 0581038e8e
			
		
	
	
		0581038e8e
		
	
	
	
	
		
			
			Discussion from #30945 indicates that it is no longer true that you have to restart nginx.
		
			
				
	
	
		
			94 lines
		
	
	
		
			2.6 KiB
		
	
	
	
		
			XML
		
	
	
	
	
	
			
		
		
	
	
			94 lines
		
	
	
		
			2.6 KiB
		
	
	
	
		
			XML
		
	
	
	
	
	
| <chapter xmlns="http://docbook.org/ns/docbook"
 | |
|          xmlns:xlink="http://www.w3.org/1999/xlink"
 | |
|          xmlns:xi="http://www.w3.org/2001/XInclude"
 | |
|          version="5.0"
 | |
|          xml:id="module-security-acme">
 | |
| 
 | |
| <title>SSL/TLS Certificates with ACME</title>
 | |
| 
 | |
| <para>NixOS supports automatic domain validation & certificate
 | |
| retrieval and renewal using the ACME protocol. This is currently only
 | |
| implemented by and for Let's Encrypt. The alternative ACME client
 | |
| <literal>simp_le</literal> is used under the hood.</para>
 | |
| 
 | |
| <section><title>Prerequisites</title>
 | |
| 
 | |
| <para>You need to have a running HTTP server for verification. The server must
 | |
| have a webroot defined that can serve
 | |
| <filename>.well-known/acme-challenge</filename>. This directory must be
 | |
| writeable by the user that will run the ACME client.</para>
 | |
| 
 | |
| <para>For instance, this generic snippet could be used for Nginx:
 | |
| 
 | |
| <programlisting>
 | |
| http {
 | |
|   server {
 | |
|     server_name _;
 | |
|     listen 80;
 | |
|     listen [::]:80;
 | |
| 
 | |
|     location /.well-known/acme-challenge {
 | |
|       root /var/www/challenges;
 | |
|     }
 | |
| 
 | |
|     location / {
 | |
|       return 301 https://$host$request_uri;
 | |
|     }
 | |
|   }
 | |
| }
 | |
| </programlisting>
 | |
| </para>
 | |
| 
 | |
| </section>
 | |
| 
 | |
| <section><title>Configuring</title>
 | |
| 
 | |
| <para>To enable ACME certificate retrieval & renewal for a certificate for
 | |
| <literal>foo.example.com</literal>, add the following in your
 | |
| <filename>configuration.nix</filename>:
 | |
| 
 | |
| <programlisting>
 | |
| security.acme.certs."foo.example.com" = {
 | |
|   webroot = "/var/www/challenges";
 | |
|   email = "foo@example.com";
 | |
| };
 | |
| </programlisting>
 | |
| </para>
 | |
| 
 | |
| <para>The private key <filename>key.pem</filename> and certificate
 | |
| <filename>fullchain.pem</filename> will be put into
 | |
| <filename>/var/lib/acme/foo.example.com</filename>. The target directory can
 | |
| be configured with the option <literal>security.acme.directory</literal>.
 | |
| </para>
 | |
| 
 | |
| <para>Refer to <xref linkend="ch-options" /> for all available configuration
 | |
| options for the <literal>security.acme</literal> module.</para>
 | |
| 
 | |
| </section>
 | |
| 
 | |
| <section><title>Using ACME certificates in Nginx</title>
 | |
| <para>NixOS supports fetching ACME certificates for you by setting
 | |
| <literal>enableACME = true;</literal> in a virtualHost config. We
 | |
| first create self-signed placeholder certificates in place of the
 | |
| real ACME certs. The placeholder certs are overwritten when the ACME
 | |
| certs arrive. For <literal>foo.example.com</literal> the config would
 | |
| look like.
 | |
| </para>
 | |
| 
 | |
| <programlisting>
 | |
| services.nginx = {
 | |
|   enable = true;
 | |
|   virtualHosts = {
 | |
|     "foo.example.com" = {
 | |
|       forceSSL = true;
 | |
|       enableACME = true;
 | |
|       locations."/" = {
 | |
|         root = "/var/www";
 | |
|       };
 | |
|     };
 | |
|   };
 | |
| }
 | |
| </programlisting>
 | |
| </section>
 | |
| </chapter>
 |