!RROtHmAaQIkiJzJZZE:nixos.org

NixOS Infrastructure

383 Members
Next Infra call: 2024-07-11, 18:00 CEST (UTC+2) | Infra operational issues backlog: https://github.com/orgs/NixOS/projects/52 | See #infra-alerts:nixos.org for real time alerts from Prometheus.118 Servers

Load older messages


SenderMessageTime
30 May 2025
@k900:0upti.meK900I don't know14:05:21
@ss:someonex.netSomeoneSerge (back on matrix)
In reply to @k900:0upti.me
We can't do anything as long as nix.dev exists as configured
It doesn't just passthrough headers?
14:07:29
@k900:0upti.meK900It does not14:08:32
@adam:robins.wtfadamcstephenshttps://github.com/NixOS/nix.dev/blob/42eba9d2324918ddac16144399de501d58c9247d/_redirects#L40-L4114:09:20
@emma:rory.gay@emma:rory.gay https://cgit.rory.gay/BlockScrapersC.git/tree/template/p_user_agent_legacy_browser.txt
https://cgit.rory.gay/BlockScrapersC.git/tree/template/p_user_agent_legacy_os.txt
can confirm :), this is all based on real observations
14:09:27
@adam:robins.wtfadamcstephensit looks like changing 200 to 301 in the _redirects file would make them actual redirects instead of proxies. i can't tell whether the production is deployed to cloudflare pages or netlify, but this is the same regardless14:10:10
@k900:0upti.meK900This will create a lot of unnecessary load on Hydra14:10:34
@hexa:lossy.networkhexanetlify14:10:39
@k900:0upti.meK900Because Hydra is terribly slow at pulling out artifacts14:10:45
@qyliss:fairydust.spaceAlyssa RossSomebody suggested just checking if a Netlify header is set and bypassing anubis if so somewhere14:11:18
23 Sep 2025
@rick:matrix.ciphernetics.nlRick (Mindavi) left the room.07:36:31
30 May 2025
@adam:robins.wtfadamcstephensThen redirect them to nixos.org manal?14:11:21
@adam:robins.wtfadamcstephensWhy is it going directly to hydra anyway...14:11:38
@hexa:lossy.networkhexayeah, it could just use the latest version from the cache14:13:09
@adam:robins.wtfadamcstephensahh, this is the nix manual. https://nixos.org/manual/nix/unstable/ redirects to nix.dev 🫠14:13:48
@hexa:lossy.networkhexait is just that hydra provides a stable link and that made it easy to proxy that14:13:49
@adam:robins.wtfadamcstephenshttps://docs.netlify.com/routing/redirects/rewrites-proxies/#proxy-to-another-service14:17:14
@adam:robins.wtfadamcstephensyes, custom headers are an option for proxying14:18:24
@adam:robins.wtfadamcstephensor the request can be signed, but not sure what that entails on the other end14:18:51
@adam:robins.wtfadamcstephensIn theory, something like this would give us a header we could trust on the hydra side: https://github.com/NixOS/nix.dev/compare/master...adamcstephens:nix.dev:random-header?expand=115:00:36
@qyliss:fairydust.spaceAlyssa RossI don't think header forging should matter very much — if the scraper bots were smart they'd just use a User-Agent that doesn't look like a browser to anubis.15:26:18
@qyliss:fairydust.spaceAlyssa Ross(If I'm understanding what you mean by trust)15:26:43
@hexa:lossy.networkhexathe anubis module unfortunately looks like … use the default bot policy or write your own15:28:52
@hexa:lossy.networkhexanot sure how if it offers a knob to extend it15:29:04
@hexa:lossy.networkhexa also not sure where botPolicy gets used https://github.com/NixOS/nixpkgs/blob/96ec055edbe5ee227f28cdbc3f1ddf1df5965102/nixos/modules/services/networking/anubis.nix#L58 15:37:52
@hexa:lossy.networkhexaI can't find it referenced anywhere15:38:10
@hexa:lossy.networkhexaah yeah, https://github.com/NixOS/nixpkgs/pull/40162215:38:57
@adam:robins.wtfadamcstephensmaybe "check" or "whitelist" would have been better terms. i'm not too worried about bots forging, but was thinking a known header we could explicitly validate is set on the anubis side.17:29:55
@adam:robins.wtfadamcstephensany header would probably work. i put a random string in my example because 🤷17:30:48
@hexa:lossy.networkhexayeah, we can get more creative once bots adapt to these things17:31:40

Show newer messages


Back to Room ListRoom Version: 6