Replies: 22 comments 12 replies
-
I've been exploring possibly integrating agenix support, so that we can store encrypted secrets properly. More experimentation is needed. |
Beta Was this translation helpful? Give feedback.
-
I currently use |
Beta Was this translation helpful? Give feedback.
-
@blaggacao I’m curious what you meant by this. Would you be able to elaborate? Thanks! |
Beta Was this translation helpful? Give feedback.
-
Sure. Its direct manifestation is that sops has a separate yaml config file. I really like the agenix since it keeps the configuration domain within the (power of the) nix language entirely. @FlorianFranzen for practical reasons, I'll probably using git-crypt as provided currently by this repo, too. But I think agenix is really a very good idea for those inclined to try stuff out. I feel it has real chances to become the better alternative... |
Beta Was this translation helpful? Give feedback.
-
Personally, I'd just like to have secrets that aren't world readable when deployed. I'll still probably keep git-crypt available even if we do add support for agenix since they address separate concerns, i.e: git-crypt -> protects secrets stored in the repo Of course, I still have to experiment with agenix to see how well it delivers on this promise. |
Beta Was this translation helpful? Give feedback.
-
I researched a little. I seems at least conceivable in principle that agenix can extend its scope to support the git crypt use case in an unified way. |
Beta Was this translation helpful? Give feedback.
-
please, if anyone feels (more) competent / confident (than me), take over: ryantm/agenix#14 |
Beta Was this translation helpful? Give feedback.
-
There has been made an important argument here:
meaning |
Beta Was this translation helpful? Give feedback.
-
Is there any progress with secrets? I don't really care how it's done, but I would really like a solution integrated in this template. I've thought about doing something like sops-nix or something with pass? |
Beta Was this translation helpful? Give feedback.
-
@ymarkus, unfortunately not, but it's on the agenda. After reviewing the options, my prefered solution would use gopass, but I've yet to work out all the details. I'll have more time this month than last, so hopefully we can get this knocked out soon. |
Beta Was this translation helpful? Give feedback.
-
I don't quite understand this statement:
I was just investigating sops-nix after having lots of issues with git-crypt (maybe because I'm using an ed25519 gpg key) and it seemed like the most convenient option here. I'm not sure how a gopass based solution might work though. |
Beta Was this translation helpful? Give feedback.
-
Personal opinion: devos shouldn't include secrets management, outside of git-crypt - just to protect new users. secrets management is a very wide concern and everyone has different requirements. And with the extern folder, its really easy to set up stuff yourself. I was able to use agenix with my server, by just adding the input then the module in extern. Then I just followed agenix instructions with creating a secrets.nix file in the secrets folder. What could be useful is maybe adding documentation on how to integrate different secrets management tools with devos. |
Beta Was this translation helpful? Give feedback.
-
This question actually came up before. Expanding on my previous reply... From the asciinema animation on the github repo:
Hence, the tool was designed to do work on and as a function of an authoritative yaml/json file. I think |
Beta Was this translation helpful? Give feedback.
-
@blaggacao, I agree. I looked at sops and it didn't seem appealing for this project. Honestly, none of the options are absolutely ideal, and I keep wondering why Nix hasn't solved this problem by now, as it was one of the earliest issues opened on the GitHub tracker, some 9 years ago: NixOS/nix#8. I must be missing something important, because changing permissions inside the nix store, or perhaps having a separate nix/secret-store with secure permissions doesn't seem like it should be all that difficult. Alas... |
Beta Was this translation helpful? Give feedback.
-
https://github.com/FiloSottile/age/releases/tag/v1.0.0-rc.1 (breaking news 😸 ) |
Beta Was this translation helpful? Give feedback.
-
Thought fodder: After reading through this blog post, one realizes, this issue perfectly meats with #163 to shoot two birds with one shot. /cc @Xe |
Beta Was this translation helpful? Give feedback.
-
Don't want to be a bother, but I wanted to chime in and say for me personally having some solution for secrets is my biggest blocker for things like predictable mail setup on all machines, spotifyd setup on all machines, etc. What are others doing/using in the interim? I suppose I could setup another syncthing folder and do a readFile for these things but I'd hate to do that if we're close to a solution. It seems like it might be worth coming up with a temporary solution at this point though, so are there better ideas than mine? |
Beta Was this translation helpful? Give feedback.
-
I've been wanting this one more lately, so I just posted a $50 bounty for it 😃 |
Beta Was this translation helpful? Give feedback.
-
I think this is pretty much documentation. Let me know what you all think: #279 |
Beta Was this translation helpful? Give feedback.
-
I wanted to mention, that this discussion clarifies state of DevOS secret management better than the documentation page on secrets. From reading just the docs, it wasn't clear that git-crypt and agenix are independent methods and that I shouldn't be using them side by side. Judging by this thread, I understand that agenix supersedes git-crypt method and that the old method is only kept for backwards compatibility. Perhaps this should be reflected in the documentation, by explicitly mentioning that git-crypt is deprecated method and moving it's setup instructions to the bottom of page? |
Beta Was this translation helpful? Give feedback.
-
I'm surprised agenix is intended to be a full replacement for git-crypt. While agenix has the advantage of keeping secrets safe in /nix/store - the process of using it is a very cumbersome compared to git-crypt. git-crypt has the advantage of being fully transparent & very reliable. Knowing that even if I forget to use agenix, the secrets directory is protected is a very useful feature since many user's have their devos repos public. Currently agenix does not work with ssh agents and also changes the file hash on every rekey event (and just adding a file to the agenix system means you need to rekey as least that is the workflow I have seen & used). If these issues were fixed then maybe it would be just seamless as git-crypt but until then I think having both is necessary. I haven't had any issues using both together so I don't think it harms anything to keep the git-crypt examples & documentation. |
Beta Was this translation helpful? Give feedback.
-
Is your feature request related to a problem? Please describe.
I finally want to use age / rage.
Describe the solution you'd like
Something around those lines... (not well thought through)
Describe alternatives you've considered
none / sops, but sops has ugly configmgt domain overlap with nix.
Additional context
https://git-scm.com/docs/gitattributes
Want to back this issue? Post a bounty on it! We accept bounties via Bountysource.
Beta Was this translation helpful? Give feedback.
All reactions