<clever>
bqv[m]: linuxPackages is a set containing the kernel and every optional module
<clever>
i havent checked to see what ion is at there
<clever>
nixos does extra testing for nixos
<clever>
unstable follows master, the others follow the release branches
<clever>
sullyj3: each updates when a cerain branch passes a certain set of tests
<clever>
sullyj3: nope, nixos-19.03, nixos-19.09, nixos-20.03, nixos-unstable, and nixpkgs-unstable are all channels
<clever>
sullyj3: then dozens of nixpkgs-unstable users started to come out of the woodwork, because they where on the wrong channel and it ceased to boot :P
<clever>
sullyj3: a few years ago, a bug came up in grub config generation, that corrupted grub.conf, nixos-unstable correctly didnt update, protecting most users
<clever>
sullyj3: nixos-unstable goes thru extra testing, to make sure it wont brick a nixos machine
<clever>
it does go thru fairly heavy automated testing before it gets to users
<clever>
sullyj3: but i just run unstable on everything, since i have rollbacks
<clever>
sullyj3: you can also grab just a few things from unstable if you choose to
<clever>
,unstable
<clever>
a new release is made every 6 months, and nixos-unstable is the rolling channel
<clever>
both 03 and 09 are releases
<clever>
but not the gitrev of the current nixpkgs
<clever>
sullyj3: all it tells you, is what release you began on
<clever>
,stateVersion sullyj3
<clever>
sullyj3: the stateVersion means nothing
<clever>
which is exactly the kind of mess nix prevents
<clever>
smeag0l: that kind of mess is only needed if packages are going out of their way to avoid collisions in /usr/include
<clever>
alexgood: you may need to add libsodium to the buildInputs then
<clever>
alexgood: yarn2nix also deals with building node_modules in a pure and read-only manner
<clever>
alexgood: those tend to work for me, when using nix-shell
<clever>
alexgood: oh, but also dont forget the name = "something";, oops
<clever>
eyJhb: the area where lib.uniq will truely fail, is line 11, list.concats
<clever>
eyJhb: you can also add `NIX_SHOW_STATS_PATH=profile.json` to save the stats, and then post-process with tools like jq
<clever>
,profiling eyJhb
<clever>
ehmry[m]: not really, you have to modify the derivation to print it to the logs
<clever>
some hosting providers encourage that thought
<clever>
ignore the partitions entirely
<clever>
MichaelRaskin: depending on the VPS, it might be simpler to just add a whole swap disk!
<clever>
and since i choose zfs, i cant use swap files
<clever>
it has a 40mb swap, not a 40gig swap
<clever>
i made the mistake of mixing up units when i setup my laptop
<clever>
which nixops can automate
<clever>
so would a small swap file
<clever>
MichaelRaskin: given the `created 9682 symlinks in user environment` msg, it got past the eval, and was building systemPackages when it failed
<clever>
and it will auto-create a 2gig file for you
<clever>
eyJhb: its slow due to the lib.subList function, partially
<clever>
when networking and services both need it, you must do `let foo = 123; in { services.foo.port = foo; networking.foo.port = foo; }
<clever>
you can do `services = let foo = 123; in { mysql.port = foo; httpd.port = foo; }`, but that will obviously fail due to a port collision
<clever>
stevenroose: but, config.services.murmur.port is better, it lets you read the 1st part, even if its since been changed with mkForce elsewhere
<clever>
stevenroose: you have to declare them at some common point, in this case, networking and services are split, so the only common point is the top
<clever>
stevenroose: let foo = 123; in { stuff = foo; }
<clever>
even when you change it and forget to update things
<clever>
stevenroose: then it will always open the right port
<clever>
stevenroose: also, its much much better to do networking.firewall.allowedTCPPorts = [ config.services.murmur.port ];
<clever>
stevenroose: more that i havent audited things lately, a lot of this could be cleaned up
<clever>
i havent used it in several years
<clever>
stevenroose: ^
<clever>
simpson: i forgot murmur was even running on that machine!
<clever>
stevenroose: for example, the ts3 ports, and line 174-179 should be moved to a ts3-server.nix file
<clever>
stevenroose: yeah, a lot of those could be moved to other files and cleaned up
<clever>
and the openFirewall flag, its mostly a matter of somebody bothering to add it
<clever>
stevenroose: ssh is a bit special, to make sure you dont lock yourself out of the machine
<clever>
ah, youll need a lock file then, to stop it from getting latest
<clever>
betaboon: is there a lock file, that lists the hash of everything antibody is going to download?
<clever>
betaboon: just give it the wrong hash on purpose, build it once, and then copy the real hash
<clever>
,tofu betaboon
<clever>
betaboon: youll probably need to have nix download things with fetchurl, then point antibody to a dir of pre-fetched things
<clever>
betaboon: what are you trying to do?
<clever>
betaboon: add outputHash = "hash"; outputHashMode = "recursive"; outputHashAlgo = "sha256"; to a derivation, and it will enable network access
<clever>
betaboon: define an output hash and nix will allow network
2020-03-26
<clever>
ivegotasthma: just normal options
<clever>
shor: read the shell script, then re-run nixos-install with `--option substituters ''` added to the cmd
<clever>
shor: does it say what its trying to build?
<clever>
shor: are you using the shell script i included?
<clever>
shor: the `--system` should be telling it to skip directly to a pre-built nixos
<clever>
shor: the 0fe... is the revision
<clever>
shor: run realpath on that, does it include a partial git revision?
<clever>
6480 pulseSupport = config.pulseaudio or false;
<clever>
betaboon: also, things like nixpkgs.config.flag, can have different defaults for different packages
<clever>
betaboon: yeah, so it works with an empty config
<clever>
betaboon: nope
<clever>
betaboon: nixos config or nixpkgs config?
<clever>
ah, and thats what you want
<clever>
aranea: `nix-shell -p nftables` will give a shell with nftables in PATH, `nix-shell -A nftables '<nixpkgs>'` will give a shell suitable to compile nftables
<clever>
OmnipotentEntity: the container stuff may be breaking it
<clever>
OmnipotentEntity: Yakuake?
<clever>
OmnipotentEntity: are you running it from a shell or a systemd service?
<clever>
OmnipotentEntity: if xorg is enabled, then LD_LIBRARY_PATH will contain /run/opengl-drivers/lib system wide
<clever>
atemu12[m]: for example, clevers_machines.nix does a bunch of config that i put on many of my machines, but i could just omit that from the imports list on a pi
<clever>
atemu12[m]: or use imports to group things into pi and non-pi stuff
<clever>
atemu12[m]: then use an if statement and a config flag
<clever>
atemu12[m]: what about modifying what put them into systemPackages, to not do that
<clever>
atemu12[m]: what are you trying to remove from systemPackages?
<clever>
atemu12[m]: an overlay cant modify systemPackages, the most you can do is make that package null, like `firefox = null;` so installing firefox does nothing
<clever>
Jonathan44: depending on how you do it, that may give you an env with fcl pre-built, not fcl's deps
<clever>
Jonathan44: you could just add them to the buildInputs
<clever>
Jonathan44: i'm not sure its fully documented, but it basically lets you make a private set of packages, and you can still add overlays to it later
<clever>
Jonathan44: either `-A libccd` or `-A fcl`
<clever>
Jonathan44: you need to use -A to tell it which thing you want a shell on