mirror of
https://github.com/itme-brain/nixos.git
synced 2026-03-23 16:29:42 -04:00
Add machines.keys config and reorganize key structure
- Add config.machines.keys for machine-specific keys (private keys live on that machine) - Move desktop SSH key to machines.keys.desktop.ssh - Fix extractName to preserve "yubikey" (only strip .key/.pub extensions) - Rename key files for clarity (android -> graphone, primary -> yubikey) - Add age yubikey key for encrypted backups - Add README files to document key purposes - Update all machine configs to import system config
This commit is contained in:
parent
570a321e53
commit
960904cbd9
24 changed files with 94 additions and 20 deletions
14
src/system/config/default.nix
Normal file
14
src/system/config/default.nix
Normal file
|
|
@ -0,0 +1,14 @@
|
|||
{ lib, pkgs, config, ... }:
|
||||
|
||||
with lib;
|
||||
{
|
||||
options = {
|
||||
machines = mkOption {
|
||||
description = "Machine Configurations";
|
||||
type = types.attrs;
|
||||
default = {
|
||||
keys = import ./keys { inherit lib; };
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
||||
33
src/system/config/keys/default.nix
Normal file
33
src/system/config/keys/default.nix
Normal file
|
|
@ -0,0 +1,33 @@
|
|||
{ lib }:
|
||||
|
||||
with builtins;
|
||||
let
|
||||
extractName = filename:
|
||||
let
|
||||
# Remove .key extension
|
||||
noKey = lib.removeSuffix ".key" filename;
|
||||
# Remove .pub/.priv/.public/.private markers
|
||||
noMarkers = replaceStrings
|
||||
[ ".pub" ".priv" ".public" ".private" ]
|
||||
[ "" "" "" "" ]
|
||||
noKey;
|
||||
in noMarkers;
|
||||
|
||||
constructKeys = dir: (
|
||||
listToAttrs (
|
||||
map (subdir: {
|
||||
name = subdir;
|
||||
value = listToAttrs (
|
||||
map (file: {
|
||||
name = extractName file;
|
||||
value = readFile "${dir}/${subdir}/${file}";
|
||||
}) (filter (file:
|
||||
(readDir "${dir}/${subdir}").${file} == "regular" &&
|
||||
lib.hasSuffix ".key" file
|
||||
) (attrNames (readDir "${dir}/${subdir}")))
|
||||
);
|
||||
}) (filter (node: (readDir dir).${node} == "directory") (attrNames (readDir dir)))
|
||||
)
|
||||
);
|
||||
in
|
||||
constructKeys ./.
|
||||
3
src/system/config/keys/desktop/README.md
Normal file
3
src/system/config/keys/desktop/README.md
Normal file
|
|
@ -0,0 +1,3 @@
|
|||
# Desktop Keys
|
||||
|
||||
ssh.pub.key - ~/.ssh/id_rsa
|
||||
|
|
@ -3,6 +3,7 @@
|
|||
{
|
||||
imports = [
|
||||
../../../user/config
|
||||
../../config
|
||||
./hardware.nix
|
||||
./system.nix
|
||||
./modules/disko
|
||||
|
|
|
|||
|
|
@ -13,7 +13,7 @@ in
|
|||
isNormalUser = true;
|
||||
extraGroups = config.user.groups
|
||||
++ [ "video" "audio" "kvm" "libvirtd" "dialout" ];
|
||||
openssh.authorizedKeys.keys = [ "${config.user.keys.ssh.android}" ];
|
||||
openssh.authorizedKeys.keys = [ "${config.user.keys.ssh.graphone}" ];
|
||||
};
|
||||
};
|
||||
|
||||
|
|
|
|||
|
|
@ -3,6 +3,7 @@
|
|||
{
|
||||
imports = [
|
||||
../../../user/config
|
||||
../../config
|
||||
./hardware.nix
|
||||
./system.nix
|
||||
];
|
||||
|
|
|
|||
|
|
@ -12,13 +12,12 @@
|
|||
backup = {
|
||||
enable = true;
|
||||
recipients = [
|
||||
# TODO: Add your age recipients
|
||||
# "${config.user.keys.age.yubikey}"
|
||||
# "${config.user.keys.ssh.desktop}"
|
||||
"${config.user.keys.age.yubikey}"
|
||||
"${config.machines.keys.desktop.ssh}"
|
||||
];
|
||||
destination = "gdrive:backups/server"; # TODO: configure rclone remote
|
||||
schedule = "daily";
|
||||
keepLast = 7;
|
||||
keepLast = 2;
|
||||
};
|
||||
};
|
||||
|
||||
|
|
@ -27,7 +26,7 @@
|
|||
isNormalUser = true;
|
||||
extraGroups = config.user.groups;
|
||||
openssh.authorizedKeys.keys = [
|
||||
"${config.user.keys.ssh.desktop}"
|
||||
"${config.machines.keys.desktop.ssh}"
|
||||
];
|
||||
};
|
||||
};
|
||||
|
|
|
|||
|
|
@ -3,6 +3,7 @@
|
|||
{
|
||||
imports = [
|
||||
../../../user/config
|
||||
../../config
|
||||
./hardware.nix
|
||||
./system.nix
|
||||
];
|
||||
|
|
|
|||
|
|
@ -8,7 +8,7 @@
|
|||
${config.user.name} = {
|
||||
isNormalUser = true;
|
||||
extraGroups = config.user.groups;
|
||||
openssh.authorizedKeys.keys = [ "${config.user.keys.ssh.primary}" ];
|
||||
openssh.authorizedKeys.keys = [ "${config.user.keys.ssh.yubikey}" ];
|
||||
};
|
||||
};
|
||||
|
||||
|
|
|
|||
|
|
@ -3,6 +3,7 @@
|
|||
{
|
||||
imports = [
|
||||
../../../user/config
|
||||
../../config
|
||||
./hardware.nix
|
||||
./system.nix
|
||||
];
|
||||
|
|
|
|||
|
|
@ -10,7 +10,7 @@ with lib;
|
|||
extraGroups = config.user.groups
|
||||
++ [ "video" "audio" "kvm" "libvirtd" "dialout" ];
|
||||
openssh.authorizedKeys.keys = [
|
||||
"${config.user.keys.ssh.primary}"
|
||||
"${config.user.keys.ssh.yubikey}"
|
||||
"${config.user.keys.ssh.work}"
|
||||
];
|
||||
};
|
||||
|
|
|
|||
|
|
@ -3,6 +3,7 @@
|
|||
{
|
||||
imports = [
|
||||
../../../user/config
|
||||
../../config
|
||||
./system.nix
|
||||
];
|
||||
}
|
||||
|
|
|
|||
|
|
@ -9,8 +9,7 @@
|
|||
isNormalUser = true;
|
||||
extraGroups = config.user.groups;
|
||||
openssh.authorizedKeys.keys = [
|
||||
"${config.user.keys.ssh.primary}"
|
||||
"${config.user.keys.ssh.windows}"
|
||||
"${config.user.keys.ssh.yubikey}"
|
||||
];
|
||||
};
|
||||
};
|
||||
|
|
|
|||
|
|
@ -14,7 +14,7 @@ in
|
|||
name = "bryan";
|
||||
email = "bryan@ramos.codes";
|
||||
shell = bash;
|
||||
keys = import ./keys;
|
||||
keys = import ./keys { inherit lib; };
|
||||
|
||||
groups = [ "wheel" "networkmanager" "home-manager" "input" ];
|
||||
bookmarks = import ./bookmarks;
|
||||
|
|
|
|||
3
src/user/config/keys/age/README.md
Normal file
3
src/user/config/keys/age/README.md
Normal file
|
|
@ -0,0 +1,3 @@
|
|||
# Age Keys
|
||||
|
||||
yubikey.pub.key - Cold storage backup for age encryption
|
||||
1
src/user/config/keys/age/yubikey.pub.key
Normal file
1
src/user/config/keys/age/yubikey.pub.key
Normal file
|
|
@ -0,0 +1 @@
|
|||
age1yubikey1qfapxqnnkh92zkgayzzm9n0gtpkwaqcvrzy4d4xa4rxnjua8vjhy72hh9r9
|
||||
|
|
@ -1,13 +1,17 @@
|
|||
{ lib }:
|
||||
|
||||
with builtins;
|
||||
let
|
||||
extractName = string:
|
||||
extractName = filename:
|
||||
let
|
||||
metadata = [
|
||||
"pub" "public" "priv" "private"
|
||||
"key" "file" "." "_" "-" "pk"
|
||||
];
|
||||
in
|
||||
replaceStrings metadata (builtins.map (_: "") metadata) string;
|
||||
# Remove .key extension
|
||||
noKey = lib.removeSuffix ".key" filename;
|
||||
# Remove .pub/.priv/.public/.private markers
|
||||
noMarkers = replaceStrings
|
||||
[ ".pub" ".priv" ".public" ".private" ]
|
||||
[ "" "" "" "" ]
|
||||
noKey;
|
||||
in noMarkers;
|
||||
|
||||
constructKeys = dir: (
|
||||
listToAttrs (
|
||||
|
|
@ -17,7 +21,10 @@ let
|
|||
map (file: {
|
||||
name = extractName file;
|
||||
value = readFile "${dir}/${subdir}/${file}";
|
||||
}) (filter (node: (readDir "${dir}/${subdir}").${node} == "regular") (attrNames (readDir "${dir}/${subdir}")))
|
||||
}) (filter (file:
|
||||
(readDir "${dir}/${subdir}").${file} == "regular" &&
|
||||
lib.hasSuffix ".key" file
|
||||
) (attrNames (readDir "${dir}/${subdir}")))
|
||||
);
|
||||
}) (filter (node: (readDir dir).${node} == "directory") (attrNames (readDir dir)))
|
||||
)
|
||||
|
|
|
|||
5
src/user/config/keys/pgp/README.md
Normal file
5
src/user/config/keys/pgp/README.md
Normal file
|
|
@ -0,0 +1,5 @@
|
|||
# PGP Keys
|
||||
|
||||
yubikey.pub.key -
|
||||
work.pub.key -> bryan.ramos@concurrent-rt.com
|
||||
ccur.pub.key -> ?
|
||||
5
src/user/config/keys/ssh/README.md
Normal file
5
src/user/config/keys/ssh/README.md
Normal file
|
|
@ -0,0 +1,5 @@
|
|||
# SSH Keys
|
||||
|
||||
yubikey.pub.key -> PGP derived from `pgp.yubikey.pub.key`
|
||||
work.pub.key - ?
|
||||
graphone.pub.key -> For Android `pass`
|
||||
|
|
@ -18,7 +18,7 @@ in
|
|||
};
|
||||
publicKeys = [
|
||||
{
|
||||
text = "${config.user.keys.pgp.primary}";
|
||||
text = "${config.user.keys.pgp.yubikey}";
|
||||
trust = 5;
|
||||
}
|
||||
] ++ optionals (osConfig.networking.hostName == "workstation") [
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue