aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--doc/forge.skb43
-rw-r--r--doc/snippets/acme-restart-nginx-sudoers.scm7
-rw-r--r--guix/forge/nginx.scm153
3 files changed, 203 insertions, 0 deletions
diff --git a/doc/forge.skb b/doc/forge.skb
index c1c43c7..f230d2c 100644
--- a/doc/forge.skb
+++ b/doc/forge.skb
@@ -189,6 +189,49 @@ repeated below for your reference.])
:file "doc/snippets/tutorial.scm")))
(chapter :title [Services]
:ident "chapter-services"
+ (section :title [forge nginx service]
+ :ident "section-forge-nginx-service"
+ (p [The forge nginx service is a wrapper around the nginx web
+service in Guix upstream. It features]
+ (itemize
+ (item [automatic HTTPS for all sites through the ,(ref :ident
+"section-acme-service" :text "ACME service")])
+ (item [HTTP endpoint that redirects to HTTPS and responds to
+ACME HTTP-01 challenges])
+ (item [automatic provision of ,(ref :url
+"https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security" :text
+(abbr :short "HSTS" :long "HTTP Strict Transport Security"))
+headers])))
+ (p [When using this service, you must allow the ,(samp [acme])
+user to restart nginx using ,(command [sudo]). This is so that newly
+obtained certificates can be deployed to nginx. You may achieve this
+with the following in the ,(code [sudoers-file]) field of your ,(code
+[operating-system]) definition.]
+ (prog (source :language scheme
+ :file "doc/snippets/acme-restart-nginx-sudoers.scm")
+ :line #f))
+ (description
+ (record-documentation "guix/forge/nginx.scm" '<forge-nginx-configuration>
+ (record-field "http-listen"
+ [Socket to listen on for HTTP requests. Socket may be a
+,(record-ref "<forge-host-socket>"), ,(record-ref
+"<forge-ip-socket>"), or ,(record-ref "<forge-unix-socket>") object.])
+ (record-field "https-listen"
+ [Socket to listen on for HTTPS requests. Socket may be a
+,(record-ref "<forge-host-socket>"), ,(record-ref
+"<forge-ip-socket>"), or ,(record-ref "<forge-unix-socket>") object.])
+ (record-field "acme-state-directory"
+ [State directory of the ,(ref :ident "section-acme-service"
+:text "ACME service")])
+ (record-field "acme-challenge-directory"
+ [Directory to serve on ,(samp
+[/.well-known/acme-challenge/]) in response to ACME HTTP-01
+challenges])
+ (record-field "server-blocks"
+ [List of ,(ref :url
+"https://guix.gnu.org/manual/en/html_node/Web-Services.html#index-nginx_002dserver_002dconfiguration"
+:text "<nginx-server-configuration>") objects describing server blocks
+to add to the nginx configuration]))))
(section :title [ACME service]
:ident "section-acme-service"
(p [,(abbr :short "ACME" :long "Automatic Certificate Management
diff --git a/doc/snippets/acme-restart-nginx-sudoers.scm b/doc/snippets/acme-restart-nginx-sudoers.scm
new file mode 100644
index 0000000..7f705b9
--- /dev/null
+++ b/doc/snippets/acme-restart-nginx-sudoers.scm
@@ -0,0 +1,7 @@
+(operating-system
+ …
+ (sudoers-file
+ (mixed-text-file "sudoers"
+ "@include " %sudoers-specification
+ "\nacme ALL = NOPASSWD: " (file-append shepherd "/bin/herd") " restart nginx\n"))
+ …)
diff --git a/guix/forge/nginx.scm b/guix/forge/nginx.scm
new file mode 100644
index 0000000..a1f99c2
--- /dev/null
+++ b/guix/forge/nginx.scm
@@ -0,0 +1,153 @@
+;;; guix-forge --- Guix software forge meta-service
+;;; Copyright © 2023 Arun Isaac <arunisaac@systemreboot.net>
+;;;
+;;; This file is part of guix-forge.
+;;;
+;;; guix-forge is free software: you can redistribute it and/or modify
+;;; it under the terms of the GNU General Public License as published
+;;; by the Free Software Foundation, either version 3 of the License,
+;;; or (at your option) any later version.
+;;;
+;;; guix-forge is distributed in the hope that it will be useful, but
+;;; WITHOUT ANY WARRANTY; without even the implied warranty of
+;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+;;; General Public License for more details.
+;;;
+;;; You should have received a copy of the GNU General Public License
+;;; along with guix-forge. If not, see
+;;; <https://www.gnu.org/licenses/>.
+
+(define-module (forge nginx)
+ #:use-module (forge acme)
+ #:use-module (forge socket)
+ #:use-module ((gnu packages admin) #:select (shepherd))
+ #:use-module (gnu services)
+ #:use-module (gnu services web)
+ #:use-module (guix gexp)
+ #:use-module (guix records)
+ #:use-module (ice-9 match)
+ #:use-module (srfi srfi-1)
+ #:export (<forge-nginx-configuration>
+ forge-nginx-configuration
+ forge-nginx-configuration?
+ forge-nginx-configuration-http-listen
+ forge-nginx-configuration-https-listen
+ forge-nginx-configuration-acme-state-directory
+ forge-nginx-configuration-acme-challenge-directory
+ forge-nginx-configuration-server-blocks
+ nginx-socket->string
+ forge-nginx-service-type))
+
+(define-record-type* <forge-nginx-configuration>
+ forge-nginx-configuration make-forge-nginx-configuration
+ forge-nginx-configuration?
+ (http-listen forge-nginx-configuration-http-listen
+ (default (forge-ip-socket
+ (ip "0.0.0.0")
+ (port 80))))
+ (https-listen forge-nginx-configuration-https-listen
+ (default (forge-ip-socket
+ (ip "0.0.0.0")
+ (port 443))))
+ (acme-state-directory forge-nginx-configuration-acme-state-directory
+ (default "/var/lib/acme"))
+ (acme-challenge-directory forge-nginx-configuration-acme-challenge-directory
+ (default "/var/run/acme/acme-challenge"))
+ (server-blocks forge-nginx-configuration-server-blocks
+ (default '())))
+
+(define (nginx-socket->string socket)
+ "Serialize @var{socket} to a string as expected by nginx
+configuration (for example, in the @code{listen} and
+@code{fastcgi_pass} directives)."
+ (match socket
+ (($ <forge-host-socket> hostname port)
+ (string-append hostname ":" (number->string port)))
+ (($ <forge-ip-socket> (or "0.0.0.0" "::") port)
+ (number->string port))
+ (($ <forge-ip-socket> (? ipv4-address? ip) port)
+ (string-append ip ":" port))
+ (($ <forge-ip-socket> (? ipv6-address? ip) port)
+ (string-append "[" ip "]" ":" port))
+ (($ <forge-unix-socket> path)
+ (string-append "unix:" path))))
+
+(define (forge-nginx-server-blocks config)
+ "Return list of nginx server blocks to provision for forge-web service
+specified by @var{config}."
+ (match-record config <forge-nginx-configuration>
+ (http-listen https-listen acme-state-directory acme-challenge-directory server-blocks)
+ (cons (nginx-server-configuration
+ (listen (list (nginx-socket->string http-listen)))
+ (locations
+ (list (nginx-location-configuration
+ (uri "/.well-known/acme-challenge/")
+ ;; Without a trailing slash, a alias of /var/foo
+ ;; would lookup /bar at /var/foobar, not
+ ;; /var/foo/bar. So, a trailing slash is
+ ;; significant. Append it if not already
+ ;; present. Likewise, the trailing slash in
+ ;; "/.well-known/acme-challenge/" is also
+ ;; significant.
+ (body (list (string-append "alias "
+ (string-trim-right acme-challenge-directory #\/)
+ "/;"))))
+ (nginx-location-configuration
+ (uri "/")
+ ;; HTTP Strict Transport Security (HSTS) header as
+ ;; recommended by https://hstspreload.org
+ (body (list "add_header Strict-Transport-Security \"max-age=63072000; includeSubdomains; preload\";"
+ "return 301 https://$host$request_uri;"))))))
+ (map (lambda (server)
+ (match (nginx-server-configuration-server-name server)
+ ((name _ ...)
+ (nginx-server-configuration
+ (inherit server)
+ (listen (list (string-append (nginx-socket->string https-listen)
+ " ssl")))
+ (ssl-certificate (string-append acme-state-directory
+ "/" name "/cert.pem"))
+ (ssl-certificate-key (string-append acme-state-directory
+ "/private/" name "/key.pem"))))))
+ server-blocks))))
+
+(define %deploy-hook-gexp
+ (with-imported-modules '((guix build utils))
+ #~(begin
+ (use-modules (guix build utils))
+
+ ;; Restart nginx.
+ ;; We cannot refer to sudo in the store since that sudo does
+ ;; not have the setuid bit set. See "(guix) Setuid Programs".
+ (invoke "/run/setuid-programs/sudo"
+ #$(file-append shepherd "/bin/herd")
+ "restart"
+ "nginx"))))
+
+(define (forge-nginx-acme-certificates config)
+ "Return list of @code{<acme-certificate>} blocks to provision for
+forge-nginx service specified by @var{config}."
+ (match-record config <forge-nginx-configuration>
+ (server-blocks)
+ (map (lambda (server)
+ (acme-certificate
+ (domains (nginx-server-configuration-server-name server))
+ (deploy-hook (program-file "forge-nginx-acme-deploy-hook"
+ %deploy-hook-gexp))))
+ server-blocks)))
+
+(define forge-nginx-service-type
+ (service-type
+ (name 'forge-nginx)
+ (description "Run the forge-nginx web server.")
+ (extensions (list (service-extension nginx-service-type
+ forge-nginx-server-blocks)
+ (service-extension acme-service-type
+ forge-nginx-acme-certificates)))
+ (compose concatenate)
+ (extend (lambda (config server-blocks)
+ (forge-nginx-configuration
+ (inherit config)
+ (server-blocks (append (forge-nginx-configuration-server-blocks config)
+ server-blocks)))))
+ (default-value (forge-nginx-configuration))))