Lix 2.94 "Açaí na tigela" (2025-11-17)
Lix 2.94.0 (2025-11-17)
Breaking Changes
-
Remove support for daemon protocols before 2.18 fj#510 cl/3249
Support for daemon wire protocols belonging to Nix 2.17 or older have been removed. This impacts clients connecting to the local daemon socket or any remote builder configured using the
ssh-ngprotocol. Builders configured with thesshprotocol are still accessible from clients such as Nix 2.3. Additionally Lix will not be able to connect to an old daemon locally, and remote build connections to old daemons is likewise limited tosshurls.We have decided to take this step because the old protocols are very badly tested (if at all), maintenance overhead is high, and a number of problems with their design makes it infeasible to remain backwards compatible while we move Lix to a more modern RPC mechanism with better versioning support.
Many thanks to eldritch horrors for this.
-
Remove impure derivations and dynamic derivations fj#815 cl/3210
The
impure-derivationsanddynamic-derivationsexperimental feature have been removed.New impure or dynamic derivations cannot be created from this point forward, and any such pre-existing store derivations canot be read or built any more. Derivation outputs created by building such a derivation are still valid until garbage collected; existing store derivations can only be garbage collected.
Many thanks to eldritch horrors for this.
-
First argument to
--arg/--argstrmust be a valid Nix identifier fj#496The first argument to
--arg/--argstrmust be a valid Nix identifier, i.e.nix-build --arg config.allowUnfree trueis now rejected.This is because that invocation is a false friend since it doesn't set
{ config = { allowUnfree = true; }; }, but{ "config.allowUnfree" = true; }.The idea is to change the behavior to the latter in the long-term. For that, non-identifiers started giving a warning since 2.92 and are now rejected to give people who depend on that a chance to notice and potentially weigh in on the discussion.
Many thanks to ma27 for this.
-
New cgroup delegation model fj#537 fj#77 cl/3230
Builds using cgroups (i.e.
use-cgroups = trueand the experimental featurecgroups) now always delegate a cgroup tree to the sandbox.Compared to the original C++ Nix project, our delegation includes the
subtree_controlfile as well, which means that the sandbox can disable certain controllers in its own cgroup tree.This is a breaking change because this requires the Nix daemon to run with an already delegated cgroup tree by the service manager.
How to setup the cgroup tree with systemd?
systemd offers knobs to perform the required setup using:
[Service] Delegate=yes DelegateSubtree=supervisorThese directives are now included in our systemd packaging.
What about using Nix as root without connecting to the daemon?
Builds run as
rootwithout connecting to the daemon relying on the cgroup feature are now broken, i.e.# nix-build --use-cgroups --sandbox ... # will not workConsider doing instead:
# systemd-run --same-dir --wait -p Delegate=yes -p DelegateSubgroup=supervisor nix-build --use-cgroups ...If you need to disable cgroups temporarily, remember that you can do
NIX_CONF='include /etc/nix/nix.conf\nuse-cgroups = false' nix-build ...ornix-build --no-use-cgroups ....What about other service managers than systemd?
systemd has a documentation on how to handle cgroup delegation from service management perspective.
If your service manager adheres to systemd semantics, e.g. writing an extended attribute
user.delegate=1on the delegated cgroup tree directory and moving thenix-daemonprocess inside a cgroup tree to respect the inner process rule, then, the feature will work as well.Why is the cgroup feature still experimental?
While the cgroup feature unlocks many use cases, its behavior and integration (e.g. user experience), especially at scale on build farms or in multi-tenant environments, are not yet fully matured. There’s also potential for deeper systemd integration (e.g. using slices and scopes) that has not been fully explored.
To avoid locking in an unstable interface, we’re keeping the experimental flag until we have validated the feature across a broader range of scenarios, including but not limited to:
- Nix as root
- Hydra-style build farms
- Forgejo CI runners
- Shared remote builders
Many thanks to Raito Bezarius, eldritch horrors, and lheckemann for this.
-
Enable high compress ratio zstd compression by default for binary caches uploads fj#945 cl/4503
The default compression method for binary cache uploads has been switched from
xztozstdto address performance and usability issues related to modern hardware and high-speed connections.Why?
xzoffers compression ratios but is single-threaded in our implementation and very slow (~10-20 Mbps in our test), preventing full utilization of 100Mbps+ connections and significantly slowing decompression for end users.Lix is a "compress once, decompress many" application: build farms can afford to spend more time compressing to achieve a faster download transfer for the end user. More importantly, it matters that all end users spend the least amount of time decompressing.
