(untested) template service for tang encrypted secrets
This commit is contained in:
parent
8a9284af1e
commit
a8a19977ca
@ -14,6 +14,10 @@ in {
|
||||
description = "fetch secrets from external vault with https";
|
||||
type = liminix.lib.types.serviceDefn;
|
||||
};
|
||||
tang = mkOption {
|
||||
description = "fetch secrets from encrypted local pathname, using tang";
|
||||
type = liminix.lib.types.serviceDefn;
|
||||
};
|
||||
subscriber = mkOption {
|
||||
description = "wrapper around a service that needs notifying (e.g. restarting) when secrets change";
|
||||
type = liminix.lib.types.serviceDefn;
|
||||
@ -34,7 +38,21 @@ in {
|
||||
description = "password for HTTP basic auth";
|
||||
type = types.nullOr types.str;
|
||||
};
|
||||
|
||||
name = mkOption {
|
||||
description = "service name";
|
||||
type = types.str;
|
||||
};
|
||||
interval = mkOption {
|
||||
type = types.int;
|
||||
default = 30;
|
||||
description = "how often to check the source, in minutes";
|
||||
};
|
||||
};
|
||||
tang = config.system.callService ./tang.nix {
|
||||
path = mkOption {
|
||||
description = "encrypted source pathname";
|
||||
type = types.path;
|
||||
};
|
||||
name = mkOption {
|
||||
description = "service name";
|
||||
type = types.str;
|
||||
|
22
modules/secrets/tang.nix
Normal file
22
modules/secrets/tang.nix
Normal file
@ -0,0 +1,22 @@
|
||||
{
|
||||
liminix, lib, json-to-fstree, serviceFns, tangc
|
||||
}:
|
||||
{ name, path, interval } :
|
||||
let
|
||||
inherit (liminix.services) longrun;
|
||||
inherit (lib) optionalString;
|
||||
in longrun {
|
||||
inherit name;
|
||||
buildInputs = [ json-to-fstree ];
|
||||
run = ''
|
||||
statedir=/run/${name}
|
||||
mkdir -m 0700 $statedir
|
||||
( in_outputs ${name}
|
||||
while : ; do
|
||||
${tangc}/bin/tangc decrypt < ${path} > $statedir/input.json
|
||||
${json-to-fstree}/bin/json-to-fstree file://$statedir/input.json .
|
||||
sleep ${builtins.toString (interval * 60)}
|
||||
done
|
||||
)
|
||||
'';
|
||||
}
|
Loading…
Reference in New Issue
Block a user