Skip to content

Conversation

@CertainLach
Copy link
Member

Secret management commands replaced with interactive generators, secret generation is now nix-driven

@CertainLach CertainLach marked this pull request as ready for review February 2, 2026 17:02
}

#[tokio::main]
async fn main() -> Result<()> {
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

FIXME: Split, I would think about splitting my own deno implementation from things intended for my infra instead

@@ -1,3 +1,3 @@
[toolchain]
channel = "1.91.0"
channel = "1.92.0"
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

1.93.0 is out

package.version = "0.1.0"
package.edition = "2024"
package.rust-version = "1.86.0"
package.rust-version = "1.89.0"
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is there a reason not to use the same version as in rust-toolchain.toml?

Even release-25.11 is currently at 1.91.1

import: String,
// Magic values should have exactly two values to avoid pretty-printing
// as nix inline object value
__magic_marker: PhantomData<()>,
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
__magic_marker: PhantomData<()>,
#[serde(rename = "__magic_import")]
_marker: PhantomData<()>,

If I understand the intent correctly, there is no need to use weird field names if it' just part of ser-de

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This file is still full of todo!s

@@ -0,0 +1,6 @@
use fleet_base::primops::init_primops;

#[unsafe(no_mangle)]
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I would prefer it to have a safety comment referencing this function's doc / C-reference

gc_now();
}
let config = Config(Arc::new(FleetConfigInternals {
// TODO: Load from somewhere
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is this to be addressed in this or the following PRs?

.await
.context("failed to copy generator to target host")?;

// TODO: Remove destdir after everything is done
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This

})
.unwrap();
dbg!(&data);
// for v in 0..1000 {
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Guess this can be dropped

macro_rules! nix_go {
(@o($o:expr, $path:expr) . $var:ident $($tt:tt)*) => {{
nix_go!(@o($o.get_field(stringify!($var)).context(concat!("getting nested ", $path))?, $path) $($tt)*)
nix_go!(@o(tokio::task::block_in_place(|| $o.get_field(stringify!($var))).context(concat!("getting nested ", $path))?, $path) $($tt)*)
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
nix_go!(@o(tokio::task::block_in_place(|| $o.get_field(stringify!($var))).context(concat!("getting nested ", $path))?, $path) $($tt)*)
nix_go!(@o(::tokio::task::block_in_place(|| $o.get_field(::std::stringify!($var))).context(::std::concat!("getting nested ", $path))?, $path) $($tt)*)

Or, better, put the re-exports into a hidden __macro_support module to reference them with $crate

Same below

mkImpureSecretGenerator,
}:
mkImpureSecretGenerator {
# TODO: Escape prompt/part (preferrably just use env) to prevent shell injection
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants