diff options
Diffstat (limited to 'modules/private')
20 files changed, 49 insertions, 49 deletions
diff --git a/modules/private/certificates.nix b/modules/private/certificates.nix index 2d24579..f057200 100644 --- a/modules/private/certificates.nix +++ b/modules/private/certificates.nix | |||
@@ -4,7 +4,7 @@ | |||
4 | enable = lib.mkEnableOption "enable certificates"; | 4 | enable = lib.mkEnableOption "enable certificates"; |
5 | certConfig = lib.mkOption { | 5 | certConfig = lib.mkOption { |
6 | default = { | 6 | default = { |
7 | webroot = "${config.security.acme.directory}/acme-challenge"; | 7 | webroot = "/var/lib/acme/acme-challenge"; |
8 | email = "ismael@bouya.org"; | 8 | email = "ismael@bouya.org"; |
9 | postRun = builtins.concatStringsSep "\n" [ | 9 | postRun = builtins.concatStringsSep "\n" [ |
10 | (lib.optionalString config.services.httpd.Prod.enable "systemctl reload httpdProd.service") | 10 | (lib.optionalString config.services.httpd.Prod.enable "systemctl reload httpdProd.service") |
@@ -12,7 +12,7 @@ | |||
12 | (lib.optionalString config.services.httpd.Inte.enable "systemctl reload httpdInte.service") | 12 | (lib.optionalString config.services.httpd.Inte.enable "systemctl reload httpdInte.service") |
13 | (lib.optionalString config.services.nginx.enable "systemctl reload nginx.service") | 13 | (lib.optionalString config.services.nginx.enable "systemctl reload nginx.service") |
14 | ]; | 14 | ]; |
15 | plugins = [ "cert.pem" "chain.pem" "fullchain.pem" "full.pem" "key.pem" "account_key.json" ]; | 15 | plugins = [ "cert.pem" "chain.pem" "fullchain.pem" "full.pem" "key.pem" "account_key.json" "account_reg.json"]; |
16 | }; | 16 | }; |
17 | description = "Default configuration for certificates"; | 17 | description = "Default configuration for certificates"; |
18 | }; | 18 | }; |
@@ -20,7 +20,7 @@ | |||
20 | 20 | ||
21 | config = lib.mkIf config.myServices.certificates.enable { | 21 | config = lib.mkIf config.myServices.certificates.enable { |
22 | services.duplyBackup.profiles.system.excludeFile = '' | 22 | services.duplyBackup.profiles.system.excludeFile = '' |
23 | + ${config.security.acme.directory} | 23 | + /var/lib/acme/acme-challenge |
24 | ''; | 24 | ''; |
25 | services.nginx = { | 25 | services.nginx = { |
26 | recommendedTlsSettings = true; | 26 | recommendedTlsSettings = true; |
@@ -30,9 +30,9 @@ | |||
30 | myServices.databasesCerts = config.myServices.certificates.certConfig; | 30 | myServices.databasesCerts = config.myServices.certificates.certConfig; |
31 | myServices.ircCerts = config.myServices.certificates.certConfig; | 31 | myServices.ircCerts = config.myServices.certificates.certConfig; |
32 | 32 | ||
33 | security.acme.preliminarySelfsigned = true; | 33 | security.acme2.preliminarySelfsigned = true; |
34 | 34 | ||
35 | security.acme.certs = { | 35 | security.acme2.certs = { |
36 | "${name}" = config.myServices.certificates.certConfig // { | 36 | "${name}" = config.myServices.certificates.certConfig // { |
37 | domain = config.hostEnv.fqdn; | 37 | domain = config.hostEnv.fqdn; |
38 | }; | 38 | }; |
@@ -41,17 +41,17 @@ | |||
41 | systemd.services = lib.attrsets.mapAttrs' (k: v: | 41 | systemd.services = lib.attrsets.mapAttrs' (k: v: |
42 | lib.attrsets.nameValuePair "acme-selfsigned-${k}" (lib.mkBefore { script = | 42 | lib.attrsets.nameValuePair "acme-selfsigned-${k}" (lib.mkBefore { script = |
43 | (lib.optionalString (builtins.elem "cert.pem" v.plugins) '' | 43 | (lib.optionalString (builtins.elem "cert.pem" v.plugins) '' |
44 | cp $workdir/server.crt ${config.security.acme.directory}/${k}/cert.pem | 44 | cp $workdir/server.crt ${config.security.acme2.certs."${k}".directory}/cert.pem |
45 | chown '${v.user}:${v.group}' ${config.security.acme.directory}/${k}/cert.pem | 45 | chown '${v.user}:${v.group}' ${config.security.acme2.certs."${k}".directory}/cert.pem |
46 | chmod ${if v.allowKeysForGroup then "750" else "700"} ${config.security.acme.directory}/${k}/cert.pem | 46 | chmod ${if v.allowKeysForGroup then "750" else "700"} ${config.security.acme2.certs."${k}".directory}/cert.pem |
47 | '') + | 47 | '') + |
48 | (lib.optionalString (builtins.elem "chain.pem" v.plugins) '' | 48 | (lib.optionalString (builtins.elem "chain.pem" v.plugins) '' |
49 | cp $workdir/ca.crt ${config.security.acme.directory}/${k}/chain.pem | 49 | cp $workdir/ca.crt ${config.security.acme2.certs."${k}".directory}/chain.pem |
50 | chown '${v.user}:${v.group}' ${config.security.acme.directory}/${k}/chain.pem | 50 | chown '${v.user}:${v.group}' ${config.security.acme2.certs."${k}".directory}/chain.pem |
51 | chmod ${if v.allowKeysForGroup then "750" else "700"} ${config.security.acme.directory}/${k}/chain.pem | 51 | chmod ${if v.allowKeysForGroup then "750" else "700"} ${config.security.acme2.certs."${k}".directory}/chain.pem |
52 | '') | 52 | '') |
53 | ; }) | 53 | ; }) |
54 | ) config.security.acme.certs // { | 54 | ) config.security.acme2.certs // { |
55 | httpdProd = lib.mkIf config.services.httpd.Prod.enable | 55 | httpdProd = lib.mkIf config.services.httpd.Prod.enable |
56 | { after = [ "acme-selfsigned-certificates.target" ]; wants = [ "acme-selfsigned-certificates.target" ]; }; | 56 | { after = [ "acme-selfsigned-certificates.target" ]; wants = [ "acme-selfsigned-certificates.target" ]; }; |
57 | httpdTools = lib.mkIf config.services.httpd.Tools.enable | 57 | httpdTools = lib.mkIf config.services.httpd.Tools.enable |
diff --git a/modules/private/databases/mariadb.nix b/modules/private/databases/mariadb.nix index 3359064..ed647ea 100644 --- a/modules/private/databases/mariadb.nix +++ b/modules/private/databases/mariadb.nix | |||
@@ -96,8 +96,8 @@ in { | |||
96 | dataDir = cfg.dataDir; | 96 | dataDir = cfg.dataDir; |
97 | extraOptions = '' | 97 | extraOptions = '' |
98 | ssl_ca = ${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt | 98 | ssl_ca = ${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt |
99 | ssl_key = ${config.security.acme.directory}/mysql/key.pem | 99 | ssl_key = ${config.security.acme2.certs.mysql.directory}/key.pem |
100 | ssl_cert = ${config.security.acme.directory}/mysql/fullchain.pem | 100 | ssl_cert = ${config.security.acme2.certs.mysql.directory}/fullchain.pem |
101 | 101 | ||
102 | # for replication | 102 | # for replication |
103 | log-bin=mariadb-bin | 103 | log-bin=mariadb-bin |
@@ -110,10 +110,10 @@ in { | |||
110 | }; | 110 | }; |
111 | 111 | ||
112 | users.users.mysql.extraGroups = [ "keys" ]; | 112 | users.users.mysql.extraGroups = [ "keys" ]; |
113 | security.acme.certs."mysql" = config.myServices.databasesCerts // { | 113 | security.acme2.certs."mysql" = config.myServices.databasesCerts // { |
114 | user = "mysql"; | 114 | user = "mysql"; |
