[Nix-commits] [NixOS/nixpkgs] 896cca: ffmpeg: switch everything to ffmpeg_3 by default

2016-07-01 Thread Vladimír Čunát
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 896ccadeced368518f4b675060f8c1e31807eed4
  
https://github.com/NixOS/nixpkgs/commit/896ccadeced368518f4b675060f8c1e31807eed4
  Author: Profpatsch 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M pkgs/top-level/all-packages.nix
M pkgs/top-level/python-packages.nix

  Log Message:
  ---
  ffmpeg: switch everything to ffmpeg_3 by default

And fix packages incompatible with ffmpeg_3.


  Commit: 6b80d74ab760df2f6d5b3a69265bf6fef269bfcb
  
https://github.com/NixOS/nixpkgs/commit/6b80d74ab760df2f6d5b3a69265bf6fef269bfcb
  Author: Vladimír Čunát 
  Date:   2016-07-02 (Sat, 02 Jul 2016)

  Changed paths:
M pkgs/top-level/all-packages.nix
M pkgs/top-level/python-packages.nix

  Log Message:
  ---
  Merge #16632: ffmpeg3 by default


Compare: https://github.com/NixOS/nixpkgs/compare/5356154366b9...6b80d74ab760___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] [NixOS/nixpkgs] 535615: libvirt and pythonPackages.libvirt: 1.3.5 -> 2.0.0

2016-07-01 Thread Rickard Nilsson
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 5356154366b9a7cbc2cc61c7a22ada604752ba38
  
https://github.com/NixOS/nixpkgs/commit/5356154366b9a7cbc2cc61c7a22ada604752ba38
  Author: Rickard Nilsson 
  Date:   2016-07-02 (Sat, 02 Jul 2016)

  Changed paths:
M pkgs/development/libraries/libvirt/default.nix
M pkgs/top-level/python-packages.nix

  Log Message:
  ---
  libvirt and pythonPackages.libvirt: 1.3.5 -> 2.0.0


___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] [NixOS/nixpkgs] 0c0f06: cron: fix crontab(5) and cron job PATH

2016-07-01 Thread Christian Kauhaus
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 0c0f068f35e5302c07ad32eb5a301ce50b23ddac
  
https://github.com/NixOS/nixpkgs/commit/0c0f068f35e5302c07ad32eb5a301ce50b23ddac
  Author: Christian Kauhaus 
  Date:   2016-07-02 (Sat, 02 Jul 2016)

  Changed paths:
M pkgs/tools/system/cron/default.nix

  Log Message:
  ---
  cron: fix crontab(5) and cron job PATH

Switch off HAVE_SAVED_UIDS since it activates a code path for temporary
privilege dropping which does not work on NixOS.

Vixie-cron's sources ship with two implementations. Unfortunately, the
one activated by HAVE_SAVED_UIDS (using setuid()) does not work on
NixOS. Saved UIDs work only if the program which is using them has the
setuid bit set on its own executable, not if called from a setuid
wrapper (as we do it in NixOS). The other implementation (using
setreuid()) works without problems.

Quote from
:

If you're euid is root and you change the uid, the privileges gets
dropped permanently.If effective user id is not root then saved user
id is never touched and you can regain the root privilege back
anytime you want in your program.

Also extend the default PATH with NixOS-specific bin directories as
vixie-cron's default is not really usable on NixOS.

Re #16518

Closes #16522


___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


Re: [Nix-dev] Multiple machines with nix store shared via NFS

2016-07-01 Thread Renato Alves
Had a look at the links. The 2011 thread mentions problems that have
been addressed by either nix-daemon or remote-build nodes.

There's also some references to socat but not much. Seems like
forwarding could indeed be a solution but from what I read elsewhere
it's a fragile setup and requires ssh-agent and passwordless keys.

There's also some articles about using haproxy and nginx to proxy
sockets but it's all very much ad-hoc. I'm also not sure how this would
work given the security model of nix-daemon.

The 2014 thread is also a good read but focused on using the cluster
infrastructure to compile things. I don't want to go down that road yet.
Perhaps in the future if necessary.
At the moment I'd be happy with having nix-env and nix-shell on all
machines.

Is there currently any support for NIX_REMOTE specifying a connection to
a daemon on a different host? (i.e. literally REMOTE :)

R



On 01/07/16 22:34, Layus wrote:
> I never sait it was a good idea, just soemthing worth investigating.
> 
> Now, this has been discussed on the ML already
> 
> See for example
> [Nix-dev] Sharing the Nix store between systems
>   
> /Rickard
> Nilsson
> /[Nix-dev] nix on compute cluster?
>  
> //Andreas
> Herrmann
> 
> //And more generally Google search on
> site:http://lists.science.uu.nl/pipermail/nix-dev/ :-).
> 
> -- Layus.
> 
> On 01/07/16 21:55, Renato Alves wrote:
>> I never tried it with sockets, only tcp ports.
>>
>> I need to move the socket to a different location. Currently it also
>> sits on NFS. I can play with symlinks making it point to a local disk.
>>
>> The entire setup sounds terribly hackish though.
>>
>> If anyone has better alternatives I'd love to hear them.
>>
>> Thanks,
>> R
>>
>> On 01/07/16 20:51, Layus wrote:
>>> Just one idea off the top of my head: Would it be possible to forward
>>> the unix socket of the daemon ?
>>>
>>> -- Layus ?
>>>
>>> On 01/07/16 15:10, Renato Alves wrote:
 Hi everyone,


 Recently I've been trying to setup nix on a multiple-machine shared
 environment. At the moment I have one machine setup with nix-daemon
 running from a store in a custom location (/shared/myuser/nix). This
 location is shared via NFS with several other machines. This is all
 still pretty new to me as I've only recently started using nix and
 haven't used nixos yet.

 Before setting up nix-daemon I ran into some problems with database
 corruption (sqlite) due to concurrent processes. With nix-daemon these
 have gone away.

 One limitation that I identified recently is that on any of the other
 machines that do not have nix-daemon running (but have read access to
 the store) I can run commands from the store without problems but
 cannot, for instance, use nix-shell.
 So I thought of spawning a nix-daemon instance on those machines but I'm
 not sure what is the best way to set it up without risking DB corruption
 again.

 These are the requirements I'd like to meet:
  * /shared/myuser/nix is shared across multiple machines with the same
 architecture (x86_64-linux).
  * All machines should be able to use nix-shell or any nix related
 command, including requesting installation of packages.
  * Only some machines are allowed to compile. Machines that are not
 allowed should rely on something like remote-systems.conf to distribute
 work.

 Is this kind of setup currently possible with nix? If so, can someone
 provide some guidance?


 Thanks,
 Renato



 ___
 nix-dev mailing list
 nix-dev@lists.science.uu.nl
 http://lists.science.uu.nl/mailman/listinfo/nix-dev
>>>
>>>
>>>
>>> ___
>>> nix-dev mailing list
>>> nix-dev@lists.science.uu.nl
>>> http://lists.science.uu.nl/mailman/listinfo/nix-dev
>>>
>>
>>
>> ___
>> nix-dev mailing list
>> nix-dev@lists.science.uu.nl
>> http://lists.science.uu.nl/mailman/listinfo/nix-dev
> 
> 
> 
> 
> ___
> nix-dev mailing list
> nix-dev@lists.science.uu.nl
> http://lists.science.uu.nl/mailman/listinfo/nix-dev
> 



signature.asc
Description: OpenPGP digital signature
___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


[Nix-dev] Hydra out of disk space

2016-07-01 Thread Bjørn Forsman
I just checked the release-16.03 job, some builds are failing, checked
a random one:

tar: adwaita-icon-theme-3.18.0/Adwaita/32x32/status/appointment-soon.png:
Cannot write: No space left on device
tar: 
adwaita-icon-theme-3.18.0/Adwaita/32x32/status/network-transmit-receive.png:
Cannot write: No space left on device
tar: Exiting with failure status due to previous errors
do not know how to unpack source archive
/nix/store/n7xni4clqcbl8wfdhr7p90bgfg9vfbl6-adwaita-icon-theme-3.18.0.tar.xz
builder for 
‘/nix/store/aj2imi6wzhf96q1wwkhcdd2gvdai3aki-adwaita-icon-theme-3.18.0.drv’
failed with exit code 1

- Bjørn
___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


Re: [Nix-dev] Multiple machines with nix store shared via NFS

2016-07-01 Thread Renato Alves
Hi Azul,

This scenario is not NixOS so there's no need to rollback anything.
I'm simply using the nix package manager.

But yes, if the filestorage goes down, the nix store will not be
accessible. This is something we'll have to live with if it happens.

R

On 01/07/16 22:38, Azul wrote:
> how would you rollback a broken system if the /nix store was remote and
> the box wouldnt boot or have no network ?
> 
> On 1 July 2016 at 21:34, Layus  > wrote:
> 
> I never sait it was a good idea, just soemthing worth investigating.
> 
> Now, this has been discussed on the ML already
> 
> See for example
> [Nix-dev] Sharing the Nix store between systems
>  
> /Rickard Nilsson
> /[Nix-dev] nix on compute cluster?
>  
> //Andreas
> Herrmann
> 
> //And more generally Google search on
> site:http://lists.science.uu.nl/pipermail/nix-dev/ :-).
> 
> -- Layus.
> 
> 
> On 01/07/16 21:55, Renato Alves wrote:
>> I never tried it with sockets, only tcp ports.
>>
>> I need to move the socket to a different location. Currently it also
>> sits on NFS. I can play with symlinks making it point to a local disk.
>>
>> The entire setup sounds terribly hackish though.
>>
>> If anyone has better alternatives I'd love to hear them.
>>
>> Thanks,
>> R
>>
>> On 01/07/16 20:51, Layus wrote:
>>> Just one idea off the top of my head: Would it be possible to forward
>>> the unix socket of the daemon ?
>>>
>>> -- Layus ?
>>>
>>> On 01/07/16 15:10, Renato Alves wrote:
 Hi everyone,


 Recently I've been trying to setup nix on a multiple-machine shared
 environment. At the moment I have one machine setup with nix-daemon
 running from a store in a custom location (/shared/myuser/nix). This
 location is shared via NFS with several other machines. This is all
 still pretty new to me as I've only recently started using nix and
 haven't used nixos yet.

 Before setting up nix-daemon I ran into some problems with database
 corruption (sqlite) due to concurrent processes. With nix-daemon these
 have gone away.

 One limitation that I identified recently is that on any of the other
 machines that do not have nix-daemon running (but have read access to
 the store) I can run commands from the store without problems but
 cannot, for instance, use nix-shell.
 So I thought of spawning a nix-daemon instance on those machines but 
 I'm
 not sure what is the best way to set it up without risking DB 
 corruption
 again.

 These are the requirements I'd like to meet:
  * /shared/myuser/nix is shared across multiple machines with the same
 architecture (x86_64-linux).
  * All machines should be able to use nix-shell or any nix related
 command, including requesting installation of packages.
  * Only some machines are allowed to compile. Machines that are not
 allowed should rely on something like remote-systems.conf to distribute
 work.

 Is this kind of setup currently possible with nix? If so, can someone
 provide some guidance?


 Thanks,
 Renato



 ___
 nix-dev mailing list
 nix-dev@lists.science.uu.nl 
 http://lists.science.uu.nl/mailman/listinfo/nix-dev
>>>
>>>
>>> ___
>>> nix-dev mailing list
>>> nix-dev@lists.science.uu.nl 
>>> http://lists.science.uu.nl/mailman/listinfo/nix-dev
>>>
>>
>>
>> ___
>> nix-dev mailing list
>> nix-dev@lists.science.uu.nl 
>> http://lists.science.uu.nl/mailman/listinfo/nix-dev
> 
> 
> 
> ___
> nix-dev mailing list
> nix-dev@lists.science.uu.nl 
> http://lists.science.uu.nl/mailman/listinfo/nix-dev
> 
> 
> 
> 
> ___
> nix-dev mailing list
> nix-dev@lists.science.uu.nl
> http://lists.science.uu.nl/mailman/listinfo/nix-dev
> 



signature.asc
Description: OpenPGP digital signature
___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


[Nix-commits] [NixOS/nixpkgs] ebfa02: perl-Moo: 2.002002 -> 2.002003

2016-07-01 Thread Robert Helgesson
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: ebfa029ece7c773f3ce5ddc32dc976d07732128e
  
https://github.com/NixOS/nixpkgs/commit/ebfa029ece7c773f3ce5ddc32dc976d07732128e
  Author: Robert Helgesson 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M pkgs/top-level/perl-packages.nix

  Log Message:
  ---
  perl-Moo: 2.002002 -> 2.002003


  Commit: b5705aa81e6243d92bd7f6ee936b64100639f093
  
https://github.com/NixOS/nixpkgs/commit/b5705aa81e6243d92bd7f6ee936b64100639f093
  Author: Robert Helgesson 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M pkgs/top-level/perl-packages.nix

  Log Message:
  ---
  perl-Test2-Suite: 0.32 -> 0.42


Compare: https://github.com/NixOS/nixpkgs/compare/b01886d6543d...b5705aa81e62___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


Re: [Nix-dev] Multiple machines with nix store shared via NFS

2016-07-01 Thread Azul
how would you rollback a broken system if the /nix store was remote and the
box wouldnt boot or have no network ?

On 1 July 2016 at 21:34, Layus  wrote:

> I never sait it was a good idea, just soemthing worth investigating.
>
> Now, this has been discussed on the ML already
>
> See for example
> [Nix-dev] Sharing the Nix store between systems
> 
> *Rickard Nilsson *[Nix-dev] nix on compute cluster?
> 
>
> * Andreas Herrmann *And more generally Google search on site:
> http://lists.science.uu.nl/pipermail/nix-dev/ :-).
>
> -- Layus.
>
>
> On 01/07/16 21:55, Renato Alves wrote:
>
> I never tried it with sockets, only tcp ports.
>
> I need to move the socket to a different location. Currently it also
> sits on NFS. I can play with symlinks making it point to a local disk.
>
> The entire setup sounds terribly hackish though.
>
> If anyone has better alternatives I'd love to hear them.
>
> Thanks,
> R
>
> On 01/07/16 20:51, Layus wrote:
>
> Just one idea off the top of my head: Would it be possible to forward
> the unix socket of the daemon ?
>
> -- Layus ?
>
> On 01/07/16 15:10, Renato Alves wrote:
>
> Hi everyone,
>
>
> Recently I've been trying to setup nix on a multiple-machine shared
> environment. At the moment I have one machine setup with nix-daemon
> running from a store in a custom location (/shared/myuser/nix). This
> location is shared via NFS with several other machines. This is all
> still pretty new to me as I've only recently started using nix and
> haven't used nixos yet.
>
> Before setting up nix-daemon I ran into some problems with database
> corruption (sqlite) due to concurrent processes. With nix-daemon these
> have gone away.
>
> One limitation that I identified recently is that on any of the other
> machines that do not have nix-daemon running (but have read access to
> the store) I can run commands from the store without problems but
> cannot, for instance, use nix-shell.
> So I thought of spawning a nix-daemon instance on those machines but I'm
> not sure what is the best way to set it up without risking DB corruption
> again.
>
> These are the requirements I'd like to meet:
>  * /shared/myuser/nix is shared across multiple machines with the same
> architecture (x86_64-linux).
>  * All machines should be able to use nix-shell or any nix related
> command, including requesting installation of packages.
>  * Only some machines are allowed to compile. Machines that are not
> allowed should rely on something like remote-systems.conf to distribute
> work.
>
> Is this kind of setup currently possible with nix? If so, can someone
> provide some guidance?
>
>
> Thanks,
> Renato
>
>
>
> ___
> nix-dev mailing 
> listnix-...@lists.science.uu.nlhttp://lists.science.uu.nl/mailman/listinfo/nix-dev
>
>
>
>
> ___
> nix-dev mailing 
> listnix-...@lists.science.uu.nlhttp://lists.science.uu.nl/mailman/listinfo/nix-dev
>
>
>
> ___
> nix-dev mailing 
> listnix-...@lists.science.uu.nlhttp://lists.science.uu.nl/mailman/listinfo/nix-dev
>
>
>
> ___
> nix-dev mailing list
> nix-dev@lists.science.uu.nl
> http://lists.science.uu.nl/mailman/listinfo/nix-dev
>
>
___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


Re: [Nix-dev] Multiple machines with nix store shared via NFS

2016-07-01 Thread Layus

I never sait it was a good idea, just soemthing worth investigating.

Now, this has been discussed on the ML already

See for example
[Nix-dev] Sharing the Nix store between systems 
/Rickard 
Nilsson
/[Nix-dev] nix on compute cluster? 
//Andreas 
Herrmann


//And more generally Google search on 
site:http://lists.science.uu.nl/pipermail/nix-dev/ :-).


-- Layus.

On 01/07/16 21:55, Renato Alves wrote:

I never tried it with sockets, only tcp ports.

I need to move the socket to a different location. Currently it also
sits on NFS. I can play with symlinks making it point to a local disk.

The entire setup sounds terribly hackish though.

If anyone has better alternatives I'd love to hear them.

Thanks,
R

On 01/07/16 20:51, Layus wrote:

Just one idea off the top of my head: Would it be possible to forward
the unix socket of the daemon ?

-- Layus ?

On 01/07/16 15:10, Renato Alves wrote:

Hi everyone,


Recently I've been trying to setup nix on a multiple-machine shared
environment. At the moment I have one machine setup with nix-daemon
running from a store in a custom location (/shared/myuser/nix). This
location is shared via NFS with several other machines. This is all
still pretty new to me as I've only recently started using nix and
haven't used nixos yet.

Before setting up nix-daemon I ran into some problems with database
corruption (sqlite) due to concurrent processes. With nix-daemon these
have gone away.

One limitation that I identified recently is that on any of the other
machines that do not have nix-daemon running (but have read access to
the store) I can run commands from the store without problems but
cannot, for instance, use nix-shell.
So I thought of spawning a nix-daemon instance on those machines but I'm
not sure what is the best way to set it up without risking DB corruption
again.

These are the requirements I'd like to meet:
  * /shared/myuser/nix is shared across multiple machines with the same
architecture (x86_64-linux).
  * All machines should be able to use nix-shell or any nix related
command, including requesting installation of packages.
  * Only some machines are allowed to compile. Machines that are not
allowed should rely on something like remote-systems.conf to distribute
work.

Is this kind of setup currently possible with nix? If so, can someone
provide some guidance?


Thanks,
Renato



___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev




___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev




___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev



___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


Re: [Nix-dev] Multiple machines with nix store shared via NFS

2016-07-01 Thread Renato Alves
Seems like the openssh server running is too old for socket forwarding.
Sadly updating it is not an option.

R

On 01/07/16 20:51, Layus wrote:
> Just one idea off the top of my head: Would it be possible to forward
> the unix socket of the daemon ?
> 
> -- Layus ?
> 
> On 01/07/16 15:10, Renato Alves wrote:
>> Hi everyone,
>>
>>
>> Recently I've been trying to setup nix on a multiple-machine shared
>> environment. At the moment I have one machine setup with nix-daemon
>> running from a store in a custom location (/shared/myuser/nix). This
>> location is shared via NFS with several other machines. This is all
>> still pretty new to me as I've only recently started using nix and
>> haven't used nixos yet.
>>
>> Before setting up nix-daemon I ran into some problems with database
>> corruption (sqlite) due to concurrent processes. With nix-daemon these
>> have gone away.
>>
>> One limitation that I identified recently is that on any of the other
>> machines that do not have nix-daemon running (but have read access to
>> the store) I can run commands from the store without problems but
>> cannot, for instance, use nix-shell.
>> So I thought of spawning a nix-daemon instance on those machines but I'm
>> not sure what is the best way to set it up without risking DB corruption
>> again.
>>
>> These are the requirements I'd like to meet:
>>  * /shared/myuser/nix is shared across multiple machines with the same
>> architecture (x86_64-linux).
>>  * All machines should be able to use nix-shell or any nix related
>> command, including requesting installation of packages.
>>  * Only some machines are allowed to compile. Machines that are not
>> allowed should rely on something like remote-systems.conf to distribute
>> work.
>>
>> Is this kind of setup currently possible with nix? If so, can someone
>> provide some guidance?
>>
>>
>> Thanks,
>> Renato
>>
>>
>>
>> ___
>> nix-dev mailing list
>> nix-dev@lists.science.uu.nl
>> http://lists.science.uu.nl/mailman/listinfo/nix-dev
> 
> 
> 
> 
> ___
> nix-dev mailing list
> nix-dev@lists.science.uu.nl
> http://lists.science.uu.nl/mailman/listinfo/nix-dev
> 



signature.asc
Description: OpenPGP digital signature
___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


Re: [Nix-dev] Multiple machines with nix store shared via NFS

2016-07-01 Thread Renato Alves
I never tried it with sockets, only tcp ports.

I need to move the socket to a different location. Currently it also
sits on NFS. I can play with symlinks making it point to a local disk.

The entire setup sounds terribly hackish though.

If anyone has better alternatives I'd love to hear them.

Thanks,
R

On 01/07/16 20:51, Layus wrote:
> Just one idea off the top of my head: Would it be possible to forward
> the unix socket of the daemon ?
> 
> -- Layus ?
> 
> On 01/07/16 15:10, Renato Alves wrote:
>> Hi everyone,
>>
>>
>> Recently I've been trying to setup nix on a multiple-machine shared
>> environment. At the moment I have one machine setup with nix-daemon
>> running from a store in a custom location (/shared/myuser/nix). This
>> location is shared via NFS with several other machines. This is all
>> still pretty new to me as I've only recently started using nix and
>> haven't used nixos yet.
>>
>> Before setting up nix-daemon I ran into some problems with database
>> corruption (sqlite) due to concurrent processes. With nix-daemon these
>> have gone away.
>>
>> One limitation that I identified recently is that on any of the other
>> machines that do not have nix-daemon running (but have read access to
>> the store) I can run commands from the store without problems but
>> cannot, for instance, use nix-shell.
>> So I thought of spawning a nix-daemon instance on those machines but I'm
>> not sure what is the best way to set it up without risking DB corruption
>> again.
>>
>> These are the requirements I'd like to meet:
>>  * /shared/myuser/nix is shared across multiple machines with the same
>> architecture (x86_64-linux).
>>  * All machines should be able to use nix-shell or any nix related
>> command, including requesting installation of packages.
>>  * Only some machines are allowed to compile. Machines that are not
>> allowed should rely on something like remote-systems.conf to distribute
>> work.
>>
>> Is this kind of setup currently possible with nix? If so, can someone
>> provide some guidance?
>>
>>
>> Thanks,
>> Renato
>>
>>
>>
>> ___
>> nix-dev mailing list
>> nix-dev@lists.science.uu.nl
>> http://lists.science.uu.nl/mailman/listinfo/nix-dev
> 
> 
> 
> 
> ___
> nix-dev mailing list
> nix-dev@lists.science.uu.nl
> http://lists.science.uu.nl/mailman/listinfo/nix-dev
> 



signature.asc
Description: OpenPGP digital signature
___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


Re: [Nix-dev] Intermittent Blank Screen upon Opening Laptop Lid

2016-07-01 Thread Vladimír Čunát
On 07/01/2016 03:10 PM, Roger Qiu wrote:
> basically upon closing the lid and reopening it after 10 min, the screen
> stays blank, and I can't do anything

Sometimes this happens to me (nvidia notebook), but in my case I can
switch to text-mode terminals, and pressing the display-detect button
recovers the X session.

--Vladimir




smime.p7s
Description: S/MIME Cryptographic Signature
___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


[Nix-commits] [NixOS/nixpkgs] b01886: fix 32bit android emulator

2016-07-01 Thread Benno Fünfstück
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: b01886d6543dd7940ed760700b1cb9939dafa0b1
  
https://github.com/NixOS/nixpkgs/commit/b01886d6543dd7940ed760700b1cb9939dafa0b1
  Author: Benno Fünfstück 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M pkgs/development/mobile/androidenv/androidsdk.nix

  Log Message:
  ---
  fix 32bit android emulator


___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


Re: [Nix-dev] Multiple machines with nix store shared via NFS

2016-07-01 Thread Layus
Just one idea off the top of my head: Would it be possible to forward 
the unix socket of the daemon ?


-- Layus ?

On 01/07/16 15:10, Renato Alves wrote:

Hi everyone,


Recently I've been trying to setup nix on a multiple-machine shared
environment. At the moment I have one machine setup with nix-daemon
running from a store in a custom location (/shared/myuser/nix). This
location is shared via NFS with several other machines. This is all
still pretty new to me as I've only recently started using nix and
haven't used nixos yet.

Before setting up nix-daemon I ran into some problems with database
corruption (sqlite) due to concurrent processes. With nix-daemon these
have gone away.

One limitation that I identified recently is that on any of the other
machines that do not have nix-daemon running (but have read access to
the store) I can run commands from the store without problems but
cannot, for instance, use nix-shell.
So I thought of spawning a nix-daemon instance on those machines but I'm
not sure what is the best way to set it up without risking DB corruption
again.

These are the requirements I'd like to meet:
  * /shared/myuser/nix is shared across multiple machines with the same
architecture (x86_64-linux).
  * All machines should be able to use nix-shell or any nix related
command, including requesting installation of packages.
  * Only some machines are allowed to compile. Machines that are not
allowed should rely on something like remote-systems.conf to distribute
work.

Is this kind of setup currently possible with nix? If so, can someone
provide some guidance?


Thanks,
Renato



___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev



___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


[Nix-commits] [NixOS/nixpkgs] 3fe1d3: libvirt: 1.3.2 -> 1.3.3

2016-07-01 Thread Rickard Nilsson
  Branch: refs/heads/release-16.03
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 3fe1d396bd7f858c1e958ddf722560ca613a0b13
  
https://github.com/NixOS/nixpkgs/commit/3fe1d396bd7f858c1e958ddf722560ca613a0b13
  Author: Franz Pletz 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M pkgs/development/libraries/libvirt/default.nix

  Log Message:
  ---
  libvirt: 1.3.2 -> 1.3.3

(cherry picked from commit 862875f9cd6734cb0396da7a26824fc215c31af4)


  Commit: e5b91151e7e60f5c5d41aaf3be04bc6102e4d438
  
https://github.com/NixOS/nixpkgs/commit/e5b91151e7e60f5c5d41aaf3be04bc6102e4d438
  Author: Alexander Ried 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M pkgs/development/libraries/libvirt/default.nix

  Log Message:
  ---
  libvirt: add comment about updating

(cherry picked from commit e898c4f1d5441515c0cc62c32a68a2ce3845d04e)


  Commit: eb57c2c9af1b0d6a3471ce572363fbc2444633c1
  
https://github.com/NixOS/nixpkgs/commit/eb57c2c9af1b0d6a3471ce572363fbc2444633c1
  Author: Franz Pletz 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M pkgs/development/libraries/libvirt/default.nix

  Log Message:
  ---
  libvirt: enable zfs on linux

(cherry picked from commit 26964c2fb50f5397316e4daf8ff505c0449150de)


  Commit: ad2137eeb08a73757798a83e5a91a10618838f61
  
https://github.com/NixOS/nixpkgs/commit/ad2137eeb08a73757798a83e5a91a10618838f61
  Author: Rickard Nilsson 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M pkgs/development/libraries/libvirt/default.nix
M pkgs/top-level/python-packages.nix

  Log Message:
  ---
  libvirt and pythonPackages.libvirt: 1.3.3 -> 1.3.5

(cherry picked from commit b43268bfeb1d5105a29b82ed8fe7ddfa995b63e5)


  Commit: 953fe5c24a92f85161e65d392580dba923c34e1b
  
https://github.com/NixOS/nixpkgs/commit/953fe5c24a92f85161e65d392580dba923c34e1b
  Author: Rickard Nilsson 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M pkgs/development/libraries/libvirt/default.nix

  Log Message:
  ---
  libvirt: Fix libsystemd dependency

(cherry picked from commit 8404d626ad1b0ec293bf83bec6c8a1f57e17e926)


Compare: https://github.com/NixOS/nixpkgs/compare/3f49faa6aa9b...953fe5c24a92___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] [NixOS/nixpkgs] 8404d6: libvirt: Fix libsystemd dependency

2016-07-01 Thread Rickard Nilsson
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 8404d626ad1b0ec293bf83bec6c8a1f57e17e926
  
https://github.com/NixOS/nixpkgs/commit/8404d626ad1b0ec293bf83bec6c8a1f57e17e926
  Author: Rickard Nilsson 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M pkgs/development/libraries/libvirt/default.nix

  Log Message:
  ---
  libvirt: Fix libsystemd dependency


___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


Re: [Nix-dev] (setcap-wrapper) Building a nixos vm to test nixos-level modifications

2016-07-01 Thread Parnell Springmeyer
This was very helpful, thank you Layus!

On Fri, Jul 1, 2016 at 1:38 AM, Layus  wrote:

> To build a nixos vm based on a custom configuration.nix, you use
>
> $ export NIXOS_CONFIG=/my/custom/configuration.nix
> then
> $ nix-build “/your/checkout/of/nixpkgs”/nixos -A vm; # or, preferably,
> $ nixos-rebuild build-vm -I nixpkgs=/your/checkout/of/nixpkgs
>
> But see the excellent ML thread about building a nixos vm for testing
> purposes[1].
>
> Also, you may want to look at nbp’s fosdem presentation resources for
> examples of minimal and modular NixOS configurations[2][3]
>
> Finally, as it seems that you may test networking features, note that the
> vm uses kvm virtio for the network card by default.
> If you need real hardware emulation, use something like:
>
> {
>   virtualisation.qemu.networkingOptions = [
> "-net nic,vlan=0,model=e1000" # Replace virtio, otherwise mptcp is 
> bypassed.
> "-net user,vlan=0\${QEMU_NET_OPTS:+,$QEMU_NET_OPTS}" # keep the second 
> line.
>   ];
> }
>
> For comparison, my setup for testing inginious+linux_mptcp is attached.
>
> Regards,
>
> — Layus.
>
> [1]
> 
> http://lists.science.uu.nl/pipermail/nix-dev/2016-June/thread.html#20792
> [2]
> 
> https://github.com/nbp/slides/tree/master/FOSDEM/2015.Nix-NixOS-NixOps
> [3] 
> https://nbp.github.io/slides/FOSDEM/2015.Nix-NixOS-NixOps/
>
> On 01/07/16 02:44, Parnell Springmeyer wrote:
>
> Hi! I recently added setcap-wrapper functionality to nixos at awake
> networks and I have contributed the changes in a fork on my own branch.
>
> My ask is: I'm having trouble figuring out how I should test this.
> Building a package is easy but is there a formula some where for building a
> nixos VM to test the setcap-wrapper functionality and my own modifications
> to take ping and ping6 out of the setuid and use setcap instead?
>
> --
> Parnell Springmeyer
> parn...@digitalmentat.com | digitalmentat.com | 0xDCCF89258EAD874A
> 
>
>
> ___
> nix-dev mailing 
> listnix-...@lists.science.uu.nlhttp://lists.science.uu.nl/mailman/listinfo/nix-dev
>
>
> ___
> nix-dev mailing list
> nix-dev@lists.science.uu.nl
> http://lists.science.uu.nl/mailman/listinfo/nix-dev
>
>


-- 
Parnell Springmeyer
parn...@digitalmentat.com | digitalmentat.com | 0xDCCF89258EAD874A

___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


[Nix-commits] [NixOS/nixpkgs] 0a16a4: nixos/libvirt: Remove non-functional service libvi...

2016-07-01 Thread Rickard Nilsson
  Branch: refs/heads/release-16.03
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 0a16a4e5b15cc7552897111f29b12a138d42bdfa
  
https://github.com/NixOS/nixpkgs/commit/0a16a4e5b15cc7552897111f29b12a138d42bdfa
  Author: Rickard Nilsson 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M nixos/modules/virtualisation/libvirtd.nix

  Log Message:
  ---
  nixos/libvirt: Remove non-functional service libvirt-guests

It doesn't have a start script, so it hasn't worked at all in
a long time.

(cherry picked from commit 37f4889851165410d923bf82afeca4672a3e8ffb)


  Commit: b9397df7322347bdc71247c5ae505c59b7f6e89f
  
https://github.com/NixOS/nixpkgs/commit/b9397df7322347bdc71247c5ae505c59b7f6e89f
  Author: Rickard Nilsson 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M nixos/modules/virtualisation/libvirtd.nix

  Log Message:
  ---
  nixos/libvirt: Adapt libvirtd.service to upstream sources

(cherry picked from commit 1b54e48561c09219bfec7e73636bd999014148b8)


  Commit: bb52e1449d21f095eb4a0f0762fc53d082f7ad1f
  
https://github.com/NixOS/nixpkgs/commit/bb52e1449d21f095eb4a0f0762fc53d082f7ad1f
  Author: Rickard Nilsson 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M nixos/modules/virtualisation/libvirtd.nix

  Log Message:
  ---
  nixos/libvirt: Add virtlogd and virtlockd systemd sockets and services

(cherry picked from commit 301b4e9018e8adcbc9009b28d491df22cced8d75)


  Commit: adc5760bb2edccb4dd7ad712a0b9733cadaf9500
  
https://github.com/NixOS/nixpkgs/commit/adc5760bb2edccb4dd7ad712a0b9733cadaf9500
  Author: Rickard Nilsson 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M nixos/modules/virtualisation/libvirtd.nix

  Log Message:
  ---
  nixos/libvirt: Syntactic-only refactoring

(cherry picked from commit a0c0f63811600e5cb714c2ddd5eadef916ff4f03)


  Commit: 462d3747b13f150cb8630ca122bcf36e11e53466
  
https://github.com/NixOS/nixpkgs/commit/462d3747b13f150cb8630ca122bcf36e11e53466
  Author: Rickard Nilsson 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M nixos/modules/misc/ids.nix
M nixos/modules/services/search/elasticsearch.nix

  Log Message:
  ---
  nixos/elasticsearch: Set a group on the user

This fixed a problem I had when running ElasticSearch in an LXC
container, and it doesn't hurt using a dedicated group instead of
nogroup anyway.

(cherry picked from commit 9facb7078b346b2e7805e73d0d660ee3db007473)


  Commit: 3f49faa6aa9bc6545a5a4006f05e522a9460
  
https://github.com/NixOS/nixpkgs/commit/3f49faa6aa9bc6545a5a4006f05e522a9460
  Author: Rickard Nilsson 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M nixos/modules/virtualisation/libvirtd.nix

  Log Message:
  ---
  nixos/libvirtd: Don't use the --daemon flag now that we use the 'notify' 
service type

(cherry picked from commit 7d67a4da99b1c83ae7c9405d8f35a9727778982e)


Compare: https://github.com/NixOS/nixpkgs/compare/b1aa70a78c41...3f49faa6aa9b___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


Re: [Nix-dev] Improve docs for overrideDerivation - overridable attributes

2016-07-01 Thread Profpatsch
On 16-06-30 11:18am, Alex Berg wrote:
> Where can I find explanation for this? If there is a restriction on which
> attributes are overridable, then I'd like to note this in the NixPkgs
> manual, here:
> https://nixos.org/nixpkgs/manual/index.html#sec-pkg-overrideDerivation

I have a short overview of the various kinds of overriding mechanisms here:
https://github.com/Profpatsch/nixpkgs-cheatsheet/blob/master/cheatsheet.org

-- 
Proudly written in Mutt with Vim on NixOS.
Q: Why is this email five sentences or less?
A: http://five.sentenc.es
May take up to five days to read your message. If it’s urgent, call me.
___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


[Nix-commits] [NixOS/nixpkgs] 9facb7: nixos/elasticsearch: Set a group on the user

2016-07-01 Thread Rickard Nilsson
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 9facb7078b346b2e7805e73d0d660ee3db007473
  
https://github.com/NixOS/nixpkgs/commit/9facb7078b346b2e7805e73d0d660ee3db007473
  Author: Rickard Nilsson 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M nixos/modules/misc/ids.nix
M nixos/modules/services/search/elasticsearch.nix

  Log Message:
  ---
  nixos/elasticsearch: Set a group on the user

This fixed a problem I had when running ElasticSearch in an LXC
container, and it doesn't hurt using a dedicated group instead of
nogroup anyway.


