!RROtHmAaQIkiJzJZZE:nixos.org

NixOS Infrastructure

386 Members
Next Infra call: 2024-07-11, 18:00 CEST (UTC+2) | Infra operational issues backlog: https://github.com/orgs/NixOS/projects/52 | See #infra-alerts:nixos.org for real time alerts from Prometheus.120 Servers

Load older messages


SenderMessageTime
30 May 2025
@qyliss:fairydust.spaceAlyssa RossSomebody suggested just checking if a Netlify header is set and bypassing anubis if so somewhere14:11:18
23 Sep 2025
@rick:matrix.ciphernetics.nlRick (Mindavi) left the room.07:36:31
30 May 2025
@adam:robins.wtfadamcstephensThen redirect them to nixos.org manal?14:11:21
@adam:robins.wtfadamcstephensWhy is it going directly to hydra anyway...14:11:38
@hexa:lossy.networkhexayeah, it could just use the latest version from the cache14:13:09
@adam:robins.wtfadamcstephensahh, this is the nix manual. https://nixos.org/manual/nix/unstable/ redirects to nix.dev 🫠14:13:48
@hexa:lossy.networkhexait is just that hydra provides a stable link and that made it easy to proxy that14:13:49
@adam:robins.wtfadamcstephenshttps://docs.netlify.com/routing/redirects/rewrites-proxies/#proxy-to-another-service14:17:14
@adam:robins.wtfadamcstephensyes, custom headers are an option for proxying14:18:24
@adam:robins.wtfadamcstephensor the request can be signed, but not sure what that entails on the other end14:18:51
@adam:robins.wtfadamcstephensIn theory, something like this would give us a header we could trust on the hydra side: https://github.com/NixOS/nix.dev/compare/master...adamcstephens:nix.dev:random-header?expand=115:00:36
@qyliss:fairydust.spaceAlyssa RossI don't think header forging should matter very much — if the scraper bots were smart they'd just use a User-Agent that doesn't look like a browser to anubis.15:26:18
@qyliss:fairydust.spaceAlyssa Ross(If I'm understanding what you mean by trust)15:26:43
@hexa:lossy.networkhexathe anubis module unfortunately looks like … use the default bot policy or write your own15:28:52
@hexa:lossy.networkhexanot sure how if it offers a knob to extend it15:29:04
@hexa:lossy.networkhexa also not sure where botPolicy gets used https://github.com/NixOS/nixpkgs/blob/96ec055edbe5ee227f28cdbc3f1ddf1df5965102/nixos/modules/services/networking/anubis.nix#L58 15:37:52
@hexa:lossy.networkhexaI can't find it referenced anywhere15:38:10
@hexa:lossy.networkhexaah yeah, https://github.com/NixOS/nixpkgs/pull/40162215:38:57
@adam:robins.wtfadamcstephensmaybe "check" or "whitelist" would have been better terms. i'm not too worried about bots forging, but was thinking a known header we could explicitly validate is set on the anubis side.17:29:55
@adam:robins.wtfadamcstephensany header would probably work. i put a random string in my example because 🤷17:30:48
@hexa:lossy.networkhexayeah, we can get more creative once bots adapt to these things17:31:40
@tpw_rules:matrix.orgtpw_rulesRedacted or Malformed Event22:21:14
@hexa:lossy.networkhexanot infra related, is it? 🤔22:22:12
@tpw_rules:matrix.orgtpw_rulesRedacted or Malformed Event22:24:29
@hexa:lossy.networkhexa #nix-community:nixos.org 22:24:46
@hexa:lossy.networkhexa adamcstephens: thanks, I PRed your proposed change 23:45:55
@hexa:lossy.networkhexaand prepared to reapply anubis https://github.com/NixOS/infra/pull/70323:46:15
31 May 2025
@ethancedwards8:matrix.orgethancedwards8 joined the room.02:54:05
@trofi:matrix.org@trofi:matrix.org left the room.13:46:57
@nocturnalnerd:matrix.orgKyle Robinson joined the room.19:43:21

Show newer messages


Back to Room ListRoom Version: 6