12 Apr 2023 |
@theophane:hufschmitt.net | Si I think we'll have to discuss a plan together and decide who would do that (or ask for volunteers to help doing it) | 14:42:25 |
17 Apr 2023 |
| GenericNerdyUsername joined the room. | 22:58:31 |
GenericNerdyUsername | I found an installer related bug a while back, but just remembered that I didnt report it anywhere, it may or may not still exist | 23:01:40 |
GenericNerdyUsername |
When using nix without internet, it disables substituters, which normally makes sense | 23:01:48 |
GenericNerdyUsername | But during installs, you have a substituter (the install media) which can be accessed without the internet, which gets disabled anyway | 23:02:01 |
GenericNerdyUsername | im not really sure where to go from here | 23:02:13 |
GenericNerdyUsername | i dont even know if the bug is still around | 23:02:19 |
20 Apr 2023 |
| Federico Damián Schonborn changed their display name from Federico Damián Schonborn to Federico Schonborn. | 01:02:32 |
26 Apr 2023 |
@grahamc:nixos.org | oops, sorry I'm late @room -- I'm opening up a room now | 14:02:00 |
@grahamc:nixos.org | * oops, sorry I'm late @room -- I'm opening up the room now | 14:02:12 |
| graham joined the room. | 14:04:46 |
graham | https://md.darmstadt.ccc.de/KhuRgW6qRSWSZAbNlKWZBQ | 14:05:14 |
abathur | https://github.com/NixOS/nix/issues/8250 and https://github.com/DeterminateSystems/nix-installer/issues/370 | 14:11:22 |
graham | ❯ curl -Ikvvv https://untrusted-root.badssl.com/
* Trying 104.154.89.105:443...
* Connected to untrusted-root.badssl.com (104.154.89.105) port 443 (#0)
* ALPN: offers h2,http/1.1
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256
* ALPN: server accepted http/1.1
* Server certificate:
* subject: C=US; ST=California; L=San Francisco; O=BadSSL; CN=*.badssl.com
* start date: Apr 24 00:01:45 2023 GMT
* expire date: Apr 23 00:01:45 2025 GMT
* issuer: C=US; ST=California; L=San Francisco; O=BadSSL; CN=BadSSL Untrusted Root Certificate Authority
* SSL certificate verify result: self-signed certificate in certificate chain (19), continuing anyway.
* using HTTP/1.1
> HEAD / HTTP/1.1
> Host: untrusted-root.badssl.com
> User-Agent: curl/8.0.1
> Accept: */*
>
< HTTP/1.1 200 OK
HTTP/1.1 200 OK
< Server: nginx/1.10.3 (Ubuntu)
Server: nginx/1.10.3 (Ubuntu)
< Date: Wed, 26 Apr 2023 14:18:04 GMT
Date: Wed, 26 Apr 2023 14:18:04 GMT
< Content-Type: text/html
Content-Type: text/html
< Content-Length: 600
Content-Length: 600
< Last-Modified: Mon, 24 Apr 2023 00:02:00 GMT
Last-Modified: Mon, 24 Apr 2023 00:02:00 GMT
< Connection: keep-alive
Connection: keep-alive
< ETag: "6445c6f8-258"
ETag: "6445c6f8-258"
< Cache-Control: no-store
Cache-Control: no-store
< Accept-Ranges: bytes
Accept-Ranges: bytes
<
* Connection #0 to host untrusted-root.badssl.com left intact
| 14:18:16 |
graham | not so useful:
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN: server accepted h2
* Server certificate:
* subject: CN=*.google.com
* start date: Apr 3 08:17:58 2023 GMT
* expire date: Jun 26 08:17:57 2023 GMT
* issuer: C=US; O=Google Trust Services LLC; CN=GTS CA 1C3
* SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
* using HTTP/2
* h2h3 [:method: HEAD]
| 14:19:13 |
graham | openssl s_client -showcerts -servername untrusted-root.badssl.com -connect untrusted-root.badssl.com:443
| 14:21:36 |
graham | * echo | openssl s_client -showcerts -servername untrusted-root.badssl.com -connect untrusted-root.badssl.com:443
| 14:23:07 |
graham | * echo | openssl s_client -showcerts -servername nixos.org -connect nixos.org8:443
| 14:23:16 |
graham | * echo | openssl s_client -showcerts -servername nixos.org -connect nixos.org:443
| 14:23:19 |
graham | https://github.com/DeterminateSystems/nix-installer/pull/428 | 14:27:59 |
abathur | https://github.com/NixOS/nix/commit/2384d360839e27edb3c928da858ec911415c8b4d | 14:34:03 |
Eelco | The default profile used by nix profile is $HOME/.nix-profile , which, if it does not exist, is created as a symlink to
/nix/var/nix/profiles/default if Nix is invoked by the
root user, or ${XDG_STATE_HOME-$HOME/.local/state}/nix/profiles/profile otherwise. | 14:34:21 |
27 Apr 2023 |
abathur | user claiming to have a post-install connectivity problem responded https://github.com/NixOS/nix/issues/8250#issuecomment-1525872514 | 16:17:15 |
| @sandro:supersandro.de left the room. | 16:26:23 |
28 Apr 2023 |
abathur | grahamAna They updated again with output after installing Nix https://github.com/NixOS/nix/issues/8250#issuecomment-1526911700 | 13:07:53 |
1 May 2023 |
| raitobezarius joined the room. | 19:26:34 |
| teto joined the room. | 19:26:58 |
| hexa joined the room. | 19:29:24 |
raitobezarius | Hello there, I stumbled recently on https://github.com/DeterminateSystems/nix-installer/pull/304 which seems to indicate that the DetSys's Nix installer does not support channels anymore, if I am not wrong, this installer is supposed to become the default for the official Nix installer. Is there a plan to remove channels support by default at installation time in the future?
| 19:30:30 |
raitobezarius | * Hello there, I stumbled recently on https://github.com/DeterminateSystems/nix-installer/pull/304 which seems to indicate that the DetSys's Nix installer does not support channels anymore, if I am not wrong, this installer is supposed to become the default for the official Nix installer. Is there a plan to remove channels support by default at installation time in the future in the official installer? | 19:31:00 |