gchristensen changed the topic of #nixos to: NixCon live stream: https://www.youtube.com/c/NixCon/live https://nixcon2018.org/ || NixOS 18.09 released https://discourse.nixos.org/t/1076 || https://nixos.org || Latest NixOS: https://nixos.org/nixos/download.html || Latest Nix: https://nixos.org/nix/download.html || Logs: https://logs.nix.samueldr.com/nixos/ || #nixos-dev, #nix-darwin, #nixos-aarch64, #nixos-chat, #nixcon
<mdash> ivan: did you use "nix-build" or "nix build"? :)
<mdash> the latter has progress indicators
<aleph-> That's... odd
<jasongrossman> aleph: It is odd. It's in flux. The plan is to replay nix- things with arguments to the nix command. Could do with more documentation though.
<ivan> nixos-rebuild switch --upgrade
<aleph-> Yeahhh, lack of documentation is one of my big gripes
<aleph-> Among others
jperras has quit [Ping timeout: 252 seconds]
<mdash> ivan: ah. yeah no progress indicators there
orivej has quit [Ping timeout: 252 seconds]
jperras has joined #nixos
orivej has joined #nixos
jtojnar has quit [Ping timeout: 244 seconds]
<ivan> would it not make sense to back out https://github.com/NixOS/nixpkgs/pull/48784 from master, or is that against some policy
<{^_^}> #48784 (by zimbatm, 4 days ago, merged): openssh: 7.7p1 -> 7.9p1
jperras has quit [Ping timeout: 252 seconds]
jperras has joined #nixos
<ivan> https://github.com/NixOS/nixpkgs/pull/45919 there's the progress bars
<{^_^}> #45919 (by michaelpj, 7 weeks ago, open): nixos-rebuild: use `nix build` and `nix copy`
nD5Xjz has quit [Ping timeout: 250 seconds]
jperras has quit [Ping timeout: 246 seconds]
<{^_^}> [nixpkgs] @eadwu opened pull request #49128 → nvidia-x11: 410.66 -> 410.73 → https://git.io/fxyHz
jperras has joined #nixos
yastero has quit [Ping timeout: 250 seconds]
nD5Xjz has joined #nixos
thc202 has quit [Ping timeout: 244 seconds]
haslersn has joined #nixos
<haslersn> Hi :) How can I mount a folder from the host system into a nixops container?
drakonis has joined #nixos
drakonis1 has joined #nixos
Synthetica has quit [Quit: Connection closed for inactivity]
drakonis_ has quit [Ping timeout: 252 seconds]
drakonis has quit [Ping timeout: 264 seconds]
Rusty1 has joined #nixos
Taneb has quit [Quit: I seem to have stopped.]
<Ericson2314> `gcc "--print-file-name"` doesn't respect `-L`. I think this might be an upstream issue?
<Ericson2314> bgamari (IRC): ^ that can cause ghci problems with more "ad-hoc" usage
<elvishjerricco> travankor: I would not think that the host using musl would have any effect whatsoever. I'm guessing it's something else...
drakonis has joined #nixos
orivej has quit [Ping timeout: 246 seconds]
amitoj has quit [Ping timeout: 256 seconds]
jluttine has quit [Ping timeout: 268 seconds]
jluttine has joined #nixos
lassulus_ has joined #nixos
lassulus has quit [Ping timeout: 246 seconds]
lassulus_ is now known as lassulus
silver has quit [Read error: Connection reset by peer]
jasongrossman has quit [Ping timeout: 240 seconds]
<Arahael> travankor: I'm just a bystander here, but I'd like to point out that vscode likes to have LOTS of memory - 700 or 900 MB to run an empty editor window.
Dedalo has joined #nixos
<elvishjerricco> Arahael: That wouldn't cause `error: unexpected-end-of-file`, would it? Plus, in my experience it's far lower than that. Atom was definitely that bad though.
<Arahael> elvishjerricco: Who knows... It's an electron app.
sir_guy_carleton has quit [Quit: WeeChat 2.2]
<elvishjerricco> I mean being an electron app doesn't come with an inherent 500M penalty. I think an empty Electron app uses like 10M? That's bad, but not *so* bad.
<Arahael> elvishjerricco: About a year ago I setup an Ubuntu VM with some 700MB of memory (total). vscode would launch, but couldn't display anything beyond a black window until I bumped up the RAM a bit more.
<Arahael> (Could've been 800-something MB actually, but regardless)
<elvishjerricco> I wonder how much RAM ubuntu consumes idly. Actually it'd be kinda interesting to compare all the major distro's idle memory usage.
<elvishjerricco> ignoring FS caching, if possible
<Arahael> Right, but those could be paged out.
<Arahael> Ubuntu sets up swap by default, and I had an SSD and all that.
<elvishjerricco> Yea, hence the desire to ignore memory used by FS caching
<Arahael> Host system had 16 GB of memory, btw, I'm not sure if the drives are cached by the host.
oldandwise has joined #nixos
<{^_^}> [nixpkgs] @Ericson2314 opened pull request #49129 → Linux headers: Cleanup → https://git.io/fxyFn
<elvishjerricco> I stand corrected. An empty VSCode window used 500M on my machine. Used to be like 100M :/
<Arahael> elvishjerricco: Now, add langauge servers to that. :)
Supersonic has quit [Disconnected by services]
Supersonic112 has joined #nixos
Supersonic112 is now known as Supersonic
EarlDeLaWarr has quit [Ping timeout: 264 seconds]
<Travankor> I went with vscode just as a test since electron is known not to work on musl natively.
Peetz0r has quit [Ping timeout: 250 seconds]
<maurer> https://twitter.com/hackerfantastic/status/1055517801224396800 Maybe a reason to accelerate a transition to rootless X?
Travankor has quit [Ping timeout: 252 seconds]
<elvishjerricco> travankor: I the glibc in nixpkgs looks for locales in a LOCALE_ARCHIVE environment variable. Maybe the equivalent in musl is differently formatted?
<elvishjerricco> I think*
<elvishjerricco> maurer: Lol they fixed it by just disabling those args when running as root. That's pretty bad...
<elvishjerricco> maurer: Do we use root to start X in NixOS? I thought we let the display-manager do that as your user.
<maurer> I am under the impression that we still have root X for easier Gnome support, but I am not 100% on that
<Arahael> It feels like we've only now started, as an industry, to care about security.
<mdash> Arahael: or at least, to notice security
<simpson> Arahael, mdash: Or at least, to feel the impact of not caring about security
<Arahael> Yeah. I think it's fantastic to start seeing these exploits, actually.
<Arahael> simpson: I think we've always had that impact, but people didn't really care? (Just install an antivirus product already, you silly goose!)
<mdash> when people get motivated to not uses unix and friends i'll believe they're serious about security
<simpson> Arahael: Where were the big data breaches of the 90s? It took a long time for the stakes to be high enough and for the technology to become non-optional.
<elvishjerricco> mdash: Is unix inherently insecure in your view?
<Arahael> simpson: The 90's saw a move towards ACL's and multi-user systems, that was a *massive* step up from single-user systems.
<Arahael> elvishjerricco: Architectually the unix root account is a huge grap.
<Arahael> *gap
<Arahael> (And most people fail to realise just how privilaged root is)
<drakonis> who grants those privileges anyways?
<Arahael> drakonis: The kernel - if it's UID 0, then security checks are bypassed.
<drakonis> the applications are the ones that grant the privileges?
<drakonis> ah well
<drakonis> that's awful?
<drakonis> i thought we had gotten well past the point that root is necessary
<ottidmes> Arahael: but cannot the same be said about using the Administrator account on Windows, you ought to use a normal account, but most people just use the Administrator account
<ottidmes> Arahael: (about the not realizing the danger part)
<Arahael> ottidmes: Nope, Administrator on windows is still subject to ACL. Higher than Adminstrator, is SYSTEM, but even that still has ACL's if I recall correctly.
<mdash> elvishjerricco: yes, it can't really be salvagef
<mdash> salvaged
<mdash> elvishjerricco: permission/acl based systems aren't expressive enough
<elvishjerricco> I kinda like BSD's new `unveil` syscall. Kinda like a simplified filesystem container system. I kinda think permissions should be at a process level, not a user level. Then for escalation, a parent should be capable of permitting a child to escalate if it can authenticate itself.
<Arahael> elvishjerricco: Well, there's selinux.
<mdash> heh, selinux
<Arahael> But auditing these are hard.
<simpson> Arahael: I see your point. Have you read the classic 'Capability Myths Demolished'? http://srl.cs.jhu.edu/pubs/SRL2003-02.pdf
<Arahael> I mean, look at Android and the mess they have.
<Arahael> simpson: No, but capabilities have problems too. And even if it was perfect, you still ahve the social burden of actually ensuring you have correct capabilities.
<mdash> Arahael: nothing's perfect, but the capability model can actually do the job when used well, unlike acl/static-configuration systems
<Arahael> mdash: Meh, in the enterprise ACL is hardly static.
<Arahael> I actually *like* the iOS model, to a degree.
<Arahael> (As a practical, pragmatic system)
<simpson> Arahael: I'm not sure I understand; doesn't that entire argument still hold if "capabilities" are replaced with "roles" or "rows" or "permissions"?
<Arahael> simpson: It becomes a question of who designs, selects, and enforces those capabilities.
<Arahael> simpson: Today, when you install an application, is it the developer who picks them, the administrator, or the user?
<simpson> Arahael: Well, I'm stuck on Linux, so it's the kernel who assigns permissions and manages them, right?
<Arahael> simpson: No. THe kernel enforces them, but doesn't assign or manage them.
<simpson> I mean, *today*, we're all on NixOS, right?
<mdash> ios model has a lot of benefits to it
<mdash> it's not obvious that it can scale to multiuser/multivendor environments though
<ekleog> NixOS has like zero support for SELinux anyway
<ekleog> would be nice, but…
<simpson> Arahael: I guess I just don't understand the direction of your criticism. In the concrete, capabilities are usually pretty hard to tamper with. They're cryptographic tokens, or unforgeable object references.
<simpson> And the entire goal is to be *structural*. Like how Nix is kind of a package-capability system. (Kind of.)
<Arahael> simpson: That's not the problem.
<Arahael> simpson: The problem is WHO selects them.
<mdash> Arahael: what do you mean?
<Arahael> simpson: Say, you have an application developer, he's just left uni, and wants to make RealCoolCSVViewer. He's never made an application before, and is still figuring out stuff.
<simpson> Arahael: Okay. So, let's say that we're using Nix. Who selects the packages? The user calling Nix, right?
<Arahael> simpson: Now, you, the nixos user, sees RealCoolCSVViewer. What you then do is nix-env -i realcoolcsvviewer, right?
<simpson> Sure.
<Arahael> simpson: How do you know it doesn't read .ssh/id_rsa, and emails it off?
<simpson> Arahael: I don't, because Linux isn't that kind of kernel.
<Arahael> selinux can do that, but still, this gets back to the root problem.
<Arahael> The user is rarely the right person to assign capabilities.
<simpson> Yes. Capability-safety, like memory-safety before it, requires rewriting a lot of stuff.
oldandwise has quit [Quit: leaving]
<Arahael> simpson: No it doesn't.
<simpson> Well, the user is the *only* person who has some key capabilities regarding physical access.
<mdash> Arahael: it does, sorry
<Arahael> mdash: I disagree.
<Arahael> mdash: In concept, anyway.
<simpson> Arahael: How do you approach the problem of *taming*?
<simpson> Of interfacing capability-aware systems with I/O and effects?
<Arahael> simpson: that's a separate issue.
<Arahael> First, you have the problem of *identifying* features that it needs.
<Arahael> A separate problem is determining that a feature can't be supported.
<Arahael> Take a look at Android, for instance, particularly older releases.
<simpson> So, powerboxes?
<Arahael> Developers would request Contacts access. And the user was powerless to avoid it. That's essentially the situation we have today.
<Arahael> Allowing the application to handle the refusal of a capability/feature, does require rewriting that feature.
<Arahael> But merely enforcing an agreed contract, doesn't require rewriting or changing anything.
<simpson> Maybe. Linux sure has a hard time enforcing its contracts on userspace.
<mdash> unix style filesystem APIs just don't make sense in the context of a capability system
<Arahael> Another example from legal is the GDPR, this isn't software, it's legal, but it's still a good example.
<mdash> haha
<Arahael> You use a service, that service is required to clearly acknowledge what it does.
<Arahael> If it uses something outside of that contract, all hell breaks loose.
<simpson> Why not: You use a service, you provide the service with specific abilities to do things, and the service *cannot* do anything outside of those abilities.
<Arahael> simpson: Right.
<mdash> "make insecure operations unrepresentable"
<Arahael> simpson: A very simplistic way of doing this is to just package everything into their own secure VMWare instance, at least, in concept.
<ekleog> Arahael: did you try firejail?
<Arahael> ekleog: I haven't, no, but I assume it's similar, just far more efficient.
<mdash> Arahael: yeah, but this is making an octopus by bolting extra legs on a dog
<ekleog> (or, if you don't like suid executables, I've written an equivalent based on seccomp & ptrace)
<Arahael> So, yeah, this is why I disagree that it requires rewriting a lot of stuff.
<mdash> Arahael: no doubt we'll always need compatibility layers for old stuff
<Arahael> "taming" an application usually involves *removing* functionality it has assumed it already has.
<simpson> Well, yes.
<Arahael> mdash: Right, because you have decided to remove something it has assumed it has.
<Arahael> It's an important distinction.
<mdash> eh
<simpson> BTW "taming" is established jargon: http://www.erights.org/elib/legacy/taming.html
<Arahael> (I should point out that I'm not an expert here, but lets let that slide ;) )
<mdash> i don't quite understand what it means for programs to "assume" something
<mdash> the problem is that the APIs are bad
<simpson> Arahael: Note specifically that what is tamed is not a program, but the *interface* that the program has with the capability-aware system.
<mdash> and things like selinux, apparmor, unveil, pledge, etc are bolt-ons to ameliorate that some
<Arahael> simpson: Fair enough.
<Arahael> simpson: And thanks for that page, I hadn't seen it.
<simpson> e.g. Nix tames the FHS and LSB, not the packaged programs.
<Arahael> simpson: Right - that interface here, is effectively glibc.
<mdash> we should start having things that are Actually Good in addition to compat layers
<simpson> Arahael: That's a way of thinking about it, but as we come to have more non-GNU toolchains, I think it's worth narrowing down what's different. Nix doesn't say "no standard tools", it says "no ambient tools in /usr".
<simpson> I got the impression that, on fully-pure platforms like NixOS, stdenvs have glibc as just another plain derivation.
<Arahael> simpson: Right, that interface here, is effectively *libc. :) For languages that don't use a libc, well, I should say *lib*. I suppose the interface could very well be the kernel itself, but I dunno, that seems too high?
<simpson> Nix definitely doesn't try to tame the kernel; you can use e.g. Go to write raw syscalls with a nice interface and you won't get attenuated or limited at all compared to a traditional Linux process.
<simpson> (And "tame the kernel" really means "tame the syscall barrier")
<Arahael> Go is an example environment that doesn't use the libc at all, but seems to directly use the kernel. :)
<mdash> Arahael: which is why libc isn't a useful place to do taming
<hyper_ch> aanderse: still need help with zfs?
<simpson> Right. And on non-NixOS the barrier's in different spots. One of the "best", most "fun" parts of Nix on Darwin is that sometimes system libraries show up when you didn't want or know about them.
<Arahael> mdash: Indeed. It was a poor example on my part.
<Arahael> I like the macos "sandbox" concept too, incidentially, though I understand that it's perhaps not technically sound.
<{^_^}> [nixpkgs] @veprbl opened pull request #49130 → pythonPackages.pyarrow: fix running tests on hydra → https://git.io/fxyN7
ottidmes has quit [Ping timeout: 252 seconds]
<simpson> Sandboxes are alluring. I think maybe we should call them "raptor pens" though, given how they work in practice.
<{^_^}> [nixpkgs] @veprbl closed pull request #49055 → [wip] pyarrow darwin debug → https://git.io/fx1AQ
<Arahael> simpson: I approve! :)
<Arahael> mdash: Incidentially, simpson's url to describe "taming" was the java equivalent of glibc.
mayhewluke has quit [Ping timeout: 245 seconds]
<Arahael> (It focused on the java API)
<mdash> Arahael: well sure, it was for a capability-safe language implemented in java, for exposing java features for use in that language
<Arahael> mdash: Ah, right.
<mdash> Arahael: so, building a taming layer on top of glibc for a language runtime that uses glibc features is reasonable
<simpson> `jurrassic-wolrd`
<mdash> (and that's what simpson and I did)
<Arahael> mdash: Still, you can't do that securely without kernel + hardware support.
mayhewluke has joined #nixos
<puffnfresh> gchristensen: we're using your layered Docker images for work
<mdash> Arahael: Sure you can.
<puffnfresh> gchristensen: an extraCommands attribute would be useful
<mdash> Arahael: (So long as you're willing to restrict yourself to stuff inside that runtime on top of that taming layer.)
<Arahael> mdash: With or without meltdown mitigations?
<mdash> Arahael: oh, well, go buy a good CPU first before you even start _thinking_ about software
<Arahael> mdash: I mean, in theory, we could just dockerize all the apps, right? Heh, sure. So hardware support is really important.
<puffnfresh> gchristensen: we're trying to populate /nix/ with registration and store-paths
<Arahael> And kernel as well.
<mdash> docker doesn't provide any security benefits
<mdash> i don't recall them even trying
<Arahael> mdash: Because it shares the kernel, or because of other reasons?
<mdash> Arahael: it's not intended to provide security benefits, and historically I haven't seen them show up by accident either
<Arahael> mdash: Yeah, most of the security issues I've seen involve either networking things, or accessing memory or other resources shared by the host. (Eg, video graphics in the case of vmware)
<mdash> yeah
<mdash> docker is a garbage bag, not a metal safe
<Arahael> Yep, curious choice of words, though. ;)
<Arahael> It's going to be interesting to see how much we use docker in 10 years.
<Arahael> And when systemd and docker will play nicely together...
<mdash> my choice was deliberate, it's a container designed to be thrown away along with its contents
<Yaniel> that ought to work fine as soon as systemd absorbs dockerd
jperras has quit [Quit: WeeChat 2.2]
<mdash> Arahael: hoping seL4 will make more headway in 10 years :)
<Arahael> mdash: It has multiple connotations though. :)
<Arahael> mdash: Yep!
<Arahael> A part of me dislikes the new direction we're making with capabilities, but it seems that we either need to embrace it... Or move back to single-user systems. This half way point is rather... useless.
<simpson> Arahael: A related analogy is that of a water balloon vs a sponge. Both can be stabbed with a blade, but one will leak more water than the other, being a thin barrier around unprotected contents rather than a dense structure.
<Arahael> We do rather like our thin barriers.
<Arahael> People still regard chroot as a *sandbox*.
<simpson> Capability theory mostly works because its models fit two very common setups: Computers in a network, and humans in a social network.
<simpson> Fitting the setup of (human?) agents trying to share a computational resource is really a bonus IMO.
* emily thinks this is starting to sound pretty -chat?
<Arahael> In this day and age, we've moved away from sharing computational resources, IMHO.
<mdash> emily: you got a nix question? :)
<mdash> Arahael: we haven't, just how it's done
<Arahael> mdash: I think we have. As a *user*. We tend to have one computer per person. Each have their own phone, each have their own tablet, etc.
<mdash> Arahael: that all run code on behalf of _tons_ of other people/organizations
<Arahael> Arguably webservers are a shared resource, but those technically run as a single user account as well.
<simpson> The cloud~
* simpson respects emily's suggestion
<mdash> emily: this is topical though, because what should come next after nixos? ;-)
<mdash> i certainly don't want to crowd out more on-topic stuff.
<Arahael> I have to get back to work anyway. :)
astronavt has quit [Read error: Connection reset by peer]
Wharncliffe has quit [Quit: Lost terminal]
astronavt has joined #nixos
sb0 has quit [Quit: Leaving]
jasongrossman has joined #nixos
rprije has quit [Ping timeout: 240 seconds]
bsd4me has joined #nixos
jtojnar has joined #nixos
Peetz0r has joined #nixos
rprije has joined #nixos
endformationage has quit [Quit: WeeChat 1.9.1]
worldofpeace has quit [Ping timeout: 250 seconds]
worldofpeace has joined #nixos
worldofpeace has quit [Ping timeout: 264 seconds]
jtojnar has quit [Remote host closed the connection]
<pie__> what ackage is the "gsettings" command in? :/
<simpson> ,locate gsettings
<jackdk> ,locate gsettings
* simpson learning
<{^_^}> Found in packages: ibus, gvfs, evince, liferea, empathy, brasero, deja-dup, glib.dev, gnome3.gcr, gnome3.eog, notify-osd, gnome3.ghex, virtmanager, gnome3.gedit, gnome3.folks, gnome3.totem, gnome3.mutter, gnome3.vinagre, gnome3.seahorse, gnome3.evolution, ibus-with-plugins, gnome3.libgnomekbd, gnome3.gnome-shell, gnome3.gnome-keyring, gnome3.gnome-session, evolution-data-server, gnome3.gnome-packagekit, gnome3.gnome-screenshot, and 5 more
<{^_^}> Found in packages: ibus, gvfs, evince, liferea, empathy, brasero, deja-dup, glib.dev, gnome3.gcr, gnome3.eog, notify-osd, gnome3.ghex, virtmanager, gnome3.gedit, gnome3.folks, gnome3.totem, gnome3.mutter, gnome3.vinagre, gnome3.seahorse, gnome3.evolution, ibus-with-plugins, gnome3.libgnomekbd, gnome3.gnome-shell, gnome3.gnome-keyring, gnome3.gnome-session, evolution-data-server, gnome3.gnome-packagekit, gnome3.gnome-screenshot, and 5 more
<jackdk> ,locate bin gsettings
<{^_^}> Found in packages: glib.dev
Rusty1 has quit [Quit: Konversation terminated!]
Mateon1 has quit [Ping timeout: 245 seconds]
Mateon1 has joined #nixos
drakonis has quit [Quit: WeeChat 2.2]
Dedalo has quit [Quit: My MacBook has gone to sleep. ZZZzzz…]
aw has joined #nixos
spacefrogg has joined #nixos
bsd4me has quit [Remote host closed the connection]
reinzelmann has joined #nixos
adamantium has joined #nixos
<adamantium> Hi, anyone know, how to make a cursor theme apply to x-toolkit applications such as urxvt?
<adamantium> My cursor theme applies to gtk apps no problem, but xtoolkit apps like urxvt it does not work, even with .Xresources or .Xdefaults containing a like such as: Xcursor.theme: Numix-Light
<adamantium> a line*
<Ralith> that `.Xresources` line works fine for me
<Ralith> did you reload it?
pie__ has quit [Ping timeout: 245 seconds]
hamishmack has quit [Quit: My MacBook has gone to sleep. ZZZzzz…]
<{^_^}> [nixpkgs] @r-ryantm opened pull request #49131 → wireless-regdb: 2018.09.07 -> 2018.10.24 → https://git.io/fxSvO
adamantium has quit [Remote host closed the connection]
adamantium has joined #nixos
reinzelmann has quit [Quit: Leaving]
<adamantium> Ralith: Yes, I have in my sessionCommands ${pkgs.xlibs.xrdb}/bin/xrdb ~/.Xresources
adamantium has left #nixos [#nixos]
<Ralith> after making the change, I meant
pie__ has joined #nixos
Niall_ has joined #nixos
mskalski_ has joined #nixos
evilem has joined #nixos
liori_ has joined #nixos
avn_ has joined #nixos
phry_ has joined #nixos
ivan_ has joined #nixos
arianvp_ has joined #nixos
Unode_ has joined #nixos
nD5Xjz_ has joined #nixos
adamCS_ has joined #nixos
FireFly has joined #nixos
nD5Xjz has quit [*.net *.split]
azdle has quit [*.net *.split]
clefru has quit [*.net *.split]
jcrben has quit [*.net *.split]
Jackneill has quit [*.net *.split]
bbarker has quit [*.net *.split]
FaerieFly has quit [*.net *.split]
Unode has quit [*.net *.split]
etu has quit [*.net *.split]
mskalski has quit [*.net *.split]
Spooktober has quit [*.net *.split]
dejanr has quit [*.net *.split]
galen has quit [*.net *.split]
buckley310 has quit [*.net *.split]
delroth has quit [*.net *.split]
arianvp has quit [*.net *.split]
Niall has quit [*.net *.split]
monotux has quit [*.net *.split]
catern has quit [*.net *.split]
teto has quit [*.net *.split]
emerson has quit [*.net *.split]
redj has quit [*.net *.split]
liori has quit [*.net *.split]
acowley has quit [*.net *.split]
phry has quit [*.net *.split]
avn has quit [*.net *.split]
domenkozar has quit [*.net *.split]
[0__0] has quit [*.net *.split]
ng0 has quit [*.net *.split]
ivan has quit [*.net *.split]
bigvalen has quit [*.net *.split]
adamCS has quit [*.net *.split]
jw358 has quit [*.net *.split]
Unode_ is now known as Unode
adamCS_ is now known as adamCS
jcrben has joined #nixos
Spooktober has joined #nixos
azdle has joined #nixos
[0__0] has joined #nixos
monotux has joined #nixos
etu has joined #nixos
hellrazor has joined #nixos
clefru has joined #nixos
Jackneill has joined #nixos
delroth has joined #nixos
ng0 has joined #nixos
galen has joined #nixos
carlosdagos has quit [Quit: Connection closed for inactivity]
FireFly is now known as FaerieFly
hyper_ch2 has joined #nixos
<hyper_ch2> so, letsencrypt closed the irc channel here on freenode....
random_yanek has joined #nixos
reinzelmann has joined #nixos
alex``` has joined #nixos
mayhewluke has quit [Ping timeout: 244 seconds]
<colemickens> what is the workaround for this missing feature in nix-shell? https://github.com/NixOS/nix/issues/955
<{^_^}> nix#955 (by bjornfor, 2 years ago, open): Combining nix-shell -A and -p
mayhewluke has joined #nixos
Ariakenom has joined #nixos
jackdk has quit [Ping timeout: 252 seconds]
<Arahael> Hmm, lincity-ng isn't terribly stable.
rprije has quit [Ping timeout: 246 seconds]
Itkovian has joined #nixos
<{^_^}> [nixpkgs] @r-ryantm opened pull request #49133 → trufflehog: 2.0.91 -> 2.0.97 → https://git.io/fxSTQ
<jeaye> hyper_ch2: Why's that?
<hyper_ch2> "We have been running an IRC channel on the Freenode network, #letsencrypt, in addition to the community forums. After careful thought we have decided we can only support one of these platforms. We feel that the community forum offers a better experience for users looking for help and for discussion of the Let’s Encrypt platform. We’re closing the #letsencrypt IRC channel and focusing our efforts on the community forum.
<hyper_ch2> We believe Discourse offers a better user experience, has more powerful moderation tools, and is less of a time burden for staff than a real-time medium like IRC. We look forward to welcoming IRC users to the Discourse forum."
EarlDeLaWarr has joined #nixos
ZaraChimera has left #nixos ["No boundaries on the net!"]
EarlDeLaWarr has quit [Ping timeout: 276 seconds]
layus[m] has left #nixos ["User left"]
rprije has joined #nixos
mbrock has joined #nixos
<jeaye> Thanks.
<gchristensen> puffnfresh: instead of an extraCommands attribute, I think a separate build function would be better
thc202 has joined #nixos
ThatDocsLady has joined #nixos
astronavt has quit [Ping timeout: 252 seconds]
jmeredith has quit [Quit: Connection closed for inactivity]
vk3wtf has quit [Ping timeout: 276 seconds]
<{^_^}> [nixpkgs] @r-ryantm opened pull request #49134 → urlwatch: 2.14 -> 2.15 → https://git.io/fxStJ
mmercier has joined #nixos
<Izorkin> How to get uid/gid from config.ids.uids/gids and add script pkgs.writeText "example.sh" ?
<hyper_ch2> gchristensen: you're not in london?
<srhb> Izorkin: As long as you write the script from a context that has config in scope, there's nothing special about it
<{^_^}> [nixpkgs] @primeos pushed to master « signal-desktop: 1.17.0 -> 1.17.1 »: https://git.io/fxStu
<srhb> Izorkin: eg. etc.environment.testscript = pkgs.writeScript "echo-lambdabot-uid" "echo ${toString config.ids.uids.lambdabot}"
hamishmack has joined #nixos
<gchristensen> hyper_ch2: I am
<hyper_ch2> oh :)
hc has joined #nixos
patrl1 has joined #nixos
patrl1 has quit [Client Quit]
patrl1 has joined #nixos
ThatDocsLady has quit [Quit: Leaving]
<Izorkin> srhb: Thanks. How t ofix thats variant? - let cfgID = import /etc/nixos/misc/ids.nix; test2 = "${toString cfgID.config.uid-gid.group-custom1}"; https://pastebin.com/HnWTyNPV
viric has quit [Remote host closed the connection]
<srhb> Izorkin: Sorry, I don't understand the question, or the purpose of the file in pastebin.
<{^_^}> [nixpkgs] @r-ryantm opened pull request #49135 → soapysdr: 0.6.1 -> 0.7.0 → https://git.io/fxSq7
patrl1 has quit [Quit: WeeChat 2.2]
patrl1 has joined #nixos
<{^_^}> [nixpkgs] @Mic92 merged pull request #49126 → minor fixes in Nixpkgs stdenv docs → https://git.io/fxyXo
<{^_^}> [nixpkgs] @Mic92 pushed 3 commits to master: https://git.io/fxSmT
<{^_^}> [nixpkgs] @Mic92 pushed 2 commits to release-18.09: https://git.io/fxSmY
<{^_^}> [nixpkgs] @Mic92 merged pull request #49119 → Add licenses → https://git.io/fxygO
<{^_^}> [nixpkgs] @Mic92 pushed 21 commits to master: https://git.io/fxSml
patrl1 has quit [Client Quit]
patrl1 has joined #nixos
Khetzal has joined #nixos
patrl1 is now known as patrl
<{^_^}> [nixpkgs] @haseeAmarathunga opened pull request #49136 → Create readme.java → https://git.io/fxSmr
<{^_^}> [nixpkgs] @Mic92 merged pull request #49130 → pythonPackages.pyarrow: fix running tests on hydra → https://git.io/fxyN7
<{^_^}> [nixpkgs] @Mic92 pushed 3 commits to master: https://git.io/fxSmP
<{^_^}> [nixpkgs] @r-ryantm opened pull request #49137 → slurm: 18.08.1.1 -> 18.08.3.1 → https://git.io/fxSm9
<{^_^}> [nixpkgs] @fuwa0529 opened pull request #49138 → wownero: init at 0.3.0.0 → https://git.io/fxSmH
Spooktober has quit [Quit: * 𝐆 𝐇 𝐎 𝐒 𝐓 𝐍 𝐎 𝐈 𝐒 𝐄 𝐒 *]
Spooktober has joined #nixos
<Izorkin> srhb: Need move ${toString config.uid-gid.group-custom1} from script to group let in. Example { config, pkgs, lib, ... }: let CustomID = ${toString config.uid-gid.group-custom1} in { others config
<srhb> Well that'll work too.
najibpuchong has joined #nixos
ThatDocsLady has joined #nixos
patrl has quit [Ping timeout: 260 seconds]
cinimod has joined #nixos
<najibpuchong> Hi all. In nixos 18.09, how can I have selectable keyboard layout option at login?
<Izorkin> srhb: if CustomID = ${toString ...}; error - syntax error, unexpected DOLLAR_CURLY
<srhb> Izorkin: ${} is syntax for string interpolation, it must be inside a string.
<srhb> Izorkin: If youj just nee dCustomID to be that string, then CustomID = toString ...
<srhb> Without the dollar curly.
<srhb> najibpuchong: I'm not sure whether lightdm supports this at all? You might want a different display manager (perhaps someone can confirm/deny this)
<srhb> najibpuchong: Is lightdm the dm you're using?
kreetx has joined #nixos
<{^_^}> [nixpkgs] @markuskowa closed pull request #49121 → slurm: 18.08.1.1 -> 18.08.3.1 → https://git.io/fxyaR
<Izorkin> srhb: let cfgID = import /etc/nixos/misc/ids.nix; CustomID = toString cfgID.config.uid-gid.custom-group1; error - value is a function while a set was expected
<najibpuchong> srhb: Currently I'am using sddm. I had use lightdm before. Any suggession on what display manager have this feature?
lonokhov has joined #nixos
<hyper_ch2> what's the best way to create with the configuration.nix a file with given content in /etc/xxx/xxx.conf ?
<srhb> najibpuchong: Sorry, I don't know. I think you'll have to research the various available DMs if SDDM doesn't do it :)
<srhb> Izorkin: Don't import ids.nix. use the value from config
<srhb> hyper_ch2: environment.etc."xxx/xxx.conf" = ...
<cinimod> I have nix-build -I nixpkgs=https://github.com/NixOS/nixpkgs-channels/archive/nixos-18.09.tar.gz release-8.4.nix --arg packages "haskellPackages: [ haskellPackages.lens haskellPackages.random-fu]
<hyper_ch2> srhb: nice... I was gravitating towards system.activationScripts.media
<srhb> hyper_ch2: Eek. :)
<cinimod> Is there way of putting --arg packages "haskellPackages: [ haskellPackages.lens haskellPackages.random-fu] into a nix file using overrides so I don't have to type it all the time?
<hyper_ch2> srhb: system.activationScripts.media is nice to create some folders by deafult
<srhb> hyper_ch2: I prefer never to touch th activation scripts if I can get away with it
<srhb> cinimod: What's release-8.4.nix?
<kreetx> a noob question: I have some state x with my nix packages and my application works. I would like to use the temporary fix for mojave from here https://github.com/NixOS/nixpkgs/pull/47676. Can I somehow save the state I have now so I could revert to it, if the changes I now start to make wont work?
<{^_^}> #47676 (by matthewbauer, 3 weeks ago, merged): haskell: fix x509-system on mojave
<srhb> cinimod: A function { nixpkgs, packages }: ... ?
<Izorkin> srhb: thanks, works
<cinimod> But I don't want to modify that
<srhb> cinimod: If so, foo.nix: import ./release-8.4.nix { nixpkgs = fetch ... 18.09.tar.gz; packages = yourlist } ?
<srhb> yourFunction, apparently.. :)
<kreetx> and another noob question: the forementioned fix says to cherry-pick it - how is that done? I'm familiar with git and all that..
<cinimod> srhb: thanks - I will try now
<srhb> cinimod: you probably want builtins.fetchTarball or something for the nixpkgs import..
<cinimod> hmmm that is pushing my very cookbooky knowledge of nix
<najibpuchong> srhb: thanks
<symphorien> kreetx: git checkout (the branch where you want to add the fix); git cherry-pick (the sha of the commit with the fix)
<srhb> cinimod: { nixpkgs ? builtins.fetchTarball { url = https://...; sha256 = actualhash...; }
<srhb> Er..
<srhb> "nixpkgs ="
<srhb> cinimod: (You probably want to pin to a specific commit, hence the added sha256 hash. Make sure to point the url at some static commit ref tarball
pie__ has quit [Ping timeout: 246 seconds]
<kreetx> symphorien: but that I should do on the nixpkgs repo? I understand the cherry-picking, it's the 'where' that I don't yet get
<kreetx> and also, how to I remember the working nixpkgs state
<kreetx> I guess I could just remember the commit I'm on right now
<srhb> kreetx: Build your system from a nixpkgs checkout instead of some channel. In that checkout, from whatever branch you care about, cherry-pick on top of it (or create a new branch with the cherry-pick)
<srhb> "reverting" is simply git revert
<symphorien> yes it should be enough
<symphorien> nix-info will tell you which commit you are on
<kreetx> srhb: symphorien: thanks, now it clicked!
<symphorien> to build with the checkout, use -I nixpkgs=/path/to/checkout
<{^_^}> [nixpkgs] @r-ryantm opened pull request #49140 → riot-web: 0.16.5 -> 0.17.0 → https://git.io/fxSOp
<kreetx> symphorien: yes. I remember that I could use env variables for that too, if I want to use the checkout globally
<srhb> kreetx: (more advanced methods involves specifying the source declaratively and applying a patch on top of it before importing nixpkgs itself. This is, in my experience, easier to maintain in the long run, but a bit more involved to set up if you're not used to nixpkgs "pinning")
<kreetx> since I need the mojave fix pretty much globally
<{^_^}> [nixpkgs] @teto opened pull request #49141 → zathura: symlinkJoin all of plugins → https://git.io/fxS36
<srhb> gchristensen: If I use your multilayerthingabob, am I right to assume that I can make nix-env functional more or less by just adding nix, if I'm willing to accept that nix doesn't know about existing paths and garbage collection doesn't work without generating the db?
<srhb> (Wondering if you've tried this)
<srhb> I'm willing to make this tradeoff if it means I don't have to bother with the reference graph :-P
mbrock has quit [Remote host closed the connection]
mmercier has quit [Ping timeout: 276 seconds]
najibpuchong has quit [Remote host closed the connection]
orivej has joined #nixos
<srhb> Though I suppose I could actually generate it at startup without too high a cost..
<hyper_ch2> srhb: environment.env = { "xxx/xxx.conf".text = '' ..... ''; }; worked fine
<srhb> If I just dump the reference graph and join it together.
<srhb> hyper_ch2: :)
Synthetica has joined #nixos
johann__ has joined #nixos
<{^_^}> [nixpkgs] @periklis opened pull request #49142 → kustomize: 1.0.8 -> 1.0.9 → https://git.io/fxSsM
patrl has joined #nixos
pie_ has joined #nixos
pie_ has quit [Remote host closed the connection]
pie_ has joined #nixos
goibhniu has joined #nixos
<gchristensen> srhb: maybe? :)
__monty__ has joined #nixos
<kreetx> nix-info shows that my channel is nixpkgs-19.03pre154023.89b618771ad, but I can't find the 19.03 branch on the github nixpkgs repo
<clever> kreetx: thats based on master
<{^_^}> [nixpkgs] @Infinisil opened pull request #49143 → idrisPackages.{categories,derive}: Use upstream instead of forks → https://git.io/fxSGM
<clever> kreetx: it also goes into the channels nixos-unstable, nixpkgs-unstable, and the -small variants of both
<kreetx> alright. can I know this somehow, i.e what master is currently, or what release is master
<clever> kreetx: unstable is always master, and master is now using 19.03 internally, so its clearly not 18.09
<pie_> if I dd a root partition and want to change the uuid, how do i reconfigure it to be able to boot? while being in a live environment
<symphorien> kreetx: https://howoldis.herokuapp.com/
<pie_> to clarift: i dd /dev/sda1 to /dev/sdb1, and i want to change the uuid of /dev/sdb1, and then make the nixos on /dev/sdb1 reference the new uuid
ThatDocsLady has quit [Ping timeout: 260 seconds]
<symphorien> pie_: you can use nixos-generate-config to regenerate hardware-configuration.nix
<pie_> symphorien, ok but will that work without doing a rebuild switch on the offline system?
<kreetx> clever: ah, I see now, it's in the code as well. thank you!
<symphorien> ah you need to rebuild the offline system; nixos-install should do the trick
johanot has joined #nixos
<pie_> symphorien, how should i use nixos-install for this? its not immediately obvious on a first readthrough? i mean, how do i make it not copy anything, just change the config
<symphorien> nixos-install is more or less chroot + nixos-rebuild
eskytthe has joined #nixos
<pie_> this is the step i want to avoid i think (from the man page) "· It copies Nix and its dependencies to /mnt/nix/store. "
<clever> pie_: try just nixos-enter and nixos-rebuild boot
<pie_> there is a --system flag to install..?
<pie_> clever, ok i will look at that thanks
<pie_> clever, ah that looks nice
<pie_> i noticed theres some symlinks that end up pointing to places in the live enviroment, that should be fixed when it gets in a chroot yes?
<pie_> looks good
<pie_> \o/
haslersn has quit [Ping timeout: 256 seconds]
zarel has joined #nixos
<cinimod> srhb: I have this but I don't know how to tell nix where haskellPackages live: https://gist.github.com/steinitznavican/d25f109afe4a7ce66e1260c3eb08b1f7
<cinimod> bash-3.2$ nix-build foo.nix error: undefined variable 'nixpkgs' at /Users/dominic.steinitz/IHaskell/foo.nix:5:14
<srhb> cinimod: It's a function in the release thingybob, from haskellPackages to a list of haskell packages
<srhb> cinimod: eg packages = hps: with hps [ lens aeson acme-whatever ];
<{^_^}> [nixpkgs] @r-ryantm opened pull request #49144 → rspamd: 1.8.0 -> 1.8.1 → https://git.io/fxSZp
<pie_> clever, rebuild boot is not quite happy with the chroot:
<pie_> error: getting status of '/run/user': No such file or directory
<pie_> mktemp: failed to create directory via template ‘/run/user/0/nixos-rebuild.XXXXXX’: No such file or directory
<srhb> (Everything is a thingybob today -- being busy apparently ruins terminology usage)
<{^_^}> [nixpkgs] @globin merged pull request #48870 → gitlab: 11.3.4 -> 11.4.0 (plus related) → https://git.io/fxPT9
<{^_^}> [nixpkgs] @globin pushed 3 commits to master: https://git.io/fxSnq
<clever> pie_: `env | grep run/user` and unser any vars pointing there
<pie_> clever, cuplrit seems to be NIX_BUILD_TOP
eskytthe has quit [Ping timeout: 246 seconds]
rprije has quit [Ping timeout: 246 seconds]
<pie_> also TMP
<clever> pie_: unset both and it should fall back to normal /tmp
<pie_> ...also buildCommandPAth
<pie_> bleh, listing them individually was a bad idea :P
<clever> pie_: TMP is likely the only one you need to unset
<pie_> theres like 3 temp dir variables
<clever> unset all of them!
<pie_> yup, just did
<pie_> my NIX_PATH seems wrong, is the chroot possibly inheriting env vars or something?
<{^_^}> [nixpkgs] @Mic92 opened pull request #49145 → rust: 1.29.1 -> 1.30.0 → https://git.io/fxSnS
<pie_> well, fixed that and i think it should work now
<cinimod> https://gist.github.com/steinitznavican/d25f109afe4a7ce66e1260c3eb08b1f7 complains syntax error, unexpected '}'
<pie_> clever, hmm it looks like its going to run out of memory...
<pie_> (got like 1.5 gigs free)
<pie_> well i guess i could enable swap
<{^_^}> [nixpkgs] @globin pushed 3 commits to release-18.09: https://git.io/fxScZ
<pie_> not sure if that worked or it just died..
<clever> cinimod: line 3, the with statemement is missing a ;
sigmundv has joined #nixos
eskytthe has joined #nixos
<pie_> clever, still not happy: error: cloning builder process: Operation not permitted , error: unable to start build process
<pie_> do i need to start some services?
<clever> pie_: is it being ran as root?
<pie_> systemctl wont work though, hm.
<pie_> yes its being run as root
<clever> then it should just work
<pie_> root@server /# id
<pie_> uid=0(root) gid=0(root) groups=0(root)
<cinimod> clever: I have packages = haskellPackages: with haskellPackages [ lens ];
<clever> cinimod: you want, packages = haskellPackages: with haskellPackages; [ lens ];
<cinimod> One day I will understand nix
<cinimod> Thanks
<pie_> ok maybe this will work better https://github.com/NixOS/nixpkgs/issues/34033
<{^_^}> #34033 (by CMCDragonkai, 40 weeks ago, open): nixos-install --chroot option
<clever> pie_: that has been replaced by nixos-enter
<symphorien> I have a question relatie to the native method here: https://nixos.wiki/wiki/Nix_Installation_Guide#nix_2.0.27s_native_method how do I get nix in the first place ?
<pie_> clever, yeah but the guy in the issue just created the dir instead of messing with env vars
<clever> pie_: that can also work
<pie_> though that seems orthogonal to this issue so...
<pie_> clever, yeah still same issue. https://github.com/NixOS/nix/issues/1625 is the only thing google brings up for the error ...
<{^_^}> nix#1625 (by tobiasBora, 1 year ago, closed): Does not pass tests
<Lisanna> Hey, need to do something a little strange here
<Lisanna> I need to convince Nix that the build has completed before all the children have actually exited
<Lisanna> I can modify that code in Nix if I need to
<Lisanna> wondering if I can do something like artificially send an EOF or something
sir_guy_carleton has joined #nixos
<sphalerite> Lisanna: how is it that you always end up doing the craziest stuff? :p
<Lisanna> sphalerite :U
<symphorien> Lisanna: does killing the children count ?
<Lisanna> symphorien can't kill the children
mayhewluke has quit [Ping timeout: 252 seconds]
<Lisanna> the environment is not sane... killing the children is not always possible
<pie_> i wonder if fdpeek lets you write to stuff not just read them
<pie_> wrong tool name..
<Lisanna> kernel/hardware shenanigans
<symphorien> can you run gdb on them and call close(fd) ?
<Lisanna> symphorien no, trust me, killing the children is unsafe in my environment :p
<pie_> peekfd
<Lisanna> ohh
reinzelmann has quit [Quit: Leaving]
mayhewluke has joined #nixos
<Lisanna> I don't.... think so? maybe?
<pie_> symphorien, :D
ivan_ is now known as ivan
<Lisanna> I would rather just modify Nix to listen for a secret code or something from any of the children that forces a cleanup
<typetetris> how does hydra.nixos.org serve its store?
<sphalerite> Lisanna: why do you need this?
<gchristensen> typetetris: it doesn't, it pushes NAR files to S3
<Lisanna> sphalerite because I want to use Nix in an environment where I want builds to complete but without having to have the child processes spawned by the build exit
<gchristensen> Lisanna: what do the children do?
<clever> typetetris: the iff and comments in here document how to make a hydra push to S3: https://github.com/input-output-hk/iohk-ops/pull/352
<typetetris> gchristensen: and cache.nixos.org ? does it serve its store somehow or does it redirect to s3 somehow?
<{^_^}> input-output-hk/iohk-ops#352 (by cleverca22, 20 weeks ago, merged): [DEVOPS-836] configure hydra to upload everything to S3
<clever> diff*
<Lisanna> gchristensen run tests against an impure resource
<gchristensen> typetetris: it is serving S3
<Lisanna> killing them is dangerous and can bring down the whole environment, breaking the SSH connection
<Lisanna> (killing them is dangerous if something has gone wrong in the test, specifically)
<sphalerite> Lisanna: I'm not sure exaclty how it works but I think nix SIGKILLs stuff when it closes stdout
<Lisanna> so I just need a way to wrap up the Nix build safely and then nuke the system from orbit afterwards (I already have the latter part)
<sphalerite> maybe you could disable that behaviour
<typetetris> nix-serve doesn't serve signatures and sharing the store via ssh seems to be very version dependent. nix 2.0.4 couldn't talk to nix-store from nix-2.1.3 :(
<gchristensen> sphalerite: builder could be without the sandbox, and have the chidlern start outside the builder?
<Lisanna> sphalerite Nix is waiting on a select of all the child fds
<gchristensen> Lisanna: ^
<Lisanna> yeah, definitely not using the sandbox here
<gchristensen> :D
<sphalerite> so you can just do the double-fork daemonise thing?
<Lisanna> sphalerite nix will still pick them up
<pie_> clever, any hints on what to look into for why this wont work? well i mean i guess it has something to do with being in a chroot, but this is supposed to work in a chroot...
<Lisanna> and consider them children
<sphalerite> huh
<symphorien> iirc it kills everything from the nixbuildXXX user
<clever> Lisanna: nix cleans up all children by uid, so it kills everything in the nixbld1 user
<gchristensen> Lisanna: could your builder send a message to a networked daemon which starts the process?
haslersn has joined #nixos
<symphorien> so use sudo to change their uid :)
<sphalerite> use systemd-run for it :D
<clever> symphorien: sudo and su will work if the sandbox is off
<clever> sphalerite: oh, that may work as well!
<Lisanna> this is a single user install, if that makes a difference
<haslersn> Hi, does anybody know how I can share a folder to a NixOS container running locally?
<haslersn> *NixOPS-Container
<srhb> haslersn: Which backend?
<pie_> clever, actually i didnt notice it start with this: "System has not been booted with systemd as init system (PID 1). Can't operate. Failed to connect to bus: Host is down"
<Lisanna> symphorien but Nix is getting stuck waiting on a select... how will changing their UID help?
<haslersn> srhb: Doe you mean the `deployment.targetEnv = "container"`?
<clever> pie_: yeah, systemctl wont work at all in the chroot
<symphorien> also run them with >/dev/null 2>/dev/null
<Lisanna> symphorien ohhh, that might help
<{^_^}> [nixpkgs] @Mic92 opened pull request #49146 → doc/breakpointHook: improve documentation → https://git.io/fxSW2
<srhb> haslersn: Yes. OK, so really containers. :D
<symphorien> so no process has the fd open, nix thinks the build is finished
<Lisanna> symphorien ...wait, drat, but I am still interested in their stdout/stderr ):
<symphorien> redirect to a file
<symphorien> in /tmp, to make it clean
<haslersn> I also tried using virtualbox, which for some reason didn't work if installed in the user environment
<haslersn> srhb: ^
<symphorien> you can't have both nix reap their stdout and not wait on completion :þ
<pie_> clever, nevermind nothing about dealing with the chroot issue...
<srhb> haslersn: Hmm, I haven't used the container backend yet, sorry
xeji has joined #nixos
<symphorien> haslersn: installing in user environment can't have global side effect like "starting a daemon" or "installing a kernel module"
<symphorien> so virtualbox not working from user environment is expected
<Lisanna> symphorien so, if I start them with their stdout/stderr redirected to a file (so Nix can't select() on them), and selectively read from that file in the main build process, if the main build process decides "time to exit!", Nix won't care that those processes are still running?
<symphorien> it seems reasonable
<Lisanna> since they're not connected to the tty or whatever
<symphorien> but if they still have the same uid, they will be killed
<Lisanna> symphorien will Nix wait around for them to finish terminating?
<Lisanna> or will it send a signal and bail?
<symphorien> no idea
<symphorien> you read the code, not me
<clever> Lisanna: when the main proc nix started returns, i believe nix will murderize everything else in the uid
<clever> under normal conditions, that would be when genericBuild from setup.sh returns
<Lisanna> OK, so I'll need to change their UID so Nix doesn't try to kill them
<clever> in the past, i have seen users add themselves to the nixbld group
<clever> upon starting any nix command, they where dropped to a login screen
<clever> because nix picked their uid, and then killed the entire session
<gchristensen> hahaha ouch
<clever> i believe it will do such cleanup both at the start (before the build begins) and at the end (after the initial proc returns)
<ekleog> Lisanna: I'd think these comments don't apply to a single-user nix install as you have
<symphorien> ah right
<clever> killUser from https://github.com/NixOS/nix/blob/master/src/libstore/build.cc is what handles that
<{^_^}> [nixpkgs] @basvandijk merged pull request #48699 → haskell.lib.buildFromSdist: Allow overrideCabal → https://git.io/fxwdN
<{^_^}> [nixpkgs] @basvandijk pushed 2 commits to master: https://git.io/fxSlZ
schopp0r has joined #nixos
<Lisanna> clever killUser kills all processes owned by some uid?
<clever> Lisanna: yeah
<Lisanna> clever would that be used in a single-user install? I wouldn't think it would...
<clever> Lisanna: nope, in a single-user i'm not sure how the cleanup is handled
<Lisanna> it probably just depends on that select
<clever> it can probablyy leak procs when they double-fork
<Lisanna> and defers all cleanup responsibility to the build itself
<Lisanna> if sandbox is off, yeah
<Lisanna> OK, cool. That's what I need
<clever> ive also found that nix doesnt understand mount points when cleaning up $NIX_BUILD_TOP
<clever> if the sandbox is off, i can run fusermount to use fuse inside a normal build
haslersn has quit [Ping timeout: 256 seconds]
<Lisanna> so I myself might in the build select on the stdout/stderr of the children (so I get all their updates), but also on another input that signals when it's time to get the heck out of there and abandon ship
<clever> but the rm -rf at the end, cant deal with mountpoins
siraben has joined #nixos
<Lisanna> huh
<clever> i was mounting fuse fs's inside a nix-build, and if i didnt umount at the end, nix would fail to remove the /tmp/nix-build-foo-0/
<clever> and then i wind up with 20 in /tmp/
<siraben> Is there a sample NixOS configuration for MacBook computers?
<gleber_> Is there a way to create a derivation which has no `system` or is system-agnostic?
<gleber_> In my case the derivation has nothing which is arch- or system-specific
<clever> gleber_: there is a font derivation in nixpkgs that does that
<clever> gleber_: all it really does is define the output hash, the same as fetchurl
<clever> gleber_: and system is just set to whatever pkgs its currently in
<clever> gleber_: so the derivation still has a system set on it, but its declaring that the linux and darwin builds have identical output, and it can mix&match them via the binary cache
<gleber_> clever: that's my goal: to have the same nix store path for it both on Linux and Darwin
<clever> gleber_: fixed-output derivations can do that
<gleber_> clever: what is the derivation is doing `src = ./.` and has a custom builder script which copies subset of what `src` has captured?
<clever> gleber_: define a derivation with an, outputHashAlgo, outputHash, and outputHashMode ("flat" or "recursive")
<gleber_> *what if
<clever> gleber_: if you define the 3 above attrs, any derivation can become fixed-output
arianvp_ is now known as arianvp
<clever> gleber_: then the $out will depend entirely on those 3 attrs, and the name attr
<clever> if outputHashMode="flat"; then $out must be a single file, and outputHash is its hash
mayhewluke has quit [Ping timeout: 276 seconds]
<clever> if outputHashMode="recursive" then $out can be a dir, and its a hash over the NAR of that dir
<gleber_> This will make it brittle under changes... I.e. I will have to update `outputHash` whenever I change anything which has been shoved into `$out`
<clever> yeah
reinzelmann has joined #nixos
johann__ has quit [Quit: Leaving.]
obadz has quit [Ping timeout: 240 seconds]
xeji has quit [Ping timeout: 246 seconds]
<arianvp> hey clever are you around?
<arianvp> Can I borrow your help again a bit with yarn?
