machines/nix/systems/aarch64-linux/security.kaareskovgaard.net/post/openbao/ssh-host.nix
Kaare Hoff Skovgaard 30cf1f407a
All checks were successful
/ rust-packages (push) Successful in 52s
/ dev-shell (push) Successful in 47s
/ terraform-providers (push) Successful in 51s
/ check (push) Successful in 1m41s
/ systems (push) Successful in 4m2s
Split up terraform configurations even more
This should allow for disks to survive destruction of
instances.

Also support creating additional disks on hetzner, storing
a mapping of nix names for disks with their linux device paths.
Something similiar should also be possible to create for openstack
allowing a provider agnostic way of mapping between them.
2025-08-04 23:46:01 +02:00

22 lines
628 B
Nix

{
khscodes.services.openssh.hostCertificate.path = "\${ vault_mount.ssh-host.path }";
khscodes.infrastructure.provisioning.configuration.modules = [
(
{ config, ... }:
{
khscodes.vault.mount.ssh-host = {
type = "ssh";
path = "ssh-host";
default_lease_ttl_seconds = 24 * 60 * 60;
max_lease_ttl_seconds = 24 * 60 * 60;
};
resource.vault_ssh_secret_backend_ca.ssh-host = {
backend = config.khscodes.vault.output.mount.ssh-host.path;
generate_signing_key = true;
key_type = "ed25519";
};
}
)
];
}