!aGqRytqbCECitOFhbt:nixos.org

Release Management

338 Members
25.11 "Xantusia" | https://nixos.github.io/release-wiki/Home.html93 Servers

Load older messages


SenderMessageTime
20 May 2023
@raitobezarius:matrix.orgraitobezariusThe fix has to be done here I guess00:10:59
@raitobezarius:matrix.orgraitobezariusTurn the "no" into a "warn" if this an insecure exception00:12:10
@raitobezarius:matrix.orgraitobezariusActually I wonder if we should not let go this crisis to waste00:16:32
@raitobezarius:matrix.orgraitobezariusAnd introduce a willBeEOL flag or something00:16:48
@hexa:lossy.networkhexa this is piegames territory 😄 00:18:23
@raitobezarius:matrix.orgraitobezariusNixpkgs warnings when00:18:38
@raitobezarius:matrix.orgraitobezarius(in the sense of the RFC)00:18:46
@hexa:lossy.networkhexa raitobezarius: ruby openssl gem only fails when building gitlab 01:39:46
@raitobezarius:matrix.orgraitobezariusIs gitlab pinning openssl wrongly01:46:15
@raitobezarius:matrix.orgraitobezariusrubyRelaxDeps when01:46:22
@hexa:lossy.networkhexathey pin openssl 2.2.2 😄01:46:47
@raitobezarius:matrix.orgraitobezariusWell that sounds like actionable01:47:43
@hexa:lossy.networkhexa yeah, posted to #gitlab:nixos.org 01:47:50
@raitobezarius:matrix.orgraitobezariusI just hope it does not have far reaching impacts01:47:53
@raitobezarius:matrix.orgraitobezariuse.g. crippling the ssh or TLS stuff01:48:04
@vcunat:matrix.orgvcunat
In reply to @raitobezarius:matrix.org
The fix has to be done here I guess
We could configure Hydra's eval to allow insecure stuff.
07:54:13
@vcunat:matrix.orgvcunatMaybe that will be a good policy for most cases where the flag is set? Probably better err on the side of building a few things that aren't really useful?07:55:38
@vcunat:matrix.orgvcunatSo like around here? https://github.com/NixOS/nixpkgs/blob/master/pkgs/top-level/release.nix#L19 (which can be overridden trivially in each jobset's config)07:57:43
@raitobezarius:matrix.orgraitobezarius
In reply to @vcunat:matrix.org
We could configure Hydra's eval to allow insecure stuff.
Would you do it for all insecure stufF?
13:40:59
@raitobezarius:matrix.orgraitobezarius
In reply to @vcunat:matrix.org
We could configure Hydra's eval to allow insecure stuff.
* Would you do it for all insecure stuff?
13:41:00
@raitobezarius:matrix.orgraitobezariusLike, I err also on the side of building the things that are really useful13:41:17
@raitobezarius:matrix.orgraitobezariusLike only Node.js 16, and OpenSSL 1.1 in our case13:41:24
@raitobezarius:matrix.orgraitobezarius But I don't have any data and real opinion on building everything that's insecure by default 13:41:37
@raitobezarius:matrix.orgraitobezariusBeyond the fact that my gut feeling is that I do not want to encourage free cache for insecure software13:41:47
@raitobezarius:matrix.orgraitobezariusAt the same time, @delroth (which is not in this channel) argued that making security updates a PITA will make users less wanting to upgrade13:42:04
@raitobezarius:matrix.orgraitobezariusWhile this argument seems indeed sound, I do not know what to do about users who give up on doing security updates because their insecure software requires recompilation13:42:27
@raitobezarius:matrix.orgraitobezariusFor Node.js 16 & OpenSSL 1.1, this makes sense this would be too much13:42:38
@raitobezarius:matrix.orgraitobezariusIs there anything else to that list?13:42:47
@vcunat:matrix.orgvcunatYes, I meant all. I thought of it mainly because it seemed much easier to implement. I assume it will always be very cheap to build. Maybe I should check what gets covered right now (transitively).13:48:18
@raitobezarius:matrix.orgraitobezariushttps://github.com/NixOS/nixpkgs/pull/23302413:48:37

Show newer messages


Back to Room ListRoom Version: 6