aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2022-11-04systemd,launchd match nixos open files limitArtturin
it was bumped in https://github.com/NixOS/nixpkgs/pull/176558
2022-06-03Merge pull request #6603 from abathur/installer_fix_vi_swapfileEelco Dolstra
darwin-install: work around existing vim swap files
2022-06-03Merge pull request #6600 from asymmetric/hash-commentEelco Dolstra
schema.sql: add comment about hash being in base16
2022-06-03Merge pull request #6610 from edolstra/random-fixesEelco Dolstra
Random fixes/improvements from the lazy-trees branch
2022-06-02Avoid unnecessary string copyEelco Dolstra
2022-06-02Add operator for concatenating strings and string_viewsEelco Dolstra
2022-06-02TypoEelco Dolstra
2022-06-02Shut up clang warningsEelco Dolstra
2022-06-02tests/flakes.sh: Fix some ignored breakageEelco Dolstra
2022-06-01Merge pull request #5813 from pennae/ltoThéophane Hufschmitt
enable LTO in optimized builds
2022-06-01Merge branch 'master' into ltoThéophane Hufschmitt
2022-06-01darwin-install: work around existing vim swapfilesTravis A. Everett
User on Matrix reported install problems which presented as "vifs:editing error" which we traced back to vim griping about an existing swap file. When opened interactively, it did this: E325: ATTENTION Found a swap file by the name "/etc/.fstab.swp" owned by: root dated: Sön Apr 24 16:54:10 2022 file name: /private/etc/fstab modified: YES user name: root host name: MBP.local process ID: 1698 While opening file "/etc/fstab" dated: Sön Apr 24 16:56:27 2022 NEWER than swap file! ...
2022-06-01schema.sql: add comment about hash being in base16Lorenzo Manacorda
2022-05-31Merge pull request #6582 from NixOS/debug-fetchgit-sigsevEelco Dolstra
Fix a segfault in the git fetcher
2022-05-31TypoEelco Dolstra
2022-05-31Merge pull request #6537 from cole-h/update-flakeEelco Dolstra
flake: use github: reference to nixpkgs
2022-05-30Bump versionEelco Dolstra
2022-05-30Branch 2.9 release notesEelco Dolstra
2022-05-30Merge pull request #6590 from edolstra/fix-noexceptEelco Dolstra
Fix noexcept violations
2022-05-30Mark nix-perl as a Perl moduleEelco Dolstra
The call to perl.withPackages in nix-serve expects this.
2022-05-30Merge pull request #6589 from edolstra/respect-output-specifiedEelco Dolstra
Respect the outputSpecified attribute
2022-05-30Set meta.platformsEelco Dolstra
'nix-serve' in nixpkgs expects the nix package to set this.
2022-05-30RemoteStore::queryRealisationUncached(): Fix potential noexcept violationEelco Dolstra
2022-05-30HttpBinaryCacheStore::getFile(): Don't throw an exceptionEelco Dolstra
This violates the noexcept specification. Fixes #6445.
2022-05-30Respect the outputSpecified attributeEelco Dolstra
E.g. 'nix build nixpkgs#libxml2.dev' will build the 'dev' output.
2022-05-27Fix a segfault in the git fetcherThéophane Hufschmitt
The git fetcher code used to dereference the (potentially empty) `ref` input attribute. This was magically working, probably because the compiler somehow outsmarted us, but is now blowing up with newer nixpkgs versions. Fix that by not trying to access this field while we don't know for sure that it has been defined. Fix #6554
2022-05-27Style fixEelco Dolstra
2022-05-27Merge branch 'doc-redirects' of https://github.com/jtojnar/nixEelco Dolstra
2022-05-26Merge pull request #6580 from trofi/fix-build-for-gcc-13Eelco Dolstra
src/libutil/json.cc: add missing <cstdint> include for gcc-13
2022-05-26src/libutil/json.cc: add missing <cstdint> include for gcc-13Sergei Trofimovich
Without the change llvm build fails on this week's gcc-13 snapshot as: src/libutil/json.cc: In function 'void nix::toJSON(std::ostream&, const char*, const char*)': src/libutil/json.cc:33:22: error: 'uint16_t' was not declared in this scope 33 | put(hex[(uint16_t(*i) >> 12) & 0xf]); | ^~~~~~~~ src/libutil/json.cc:5:1: note: 'uint16_t' is defined in header '<cstdint>'; did you forget to '#include <cstdint>'? 4 | #include <cstring> +++ |+#include <cstdint> 5 |
2022-05-26doc: Add redirects for the DocBook manualJan Tojnar
There are still many links to the old manual on the web and having them end up on the Introduction page is a bad user experience.
