| 24 Jul 2022 |
@rendakuenthusiast:imperishable.name | if I deploy with colmena, and a derivation fails, I see an error message saying that a log should appear at /tmp/nix-build<pkgname> | 06:45:57 |
@rendakuenthusiast:imperishable.name | and I don't see this file existing, either on my local system or the system colmena should be deploying to | 06:46:11 |
Winter (she/her) | In reply to @rendakuenthusiast:imperishable.name if I deploy with colmena, and a derivation fails, I see an error message saying that a log should appear at /tmp/nix-build you'll want to run nix log /nix/store/the.drv, that'll provide build logs | 17:41:16 |
| 25 Jul 2022 |
@grahamc:nixos.org | can colmena handle a network of mixed architectures? | 15:38:52 |
Linux Hackerman | yes, using it for that myself :) | 15:39:05 |
@grahamc:nixos.org | oh sorry, half-asked question | 15:41:05 |
@grahamc:nixos.org | where I'm also using its flake.nix support | 15:41:12 |
Linux Hackerman | In reply to @linus:schreibt.jetzt yes, using it for that myself :) still :D | 15:41:24 |
@grahamc:nixos.org | yay! can you show an example? I'm a bit confused | 15:41:34 |
Linux Hackerman | there's not much to it besides setting nixpkgs.system in the node's configuration | 15:42:22 |
@grahamc:nixos.org | oh! of course! | 15:42:34 |
@grahamc:nixos.org | thanks | 15:42:35 |
@grahamc:nixos.org | I was thrown off by the meta.nixpkgs being set | 15:42:43 |
Linux Hackerman | Yeah, that's only the nixpkgs used to evaluate it though | 15:43:39 |
@grahamc:nixos.org | makes sense | 15:44:30 |
Linux Hackerman | something to note is that Colmena's flake support is incomplete, the biggest issue being that it requires impure evaluation. | 15:44:41 |
Linux Hackerman | That's bitten me before, with it picking up ~/.config/nixpkgs/config.nix | 15:45:00 |
@grahamc:nixos.org | gotcha | 15:45:16 |
@grahamc:nixos.org | it also seems to get a bit weird with some secrets support | 15:45:28 |
@grahamc:nixos.org | and the reboot behavior is not to my taste at the moment :) | 15:45:54 |
@grahamc:nixos.org | but switching from nixops was almost entirely pain-free | 15:48:11 |
Linux Hackerman | grahamc (he/him): oh also keep in mind if you haven't encrypted your secrets and you're using flakes with colmena, the secrets are now world-readable in your nix store. | 15:55:41 |
@grahamc:nixos.org | yeah, luckily they're barely secret | 15:57:29 |
@grahamc:nixos.org | oh actually no they didn't get copied in, I "fixed" it like this: | 15:58:03 |
@grahamc:nixos.org | colmena = let secrets = import /home/....mysecrets.nix; in | 15:58:24 |
@grahamc:nixos.org | that file has no secrets, but points to other files, and loading those other files always failed | 15:58:52 |
Linux Hackerman | aaah ok | 15:59:04 |
| 30 Jul 2022 |
Winter (she/her) | Zhaofeng Li: would you accept a PR / consider running rustfmt on the source tree? | 04:21:48 |
Zhaofeng Li | In reply to @winterqt:nixos.dev Zhaofeng Li: would you accept a PR / consider running rustfmt on the source tree? Sure, done | 05:14:42 |
Winter (she/her) | I assume just like interactive SSH auth isn't supported, interactive privilege escalation (i.e. entering a password for sudo during activation) also isn't supported? | 05:33:09 |