!VhzbGHamdfMiGxpXyg:robins.wtf

NixOS LXC

33 Members
lxc, lxd, incus discussions related to NixOS14 Servers

Load older messages


SenderMessageTime
20 Feb 2024
@adam:robins.wtfadamcstephens Then for now just another image with it enabled is good enough  22:41:47
@adam:robins.wtfadamcstephens * Then for now just another image with systemd init enabled is good enough  22:42:01
@mkg20001:mkg20001.iomkg20001added test22:44:47
23 Feb 2024
@adam:robins.wtfadamcstephenshttps://github.com/NixOS/nixpkgs/pull/29057001:53:41
@adam:robins.wtfadamcstephensAny thoughts on forcing people to use nftables with incus?19:15:30
@hexa:lossy.networkhexaeven the nixos firewall uses nft these adys19:19:19
@hexa:lossy.networkhexa * even the nixos firewall uses nft these days19:19:21
@hexa:lossy.networkhexaand what does forcing even mean19:19:30
@hexa:lossy.networkhexa everyone can lib.mkForce whatever they want 19:19:43
@adam:robins.wtfadamcstephens (networking.firewall.enable && !networking.nftables.enable) && virtualisation.incus.enable 19:25:38
@adam:robins.wtfadamcstephensthrow an error if that evaluates to true19:25:52
@adam:robins.wtfadamcstephens * networking.firewall.enable && !networking.nftables.enable && virtualisation.incus.enable 19:25:58
@adam:robins.wtfadamcstephensis that too aggressive of a change? :)19:28:49
@hexa:lossy.networkhexawhat would be the motivation?19:30:39
@adam:robins.wtfadamcstephensincus manages its own firewall rules, and it's easier to support a single integration19:39:05
@adam:robins.wtfadamcstephensthe motivation comes from at least one user who switching to nftables just fixed the issue https://github.com/lxc/incus/issues/52519:39:38
@adam:robins.wtfadamcstephensspecifically this comment: https://github.com/lxc/incus/issues/525#issuecomment-196186206019:40:22
@adam:robins.wtfadamcstephens(there are two users for some reason in this issue)19:40:30
@hexa:lossy.networkhexayeah, then just assert with a link to documentation, why this has become necessary maybe19:40:35
@adam:robins.wtfadamcstephensif you're curious, here's an nftable dump from my test machine https://paste.sr.ht/~adamcstephens/28d559730979803b0b1372e200d1013c1a783a4f19:42:19
24 Feb 2024
@mkg20001:mkg20001.iomkg20001myself i just add all the interfaces to trustedInterfaces and that fixes that03:52:51
@mkg20001:mkg20001.iomkg20001we could have a named set in nftables and patch incus to append its own interfaces to that03:53:24
@mkg20001:mkg20001.iomkg20001basically adding trusted interfaces at runtime03:53:39
@adam:robins.wtfadamcstephens the incus table you can see in my paste should cover what using trustedInterfaces does. namely allow dnsmasq requests from incus networks. 04:29:42
@adam:robins.wtfadamcstephensthe multiple table model of nftables makes the firewall rules much cleaner, and allows for better integration with other components that modify firewalls. e.g. docker.04:32:11
@adam:robins.wtfadamcstephens https://github.com/NixOS/nixpkgs/pull/290959 13:09:05
@adam:robins.wtfadamcstephens I went ahead and added stgrabers video release notes 😁 13:09:29
@mkg20001:mkg20001.iomkg20001ah i missed the ! in the assertion14:36:00
25 Feb 2024
@steveej0:matrix.orgsteveejhas anyone here tried integration with nomad and the lxc driver? i'm also interested in any other attempt to reuse the nixos modules to define services on nomad17:09:52
26 Feb 2024
@adam:robins.wtfadamcstephensi've not seen anything like that00:43:22

Show newer messages


Back to Room ListRoom Version: 10