!XLCFfvFhUkYwOMLbVx:nixos.org

agenix

359 Members
age-encrypted secrets for NixOS https://github.com/ryantm/agenix/92 Servers

Load older messages


SenderMessageTime
3 Nov 2025
@goodlander:matrix.orggoodlanderRedacted or Malformed Event03:30:46
@goodlander:matrix.orggoodlanderI added a host to my flake intended to build an installer iso to help make bootstrapping new systems with my config easier. My approach is that I'm just copying one of the plaintext ssh keys used as an agenix identity into the isos global store and then placing it with environment.etc; this is just a personal installer iso afterall and I can manage it without leaking the key in my config. I then set this location as an age.identityPath however it didn't seem to work the way I'd hoped. Nothing managed by agenix was decrypted. Has anyone done something like this before? Is the plan sound?03:37:48
@kttns0ut:matrix.org@kttns0ut:matrix.org joined the room.10:15:12
4 Nov 2025
@whispers:catgirl.cloudwhispers [& it/fae] joined the room.20:07:21
@dawnofmidnight:catgirl.cloud@dawnofmidnight:catgirl.cloud left the room.20:07:27
6 Nov 2025
@nhnn:nhnn.devnhnn changed their profile picture.15:13:58
@nhnn:nhnn.devnhnn changed their profile picture.15:18:37
7 Nov 2025
@emma:rory.gay@emma:rory.gay left the room.22:44:12
9 Nov 2025
@pixie:kludgecs.comfaye joined the room.13:35:35
@pixie:kludgecs.comfaye Hey, I hadn't touched my configuration in a while and now whenever I rebuild I get the following:
decrypting '/nix/store/kifxdc5xbd91csl70giasl45kv07fmrm-incubator' to '/run/agenix.d/35/incubator'...
decrypting '/nix/store/z4rx6vnsp0in6i2bv8vq7j9gpmx8ai3h-wakapi-conf' to '/run/agenix.d/35/waka-conf'...
age: error: failed to obtain passphrase: could not read passphrase for "/home/akemi/.ssh/drainpixie": standard input is not a terminal, and /dev/tty is not available: open /dev/tty: no such device or address
age: report unexpected or unhelpful errors at https://filippo.io/age/report
age: error: failed to obtain passphrase: could not read passphrase for "/home/akemi/.ssh/drainpixie": standard input is not a terminal, and /dev/tty is not available: open /dev/tty: no such device or address
age: report unexpected or unhelpful errors at https://filippo.io/age/report
chmod: cannot access '/run/agenix.d/35/waka-conf.tmp'chmod: cannot access '/run/agenix.d/35/incubator.tmp': No such file or directory
: No such file or directory
mv: cannot stat '/run/agenix.d/35/waka-conf.tmp': No such file or directory
mv: cannot stat '/run/agenix.d/35/incubator.tmp': No such file or directory
[agenix] symlinking new secrets to /run/agenix (generation 35)...
[agenix] removing old secrets (generation 34)...
[agenix] chowning...
chown: cannot access '/run/agenix.d/35/incubator': No such file or directory
chown: cannot access '/run/agenix.d/35/waka-conf': No such file or directory

This is my secrets.nix, for reference:
let
  # Omitted for brevity
in {
  "wakapi-salt".publicKeys = allUsers ++ [systems.incubator];

  "wakapi-conf".publicKeys = allUsers ++ [systems.timeline];
  "incubator".publicKeys = allUsers ++ [systems.timeline];
}
I can decrypt manually with the agenix cli just fine as long as I specificy the key with --identity
13:39:17
@pixie:kludgecs.comfaye Ok so I just found this and after running nix flake update agenix it is now finally prompting for my passphrase again... 13:41:49
@k900:0upti.meK900FWIW doing interactive things in activation scripts is very much not a good idea13:59:53
@k900:0upti.meK900And will probably continue exploding absolutely horribly14:00:02
@pixie:kludgecs.comfaye Meaning I should get rid of the passphrase entirely? 14:00:33
@pixie:kludgecs.comfayeThat was on my to-do list frankly, I just haven't got around to switch yet14:00:59
@k900:0upti.meK900iff you want to use it with agenix, yes14:01:07
@pixie:kludgecs.comfaye* That was on my to-do list frankly, I just haven't got around to switching yet14:01:07
12 Nov 2025
@inayet:matrix.orgInayet changed their display name from inayet to Inayet.12:37:03
16 Nov 2025
@kttns0ut:matrix.org@kttns0ut:matrix.org left the room.19:29:40
17 Nov 2025
@sylk0s:matrix.orgSylkos joined the room.20:16:28
18 Nov 2025
@eschguy:matrix.org@eschguy:matrix.org left the room.20:47:57
19 Nov 2025
@tioan:tchncs.detioan joined the room.19:38:35
20 Nov 2025
@user12592851:matrix.orgJohn joined the room.05:37:45
21 Nov 2025
@jappie:jappie.devjappie joined the room.17:01:57
@isabel:isabelroses.comisabel changed their profile picture.18:14:24
23 Nov 2025
@aliarokapis:matrix.orgAlexandros LiarokapisHi there. Is there an actual security advantage of not keeping secrets decrypted at rest say at /var/lib/agenix/secrets or similar and instead decrypting on startup? What is the threat model here exactly? If they could get access to /var/lib/agenix/secrets or similar they should also be able to get access to private decryption keys23:12:11
@k900:0upti.meK900 You still need to redecrypt on activation 23:14:09
@k900:0upti.meK900 And activation generally runs before everything else. 23:14:17
@k900:0upti.meK900So it doesn't really matter in practice23:14:27
@k900:0upti.meK900 I feel like a better question is, what are you trying to do where this difference matters? 23:15:25

Show newer messages


Back to Room ListRoom Version: 6