!aGqRytqbCECitOFhbt:nixos.org

Release Management

342 Members
25.11 "Xantusia" | https://nixos.github.io/release-wiki/Home.html92 Servers

Load older messages


SenderMessageTime
21 May 2023
@raitobezarius:matrix.orgraitobezariusyou mean among the latest revisions?14:51:46
@hexa:lossy.networkhexayes14:51:49
@hexa:lossy.networkhexatest takes 1m9s locally fwiw14:52:01
@raitobezarius:matrix.orgraitobezariusand it passes?14:53:09
@raitobezarius:matrix.orgraitobezariusI guess it passes because it timeouts otherwise14:53:36
@hexa:lossy.networkhexathe browser works just fine14:54:16
@hexa:lossy.networkhexabumping trunk-combined 14:56:09
@hexa:lossy.networkhexa

9565 builds have been bumped to the front of the queue.

14:56:29
@raitobezarius:matrix.orgraitobezariusawesome15:00:40
@hexa:lossy.networkhexatests succeeded on second try15:16:13
@raitobezarius:matrix.orgraitobezariusresource contention or weird qemu bug idk15:16:40
@raitobezarius:matrix.orgraitobezariusthis is the true highlight of the release: https://github.com/NixOS/nixos-search/pull/656 don't quote at me15:25:20
@hexa:lossy.networkhexawild15:28:45
@vcunat:matrix.orgVladimír ČunátFirefox tests fail relatively commonly on Hydra. I'm not sure why. I certainly restart them every week.15:37:13
@vcunat:matrix.orgVladimír Čunát * Firefox tests fail relatively commonly on Hydra. I'm not sure why. I certainly restart them like every week.15:37:18
@janne.hess:helsinki-systems.deJanne Heß
In reply to @raitobezarius:matrix.org
this is the true highlight of the release: https://github.com/NixOS/nixos-search/pull/656 don't quote at me
Now do companies still not do this by default 🙄
17:00:04
@vcunat:matrix.orgVladimír Čunát
In reply to @janne.hess:helsinki-systems.de
Now do companies still not do this by default 🙄
Planning to migrate away from GitHub?
17:04:49
@janne.hess:helsinki-systems.deJanne Heß
In reply to @vcunat:matrix.org
Planning to migrate away from GitHub?
We have our company gitlab for a good reason :D
17:05:17
@raitobezarius:matrix.orgraitobezariusOpenSSL 3 or IPv6 ; pick one17:12:35
@janne.hess:helsinki-systems.deJanne Heß
In reply to @raitobezarius:matrix.org
OpenSSL 3 or IPv6 ; pick one
No love for dnssec?
17:12:58
@raitobezarius:matrix.orgraitobezariusI am on https://sockpuppet.org/blog/2015/01/15/against-dnssec/ side but have no strong opinion17:13:35
@vcunat:matrix.orgVladimír ČunátGetting off topic, but think about how you get a TLS certificate, i.e. how you (securely) validate that someone owns a particular domain...17:17:18
@vcunat:matrix.orgVladimír Čunát(either way, my opinion is biased)17:19:26
@raitobezarius:matrix.orgraitobezariusEspecially because the world has taken the Let's Encrypt route, I don't have a well formed opinion on whether DNSSEC is the last good piece to secure the whole system17:39:11
@raitobezarius:matrix.orgraitobezarius(I think your input is very valuable esp. because of that :))17:39:25
@vcunat:matrix.orgVladimír Čunát I was trying to make a point that DNSSEC + DNS-01 challenge makes Let's Encrypt certificates way more secure. 17:50:59
@raitobezarius:matrix.orgraitobezariusAh for DNS-01, OK17:51:48
@vcunat:matrix.orgVladimír ČunátI do agree that secure address resolution on normal clients is not a big deal, but there are other things in DNS already which make much more sense to secure. (Also DANE exists, but browsers don't want it.)17:52:27
@vcunat:matrix.orgVladimír Čunát * I do agree that secure address resolution on normal clients is not a big deal, but there are other things in DNS already which make much more sense to secure. (Also DANE exists, but browsers don't want it.) 17:52:43
@vcunat:matrix.orgVladimír Čunát * I do agree that secure address resolution on normal clients is not a big deal, especially because routing can't be made secure enough. But there are other things in DNS already which make much more sense to secure. (Also DANE exists, but browsers don't want it.) 17:53:37

Show newer messages


Back to Room ListRoom Version: 6