| 19 Aug 2021 |
gdamjan | one of my TODO items is to add a generic make-portable-service function to Nix, similar to the ones that build docker images etc. | 17:38:33 |
gdamjan | I'm hosting this image on Ubuntu currently, and works fine for a while | 17:39:27 |
gdamjan | I'm also trying to make a nextcloud portable service in similar vain, but I didn't have time to investigate and fix the issues | 17:40:18 |
andi- | nice! This looks straight forward | 18:01:43 |
andi- | I wonder why not more software vendors just ship their stuff like that instead of writing weird (broken) install scripts and defunct systemd units.. | 18:02:10 |
andi- | I do wonder if we can pass a folder as RootImage and why we wouldn't do that for most system units. | 18:13:08 |
andi- | That would give us most of the (usually manually added) isolation features for free and we would finally have to opt-in for state. | 18:13:30 |
Arian | There is RootDirectory= | 18:14:22 |
gdamjan | andi-: for a portable service? | 18:15:09 |
andi- | Yes | 18:15:20 |
gdamjan | andi-: portablectl already adds RootImage=/var/lib/portables/tt-rss_v2021-06-28.raw | 18:15:41 |
gdamjan | ah you want a directory, not an image | 18:16:14 |
andi- | I am thinking: why all the manual confinement code that we have if there is that. E.g. if I point it at /nix/store/....-nginx that contains the minimal required dirs | 18:16:24 |
andi- | And then tmpfiles + bindmount + state dir/logdir/... | 18:16:45 |
aanderse | andi-: sounds like some fun experiments | 22:51:16 |
| 20 Aug 2021 |
andi- | Running my systems on v249 now. Can't say things are any different than before. | 09:00:54 |
princemachiavelli | Looking forward to v249, hopefully systemd-cryptenroll makes TPM unlocking LUKs drives a bit simpler. | 16:20:40 |
| 21 Aug 2021 |
andi- | That will still require some work. I haven't actually looked at any of the new features. It is already enough to try to keep things running. | 11:42:39 |
andi- | That being said I also have a few local patches around resolved and enabling DNS-over-TLS etc.. | 11:43:07 |
andi- | things we just don't allow right now | 11:43:13 |
Arian | Yeh TPM won't work yet. We haven't enabled it in the default config. For TPM root partitions we need systemd-initrd. Which we don't have yet | 12:00:13 |
Arian | So you could only use it to mount secondary partitions | 12:00:23 |
andi- | what do you mean with TPM root partitions? | 12:10:15 |
andi- | FWIW there is currently an open PR that adds TPM luks decryption to NixOS. I haven't looked in detail but that should work for root partitions. | 12:11:14 |
Arian | As in. If you want to unlock your root partitions with the systemd-cryptenroll stuff you need systemd in initrd | 12:23:01 |
andi- | I would be thinking about this systemd tpm integration more positively if they wouldn't use those weird user space bindings... | 13:08:45 |
Arian | What do you mean? | 13:18:01 |
Arian | Tpm2-tss? | 13:18:08 |
andi- | yeah | 13:20:07 |
andi- | supposedly the code is mostly generated from the spec yet it feels a bit clunky and their approach to testing breaks if run on ZFS for random reasons... | 13:21:46 |