Nix is a tool that takes a unique approach to package management and system configuration. Learn how to make reproducible, declarative and reliable systems.
error:
… while calling the 'head' builtin
at /nix/store/s6r7ck2zgl8bh3k6sjjlpnsihh2c96sw-nixos-23.11/nixos/lib/attrsets.nix:850:11:
849| || pred here (elemAt values 1) (head values) then
850| head values
| ^
851| else
… while evaluating the attribute 'value'
at /nix/store/s6r7ck2zgl8bh3k6sjjlpnsihh2c96sw-nixos-23.11/nixos/lib/modules.nix:807:9:
806| in warnDeprecation opt //
807| { value = builtins.addErrorContext "while evaluating the option `${showOption loc}':" value;
| ^
808| inherit (res.defsFinal') highestPrio;
(stack trace truncated; use '--show-trace' to show the full trace)
error: Package ‘qtwebkit-5.212.0-alpha4’ in /nix/store/s6r7ck2zgl8bh3k6sjjlpnsihh2c96sw-nixos-23.11/nixos/pkgs/development/libraries/qt-5/qtModule.nix:89 is marked as insecure, refusing to evaluate.
Known issues:
- QtWebkit upstream is unmaintained and receives no security updates, see https://blogs.gnome.org/mcatanzaro/2022/11/04/stop-using-qtwebkit/
You can install it anyway by allowing this package, using the
following methods:
a) To temporarily allow all insecure packages, you can use an environment
variable for a single invocation of the nix tools:
$ export NIXPKGS_ALLOW_INSECURE=1
Note: When using `nix shell`, `nix build`, `nix develop`, etc with a flake,
then pass `--impure` in order to allow use of environment variables.
b) for `nixos-rebuild` you can add ‘qtwebkit-5.212.0-alpha4’ to
`nixpkgs.config.permittedInsecurePackages` in the configuration.nix,
like so:
{
nixpkgs.config.permittedInsecurePackages = [
"qtwebkit-5.212.0-alpha4"
];
}
c) For `nix-env`, `nix-build`, `nix-shell` or any other Nix command you can add
‘qtwebkit-5.212.0-alpha4’ to `permittedInsecurePackages` in
~/.config/nixpkgs/config.nix, like so:
{
permittedInsecurePackages = [
"qtwebkit-5.212.0-alpha4"
];
}
Oops