-
-
Notifications
You must be signed in to change notification settings - Fork 17.5k
WIP: rustPlatform.fetchCargoVendor: use registry's config.json for crate download urls #399775
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
…ate download urls
The one I used to test an issue a while back was: https://crates.polomack.eu/ (https://github.com/Hirevo/alexandrie-index)
Crane does this for some reason, but
I've seen a lot of pushback from nixpkgs maintainers to using upstream package managers to fetch dependencies (see yarn, pnpm, etc.). Unless there are some upstream stability guarantees for
It does. I'm using it as a workaround right now (custom
I think that's a fine approach, however for private registries we would need to be able to set custom headers to authenticate. Maybe something similar to the |
Since As for |
I have also since found https://github.com/rust-lang/staging.crates.io-index Sadly, both of these seem to be git-based registry indexes. |
|
Btw I found |
Related: #377558
Draft.
Let's discuss first.
Questions:
registry+https://github.com/rust-lang/crates.io-indexsparse+https://index.crates.io//tarballscurrently/registry-0,/registry-1etccargo vendorcommandcargo vendoreven support other registries?importCargoLockinstead?nixpkgs/pkgs/build-support/rust/import-cargo-lock.nix
Lines 22 to 31 in 32c543a
config.jsonendpoint, it requires people to manually provide the download endpointcrane?config.jsonfilesTODOs:
config.tomlusingreplace-withimportCargoLockdoes itI don't think a decision needs to be made ASAP, since this problem is pretty niche, and people can use importCargoLock anyways.
Things done
nix.conf? (See Nix manual)sandbox = relaxedsandbox = truenix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage./result/bin/)Add a 👍 reaction to pull requests you find important.