aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2022-05-30Merge pull request #6590 from edolstra/fix-noexceptEelco Dolstra
Fix noexcept violations
2022-05-30Mark nix-perl as a Perl moduleEelco Dolstra
The call to perl.withPackages in nix-serve expects this.
2022-05-30Merge pull request #6589 from edolstra/respect-output-specifiedEelco Dolstra
Respect the outputSpecified attribute
2022-05-30Set meta.platformsEelco Dolstra
'nix-serve' in nixpkgs expects the nix package to set this.
2022-05-30RemoteStore::queryRealisationUncached(): Fix potential noexcept violationEelco Dolstra
2022-05-30HttpBinaryCacheStore::getFile(): Don't throw an exceptionEelco Dolstra
This violates the noexcept specification. Fixes #6445.
2022-05-30Respect the outputSpecified attributeEelco Dolstra
E.g. 'nix build nixpkgs#libxml2.dev' will build the 'dev' output.
2022-05-27Style fixEelco Dolstra
2022-05-27Merge branch 'doc-redirects' of https://github.com/jtojnar/nixEelco Dolstra
2022-05-26Merge pull request #6580 from trofi/fix-build-for-gcc-13Eelco Dolstra
src/libutil/json.cc: add missing <cstdint> include for gcc-13
2022-05-26src/libutil/json.cc: add missing <cstdint> include for gcc-13Sergei Trofimovich
Without the change llvm build fails on this week's gcc-13 snapshot as: src/libutil/json.cc: In function 'void nix::toJSON(std::ostream&, const char*, const char*)': src/libutil/json.cc:33:22: error: 'uint16_t' was not declared in this scope 33 | put(hex[(uint16_t(*i) >> 12) & 0xf]); | ^~~~~~~~ src/libutil/json.cc:5:1: note: 'uint16_t' is defined in header '<cstdint>'; did you forget to '#include <cstdint>'? 4 | #include <cstring> +++ |+#include <cstdint> 5 |
2022-05-26doc: Add redirects for the DocBook manualJan Tojnar
There are still many links to the old manual on the web and having them end up on the Introduction page is a bad user experience.
2022-05-26doc: Manually insert some anchorsJan Tojnar
2022-05-26doc: Add anchors to long listsJan Tojnar
Added using the following sed scripts: - For command-ref/opt-common.md: s~- `(--?)([^`]+)`~- [`\1\2`]{#opt-\2}~g - For expressions/builtin-constants.md: s~- `(builtins\.?)([^`]+)`~- [`\1\2`]{#builtins-\2}~g - For expressions/advanced-attributes.md s~^ - `([^`]+)`~ - [`\1`]{#adv-attr-\1}~g and manually adjusted outputHashAlgo & outputHashMode. - For glossary.md s~^ - (`([^`]+)`|(.+)) ?\\~ - [\1]{#gloss-\2\3}\\~g; s~(gloss-\w+) ~\1-~g and manually adjusted anchors for Nix expression, user environment, NAR, ∅ and ε. - For command-ref/env-common.md s~^ - `([^`]+)`~ - [`\1`]{#env-\1}~g'
2022-05-26doc: Port anchors preprocessor to jq scriptJan Tojnar
Python is only pulled into the build closure by Mercurial, which might end up being removed. Let’s port the script to jq, which is more likely to stay.
2022-05-26doc: Introduce pre-processor for adding anchors to textJan Tojnar
It is now possible to use the following syntax to insert anchors into the text: []{#anchor-name} The anchor will allow linking to the location it is placed by appending #anchor-name to the URL. Additionally, it is possible to create a link pointing to its own location by adding text between the square brackets: [`--add-root`]{#opt-add-root}
2022-05-26Merge pull request #6578 from edolstra/remove-perlEelco Dolstra
Remove unused Perl dependency
2022-05-26Remove unused Perl dependencyEelco Dolstra
2022-05-26Merge pull request #6576 from hercules-ci/daemon-increase-socket-backlogEelco Dolstra
Fix `Connection refused` on daemon socket
2022-05-26Tweak IN_NIX_SHELL descriptionEelco Dolstra
2022-05-26Remove pre-C++11 hackinessEelco Dolstra
2022-05-26createUnixDomainSocket: listen(unix, 5 -> 100)Robert Hensing
This solves the error error: cannot connect to socket at '/nix/var/nix/daemon-socket/socket': Connection refused on build farm systems that are loaded but operating normally. I've seen this happen on an M1 mac running a loaded hercules-ci-agent. Hercules CI uses multiple worker processes, which may connect to the Nix daemon around the same time. It's not unthinkable that the Nix daemon listening process isn't scheduled until after 6 workers try to connect, especially on a system under load with many workers. Is the increase safe? The number is the number of connections that the kernel will buffer while the listening process hasn't `accept`-ed them yet. It did not - and will not - restrict the total number of daemon forks that a client can create. History The number 5 has remained unchanged since the introduction in nix-worker with 0130ef88ea in 2006.
