!VhbWwlUdjHkamKnfrK:nixos.org

Nix: Cloud Native

288 Members
62 Servers

Load older messages


SenderMessageTime
24 Nov 2025
@bpub:matrix.orgBPub set a profile picture.13:34:23
@vinetos:matrix.orgVinetos joined the room.16:50:03
4 Dec 2025
@onur-ozkan:matrix.orgonur-ozkan joined the room.04:20:23
6 Dec 2025
@hosaidenpwd:matrix.orgP J joined the room.07:43:09
7 Dec 2025
@garoudensetsu:matrix.orgW changed their display name from William Sewell to W.00:30:02
11 Dec 2025
@suua:matrix.orgsuua joined the room.16:09:32
@tg-x:asra.grTG × ⊙ joined the room.19:53:02
15 Dec 2025
@sandro:supersandro.deSandro 🐧Would be nice if someone could look at https://github.com/NixOS/nixpkgs/pull/42769416:07:34
19 Dec 2025
@arianvp:matrix.orgArianI dont think this does what you think it does? If a derivation could leak this information from the host builder we have a vulnerability -- not a feature 09:58:00
@arianvp:matrix.orgArianOooh wait. It disables sandboxing09:58:08
@arianvp:matrix.orgArianThis is a terrible idea imo 09:58:21
@arianvp:matrix.orgArianFeels like it's way better to attach this as OCI metadata outside of nix build sandbox after doing the build09:59:36
@arianvp:matrix.orgArianLeaking this into the build sandbox feels cursed 09:59:46
@arianvp:matrix.orgArianI really don't like this. closureInfo is already a nightmare for reproducibility and this just makes it even worse ._. 10:03:18
@arianvp:matrix.orgArianThough maybe a generic mechanism for this *is* useful. I guess our ISO images have the same issue of shipping nix store paths without provenance information 10:04:05
@arianvp:matrix.orgArianAnd all the store paths in it are "ultimately" trusted10:04:28
@frederic:scs.ems.hostFrédéric Christ changed their display name from Frédéric Christ to Frédéric Christ (back on 02.01.).15:15:32
@sandro:supersandro.deSandro 🐧Please write feedback into the PR, please 🙈17:05:49
22 Dec 2025
@2hexed:matrix.orgn joined the room.06:23:43
@cinerealkiara:matrix.org@cinerealkiara:matrix.org left the room.11:10:05
27 Dec 2025
@xentec:gated.spacexentec changed their display name from xentec to xentec | metal1nk@39c3.22:47:00
28 Dec 2025
@kalbasit:matrix.orgkalbasit joined the room.05:54:37
@kalbasit:matrix.orgkalbasit lillecarl: How does easykubenix compare with nixidy? 06:14:49
@lillecarl:matrix.orglillecarl @kalbasit:matrix.org nixidy is a more complete deployment solution. easykubenix should be compared to "kubenix" which nixidy uses to render manifests. My intention is to maybesoonishsoleday™️ make easykubenix compatible with nixidy as "easyApplication" or something. I don't like kubenix codegen. 16:14:30
@kalbasit:matrix.orgkalbasitGot it, makes sense19:43:40
@kalbasit:matrix.orgkalbasit lillecarl: I do have another question: Do you recommend a solution for remote builds on Kubernetes? I have a cluster running on bare metal and I want to leverage for remote builds instead of using my old laptop for that. 19:44:32
@lillecarl:matrix.orglillecarl

@kalbasit:matrix.org nix-csi enables you to tag nodes as builders, it's pretty barely tested but it works. It completely bypasses resourc constraints.

It works by using the in-cluster cache pod as SSH jump box into the nodes which can run builds.

It'll be developed further :)

19:48:37
@kalbasit:matrix.orgkalbasitDo you have a manifest (yaml) I can use to give it a try; sort of a demo or whatever you have on your end? 19:49:29
@lillecarl:matrix.orglillecarl I'll get back to you about that :) 20:00:31
29 Dec 2025
@kalbasit:matrix.orgkalbasitHappy holidays btw!01:40:54

Show newer messages


Back to Room ListRoom Version: 6