You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The documentation indicates we should avoid builtins.readFile anti-pattern as the encrypted plain-text secrets to be placed into the world-readable Nix store.
# home.nixnix={settings=rec{access-tokens="github.com=${config.age.secrets."nix-configuration-github-token".path}";# https://nix.dev/manual/nix/2.25/command-ref/conf-file.html#conf-access-tokens};};# age.nixage={secretsDir="${config.home.homeDirectory}/.agenix/agenix";# Defaults to /run/agenix directory. # https://github.com/ryantm/agenix?tab=readme-ov-file#agesecretsdirsecretsMountPoint="${config.home.homeDirectory}/.agenix/agenix.d";# Defaults to /run/agenix.d directory. # https://github.com/ryantm/agenix?tab=readme-ov-file#agesecretsmountpoint};
The above code builds the following configuration correctly.
The documentation indicates we should avoid
builtins.readFile
anti-pattern as the encrypted plain-text secrets to be placed into the world-readable Nix store.The above code builds the following configuration correctly.
How can we read the file content of the unencrypted token securely, as shown below?
Appreciate any helpful suggestions.
The text was updated successfully, but these errors were encountered: