-
-
Notifications
You must be signed in to change notification settings - Fork 14.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
nixos-firewall-tools: don't use filesets #369459
Merged
K900
merged 1 commit into
NixOS:master
from
K900:filesets-are-bad-and-you-should-feel-bad
Dec 30, 2024
Merged
nixos-firewall-tools: don't use filesets #369459
K900
merged 1 commit into
NixOS:master
from
K900:filesets-are-bad-and-you-should-feel-bad
Dec 30, 2024
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This breaks the installer tests. See NixOS/nix#11503 for more fileset-related nonsense.
13 tasks
emilazy
added a commit
to emilazy/nixpkgs
that referenced
this pull request
Dec 30, 2024
* <NixOS#340046> * <NixOS#352491> * <NixOS#369459>
emilazy
added a commit
to emilazy/nixpkgs
that referenced
this pull request
Dec 30, 2024
* <NixOS#340046> * <NixOS#352491> * <NixOS#369459>
emilazy
added a commit
to emilazy/nixpkgs
that referenced
this pull request
Dec 30, 2024
* <NixOS#340046> * <NixOS#352491> * <NixOS#369459>
emilazy
added a commit
to emilazy/nixpkgs
that referenced
this pull request
Dec 30, 2024
* <NixOS#340046> * <NixOS#352491> * <NixOS#369459>
emilazy
added a commit
to emilazy/nixpkgs
that referenced
this pull request
Dec 30, 2024
* <NixOS#340046> * <NixOS#352491> * <NixOS#369459>
emilazy
added a commit
to emilazy/nixpkgs
that referenced
this pull request
Dec 30, 2024
* <NixOS#340046> * <NixOS#352491> * <NixOS#369459>
emilazy
added a commit
to emilazy/nixpkgs
that referenced
this pull request
Dec 30, 2024
* <NixOS#340046> * <NixOS#352491> * <NixOS#369459>
emilazy
added a commit
to emilazy/nixpkgs
that referenced
this pull request
Dec 30, 2024
* <NixOS#340046> * <NixOS#352491> * <NixOS#369459>
emilazy
added a commit
to emilazy/nixpkgs
that referenced
this pull request
Dec 30, 2024
* <NixOS#340046> * <NixOS#352491> * <NixOS#369459>
emilazy
added a commit
to emilazy/nixpkgs
that referenced
this pull request
Dec 30, 2024
* <NixOS#340046> * <NixOS#352491> * <NixOS#369459>
emilazy
added a commit
to emilazy/nixpkgs
that referenced
this pull request
Dec 30, 2024
* <NixOS#340046> * <NixOS#352491> * <NixOS#369459>
emilazy
added a commit
to emilazy/nixpkgs
that referenced
this pull request
Dec 31, 2024
* <NixOS#340046> * <NixOS#352491> * <NixOS#369459>
emilazy
added a commit
to emilazy/nixpkgs
that referenced
this pull request
Dec 31, 2024
* <NixOS#340046> * <NixOS#352491> * <NixOS#369459>
emilazy
added a commit
to emilazy/nixpkgs
that referenced
this pull request
Dec 31, 2024
* <hxxps://github.com/NixOS/pull/340046> * <hxxps://github.com/NixOS/pull/352491> * <hxxps://github.com/NixOS/pull/369459>
emilazy
added a commit
to emilazy/nixpkgs
that referenced
this pull request
Dec 31, 2024
* <hxxps://github.com/NixOS/pull/340046> * <hxxps://github.com/NixOS/pull/352491> * <hxxps://github.com/NixOS/pull/369459>
emilazy
added a commit
to emilazy/nixpkgs
that referenced
this pull request
Dec 31, 2024
* <hxxps://github.com/NixOS/pull/340046> * <hxxps://github.com/NixOS/pull/352491> * <hxxps://github.com/NixOS/pull/369459>
emilazy
added a commit
to emilazy/nixpkgs
that referenced
this pull request
Dec 31, 2024
* <hxxps://github.com/NixOS/pull/340046> * <hxxps://github.com/NixOS/pull/352491> * <hxxps://github.com/NixOS/pull/369459>
emilazy
added a commit
to emilazy/nixpkgs
that referenced
this pull request
Dec 31, 2024
* <hxxps://github.com/NixOS/pull/340046> * <hxxps://github.com/NixOS/pull/352491> * <hxxps://github.com/NixOS/pull/369459>
emilazy
added a commit
to emilazy/nixpkgs
that referenced
this pull request
Dec 31, 2024
* <hxxps://github.com/NixOS/pull/340046> * <hxxps://github.com/NixOS/pull/352491> * <hxxps://github.com/NixOS/pull/369459>
emilazy
added a commit
to emilazy/nixpkgs
that referenced
this pull request
Dec 31, 2024
* <hxxps://github.com/NixOS/pull/340046> * <hxxps://github.com/NixOS/pull/352491> * <hxxps://github.com/NixOS/pull/369459>
emilazy
added a commit
to emilazy/nixpkgs
that referenced
this pull request
Dec 31, 2024
* <hxxps://github.com/NixOS/pull/340046> * <hxxps://github.com/NixOS/pull/352491> * <hxxps://github.com/NixOS/pull/369459>
emilazy
added a commit
to emilazy/nixpkgs
that referenced
this pull request
Dec 31, 2024
* <hxxps://github.com/NixOS/pull/340046> * <hxxps://github.com/NixOS/pull/352491> * <hxxps://github.com/NixOS/pull/369459>
emilazy
added a commit
to emilazy/nixpkgs
that referenced
this pull request
Dec 31, 2024
Due to Nix bug <NixOS/nix#11503>, `builtins.filterSource` and chroot stores interact in a confusing and broken way that breaks `lib.fileset`. This means that uses of the API inside Nixpkgs keep breaking the NixOS installer, blocking the channel. The resulting error messages are inscrutable (they look like “the installer test is trying to download curl…?” and eventually bottom out in a derivation that has the wrong `outPath` because of the chroot store causing an incorrect `lib.fileset` result). Whenever this happens, someone (well, in practice K900 or I) has to bisect the change that introduced it and remove the use of `lib.fileset`. This has happened at least three times in the past four months (I believe I might actually be missing one here, but these are the ones I remember and could easily dig up): * <htxps://github.com/NixOS/pull/340046> * <NixOS#352491> * <NixOS#369459> The options I see here are: 1. Forbid use of `lib.fileset` within Nixpkgs. This is the approach taken here. External users of Nixpkgs can continue to use the API as normal, but using it from within something that affects any release jobset `outPath`s will cause an evaluation failure with a hopefully‐ helpful error message. 2. Forbid `lib.fileset` and also all of the other library APIs that use `builtins.filterSource`. I’m happy to do this, but so far none of those have broken the installer, so I decided to start small and worry about the others if they end up causing a problem in practice. 3. Forbid `builtins.filterSource` directly. This is hard and would require more invasive `builtins.scopedImport` crimes to do at evaluation time. I think this would realistically have to be done in something like nixpkgs-vet instead and I didn’t have much luck shoehorning a check like this into that codebase when I tried. 4. Fix the Nix bug. This would be great! But also it doesn’t seem to be happening any time soon, it seems difficult to fix in a way that doesn’t subtly break compatibility with the previous semantics, and arguably the fix would need backporting all the way back to 2.3 given our minimum version policy. 5. Do nothing; have people continue to innocuously use `lib.fileset` throughout Nixpkgs, breaking the installer whenever one of them sneaks in to that closure, causing the channel to be blocked and requiring expensive bisections to narrow down the inscrutable test failure to the package using `lib.fileset`, which then needs moving back off it. This sucks for the people who keep having to track it down, holds back important channel bumps, and the criteria for when it’s okay to use `lib.fileset` are not realistically possible to teach to all contributors. I'd be happy to work on (2) as an alternative; (3) would be difficult and seems like overkill, (4) is not really something I trust myself to do and wouldn’t address the immediate problem, and (5) isn’t sustainable. I think that the current approach here is the best trade‐off for now, as `lib.fileset` seems to be the only prominent user of the `builtins.filterSource` API that works with full store paths, exposing it to the Nix bug. It’s unfortunate to lose the nice API, but since we can’t rely on it to produce correct results and the channels keep getting blocked as a result, I don’t think we really have an alternative right now.
emilazy
added a commit
to emilazy/nixpkgs
that referenced
this pull request
Dec 31, 2024
Due to Nix bug <NixOS/nix#11503>, `builtins.filterSource` and chroot stores interact in a confusing and broken way that breaks `lib.fileset`. This means that uses of the API inside Nixpkgs keep breaking the NixOS installer, blocking the channel. The resulting error messages are inscrutable (they look like “the installer test is trying to download curl…?” and eventually bottom out in a derivation that has the wrong `outPath` because of the chroot store causing an incorrect `lib.fileset` result). Whenever this happens, someone (well, in practice K900 or I) has to bisect the change that introduced it and remove the use of `lib.fileset`. This has happened at least three times in the past four months (I believe I might actually be missing one here, but these are the ones I remember and could easily dig up): * <NixOS#340046> * <NixOS#352491> * <NixOS#369459> The options I see here are: 1. Forbid use of `lib.fileset` within Nixpkgs. This is the approach taken here. External users of Nixpkgs can continue to use the API as normal, but using it from within something that affects any release jobset `outPath`s will cause an evaluation failure with a hopefully‐ helpful error message. 2. Forbid `lib.fileset` and also all of the other library APIs that use `builtins.filterSource`. I’m happy to do this, but so far none of those have broken the installer, so I decided to start small and worry about the others if they end up causing a problem in practice. 3. Forbid `builtins.filterSource` directly. This is hard and would require more invasive `builtins.scopedImport` crimes to do at evaluation time. I think this would realistically have to be done in something like nixpkgs-vet instead and I didn’t have much luck shoehorning a check like this into that codebase when I tried. 4. Fix the Nix bug. This would be great! But also it doesn’t seem to be happening any time soon, it seems difficult to fix in a way that doesn’t subtly break compatibility with the previous semantics, and arguably the fix would need backporting all the way back to 2.3 given our minimum version policy. 5. Do nothing; have people continue to innocuously use `lib.fileset` throughout Nixpkgs, breaking the installer whenever one of them sneaks in to that closure, causing the channel to be blocked and requiring expensive bisections to narrow down the inscrutable test failure to the package using `lib.fileset`, which then needs moving back off it. This sucks for the people who keep having to track it down, holds back important channel bumps, and the criteria for when it’s okay to use `lib.fileset` are not realistically possible to teach to all contributors. I'd be happy to work on (2) as an alternative; (3) would be difficult and seems like overkill, (4) is not really something I trust myself to do and wouldn’t address the immediate problem, and (5) isn’t sustainable. I think that the current approach here is the best trade‐off for now, as `lib.fileset` seems to be the only prominent user of the `builtins.filterSource` API that works with full store paths, exposing it to the Nix bug. It’s unfortunate to lose the nice API, but since we can’t rely on it to produce correct results and the channels keep getting blocked as a result, I don’t think we really have an alternative right now.
emilazy
added a commit
to emilazy/nixpkgs
that referenced
this pull request
Dec 31, 2024
Due to Nix bug <NixOS/nix#11503>, `builtins.filterSource` and chroot stores interact in a confusing and broken way that breaks `lib.fileset`. This means that uses of the API inside Nixpkgs keep breaking the NixOS installer, blocking the channel. The resulting error messages are inscrutable (they look like “the installer test is trying to download `curl`…?” and eventually bottom out in a derivation that has the wrong `outPath` because of the chroot store causing an incorrect `lib.fileset` result). Whenever this happens, someone (well, in practice K900 or I) has to bisect the change that introduced it and remove the use of `lib.fileset`. This has happened at least three times in the past four months (I believe I might actually be missing one here, but these are the ones I remember and could easily dig up): * <NixOS#340046> * <NixOS#352491> * <NixOS#369459> The options I see here are: 1. Forbid use of `lib.fileset` within Nixpkgs until the Nix bug is fixed. This is the approach taken here. External users of Nixpkgs can continue to use the API as normal, but using it from within something that affects any release jobset `outPath`s will cause an evaluation failure with a hopefully‐helpful error message. 2. Forbid `lib.fileset` and also all of the other library APIs that use `builtins.filterSource`. I’m happy to do this, but so far none of those have broken the installer, so I decided to start small and worry about the others if they end up causing a problem in practice. 3. Forbid `builtins.filterSource` directly. This is hard and would require more invasive `builtins.scopedImport` crimes to do at evaluation time. I think this would realistically have to be done in something like nixpkgs-vet instead and I didn’t have much luck shoehorning a check like this into that codebase when I tried. 4. Fix the Nix bug. This would be great! But also it doesn’t seem to be happening any time soon, it seems difficult to fix in a way that doesn’t subtly break compatibility with the previous semantics, and arguably the fix would need backporting all the way back to 2.3 given our minimum version policy. 5. Do nothing; have people continue to innocuously use `lib.fileset` throughout Nixpkgs, breaking the installer whenever one of them sneaks in to that closure, causing the channel to be blocked and requiring expensive bisections to narrow down the inscrutable test failure to the package using `lib.fileset`, which then needs moving back off it. This sucks for the people who keep having to track it down, holds back important channel bumps, and the criteria for when it’s okay to use `lib.fileset` are not realistically possible to teach to all contributors. I'd be happy to work on (2) as an alternative; (3) would be difficult and seems like overkill, (4) is not really something I trust myself to do and wouldn’t address the immediate problem, and (5) isn’t sustainable. I think that the current approach here is the best trade‐off for now, as `lib.fileset` seems to be the only prominent user of the `builtins.filterSource` API that works with full store paths, exposing it to the Nix bug. It’s unfortunate to lose the nice API, but since we can’t rely on it to produce correct results and the channels keep getting blocked as a result, I don’t think we really have an alternative right now.
13 tasks
emilazy
added a commit
that referenced
this pull request
Jan 1, 2025
Due to Nix bug <NixOS/nix#11503>, `builtins.filterSource` and chroot stores interact in a confusing and broken way that breaks `lib.fileset`. This means that uses of the API inside Nixpkgs keep breaking the NixOS installer, blocking the channel. The resulting error messages are inscrutable (they look like “the installer test is trying to download `curl`…?” and eventually bottom out in a derivation that has the wrong `outPath` because of the chroot store causing an incorrect `lib.fileset` result). Whenever this happens, someone (well, in practice K900 or I) has to bisect the change that introduced it and remove the use of `lib.fileset`. This has happened at least three times in the past four months (I believe I might actually be missing one here, but these are the ones I remember and could easily dig up): * <#340046> * <#352491> * <#369459> The options I see here are: 1. Forbid use of `lib.fileset` within Nixpkgs until the Nix bug is fixed. This is the approach taken here. External users of Nixpkgs can continue to use the API as normal, but using it from within something that affects any release jobset `outPath`s will cause an evaluation failure with a hopefully‐helpful error message. 2. Forbid `lib.fileset` and also all of the other library APIs that use `builtins.filterSource`. I’m happy to do this, but so far none of those have broken the installer, so I decided to start small and worry about the others if they end up causing a problem in practice. 3. Forbid `builtins.filterSource` directly. This is hard and would require more invasive `builtins.scopedImport` crimes to do at evaluation time. I think this would realistically have to be done in something like nixpkgs-vet instead and I didn’t have much luck shoehorning a check like this into that codebase when I tried. 4. Fix the Nix bug. This would be great! But also it doesn’t seem to be happening any time soon, it seems difficult to fix in a way that doesn’t subtly break compatibility with the previous semantics, and arguably the fix would need backporting all the way back to 2.3 given our minimum version policy. 5. Do nothing; have people continue to innocuously use `lib.fileset` throughout Nixpkgs, breaking the installer whenever one of them sneaks in to that closure, causing the channel to be blocked and requiring expensive bisections to narrow down the inscrutable test failure to the package using `lib.fileset`, which then needs moving back off it. This sucks for the people who keep having to track it down, holds back important channel bumps, and the criteria for when it’s okay to use `lib.fileset` are not realistically possible to teach to all contributors. I'd be happy to work on (2) as an alternative; (3) would be difficult and seems like overkill, (4) is not really something I trust myself to do and wouldn’t address the immediate problem, and (5) isn’t sustainable. I think that the current approach here is the best trade‐off for now, as `lib.fileset` seems to be the only prominent user of the `builtins.filterSource` API that works with full store paths, exposing it to the Nix bug. It’s unfortunate to lose the nice API, but since we can’t rely on it to produce correct results and the channels keep getting blocked as a result, I don’t think we really have an alternative right now. (cherry picked from commit 8725e46)
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This breaks the installer tests.
See NixOS/nix#11503 for more fileset-related nonsense.
Things done
nix.conf
? (See Nix manual)sandbox = relaxed
sandbox = true
nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD"
. Note: all changes have to be committed, also see nixpkgs-review usage./result/bin/
)Add a 👍 reaction to pull requests you find important.