[Nix-dev] Setting default group & permissions on deployment.keys

2016-06-14 Thread 4levels
Hi Nix Devs,

I'm currently implementing the deployment.keys approach to secure my web
projects (php, node,  ..).  I've managed to have all keys exported to
/run/keys but since the php process is running with the user:group
nginx:nginx, it has no access to the /run/keys folder.

Adding extraGroups = [ "keys" ] to users.extraUsers.nginx fixes access to
/run/keys.
Each key has by default the user:group root:root and permission "0600".
When adding the group = "keys" and permissions = "0640" to each key in
deployment.keys everything works as expected.

Is there a way to define a default group and permissions for all keys
without me specifying this for each key individually?
I'm currently well over 200 keys per machine so adding the group and
permissions for each key is quite elaborate..

As a secondary question:
Since I'm no security expert, I was wondering what the security impact is
of making Nginx part of the keys group and allowing it read-access to
/run/keys


Kind regards,

Eirk aka 4levels
___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


[Nix-commits] [NixOS/nixpkgs] 2089dd: GHC: Split docs

2016-06-14 Thread Peter Simons
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 2089dd4ab6be089bda12a942846ab7954b28b459
  
https://github.com/NixOS/nixpkgs/commit/2089dd4ab6be089bda12a942846ab7954b28b459
  Author: Alexey Shmalko 
  Date:   2016-06-12 (Sun, 12 Jun 2016)

  Changed paths:
M pkgs/development/compilers/ghc/7.10.2.nix
M pkgs/development/compilers/ghc/7.10.3.nix
M pkgs/development/compilers/ghc/8.0.1.nix

  Log Message:
  ---
  GHC: Split docs


  Commit: 39d657ec040fa31fdfe85ce3116abe8c64ab6519
  
https://github.com/NixOS/nixpkgs/commit/39d657ec040fa31fdfe85ce3116abe8c64ab6519
  Author: Peter Simons 
  Date:   2016-06-14 (Tue, 14 Jun 2016)

  Changed paths:
M pkgs/development/compilers/ghc/7.10.2.nix
M pkgs/development/compilers/ghc/7.10.3.nix
M pkgs/development/compilers/ghc/8.0.1.nix

  Log Message:
  ---
  Merge pull request #16167 from rasendubi/ghc-docs

GHC: Split docs


Compare: https://github.com/NixOS/nixpkgs/compare/1f77d3cd09cf...39d657ec040f___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] [NixOS/nixpkgs] 4e5952: rofi-pass: 1.3.1 -> 1.3.2

2016-06-14 Thread Moritz Ulrich
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 4e59526bf4f4b69524a520f443ddf048342103fb
  
https://github.com/NixOS/nixpkgs/commit/4e59526bf4f4b69524a520f443ddf048342103fb
  Author: Christian Lask 
  Date:   2016-06-14 (Tue, 14 Jun 2016)

  Changed paths:
M pkgs/tools/security/pass/rofi-pass.nix

  Log Message:
  ---
  rofi-pass: 1.3.1 -> 1.3.2

Note: You'll need to add the `_rofi` command to your config of rofi-pass
to make this release work. Refer to config.example for an example of
how this might look like. For more information on this change, see
https://github.com/carnager/rofi-pass/commit/75cf7151588927122d696dc1daa95fee1ba43644.


  Commit: dc3cfbbe0f23833fd967adb6d057bb5f577bf729
  
https://github.com/NixOS/nixpkgs/commit/dc3cfbbe0f23833fd967adb6d057bb5f577bf729
  Author: Moritz Ulrich 
  Date:   2016-06-14 (Tue, 14 Jun 2016)

  Changed paths:
M pkgs/tools/security/pass/rofi-pass.nix

  Log Message:
  ---
  Merge pull request #16225 from hiberno/update-rofi-pass

rofi-pass: 1.3.1 -> 1.3.2


Compare: https://github.com/NixOS/nixpkgs/compare/886c03ad2ec5...dc3cfbbe0f23___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


Re: [Nix-dev] Setting default group & permissions on deployment.keys

2016-06-14 Thread Rob Vermaas
Hi Erik,

> Is there a way to define a default group and permissions for all keys
> without me specifying this for each key individually?
> I'm currently well over 200 keys per machine so adding the group and
> permissions for each key is quite elaborate..

You could do somthing like:

  deployment.keys =
let
  keyDir = /path/to/dir/with/my/keys;
  keys = builtins.attrNames (lib.filterAttrs (n: v: v ==
"regular" ) (builtins.readDir keyDir));
in with lib; listToAttrs (map (n: nameValuePair n { text =
builtins.readFile (keyDir + ("/" + n)); group = "keys"; permissions =
"0640"; }) keys);

This would upload all files in /path/to/dir/with/my/keys to the
machine in /run/keys. Note I didn't test this, so it might have some
typos, biut hope the idea is clear. It's an adapted piece copied from
something similar we are using.

Cheers,
-- 
Rob Vermaas

[email] rob.verm...@gmail.com
___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


[Nix-commits] [NixOS/nixpkgs] 99cc3f: systemd: Disable stackprotector hardening flag

2016-06-14 Thread Franz Pletz
  Branch: refs/heads/hardened-stdenv
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 99cc3fa6cad876a4bddb0fb33e0835570206f4ea
  
https://github.com/NixOS/nixpkgs/commit/99cc3fa6cad876a4bddb0fb33e0835570206f4ea
  Author: Franz Pletz 
  Date:   2016-06-14 (Tue, 14 Jun 2016)

  Changed paths:
M pkgs/os-specific/linux/systemd/default.nix

  Log Message:
  ---
  systemd: Disable stackprotector hardening flag


___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] [NixOS/nixpkgs] f9e2b4: virtualbox: 5.0.12 -> 5.0.14

2016-06-14 Thread zimbatm
  Branch: refs/heads/release-16.03
  Home:   https://github.com/NixOS/nixpkgs
  Commit: f9e2b4cc15fceddba226c56c5c737e5449eca37f
  
https://github.com/NixOS/nixpkgs/commit/f9e2b4cc15fceddba226c56c5c737e5449eca37f
  Author: Herwig Hochleitner 
  Date:   2016-06-13 (Mon, 13 Jun 2016)

  Changed paths:
M pkgs/applications/virtualization/virtualbox/default.nix
M pkgs/applications/virtualization/virtualbox/guest-additions/default.nix

  Log Message:
  ---
  virtualbox: 5.0.12 -> 5.0.14

(cherry picked from commit bd3ca11e0d5f4652d4b8da094dc77094f5e05e39)


  Commit: 76ebea5f534b7a3cf4fab61d6d8cb4c3acae4080
  
https://github.com/NixOS/nixpkgs/commit/76ebea5f534b7a3cf4fab61d6d8cb4c3acae4080
  Author: Michael Raskin <7c6f4...@mail.ru>
  Date:   2016-06-13 (Mon, 13 Jun 2016)

  Changed paths:
M pkgs/applications/virtualization/virtualbox/default.nix

  Log Message:
  ---
  virtualbox: 5.0.14 -> 5.0.20

(cherry picked from commit 4f5e4ad69c9a4dfb42ebe5ee42d13fa6b5312530)


  Commit: b984ab19aed9239a5cf943c2b29c0f7dac82a958
  
https://github.com/NixOS/nixpkgs/commit/b984ab19aed9239a5cf943c2b29c0f7dac82a958
  Author: Michael Raskin <7c6f4...@mail.ru>
  Date:   2016-06-13 (Mon, 13 Jun 2016)

  Changed paths:
M pkgs/applications/virtualization/virtualbox/guest-additions/default.nix

  Log Message:
  ---
  virtualboxGuestAdditions: update hash for virtualbox 5.0.20

(cherry picked from commit fde921578a8283578fa81cd66af7dbf34978a463)


  Commit: 7d4dcf04d461dae478c261f0731f6df7190ab0ea
  
https://github.com/NixOS/nixpkgs/commit/7d4dcf04d461dae478c261f0731f6df7190ab0ea
  Author: zimbatm 
  Date:   2016-06-13 (Mon, 13 Jun 2016)

  Changed paths:
M pkgs/applications/virtualization/virtualbox/default.nix

  Log Message:
  ---
  virtualbox: give full url for downloading the ext (#15869)

The user only has to agree on the terms and conditions before
downloading the file. We might as well give him access to the full URL
by default.
(cherry picked from commit a6593a16f7aa1de03ed0d4f36e8bfb68c0459df5)


Compare: https://github.com/NixOS/nixpkgs/compare/fd60751ce0c8...7d4dcf04d461___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


Re: [Nix-dev] Setting default group & permissions on deployment.keys

2016-06-14 Thread Tomasz Czyż
https://nixos.org/nixops/manual/#opt-deployment.keys._name_.user

2016-06-14 11:12 GMT+01:00 4levels <4lev...@gmail.com>:

> Hi Rob,
>
> thank you for your swift reply!
> Does this mean I'm actually overriding the default keys behavior as
> defined in https://github.com/NixOS/nixops/blob/master/nix/keys.nix ?
> I was kind of hoping to be able to write something like
>
> deployment.keys.*.group = "keys";
> deployment.keys.*.permissions = "0640";
>
> I'll give it a try and post back here.
>
> Kind regards,
>
> Erik
>
> On Tue, Jun 14, 2016 at 12:06 PM Rob Vermaas 
> wrote:
>
>> Hi Erik,
>>
>> > Is there a way to define a default group and permissions for all keys
>> > without me specifying this for each key individually?
>> > I'm currently well over 200 keys per machine so adding the group and
>> > permissions for each key is quite elaborate..
>>
>> You could do somthing like:
>>
>>   deployment.keys =
>> let
>>   keyDir = /path/to/dir/with/my/keys;
>>   keys = builtins.attrNames (lib.filterAttrs (n: v: v ==
>> "regular" ) (builtins.readDir keyDir));
>> in with lib; listToAttrs (map (n: nameValuePair n { text =
>> builtins.readFile (keyDir + ("/" + n)); group = "keys"; permissions =
>> "0640"; }) keys);
>>
>> This would upload all files in /path/to/dir/with/my/keys to the
>> machine in /run/keys. Note I didn't test this, so it might have some
>> typos, biut hope the idea is clear. It's an adapted piece copied from
>> something similar we are using.
>>
>> Cheers,
>> --
>> Rob Vermaas
>>
>> [email] rob.verm...@gmail.com
>>
>
> ___
> nix-dev mailing list
> nix-dev@lists.science.uu.nl
> http://lists.science.uu.nl/mailman/listinfo/nix-dev
>
>


-- 
Tomasz Czyż
___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


Re: [Nix-dev] Setting default group & permissions on deployment.keys

2016-06-14 Thread 4levels
Hi Tomasz,

it is from that exact same link you posted that I was reading the defaults.
Isn't there any better way to override these defaults?  They are clearly
defined in the file you linked to.

The approach as posted by Rob seems to work but requires that all keys are
stored in a single directory, which are then copied to the /run/keys folder
on the target machine.

Since the deployment of these keys has it's own procedure (other services
need to wait for the keys to be copied completely) I'm currently not sure
if doing it Rob's way will preserve this behavior.

To be continued ;-)

Erik

On Tue, Jun 14, 2016 at 12:17 PM Tomasz Czyż  wrote:

> https://nixos.org/nixops/manual/#opt-deployment.keys._name_.user
>
> 2016-06-14 11:12 GMT+01:00 4levels <4lev...@gmail.com>:
>
>> Hi Rob,
>>
>> thank you for your swift reply!
>> Does this mean I'm actually overriding the default keys behavior as
>> defined in https://github.com/NixOS/nixops/blob/master/nix/keys.nix ?
>> I was kind of hoping to be able to write something like
>>
>> deployment.keys.*.group = "keys";
>> deployment.keys.*.permissions = "0640";
>>
>> I'll give it a try and post back here.
>>
>> Kind regards,
>>
>> Erik
>>
>> On Tue, Jun 14, 2016 at 12:06 PM Rob Vermaas 
>> wrote:
>>
>>> Hi Erik,
>>>
>>> > Is there a way to define a default group and permissions for all keys
>>> > without me specifying this for each key individually?
>>> > I'm currently well over 200 keys per machine so adding the group and
>>> > permissions for each key is quite elaborate..
>>>
>>> You could do somthing like:
>>>
>>>   deployment.keys =
>>> let
>>>   keyDir = /path/to/dir/with/my/keys;
>>>   keys = builtins.attrNames (lib.filterAttrs (n: v: v ==
>>> "regular" ) (builtins.readDir keyDir));
>>> in with lib; listToAttrs (map (n: nameValuePair n { text =
>>> builtins.readFile (keyDir + ("/" + n)); group = "keys"; permissions =
>>> "0640"; }) keys);
>>>
>>> This would upload all files in /path/to/dir/with/my/keys to the
>>> machine in /run/keys. Note I didn't test this, so it might have some
>>> typos, biut hope the idea is clear. It's an adapted piece copied from
>>> something similar we are using.
>>>
>>> Cheers,
>>> --
>>> Rob Vermaas
>>>
>>> [email] rob.verm...@gmail.com
>>>
>>
>> ___
>> nix-dev mailing list
>> nix-dev@lists.science.uu.nl
>> http://lists.science.uu.nl/mailman/listinfo/nix-dev
>>
>>
>
>
> --
> Tomasz Czyż
>
___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


[Nix-commits] [NixOS/nixpkgs] efb519: i2pd: 2.6.0 -> 2.7.0

2016-06-14 Thread José Romildo Malaquias
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: efb519d2f497d693f88dc0f45b75f560446d5243
  
https://github.com/NixOS/nixpkgs/commit/efb519d2f497d693f88dc0f45b75f560446d5243
  Author: Edward Tjörnhammar 
  Date:   2016-06-14 (Tue, 14 Jun 2016)

  Changed paths:
M pkgs/tools/networking/i2pd/default.nix

  Log Message:
  ---
  i2pd: 2.6.0 -> 2.7.0


  Commit: 1f77d3cd09cf1fdc8d06e7616477bf1922fccb66
  
https://github.com/NixOS/nixpkgs/commit/1f77d3cd09cf1fdc8d06e7616477bf1922fccb66
  Author: José Romildo Malaquias 
  Date:   2016-06-14 (Tue, 14 Jun 2016)

  Changed paths:
M pkgs/applications/editors/idea/default.nix

  Log Message:
  ---
  idea.idea-{community,ultimate}: 2016.1.2 -> 2016.1.3

(cherry picked from commit a6fd3e8680ff3da7ddc55c8d8dfd38e17f9fcd1f)


Compare: https://github.com/NixOS/nixpkgs/compare/63b2bf108dec...1f77d3cd09cf___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] [NixOS/nixpkgs] 94627e: tmux: enable multiple outputs

2016-06-14 Thread Luca Bruno
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 94627e658beabf2b4c766d31afa273a55879b46a
  
https://github.com/NixOS/nixpkgs/commit/94627e658beabf2b4c766d31afa273a55879b46a
  Author: Aneesh Agrawal 
  Date:   2016-06-11 (Sat, 11 Jun 2016)

  Changed paths:
M pkgs/tools/misc/tmux/default.nix

  Log Message:
  ---
  tmux: enable multiple outputs


  Commit: 63b2bf108dec1f6ddb8dc871371b7c4fb9ae7004
  
https://github.com/NixOS/nixpkgs/commit/63b2bf108dec1f6ddb8dc871371b7c4fb9ae7004
  Author: Luca Bruno 
  Date:   2016-06-14 (Tue, 14 Jun 2016)

  Changed paths:
M pkgs/tools/misc/tmux/default.nix

  Log Message:
  ---
  Merge pull request #16224 from aneeshusa/enable-multiple-outputs-for-tmux

tmux: enable multiple outputs


Compare: https://github.com/NixOS/nixpkgs/compare/dc3cfbbe0f23...63b2bf108dec___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] [NixOS/nixpkgs] 130b06: grsecurity: 4.5.7-201606080852 -> 4.5.7-2016061109...

