~ruther/guix-local

1115f140179b8fafb5a0f7c91a22dfdb7d6b21cc — Andy Wingo 9 years ago f612992
services: Add certbot service.

* gnu/services/certbot.scm: New file.
* gnu/local.mk (GNU_SYSTEM_MODULES): Add new file.
* doc/guix.texi (Certificate Services): New section.

Signed-off-by: Ludovic Courtès <ludo@gnu.org>
3 files changed, 212 insertions(+), 1 deletions(-)

M doc/guix.texi
M gnu/local.mk
A gnu/services/certbot.scm
M doc/guix.texi => doc/guix.texi +83 -1
@@ 41,7 41,8 @@ Copyright @copyright{} 2017 Marius Bakke@*
Copyright @copyright{} 2017 Hartmut Goebel@*
Copyright @copyright{} 2017 Maxim Cournoyer@*
Copyright @copyright{} 2017 Tobias Geerinckx-Rice@*
Copyright @copyright{} 2017 George Clemmer
Copyright @copyright{} 2017 George Clemmer@*
Copyright @copyright{} 2017 Andy Wingo

Permission is granted to copy, distribute and/or modify this document
under the terms of the GNU Free Documentation License, Version 1.3 or


@@ 235,6 236,7 @@ Services
* Monitoring Services::         Monitoring services.
* Kerberos Services::           Kerberos services.
* Web Services::                Web servers.
* Certificate Services::        TLS certificates via Let's Encrypt.
* DNS Services::                DNS daemons.
* VPN Services::                VPN daemons.
* Network File System::         NFS related services.


@@ 9393,6 9395,7 @@ declaration.
* Monitoring Services::         Monitoring services.
* Kerberos Services::           Kerberos services.
* Web Services::                Web servers.
* Certificate Services::        TLS certificates via Let's Encrypt.
* DNS Services::                DNS daemons.
* VPN Services::                VPN daemons.
* Network File System::         NFS related services.


@@ 15090,6 15093,84 @@ capability also has to be configured on the front-end as well.
@end table
@end deftp

@node Certificate Services
@subsubsection Certificate Services

@cindex Web
@cindex HTTP, HTTPS
@cindex Let's Encrypt
@cindex TLS certificates
The @code{(gnu services certbot)} module provides a service to
automatically obtain a valid TLS certificate from the Let's Encrypt
certificate authority.  These certificates can then be used to serve
content securely over HTTPS or other TLS-based protocols, with the
knowledge that the client will be able to verify the server's
authenticity.

@url{https://letsencrypt.org/, Let's Encrypt} provides the
@code{certbot} tool to automate the certification process.  This tool
first securely generates a key on the server.  It then makes a request
to the Let's Encrypt certificate authority (CA) to sign the key.  The CA
checks that the request originates from the host in question by using a
challenge-response protocol, requiring the server to provide its
response over HTTP.  If that protocol completes successfully, the CA
signs the key, resulting in a certificate.  That certificate is valid
for a limited period of time, and therefore to continue to provide TLS
services, the server needs to periodically ask the CA to renew its
signature.

The certbot service automates this process: the initial key
generation, the initial certification request to the Let's Encrypt
service, the web server challenge/response integration, writing the
certificate to disk, and the automated periodic renewals.

@defvr {Scheme Variable} certbot-service-type
A service type for the @code{certbot} Let's Encrypt client.
@end defvr

@deftp {Data Type} certbot-configuration
Data type representing the configuration of the @code{certbot} serice.
This type has the following parameters:

@table @asis
@item @code{package} (default: @code{certbot})
The certbot package to use.

@item @code{webroot} (default: @code{/var/www})
The directory from which to serve the Let's Encrypt challenge/response
files.

@item @code{hosts} (default: @code{()})
A list of hosts for which to generate certificates and request
signatures.

@item @code{default-location} (default: @i{see below})
The default @code{nginx-location-configuration}.  Because @code{certbot}
needs to be able to serve challenges and responses, it needs to be able
to run a web server.  It does so by extending the @code{nginx} web
service with an @code{nginx-server-configuration} listening on the
@var{hosts} on port 80, and which has a
@code{nginx-location-configuration} for the @code{/.well-known/} URI
path subspace used by Let's Encrypt.  @xref{Web Services}, for more on
these nginx configuration data types.

Requests to other URL paths will be matched by the
@code{default-location}, which if present is added to all
@code{nginx-server-configuration}s.

By default, the @code{default-location} will issue a redirect from
@code{http://@var{host}/...} to @code{https://@var{host}/...}, leaving
you to define what to serve on your site via @code{https}.

Pass @code{#f} to not issue a default location.
@end table
@end deftp

The public key and its signatures will be written to
@code{/etc/letsencrypt/live/@var{host}/fullchain.pem}, for each
@var{host} in the configuration.  The private key is written to
@code{/etc/letsencrypt/live/@var{host}/privkey.pem}.


