<jackdk>
wrkzk[m]: I don't know the lua infrastructure but may be able to help. What package are you trying to build and what have you tried so far? (snippets in a pastebin, if you got 'em)
<jackdk>
also, the act of formulating the question can often help find an answer
<lovesegfault>
Sure, let me try:
* jackdk
used poetry2nix once, half a year ago, and has forgotten most of it. But will see if I can help
<lovesegfault>
if I have a development shell that is using poetry2nix.mkPoetryEnv as a buildInput, how can I get `pytest` to work? I keep getting ModuleNotFoundError: No module named 'myPackage'
<lovesegfault>
if I add `checkPhase = "pytest -v -Wdefault"` to my mkPoetryApplication, it runs the tests just fine, but if I run the same in my dev shell it fails b/c it can't find the module for the package I'm developing
<jackdk>
can you pastebin your shell.nix?
ddellacosta has quit [Remote host closed the connection]
<lovesegfault>
it's using flakes, but the devShell is what the shell.nix would be
<jackdk>
lovesegfault: thanks for the pointer. AFAICT from the poetry2nix docs, it appears to be calling things correctly, so I'd start asking if the poetry file/lockfile are correct
ahmedelgabri has quit [Ping timeout: 260 seconds]
<lovesegfault>
I suspect it's a poetry error, yeat
<lovesegfault>
like, I need to tell pytest somehow where the package is, or something
jgt_ has quit [Ping timeout: 252 seconds]
<jackdk>
or something like "the dev shell isn't loading all the modules into a path" or "you need a pyTestWithModules" or something. But this is beyond my ken, sorry
jgt_ has joined #nixos
ddellacosta has joined #nixos
aml has joined #nixos
strobelight has quit [Quit: quit, cya!]
<lovesegfault>
Okay, i can repro with an empty project I created with `poetry new --src foo`
<johnw>
is it possible to coerce an attrset to a string if I wanted to? There's a text file I'm writing out that happens to use a syntax almost identical to attrsets, so I want to "render" a Nix attrset to a text file with the same form.
jgt_ has joined #nixos
<jackdk>
infinisil++
<{^_^}>
infinisil's karma got increased to 419
<infinisil>
:)
<johnw>
found it: lib.generators.toPretty {} ...
<infinisil>
johnw: Note that this isn't necessarily a reversible printing
<johnw>
it's OK with me
<Henson>
johnw: good find
tarruda3 has joined #nixos
<infinisil>
Reminds me of my slightly overengineerd #98761
<xenophile>
Hello! So I'm using the startx display manager service and for some reason it hangs for like 5-10 seconds before starting the tty login. Any suggestions?
<xenophile>
After disabling network manager and dhcp it seems to speed up for some reason. But the other display managers seem to start much faster even with those enabled?
<{^_^}>
[nixpkgs] @talyz opened pull request #121689 → nixos/keycloak: Revert databaseUsername behavior and document custom local database use → https://github.com/NixOS/nixpkgs/pull/121689
<MysteriousSilver>
Hi! How do i exclude packages from updating? I've installed emacsGcc but i don't want to update it often.
ddellac__ has joined #nixos
andycandy has joined #nixos
stree has joined #nixos
<a12l>
We're some people trying to build Arcan (https://github.com/letoram/arcan) using Nix, and we have some problem with setting the SETUID bit for a binary. Building the project produces several binaries, where `arcan` is one of them. After building the project CMake tries to set the SETUID bit for that binary. What's the solution? We currently remove that line using a simple patch, just to get stuff building and work (but not
<qyliss>
a12l: a NixOS module with a setuid wrapper
<a12l>
I've read that "securityWrappers" is what we need, but I can't find much documentation on it, and no examples in Nixpkgs. Maybe I haven't looked hard enough, but it feels that we're looking at the wrong place?
<qyliss>
a12l: the NixOS option to look for is security.wrappers
<a12l>
qyliss: Thanks! Have I understood it correctly that NixOS modules only works on NixOS, and not on Nix in general?
<qyliss>
correct
<qyliss>
there is no portable way to do setuid with Nix
<qyliss>
on other distributions, people will have to make their own arrangements, or run it as root
<__monty__>
I'm building an expression (-E) and I get an error that the result isn't allowed to refer to certain paths. --show-trace doesn't show anything (because it's not an eval error I guess) and --keep-failed keeps an empty tmp dir. What's the next step in troubleshooting something like this?
