NixOS AWS | 64 Members | |
| 14 Servers |
| Sender | Message | Time |
|---|---|---|
| 28 Apr 2025 | ||
| Yup, We do this weird route more or less for avoiding storing secrets anywhere other than the instance. | 15:04:12 | |
| Secrets are in vault or aws depending on the layer and they get populated on first boot in the config | 15:04:57 | |
| I wrote a simple module that will pull a secret down with the CLI given an ARN and some permissions. Creates a basic dir in /run to avoid storing them on disk | 22:51:20 | |
| API is roughly what you get from agenix | 22:51:47 | |
| We do pull one secret during cloud-init, but otherwise try and keep it as simple as possible. Cloud init's main job is to discover the proper system store path, pull it, and switch to it, and a couple other imperative things about the system for PS1 and an env file. Our apps also now read their secrets directly on startup, so most secrets never get written outside memory. | 22:53:48 | |
In reply to @adam:robins.wtfDo you have this in a public repo somewhere? | 23:04:17 | |
| 29 Apr 2025 | ||
| No, it's all internal currently | 00:07:43 | |
| I'll try and remember to throw it in a gist at least | 01:30:26 | |
| It's a very simplistic module :) | 01:30:37 | |
| https://gist.github.com/adamcstephens/9f45c33fa02270f669f2cd164faafea7 | 14:21:37 | |
| 1 May 2025 | ||
| might be easier to write a systemd unit (e.g. oneshot + optional timer or ExecStartPre) which does the credential pull than relying on boot user scripts. Ideally the boot userscript just does a | 19:46:13 | |
| e.g. I'm using an ExecStartPre in a GitLab Runner systemd unit which fetches a GitLab Runner authn token from AWS Secrets Manager | 19:46:58 | |
| * might be easier to write a systemd unit (e.g. oneshot + optional timer or ExecStartPre) which does the credential pull ratherer than relying on boot user scripts. Ideally the boot userscript just does a | 19:55:12 | |
| * might be easier to write a systemd unit (e.g. oneshot + optional timer or ExecStartPre) which does the credential pull rather than relying on boot user scripts. Ideally the boot userscript just does a | 19:55:18 | |
| sure, but if you need a secret to access the flake URL then you have to bootstrap somehow :) | 20:10:34 | |
| made me realize i accidentally dropped the service from the above gist when redacting it. updated. | 20:36:15 | |
| 3 May 2025 | ||
| 𤌠forgot about private flakes, my company still uses a network trust model instead of zero trust so just being in the right VPC is enough | 19:29:57 | |
| 4 May 2025 | ||
| Donât do nix eval on your hosts! just pull nix store paths! | 09:04:38 | |
| We put the nix store path in the user-data at work and then reboot into the new config | 09:05:08 | |
| so our hosts only need to have access to S3 | 09:05:24 | |
| to substitute | 09:05:29 | |
| though the S3 substituter in Nix is completely broken beyond belief | 09:05:37 | |
| I need to find time to rewrite it | 09:05:40 | |
| https://github.com/NixOS/nix/issues/13084 | 09:05:54 | |
| * | 09:06:13 | |
| Arian: oof! That sounds pretty nasty, though the fix is looking quite simple. How far out is the fix? It sounds like you've done a lot of the work for it already... | 11:43:47 | |
| 5 May 2025 | ||
| Hey all, I have a message from the foundation I think makes sense to forward here: âŚHey everyone, happy almostâMonday for some, and fullâon Monday for most! đ Weâre kicking off our AWS cache sponsorship renewal (shoutout to the AWS Open Source teams for sponsoring us for two consecutive years now) and could use your help. If you work at AWS, or know someone who does, please drop me a note! Each year we put together a summary of how Nix adds value on AWS, and realâworld examples make our case much stronger. If youâve used Nix for anything on EC2, Lambda, EKS, CodeBuild, caching Docker layers, reducing build times, improving deploy consistency, or anything else in the AWS ecosystem, Iâd love to hear about it. Even a quick bullet point or link to a project helps! Thanks in advance for any pointers or introductions you can share. đ | 07:48:56 | |
| So e.g. @commiterate:matrix.orgor @adam:robins.wtfif you are in a position where you could share a blurb about how you're using AWS + Nix at your company that'd be really awesome. No obligation of course. | 07:51:21 | |
| 6 May 2025 | ||
| We use Nix + system-manager to bake reproducible Amazon Linux 2023 AMIs. There's a shell script snippet in this GitHub issue: https://github.com/aws/ec2-image-builder-roadmap/issues/110
CloudFormation templates are generated with the AWS CDK. The infrastructure code essentially:
Once the CloudFormation image import situation is improved, we'll move the non-bootstrap stuff to use NixOS disk images created with the systemd-repart helpers. | 18:10:47 | |
| * We use Nix + system-manager to bake reproducible Amazon Linux 2023 AMIs. There's a shell script snippet in this GitHub issue: https://github.com/aws/ec2-image-builder-roadmap/issues/110
CloudFormation templates are generated with the AWS CDK. The infrastructure code essentially:
Once the CloudFormation image import situation is improved, we'll move the non-bootstrap stuff to use NixOS disk images created with the systemd-repart helpers. | 18:11:04 | |