!lymvtcwDJ7ZA9Npq:lix.systems

Lix Development

423 Members
(Technical) development of Lix, the package manager, a Nix implementation. Please be mindful of ongoing technical conversations in this channel.143 Servers

Load older messages


SenderMessageTime
26 Jul 2025
@emilazy:matrix.orgemilyI believe it is just going to warn all the time for everyone?01:41:28
@raitobezarius:matrix.orgraitobezarius (DECT: 7248) caFile.setDefault($NIX_SSL_CERT_FILE) 01:41:30
@raitobezarius:matrix.orgraitobezarius (DECT: 7248) well, now knowing that nix-darwin ALWAYS sets caFile 01:42:04
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)this doesn't make sense anymore01:42:18
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)but the current situation is one hell of a configuration confusion01:42:34
@emilazy:matrix.orgemilyok actually I forget if Nixpkgs sets it as impure by default01:42:40
@emilazy:matrix.orgemilyso maybe it would be fine01:42:42
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)well it's in the list of fetcher impure env vars01:42:50
@raitobezarius:matrix.orgraitobezarius (DECT: 7248) fetcher 01:42:53
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)fetcher proxy impure env vars actually *01:43:00
@emilazy:matrix.orgemilyright so that won't work great I think01:43:19
@emilazy:matrix.orgemilyalso I'm not sure we want to set the non-NIX prefixed version but I'm not sure. pretty tired myself01:43:28
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)fetchhg sets it, k3s set it somewhere, fetchpypilegacy sets it, fetchsvn sets it, build bazel sets it, fetchurl does01:43:37
@emilazy:matrix.orgemily I would ask Toma what he thinks of this since he has been bashing his head against the whole thing for a while now 01:43:38
@emilazy:matrix.orgemilyone issue01:43:58
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)what I read in the issue is that I felt like we came to a similar conclusion01:44:00
@emilazy:matrix.orgemily is settings.caFile a trusted setting 01:44:01
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)which is that NIX_SSL_CERT_FILE should go out of the env list01:44:08
@emilazy:matrix.orgemilyI am worried about confused deputy01:44:14
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)cannot remember01:45:12
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)and grepping the code doesn't help01:45:20
@emilazy:matrix.orgemily I just do not want --option ssl-cert-file to be a trivial "read any root:root file" vector :) 01:45:58
@raitobezarius:matrix.orgraitobezarius (DECT: 7248) either way, I guess there's ONE solution out there, it has a bunch of issues, but I think those are fairly workable 01:46:01
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)
In reply to @emilazy:matrix.org
I just do not want --option ssl-cert-file to be a trivial "read any root:root file" vector :)
u sure u dont want another CVE?
01:46:11
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)please drop a comment on the CL01:46:18
@emilazy:matrix.orgemilyI should have slept an hour ago, can I do it tomorrow? :p01:46:59
@raitobezarius:matrix.orgraitobezarius (DECT: 7248) i should have slept 4 hours ago, what's your point 01:47:12
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)do it whenever it's convenient for you01:47:25
@xokdvium:matrix.orgSergei Zimmerman (xokdvium) Qyriad: 12:02:58
@xokdvium:matrix.orgSergei Zimmerman (xokdvium) * Qyriad: What's up with the meson host_platform and cpu names? It's all very wonky and slightly broken I think (in both lix and cppnix). 12:03:31

Show newer messages


Back to Room ListRoom Version: 10