diff --git a/morph/grid/local/grid.nix b/morph/grid/local/grid.nix index 19fc3cfded5f41498ddc2f091c72298b11751762..c8c2747715924d41578c6601b3f2452d14ddb5d6 100644 --- a/morph/grid/local/grid.nix +++ b/morph/grid/local/grid.nix @@ -2,26 +2,27 @@ let pkgs = import <nixpkgs> { }; gridlib = import ../../lib; - rawConfig = pkgs.lib.trivial.importJSON ./config.json; - config = rawConfig // { - # Convert relative paths to absolute so library code can resolve names - # correctly. - publicKeyPath = toString ./. + "/${rawConfig.publicKeyPath}"; - privateKeyPath = toString ./. + "/${rawConfig.privateKeyPath}"; - }; + grid-config = pkgs.lib.trivial.importJSON ./config.json; # Module with per-grid configuration - grid-module = { + grid-module = {config, ...}: { imports = [ + gridlib.base # Allow us to remotely trigger updates to this system. ../../../nixos/modules/deployment.nix # Give it a good SSH configuration. ../../../nixos/modules/ssh.nix ]; services.private-storage.sshUsers = import ./public-keys/users.nix; + # Convert relative paths to absolute so library code can resolve names + # correctly. + grid = { + publicKeyPath = toString ./. + "/${grid-config.publicKeyPath}"; + privateKeyPath = toString ./. + "/${grid-config.privateKeyPath}"; + }; # Configure deployment management authorization for all systems in the grid. services.private-storage.deployment = { - authorizedKey = builtins.readFile "${config.publicKeyPath}/deploy_key.pub"; + authorizedKey = builtins.readFile "${config.grid.publicKeyPath}/deploy_key.pub"; gridName = "local"; }; }; @@ -30,7 +31,7 @@ let imports = [ gridlib.issuer (gridlib.hardware-virtual ({ publicIPv4 = "192.168.67.21"; })) - (gridlib.customize-issuer (config // { + (gridlib.customize-issuer (grid-config // { monitoringvpnIPv4 = "172.23.23.11"; })) grid-module @@ -41,7 +42,7 @@ let imports = [ gridlib.storage (gridlib.hardware-virtual ({ publicIPv4 = "192.168.67.22"; })) - (gridlib.customize-storage (config // { + (gridlib.customize-storage (grid-config // { monitoringvpnIPv4 = "172.23.23.12"; stateVersion = "19.09"; })) @@ -53,7 +54,7 @@ let imports = [ gridlib.storage (gridlib.hardware-virtual ({ publicIPv4 = "192.168.67.23"; })) - (gridlib.customize-storage (config // { + (gridlib.customize-storage (grid-config // { monitoringvpnIPv4 = "172.23.23.13"; stateVersion = "19.09"; })) @@ -67,8 +68,8 @@ let (gridlib.hardware-virtual ({ publicIPv4 = "192.168.67.24"; })) (gridlib.customize-monitoring { inherit hostsMap vpnClientIPs nodeExporterTargets paymentExporterTargets; - inherit (config) domain publicKeyPath privateKeyPath letsEncryptAdminEmail; - googleOAuthClientID = config.monitoringGoogleOAuthClientID; + inherit (grid-config) domain letsEncryptAdminEmail; + googleOAuthClientID = grid-config.monitoringGoogleOAuthClientID; monitoringvpnIPv4 = "172.23.23.1"; stateVersion = "19.09"; }) diff --git a/morph/grid/production/grid.nix b/morph/grid/production/grid.nix index 4578218b23cac6f9e2a62e0b7f97bb39bfc7ec19..91eec738fe8344728ed35564bacd3a57e94b9e5e 100644 --- a/morph/grid/production/grid.nix +++ b/morph/grid/production/grid.nix @@ -3,26 +3,27 @@ let pkgs = import <nixpkgs> { }; gridlib = import ../../lib; - rawConfig = pkgs.lib.trivial.importJSON ./config.json; - config = rawConfig // { - # Convert relative paths to absolute so library code can resolve names - # correctly. - publicKeyPath = toString ./. + "/${rawConfig.publicKeyPath}"; - privateKeyPath = toString ./. + "/${rawConfig.privateKeyPath}"; - }; + grid-config = pkgs.lib.trivial.importJSON ./config.json; # Module with per-grid configuration - grid-module = { + grid-module = {config, ...}: { imports = [ + gridlib.base # Allow us to remotely trigger updates to this system. ../../../nixos/modules/deployment.nix # Give it a good SSH configuration. ../../../nixos/modules/ssh.nix ]; services.private-storage.sshUsers = import ./public-keys/users.nix; + # Convert relative paths to absolute so library code can resolve names + # correctly. + grid = { + publicKeyPath = toString ./. + "/${grid-config.publicKeyPath}"; + privateKeyPath = toString ./. + "/${grid-config.privateKeyPath}"; + }; # Configure deployment management authorization for all systems in the grid. services.private-storage.deployment = { - authorizedKey = builtins.readFile "${config.publicKeyPath}/deploy_key.pub"; + authorizedKey = builtins.readFile "${config.grid.publicKeyPath}/deploy_key.pub"; gridName = "production"; }; }; @@ -31,7 +32,7 @@ let imports = [ gridlib.issuer gridlib.hardware-aws - (gridlib.customize-issuer (config // { + (gridlib.customize-issuer (grid-config // { monitoringvpnIPv4 = "172.23.23.11"; })) grid-module @@ -44,8 +45,8 @@ let gridlib.hardware-aws (gridlib.customize-monitoring { inherit hostsMap vpnClientIPs nodeExporterTargets paymentExporterTargets; - inherit (config) domain publicKeyPath privateKeyPath letsEncryptAdminEmail; - googleOAuthClientID = config.monitoringGoogleOAuthClientID; + inherit (grid-config) domain letsEncryptAdminEmail; + googleOAuthClientID = grid-config.monitoringGoogleOAuthClientID; monitoringvpnIPv4 = "172.23.23.1"; stateVersion = "19.09"; }) @@ -71,7 +72,7 @@ let gridlib.storage # Then customize the storage system a little bit based on this node's particulars. - (gridlib.customize-storage (config // nodecfg // { + (gridlib.customize-storage (grid-config // nodecfg // { monitoringvpnIPv4 = vpnIP; inherit stateVersion; })) diff --git a/morph/grid/testing/grid.nix b/morph/grid/testing/grid.nix index 9997463fbf72dc30af20f6aba1f194b54011b433..3e15e5137194d2637a9637fecb61fb0a8d132f1c 100644 --- a/morph/grid/testing/grid.nix +++ b/morph/grid/testing/grid.nix @@ -3,26 +3,27 @@ let pkgs = import <nixpkgs> { }; gridlib = import ../../lib; - rawConfig = pkgs.lib.trivial.importJSON ./config.json; - config = rawConfig // { - # Convert relative paths to absolute so library code can resolve names - # correctly. - publicKeyPath = toString ./. + "/${rawConfig.publicKeyPath}"; - privateKeyPath = toString ./. + "/${rawConfig.privateKeyPath}"; - }; + grid-config = pkgs.lib.trivial.importJSON ./config.json; # Module with per-grid configuration - grid-module = { + grid-module = {config, ...}: { imports = [ + gridlib.base # Allow us to remotely trigger updates to this system. ../../../nixos/modules/deployment.nix # Give it a good SSH configuration. ../../../nixos/modules/ssh.nix ]; services.private-storage.sshUsers = import ./public-keys/users.nix; + # Convert relative paths to absolute so library code can resolve names + # correctly. + grid = { + publicKeyPath = toString ./. + "/${grid-config.publicKeyPath}"; + privateKeyPath = toString ./. + "/${grid-config.privateKeyPath}"; + }; # Configure deployment management authorization for all systems in the grid. services.private-storage.deployment = { - authorizedKey = builtins.readFile "${config.publicKeyPath}/deploy_key.pub"; + authorizedKey = builtins.readFile "${config.grid.publicKeyPath}/deploy_key.pub"; gridName = "testing"; }; }; @@ -31,7 +32,7 @@ let imports = [ gridlib.issuer gridlib.hardware-aws - (gridlib.customize-issuer (config // { + (gridlib.customize-issuer (grid-config // { monitoringvpnIPv4 = "172.23.23.11"; })) grid-module @@ -43,7 +44,7 @@ let gridlib.storage gridlib.hardware-aws ./testing001-hardware.nix - (gridlib.customize-storage (config // { + (gridlib.customize-storage (grid-config // { monitoringvpnIPv4 = "172.23.23.12"; stateVersion = "19.03"; })) @@ -57,8 +58,8 @@ let gridlib.hardware-aws (gridlib.customize-monitoring { inherit hostsMap vpnClientIPs nodeExporterTargets paymentExporterTargets; - inherit (config) domain publicKeyPath privateKeyPath letsEncryptAdminEmail; - googleOAuthClientID = config.monitoringGoogleOAuthClientID; + inherit (grid-config) domain letsEncryptAdminEmail; + googleOAuthClientID = grid-config.monitoringGoogleOAuthClientID; monitoringvpnIPv4 = "172.23.23.1"; stateVersion = "19.09"; }) diff --git a/morph/lib/base.nix b/morph/lib/base.nix new file mode 100644 index 0000000000000000000000000000000000000000..35f1182b7378a5f9c34512885719f8756b2fde19 --- /dev/null +++ b/morph/lib/base.nix @@ -0,0 +1,21 @@ +{ lib, config, ...}: +{ + options.grid = { + publicKeyPath = lib.mkOption { + type = lib.types.path; + description = '' + A path on the deployment system of a directory containing all of the + public keys for the system. For example, this holds Wireguard public keys + for the VPN configuration and SSH public keys to configure SSH + authentication. + ''; + }; + privateKeyPath = lib.mkOption { + type = lib.types.path; + description = '' + A path on the deployment system of a directory containing all of the + corresponding private keys for the system. + ''; + }; + }; +} diff --git a/morph/lib/customize-issuer.nix b/morph/lib/customize-issuer.nix index ea5b31fef2893dbf271e37f2b5b2bb20dc9ef446..4e0872b1315c4ce62d06832063f758522aacb585 100644 --- a/morph/lib/customize-issuer.nix +++ b/morph/lib/customize-issuer.nix @@ -1,19 +1,9 @@ # Define a function which returns a value which fills in all the holes left by # ``issuer.nix``. { - # A path on the deployment system of a directory containing all of the - # public keys for the system. For example, this holds Wireguard public keys - # for the VPN configuration and SSH public keys to configure SSH - # authentication. - publicKeyPath - - # A path on the deployment system of a directory containing all of the - # corresponding private keys for the system. -, privateKeyPath - # A string giving the IP address and port number (":"-separated) of the VPN # server. -, monitoringvpnEndpoint + monitoringvpnEndpoint # A string giving the VPN IPv4 address for this system. , monitoringvpnIPv4 @@ -39,7 +29,10 @@ , allowedChargeOrigins , ... }: -{ config, ... }: { +{ config, ... }: +let + inherit (config.grid) publicKeyPath privateKeyPath; +in { # The morph default deployment target the name of the node in the network # attrset. We don't always want to give the node its proper public address # there (because it depends on which domain is associated with the grid @@ -49,15 +42,6 @@ deployment.targetHost = "${config.networking.hostName}.${config.networking.domain}"; deployment.secrets = { - # A path on the deployment system to a file containing the Ristretto - # signing key. This is used as the source of the Ristretto signing key - # morph secret. - "ristretto-signing-key".source = "${privateKeyPath}/ristretto.signing-key"; - - # A path on the deployment system to a file containing the Stripe secret - # key. This is used as the source of the Stripe secret key morph secret. - "stripe-secret-key".source = "${privateKeyPath}/stripe.secret"; - # ``.../monitoringvpn`` is a path on the deployment system of a directory # containing a number of VPN-related secrets. This is expected to contain # a number of files named like ``<VPN IPv4 address>.key`` containing the diff --git a/morph/lib/customize-monitoring.nix b/morph/lib/customize-monitoring.nix index f5b820a272fcfd4ea7106af32ad2fd0ac5c8ece3..324f99f2453938d46a7f17118a80e8c411d2acdf 100644 --- a/morph/lib/customize-monitoring.nix +++ b/morph/lib/customize-monitoring.nix @@ -9,8 +9,6 @@ hostsMap # See ``customize-issuer.nix``. -, publicKeyPath -, privateKeyPath , monitoringvpnIPv4 , domain , letsEncryptAdminEmail @@ -39,7 +37,10 @@ , stateVersion , ... }: -{ config, ... }: { +{ config, ... }: +let + inherit (config.grid) publicKeyPath privateKeyPath; +in { # See customize-issuer.nix for an explanatoin of targetHost value. deployment.targetHost = "${config.networking.hostName}.