!UKDpaKNNsBpOPfLWfX:zhaofeng.li

Colmena

331 Members
A simple, stateless NixOS deployment tool - https://github.com/zhaofengli/colmena116 Servers

Load older messages


SenderMessageTime
14 Oct 2022
@zhaofeng:zhaofeng.liZhaofeng Li
In reply to @ronixx:matrix.org

able to connect shell via Oracle Cloud Shell but direct ssh is not working

and websites are hosted on server also showing down but containers are running fine

You need to see what's going on via the serial console. Try looking at the network configs, firewall, and stuff.
02:35:31
@ronixx:matrix.orgroshan | byteio.in 🌷this is my config https://yaso.su/UDwGxzpq03:54:42
@ronixx:matrix.orgroshan | byteio.in 🌷i have open ports from Oracle Account for instance.03:55:10
@ronixx:matrix.orgroshan | byteio.in 🌷image.png
Download image.png
03:55:29
@ronixx:matrix.orgroshan | byteio.in 🌷Ports are also showing opened in Serial Console03:56:45
@zhaofeng:zhaofeng.liZhaofeng Li Remove boot.isContainer = true; (it's not a container) and include oci-common.nix from this PR 19:50:19
@zhaofeng:zhaofeng.liZhaofeng Li But still from the serial console, can you try whether networking is working? Check ip , do some pings/traceroutes/etc 19:51:16
15 Oct 2022
@otaviosalvador:matrix.orgOtavio Salvador joined the room.11:36:35
16 Oct 2022
@linus:schreibt.jetztLinux Hackerman

colmena is breaking with lazy-trees nix:

colmena apply --on sol boot
warning: unknown setting 'structured-drv-logs'
warning: Git tree '/home/linus/deploy' is dirty
[INFO ] Using flake: git+file:///home/linus/deploy
warning: unknown setting 'structured-drv-logs'
warning: Git tree '/home/linus/deploy' is dirty
warning: will not write lock file of flake 'path:/tmp/nix-shell.NZrVap/colmena-assets-A0gZ3E' because it has an unlocked input ('git+file:///home/linus/deploy')
[INFO ] Enumerating nodes...
warning: unknown setting 'structured-drv-logs'
error: cannot call 'getFlake' on unlocked flake reference 'path:/tmp/nix-shell.NZrVap/colmena-assets-A0gZ3E', at «string»:1:29 (use --impure to override)
[ERROR] -----
[ERROR] Operation failed with error: Child process exited with error code: 1
12:39:27
@linus:schreibt.jetztLinux HackermanI think this is an intentional breaking change on the Nix side12:39:38
@linus:schreibt.jetztLinux Hackermanoh right, this is only a problem with dirty trees though12:41:17
@zhaofeng:zhaofeng.liZhaofeng Li

Right, need to take a look. There are some more breaking changes regarding path: flakes that I noticed:

$ nix flake metadata --json
warning: Git tree '/home/zhaofeng/Git/fleet' is dirty
error: lock file contains unlocked input '{"lastModified":1665862219,"narHash":"sha256-VPPLMapU8HtCjb54WDKsnjTjyB3YYXkgxEtzf5Xyqx0=","type":"git","url":"file:///home/zhaofeng/Git/Jovian-NixOS"}'
(use '--show-trace' to show detailed location information)
20:26:56
@zhaofeng:zhaofeng.liZhaofeng Li *

Right, need to take a look. There are some more breaking changes regarding path: flakes that I noticed with lazy-trees:

$ nix flake metadata --json
warning: Git tree '/home/zhaofeng/Git/fleet' is dirty
error: lock file contains unlocked input '{"lastModified":1665862219,"narHash":"sha256-VPPLMapU8HtCjb54WDKsnjTjyB3YYXkgxEtzf5Xyqx0=","type":"git","url":"file:///home/zhaofeng/Git/Jovian-NixOS"}'
(use '--show-trace' to show detailed location information)
20:27:12
@zhaofeng:zhaofeng.liZhaofeng Li *

Right, need to take a look. There are some more breaking changes regarding git+file:// flakes that I noticed with lazy-trees:

$ nix flake metadata --json
warning: Git tree '/home/zhaofeng/Git/fleet' is dirty
error: lock file contains unlocked input '{"lastModified":1665862219,"narHash":"sha256-VPPLMapU8HtCjb54WDKsnjTjyB3YYXkgxEtzf5Xyqx0=","type":"git","url":"file:///home/zhaofeng/Git/Jovian-NixOS"}'
(use '--show-trace' to show detailed location information)
20:28:12
18 Oct 2022
@shyim:matrix.orgShyim joined the room.09:01:40
@shyim:matrix.orgShyimHey, How would you handle secrets? 🤔09:01:57
@linus:schreibt.jetztLinux HackermanPersonally I have them checked into my deployment repo, encrypted with GPG, and use a little module to abstract over decrypting them09:02:55
@linus:schreibt.jetztLinux Hackermanhttps://gist.github.com/lheckemann/3f4f3ce05521f4ace32bddce0b66e18909:03:16
@v:meowy.tech@v:meowy.techI use https://github.com/serokell/vault-secrets, but other popular options are sops-nix (https://github.com/Mic92/sops-nix) and git-crypt (https://github.com/AGWA/git-crypt)09:03:58
@linus:schreibt.jetztLinux Hackerman

then for example I have

secrets.loki-password.user = "promtail";
services.promtail.configuration.clients = [ { ...; password_file = config.secrets.loki-password.path; } ];
09:04:34
@linus:schreibt.jetztLinux Hackerman and it decrypts the secret from secrets/$hostname/loki-password.gpg and copies it over at deployment time 09:05:05
@shyim:matrix.orgShyim Linux Hackerman: So I need the private gpg key on the machine right? :D 09:05:44
@linus:schreibt.jetztLinux Hackermanthe advantage of this approach is that the secrets can theoretically not get copied to the nix store (in practice they do, because I use Flakes)09:05:53
@linus:schreibt.jetztLinux Hackerman Shyim: only on the machine from which you're deploying 09:06:01
@shyim:matrix.orgShyimAHHH. cool09:06:43
@linus:schreibt.jetztLinux Hackermanbut I think I'll be switching to agenix or sops-nix at some point in the future, partly because this approach is colmena-specific and I'm not sure I want to stick with colmena09:06:57
@linus:schreibt.jetztLinux Hackermanand partly because the secrets are persisted unencrypted on the target machines' disks, which I'd also prefer not to do09:07:26
@shyim:matrix.orgShyimI currently join ssh and just do nixos-rebuild so. tbh: I don't care if it's in nix store. I just don't want to have them on Github publicly accessible as my nix files are public :D 09:08:14
@linus:schreibt.jetztLinux Hackermanboth agenix and sops-nix copy the encrypted secrets to the store as part of the system closure, and they're encrypted to a key that lies on the machine (often the SSH host key) to be decrypted only to a ramfs at runtime09:08:37
@linus:schreibt.jetztLinux Hackermanthen again, having both the encrypted secrets and the unencrypted SSH host key on disk isn't much different from having the unencrypted secrets on disk I guess09:09:27

Show newer messages


Back to Room ListRoom Version: 6