!sBfrWMVsLoSyFTCkNv:nixos.org

OfBorg

173 Members
Number of builds and evals in queue: <TBD>64 Servers

Load older messages


SenderMessageTime
17 Aug 2023
@infinisil:matrix.org@infinisil:matrix.org cole-h: Anyways, regarding the RFC 140 CI check, I'll try to see how it could be integrated into ofborg. If it's easy I'll probably make a PR 23:46:18
@infinisil:matrix.org@infinisil:matrix.org(as much as I want to help fixing ofborg, I can't always get stuck in rabbit holes!)23:48:17
@infinisil:matrix.org@infinisil:matrix.org * (as much as I want to help fixing ofborg, I can't always get stuck in rabbit holes! RFC 140 should get done first :))23:48:33
@infinisil:matrix.org@infinisil:matrix.orgI slowly get what you meant by ofborg being a mess23:52:40
@infinisil:matrix.org@infinisil:matrix.orgIt's like 10000 lines of uncommented random-looking code23:53:05
18 Aug 2023
@infinisil:matrix.org@infinisil:matrix.org cole-h: https://github.com/NixOS/ofborg/tree/cda5aa2ac77a70bb5660d8d5614a640aacbe7523/ofborg/src/tasks/eval looks like it was made to support non-nixpkgs repositories. Is ofborg actually used on non-nixpkgs repos? 14:03:10
@infinisil:matrix.org@infinisil:matrix.orgAnd if not, could I just send a refactoring that removes the generic code?14:03:26
@cole-h:matrix.orgcole-hIf it's only the refactoring in that PR, I'd be happy to take a look, sure!14:04:53
@infinisil:matrix.org@infinisil:matrix.org cole-h: https://github.com/NixOS/ofborg/pull/649 14:33:31
19 Aug 2023
@ninjatrappeur:alternativebit.frNinjaTrappeur changed their display name from NinjaTrappeur .: DECT 8711 to NinjaTrappeur.11:11:26
20 Aug 2023
@skochen:matrix.orgStéphan left the room.18:26:47
21 Aug 2023
@infinisil:matrix.org@infinisil:matrix.org
In reply to @infinisil:matrix.org

What would be the best way to integrate this into ofborg? I've thought of some options:

  1. Just add the check here as a nix-build, but then CI would be super slow when Rust needs to be built
  2. Same as 1, but only make it run on the master branch, therefore generally avoiding problems with rebuilds, and this check is only important for new packages, which generally don't have to go to staging anyways
  3. Same as 1, but don't use dependencies from current Nixpkgs to build the Rust program, instead do a fetchTarball for the latest stable NixOS release, which should definitely have Rust cached
  4. Put the version of the Rust check program into ofborg itself, such that it's not influenced by anything going on in Nixpkgs. This is the fastest, but least flexible
I think I know what I'll do now: Write the program in Rust, check the source into Nixpkgs (it's internal to Nixpkgs), make it be built by Hydra, make the nixpkgs-unstable channel be blocked on it succeeding to build on x86_64-linux, then have a GitHub Actions workflow fetch it from the nixpkgs-unstable channel and run it on every PR
22:31:56
@infinisil:matrix.org@infinisil:matrix.orgThe trade-off here is that I need a separate initial PR to get the program building in Hydra and wait for a nixpkgs-unstable update before it can actually start running in CI, but that's fine22:32:51
@infinisil:matrix.org@infinisil:matrix.orgFrom then on it should be very smooth sailing, could use any sort of caching in GitHub actions to speed it up further too (static build + github's action cache should be really fast)22:34:24
@infinisil:matrix.org@infinisil:matrix.orgSo, no need to touch ofborg :)22:35:08
@infinisil:matrix.org@infinisil:matrix.org(and I think this would be a great general pattern we should use more often)22:35:33
@infinisil:matrix.org@infinisil:matrix.org Also this makes it more secure because CI won't have to build anything on its own. It does need to do a Nix evaluation, but it can do that with all the restrictions like pure eval, eval-only-mode, restricted eval, no IFD, etc. 22:38:31
@infinisil:matrix.org@infinisil:matrix.org * Also this makes it more secure because CI won't have to build anything on its own. It does need to do a Nix evaluation (for certain other bits of RFC 140), but it can do that with all the restrictions like pure eval, eval-only-mode, restricted eval, no IFD, etc. 22:38:45
@raitobezarius:matrix.orgraitobezarius(I'm not sure if we can always use this pattern for anything, but it seems to be relevant for this one)22:38:54
@raitobezarius:matrix.orgraitobezarius(there's a value in how ofborg works at scale)22:39:02
@infinisil:matrix.org@infinisil:matrix.orgRedacted or Malformed Event22:39:13
@raitobezarius:matrix.orgraitobezarius
In reply to @infinisil:matrix.org
Also this makes it more secure because CI won't have to build anything on its own. It does need to do a Nix evaluation (for certain other bits of RFC 140), but it can do that with all the restrictions like pure eval, eval-only-mode, restricted eval, no IFD, etc.
CI as in GitHub Actions or Hydra here?
22:39:31
@raitobezarius:matrix.orgraitobezariusI thought Hydra is building it or I misunderstood it22:39:40
@infinisil:matrix.org@infinisil:matrix.orgGitHub Actions22:39:46
@infinisil:matrix.org@infinisil:matrix.orgSo Hydra will only build committed things, while GitHub Actions avoids building any uncommitted things22:40:02
@raitobezarius:matrix.orgraitobezariusAh yes, I would say, it's safer or more secure in the sense of all our "build sandbox" parameters22:40:40
@raitobezarius:matrix.orgraitobezariusBecause our machine identity story is not super good for CI for Hydra22:40:51
@raitobezarius:matrix.orgraitobezariusBut I don't want to depend on GH Actions neither for that, but they do have proper machine identity and provenance22:41:09
@raitobezarius:matrix.orgraitobezarius(which is an example of CI security property that is desirable)22:41:43
@infinisil:matrix.org@infinisil:matrix.orgYeah22:41:44

Show newer messages


Back to Room ListRoom Version: 6