| 29 Jul 2025 |
WeetHet | Is https://gerrit.lix.systems/c/lix/+/2906 outdated now that https://gerrit.lix.systems/c/lix/+/3765 is merged? | 12:07:40 |
raitobezarius | In reply to @weethet:catgirl.cloud Is https://gerrit.lix.systems/c/lix/+/2906 outdated now that https://gerrit.lix.systems/c/lix/+/3765 is merged? U tell me :D | 12:09:31 |
raitobezarius | Test it and let us know if this fixes your usecases! | 12:09:37 |
raitobezarius | Normally, this was tested on Darwin × Linux across the sandboxed/unsandboxed variants, except for sandboxed Darwin | 12:10:12 |
raitobezarius | In reply to @aloisw:julia0815.de raitobezarius could you also add ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKIpTTvk49u7dyv/HFFBfShNeXnM0woKC0XtBpLCfLEK root@exodus so that I can do remote builds without bypassing the local daemon? No hurries though, I won't need it today anyway. done! | 12:10:28 |
raitobezarius | In reply to @k900:0upti.me @raitobezarius bonk https://gerrit.lix.systems/c/lix/+/3826 pls not needed anymore | 12:10:39 |
K900 | Yeah noticed | 12:10:49 |
raitobezarius | fwiw, we will be trying to land slowly https://gerrit.lix.systems/c/lix/+/3822/3 | 12:11:03 |
raitobezarius | which contains some spicy async changes | 12:11:09 |
raitobezarius | if you have time to test the tip of this chain and notice any regression before the merge, that's greatly appreciated | 12:11:31 |
raitobezarius | (the most dangerous change is https://gerrit.lix.systems/c/lix/+/3819/3) | 12:11:52 |
WeetHet | I seem to be missing something:
# WARNING: this file is generated from the nix.* options in
# your nix-darwin configuration. Do not edit it!
allowed-users = *
auto-optimise-store = false
build-users-group = nixbld
builders =
cores = 0
experimental-features = nix-command flakes
max-jobs = auto
require-sigs = true
sandbox = true
sandbox-fallback = false
substituters = https://cache.nixos.org/
trusted-public-keys = cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=
trusted-substituters =
trusted-users = @admin root
use-xdg-base-directories = true
extra-sandbox-paths =
build-dir = /tmp
ssl-cert-file = /etc/ssl/certs/ca-certificates.crt
with import <nixpkgs> { };
stdenv.mkDerivation {
name = "fod-read-ca-cert";
buildCommand = ''
touch $out
line=$(head -n 2 "$NIX_SSL_CERT_FILE" | tail -n 1)
echo $line > $out
'';
outputHashMode = "recursive";
outputHash = "sha256-Hgw28osQssCD3MDpYMsHKRbklbiHxDQbVv9TrKSh35c=";
}
$ nix-build
this derivation will be built:
/nix/store/z8mbxhgwqyv9w1gfx0bxgfad5613ymlc-fod-read-ca-cert.drv
building '/nix/store/z8mbxhgwqyv9w1gfx0bxgfad5613ymlc-fod-read-ca-cert.drv'...
head: cannot open '/no-cert-file.crt' for reading: No such file or directory
error: builder for '/nix/store/z8mbxhgwqyv9w1gfx0bxgfad5613ymlc-fod-read-ca-cert.drv' failed with exit code 1;
last 1 log lines:
> head: cannot open '/no-cert-file.crt' for reading: No such file or directory
For full logs, run 'nix log /nix/store/z8mbxhgwqyv9w1gfx0bxgfad5613ymlc-fod-read-ca-cert.drv'.
| 15:57:38 |
raitobezarius | cool | 15:58:08 |
raitobezarius | this was the usecase i never tried | 15:58:12 |
raitobezarius | can you disable the sandbox and check if it works? | 15:58:19 |
raitobezarius | just pass --no-sandbox | 15:58:34 |
raitobezarius | on the nix build | 15:58:35 |
WeetHet | It works yea | 15:58:51 |
WeetHet | * It works yeah | 15:59:04 |
WeetHet | ssl-cert-file = /etc/ssl/certs/ca-certificates.crt should be unnecessary as well, it's set by me since I thought that it might fix this | 16:00:09 |
emily | what is echo $NIX_SSL_CERT_FILE | 16:04:32 |
WeetHet | $ echo $NIX_SSL_CERT_FILE
/etc/ssl/certs/ca-certificates.crt
| 16:17:56 |
emily | er well sorry I meant inside the build, but you'd need it before stdenv clobbers it | 16:18:17 |
emily | try with a custom builder maybe? | 16:18:23 |
emily | with import (builtins.getFlake "nixpkgs") { }; derivation { name = "test"; builder = lib.getExe bash; args = [ "-c" "echo $NIX_SSL_CERT_FILE; exit 1" ]; system = builtins.currentSystem; } or something | 16:20:33 |
WeetHet | $ nix-build --no-out-link --log-format raw 19s
this derivation will be built:
/nix/store/pn49f92bjpwfqlx300wyhx7akcly7ark-test.drv
building '/nix/store/pn49f92bjpwfqlx300wyhx7akcly7ark-test.drv'...
error: builder for '/nix/store/pn49f92bjpwfqlx300wyhx7akcly7ark-test.drv' failed with exit code 1;
last 1 log lines:
> SSL_FILE is
For full logs, run 'nix log /nix/store/pn49f92bjpwfqlx300wyhx7akcly7ark-test.drv'.
| 16:22:22 |
emily | 🤔 | 16:22:34 |
emily | and without sandbox it gets set? | 16:22:38 |
WeetHet | Yes | 16:22:45 |
emily | your daemon is definitely on the new version, not just client? | 16:23:00 |