What about compression ratios?
zstdcannot achieve the same peaks asxz, nonetheless,zstdcompression level has been increased to level 12 by default to balance compression ratio and performance.Synthetic test case data
- xz (default compression level) on a 4.4GB file: ~632MB (77s)
- zstd (level 12) on the same file: ~775MB (18s), 18% larger but 50% faster
- zstd (level 14): ~773MB (37s)
- zstd (level 16): ~735MB (66s)
Many thanks to eldritch horrors and Raito Bezarius for this.
-
Repl debugger uses
--ignore-tryby default lix#666 cl/3488Previously, using the debugger meant that exceptions thrown in
builtins.tryEvalwould trigger the debugger.However, this caught nixpkgs initialization code, which is unhelpful in the majority of cases, so we changed the default.
To get the old behaviour, use
--no-ignore-try.$ nix repl --debugger --expr 'with import <nixpkgs> {}; pkgs.hello' Lix 2.94.0-dev-pre20250625-9a59106 Type :? for help. error: file 'nixpkgs-overlays' was not found in the Nix search path (add it using $NIX_PATH or -I) This exception occurred in a 'tryEval' call. Use --ignore-try to skip these. Added 13 variables. nix-repl>Many thanks to jade for this.
-
Strings may now contain NUL bytes cl/3968
Lix now allows strings to contain NUL bytes instead of silently truncating the string before the first such byte. Notably NUL-bearing strings were allowed as attribute names—even though the corresponding strings were not representable!— leading to very surprising and incorrect behavior in corner cases, for example
nix-repl> builtins.fromJSON ''{"a": 1, "a\u0000b": 2}'' { a = 1; "ab" = 2; } nix-repl> builtins.attrNames (builtins.fromJSON ''{"a": 1, "a\u0000b": 2}'') [ "a" "a" ]rather than the more correct but still with the terminal eating NUL on display
nix-repl> builtins.fromJSON ''{"a": 1, "a\u0000b": 2}'' { a = 1; "ab" = 2; } nix-repl> builtins.attrNames (builtins.fromJSON ''{"a": 1, "a\u0000b": 2}'') [ "a" "ab" ]We consider this a breaking change since eval results will change if strings with embedded NUL bytes were used, but we also consider the old behavior to be not intentional (seeing how inconsistent it was) but merely fallout from a old and misguided implementation decision to be worked around, not actually fixed.
Many thanks to eldritch horrors for this.
-
Fixed output derivations can be run using
pastanetwork isolation fj#285 cl/3452Fixed output derivations traditionally run in the host network namespace. On Linux this allows such derivations to communicate with other sandboxes or the host using the abstract Unix domains socket namespace; this hasn't been unproblematic in the past and has been used in two distinct exploits to break out of the sandbox. For this reason fixed output derivations can now run in a network namespace (provided by
pasta), restricted to TCP and UDP communication with the rest of the world. When enabled this could be a breaking change and we classify it as such, even though we don't yet enable or require such isolation by default. We may enforce this in later releases of Lix once we have sufficient confidence that breakage is rare.Many thanks to eldritch horrors and puck for this.
-
Function equality semantics are more consistent, but still bad cl/4556 cl/4244
Lix has inherited a historic misfeature from CppNix in the form of pointer equality checks built into the
==operator. These checks were originally meant to optimize comparison for large sets, but they have the unfortunate side effect of producing unexpected results when sets containing functions are compared. Lix 2.93 and earlier behave as shown in the repl sessionLix 2.93.3 Type :? for help. nix-repl> f = x: x Added f. nix-repl> f == f false nix-repl> let s.f = f; in s.f == s.f false nix-repl> # however! { inherit f; } == { inherit f; } true nix-repl> [ f ] == [ f ] true nix-repl> # and, in another twist: [ f ] == map f [ f ] falseNixpkgs relies on sets containing functions being comparable, so we cannot simply deprecate this behavior. Due to changes to the object model used by Lix all comparisons above now evaluate to
true. This is considered a breaking change because eval results may differ, but we also consider it minor because the optimization is unsound (c.f.let l = [NaN]; in l == levaluates totrueeven though floating pointNaNis incomparable). Lix intends to remove this optimization altogether in the future, but until we can do that we instead make it slightly less broken to allow other, real optimizations. Function equality comparison remains undefined behavior and should not be relied upon in Nixlang code that intends to be portable.Many thanks to eldritch horrors for this.
-
nix eval --write-tohas been removed fj#974 fj#227 cl/4045nix eval --write-tohas been removed since it was underspecified, not widely useful, and prone to security-sensitive misbehaviors. The feature was added in Nix 2.4 purely for internal use in the build system. According to our research it hasn't found any use outside of some distribution packaging scripts. Please use structured outputs formats (such as JSON) instead as they have better type fidelity, don't conflate attributes with paths, and are useful to other tools.Many thanks to eldritch horrors for this.
-
Remove the
parse-toml-timestampsexperimental featureThe
parse-toml-timestampsexperimental feature has been removed.This feature used in‐band signalling to mark timestamps, making it impossible to unambiguously parse TOML documents. It also exposed implementation‐defined behaviour in the TOML specification that changed in the toml11 parser library.
Any interface for parsing TOML timestamps suitable for future stabilization would necessarily involve breaking changes, and there is no evidence this experimental feature is being relied upon in the wild, so it has been removed.
Many thanks to Emily for this.
-
Reject overflowing TOML integer literals cl/3916
The toml11 library used by Lix was updated. The new version aligns with the TOML v1.0.0 specification’s requirement to reject integer literals that cannot be losslessly parsed. This means that code like
builtins.fromTOML "v=0x8000000000000000"will now produce an error rather than silently saturating the integer result.Many thanks to Emily for this.
-
uid-range depends on cgroups cl/3230
uid-rangebuilds now depends oncgroups, an experimental feature.uid-rangebuilds already depended uponauto-allocate-uids, another experimental feature.The rationale for doing so is that
uid-rangeprovides a sandbox with many UIDs, this is useful for re-mapping them into a nested namespace, e.g. a container.Many thanks to Raito Bezarius and eldritch horrors for this.
Features
-
Add
inputs.self.submodulesflake attribute fj#942 cl/3839A port of https://github.com/NixOS/nix/pull/12421 to Lix, which:
- adds a general
inputs.selfflake attribute that retroactively applies configurations to a flake after it's been fetched, then triggers a refetch of the flake with the new config. - implements
inputs.self.submodulesthat allows a flake to declare its need for submodules, which are then fetched automatically with no need to pass?submodules=1anywhere.
Many thanks to Eelco Dolstra and ورد for this.
- adds a general
-
Lix supports HTTP/3 behind
--http3fj#1033Lix now supports HTTP/3 for file transfers when the linked curl version supports it.
By default, HTTP/3 is disabled notably due to performance issues reported in mid-2024. More details here.
As of 2025-11-14, NixOS official cache supports HTTP/3 via Fastly. More info here.
To enable HTTP/3:
- Use
--http3for individual transfers. - Add
http3 = truein your Nix configuration for permanent activation.
To disable it, use
--no-http3.Note:
--no-http2 --http3will still enable both HTTP/2 and HTTP/3.--http2 --http3will prioritize HTTP/3 and fall back to HTTP/2 (and then HTTP/1.1).
These are current CLI limitations. In the future, we plan to replace
--httpXoptions with--max-http-version [1,2,3]for easier version selection in Lix transfers.Many thanks to Raito Bezarius and eldritch horrors for this.
- Use
-
Add hyperlinks in attr set printing cl/3790
The attribute set printer, such as is seen in
nix replor in type errors, now prints hyperlinks on each attribute name to its definition site if it is known.Example: all of the attributes shown here are hyperlinks to the exact definition site of the attribute in question:
$ nix eval -f '<nixpkgs>' lib.licenses.mit { deprecated = false; free = true; fullName = "MIT License"; redistributable = true; shortName = "mit"; spdxId = "MIT"; url = "https://spdx.org/licenses/MIT.html"; }Many thanks to jade for this.
-
Experimental integer coercion in interpolated strings cl/3198
Ever tried interpolating a port number in Lix and ended up with something like this?
"http://${config.network.host}:${builtins.toString config.network.port}/"You're not alone. Thousands of Lix users suffer every day from excessive
builtins.toStringsyndrome. It’s 2025, and we still have to cast integers to use them in strings.To address this, Lix introduces the
coerce-integersexperimental feature. When enabled, interpolated integers within"${...}"are automatically coerced to strings. This allows writing:"http://${config.network.host}:${config.network.port}/"without additional conversion.
To enable the feature, you need to add
coerce-integersto your set of experimental features.Stabilization criteria
The
coerce-integersfeature is experimental and limited strictly to string interpolation ("${...}"). Before stabilization, the following must hold:-
Interpolation-only Coercion must not occur outside interpolation. Expressions like
"" + 42must continue to fail. -
Expectation that no explicit cast are being observed Cases observing explicit coercion (e.g., via
tryEvalgadget or similar) are expected not to be load-bearing in actual production code.
Timeline for stabilization
If the feature proves safe and is widely adopted across typical usage (e.g., actual configurations in the wild turning on the flag, non-trivial out-of-tree projects using it), the experimental flag will be removed after six months of active use or two Lix releases, whichever is longer.
This avoids locking the feature in experimental status indefinitely, as happened with Flakes, while allowing time for validation and ecosystem integration.
What about coercing floats or more?
Coercion beyond integers -- such as for floats or other types -- is not planned, even under an experimental flag. Questions like "what is the canonical string representation of a float?" involve subtle and context-dependent trade-offs. Without a robust and principled mechanism to define and audit such behavior, introducing broader coercion risks setting unintended and hard-to-reverse precedents. The scope of
coerce-integersis intentionally narrow and will remain so.In terms of outlook, a proposal like https://git.lix.systems/lix-project/lix/issues/835 could pave the way for a better solution.
Many thanks to Raito Bezarius, delroth, eldritch horrors, and winter for this.
-
-
nix-eval-jobs: support
--no-instantiateflag fj#987nix-eval-jobsnow supports a flag called--no-instantiate. With this enabled, no write operations on the eval store are performed. That means, only evaluation is performed, but derivations (and their gcroots) aren't created.
Improvements
-
Assess current profile generations pointers in
nix doctorcl/3108Added a new check to
nix doctorthat verifies whether the current generation of a Nix profile can be resolved. This helps users diagnose issues with broken or misconfigured profile symlinks.This helps determining if you have broken symlinks or misconfigured packaging.
Many thanks to Raito Bezarius for this.
-
Improved susbtituter query speed
The code used to query substituters for derivations has been rewritten slightly to take advantage of our asynchronous runtime. Such queries run for every build that could download from substituters and processes every derivation that isn't yet present on the local system. Previously Lix would use
http-connectionsto limit query concurrency, even for modern caches that support HTTP/2 and have no limit on how many queries can be run concurrently on one single connection. Lix no longer does this, resulting in approximately 60% reduction in query time for medium-sized closures (e.g. NixOS system closures) during testing, although the exact number depends greatly on local network latency and generally improves as latency increases. Unlike previously settinghttp-connectionsto1or other low values no longer brings a massive penalty in query performance if the cache in use by the querying system supports HTTP/2 (as e.g.cache.nixos.orgdoes).Many thanks to eldritch horrors for this.
-
Hitting Control-C twice always terminates Lix cl/3574
Hitting Control-C or sending
SIGINTto Lix now prints an informational message if it is still running after on second, the second Control-C/SIGINTterminates Lix immediately without waiting for any shutdown code to finish running. Lix did not treat the second such event differently from first in the past; this made it impossible to easily terminate running Lix processes that got stuck in e.g. very expensive Nixlang code that never interacted with the store. We now terminate as soon as the user hits Control-C again without waiting any more, to much the same effect as putting Lix into the background and killing it immediately afterwards.This means you can now more conveniently break out of stuck Nixlang evaluations:
❯ nix-instantiate --eval --expr 'let f = n: if n == 0 then 0 else f (n - 1) + f (n - 1); in f 32' ^CStill shutting down. Press ^C again to abort all operations immediately. ^C ❌130 ❯Many thanks to eldritch horrors for this.
-
--keep-failedchowns the build directory to the user that request the buildRunning a build with
--keep-failednow chowns the temporary directory from the builder user and group to the user that request the build if the build came from a local user connected to the daemon. This makes inspecting failed derivations a lot easier. On Linux the build directory made visible to the user will not be in the same path as it was in the sandbox and continuing builds will usually break.Many thanks to eldritch horrors for this.
-
Better debuggability on fixed-output hash mismatches
Fixed-output derivation hash mismatch error messages will now include the path that was produced unexpectedly, and this path will be registered as valid even if
--check(nix-store,nix-build) or--rebuild(nix build) was passed. This makes comparing the expected path with the obtained path easier, and is useful for debugging when upstreams modify previously-published releases or when changes in fixed-output derivations' dependencies affect their output unexpectedly.Many thanks to lheckemann for this.
-
Add --raw flag to
nix-instantiate --evalfor unescaped output gh#12119 cl/2886The
nix-instantiate --evalcommand now supports a--rawflag. When used, the result must be coercible to a string (as with${...}) and is printed verbatim, without quotes or escaping.Many thanks to Martin Fischer, infinisil, and Raito Bezarius for this.
-
Allow
nix store lsto read nar listings from binary cache stores. cl/3225The
nix store lscommand now supports reading.lsnar listings from binary cache stores. If a listing is detected for the store path being queried, the nar is no longer downloaded. These nar listings are available in binary cache stores where thewrite-nar-listingoption is enabled, such as cache.nixos.org.Many thanks to Victor Fuentes for this.
