!lymvtcwDJ7ZA9Npq:lix.systems

Lix Development

416 Members
(Technical) development of Lix, the package manager, a Nix implementation. Please be mindful of ongoing technical conversations in this channel.139 Servers

Load older messages


SenderMessageTime
26 Jul 2025
@raitobezarius:matrix.orgraitobezariusI mean, I see both sides of the arguments01:38:27
@emilazy:matrix.orgemilyreproducibility of old Nixpkgs can suffer from hosts moving to CAs that didn't exist at the time01:38:29
@raitobezarius:matrix.orgraitobezariusWe have cacert maintainer in this room : >01:38:32
@emilazy:matrix.orgemilyit also leads to bootstrapping issues01:38:47
@raitobezarius:matrix.orgraitobezarius
In reply to @emilazy:matrix.org
reproducibility of old Nixpkgs can suffer from hosts moving to CAs that didn't exist at the time
this goes both ways though
01:39:03
@emilazy:matrix.orgemily e.g., tgerbet gave up on making fetchurl not bypass TLS 01:39:06
@emilazy:matrix.orgemily because it leads to bootstrapping issues with cacert 01:39:12
@raitobezarius:matrix.orgraitobezariusreproducibility of old Nixpkgs can suffer from hosts moving to CAs that did existed at the time01:39:17
@emilazy:matrix.orgemilyyes, but that's the unavoidable failure mode of "a site going down"01:39:33
@emilazy:matrix.orgemily breaking on sites that didn't go down is less justifiable 01:39:45
@emilazy:matrix.orgemilyanyway01:39:54
@raitobezarius:matrix.orgraitobezariusconvinced by your argument01:39:54
@emilazy:matrix.orgemilythis solution may be fine, I don't have a good idea of the perf impact01:40:07
@raitobezarius:matrix.orgraitobezariuswell, this is HEAD01:40:12
@emilazy:matrix.orgemilyI figured just adding the file as content-addressed to the store would be easy01:40:16
@raitobezarius:matrix.orgraitobezariuswe have time to cook it01:40:17
@emilazy:matrix.orgemilyin which case I think it's better01:40:21
@emilazy:matrix.orgemilybut if it is not easy then this seems sensible enough01:40:30
@raitobezarius:matrix.orgraitobezariuswhat is disturbing by adding file as CA is that I don't want to start adding references to FODs01:40:37
@raitobezarius:matrix.orgraitobezariusand if I hide them, it's weird to have a nix store path that is not in the reference01:40:56
@emilazy:matrix.orgemilythe warning is definitely not a great idea01:41:02
@raitobezarius:matrix.orgraitobezarius
In reply to @emilazy:matrix.org
the warning is definitely not a great idea
why?
01:41:10
@emilazy:matrix.orgemily since IIRC settings.caFile gets set based on the daemon's NIX_SSL_CERT_FILE 01:41:13
@raitobezarius:matrix.orgraitobezariuscorrect01:41:19
@emilazy:matrix.orgemilyI believe it is just going to warn all the time for everyone?01:41:28
@raitobezarius:matrix.orgraitobezarius caFile.setDefault($NIX_SSL_CERT_FILE) 01:41:30
@raitobezarius:matrix.orgraitobezarius well, now knowing that nix-darwin ALWAYS sets caFile 01:42:04
@raitobezarius:matrix.orgraitobezariusthis doesn't make sense anymore01:42:18
@raitobezarius:matrix.orgraitobezariusbut the current situation is one hell of a configuration confusion01:42:34
@emilazy:matrix.orgemilyok actually I forget if Nixpkgs sets it as impure by default01:42:40

Show newer messages


Back to Room ListRoom Version: 10