<qyliss>
__monty__: does it tell you which paths?
<__monty__>
Yes, it does. Some llvm 7.1.0 paths.
<MysteriousSilver>
Hi! How do i exclude packages from updating? I've installed emacsGcc but i don't want to update it often.
<lukegb>
You could try adding the breakpointHook if you want to inspect the build
<dutchie>
MysteriousSilver: you can use a reference to a particular nixpkgs revision, or try a more holistic approach like niv or flakes
<__monty__>
lukegb: I'm on macOS.
<MysteriousSilver>
sorry, i do not know much about nix, how'd i do that? (and emacsGcc isn't from the official repos)
<qyliss>
__monty__: what is it you want to debug? do you want to find where it's being banned from using those paths, or do you want to find out why it's including them?
<__monty__>
The latter. I've generated bootstrap-tools based on LLVM 11 and bumped the darwin stdenv and all-packages LLVMs. But somehow LLVM 7.1.0 is sneaking into the build : /
<__monty__>
The only thing I can think of is the bootstrap-tools *were* generated using an llvm 7 stdenv but that's unavoidable.
<qyliss>
--keep-failed being empty is a bit strange
<qyliss>
is something clearing it out near the end of the build?
<qyliss>
maybe you could add preInstall = "exit 1" or something to avoid that
ddellaco_ has joined #nixos
ddellac__ has joined #nixos
<__monty__>
I think it's because the build doesn't really fail but actually generates an output and the problem is that output refers to some naughty paths?
<{^_^}>
[nixpkgs] @sternenseemann pushed 60 commits to haskell-updates: https://git.io/J3a0z
ddellac__ has joined #nixos
oxalica has joined #nixos
ddellaco_ has quit [Remote host closed the connection]
ddellac__ has quit [Ping timeout: 246 seconds]
riksteri has joined #nixos
saschagrunert has quit [Remote host closed the connection]
<matthewcroughan>
DavHau[m]: Hey! I've been trying to come up with a way to ad-hoc use mach-nix on the cli and tried this: nix shell github:davhau/mach-nix#gen.shellWith.mkdocs
cole-h has joined #nixos
<matthewcroughan>
The result is that magch-nix fails with `*** Python 'env' attributes are intended for interactive nix-shell sessions, not for building! ***`
<matthewcroughan>
how can I get directly into a shell like this? I'm close, I can feel it :D
beertoagunfight has quit [Quit: beertoagunfight]
beertoagunfight has joined #nixos
beertoagunfight has quit [Read error: Connection reset by peer]
<matthewcroughan>
Ah!
<matthewcroughan>
I figured it out: nix shell github:davhau/mach-nix#gen.pythonWith.mkdocs.setuptools
<matthewcroughan>
that'll get mkdocs/setuptools from pypi and put them in the shell.
<kfajdsl>
I'm trying to make a nix expression for the pypi version of firebase-admin, but I'm running into problems wrangling its fairly large dependency tree with a lot of packages not packaged in nixpkgs (mostly google packages). This is what I have so far, which I didn't expect to work: https://pastebin.com/P9q9Sj7H. So would I have to package all of those dependencies individually? If so, I'll probably just revert to using pip and a
<kfajdsl>
requirements.txt, though I'd rather not :S
<kfajdsl>
This is just a one off script to wrangle some old data in firestore (we're using postgresql now ;) ) so honestly the dirty way works best. Thanks though!
NeoCron has joined #nixos
andreas303 has quit [Quit: andreas303]
ddellac__ has joined #nixos
andreas303 has joined #nixos
ddellac__ has quit [Ping timeout: 246 seconds]
andreas303 has quit [Remote host closed the connection]
thblt has left #nixos ["ERC (IRC client for Emacs 28.0.50)"]
<__monty__>
I'm still stuck on troubleshooting why darwin-stdenv ends up referring to llvm 7.1.0. Here's the only information I've managed to gather, https://git.io/J3VvA Any suggestions of next steps?
proofofkeags has joined #nixos
<{^_^}>
[nixpkgs] @sternenseemann pushed to haskell-updates « ihaskell: clean up unnecessary doJailbreaks »: https://git.io/J3VJU
iori1 has joined #nixos
ddellac__ has quit [Remote host closed the connection]
<cyril__>
Hi, I'm having a strange issue with shell.nix and direnv. I've spent hours trying to figure it out and I'm sure this is something stupid I'm overlooking. In my shellHook, aliases do not work; I can export FOO=bar and that works, but something like alias lol="ls -l" doesn't
<lovesegfault>
cyril__: Are you using a shell other than bash by any chance?
ddellacosta has joined #nixos
<cransom>
iirc aliases don't translate in the shellhook.
