Credential-enhanced operations via FODs #951
Labels
No labels
Affects/CppNix
Affects/Nightly
Affects/Only nightly
Affects/Stable
Area/build-packaging
Area/cli
Area/evaluator
Area/fetching
Area/flakes
Area/language
Area/lix ci
Area/nix-eval-jobs
Area/profiles
Area/protocol
Area/releng
Area/remote-builds
Area/repl
Area/repl/debugger
Area/store
awaiting
author
awaiting
contributors
bug
Context
contributors
Context
drive-by
Context
maintainers
Context
RFD
crash 💥
Cross Compilation
devx
docs
Downstream Dependents
E/easy
E/hard
E/help wanted
E/reproducible
E/requires rearchitecture
Feature/S3
imported
Language/Bash
Language/C++
Language/NixLang
Language/Python
Language/Rust
Needs Langver
OS/Linux
OS/macOS
performance
regression
release-blocker
stability
Status
blocked
Status
invalid
Status
postponed
Status
wontfix
testing
testing/flakey
Topic/Large Scale Installations
ux
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
lix-project/lix#951
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Is your feature request related to a problem? Please describe.
Credential-enhanced operations like
git cloneto an SSH target might require private key material, e.g. an SSH key.Unfortunately, the usual solution which involve to perform
fetchgit { prefetch = "export GIT_SSH_COMMAND="ssh -i /some/place""; url = "..."; }won't work with--extra-sandbox-pathsbecause an SSH keys is usually defended with permissions.extra-sandbox-pathsperforms a naive bind mount which results into anobody:nogroupinode which cannot be read.Describe the solution you'd like
(1) Guidance on how to do these sorts of things: why pick
builtins.fetchGitvs.pkgs.fetchgitin these circumstances. Why pick SSH over HTTPS, etc.(2) It would be interesting to think about how we could map such inodes which are accessible to the daemon and the caller inside the sandbox as well, but this is a certain can of worm.
Describe alternatives you've considered
(1)
chmod a+rthe SSH key.(2) Make a socket server which give you the SSH key by identifying the caller PID via SCM_RIGHTS (maybe the best solution).
Additional context
Sparked from a discussion where someone needed to use
fetchLFS = true;but could not withbuiltins.fetchGitas Lix plausibly did not enable this possibility.