Linus Heckemann
2aa89daab3
eval: improve type description for primops and applied primops
...
This can make type errors a little easier to understand.
2019-03-21 15:31:46 +01:00
Eelco Dolstra
6a3dfcb623
Merge pull request #2739 from mayflower/builtins-doc-explicit
...
manual: include builtins.* for globally available builtins
2019-03-21 12:24:44 +01:00
Linus Heckemann
6f093073b6
manual: include builtins.* for globally available builtins
...
This improves searchability.
2019-03-21 09:37:22 +01:00
Eelco Dolstra
ffeabf8390
Merge pull request #2731 from nomeata/link-to-conf-builders-use-substitutes
...
Link to `builders-use-substitutes` in chapter on distributed builds
2019-03-18 13:54:47 +01:00
Joachim Breitner
684c7fff80
Link to builders-use-substitutes
in chapter on distributed builds
...
fixes #2730 .
2019-03-16 19:03:40 +01:00
Eelco Dolstra
806291d18c
Merge pull request #2727 from Chakerbh/master
...
Add a 5 seconds of timeout to connecting to S3.
2019-03-15 21:25:10 +08:00
Chaker Benhamed
81a23fa7e2
Add a 5 seconds of timeouts to connect to S3.
...
The default is 1000ms, but we can hit it a lot of we don't have direct
link to AWS (e.g. using VPN).
2019-03-15 13:23:58 +01:00
Graham Christensen
caf297a9d3
Merge pull request #2725 from andir/docs/s3-typo
...
docs: fix typo in AllowDirectReads
2019-03-14 18:53:57 -04:00
Andreas Rammhold
34fade478a
docs: fix typo in AllowDirectReads
...
It was just missing an `l` but should be fixed anyway.
2019-03-14 23:51:18 +01:00
Eelco Dolstra
1f64f4c7c8
pkg-config files: Use c++17
2019-03-14 14:11:12 +01:00
Eelco Dolstra
ef52ccf035
experimental/optional -> optional
2019-03-14 14:10:52 +01:00
Eelco Dolstra
86f3b94c8c
nix-store --gc --print-roots: Sort output
2019-03-14 13:59:10 +01:00
Eelco Dolstra
578ed7a259
findRoots(): Don't censor for trusted users
...
They're pretty much root anyway.
2019-03-14 13:53:34 +01:00
Eelco Dolstra
53522cb6ac
findRoots(): Add 'censor' parameter
...
This is less brittle than filtering paths after the fact in
nix-daemon.
2019-03-14 13:53:34 +01:00
Eelco Dolstra
a3f37d87ea
findRuntimeRoots: Simplify/fix handling of /proc files
...
Scanning of /proc/<pid>/{exe,cwd} was broken because '{memory:' was
prepended twice. Also, get rid of the whole '{memory:...}' thing
because it's unnecessary, we can just list the file in /proc directly.
2019-03-14 13:30:25 +01:00
Guillaume Maudoux
115e2c8c67
Update tests to the new --roots format
2019-03-10 01:50:33 +01:00
Guillaume Maudoux
4f4391193c
Fix warning about unused variable
2019-03-10 00:56:09 +01:00
Guillaume Maudoux
38ee16ae9c
Unify internal findRootsXxx() api
2019-03-10 00:56:09 +01:00
Guillaume Maudoux
9d7221183a
unify naming of roots as links & targets
2019-03-10 00:56:09 +01:00
Guillaume Maudoux
9d87e3fbd2
require c++ 17
...
This fixes warnings about "structured binding declaration" requiring
"-std=c++1z".
2019-03-10 00:56:09 +01:00
Guillaume Maudoux
5c56570726
Also obfuscate the number of memory roots
2019-03-10 00:56:09 +01:00
Guillaume Maudoux
fc02b1b3ee
Also print rooted path in nix-store -q --roots
2019-03-10 00:56:09 +01:00
Guillaume Maudoux
8574b70342
fixup! Make roots a map of store paths to pinning links
2019-03-10 00:56:09 +01:00
Guillaume Maudoux
ebc86550f9
Make roots a map of store paths to pinning links
...
This new structure makes more sense as there may be many sources rooting
the same store path. Many profiles can reference the same path but this
is even more true with /proc/<pid>/maps where distinct pids can and
often do map the same store path.
This implementation is also more efficient as the `Roots` map contains
only one entry per rooted store path.
2019-03-10 00:56:09 +01:00
Guillaume Maudoux
a17f86ce3a
Obfuscate memory roots for non-root users
2019-03-10 00:56:09 +01:00
Guillaume Maudoux
43331d6344
detail memory roots
2019-03-10 00:56:09 +01:00
Eelco Dolstra
5886bc5996
Merge pull request #2710 from volth/patch-6
...
canBuildLocally: check for features
2019-03-06 13:21:44 +08:00
volth
fff8db205c
canBuildLocally: check for features
...
It could happen that the local builder match the system but lacks some features.
Now it results a failure.
The fix gracefully excludes the local builder from the set of available builders for derivation which requires the feature, so the derivation is built on remote builders only (as though it has incompatible system, like ```aarch64-linux``` when local is x86)
2019-03-06 05:03:25 +00:00
Eelco Dolstra
b71e1fb342
Restore --init calls in tests
2019-03-04 18:27:45 +08:00
Vladimír Čunát
4cfc131ec4
manual nitpick: document sha512 support in hashString
2019-03-01 14:30:30 +01:00
Will Dietz
0963479741
archive.cc: ignore more posix_fallocate "not supported" error codes
...
Fixes w/musl.
2019-03-01 10:31:17 +08:00
Eelco Dolstra
ad6dbecc1d
Merge pull request #2674 from LnL7/daemon-disable-fork-safety
...
nix-daemon: add variable to disable fork safety
2019-03-01 02:07:50 +01:00
Eelco Dolstra
ebd4d50e6e
Merge pull request #2703 from pradd/support_s3_region_param
...
Support parameters in S3 URLs
2019-02-26 22:59:29 +08:00
Dzmitry Zaitsau
06d6335987
fix indentation
2019-02-26 11:07:37 +01:00
Dzmitry Zaitsau
ac200c3678
Apply param values on S3Helper initialization
2019-02-25 18:06:19 +01:00
Dzmitry Zaitsau
56c18c67d9
Extend S3 URL parsing with parameters extraction
2019-02-25 18:00:55 +01:00
Dzmitry Zaitsau
07f992a74b
Extract and expose splitUriAndParams function
...
which splits a URL into localtor and parameter parts
2019-02-25 17:59:26 +01:00
Eelco Dolstra
6bfb082ea2
Merge pull request #2694 from zimbatm/no-store-init
...
remove noop uses of nix-store --init
2019-02-23 12:12:36 +01:00
Jonas Chevalier
b402148d8f
remove noop uses of nix-store --init
...
the nix-store --init command is a noop apparently
2019-02-22 21:07:53 +01:00
Shea Levy
e58a71442a
nix.sh: Be set -u compliant.
2019-02-14 13:24:16 -05:00
Eelco Dolstra
d8fe447139
Merge pull request #2579 from catern/dumpdb
...
nix-store: make --dump-db take a list of paths to dump
2019-02-14 13:08:02 +01:00
Eelco Dolstra
25722bd39a
Merge pull request #2677 from matthewbauer/disable-shared
...
Support --disable-shared flag.
2019-02-13 10:09:31 +01:00
Matthew Bauer
7ce1fae59f
Support --disable-shared flag.
...
This tells Nix to not build the shared libraries.
2019-02-13 00:03:10 -05:00
Eelco Dolstra
7a7ec22298
Merge pull request #2628 from shlevy/context-introspection
...
Context introspection
2019-02-12 17:57:35 +01:00
Daiderd Jordan
8ac1130cc2
nix-daemon: add variable to disable fork safety
...
Since macOS 10.14 this has become an error, causing problems if the
nix-daemon loads nix during substitution (this is a forked process).
Workaround for #2523 .
2019-02-09 20:35:30 +01:00
Eelco Dolstra
01d07b1e92
Revert "Restore parent mount namespace before executing a child process"
...
This reverts commit a0ef21262f
. This
doesn't work in 'nix run' and nix-shell because setns() fails in
multithreaded programs, and Boehm GC mark threads are uncancellable.
Fixes #2646 .
2019-02-05 10:49:19 +01:00
Shea Levy
b30be6b450
Add builtins.appendContext.
...
A partner of builtins.getContext, useful for the same reasons.
2019-01-31 08:52:23 -05:00
Spencer Baugh
5f1891b795
nix-store: make --dump-db take a list of paths to dump
...
Inside a derivation, exportReferencesGraph already provides a way to
dump the Nix database for a specific closure. On the command line,
--dump-db gave us the same information, but only for the entire Nix
database at once.
With this change, one can now pass a list of paths to --dump-db to get
the Nix database dumped for just those paths. (The user is responsible
for ensuring this is a closure, like for --export).
Among other things, this is useful for deploying a closure to a new
host without using --import/--export; one can use tar to transfer the
store paths, and --dump-db/--load-db to transfer the validity
information. This is useful if the new host doesn't actually have Nix
yet, and the closure that is being deployed itself contains Nix.
2019-01-23 01:24:34 +00:00
Domen Kožar
92d08c02c8
Merge pull request #2635 from veprbl/patch-7
...
manual: "sandbox" option default is "true" on Linux
2019-01-20 09:43:26 +07:00
Dmitry Kalinkin
15efd54373
manual: "sandbox" option default is "true" on Linux
...
Fixes: 812e39313c
('Enable sandboxing by default')
2019-01-19 15:04:43 -05:00