263 pointsby _mig54 days ago27 comments
  • dweller422 hours ago
    Amazing tool! It can have multiple use cases for sure.
  • geerlingguy3 days ago
    Woah, very neat! I may have to add this to the examples in Ansible for DevOps. Great idea, looks like for many cases it will help move hand config into automation.
    • _mig53 days ago
      Thank you, Jeff! What an honour! Let me say that nothing compares to your catalogue of Ansible roles that I have benefited from for many years, which are far better written than anything Enroll generates :) I intend for Enroll only to be a 'rapid grab-it-all', good for certain use cases.

      Appreciate it!

  • bcye3 days ago
    This looks like a great way to learn Ansible too. Instead of learning alongside random examples, you can setup your server and see how it would look like in Ansible.

    Awesome stuff!

    • stego-tech3 days ago
      My thoughts exactly. As someone who has generally learned better and faster through labs or real world work, this is exactly how I intend to teach myself Ansible while also migrating some stuff to containers: throw at my current VMs, identify configs, and then migrate or enroll accordingly.
  • _mig53 days ago
    Here's a video of JinjaTurtle, the companion tool that converts configs to Jinja2 templates and Ansible vars:

    https://asciinema.org/a/765293

    Enroll will automatically make use of jinjaturtle if it's on the $PATH, to generate templates.

  • _mig5a day ago
    Thanks for all the love HN!

    I had a lot of good feedback directly from the comments here, and have made a new release that contains some bug fixes, as well as an improvement to support remote harvesting when the user requires a password for sudo. Thanks to 'slhck' here for the help, advice and patch for that.

    There have also been some questions about 'what does enroll harvest actually capture in its state'. I've updated the docs here to clarify the process:

    https://enroll.sh/docs.html#harvest

    And for the data/API nerds, I've also published a JSON Schema of the state.json file here:

    https://enroll.sh/schema.html

    Thanks again!

  • smoyer3 days ago
    I have quite a few machines that were constructed using Ansible ... When I get a chance, I'll reverse then and compare the results to the IaC that created them
  • Quarrel3 days ago
    Very cool.

    I just saved the state of my WSL2 instance, pushed it to github. Amazingly simple.

    FWIW, I was required to add the --harvest, which your quick start seems to be missing?

    ie I used:

    uvx enroll single-shot --harvest ./harvest --out ./ansible

    • _mig53 days ago
      Whoops, thanks, I'll adjust that example!

      Indeed when using single-shot, unless you're using the --remote modes (in which case, the harvest is pulled down to a machine-generated path locally), indeed you need to supply the path to the harvest so that the 'manifest' part under the hood, knows what to use.

      (By contrast, if you are using just the 'enroll harvest' command by itself, and omit the --out option, it will by default store the harvest in a random directory in ~/.cache/enroll/harvest/xxxxxxx)

      Thanks for trying it out!

  • nightshift13 days ago
    This makes me think of the now defunct https://github.com/SUSE/machinery
    • _mig53 days ago
      Indeed! I'm showing my age, but I do remember using this with Puppet and it was one of my inspirations :D (no commits in nearly 13 years, ouch) https://github.com/devstructure/blueprint
      • heliostatic3 days ago
        Yes! I always thought that was a very clever project, and was sad when it ceased development. Very excited to try this out, and glad to have stayed on Debian all these years.
  • novoreorx3 days ago
    I wonder if Nix has similar tools, as it is famous for declarative system management, which is quite suitable for server provisioning.
    • ptman3 days ago
      It's hard with nix to end up with a system without first having a config for that system
    • c0balt3 days ago
      The other comment already answers part of it, there is no real need for it for a NixOS system as you usually either can consult the store on the machine (and recursively build a graph of a all transitive dependencies of a generation), have a system that stores the config along with the generation (option `system.copySystemConfiguration` or a flake-based system will store the config in the store itself).

      A system that has neither a store nor the config (container image) not easily reconstructable as you miss too much metadata.

  • stevekemp3 days ago
    That's a really cute looking tool. I ran it without installing via:

        uv tool run enroll  single-shot --harvest ./harvest --out ./ansible
    
    
    It generated almost a thousand roles, and at quick glance it identified many changes which I expected and some that I didn't.
    • _mig53 days ago
      Yup - it can be pretty overwhelming, it depends on what it detected on your system! The state.json will usually explain why it 'harvested' something (perhaps it was because it found a running systemd service, perhaps it was due to detecting a package having been manually installed, etc)

      There is the --exclude option which might help (also keep in mind you can define an enroll.ini file to manage the flags so it's less cumbersome). Otherwise, you can always prune the roles from the ansible dir/playbook.

      I'm going to continue to work on easy options to skip stuff. In particular I do think many of the 'lib' packages could be omitted if they are just dependencies of other packages already detected as part of the harvest. (Need to basically build a dependency graph)

      Thanks for trying it out!

      • mlrtime3 days ago
        Can you create a baseline system to create the ignores?

        What I mean is in some large companies you are given a host that already has lots of config changes, possibly by ansible. Then your team has to configure on top of those changes, maybe ansible again. I'd like to run on the baseline system given to create a baseline, then on a production host to see how it drifted.

        Sorry if this is in the docs, cool tool!

        • _mig53 days ago
          Hi mlrtime. You could run it on a base system, and use --exclude-path and --include-path all you want, to capture or ignore the things you don't care about.

          Treat that as your 'golden' harvest state. You could then run a 'harvest' on the production system. You'd then be able to run 'enroll diff --old baseline --new production' to compare the difference.

          You could also first run the manifest of the baseline harvest against your production, to ensure it has (at least) all the same things as the baseline.

          A 'harvest' of production after that, would probably then show just stuff that existed on production already that wasn't in the baseline.

          I hope that makes sense!

      • gerdesj3 days ago
        I've just run it against my desktop PC.

        I had documented everything up to a point on this beatie and then things have got out of hand. I now have all the changes from after I went off piste.

        What a great tool.

        Thank you.

  • Imustaskforhelp4 days ago
    Bravo, I will play with it. I haven't played with ansible till now but I know that its related to automation.

    If something can make ansible easier for me to try out like this tool while being pragmatic, I will give this a try someday thank you!

    How accurate does this tool end up becoming though? Like can I just run some bunch of commands to setup a server and then use this with ansible?

    Would this end up being a good use for it or would I just re-invent something similar to cloud-init on wrong abstraction. (On all fairness, one thing troubling me about cloud-init is that I would need to probably have a list of all commands that I want to run and all changes which sometimes if history command might have some issues or you do end up writing files etc. ends up being a little messy)

    I haven't played that much with both cloud-init and ansible either but I am super interested to know more about enroll and others as well as I found it really cool!

    • _mig53 days ago
      Great questions! OP here, let me answer them below:

      > How accurate does this tool end up becoming though? Like can I just run some bunch of commands to setup a server and then use this with ansible?

      Yes, exactly: let's say you provision a VPS and then install some stuff on it, configure some configs, create a crontab, create a user account. Running 'enroll harvest' on it will detect all of that, and 'enroll manifest' will then convert that 'harvest' into Ansible roles/playbooks.

      > Would this end up being a good use for it or would I just re-invent something similar to cloud-init on wrong abstraction. (On all fairness, one thing troubling me about cloud-init is that I would need to probably have a list of all commands that I want to run and all changes which sometimes if history command might have some issues or you do end up writing files etc. ends up being a little messy)

      Yeah, your instinct is right on the latter point. Ansible and Cloud-init are similar in that they are both 'declarative' systems to say what should exist on the machine. Ansible has some advantages in that it compares with the current setup to see if it needs to change anything. Cloud-init (in my experience) is a bit more crude: 'just run this stuff the first time the machine is booted'.

      I'm sure there are different ways of using it, but in my experience, cloud-init is really designed to 'run once' (first time setup). For example, if you provision a machine with Terraform or OpenTofu, and you pass in cloud-init, then later if you change the cloud-init data, it wants to destroy the machine and rebuild it (unless you configure it explicitly not to do that, by which you have to tell it to 'ignore' changes to the cloud-init).

      Whereas with Ansible, you're at least equipped with a solid foundation that you can extend over time - you'll no doubt eventually need to make changes to your server post the initial setup.

      If you're new to Ansible, Enroll will be a quick way to get up and running with working Ansible configuration and you can adapt it from there as you learn it.

      Admittedly, to satisfy a lot of corner cases (or support different Linux distros), the Ansible code that Enroll generates is a bit complex to read compared to a 'bespoke' home-grown playbook, on the other hand, it's perfectly correct code and you'd be immediately exposed to good practice syntax.

      Let me know if you get to try it!

  • proxysna3 days ago
    Genuenly the thing i've been dreaming about for a while. Nice work.
  • usrme3 days ago
    An incredible undertaking! How much testing have you done with regards to harvesting a manual configuration into Ansible, creating a new machine and then applying that to see whether the machine is a functional representation of the old machine?

    The reason I'm asking is because I'm interested in how much confidence could be lent to this tool with regards to more old and obscure machines that have been running for years.

    • _mig53 days ago
      Thanks usrme! Good questions.

      I run QubesOS as my workstation, so it's been really beneficial here, because Qubes is all VMs and templates. I've been 'harvesting' one Qube VM and then building another and running the manifest on the second machine. It's been working very well to align it with the first machine. Most of my testing has been visually watching the Ansible play install/configure things that I expect to see occur.

      Where it falls down:

      1) Systems that are so old, the packages that it detected as being installed, are no longer 'installable' on a new system (e.g the apt repositories no longer have those packages, they just did at the time of the original install)

      2) Packages that were installed not via an apt repo but, say, dpkg -i (of a .deb file). Slack Desktop is a good example. Obviously the deb is not in the harvest, so it fails there.

      So, there'll always be corner cases, but assuming everything that you have installed on the old/obscure machine is still something that can be installed via the usual methods, it should be okay. (If you are running a system that is so old, its packages are no longer available upstream, it's probably time to let it go! :) )

      You'll want to use --exclude-path to ignore some server-specific stuff, perhaps, such as static network configuration etc. And of course, you can also comment out whatever roles are superfluous, in the playbook, before running it.

      Always use --check with Ansible first just in case.

  • neilv3 days ago
    This is a great idea. I have done this manually, and it was a lot of work.

    Even with a tool, people will still have to understand the output, enough that they can spot situations like "this part doesn't make sense at all", "that bit isn't static", "holy crud, there's an unsecured secret", "this part suggests a dependency on this other server we didn't know was involved, and which the tool doesn't investigate".

    • _mig53 days ago
      I agree! It's always a 'best effort' tool. There's going to be corner cases where something that might end up in the 'logrotate' role could arguably be better placed in a more specific app's role.

      It does an okay job at this sort of thing, but definitely human eyes are needed :)

  • barbazoo3 days ago
    This is a fantastic idea. I can imagine using this to pull in any manual changes I might have made to the server because I’m not the most disciplined person.
    • _mig53 days ago
      Haha, same! I ran it on a server I've been shepherding along since 2008 and wow, it was insightful, there were even cron jobs it found that I had forgotten about :)

      If you are using a Debian-like or Fedora-like workstation, it's also really useful to 'ansibilize' your desktop OS in case you need to reinstall :)

  • krelas3 days ago
    I’ve been looking for something exactly like this, thank you! Now I just need to find the same thing for Windows and macOS…
  • yowlingcat3 days ago
    Very cool! Managing ones boxes as cattle and not pets almost always seems like a better idea in retrospect but historically it is easier said than done. Moreover, I like the idea of being able to diff a box's actual state from a current Ansible system to verify that it actually is as configured for further parity between deployed/planned.
    • _mig53 days ago
      Definitely! It's all too easy to make a direct change and later forget to 'fold it in' to Ansible and run a playbook. My hope is that `enroll diff` serves as a good reminder if nothing else.

      I'm pondering adding some sort of `--enforce` argument to make it re-apply a 'golden' harvest state if you really want to be strictly against drift. For now, it's notifications only though.

  • skywhopper3 days ago
    Really cool! I’m in a similar situation and I’m going to try this tool out right away to see if it can speed up Ansible onboarding for some particularly crusty old servers. Thanks for sharing!
  • slhck3 days ago
    I've been looking for something like this, awesome!

    Is it expected that it does not allocate a TTY for sudo password prompts when connecting to a remote machine via SSH? How would I use it otherwise?

    • _mig53 days ago
      Ah, this is not a problem for me on my remote hosts. I'm guessing this comes down to a sudoers policy on certain distros (redhat-like ones perhaps).

      I'm about to make a new release and I'll set `get_pty=True` for the paramiko calls that use sudo. I'm not 100% sure if it will fix it for all use cases, but hopefully it will.

      • slhck2 days ago
        It's just plain Ubuntu actually! I would provide a fix, since getting a PTY is not enough. I can't open a PR because it's not possible with the way you hosted it.
        • _mig52 days ago
          Dang! Seems strange.. I guess you are not using password-less sudo? (I'm interested to understand how Ansible itself works for you then too in such a setup, you have it prompting for a password when it invokes sudo?)

          Yeah, I haven't been confident enough with Forgejo's federation capabilities yet to open up PRs/login etc. Maybe soon. Trying to avoid using Github and the other big providers if I can help it :) but I recognise it's a hindrance..

          I'll happily take a patch and credit you, if you can be bothered, but I understand if not. Feel free to email mig@mig5.net

          *EDIT* reading up on it, sounds like I need to use sudo -S and accept stdin..

  • kriskaminski3 days ago
    Looks very promising. It is the tool for ansible that I wish egsisted for years.

    JinjaTurtle is just chef's kiss. Definitely taking both for a spin.

  • olekspin3 days ago
    Wonderful! I wish that tool was existed a few years ago, when I had no experience with Ansible. Anyway, will try it and compare outcome of Enroll with my current playbooks
  • westurner3 days ago
    Could it also detect changed package files; if there are per-package-file checksums like with `debsums` and `rpm -V`?

    Does it check extended filesystem labels with e.g. getfacl for SELinux support?

    I've also done this more than a few times and not written a tool.

    At least once I've scripted better then regex to convert a configuration file to a Jinja2 templated configuration file (from the current package's default commented config file with the latest options). And then the need is to diff: non-executable and executable guidelines, the package default config (on each platform), and our config.

    Sometimes it's better not to re-specify a default config param and value, but only if the defaults are sane on every platform. Cipher lists for example.

    P2V (physical to virtual) workflows don't result in auditable system policy like this.

    Most of the OS and Userspace packages backed up in full system images (as with typical P2V workflows) are exploitably out of date in weeks or months.

    To do immutable upgrades with rollback, Rpm-ostree distros install the RPM packages atop the latest signed immutable rootfs image, and then layer /etc on top (and mounts in /var which hosts flatpaks and /var/home). It keeps a list of packages to reinstall and it does a smart merge of /etc. Unfortunately etckeeper (which auto-git-commits /etc before and after package upgrades) doesn't yet work with rpm-ostree distros.

    Ansible does not yet work with rpm-ostree distros. IIRC the primary challenge is that ansible wants to run each `dnf install` individually and that takes forever with rpm-ostree. It is or is not the same to install one long list of packages or to install multiple groups of packages in the same sequence. It should be equivalent if the package install and post-install scripts are idempotent, but is not equivalent if e.g. `useradd` is called multiply without an explicit UID in package scripts which run as root too.

    I wrote a PR to get structured output (JSON) from `dnf history`, but it was for dnf4.

    From https://news.ycombinator.com/item?id=43617363 :

    > upgrading the layered firefox RPM without a reboot requires -A/--apply-live (which runs twice) and upgrading the firefox flatpak doesn't require a reboot, but SELinux policies don't apply to flatpaks which run unconfined FWIU.

    Does it log a list of running processes and their contexts; with `ps -Z`?

    There are also VM-level diff'ing utilities for forensic-level differencing.

    • _mig53 days ago
      Hi westurner!

      > Could it also detect changed package files; if there are per-package-file checksums like with debsums and `rpm -V`?

      Yes, that's exactly what it does. See https://git.mig5.net/mig5/enroll/src/branch/main/enroll/plat... and https://git.mig5.net/mig5/enroll/src/branch/main/enroll/rpm....

      It also tries to ignore packages that came with the distro automatically, e.g focusing on stuff that was explicitly installed (based on 'apt-mark showmanual' for Debian, and 'dnf -q repoquery --userinstalled' (and related commands, like dnf -q history userinstalled) for RH-like)

      > Does it check extended filesystem labels with e.g. getfacl for SELinux support?

      Not yet, but that's interesting, I'll look into it.

      > At least once I've scripted better then regex to convert a configuration file to a Jinja2 templated configuration file (from the current package's default commented config file with the latest options).

      Yep, that was the inspiration for my companion tool https://git.mig5.net/mig5/jinjaturtle (which enroll will automatically try and use if it finds it on the $PATH - if it can't find it, it will just use 'copy' mode for Ansible tasks, and the original files).

