<disasm>
yrashk: yeah we're working on getting build failures fixed on release 17.09. You can build it on 17.03 I helped someone else with this a bit ago: (pkgs.callPackages ./tilix.nix {}) https://gist.github.com/6e300179c7603df0a10257f717b66907
<fearlessKim[m]>
When I do just journalctl I see entries for NetworkManager like "sept. 15 09:46:23 jedha NetworkManager[764]: sh: modprobe : commande introuvable
<fearlessKim[m]>
" but if I run "journalctl -u NetworkManager" I see nothing. Is that the wrong unit name ?
nico202 has quit [(Read error: Connection reset by peer)]
<sauyon>
network-manager I believ
jsgrant has quit [(Client Quit)]
jsgrant has joined #nixos
<fearlessKim[m]>
sauyon: indeed thanks.
qz has joined #nixos
sibi_ has quit [(Quit: Connection closed for inactivity)]
<qz>
hello, is there any way to see build script for given package? (say i want to see build script for package that's installed when i do "nix-env -i elm")
<sauyon>
look in the github?
<qz>
but which revision in github? is it always taking master from nixpkgs?
<sauyon>
no it depends on the channel and how far the channel has gotten
<qz>
problem is that package is failing (says 1 dependencies couldn't be built) but i have no idea which exactly dependency is failing
<sauyon>
elmPackages.elm?
<qz>
yeah, likely. i just do nix-env -i elm
<sauyon>
doesn't it tell you when a package fails
<sauyon>
I'll try to build it
<sauyon>
hrm ok what channel are you on atm
<qz>
nope, worst it says is "cycle detected in the references of ‘/nix/store/8bjxnl81lqqn2x6da6dzak8dm4plyh2a-jailbreak-cabal-1.3.2’" but googling says its not even an error
<qz>
channels are another thing i wanted to ask about nix-channel --list shows nothing
<sauyon>
you have to run it as root
<qz>
oh, figured... tried sudo but its not same as running as root
<sauyon>
I would honestly recommend switching to nixos-unstable entirely to be honest
<qz>
i'm on darwin, is nixos-* working here?
<qz>
i thought i need nixpkgs-*
<qz>
and that's channel i got by default after installing nix (disclaimer: i'm first day into nix)
<sauyon>
ah I assumed you were on nixos
<sauyon>
sorry I've never actually used nix by itself :/
<sauyon>
worth a shot though, maybe?
<qz>
i'm looking into using nix as package manager and build env for my projects
zraexy has quit [(Quit: Leaving.)]
Supersonic112 has quit [(Disconnected by services)]
Supersonic112_ has joined #nixos
zraexy has joined #nixos
Supersonic112_ is now known as Supersonic112
<qz>
so all nix-channel operations have to be done as root? or maybe i can remove all channels as root, add one as user and go with it?
<sauyon>
I think if you one for your user it uses that one
<fearlessKim[m]>
qz you can add channels as a user. The trick is that nix-env will use root's channel too even if nix-channel doesn't show them (hate that behavior)
mbrgm has quit [(Ping timeout: 248 seconds)]
acarrico has quit [(Ping timeout: 260 seconds)]
acarrico has joined #nixos
lambdamu has joined #nixos
mbrgm has joined #nixos
lambdamu_ has quit [(Ping timeout: 240 seconds)]
jtojnar has quit [(Read error: Connection reset by peer)]
jtojnar has joined #nixos
<Infinisil>
qz: Stay on nixpkgs-unstable if you're not using nixos
<qz>
removed channel as root, added one as user for now
<Infinisil>
You generally don't need to mess around with nix-channel though
<qz>
Infinisil: i'm trying nixpkgs-17.09-darwin for now, at least elm builds there
<disasm>
wow my laptop is super hot to the touch right now... almost to the point I want to get a extra kbd out of the office.
<qz>
it does not on nixpkgs-unstable and i dont know how to fix it (that commit referenced by sauyon is an issue)
<sauyon>
unstable tends to do that :P
<qz>
so its better to stay on 17.09 then?
<sauyon>
how do I specify runtime deps :(
<Infinisil>
qz: A lot of people also use a git checkout of nixpkgs at some/path, then add nixpkgs=some/path to NIX_PATH, so that all nix commands use this checkout instead
<Infinisil>
then nix-channel becomes irrelevant
<qz>
Infinisil: hrm, might try that.
<Infinisil>
sauyon: include the path to the dep where you need it, e.g. ${pkgs.foo}/bin/foo
<sauyon>
I'm writing a package?
<Infinisil>
qz: What's NIX_PATH by default on non-nixos if I may ask?
<sauyon>
do you mean add it to the PATH in the wrapper hook?
<sauyon>
oh I'm just looking for hooks for the buildPythonApplication and wrapGappsHook
<sauyon>
'cuz it's already wrapped twice lol
eacameron has joined #nixos
Viaken2 has quit [(Ping timeout: 248 seconds)]
drakonis has joined #nixos
sigmundv__ has quit [(Ping timeout: 260 seconds)]
Wizek has quit [(Quit: Connection closed for inactivity)]
takle has joined #nixos
takle has quit [(Ping timeout: 252 seconds)]
<sauyon>
wonderful
<sauyon>
it only took me like 20 minutes to find makeWrapperArgs >.>
justan0theruser has joined #nixos
nh2 has quit [(Quit: Leaving.)]
nh2 has joined #nixos
Lisanna_ has quit [(Ping timeout: 260 seconds)]
zraexy has quit [(Ping timeout: 260 seconds)]
NightTrain has quit [(Quit: Lost terminal)]
Wizek_ has joined #nixos
Wizek has joined #nixos
<simpson>
I updated my channels and now Steam won't start, I think because it's stuck in the past and looking for now-invalid paths. Is there a way to gently provoke it into freshness and working, or do I have to delete all the local data?
<sauyon>
theoretically dependencies shouldn't be garbage collected
<sauyon>
but I have no clue how the steam wrapper works
<sauyon>
what's the actual error you're gettingp
<simpson>
None. It just hangs.
<disasm>
compiling qtwebengine on my laptop is no fun :( seriously considering packet.net
<fearlessKim[m]>
I am trying to fix a problem happening during network manager compilation so I do "nix-shell -A networkmanager-dev ~/nixpkgs" but how can I get the phases to run ? As I don't know them I run "genericBuild" which generates "mkdir: impossible de créer le répertoire « /nix/store/wvch1f9s3bkzhy8w0siykg9anx5lmfxv-networkmanager-dev »: Read-only file system"
acowley is now known as acowley_away
<qz>
where is nix setting my environment variables? i.e. initial NIX_PATH and friends?
schoppenhauer has quit [(Ping timeout: 248 seconds)]
schoppenhauer has joined #nixos
takle has joined #nixos
<disasm>
fearlessKim[m]: first cd into a directory somewhere, I use ~/scratch myself then you should be able to run genericBuild. If you want to run the phases manually, you can do that too, but it will depend on the app what commands you run.
justan0theruser has quit [(Ping timeout: 246 seconds)]
takle has quit [(Ping timeout: 248 seconds)]
<disasm>
fearlessKim[m]: network manager looks fairly normal, so unpackPhase cd <dir it created> patchPhase configurePhase buildPhase
<disasm>
qz: nixos or nix?
<fearlessKim[m]>
disasm: but is there a way to skip the unpackPhase ? very often, I am in the git folder of the project. Like I am in the local clone of NetworkManager so can I get nix-shell to detect that and ignore the unpackPhase ? That's why I don't want to run genericBuild in fact. I would need to run it, but without the unpackPhase
<disasm>
fearlessKim[m]: sure, alter the genericBuild, it's just a variable
<disasm>
and your actual PATH: export PATH="$HOME/.nix-profile/bin:$HOME/.nix-profile/sbin:$HOME/.nix-profile/lib/kde4/libexec:/nix/var/nix/profiles/default/bin:/nix/var/nix/profiles/default/sbin:/nix/var/nix/profiles/default/lib/kde4/libexec:$PATH"
eacameron has quit [(Remote host closed the connection)]
<disasm>
essentially, that file also sets up the magic so when you run nix commands, instead of manually running them, it passes the command off to an isolated build user.
<disasm>
that magic happens with export NIX_REMOTE=daemon
dfranke has quit [(Ping timeout: 246 seconds)]
<disasm>
qz: make sense?
<qz>
so everything happens in /etc/profile?
<qz>
commented out stuff in /etc/profile and NIX_ variables are still set in new shells
<disasm>
qz: what shell are you using?
<qz>
disasm: zsh. but yeah, somehow its still executing that /nix/var/nix/profiles/default/etc/profile.d/nix-daemon.sh and all magic is happening there
<qz>
now i wonder how does it execute it
<disasm>
qz: look at /etc/zshrc
<qz>
disasm: that's it, thanks
<disasm>
qz: yeah, here's the line in the installer: PROFILE_TARGETS=("/etc/profile" "/etc/bashrc" "/etc/zshrc")
<disasm>
qz: if you come back around in 12 hours or so gchristensen will be around. he's the one that re-did the osx install to be multi-user. He can give you all the nitty gritty details.
<qz>
disasm: cool, thanks
<qz>
now i'm trying to make single-user install from this multi-user one :)
MP2E has quit [(Quit: leaving)]
drakonis has quit [(Remote host closed the connection)]
drakonis has joined #nixos
reinzelmann has joined #nixos
takle has joined #nixos
RayNbow`TU has joined #nixos
<fearlessKim[m]>
how can I remove the unpackPhase right from the overlay ? I've added a derivation networkmanager-dev = super.networkmanager.override ... { src=~/networkmanager unpackPhase= ??? }
<fearlessKim[m]>
or should I 'phases= remove "unpackPhase" oldAttrs.phases' ?
takle has quit [(Ping timeout: 248 seconds)]
<fearlessKim[m]>
that's weird, now that I've added autoreconfHook in nativeBuildInputs, echo $phases returns nothing :/
<hyper_ch>
good morning
<hyper_ch>
where's my coffee machine
drakonis has quit [(Read error: Connection reset by peer)]
spear2 has quit [(Quit: ChatZilla 0.9.93 [Firefox 54.0/20170616104331])]
takle has joined #nixos
JosW has joined #nixos
takle has quit [(Ping timeout: 248 seconds)]
<Jacoby6000h>
fearlessKim[m]: Did you end up figuring out the neovim python packages thing? I thought I saw a message from you this morning, but I didn't have time to look it over
<neonfuz>
so I'm trying to install an npm package, and node-gyp is giving me trouble
michas has joined #nixos
<rauno>
question, is it possible to assign secondary ip to interface with nixos configuration? something like: ifconfig br0:0 10.10.200.1 netmask 255.255.255.0 up
<neonfuz>
is there no rough equivalent to build-essential for nixos?
<neonfuz>
like gcc, make, as, cc, etc
<neonfuz>
also node-gyp is complaining that cc isn't found, do I need to manually link cc to gcc somehow?
<srhb>
neonfuz: I'm not sure that the right answer for the job is stdenv, but stdenv does provide those.
<neonfuz>
alright
elurin has joined #nixos
odi has joined #nixos
<neonfuz>
still getting cc command not found
<neonfuz>
after running through nix-shell -p stdenv
<srhb>
What's cc again?
<neonfuz>
the c compiler
<neonfuz>
should point to gcc probably
<srhb>
Odd, I should think gcc was there as an alias
<srhb>
Yeah
<neonfuz>
I'm gonna just try symlinking gcc to cc in my home directory bin that I have
<fearlessKim[m]>
Jacoby6000h: please tell me if that's ok for you too. I think I gonna shoot a mail anyway
<srhb>
neonfuz: stdenv.cc then?
<neonfuz>
oh wait, duhh
<neonfuz>
k
<neonfuz>
it's goin
<neonfuz>
I think it finished
<neonfuz>
hard to tell with npm, it's kinda terrible lol
<Jacoby6000h>
fearlessKim[m]: where is super coming from? I'm not super familiar with nix expressions./
<cocreature>
what’s the equivalent of "nix-env --delete-generations" for deleting channel states?
hamishmack has quit [(Quit: hamishmack)]
nico2022 has joined #nixos
nico2022 has quit [(Client Quit)]
<LnL>
channels are also a profile, so you can use nix-env -p /nix/var/nix/profiles/per-user/root/channels ...
nico202 has quit [(Ping timeout: 246 seconds)]
<tnks>
I guess a variant of my question is "is there an environment variable to adjust "sysconfdir"? Or would that require recompilation of Nix binaries?
viric has quit [(Read error: Connection reset by peer)]
viric has joined #nixos
dywedir has joined #nixos
hoodoo_ has joined #nixos
FRidh has joined #nixos
michas has quit [(Ping timeout: 252 seconds)]
civodul has joined #nixos
jedai has joined #nixos
dywedir has quit [(Remote host closed the connection)]
hotfuzz_ is now known as hotfuzz
<sphalerite>
tnks: I don't even see --sign in the source code for nix-store :/
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] rycee pushed 1 new commit to master: https://git.io/v5QDt
<sphalerite>
tnks: oh right, it's changed in unstable
<cocreature>
LnL: perfect, thanks!
leat has quit [(Quit: leat)]
nico202 has joined #nixos
ertes has quit [(Ping timeout: 248 seconds)]
leat has joined #nixos
<sphalerite>
tnks: so in 1.11.x it's hardcoded to look in ${nix-conf-dir}/signing-key.{sec,pub}. You can still change nix-conf-dir using the environment variable NIX_CONF_DIR by the looks of it (src/libstore/globals.cc:77)
<sphalerite>
tnks: in unstable there seems to be a new sign-path command which I'm guessing replaces nix-store --export --sign (which is unrecognised there)
eacameron has quit [(Ping timeout: 240 seconds)]
hamishmack has joined #nixos
jellowj has joined #nixos
ShalokShalom has quit [(Ping timeout: 252 seconds)]
nico202 has quit [(Ping timeout: 264 seconds)]
Max__ has joined #nixos
<Max__>
Hello there
Max__ is now known as Guest7556
<vandenoever>
Fannar: is that amsterdam?
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] Mic92 pushed 3 new commits to release-17.09: https://git.io/v5QSK
* mbrock
dreams of moving back to Amsterdam... biking around the countryside, drinking Belgian beer, and doing pure functional programming...
motie has joined #nixos
<Fannar>
Yes it is.
<mbrock>
reminds me of a guy in #lisp who once said something like "I live on a sailboat and spend my time coding Common Lisp. It's the life I want to live and the love I want to give"
ShalokShalom has joined #nixos
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] rycee pushed 1 new commit to master: https://git.io/v5Q9I
<makefu>
michalrus: you can also clone the repo and use NIX_PATH=nixpkgs=/path/to/checkout nixos-rebuild switch
<michalrus>
Mic92: but that’s how to obtain a concrete SHA1 of nixpkgs, yes! But how to use it then during evaluation of configuration.nix, without using -I?
<michalrus>
makefu: mhmmm. Hmm.
<makefu>
setting nix.nixPath persists the setting
snikkers has joined #nixos
<makefu>
s/^\w+ //
<michalrus>
Awesome. ♥ And I can set it from configuration.nix, and it will use *that* nixPath to build *that* configuration.nix?
<sphalerite>
yes
<sphalerite>
It will also affect nix-env and friends
<michalrus>
Omg, just what I wanted. Wonderful!
<michalrus>
Thanks, all. :)
<Mic92>
michalrus: you can point nix.nixPath = ["nixpkgs=${...}"];
<michalrus>
Yes.
<michalrus>
Very cool. =] Thanks!
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] rycee pushed 1 new commit to release-17.03: https://git.io/v5Q5s
<NixOS_GitHub>
nixpkgs/release-17.03 6e753b3 Samuel Leathers: PyWebDAV: Fix src url...
NixOS_GitHub has left #nixos []
<makefu>
michalrus: for the initial build you can use `NIX_PATH=nixpkgs=... nixos-rebuild switch`
<michalrus>
Ahh, so this will work from the 2nd build only, hmm.
<michalrus>
tilpner: thank you, reading!
<tilpner>
michalrus - I originally had the git details inlined into config.nix, but I recently extracted them to make it easier to parse them with external tooling
orbekk1 has quit [(Remote host closed the connection)]
<NixOS_GitHub>
nixpkgs/release-17.03 2667bfb Peter Simons: ikiwiki: mark build broken...
NixOS_GitHub has left #nixos []
<maxigit>
well, I have two installs sharing the same disk. I Would like to share the store but the path are actually different, even though the binaries should be the same
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] Mic92 closed pull request #28635: Init ldc at 1.3.0, fix bootstrap dmd build, fix dtools test, run dmd-testsuite in checkPhase and fix Foundation framework (master...ldc) https://git.io/v5spp
NixOS_GitHub has left #nixos []
<ikwildrpepper>
git log
<ikwildrpepper>
oops
nico202 has quit [(Ping timeout: 248 seconds)]
<tilpner>
maxigit - The path /nix/store would be different for each?
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] Mic92 pushed 1 new commit to master: https://git.io/v5QAR
<NixOS_GitHub>
nixpkgs/master 3b5245f Jörg Thalheim: dmd: remove broken flag
NixOS_GitHub has left #nixos []
<sphalerite>
maxigit: did you post on reddit about this too?
<sphalerite>
ah yes, I see that was you :)
<maxigit>
Yes I did, is that ok ?
<sphalerite>
Of course it is haha, just checking
<maxigit>
I want to share the path `/nix/store` however, binaries get a different sha, so nothing is shared.
<sphalerite>
Then what's sthe point in sharing it?
<sphalerite>
and you'll still have the GC/database problems I mentioned in the comments
<maxigit>
The point of sharing it is to save space. There is no point indeed if it doesn't work the way I need too. But I'm hoping it can be done.
<sphalerite>
Is there a reason you don't want to just share everything between hte installations?
<sphalerite>
if they're not shared you won't be saving space
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] Mic92 pushed 5 new commits to release-17.09: https://git.io/v5QAw
<NixOS_GitHub>
nixpkgs/release-17.09 e357ee4 Thomas Mader: dmd: Fix bootstrap dmd compiler build. Doesn't work with gcc6....
<NixOS_GitHub>
nixpkgs/release-17.09 f5fe80a Thomas Mader: dmd: Run dmd-testsuite in checkPhase...
<NixOS_GitHub>
nixpkgs/release-17.09 463656e Thomas Mader: dtools: Fix rdmd test when building with newer phobos version which doesn't include std.stdiobase.d anymore....
NixOS_GitHub has left #nixos []
<maxigit>
Can't the GC problem solved by adding roots somehow ?
<maxigit>
I want to share them. Do you know why the hash are different ?
<tilpner>
Different nixpkgs revisions?
<maxigit>
I want to share everything between the two installations
<sphalerite>
Then why don't you share the rest of the filesystem as well?
<maxigit>
@tilpner how can I check that ? I installed both from the same CD. The only difference should be the hardware configuration which is slightly different. One being a VirtualBox guest
<sphalerite>
That would solve the problem of gc not working right, and result in a single database
<tilpner>
maxigit - Did you try updating the channels on both machines at the same time? That should make sure they're the same
<tilpner>
(Doesn't have to be same minute or anything like that. Same week should be enough)
<tilpner>
How do you tell they're not being shared?
<maxigit>
@sphalerite I'm planning to share as much as possible, but they'll have to boot from a different FS, I dont' think I can boot a VM From a physical partitition. Also, mounting point and some device configuration will be different.
<goibhniu>
maxigit: by the way, do you know you can easily share the store if you use build-vm to create the image?
<sphalerite>
maxigit: it should be possible
<sphalerite>
goibhniu: the VM would be running in windows
<maxigit>
@goibhniu I use the VM From a window host not nixos
<sphalerite>
maxigit: and it isn't hard to get a config that will boot both on both a physical and a virtual machine
<sphalerite>
if you base the mountpoints on UUIDs the same mount config should work both in the VM and the physical machine too
<maxigit>
@tipner if I Do `which something` on both machine I get a different path (different hash) in the nix-store
<sphalerite>
Of course the simplest option is just to have completely separate VMs
<sphalerite>
although that's no fun ;)
hke has quit [(Ping timeout: 240 seconds)]
<goibhniu>
could you use a different system profile for each system, so that you have gc-roots for both independently?
<sphalerite>
goibhniu: the trouble with that AFAIU is that neither system will know about the other's gc roots and may remove stuff that the other system is still depending on
<tilpner>
maxigit - And you have the same config on both, I assume?
<goibhniu>
but if both profiles are on both systems, wouldn't that protect them?
