v1.4.0
New:
-
Add
file:
prefix support for flag and env var indirectionPassing secrets via environment variables isn't always safe. This change
add support for reading values from a file, preferably one residing on a
non-swappable memory, like systemd-credentials or Docker Compose
Secrets, that get mounted from hopefully a safer location from the host.Example:
# From the environment variable.
export PING_KEY=file:/run/secrets/hc_prod_pingkey
runitor -slug nightly-backup restic backup --files-from manifest
# From the command line flag.
# Using systemd-creds(1).
[Service]
Type=oneshot
SetCredentialEncrypted=hc-uuid-upgrades: \
Whxqht+[........................................................]nvz/E= \
ExecStart=/usr/bin/runitor \
-uuid file:%d/hc-uuid-upgrades \
/usr/local/sbin/unattended-upgrades
[Unit]
Description=Unattended Upgrades
-
Add PING_KEY environment as preferred alternative to HC_PING_KEY
-
Go 1.24
Bug fixes: