Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

treewide: post-stc-ng test fixes #340046

Merged
merged 3 commits into from
Sep 6, 2024
Merged

treewide: post-stc-ng test fixes #340046

merged 3 commits into from
Sep 6, 2024

Conversation

K900
Copy link
Contributor

@K900 K900 commented Sep 6, 2024

Description of changes

This is insane. I have no idea.

Things done

  • Built on platform(s)
    • x86_64-linux
    • aarch64-linux
    • x86_64-darwin
    • aarch64-darwin
  • For non-Linux: Is sandboxing enabled in nix.conf? (See Nix manual)
    • sandbox = relaxed
    • sandbox = true
  • Tested, as applicable:
  • Tested compilation of all packages that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD". Note: all changes have to be committed, also see nixpkgs-review usage
  • Tested basic functionality of all binary files (usually in ./result/bin/)
  • 24.11 Release Notes (or backporting 23.11 and 24.05 Release notes)
    • (Package updates) Added a release notes entry if the change is major or breaking
    • (Module updates) Added a release notes entry if the change is significant
    • (Module addition) Added a release notes entry if adding a new NixOS module
  • Fits CONTRIBUTING.md.

Add a 👍 reaction to pull requests you find important.

K900 added 3 commits September 6, 2024 13:35
…ileset shenanigans

Something is wrong with source filtering and it makes installer tests fail.
Move it to a subdirectory to not have to do that, at least for now.
The Nix exorcism squad has been called.
@K900 K900 requested review from jmbaur and emilazy September 6, 2024 10:41
@github-actions github-actions bot added the 6.topic: nixos Issues or PRs affecting NixOS modules, or package usability issues specific to NixOS label Sep 6, 2024
@K900 K900 merged commit b39277a into NixOS:master Sep 6, 2024
12 of 13 checks passed
Copy link
Member

@emilazy emilazy left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I kind of hate that we don’t understand this, but I’m glad it fixes things.

Did you check if Lix or whatever has the same bug?

./src
];
};
src = ./src;
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Non‐blocking nit: ./switch-to-configuration would match the cargo new naming convention.

@emilazy
Copy link
Member

emilazy commented Sep 6, 2024

We should probably report this bug but I guess it seems hard to find a minimal reproducer (maybe --store + channels + filesets is just totally broken in general?).

@Yarny0
Copy link
Contributor

Yarny0 commented Oct 31, 2024

Might this be caused by NixOS/nix#11503 ? There is a minimal reproducer given (albeit it is so minimal it does not use filesets), and a less minimal reproducer (based on nixpkgs) is also stated in #334098 .