      Note that running the `enroll manifest` command against multiple separate 'harvests' (e.g harvested from separate machines) but storing it in the same common manifest location, will 'merge' the Ansible manifests. Thereby 'growing' the Ansible manifest as needed. But each host 'feature flips' on/off which files/templates should be deployed on it, based on what was 'harvested' from that host.

      > Does it log a list of running processes and their contexts; with `ps -Z`?

      It doesn't use ps, but it examines systemctl to get a list of running services and also timers. Have a look at https://git.mig5.net/mig5/enroll/src/branch/main/enroll/syst...

      Thanks for the other ideas! I'll look into them.

      • westurner3 days ago
        Thanks for your reply. As well; otoh:

        Does it already indirectly diff the output of `systemd-analyze security`?

        Would there be value to it knowing the precedence order of systemd config files? (`man systemd.unit`)

        How to transform the generated playbooks to - instead of ansible builtins - use a role from ansible-galaxy to create users for example?

        How to generate tests or stub tests (or a HEALTHCHECK command/script, or k8s Liveness/Readiness/Startup probes, and/or a Nagios or a Prometheus monitoring config,) given ansible inventory and/or just enroll?

        Ansible Molecule used to default to pytest-testinfra for the verify step but the docs now mention an ansible-native way that works with normal inventory that can presumably still run testinfra tests as a verify step. https://docs.ansible.com/projects/molecule/configuration/?h=...

        MacOS: honebrew_tap_module, homebrew_module, homebrew_cask_module, osx_defaults_module

        Conda (Win/Mac/Lin, AMD64, ARM64, PPC64, RISC-V 64 (*), WASM)

        CycloneDX/cyclonedx-python generates SBOMs from venv, conda, pip requirements.txt, pipenv, poetry, pdm, uv: https://github.com/CycloneDX/cyclonedx-python

        Container config: /var, $DOCKER_HOST, Podman, Docker, $KUBECONFIG defaults to ~/.kube/config (kube config view), Podman rootless containers

        Re: vm live migration, memory forensics, and diff'ing whole servers:

        Live migration and replication solutions already have tested bit-level ~diffing that would also be useful to compare total machine state between 2 or more instances. At >2 nodes, what's anomalous? And how and why do the costs of convergence-based configuration management differ from golden image -based configuration management?

        E.g. vmdiff diffs VMs. The README says it only diffs RAM on Windows. E.g. AVML and linpmem and volatility3 work with Linux.

        /? volatility avml inurl:awesome https://www.google.com/search?q=volatiloty+avml+inurl%3Aawes...

  • tecoholic3 days ago
    Very cool idea and kudos for building and making the idea into a reality.
  • bityard3 days ago
    A question I didn't see answered on the Web site or in the comments... How does it determine what is "state"? Packages are easy, you just get a list of those with the package manager. I guess systemd lists services. But what about everything else? Is it just walking the whole file system and checking every file it finds to see if a package owns it? What about files and symlinks created by postinst scripts? Does it have special "knowledge" about certain services like Apache which have their own Ansible modules?

    I don't know if this touches networking or not but I've always deliberately avoided configuring (most) networking on Ansible after having shot myself in the foot too many times.

    I like this in theory and will give it a shot but I'm wary of getting bled out by all the sharp corner cases...

    • _mig52 days ago
      Thanks for the comment and questions! Very wise.

      Let me break it down as to what harvest does:

      1) Detects the OS and its package backend (e.g dpkg vs rpm etc)

      2) Detects what packages are installed

      3) For each package, it tries to detect files in /etc/ that have been modified from the default that get shipped with the package . It does't walk the whole filesystem, it looks straight in /etc for stuff here.

      4) It detects running/enabled services and timers via systemd. For each of these, it looks for the unit files, any 'drop-in' files, environment variable files, etc, as well as what executable it executes, and tries to map those systemd services to the packages it's already learned about earlier (that way, those 'packages' or future Ansible roles, can also be associated with 'handlers' in Ansible, to handle restart of the services if/when the configs change)

      5) Aside from known packages already learned, it optimistically tries to capture extra system configuration in /etc that is common for config management. This is stuff like crons, logrotate configs, networking settings (as you noted!), hosts files, etc.

      6) It also looks for other snowflake stuff in /etc not associated with packages/services or other typical system config, and will put these into an etc_custom role

      7) Likewise, it looks in /usr/local for stuff, on the assumption that this is an area that custom apps/configs might've been placed in. These go into a usr_local_custom role.

