!UKDpaKNNsBpOPfLWfX:zhaofeng.li

Colmena

331 Members
A simple, stateless NixOS deployment tool - https://github.com/zhaofengli/colmena117 Servers

Load older messages


SenderMessageTime
3 Jun 2022
@tpw_rules:matrix.orgtpw_rules seems to be what system.name and system.nixos.label configuration options are for 04:13:41
@buckley310:matrix.orgBuckleynot sure, hasnt really come up04:15:28
@buckley310:matrix.orgBuckleyoutside of colmena, i believe networking.hostName sets the machine name, and you can set the nixosConfigurations.<xyz> to whatever you want04:17:09
@tpw_rules:matrix.orgtpw_rulesi guess it wouldn't in a network use case04:17:12
@tpw_rules:matrix.orgtpw_rulesthanks for the info though04:19:20
@linus:schreibt.jetztLinux HackermanLast I checked, colmena didn't actually set the host name and forgetting it resulted in all my hosts being called nixos x)07:28:54
@dantefromhell:matrix.orgdantefromhell
In reply to @buckley310:matrix.org
also, /dev/disk/by-id/ stays consistent across reinstalls

if you can use GPT partition table you can label each partition.
that allows me to generalize the nix expressions for partitions.

still working on automation of the partitioning itself.

11:19:41
@dantefromhell:matrix.orgdantefromhell
In reply to @buckley310:matrix.org
outside of colmena, i believe networking.hostName sets the machine name, and you can set the nixosConfigurations. to whatever you want
e.g. the hardware serial number...
11:21:59
6 Jun 2022
@kraem:ne.bul.aekraem changed their profile picture.14:48:10
@buckley310:matrix.orgBuckley When i try to use a targetUser other than root, i get errors pushing content to servers
error: cannot add path '/nix/store/phfygaw0iga0dkdgm7qcj2rhq49viwmj-foo' because it lacks a valid signature
should not privilegeEscalationCommand be used while pushing content, as well as activating it, or is there a reason for this?
16:08:42
@linus:schreibt.jetztLinux Hackerman Buckley: I guess it would work if the user were in Nix's trusted-users 22:48:47
@linus:schreibt.jetztLinux HackermanSo it's not strictly necessary22:49:08
@linus:schreibt.jetztLinux HackermanBut I don't know if that's why it was implemented this way, nor if it makes sense to do it that way22:49:40
@buckley310:matrix.orgBuckleyI’ll have a peek later, but I’m guessing colmena just uses the nix copy tool (which probably doesn’t support sudo). If I’m wrong and it’s a two line patch I’ll totally PR that :o23:00:00
7 Jun 2022
@cw:kernelpanic.cafeChinchilla WashingtonHow can I get more of the error log from colmena? I'm getting an 'insecure package' error and would like to trace down what's using this old ass version of nodejs04:54:20
@linus:schreibt.jetztLinux Hackerman
In reply to @cw:kernelpanic.cafe
How can I get more of the error log from colmena? I'm getting an 'insecure package' error and would like to trace down what's using this old ass version of nodejs
Pass -v
07:49:45
@linus:schreibt.jetztLinux Hackerman
In reply to @buckley310:matrix.org
I’ll have a peek later, but I’m guessing colmena just uses the nix copy tool (which probably doesn’t support sudo). If I’m wrong and it’s a two line patch I’ll totally PR that :o
Oh right, yeah, that's possible
07:50:28
@linus:schreibt.jetztLinux HackermanWhat's actually the point in not sshing in as root and using sudo instead? That's perplexed me for a while...07:52:29
@schnecfk:ruhr-uni-bochum.deCRTifiedOne point might be that sudo allows somewhat fine-grained restriction on executed commands07:53:07
@schnecfk:ruhr-uni-bochum.deCRTifiedAnd in a sense, it allows for crude 2FA (SSH with pubkey, sudo with pw)07:53:48
@schnecfk:ruhr-uni-bochum.deCRTified * One point might be that sudo allows somewhat fine-grained restriction on executed commands (But that requires you to know what you'll run)07:54:10
@schnecfk:ruhr-uni-bochum.deCRTified * One point might be that sudo allows somewhat fine-grained restriction on executed commands (But that requires you to know what you'll run - adding a shell is nonsense if you want this)07:54:20
@linus:schreibt.jetztLinux Hackerman
In reply to @schnecfk:ruhr-uni-bochum.de
One point might be that sudo allows somewhat fine-grained restriction on executed commands (But that requires you to know what you'll run)
But if you're running something you just copied over...
07:54:43
@linus:schreibt.jetztLinux Hackerman(Which is necessarily the case with a nixos configuration)07:55:22
@schnecfk:ruhr-uni-bochum.deCRTifiedTrue 🤔 08:22:37
@linus:schreibt.jetztLinux Hackerman
In reply to @schnecfk:ruhr-uni-bochum.de
And in a sense, it allows for crude 2FA (SSH with pubkey, sudo with pw)
Are people doing that?
08:49:23
@schnecfk:ruhr-uni-bochum.deCRTifiedI don't know, but I've seen that reason a few times (not limited to colmena), always with the advice to make root as inaccessible as possible09:11:53
8 Jun 2022
@whentze:matrix.orgWanja Hentze How do you folks feel about adding a --interactive or --confirm (actual name can be bikeshed) option to colmena that makes it prints the list of target hosts and asks you to confirm before proceeding? 16:56:51
9 Jun 2022
@zhaofeng:zhaofeng.liZhaofeng LiThat sounds like a reasonable feature to add03:42:09
@shine:proqqul.netTaeer Bar-Yam joined the room.13:25:40

Show newer messages


Back to Room ListRoom Version: 6