| 5 Mar 2026 |
ysndr | Yea it’s user / mount namespace all the way.
At least root seems to not be mapper correctly (sudo is owned by nobody, as opposed to root) | 17:57:42 |
ysndr | * Yea it’s user / mount namespace all the way.
At least root seems to not be mapped correctly (sudo is owned by nobody, as opposed to root) | 17:57:47 |
Sergei Zimmerman (xokdvium) | Ah do we not set up a proper uid_map? | 18:07:34 |
| 6 Mar 2026 |
| gilligan (he/him) joined the room. | 01:45:50 |
| Azosion joined the room. | 03:32:29 |
dramforever | there's no way to do this without running nix shell with root permissions | 05:01:17 |
dramforever | see https://man7.org/linux/man-pages/man7/user_namespaces.7.html "In order for a process to write to the /proc/pid/uid_map", currently bullet 5, (b), bullet 1 | 05:02:16 |
dramforever | * see https://man7.org/linux/man-pages/man7/user_namespaces.7.html "In order for a process to write to the /proc/pid/uid_map ...", currently bullet 5, (b), bullet 1 | 05:02:25 |
dramforever | and we have to be in a new user namespace to create a mount namespace and start mounting stuff | 05:03:36 |
dramforever | * see https://man7.org/linux/man-pages/man7/user_namespaces.7.html "In order for a process to write to the /proc/pid/uid_map ...", currently bullet 5, (b), bullet 1
The data written to uid_map (gid_map) must consist of a single line that maps the writing process's effective user ID (group ID) in the parent user namespace to a user ID (group ID) in the user namespace.
| 05:04:37 |
dramforever | side note, don't you love it when all you need to understand is 1 and 2 and 3 and ( 4(a) or 4(b) ) and ( 5(a) or ( 5(b)1 and 5(b)2 and 5(b)3 ) ) | 05:06:11 |
dramforever | so just, to clarify, putting aside everything else, 5(b)1 says that if you don't have CAP_SETUID, then you can only map yourself in the parent userns to any uid in the child userns. everyone else in the parent userns becomes nobody in the child | 05:07:56 |
dramforever | * so just, to clarify, putting aside everything else, 5(b)1 says that if you don't have CAP_SETUID, then you can only map yourself in the parent userns to any uid in the child userns. everyone else in the parent userns becomes nobody in the child userns | 05:08:26 |
dramforever | * so just, to clarify, putting aside everything else, 5(b)1 says that if you don't have CAP_SETUID in the parent userns, then you can only map yourself in the parent userns to any uid in the child userns. everyone else in the parent userns becomes nobody in the child userns | 05:08:36 |
| RC Chuah joined the room. | 17:45:26 |
Azosion | Hey yall, via nix I installed "jasp-desktop", and it installed the binary "JASP" (in all caps), I'm pretty sure that most binaries are not capitialized, so is this a problem I could make a PR for, or is this normal for nix? (It is just a bit confusing that I cant just run the program with "jasp"). | 18:23:47 |
K900 | That's mostly up to upstream | 18:38:24 |
| Theuni changed their display name from Christian Theune to Theuni. | 19:57:47 |
| 19 May 2021 |
| @eelco:nixos.org changed the history visibility to "world_readable" from "shared". | 15:40:14 |
| @eelco:nixos.org changed the room name to "Nix Hackers" from "Nix Development". | 15:45:04 |
| @eelco:nixos.org changed the room topic to "For people hacking on the Nix package manager itself" from "Development of the Nix package manager". | 15:45:04 |
| cransom joined the room. | 15:45:08 |
| sumner joined the room. | 15:45:19 |
| danielle joined the room. | 15:47:55 |
| aaron joined the room. | 15:54:00 |
| cransom changed their display name from casey © to cransom. | 15:56:27 |
| @eelco:nixos.org invited grahamc. | 16:02:36 |
| grahamc joined the room. | 16:02:51 |
| prusnak joined the room. | 16:03:18 |
| immae (he/him) joined the room. | 16:03:29 |