!lymvtcwDJ7ZA9Npq:lix.systems

Lix Development

415 Members
(Technical) development of Lix, the package manager, a Nix implementation. Please be mindful of ongoing technical conversations in this channel.139 Servers

Load older messages


SenderMessageTime
28 Jul 2025
@esperlily:matrix.orgEsperLily [she/her] incidentally it bothers me that "relaxed" means "don't sandbox FOD derivations" because I use "relaxed" in order to use __sandboxProfile and I'd actually rather keep the FOD derivations sandboxed 02:04:42
@jade_:matrix.orgjade_right sure, but i think that people need to be able to run with the experimental new sandbox policy to be able to report the bugs okay concept: experimental feature. but still it might want a per drv opt out. :V :V :V :V :V02:04:51
@emilazy:matrix.orgemilyno I mean02:05:07
@emilazy:matrix.orgemily sandbox = true fails to build a bunch of stuff in Nixpkgs 02:05:13
@raitobezarius:matrix.orgraitobezariusAs you already know, I'm Darwin ignorant, so really, you tell me what direction we need to go02:05:14
@jade_:matrix.orgjade_wait it DOES??? christ. this whole setting is such a mess02:05:15
@raitobezarius:matrix.orgraitobezariusI think the only important thing is that code complexity goes down02:05:25
@jade_:matrix.orgjade_i thought it was the latter02:05:28
@raitobezarius:matrix.orgraitobezariusSo that someday registerOutputs is possible to touch without introducing store corruption bugs02:05:36
@emilazy:matrix.orgemily and also I'm pretty sure we can just tighten sandbox = true without another flag because it's already a pain 02:05:41
@emilazy:matrix.orgemily but someone has to throw stdenv to channel blockers at it or something 02:06:03
@emilazy:matrix.orgemilyand actually triage the issues02:06:09
@emilazy:matrix.orgemilyit's always easy per package but it adds up02:06:13
@emilazy:matrix.orgemily stuff like getting /tmp out would be tedious but doable 02:06:33
@esperlily:matrix.orgEsperLily [she/her] yeah i have no idea who thought it was a good idea to say "relaxed means don't sandbox the FODs" since what it should mean is "enable the escape hatches like __sandboxProfile and __noChroot so derivations can opt in to weakening protections" 02:06:36
@jade_:matrix.orgjade_https://git.lix.systems/lix-project/lix/issues/93602:20:18
@esperlily:matrix.orgEsperLily [she/her] hey here's a thought, if the cacert file is actually a store file (if you resolve the path), we could just hard-link it instead of copying it (though this probably only works for chroot, since you're using tmpDir otherwise and there's no guarantee that's on the same volume; you could also perhaps just use chrootRootDir even without chroot though?) 02:22:26
@jade_:matrix.orgjade_i don't like this because i think it could equivalently be solved without more implementation complexity by a better file copy function02:24:26
@raitobezarius:matrix.orgraitobezarius
In reply to @esperlily:matrix.org
hey here's a thought, if the cacert file is actually a store file (if you resolve the path), we could just hard-link it instead of copying it (though this probably only works for chroot, since you're using tmpDir otherwise and there's no guarantee that's on the same volume; you could also perhaps just use chrootRootDir even without chroot though?)
cacert is not a store file in general
02:24:46
@esperlily:matrix.orgEsperLily [she/her]it should be on NixOS and nix-darwin?02:24:56
@raitobezarius:matrix.orgraitobezariusi'm mostly thinking about all the corporate usecases with their zscaler ca that comes from elsewhere02:25:20
@emilazy:matrix.orgemilyI still think "add it to the store (potentially with optimization to not needlessly re-add an existing store path)" is the ~optimal solution modulo complexity02:25:21
@jade_:matrix.orgjade_and also lix on normal macos i think, since cacert goes into the system profile02:25:44
@raitobezarius:matrix.orgraitobezariusNixOS already does something quite different02:25:47
@raitobezarius:matrix.orgraitobezarius which does not make any use of ssl-cert-file today? 02:25:55
@raitobezarius:matrix.orgraitobezarius nix-darwin does use ssl-cert-file and possibly this is a store path yeah 02:26:07
@jade_:matrix.orgjade_for CoW filesystems (most modern fs), if our file copy is implemented correctly we can just have the copy be equivalent to hardlink02:26:11
@raitobezarius:matrix.orgraitobezariusin practice02:26:20
@raitobezarius:matrix.orgraitobezariuscopying from /etc to /nix/var/nix/builds/ may or may not end up being optimized away02:26:39
@jade_:matrix.orgjade_ i also agree that importing to the store should be able to be fast 02:26:42

Show newer messages


Back to Room ListRoom Version: 10