-
Notifications
You must be signed in to change notification settings - Fork 102
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Secret management support #20
Comments
https://old.reddit.com/r/NixOS/comments/k0utpw/our_new_nix_deployment_tool_deployrs/gdktjit/ |
Some kind of functionality that will make this possible is definitely planned, either native, a plugin system, a simple hook system, or something else |
I'm using |
I've seen sops-nix but if I understand correctly, it requires me to put all secrets into one special file and won't play well with my existing password manager. I'll consider it as an option, but having all my secrets in one central password manager is a big plus for me. I imagine supporting the execution of a "password command" like |
Mechanically, sops (and by extension, sops-nix) is quite similar to pass: You check one or more encrypted files into your version control, and sops takes care of managing the "recipients" (both the users that can edit it, and the server identities that can decrypt it) for the secret. Similarly, sops-nix puts the encrypted file into the store, then an environment activation task uses the machine's credentials (ssh private key or KMS or other key provider) to decrypt the secrets into a ramfs mount in /run/secrets.d/. Understandable if you have a secret-management solution that works for you, though (and apologies for sounding dismissive earlier!): Better support for pass would definitely be useful. If you're looking to set up secrets in a new repo with deploy-rs right now, I do recommend sops-nix because it's really quite nice & well-supported by all tools, including krops&deploy-rs. |
Thanks for the info, I'll look into it! |
It might be a good idea to rely on other tools. sops-nix seems pretty good. And there is (or will be?) also agenix. |
Does agenix support ssh keys yet? It was a deal breaker for me. |
Looks like so: https://github.com/ryantm/agenix/blob/9eb981eeb552e0856cb562b7643b311933a0e992/pkgs/agenix.nix#L3 🚀 Christine's blog post does this nicely combine with a host metadata inventory file that basically holds all the cryptographic host identities ( |
Oh, sorry I misspoke. It supports ssh keys but not keys with passphrase. See ryantm/agenix#4 |
Just chiming in to say that I don't think deploy-rs needs to solve this issue; I just made a nice setup:
This is somewhat specific for our situation, but as you can see, deploy-rs would not really help here, it's an orthogonal problem. |
That's true. |
so if I'm understanding it correctly it's not recommended to use |
Id disagree. Secrets are not generational, and should not be rolled back with the rest of the system. They are state, not necessarily configuration. the deploy tool seems like a better place than the configuration manager for this. |
Like Nixus has.
The text was updated successfully, but these errors were encountered: