summaryrefslogtreecommitdiff
path: root/hosts/surtr/tls/default.nix
blob: 9f8d92d6586264549e096e66520b2cfdca6591f1 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
{ config, lib, customUtils, pkgs, ... }:

with lib;

let
  inherit (customUtils) mapFilterAttrs;

  tsigSecretName = domain: "${domain}_tsig-secret";

  cfg = config.security.acme;
  knotCfg = config.services.knot;
  
  knotDNSCredentials = domain: let
    zone = if cfg.domains.${domain}.zone == null then domain else cfg.domains.${domain}.zone;
  in pkgs.writeText "lego-credentials" ''
    EXEC_PATH=${knotDNSExec zone}/bin/update-dns.sh
    EXEC_PROPAGATION_TIMEOUT=300
    EXEC_POLLING_INTERVAL=5
  '';
  knotDNSExec = zone: pkgs.writeScriptBin "update-dns.sh" ''
    #!${pkgs.zsh}/bin/zsh -xe

    mode=$1
    fqdn=$2
    challenge=$3

    owner=''${fqdn%".${zone}."}

    commited=
    function abort() {
      [[ -n "''${commited}" ]] || ${knotCfg.cliWrappers}/bin/knotc zone-abort "${zone}"
    }

    ${knotCfg.cliWrappers}/bin/knotc zone-begin "${zone}"
    trap abort EXIT

    case "''${mode}" in
      present)
        if ${knotCfg.cliWrappers}/bin/knotc zone-get ${zone} "''${owner}" TXT; then
          ${knotCfg.cliWrappers}/bin/knotc zone-unset ${zone} "''${owner}" TXT '""'
        fi
        ${knotCfg.cliWrappers}/bin/knotc zone-set ${zone} "''${owner}" 30 TXT "''${challenge}"
        ;;
      cleanup)
        ${knotCfg.cliWrappers}/bin/knotc zone-unset ${zone} "''${owner}" TXT "''${challenge}"
        ${knotCfg.cliWrappers}/bin/knotc zone-set ${zone} "''${owner}" 30 TXT '""'
        ;;
      *)
        exit 2
        ;;
    esac

    ${knotCfg.cliWrappers}/bin/knotc zone-commit "${zone}"
    commited=yes
  '';
  
  domainOptions = {
    options = {
      wildcard = mkOption {
        type = types.bool;
        default = false;
      };
      zone = mkOption {
        type = types.nullOr types.str;
        default = null;
      };
      certCfg = mkOption {
        type = types.attrs;
        default = {};
      };
    };
  };
in {
  options = {
    security.acme = {
      domains = mkOption {
        type = types.attrsOf (types.submodule domainOptions);
        default = {};
      };
    };
  };
  
  config = {
    security.acme.domains = genAttrs ["dirty-haskell.org" "141.li" "xmpp.li" "yggdrasil.li" "praseodym.org" "rheperire.org" "kleen.li" "nights.email"] (domain: { wildcard = true; });
    
    fileSystems."/var/lib/acme" =
      { device = "surtr/safe/var-lib-acme";
        fsType = "zfs";
      };

    security.acme = {
      acceptTerms = true;
      preliminarySelfsigned = true; # DNS challenge is slow
      defaults = {
        email = "phikeebaogobaegh@141.li";
        keyType = "rsa4096"; # we don't like NIST curves
        extraLegoRenewFlags = [
          # "--preferred-chain" "ISRG Root X1"
          "--always-deactivate-authorizations" "true"
        ];
        extraLegoRunFlags = config.security.acme.defaults.extraLegoRenewFlags;
      };
      certs =
        let
          domainAttrset = domain: let
            tsigPath = ./tsig_keys + "/${domain}";
            tsigSecret = config.sops.secrets.${tsigSecretName domain};
            isTsig = pathExists tsigPath;
            shared = {
              inherit domain;
              extraDomainNames = optional cfg.domains.${domain}.wildcard "*.${domain}";
              dnsResolver = "127.0.0.1:5353";
            };
            mkKnotc = shared // {
              dnsProvider = "exec";
              credentialsFile = knotDNSCredentials domain;
            };
            mkRFC2136 = let
              tsigInfo = readYaml tsigPath;
            in shared // {
              dnsProvider = "rfc2136";
              credentialsFile = pkgs.writeText "${domain}_credentials.env" ''
                RFC2136_NAMESERVER=127.0.0.1:53
                RFC2136_TSIG_ALGORITHM=hmac-sha256.
                RFC2136_TSIG_KEY=${domain}_acme_key
                RFC2136_TSIG_SECRET_FILE=${tsigSecret.path}
                RFC2136_PROPAGATION_TIMEOUT=300
                RFC2136_POLLING_INTERVAL=5
                RFC2136_TTL=300
              '';
            };
          in (if isTsig then mkRFC2136 else mkKnotc) // cfg.domains.${domain}.certCfg;
        in genAttrs (attrNames cfg.domains) domainAttrset;
    };

    sops.secrets = let
      toTSIGSecret = n: v:
        if v == "regular" || v == "symlink"
        then nameValuePair (tsigSecretName n) {
          format = "binary";
          owner = if config.security.acme.useRoot then "root" else "acme";
          group = "acme";
          sopsFile = ./tsig_keys + "/${n}";
        } else null;
    in mapFilterAttrs (_: v: v != null) toTSIGSecret (builtins.readDir ./tsig_keys);

    systemd.services =
      let
        serviceAttrset = domain: {
          after = [ "knot.service" ];
          bindsTo = [ "knot.service" ];
          serviceConfig = {
            ReadWritePaths = ["/run/knot/knot.sock"];
            SupplementaryGroups = ["knot"];
            RestrictAddressFamilies = ["AF_UNIX"];
          };
        };
      in mapAttrs' (domain: nameValuePair "acme-${domain}") (genAttrs (attrNames config.security.acme.certs) serviceAttrset);
  };
}