!XLCFfvFhUkYwOMLbVx:nixos.org

agenix

327 Members
age-encrypted secrets for NixOS https://github.com/ryantm/agenix/95 Servers

Load older messages


SenderMessageTime
9 Dec 2022
@pl1y:matrix.orgpl1ythere is currently a pull request, that would introduce templates, so one could specify a template with `@secret1@` template variables, and those would be replaced by the secrets, and handle the permissions.12:48:56
@pl1y:matrix.orgpl1yhave you thought about adding a more general "transform" attribute for each secret? you could specify a script there. agenix would then write the secret to the stdin of said script and write the scripts stdout to the file. this way also more complex transformations would be possible. perhaps agenix could even provide a default implementation of said script: the secret could be a toml/ini/json/yaml file that defines the variables, a command line argument of the script could point to a template. the default could be a simple `cat` that does not transform anything.12:53:30
@jhillyerd:matrix.orgjhillyerdI'd love to see something like this in agenix. I spent many hours getting templates working for myself, it definitely feels like advanced nix, and is a roadblock to adopting flake based nix deployments.17:30:01
11 Dec 2022
@da-ko:matrix.orgacire joined the room.08:11:08
@da-ko:matrix.orgacire

Hi! First wanna say thanks for happy years using agenix ^^

I just upgraded a NixOS host to 22.11 and in so doing updated the agenix flake input from rev. 7e5e58 (committed May 16). The result is unexpected: secrets are properly decrypted to the secrets mount point (i.e., to /run/agenix.d/<agenix generation>/<name>), but they are not properly symlinked to the secrets directory (/run/agenix) or to a custom path when specified. Instead, only a single symlink to the generation directory containing all the decrypted secrets (/run/agenix.d/<agenix generation>) is created in the secrets directory.

For example, with the following configuration (unchanged for several NixOS releases):

age.secrets."passwordFile".file = ./. + "/../../secrets/passwordFile.age";

users.users.me = {
  isNormalUser = true;
  passwordFile = config.age.secrets.passwordFile.path;
};

a rebuild generates the following output:

[agenix] creating new generation in /run/agenix.d/1
[agenix] decrypting secrets...
decrypting '/nix/store/<hash redacted>-passwordFile.age' to '/run/agenix.d/1/passwordFile'...
[agenix] symlinking new secrets to /run/agenix (generation 1)...
warning: password file ‘/run/agenix/passwordFile’ does not exist
[agenix] chowning...

and a listing of the resulting secrets directory is as follows:

$ ll /run/agenix
lrwxrwxrwx root root  1 -> /run/agenix.d/1

Since I haven't updated this host in a while, maybe there's a setting I missed? Thanks!

09:20:09
@ryantm:matrix.orgryantm acire: glad you've been happy with agenix up to this point! Do you want code that is doing anything with activation scripts in your config? 12:51:17
@ryantm:matrix.orgryantm* acire: glad you've been happy with agenix up to this point! Do you have any code that is doing anything with activation scripts in your config?12:51:40
@ryantm:matrix.orgryantmCan you show the dir listing for the /run/agenix.d/1 folder too?12:54:47
@ryantm:matrix.orgryantmAre you doing anything in your config with config.age.secretsDir?12:56:45
@da-ko:matrix.orgacire

ryantm: thanks for your reply!

  • I have one activation script in the configuration that ensures some directories exist, but nothing related to secrets.

  • /run/agenix.d/1 contains the decrypted secrets. E.g.:

    drwxr-x--x root keys .
    drwxr-x--x root keys ..
    -r-------- root root passwordFile
    
  • I'm using the default value of config.age.secretsDir.

13:42:36
@da-ko:matrix.orgacireRedacted or Malformed Event15:40:39
@da-ko:matrix.orgacirewhoops15:45:08
@da-ko:matrix.orgacire

I think I found the cause. This host is also using Impermanence with an ephemeral root, and there is one secret that was being decrypted by agenix and symlinked to a user-owned directory by Impermanence in the user's home-manager service. The configuration for that secret was as follows:

age.secrets."userSecret" = {
  file = ./. + "/../../secrets/userSecret.age";
  path = "${config.age.secretsDir}/.user-secrets/userSecret";
  mode = "0600";
  owner = "1000";
  group = "100";
};

Here is the home-manager configuration for symlinking the agenix-decrypted secret:

# Paths are relative to user's home directory
home.persistence."${nixosConfig.age.secretsDir}".files = [ ".user-secrets/userSecret" ];

Removing these blocks from the configuration and rebuilding (and rebooting) resulted in the creation of /run/agenix not as a directory but as a symlink itself to /run/agenix/<agenix generation>. This behavior in agenix is new to me and clearly incompatible with the above configuration. By selecting a custom path for the user secret outside of ${age.secretsDir}, everything now seems to work as expected.

In lieu of an agenix home-manager module, is there a best (or better) practice for linking decrypted secrets into user-owned directories?

15:54:55
@da-ko:matrix.orgacire *

I think I found the cause. This host is also using Impermanence with an ephemeral root, and there is one secret that was being decrypted by agenix and symlinked to a user-owned directory by Impermanence in the user's home-manager service. The configuration for that secret was as follows:

age.secrets."userSecret" = {
  file = ./. + "/../../secrets/userSecret.age";
  path = "${config.age.secretsDir}/.user-secrets/userSecret";
  mode = "0600";
  owner = "1000";
  group = "100";
};

Here is the home-manager configuration for symlinking the agenix-decrypted secret:

# Paths are relative to user's home directory
home.persistence."${nixosConfig.age.secretsDir}".files = [ ".user-secrets/userSecret" ];

Removing these blocks from the configuration and rebuilding (and rebooting) resulted in the creation of /run/agenix not as a directory but as a symlink itself to /run/agenix/<agenix generation>. This behavior in agenix is new to me and clearly incompatible with the above configuration. By selecting a custom path for the user secret outside of age.secretsDir, everything now seems to work as expected.

In lieu of an agenix home-manager module, is there a best (or better) practice for linking decrypted secrets into user-owned directories?

15:57:46
@da-ko:matrix.orgacire

By selecting a custom path for the user secret outside of age.secretsDir, everything now seems to work as expected.

...except that now the secret with the custom path exists both in /run/agenix (because it's just a symlink to /run/agenix.d/1) as well as at the custom path. It isn't a problem but potentially misleading.

16:04:37
12 Dec 2022
@id:ionode.netid changed their profile picture.05:03:28
14 Dec 2022
@fsx:matrix.org@fsx:matrix.org left the room.10:30:44
@nahfe:nahfe.xyzHerman changed their display name from NAHFE to Herman.10:53:57
@nahfe:nahfe.xyzHerman changed their display name from Herman to NAHFE.11:30:54
@nahfe:nahfe.xyzHerman changed their display name from NAHFE to Herman.11:33:02
@id:ionode.netid left the room.17:34:20
@id:ionode.netid joined the room.17:35:08
15 Dec 2022
@kraem:ne.bul.aekraem

hi, i can't seem to provision keys to a new system. getting this while switching to a new generation:

cp: cannot stat '/run/agenix/ssh_lb1_initrd_ed25519': No such file or directory
failed to create initrd secrets: No such file or directory

/run/agenix is empty as the generation hasn't been switched to, but it's needed to create the initrd secrets (if i understand correctly). is this a known issue? can't find it being discussed in the issues of the repo

21:54:47
@kraem:ne.bul.aekraem
sudo mkdir -p /run/agenix && sudo touch /run/agenix/ssh_lb1_initrd_ed25519 && switch_generation
# /run/agenix/1 and /run/agenix.d/1/ssh_lb1_initrd_ed25519 gets created
# but /run/agenix/ssh_lb1_initrd_ed25519 is still my empty file and i get the same error if switching generation after deleting it

note that i have no idea what i'm doing at this point 🙃

22:06:52
@kraem:ne.bul.aekraem ok i think i solved it by nix-collect-garbage -d && /run/current-system/bin/switch-to-configuration switch. it seems some old initrd secrets was the culprit? 22:44:53
16 Dec 2022
@ryantm:matrix.orgryantmI haven't really thought much about early boot secrets. What is this secret for?05:25:31
@kraem:ne.bul.aekraemthat particular secret is an ssh key used in initrd07:38:40
@kraem:ne.bul.aekraem it works sometimes after collecting garbage but still fails sometimes 07:40:06
17 Dec 2022
@dandellion:dodsorf.asDandellion joined the room.22:20:49
18 Dec 2022
@mlyx:matrix.orgmlyx joined the room.03:27:07

Show newer messages


Back to Room ListRoom Version: 6