aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2013-04-26find-runtime-roots.pl: Don't hardcode /nix/storeEelco Dolstra
2013-04-26addAdditionalRoots(): Check each path only onceEelco Dolstra
2013-04-26find-runtime-roots.pl: Search process environments for rootsEelco Dolstra
For instance, this prevents paths from being deleted that are in use by a "nix-build --run-env" session.
2013-04-26find-runtime-roots.pl: Use Nix::Utils::readFileEelco Dolstra
2013-04-23Fix --timeoutEelco Dolstra
I'm not sure if it has ever worked correctly. The line "lastWait = after;" seems to mean that the timer was reset every time a build produced log output. Note that the timeout is now per build, as documented ("the maximum number of seconds that a builder can run").
2013-04-23Show that --timeout doesn't work if the build produces log outputEelco Dolstra
2013-04-23nix-build: Respect --timeoutEelco Dolstra
2013-04-23Nix daemon: respect build timeout from the clientEelco Dolstra
2013-04-23Fix --fallback with the binary cache substituterEelco Dolstra
Reported by Peter Simons.
2013-04-23Test whether --fallback works if NARS have disappeared from the binary cacheEelco Dolstra
2013-04-23Test NAR info cachingEelco Dolstra
2013-04-09Manual: Add a missing step to the build instructionsEelco Dolstra
Reported by Johan Grande.
2013-04-04Complain if /homeless-shelter existsEelco Dolstra
2013-03-25Fix evaluation of the VM testsEelco Dolstra
2013-03-25makeStoreWritable: Ask forgiveness, not permissionShea Levy
It is surprisingly impossible to check if a mountpoint is a bind mount on Linux, and in my previous commit I forgot to check if /nix/store was even a mountpoint at all. statvfs.f_flag is not populated with MS_BIND (and even if it were, my check was wrong in the previous commit). Luckily, the semantics of mount with MS_REMOUNT | MS_BIND make both checks unnecessary: if /nix/store is not a mountpoint, then mount will fail with EINVAL, and if /nix/store is not a bind-mount, then it will not be made writable. Thus, if /nix/store is not a mountpoint, we fail immediately (since we don't know how to make it writable), and if /nix/store IS a mountpoint but not a bind-mount, we fail at first write (see below for why we can't check and fail immediately). Note that, due to what is IMO buggy behavior in Linux, calling mount with MS_REMOUNT | MS_BIND on a non-bind readonly mount makes the mountpoint appear writable in two places: In the sixth (but not the 10th!) column of mountinfo, and in the f_flags member of struct statfs. All other syscalls behave as if the mount point were still readonly (at least for Linux 3.9-rc1, but I don't think this has changed recently or is expected to soon). My preferred semantics would be for MS_REMOUNT | MS_BIND to fail on a non-bind mount, as it doesn't make sense to remount a non bind-mount as a bind mount.
2013-03-25makeStoreWritable: Use statvfs instead of /proc/self/mountinfo to find out ↵Shea Levy
if /nix/store is a read-only bind mount /nix/store could be a read-only bind mount even if it is / in its own filesystem, so checking the 4th field in mountinfo is insufficient. Signed-off-by: Shea Levy <shea@shealevy.com>
2013-03-18Fix evaluationEelco Dolstra
2013-03-15Bump version numberEelco Dolstra
2013-03-15Remove the "system" jobset inputEelco Dolstra
2013-03-14Require Bison 2.6Eelco Dolstra
2013-03-14Fix building against Bison 2.6Eelco Dolstra
2013-03-14Make sure that thunks are restored properly if an exception occursEelco Dolstra
Fixes Hydra bug #67.
2013-03-08Prevent config.h from being clobberedEelco Dolstra
2013-03-08Revert "Prevent config.h from being clobbered"Eelco Dolstra
This reverts commit 28bba8c44f484eae38e8a15dcec73cfa999156f6.
2013-03-08Fix annoying Perl 5.16 warningsEelco Dolstra
I.e. Subroutine Nix::Store::isValidPath redefined at /nix/store/clfzsf6gi7qh5i9c0vks1ifjam47rijn-perl-5.16.2/lib/perl5/5.16.2/XSLoader.pm line 92. and so on.
2013-03-07Prevent config.h from being clobberedEelco Dolstra
2013-02-28Handle systems without lutimes() or lchown()Eelco Dolstra
2013-02-28Update release notesEelco Dolstra
Also use a point release version number as suggested by several people.
2013-02-28Handle symlinks properlyEelco Dolstra
Now it's really brown paper bag time...
2013-02-28Bump version numberEelco Dolstra
2013-02-27Handle hard links to other files in the outputEelco Dolstra
2013-02-27Refactoring: Split off the non-recursive canonicalisePathMetaData()Eelco Dolstra
Also, change the file mode before changing the owner. This prevents a slight time window in which a setuid binary would be setuid root.
2013-02-26Remove outdated fileEelco Dolstra
2013-02-26Bump version numberEelco Dolstra
2013-02-26Update release notesEelco Dolstra
2013-02-26Security: Don't allow builders to change permissions on files they don't ownEelco Dolstra
It turns out that in multi-user Nix, a builder may be able to do ln /etc/shadow $out/foo Afterwards, canonicalisePathMetaData() will be applied to $out/foo, causing /etc/shadow's mode to be set to 444 (readable by everybody but writable by nobody). That's obviously Very Bad. Fortunately, this fails in NixOS's default configuration because /nix/store is a bind mount, so "ln" will fail with "Invalid cross-device link". It also fails if hard-link restrictions are enabled, so a workaround is: echo 1 > /proc/sys/fs/protected_hardlinks The solution is to check that all files in $out are owned by the build user. This means that innocuous operations like "ln ${pkgs.foo}/some-file $out/" are now rejected, but that already failed in chroot builds anyway.
2013-02-19build-remote: Use the --quiet flagEelco Dolstra
‘--option verbosity 0’ doesn't actually do anything.
2013-02-19Add `Settings::nixDaemonSocketFile'.Ludovic Courtès
2013-02-19Enable chroot support on old glibc versions.Ludovic Courtès
2013-02-08Document ‘hashString’Eelco Dolstra
2013-02-08Make "${./path} ..." evaluate to a string, not a pathEelco Dolstra
Wacky string coercion semantics caused expressions like exec = "${./my-script} params..."; to evaluate to a path (‘/path/my-script params’), because anti-quotations are desuged to string concatenation: exec = ./my-script + " params..."; By constrast, adding a space at the start would yield a string as expected: exec = " ${./my-script} params..."; Now the first example also evaluates to a string.
2013-02-08Rename "hash" to "hashString" and handle SHA-1Eelco Dolstra
2013-02-08experimental/hashMarc Weber
adding primop function calculating hash of a string Signed-off-by: Marc Weber <marco-oweber@gmx.de>
2013-02-05Nix::Store::derivationFromPath: Return derivation outputsEelco Dolstra
2013-01-30Support the coloniesEelco Dolstra
2013-01-24Improve -I descriptionEelco Dolstra
Issue #88.
2013-01-23Only warn about SQLite being busy onceEelco Dolstra
No need to get annoying.
2013-01-22Correctly handle missing logsEelco Dolstra
2013-01-21Fix the VM testsEelco Dolstra
2013-01-21build-remote.pl: Don't keep build logs on the build slaveEelco Dolstra