cluster: switch to exec dns01 provider

This commit is contained in:
Max Headroom 2023-12-04 19:31:03 +01:00
parent bfd7a4214c
commit 0943c410c3
9 changed files with 10 additions and 10 deletions

View file

@ -11,7 +11,7 @@ in
security.acme.certs."internal.${domain}" = { security.acme.certs."internal.${domain}" = {
domain = "*.internal.${domain}"; domain = "*.internal.${domain}";
extraDomainNames = [ "*.internal.${domain}" ]; extraDomainNames = [ "*.internal.${domain}" ];
dnsProvider = "pdns"; dnsProvider = "exec";
group = "nginx"; group = "nginx";
postRun = '' postRun = ''
${pkgs.acl}/bin/setfacl -Rb out/ ${pkgs.acl}/bin/setfacl -Rb out/

View file

@ -42,7 +42,7 @@ in
}; };
security.acme.certs."securedns.${domain}" = { security.acme.certs."securedns.${domain}" = {
dnsProvider = "pdns"; dnsProvider = "exec";
# using a different ACME provider because Android Private DNS is fucky # using a different ACME provider because Android Private DNS is fucky
server = "https://api.buypass.com/acme/directory"; server = "https://api.buypass.com/acme/directory";
reloadServices = [ reloadServices = [

View file

@ -18,7 +18,7 @@ in
security.acme.certs = { security.acme.certs = {
"internal.${domain}".reloadServices = [ "kanidm.service" ]; "internal.${domain}".reloadServices = [ "kanidm.service" ];
"idm.${domain}" = { "idm.${domain}" = {
dnsProvider = "pdns"; dnsProvider = "exec";
webroot = lib.mkForce null; webroot = lib.mkForce null;
}; };
}; };

View file

@ -81,7 +81,7 @@ in {
services.nginx.virtualHosts."pin.${domain}" = vhosts.proxy "http://unix:${pinSvcSocket}"; services.nginx.virtualHosts."pin.${domain}" = vhosts.proxy "http://unix:${pinSvcSocket}";
users.users.nginx.extraGroups = [ cfg.group ]; users.users.nginx.extraGroups = [ cfg.group ];
security.acme.certs."pin.${domain}" = { security.acme.certs."pin.${domain}" = {
dnsProvider = "pdns"; dnsProvider = "exec";
webroot = lib.mkForce null; webroot = lib.mkForce null;
}; };
} }

View file

@ -48,12 +48,12 @@ in
security.acme.certs."ipfs.${domain}" = { security.acme.certs."ipfs.${domain}" = {
domain = "*.ipfs.${domain}"; domain = "*.ipfs.${domain}";
extraDomainNames = [ "*.ipns.${domain}" ]; extraDomainNames = [ "*.ipns.${domain}" ];
dnsProvider = "pdns"; dnsProvider = "exec";
group = "nginx"; group = "nginx";
}; };
security.acme.certs."p2p.${domain}" = { security.acme.certs."p2p.${domain}" = {
dnsProvider = "pdns"; dnsProvider = "exec";
webroot = lib.mkForce null; webroot = lib.mkForce null;
}; };

View file

@ -82,7 +82,7 @@ in {
params.ngircd.bits = 2048; params.ngircd.bits = 2048;
}; };
security.acme.certs."${serverName}" = { security.acme.certs."${serverName}" = {
dnsProvider = "pdns"; dnsProvider = "exec";
group = "ngircd"; group = "ngircd";
reloadServices = [ "ngircd" ]; reloadServices = [ "ngircd" ];
extraDomainNames = [ linkGlobalSecure.ipv4 ]; extraDomainNames = [ linkGlobalSecure.ipv4 ];

View file

@ -103,7 +103,7 @@ in
}; };
security.acme.certs."monitoring.${domain}" = { security.acme.certs."monitoring.${domain}" = {
dnsProvider = "pdns"; dnsProvider = "exec";
webroot = lib.mkForce null; webroot = lib.mkForce null;
}; };

View file

@ -20,7 +20,7 @@ in
}; };
}; };
security.acme.certs.${link.hostname} = { security.acme.certs.${link.hostname} = {
dnsProvider = "pdns"; dnsProvider = "exec";
webroot = lib.mkForce null; webroot = lib.mkForce null;
}; };

View file

@ -6,7 +6,7 @@ let
acmeUseDNS = name: conf: { acmeUseDNS = name: conf: {
name = conf.useACMEHost or conf.serverName or name; name = conf.useACMEHost or conf.serverName or name;
value = { value = {
dnsProvider = "pdns"; dnsProvider = "exec";
webroot = null; webroot = null;
}; };
}; };