<cyril__>
I don't understand why that works without direnv but silently does not work with direnv. I'm assuming I'm not understanding something fundamental about direnv here?
<cransom>
my statement was for direnv, specifically.
<Krner[m]>
hello has been someone using stand alone pulse under WM? i have noticed that pulse installed that way refuses connection to literally everything, pulse runs but no sound, cant change volume in any way, everything is rejected, any clue what might bee happening there?
karantan has joined #nixos
ml| has joined #nixos
cyril__ has quit [Quit: Connection closed]
xcmw has quit [Quit: My MacBook has gone to sleep. ZZZzzz…]
xcmw has joined #nixos
<lordcirth>
Krner[m], is your user in the "audio" group?
xcmw has quit [Client Quit]
<ploupiboulba[m]>
I am running 2.4pre20210503_6d2553a and keeps seeing " does not have wanted outputs 'dev,out'" when launching nix-shell. Is it a known problem ?
rajivr has quit [Quit: Connection closed for inactivity]
Lord_of_Life has quit [Read error: Connection reset by peer]
<Frosku>
What would it take to run nixos without systemd, theoretically>
<Frosku>
I'm not asking with the intention to actually do it (at least not now), just wondering if it's possible.
Lord_of_Life has joined #nixos
tarruda3 has quit [Ping timeout: 265 seconds]
sangoma has joined #nixos
<simpson>
Frosku: What *is* a GNU/Linux distribution without an initial process? Or do you just want some other process management system instead?
supercoven_ has quit [Ping timeout: 240 seconds]
<Frosku>
simpson: I'd be using a different init system like runit or openrc
tarruda3 has joined #nixos
<simpson>
There's work on an s6 version, IIRC, but I don't remember who was working on it. In general, we don't have an active effort to use any init system, but there's been many discussions.
<Frosku>
I'd definitely like to help whoever's doing that
<Frosku>
I love nixos but still not a fan of systemd :D
<pennae>
sounds like it'd be an immense amount of work, with all the modules generating systemd services at the center of things
<simpson>
Sure, systemd is terrible. Most userland code is terrible, as a special case of Sturgeon's Law.
<Frosku>
pennae: Quite likely, but gentoo and others manage it so it'd be interesting to explore.
<simpson>
pennae: There's an old technique known as the Facade Pattern. We'd build an abstraction layer (the "facade"), and then incrementally rewrite modules to each use the abstraction layer.
<Frosku>
I'd be OK with writing my own init files if needed
<Frosku>
But systemd is a lot more than an init system
<pennae>
simpson: i mean, sure. but that has to be built too, and somehow-reasonably emulate many systemd features without introducing security bugs
exondation has joined #nixos
<simpson>
pennae: The facade still uses the systemd API behind the scenes. The idea is that other init systems could be arranged to also implement the facade's API.
<simpson>
Frosku: Kind of? But not in a way that can't be coded up. It's like a sum type; a valid systemd replacement could be systemd itself, or s6 and vixie-cron, or s6 and BSD cron, or etc.
<Frosku>
Are we assuming that systemd doesn't have security bugs pennae? :P
Andoriyu has joined #nixos
ddellac__ has quit [Ping timeout: 252 seconds]
<qyliss>
simpson: I made a prototype of an s6 version years ago, but only got as far as booting it. I'm not aware of anybody else working on it (although I'd be delighted to learn otherwise!)
<pennae>
Frosku: "not introducing any" does not imply that there's none to begin with.
<simpson>
Frosku: Security bugs in the deployed daemon are not security bugs in how NixOS configures things. Nothing about systemd innately compromises Nix's security model, AFAIK. (Happy to learn, though!)
cr4y1 has quit [Ping timeout: 260 seconds]
<qyliss>
but that doesn't address running any services
<qyliss>
which is where most of the coupling the systemd is
<simpson>
Yeah, I figure that the keystone of any implementation will be the ability to *reload* a running init daemon and get the runlevel re-evaluated, starting and stopping units.
<Frosku>
So the first step would be an abstracted init layer?
<Frosku>
And a systemd implementation against that abstraction
fendor has quit [Remote host closed the connection]
<Baughn>
Are there solutions other than nixops (or bare nixos-rebuild --target-host) which I should look at for managing multiple machines?
<Baughn>
Nixops itself is not super useful, since it only really works from a single machine and there are multiple admins. We'd like to keep the configuration in a git repository, so --target-host seems fair, but it does lose a lot of functionality.
<lukegb>
I use a pile of jank to automatically deploy machines from gitlab ci
<lordcirth>
Baughn, you can just have an admin host.
<Baughn>
Too expensive. :/
<lordcirth>
Doesn't always have to be real hardware
waleee-cl has joined #nixos
<Baughn>
I'll consider it, but it's not likely to be the solution.
fendor has joined #nixos
justanotheruser has quit [Ping timeout: 250 seconds]
alschaapman has joined #nixos
cr4y1 has joined #nixos
fendor_ has joined #nixos
<alschaapman>
My installation has failed, without much in the way of helpful errors. Can anyone help me troubleshoot?
<simpson>
alschaapman: I think that your installation is almost complete, actually. I would consider taking that final expression, which bootstraps nix-env and other tools for you, and running it in a *fresh* terminal. Nix relies on some stuff in your environment being set up correctly; you might have to check your .zshrc.
<afontain_>
hopefully a service manager, designed and with sturdy foundation can come out of this
<Frosku>
I just want an init system/service manager that doesn't try to do everything else
rj has joined #nixos
<simpson>
And I want a capability-safe desktop environment for daily use.
<Frosku>
pid 1 running as uid 0 probably shouldn't be this complex
<Baughn>
It isn't, particularly?
<Baughn>
systemd isn't a single binary. It's lots of binaries.
<simpson>
And PID 1 is well-known to have specific needs which are not complex at all: https://ewontfix.com/14/
<Frosku>
simpson: I'm not sure I follow, anyways I'm not trying to start a debate, if there's something I love about GNU/Linux it's that we can all run it how we want to.
<alschaapman>
Baughn: This is an Intel Mac. A very old one.
<afontain_>
and likewise, s6-init is just a binary
<Frosku>
If people want to run systemd, that's fine
<alschaapman>
And as such, running Catalina, it has unofficial patches. That may be causing problems.
<Baughn>
alschaapman: Likely environmental, then. I second s's suggestion.
<alschaapman>
Homebrew won't work at all on this thing. I've even tried building the binaries locally, disabling whatever flag they applied that makes it incompatible with the older generation chips. Still no luck
<alschaapman>
I'll try the installer again. I'm certainly hoping Nix works out better for me than Homebrew
<alschaapman>
Really need some packages
<simpson>
Frosku: I think you know what memory-safety is. Capability-safety is the next step after that, where the ability to run code cannot be forged without permission.
<simpson>
This is relevant to Nix because Nix is a transitional system on the path to treating packages as capabilities; think of Nix store paths as "unguessable" or hard-to-guess.
<qyliss>
alschaapman: just in case you don't get Nix working, I'd look into pkgsrc next if I were you. they're very likely to care about your old hardware, ime
<qyliss>
(but Nix is great, and I hope you manage to get it working :))
ManiacOfMadness has quit [Ping timeout: 240 seconds]
<Baughn>
Actually, if it's an *old* intel mac, you might be able to run NixOS on it.
<alschaapman>
I only have it for the remaining sliver of necessary macOS-only software
<alschaapman>
Would rather defeat the purpose
xcmw has joined #nixos
zebrag has joined #nixos
<simpson>
Sure. This is the common scenario where Nix is preferable to Homebrew; understandable.
xcmw has quit [Client Quit]
<alschaapman>
Does Homebrew have more packages?
<alschaapman>
For now I'm pretty sure I just need bash, autossh, and tinc.
<alschaapman>
I feel like I used to know where to find a list of all the packages available for x86_64-darwin, but if it's on the main package search at nixos.org, I don't see it
ddellac__ has joined #nixos
<lunik1>
nixpkgs has more, not a perfect measure but repology lists 5423 in homebrew and 56631 in nixpkgs unstable
<lunik1>
but many of those will be linux-only stuff, repology doesn't have a number for -darwin
<cransom>
i'd consider repology to be a gross over representation. it includes things like multiple haskell versions as well.
<alschaapman>
I bet the homebrew number doesn't include casks either
<alschaapman>
Are there any graphical programs available as Nix packages on macOS?
