check-meta: add allowBrokenPredicate #340081
Open
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Similar to allowUnfreePredicate, sometimes users may want to only allow specific broken packages to avoid unexpectedly building others.
Some packages may be marked broken for policy reasons (lack of upstream support) or due to broken or unsupported functionality that the user may not care about. An example might be forcing ZFS to build on a newer, unsupported Kernel where compilation succeeds and the user is willing to take the risk of being unsupported.
I think the larger topic for discussion would be: should
broken
be used in this way? I.e., shouldbroken
only be used for packages that actually fail to build or fundamentally work at all, or is it okay to use it for things that might work but are explicitly unsupported? The manual forbroken
doesn’t say much about when to use it.If the answer is that
broken
should only be used for things that fail to build or fundamentally work, then perhaps this PR doesn’t make sense as there’s little use-case for bypassing broken on a per-package basis in one’s config. It does bring up the question, though: how should we then mark packages whose config is unsupported? Back to the ZFS example, running a filesystem on Kernels not explicitly tested and supported by upstream seems like a bad idea by default, and users should have to opt-in to that risk in some way.Description of changes
Things done
Tested with
nix.conf
? (See Nix manual)sandbox = relaxed
sandbox = true
nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD"
. Note: all changes have to be committed, also see nixpkgs-review usage./result/bin/
)Add a 👍 reaction to pull requests you find important.