!LemuOOvbWqRXodtSsw:nixos.org

NixOS Reproducible Builds

544 Members
Report: https://reproducible.nixos.org Project progress: https://github.com/orgs/NixOS/projects/30124 Servers

Load older messages


SenderMessageTime
17 Aug 2021
@grahamc:nixos.org@grahamc:nixos.orghrm, can an IAM policy not restrict which buckets you can create invalidation for?17:52:15
@grahamc:nixos.org@grahamc:nixos.org * hrm, can an IAM policy not restrict which buckets you can create invalidations for?17:52:17
@baloo_:matrix.orgbalooI believe you can restrict with the URN17:52:45
@baloo_:matrix.orgbalooarn:aws:cloudfront::223448837225:distribution/E2JKFLGW8FADQD17:52:50
@baloo_:matrix.orgbaloothat17:52:51
@baloo_:matrix.orgbaloosomething like: https://gist.github.com/baloo/8435c1dd0a1c510848f0dd85c619eef717:56:23
@grahamc:nixos.org@grahamc:nixos.orghttps://docs.aws.amazon.com/service-authorization/latest/reference/list_amazoncloudfront.html "If the column includes a resource type, then you can specify an ARN of that type in a statement with that action."17:58:32
@grahamc:nixos.org@grahamc:nixos.orgso no subpaths but yes ARN17:58:35
@grahamc:nixos.org@grahamc:nixos.org baloo: merged & applied the changes w/ terraform to grant the privileges to do that 18:01:14
@baloo_:matrix.orgbalooha right18:04:03
@b:chreekat.netchreekat changed their display name from bryan to chreekat.19:59:06
18 Aug 2021
@baloo_:matrix.orgbalooAn error occurred (AccessDenied) when calling the CreateInvalidation operation: User: arn:aws:iam::223448837225:user/vault-token-r13y-publish-1629245456-7999 is not authorized to perform: cloudfront:CreateInvalidation on resource: arn:aws:cloudfront::223448837225:distribution/E2JKFLGW8FADQD03:58:14
@baloo_:matrix.orgbaloooh03:58:15
@baloo_:matrix.orgbaloohttps://buildkite.com/grahamc/r13y-dot-com/builds/855#54ff268f-62e5-4ec6-9f80-e8273655eeae/51-6003:58:38
@siraben:matrix.orgsiraben changed their display name from siraben to siraben (he/him).19:36:31
19 Aug 2021
@timdeh:matrix.orgnrdxp

I was trying to get a better understand on how nix manages the time for reproducible behavior, and it seems to me that time passes normally in a derivation sandbox and is then timestamped to the unix epoch after the build completes.

However, I was wondering if there might be a mechanism to freeze the time during a build and I came across datefudge, which takes a static flag -s which freezes the time to whatever you set, for example:

❯ n run datefudge -- -s "$(date)" ./foo.sh
Thu Aug 19 10:36:43 AM MDT 2021
Thu Aug 19 10:36:43 AM MDT 2021

where foo.sh is:

#!/usr/bin/env bash
date
sleep 10
date
16:49:22
@timdeh:matrix.orgnrdxpWould this add any meaningful improvement to reproducible behavior? Seems like it should be simply enough to replicate this behavior if we wanted. 16:50:14
@timdeh:matrix.orgnrdxp * Would this add any meaningful improvement to reproducible behavior? Seems like it should be simply enough to replicate if we wanted. 16:52:20
@timdeh:matrix.orgnrdxp * Would this add any meaningful improvement to reproducible behavior (seems like it would, naively)? It should be simply enough to replicate if we wanted. 16:54:38
@andi:kack.itandi-It would but it shouldn't. Packages should have a build system that doesn't care about specific times. There is already a somewhat standard env var to signal the time that should be used in e.g. binaries to display build time.16:59:14
@andi:kack.itandi-If we start changing the sandbox it is a quick win and it is nice to find impurities but really the builds need to be fixed.16:59:45
@timdeh:matrix.orgnrdxpMaybe we could use datefudge to help find impure builds then at least17:02:02
@b:chreekat.netchreekatY not both 🙂17:02:11
@timdeh:matrix.orgnrdxp I agree with you andi-, but I also feel like trying to change the world is always an uphill and losing battle. So if upstream builders won't do anything maybe we should take the initiative? 17:06:53
@andi:kack.itandi-Have we ever actually had an upstream that rejected non-nix specific reproducibility patches?17:14:18
@andi:kack.itandi-Given that Debian is leading this I don't see much of a battle17:14:33
@b:chreekat.netchreekatI mean, there are approximately 20 hojillion software packages present and future that are yet to be made reproducible17:18:14
@andi:kack.itandi-Isn't it mostly about the build system anyway?17:29:47
@timdeh:matrix.orgnrdxpIt's great to submit patches upstream, I certainly wouldn't argue against that. I just think it'd be nice behavior to have by default, since there will always be some build system somewhere that doesn't act the way we'd like. And even if we patched them all someday. Then a new one would come out shortly after and break everything again 😅17:42:49
@timdeh:matrix.orgnrdxp * It's great to submit patches upstream, I certainly wouldn't argue against that. I just think it'd be nice behavior to have by default, since there will always be some build system somewhere that doesn't act the way we'd like. And even if we patched them all someday, Then a new one would come out shortly after and break everything again 😅17:43:10

Show newer messages


Back to Room ListRoom Version: 6