Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Load secret key on startup #56

Conversation

the-sun-will-rise-tomorrow
Copy link
Contributor

Like others in #10 and #40, I was confused why signatures with nix-serve weren't working for me.

This fixes one possible source of confusion.

  • Allow us to drop privileges (via starman command line flags) to a state where we are no longer able to read this file. This is useful if the secret key file is only readable by root, and we don't want to run a network-facing daemon as root. 🙂

  • Crash with a clear error message on startup if a key is specified, but we are unable to read it (fixes kindly warn on bad values in NIX_SECRET_KEY_FILE #40).

- Allow us to drop privileges (via starman command line flags) to a
  state where we are no longer able to read this file.

- Alert users if the variable is set but not valid (fixes edolstra#40).
@edolstra edolstra merged commit 4a12660 into edolstra:master Apr 8, 2024
2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

kindly warn on bad values in NIX_SECRET_KEY_FILE
2 participants