about summary refs log tree commit diff
AgeCommit message (Collapse)AuthorFilesLines
2012-07-25 import: If the path is a valid .drv file, parse it and generate a derivation ↵Shea Levy3-2/+48
attrset. The generated attrset has drvPath and outPath with the right string context, type 'derivation', outputName with the right name, all with a list of outputs, and an attribute for each output. I see three uses for this (though certainly there may be more): * Using derivations generated by something besides nix-instantiate (e.g. guix) * Allowing packages provided by channels to be used in nix expressions. If a channel installed a valid deriver for each package it provides into the store, then those could be imported and used as dependencies or installed in environment.systemPackages, for example. * Enable hydra to be consistent in how it treats inputs that are outputs of another build. Right now, if an input is passed as an argument to the job, it is passed as a derivation, but if it is accessed via NIX_PATH (i.e. through the <> syntax), then it is a path that can be imported. This is problematic because the build being depended upon may have been built with non-obvious arguments passed to its jobset file. With this feature, hydra can just set the name of that input to the path to its drv file in NIX_PATH
2012-07-25 Disable tests temporarilyShea Levy1-1/+1
2012-07-23 Handle platforms that don't support linking to a symlinkEelco Dolstra2-2/+19
E.g. Darwin doesn't allow this.
2012-07-23 Unlink the right fileEelco Dolstra1-2/+2
2012-07-23 Add a test for Nix store optimisationEelco Dolstra2-1/+27
2012-07-23 Garbage collect unused links in /nix/store/.linksEelco Dolstra2-0/+39
Incremental optimisation requires creating links in /nix/store/.links to all files in the store. However, this means that if we delete a store path, no files are actually deleted because links in /nix/store/.links still exists. So we need to check /nix/store/.links for files with a link count of 1 and delete them.
2012-07-23 Automatically optimise the Nix store when a new path is addedEelco Dolstra5-10/+45
Auto-optimisation is enabled by default. It can be turned off by setting auto-optimise-store to false in nix.conf.
2012-07-23 optimiseStore(): Use a content-addressed file store in /nix/store/.linksEelco Dolstra3-115/+110
optimiseStore() now creates persistent, content-addressed hard links in /nix/store/.links. For instance, if it encounters a file P with hash H, it will create a hard link P' = /nix/store/.link/<H> to P if P' doesn't already exist; if P' exist, then P is replaced by a hard link to P'. This is better than the previous in-memory map, because it had the tendency to unnecessarily replace hard links with a hard link to whatever happened to be the first file with a given hash it encountered. It also allows on-the-fly, incremental optimisation.
2012-07-23 nix-build: Support the ‘-’ argument to build an expression from stdinEelco Dolstra1-0/+4
2012-07-23 Use lutimes() if available to canonicalise the timestamp of symlinksEelco Dolstra2-9/+21
Also use utimes() instead of utime() if lutimes() is not available.
2012-07-18 Bump versionEelco Dolstra1-1/+1
2012-07-18 Remove RPM builds that don't evaluateEelco Dolstra1-4/+0
2012-07-18 Use "#pragma once" to prevent repeated header file inclusionEelco Dolstra32-166/+31
2012-07-18 Set release dateEelco Dolstra1-1/+1
2012-07-17 Add function queryPathFromHashPart()Eelco Dolstra9-0/+67
To implement binary caches efficiently, Hydra needs to be able to map the hash part of a store path (e.g. "gbg...zr7") to the full store path (e.g. "/nix/store/gbg...kzr7-subversion-1.7.5"). (The binary cache mechanism uses hash parts as a key for looking up store paths to ensure privacy.) However, doing a search in the Nix store for /nix/store/<hash>* is expensive since it requires reading the entire directory. queryPathFromHashPart() prevents this by doing a cheap database lookup.
2012-07-17 queryPathInfo(): return hash in base-32 if desiredEelco Dolstra1-2/+2
Cherry-picked from the no-manifests branch.
2012-07-17 Return an exit code of 100 for cached failed buildsEelco Dolstra1-0/+1
Exit code 100 should be returned for all permanent failures. This includes cached failures. Fixes #34.
2012-07-17 Remove dead codeEelco Dolstra2-13/+0
2012-07-17 Manual: Don't claim we support CygwinEelco Dolstra1-1/+1
2012-07-17 Update Nix 1.1 release notesEelco Dolstra2-8/+70
2012-07-17 Allow disabling log compressionEelco Dolstra2-12/+35
2012-07-12 builtins.storePath: resolve symlinksEelco Dolstra1-1/+5
Needed for Charon/Hydra interaction.
2012-07-09 Pass --insecure to curl so that https worksEelco Dolstra1-1/+1
2012-07-09 Inline fetchurl.shEelco Dolstra3-9/+13
2012-07-09 Add a test for the fetchurl functionEelco Dolstra3-1/+17
2012-07-09 Remove obsolete commentShea Levy1-3/+0
2012-07-09 corepkgs/fetchurl: Build locally and outside of the chrootShea Levy1-0/+6
2012-07-09 corepkgs/fetchurl: the 'system' argument can be optionalShea Levy1-1/+1
2012-07-09 corepkgs: distribute fetchurl filesShea Levy1-1/+1
2012-07-09 corepkgs/fetchurl: Call the shell directly instead of using the shebangShea Levy2-3/+2
2012-07-09 corepkgs/fetchurl.sh: Use config.nix's curlShea Levy2-2/+4
2012-07-09 The fetchurl builder is now fetchurl.shShea Levy1-1/+1
2012-07-09 Remove old fetchurl makefileShea Levy1-11/+0
2012-07-09 Move fetchurl files out of their subdirectoryShea Levy2-0/+0
2012-07-09 corepkgs/config.nix.in: We'll need curlShea Levy1-0/+1
2012-07-09 Resurrect old corepkgs fetchurlShea Levy3-0/+39
2012-07-09 Really fix RPM buildsEelco Dolstra1-3/+3
2012-07-09 Fix RPM buildsEelco Dolstra1-0/+1
http://hydra.nixos.org/build/2784908
2012-07-09 Get rid of nix.conf.exampleEelco Dolstra3-190/+2
No need to duplicate the nix.conf manpage.
2012-07-09 Install a nix.conf manpageEelco Dolstra3-12/+28
2012-06-27 nix-store -r: do substitutions in parallelEelco Dolstra11-25/+30
I.e. when multiple non-derivation arguments are passed to ‘nix-store -r’ to be substituted, do them in parallel.
2012-06-27 Mount an empty /dev/shm tmpfs in the chrootEelco Dolstra1-0/+6
This ensures that whatever the builder writes in /dev/shm is automatically cleaned up.
2012-06-27 Check the return code of the clone() callEelco Dolstra1-1/+2
2012-06-25 When using chroots, use a private PID namespaceEelco Dolstra2-156/+186
In a private PID namespace, processes have PIDs that are separate from the rest of the system. The initial child gets PID 1. Processes in the chroot cannot see processes outside of the chroot. This improves isolation between builds. However, processes on the outside can see processes in the chroot and send signals to them (if they have appropriate rights). Since the builder gets PID 1, it serves as the reaper for zombies in the chroot. This might turn out to be a problem. In that case we'll need to have a small PID 1 process that sits in a loop calling wait().
2012-06-25 Use a private UTS namespace to provide a deterministic host/domain name to ↵Eelco Dolstra1-1/+7
builders In chroot builds, set the host name to "localhost" and the domain name to "(none)" (the latter being the kernel's default). This improves determinism a bit further. P.S. I have to idea what UTS stands for.
2012-06-23 Update release notesEelco Dolstra1-1/+15
2012-06-23 Improve error messageEelco Dolstra1-1/+1
2012-06-23 In chroot builds, use a private SysV IPC namespaceEelco Dolstra1-12/+19
This improves isolation a bit further, and it's just one extra flag in the unshare() call. P.S. It would be very cool to use CLONE_NEWPID (to put the builder in a private PID namespace) as well, but that's slightly more risky since having a builder start as PID 1 may cause problems.
2012-06-23 In chroot builds, use a private network namespaceEelco Dolstra1-6/+31
On Linux it's possible to run a process in its own network namespace, meaning that it gets its own set of network interfaces, disjunct from the rest of the system. We use this to completely remove network access to chroot builds, except that they get a private loopback interface. This means that: - Builders cannot connect to the outside network or to other processes on the same machine, except processes within the same build. - Vice versa, other processes cannot connect to processes in a chroot build, and open ports/connections do not show up in "netstat". - If two concurrent builders try to listen on the same port (e.g. as part of a test), they no longer conflict with each other. This was inspired by the "PrivateNetwork" flag in systemd.
2012-06-18 Support socket-based, on-demand activation of the Nix daemon with systemdEelco Dolstra1-30/+46
Systemd can start the Nix daemon on demand when the Nix daemon socket is first accessed. This is signalled through the LISTEN_FDS environment variable, so all we need to do is check for that and then use file descriptor 3 as the listen socket instead of creating one ourselves.