Hi list,
Haskell has a really cool package called ShellCheck which you can run
against shell scripts. It's a linting tool that catches a ton of issues,
especially escaping ones.
Unfortunately nix expressions embed the shell fragments so it's hard to run
the tool against them. Has anyone had any
On Mon, Feb 15, 2016 at 11:39 PM, Kosyrev Serge
wrote:
> Good day, folks!
>
> What I'm seeing is a rather disturbingly odd, context-depenent behavior of
> nix-shell:
>
> ,
> | [deepfire@andromedae:~/src/foo]$ nix-shell default.nix
> | warning: dumping very large path
Hi Adam,
Can you make the TLS call work with a command line tool like openssl? I'm
not 100% sure but I think that Chrome might use a different set of trusted
certs (based on the Mozilla ones) [1].
~
[1]
https://www.chromium.org/Home/chromium-security/root-ca-policy
On 18 February 2016 at
Hi all,
it's that time of the year when it's time to talk about new NixOS release.
According to our somewhat-documented release process at
https://github.com/NixOS/nixpkgs/issues/4442, I'd like to branch off 16.03
on 28.2. (Sunday).
When the branch is made, everyone is encouraged to test and
On 16-02-17 08:18pm, Rok Garbas wrote:
> I would suggest closing tickets that you think are not crucial or
> reporter does not provide code that we can include. Ofcourse be nice
> in comment and ask reported to reopen if they think you are wrong to
> do this.
>
> What you say, could this work and
On 16-02-18 01:53pm, Adam Russell wrote:
> Hello Nix-Dev,
>
> I'm trying to understand how to install CA certificates in NixOS.
Different question, related topic:
I tried adding CA-Cert by default a while ago and had the impression it worked
for a while and then suddenly stopped working (at
Maybe attach your default.nix so we can have a look. I suspect that you're
loading the whole nixpkgs in your shell somehow.
A version of nix and channels could also come handy
On Thu, 18 Feb 2016 18:25 Kosyrev Serge wrote:
> Good day, folks!
>
> What I'm seeing is a
rocon...@theorem.ca writes:
> I am using the following expression which I believe will build a patched
> version of glibc locally, and then build a patched NixOS derivation.
>
> system.replaceRuntimeDependencies = with pkgs.lib;
> [{original = pkgs.glibc; replacement =
>
Good day, folks!
What I'm seeing is a rather disturbingly odd, context-depenent behavior of
nix-shell:
,
| [deepfire@andromedae:~/src/foo]$ nix-shell default.nix
| warning: dumping very large path (> 256 MiB); this may run out of memory
| error: file
Yes use `security.pki.certificates` or `security.pki.certificateFiles`. I
don't know why there is a comment there, you can just ignore that bit.
If you use `security.pki.certificateFiles` don't forget to add back
"${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt" in your array.
On Thu, 18 Feb 2016 at
Hello Nix-Dev,
I'm trying to understand how to install CA certificates in NixOS.
If I visit my work's webmail in Chromium, I get an indicator that my
connection is not private. Clicking the padlock icon in the address bar,
then the "Certificate information" link in the Connection tab, going to
Btw, this is the solution we have settled on:
https://github.com/fractalide/fractalide/blob/master/components/docs/default.nix#L12
It's working out quite well having our code embedded in nix-code, dirty but fun.
/sjm
___
nix-dev mailing list
12 matches
Mail list logo