!RROtHmAaQIkiJzJZZE:nixos.org

NixOS Infrastructure

384 Members
Next Infra call: 2024-07-11, 18:00 CEST (UTC+2) | Infra operational issues backlog: https://github.com/orgs/NixOS/projects/52 | See #infra-alerts:nixos.org for real time alerts from Prometheus.118 Servers

Load older messages


SenderMessageTime
30 May 2025
@ss:someonex.netSomeoneSerge (back on matrix) * Mozilla/5.0 (X11; Linux x86\_64; rv:136.0) Gecko/20100101 Firefox/136.0 13:47:29
@hexa:lossy.networkhexa136.0 would be from 2025-03-0413:48:11
@hexa:lossy.networkhexaand 136.0.4 from 2025-03-2713:48:27
@ss:someonex.netSomeoneSerge (back on matrix)Why?13:49:06
@hexa:lossy.networkhexabecause bots are advertising all kinds of random browser versions13:49:27
@ss:someonex.netSomeoneSerge (back on matrix)Alright, lynx seems to work, at least that13:49:29
@hexa:lossy.networkhexaso we only allow semi recent ones to reduce the set of bots we allow through13:49:48
@hexa:lossy.networkhexawe deployed anubis some time ago, but it broke nix.dev reverse proxying the manual from hydra 🥲13:50:18
@hexa:lossy.networkhexaso that was rolled back13:50:35
@ss:someonex.netSomeoneSerge (back on matrix)👌 I wonder if scrapers were creating significant load, but I'll read the chat history later13:52:21
@hexa:lossy.networkhexathey called every possible api endpoint and eventually broke hydra-server, so that a manual restart was required13:52:52
@hexa:lossy.networkhexa* they called every possible endpoint and eventually broke hydra-server, so that a manual restart was required13:53:03
@hexa:lossy.networkhexaideally hydra-server would be slightly more robust, but until then we're employing simpler measures13:53:42
@ss:someonex.netSomeoneSerge (back on matrix)What was the name of that zero knowledge hcapcha pass extension? We could do that but with discourse/github id instead of capcha...14:00:10
@k900:0upti.meK900 We can't do anything as long as nix.dev exists as configured 14:01:42
@k900:0upti.meK900Because it can't do auth14:01:47
@k900:0upti.meK900 Any kind of auth 14:01:54
@k900:0upti.meK900It's just a braindead HTTP proxy14:02:00
@vcunat:matrix.orgVladimír ČunátWe could exempt parts needed by nix.dev, as a compromise.14:02:20
@vcunat:matrix.orgVladimír Čunát(at least in theory)14:02:45
@adam:robins.wtfadamcstephenscan it be configured to send a header?14:03:18
@k900:0upti.meK900I don't know14:05:21
@ss:someonex.netSomeoneSerge (back on matrix)
In reply to @k900:0upti.me
We can't do anything as long as nix.dev exists as configured
It doesn't just passthrough headers?
14:07:29
@k900:0upti.meK900It does not14:08:32
@adam:robins.wtfadamcstephenshttps://github.com/NixOS/nix.dev/blob/42eba9d2324918ddac16144399de501d58c9247d/_redirects#L40-L4114:09:20
@emma:rory.gay@emma:rory.gay https://cgit.rory.gay/BlockScrapersC.git/tree/template/p_user_agent_legacy_browser.txt
https://cgit.rory.gay/BlockScrapersC.git/tree/template/p_user_agent_legacy_os.txt
can confirm :), this is all based on real observations
14:09:27
@adam:robins.wtfadamcstephensit looks like changing 200 to 301 in the _redirects file would make them actual redirects instead of proxies. i can't tell whether the production is deployed to cloudflare pages or netlify, but this is the same regardless14:10:10
@k900:0upti.meK900This will create a lot of unnecessary load on Hydra14:10:34
@hexa:lossy.networkhexanetlify14:10:39
@k900:0upti.meK900Because Hydra is terribly slow at pulling out artifacts14:10:45

Show newer messages


Back to Room ListRoom Version: 6