nixos-config/modules/secrets.nix

155 lines
4.3 KiB
Nix
Raw Normal View History

2020-04-27 05:39:00 +04:00
{ pkgs, config, lib, inputs, ... }:
2020-02-17 17:00:59 +04:00
with lib;
with types;
let
2021-06-15 02:10:46 +04:00
password-store = "/home/balsoft/.local/share/password-store";
secret = { name, ... }: {
options = {
encrypted = mkOption {
type = path;
2021-06-15 02:10:46 +04:00
default = "${password-store}/${name}.gpg";
};
decrypted = mkOption {
type = path;
default = "/var/secrets/${name}";
};
decrypt = mkOption {
default = pkgs.writeShellScript "gpg-decrypt" ''
set -euo pipefail
export GPG_TTY="$(tty)"
${pkgs.gnupg}/bin/gpg-connect-agent updatestartuptty /bye 1>&2
${pkgs.gnupg}/bin/gpg --batch --no-tty --decrypt
'';
};
user = mkOption {
type = str;
default = "balsoft";
};
owner = mkOption {
type = str;
default = "root:root";
};
permissions = mkOption {
type = lib.types.addCheck lib.types.str
(perm: !isNull (builtins.match "[0-7]{3}" perm));
default = "400";
};
services = mkOption {
type = listOf str;
2021-03-16 22:34:46 +04:00
default = [ "${name}" ];
};
__toString = mkOption {
readOnly = true;
default = s: s.decrypted;
};
2020-04-29 03:18:36 +04:00
};
};
decrypt = name: cfg:
with cfg; {
"${name}-secrets" = rec {
2021-01-11 21:51:09 +04:00
requires = [ "user@1000.service" ];
after = requires;
preStart = ''
2021-01-11 21:51:09 +04:00
stat '${encrypted}'
mkdir -p '${builtins.dirOf decrypted}'
'';
script = ''
if cat '${encrypted}' | /run/wrappers/bin/sudo -u ${user} ${cfg.decrypt} > '${decrypted}.tmp'; then
mv -f '${decrypted}.tmp' '${decrypted}'
chown '${owner}' '${decrypted}'
chmod '${permissions}' '${decrypted}'
else
echo "Failed to decrypt the secret"
rm '${decrypted}.tmp'
if [[ -f '${decrypted}' ]]; then
echo "The decrypted file exists anyways, not failing"
exit 0
else
exit 1
fi
fi
'';
serviceConfig = {
Type = "oneshot";
RemainAfterExit = "yes";
2020-04-29 03:18:36 +04:00
};
2020-02-17 17:00:59 +04:00
};
};
addDependencies = name: cfg:
with cfg;
genAttrs services (service: rec {
2021-03-16 22:34:46 +04:00
requires = [ "${name}-secrets.service" ];
after = requires;
2021-01-11 21:51:09 +04:00
bindsTo = requires;
});
mkServices = name: cfg: [ (decrypt name cfg) (addDependencies name cfg) ];
2021-01-12 16:13:03 +04:00
2021-01-23 23:21:51 +04:00
allServices = toString (map (name: "${name}-envsubst.service")
2021-01-12 16:13:03 +04:00
(builtins.attrNames config.secrets-envsubst)
++ map (name: "${name}-secrets.service")
(builtins.attrNames config.secrets));
in {
2021-01-23 23:21:51 +04:00
options.secrets = lib.mkOption {
type = attrsOf (submodule secret);
default = { };
};
2021-06-12 02:21:24 +04:00
options.secretsConfig = {
repo = lib.mkOption {
type = str;
default = "ssh://git@github.com/balsoft/pass";
};
};
2021-01-11 21:51:09 +04:00
config.systemd.services =
mkMerge (concatLists (mapAttrsToList mkServices config.secrets));
config.environment.systemPackages = [
(pkgs.writeShellScriptBin "activate-secrets" ''
set -euo pipefail
# Make sure card is available and unlocked
echo fetch | gpg --card-edit --no-tty --command-fd=0
${pkgs.gnupg}/bin/gpg --card-status
2021-06-15 02:10:46 +04:00
if [ -d "${password-store}/.git" ]; then
cd "${password-store}"; ${pkgs.git}/bin/git pull
2021-01-11 21:51:09 +04:00
else
2021-06-15 02:10:46 +04:00
${pkgs.git}/bin/git clone ${lib.escapeShellArg config.secretsConfig.repo} "${password-store}"
2021-01-11 21:51:09 +04:00
fi
ln -sf ${
pkgs.writeShellScript "push" "${pkgs.git}/bin/git push origin master"
2021-06-15 02:10:46 +04:00
} "${password-store}/.git/hooks/post-commit"
cat ${password-store}/email/balsoft@balsoft.ru.gpg | ${pkgs.gnupg}/bin/gpg --decrypt > /dev/null
2021-01-12 16:13:03 +04:00
sudo systemctl restart ${allServices}
2021-01-11 21:51:09 +04:00
'')
];
config.security.sudo.extraRules = [{
users = [ "balsoft" ];
commands = [{
2021-01-12 16:13:03 +04:00
command = "/run/current-system/sw/bin/systemctl restart ${allServices}";
2021-01-11 21:51:09 +04:00
options = [ "NOPASSWD" ];
}];
}];
2021-06-08 20:35:21 +04:00
config.persist.derivative.directories =
2021-06-15 02:10:46 +04:00
[ "/var/secrets" password-store ];
2021-06-08 20:35:21 +04:00
config.home-manager.users.balsoft = {
wayland.windowManager.sway = {
2021-01-11 21:51:09 +04:00
config.startup = [{ command = "activate-secrets"; }];
2020-02-17 17:00:59 +04:00
};
2021-06-15 02:10:46 +04:00
programs.password-store = {
enable = true;
package = pkgs.pass-wayland;
settings.PASSWORD_STORE_DIR = password-store;
};
2020-02-17 17:00:59 +04:00
};
}