!lymvtcwDJ7ZA9Npq:lix.systems

Lix Development

340 Members
(Technical) development of Lix, the package manager, a Nix implementation. Please be mindful of ongoing technical conversations in this channel.123 Servers

Load older messages


SenderMessageTime
1 Apr 2025
@jade_:matrix.orgjade_(we might want to survey github for other usages tho)20:37:51
@jade_:matrix.orgjade_nixbase32 to SRI, but honestly we should just fix npins instead20:45:41
@jade_:matrix.orgjade_ horrifying realization: builtins.getEnv works on NIX_CONFIG 21:26:21
@jade_:matrix.orgjade_I hope nobody is doing that21:26:31
@winter:catgirl.cloudWinter
In reply to @lily:lily.flowers
(prior art: https://gerrit.lix.systems/c/lix/+/2248)
oh!
21:31:03
@rhelmot:matrix.orgrhelmotcan any core devs suggest what sort of testing might be appropriate for marking https://gerrit.lix.systems/c/lix/+/1663 and https://gerrit.lix.systems/c/lix/+/2863 as ready for review?21:42:31
@jade_:matrix.orgjade_hm. does freebsd support nested jails/does freebsd let you do jails unprivileged?23:11:04
@rhelmot:matrix.orgrhelmotnested jails are a thing, I think you have to be root in the jail to do a child jail though23:11:55
@jade_:matrix.orgjade_hm23:12:36
@jade_:matrix.orgjade_then i would suggest figuring out how you can actually structure testing nested builds, if it is even possible. or figuring out some way to have tests that are root in a jail or ... idk23:13:15
@jade_:matrix.orgjade_having just one of those tests would help a lot with confidence in the feature; though i will also say that my view of freebsd is that y'all maintain it and we don't look too hard at it.23:14:08
@rhelmot:matrix.orgrhelmotthat sounds fun23:14:57
@rhelmot:matrix.orgrhelmotok, will look into it23:15:04
@jade_:matrix.orgjade_(and i am as much speaking from the perspective of wanting to make your life maintaining it easier as anything! the first test in a new methodology is always really hard to write, and then it gets easier from there)23:15:40
@jade_:matrix.orgjade_ if you wind up having to use a VM test or nixos test style thing or something, it would be unfortunate, but it could be done, I think? 23:16:07
@rhelmot:matrix.orgrhelmotyeah, agreed. ideally, the standard nested build tests shouuuuuuld Just Work since you have to run nix-daemon as root anyway, right?23:16:24
@jade_:matrix.orgjade_but the nested builds tests aren't run as root inside the sandbox right?23:16:41
@rhelmot:matrix.orgrhelmothm23:17:03
@rhelmot:matrix.orgrhelmotwhat are the security implications of letting you set a flag to be root inside the sandbox?23:17:16
@jade_:matrix.orgjade_that's a great question lmfao23:17:27
@jade_:matrix.orgjade_who do you appear as to the outer system?23:17:47
@rhelmot:matrix.orgrhelmotusers in freebsd are a tuple (uid, jid) iirc23:18:01
@artemist:mildlyfunctional.gayartemistI think my devfs rules patch is by devfs mount, so I have to set a devfs ID for the jail as well. I didn't do that because passing the ID to the right part of the code was a pain23:18:37
@artemist:mildlyfunctional.gayartemistWe should also set a securelevel for the jail23:20:06
@jade_:matrix.orgjade_the reason i ask is that sometimes unix socket services (like nix) can give you root if you are root to the rest of the system23:20:06
@artemist:mildlyfunctional.gayartemistOh, yeah, so you're asking how we would appear to peercred?23:20:39
@jade_:matrix.orgjade_yes23:21:27
@artemist:mildlyfunctional.gayartemistSeems like the easiest way to figure that out will be to try it, i'll do that23:25:36
@rhelmot:matrix.orgrhelmot my guess is that software which isn't explicitly checking for "am I communicating with a jailed user" will think you are the real actual root 23:27:25
@artemist:mildlyfunctional.gayartemistthe main page for LOCAL_PEERCRED doesn't have jid, just "effective user id"23:27:51

Show newer messages


Back to Room ListRoom Version: 10