!OqhvaDMJdKYUicLDiE:nixos.org

Nixpkgs Stdenv

212 Members
67 Servers

Load older messages


SenderMessageTime
15 Sep 2025
@reckenrode:matrix.orgRandy Eckenrode

For example, it maps Python packages to the pypi scheme, but it’s not necessarily true that we are providing the same thing that’s on PyPI.

We may apply patches or replace vendored dependencies. IIRC cryptography had a vulnerability in its statically-linked OpenSSL that would be fixed in nixpkgs in by updating or patching OpenSSL.

The other issue is with FOD-based fetchers. There’s no visibility into what Rust crates (fetchCargoVendor) or Node packages (fetchNodeDeps), which actually are (more or less) the unmodified packages.

I assume that would be actually be useful to have, but the problem being solved isn’t well-formulated. It’s just adding a thing someone’s company (presumably) wants.

22:34:50
@reckenrode:matrix.orgRandy EckenrodeI want to say that SBOM information should probably be a derivation, but there is still the problem that dependencies are not knowable from Nix. You have to build the package to find out. Also, are build dependencies needed (e.g., to make sure we didn’t use a compiler that inserted malicious code into our package)?22:36:22
@rosscomputerguy:matrix.orgTristan RossYeah, the vendoring stuff is kinda odd. Packages would have to have meta information to say whether something is vendored or not. How would you solve the FOD problem?22:40:48
@rosscomputerguy:matrix.orgTristan RossI think that would depend on whoever wants to consume nixpkgs and have tooling which scans things.22:41:17
@reckenrode:matrix.orgRandy Eckenrode If the SBOM info is a derivation, it can be built from the same FOD source using fetchCargoSBOM or whatever is written to support that. Including that as meta information would have storage costs the FODs avoid (e.g., fetchCargoVendor can use the Cargo.toml from the package’s src). 22:43:54
@reckenrode:matrix.orgRandy Eckenrode * If the SBOM info is a derivation, it can be built from the same FOD source using fetchCargoSBOM or whatever is written to support that. Including that as meta information would have storage costs the FODs can avoid (e.g., fetchCargoVendor can use the Cargo.toml from the package’s src). 22:44:42
@rosscomputerguy:matrix.orgTristan RossThat sounds good, can't really comment on it since idk much about SBOM's and security things.22:47:31
@reckenrode:matrix.orgRandy EckenrodeI assume that’s the goal, but I don’t actually know based on the PR’s description.22:52:24
@rosscomputerguy:matrix.orgTristan RossYeah, I think it's a decent start at least22:52:51
@rosscomputerguy:matrix.orgTristan RossAt where I work, there's a good change we be needing it so I might be able to work on expanding it after this PR.22:54:14
@reckenrode:matrix.orgRandy EckenrodeTo simplify down my concern, it’s about maintenance burden. If companies are going to use this for supply chain purposes, are we at risk of getting a bunch of ‘my company’s vulnerability scanner says this package has a CVE’ issues that may actually be fixed in nixpkgs?22:54:39
@rosscomputerguy:matrix.orgTristan RossI'd like for the CVE stuff to go through review of the security team22:55:13
@rosscomputerguy:matrix.orgTristan RossWhether that's this or a company trying to upstream a fix.22:55:31
16 Sep 2025
@rosssmyth:matrix.orgrosssmythSBOM stuff is generally falling of companies trying to comply with the EU's CRA. When I read the CRA I don't remember there being specific requirements for the SBOM, but once EU states start implementing it there might be. 16:08:28
@rosssmyth:matrix.orgrosssmyth* SBOM stuff is generally falling out of of companies trying to comply with the EU's CRA. When I read the CRA I don't remember there being specific requirements for the SBOM, but once EU states start implementing it there might be. 16:11:31
@qyliss:fairydust.spaceAlyssa RossSBOM was actually mostly driven by USG after Solarwinds, as I recall…16:11:38
@rosssmyth:matrix.orgrosssmythI see, I don't interact with that space so I wouldn't know. 16:12:42
@qyliss:fairydust.spaceAlyssa RossI don't either, I just know that I'd heard of SBOMs long before I'd heard of the CRA, and been asked for one for the first time before the CRA was even proposed.16:13:06
22 Sep 2025
@philiptaron:matrix.orgPhilip Taron (UTC-8)For https://github.com/NixOS/nixpkgs/issues/444721, I don't believe that there's anything to report under stdenv.18:38:33
@rosscomputerguy:matrix.orgTristan RossYeah, we're good for now I believe18:46:48
23 Sep 2025
@a-kenji:matrix.orgkenji changed their display name from a-kenji to kenji.10:42:49
30 Sep 2025
@pyrox:pyrox.devdish [Fox/It/She]Howdy stdenv folks. Progress on the minimal-bootstrap is going okay, but I'm hitting an error(which I'm pretty sure is the same one that the current minimal bootstrap hits) and I'm having issues getting it solved. Current branch with all of my work is https://github.com/pyrox0/nixpkgs/tree/bump/minimal-bootstrap , any help or suggestions on how to resolve this would be helpful. I'll post the tail of my build logs here in a second so that you can see the logs too.15:21:07
@pyrox:pyrox.devdish [Fox/It/She]Download gcc-4.6.4.log15:23:25
@pyrox:pyrox.devdish [Fox/It/She]the issue is on line 103 of the log15:23:37
@17lifers:mikuplushfarm.ovh17lifers (at mikuplushfarm) joined the room.16:05:33
@17lifers:mikuplushfarm.ovh17lifers (at mikuplushfarm) left the room.18:41:39
1 Oct 2025
@frontear:matrix.orgfrontear

I've been trying to compile a C program that uses a few random libs and headers from some packages, which I've correctly declared in buildInputs of my derivation. From what I understood of stdenv, I assumed that simply doing $CXX -o main src/*.cpp should have correctly compiled everything, because $NIX_CFLAGS_COMPILE and $NIX_LDFLAGS should have been set correctly by the derivation. However, in practice this doesn't seem to work, and the project fails at the linking stage.

Keep in mind this project has no Makefile or CMakeFiles, it's just a bunch of *.h and *.cpp files from an instructor, hence why I need to manually run compilation commands. I'm able to get it to compile by writing the flags myself, but I'm a little confused as to why this isn't working OOTB like the Nixpkgs manual suggests. Is there something I'm missing?

01:01:28
@frontear:matrix.orgfrontear *

I've been trying to compile a C program that uses a few random libs and headers from some packages, which I've correctly declared in buildInputs of my derivation. From what I understood of stdenv, I assumed that simply doing $CXX -o main src/*.cpp should have correctly compiled everything, because $NIX_CFLAGS_COMPILE and $NIX_LDFLAGS should have been set correctly by the derivation. However, in practice this doesn't seem to work, and the project fails at the linking stage.

Keep in mind this project has no Makefile or CMakeFiles, it's just a bunch of *.h and *.cpp files from an instructor, hence why I need to manually run compilation commands. I'm able to get it to compile by writing the flags myself, but I'm a little confused as to why this isn't working OOTB like the Nixpkgs manual suggests. Is there something I'm missing? I did check both aforementioned environment variables and they do seem to be populated, so I'm confused.

01:02:21
@rosssmyth:matrix.orgrosssmythNIX_CFLAGS_COMPILE doesn't do that everything automatically. It's mainly for stdlib stuff. You still need to provide the -I and -L flags for your build inputs, possibly using pkg-config if they supply it. 03:46:41
@frontear:matrix.orgfrontearhm I see, I guess what also confused me was seeing that both NIX_CFLAGS_COMPILE and NIX_LDFLAGS were populated with the correct flags to include all the headers and libs respectively, for all of my declared build inputs. That, and the explanation in the Nixpkgs manual suggested that these flags were populated by the stdenv and were used by the CC wrapper and LD wrapper respectively.03:58:01

Show newer messages


Back to Room ListRoom Version: 9