!9IQChSjwSHXPPWTa:lix.systems

Lix

1103 Members
Lix user channel. Feel free to discuss on-topic issues here and give each other help. For matrix.to links to the rest of the Lix channels, see: https://wiki.lix.systems/books/lix-organisation/page/matrix-rooms295 Servers

Load older messages


SenderMessageTime
30 Nov 2025
@just1602:systemli.orgjust1602IMO the solution would be nix4 only if we actually deprecated the other two. For the unified thing, you can create aliases but it could be good for UX to have a command that handle flake automatically if flake is enabled, etc If we don't go that way, I'm totally fine with it, but we'll need really good documentation and tutorial to explain people how to properly and efficiently use our thing 19:16:58
@helle:tacobelllabs.nethelle (just a stray cat girl)pondering if someone should just prototype this as a pile of wrappers, see where consistency would strand, etc19:18:51
@weethet:catgirl.cloudWeetHetI'm not against a better nix cli then nix2, nix3 is just not it19:19:11
@helle:tacobelllabs.nethelle (just a stray cat girl)might not be the best solution, but sometimes throwing some bad code in a standalone setting shows quickest what the right UX should be19:19:25
@weethet:catgirl.cloudWeetHetI might just be used to it but I don't think nix2 is that bad19:30:51
@weethet:catgirl.cloudWeetHetIt can use some improvement (like changing/allowing to set up different default log format) but overall it works with files(-ish) and expressions/attributes and does exactly what it is supposed to do19:33:27
@weethet:catgirl.cloudWeetHet One thing it's missing badly is a native concept of shells leading to having to work around it and having a dependency on nixpkgs 19:35:42
@weethet:catgirl.cloudWeetHet One would assume that a new CLI should address this first and foremost to close a hole leading to a dependency on the internal nixpkgs logic and propose a new structured way to approach devshells 19:37:23
@weethet:catgirl.cloudWeetHetNix3 doesn't do that.19:37:29
@helle:tacobelllabs.nethelle (just a stray cat girl)one of the interesting questions with that is, well, this can be done with nix code, so should this just be a smaller external thing (possibly maintained in conjuction with lix), mostly independent of nixpkgs19:50:08
@raitobezarius:matrix.orgraitobezarius
In reply to @weethet:catgirl.cloud
What's the point in leaving nix3 CLI in Lix if it would be there strictly so that an external plugin would work
The point is doing it progressively
19:59:36
@raitobezarius:matrix.orgraitobezariusAnd anyone can add a plugin19:59:44
@raitobezarius:matrix.orgraitobezariusWe might enable nix3 CLI to have a workable installable syntax without Flakes but we don't know yet where we will get20:00:16
@raitobezarius:matrix.orgraitobezarius
In reply to @weethet:catgirl.cloud
Nix3 doesn't do that.
We already agree to this and there's a nix4 CLI project
20:01:05
@raitobezarius:matrix.orgraitobezariusThat's not reason enough to bomb nix3 :p20:01:15
@just1602:systemli.orgjust1602I'm wondering if there's gonna be a way for nix4 cli to not be written in C++, so we could use something like clap 😃20:19:43
@raitobezarius:matrix.orgraitobezariusI don't believe it, RPC for CLI is way too far20:24:01
@weethet:catgirl.cloudWeetHetCan't we use FFI instead?20:45:30
@weethet:catgirl.cloudWeetHet We already do for :doc in repl? 20:45:45
@raitobezarius:matrix.orgraitobezariusExceptions and Rust is not going to be funny21:07:29
@raitobezarius:matrix.orgraitobezarius
In reply to @weethet:catgirl.cloud
We already do for :doc in repl?
It's not really FFI, it's cheating
21:35:41
@jlamur:matrix.orgJules LamurHi, does anyone know how to run nixcpp/lix in a podman rootless container (no caps and /proc masked)? I'll try to dig into that but I thought somebody may have had the same usecase already :)21:37:56
@raitobezarius:matrix.orgraitobezariusWith sandbox or without?21:38:37
@hexa:lossy.networkhexapossibly https://github.com/DavHau/nix-portable21:38:38
@jlamur:matrix.orgJules Lamuryeah sorry forgot about the important part: with the sandbox :)21:38:49
@jlamur:matrix.orgJules Lamur(ie. sandbox-fallback = false)21:39:03
@raitobezarius:matrix.orgraitobezariusAFAIK the podman rootless thing has a seccomp policy that prevents all unshare calls with any relevant arg21:39:13
@raitobezarius:matrix.orgraitobezariusIf you get rid of that and you have subuid delegation, you can run with sandbox21:39:30
@raitobezarius:matrix.orgraitobezariusOtherwise hexa gave you the 50% performance penalty solution by using syscall interception21:39:46
@jlamur:matrix.orgJules Lamur yep you're right, running with eg podman run --cap-add=SYS_ADMIN --security-opt unmask=/proc/* --rm -it works 21:39:53

Show newer messages


Back to Room ListRoom Version: 10