aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2022-12-05Merge pull request #7329 from fricklerhandwerk/maintainersEelco Dolstra
add maintainers' handbook
2022-12-05maintainers/README.md: Use CETEelco Dolstra
2022-12-05Fix typoEelco Dolstra
2022-12-05Merge pull request #7277 from fricklerhandwerk/codeownersThéophane Hufschmitt
add CODEOWNERS
2022-12-02Merge pull request #7387 from fricklerhandwerk/upvote-conventionEelco Dolstra
encourage adding 👍 to express interest
2022-12-02Merge pull request #7394 from edolstra/fix-7268Eelco Dolstra
Lower verbosity of exceptions in getMaxCPU()
2022-12-02Merge pull request #7395 from obsidiansystems/evaluating-to-callingEelco Dolstra
Change "while evaluating <fun>" to "while *calling*" in trace
2022-12-02Change "while evaluating <fun>" to "while *calling*" in traceJohn Ericson
The old way was not correct. Here is an example: ``` $ nix-instantiate --eval --expr 'let x = a: throw "asdf"; in x 1' --show-trace error: asdf … while evaluating 'x' at «string»:1:9: 1| let x = a: throw "asdf"; in x 1 | ^ … from call site at «string»:1:29: 1| let x = a: throw "asdf"; in x 1 | ^ ``` and yet also: ``` $ nix-instantiate --eval --expr 'let x = a: throw "asdf"; in x' --show-trace <LAMBDA> ``` Here is the thing: in both cases we are evaluating `x`! Nix is a higher-order languages, and functions are a sort of value. When we write `x = a: ...`, `a: ...` is the expression that `x` is being defined to be, and that is already a value. Therefore, we should *never* get an trace that says "while evaluating `x`", because evaluating `a: ...` is *trival* and nothing happens during it! What is actually happening here is we are applying `x` and evaluating its *body* with arguments substituted for parameters. I think the simplest way to say is just "while *calling* `x`", and so that is what I changed it to.
2022-12-02getMaxCPU(): Lower verbosity level for ignored exceptionsEelco Dolstra
Fixes #7268.
2022-12-02Merge pull request #7381 from aakropotkin/doc-ltoa-conflictsValentin Gagarin
doc: listToAttrs: document repeated keys
2022-12-02Clean up cgroup handling in getMaxCPU()Eelco Dolstra
Also, don't assume in LocalDerivationGoal that cgroups are mounted on /sys/fs/cgroup.
2022-12-02Move cgroup.{cc,hh} to libutilEelco Dolstra
2022-12-01Merge pull request #7251 from RelationalAI-oss/sp-docs-uninstall-promptValentin Gagarin
docs: drop shell prompt character for consistency
2022-12-01encourage adding 👍 to express interestValentin Gagarin
decided on the @NixOS/documentation-team, see NixOS/nix.dev#359 for more information
2022-12-01doc: listToAttrs: add extra whitespaceAlex Ameen
2022-12-01Merge pull request #7386 from edolstra/fix-jsonEelco Dolstra
Really fix 'nix store make-content-addressed --json'
2022-12-01Really fix 'nix store make-content-addressed --json'Eelco Dolstra
https://hydra.nixos.org/log/mcgypcf9vj4n8vdmw7lj3l05c899v73w-nix-2.12.0pre20221201_16b03f0-x86_64-unknown-linux-musl.drv
2022-11-30doc: listToAttrs: fix line wrappingAlex Ameen
2022-11-30doc: listToAttrs: document repeated keysAlex Ameen
2022-12-01Merge pull request #7375 from NixOS/formatting-nitpickValentin Gagarin
add missing newline, for consistent formatting
2022-11-30add missing newline, for consistent formattingValentin Gagarin
2022-11-30Merge pull request #7372 from edolstra/fix-jsonEelco Dolstra
nix store make-content-addressed: Fix JSON construction
2022-11-30nix store make-content-addressed: Fix JSON constructionEelco Dolstra
Fixes error: [json.exception.type_error.301] cannot create object from initializer list in tests/fetchClosure.sh.
