<clever>
joepie91: that url is a mirror for all tarballs downloaded via fetchurl
<clever>
joepie91: thats the one
<clever>
joepie91: hardware.32bit something in configuration.nix
<clever>
viric: and if real-onlu is an option, squashfs
<clever>
viric: i generaly just go zfs for that kind of thing
<clever>
spinus: but qtbase is an attribute within qt5, and overriding the qtbase passed to other qt utils will be tricky
<clever>
NickHu: nix-store --query --tree
<clever>
cant currently open links
<clever>
McK: i'm also unable to build chrome with widevine
<clever>
nope, it doesnt
<clever>
hotfuzz: forcing rpcbind to on may break the recursion
<clever>
hotfuzz: and the status of rpcbind depends on the presense of nfs in the list of supported filesystems, which depends on the entire filesystems attrset
<clever>
hotfuzz: if rpcbind is enabled, the rpc user gets auto-created
<clever>
Bisecting: 8686 revisions left to test after this (roughly 13 steps)
<clever>
hotfuzz: i can confirm that ~11000 commits ago, nixpkgs accepted that
<clever>
thats my first guess
<clever>
and now the fs list depends on the user list
<clever>
hotfuzz: i think the list of supported filesystems has an impact on the available users, automaticaly installing programs (and users) to add fs support
<clever>
ah, which is also in your config
<clever>
hotfuzz: and its somehow involved in users.extraUsers
<clever>
hotfuzz: this does appear in the backtrace
<clever>
while evaluating the option `fileSystems./var/lib/mpd/music.options':
<clever>
hotfuzz: and that kind of config is better put into configuration.nix
<clever>
dtzWill: no matter how little you delete, nix wants to review .links for any file with a link-count of 1 (only the .link entry)
<clever>
dtzWill: i have also been thinking about tiering, trying to delete even 1 storepath with nix-store --delete takes anywhere from 2 minutes to 30minutes
<clever>
sziszi: nix-env -f .nixpkgs/config.nix just wont work, you have to point -f to the default.nix at the root of a nixpkgs tree, and that nixpkgs then has to load a config.nix
<clever>
just missed him
<clever>
oops
<clever>
nil: its in the nixUnstable attribute
<clever>
globin: and the new nixUnstable has "nix log" which i think can query the binary cache for logs
<clever>
bkchr: they all go into the main /nix/store/
<clever>
MichaelRaskin: there are also 2 things keeping the boot profile in the store, /run/booted-system is the main one, but the /proc/*/exe symlinks also root anything running, so the old systemd and dbus and stuff that cant easily restart, are rooting their closures
<clever>
and i prefer to test rebooting before deleting generations
<clever>
yeah, but if you set a 30d limit, it will keep 1 generation from beyond that 30d limit
<clever>
c74d: so it knows when you stopped using x
<clever>
c74d: i think --delete-older-than uses the timestamp of generation x+1 to figure out if it should delete x
<clever>
MichaelRaskin: so its better to pin an exact build with readlink
<clever>
MichaelRaskin: ahh yeah, the system-0-link will point to the currently booted nixos, not the one the bootloader points to
<clever>
c74d: that will leave several backups in place
<clever>
c74d: i generaly dont garbage collect everything, there is also --delete-older-than
<clever>
MichaelRaskin: i have been interested in configuring fallback in grub to make nixos more bullet proof in remote settings
<clever>
do you always want 0 to change to the last thing you booted with?, or do you want to pin the current one as 0?
<clever>
depends a lot on what you want also
<clever>
then 0 will always be the one you booted with now
<clever>
might be better to ln -sv $(readlink /run/booted-system) /nix/var/nix/profiles/system-0-link
<clever>
that should work, though gen 0 will change each time you reboot
<clever>
c74d: same rules should apply with any bootloader
<clever>
and /run/booted-system is only a gc root to prevent garbage collection, but it wont force it into the grub.conf
<clever>
but only generations listed in /nix/var/nix/profiles/system* will be in grub.conf
<clever>
and similiar problem, the system just rolling back all changes at every reboot
<clever>
then it just doesnt know about the only generation left, and cant boot
<clever>
so it updated the grub.conf in the rootfs, and not on the /boot partition
<clever>
i have also seen problems in the past, where people managed to not mount /boot
<clever>
c74d: you have to re-run nixos-rebuild switch/boot to regen that
<clever>
c74d: nix-collect-garbage doesnt know how to update the bootloader
<clever>
niksnut: so the nix-daemon appears to be unable to sign things its passing to nix copy?