-
show tree with references that lead to an output cycle fj#551
When Lix determines a cyclic dependency between several outputs of a derivation, it now displays which files in which outputs lead to an output cycle:
error: cycle detected in build of '/nix/store/gc5h2whz3rylpf34n99nswvqgkjkigmy-demo.drv' in the references of output 'bar' from output 'foo'. Shown below are the files inside the outputs leading to the cycle: /nix/store/3lrgm74j85nzpnkz127rkwbx3fz5320q-demo-bar └───lib/libfoo: …stuffbefore /nix/store/h680k7k53rjl9p15g6h7kpym33250w0y-demo-baz andafter.… → /nix/store/h680k7k53rjl9p15g6h7kpym33250w0y-demo-baz └───share/snenskek: …???? /nix/store/dm24c76p9y2mrvmwgpmi64rryw6x5qmm-demo-foo ....… → /nix/store/dm24c76p9y2mrvmwgpmi64rryw6x5qmm-demo-foo └───bin/alarm: …textexttext/nix/store/3lrgm74j85nzpnkz127rkwbx3fz5320q-demo-bar abcabcabc.… → /nix/store/3lrgm74j85nzpnkz127rkwbx3fz5320q-demo-barPlease note that showing the files and its contents while displaying the cycles only works on Linux.
Many thanks to ma27 for this.
-
Lix now enables parallel marking in boehm-gc fj#983 cl/3880
This brings a fairly modest performance improvement (~38% for
nixpkgs search hello) to evaluation, especially in scenarios that necessitate larger heap sizes.Many thanks to Eelco Dolstra and Seth Flynn for this.
-
disallowedRequisitesnow reports chains of disallowed requisites fj#334 fj#626 gh#10877When a build fails because of
disallowedRequisites, the error message now includes the chain of references that led to the failure. This makes it easier to see in which derivations the chain can be broken, to resolve the problem.Example:
$ nix-build -A hello error: output '/nix/store/0b7k85gg5r28gb54px9nq7iv5986mns9-hello-2.12.2' is not allowed to refer to the following paths: /nix/store/eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee-glibc-2.40-66 Shown below are chains that lead to the forbidden path(s). /nix/store/0b7k85gg5r28gb54px9nq7iv5986mns9-hello-2.12.2 └───/nix/store/eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee-glibc-2.40-66Many thanks to ma27 and Robert Hensing for this.
-
Stack traces now summarize involved derivations at the bottom cl/4493
When evaluation errors and a stack trace is printed,
For example, if I add Nheko to a NixOS
environment.systemPackageswithout addingolm-3.2.16nixpkgs.config.permittedInsecurePackages, then without--show-trace, I previously got this:error: … while calling the 'head' builtin at /nix/store/9v6qa656sq3xc58vkxslqy646p0ajj61-source/lib/attrsets.nix:1701:13: 1700| if length values == 1 || pred here (elemAt values 1) (head values) then 1701| head values | ^ 1702| else … while evaluating the attribute 'value' at /nix/store/9v6qa656sq3xc58vkxslqy646p0ajj61-source/lib/modules.nix:1118:7: 1117| // { 1118| value = addErrorContext "while evaluating the option `${showOption loc}':" value; | ^ 1119| inherit (res.defsFinal') highestPrio; (stack trace truncated; use '--show-trace' to show the full trace) error: Package ‘olm-3.2.16’ in /nix/store/9v6qa656sq3xc58vkxslqy646p0ajj61-source/pkgs/by-name/ol/olm/package.nix:37 is marked as insecure, refusing to evaluate. < -snip the whole explanation about olm's CVEs- >This doesn't tell me anything about where
olm-3.2.16came from. With--show-trace, there's 1 155 lines to sift through, but does contain lines like "while evaluating derivation 'nheko-0.12.1'".With this change, those lines are summarized and collected at the bottom, regardless of
--show-trace:error: … while calling the 'head' builtin at /nix/store/9v6qa656sq3xc58vkxslqy646p0ajj61-source/lib/attrsets.nix:1701:13: 1700| if length values == 1 || pred here (elemAt values 1) (head values) then 1701| head values | ^ 1702| else … while evaluating the attribute 'value' at /nix/store/9v6qa656sq3xc58vkxslqy646p0ajj61-source/lib/modules.nix:1118:7: 1117| // { 1118| value = addErrorContext "while evaluating the option `${showOption loc}':" value; | ^ 1119| inherit (res.defsFinal') highestPrio; (stack trace truncated; use '--show-trace' to show the full trace) error: Package ‘olm-3.2.16’ in /nix/store/9v6qa656sq3xc58vkxslqy646p0ajj61-source/pkgs/by-name/ol/olm/package.nix:37 is marked as insecure, refusing to evaluate. < -snip the whole explanation about olm's CVEs- > note: trace involved the following derivations: derivation 'etc' derivation 'dbus-1' derivation 'system-path' derivation 'nheko-0.12.1' derivation 'mtxclient-0.10.1'Now we finally know that olm was evaluated because of Nheko, without sifting through thousands of lines of error message.
Many thanks to Qyriad for this.
-
Symbols reuses once-allocated Value to reduce garbage collected allocations cl/3308 cl/3300 cl/3314 cl/3310 cl/3312 cl/3313
In the Lix evaluator, symbols represent immutable strings, like those used for attribute names.
In evaluator design, such strings are typically interned, stored uniquely to save memory, and Lix inherits this approach from the original C++ codebase.
However, some builtins, like
builtins.attrNames, must return aValuetype that can represent any Nix value (strings, integers, lists, etc.).Before this change, these builtins would create lists of
Valueobjects by allocating them through the garbage collector, copying the symbol’s string content each time.This allocation is unnecessary if the interned symbols themselves also hold a
Valuerepresentation allocated outside the garbage collector, since these live for the full duration of evaluation.As a result, this reduces the number of allocations, leading to:
- A significant drop in maximum resident set memory (RSS), with some large-scale tests showing up to 11% (about 500 MiB) savings in large colmena deployments.
- A slight decrease in CPU usage during Nix evaluations.
This change is inspired by https://github.com/NixOS/nix/pull/13258 but the approach is different.
Note :
xokdviumis the rightful author of https://gerrit.lix.systems/c/lix/+/3300 and the credit was missed on our end during the development process. We are deeply sorry for this mistake.Many thanks to Raito Bezarius, eldritch horrors, Tom Hubrecht, xokdvium, and NaN-git for this.
Fixes
-
build-dirno longer defaults totemp-dircl/3453The directory in which temporary build directories are created no longer defaults to the value of the
temp-dirsetting to avoid builders making their directories world-accessible. This behavior has been used to escape the build sandbox and can cause build impurities even when not used maliciously. We now default tobuildsinNIX_STATE_DIR(which is/nix/var/nix/bin the default configuration).Many thanks to eldritch horrors for this.
-
Global certificate authorities are copied inside the builder's environment gh#12698 fj#885 cl/3765
Previously, CA certificates were only installed at
/etc/ssl/certs/ca-certificates.crtfor sandboxed builds on Linux.This setup was insufficient in light of recent changes in
nixpkgs, which now enforce HTTPS usage forfetchurl, even for fixed-output derivations, to mitigate confidentiality risks such asnetrcor credentials leakage.nixpkgsstill make use of a special package calledcacertswhich contains a copy of the CA certificates maintained by Nixpkgs and added as a reference for TLS-enabled fetchers.As a result, having a consistent and trusted certificate authority in all builder environments is becoming more essential.
On
nix-darwin, theNIX_SSL_CERT_FILEenvironment variable is always explicitly defined, but it is ignored by the sandbox setup.Simultaneously, Nix evaluates and propagates impure environment variables via
lib.proxyImpureEnvVars, meaning that ifNIX_SSL_CERT_FILEis set (which influences the default value forssl-cert-file), it will be forwarded unchanged into the builder environment.However, on Linux, Nix also copies the CA file into the sandbox, creating a discrepancy between the value of
NIX_SSL_CERT_FILEand the actual trusted certificate path used during the build.This divergence caused confusion and was partially addressed by attempts to whitelist the CA path in the Darwin sandbox (see cl/2906), but that approach involved a non-trivial path canonicalization step and is not as general as this one.
To address this properly, we now emit a warning and override
NIX_SSL_CERT_FILEinside the builder, explicitly pointing it to the CA file copied into the sandbox.This eliminates ambiguity between
NIX_SSL_CERT_FILEandssl-cert-file, ensuring consistent trust anchors across platforms.This warning might become a hard error as we figure out what to do regarding
lib.proxyImpureEnvVarsin nixpkgs.The behavior has been verified across sandboxed and unsandboxed builds on both Linux and Darwin.
As a consequence of this change, approximately 500 KB of CA certificate data is now unconditionally copied into the build directory for fixed-output derivations.
While this ensures consistent trust verification without having to restart the daemon after system upgrades, it may introduce a slight overhead in build performance. At present, no optimizations have been implemented to avoid this copy, but if this overhead proves noticeable in your workflows, please open an issue so we can evaluate and possibly implement different strategies to render trust anchors visible.
Many thanks to Raito Bezarius and Emily for this.
-
libstore: exponential backoff for downloads lix#932 cl/3856
The connection timeout when downloading from e.g. a binary cache is exponentially increased per failure. The option
connect-timeoutis now an alias tomax-connect-timeoutwhich is the maximum value for a timeout. The start value is controlled byinitial-connect-timeoutwhich is5by default.Many thanks to ma27 for this.
-
Fix develop shells for derivations with escape codes fj#991 cl/4154 cl/4155
ASCII control characters (including
\e, used for ANSI escape codes) in derivation variables are now correctly escaped fornix developandnix print-dev-env, instead of erroring.Many thanks to Qyriad for this.
-
nix-store --delete: always remove obsolete hardlinks cl/3188
Deleting specific paths using
nix-store --deleteornix store deletepreviously did not delete hard links created bynix-store --optimiseeven if they became obsolete, unless all of the given paths were deleted successfully. Now, hard links are always cleaned up, even if some of the given paths could not be deleted.Many thanks to lheckemann for this.
-
Report GC statistics correctly cl/3188
Deleting specific paths using
nix-store --deleteornix store deletepreviously did not report statistics correctly when some of the paths could not be deleted, even if others were deleted:$ nix store delete /nix/store/9bwryidal9q3g91cjm6xschfn4ikd82q-hello-2.12.1 --delete-closure -v finding garbage collector roots... deleting '/nix/store/9bwryidal9q3g91cjm6xschfn4ikd82q-hello-2.12.1' 0 store paths deleted, 0.00 MiB freed error: Cannot delete some of the given paths because they are still alive. Paths not deleted: k9bxzr1l92r5y6mihrkbpbr3fmc8qszx-libidn2-2.3.8 mbx9ii53lzjlrsnlrfmzpwm33ynljwdn-libunistring-1.3 rf8hcy6bldxdqc0g6q1dcka1vh47x69s-xgcc-14.2.1.20250322-libgcc vbrdc5wgzn0w1zdp10xd2favkjn5fk7y-glibc-2.40-66 To find out why, use nix-store --query --roots and nix-store --query --referrers.Many thanks to lheckemann for this.
-
Fallback to safe temp dir when build-dir is unwritable fj#876 cl/3501
Non-daemon builds started failing with a permission error after introducing the
build-diroption:$ nix build --store ~/scratch nixpkgs#hello --rebuild error: creating directory '/nix/var/nix/builds/nix-build-hello-2.12.2.drv-0': Permission deniedThis happens because:
- These builds are not run via the daemon, which owns
/nix/var/nix/builds. - The user lacks permissions for that path.
We considered making
build-dira store-level option and defaulting it to<chroot-root>/nix/var/nix/buildsfor chroot stores, but opted instead for a fallback: if the default fails, Nix now creates a safe build directory under/tmp.To avoid CVE-2025-52991, the fallback uses an extra path component between
/tmpand the build dir.Note: this fallback clutters
/tmpwith build directories that are not cleaned up. To prevent this, explicitly setbuild-dirto a path managed by Lix, even for local workloads.Many thanks to Raito Bezarius and eldritch horrors for this.
- These builds are not run via the daemon, which owns
-
Parse overflowing JSON number literals as floating‐point cl/3919
Previously,
builtins.fromJSON "-9223372036854775809"would return a floating‐point number, whilebuiltins.fromJSON "9223372036854775808"would cause an evaluation error. This was introduced with the banning of integer overflow in Lix 2.91; previously the latter would result in C++ undefined behaviour. These cases are now treated consistently with JSON’s model of a single numeric type, and JSON number literals that do not fit in a Nix‐language integer will be parsed as floating‐point numbers.Many thanks to Emily for this.
-
Fix handling of OSC codes in terminal output fj#160 cl/3143
OSC codes in terminal output are now handled correctly, where OSC 8 (hyperlink) is preserved any time color codes are allowed and all other OSC codes are stripped out. This applies not only to output from build commands but also to rendered documentation in the REPL.
Many thanks to lilyball for this.
-
Fix nix develop for derivations that rejects dependencies with structured attrs fj#997 cl/4182
For the sake of concision, we refer to
disallowedReferencesin what follows, but all output checks were equally fixed:{dis,}allowed{References,Requisites}.Derivations can define output checks to reject unwanted dependencies, such as interpreters like
bashor compilers likegcc. This can be done in two ways:- Legacy style:
disallowedReferences = [ ... ]in the environment. - Structured attrs:
outputChecks.<output>.disallowedReferences = [ ... ], typically used in__json.
Only the structured form supports derivations with multiple outputs.
nix developinternally rewrites derivations to create development shells. It relied on the legacydisallowedReferences, and failed to honor the structured variant. This led to broken shells in cases wherebashInteractivewas explicitly disallowed using structured output checks, e.g.nix develop nixpkgs#systemdafter the "bash-less NixOS" changes.This fix teaches
nix developto respect structured output checks, restoring support for such derivations.Many thanks to Raito Bezarius for this.
- Legacy style:
-
nix-eval-jobs: retain NIX_PATH cl/3859
nix-eval-jobsdoesn't clear theNIX_PATHfrom the environment anymore. This matches the behavior of upstream version2.30. -
Remove reliance on Bash for remote stores via SSH fj#830 fj#805 fj#304 cl/3159
The pre-flight
echo startedhandshake -- added years ago to catch race conditions -- has been removed.After removal of connection sharing in Lix 2.93, it required a Bash-compatible shell and a standard
echo, so it failed on:- builders protected by
ForceCommandwrappers (e.g.nix-remote-build), - BusyBox / initrd images with no Bash,
- hosts using non-POSIX shells such as Nushell.
The race the probe once addressed was tied to SSH connection-sharing -- since connection-sharing code has already been removed, the probe is now pointless.
Real connection or protocol errors are now left to SSH/Nix to report directly.
This is technically a breaking change if you had scripts that relied on the literal "started" which needs to be updated to rely on other signals, e.g., exit codes.
Many thanks to Raito Bezarius for this.
- builders protected by
-
repl-overlays now work in the debugger for flakes fj#777 cl/3398
Due to a bug, it was previously not possible to use the debugger on flakes with repl-overlays, or with pure evaluation in general:
$ nix repl --pure-eval Lix 2.94.0-dev-pre20250617-87d99da Type :? for help. Loading 'repl-overlays'... error: access to absolute path '/Users/jade/.config/nix/repl.nix' is forbidden in pure eval mode (use '--impure' to override)This is now fixed. The contents of the repl-overlays file itself (i.e. most typically the top level lambda in it) will be evaluated in impure mode. It may be necessary to use
builtins.seqto force the impure operations to happen first if one wants to do impure operations inside a repl-overlays file in pure evaluation mode.Many thanks to jade for this.
-
nix-shelldefault shell directory is not/tmpanymore for$NIX_BUILD_TOPfj#940Previously, Lix
nix-shells could exit non-zero status whenstdenv'sdumpVarsphase failed to write to$NIX_BUILD_TOP/env-vars, despitedumpVarsbeing intended as a debugging aid.This happens when
TMPDIRis not set and defaults therefore to/tmp, resulting in a/tmp/env-varsglobal file that everynix-shellwants to write.We fix this issue by reusing a pre-created, unique, and writable location, as the build top directory, avoiding shell exiting from write failures silently.
Many thanks to Raito Bezarius for this.
-
libstore/binary-cache-store: don't cache narinfo on nix copy, remove negative entry cl/3789
When using e.g. Snix's nar-bridge via an
http-store, Lix would create cache entries with a wrong URL to the NAR when uploading a store-path.This caused hard build failures for Hydra.
Lix doesn't create these entries on upload anymore. Instead, it only removes negative cache entries. The cache entry for a narinfo is now created the first time, Lix queries the cache for the previously uploaded store-path again.
Many thanks to ma27 for this.
-
Lix libraries can now be linked statically fj#789 cl/3775 cl/3778
Previously the pkg-config files distributed with Lix were only suitable for dynamic linkage, causing "undefined reference to…" linker errors when trying to link statically. Private dependency information has now been added to make static linkage work as expected without user intervention. In addition, relevant static libraries are now prelinked to avoid strange failures due to missing static initializers.
Many thanks to alois31 for this.
-
add description to zsh completions fj#910 cl/3632
Emit descriptions when completing args in zsh completions. This uses the descriptions we already provided in NIX_GET_COMPLETIONS.
Many thanks to matthewbauer for this.
Miscellany
-
Deprecation of CA derivations, dynamic derivations, and impure derivations fj#815
Content-addressed derivations are now deprecated and slated for removal in Lix 2.94. We're doing this because the CA derivation system has been a known cause of problems and inconsistencies, is unmaintained, habitually makes improving the store code very difficult (or blocks such improvements outright), and is beset by a number of design flaws that in our opinion cannot be fixed without a full reimplementation from zero. Dynamic derivations and impure derivations are built on the CA derivation framework, and owing to this they too are deprecated and slated for removal in another release.