agenix | 380 Members | |
| age-encrypted secrets for NixOS https://github.com/ryantm/agenix/ | 100 Servers |
| Sender | Message | Time |
|---|---|---|
| 26 Aug 2023 | ||
| 14:06:41 | ||
| 27 Aug 2023 | ||
| 12:45:40 | ||
| 21:22:17 | ||
| 29 Aug 2023 | ||
| 14:57:19 | ||
| Redacted or Malformed Event | 15:00:11 | |
| Hi, trying to get agenix working on aarch64-darwin. The rebuild appears to work fine but I cannot find the secret anywhere. I have this config;
The file /etc.webex-tui.secret does not exist after that. | 15:45:32 | |
| * Hi, trying to get agenix working on aarch64-darwin. The rebuild appears to work fine but I cannot find the secret anywhere. I have this config;
The file /etc.webex-tui.secret does not exist after that. | 15:46:10 | |
| If I remove the path line, I cannot see anything in
| 15:49:09 | |
| * Hi, trying to get agenix working on aarch64-darwin. The rebuild appears to work fine but I cannot find the secret anywhere. I have this config;
The file /etc/webex-tui.secret does not exist after that. | 15:55:16 | |
| 19:03:36 | ||
| 21:30:08 | ||
| 4 Sep 2023 | ||
| 22:55:55 | ||
| 7 Sep 2023 | ||
| 19:50:53 | ||
| 9 Sep 2023 | ||
| 12:14:48 | ||
| 10 Sep 2023 | ||
| 04:26:18 | ||
| 11:08:17 | ||
| 11 Sep 2023 | ||
| 01:26:54 | ||
| 12 Sep 2023 | ||
| 22:28:37 | ||
| 13 Sep 2023 | ||
| 10:34:19 | ||
| 19:10:53 | ||
| 14 Sep 2023 | ||
| 11:22:32 | ||
| 15 Sep 2023 | ||
| 05:57:33 | ||
| Hey everyone, having some issues with absolute paths:
My config looks like
Not sure if this is an agenix issue, but wondering if anyone has a resolution, RTFM hasn't been helping me :S | 05:59:36 | |
| Cannot comment on the error, but I'm pretty sure authorizedKeys is meant for public keys and not private keys. | 07:19:08 | |
| 07:56:49 | ||
| You're getting that error because all those paths in keyFiles are being read behind the scenes (via builtins.readFile) and when you readFile <path-outside-nix-store> you get that purity error. Also jeroen is right, you're not supposed to put private keys there. | 08:01:07 | |
| I'm actually wondering something related to this type of use case. Maybe this has been discussed before but lets say I *really* want to reference my decrypted secrets at evaluation time as strings and I don't care if they're globally readable from the nix store. Is there any way to decrypt a secret into the nix store via a derivation? I was looking at the experimental `impure-derivations` feature but I don't think it would work.My use case is using agenix to encrypt wireguard enpoint IP addresses for use with wg-quick. Unfortunately there's no way to reference the decrypted | 08:12:47 | |
| secret path at runtime because the IP address must be in the .conf file which is written to the store during evaluation. | 08:14:25 | |
| Currently I'm just using `lib.fileContents <secret>.path` which requires two rebuilds (first one fails, second one suceeds). It's not ideal and I'm wondering if there's any type of hack that could yield the decrypted secrets during nixos-rebuild. | 08:16:38 | |
| 09:39:32 | ||