acme: each server is now responsible for the certs tehy request

Closes #4
This commit is contained in:
silver 2023-08-06 20:09:15 +01:00
parent abc355d1b6
commit 2ae70acf56
8 changed files with 35 additions and 2 deletions

View file

@ -7,8 +7,6 @@
imports = []; imports = [];
options.services.skynet_acme = { options.services.skynet_acme = {
enable = mkEnableOption "Skynet Lets Encrypt certs";
domains = lib.mkOption { domains = lib.mkOption {
default = [ ]; default = [ ];
type = lib.types.listOf lib.types.str; type = lib.types.listOf lib.types.str;

View file

@ -97,6 +97,10 @@
age.secrets.ldap_pw.file = ../secrets/ldap/pw.age; age.secrets.ldap_pw.file = ../secrets/ldap/pw.age;
skynet_acme.domains = [
"mail.${cfg.domain.domain}"
];
# set up dns record for it # set up dns record for it
skynet_dns.records = [ skynet_dns.records = [
# basic one # basic one

View file

@ -53,6 +53,15 @@
"ip daddr ${cfg.host.ip} tcp dport 25565 counter packets 0 bytes 0 accept" "ip daddr ${cfg.host.ip} tcp dport 25565 counter packets 0 bytes 0 accept"
]; ];
skynet_acme.domains = [
"${cfg.domain.sub}.${cfg.domain.base}.${cfg.domain.tld}"
"config.${cfg.domain.sub}.${cfg.domain.base}.${cfg.domain.tld}"
"compsoc_classic.${cfg.domain.sub}.${cfg.domain.base}.${cfg.domain.tld}"
"compsoc.${cfg.domain.sub}.${cfg.domain.base}.${cfg.domain.tld}"
"gsoc.${cfg.domain.sub}.${cfg.domain.base}.${cfg.domain.tld}"
"gsoc_abridged.${cfg.domain.sub}.${cfg.domain.base}.${cfg.domain.tld}"
];
skynet_dns.records = [ skynet_dns.records = [
# the minecraft (web) config server # the minecraft (web) config server
{record="config.${cfg.domain.sub}"; r_type="CNAME"; value=cfg.host.name;} {record="config.${cfg.domain.sub}"; r_type="CNAME"; value=cfg.host.name;}

View file

@ -93,6 +93,11 @@
group = cfg.user; group = cfg.user;
}; };
skynet_acme.domains = [
"${cfg.domain.sub}.${cfg.domain.base}.${cfg.domain.tld}"
"*.pages.${cfg.domain.sub}.${cfg.domain.base}.${cfg.domain.tld}"
];
# using https://nixos.org/manual/nixos/stable/index.html#module-services-gitlab as a guide # using https://nixos.org/manual/nixos/stable/index.html#module-services-gitlab as a guide
skynet_dns.records = [ skynet_dns.records = [
{record=cfg.domain.sub; r_type="CNAME"; value=cfg.host.name;} {record=cfg.domain.sub; r_type="CNAME"; value=cfg.host.name;}

View file

@ -77,6 +77,10 @@ Gonna use a priper nixos module for this
group = "openldap"; group = "openldap";
}; };
skynet_acme.domains = [
"${cfg.domain.sub}.${cfg.domain.base}.${cfg.domain.tld}"
];
skynet_dns.records = [ skynet_dns.records = [
{record=cfg.domain.sub; r_type="CNAME"; value=cfg.host.name;} {record=cfg.domain.sub; r_type="CNAME"; value=cfg.host.name;}
]; ];

View file

@ -49,6 +49,10 @@
age.secrets.ldap_self_service.file = ../../secrets/ldap/self_service.age; age.secrets.ldap_self_service.file = ../../secrets/ldap/self_service.age;
skynet_acme.domains = [
"${cfg.domain.sub}.${cfg.domain.base}.${cfg.domain.tld}"
];
skynet_dns.records = [ skynet_dns.records = [
{record=cfg.domain.sub; r_type="CNAME"; value=cfg.host.name;} {record=cfg.domain.sub; r_type="CNAME"; value=cfg.host.name;}
]; ];

View file

@ -21,6 +21,11 @@
}; };
config = { config = {
skynet_acme.domains = [
# the root one is already covered by teh certificate
"2016.skynet.ie"
];
skynet_dns.records = [ skynet_dns.records = [
# means root domain, so skynet.ie # means root domain, so skynet.ie
{record="@"; r_type="A"; value=cfg.host.ip;} {record="@"; r_type="A"; value=cfg.host.ip;}

View file

@ -50,6 +50,10 @@
8000 8000
]; ];
skynet_acme.domains = [
"${cfg.domain.sub}.${cfg.domain.base}.${cfg.domain.tld}"
];
skynet_dns.records = [ skynet_dns.records = [
{record=cfg.domain.sub; r_type="CNAME"; value=cfg.host.name;} {record=cfg.domain.sub; r_type="CNAME"; value=cfg.host.name;}
]; ];