<clever>
turion: what does `echo "configurePhase"` say?
<clever>
and genericBuild auto-detects that for you
<clever>
but then you have to know if its been set or not
<clever>
that would turn all the newlines into spaces, it needs to be more like `eval "$configurePhase"`
<clever>
turion: `phases="configurePhase" genericBuild` is the simplest way to let nix pick the right one by the normal rules
<clever>
turion: configurePhase always refers to a bash function for the default, $configurePhase is the override
<clever>
turion: did you override configurePhase?
<clever>
weird, callPackage is missing from the ,callPackage help text!
<clever>
turion: but use nix-shell instead of nix-build
<clever>
,callPackage
<clever>
sb0: though, its still copying the src, and then basically doing `mkdir build ; cd build ; cmake ..`
<clever>
sb0: cmake already does that automatically
2020-05-05
<clever>
etu: lol
<clever>
etu: yeah, its a middle-man between the cpu and disk
<clever>
if your motherboard dies, your data is RIP :P
<clever>
etu: full disk encryption, seamless, no pw prompt, key is tied to the motherboard
<clever>
etu: theres also the apple T2 based disk encryption
<clever>
etu: and you now have no way of knowing how secure the disk actually is
<clever>
etu: i think the root problem, is that the api meant to be just a on/off switch, not proper crypto
<clever>
while still on
<clever>
azazel: yeah, it would have to be done by somebody that knows its drive-managed, and they would have to get their hands on a pc after it booted
<clever>
yeah, that too
<clever>
morgrimm: and then i can just dump everything
<clever>
morgrimm: in theory, if i remove the drive from the pc, without disconnecting power, it will continue to decrypt itself
<clever>
thats one of them, there are others in that area
<clever>
fresheyeball: cant remember the name of the tool
<clever>
fresheyeball: no real laws on what you can or cant do
<clever>
fresheyeball: for nix, it will just run the function in __functor, if you treat a set like a function
<clever>
morgrimm: sounds like it should just work
<clever>
fresheyeball: what are those laws?
<clever>
fresheyeball: what is that?
<clever>
fresheyeball: it lets you treat a set as-if it was a function
<clever>
morgrimm: sounds like your bios is being funny
<clever>
morgrimm: it should be showing uuid's like this
<clever>
Boot0004* UEFI OS HD(1,GPT,27c99b08-455d-4dfe-a44f-6150cbc09ef8,0x800,0x100000)/File(\EFI\BOOT\BOOTX64.EFI)..BO
<clever>
morgrimm: "linux boot manager" doesnt look right
<clever>
morgrimm: can you pastebin that all, and the output of `blkid /dev/sd*`
<clever>
morgrimm: might have been -v
<clever>
morgrimm: which uuid is in the efi vars (install efiboormgr) and if you have duplicate boot parititons
<clever>
morgrimm: what does `efibootmgr -V` and `fdisk -l` report?
<clever>
morgrimm: which bootloader are you using?
<clever>
morgrimm: depends on which bootloader and what config it has
<clever>
morgrimm: so the config in there said to delete them
<clever>
morgrimm: sounds like /boot wasnt mounted when you added the users
<clever>
pingiun: probably
<clever>
energizer: it will try to umount /
<clever>
energizer: yeah
<clever>
energizer: hardware-configuration.nix would be a reasonable way to do it, but use boot, not switch
<clever>
energizer: gchristensen has a blog post on that
<clever>
pingiun: no idea whats happening, but id get more of the backtrace (beyond frame 9) and then post it to an issue on github
<clever>
pingiun: the corefile is only of use with the binary that made it, run gdb against them (systemctl gdb <pid>) and then `bt`
<clever>
pingiun: yeah, would need a coredump and bt to know more
<clever>
pingiun: builtin:fetchurl means nix itself should just fork out a child proc, and run an internal function
<clever>
pingiun: and if its linux+systemd based, try turning on coredumpctl
<clever>
pingiun: run `nix show-derivation` on that drv to get its builder, then try just running that builder directly
2020-05-04
<clever>
glittershark: dang, not sure what else to try then
<clever>
glittershark: for a docker container, try adding glibcLocales to the contents list
<clever>
sphalerite: they patched linux to make namespacing require root by default, for any operation
<clever>
sphalerite: nice, but that will likely fail when debian disables user namespaces
<clever>
sphalerite: is that `nix run --store` also chroot'ing the `hello` binary as well??, or was it just working by chance due to deps in the real /nix/store ?
<clever>
energizer: you need to edit either the Makefile or the nix expr thats building it
<clever>
energizer: gcc then complained that no, cert, and file are not in scope
<clever>
energizer: which is ~3 variables, and a jumble of division and subtraction operations
<clever>
energizer: so it turned into the C code: setenv("NIX_SSL_CERT_FILE", /no-cert-file.crt);
<clever>
energizer: the /no-cert-file.crt wasnt double-quoted
<clever>
34 then takes a derivation from elsewhere (like default.nix), and overrides it, adding the 3 scripts to buildInputs
<clever>
lines 31-33 run the function from 11, to generate 3 scripts
<clever>
line 11 takes a set, and generates a bash script to run something from the dist folder (left-over from `cabal build`)
<clever>
line 3 makes a dir with a bunch of cfg files
<clever>
aanderse: and busybox's ls likely doesnt support --color
<clever>
aanderse: a common issue, is that `comand-not-found` will tell you to install busybox, because it has everything
<clever>
aanderse: `command ls -l /home/username/.nix-profile/bin/ls`
<clever>
reirob: what if you run cabal2nix on the cabal file manually?
<clever>
aanderse: what about `which ls`
<clever>
lol
<clever>
aanderse: what does `type ls` report?
<clever>
,pastebin
<clever>
reirob: it already loaded ghci, so its not a problem building ghci
<clever>
reirob: what is in release0.nix?
<clever>
reirob: are you using nix-shell when you get the linker errors?
<clever>
vandenoever: how much ram is nix using?
2020-05-03
<clever>
energizer: yeah, which means proot isnt working right
<clever>
energizer: load a normal dynamic library
<clever>
cole-h: add `-f '<nixpkgs>'`
<clever>
most programs use `isatty()` to figure out what stdout is
<clever>
genevino: or just throw `|cat` at the end i believe
<clever>
energizer: nope, its using LD_PRELOAD to overwrite glibc functions, and then prepends a string to all paths
<clever>
energizer: but then debian/ubuntu decided to get in the way, and make namespacing require root by default, and you have to specially allow non-root to use it
<clever>
energizer: nix-user-chroot uses namespacing, so it has better performance
<clever>
prusnak: i try to always use dockerTools.buildImage
<clever>
a static binary is the simplest answer
<clever>
but it might break if ubuntu has the "wrong" glibc
<clever>
you could just use patchelf to undo the rpath stuff
<clever>
Ralith_: you need to use the libraries that ubuntu provides, or you run the risk of compatability problems
<clever>
Ralith_: that will do exactly what you want, to generate deb and rpm packages of nix itself
<clever>
siers: just put an unquoted path in your nix expr
<clever>
cole-h: have fun typing that over a 7bit serial link
<clever>
colemickens: thats when you bust out your thesaurus!
<clever>
though, some of my machines just lack a hardware-configuration.nix entirely
<clever>
energizer: i try to keep all the changes to configuration.nix, in theory, you should be re-running nixos-generate-config to update hardware-configuration.nix
<clever>
jboy46: store a db version# in the db, and in the prestart for your service, check what it is, and apply migrations based on the number
<clever>
dmj`: yes
<clever>
adisbladis: nope
<clever>
adisbladis: ahh, looks like its more about adding a sudo replacement?
<clever>
keithy[m]: each user has its own list of channels, you can `nix-channel --list` to see them
<clever>
dmj`: its in the man page for nix-store
<clever>
keithy[m]: as root, `nix-channel --add <url> nixos`, then `nixos-rebuild switch --upgrade`
<clever>
adisbladis: i would just use sudo, `sudo -u foo <cmd>`
<clever>
keithy[m]: check the release-19.09 branch on github, and you should see it agree with you now
<clever>
dmj`: sign things with `nix sign-paths` or set a secret key in nix.conf so it signs everything
<clever>
keithy[m]: sudo nix-channel --list
<clever>
keithy[m]: which channel are you on?
<clever>
dmj`: only if you have nix-daemon setup and the store permissions restricted to root
<clever>
dmj`: if you have +w to /nix/store, you are trusted automatically
<clever>
das-g[m]: you can also use nix-copy-closure to copy the drv file out of the machine, then nix-build it, and nix-copy-closure the product back out
<clever>
das-g[m]: NIX_REMOTE=local may force it to stop, but simpler to just make a key
<clever>
das-g[m]: it may be spawning the ssh from nix-daemon, which breaks the forwarding chain
<clever>
you should see it in required features
<clever>
das-g[m]: if you run `nix show-derivation` on the drv for linux
<clever>
das-g[m]: building a kernel requires a special feature flag
<clever>
dxtr: its best to build it with nix and have it live in /nix/store/
<clever>
you can either use -I nixpkgs= to remap it somewhere, or just give it an absolute/relative path to the release.nix instead
<clever>
romildo: `nix-build '<nixpkgs/nixos/release.nix>' -A tests.xfce.x86_64-linux`
<clever>
dxtr: ah, simple!
<clever>
romildo: then youll probably want to be editing release.nix to add the tests to it
<clever>
romildo: you can just look at the attrset within that (either in an editor, or `nix repl`), and then just build one of those attrs
<clever>
romildo: all of the tests are attributes of nixos/release.nix
<clever>
i'm not sure what that mountpoint is really used for
<clever>
unknown
<clever>
because your not really root
<clever>
openvz can make a lot of things return permission errors, even as root
<clever>
dxtr: the host isnt allowing you to do that
<clever>
dxtr: oh, yeah, that would definitely be it
<clever>
dxtr: thats what `mount` should say when it works
<clever>
sunrpc on /var/lib/nfs/rpc_pipefs type rpc_pipefs (rw,relatime)
<clever>
dxtr: looks totally normal
<clever>
and toss it all into a pastebin
<clever>
dxtr: stat / /var /var/lib /var/lib/nfs /var/lib/nfs/rpc_pipefs
<clever>
dxtr: did you run nixos-rebuild as root? are the permissions in /var weird? any errors in `dmesg`?
<clever>
dxtr: ?
<clever>
whyuk: lines 73, and 69, will put config.system.build.toplevel into the list that 18 was referencing