Nix Hackers | 972 Members | |
| For people hacking on the Nix package manager itself | 206 Servers |
| Sender | Message | Time |
|---|---|---|
| 20 Aug 2021 | ||
In reply to @gytis-ivaskevicius:matrix.orgin the end these are just wrappers around derivation and add nothing new and they mostly exist to make very simple derivation integrate well with our mkDerivation infrastructure | 21:54:51 | |
In reply to @sternenseemann:systemli.orgyeah, i kinda forgot about cases like that, have been on flakes for quite sometime | 21:54:56 | |
In reply to @gytis-ivaskevicius:matrix.orgI'd say simplicity and flexibility, but it has been proposed before to change this: https://github.com/NixOS/nix/issues/2270 | 21:55:32 | |
In reply to @sternenseemann:systemli.orgI would expect bit of a speed up due to amount of it is being used | 21:56:01 | |
| (to be fair one could just create a custom binary for this) | 21:56:23 | |
Also I am not sure about simplicity, its like "bit of code in nix" vs "loats of code in nixpkgs" | 21:57:18 | |
| simplicity is not about code size and less code in nix is always good | 21:58:22 | |
| it'd mostly be having another special thing in nix | 21:58:32 | |
| whereas derivations and fixed-output derivations are quite simple concepts that can be used for all sorts of things | 21:58:56 | |
| Yeah, its simple and flexible | 22:06:36 | |
| I was thinking more along the lines of in addition to what we currently have add few more derivation builders | 22:07:09 | |
| random comment; in the course of doing Summer of Nix, it has been extremely helpful to be able to help people with issues due to the effectiveness of "show me the flake.nix repo and we can reproduce the problem". Thanks niksnut ! | 22:46:36 | |
| 21 Aug 2021 | ||
| 22:21:27 | ||
| 22:21:41 | ||
| 22 Aug 2021 | ||
In a flake, nixConfig.bash-prompt works when entering a nix develop, but not for nix shell. Is this on purpose? I've noticed some issues where people end up in nested nix develop or nix shell which ends up causing confusion. Is this a bug? thoughts? | 05:57:38 | |
| I'm trying to figure out why/how bash-prompt affects nix develop, but not nix shell. I'm not finding the right way to access the right settings objects in run.cc I thought that I can add a bit around here: https://github.com/NixOS/nix/blob/master/src/nix/run.cc#L122 that would modify PS1 in the same way as: https://github.com/NixOS/nix/blob/master/src/nix/develop.cc#L467-L471 | 08:30:54 | |
| 16:16:29 | ||
| for ^^^^: https://github.com/NixOS/nix/pull/5162 | 20:16:13 | |
| 23 Aug 2021 | ||
| Redacted or Malformed Event | 19:56:49 | |
| 24 Aug 2021 | ||
Running nix-build as a regular user right now does eval + drives the build in a single process, correct? I was thinking of doing the eval in a forked child such that we can (safely?) discard all the memory from the eval that we don't have to hold on to anymore. Are there any obvious roadblocks that I'd run into? | 15:13:51 | |
AFAICT, yes; And it uses threads for parallelism. | 18:51:57 | |
andi-: FYI, I considered doing something similar to be able to fuzz the parsing / evaluation part of nix (because it's not reentrant - i.e. mutates a global state)I don't remember exactly why I abandoned this, but speed was definitely a problem (fork/exec is much slower - but it might not be problematic in your use case). | 18:55:03 | |
| (it kinda defeated the purposed of having an "in-memory" fuzzer) | 18:55:31 | |
| Yeah for fuzzing you probably want something much faster even thought you could fuzz multiple cases in one process (as long as you keep the history of invocations to minimize the case afterwards) | 18:56:05 | |
In reply to @andi:kack.itThe problem is that it raises a lot of false positives this way in practice; Every "next" run is corrupted by dangling global state left by the previous... | 19:02:40 | |
(I am really talking about nix specifically here) | 19:03:01 | |
| Yeah, I'd only run like 3-5 or so per fork. That is still a 5x speedup? | 21:08:42 | |
Another thing that we talked about earlier in #infrastructure:nixos.org : Could we tell the kernel / emulate the load in the sandbox so it only covers the load produced from the contained jobs? That topic came up as running many builds with a small number of cores might always be limited by load if the build system is load aware (e.g. ninja & gnumake with -l). lxc apparently does something like that. The open question was if the kernel is able to do that or else if we could/should do that in userspace (in the nix-daemon). | 22:11:22 | |
| 25 Aug 2021 | ||
| I'm actually not sure it's a good idea. If the CPU is shared, strictly partitioning it doesn't sound like a good approach for overall efficiency... though it depends how exactly we'd use it. | 18:55:00 | |
| 21:42:44 | ||