      8) It captures non-system user accounts, their group memberships and their .ssh/authorized_keys

      9) takes into account anything the user set with --exclude-path or --include-path . For anything extra that is included, it will put these into an 'extra_paths' role. The location could be anywhere e.g something in /opt, /srv/ whatever you want.

      10) writes the state.json and captures the artifacts

      So yes, you're right - it does capture stuff that many people might want to exclude if they are going to use the manifests to build other machines from that harvest (as opposed to just rebuild the same machine itself).

      But you can use --exclude-path /etc/network and so on to skip the bits you don't want. You also can always comment out from the playbook.yml or delete certain roles it generates once you've run the 'enroll manifest'.

      It doesn't have any knowledge of Ansible Galaxy roles/modules etc. It generates all the roles itself. I admit, many of the existing roles out there are a lot more pleasant/easier to read (especially Jeff Geerling's). I still use those myself day to day. A lot of configs out there are also good candidates for being Jinja templates with abstracted vars for separate hosts. Enroll does use my companion tool JinjaTurtle if it's installed, but JinjaTurtle only recognises certain types of files (.ini style, .json, .xml, .yaml, .toml, but not special ones like Nginx or Apache conf files which have their own special syntax).

      I consider Enroll to be a good 'quick, grab it all, so I can sleep at night' method, perhaps best for DR purposes.

      In terms of safety measures: it doesn't traverse symlinks, and it has an 'IgnorePolicy' that makes it ignore most binary files (except GPG binary keys used with apt) - though if you specify certain paths with --include-path and use --dangerous, it will skip its own policy. See https://git.mig5.net/mig5/enroll/src/branch/main/enroll/igno... .

      It will skip files that are too large, and it also currently has a hardcoded cap of the number of files that it will harvest (4000 for /etc/ and /usr/local/etc and /usr/local/bin, and 500 per 'role'), to avoid 'bomb' situations.

      I think your caution is very warranted and wise, and I highly recommend to always use --check with Ansible when/if you get to applying the playbook!

      Thanks again.

  • poemxo3 days ago
    Can it do Oracle? That would be a gamechanger.
  • indigodaddy3 days ago
    Does the playbook generation have support for some totally custom/one-off application? (Eg, not just system/well-known stuff). If so, that would be insane!
    • _mig53 days ago
      It does! There are several sort of 'catch-alls' in place:

      1) stuff in /etc that doesn't belong to any obvious package, ends up in an 'etc_custom' role

      2) stuff in /usr/local ends up in a 'usr_local_custom' role

      3) Anything you include with --include will end up in a special 'extra_paths' role.

      Here's a demo (which is good, helped me spot a small bug, the role is included twice in the playbook :) I'll get that fixed!) https://asciinema.org/a/765385

      Thanks for your interest!

      • indigodaddy17 hours ago
        Also, enroll.sh could be VERY useful for vibe-coding. git tracking will only capture application-level (unless you are fully dockerizing the app), however, for example if you are done vibe-coding your app, point enroll.sh at the VM or whatever you are using (this is assuming you are vibe-coding to a Linux system/VM/instance with ssh available), and you can then capture both application and system level needs, and have an Ansible playbook that you can deploy anywhere at the end of it. Eg, I told the folks on exe.dev that enroll.sh would be very useful for a service like exe.dev.
        • _mig514 hours ago
          Cool tool, didn't know it existed! :) Thanks for passing on the word. 'Capture app and system stuff and deploy anywhere' is totally the goal :)
      • indigodaddy3 days ago
        Nuts, I'm going to have to try this out. Pretty sure nothing like this exists, at least not for Ansible (?). This would certainly help converting chef cookbooks (we have a ton of custom applications along with system stuff of course) to Ansible (I guess it's not really converting in this scenario, just scanning the host(s), super neat!). We are still using chef, and use Ansible for one-off jobs/playbooks/remediations etc, but would like to pivot to Ansible for config mgmt of everything for deployments at some point. This definitely looks useful in that effort.
  • xyst3 days ago
    poor man’s nixOS
    • yjftsjthsd-h3 days ago
      If NixOS was this easy to onboard, we'd have an easier time of it.

      - Sent from my NixOS daily-driver, which only cost me a small number of grey hairs