File: flake.nix

package info (click to toggle)
opkssh 0.10.0-3
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 1,440 kB
  • sloc: sh: 2,062; makefile: 11
file content (113 lines) | stat: -rw-r--r-- 3,905 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
# SPDX-License-Identifier: Apache-2.0

{
  description = "Open Pubkey for SSH";

  inputs = {
    nixpkgs.url = "github:nixos/nixpkgs?ref=nixos-24.11";
  };

  outputs = { self, nixpkgs }:
    let
      supported-systems = [
        "x86_64-linux"
        "aarch64-linux"
        "x86_64-darwin"
        "aarch64-darwin"
      ];

      # Helper to provide system-specific attributes
      forSupportedSystems = f: nixpkgs.lib.genAttrs supported-systems (system: f {
        pkgs = import nixpkgs { inherit system; };
      });
    in
    {
      packages = forSupportedSystems ({ pkgs }: rec {
        opkssh = pkgs.buildGoModule {
          name = "opkssh";
          src = self;
          vendorHash = "sha256-vZb94nwfrqoWnFk1STDDiyqGn1Esqz5VvoQemXIzlNg=";
          goSum = ./go.sum;
          meta.mainProgram = "opkssh";
        };
        default = opkssh;
      });

      overlays.default = final: prev: {
        opkssh = self.packages.${final.stdenv.system}.opkssh;
      };

      nixosModules = {
        server = { config, pkgs, lib, ... }: let cfg = config.programs.opkssh; in {
          options.programs.opkssh = {
            enable = lib.options.mkEnableOption "opkssh";
            package = lib.options.mkOption {
              default = pkgs.opkssh;
              type = lib.types.package;
            };
            command.enable = lib.options.mkEnableOption "opkssh command";
            config = {
              # TODO: Replace these options with submodules.
              authorization_rules' = lib.options.mkOption {
                default = "";
                type = lib.types.lines;
              };
              providers' = lib.options.mkOption {
                default = ''
                  https://accounts.google.com 206584157355-7cbe4s640tvm7naoludob4ut1emii7sf.apps.googleusercontent.com 24h
                  https://login.microsoftonline.com/9188040d-6c67-4c5b-b112-36a304b66dad/v2.0 096ce0a3-5e72-4da8-9c86-12924b294a01 24h
                  https://gitlab.com 8d8b7024572c7fd501f64374dec6bba37096783dfcd792b3988104be08cb6923 24h
                '';
                type = lib.types.lines;
              };
            };
          };

          config = lib.modules.mkIf cfg.enable {
            # This config follows the install-linux.sh procedure.
            users = {
              groups.opkssh = {};
              users.opkssh = {
                isSystemUser = true;
                group = config.users.groups.opkssh.name;
              };
            };

            environment = {
              systemPackages = lib.lists.optional cfg.command.enable cfg.package;
              etc = let inherit (config.users) users groups; in {
                "opk/auth_id" = {
                  user = users.opkssh.name;
                  group = groups.opkssh.name;
                  mode = "0640";
                  text = cfg.config.authorization_rules';
                };
                "opk/providers" = {
                  user = users.opkssh.name;
                  group = groups.opkssh.name;
                  mode = "0640";
                  text = cfg.config.providers';
                };
              };
            };

            security.wrappers.opkssh = let inherit (config.users) users groups; in {
              owner = users.root.name;
              group = groups.root.name;
              source = lib.meta.getExe cfg.package;
            };

            services.openssh = {
              # Command path has to be hardcoded unfortunately.
              authorizedKeysCommand = "/run/wrappers/bin/opkssh verify %u %k %t";
              authorizedKeysCommandUser = config.users.users.opkssh.name;
            };

            systemd.tmpfiles.rules = let inherit (config.users) users groups; in [
              "f /var/log/opkssh.log 660 ${users.root.name} ${groups.opkssh.name} -"
            ];
          };
        };
      };
    };
}