2016-06-14 Thread Joachim Fasting
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 130b06eb0b3c2ce9fdcc4b9be36ce77f48a1778d
  
https://github.com/NixOS/nixpkgs/commit/130b06eb0b3c2ce9fdcc4b9be36ce77f48a1778d
  Author: Joachim Fasting 
  Date:   2016-06-14 (Tue, 14 Jun 2016)

  Changed paths:
M pkgs/os-specific/linux/kernel/patches.nix

  Log Message:
  ---
  grsecurity: 4.5.7-201606080852 -> 4.5.7-201606110914


  Commit: d27006b82b11261b4ee11064cb324b8fd6b42fad
  
https://github.com/NixOS/nixpkgs/commit/d27006b82b11261b4ee11064cb324b8fd6b42fad
  Author: Joachim Fasting 
  Date:   2016-06-14 (Tue, 14 Jun 2016)

  Changed paths:
M pkgs/tools/networking/dnscrypt-wrapper/default.nix

  Log Message:
  ---
  dnscrypt-wrapper: 0.2 -> 0.2.1


Compare: https://github.com/NixOS/nixpkgs/compare/39d657ec040f...d27006b82b11___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-dev] Using gradle in netbeans

2016-06-14 Thread moaxcp
Hello, I'm new to nixos and I'm having a problem getting gradle to work in
netbeans. Somewhere along the way gradle has a .so file that cannot link to
libstdc++.so. Is there anything I can do to fix this? Here is the error:

Issue 1


  Requested project: /home/john/NetBeansProjects/awstest

  Stack trace:
org.gradle.tooling.GradleConnectionException: Could not create an
instance of Tooling API implementation using the specified Gradle
distribution 'https://services.gradle.org/distributions/gradle-2.14-bin.zip
'.
at
org.gradle.tooling.internal.consumer.loader.DefaultToolingImplementationLoader.create(DefaultToolingImplementationLoader.java:95)
at
org.gradle.tooling.internal.consumer.loader.CachingToolingImplementationLoader.create(CachingToolingImplementationLoader.java:43)
at
org.gradle.tooling.internal.consumer.loader.SynchronizedToolingImplementationLoader.create(SynchronizedToolingImplementationLoader.java:42)
at
org.gradle.tooling.internal.consumer.connection.LazyConsumerActionExecutor.onStartAction(LazyConsumerActionExecutor.java:99)
at
org.gradle.tooling.internal.consumer.connection.LazyConsumerActionExecutor.run(LazyConsumerActionExecutor.java:82)
at
org.gradle.tooling.internal.consumer.connection.ProgressLoggingConsumerActionExecutor.run(ProgressLoggingConsumerActionExecutor.java:58)
at
org.gradle.tooling.internal.consumer.connection.RethrowingErrorsConsumerActionExecutor.run(RethrowingErrorsConsumerActionExecutor.java:38)
at
org.gradle.tooling.internal.consumer.async.DefaultAsyncConsumerActionExecutor$1$1.run(DefaultAsyncConsumerActionExecutor.java:55)
at
org.gradle.internal.concurrent.ExecutorPolicy$CatchAndRecordFailures.onExecute(ExecutorPolicy.java:54)
at
org.gradle.internal.concurrent.StoppableExecutorImpl$1.run(StoppableExecutorImpl.java:40)
at
java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)
at
java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)
at java.lang.Thread.run(Thread.java:745)
at
org.gradle.tooling.internal.consumer.BlockingResultHandler.getResult(BlockingResultHandler.java:46)
at
org.gradle.tooling.internal.consumer.DefaultModelBuilder.get(DefaultModelBuilder.java:49)
at
org.netbeans.gradle.project.model.GradleModelLoader.loadModelWithProgress(GradleModelLoader.java:558)
at
org.netbeans.gradle.project.model.GradleModelLoader.fixProjectLoadKey(GradleModelLoader.java:362)
at
org.netbeans.gradle.project.model.GradleModelLoader.access$700(GradleModelLoader.java:71)
at
org.netbeans.gradle.project.model.GradleModelLoader$6.run(GradleModelLoader.java:391)
at
org.netbeans.gradle.project.tasks.GradleDaemonManager.runNonBlockingGradleTask(GradleDaemonManager.java:35)
at
org.netbeans.gradle.project.tasks.GradleDaemonManager.access$100(GradleDaemonManager.java:22)
at
org.netbeans.gradle.project.tasks.GradleDaemonManager$2.execute(GradleDaemonManager.java:125)
at
org.jtrim.concurrent.AbstractTaskExecutorService$FunctionWrapper.execute(AbstractTaskExecutorService.java:270)
at
org.jtrim.concurrent.AbstractTaskExecutorService$TaskOfAbstractExecutor.execute(AbstractTaskExecutorService.java:340)
at
org.jtrim.concurrent.Tasks$RunOnceCancelableTask.execute(Tasks.java:342)
at
org.jtrim.concurrent.SingleThreadedExecutor$QueuedItem.runTask(SingleThreadedExecutor.java:919)
at
org.jtrim.concurrent.SingleThreadedExecutor$QueuedItem.access$1200(SingleThreadedExecutor.java:898)
at
org.jtrim.concurrent.SingleThreadedExecutor$Impl$Worker.executeTask(SingleThreadedExecutor.java:815)
at
org.jtrim.concurrent.SingleThreadedExecutor$Impl$Worker.processQueue(SingleThreadedExecutor.java:827)
at
org.jtrim.concurrent.SingleThreadedExecutor$Impl$Worker.run(SingleThreadedExecutor.java:861)
at
org.jtrim.concurrent.SingleThreadedExecutor$Impl$1.run(SingleThreadedExecutor.java:453)
at java.lang.Thread.run(Thread.java:745)
Caused by: net.rubygrapefruit.platform.NativeException: Failed to load
native library 'libnative-platform.so' for Linux amd64.
at
net.rubygrapefruit.platform.internal.NativeLibraryLoader.load(NativeLibraryLoader.java:49)
at net.rubygrapefruit.platform.Native.init(Native.java:55)
at
org.gradle.internal.nativeintegration.services.NativeServices.initialize(NativeServices.java:74)
at
org.gradle.internal.nativeintegration.services.NativeServices.initialize(NativeServices.java:60)
at
org.gradle.tooling.internal.provider.DefaultConnection.initializeServices(DefaultConnection.java:82)
at
org.gradle.tooling.internal.provider.DefaultConnection.configure(DefaultConnection.java:75)
at
org.gradle.tooling.internal.consumer.connection.AbstractPost12ConsumerConnection.configure(AbstractPost12ConsumerConnection.java:37)
at
org.gradle.tooling.internal.consumer.loader.DefaultToolingImplementationLoader.create(DefaultToolingImplementationLoader.java:87)
at

[Nix-commits] [NixOS/nixpkgs] 61431e: lsyncd: removed support for Darwin

2016-06-14 Thread Joachim Fasting
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 61431e239b164b92a16d282dfe0e87147ef4122d
  
https://github.com/NixOS/nixpkgs/commit/61431e239b164b92a16d282dfe0e87147ef4122d
  Author: Bob van der Linden 
  Date:   2016-06-14 (Tue, 14 Jun 2016)

  Changed paths:
M pkgs/applications/networking/sync/lsyncd/default.nix

  Log Message:
  ---
  lsyncd: removed support for Darwin


  Commit: c94f4f85c57dd80e0b88c95d73b93e124cb6d324
  
https://github.com/NixOS/nixpkgs/commit/c94f4f85c57dd80e0b88c95d73b93e124cb6d324
  Author: Joachim Fasting 
  Date:   2016-06-14 (Tue, 14 Jun 2016)

  Changed paths:
M pkgs/applications/networking/sync/lsyncd/default.nix

  Log Message:
  ---
  Merge pull request #16226 from bobvanderlinden/fix-lsyncd

lsyncd: removed support for Darwin


Compare: https://github.com/NixOS/nixpkgs/compare/f04291abe5db...c94f4f85c57d___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] [NixOS/nixpkgs] 06ed23: gcc6: disable format hardening flag

2016-06-14 Thread Robin Gloster
  Branch: refs/heads/hardened-stdenv
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 06ed2353479098d6ecd4ef49f4aeb6315aee3109
  
https://github.com/NixOS/nixpkgs/commit/06ed2353479098d6ecd4ef49f4aeb6315aee3109
  Author: Robin Gloster 
  Date:   2016-06-14 (Tue, 14 Jun 2016)

  Changed paths:
M pkgs/development/compilers/gcc/6/default.nix

  Log Message:
  ---
  gcc6: disable format hardening flag


  Commit: 2fa03127c8cff7d6170a8859b1aa70ba37c7ec48
  
https://github.com/NixOS/nixpkgs/commit/2fa03127c8cff7d6170a8859b1aa70ba37c7ec48
  Author: Robin Gloster 
  Date:   2016-06-14 (Tue, 14 Jun 2016)

  Changed paths:
M pkgs/development/libraries/libdwg/default.nix

  Log Message:
  ---
  libdwg: disable format hardening flag


Compare: https://github.com/NixOS/nixpkgs/compare/99cc3fa6cad8...2fa03127c8cf___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


Re: [Nix-dev] Using gradle in netbeans

2016-06-14 Thread Kamil Chmielewski
Are you using gradlew wrapper? If so, try to remove /home/john/.gradle/,
install gralde from nix or use nix-shell -p gradle and use gradle to build
your project instead of provided ./gradlew.
I don't use Netbeans but there should be some option to use global gradle
instead of gradle wrapper.

--
Kamil


2016-06-14 14:52 GMT+02:00 moaxcp :

> Hello, I'm new to nixos and I'm having a problem getting gradle to work in
> netbeans. Somewhere along the way gradle has a .so file that cannot link to
> libstdc++.so. Is there anything I can do to fix this? Here is the error:
>
> Issue 1
> 
>
>   Requested project: /home/john/NetBeansProjects/awstest
>
>   Stack trace:
> org.gradle.tooling.GradleConnectionException: Could not create an
> instance of Tooling API implementation using the specified Gradle
> distribution '
> https://services.gradle.org/distributions/gradle-2.14-bin.zip'.
> at
> org.gradle.tooling.internal.consumer.loader.DefaultToolingImplementationLoader.create(DefaultToolingImplementationLoader.java:95)
> at
> org.gradle.tooling.internal.consumer.loader.CachingToolingImplementationLoader.create(CachingToolingImplementationLoader.java:43)
> at
> org.gradle.tooling.internal.consumer.loader.SynchronizedToolingImplementationLoader.create(SynchronizedToolingImplementationLoader.java:42)
> at
> org.gradle.tooling.internal.consumer.connection.LazyConsumerActionExecutor.onStartAction(LazyConsumerActionExecutor.java:99)
> at
> org.gradle.tooling.internal.consumer.connection.LazyConsumerActionExecutor.run(LazyConsumerActionExecutor.java:82)
> at
> org.gradle.tooling.internal.consumer.connection.ProgressLoggingConsumerActionExecutor.run(ProgressLoggingConsumerActionExecutor.java:58)
> at
> org.gradle.tooling.internal.consumer.connection.RethrowingErrorsConsumerActionExecutor.run(RethrowingErrorsConsumerActionExecutor.java:38)
> at
> org.gradle.tooling.internal.consumer.async.DefaultAsyncConsumerActionExecutor$1$1.run(DefaultAsyncConsumerActionExecutor.java:55)
> at
> org.gradle.internal.concurrent.ExecutorPolicy$CatchAndRecordFailures.onExecute(ExecutorPolicy.java:54)
> at
> org.gradle.internal.concurrent.StoppableExecutorImpl$1.run(StoppableExecutorImpl.java:40)
> at
> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)
> at
> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)
> at java.lang.Thread.run(Thread.java:745)
> at
> org.gradle.tooling.internal.consumer.BlockingResultHandler.getResult(BlockingResultHandler.java:46)
> at
> org.gradle.tooling.internal.consumer.DefaultModelBuilder.get(DefaultModelBuilder.java:49)
> at
> org.netbeans.gradle.project.model.GradleModelLoader.loadModelWithProgress(GradleModelLoader.java:558)
> at
> org.netbeans.gradle.project.model.GradleModelLoader.fixProjectLoadKey(GradleModelLoader.java:362)
> at
> org.netbeans.gradle.project.model.GradleModelLoader.access$700(GradleModelLoader.java:71)
> at
> org.netbeans.gradle.project.model.GradleModelLoader$6.run(GradleModelLoader.java:391)
> at
> org.netbeans.gradle.project.tasks.GradleDaemonManager.runNonBlockingGradleTask(GradleDaemonManager.java:35)
> at
> org.netbeans.gradle.project.tasks.GradleDaemonManager.access$100(GradleDaemonManager.java:22)
> at
> org.netbeans.gradle.project.tasks.GradleDaemonManager$2.execute(GradleDaemonManager.java:125)
> at
> org.jtrim.concurrent.AbstractTaskExecutorService$FunctionWrapper.execute(AbstractTaskExecutorService.java:270)
> at
> org.jtrim.concurrent.AbstractTaskExecutorService$TaskOfAbstractExecutor.execute(AbstractTaskExecutorService.java:340)
> at
> org.jtrim.concurrent.Tasks$RunOnceCancelableTask.execute(Tasks.java:342)
> at
> org.jtrim.concurrent.SingleThreadedExecutor$QueuedItem.runTask(SingleThreadedExecutor.java:919)
> at
> org.jtrim.concurrent.SingleThreadedExecutor$QueuedItem.access$1200(SingleThreadedExecutor.java:898)
> at
> org.jtrim.concurrent.SingleThreadedExecutor$Impl$Worker.executeTask(SingleThreadedExecutor.java:815)
> at
> org.jtrim.concurrent.SingleThreadedExecutor$Impl$Worker.processQueue(SingleThreadedExecutor.java:827)
> at
> org.jtrim.concurrent.SingleThreadedExecutor$Impl$Worker.run(SingleThreadedExecutor.java:861)
> at
> org.jtrim.concurrent.SingleThreadedExecutor$Impl$1.run(SingleThreadedExecutor.java:453)
> at java.lang.Thread.run(Thread.java:745)
> Caused by: net.rubygrapefruit.platform.NativeException: Failed to load
> native library 'libnative-platform.so' for Linux amd64.
> at
> net.rubygrapefruit.platform.internal.NativeLibraryLoader.load(NativeLibraryLoader.java:49)
> at net.rubygrapefruit.platform.Native.init(Native.java:55)
> at
> org.gradle.internal.nativeintegration.services.NativeServices.initialize(NativeServices.java:74)
> at
> 

Re: [Nix-dev] Setting default group & permissions on deployment.keys

2016-06-14 Thread 4levels
Hi Tomasz,

I'm definitely going to look into mkDefault as that sounds exactly like
what I need ;-)

Thanks for the pointer!

Erik aka 4levels

On Tue, Jun 14, 2016 at 1:21 PM Tomasz Czyż  wrote:

> Hey Erik,
>
> oh ok, I see.
> Another way you could try, you can write a function to make a key
> description.
>
> let
>   make-my-key = {text, group}: {user="root", text=text, group=group,
> permissions="640"}
> in
>
>
> and then
>
>   deployment.keys.my-key = make-my-key {group="nginx"; text="secret";};
>
> There is also "mkDefault" function in nix but I don't know how to apply
> this correctly in this case.
>
> 2016-06-14 11:28 GMT+01:00 4levels <4lev...@gmail.com>:
>
>> Hi Tomasz,
>>
>> it is from that exact same link you posted that I was reading the
>> defaults.
>> Isn't there any better way to override these defaults?  They are clearly
>> defined in the file you linked to.
>>
>> The approach as posted by Rob seems to work but requires that all keys
>> are stored in a single directory, which are then copied to the /run/keys
>> folder on the target machine.
>>
>> Since the deployment of these keys has it's own procedure (other services
>> need to wait for the keys to be copied completely) I'm currently not sure
>> if doing it Rob's way will preserve this behavior.
>>
>> To be continued ;-)
>>
>> Erik
>>
>> On Tue, Jun 14, 2016 at 12:17 PM Tomasz Czyż 
>> wrote:
>>
>>> https://nixos.org/nixops/manual/#opt-deployment.keys._name_.user
>>>
>>> 2016-06-14 11:12 GMT+01:00 4levels <4lev...@gmail.com>:
>>>
 Hi Rob,

 thank you for your swift reply!
 Does this mean I'm actually overriding the default keys behavior as
 defined in https://github.com/NixOS/nixops/blob/master/nix/keys.nix ?
 I was kind of hoping to be able to write something like

 deployment.keys.*.group = "keys";
 deployment.keys.*.permissions = "0640";

 I'll give it a try and post back here.

 Kind regards,

 Erik

 On Tue, Jun 14, 2016 at 12:06 PM Rob Vermaas 
 wrote:

> Hi Erik,
>
> > Is there a way to define a default group and permissions for all keys
> > without me specifying this for each key individually?
> > I'm currently well over 200 keys per machine so adding the group and
> > permissions for each key is quite elaborate..
>
> You could do somthing like:
>
>   deployment.keys =
> let
>   keyDir = /path/to/dir/with/my/keys;
>   keys = builtins.attrNames (lib.filterAttrs (n: v: v ==
> "regular" ) (builtins.readDir keyDir));
> in with lib; listToAttrs (map (n: nameValuePair n { text =
> builtins.readFile (keyDir + ("/" + n)); group = "keys"; permissions =
> "0640"; }) keys);
>
> This would upload all files in /path/to/dir/with/my/keys to the
> machine in /run/keys. Note I didn't test this, so it might have some
> typos, biut hope the idea is clear. It's an adapted piece copied from
> something similar we are using.
>
> Cheers,
> --
> Rob Vermaas
>
> [email] rob.verm...@gmail.com
>

 ___
 nix-dev mailing list
 nix-dev@lists.science.uu.nl
 http://lists.science.uu.nl/mailman/listinfo/nix-dev


>>>
>>>
>>> --
>>> Tomasz Czyż
>>>
>>
>
>
> --
> Tomasz Czyż
>
___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


[Nix-commits] [NixOS/nixpkgs] 437ea9: Fixes #16181 - using bin output for Go services

2016-06-14 Thread Arseniy Seroka
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 437ea9fd370f85451801ae5904a364175ce4eef8
  
https://github.com/NixOS/nixpkgs/commit/437ea9fd370f85451801ae5904a364175ce4eef8
  Author: Kamil Chmielewski 
  Date:   2016-06-13 (Mon, 13 Jun 2016)

  Changed paths:
M nixos/modules/services/misc/confd.nix
M nixos/modules/services/misc/etcd.nix
M nixos/modules/services/monitoring/bosun.nix
M nixos/modules/services/monitoring/grafana.nix
M nixos/modules/services/monitoring/scollector.nix
M nixos/modules/services/networking/consul.nix
M nixos/modules/services/networking/skydns.nix
M nixos/modules/services/security/hologram.nix
M nixos/modules/services/security/oauth2_proxy.nix

  Log Message:
  ---
  Fixes #16181 - using bin output for Go services


  Commit: 186a6a207d4a34180569162f3bdf4ec309c9d00c
  
https://github.com/NixOS/nixpkgs/commit/186a6a207d4a34180569162f3bdf4ec309c9d00c
  Author: Arseniy Seroka 
  Date:   2016-06-14 (Tue, 14 Jun 2016)

  Changed paths:
M nixos/modules/services/misc/confd.nix
M nixos/modules/services/misc/etcd.nix
M nixos/modules/services/monitoring/bosun.nix
M nixos/modules/services/monitoring/grafana.nix
M nixos/modules/services/monitoring/scollector.nix
M nixos/modules/services/networking/consul.nix
M nixos/modules/services/networking/skydns.nix
M nixos/modules/services/security/hologram.nix
M nixos/modules/services/security/oauth2_proxy.nix

  Log Message:
  ---
  Merge pull request #16222 from kamilchm/rework-go

Fixes #16181 - using bin output for Go services


Compare: https://github.com/NixOS/nixpkgs/compare/c94f4f85c57d...186a6a207d4a___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] [NixOS/nix] 202683: Use O_CLOEXEC in most places

2016-06-14 Thread Eelco Dolstra
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nix
  Commit: 202683a4fc148dc228de226e9980a3f27754b854
  
https://github.com/NixOS/nix/commit/202683a4fc148dc228de226e9980a3f27754b854
  Author: Eelco Dolstra 
  Date:   2016-06-09 (Thu, 09 Jun 2016)

  Changed paths:
M configure.ac
M src/libstore/build.cc
M src/libstore/gc.cc
M src/libstore/local-store.cc
M src/libstore/pathlocks.cc
M src/libstore/remote-store.cc
M src/libutil/archive.cc
M src/libutil/hash.cc
M src/libutil/util.cc

  Log Message:
  ---
  Use O_CLOEXEC in most places


  Commit: c68e5913c71badc89ff346d1c6948517ba720c93
  
https://github.com/NixOS/nix/commit/c68e5913c71badc89ff346d1c6948517ba720c93
  Author: Eelco Dolstra 
  Date:   2016-06-09 (Thu, 09 Jun 2016)

  Changed paths:
M src/libstore/build.cc

  Log Message:
  ---
  Run builds in a user namespace

This way, all builds appear to have a uid/gid of 0 inside the
chroot. In the future, this may allow using programs like
systemd-nspawn inside builds, but that will require assigning a larger
UID/GID map to the build.

Issue #625.


Compare: https://github.com/NixOS/nix/compare/9bdd949cfdc9...c68e5913c71b___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


Re: [Nix-dev] Using gradle in netbeans

2016-06-14 Thread moaxcp
I was actually trying to use sdkman to set up my environment. I can see in
the nixpkgs where the .so file gets patched with the correct library paths.

I'm going to use nix to set it up now and try to upgrade to version 2.14.

Could this be a bug in the way native libraries are resolved in gradle?
On Jun 14, 2016 9:13 AM, "Kamil Chmielewski"  wrote:

> Are you using gradlew wrapper? If so, try to remove /home/john/.gradle/,
> install gralde from nix or use nix-shell -p gradle and use gradle to build
> your project instead of provided ./gradlew.
> I don't use Netbeans but there should be some option to use global gradle
> instead of gradle wrapper.
>
> --
> Kamil
>
>
> 2016-06-14 14:52 GMT+02:00 moaxcp :
>
>> Hello, I'm new to nixos and I'm having a problem getting gradle to work
>> in netbeans. Somewhere along the way gradle has a .so file that cannot link
>> to libstdc++.so. Is there anything I can do to fix this? Here is the error:
>>
>> Issue 1
>> 
>>
>>   Requested project: /home/john/NetBeansProjects/awstest
>>
>>   Stack trace:
>> org.gradle.tooling.GradleConnectionException: Could not create an
>> instance of Tooling API implementation using the specified Gradle
>> distribution '
>> https://services.gradle.org/distributions/gradle-2.14-bin.zip'.
>> at
>> org.gradle.tooling.internal.consumer.loader.DefaultToolingImplementationLoader.create(DefaultToolingImplementationLoader.java:95)
>> at
>> org.gradle.tooling.internal.consumer.loader.CachingToolingImplementationLoader.create(CachingToolingImplementationLoader.java:43)
>> at
>> org.gradle.tooling.internal.consumer.loader.SynchronizedToolingImplementationLoader.create(SynchronizedToolingImplementationLoader.java:42)
>> at
>> org.gradle.tooling.internal.consumer.connection.LazyConsumerActionExecutor.onStartAction(LazyConsumerActionExecutor.java:99)
>> at
>> org.gradle.tooling.internal.consumer.connection.LazyConsumerActionExecutor.run(LazyConsumerActionExecutor.java:82)
>> at
>> org.gradle.tooling.internal.consumer.connection.ProgressLoggingConsumerActionExecutor.run(ProgressLoggingConsumerActionExecutor.java:58)
>> at
>> org.gradle.tooling.internal.consumer.connection.RethrowingErrorsConsumerActionExecutor.run(RethrowingErrorsConsumerActionExecutor.java:38)
>> at
>> org.gradle.tooling.internal.consumer.async.DefaultAsyncConsumerActionExecutor$1$1.run(DefaultAsyncConsumerActionExecutor.java:55)
>> at
>> org.gradle.internal.concurrent.ExecutorPolicy$CatchAndRecordFailures.onExecute(ExecutorPolicy.java:54)
>> at
>> org.gradle.internal.concurrent.StoppableExecutorImpl$1.run(StoppableExecutorImpl.java:40)
>> at
>> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)
>> at
>> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)
>> at java.lang.Thread.run(Thread.java:745)
>> at
>> org.gradle.tooling.internal.consumer.BlockingResultHandler.getResult(BlockingResultHandler.java:46)
>> at
>> org.gradle.tooling.internal.consumer.DefaultModelBuilder.get(DefaultModelBuilder.java:49)
>> at
>> org.netbeans.gradle.project.model.GradleModelLoader.loadModelWithProgress(GradleModelLoader.java:558)
>> at
>> org.netbeans.gradle.project.model.GradleModelLoader.fixProjectLoadKey(GradleModelLoader.java:362)
>> at
>> org.netbeans.gradle.project.model.GradleModelLoader.access$700(GradleModelLoader.java:71)
>> at
>> org.netbeans.gradle.project.model.GradleModelLoader$6.run(GradleModelLoader.java:391)
>> at
>> org.netbeans.gradle.project.tasks.GradleDaemonManager.runNonBlockingGradleTask(GradleDaemonManager.java:35)
>> at
>> org.netbeans.gradle.project.tasks.GradleDaemonManager.access$100(GradleDaemonManager.java:22)
>> at
>> org.netbeans.gradle.project.tasks.GradleDaemonManager$2.execute(GradleDaemonManager.java:125)
>> at
>> org.jtrim.concurrent.AbstractTaskExecutorService$FunctionWrapper.execute(AbstractTaskExecutorService.java:270)
>> at
>> org.jtrim.concurrent.AbstractTaskExecutorService$TaskOfAbstractExecutor.execute(AbstractTaskExecutorService.java:340)
>> at
>> org.jtrim.concurrent.Tasks$RunOnceCancelableTask.execute(Tasks.java:342)
>> at
>> org.jtrim.concurrent.SingleThreadedExecutor$QueuedItem.runTask(SingleThreadedExecutor.java:919)
>> at
>> org.jtrim.concurrent.SingleThreadedExecutor$QueuedItem.access$1200(SingleThreadedExecutor.java:898)
>> at
>> org.jtrim.concurrent.SingleThreadedExecutor$Impl$Worker.executeTask(SingleThreadedExecutor.java:815)
>> at
>> org.jtrim.concurrent.SingleThreadedExecutor$Impl$Worker.processQueue(SingleThreadedExecutor.java:827)
>> at
>> org.jtrim.concurrent.SingleThreadedExecutor$Impl$Worker.run(SingleThreadedExecutor.java:861)
>> at
>> org.jtrim.concurrent.SingleThreadedExecutor$Impl$1.run(SingleThreadedExecutor.java:453)
>> at java.lang.Thread.run(Thread.java:745)
>> Caused by: 

Re: [Nix-dev] Persistent NixOps keys

2016-06-14 Thread 4levels
Hi,

I tried this but somehow the nixops-load-keys service is not automatically
started. I can see the service with systemctl status and when I restart it,
it does as expected (copies the files from /run/keys to /root/keys.
However, when I reboot the machine, the nixops-load-keys service doesn't
seem to do this automatically.  Only after running systemctl restart
nixops-load-keys it copies the files back to /run/store.
When I delete /root/keys/* and do a reboot, the keys aren't copied either.
There must be something wrong with my before and after statements I guess
since both services do work when started manually.  I'm probably
overlooking something obvious here..

I modified your script a little as follows:

let



keyStore = "/root/keys";
keyRun = "/run/keys";

keyLoad = pkgs.writeScript "nixops-load-keys" ''
  #!${pkgs.bash}/bin/bash
  set -euo pipefail
  if [ -e '${keyStore}/done' ] && [ ! -e '${keyRun}/done' ]; then
cd '${keyStore}'
cp -pf -- ${lib.concatMapStringsSep " " (k: "'${k}'")
(builtins.attrNames config.deployment.keys)} \
  '${keyRun}/' || exit 0
touch -r '${keyStore}/done' '${keyRun}/done'
  fi
'';

keySave = pkgs.writeScript "nixops-save-keys" ''
  #!${pkgs.bash}/bin/bash
  set -euo pipefail
  while true; do
if [ -e '${keyRun}/done' ]; then
  if [ ! -e '${keyStore}/done' ] || [ '${keyRun}/done' -nt
'${keyStore}/done' ] ; then
rm -rf '${keyStore}'
mkdir -p '${keyStore}'
chown --reference='${keyRun}' -- '${keyStore}'
chmod --reference='${keyRun}' -- '${keyStore}'
cd '${keyRun}'
cp -pf -- ${concatMapStringsSep " " (k: "'${k}'") (attrNames
config.deployment.keys)} '${keyStore}/' || continue
touch -r '${keyRun}/done' '${keyStore}/done'
touch -r '${keyRun}' '${keyStore}'
  fi
fi
sleep 1m
  done
'';

   

in



systemd.services.nixops-load-keys = {
  description = "Re-load nixops keys after reboot";
  before = [ "nixops-keys.service" ];
  wantedBy = [ "keys.target" ];
  unitConfig.RequiresMountsFor = [ keyRun keyStore ];
  serviceConfig = {
ExecStart = keyLoad;
Type = "oneshot";
RemainAfterExit = false;
  };
};

systemd.services.nixops-save-keys = {
  description = "Save nixops keys to re-load after reboot";
  after = [ "keys.target" ];
  wantedBy = [ "keys.target" ];
  serviceConfig = {
ExecStart = keySave;
Restart = "always";
  };
};



Kind regards,

Erik

On Mon, May 9, 2016 at 7:51 PM Игорь Пашев  wrote:

> 2016-05-09 13:49 GMT+03:00 Tomasz Czyż :
> > I'm not sure I understand this correctly. Do you want to put keys into
> the
> > initrd?
>
>
> No, I keep them under /root/keys. The save service polls /run/keys for
> updates.
> ___
> nix-dev mailing list
> nix-dev@lists.science.uu.nl
> http://lists.science.uu.nl/mailman/listinfo/nix-dev
>
___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


[Nix-dev] hydra and nixos versions/commits at hydra.nixos.org

2016-06-14 Thread Tomas Hlavaty
Hi,

does somebody know, what hydra and nixos versions/commits are deployed
at hydra.nixos.org?

I am running hydra with nixos 15.09 and hydra
993647d1e3b43f1f9b7dc2ebce889b475d156bb9 but I would like to upgrade my
local hydra machine to nixos 16.03.

I can see that the last successful hydra build was

  1258008 2016-04-15 hydraSrc → 177bf25
  at https://hydra.nixos.org/jobset/hydra/master/evals?page=2

but it would be nice to know what is actually used.

Even better would be, if I could somehow find it out somewhere publicly
accessible without having to ask each time.

What is the status of the official hydra releases?

Thank you,

Tomas
___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


[Nix-commits] [NixOS/nixpkgs] 93912d: Adding nvenc support to ffmpeg (default off)

2016-06-14 Thread Lluís Batlle i Rossell
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 93912d99d23fa964d4dadcda9a90c8fbe7bb1faa
  
https://github.com/NixOS/nixpkgs/commit/93912d99d23fa964d4dadcda9a90c8fbe7bb1faa
  Author: Lluís Batlle i Rossell 
  Date:   2016-06-14 (Tue, 14 Jun 2016)

  Changed paths:
M pkgs/development/libraries/ffmpeg-full/default.nix
A pkgs/development/libraries/nvidia-video-sdk/default.nix
M pkgs/top-level/all-packages.nix

  Log Message:
  ---
  Adding nvenc support to ffmpeg (default off)

I add the nvidia-video-sdk header files, required to make it work.

You have to set nvenct=true to ffmpeg-full and nonfreeLicensing=true to
ffmpeg-full to use this.


___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] [NixOS/nixpkgs] 156a14: geolite-legacy: 2016-06-08 -> 2016-06-13

2016-06-14 Thread Tobias Geerinckx-Rice
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 156a14d15370eebc64f886a1c2bef4a45ad795c6
  
https://github.com/NixOS/nixpkgs/commit/156a14d15370eebc64f886a1c2bef4a45ad795c6
  Author: Tobias Geerinckx-Rice 
  Date:   2016-06-14 (Tue, 14 Jun 2016)

  Changed paths:
M pkgs/data/misc/geolite-legacy/default.nix

  Log Message:
  ---
  geolite-legacy: 2016-06-08 -> 2016-06-13


  Commit: 9f996d6406d7be49208c136da74e748290ae9c93
  
https://github.com/NixOS/nixpkgs/commit/9f996d6406d7be49208c136da74e748290ae9c93
  Author: Tobias Geerinckx-Rice 
  Date:   2016-06-14 (Tue, 14 Jun 2016)

  Changed paths:
M pkgs/data/misc/tzdata/default.nix

  Log Message:
  ---
  tzdata: 2016d -> 2016e


Compare: https://github.com/NixOS/nixpkgs/compare/93912d99d23f...9f996d6406d7___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


Re: [Nix-dev] Using gradle in netbeans

2016-06-14 Thread moaxcp
Ok I added gradle to my configuration.nix and now it looks like i lost X.
It boots into the console. In the console startx cannot be found. I tried

nix-store -q --references /var/run/current-system/sw | cut -d'-' -f2- |
grep xorg

Which returns

xorg-server-1.18.3

On the old configuration it is

xorg-server-1.17.4

nixos-version is 16.09pre84674.fbde3a7 (Flounder)

On Jun 14, 2016 10:10 AM, "moaxcp"  wrote:

> I was actually trying to use sdkman to set up my environment. I can see in
> the nixpkgs where the .so file gets patched with the correct library paths.
>
> I'm going to use nix to set it up now and try to upgrade to version 2.14.
>
> Could this be a bug in the way native libraries are resolved in gradle?
> On Jun 14, 2016 9:13 AM, "Kamil Chmielewski"  wrote:
>
>> Are you using gradlew wrapper? If so, try to remove /home/john/.gradle/,
>> install gralde from nix or use nix-shell -p gradle and use gradle to build
>> your project instead of provided ./gradlew.
>> I don't use Netbeans but there should be some option to use global gradle
>> instead of gradle wrapper.
>>
>> --
>> Kamil
>>
>>
>> 2016-06-14 14:52 GMT+02:00 moaxcp :
>>
>>> Hello, I'm new to nixos and I'm having a problem getting gradle to work
>>> in netbeans. Somewhere along the way gradle has a .so file that cannot link
>>> to libstdc++.so. Is there anything I can do to fix this? Here is the error:
>>>
>>> Issue 1
>>> 
>>>
>>>   Requested project: /home/john/NetBeansProjects/awstest
>>>
>>>   Stack trace:
>>> org.gradle.tooling.GradleConnectionException: Could not create an
>>> instance of Tooling API implementation using the specified Gradle
>>> distribution '
>>> https://services.gradle.org/distributions/gradle-2.14-bin.zip'.
>>> at
>>> org.gradle.tooling.internal.consumer.loader.DefaultToolingImplementationLoader.create(DefaultToolingImplementationLoader.java:95)
>>> at
>>> org.gradle.tooling.internal.consumer.loader.CachingToolingImplementationLoader.create(CachingToolingImplementationLoader.java:43)
>>> at
>>> org.gradle.tooling.internal.consumer.loader.SynchronizedToolingImplementationLoader.create(SynchronizedToolingImplementationLoader.java:42)
>>> at
>>> org.gradle.tooling.internal.consumer.connection.LazyConsumerActionExecutor.onStartAction(LazyConsumerActionExecutor.java:99)
>>> at
>>> org.gradle.tooling.internal.consumer.connection.LazyConsumerActionExecutor.run(LazyConsumerActionExecutor.java:82)
>>> at
>>> org.gradle.tooling.internal.consumer.connection.ProgressLoggingConsumerActionExecutor.run(ProgressLoggingConsumerActionExecutor.java:58)
>>> at
>>> org.gradle.tooling.internal.consumer.connection.RethrowingErrorsConsumerActionExecutor.run(RethrowingErrorsConsumerActionExecutor.java:38)
>>> at
>>> org.gradle.tooling.internal.consumer.async.DefaultAsyncConsumerActionExecutor$1$1.run(DefaultAsyncConsumerActionExecutor.java:55)
>>> at
>>> org.gradle.internal.concurrent.ExecutorPolicy$CatchAndRecordFailures.onExecute(ExecutorPolicy.java:54)
>>> at
>>> org.gradle.internal.concurrent.StoppableExecutorImpl$1.run(StoppableExecutorImpl.java:40)
>>> at
>>> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)
>>> at
>>> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)
>>> at java.lang.Thread.run(Thread.java:745)
>>> at
>>> org.gradle.tooling.internal.consumer.BlockingResultHandler.getResult(BlockingResultHandler.java:46)
>>> at
>>> org.gradle.tooling.internal.consumer.DefaultModelBuilder.get(DefaultModelBuilder.java:49)
>>> at
>>> org.netbeans.gradle.project.model.GradleModelLoader.loadModelWithProgress(GradleModelLoader.java:558)
>>> at
>>> org.netbeans.gradle.project.model.GradleModelLoader.fixProjectLoadKey(GradleModelLoader.java:362)
>>> at
>>> org.netbeans.gradle.project.model.GradleModelLoader.access$700(GradleModelLoader.java:71)
>>> at
>>> org.netbeans.gradle.project.model.GradleModelLoader$6.run(GradleModelLoader.java:391)
>>> at
>>> org.netbeans.gradle.project.tasks.GradleDaemonManager.runNonBlockingGradleTask(GradleDaemonManager.java:35)
>>> at
>>> org.netbeans.gradle.project.tasks.GradleDaemonManager.access$100(GradleDaemonManager.java:22)
>>> at
>>> org.netbeans.gradle.project.tasks.GradleDaemonManager$2.execute(GradleDaemonManager.java:125)
>>> at
>>> org.jtrim.concurrent.AbstractTaskExecutorService$FunctionWrapper.execute(AbstractTaskExecutorService.java:270)
>>> at
>>> org.jtrim.concurrent.AbstractTaskExecutorService$TaskOfAbstractExecutor.execute(AbstractTaskExecutorService.java:340)
>>> at
>>> org.jtrim.concurrent.Tasks$RunOnceCancelableTask.execute(Tasks.java:342)
>>> at
>>> org.jtrim.concurrent.SingleThreadedExecutor$QueuedItem.runTask(SingleThreadedExecutor.java:919)
>>> at
>>> org.jtrim.concurrent.SingleThreadedExecutor$QueuedItem.access$1200(SingleThreadedExecutor.java:898)
>>>   

[Nix-commits] [NixOS/nixpkgs] 2f430d: geolite-legacy: 2016-06-08 -> 2016-06-13

2016-06-14 Thread Tobias Geerinckx-Rice
  Branch: refs/heads/release-16.03
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 2f430d2eaee8bf72a5081e42f0d2c6e46e1804d7
  
https://github.com/NixOS/nixpkgs/commit/2f430d2eaee8bf72a5081e42f0d2c6e46e1804d7
  Author: Tobias Geerinckx-Rice 
  Date:   2016-06-14 (Tue, 14 Jun 2016)

  Changed paths:
M pkgs/data/misc/geolite-legacy/default.nix

  Log Message:
  ---
  geolite-legacy: 2016-06-08 -> 2016-06-13

(cherry picked from commit 156a14d15370eebc64f886a1c2bef4a45ad795c6)


  Commit: 2f1174b6d0959dee542b6e76c2ca88232dffc7af
  
https://github.com/NixOS/nixpkgs/commit/2f1174b6d0959dee542b6e76c2ca88232dffc7af
  Author: Tobias Geerinckx-Rice 
  Date:   2016-06-14 (Tue, 14 Jun 2016)

  Changed paths:
M pkgs/data/misc/tzdata/default.nix

  Log Message:
  ---
  tzdata: 2015g -> 2016e


Compare: https://github.com/NixOS/nixpkgs/compare/7d4dcf04d461...2f1174b6d095___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] [NixOS/nixpkgs] ee0684: perl-Math-BigInt: 1.999722 -> 1.999723

2016-06-14 Thread Robert Helgesson
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: ee0684fa1e3ab78b4c91e0b7240eae329ee26efb
  
https://github.com/NixOS/nixpkgs/commit/ee0684fa1e3ab78b4c91e0b7240eae329ee26efb
  Author: Robert Helgesson 
  Date:   2016-06-14 (Tue, 14 Jun 2016)

  Changed paths:
M pkgs/top-level/perl-packages.nix

  Log Message:
  ---
  perl-Math-BigInt: 1.999722 -> 1.999723


  Commit: 3d1eea2225485576a4b6fe5e514ac5bf3c6b7d99
  
https://github.com/NixOS/nixpkgs/commit/3d1eea2225485576a4b6fe5e514ac5bf3c6b7d99
  Author: Robert Helgesson 
  Date:   2016-06-14 (Tue, 14 Jun 2016)

  Changed paths:
M pkgs/top-level/perl-packages.nix

  Log Message:
  ---
  perl-CryptX: 0.035 -> 0.036


  Commit: 2968db5b7b4deca5d8ce7b543ec160c9843c3fc1
  
https://github.com/NixOS/nixpkgs/commit/2968db5b7b4deca5d8ce7b543ec160c9843c3fc1
  Author: Robert Helgesson 
  Date:   2016-06-14 (Tue, 14 Jun 2016)

  Changed paths:
M pkgs/top-level/perl-packages.nix

  Log Message:
  ---
  perl-Crypt-JWT: 0.011 -> 0.017


  Commit: 4a69b81213dbe407a36eb402b91368adeb77bf6e
  
https://github.com/NixOS/nixpkgs/commit/4a69b81213dbe407a36eb402b91368adeb77bf6e
  Author: Robert Helgesson 
  Date:   2016-06-14 (Tue, 14 Jun 2016)

  Changed paths:
M pkgs/top-level/perl-packages.nix

  Log Message:
  ---
  perl-Readonly: 2.04 -> 2.05


  Commit: b0e02cecb676204ef07ed1da6f693726a94bcd98
  
https://github.com/NixOS/nixpkgs/commit/b0e02cecb676204ef07ed1da6f693726a94bcd98
  Author: Robert Helgesson 
  Date:   2016-06-14 (Tue, 14 Jun 2016)

  Changed paths:
M pkgs/top-level/perl-packages.nix

  Log Message:
  ---
  perl-PDF-API2: 2.027 -> 2.028


  Commit: 34ebc3c0858f9473630f0f134a542e55f97667ae
  
https://github.com/NixOS/nixpkgs/commit/34ebc3c0858f9473630f0f134a542e55f97667ae
  Author: Robert Helgesson 
  Date:   2016-06-14 (Tue, 14 Jun 2016)

  Changed paths:
M pkgs/top-level/perl-packages.nix

  Log Message:
  ---
  perl-CGI: 4.28 -> 4.31


Compare: https://github.com/NixOS/nixpkgs/compare/9f996d6406d7...34ebc3c0858f___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] [NixOS/nixpkgs] 060275: vimPlugins: update 2016-06-15

2016-06-14 Thread Arseniy Seroka
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 06027595fcf802f2b8a8fc5bf29111d1ffac5c48
  
https://github.com/NixOS/nixpkgs/commit/06027595fcf802f2b8a8fc5bf29111d1ffac5c48
  Author: Arseniy Seroka 
  Date:   2016-06-15 (Wed, 15 Jun 2016)

  Changed paths:
M pkgs/misc/vim-plugins/default.nix

  Log Message:
  ---
  vimPlugins: update 2016-06-15


___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-commits] [NixOS/nixpkgs] c44354: lizardfs: init at 3.9.4

2016-06-14 Thread Rushmore Mushambi
  Branch: refs/heads/master
  Home:   https://github.com/NixOS/nixpkgs
  Commit: c4435493aa203e9053fbd83a7690fcda70647250
  
https://github.com/NixOS/nixpkgs/commit/c4435493aa203e9053fbd83a7690fcda70647250
  Author: rushmorem 
  Date:   2016-06-15 (Wed, 15 Jun 2016)

  Changed paths:
A pkgs/tools/filesystems/lizardfs/check-includes.patch
A pkgs/tools/filesystems/lizardfs/default.nix
M pkgs/top-level/all-packages.nix

  Log Message:
  ---
  lizardfs: init at 3.9.4

LizardFS is a highly reliable, scalable and efficient distributed file
system.


  Commit: 48de566e545c93f12052419a16914c8e887c21e4
  
https://github.com/NixOS/nixpkgs/commit/48de566e545c93f12052419a16914c8e887c21e4
  Author: Rushmore Mushambi 
  Date:   2016-06-15 (Wed, 15 Jun 2016)

  Changed paths:
A pkgs/tools/filesystems/lizardfs/check-includes.patch
A pkgs/tools/filesystems/lizardfs/default.nix
M pkgs/top-level/all-packages.nix

  Log Message:
  ---
  Merge pull request #16231 from rushmorem/lizardfs

lizardfs: init at 3.9.4


Compare: https://github.com/NixOS/nixpkgs/compare/06027595fcf8...48de566e545c___
nix-commits mailing list
nix-comm...@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-commits


[Nix-dev] When creating a bridge interface, the bridge doesn't appear

2016-06-14 Thread Matthew Robbetts
Hi list,

(I filed an issue at GitHub (https://github.com/NixOS/nixpkgs/issues/16230 
), but realized that since it’s 
probably a PEBKAC issue, the mailing list might be more suitable. Sorry for the 
cross-post!)


I am configuring a new nixOS system. My machine has two ethernet interfaces 
(enp3s0 and enp4s0) and one wireless interface (wlp5s0). I want to bridge the 
wireless with one of the ethernets, so in my configuration.nix I add:

networking = {
...
bridges.br0.interfaces = [ "enp4s0" "wlp5s0" ];
...
and run nixos-rebuild switch.

I observe in the output that, among other things, a
/nix/store/z18i1q0r4i2bn0vkpcz45d10nn0628nf-unit-br0-netdev.service/br0-netdev.service
is created. However, ifconfig does not show the new bridge interface.

If I manually run:
systemctl start br0-netdev.service

the bridge interface appears.

Probably I am doing something wrong, but I would have expected the bridge to 
appear immediately as a result of nixos-rebuild switch.

Anyone have an opinion?


Thanks,
Matt___
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev