okay the solution worked perfectly. Thanks I've changed all my envs.
___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev
Hi.
On 12/15/2014 04:49 AM, stewart mackenzie wrote:
Here is an echo of my $LD_LIBRARY_PATH:
I believe that setting LD_* variables is not a good way to pass
dependencies to configure scripts (I have no idea why that should work
at all). There are compiler/linker flags (C/C++), pkgconfig
Vladimir
I'm shocked, I've been using this method for a while now.
I am pretty sure myEnvFun doesn't do this export the needed env paths.
Could you be so kind and copy-paste a frequently used development
environment from your config.nix script. (preferably one with many
dependency libs)
Kind
On 12/15/2014 10:37 AM, stewart mackenzie wrote:
Could you be so kind and copy-paste a frequently used development
environment from your config.nix script. (preferably one with many
dependency libs)
I don't do any development (with nix-managed dependencies), so I'm not a
good one to ask. I
On 12/15/2014 04:49 AM, stewart mackenzie wrote:
Problem: OpenSSL is no longer found despite it being in my environment.
BTW, you might be interested in https://github.com/NixOS/nixpkgs/pull/5306
Vladimir
smime.p7s
Description: S/MIME Cryptographic Signature
On 12/15/2014 12:39 PM, Vladimír Čunát wrote:
BTW, you might be interested in https://github.com/NixOS/nixpkgs/pull/5306
Ah, never mind, I was being blind :-D
smime.p7s
Description: S/MIME Cryptographic Signature
___
nix-dev mailing list
Yes indeed, I was so interested in that pull request I created it :)
On Mon, Dec 15, 2014 at 7:40 PM, Vladimír Čunát vcu...@gmail.com wrote:
On 12/15/2014 12:39 PM, Vladimír Čunát wrote:
BTW, you might be interested in https://github.com/NixOS/nixpkgs/pull/5306
Ah, never mind, I was being
Thanks Vlad, just wondering I don't see Gnu TLS or PolarSSL as options
already built. I can only see OpenSSL as an already built package, so I've
got to create a nix package first?
Aloha,
RK.
On Wed, Jun 11, 2014 at 4:12 PM, Vladimír Čunát vcu...@gmail.com wrote:
On 06/11/2014 08:07 AM,
Just wondering incidentally, similarly to how Fedora has switched to the
Mozilla library, Debian uses GNUTLS, maybe it's time to switch to another
SSL library. How do I get Nixos to link with one of the other SSL library
alternatives. I think PolarSSL looks the best of the bunch. But any
On 06/11/2014 08:07 AM, Raahul Kumar wrote:
How do I get Nixos to link with one of the other SSL library alternatives.
I'd use standard packageOverrides to redefine openssl attribute.
Vlada
smime.p7s
Description: S/MIME Cryptographic Signature
In the meanwhile I've merged system.replaceRuntimeDependencies. Here's some
docs: https://nixos.org/wiki/Security_Updates
On Fri, Jun 6, 2014 at 3:20 PM, Eelco Dolstra eelco.dols...@logicblox.com
wrote:
Hi,
On 06/06/14 13:57, Mathijs Kwik wrote:
So server systems need to start following a
On Thu, 05 Jun 2014 23:39:34 +0200
Vladimír Čunát vcu...@gmail.com wrote:
Hydra has and uses priorities. Anyway, building OpenSSL itself is very
quick, but rebuilding all that (transitively) depends on it is worse.
And there are CVE fixes for stdenv stuff sometimes (glibc)...
Yes, and the
On 06/06/2014 08:59 AM, Ertugrul Söylemez wrote:
When we use priorities generously we could avoid a lot of delay even in less
critical cases.
The main problem I see is that normally you don't want to release a
channel until *all* parts have rebuilt.
We do have meta.schedulingPriority, but
On Fri, Jun 6, 2014 at 10:20 AM, Vladimír Čunát vcu...@gmail.com wrote:
On 06/06/2014 08:59 AM, Ertugrul Söylemez wrote:
When we use priorities generously we could avoid a lot of delay even in
less critical cases.
The main problem I see is that normally you don't want to release a
channel
When we use priorities generously we could avoid a lot of delay even in
less critical cases.
The main problem I see is that normally you don't want to release a
channel until *all* parts have rebuilt.
+1 Rebuilding for a server that runs, say ssh, apache, nginx, postfix and a
few such
Alexander Kjeldaas a...@formalprivacy.com writes:
On Fri, Jun 6, 2014 at 10:20 AM, Vladimír Čunát vcu...@gmail.com wrote:
On 06/06/2014 08:59 AM, Ertugrul Söylemez wrote:
When we use priorities generously we could avoid a lot of delay even in
less critical cases.
The main problem I see
Hi,
On 06/06/14 13:13, Michael Raskin wrote:
Maybe having a channel which is a subset of the main channel and
includes at least ssh, apache, nginx, postgresql, mysql, and some ftp
server would be a nice start?
Yeah, that sounds like a good idea.
--
Eelco Dolstra | LogicBlox, Inc. |
Michael Raskin 7c6f4...@mail.ru writes:
When we use priorities generously we could avoid a lot of delay even in
less critical cases.
The main problem I see is that normally you don't want to release a
channel until *all* parts have rebuilt.
+1 Rebuilding for a server that runs, say ssh,
Calculating the transitive closure for all nixos modules / services run by
systemd is one way to prioritize. A populatiry contest could be added to
that.
Maybe having a channel which is a subset of the main channel and
includes at least ssh, apache, nginx, postgresql, mysql, and some ftp
Hi,
On 06/06/14 13:29, Mathijs Kwik wrote:
How are people supposed to use that channel?
I don't think I can _add_ a secondary channel which provides a
conflicting source (nixos). Switching back and forth doesn't sound
easy.
Switching to another channel is very easy:
$ nix-channel --add
Hi,
On 06/06/14 13:14, Mathijs Kwik wrote:
That still doesn't solve the question how to do a half build.
If there have been 5 commits since the last channel build, and you add
an important security fix, there is no way to only build that fix
without building the other stuff.
Well, if it's
Michael Raskin 7c6f4...@mail.ru writes:
Calculating the transitive closure for all nixos modules / services run by
systemd is one way to prioritize. A populatiry contest could be added to
that.
Maybe having a channel which is a subset of the main channel and
includes at least ssh, apache,
Eelco Dolstra eelco.dols...@logicblox.com writes:
Hi,
On 06/06/14 13:29, Mathijs Kwik wrote:
How are people supposed to use that channel?
I don't think I can _add_ a secondary channel which provides a
conflicting source (nixos). Switching back and forth doesn't sound
easy.
Switching to
On 06/06/2014 07:59 AM, Ertugrul Söylemez wrote:
On Thu, 05 Jun 2014 23:39:34 +0200
Vladimír Čunát vcu...@gmail.com wrote:
Hydra has and uses priorities. Anyway, building OpenSSL itself is very
quick, but rebuilding all that (transitively) depends on it is worse.
And there are CVE fixes
Hi,
On 06/06/14 13:57, Mathijs Kwik wrote:
So server systems need to start following a channel that does not run
lengthy tests?
The NixOS system tests actually aren't very lengthy (though they do suffer from
non-deterministic failures). It's more the latency of having to wait for 20,000
This is the second time since I'm using nixos there's a need for a
really important security update.
It takes too much time to deliver the new packages from the nixos
channel, and it would take equally long to compile them on production
servers.
Are there any plans to overcome this drawback? Is
See the replaceDependency function in nixpkgs:
https://github.com/NixOS/nixpkgs/blob/80a60810ca7e59360e8babf47c4d967f108c1e46/pkgs/top-level/all-packages.nix#L407-L409
On Thu, Jun 05, 2014 at 05:09:52PM +0200, Luca Bruno wrote:
This is the second time since I'm using nixos there's a need for a
On 05/06/2014 17:16, Shea Levy wrote:
See the replaceDependency function in nixpkgs:
https://github.com/NixOS/nixpkgs/blob/80a60810ca7e59360e8babf47c4d967f108c1e46/pkgs/top-level/all-packages.nix#L407-L409
This deserves a note in the wiki, with a practical example on how to add
it, and how to
On 05/06/2014 17:16, Shea Levy wrote:
See the replaceDependency function in nixpkgs:
https://github.com/NixOS/nixpkgs/blob/80a60810ca7e59360e8babf47c4d967f108c1e46/pkgs/top-level/all-packages.nix#L407-L409
Also, replaceDependency seems to work with a single drv, but then how to
apply the new
Pass in the system derivation and use nix-env --set to switch your
system to the resultant derivation.
