!UKDpaKNNsBpOPfLWfX:zhaofeng.li

Colmena

306 Members
A simple, stateless NixOS deployment tool - https://github.com/zhaofengli/colmena105 Servers

Load older messages


SenderMessageTime
9 Jun 2022
@shine:proqqul.netTaeer Bar-Yam Oh. Hm... I'm still having the same behaviour (nothing being produced with --keep-result) 18:47:14
@zhaofeng:zhaofeng.liZhaofeng Li Hmm, it does create them for me with colmena build 18:56:13
@shine:proqqul.netTaeer Bar-YamAha! It works when using flakes, but not without18:57:48
@shine:proqqul.netTaeer Bar-Yampresumably it doesn't know how to find the hive directory in a non-flake build18:58:03
@zhaofeng:zhaofeng.liZhaofeng LiWeird, it should be able to create GC roots with non-flakes (actually we are only testing it in the non-flake path in the end-to-end tests)19:00:28
@zhaofeng:zhaofeng.liZhaofeng LiJust tried and it does work in the non-flakes case19:01:47
@shine:proqqul.netTaeer Bar-Yamoh never mind, I see it now.19:09:28
@shine:proqqul.netTaeer Bar-YamI think i might have just been looking in the wrong place19:09:37
@shine:proqqul.netTaeer Bar-Yamanyway, this works great. thank you :)19:22:21
10 Jun 2022
@lblasc:znode.netlblasc joined the room.08:54:46
18 Jun 2022
@blaggacao:matrix.orgDavid Arnold (blaggacao)

Hey Zhaofeng Li: would you be willing to consider https://github.com/zhaofengli/colmena/pull/89?

I wanted to continue hacking along on my colmena adoption, but I feel like a tightrope walker without security if I need to deviate too much from upstream.

I think I'm just not ready yet for forking, so I'd appreciate if I can build on those building blocks.

02:10:55
@blaggacao:matrix.orgDavid Arnold (blaggacao)* Hey Zhaofeng Li: would you be willing to consider https://github.com/zhaofengli/colmena/pull/89? I wanted to continue hacking along on my colmena adoption, but I feel like a tightrope walker without security if I need to deviate too much from upstream. I think I'm just not ready yet for fully forking, so I'd appreciate if I can build on those building blocks.02:11:12
@blaggacao:matrix.orgDavid Arnold (blaggacao)* Hey Zhaofeng Li: would you be willing to consider https://github.com/zhaofengli/colmena/pull/89? I wanted to continue hacking along on my colmena adoption, but I feel like a tightrope walker without security if I need to deviate too much from upstream. I think I'm just not ready yet for fully forking, so I'd appreciate if I could build on those building blocks.02:11:26
@blaggacao:matrix.orgDavid Arnold (blaggacao)* Hey Zhaofeng Li: would you be willing to consider https://github.com/zhaofengli/colmena/pull/89? I wanted to continue hacking along on my colmena adoption, but I feel like a tightrope walker without security if I need to deviate too much from upstream.02:11:56
@atharvaamritkar:matrix.orgwiredhikari joined the room.10:03:38
19 Jun 2022
@zhaofeng:zhaofeng.liZhaofeng Li
In reply to @blaggacao:matrix.org

Hey Zhaofeng Li: would you be willing to consider https://github.com/zhaofengli/colmena/pull/89?

I wanted to continue hacking along on my colmena adoption, but I feel like a tightrope walker without security if I need to deviate too much from upstream.

Hi sorry, been busy in the past couple of days. Minimizing the eval interface should be fine and I'll review and merge it today.
20:09:17
@zhaofeng:zhaofeng.liZhaofeng LiNote that the eval interface is still subject to change in the near future, like for the upcoming auto rollback feature as well as https://github.com/zhaofengli/colmena/pull/9620:09:18
@blaggacao:matrix.orgDavid Arnold (blaggacao) Since using deploy-rs, I never used the auto-rollback feature. But this is probably less a fault of the rollback fearure amd more of the systemd-mediated choreographed (not orchestrated) reconciliation loop. 20:49:17
@blaggacao:matrix.orgDavid Arnold (blaggacao)(i'm alluding at the choreography vs orchestration discussion, here)20:50:28
21 Jun 2022
@huyage:matrix.orglemmalamma joined the room.00:04:54
@huyage:matrix.orglemmalamma

(New to Colmena and just Nix in general).

How do y'all deal with bootstrapping secrets in a Colmena deployment. For example, I have a secret key that I don't want to keep in repo. So every time a developer clones the colmena nix code they would have to get the secret key and create the file on their local machine.

I want to split my colmena deploymeny into 2 parts:

  1. Bootstrapping secrets. Should only be done by very few people who have access to the secrets.
  2. Any other configuration that can be run by anyone and CI.

Does this make sense to do?

00:24:45
@huyage:matrix.orglemmalamma *

(New to Colmena and just Nix in general).

How do y'all deal with bootstrapping secrets in a Colmena deployment. For example, I have a secret key that I don't want to keep in repo. So every time a developer clones the colmena nix code they would have to get the secret key and create the file on their local machine.

I want to split my colmena deploymeny into 2 parts:

  1. Bootstrapping secrets. Should only be done by very few people who have access to the secrets.
  2. Any other configuration that can be run by anyone and CI. They should be able to colmena apply without getting secret keys from somewhere else manually.

Does this make sense to do?

00:25:36
@linus:schreibt.jetztLinux Hackerman lemmalamma: colmena stores the secrets unencrypted on the target hosts, so these "unauthorised" users can still fairly trivially get the secret keys by deploying their own code to the machines. 01:03:55
@linus:schreibt.jetztLinux Hackermanyou also don't need to split it into two, since colmena supports using a command to get secrets -- so you can store them together with your deployment, encrypted (with a tool of your choice) to the authorised users.01:05:11
@huyage:matrix.orglemmalamma
In reply to @linus:schreibt.jetzt
lemmalamma: colmena stores the secrets unencrypted on the target hosts, so these "unauthorised" users can still fairly trivially get the secret keys by deploying their own code to the machines.
This part makes sense. I don't want to enforce access control here. I just want developers who work on infrastructure code's lives easier by not requiring them to set up local secrets manually every time.
01:07:15
@huyage:matrix.orglemmalamma
In reply to @linus:schreibt.jetzt
you also don't need to split it into two, since colmena supports using a command to get secrets -- so you can store them together with your deployment, encrypted (with a tool of your choice) to the authorised users.
What common tools are there?
01:07:32
@linus:schreibt.jetztLinux Hackermangpg and age are the two main contenders I'd say01:07:44
@linus:schreibt.jetztLinux Hackermangpg optionally wrapped with pass01:08:04
@linus:schreibt.jetztLinux Hackermanthere's also sops and sops-nix, but I know too little about it to say if it applies here or not01:08:48
@linus:schreibt.jetztLinux Hackermanit's definitely on my list of things to look into one day, because it seems like it can do some nice things01:09:15

Show newer messages


Back to Room ListRoom Version: 6