!lymvtcwDJ7ZA9Npq:lix.systems

Lix Development

422 Members
(Technical) development of Lix, the package manager, a Nix implementation. Please be mindful of ongoing technical conversations in this channel.143 Servers

Load older messages


SenderMessageTime
26 Jul 2025
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)The latter doesn't really care about performance I would imagine01:37:41
@emilazy:matrix.orgemilyit is set for every nix-darwin user01:37:46
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)
In reply to @emilazy:matrix.org
it is set for every nix-darwin user
oh god
01:37:53
@emilazy:matrix.orgemilythis is the correct thing to do01:37:58
@emilazy:matrix.orgemily Nixpkgs using its own cacert is bad 01:38:04
@emilazy:matrix.orgemily we should move to a world where every user has their certs injected 01:38:12
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)I mean, I see both sides of the arguments01:38:27
@emilazy:matrix.orgemilyreproducibility of old Nixpkgs can suffer from hosts moving to CAs that didn't exist at the time01:38:29
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)We have cacert maintainer in this room : >01:38:32
@emilazy:matrix.orgemilyit also leads to bootstrapping issues01:38:47
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)
In reply to @emilazy:matrix.org
reproducibility of old Nixpkgs can suffer from hosts moving to CAs that didn't exist at the time
this goes both ways though
01:39:03
@emilazy:matrix.orgemily e.g., tgerbet gave up on making fetchurl not bypass TLS 01:39:06
@emilazy:matrix.orgemily because it leads to bootstrapping issues with cacert 01:39:12
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)reproducibility of old Nixpkgs can suffer from hosts moving to CAs that did existed at the time01:39:17
@emilazy:matrix.orgemilyyes, but that's the unavoidable failure mode of "a site going down"01:39:33
@emilazy:matrix.orgemily breaking on sites that didn't go down is less justifiable 01:39:45
@emilazy:matrix.orgemilyanyway01:39:54
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)convinced by your argument01:39:54
@emilazy:matrix.orgemilythis solution may be fine, I don't have a good idea of the perf impact01:40:07
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)well, this is HEAD01:40:12
@emilazy:matrix.orgemilyI figured just adding the file as content-addressed to the store would be easy01:40:16
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)we have time to cook it01:40:17
@emilazy:matrix.orgemilyin which case I think it's better01:40:21
@emilazy:matrix.orgemilybut if it is not easy then this seems sensible enough01:40:30
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)what is disturbing by adding file as CA is that I don't want to start adding references to FODs01:40:37
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)and if I hide them, it's weird to have a nix store path that is not in the reference01:40:56
@emilazy:matrix.orgemilythe warning is definitely not a great idea01:41:02
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)
In reply to @emilazy:matrix.org
the warning is definitely not a great idea
why?
01:41:10
@emilazy:matrix.orgemily since IIRC settings.caFile gets set based on the daemon's NIX_SSL_CERT_FILE 01:41:13
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)correct01:41:19

Show newer messages


Back to Room ListRoom Version: 10