!RROtHmAaQIkiJzJZZE:nixos.org

NixOS Infrastructure

382 Members
Next Infra call: 2024-07-11, 18:00 CEST (UTC+2) | Infra operational issues backlog: https://github.com/orgs/NixOS/projects/52 | See #infra-alerts:nixos.org for real time alerts from Prometheus.114 Servers

Load older messages


SenderMessageTime
17 Feb 2026
@julienmalka:matrix.orgJulien Would it cause any issue to the infra team if the nixos project took ownership of nixpkgs-update ? 20:27:55
@julienmalka:matrix.orgJulienIf I understand correctly, short term that would involve just transfering the server(s) to our hetzner account20:28:44
@julienmalka:matrix.orgJulien Maybe some context here: with potential unstability in the short-term future of nix-community, SC had been contacted to recommend nixpkgs-update migrates to the NixOS org. 20:39:02
@hexa:lossy.networkhexa (signing key rotation when)https://github.com/orgs/nix-community/discussions/2132 is the related discussion at nix-community23:16:44
@hexa:lossy.networkhexa (signing key rotation when)We certainly need to make sure nix-update keeps working23:17:10
@hexa:lossy.networkhexa (signing key rotation when)There is no Haskell knowledge in the infra team from what I know.23:17:34
@hexa:lossy.networkhexa (signing key rotation when)But maintaining another machine should not be a problem23:18:28
@hexa:lossy.networkhexa (signing key rotation when) We will stop building into nixpkgs/{unstable,staging-next} for x86_64-darwin after 26.05 is branched off. This is in agreement with the relevant people who maintain Darwin support. 23:43:49
@winter:catgirl.cloudWinterexciting!23:44:43
@hexa:lossy.networkhexa (signing key rotation when) We'll still keep building x86_64-darwin for 25.11 and 26.05 until their relevant EOL dates. 23:45:25
18 Feb 2026
@julienmalka:matrix.orgJulien hexa (signing key rotation when): I am interpreting your answer as: no short term blockage to take ownership of the deployment. I agree that take ownership of the maintenance of the software is something else. 10:01:22
@julienmalka:matrix.orgJulienGreat thanks!10:03:17
@hexa:lossy.networkhexa (signing key rotation when)We need someone to update the RFC39 tooling. GitHub has deprecated the API we use to manage team members and the GitHub bindings (hubcaps) are unmaintained since 2020.16:22:33
@hexa:lossy.networkhexa (signing key rotation when)https://github.com/NixOS/rfc3916:22:41
@hexa:lossy.networkhexa (signing key rotation when)also all of the dependencies are stuck in like 201816:23:58
@emilazy:matrix.orgemilyI have some thoughts on the RFC 39 things I plan to post soon16:24:13
@hexa:lossy.networkhexa (signing key rotation when)You mean the process?16:24:38
@emilazy:matrix.orgemilyit is probably a bad idea to have a long-lived token that powerful lying around. it probably makes sense to do it from within GHA or to move to a more self-service model where any committer can invite people to the maintainers team and merging new maintainers blocks on that16:25:16
@emilazy:matrix.orgemily(I believe that the rfc39 bot could most likely arbitrarily make any GitHub user committer right now?)16:26:01
@hexa:lossy.networkhexa (signing key rotation when)No idea, I never looked at that token16:27:30
@hexa:lossy.networkhexa (signing key rotation when)But given that no bot account has the maintainer role on the maintainers team, probably16:27:54
@hexa:lossy.networkhexa (signing key rotation when)hm, it's an app apparently16:30:31
19 Feb 2026
@toonn:matrix.orgtoonn This comment does claim that the app only needs `Members: Read and Write` permissions, https://github.com/NixOS/rfc39/blob/master/src/main.rs#L42-L46. 14:08:00
@toonn:matrix.orgtoonn emily: I think that at least addresses your concern about permissions? 14:08:29
@emilazy:matrix.orgemilyI'm pretty sure "Members: Write" is the permission that lets you make anyone a Nixpkgs committer.14:11:04
@toonn:matrix.orgtoonn Ah, it's org-level, not team-level permissions? That makes sense, I guess. Wouldn't GHA require the same privilege level though? 14:14:54
@emilazy:matrix.orgemilyyeah, but all changes to our GHA machinery go through our normal review, and if tokens leak unexpectedly from GHA then GitHub has bigger problems 14:39:40
@hexa:lossy.networkhexa (signing key rotation when)I'14:45:05
@hexa:lossy.networkhexa (signing key rotation when)* I'm super fine with giving it up14:45:09
@toonn:matrix.orgtoonn Hmm, looks like a GitHub App is the only way to get the required permissions, "However, the GITHUB_TOKEN can only access resources within the workflow's repository. If you need to access additional resources, such as resources in an organization or in another repository, you can use a GitHub App." 16:01:06

Show newer messages


Back to Room ListRoom Version: 6