NixOS Networking | 914 Members | |
| Declaratively manage your switching, routing, wireless, tunneling and more. | 265 Servers |
| Sender | Message | Time |
|---|---|---|
| 17 Jun 2025 | ||
| well, rarer yes, but less expensive and disruptive to the existing infrastructure | 16:21:27 | |
In reply to @emilazy:matrix.orgcoughs nefarious purposes | 16:35:17 | |
| i'm reminded of this article i just saw like 10 minutes ago https://hackaday.com/2025/06/16/an-open-source-justification-for-usb-cable-paranoia/ | 17:07:14 | |
In reply to @charles:computer.surgeryhttps://shop.hak5.org/ | 18:02:30 | |
| Has anyone used NixOS to provision mikrotik routers? | 18:04:09 | |
In reply to @zhaofeng:zhaofeng.liAt best it provides side-band access, out-of-band requires different communication infrastructure. e.g. Wireline/POTS, Radio, ... Such that if your SFP failed, you would still be able to access that system. While, it is kind of cool, by running inside the SFP you're practically more "in-band" than just a cable itself. | 19:39:01 | |
| 21:38:05 | ||
| 18 Jun 2025 | ||
| 00:52:32 | ||
| 06:40:23 | |
| emily: roast me | 06:40:27 | |
| (while I take a nap) | 06:40:32 | |
In reply to @hexa:lossy.networkdo we have precedent for this kind of thing? I feel like it's normal for modules to configure defaults for other modules that might not be enabled (and in general to expect that you can set foo.X harmlessly if !foo.enable). I feel like it would be better for the resolver service modules to either get out of the game of setting the local resolver entirely or to explicitly turn on resolvconf to cause an explicit conflict | 13:43:19 | |
| (or we could move the setting out of resolvconf and have the resolved module respect it but that might be tricky) | 13:43:44 | |
| can someone please give me some feedback for how to deal with unbound's broken upstream? https://github.com/NixOS/nixpkgs/pull/417917 | 17:49:03 | |
| and my technically this is also my first nixpkgs PR because i have the tendency to rather not submit things that aren't entirely perfect, which i want to get rid off - i have like 10 different projects that are all 90% finished that i still want to upstream | 17:49:04 | |
| * and technically this is also my first nixpkgs PR because i have the tendency to rather not submit things that aren't entirely perfect, which i want to get rid off - i have like 10 different projects that are all 90% finished that i still want to upstream | 17:49:12 | |
In reply to @alina:kescher.atContacting them is best. Looking at what other distros that try to stay up to date (like Fedora) do can also be helpful. You can find links to other distros' package builds using Repology. | 17:51:15 | |
| Have you checked whether unbound HEAD still needs this old version? | 17:52:07 | |
| Sometimes we can just backport a change that makes it compatible with new versions. | 17:52:30 | |
| i assume so, since that feature was only introduced in 1.22.0 while we are now at 1.23.0 | 18:22:17 | |
| but i'm having a hard time making sense of that huge autoconfigure mess | 18:22:36 | |
| this is so fun, though i'm still a bit scared of messing up regarding social conventions around contributing to open source projects | 18:37:50 | |
| I think it is a super reasonable use case to use a full-blown resolver locally, so I'm opposed to removing them from the default resolver list | 18:48:08 | |
| and colocating resolved with one of these should make some noise, because I don't believe people set those up together intentionally. | 18:49:40 | |
| 19 Jun 2025 | ||
| right, I am just not sure if but I think that if we want to keep that behaviour, then the modules should set (TBH, I find the (FWIW I don't think that having | 10:29:11 | |
the question is just whether the recursive resolver modules are expressing the preference "by default, this should be the default resolver for the system" or "if you're using resolvconf, this should be the default resolver for the system" | 10:29:55 | |
* the question is just whether the recursive resolver modules are expressing the preference "by default, this should be the default resolver for the system, configured by resolvconf" or "if you're using resolvconf, this should be the default resolver for the system" | 10:30:12 | |
currently by omitting networking.resolvconf.enable they're expressing the latter, which might not be a thing that makes sense to express and led to your surprise | 10:30:33 | |
| 18:08:53 | ||
Same energy as caddy trying to install the self-signed CA into the local trust store by default if it's enabled - I was surprised and a bit annoyed by the behavior | 19:16:07 | |