!BgJZHVOYkwVcEKLAyM:nixos.org

NixOS Deployments

1229 Members
NixOS Deployment tooling300 Servers

Load older messages


SenderMessageTime
7 Jun 2021
@b42:matrix.orgb42 joined the room.12:04:12
@antifuchs:asf.computerantifuchsI guess you could imagine a world of auto updates in flakes where a GitHub action regularly updates pinned revs (and then they get deployed somehow)12:44:50
8 Jun 2021
@NYXT:matrix.orgdavidtwco joined the room.10:00:43
@kranzes:matrix.orgkranzes joined the room.11:36:55
@thom:uint.onetomcur joined the room.12:53:32
@buckley310:matrix.orgBuckley yeah, should be even easier with flakes. Just set a timer that always does a rebuild every once in a while, and then a reboot either immidiately or overnight
nixos-rebuild switch --refresh --flake github:username/repo/tag
17:59:55
@buckley310:matrix.orgBuckleylogic for checking if a reboot is nessecary: https://github.com/NixOS/nixpkgs/blob/8284fc30c84ea47e63209d1a892aca1dfcd6bdf3/nixos/modules/tasks/auto-upgrade.nix#L149-L15118:01:13
@rosariopulella:matrix.orgrosariopulella joined the room.23:03:33
9 Jun 2021
@thom:uint.onetomcur changed their display name from Thom to tomcur.08:34:23
@kranzes:matrix.orgkranzes left the room.13:31:22
10 Jun 2021
@nategriswold:matrix.orgnwg joined the room.12:43:25
@leo:gaspard.ninjaEkleog joined the room.16:25:16
11 Jun 2021
@dongcarl:matrix.orgdongcarl joined the room.01:13:34
@dongcarl:matrix.orgdongcarl

Here's a questions for y'all...
I have a nixops deployment, where I have the following snippet:

#deployments:nixos.org
01:14:40
@dongcarl:matrix.orgdongcarl *

Here's a questions for y'all...
I have a nixops deployment, where I have the following snippet:

nextcloud-adminpass = { keyfile = ...; user = "nextcloud"; permissions = "0400"; ... }
01:15:14
@dongcarl:matrix.orgdongcarl *

Here's a questions for y'all...
I have a nixops deployment, where I have the following snippet:

keys = { nextcloud-adminpass = { keyfile = ...; user = "nextcloud"; permissions = "0400"; ... }; };
01:15:29
@dongcarl:matrix.orgdongcarl

And of course I reference that file in services.nextcloud:

config = { adminpassFile = config.deployment.keys.nextcloud-adminpass.path; };
01:16:10
@dongcarl:matrix.orgdongcarlHowever, it would seem that nextcloud-setup cannot read the file (it tests with [ -r ... ])01:16:37
@dongcarl:matrix.orgdongcarl

What's more interesting: I cannot even get it to work:

$ sudo -u nextcloud test -r /run/keys/nextcloud-adminpass
$ echo $?
1
01:17:56
@dongcarl:matrix.orgdongcarl BTW: /run/keys/nextcloud-admin is a 0777 symlink to /nix/store/<blah>-nextcloud-adminpass, which is itself 0444 01:20:13
@dongcarl:matrix.orgdongcarl * BTW: /run/keys/nextcloud-admin is a 0777 symlink to /nix/store/<blah>-nextcloud-adminpass, which is itself a regular file and 0444 (owned by root:root) 01:20:26
@linus.heckemann:matrix.mayflower.deLinux Hackerman dongcarl: you probably need to add the `keys` group to the nextcloud user, because `/run/keys` isn't accessible to all users. 05:07:46
@b:chreekat.netbryan joined the room.10:23:09
@zarel_it:matrix.orgzarel joined the room.11:37:47
@rushmore:matrix.orgrushmore joined the room.14:11:19
@dongcarl:matrix.orgdongcarlOh I see... the execute flag of parent directories strike again!17:44:56
@dongcarl:matrix.orgdongcarl * Oh I see... the execute bit of parent directories strike again!17:45:02
@keiichi:matrix.orgteto I wish I didn have to resort to ioohk's flake but after failing myself, I caved in and managed to get nixops + libvirtd plugin via nix build --impure --expr '(builtins.getFlake "github:input-output-hk/nixops-flake")'\ ~ '.impure.${builtins.currentSystem}.nixops_2_0-latest-unstable [ "virtd" ]' (for posterity) 21:13:56
@baloo_:matrix.orgbaloois there an integration between nixops and nix integration tests?23:20:35
@baloo_:matrix.orgbaloohuum, came out weird23:21:13

There are no newer messages yet.


Back to Room ListRoom Version: 6