!QCCCSJHEsTIfozrZxz:nixos.org

Nix + Go

240 Members
Go packaging for and with Nixpkgs. | Be excellent to each other.50 Servers

You have reached the beginning of time (for this room).


SenderMessageTime
5 Apr 2024
@qbit:tapenet.org@qbit:tapenet.orgyou can add some stuff to nix.conf.. but that's not very reproducible across a team14:30:11
@qbit:tapenet.org@qbit:tapenet.org look for access-tokens in man nix.conf 14:30:53
@frederic:scs.ems.hostFrédéric Christ 🌴 17.05.
In reply to @qbit:tapenet.org
you can add some stuff to nix.conf.. but that's not very reproducible across a team
That would be a problem. I'd favour a solution that works on dev machines as well as in pipelines.
14:43:44
@qbit:tapenet.org@qbit:tapenet.orgthat'd be vendor afaik14:44:08
@frederic:scs.ems.hostFrédéric Christ 🌴 17.05. For rust, I think crane solved that very well. Haven't had any issues with private repositories there yet. 15:27:00
@frederic:scs.ems.hostFrédéric Christ 🌴 17.05. * qbit: For rust, I think crane solved that very well. Haven't had any issues with private repositories there yet. 15:27:06
@qbit:tapenet.org@qbit:tapenet.orgi think there are other tools for go to do similar.. but I am not familiar with them15:27:48
@frederic:scs.ems.hostFrédéric Christ 🌴 17.05. There's gomod2nix but it seems a bit unmaintained. 15:30:23
@diamondburned:matrix.orgDiamond (it/she)I believe it is possible to enforce ssh info via env vars but that's impure 15:30:35

Show newer messages


Back to Room ListRoom Version: 9