!atvIbxHoEqNcAIxYpN:nixos.org

NixOS AWS

61 Members
15 Servers

You have reached the beginning of time (for this room).


SenderMessageTime
4 Apr 2025
@phale:matrix.orgPhil Hale joined the room.17:18:39
11 Apr 2025
@arianvp:matrix.orgArian @commiterate:matrix.org: seems Amazon started shipping the go binary of EC2 instance connect to Linux as well 11:18:15
@arianvp:matrix.orgArianBut I can't find the source anywhere. Which is weird. As Amazon linux is supposed to be open source11:18:27
@commiterate:matrix.orgcommiterateit's probably stuck in the open source review process18:52:40
@commiterate:matrix.orgcommiteratemy guess is they got security approval and Amazon Linux approval, but the internal open source review board (OSRB) hasn't gotten around to approving yet so they just decided to ship19:02:59
12 Apr 2025
@commiterate:matrix.orgcommiterateI'm kind of afraid what the code is going to look like though18:50:02
@arianvp:matrix.orgArian💀19:30:43
@arianvp:matrix.orgArianWe can decompile the binary for funzies19:30:54
13 Apr 2025
@commiterate:matrix.orgcommiterateit's giving some motivation to set up testing + publishing automation for my rewrite02:32:02
@commiterate:matrix.orgcommiterateespecially now that I've figured out how to use EC2 Image Builder with Nix + system-manager or nix-darwin to do reproducible AMI baking (in this case it's just for testing the binary)02:32:49
@commiterate:matrix.orgcommiteratejust updated the repo to put the general bits in place, rest is just execution02:33:51
@arianvp:matrix.orgArianI just killed our last MacOS instance on ec209:58:34
@arianvp:matrix.orgArianDecided that dealing with MacOS in EC2 is not worth my time09:58:45
@arianvp:matrix.orgArianEspecially with how it interacts with nix (can't install nix on the ebs volume without clicking buttons in the UI)09:59:05
@commiterate:matrix.orgcommiterateit's pretty much unusable, though most of the blame is on Apple's EULA and TCC/FDA19:54:22
28 Apr 2025
@notmycommit:notwork.indbalanHey y'all not sure if this is documented somewhere, whats the reason AWS AMIs does not install aws cli by default? Is the expectation that we should bring it in with userdata?11:05:20
@arianvp:matrix.orgArian It’s not part of the amazon-image.nix profile. We could add it if you want? but yeh usually people just reconfigure their NixOS machines through user-data after boot 11:23:15
@arianvp:matrix.orgArianwhy do you need it?11:23:25
@notmycommit:notwork.indbalan Our scripts do some s3 gets / aws ssm get-parmeters etc to assemble the final nix config. We do have workaround for this to wrap the execution in nix-env. But IMO awscli seems quite useful on an amazon AMI. 11:31:24
@notmycommit:notwork.indbalan

Another option would be to look for nix-shell shebang, like

       #! /usr/bin/env nix-shell
       #! nix-shell -i runghc --packages 'haskellPackages.ghcWithPackages (ps: [ps.download-curl ps.tagsoup])'

in the init script where we determine the type in amazon-init.nix and run it with nix-shell instead of ${pkgs.runtimeShell}

11:51:29
@arianvp:matrix.orgArianwe download a closure and nixos-rebuild switch into ti11:57:01
@arianvp:matrix.orgArianwhy would you want to run imperative scripts if you can just deploy a new NixOS build with the script you want to run? Sounds more robust :D11:58:04
@notmycommit:notwork.indbalanHaha -- we use imperative secrets to assemble a nix config that we can switch to (mostly secrets and some other foo). But this is definitely not a blocker for us or anything.11:59:41
@arianvp:matrix.orgArian That sounds terrible :D 12:00:14

Show newer messages


Back to Room ListRoom Version: 10