manage secrets properly #16
Loading…
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
I have to think carefully about how to manage secrets here. My go-to has typically been agenix, which is quite popular and integrates well with NixOS. I have not carefully evaluated its security profile though.
Options:
Robert had a thought about how to structure this when we met the other day. Which is to have a unified nixos module that Expressed the Need for a secret, without defining where that secret comes from. Then different secret-providing systems can plug into that and provide the secret.
I had a thought about how to go about this. I'm not totally sold on this yet, it's just the first thing to come to mind.
We add the submodule
secrets.<name>
which has the common options needed to define how the secret will be used: owner, group, and the output path. When you want to use a secret you setNow the different secrets-providers can provide whatever options they want
as long as they take into account the owner and group, and set the output path, they can work however they want, and the user gets a consistent interface, so they can even migrate secret systems fairly painlessly.