!aGqRytqbCECitOFhbt:nixos.org

Release Management

343 Members
25.11 "Xantusia" | https://nixos.github.io/release-wiki/Home.html93 Servers

Load older messages


SenderMessageTime
10 Nov 2023
@raitobezarius:matrix.orgraitobezariusswitch-to-configuration.pl22:14:21
@raitobezarius:matrix.orgraitobezarius(click on the link)22:14:36
@bendlas:matrix.orgbendlas
In reply to @raitobezarius:matrix.org
anyone is welcome to work on that, but there's a lot of work involved into touching stc
right! hence: do the minimal thing, that would allow everyone to start chipping away at it ...
22:15:49
@bendlas:matrix.orgbendlas ... while already addressing sore spots, like compatibility checks and migrations in /var 22:17:28
@bendlas:matrix.orgbendlas so stc would be the action I called nixos.legacy/activate-system. 22:20:55
@bendlas:matrix.orgbendlas

and according to my reverse-engineered deployment script, these are the two necessary actions, to emulate nixos-rebuild:

  deploy-ssh-for = {
    type = "app";
    program = toString (pkgs.writeScript "deploy-ssh-for" ''
      #!${pkgs.stdenv.shell}
      set -eux
      configName=$1
      remote=root@$2
      action=$3
      shift 3
      if [ gc = "$action" ]
      then ssh -C $remote nix-collect-garbage "$@"
           exit 0
      fi
      configuration=$(nix build .#nixosConfigurations.$configName.config.system.build.toplevel --print-out-paths --no-link -L)
      nix-copy-closure $(if [ "''${1-}" != --direct ]; then echo --use-substitutes; fi) --gzip --to $remote $configuration
      if [ dry-run = "$action" ]
      then set +x
           echo "[dry-run] Would run these commands:"
           echo "    ssh -C $remote nix-env --profile /nix/var/nix/profiles/system --set $configuration"
           echo "    ssh -C $remote $configuration/bin/switch-to-configuration $action"
      else if [ build = "$action" ]
      then ssh -C $remote nix-env --profile /tmp/nixos-system --set $configuration
      else if [ boot = "$action" -o switch = "$action" ]
      then ssh -C $remote nix-env --profile /nix/var/nix/profiles/system --set $configuration
           ssh -C $remote $configuration/bin/switch-to-configuration $action
      else echo "Unknown action '$action'. Use one of: dry-run, boot, switch"
      fi fi fi
    '');
  };
22:24:25
@bendlas:matrix.orgbendlas(line 24-25)22:26:03
@raitobezarius:matrix.orgraitobezariusRight22:38:46
@raitobezarius:matrix.orgraitobezariusLet's move this to 24.05 though22:38:54
@raitobezarius:matrix.orgraitobezariusAnd we still need to focus on the immediate problem :)22:39:04
@bendlas:matrix.orgbendlashehehe, I'm actually kind of tempted to prove the concept by implementing the postgresql downgrade ... also because I feel like I can't do much better than https://github.com/NixOS/nixpkgs/pull/266270 in the local optimum22:45:10
@bendlas:matrix.orgbendlasbut no worries, if I decide to attempt it, it's on me against your advice. No expectations attached22:46:32
@bendlas:matrix.orgbendlasalso if you have an Idea for something more productive right now, I'm also happy to help22:47:13
11 Nov 2023
@vcunat:matrix.orgVladimír Čunát FYI, 23.11 schedule, TL;DR from #staging:nixos.org:
we merged staging to staging-next now, as almost full linux rebuild was unavoidable anyway.
16:16:38
@vcunat:matrix.orgVladimír ČunátSo that iteration is delayed but will contain more things.16:17:23
@vcunat:matrix.orgVladimír Čunát * So that iteration is delayed but will at least contain more things.16:17:27
@vcunat:matrix.orgVladimír Čunát * So that iteration is delayed but will at least contain more (recent) things.16:17:36
@raitobezarius:matrix.orgraitobezarius figsoda: we need to discuss delaying the branch off of some days 17:41:45
12 Nov 2023
@lehmanator:gnulinux.club@lehmanator:gnulinux.club joined the room.12:03:38
13 Nov 2023
@raitobezarius:matrix.orgraitobezariusahem13:29:37
@raitobezarius:matrix.orgraitobezariusso mastodon is still not upgraded from what I see13:29:42
@hexa:lossy.networkhexano response from kerstin on matrix13:30:16
@hexa:lossy.networkhexa try mastodon: drop next 13:30:47
@raitobezarius:matrix.orgraitobezariusI will do it myself13:30:49
@raitobezarius:matrix.orgraitobezariusI guess :D13:31:31
@raitobezarius:matrix.orgraitobezariusin the time being, I would appreciate if you could add to postgresql tests to test our big NixOS modules heavily relying on ensureXYZ with postgresql13:32:18
@raitobezarius:matrix.orgraitobezariusso any change to postgresql would catch them13:32:23
@raitobezarius:matrix.orgraitobezariusupgraded13:39:44
@raitobezarius:matrix.orgraitobezariusbut now I am running into the PostgreSQL debacle13:39:53
@raitobezarius:matrix.orgraitobezarius

OK, my decision is the following:

  • we deprecate ensurePermissions and leave the code alone, with a very big warning annoying message saying this option will be deleted in 24.05 if nothing is done to maintain it in a serious countenance, this buy 6 months to anyone who want to keep using this broken option, in the meantime, if anyone comes to complain about it to PGSQL maintainers who wanted to delete it will gently be told to send a fix rather than to complain. ensureDBOwnership should probably be mutually exclusive with ensurePermissions on the relevant pieces.
  • we migrate everything inside nixpkgs to not use ensurePermissions and we write migration guide from ensurePermissions using initialScript but also postStart as replacements with common snippets for the classical GRANT stuff.
13:43:59

Show newer messages


Back to Room ListRoom Version: 6