top-level: add warning for x86_64-darwin deprecation#492100
top-level: add warning for x86_64-darwin deprecation#492100emilazy merged 1 commit intoNixOS:masterfrom
x86_64-darwin deprecation#492100Conversation
|
This would need some adjustments for GitHub CI in at least the following locations (maybe missing some)
|
|
I already adjusted |
My bad
Ahh, yeah the CI jobs that made use of those where for
We should really reduce the amount we re-import |
bad334d to
b710766
Compare
b710766 to
88cedea
Compare
|
@NixOS/nixpkgs-ci I understand that all changes to the |
MattSturgeon
left a comment
There was a problem hiding this comment.
@NixOS/nixpkgs-ci I understand that all changes to the
cidirectory should generally be backported, but I’m unclear on how we’ll want to handle this
Yes, we definitely want to keep the ci tree in-sync across supported branches. Where possible, we also want CI to run the same on all branches. But where that doesn't make sense, I suppose we could use version predicates?
Comments on the relevant CI code below.
88cedea to
861f01b
Compare
861f01b to
b45a2fd
Compare
We’ve never deprecated a platform in widespread use before, and it seems prudent to warn users about the upcoming end of support so they can plan appropriately. I tried to make this relatively unobtrusive by taking advantage of the import cache and offering a way to turn it off, but I anticipate there might still be issues with e.g. `nix shell nixpkgs#…` and spammy warnings from multiple instantiations of Nixpkgs. I’m not sure there’s much we can do about that unless we take a different strategy entirely; `nix shell --impure nixpkgs#…` with a `~/.config/nixpkgs/config.nix` is about the best UX we can hope to offer with the restrictions of flakes.
b45a2fd to
4a20fb1
Compare
|
Okay, let’s see how this plays. Hopefully it doesn’t blow things up too much. |
We’ve never deprecated a platform in widespread use before, and it seems prudent to warn users about the upcoming end of support so they can plan appropriately.
I tried to make this relatively unobtrusive by taking advantage of the import cache and offering a way to turn it off, but I anticipate there might still be issues with e.g.
nix shell nixpkgs#…and spammy warnings from multiple instantiations of Nixpkgs. I’m not sure there’s much we can do about that unless we take a different strategy entirely;nix shell --impure nixpkgs#…with a~/.config/nixpkgs/config.nixis about the best UX we can hope to offer with the restrictions of flakes.Things done
passthru.tests.nixpkgs-reviewon this PR. See nixpkgs-review usage../result/bin/.