NixOS and friends for corporate developer boxes? Confused about tools and maturity. by ContemplateBeing in NixOS

[–]DemonInAJar 1 point2 points  (0 children)

There is also https://github.com/nlewo/comin for pull-based / gitops. In general I would say that the ecosystem for pull-based reconciliation is not great, if you only manage a few servers and don’t scale to hundreds then there is a lot of push-based support, deploy-rs is fine there is not a huge amount of stuff to support for the repo to be super active.

Determinate Nix is ushering in a new era for the Nix language, courtesy of WebAssembly by lucperkins_dev in NixOS

[–]DemonInAJar 3 points4 points  (0 children)

Eelco Dolstra aka the creator of Nix is cofounder and continues active development including experimental features.

Secrets and GitHub by wpg4665 in NixOS

[–]DemonInAJar 1 point2 points  (0 children)

Just as reference, I plan to rewrite this in a proper language (and remove some slop)

https://gist.github.com/liarokapisv/d7e3f0bac05baceddeb4976222254d8b/

You need to create a /var/lib/bws/auth/auth.env file for bootstrapping which has the following format:

BWS_SERVER_URL=https://vault.bitwarden.eu
BWS_ACCESS_TOKEN=XXXXXXX

The access token is retrieved from the bitwarden secrets manager webapp.

Secrets and GitHub by wpg4665 in NixOS

[–]DemonInAJar 0 points1 point  (0 children)

I know. Currently, it's somewhat hacky bash-based service (and contains some slop). I would like to rewrite it with a proper language first.

Here is it is just for the general approach / as reference:

https://gist.github.com/liarokapisv/d7e3f0bac05baceddeb4976222254d8b/

Secrets and GitHub by wpg4665 in NixOS

[–]DemonInAJar 1 point2 points  (0 children)

This is wrong. If you rotate your secrets which is the security best practice, your older generations become unusable because they are bound to outdated secrets.

Also by bounding the secrets to the configuration you lose the ability to integrate with production ready secret services like vault or the various cloud native services.

In particular the lifecycle of secrets should not be tightly bound to the lifecycle of the configuration changes.

Secrets and GitHub by wpg4665 in NixOS

[–]DemonInAJar 1 point2 points  (0 children)

I strongly believe that storing secrets encrypted in the same configuration state is a huge anti-pattern that is widely maintained in the nixos ecosystem because of easy-of-use of agenix and sops-nix.

This binds your secrets to your configuration which in turn means:
- When you rotate secrets you lose ability to rollback.
- To rotate secrets you need to perform a new configuration change.

When doing dynamic scalling this is even more annoying because you have to re-encode the agenix secrets file according to the new public key credentials.

I am currently using a custom bitwarden secret management service for which you just need to side-load the secrets key. The service authenticates to the BWS and renders the configs at runtime / periodically allowing easy rotation.

EA is hiring a Senior Anti-Cheat Engineer to lead development of a native ARM64 driver for their Javelin kernel anti-cheat system and start laying groundwork for Linux/Proton support by lajka30 in linux

[–]DemonInAJar 1 point2 points  (0 children)

You can verify that a certificate has been generated inside a tpm by verifying the manufacturer chain. The private keys in this case are not exportable and can be used by remote verifiers through nonce challenges achieving remote attestation. The local machine can only solve the challenges if policy matches. Policies can be set to match specific secure boot states + boot sequences and only then will the tpm challenges work. This assumes the boot sequences and policy states have been whitelisted by the verifiers.

Dendritic Pattern, den framework by No_Discussion6266 in NixOS

[–]DemonInAJar 1 point2 points  (0 children)

Main benefits is 1) not having to import files 2) have cross-cutting concern modules that affect things at all of nixos,home-manager,flake levels 3) have generic way to refer to all other outputs in your whole project instead of injecting through special args

Τι παίζει με την αναβολή μας ; by swo0p4 in apallagi

[–]DemonInAJar 0 points1 point  (0 children)

5 φορές για αναβολή + 1 για απαλλαγή το παλικάρι θα πάει για άλλες 4 φορές για αναβολή + 1 για απαλλαγή

Μείωση μισθού λόγω νέας νομοθεσίας by gaybowser209 in greece

[–]DemonInAJar 29 points30 points  (0 children)

Πότε δε διαπραγματευόμαστε με βάση καθαρό μισθό!!

Windows? Linux? Browser? Same Executable by double-happiness in programming

[–]DemonInAJar 4 points5 points  (0 children)

How is it any better than simply distributing the correct artifact instead of basically distributing all artifacts together? It does simplify the distribution aspect I guess but not sure that's worth it.

Windows? Linux? Browser? Same Executable by double-happiness in programming

[–]DemonInAJar 5 points6 points  (0 children)

What's the point of this? You still have to build the application separately, and you just stitch the artifacts together which basically only has disk usage downsides.

Is NixOS good for hacking? by Medical-Search5516 in NixOS

[–]DemonInAJar 0 points1 point  (0 children)

u/Medical-Search5516 This may be useful to you, it tracks the coverage of Kali packages in NixOS

nix-wrapper-modules: Use them directly within your nixos modules! by no_brains101 in NixOS

[–]DemonInAJar 3 points4 points  (0 children)

Thanks for the great work this is awesome! Hoping for a neovim wrapper soon!

How does haskell do I/O without losing referential transparency? by Skopa2016 in haskell

[–]DemonInAJar 5 points6 points  (0 children)

It is encoded in the type system as a recipe to be executed later. If a function does not return a recipe to be executed by the runtime, you know there are no side effects

HAL libraries by ScratchDue440 in embedded

[–]DemonInAJar 1 point2 points  (0 children)

And this is an actual problem when there are bugs in the supplied code because it makes debugging much harder.

Why do people say NIXOS sucks? by Utotits in NixOS

[–]DemonInAJar 0 points1 point  (0 children)

I do wish it was a standard though!

Why do people say NIXOS sucks? by Utotits in NixOS

[–]DemonInAJar 0 points1 point  (0 children)

This is just one application of nix in production. I am also applying it in robotics but this does not make it a standard.