From: Ismaƫl Bouya Date: Mon, 15 Apr 2019 23:44:03 +0000 (+0200) Subject: Move diaspora and mantisbt passwords to a secure location X-Git-Tag: nur_publish~143 X-Git-Url: https://git.immae.eu/?p=perso%2FImmae%2FConfig%2FNix.git;a=commitdiff_plain;h=ec2a5ffb986e9b21dff31e16d112aa9052a4bc5c Move diaspora and mantisbt passwords to a secure location Related issue: https://git.immae.eu/mantisbt/view.php?id=122 --- diff --git a/nixops/modules/websites/tools/diaspora/default.nix b/nixops/modules/websites/tools/diaspora/default.nix index b1cb6f2..5d36ce7 100644 --- a/nixops/modules/websites/tools/diaspora/default.nix +++ b/nixops/modules/websites/tools/diaspora/default.nix @@ -24,15 +24,27 @@ in { home = diaspora.varDir; useDefaultShell = true; packages = [ diaspora.gems pkgs.nodejs diaspora.gems.ruby ]; + extraGroups = [ "keys" ]; }; users.groups.diaspora.gid = config.ids.gids.diaspora; + deployment.keys = diaspora.keys; systemd.services.diaspora = { description = "Diaspora"; wantedBy = [ "multi-user.target" ]; - after = [ "network.target" "redis.service" "postgresql.service" ]; - wants = [ "redis.service" "postgresql.service" ]; + after = [ + "network.target" "redis.service" "postgresql.service" + "tools-diaspora-secret_token.service" + "tools-diaspora-config.service" + "tools-diaspora-database_config.service" + ]; + wants = [ + "redis.service" "postgresql.service" + "tools-diaspora-secret_token.service" + "tools-diaspora-config.service" + "tools-diaspora-database_config.service" + ]; environment.RAILS_ENV = "production"; environment.BUNDLE_PATH = "${diaspora.gems}/${diaspora.gems.ruby.gemPath}"; diff --git a/nixops/modules/websites/tools/diaspora/diaspora.nix b/nixops/modules/websites/tools/diaspora/diaspora.nix index 82bca8c..074dfb2 100644 --- a/nixops/modules/websites/tools/diaspora/diaspora.nix +++ b/nixops/modules/websites/tools/diaspora/diaspora.nix @@ -29,10 +29,21 @@ let }; }; }; - secret_token = writeText "secret_token.rb" '' - Diaspora::Application.config.secret_key_base = '${env.secret_token}' + keys.tools-diaspora-secret_token = { + destDir = "/run/keys/webapps"; + user = "diaspora"; + group = "diaspora"; + permissions = "0700"; + text = '' + Diaspora::Application.config.secret_key_base = '${env.secret_token}' ''; - config = writeText "diaspora.yml" '' + }; + keys.tools-diaspora-config = { + destDir = "/run/keys/webapps"; + user = "diaspora"; + group = "diaspora"; + permissions = "0700"; + text = '' configuration: environment: url: "https://diaspora.immae.eu/" @@ -105,7 +116,13 @@ let development: environment: ''; - database_config = writeText "database.yml" '' + }; + keys.tools-diaspora-database_config = { + destDir = "/run/keys/webapps"; + user = "diaspora"; + group = "diaspora"; + permissions = "0700"; + text = '' postgresql: &postgresql adapter: postgresql host: "${env.postgresql.socket}" @@ -133,23 +150,27 @@ let <<: *combined database: diaspora_integration2 ''; - + }; railsRoot = stdenv.mkDerivation { name = "diaspora_immae"; inherit diaspora; + # FIXME: build machine will contain some passwords in the nix store builder = writeText "build_diaspora_immae" '' source $stdenv/setup cp -a $diaspora $out cd $out chmod -R u+rwX . tar -czf public/source.tar.gz ./{app,db,lib,script,Gemfile,Gemfile.lock,Rakefile,config.ru} - ln -s ${database_config} config/database.yml - ln -s ${config} config/diaspora.yml - ln -s ${secret_token} config/initializers/secret_token.rb + ln -s ${writeText "database.yml" keys.tools-diaspora-database_config.text} config/database.yml + ln -s ${writeText "diaspora.yml" keys.tools-diaspora-config.text} config/diaspora.yml + ln -s ${writeText "secret_token.rb" keys.tools-diaspora-secret_token.text} config/initializers/secret_token.rb ln -sf ${varDir}/schedule.yml config/schedule.yml ln -sf ${varDir}/oidc_key.pem config/oidc_key.pem ln -sf ${varDir}/uploads public/uploads RAILS_ENV=production ${gems}/bin/rake assets:precompile + ln -sf /run/keys/webapps/tools-diaspora-database_config config/database.yml + ln -sf /run/keys/webapps/tools-diaspora-config config/diaspora.yml + ln -sf /run/keys/webapps/tools-diaspora-secret_token config/initializers/secret_token.rb rm -rf tmp log ln -sf ${varDir}/tmp tmp ln -sf ${varDir}/log log @@ -158,6 +179,6 @@ let }; in { - inherit railsRoot varDir socketsDir gems; + inherit railsRoot varDir socketsDir gems keys; railsSocket = "${socketsDir}/diaspora.sock"; } diff --git a/nixops/modules/websites/tools/git/default.nix b/nixops/modules/websites/tools/git/default.nix index 11b0245..28b3c2d 100644 --- a/nixops/modules/websites/tools/git/default.nix +++ b/nixops/modules/websites/tools/git/default.nix @@ -23,6 +23,7 @@ in { }); }) ]; + deployment.keys = mantisbt.keys; services.myWebsites.tools.modules = gitweb.apache.modules ++ mantisbt.apache.modules; diff --git a/nixops/modules/websites/tools/git/mantisbt/mantisbt.nix b/nixops/modules/websites/tools/git/mantisbt/mantisbt.nix index 0cd98a1..00580b5 100644 --- a/nixops/modules/websites/tools/git/mantisbt/mantisbt.nix +++ b/nixops/modules/websites/tools/git/mantisbt/mantisbt.nix @@ -17,41 +17,46 @@ let }); }; in rec { - config = - writeText "config_inc.php" '' -