]>
git.immae.eu Git - perso/Immae/Config/Nix.git/blob - nixops/scripts/setup
5 RemoteRepo
="gitolite@git.immae.eu:perso/Immae/Prive/Password_store/Sites"
6 DeploymentUuid
="cef694f3-081d-11e9-b31f-0242ec186adf"
8 if ! which nix
2>/dev
/null
>/dev
/null
; then
10 nix is needed, please install it:
11 > curl https://nixos.org/nix/install | sh
12 (or any other way handled by your distribution)
17 if [ "${NIX_STORE:-/nix/store}" != "/nix/store" ]; then
19 Nix store outside of /nix/store is not supported
24 if [ -z "$NIXOPS_CONFIG_PASS_SUBTREE_REMOTE" \
25 -o -z "$NIXOPS_CONFIG_PASS_SUBTREE_PATH" ]; then
27 Two environment variables are needed to setup the password store:
28 NIXOPS_CONFIG_PASS_SUBTREE_PATH : path where the subtree will be imported
29 NIXOPS_CONFIG_PASS_SUBTREE_REMOTE : remote name to give to the repository
34 if ! pass
$NIXOPS_CONFIG_PASS_SUBTREE_PATH > /dev
/null
2>/dev
/null
; then
36 /!\ This will modify your password store to add and import a subtree
37 with the specific passwords files. Choose a path that doesn’t exist
38 yet in your password store.
39 > pass git remote add $NIXOPS_CONFIG_PASS_SUBTREE_REMOTE $RemoteRepo
40 > pass git subtree add --prefix=$NIXOPS_CONFIG_PASS_SUBTREE_PATH $NIXOPS_CONFIG_PASS_SUBTREE_REMOTE master
41 Later, you can use pull_environment and push_environment scripts to
42 update the passwords when needed
46 if [ "$y" = "y" -o "$y" = "Y" ]; then
47 pass git remote add
$NIXOPS_CONFIG_PASS_SUBTREE_REMOTE $RemoteRepo
48 pass git subtree add
--prefix=$NIXOPS_CONFIG_PASS_SUBTREE_PATH $NIXOPS_CONFIG_PASS_SUBTREE_REMOTE master
55 gpg_keys
=$(pass ls $NIXOPS_CONFIG_PASS_SUBTREE_PATH/Nixops/GPGKeys | sed -e "1d" | cut -d" " -f2)
56 for key
in $gpg_keys; do
57 content
=$(pass show $NIXOPS_CONFIG_PASS_SUBTREE_PATH/Nixops/GPGKeys/$key)
58 fpr
=$(echo "$content" | gpg --import-options show-only --import --with-colons | grep -e "^pub" | cut -d':' -f5)
59 gpg
--list-key "$fpr" >/dev
/null
2>/dev
/null
&& imported
=yes || imported
=no
60 # /usr/share/doc/gnupg/DETAILS field 2
61 (echo "$content" | gpg
--import-options show
-only --import --with-colons |
64 grep -q '[fu]') && signed
=yes || signed
=no
65 if [ "$signed" = no
-o "$imported" = no
] ; then
66 echo "The key for $key needs to be imported and signed (a local signature is enough)"
67 echo "$content" | gpg
--import-options show
-only --import
68 echo "Continue? [y/N]"
70 if [ "$y" = "y" -o "$y" = "Y" ]; then
71 echo "$content" | gpg
--import
72 gpg
--expert --edit-key "$fpr" lsign quit
80 nix_group
=$(stat -c %G /nix/store)
81 if [ "$nix_group" = "nixbld" ]; then
84 nix_user
="$(stat -c %U /nix/store)"
87 if [ ! -f /etc
/ssh
/ssh_rsa_key_nixops
]; then
89 The key to access private git repositories (websites hosted by the
90 server) needs to be accessible to nix builders. It will be put in
91 /etc/ssh/ssh_rsa_key_nixops (sudo right is needed for that)
92 > pass show $NIXOPS_CONFIG_PASS_SUBTREE_PATH/Nixops/SshKey | sudo tee /etc/ssh/ssh_rsa_key_nixops > /dev/null
93 > pass show $NIXOPS_CONFIG_PASS_SUBTREE_PATH/Nixops/SshKey.pub | sudo tee /etc/ssh/ssh_rsa_key_nixops.pub > /dev/null
94 > sudo chmod u=r,go-rwx /etc/ssh/ssh_rsa_key_nixops
95 > sudo chown $nix_user:$nix_group /etc/ssh/ssh_rsa_key_nixops /etc/ssh/ssh_rsa_key_nixops.pub
99 if [ "$y" = "y" -o "$y" = "Y" ]; then
100 if ! id
-u $nix_user 2>/dev
/null
>/dev
/null
; then
101 echo "User $nix_user seems inexistant, did you install nix?"
106 # Don’t forward it directly to tee, it would break ncurse pinentry
107 key
=$(pass show $NIXOPS_CONFIG_PASS_SUBTREE_PATH/Nixops/SshKey)
108 echo "$key" | sudo
tee /etc
/ssh
/ssh_rsa_key_nixops
> /dev
/null
109 sudo
chmod u
=r
,go
=- /etc
/ssh
/ssh_rsa_key_nixops
110 pubkey
=$(pass show $NIXOPS_CONFIG_PASS_SUBTREE_PATH/Nixops/SshKey.pub)
111 echo "$pubkey" | sudo
tee /etc
/ssh
/ssh_rsa_key_nixops.pub
> /dev
/null
112 sudo
chmod a
=r
/etc
/ssh
/ssh_rsa_key_nixops.pub
113 sudo chown
$nix_user:$nix_group /etc
/ssh
/ssh_rsa_key_nixops
/etc
/ssh
/ssh_rsa_key_nixops.pub
121 if nix show
-config --json | jq
-e '.sandbox.value == "true"' >/dev
/null
; then
123 There are some impure derivations in the repo currently (grep __noChroot), please put
126 you may also want to add
128 keep-derivations = true
129 to prevent garbage collector from deleting build dependencies (they take a lot of time to build)
134 if ! which nixops
2>/dev
/null
>/dev
/null
; then
138 If it fails, please check that $HOME/.nix-profile/bin is in your PATH.
142 if [ "$y" = "y" -o "$y" = "Y" ]; then
144 if ! which nixops
2>/dev
/null
>/dev
/null
; then
145 echo "Installation failed, please check that $HOME/.nix-profile/bin is in your path."
154 DIR
="$( cd "$( dirname "${BASH_SOURCE[0]}" )" >/dev
/null
2>&1 && pwd )"
155 export NIXOPS_STATE="$(dirname $DIR)/state
/eldiron.nixops
"
156 export NIXOPS_DEPLOYMENT="$DeploymentUuid"
158 if ! nixops info 2>/dev/null >/dev/null; then
160 Importing deployment file into nixops:
164 if [ "$y" = "y
" -o "$y" = "Y
" ]; then
165 deployment=$(pass show $NIXOPS_CONFIG_PASS_SUBTREE_PATH/Nixops/Deployment)
166 echo "$deployment" | nixops import
168 nixops modify "$(dirname $DIR)/eldiron.nix
"
177 Please make sure you’re using scripts/nixops_wrap when deploying