- Jul 18, 2012
-
-
Eelco Dolstra authored
-
Eelco Dolstra authored
-
Eelco Dolstra authored
-
- Jul 17, 2012
-
-
Eelco Dolstra authored
To implement binary caches efficiently, Hydra needs to be able to map the hash part of a store path (e.g. "gbg...zr7") to the full store path (e.g. "/nix/store/gbg...kzr7-subversion-1.7.5"). (The binary cache mechanism uses hash parts as a key for looking up store paths to ensure privacy.) However, doing a search in the Nix store for /nix/store/<hash>* is expensive since it requires reading the entire directory. queryPathFromHashPart() prevents this by doing a cheap database lookup.
-
Eelco Dolstra authored
Cherry-picked from the no-manifests branch.
-
Eelco Dolstra authored
Exit code 100 should be returned for all permanent failures. This includes cached failures. Fixes #34.
-
Eelco Dolstra authored
-
Eelco Dolstra authored
-
Eelco Dolstra authored
-
Eelco Dolstra authored
-
- Jul 12, 2012
-
-
Eelco Dolstra authored
Needed for Charon/Hydra interaction.
-
- Jul 09, 2012
-
-
Eelco Dolstra authored
-
Eelco Dolstra authored
-
Eelco Dolstra authored
-
Shea Levy authored
-
Shea Levy authored
-
Shea Levy authored
-
Shea Levy authored
-
Shea Levy authored
-
Shea Levy authored
-
Shea Levy authored
-
Shea Levy authored
-
Shea Levy authored
-
Shea Levy authored
-
Shea Levy authored
-
Eelco Dolstra authored
-
Eelco Dolstra authored
No need to duplicate the nix.conf manpage.
-
Eelco Dolstra authored
-
- Jun 27, 2012
-
-
Eelco Dolstra authored
I.e. when multiple non-derivation arguments are passed to ‘nix-store -r’ to be substituted, do them in parallel.
-
Eelco Dolstra authored
This ensures that whatever the builder writes in /dev/shm is automatically cleaned up.
-
Eelco Dolstra authored
-
- Jun 25, 2012
-
-
Eelco Dolstra authored
In a private PID namespace, processes have PIDs that are separate from the rest of the system. The initial child gets PID 1. Processes in the chroot cannot see processes outside of the chroot. This improves isolation between builds. However, processes on the outside can see processes in the chroot and send signals to them (if they have appropriate rights). Since the builder gets PID 1, it serves as the reaper for zombies in the chroot. This might turn out to be a problem. In that case we'll need to have a small PID 1 process that sits in a loop calling wait().
-
Eelco Dolstra authored
In chroot builds, set the host name to "localhost" and the domain name to "(none)" (the latter being the kernel's default). This improves determinism a bit further. P.S. I have to idea what UTS stands for.
-
- Jun 23, 2012
-
-
Eelco Dolstra authored
-
Eelco Dolstra authored
-
Eelco Dolstra authored
This improves isolation a bit further, and it's just one extra flag in the unshare() call. P.S. It would be very cool to use CLONE_NEWPID (to put the builder in a private PID namespace) as well, but that's slightly more risky since having a builder start as PID 1 may cause problems.
-
Eelco Dolstra authored
On Linux it's possible to run a process in its own network namespace, meaning that it gets its own set of network interfaces, disjunct from the rest of the system. We use this to completely remove network access to chroot builds, except that they get a private loopback interface. This means that: - Builders cannot connect to the outside network or to other processes on the same machine, except processes within the same build. - Vice versa, other processes cannot connect to processes in a chroot build, and open ports/connections do not show up in "netstat". - If two concurrent builders try to listen on the same port (e.g. as part of a test), they no longer conflict with each other. This was inspired by the "PrivateNetwork" flag in systemd.
-
- Jun 19, 2012
-
-
Eelco Dolstra authored
Systemd can start the Nix daemon on demand when the Nix daemon socket is first accessed. This is signalled through the LISTEN_FDS environment variable, so all we need to do is check for that and then use file descriptor 3 as the listen socket instead of creating one ourselves.
-