115 | group = "mysql"; | 115 | group = "mysql"; |
116 | plugins = [ "fullchain.pem" "key.pem" "account_key.json" ]; | 116 | plugins = [ "fullchain.pem" "key.pem" "account_key.json" "account_reg.json" ]; |
117 | domain = "db-1.immae.eu"; | 117 | domain = "db-1.immae.eu"; |
118 | postRun = '' | 118 | postRun = '' |
119 | systemctl restart mysql.service | 119 | systemctl restart mysql.service |
diff --git a/modules/private/databases/openldap/default.nix b/modules/private/databases/openldap/default.nix index 22f6f7b..d7d61db 100644 --- a/modules/private/databases/openldap/default.nix +++ b/modules/private/databases/openldap/default.nix | |||
@@ -24,9 +24,9 @@ let | |||
24 | overlay syncprov | 24 | overlay syncprov |
25 | syncprov-checkpoint 100 10 | 25 | syncprov-checkpoint 100 10 |
26 | 26 | ||
27 | TLSCertificateFile ${config.security.acme.directory}/ldap/cert.pem | 27 | TLSCertificateFile ${config.security.acme2.certs.ldap.directory}/cert.pem |
28 | TLSCertificateKeyFile ${config.security.acme.directory}/ldap/key.pem | 28 | TLSCertificateKeyFile ${config.security.acme2.certs.ldap.directory}/key.pem |
29 | TLSCACertificateFile ${config.security.acme.directory}/ldap/fullchain.pem | 29 | TLSCACertificateFile ${config.security.acme2.certs.ldap.directory}/fullchain.pem |
30 | TLSCACertificatePath ${pkgs.cacert.unbundled}/etc/ssl/certs/ | 30 | TLSCACertificatePath ${pkgs.cacert.unbundled}/etc/ssl/certs/ |
31 | #This makes openldap crash | 31 | #This makes openldap crash |
32 | #TLSCipherSuite DEFAULT | 32 | #TLSCipherSuite DEFAULT |
@@ -117,10 +117,10 @@ in | |||
117 | users.users.openldap.extraGroups = [ "keys" ]; | 117 | users.users.openldap.extraGroups = [ "keys" ]; |
118 | networking.firewall.allowedTCPPorts = [ 636 389 ]; | 118 | networking.firewall.allowedTCPPorts = [ 636 389 ]; |
119 | 119 | ||
120 | security.acme.certs."ldap" = config.myServices.databasesCerts // { | 120 | security.acme2.certs."ldap" = config.myServices.databasesCerts // { |
121 | user = "openldap"; | 121 | user = "openldap"; |
122 | group = "openldap"; | 122 | group = "openldap"; |
123 | plugins = [ "fullchain.pem" "key.pem" "cert.pem" "account_key.json" ]; | 123 | plugins = [ "fullchain.pem" "key.pem" "cert.pem" "account_key.json" "account_reg.json" ]; |
124 | domain = "ldap.immae.eu"; | 124 | domain = "ldap.immae.eu"; |
125 | postRun = '' | 125 | postRun = '' |
126 | systemctl restart openldap.service | 126 | systemctl restart openldap.service |
diff --git a/modules/private/databases/postgresql.nix b/modules/private/databases/postgresql.nix index 3dcd311..27ea59c 100644 --- a/modules/private/databases/postgresql.nix +++ b/modules/private/databases/postgresql.nix | |||
@@ -107,10 +107,10 @@ in { | |||
107 | config = lib.mkIf cfg.enable { | 107 | config = lib.mkIf cfg.enable { |
108 | networking.firewall.allowedTCPPorts = [ 5432 ]; | 108 | networking.firewall.allowedTCPPorts = [ 5432 ]; |
109 | 109 | ||
110 | security.acme.certs."postgresql" = config.myServices.databasesCerts // { | 110 | security.acme2.certs."postgresql" = config.myServices.databasesCerts // { |
111 | user = "postgres"; | 111 | user = "postgres"; |
112 | group = "postgres"; | 112 | group = "postgres"; |
113 | plugins = [ "fullchain.pem" "key.pem" "account_key.json" ]; | 113 | plugins = [ "fullchain.pem" "key.pem" "account_key.json" "account_reg.json" ]; |
114 | domain = "db-1.immae.eu"; | 114 | domain = "db-1.immae.eu"; |
115 | postRun = '' | 115 | postRun = '' |
116 | systemctl reload postgresql.service | 116 | systemctl reload postgresql.service |
@@ -165,8 +165,8 @@ in { | |||
165 | # makes it order of magnitudes quicker | 165 | # makes it order of magnitudes quicker |
166 | synchronous_commit = off | 166 | synchronous_commit = off |
167 | ssl = on | 167 | ssl = on |
168 | ssl_cert_file = '${config.security.acme.directory}/postgresql/fullchain.pem' | 168 | ssl_cert_file = '${config.security.acme2.certs.postgresql.directory}/fullchain.pem' |
169 | ssl_key_file = '${config.security.acme.directory}/postgresql/key.pem' | 169 | ssl_key_file = '${config.security.acme2.certs.postgresql.directory}/key.pem' |
170 | ''; | 170 | ''; |
171 | authentication = let | 171 | authentication = let |
172 | hosts = builtins.concatStringsSep "\n" ( | 172 | hosts = builtins.concatStringsSep "\n" ( |
diff --git a/modules/private/ejabberd/default.nix b/modules/private/ejabberd/default.nix index 5e717f4..3537c24 100644 --- a/modules/private/ejabberd/default.nix +++ b/modules/private/ejabberd/default.nix | |||
@@ -14,7 +14,7 @@ in | |||
14 | }; | 14 | }; |
15 | 15 | ||
16 | config = lib.mkIf cfg.enable { | 16 | config = lib.mkIf cfg.enable { |
17 | security.acme.certs = { | 17 | security.acme2.certs = { |
18 | "ejabberd" = config.myServices.certificates.certConfig // { | 18 | "ejabberd" = config.myServices.certificates.certConfig // { |
19 | user = "ejabberd"; | 19 | user = "ejabberd"; |
20 | group = "ejabberd"; | 20 | group = "ejabberd"; |
@@ -58,7 +58,7 @@ in | |||
58 | text = '' | 58 | text = '' |
59 | host_config: | 59 | host_config: |
60 | "immae.fr": | 60 | "immae.fr": |
61 | domain_certfile: "${config.security.acme.directory}/ejabberd/full.pem" | 61 | domain_certfile: "${config.security.acme2.certs.ejabberd.directory}/full.pem" |
62 | auth_method: [ldap] | 62 | auth_method: [ldap] |
63 | ldap_servers: ["${config.myEnv.jabber.ldap.host}"] | 63 | ldap_servers: ["${config.myEnv.jabber.ldap.host}"] |
64 | ldap_encrypt: tls | 64 | ldap_encrypt: tls |
@@ -81,7 +81,7 @@ in | |||
81 | ERLANG_NODE=ejabberd@localhost | 81 | ERLANG_NODE=ejabberd@localhost |
82 | ''; | 82 | ''; |
83 | configFile = pkgs.runCommand "ejabberd.yml" { | 83 | configFile = pkgs.runCommand "ejabberd.yml" { |
84 | certificatePrivateKeyAndFullChain = "${config.security.acme.directory}/ejabberd/full.pem"; | 84 | certificatePrivateKeyAndFullChain = "${config.security.acme2.certs.ejabberd.directory}/full.pem"; |
85 | certificateCA = "${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt"; | 85 | certificateCA = "${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt"; |
86 | sql_config_file = config.secrets.fullPaths."ejabberd/psql.yml"; | 86 | sql_config_file = config.secrets.fullPaths."ejabberd/psql.yml"; |
87 | host_config_file = config.secrets.fullPaths."ejabberd/host.yml"; | 87 | host_config_file = config.secrets.fullPaths."ejabberd/host.yml"; |
diff --git a/modules/private/ftp.nix b/modules/private/ftp.nix index e3c1f70..585fe63 100644 --- a/modules/private/ftp.nix +++ b/modules/private/ftp.nix | |||
@@ -17,7 +17,7 @@ in | |||
17 | services.duplyBackup.profiles.ftp = { | 17 | services.duplyBackup.profiles.ftp = { |
18 | rootDir = "/var/lib/ftp"; | 18 | rootDir = "/var/lib/ftp"; |
19 | }; | 19 | }; |