2022-05-26Merge pull request #6570 from edolstra/eof-in-stringEelco Dolstra
Handle EOFs in string literals correctly
2022-05-26Merge pull request #5416 from bburdette/debug-exploratory-PREelco Dolstra
--debugger flag
2022-05-25remove parens from repl helpBen Burdette
2022-05-25Merge branch 'master' into debug-exploratory-PRBen Burdette
2022-05-25add --debugger to rl-next listBen Burdette
2022-05-25back to ref<EvalState> in NixReplBen Burdette
2022-05-25Handle EOFs in string literals correctlyEelco Dolstra
We can't return a STR token without setting a valid StringToken, otherwise the parser will crash. Fixes #6562.
2022-05-25TypoEelco Dolstra
2022-05-25Merge remote-tracking branch 'origin/file-fetcher'Eelco Dolstra
2022-05-25Fix warningEelco Dolstra
2022-05-25Style tweaksEelco Dolstra
2022-05-25Merge pull request #6568 from yorickvP/check-busybox-standaloneEelco Dolstra
configure.ac: check for sandbox-shell's FEATURE_SH_STANDALONE
2022-05-25Merge pull request #6565 from ↵Eelco Dolstra
NixOS/dependabot/github_actions/zeebe-io/backport-action-0.0.8 Bump zeebe-io/backport-action from 0.0.7 to 0.0.8
2022-05-25Merge pull request #6567 from Ma27/simplify-git-fixEelco Dolstra
libfetchers: drop `getGitDir` and hardcode `.git`
2022-05-24configure.ac: don't run sandbox-shell test when cross compilingYorick van Pelt
2022-05-24configure.ac: check for sandbox-shell's FEATURE_SH_STANDALONEYorick van Pelt
See also: https://bugs.archlinux.org/task/73998. Busybox's FEATURE_SH_STANDALONE feature causes other busybox applets to leak into the sandbox, where system() calls will start preferring them over tools in $PATH. On arch, this even includes `ar`. Let's check for this evil feature and disallow using this as a sandbox shell.
2022-05-24libfetchers: drop `getGitDir` and hardcode `.git`Maximilian Bosch
As discussed[1] this is most likely not desirable. [1] https://github.com/NixOS/nix/pull/6440#issuecomment-1120876248
2022-05-23Bump zeebe-io/backport-action from 0.0.7 to 0.0.8dependabot[bot]
Bumps [zeebe-io/backport-action](https://github.com/zeebe-io/backport-action) from 0.0.7 to 0.0.8. - [Release notes](https://github.com/zeebe-io/backport-action/releases) - [Commits](https://github.com/zeebe-io/backport-action/compare/v0.0.7...v0.0.8) --- updated-dependencies: - dependency-name: zeebe-io/backport-action dependency-type: direct:production update-type: version-update:semver-patch ... Signed-off-by: dependabot[bot] <support@github.com>
2022-05-23Merge pull request #6490 from abathur/fix_macos_install_vim_againDomen Kožar
darwin-install: fix break from bad vimrc
2022-05-23commentBen Burdette
2022-05-23Merge pull request #6560 from ncfavier/patch-1Théophane Hufschmitt
typo: defaultApps → defaultApp
2022-05-23Merge pull request #6532 from flox/show_warningThéophane Hufschmitt
fix: alignment during flake show of legacyPackages
2022-05-22remove redundant 'debugMode' flagBen Burdette
2022-05-22commentsBen Burdette
2022-05-22change state derefsBen Burdette
2022-05-22changning repl to use EvalState& instead of refBen Burdette
2022-05-21typo: defaultApps → defaultAppNaïm Camille Favier
2022-05-20remove special tryEval behaviorBen Burdette