| 7 Jun 2021 |
| b42 joined the room. | 12:04:12 |
antifuchs | I guess you could imagine a world of auto updates in flakes where a GitHub action regularly updates pinned revs (and then they get deployed somehow) | 12:44:50 |
| 8 Jun 2021 |
| davidtwco joined the room. | 10:00:43 |
| kranzes joined the room. | 11:36:55 |
| tomcur joined the room. | 12:53:32 |
Buckley | yeah, should be even easier with flakes. Just set a timer that always does a rebuild every once in a while, and then a reboot either immidiately or overnight
nixos-rebuild switch --refresh --flake github:username/repo/tag | 17:59:55 |
Buckley | logic for checking if a reboot is nessecary:
https://github.com/NixOS/nixpkgs/blob/8284fc30c84ea47e63209d1a892aca1dfcd6bdf3/nixos/modules/tasks/auto-upgrade.nix#L149-L151 | 18:01:13 |
| rosariopulella joined the room. | 23:03:33 |
| 9 Jun 2021 |
| tomcur changed their display name from Thom to tomcur. | 08:34:23 |
| kranzes left the room. | 13:31:22 |
| 10 Jun 2021 |
| nwg joined the room. | 12:43:25 |
| Ekleog joined the room. | 16:25:16 |
| 11 Jun 2021 |
| dongcarl joined the room. | 01:13:34 |
dongcarl | Here's a questions for y'all... I have a nixops deployment, where I have the following snippet:
#deployments:nixos.org
| 01:14:40 |
dongcarl | * Here's a questions for y'all... I have a nixops deployment, where I have the following snippet:
nextcloud-adminpass = { keyfile = ...; user = "nextcloud"; permissions = "0400"; ... }
| 01:15:14 |
dongcarl | * Here's a questions for y'all... I have a nixops deployment, where I have the following snippet:
keys = { nextcloud-adminpass = { keyfile = ...; user = "nextcloud"; permissions = "0400"; ... }; };
| 01:15:29 |
dongcarl | And of course I reference that file in services.nextcloud:
config = { adminpassFile = config.deployment.keys.nextcloud-adminpass.path; };
| 01:16:10 |
dongcarl | However, it would seem that nextcloud-setup cannot read the file (it tests with [ -r ... ]) | 01:16:37 |
dongcarl | What's more interesting: I cannot even get it to work:
$ sudo -u nextcloud test -r /run/keys/nextcloud-adminpass
$ echo $?
1
| 01:17:56 |
dongcarl | BTW: /run/keys/nextcloud-admin is a 0777 symlink to /nix/store/<blah>-nextcloud-adminpass, which is itself 0444 | 01:20:13 |
dongcarl | * BTW: /run/keys/nextcloud-admin is a 0777 symlink to /nix/store/<blah>-nextcloud-adminpass, which is itself a regular file and 0444 (owned by root:root) | 01:20:26 |
Linux Hackerman | dongcarl: you probably need to add the `keys` group to the nextcloud user, because `/run/keys` isn't accessible to all users. | 05:07:46 |
| bryan joined the room. | 10:23:09 |
| zarel joined the room. | 11:37:47 |
| rushmore joined the room. | 14:11:19 |
dongcarl | Oh I see... the execute flag of parent directories strike again! | 17:44:56 |
dongcarl | * Oh I see... the execute bit of parent directories strike again! | 17:45:02 |
teto | I wish I didn have to resort to ioohk's flake but after failing myself, I caved in and managed to get nixops + libvirtd plugin via nix build --impure --expr '(builtins.getFlake "github:input-output-hk/nixops-flake")'\ ~ '.impure.${builtins.currentSystem}.nixops_2_0-latest-unstable [ "virtd" ]' (for posterity) | 21:13:56 |
baloo | is there an integration between nixops and nix integration tests? | 23:20:35 |
baloo | huum, came out weird | 23:21:13 |