!NhAsaYbbgmzHtXTPQJ:funklause.de

Nix NodeJS

204 Members
58 Servers

Load older messages


SenderMessageTime
10 Aug 2023
@lily:lily.flowersLily FosterUnfortunately19:05:20
@countoren:matrix.orgcountorenwell writeShellScript that reads the npmrc wont leak it to nix store19:05:43
@lily:lily.flowersLily FosterSo are you meaning a shell script that changes the daemon systemd overrides and reloads it? (Just to be clear)19:06:04
@countoren:matrix.orgcountorenif you want I could it give it to put in docs the moment i have it19:06:13
@countoren:matrix.orgcountorenyes19:06:21
@lily:lily.flowersLily FosterOkay if it's just a script that configures someome's system I suppose that won't leak anywhere19:06:41
@lily:lily.flowersLily Foster(Maybe make sure override file has tight perms though)19:06:58
@countoren:matrix.orgcountorenbtw could not override a file there19:07:20
@lily:lily.flowersLily Foster Or have it include an EnvironmentFile in the unit settings that you put elsewhere with tight perms is probably best 19:07:29
@countoren:matrix.orgcountorenthe entire folder is on the nix store19:07:29
@lily:lily.flowersLily Foster
In reply to @countoren:matrix.org
the entire folder is on the nix store
Oh, rip
19:07:37
@countoren:matrix.orgcountorensystemctl set-env...19:08:02
@lily:lily.flowersLily FosterYeah I'm sorry the Nix UX kinda sucks for this :(19:08:09
@countoren:matrix.orgcountorenthe problem with that it exposes the var to any process19:08:18
@lily:lily.flowersLily Foster
In reply to @countoren:matrix.org
systemctl set-env...
That does similar, but maybe it stores it somewhere else
19:08:23
@lily:lily.flowersLily Foster* Yeah I'm sorry the Nix UX kinda sucks for this :(19:08:29
@lily:lily.flowersLily Foster
In reply to @countoren:matrix.org
the problem with that it exposes the var to any process
oh
19:08:40
@lily:lily.flowersLily FosterThis setting it in manager conf then19:08:48
@countoren:matrix.orgcountorenmanager conf?19:09:04
@lily:lily.flowersLily Fostersystemd service manager config. So it gets inherited across all services and systemd itself19:09:24
@lily:lily.flowersLily FosterBut that's probably ... fine19:09:32
@countoren:matrix.orgcountorenis'nt it kinda defeat the purpose ?19:09:56
@countoren:matrix.orgcountorenwell I guess it is better then being in nix store...19:10:17
@countoren:matrix.orgcountorenActually should'nt the rust just read npmrc if exists?19:11:15
@lily:lily.flowersLily FosterNot necessarily. Unpriveleged users can't read the environment of a privileged process (which all system services probably are. Or at least not running as the interactive user I mean) and it's really easy for stuff that gets into the store to accidentally make it other places (and store is world-readable by default)19:11:30
@lily:lily.flowersLily Foster
In reply to @countoren:matrix.org
Actually should'nt the rust just read npmrc if exists?
It won't exist in the nix sandbox and I'd have to add npmrc parsing code for that 😅
19:11:56
@lily:lily.flowersLily Foster* It won't exist in the nix sandbox and I'd have to add npmrc parsing code for that anyway 😅19:12:13
@lily:lily.flowersLily Foster* Not necessarily. Unprivileged users can't read the environment of a privileged process (which all system services probably are. Or at least not running as the interactive user I mean) and it's really easy for stuff that gets into the store to accidentally make it other places (and store is world-readable by default)19:12:24
@countoren:matrix.orgcountorenWell I guess user can just writeShellScript wrapping the nix build itself exporting the env var reading npmrc19:13:35
@lily:lily.flowersLily Foster If you really want it in the derivation and don't mind it being in the store, you'll be able to set postPatch = "export NPM_TOKENS=..." with it how it is 19:14:07

Show newer messages


Back to Room ListRoom Version: 6