<cinimod> If I do nix-build -I nixpkgs=https://github.com/NixOS/nixpkgs-channels/archive/nixos-18.09.tar.gz release-8.4.nix --arg packages "haskellPackages: [ haskellPackages.lens-diagrams ]" then all is well
eskytthe has quit [Ping timeout: 252 seconds]
zarel has quit [Ping timeout: 264 seconds]
<cinimod> But if I use nix-build foo.nix (https://gist.github.com/steinitznavican/d25f109afe4a7ce66e1260c3eb08b1f7) then I get error: value is a string with context while a set was expected, at /Users/dominic.steinitz/IHaskell.old/release.nix:60:1
sir_guy_carleton has quit [Quit: WeeChat 2.2]
<clever> arianvp: sure
<cinimod> I'd like to do nix-build -I nixpkgs=https://github.com/NixOS/nixpkgs-channels/archive/nixos-18.09.tar.gz release-8.4.nix --arg packages "haskellPackages: [ (doJailbreak haskellPackages.Chart-diagrams) ]"
<cinimod> But error: undefined variable 'doJailbreak' at (string):1:21
jw358 has joined #nixos
iyzsong has joined #nixos
kreetx has quit [Ping timeout: 276 seconds]
<pie_> symphorien, are you sure nixos-install wont mangle my existing nix store?
<arianvp> clever: Hydra won't evaluate the yarn2nix stuff, because of strict-eval
<{^_^}> #49082 (by arianvp, 1 day ago, open): Enable Vault UI
<arianvp> but im not sure why.. because I have provided the nix lock file manually. in that case it shouldn't do import-from-drv right?
<pie_> is it possible to rebuild a nix config without chrooting?
<pie_> man that doesnt seem right though. nixos-enter is supposed to work right? ...the whole point of that would be able to do config in the chroot
zarel has joined #nixos
eskytthe has joined #nixos
jasongrossman has quit [Ping timeout: 252 seconds]
<{^_^}> [nix] @edolstra pushed to master « Merge all nix-* binaries into nix »: https://git.io/fxSB0
<pie_> ^ yay
<clever> arianvp: *looks*
<pie_> ok so if i need to change the root uuid i need to deal with grub, ok thats fine, but i also need to change which root partition gets mounted, and that means i probably need to poke at the initrd or osmething?
<clever> arianvp: yarn2nix still needs IFD, even with a yarn.lock
<clever> arianvp: you would need to run that part manually, and add its result to nixpkgs
<arianvp> noo I give it a yarn.nix file
<arianvp> not a lockfile
<arianvp> I already ran that part manually
<clever> ah
<arianvp> oooh wait
<arianvp> maybe it's because I'm providing the `src` attribute?
xeji has joined #nixos
<clever> arianvp: i havent looked into the yarnNix attribute yet
patrl has quit [Ping timeout: 252 seconds]
eskytthe has quit [Ping timeout: 272 seconds]
mayhewluke has joined #nixos
mayhewluke has quit [Ping timeout: 252 seconds]
<{^_^}> [nixpkgs] @xeji pushed commit from @nicknovitski to master « cloud-sql-proxy: 1.11 -> 1.13 (#48920) »: https://git.io/fxSRN
<{^_^}> [nixpkgs] @xeji merged pull request #48920 → cloud-sql-proxy: 1.11 -> 1.13 → https://git.io/fxX3z
eskytthe has joined #nixos
mayhewluke has joined #nixos
<{^_^}> [nixpkgs] @Mic92 merged pull request #49146 → doc/breakpointHook: improve documentation → https://git.io/fxSW2
<{^_^}> [nixpkgs] @Mic92 pushed 3 commits to master: https://git.io/fxS0O
<{^_^}> [nixpkgs] @Mic92 merged pull request #49099 → Backport breakpointHook [18.09] → https://git.io/fxDgU
<{^_^}> [nixpkgs] @Mic92 pushed 5 commits to release-18.09: https://git.io/fxS0s
iyzsong has quit [Ping timeout: 246 seconds]
cinimod has quit [Remote host closed the connection]
cinimod has joined #nixos
srk has joined #nixos
<{^_^}> [nixpkgs] @c0bw3b closed pull request #30569 → fetchgitrev: fix parsing and add certs for https://github.com fetching → https://git.io/vd78U
Synthetica has quit [Quit: Connection closed for inactivity]
MoreTea has joined #nixos
acarrico has joined #nixos
obadz has joined #nixos
Itkovian has quit [Quit: My MacBook has gone to sleep. ZZZzzz…]
Itkovian has joined #nixos
cinimod has quit [Ping timeout: 260 seconds]
<Lisanna> the nixos module system is pretty awesome. it would seriously be amazing to have that stuff get built in to the nix language itself so it could be applied to more domains other than just configuration nixos
<clever> Lisanna: you are able to just run the module framework against non-nixos things
<clever> Lisanna: not-os is one example
<{^_^}> [nixpkgs] @pmiddend opened pull request #49147 → python36Packages.imageio: 1.6 -> 2.4.1 → https://git.io/fxSzZ
vidbina has joined #nixos
strobelight has joined #nixos
Itkovian has quit [Quit: Textual IRC Client signing off]
vk3wtf has joined #nixos
cinimod has joined #nixos
schopp0r has left #nixos [#nixos]
schopp0r has joined #nixos
<{^_^}> [nixpkgs] @re4per1337 opened pull request #49148 → looks cleaner now → https://git.io/fxSgO
<schopp0r> Hi. I am trying to compile Nix with another store-dir, so I can use it on another computer where I have no root access. Yesterday, symphorien suggested to use my NixOS installation and compile it there and then copy it to the other computer. I set the environment variables similar to the description in https://github.com/NixOS/nix/blob/master/tests/common.sh.in#L4
<schopp0r> except for "unset NIX_PATH", because then it won't start nix-env
<schopp0r> the problem is, I get the following error: https://pastebin.com/dNeKsEqE
<schopp0r> which is strange, 'cause /tmp/nix-test/store/vpv3kz1zb9bxln92hdzdfzs6f11a1rk8-bash-4.4-p12/bin/bash exists and I can manually run it
zarel has quit [Remote host closed the connection]
<symphorien> You can build nix with doInstallCheck=false;
<schopp0r> symphorien: ok, thx. hm. can I pass this option directly via commandline? or do I have to write a default.nix-file for that?
<symphorien> Writing a file is easier imo
johanot has quit [Ping timeout: 245 seconds]
<symphorien> Otherwise there is nix-build -E
eskytthe has quit [Ping timeout: 252 seconds]
Itkovian has joined #nixos
<arianvp> clever: I found the issue
<arianvp> yarn2nix is using lib.importJSON which isn't allowed on Hydra
<arianvp> :)
<clever> ah
<arianvp> but for a very stupid reason (extracing the name of the package)
<arianvp> so i'll just patch that out of yarn2nix I guess
evilem has quit [Quit: WeeChat 2.2]
<Lisanna> symphorien rerouting the stdout/stderr did the trick! thanks for the suggestion!
xeji has quit [Ping timeout: 240 seconds]
emerson has joined #nixos
vidbina has quit [Ping timeout: 246 seconds]
cinimod has quit [Remote host closed the connection]
cinimod has joined #nixos
patrl has joined #nixos
emerson has quit [Client Quit]
emerson has joined #nixos
<schopp0r> symphorien: ok, so I use a nix-shell now. it will compile a new nix with another store-dir. and then I will probably have to compile yet another nix inside this nix, to be in this new store-dir right?
<{^_^}> [nixpkgs] @joachifm closed pull request #49148 → looks cleaner now → https://git.io/fxSgO
<{^_^}> [nixpkgs] @kraakkop opened pull request #49149 → Update default.nix → https://git.io/fxS2h
silver has joined #nixos
<schopp0r> symphorien: ok, sorry, I need assistance :\ I now built a shell with nix with another store-dir. but now when running nix-build, it just points me to the default /nix/store directory for nix, instead of building it in the new storeDir.
<{^_^}> [nixpkgs] @joachifm closed pull request #49149 → Update default.nix → https://git.io/fxS2h
<schopp0r> error: creating log file '/nix/var/log/nix/drvs/hr//hri5jc0bwy18yxkpddcp1gi9sna3x5-bash-4.4.tar.gz.drv.bz2': Permission denied ← why does it try to access that even though I set NIX_LOG_DIR?
<schopp0r> symphorien: I cannot find where/how to set the log directory
<LnL> rycee: are you at nixcon?
reinzelmann has quit [Quit: Leaving]
strobelight_ has joined #nixos
strobelight is now known as Guest85353
jmeredith has joined #nixos
strobelight_ is now known as strobelight
vk3wtf has quit [Ping timeout: 250 seconds]
Guest85353 has quit [Ping timeout: 245 seconds]
eskytthe has joined #nixos
<schopp0r> why is it so hard to do such a simple thing as "compiling" /o\
<schopp0r> like, for every software project that is sufficiently large
<schopp0r> ok, some docs say there should be a flag --localstatedir. but … neither nix-build nor nix-shell support it.
EarlDeLaWarr has joined #nixos
johanot has joined #nixos
<{^_^}> [nixpkgs] @edolstra closed pull request #49136 → Create readme.java → https://git.io/fxSmr
zarel has joined #nixos
eskytthe has quit [Ping timeout: 246 seconds]
pie__ has joined #nixos
pie_ has quit [Ping timeout: 250 seconds]
zarel has quit [Ping timeout: 264 seconds]
b1000101 has joined #nixos
zarel has joined #nixos
iyzsong has joined #nixos
xeji has joined #nixos
<{^_^}> [nixpkgs] @Infinisil merged pull request #49143 → idrisPackages.{categories,derive}: Use upstream instead of forks → https://git.io/fxSGM
<{^_^}> [nixpkgs] @Infinisil pushed 2 commits to master: https://git.io/fxSof
zarel has quit [Ping timeout: 272 seconds]
astronavt has joined #nixos
cinimod has quit [Ping timeout: 276 seconds]
haitlah has joined #nixos
<{^_^}> [nixpkgs] @andir opened pull request #49150 → Various security issues → https://git.io/fxSKL
<haitlah> Hey hey again me trying to run my CI in nix :P
orivej has quit [Ping timeout: 272 seconds]
<haitlah> I have a VM running nixos with gitlab-runner installed
<haitlah> I have tried to configure with shell as executor, but failed miserably to build my project
astronavt_ has joined #nixos
<haitlah> It seems that the user can't find 'su' in the $PATH
<haitlah> Running with gitlab-runner 11.2.0 (v11.2.0)
<haitlah> on nixos dff1ae9e
<haitlah> Using Shell executor...
<haitlah> ERROR: Job failed (system failure): Failed to start process: exec: "su": executable file not found in $PATH
<haitlah> Anyone already tried to have a local gitlabrunner ?
iyzsong has quit [Ping timeout: 252 seconds]
jperras has joined #nixos
iyzsong has joined #nixos
astronavt has quit [Ping timeout: 245 seconds]
<symphorien> schopp0r: I don't understand. On which machine are you ? on the target machine ?
cinimod has joined #nixos
<Dezgeg> --localstatedir is an option for ./configure
xeji has quit [Quit: WeeChat 2.2]
<symphorien> either you must use the env vars again or compile nix with what Dezgeg mentions to have the right defaults compiled in
tv has joined #nixos
<symphorien> those are mostly "standard" autotools flags, like sysconfdir and so on
<{^_^}> [nixpkgs] @dpaetzel opened pull request #49151 → tabula: init at 1.2.1 → https://git.io/fxS6t
eskytthe has joined #nixos
drakonis has joined #nixos
<genesis> there is a platforms.mesaPlatforms , i'd like a platforms.isMesaPlatforms
<genesis> how could i do that ?
jabranham has joined #nixos
mayhewluke has quit [Ping timeout: 260 seconds]
<ivan> anyone running 4.19? does execsnoop (from perf-tools) show any processes for you?
<cransom> fpletz: is there a useful story around ipv6 prefix delegation ? For the networkd switch, that is.
mayhewluke has joined #nixos
<fpletz> cransom: that should work with networkd but I haven't tried it yet
<fpletz> cransom: man systemd.network, the option is called IPv6PrefixDelegation
<cransom> gotcha. Thanks.
aleph- has quit [Ping timeout: 252 seconds]
<andi-> It works flokli tested/was involved there IIRC.
ryantrinkle has joined #nixos
jasongrossman has joined #nixos
cinimod has quit [Remote host closed the connection]
cinimod has joined #nixos
<{^_^}> [nixpkgs] @1000101 opened pull request #49152 → nixos/trezord: revised and updated udev rules → https://git.io/fxSPm
Dedalo has joined #nixos
<flokli> cransom: I use it to configure downstream network interfaces from a larger allocation and route.
xeji has joined #nixos
aleph- has joined #nixos
<pie__> rycee, is there something somewhere that explains how home-manager works
<schopp0r> symphorien: no, I am in the nix-shell on my nixos machine now. I got it compiling now, so far. I'll be back as soon as that fails again ^^
<symphorien> then don't use nix-shell
<schopp0r> symphorien: why not?
<symphorien> only nix-build "<nixpkgs>" -A nix
<schopp0r> symphorien: ...
<manveru> pie__: what do you want to know?
<schopp0r> symphorien: this doesn't work
<symphorien> well you *can* use nix-shell
<symphorien> just a recipe already exists to do it automatically
<schopp0r> symphorien: aha?
<pie__> manveru, i havent poked around much yet, mainly just wondering about making my home directory immutable, and perhaps using something like overlayfs to gather changes
<pie__> manveru, and/or git
<schopp0r> symphorien: where? the thing you linked to does not work without modification
<schopp0r> symphorien: that was why I use a shell now
lunik1 has joined #nixos
<manveru> pie__: well, it definitely doesn't support that
<pie__> manveru, what is "that"
<symphorien> sorry I don't have time to help you further now
<manveru> home-manager makes symlinks, not much else
<pie__> manveru, ok i think that was approximately what i was wondering about
<pie__> manveru, the symlinked files cannot be written to yes?
<manveru> Yes
<manveru> They look to the nix store
<schopp0r> symphorien: yeah ... the thing *is* that these do not work. even in the shell, nix will use the default locations from the parent NixOS, when I do not set them manually.
<manveru> *link
<symphorien> export NIX_REMOTE=
<symphorien> otherwise it may use the daemon
cinimod has quit [Remote host closed the connection]
cinimod has joined #nixos
xeji has quit [Ping timeout: 264 seconds]
aanderse has quit [Remote host closed the connection]
b1000101 has quit [Ping timeout: 256 seconds]
orivej has joined #nixos
eskytthe has quit [Ping timeout: 252 seconds]
TanebPhone has joined #nixos
<{^_^}> [nixpkgs] @fadenb opened pull request #49153 → graylogPlugins: update existing plugins → https://git.io/fxS1E
revtintin has joined #nixos
johanot has quit [Ping timeout: 246 seconds]
<avn_> Folks, any ideas, why git building twice -- probably for 32bit (I have only wine builds in 32bit)
johanot has joined #nixos
mmercier has joined #nixos
<maurer> avn_: nix-store -q --tree whatever you were building
<maurer> see where the two dependencies come from
zarel has joined #nixos
<{^_^}> [nixpkgs] @prusnak opened pull request #49154 → [18.09] python.pkgs.construct: 2.8.16 -> 2.9.45 → https://git.io/fxSMY
patrl has quit [Quit: WeeChat 2.2]
<{^_^}> [nixpkgs] @prusnak opened pull request #49155 → python.pkgs.construct: 2.8.16 -> 2.9.45 → https://git.io/fxSMO
<{^_^}> [nixpkgs] @1000101 opened pull request #49156 → nixos/trezord: revised and updated udev rules → https://git.io/fxSMn
<{^_^}> [nixpkgs] @prusnak closed pull request #49154 → [18.09] python.pkgs.construct: 2.8.16 -> 2.9.45 → https://git.io/fxSMY
astronavt_ is now known as astronavt
ryantrinkle has quit [Ping timeout: 240 seconds]
<pie__> manveru, so i did this by accident and didnt get any errors home.file."".text = , whats that going to do? :P
ramses_ has joined #nixos
<avn_> maurer: so when "system" would be finally built? ty
<maurer> avn_: Sorry if it's a bit of a heavy hammer, but it might figure things out. My best guess is that it's a separate git-with-tools for user usage (e.g. what you use on the command line) and a minimal git that is in use by e.g. fetchGit inside nix
b1000101 has joined #nixos
<avn_> maurer: that would be most correct answer. Probably we can turn off docs building on first one, and may be testsuite on seconds (git itself built in 15sec, but docs/tests consume ~5-10 min each)
<maurer> avn_: If for some reason you're going for net build speed, you could probably rejigger fetchgit to use git-and-tools or whatever it's called instead
<maurer> (assuming that _is_ the problem, which you shouldn't assume til you look at a depgraph)
<{^_^}> [nixpkgs] @1000101 opened pull request #49157 → nixos/trezord: revised and updated udev rules → https://git.io/fxSDV
<avn_> maurer: anyway LO and chromium my weekly killers ;)
avn_ is now known as avn
<maurer> LO=?
<maurer> Oh, libre office
<avn> I have another hypotesis, that pkgs686.wine can refer to pkgs686.fetchgit, and capture 32bit git as well
<avn> yep
emily has quit [Ping timeout: 276 seconds]
<maurer> sorry, once I became a latex addict I stopped using it :P
<maurer> avn: That's not impossible, but it seems really unlikely, because fetchgit should come from lib, not pkgs
<maurer> err, nvm, evidently it is pkgs
<avn> maurer: I personally is lyx/pandoc user ;) But I build all stuff for my household (include pre-building stuff for wife/kid machines)
Ariakenom has quit [Ping timeout: 246 seconds]
<avn> Btw I feel, that I need to try switch home machines to nixops.
<maurer> avn: Is there a reason you're using pkgs686.wine instead of setting your wine config to wine32 instead?
<jophish> expected hash 'sha256:0000000000000000000000000000000000000000000000000000'
<jophish> that's unusual...
<manveru> pie__: that... i don't know :)
<manveru> pie__: it'll probably try to symlink $HOME
TanebPhone has quit [Quit: AndroIRC - Android IRC Client ( http://www.androirc.com )]
<manveru> but since it already exists, will fail
aanderse has joined #nixos
xeji has joined #nixos
<pie__> manveru, right, but it didnt fail
<avn> maurer: some legacy reasons. But I have load-evn-game-xxx scripts, each with own wine settings (currently all scripts is same, but I like to keep this scheme, because scripts can bring some GL tweaks)
<pie__> either that or im blind
<pie__> given that "users.users.<name?>.packages" exists, is there some user level nix stuff that I can user so that I dont have to sudo nixos rebuild to change user level packages/
eskytthe has joined #nixos
aleph- has quit [Ping timeout: 240 seconds]
<avn> probably I should change my env definition with wine.override { wineBuild="wine32"; wineRelease="staging"; };
<mdash> pie__: home-manager may interest you
zarel has quit [Ping timeout: 252 seconds]
<drakonis> avn: wine staging is available normally now
catern has joined #nixos
<drakonis> no need to override anything
<pie__> mdash, im poking at it right now :)
<pie__> mdash, but i thought there might be something in base nixos
<catern> is there a way to build a VM and QEMU script with Nix that allows specifying the kernel with -kernel? and which displays a console over serial directly in the current terminal instead of doing graphical stuff?
