Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

sks: init at 1.1.6 #20717

Merged
merged 1 commit into from Nov 28, 2016
Merged

sks: init at 1.1.6 #20717

merged 1 commit into from Nov 28, 2016

Conversation

primeos
Copy link
Member

@primeos primeos commented Nov 25, 2016

Motivation for this change

Add SKS:
"SKS is an OpenPGP keyserver whose goal is to provide easy to deploy,
decentralized, and highly reliable synchronization. That means that a key
submitted to one SKS server will quickly be distributed to all key
servers, and even wildly out-of-date servers, or servers that experience
spotty connectivity, can fully synchronize with rest of the system."

Things done
  • Tested using sandboxing
    (nix.useSandbox on NixOS,
    or option build-use-sandbox in nix.conf
    on non-NixOS)
  • Built on platform(s)
    • NixOS
    • macOS
    • Linux
  • Tested compilation of all pkgs that depend on this change using nix-shell -p nox --run "nox-review wip"
  • Tested execution of all binary files (usually in ./result/bin/) (I couldn't test all binaries yet but the unit tests and "sks version" succeed. I.e. everything should be fine.)
  • Fits CONTRIBUTING.md.

I've copied the sample configuration files to $out/var/lib/sks as I thought about writing a module that just copies some of these config files (especially the web files) to /var/lib/sks - might be a bad idea tho... They might also be useful as a reference but I guess one normally wouldn't look for them under the store path.

Copy link
Member

@rasendubi rasendubi left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I haven't tested, but the patch looks good.

postInstall = ''
mkdir --parents $out/var/lib/sks
rm --recursive ./sampleConfig/debian
cp ./sampleConfig/* $out/var/lib/sks
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is not a good patch for sample configs. In var should be variable data like state. This shouldn't typically be in the Nix store.

We don't have a clear convention where to put sample configs but most packages use paths like $out/etc, $out/share or $out/share/doc (last one being from the Debian Policy).

rm --recursive ./sampleConfig/debian
cp ./sampleConfig/* $out/var/lib/sks
mkdir $out/var/lib/sks/web
cp --recursive ./sampleWeb/* $out/var/lib/sks/web
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is sks looking for those files in that path? If not, $out/share would be a better place to put these files.

@primeos
Copy link
Member Author

primeos commented Nov 26, 2016

@rasendubi @fpletz Thanks for your Feedback! 😄

@fpletz Considering you feedback I concluded copying these sample configuration files was probably a bad idea to begin with as they're not really helping anyone by just being in the store path and if I should need some of them for the module I could re-add them anyway (keeping $out/share in mind).

Copy link
Member

@fpletz fpletz left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sounds good to me. Thanks! 🍻

@fpletz
Copy link
Member

fpletz commented Nov 26, 2016

Oh, and are you also working on a NixOS module for sks by any chance? ;)

@primeos
Copy link
Member Author

primeos commented Nov 26, 2016

@fpletz Yes, I'm trying to write a NixOS module for sks but it might take some time since I don't have that much time at the moment and I've only written one module so far that was way simpler. But hopefully it won't take me too long 😄

@jcumming
Copy link
Contributor

I have a local sks NixOS module (running http://ice.mudshark.org:11371).

There are 3 main issues:

  • initial setup (downloading dump, building KDB and PTree)
  • setting up proxies
  • running sks db and sks recon

I only really solved the running of sks db and sks recon with the module.

@primeos
Copy link
Member Author

primeos commented Nov 26, 2016

@jcumming Sounds awesome! Are you considering finalizing that module (doesn't have to be perfect -imho a minimal version would be enough to begin with) and making a PR? And if not would you mind sharing your work with me (dev.primeos@gmail.com)?

@fpletz fpletz merged commit 9538176 into NixOS:master Nov 28, 2016
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants