Sender | Message | Time |
---|---|---|
9 Dec 2022 | ||
there is currently a pull request, that would introduce templates, so one could specify a template with `@secret1@` template variables, and those would be replaced by the secrets, and handle the permissions. | 12:48:56 | |
have you thought about adding a more general "transform" attribute for each secret? you could specify a script there. agenix would then write the secret to the stdin of said script and write the scripts stdout to the file. this way also more complex transformations would be possible. perhaps agenix could even provide a default implementation of said script: the secret could be a toml/ini/json/yaml file that defines the variables, a command line argument of the script could point to a template. the default could be a simple `cat` that does not transform anything. | 12:53:30 | |
I'd love to see something like this in agenix. I spent many hours getting templates working for myself, it definitely feels like advanced nix, and is a roadblock to adopting flake based nix deployments. | 17:30:01 | |
11 Dec 2022 | ||
08:11:08 | ||
Hi! First wanna say thanks for happy years using agenix ^^ I just upgraded a NixOS host to 22.11 and in so doing updated the agenix flake input from rev. For example, with the following configuration (unchanged for several NixOS releases):
a rebuild generates the following output:
and a listing of the resulting secrets directory is as follows:
Since I haven't updated this host in a while, maybe there's a setting I missed? Thanks! | 09:20:09 | |
acire: glad you've been happy with agenix up to this point! Do you want code that is doing anything with activation scripts in your config? | 12:51:17 | |
* acire: glad you've been happy with agenix up to this point! Do you have any code that is doing anything with activation scripts in your config? | 12:51:40 | |
Can you show the dir listing for the /run/agenix.d/1 folder too? | 12:54:47 | |
Are you doing anything in your config with config.age.secretsDir? | 12:56:45 | |
ryantm: thanks for your reply!
| 13:42:36 | |
Redacted or Malformed Event | 15:40:39 | |
whoops | 15:45:08 | |
I think I found the cause. This host is also using Impermanence with an ephemeral root, and there is one secret that was being decrypted by agenix and symlinked to a user-owned directory by Impermanence in the user's home-manager service. The configuration for that secret was as follows:
Here is the home-manager configuration for symlinking the agenix-decrypted secret:
Removing these blocks from the configuration and rebuilding (and rebooting) resulted in the creation of In lieu of an agenix home-manager module, is there a best (or better) practice for linking decrypted secrets into user-owned directories? | 15:54:55 | |
* I think I found the cause. This host is also using Impermanence with an ephemeral root, and there is one secret that was being decrypted by agenix and symlinked to a user-owned directory by Impermanence in the user's home-manager service. The configuration for that secret was as follows:
Here is the home-manager configuration for symlinking the agenix-decrypted secret:
Removing these blocks from the configuration and rebuilding (and rebooting) resulted in the creation of In lieu of an agenix home-manager module, is there a best (or better) practice for linking decrypted secrets into user-owned directories? | 15:57:46 | |
...except that now the secret with the custom path exists both in | 16:04:37 | |
12 Dec 2022 | ||
05:03:28 | ||
14 Dec 2022 | ||
10:30:44 | ||
10:53:57 | ||
11:30:54 | ||
11:33:02 | ||
17:34:20 | ||
17:35:08 | ||
15 Dec 2022 | ||
hi, i can't seem to provision keys to a new system. getting this while switching to a new generation:
| 21:54:47 | |
note that i have no idea what i'm doing at this point 🙃 | 22:06:52 | |
ok i think i solved it by nix-collect-garbage -d && /run/current-system/bin/switch-to-configuration switch . it seems some old initrd secrets was the culprit? | 22:44:53 | |
16 Dec 2022 | ||
I haven't really thought much about early boot secrets. What is this secret for? | 05:25:31 | |
that particular secret is an ssh key used in initrd | 07:38:40 | |
it works sometimes after collecting garbage but still fails sometimes | 07:40:06 | |
17 Dec 2022 | ||
22:20:49 | ||
18 Dec 2022 | ||
03:27:07 |