-
Notifications
You must be signed in to change notification settings - Fork 119
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add home-manager module #180
Merged
Merged
Changes from all commits
Commits
Show all changes
7 commits
Select commit
Hold shift + click to select a range
9274b82
Add home-manager module
ambroisie 1f43d94
Add home-manager input
ambroisie 0155c57
Test home-manager module
ambroisie 3fbc22f
Install user keys in Darwin tests
n8henrie 19bf5a2
Clean-up Darwin integration test
n8henrie 50743bd
Add darwin tests for home-manager module
n8henrie 6b4ff3d
Check darwin home-manager test in CI
n8henrie File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,234 @@ | ||
{ | ||
config, | ||
options, | ||
lib, | ||
pkgs, | ||
... | ||
}: | ||
with lib; let | ||
cfg = config.age; | ||
|
||
ageBin = lib.getExe config.age.package; | ||
|
||
newGeneration = '' | ||
_agenix_generation="$(basename "$(readlink "${cfg.secretsDir}")" || echo 0)" | ||
(( ++_agenix_generation )) | ||
echo "[agenix] creating new generation in ${cfg.secretsMountPoint}/$_agenix_generation" | ||
mkdir -p "${cfg.secretsMountPoint}" | ||
chmod 0751 "${cfg.secretsMountPoint}" | ||
mkdir -p "${cfg.secretsMountPoint}/$_agenix_generation" | ||
chmod 0751 "${cfg.secretsMountPoint}/$_agenix_generation" | ||
''; | ||
|
||
setTruePath = secretType: '' | ||
${ | ||
if secretType.symlink | ||
then '' | ||
_truePath="${cfg.secretsMountPoint}/$_agenix_generation/${secretType.name}" | ||
'' | ||
else '' | ||
_truePath="${secretType.path}" | ||
'' | ||
} | ||
''; | ||
|
||
installSecret = secretType: '' | ||
${setTruePath secretType} | ||
echo "decrypting '${secretType.file}' to '$_truePath'..." | ||
TMP_FILE="$_truePath.tmp" | ||
|
||
IDENTITIES=() | ||
# shellcheck disable=2043 | ||
for identity in ${toString cfg.identityPaths}; do | ||
test -r "$identity" || continue | ||
IDENTITIES+=(-i) | ||
IDENTITIES+=("$identity") | ||
done | ||
|
||
test "''${#IDENTITIES[@]}" -eq 0 && echo "[agenix] WARNING: no readable identities found!" | ||
|
||
mkdir -p "$(dirname "$_truePath")" | ||
[ "${secretType.path}" != "${cfg.secretsDir}/${secretType.name}" ] && mkdir -p "$(dirname "${secretType.path}")" | ||
( | ||
umask u=r,g=,o= | ||
test -f "${secretType.file}" || echo '[agenix] WARNING: encrypted file ${secretType.file} does not exist!' | ||
test -d "$(dirname "$TMP_FILE")" || echo "[agenix] WARNING: $(dirname "$TMP_FILE") does not exist!" | ||
LANG=${config.i18n.defaultLocale or "C"} ${ageBin} --decrypt "''${IDENTITIES[@]}" -o "$TMP_FILE" "${secretType.file}" | ||
) | ||
chmod ${secretType.mode} "$TMP_FILE" | ||
mv -f "$TMP_FILE" "$_truePath" | ||
|
||
${optionalString secretType.symlink '' | ||
[ "${secretType.path}" != "${cfg.secretsDir}/${secretType.name}" ] && ln -sfn "${cfg.secretsDir}/${secretType.name}" "${secretType.path}" | ||
''} | ||
''; | ||
|
||
testIdentities = | ||
map | ||
(path: '' | ||
test -f ${path} || echo '[agenix] WARNING: config.age.identityPaths entry ${path} not present!' | ||
'') | ||
cfg.identityPaths; | ||
|
||
cleanupAndLink = '' | ||
_agenix_generation="$(basename "$(readlink "${cfg.secretsDir}")" || echo 0)" | ||
(( ++_agenix_generation )) | ||
echo "[agenix] symlinking new secrets to ${cfg.secretsDir} (generation $_agenix_generation)..." | ||
ln -sfn "${cfg.secretsMountPoint}/$_agenix_generation" "${cfg.secretsDir}" | ||
|
||
(( _agenix_generation > 1 )) && { | ||
echo "[agenix] removing old secrets (generation $(( _agenix_generation - 1 )))..." | ||
rm -rf "${cfg.secretsMountPoint}/$(( _agenix_generation - 1 ))" | ||
} | ||
''; | ||
|
||
installSecrets = builtins.concatStringsSep "\n" ( | ||
["echo '[agenix] decrypting secrets...'"] | ||
++ testIdentities | ||
++ (map installSecret (builtins.attrValues cfg.secrets)) | ||
++ [cleanupAndLink] | ||
); | ||
|
||
secretType = types.submodule ({ | ||
config, | ||
name, | ||
... | ||
}: { | ||
options = { | ||
name = mkOption { | ||
type = types.str; | ||
default = name; | ||
description = '' | ||
