-
-
Notifications
You must be signed in to change notification settings - Fork 15.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
qt6: remove stdenv fully #391178
qt6: remove stdenv fully #391178
Conversation
Nothing will break in‐tree (anything that causes warnings can’t be part of the release jobset anyway), but it might break external users. We could probably get away with just making it a |
I think the thing I was seeing earlier was that the warnings were being triggered in-tree simply by accessing pkgsCross.x86_64-freebsd.qt6Packages.accounts-qt, so a throw would probably trip there too. |
That sounds wrong. |
Did you mean something else? |
I'm not saying it can't happen, I'm saying it shouldn't be. Something is clearly accessing it, but what? And why? |
Full trace. It really looks like the stdenv is being pulled into the scope, but only for spliced package sets. error: … from call site at /home/audrey/proj/nix/nixpkgs/pkgs/top-level/qt6-packages.nix:33:17: 32| # LIBRARIES 33| accounts-qt = callPackage ../development/libraries/accounts-qt { }; | ^ 34| appstream-qt = callPackage ../development/libraries/appstream/qt.nix { }; |
This really feels like something we should try and root cause. |
Tagging @Ericson2314 as the only one I've ever seen be able to wrangle splicing bullshit of this magnitude 🙏 |
Actually, this looks extremely straightforward. Splicing seems to be implemented such that it just re-crawls the package tree from the root in order to generate the spliced set, completely without regard for any sort of subscoping, so the fact that So... the fix is somewhat nontrivial. We can either do something radical in |
Oof. I guess we can just do this then. |
Let's see what breaks. See #370781
Things done
nix.conf
? (See Nix manual)sandbox = relaxed
sandbox = true
nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD"
. Note: all changes have to be committed, also see nixpkgs-review usage./result/bin/
)Add a 👍 reaction to pull requests you find important.