]>
Commit | Line | Data |
---|---|---|
6e9f30f4 | 1 | { lib, pkgs, config, name, ... }: |
3013caf1 | 2 | { |
8415083e IB |
3 | options.myServices.certificates = { |
4 | enable = lib.mkEnableOption "enable certificates"; | |
3013caf1 IB |
5 | certConfig = lib.mkOption { |
6 | default = { | |
9ade8f6e | 7 | webroot = "${config.security.acme.directory}/acme-challenge"; |
3013caf1 | 8 | email = "ismael@bouya.org"; |
6e9f30f4 IB |
9 | postRun = builtins.concatStringsSep "\n" [ |
10 | (lib.optionalString config.services.httpd.Prod.enable "systemctl reload httpdProd.service") | |
11 | (lib.optionalString config.services.httpd.Tools.enable "systemctl reload httpdTools.service") | |
12 | (lib.optionalString config.services.httpd.Inte.enable "systemctl reload httpdInte.service") | |
13 | (lib.optionalString config.services.nginx.enable "systemctl reload nginx.service") | |
14 | ]; | |
3013caf1 IB |
15 | plugins = [ "cert.pem" "chain.pem" "fullchain.pem" "full.pem" "key.pem" "account_key.json" ]; |
16 | }; | |
17 | description = "Default configuration for certificates"; | |
18 | }; | |
19 | }; | |
20 | ||
8415083e | 21 | config = lib.mkIf config.myServices.certificates.enable { |
d2e703c5 | 22 | services.duplyBackup.profiles.system.excludeFile = '' |
6a8252b1 IB |
23 | + ${config.security.acme.directory} |
24 | ''; | |
6e9f30f4 IB |
25 | services.nginx = { |
26 | recommendedTlsSettings = true; | |
27 | virtualHosts = { "${config.hostEnv.FQDN}" = { useACMEHost = name; forceSSL = true; }; }; | |
28 | }; | |
8415083e IB |
29 | services.websites.certs = config.myServices.certificates.certConfig; |
30 | myServices.databasesCerts = config.myServices.certificates.certConfig; | |
31 | myServices.ircCerts = config.myServices.certificates.certConfig; | |
7df420c2 | 32 | |
3013caf1 IB |
33 | security.acme.preliminarySelfsigned = true; |
34 | ||
35 | security.acme.certs = { | |
6e9f30f4 IB |
36 | "${name}" = config.myServices.certificates.certConfig // { |
37 | domain = config.hostEnv.FQDN; | |
3013caf1 IB |
38 | }; |
39 | }; | |
017cb76f IB |
40 | |
41 | systemd.services = lib.attrsets.mapAttrs' (k: v: | |
42 | lib.attrsets.nameValuePair "acme-selfsigned-${k}" (lib.mkBefore { script = | |
43 | (lib.optionalString (builtins.elem "cert.pem" v.plugins) '' | |
9ade8f6e IB |
44 | cp $workdir/server.crt ${config.security.acme.directory}/${k}/cert.pem |
45 | chown '${v.user}:${v.group}' ${config.security.acme.directory}/${k}/cert.pem | |
46 | chmod ${if v.allowKeysForGroup then "750" else "700"} ${config.security.acme.directory}/${k}/cert.pem | |
017cb76f IB |
47 | '') + |
48 | (lib.optionalString (builtins.elem "chain.pem" v.plugins) '' | |
9ade8f6e IB |
49 | cp $workdir/ca.crt ${config.security.acme.directory}/${k}/chain.pem |
50 | chown '${v.user}:${v.group}' ${config.security.acme.directory}/${k}/chain.pem | |
51 | chmod ${if v.allowKeysForGroup then "750" else "700"} ${config.security.acme.directory}/${k}/chain.pem | |
017cb76f IB |
52 | '') |
53 | ; }) | |
54 | ) config.security.acme.certs // { | |
6e9f30f4 IB |
55 | httpdProd = lib.mkIf config.services.httpd.Prod.enable |
56 | { after = [ "acme-selfsigned-certificates.target" ]; wants = [ "acme-selfsigned-certificates.target" ]; }; | |
57 | httpdTools = lib.mkIf config.services.httpd.Tools.enable | |
58 | { after = [ "acme-selfsigned-certificates.target" ]; wants = [ "acme-selfsigned-certificates.target" ]; }; | |
59 | httpdInte = lib.mkIf config.services.httpd.Inte.enable | |
60 | { after = [ "acme-selfsigned-certificates.target" ]; wants = [ "acme-selfsigned-certificates.target" ]; }; | |
017cb76f | 61 | }; |
3013caf1 IB |
62 | }; |
63 | } |