!RROtHmAaQIkiJzJZZE:nixos.org

NixOS Infrastructure

380 Members
Next Infra call: 2024-07-11, 18:00 CEST (UTC+2) | Infra operational issues backlog: https://github.com/orgs/NixOS/projects/52 | See #infra-alerts:nixos.org for real time alerts from Prometheus.114 Servers

Load older messages


SenderMessageTime
8 Feb 2026
@raitobezarius:matrix.orgraitobezariusThat being said, after the hard packaging (eBPF) problems are fixed, integrating nsresourced in the sandbox is fairly easy; what is not easy is to stabilize cgroups Stabilizing UID range without cgroups is probably a bad idea albeit possible because killing process tree in Linux without cgroups is annoyingly hard, so there would be an increase of deadlocked builds if they don't terminate well in the sandbox because process group killing is well not that good21:45:14
@kieran:4d2.orgKierán joined the room.21:45:57
@raitobezarius:matrix.orgraitobezariusObviously macOS is its own open question as it does not enjoy clear system APIs to get ranges of UIDs locked properly, but that's not my department :D21:46:12
@raitobezarius:matrix.orgraitobezarius out of completeness, artemist did the work for CppNix: https://github.com/NixOS/nix/pull/15103 21:57:42
@raitobezarius:matrix.orgraitobezarius(but i think their intent behind this is unprivileged nix-daemons)21:58:07
9 Feb 2026
@tfc:matrix.orgtfc joined the room.00:18:36
@imincik:matrix.orgIvan Mincik (imincik) changed their profile picture.06:05:39
@k900:0upti.meK900Running an unstable-small eval for kernel 6.1908:17:53
@k900:0upti.meK900 @hexa (signing key rotation when) channel update failed, can you poke it? 09:49:51
@hexa:lossy.networkhexa (signing key rotation when)Hm?09:50:37
@k900:0upti.meK900update-nixos-unstable-small.service09:50:45
@k900:0upti.meK900Not sure why it failed09:50:48
@hexa:lossy.networkhexa (signing key rotation when)And yet no alert09:51:17
@hexa:lossy.networkhexa (signing key rotation when)Give me a minute09:51:33
@k900:0upti.meK900Maybe not processed yet09:51:42
@k900:0upti.meK900I'm just looking at grafana09:51:48
@hexa:lossy.networkhexa (signing key rotation when)
To https://github.com/NixOS/nixpkgs.git
 ! [remote rejected]           69ecaffa7deb4daa5a83cb813f8251665e3af93e -> nixos-unstable-small (Internal Server Error)
error: failed to push some refs to 'https://github.com/NixOS/nixpkgs.git'
Command failed with code (1) errno (0).
09:53:33
@hexa:lossy.networkhexa (signing key rotation when)it went through09:54:17
@k900:0upti.meK900Huh09:56:06
@hexa:lossy.networkhexa (signing key rotation when)after the restart09:56:28
@k900:0upti.meK900Oh09:56:32
@k900:0upti.meK900I thought it said internal error and went through anyway09:56:41
@k900:0upti.meK900https://www.githubstatus.com/incidents/ffz2k716tlhx10:03:32
@k900:0upti.meK900Github is on fire10:03:34
@k900:0upti.meK900AGAIN.10:03:36
@sinan:sinanmohd.comsinanmonitoring the situation 🍿11:54:02
10 Feb 2026
@dgrig:erethon.comdgrig

At some point in the past, a budget for https://tracker.security.nixos.org/ was approved by the foundation and the security tracker was deployed on a Hetzner Cloud project. We're still way below the budget limit, but we want to increase the size of the hosts (staging and prod) soon which will increase the cost and make it comparable to getting a dedicated host in Hetzner (for way more performance/€).

Is there a reason we should stay in Hetzner Cloud instead of getting a dedi? I vaguely remember someone (no idea who) saying back in late 2024 that Hetzner Cloud was easier to provision in terms of billing/permissions for the foundation and the infra team. Is this still true and a concern?

10:57:18
@vcunat:matrix.orgvcunat We do have dedicated Hetzner machines already (and added titan machine recently), so I wouldn't expect issues really. 11:11:22
@bot-wxt1221:matrix.orgBot_wxt1221图像.png
Download 图像.png
11:29:19
@bot-wxt1221:matrix.orgBot_wxt1221nixos wiki has something strange happened.11:29:28

Show newer messages


Back to Room ListRoom Version: 6