From 7eac9f6ed9fb2a99d303aa5a81d8e49ad7fe3dcb Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?J=C3=B6rg=20Thalheim?= Date: Wed, 13 Sep 2023 11:19:32 +0200 Subject: [PATCH 1/2] add missing secrets instruction --- docs/secrets-management.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/docs/secrets-management.md b/docs/secrets-management.md index 2497b60..6dbadae 100644 --- a/docs/secrets-management.md +++ b/docs/secrets-management.md @@ -27,6 +27,10 @@ user with your user name) Next, add your public key to the Clan flake repository: +```console +$ clan secrets users add +``` + Doing so creates this structure in your Clan flake: ``` From 2f9413d2e9c7a007b361f6a46cda123400088873 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?J=C3=B6rg=20Thalheim?= Date: Wed, 13 Sep 2023 11:21:19 +0200 Subject: [PATCH 2/2] docs/secrets: more consistent formatting --- docs/secrets-management.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/docs/secrets-management.md b/docs/secrets-management.md index 6dbadae..321d218 100644 --- a/docs/secrets-management.md +++ b/docs/secrets-management.md @@ -100,13 +100,13 @@ $ ssh-keyscan | nix shell nixpkgs#ssh-to-age -c ssh-to-age By default, secrets are encrypted for your key. To specify which users and machines can access a secret: ```console -clan secrets set --machine --machine --user --user +$ clan secrets set --machine --machine --user --user ``` You can add machines/users to existing secrets without modifying the secret: ```console -clan secrets machines add-secret +$ clan secrets machines add-secret ``` ## 4. Utilizing Groups @@ -118,17 +118,17 @@ For convenience, Clan CLI allows group creation to simplify access management. H Assign users to a new group, e.g., `admins`: ```console - clan secrets groups add admins + $ clan secrets groups add admins ``` 2. **Listing Groups**: ```console - clan secrets groups list + $ clan secrets groups list ``` 3. **Assigning Secrets to Groups**: ```console - clan secrets groups add-secret + $ clan secrets groups add-secret ```