aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2020-03-11README, error msg: http -> httpsRobert Hensing
2020-03-11Move some corepkgs into the nix binaryEelco Dolstra
2020-03-11parseExprFromString(): Use std::string_viewEelco Dolstra
2020-03-11nixos.org/releases -> releases.nixos.orgEelco Dolstra
2020-03-10nix-store -q --graph: Fix edgesEelco Dolstra
Fixes #3389.
2020-03-10dotgraph.cc: Remove dead codeEelco Dolstra
2020-03-10nix-perl: Fix segfault in queryPathInfo)Eelco Dolstra
2020-03-04nix-build: Fix !<output> handlingEelco Dolstra
This was broken by 22a754c091f765061f59bef5ce091268493bb138. https://hydra.nixos.org/eval/1573669
2020-03-04Merge branch 'emacs_lambda_indentation' of https://github.com/tbsmoest/nix-1Eelco Dolstra
2020-03-04Optimise Derivation::unparse()Eelco Dolstra
In nix-instantiate --dry-run '<nixpkgs/nixos/release-combined.nix>' -A nixos.tests.simple.x86_64-linux this reduces time spent in unparse() from 9.15% to 4.31%. The main culprit was appending characters one at a time to the destination string. Even though the string has enough capacity, push_back() still needs to check this on every call.
2020-03-04builtins.cache: Cache regular expressionsEelco Dolstra
The evaluator was spending about 1% of its time compiling a small number of regexes over and over again.
2020-03-04Add test for foldl'Eelco Dolstra
2020-02-28Fix GC failures on bad store path namesEelco Dolstra
It failed on names like '/nix/store/9ip48nkc9rfy0a4yaw98lp6gipqlib1a-'.
2020-02-20.dir-locals.el: Set additional lambda indentation to zeroTobias Möst
2020-02-19Merge pull request #3325 from xzfc/clean-tmpdirEelco Dolstra
nix-shell: clean up the tmpDir and escape variables
2020-02-19nix-shell: clean up the tmpDir and escape variablesAlbert Safin
The problem fixed: each nix-shell invocation creates a new temporary directory (`/tmp/nix-shell-*`) and never cleans up. And while I'm here, shellescape all variables inlined into the rcfile. See what might happen without escaping: $ export TZ="';echo pwned'" $ nix-shell -p hello --run hello pwned Hello, world!
2020-02-19Merge pull request #3332 from Calvin-L/patch-1Eelco Dolstra
Document that autoconf is a dependency
2020-02-19Merge pull request #3357 from carlosdagos/pure-nix-shell-proxy-envEelco Dolstra
Pass through http proxy env vars in pure shell
2020-02-19Merge pull request #3328 from ↵Eelco Dolstra
Rovanion/nix-daemon-already-running-when-installing-fix installer: Handle edge case where the nix-daemon is already running on the system
2020-02-19Use Nixpkgs 20.03Eelco Dolstra
2020-02-19TypoEelco Dolstra
2020-02-19Merge pull request #3359 from bhipple/doc/pure-evalEelco Dolstra
doc: mention how to turn on pure evaluation mode in manual
2020-02-19Merge pull request #3353 from tbsmoest/priv_tobias_pr_set_deathsig-1.4Eelco Dolstra
Fix PR_SET_PDEATHSIG results in Broken pipe (#2395)
2020-02-19Add dev outputEelco Dolstra
Necessary since we're now propagating boehm-gc.
2020-02-18Build with large config Boehm GCEelco Dolstra
2020-02-18Enable debug symbolsEelco Dolstra
2020-02-18LocalStore::checkDerivationOutputs(): Improve error messageEelco Dolstra
2020-02-18Disable the progress bar if $TERM == dumb or unsetEelco Dolstra
Fixes #3363.
2020-02-15doc: mention how to turn on pure evaluation mode in manualBenjamin Hipple
The flag is `--pure-eval`, which can be found by looking at the test suite; it should be in the notes describing the feature as well, since otherwise users may assume this is referencing something like `nix-shell --pure`.
2020-02-14Fix PR_SET_PDEATHSIG results in Broken pipe (#2395)Tobias Möst
The ssh client is lazily started by the first worker thread, that requires a ssh connection. To avoid the ssh client to be killed, when the worker process is stopped, do not set PR_SET_PDEATHSIG.
2020-02-14Pass through http proxy env vars in pure shellCarlos D
2020-02-13Bindings::get(): std::optional<Attr *> -> Attr *Eelco Dolstra
Returning a nullable type in an optional is silly.
