| 8 May 2026 |
hexa |  Download | 13:19:25 |
hexa |  Download | 13:20:08 |
emily | but it's precisely that 5% that must be causing ^ right? 🤔 | 13:20:50 |
hexa | at the same time | 13:21:00 |
hexa |  Download | 13:21:02 |
hexa |  Download | 13:21:22 |
emily | Nix probably counts as "other bots"? | 13:21:57 |
emily | 0 DDoS requests mitigated is a fun figure | 13:22:14 |
hexa | I would imagine it does, since it doesn't advertise as a browser | 13:26:04 |
| 9 May 2026 |
hexa | Arian what's blocking https://github.com/NixOS/infra/pull/728 | 12:17:45 |
Arian | ADHD mostly | 12:24:01 |
Arian | I keep forgetting i was doing this | 12:24:09 |
Arian | Only thing I'm a bit afraid of is that if we actually have people scraping old paths intelligent tiering might actually be more expensive because things get moved into more expensive tiers... But idk I think we should just apply and observe for a month. | 13:48:08 |
Arian | Worst case is we revert | 13:48:13 |
hexa | yeah, we can't know without trying | 13:55:45 |
hexa | if things go to shit, what's next? gc? | 13:55:59 |
lassulus | we do the cache exfil anyway? so maybe gc? or we get more free credits from aws. but there are multiple ideas floating around what happens if the egress costs eat up the free credits we get from amazon. would not worry too much about it for now | 13:58:00 |
lassulus | I opushed https://github.com/NixOS/infra/pull/728 I would be happy to deploy it, but not sure if I have the right credentials :D | 13:58:29 |
lassulus | maybe @hexa (signing key rotation when) can do that? | 13:58:33 |
hexa | I think we can apply that during an infra call | 14:00:02 |
hexa | the next one is on the 14th | 14:00:23 |
lassulus | ok, we will try to be there | 14:02:15 |
hexa | Arian does that work for you? | 14:04:47 |
lassulus | He told me it should work. He is included in "we" :) | 14:10:03 |
emily | can any Hydra-knowers say if the sequence of events given in https://github.com/NixOS/nix/pull/15638#issuecomment-4413076030 seems at all plausible? | 17:10:20 |
emily | I did some digging and it seems like the persistent Darwin ad-hoc code signature SIGKILL issues are indeed quite likely to be chronically caused by derivations with multiple outputs getting some of their outputs rebuilt and running into getting mangled by path rewrites | 17:10:54 |
emily | what's not at all clear to me is why that would be happening, because any build of a derivation builds all its outputs, so as long as we have all outputs getting pushed out to the cache (rather than it being reasonably common for only some outputs to get pushed to the cache for a given build), substitutions by Hydra builders from the cache not chronically failing, and not some other weirdness like leftover outputs ending up registered in the store despite builds failing (? – recent disk space issues maybe?), I don't understand how we'd be regularly (and more commonly lately?) seeing this happen | 17:12:20 |
hexa | wow, that's too long for me for now | 17:13:34 |
hexa | that issue | 17:13:36 |
emily | yeah just look at my last comment 😅 | 17:15:12 |