!OqhvaDMJdKYUicLDiE:nixos.org

Nixpkgs Stdenv

221 Members
72 Servers

Load older messages


SenderMessageTime
9 Sep 2025
@shamrocklee:matrix.orgShamrockLee (Yueh-Shun Li) joined the room.05:45:38
10 Sep 2025
@ss:someonex.netSomeoneSerge (back on matrix) changed their display name from SomeoneSerge (@nixcon & back on matrix) to SomeoneSerge (back on matrix).00:38:37
@connorbaker:matrix.orgconnor (burnt/out) (UTC-8) changed their display name from connor (he/him) (UTC+2) to connor (he/him) (UTC-7).22:20:29
11 Sep 2025
@ihar.hrachyshka:matrix.org@ihar.hrachyshka:matrix.org joined the room.00:08:11
12 Sep 2025
@creepinson:matrix.orgTheo Paris left the room.01:43:08
13 Sep 2025
@lt1379:matrix.orgLun joined the room.16:39:43
14 Sep 2025
@emma:rory.gay@emma:rory.gay joined the room.08:40:01
@r_i_s:matrix.orgris_https://github.com/NixOS/nixpkgs/pull/44294516:47:53
@emilazy:matrix.orgemilyI wonder how this will interact with Darwin / system libc++17:21:54
15 Sep 2025
@rosscomputerguy:matrix.orgTristan RossWould be nice to have others chime in https://github.com/NixOS/nixpkgs/pull/42112518:36:35
@reckenrode:matrix.orgRandy EckenrodeIs this something that the Nixpkgs Architecture team should weigh in on supporting?21:36:02
@reckenrode:matrix.orgRandy Eckenrode(Is that even still a thing?)21:36:15
@reckenrode:matrix.orgRandy Eckenrode * 21:36:23
@emilazy:matrix.orgemilyit is not still a thing21:41:27
@emilazy:matrix.orgemilysecurity team should probably weigh in re: the security tracker stuff21:42:13
@rosscomputerguy:matrix.orgTristan Ross I'll forward it to the #security-discuss:nixos.org chat 21:49:55
@reckenrode:matrix.orgRandy Eckenrode I question its value as it is. I can post my issued in the PR later when I have time. 22:28:10
@reckenrode:matrix.orgRandy Eckenrode

For example, it maps Python packages to the pypi scheme, but it’s not necessarily true that we are providing the same thing that’s on PyPI.

We may apply patches or replace vendored dependencies. IIRC cryptography had a vulnerability in its statically-linked OpenSSL that would be fixed in nixpkgs in by updating or patching OpenSSL.

The other issue is with FOD-based fetchers. There’s no visibility into what Rust crates (fetchCargoVendor) or Node packages (fetchNodeDeps), which actually are (more or less) the unmodified packages.

I assume that would be actually be useful to have, but the problem being solved isn’t well-formulated. It’s just adding a thing someone’s company (presumably) wants.

22:34:50
@reckenrode:matrix.orgRandy EckenrodeI want to say that SBOM information should probably be a derivation, but there is still the problem that dependencies are not knowable from Nix. You have to build the package to find out. Also, are build dependencies needed (e.g., to make sure we didn’t use a compiler that inserted malicious code into our package)?22:36:22
@rosscomputerguy:matrix.orgTristan RossYeah, the vendoring stuff is kinda odd. Packages would have to have meta information to say whether something is vendored or not. How would you solve the FOD problem?22:40:48
@rosscomputerguy:matrix.orgTristan RossI think that would depend on whoever wants to consume nixpkgs and have tooling which scans things.22:41:17
@reckenrode:matrix.orgRandy Eckenrode If the SBOM info is a derivation, it can be built from the same FOD source using fetchCargoSBOM or whatever is written to support that. Including that as meta information would have storage costs the FODs avoid (e.g., fetchCargoVendor can use the Cargo.toml from the package’s src). 22:43:54
@reckenrode:matrix.orgRandy Eckenrode * If the SBOM info is a derivation, it can be built from the same FOD source using fetchCargoSBOM or whatever is written to support that. Including that as meta information would have storage costs the FODs can avoid (e.g., fetchCargoVendor can use the Cargo.toml from the package’s src). 22:44:42
@rosscomputerguy:matrix.orgTristan RossThat sounds good, can't really comment on it since idk much about SBOM's and security things.22:47:31
@reckenrode:matrix.orgRandy EckenrodeI assume that’s the goal, but I don’t actually know based on the PR’s description.22:52:24
@rosscomputerguy:matrix.orgTristan RossYeah, I think it's a decent start at least22:52:51
@rosscomputerguy:matrix.orgTristan RossAt where I work, there's a good change we be needing it so I might be able to work on expanding it after this PR.22:54:14
@reckenrode:matrix.orgRandy EckenrodeTo simplify down my concern, it’s about maintenance burden. If companies are going to use this for supply chain purposes, are we at risk of getting a bunch of ‘my company’s vulnerability scanner says this package has a CVE’ issues that may actually be fixed in nixpkgs?22:54:39
@rosscomputerguy:matrix.orgTristan RossI'd like for the CVE stuff to go through review of the security team22:55:13
@rosscomputerguy:matrix.orgTristan RossWhether that's this or a company trying to upstream a fix.22:55:31

Show newer messages


Back to Room ListRoom Version: 9