@node DNS Services
@subsubsection DNS Services


@@ 15494,6 15575,7 @@ The list of knot-zone-configuration used by this configuration.
@end table
@end deftp


@node VPN Services
@subsubsection VPN Services
@cindex VPN (virtual private network)

M gnu/local.mk => gnu/local.mk +1 -0
@@ 444,6 444,7 @@ GNU_SYSTEM_MODULES =				\
  %D%/services/audio.scm                        \
  %D%/services/avahi.scm			\
  %D%/services/base.scm				\
  %D%/services/certbot.scm			\
  %D%/services/configuration.scm		\
  %D%/services/cuirass.scm			\
  %D%/services/cups.scm				\

A gnu/services/certbot.scm => gnu/services/certbot.scm +128 -0
@@ 0,0 1,128 @@
;;; GNU Guix --- Functional package management for GNU
;;; Copyright © 2016 ng0 <ng0@we.make.ritual.n0.is>
;;; Copyright © 2016 Sou Bunnbu <iyzsong@member.fsf.org>
;;;
;;; This file is part of GNU Guix.
;;;
;;; GNU Guix is free software; you can redistribute it and/or modify it
;;; under the terms of the GNU General Public License as published by
;;; the Free Software Foundation; either version 3 of the License, or (at
;;; your option) any later version.
;;;
;;; GNU Guix is distributed in the hope that it will be useful, but
;;; WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
;;; GNU General Public License for more details.
;;;
;;; You should have received a copy of the GNU General Public License
;;; along with GNU Guix.  If not, see <http://www.gnu.org/licenses/>.

(define-module (gnu services certbot)
  #:use-module (gnu services)
  #:use-module (gnu services base)
  #:use-module (gnu services shepherd)
  #:use-module (gnu services mcron)
  #:use-module (gnu services web)
  #:use-module (gnu system shadow)
  #:use-module (gnu packages tls)
  #:use-module (guix records)
  #:use-module (guix gexp)
  #:use-module (srfi srfi-1)
  #:use-module (ice-9 match)
  #:export (certbot-service-type
            certbot-configuration
            certbot-configuration?))

;;; Commentary:
;;;
;;; Automatically obtaining TLS certificates from Let's Encrypt.
;;;
;;; Code:


(define-record-type* <certbot-configuration>
  certbot-configuration make-certbot-configuration
  certbot-configuration?
  (package             certbot-configuration-package
                       (default certbot))
  (webroot             certbot-configuration-webroot
                       (default "/var/www"))
  (hosts               certbot-configuration-hosts
                       (default '()))
  (default-location    certbot-configuration-default-location
                       (default
                         (nginx-location-configuration
                          (uri "/")
                          (body
                           (list "return 301 https://$host$request_uri;"))))))

(define certbot-renewal-jobs
  (match-lambda
    (($ <certbot-configuration> package webroot hosts default-location)
     (match hosts
       ;; Avoid pinging certbot if we have no hosts.
       (() '())
       (_
        (list
         ;; Attempt to renew the certificates twice a week.
         #~(job (lambda (now)
                  (next-day-from (next-hour-from now '(3))
                                 '(2 5)))
                (string-append #$package "/bin/certbot renew"
                               (string-concatenate
                                (map (lambda (host)
                                       (string-append " -d " host))
                                     #$hosts))))))))))

(define certbot-activation
  (match-lambda
    (($ <certbot-configuration> package webroot hosts default-location)
     (with-imported-modules '((guix build utils))
       #~(begin
	   (use-modules (guix build utils))
	   (mkdir-p #$webroot)
           (for-each
            (lambda (host)
              (unless (file-exists? (in-vicinity "/etc/letsencrypt/live" host))
                (unless (zero? (system*
                                (string-append #$certbot "/bin/certbot")
                                "certonly" "--webroot" "-w" #$webroot
                                "-d" host))
                  (error "failed to acquire cert for host" host))))
            '#$hosts))))))

(define certbot-nginx-server-configurations
  (match-lambda
    (($ <certbot-configuration> package webroot hosts default-location)
     (map
      (lambda (host)
        (nginx-server-configuration
         (http-port 80)
         (https-port #f)
         (ssl-certificate #f)
         (ssl-certificate-key #f)
         (server-name (list host))
         (locations
          (filter identity
                  (list
                   (nginx-location-configuration
                    (uri "/.well-known")
                    (body (list (list "root " webroot ";"))))
                   default-location)))))
      hosts))))

(define certbot-service-type
  (service-type (name 'certbot)
                (extensions
                 (list (service-extension nginx-service-type
                                          certbot-nginx-server-configurations)
                       (service-extension activation-service-type
                                          certbot-activation)
                       (service-extension mcron-service-type
                                          certbot-renewal-jobs)))
                (compose concatenate)
                (extend (lambda (config additional-hosts)
                          (certbot-configuration
                           (inherit config)
                           (hosts (append (certbot-configuration-hosts config)
                                          additional-hosts)))))))