2022-11-29Merge pull request #7342 from fricklerhandwerk/refactor-generate-builtinsThéophane Hufschmitt
refactor rendering documentation of builtins
2022-11-29Merge pull request #3600 from NixOS/auto-uid-allocationEelco Dolstra
Automatic UID allocation
2022-11-29Restore ownership of / for non-uid-range buildsEelco Dolstra
2022-11-29Merge pull request #7365 from NixOS/fix-6979-nobody-user-in-dockerEelco Dolstra
Add nobody user/group to Nix docker image
2022-11-29Merge pull request #7358 from ncfavier/repl-exit-newlineEelco Dolstra
repl: print a newline on ctrl-D
2022-11-29Merge pull request #7363 from ↵Eelco Dolstra
NixOS/dependabot/github_actions/zeebe-io/backport-action-0.0.9 Bump zeebe-io/backport-action from 0.0.8 to 0.0.9
2022-11-29Add nobody user/group to Nix docker imageRok Garbas
2022-11-28Bump zeebe-io/backport-action from 0.0.8 to 0.0.9dependabot[bot]
Bumps [zeebe-io/backport-action](https://github.com/zeebe-io/backport-action) from 0.0.8 to 0.0.9. - [Release notes](https://github.com/zeebe-io/backport-action/releases) - [Commits](https://github.com/zeebe-io/backport-action/compare/v0.0.8...v0.0.9) --- updated-dependencies: - dependency-name: zeebe-io/backport-action dependency-type: direct:production update-type: version-update:semver-patch ... Signed-off-by: dependabot[bot] <support@github.com>
2022-11-28Add exampleEelco Dolstra
2022-11-28Add a setting for enabling cgroupsEelco Dolstra
2022-11-28Check that auto-allocated UIDs don't clash with existing accountsEelco Dolstra
2022-11-28Merge pull request #7313 from yorickvP/nlohmann-everywhereEelco Dolstra
Replace src/libutil/json.cc with nlohmann
2022-11-28use logger->cout Naïm Favier
in order to avoid potential problems with the progress bar Co-authored-by: Eelco Dolstra <edolstra@gmail.com>
2022-11-28repl: print a newline on ctrl-DNaïm Favier
2022-11-27Fix evaluationEelco Dolstra
2022-11-27Add tests for auto-uid-allocation, uid-range and cgroupsEelco Dolstra
2022-11-27Merge pull request #7353 from edolstra/gc-shutdownEelco Dolstra
Fix random client failures during GC server shutdown
2022-11-27Fix random client failures during GC server shutdownEelco Dolstra
We need to close the GC server socket before shutting down the active GC client connections, otherwise a client may (re)connect and get ECONNRESET. But also handle ECONNRESET for resilience. Fixes random failures like GC socket disconnected connecting to '/tmp/nix-shell.y07M0H/nix-test/default/var/nix/gc-socket/socket' sending GC root '/tmp/nix-shell.y07M0H/nix-test/default/store/kb5yzija0f1x5xkqkgclrdzldxj6nnc6-non-blocking' reading GC root from client: error: unexpected EOF reading a line 1 store paths deleted, 0.00 MiB freed error: reading from file: Connection reset by peer in gc-non-blocking.sh.
2022-11-26Merge pull request #7350 from edolstra/remove-strndupEelco Dolstra
Don't use GC_STRNDUP
2022-11-25Don't use GC_STRNDUPEelco Dolstra
It calls strlen() on the input (rather than simply copying at most `size` bytes), which can fail if the input is not zero-terminated and is inefficient in any case. Fixes #7347.
2022-11-24refactor rendering documentation of builtinsValentin Gagarin
as in [1], make the document structure visible, like in a template [1]: 4655563470b59e0ef50a33af003058c2b54db778
2022-11-24the point is setting a default reviewer, not notificationsValentin Gagarin
2022-11-23Merge pull request #7337 from Radvendii/why-depends-caThéophane Hufschmitt
Fix why-depends for CA derivations
2022-11-23add explanation and testTaeer Bar-Yam
2022-11-23Fix why-depends for CA derivationsTaeer Bar-Yam
why-depends assumed that we knew the output path of the second argument. For CA derivations, we might not know until it's built. One way to solve this would be to build the second installable to get the output path. In this case we don't need to, though. If the first installable (A) depends on the second (B), then getting the store path of A will necessitate having the store path B. The contrapositive is, if the store path of B is not known (i.e. it's a CA derivation which hasn't been built), then A does not depend on B.
2022-11-23Include UID in hexEelco Dolstra
2022-11-23Add release notesEelco Dolstra