From 7e6f1fb434797b4ffaf7eefa4a69825ce884fd20 Mon Sep 17 00:00:00 2001 From: =?utf8?q?Isma=C3=ABl=20Bouya?= Date: Wed, 3 Apr 2019 10:21:20 +0200 Subject: [PATCH] Move ssh to its own module --- nixops/eldiron.nix | 33 ++----------------- nixops/modules/ssh/default.nix | 30 +++++++++++++++++ .../{ => modules/ssh}/ldap_authorized_keys.sh | 0 3 files changed, 32 insertions(+), 31 deletions(-) create mode 100644 nixops/modules/ssh/default.nix rename nixops/{ => modules/ssh}/ldap_authorized_keys.sh (100%) diff --git a/nixops/eldiron.nix b/nixops/eldiron.nix index 752ef0a..9d32bb3 100644 --- a/nixops/eldiron.nix +++ b/nixops/eldiron.nix @@ -6,7 +6,6 @@ }; eldiron = { config, pkgs, mylibs, myconfig, ... }: - with mylibs; { _module.args = { pkgsNext = import {}; @@ -25,6 +24,7 @@ }; imports = [ + ./modules/ssh ./modules/certificates.nix ./modules/gitolite ./modules/databases @@ -52,12 +52,7 @@ MaxLevelStore="warning" MaxRetentionSec="1year" ''; - networking = { - firewall = { - enable = true; - allowedTCPPorts = [ 22 ]; - }; - }; + networking.firewall.enable = true; deployment = { targetEnv = "hetzner"; @@ -85,30 +80,6 @@ pkgs.vim ]; - services.openssh.extraConfig = '' - AuthorizedKeysCommand /etc/ssh/ldap_authorized_keys - AuthorizedKeysCommandUser nobody - ''; - - environment.etc."ssh/ldap_authorized_keys" = let - ldap_authorized_keys = - wrap { - name = "ldap_authorized_keys"; - file = ./ldap_authorized_keys.sh; - vars = { - LDAP_PASS = myconfig.env.sshd.ldap.password; - GITOLITE_SHELL = "${pkgs.gitolite}/bin/gitolite-shell"; - ECHO = "${pkgs.coreutils}/bin/echo"; - }; - paths = [ pkgs.openldap pkgs.stdenv.shellPackage pkgs.gnugrep pkgs.gnused pkgs.coreutils ]; - }; - in { - enable = true; - mode = "0755"; - user = "root"; - source = ldap_authorized_keys; - }; - services.cron = { enable = true; systemCronJobs = [ diff --git a/nixops/modules/ssh/default.nix b/nixops/modules/ssh/default.nix new file mode 100644 index 0000000..b28f6ca --- /dev/null +++ b/nixops/modules/ssh/default.nix @@ -0,0 +1,30 @@ +{ lib, pkgs, config, mylibs, myconfig, ... }: +{ + config = { + networking.firewall.allowedTCPPorts = [ 22 ]; + + services.openssh.extraConfig = '' + AuthorizedKeysCommand /etc/ssh/ldap_authorized_keys + AuthorizedKeysCommandUser nobody + ''; + + environment.etc."ssh/ldap_authorized_keys" = let + ldap_authorized_keys = + mylibs.wrap { + name = "ldap_authorized_keys"; + file = ./ldap_authorized_keys.sh; + vars = { + LDAP_PASS = myconfig.env.sshd.ldap.password; + GITOLITE_SHELL = "${pkgs.gitolite}/bin/gitolite-shell"; + ECHO = "${pkgs.coreutils}/bin/echo"; + }; + paths = [ pkgs.openldap pkgs.stdenv.shellPackage pkgs.gnugrep pkgs.gnused pkgs.coreutils ]; + }; + in { + enable = true; + mode = "0755"; + user = "root"; + source = ldap_authorized_keys; + }; + }; +} diff --git a/nixops/ldap_authorized_keys.sh b/nixops/modules/ssh/ldap_authorized_keys.sh similarity index 100% rename from nixops/ldap_authorized_keys.sh rename to nixops/modules/ssh/ldap_authorized_keys.sh -- 2.41.0