| 20 Sep 2022 |
brokenwifi | Redacted or Malformed Event | 17:56:36 |
brokenwifi | Redacted or Malformed Event | 17:57:18 |
brokenwifi | I'm trying to not have to pass these into every single host.
defaults = {
imports = [
inputs.agenix.nixosModules.age
inputs.home-manager.nixosModules.home-manager
];
};
I tried to add them to defaults and that works when deploying single host but if a deploy involves multiple ones then there is some kind of double inclusion error along the lines of:
error: The option `age.identityPaths' in `/tmp/.tmpPxgQXZ' is already declared in `/tmp/.tmpPxgQXZ'.
is there a more elegant way to avoid having to do reference these per-host?
| 19:58:08 |
Zhaofeng Li | Hmm, maybe you also included the module in some hosts' configs? | 20:01:45 |
brokenwifi | err, yes. Thank you. I thought because I did an --on @homelab parameter it would ignore the hosts that don't match. that was sloppy thinking. | 20:49:02 |
Zhaofeng Li | Yeah, when matching against tags, currently Colmena will evaluate the deployment.tags for all nodes so that triggered the error | 20:58:58 |
| 21 Sep 2022 |
Winter (she/her) | In reply to @zhaofeng:zhaofeng.li
A couple updates:
- More work was done on separating the evaluation logic from the deployment logic, with the new
colmenaHive output being the integration point that ties the two halves together. Colmena can now deploy from the colmenaHive output which should be an already-evaluated hive generated by colmena.lib.makeHive (or your own logic!). Example here. cc David Arnold (blaggacao) Yureka (she/her)
- Flake-enabled deployments now use
nix copy and the new SSH store protocol (ssh-ng://) for copying closures to remote hosts.
Flake-enabled deployments now use nix copy and the new SSH store protocol (ssh-ng://) for copying closures to remote hosts.
Looks like this breaks buildOnTarget.
| 00:50:59 |
Zhaofeng Li | In reply to @winterqt:nixos.dev
Flake-enabled deployments now use nix copy and the new SSH store protocol (ssh-ng://) for copying closures to remote hosts.
Looks like this breaks buildOnTarget. Oops, let me look at it and fix when I get home | 03:58:37 |
Zhaofeng Li | (also need to add better integration tests for flakes) | 03:59:04 |
Zhaofeng Li | In reply to @winterqt:nixos.dev
Flake-enabled deployments now use nix copy and the new SSH store protocol (ssh-ng://) for copying closures to remote hosts.
Looks like this breaks buildOnTarget. * Oops, let me look at it and fix when I get home (Edit: fixed) | 06:41:29 |
| roshan | byteio.in 🌷 joined the room. | 10:06:04 |
| 22 Sep 2022 |
@yuka:yuka.dev | Yay for colmenaEval and makeHive, this is exactly what I wanted | 09:50:38 |
@yuka:yuka.dev | I have another request: In flake-enabled deployments, can we pass the nixpkgs flake so that the hive expression can use nixpkgs.lib.nixosSystem and get the proper system.nixos.(revision|versionSuffix)? | 09:51:51 |
@yuka:yuka.dev | * Yay for colmenaHive and makeHive, this is exactly what I wanted | 10:08:39 |
| Tommy joined the room. | 12:48:28 |
| 25 Sep 2022 |
@rendakuenthusiast:imperishable.name | hm, I ran into a weird issue | 05:38:42 |
@rendakuenthusiast:imperishable.name | I was having a problem building redis | 05:38:51 |
@rendakuenthusiast:imperishable.name | specifically I got this exception:
couldn't execute "pgrep": no such file or directory
while executing
"open "|pgrep -P $pid" "r""
(procedure "get_child_pid" line 4)
invoked from within
"get_child_pid 0"
("uplevel" body line 16)
invoked from within
"uplevel 1 $code"
(procedure "test" line 51)
invoked from within
"test {Don't rehash if redis has child process} {
r config set save ""
r config set rdb-key-save-delay 1000000
populate 4096 "..."
("uplevel" body line 2)
invoked from within
"uplevel 1 $code "
(procedure "start_server" line 3)
invoked from within
"start_server {tags {"other external:skip"}} {
test {Don't rehash if redis has child process} {
r config set save ""
r config set r..."
(file "tests/unit/other.tcl" line 334)
invoked from within
"source $path"
(procedure "execute_test_file" line 4)
invoked from within
"execute_test_file $data"
(procedure "test_client_main" line 10)
invoked from within
| 05:39:30 |
@rendakuenthusiast:imperishable.name | which I believe was coming from this test in redis' source: https://github.com/redis/redis/blob/b414605285244c453f3fadbbe7a157cd83ed5f59/tests/unit/other.tcl#L334 | 05:39:41 |
@rendakuenthusiast:imperishable.name | which calls this code: https://github.com/redis/redis/blob/13d25dd95eec5e21925ef474b5d43f2acb23e54e/tests/support/util.tcl#L616 | 05:39:56 |
@rendakuenthusiast:imperishable.name | which does:
if {[file exists "/usr/bin/pgrep"]} {
set fd [open "|pgrep -P $pid" "r"]
set child_pid [string trim [lindex [split [read $fd] \n] 0]]
} else {
set fd [open "|ps --ppid $pid -o pid" "r"]
set child_pid [string trim [lindex [split [read $fd] \n] 1]]
}
| 05:40:12 |
@rendakuenthusiast:imperishable.name | and when colmena tries to deploy from my laptop, I have /usr/bin/pgrep installed at that path in my normal OS | 05:40:37 |
@rendakuenthusiast:imperishable.name | I was able to work around this by renaming /usr/bin/pgrep on my system and then building locally | 05:40:56 |
@rendakuenthusiast:imperishable.name | I'm not sure what the principled way to solve this is | 05:41:05 |
@rendakuenthusiast:imperishable.name | this is basically a failure of hermeticism, right? the redis build was happening on my system and it has one bit of source code that looks at /usr/bin/pgrep. is there a principled way in nix to make that not visible to derivations being built? | 05:41:49 |
@yuka:yuka.dev | In reply to @yuka:yuka.dev I have another request: In flake-enabled deployments, can we pass the nixpkgs flake so that the hive expression can use nixpkgs.lib.nixosSystem and get the proper system.nixos.(revision|versionSuffix)? I guess this is issue https://github.com/zhaofengli/colmena/issues/60 | 08:15:39 |
| 26 Sep 2022 |
@rendakuenthusiast:imperishable.name | where does colmena cache tarballs? I think it is failing to register that a tarball has been updated | 00:41:15 |
Winter (she/her) | what tarballs? | 01:03:12 |
@jhillyerd:matrix.org | In reply to @rendakuenthusiast:imperishable.name this is basically a failure of hermeticism, right? the redis build was happening on my system and it has one bit of source code that looks at /usr/bin/pgrep. is there a principled way in nix to make that not visible to derivations being built? Typically you would patch/rewrite the package to not point at /usr/bin, example for regular grep: https://github.com/NixOS/nixpkgs/blob/4e62b94df308e197c1f107564ebdb4318bb80e27/pkgs/development/libraries/nss/generic.nix#L61 | 04:59:20 |
@rendakuenthusiast:imperishable.name | Winter (she/her): I'm using builtins.fetchTarball to fetch an additional module with some custom modifications I made, from a server I control | 05:00:44 |