| 26 Mar 2024 |
brunzefb | Thanks -- got it to work with
nix-shell -p awscli2 -I nixpkgs=https://github.com/NixOS/nixpkgs/archive/976fa3369d722e76f37c77493d99829540d43845.tar.gz | 02:08:22 |
brunzefb | for version 2.13.7. I would have thought the reference would have been just awscli2@2.13.7 | 02:09:35 |
brunzefb | still not 100% sure how to use this in a .nix file | 02:17:49 |
l0b0 | In reply to @brunzefb:matrix.org for version 2.13.7. I would have thought the reference would have been just awscli2@2.13.7 Nix uses cryptographic hashes as immutable, safe references to build outputs like packages. For example, there could be several nixpkgs changes applied to awscli2 version 2.13.7. By using hashes these can be referenced uniquely and unambiguously. | 02:18:51 |
brunzefb | makes sense. | 02:19:10 |
brunzefb | pkgs = import (builtins.fetchTarball {
url = "https://github.com/NixOS/nixpkgs/archive/976fa3369d722e76f37c77493d99829540d43845.tar.gz";
}) {};
myPkg = pkgs.awscli2;```
in
| 02:19:56 |
brunzefb | is probably the way, I will experiment. | 02:20:13 |
l0b0 | In reply to @brunzefb:matrix.org
pkgs = import (builtins.fetchTarball {
url = "https://github.com/NixOS/nixpkgs/archive/976fa3369d722e76f37c77493d99829540d43845.tar.gz";
}) {};
myPkg = pkgs.awscli2;```
in
Maybe an example of a working Nix shell would help. | 02:22:02 |
brunzefb | Yes, very helpful. Thanks so much for your help! | 02:22:42 |
| @qyliss:fairydust.space left the room. | 09:22:27 |
| 29 Mar 2024 |
| SebTM joined the room. | 03:40:11 |
| SebTM left the room. | 04:21:23 |
| SebTM joined the room. | 05:37:47 |
| 30 Mar 2024 |
| @reedrichards:matrix.org joined the room. | 22:37:49 |
@reedrichards:matrix.org | is there a way to enable external networking during a nixos integration test? | 22:38:24 |
| 31 Mar 2024 |
Ramses 🇵🇸 | Afaik not without either turning the derivation into a FOD, or disabling the sandbox (__noChroot = true;) | 01:12:24 |