Name of the file used in ''${cfg.secretsDir} | ||
''; | ||
}; | ||
file = mkOption { | ||
type = types.path; | ||
description = '' | ||
Age file the secret is loaded from. | ||
''; | ||
}; | ||
path = mkOption { | ||
type = types.str; | ||
default = "${cfg.secretsDir}/${config.name}"; | ||
description = '' | ||
Path where the decrypted secret is installed. | ||
''; | ||
}; | ||
mode = mkOption { | ||
type = types.str; | ||
default = "0400"; | ||
description = '' | ||
Permissions mode of the decrypted secret in a format understood by chmod. | ||
''; | ||
}; | ||
symlink = mkEnableOption "symlinking secrets to their destination" // {default = true;}; | ||
}; | ||
}); | ||
|
||
mountingScript = let | ||
app = pkgs.writeShellApplication { | ||
name = "agenix-home-manager-mount-secrets"; | ||
runtimeInputs = with pkgs; [coreutils]; | ||
text = '' | ||
${newGeneration} | ||
${installSecrets} | ||
exit 0 | ||
''; | ||
}; | ||
in | ||
lib.getExe app; | ||
|
||
userDirectory = dir: let | ||
inherit (pkgs.stdenv.hostPlatform) isDarwin; | ||
baseDir = | ||
if isDarwin | ||
then "$(getconf DARWIN_USER_TEMP_DIR)" | ||
else "$XDG_RUNTIME_DIR"; | ||
in "${baseDir}/${dir}"; | ||
|
||
userDirectoryDescription = dir: '' | ||
"$XDG_RUNTIME_DIR"/${dir} on linux or "$(getconf DARWIN_USER_TEMP_DIR)"/${dir} on darwin. | ||
''; | ||
in { | ||
options.age = { | ||
package = mkPackageOption pkgs "rage" {}; | ||
|
||
secrets = mkOption { | ||
type = types.attrsOf secretType; | ||
default = {}; | ||
description = '' | ||
Attrset of secrets. | ||
''; | ||
}; | ||
|
||
identityPaths = mkOption { | ||
type = types.listOf types.path; | ||
default = [ | ||
"${config.home.homeDirectory}/.ssh/id_ed25519" | ||
"${config.home.homeDirectory}/.ssh/id_rsa" | ||
]; | ||
defaultText = litteralExpression '' | ||
[ | ||
"''${config.home.homeDirectory}/.ssh/id_ed25519" | ||
"''${config.home.homeDirectory}/.ssh/id_rsa" | ||
] | ||
''; | ||
description = '' | ||
Path to SSH keys to be used as identities in age decryption. | ||
''; | ||
}; | ||
|
||
secretsDir = mkOption { | ||
type = types.str; | ||
default = userDirectory "agenix"; | ||
defaultText = userDirectoryDescription "agenix"; | ||
description = '' | ||
Folder where secrets are symlinked to | ||
''; | ||
}; | ||
|
||
secretsMountPoint = mkOption { | ||
default = userDirectory "agenix.d"; | ||
defaultText = userDirectoryDescription "agenix.d"; | ||
description = '' | ||
Where secrets are created before they are symlinked to ''${cfg.secretsDir} | ||
''; | ||
}; | ||
}; | ||
|
||
config = mkIf (cfg.secrets != {}) { | ||
assertions = [ | ||
{ | ||
assertion = cfg.identityPaths != []; | ||
message = "age.identityPaths must be set."; | ||
} | ||
]; | ||
|
||
systemd.user.services.agenix = lib.mkIf pkgs.stdenv.hostPlatform.isLinux { | ||
Unit = { | ||
Description = "agenix activation"; | ||
}; | ||
Service = { | ||
Type = "oneshot"; | ||
ExecStart = mountingScript; | ||
}; | ||
Install.WantedBy = ["default.target"]; | ||
}; | ||
|
||
launchd.agents.activate-agenix = { | ||
ryantm marked this conversation as resolved.
Show resolved
Hide resolved
|
||
enable = true; | ||
config = { | ||
ProgramArguments = [mountingScript]; | ||
KeepAlive = { | ||
Crashed = false; | ||
SuccessfulExit = false; | ||
}; | ||
RunAtLoad = true; | ||
ProcessType = "Background"; | ||
StandardOutPath = "${config.home.homeDirectory}/Library/Logs/agenix/stdout"; | ||
StandardErrorPath = "${config.home.homeDirectory}/Library/Logs/agenix/stderr"; | ||
}; | ||
}; | ||
}; | ||
} |
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Probably because of this, usually
legacyPackages
is followed by the system, so maybe this should be:There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
genAttrs
already prefixes it with the system.There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hmm, right, so it should be because flake-utils-plus assume anything containing
legacyPackages
will also containx86-64-linux
inside. I'll create an issue there.