portable ephemeral state #493
Labels
No labels
0 points
0.5 points
1 point
13 points
2 points
21 points
3 points
34 points
5 points
55 points
8 points
api service
blocked
component: fediversity panel
component: nixops4
documentation
estimation high: >3d
estimation low: <2h
estimation mid: <8h
infinite points
productisation
project-management
question
role: application developer
role: application operator
role: hosting provider
role: maintainer
security
technical debt
testing
type unclear
type: bug
type: deliverable
type: key result
type: objective
type: task
type: user story
user experience
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Blocks
Depends on
#77 Create a deployment migration string
fediversity/fediversity
#100 migrating application data between hosting providers
fediversity/fediversity
#155 Address CI friction between security and caching
fediversity/fediversity
#291 code passes security check
fediversity/fediversity
#314 ephemeral state is automatically provisioned
fediversity/fediversity
Reference: fediversity/fediversity#493
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
In order to migrate data between instances (#100), we will need to be able to transfer relevant (secret) ephemeral (#314) state.
implementation notes
state used in systemd's
LoadCredentialswe could use from openbao bysystemd-openbao.(non-JSON formats we could maybe derive from such credentials using
nix-templating.)systemd-openbao details
systemd-openbaoexternal (- dupe of built-in?vault-plugin-...)nix-svc-secretsvault-secretssyringegenerating (non-systemd?) state may need #314, centralizing (secret) ephemeral nix data, incidentally rendering it portable.
examples:
potentially already restored thru back-up?vars[ ] ssh keys: optional?[ ] root/user passwords: optional? (probably users should not have ssh/sudo access anyway)back-ends:
non-local could facilitate migration (#100):
on-machine(local)sops(local)password-store(local)vm(local)fs(local)valkey (fwiw, afaict not available thru TF back-ends)portable secret stateto portable ephemeral state