blob: 9f8d92d6586264549e096e66520b2cfdca6591f1 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
|
{ config, lib, customUtils, pkgs, ... }:
with lib;
let
inherit (customUtils) mapFilterAttrs;
tsigSecretName = domain: "${domain}_tsig-secret";
cfg = config.security.acme;
knotCfg = config.services.knot;
knotDNSCredentials = domain: let
zone = if cfg.domains.${domain}.zone == null then domain else cfg.domains.${domain}.zone;
in pkgs.writeText "lego-credentials" ''
EXEC_PATH=${knotDNSExec zone}/bin/update-dns.sh
EXEC_PROPAGATION_TIMEOUT=300
EXEC_POLLING_INTERVAL=5
'';
knotDNSExec = zone: pkgs.writeScriptBin "update-dns.sh" ''
#!${pkgs.zsh}/bin/zsh -xe
mode=$1
fqdn=$2
challenge=$3
owner=''${fqdn%".${zone}."}
commited=
function abort() {
[[ -n "''${commited}" ]] || ${knotCfg.cliWrappers}/bin/knotc zone-abort "${zone}"
}
${knotCfg.cliWrappers}/bin/knotc zone-begin "${zone}"
trap abort EXIT
case "''${mode}" in
present)
if ${knotCfg.cliWrappers}/bin/knotc zone-get ${zone} "''${owner}" TXT; then
${knotCfg.cliWrappers}/bin/knotc zone-unset ${zone} "''${owner}" TXT '""'
fi
${knotCfg.cliWrappers}/bin/knotc zone-set ${zone} "''${owner}" 30 TXT "''${challenge}"
;;
cleanup)
${knotCfg.cliWrappers}/bin/knotc zone-unset ${zone} "''${owner}" TXT "''${challenge}"
${knotCfg.cliWrappers}/bin/knotc zone-set ${zone} "''${owner}" 30 TXT '""'
;;
*)
exit 2
;;
esac
${knotCfg.cliWrappers}/bin/knotc zone-commit "${zone}"
commited=yes
'';
domainOptions = {
options = {
wildcard = mkOption {
type = types.bool;
default = false;
};
zone = mkOption {
type = types.nullOr types.str;
default = null;
};
certCfg = mkOption {
type = types.attrs;
default = {};
};
};
};
in {
options = {
security.acme = {
domains = mkOption {
type = types.attrsOf (types.submodule domainOptions);
default = {};
};
};
};
config = {
security.acme.domains = genAttrs ["dirty-haskell.org" "141.li" "xmpp.li" "yggdrasil.li" "praseodym.org" "rheperire.org" "kleen.li" "nights.email"] (domain: { wildcard = true; });
fileSystems."/var/lib/acme" =
{ device = "surtr/safe/var-lib-acme";
fsType = "zfs";
};
security.acme = {
acceptTerms = true;
preliminarySelfsigned = true; # DNS challenge is slow
defaults = {
email = "phikeebaogobaegh@141.li";
keyType = "rsa4096"; # we don't like NIST curves
extraLegoRenewFlags = [
# "--preferred-chain" "ISRG Root X1"
"--always-deactivate-authorizations" "true"
];
extraLegoRunFlags = config.security.acme.defaults.extraLegoRenewFlags;
};
certs =
let
domainAttrset = domain: let
tsigPath = ./tsig_keys + "/${domain}";
tsigSecret = config.sops.secrets.${tsigSecretName domain};
isTsig = pathExists tsigPath;
shared = {
inherit domain;
extraDomainNames = optional cfg.domains.${domain}.wildcard "*.${domain}";
dnsResolver = "127.0.0.1:5353";
};
mkKnotc = shared // {
dnsProvider = "exec";
credentialsFile = knotDNSCredentials domain;
};
mkRFC2136 = let
tsigInfo = readYaml tsigPath;
in shared // {
dnsProvider = "rfc2136";
credentialsFile = pkgs.writeText "${domain}_credentials.env" ''
RFC2136_NAMESERVER=127.0.0.1:53
RFC2136_TSIG_ALGORITHM=hmac-sha256.
RFC2136_TSIG_KEY=${domain}_acme_key
RFC2136_TSIG_SECRET_FILE=${tsigSecret.path}
RFC2136_PROPAGATION_TIMEOUT=300
RFC2136_POLLING_INTERVAL=5
RFC2136_TTL=300
'';
};
in (if isTsig then mkRFC2136 else mkKnotc) // cfg.domains.${domain}.certCfg;
in genAttrs (attrNames cfg.domains) domainAttrset;
};
sops.secrets = let
toTSIGSecret = n: v:
if v == "regular" || v == "symlink"
then nameValuePair (tsigSecretName n) {
format = "binary";
owner = if config.security.acme.useRoot then "root" else "acme";
group = "acme";
sopsFile = ./tsig_keys + "/${n}";
} else null;
in mapFilterAttrs (_: v: v != null) toTSIGSecret (builtins.readDir ./tsig_keys);
systemd.services =
let
serviceAttrset = domain: {
after = [ "knot.service" ];
bindsTo = [ "knot.service" ];
serviceConfig = {
ReadWritePaths = ["/run/knot/knot.sock"];
SupplementaryGroups = ["knot"];
RestrictAddressFamilies = ["AF_UNIX"];
};
};
in mapAttrs' (domain: nameValuePair "acme-${domain}") (genAttrs (attrNames config.security.acme.certs) serviceAttrset);
};
}
|