{ pkgs, lib, config, servers, ... }: let domain = "sourcephile.fr"; domainID = lib.replaceStrings ["."] ["_"] domain; inherit (config.security) pass; inherit (config.users) users groups; in { networking.nftables.ruleset = '' # for lego to update ACME DNS-01 challenge add rule inet filter fw2net tcp dport 53 ip daddr ${servers.mermet.ipv4} counter accept comment "ACME DNS-01" add rule inet filter fw2net udp dport 53 ip daddr ${servers.mermet.ipv4} counter accept comment "ACME DNS-01" # for lego to check DNS propagation on ns6.gandi.net add rule inet filter fw2net ip daddr 217.70.177.40 tcp dport 53 skuid ${users.root.name} counter accept comment "DNS gandi" add rule inet filter fw2net ip daddr 217.70.177.40 udp dport 53 skuid ${users.root.name} counter accept comment "DNS gandi" ''; security.acme.certs."${domain}" = { email = "root+letsencrypt@${domain}"; extraDomains = { "*.${domain}" = null; }; user = users.root.name; group = groups.acme.name; allowKeysForGroup = true; keyType = "rsa4096"; dnsProvider = "rfc2136"; # ns6.gandi.net takes roughly 5min to update # hence lego's RFC2136_PROPAGATION_TIMEOUT=1000 #dnsPropagationCheck = false; credentialsFile = pass.secrets."lego/${domain}/rfc2136".path; }; security.pass.secrets."lego/${domain}/rfc2136" = { pipe = '' cat - ${pkgs.writeText "env" '' RFC2136_NAMESERVER=ns.${domain}:53 RFC2136_TSIG_ALGORITHM=hmac-sha256. RFC2136_TSIG_KEY=acme_${domainID} RFC2136_PROPAGATION_TIMEOUT=1000 RFC2136_POLLING_INTERVAL=30 RFC2136_SEQUENCE_INTERVAL=30 RFC2136_DNS_TIMEOUT=1000 RFC2136_TTL=1 ''} ''; }; systemd.services."acme-${domain}" = { after = [ "unbound.service" pass.secrets."lego/${domain}/rfc2136".service ]; wants = [ "unbound.service" pass.secrets."lego/${domain}/rfc2136".service ]; }; }