| 28 Jul 2025 |
emily | I rather suspect that linkage of undefined symbols is what is acting weird here and necessitating -flat_namespace | 22:16:53 |
emily | (I can try to build the CL myself and poke at it but not tonight) | 22:17:56 |
emily | nm -m on the compiled plugin would also be very useful | 22:21:30 |
| ginkogruen joined the room. | 23:33:15 |
| 29 Jul 2025 |
raitobezarius (DECT: 7248) | give me a sec | 00:18:35 |
raitobezarius (DECT: 7248) | ah darn ssh is not open to macOS | 00:18:45 |
jade_ | contemplating how easy it would be to get coarse grained metrics on each of the known eval time sinners | 02:51:44 |
jade_ | like, how much time was spent in an eval copying stuff to the store, waiting on ifd builds, etc | 02:51:57 |
llakala | In reply to @jade_:matrix.org contemplating how easy it would be to get coarse grained metrics on each of the known eval time sinners is this for the mentioned blogpost on eval time | 03:13:33 |
jade_ | was i working on a new one? i don't remember having done so | 03:36:35 |
K900 | @raitobezarius bonk https://gerrit.lix.systems/c/lix/+/3826 pls | 05:45:46 |
aloisw | raitobezarius could you also add ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKIpTTvk49u7dyv/HFFBfShNeXnM0woKC0XtBpLCfLEK root@exodus so that I can do remote builds without bypassing the local daemon? No hurries though, I won't need it today anyway. | 05:49:30 |
teo (they/he) | this would be great IMO! | 08:56:24 |
| 31 Jul 2025 |
| @sammy:cherrykitten.dev left the room. | 10:11:51 |
| 29 Jul 2025 |
WeetHet | Is https://gerrit.lix.systems/c/lix/+/2906 outdated now that https://gerrit.lix.systems/c/lix/+/3765 is merged? | 12:07:40 |
raitobezarius (DECT: 7248) | In reply to @weethet:catgirl.cloud Is https://gerrit.lix.systems/c/lix/+/2906 outdated now that https://gerrit.lix.systems/c/lix/+/3765 is merged? U tell me :D | 12:09:31 |
raitobezarius (DECT: 7248) | Test it and let us know if this fixes your usecases! | 12:09:37 |
raitobezarius (DECT: 7248) | Normally, this was tested on Darwin × Linux across the sandboxed/unsandboxed variants, except for sandboxed Darwin | 12:10:12 |
raitobezarius (DECT: 7248) | In reply to @aloisw:julia0815.de raitobezarius could you also add ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKIpTTvk49u7dyv/HFFBfShNeXnM0woKC0XtBpLCfLEK root@exodus so that I can do remote builds without bypassing the local daemon? No hurries though, I won't need it today anyway. done! | 12:10:28 |
raitobezarius (DECT: 7248) | In reply to @k900:0upti.me @raitobezarius bonk https://gerrit.lix.systems/c/lix/+/3826 pls not needed anymore | 12:10:39 |
K900 | Yeah noticed | 12:10:49 |
raitobezarius (DECT: 7248) | fwiw, we will be trying to land slowly https://gerrit.lix.systems/c/lix/+/3822/3 | 12:11:03 |
raitobezarius (DECT: 7248) | which contains some spicy async changes | 12:11:09 |
raitobezarius (DECT: 7248) | if you have time to test the tip of this chain and notice any regression before the merge, that's greatly appreciated | 12:11:31 |
raitobezarius (DECT: 7248) | (the most dangerous change is https://gerrit.lix.systems/c/lix/+/3819/3) | 12:11:52 |
WeetHet | I seem to be missing something:
# WARNING: this file is generated from the nix.* options in
# your nix-darwin configuration. Do not edit it!
allowed-users = *
auto-optimise-store = false
build-users-group = nixbld
builders =
cores = 0
experimental-features = nix-command flakes
max-jobs = auto
require-sigs = true
sandbox = true
sandbox-fallback = false
substituters = https://cache.nixos.org/
trusted-public-keys = cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=
trusted-substituters =
trusted-users = @admin root
use-xdg-base-directories = true
extra-sandbox-paths =
build-dir = /tmp
ssl-cert-file = /etc/ssl/certs/ca-certificates.crt
with import <nixpkgs> { };
stdenv.mkDerivation {
name = "fod-read-ca-cert";
buildCommand = ''
touch $out
line=$(head -n 2 "$NIX_SSL_CERT_FILE" | tail -n 1)
echo $line > $out
'';
outputHashMode = "recursive";
outputHash = "sha256-Hgw28osQssCD3MDpYMsHKRbklbiHxDQbVv9TrKSh35c=";
}
$ nix-build
this derivation will be built:
/nix/store/z8mbxhgwqyv9w1gfx0bxgfad5613ymlc-fod-read-ca-cert.drv
building '/nix/store/z8mbxhgwqyv9w1gfx0bxgfad5613ymlc-fod-read-ca-cert.drv'...
head: cannot open '/no-cert-file.crt' for reading: No such file or directory
error: builder for '/nix/store/z8mbxhgwqyv9w1gfx0bxgfad5613ymlc-fod-read-ca-cert.drv' failed with exit code 1;
last 1 log lines:
> head: cannot open '/no-cert-file.crt' for reading: No such file or directory
For full logs, run 'nix log /nix/store/z8mbxhgwqyv9w1gfx0bxgfad5613ymlc-fod-read-ca-cert.drv'.
| 15:57:38 |
raitobezarius (DECT: 7248) | cool | 15:58:08 |
raitobezarius (DECT: 7248) | this was the usecase i never tried | 15:58:12 |
raitobezarius (DECT: 7248) | can you disable the sandbox and check if it works? | 15:58:19 |
raitobezarius (DECT: 7248) | just pass --no-sandbox | 15:58:34 |