  Commit: 7d67a4da99b1c83ae7c9405d8f35a9727778982e
  
https://github.com/NixOS/nixpkgs/commit/7d67a4da99b1c83ae7c9405d8f35a9727778982e
  Author: Rickard Nilsson 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M nixos/modules/virtualisation/libvirtd.nix

  Log Message:
  ---
  nixos/libvirtd: Don't use the --daemon flag now that we use the 'notify' 
service type


Compare: https://github.com/NixOS/nixpkgs/compare/880475bbd5e9...7d67a4da99b1___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


Re: [Nix-dev] Intermittent Blank Screen upon Opening Laptop Lid

2016-07-01 Thread Roger Qiu

Also there's a few different power saving modes being activated here.

One's just the screen turning off. Which happens when I stop interacting 
with the computer for a bit. As soon as I move the mouse, everything 
comes back. This is fine. This does not have an intermittent persistent 
blank screen.


Second is the actual `systemctl suspend` command. I've used that, and it 
works. It actually turns off all the lights, and my fan stops. This also 
does not have the intermittent persistent blank screen.


Third is the problem I have, is where I close the lid, wait and reopen 
it. I don't actually know what's happening here. But the screen goes 
blank like situation 1, but of course this is one with the intermittent 
persistent blank screen.


Thanks,

Roger


On 1/07/2016 11:55 PM, Roger Qiu wrote:
I should be clear, that right after the logs that I posted is just 
`Power key pressed.` `Powering Off...` and `System is powering down.`.


So the logs posted below, were 1 minute before I hard pressed the 
power button and forced it to shutdown.


The laptop also doesn't suspend when I close the lid. This is because 
it's pretty much vanilla NixOS. I didn't create any scripts for lid 
actions.



On 1/07/2016 11:49 PM, Roger Qiu wrote:
I found something interesting on my previous boot logs, since I had 
to force shutdown.


The error is follows (from journalctl -b -1):

```

Jul 01 23:10:48 matrix-central kernel: nvidia-modeset: WARNING: 
GPU:0: Lost display notification; continuing.
Jul 01 23:12:32 matrix-central kernel: nvidia-modeset: ERROR: GPU:0: 
Idling EVO timed out: 0x957d:0:0:0x0040
Jul 01 23:12:55 matrix-central kernel: INFO: rcu_sched self-detected 
stall on CPU
Jul 01 23:12:55 matrix-central kernel: 7: (21000 ticks this 
GP) idle=be3/141/0 softirq=4499/4499 fqs=7000
Jul 01 23:12:55 matrix-central kernel:  (t=21000 jiffies 
g=12925 c=12924 q=135)

Jul 01 23:12:55 matrix-central kernel: Task dump for CPU 7:
Jul 01 23:12:55 matrix-central kernel: X   R running 
task0  2997   2969 0x00400088
Jul 01 23:12:55 matrix-central kernel:  8184e340 
88081edc3d68 8109892f 0007
Jul 01 23:12:55 matrix-central kernel:  8184e340 
88081edc3d88 8109be6d 88081edc3dc8
Jul 01 23:12:55 matrix-central kernel:  0008 
88081edc3db8 810c4180 88081edd6a40

Jul 01 23:12:55 matrix-central kernel: Call Trace:
Jul 01 23:12:55 matrix-central kernel:   [] 
sched_show_task+0xaf/0x120
Jul 01 23:12:55 matrix-central kernel: [] 
dump_cpu_task+0x3d/0x50
Jul 01 23:12:55 matrix-central kernel: [] 
rcu_dump_cpu_stacks+0x90/0xe0
Jul 01 23:12:55 matrix-central kernel: [] 
rcu_check_callbacks+0x53e/0x830
Jul 01 23:12:55 matrix-central kernel: [] ? 
native_smp_send_reschedule+0x4a/0x70
Jul 01 23:12:55 matrix-central kernel: [] 
update_process_times+0x39/0x60
Jul 01 23:12:55 matrix-central kernel: [] 
tick_sched_handle.isra.15+0x36/0x50
Jul 01 23:12:55 matrix-central kernel: [] 
tick_sched_timer+0x44/0x80
Jul 01 23:12:55 matrix-central kernel: [] 
__run_hrtimer+0x85/0x240
Jul 01 23:12:55 matrix-central kernel: [] ? 
tick_sched_handle.isra.15+0x50/0x50
Jul 01 23:12:55 matrix-central kernel: [] 
hrtimer_interrupt+0xf3/0x210
Jul 01 23:12:55 matrix-central kernel: [] 
local_apic_timer_interrupt+0x3c/0x70
Jul 01 23:12:55 matrix-central kernel: [] 
smp_apic_timer_interrupt+0x41/0x60
Jul 01 23:12:55 matrix-central kernel: [] 
apic_timer_interrupt+0x6e/0x80
Jul 01 23:12:55 matrix-central kernel:   [] ? 
read_tsc+0x9/0x10
Jul 01 23:12:55 matrix-central kernel: [] ? 
_nv001840kms+0xd0/0x120 [nvidia_modeset]
Jul 01 23:12:55 matrix-central kernel: [] ? 
_nv001840kms+0xb2/0x120 [nvidia_modeset]
Jul 01 23:12:55 matrix-central kernel: [] ? 
_nv001737kms+0xa3/0x110 [nvidia_modeset]
Jul 01 23:12:55 matrix-central kernel: [] ? 
_nv001964kms+0x145e/0x2440 [nvidia_modeset]
Jul 01 23:12:55 matrix-central kernel: [] ? 
_nv009724rm+0xd/0x40 [nvidia]
Jul 01 23:12:55 matrix-central kernel: [] ? 
nvkms_alloc+0x5d/0x70 [nvidia_modeset]
Jul 01 23:12:55 matrix-central kernel: [] ? 
_nv000171kms+0x40/0x40 [nvidia_modeset]
Jul 01 23:12:55 matrix-central kernel: [] ? 
_nv000327kms+0x2e/0x40 [nvidia_modeset]
Jul 01 23:12:55 matrix-central kernel: [] ? 
nvKmsIoctl+0x161/0x1e0 [nvidia_modeset]
Jul 01 23:12:55 matrix-central kernel: [] ? 
nvkms_ioctl_common+0x45/0x90 [nvidia_modeset]
Jul 01 23:12:55 matrix-central kernel: [] ? 
nvkms_ioctl+0x62/0x90 [nvidia_modeset]
Jul 01 23:12:55 matrix-central kernel: [] ? 
nvidia_frontend_compat_ioctl+0x40/0x50 [nvidia]
Jul 01 23:12:55 matrix-central kernel: [] ? 
nvidia_frontend_unlocked_ioctl+0xe/0x10 [nvidia]
Jul 01 23:12:55 matrix-central kernel: [] ? 
do_vfs_ioctl+0x2a6/0x4b0
Jul 01 23:12:55 matrix-central kernel: [] ? 
__sb_end_write+0x35/0x70
Jul 01 23:12:55 matrix-central kernel: [] ? 
__audit_syscall_entry+0xac/0x100
Jul 01 23:12:55 matrix-central kernel: [] ? 
do_audit_syscall_entry+0x55/0x80
Jul 

[Nix-commits] [NixOS/nixpkgs] b1aa70: python: fix modules in buildEnv, closes #16646

2016-07-01 Thread Frederik Rietdijk
  Branch: refs/heads/release-16.03
  Home:   https://github.com/NixOS/nixpkgs
  Commit: b1aa70a78c41e87cb07e60399ab8838cca82f881
  
https://github.com/NixOS/nixpkgs/commit/b1aa70a78c41e87cb07e60399ab8838cca82f881
  Author: Frederik Rietdijk 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M pkgs/development/interpreters/python/2.7/default.nix

  Log Message:
  ---
  python: fix modules in buildEnv, closes #16646

Python 2.7 on Nix is stripped of some modules, which can be added when
needed. This was broken with python.buildEnv.


___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] [NixOS/nixpkgs] 880475: python: fix modules in buildEnv, closes #16646

2016-07-01 Thread Frederik Rietdijk
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 880475bbd5e935449c21396b210d184ab6dc174c
  
https://github.com/NixOS/nixpkgs/commit/880475bbd5e935449c21396b210d184ab6dc174c
  Author: Frederik Rietdijk 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M pkgs/development/interpreters/python/2.7/default.nix

  Log Message:
  ---
  python: fix modules in buildEnv, closes #16646

Python 2.7 on Nix is stripped of some modules, which can be added when
needed. This was broken with python.buildEnv.


___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] [NixOS/nixpkgs] e77eba: errbot: init at 4.2.2 (#16551)

2016-07-01 Thread Franz Pletz
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: e77eba305f09b18b54e8871d912ac9ffcf72bdc5
  
https://github.com/NixOS/nixpkgs/commit/e77eba305f09b18b54e8871d912ac9ffcf72bdc5
  Author: Franz Pletz 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
A pkgs/applications/networking/errbot/default.nix
A pkgs/applications/networking/errbot/fix-dnspython.patch
M pkgs/top-level/all-packages.nix
M pkgs/top-level/python-packages.nix

  Log Message:
  ---
  errbot: init at 4.2.2 (#16551)


___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


Re: [Nix-dev] Intermittent Blank Screen upon Opening Laptop Lid

2016-07-01 Thread Roger Qiu
I should be clear, that right after the logs that I posted is just 
`Power key pressed.` `Powering Off...` and `System is powering down.`.


So the logs posted below, were 1 minute before I hard pressed the power 
button and forced it to shutdown.


The laptop also doesn't suspend when I close the lid. This is because 
it's pretty much vanilla NixOS. I didn't create any scripts for lid actions.



On 1/07/2016 11:49 PM, Roger Qiu wrote:
I found something interesting on my previous boot logs, since I had to 
force shutdown.


The error is follows (from journalctl -b -1):

```

Jul 01 23:10:48 matrix-central kernel: nvidia-modeset: WARNING: GPU:0: 
Lost display notification; continuing.
Jul 01 23:12:32 matrix-central kernel: nvidia-modeset: ERROR: GPU:0: 
Idling EVO timed out: 0x957d:0:0:0x0040
Jul 01 23:12:55 matrix-central kernel: INFO: rcu_sched self-detected 
stall on CPU
Jul 01 23:12:55 matrix-central kernel: 7: (21000 ticks this 
GP) idle=be3/141/0 softirq=4499/4499 fqs=7000
Jul 01 23:12:55 matrix-central kernel:  (t=21000 jiffies 
g=12925 c=12924 q=135)

Jul 01 23:12:55 matrix-central kernel: Task dump for CPU 7:
Jul 01 23:12:55 matrix-central kernel: X   R  running 
task0  2997   2969 0x00400088
Jul 01 23:12:55 matrix-central kernel:  8184e340 
88081edc3d68 8109892f 0007
Jul 01 23:12:55 matrix-central kernel:  8184e340 
88081edc3d88 8109be6d 88081edc3dc8
Jul 01 23:12:55 matrix-central kernel:  0008 
88081edc3db8 810c4180 88081edd6a40

Jul 01 23:12:55 matrix-central kernel: Call Trace:
Jul 01 23:12:55 matrix-central kernel:   [] 
sched_show_task+0xaf/0x120
Jul 01 23:12:55 matrix-central kernel:  [] 
dump_cpu_task+0x3d/0x50
Jul 01 23:12:55 matrix-central kernel:  [] 
rcu_dump_cpu_stacks+0x90/0xe0
Jul 01 23:12:55 matrix-central kernel:  [] 
rcu_check_callbacks+0x53e/0x830
Jul 01 23:12:55 matrix-central kernel:  [] ? 
native_smp_send_reschedule+0x4a/0x70
Jul 01 23:12:55 matrix-central kernel:  [] 
update_process_times+0x39/0x60
Jul 01 23:12:55 matrix-central kernel:  [] 
tick_sched_handle.isra.15+0x36/0x50
Jul 01 23:12:55 matrix-central kernel:  [] 
tick_sched_timer+0x44/0x80
Jul 01 23:12:55 matrix-central kernel:  [] 
__run_hrtimer+0x85/0x240
Jul 01 23:12:55 matrix-central kernel:  [] ? 
tick_sched_handle.isra.15+0x50/0x50
Jul 01 23:12:55 matrix-central kernel:  [] 
hrtimer_interrupt+0xf3/0x210
Jul 01 23:12:55 matrix-central kernel:  [] 
local_apic_timer_interrupt+0x3c/0x70
Jul 01 23:12:55 matrix-central kernel:  [] 
smp_apic_timer_interrupt+0x41/0x60
Jul 01 23:12:55 matrix-central kernel:  [] 
apic_timer_interrupt+0x6e/0x80
Jul 01 23:12:55 matrix-central kernel:   [] ? 
read_tsc+0x9/0x10
Jul 01 23:12:55 matrix-central kernel:  [] ? 
_nv001840kms+0xd0/0x120 [nvidia_modeset]
Jul 01 23:12:55 matrix-central kernel:  [] ? 
_nv001840kms+0xb2/0x120 [nvidia_modeset]
Jul 01 23:12:55 matrix-central kernel:  [] ? 
_nv001737kms+0xa3/0x110 [nvidia_modeset]
Jul 01 23:12:55 matrix-central kernel:  [] ? 
_nv001964kms+0x145e/0x2440 [nvidia_modeset]
Jul 01 23:12:55 matrix-central kernel:  [] ? 
_nv009724rm+0xd/0x40 [nvidia]
Jul 01 23:12:55 matrix-central kernel:  [] ? 
nvkms_alloc+0x5d/0x70 [nvidia_modeset]
Jul 01 23:12:55 matrix-central kernel:  [] ? 
_nv000171kms+0x40/0x40 [nvidia_modeset]
Jul 01 23:12:55 matrix-central kernel:  [] ? 
_nv000327kms+0x2e/0x40 [nvidia_modeset]
Jul 01 23:12:55 matrix-central kernel:  [] ? 
nvKmsIoctl+0x161/0x1e0 [nvidia_modeset]
Jul 01 23:12:55 matrix-central kernel:  [] ? 
nvkms_ioctl_common+0x45/0x90 [nvidia_modeset]
Jul 01 23:12:55 matrix-central kernel:  [] ? 
nvkms_ioctl+0x62/0x90 [nvidia_modeset]
Jul 01 23:12:55 matrix-central kernel:  [] ? 
nvidia_frontend_compat_ioctl+0x40/0x50 [nvidia]
Jul 01 23:12:55 matrix-central kernel:  [] ? 
nvidia_frontend_unlocked_ioctl+0xe/0x10 [nvidia]
Jul 01 23:12:55 matrix-central kernel:  [] ? 
do_vfs_ioctl+0x2a6/0x4b0
Jul 01 23:12:55 matrix-central kernel:  [] ? 
__sb_end_write+0x35/0x70
Jul 01 23:12:55 matrix-central kernel:  [] ? 
__audit_syscall_entry+0xac/0x100
Jul 01 23:12:55 matrix-central kernel:  [] ? 
do_audit_syscall_entry+0x55/0x80
Jul 01 23:12:55 matrix-central kernel:  [] ? 
SyS_ioctl+0x81/0xa0
Jul 01 23:12:55 matrix-central kernel:  [] ? 
syscall_trace_leave+0x9e/0x120
Jul 01 23:12:55 matrix-central kernel:  [] ? 
system_call_fastpath+0x12/0x71
Jul 01 23:13:58 matrix-central kernel: INFO: rcu_sched self-detected 
stall on CPU
Jul 01 23:13:58 matrix-central kernel: 7: (84004 ticks this 
GP) idle=be3/141/0 softirq=4499/4499 fqs=27997
Jul 01 23:13:58 matrix-central kernel:  (t=84004 jiffies 
g=12925 c=12924 q=594)

Jul 01 23:13:58 matrix-central kernel: Task dump for CPU 7:
Jul 01 23:13:58 matrix-central kernel: X   R  running 
task0  2997   2969 0x00400088
Jul 01 23:13:58 matrix-central kernel:  8184e340 
88081edc3d68 8109892f 00

Re: [Nix-dev] Intermittent Blank Screen upon Opening Laptop Lid

2016-07-01 Thread Roger Qiu
I found something interesting on my previous boot logs, since I had to 
force shutdown.


