-
-
Notifications
You must be signed in to change notification settings - Fork 14.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Sourcehut secrets #126090
Comments
implement it upstream? |
@tomberek Are you planning on implementing this? I can't really use the current module without giving all users on my system access to the keys (they can obviously read the nix store) and also I keep my nixos configs in public repository, which currently would expose the secret to the world.
I think this is the way to go, there are other examples of modules doing this in nixpgks, I think the mattermost module does something similar using the |
@tomberek Another option that would be possible without too much rework: We could just add an option to use a predefined settings file. In addition to to |
Being worked on in 133984. |
Is there an option to read keys from a file so that they don't end up in the nix store? Something similar to what wireguard has:
networking.wireguard.interfaces.<name>.privateKeyFile
instead ofnetworking.wireguard.interfaces.<name>.privateKey
?Originally posted by @pinpox in #113244 (comment)
What's the best way to do this? TOML nor sourcehut allow a "from file" ability. So next best option is to have a
config.ini.template
in/etc/sr.ht
and a service that fills in the details imperatively into the actualconfig.ini
from non-nix-store'd files prior to services starting?The text was updated successfully, but these errors were encountered: