-
Notifications
You must be signed in to change notification settings - Fork 123
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
RFC: agenix-rs tool #23
Comments
Cool, I'll have to take a closer look soon. The reason I chose to use Nix instead of Yaml (like |
Or maybe a better example is, I have some monit certificate PEM file that is a secret that I want to distribute to all my servers, so, I'd like to maintain a list of servers, and not have to remember to update the the monit secret's list every time. |
Is your concern with the |
Would a [identities]
admin1 = "ssh-ed25519 ...."
admin2 = "ssh-ed25519 ...."
[groups]
machine1Admins = [ "admin1", "admin2" ]
[[paths]]
glob = "monit"
groups = [ "machine1Admins" ] That would be pretty easy to implement. |
Yep! Another reason I was going toward the .nix approach is because I have to keep a attrset of public keys in Nix too for NixOS configuration, but Nix can read TOML files, so that shouldn't matter. |
That's one thing I didn't like about |
cole-h/agenix-cli@79707b6 implements the desired groups functionality. |
@cole-h Do you already have nix expressions for integrating agenix-rs with the agenix repo? I'd like to try it out! |
I just pushed a |
I believe that is correct. I'd be glad to accept a PR implementing that. Hopefully the code is clean / easy (enough) to read, but feel free to ask for help / pointers! |
Note that on the other end with |
@kanashimia Interesting. I think this approach is making you vulnerable to rekeying your secrets based on GitHub (or someone infiltrating GitHub) adding additional public keys to that file. With the rust version, you could achieve the same effect by writing a wrapper script that generates the TOML file on the fly. |
I just learned about https://github.com/yaxitech/ragenix from @veehaitch @vtuan10 . Would share your opinion about why you like using Nix expressions for specifying your secret rules? |
Some considerations which come to my mind:
|
Is this still being considered? Certainly seems like it would have some advantages. If not should we close? @cole-h looks like last commit was about a year ago? |
I don't mind either way. I'll continue to use agenix-cli, and will gladly accept any PRs that come to my attention :) |
Over the past few weeks, I've been working on a replacement for the shell script
agenix
tool, written in Rust. I've published it at https://github.com/cole-h/agenix-rs/.I really like how
sops-nix
has thesops
tool to edit binaries and then encrypt them to the proper recipients based on path globs specified in a config file, and I really dislike how theagenix
script required asecrets.nix
file for the identities.I'm hoping for any and all feedback on it, and in the future it would be nice to replace the
agenix
shell script withagenix-rs
.The text was updated successfully, but these errors were encountered: