ostree
nixpkgs
ostree | nixpkgs | |
---|---|---|
41 | 1,037 | |
1,453 | 21,023 | |
1.9% | 2.1% | |
9.0 | 10.0 | |
5 days ago | 5 days ago | |
C | Nix | |
GNU General Public License v3.0 or later | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ostree
-
NixOS Reproducible Builds: minimal ISO successfully independently rebuilt
Ansible makes mutable changes to the OS, task by task.
Nix is immutable. A new change is made entirely new, and only after the build is successful, all packages are "symlinked" to the current system.
Fedora Silverblue is based on ostree [1]. It works similarly like git, but on your root tree. But it requires you to reboot the whole system for the changes to take effect. Since Nix is just symlinked packages, you don't need to reboot the system.
More detailed explanation here [2].
[1]: https://github.com/ostreedev/ostree
[2]: https://dataswamp.org/~solene/2023-07-12-intro-to-immutable-...
- Can't install from flathub
- hello guys everytime i intall a flatpak on fedora this error always happnes how do i fix it
-
PSA: Flatpaks are currently broken on Fedora. Here's a temporary solution.
This one is for the ostree bug currently ongoing: https://github.com/ostreedev/ostree/issues/2900
-
flatpak issue on fedora 38 kde
This sounds related to the ostree bug.
- ostree-system-generator failed with exit status 1 on every boot after update.
-
What do you prefer more and why?
I definitely agree that immutability offers considerable value in regards to improving security. But arguably it's insufficient to pull the win over mutable Fedora due to the losses caused by the inability to install the kernel-hardened package and the lack of UKI (Unified Kernel Image) support.
-
Question about immutability
Other hardening guides mention a Unified Kernel Image as another measure to further improve security. Unfortunately, once more, this is (currently) not supported on Fedora Silverblue. I haven't seen it being done on openSUSE Aeon either. Though, once again, I'd love to be corrected!
-
Does an immutable system really provide enhanced security?
The fedora crew is working on it through ostree though, so both fedora Silverblue and flatpak will be getting it (as well as true immutability) in the future: https://github.com/ostreedev/ostree/issues/2867
-
Silverblue/ Kinoite - real-life shortcomings?
Aside from what has already been mentioned, Unified Kernel Image isn't supported (yet).
nixpkgs
-
Thunderbird 140 "Eclipse"
I just switched away from it again after it got delisted from nixpkgs due to lack of development[0][1]
[0] https://search.nixos.org/packages?channel=25.05&from=0&size=...
[1] Should be this one https://github.com/NixOS/nixpkgs/pull/351205
- Deep Down the Rabbit Hole: Bash, OverlayFS, and a 30-Year-Old Surprise
- Fun with uv and PEP 723
- Why We're Moving on from Nix
-
I Think It's Time to Give Nix a Chance
The source code is retrieved from the official source of the package, and checked against a hash that is stored in the package definitions. All the package definitions are stored in a large github repository, and they are "code reviewed".
For example, you can see where the xz sources get pulled from in the src section here:
https://github.com/NixOS/nixpkgs/blob/nixos-25.05/pkgs/tools...
As usual, wherever you get your software, if someone at the source sneaks in something malicious and no one notices it it gets in there. NixOs has no special mitigations against that (AFAIK).
But you can be reasonably sure that the binary you have matches the official source of the software, with maybe some reviewed patches to get it to work in Nix's environment.
The binaries are cached, so you don't have to build everything yourself. There is a command to rebuild the software from source yourself. Most packages are reproducible, about 95% of the distributed gnome version:
-
Free high-performance cross-platform game engine
Noticed it wasn't on Nixpkgs, so... https://github.com/NixOS/nixpkgs/pull/399843
- Amazon Q CLI: now available in Nix unstable
-
InitWare, a portable systemd fork running on BSDs and Linux
https://github.com/nixos-bsd/nixbsd This is a very cool project that I hope will get upstreamed into NixOS proper, eventually.
I always thought InitWare would be good for that. See https://github.com/NixOS/nixpkgs/issues/26850 --- we've been discussing this before NixBSD existed, even!
-
The essential guide to installing Amazon Q Developer CLI on Linux (headless and desktop)
If you are currently involved in managing packages for a Linux distribution, then you might want to use the instructions outlined in the GitHub repo to help you build packages for your distributions. My colleague James Ward has recently done this for NixOS (you can see his PR here)
-
A Look at Firefox Forks
You can do this with vanilla Firefox using policies.json[1]. Check out `DisableAppUpdate` attribute.
If you're using Firefox from nixpkgs this is already disabled by default[2].
[1]: https://support.mozilla.org/en-US/kb/customizing-firefox-usi...
[2]: https://github.com/NixOS/nixpkgs/blob/nixos-24.11/pkgs/appli...
What are some alternatives?
ABRoot - ABRoot is a utility that provides full immutability and atomicity to a Linux system, by transacting between two root filesystems. Updates are performed using OCI images, to ensure that the system is always in a consistent state.
zen-kernel - Zen Patched Kernel Sources
rpm-ostree - ⚛📦 Hybrid image/package system with atomic upgrades and package layering
Home Manager using Nix - Manage a user environment using Nix [maintainer=@khaneliman, @rycee]
mkosi - 💽 Build Bespoke OS Images
waydroid - Waydroid uses a container-based approach to boot a full Android system on a regular GNU/Linux system like Ubuntu.