The error is follows (from journalctl -b -1):

```

Jul 01 23:10:48 matrix-central kernel: nvidia-modeset: WARNING: GPU:0: 
Lost display notification; continuing.
Jul 01 23:12:32 matrix-central kernel: nvidia-modeset: ERROR: GPU:0: 
Idling EVO timed out: 0x957d:0:0:0x0040
Jul 01 23:12:55 matrix-central kernel: INFO: rcu_sched self-detected 
stall on CPU
Jul 01 23:12:55 matrix-central kernel: 7: (21000 ticks this GP) 
idle=be3/141/0 softirq=4499/4499 fqs=7000
Jul 01 23:12:55 matrix-central kernel:  (t=21000 jiffies g=12925 
c=12924 q=135)

Jul 01 23:12:55 matrix-central kernel: Task dump for CPU 7:
Jul 01 23:12:55 matrix-central kernel: X   R  running 
task0  2997   2969 0x00400088
Jul 01 23:12:55 matrix-central kernel:  8184e340 
88081edc3d68 8109892f 0007
Jul 01 23:12:55 matrix-central kernel:  8184e340 
88081edc3d88 8109be6d 88081edc3dc8
Jul 01 23:12:55 matrix-central kernel:  0008 
88081edc3db8 810c4180 88081edd6a40

Jul 01 23:12:55 matrix-central kernel: Call Trace:
Jul 01 23:12:55 matrix-central kernel:   [] 
sched_show_task+0xaf/0x120
Jul 01 23:12:55 matrix-central kernel:  [] 
dump_cpu_task+0x3d/0x50
Jul 01 23:12:55 matrix-central kernel:  [] 
rcu_dump_cpu_stacks+0x90/0xe0
Jul 01 23:12:55 matrix-central kernel:  [] 
rcu_check_callbacks+0x53e/0x830
Jul 01 23:12:55 matrix-central kernel:  [] ? 
native_smp_send_reschedule+0x4a/0x70
Jul 01 23:12:55 matrix-central kernel:  [] 
update_process_times+0x39/0x60
Jul 01 23:12:55 matrix-central kernel:  [] 
tick_sched_handle.isra.15+0x36/0x50
Jul 01 23:12:55 matrix-central kernel:  [] 
tick_sched_timer+0x44/0x80
Jul 01 23:12:55 matrix-central kernel:  [] 
__run_hrtimer+0x85/0x240
Jul 01 23:12:55 matrix-central kernel:  [] ? 
tick_sched_handle.isra.15+0x50/0x50
Jul 01 23:12:55 matrix-central kernel:  [] 
hrtimer_interrupt+0xf3/0x210
Jul 01 23:12:55 matrix-central kernel:  [] 
local_apic_timer_interrupt+0x3c/0x70
Jul 01 23:12:55 matrix-central kernel:  [] 
smp_apic_timer_interrupt+0x41/0x60
Jul 01 23:12:55 matrix-central kernel:  [] 
apic_timer_interrupt+0x6e/0x80
Jul 01 23:12:55 matrix-central kernel:   [] ? 
read_tsc+0x9/0x10
Jul 01 23:12:55 matrix-central kernel:  [] ? 
_nv001840kms+0xd0/0x120 [nvidia_modeset]
Jul 01 23:12:55 matrix-central kernel:  [] ? 
_nv001840kms+0xb2/0x120 [nvidia_modeset]
Jul 01 23:12:55 matrix-central kernel:  [] ? 
_nv001737kms+0xa3/0x110 [nvidia_modeset]
Jul 01 23:12:55 matrix-central kernel:  [] ? 
_nv001964kms+0x145e/0x2440 [nvidia_modeset]
Jul 01 23:12:55 matrix-central kernel:  [] ? 
_nv009724rm+0xd/0x40 [nvidia]
Jul 01 23:12:55 matrix-central kernel:  [] ? 
nvkms_alloc+0x5d/0x70 [nvidia_modeset]
Jul 01 23:12:55 matrix-central kernel:  [] ? 
_nv000171kms+0x40/0x40 [nvidia_modeset]
Jul 01 23:12:55 matrix-central kernel:  [] ? 
_nv000327kms+0x2e/0x40 [nvidia_modeset]
Jul 01 23:12:55 matrix-central kernel:  [] ? 
nvKmsIoctl+0x161/0x1e0 [nvidia_modeset]
Jul 01 23:12:55 matrix-central kernel:  [] ? 
nvkms_ioctl_common+0x45/0x90 [nvidia_modeset]
Jul 01 23:12:55 matrix-central kernel:  [] ? 
nvkms_ioctl+0x62/0x90 [nvidia_modeset]
Jul 01 23:12:55 matrix-central kernel:  [] ? 
nvidia_frontend_compat_ioctl+0x40/0x50 [nvidia]
Jul 01 23:12:55 matrix-central kernel:  [] ? 
nvidia_frontend_unlocked_ioctl+0xe/0x10 [nvidia]
Jul 01 23:12:55 matrix-central kernel:  [] ? 
do_vfs_ioctl+0x2a6/0x4b0
Jul 01 23:12:55 matrix-central kernel:  [] ? 
__sb_end_write+0x35/0x70
Jul 01 23:12:55 matrix-central kernel:  [] ? 
__audit_syscall_entry+0xac/0x100
Jul 01 23:12:55 matrix-central kernel:  [] ? 
do_audit_syscall_entry+0x55/0x80
Jul 01 23:12:55 matrix-central kernel:  [] ? 
SyS_ioctl+0x81/0xa0
Jul 01 23:12:55 matrix-central kernel:  [] ? 
syscall_trace_leave+0x9e/0x120
Jul 01 23:12:55 matrix-central kernel:  [] ? 
system_call_fastpath+0x12/0x71
Jul 01 23:13:58 matrix-central kernel: INFO: rcu_sched self-detected 
stall on CPU
Jul 01 23:13:58 matrix-central kernel: 7: (84004 ticks this GP) 
idle=be3/141/0 softirq=4499/4499 fqs=27997
Jul 01 23:13:58 matrix-central kernel:  (t=84004 jiffies g=12925 
c=12924 q=594)

Jul 01 23:13:58 matrix-central kernel: Task dump for CPU 7:
Jul 01 23:13:58 matrix-central kernel: X   R  running 
task0  2997   2969 0x00400088
Jul 01 23:13:58 matrix-central kernel:  8184e340 
88081edc3d68 8109892f 0007
Jul 01 23:13:58 matrix-central kernel:  8184e340 
88081edc3d88 8109be6d 88081edc3dc8
Jul 01 23:13:58 matrix-central kernel:  0008 
88081edc3db8 810c4180 88081edd6a40

Jul 01 23:13:58 matrix-central kernel: Call Trace:
Jul 01 23:13:58 matrix-central kernel:   [] 
sched_show_task+0xaf/0x120
Jul 01 23:13:58 matrix-central kernel:  [] 
dump_cpu_task+0x3d/0x50
Jul 01 23:13:58 matr

Re: [Nix-dev] Intermittent Blank Screen upon Opening Laptop Lid

2016-07-01 Thread Tomasz Czyż
I have this issue sometimes on intel driver as well (once every few weeks),
I had this on debian/ubuntu as well, I think it's more a driver problem
rather than nixos specific thing if you are looking for a direction.

2016-07-01 14:15 GMT+01:00 Bjørn Forsman :

> On 1 July 2016 at 15:10, Roger Qiu  wrote:
> > Hi Nixers,
> >
> > I discovered this problem a while ago, basically upon closing the lid and
> > reopening it after 10 min, the screen stays blank, and I can't do
> anything.
> > Even switching to tty1 doesn't work.
> >
> > This doesn't always happen. And when I close the lid and reopen after a
> few
> > seconds, it usually works and displays something.
> >
> > What are the steps that I can take to debug this issue.
> >
> > It was happening back on NixOS 15.09. and is continuing on 16.03.
> >
> > I'm running NVIDIA and using NVIDIA video card driver.
>
> Did you check the system log?
>
> - Bjørn
> ___
> nix-dev mailing list
> nix-dev@lists.science.uu.nl
> http://lists.science.uu.nl/mailman/listinfo/nix-dev
>



-- 
Tomasz Czyż
___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


Re: [Nix-dev] Multiple machines with nix store shared via NFS

2016-07-01 Thread Renato Alves
The number of machines is too large to have a nix store on each of them,
both in terms of maintenance as well as storage.
Some of these machines are clusters so NFS is necessary at least within
cluster nodes.

R



On 01/07/16 15:21, Domen Kožar wrote:
> In my experience, NFS is not worth the trouble. Are you absolutely sure
> that you need it?
> 
> On Fri, Jul 1, 2016 at 3:10 PM, Renato Alves  > wrote:
> 
> Hi everyone,
> 
> 
> Recently I've been trying to setup nix on a multiple-machine shared
> environment. At the moment I have one machine setup with nix-daemon
> running from a store in a custom location (/shared/myuser/nix). This
> location is shared via NFS with several other machines. This is all
> still pretty new to me as I've only recently started using nix and
> haven't used nixos yet.
> 
> Before setting up nix-daemon I ran into some problems with database
> corruption (sqlite) due to concurrent processes. With nix-daemon these
> have gone away.
> 
> One limitation that I identified recently is that on any of the other
> machines that do not have nix-daemon running (but have read access to
> the store) I can run commands from the store without problems but
> cannot, for instance, use nix-shell.
> So I thought of spawning a nix-daemon instance on those machines but I'm
> not sure what is the best way to set it up without risking DB corruption
> again.
> 
> These are the requirements I'd like to meet:
>  * /shared/myuser/nix is shared across multiple machines with the same
> architecture (x86_64-linux).
>  * All machines should be able to use nix-shell or any nix related
> command, including requesting installation of packages.
>  * Only some machines are allowed to compile. Machines that are not
> allowed should rely on something like remote-systems.conf to distribute
> work.
> 
> Is this kind of setup currently possible with nix? If so, can someone
> provide some guidance?
> 
> 
> Thanks,
> Renato
> 
> 
> ___
> nix-dev mailing list
> nix-dev@lists.science.uu.nl 
> http://lists.science.uu.nl/mailman/listinfo/nix-dev
> 
> 



signature.asc
Description: OpenPGP digital signature
___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


[Nix-commits] [NixOS/nixpkgs] de1b4e: python-2.7: Don't use ldconfig and speed up uuid l...

2016-07-01 Thread Eelco Dolstra
  Branch: refs/heads/staging
  Home:   https://github.com/NixOS/nixpkgs
  Commit: de1b4e71c1c8be30ad4ebc2ec6005928ba6cf280
  
https://github.com/NixOS/nixpkgs/commit/de1b4e71c1c8be30ad4ebc2ec6005928ba6cf280
  Author: Eelco Dolstra 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M pkgs/development/interpreters/python/2.7/default.nix
A pkgs/development/interpreters/python/2.7/no-ldconfig.patch

  Log Message:
  ---
  python-2.7: Don't use ldconfig and speed up uuid load


___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


Re: [Nix-dev] Multiple machines with nix store shared via NFS

2016-07-01 Thread Domen Kožar
In my experience, NFS is not worth the trouble. Are you absolutely sure
that you need it?

On Fri, Jul 1, 2016 at 3:10 PM, Renato Alves  wrote:

> Hi everyone,
>
>
> Recently I've been trying to setup nix on a multiple-machine shared
> environment. At the moment I have one machine setup with nix-daemon
> running from a store in a custom location (/shared/myuser/nix). This
> location is shared via NFS with several other machines. This is all
> still pretty new to me as I've only recently started using nix and
> haven't used nixos yet.
>
> Before setting up nix-daemon I ran into some problems with database
> corruption (sqlite) due to concurrent processes. With nix-daemon these
> have gone away.
>
> One limitation that I identified recently is that on any of the other
> machines that do not have nix-daemon running (but have read access to
> the store) I can run commands from the store without problems but
> cannot, for instance, use nix-shell.
> So I thought of spawning a nix-daemon instance on those machines but I'm
> not sure what is the best way to set it up without risking DB corruption
> again.
>
> These are the requirements I'd like to meet:
>  * /shared/myuser/nix is shared across multiple machines with the same
> architecture (x86_64-linux).
>  * All machines should be able to use nix-shell or any nix related
> command, including requesting installation of packages.
>  * Only some machines are allowed to compile. Machines that are not
> allowed should rely on something like remote-systems.conf to distribute
> work.
>
> Is this kind of setup currently possible with nix? If so, can someone
> provide some guidance?
>
>
> Thanks,
> Renato
>
>
> ___
> nix-dev mailing list
> nix-dev@lists.science.uu.nl
> http://lists.science.uu.nl/mailman/listinfo/nix-dev
>
>
___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


Re: [Nix-dev] Intermittent Blank Screen upon Opening Laptop Lid

2016-07-01 Thread Bjørn Forsman
On 1 July 2016 at 15:10, Roger Qiu  wrote:
> Hi Nixers,
>
> I discovered this problem a while ago, basically upon closing the lid and
> reopening it after 10 min, the screen stays blank, and I can't do anything.
> Even switching to tty1 doesn't work.
>
> This doesn't always happen. And when I close the lid and reopen after a few
> seconds, it usually works and displays something.
>
> What are the steps that I can take to debug this issue.
>
> It was happening back on NixOS 15.09. and is continuing on 16.03.
>
> I'm running NVIDIA and using NVIDIA video card driver.

Did you check the system log?

- Bjørn
___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


[Nix-dev] Multiple machines with nix store shared via NFS

2016-07-01 Thread Renato Alves
Hi everyone,


Recently I've been trying to setup nix on a multiple-machine shared
environment. At the moment I have one machine setup with nix-daemon
running from a store in a custom location (/shared/myuser/nix). This
location is shared via NFS with several other machines. This is all
still pretty new to me as I've only recently started using nix and
haven't used nixos yet.

Before setting up nix-daemon I ran into some problems with database
corruption (sqlite) due to concurrent processes. With nix-daemon these
have gone away.

One limitation that I identified recently is that on any of the other
machines that do not have nix-daemon running (but have read access to
the store) I can run commands from the store without problems but
cannot, for instance, use nix-shell.
So I thought of spawning a nix-daemon instance on those machines but I'm
not sure what is the best way to set it up without risking DB corruption
again.

These are the requirements I'd like to meet:
 * /shared/myuser/nix is shared across multiple machines with the same
architecture (x86_64-linux).
 * All machines should be able to use nix-shell or any nix related
command, including requesting installation of packages.
 * Only some machines are allowed to compile. Machines that are not
allowed should rely on something like remote-systems.conf to distribute
work.

Is this kind of setup currently possible with nix? If so, can someone
provide some guidance?


Thanks,
Renato



signature.asc
Description: OpenPGP digital signature
___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


[Nix-dev] Intermittent Blank Screen upon Opening Laptop Lid

2016-07-01 Thread Roger Qiu

Hi Nixers,

I discovered this problem a while ago, basically upon closing the lid 
and reopening it after 10 min, the screen stays blank, and I can't do 
anything. Even switching to tty1 doesn't work.


