Colmena | 330 Members | |
| A simple, stateless NixOS deployment tool - https://github.com/zhaofengli/colmena | 116 Servers |
| Sender | Message | Time |
|---|---|---|
| 14 Oct 2022 | ||
But still from the serial console, can you try whether networking is working? Check ip , do some pings/traceroutes/etc | 19:51:16 | |
| 15 Oct 2022 | ||
| 11:36:35 | ||
| 16 Oct 2022 | ||
| colmena is breaking with lazy-trees nix:
| 12:39:27 | |
| I think this is an intentional breaking change on the Nix side | 12:39:38 | |
| oh right, this is only a problem with dirty trees though | 12:41:17 | |
| Right, need to take a look. There are some more breaking changes regarding
| 20:26:56 | |
| * Right, need to take a look. There are some more breaking changes regarding
| 20:27:12 | |
| * Right, need to take a look. There are some more breaking changes regarding
| 20:28:12 | |
| 18 Oct 2022 | ||
| 09:01:40 | ||
| Hey, How would you handle secrets? 🤔 | 09:01:57 | |
| Personally I have them checked into my deployment repo, encrypted with GPG, and use a little module to abstract over decrypting them | 09:02:55 | |
| https://gist.github.com/lheckemann/3f4f3ce05521f4ace32bddce0b66e189 | 09:03:16 | |
| I use https://github.com/serokell/vault-secrets, but other popular options are sops-nix (https://github.com/Mic92/sops-nix) and git-crypt (https://github.com/AGWA/git-crypt) | 09:03:58 | |
| then for example I have
| 09:04:34 | |
and it decrypts the secret from secrets/$hostname/loki-password.gpg and copies it over at deployment time | 09:05:05 | |
| Linux Hackerman: So I need the private gpg key on the machine right? :D | 09:05:44 | |
| the advantage of this approach is that the secrets can theoretically not get copied to the nix store (in practice they do, because I use Flakes) | 09:05:53 | |
| Shyim: only on the machine from which you're deploying | 09:06:01 | |
| AHHH. cool | 09:06:43 | |
| but I think I'll be switching to agenix or sops-nix at some point in the future, partly because this approach is colmena-specific and I'm not sure I want to stick with colmena | 09:06:57 | |
| and partly because the secrets are persisted unencrypted on the target machines' disks, which I'd also prefer not to do | 09:07:26 | |
| I currently join ssh and just do nixos-rebuild so. tbh: I don't care if it's in nix store. I just don't want to have them on Github publicly accessible as my nix files are public :D | 09:08:14 | |
| both agenix and sops-nix copy the encrypted secrets to the store as part of the system closure, and they're encrypted to a key that lies on the machine (often the SSH host key) to be decrypted only to a ramfs at runtime | 09:08:37 | |
| then again, having both the encrypted secrets and the unencrypted SSH host key on disk isn't much different from having the unencrypted secrets on disk I guess | 09:09:27 | |
| the next-level thing would be to add a TPM and measured boot into the setup, but I'm nowhere near getting there lol | 09:10:05 | |
In reply to @linus:schreibt.jetztthe various permissions on the file also matter, the nix store is world readable but the ssh host key probably isnt | 09:10:16 | |
| right, but none of these approaches make the unencrypted secrets world-readable | 09:10:36 | |
| that's definitely off the table for me ^^ | 09:10:56 | |
| My setup with a hashicorp vault is probably overkill, but when set up it does work quite nicely I have to say | 09:11:40 | |
| I kind of want to have something like that but I also don't want to set it up and maintain it x) | 09:12:05 | |