nixfiles
My NixOS configuration and assorted other crap. (by barrucadu)
sops-nix
Atomic secret provisioning for NixOS based on sops (by Mic92)
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
nixfiles
Posts with mentions or reviews of nixfiles.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-06-19.
- My First Impressions of Nix
-
How can I calculate the "age of money" with (h)ledger?
If you're familiar with Python, I have a script which does that (along with a few other metrics): https://github.com/barrucadu/nixfiles/blob/1c99414156a7081ade210a9f43a3941b44a4ef0b/hosts/nyarlathotep/jobs/hledger-export-to-promscale.py
-
Issues getting docker containers with databases set up
I run a lot of services through docker containers, here's how I structure things: https://github.com/barrucadu/nixfiles/blob/master/services/concourse.nix
-
Who's here runs NixOS with opt in state?
I do. I have a fairly small chunk of configuration to stick all persistent state I care about in a different ZFS dataset (mounted to /persist) and do the rollback.
-
Do you all just git init inside your /etc/nixos directory?
It's what I do.
-
Erase your darlings: immutable infrastructure for mutable systems (erasing root on every boot)
You can see the relevant bit of my config on github.
-
How do you manage your private keys?
My solution - which is not great, mind you - is to have my NixOS config defined across two git repos: one is public, the other is private and has all the secrets.
-
Erasing root on every boot
All my nixos config is on github.
sops-nix
Posts with mentions or reviews of sops-nix.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-03-19.
-
Show me the way to cloud infra
For applications, I think environment variables are great. Especially if you adopt nomad because you could also use vault to populate secrets in. For machines that won't work so you'll need something else like https://github.com/Mic92/sops-nix
-
how to store secrets needed at install time
I've heard good things about and seen sops-nix used on a few really solid configs. Others tend to use Age or Homeage.
-
Nix way to recreate environments including authentication, configuration, etc?
You can use something like sops-nix if you're on NixOS https://github.com/Mic92/sops-nix.
-
Building a highly optimized home environment with Nix
Yeah, I don't know how to manage secrets yet. I've read about sops-nix, but I don't have the slightest clue how to integrate it into my own nix-config.
-
What would make NixOS more secure?
I use sops-nix for that. Secrets are stored encrypted in the store, and decrypted at runtime.
-
What to do...
One think I saw that I don't recommend is to change your password after installing; that's not very reporoducible, use users.users..hashedPassword or users.users..passwordFile with agenix or sops-nix.
- How to handle secrets in NixOS (for Docker container and Systemd Services)?
-
How do you manage your private keys?
So, I did some digging. According to the first Dicourse chat that popped up, it's "not possible". That's not an acceptable answer for me ;). I read through HM's appendix to see if there's a mention of private keys there (there weren't). I also know of SOPS (and sops-nix), but that seems to require an SSH/GPG key to decrypt :D.
-
A guide to build a Raspberry Pi cluster managed by NixOps
If you only need secrets management, there are quite a lot of bolt-on solutions with little overhead which are also agnostic to the form of deployment, like https://github.com/Mic92/sops-nix or https://github.com/ryantm/agenix. Personally for my machines I want unattended reboots, so I just copy all keys to the hard disk and manage secrets solely with file permissions.
What are some alternatives?
When comparing nixfiles and sops-nix you can also consider the following projects:
NixOS-Guide - NixOS Guide. Learn all about the immutable Nix Operating System and the declarative Nix Expression Language.
agenix - age-encrypted secrets for NixOS and Home manager
vault-secrets - NixOS tooling for Hashicorp Vault
.dots - just my .dotfiles
digga - A flake utility library to craft shell-, home-, and hosts- environments.
nixos-config - Mirror of https://code.balsoft.ru/balsoft/nixos-config
impermanence - Modules to help you handle persistent state on systems with ephemeral root storage [maintainer=@talyz]
nixos-config - My NixOS configurations.
morph - NixOS deployment tool