mirrexagon / nixpkgs-esp-dev

Nix flake and overlay for ESP8266 and ESP32 development.
Creative Commons Zero v1.0 Universal
127 stars 59 forks source link

convert default.nix to overlay.nix, add shell-esp-open-rtos.nix #2

Closed sorki closed 4 years ago

sorki commented 4 years ago

Easier to use, shell-esp-open-rtos.nix allows to enter esp-open-rtos like shell for building ESP8266 projects.

mirrexagon commented 4 years ago

I've got some time, so I'll just do this myself.

sorki commented 4 years ago

Thank you! I've started with README updates but wasn't sure if you would accept this change.

I also have a PoC of Nixified nodemcu-firmware build using this repo but found few issues with it I'm trying to figure out (looks like there's some flash corruption which doesn't happen with their cloud builds).

Btw recent nixpkgs cross-esp32 PR https://github.com/NixOS/nixpkgs/pull/96131

mirrexagon commented 4 years ago

Oh, neat!

This repo was just a quick-and-dirty "I just want an ESP toolchain" thing, so it's impure and a bit messy in that regard. That nixpkgs PR looks interesting and it would be neat if that made this repo unnecessary; in any case, it's probably good reference for overhauling this repo to actually build things purely.

If I ever find the time and motivation, I might pursue that.

sorki commented 4 years ago

it would be neat if that made this repo unnecessary

I don't really understand the difference between esp8266 vs esp32 since I'm only using the former but if the PR would accommodate both it would be really neat indeed.

this repo to actually build things purely.

That reminds me I wanted to put this in README too (like that you initially need to build a toolchain with --option sandbox false.

mirrexagon commented 4 years ago

That reminds me I wanted to put this in README too (like that you initially need to build a toolchain with --option sandbox false.

Oh yeah, I added something of that nature to the README because I realized that as well. I'll adjust it slightly since I didn't realize you could just disable sandboxing just when you run Nix (as opposed to globally). Thanks for that!