20 | security.acme.certs."ftp" = config.myServices.certificates.certConfig // { | 20 | security.acme2.certs."ftp" = config.myServices.certificates.certConfig // { |
21 | domain = "eldiron.immae.eu"; | 21 | domain = "eldiron.immae.eu"; |
22 | postRun = '' | 22 | postRun = '' |
23 | systemctl restart pure-ftpd.service | 23 | systemctl restart pure-ftpd.service |
@@ -113,7 +113,7 @@ in | |||
113 | MaxDiskUsage 99 | 113 | MaxDiskUsage 99 |
114 | CustomerProof yes | 114 | CustomerProof yes |
115 | TLS 1 | 115 | TLS 1 |
116 | CertFile ${config.security.acme.directory}/ftp/full.pem | 116 | CertFile ${config.security.acme2.certs.ftp.directory}/full.pem |
117 | ''; | 117 | ''; |
118 | in { | 118 | in { |
119 | description = "Pure-FTPd server"; | 119 | description = "Pure-FTPd server"; |
diff --git a/modules/private/irc.nix b/modules/private/irc.nix index 4e6eaab..1054b96 100644 --- a/modules/private/irc.nix +++ b/modules/private/irc.nix | |||
@@ -20,7 +20,7 @@ in | |||
20 | services.duplyBackup.profiles.irc = { | 20 | services.duplyBackup.profiles.irc = { |
21 | rootDir = "/var/lib/bitlbee"; | 21 | rootDir = "/var/lib/bitlbee"; |
22 | }; | 22 | }; |
23 | security.acme.certs."irc" = config.myServices.ircCerts // { | 23 | security.acme2.certs."irc" = config.myServices.ircCerts // { |
24 | domain = "irc.immae.eu"; | 24 | domain = "irc.immae.eu"; |
25 | postRun = '' | 25 | postRun = '' |
26 | systemctl restart stunnel.service | 26 | systemctl restart stunnel.service |
@@ -49,7 +49,7 @@ in | |||
49 | bitlbee = { | 49 | bitlbee = { |
50 | accept = 6697; | 50 | accept = 6697; |
51 | connect = 6667; | 51 | connect = 6667; |
52 | cert = "${config.security.acme.directory}/irc/full.pem"; | 52 | cert = "${config.security.acme2.certs.irc.directory}/full.pem"; |
53 | }; | 53 | }; |
54 | }; | 54 | }; |
55 | }; | 55 | }; |
diff --git a/modules/private/mail/default.nix b/modules/private/mail/default.nix index b50e346..1c64e15 100644 --- a/modules/private/mail/default.nix +++ b/modules/private/mail/default.nix | |||
@@ -13,7 +13,7 @@ | |||
13 | options.myServices.mailBackup.enable = lib.mkEnableOption "enable MX backup services"; | 13 | options.myServices.mailBackup.enable = lib.mkEnableOption "enable MX backup services"; |
14 | 14 | ||
15 | config = lib.mkIf config.myServices.mail.enable { | 15 | config = lib.mkIf config.myServices.mail.enable { |
16 | security.acme.certs."mail" = config.myServices.certificates.certConfig // { | 16 | security.acme2.certs."mail" = config.myServices.certificates.certConfig // { |
17 | domain = config.hostEnv.fqdn; | 17 | domain = config.hostEnv.fqdn; |
18 | extraDomains = let | 18 | extraDomains = let |
19 | zonesWithMx = builtins.filter (zone: | 19 | zonesWithMx = builtins.filter (zone: |
diff --git a/modules/private/mail/dovecot.nix b/modules/private/mail/dovecot.nix index 4facef5..523c017 100644 --- a/modules/private/mail/dovecot.nix +++ b/modules/private/mail/dovecot.nix | |||
@@ -269,7 +269,7 @@ in | |||
269 | [ | 269 | [ |
270 | "0 2 * * * root ${cron_script}/bin/cleanup-imap-folders" | 270 | "0 2 * * * root ${cron_script}/bin/cleanup-imap-folders" |
271 | ]; | 271 | ]; |
272 | security.acme.certs."mail" = { | 272 | security.acme2.certs."mail" = { |
273 | postRun = '' | 273 | postRun = '' |
274 | systemctl restart dovecot2.service | 274 | systemctl restart dovecot2.service |
275 | ''; | 275 | ''; |
diff --git a/modules/private/mail/postfix.nix b/modules/private/mail/postfix.nix index bd284cb..8fe06da 100644 --- a/modules/private/mail/postfix.nix +++ b/modules/private/mail/postfix.nix | |||
@@ -417,7 +417,7 @@ | |||
417 | }; | 417 | }; |
418 | }; | 418 | }; |
419 | }; | 419 | }; |
420 | security.acme.certs."mail" = { | 420 | security.acme2.certs."mail" = { |
421 | postRun = '' | 421 | postRun = '' |
422 | systemctl restart postfix.service | 422 | systemctl restart postfix.service |
423 | ''; | 423 | ''; |
diff --git a/modules/private/mail/relay.nix b/modules/private/mail/relay.nix index 9111350..e0aa387 100644 --- a/modules/private/mail/relay.nix +++ b/modules/private/mail/relay.nix | |||
@@ -1,7 +1,7 @@ | |||
1 | { lib, pkgs, config, nodes, name, ... }: | 1 | { lib, pkgs, config, nodes, name, ... }: |
2 | { | 2 | { |
3 | config = lib.mkIf config.myServices.mailBackup.enable { | 3 | config = lib.mkIf config.myServices.mailBackup.enable { |
4 | security.acme.certs."mail" = config.myServices.certificates.certConfig // { | 4 | security.acme2.certs."mail" = config.myServices.certificates.certConfig // { |
5 | postRun = '' | 5 | postRun = '' |
6 | systemctl restart postfix.service | 6 | systemctl restart postfix.service |
7 | ''; | 7 | ''; |
diff --git a/modules/private/monitoring/status.nix b/modules/private/monitoring/status.nix index d25d934..2860e96 100644 --- a/modules/private/monitoring/status.nix +++ b/modules/private/monitoring/status.nix | |||
@@ -34,7 +34,7 @@ | |||
34 | locations."/".proxyPass = "http://unix:/run/naemon-status/socket.sock:/"; | 34 | locations."/".proxyPass = "http://unix:/run/naemon-status/socket.sock:/"; |
35 | }; | 35 | }; |
36 | }; | 36 | }; |
37 | security.acme.certs."${name}".extraDomains."status.immae.eu" = null; | 37 | security.acme2.certs."${name}".extraDomains."status.immae.eu" = null; |
38 | 38 | ||
39 | myServices.certificates.enable = true; | 39 | myServices.certificates.enable = true; |
40 | networking.firewall.allowedTCPPorts = [ 80 443 ]; | 40 | networking.firewall.allowedTCPPorts = [ 80 443 ]; |
diff --git a/modules/private/tasks/default.nix b/modules/private/tasks/default.nix index c4f065b..c0cc87b 100644 --- a/modules/private/tasks/default.nix +++ b/modules/private/tasks/default.nix | |||
@@ -192,9 +192,9 @@ in { | |||
192 | 192 | ||
193 | myServices.websites.webappDirs._task = ./www; | 193 | myServices.websites.webappDirs._task = ./www; |
194 | 194 | ||
195 | security.acme.certs."task" = config.myServices.certificates.certConfig // { | 195 | security.acme2.certs."task" = config.myServices.certificates.certConfig // { |
196 | inherit user group; | 196 | inherit user group; |
197 | plugins = [ "fullchain.pem" "key.pem" "cert.pem" "account_key.json" ]; | 197 | plugins = [ "fullchain.pem" "key.pem" "cert.pem" "account_key.json" "account_reg.json" ]; |
198 | domain = fqdn; | 198 | domain = fqdn; |
199 | postRun = '' | 199 | postRun = '' |
200 | systemctl restart taskserver.service | 200 | systemctl restart taskserver.service |
@@ -244,9 +244,9 @@ in { | |||
244 | inherit fqdn; | 244 | inherit fqdn; |
245 | listenHost = "::"; | 245 | listenHost = "::"; |
246 | pki.manual.ca.cert = "${server_vardir}/keys/ca.cert"; | 246 | pki.manual.ca.cert = "${server_vardir}/keys/ca.cert"; |
247 | pki.manual.server.cert = "${config.security.acme.directory}/task/fullchain.pem"; | 247 | pki.manual.server.cert = "${config.security.acme2.certs.task.directory}/fullchain.pem"; |
248 | pki.manual.server.crl = "${config.security.acme.directory}/task/invalid.crl"; | 248 | pki.manual.server.crl = "${config.security.acme2.certs.task.directory}/invalid.crl"; |
249 | pki.manual.server.key = "${config.security.acme.directory}/task/key.pem"; | 249 | pki.manual.server.key = "${config.security.acme2.certs.task.directory}/key.pem"; |
250 | requestLimit = 104857600; | 250 | requestLimit = 104857600; |
251 | }; | 251 | }; |
252 | 252 | ||
diff --git a/modules/private/websites/default.nix b/modules/private/websites/default.nix index 7f3e463..90f24a4 100644 --- a/modules/private/websites/default.nix +++ b/modules/private/websites/default.nix | |||
@@ -125,7 +125,7 @@ in | |||
125 | 125 | ||
126 | system.activationScripts = { | 126 | system.activationScripts = { |
127 | httpd = '' | 127 | httpd = '' |
128 | install -d -m 0755 ${config.security.acme.directory}/acme-challenge | 128 | install -d -m 0755 /var/lib/acme/acme-challenge |
129 | install -d -m 0750 -o wwwrun -g wwwrun /var/lib/php/sessions | 129 | install -d -m 0750 -o wwwrun -g wwwrun /var/lib/php/sessions |
130 | ''; | 130 | ''; |
131 | }; | 131 | }; |
diff --git a/modules/private/websites/florian/integration.nix b/modules/private/websites/florian/integration.nix index 00de761..ef7d13a 100644 --- a/modules/private/websites/florian/integration.nix +++ b/modules/private/websites/florian/integration.nix | |||
@@ -8,7 +8,7 @@ in { | |||
8 | options.myServices.websites.florian.integration.enable = lib.mkEnableOption "enable Florian's website integration"; | 8 | options.myServices.websites.florian.integration.enable = lib.mkEnableOption "enable Florian's website integration"; |
9 | 9 | ||
10 | config = lib.mkIf cfg.enable { | 10 | config = lib.mkIf cfg.enable { |
11 | security.acme.certs."ftp".extraDomains."florian.immae.eu" = null; | 11 | security.acme2.certs."ftp".extraDomains."florian.immae.eu" = null; |
12 | 12 | ||
13 | services.websites.env.integration.modules = adminer.apache.modules; | 13 | services.websites.env.integration.modules = adminer.apache.modules; |
14 | services.websites.env.integration.vhostConfs.florian = { | 14 | services.websites.env.integration.vhostConfs.florian = { |
diff --git a/modules/private/websites/florian/production.nix b/modules/private/websites/florian/production.nix index 8d3dfb0..1abc715 100644 --- a/modules/private/websites/florian/production.nix +++ b/modules/private/websites/florian/production.nix | |||
@@ -8,7 +8,7 @@ in { | |||
8 | options.myServices.websites.florian.production.enable = lib.mkEnableOption "enable Florian's website production"; | 8 | options.myServices.websites.florian.production.enable = lib.mkEnableOption "enable Florian's website production"; |
9 | 9 | ||
10 | config = lib.mkIf cfg.enable { | 10 | config = lib.mkIf cfg.enable { |
11 | security.acme.certs."ftp".extraDomains."tellesflorian.com" = null; | 11 | security.acme2.certs."ftp".extraDomains."tellesflorian.com" = null; |
12 | 12 | ||
13 | services.websites.env.production.modules = adminer.apache.modules; | 13 | services.websites.env.production.modules = adminer.apache.modules; |
14 | services.websites.env.production.vhostConfs.florian = { | 14 | services.websites.env.production.vhostConfs.florian = { |
diff --git a/modules/private/websites/nassime/production.nix b/modules/private/websites/nassime/production.nix index f9468f9..293519f 100644 --- a/modules/private/websites/nassime/production.nix +++ b/modules/private/websites/nassime/production.nix | |||
@@ -9,7 +9,7 @@ in { | |||
9 | config = lib.mkIf cfg.enable { | 9 | config = lib.mkIf cfg.enable { |
10 | services.webstats.sites = [ { name = "nassime.bouya.org"; } ]; | 10 | services.webstats.sites = [ { name = "nassime.bouya.org"; } ]; |
11 | 11 | ||
12 | security.acme.certs."ftp".extraDomains."nassime.bouya.org" = null; | 12 | security.acme2.certs."ftp".extraDomains."nassime.bouya.org" = null; |
13 | 13 | ||
14 | services.websites.env.production.vhostConfs.nassime = { | 14 | services.websites.env.production.vhostConfs.nassime = { |
15 | certName = "nassime"; | 15 | certName = "nassime"; |
diff --git a/modules/private/websites/naturaloutil/production.nix b/modules/private/websites/naturaloutil/production.nix index 628e129..a276c47 100644 --- a/modules/private/websites/naturaloutil/production.nix +++ b/modules/private/websites/naturaloutil/production.nix | |||
@@ -10,7 +10,7 @@ in { | |||
10 | config = lib.mkIf cfg.enable { | 10 | config = lib.mkIf cfg.enable { |
11 | services.webstats.sites = [ { name = "naturaloutil.immae.eu"; } ]; | 11 | services.webstats.sites = [ { name = "naturaloutil.immae.eu"; } ]; |
12 | 12 | ||
13 | security.acme.certs."ftp".extraDomains."naturaloutil.immae.eu" = null; | 13 | security.acme2.certs."ftp".extraDomains."naturaloutil.immae.eu" = null; |
14 | 14 | ||
15 | secrets.keys = [{ | 15 | secrets.keys = [{ |
16 | dest = "webapps/prod-naturaloutil"; | 16 | dest = "webapps/prod-naturaloutil"; |
diff --git a/modules/private/websites/papa/surveillance.nix b/modules/private/websites/papa/surveillance.nix index 1bb6ac8..f6e1772 100644 --- a/modules/private/websites/papa/surveillance.nix +++ b/modules/private/websites/papa/surveillance.nix | |||
@@ -6,7 +6,7 @@ in { | |||
6 | options.myServices.websites.papa.surveillance.enable = lib.mkEnableOption "enable Papa surveillance's website"; | 6 | options.myServices.websites.papa.surveillance.enable = lib.mkEnableOption "enable Papa surveillance's website"; |
7 | 7 | ||
8 | config = lib.mkIf cfg.enable { | 8 | config = lib.mkIf cfg.enable { |
9 | security.acme.certs."ftp".extraDomains."surveillance.maison.bbc.bouya.org" = null; | 9 | security.acme2.certs."ftp".extraDomains."surveillance.maison.bbc.bouya.org" = null; |
10 | 10 | ||
11 | services.cron = { | 11 | services.cron = { |
12 | systemCronJobs = let | 12 | systemCronJobs = let |
diff --git a/modules/private/websites/teliotortay/production.nix b/modules/private/websites/teliotortay/production.nix index 59090f5..2c62d10 100644 --- a/modules/private/websites/teliotortay/production.nix +++ b/modules/private/websites/teliotortay/production.nix | |||
@@ -10,7 +10,7 @@ in { | |||
10 | config = lib.mkIf cfg.enable { | 10 | config = lib.mkIf cfg.enable { |
11 | services.webstats.sites = [ { name = "telio-tortay.immae.eu"; } ]; | 11 | services.webstats.sites = [ { name = "telio-tortay.immae.eu"; } ]; |
12 | 12 | ||
13 | security.acme.certs."ftp".extraDomains."telio-tortay.immae.eu" = null; | 13 | security.acme2.certs."ftp".extraDomains."telio-tortay.immae.eu" = null; |
14 | 14 | ||
15 | system.activationScripts.telio-tortay = { | 15 | system.activationScripts.telio-tortay = { |
16 | deps = [ "httpd" ]; | 16 | deps = [ "httpd" ]; |