!lymvtcwDJ7ZA9Npq:lix.systems

Lix Development

422 Members
(Technical) development of Lix, the package manager, a Nix implementation. Please be mindful of ongoing technical conversations in this channel.142 Servers

Load older messages


SenderMessageTime
28 Jul 2025
@emilazy:matrix.orgemily I rather suspect that linkage of undefined symbols is what is acting weird here and necessitating -flat_namespace 22:16:53
@emilazy:matrix.orgemily(I can try to build the CL myself and poke at it but not tonight)22:17:56
@emilazy:matrix.orgemily nm -m on the compiled plugin would also be very useful 22:21:30
@ginkogruen:matrix.orgginkogruen joined the room.23:33:15
29 Jul 2025
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)give me a sec00:18:35
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)ah darn ssh is not open to macOS00:18:45
@jade_:matrix.orgjade_contemplating how easy it would be to get coarse grained metrics on each of the known eval time sinners02:51:44
@jade_:matrix.orgjade_like, how much time was spent in an eval copying stuff to the store, waiting on ifd builds, etc02:51:57
@llakala:matrix.orgllakala
In reply to @jade_:matrix.org
contemplating how easy it would be to get coarse grained metrics on each of the known eval time sinners
is this for the mentioned blogpost on eval time
03:13:33
@jade_:matrix.orgjade_was i working on a new one? i don't remember having done so03:36:35
@k900:0upti.meK900 @raitobezarius bonk https://gerrit.lix.systems/c/lix/+/3826 pls 05:45:46
@aloisw:julia0815.dealoisw raitobezarius could you also add ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKIpTTvk49u7dyv/HFFBfShNeXnM0woKC0XtBpLCfLEK root@exodus so that I can do remote builds without bypassing the local daemon? No hurries though, I won't need it today anyway. 05:49:30
@teoc:matrix.orgteo (they/he) this would be great IMO! 08:56:24
31 Jul 2025
@sammy:cherrykitten.dev@sammy:cherrykitten.dev left the room.10:11:51
29 Jul 2025
@weethet:catgirl.cloudWeetHetIs https://gerrit.lix.systems/c/lix/+/2906 outdated now that https://gerrit.lix.systems/c/lix/+/3765 is merged?12:07:40
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)
In reply to @weethet:catgirl.cloud
Is https://gerrit.lix.systems/c/lix/+/2906 outdated now that https://gerrit.lix.systems/c/lix/+/3765 is merged?
U tell me :D
12:09:31
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)Test it and let us know if this fixes your usecases!12:09:37
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)Normally, this was tested on Darwin × Linux across the sandboxed/unsandboxed variants, except for sandboxed Darwin12:10:12
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)
In reply to @aloisw:julia0815.de
raitobezarius could you also add ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKIpTTvk49u7dyv/HFFBfShNeXnM0woKC0XtBpLCfLEK root@exodus so that I can do remote builds without bypassing the local daemon? No hurries though, I won't need it today anyway.
done!
12:10:28
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)
In reply to @k900:0upti.me
@raitobezarius bonk https://gerrit.lix.systems/c/lix/+/3826 pls
not needed anymore
12:10:39
@k900:0upti.meK900Yeah noticed12:10:49
@raitobezarius:matrix.orgraitobezarius (DECT: 7248) fwiw, we will be trying to land slowly https://gerrit.lix.systems/c/lix/+/3822/3 12:11:03
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)which contains some spicy async changes12:11:09
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)if you have time to test the tip of this chain and notice any regression before the merge, that's greatly appreciated12:11:31
@raitobezarius:matrix.orgraitobezarius (DECT: 7248) (the most dangerous change is https://gerrit.lix.systems/c/lix/+/3819/3) 12:11:52
@weethet:catgirl.cloudWeetHet

I seem to be missing something:

# WARNING: this file is generated from the nix.* options in
# your nix-darwin configuration. Do not edit it!
allowed-users = *
auto-optimise-store = false
build-users-group = nixbld
builders = 
cores = 0
experimental-features = nix-command flakes
max-jobs = auto
require-sigs = true
sandbox = true
sandbox-fallback = false
substituters = https://cache.nixos.org/
trusted-public-keys = cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=
trusted-substituters = 
trusted-users = @admin root
use-xdg-base-directories = true
extra-sandbox-paths = 
build-dir = /tmp
ssl-cert-file = /etc/ssl/certs/ca-certificates.crt
with import <nixpkgs> { };
stdenv.mkDerivation {
  name = "fod-read-ca-cert";
  buildCommand = ''
    touch $out
    line=$(head -n 2 "$NIX_SSL_CERT_FILE" | tail -n 1)
    echo $line > $out
  '';
  outputHashMode = "recursive";
  outputHash = "sha256-Hgw28osQssCD3MDpYMsHKRbklbiHxDQbVv9TrKSh35c=";
}
$ nix-build
this derivation will be built:
  /nix/store/z8mbxhgwqyv9w1gfx0bxgfad5613ymlc-fod-read-ca-cert.drv
building '/nix/store/z8mbxhgwqyv9w1gfx0bxgfad5613ymlc-fod-read-ca-cert.drv'...
head: cannot open '/no-cert-file.crt' for reading: No such file or directory
error: builder for '/nix/store/z8mbxhgwqyv9w1gfx0bxgfad5613ymlc-fod-read-ca-cert.drv' failed with exit code 1;
       last 1 log lines:
       > head: cannot open '/no-cert-file.crt' for reading: No such file or directory
       For full logs, run 'nix log /nix/store/z8mbxhgwqyv9w1gfx0bxgfad5613ymlc-fod-read-ca-cert.drv'.
15:57:38
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)cool15:58:08
@raitobezarius:matrix.orgraitobezarius (DECT: 7248) this was the usecase i never tried 15:58:12
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)can you disable the sandbox and check if it works?15:58:19
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)just pass --no-sandbox15:58:34

Show newer messages


Back to Room ListRoom Version: 10