| 26 Jul 2025 |
emily | I believe it is just going to warn all the time for everyone? | 01:41:28 |
raitobezarius (DECT: 7248) | caFile.setDefault($NIX_SSL_CERT_FILE) | 01:41:30 |
raitobezarius (DECT: 7248) | well, now knowing that nix-darwin ALWAYS sets caFile | 01:42:04 |
raitobezarius (DECT: 7248) | this doesn't make sense anymore | 01:42:18 |
raitobezarius (DECT: 7248) | but the current situation is one hell of a configuration confusion | 01:42:34 |
emily | ok actually I forget if Nixpkgs sets it as impure by default | 01:42:40 |
emily | so maybe it would be fine | 01:42:42 |
raitobezarius (DECT: 7248) | well it's in the list of fetcher impure env vars | 01:42:50 |
raitobezarius (DECT: 7248) | fetcher | 01:42:53 |
raitobezarius (DECT: 7248) | fetcher proxy impure env vars actually * | 01:43:00 |
emily | right so that won't work great I think | 01:43:19 |
emily | also I'm not sure we want to set the non-NIX prefixed version but I'm not sure. pretty tired myself | 01:43:28 |
raitobezarius (DECT: 7248) | fetchhg sets it, k3s set it somewhere, fetchpypilegacy sets it, fetchsvn sets it, build bazel sets it, fetchurl does | 01:43:37 |
emily | I would ask Toma what he thinks of this since he has been bashing his head against the whole thing for a while now | 01:43:38 |
emily | one issue | 01:43:58 |
raitobezarius (DECT: 7248) | what I read in the issue is that I felt like we came to a similar conclusion | 01:44:00 |
emily | is settings.caFile a trusted setting | 01:44:01 |
raitobezarius (DECT: 7248) | which is that NIX_SSL_CERT_FILE should go out of the env list | 01:44:08 |
emily | I am worried about confused deputy | 01:44:14 |
raitobezarius (DECT: 7248) | cannot remember | 01:45:12 |
raitobezarius (DECT: 7248) | and grepping the code doesn't help | 01:45:20 |
emily | I just do not want --option ssl-cert-file to be a trivial "read any root:root file" vector :) | 01:45:58 |
raitobezarius (DECT: 7248) | either way, I guess there's ONE solution out there, it has a bunch of issues, but I think those are fairly workable | 01:46:01 |
raitobezarius (DECT: 7248) | In reply to @emilazy:matrix.org I just do not want --option ssl-cert-file to be a trivial "read any root:root file" vector :) u sure u dont want another CVE? | 01:46:11 |
raitobezarius (DECT: 7248) | please drop a comment on the CL | 01:46:18 |
emily | I should have slept an hour ago, can I do it tomorrow? :p | 01:46:59 |
raitobezarius (DECT: 7248) | i should have slept 4 hours ago, what's your point | 01:47:12 |
raitobezarius (DECT: 7248) | do it whenever it's convenient for you | 01:47:25 |
Sergei Zimmerman (xokdvium) | Qyriad: | 12:02:58 |
Sergei Zimmerman (xokdvium) | * Qyriad: What's up with the meson host_platform and cpu names? It's all very wonky and slightly broken I think (in both lix and cppnix). | 12:03:31 |