!UNVBThoJtlIiVwiDjU:nixos.org

Staging

359 Members
Staging merges | Running staging cycles: https://github.com/NixOS/nixpkgs/pulls?q=is%3Apr+is%3Aopen+head%3Astaging-next+head%3Astaging-next-25.11 | Review Reports: https://malob.github.io/nix-review-tools-reports/116 Servers

Load older messages


SenderMessageTime
13 Mar 2026
@rvdp:infosec.exchangeRamses 🇵🇸Seems like the kind of situation where you end up annoying someone in any case12:03:16
@emilazy:matrix.orgemilyyeah I don't think you did anything wrong :)12:03:43
@rvdp:infosec.exchangeRamses 🇵🇸I fully agree that we should avoid pinning, but a merge commit in -next without a PR to give the maintainers a chance to weigh in, didn't seem like the right place to fix that12:05:15
@emilazy:matrix.orgemilyprocedurally I err very much in favour of stuff landing on staging, because the workload is high and the contributors are deeply knowledgeable on average and being a time-sensitive maintainer of last resort is no fun if it also lacks the authority to make judgement calls12:05:24
@emilazy:matrix.orgemilybut we're violently agreeing I think 😆12:05:46
@emilazy:matrix.orgemilyIMO it was the -next commit that made that call rather than the merge. but those aren't great for visibility for maintainers especially if they're pushed directly, yeah12:06:37
@emilazy:matrix.orgemily(thank you for doing the merge!)12:06:45
@emilazy:matrix.orgemilywe really need to move to a PR-only workflow for staging, including for merges. I'll hopefully write up plans for that soon...12:07:23
@emilazy:matrix.orgemilyvisibility and auditing is pretty awful right now12:07:35
@rvdp:infosec.exchangeRamses 🇵🇸Yeah, but the merge needs to arbitrage between the two (fix on -next, regular bump on master)12:07:40
@rvdp:infosec.exchangeRamses 🇵🇸I noticed a prior issue from you about that, while searching for docs on how to do this merge12:08:12
@rvdp:infosec.exchangeRamses 🇵🇸That would make things a lot more transparent (but potentially also a bit more laborious)12:08:39
@rvdp:infosec.exchangeRamses 🇵🇸I wasn't totally sure whether we were, so good to know! 😁12:09:26
@emilazy:matrix.orgemilyyeah, making the workflow not painful is the main consideration. I think having a pre-made ref you can push to would help offset that12:11:29
@emilazy:matrix.orgemilyas well as specifically avoiding mass rebuilds and eval issues percolating to -next which sucks12:11:55
@emilazy:matrix.orgemilyI've thought more lately about how we can avoid conflicts arising in the first place though12:12:07
@emilazy:matrix.orgemilythe ideal would be that we don't get two PRs that don't know about each other both landing in different "timelines" at all12:12:38
@emilazy:matrix.orgemilymultiple merge queues kind of dampen the benefit of having them12:13:52
@rvdp:infosec.exchangeRamses 🇵🇸Yeah, AFAICT, the commit to switch kitty to a non-EOL go could've gone to master, which would've avoided this conflict and discussion. But maybe there were other reasons why it didn't, I don't have the context14:20:46
@rvdp:infosec.exchangeRamses 🇵🇸But in general indeed it's hard to know when you make a PR to master, that there are any conflicting changes on staging(-next). And even if we detected this in CI, I don't think it's always possible to modify the changes such that they cleanly apply on both branches14:22:24
@emilazy:matrix.orgemilywell, I had some ideas for making it so that they always can :) but which ones are practical, not sure15:52:03
@emilazy:matrix.orgemilyat the very least having to explicitly handle it when such a situation arrives rather than being able to sleepwalk into it would be goo15:52:22
@emilazy:matrix.orgemily* at the very least having to explicitly handle it when such a situation arrives rather than being able to sleepwalk into it would be good15:52:33
@rvdp:infosec.exchangeRamses 🇵🇸
In reply to @emilazy:matrix.org
at the very least having to explicitly handle it when such a situation arrives rather than being able to sleepwalk into it would be good
Definitely
17:58:55
15 Mar 2026
@whispers:catgirl.cloudwhispers [& it/fae] hai. chromium seems to be having issues on staging-next on my system. if i build (well, substitute) chromium on the latest staging-next, trying to run it immediately sigills on my system (x86_64-linux nixos):
~> nix run github:nixos/nixpkgs/521d05a303dcd44e66f27ad94cc244adaabace12#chromium
[0314/233404.245952:ERROR:third_party/crashpad/crashpad/util/process/process_memory_range.cc:75] read out of range
fish: Job 1, 'nix run github:nixos/nixpkgs/52…' terminated by signal SIGILL (Illegal instruction)
whereas nix run github:nixos/nixpkgs/master#chromium launches successfully. this might be a »my system is fucked issue«, but i'm wondering if anyone else can maybe reproduce this?
03:37:52
@whispers:catgirl.cloudwhispers [& it/fae]…and now that i post i remembered there's a nixos test. that indeed does fail, so i don't think it's just a me thing. fun03:40:38
@whispers:catgirl.cloudwhispers [& it/fae]* …and now that i post i remembered there's a nixos test. that indeed does fail as well, so i don't think it's just a me thing. fun03:40:43
@whispers:catgirl.cloudwhispers [& it/fae]* …and now that i post i remembered there's a nixos test for a more isolated environment. that indeed does fail as well, so i don't think it's just a me thing. fun03:42:48
@whispers:catgirl.cloudwhispers [& it/fae]* …and now that i post i remembered there's a nixos test for a more isolated environment. that indeed does fail as well, so i don't think it's just a me thing. fun. i'll make an issue i suppose03:46:24
@whispers:catgirl.cloudwhispers [& it/fae]* …and now that i post i remembered there's a nixos test for a more isolated environment. that indeed does fail as well, so i don't think it's just a me thing. fun. i'll investigate & make an issue03:50:27

Show newer messages


Back to Room ListRoom Version: 6