Skip to content

Conversation

@3nprob
Copy link

@3nprob 3nprob commented Jul 10, 2025

installed at same path on debian/redhat/fedora.

- follow-up to QubesOS#596
- QubesOS#157
- QubesOS#155
@3nprob
Copy link
Author

3nprob commented Jul 10, 2025

This could maybe be considered breaking: Users can currently inject their own proxy replacing tinyproxy by putting it in e.g. /usr/local/bin (which is typically writable from AppVM). Not sure if anyone legitimately relies on this or if it's just a potential injection point that's better closed off. I'd lean against the latter.

@3nprob 3nprob marked this pull request as ready for review July 10, 2025 20:12
@codecov
Copy link

codecov bot commented Jul 10, 2025

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 71.10%. Comparing base (4c5c36e) to head (1dc30a1).
Report is 1 commits behind head on main.

Additional details and impacted files
@@           Coverage Diff           @@
##             main     #598   +/-   ##
=======================================
  Coverage   71.10%   71.10%           
=======================================
  Files           3        3           
  Lines         481      481           
=======================================
  Hits          342      342           
  Misses        139      139           

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

@marmarek
Copy link
Member

Hmm, do you know what NixOS does? It surely doesn't have /usr/bin/tinyproxy... @CertainLach

@3nprob
Copy link
Author

3nprob commented Jul 11, 2025

Is/would NixOS actually be using this implementation in the first place? This package has plenty of references to /usr/bin as it is.

@CertainLach
Copy link

CertainLach commented Jul 12, 2025

Hmm, do you know what NixOS does? It surely doesn't have /usr/bin/tinyproxy... @CertainLach

Usually, everything needs to be patched for NixOS; Not many of Qubes packages even rely on PATH, and then there is lots of expectations regarding script locations

This won't make the current patchset any worse.
https://github.com/CertainLach/nixos-qubes/blob/trunk/pkgs/by-name/qu/qubes-core-agent-linux/package.nix#L97

Actually, for NixOS, I would even prefer absolute paths to PATH lookups, because it is much easier to debug. I have audit rules in place, where I can see when the package with lacking patches is trying to call something, and I can react to that.

Still this is annoying to fix/try to find a proper way to rewrite the path, and it would be better if everything was configurable in a single file, but it is easier than the implicit dependencies.

@marmarek marmarek merged commit 1dc30a1 into QubesOS:main Jul 12, 2025
5 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants