1
1
mirror of https://github.com/ryantm/agenix.git synced 2024-09-11 14:25:49 +03:00
This commit is contained in:
Félinàun Chapeau 2024-05-08 01:22:02 +02:00 committed by GitHub
commit 946342fdb6
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194

View File

@ -61,35 +61,45 @@ with lib; let
} }
''; '';
installSecret = secretType: '' installSecretFn = ''
${setTruePath secretType} installSecret() {
echo "decrypting '${secretType.file}' to '$_truePath'..." symlink="$1"
TMP_FILE="$_truePath.tmp" name="$2"
path="$3"
file="$4"
mode="$5"
if "$symlink"; then
_truePath="${cfg.secretsMountPoint}/$_agenix_generation/$name"
else
_truePath="$path"
fi
echo "decrypting $file to '$_truePath'..."
TMP_FILE="$_truePath.tmp"
IDENTITIES=() IDENTITIES=()
for identity in ${toString cfg.identityPaths}; do for identity in ${toString cfg.identityPaths}; do
test -r "$identity" || continue test -r "$identity" || continue
test -s "$identity" || continue test -s "$identity" || continue
IDENTITIES+=(-i) IDENTITIES+=(-i)
IDENTITIES+=("$identity") IDENTITIES+=("$identity")
done done
test "''${#IDENTITIES[@]}" -eq 0 && echo "[agenix] WARNING: no readable identities found!" test "''${#IDENTITIES[@]}" -eq 0 && echo "[agenix] WARNING: no readable identities found!"
mkdir -p "$(dirname "$_truePath")" mkdir -p "$(dirname "$_truePath")"
[ "${secretType.path}" != "${cfg.secretsDir}/${secretType.name}" ] && mkdir -p "$(dirname "${secretType.path}")" [ "$path" != "${cfg.secretsDir}/$name" ] && mkdir -p "$(dirname "$path")"
( (
umask u=r,g=,o= umask u=r,g=,o=
test -f "${secretType.file}" || echo '[agenix] WARNING: encrypted file ${secretType.file} does not exist!' test -f "$file" || echo '[agenix] WARNING: encrypted file '$file' does not exist!'
test -d "$(dirname "$TMP_FILE")" || echo "[agenix] WARNING: $(dirname "$TMP_FILE") does not exist!" test -d "$(dirname "$TMP_FILE")" || echo "[agenix] WARNING: $(dirname "$TMP_FILE") does not exist!"
LANG=${config.i18n.defaultLocale or "C"} ${ageBin} --decrypt "''${IDENTITIES[@]}" -o "$TMP_FILE" "${secretType.file}" LANG=${config.i18n.defaultLocale or "C"} ${ageBin} --decrypt "''${IDENTITIES[@]}" -o "$TMP_FILE" "$file"
) )
chmod ${secretType.mode} "$TMP_FILE" chmod "$mode" "$TMP_FILE"
mv -f "$TMP_FILE" "$_truePath" mv -f "$TMP_FILE" "$_truePath"
${optionalString secretType.symlink '' "$symlink" && ([ "$path" != "${cfg.secretsDir}/$name" ] && ln -sfn "${cfg.secretsDir}/$name" "$path")
[ "${secretType.path}" != "${cfg.secretsDir}/${secretType.name}" ] && ln -sfn "${cfg.secretsDir}/${secretType.name}" "${secretType.path}" true
''} }
''; '';
testIdentities = testIdentities =
@ -111,12 +121,22 @@ with lib; let
} }
''; '';
installSecrets = builtins.concatStringsSep "\n" ( installSecrets = let
["echo '[agenix] decrypting secrets...'"] mkLine = secretType: ''
++ testIdentities installSecret "${
++ (map installSecret (builtins.attrValues cfg.secrets)) if secretType.symlink
++ [cleanupAndLink] then "true"
); else "false"
}" "${secretType.name}" "${secretType.path}" "${secretType.file}" "${secretType.mode}";
'';
in
builtins.concatStringsSep "\n" (
["echo '[agenix] decrypting secrets...'"]
++ testIdentities
++ [installSecretFn]
++ (map mkLine (builtins.attrValues cfg.secrets))
++ [cleanupAndLink]
);
chownSecret = secretType: '' chownSecret = secretType: ''
${setTruePath secretType} ${setTruePath secretType}