<maxigit>
@goibhniu I'm sure I can add each profiles on each other root.
<sphalerite>
goibhniu: for profiles that could work, but it won't work for indirect roots
* goibhniu
is just imagining this ... no idea if it's possible TBH
<sphalerite>
so if all of /nix is shared rather than just the store
<maxigit>
@tiplner No. The generated hardware configuration is different, and I haven't activated the same package yet (I'm just playing with the two config at the moment). However, the package should have the same dependendices shouldn't they ?
<sphalerite>
maxigit: bottom line is it's probably possible but not a good idea to try if you don't know much about nixos yet and are just trying it out
<sphalerite>
I'd recommend keeping the installations separate, maybe also only doing one of the two
<maxigit>
@tilpner do you know how the hash are calculated , ie which parameter are actually taken into account ?
simukis has joined #nixos
<maxigit>
@tilpner how do you check the actual version the nixpgs ?
<sphalerite>
maxigit: everything that can influence the outcome
<goibhniu>
maxigit: nixos-version will tell you
dannyg has joined #nixos
<maxigit>
@sphalerite Well, I won't invest more in nixos if I can't getting this working :-). Even though I really like the idea of it.
<tilpner>
"nixos-version --hash" => "master"
<tilpner>
So helpful...
<sphalerite>
maxigit: have you got it working with other OSes? :p
<maxigit>
to be honest, I have only shared the nix-store using by setting NIX_STORE_DIR, install something and check if it reuses anything from the new store
<goibhniu>
tilpner: weird, does it work without the --hash?
<dannyg>
in my systempackages i refer directly to a store path (because reasons), which worked fine, but with the release-17.09 branch i get an error: The option value `environment.systemPackages.[definition 33-entry 32]' in `/etc/nixos/configuration.nix' is not a package. How do I disable this error and make it accept the package in my store again?
<tilpner>
goibhniu - No, it says 17.09pre-git (Hummingbird)
<goibhniu>
super-weird ... it should tell you the revision ... unless this has changed recently?
<maxigit>
@sphalerite I haven't tried with other os. I though NixOS would be perfect for that.
<tilpner>
Oh, I know why. Huh
<sphalerite>
dannyg: consider elaborating on "reasons"? :p
<dannyg>
something that takes way too long to build ;)
<sphalerite>
dannyg: pin nixpkgs for it instead of referring to the store path
<tilpner>
dannyg - You expected this response, but you shouldn't put raw store paths into your systemPackages (or anywhere). Why do you do that?
<tilpner>
goibhniu - nixos-rebuild updates .version-suffix, so if I don't run nixos-rebuild, the version suffix is never updated and nixos-version can't use it
<sphalerite>
dannyg: if you put something like (import (builtins.fetchTarball https://github.com/nixos/nixpkgs/archive/<commithash>.tar.gz) {}).packageName in your systemPackages it shouldn't ever need rebuilding
<goibhniu>
tilpner: what do you use instead of nixos-rebuild?
<maxigit>
is there any resources indicating what is taking into account when calculating the sha ?
<sphalerite>
maxigit: everything is taken into account, as I said previously
<tilpner>
goibhniu - A custom 4-line /bin/sh script that uses nix-build and calls switch-to-configuration manually. But I'm in the process of testing if that's unnecessary and might switch back to a wrapper around nixos-rebuild
<sphalerite>
maxigit: the sha of what exactly in this case?
<dannyg>
sphalerite: thx, will look into that option
<maxigit>
What do you mean by everything ? All the dependencies, all the packages installed (even the one which haven't been installed yet ?) hardwarde configuration ?
jellowj has quit [(Ping timeout: 240 seconds)]
<maxigit>
sphalerite: for example if I don't have git installed and do `nix-shell -p git` then find the path of the git binary in the nix-store I found something. I do insted `NIX_STORE_DIR=... nix-shell -p git`. Then the hash in the new nix store is a different one
* sphalerite
did not know there was a NIX_STORE_DIR environment variable
<sphalerite>
but everything depends on the nix store path basically
<sphalerite>
So if you have a different nix store path everything will have different hashes (and everything will need to be built from source)
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] edolstra pushed 2 new commits to release-17.09: https://git.io/v5Qp5
<maxigit>
Ok, that might be the problem as I have `/nix/store` and `/mnt/nix/store` I might have to try and mount the new nix store to `/nix/store`.
<sphalerite>
Stuff in /mnt/nix/store also won't work as expected
<maxigit>
sphalerite: why ?
<sphalerite>
because everything in it will assume it lives in /nix/store and refer to other stuff in /nix/store rather than /mnt/nix/store, if /mnt is a foreign system that usually boots with it at /nix/store
ShalokShalom has quit [(Read error: Connection reset by peer)]
<maxigit>
are you saying set NIX_STORE_DIR doesn't really work becauce all path are absolute ?
nico202 has joined #nixos
<tilpner>
Did you try bind-mounting the store to /nix/store?
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] FRidh closed pull request #29357: Python 3.4 and 3.5: support LD_LIBRARY_PATH (master...ld_library_path) https://git.io/v59zE
NixOS_GitHub has left #nixos []
<maxigit>
tilpner: I'm trying now. Do you know the syntax ?
<tilpner>
mount --bind something something_else, if you're just testing this
<tilpner>
Not sure how you would do this permanently on boot
<tilpner>
I also forgot why a symlink was not okay
<maxigit>
which one is something and something_elese ?
kiloreux__ has joined #nixos
NightTrain has joined #nixos
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] eskimor opened pull request #29415: Fix coturn to also come properly up if dhcpcd is used. (master...coturn-fix) https://git.io/v5QjL
NixOS_GitHub has left #nixos []
<tilpner>
Try mount --bind /mnt/nix /nix
<maxigit>
I've done the mount. Now, it can't anything
<tilpner>
Actually, maybe only the store
<tilpner>
Did you do what I said, or did you only mount the store?
<maxigit>
I just mounted the store
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] FRidh pushed 4 new commits to master: https://git.io/v5Qjs
<NixOS_GitHub>
nixpkgs/master 0d9410a Samuel Leathers: jedi: disable tests
<NixOS_GitHub>
nixpkgs/master e355e9c Samuel Leathers: ptpython: 0.35 -> 0.41
<NixOS_GitHub>
nixpkgs/master 6515402 Samuel Leathers: altair: disable tests
NixOS_GitHub has left #nixos []
<tilpner>
Okay, good
kiloreux_ has quit [(Ping timeout: 255 seconds)]
<maxigit>
Not so good. Nothing work at all now. I can't even launch a new terminal :-(
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] FRidh pushed 1 new commit to release-17.09: https://git.io/v5QjE
<NixOS_GitHub>
nixpkgs/release-17.09 329d844 Frederik Rietdijk: Merge pull request #29405 from disassembler/jedi...
NixOS_GitHub has left #nixos []
<tilpner>
Can you unbind it?
<maxigit>
No. I have to reboot
<tilpner>
So just umount
<maxigit>
I can't find umount ;-)
<tilpner>
:/
<tilpner>
So you were running everything from your /nix/store, and we made that inaccessible. Good job, us
<maxigit>
That's the evidence that the hash are different between the two stores
silver_hook has quit [(Quit: Konversation terminated!)]
<sphalerite>
maxigit: so why do you not just want to run the VM off the real partition?
<maxigit>
maybe I Should try to change the nix-store in the /etc/nixos/configuration itself. Any idea how to do it ?
<tilpner>
I don't know how to do this quickly, you'd have to build a new profile against the other nix store, then mount it at boot
<maxigit>
sphalerite: because I don't know how to do it (and I have seen) it's not possible
<maxigit>
sphalerite: but I'm hope I'm wrong. Could you help me doing it ?
silver_hook has joined #nixos
silver_hook has quit [(Changing host)]
silver_hook has joined #nixos
silver_hook has quit [(Client Quit)]
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] FRidh pushed 3 new commits to master: https://git.io/v57el
<NixOS_GitHub>
nixpkgs/master fad96f6 Samuel Leathers: 3to2: rename py3to2 to work with callPackage
<NixOS_GitHub>
nixpkgs/master 6ac283b Samuel Leathers: arelle: add py3to2 as a buildInput
<NixOS_GitHub>
nixpkgs/master 47e1751 Frederik Rietdijk: Merge pull request #29388 from disassembler/arelle...
NixOS_GitHub has left #nixos []
silver_hook has joined #nixos
jellowj has joined #nixos
Fannar has quit [(Quit: leaving)]
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] FRidh pushed 1 new commit to release-17.09: https://git.io/v57eB
<NixOS_GitHub>
nixpkgs/release-17.09 01aafc6 Frederik Rietdijk: Merge pull request #29388 from disassembler/arelle...
NixOS_GitHub has left #nixos []
LysergicDreams has quit [(Ping timeout: 248 seconds)]
LysergicDreams has joined #nixos
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] FRidh pushed 1 new commit to master: https://git.io/v57ea
<NixOS_GitHub>
nixpkgs/master 140136a Samuel Leathers: mdp: disable tests
NixOS_GitHub has left #nixos []
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] FRidh pushed 1 new commit to release-17.09: https://git.io/v57e6
<NixOS_GitHub>
nixpkgs/release-17.09 8067485 Samuel Leathers: mdp: disable tests...
ik has left #nixos ["ERC (IRC client for Emacs 25.2.1)"]
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] rbvermaa pushed 1 new commit to master: https://git.io/v57f4
<NixOS_GitHub>
nixpkgs/master 0783efb Rob Vermaas: google-instance-setup: add openssh to path
NixOS_GitHub has left #nixos []
ShalokShalom has joined #nixos
<sphalerite>
maxigit: it depends on which virtualisation software you're using really
<sphalerite>
I think with qemu it can be done with -disk /dev/sda3 or whatever but that's not really helpful since linux isn't the host
<sphalerite>
I think you can create a VMDK representing the physical device / partition using VBoxManage for virtualbox, but I don't know the details
<maxigit>
sphalerite: I'm using virtualbox. When I try to boot on the physical partition i says it's not bootable. I remember seeing somewhere it was a bad idea.
<maxigit>
sharing the nix-store would be much cleaner if I can make it work
<sphalerite>
yeah, not booting off the partition but having a separate boot medium that boots into it
<sphalerite>
IMHO that would be cleaner
<sphalerite>
neither solution will work without quite a bit of fiddling
<sphalerite>
If this is a desktop machine maybe you could install to a separate physical disk and share the entire disk rather than just one partition
<sphalerite>
That seems like the least fiddly and most likely to work
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] rbvermaa pushed 1 new commit to release-17.09: https://git.io/v57JO
<NixOS_GitHub>
nixpkgs/release-17.09 38883f8 Rob Vermaas: google-instance-setup: add openssh to path...
NixOS_GitHub has left #nixos []
<maxigit>
Well my budget on computer has been totally used. I'm not allowed at the moment to spend any extra cash on anything :-(
Wizek_ has joined #nixos
<sphalerite>
or a USB stick if you don't mind the performance hit
<sphalerite>
FWIW I have nixos running acceptably fast from a USB stick myself
cmacrae has joined #nixos
<clever>
at one time, i ran nixos from a uSD card in a usb reader
<clever>
that uSD was also specialy configured, to boot both armv6 and x86-64, with the same rootfs and nix store
<cmacrae>
Hey LnL o/ So, I've been having issues with building a few packages on macOS (using nix-darwin) for a while now. I'm unable to install: rg, gpg, pass (assuming pass because of the gpg dependancy). Any idea what's going on? Are the packages broken upstream? Are you able to install these? Granted I'm following the unstable channel, but these used to work fine, so there's some regression
<cmacrae>
Sorry to @ you, just you've been helpful in the past with Nix on Darwin :)
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] edolstra pushed 1 new commit to release-17.03: https://git.io/v57J6
<noblenoodle12>
I guess that pulls in the base system, like systemd, etc.
<gchristensen>
noblenoodle12: can you describe what your end goal is?
eacameron has joined #nixos
<noblenoodle12>
to install nixos into a subdirectory, without booting the installer cd. Basicly installing nix onto another partition using my current system.
<noblenoodle12>
nixos*
<gchristensen>
and why don't you want to reboot?
<noblenoodle12>
i only have one machine and need my browser, tools, live, etc. Which are afaik not on the graphical installer.
<noblenoodle12>
i don't see any reason why my idea is impossible
<gchristensen>
it is just a bit annoying to do :P
hke has quit [(Ping timeout: 240 seconds)]
<gchristensen>
do you know you can install a browser and other tools in the graphical installer, if they're not already there?
hlavaty has quit [(Ping timeout: 260 seconds)]
eacameron has quit [(Ping timeout: 240 seconds)]
eacameron has joined #nixos
dieggsy has joined #nixos
ShalokShalom_ has joined #nixos
oida_ has joined #nixos
Kirill[m] has left #nixos ["User left"]
nico202 has quit [(Ping timeout: 246 seconds)]
ShalokShalom has quit [(Ping timeout: 248 seconds)]
oida has quit [(Ping timeout: 246 seconds)]
<FRidh>
I have a set called `media` that contains other sets. I would like to concat the values of all these subsets. The following should work, right? `concatMap attrValues (attrValues media)`
NightTrain has quit [(Quit: Lost terminal)]
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] peti pushed 1 new commit to master: https://git.io/v57tg
<NixOS_GitHub>
nixpkgs/master 33b09c0 Peter Simons: ghc-7.2.2 is broken
NixOS_GitHub has left #nixos []
bennofs has quit [(Quit: WeeChat 1.9)]
<Infinisil>
FRidh: nix-repl agrees
hke has joined #nixos
<noblenoodle12>
Do many packages break with the paths in nixstore? E.g. firejail policies, which expect some traditional path.
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] peti pushed 1 new commit to release-17.09: https://git.io/v57to
<NixOS_GitHub>
nixpkgs/release-17.09 2f90efa Peter Simons: ghc-7.2.2 is broken...
NixOS_GitHub has left #nixos []
<tilpner>
noblenoodle12 - Firejail in general seems broken with Nix
<sphalerite>
noblenoodle12: it depends on the assumptions the software makes
<tilpner>
And patching it would be non-trivial
<noblenoodle12>
how does this work for apparmor then? The latter one has even nixos options.
<maxigit>
is it possible to change the nix-store path in the /etc/nixos/configuration.nix file ?
<sphalerite>
firejail's concept is kind of neat, but as far as I've seen the implementation is awful
<noblenoodle12>
that said, i abandoned all hope for ever having SELinux on nix
abcrawf_ has quit [(Remote host closed the connection)]
<tilpner>
noblenoodle12 - If you define your profile/policies with Nix, your paths will always be correct
<sphalerite>
maxigit: I'm not sure, but you very rarely want to do that as it results in everything having to be built from source
<tilpner>
(I assume that's what apparmor does)
bennofs has joined #nixos
<maxigit>
sphalerite: ok :-(
<Infinisil>
maxigit: Why would you want that?
<FRidh>
Infinisil: somehow it doesn't like my sets
<maxigit>
Infinisil: I'm trying to share a nix-store between too install. One way would be to mount the 2nd store to /mnt/nix/store and change the nix-store to use it.
<sphalerite>
maxigit: if sharing the nix store between two machines is a hard requirement for you, then as you said earlier you shouldn't invest any more effort into nixos
<noblenoodle12>
tilpner: how broken is firejail in your opinion?
<maxigit>
Alternativey I could mount bind /mnt/nix/store to /nix/store but I don't how how to mount bind in configuration.nix
<sphalerite>
That won't work because the stuff in /mnt/nix/store expects to be in /nix/store
<Infinisil>
FRidh: It works with simple ones at least, what's the error?
abcrawf has joined #nixos
Ross has quit [(Ping timeout: 252 seconds)]
kuznero has joined #nixos
<noblenoodle12>
why you don't mount to /nix? All the binaries inside it are linked against stuff in /nix/foo/2fe..fe287/bar
<sphalerite>
You can create a bind mount using something like fileSystems."/nix/store" = {type = "bind"; device = "/mnt/nix/store";}; or something like that (might not work exactly like that)
<tilpner>
noblenoodle12 - It has some very questionable implementation choices (look at e.g. how it implements path whitelisting, lots of duplication), and I'm not a fan of the blacklisting approach to profiles. I haven't managed to use it on NixOS, so I'm using bubblewrap for now
<FRidh>
Infinisil: yea, if I create a new set it works just fine. And my existing sets are fine as well, since the items are referred elsewhere and no issues there. The purpose is to pass this list to propagatedBuildInputs
<FRidh>
Infinisil: yet I get `cannot coerce a function to a string`
<sphalerite>
But again, you're likely to have gc problems with that
<maxigit>
sphalerite: I understand. Sharing the nix-store is THE reason why I might use NixOS :-). I don't see why it could work in theory
<sphalerite>
maxigit: there's no reason for it not to work in theory, but in practice it doesn't as of now
iyzsong has joined #nixos
<maxigit>
sphalerite: is that for sure ? or we just haven't managed yet.
mattcode has joined #nixos
<tilpner>
sphalerite - What if they shared /nix/var? Wouldn't that solve gc problems?
<tilpner>
(Though it might bring other problems)
<sphalerite>
tilpner: not with indirect roots
<Infinisil>
maxigit: Soo, why do you need two nixos installs on the same machine?
<Infinisil>
sorry I don't get the point just yet
<Infinisil>
maybe nixos-containers can work for you instead
<maxigit>
Infinisil: I want a dual boot/ Virtul setep
NixOS_GitHub has joined #nixos
<zimbatm>
manveru: merged
<NixOS_GitHub>
[nixpkgs] zimbatm pushed 1 new commit to master: https://git.io/v57qE
<NixOS_GitHub>
nixpkgs/master 2edb7e9 Michael Fellinger: ruby: 2.4.1 -> 2.4.2 (#29417)
NixOS_GitHub has left #nixos []
<maxigit>
I have a window machine, I want to be able to boot nixos , or boot on windows and use NixOs on VirtualBox
<manveru>
thanks
<Infinisil>
Ahh, hm
<sphalerite>
tilpner: other than that it would all be fine, as long as the systems aren't running simultaneously (which they aren't in maxigit's case)
<noblenoodle12>
you could bind mount /nix
kuznero has left #nixos []
<noblenoodle12>
into the vm, if i get it right
<manveru>
good point about minor versions, maybe i should've kept both?
<manveru>
but don't want insecure packages in the repo if not absolutely needed
<tilpner>
sphalerite - Oh, didn't think of those. Depending on maxigits usage of them, it might just be a minor annoyance :/
acarrico has joined #nixos
<maxigit>
The two system won't run at the same TimePath
hke has quit [(Ping timeout: 255 seconds)]
orivej has joined #nixos
<sphalerite>
yeah it's definitely possible, it'll just break parts of nix
freeman42x[NixOS has joined #nixos
<goibhniu>
maxigit: so you just have two slightly different hardware configuration options?
<freeman42x[NixOS>
anyone could recommend a GUI file extractor? eg. for extraciting .rar, .7z, .zip, etc.
<noblenoodle12>
file-roller
<maxigit>
goibhniu: yes, might problem is the hash of binaries between the towo different options are different
<Infinisil>
FRidh: I just use `atool -x <archive>` which can exctract anything
<Infinisil>
Um freeman42x[NixOS ^^
<freeman42x[NixOS>
Infinisil, I'm specifically asking for a GUI tool though :)
<goibhniu>
maxigit: and simply booting your NixOS installation from VirtualBox doesn't work, right?
<Infinisil>
I see :) I'm not using GUI's very much
<freeman42x[NixOS>
Infinisil, I'm using GUIs because I like to use things that are typesafe
<tilpner>
maxigit - Have you tried just booting the installed NixOS from your harddrive in Windows?
hke has joined #nixos
<Infinisil>
freeman42x[NixOS: What do you mean by 'typesafe'?
<maxigit>
goibhniu: I does, but I've seen you can do dual boot as well, which solve minor problems using VM.
<tilpner>
Oh... goibhniu just asked that, sorry
<freeman42x[NixOS>
Infinisil, a GUI has good API discoverability and the type-safe bit is basically preventing users from doing some class of invalid actions
<Infinisil>
Ah
<freeman42x[NixOS>
btw. I am not implying that GUIs should /always/ be used
<goibhniu>
maxigit: right, but can't you dual boot the same system?
Guest83091 has quit [(Ping timeout: 252 seconds)]
<maxigit>
goibhniu: No, but I can share all data, and I was hoping to be able to share the nix/store
<goibhniu>
maxigit: what happens when you try?
<maxigit>
tilpner: from VirtualBox ? It doesn't work (not saying it can't made it worked)
<goibhniu>
that would be a simple solution, if you can get it to work
freeman42x[m] has joined #nixos
<tilpner>
maxigit - It would also solve profile/data synchronisation issues, so it's probably worth trying again
<maxigit>
goibhniu: I was hoping, bind mouting /nix and creating a few hardlink to share the roots would be enough. It is obviously not :-(
<maxigit>
goibhniu: I can share the nix store, but objects are not shared (they have a different hash) thefore it's pointless
<tilpner>
Uhh
xdelv has quit [(Ping timeout: 248 seconds)]
freeman42x[NixOS has quit [(Quit: Leaving)]
<tilpner>
Did you find out why the hashes were different?
<sphalerite>
noblenoodle12: largely because it's rebuilt on every channel update and there won't necessarily be someone to sign it right when it's been (automatically) built
<maxigit>
tilpner: that makes sense, maybe the environment is different then.
<sphalerite>
AFAIK
<noblenoodle12>
maybe the same system that signs the cache and channel tarballs can be used? Or are the latter one not signed yet?
jellowj has quit [(Ping timeout: 248 seconds)]
<sphalerite>
maxigit: I said everything that's supposed to affect the outcome
<tilpner>
maxigit - Compare the output of nixos-version on each system
xdelv has joined #nixos
<maxigit>
sphalerite: Ok. The question is what is "supposed" to affect the outcome. Or now Nix decide it ?
<sphalerite>
noblenoodle12: yeah the image is actually signed by that. Don't know how to verify a manually downloaded image though
<maxigit>
I can't comparte then physical version now, because I need to reboot ;-)
<sphalerite>
maxigit: the inputs to the derivation
<sphalerite>
so all the environment variables and stuff as tilpner said
<maxigit>
sphalerite: is there a way to check the inputs of a given derivation (recursively)?
<noblenoodle12>
sphalerite: what do you mean with "image"? The channel? I hope this one is signed
<sphalerite>
maxigit: to be precise — the builder, the builder arguments and the environment variables
<sphalerite>
You can check these things by inspecting the derivation file
<sphalerite>
noblenoodle12: the ISO image
<sphalerite>
I'm not sure the channel is signed actually
<gchristensen>
noblenoodle12: the signing of the cache files isn't in a way that would be friendly for validating an image
<noblenoodle12>
How does nix ensure, that the expressions in the channel are legit? I get that the packages itself are signed, but not signing the channel would defeat the entire purpose.
<gchristensen>
the channel tarball is not signed (interesting!) but is (of course) delivered over SSL
<noblenoodle12>
now we have to blindly trust ca cert authorities.
<sphalerite>
it should also be reproducible right?
<gchristensen>
I imagine it would be yeah
<tilpner>
You know... you *could* just get nixpkgs from GitHub and pin the hash
<gchristensen>
^
<sphalerite>
but that means trusting CAs!
<sphalerite>
:p
<gchristensen>
noblenoodle12: want to open an issue?
nslqqq has quit [(Ping timeout: 264 seconds)]
<noblenoodle12>
no ;)
<maxigit>
sphalerite: Do you mean nix file ? Is there any way to check the actual value of those parameters for a build derivation ?
<gchristensen>
ok, that is fine
<tilpner>
sphalerite - Not really, the hash is good enough. And unless someone signs it manually, I don't see how it's going to get better than this
<sphalerite>
maxigit: no, I mean the derivation file. It's created as part of building an expression
<sphalerite>
tilpner: but what trusted source do you get the hash from :o
<maxigit>
sphalerite: where can I find it ?
<gchristensen>
NixOS as it stands depends on the security of the nixos.org webserver and the CA process
<clever>
maxigit: nix prints the path when it start the build
<sphalerite>
^
<sphalerite>
Look for <stuff>.drv
<maxigit>
Thanks
<sphalerite>
gchristensen: and github too, right?
<gchristensen>
yeah, and a bunch of other stuff :P
<sphalerite>
it's crazy how many parties you have to trust in order to use any software really
<gchristensen>
yeah and really, who is this sketchy "eelco" fella anyway
<disasm>
dang, I thought we were going to break the 200 barrier of failing builds when I woke up. We're getting closer though.
<tilpner>
sphalerite - That attack works if compromised nixpkgs is constantly served to me, even for my local checkout. It doesn't work inbetween, while I have it pinned. So yes, it's pretty insecure if GH or a nation state is trying to attack (or my home router is compromised), but it protects me from the guy might mitm at the coffee shop
hke has joined #nixos
<tilpner>
*the guy who
<noblenoodle12>
You don't. One only needs e.g. the key of the core maintainers. Everything else is build on top, it then doesn't matter if i try to install stuff from scriptkiddies69.ru, it will still be legit.
freeman42x[NixOS has joined #nixos
<sphalerite>
noblenoodle12: then it's transitive trust, you're still effectively trusting everyone that core maintainer trusts
<freeman42x[m]>
noblenoodle12: cheers! file-roller works great 🙂
<gchristensen>
noblenoodle12: please open an issue with the root of the problem, and include afew attack vectors you're concerned about
<michalrus>
tilpner: re: pinning nixpkgs for the whole configuration.nix → your method requires second rebuild, too, sooo… having limited time, I added `-I nixpkgs=` to the Makefile. I’ll investigate later how to do this well. For developer VMs it’s easy (nixos-build-vms is just a fancy nix-build), but for auto deployment to prod, I don’t know yet. :)
<gchristensen>
and how do you get that key? ;) (the ultimate troll question of threat matrixes)
<tilpner>
michalrus - How does my method require a second rebuild?
<noblenoodle12>
gchristensen: i download it unsafely, then compare fingerprints on different websites from various machines :P
newhoggy has joined #nixos
<michalrus>
Wait, no, yours didn’t!
<michalrus>
But it wouldn’t be a standard nixos-rebuild on production.
<tilpner>
michalrus - And after I linked my config, I rebuilt that part completely. I'm now using nixos-rebuild again! (Though with a wrapper)
<michalrus>
But again you shouldn’t do that manually.
<sphalerite>
noblenoodle12: what if everyone in the world is out to get you :D
<michalrus>
I don’t know yet. :P
dieggsy has quit [(Ping timeout: 248 seconds)]
<michalrus>
tilpner: yes, yes, I’ve seen a wrapper in one of my friends’ config. :p
<maxigit>
If I look at two different derivation (for tree). One uses bash-4.4-p5 and the other bash-4.4-p12. Are they different version fo bash or just different name for the same thing ?
<noblenoodle12>
sphalerite: well, as long as its cheaper to attack me in person than my computer im happy.
<michalrus>
OK, I need to afk, thanks for the ideas!
<sphalerite>
maxigit: different versions of bash I believe
<sphalerite>
maxigit: bash's versioning is weird
FRidh has quit [(Quit: Konversation terminated!)]
<tilpner>
gchristensen - You distribute the fingerprint of that key via as many channels as possible. Include it in the IRC topic, on the website, etc.
<maxigit>
Ok, if do `bash --version` i get bash4.4.5. So I definitely have a different version between my two install. What is the way to make sure both uses exactly the same version ? I installed from the same CD and didn't update anything.
<sphalerite>
that's weird
<gchristensen>
noblenoodle12: IRC channels have a mind of a goldfish though. if you'd like this fixed, we need an issue.
<sphalerite>
maxigit: How much time passed between the installs?
FRidh has joined #nixos
<maxigit>
A few days ? maybe a week
<sphalerite>
gchristensen: channel topic :D
<maxigit>
sphalerite: I installed both last week, but had to reinstall the VM this week.
<sphalerite>
I'm not sure if the installer does updates or not
<tilpner>
I don't think it does
<tilpner>
(I just checked, now I think it doesn't)
nslqqq has joined #nixos
<sphalerite>
maxigit: the bash in 17.03 is p5, only unstable has p12
<sphalerite>
err and 17.09 (beta) probably
jbl007 has left #nixos []
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] roberth opened pull request #29420: arelle: enable only on python 3.4 (release-17.09...release-17.09-arelle) https://git.io/v5734
NixOS_GitHub has left #nixos []
takle has quit [(Remote host closed the connection)]
<FRidh>
Infinisil: getting closer...if I remove an instance of callPackage and put the referred expression instead in the same file there is no evaluation error
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] roberth opened pull request #29421: arelle: enable only on python 3.4 (master...master-arelle) https://git.io/v573d
NixOS_GitHub has left #nixos []
Guest83091 has joined #nixos
FRidh has quit [(Remote host closed the connection)]
reinzelmann has quit [(Quit: Leaving)]
jtojnar has quit [(Read error: Connection reset by peer)]
jtojnar has joined #nixos
WinchellsM has quit [(Quit: leaving)]
newhoggy has quit [(Remote host closed the connection)]
cmacrae has joined #nixos
civodul has quit [(Read error: Connection reset by peer)]
revtintin has joined #nixos
newhoggy has joined #nixos
erictapen has quit [(Ping timeout: 240 seconds)]
simukis has quit [(Quit: simukis)]
Viaken2 has joined #nixos
<lewo>
hi, how could I prefill a /nix/store from a binary cache? I mean, I've generated a binary cache (narinfo+nar) which is backuped. Suppose I loose the /nix/store/ that has been used to generate this cache. I would like to recreate the /nix/store by "dumping" this binary cache.
orivej has quit [(Ping timeout: 248 seconds)]
<maxigit>
sphalerite: tilpner: thanks guys. I think I know enough to investigate.
<tilpner>
Good luck!
maxigit has quit [(Quit: ERC (IRC client for Emacs 25.2.50.2))]
<tilpner>
(Or frustration tolerance...)
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] disassembler opened pull request #29422: gensim: add moto as build dependency (master...gensim) https://git.io/v57Zb
NixOS_GitHub has left #nixos []
revtintin has quit [(Ping timeout: 240 seconds)]
<cmacrae>
LnL: Sorry, I had to step out for lunch!
<cmacrae>
Yes, I'm talking about ripgrep and gnupg
justan0theruser has quit [(Ping timeout: 240 seconds)]
tmaekawa has quit [(Ping timeout: 248 seconds)]
jtojnar has quit [(Read error: Connection reset by peer)]
<FRidh>
so, I tracked the issue I was having down to `callPackage. In the expression linked to by the following url, I have three sets. The first is obtained with callPackage, the second with import, and the third is defined locally. The sets are the same, containing the same attribute. If I then use these as propagatedBuildInputs, something goes wrong when using callPackage, but it does not with import or when its defined locally. Any ideas why?
<clever>
tilpner: this allows you to nix-env -iA foo.hello
<FRidh>
bennofs: error: while evaluating the attribute ‘propagatedBuildInputs’ of the derivation ‘foo’ at /etc/nixos/nixpkgs/pkgs/stdenv/generic/make-derivation.nix:98:11:
<tilpner>
Ah righ, I solved that differently in the past, but that approach doesn't work anymore. I didn't find yours in the logs though. Thank you, clever! :)
<FRidh>
cannot coerce a function to a string, at /etc/nixos/nixpkgs/pkgs/stdenv/generic/make-derivation.nix:98:11
jtojnar has quit [(Read error: Connection reset by peer)]
newhoggy has quit [(Remote host closed the connection)]
jtojnar has joined #nixos
<Alling>
OK, I'll give it a shot.
<bennofs>
FRidh: oh! that's because callPackage will add .override etc
<cmacrae>
LnL: Ah, okay. Which channel does that mean gnupg should be fixed in, then? Should I move over to this 17.09-darwin channel instead of unstable?
<bennofs>
FRidh: so your attrValues returns more attrs
eacamero_ has joined #nixos
<LnL>
cmacrae: it might be fixed there, unstable is blocked on nox aparently
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] disassembler opened pull request #29423: jscoverage: fix build with gcc6 (master...jscoverage) https://git.io/v57ll
NixOS_GitHub has left #nixos []
<Alling>
Just installed NixOS on my server. nixos-rebuild works fine until I try to add "sv" as consoleKeyMap. us, uk, de, fr, es, dk, no, fi, no problem, but sv just won't build. It prints some 20 lines including some curl error 6 and "cannot open file sv", then ends with an error.
eacameron has quit [(Ping timeout: 248 seconds)]
<Alling>
Any ideas? Should I open an issue maybe?
<FRidh>
bennofs: ahh, right
jtojnar has quit [(Read error: Connection reset by peer)]
<disasm>
Alling: can you share your config? I have an idea of what the problem might be.
jtojnar has joined #nixos
drakonis_ has joined #nixos
<FRidh>
goodbye 2 hours...
eacamero_ has quit [(Ping timeout: 252 seconds)]
<Mic92>
does somebody tried
<Mic92>
to install nixos from master?
<Mic92>
It seems not to setup root correctly
<Alling>
disasm: Absolutely, what would be the preferred way of doing so?
<Mic92>
the generated users-groups.json is empty
jtojnar has quit [(Read error: Connection reset by peer)]
<clever>
Mic92: was the machine properly shutdown?
<Mic92>
clever: I mean installing nixos via iso.
freusque has quit [(Ping timeout: 240 seconds)]
jtojnar has joined #nixos
<clever>
Mic92: after the install, did you umount /mnt and properly shutdown?
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] joachifm pushed 1 new commit to master: https://git.io/v5780
<NixOS_GitHub>
nixpkgs/master 3f7ac92 Joachim Fasting: tinycc: 0.9.27pre-20170821 -> 0.9.27pre-20170911...
NixOS_GitHub has left #nixos []
jtojnar has quit [(Read error: Connection reset by peer)]
<FRidh>
bennofs: removing override and overrideDerivation did it. Thank you.
MercurialAlchemi has quit [(Ping timeout: 246 seconds)]
<clever>
Mic92: what is the full storepath to the users-groups.json?
newhoggy has joined #nixos
<Mic92>
clever: becomes even weirder looks like `pkgs.writeText` is function correctly the json I print with lib.traceVal is correct.
<Mic92>
*is not
<clever>
what about the value passed to toJSON?
<Mic92>
I was already looking at the serialized value. so the value passed to toJSON is also correct.
<clever>
2017-09-15 11:09:00 < Mic92> clever: becomes even weirder looks like `pkgs.writeText` is function correctly the json I print with lib.traceVal is correct.
<clever>
2017-09-15 11:09:06 < Mic92> *is not
<clever>
you have 2 "is"'s in there
<clever>
which one was "is not" ?
<Mic92>
clever: sorry for confusion, I did: (lib.traceVal (builtins.toJSON { ... })) for users-groups.json
<FRidh>
oh, stdenv doesn't like me adding a pdf to propagatedBuildInputs
<Mic92>
clever: adding a user resolves the issue btw.
<Mic92>
never the less is a regression.
<Mic92>
*this is a
ison111 has joined #nixos
<clever>
Mic92: it sounds more like random filesystem corruption truncated a file on you
<Mic92>
clever: this is the second time, I have this issue. the first time I used nixos-install-inplace and the second time with this iso I dd to my usb stick.
<Mic92>
also /mnt is zfs
<clever>
ah
<clever>
checking something more...
<Mic92>
I build my own derivation of the official iso profile
FRidh has quit [(Quit: Konversation terminated!)]
<Mic92>
I try to reproduce this with the unmodified one
<clever>
nope, its not corruption on the binary cache
Troupal has joined #nixos
newhoggy has joined #nixos
phinxy has joined #nixos
<Mic92>
actually I don't need to change the iso, I just need nixpkgs master in my NIX_PROFILE.
<Mic92>
*NIX_PATH
<Alling>
clever: Internet wasn't working. I had assumed it did since I could ssh to it and because I thought DHCP would "just work". However, sv still doesn't work. https://pastebin.com/XT7NgKLx
Troupal has quit [(Remote host closed the connection)]
<Mic92>
clever: ok, I cannot reproduce this with master.
<Alling>
FRidh: No idea about tensorflow, I'm just trying to use NixOS on my server because declarativity. <3
newhoggy has quit [(Ping timeout: 240 seconds)]
<Alling>
clever: I can ping cache.nixos.org and I don't get any curl errors, but still "cannot open file sv".
<disasm>
this is so annoying... configure: error: expat library not found but pkg-config shows -I/nix/store/bwzapw0zcisl8gza9rdkgffzp94jnc45-expat-2.2.4-dev/include
Mateon3 has joined #nixos
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nix] edolstra pushed 1 new commit to 1.11-maintenance: https://git.io/v57Em
<NixOS_GitHub>
nix/1.11-maintenance aa57c32 Eelco Dolstra: Bump version
NixOS_GitHub has left #nixos []
Mateon3 is now known as Mateon1
<Mic92>
clever: update, it is reproducible, I just forgot to remove the user again
<clever>
Mic92: try running nix-store --delete on the problem json file
<clever>
then repeat the process
jtojnar has quit [(Read error: Connection reset by peer)]
jtojnar has joined #nixos
<Alling>
clever: disasm: Wow! Works now. For future reference, is there any way to list available keymaps or something?
<Mic92>
clever: cannot delete path /nix/store/...-users-groups.json since it is still alive - seems to be part of my iso then
<Mic92>
which would support the corruption theory
<clever>
Mic92: its possible that the file was corrupt on the machine making the iso
<clever>
Mic92: try nix-store --delete on that host, then remake the iso, then compare the storepath on the host (no need to boot the iso)
<clever>
Alling: nix-build --no-out-link '<nixpkgs>' -A kbd
<aminechikhaoui>
simpson: I just installed firefox and it shows nightly on top of the browser, but looking at the version it seems like it's the stable release
<aminechikhaoui>
so no idea
<simpson>
aminechikhaoui: Okay. NixOS, like many but not all distros, ships a binary copy of Firefox that, for legal reasons, cannot have the Firefox™ branding.
<Infinisil>
aminechikhaoui: That's because the cache can't distribute a version with the official firefox branding
<simpson>
And if the distro doesn't provide their own branding replacement, then the Nightly branding, which is legally fine, is the default.
<samueldr>
Dezgeg: is there any way or trick to update the unstable channel, but still mostly profit of your ARM binary cache?
<Infinisil>
You can however enable the official branding by compiling firefox yourself with `enableOfficialBranding = true`
<simpson>
I used to love the Iceweasel branding, but ISTR that it's not okay to use anymore for some reason.
<samueldr>
but I don't think it is always up to date
<samueldr>
I'm not sure though
<samueldr>
last time I tried a nix-channel --update / nixos-rebuild switch --upgrade I had to rebuild the world
<Dezgeg>
yeah, the v6 is quite problematic since it builds for like 3 days straight
<samueldr>
would it help to use your nixpkgs git repo tags?
<samueldr>
just like I would use a channel
<Dezgeg>
so it does lag behind once mass rebuild changes hit master
<Dezgeg>
maybe it could put the last built commit in a text file or something
jtojnar has quit [(Read error: Connection reset by peer)]
jtojnar has joined #nixos
ison111 has quit [(Ping timeout: 248 seconds)]
eacameron has quit [(Remote host closed the connection)]
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] fpletz pushed 2 new commits to master: https://git.io/v57ow
<NixOS_GitHub>
nixpkgs/master 8550e4e Maximilian Güntner: emscriptenfastcomp: move wrap magic to own file, use newScope
<NixOS_GitHub>
nixpkgs/master 3a4add5 Franz Pletz: Merge pull request #29322 from mguentner/move_emscripten_from_top_level...
NixOS_GitHub has left #nixos []
<samueldr>
that would definitely work, though, would I implement that, I would do something like build-${platform}-${date} and symlink it to something like build-${date}-latest
orivej has joined #nixos
<samueldr>
keeping a trace of built commits
<clever>
disasm: can you try again with nix-shell --pure?
<catern>
clever: how do you actually run an application on notos? you just modify the config to compile the application in?
<clever>
catern: yeah
elasticdog has quit [(Ping timeout: 240 seconds)]
justbeingglad has joined #nixos
elasticdog has joined #nixos
<disasm>
clever: same exact error (which makes sense, get that error on nix-build as well)
__Sander__ has quit [(Quit: Konversation terminated!)]
<clever>
yeah, with zfs encryption, simple stuff like used data is leaked, no way around that
<clever>
because zfs has to know how much is free to hold cleartext datasets
marusich has joined #nixos
<Mic92>
but the crypto is better
<clever>
with luks, the attacker doesnt even know how much data is on the volume
<clever>
they could be wasting time trying to crack an empty drive
koserge has joined #nixos
<Mic92>
Also think of raids, to be able to recover from checksum failures, you need one luks per disk. Zfs can handle this much better.
<Mic92>
Next thing is backups, you can now use `zfs send` without decrypting
<clever>
oh, you just gave me an idea
<clever>
what happens if you raid mirror with luks?
<clever>
say, if a noob puts the mirror onto 2 luks volumes, with different master keys
rauno has quit [(Ping timeout: 255 seconds)]
<disasm>
fpletz: I know right now we're just trying to get everything fixed that's broke, but would I be correct in assuming eventually all the packages in top level python will use callPackage?
<clever>
Mic92: does luks just xor over a prng bitstream?
<clever>
Mic92: zfs send while preserving crypto does sound good
<clever>
Mic92: so the backup server could GC older snapshots, while preserving the entire dataset, and never have the key to unlock it?
<Mic92>
clever: this is what I understood from the pull request
<clever>
nice
<clever>
if luks is just xor, then a mirror over 2 luks volumes, would give an attacker the result of xor'ing the 2 prng bitstreams, not sure what that can lead to...
<Infinisil>
Currently I have a hacky solution with tmux
<sphalerite>
oh, that sucks
<sphalerite>
That reminds me of one thing I'd really like to have in bash — a command that I can put in a script to have it drop into interactive mode at that point
<sphalerite>
Infinisil: do you know about expect?
<Infinisil>
I do
<Infinisil>
Have written a script with it once, it's a pain
<sphalerite>
dtach might also be helpful for a less complex alternative to tmux
Viaken2 has joined #nixos
nh2 has quit [(Ping timeout: 248 seconds)]
* Infinisil
looks up detach
<Infinisil>
ah, it's actually dtach
jtojnar has quit [(Read error: Connection reset by peer)]
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] peti created revert-29424-slight-haskell-cleanup (+1 new commit): https://git.io/v571K
<NixOS_GitHub>
[nixpkgs] peti pushed 1 new commit to master: https://git.io/v571d
<NixOS_GitHub>
nixpkgs/master 442e5b6 Peter Simons: Merge pull request #29430 from NixOS/revert-29424-slight-haskell-cleanup...
NixOS_GitHub has left #nixos []
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] joachifm pushed 1 new commit to master: https://git.io/v57Me
<NixOS_GitHub>
nixpkgs/master 42f2439 Joachim Fasting: pharo-launcher: fix build...
NixOS_GitHub has left #nixos []
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] peti deleted revert-29424-slight-haskell-cleanup at 3510197: https://git.io/v57Mf
NixOS_GitHub has left #nixos []
<disasm>
Infinisil: use a subshell, that's what I do for my openconnect systemd service: ${pkgs.bash}/bin/bash -c "program <<< $'hello\nworld\ndo stuff\n'"
Viaken2 has quit [(Quit: WeeChat 1.9)]
<Infinisil>
disasm: It's a bit more complicated than that, it's actually a server that uses stdin as command input and stdout as its logs
<Infinisil>
it's pretty horrible tbh
<Infinisil>
Having had a closer look at dtach it's exactly what I need
m0rphism has quit [(Quit: WeeChat 1.9)]
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] joachifm pushed 1 new commit to release-17.09: https://git.io/v57MX
<NixOS_GitHub>
nixpkgs/release-17.09 838f861 Joachim Fasting: pharo-launcher: fix build...
<catern>
I already know how to use job control in bash, and tmux session management
<joepie91>
it'll build it, put it in the store, and symlink from $pwd/result
<catern>
why can't I just use those for supervision!??
<qz>
joepie91: oh, gonna look into that
<sphalerite>
hyper_ch: what does the terminal-overrides thing do?
<ee1943>
anyone?
<hyper_ch>
good question... don't even recoll how it was before I added that ;)
<sphalerite>
ee1943: I don't really know the difference between --run and --command, but does --run work?
<qz>
joepie91: trying to build elm-compiler package and package set is elmPackages but how do i know attribute name? elm-build -A elmPackages elm-compiler does not work
<joepie91>
qz: that'd probably be elmPackages.elm-compiler then
<simpson>
sphalerite: I Seem To Remember.
<joepie91>
attribute paths are dotpaths
<joepie91>
qz: so assuming you're currently in your nixpkgs clone, you'd do something like... `nix-build -A elmPackages.elm-compiler .`
<joepie91>
if I recall the syntax correctly
adangelo has joined #nixos
<joepie91>
(note the dot)
<adangelo>
hey joepie91, I'm reading your guide on installing nix on debian
<qz>
joepie91: cool, it worked with dot. -A elmPackages.elm-compiler
<adangelo>
nix-channel --update is complaining about ssl certs
<adangelo>
any idea?
<pxc>
adangelo: I was getting some SSL errors with curl fetching nix packages after an update and garbage collection the other day
<pxc>
adangelo: check the env var $NIX_SSL_CERT_FILE
<pxc>
make sure it exists
<pxc>
if it doesn't, try reloading your shell env
<joepie91>
qz: I *think* that if you do not explicitly specify a dot as the package set path (at the end of the command I showed), it falls back to whatever your current nixpkgs channel is
<joepie91>
as opposed to the specific repo clone you're in
<joepie91>
but don't quote me on that :)
<joepie91>
adangelo: what's the exact error?
<sphalerite>
simpson: ah right :)
Ivanych has quit [(Ping timeout: 260 seconds)]
<ee1943>
sphalerite: I'll give it a shot. I had seen that in the man page but didn't think to check it out (d'oh)
jtojnar has quit [(Read error: Connection reset by peer)]
<taktoa>
wait, is the SHA256 output by nix-prefetch-git no longer applicable to fetchFromGitHub?
mudri has joined #nixos
jtojnar has joined #nixos
<Infinisil>
it should be
<Infinisil>
or did you forget --unpack
<taktoa>
nix-prefetch-git, not nix-prefetch-url
<Infinisil>
ohh
<taktoa>
it used to be that it was the same hash
<taktoa>
but maybe something changed?
<pxc>
adangelo: I'm sorry, the package 'nss-cacert' or the 'cacert' attribute. `nix-env -f '<nixpkgs>' -iA cacert` to install it
<Infinisil>
Man, the only thing dtach would need is scroll functionality now.. :(
<Infinisil>
But otherwise it's perfect
<ee1943>
sphalerite: not sure if it's working, although I'm pretty sure I didn't configure my nixpkgs properly and that's the source of the problem
<pxc>
Infinisil: what does it do better than tmux, again?
<Infinisil>
I need the process to run as a systemd unit, and using tmux for that is super hacky
<Infinisil>
with multiple panes and where is the pid of the process, and how to determine that the process exited
<adangelo>
ok, I've resolved the issue by building from source
<Infinisil>
dtach is super lightweight and has exactly what I need: Starts a single command on a socket, and can even run in the foreground so that systemd knows when it's terminated
<pxc>
Infinisil: ooh, cool. How does dtach do that better? Are you thinking about writing up a little post about this somewhere? that sounds like a good thing to have in my toolbox
<greglearns>
In Nix pkgs, Rust (rustc) is currently at version 1.17, but the most recent version of Rustc is 1.20. if someone where to teach me how to upgrade the version of Rust for normal and nightly, I would keep them up-to-date for the community so that everyone could use the most recent versions of rust.
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] LnL7 pushed 1 new commit to release-17.09: https://git.io/v57df
<greglearns>
@maurer I don't know anyone who has successfully used the mozilla rust overlay with nix-build (it seems to only work with nix-shell). As an alternative to using the overlay, I propose just keeping an up to date version of Rustc in Nix pkgs.
<pxc>
adangelo: I'm glad you figured something out but I feel like that shouldn't have been necessary. :-(
jbl007 has joined #nixos
<tilpner>
greglearns - nixpkgs currently doesn't have nightly, so it's not a full alternative
<tilpner>
(But I agree we should update stable)
slyfox has joined #nixos
<greglearns>
I should also clarify that I've read the "contributing packages to nix" documentation, but, I'm a little unclear about how to really do that for rust.
<tilpner>
Anything specifically?
<maurer>
greglearns: So, a few things here:
jellowj has joined #nixos
<maurer>
1.) Current nix rust packaging infra does not allow you to package libraries, only binaries. That may change in the future.
<maurer>
2.) The buildRustPackage function relies on a now-disabled function in cargo, which is probably why we haven't updated
<maurer>
3.) buildRustPackage is in the middle of being rewritten, you can see several PRs on github
<tilpner>
maurer - Those points are all good, but not directly relevant to updating rustc
<maurer>
They rae
<maurer>
*are
<maurer>
if you update rustc, there's a good chance you need an updated cargo
adangelo has left #nixos []
_ris has joined #nixos
<maurer>
if you need an updated cargo, there's a good chance buildRustPackage will break
<maurer>
go ahead and try, but that's my guess as to why we're not updating
<maurer>
In any case, bumping it is as easy as editing
<tilpner>
Hmm, I can't think of a specific reason for why a newer rustc wouldn't work with an old cargo, given the general stance on backwards-compatibility
<maurer>
tilpner: rustc uses cargo as the build system
<maurer>
So if new rustc uses a new cargo feature
<tilpner>
That's news to me. cargo uses rustc, but I was under the impression rustc can also work standalone
<maurer>
you have to use new cargo in the bootstrap
<maurer>
It can _run_ standalone
<tilpner>
Oh, right, they updated the build system
<maurer>
the _build_ uses cargo
<tilpner>
Last time I compiled rustc myself was years ago :c
<maurer>
I mean, that says something good for it tbh
<maurer>
back when I was big int ohaskell the number of times I had to manually compile ghc was way too high
<maurer>
but in any case greglearns, if you really want to try, update versions and hashes for all of pkgs/development/compilers/rust/{default,beta,nightly}.nix
<maurer>
greglearns: Then run nox-review to see if it broke anything
<maurer>
If it didn't, great, send a PR
<maurer>
pxc: Yeah, I think more or less what's going on is that rust devs (myself included) are using the mozilla overlay, and once the buildRustPackage rework is done, people may be more vigilant about bumping rustc
<taktoa>
can you use the nixos-17.03 channel when using nix on debian
<taktoa>
or is nixpkgs-unstable mandatory
<pxc>
try it
<LnL>
sure you can
<pxc>
I don't think there are any issues
Guest83091 has joined #nixos
<LnL>
the main difference between the nixpkgs-* and nixos-* channels is that nixos variants won't update if the nixos tests fail
<LnL>
so you should never use nixpkgs for your system on nixos
<maurer>
LnL: Yeah, the cargo custom registries died, which could well be why that's broken
jellowj has joined #nixos
<maurer>
Every time you nix-build a rust package as is, cargo warns you the feature's going away >_>
<pxc>
LnL: aaah! thanks. that's a good tidbit to know. I wasn't aware of that difference
cybrian has quit [(Ping timeout: 240 seconds)]
ison111 has joined #nixos
<greglearns>
for testing locally (in addition to using nox-review), I'm not really clear on how to either 1) git checkout all pkgs and then build locally against the checked out (and modified) version, or 2) is it possible to just copy pkgs/development/compilers/rust/{default,beta,nightly}.nix into a local directory that has my default.nix and then reference those files directly in my default.nix? (I've done this for other things, but Rust seem
cybrian has joined #nixos
<catern>
cut off at "Rust seem"
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] MP2E pushed 2 new commits to master: https://git.io/v57N9
<pxc>
greglearns: what I do on my system since I'm the only one administering it is a bit hacky but I like it and it works. I just set NIX_PATH to point to a symlink to the directory I develop nixpkgs in
hotfuzz has joined #nixos
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] bjornfor pushed 1 new commit to release-17.09: https://git.io/v57A4
<NixOS_GitHub>
nixpkgs/release-17.09 8f37a14 Bjørn Forsman: nixos/wpa_supplicant: use literalExample...