${config.networking.domain}"; diff --git a/morph/lib/customize-storage.nix b/morph/lib/customize-storage.nix index 6ec8431651713a4ebd19a1a768a2dfaf09f36f18..be4c2a9322cf6d692d90778ffabfaefa02fd8706 100644 --- a/morph/lib/customize-storage.nix +++ b/morph/lib/customize-storage.nix @@ -2,9 +2,7 @@ # ``storage.nix``. { # See ``customize-issuer.nix`` - privateKeyPath -, publicKeyPath -, monitoringvpnEndpoint + monitoringvpnEndpoint , monitoringvpnIPv4 , domain @@ -19,12 +17,14 @@ , stateVersion , ... }: -{ config, ... }: { +{ config, ... }: +let + inherit (config.grid) publicKeyPath privateKeyPath; +in { # See customize-issuer.nix for an explanatoin of targetHost value. deployment.targetHost = "${config.networking.hostName}.${config.networking.domain}"; deployment.secrets = { - "ristretto-signing-key".source = "${privateKeyPath}/ristretto.signing-key"; "monitoringvpn-secret-key".source = "${privateKeyPath}/monitoringvpn/${monitoringvpnIPv4}.key"; "monitoringvpn-preshared-key".source = "${privateKeyPath}/monitoringvpn/preshared.key"; }; diff --git a/morph/lib/default.nix b/morph/lib/default.nix index bdd92f4bfe52eba2e19df3ac73a087a4af4a53dc..bf25e5a58d04d148296bffef48acc4e4e125684b 100644 --- a/morph/lib/default.nix +++ b/morph/lib/default.nix @@ -2,6 +2,8 @@ # coherent public interface. Application code should prefer these names over # directly importing the source files in this directory. { + base = import ./base.nix; + hardware-aws = import ./issuer-aws.nix; hardware-virtual = import ./hardware-virtual.nix; @@ -13,4 +15,6 @@ monitoring = import ./monitoring.nix; customize-monitoring = import ./customize-monitoring.nix; + + modules = builtins.toString ../../nixos/modules; } diff --git a/morph/lib/issuer.nix b/morph/lib/issuer.nix index 74db99bb5a24c05597c76ee23977240a9614278a..5c3482800da0afc34761f4ac3796789077c20bcb 100644 --- a/morph/lib/issuer.nix +++ b/morph/lib/issuer.nix @@ -5,11 +5,14 @@ # into a more complete system configuration. It is expected that the holes # will be filled by a sibling module created by ``customize-issuer.nix``. { config, ...}: -{ +let + inherit (config.grid) publicKeyPath privateKeyPath; +in { deployment = { secrets = { "ristretto-signing-key" = { destination = "/run/keys/ristretto.signing-key"; + source = "${privateKeyPath}/ristretto.signing-key"; owner.user = "root"; owner.group = "root"; permissions = "0400"; @@ -17,6 +20,7 @@ }; "stripe-secret-key" = { destination = "/run/keys/stripe.secret-key"; + source = "${privateKeyPath}/stripe.secret"; owner.user = "root"; owner.group = "root"; permissions = "0400"; diff --git a/morph/lib/storage.nix b/morph/lib/storage.nix index c437fcf6166c57a00b0975a616ce5ca8710ea4fe..86e142286351237099337d38d03a9b54255b8246 100644 --- a/morph/lib/storage.nix +++ b/morph/lib/storage.nix @@ -1,11 +1,14 @@ # Similar to ``issuer.nix`` but for a "storage"-type system. Holes are filled # by ``customize-storage.nix``. { config, ...} : -{ +let + inherit (config.grid) publicKeyPath privateKeyPath; +in { deployment = { secrets = { "ristretto-signing-key" = { destination = "/run/keys/ristretto.signing-key"; + source = "${privateKeyPath}/ristretto.signing-key"; owner.user = "root"; owner.group = "root"; permissions = "0400";