emilazy added a commit to emilazy/nixpkgs that referenced this pull request Dec 30, 2024
emilazy added a commit to emilazy/nixpkgs that referenced this pull request Dec 30, 2024
emilazy added a commit to emilazy/nixpkgs that referenced this pull request Dec 30, 2024
emilazy added a commit to emilazy/nixpkgs that referenced this pull request Dec 30, 2024
emilazy added a commit to emilazy/nixpkgs that referenced this pull request Dec 30, 2024
emilazy added a commit to emilazy/nixpkgs that referenced this pull request Dec 30, 2024
emilazy added a commit to emilazy/nixpkgs that referenced this pull request Dec 30, 2024
emilazy added a commit to emilazy/nixpkgs that referenced this pull request Dec 30, 2024
emilazy added a commit to emilazy/nixpkgs that referenced this pull request Dec 30, 2024
emilazy added a commit to emilazy/nixpkgs that referenced this pull request Dec 30, 2024
emilazy added a commit to emilazy/nixpkgs that referenced this pull request Dec 30, 2024
emilazy added a commit to emilazy/nixpkgs that referenced this pull request Dec 31, 2024
emilazy added a commit to emilazy/nixpkgs that referenced this pull request Dec 31, 2024
emilazy added a commit to emilazy/nixpkgs that referenced this pull request Dec 31, 2024
* <hxxps://github.com/NixOS/pull/340046>
* <hxxps://github.com/NixOS/pull/352491>
* <hxxps://github.com/NixOS/pull/369459>
emilazy added a commit to emilazy/nixpkgs that referenced this pull request Dec 31, 2024
* <hxxps://github.com/NixOS/pull/340046>
* <hxxps://github.com/NixOS/pull/352491>
* <hxxps://github.com/NixOS/pull/369459>
emilazy added a commit to emilazy/nixpkgs that referenced this pull request Dec 31, 2024
* <hxxps://github.com/NixOS/pull/340046>
* <hxxps://github.com/NixOS/pull/352491>
* <hxxps://github.com/NixOS/pull/369459>
emilazy added a commit to emilazy/nixpkgs that referenced this pull request Dec 31, 2024
* <hxxps://github.com/NixOS/pull/340046>
* <hxxps://github.com/NixOS/pull/352491>
* <hxxps://github.com/NixOS/pull/369459>
emilazy added a commit to emilazy/nixpkgs that referenced this pull request Dec 31, 2024
* <hxxps://github.com/NixOS/pull/340046>
* <hxxps://github.com/NixOS/pull/352491>
* <hxxps://github.com/NixOS/pull/369459>
emilazy added a commit to emilazy/nixpkgs that referenced this pull request Dec 31, 2024
* <hxxps://github.com/NixOS/pull/340046>
* <hxxps://github.com/NixOS/pull/352491>
* <hxxps://github.com/NixOS/pull/369459>
emilazy added a commit to emilazy/nixpkgs that referenced this pull request Dec 31, 2024
* <hxxps://github.com/NixOS/pull/340046>
* <hxxps://github.com/NixOS/pull/352491>
* <hxxps://github.com/NixOS/pull/369459>
emilazy added a commit to emilazy/nixpkgs that referenced this pull request Dec 31, 2024
* <hxxps://github.com/NixOS/pull/340046>
* <hxxps://github.com/NixOS/pull/352491>
* <hxxps://github.com/NixOS/pull/369459>
emilazy added a commit to emilazy/nixpkgs that referenced this pull request Dec 31, 2024
* <hxxps://github.com/NixOS/pull/340046>
* <hxxps://github.com/NixOS/pull/352491>
* <hxxps://github.com/NixOS/pull/369459>
emilazy added a commit to emilazy/nixpkgs that referenced this pull request Dec 31, 2024
Due to Nix bug <NixOS/nix#11503>,
`builtins.filterSource` and chroot stores interact in a confusing
and broken way that breaks `lib.fileset`. This means that uses of
the API inside Nixpkgs keep breaking the NixOS installer, blocking
the channel. The resulting error messages are inscrutable (they look
like “the installer test is trying to download curl…?” and
eventually bottom out in a derivation that has the wrong `outPath`
because of the chroot store causing an incorrect `lib.fileset` result).

Whenever this happens, someone (well, in practice K900 or I)
has to bisect the change that introduced it and remove the use of
`lib.fileset`. This has happened at least three times in the past
four months (I believe I might actually be missing one here, but
these are the ones I remember and could easily dig up):

* <htxps://github.com/NixOS/pull/340046>
* <NixOS#352491>
* <NixOS#369459>

The options I see here are:

1. Forbid use of `lib.fileset` within Nixpkgs. This is the approach
   taken here. External users of Nixpkgs can continue to use the API as
   normal, but using it from within something that affects any release
   jobset `outPath`s will cause an evaluation failure with a hopefully‐
   helpful error message.

2. Forbid `lib.fileset` and also all of the other library APIs that use
   `builtins.filterSource`. I’m happy to do this, but so far none of
   those have broken the installer, so I decided to start small and
   worry about the others if they end up causing a problem in practice.

3. Forbid `builtins.filterSource` directly. This is hard and would
   require more invasive `builtins.scopedImport` crimes to do at
   evaluation time. I think this would realistically have to be done in
   something like nixpkgs-vet instead and I didn’t have much luck
   shoehorning a check like this into that codebase when I tried.

4. Fix the Nix bug. This would be great! But also it doesn’t seem to be
   happening any time soon, it seems difficult to fix in a way that
   doesn’t subtly break compatibility with the previous semantics, and
   arguably the fix would need backporting all the way back to 2.3
   given our minimum version policy.

5. Do nothing; have people continue to innocuously use `lib.fileset`
   throughout Nixpkgs, breaking the installer whenever one of them
   sneaks in to that closure, causing the channel to be blocked and
   requiring expensive bisections to narrow down the inscrutable test
   failure to the package using `lib.fileset`, which then needs moving
   back off it. This sucks for the people who keep having to track it
   down, holds back important channel bumps, and the criteria for when
   it’s okay to use `lib.fileset` are not realistically possible to
   teach to all contributors.

I'd be happy to work on (2) as an alternative; (3) would be difficult
and seems like overkill, (4) is not really something I trust myself
to do and wouldn’t address the immediate problem, and (5) isn’t
sustainable. I think that the current approach here is the best
trade‐off for now, as `lib.fileset` seems to be the only prominent
user of the `builtins.filterSource` API that works with full store
paths, exposing it to the Nix bug. It’s unfortunate to lose the
nice API, but since we can’t rely on it to produce correct results
and the channels keep getting blocked as a result, I don’t think
we really have an alternative right now.
emilazy added a commit to emilazy/nixpkgs that referenced this pull request Dec 31, 2024
Due to Nix bug <NixOS/nix#11503>,
`builtins.filterSource` and chroot stores interact in a confusing
and broken way that breaks `lib.fileset`. This means that uses of
the API inside Nixpkgs keep breaking the NixOS installer, blocking
the channel. The resulting error messages are inscrutable (they look
like “the installer test is trying to download curl…?” and
eventually bottom out in a derivation that has the wrong `outPath`
because of the chroot store causing an incorrect `lib.fileset` result).

