!9IQChSjwSHXPPWTa:lix.systems

Lix

1125 Members
Lix user channel. Feel free to discuss on-topic issues here and give each other help. For matrix.to links to the rest of the Lix channels, see: https://wiki.lix.systems/books/lix-organisation/page/matrix-rooms305 Servers

Load older messages


SenderMessageTime
2 Feb 2026
@jlamur:matrix.orgJules Lamur * Is there work on having a native/well integrated and secure way of passing credentials to the sandbox?
Is that something you think would be nice to have in the Nix ecosystem?
For example, and to cite my use-case, being able to sign UKIs / Lanzaboote binaries without having keys on my target host or leaving the sandbox.
Passing credentials via sandbox-paths is one way to achieve that but it's not safe IIUC as it will make the keys available to every other builds (and it's not a very nice UX for end-users.)
20:38:45
@raitobezarius:matrix.orgraitobezarius https://git.lix.systems/lix-project/lix/issues/951 20:48:32
@raitobezarius:matrix.orgraitobezarius^20:48:37
@raitobezarius:matrix.orgraitobezariusin general, my conclusion to do what you want securely is to use UNIX domain sockets20:49:08
@raitobezarius:matrix.orgraitobezariusif you have an UDS running locally and you can connect inside the sandbox to it to retrieve your secret key20:49:24
@raitobezarius:matrix.orgraitobezariusthe server side just need to authenticate the derivation20:49:30
@raitobezarius:matrix.orgraitobezariusbut if you use UDS, you receive a PID, a UID, a GID on Linux20:49:46
@raitobezarius:matrix.orgraitobezariusat that moment, you need a race-free technique to determine if that triple (PID, UID, GID) is the derivation you allow to receive a secret for20:50:07
@raitobezarius:matrix.orgraitobezarius(vague points left as exercises: how to identify a derivation, etc.)20:51:42
@jlamur:matrix.orgJules LamurThat's a good point and an interesting idea. I think that more than identifying the derivation, we need a way to declare which derivation should be able to get which secret (authn vs authz in some way). I've got no idea for that part.21:09:17
@jlamur:matrix.orgJules Lamur referencing the derivation that can get the secret from the CLI could work (there could be an similar interface as code with a flake.nix), eg. something like nix-build --secret sec1 ./path --allow-secret my.derivation sec1 21:15:05
@jlamur:matrix.orgJules Lamurthat's not a very nice UX as it requires to craft args for every derivation / every secret and to expose the derivation that can use the secret but it could work I think21:17:04
@jlamur:matrix.orgJules Lamur* that's not a very nice UX as it requires to craft args for every derivation / every secret (at least for non-flake users) and to expose the derivation that can use the secret but it could work I think21:17:30
@weethet:catgirl.cloudWeetHet One thing I don't know what to do anything about is that nix-build <tarball url> caches the tarball and there's no --refresh in nix2 so I have no idea how to force nix to redownload the tarball 21:20:19
@jlamur:matrix.orgJules Lamur Isn't --option tarball-ttl=0 doing that? Docs say Setting the TTL to 0 forces Lix to always check if the tarball is up to date. 21:27:59
@weethet:catgirl.cloudWeetHetOh, nice, I didn't know about that one21:28:22
@jlamur:matrix.orgJules LamurIt does check the Etag before redownloading btw so check the docs if that's not what you want :) 21:29:14
@weethet:catgirl.cloudWeetHet If I'm using nix-run to run a package from a nixpkgs PR and someone force pushes I wanna have a way to reuse the same url and not go fishing for a specific revision basically 21:31:12
@weethet:catgirl.cloudWeetHetImma add a --refresh option in the next nix-run release if I don't forget21:32:04
@jlamur:matrix.orgJules Lamur(after testing it a bit, I'm not sure that this option works as expected :/)21:34:13
@weethet:catgirl.cloudWeetHet* Imma add a --refresh convenience option in the next nix-run release if I don't forget21:34:25
@jlamur:matrix.orgJules Lamur without network and a cached tarball nix3 with --refresh fails: warning: error: unable to download [...] but nix2 with the option tarball-ttl does not 🤷 21:35:36
@jlamur:matrix.orgJules Lamur * without network and a cached tarball, nix3 with --refresh fails: warning: error: unable to download [...] but nix2 with the option tarball-ttl does not 🤷 21:35:45
@jlamur:matrix.orgJules Lamur *

without network and a cached tarball, nix3 with --refresh fails warns: warning: error: unable to download [...] but nix2 with the option tarball-ttl does not 🤷

(correction: it's a just a warning, maybe it's just not logged with nix2?)

21:38:14
@jlamur:matrix.orgJules Lamur * (after testing it a bit, I'm not sure that this option works as expected :/) 21:43:04
@jlamur:matrix.orgJules Lamur *

without network and a cached tarball, nix3 with --refresh fails warns: warning: error: unable to download [...] but nix2 with the option tarball-ttl does not 🤷

(correction: it's a just a warning, maybe it's just not logged with nix2?)

21:43:14
@jlamur:matrix.orgJules Lamur ^ PEBCAK, it does work, sorry for the noise. And WeetHet you probably want to set these other options to 0 too, I'm not sure: narinfo-cache-negative-ttl and narinfo-cache-positive-ttl. cf. https://git.lix.systems/lix-project/lix/src/commit/3d77ee8d94b3e8370bd85cd1430dd14dd475c3a7/lix/nix/main.cc#L646-L650 21:46:19
@raitobezarius:matrix.orgraitobezariusmy feeling is that you should never be able to ascribe the ACLs on the CLI or inside the drv params21:56:34
@raitobezarius:matrix.orgraitobezariusthe server should identify the derivation and consult its own ACL to authorize providing the secret or not21:56:47
@raitobezarius:matrix.orgraitobezarius but yeah a derivation may need a system feature like requiredSystemFeatures = [ "have-secret-X" ]; 21:56:59

Show newer messages


Back to Room ListRoom Version: 10