| 16 Nov 2024 |
| Viorel-Cătălin Răpițeanu changed their display name from @catalin:one.ems.host to Viorel-Cătălin Răpițeanu. | 18:22:55 |
SigmaSquadron | In reply to @tomberek:matrix.org Thanks for putting it together. What prompted it? Upstream just asked me, and I said "sure" haha | 21:50:32 |
SigmaSquadron | In reply to @0x4a6f:matrix.org
Since 24.11, the Xen Project now has its own functioning options, available under the virtualisation.xen.* option set.
There seems to be a further history of this option set down the history lane of that other repo:
commit 5c1f8cbc70cd5e6867ef6a2a06d27a40daa07010
Author: Eelco Dolstra <eelco.dolstra@logicblox.com>
Date: Thu Oct 10 13:28:20 2013 +0200
Move all of NixOS to nixos/ in preparation of the repository merge
diff --git a/nixos/modules/virtualisation/xen-dom0.nix b/nixos/modules/virtualisation/xen-dom0.nix
oh yeah, the xen options were available since forever, but they were also broken since forever, so we pretend they didn't exist. | 21:50:57 |
SigmaSquadron | In reply to @0x4a6f:matrix.org
Since 24.11, the Xen Project now has its own functioning options, available under the virtualisation.xen.* option set.
There seems to be a further history of this option set down the history lane of that other repo:
commit 5c1f8cbc70cd5e6867ef6a2a06d27a40daa07010
Author: Eelco Dolstra <eelco.dolstra@logicblox.com>
Date: Thu Oct 10 13:28:20 2013 +0200
Move all of NixOS to nixos/ in preparation of the repository merge
diff --git a/nixos/modules/virtualisation/xen-dom0.nix b/nixos/modules/virtualisation/xen-dom0.nix
* | 22:30:43 |
| 17 Nov 2024 |
tomberek | Something about this sentence doesn't parse right as I read it.
> The Xen maintenance team recommends Xen because it provides exciting new opportunities to discover circular vendored build dependencies that normal software is incapable of providing, and also to anyone looking for: | 00:22:15 |
tomberek | Overall, yes. Once you're happy with the article, it is a good thing to put out. Do they also have some article about Nix/NixOS? | 00:31:30 |
SigmaSquadron | In reply to @tomberek:matrix.org Something about this sentence doesn't parse right as I read it.
> The Xen maintenance team recommends Xen because it provides exciting new opportunities to discover circular vendored build dependencies that normal software is incapable of providing, and also to anyone looking for: Emily wanted us to include that, so I did. | 16:13:22 |
SigmaSquadron | In reply to @tomberek:matrix.org Overall, yes. Once you're happy with the article, it is a good thing to put out. Do they also have some article about Nix/NixOS? As far as I'm aware, they don't use NixOS, so no. Maybe we can change that in the future! | 16:14:08 |
SigmaSquadron | In reply to @sigmasquadron:matrix.org As far as I'm aware, they don't use NixOS, so no. Maybe we can change that in the future! The Xen CM will publish it some time in December, to coincide with a website overhaul upstream is working on. | 16:15:18 |
| 20 Nov 2024 |
| Inayet removed their profile picture. | 00:59:09 |
| 22 Nov 2024 |
| Morgan (@numinit) joined the room. | 17:51:38 |
| 23 Nov 2024 |
Find me at aleksana:qaq.li | https://x.com/CyanNyan6/status/1860081140088107027 Pls forward this | 04:00:16 |
Find me at aleksana:qaq.li | https://vt.social/@lina/113532916219667185 | 17:06:05 |
Find me at aleksana:qaq.li | This one instead | 17:06:11 |
Find me at aleksana:qaq.li | ping @raboof | 17:10:20 |
| 25 Nov 2024 |
Bryan Honof | I'm not quite sure if someone is still doing the socials. But if anyone knows how to access these, I wouldn't mind take it over for a little. | 07:45:24 |
raboof | I have scheduled a few posts and am boosting stuff on Mastodon. Happy to point you in the right direction assuming people are OK with that. | 08:46:30 |
| 27 Nov 2024 |
crertel | Hi!
I was redirected here to discuss things. I've made some PRs, some merged, some stalled, some pending, some closed. I'm happy to follow process, but I'd also like to be able to productively use my time and Github issues seems like a perfectly reasonable way of working out in the open (and discoverability for Matrix is suboptimal for discussion and decisonmaking when compared with forge tooling).
The PRs in question I'd like feedback on on pushing forward:
- https://github.com/NixOS/nixos-homepage/pull/1587 -- This one is about closing 1511, a pretty straightforward request by somebody ( fricklerhandwerk I think?) to start debloating the community page.
- https://github.com/NixOS/nixos-homepage/pull/1573 -- This one is about trying to figure out how to make security front-and-center on the site as something the NixOS distribution cares about. Currently, it's kinda buried in the community security team page--and working on this has shown that the email alias for
security@nixos.org seems to be either busted or have spotty connectivity to the folks on the security team (based on testing). The thing here is that I don't actually know what the security policy should be (though I have guesses) and I'm trying to avoid telling the security folks how to do their job. I was kinda hoping we could workshop the PR and get to a good place with stakeholders (as has happened successfully with, for example, the extensive work on the immich PR).
Thanks!
| 01:26:00 |
hexa |  Download image.png | 01:38:26 |
hexa | security is already down here | 01:38:30 |
hexa | we already get lots of useful reports | 01:38:34 |
hexa | implementing well-known security is what is currently missing | 01:40:16 |
hexa | https://en.wikipedia.org/wiki/Security.txt | 01:41:03 |
hexa | https://datatracker.ietf.org/doc/html/rfc9116 | 01:41:15 |
hexa | you kinda went in without a concrete plan | 01:41:41 |
hexa | prior art was linked early on and not acted upon | 01:42:01 |
crertel | I was asking for a plan, and the information you just gave me--which would've been helpful to have on a comment on that PR--is a big help. Thank you! | 01:42:05 |
crertel | There's another philosophical question which is: would it be a good idea to put security right on the navbar? My personal bet is yes, because:
- there was a semi-high-profile kerfluffle earlier this year and not having an obvious single touchpoint seems to have hurt there.
- more generally (outside of internal NixOS stuff), one of the hugely useful things about using NixOS is supply chain integrity and other things of interest to security-conscious users.
| 01:45:33 |
hexa |
there was a semi-high-profile kerfluffle earlier this year and not having an obvious single touchpoint seems to have hurt there.
Uh … what?
| 01:46:31 |
hexa | I don't mind whether it is down there or up there, but the start page mentions security a bit too much | 01:47:15 |