!RROtHmAaQIkiJzJZZE:nixos.org

NixOS Infrastructure

386 Members
Next Infra call: 2024-07-11, 18:00 CEST (UTC+2) | Infra operational issues backlog: https://github.com/orgs/NixOS/projects/52 | See #infra-alerts:nixos.org for real time alerts from Prometheus.118 Servers

Load older messages


SenderMessageTime
8 Feb 2026
@arianvp:matrix.orgArianOooh20:01:34
@ma27:nicht-so.sexyma27fwiw I think the implementation improved quite a lot with the latest few commits and doesn't walk into a wrong direction design-wise. So, IMHO it's perfectly fine to start with this and iterate on that once we actually can use nsresourced (I've heard about ideas to implement this since ~2017).20:49:57
@k900:0upti.meK900I may need to skim it again20:50:13
@ma27:nicht-so.sexyma27excuse my ignorance, but now that I think of it, how feasible is it to have nsresourced et al. inside a sandbox?20:50:42
@corngood:corngood.com@corngood:corngood.com left the room.21:23:29
@raitobezarius:matrix.orgraitobezarius
In reply to @ma27:nicht-so.sexy
excuse my ignorance, but now that I think of it, how feasible is it to have nsresourced et al. inside a sandbox?
By some alignment of all the stars, we, at Lix, need uid-range stabilized to enable xattrs in the store, coincidentally, getting nspawn for our own test suite would make us happier as well, nsresourced is already mentioned in https://git.lix.systems/lix-project/lix/issues/387#issuecomment-12929 (and this is an idea that has been floating back when the systemd crew introduced it at some ASG before that comment)
21:42:42
@raitobezarius:matrix.orgraitobezariusThat being said, after the hard packaging (eBPF) problems are fixed, integrating nsresourced in the sandbox is fairly easy; what is not easy is to stabilize cgroups Stabilizing UID range without cgroups is probably a bad idea albeit possible because killing process tree in Linux without cgroups is annoyingly hard, so there would be an increase of deadlocked builds if they don't terminate well in the sandbox because process group killing is well not that good21:45:14
@kieran:4d2.orgKierán joined the room.21:45:57
@raitobezarius:matrix.orgraitobezariusObviously macOS is its own open question as it does not enjoy clear system APIs to get ranges of UIDs locked properly, but that's not my department :D21:46:12
@raitobezarius:matrix.orgraitobezarius out of completeness, artemist did the work for CppNix: https://github.com/NixOS/nix/pull/15103 21:57:42
@raitobezarius:matrix.orgraitobezarius(but i think their intent behind this is unprivileged nix-daemons)21:58:07
9 Feb 2026
@tfc:matrix.orgtfc joined the room.00:18:36
@imincik:matrix.orgIvan Mincik (imincik) changed their profile picture.06:05:39
@k900:0upti.meK900Running an unstable-small eval for kernel 6.1908:17:53
@k900:0upti.meK900 @hexa (signing key rotation when) channel update failed, can you poke it? 09:49:51
@hexa:lossy.networkhexaHm?09:50:37
@k900:0upti.meK900update-nixos-unstable-small.service09:50:45
@k900:0upti.meK900Not sure why it failed09:50:48
@hexa:lossy.networkhexaAnd yet no alert09:51:17
@hexa:lossy.networkhexaGive me a minute09:51:33
@k900:0upti.meK900Maybe not processed yet09:51:42
@k900:0upti.meK900I'm just looking at grafana09:51:48
@hexa:lossy.networkhexa
To https://github.com/NixOS/nixpkgs.git
 ! [remote rejected]           69ecaffa7deb4daa5a83cb813f8251665e3af93e -> nixos-unstable-small (Internal Server Error)
error: failed to push some refs to 'https://github.com/NixOS/nixpkgs.git'
Command failed with code (1) errno (0).
09:53:33
@hexa:lossy.networkhexait went through09:54:17
@k900:0upti.meK900Huh09:56:06
@hexa:lossy.networkhexaafter the restart09:56:28
@k900:0upti.meK900Oh09:56:32
@k900:0upti.meK900I thought it said internal error and went through anyway09:56:41
@k900:0upti.meK900https://www.githubstatus.com/incidents/ffz2k716tlhx10:03:32
@k900:0upti.meK900Github is on fire10:03:34

Show newer messages


Back to Room ListRoom Version: 6