-
-
Notifications
You must be signed in to change notification settings - Fork 14.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
piped: init #326238
base: master
Are you sure you want to change the base?
piped: init #326238
Conversation
Previously you had to roll your own systemd service that runs some SQL and risk inadvertently exposing your password to the Nix store by doing it wrong. This provides a standard method to set up user passwords via password files which can safely be deployed via secrets management solutions for those who care about security or alternatively also simply generated for those who don't. Adapted from https://discourse.nixos.org/t/assign-password-to-postgres-user-declaratively/9726/3
data = ./deps.json; | ||
}; | ||
passthru.updateDeps = gradle.updateDeps { inherit pname; }; | ||
passthru.updateScript = nix-update-script { extraArgs = [ "--version=branch=master" ]; }; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nix-update-script isn't enough here, as it doesn't update deps.json. Here's a working example for a different package:
passthru.updateScript = _experimental-update-script-combinators.sequence [
(gitUpdater { rev-prefix = "v"; } // { attrPath = pname; })
finalAttrs.passthru.updateDeps
];
Sorry? |
stdenv, | ||
fetchFromGitHub, | ||
nodejs, | ||
pnpm, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Most likely you need to change pnpm
to pnpm_9
. Since #371832, it points to pnpm_10
instead of pnpm_9
.
Description of changes
Depends on #272380 and #326306
Closes #270008
Things done
nix.conf
? (See Nix manual)sandbox = relaxed
sandbox = true
nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD"
. Note: all changes have to be committed, also see nixpkgs-review usage./result/bin/
)Add a 👍 reaction to pull requests you find important.