Compare commits
4 Commits
6c26e898b2
...
0854439bdf
| Author | SHA1 | Date | |
|---|---|---|---|
| 0854439bdf | |||
| ff70a35078 | |||
| b8b8a445f9 | |||
| 13a841c8db |
@@ -91,8 +91,7 @@
|
|||||||
|
|
||||||
postgresql = {
|
postgresql = {
|
||||||
enable = true;
|
enable = true;
|
||||||
settings = {
|
enableTCPIP = false;
|
||||||
};
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|||||||
+39
-62
@@ -68,7 +68,7 @@ let
|
|||||||
group = lib.mkOption {
|
group = lib.mkOption {
|
||||||
description = "Group to run the mTLS renewal service as. Defaults to the configured renewal user.";
|
description = "Group to run the mTLS renewal service as. Defaults to the configured renewal user.";
|
||||||
type = lib.types.nullOr lib.types.str;
|
type = lib.types.nullOr lib.types.str;
|
||||||
default = cfg.user;
|
default = "mtls";
|
||||||
};
|
};
|
||||||
reloadUnits = lib.mkOption {
|
reloadUnits = lib.mkOption {
|
||||||
description = "systemd units to try-reload-or-restart after a successful certificate renewal.";
|
description = "systemd units to try-reload-or-restart after a successful certificate renewal.";
|
||||||
@@ -97,7 +97,6 @@ let
|
|||||||
}:
|
}:
|
||||||
let
|
let
|
||||||
catCmd = lib.getExe' pkgs.coreutils "cat";
|
catCmd = lib.getExe' pkgs.coreutils "cat";
|
||||||
echoCmd = lib.getExe' pkgs.coreutils "echo";
|
|
||||||
chownCmd = lib.getExe' pkgs.coreutils "chown";
|
chownCmd = lib.getExe' pkgs.coreutils "chown";
|
||||||
chmodCmd = lib.getExe' pkgs.coreutils "chmod";
|
chmodCmd = lib.getExe' pkgs.coreutils "chmod";
|
||||||
stepCmd = lib.getExe pkgs.step-cli;
|
stepCmd = lib.getExe pkgs.step-cli;
|
||||||
@@ -114,6 +113,7 @@ let
|
|||||||
(umask 077; ${catCmd} ${certFile} ${keyFile} > ${bundleFile})
|
(umask 077; ${catCmd} ${certFile} ${keyFile} > ${bundleFile})
|
||||||
${chownCmd} ${user}:${group} ${certFile} ${keyFile} ${bundleFile}
|
${chownCmd} ${user}:${group} ${certFile} ${keyFile} ${bundleFile}
|
||||||
${chmodCmd} 640 ${certFile} ${keyFile} ${bundleFile}
|
${chmodCmd} 640 ${certFile} ${keyFile} ${bundleFile}
|
||||||
|
printf '\033[32m✔\033[0m \033[1mmTLS Bundle:\033[0m %s\n' ${lib.escapeShellArg bundleFile}
|
||||||
'';
|
'';
|
||||||
|
|
||||||
mkMtlsCheckScript = { pkgs, bundleFile }: pkgs.writeShellScriptBin "mtls-check" ''
|
mkMtlsCheckScript = { pkgs, bundleFile }: pkgs.writeShellScriptBin "mtls-check" ''
|
||||||
@@ -125,13 +125,7 @@ let
|
|||||||
|
|
||||||
mkMtlsRenewScript = {
|
mkMtlsRenewScript = {
|
||||||
pkgs,
|
pkgs,
|
||||||
certFile,
|
cfg,
|
||||||
keyFile,
|
|
||||||
bundleFile,
|
|
||||||
user,
|
|
||||||
group,
|
|
||||||
reloadUnits ? [ ],
|
|
||||||
postCommands ? [ ],
|
|
||||||
systemctlArgs ? [ ],
|
systemctlArgs ? [ ],
|
||||||
}:
|
}:
|
||||||
let
|
let
|
||||||
@@ -140,15 +134,19 @@ let
|
|||||||
chownCmd = lib.getExe' pkgs.coreutils "chown";
|
chownCmd = lib.getExe' pkgs.coreutils "chown";
|
||||||
chmodCmd = lib.getExe' pkgs.coreutils "chmod";
|
chmodCmd = lib.getExe' pkgs.coreutils "chmod";
|
||||||
stepCmd = lib.getExe pkgs.step-cli;
|
stepCmd = lib.getExe pkgs.step-cli;
|
||||||
hasReloadUnits = reloadUnits != [ ];
|
|
||||||
hasPostCommands = postCommands != [ ];
|
|
||||||
systemctlCmd = "${lib.getExe' pkgs.systemd "systemctl"} ${lib.escapeShellArgs systemctlArgs}";
|
systemctlCmd = "${lib.getExe' pkgs.systemd "systemctl"} ${lib.escapeShellArgs systemctlArgs}";
|
||||||
|
|
||||||
|
hasReloadUnits = cfg.renew.reloadUnits != [ ];
|
||||||
renewReloadScript = lib.concatMapStringsSep "\n" (unit: ''
|
renewReloadScript = lib.concatMapStringsSep "\n" (unit: ''
|
||||||
if ${systemctlCmd} --quiet is-active "${unit}"; then
|
if ${systemctlCmd} --quiet is-active "${unit}"; then
|
||||||
${systemctlCmd} try-reload-or-restart "${unit}"
|
${systemctlCmd} try-reload-or-restart "${unit}"
|
||||||
fi
|
fi
|
||||||
'') reloadUnits;
|
'') cfg.renew.reloadUnits;
|
||||||
renewPostCommands = lib.concatStringsSep "\n" postCommands;
|
|
||||||
|
hasPostCommands = cfg.renew.postCommands != [ ];
|
||||||
|
renewPostCommands = lib.concatStringsSep "\n" cfg.renew.postCommands;
|
||||||
|
|
||||||
|
fileOwner = "${cfg.renew.user}:${cfg.renew.group}";
|
||||||
in
|
in
|
||||||
pkgs.writeShellScriptBin "mtls-renew" ''
|
pkgs.writeShellScriptBin "mtls-renew" ''
|
||||||
set -euo pipefail
|
set -euo pipefail
|
||||||
@@ -169,19 +167,19 @@ let
|
|||||||
esac
|
esac
|
||||||
done
|
done
|
||||||
|
|
||||||
if [[ $force -eq 0 ]] && ! ${stepCmd} certificate needs-renewal "${certFile}"; then
|
if [[ $force -eq 0 ]] && ! ${stepCmd} certificate needs-renewal "${cfg.certFile}"; then
|
||||||
${echoCmd} "Skipping renew"
|
${echoCmd} "Skipping renew"
|
||||||
exit 0
|
exit 0
|
||||||
fi
|
fi
|
||||||
|
|
||||||
${echoCmd} "Renewing mTLS certificate"
|
${echoCmd} "Renewing mTLS certificate"
|
||||||
${stepCmd} ca renew --force "${certFile}" "${keyFile}"
|
${stepCmd} ca renew --force "${cfg.certFile}" "${cfg.keyFile}"
|
||||||
(umask 077; ${catCmd} "${certFile}" "${keyFile}" > "${bundleFile}")
|
(umask 077; ${catCmd} "${cfg.certFile}" "${cfg.keyFile}" > "${cfg.bundleFile}")
|
||||||
${chownCmd} ${user}:${group} ${certFile} ${keyFile} ${bundleFile}
|
${chownCmd} ${fileOwner} ${cfg.certFile} ${cfg.keyFile} ${cfg.bundleFile}
|
||||||
${chmodCmd} 640 ${certFile} ${keyFile} ${bundleFile}
|
${chmodCmd} 640 ${cfg.certFile} ${cfg.keyFile} ${cfg.bundleFile}
|
||||||
|
|
||||||
${lib.optionalString hasReloadUnits ''
|
${lib.optionalString hasReloadUnits ''
|
||||||
${echoCmd} "Reloading units:"
|
${echoCmd} "Reloading units: ${lib.concatStringsSep ", " cfg.renew.reloadUnits}"
|
||||||
${renewReloadScript}
|
${renewReloadScript}
|
||||||
''}
|
''}
|