<Infinisil>
What I do is have two git working dirs, one with the one I develop (on master/some branch whatever), and another one for the system always on nixos-unstable, so that I don't accidentally rebuild from master
<pxc>
Infinisil: separate checkouts or git worktree?
<Infinisil>
git worktree
<Infinisil>
Because sometimes I do need some changes in my system
<pxc>
greglearns: the repo that I linked to for that example serves both as /etc/nixos on my NixOS machines and ~/.config/nixpkgs
<Infinisil>
and then I can just cherry pick from the one i developed with
<Infinisil>
(by the one I mean the branch)
<pxc>
Infinisil: yeah, I am currently using separate checkouts because I want to include the package sets as submodules in my dotfiles, and git worktree doesn't work right with submodules, idr the details
<pxc>
but I do the same thing basically
<pxc>
ofc consequently my dotfiles are stupid huge
<pxc>
nixpkgs, the rust overlay, and the nix-darwin channel for LnL's nix-darwin
<pxc>
multiple checkouts of nixpkgs, unfortunately. I don't do separate branches for Darwin and Linux on my dotfiles or anything like that
<LnL>
whoa
<tilpner>
If you use fetchFromGitHub it doesn't download the full history and stays small. Doesn't help development of them, but that's only relevant if you contribute to all of them
<LnL>
are there binaries in there or just config files
<Infinisil>
LnL: I doubt anybody could have 1.6GB config files..
<tilpner>
Infinisil - You don't include the 4k video wallpaper in your dotfiles?
<Infinisil>
tilpner: Hmm, I do not actually, but good point
<Infinisil>
I should do that
<pxc>
Infinisil, LnL: 1.2GB of it is in the .git/submodules dir
<Infinisil>
what kind of submodules are we talking?
<tilpner>
pxc - You can set the weechat log path to something outside of your dotfiles
<pxc>
tilpner: I just added the logs to my gitignore, so they're in there but don't get commited
<tilpner>
Oh, okay
<pxc>
but the submodules that are taking up all the space are two copies of nixpkgs
<Infinisil>
pxc: Soo, I assume you don't have your 'dotfiles' on github?
<tilpner>
So... do you need writable checkouts of your submodules?
<pxc>
Infinisil: I do. The submodules just take a bit to init the first time I set them up but in practice it's nbd
<pxc>
tilpner: the submodules are effectively the nixpkgs checkouts I'm using on my machines and they're where I make my modifications when I'm working to contribute to nixpkgs
<sphalerite>
ee1943: how are you making your FHS user env?
<pxc>
the submodules take up space because they're a whole clone, not just a workdir
<pxc>
the working directories for nixpkgs, the checkouts I actually use, are less than 200M
<tilpner>
pxc - Do you make modifications to both of them? I just have one full checkout ~/dev/nixpkgs, but it's not used in my config
<pxc>
tilpner: I make modifications to both because I want to track which commit of nixpkgs I'm on on Darwin and which I'm on on Linux
<tilpner>
git checkout doesn't count as modification
<pxc>
it may go away with the new Darwin stable channel, if I can find enough commits where everything I care about works both on NixOS stable and Darwin on the stable channel
<pxc>
tilpner: I mean I modify packages in the tree, it's not the same as upstream nixpkgs
<pxc>
sometimes it is
<tilpner>
Ah, that's reasonable then
<pxc>
but not usually
pie__ has joined #nixos
<greglearns>
@pxc I'm trying the git-checkout with NIX_PATH option... will try things out. thanks
<Infinisil>
Damnit I give up on this stupid pakcage for now, the thing with dtach/tmux, I got stuck and have no idea what's the problem
<sphalerite>
ee1943: oh yeah, I see the issue now, because it's a shell function that's being called it won't have the right "$@"
<sphalerite>
ee1943: I'll continue looking into it though
acarrico has joined #nixos
<ee1943>
good tip on ix.io btw, that's a super useful website
<jbl007>
where is /var/log/Xorg.0.log ?
pie_ has quit [(Ping timeout: 248 seconds)]
<jbl007>
/run/current... ?
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] peti closed pull request #29328: haskellPackages.tldr: fix build, add as a top-level package (master...tldr-hs) https://git.io/v5SMK
NixOS_GitHub has left #nixos []
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] peti pushed 1 new commit to master: https://git.io/v57hv
<NixOS_GitHub>
nixpkgs/master 76519f9 Peter Simons: ghc-7.2.2: record the commit that broke it...
NixOS_GitHub has left #nixos []
<sphalerite>
jbl007: depends on your display manager. For sensible ones (only lightdm doesn't fit that category out of the ones available on nixos AFAIK) it ends up in the journal
<sphalerite>
so `journalctl -u display-manager` should show you the logs
pie__ has quit [(Ping timeout: 240 seconds)]
<sphalerite>
ee1943: right so I don't think there's a completely reasonable way to do it, simply because of how nix-shell and buildFHSUserEnv work
<jbl007>
sphalerite: ah, written to the journal, thx!
<mguex>
NixOS/nixpkgs has currently 1337 contributor
<sphalerite>
lol nice
<ee1943>
sphalerite: ah that's too bad. wanted to write a quick script to automate some build stuff and I was hoping to be able to pass commands to the chroot
<ee1943>
thank you though
<sphalerite>
ee1943: one thing you could do is make a nix function that accepts a command and returns an FHS user env that has that command in its profile
slyfox has quit [(Ping timeout: 255 seconds)]
joko has quit [(Remote host closed the connection)]
<sphalerite>
and call it like nix-shell -E 'magicFunction "echo foo"'
taktoa has quit [(Remote host closed the connection)]
Wizek_ has quit [(Ping timeout: 246 seconds)]
ertes has quit [(Ping timeout: 240 seconds)]
cpennington has quit [(Remote host closed the connection)]
<Infinisil>
A systemd service had a typo, Griup instead of Group
<Infinisil>
And the serviceConfig part of a systemd service is not checked by the nixos module system
<bennofs>
journalctl -xe :)
michas has quit [(Ping timeout: 240 seconds)]
Sonarpulse has quit [(Quit: Leaving)]
Sonarpulse has joined #nixos
sary has joined #nixos
<Infinisil>
I finally looked up -x and -e, man they sure are useful, why didn't I do this earlier
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] woffs opened pull request #29437: poezio-git: init at 0.11-44-gc88459c (master...poezio-git) https://git.io/v55n3
NixOS_GitHub has left #nixos []
isidore has quit [(Quit: WeeChat 1.9)]
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] oxij opened pull request #29438: palemoon: just use the default gcc (master...pkg/palemoon-fix) https://git.io/v55nM
NixOS_GitHub has left #nixos []
justbeingglad has joined #nixos
justbeingglad has left #nixos []
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] oxij opened pull request #29439: gmime3: init; notmuch: use gmime3 (master...pkgs/notmuch-gmime-3) https://git.io/v55cI
NixOS_GitHub has left #nixos []
ryanartecona has quit [(Quit: ryanartecona)]
NixOS_GitHub has joined #nixos
<NixOS_GitHub>
[nixpkgs] oxij opened pull request #29440: linuxPackages: various changes (master...pkg/linuxPackages) https://git.io/v55cr
NixOS_GitHub has left #nixos []
jtojnar has quit [(Read error: Connection reset by peer)]
<tilpner>
Is the only way to make overlays globally effective while allowing for <name/path> to use <nixpkgs-overlays>?
<tilpner>
I was using nixpkgs=.../nixpkgs.nix before, which evaluated to a nixpkgs set with overlays applied already, but I can't do that if I want tools that rely on <nixpkgs/nixos> existing to work
<tilpner>
Now that I'm back to nixpkgs=.../nixpkgs where nixpkgs is a store link, <nixos/path> is working, but not all overlays are active
<tilpner>
*<nixpkgs/nixos>
hiratara has quit [(Ping timeout: 252 seconds)]
bennofs has quit [(Quit: WeeChat 1.9)]
hiratara has joined #nixos
<tilpner>
Oh, I can't even make it work with <nixpkgs-overlays>...
taktoa has quit [(Remote host closed the connection)]
<Infinisil>
tilpner: So your problem is that you want overlays for <nixpkgs> but also be able to use the <syntax> for something else?
<tilpner>
Infinisil - Tools like nixos-rebuild rely on <nixpkgs> pointing to a directory. And if it's a directory, I don't know how to apply all overlays well
<tilpner>
Before, <nixpkgs> was a file, which made it easy to apply the overlays with a Nix expression
* tilpner
tries something else
<Infinisil>
tilpner: And you have nixpkgs-overlays on your NIX_PATH?
skidmata_ has joined #nixos
<tilpner>
Yes, but that's less flexible than providing overlays via a Nix expression... or can <nixpkgs-overlays> be a file too? :o
<Infinisil>
The source says yes
<skidmata_>
Nix newbie here: My first derivation. The build script (custom) is complaining that it cant find the hostname command and libtool