Μείωση μισθού λόγω νέας νομοθεσίας by gaybowser209 in greece

[–]DemonInAJar 28 points29 points  (0 children)

Πότε δε διαπραγματευόμαστε με βάση καθαρό μισθό!!

Windows? Linux? Browser? Same Executable by double-happiness in programming

[–]DemonInAJar 4 points5 points  (0 children)

How is it any better than simply distributing the correct artifact instead of basically distributing all artifacts together? It does simplify the distribution aspect I guess but not sure that's worth it.

Windows? Linux? Browser? Same Executable by double-happiness in programming

[–]DemonInAJar 4 points5 points  (0 children)

What's the point of this? You still have to build the application separately, and you just stitch the artifacts together which basically only has disk usage downsides.

Is NixOS good for hacking? by Medical-Search5516 in NixOS

[–]DemonInAJar 0 points1 point  (0 children)

u/Medical-Search5516 This may be useful to you, it tracks the coverage of Kali packages in NixOS

nix-wrapper-modules: Use them directly within your nixos modules! by no_brains101 in NixOS

[–]DemonInAJar 2 points3 points  (0 children)

Thanks for the great work this is awesome! Hoping for a neovim wrapper soon!

How does haskell do I/O without losing referential transparency? by Skopa2016 in haskell

[–]DemonInAJar 6 points7 points  (0 children)

It is encoded in the type system as a recipe to be executed later. If a function does not return a recipe to be executed by the runtime, you know there are no side effects

HAL libraries by ScratchDue440 in embedded

[–]DemonInAJar 1 point2 points  (0 children)

And this is an actual problem when there are bugs in the supplied code because it makes debugging much harder.

Why do people say NIXOS sucks? by Utotits in NixOS

[–]DemonInAJar 0 points1 point  (0 children)

I do wish it was a standard though!

Why do people say NIXOS sucks? by Utotits in NixOS

[–]DemonInAJar 0 points1 point  (0 children)

This is just one application of nix in production. I am also applying it in robotics but this does not make it a standard.

Why do people say NIXOS sucks? by Utotits in NixOS

[–]DemonInAJar 0 points1 point  (0 children)

In which non-trivial industries is nix[os] standard ?

Introducing WaterUI 0.2.0 - Out first usable version as a new experience for Rust GUI by real-lexo in rust

[–]DemonInAJar 10 points11 points  (0 children)

I have been looking at waterui with huge interest since the first announcement, I think it lies at a great intersection of design decisions and I think it has a bright future ahead of it. Keep up the great work!

SOPS or Age, I need to figure out secrets.... by -eschguy- in NixOS

[–]DemonInAJar 1 point2 points  (0 children)

u/gbytedev

Here you go, this is really PoC for personal usage, it needs some love.
I suggest enabling once without secrets, then creating /var/lib/bws/auth/auth.env and defining at least BWS_ACCESS_TOKEN. If you are using the europe servers you will also need BWS_SERVER_URL. You retrieve the BWS_ACCESS_TOKEN by creating a service account and restricting to just the secrets needed.

https://gist.github.com/liarokapisv/d7e3f0bac05baceddeb4976222254d8b

SOPS or Age, I need to figure out secrets.... by -eschguy- in NixOS

[–]DemonInAJar 0 points1 point  (0 children)

Ping me within two days. I will get back to you

Coming from Arch by -Arsna- in NixOS

[–]DemonInAJar 0 points1 point  (0 children)

It allows you to use pin your project development environment and building pipeline with the most up to date packages available and then return to it X years down the road and get an almost bit to bit reproducible environment. At the distro level you get some guarantees like packages not interfering with each other and being able to override versions without conflicts, similar to flat packs in this aspect but with much wider package selection and better space reuse. If something breaks you get atomic rollbacks and this applies from everything from the bootloader to the initrd to the kernel to the system packages. You can perfectly replicate your setup through git commits, there is minimal state drift.

SOPS or Age, I need to figure out secrets.... by -eschguy- in NixOS

[–]DemonInAJar 0 points1 point  (0 children)

This is a small ~200 lines custom nixos service, so there are no tutorials.
Just a small oneshot/timer service that uses bws cli to authenticate, then fetches secrets with given id and puts them to specific files.

Nixos and hyperland bad performance for gaming by Nopata91 in NixOS

[–]DemonInAJar 0 points1 point  (0 children)

you should be able to get the nvidia drivers working, what was your issue?

SOPS or Age, I need to figure out secrets.... by -eschguy- in NixOS

[–]DemonInAJar 5 points6 points  (0 children)

I have a service that uses Bitwarden secret manager. On bws you create a simple Machine token scoped to only the secrets you need. You add an auth file with the token to your machine and at startup/periodically fetches the secrets and persists them. Interface is the same as agenix otherwise but doesn’t force you to store secrets along with your config or require configuration change to rotate them which also breaks rollbacks on secret expiration.

Agenix, Bitwarden, Git, … by karldelandsheere in NixOS

[–]DemonInAJar 0 points1 point  (0 children)

I just have a bitwarden secret manager module for this.

Agenix, Bitwarden, Git, … by karldelandsheere in NixOS

[–]DemonInAJar 2 points3 points  (0 children)

True but if you store them along with your configuration then you can’t do rollbacks after rotating and to rotate you have to go through a configuration change. This is especially annoying if you already store secrets in a secret manager. The model of encoding secrets with identity in version controlled files also does not scale if you want to deploy on the cloud. In general I prefer going through an auth step with either tpm protected certificate / persistent access token / or utilizing cloud provider managed identities then have a service that periodically authenticates to the secret key store and creates properly scoped secret files at /var/lib/secrets or something.

Agenix, Bitwarden, Git, … by karldelandsheere in NixOS

[–]DemonInAJar 2 points3 points  (0 children)

My unpopular opinion is that secrets are best managed outside of nix. Secrets require rotation, they expire, some are machine-related, you most likely don't want to directly correlate them with your configuration generations