gchristensen changed the topic of #nixos-chat to: NixOS but much less topical || https://logs.nix.samueldr.com/nixos-chat
xd1le has quit [Ping timeout: 260 seconds]
xd1le has joined #nixos-chat
kalbasit has joined #nixos-chat
evax has quit [Ping timeout: 240 seconds]
evax has joined #nixos-chat
neeasade has quit [Ping timeout: 256 seconds]
rajivr has joined #nixos-chat
drakonis has quit [Quit: WeeChat 2.8]
iqubic has joined #nixos-chat
drakonis has joined #nixos-chat
waleee-cl has quit [Quit: Connection closed for inactivity]
<ashkitten> holy crap i just turned on my desktop speakers for the first time in a while and they went B-B-B-B-B-B-B
<ashkitten> (like, really loud)
<ashkitten> turns out having an entire wifi router right next to the control box is bad for interference....
<bqv> anime sound effects in real life
kalbasit has quit [Ping timeout: 264 seconds]
<ashkitten> anyways having pavucontrol and qjackctl running simultaneously and showing the same graph is pretty cool
xd1le has quit [Ping timeout: 260 seconds]
<bqv> oh, it was nix-index i was debugging yesterday... i got distracted and started implementing full-system appapmor :|
<ashkitten> whoops
kalbasit has joined #nixos-chat
cole-h has joined #nixos-chat
drakonis has quit [Quit: WeeChat 2.8]
<bqv> hardcoded usr/bin's in dotnet assemblies, yuck
<bqv> can't even use libredirect cause dotnet
cole-h has quit [Quit: Goodbye]
<bqv> uhh, systemd is listening on 5001/tcp, and i have no idea why
<bqv> oh, phew, it's ipfs
<Ashy> that post reminds me i've been thinking about how nix could be a super useful performance benchmarking tool for various projects (not just rust)
<Ashy> i made a super barebones repo focused on phoronix-test-suite a few months back: https://github.com/AshyIsMe/phoronix-test-suite-nixos
<Ashy> i could imagine it combined with a barebones nixos configuration.nix and the nixos-rebuild build-vm option
<Ashy> not sure if i'm talking smack or not
iqubic` has joined #nixos-chat
iqubic` has quit [Remote host closed the connection]
iqubic has quit [Ping timeout: 256 seconds]
kalbasit has quit [Ping timeout: 240 seconds]
polezaivsani has joined #nixos-chat
FRidh has joined #nixos-chat
<makefu> ,escape${
<{^_^}> Escape this in '' strings with: ''${
<{^_^}> Escape this in " strings with: \${
__monty__ has joined #nixos-chat
avn has quit [Ping timeout: 256 seconds]
<ashkitten> pipewire is so exciting and i don't know why it makes my brain go wheeee
<joepie91> the tinkering factor?
<ashkitten> yeah, probably
<ashkitten> also pipewire means i can use jack patchbay apps with pulseaudio
cjpbirkbeck has quit [Quit: Goodbye, take care]
<ashkitten> which is something i've wanted to do literally since i first used jack
<ashkitten> presumably i will also be able to use fun plugins with carla eventually
<philipp[m]> Oh, that sounds very interesting. Can I also use pulseaudio bluetooth devices with jack with that?
<Mic92> Ashy: I also fixed filesystem benchmarks for phoronix here: https://github.com/nix-community/nix-environments/tree/master/envs/phoronix-test-suite
<Mic92> could be merged I suppose
<eyJhb> Wondering how hard it is to recover a Windows host that might have been infected versus a NixOS host?
<eyJhb> I am guessing, worst case would be, if still access to NixOS is to validate the daemon files manually, and then force a ingregrity check, to ensure the store has not been tampered with
<eyJhb> Whereas Windows is just, out of luck?
waleee-cl has joined #nixos-chat
<philipp[m]> I don't think you could trust the system if the store was fixed. An attacker could have put a malicious file in $PATH that is outside of the nix store.
<eyJhb> Well, having tmpfs or erase your darlings would not allow files to be placed all over, and the PATH is controlled from the store besides that
<eyJhb> Having a warnfs would be cool. Sending alerts when a file is written to outside of a whitelist as well
<eyJhb> but yeah philipp[m] , they could do that, but I would assume that the PATH is Nix controlled, etc.
<eyJhb> I will still assume recovery of a NixOS system is easier than most?
<eyJhb> Dunno if adisbladis gchristensen have any experiecnce?
<eyJhb> Or srhb
<philipp[m]> That really depends on the system and the attack. For example I think the answer for a production server would be "you should be able to replicate that anyway within minutes, just throw it away and spool up a new instance".
<philipp[m]> Desktop could be trickier. I guess manually verifying your nix config, setting up a new home for all users and manually moving non infected files back. Probably still less pain than windows.
<srhb> eyJhb: With what exactly?
<srhb> Recovery in general? Yeah, of course delete and start over is preferable, and the way I design things if I can possibly get away with it, but I've been responsible for some fairly wild NixOS (and nix-on-something-else) deployments where that wasn't immediately possible. You can certainly recover from a lot of situations where you'd probably just give up were it not for Nix.
<eyJhb> With potential malware on a NixOS production system, or something along those lines. General any recover sutiation
<srhb> Ah
<eyJhb> Yeah, that is what I would assume would be the best
<srhb> In that case I'd most certainly nuke, but I've never heard of such an attack. Maybe we're complacent.
parsley936 has joined #nixos-chat
<eyJhb> Not sure if you can say if DBCDK has tried any/had any
<eyJhb> Hmm, maybe
<srhb> We have not had malware attacks on NixOS servers (that we know of) ;)
<eyJhb> I would just guess it is a huge selling point, to "easily" check if a system is consistent and ingegrity check it
<srhb> Yes, indeed.
<eyJhb> So only other *nix distributions? ;)
<srhb> Also, things like vulnix etc.
<srhb> I can't comment on that, it's not my domain :)
<Mic92> Its probably a lot security by obscurity with NixOS right now. Many dynamically linked malware would simply not run.
<Mic92> However I can see how hardening could be achived by not allow programs outside the nix store to be executed.
<Valodim> until the hackers start writing reproducible exploit nix expressions
<Mic92> And than checking everything that is in the nix store.
<Mic92> You can also check on the machine itself what signatures a path has.
<Mic92> And detect locally built derivations
<Mic92> Might be also interesting to limit the amount of users that are allowed to access the nix daemon socket.
<eyJhb> Valodim: yeah, but you could easily get rid of this malware. Validate the configs, purge everything else than the current build
<eyJhb> Mic92: agreed
<eyJhb> No root access! \s
<adisbladis> eyJhb: For sure NixOS recovery is easier than most
<adisbladis> But I still wouldn't trust any "recovered" system
<adisbladis> If it's pwnt you start fresh
<eyJhb> Also, if you can nix-build, I guess you have root
<eyJhb> But starting fresh is much easier in NixOS, so :D
<eyJhb> If you have done it right at least
<eyJhb> I would just HATE to have to clean a Windows system
<srhb> eyJhb: nix-build does not equal root unless you trust every store path in the store (which you shouldn't)
<srhb> Only the ones produced by expressions you trust. :)
<eyJhb> Can't you make a nix expression that SETUID with root, that you can run?
<adisbladis> No
<adisbladis> The nix store doesn't support setuid
<eyJhb> We need to support that! \s
<srhb> eyJhb: That' what we have security wrappers for in NixOS
<srhb> (implying: Don't trust strangers' activation scripts :P)
<eyJhb> Trust everyone!
<eyJhb> I still need a NixOS challenge for Aarhus CTF 2020
<eyJhb> But would require it to run in Docker :(
<Mic92> eyJhb: there are nix expressions to build windows with nix
<philipp[m]> I had a look whether I could do something about that 20.03 channel blocker and all I can say that: Wow, vala looks really annoying to debug.
<eyJhb> On a completely unrelated note, time to read up on the exams without access to the course materals because the site is totally 100% not down.
<eyJhb> Building Windows machines Mic92 ?
<Mic92> eyJhb: windows vms
<eyJhb> Any link?
<eyJhb> THat sounds cool
<eyJhb> The link is slooow
<eyJhb> But cool! Will check it out
<Mic92> adisbladis: how many hairs did you loose when building wfvm ?
<adisbladis> Mic92: Over 9000
<eyJhb> You have lots anyway adisbladis
<Mic92> I just imagine you beeing bald by now
<eyJhb> `iboughtthisone`
<eyJhb> Suuuuuuuuuure
<eyJhb> How do you handle installs?
<eyJhb> I want to write a rootkit for NixOS soo badly now
__monty__ has quit [Quit: leaving]
<Ashy> Mic92: ah nice, i should clean that repo up a bit make it easy to run some of the bigger benchmark groups
waleee-cl has quit [Quit: Connection closed for inactivity]
xd1le has joined #nixos-chat
<eyJhb> srhb: forcefully got adisbladis to merge the PR :D
neeasade has joined #nixos-chat
avn has joined #nixos-chat
<Valodim> I'm trying to get a super basic flake to work to build my system following the flakes part 3 blog post. I get this error, and I triple-checked I don't get what I'm doing different from the blog post
<Valodim> "flake 'github:NixOS/nix/b3e73547a03f068ae4dd9cca4bc865cde85c8dec' does not provide attribute 'packages.x86_64-linux.nixosConfigurations."calamity".config.system.build.toplevel'"
<Valodim> does the 20.03 flake not yet have what the blog post requires yet, or something?
<Valodim> the flake is basically nothing besides `nixosConfigurations.calamity = nixpkgs.lib.nixosSystem { system = "x86_64-linux"; modules = [ ./configuration.nix ]; }`
<Valodim> or is `nixpkgs.lib.nixosSystem` not actually what I want? if so, the blog post doesn't specify >_>
<Valodim> ooohhhhh
<bqv> lol
<Valodim> so this: "nixos-rebuild build --flake nix" will not build the flake that's in a directory "nix"
<Valodim> this will: "nixos-rebuild build --flake nix/"
<bqv> you should use explicitly relative paths
<bqv> disambiguates entirely
<bqv> nix -> ./nix
<Valodim> I'm fine if that's a rule inside nix expressions, but getting arcane error messages when I didn't consider this at shell level was pretty damn frustrating
<bqv> you're now dealing with flake URIs, not dumb attrpaths
<bqv> `nix` will resolve to nix#defaultPackage.${currentSystem} first
<bqv> .yj
<bqv> *etc
cole-h has joined #nixos-chat
<eyJhb> bqv: dvorak?
<bqv> ish
<eyJhb> Colemak?
<bqv> programmer-dvorak for text, british-qwerty for commands
<bqv> the constant context switching keeps me on my toes
<bqv> and means i can mostly keep my muscle memories
<eyJhb> Weeellllllll
<eyJhb> That does not sound nice :p
<bqv> what can i say, i'm a masochist
<bqv> what in the world
<bqv> woman just crashed my emacs
<bqv> also, why is woman so much heavier and slower than man
neeasade has quit [Remote host closed the connection]
* philipp[m] tries hard not to do immature jokes
<philipp[m]> I have that problem, too.
jasongrossman has joined #nixos-chat
rajivr has quit [Quit: Connection closed for inactivity]
cjpbirkbeck has joined #nixos-chat
__monty__ has joined #nixos-chat
<crazazy[m]> bqv: is this because of the DT video?
<bqv> hm?
<bqv> i dunno what that is
<bqv> i don't youtube
<crazazy[m]> oh
<crazazy[m]> guy does linux software videos. when he covered guix 4chan started to get spammed with guix discussions
<crazazy[m]> which quickly got derailed into political arguments on wether guix should've made their joint statement against stallman or not
<crazazy[m]> in typical /g/ fashion, of course
<bqv> curious
<crazazy[m]> also found it funny that he was pretty positive about guix, but when he tried installing nixos like 2 or so years back he was complaining about the operating system
jD91mZM2 has quit [Quit: ZNC 1.8.0 - https://znc.in]
<bqv> why was that related to anything i said though?
<bqv> or is this just cause i made the guix flake
jD91mZM2 has joined #nixos-chat
drakonis has joined #nixos-chat
<crazazy[m]> dunno i think i went on a bit of a tangent
jasongrossman has quit [Ping timeout: 240 seconds]
<crazazy[m]> also his most recent video was about WoMan
<bqv> oh, right, ok
<ashkitten> what is woman?
<crazazy[m]> manpages in elisp
<srhb> ugh, it's very easy to hit the github rate limit with flake experiments..
<bqv> srhb: setup github credentials
<bqv> it's the only way
<bqv> i hit the same
<bqv> even after being warned by emilf
<bqv> *y
<srhb> bqv: Hmm, what's a nice way to do that that passes it on to nix?
<bqv> wow that was a hell of a typo, now i read it back...
<bqv> srhb: yes, there's an env var
<srhb> Aha, thanks!
obadz has quit [Ping timeout: 256 seconds]
obadz has joined #nixos-chat
<crazazy[m]> wait how do you hit the rate limit? i've gotten it multiple times but it happens at fairly irregular moments
<bqv> (hand-crafted url, ymmv)
<srhb> crazazy[m]: 60 requests in.. an hour?
<srhb> crazazy[m]: Something like that
<srhb> There's also some other limits.. It's in the docs somewhere.
<srhb> bqv: Appreciate it :)
<crazazy[m]> like sometimes i get it while browsing the site, and sometimes i get it while updating niv dependencies
<srhb> niv makes sense, I didn't know the regular (non-api-url) site ever had rate limits
<crazazy[m]> yea especially when hot-keyings throguh the search bar with vim keyinds the rate limit pops up
<crazazy[m]> rate limit is gone after a page refresh though
<bqv> i found out as soon as i tried to update https://github.com/bqv/xontribs :D
<bqv> i think --recreate-lock-file on that twice is enough to bust the api limit
<bqv> compiling the kernel always seems so daunting, but it's actually a pretty small compile, on the scale of things...
<bqv> i always lose sight of that when i haven't built one in a while
waleee-cl has joined #nixos-chat
<bqv> > kapow.meta.description
<{^_^}> "Expose command-line tools over HTTP"
<bqv> :|
FRidh has quit [Quit: Konversation terminated!]
parsley936 has quit [Remote host closed the connection]
parsley936 has joined #nixos-chat
<eyJhb> bqv: RCE
<eyJhb> Basically :D
<bqv> yeah
<bqv> voluntary vulnerabilities, i like it
<eyJhb> system($input); would be easier :p
<eyJhb> I need to learn Nix
<eyJhb> A lot more
<bqv> whyso?
<eyJhb> Android APK stuff
<eyJhb> I need to refactor some stuff...
<eyJhb> Or something
<bqv> hm
<bqv> android apks seem like a weird use for nix specifically
<eyJhb> Building stuff?
<eyJhb> Seems like a good idea :p
<bqv> doesn't need nix
<eyJhb> Well, most things in npm doesn't either
<eyJhb> Or go
<eyJhb> Or Rust
<eyJhb> etc.
<eyJhb> But Nix is a hell of a good build system
<bqv> might as well just use the normal tooling, since the result isn't used in nix in the end
<bqv> the result is a zip file sent to a phone without nik
<bqv> so it's just masochism really
<eyJhb> Not really, as soon as you want to do it reprocuceable, want to patch things and run a fdroid repo
<eyJhb> Nix makes a lot of sense
<eyJhb> One off APK, no
<eyJhb> Multiple, yes
<bqv> $shrug
<ashkitten> does f-droid's infra just suck?
<ashkitten> and like, the reviewers for the repo...
<eyJhb> It works I guess
<eyJhb> Or are you stating it?
__monty__ has quit [Quit: leaving]
xd1le has quit [Read error: Connection reset by peer]
xd1le has joined #nixos-chat
<bqv> oh, that's another thing i wanted to do, automate flake lock updates
<bqv> in a separate branch
<bqv> then i can just merge them in and they're already built
<bqv> ...this is gonna need a hydra isn't it
<Mic92> bqv: I think something like this exists as a github action for niv.
<Mic92> So this could be extended for flakes as well
<bqv> yeah
<eyJhb> I am not sure how, but I am making this code uglier, while it still does the same
<bqv> that's wacky
<bqv> i think i'll just start fresh
<bqv> especially cause i'd rather not use github pull requests
<Mic92> Directly push to master?
<eyJhb> ` then (recursiveUpdate depValue (stdenv.lib.elemAt (stdenv.lib.attrValues (stdenv.lib.getAttrs [ depName ] moduleOverrides)) 0 ) )` I have this, and should stop torturing Nix for today
<bqv> Mic92: i meant something using refs/pull or similar would do
<bqv> otherwise just branches
<bqv> there was another one i liked, but i can't find it right now
<bqv> either way, since this is a situation where i don't have to worry about other people, i'd rather use something decent
endformationage has joined #nixos-chat
polezaivsani has quit [Ping timeout: 246 seconds]
<ashkitten> ,locate jackdbus
<{^_^}> Found in packages: jack2
<ashkitten> hmm
<bqv> ack, cant do github, cause it's a repo with secrets.
<bqv> maybe this is more trouble than it's worth
cole-h has quit [Quit: Goodbye]
bqv has quit [Quit: WeeChat 2.9]
parsley936 has quit [Remote host closed the connection]
bqv has joined #nixos-chat