Commit Graph

301 Commits

Author SHA1 Message Date
Ryan Mulligan 1698ed385d
Create flakehub-publish-tagged.yml 2023-09-14 16:19:37 -07:00
Nicolas Lenz fe4f564f13
fix(home): shellcheck failure for fixed secretsDir 2023-09-09 16:46:53 +02:00
Ryan Mulligan d8c973fd22
Merge pull request #192 from malteneuss/extend_documentation
Extend documentation to make it more NixOS beginner friendly.
2023-07-24 15:01:18 -05:00
malteneuss 91220a701d
Rephrase cli app summary 2023-07-24 21:51:25 +02:00
malteneuss 2bee5c988c
Extend tutorial section 2023-07-16 22:40:26 +02:00
malteneuss 1d7fd15690
Extend flake install section 2023-07-16 21:34:50 +02:00
malteneuss 6d20bf81f8
Fix intro indentation 2023-07-16 21:23:10 +02:00
malteneuss b91dfbaf76
Fix indentation 2023-07-16 20:17:20 +02:00
malteneuss 78733d6d09
Make intro section more beginner friendly 2023-07-16 20:12:02 +02:00
Ryan Mulligan 0d8c5325fc
Merge pull request #191 from linj-fork/fix-doc
doc: fix defaultText and description
2023-07-14 06:28:38 -05:00
Lin Jian 6e8a48c2dc
doc: fix nixos option format in descriptions 2023-06-27 00:06:58 +08:00
Lin Jian 0d94960783
doc: fix defaultText by adding literalExpression
I also remove an unnecessary defaultText and fix a typo.
2023-06-27 00:06:39 +08:00
Ryan Mulligan db5637d10f
Merge pull request #185 from Scrumplex/fix-shellcheck-warning
Disable shellcheck warning about impossible comparison
2023-05-15 05:29:13 -07:00
Sefa Eyeoglu 72205a86ca
Add test for custom secret paths for HM
Signed-off-by: Sefa Eyeoglu <contact@scrumplex.net>
2023-05-12 20:15:32 +02:00
Sefa Eyeoglu 758cdc98f4
Disable shellcheck warning about impossible comparison
This shellcheck warning occurs when setting a path for a secret using
the home-manager module.

Signed-off-by: Sefa Eyeoglu <contact@scrumplex.net>
2023-05-12 20:15:30 +02:00
Ryan Mulligan 92197270a1
Merge pull request #180 from ambroisie/add-home-manager
Add home-manager module
2023-05-11 21:38:43 -07:00
Nathan Henrie 6b4ff3d191 Check darwin home-manager test in CI 2023-05-06 14:58:01 +01:00
Nathan Henrie 50743bd117 Add darwin tests for home-manager module 2023-05-06 14:39:48 +01:00
Nathan Henrie 19bf5a20d8 Clean-up Darwin integration test 2023-05-06 14:18:17 +01:00
Nathan Henrie 3fbc22fe43 Install user keys in Darwin tests 2023-05-06 14:18:17 +01:00
Bruno BELANYI 0155c5710e Test home-manager module 2023-05-06 14:18:17 +01:00
Bruno BELANYI 1f43d94d52 Add home-manager input 2023-05-06 14:18:17 +01:00
Bruno BELANYI 9274b82816 Add home-manager module
This is to update and fix the issues I saw in [1] and [2].

Using a service definition instead of an activation script should
resolve the issue about the secrets disappearing after rebooting.

Removed the `user` and `group` option as they do not make sense to me
for a home-manager module, which should target a single user. They can
always be added back if somebody comes screaming.

This is somewhat modeled after sops-nix's own module [3].

