!lymvtcwDJ7ZA9Npq:lix.systems

Lix Development

422 Members
(Technical) development of Lix, the package manager, a Nix implementation. Please be mindful of ongoing technical conversations in this channel.143 Servers

Load older messages


SenderMessageTime
26 Jul 2025
@raitobezarius:matrix.orgraitobezarius
In reply to @emilazy:matrix.org
the warning is definitely not a great idea
why?
01:41:10
@emilazy:matrix.orgemily since IIRC settings.caFile gets set based on the daemon's NIX_SSL_CERT_FILE 01:41:13
@raitobezarius:matrix.orgraitobezariuscorrect01:41:19
@emilazy:matrix.orgemilyI believe it is just going to warn all the time for everyone?01:41:28
@raitobezarius:matrix.orgraitobezarius caFile.setDefault($NIX_SSL_CERT_FILE) 01:41:30
@raitobezarius:matrix.orgraitobezarius well, now knowing that nix-darwin ALWAYS sets caFile 01:42:04
@raitobezarius:matrix.orgraitobezariusthis doesn't make sense anymore01:42:18
@raitobezarius:matrix.orgraitobezariusbut the current situation is one hell of a configuration confusion01:42:34
@emilazy:matrix.orgemilyok actually I forget if Nixpkgs sets it as impure by default01:42:40
@emilazy:matrix.orgemilyso maybe it would be fine01:42:42
@raitobezarius:matrix.orgraitobezariuswell it's in the list of fetcher impure env vars01:42:50
@raitobezarius:matrix.orgraitobezarius fetcher 01:42:53
@raitobezarius:matrix.orgraitobezariusfetcher proxy impure env vars actually *01:43:00
@emilazy:matrix.orgemilyright so that won't work great I think01:43:19
@emilazy:matrix.orgemilyalso I'm not sure we want to set the non-NIX prefixed version but I'm not sure. pretty tired myself01:43:28
@raitobezarius:matrix.orgraitobezariusfetchhg sets it, k3s set it somewhere, fetchpypilegacy sets it, fetchsvn sets it, build bazel sets it, fetchurl does01:43:37
@emilazy:matrix.orgemily I would ask Toma what he thinks of this since he has been bashing his head against the whole thing for a while now 01:43:38
@emilazy:matrix.orgemilyone issue01:43:58
@raitobezarius:matrix.orgraitobezariuswhat I read in the issue is that I felt like we came to a similar conclusion01:44:00
@emilazy:matrix.orgemily is settings.caFile a trusted setting 01:44:01
@raitobezarius:matrix.orgraitobezariuswhich is that NIX_SSL_CERT_FILE should go out of the env list01:44:08
@emilazy:matrix.orgemilyI am worried about confused deputy01:44:14
@raitobezarius:matrix.orgraitobezariuscannot remember01:45:12
@raitobezarius:matrix.orgraitobezariusand grepping the code doesn't help01:45:20
@emilazy:matrix.orgemily I just do not want --option ssl-cert-file to be a trivial "read any root:root file" vector :) 01:45:58
@raitobezarius:matrix.orgraitobezarius either way, I guess there's ONE solution out there, it has a bunch of issues, but I think those are fairly workable 01:46:01
@raitobezarius:matrix.orgraitobezarius
In reply to @emilazy:matrix.org
I just do not want --option ssl-cert-file to be a trivial "read any root:root file" vector :)
u sure u dont want another CVE?
01:46:11
@raitobezarius:matrix.orgraitobezariusplease drop a comment on the CL01:46:18
@emilazy:matrix.orgemilyI should have slept an hour ago, can I do it tomorrow? :p01:46:59
@raitobezarius:matrix.orgraitobezarius i should have slept 4 hours ago, what's your point 01:47:12

Show newer messages


Back to Room ListRoom Version: 10