Clean up some code and fix dkim txt record length
Some checks failed
/ dev-shell (push) Successful in 32s
/ rust-packages (push) Successful in 40s
/ terraform-providers (push) Successful in 35s
/ check (push) Failing after 2m38s
/ systems (push) Successful in 20m41s

This commit is contained in:
Kaare Hoff Skovgaard 2025-07-23 23:40:47 +02:00
parent d842025c81
commit 32e827f82c
Signed by: khs
GPG key ID: C7D890804F01E9F0
4 changed files with 3 additions and 24 deletions

View file

@ -37,15 +37,6 @@ let
};
firewallRules = firewallTcpRules ++ firewallUdpRules ++ firewallIcmpRules ++ cfg.extraFirewallRules;
firewallEnable = config.networking.firewall.enable;
tldFromFqdn =
fqdn:
let
split = lib.strings.splitString "." fqdn;
in
if lib.lists.length split < 3 then
fqdn
else
lib.strings.removePrefix "${builtins.head split}." fqdn;
in
{
options.khscodes.infrastructure.hetzner-instance = {

View file

@ -59,15 +59,6 @@ let
}
];
firewallRules = firewallTcpRules ++ firewallUdpRules ++ firewallIcmpRules ++ cfg.extraFirewallRules;
tldFromFqdn =
fqdn:
let
split = lib.strings.splitString "." fqdn;
in
if lib.lists.length split < 3 then
fqdn
else
lib.strings.removePrefix "${builtins.head split}." fqdn;
in
{
options.khscodes.infrastructure.khs-openstack-instance = {

View file

@ -79,7 +79,7 @@ in
name = "snm_rsa._domainkey";
zone_id = "\${ data.cloudflare_zone.kas_codes.id }";
type = "TXT";
content = ''"v=DKIM1;k=rsa;p=${dkimPublicKey "tls_private_key.dkim_rsa"}"'';
content = ''"''${ join("\" \"", regexall(".{1,255}", "v=DKIM1;k=rsa;p=${dkimPublicKey "tls_private_key.dkim_rsa"}" )) }"'';
comment = "app=kas.codes";
ttl = 600;
};
@ -88,7 +88,7 @@ in
name = "snm_ed25519._domainkey";
zone_id = "\${ data.cloudflare_zone.kas_codes.id }";
type = "TXT";
content = ''"v=DKIM1;k=ed25519;p=${dkimPublicKey "tls_private_key.dkim_ed25519"}"'';
content = ''"''${ join("\" \"", regexall(".{1,255}", "v=DKIM1;k=ed25519;p=${dkimPublicKey "tls_private_key.dkim_ed25519"}" )) }"'';
comment = "app=kas.codes";
ttl = 600;
};

View file

@ -1,6 +1,3 @@
let
bcrypt = expr: "\${ jsonencode(bcrypt(${expr})) }";
in
{
khscodes.services.vault-agent.templates = [
{
@ -42,7 +39,7 @@ in
name = "mailserver/users/forgejo";
data_json = ''
{
"hashed_password": ${bcrypt "resource.random_password.forgejo_mail_passwd.result"},
"hashed_password": ''${ jsonencode(resource.random_password.forgejo_mail_passwd.bcrypt_hash) },
"password": ''${ jsonencode(resource.random_password.forgejo_mail_passwd.result) }
}
'';