@ironicbadger & @ChrisLAS - if y’all are going to do a segment on #Immich kiosk, I’d be happy to preemptively share what I’ve got going with it. to;dr is a little pi-sized “digital photo frame” on my desk & a 65” tv near my front door that has digital art via Immich kiosk and a home dashboard that can be switched to with the push of a zigbee button. The TV and an old tiny Lenovo to run it were acquired for free. The Pi one is all #Nix-ified too.
dear internet, i have a nixos with an efi-only partition and i want to do luks unlock via ssh from inside initrd. when setting network settings into `boot.initrd.network` and ssh config (with host keys in /boot/efi) into `boot.initrd.network.ssh`, i do not get any action in stage 1 attempting to either bring up the network nor launch SSH. i get the normal systemd-udev prompt for the luks passphrase. any ideas?
#nixos #nix
Short blog post on how to authenticate your NixOS deployments with comin: https://lewo.abesis.fr/posts/authenticate-nixos-deployments/
Announcing #Aux Foundation, a binary bootstrap chain for #Nix!
https://forum.auxolotl.org/t/aux-foundation-is-now-available/885
Announcing the `v1.0.0` release of #Aux Lib, a fully-featured #Nix library with its own module system.
https://forum.auxolotl.org/t/aux-lib-v1-0-0-is-now-available/883
Mark your calendars! #NixCon 2025 is set: Where: OST, Rapperswil-Jona, Switzerland
When: September 5-7, 2025 (Fri-Sun)
Tag your fellow Nix fans, spread the word, and let’s make this the best NixCon yet! More details here: https://discourse.nixos.org/t/nixcon-2025-5-7-september-in-rapperswil-jona-switzerland/62255
#Nix #NixOS
Sécurix, a NixOS-based secure operating system tailored for small to medium-sized teams https://lobste.rs/s/9tmwpa #nix
https://github.com/cloud-gouv/securix
Casual #NixOS Meetup in Vienna! Join an informal NixOS meetup to chat about all things #Nix & NixOS!
April 7, 2025 |
18:00 |
GT_, Augasse 2-6, 1090 Wien
https://discourse.nixos.org/t/community-calendar/18589/195
Nice, lib.packagesFromDirectoryRecursive
now supports nested scopes!
packagesFromDirectoryRecursive
transforms a directory tree of packages into a nested attribute set of derivations. You can use it to manage a package set in a similar way to by-name in nixpkgs (without the sharding part). The package files in tree must be suitable for callPackage
.
Subdirectories in the tree result in nested attribute sets. In the following example, packages d
, e
and f
will be in a nested attribute set called my-namespace
.
my-packages
├── a.nix
├── b.nix
├── c
│ ├── my-extra-feature.patch
│ ├── package.nix
│ └── support-definitions.nix
└── my-namespace
├── d.nix
├── e.nix
└── f
└── package.nix
Previously, this would only use one scope (my-packages
), so e
could only depend on d
as my-packages.d
. With the introduction of nested scopes, e
can refer to d
within the same scope directly.
PR: https://github.com/NixOS/nixpkgs/pull/392800
function doc on noogle (which isn't yet updated for the new behavior): https://noogle.dev/f/lib/packagesFromDirectoryRecursive
We are hosting the 10th iteration (I forgot to toot about the previous one) of our Brussels #Nix / #NixOS / #Guix User Group Meetup next Friday, March 28th, at @HSBXL!
The lightning talks planned so far are:
- Local DNS server with CoreDNS by Hugo
- Self-hosting a Mastodon instance by @xavier and myself :)
Want #cloudnative but with the power of #declarative configuration? The recoverability of #transactions for system configuration?
Wednesday it's the online #guix meet-up! With a great talk by @paulbutgold
about running docker / oci containers using the Guix configuration system.
His Gocix project has #prometheus, #grafana, #forgejo, #conduit and #traefik examples.
Meet-up details:
[current mood: https://xkcd.com/349/ ]
I need someone who already has an account on https://git.lix.systems/ to file a bug report for me. I have repeatedly tried to create an account and the email confirmation email just never shows up.
I would also accept "manual creation of a non-github-based account" for me (as per the FAQ). No, I can't use Matrix to ask for one. I don't want to talk about that.
on to the next #nix puzzle
(for arbitrary nixos system configuration including disko-based declarative partitioning, how to enable generating *both* test VMs and installers? the obvious answer would seem to be "nixos-generators" but `nixosGenerate { format = "vm-nogui"; ... }` ignores disko configuration inside the `...`.)
#Nix question: Is there any way at all to make "nix run" not insist on everything being committed to git? I want to be able to test my changes *before* I commit them.
#guix social talk this week by @paulbutgold on self-hosting @forgejo using #oci / #docker #containers
His Gocix project brings the power of declarative configuration to running container services.
Details on the Wiki or register at the Meetup:
- https://libreplanet.org/wiki/Group:Guix/GuixSocial
@eliasp While I know what you mean, I strongly disagree with that truncation.
First, the nixos hardware module needs to exist & support all of your particular hardware. This isn't a given thing depending on the HW you are about to use.
Secondly, there are still too many settings you need to do manually such as xfce environments, lots of app settings, ...
I started with NixOS in the naïve assumption that it is allowing me to define everything across all of my computers. I failed miserably & with the next opportunity, I'll switch back to Debian.
However, if you're totally open to let the #NixOS community to choose the hardware platform (devices that do have a HW config module which supports all features), desktop environment (sway?) and all apps for you, then you're probably fine with "everything in your #Nix configuration". If not, you do spread misleading vibes here - so to say.
And yes, there's still the issue with not being to run #Python in a normal way.
HTH