Use sops for secrets #38
Labels
No labels
affects/hardware
affects/legal
affects/reproducibility
affects/security
affects/style
affects/usability
blocked by/release 21.05
blocked by/release 21.11
blocked by/release 22.05
blocked by/testing needed
blocked by/testing needed/fuuko
blocked by/testing needed/sayuri
blocked by/upstream
resolution
deferred
resolution
permanent workaround
resolution
upstream wontfix
resolution
wontfix
type
bug
type
chore
type
feature
type
new machine
type
question
type
regression
type
tracking
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: simon/nixos-config#38
Loading…
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
“Secrets” currently managed with git-crypt will remain unaffected, since they aren’t used for secrets, but for configuration that stores sensitive private user data (like mail addresses, password hashes) and has to be available at build time.
/etc/ssh
)/etc/
in backups/root
)/root
in backupsOriginal content refering to agenix:
Use agenix for secrets. This removes the dependency on password-store and stores secrets encrypted to the target ssh host key in the nix store. This makes the deployment more reproducible, as there is no depdency on an external repository.
Since I don’t (yet) want to make all my ssh keys passwordless, I will be using age’s own keys.
Use agenix for secretsto Use sops for secrets