Conversation
|
Result of 1 package built:
But running it on This is inside the nix-review shell. |
db008b3 to
97e9d19
Compare
|
Thanks for the review @legendofmiracles! I can reproduce that crash with |
97e9d19 to
ce2d5e3
Compare
|
Seems to work now for me too. |
|
Result of 1 package built:
GUI also works. I cannot say anything about using so many options. |
There was a problem hiding this comment.
Should we enable them by default?
There was a problem hiding this comment.
Maybe? The options I defaulted to false are all plugins that are disabled by default and can be enabled in the gui so the only real consequence is closure size. If they're all going to be true by default perhaps they should be renamed disableX ? false per this discussion.
There was a problem hiding this comment.
@ryneeverett Adding too many options is not very productive as we are not build testing all of the combinations. A power user can always do something like exaile.override { webkitgtk = null; }.
There was a problem hiding this comment.
@veprbl I guess I don't really accept the premise that it's a package manager's job to test whether the optional dependencies -- as declared by upstream -- are truly optional. Also isn't your argument equally valid against any number of options?
There was a problem hiding this comment.
Also, I ran some builds to compare closure size:
- All options false -> 583mb
- Current default options -> 832mb
- All options true -> 1.5gb
Nearly doubling the closure size in order to install the dependencies of all the plugins (which are disabled by default) seems crazy. Especially when there's no reason to believe upstream is done adding plugins.
Also, particularly for the optional python dependencies, it seems improbable that they have any effect at build time.
There was a problem hiding this comment.
I guess I don't really accept the premise that it's a package manager's job to test whether the optional dependencies -- as declared by upstream -- are truly optional.
When you write an API with a bunch of knobs you usually want those to be tested. In the current setup there is not even a test that exile's build system accepts the libraries that we may pass to it. It will be up to a user to discover if something is broken.
Also isn't your argument equally valid against any number of options?
Not sure what you mean by that.
There was a problem hiding this comment.
In the current setup there is not even a test that exile's build system accepts the libraries that we may pass to it.
Is there a simple way to test packages with different combinations of inputs? I'm not familiar, though a hack would be to add another top level package exaileWithPlugins in which all the flags are true.
Also isn't your argument equally valid against any number of options?
Not sure what you mean by that.
I'm working from the assumption that options are not generally tested and if that's the case then it's not clear that many options are worse in principle than fewer options.
There was a problem hiding this comment.
In the current setup there is not even a test that exile's build system accepts the libraries that we may pass to it.
Is there a simple way to test packages with different combinations of inputs? I'm not familiar, though a hack would be to add another top level package
exaileWithPluginsin which all the flags are true.
Such package is often called exaileFull (e.g. gitFull).
Also isn't your argument equally valid against any number of options?
Not sure what you mean by that.
I'm working from the assumption that options are not generally tested and if that's the case then it's not clear that many options are worse in principle than fewer options.
More options means more combinations to test/debug, or, if you like, combinations left untested.
5a42929 to
4f5ef89
Compare
3aadf93 to
b827143
Compare
b827143 to
2a7446d
Compare
Disclaimers:
ImportError: /nix/store/0c7c96gikmzv87i7lv3vq5s1cmfjd6zf-glibc-2.31-74/lib/libc.so.6: version GLIBC_2.32' not found (required by /nix/store/ap4d6cqfhakl2dp6081z2c6bsdcinsha-glib-2.66.8/lib/libglib-2.0.so.0). However the binary works fine when I backport this branch to 20.09 so I believe this is just a case of glibc incompatibility.Things done
sandboxinnix.confon non-NixOS linux)nix-shell -p nixpkgs-review --run "nixpkgs-review wip"./result/bin/)nix path-info -Sbefore and after)