!RROtHmAaQIkiJzJZZE:nixos.org

NixOS Infrastructure

391 Members
Next Infra call: 2024-07-11, 18:00 CEST (UTC+2) | Infra operational issues backlog: https://github.com/orgs/NixOS/projects/52 | See #infra-alerts:nixos.org for real time alerts from Prometheus.120 Servers

Load older messages


SenderMessageTime
8 Feb 2026
@raitobezarius:matrix.orgraitobezarius
In reply to @arianvp:matrix.org
Yeh for now this means running tests outside of nix right?
That code uses uid-range
19:52:49
@raitobezarius:matrix.orgraitobezariusSo you cannot run it outside of Nix19:53:00
@arianvp:matrix.orgArianOooh20:01:34
@ma27:nicht-so.sexyma27fwiw I think the implementation improved quite a lot with the latest few commits and doesn't walk into a wrong direction design-wise. So, IMHO it's perfectly fine to start with this and iterate on that once we actually can use nsresourced (I've heard about ideas to implement this since ~2017).20:49:57
@k900:0upti.meK900I may need to skim it again20:50:13
@ma27:nicht-so.sexyma27excuse my ignorance, but now that I think of it, how feasible is it to have nsresourced et al. inside a sandbox?20:50:42
@corngood:corngood.com@corngood:corngood.com left the room.21:23:29
@raitobezarius:matrix.orgraitobezarius
In reply to @ma27:nicht-so.sexy
excuse my ignorance, but now that I think of it, how feasible is it to have nsresourced et al. inside a sandbox?
By some alignment of all the stars, we, at Lix, need uid-range stabilized to enable xattrs in the store, coincidentally, getting nspawn for our own test suite would make us happier as well, nsresourced is already mentioned in https://git.lix.systems/lix-project/lix/issues/387#issuecomment-12929 (and this is an idea that has been floating back when the systemd crew introduced it at some ASG before that comment)
21:42:42
@raitobezarius:matrix.orgraitobezariusThat being said, after the hard packaging (eBPF) problems are fixed, integrating nsresourced in the sandbox is fairly easy; what is not easy is to stabilize cgroups Stabilizing UID range without cgroups is probably a bad idea albeit possible because killing process tree in Linux without cgroups is annoyingly hard, so there would be an increase of deadlocked builds if they don't terminate well in the sandbox because process group killing is well not that good21:45:14
@kieran:4d2.orgKierán joined the room.21:45:57
@raitobezarius:matrix.orgraitobezariusObviously macOS is its own open question as it does not enjoy clear system APIs to get ranges of UIDs locked properly, but that's not my department :D21:46:12
@raitobezarius:matrix.orgraitobezarius out of completeness, artemist did the work for CppNix: https://github.com/NixOS/nix/pull/15103 21:57:42
@raitobezarius:matrix.orgraitobezarius(but i think their intent behind this is unprivileged nix-daemons)21:58:07
22 May 2021
@grahamc:nixos.org@grahamc:nixos.org set the history visibility to "world_readable".17:01:28
@grahamc:nixos.org@grahamc:nixos.org changed the room name to "" from "".17:01:28
@cole-h:matrix.orgcole-h joined the room.17:03:05
@andi:kack.itandi- joined the room.17:18:59
@sandro:supersandro.deSandro joined the room.17:21:35
@hexa:lossy.networkhexa joined the room.17:22:33
@7c6f434c:nitro.chat7c6f434c joined the room.17:24:51
@colemickens:matrix.orgcolemickens 🏳️‍🌈 joined the room.17:26:27
@qyliss:fairydust.spaceAlyssa Ross joined the room.18:02:00
@toonn:matrix.orgtoonn joined the room.18:54:47
23 May 2021
@lukegb:zxcvbnm.ninjalukegb (he/him) joined the room.00:25:48
@sternenseemann:systemli.orgsterni joined the room.00:32:36
@lukegb:zxcvbnm.ninjalukegb (he/him) changed their display name from lukegb to lukegb (he/him).01:33:07
@sumner:sumnerevans.comsumner joined the room.04:51:52
@domenkozar:matrix.orgDomen Kožar joined the room.11:04:44
@v:anomalous.euV joined the room.11:26:50
@danielle:fairydust.spacedanielle joined the room.12:06:13

Show newer messages


Back to Room ListRoom Version: 6