SSH updates

This commit is contained in:
RingOfStorms (Joshua Bell) 2024-04-25 10:47:21 -05:00
parent 74545072dd
commit 57090ccde1
12 changed files with 96 additions and 59 deletions

View file

@ -17,6 +17,13 @@ export USERNAME=desired_username_for_admin_on_this_machine (josh)
- uncomment systemPackages and add: `git` `curl`
- add `nix.settings.experimental-features = [ "nix-command" "flakes" ];`
- add `users.users.USERNAME = { ... todo, just enough to get to git clone the real nixos config into its home .config folder }
```
users.users.josh = {
initialPassword = "password1";
isNormalUser = true;
extraGroups = [ "wheel" "networkmanager" "video" "input" ];
};
```
- TODO add whatever is needed for default pubkeys for onboarding later
- Install nixos: `cd /mnt` `sudo nixos-install`
- `passwd` to change root password (if not already prompted to do so)

View file

@ -18,6 +18,7 @@ let
];
in
{
# TODO come up with a rotate method/encrypt the device keys bette. This isn't very secure feeling to me the way I am doing this now. If anyone gains access to any one of my devices, then my secrets are no longer secret. This is not a good model.
"nix2github.age" = { inherit publicKeys; };
"nix2bitbucket.age" = { inherit publicKeys; };
}

View file

@ -4,9 +4,4 @@
home.username = settings.user.username;
home.homeDirectory = "/home/${settings.user.username}";
imports = ylib.umport {
paths = [ ./programs ];
recursive = true;
};
}

View file

@ -0,0 +1,15 @@
{ age, ... }:
{
programs.ssh = {
enable = true;
matchBlocks = {
"github.com" = {
identityFile = age.secrets.nix2github.path;
};
"bitbucket.org" = {
identityFile = age.secrets.nix2bitbucket.path;
};
};
};
}

View file

@ -0,0 +1,30 @@
{ settings, pkgs, ... }:
let
sshScript = pkgs.writeScript "ssh-key-generation" ''
#!${pkgs.stdenv.shell}
if [ ! -f /home/${settings.user.username}/.ssh/id_ed25519]; then
if [ -v DRY_RUN ]; then
echo "DRY_RUN is set. Would generate SSH key for ${settings.user.username}."
else
echo "Generating SSH key for ${settings.user.username}."
mkdir -p /home/${settings.user.username}/.ssh
chmod 700 /home/${settings.user.username}/.ssh
/run/current-system/sw/bin/ssh-keygen -t ed25519 -f /home/${settings.user.username}/.ssh/id_ed25519-N ""
fi
else
echo "SSH key already exists for ${settings.user.username}."
fi
'';
in
{
# Ensure SSH key pair generation for non-root users
systemd.services.generate_ssh_key = {
description = "Generate SSH key pair for ${settings.user.username}";
wantedBy = [ "multi-user.target" ];
serviceConfig = {
User = "${settings.user.username}";
Type = "oneshot";
ExecStart = sshScript;
};
};
}

View file

@ -1,31 +0,0 @@
{ lib, settings, age, pkgs, ... } @ args:
{
# We always want a standard ssh key-pair used for secret management, create it if not there.
home.activation.generateSshKey = lib.hm.dag.entryAfter [ "writeBoundary" ] ''
if [ ! -f $HOME/.ssh/id_ed25519 ]; then
if [ -v DRY_RUN ]; then
echo "DRY_RUN is set. Would generate SSH key for ${settings.user.username}."
else
echo "Generating SSH key for ${settings.user.username}."
mkdir -p $HOME/.ssh
chmod 700 $HOME/.ssh
${pkgs.openssh}/bin/ssh-keygen -t ed25519 -f $HOME/.ssh/id_ed25519 -N ""
fi
else
echo "SSH key already exists for ${settings.user.username}."
fi
'';
programs.ssh = {
enable = true;
matchBlocks = {
"github.com" = {
identityFile = age.secrets.nix2github.path;
};
"bitbucket.org" = {
identityFile = age.secrets.nix2bitbucket.path;
};
};
};
}

0
users/_common/readme.md Normal file
View file

View file

@ -1,33 +1,37 @@
{ config, lib, ylib, pkgs, settings, ... } @ args:
{ lib, ylib, settings, ... }:
{
users.users.${settings.user.username} = {
initialPassword = "password1";
isNormalUser = true;
extraGroups = [ "wheel" "networkmanager" "video" "input" ];
shell = pkgs.zsh;
};
# TODO how to do this from home manager file instead
environment.pathsToLink = [ "/share/zsh" ];
programs.zsh = {
enable = true;
};
imports = ylib.umport {
path = lib.fileset.maybeMissing ./by_hosts/${settings.system.hostname}/nix_modules;
recursive = true;
};
imports =
[ ]
## Common nix modules
++ ylib.umport {
path = lib.fileset.maybeMissing (settings.usersDir + "/_common/nix_modules");
recursive = true;
}
# Nix modules for this user
++ ylib.umport {
path = lib.fileset.maybeMissing ./nix_modules;
recursive = true;
}
# Nix modules by host for this user
++ ylib.umport {
path = lib.fileset.maybeMissing ./by_hosts/${settings.system.hostname}/nix_modules;
recursive = true;
};
home-manager.users.${settings.user.username} = {
imports =
# Common settings all users share
[ (settings.usersDir + "/_common/home.nix") ]
# Programs
[ ]
# Common home manager
++ ylib.umport {
path = ./home_manager;
path = lib.fileset.maybeMissing (settings.usersDir + "/_common/home_manager");
recursive = true;
}
# Programs by host
# Home manger for this user
++ ylib.umport {
path = lib.fileset.maybeMissing ./home_manager;
recursive = true;
}
# Home manager by host for this user
++ ylib.umport {
path = lib.fileset.maybeMissing ./by_hosts/${settings.system.hostname}/home_manager;
recursive = true;

View file

@ -0,0 +1,16 @@
{ pkgs, settings, ... }:
{
users.users.${settings.user.username} = {
initialPassword = "password1";
isNormalUser = true;
extraGroups = [ "wheel" "networkmanager" "video" "input" ];
shell = pkgs.zsh;
};
# TODO how to do this from home manager file instead
environment.pathsToLink = [ "/share/zsh" ];
programs.zsh = {
enable = true;
};
}