Whenever this happens, someone (well, in practice K900 or I)
has to bisect the change that introduced it and remove the use of
`lib.fileset`. This has happened at least three times in the past
four months (I believe I might actually be missing one here, but
these are the ones I remember and could easily dig up):

* <NixOS#340046>
* <NixOS#352491>
* <NixOS#369459>

The options I see here are:

1. Forbid use of `lib.fileset` within Nixpkgs. This is the approach
   taken here. External users of Nixpkgs can continue to use the API as
   normal, but using it from within something that affects any release
   jobset `outPath`s will cause an evaluation failure with a hopefully‐
   helpful error message.

2. Forbid `lib.fileset` and also all of the other library APIs that use
   `builtins.filterSource`. I’m happy to do this, but so far none of
   those have broken the installer, so I decided to start small and
   worry about the others if they end up causing a problem in practice.

3. Forbid `builtins.filterSource` directly. This is hard and would
   require more invasive `builtins.scopedImport` crimes to do at
   evaluation time. I think this would realistically have to be done in
   something like nixpkgs-vet instead and I didn’t have much luck
   shoehorning a check like this into that codebase when I tried.

4. Fix the Nix bug. This would be great! But also it doesn’t seem to be
   happening any time soon, it seems difficult to fix in a way that
   doesn’t subtly break compatibility with the previous semantics, and
   arguably the fix would need backporting all the way back to 2.3
   given our minimum version policy.

5. Do nothing; have people continue to innocuously use `lib.fileset`
   throughout Nixpkgs, breaking the installer whenever one of them
   sneaks in to that closure, causing the channel to be blocked and
   requiring expensive bisections to narrow down the inscrutable test
   failure to the package using `lib.fileset`, which then needs moving
   back off it. This sucks for the people who keep having to track it
   down, holds back important channel bumps, and the criteria for when
   it’s okay to use `lib.fileset` are not realistically possible to
   teach to all contributors.

I'd be happy to work on (2) as an alternative; (3) would be difficult
and seems like overkill, (4) is not really something I trust myself
to do and wouldn’t address the immediate problem, and (5) isn’t
sustainable. I think that the current approach here is the best
trade‐off for now, as `lib.fileset` seems to be the only prominent
user of the `builtins.filterSource` API that works with full store
paths, exposing it to the Nix bug. It’s unfortunate to lose the
nice API, but since we can’t rely on it to produce correct results
and the channels keep getting blocked as a result, I don’t think
we really have an alternative right now.
emilazy added a commit to emilazy/nixpkgs that referenced this pull request Dec 31, 2024
Due to Nix bug <NixOS/nix#11503>,
`builtins.filterSource` and chroot stores interact in a confusing
and broken way that breaks `lib.fileset`. This means that uses of
the API inside Nixpkgs keep breaking the NixOS installer, blocking
the channel. The resulting error messages are inscrutable (they look
like “the installer test is trying to download `curl`…?” and
eventually bottom out in a derivation that has the wrong `outPath`
because of the chroot store causing an incorrect `lib.fileset` result).

Whenever this happens, someone (well, in practice K900 or I)
has to bisect the change that introduced it and remove the use of
`lib.fileset`. This has happened at least three times in the past
four months (I believe I might actually be missing one here, but
these are the ones I remember and could easily dig up):

* <NixOS#340046>
* <NixOS#352491>
* <NixOS#369459>

The options I see here are:

1. Forbid use of `lib.fileset` within Nixpkgs until the Nix bug is
   fixed. This is the approach taken here. External users of Nixpkgs
   can continue to use the API as normal, but using it from within
   something that affects any release jobset `outPath`s will cause an
   evaluation failure with a hopefully‐helpful error message.

2. Forbid `lib.fileset` and also all of the other library APIs that use
   `builtins.filterSource`. I’m happy to do this, but so far none of
   those have broken the installer, so I decided to start small and
   worry about the others if they end up causing a problem in practice.

3. Forbid `builtins.filterSource` directly. This is hard and would
   require more invasive `builtins.scopedImport` crimes to do at
   evaluation time. I think this would realistically have to be done in
   something like nixpkgs-vet instead and I didn’t have much luck
   shoehorning a check like this into that codebase when I tried.

4. Fix the Nix bug. This would be great! But also it doesn’t seem to be
   happening any time soon, it seems difficult to fix in a way that
   doesn’t subtly break compatibility with the previous semantics, and
   arguably the fix would need backporting all the way back to 2.3
   given our minimum version policy.

5. Do nothing; have people continue to innocuously use `lib.fileset`
   throughout Nixpkgs, breaking the installer whenever one of them
   sneaks in to that closure, causing the channel to be blocked and
   requiring expensive bisections to narrow down the inscrutable test
   failure to the package using `lib.fileset`, which then needs moving
   back off it. This sucks for the people who keep having to track it
   down, holds back important channel bumps, and the criteria for when
   it’s okay to use `lib.fileset` are not realistically possible to
   teach to all contributors.

I'd be happy to work on (2) as an alternative; (3) would be difficult
and seems like overkill, (4) is not really something I trust myself
to do and wouldn’t address the immediate problem, and (5) isn’t
sustainable. I think that the current approach here is the best
trade‐off for now, as `lib.fileset` seems to be the only prominent
user of the `builtins.filterSource` API that works with full store
paths, exposing it to the Nix bug. It’s unfortunate to lose the
nice API, but since we can’t rely on it to produce correct results
and the channels keep getting blocked as a result, I don’t think
we really have an alternative right now.
emilazy added a commit that referenced this pull request Jan 1, 2025
Due to Nix bug <NixOS/nix#11503>,
`builtins.filterSource` and chroot stores interact in a confusing
and broken way that breaks `lib.fileset`. This means that uses of
the API inside Nixpkgs keep breaking the NixOS installer, blocking
the channel. The resulting error messages are inscrutable (they look
like “the installer test is trying to download `curl`…?” and
eventually bottom out in a derivation that has the wrong `outPath`
because of the chroot store causing an incorrect `lib.fileset` result).

Whenever this happens, someone (well, in practice K900 or I)
has to bisect the change that introduced it and remove the use of
`lib.fileset`. This has happened at least three times in the past
four months (I believe I might actually be missing one here, but
these are the ones I remember and could easily dig up):

* <#340046>
* <#352491>
* <#369459>

The options I see here are:

1. Forbid use of `lib.fileset` within Nixpkgs until the Nix bug is
   fixed. This is the approach taken here. External users of Nixpkgs
   can continue to use the API as normal, but using it from within
   something that affects any release jobset `outPath`s will cause an
   evaluation failure with a hopefully‐helpful error message.

2. Forbid `lib.fileset` and also all of the other library APIs that use
   `builtins.filterSource`. I’m happy to do this, but so far none of
   those have broken the installer, so I decided to start small and
   worry about the others if they end up causing a problem in practice.

3. Forbid `builtins.filterSource` directly. This is hard and would
   require more invasive `builtins.scopedImport` crimes to do at
   evaluation time. I think this would realistically have to be done in
   something like nixpkgs-vet instead and I didn’t have much luck
   shoehorning a check like this into that codebase when I tried.

4. Fix the Nix bug. This would be great! But also it doesn’t seem to be
   happening any time soon, it seems difficult to fix in a way that
   doesn’t subtly break compatibility with the previous semantics, and
   arguably the fix would need backporting all the way back to 2.3
   given our minimum version policy.

5. Do nothing; have people continue to innocuously use `lib.fileset`
   throughout Nixpkgs, breaking the installer whenever one of them
   sneaks in to that closure, causing the channel to be blocked and
   requiring expensive bisections to narrow down the inscrutable test
   failure to the package using `lib.fileset`, which then needs moving
   back off it. This sucks for the people who keep having to track it
   down, holds back important channel bumps, and the criteria for when
   it’s okay to use `lib.fileset` are not realistically possible to
   teach to all contributors.

I'd be happy to work on (2) as an alternative; (3) would be difficult
and seems like overkill, (4) is not really something I trust myself
to do and wouldn’t address the immediate problem, and (5) isn’t
sustainable. I think that the current approach here is the best
trade‐off for now, as `lib.fileset` seems to be the only prominent
user of the `builtins.filterSource` API that works with full store
paths, exposing it to the Nix bug. It’s unfortunate to lose the
nice API, but since we can’t rely on it to produce correct results
and the channels keep getting blocked as a result, I don’t think
we really have an alternative right now.

(cherry picked from commit 8725e46)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
6.topic: nixos Issues or PRs affecting NixOS modules, or package usability issues specific to NixOS 10.rebuild-darwin: 1-10 10.rebuild-linux: 1-10
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants