{ config, lib, pkgs, nixosTests, ... }: let cfg = config.services.step-ca; settingsFormat = (pkgs.formats.json { }); in { meta.maintainers = with lib.maintainers; [ mohe2015 ]; options = { services.step-ca = { enable = lib.mkEnableOption "the smallstep certificate authority server"; openFirewall = lib.mkEnableOption "opening the certificate authority server port"; package = lib.mkOption { type = lib.types.package; default = pkgs.step-ca; defaultText = lib.literalExpression "pkgs.step-ca"; description = "Which step-ca package to use."; }; address = lib.mkOption { type = lib.types.str; example = "127.0.0.1"; description = '' The address (without port) the certificate authority should listen at. This combined with overrides . ''; }; port = lib.mkOption { type = lib.types.port; example = 8443; description = '' The port the certificate authority should listen on. This combined with overrides . ''; }; settings = lib.mkOption { type = with lib.types; attrsOf anything; description = '' Settings that go into ca.json. See the step-ca manual for more information. The easiest way to configure this module would be to run step ca init to generate ca.json and then import it using builtins.fromJSON. This article may also be useful if you want to customize certain aspects of certificate generation for your CA. You need to change the database storage path to /var/lib/step-ca/db. The option will be ignored and overwritten by and . ''; }; intermediatePasswordFile = lib.mkOption { type = lib.types.path; example = "/run/keys/smallstep-password"; description = '' Path to the file containing the password for the intermediate certificate private key. Make sure to use a quoted absolute path instead of a path literal to prevent it from being copied to the globally readable Nix store. ''; }; }; }; config = lib.mkIf config.services.step-ca.enable ( let configFile = settingsFormat.generate "ca.json" (cfg.settings // { address = cfg.address + ":" + toString cfg.port; }); in { passthru.tests.step-ca = nixosTests.step-ca; assertions = [ { assertion = !lib.isStorePath cfg.intermediatePasswordFile; message = '' points to a file in the Nix store. You should use a quoted absolute path to prevent this. ''; } ]; systemd.packages = [ cfg.package ]; # configuration file indirection is needed to support reloading environment.etc."smallstep/ca.json".source = configFile; systemd.services."step-ca" = { wantedBy = [ "multi-user.target" ]; restartTriggers = [ configFile ]; unitConfig = { ConditionFileNotEmpty = ""; # override upstream }; serviceConfig = { Environment = "HOME=%S/step-ca"; WorkingDirectory = ""; # override upstream ReadWriteDirectories = ""; # override upstream # LocalCredential handles file permission problems arising from the use of DynamicUser. LoadCredential = "intermediate_password:${cfg.intermediatePasswordFile}"; ExecStart = [ "" # override upstream "${cfg.package}/bin/step-ca /etc/smallstep/ca.json --password-file \${CREDENTIALS_DIRECTORY}/intermediate_password" ]; # ProtectProc = "invisible"; # not supported by upstream yet # ProcSubset = "pid"; # not supported by upstream yet # PrivateUsers = true; # doesn't work with privileged ports therefore not supported by upstream DynamicUser = true; StateDirectory = "step-ca"; }; }; networking.firewall = lib.mkIf cfg.openFirewall { allowedTCPPorts = [ cfg.port ]; }; } ); }