On Sat, 14 Jun 2014 13:43:24 -0400
Shea Levy <[email protected]> wrote:

> > I can't.  I'm just pointing out a potential problem here.  If you
> > disagree, I'll be happy to construct a proof of concept.
> 
> Of course it could happen, but we have a huge number of packages in nixpkgs, 
> including a significant subset of hackage, and it hasn't actually happened 
> yet as far as anyone knows.
> 
> No one claims hash scanning/hash rewriting is 100% sound. It is, however, 
> extremely convenient and has worked remarkably well up until now. If we start 
> finding real world use cases where it fails, then we can start thinking about 
> alternatives, but until then why is this a big deal?

It's probably not a big deal.  On the other hand consider that it only
happens in a rather special scenario and may go unnoticed for quite
some time.

Consider an application (like a game) with a bunch of separate sets of
data files, each optional and referring to each other, compressed to
save space.  This is an actual design that I'm following in one of my
projects.  I'll know to make it Nix-friendly, but non-NixOS developers
may fail to do so.


Greets,
Ertugrul

-- 
Ertugrul Söylemez <[email protected]>
_______________________________________________
nix-dev mailing list
[email protected]
http://lists.science.uu.nl/mailman/listinfo/nix-dev

Reply via email to