added agenix article

This commit is contained in:
Thorn Avery 2021-06-02 01:37:40 +00:00
parent e951f992c1
commit 840816034b
4 changed files with 48 additions and 4 deletions

View File

@ -17,3 +17,4 @@ i would like to create a module producing function that means i dont have to man
## rest of the wiki ## rest of the wiki
* [programs](./wiki/programs/index.md) * [programs](./wiki/programs/index.md)
* [agenix](./secrets/index.md)

View File

@ -24,7 +24,7 @@
# enable secrets in the store # enable secrets in the store
agenix.nixosModules.age agenix.nixosModules.age
(import ./secrets) (import ./secrets { inherit agenix; })
# enable flakes or we'll be sad # enable flakes or we'll be sad
(import ./modules/flakes) (import ./modules/flakes)
@ -65,7 +65,6 @@
nixpkgs.overlays = [ nixpkgs.overlays = [
swatch.overlay swatch.overlay
vim.overlay vim.overlay
agenix.overlay
(import ./overlays/picom.nix) (import ./overlays/picom.nix)
]; ];
nix.registry.nixpkgs.flake = nixpkgs; nix.registry.nixpkgs.flake = nixpkgs;

View File

@ -1,9 +1,12 @@
{ { agenix, ... }: {
nixpkgs = {
overlays = [ agenix.overlay ];
};
age = { age = {
secrets = { secrets = {
secret1.file = ./secret1.age; secret1.file = ./secret1.age;
}; };
# sshKeyPaths = [ ../keys ]; # sshKeyPaths = [ "../keys/id_ed25519" ];
sshKeyPaths = [ "/home/thorn/.ssh/id_ed25519" ]; sshKeyPaths = [ "/home/thorn/.ssh/id_ed25519" ];
}; };
} }

41
secrets/index.md Normal file
View File

@ -0,0 +1,41 @@
# Agenix Secrets
[return to index](../index.md)
this folder primarily deals with secrets within our nixos system. to do so we make use of the [agenix module](https://github.com/ryantm/agenix), which will be described below.
## enabling agenix within your system
the agenix flake provides a module, and a command line tool, we will need both for this.
in our `nixosSystem` definition (currently in [flake.nix](../flake.nix)), we add the module `agenix.nixosModules.age` to the `modules` list, as well as import the `secrets` directory, which contains information about how to decrypt our files, and the encrypted files themselves.
[default.nix](./default.nix) in our secrets directory also adds the `agenix` overlay to nixpkgs, allowing access to the `agenix` cli tool (TODO: thread `pkgs` into this file so we can add it here instead of the user profile).
## encrypting a file
[secrets.nix](./secrets.nix) contains an attribute set of each file that is encrypted, and the public keys of the keys that can decrypt them.
in addition to `publicKeys`, it is also possible to set the `mode`, `owner`, `group` - relating to permissions, as well as the `path`, which controls where the decrypted secret is placed on the filesystem (if none is specified, it defaults to /run/secrets, however keep in mind on a lot of systems this directory wont persist through reboots).
the `agenix` cli tool requires this file to be in the working directory, so once we have it we can run:
```
EDITOR=vim agenix -e secrets1.age
```
where `secrets1.age` is the name of a file defined in `secrets.nix`.
once these have been commited to the repo, nix will be able to decrypt them at build time.
## decrypting a file
in [default.nix](./default.nix) we define the `age` module settings. the important bits here are to give the location of each secrets file (we must have one for each line in `secrets.nix`, as well as the path (or paths) to the private keys we can use to decrypt them. These keys will have to be present in the system in order for a rebuild to succeed, so i have added a folder `keys` to the gitignore so we have a place to put keys needed to rebuild, without uploading them to the repo.
on rebuild, agenix will decrypt each secret, and place its contents at either the specified path, or in /run/secrets. meanwhile in the git repo, we only store the encrypted `.age` file, and in the nix store (which is globally readable by any user on the system) we store the encrypted `.age` file, whereas (unless otherwise specified) the decrypted files are readable by `root` only.
please note, also, that if using a password protected private key, you will need to type in the password for each file encrypted using it, at every rebuild, so it can be useful to generate a passwordless key for use with `agenix`
## further TODO
* add example of using the deccrypted secret in a safe way.