!UUqahLbShAYkkrXmKs:matrix.org

DevOS

37 Members
Seeking help and geeking out together on https://github.com/divnix/devos & https://github.com/divnix/digga10 Servers

Load older messages


SenderMessageTime
1 Dec 2021
@ultranix:matrix.orgultranix it works, thank you Pacman99 ! 23:55:09
@ultranix:matrix.orgultranix
In reply to @blaggacao:matrix.org
sent a file.
what's this for?
23:55:37
@pachumicchu:myrdd.infoPacman99We should update secrets.md in devos then23:55:48
@ultranix:matrix.orgultranix well, stable would still look for /run/secrets i suppose 23:56:47
@pachumicchu:myrdd.infoPacman99Ohh true, yeah I'm not sure if theres anything we can do then23:57:15
@pachumicchu:myrdd.infoPacman99update agenix I guess then switch secrets.md23:57:28
@blaggacao:matrix.orgDavid Arnold (blaggacao)
In reply to @ultranix:matrix.org
what's this for?
revert https://github.com/divnix/digga/commit/9c5115fa6143f51851f58055f0e2ecb9253ff15d
23:58:22
@blaggacao:matrix.orgDavid Arnold (blaggacao)^^ this breaks the inner local check-feedback-loop.23:58:53
2 Dec 2021
@ultranix:matrix.orgultranixah00:06:07
@ultranix:matrix.orgultranixi never liked the idea of subflakes anyways, is that widely used somewhere else?00:06:26
@ultranix:matrix.orgultranixits understandable for the examples part though00:06:44
@ultranix:matrix.orgultranixby the way, i still found a lot of use for git-crypt. I use it to encrypt secrets in public repositories00:12:34
@ultranix:matrix.orgultranixi could not figure out how to do that with the agenix replacement00:12:45
@ultranix:matrix.orgultranix stringPassword = "${builtins.readFile ./secrets/password}" 00:13:27
@ultranix:matrix.orgultranixagenix only works for deployment keys00:13:47
@ultranix:matrix.orgultranixafaict, it doesnt work well otherwise00:14:07
@ultranix:matrix.orgultranix * by the way, i still found a lot of use for git-crypt. I use it to encrypt string secrets in public repositories00:16:22
@ultranix:matrix.orgultranixi dont see any other way to do it though. i wish i could not involve a gpg private key; one ssh key is much simpler to use00:22:08
@blaggacao:matrix.orgDavid Arnold (blaggacao)
In reply to @ultranix:matrix.org
i never liked the idea of subflakes anyways, is that widely used somewhere else?
At the very least it is a way of placing multiple flake-guarantees-backed interfaces into a big project, such as you can't break (../../) out of the flake boundary. that's actually nice if you are task with auditing a big chunk of nix code.
00:46:21
@blaggacao:matrix.orgDavid Arnold (blaggacao)
In reply to @ultranix:matrix.org
stringPassword = "${builtins.readFile ./secrets/password}"
that looks like you try to manipulate secrets ahead of their final use? or is it conceptually that you wanna use them in some sort of local script?
00:47:56
@blaggacao:matrix.orgDavid Arnold (blaggacao)I'm trying to figure out the bigger / biggest picture.00:49:30
@pachumicchu:myrdd.infoPacman99
In reply to @ultranix:matrix.org
stringPassword = "${builtins.readFile ./secrets/password}"
Well if you are doing something like this, I'm pretty sure that secret will end up in the nix store at some point
00:50:39
@ultranix:matrix.orgultranix
In reply to @pachumicchu:myrdd.info
Well if you are doing something like this, I'm pretty sure that secret will end up in the nix store at some point
that doesnt matter. i use it to encrypt location.latitude or location.longitude etc, things that are of personal information for pseudonyms etc
01:30:13
@ultranix:matrix.orgultranixbut also, there's a lot of configuration ini's that still use string keys within config files01:30:46
@ultranix:matrix.orgultranixand i'm not sure that can change?01:31:14
@pachumicchu:myrdd.infoPacman99
In reply to @ultranix:matrix.org
but also, there's a lot of configuration ini's that still use string keys within config files
Thats where I think envsubst is really useful and I've seen a lot of services integrate it
01:31:45
@pachumicchu:myrdd.infoPacman99Then you can use agenix to encrypt the environment file with the secret information, and pass it along to the systemd service then you get access to that secret data in your ocnfig01:32:36
@ultranix:matrix.orgultranixok good to know01:34:23
@pachumicchu:myrdd.infoPacman99 * Then you can use agenix to encrypt the environment file with the secret information, and pass it along to the systemd service then you get access to that secret data in your config01:34:42
@ultranix:matrix.orgultranixthe part about hiding parts of your config is a niche case, but can be useful. but in that case, i suppose you'd import a private repo flake or something01:35:05

Show newer messages


Back to Room ListRoom Version: 6