!XLCFfvFhUkYwOMLbVx:nixos.org

agenix

380 Members
age-encrypted secrets for NixOS https://github.com/ryantm/agenix/100 Servers

Load older messages


SenderMessageTime
28 Mar 2023
@qverkk:matrix.orgqverkkcan we use keepass with agenix?18:53:19
@ryantm:matrix.orgryantmHallucinations18:56:22
@qverkk:matrix.orgqverkkyeah thats waht i thought, couldnt find anything about this on github XD18:57:54
@qverkk:matrix.orgqverkkaltho it would be nice to use an existing keepassxc db for nixos secrets18:58:20
@raphi:tapesoftware.netraphichatgpt output is wrong unless proven otherwise19:01:10
29 Mar 2023
@jeroen:simonetti.nljeroen does anyone have a hint as to why my agenix does not decrypt secrets at boot, but works fine after a rebuild switch? 16:39:16
@cole-h:matrix.orgcole-hHard to tell without logs but sounds like a secret path may not be available at boot16:41:46
@jeroen:simonetti.nljeroen what kind of logs would I need to look at? I still have the system at fresh boot state, so /run/agenix is empty 16:42:34
@cole-h:matrix.orgcole-h The activation logs should be in dmesg / journalctl -k somewhere 16:43:05
@jeroen:simonetti.nljeroen age secret files are under /etc/nixos so should be available 16:43:28
@jeroen:simonetti.nljeroenhmm, I think it's cause the system has it's ssh keys somewhere else16:44:22
@cole-h:matrix.orgcole-hThere's an option for that IIRC.16:46:02
@jeroen:simonetti.nljeroen

the ssh host keys are on a persistant zfs volume which is not yet available at decrypt time ...

[agenix] WARNING: config.age.identityPaths entry /persist/system/etc/ssh/ssh_host_ed25519_key not present!
16:46:11
@jeroen:simonetti.nljeroen *

the ssh host keys are on a persistant zfs volume filesystem which is not yet available at decrypt time ...

[agenix] WARNING: config.age.identityPaths entry /persist/system/etc/ssh/ssh_host_ed25519_key not present!
16:47:44
@cole-h:matrix.orgcole-hMight be able to get it to work by marking that fs as neededForBoot (a NixOS option)16:48:37
@jeroen:simonetti.nljeroentnx, I'll give that a go16:54:56
30 Mar 2023
@jeroen:simonetti.nljeroenthat actually fixed it15:19:08
31 Mar 2023
@j0lol:the-apothecary.clubj0 joined the room.18:42:05
5 Apr 2023
@craige:mcwhirter.iocraige joined the room.00:04:43
* @craige:mcwhirter.iocraige waves00:06:14
@craige:mcwhirter.iocraige

Is anyone able to clarify the context of, for example user1 in the tutorial?

https://github.com/ryantm/agenix#tutorial

Are those intended to be on a remote host user (for decryption) or a local user for key management?

I think it's the latter but I just wanted that clarified.

Thanks 🙂

00:09:14
@ryantm:matrix.orgryantmUser1 is intended to be the user who is encrypting secrets locally and the remotely deploying them.00:13:34
@ryantm:matrix.orgryantmTo system1 and system200:13:56
@craige:mcwhirter.iocraigeExcellent. Thanks Ryan 🙂00:14:14
10 Apr 2023
@tjcater:matrix.orgKaijuBacon joined the room.07:24:54
@digital:fairydust.spacedigital (fav:she/they) joined the room.20:40:48
11 Apr 2023
@jeroen:simonetti.nljeroenIs there any best practise on how to use agenix combined with nixos containers? (the systemd based one)08:06:34
@jeroen:simonetti.nljeroenbind mounts sound out of the question, as that would expose all system secrets to the container08:07:48
@uep:matrix.orguepI'm going to state an assumption: if you put the agenix bits for secret handling in the config of the container, to use the secrets as part of the config for some service within the container, then it should just work as intended: those secrets will be decrypted in the context of the container by its systemd units etc.09:22:59
@uep:matrix.orguepit would be a separate host with a separate key that would need to exist, etc.09:23:40

Show newer messages


Back to Room ListRoom Version: 6