<clever>
niksnut: even if i put a secret-key-files and matching binary-cache-public-keys in nix.conf
<clever>
niksnut: oh yeah, when using "nix copy --to local?root=/mnt" it complains about things not being signed, i had to pass a --option to entirely disable signatures
<clever>
i sometimes had to dig thru 5 pages of hydra jobs to find the right jobset and build for something
<clever>
ah, that would solve the problem ive noticed that "nix-store -l" can only get logs for locally built things
<clever>
srhb: after typing in part of a command and the "(reverse-i-search)`pub': vi pubkeys" stuff appears, you can just hit up/down arrow to cancel the search, and it will seek the history relative to the result
<clever>
niksnut: yeah, and you can also use up/down arrow to seek relative to the result it found
<clever>
niksnut: ive always used <ctrl+r>nix-b style
<clever>
and /proc/PID/root is a special symlink, that can lead into (and out of!) chroots
<clever>
ToxicFrog: that lets you inspect the env variables for any process
<clever>
ToxicFrog: it may help to check "strings /proc/PID/environ"
<clever>
ToxicFrog: nix will build a directory and a wrapper script, and running that wrapper will automaticaly chroot into a dir and run steam
<clever>
sophiag: then nix-env and nixos-rebuild will share the overrides
<clever>
sophiag: you can also do nixpkgs.config = import /home/clever/.nixpkgs/config.nix;
2017-03-19
<clever>
joepie91: so line and column are available directly as int
<clever>
joepie91: only issue with that form, is that it will checkout the latest 16.09 every time you eval, and may update things without you noticing
<clever>
arianvp2_: probably simpler to use runCommand
<clever>
joepie91: its usingthe macro on 117 to programaticaly generate classes
<clever>
joepie91: the most complex part i can see is where Error gets defined, on line 124 of types.hh
<clever>
joepie91: currently, it will prefix the prefix_ variable with the line of stack, you could then either parse the whole thing, or store the data in a more structured manner
<clever>
joepie91: i just noticed, its calling .addPrefix on the error object that it keeps throwing to itself
<clever>
joepie91: oh, correction to the previous stack trace stuff
<clever>
ndowens08: i have ssh to a darwin box
<clever>
ndowens08: i get a bit OCD about knowing how things work, and have read a large chunk of the source behind the stdenv
<clever>
ndowens08: ah, i avoid editing those kinds of files, and i just know all of the mass-rebuild like things off the top of my head
<clever>
ndowens08: i never really bothered with nox review
<clever>
joepie91: ah, sounds like it needs to be a single global token for all of nixops, and ignore the per-machine ones
<clever>
joepie91: or is it that you need to inform nixops about the new token?
<clever>
joepie91: is it being remembered within a file nixops baked into the VM?
<clever>
joepie91: but usualy when tokens get rotated, the old token should become invalid
<clever>
joepie91: so i would either file a bug with digital ocean for needing a token from months ago, or store the token create used into the nixops database, so it knows how to destroy an instance
<clever>
joepie91: but its not clear how much time there can be between create and destroy
<clever>
joepie91: not sure what the right fix would be, sounds like there needs to be a global variable or some state somewhere, to remember which token to use at destroy
<clever>
joepie91: ive looked at its source and how it works, but i havent used nixops yet
<clever>
ndowens08: what happens if you try to "git fsck"?
<clever>
yeah
<clever>
joepie91: yeah, reversing it will be rather difficult
<clever>
jophish: this, without any runtime libraries
<clever>
std::cout << termcolor::red << termcolor::on_blue << "Red text on blue background!" < termcolor::reset << std::endl;
<clever>
and it will just substitute in the name of the lambda, and the position
<clever>
joepie91: looks like this instance of the function is responsible
<clever>
addErrorPrefix(e, "while evaluating %1%, called from %2%:\n", lambda, pos);
<clever>
but accessing the data from the previous/next line will be more difficult
<clever>
you can easily re-format what is currently displayed on one line
<clever>
until the eval in nix-instantiate errors
<clever>
and each time it throws, a different frame of callFunction catches it
<clever>
it will imperatively print each frame of the stack, as it re-throws the exception up the c++ stack
<clever>
so as the c stack unwinds, it can print the nix stack
<clever>
joepie91: it looks like every callFunction in the entire stack will catch the exception, print a line of nix stack, then re-throw the exception
<clever>
joepie91: hmmm, yeah, i can see the issue
<clever>
jophish: all setuid programs must be configured within security.wrappers from a nixos module, which will make a setuid wrapper within /run/wrappers/bin at runtime
<clever>
ozer: and a derivation needs enableParallelBuilding=true; in its expression to actualy use -j
2017-03-17
<clever>
tnias: this redirects both xen and dom0(linus) output to com1 at 38400 baud, you could then hook up a serial console on another machine and view output without a gpu
<clever>
steveeJ: nix will just automaticaly download them
<clever>
steveeJ: nix-shell uses some perl code to assemble a nearly identical runCommand when you use -p
<clever>
steveeJ: that allows routing a complex set of buildInputs into nix-shell
<clever>
steveeJ: the runcommand you linked, will run the commands in "", which will fail to produce $out, its designed for use with nix-shell, which doesnt actualy run them
<clever>
yeah
<clever>
hyper_ch: every time you hash a given password, it will come up differently
<clever>
hyper_ch: thats the salt, it prevents brute forcing
<clever>
just the minor cost of loosing the benefits of shadow
<clever>
hyper_ch: it also lets me make users on remote boxes that already have my pass
<clever>
hyper_ch: i just steal the hash out of /etc/shadow
<clever>
hyper_ch: then either the wrapper is missing, or somebody hard-coded the path for it
<clever>
a reboot would be needed to confirm
<clever>
which may or may not be related
<clever>
hyper_ch: and the comment you linked first, appears to be a lack of a setuid root wrapper on a vbox program
<clever>
hyper_ch: so $PATH is wrong and cant find the right sudo
<clever>
hyper_ch: 22914 is a result of upgrading nixos and the location of sudo changing
<clever>
hyper_ch: ive mainly used vbox with the user nat mode, so it didnt need any special config
<clever>
hyper_ch: becomes an issue when you have a multi-user system
<clever>
hyper_ch: otherwise, anybody that can read /nix/store can find your password
<clever>
hyper_ch: also, i prefer setting initialPasswordHash in configuration.nix