!VhzbGHamdfMiGxpXyg:robins.wtf

NixOS Incus and LXC

46 Members
lxc, lxd, incus discussions related to NixOS16 Servers

Load older messages


SenderMessageTime
4 Aug 2025
@adam:robins.wtfadamcstephensmy current flow is to run a script which bumps my dotfiles and infra repos, and push them to git. If all builds fine, then that night systems will update02:55:32
@hexa:lossy.networkhexahow will they update? can they self-evaluate?02:55:48
@adam:robins.wtfadamcstephensno, they realize the path and switch to it02:56:05
@hexa:lossy.networkhexauhhh, can you explain?02:56:22
@adam:robins.wtfadamcstephens I've been slowly building a deploy tool for a long time now. It can track store paths for deployment. After build and upload to attic, I post a store path to the service. Then a command in a timer checks the backend, and if there's a newer path will pull it down and switch to it. 02:59:10
@hexa:lossy.networkhexaah ok πŸ˜„ 02:59:38
@hexa:lossy.networkhexaso yeah, if it can just substitute the path and switch into it, that's bueno02:59:51
@adam:robins.wtfadamcstephensAt work we've implemented the same flow, but using S3 as the backend. Write a structured file to S3 that includes the store path.03:00:23
@hexa:lossy.networkhexado you run with fde?03:00:48
@adam:robins.wtfadamcstephensAt home, yes03:00:56
@hexa:lossy.networkhexahow do you deal with reboots?03:01:08
@hexa:lossy.networkhexahttps://log.pfad.fr/2025/fde-nixos-colmena-passwordless-reboot/ is something I was going to look into whenever I find the time πŸ˜„ 03:02:41
@adam:robins.wtfadamcstephensI was doing them manually and ssh in to initrd to unlock, but I switched to TPM unlock recently. Less security, but more convenient and means I'm not in the critical path to boot a system.03:02:55
@adam:robins.wtfadamcstephensmost of my "systems" are VMs though. so even manually every couple weeks for kernel updates wasn't too bad.03:04:08
@hexa:lossy.networkhexaall my boxes are encrypted, whether they're local or remote doesn't matter πŸ™‚ 03:04:31
@adam:robins.wtfadamcstephensyeah, i encrypt the physical drives03:04:47
@hexa:lossy.networkhexaso if efi boxes can have unattended reboots via kexec that would be a big deal03:05:25
@adam:robins.wtfadamcstephensseems worth a try03:05:52
@adam:robins.wtfadamcstephenswould be nice if you could provide a one-time key during a "known" reboot03:07:59
@hexa:lossy.networkhexaexactly03:09:05
@hexa:lossy.networkhexabut what I need is probably more like … check daily whether running and booted kernel mismatch and do the kexec dance03:09:44
@hexa:lossy.networkhexathat can use a persistent key to the luks volumes that is root-owned03:10:25
@hexa:lossy.networkhexa* that could use a persistent key to the luks volumes that is root-owned03:10:29
@hexa:lossy.networkhexaon lobsters someone wrote03:10:51
@hexa:lossy.networkhexa

When you’re root user, you can extract the unlocked LUKS main key from RAM and can use that to add a key.

03:10:52
@hexa:lossy.networkhexa😬03:11:02
@hexa:lossy.networkhexawondering how easy that is03:11:08
@adam:robins.wtfadamcstephens

By default, if systemd-boot is used and no kernel was loaded manually using kexec -l before, systemd will load the kernel specified in the default boot loader entry. For example, to reboot into the newer kernel after a system update, you may simply run:

03:11:34
@adam:robins.wtfadamcstephens so if you nixos-rebuild boot, i guess you can just run systemctl kexec 03:11:54
@hexa:lossy.networkhexalol03:12:14

Show newer messages


Back to Room ListRoom Version: 10