!agkXCfUrgbadYlQXRj:kack.it

NixOS + TPMs

190 Members
52 Servers

Load older messages


SenderMessageTime
1 Jun 2022
@joerg:thalheim.ioMic92what do you usually use?13:39:53
@joerg:thalheim.ioMic92I have multi-region deployment so those normal iam methods wouldn't work13:40:25
@joerg:thalheim.ioMic92 Turns out I was also using vault_aws_auth_backend_role_tag wrong in terraform but it is also impossible to use because it creates dependency cycles between the ec2 instances I am trying to create. 14:04:43
@joerg:thalheim.ioMic92It also seems that nixos-vault-service cannot be used with aws ec2 auth. Once there are two services that require a secret. The second instance cannot authenticate because of nonce missmatches15:07:52
@grahamc:nixos.org@grahamc:nixos.orgthat is surprising, we use it for aws ec, auth16:59:24
@joerg:thalheim.ioMic92Check out this: https://github.com/DeterminateSystems/nixos-vault-service/issues/5817:19:40
@grahamc:nixos.org@grahamc:nixos.orghum...17:22:11
@joerg:thalheim.ioMic92It was definitly client nonce errors. I had to delete the old onces manually from vault17:22:43
@joerg:thalheim.ioMic92And I also saw the error messages17:22:56
@grahamc:nixos.org@grahamc:nixos.org oh we don't use config.type = "ec2"; because it isn't recommended anymore by hashicorp 17:23:03
@grahamc:nixos.org@grahamc:nixos.orgwe use the type iam17:23:07
@grahamc:nixos.org@grahamc:nixos.orgwe will document the incompatibility17:23:34
@joerg:thalheim.ioMic92Yeah, but iam is simply not usable if you have multiple regions17:23:45
@grahamc:nixos.org@grahamc:nixos.orgno?17:23:51
@grahamc:nixos.org@grahamc:nixos.orghow so?17:23:53
@joerg:thalheim.ioMic92because a role is tight to a single region17:23:57
@grahamc:nixos.org@grahamc:nixos.orgI don't think IAM roles are tied to a region17:24:20
@joerg:thalheim.ioMic92not iam roles17:25:07
@grahamc:nixos.org@grahamc:nixos.orgbut at any rate, it should work across regions without too much work17:25:16
@joerg:thalheim.ioMic92but roles you create in vault17:25:16
@joerg:thalheim.ioMic92I would need to hard code per region vault roles in my nixos modules17:25:39
@joerg:thalheim.ioMic92https://registry.terraform.io/providers/hashicorp/vault/latest/docs/resources/aws_auth_backend_role17:26:14
@joerg:thalheim.ioMic92 Because one needs to set inferred_aws_region 17:26:26
@grahamc:nixos.org@grahamc:nixos.orgah, right17:26:56
@grahamc:nixos.org@grahamc:nixos.orgyeah so we've created multiple one per region of course17:27:03
@grahamc:nixos.org@grahamc:nixos.orgbecause instance profile ARNs are per region I think17:27:24
@joerg:thalheim.ioMic92I really should just have used client certs.17:27:50
@joerg:thalheim.ioMic92This is causing some much trouble down the line17:27:59
@grahamc:nixos.org@grahamc:nixos.orgstill could :) but I've found the AWS methods very very worth it17:28:28
@grahamc:nixos.org@grahamc:nixos.orgbut our instances are all ephemeral, and that makes it easy17:28:45

Show newer messages


Back to Room ListRoom Version: 6