Re: [Nix-dev] OpenSSL

2014-12-16 Thread stewart mackenzie
okay the solution worked perfectly. Thanks I've changed all my envs. ___ nix-dev mailing list nix-dev@lists.science.uu.nl http://lists.science.uu.nl/mailman/listinfo/nix-dev

Re: [Nix-dev] OpenSSL

2014-12-15 Thread Vladimír Čunát
Hi. On 12/15/2014 04:49 AM, stewart mackenzie wrote: Here is an echo of my $LD_LIBRARY_PATH: I believe that setting LD_* variables is not a good way to pass dependencies to configure scripts (I have no idea why that should work at all). There are compiler/linker flags (C/C++), pkgconfig

Re: [Nix-dev] OpenSSL

2014-12-15 Thread stewart mackenzie
Vladimir I'm shocked, I've been using this method for a while now. I am pretty sure myEnvFun doesn't do this export the needed env paths. Could you be so kind and copy-paste a frequently used development environment from your config.nix script. (preferably one with many dependency libs) Kind

Re: [Nix-dev] OpenSSL

2014-12-15 Thread Vladimír Čunát
On 12/15/2014 10:37 AM, stewart mackenzie wrote: Could you be so kind and copy-paste a frequently used development environment from your config.nix script. (preferably one with many dependency libs) I don't do any development (with nix-managed dependencies), so I'm not a good one to ask. I

Re: [Nix-dev] OpenSSL

2014-12-15 Thread Vladimír Čunát
On 12/15/2014 04:49 AM, stewart mackenzie wrote: Problem: OpenSSL is no longer found despite it being in my environment. BTW, you might be interested in https://github.com/NixOS/nixpkgs/pull/5306 Vladimir smime.p7s Description: S/MIME Cryptographic Signature

Re: [Nix-dev] OpenSSL

2014-12-15 Thread Vladimír Čunát
On 12/15/2014 12:39 PM, Vladimír Čunát wrote: BTW, you might be interested in https://github.com/NixOS/nixpkgs/pull/5306 Ah, never mind, I was being blind :-D smime.p7s Description: S/MIME Cryptographic Signature ___ nix-dev mailing list

Re: [Nix-dev] OpenSSL

2014-12-15 Thread stewart mackenzie
Yes indeed, I was so interested in that pull request I created it :) On Mon, Dec 15, 2014 at 7:40 PM, Vladimír Čunát vcu...@gmail.com wrote: On 12/15/2014 12:39 PM, Vladimír Čunát wrote: BTW, you might be interested in https://github.com/NixOS/nixpkgs/pull/5306 Ah, never mind, I was being

Re: [Nix-dev] Openssl and fast security updates

2014-06-12 Thread Raahul Kumar
Thanks Vlad, just wondering I don't see Gnu TLS or PolarSSL as options already built. I can only see OpenSSL as an already built package, so I've got to create a nix package first? Aloha, RK. On Wed, Jun 11, 2014 at 4:12 PM, Vladimír Čunát vcu...@gmail.com wrote: On 06/11/2014 08:07 AM,

Re: [Nix-dev] Openssl and fast security updates

2014-06-11 Thread Raahul Kumar
Just wondering incidentally, similarly to how Fedora has switched to the Mozilla library, Debian uses GNUTLS, maybe it's time to switch to another SSL library. How do I get Nixos to link with one of the other SSL library alternatives. I think PolarSSL looks the best of the bunch. But any

Re: [Nix-dev] Openssl and fast security updates

2014-06-11 Thread Vladimír Čunát
On 06/11/2014 08:07 AM, Raahul Kumar wrote: How do I get Nixos to link with one of the other SSL library alternatives. I'd use standard packageOverrides to redefine openssl attribute. Vlada smime.p7s Description: S/MIME Cryptographic Signature

Re: [Nix-dev] Openssl and fast security updates

2014-06-09 Thread Luca Bruno
In the meanwhile I've merged system.replaceRuntimeDependencies. Here's some docs: https://nixos.org/wiki/Security_Updates On Fri, Jun 6, 2014 at 3:20 PM, Eelco Dolstra eelco.dols...@logicblox.com wrote: Hi, On 06/06/14 13:57, Mathijs Kwik wrote: So server systems need to start following a

Re: [Nix-dev] Openssl and fast security updates

2014-06-06 Thread Ertugrul Söylemez
On Thu, 05 Jun 2014 23:39:34 +0200 Vladimír Čunát vcu...@gmail.com wrote: Hydra has and uses priorities. Anyway, building OpenSSL itself is very quick, but rebuilding all that (transitively) depends on it is worse. And there are CVE fixes for stdenv stuff sometimes (glibc)... Yes, and the

Re: [Nix-dev] Openssl and fast security updates

2014-06-06 Thread Vladimír Čunát
On 06/06/2014 08:59 AM, Ertugrul Söylemez wrote: When we use priorities generously we could avoid a lot of delay even in less critical cases. The main problem I see is that normally you don't want to release a channel until *all* parts have rebuilt. We do have meta.schedulingPriority, but

Re: [Nix-dev] Openssl and fast security updates

2014-06-06 Thread Alexander Kjeldaas
On Fri, Jun 6, 2014 at 10:20 AM, Vladimír Čunát vcu...@gmail.com wrote: On 06/06/2014 08:59 AM, Ertugrul Söylemez wrote: When we use priorities generously we could avoid a lot of delay even in less critical cases. The main problem I see is that normally you don't want to release a channel

Re: [Nix-dev] Openssl and fast security updates

2014-06-06 Thread Michael Raskin
When we use priorities generously we could avoid a lot of delay even in less critical cases. The main problem I see is that normally you don't want to release a channel until *all* parts have rebuilt. +1 Rebuilding for a server that runs, say ssh, apache, nginx, postfix and a few such

Re: [Nix-dev] Openssl and fast security updates

2014-06-06 Thread Mathijs Kwik
Alexander Kjeldaas a...@formalprivacy.com writes: On Fri, Jun 6, 2014 at 10:20 AM, Vladimír Čunát vcu...@gmail.com wrote: On 06/06/2014 08:59 AM, Ertugrul Söylemez wrote: When we use priorities generously we could avoid a lot of delay even in less critical cases. The main problem I see

Re: [Nix-dev] Openssl and fast security updates

2014-06-06 Thread Eelco Dolstra
Hi, On 06/06/14 13:13, Michael Raskin wrote: Maybe having a channel which is a subset of the main channel and includes at least ssh, apache, nginx, postgresql, mysql, and some ftp server would be a nice start? Yeah, that sounds like a good idea. -- Eelco Dolstra | LogicBlox, Inc. |

Re: [Nix-dev] Openssl and fast security updates

2014-06-06 Thread Mathijs Kwik
Michael Raskin 7c6f4...@mail.ru writes: When we use priorities generously we could avoid a lot of delay even in less critical cases. The main problem I see is that normally you don't want to release a channel until *all* parts have rebuilt. +1 Rebuilding for a server that runs, say ssh,

Re: [Nix-dev] Openssl and fast security updates

2014-06-06 Thread Michael Raskin
Calculating the transitive closure for all nixos modules / services run by systemd is one way to prioritize. A populatiry contest could be added to that. Maybe having a channel which is a subset of the main channel and includes at least ssh, apache, nginx, postgresql, mysql, and some ftp

Re: [Nix-dev] Openssl and fast security updates

2014-06-06 Thread Eelco Dolstra
Hi, On 06/06/14 13:29, Mathijs Kwik wrote: How are people supposed to use that channel? I don't think I can _add_ a secondary channel which provides a conflicting source (nixos). Switching back and forth doesn't sound easy. Switching to another channel is very easy: $ nix-channel --add

Re: [Nix-dev] Openssl and fast security updates

2014-06-06 Thread Eelco Dolstra
Hi, On 06/06/14 13:14, Mathijs Kwik wrote: That still doesn't solve the question how to do a half build. If there have been 5 commits since the last channel build, and you add an important security fix, there is no way to only build that fix without building the other stuff. Well, if it's

Re: [Nix-dev] Openssl and fast security updates

2014-06-06 Thread Mathijs Kwik
Michael Raskin 7c6f4...@mail.ru writes: Calculating the transitive closure for all nixos modules / services run by systemd is one way to prioritize. A populatiry contest could be added to that. Maybe having a channel which is a subset of the main channel and includes at least ssh, apache,

Re: [Nix-dev] Openssl and fast security updates

2014-06-06 Thread Mathijs Kwik
Eelco Dolstra eelco.dols...@logicblox.com writes: Hi, On 06/06/14 13:29, Mathijs Kwik wrote: How are people supposed to use that channel? I don't think I can _add_ a secondary channel which provides a conflicting source (nixos). Switching back and forth doesn't sound easy. Switching to

Re: [Nix-dev] Openssl and fast security updates

2014-06-06 Thread Thomas Strobel
On 06/06/2014 07:59 AM, Ertugrul Söylemez wrote: On Thu, 05 Jun 2014 23:39:34 +0200 Vladimír Čunát vcu...@gmail.com wrote: Hydra has and uses priorities. Anyway, building OpenSSL itself is very quick, but rebuilding all that (transitively) depends on it is worse. And there are CVE fixes

Re: [Nix-dev] Openssl and fast security updates

2014-06-06 Thread Eelco Dolstra
Hi, On 06/06/14 13:57, Mathijs Kwik wrote: So server systems need to start following a channel that does not run lengthy tests? The NixOS system tests actually aren't very lengthy (though they do suffer from non-deterministic failures). It's more the latency of having to wait for 20,000

[Nix-dev] Openssl and fast security updates

2014-06-05 Thread Luca Bruno
This is the second time since I'm using nixos there's a need for a really important security update. It takes too much time to deliver the new packages from the nixos channel, and it would take equally long to compile them on production servers. Are there any plans to overcome this drawback? Is

Re: [Nix-dev] Openssl and fast security updates

2014-06-05 Thread Shea Levy
See the replaceDependency function in nixpkgs: https://github.com/NixOS/nixpkgs/blob/80a60810ca7e59360e8babf47c4d967f108c1e46/pkgs/top-level/all-packages.nix#L407-L409 On Thu, Jun 05, 2014 at 05:09:52PM +0200, Luca Bruno wrote: This is the second time since I'm using nixos there's a need for a

Re: [Nix-dev] Openssl and fast security updates

2014-06-05 Thread Luca Bruno
On 05/06/2014 17:16, Shea Levy wrote: See the replaceDependency function in nixpkgs: https://github.com/NixOS/nixpkgs/blob/80a60810ca7e59360e8babf47c4d967f108c1e46/pkgs/top-level/all-packages.nix#L407-L409 This deserves a note in the wiki, with a practical example on how to add it, and how to

Re: [Nix-dev] Openssl and fast security updates

2014-06-05 Thread Luca Bruno
On 05/06/2014 17:16, Shea Levy wrote: See the replaceDependency function in nixpkgs: https://github.com/NixOS/nixpkgs/blob/80a60810ca7e59360e8babf47c4d967f108c1e46/pkgs/top-level/all-packages.nix#L407-L409 Also, replaceDependency seems to work with a single drv, but then how to apply the new

Re: [Nix-dev] Openssl and fast security updates

2014-06-05 Thread Shea Levy
Pass in the system derivation and use nix-env --set to switch your system to the resultant derivation. I have used it in the past but only for short periods while waiting for a rebuild. On Thu, Jun 05, 2014 at 05:44:01PM +0200, Luca Bruno wrote: On 05/06/2014 17:16, Shea Levy wrote: See the

Re: [Nix-dev] Openssl and fast security updates

2014-06-05 Thread Luca Bruno
On 05/06/2014 17:49, Shea Levy wrote: Pass in the system derivation and use nix-env --set to switch your system to the resultant derivation. I have used it in the past but only for short periods while waiting for a rebuild. Can't it be done in configuration.nix rather than command line? Would

Re: [Nix-dev] Openssl and fast security updates

2014-06-05 Thread Vladimír Čunát
On 06/05/2014 06:21 PM, Luca Bruno wrote: I'd like to propose a system.securityUpdates = [ pkg1 pkg2 ... ] which will be taken in account by system.build.toplevel automatically, so that security updates can be easily specified in configuration.nix, instead of messing with the command line.

