Hi.
On 06/23/2015 06:37 PM, Adrien Devresse wrote:
Would this work as a non-root user ?
No, you need to be root to do chroot builds.
This is unfortunately a problem: Nix is advertised to work in non-root
environment and is used as this.
You have common situations where root access is
Ideally, libnss_sss should be part of stdenv.
That's not going to happen because there are any number of NSS modules that we
can't possibly all add to stdenv.
Indeed, I was not thinking about making it part of stdenv by default.
What about enrich stdenv ( through config.nix or
Hi,
On 23/06/15 14:50, Adrien Devresse wrote:
If possible, you could also enable chroot builds. It might be possible to
override /etc/nsswitch.conf in the chroot by setting the Nix option
build-chroot-dirs = /etc/nsswitch.conf=/path/to/my-nsswitch.conf (where
my-nsswitch.conf doesn't contain
Would this work as a non-root user ?
No, you need to be root to do chroot builds.
This is unfortunately a problem: Nix is advertised to work in non-root
environment and is used as this.
You have common situations where root access is just not possible.
A Linux cluster configured with LDAP (
(back on this problem)
Ah, sorry, I'm not really familiar with nss. Does the libnss_sss
version have to match what's installed system-wide, rather than e.g.
being a build input?
I would say no.
It need to be verified but it is very likely that any libnss_sss version
able to connect on the sss
Hi,
On 23/06/15 11:47, Adrien Devresse wrote:
Ideally, libnss_sss should be part of stdenv.
That's not going to happen because there are any number of NSS modules that we
can't possibly all add to stdenv.
Do you have any elegant way in Nix to add a module / modify the stdenv
without
The Firefox issue turned into
https://github.com/NixOS/nixpkgs/issues/1868, which was closed when it
was decided a wrapper that sets LD_LIBRARY_PATH could fix it. Should
the issue get re-opened? Was that never implemented, or does it not
solve the problem?
James
On 4 June 2015 at 15:10, Adrien
Ah, sorry, I'm not really familiar with nss. Does the libnss_sss
version have to match what's installed system-wide, rather than e.g.
being a build input?
Also, doesn't fetchgit produce fixed-output derivations*, meaning
purity depends only on the sh256 hash of the output matching, and not
on how
I would say, it does not solve the problem.
If adding the system libnss_sss path to the LD_LIBRARY_PATH can be an
acceptable solution for firefox, I think it is not for fetchgit/git.
Adding libnss_sss to the LD_PATH as requirement for any invocation of
igt would make any build using fetchgit
Hi Eleco,
Thank you for your reply.
Here is the nsswitch.conf
http://pastebin.com/bErcjfkk
I am currently evaluating Nix for software deployment in a quite large
scientific collaboration. Some sites are configured with sss and not
under control unfortunatly.
Adrien
Le 05/06/2015 12:58,
Hi,
On 05/06/15 00:10, Adrien Devresse wrote:
I triggered this failure (http://pastebin.com/Lw6a0p4J) while trying to
use nix on a RHEL 6.5 configuration setup with ldap authentication (
sssd + libnss_sss ).
After a bit of research, this is due to the dependency of git on
getpwuid and to
Hi,
I triggered this failure (http://pastebin.com/Lw6a0p4J) while trying to
use nix on a RHEL 6.5 configuration setup with ldap authentication (
sssd + libnss_sss ).
After a bit of research, this is due to the dependency of git on
getpwuid and to the fact that the nix glibc do not have by
12 matches
Mail list logo