#include "flake.hh" #include "globals.hh" #include "fetch-settings.hh" #include namespace nix::flake { // setting name -> setting value -> allow or ignore. typedef std::map> TrustedList; Path trustedListPath() { return getDataDir() + "/nix/trusted-settings.json"; } static TrustedList readTrustedList() { auto path = trustedListPath(); if (!pathExists(path)) return {}; auto json = nlohmann::json::parse(readFile(path)); return json; } static void writeTrustedList(const TrustedList & trustedList) { auto path = trustedListPath(); createDirs(dirOf(path)); writeFile(path, nlohmann::json(trustedList).dump()); } void ConfigFile::apply() { std::set whitelist{"bash-prompt", "bash-prompt-prefix", "bash-prompt-suffix", "flake-registry", "commit-lockfile-summary"}; for (auto & [name, value] : settings) { auto baseName = hasPrefix(name, "extra-") ? std::string(name, 6) : name; // FIXME: Move into libutil/config.cc. std::string valueS; if (auto* s = std::get_if(&value)) valueS = *s; else if (auto* n = std::get_if(&value)) valueS = fmt("%d", *n); else if (auto* b = std::get_if>(&value)) valueS = b->t ? "true" : "false"; else if (auto ss = std::get_if>(&value)) valueS = concatStringsSep(" ", *ss); // FIXME: evil else assert(false); if (!whitelist.count(baseName) && !nix::fetchSettings.acceptFlakeConfig) { bool trusted = false; auto trustedList = readTrustedList(); auto tlname = get(trustedList, name); if (auto saved = tlname ? get(*tlname, valueS) : nullptr) { trusted = *saved; printInfo("Using saved setting for '%s = %s' from ~/.local/share/nix/trusted-settings.json.", name, valueS); } else { // FIXME: filter ANSI escapes, newlines, \r, etc. if (std::tolower(logger->ask(fmt("do you want to allow configuration setting '%s' to be set to '" ANSI_RED "%s" ANSI_NORMAL "' (y/N)?", name, valueS)).value_or('n')) == 'y') { trusted = true; } if (std::tolower(logger->ask(fmt("do you want to permanently mark this value as %s (y/N)?", trusted ? "trusted": "untrusted" )).value_or('n')) == 'y') { trustedList[name][valueS] = trusted; writeTrustedList(trustedList); } } if (!trusted) { warn("ignoring untrusted flake configuration setting '%s'.\nPass '%s' to trust it", name, "--accept-flake-config"); continue; } } globalConfig.set(name, valueS); } } }