!9IQChSjwSHXPPWTa:lix.systems

Lix

1122 Members
Lix user channel. Feel free to discuss on-topic issues here and give each other help. For matrix.to links to the rest of the Lix channels, see: https://wiki.lix.systems/books/lix-organisation/page/matrix-rooms303 Servers

Load older messages


SenderMessageTime
2 Feb 2026
@psentee:matrix.orgPsentee Yes, I don't want the entire dep tree to be able to call builtins.getEnv and bake it into derivations. I want to specify the entry point, and have everything underneath pure eval 12:26:40
@k900:0upti.meK900 That's currently achievable with restricted-eval and I hope to eventually make it less jank 12:27:12
@raitobezarius:matrix.orgraitobezarius https://docs.lix.systems/manual/lix/2.90/command-ref/conf-file.html#conf-restrict-eval 12:27:42
@psentee:matrix.orgPsentee(Also, my understanding is that impure eval allows unpredictable results, AFAIR fetching without a hash was allowed?)12:27:45
@raitobezarius:matrix.orgraitobezariuseval-time fetching without pinning is possible, yes12:28:24
@psentee:matrix.orgPsenteeSo I want to have a parameterized entry point, but fully predictable evaluation afterwards (no env access, no unpinned fetching, etc). I just want to easily inject parameters into the top level. Hopefully without templating an entire Nix expression as a string12:30:57
@psentee:matrix.orgPsentee (Speaking of which, is ./${"/path/with/spaces and other \${funny characters"}"} the best way to write a path literal that will reliably escape anything that might occur in a path?) 12:39:43
@k900:0upti.meK900 Yeah that's something we want to eventually have a good way of doing in some capacity 12:41:24
@psentee:matrix.orgPsentee It's good there is a way, took me a while to figure out this trick;) 12:42:16
@psentee:matrix.orgPsenteeAnyway, thanks for the help – looks like currently the best approach to get what I want is to stitch together a call expression. Not great, but I can live with that. Looking forward to that future CLI!12:46:44
@k900:0upti.meK900I personally want something pledge-shaped for eval at some point in the future12:48:46
@psentee:matrix.orgPsentee(I'd offer to help if it only wasn't C++, Lix isn't exactly a beginner friendly project)12:49:03
@psentee:matrix.orgPsentee* (I'd offer to help if it only wasn't C++, Lix isn't exactly a beginner friendly codebase)12:49:21
@522_:catgirl.cloud0x4fbb09 it/its ⛯✇ΘΔpledge shaped in the cli or in nix code?12:50:16
@k900:0upti.meK900In Nix code12:50:27
@k900:0upti.meK900restrict-eval is kinda that for CLI already12:50:35
@llakala:matrix.orgllakala
In reply to @psentee:matrix.org
If I want to pass data from CLI to my nix code without dropping into impure eval – is composing a Nix expression as a string / temporary file my best bet then?
--expr is what I choose when I need to test something, since I can have faith that it'll actually work
13:51:59
@holly:federated.nexusholly [nexus] 🏳️‍⚧️ changed their display name from holly to holly [nexus].13:52:01
@holly:federated.nexusholly [nexus] 🏳️‍⚧️ changed their display name from holly [nexus] to holly [nexus] 🏳️‍⚧️.13:52:30
@weethet:catgirl.cloudWeetHethttps://tangled.org/weethet.bsky.social/nix-run16:47:37
@llakala:matrix.orgllakala
In reply to @weethet:catgirl.cloud
https://tangled.org/weethet.bsky.social/nix-run
yay someone already made this, I don't have to
18:09:31
@llakala:matrix.orgllakala* yay someone already made this, now i don't have to18:09:47
@weethet:catgirl.cloudWeetHethttps://github.com/NixOS/nixpkgs/pull/464655 I with someone with commit access merged this18:16:49
@quadradical:federated.nexusQuadRadical (Ping) someone indeed di 19:36:14
@quadradical:federated.nexusQuadRadical (Ping)* someone indeed did19:36:17
@weethet:catgirl.cloudWeetHet Thanks raitobezarius 19:37:13
@weethet:catgirl.cloudWeetHetI really appreciate that19:37:21
@raitobezarius:matrix.orgraitobezariusnp19:37:28
@quadradical:federated.nexusQuadRadical (Ping) changed their display name from QuadRadical (Ping) @ FOSDEM to QuadRadical (Ping).20:27:28
@jlamur:matrix.orgJules Lamur Is there work on having a native/well integrated and secure way of passing credentials to the sandbox?
Is that something you think would be nice to have in the Nix ecosystem?
For example, and to cite my use-case, being able to sign UKIs / Lanzaboote binaries without having keys on my target host or leave the sandbox.
Passing credentials via sandbox-paths is one way to achieve that but it's not safe IIUC as it will make the keys available to every other builds (and it's not a very nice UX for end-users.)
20:38:10

Show newer messages


Back to Room ListRoom Version: 10