blob: 6a1d6f8421561201575051cd7b5ce5d294a2e1bf (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
|
{ config, lib, pkgs, ... }:
with lib;
let
knotCfg = config.services.knot;
knotDNSCredentials = zone: pkgs.writeText "lego-credentials" ''
EXEC_PATH=${knotDNSExec zone}/bin/update-dns.sh
EXEC_PROPAGATION_TIMEOUT=300
EXEC_POLLING_INTERVAL=5
'';
knotDNSExec = zone: pkgs.writeScriptBin "update-dns.sh" ''
#!${pkgs.zsh}/bin/zsh -xe
mode=$1
fqdn=$2
challenge=$3
owner=''${fqdn%".${zone}."}
commited=
function abort() {
[[ -n "''${commited}" ]] || ${knotCfg.cliWrappers}/bin/knotc zone-abort "${zone}"
}
${knotCfg.cliWrappers}/bin/knotc zone-begin "${zone}"
trap abort EXIT
case "''${mode}" in
present)
${knotCfg.cliWrappers}/bin/knotc zone-unset ${zone} "''${owner}" TXT '""'
${knotCfg.cliWrappers}/bin/knotc zone-set ${zone} "''${owner}" 30 TXT "''${challenge}"
;;
cleanup)
${knotCfg.cliWrappers}/bin/knotc zone-unset ${zone} "''${owner}" TXT "''${challenge}"
${knotCfg.cliWrappers}/bin/knotc zone-set ${zone} "''${owner}" 30 TXT '""'
;;
*)
exit 2
;;
esac
${knotCfg.cliWrappers}/bin/knotc zone-commit "${zone}"
commited=yes
'';
domains = ["dirty-haskell.org" "141.li" "xmpp.li" "yggdrasil.li" "praseodym.org" "rheperire.org" "kleen.li" "nights.email"];
in {
config = {
fileSystems."/var/lib/acme" =
{ device = "surtr/safe/var-lib-acme";
fsType = "zfs";
};
security.acme = {
acceptTerms = true;
preliminarySelfsigned = true; # DNS challenge is slow
defaults.email = "phikeebaogobaegh@141.li";
certs =
let
domainAttrset = domain: {
inherit domain;
extraDomainNames = [ "*.${domain}" ];
dnsProvider = "exec";
credentialsFile = knotDNSCredentials domain;
dnsResolver = "1.1.1.1:53";
keyType = "rsa4096"; # we don't like NIST curves
};
in genAttrs domains domainAttrset;
};
systemd.services =
let
serviceAttrset = domain: {
after = [ "knot.service" ];
bindsTo = [ "knot.service" ];
serviceConfig = {
ReadWritePaths = ["/run/knot/knot.sock"];
SupplementaryGroups = ["knot"];
RestrictAddressFamilies = ["AF_UNIX"];
};
};
in mapAttrs' (domain: nameValuePair "acme-${domain}") (genAttrs domains serviceAttrset);
};
}
|