2020-02-13Prevent uninitialized StorePath creationEelco Dolstra
2020-02-10Merge pull request #3350 from curiousleo/no-macro-useEelco Dolstra
Remove #[macro_use]
2020-02-10Remove macro_useLeonhard Markert
As of Rust 2018, macro_use is no longer required in most circumstances. I think it is generally a good idea to remove these when not needed, to stop them from polluting the crate's global namespace. https://doc.rust-lang.org/edition-guide/rust-2018/macros/macro-changes.html#macro_rules-style-macros
2020-02-07Fix segfault in gcc on i686-linuxEelco Dolstra
src/libstore/ssh-store.cc: In constructor 'nix::SSHStore::SSHStore(const string&, const Params&)': src/libstore/ssh-store.cc:31:21: internal compiler error: Segmentation fault compress) ^ Please submit a full bug report, with preprocessed source if appropriate. https://hydra.nixos.org/build/111545609
2020-02-04Merge pull request #3344 from LnL7/ssh-ng-remote-paramsEelco Dolstra
ssh-store: add remote-store and remote-program query params
2020-02-03ssh-store: add remote-store and remote-program query paramsDaiderd Jordan
Brings the functionality of ssh-ng:// in sync with the legacy ssh:// implementation. Specifying the remote store uri enables various useful things. eg. $ nix copy --to ssh-ng://cache?remote-store=file://mnt/cache --all
2020-02-01Show "warning:" in yellow instead of redEelco Dolstra
2020-01-29Merge pull request #3335 from domenkozar/retry-429Eelco Dolstra
retry on HTTP status code 429
2020-01-29retry on HTTP status code 429Domen Kožar
2020-01-26Document that autoconf is a dependencyCalvin Loncaric
2020-01-23Merge pull request #3329 from mayflower/attrs-chownEelco Dolstra
structured-attrs: chown .attrs.* files to builder
2020-01-23structured-attrs: chown .attrs.* files to builderRobin Gloster
Otherwise `chmod .`'ing the build directory doesn't work anymore, which is done in nixpkgs if sourceRoot is set to '.'.
2020-01-23installer: Handle edge case where the nix-daemon is already running on the ↵Rovanion Luckey
system On a systemd-based Linux distribution: If the user has previously had multi-user Nix installed on the system, removed it and then reinstalled multi-user Nix again the old nix-daemon.service will still be running when `scripts/install-systemd-multi-user.sh` tries to start it which results in nothing being done and the old daemon continuing its run. When a normal user then tries to use Nix through the daemon the nix binary will fail to connect to the nix-daemon as it does not belong to the currently installed Nix system. See below for steps to reproduce the issue that motivated this change. $ sh <(curl https://nixos.org/nix/install) --daemon $ sudo rm -rf /etc/nix /nix /root/.nix-profile /root/.nix-defexpr /root/.nix-channels /home/nix-installer/.nix-profile /home/nix-installer/.nix-defexpr /home/nix-installer/.nix-channels ~/.nix-channels ~/.nix-defexpr/ ~/.nix-profile /etc/profile.d/nix.sh.backup-before-nix /etc/profile.d/nix.sh; sed -i '/added by Nix installer$/d' ~/.bash_profile $ unset NIX_REMOTE $ sh <(curl https://nixos.org/nix/install) --daemon └$ export NIX_REMOTE=daemon └$ nix-env -iA nixpkgs.hello installing 'hello-2.10' error: cannot connect to daemon at '/nix/var/nix/daemon-socket/socket': No such file or directory (use '--show-trace' to show detailed location information) └$ sudo systemctl restart nix-daemon.service └$ nix-env -iA nixpkgs.hello installing 'hello-2.10' these paths will be fetched (6.09 MiB download, 27.04 MiB unpacked): /nix/store/2g75chlbpxlrqn15zlby2dfh8hr9qwbk-hello-2.10 /nix/store/aag9d1y4wcddzzrpfmfp9lcmc7skd7jk-glibc-2.27 copying path '/nix/store/aag9d1y4wcddzzrpfmfp9lcmc7skd7jk-glibc-2.27' from 'https://cache.nixos.org'... copying path '/nix/store/2g75chlbpxlrqn15zlby2dfh8hr9qwbk-hello-2.10' from 'https://cache.nixos.org'... building '/nix/store/w9adagg6vlikr799nkkqc9la5hbbpgmi-user-environment.drv'... created 2 symlinks in user environment
2020-01-22Fix clang warningEelco Dolstra
2020-01-21Fix derivation computation with __structuredAttrs and multiple outputsEelco Dolstra
Fixes error: derivation '/nix/store/klivma7r7h5lndb99f7xxmlh5whyayvg-zlib-1.2.11.drv' has incorrect output '/nix/store/fv98nnx5ykgbq8sqabilkgkbc4169q05-zlib-1.2.11-dev', should be '/nix/store/adm7pilzlj3z5k249s8b4wv3scprhzi1-zlib-1.2.11-dev'
2020-01-14Merge pull request #3316 from LnL7/fix-secure-drv-outputsEelco Dolstra
build: remove warning when in sandboxing test mode
2020-01-14Merge pull request #3318 from bhipple/doc/relnotes-2.3Eelco Dolstra
doc: touchup release notes for 2.3
2020-01-14doc: touchup release notes for 2.3Benjamin Hipple
- At the top of the release notes, we announce sandboxing is now enabled by default, then at the bottom it says it's now disabled when missing kernel support. These can be merged into one point for clarity. - The point about `max-jobs` defaulting to 1 appears unrelated to sandboxing.