-
Notifications
You must be signed in to change notification settings - Fork 2
On-demand, declarative-first secret management #14
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
| } | ||
|
|
||
| #[tokio::main] | ||
| async fn main() -> Result<()> { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
FIXME: Split, I would think about splitting my own deno implementation from things intended for my infra instead
89f2152 to
e987c6c
Compare
e987c6c to
f7d7283
Compare
| @@ -1,3 +1,3 @@ | |||
| [toolchain] | |||
| channel = "1.91.0" | |||
| channel = "1.92.0" | |||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
1.93.0 is out
| package.version = "0.1.0" | ||
| package.edition = "2024" | ||
| package.rust-version = "1.86.0" | ||
| package.rust-version = "1.89.0" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is there a reason not to use the same version as in rust-toolchain.toml?
Even release-25.11 is currently at 1.91.1
| import: String, | ||
| // Magic values should have exactly two values to avoid pretty-printing | ||
| // as nix inline object value | ||
| __magic_marker: PhantomData<()>, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| __magic_marker: PhantomData<()>, | |
| #[serde(rename = "__magic_import")] | |
| _marker: PhantomData<()>, |
If I understand the intent correctly, there is no need to use weird field names if it' just part of ser-de
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This file is still full of todo!s
| @@ -0,0 +1,6 @@ | |||
| use fleet_base::primops::init_primops; | |||
|
|
|||
| #[unsafe(no_mangle)] | |||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would prefer it to have a safety comment referencing this function's doc / C-reference
| gc_now(); | ||
| } | ||
| let config = Config(Arc::new(FleetConfigInternals { | ||
| // TODO: Load from somewhere |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is this to be addressed in this or the following PRs?
| .await | ||
| .context("failed to copy generator to target host")?; | ||
|
|
||
| // TODO: Remove destdir after everything is done |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This
| }) | ||
| .unwrap(); | ||
| dbg!(&data); | ||
| // for v in 0..1000 { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Guess this can be dropped
| macro_rules! nix_go { | ||
| (@o($o:expr, $path:expr) . $var:ident $($tt:tt)*) => {{ | ||
| nix_go!(@o($o.get_field(stringify!($var)).context(concat!("getting nested ", $path))?, $path) $($tt)*) | ||
| nix_go!(@o(tokio::task::block_in_place(|| $o.get_field(stringify!($var))).context(concat!("getting nested ", $path))?, $path) $($tt)*) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| nix_go!(@o(tokio::task::block_in_place(|| $o.get_field(stringify!($var))).context(concat!("getting nested ", $path))?, $path) $($tt)*) | |
| nix_go!(@o(::tokio::task::block_in_place(|| $o.get_field(::std::stringify!($var))).context(::std::concat!("getting nested ", $path))?, $path) $($tt)*) |
Or, better, put the re-exports into a hidden __macro_support module to reference them with $crate
Same below
| mkImpureSecretGenerator, | ||
| }: | ||
| mkImpureSecretGenerator { | ||
| # TODO: Escape prompt/part (preferrably just use env) to prevent shell injection |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This
Secret management commands replaced with interactive generators, secret generation is now nix-driven