Nix Hackers | 972 Members | |
| For people hacking on the Nix package manager itself | 206 Servers |
| Sender | Message | Time |
|---|---|---|
| 10 Aug 2021 | ||
| what were you doing exactly? libcxxabi is in extraPackages of libcxxClang, so it should not fail in this way | 18:01:23 | |
In reply to @Las:matrix.orgDoes it make sense to check git signature unless you have the whole history? (up to that commit; in particular, no --depth stuff) | 18:49:20 | |
In reply to @vcunat:matrix.orgI'm not sure. I found other ways of heavily reducing the time it takes to fetch Nixpkgs, specifically --filter=tree:0, but it still takes 4 times as much time. | 18:56:55 | |
| With a shallow repository I can still see that the commit is signed | 18:57:16 | |
| But I'm not sure if it can be trusted | 18:57:22 | |
| 11 Aug 2021 | ||
In reply to @Las:matrix.orgAnd also the github fetcher is rate limited (60 requests/h per public IP(!)) while the git fetcher isn't, right? | 09:08:16 | |
Basically github: works great until it doesn't anymore | 09:08:29 | |
In reply to @Las:matrix.org* And also the github fetcher is rate limited (60 requests/h per public IP(!) without GH token) while the git fetcher isn't, right? | 09:09:05 | |
| That is very low. With shallow cloning I honestly don't see the need for it anymore. | 11:09:40 | |
| who runs a garbage collect 60 times an hour is the question? | 13:05:34 | |
| I don't think there's any conceivable scenario where this is an issue | 13:05:45 | |
| It isn't about 60 times an hour. Divide that by the number of sources you might require for your build (and perhaps you are changing some). I usually run into that limit when I update my source pinnings of my infra repo twice in the same hour. | 13:09:27 | |
| Then divide that by the number of machines/people behind a single IP, e.g. at an office or university | 13:13:57 | |
| Yeah and all of that because GH doesn't deploy IPv6 :) | 13:14:48 | |
| rate limiting will get worse. | 13:17:32 | |
| not better. | 13:17:35 | |
In reply to @andi:kack.itwhat has v6 got do with rate limiting? | 13:18:14 | |
| They could either rate limit on per /64 or per unique address on the side of GitHub. Worst case they use a /56 or even a /48 as prefix for common rate limit but best case they'd limit it on a L2 segment and thus allowing multiple customers on e.g. CGNAT do not interfere with each others ratelimits. In german cable networks CGNAT is very dominant and often you run into ratelimits with GitHub as the outbound IPv4 NAT address might be used by many users within the same area. | 13:20:02 | |
| that's what i was thinking internally... like 'it can't be a nat state problem'...it is...for my life! | 13:20:43 | |
| Anyway that is rather off-topic for this channel (perhaps a good background information on why ratelimits are an issue). | 13:21:08 | |
| yeah..i agree!! but damm interesting. | 13:21:26 | |
| Am I missing something or is the nix daemon leaking Loggers after a connection terminates / a new one is established? https://github.com/NixOS/nix/blob/c000cec27fcb16548606830410be265eb082f777/src/libstore/daemon.cc#L939 | 17:39:01 | |
| (Probably not very dangerous/important as that happens in a forked client anyway) | 17:40:48 | |
| 17:56:34 | ||
| Is there a way to use an alternative store with
seems strange to me, why is the | 18:07:23 | |
(I am trying to nix develop on https://github.com/nixos/nix (i.e. uses flakes) | 18:08:12 | |
* (I am trying to nix develop on https://github.com/nixos/nix - i.e. uses flakes) | 18:08:24 | |
に返信 @pamplemouss_:matrix.orgI remember seeing some recent commit about that and nix develop | 19:37:08 | |
| I recommend you try using the latest commit | 19:37:20 | |
| Got the same error popping 😕 | 21:07:57 | |