Re: [Nix-dev] Openssl and fast security updates

2014-06-05 Thread Shea Levy
How about something like http://sprunge.us/eJOD (untested)? I don't have time to do testing right now. On Thu, Jun 05, 2014 at 06:21:30PM +0200, Luca Bruno wrote: On 05/06/2014 17:49, Shea Levy wrote: Pass in the system derivation and use nix-env --set to switch your system to the resultant

Re: [Nix-dev] Openssl and fast security updates

2014-06-05 Thread Mathijs Kwik
Luca Bruno lethalma...@gmail.com writes: On 05/06/2014 17:49, Shea Levy wrote: Pass in the system derivation and use nix-env --set to switch your system to the resultant derivation. I have used it in the past but only for short periods while waiting for a rebuild. Can't it be done in

Re: [Nix-dev] Openssl and fast security updates

2014-06-05 Thread Luca Bruno
On 05/06/2014 18:41, Shea Levy wrote: How about something like http://sprunge.us/eJOD (untested)? I don't have time to do testing right now. Ahah, much what I did here: https://github.com/NixOS/nixpkgs/pull/2837 ___ nix-dev mailing list

Re: [Nix-dev] Openssl and fast security updates

2014-06-05 Thread Peter Simons
Hi Luca, It takes too much time to deliver the new packages from the nixos channel, and it would take equally long to compile them on production servers. that OpenSSL update was committed 5 hours ago. Isn't it a wee bit early to say that the update takes too much time? Also, note that you

Re: [Nix-dev] Openssl and fast security updates

2014-06-05 Thread Luca Bruno
No, it's not too early. Other distros immediately packaged the new version and provided it in their security channel. It's never too early when it concerns security. On Thu, Jun 5, 2014 at 8:04 PM, Peter Simons sim...@cryp.to wrote: Hi Luca, It takes too much time to deliver the new

Re: [Nix-dev] Openssl and fast security updates

2014-06-05 Thread Luca Bruno
No the argument is currently this pull request, where you can force the system to use a particular package (under some condition) without doing a full rebuild: https://github.com/NixOS/nixpkgs/pull/2837 On Thu, Jun 5, 2014 at 10:01 PM, Shell Turner cam.t...@gmail.com wrote: So is the argument

Re: [Nix-dev] Openssl and fast security updates

2014-06-05 Thread Ertugrul Söylemez
On Thu, 5 Jun 2014 21:01:59 +0100 Shell Turner cam.t...@gmail.com wrote: So is the argument that it should be possible to update the channel with the new package definition before the binary cache has finished building, thus letting people rebuild their systems locally if need be? That seems

Re: [Nix-dev] Openssl and fast security updates

2014-06-05 Thread Aristid Breitkreuz
Note that we're currently not just waiting for Hydra, but also for the delayed appearance on the official cache.nixos.org, which AFAIK can take something like a day. 2014-06-05 22:50 GMT+02:00 Ertugrul Söylemez ert...@gmx.de: On Thu, 5 Jun 2014 21:01:59 +0100 Shell Turner cam.t...@gmail.com

Re: [Nix-dev] Openssl and fast security updates

2014-06-05 Thread Michael Raskin
Note that we're currently not just waiting for Hydra, but also for the delayed appearance on the official cache.nixos.org, which AFAIK can take something like a day. As far as I understand, this delay is the delay of Hydra building the entire channel. I.e. fresh Nginx will not go to the cache

Re: [Nix-dev] Openssl and fast security updates

2014-06-05 Thread Aristid Breitkreuz
I believe that is a separate delay. Both exist Am 06.06.2014 06:49 schrieb Michael Raskin 7c6f4...@mail.ru: Note that we're currently not just waiting for Hydra, but also for the delayed appearance on the official cache.nixos.org, which AFAIK can take something like a day. As far as I