||||||
|
|
||||||
@@ -191,22 +189,7 @@ let
|
|||||||
''}
|
''}
|
||||||
'';
|
'';
|
||||||
|
|
||||||
mkNixosMtlsRenewService = {
|
mkNixosMtlsRenewService = { pkgs, cfg, ... }:
|
||||||
pkgs,
|
|
||||||
certFile,
|
|
||||||
keyFile,
|
|
||||||
bundleFile,
|
|
||||||
reloadUnits ? [ ],
|
|
||||||
postCommands ? [ ],
|
|
||||||
user ? "root",
|
|
||||||
group ? null,
|
|
||||||
}:
|
|
||||||
let
|
|
||||||
serviceGroup = if group == null then user else group;
|
|
||||||
renewScript = mkMtlsRenewScript {
|
|
||||||
inherit pkgs certFile keyFile bundleFile reloadUnits postCommands user group;
|
|
||||||
};
|
|
||||||
in
|
|
||||||
{
|
{
|
||||||
description = "Renew the mTLS certificate when Smallstep marks it ready";
|
description = "Renew the mTLS certificate when Smallstep marks it ready";
|
||||||
wantedBy = [ ];
|
wantedBy = [ ];
|
||||||
@@ -214,9 +197,9 @@ let
|
|||||||
wants = [ "network-online.target" ];
|
wants = [ "network-online.target" ];
|
||||||
serviceConfig = {
|
serviceConfig = {
|
||||||
Type = "oneshot";
|
Type = "oneshot";
|
||||||
User = user;
|
User = cfg.renew.user;
|
||||||
Group = serviceGroup;
|
Group = cfg.renew.group;
|
||||||
ExecStart = lib.getExe renewScript;
|
ExecStart = lib.getExe (mkMtlsRenewScript { inherit pkgs cfg; });
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
@@ -236,17 +219,10 @@ let
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
mkHomeManagerMtlsRenewService = {
|
mkHomeManagerMtlsRenewService = { pkgs, cfg, ... }:
|
||||||
pkgs,
|
|
||||||
certFile,
|
|
||||||
keyFile,
|
|
||||||
bundleFile,
|
|
||||||
reloadUnits ? [ ],
|
|
||||||
postCommands ? [ ],
|
|
||||||
}:
|
|
||||||
let
|
let
|
||||||
renewScript = mkMtlsRenewScript {
|
renewScript = mkMtlsRenewScript {
|
||||||
inherit pkgs certFile keyFile bundleFile reloadUnits postCommands;
|
inherit pkgs cfg;
|
||||||
systemctlArgs = [ "--user" ];
|
systemctlArgs = [ "--user" ];
|
||||||
};
|
};
|
||||||
in
|
in
|
||||||
@@ -296,9 +272,19 @@ in
|
|||||||
type = lib.types.str;
|
type = lib.types.str;
|
||||||
default = "/etc/step-ca/certs";
|
default = "/etc/step-ca/certs";
|
||||||
};
|
};
|
||||||
|
certReaders = lib.mkOption {
|
||||||
|
description = "";
|
||||||
|
type = lib.types.listOf lib.types.str;
|
||||||
|
default = [ ];
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
config = lib.mkIf cfg.enable {
|
config = lib.mkIf cfg.enable {
|
||||||
|
users.groups.certReaders = {
|
||||||
|
name = cfg.renew.group;
|
||||||
|
members = cfg.certReaders;
|
||||||
|
};
|
||||||
|
|
||||||
environment.systemPackages = with pkgs; lib.optionals cfg.enable [
|
environment.systemPackages = with pkgs; lib.optionals cfg.enable [
|
||||||
# step-cli
|
# step-cli
|
||||||
(mkMtlsGenerateScript {
|
(mkMtlsGenerateScript {
|
||||||
@@ -307,22 +293,15 @@ in
|
|||||||
inherit (cfg.renew) user group;
|
inherit (cfg.renew) user group;
|
||||||
})
|
})
|
||||||
(mkMtlsCheckScript { inherit pkgs; inherit (cfg) bundleFile; })
|
(mkMtlsCheckScript { inherit pkgs; inherit (cfg) bundleFile; })
|
||||||
(mkMtlsRenewScript {
|
(mkMtlsRenewScript { inherit pkgs cfg; })
|
||||||
inherit pkgs;
|
|
||||||
inherit (cfg) certFile keyFile bundleFile;
|
|
||||||
inherit (cfg.renew) user group;
|
|
||||||
})
|
|
||||||
];
|
];
|
||||||
|
|
||||||
systemd.tmpfiles.rules = [
|
systemd.tmpfiles.rules = [
|
||||||
"d ${cfg.certDir} 0750 ${cfg.renew.user} ${cfg.renew.group} -"
|
"d ${cfg.certDir} 0750 ${cfg.renew.user} ${cfg.renew.group} -"
|
||||||
];
|
];
|
||||||
|
|
||||||
systemd.services.mtls-renew = lib.mkIf cfg.renew.enable (mkNixosMtlsRenewService {
|
systemd.services.mtls-renew = lib.mkIf cfg.renew.enable
|
||||||
inherit pkgs;
|
(mkNixosMtlsRenewService { inherit pkgs cfg; });
|
||||||
inherit (cfg) certFile keyFile bundleFile;
|
|
||||||
inherit (cfg.renew) reloadUnits postCommands user group;
|
|
||||||
});
|
|
||||||
|
|
||||||
systemd.timers.mtls-renew = lib.mkIf cfg.renew.enable (mkNixosMtlsRenewTimer {
|
systemd.timers.mtls-renew = lib.mkIf cfg.renew.enable (mkNixosMtlsRenewTimer {
|
||||||
inherit (cfg.renew) onCalendar randomizedDelaySec;
|
inherit (cfg.renew) onCalendar randomizedDelaySec;
|
||||||
@@ -356,17 +335,15 @@ in
|
|||||||
inherit pkgs certFile keyFile bundleFile;
|
inherit pkgs certFile keyFile bundleFile;
|
||||||
})
|
})
|
||||||
(mkMtlsCheckScript { inherit pkgs bundleFile; })
|
(mkMtlsCheckScript { inherit pkgs bundleFile; })
|
||||||
(mkMtlsRenewScript { inherit pkgs certFile keyFile bundleFile; inherit (cfg.renew) user group; })
|
(mkMtlsRenewScript { inherit pkgs cfg; systemctlArgs = [ "--user" ]; })
|
||||||
];
|
];
|
||||||
|
|
||||||
systemd.user.tmpfiles.rules = lib.mkIf cfg.enable [
|
systemd.user.tmpfiles.rules = lib.mkIf cfg.enable [
|
||||||
"d ${cfg.certDir} 0700 - - -"
|
"d ${cfg.certDir} 0700 - - -"
|
||||||
];
|
];
|
||||||
|
|
||||||
systemd.user.services.mtls-renew = lib.mkIf cfg.renew.enable (mkHomeManagerMtlsRenewService {
|
systemd.user.services.mtls-renew = lib.mkIf cfg.renew.enable
|
||||||
inherit pkgs certFile keyFile bundleFile;
|
(mkHomeManagerMtlsRenewService { inherit pkgs cfg; });
|
||||||
inherit (cfg.renew) reloadUnits postCommands;
|
|
||||||
});
|
|
||||||
|
|
||||||
systemd.user.timers.mtls-renew = lib.mkIf cfg.renew.enable (mkHomeManagerMtlsRenewTimer {
|
systemd.user.timers.mtls-renew = lib.mkIf cfg.renew.enable (mkHomeManagerMtlsRenewTimer {
|
||||||
inherit (cfg.renew) onCalendar randomizedDelaySec;
|
inherit (cfg.renew) onCalendar randomizedDelaySec;
|
||||||
|
|||||||
@@ -9,26 +9,46 @@ in
|
|||||||
flake.modules.nixos.janus-ca =
|
flake.modules.nixos.janus-ca =
|
||||||
{ config, lib, ... }:
|
{ config, lib, ... }:
|
||||||
let
|
let
|
||||||
|
cfg = config.janus-ca;
|
||||||
johnHome = lib.attrByPath [ "users" "users" username "home" ] "/home/${username}" config;
|
johnHome = lib.attrByPath [ "users" "users" username "home" ] "/home/${username}" config;
|
||||||
johnGroup = lib.attrByPath [ "users" "users" username "group" ] username config;
|
johnGroup = lib.attrByPath [ "users" "users" username "group" ] username config;
|
||||||
|
cfgInEtc = lib.hasPrefix "/etc/" cfg.certDir;
|
||||||
|
certDirEtcPath =
|
||||||
|
if cfgInEtc then
|
||||||
|
lib.removePrefix "/etc/" cfg.certDir
|
||||||
|
else
|
||||||
|
cfg.certDir;
|
||||||
|
certRootEtcPath = "${certDirEtcPath}/root_ca.crt";
|
||||||
mkStepRules = home: user: group: [
|
mkStepRules = home: user: group: [
|
||||||
"d ${home}/.step 0700 ${user} ${group} -"
|
"d ${home}/.step 0700 ${user} ${group} -"
|
||||||
"d ${home}/.step/config 0700 ${user} ${group} -"
|
"d ${home}/.step/config 0700 ${user} ${group} -"
|
||||||
"d ${home}/.step/certs 0700 ${user} ${group} -"
|
"d ${home}/.step/certs 0700 ${user} ${group} -"
|
||||||
"L+ ${home}/.step/config/defaults.json - - - - /etc/step/config/defaults.json"
|
"L+ ${home}/.step/config/defaults.json - - - - /etc/step-ca/defaults.json"
|
||||||
"L+ ${home}/.step/certs/root_ca.crt - - - - /etc/step/certs/root_ca.crt"
|
"L+ ${home}/.step/certs/root_ca.crt - - - - ${cfg.certDir}/root_ca.crt"
|
||||||
];
|
];
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
environment.etc."step/config/defaults.json".text = builtins.toJSON {
|
options.janus-ca = {
|
||||||
inherit ca-url fingerprint;
|
certDir = lib.mkOption {
|
||||||
root = "/etc/step-ca/certs/root_ca.crt";
|
description = "String path to where the mtls certs will be stored.";
|
||||||
|
type = lib.types.str;
|
||||||
|
default = "/etc/step-ca/certs";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
config = {
|
||||||
|
environment.etc = lib.mkIf cfgInEtc {
|
||||||
|
"step-ca/defaults.json".text = builtins.toJSON {
|
||||||
|
inherit ca-url fingerprint;
|
||||||
|
root = "/etc/${certRootEtcPath}";
|
||||||
|
};
|
||||||
|
"${certRootEtcPath}".source = ./root_ca.crt;
|
||||||
};
|
};
|
||||||
environment.etc."step-ca/certs/root_ca.crt".source = ./root_ca.crt;
|
|
||||||
systemd.tmpfiles.rules =
|
systemd.tmpfiles.rules =
|
||||||
mkStepRules johnHome username johnGroup
|
mkStepRules johnHome username johnGroup
|
||||||
++ mkStepRules "/root" "root" "root";
|
++ mkStepRules "/root" "root" "root";
|
||||||
};
|
};
|
||||||
|
};
|
||||||
|
|
||||||
flake.modules.homeManager.janus-ca = { config, ... }: {
|
flake.modules.homeManager.janus-ca = { config, ... }: {
|
||||||
home.file.".step/config/defaults.json".text = builtins.toJSON {
|
home.file.".step/config/defaults.json".text = builtins.toJSON {
|
||||||
|
|||||||
Reference in New Issue
Block a user