error: derivation 'imv' does not have valid outputs: error:
… while calling the 'getAttr' builtin
at /derivation-internal.nix:19:19:
18| value = commonAttrs // {
19| outPath = builtins.getAttr outputName strict;
| ^
20| drvPath = strict.drvPath;
… while calling the 'derivationStrict' builtin
at /derivation-internal.nix:9:12:
8|
9| strict = derivationStrict drvAttrs;
| ^
10|
(stack trace truncated; use '--show-trace' to show the full trace)
error: Package ‘freeimage-unstable-2021-11-01’ in /nix/store/gzf4zwcakda1nykn6h0avh45xhjhvsz4-source/pkgs/development/libraries/freeimage/default.nix:72 is marked as insecure, refusing to evaluate.
Known issues:
- CVE-2021-33367
- CVE-2021-40262
- CVE-2021-40263
- CVE-2021-40264
- CVE-2021-40265
- CVE-2021-40266
- CVE-2023-47992
- CVE-2023-47993
- CVE-2023-47994
- CVE-2023-47995
- CVE-2023-47996
You can install it anyway by allowing this package, using the
following methods:
a) To temporarily allow all insecure packages, you can use an environment
variable for a single invocation of the nix tools:
$ export NIXPKGS_ALLOW_INSECURE=1
Note: When using `nix shell`, `nix build`, `nix develop`, etc with a flake,
then pass `--impure` in order to allow use of environment variables.
b) for `nixos-rebuild` you can add ‘freeimage-unstable-2021-11-01’ to
`nixpkgs.config.permittedInsecurePackages` in the configuration.nix,
like so:
{
nixpkgs.config.permittedInsecurePackages = [
"freeimage-unstable-2021-11-01"
];
}
c) For `nix-env`, `nix-build`, `nix-shell` or any other Nix command you can add
‘freeimage-unstable-2021-11-01’ to `permittedInsecurePackages` in
~/.config/nixpkgs/config.nix, like so:
{
permittedInsecurePackages = [
"freeimage-unstable-2021-11-01"
];
}