agenix | 358 Members | |
| age-encrypted secrets for NixOS https://github.com/ryantm/agenix/ | 91 Servers |
| Sender | Message | Time |
|---|---|---|
| 27 Dec 2025 | ||
| 13:30:50 | ||
| 22:34:34 | ||
| Hi all, I was wondering if its possible that
apparently the above does not work so far. | 22:36:57 | |
| https://github.com/FiloSottile/age/releases/tag/v1.3.0 | 22:37:11 | |
In reply to @hexa:lossy.networkhttps://github.com/NixOS/nixpkgs/pull/474666 | 23:58:31 | |
| 28 Dec 2025 | ||
| reviewed it, looks nice | 00:11:29 | |
| (updated to 1.3.1 and removed the version patch) | 12:46:40 | |
| 23:09:41 | ||
| 29 Dec 2025 | ||
I'm trying to run agenix with age-tpm (again) and it doesn't seem to decrypt secrets on reboot. they do decrypt on nixos-rebuild switch | 17:30:55 | |
* I'm trying to run agenix with age-tpm (again) and it doesn't seem to decrypt secrets on reboot. they do decrypt on nixos-rebuild switch | 17:31:15 | |
| a ha: | 18:16:50 | |
| maybe the TPM isn't available this early in boot? | 18:18:31 | |
cause /run/current-system/activate works | 18:38:12 | |
boot.initrd.availableKernelModules = ["tpm_crb" "tpm_tis"]; did the trick! | 18:51:22 | |
| 30 Dec 2025 | ||
| 14:47:18 | ||
| 17:10:28 | ||
| I already put this in #impermanence:nixos.org ftr. is there an elegant solution to the sort of 'conflict' between Agenix and Impermanence? That being, Agenix uses the host keys in /etc/ssh before Impermanence fetches the persistant directory /etc/ssh. This leads Agenix to fail. The solution I've found is not pretty; it mounts /nix/persist (my persistant directory) to /btrfs_tmp/root/nix before copying /btrfs_tmp/root/nix/persist/etc/ssh to /btrfs_tmp/root/etc/ssh. This arrangement is showcased in https://git.mtgmonkey.net/Andromeda/conf/src/commit/0468cf2621e8ef812f774bbf2eed396b4c0d4602 in machines/lenovo and is what I am currently using. | 17:12:48 | |
| 23:38:40 | ||
| 23:40:10 | ||
| 31 Dec 2025 | ||
In reply to @andromeda:tchncs.de why not just
full disclosure i haven't yet tried this | 17:01:08 | |
| 18:15:00 | ||
| okay, i just did this and it does work! | 18:27:02 | |
| what I can't figure out is how to make sure my user pw gets set at install time... I guess you kind of can't | 18:33:35 | |
You probably want to just use hashedPassword | 18:37:48 | |
In reply to @k900:0upti.meI'm using hashedPasswordFile = config.age.secrets.password.path; is that not right | 19:00:24 | |
| oh I guess you mean for a totally unencrypted hash. | 19:17:52 | |
| encrypting a hash feels a bit redundant 🤔 | 19:35:05 | |
In reply to @hexa:lossy.networkworried about future attacks against the hash. but i can put it in my private flake only and its prob fine | 20:00:38 | |
| if they build on the same primitive then that's not much help | 20:06:09 | |
| though age supports pq things since very recently | 20:06:25 | |