<alschaapman>
If I get openssh from Nix, will my SSH keys in Keychain still get added to the agent?
tarruda3 has joined #nixos
woffs has joined #nixos
<alschaapman>
Apparently Apple in their infinite wisdom have decided to distribute OpenSSH in a form that does not allow changing the listen port without modifying files owned by the system.
<clever>
alschaapman: ssh just connets to whatever agent is on the far end of $SSH_AUTH_SOCK
<alschaapman>
Remember when Apple didn't suck? I remember. Good days.
<alschaapman>
I think at this point they may actually be worse than Microsoft and that's really amazing
<clever>
what does `echo $SSH_AUTH_SOCK` report on a mac?
sangoma has joined #nixos
<clever>
alschaapman: i think thats part of them locking down on security, in preparation to ipad-ify everything
<alschaapman>
It is *LESS SECURE* to leave commonly abused network applications listening on well-known ports
<clever>
alschaapman: changing the port does nothing to help your security
<clever>
you should instead disable password auth
<alschaapman>
I don't believe that's true...
<clever>
alschaapman: it only takes slightly more time to scan every port, try to connect, and probe what service is listening
<alschaapman>
Exactly
<alschaapman>
Slightly more time
ahmed_elgabri has joined #nixos
<clever>
alschaapman: that doesnt really buy you much, enless you plan the change the port hourly
<alschaapman>
Meaning an attacker who's probing many, many potential targets at a time will be less likely to do that
<alschaapman>
If someone is specifically targeting my host, I'm under no illusion that any security measures I've taken is going to provide me outstanding protection
<clever>
and how much they actually help
<clever>
alschaapman: also, if your router is doing its job, it doesnt matter what port your listening on, its blocked
<alschaapman>
clever: There are in fact host/port combinations on this network that are exposed to the public internet.
<alschaapman>
I would not really care to make port 22 one of them.
<alschaapman>
If I know how to modify my router's firewall configuration to make the proper port available, the fact that the blocker is macOS's lack of capability to just make the daemon listen on another port is utterly bonkers.
ahmedelgabri has quit [Ping timeout: 276 seconds]
<clever>
alschaapman: your router can also forward port 1234 to 22, so the exposed port is still non-standard
exondation has quit [Ping timeout: 276 seconds]
<alschaapman>
clever: I'm increasingly thinking that's the solution I'm going to go with
<alschaapman>
Worse than Microsoft...
maisem_ has joined #nixos
<clever>
alschaapman: you can also just disable that security, and then edit anything you want
<alschaapman>
What, turn SIP off?
<alschaapman>
Nah. More trouble than it's worth
<clever>
yes
<alschaapman>
I think the rationale for Apple's security model with SIP is sound. It's only implementation details like this that end up being a pain in the ass
<alschaapman>
And anyway, I think it's not SIP itself that's the problem here -- even if I went ahead and edited the system files, they'd be wiped out on upgrade anyway
<alschaapman>
That's no solution
furrymcgee has quit [Quit: leaving]
<alschaapman>
I don't even edit system files on Linux, which I use all the time and which gives me the actual capability
maisem has quit [Ping timeout: 240 seconds]
<afontain_>
can't you start the daemon manually with the right flags?
maisem_ has quit [Client Quit]
<alschaapman>
afontain_: Or a custom launch daemon, possibly
<SumnerEvans[m]>
What is the best way to test the build of a single package in nixpkgs?
<clever>
SumnerEvans[m]: nix-build '<nixpkgs>' -A hello
<afontain_>
nix-build . -A hello if it's local
<afontain_>
(a loacally-modified version of nixpkgs)
<afontain_>
*locally
<SumnerEvans[m]>
afontain: thanks! That's exactly what I needed.
<clever>
. is the default as well
<clever>
`nix-build -A hello`
gustavderdrache has quit [Quit: Leaving.]
<SumnerEvans[m]>
The more you know. Thanks!
chisui has joined #nixos
Gooberpatrol66 has quit [Remote host closed the connection]
<clever>
sterni: 2nd link shows what it is hashing
<pennae>
having to use names that orders before users to have an activation script run before the users fragment feels terrible
<clever>
pennae: lib.mkBefore ?
