• 0 Posts
  • 13 Comments
Joined 1 year ago
cake
Cake day: August 24th, 2023

help-circle


  • ivn@jlai.lutoLinux@lemmy.mlImmutable Distro Opinions
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 days ago

    I’ve had NixOS absolutely refuse to run some compiler toolchain I depended upon that should’ve been dead simple on other distros, I’m really hesitant to try anything that tries to be too different anymore.

    Yes, some toolchain expect you to run pre-compiled dynamically linked binaries. These won’t work on NixOS, you need to either find a way to install the binary from nix and force the toolchain to use it or run patchelf on it somehow.


  • ivn@jlai.lutoLinux@lemmy.mlImmutable Distro Opinions
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 days ago

    Well that was an approximation to keep it simple and disprove the given example. There are other directories in the root filesystem that are in the path by default, or used in some other critical way (like /etc). Even if they are links to directories in the nix store you can replace the link.




  • ivn@jlai.lutoLinux@lemmy.mlImmutable Distro Opinions
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 days ago

    To be honest I don’t know these very well. I only use NixOS. My understanding is that in an immutable distribution the root filesystem is read-only. Granted in NixOS the nix store is immutable and most things in the root filesystem are just links to the nix store, but the root filesystem itself is not read-only.



  • if it’s being read from, it can be written to.

    Why would being able to read imply being able to write?

    Having an extra step or two in the way doesn’t make it “extremely secure”.

    Well it can greatly improve security by preventing a compromised app to achieve persistence.