76 lines
2.4 KiB
Nix
76 lines
2.4 KiB
Nix
{
|
|
config,
|
|
lib,
|
|
pkgs,
|
|
fleetFlake,
|
|
...
|
|
}: let
|
|
sshdTmpDirectory = "${config.user.home}/sshd-tmp";
|
|
sshdDirectory = "${config.user.home}/sshd";
|
|
port = 8022;
|
|
in {
|
|
# Backup etc files instead of failing to activate generation if a file already exists in /etc
|
|
environment.etcBackupExtension = ".bak";
|
|
|
|
# Read the changelog before changing this value
|
|
system.stateVersion = "24.05";
|
|
|
|
# Set up nix for flakes
|
|
nix.extraOptions = ''
|
|
experimental-features = nix-command flakes
|
|
'';
|
|
|
|
# Set your time zone
|
|
time.timeZone = "Europe/Rome";
|
|
|
|
home-manager.config = {pkgs, ...}: {
|
|
home.stateVersion = "24.05";
|
|
_module.args = {
|
|
hostname = "janeway";
|
|
age.secrets = {};
|
|
};
|
|
imports = [../../hmModules/shell];
|
|
};
|
|
|
|
build.activation.sshd = let
|
|
keys = (builtins.import ../../lib).keys;
|
|
inherit (keys) hosts users;
|
|
in ''
|
|
$DRY_RUN_CMD mkdir $VERBOSE_ARG --parents "${config.user.home}/.ssh"
|
|
$DRY_RUN_CMD echo ${hosts.picard} > "${config.user.home}/.ssh/authorized_keys"
|
|
$DRY_RUN_CMD echo ${hosts.sisko} >> "${config.user.home}/.ssh/authorized_keys"
|
|
$DRY_RUN_CMD echo ${hosts.kirk} >> "${config.user.home}/.ssh/authorized_keys"
|
|
$DRY_RUN_CMD echo ${users.ccr-ssh} >> "${config.user.home}/.ssh/authorized_keys"
|
|
$DRY_RUN_CMD echo ${users.ccr-gpg} >> "${config.user.home}/.ssh/authorized_keys"
|
|
|
|
if [[ ! -d "${sshdDirectory}" ]]; then
|
|
$DRY_RUN_CMD rm $VERBOSE_ARG --recursive --force "${sshdTmpDirectory}"
|
|
$DRY_RUN_CMD mkdir $VERBOSE_ARG --parents "${sshdTmpDirectory}"
|
|
|
|
$VERBOSE_ECHO "Generating host keys..."
|
|
$DRY_RUN_CMD ${pkgs.openssh}/bin/ssh-keygen -t rsa -b 4096 -f "${sshdTmpDirectory}/ssh_host_rsa_key" -N ""
|
|
|
|
$VERBOSE_ECHO "Writing sshd_config..."
|
|
$DRY_RUN_CMD echo -e "HostKey ${sshdDirectory}/ssh_host_rsa_key\nPort ${toString port}\n" > "${sshdTmpDirectory}/sshd_config"
|
|
|
|
$DRY_RUN_CMD mv $VERBOSE_ARG "${sshdTmpDirectory}" "${sshdDirectory}"
|
|
fi
|
|
'';
|
|
|
|
environment.packages = let
|
|
inherit (fleetFlake.inputs.ccrEmacs.packages.aarch64-linux) ccrEmacs;
|
|
in [
|
|
pkgs.bottom
|
|
pkgs.helix
|
|
pkgs.stress
|
|
pkgs.openssh
|
|
pkgs.git
|
|
pkgs.btop
|
|
ccrEmacs
|
|
(pkgs.writeScriptBin "sshd-start" ''
|
|
#!${pkgs.runtimeShell}
|
|
echo "Starting sshd in non-daemonized way on port ${toString port}"
|
|
${pkgs.openssh}/bin/sshd -f "${sshdDirectory}/sshd_config" -D
|
|
'')
|
|
];
|
|
}
|