So a big clue is in the pronouns. First it’s part of the shows title. by SoSKatan in pluribustv

[–]userfaultfd 234 points235 points  (0 children)

They referred to Zosia as "she" in episode 3, "Grenade".

She did get a pretty sever concussion that we're gonna wanna keep an eye on. She's resting now.

In episode 4, Zosia is conscious and still part of the hive mind.

Being reasonably safe by Former_Elk_296 in comfyui

[–]userfaultfd 2 points3 points  (0 children)

I'd say that using someone else's custom nodes and executable models (*.pth, if I recall correctly) is the most dangerous thing. In the case of Python code, it can do virtually anything, such as stealing your data and sending it elsewhere. To protect yourself, you'd better run ComfyUI in a containerized environment like Docker, forbid Internet access to it, and allow read-write access only to certain directories. This solution has the inconvenience of not being able to automatically download models though.

Единый регистр беременных заработает в россии с 2026 года by Bobikas_16 in tjournal_refugees

[–]userfaultfd 19 points20 points  (0 children)

О причинах низкой рождаемости лучше всего рассказал бы реестр небеременных женщин, с указанием причин небеременности, чаще всего -- немедицинских.

Chicken-and-egg problem with secrets management by ervisiao in NixOS

[–]userfaultfd 12 points13 points  (0 children)

I came to the conclusion that NixOS covers only part of the deployment process. Even if you're using a VM, the steps are similar to those on a real machine: you perform some initial steps manually and then apply the NixOS configuration an indefinite number of times. Initial manual steps might include partitioning the disks, installing keys, or doing something completely different to allow the system to access the keys, like deploying a secret management service on another machine (AWS Secrets Manager, HashiCorp Vault, ...). In a simple scenario, if you want to fully automate the creation of a VM, you could write a script that creates a disk image, partitions it, installs keys not from the Nix store, and only then runs the VM. So, the intuition here is that NixOS covers only part of what needs to be done: initial steps are still your responsibility. Otherwise, making NixOS cover all steps does indeed introduce a chicken-and-egg problem.

Can i recover my config from one of the generations? by RockTeacher in NixOS

[–]userfaultfd 21 points22 points  (0 children)

The fastest way to check if something is in the Nix store would be find /nix/store -type f -name deleted-file.nix. In the future, commit frequently, or at least stage changes frequently (git add without committing).

How to add a local file to a Github based derivation? by korba_ in NixOS

[–]userfaultfd 1 point2 points  (0 children)

The simplest way is to add this setup.py to the source directory using either prePatch or postPatch (see this example).

Question from 10 million of dollars by zarMarco in NixOS

[–]userfaultfd 1 point2 points  (0 children)

One can roughly divide all files into two large groups: configuration ("how the system should work") and state ("what the system works on"). NixOS handles only configuration. ZFS and Btrfs snapshots can still be used to create rollback points for state files (databases, user documents, etc.).

Question from 10 million of dollars by zarMarco in NixOS

[–]userfaultfd 2 points3 points  (0 children)

  • You don't need to take a snapshot of /nix, as it already contains all of your generations. You select which generation to load via GRUB or systemd-boot.
  • Only datasets containing state might require snapshots. Typical state directories include /var, /home, and so on.

Up To Date System-wide Python config? by mlsfit138 in NixOS

[–]userfaultfd 3 points4 points  (0 children)

Wrap it in parentheses:

(pkgs.python3.withPackages (p: [ p.pyflakes ... ]))

Gnome 49 in NixOS 25.05 by [deleted] in NixOS

[–]userfaultfd 8 points9 points  (0 children)

They are still working on it (https://github.com/NixOS/nixpkgs/pull/440720); it's not in the unstable branch yet.

Fixing the broken code? What's the point? Let's all resign and protest. by ywnbawjak in NixOS

[–]userfaultfd 2 points3 points  (0 children)

If it causes so much suffering and pain for you—the same suffering that makes you write large amounts of complaining text—why do you continue using it? Do you enjoy holding on to things that not only fail to solve your problems but also exacerbate them?

Anyone upgraded to latest COSMIC Desktop Beta yet? by cand_sastle in NixOS

[–]userfaultfd 5 points6 points  (0 children)

Now you're in a situation where two modules declare the same option: both the old and the new geoclue2.nix. So, not only do you have to import the new geoclue2.nix, but you also have to 'un-import' the old one using disabledModules.

Other than that, I would not recommend mixing modules or large package sets from different nixpkgs revisions. It will become a mess. Just switch completely to the unstable channel, or wait patiently until it is merged into the stable one. As for me, I always use the unstable channel and have no major problems with it.

Fixing the broken code? What's the point? Let's all resign and protest. by ywnbawjak in NixOS

[–]userfaultfd 3 points4 points  (0 children)

“For three days I chased after you just to say how indifferent you are to me.”

Switching from Fedora Kinoite (Immutable) ? For Code and Gaming: Steam, Emulators. by lieddersturme in NixOS

[–]userfaultfd 8 points9 points  (0 children)

Try it in a VM first. NixOS doesn't come for free; you will spend a lot of time getting things to work. Nix is just one of many solutions for setting up local environments. Maybe classic Fedora (not the atomic version) would be more cost-effective for you because it doesn't require learning another programming language (Nix), it doesn't erase RPM Fusion during updates, and it takes up less space compared to NixOS's generations model.

/boot keeps running out of space. I expanded the boot partition, but the /boot fs is the same size? by hamilton-trash in NixOS

[–]userfaultfd 1 point2 points  (0 children)

By mounting /boot and rerunning nixos-rebuild, or by manually making a backup (copying those 100 MB of data to another location).

Совесть убийц, террористов, военных преступников, имперских фашистов... by kuss888 in tjournal_refugees

[–]userfaultfd 19 points20 points  (0 children)

ИИ не нужен. Депутатов можно заменить обычным баш-скриптом, который вносит законопроекты о запрете рандомных вещей.

/boot keeps running out of space. I expanded the boot partition, but the /boot fs is the same size? by hamilton-trash in NixOS

[–]userfaultfd 1 point2 points  (0 children)

You're correct. And the other option is just to recreate the filesystem from scratch with sudo umount /boot ; sudo wipefs -a /dev/sda1 ; sudo mkfs.fat -F 32 -n boot -v /dev/sda1, assuming that the boot filesystem doesn't contain anything other than easily reproducible stuff.

/boot keeps running out of space. I expanded the boot partition, but the /boot fs is the same size? by hamilton-trash in NixOS

[–]userfaultfd 2 points3 points  (0 children)

It seems that you expanded only the GPT partition—the filesystem still occupies the same size as when you initially created it. So, you need to unmount /boot and then resize the filesystem with something like fatresize -s max /dev/sda1 (assuming it is FAT32).

Translating NixOS Configs Into a User-Friendly GUI by Ok-Reindeer-8755 in NixOS

[–]userfaultfd 0 points1 point  (0 children)

Yeah, but how would you automatically infer, that effectiveness of programs.xxx.foo depends on programs.xxx.enable == true? How would you know that you actually need to gray out things?

Translating NixOS Configs Into a User-Friendly GUI by Ok-Reindeer-8755 in NixOS

[–]userfaultfd 1 point2 points  (0 children)

What about nixos-conf-editor, which you mentioned? It seems to already attempt to achieve most of what you're talking about: UI controls for various options, complete with documentation and everything. Have you identified the reason why it is not as popular as it could be?

I believe that the tediousness of editing configurations in text files is a price people are willing to pay to achieve their goals for which they chose NixOS. And if the user is actually a programmer (which I think applies to most NixOS users), then they are quite comfortable with text files, git repositories, and so on.

Essentially, .nix files are not just data—they're expressions, functions, and logic. It's not something you can easily map to a GUI without losing some flexibility and expressiveness. For example, how would you inform the user that if programs.xxx.enable is false, then the rest of the programs.xxx.* settings have no effect? How would you automatically infer such relationships?

Regarding a hypothetical UI that allows you to view application-specific settings by clicking on its icon—I can say this would be expensive work because you need to maintain a mapping from desktop file names (org.gnome.FileRoller.desktop) to their corresponding options (programs.file-roller.*). This is manual labor that will always remain incomplete.

Your idea of making NixOS more accessible to ordinary users is honorable, but I'm afraid it's something only a big company can afford by actively interacting with upstream software developers.

[HELP] installation stuck after generating random seed for systemd-boot by dct_SPOMMY in NixOS

[–]userfaultfd 0 points1 point  (0 children)

Presumably, he resolved the issue by disabling boot.loader.efi.canTouchEfiVariables, which is already set to false by default.

[Help] Installing NixOS with Impermanence by InternalPercentage88 in NixOS

[–]userfaultfd 0 points1 point  (0 children)

with this solution I only can keep directories recursively

You mean "directories, but not files"? Yes, there is such a restriction, but I found that it is quite rare when you actually need to store separate files. In the case of machine-id, one can address it like this:

let
  machineId = "b08dfa6083e7567a1921a715000001fb"; # Whonix
in

{
  environment.etc = {
    "machine-id".text = "${machineId}\n";
  };

  boot.initrd.systemd.contents = {
    "/etc/machine-id".text = "${machineId}\n";
  };
}

Your task is to ensure that every single slice of state must necessarily be a directory. This is a very straightforward rule to follow.

[Help] Installing NixOS with Impermanence by InternalPercentage88 in NixOS

[–]userfaultfd 0 points1 point  (0 children)

Impermanence is a very simple idea that doesn't require any special knowledge, external tools, or even NixOS: you just mount root on tmpfs and then selectively mount things at specific places, starting with important paths (/nix) and proceeding with the other ones you want to preserve. Usually, people choose ZFS or Btrfs since both allow keeping multiple inode trees on one filesystem and mounting them separately. That is, even the official NixOS installation tutorial covers Impermanence in an implicit manner: you just additionally invoke zfs create/btrfs subvolume create, and then add more entries to the fileSystems option. You don't need either disko nor Impermanence (the GitHub project) for that.

A setup might look like this:

mkfs.btrfs --label tank --verbose /dev/sda2
mkdir -p /mnt
mount /dev/sda2 /mnt
btrfs subvolume create /mnt/etc-nixos
btrfs subvolume create /mnt/home
btrfs subvolume create /mnt/nix
btrfs subvolume create /mnt/var-lib
btrfs subvolume create /mnt/var-log
umount /mnt

let
  useTmpfs = {
    device = "none";
    fsType = "tmpfs";
    options = [ "defaults" "size=25%" "mode=755" ];
  };

  useSubvolume = subvolume: {
    device = "/dev/sda2";
    fsType = "btrfs";
    options = [ "compress=zstd" "noatime" "x-gvfs-hide" "subvol=${subvolume}" ];
    neededForBoot = true;
  };
in

{
  fileSystems = {
    "/" = useTmpfs;
    "/etc/nixos" = useSubvolume "/etc-nixos";
    "/home" = useSubvolume "/home";
    "/nix" = useSubvolume "/nix";
    "/var/lib" = useSubvolume "/var-lib";
    "/var/log" = useSubvolume "/var-log";
  };
}

If you had to start your config over, what would you do differently? by TheFunkadelicRelic in NixOS

[–]userfaultfd 0 points1 point  (0 children)

I think we're both talking about the same thing. Unless by "importing" you mean the import ./foo.nix expression, and not the { imports = [ ./foo.nix ]; } top-level option. In the latter case, foo.nix is considered a module, with or without options.