[1]: https://github.com/ryantm/agenix/pull/58/
[2]: https://github.com/ryantm/agenix/pull/109
[3]: https://github.com/Mic92/sops-nix/blob/master/modules/home-manager/sops.nix
2023-05-06 14:18:17 +01:00
Cole Helbling 2994d002dc
Merge pull request #179 from winny-/patch-1
doc: missing space
2023-04-21 11:17:59 -07:00
Ryan Mulligan 0e3a237c5a
Merge pull request #175 from whentze/fix-decrypt-truncating
fix truncated output when decrypting a large file to stdout via -d
2023-04-21 07:28:48 -07:00
Winston (Winny) Weinert 8722cf94f1
doc: missing space 2023-04-20 18:50:12 -05:00
Nathan Henrie e64961977f
Merge pull request #155 from ryantm/rtm-2-19-doc-no-darwin
doc: how to skip the Darwin input
2023-03-31 10:49:20 -06:00
Wanja Hentze 40550f0619 fix truncated output when decrypting a large file to stdout via -d
rage intentionally truncates large output when writing to stdout:
55e52c252b/age/src/cli_common/file_io.rs (L219)
but if told to write to "-" instead, it will not truncate:
55e52c252b/age/src/cli_common/file_io.rs (L312)
2023-03-14 18:53:32 +01:00
Ryan Mulligan 03b51fe8e4
Merge pull request #174 from ryantm/rm-3-4-doc
doc: actually fix github pages deploy
2023-03-04 14:42:46 -08:00
Ryan Mulligan b1d6d764e1 doc: actually fix github pages deploy 2023-03-04 14:41:59 -08:00
Ryan Mulligan 1abf0ade92
Merge pull request #173 from ryantm/rm-3-4-doc
doc: try a slightly different format for github action
2023-03-04 13:07:34 -08:00
Ryan Mulligan 2fb0a74be3 doc: try a slightly different format for github action 2023-03-04 13:06:51 -08:00
Ryan Mulligan 36986c8fed
Merge pull request #172 from ryantm/rm-3-4-doc
doc: try to fix doc ci
2023-03-04 12:05:30 -08:00
Ryan Mulligan 119fac65b4 doc: try to fix doc ci 2023-03-04 12:04:58 -08:00
Ryan Mulligan 6a2757101d
Merge pull request #170 from ryantm/rtm-2-26-mmdoc
doc: add new doc website
2023-03-04 10:46:20 -08:00
Ryan Mulligan 657789137c doc: add new doc website
* use mmdoc
* add github pages action to auto publish
* do not edit README for now, will follow up with a commit directs
people to the doc site
2023-03-04 10:34:29 -08:00
Ryan Mulligan 4828951d9d
Merge pull request #171 from ryantm/revert-169-rm-2-26-identity-storepath
Revert "fix: disallow Nix store paths in age.identityPaths option"
2023-02-26 15:22:22 -08:00
Ryan Mulligan b67873854d
Revert "fix: disallow Nix store paths in age.identityPaths option" 2023-02-26 15:11:56 -08:00
Ryan Mulligan faf978f7f3
Merge pull request #169 from ryantm/rm-2-26-identity-storepath
fix: disallow Nix store paths in age.identityPaths option
2023-02-26 13:45:03 -08:00
Ryan Mulligan 1141c36c26 fix: disallow Nix store paths in age.identityPaths option 2023-02-26 09:03:17 -08:00
Ryan Mulligan 9225d56306
Merge pull request #168 from n8henrie/issue_165_docs
Expand explanation that identityPaths should be strings
2023-02-26 08:54:58 -08:00
Nathan Henrie 37dcc5f5e7 Expand explanation that identityPaths should be strings 2023-02-24 11:17:12 -07:00
Ryan Mulligan 833f87c8ff
Merge pull request #164 from whentze/decrypt-only-fix-binary
fix -d/--decrypt-only not working correctly for binary data
2023-02-24 06:01:20 -08:00
Wanja Hentze 7dae15b7bc fix -d/--decrypt-only not working correctly for binary data
I had first used `printf` for outputting the data,
but that breaks if the secret itself contains null bytes.

One could fix this by using e.g. `cat`, but looking a bit more at the code
I realized that in the -d case we never need to `mktemp` at all and can
just ask `age` to write directly to stdout by not setting -o.
2023-02-24 09:00:48 +01:00
Ryan Mulligan c2a71c83c7
Merge pull request #158 from whentze/decrypt-only
add -d/--decrypt option to decrypt a file to stdout
2023-02-22 20:25:46 -08:00
muvlon 9cf1967039 feature: add -d/--decrypt option to decrypt a file to stdout 2023-02-22 19:20:58 -08:00
Ryan Mulligan 2d735d6518
Merge pull request #162 from ryantm/rtm-2-21-stop-packaging-rage
contrib: stop packaging rage
2023-02-22 09:07:10 -08:00
Ryan Mulligan 2c0ae7d44f contrib: stop packaging rage
We don't need to package rage anymore, since all the latest maintained
versions of Nix have versions higher than what we need.
2023-02-21 20:33:19 -08:00
Ryan Mulligan 0c50bbe60e
Merge pull request #161 from n8henrie/warnings-to-stderr
Output user-facing warnings to stderr instead of stdout
2023-02-21 15:17:43 -08:00
Nathan Henrie 283c178469 Add warn and err helpers, use `diff -q` 2023-02-21 12:46:44 -07:00