<clever>
dhess: line 166 appears to be exporting it
<clever>
dhess: i think your only option is to call it yourself, check lines 173-182
<clever>
phry: which will overwrite the attribute on the final set, and override the zfsUnstable within
<clever>
phry: i think your best bet is to do something like, linuxPackages = self.linuxPackages // { zfsUnstable = super.linuxPackages.zfsUnstable.overrideAttrs (old: { src = ...; }); };
<clever>
phry: all-packages.nix contains a linuxPackagesFor function, which takes a given kernel derivation, and generates module derivations for every module, including zfs
<clever>
another more expensive option (zfs dedup to the rescue) is nix copy
<clever>
ah
<clever>
tilpner: and you cant just export the entire host store to the vm?
<clever>
what for?
<clever>
so you need to make mount setuid, and use the user flag in fstab, and it will still limit the users to using the exact device+mountpoint in the config
<clever>
on gentoo, mount is setuid, but on nixos it isnt
<clever>
-rws--x--x 1 root root 39872 Dec 20 2014 /bin/mount
<clever>
if mount was setuid root i believe, which it isnt on nixos
<clever>
tilpner: if you add the user flag to an entry in fstab, then a user is allowed to mount it
<clever>
ajs124: yeah, thats how i believe it works, fork a branch from release-18.03, then file a PR back to it
<clever>
srhb: does it ever make use of /usr/bin/env?
<clever>
thats strange then
<clever>
and does your drv have the exact same hash as hydra?
<clever>
nf
<clever>
srhb: grep sandbox /etc/nix/nix.co
<clever>
srhb: do you have the nix sandbox enabled?
<clever>
ekleog: only 160 bits in the storepath hashes
<clever>
i think it opens a shell inside emacs, that auto-runs nix-shell, something like that
<clever>
iqubic: i think it was called nix-buffer
<clever>
it also handles getting you autoreconf itself, so you dont need that in the inputs
<clever>
carlosdagos: put autoreconfHook into the buildInputs, and nix will run that for you at the right time
<clever>
carlosdagos: there is a 3rd option
<clever>
iqubic: python.withPackages
<clever>
when using nixops locally, you would start by just getting nixos to install normally, then you can upgrade ti to nixops
<clever>
sphalerite has also been doing some work with an android tablet i believe
<clever>
i have had it working on an armv6 and v7 raspberry pi before, and others have it working on aarch64
<clever>
nixops would let you trivially update the tablet from another system, so then you just need to services.xserver.enable = true; and install a graphical media player
<clever>
xorg is also untested under not-os, so getting graphics may be more difficult
<clever>
either way, you have to find something to handle the ui and install it
<clever>
ah, both nixops and not-os entirely ignore the UI perspective
<clever>
nixops would be simpler
<clever>
jasongrossman: id use either nixops or not-os for something like that
<clever>
its a function that takes another function
<clever>
yes
<clever>
the 2nd is using ps to get numpy
<clever>
the 1st is defining a function that takes 1 arg, called ps
<clever>
stick it into the buildInputs of your nix-shell
<clever>
this generates a python that already has numpy in its search path
<clever>
python.withPackages (ps: [ ps.numpy ])
<clever>
iqubic: drawing a blank, can you name a python package?
<clever>
iqubic: python.withPackages in nix
<clever>
cmcdragonkai: the above code should do what you want
<clever>
> lib.splitString "." "a.b"
2018-08-01
<clever>
d1rewolf: this option allows anybody in the wheel group to use sudo without a pass
<clever>
infinisil: and nixos.com was not work safe for several years
<clever>
so the whole point of that image util being optional is moot
<clever>
jtojnar: the "none" desktop env is unconditionally enabled, and doesnt support that
<clever>
jtojnar: one anoying thing ive noticed, if any of the enabled desktop envs lack support to set the wallpaper, an image util is added to systemPackages, and used to blank the root window
<clever>
but since http lacks locking, it just never had that safety implemented
<clever>
woffs: it probably wants to grab a lock so things cant be altered while its reading them
2018-07-31
<clever>
endformationage: nice
<clever>
testuser: no need for the -d, just normal nix-collect-garbage
<clever>
should be safe to just remove it
<clever>
testuser: i dont know of anything using that system-profiles subdir
<clever>
endformationage: thats what i get with speedtest-cli
<clever>
Hosted by Pioneer Wireless (Presque Isle, ME) [206.16 km]: 20.756 ms
<clever>
Upload: 150.67 Mbit/s
<clever>
Download: 293.44 Mbit/s
<clever>
endformationage: `nix run nixpkgs.speedtest-cli` and `speedtest-cli`
<clever>
endformationage: iperf or a cli speedtest would maybe go faster
<clever>
endformationage: that could be a browser problem as well
<clever>
ah dang, iperf3 is single-threaded, -P wont help that
<clever>
endformationage: with the -P 2 flag
<clever>
endformationage: have you tested it with iperf3?
<clever>
electrocat: when cross-compiling, nativeBuildInputs can run on the host that is building, but buildInputs will be for the target
<clever>
heh, that will do it
<clever>
whole
<clever>
Myrl-saki: can you gist the while file?
<clever>
bigvalen: zfs list -o name,used,refer,written,type -t all
<clever>
bigvalen: there are 3 types of objects within a zfs pool, filesystems, volumes, and snapshots
<clever>
bigvalen: this option will auto-create, and destroy many snapshots, on every filesystem you enabled it on
<clever>
only on the terminal where it happened for the most part
<clever>
bigvalen: ive also used kexec to reinstall nixos over a baremetal machine, without any proper remote management
<clever>
symphorien: nixos tests can run without /dev/kvm but are much slower
<clever>
bigvalen: the last time i encountered a datacenter like that, i reconfigured the raid controller to passthru every disk, then threw zfs at it
<clever>
d1rewolf: i run unstable on all of my machines
<clever>
Myrl-saki: just partition and format as normal
<clever>
/dev/sde2 48M 28M 17M 63% /boot
<clever>
Filesystem Size Used Avail Use% Mounted on
<clever>
Myrl-saki: one of my machines has /boot on a 64mb usb stick :P
<clever>
bigvalen: and it needs about 400mb on /boot
<clever>
bigvalen: it only works as long as /boot remains undamaged
<clever>
then you can perform operations like that send|receive with the main nixos "off"
<clever>
bigvalen: add the above file to your imports section, and then youll have an option in grub to boot a rescue system
<clever>
bigvalen: i used rescue_boot.nix to move my /nix from the root dataset to its own dataset, and you can also use it to apply similar operations like renaming datasets
<clever>
gchristensen: run `env` in the setup hook and grep for something you know you passed to nix-shell ?
<clever>
nixos-unstable will get the latest updates, but may sometimes be more unstable
<clever>
d1rewolf: but if your on the 18.03 channel, you likely wont get such updates
<clever>
d1rewolf: what did you change that you are epecting to see update?
<clever>
gchristensen: and the deps become propagated deps, so when your hook is in the buildInputs, it will dynamically add everything from deps
<clever>
gchristensen: substitutions becomes the env vars for the runCommand, so you can also substitutions = { foo = "whatever"; }; and then use @foo@ in the hook too
<clever>
gchristensen: and because it runs substituteAll, you can use @out@ easily
<clever>
gchristensen: yep
<clever>
pkgconfig will scan every build input, and add them to the pkgconfig search path
<clever>
cmake will swap out the entire configure phase
<clever>
in the case of autoreconfHook, it adds its own function to the preconfigure phases
<clever>
preConfigurePhases+=" autoreconfPhase"
<clever>
the script is free to mutate the bash scripts the stdenv uses
<clever>
gchristensen: and the stdenv will source that script as it walks the buildInputs
<clever>
gchristensen: autoreconfHook, cmake, python, and others, have a nix-support/setup-hook in their output