Skip to content
Snippets Groups Projects
  1. Jan 13, 2020
  2. Jan 10, 2020
  3. Jan 09, 2020
  4. Jan 07, 2020
  5. Jan 06, 2020
  6. Jan 05, 2020
  7. Jan 04, 2020
  8. Jan 03, 2020
  9. Jan 02, 2020
    • edef's avatar
      passAsFile: leave out the hash prefix · c65a6fa8
      edef authored
      Having a colon in the path may cause issues, and having the hash
      function indicated isn't actually necessary. We now verify the path 
      format in the tests to prevent regressions.
      c65a6fa8
    • Eelco Dolstra's avatar
      Merge pull request #3297 from edef1c/passasfile-hash · 3ad4a332
      Eelco Dolstra authored
      passAsFile: hash the attribute name instead of numbering sequentially
      3ad4a332
    • Puck Meerburg's avatar
      passAsFile: hash the attribute name instead of numbering sequentially · 515c0a26
      Puck Meerburg authored
      
      This makes the paths consistent without relying on ordering.
      
      Co-authored-by: default avataredef <edef@edef.eu>
      515c0a26
    • Eelco Dolstra's avatar
      Merge pull request #3296 from grahamc/export-reference-graph · 3469062e
      Eelco Dolstra authored
      exportReferencesGraph: support working
      3469062e
    • Graham Christensen's avatar
      exportReferencesGraph: support working · c502831a
      Graham Christensen authored
      Before, we would get:
      
          [deploy@bastion:~]$ nix-store -r /nix/store/grfnl76cahwls0igd2by2pqv0dimi8h2-nixos-system-eris-19.09.20191213.03f3def.drv
          these derivations will be built:
            /nix/store/3ka4ihvwh6wsyhpd2qa9f59506mnxvx1-initrd-linux-4.19.88.drv
            /nix/store/ssxwmll7v21did1c8j027q0m8w6pg41i-unit-prometheus-alertmanager-irc-notifier.service.drv
            /nix/store/mvyvkj46ay7pp7b1znqbkck2mq98k0qd-unit-script-network-local-commands-start.drv
            /nix/store/vsl1y9mz38qfk6pyirjwnfzfggz5akg6-unit-network-local-commands.service.drv
            /nix/store/wi5ighfwwb83fdmav6z6n2fw6npm9ffl-unit-prometheus-hydra-exporter.service.drv
            /nix/store/x0qkv535n75pbl3xn6nn1w7qkrg9wwyg-unit-prometheus-packet-sd.service.drv
            /nix/store/lv491znsjxdf51xnfxh9ld7r1zg14d52-unit-script-packet-sd-env-key-pre-start.drv
            /nix/store/nw4nzlca49agsajvpibx7zg5b873gk9f-unit-script-packet-sd-env-key-start.drv
            /nix/store/x674wwabdwjrkhnykair4c8mpxa9532w-unit-packet-sd-env-key.service.drv
            /nix/store/ywivz64ilb1ywlv652pkixw3vxzfvgv8-unit-wireguard-wg0.service.drv
            /nix/store/v3b648293g3zl8pnn0m1345nvmyd8dwb-unit-script-acme-selfsigned-status.nixos.org-start.drv
            /nix/store/zci5d3zvr6fgdicz6k7jjka6lmx0v3g4-unit-acme-selfsigned-status.nixos.org.service.drv
            /nix/store/f6pwvnm63d0kw5df0v7sipd1rkhqxk5g-system-units.drv
            /nix/store/iax8071knxk9c7krpm9jqg0lcrawf4lc-etc.drv
            /nix/store/grfnl76cahwls0igd2by2pqv0dimi8h2-nixos-system-eris-19.09.20191213.03f3def.drv
          error: invalid file name 'closure-init-0' in 'exportReferencesGraph'
      
      This was tough to debug, I didn't figure out which one was broken until I did:
      
          nix-store -r /nix/store/grfnl76cahwls0igd2by2pqv0dimi8h2-nixos-system-eris-19.09.20191213.03f3def.drv 2>&1 | grep  nix/store | xargs -n1 nix-store -r
      
      and then looking at the remaining build graph:
      
          $ nix-store -r /nix/store/grfnl76cahwls0igd2by2pqv0dimi8h2-nixos-system-eris-19.09.20191213.03f3def.drv
          these derivations will be built:
            /nix/store/3ka4ihvwh6wsyhpd2qa9f59506mnxvx1-initrd-linux-4.19.88.drv
            /nix/store/grfnl76cahwls0igd2by2pqv0dimi8h2-nixos-system-eris-19.09.20191213.03f3def.drv
          error: invalid file name 'closure-init-0' in 'exportReferencesGraph'
      
      and knowing the initrd build is before the system, then:
      
          $ nix show-derivation /nix/store/3ka4ihvwh6wsyhpd2qa9f59506mnxvx1-initrd-linux-4.19.88.drv
          {
            "/nix/store/3ka4ihvwh6wsyhpd2qa9f59506mnxvx1-initrd-linux-4.19.88.drv": {
              [...]
              "exportReferencesGraph": "closure-init-0 /nix/store/...-stage-1-init.sh closure-mdadm.conf-1 /nix/store/...-mdadm.conf closure-ubuntu.conf-2 ...",
              [...]
            }
          }
      
      I then searched the repo for "in 'exportReferencesGraph'", found this
      recently updated regex, and realized it was missing a "-".
      c502831a
  10. Dec 25, 2019
  11. Dec 23, 2019
  12. Dec 22, 2019
  13. Dec 20, 2019
    • Brian McKenna's avatar
      Disable use-sqlite-wal under WSL · d2592326
      Brian McKenna authored
      Before:
      
          $ nix-channel --update
          unpacking channels...
          warning: SQLite database '/nix/var/nix/db/db.sqlite' is busy (SQLITE_PROTOCOL)
          warning: SQLite database '/nix/var/nix/db/db.sqlite' is busy (SQLITE_PROTOCOL)
          warning: SQLite database '/nix/var/nix/db/db.sqlite' is busy (SQLITE_PROTOCOL)
          warning: SQLite database '/nix/var/nix/db/db.sqlite' is busy (SQLITE_PROTOCOL)
          warning: SQLite database '/nix/var/nix/db/db.sqlite' is busy (SQLITE_PROTOCOL)
      
      After:
      
          $ inst/bin/nix-channel --update
          unpacking channels...
          created 1 symlinks in user environment
      
      I've seen complaints that "sandbox" caused problems under WSL but I'm
      having no problems. I think recent changes could have fixed the issue.
      d2592326
  14. Dec 19, 2019
  15. Dec 18, 2019
  16. Dec 17, 2019
  17. Dec 16, 2019
Loading