aboutsummaryrefslogtreecommitdiff
path: root/infra/libkookie/nixpkgs/nixos/tests/certmgr.nix
diff options
context:
space:
mode:
authorMx Kookie <kookie@spacekookie.de>2020-12-09 18:55:19 +0000
committerMx Kookie <kookie@spacekookie.de>2020-12-09 18:55:19 +0000
commit80d90d9b204f7c17912740f9f414fe5d59f293ba (patch)
tree5f2065a06e724270610760d59d01c6888b375a46 /infra/libkookie/nixpkgs/nixos/tests/certmgr.nix
parent3a31a84c7d3e589035ad08499206aac44a81f424 (diff)
parent83cbad92d73216bb0d9187c56cce0b91f9121d5a (diff)
Merge commit '83cbad92d73216bb0d9187c56cce0b91f9121d5a' into main
Diffstat (limited to 'infra/libkookie/nixpkgs/nixos/tests/certmgr.nix')
-rw-r--r--infra/libkookie/nixpkgs/nixos/tests/certmgr.nix30
1 files changed, 17 insertions, 13 deletions
diff --git a/infra/libkookie/nixpkgs/nixos/tests/certmgr.nix b/infra/libkookie/nixpkgs/nixos/tests/certmgr.nix
index ef32f54400e3..8f5b89487793 100644
--- a/infra/libkookie/nixpkgs/nixos/tests/certmgr.nix
+++ b/infra/libkookie/nixpkgs/nixos/tests/certmgr.nix
@@ -11,7 +11,7 @@ let
file = {
group = "nginx";
owner = "nginx";
- path = "/tmp/${host}-ca.pem";
+ path = "/var/ssl/${host}-ca.pem";
};
label = "www_ca";
profile = "three-month";
@@ -20,13 +20,13 @@ let
certificate = {
group = "nginx";
owner = "nginx";
- path = "/tmp/${host}-cert.pem";
+ path = "/var/ssl/${host}-cert.pem";
};
private_key = {
group = "nginx";
mode = "0600";
owner = "nginx";
- path = "/tmp/${host}-key.pem";
+ path = "/var/ssl/${host}-key.pem";
};
request = {
CN = host;
@@ -57,6 +57,8 @@ let
services.cfssl.enable = true;
systemd.services.cfssl.after = [ "cfssl-init.service" "networking.target" ];
+ systemd.tmpfiles.rules = [ "d /var/ssl 777 root root" ];
+
systemd.services.cfssl-init = {
description = "Initialize the cfssl CA";
wantedBy = [ "multi-user.target" ];
@@ -87,8 +89,8 @@ let
enable = true;
virtualHosts = lib.mkMerge (map (host: {
${host} = {
- sslCertificate = "/tmp/${host}-cert.pem";
- sslCertificateKey = "/tmp/${host}-key.pem";
+ sslCertificate = "/var/ssl/${host}-cert.pem";
+ sslCertificateKey = "/var/ssl/${host}-key.pem";
extraConfig = ''
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
'';
@@ -124,16 +126,18 @@ in
};
testScript = ''
machine.wait_for_unit("cfssl.service")
- machine.wait_until_succeeds("ls /tmp/decl.example.org-ca.pem")
- machine.wait_until_succeeds("ls /tmp/decl.example.org-key.pem")
- machine.wait_until_succeeds("ls /tmp/decl.example.org-cert.pem")
- machine.wait_until_succeeds("ls /tmp/imp.example.org-ca.pem")
- machine.wait_until_succeeds("ls /tmp/imp.example.org-key.pem")
- machine.wait_until_succeeds("ls /tmp/imp.example.org-cert.pem")
+ machine.wait_until_succeeds("ls /var/ssl/decl.example.org-ca.pem")
+ machine.wait_until_succeeds("ls /var/ssl/decl.example.org-key.pem")
+ machine.wait_until_succeeds("ls /var/ssl/decl.example.org-cert.pem")
+ machine.wait_until_succeeds("ls /var/ssl/imp.example.org-ca.pem")
+ machine.wait_until_succeeds("ls /var/ssl/imp.example.org-key.pem")
+ machine.wait_until_succeeds("ls /var/ssl/imp.example.org-cert.pem")
machine.wait_for_unit("nginx.service")
assert 1 < int(machine.succeed('journalctl -u nginx | grep "Starting Nginx" | wc -l'))
- machine.succeed("curl --cacert /tmp/imp.example.org-ca.pem https://imp.example.org")
- machine.succeed("curl --cacert /tmp/decl.example.org-ca.pem https://decl.example.org")
+ machine.succeed("curl --cacert /var/ssl/imp.example.org-ca.pem https://imp.example.org")
+ machine.succeed(
+ "curl --cacert /var/ssl/decl.example.org-ca.pem https://decl.example.org"
+ )
'';
};