<avn> git builds third time, so I propapby suspect something wrong
<catern> I'm just doing kernel hacking - usually I write my own QEMU script and build my own VM disk image, but maybe I can do it with Nix
iyzsong has quit [Ping timeout: 240 seconds]
<clever> catern: have you seen nixos-rebuild build-vm?
<avn> drakonis: I know, because I still be a co-maintainer. ALthough all my wineprefixes 32bit, I keep my settings match each wineprefix
<drakonis> ah right
<drakonis> okay
<jabranham> it looks like mono is broken on aarch64. Anyone know if someone is working on fixing that?
<mdash> pie__: just nix-env I think
<catern> clever: yes, but I want something a little more pure-Nix
<catern> since I'm not on NixOS
<pie__> mdash, which is what i dont want to use :/
<clever> catern: build-vm just tells nixos-rebuild to build a certain attr of <nixpkgs/nixos>
<catern> clever: I assume you can answer this question very adroitly :)
<jophish> I think that nix has put the wrong hash into the database
<catern> yes but to have the nixos-rebuild command, I need to build another Nix expression
<jophish> how might I repair this?
<catern> oh but yes I can just build that certain attr myself sure
<clever> catern: so you just want: nix-build '<nixpkgs/nixos>' -I nixos-config=./configurationn.nix -A vm
<avn> catern: yep, as well as eval path to "built" nixos-rebuild and run it on non-nixos
<catern> clever: well, no, I also want to 1. pass my own kernel and 2. use it over serial
<clever> catern: the only issue, is that this specifies a -kernel based on the boot.kernelPackages defined within it
<jophish> ah, --repair is smart enough
<{^_^}> [nixpkgs] @FRidh merged pull request #49118 → Upgrade 25 packages that r-ryantm failed to upgrade → https://git.io/fxyzh
<{^_^}> [nixpkgs] @FRidh pushed 28 commits to master: https://git.io/fxSSY
<clever> catern: if your configuration.nix has virtualisation.graphics = false; then it will link stdio to the serial port
<clever> catern: for for the kernel, youll have to mess with line 109 in that file
drakonis has quit [Quit: WeeChat 2.2]
<catern> hmm, that's pretty interesting
<adisbladis> jabranham: Probably not. Have you tried building it yourself?
cinimod has quit [Ping timeout: 246 seconds]
<catern> so I just want to go to a shell inside the VM that has a few derivations available (so I can test the custom kernel with my custom code), can I specify something like that in configuration.nix?
<clever> catern: one tricky part though, is that nixos needs a decent number of modules to boot (in qemu-vm.nix for example, it needs 9plan to mount the store)
<clever> catern: and those modules are baked into the initrd it builds
<jabranham> adisbladis: nope. It's on a pi so I assumed the build would take ages. Right now I'm trying to convince the pi it doesn't need to build a kernel. It keeps insisting for some reason though.
<clever> then you change the kernel, and they cant load...
colabeer has joined #nixos
<catern> clever: that's fine, I'll just set them as builtins in the kernel config, that's standard
<clever> that can work, as long as you know what all is needed
<catern> I'm used to figuring that out by trial and error - is there some other way? can Nix itself tell me?
<clever> catern: eval the config.boot.initrd.availableKernelModules attr
<clever> that is what tells nixos what to include in the initrd
<catern> hmm I see
<catern> that's pretty neat
Peetz0r has quit [Quit: te hard yolo geroepen]
cinimod has joined #nixos
<adisbladis> jabranham: I'll give it a go on the nix community builder and see what fails
<clever> [root@system76:/etc/nixos]# nix eval -f '<nixpkgs/nixos>' -I nixos-config=./configuration.nix config.boot.initrd.availableKernelModules
<clever> catern: like so
<jabranham> adisbladis: thanks :-)
<catern> is the format of that, something which I can easily translate back into kernel configuration options?
Peetz0r has joined #nixos
<clever> catern: the kernel doesnt make that so easy
xeji has quit [Ping timeout: 246 seconds]
<clever> there is no clear pattern between module name and CONFIG_ param
erasmas has joined #nixos
xeji has joined #nixos
<catern> clever: well, ultimately Nix needs to know that mapping to build each of those modules
<catern> and figure out their name
<clever> catern: nix just builds ALL the modules!
<clever> this config controls what subset of .ko files get copied to the initrd
<catern> ah, I see, and selects them by name? awkward
hax404 has quit [Quit: WeeChat 2.0.1]
<catern> so what kind of ./hardware-configuration.nix should I have, for a minimal VM config?
<clever> you likely dont need any
<clever> just {} would be a valid configuration.nix
<clever> qemu-vm.nix overwrites the config for things like the rootfs
<haitlah> Anyone already used an S3 as distributed binary cache
<{^_^}> [nixpkgs] @alyssais opened pull request #49158 → doh-proxy: init at 0.0.8 → https://git.io/fxS9Y
<catern> Ideally, in addition to passing a specific kernel image into the VM, I'd be able to pass an additional directory to mount into the VM using 9P, is there an easy way to do that?
<haitlah> ?
<catern> clever: wow you're right, {} is valid
<clever> catern: line 501-506 is an example of how 9plan stuff is done from the nixos side
<catern> it's very amazing that I can just do nix eval -f '<nixpkgs/nixos>' -I nixos-config=./configuration.nix config.boot.initrd.availableKernelModules
<catern> and it just works
<clever> catern: and line 98 is the other end for 501-506
<clever> catern: qemu-vm.nix is covering everything that nixos usually asserts on, which is why {} is "valid"
schopp0r has quit [Ping timeout: 256 seconds]
<catern> what is the /tmp/xchg directory? and /tmp/share?
<catern> are those some directories I can use myself? and point them at some local path?
<catern> I see there's the SHARED_DIR environment variable being used
<clever> catern: yeah
<catern> very neat
<clever> catern: if SHARED_DIR isnt set, it will use $TMPDIR/xchg
<clever> and TMPDIR is the result of mktemp -d
<catern> ah, slick
<clever> xchg is also in that tmpdir, but not configurable
<clever> so you can use SHARED_DIR to configure where /tmp/share goes on the host
<clever> shared*
<catern> yeah I see how it works now, that's very slick
<clever> the nixos test framework also uses this to get things like profiling data out of the guest
<{^_^}> [nixops] @domenkozar pushed 2 commits to master: https://git.io/fxS99
<{^_^}> [nixops] @domenkozar merged pull request #1029 → Update overview.xml → https://git.io/fxX8p
<haitlah> Anyone can help me with the S3 binary cache
<haitlah> I would like to know if the builtin support of S3 push binaries automatically if it doesnt exists
<haitlah> Its not very clear in the documentation
<{^_^}> input-output-hk/iohk-ops#352 (by cleverca22, 20 weeks ago, merged): [DEVOPS-836] configure hydra to upload everything to S3
<catern> clever: so is '(import <nixpkgs/nixos> { configuration = {}}).vm' a reasonable expression to build then?
<clever> haitlah: it also supports things like `nix copy --to s3://bucket/ /nix/store/path`
<clever> catern: yep
<gchristensen> haitlah: yes, https://nixos.org/nix/manual/#ssec-s3-substituter-authenticated-writes have you seen example 13.1 ?
<haitlah> clever: I am not using hydra but nix
<ocharles> Is it a bug that plasma5 sets services.xserver.desktopManager.session, but gnome3 doesn't? Since updating to 18.09, our lightdm auto login ends up logging in to xterm, not gnome3. If I set desktopManager.default = "gnome3"; I get a trace:
<clever> catern: within that {} you could also override the kernel, but you would have to do a full kernel build for each run
<ocharles> Default desktop manager (gnome3) not found at evaluation time.
<ocharles> and it mentions that only "xterm" and "none" are known
<haitlah> clever: I am running nix inside docker and would like to have a distributed cache, added the S3 to the substitues
<ocharles> That trace seems to search services.xserver.desktopManager.session, but gnome3 doesn't touch that so it does seem to make sense why it wouldn't be allowed
colabeer has quit [Ping timeout: 264 seconds]
<clever> haitlah: ah, then you just want to `aws configure` and then `nix copy --to 's3://bucket?secret-key=...&region=...' /nix/store/foo`
<catern> clever: ok, building now. this is supremely cool... hopefully I can just pass an additional -kernel argument to qemu and it will override the earlier passed one
<catern> like with GCC
<clever> catern: maybe, not entirely sure
redj has joined #nixos
<haitlah> clever: do you mean I have to manually copy the local store to s3 ?
<clever> catern: you can also use qemu-vm.nix as an example, and then make your own scripts like https://github.com/cleverca22/nix-tests/blob/master/kexec/simple-test.nix#L26
<haitlah> clever: or is it uploading missing binaries when building derivation ?
<clever> haitlah: you need t know what derivations you want in the cache, and upload them there, and its tricky to know what was compile-time only, which is where hydra helps out
cinimod has quit [Ping timeout: 252 seconds]
<catern> clever: sure, but it's much cooler if I can just use the stock thing that comes wiht Nixpkgs
johann__ has joined #nixos
<clever> haitlah: you could also just `nix copy --all` to upload the entire store
<catern> I'm not messing with nvme or uefi as it looks like you're doing so I hopefully don't need anything custom
<catern> also - Nix is all about variability so I'd hope that I'd be able to use the stock thing and just make a few variability-tweaks :)
<catern> overrides or whatever
<clever> catern: that script was to make qemu emulate a system with or without nvme, and/or uefi
sb0 has joined #nixos
ryanofsky has left #nixos [#nixos]
cinimod has joined #nixos
<haitlah> clever: Oh, okay, I am running the CI with a container running nix, should I copy everything after having built the project ?
<catern> btw what's the default login and password? or could I customize things so that I just get dropped into a root shell directly? that would be nice, that's what I did before on Debian
<haitlah> I mean is there any good practice about that
<haitlah> Or should I just push the project and its dependencies
<clever> catern: it has no default login password
<clever> catern: youll need to set users.users.root.initialPassword
<clever> catern: oh, also
endformationage has joined #nixos
<catern> cool! ty
<clever> catern: oh, and line 94 of the same file
<haitlah> clever: Oh, okay, I am running the CI with a container running nix, should I copy everything after having built the project ?
<clever> haitlah: that might be your only choice, just make sure no secrets are in the store
<avn> btw folks, semi-unrelated question. What is better to extract /nix/store like paths from binary stream in haskell?
<clever> haitlah: hydra handles building each step seperately, and uploading every product to s3, so your compile-time things are also in the cache
hyper_ch2 has quit [Quit: Page closed]
<clever> avn: have you seen nix-store --restore ?
<clever> avn: oh, and i think domen make an improved NAR parser
<haitlah> clever: we are using gitlab for the ci and github for the code
<avn> in haskell? I don't need scan NARs, but I can borrow some code then ;)
<haitlah> clever: they don't want to switch to hydra
<avn> I want to write /nix/var/log purger, and practice my haskell-fu in process ;) (I know that I able to make in in python in 20 min)
worldofpeace has joined #nixos
<clever> avn: ah, are you more wanting to see what paths are still valid?
lonokhov has quit [Quit: WeeChat 2.2]
<clever> avn: have you seen `nix path-info --all` ?
drakonis has joined #nixos
<catern> btw has anyone made a ctags or anything like that for the Nix language?
Ariakenom has joined #nixos
<avn> clever: I want to write some code to wipe logs, which haven't valid paths inside (so logs from build of already GC'-ed packages)
<clever> avn: `nix path-info --all` will list every path that is valid, then you just remove those from the dir listing and you have the garbage
<avn> clever: .drvs shown as well? logs have names of .drvs, not resulting paths
<{^_^}> [nixpkgs] @andir merged pull request #49150 → Various security issues → https://git.io/fxSKL
<{^_^}> [nixpkgs] @andir pushed 8 commits to master: https://git.io/fxS7K
Dedalo has quit [Read error: Connection reset by peer]
<clever> avn: youll want to filter those out
<avn> clever: I though just to read logs, extract all store reference, then check if they present in store, but your plan also would works ;)
<{^_^}> [nixpkgs] @c0bw3b closed pull request #32376 → Added ROCK kernel which is required by AMDs ROCm project → https://git.io/vbnzs
Tucky has quit [Quit: WeeChat 2.2]
<{^_^}> [nixpkgs] @fadenb opened pull request #49159 → pythonPackages.phonenumbers: 8.9.15 -> 8.9.16 → https://git.io/fxS5T
<arianvp> nh2: huh
<arianvp> I'm so confused
mmercier has quit [Quit: mmercier]
<nh2> arianvp: I hava a suspicion, one moment
<arianvp> how did the assets of the UI end up in the binary...
xeji has quit [Ping timeout: 246 seconds]
<{^_^}> [nixpkgs] @r-ryantm opened pull request #49160 → python36Packages.mysql-connector: 8.0.12 -> 8.0.13 → https://git.io/fxS5Y
<arianvp> the build of those assets require network access (needs to fetch node-modules and such), so there's no way nix-build could've even provided a binary with the assets inside
<arianvp> :O
<clever> arianvp: using src = ./. at any point? does it have a node_modules left-over from testing?
ryantrinkle has joined #nixos
<nh2> arianvp: I did a non-sandbox build accidentally (on my Ubuntu with nixops), running with sandbox now to recheck
<arianvp> if it works i'm gonna lose my mind
<arianvp> but also am not gonna complain
<arianvp> xD
<avn> Looks like rustc build bundled llvm anyway
<nh2> arianvp: yeah it just ran through on a NixOS machine
<arianvp> but if you visit the UI, does it actually show up?
<arianvp> :P
<nh2> let's see
<arianvp> 'consul agent -dev' by the way
<nh2> arianvp: I'm always testing it on my staging nixops deployment
<arianvp> and then localhost:8500/ui
<nh2> arianvp: yeah seems to work fine, both using local `consul agent -dev` and on my staging deployment
ramses_ has quit [Ping timeout: 256 seconds]
<arianvp> can you send a screenshot of the ui? I've got a warm fuzzy feeling it's just the old one
<arianvp> ass we have { passthru.ui = consul-ui } in the package
<arianvp> (It being the old one is not a bad thing per se)
<nh2> arianvp: it looks exactly like https://demo.consul.io/ui/dc1/services/api
<arianvp> that's great news. but also scares me :D
<nh2> arianvp: can you try build it from that PR?
<arianvp> I have a new theory now. I think the legacy UI and the new UI use the same css in 1.3.0
patrl has joined #nixos
<arianvp> yeh im gonna build it myself as well
<nh2> arianvp: I'm not convinced of the css theory, because if I use `ui_dir` I get the UI looks
<nh2> arianvp: maybe they have it pre-built somewhere in the repo? Couldn't find that so far though
orivej has quit [Ping timeout: 246 seconds]
Neo-- has joined #nixos
drakonis has quit [Remote host closed the connection]
<catern> clever: you don't happen to know how I'd get qemu to have the QEMU monitor console in my current terminal and create some other pty to serve the VM serial console over?
<vdemeester> oh waw, tried my nixpkgs/home-manager setup on a fedora 28 VW, it blows up hard :|
drakonis has joined #nixos
<catern> (and then do that with Nix)
<{^_^}> [nixpkgs] @LnL7 merged pull request #49145 → rust: 1.29.1 -> 1.30.0 → https://git.io/fxSnS
<{^_^}> [nixpkgs] @LnL7 pushed 4 commits to master: https://git.io/fxSFJ
<Neo--> hey y'all, i was planning to include https://github.com/dano/aioprocessing/ into nixpkgs, but I'm not sure what to select per license - https://github.com/dano/aioprocessing/blob/master/LICENSE.txt. Should I add a license or mark it as BSD (that's what it's marked on pypi) or do we have something else in place for such scenarios?
davenpcm has joined #nixos
<arianvp> nh2: yup. works for me as well
<arianvp> but no idea why. this is weird
<arianvp> yep! it is vendored!
<arianvp> agent/bindata_assetfs.go
<astronavt> lets say i have 2 python packages with conflicting dependencies. does nixos handle that situation? eg using pip or conda you'd be kind of in trouble, and python itself is limited because it has a global package search path
<arianvp> mystery solved :)
<arianvp> well that is great news, as it saves us A LOT of headaches :)
<nh2> arianvp: lol `\x15\x40\x25\x39\x69\x81\xcd` that's how you do it
<ldlework> astronavt: no it doesn't
<arianvp> I'm gonna open an issue on the vault repo if they can vendor it too for vault
<ldlework> astronavt: you can have different Python distributions with different package sets, but you can't have a single python distribution with conflicting packages
<nh2> arianvp: I even tried `grep 'Node Health' /nix/store/740yjwx8qdkmcqwx465cbj67j489ccg7-consul-1.3.0-bin/bin/consul` and it failed, looks like it has everything hex-encoded even in the binary
<arianvp> because then I can throw away my hacker nixpkgs build script and just use goBuildPackage :P
<simpson> astronavt: Two packages in the same interpreter? Nope, that's something that Python itself can't deal with. The bug is in Python's module design.
<arianvp> lmao
<nh2> arianvp: and we can throw away my README and all the rubygems stuff in for consul
<arianvp> yes, the consul-ui package we can just throw away now
<arianvp> yes can all go
amir has quit [Read error: Connection reset by peer]
amir has joined #nixos
<nh2> vdemeester:
<nh2> sorry
<nh2> vdemeester: I'll expand on your PR a bit to implement the above, OK?
<vdemeester> nh2: for consul ?
<nh2> vdemeester: yest
<nh2> yes
<tokudan[m]> I'm trying to figure out how to marry node2nix and bower2nix. in the nixpkgs manual i can see { myWebApp ? { outPath = ./.; name = "myWebApp"; }. (https://nixos.org/nixpkgs/manual/#ex-buildBowerComponentsDefaultNix) what's the intention of the outPath there?
<vdemeester> yeah go ahead :)
<vdemeester> sorry I'm a bit out of time today (and this week-end :D)
<catern> clever: nvm I just have to pass -serial pty, so easy
<arianvp> no problems
qyliss has quit [Quit: bye]
qyliss^work has quit [Quit: bye]
<astronavt> simpson ldlework thats what i figured. thanks
xeji has joined #nixos
<adisbladis> jabranham: Seems to just compile and work
<clever> catern: if you instead do `-serial mon:stdio` then it will multiplx you into both stdio and the qemu monitor
<adisbladis> Took a while, no magic smoke
<gchristensen> sphalerite++
<{^_^}> sphalerite's karma got increased to 30
<gchristensen> sphalerite++
<{^_^}> sphalerite's karma got increased to 31
<gchristensen> sphalerite++
<{^_^}> sphalerite's karma got increased to 32
<jabranham> adisbladis: well that's good, thanks for checking :-). Can it get unbroken on hydra so I don't have to compile it myself?
<catern> clever: yes, but that's precisely what I don't want to do
<cransom> lets hope the new king doesn't go made with power.
<clever> catern: then using either ^a or ^[ (i forget) you can toggle between qemu and the serialport
<clever> catern: ah
<catern> I think that's the default
<cransom> *mad
<catern> clever: it's C-a c
<clever> ah
<LnL> sphalerite++
<{^_^}> sphalerite's karma got increased to 33
<catern> I want the serial terminal to be separate so I can connect to it from Emacs
<adisbladis> sphalerite++
<{^_^}> sphalerite's karma got increased to 34
<clever> catern: ahh
<adisbladis> jabranham: If you make a PR I could merge it
<catern> which I have now done, leaving me with a really slick overall setup - a VM build and started with Nix, and two buffers in Emacs, one pointing to the monitor and one pointing to the serial terminal
vidbina has joined #nixos
<clever> catern: the nixos test framework adds a 2nd serial port, that goes directly to a root shell
qyliss^work has joined #nixos
<{^_^}> [nixpkgs] @adisbladis merged pull request #49140 → riot-web: 0.16.5 -> 0.17.0 → https://git.io/fxSOp
<{^_^}> [nixpkgs] @adisbladis pushed 2 commits to master: https://git.io/fxSNk
qyliss has joined #nixos
<catern> clever: that's what I've done too with services.mingetty.autologinUser = "root"; is there a way I can skip specifying that argument and just use the Nixos test framework's configuration
<arianvp> nh2: I've asked hashicorp if they can do the same for the vault package. that'd make my life 1000x easier
<catern> hmm, nah, that connects via a port, distasteful - I'm connecting via /dev/pts/nn
<arianvp> but I understand they might be reluctant to do so
<arianvp> :)
<catern> seems cool though!
xeji has quit [Ping timeout: 246 seconds]
<clever> catern: add the 1st file above to imports, and then use the 2nd one to create the hvc device
<nh2> arianvp: they should just write that info into the ui-v2's README file really
infinisil has quit [Quit: Configuring ZNC, sorry for the joins/quits!]
<clever> catern: -chardev should support both pty's and unix sockets
<clever> so you can do it either way
<arianvp> it might have 'evolved' this way. perhaps they just accidentally commited the file and that's why it 'works'
<arianvp> :P
infinisil has joined #nixos
<nh2> arianvp: `git log agent/bindata_assetfs.go` -- that looks very on purpose
infinisil has quit [Client Quit]
<nh2> there's one commit for each release
<arianvp> OH yeh I see
<{^_^}> [nixpkgs] @jfroche opened pull request #49163 → Add pre-commit and its dependencies → https://git.io/fxSNi
infinisil has joined #nixos
<arianvp> by the way " ui = true" is the default. So the nixos modules should be something like ui = ${cfg.enableUi}
<arianvp> instead of ${optional enableUI "ui = true"}
<nh2> arianvp: ah OK, I'll do that now
<jabranham> adisbladis: I'm really only getting started with nix/nixos. Would I just remove the "broken = stdenv.isAarch64 && (versionAtLeast version "5");" from generic-cmake.nix?
<{^_^}> [nixpkgs] @adisbladis opened pull request #49164 → mono: Unbreak on aarch64 → https://git.io/fxSNA
<adisbladis> jabranham: Actually I just made a PR https://github.com/NixOS/nixpkgs/pull/49164
<{^_^}> #49164 (by adisbladis, 40 seconds ago, open): mono: Unbreak on aarch64
xeji has joined #nixos
<adisbladis> Gonna let the borg do its thing
haitlah has quit [Remote host closed the connection]
<jabranham> adisbladis: great, thanks. I'm trying to set up a little raspberry pi home server and something I want depends on mono.
<avn> adisbladis: actually all mono-related (as well as .net) stuff require a big cleanup.
<arianvp> great stuff
johann__ has quit [Quit: Leaving.]
<nh2> where should it be recorded that this change goes into the NixOS 19.03 changelog?
<nh2> or should that be part of the PR?
<adisbladis> nh2: Document it as a part of the pr
<catern> clever: also is there a good way to get a nix-shell suitable for building the kernel? I just found that the Linux build requires bc which I don't have installed, so might as well go all the way to Nix :)
alex``` has quit [Ping timeout: 252 seconds]
<b1000101> anyone willing to review or merge https://github.com/NixOS/nixpkgs/pull/49152 till Shea starts ? :)
<{^_^}> #49152 (by 1000101, 2 hours ago, open): nixos/trezord: revised and updated udev rules
<clever> catern: thats in the nixpkgs manual
<catern> true, thanks
qyliss^work has quit [Quit: bye]
qyliss has quit [Quit: bye]
<{^_^}> [nixpkgs] @nlewo merged pull request #48842 → pythonPackages.bitarray: init at 0.8.3 → https://git.io/fxi3L
<{^_^}> [nixpkgs] @nlewo pushed 2 commits to master: https://git.io/fxShk
<Lisanna> Where's the part of Nix that is responsible for dealing with the result of a remote build / copying the result to the local store?
<Lisanna> i.e., the location in the source code
<clever> Lisanna: *looks*
<{^_^}> [nixpkgs] @xeji merged pull request #49164 → mono: Unbreak on aarch64 → https://git.io/fxSNA
<{^_^}> [nixpkgs] @xeji pushed commit from @adisbladis to master « mono: Unbreak on aarch64 (#49164) »: https://git.io/fxShR
sigmundv has quit [Ping timeout: 245 seconds]
<{^_^}> [nixpkgs] @nh2 opened pull request #49165 → consul: 0.9.3 -> 1.3.0 with vendored UI → https://git.io/fxShz
civodul has joined #nixos
<jabranham> adisbladis: looks like that mono unbreak PR just got merged. About how long until the binary appears on nixos-unstable?
<{^_^}> #49165 (by nh2, 1 minute ago, open): consul: 0.9.3 -> 1.3.0 with vendored UI
<nh2> vdemeester: ^
<tokudan[m]> i'm struggling with node2nix. I'm trying to use the output of the default.nix generated by node2nix as the src attribute for another derivation, but nix keeps telling me cannot coerce a set to a string
<tokudan[m]> i'm struggling with node2nix. I'm trying to use the output of the default.nix generated by node2nix as the src attribute for another derivation, but nix keeps telling me cannot coerce a set to a string
<arianvp> nh2: I'll review after this talk :)
<catern> oh, everyone's at Nixcon, I see :)
<arianvp> no i'm watching the live stream!
<arianvp> virtual nixcon for me this year
<arianvp> is cheaper
<vdemeester> nh2: nice !
<b1000101> too bad you're not here, the cookies are awesome :P
<{^_^}> [nixpkgs] @vdemeester closed pull request #48714 → consul: 0.9.3 -> 1.3.0 → https://git.io/fxr1E
astronavt has quit [Read error: Connection reset by peer]
astronavt__ has joined #nixos
<Lisanna> clever perfect, thank you
<adisbladis> jabranham: Hard to say. Unstable has not been moving for a while.
<adisbladis> !stuck
<adisbladis> jabranham: ^
qyliss has joined #nixos
jperras has quit [Quit: WeeChat 2.2]
qyliss^work has joined #nixos
qyliss has quit [Client Quit]
qyliss^work has quit [Client Quit]
<{^_^}> [nixpkgs] @r-ryantm opened pull request #49166 → python36Packages.praw: 5.4.0 -> 6.0.0 → https://git.io/fxSjX
__red__ has joined #nixos
qyliss has joined #nixos
qyliss^work has joined #nixos
<__red__> Greetings - I'm guessing this is possible but not sure where to find it - but I want to do an install of nixos onto a second drive such that when I put that drive into a second machine it will boot as the primary drive
<__red__> in other words, I wnat to use my existing machine as a "nixos boot disk"
<__red__> will that just "work" if I mkfs and mount on /mnt?
<__red__> or do I have to do something else more specific ?
<clever> __red__: as long as your not doing an efi install, you can just do a normal fdisk, mkfs, mount, nixos-generate-config, and nixos-install
<__red__> thanks, appreciat eit
astronavt__ is now known as astronavt
drakonis has quit [Read error: Connection reset by peer]
<{^_^}> [nixpkgs] @qolii opened pull request #49167 → eternal-terminal: enable darwin build. → https://git.io/fx9eB
xeji has quit [Ping timeout: 252 seconds]
Itkovian has quit [Quit: My MacBook has gone to sleep. ZZZzzz…]
xeji has joined #nixos
<{^_^}> [nixpkgs] @dezgeg merged pull request #49167 → eternal-terminal: enable darwin build. → https://git.io/fx9eB
<{^_^}> [nixpkgs] @dezgeg pushed commit from @qolii to master « eternal-terminal: enable darwin build. »: https://git.io/fx9ey
eskytthe has quit [Quit: Leaving.]
mayhewluke has quit [Ping timeout: 252 seconds]
mayhewluke has joined #nixos
johanot has quit [Quit: WeeChat 2.2]
<nkaretnikov> described my issues with opengl and haskell on darwin here: https://github.com/NixOS/nixpkgs/issues/49168 any input is appreciated
<{^_^}> #49168 (by nkaretnikov, 1 minute ago, open): Black window with gloss (a Haskell library) on Darwin, OpenGL not linked?
astronavt has quit [Quit: Leaving]
<jabranham> adisbladis: oh. Well I guess there goes my plans of getting it setup over the weekend :-(
xeji has quit [Ping timeout: 245 seconds]
<catern> jabranham: you could just check out the PR locally
<jabranham> catern: true, but I'm trying to avoid compiling it myself. I imagine it'll take forever on a little raspberry pi.
goibhniu has quit [Ping timeout: 246 seconds]
<rycee> LnL (IRC): Unfortunately I'm not at nixcon. I've been listening in on and off while working though. Very nice talks and I'm impressed by the stream production quality, really nicely made.
<jabranham> adisbladis: thanks again for unbreaking it BTW :-)
b1000101 has quit [Ping timeout: 256 seconds]
<rycee> pie__ (IRC): Depends on what you mean. I have some motivation and high level stuff here: https://rycee.net/posts/2017-07-02-manage-your-home-with-nix.html
<rycee> Otherwise the readme. Not much more than that I'm afraid.
<pie__> rycee, basically im wondering if there would be a point to trying to make something with git or overlayfs or somesuch to have a generated but mutable config that can be diffed and maybe merged later
<LnL> rycee: ah ok, somebody thought you where :)
<{^_^}> [nixpkgs] @caugner opened pull request #49169 → WIP - nextcloud-client: 2.3.2 -> 2.5.0-rc1 → https://git.io/fx9f1
<rycee> LnL (IRC): I'm there in spirit ;-)
<rycee> pie__ (IRC): Hmm, a configuration generated by a Nix expression or a configuration file you just put into place using `home.files.foo.source`?
Lisanna has quit [Quit: Lisanna]
<{^_^}> [nixpkgs] @c0bw3b pushed commit from @enko to master « apt-dater: init at 1.0.3 (#32175) »: https://git.io/fx9Je
<{^_^}> [nixpkgs] @c0bw3b merged pull request #32175 → apt-dater: init at 1.0.3 → https://git.io/vbkZR
reinzelmann has joined #nixos
<rycee> pie__ (IRC): Seems to me the former would be very hard to accomplish, the second would be doable without too much trouble but I don't see the benefit over just changing the source file and doing a generation switch.
<pie__> rycee, the former, i think xD
<pie__> or, well, at the start probably the latter
<pie__> i didnt think very hard about this
<{^_^}> [nixpkgs] @uskudnik opened pull request #49170 → pythonPackages.aioprocessing: init at 1.0.1 → https://git.io/fx9Jr
Lisanna has joined #nixos
<{^_^}> [nixpkgs] @markuskowa merged pull request #49135 → soapysdr: 0.6.1 -> 0.7.0 → https://git.io/fxSq7
<{^_^}> [nixpkgs] @markuskowa pushed 2 commits to master: https://git.io/fx9JP
<rycee> But then you would have to parse the file, determine which parts where changed and connect these to changes to options within the HM module, figure out where the options actually were set taking into account the module merges and Nix expressions that produced the value, and finally figure out how to change the HM configuration so that evaluating it will produce an equivalent file in the end.
<rycee> pie__ (IRC): Or maybe I'm misunderstanding the idea. The above sounds like an interesting PhD topic, though ;-)
nikivi has quit [Quit: ZNC is awesome]
<{^_^}> [nixpkgs] @qolii opened pull request #49171 → RFC: hostapd: extend module to allow multiple APs. → https://git.io/fx9Uv
nikivi has joined #nixos
<{^_^}> [nixpkgs] @jtojnar pushed 8 commits to master: https://git.io/fx9UI
<{^_^}> [nixpkgs] @jtojnar merged pull request #43133 → gsignond: init at 1.0.7 → https://git.io/fNvUO
drakonis has joined #nixos
<{^_^}> [nixpkgs] @markuskowa merged pull request #48863 → units: 2.17 -> 2.18 → https://git.io/fxiFo
<{^_^}> [nixpkgs] @markuskowa pushed 2 commits to master: https://git.io/fx9Uc
<pie__> yeah its not so easy :p
* pie__ just trying to declutter his home directory somehow too
patrl has quit [Ping timeout: 252 seconds]
obadz has quit [Ping timeout: 246 seconds]
vidbina has quit [Ping timeout: 264 seconds]
<pie__> rycee, but i was thinking manually.
elgoosy has joined #nixos
jperras has joined #nixos
obadz has joined #nixos
<__red__> So nixpkgs-unstable channel is currently at 19.03pre155767.8070a6333f3 (Koi)
<__red__> how long does it take for something after it's been merged into master to end up in the channel?
<{^_^}> [nixpkgs] @r-ryantm opened pull request #49172 → python36Packages.djangorestframework: 3.8.2 -> 3.9.0 → https://git.io/fx9Tg
<__red__> (ie, I'm still building my local system from my local git managed nixpkgs - would be nice to switch to "normal" at some point)
<symphorien> !stuck
<symphorien> __red__: see this link ^
<__red__> Awesome - thanks
<rycee> pie__ (IRC): I think in general something like that would be nice. Like for programs that you can configure through a GUI.
<lunik1> Hi, what's the best way of moving a currently running nixos system to another hard drive? Can I do something like copy the config and basic tools across, chroot, build the system, and reboot?
patrl has joined #nixos
<pie__> lunik1, you probably definitely need to have root remounted read only
<pie__> which means youll probably have to close stuff and stop services
<catern> clever: do you think it would make sense for there to be, somewhere in nixpkgs, a minimal kernel configuration which has everything needed compiled as a built-in? for kernel hacking
obadz has quit [Ping timeout: 246 seconds]
<pie__> lunik1, well, idk if you can work around that somehow.
hyper_ch has quit [Quit: ZNC 1.7.1 - https://znc.in]
<__red__> symphorien: so about 2 weeks then?
hyper_ch has joined #nixos
<lunik1> pie__: the ideal situation is to not involve some third storage device but I can make do
<__red__> if I'm reading this correctly
<pie__> lunik1, i never learned how to use kexec yet but maybe you can kexec to a ramdisk or something
<symphorien> __red__: it varies a lot
<__red__> is it because there's some kind of manual promotion? or just that hydra is lagged? or ...
<symphorien> It is explained at the top
<__red__> curious about how all this fits together
<__red__> I keep meaning to look at hydra, channels, and overlays in more details to work out how to deploy private apps etc
obadz has joined #nixos
astronavt has joined #nixos
astronavt has quit [Remote host closed the connection]
obadz has quit [Ping timeout: 252 seconds]
drakonis has quit [Quit: WeeChat 2.2]
orivej has joined #nixos
<{^_^}> [nixpkgs] @oxij opened pull request #49173 → firefoxPackages.tor-browser: 8.0.2 -> 8.0.3 → https://git.io/fx9IW
cinimod has quit [Ping timeout: 246 seconds]
capisce has joined #nixos
<{^_^}> [nixpkgs] @dywedir merged pull request #49023 → arc-theme: 20180715 -> 20181022 → https://git.io/fx1KV
<{^_^}> [nixpkgs] @dywedir pushed 2 commits to master: https://git.io/fx9Id
<symphorien> __red__: there is a set of tests for each channel, and the channel goes forward only when the tests pass
<symphorien> so sometimes it goes very fast, and sometime the channel can be stuck for weeks until tests are fixed
aleph- has joined #nixos
<{^_^}> [nix] @dtzWill opened pull request #2485 → Fix aws-sdk-cpp patch to work with aws-sdk-cpp on 18.09+ → https://git.io/fx9Lw
<{^_^}> [nixpkgs] @veprbl opened pull request #49175 → pythonPackages.pyarrow: fix running tests on hydra → https://git.io/fx9Lb
<{^_^}> [nix] @dtzWill opened pull request #2486 → nix-prefetch-url: progressbar → https://git.io/fx9LN
<{^_^}> [nix] @dtzWill opened pull request #2487 → src/nix/local.mk: fix typos in names of symlinks → https://git.io/fx9Lp
<{^_^}> [nix] @dtzWill opened pull request #2488 → remote-store.hh: ConnectionHandle is struct, minor fix warning → https://git.io/fx9tI
drakonis has joined #nixos
<capisce> google chrome looks for some plugins in the /etc folder, what'd be the right way to provide such a plugin as a separate nix package? seeing as you can't put thing in etc unless it's a nixos module
drakonis1 has quit [Ping timeout: 245 seconds]
reinzelmann has quit [Quit: Leaving]
emily has joined #nixos
<{^_^}> [nixops] @AmineChikhaoui merged pull request #1022 → Trap boto exception InvalidSpotInstanceRequestID.NotFound when allow_missing is True → https://git.io/fx8J7
<{^_^}> [nixops] @AmineChikhaoui pushed 2 commits to master: https://git.io/fx9q4
pie__ has quit [Ping timeout: 272 seconds]
<{^_^}> [nixpkgs] @dtzWill opened pull request #49176 → whois: 5.3.2 -> 5.4.0 → https://git.io/fx9q1
<{^_^}> [nixops] @AmineChikhaoui merged pull request #1002 → Make sure that the machine is UP before trying to destroy it in GCP → https://git.io/fAoHd
<{^_^}> [nixops] @AmineChikhaoui pushed 2 commits to master: https://git.io/fx9qN
<{^_^}> [nixpkgs] @dtzWill opened pull request #49177 → libgcrypt: 1.8.3 -> 1.8.4, drop included patch \o/ → https://git.io/fx9mY
<{^_^}> [nixpkgs] @danieldk opened pull request #49178 → hugo: 0.47.1 -> 0.49.2 → https://git.io/fx9Y2
aleph- has quit [Ping timeout: 272 seconds]
pie_ has joined #nixos
zarel has joined #nixos
obadz has joined #nixos
<{^_^}> [nixpkgs] @r-ryantm opened pull request #49179 → pulseeffects: 4.3.7 -> 4.3.9 → https://git.io/fx9O0
pie_ has quit [Remote host closed the connection]
pie_ has joined #nixos
<{^_^}> [nixpkgs] @symphorien opened pull request #49180 → brlaser: fix install dir → https://git.io/fx93q
<{^_^}> [nixpkgs] @r-ryantm opened pull request #49181 → python36Packages.aniso8601: 3.0.2 -> 4.0.1 → https://git.io/fx93l
obadz has quit [Ping timeout: 276 seconds]
zarel has quit [Quit: Leaving]
feep has joined #nixos
<feep> yo
<feep> I have kde5/plasma installed and I have locale set to de ... how do I *not* use the german translation
<feep> but do use german locale for everything else
<{^_^}> [nixpkgs] @r-ryantm opened pull request #49182 → python36Packages.flask-babel: 0.11.2 -> 0.12.2 → https://git.io/fx9st
ottidmes has joined #nixos
<ottidmes> after updating to 18.09 I saw perl and man giving me this warning: bin/man: can't set the locale; make sure $LC_* and $LANG are correct, i18n.defaultLocale is properly set and I indeed see this value back in $LANG, what do I need to add to my nixos config to fix these warnings?
<{^_^}> [nixpkgs] @nlewo merged pull request #48868 → featherpad: init at 0.9.1 → https://git.io/fxPJu
<{^_^}> [nixpkgs] @nlewo pushed 2 commits to master: https://git.io/fx9su
elgoosy has quit [Remote host closed the connection]
elgoosy has joined #nixos
<avn> feep: you can set LC_* to de_DE, but LC_MESSAGES=C (so all locales, but interface)
<feep> ah yeah, just found that
<feep> thanks
<feep> how do I ... ?
<avn> I personally do it my shell dotfiles (which was written years before nixos)
<feep> ah, environment.variables.LC_MESSAGES
<{^_^}> [nixpkgs] @jtojnar opened pull request #49183 → gusb: 0.2.11 → 0.3.0 → https://git.io/fx9Gm
<avn> feep: not bad option. Most users anyway will have own settings in dotfiles
drakonis_ has joined #nixos
drakonis has quit [Read error: Connection reset by peer]
elgoosy has quit [Remote host closed the connection]
elgoosy has joined #nixos
romildo has joined #nixos
<romildo> I am packaging a software which uses directories like /usr/bin/something extensively. Is it better to fix those paths with 1) substituteInPlace in nix derivation, 2) sed in nix derivation, 3) a patch file ?
<simpson> substituteInPlace is pretty good if you need to change hardcoded paths to point to stuff in the Nix store.
xourt has joined #nixos
<simpson> A patch file could be good if there's more generic changes that might be good to go upstream.
<symphorien> a patch file has the advantage that when in the future the software changes where those paths appear in the source code, the patch will fail to apply whereas sed will just silently do nothing
<{^_^}> [nixpkgs] @r-ryantm opened pull request #49184 → python36Packages.bokeh: 0.13.0 -> 1.0.0 → https://git.io/fx9ZR
<xourt> $ nix-instantiate '<nixpkgs>'
<xourt> error: Please be informed that this pseudo-package is not the only part of
<xourt> Nixpkgs that fails to evaluate. You should not evaluate entire Nixpkgs
<xourt> without some special measures to handle failing packages, like those taken
<xourt> by Hydra.
<xourt> does anyone know what these measures are?
<simpson> xourt: What are you trying to achieve?
<xourt> I was wondering if I could get a dependency graph for all of nixpkgs
<xourt> (for fun)
<{^_^}> [nixpkgs] @timokau merged pull request #49182 → python36Packages.flask-babel: 0.11.2 -> 0.12.2 → https://git.io/fx9st
<{^_^}> [nixpkgs] @timokau pushed 2 commits to master: https://git.io/fx9Zb
<symphorien> xourt: to be view by a human ?
<emily> colemickens: trying out your sway-beta overlay, seems to be working okay so far, modulo expected levels of beta software bugginess ^_^
b1000101 has joined #nixos
vk3wtf has joined #nixos
drakonis has joined #nixos
<xourt> symphorien: maybe. I didn't think as far yet ...
<xourt> I just thought that it is a nice database
<xourt> *dataset
<symphorien> my system has 1752 nodes, 11658 edges, even without labels there is not much to "see"
<xourt> how did you get this info?
<emily> colemickens: although my scrolling in chrome is now crappy -- back to discrete increments rather than pixel-perfect scrolling :( I guess this is an xwayland issue
<symphorien> xourt: https://github.com/symphorien/nix-du << this is a tool I develop which simplifes your store to make some information visible
drakonis1 has joined #nixos
drakonis_ has quit [Ping timeout: 250 seconds]
<emily> colemickens: seems to maybe be a general xwayland problem going by https://www.reddit.com/r/Ubuntu/comments/7jlgia/pixelperfect_scrolling_in_chrome_under_wayland/ :(
<emily> if only maintaining local patches to chrome was viable :'|
<xourt> nice @symphorien. Back to the other question: no simple way to get all of nixpkgs?
feep has quit [Disconnected by services]
<{^_^}> [nixpkgs] @markuskowa opened pull request #49185 → virtualgl-lib: fix broken startup script → https://git.io/fx9c9
<symphorien> you can try builtins.tryEval
<symphorien> not sure if it is enough
pie_ has quit [Ping timeout: 240 seconds]
<xourt> ok thanks. I'll have a look at it ...
<symphorien> but, be aware that evaluating all nixos tests takes more than 20 minutes on my computer, for example
<{^_^}> [nixpkgs] @andir opened pull request #49186 → [18.09] mosquitto: 1.4.15 -> 1.5.3 → https://git.io/fx9cF
<{^_^}> [nixpkgs] @andir opened pull request #49187 → [18.03] mosquitto: 1.4.14 ->1.5.3 → https://git.io/fx9cb
<xourt> yea. It can take a long time, that's not an issue
<xourt> 22270 nodes, 205299 edges read.
<xourt> trying nix-du
obadz has joined #nixos
<xourt> 43GiB dead
<xourt> interesting
cinimod has joined #nixos
shabius has quit [Quit: Leaving]
obadz has quit [Ping timeout: 246 seconds]
obadz has joined #nixos
<drakonis1> the nix roadmap is very... interesting
shabius has joined #nixos
cinimod has quit [Ping timeout: 240 seconds]
pie_ has joined #nixos
pie__ has joined #nixos
Itkovian has joined #nixos
<{^_^}> [nixpkgs] @pstn opened pull request #49188 → R: update package set → https://git.io/fx9Cp
revtintin has quit [Quit: WeeChat 1.9.1]
pie_ has quit [Client Quit]
bigvalen has joined #nixos
feep has joined #nixos
<{^_^}> [nixpkgs] @jtojnar pushed 2 commits to master:
<{^_^}> [nixpkgs] @jtojnar merged pull request #49179 → pulseeffects: 4.3.7 -> 4.3.9 → https://git.io/fx9O0
adamantium has joined #nixos
<adamantium> Hey, any nixos desktop users still prefer slim > lightdm ? Any important reason(s) I should be using lightdm instead?
vk3wtf has quit [Ping timeout: 252 seconds]
<Ralith> slim has been dead and unmaintained for years
<{^_^}> [nixpkgs] @r-ryantm opened pull request #49189 → pyprof2calltree: 1.4.3 -> 1.4.4 → https://git.io/fx98V
mayhewluke has quit [Ping timeout: 252 seconds]
<worldofpeace> adamantium: further discussion was in #30890 though someone doesn't like lightdm for automatic logins: see #46396
mayhewluke has joined #nixos
<{^_^}> https://github.com/NixOS/nixpkgs/pull/30890 (by Lassulus, 51 weeks ago, merged): display-managers: make lightdm the default
<{^_^}> https://github.com/NixOS/nixpkgs/pull/46396 (by oxij, 6 weeks ago, open): nixos: xserver.displayManager: use slim for automatic logins
<{^_^}> [nixpkgs] @r-ryantm opened pull request #49190 → paperkey: 1.5 -> 1.6 → https://git.io/fx94I
pie_ has joined #nixos
pie__ has quit [Remote host closed the connection]
pie_ has quit [Remote host closed the connection]
<{^_^}> [nixpkgs] @charles-dyfis-net opened pull request #49191 → fakeroot: 1.22 -> 1.23 →
<{^_^}> [nixpkgs] @costrouc opened pull request #49192 → Refactor another 130 python packages -> python-modules → https://git.io/fx94x
__monty__ has quit [Quit: leaving]
<{^_^}> [nixpkgs] @Infinisil merged pull request #49036 → python36Packages.django_extensions: 2.0.7 -> 2.1.3 → https://git.io/fx1MR
<{^_^}> [nixpkgs] @Infinisil pushed 2 commits to master: https://git.io/fx9B8
<{^_^}> [nixpkgs] @Infinisil merged pull request #49027 → python36Packages.i3ipc: 1.4.0 -> 1.5.1 → https://git.io/fx16d
<{^_^}> [nixpkgs] @Infinisil pushed 2 commits to master: https://git.io/fx9Bg
pie_ has joined #nixos
akavel has joined #nixos
<{^_^}> [nixpkgs] @r-ryantm opened pull request #49193 → parallel: 20180922 -> 20181022 → https://git.io/fx9BA
<akavel> Hi! Question to people using NixOS: what's the value of $SHELL env variable for you?
<{^_^}> [nixpkgs] @jtojnar merged pull request #49183 → gusb: 0.2.11 → 0.3.0 → https://git.io/fx9Gm
<{^_^}> [nixpkgs] @jtojnar pushed 3 commits to master: https://git.io/fx9Bh
<akavel> Is it a path in /nix/store ?
<b1000101> akavel: /run/current-system/sw/bin/bash
davenpcm has quit [Quit: Textual IRC Client: www.textualapp.com]
<akavel> b1000101: hmmm; thanks.
<{^_^}> [nixpkgs] @Infinisil merged pull request #49035 → python36Packages.django-picklefield: 1.0.0 -> 1.1.0 → https://git.io/fx1Mf
<{^_^}> [nixpkgs] @Infinisil pushed 2 commits to master: https://git.io/fx9Rq
<b1000101> and there are links to actual path in /nix/store/ ...
<akavel> I'm writing a tool which generates shell scripts
<akavel> and I wonder how to build shebangs in them
<ottidmes> akavel: #!/usr/bin/env bash
<symphorien> Use /usr/bin/env bash
<akavel> Right, but what if someone uses different shell than bash
<akavel> (the contents of the file is user-controlled in part)
<akavel> So I see 2 options now:
<akavel> a) "#!/usr/bin/env " + basename($SHELL)
<akavel> b) "#!" + $SHELL
teej has joined #nixos
<{^_^}> [nixpkgs] @Infinisil pushed 2 commits to master: https://git.io/fx9Ra
<{^_^}> [nixpkgs] @Infinisil merged pull request #49033 → python36Packages.ftfy: 4.4.3 -> 5.3.0 → https://git.io/fx1XF
<akavel> It must match the shell someone uses by default...
<{^_^}> [nixpkgs] @Infinisil merged pull request #49176 → whois: 5.3.2 -> 5.4.0 → https://git.io/fx9q1
<{^_^}> [nixpkgs] @Infinisil pushed 2 commits to master: https://git.io/fx9R1
<ottidmes> akavel: I would go with (b) given those two, since `env bash` might point to a different bash version than $SHELL does
<akavel> ottidmes: hmmm, makes sense, thanks! <3
cinimod has joined #nixos
kenshinCH has joined #nixos
<lassulus> adamantium: slim is unmaintained, but apart from that there is no real issue with it. The question is, if security-issues are found, who is gonna fix them? I guess there needs to be fork of some kind, but afaik there is no known vulnerability to slim.
<akavel> and actually now I see another advantage of using straight $SHELL: it's easy to change it to something different if someone would want so, by just temporarily redefining the variable. Cool!
<kenshinCH> Hi all. I want to try mu4e and I found this https://gist.github.com/cleverca22/29f3fc0e06628efdda50e5c13ab5780b
romildo has quit [Quit: Leaving]
<kenshinCH> I modified pkgs.wrapProgram to makeWrapper, but now I get
<kenshinCH> mv: cannot move '/nix/store/ljsi8zf8wsnlnqmd3fskgzvg1hvq80fi-emacs-with-packages-26.1/bin/emacs' to '/nix/store/ljsi8zf8wsnlnqmd3fskgzvg1hvq80fi-emacs-with-packages-26.1/bin/.emacs-wrapped': Permission denied
<ottidmes> akavel: personally I would never try to merge shell scripts like you seem to be doing, what if the user uses some more exotic shell that does not comply with the subset of shells you assumed in your own code
<{^_^}> [nixpkgs] @offlinehacker opened pull request #49194 → kubicorn: init at 4c7f3623 → https://git.io/fx90K
<akavel> ottidmes: https://github.com/akavel/up
<akavel> ottidmes: and, more specifically, https://github.com/akavel/up/issues/2
<{^_^}> akavel/up#2 (by puffnfresh, 3 days ago, open): don't use hardcoded /bin/bash, allow other shells/engines
cinimod has quit [Ping timeout: 252 seconds]
<akavel> (uh, oh; whew, the bot scared me a bit, didn't know it jumps on you from behind like that)
<{^_^}> [nixpkgs] @Infinisil merged pull request #49062 → python36Packages.google_api_core: 1.3.0 -> 1.5.0 → https://git.io/fx1ha
<{^_^}> [nixpkgs] @Infinisil pushed 2 commits to master: https://git.io/fx909
<{^_^}> [nixpkgs] @r-ryantm opened pull request #49195 → pcsclite: 1.8.23 -> 1.8.24 → https://git.io/fx90Q
vk3wtf has joined #nixos
<symphorien> akavel: why not just use the POSIX /bin/sh ?
<akavel> symphorien: because I want to match the shell someone's using by default
<symphorien> This way you are sure the part of the script you execute will work (even if the user uses something non posix)
<symphorien> There are people whose $SHELL is powershell
boxscapeR has joined #nixos
<symphorien> So the script is unlikely to work in this case
<akavel> symphorien: on Unixen? the powershell?
<boxscapeR> is there some way to start a nix-shell inside a bash script, so I can use a program within the script that I don't have installed?
<akavel> wow, interesting; is powershell available in nixpkgs? can I try it quickly?
<{^_^}> #45830 (by AmandaCameron, 8 weeks ago, open): powershell: Unable to use as a login shell
<symphorien> akavel: nix-shell -p powershell I guess
<akavel> boxscapeR: you could probably try: `nix-shell -p YOUR_EXTRA_PROGRAM --run "YOUR_SCRIPT --SOME_SECRET_PARAM"` so that the secret param triggers running some specific logic you need
<boxscapeR> where `YOUR_SCRIPT` is also the file that this is in? Yeah, that could work
<akavel> symphorien: re the issue, I suppose that's just some missing config in nixpkgs, the issue discussion seems to say so
<akavel> I'm curious if for powershell it's also `powershell -c "some command"` to run a custom command
<symphorien> the issue was just to show that even on unix people (at least try to) use powershell as a login shell
<ottidmes> boxscapeR: https://gist.github.com/travisbhartwell/f972aab227306edfcfea might be interesting
<akavel> symphorien: sure, thanks; I'd never have imagined :D
<boxscapeR> I'll take a look
<infinisil> kenshinCH: Update to at least 18.09 (current stable) where wrapProgram is available
<akavel> symphorien: also this reminded me of e.g. "rc" which is IIRC some Plan9 shell or something, there may also be some worshippers of that
<akavel> symphorien: and probably it has some nonstandard invocation patterns, as Plan9 stuff likes to do
Itkovian has quit [Quit: My MacBook has gone to sleep. ZZZzzz…]
<kenshinCH> infinisil: I am on 18.09
<akavel> symphorien: so, powershell seems actually very civilised, it apparently accepts the typical `-c "some commands"` option :)
<ottidmes> kenshinCH: I guess wrapProgram is meant to be used during packaging and cannot be used after the fact, since it tries to move stuff around when wrapping.
<{^_^}> [nixpkgs] @r-ryantm opened pull request #49196 → pipenv: 2018.10.9 -> 2018.10.13 → https://git.io/fx9uL
<infinisil> kenshinCH: Well wrapProgram should be there in 18.09 latest version, so you're probably not running that
<infinisil> Huh wait
<symphorien> akavel: I am reading you issue; what do the script look like ?
<symphorien> #shell \n what the user typed ?
<akavel> symphorien: correct
<symphorien> then why do you need "-c" ?
elgoosy has quit [Ping timeout: 264 seconds]
<ottidmes> kenshinCH: would not this work: (pkgs.writeShBin "emacs" ''PATH="${pkgs.stack}/bin:${pkgs.mu}/bin" ${emacs'}/bin/emacs'')
<infinisil> Okay I have no idea how wrapProgram didn't give me an error before, I can't find it anywhere
<kenshinCH> ottidmes: trying right away!
<akavel> symphorien: for running the command while the user is typing :D
<symphorien> then I second the comment that you could feed the command to stdin
<akavel> but then I cannot feed *stdin* to stdin :D
<symphorien> hum right
<akavel> XD
<symphorien> never mind
<akavel> yes, it caught me too :D
<akavel> I'm kinda considering using /dev/shm for writing a temporary script, instead of `-c`
<akavel> but then it's probably not very portable :)
<symphorien> rather some fd
<akavel> huuuuuuuuuuuuuuh
<akavel> maaaaaaaaaaaybe you're right???
<akavel> I mean fd3 or something?
<kenshinCH> ottismes: actually sorry, I'll need a bit more context ^_^
<symphorien> /proc/self/fd/42
camsbury has quit [Remote host closed the connection]
Itkovian has joined #nixos
<akavel> hmm but how do I open this....
camsbury has joined #nixos
<symphorien> with the pipe() system call
<ottidmes> kenshinCH: well the point is to set a different PATH env variable for your custom emacs build, so I just do what I assumed wrapProgram does for you. I did assume you would add it to your environment.systemPackages, maybe that was unclear?
<akavel> It's probably POSIX, so probably portable to *BSDs, right?
<kenshinCH> ottidmes: I see! thanks
<akavel> I'm not sure if Go makes this syscall available on all OSes, but I will try to check, certainly super interesting idea
<symphorien> https://linux.die.net/man/2/pipe says POSIX.1-2001
<akavel> Do you know where to check if /proc/self/fd/42 is also POSIX?
justbeingglad has joined #nixos
<akavel> also I'm a bit unclear whether the "self" passed as argument to a subprocess would mean parent's self, or child's self :/
camsbury has quit [Ping timeout: 252 seconds]
<akavel> e.g. /dev/stdin is child's stdin AFAIU
<symphorien> file descriptors are inherited by default
<symphorien> so it does not matter
<akavel> oh, ok
<{^_^}> [nixpkgs] @Infinisil merged pull request #48880 → vim: 8.1.0450 -> 8.1.0490 → https://git.io/fxPRN
<{^_^}> [nixpkgs] @Infinisil pushed 2 commits to master: https://git.io/fx9uN
<akavel> ok, I'll try to go and do some further research, at least as much as I'll be able to, thanks! :)
<symphorien> akavel: https://en.wikipedia.org/wiki/Procfs OpenBSD dropped support in version 5.7, released in May 2015.
<akavel> :(
<akavel> no citation to find out if they replaced it with something
<symphorien> the release notes say Deleted procfs (always suffered from race conditions and is now unused).
<akavel> freebsd seems to recommend something called "procstat" (https://lists.freebsd.org/pipermail/freebsd-fs/2011-February/010760.html) instead ?
<akavel> or actually even ptrace
<symphorien> This starts to seem rather involved. Unless you find it fun to search for such things it seems more reasonable to just say "only shells which support -c are supported"
<akavel> yep, exactly what I wanted to write
<akavel> now here
<akavel> looked, and didn't have because you wrote it :)
<akavel> can be cool Idea for Future(tm)
<akavel> symphorien: thanks a lot for your fine company in this exploration! :)
<akavel> interestingly, even rc seems to support -c :D
<ottidmes> akavel: if you can easily set the shell in your prog, those that do not support -c, should easily be wrapped so that they do
<symphorien> according to man 3 system, -c is mandated by POSIX, fwiw
<akavel> for shells?
<symphorien> yes
<akavel> hm! didn't know about man 3 system, now that's something notable to remember / TIL
<symphorien> /bin/sh must implement it at least
<akavel> ah no
<symphorien> so it's not "just a weird convention"
zolk3ri has joined #nixos
<akavel> I thought it's something else
<akavel> so man claims sh must support it, but does it mean other's too?
<{^_^}> [nixpkgs] @Infinisil merged pull request #48467 → szip: fix url (previous ftp is now private) → https://git.io/fxEnn
<{^_^}> [nixpkgs] @Infinisil pushed 2 commits to master: https://git.io/fx9gv
emacsomancer has quit [Read error: Connection reset by peer]
<akavel> the /fd direction would be super cool for various non-shell "engines", like python, ghci, etc.
<akavel> by the way.
<symphorien> fish does not claim to be POSIX compliant so this is a moot point
emacsomancer has joined #nixos
adamantium has quit [Remote host closed the connection]
<akavel> ottimedes: you're right with the wrapping too, thanks. good to have this argument in case some people come and start bickering ;)
<akavel> hmmmmm, and actually it can be a cool workaround for the various other engines
<akavel> like python, ghci
<akavel> I'm starting to think to add it as an "official" advice
<akavel> wow, guys, I <3 you! thanks a lot for helping me with this challenge!
<akavel> do you have some fancy way you'd like to be credited? some, I dunno, real name or something? ;) or do you like me to mention you by nicks?
<ottidmes> akavel: thank you for making the tool, seems useful to me, e.g. when working out some advanced grep/awk/sed
<akavel> ottidmes: you're very welcome, nice to hear that you like it, and that you can find it helpful! :)
<{^_^}> [nixpkgs] @basvandijk opened pull request #49197 → strongswan-swanctl: adapt options to strongswan-5.7.1 → https://git.io/fx92Y
jabranham has quit [Quit: ERC (IRC client for Emacs 27.0.50)]
Itkovian has quit [Quit: My MacBook has gone to sleep. ZZZzzz…]
Ariakenom_ has joined #nixos
ryantrinkle has quit [Ping timeout: 246 seconds]
Itkovian has joined #nixos
<xourt> q
Ariakenom has quit [Ping timeout: 272 seconds]
xourt has quit [Quit: WeeChat 1.4]
akavel has quit [Quit: Page closed]
Thra11 has joined #nixos
TallerGhostWalt has joined #nixos
<avn> pff, rustc builds second time. Do I got some "concurrency" issue? I definelly haven't 32bit rust in my setup
<{^_^}> [nixpkgs] @adisbladis pushed 2 commits to master: https://git.io/fx92p
<{^_^}> [nixpkgs] @adisbladis merged pull request #49052 → dmrconfig: init at 2018-10-20 → https://git.io/fx1F8
jperras has quit [Ping timeout: 250 seconds]
Thra11 has quit [Ping timeout: 252 seconds]
<{^_^}> [nixpkgs] @globin opened pull request #49198 → tests/docs: remove remnants of old allowPing default → https://git.io/fx9am
<worldofpeace> how can I pin nixpkgs in an overlay?
<{^_^}> [nixpkgs] @Infinisil merged pull request #48844 → nixos/ddclient: make RuntimeDirectory and configFile private → https://git.io/fxiZ2
<{^_^}> [nixpkgs] @Infinisil pushed 3 commits to master: https://git.io/fx9VC
<adisbladis> worldofpeace: An overlay doesn't sound like the right place for that
<pie_> LnL, hey, you're listed as a maintainer for znc, might you add chroot functionality to the znc service?
erasmas has quit [Quit: leaving]
<worldofpeace> adisbladis: like in the context of the overlay I'd like it to use a 'stable' nixpkgs
justbeingglad has quit [Quit: Leaving.]
catid has joined #nixos
kenshinCH has quit [Quit: Page closed]
<catid> Hello! I'd like to be able to share Internet access with a NixOS linux machine that is on a private network, accessed over SSH. It seems like sshuttle would be a simple solution, but it does not work - It's trying to run iptables -t nat -N, but then iptables --list does not show the chain
TallerGhostWalt has quit [Ping timeout: 245 seconds]
camsbury has joined #nixos
<catid> Maybe openvpn will work better?
<symphorien> you can try ssh -D or ssh -w
<adisbladis> worldofpeace: You could do that easily by importing a stable channel, either by adding a separate channel and importing that in the overlay or a git checkout
jperras has joined #nixos
jtojnar has joined #nixos
<catid> ssh -D has been working, will look into -w
<worldofpeace> adisbladis: I think I figured it out since I found that the mozilla overlay does similar to what I need
<{^_^}> [nix] @layus opened pull request #2489 → Fix typo in local.mk → https://git.io/fx9rJ
<ottidmes> catid: In my case I had to do port forwarding as well, and some of the machines were using Windows, I ended up using zerotier, which also replaced openvpn for me (which is much slower in my experience)
jperras has quit [Ping timeout: 264 seconds]
Itkovian has quit [Quit: My MacBook has gone to sleep. ZZZzzz…]
pmade has quit [Quit: ZNC - http://znc.in]
<catid> Pro tip
vidbina has joined #nixos
<{^_^}> [nixpkgs] @Infinisil merged pull request #49064 → nixos/users: fix users home directory with isNormalUser → https://git.io/fx1ju
<{^_^}> [nixpkgs] @Infinisil pushed 2 commits to master: https://git.io/fx9r3
<LnL> pie_: not sure what you mean by that
<boxscapeR> hm, is there a straightforward way to make sudo work as a nix dependency? When I put it in a bash script with the nix-shell shebang I get "sudo must be owned by uid 0 and have the setuid bit set". Not that it's hugely important, since it's quite unlikely that sudo isn't installed anyway
<pie_> LnL, i mean so that services.znc is run in a chroot
<LnL> sudo isn't allowed inside builds
<LnL> pie_: I should, but I actually don't use the nixos service
<boxscapeR> It's not actually a build, just a bash script
jsgrant[m] has joined #nixos
<mdash> boxscapeR: what's the situation where you're using it?
<boxscapeR> overwriting the configuration.nix file to set up a new system
<pie_> LnL, what do you fo
<pie_> do
<LnL> I have a pre nix setup that I'm afraid to touch? :p
<pie_> eheheheee
<pie_> LnL, well then ;P *nudges gently*
<jsgrant[m]> Okay ... I give up; Going all-in to NixOS.
* jsgrant[m] has had like a half-dozen half-attempts over the years but am at a point now where it's just gonna/gotta happen. :^)
<{^_^}> [nixpkgs] @Infinisil merged pull request #49191 → fakeroot: 1.22 -> 1.23 → https://git.io/fx941
<{^_^}> [nixpkgs] @Infinisil pushed 2 commits to master: https://git.io/fx9ro
<pie_> uhhhh i think i just failed at git
<{^_^}> [nixpkgs] @Infinisil merged pull request #49190 → paperkey: 1.5 -> 1.6 → https://git.io/fx94I
<{^_^}> [nixpkgs] @Infinisil pushed 2 commits to master: https://git.io/fx9rD
<infinisil> pie_: What's the problem?
<ottidmes> jsgrant[m]: its not without its struggles, but if you get productive on NixOS, you will never want to go back (honestly, there might be moments you want to, but when you start to think about what you have to give up going back, convinced me to stay so far)
<pie_> nevermind xD i got confused between my branches and had a rebase i forgot
<pie_> aaaand i think i just killed the vpn again. sigh.
jperras has joined #nixos
civodul has quit [Quit: ERC (IRC client for Emacs 26.1)]
<bpye> I've ended up with a couple more queries, is there any real support for net booting NixOS? I'd be tempted to try this with a Raspberry Pi 3 to avoid the unreliable and slow flash storage and secondly, when managing NixOS with NixOps is there any good way to setup auto updates, it'd be nice to at least have security critical patches applied even wit
<bpye> hout deploying through NixOps again
<{^_^}> [nixpkgs] @markuskowa opened pull request #49199 → scalapack: switch to openblas and add test → https://git.io/fx9oJ
jperras has quit [Ping timeout: 240 seconds]
<{^_^}> [nixpkgs] @Infinisil closed pull request #49157 → [18.03] nixos/trezord: revised and updated udev rules → https://git.io/fxSDV
<ottidmes> bpye: I have a few machines I manage with nixops sometimes, and sometimes directly, that works fine, just make sure you get the generated public key (by nixops) persistent, otherwise it will be gone from the authorized keys after a local nixos-rebuild
<{^_^}> [nixpkgs] @Infinisil merged pull request #49152 → nixos/trezord: revised and updated udev rules → https://git.io/fxSPm
<{^_^}> [nixpkgs] @Infinisil pushed 2 commits to master: https://git.io/fx9oc
<{^_^}> [nixpkgs] @Infinisil pushed 2 commits to release-18.09: https://git.io/fx9o4
<{^_^}> [nixpkgs] @Infinisil merged pull request #49156 → [18.09] nixos/trezord: revised and updated udev rules → https://git.io/fxSMn
<{^_^}> [nixpkgs] @Infinisil merged pull request #49142 → kustomize: 1.0.8 -> 1.0.9 → https://git.io/fxSsM
<{^_^}> [nixpkgs] @Infinisil pushed 2 commits to master: https://git.io/fx9oR
<ottidmes> bpye: I use this command: nixops export --deployment steen | jq --raw-output '.[].resources | .[] | .["none.sshPublicKey"] // empty'
<ottidmes> bpye: to get the generated public keys
<{^_^}> Channel nixpkgs-18.09-darwin advanced to https://github.com/NixOS/nixpkgs/commit/9d2ff83b031 (from 2 days ago, history: https://channels.nix.gsc.io/nixpkgs-18.09-darwin)
jperras has joined #nixos
<ottidmes> bpye: there is this in the manual: https://nixos.org/nixos/manual/index.html#sec-booting-from-pxe but I have never used netboot, so I cannot help you with that. I only used the netboot config of NixOS as a basis for a rescue environment
<ottidmes> bpye: and for auto updates, I believe most people just use a cronjob, systemd timer, or something similar
<{^_^}> [nix] @layus opened pull request #2490 → Feature: Indent multiline antiquotations (v3) → https://git.io/fx9oy
adamantium has joined #nixos
<Arahael> My first error in nixos: rm: cannot remove '/nix/store/5ly176zwljiqq589625lcr0k990bg26c-dwarf-fortress-env-0.44.12/data/init/init.txt': Permission denied
camsbury has quit [Quit: Leaving...]
<Arahael> I'm trying to nix-env -i dwarf fortress as a user.
<Arahael> That file - somehow - is indeed owned by root.root
<Arahael> So what just happened there? (And how do I fix it?)
<{^_^}> [nixpkgs] @Infinisil merged pull request #49189 → pyprof2calltree: 1.4.3 -> 1.4.4 → https://git.io/fx98V
<{^_^}> [nixpkgs] @Infinisil pushed 2 commits to master: https://git.io/fx9Kv
<{^_^}> #46914 (by mkaito, 5 weeks ago, closed): Can't build dwarf fortress 0.44.12
<Arahael> Hmm, ok. So I guess it's closed, and thus, probably fixed? (But probably not in the stable channel I'm in?)
jluttine has quit [Ping timeout: 246 seconds]
<Arahael> Simplest workaround I'm guessing is to add it to the system configuration file and let root do the nixos-rebuild?
<{^_^}> [nix] @layus opened pull request #2491 → Simplify handling of extra '}' → https://git.io/fx9KY
b1000101 has quit [Ping timeout: 256 seconds]
<ottidmes> Arahael: yeah, I have a pkgs folder in config folder with an overlay, and when I have such a situation, I just copy over the package file and reference it in the overlay
<adamantium> Can someone tell me: easiest way to setup a stupid-simple haskell develop environment(for learning the language) using nixos?
<adamantium> I google, and it seems like everyone is doing it differently. I just wanted to play with it, try and learn some things.
<ottidmes> Arahael: if you want more details, just ask
<ottidmes> adamantium: I can give you something that works well, but I am quite clear its not the "right way" to do it
mbrgm has quit [Quit: ZNC 1.7.1 - https://znc.in]
mbrgm has joined #nixos
<adamantium> like i'm not sure if i should install stack or cabal or just use nixpkgs for the whole thing or use docker or blah blah...
<adamantium> What I need, might be, a recommended strategy
<adamantium> Something to that effect..
<{^_^}> [nixpkgs] @Infinisil merged pull request #49184 → python36Packages.bokeh: 0.13.0 -> 1.0.0 → https://git.io/fx9ZR
<{^_^}> [nixpkgs] @Infinisil pushed 2 commits to master: https://git.io/fx9K2
b has joined #nixos
<ottidmes> adamantium: I use this as my shell.nix (so with nix-shell): https://pastebin.com/kaxRew5H
<ottidmes> adamantium: this should help too: https://github.com/Gabriel439/haskell-nix
jluttine has joined #nixos
<adamantium> okay, looking at the second one, I think this maybe what I was asking about.
<{^_^}> [nixpkgs] @charles-dyfis-net opened pull request #49200 → mksquashfs: incorporate 4k-alignment option patch → https://git.io/fx9Kd
<adamantium> ottidmes: perhaps i want to do his so-called "workflow 1", and consider the second way later.
jsgrant has joined #nixos
<ottidmes> adamantium: I haven't looked at them in depth myself, but assuming workflow 2 is more involved to setup properly, that seems like a good strategy :)
<adamantium> ty
<Arahael> ottidmes: That's a little byond me today, I've only just started using nixos!
<Arahael> ottidmes: I'll ask another time :)
<ottidmes> Arahael: its actually not that scary
pie__ has joined #nixos
<Arahael> ottidmes: The issue is the time and energy, and I don't feel like dev this morning.
<Arahael> ottidmes: I could bookmark a link if you already have instructions written down, though - I might do it this afternoon.
<ottidmes> Arahael: nixpkgs.overlays = [ (self: super: { dwarf-fortress = super.callPackage ./dwarf-fortress { }; }) ];
<Arahael> ottidmes: Now I'm going to have to ask what that does. :)
<ottidmes> Arahael: where dwarf-fortress is a folder with the copied from master branch default.nix file
<Arahael> ottidmes: I put that expression in a mydwarf-fortress.nix file?
<ottidmes> Arahael: no, in your configuration.nix
pie_ has quit [Ping timeout: 272 seconds]
<pbogdan> Arahael: AFAICT the fix was backported and should already be in 18.09 (stable channel)? is your channel out of date perhaps?
catid has quit [Quit: WeeChat 2.1]
<Arahael> pbogdan: I only installed it a few days ago?
<{^_^}> [nixpkgs] @Infinisil merged pull request #49046 → python36Packages.colander: 1.4 -> 1.5.1 → https://git.io/fx17P
<{^_^}> [nixpkgs] @Infinisil pushed 2 commits to master: https://git.io/fx96u
<Arahael> Looks like i can have a user-specific config file in ~/.config/nixpkgs/config.nix, will put that line in it.
<ottidmes> Arahael: that line I gave you is not going to work for ~/.config/nixpkgs/config.nix
<Arahael> ottidmes: So it needs to be in /etc/nixos/configuration.nix? (What's the difference?)
clever has quit [Ping timeout: 260 seconds]
<ottidmes> Arahael: /etc/nixos/configuration.nix is system wide and ~/.config/nixpkgs/config.nix is user specific, and nixpkgs.overlays is an option that overlays the nixpkgs given to the system wide configuration
<Arahael> ottidmes: So overlays are a thing that user-specific configurations don't have?