1.3 KiB
1.3 KiB
ECP-0061: agenix Secrets (Local Dev Convenience)
Status: Draft
Goal
Provide a simple, repo-native way to manage a small set of long-lived tokens for local development without committing plaintext secrets:
- Cloudflare API token (local
wrangler deploy) - Codeberg token (optional; for
teaCLI)
Non-Goals
- CI secrets management (CI should use Forgejo Actions secrets).
- A general secret distribution scheme for the network protocol.
Proposal
- Add
secrets/usingagenix:secrets/secrets.nixmaps secret filenames to recipients.- Encrypted files (optional, not required to exist):
secrets/cloudflare-api-token.agesecrets/codeberg-token.age
- Add tools to the nix dev shell:
agenixtea(Forgejo/Gitea-compatible CLI)
- Update scripts to use these secrets opportunistically:
scripts/deploy-workers.shloadsCLOUDFLARE_API_TOKENviaagenix -dwhen present.scripts/tea-login-codeberg.shconfiguresteausingCODEBERG_TOKEN(env) oragenix.
Rationale
agenix keeps sensitive tokens out of git while still being easy to use on a single machine.
CI remains clean and auditable by using the platform's secret store.
Rollout / Reversibility
- Additive. If a developer doesn't use
agenix, nothing breaks. - Easy to remove later if a different secret system is adopted.