services: certbot: Add one-shot service to renew certificates.

* gnu/services/certbot.scm (certbot-renewal-one-shot): New procedure.
(certbot-service-type)[extensions]: Add it to shepherd-root extension.
(certbot-command): Make connection errors return a different exit code.
(certbot-activation): Remove message with certificate renewal instructions.

Change-Id: I614ac6214a753dba0396e2385a75926c8355caa1
Signed-off-by: Clément Lassieur <clement@lassieur.org>
This commit is contained in:
Carlo Zancanaro 2024-01-31 11:46:25 +00:00 committed by Clément Lassieur
parent d4a4b12f0a
commit 023c3e0ac4
No known key found for this signature in database
GPG Key ID: 89F96D4808F359C7

View File

@ -180,15 +180,45 @@ deploy."
(program-file (program-file
"certbot-command" "certbot-command"
#~(begin #~(begin
(use-modules (ice-9 match)) (use-modules (ice-9 match)
(let ((code 0)) (ice-9 textual-ports))
(define (log format-string . args)
(apply format #t format-string args)
(force-output))
(define (file-contains? file string)
(string-contains (call-with-input-file file
get-string-all)
string))
(define (connection-error?)
;; Certbot errors are always exit code 1, so we need to look at
;; the log file to see if there was a connection error.
(file-contains? "/var/log/letsencrypt/letsencrypt.log"
"Failed to establish a new connection"))
(let ((script-code 0))
(for-each (for-each
(match-lambda (match-lambda
((name . command) ((name . command)
(begin (log "Acquiring or renewing certificate: ~a~%" name)
(format #t "Acquiring or renewing certificate: ~a~%" name) (cond
(set! code (or (apply system* command) code))))) ((zero? (status:exit-val (apply system* command)))
'#$commands) code))))))) (log "Certificate successfully acquired: ~a~%" name))
((connection-error?)
;; If we have a connection error, then bail early with
;; exit code 2. We don't expect this to resolve within the
;; timespan of this script.
(log "Connection error - bailing out~%")
(exit 2))
(else
;; If we have any other type of error, then continue but
;; exit with a failing status code in the end.
(log "Error: ~a - continuing with other domains~%" name)
(set! script-code 1)))))
'#$commands)
(exit script-code))))))))
(define (certbot-renewal-jobs config) (define (certbot-renewal-jobs config)
(list (list
@ -197,6 +227,40 @@ deploy."
#~(job '(next-minute-from (next-hour '(0 12)) (list (random 60))) #~(job '(next-minute-from (next-hour '(0 12)) (list (random 60)))
#$(certbot-command config)))) #$(certbot-command config))))
(define (certbot-renewal-one-shot config)
(list
;; Renew certificates when the system first starts. This is a one-shot
;; service, because the mcron configuration will take care of running this
;; periodically. This is most useful the very first time the system starts,
;; to overwrite our self-signed certificates as soon as possible without
;; user intervention.
(shepherd-service
(provision '(renew-certbot-certificates))
(requirement '(nginx))
(one-shot? #t)
(start #~(lambda _
;; This needs the network, but there's no reliable way to know
;; if the network is up other than trying. If we fail due to a
;; connection error we retry a number of times in the hope that
;; the network comes up soon.
(let loop ((attempt 0))
(let ((code (status:exit-val
(system* #$(certbot-command config)))))
(cond
((and (= code 2) ; Exit code 2 means connection error
(< attempt 12)) ; Arbitrarily chosen max attempts
(sleep 10) ; Arbitrarily chosen retry delay
(loop (1+ attempt)))
((zero? code)
;; Success!
#t)
(else
;; Failure.
#f))))))
(auto-start? #t)
(documentation "Call certbot to renew certificates.")
(actions (list (shepherd-configuration-action (certbot-command config)))))))
(define (generate-certificate-gexp certbot-cert-directory rsa-key-size) (define (generate-certificate-gexp certbot-cert-directory rsa-key-size)
(match-lambda (match-lambda
(($ <certificate-configuration> name (primary-domain other-domains ...) (($ <certificate-configuration> name (primary-domain other-domains ...)
@ -240,9 +304,7 @@ deploy."
(define (certbot-activation config) (define (certbot-activation config)
(let* ((certbot-directory "/var/lib/certbot") (let* ((certbot-directory "/var/lib/certbot")
(certbot-cert-directory "/etc/letsencrypt/live") (certbot-cert-directory "/etc/letsencrypt/live"))
(script (in-vicinity certbot-directory "renew-certificates"))
(message (format #f (G_ "~a may need to be run~%") script)))
(match config (match config
(($ <certbot-configuration> package webroot certificates email (($ <certbot-configuration> package webroot certificates email
server rsa-key-size default-location) server rsa-key-size default-location)
@ -258,10 +320,7 @@ deploy."
(map (generate-certificate-gexp certbot-cert-directory (map (generate-certificate-gexp certbot-cert-directory
rsa-key-size) rsa-key-size)
(filter certificate-configuration-start-self-signed? (filter certificate-configuration-start-self-signed?
certificates))) certificates)))))))))
(copy-file #$(certbot-command config) #$script)
(display #$message)))))))
(define certbot-nginx-server-configurations (define certbot-nginx-server-configurations
(match-lambda (match-lambda
@ -294,7 +353,9 @@ deploy."
(service-extension activation-service-type (service-extension activation-service-type
certbot-activation) certbot-activation)
(service-extension mcron-service-type (service-extension mcron-service-type
certbot-renewal-jobs))) certbot-renewal-jobs)
(service-extension shepherd-root-service-type
certbot-renewal-one-shot)))
(compose concatenate) (compose concatenate)
(extend (lambda (config additional-certificates) (extend (lambda (config additional-certificates)
(certbot-configuration (certbot-configuration