- cross-posted to:
- hackernews@derp.foo
Great achievement by the NixOS Developers. Congratulations!
- meteokr ( @meteokr@community.adiquaints.moe ) 17•1 year ago
Very cool, reproducible builds are a massive amount of work. Good to see Nixos succeeding in this regard.
- d3Xt3r ( @d3Xt3r@lemmy.nz ) 17•1 year ago
I thought NixOS was already reproducible, like, isn’t that the whole point? What’s the big deal here, and why is it a “great achievement” - does the Linux world now completely change? Does this revolutionize how Linux ISOs are built?
- completion ( @completion@lemmy.one ) English10•1 year ago
I think the ISO specifically wasn’t reproducible but now it is.
Nix packages are probably what you’re thinking of. They are reproducible
- Corngood ( @Corngood@lemmy.ml ) 24•1 year ago
In general nix packages are not reproducible in the sense that the output will be bit-for-bit identical. When a package is built on two different machines, nix will run the same commands, with the same environment variables, using identical inputs (e.g. source tarballs). However there are various ways build systems, compilers etc can still be non-deterministic, and this effort is about fixing that.
- Atemu ( @Atemu@lemmy.ml ) 6•1 year ago
In general nix packages are not reproducible in the sense that the output will be bit-for-bit identical.
A large amount aren’t but, OTOH, a large amount also are because Nix does almost everything it can to set up an environment without easily preventable sources of non-determinism such as general filesystem access, networking or other means of communication with some uncontrolled system.
- mitrosus ( @mitrosus@discuss.tchncs.de ) 4•1 year ago
Reading this thread I am even more confused about Linux in general.
- Atemu ( @Atemu@lemmy.ml ) 6•1 year ago
If you have questions, feel free to ask.
- Atemu ( @Atemu@lemmy.ml ) 9•1 year ago
There are different “levels” to reproducibility and there’s also a distinction between Nix/Nixpkgs and NixOS.
You can talk about r13y in terms of functional r13y (same behaviour, though even here you can differentiate between “roughly same behaviour” and “exact same behaviour”) and binary bit-for-bit r13y.
Nix/Nixpkgs are about producing individual binaries reproducibly. Functional r13y is the most important but binary r13y is a great boon for security testing as it makes verification simple and simplicity trumps when it comes to security.
NixOS is about building functionally reproducible OS configuration. Because it uses Nixpkgs, the binaries contained in the OS inherit Nixpkgs’ binary r13y. As Nixpkgs becomes more binary-reprodicible, so does NixOS and here we can see the point where binary r13y of the packages in the minimal ISO has reached a point where it’s thought to be fully reproducible.
The real meat of NixOS is functional r13y though; both kinds: You can reproduce a system with the exact same behaviour from a given Nixpkgs and NixOS config and you can use the same NixOS config with different revisions of Nixpkgs to produce systems which produce roughly the same behaviour.
- Tetsuo ( @Tetsuo@jlai.lu ) 9•1 year ago
If I remember correctly the F-Droid team on Android had a lot of trouble getting reproductible builds. I can’t imagine how difficult this would be for a whole system.
- taanegl ( @taanegl@beehaw.org ) 2•1 year ago
This means we’re one step closer to getting automated image building and testing for official flavours of NixOS. It’s a nice thing to have, but GODDAMN that’s a lot of work, and the build servers? Needed 65GB of storage just to build a minimal image. Can’t imagine what the entire GNOME stack would entail, even if it fetches from a binary cache.