!lymvtcwDJ7ZA9Npq:lix.systems

Lix Development

418 Members
(Technical) development of Lix, the package manager, a Nix implementation. Please be mindful of ongoing technical conversations in this channel.141 Servers

Load older messages


SenderMessageTime
26 Jul 2025
@emilazy:matrix.orgemilyI figured just adding the file as content-addressed to the store would be easy01:40:16
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)we have time to cook it01:40:17
@emilazy:matrix.orgemilyin which case I think it's better01:40:21
@emilazy:matrix.orgemilybut if it is not easy then this seems sensible enough01:40:30
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)what is disturbing by adding file as CA is that I don't want to start adding references to FODs01:40:37
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)and if I hide them, it's weird to have a nix store path that is not in the reference01:40:56
@emilazy:matrix.orgemilythe warning is definitely not a great idea01:41:02
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)
In reply to @emilazy:matrix.org
the warning is definitely not a great idea
why?
01:41:10
@emilazy:matrix.orgemily since IIRC settings.caFile gets set based on the daemon's NIX_SSL_CERT_FILE 01:41:13
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)correct01:41:19
@emilazy:matrix.orgemilyI believe it is just going to warn all the time for everyone?01:41:28
@raitobezarius:matrix.orgraitobezarius (DECT: 7248) caFile.setDefault($NIX_SSL_CERT_FILE) 01:41:30
@raitobezarius:matrix.orgraitobezarius (DECT: 7248) well, now knowing that nix-darwin ALWAYS sets caFile 01:42:04
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)this doesn't make sense anymore01:42:18
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)but the current situation is one hell of a configuration confusion01:42:34
@emilazy:matrix.orgemilyok actually I forget if Nixpkgs sets it as impure by default01:42:40
@emilazy:matrix.orgemilyso maybe it would be fine01:42:42
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)well it's in the list of fetcher impure env vars01:42:50
@raitobezarius:matrix.orgraitobezarius (DECT: 7248) fetcher 01:42:53
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)fetcher proxy impure env vars actually *01:43:00
@emilazy:matrix.orgemilyright so that won't work great I think01:43:19
@emilazy:matrix.orgemilyalso I'm not sure we want to set the non-NIX prefixed version but I'm not sure. pretty tired myself01:43:28
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)fetchhg sets it, k3s set it somewhere, fetchpypilegacy sets it, fetchsvn sets it, build bazel sets it, fetchurl does01:43:37
@emilazy:matrix.orgemily I would ask Toma what he thinks of this since he has been bashing his head against the whole thing for a while now 01:43:38
@emilazy:matrix.orgemilyone issue01:43:58
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)what I read in the issue is that I felt like we came to a similar conclusion01:44:00
@emilazy:matrix.orgemily is settings.caFile a trusted setting 01:44:01
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)which is that NIX_SSL_CERT_FILE should go out of the env list01:44:08
@emilazy:matrix.orgemilyI am worried about confused deputy01:44:14
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)cannot remember01:45:12

Show newer messages


Back to Room ListRoom Version: 10