aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2019-03-14findRoots(): Don't censor for trusted usersEelco Dolstra
They're pretty much root anyway.
2019-03-14findRoots(): Add 'censor' parameterEelco Dolstra
This is less brittle than filtering paths after the fact in nix-daemon.
2019-03-14findRuntimeRoots: Simplify/fix handling of /proc filesEelco Dolstra
Scanning of /proc/<pid>/{exe,cwd} was broken because '{memory:' was prepended twice. Also, get rid of the whole '{memory:...}' thing because it's unnecessary, we can just list the file in /proc directly.
2019-03-10Update tests to the new --roots formatGuillaume Maudoux
2019-03-10Fix warning about unused variableGuillaume Maudoux
2019-03-10Unify internal findRootsXxx() apiGuillaume Maudoux
2019-03-10unify naming of roots as links & targetsGuillaume Maudoux
2019-03-10require c++ 17Guillaume Maudoux
This fixes warnings about "structured binding declaration" requiring "-std=c++1z".
2019-03-10Also obfuscate the number of memory rootsGuillaume Maudoux
2019-03-10Also print rooted path in `nix-store -q --roots`Guillaume Maudoux
2019-03-10fixup! Make roots a map of store paths to pinning linksGuillaume Maudoux
2019-03-10Make roots a map of store paths to pinning linksGuillaume Maudoux
This new structure makes more sense as there may be many sources rooting the same store path. Many profiles can reference the same path but this is even more true with /proc/<pid>/maps where distinct pids can and often do map the same store path. This implementation is also more efficient as the `Roots` map contains only one entry per rooted store path.
2019-03-10Obfuscate memory roots for non-root usersGuillaume Maudoux
2019-03-10detail memory rootsGuillaume Maudoux
2019-03-06Merge pull request #2710 from volth/patch-6Eelco Dolstra
canBuildLocally: check for features
2019-03-06canBuildLocally: check for featuresvolth
It could happen that the local builder match the system but lacks some features. Now it results a failure. The fix gracefully excludes the local builder from the set of available builders for derivation which requires the feature, so the derivation is built on remote builders only (as though it has incompatible system, like ```aarch64-linux``` when local is x86)
2019-03-04Restore --init calls in testsEelco Dolstra
2019-03-01manual nitpick: document sha512 support in hashStringVladimír Čunát
2019-03-01archive.cc: ignore more posix_fallocate "not supported" error codesWill Dietz
Fixes w/musl.
2019-03-01Merge pull request #2674 from LnL7/daemon-disable-fork-safetyEelco Dolstra
nix-daemon: add variable to disable fork safety
2019-02-26Merge pull request #2703 from pradd/support_s3_region_paramEelco Dolstra
Support parameters in S3 URLs
2019-02-26fix indentationDzmitry Zaitsau
2019-02-25Apply param values on S3Helper initializationDzmitry Zaitsau
2019-02-25Extend S3 URL parsing with parameters extractionDzmitry Zaitsau
2019-02-25Extract and expose splitUriAndParams functionDzmitry Zaitsau
which splits a URL into localtor and parameter parts
2019-02-23scripts: remove default 'sandbox = false' from multi-user installerAustin Seipp
Sandboxing is now enabled by default on Linux, but is still disabled on macOS. However, the installer always turned it off to ensure consistent behavior. Remove this default configuration, so we fall back to the default platform-specific value. Signed-off-by: Austin Seipp <aseipp@pobox.com>
2019-02-23Merge pull request #2694 from zimbatm/no-store-initEelco Dolstra
remove noop uses of nix-store --init
2019-02-22remove noop uses of nix-store --initzimbatm
the nix-store --init command is a noop apparently
2019-02-20install script: don't abort when "nix-channel --update" failsBjørn Forsman
Instead, print a message about what happened and tell the user what can be done (run "[sudo -i] nix-channel --update nixpkgs" again at a later time). This change allows installing Nix when you're offline. Since the multi-user installer is so verbose, the message isn't printed until the end. Fixes issue #2650 ("installation without internet connection").
