!VRULIdgoKmKPzJZzjj:nixos.org

Nix Hackers

970 Members
For people hacking on the Nix package manager itself206 Servers

Load older messages


SenderMessageTime
1 Sep 2021
@niksnut:matrix.orgniksnutyes16:43:18
@roberthensing:matrix.orgRobert Hensing (roberth)
In reply to @roberthensing:matrix.org
nix flake update <inputName> would make most sense to me
can it be changed to this?
16:44:10
@roberthensing:matrix.orgRobert Hensing (roberth)so it's all by default, or the closure of specified inputs16:44:49
@roberthensing:matrix.orgRobert Hensing (roberth)you know what, this is probably better to discuss on github, so the discussion is more discoverable16:50:54
@niksnut:matrix.orgniksnut
In reply to @roberthensing:matrix.org
can it be changed to this?
No because nix flake update takes an optional flakeref (like nix flake update /path) so this would be ambiguous.
19:48:36
@roberthensing:matrix.orgRobert Hensing (roberth)right. I've never wanted to do that. Most package managers just operate on the working directory20:43:41
@Las:matrix.orgLas I never realized that the flake URI parameter to nix flake update was the flake whose inputs you wanted to update, and not the URI of the input you wanted to update... 20:47:04
@Las:matrix.orgLasThis is honestly quite counterintuitive20:47:26
@jtojnar:matrix.orgJan Tojnar yeah, for example npm has --prefix option for that 23:23:09
@jtojnar:matrix.orgJan Tojnar * yeah, for example, npm has --prefix option for that 23:23:20
2 Sep 2021
@niksnut:matrix.orgniksnut
In reply to @Las:matrix.org
This is honestly quite counterintuitive
Except that it's what every other nix command does, so it would be very inconsistent if nix flake update suddenly did something else.
07:14:57
@tomberek:matrix.orgtomberekI made a similar mistake in assumption, but the consistency is nice and more powerful once I understood it. Perhaps a warning output clarifying what is being updated? 07:17:20
@jtojnar:matrix.orgJan Tojnaryeah consistency is nice but not at the cost of ergonomy13:58:53
@jtojnar:matrix.orgJan Tojnarif 99% of time you want to update stuff in the current directory, the consistency is rather annoying13:59:37
3 Sep 2021
@cw:kernelpanic.cafeRev. CornWallace III (novus ordo seclorum) changed their display name from cw (just got delta) to cw (novus ordo seclorum).07:40:59
6 Sep 2021
@tim140123:matrix.orgBramfatur left the room.13:31:12
@trofi:matrix.orgtrofi

Does nix implement network sandbox? Updated nixUnstable today and now getting fetch failrues:

nix build -f . libssh2 --keep-going
warning: error: unable to download 'https://www.libssh2.org/download/libssh2-1.10.0.tar.gz': Couldn't resolve host name (6); retrying in 352 ms

6 is probably a ENXIO. I'm not sure which process gets a rejection. Probably a nix-daemon itself? I suspect it's due to systemd resolved's nameserver 127.0.0.53.

21:42:53
@trofi:matrix.orgtrofi Disabling sandbox with sandbox = false fixes downloader. 22:08:42
@sternenseemann:systemli.orgsterni trofi: https://github.com/NixOS/nix/issues/5089 23:27:46
7 Sep 2021
@trofi:matrix.orgtrofiAha, thank you!06:37:20
@Las:matrix.orgLas
In reply to @trofi:matrix.org

Does nix implement network sandbox? Updated nixUnstable today and now getting fetch failrues:

nix build -f . libssh2 --keep-going
warning: error: unable to download 'https://www.libssh2.org/download/libssh2-1.10.0.tar.gz': Couldn't resolve host name (6); retrying in 352 ms

6 is probably a ENXIO. I'm not sure which process gets a rejection. Probably a nix-daemon itself? I suspect it's due to systemd resolved's nameserver 127.0.0.53.

Access to the network has always been restricted, except in fixed-output derivations
09:15:59
@trofi:matrix.orgtrofiHow that restriction is implemented? Is it some systemd unit magic? Or some in-daemon code? I only found a few seemingly irrelevant filesystem syscall filters.10:15:21
@Las:matrix.orgLas trofi: Linux namespaces 10:48:04
@roberthensing:matrix.orgRobert Hensing (roberth) trofi: sounds like https://github.com/NixOS/nixpkgs/pull/135689 but that's nix 2.3 🤔 11:00:49
@Ericson2314:matrix.orgJohn Ericson sterni: i did some stuff with the strong context 19:02:05
@Ericson2314:matrix.orgJohn Ericson make it support more ! 19:02:09
@Ericson2314:matrix.orgJohn Ericsonit's possible that makes a difference19:02:19
@sternenseemann:systemli.orgsterni hm maybe I should check on your branch what kind of context "${foo.drvPath}" yields 19:03:07
@Ericson2314:matrix.orgJohn Ericson sterni: yeah 19:04:37
@sternenseemann:systemli.orgsterni

John Ericson: behavior is unchanged:

nix-repl> :p builtins.getContext "${pkgs.hello.drvPath}"
{ "/nix/store/6zfl66ni351nk0i2wa7ssbaacgysrcm5-hello-2.10.drv" = { allOutputs = true; }; }

Intuitively I feel like this should be { path = true; }, but not sure if something relies on this behavior?

22:08:53

Show newer messages


Back to Room ListRoom Version: 6