!vxTmkuJzhGPsMdkAOc:transformierende-gesellschaft.org

NixOS Matrix Subsystem

118 Members
Coordination and discussion about the matrix subsystem in NixOS - https://nixos.wiki/wiki/Matrix61 Servers

Load older messages


SenderMessageTime
15 Mar 2023
@hexa:lossy.networkhexayep 🙂12:00:36
@hexa:lossy.networkhexamake the default closure small12:00:44
@hexa:lossy.networkhexamake sure extras and plugins don't cause a rebuild, so everyone can rely on the cached package12:01:01
@hexa:lossy.networkhexaRedacted or Malformed Event12:01:54
@hexa:lossy.networkhexaRedacted or Malformed Event12:02:03
@hexa:lossy.networkhexaprometheus_client is actually not an optional dependency12:06:47
@hexa:lossy.networkhexathe idea is to make it more feasible to expose these extras listed here https://github.com/matrix-org/synapse/blob/develop/pyproject.toml#L249-L27312:07:17
@hexa:lossy.networkhexa which are all the packages marked as optional in the dependencies section 12:07:27
@hexa:lossy.networkhexabut grouping them like this makes their use much clearer12:07:37
@hexa:lossy.networkhexaand allows us to select them intelligently12:07:44
@ma27:nicht-so.sexyma27
In reply to @hexa:lossy.network
prometheus_client is actually not an optional dependency
heh, that was a wild guess and served just as an example :)
12:10:14
@hexa:lossy.networkhexayeah, I feel the same about prometheus, why isn't it optional?12:10:34
@ma27:nicht-so.sexyma27but yeah it sounds reasonable, so I'd say if you have the time for it then go for it, I'm happy to test the changes on my server if needed then :) 12:10:55
@hexa:lossy.networkhexafine, lets get the bump in first, I'll rebase 😛12:38:11
@hexa:lossy.networkhexahttps://github.com/NixOS/nixpkgs/pull/22131812:52:20
@hexa:lossy.networkhexa Dandellion: by the way: worker support when? 😄 12:59:27
@dandellion:dodsorf.asDandellion😬 probably after I've reworked how I do stream writers13:02:17
@hexa:lossy.networkhexastream writers?13:21:04
@dandellion:dodsorf.asDandellionhttps://github.com/matrix-org/synapse/blob/develop/docs/workers.md#stream-writers they're just a little more involved to set up so aren't as compatible with some of the abstracted worker-type machinery13:25:57
@hexa:lossy.networkhexahrm13:27:23
@hexa:lossy.networkhexaI would be up for a smaller start and incrementally adding complexity13:27:37
@hexa:lossy.networkhexabecause so far we only have out-of-tree solution13:27:48
@hexa:lossy.networkhexa * because so far we only have the out-of-tree solution13:28:14
@dandellion:dodsorf.asDandellionI can just upstream the worker.instance stuff first ig13:28:15
@hexa:lossy.networkhexaprobably for the best13:28:25
@hexa:lossy.networkhexawould be happy to review13:28:49
@dandellion:dodsorf.asDandellionmaybe this weekend then :)13:28:53
19 Mar 2023
@motiejus:jakstys.ltmotiejus

hi folks. I am setting up Synapse on my brand new NixOS server (still consider myself new to it). I have a couple of secrets -- registration_shared_secret, turn_shared_secret, macaroon_secret_key, which I am supposed to pass over extraConfigFiles`. Here is how I envision the process exactly:

  • The secrets are written on ramfs reachable as root alone.
  • ExecStartPre reads all secret files and pre-populates the yamls somewhere in /run/synapse via dirty printfs.
  • extraConfigFiles then point to the places wherever the one-step-above generates them.

Am I doing this right? Any other hints/ideas?

19:11:28
@motiejus:jakstys.ltmotiejus *

hi folks. I am setting up Synapse on my brand new NixOS server (still consider myself new to NixOS, but have been maintaining my synapse for ~2 years). I have a couple of secrets -- registration_shared_secret, turn_shared_secret, macaroon_secret_key, which I am supposed to pass over extraConfigFiles`. Here is how I envision the process exactly:

  • The secrets are written on ramfs reachable as root alone.
  • ExecStartPre reads all secret files and pre-populates the yamls somewhere in /run/synapse via dirty printfs.
  • extraConfigFiles then point to the places wherever the one-step-above generates them.

Am I doing this right? Any other hints/ideas?

19:11:48
@motiejus:jakstys.ltmotiejus *

hi folks. I am setting up Synapse on my brand new NixOS server (still consider myself new to NixOS, but have been maintaining my synapse for ~2 years). I have a couple of secrets -- registration_shared_secret, turn_shared_secret, macaroon_secret_key, which I am supposed to pass over extraConfigFiles\. Here is how I envision the process exactly:

  • The secrets are written on ramfs reachable as root alone.
  • ExecStartPre reads all secret files and pre-populates the yamls somewhere in /run/synapse via dirty printfs.
  • extraConfigFiles then point to the places wherever the one-step-above generates them.

Am I doing this right? Any other hints/ideas?

19:12:03

Show newer messages


Back to Room ListRoom Version: 4