!lymvtcwDJ7ZA9Npq:lix.systems

Lix Development

416 Members
(Technical) development of Lix, the package manager, a Nix implementation. Please be mindful of ongoing technical conversations in this channel.139 Servers

Load older messages


SenderMessageTime
26 Jul 2025
@emilazy:matrix.orgemilyit does not01:31:37
@raitobezarius:matrix.orgraitobezarius so… logicalTargetPath needs to be coerced to the physical location path if we cannot chroot at all 01:31:42
@raitobezarius:matrix.orgraitobezariusand… that should be sufficient, right?01:31:55
@emilazy:matrix.orgemilyI believe you're going to recreate the complexity of https://gerrit.lix.systems/c/lix/+/2906 that lead to the store path proposal01:32:00
@raitobezarius:matrix.orgraitobezarius(and the variable should be renamed)01:32:02
@raitobezarius:matrix.orgraitobezarius
In reply to @emilazy:matrix.org
I believe you're going to recreate the complexity of https://gerrit.lix.systems/c/lix/+/2906 that lead to the store path proposal
why would that whole canonicalization be required at all
01:32:34
@raitobezarius:matrix.orgraitobezarius if the CA file appears inside the scratch path of the derivation being built 01:32:45
@raitobezarius:matrix.orgraitobezarius that whole canonicalization seems to intervene without trying to copying the CA file and just giving access to it 01:33:13
@raitobezarius:matrix.orgraitobezariusor am I missing something?01:33:25
@raitobezarius:matrix.orgraitobezarius put in another way: canonicalization takes place in XNU which will perform POSIX path resolution for me when I copy the file inside the scratch path
all I need to do: get right the logicalTargetPath to export
01:34:19
@raitobezarius:matrix.orgraitobezarius reminder: I copy before entering into the sandbox 01:34:25
@raitobezarius:matrix.orgraitobezarius(-2ed with your remark)01:35:18
@emilazy:matrix.orgemilyokay, yes, that solves canonicalization01:35:19
@emilazy:matrix.orgemilythis is copying 500 KiB+ on every FOD however01:35:38
@emilazy:matrix.orgemilyI would expect that to have measurable perf impact but I'm not certain01:35:54
@raitobezarius:matrix.orgraitobezarius on Darwin only 01:36:01
@raitobezarius:matrix.orgraitobezariushmmm01:36:21
@raitobezarius:matrix.orgraitobezariusI see two family of users of caFile01:36:52
@raitobezarius:matrix.orgraitobezariuscorporate users with their corporate VPN01:36:56
@raitobezarius:matrix.orgraitobezariusand01:36:57
@raitobezarius:matrix.orgraitobezariusdebugging users with their interception CA01:37:03
@raitobezarius:matrix.orgraitobezariusThe latter doesn't really care about performance I would imagine01:37:41
@emilazy:matrix.orgemilyit is set for every nix-darwin user01:37:46
@raitobezarius:matrix.orgraitobezarius
In reply to @emilazy:matrix.org
it is set for every nix-darwin user
oh god
01:37:53
@emilazy:matrix.orgemilythis is the correct thing to do01:37:58
@emilazy:matrix.orgemily Nixpkgs using its own cacert is bad 01:38:04
@emilazy:matrix.orgemily we should move to a world where every user has their certs injected 01:38:12
@raitobezarius:matrix.orgraitobezariusI mean, I see both sides of the arguments01:38:27
@emilazy:matrix.orgemilyreproducibility of old Nixpkgs can suffer from hosts moving to CAs that didn't exist at the time01:38:29
@raitobezarius:matrix.orgraitobezariusWe have cacert maintainer in this room : >01:38:32

Show newer messages


Back to Room ListRoom Version: 10