!lymvtcwDJ7ZA9Npq:lix.systems

Lix Development

402 Members
(Technical) development of Lix, the package manager, a Nix implementation. Please be mindful of ongoing technical conversations in this channel.135 Servers

Load older messages


SenderMessageTime
14 Oct 2025
@k900:0upti.meK900And definitely not a convertHash sized problem16:27:09
@emilazy:matrix.orgemilyAIUI NUL bytes have already been decided to be allowed.16:27:22
@k900:0upti.meK900 Like I think having something of this shape is good long term 16:27:23
@raitobezarius:matrix.orgraitobezariusNUL bytes were merged, yeah16:27:33
@k900:0upti.meK900But convertHash isn't even the right shape16:27:36
@raitobezarius:matrix.orgraitobezariusLix HEAD can have binary data now in strings16:27:40
@k900:0upti.meK900 Yes but it's not a problem for convertHash shaped things 16:27:46
@raitobezarius:matrix.orgraitobezarius(And we eliminated the security issue via a lint)16:27:50
@emilazy:matrix.orgemilyit seems totally reasonable to want to be able to convert between lock file formats that use SRI vs. base16 in Nix16:28:01
@k900:0upti.meK900Yes but also ehhhhhhhhhhhhhhhhhhh16:28:21
@raitobezarius:matrix.orgraitobezarius emily: Are you satisfied with the Lix proposal? I'm going to context switch to another thing 16:28:25
@k900:0upti.meK900Like the endpoint will probably be an FOD16:28:28
@k900:0upti.meK900And FODs accept both16:28:34
@raitobezarius:matrix.orgraitobezarius Do you know when would you like this to happen? 16:28:35
@k900:0upti.meK900And should continue to accept both IMO16:28:39
@emilazy:matrix.orgemily well, we are here because convertHash is not desired and I said the main way I can imagine decomposing it is to split out SRI/<hash>:<algo> parsing, and to split conversion/deconversion using NUL bytes in strings 16:28:38
@k900:0upti.meK900Like all the uses of convertHash I'm seeing right now are "convert to SRI and shove it in a FOD"16:29:17
* @raitobezarius:matrix.orgraitobezarius is not going to debate the need of convertHash or not for end user code 16:28:59
@emilazy:matrix.orgemilyI'm ambivalent. I'm not really trying to push for it. I'm just noting that it's something that comes up fairly often and that we've had Nixpkgs hash divergence from attempts at feature detecting it16:29:18
@emilazy:matrix.orgemilythe demand is not from me, but there is demand :)16:29:23
@k900:0upti.meK900Which is objectively useless16:29:37
@k900:0upti.meK900 And could just be "sha256:" + hash 16:29:43
@raitobezarius:matrix.orgraitobezariusOK, I wondered if you as a Nixpkgs core team person, had any idea of a timeline given the demand16:29:45
@raitobezarius:matrix.orgraitobezariusBut unknown timeline works for me, I will register this as low priority (aka when I'm bored)16:29:55
@emilazy:matrix.orgemily sha256 = …; is certainly likely to be banned in Nixpkgs at some point I think 16:29:57
@emilazy:matrix.orgemilysince people have already put work into treewides/warnings for it16:30:06
@k900:0upti.meK900 It doesn't have to be passed in as sha256 = 16:30:09
@k900:0upti.meK900 hash = "sha256:aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" works 16:30:30
@k900:0upti.meK900(is this stupid? yes. are we stuck with it? also yes)16:30:35
@emilazy:matrix.orgemily sha256:… is worse IMO, since that is just a pretty arbitrary non-standard format 16:30:36

Show newer messages


Back to Room ListRoom Version: 10