This doesn't always happen. And when I close the lid and reopen after a 
few seconds, it usually works and displays something.


What are the steps that I can take to debug this issue.

It was happening back on NixOS 15.09. and is continuing on 16.03.

I'm running NVIDIA and using NVIDIA video card driver.

Thanks,

Roger

--
Founder of Matrix AI
https://matrix.ai/
+61420925975

___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


[Nix-commits] [NixOS/nixpkgs] 240f55: Python: fix the wheel package

2016-07-01 Thread Frederik Rietdijk
  Branch: refs/heads/release-16.03
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 240f55fab6866c78cfab981291d3f9e14d91b129
  
https://github.com/NixOS/nixpkgs/commit/240f55fab6866c78cfab981291d3f9e14d91b129
  Author: Frederik Rietdijk 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M pkgs/development/python-modules/generic/catch_conflicts.py
M pkgs/top-level/python-packages.nix

  Log Message:
  ---
  Python: fix the wheel package


___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] [NixOS/nixpkgs] 1c0af4: Doc: how to install a Python environment

2016-07-01 Thread Frederik Rietdijk
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 1c0af40757c6bf9c15bd50888c79ff27682df7e1
  
https://github.com/NixOS/nixpkgs/commit/1c0af40757c6bf9c15bd50888c79ff27682df7e1
  Author: Frederik Rietdijk 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M doc/languages-frameworks/python.md

  Log Message:
  ---
  Doc: how to install a Python environment

See https://github.com/NixOS/nixpkgs/issues/10597.


___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] [NixOS/nixpkgs] b5a905: nixos/update-users-groups.pl: print UIDs and GIDs

2016-07-01 Thread Bjørn Forsman
  Branch: refs/heads/release-16.03
  Home:   https://github.com/NixOS/nixpkgs
  Commit: b5a905beac430326b25036d1cec041c624660bc3
  
https://github.com/NixOS/nixpkgs/commit/b5a905beac430326b25036d1cec041c624660bc3
  Author: Bjørn Forsman 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M nixos/modules/config/update-users-groups.pl

  Log Message:
  ---
  nixos/update-users-groups.pl: print UIDs and GIDs

Instead of showing this output from "nixos-rebuild switch":

  warning: not applying GID change of group ‘munin’
  warning: not applying UID change of user ‘ntp’

print this:

  warning: not applying GID change of group ‘munin’ (95 -> 102)
  warning: not applying UID change of user ‘ntp’ (3 -> 179)

This makes it possible for users to take action and fixup the UIDs/GIDs
that NixOS won't touch.

(cherry picked from commit 6e528893a8ccaf3fa4ad23bc0e4d18c679c1f37d)


___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] [NixOS/nixpkgs] 6e5288: nixos/update-users-groups.pl: print UIDs and GIDs

2016-07-01 Thread Eelco Dolstra
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 6e528893a8ccaf3fa4ad23bc0e4d18c679c1f37d
  
https://github.com/NixOS/nixpkgs/commit/6e528893a8ccaf3fa4ad23bc0e4d18c679c1f37d
  Author: Bjørn Forsman 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M nixos/modules/config/update-users-groups.pl

  Log Message:
  ---
  nixos/update-users-groups.pl: print UIDs and GIDs

Instead of showing this output from "nixos-rebuild switch":

  warning: not applying GID change of group ‘munin’
  warning: not applying UID change of user ‘ntp’

print this:

  warning: not applying GID change of group ‘munin’ (95 -> 102)
  warning: not applying UID change of user ‘ntp’ (3 -> 179)

This makes it possible for users to take action and fixup the UIDs/GIDs
that NixOS won't touch.


  Commit: 6284f603cefa0f25a7409170143615ce4725dcd4
  
https://github.com/NixOS/nixpkgs/commit/6284f603cefa0f25a7409170143615ce4725dcd4
  Author: Eelco Dolstra 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M nixos/modules/config/update-users-groups.pl

  Log Message:
  ---
  Merge pull request #16640 from bjornfor/nixos-rebuild-show-uids

nixos/update-users-groups.pl: print UIDs and GIDs


Compare: https://github.com/NixOS/nixpkgs/compare/9159d50baf7e...6284f603cefa___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] [NixOS/nixpkgs] 8f53cf: wine: 1.9.11 -> 1.9.13

2016-07-01 Thread Nikolay Amiantov
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 8f53cfbd59a6da9c60b49890f80da8232c923253
  
https://github.com/NixOS/nixpkgs/commit/8f53cfbd59a6da9c60b49890f80da8232c923253
  Author: Alexander V. Nikolaev 
  Date:   2016-06-27 (Mon, 27 Jun 2016)

  Changed paths:
M pkgs/misc/emulators/wine/sources.nix

  Log Message:
  ---
  wine: 1.9.11 -> 1.9.13


  Commit: 962e365444cfa545b8e0a991d777d4b03c9b6efe
  
https://github.com/NixOS/nixpkgs/commit/962e365444cfa545b8e0a991d777d4b03c9b6efe
  Author: Alexander V. Nikolaev 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M pkgs/misc/emulators/wine/sources.nix

  Log Message:
  ---
  wineStable: 1.8.2 -> 1.8.3


  Commit: 9159d50baf7e2e5e8640ad000434a5f283f458cf
  
https://github.com/NixOS/nixpkgs/commit/9159d50baf7e2e5e8640ad000434a5f283f458cf
  Author: Nikolay Amiantov 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M pkgs/misc/emulators/wine/sources.nix

  Log Message:
  ---
  Merge pull request #16533 from avnik/wine-update

wine: 1.9.11 -> 1.9.13


Compare: https://github.com/NixOS/nixpkgs/compare/3e00cd20a85e...9159d50baf7e___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] [NixOS/nixpkgs] 0253f7: transgui: init at 5.0.1-svn-r986

2016-07-01 Thread zimbatm
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 0253f7eafbec07721970eb3a89c356fbccd25dd1
  
https://github.com/NixOS/nixpkgs/commit/0253f7eafbec07721970eb3a89c356fbccd25dd1
  Author: Ram Kromberg 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M lib/maintainers.nix
A pkgs/applications/networking/p2p/transgui/default.nix
M pkgs/top-level/all-packages.nix

  Log Message:
  ---
  transgui: init at 5.0.1-svn-r986


  Commit: 3e00cd20a85ef55652926923e0a0869cf18bb866
  
https://github.com/NixOS/nixpkgs/commit/3e00cd20a85ef55652926923e0a0869cf18bb866
  Author: zimbatm 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M lib/maintainers.nix
A pkgs/applications/networking/p2p/transgui/default.nix
M pkgs/top-level/all-packages.nix

  Log Message:
  ---
  Merge pull request #16638 from RamKromberg/init/transgui

transgui: init at 5.0.1-svn-r986


Compare: https://github.com/NixOS/nixpkgs/compare/b5e237bda660...3e00cd20a85e___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] [NixOS/nixpkgs] 5c436c: pythonPackages.twisted: 15.5.0 -> 16.2.0

2016-07-01 Thread Lancelot SIX
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 5c436c7a763357350b5297af0ad9ab613be46fb3
  
https://github.com/NixOS/nixpkgs/commit/5c436c7a763357350b5297af0ad9ab613be46fb3
  Author: Lancelot SIX 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M pkgs/top-level/python-packages.nix

  Log Message:
  ---
  pythonPackages.twisted: 15.5.0 -> 16.2.0


  Commit: b5e237bda66095eaa3c071ba58b1282ea4a45651
  
https://github.com/NixOS/nixpkgs/commit/b5e237bda66095eaa3c071ba58b1282ea4a45651
  Author: Lancelot SIX 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M pkgs/top-level/python-packages.nix

  Log Message:
  ---
  pythonPackages.pika: 0.9.12 -> 0.10.0


Compare: https://github.com/NixOS/nixpkgs/compare/14a42dba66bb...b5e237bda660___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] [NixOS/nixpkgs] 77f675: hackage-packages.nix: update Haskell package set

2016-07-01 Thread Peter Simons
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 77f6750ef016c2c9610c5f4e96487aff6157297b
  
https://github.com/NixOS/nixpkgs/commit/77f6750ef016c2c9610c5f4e96487aff6157297b
  Author: Peter Simons 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M pkgs/development/haskell-modules/configuration-lts-0.0.nix
M pkgs/development/haskell-modules/configuration-lts-0.1.nix
M pkgs/development/haskell-modules/configuration-lts-0.2.nix
M pkgs/development/haskell-modules/configuration-lts-0.3.nix
M pkgs/development/haskell-modules/configuration-lts-0.4.nix
M pkgs/development/haskell-modules/configuration-lts-0.5.nix
M pkgs/development/haskell-modules/configuration-lts-0.6.nix
M pkgs/development/haskell-modules/configuration-lts-0.7.nix
M pkgs/development/haskell-modules/configuration-lts-1.0.nix
M pkgs/development/haskell-modules/configuration-lts-1.1.nix
M pkgs/development/haskell-modules/configuration-lts-1.10.nix
M pkgs/development/haskell-modules/configuration-lts-1.11.nix
M pkgs/development/haskell-modules/configuration-lts-1.12.nix
M pkgs/development/haskell-modules/configuration-lts-1.13.nix
M pkgs/development/haskell-modules/configuration-lts-1.14.nix
M pkgs/development/haskell-modules/configuration-lts-1.15.nix
M pkgs/development/haskell-modules/configuration-lts-1.2.nix
M pkgs/development/haskell-modules/configuration-lts-1.4.nix
M pkgs/development/haskell-modules/configuration-lts-1.5.nix
M pkgs/development/haskell-modules/configuration-lts-1.7.nix
M pkgs/development/haskell-modules/configuration-lts-1.8.nix
M pkgs/development/haskell-modules/configuration-lts-1.9.nix
M pkgs/development/haskell-modules/configuration-lts-2.0.nix
M pkgs/development/haskell-modules/configuration-lts-2.1.nix
M pkgs/development/haskell-modules/configuration-lts-2.10.nix
M pkgs/development/haskell-modules/configuration-lts-2.11.nix
M pkgs/development/haskell-modules/configuration-lts-2.12.nix
M pkgs/development/haskell-modules/configuration-lts-2.13.nix
M pkgs/development/haskell-modules/configuration-lts-2.14.nix
M pkgs/development/haskell-modules/configuration-lts-2.15.nix
M pkgs/development/haskell-modules/configuration-lts-2.16.nix
M pkgs/development/haskell-modules/configuration-lts-2.17.nix
M pkgs/development/haskell-modules/configuration-lts-2.18.nix
M pkgs/development/haskell-modules/configuration-lts-2.19.nix
M pkgs/development/haskell-modules/configuration-lts-2.2.nix
M pkgs/development/haskell-modules/configuration-lts-2.20.nix
M pkgs/development/haskell-modules/configuration-lts-2.21.nix
M pkgs/development/haskell-modules/configuration-lts-2.22.nix
M pkgs/development/haskell-modules/configuration-lts-2.3.nix
M pkgs/development/haskell-modules/configuration-lts-2.4.nix
M pkgs/development/haskell-modules/configuration-lts-2.5.nix
M pkgs/development/haskell-modules/configuration-lts-2.6.nix
M pkgs/development/haskell-modules/configuration-lts-2.7.nix
M pkgs/development/haskell-modules/configuration-lts-2.8.nix
M pkgs/development/haskell-modules/configuration-lts-2.9.nix
M pkgs/development/haskell-modules/configuration-lts-3.0.nix
M pkgs/development/haskell-modules/configuration-lts-3.1.nix
M pkgs/development/haskell-modules/configuration-lts-3.10.nix
M pkgs/development/haskell-modules/configuration-lts-3.11.nix
M pkgs/development/haskell-modules/configuration-lts-3.12.nix
M pkgs/development/haskell-modules/configuration-lts-3.13.nix
M pkgs/development/haskell-modules/configuration-lts-3.14.nix
M pkgs/development/haskell-modules/configuration-lts-3.15.nix
M pkgs/development/haskell-modules/configuration-lts-3.16.nix
M pkgs/development/haskell-modules/configuration-lts-3.17.nix
M pkgs/development/haskell-modules/configuration-lts-3.18.nix
M pkgs/development/haskell-modules/configuration-lts-3.19.nix
M pkgs/development/haskell-modules/configuration-lts-3.2.nix
M pkgs/development/haskell-modules/configuration-lts-3.20.nix
M pkgs/development/haskell-modules/configuration-lts-3.21.nix
M pkgs/development/haskell-modules/configuration-lts-3.22.nix
M pkgs/development/haskell-modules/configuration-lts-3.3.nix
M pkgs/development/haskell-modules/configuration-lts-3.4.nix
M pkgs/development/haskell-modules/configuration-lts-3.5.nix
M pkgs/development/haskell-modules/configuration-lts-3.6.nix
M pkgs/development/haskell-modules/configuration-lts-3.7.nix
M pkgs/development/haskell-modules/configuration-lts-3.8.nix
M pkgs/development/haskell-modules/configuration-lts-3.9.nix
M pkgs/development/haskell-modules/configuration-lts-4.0.nix
M pkgs/development/haskell-modules/configuration-lts-4.1.nix
M pkgs/development/haskell-modules/configuration-lts-4.2.nix
M pkgs/development/haskell-modules/configuration-lts-5.0

[Nix-commits] [NixOS/nixpkgs] 153d79: mwclient: init at 0.8.1

2016-07-01 Thread Damien Cassou
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 153d792532b97fa70d216432b801e84d0b39b90e
  
https://github.com/NixOS/nixpkgs/commit/153d792532b97fa70d216432b801e84d0b39b90e
  Author: Damien Cassou 
  Date:   2016-05-31 (Tue, 31 May 2016)

  Changed paths:
M pkgs/top-level/python-packages.nix

  Log Message:
  ---
  mwclient: init at 0.8.1


  Commit: b860faf2f603da015e694d4a117a2896b424abe6
  
https://github.com/NixOS/nixpkgs/commit/b860faf2f603da015e694d4a117a2896b424abe6
  Author: Damien Cassou 
  Date:   2016-05-31 (Tue, 31 May 2016)

  Changed paths:
M pkgs/top-level/python-packages.nix

  Log Message:
  ---
  fdroidserver: init at 2016-05-31


  Commit: 8d288c63daed79e3622ba893d07a53d82fb77a3a
  
https://github.com/NixOS/nixpkgs/commit/8d288c63daed79e3622ba893d07a53d82fb77a3a
  Author: Damien Cassou 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M pkgs/top-level/python-packages.nix

  Log Message:
  ---
  Merge pull request #15853 from DamienCassou/add-fdroidserver

Add fdroidserver (and the mwclient dependency)


Compare: https://github.com/NixOS/nixpkgs/compare/17f822a456fa...8d288c63daed___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] [NixOS/nixpkgs] 44f885: tnef: init at 1.4.12

2016-07-01 Thread Damien Cassou
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 44f885a0a389f6a8cfc38a578318140f8f1fa311
  
https://github.com/NixOS/nixpkgs/commit/44f885a0a389f6a8cfc38a578318140f8f1fa311
  Author: Damien Cassou 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
A pkgs/applications/misc/tnef/default.nix
A pkgs/applications/misc/tnef/tnef/default.nix
M pkgs/top-level/all-packages.nix

  Log Message:
  ---
  tnef: init at 1.4.12


  Commit: 17f822a456fa3f119154e9ce8f916ccdbeca6b36
  
https://github.com/NixOS/nixpkgs/commit/17f822a456fa3f119154e9ce8f916ccdbeca6b36
  Author: Damien Cassou 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
A pkgs/applications/misc/tnef/default.nix
A pkgs/applications/misc/tnef/tnef/default.nix
M pkgs/top-level/all-packages.nix

  Log Message:
  ---
  Merge pull request #16637 from DamienCassou/tnef-1.4.12

tnef: init at 1.4.12


Compare: https://github.com/NixOS/nixpkgs/compare/a441a7c2579a...17f822a456fa___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] [NixOS/nixpkgs] 86e2b0: gtk3: 3.20.5 -> 3.20.6

2016-07-01 Thread Vladimír Čunát
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 86e2b0e52b75a80be2c515612cdd50199043e516
  
https://github.com/NixOS/nixpkgs/commit/86e2b0e52b75a80be2c515612cdd50199043e516
  Author: Kranium Gikos Mendoza 
  Date:   2016-06-30 (Thu, 30 Jun 2016)

  Changed paths:
M pkgs/development/libraries/gtk+/3.x.nix

  Log Message:
  ---
  gtk3: 3.20.5 -> 3.20.6


  Commit: d756aee6f6f38fac8980627f670b8ffadb20fe53
  
https://github.com/NixOS/nixpkgs/commit/d756aee6f6f38fac8980627f670b8ffadb20fe53
  Author: Théophane Hufschmitt 
  Date:   2016-06-30 (Thu, 30 Jun 2016)

  Changed paths:
M pkgs/development/libraries/gtk+/3.x.nix

  Log Message:
  ---
  Gtk : Enable wayland support on Linux


  Commit: 17faf910b76841e7ad4b31036be86a0e309c274e
  
https://github.com/NixOS/nixpkgs/commit/17faf910b76841e7ad4b31036be86a0e309c274e
  Author: Vladimír Čunát 
  Date:   2016-06-30 (Thu, 30 Jun 2016)

  Changed paths:
M pkgs/development/libraries/gnutls/generic.nix

  Log Message:
  ---
  gnutls: fixup various problems

- disable a test that started failing due to date expiration, see #16610
- bash doesn't need adding
- defining patchPhase was overriding passed postPatch and patches


  Commit: 547092d82796c5ca4f3941c30d0d035a1f2554f8
  
https://github.com/NixOS/nixpkgs/commit/547092d82796c5ca4f3941c30d0d035a1f2554f8
  Author: Vladimír Čunát 
  Date:   2016-06-30 (Thu, 30 Jun 2016)

  Changed paths:
M .github/PULL_REQUEST_TEMPLATE.md
M doc/stdenv.xml
M lib/maintainers.nix
M nixos/modules/config/users-groups.nix
M nixos/modules/services/logging/logstash.nix
M nixos/modules/services/networking/avahi-daemon.nix
M nixos/modules/services/networking/networkmanager.nix
M nixos/modules/services/system/dbus.nix
M nixos/modules/services/x11/desktop-managers/gnome3.nix
M nixos/modules/system/boot/resolved.nix
M nixos/modules/virtualisation/libvirtd.nix
M pkgs/applications/audio/spotify/default.nix
M pkgs/applications/editors/bviplus/default.nix
M pkgs/applications/editors/eclipse/plugins.nix
M pkgs/applications/editors/texstudio/default.nix
M pkgs/applications/editors/vscode/default.nix
M pkgs/applications/misc/albert/default.nix
A pkgs/applications/misc/gpxsee/default.nix
M pkgs/applications/misc/mdp/default.nix
M pkgs/applications/misc/merkaartor/default.nix
M pkgs/applications/misc/synergy/default.nix
M pkgs/applications/misc/timewarrior/default.nix
M pkgs/applications/networking/browsers/firefox/default.nix
A pkgs/applications/networking/cluster/habitat/default.nix
M pkgs/applications/networking/davmail/default.nix
M 
pkgs/applications/networking/instant-messengers/telegram/tdesktop/default.nix
M pkgs/applications/networking/p2p/qbittorrent/default.nix
M pkgs/applications/networking/syncthing/default.nix
M pkgs/applications/office/gnucash/2.6.nix
M pkgs/applications/office/zanshin/default.nix
A pkgs/applications/science/biology/bcftools/default.nix
A pkgs/applications/science/biology/igv/default.nix
M pkgs/applications/science/biology/samtools/default.nix
A pkgs/applications/science/logic/cryptoverif/default.nix
A pkgs/applications/science/logic/proverif/default.nix
A pkgs/applications/science/logic/statverif/default.nix
A pkgs/applications/science/misc/gephi/default.nix
M pkgs/applications/version-management/git-and-tools/git-extras/default.nix
M pkgs/applications/version-management/meld/default.nix
M pkgs/applications/version-management/src/default.nix
M pkgs/applications/video/clipgrab/default.nix
M pkgs/applications/virtualization/docker/default.nix
M pkgs/applications/virtualization/rkt/default.nix
M pkgs/applications/virtualization/seabios/default.nix
M pkgs/applications/virtualization/virt-manager/default.nix
M pkgs/build-support/build-fhs-userenv/chroot-user.rb
M pkgs/build-support/build-fhs-userenv/default.nix
M pkgs/data/fonts/font-awesome-ttf/default.nix
M pkgs/desktops/enlightenment/efl.nix
M pkgs/desktops/gnome-3/3.18/core/gnome-keyring/default.nix
R pkgs/desktops/kde-5/frameworks-5.22/kauth/kauth-policy-install.patch
M pkgs/development/compilers/aldor/default.nix
M 
pkgs/development/compilers/chicken/0001-Introduce-CHICKEN_REPOSITORY_EXTRA.patch
M pkgs/development/compilers/chicken/default.nix
M pkgs/development/compilers/chicken/setup-hook.sh
M pkgs/development/compilers/cmdstan/default.nix
M pkgs/development/compilers/terra/default.nix
M pkgs/development/go-modules/libs.json
M pkgs/development/haskell-modules/configuration-lts-0.0.nix
M pkgs/development/haskell-modules/configuration-lts-0.1.nix
M pkgs/development/haskell-modules/configuration-lts-0.2.nix
M pkgs/development/haskell-modules/configuration-lts-0.3.nix
M pkgs/development/haskell-modules/configuration-lts-0.4.nix
M pkgs/developm

[Nix-commits] [NixOS/nixpkgs] 73ee19: drumstick: init at 1.0.2

2016-07-01 Thread zimbatm
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 73ee19f0e147fc76bd18e6b0effbfc7cc8075c87
  
https://github.com/NixOS/nixpkgs/commit/73ee19f0e147fc76bd18e6b0effbfc7cc8075c87
  Author: Scott Olson 
  Date:   2016-06-30 (Thu, 30 Jun 2016)

  Changed paths:
M lib/maintainers.nix
A pkgs/development/libraries/drumstick/default.nix
M pkgs/top-level/all-packages.nix

  Log Message:
  ---
  drumstick: init at 1.0.2


  Commit: 08939189e1ef96a4c63a172e7856939af794e8e3
  
https://github.com/NixOS/nixpkgs/commit/08939189e1ef96a4c63a172e7856939af794e8e3
  Author: zimbatm 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M lib/maintainers.nix
A pkgs/development/libraries/drumstick/default.nix
M pkgs/top-level/all-packages.nix

  Log Message:
  ---
  Merge pull request #16621 from solson/drumstick

drumstick: init at 1.0.2


Compare: https://github.com/NixOS/nixpkgs/compare/17fc38c4fa07...08939189e1ef___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] [NixOS/nixpkgs] 66b0b2: ghc: update 8.0.x pre-release from rc2 to rc3

2016-07-01 Thread Peter Simons
  Branch: refs/heads/release-16.03
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 66b0b2817d225da8fefdefeac78c9b568d93a9b5
  
https://github.com/NixOS/nixpkgs/commit/66b0b2817d225da8fefdefeac78c9b568d93a9b5
  Author: Peter Simons 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M pkgs/development/compilers/ghc/7.10.3.nix
M pkgs/development/compilers/ghc/8.0.1.nix
R 
pkgs/development/compilers/ghc/dont-pass-linker-flags-via-response-files.patch
A 
pkgs/development/compilers/ghc/ghc-7.x-dont-pass-linker-flags-via-response-files.patch
A 
pkgs/development/compilers/ghc/ghc-8.x-dont-pass-linker-flags-via-response-files.patch
M pkgs/development/compilers/ghc/head.nix

  Log Message:
  ---
  ghc: update 8.0.x pre-release from rc2 to rc3

(cherry picked from commit 2422ae0838cba9b17a3d30bccb43d4f55f8eeafe)


  Commit: d615935dabdb85dcc544d657375d2d6b18727c6a
  
https://github.com/NixOS/nixpkgs/commit/d615935dabdb85dcc544d657375d2d6b18727c6a
  Author: Peter Simons 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M pkgs/development/compilers/ghc/8.0.1.nix

  Log Message:
  ---
  ghc: update 8.0.x version to rc4

(cherry picked from commit bdaf6503366190b33651b36466934d7639d978b2)


  Commit: e2c04f25f63aeaebfccdf96951abab956fa429f1
  
https://github.com/NixOS/nixpkgs/commit/e2c04f25f63aeaebfccdf96951abab956fa429f1
  Author: Nikolay Amiantov 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M pkgs/development/compilers/ghc/8.0.1.nix

  Log Message:
  ---
  haskell.packages.ghc801: 8.0.0.20160421 -> 8.0.1

(cherry picked from commit 3098547ebc0bd4e9e06ea949fc476b0284053482)


  Commit: c0fc272230b6ae7b6a44b06efb3cf6e0e8d5b31e
  
https://github.com/NixOS/nixpkgs/commit/c0fc272230b6ae7b6a44b06efb3cf6e0e8d5b31e
  Author: Nikolay Amiantov 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M pkgs/development/compilers/ghc/8.0.1.nix

  Log Message:
  ---
  haskell.packages.ghc801.ghc: upstream tarball updated

(cherry picked from commit c366ab933d3d75512ab9dee8f34b55a9f4cb9835)


  Commit: eb4cfc545e62075cc14cc9112453221b107c3f32
  
https://github.com/NixOS/nixpkgs/commit/eb4cfc545e62075cc14cc9112453221b107c3f32
  Author: Peter Simons 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M pkgs/development/compilers/ghc/8.0.1.nix

  Log Message:
  ---
  ghc-8.0.1.nix: cosmetic

(cherry picked from commit 94b6127f8e8dbb8e61d93c3ccf055fe5985b9d54)


Compare: https://github.com/NixOS/nixpkgs/compare/7bcd427ca90e...eb4cfc545e62___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] [NixOS/nixpkgs] e00c57: gradle: 2.13 -> 2.14

2016-07-01 Thread zimbatm
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: e00c5726987f5036d29c7e8fa499638ff797beaa
  
https://github.com/NixOS/nixpkgs/commit/e00c5726987f5036d29c7e8fa499638ff797beaa
  Author: Tim Steinbach 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M pkgs/development/tools/build-managers/gradle/default.nix

  Log Message:
  ---
  gradle: 2.13 -> 2.14


  Commit: 17fc38c4fa0738466fffd21bbc8ba48910fc22c2
  
https://github.com/NixOS/nixpkgs/commit/17fc38c4fa0738466fffd21bbc8ba48910fc22c2
  Author: zimbatm 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M pkgs/development/tools/build-managers/gradle/default.nix

  Log Message:
  ---
  Merge pull request #16633 from NeQuissimus/gradle214

gradle: 2.13 -> 2.14


Compare: https://github.com/NixOS/nixpkgs/compare/31106824570f...17fc38c4fa07___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] [NixOS/nixpkgs] 39812a: neomutt: 20160530 -> 20160611

2016-07-01 Thread zimbatm
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 39812a35315670a381c77a612c0ee7f1a671a0f9
  
https://github.com/NixOS/nixpkgs/commit/39812a35315670a381c77a612c0ee7f1a671a0f9
  Author: Christian Lask 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M pkgs/applications/networking/mailreaders/neomutt/default.nix

  Log Message:
  ---
  neomutt: 20160530 -> 20160611


  Commit: 31106824570f508cbccd0bb06b901ef2a19532a3
  
https://github.com/NixOS/nixpkgs/commit/31106824570f508cbccd0bb06b901ef2a19532a3
  Author: zimbatm 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M pkgs/applications/networking/mailreaders/neomutt/default.nix

  Log Message:
  ---
  Merge pull request #16636 from hiberno/update-neomutt

neomutt: 20160530 -> 20160611


Compare: https://github.com/NixOS/nixpkgs/compare/9050077cffa6...31106824570f___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] [NixOS/nixpkgs] d445ad: colord: fix udev rules, add sane support

2016-07-01 Thread Bjørn Forsman
  Branch: refs/heads/release-16.03
  Home:   https://github.com/NixOS/nixpkgs
  Commit: d445ad758a5c657fc72e7aa140dcc1441d7cc723
  
https://github.com/NixOS/nixpkgs/commit/d445ad758a5c657fc72e7aa140dcc1441d7cc723
  Author: Nikolay Amiantov 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M pkgs/tools/misc/colord/default.nix

  Log Message:
  ---
  colord: fix udev rules, add sane support

(cherry picked from commit cf9ddb27d6aa53826f7191cbddb561a05554018c)


  Commit: be4e63004f07b4107c9061af5ae60245f38cd659
  
https://github.com/NixOS/nixpkgs/commit/be4e63004f07b4107c9061af5ae60245f38cd659
  Author: Nikolay Amiantov 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M nixos/modules/module-list.nix
A nixos/modules/services/x11/colord.nix

  Log Message:
  ---
  colord service: init

(cherry picked from commit 4e58b33deea7d62f109bdb63d5d79397044b5d90)

[Bjørn: Add ./services/x11/colord.nix to module-list.nix, was missing in
the above commit. (It was added as part of 776845bbeb
("xiccd: init at 0.2.2") though.)
]


  Commit: 7bcd427ca90e3313a687ab2f5f4ca4d7d1840514
  
https://github.com/NixOS/nixpkgs/commit/7bcd427ca90e3313a687ab2f5f4ca4d7d1840514
  Author: Bjørn Forsman 
  Date:   2016-07-01 (Fri, 01 Jul 2016)

  Changed paths:
M nixos/modules/services/x11/desktop-managers/gnome3.nix

  Log Message:
  ---
  nixos/gnome-desktop: enable colord service

Fixes this (line wrapped):

  $ gnome-control-center
  [... click on the "Color" item ...]
  (gnome-control-center:3977): color-cc-panel-WARNING **: \
The name org.freedesktop.ColorManager was not provided by any .service files

With this patch applied, the above warnings are not printed and the GUI
shows some devices that can be managed (my printer and display). Without
this patch the GUI is empty (non-functional).

(cups will also complain in the journal with a similar message when
doing print jobs, without this patch.)

(cherry picked from commit 66ee7a4c46ac27c30d7a06981361b9c8b0a330af)


Compare: https://github.com/NixOS/nixpkgs/compare/f4aa57ac91a6...7bcd427ca90e___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits