commit | c5ed69c003d177cc76c82c25d669920f802ebf6f | [log] [tgz] |
---|---|---|
author | Skyler Grey <minion@clicks.codes> | Sat Dec 23 02:25:41 2023 +0000 |
committer | Skyler Grey <minion@clicks.codes> | Sat Dec 23 19:35:19 2023 +0000 |
tree | d511597c1930dec2e2bb0e0fb02bc78009b2c45b | |
parent | 4d5e2f23a4b21ebe6a8c5ebe489e9dc7b195b6f2 [diff] |
Move gerrit oauth to flake input Previously, we used fetchurl to get the gerrit oauth plugin. This had the disadvantage that auto-updates did not work, and additionally did not have the advantage that the config would continue to work with old versions as the artifact URL was removed when a new version was built. This will allow us to update gerrit oauth with 'nix flake lock' and will break no more commonly than before Change-Id: I6d82752c380aea6301c26de169b01480d260a830 Reviewed-on: https://git.clicks.codes/c/Clicks/NixFiles/+/201 Tested-by: Skyler Grey <minion@clicks.codes> Reviewed-by: Samuel Shuert <coded@clicks.codes>
To deploy these files to our server we use deploy-rs. If you've got a flakes-enabled nix installed on your system you can run
nix run github:serokell/deploy-rs
You can also install deploy-rs to your profile, at which point you'll be able to run
deploy
Secrets are stored in SOPS and deployed using scalpel.
If you have a service which needs to store secrets in its config file, please set systemd reloadTriggers and restartTriggers to automatically reload/restart the service whenever the configuration changes.
It's notable that changing the secrets will not trigger a reload/restart of the service. If you want to update the secrets without updating the rest of the configuration you currently need to manually restart the service. It's possible that this could be solved by using systemd paths to watch the files (see https://superuser.com/questions/1171751/restart-systemd-service-automatically-whenever-a-directory-changes-any-file-ins) but this is not a priority