v1.1.0 is released #401
jfroche
announced in
Announcements
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Spring is coming, birds are singing, lot of new feats, let's cut a release.
Note
System manager is a tool to configure Linux machines. Unlike Chef, Puppet and Ansible, it only controls a small subset, and most of its changes are done in an immutable layer, thanks to the power of Nix.
Here are the important changes in this version.
User Management
You can now manage your system users through system-manager. Under the hood, this is managed by userborn.
Safety-wise, this feature never deletes an existing user. If anything goes wrong, disabling system-manager resets the users and groups to what they were before the system-manager activation.
TL;DR: this won't eat your kittens.
You can use it as you would create users on NixOS:
Secrets
Now we're able to manage users, we're also able to use the sops-nix module as is.
Meaning you're finally able to manage your secrets declaratively from your system-manager config.
For instance:
Container Tests
We were already supporting VM tests analogous to the NixOS ones. We're now also supporting container tests.
The test driver has been extracted from clan-core and enhanced with an interactive mode.
It works very similarly as the NixOS test. You'll get your familiar interactive ipython shell to iterate of the test. The only major difference is the insanely fast boot time. The downside is that you can't test any kernel-related stuff with it.
We encourage you to use them as much as possible for your downstream tests. We wrote a how to page to help you getting started.
NixOS Compatibility Improvements
The endgoal of this project is to be able to re-use the upstream NixOS modules as-is. The road is still long, but we made quite some progress implementing some NixOS subsystems allowing us to cover more upstream modules.
In no particular order, we're now supporting:
environment.etcoption.systemd.packagesoption. A convevenient way to inject the upstream projects systemd units to the configuration.systemd.maskedUnitsoption.environment.extraInitoption. Allowing us to add some commands in shell init.networking.firewall. A proper implementation is a bit too tricky for now. Help welcome for a proper one.security.wrappersoptions enable you to create binaries with setuid/setgid bit.See full changelog here
Beta Was this translation helpful? Give feedback.
All reactions