<pennae>
clever: activation scripts don't use that mechanism
<s1341_>
ok... that somehow got expanded to this: -resource-dir /nix/store/dcdc9rjhr0nb6n1dbv6myggg33lwlzr6-clang-12.0.0/bin/nix/store/wrccaywl0g6wv1scjd6szdssg8v7wcy4-clang-12.0.0-lib/lib/clang/12.0.0
<clever>
pennae: what if you use the deps mechanism, to make users depend on your thing?
<s1341_>
nm... it's because CLANG_RESOURCE_DIR needs to be a relative path....
<{^_^}>
[nix] @andersk opened pull request #4771 → launchd: Use exec to avoid leaving the extra shell wrapper running → https://github.com/NixOS/nix/pull/4771
ahmed_elgabri has quit [Ping timeout: 276 seconds]
ddellacosta has quit [Remote host closed the connection]
ddellacosta has joined #nixos
ddellacosta has quit [Read error: Connection reset by peer]
<Kinnison>
Is there a simple way, given a system configuration (as a flake) to resolve the entire config tree and then allow me to interrogate it (perhaps in the repl?)
<cole-h>
It uses Eelco's flake-compat to hook into the `nixosConfigurations` output of my flake
<cole-h>
since a system is just a derivation, it lets me interrogate the config generated for `nixosConfigurations.hostname` (where `hostname` is `scadrial` in my case)
<Kinnison>
Cool, turns out my thought on the config was wrong anyway, but I'll bookmark that for further thought
* Kinnison
is just trying to work out what has caused gnome-shell to be in my system
<Kinnison>
(I use mate)
<cole-h>
For that, you'd probably want to use `nix why-depends`
<Kinnison>
I think gnome-session and more is present too
<Kinnison>
can I ask why-depends /nix/var/nix/profiles/system somepkg ?
zupo has quit [Quit: My MacBook has gone to sleep. ZZZzzz…]
<Kinnison>
Okay, by inspection of nix files it turns out that if you use gdm, even for non-gnome on X11, it forces gnome-session and gnome-shell to be around, for wayland reasons
ddellaco_ has quit [Remote host closed the connection]
ddellacosta has joined #nixos
<CRTified[m]>
Hi, does anyone has a config for the rpi3b+ at hand where wifi works? According to `ip a` and the wpa_supplicant log, there is a connection, but the RPi is not reachable over wifi and wpa_supplicant also complains about "RRM: Ignoring radio measurement request: Not RRM network". I'm on nixos-21.05pre286925.3e62e383f4b, the RPi is set up with nixops and using linuxPackages_latest (_rpi3 won't build on my x86 host)
<cole-h>
You might have a better time in #nixos-aarch64
rj has joined #nixos
jgt_ has joined #nixos
Synthetica has joined #nixos
gustavderdrache has quit [Quit: Leaving.]
ddellacosta has quit [Ping timeout: 265 seconds]
vidbina_ has joined #nixos
HedgeMage has joined #nixos
stree has joined #nixos
jgt_ has quit [Ping timeout: 240 seconds]
sss has joined #nixos
vidbina_ has quit [Ping timeout: 252 seconds]
<pie_>
,locate ld.so
<{^_^}>
Found in packages: man-pages, factor-lang, opencryptoki
chisui has quit [Quit: Connection closed]
<joedevivo>
cole-h: have a minute to talk ssm-agent? tl;dr - I couldn't connect to the EC2 instance running a 21.05pre AMI until I added this exact file (https://github.com/aws/amazon-ssm-agent/blob/3.0.755.0/amazon-ssm-agent.json.template) to /etc/amazon/ssm/amazon-ssm-agent.json.template by way of my configuration.nix. If that's the right way to do it, I'm happy to add that bit to the nixos module
<HedgeMage>
Hey there. I have a build that is trying to build a known-insecure package (yay for notifying me!), but the help text suggests ways to allow its installation (yuck! who do I talk to about changing this?). What I want to know is to find out what is pulling in this package as a dependency so I can deal with the issue. What's the easy search command for that on nixos?
Agustin2021 has quit [Quit: Connection closed]
<joedevivo>
HedgeMage: ymmv, but I've found nix-tree useful for getting to the bottom of what's in a build
<CRTified[m]>
nix why-depends might also help
<cole-h>
joedevivo: Looking at their repo, it seems like that is indeed necessary / a good idea, so feel free to open a PR :) I don't actually use it -- I just updated it for a client (and tested it with their assistance)
<joedevivo>
Thanks. just wanted to make sure I was doing it right before putting that together :D