!lymvtcwDJ7ZA9Npq:lix.systems

Lix Development

412 Members
(Technical) development of Lix, the package manager, a Nix implementation. Please be mindful of ongoing technical conversations in this channel.138 Servers

Load older messages


SenderMessageTime
19 Sep 2025
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)sometimes not even under our control (e.g. kernel bug)09:45:16
@yuka:yuka.devYureka (she/her)for the sandbox shell, isn't the option to embed it just on top of the ability to change it at run-time later?09:46:23
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)
                #if HAVE_EMBEDDED_SANDBOX_SHELL
                if (i.second.source == "__embedded_sandbox_shell__") {
                    static unsigned char sh[] = {
                        #include "embedded-sandbox-shell.gen.hh"
                    };
                    auto dst = chrootRootDir + i.first;
                    createDirs(dirOf(dst));
                    writeFile(dst, std::string_view((const char *) sh, sizeof(sh)));
                    chmodPath(dst, 0555);
                } else
                #endif
                    bindPath(i.second.source, chrootRootDir + i.first, i.second.optional);

09:47:05
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)
#if defined(__linux__) && defined(SANDBOX_SHELL)
    sandboxPaths.setDefault(tokenizeString<StringSet>("/bin/sh=" SANDBOX_SHELL));
#endif
09:47:33
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)correct09:47:34
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)there's a runtime composition09:47:39
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)sounds like we could do mostly the same09:47:47
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)except that this time, this is not about writing a binary in the sandbox09:47:53
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)but executing a binary which is mapped in our memory09:48:02
@yuka:yuka.devYureka (she/her)sounds good09:48:16
* @raitobezarius:matrix.orgraitobezarius (DECT: 7248) nods09:48:20
@yuka:yuka.devYureka (she/her)I can take on this task and create a patch09:49:04
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)thanks!09:53:02
@yuka:yuka.devYureka (she/her)summarized the thing here https://git.lix.systems/lix-project/lix/issues/99609:56:04
@yuka:yuka.devYureka (she/her)and assigned myself09:56:16
@aloisw:julia0815.dealoisw It would only be unconditional for static builds with built-in pasta. But given that the sandbox shell also has a runtime option after all we could support (and default to) pasta-path = __embedded_pasta__ similarly in this case. 11:44:38
@bl1nk:matrix.orgbl1nk changed their profile picture.15:22:59
@bl1nk:matrix.orgbl1nk changed their profile picture.15:25:08
21 Sep 2025
@k900:0upti.meK900Can someone remind me why the flake is pinned to an old capnproto?16:39:22
@k900:0upti.meK900OK I don't think the old is intentional16:52:29
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)not intentional but we have patches on capnp16:53:40
@k900:0upti.meK900Those are in 1.2.0 AFAICT16:53:47
@k900:0upti.meK900And so is cmake 4 compat16:53:53
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)go for it17:05:36
@raitobezarius:matrix.orgraitobezarius (DECT: 7248)but double check for 1.2.0 and the patch17:05:41
@k900:0upti.meK900Double checking yes17:07:07
@k900:0upti.meK900I'm actually unvendoring it entirely17:07:18
@k900:0upti.meK900Because nixpkgs is fine now17:07:21
@k900:0upti.meK900https://gerrit.lix.systems/c/lix/+/421117:33:15
@raitobezarius:matrix.orgraitobezarius (DECT: 7248) K900: well i guess you missed the patch 17:47:01

Show newer messages


Back to Room ListRoom Version: 10