break out + ssh unlock

This commit is contained in:
2026-04-07 20:37:56 +02:00
parent 76b7441884
commit 8ede23da35
6 changed files with 82 additions and 12 deletions
+8 -2
View File
@@ -1,6 +1,5 @@
{ {
inputs, inputs,
config,
pkgs, pkgs,
modules, modules,
... ...
@@ -28,13 +27,20 @@ in
./disko.nix ./disko.nix
modules.base modules.base
modules.zfsRoot modules.zfsRoot
modules.desktopHyprland modules.luksInitrdSshUnlock
modules.mailServer modules.mailServer
modules.binBashWrapper modules.binBashWrapper
]; ];
my.binBashWrapper.enable = true; my.binBashWrapper.enable = true;
my.initrdSshUnlock = {
enable = true;
authorizedKeys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICxY7ceahvTqe4AWGKRJNs1z4AdWT/WafkOBDaNrkB2p"
];
};
networking.hostName = hostName; networking.hostName = hostName;
networking.hostId = "8d49a097f2"; networking.hostId = "8d49a097f2";
+1
View File
@@ -27,6 +27,7 @@ in
./disko.nix ./disko.nix
modules.base modules.base
modules.zfsRoot modules.zfsRoot
modules.luksTpm2
modules.desktopHyprland modules.desktopHyprland
modules.binBashWrapper modules.binBashWrapper
]; ];
+2
View File
@@ -2,6 +2,8 @@
base = import ./base.nix; base = import ./base.nix;
binBashWrapper = import ./bin-bash-wrapper.nix; binBashWrapper = import ./bin-bash-wrapper.nix;
desktopHyprland = import ./desktop-hyprland.nix; desktopHyprland = import ./desktop-hyprland.nix;
luksInitrdSshUnlock = import ./luks-initrd-ssh-unlock.nix;
luksTpm2 = import ./luks-tpm2.nix;
mailServer = import ./mail-server; mailServer = import ./mail-server;
zfsRoot = import ./zfs-root.nix; zfsRoot = import ./zfs-root.nix;
} }
+58
View File
@@ -0,0 +1,58 @@
{
config,
lib,
...
}:
let
cfg = config.my.initrdSshUnlock;
in
{
options.my.initrdSshUnlock = {
enable = lib.mkEnableOption "enable initrd SSH unlock";
authorizedKeys = lib.mkOption {
type = lib.types.listOf lib.types.str;
default = [ ];
description = "SSH public keys allowed to connect to initrd for disk unlock.";
};
hostKeyPath = lib.mkOption {
type = lib.types.path;
default = /etc/secrets/initrd/ssh_host_ed25519_key;
description = "Path to the initrd SSH host private key on the target system.";
};
port = lib.mkOption {
type = lib.types.port;
default = 2222;
description = "Port used by the initrd SSH server.";
};
};
config = lib.mkIf cfg.enable {
boot.kernelParams = [ "ip=dhcp" ];
boot.initrd.network = {
enable = true;
ssh = {
enable = true;
port = cfg.port;
hostKeys = [ (toString cfg.hostKeyPath) ];
authorizedKeys = cfg.authorizedKeys;
};
};
boot.initrd.secrets = {
"${toString cfg.hostKeyPath}" = cfg.hostKeyPath;
};
system.activationScripts.initrdSshHostKey = {
deps = [ "users" "groups" ];
text = ''
install -d -m 700 "$(dirname ${toString cfg.hostKeyPath})"
if [ ! -f "${toString cfg.hostKeyPath}" ]; then
ssh-keygen -t ed25519 -N "" -f "${toString cfg.hostKeyPath}"
chmod 600 "${toString cfg.hostKeyPath}"
fi
'';
};
};
}
+13
View File
@@ -0,0 +1,13 @@
{ ... }:
{
boot.initrd.luks.devices.cryptroot.crypttabExtraOpts = [
"tpm2-device=auto"
"tpm2-pcrs=7"
];
security.tpm2 = {
enable = true;
pkcs11.enable = true;
tctiEnvironment.enable = true;
};
}
-10
View File
@@ -6,16 +6,6 @@
boot.initrd.luks.devices.cryptroot = { boot.initrd.luks.devices.cryptroot = {
device = "/dev/disk/by-partlabel/cryptroot"; device = "/dev/disk/by-partlabel/cryptroot";
allowDiscards = true; allowDiscards = true;
crypttabExtraOpts = [
"tpm2-device=auto"
"tpm2-pcrs=7"
];
};
security.tpm2 = {
enable = true;
pkcs11.enable = true;
tctiEnvironment.enable = true;
}; };
services.zfs = { services.zfs = {