!aGqRytqbCECitOFhbt:nixos.org

Release Management

343 Members
25.11 "Xantusia" | https://nixos.github.io/release-wiki/Home.html93 Servers

Load older messages


SenderMessageTime
13 Nov 2023
@bendlas:matrix.orgbendlastrue13:58:11
@bendlas:matrix.orgbendlas ... except .. ensure* always puts permissions after db creation, but oh well ... 14:00:00
@raitobezarius:matrix.orgraitobezariusyou can always do the permission creation on the preStart of the module you are interested14:03:45
@raitobezarius:matrix.orgraitobezariusor you can have a postgresql-$myservice-install-permissions.service oneshot thingie14:03:56
@raitobezarius:matrix.orgraitobezariusI posted https://discourse.nixos.org/t/breaking-changes-announcement-for-unstable/17574/39?u=raitobezarius14:05:10
@bendlas:matrix.orgbendlas
In reply to @raitobezarius:matrix.org
or you can have a postgresql-$myservice-install-permissions.service oneshot thingie
good point. I'm wondering if we should advise people to do that instead of mkOrder sorcery
14:06:26
@raitobezarius:matrix.orgraitobezariusYep, I think that might be the best option14:06:43
@raitobezarius:matrix.orgraitobezariusWe already have people doing local ensure logic in their own modules depending on the circumstances14:07:10
@raitobezarius:matrix.orgraitobezariusWe just move more complexity to NixOS modules authors14:07:18
@bendlas:matrix.orgbendlasonly fly in the ointment: With pre-15 psql, where db user isn't the owner, I think this wouldn't work, creating yet another lockstep - constraint on psql version :/14:10:05
@raitobezarius:matrix.orgraitobezariuswe only need to provide the information14:10:55
@raitobezarius:matrix.orgraitobezariusnixpkgs nixos modules are fine14:10:57
@raitobezarius:matrix.orgraitobezariusnon-nixpkgs nixos modules will probably have issues14:11:05
@raitobezarius:matrix.orgraitobezariuswe have to write documentation with this in mind14:11:09
@raitobezarius:matrix.orgraitobezariusas long as we cover a significant amount of issues, I think we did what we could14:11:25
@raitobezarius:matrix.orgraitobezariusI also unfortunately don't have much time myself as I have too much on my plate in general14:11:43
@raitobezarius:matrix.orgraitobezariusSo my priority is: (1) ensuring nixpkgs is in a good state (2) not mindlessly breaking out of tree users (3) cleaning up this mess post branch off14:12:14
@raitobezarius:matrix.orgraitobezariusHow much we make (2) awesome is function of anyone's contributions here and in the PostgreSQL NixOS community14:12:33
@bendlas:matrix.orgbendlasyeah, maybe best course is to just be as explicit as possible in docu, about the various problems with any of the approaches .. I'll have a look at postgres.md14:16:17
@raitobezarius:matrix.orgraitobezariusI double checked and currently master didn't introduce new usage of ensurePermissions14:17:26
@raitobezarius:matrix.orgraitobezariusSo I will write release notes14:17:29
@raitobezarius:matrix.orgraitobezariusAnd I will run testing in parallel14:17:45
@raitobezarius:matrix.orgraitobezariusI wish nixpkgs-review could do that14:20:34
@raitobezarius:matrix.orgraitobezariuswell, it breaks on mastodon anyway14:25:15
@raitobezarius:matrix.orgraitobezarius

ok

matrix-sliding-sync
mautrix-facebook
zabbix-(proxy|server)
onlyoffice
tt-rs
hydron
14:33:49
@raitobezarius:matrix.orgraitobezariusthis stuff doesn't possess any test in nixpkgs14:33:55
@raitobezarius:matrix.orgraitobezariusotherwise everything else should be covered by tests (which uncovered already issues in the PR)14:34:12
@raitobezarius:matrix.orgraitobezariusI want to cry, people made stupid defaults14:43:21
@raitobezarius:matrix.orgraitobezariusMobilizon has a default database of mobilizon_prod, I switch it back to user as a default, this will make all existing deployments explode14:43:40
@raitobezarius:matrix.orgraitobezarius * Mobilizon has a default database of mobilizon_prod, if I switch it back to user as a default, this will make all existing deployments explode 14:45:09

Show newer messages


Back to Room ListRoom Version: 6