Nix on macOS | 1167 Members | |
| “There are still many issues with the Darwin platform but most of it is quite usable.” — http://yves.gnu-darwin.org | 189 Servers |
| Sender | Message | Time |
|---|---|---|
| 18 Nov 2025 | ||
| Yeah, without
| 22:37:48 | |
| At least native certs are fixed | 22:44:38 | |
| Yippee.png | 22:45:08 | |
| I really hate LLVM’s command-line parsing. | 23:41:31 | |
| 19 Nov 2025 | ||
| 00:21:21 | ||
| I don't understand the purpose of
We have sandbox to ensure that people use exactly what we provide to them, can these lines just be removed? | 10:25:35 | |
| This seems to originate from here: https://github.com/NixOS/nixpkgs/commit/788da6894fac5b20d183ce5afbab3bacd7ddeaca And was there before we actually had | 10:35:15 | |
At least I think SSL_CERT_FILE should just not be tampered with | 10:35:52 | |
| Because it's something not-nix related in all cases | 10:36:09 | |
| Is the sandbox enabled by default? | 10:38:40 | |
| For FODs no | 10:40:40 | |
| For non-FODs also no | 10:40:48 | |
| I think | 10:41:00 | |
| But why does it matter what happens when sandbox is disabled. If it's disabled all guarantees are off anyways | 10:41:42 | |
| Since it's the common case it shouldn't be broken more than is unavoidable, no? | 10:42:34 | |
| Setting
| 10:45:01 | |
| Neither behaviour is very nice honestly | 10:45:14 | |
Setting it to /no-cert-file.crt does nothing in 99% of the cases and breaks the remaining 1% which is using native macOS keychain in FODs | 10:46:32 | |
If you really want to set it to something set it to NIX_SSL_CERT_FILE but this is also incorrect since now the program that expects that it would use native keychain now starts using the .crt file | 10:47:33 | |
| 10:48:09 | ||
| This is still better than having a non-existent file since it wouldn't break immediately and for nixpkgs you can't rely on some certificates being installed locally | 10:48:28 | |
| So maybe this is the correct way for nixpkgs | 10:48:45 | |
| But the current behaviour is objectively incorrect | 10:49:00 | |
| I don't see how using the native keychain is right during builds. There's no way to manage that from Nix so it'd mean builds could never be pure. | 10:53:10 | |
| 10:55:52 | ||
| I'm still talking about FODs | 10:55:56 | |
| They can use whatever certs they want as long as the output hash matches | 10:56:22 | |
| The other option still is
| 11:00:46 | |
| Which is still better than the current one | 11:00:55 | |
| For FODs I agree, if the hash matches there's no purity problem. But that shell excerpt has nothing to do with FODs, no? | 11:31:28 | |