2016-02-04 14:42:49 +00:00
|
|
|
# This module defines a systemd service that sets the SSH host key and
|
|
|
|
# authorized client key and host name of virtual machines running on
|
|
|
|
# Amazon EC2, Eucalyptus and OpenStack Compute (Nova).
|
2011-04-06 15:09:34 +00:00
|
|
|
|
2014-04-14 14:26:48 +00:00
|
|
|
{ config, lib, pkgs, ... }:
|
2011-04-06 15:09:34 +00:00
|
|
|
|
2014-04-14 14:26:48 +00:00
|
|
|
with lib;
|
2013-09-04 11:05:09 +00:00
|
|
|
|
|
|
|
{
|
2019-12-10 01:51:19 +00:00
|
|
|
imports = [
|
|
|
|
(mkRemovedOptionModule [ "ec2" "metadata" ] "")
|
|
|
|
];
|
|
|
|
|
2013-09-04 11:05:09 +00:00
|
|
|
config = {
|
|
|
|
|
2016-02-04 14:42:49 +00:00
|
|
|
systemd.services.apply-ec2-data =
|
|
|
|
{ description = "Apply EC2 Data";
|
2013-09-04 11:05:09 +00:00
|
|
|
|
2014-07-30 15:55:30 +00:00
|
|
|
wantedBy = [ "multi-user.target" "sshd.service" ];
|
2013-09-04 11:05:09 +00:00
|
|
|
before = [ "sshd.service" ];
|
2022-11-14 17:19:29 +00:00
|
|
|
after = ["fetch-ec2-metadata.service"];
|
2013-09-04 11:05:09 +00:00
|
|
|
|
2021-03-14 16:05:16 +00:00
|
|
|
path = [ pkgs.iproute2 ];
|
2013-09-04 11:05:09 +00:00
|
|
|
|
|
|
|
script =
|
|
|
|
''
|
|
|
|
${optionalString (config.networking.hostName == "") ''
|
2015-05-04 14:56:46 +00:00
|
|
|
echo "setting host name..."
|
2016-02-04 14:42:49 +00:00
|
|
|
if [ -s /etc/ec2-metadata/hostname ]; then
|
|
|
|
${pkgs.nettools}/bin/hostname $(cat /etc/ec2-metadata/hostname)
|
|
|
|
fi
|
2013-09-04 11:05:09 +00:00
|
|
|
''}
|
|
|
|
|
|
|
|
if ! [ -e /root/.ssh/authorized_keys ]; then
|
|
|
|
echo "obtaining SSH key..."
|
2023-12-04 15:34:08 +00:00
|
|
|
mkdir -p /root/.ssh
|
2024-10-10 07:02:06 +00:00
|
|
|
chmod 0700 /root/.ssh
|
2016-02-04 14:42:49 +00:00
|
|
|
if [ -s /etc/ec2-metadata/public-keys-0-openssh-key ]; then
|
2024-04-08 21:49:36 +00:00
|
|
|
(umask 177; cat /etc/ec2-metadata/public-keys-0-openssh-key >> /root/.ssh/authorized_keys)
|
2015-09-28 11:31:28 +00:00
|
|
|
echo "new key added to authorized_keys"
|
2013-09-04 11:05:09 +00:00
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
# Extract the intended SSH host key for this machine from
|
|
|
|
# the supplied user data, if available. Otherwise sshd will
|
|
|
|
# generate one normally.
|
2016-02-04 14:42:49 +00:00
|
|
|
userData=/etc/ec2-metadata/user-data
|
2015-09-22 22:03:13 +00:00
|
|
|
|
2023-12-04 15:34:08 +00:00
|
|
|
mkdir -p /etc/ssh
|
2024-10-10 07:02:06 +00:00
|
|
|
chmod 0755 /etc/ssh
|
2015-09-22 22:03:13 +00:00
|
|
|
|
2016-02-19 17:49:31 +00:00
|
|
|
if [ -s "$userData" ]; then
|
|
|
|
key="$(sed 's/|/\n/g; s/SSH_HOST_DSA_KEY://; t; d' $userData)"
|
|
|
|
key_pub="$(sed 's/SSH_HOST_DSA_KEY_PUB://; t; d' $userData)"
|
2023-12-04 15:34:08 +00:00
|
|
|
if [ -n "$key" ] && [ -n "$key_pub" ] && [ ! -e /etc/ssh/ssh_host_dsa_key ]; then
|
2016-02-19 17:49:31 +00:00
|
|
|
(umask 077; echo "$key" > /etc/ssh/ssh_host_dsa_key)
|
|
|
|
echo "$key_pub" > /etc/ssh/ssh_host_dsa_key.pub
|
|
|
|
fi
|
2015-09-22 22:03:13 +00:00
|
|
|
|
2016-02-19 17:49:31 +00:00
|
|
|
key="$(sed 's/|/\n/g; s/SSH_HOST_ED25519_KEY://; t; d' $userData)"
|
|
|
|
key_pub="$(sed 's/SSH_HOST_ED25519_KEY_PUB://; t; d' $userData)"
|
2023-12-04 15:34:08 +00:00
|
|
|
if [ -n "$key" ] && [ -n "$key_pub" ] && [ ! -e /etc/ssh/ssh_host_ed25519_key ]; then
|
2016-02-19 17:49:31 +00:00
|
|
|
(umask 077; echo "$key" > /etc/ssh/ssh_host_ed25519_key)
|
|
|
|
echo "$key_pub" > /etc/ssh/ssh_host_ed25519_key.pub
|
|
|
|
fi
|
2015-09-22 22:03:13 +00:00
|
|
|
fi
|
2013-09-04 11:05:09 +00:00
|
|
|
'';
|
|
|
|
|
|
|
|
serviceConfig.Type = "oneshot";
|
|
|
|
serviceConfig.RemainAfterExit = true;
|
|
|
|
};
|
|
|
|
|
2019-08-13 21:52:01 +00:00
|
|
|
systemd.services.print-host-key =
|
2013-09-04 11:05:09 +00:00
|
|
|
{ description = "Print SSH Host Key";
|
|
|
|
wantedBy = [ "multi-user.target" ];
|
|
|
|
after = [ "sshd.service" ];
|
|
|
|
script =
|
|
|
|
''
|
|
|
|
# Print the host public key on the console so that the user
|
|
|
|
# can obtain it securely by parsing the output of
|
|
|
|
# ec2-get-console-output.
|
|
|
|
echo "-----BEGIN SSH HOST KEY FINGERPRINTS-----" > /dev/console
|
2015-09-24 08:36:50 +00:00
|
|
|
for i in /etc/ssh/ssh_host_*_key.pub; do
|
2023-12-04 15:34:08 +00:00
|
|
|
${config.programs.ssh.package}/bin/ssh-keygen -l -f "$i" || true > /dev/console
|
2015-09-24 08:36:50 +00:00
|
|
|
done
|
2013-09-04 11:05:09 +00:00
|
|
|
echo "-----END SSH HOST KEY FINGERPRINTS-----" > /dev/console
|
|
|
|
'';
|
|
|
|
serviceConfig.Type = "oneshot";
|
|
|
|
serviceConfig.RemainAfterExit = true;
|
|
|
|
};
|
|
|
|
|
|
|
|
};
|
2024-10-14 10:22:45 +00:00
|
|
|
|
|
|
|
meta.maintainers = with maintainers; [ arianvp ];
|
2011-04-06 15:09:34 +00:00
|
|
|
}
|