!VRULIdgoKmKPzJZzjj:nixos.org

Nix Package Manager development

763 Members
For people hacking on Nix: https://github.com/NixOS/nix Nix maintainers can be reached here.162 Servers

Load older messages


SenderMessageTime
27 Nov 2024
@Ericson2314:matrix.orgJohn Ericsonif we wait for elaborate workarounds (which I know you aren't proposing) we'll never find out06:46:01
@emilazy:matrix.orgemilymy sense is that it will cause far more pushback than cross b/c far less immediate tangible benefit, far more invasive patching in some cases, and things that don't work with cross are considered in some sense broken whereas self reference is not so obviously illegitimate06:48:20
@emilazy:matrix.orgemilyalso b/c making sure everything is fixed to absolute paths is very long-standing Nixpkgs convention and this turns that on its head06:48:43
@andiandi:tchncs.deandiandi changed their display name from andiandi to andiandi 📞 4690@38C3.11:04:01
@andiandi:tchncs.deandiandi changed their display name from andiandi 📞 4690@38C3 to andiandi 📌 38C3 📞 4690.11:05:02
@Ericson2314:matrix.orgJohn EricsonOtoh people will be really excited about being able to unzip something in their home directories and it just works14:59:16
@Ericson2314:matrix.orgJohn Ericsonno self references is less work, but relocatable / store dir agnostic is big payout15:02:00
@Ericson2314:matrix.orgJohn Ericson * no self references is less work, but relocatable / store dir agnostic is bigger payout15:02:23
@matthewcroughan:defenestrate.itmatthewcroughanIMG_20241126_212855.jpg
Download IMG_20241126_212855.jpg
15:35:36
@matthewcroughan:defenestrate.itmatthewcroughanI was wondering why my router kept going down.15:35:45
@matthewcroughan:defenestrate.itmatthewcroughanCan't garbage collect without OOMing15:36:00
@mschwaig:matrix.orgMartin Schwaighofer
In reply to @emilazy:matrix.org

three possible solutions, of increasing elegance and decreasing layer violations

  1. Nix detects when it's poking at an aarch64-darwin binary – regardless of host platform! – and re-signs it after rewrite (so, Nix unconditionally links to rcodesign or similar I guess). and the code signature part of binaries is excluded from the content hash
  2. we put a manifest in nix-support listing files that are executables that need re-signing and (ditto) – this at least gives stdenv flexibility to get policy here even if we do the same sniffing by default
  3. we put a more elaborate manifest in nix-support listing files that need some kind of post-processing after rewriting and what tools to run on them and how to determine which parts of them should be excluded from the hash. this could also handle things like updating .zip checksums or whatever. but you could do things to "break the model" here of course, and it's not clear what the best format would be or how much flexibility you'd need
I think there is one other solution we can consider, which also enables central signing and does not break any of the guarantees users expect from Nix. I looked into this in 2022, and presented the results at NixCon (https://youtu.be/-CUa3yVTK5U, and https://talks.nixcon.org/nixcon-2022/talk/JHVF8N/). What I found is that if you put building, signing and signature verification into their own CA derivations, you do not have to trust the signing derivation at all. You could consider the signature verification derivation a derivation that either returns one of its direct dependencies or fails, or you could consider it a 'quasi derivation' a la https://github.com/NixOS/nix/issues/11955. The only additional thing you REALLY need in Nix for this is a way to completely prevent rewriting for specific inputs of a specific derivation (if we end up having it) because verification cares about the actual bits and it would be nice to have an officially supported way of annotating this verification relationship in the language (or maybe 'quasi derivations' ... have to think about it) - back then I just used environment variables for this which also works.
16:01:16
@mschwaig:matrix.orgMartin Schwaighofer
In reply to @emilazy:matrix.org
my preference is for (3) because I want Hydra to be able to do actual full-blown macOS code signing, and making that solution work would pave the way towards that
Actually what I wrote in my previous message is an alternative way to get code signing to work centrally, I am not sure if it would improve the self reference situation. 🤦‍♂️
16:29:55
28 Nov 2024
@enzime:nixos.devEnzimeis there a reason https://nix.dev/manual/nix/stable/ points to 2.18?01:48:35
@enzime:nixos.devEnzimeshould it be pointing to 2.24?01:49:15
@sheeeng:matrix.orgsheeeng joined the room.07:45:19
@roberthensing:matrix.orgRobert Hensing (roberth)
In reply to @enzime:nixos.dev
is there a reason https://nix.dev/manual/nix/stable/ points to 2.18?
fricklerhandwerk?
09:22:54
@roberthensing:matrix.orgRobert Hensing (roberth)
In reply to @enzime:nixos.dev
is there a reason https://nix.dev/manual/nix/stable/ points to 2.18?
* maybe fricklerhandwerk knows or could solve it
09:23:28
@infinisil:matrix.orginfinisilnix.dev has pins that need to be updated09:23:46
@infinisil:matrix.orginfinisil
In reply to @enzime:nixos.dev
is there a reason https://nix.dev/manual/nix/stable/ points to 2.18?
See https://github.com/NixOS/nix.dev/blob/master/CONTRIBUTING.md#updating-reference-manuals
09:25:04
@infinisil:matrix.orginfinisilAlthough, it might only change once the new NixOS is released, check out https://github.com/NixOS/nix.dev/blob/master/nix/releases.nix for the logic behind it09:27:42
@fricklerhandwerk:matrix.orgfricklerhandwerk
In reply to @enzime:nixos.dev
is there a reason https://nix.dev/manual/nix/stable/ points to 2.18?
Also see here for what users should see: https://nix.dev/reference/nix-manual
09:30:08
@emilazy:matrix.orgemilythat page has "Shipped with the previous stable release" but I thought the support policy was that only the latest version + the version in stable NixOS were supported? so isn't that going to be pointing to the manual for an unsupported version soon?09:36:25
@emilazy:matrix.orgemilyin light of https://github.com/NixOS/nixpkgs/pull/359215 etc.09:36:52
@matt:1e0.ukMatt joined the room.22:02:05
@matt:1e0.ukMatt set a profile picture.22:24:28
@ixlun:matrix.org@ixlun:matrix.org removed their display name Matthew L.22:32:39
@ixlun:matrix.org@ixlun:matrix.org left the room.22:34:16
29 Nov 2024
@lassulus:lassul.uslassulus changed their profile picture.18:29:41
30 Nov 2024
@doomhammer:catgirl.clouddoomhammer joined the room.05:15:34

Show newer messages


Back to Room ListRoom Version: 6