!BgJZHVOYkwVcEKLAyM:nixos.org

NixOS Deployments

1194 Members
NixOS Deployment tooling298 Servers

Load older messages


SenderMessageTime
27 May 2025
@federicodschonborn:matrix.orgThe Worm 🏳️‍🌈 (he/they) changed their display name from LEGO® Worm™ (Asbestos Flavored!) to LEGO® Worm™ (Now Only 1 krad!).14:42:36
@unlimitedsola:matrix.org@unlimitedsola:matrix.org left the room.15:45:38
@txrx:matrix.orgtxrx joined the room.19:35:54
@txrx:matrix.orgtxrx If I have a flake that specifies more than one system, and I want to share a string (eg ssh key, ip address, etc) between configs for multiple systems, is the best thing to create a shared module with something like options.foo = { sharedString = lib.mkOption { ... }; };, and then refer to config.foo.sharedString? I keep second guessing this because I'm specifying what is in my case a constant as a configurable option. 19:43:06
@kongrooparadox:matrix.orgkongrooparadox

an option is useful if you are going to override the value when you call the module
for a shared variable, here is what I do with my authorized ssh keys for example.

# ssh.nix
{
  keys = [ "pubKey1" "pubKey2"]; 
}

And you import the keys in your config :
users.users.root.openssh.authorizedKeys.keys = (import ./relative-path/to/ssh.nix).keys;

20:56:10
@kongrooparadox:matrix.orgkongrooparadox *

an option is useful if you are going to override the value when you call the module
for a shared variable, here is what I do with my authorized ssh keys for example.

# ssh.nix
{
  keys = [ "pubKey1" "pubKey2" ]; 
}

And you import the keys in your config :
users.users.root.openssh.authorizedKeys.keys = (import ./relative-path/to/ssh.nix).keys;

20:57:42
28 May 2025
@sylonin:matrix.orgSylonin joined the room.03:02:01
29 May 2025
@aadniz:knaben.orgAdnan Zaman changed their profile picture.12:29:23
@aadniz:knaben.orgAdnan Zaman changed their profile picture.12:33:14
@razterer:matrix.redalder.orgraul changed their display name from razterer to raul.21:19:00
30 May 2025
@adeci:matrix.org. changed their display name from adeci to ..00:39:16
@adeci:matrix.org. changed their profile picture.00:39:51
@gzhao:matrix.geonat.nzGeorge joined the room.12:14:32
@bytebandit:tac.lolDerivationDingus set a profile picture.19:53:25
@bytebandit:tac.lolDerivationDingus changed their profile picture.19:54:41
@finga:agora.onders.orgfinga I just upgraded my server to 25.05 and there I have some containers, one for matrix-synapse, one for xandikos (a webdav server) and one for a nginx proxy which proxies matrix-synapse and xandikos. now since the update the nginx container fails to start, the log is full with "A start job is running for Renew ACME certificate for..." when I stop the acme-setup.service on the nginx container before the container fails due to timeout everything seems fine so far... Is this a known issue? What can I do to fix this? 23:59:09
31 May 2025
@finga:agora.onders.orgfingaI forgot to mention, when I remove the vhost for matrix but keep the one for xandikos, everything works fine as expected.00:00:30
@gotha:matrix.orggothaif anyone is curious what is going on here, I was running a VM with 1GB of RAM and no swap and it seems like it was running out of memory nixos-rebuild was just dying without error .. adding a swapfile fixed it 10:48:55
@gotha:matrix.orggotha* if anyone is curious what is going on here, I was running a VM with 1GB of RAM and no swap and it seems like it was running out of memory nixos-rebuild was just dying without error .. adding a swapfile fixed it I am not sure if better error message is even possible in this scenario ...10:49:30
@k900:0upti.meK900Yeah10:49:32
@k900:0upti.meK900It's not really possible10:49:36
@k900:0upti.meK900But you should see an OOM kill in dmesg10:49:40
@k900:0upti.meK900A nixpkgs eval needs ~3GB of RAM10:49:44
@chipset:boykisser.infochipset joined the room.13:23:40
@iamrajivranjansingh:matrix.orgRajiv Singh joined the room.17:10:57
@jyrama:garm.jrd.fijyramaNot sure if this is possible with DO but my own recipe for quite some time had been to basically boot whichever nix included thing and then incrementally (possibly after zero steps, depending if you kexec etc) copying parts of a nix store from an another machine with many GBs of RAM to that lower spec VM of mine.17:30:26
@jyrama:garm.jrd.fijyramaIf you decide you never need to eval on the target machine itself you can go with quite a low RAM17:31:10
@jyrama:garm.jrd.fijyrama In any other case I personally recommend > 4 Gb due the eval, as K900 mentioned 17:32:05
@tiferrei:matrix.orgtiferrei joined the room.20:52:01
@james:gec.imJames Coleman joined the room.21:00:11

Show newer messages


Back to Room ListRoom Version: 6