<feed xmlns='http://www.w3.org/2005/Atom'>
<title>nix-secret-manager/src/main.rs, branch main</title>
<subtitle>A tool to manage credentials and other secrets as mutable state within a NixOS environment, consisting of a Rust executable, NixOS configuration, and associated documentation. Published as part of the Small Tech Kit, ISL's public resource for small organizations that want to host their own infrastructure, but usable independently.</subtitle>
<id>http://code.internetsafetylabs.org/nix-secret-manager/atom?h=main</id>
<link rel='self' href='http://code.internetsafetylabs.org/nix-secret-manager/atom?h=main'/>
<link rel='alternate' type='text/html' href='http://code.internetsafetylabs.org/nix-secret-manager/'/>
<updated>2025-12-19T01:58:33+00:00</updated>
<entry>
<title>parse the returned JSON from the nix subcommand</title>
<updated>2025-12-19T01:58:33+00:00</updated>
<author>
<name>Irene Knapp</name>
<email>ireneista@internetsafetylabs.org</email>
</author>
<published>2025-12-19T01:53:47+00:00</published>
<link rel='alternate' type='text/html' href='http://code.internetsafetylabs.org/nix-secret-manager/commit/?id=911c00714295c13c7e9ec29941b9bbcc87705776'/>
<id>urn:sha1:911c00714295c13c7e9ec29941b9bbcc87705776</id>
<content type='text'>
this produces a list of secrets, although it doesn't yet do any of the checking to see if the files actually exist, when they were modified, etc. it just prints the parsed data structure.

this was kind of a pain to test, I had to make a fake machine config with some secrets and point it to it. we should figure out a way to use Rust's test framework to do that automatically, but that can be in a future CL, and I don't necessarily have to be the one to write it.

Change-Id: I4c7d579d61e8f3694fe879998dae0f95baaeea05
</content>
</entry>
<entry>
<title>implement the secret-list command</title>
<updated>2025-12-18T21:37:52+00:00</updated>
<author>
<name>Irene Knapp</name>
<email>ireneista@internetsafetylabs.org</email>
</author>
<published>2025-12-17T23:16:20+00:00</published>
<link rel='alternate' type='text/html' href='http://code.internetsafetylabs.org/nix-secret-manager/commit/?id=d15feffcdb262f5e4686297e156319591895a945'/>
<id>urn:sha1:d15feffcdb262f5e4686297e156319591895a945</id>
<content type='text'>
Change-Id: I5e1570940fedf52bb560fd824270e201757004ed
</content>
</entry>
<entry>
<title>basic structure of the interactive features of the CLI tool</title>
<updated>2025-11-26T22:47:27+00:00</updated>
<author>
<name>Irene Knapp</name>
<email>ireneista@internetsafetylabs.org</email>
</author>
<published>2025-10-10T07:55:51+00:00</published>
<link rel='alternate' type='text/html' href='http://code.internetsafetylabs.org/nix-secret-manager/commit/?id=01b7b60dc260aa7cf1dab6c15db13a88d5d92ada'/>
<id>urn:sha1:01b7b60dc260aa7cf1dab6c15db13a88d5d92ada</id>
<content type='text'>
Change-Id: Ifec5dbbe20b2c625d448eba436620622af6c5120
</content>
</entry>
<entry>
<title>create a project skeleton with a nix flake and a Rust executable</title>
<updated>2025-08-14T21:16:56+00:00</updated>
<author>
<name>Irene Knapp</name>
<email>ireneista@internetsafetylabs.org</email>
</author>
<published>2025-08-14T21:16:56+00:00</published>
<link rel='alternate' type='text/html' href='http://code.internetsafetylabs.org/nix-secret-manager/commit/?id=89e48b600b01b21c2fae9c6414ddf66e0c38d7a6'/>
<id>urn:sha1:89e48b600b01b21c2fae9c6414ddf66e0c38d7a6</id>
<content type='text'>
I also took the liberty of adding some Rust libraries that I know will
be useful

Change-Id: Id5d98d86cdce653f6706903b75e285c72f2ba4b4
</content>
</entry>
</feed>
