commit | 1462d75e02063e2cac87149b75f5ec397342d016 | [log] [tgz] |
---|---|---|
author | Skyler Grey <minion@clicks.codes> | Wed Jan 10 19:25:48 2024 +0000 |
committer | Skyler Grey <minion@clicks.codes> | Fri Jan 19 21:29:01 2024 +0000 |
tree | 2778050d1b2f377c72720d264561f12b895d62b7 | |
parent | 2b9b1fed5b4b4d63afb5dd4adf47c204cf0019a3 [diff] |
Make oauth2_proxy wait for keycloak Oauth2_proxy needs its oidc provider to be running so it can connect, however keycloak isn't actually ready the moment systemd believes it has started. This means we need to start only when keycloak is returning a HTTP 200 This copies a similar format to the matrix config. Change-Id: I0e35315f5abaf5e0a3de294342d9654bb558d47e Reviewed-on: https://git.clicks.codes/c/Clicks/NixFiles/+/241 Tested-by: Skyler Grey <minion@clicks.codes> Reviewed-by: Skyler Grey <minion@clicks.codes>
To deploy these files to our server we use deploy-rs. If you've got a flakes-enabled nix installed on your system you can run
nix run github:serokell/deploy-rs
You can also install deploy-rs to your profile, at which point you'll be able to run
deploy
Secrets are stored in SOPS and deployed using scalpel.
If you have a service which needs to store secrets in its config file, please set systemd reloadTriggers and restartTriggers to automatically reload/restart the service whenever the configuration changes.
It's notable that changing the secrets will not trigger a reload/restart of the service. If you want to update the secrets without updating the rest of the configuration you currently need to manually restart the service. It's possible that this could be solved by using systemd paths to watch the files (see https://superuser.com/questions/1171751/restart-systemd-service-automatically-whenever-a-directory-changes-any-file-ins) but this is not a priority