!UKDpaKNNsBpOPfLWfX:zhaofeng.li

Colmena

323 Members
A simple, stateless NixOS deployment tool - https://github.com/zhaofengli/colmena109 Servers

Load older messages


SenderMessageTime
14 Oct 2022
@ronixx:matrix.orgroshan | byteio.in 🌷this is my config https://yaso.su/UDwGxzpq03:54:42
@ronixx:matrix.orgroshan | byteio.in 🌷i have open ports from Oracle Account for instance.03:55:10
@ronixx:matrix.orgroshan | byteio.in 🌷image.png
Download image.png
03:55:29
@ronixx:matrix.orgroshan | byteio.in 🌷Ports are also showing opened in Serial Console03:56:45
@zhaofeng:zhaofeng.liZhaofeng Li Remove boot.isContainer = true; (it's not a container) and include oci-common.nix from this PR 19:50:19
@zhaofeng:zhaofeng.liZhaofeng Li But still from the serial console, can you try whether networking is working? Check ip , do some pings/traceroutes/etc 19:51:16
15 Oct 2022
@otaviosalvador:matrix.orgOtavio Salvador joined the room.11:36:35
16 Oct 2022
@linus:schreibt.jetztLinux Hackerman

colmena is breaking with lazy-trees nix:

colmena apply --on sol boot
warning: unknown setting 'structured-drv-logs'
warning: Git tree '/home/linus/deploy' is dirty
[INFO ] Using flake: git+file:///home/linus/deploy
warning: unknown setting 'structured-drv-logs'
warning: Git tree '/home/linus/deploy' is dirty
warning: will not write lock file of flake 'path:/tmp/nix-shell.NZrVap/colmena-assets-A0gZ3E' because it has an unlocked input ('git+file:///home/linus/deploy')
[INFO ] Enumerating nodes...
warning: unknown setting 'structured-drv-logs'
error: cannot call 'getFlake' on unlocked flake reference 'path:/tmp/nix-shell.NZrVap/colmena-assets-A0gZ3E', at «string»:1:29 (use --impure to override)
[ERROR] -----
[ERROR] Operation failed with error: Child process exited with error code: 1
12:39:27
@linus:schreibt.jetztLinux HackermanI think this is an intentional breaking change on the Nix side12:39:38
@linus:schreibt.jetztLinux Hackermanoh right, this is only a problem with dirty trees though12:41:17
@zhaofeng:zhaofeng.liZhaofeng Li

Right, need to take a look. There are some more breaking changes regarding path: flakes that I noticed:

$ nix flake metadata --json
warning: Git tree '/home/zhaofeng/Git/fleet' is dirty
error: lock file contains unlocked input '{"lastModified":1665862219,"narHash":"sha256-VPPLMapU8HtCjb54WDKsnjTjyB3YYXkgxEtzf5Xyqx0=","type":"git","url":"file:///home/zhaofeng/Git/Jovian-NixOS"}'
(use '--show-trace' to show detailed location information)
20:26:56
@zhaofeng:zhaofeng.liZhaofeng Li *

Right, need to take a look. There are some more breaking changes regarding path: flakes that I noticed with lazy-trees:

$ nix flake metadata --json
warning: Git tree '/home/zhaofeng/Git/fleet' is dirty
error: lock file contains unlocked input '{"lastModified":1665862219,"narHash":"sha256-VPPLMapU8HtCjb54WDKsnjTjyB3YYXkgxEtzf5Xyqx0=","type":"git","url":"file:///home/zhaofeng/Git/Jovian-NixOS"}'
(use '--show-trace' to show detailed location information)
20:27:12
@zhaofeng:zhaofeng.liZhaofeng Li *

Right, need to take a look. There are some more breaking changes regarding git+file:// flakes that I noticed with lazy-trees:

$ nix flake metadata --json
warning: Git tree '/home/zhaofeng/Git/fleet' is dirty
error: lock file contains unlocked input '{"lastModified":1665862219,"narHash":"sha256-VPPLMapU8HtCjb54WDKsnjTjyB3YYXkgxEtzf5Xyqx0=","type":"git","url":"file:///home/zhaofeng/Git/Jovian-NixOS"}'
(use '--show-trace' to show detailed location information)
20:28:12
18 Oct 2022
@shyim:matrix.orgShyim joined the room.09:01:40
@shyim:matrix.orgShyimHey, How would you handle secrets? 🤔09:01:57
@linus:schreibt.jetztLinux HackermanPersonally I have them checked into my deployment repo, encrypted with GPG, and use a little module to abstract over decrypting them09:02:55
@linus:schreibt.jetztLinux Hackermanhttps://gist.github.com/lheckemann/3f4f3ce05521f4ace32bddce0b66e18909:03:16
@v:meowy.tech@v:meowy.techI use https://github.com/serokell/vault-secrets, but other popular options are sops-nix (https://github.com/Mic92/sops-nix) and git-crypt (https://github.com/AGWA/git-crypt)09:03:58
@linus:schreibt.jetztLinux Hackerman

then for example I have

secrets.loki-password.user = "promtail";
services.promtail.configuration.clients = [ { ...; password_file = config.secrets.loki-password.path; } ];
09:04:34
@linus:schreibt.jetztLinux Hackerman and it decrypts the secret from secrets/$hostname/loki-password.gpg and copies it over at deployment time 09:05:05
@shyim:matrix.orgShyim Linux Hackerman: So I need the private gpg key on the machine right? :D 09:05:44
@linus:schreibt.jetztLinux Hackermanthe advantage of this approach is that the secrets can theoretically not get copied to the nix store (in practice they do, because I use Flakes)09:05:53
@linus:schreibt.jetztLinux Hackerman Shyim: only on the machine from which you're deploying 09:06:01
@shyim:matrix.orgShyimAHHH. cool09:06:43
@linus:schreibt.jetztLinux Hackermanbut I think I'll be switching to agenix or sops-nix at some point in the future, partly because this approach is colmena-specific and I'm not sure I want to stick with colmena09:06:57
@linus:schreibt.jetztLinux Hackermanand partly because the secrets are persisted unencrypted on the target machines' disks, which I'd also prefer not to do09:07:26
@shyim:matrix.orgShyimI currently join ssh and just do nixos-rebuild so. tbh: I don't care if it's in nix store. I just don't want to have them on Github publicly accessible as my nix files are public :D 09:08:14
@linus:schreibt.jetztLinux Hackermanboth agenix and sops-nix copy the encrypted secrets to the store as part of the system closure, and they're encrypted to a key that lies on the machine (often the SSH host key) to be decrypted only to a ramfs at runtime09:08:37
@linus:schreibt.jetztLinux Hackermanthen again, having both the encrypted secrets and the unencrypted SSH host key on disk isn't much different from having the unencrypted secrets on disk I guess09:09:27
@linus:schreibt.jetztLinux Hackermanthe next-level thing would be to add a TPM and measured boot into the setup, but I'm nowhere near getting there lol09:10:05

Show newer messages


Back to Room ListRoom Version: 6