!aGqRytqbCECitOFhbt:nixos.org

Release Management

342 Members
25.11 "Xantusia" | https://nixos.github.io/release-wiki/Home.html92 Servers

Load older messages


SenderMessageTime
13 Nov 2023
@raitobezarius:matrix.orgraitobezariusYep I am moving all the thinking to 24.0513:57:29
@raitobezarius:matrix.orgraitobezarius
In reply to @bendlas:matrix.org
Yep, I can write something up. postStart is also not ideal, since it only lets you talk about ordering using mkAfter and the like, but should be enough for most people for now.
I think so too
13:57:39
@raitobezarius:matrix.orgraitobezariusLike it's not less expressive than ensurePermissions13:57:46
@bendlas:matrix.orgbendlastrue13:58:11
@bendlas:matrix.orgbendlas ... except .. ensure* always puts permissions after db creation, but oh well ... 14:00:00
@raitobezarius:matrix.orgraitobezariusyou can always do the permission creation on the preStart of the module you are interested14:03:45
@raitobezarius:matrix.orgraitobezariusor you can have a postgresql-$myservice-install-permissions.service oneshot thingie14:03:56
@raitobezarius:matrix.orgraitobezariusI posted https://discourse.nixos.org/t/breaking-changes-announcement-for-unstable/17574/39?u=raitobezarius14:05:10
@bendlas:matrix.orgbendlas
In reply to @raitobezarius:matrix.org
or you can have a postgresql-$myservice-install-permissions.service oneshot thingie
good point. I'm wondering if we should advise people to do that instead of mkOrder sorcery
14:06:26
@raitobezarius:matrix.orgraitobezariusYep, I think that might be the best option14:06:43
@raitobezarius:matrix.orgraitobezariusWe already have people doing local ensure logic in their own modules depending on the circumstances14:07:10
@raitobezarius:matrix.orgraitobezariusWe just move more complexity to NixOS modules authors14:07:18
@bendlas:matrix.orgbendlasonly fly in the ointment: With pre-15 psql, where db user isn't the owner, I think this wouldn't work, creating yet another lockstep - constraint on psql version :/14:10:05
@raitobezarius:matrix.orgraitobezariuswe only need to provide the information14:10:55
@raitobezarius:matrix.orgraitobezariusnixpkgs nixos modules are fine14:10:57
@raitobezarius:matrix.orgraitobezariusnon-nixpkgs nixos modules will probably have issues14:11:05
@raitobezarius:matrix.orgraitobezariuswe have to write documentation with this in mind14:11:09
@raitobezarius:matrix.orgraitobezariusas long as we cover a significant amount of issues, I think we did what we could14:11:25
@raitobezarius:matrix.orgraitobezariusI also unfortunately don't have much time myself as I have too much on my plate in general14:11:43
@raitobezarius:matrix.orgraitobezariusSo my priority is: (1) ensuring nixpkgs is in a good state (2) not mindlessly breaking out of tree users (3) cleaning up this mess post branch off14:12:14
@raitobezarius:matrix.orgraitobezariusHow much we make (2) awesome is function of anyone's contributions here and in the PostgreSQL NixOS community14:12:33
@bendlas:matrix.orgbendlasyeah, maybe best course is to just be as explicit as possible in docu, about the various problems with any of the approaches .. I'll have a look at postgres.md14:16:17
@raitobezarius:matrix.orgraitobezariusI double checked and currently master didn't introduce new usage of ensurePermissions14:17:26
@raitobezarius:matrix.orgraitobezariusSo I will write release notes14:17:29
@raitobezarius:matrix.orgraitobezariusAnd I will run testing in parallel14:17:45
@raitobezarius:matrix.orgraitobezariusI wish nixpkgs-review could do that14:20:34
@raitobezarius:matrix.orgraitobezariuswell, it breaks on mastodon anyway14:25:15
@raitobezarius:matrix.orgraitobezarius

ok

matrix-sliding-sync
mautrix-facebook
zabbix-(proxy|server)
onlyoffice
tt-rs
hydron
14:33:49
@raitobezarius:matrix.orgraitobezariusthis stuff doesn't possess any test in nixpkgs14:33:55
@raitobezarius:matrix.orgraitobezariusotherwise everything else should be covered by tests (which uncovered already issues in the PR)14:34:12

Show newer messages


Back to Room ListRoom Version: 6