[PATCH] gnu: Add desec-certbot-hook.

  • Done
  • quality assurance status badge
Details
One participant
  • Raghav Gururajan
Owner
unassigned
Submitted by
Raghav Gururajan
Severity
normal
R
R
Raghav Gururajan wrote on 17 Apr 2021 13:46
(address . guix-patches@gnu.org)(name . Raghav Gururajan)(address . rg@raghavgururajan.name)
20210417114607.17096-1-rg@raghavgururajan.name
* gnu/packages/tls.scm (desec-certbot-hook): New variable.
---
gnu/packages/tls.scm | 32 ++++++++++++++++++++++++++++++++
1 file changed, 32 insertions(+)

Toggle diff (52 lines)
diff --git a/gnu/packages/tls.scm b/gnu/packages/tls.scm
index 25493cc7ca..e7e50d7f53 100644
--- a/gnu/packages/tls.scm
+++ b/gnu/packages/tls.scm
@@ -42,6 +42,7 @@
#:use-module (guix build-system perl)
#:use-module (guix build-system python)
#:use-module (guix build-system cmake)
+ #:use-module (guix build-system copy)
#:use-module (guix build-system trivial)
#:use-module (gnu packages compression)
#:use-module (gnu packages)
@@ -70,6 +71,37 @@
#:use-module (gnu packages base)
#:use-module (srfi srfi-1))
+(define-public desec-certbot-hook
+ (let ((commit "68da7abc0793602fd336962a7e2348b57c5d6fd6")
+ (revision "21"))
+ (package
+ (name "desec-certbot-hook")
+ (version
+ (git-version "0" revision commit))
+ (source
+ (origin
+ (method git-fetch)
+ (uri
+ (git-reference
+ (url "https://github.com/desec-io/desec-certbot-hook")
+ (commit commit)))
+ (file-name
+ (git-file-name name version))
+ (sha256
+ (base32 "0qjqk6i85b1y7fgzcx74r4gn2i4dkjza34hkzp6kyn9hrb8f2gv2"))))
+ (build-system copy-build-system)
+ (arguments
+ `(#:install-plan
+ '(("." "etc/desec" #:include ("hook.sh")))))
+ (synopsis "deSEC's certbot DNS challenge automatization")
+ (description "Use deSEC to obtain certificates with certbot DNS ownership
+verification. With the help of this hook script, you can obtain your Let's
+Encrypt certificate using certbot with authorization provided by the DNS
+challenge mechanism, that is, you will not need a running web server or any port
+forwarding to your local machine.")
+ (home-page "https://desec.io")
+ (license license:expat))))
+
(define-public libtasn1
(package
(name "libtasn1")
--
2.31.1
R
R
Raghav Gururajan wrote on 18 Apr 2021 01:32
[PATCH v2] gnu: Add desec-certbot-hook.
(address . 47840@debbugs.gnu.org)(name . Raghav Gururajan)(address . rg@raghavgururajan.name)
20210417233233.411-1-rg@raghavgururajan.name
* gnu/packages/tls.scm (desec-certbot-hook): New variable.
---
gnu/packages/tls.scm | 50 ++++++++++++++++++++++++++++++++++++++++++++
1 file changed, 50 insertions(+)

Toggle diff (70 lines)
diff --git a/gnu/packages/tls.scm b/gnu/packages/tls.scm
index 25493cc7ca..40e003d024 100644
--- a/gnu/packages/tls.scm
+++ b/gnu/packages/tls.scm
@@ -42,6 +42,7 @@
#:use-module (guix build-system perl)
#:use-module (guix build-system python)
#:use-module (guix build-system cmake)
+ #:use-module (guix build-system copy)
#:use-module (guix build-system trivial)
#:use-module (gnu packages compression)
#:use-module (gnu packages)
@@ -70,6 +71,55 @@
#:use-module (gnu packages base)
#:use-module (srfi srfi-1))
+(define-public desec-certbot-hook
+ (let ((commit "68da7abc0793602fd336962a7e2348b57c5d6fd6")
+ (revision "21"))
+ (package
+ (name "desec-certbot-hook")
+ (version
+ (git-version "0" revision commit))
+ (source
+ (origin
+ (method git-fetch)
+ (uri
+ (git-reference
+ (url "https://github.com/desec-io/desec-certbot-hook")
+ (commit commit)))
+ (file-name
+ (git-file-name name version))
+ (sha256
+ (base32 "0qjqk6i85b1y7fgzcx74r4gn2i4dkjza34hkzp6kyn9hrb8f2gv2"))))
+ (build-system copy-build-system)
+ (arguments
+ `(#:phases
+ (modify-phases %standard-phases
+ (add-after 'unpack 'patch-script
+ (lambda* (#:key inputs #:allow-other-keys)
+ (substitute* "hook.sh"
+ ;; The hook-script look for '.dedynauth' file in $PWD.
+ ;; But users cannot create or edit files in store.
+ ;; So we patch the hook-script to look for '.dedynauth' file,
+ ;; in /etc/desec.
+ (("\\$\\(pwd\\)")
+ "/etc/desec")
+ ;; Make absolute references to curl program,
+ ;; so that users don't have to install it separately.
+ (("curl")
+ (string-append (assoc-ref inputs "curl")
+ "/bin/curl"))))))
+ #:install-plan
+ '(("." "etc/desec" #:include ("hook.sh")))))
+ (inputs
+ `(("curl" ,curl)))
+ (synopsis "deSEC's certbot DNS challenge automatization")
+ (description "Use deSEC to obtain certificates with certbot DNS ownership
+verification. With the help of this hook script, you can obtain your Let's
+Encrypt certificate using certbot with authorization provided by the DNS
+challenge mechanism, that is, you will not need a running web server or any port
+forwarding to your local machine.")
+ (home-page "https://desec.io")
+ (license license:expat))))
+
(define-public libtasn1
(package
(name "libtasn1")
--
2.31.1
R
R
Raghav Gururajan wrote on 23 Jun 2021 18:59
(no subject)
(address . 47840-done@debbugs.gnu.org)
ea803054-bd01-1378-bc12-fe11cc239439@raghavgururajan.name
Pushed as 620669fd17..acfa55a581.
Attachment: OpenPGP_signature
Closed
?
Your comment

This issue is archived.

To comment on this conversation send an email to 47840@debbugs.gnu.org

To respond to this issue using the mumi CLI, first switch to it
mumi current 47840
Then, you may apply the latest patchset in this issue (with sign off)
mumi am -- -s
Or, compose a reply to this issue
mumi compose
Or, send patches to this issue
mumi send-email *.patch