I have used it in the past but only for short periods while waiting for
a rebuild.
On Thu, Jun 05, 2014 at 05:44:01PM +0200, Luca Bruno wrote:
On 05/06/2014 17:16, Shea Levy wrote:
See the
On 05/06/2014 17:49, Shea Levy wrote:
Pass in the system derivation and use nix-env --set to switch your
system to the resultant derivation.
I have used it in the past but only for short periods while waiting for
a rebuild.
Can't it be done in configuration.nix rather than command line? Would
On 06/05/2014 06:21 PM, Luca Bruno wrote:
I'd like to propose a system.securityUpdates = [ pkg1 pkg2 ... ] which
will be taken in account by system.build.toplevel automatically,
so that security updates can be easily specified in configuration.nix,
instead of messing with the command line.
How about something like http://sprunge.us/eJOD (untested)? I don't have
time to do testing right now.
On Thu, Jun 05, 2014 at 06:21:30PM +0200, Luca Bruno wrote:
On 05/06/2014 17:49, Shea Levy wrote:
Pass in the system derivation and use nix-env --set to switch your
system to the resultant
Luca Bruno lethalma...@gmail.com writes:
On 05/06/2014 17:49, Shea Levy wrote:
Pass in the system derivation and use nix-env --set to switch your
system to the resultant derivation.
I have used it in the past but only for short periods while waiting for
a rebuild.
Can't it be done in
On 05/06/2014 18:41, Shea Levy wrote:
How about something like http://sprunge.us/eJOD (untested)? I don't have
time to do testing right now.
Ahah, much what I did here: https://github.com/NixOS/nixpkgs/pull/2837
___
nix-dev mailing list
Hi Luca,
It takes too much time to deliver the new packages from the nixos
channel, and it would take equally long to compile them on production
servers.
that OpenSSL update was committed 5 hours ago. Isn't it a wee bit early
to say that the update takes too much time?
Also, note that you
No, it's not too early. Other distros immediately packaged the new version
and provided it in their security channel.
It's never too early when it concerns security.
On Thu, Jun 5, 2014 at 8:04 PM, Peter Simons sim...@cryp.to wrote:
Hi Luca,
It takes too much time to deliver the new
No the argument is currently this pull request, where you can force the
system to use a particular package (under some condition) without doing a
full rebuild: https://github.com/NixOS/nixpkgs/pull/2837
On Thu, Jun 5, 2014 at 10:01 PM, Shell Turner cam.t...@gmail.com wrote:
So is the argument
On Thu, 5 Jun 2014 21:01:59 +0100
Shell Turner cam.t...@gmail.com wrote:
So is the argument that it should be possible to update the channel
with the new package definition before the binary cache has finished
building, thus letting people rebuild their systems locally if need
be? That seems
Note that we're currently not just waiting for Hydra, but also for the
delayed appearance on the official cache.nixos.org, which AFAIK can
take something like a day.
2014-06-05 22:50 GMT+02:00 Ertugrul Söylemez ert...@gmx.de:
On Thu, 5 Jun 2014 21:01:59 +0100
Shell Turner cam.t...@gmail.com
Note that we're currently not just waiting for Hydra, but also for the
delayed appearance on the official cache.nixos.org, which AFAIK can
take something like a day.
As far as I understand, this delay is the delay of Hydra building the
entire channel. I.e. fresh Nginx will not go to the cache
I believe that is a separate delay. Both exist
Am 06.06.2014 06:49 schrieb Michael Raskin 7c6f4...@mail.ru:
Note that we're currently not just waiting for Hydra, but also for the
delayed appearance on the official cache.nixos.org, which AFAIK can
take something like a day.
As far as I
42 matches
Mail list logo