Commit Graph

13 Commits

Author SHA1 Message Date
Tom Chauveau
c8e3755188 Add git.#Commit definition and git.#Image
This definition allow user to commit & push new content to repository.
I've also add a quick feature to os.#Container to write files.

Signed-off-by: Tom Chauveau <tom.chauveau@epitech.eu>
2021-09-03 02:29:31 +02:00
Andrea Luzzardi
db459ae04d os.#Container: inherit PATH from the container image
Signed-off-by: Andrea Luzzardi <aluzzardi@gmail.com>
2021-08-04 16:56:52 +02:00
Tom Chauveau
2fbb9e7744 Update import to alpha version
Signed-off-by: Tom Chauveau <tom.chauveau@epitech.eu>
2021-06-25 17:26:51 +02:00
Tom Chauveau
c99e39ec9c Move tests plan from dagger dir to universe
Signed-off-by: Tom Chauveau <tom.chauveau@epitech.eu>
2021-06-25 17:00:38 +02:00
Solomon Hykes
d7a805f42b stdlib: move all imports to alpha.dagger.io
Signed-off-by: Solomon Hykes <solomon@dagger.io>
2021-06-25 10:31:22 +00:00
Solomon Hykes
aa6335246b os.#Container: mount secrets with a more consistent API
Signed-off-by: Solomon Hykes <solomon@dagger.io>
2021-06-23 13:35:15 +02:00
Solomon Hykes
9d85bab9e7 os.#File: simplify API
Signed-off-by: Solomon Hykes <solomon@dagger.io>
2021-06-23 12:56:27 +02:00
Sam Alba
af82c2c910 docs: adds package description to the stdlib Index
Signed-off-by: Sam Alba <sam.alba@gmail.com>
2021-06-23 11:05:58 +02:00
Sam Alba
b41adbd9c2 stdlib/os: fixed typo in container.cue (dest cache folder was always "true")
Signed-off-by: Sam Alba <sam.alba@gmail.com>
2021-06-09 15:21:30 +02:00
Andrea Luzzardi
9c0e2d1d95 buildkit secrets support
- Secrets are never exposed in plaintext in the Cue tree. `dagger query`
  won't dump secrets anymore, Cue errors won't contain them either.
- BuildKit-native secrets support through a new `mount` type. This
  ensures secrets will never be part of containerd layers, buildkit
  cache and generally speaking will never be saved to disk in plaintext.
- Updated netlify as an example
- Added tests
- Changed the Cue definition of a secret to:

```
	@dagger(secret)

	id: string
}
```

This is to ensure both that setting the wrong input type on a secret
(e.g. `dagger input text`) will fail, and attempting to misuse the
secret (e.g. interpolating, passing as an env variable, etc) will also
fail properly.

Signed-off-by: Andrea Luzzardi <aluzzardi@gmail.com>
2021-05-27 19:14:08 -07:00
Solomon Hykes
b526093929 stdlib: simpler and cleaner performance workaround
Signed-off-by: Solomon Hykes <solomon@dagger.io>
2021-05-13 22:36:06 -07:00
Solomon Hykes
98b3951c73 stdlib: os package
Signed-off-by: Solomon Hykes <solomon@dagger.io>
2021-05-11 17:32:50 -07:00
Solomon Hykes
052a623294 stdlib: io for portable I/O interfaces, os for system primitives
Signed-off-by: Solomon Hykes <sh.github.6811@hykes.org>
2021-05-04 11:21:02 -07:00