Weil es letztes Jahr beim #Tübix2025 so gut angekommen war, mache ich wohl beim #Tübix2026 sogar zwei
#NixOS workshops:
1. Workshop: Einstieg, Motivation, Killer Features, Basics
2. Workshop: Deep Dive ins Nixos-Modulsystem, schreiben eigener Module, secrets management mit #agenix, vllt. Live-Deployment auf einen
#RaspberryPi vor Ort
Was meint ihr?
Secret provisioning in #nix
Many options in nix for authentication only accept files and not string
Whereas #Unix #pass show just give a string , even if you store it in some file it ll be mutable and not reproducible, hence I end up with #age #agenix #sops
and none of them re interoperable with pass which is my daily driver
So I need store them somewhere safe on #vps or #cloud or idk mod/wrap these these things for interoperability *, or seek some #nocloud solution.
What's the simplest option me ?
* Its more work then reward , since I am not an active community contributor, just a user ,
#it folks ?
How are people who use #agenix solving passing secrets to modules that don't take a path? I'm specifically looking at my Prometheus config where I need to configure a bearer token for a scrape job, and API tokens in the Alertmanager configuration. All of these just take strings.
I guess you can lib.readFile the decrypted file which is frowned upon, but there's no other users on the system so I guess having it in the clear in the store is less of an issue.