55 +01:00
src = < ... > ;
2023-08-30 00:01:30 +02:00
patches = [
(fetchDebianPatch {
inherit pname version;
debianRevision = "5";
2023-09-06 19:47:59 +02:00
name = "Add-quotes-to-SOAPAction-header-in-SoapClient.patch";
2023-08-30 00:01:30 +02:00
hash = "sha256-xA8Wnrpr31H8wy3zHSNfezFNjUJt1HbSXn3qUMzeKc0=";
})
];
2024-03-27 19:10:27 +01:00
# ...
2023-08-30 00:01:30 +02:00
}
```
Patches are fetched from `sources.debian.org` , and so must come from a
package version that was uploaded to the Debian archive. Packages may
be removed from there once that specific version isn't in any suite
anymore (stable, testing, unstable, etc.), so maintainers should use
2023-08-30 10:06:10 +02:00
`copy-tarballs.pl` to archive the patch if it needs to be available
longer-term.
2023-08-30 00:01:30 +02:00
[Debian revision number]: https://www.debian.org/doc/debian-policy/ch-controlfields.html#version
2021-06-05 21:22:45 +02:00
## `fetchsvn` {#fetchsvn}
2020-12-16 18:36:46 +01:00
doc: use sri hash syntax
The nixpkgs manual contains references to both sri hash and explicit
sha256 attributes. This is at best confusing to new users. Since the
final destination is exclusive use of sri hashes, see nixos/rfcs#131,
might as well push new users in that direction gently.
Notable exceptions to sri hash support are builtins.fetchTarball,
cataclysm-dda, coq, dockerTools.pullimage, elixir.override, and
fetchCrate. None, other than builtins.fetchTarball, are fundamentally
incompatible, but all currently accept explicit sha256 attributes as
input. Because adding backwards compatibility is out of scope for this
change, they have been left intact, but migration to sri format has been
made for any using old hash formats.
All hashes have been manually tested to be accurate, and updates were
only made for missing upstream artefacts or bugs.
2022-12-03 20:49:00 +01:00
Used with Subversion. Expects `url` to a Subversion directory, `rev` , and `hash` .
2020-12-16 18:36:46 +01:00
2021-06-05 21:22:45 +02:00
## `fetchgit` {#fetchgit}
2020-12-16 18:36:46 +01:00
doc: use sri hash syntax
The nixpkgs manual contains references to both sri hash and explicit
sha256 attributes. This is at best confusing to new users. Since the
final destination is exclusive use of sri hashes, see nixos/rfcs#131,
might as well push new users in that direction gently.
Notable exceptions to sri hash support are builtins.fetchTarball,
cataclysm-dda, coq, dockerTools.pullimage, elixir.override, and
fetchCrate. None, other than builtins.fetchTarball, are fundamentally
incompatible, but all currently accept explicit sha256 attributes as
input. Because adding backwards compatibility is out of scope for this
change, they have been left intact, but migration to sri format has been
made for any using old hash formats.
All hashes have been manually tested to be accurate, and updates were
only made for missing upstream artefacts or bugs.
2022-12-03 20:49:00 +01:00
Used with Git. Expects `url` to a Git repo, `rev` , and `hash` . `rev` in this case can be full the git commit id (SHA1 hash) or a tag name like `refs/tags/v1.0` .
2020-12-16 18:36:46 +01:00
2022-03-10 20:43:29 +01:00
Additionally, the following optional arguments can be given: `fetchSubmodules = true` makes `fetchgit` also fetch the submodules of a repository. If `deepClone` is set to true, the entire repository is cloned as opposing to just creating a shallow clone. `deepClone = true` also implies `leaveDotGit = true` which means that the `.git` directory of the clone won't be removed after checkout.
2020-12-21 14:21:11 +01:00
2022-08-04 21:26:03 +02:00
If only parts of the repository are needed, `sparseCheckout` can be used. This will prevent git from fetching unnecessary blobs from server, see [git sparse-checkout ](https://git-scm.com/docs/git-sparse-checkout ) for more information:
2021-09-08 04:33:50 +02:00
```nix
{ stdenv, fetchgit }:
stdenv.mkDerivation {
name = "hello";
src = fetchgit {
url = "https://...";
2022-11-07 19:42:19 +01:00
sparseCheckout = [
"directory/to/be/included"
"another/directory"
];
doc: use sri hash syntax
The nixpkgs manual contains references to both sri hash and explicit
sha256 attributes. This is at best confusing to new users. Since the
final destination is exclusive use of sri hashes, see nixos/rfcs#131,
might as well push new users in that direction gently.
Notable exceptions to sri hash support are builtins.fetchTarball,
cataclysm-dda, coq, dockerTools.pullimage, elixir.override, and
fetchCrate. None, other than builtins.fetchTarball, are fundamentally
incompatible, but all currently accept explicit sha256 attributes as
input. Because adding backwards compatibility is out of scope for this
change, they have been left intact, but migration to sri format has been
made for any using old hash formats.
All hashes have been manually tested to be accurate, and updates were
only made for missing upstream artefacts or bugs.
2022-12-03 20:49:00 +01:00
hash = "sha256-AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=";
2021-09-08 04:33:50 +02:00
};
}
```
2021-06-05 21:22:45 +02:00
## `fetchfossil` {#fetchfossil}
2020-12-16 18:36:46 +01:00
doc: use sri hash syntax
The nixpkgs manual contains references to both sri hash and explicit
sha256 attributes. This is at best confusing to new users. Since the
final destination is exclusive use of sri hashes, see nixos/rfcs#131,
might as well push new users in that direction gently.
Notable exceptions to sri hash support are builtins.fetchTarball,
cataclysm-dda, coq, dockerTools.pullimage, elixir.override, and
fetchCrate. None, other than builtins.fetchTarball, are fundamentally
incompatible, but all currently accept explicit sha256 attributes as
input. Because adding backwards compatibility is out of scope for this
change, they have been left intact, but migration to sri format has been
made for any using old hash formats.
All hashes have been manually tested to be accurate, and updates were
only made for missing upstream artefacts or bugs.
2022-12-03 20:49:00 +01:00
Used with Fossil. Expects `url` to a Fossil archive, `rev` , and `hash` .
2020-12-16 18:36:46 +01:00
2021-06-05 21:22:45 +02:00
## `fetchcvs` {#fetchcvs}
2020-12-16 18:36:46 +01:00
doc: use sri hash syntax
The nixpkgs manual contains references to both sri hash and explicit
sha256 attributes. This is at best confusing to new users. Since the
final destination is exclusive use of sri hashes, see nixos/rfcs#131,
might as well push new users in that direction gently.
Notable exceptions to sri hash support are builtins.fetchTarball,
cataclysm-dda, coq, dockerTools.pullimage, elixir.override, and
fetchCrate. None, other than builtins.fetchTarball, are fundamentally
incompatible, but all currently accept explicit sha256 attributes as
input. Because adding backwards compatibility is out of scope for this
change, they have been left intact, but migration to sri format has been
made for any using old hash formats.
All hashes have been manually tested to be accurate, and updates were
only made for missing upstream artefacts or bugs.
2022-12-03 20:49:00 +01:00
Used with CVS. Expects `cvsRoot` , `tag` , and `hash` .
2020-12-16 18:36:46 +01:00
2021-06-05 21:22:45 +02:00
## `fetchhg` {#fetchhg}
2020-12-16 18:36:46 +01:00
doc: use sri hash syntax
The nixpkgs manual contains references to both sri hash and explicit
sha256 attributes. This is at best confusing to new users. Since the
final destination is exclusive use of sri hashes, see nixos/rfcs#131,
might as well push new users in that direction gently.
Notable exceptions to sri hash support are builtins.fetchTarball,
cataclysm-dda, coq, dockerTools.pullimage, elixir.override, and
fetchCrate. None, other than builtins.fetchTarball, are fundamentally
incompatible, but all currently accept explicit sha256 attributes as
input. Because adding backwards compatibility is out of scope for this
change, they have been left intact, but migration to sri format has been
made for any using old hash formats.
All hashes have been manually tested to be accurate, and updates were
only made for missing upstream artefacts or bugs.
2022-12-03 20:49:00 +01:00
Used with Mercurial. Expects `url` , `rev` , and `hash` .
2020-12-16 18:36:46 +01:00
A number of fetcher functions wrap part of `fetchurl` and `fetchzip` . They are mainly convenience functions intended for commonly used destinations of source code in Nixpkgs. These wrapper fetchers are listed below.
2022-03-21 17:39:17 +01:00
## `fetchFromGitea` {#fetchfromgitea}
doc: use sri hash syntax
The nixpkgs manual contains references to both sri hash and explicit
sha256 attributes. This is at best confusing to new users. Since the
final destination is exclusive use of sri hashes, see nixos/rfcs#131,
might as well push new users in that direction gently.
Notable exceptions to sri hash support are builtins.fetchTarball,
cataclysm-dda, coq, dockerTools.pullimage, elixir.override, and
fetchCrate. None, other than builtins.fetchTarball, are fundamentally
incompatible, but all currently accept explicit sha256 attributes as
input. Because adding backwards compatibility is out of scope for this
change, they have been left intact, but migration to sri format has been
made for any using old hash formats.
All hashes have been manually tested to be accurate, and updates were
only made for missing upstream artefacts or bugs.
2022-12-03 20:49:00 +01:00
`fetchFromGitea` expects five arguments. `domain` is the gitea server name. `owner` is a string corresponding to the Gitea user or organization that controls this repository. `repo` corresponds to the name of the software repository. These are located at the top of every Gitea HTML page as `owner` /`repo`. `rev` corresponds to the Git commit hash or tag (e.g `v1.0` ) that will be downloaded from Git. Finally, `hash` corresponds to the hash of the extracted directory. Again, other hash algorithms are also available but `hash` is currently preferred.
2022-03-21 17:39:17 +01:00
2021-06-05 21:22:45 +02:00
## `fetchFromGitHub` {#fetchfromgithub}
2020-12-16 18:36:46 +01:00
doc: use sri hash syntax
The nixpkgs manual contains references to both sri hash and explicit
sha256 attributes. This is at best confusing to new users. Since the
final destination is exclusive use of sri hashes, see nixos/rfcs#131,
might as well push new users in that direction gently.
Notable exceptions to sri hash support are builtins.fetchTarball,
cataclysm-dda, coq, dockerTools.pullimage, elixir.override, and
fetchCrate. None, other than builtins.fetchTarball, are fundamentally
incompatible, but all currently accept explicit sha256 attributes as
input. Because adding backwards compatibility is out of scope for this
change, they have been left intact, but migration to sri format has been
made for any using old hash formats.
All hashes have been manually tested to be accurate, and updates were
only made for missing upstream artefacts or bugs.
2022-12-03 20:49:00 +01:00
`fetchFromGitHub` expects four arguments. `owner` is a string corresponding to the GitHub user or organization that controls this repository. `repo` corresponds to the name of the software repository. These are located at the top of every GitHub HTML page as `owner` /`repo`. `rev` corresponds to the Git commit hash or tag (e.g `v1.0` ) that will be downloaded from Git. Finally, `hash` corresponds to the hash of the extracted directory. Again, other hash algorithms are also available, but `hash` is currently preferred.
2020-12-16 18:36:46 +01:00
2023-06-07 10:51:48 +02:00
To use a different GitHub instance, use `githubBase` (defaults to `"github.com"` ).
2020-12-21 14:21:11 +01:00
`fetchFromGitHub` uses `fetchzip` to download the source archive generated by GitHub for the specified revision. If `leaveDotGit` , `deepClone` or `fetchSubmodules` are set to `true` , `fetchFromGitHub` will use `fetchgit` instead. Refer to its section for documentation of these options.
2021-06-05 21:22:45 +02:00
## `fetchFromGitLab` {#fetchfromgitlab}
2020-12-16 18:36:46 +01:00
2023-06-07 10:51:48 +02:00
This is used with GitLab repositories. It behaves similarly to `fetchFromGitHub` , and expects `owner` , `repo` , `rev` , and `hash` .
To use a specific GitLab instance, use `domain` (defaults to `"gitlab.com"` ).
2020-12-16 18:36:46 +01:00
2021-06-05 21:22:45 +02:00
## `fetchFromGitiles` {#fetchfromgitiles}
2020-12-16 18:36:46 +01:00
2022-03-10 20:43:29 +01:00
This is used with Gitiles repositories. The arguments expected are similar to `fetchgit` .
2020-12-16 18:36:46 +01:00
2021-06-05 21:22:45 +02:00
## `fetchFromBitbucket` {#fetchfrombitbucket}
2020-12-16 18:36:46 +01:00
2023-06-07 10:51:48 +02:00
This is used with BitBucket repositories. The arguments expected are very similar to `fetchFromGitHub` above.
2020-12-16 18:36:46 +01:00
2021-06-05 21:22:45 +02:00
## `fetchFromSavannah` {#fetchfromsavannah}
2020-12-16 18:36:46 +01:00
2022-03-10 20:43:29 +01:00
This is used with Savannah repositories. The arguments expected are very similar to `fetchFromGitHub` above.
2020-12-16 18:36:46 +01:00
2021-06-05 21:22:45 +02:00
## `fetchFromRepoOrCz` {#fetchfromrepoorcz}
2020-12-16 18:36:46 +01:00
2022-03-10 20:43:29 +01:00
This is used with repo.or.cz repositories. The arguments expected are very similar to `fetchFromGitHub` above.
2020-10-31 11:28:06 +01:00
2021-06-05 21:22:45 +02:00
## `fetchFromSourcehut` {#fetchfromsourcehut}
2020-10-31 11:28:06 +01:00
2021-12-04 17:01:49 +01:00
This is used with sourcehut repositories. Similar to `fetchFromGitHub` above,
doc: use sri hash syntax
The nixpkgs manual contains references to both sri hash and explicit
sha256 attributes. This is at best confusing to new users. Since the
final destination is exclusive use of sri hashes, see nixos/rfcs#131,
might as well push new users in that direction gently.
Notable exceptions to sri hash support are builtins.fetchTarball,
cataclysm-dda, coq, dockerTools.pullimage, elixir.override, and
fetchCrate. None, other than builtins.fetchTarball, are fundamentally
incompatible, but all currently accept explicit sha256 attributes as
input. Because adding backwards compatibility is out of scope for this
change, they have been left intact, but migration to sri format has been
made for any using old hash formats.
All hashes have been manually tested to be accurate, and updates were
only made for missing upstream artefacts or bugs.
2022-12-03 20:49:00 +01:00
it expects `owner` , `repo` , `rev` and `hash` , but don't forget the tilde (~)
2021-12-04 17:01:49 +01:00
in front of the username! Expected arguments also include `vc` ("git" (default)
or "hg"), `domain` and `fetchSubmodules` .
If `fetchSubmodules` is `true` , `fetchFromSourcehut` uses `fetchgit`
or `fetchhg` with `fetchSubmodules` or `fetchSubrepos` set to `true` ,
2022-03-10 20:43:29 +01:00
respectively. Otherwise, the fetcher uses `fetchzip` .
2023-02-05 15:33:51 +01:00
## `requireFile` {#requirefile}
`requireFile` allows requesting files that cannot be fetched automatically, but whose content is known.
This is a useful last-resort workaround for license restrictions that prohibit redistribution, or for downloads that are only accessible after authenticating interactively in a browser.
If the requested file is present in the Nix store, the resulting derivation will not be built, because its expected output is already available.
Otherwise, the builder will run, but fail with a message explaining to the user how to provide the file. The following code, for example:
2024-03-27 17:33:27 +01:00
```nix
2023-02-05 15:33:51 +01:00
requireFile {
name = "jdk-${version}_linux-x64_bin.tar.gz";
url = "https://www.oracle.com/java/technologies/javase-jdk11-downloads.html";
2023-09-13 15:22:37 +02:00
hash = "sha256-lL00+F7jjT71nlKJ7HRQuUQ7kkxVYlZh//5msD8sjeI=";
2023-02-05 15:33:51 +01:00
}
```
results in this error message:
```
***
Unfortunately, we cannot download file jdk-11.0.10_linux-x64_bin.tar.gz automatically.
Please go to https://www.oracle.com/java/technologies/javase-jdk11-downloads.html to download it yourself, and add it to the Nix store
using either
nix-store --add-fixed sha256 jdk-11.0.10_linux-x64_bin.tar.gz
or
nix-prefetch-url --type sha256 file:///path/to/jdk-11.0.10_linux-x64_bin.tar.gz
***
```
2024-03-11 11:33:14 +01:00
This function should only be used by non-redistributable software with an unfree license that we need to require the user to download manually.
It produces packages that cannot be built automatically.
2023-10-28 00:25:35 +02:00
## `fetchtorrent` {#fetchtorrent}
2023-10-13 11:32:36 +02:00
2023-10-28 00:25:35 +02:00
`fetchtorrent` expects two arguments. `url` which can either be a Magnet URI (Magnet Link) such as `magnet:?xt=urn:btih:dd8255ecdc7ca55fb0bbf81323d87062db1f6d1c` or an HTTP URL pointing to a `.torrent` file. It can also take a `config` argument which will craft a `settings.json` configuration file and give it to `transmission` , the underlying program that is performing the fetch. The available config options for `transmission` can be found [here ](https://github.com/transmission/transmission/blob/main/docs/Editing-Configuration-Files.md#options )
2023-10-13 11:32:36 +02:00
2024-03-27 17:33:27 +01:00
```nix
2023-10-28 00:25:35 +02:00
{ fetchtorrent }:
2023-10-13 11:32:36 +02:00
2023-10-28 00:25:35 +02:00
fetchtorrent {
2023-10-13 11:32:36 +02:00
config = { peer-limit-global = 100; };
url = "magnet:?xt=urn:btih:dd8255ecdc7ca55fb0bbf81323d87062db1f6d1c";
sha256 = "";
}
```
2023-10-28 00:25:35 +02:00
### Parameters {#fetchtorrent-parameters}
2023-10-13 11:32:36 +02:00
- `url` : Magnet URI (Magnet Link) such as `magnet:?xt=urn:btih:dd8255ecdc7ca55fb0bbf81323d87062db1f6d1c` or an HTTP URL pointing to a `.torrent` file.
- `backend` : Which bittorrent program to use. Default: `"transmission"` . Valid values are `"rqbit"` or `"transmission"` . These are the two most suitable torrent clients for fetching in a fixed-output derivation at the time of writing, as they can be easily exited after usage. `rqbit` is written in Rust and has a smaller closure size than `transmission` , and the performance and peer discovery properties differs between these clients, requiring experimentation to decide upon which is the best.
- `config` : When using `transmission` as the `backend` , a json configuration can
be supplied to transmission. Refer to the [upstream documentation ](https://github.com/transmission/transmission/blob/main/docs/Editing-Configuration-Files.md ) for information on how to configure.