2022-05-26doc: Manually insert some anchorsJan Tojnar
2022-05-26doc: Add anchors to long listsJan Tojnar
Added using the following sed scripts: - For command-ref/opt-common.md: s~- `(--?)([^`]+)`~- [`\1\2`]{#opt-\2}~g - For expressions/builtin-constants.md: s~- `(builtins\.?)([^`]+)`~- [`\1\2`]{#builtins-\2}~g - For expressions/advanced-attributes.md s~^ - `([^`]+)`~ - [`\1`]{#adv-attr-\1}~g and manually adjusted outputHashAlgo & outputHashMode. - For glossary.md s~^ - (`([^`]+)`|(.+)) ?\\~ - [\1]{#gloss-\2\3}\\~g; s~(gloss-\w+) ~\1-~g and manually adjusted anchors for Nix expression, user environment, NAR, ∅ and ε. - For command-ref/env-common.md s~^ - `([^`]+)`~ - [`\1`]{#env-\1}~g'
2022-05-26doc: Port anchors preprocessor to jq scriptJan Tojnar
Python is only pulled into the build closure by Mercurial, which might end up being removed. Let’s port the script to jq, which is more likely to stay.
2022-05-26doc: Introduce pre-processor for adding anchors to textJan Tojnar
It is now possible to use the following syntax to insert anchors into the text: []{#anchor-name} The anchor will allow linking to the location it is placed by appending #anchor-name to the URL. Additionally, it is possible to create a link pointing to its own location by adding text between the square brackets: [`--add-root`]{#opt-add-root}
2022-05-26Merge pull request #6578 from edolstra/remove-perlEelco Dolstra
Remove unused Perl dependency
2022-05-26Remove unused Perl dependencyEelco Dolstra
2022-05-26Merge pull request #6576 from hercules-ci/daemon-increase-socket-backlogEelco Dolstra
Fix `Connection refused` on daemon socket
2022-05-26Tweak IN_NIX_SHELL descriptionEelco Dolstra
2022-05-26Remove pre-C++11 hackinessEelco Dolstra
2022-05-26createUnixDomainSocket: listen(unix, 5 -> 100)Robert Hensing
This solves the error error: cannot connect to socket at '/nix/var/nix/daemon-socket/socket': Connection refused on build farm systems that are loaded but operating normally. I've seen this happen on an M1 mac running a loaded hercules-ci-agent. Hercules CI uses multiple worker processes, which may connect to the Nix daemon around the same time. It's not unthinkable that the Nix daemon listening process isn't scheduled until after 6 workers try to connect, especially on a system under load with many workers. Is the increase safe? The number is the number of connections that the kernel will buffer while the listening process hasn't `accept`-ed them yet. It did not - and will not - restrict the total number of daemon forks that a client can create. History The number 5 has remained unchanged since the introduction in nix-worker with 0130ef88ea in 2006.
2022-05-26Merge pull request #6570 from edolstra/eof-in-stringEelco Dolstra
Handle EOFs in string literals correctly
2022-05-26Merge pull request #5416 from bburdette/debug-exploratory-PREelco Dolstra
--debugger flag
2022-05-25remove parens from repl helpBen Burdette
2022-05-25Merge branch 'master' into debug-exploratory-PRBen Burdette
2022-05-25add --debugger to rl-next listBen Burdette
2022-05-25back to ref<EvalState> in NixReplBen Burdette
2022-05-25Handle EOFs in string literals correctlyEelco Dolstra
We can't return a STR token without setting a valid StringToken, otherwise the parser will crash. Fixes #6562.
2022-05-25TypoEelco Dolstra
2022-05-25Merge remote-tracking branch 'origin/file-fetcher'Eelco Dolstra