NixOS AWS | 64 Members | |
| 16 Servers |
| Sender | Message | Time |
|---|---|---|
| 22 Oct 2024 | ||
| * Ah, the version can actually be overriden by the caller:
https://github.com/boto/boto/blob/8fac1878734c5ac085b781f619c70ea4b6e913c3/boto/ec2/connection.py#L86 So nixops can easily use it without having to modify It calls | 01:29:54 | |
| Looking for Indeed this has the desired effect on that function:
| 01:44:12 | |
| * Looking for Indeed setting this environment variable this has the desired effect on that function:
| 01:44:31 | |
| Arian: It worked, the machine deployed. Thanks a lot for your help! https://github.com/benaco/nixops/commit/de0b958b37030c4b4b78e3e69908ad0700d6ae57 | 02:44:06 | |
| 23 Oct 2024 | ||
| Met with EIC today, apparently they already have a Go re-implementation of the AuthorizedKeysCommand Bash scripts specifically for macOS. It's just closed source still and they haven't expanded it to cover Linux and Windows. They'll need to evaluate the differences between my implementation and theirs to figure out what to do next. No expected date though. | 01:15:13 | |
| Fixed the implementation to do the signature checking for EIC stuff. I'll leave it up to EIC's eval on whether they want to keep the EC2 Key Pair stuff (since that's vulnerable to MITM). | 05:06:13 | |
| That Since that's signed by an EIC signer cert which rolls all the way up to an Amazon CA, it's protected from spoofing. | 05:09:02 | |
| * That Since that's signed by an EIC signer cert which rolls all the way up to an Amazon root cert, it's protected from spoofing. | 05:09:37 | |
| 09:49:18 | ||
| 25 Oct 2024 | ||
| 03:54:55 | ||
| 12:51:26 | ||
| 13:58:52 | ||
| 13:59:32 | ||
| 26 Oct 2024 | ||
| 09:49:21 | ||
| 27 Oct 2024 | ||
| there is EIC support for MacOS? | 13:25:01 | |
| Arian: 👋 Is your nixcon slidedeck up somewhere? | 13:36:29 | |
| https://arianvp.github.io/nixcon2024/slides/reveal.js-master/ | 13:43:10 | |
| added the link to pretalx as well | 13:44:42 | |
In reply to @arianvp:matrix.orgthx! | 13:50:55 | |
| Do you have any strategy for rolling back stateful services, if the activation fails for a new config? | 13:55:30 | |
| Currently not. We manually rollback the instances through grub. But I want to look at automatic boot assessement features that were added to NixOS recently to automate this | 14:32:02 | |
| e.g. reboot into previous boot entry if health check fails | 14:32:10 | |
| 16:24:21 | ||
| There is apparently. | 17:40:23 | |
| https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-connect-set-up.html
| 17:41:15 | |
There should be nothing stopping them for Windows as well since OpenSSH supports Windows. My re-implementation should support it (can generate the AuthorizedKeysCommand exec as a .exe) | 18:55:37 | |
* There should be nothing stopping them for Windows as well since OpenSSH supports Windows. My re-implementation should support it (can generate the AuthorizedKeysCommand exec as a .exe and I'm only using the Go crypto library) | 18:55:47 | |
* There should be nothing stopping them for Windows as well since OpenSSH supports Windows. My re-implementation supports it (can generate the AuthorizedKeysCommand exec as a .exe and I'm only using the Go crypto library) | 18:56:02 | |
| 28 Oct 2024 | ||
| 09:52:06 | ||
| https://www.youtube.com/watch?v=0yb05mq9lLM is basically my whole talk in 2 minutes . | 10:18:28 | |