SSH updates
This commit is contained in:
parent
74545072dd
commit
57090ccde1
12 changed files with 96 additions and 59 deletions
|
@ -17,6 +17,13 @@ export USERNAME=desired_username_for_admin_on_this_machine (josh)
|
||||||
- uncomment systemPackages and add: `git` `curl`
|
- uncomment systemPackages and add: `git` `curl`
|
||||||
- add `nix.settings.experimental-features = [ "nix-command" "flakes" ];`
|
- add `nix.settings.experimental-features = [ "nix-command" "flakes" ];`
|
||||||
- add `users.users.USERNAME = { ... todo, just enough to get to git clone the real nixos config into its home .config folder }
|
- add `users.users.USERNAME = { ... todo, just enough to get to git clone the real nixos config into its home .config folder }
|
||||||
|
```
|
||||||
|
users.users.josh = {
|
||||||
|
initialPassword = "password1";
|
||||||
|
isNormalUser = true;
|
||||||
|
extraGroups = [ "wheel" "networkmanager" "video" "input" ];
|
||||||
|
};
|
||||||
|
```
|
||||||
- TODO add whatever is needed for default pubkeys for onboarding later
|
- TODO add whatever is needed for default pubkeys for onboarding later
|
||||||
- Install nixos: `cd /mnt` `sudo nixos-install`
|
- Install nixos: `cd /mnt` `sudo nixos-install`
|
||||||
- `passwd` to change root password (if not already prompted to do so)
|
- `passwd` to change root password (if not already prompted to do so)
|
||||||
|
|
|
@ -18,6 +18,7 @@ let
|
||||||
];
|
];
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
|
# TODO come up with a rotate method/encrypt the device keys bette. This isn't very secure feeling to me the way I am doing this now. If anyone gains access to any one of my devices, then my secrets are no longer secret. This is not a good model.
|
||||||
"nix2github.age" = { inherit publicKeys; };
|
"nix2github.age" = { inherit publicKeys; };
|
||||||
"nix2bitbucket.age" = { inherit publicKeys; };
|
"nix2bitbucket.age" = { inherit publicKeys; };
|
||||||
}
|
}
|
||||||
|
|
|
@ -4,9 +4,4 @@
|
||||||
|
|
||||||
home.username = settings.user.username;
|
home.username = settings.user.username;
|
||||||
home.homeDirectory = "/home/${settings.user.username}";
|
home.homeDirectory = "/home/${settings.user.username}";
|
||||||
|
|
||||||
imports = ylib.umport {
|
|
||||||
paths = [ ./programs ];
|
|
||||||
recursive = true;
|
|
||||||
};
|
|
||||||
}
|
}
|
15
users/_common/home_manager/ssh.nix
Normal file
15
users/_common/home_manager/ssh.nix
Normal file
|
@ -0,0 +1,15 @@
|
||||||
|
{ age, ... }:
|
||||||
|
{
|
||||||
|
programs.ssh = {
|
||||||
|
enable = true;
|
||||||
|
matchBlocks = {
|
||||||
|
"github.com" = {
|
||||||
|
identityFile = age.secrets.nix2github.path;
|
||||||
|
};
|
||||||
|
"bitbucket.org" = {
|
||||||
|
identityFile = age.secrets.nix2bitbucket.path;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
30
users/_common/nix_modules/ssh-key.nix
Normal file
30
users/_common/nix_modules/ssh-key.nix
Normal file
|
@ -0,0 +1,30 @@
|
||||||
|
{ settings, pkgs, ... }:
|
||||||
|
let
|
||||||
|
sshScript = pkgs.writeScript "ssh-key-generation" ''
|
||||||
|
#!${pkgs.stdenv.shell}
|
||||||
|
if [ ! -f /home/${settings.user.username}/.ssh/id_ed25519]; then
|
||||||
|
if [ -v DRY_RUN ]; then
|
||||||
|
echo "DRY_RUN is set. Would generate SSH key for ${settings.user.username}."
|
||||||
|
else
|
||||||
|
echo "Generating SSH key for ${settings.user.username}."
|
||||||
|
mkdir -p /home/${settings.user.username}/.ssh
|
||||||
|
chmod 700 /home/${settings.user.username}/.ssh
|
||||||
|
/run/current-system/sw/bin/ssh-keygen -t ed25519 -f /home/${settings.user.username}/.ssh/id_ed25519-N ""
|
||||||
|
fi
|
||||||
|
else
|
||||||
|
echo "SSH key already exists for ${settings.user.username}."
|
||||||
|
fi
|
||||||
|
'';
|
||||||
|
in
|
||||||
|
{
|
||||||
|
# Ensure SSH key pair generation for non-root users
|
||||||
|
systemd.services.generate_ssh_key = {
|
||||||
|
description = "Generate SSH key pair for ${settings.user.username}";
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
serviceConfig = {
|
||||||
|
User = "${settings.user.username}";
|
||||||
|
Type = "oneshot";
|
||||||
|
ExecStart = sshScript;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
|
@ -1,31 +0,0 @@
|
||||||
{ lib, settings, age, pkgs, ... } @ args:
|
|
||||||
{
|
|
||||||
# We always want a standard ssh key-pair used for secret management, create it if not there.
|
|
||||||
home.activation.generateSshKey = lib.hm.dag.entryAfter [ "writeBoundary" ] ''
|
|
||||||
if [ ! -f $HOME/.ssh/id_ed25519 ]; then
|
|
||||||
if [ -v DRY_RUN ]; then
|
|
||||||
echo "DRY_RUN is set. Would generate SSH key for ${settings.user.username}."
|
|
||||||
else
|
|
||||||
echo "Generating SSH key for ${settings.user.username}."
|
|
||||||
mkdir -p $HOME/.ssh
|
|
||||||
chmod 700 $HOME/.ssh
|
|
||||||
${pkgs.openssh}/bin/ssh-keygen -t ed25519 -f $HOME/.ssh/id_ed25519 -N ""
|
|
||||||
fi
|
|
||||||
else
|
|
||||||
echo "SSH key already exists for ${settings.user.username}."
|
|
||||||
fi
|
|
||||||
'';
|
|
||||||
|
|
||||||
programs.ssh = {
|
|
||||||
enable = true;
|
|
||||||
matchBlocks = {
|
|
||||||
"github.com" = {
|
|
||||||
identityFile = age.secrets.nix2github.path;
|
|
||||||
};
|
|
||||||
"bitbucket.org" = {
|
|
||||||
identityFile = age.secrets.nix2bitbucket.path;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
0
users/_common/readme.md
Normal file
0
users/_common/readme.md
Normal file
|
@ -1,33 +1,37 @@
|
||||||
{ config, lib, ylib, pkgs, settings, ... } @ args:
|
{ lib, ylib, settings, ... }:
|
||||||
{
|
{
|
||||||
users.users.${settings.user.username} = {
|
imports =
|
||||||
initialPassword = "password1";
|
[ ]
|
||||||
isNormalUser = true;
|
## Common nix modules
|
||||||
extraGroups = [ "wheel" "networkmanager" "video" "input" ];
|
++ ylib.umport {
|
||||||
shell = pkgs.zsh;
|
path = lib.fileset.maybeMissing (settings.usersDir + "/_common/nix_modules");
|
||||||
};
|
recursive = true;
|
||||||
|
}
|
||||||
# TODO how to do this from home manager file instead
|
# Nix modules for this user
|
||||||
environment.pathsToLink = [ "/share/zsh" ];
|
++ ylib.umport {
|
||||||
programs.zsh = {
|
path = lib.fileset.maybeMissing ./nix_modules;
|
||||||
enable = true;
|
recursive = true;
|
||||||
};
|
}
|
||||||
|
# Nix modules by host for this user
|
||||||
imports = ylib.umport {
|
++ ylib.umport {
|
||||||
path = lib.fileset.maybeMissing ./by_hosts/${settings.system.hostname}/nix_modules;
|
path = lib.fileset.maybeMissing ./by_hosts/${settings.system.hostname}/nix_modules;
|
||||||
recursive = true;
|
recursive = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
home-manager.users.${settings.user.username} = {
|
home-manager.users.${settings.user.username} = {
|
||||||
imports =
|
imports =
|
||||||
# Common settings all users share
|
[ ]
|
||||||
[ (settings.usersDir + "/_common/home.nix") ]
|
# Common home manager
|
||||||
# Programs
|
|
||||||
++ ylib.umport {
|
++ ylib.umport {
|
||||||
path = ./home_manager;
|
path = lib.fileset.maybeMissing (settings.usersDir + "/_common/home_manager");
|
||||||
recursive = true;
|
recursive = true;
|
||||||
}
|
}
|
||||||
# Programs by host
|
# Home manger for this user
|
||||||
|
++ ylib.umport {
|
||||||
|
path = lib.fileset.maybeMissing ./home_manager;
|
||||||
|
recursive = true;
|
||||||
|
}
|
||||||
|
# Home manager by host for this user
|
||||||
++ ylib.umport {
|
++ ylib.umport {
|
||||||
path = lib.fileset.maybeMissing ./by_hosts/${settings.system.hostname}/home_manager;
|
path = lib.fileset.maybeMissing ./by_hosts/${settings.system.hostname}/home_manager;
|
||||||
recursive = true;
|
recursive = true;
|
||||||
|
|
16
users/josh/nix_modules/_user.nix
Normal file
16
users/josh/nix_modules/_user.nix
Normal file
|
@ -0,0 +1,16 @@
|
||||||
|
{ pkgs, settings, ... }:
|
||||||
|
{
|
||||||
|
users.users.${settings.user.username} = {
|
||||||
|
initialPassword = "password1";
|
||||||
|
isNormalUser = true;
|
||||||
|
extraGroups = [ "wheel" "networkmanager" "video" "input" ];
|
||||||
|
shell = pkgs.zsh;
|
||||||
|
};
|
||||||
|
|
||||||
|
# TODO how to do this from home manager file instead
|
||||||
|
environment.pathsToLink = [ "/share/zsh" ];
|
||||||
|
programs.zsh = {
|
||||||
|
enable = true;
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue