!aGqRytqbCECitOFhbt:nixos.org

Release Management

345 Members
25.11 "Xantusia" | https://nixos.github.io/release-wiki/Home.html94 Servers

Load older messages


SenderMessageTime
21 May 2023
@soul-driver:talos.chat@soul-driver:talos.chatGlad to hear that, now i am motivated to build lfs13:52:53
@raitobezarius:matrix.orgraitobezariusOther derivatives of NixOS can cater to using s6, etc. But you lose most of the existing work in the NixOS module system13:53:11
@raitobezarius:matrix.orgraitobezarius
In reply to @julienmalka:matrix.org
Flakes are stable
I think they meant stabilization as in "going out of experimental" :))))
13:53:44
@soul-driver:talos.chat@soul-driver:talos.chatexactly, going stable means writing "nix run a#b" in documentation without need to explain how to activate flakes13:55:03
@raitobezarius:matrix.orgraitobezarius hexa: We need to make a call for the caching thing, I have technically more approvals on the fine grained proposal (allowlist) rather than the "allow everything" proposal (blocklist) 13:55:10
@hexa:lossy.networkhexaallow node16 and openssl1.1 and its reverse dependencies to be cached, that's it13:56:39
@raitobezarius:matrix.orgraitobezariusOK, let's go with that13:56:51
@raitobezarius:matrix.orgraitobezariusit was one of the heaviest merge I had to push but it's done13:58:24
@raitobezarius:matrix.orgraitobezariuslabour of love really: https://github.com/NixOS/nixpkgs/pull/233235/files13:59:06
@raitobezarius:matrix.orgraitobezarius * labour of love really: https://github.com/NixOS/nixpkgs/pull/23323513:59:08
@raitobezarius:matrix.orgraitobezariusI don't know if someone looked into the evaluation errors of i686 but it would be nice to do it14:01:51
@vcunat:matrix.orgVladimír Čunát
In reply to @raitobezarius:matrix.org
hexa: We need to make a call for the caching thing, I have technically more approvals on the fine grained proposal (allowlist) rather than the "allow everything" proposal (blocklist)
GitHub approvals aren't designed for this situation with mutually exclusive PRs.
14:11:40
@raitobezarius:matrix.orgraitobezariusBTW, I might be missing something but: https://zh.fail/ shows i686-linux: A and x86_64-linux: B and total linux: C but A+B!=C14:11:49
@raitobezarius:matrix.orgraitobezarius
In reply to @vcunat:matrix.org
GitHub approvals aren't designed for this situation with mutually exclusive PRs.
I agree
14:11:56
@raitobezarius:matrix.orgraitobezariusDid we have anything better for that (given the time constraints)?14:12:10
@julienmalka:matrix.org@julienmalka:matrix.org
In reply to @raitobezarius:matrix.org
BTW, I might be missing something but: https://zh.fail/ shows i686-linux: A and x86_64-linux: B and total linux: C but A+B!=C
Yes what you are missing is aarch64-linux
14:13:03
@vcunat:matrix.orgVladimír Čunát
In reply to @raitobezarius:matrix.org
BTW, I might be missing something but: https://zh.fail/ shows i686-linux: A and x86_64-linux: B and total linux: C but A+B!=C
we have 3 linux platforms
14:13:04
@julienmalka:matrix.org@julienmalka:matrix.orgfirst14:13:09
@raitobezarius:matrix.orgraitobezariusthank you very much to this poor release manager14:13:18
@hexa:lossy.networkhexahttps://hydra.nixos.org/build/220892062#tabs-summary14:37:14
@hexa:lossy.networkhexatest timeouts are still breaking tested14:37:23
@raitobezarius:matrix.orgraitobezariusdidn't understand by "are still breaking tested"14:38:08
@raitobezarius:matrix.orgraitobezarius

machine # tail: error while loading shared libraries: libcrypto.so.3: cannot open shared object file: No such file or directory
machine: must succeed: stat -c '%s' /tmp/last
machine # XPCOMGlueLoad error for file /nix/store/v9w3kcpz9p01dp8kx5wxzj3ijyzvf9xn-firefox-102.11.0esr/lib/firefox/libmozgtk.so:
machine # libXdamage.so.1: cannot open shared object file: No such file or directory
machine # Couldn't load XPCOM.

14:38:29
@raitobezarius:matrix.orgraitobezariuslooks like firefox is really broken or the graphical stack14:38:42
@hexa:lossy.networkhexaawwh shit14:39:15
@raitobezarius:matrix.orgraitobezariusthe plasma stuff is beyond me, I see errors in the log but I am unable to determine which ones are false positives or not14:40:11
@raitobezarius:matrix.orgraitobezariusWe need the KDE maintainers to check them14:40:19
@hexa:lossy.networkhexa
❯ nom-build -A firefox-esr-102-unwrapped.tests
this path will be fetched (0.23 MiB download, 0.32 MiB unpacked):
  /nix/store/7pq9jbzab822y41lmmqs1971rg3n2bsy-vm-test-run-firefox-esr-102-unwrapped
copying path '/nix/store/7pq9jbzab822y41lmmqs1971rg3n2bsy-vm-test-run-firefox-esr-102-unwrapped' from 'https://cache.nixos.org'
14:41:44
@raitobezarius:matrix.orgraitobezariusI didn't know you could do that but :D14:44:16
@kranzes:matrix.orgIlan Joselevich (Kranzes)Do what?14:48:30

Show newer messages


Back to Room ListRoom Version: 6