(wip) Use password-store
This commit is contained in:
0
.dir-locals.el
Normal file → Executable file
0
.dir-locals.el
Normal file → Executable file
0
.gitignore
vendored
Normal file → Executable file
0
.gitignore
vendored
Normal file → Executable file
0
.projectile
Normal file → Executable file
0
.projectile
Normal file → Executable file
0
.sops.yaml
Normal file → Executable file
0
.sops.yaml
Normal file → Executable file
7
README.org
Normal file → Executable file
7
README.org
Normal file → Executable file
@@ -145,13 +145,18 @@ I don't know anything about either.
|
||||
|
||||
** TODO password store 4 firefox
|
||||
|
||||
** TODO password store w/ age
|
||||
** DONE password store w/ age
|
||||
CLOSED: [2024-12-29 Sun 02:34]
|
||||
|
||||
https://github.com/FiloSottile/passage
|
||||
|
||||
** TODO Automatically sync password store
|
||||
|
||||
** DONE secrets
|
||||
CLOSED: [2024-12-29 Sun 01:41]
|
||||
|
||||
** TODO git config
|
||||
|
||||
** TODO niri
|
||||
|
||||
Or Qtile
|
||||
|
||||
0
flake.lock
generated
Normal file → Executable file
0
flake.lock
generated
Normal file → Executable file
0
hosts/nixos-testbed/configuration.nix
Normal file → Executable file
0
hosts/nixos-testbed/configuration.nix
Normal file → Executable file
0
hosts/nixos-testbed/disko-config.nix
Normal file → Executable file
0
hosts/nixos-testbed/disko-config.nix
Normal file → Executable file
0
hosts/nixos-testbed/hardware-configuration.nix
Normal file → Executable file
0
hosts/nixos-testbed/hardware-configuration.nix
Normal file → Executable file
0
hosts/nixos-testbed/system.nix
Normal file → Executable file
0
hosts/nixos-testbed/system.nix
Normal file → Executable file
0
lib/utils.nix
Normal file → Executable file
0
lib/utils.nix
Normal file → Executable file
0
modules/home/impermanence.nix
Normal file → Executable file
0
modules/home/impermanence.nix
Normal file → Executable file
0
modules/home/sops.nix
Normal file → Executable file
0
modules/home/sops.nix
Normal file → Executable file
0
modules/nixos/erase-home-darlings.clj
Normal file → Executable file
0
modules/nixos/erase-home-darlings.clj
Normal file → Executable file
0
modules/nixos/filesystemType.nix
Normal file → Executable file
0
modules/nixos/filesystemType.nix
Normal file → Executable file
0
modules/nixos/gpg.nix
Normal file → Executable file
0
modules/nixos/gpg.nix
Normal file → Executable file
0
modules/nixos/impermanence.nix
Normal file → Executable file
0
modules/nixos/impermanence.nix
Normal file → Executable file
0
modules/nixos/impermanence/erase-darlings.clj
Normal file → Executable file
0
modules/nixos/impermanence/erase-darlings.clj
Normal file → Executable file
0
modules/nixos/niri.nix
Normal file → Executable file
0
modules/nixos/niri.nix
Normal file → Executable file
0
modules/nixos/sops.nix
Normal file → Executable file
0
modules/nixos/sops.nix
Normal file → Executable file
0
modules/nixos/users.nix
Normal file → Executable file
0
modules/nixos/users.nix
Normal file → Executable file
0
secrets.yaml
Normal file → Executable file
0
secrets.yaml
Normal file → Executable file
0
users/crumb/default.nix
Normal file → Executable file
0
users/crumb/default.nix
Normal file → Executable file
0
users/crumb/programs.nix
Normal file → Executable file
0
users/crumb/programs.nix
Normal file → Executable file
0
users/crumb/programs/nvim.nix
Normal file → Executable file
0
users/crumb/programs/nvim.nix
Normal file → Executable file
29
users/crumb/programs/passage.nix
Executable file
29
users/crumb/programs/passage.nix
Executable file
@@ -0,0 +1,29 @@
|
||||
{ config, lib, pkgs, ... }:
|
||||
|
||||
{
|
||||
home.packages = [ pkgs.passage ];
|
||||
home.file.".passage/identities".source =
|
||||
(config.lib.file.mkOutOfStoreSymlink config.sydnix.sops.keyFile);
|
||||
home.file.".passage/store".source =
|
||||
(config.lib.file.mkOutOfStoreSymlink "/persist/home/crumb/.passage/store");
|
||||
|
||||
home.shellAliases."pass" = "${pkgs.passage/bin/passage}";
|
||||
|
||||
# TODO:
|
||||
# systemd.user.services.sync-password-store = {
|
||||
# Unit = {
|
||||
# Description = "Pull and push user password store.";
|
||||
# };
|
||||
# Service = {
|
||||
# Environment = "PATH=/run/current-system/sw/bin";
|
||||
# ExecStart =
|
||||
# let script = ''
|
||||
# set -xe -o pipefail
|
||||
# '';
|
||||
# in pkgs.writeShellScript "sync-password-store" script;
|
||||
# };
|
||||
# Install = {
|
||||
# WantedBy = ["default.target"];
|
||||
# };
|
||||
# };
|
||||
}
|
||||
0
users/crumb/secrets.yaml
Normal file → Executable file
0
users/crumb/secrets.yaml
Normal file → Executable file
Reference in New Issue
Block a user