]>
Commit | Line | Data |
---|---|---|
8a964143 | 1 | { lib, pkgs, config, ... }: |
3013caf1 IB |
2 | { |
3 | options.services.myCertificates = { | |
4 | certConfig = lib.mkOption { | |
5 | default = { | |
9ade8f6e | 6 | webroot = "${config.security.acme.directory}/acme-challenge"; |
3013caf1 IB |
7 | email = "ismael@bouya.org"; |
8 | postRun = '' | |
273e2c61 | 9 | systemctl reload httpdTools.service httpdInte.service httpdProd.service |
3013caf1 IB |
10 | ''; |
11 | plugins = [ "cert.pem" "chain.pem" "fullchain.pem" "full.pem" "key.pem" "account_key.json" ]; | |
12 | }; | |
13 | description = "Default configuration for certificates"; | |
14 | }; | |
15 | }; | |
16 | ||
17 | config = { | |
6a8252b1 IB |
18 | services.backup.profiles.system.excludeFile = '' |
19 | + ${config.security.acme.directory} | |
20 | ''; | |
29f8cb85 | 21 | services.websites.certs = config.services.myCertificates.certConfig; |
182ae57f | 22 | myServices.databasesCerts = config.services.myCertificates.certConfig; |
ffb14c1c | 23 | myServices.ircCerts = config.services.myCertificates.certConfig; |
7df420c2 | 24 | |
3013caf1 IB |
25 | security.acme.preliminarySelfsigned = true; |
26 | ||
27 | security.acme.certs = { | |
3013caf1 IB |
28 | "eldiron" = config.services.myCertificates.certConfig // { |
29 | domain = "eldiron.immae.eu"; | |
3013caf1 IB |
30 | }; |
31 | }; | |
017cb76f IB |
32 | |
33 | systemd.services = lib.attrsets.mapAttrs' (k: v: | |
34 | lib.attrsets.nameValuePair "acme-selfsigned-${k}" (lib.mkBefore { script = | |
35 | (lib.optionalString (builtins.elem "cert.pem" v.plugins) '' | |
9ade8f6e IB |
36 | cp $workdir/server.crt ${config.security.acme.directory}/${k}/cert.pem |
37 | chown '${v.user}:${v.group}' ${config.security.acme.directory}/${k}/cert.pem | |
38 | chmod ${if v.allowKeysForGroup then "750" else "700"} ${config.security.acme.directory}/${k}/cert.pem | |
017cb76f IB |
39 | '') + |
40 | (lib.optionalString (builtins.elem "chain.pem" v.plugins) '' | |
9ade8f6e IB |
41 | cp $workdir/ca.crt ${config.security.acme.directory}/${k}/chain.pem |
42 | chown '${v.user}:${v.group}' ${config.security.acme.directory}/${k}/chain.pem | |
43 | chmod ${if v.allowKeysForGroup then "750" else "700"} ${config.security.acme.directory}/${k}/chain.pem | |
017cb76f IB |
44 | '') |
45 | ; }) | |
46 | ) config.security.acme.certs // { | |
47 | httpdProd.after = [ "acme-selfsigned-certificates.target" ]; | |
48 | httpdProd.wants = [ "acme-selfsigned-certificates.target" ]; | |
49 | httpdTools.after = [ "acme-selfsigned-certificates.target" ]; | |
50 | httpdTools.wants = [ "acme-selfsigned-certificates.target" ]; | |
51 | httpdInte.after = [ "acme-selfsigned-certificates.target" ]; | |
52 | httpdInte.wants = [ "acme-selfsigned-certificates.target" ]; | |
53 | }; | |
3013caf1 IB |
54 | }; |
55 | } |