summaryrefslogtreecommitdiff
path: root/modules/nixos/traits/acme.nix
diff options
context:
space:
mode:
authorseth <[email protected]>2024-02-07 18:03:24 -0500
committerseth <[email protected]>2024-02-07 18:27:45 -0500
commitcffffeb678e9a1078eeba0f19c9607cda9f31bed (patch)
tree8b8f68aa357becad06845f15b7e528474041371c /modules/nixos/traits/acme.nix
parent48712d44fde91d2685089cca7f9d88295fd59817 (diff)
modules/nixos+darwin: move to traits + archetypes model
Diffstat (limited to 'modules/nixos/traits/acme.nix')
-rw-r--r--modules/nixos/traits/acme.nix46
1 files changed, 46 insertions, 0 deletions
diff --git a/modules/nixos/traits/acme.nix b/modules/nixos/traits/acme.nix
new file mode 100644
index 0000000..a377b25
--- /dev/null
+++ b/modules/nixos/traits/acme.nix
@@ -0,0 +1,46 @@
+{
+ config,
+ lib,
+ secretsDir,
+ ...
+}: let
+ cfg = config.traits.acme;
+in {
+ options.traits.acme = {
+ enable = lib.mkEnableOption "ACME support";
+
+ manageSecrets =
+ lib.mkEnableOption "automatic management of secrets"
+ // {
+ default = config.traits.secrets.enable;
+ };
+
+ useDns = lib.mkEnableOption "the usage of dns to get certs" // {default = true;};
+ };
+
+ config = lib.mkIf cfg.enable (
+ lib.mkMerge [
+ {
+ security.acme = {
+ acceptTerms = true;
+ defaults =
+ {
+ email = "[email protected]";
+ }
+ // lib.optionalAttrs cfg.useDns {
+ dnsProvider = "cloudflare";
+ }
+ // lib.optionalAttrs cfg.manageSecrets {
+ credentialsFile = config.age.secrets.cloudflareApiKey.path;
+ };
+ };
+ }
+
+ (lib.mkIf cfg.manageSecrets {
+ age.secrets = {
+ cloudflareApiKey.file = secretsDir + "/cloudflareApiKey.age";
+ };
+ })
+ ]
+ );
+}