!XLCFfvFhUkYwOMLbVx:nixos.org

agenix

385 Members
age-encrypted secrets for NixOS https://github.com/ryantm/agenix/104 Servers

Load older messages


SenderMessageTime
29 Oct 2023
@charles:computer.surgeryCharles ⚡️ the goal is to have a systemd restartTriggers for a service that uses an agenix secret, and this does work, but it restarts every time instead of just when it changes 04:38:43
@charles:computer.surgeryCharles ⚡️ maybe i should builtins.readFile it so the restartTriggers just has the ciphertext? 04:39:39
@charles:computer.surgeryCharles ⚡️no that doesn't work because the contents can't be a nix string04:42:07
@charles:computer.surgeryCharles ⚡️ builtins.hashFileing it worked 04:49:19
@jacekpoz:jacekpoz.pljacekpoz 11:13:09
@jacekpoz:jacekpoz.pljacekpoz 11:13:14
@jacekpoz:jacekpoz.pljacekpoz 11:58:31
@jacekpoz:jacekpoz.pljacekpoz 11:58:40
@jacekpoz:jacekpoz.pljacekpoz 13:45:23
@jacekpoz:jacekpoz.pljacekpoz 13:45:31
@jacekpoz:jacekpoz.pljacekpoz 17:43:51
@jacekpoz:jacekpoz.pljacekpoz 17:43:59
@jacekpoz:jacekpoz.pljacekpoz 17:45:02
@jacekpoz:jacekpoz.pljacekpoz 20:54:25
@jacekpoz:jacekpoz.pljacekpoz 20:54:34
31 Oct 2023
@peter-lustig:matrix.orgpeter-lustig

If I have two hosts, laptop and personal computer that should be able to do remote deployments to a server, how should the top section of this secrets.nix file look like? I do the deployments with nixos-rebuild --target-host, and I am a bit confused on how I would achieve this:

let
  server = "";
in
{
  "hedgedoc-environment-file.age".publicKeys = [ server ];
  "discord-bot-token.age".publicKeys = [ server ];
}
09:15:32
@k900:0upti.meK900 ⚡️The server's SSH host key09:20:56
@peter-lustig:matrix.orgpeter-lustig
In reply to @k900:0upti.me
The server's SSH host key
just the public key of the server?
09:23:36
@k900:0upti.meK900 ⚡️Yes09:23:44
@peter-lustig:matrix.orgpeter-lustigbut if i want to do remote deployments do I not need the public keys of the machines as well09:24:09
@peter-lustig:matrix.orgpeter-lustiglaptop and pc09:24:12
@k900:0upti.meK900 ⚡️No09:24:19
@k900:0upti.meK900 ⚡️Well09:24:21
@k900:0upti.meK900 ⚡️It depends on whether you want to edit those files in the future09:24:31
@peter-lustig:matrix.orgpeter-lustig
In reply to @k900:0upti.me
It depends on whether you want to edit those files in the future
i guess I would just ssh onto the server and then do the agenix -e stuff
09:24:51
@k900:0upti.meK900 ⚡️You can always reencrypt to the server's host key if you want09:24:56
@k900:0upti.meK900 ⚡️ You just won't be able to decrypt the existing contents not on the server 09:25:12
@jeroen:simonetti.nljeroen
In reply to @k900:0upti.me
No, how would it work then
I thought it might use the ssh-agent, but this confirms my suspicion, thank you!
09:33:47
@peter-lustig:matrix.orgpeter-lustig

K900 ⚡️: i got [agenix] creating new generation in /run/agenix.d/1
[agenix] decrypting secrets...
decrypting '/nix/store/426r27dfbgqaw3kn8sa78xk25148rbvb-hedgedoc-environment-file.age' to '/run/agenix.d/1/hedgedoc-environment-file'...
Error: No matching keys found

on my server

22:47:50
@peter-lustig:matrix.orgpeter-lustigbut server public key and user public key is stored in secret.nix22:48:03

Show newer messages


Back to Room ListRoom Version: 6