Nix and buck2: from enemies to lovers with snowydeer (lixcon2026)

Nix and buck2: from enemies to lovers with snowydeer (lixcon2026)

Author: CCC media team April 17, 2026 Duration: 25:29
Nix does dependencies and distribution well, but has a controlling personality: it wants to build everything in the build graph. Buck2 delivers fast, user-friendly, and scalable project builds, but has an equally controlling personality and a lacking public dependency ecosystem. What if their build graphs touched ... and they were both girls? In this talk, I will demonstrate how we go from Nix to buck2 to Nix then deploy with containers: * Using Nix for dependencies in buck2 * Using buck2 in the project build: remote caching, fast builds, ~zero evaluation time * Importing store paths to Lix from buck2 output while correctly handling dependencies * Extending these techniques to build Docker images defined entirely in buck2, using nixpkgs `dockerTools` This talk focuses on buck2, but the techniques used apply to any powerful non-Nix build system. Hermetic build systems are hard to interoperate with, but there are cheat codes: by resolving their trust issues, you can combine their respective benefits. For the last year, my team and I have been working on a Buck2 migration for one of the largest Haskell codebases in industry to reduce build times from dozens of minutes to seconds and improve user experience. We use Nix to orchestrate hundreds of Haskell dependencies and hundreds more dependencies across the Rust, TypeScript, Python and C ecosystems. On top of that, we are running a much newer Haskell compiler than most of the industry due to active involvement in GHC development, which means a *heavily* patched nixpkgs Haskell dependency set to be able to incorporate these improvements. By building a Nix-Buck2-Nix sandwich, we were able to focus on rewriting our product build in buck2 while keeping both our Nix-based dependencies and our deployment pipelines to both NixOS and AWS ECS completely as-is. The novel contributions of this talk are: * Creating full-featured store paths *entirely* outside of Nix with Snowydeer: * Reference scanning outside of Nix using ripgrep * Using a new Lix CLI feature: output-addressed paths with references * Referencing those store paths from Nix language for further processing * Using Nix as a build step rather than a build driver to create an ergonomic Docker image builder with Snowydeer Container This talk builds on previous work, such as: - ["Integrating Nix and Buck2 for fun and profit"](https://www.youtube.com/watch?v=pDkFk7iggIE) by Claudio Bley - ["Haskell Builds at Scale: Comparing Bazel and Buck2"](https://www.youtube.com/watch?v=eA-3Gfr4epU) by Andreas Herrmann - ["Towards Dream Haskell Build Experience"](https://www.youtube.com/watch?v=WrdXUYFnRv4) by Ian-Woo Kim Licensed to the public under http://creativecommons.org/licenses/by/4.0 about this event: https://pretalx.dgnum.eu/lixcon-2026/talk/Z3CRCM/

Tune into the Chaos Computer Club-recent events feed for a direct line to the forefront of digital culture and critical technology discourse. Curated by the CCC media team, this podcast channels the raw, insightful atmosphere of Europe's most influential hacker association, bringing you recordings from their major gatherings and community events. Each episode is a deep dive into talks and presentations from the last two years, covering topics from cryptography and privacy rights to hardware hacking, societal impacts of surveillance, and open-source philosophy. You'll hear from researchers, activists, and engineers who are actively shaping our digital future, offering perspectives rarely found in mainstream tech conversations. This isn't a produced show with hosts; it's an archival audio stream of genuine conference sessions, complete with audience questions and the spontaneous energy of the live event. For anyone interested in the technical details and ethical debates at the heart of modern technology, this feed serves as an essential, unfiltered resource. Subscribe to this podcast to keep your finger on the pulse of the Chaos Computer Club's ongoing dialogue, where complex ideas are broken down and the tools for a more empowered digital life are openly discussed.
Author: Episodes: 100

Chaos Computer Club - recent events feed
Podcast Episodes
Tatort 🤡-IT (glt26) [not-audio_url] [/not-audio_url]

Duration: 45:27
None Im täglichen Geschäft kümmert sich der Vortragende unter anderem darum, dass die IT-Infrastruktur von diversen Kunden wie gewünscht und möglichst stressfrei funktioniert. Immer wieder gibt es dabei aber auch spannen…
Secure Boot und Linux - Geht doch (garnicht?) (glt26) [not-audio_url] [/not-audio_url]

Duration: 38:55
None Was ist eigentlich Secure Boot und warum müssen wir das für eine Linux Installation deaktivieren? Oder ist das gar nicht notwendig? In diesem Vortrag möchte ich einen Einblick in das Thema Secure Boot liefern und wi…
Android ohne Überwachung: FOSS-Apps auf dem Smartphone (glt26) [not-audio_url] [/not-audio_url]

Duration: 49:10
None Im Juli 2024 zeigte eine ausführliche Recherche von netzpolitik.org und dem Bayerischen Rundfunk anschaulich, wie Standortdaten detaillierte Bewegungsprofile von Millionen Menschen offenlegen. Viele Apps, darunter W…
eh23 Infrastructure Review and Closing (eh23) [not-audio_url] [/not-audio_url]

Duration: 52:25
Ein Überblick über unsere geführten Statistiken und am Ende wird der Kaninchenbau zurückgebaut. Wir haben die Schichten der Realität abgetragen, um zu sehen, was diesen Bau eigentlich im Inneren am Laufen hält. In diesem…
Exportkontrolle, Freihandel und Zölle (eh23) [not-audio_url] [/not-audio_url]

Duration: 47:09
Internationale Handelspolitik und Exportkontrolle wird seit vielen Jahren mit internationalen Bündnissen verhandelt und in die Politik gebracht. Das ging, weil sich alle im Grunde genommen einig waren. Da in vielen Gremi…
DB Museum Koblenz (eh23) [not-audio_url] [/not-audio_url]

Duration: 50:56
In diesem Vortrag schauen wir hinter die Kulissen des DB Museums. Was ist dort alles zu tun damit die Besuchenden ein möglicht schönes Besuchserlebnis bekommen. Insbesondere schauen wir uns die Arbeit des Simulator-Teams…
Elektronische Schlüssel Profilfräsen (eh23) [not-audio_url] [/not-audio_url]

Duration: 56:51
Der Schlüsselkopierschutz von Schließanlagen basiert darauf, das man die entsprechenden Schlüsselrohlinge nicht bekommt. Wie fräst man einen passenden Schlüssel aus einem Vollbart Rohling, von dem ersten modifizierten Or…