Skip to content

Conversation

@maxbrunsfeld
Copy link
Collaborator

Fixes a bug mentioned in #38891

Release Notes:

  • Fixed a bug where environment variables like NODE_EXTRA_CA_CERTS were not loaded from the user's shell initialization scripts in WSL or SSH remote projects.
Co-authored-by: Cole Miller <cole@zed.dev>
@cla-bot cla-bot bot added the cla-signed The user has signed the Contributor License Agreement label Oct 13, 2025
@zed-industries-bot
Copy link

Messages
📖

This PR includes links to the following GitHub Issues: #38891
If this PR aims to close an issue, please include a Closes #ISSUE line at the top of the PR body.

Generated by 🚫 dangerJS against b6db568

@cavebatsofware
Copy link
Contributor

I think it would be good to advise the user that the application is loading local env vars to the server as that is not necessarily expected and may not be considered secure in some environments.

@maxbrunsfeld
Copy link
Collaborator Author

Can you say more about how this is not considered secure? I don't think we're doing anything unusual here - the environment variables never leave the remote machine.

@maxbrunsfeld maxbrunsfeld merged commit 6a2bad4 into main Oct 13, 2025
23 checks passed
@maxbrunsfeld maxbrunsfeld deleted the remote-env-vars-for-node branch October 13, 2025 23:09
maxbrunsfeld added a commit that referenced this pull request Oct 13, 2025
Fixes a bug mentioned in
#38891

Release Notes:

- Fixed a bug where environment variables like `NODE_EXTRA_CA_CERTS`
were not loaded from the user's shell initialization scripts in WSL or
SSH remote projects.

Co-authored-by: Cole Miller <cole@zed.dev>
@cavebatsofware
Copy link
Contributor

Can you say more about how this is not considered secure? I don't think we're doing anything unusual here - the environment variables never leave the remote machine.

I don't think its necessarily insecure, other than than users may not realize its being done. Its a good change imo. Just seems like its a human vector. Not an application issue.

@cavebatsofware
Copy link
Contributor

Contracting I sometimes connect to machines that I don't necessarily trust, but I don't do the eval with zed. I do it with traditional tools. But I could see others doing this with less awareness.
]

@cavebatsofware
Copy link
Contributor

@maxbrunsfeld Responded but just for clarity ^^

P1n3appl3 pushed a commit to P1n3appl3/zed that referenced this pull request Oct 18, 2025
Fixes a bug mentioned in
zed-industries#38891

Release Notes:

- Fixed a bug where environment variables like `NODE_EXTRA_CA_CERTS`
were not loaded from the user's shell initialization scripts in WSL or
SSH remote projects.

Co-authored-by: Cole Miller <cole@zed.dev>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

cla-signed The user has signed the Contributor License Agreement

4 participants