acme: init

This commit is contained in:
Christoph Hollizeck 2024-11-07 19:52:29 +01:00
parent 32f138f927
commit e8bf17cb8c
2 changed files with 72 additions and 9 deletions

View file

@ -6,19 +6,69 @@
...
}:
let
inherit (lib) optional mkIf;
inherit (lib.${namespace}) enabled;
domainName = "v2202411240203293899.ultrasrv.de";
domainName = "christophhollizeck.dev";
forgejoPort = 3000;
staging = false;
cfg.enableAcme = true;
sopsFile = lib.snowfall.fs.get-file "secrets/secrets-loptland.yaml";
in
{
imports = [ ./hardware.nix ];
sops.secrets = {
forgejo_db_password = {
inherit sopsFile;
environment.systemPackages = [ ];
sops = {
secrets = {
forgejo_db_password = {
inherit sopsFile;
};
netcup_customer_number = {
inherit sopsFile;
};
netcup_api_key = {
inherit sopsFile;
};
netcup_api_password = {
inherit sopsFile;
};
};
templates = {
"netcup.env" = {
content = ''
NETCUP_CUSTOMER_NUMBER=${config.sops.placeholder.netcup_customer_number}
NETCUP_API_KEY=${config.sops.placeholder.netcup_api_key}
NETCUP_API_PASSWORD=${config.sops.placeholder.netcup_api_password}
NETCUP_PROPAGATION_TIMEOUT=1200
'';
};
};
};
security.acme = mkIf cfg.enableAcme {
acceptTerms = true;
defaults = {
email = "christoph.hollizeck@hey.com";
group = mkIf config.services.nginx.enable "nginx";
reloadServices = optional config.services.nginx.enable "nginx.service";
dnsProvider = "netcup";
environmentFile = config.sops.templates."netcup.env".path;
};
certs."${domainName}" = {
server = mkIf staging "https://acme-staging-v02.api.letsencrypt.org/directory";
dnsResolver = "1.1.1.1:53";
extraDomainNames = [ "*.${domainName}" ];
};
};
@ -36,14 +86,24 @@ in
virtualHosts = {
"git.${domainName}" = {
forceSSL = cfg.enableAcme;
useACMEHost = mkIf cfg.enableAcme domainName;
locations."/" = {
proxyPass = "http://localhost:${toString forgejoPort}/";
};
};
"${domainName}" = {
forceSSL = cfg.enableAcme;
useACMEHost = mkIf cfg.enableAcme domainName;
# sslCertificate = "/var/lib/acme/christophhollizeck.dev/fullchain.pem";
# sslCertificateKey = "/var/lib/acme/christophhollizeck.dev/key.pem";
# sslTrustedCertificate = "/var/lib/acme/christophhollizeck.dev/chain.pem";
locations."/" = {
return = "404 This Site does not exist yet";
return = "404";
};
};
};
@ -64,7 +124,7 @@ in
HTTP_PORT = forgejoPort;
};
service.DISABLE_REGISTRATION = false;
service.DISABLE_REGISTRATION = true;
};
};