2019-02-14nix.sh: Be set -u compliant.Shea Levy
2019-02-14Merge pull request #2579 from catern/dumpdbEelco Dolstra
nix-store: make --dump-db take a list of paths to dump
2019-02-13Merge pull request #2677 from matthewbauer/disable-sharedEelco Dolstra
Support --disable-shared flag.
2019-02-13Support --disable-shared flag.Matthew Bauer
This tells Nix to not build the shared libraries.
2019-02-12Merge pull request #2628 from shlevy/context-introspectionEelco Dolstra
Context introspection
2019-02-09nix-daemon: add variable to disable fork safetyDaiderd Jordan
Since macOS 10.14 this has become an error, causing problems if the nix-daemon loads nix during substitution (this is a forked process). Workaround for #2523.
2019-02-05Revert "Restore parent mount namespace before executing a child process"Eelco Dolstra
This reverts commit a0ef21262f4d5652bfb65cfacaec01d89c475a93. This doesn't work in 'nix run' and nix-shell because setns() fails in multithreaded programs, and Boehm GC mark threads are uncancellable. Fixes #2646.
2019-01-31Add builtins.appendContext.Shea Levy
A partner of builtins.getContext, useful for the same reasons.
2019-01-23nix-store: make --dump-db take a list of paths to dumpSpencer Baugh
Inside a derivation, exportReferencesGraph already provides a way to dump the Nix database for a specific closure. On the command line, --dump-db gave us the same information, but only for the entire Nix database at once. With this change, one can now pass a list of paths to --dump-db to get the Nix database dumped for just those paths. (The user is responsible for ensuring this is a closure, like for --export). Among other things, this is useful for deploying a closure to a new host without using --import/--export; one can use tar to transfer the store paths, and --dump-db/--load-db to transfer the validity information. This is useful if the new host doesn't actually have Nix yet, and the closure that is being deployed itself contains Nix.
2019-01-20Merge pull request #2635 from veprbl/patch-7Domen Kožar
manual: "sandbox" option default is "true" on Linux
2019-01-19manual: "sandbox" option default is "true" on LinuxDmitry Kalinkin
Fixes: 812e39313c ('Enable sandboxing by default')
2019-01-18unsupported(): Show the name of the unsupported operationEelco Dolstra
2019-01-18Merge pull request #2638 from ↵Eelco Dolstra
sevanspowell/update-nix-shell-interpreter-haskell-instructions Update instructions for Haskell script using nix-shell interpreter
2019-01-18Update instructions for Haskell script using nix-shell interpreterSamuel Evans-Powell
- The instructions for using nix-shell as an interpreter has a Haskell script example that doesn't work on more recent versions of Nix. Update the instructions with a working command
2019-01-14Add builtins.getContext.Shea Levy
This can be very helpful when debugging, as well as enabling complex black magic like surgically removing a single dependency from a string's context.
2019-01-13Treat plain derivation paths in context as normal paths.Shea Levy
Previously, plain derivation paths in the string context (e.g. those that arose from builtins.storePath on a drv file, not those that arose from accessing .drvPath of a derivation) were treated somewhat like derivaiton paths derived from .drvPath, except their dependencies weren't recursively added to the input set. With this change, such plain derivation paths are simply treated as paths and added to the source inputs set accordingly, simplifying context handling code and removing the inconsistency. If drvPath-like behavior is desired, the .drv file can be imported and then .drvPath can be accessed. This is a backwards-incompatibility, but storePath is never used on drv files within nixpkgs and almost never used elsewhere.
2019-01-11install: Use base-16 hashesEelco Dolstra
Issue #2623.
2019-01-11Bump versionEelco Dolstra
2019-01-10Add 2.2 release notesEelco Dolstra
2019-01-10Revert "Remove some bashisms from configure.ac"Eelco Dolstra
This reverts commit e8b0efdcc9d6329b299937790360cac8b9b256c9.
2019-01-10Revert "Escape square brackets in configure.ac"Eelco Dolstra
This reverts commit 80f464d9d72839841422f75e78ce725365cc3d71.