132 lines
4.5 KiB
Python
132 lines
4.5 KiB
Python
import os
|
|
import shlex
|
|
import shutil
|
|
import subprocess
|
|
import sys
|
|
from pathlib import Path
|
|
from tempfile import TemporaryDirectory
|
|
from typing import Any
|
|
import logging
|
|
|
|
from clan_cli.nix import nix_shell
|
|
|
|
from ..dirs import specific_flake_dir
|
|
from ..errors import ClanError
|
|
from ..types import FlakeName
|
|
from .folders import sops_secrets_folder
|
|
from .machines import add_machine, has_machine
|
|
from .secrets import decrypt_secret, encrypt_secret, has_secret
|
|
from .sops import generate_private_key
|
|
|
|
log = logging.getLogger(__name__)
|
|
|
|
def generate_host_key(flake_name: FlakeName, machine_name: str) -> None:
|
|
if has_machine(flake_name, machine_name):
|
|
return
|
|
priv_key, pub_key = generate_private_key()
|
|
encrypt_secret(
|
|
flake_name,
|
|
sops_secrets_folder(flake_name) / f"{machine_name}-age.key",
|
|
priv_key,
|
|
)
|
|
add_machine(flake_name, machine_name, pub_key, False)
|
|
|
|
|
|
def generate_secrets_group(
|
|
flake_name: FlakeName,
|
|
secret_group: str,
|
|
machine_name: str,
|
|
tempdir: Path,
|
|
secret_options: dict[str, Any],
|
|
) -> None:
|
|
clan_dir = specific_flake_dir(flake_name)
|
|
secrets = secret_options["secrets"]
|
|
needs_regeneration = any(
|
|
not has_secret(flake_name, f"{machine_name}-{secret['name']}")
|
|
for secret in secrets.values()
|
|
)
|
|
generator = secret_options["generator"]
|
|
subdir = tempdir / secret_group
|
|
if needs_regeneration:
|
|
facts_dir = subdir / "facts"
|
|
facts_dir.mkdir(parents=True)
|
|
secrets_dir = subdir / "secrets"
|
|
secrets_dir.mkdir(parents=True)
|
|
|
|
text = f"""\
|
|
set -euo pipefail
|
|
export facts={shlex.quote(str(facts_dir))}
|
|
export secrets={shlex.quote(str(secrets_dir))}
|
|
{generator}
|
|
"""
|
|
try:
|
|
cmd = nix_shell(["bash"], ["bash", "-c", text])
|
|
subprocess.run(cmd, check=True)
|
|
except subprocess.CalledProcessError:
|
|
msg = "failed to the following command:\n"
|
|
msg += text
|
|
raise ClanError(msg)
|
|
for secret in secrets.values():
|
|
secret_file = secrets_dir / secret["name"]
|
|
if not secret_file.is_file():
|
|
msg = f"did not generate a file for '{secret['name']}' when running the following command:\n"
|
|
msg += text
|
|
raise ClanError(msg)
|
|
encrypt_secret(
|
|
flake_name,
|
|
sops_secrets_folder(flake_name) / f"{machine_name}-{secret['name']}",
|
|
secret_file.read_text(),
|
|
add_machines=[machine_name],
|
|
)
|
|
for fact in secret_options["facts"].values():
|
|
fact_file = facts_dir / fact["name"]
|
|
if not fact_file.is_file():
|
|
msg = f"did not generate a file for '{fact['name']}' when running the following command:\n"
|
|
msg += text
|
|
raise ClanError(msg)
|
|
fact_path = clan_dir.joinpath(fact["path"])
|
|
fact_path.parent.mkdir(parents=True, exist_ok=True)
|
|
shutil.copyfile(fact_file, fact_path)
|
|
|
|
|
|
# this is called by the sops.nix clan core module
|
|
def generate_secrets_from_nix(
|
|
flake_name: FlakeName,
|
|
machine_name: str,
|
|
secret_submodules: dict[str, Any],
|
|
) -> None:
|
|
generate_host_key(flake_name, machine_name)
|
|
errors = {}
|
|
log.debug("Generating secrets for machine %s and flake %s", machine_name, flake_name)
|
|
with TemporaryDirectory() as d:
|
|
# if any of the secrets are missing, we regenerate all connected facts/secrets
|
|
for secret_group, secret_options in secret_submodules.items():
|
|
try:
|
|
generate_secrets_group(
|
|
flake_name, secret_group, machine_name, Path(d), secret_options
|
|
)
|
|
except ClanError as e:
|
|
errors[secret_group] = e
|
|
for secret_group, error in errors.items():
|
|
print(f"failed to generate secrets for {machine_name}/{secret_group}:")
|
|
print(error, file=sys.stderr)
|
|
if len(errors) > 0:
|
|
sys.exit(1)
|
|
|
|
|
|
# this is called by the sops.nix clan core module
|
|
def upload_age_key_from_nix(
|
|
flake_name: FlakeName,
|
|
machine_name: str,
|
|
) -> None:
|
|
log.debug("Uploading secrets for machine %s and flake %s", machine_name, flake_name)
|
|
secret_name = f"{machine_name}-age.key"
|
|
if not has_secret(
|
|
flake_name, secret_name
|
|
): # skip uploading the secret, not managed by us
|
|
return
|
|
secret = decrypt_secret(flake_name, secret_name)
|
|
|
|
secrets_dir = Path(os.environ["SECRETS_DIR"])
|
|
(secrets_dir / "key.txt").write_text(secret)
|