GNU bug report logs - #47840
[PATCH] gnu: Add desec-certbot-hook.

Previous Next

Package: guix-patches;

Reported by: Raghav Gururajan <rg <at> raghavgururajan.name>

Date: Sat, 17 Apr 2021 11:47:01 UTC

Severity: normal

Tags: patch

Done: Raghav Gururajan <rg <at> raghavgururajan.name>

Bug is archived. No further changes may be made.

To add a comment to this bug, you must first unarchive it, by sending
a message to control AT debbugs.gnu.org, with unarchive 47840 in the body.
You can then email your comments to 47840 AT debbugs.gnu.org in the normal way.

Toggle the display of automated, internal messages from the tracker.

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to guix-patches <at> gnu.org:
bug#47840; Package guix-patches. (Sat, 17 Apr 2021 11:47:01 GMT) Full text and rfc822 format available.

Acknowledgement sent to Raghav Gururajan <rg <at> raghavgururajan.name>:
New bug report received and forwarded. Copy sent to guix-patches <at> gnu.org. (Sat, 17 Apr 2021 11:47:02 GMT) Full text and rfc822 format available.

Message #5 received at submit <at> debbugs.gnu.org (full text, mbox):

From: Raghav Gururajan <rg <at> raghavgururajan.name>
To: guix-patches <at> gnu.org
Cc: Raghav Gururajan <rg <at> raghavgururajan.name>
Subject: [PATCH] gnu: Add desec-certbot-hook.
Date: Sat, 17 Apr 2021 07:46:07 -0400
* gnu/packages/tls.scm (desec-certbot-hook): New variable.
---
 gnu/packages/tls.scm | 32 ++++++++++++++++++++++++++++++++
 1 file changed, 32 insertions(+)

diff --git a/gnu/packages/tls.scm b/gnu/packages/tls.scm
index 25493cc7ca..e7e50d7f53 100644
--- a/gnu/packages/tls.scm
+++ b/gnu/packages/tls.scm
@@ -42,6 +42,7 @@
   #:use-module (guix build-system perl)
   #:use-module (guix build-system python)
   #:use-module (guix build-system cmake)
+  #:use-module (guix build-system copy)
   #:use-module (guix build-system trivial)
   #:use-module (gnu packages compression)
   #:use-module (gnu packages)
@@ -70,6 +71,37 @@
   #:use-module (gnu packages base)
   #:use-module (srfi srfi-1))
 
+(define-public desec-certbot-hook
+  (let ((commit "68da7abc0793602fd336962a7e2348b57c5d6fd6")
+        (revision "21"))
+    (package
+      (name "desec-certbot-hook")
+      (version
+       (git-version "0" revision commit))
+      (source
+       (origin
+         (method git-fetch)
+         (uri
+          (git-reference
+           (url "https://github.com/desec-io/desec-certbot-hook")
+           (commit commit)))
+         (file-name
+          (git-file-name name version))
+         (sha256
+          (base32 "0qjqk6i85b1y7fgzcx74r4gn2i4dkjza34hkzp6kyn9hrb8f2gv2"))))
+      (build-system copy-build-system)
+      (arguments
+       `(#:install-plan
+         '(("." "etc/desec" #:include ("hook.sh")))))
+      (synopsis "deSEC's certbot DNS challenge automatization")
+      (description "Use deSEC to obtain certificates with certbot DNS ownership
+verification.  With the help of this hook script, you can obtain your Let's
+Encrypt certificate using certbot with authorization provided by the DNS
+challenge mechanism, that is, you will not need a running web server or any port
+forwarding to your local machine.")
+      (home-page "https://desec.io")
+      (license license:expat))))
+
 (define-public libtasn1
   (package
     (name "libtasn1")
-- 
2.31.1





Information forwarded to guix-patches <at> gnu.org:
bug#47840; Package guix-patches. (Sat, 17 Apr 2021 23:33:02 GMT) Full text and rfc822 format available.

Message #8 received at 47840 <at> debbugs.gnu.org (full text, mbox):

From: Raghav Gururajan <rg <at> raghavgururajan.name>
To: 47840 <at> debbugs.gnu.org
Cc: Raghav Gururajan <rg <at> raghavgururajan.name>
Subject: [PATCH v2] gnu: Add desec-certbot-hook.
Date: Sat, 17 Apr 2021 19:32:33 -0400
* gnu/packages/tls.scm (desec-certbot-hook): New variable.
---
 gnu/packages/tls.scm | 50 ++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 50 insertions(+)

diff --git a/gnu/packages/tls.scm b/gnu/packages/tls.scm
index 25493cc7ca..40e003d024 100644
--- a/gnu/packages/tls.scm
+++ b/gnu/packages/tls.scm
@@ -42,6 +42,7 @@
   #:use-module (guix build-system perl)
   #:use-module (guix build-system python)
   #:use-module (guix build-system cmake)
+  #:use-module (guix build-system copy)
   #:use-module (guix build-system trivial)
   #:use-module (gnu packages compression)
   #:use-module (gnu packages)
@@ -70,6 +71,55 @@
   #:use-module (gnu packages base)
   #:use-module (srfi srfi-1))
 
+(define-public desec-certbot-hook
+  (let ((commit "68da7abc0793602fd336962a7e2348b57c5d6fd6")
+        (revision "21"))
+    (package
+      (name "desec-certbot-hook")
+      (version
+       (git-version "0" revision commit))
+      (source
+       (origin
+         (method git-fetch)
+         (uri
+          (git-reference
+           (url "https://github.com/desec-io/desec-certbot-hook")
+           (commit commit)))
+         (file-name
+          (git-file-name name version))
+         (sha256
+          (base32 "0qjqk6i85b1y7fgzcx74r4gn2i4dkjza34hkzp6kyn9hrb8f2gv2"))))
+      (build-system copy-build-system)
+      (arguments
+       `(#:phases
+         (modify-phases %standard-phases
+           (add-after 'unpack 'patch-script
+             (lambda* (#:key inputs #:allow-other-keys)
+               (substitute* "hook.sh"
+                 ;; The hook-script look for '.dedynauth' file in $PWD.
+                 ;; But users cannot create or edit files in store.
+                 ;; So we patch the hook-script to look for '.dedynauth' file,
+                 ;; in /etc/desec.
+                 (("\\$\\(pwd\\)")
+                  "/etc/desec")
+                 ;; Make absolute references to curl program,
+                 ;; so that users don't have to install it separately.
+                 (("curl")
+                  (string-append (assoc-ref inputs "curl")
+                                 "/bin/curl"))))))
+         #:install-plan
+         '(("." "etc/desec" #:include ("hook.sh")))))
+      (inputs
+       `(("curl" ,curl)))
+      (synopsis "deSEC's certbot DNS challenge automatization")
+      (description "Use deSEC to obtain certificates with certbot DNS ownership
+verification.  With the help of this hook script, you can obtain your Let's
+Encrypt certificate using certbot with authorization provided by the DNS
+challenge mechanism, that is, you will not need a running web server or any port
+forwarding to your local machine.")
+      (home-page "https://desec.io")
+      (license license:expat))))
+
 (define-public libtasn1
   (package
     (name "libtasn1")
-- 
2.31.1





Reply sent to Raghav Gururajan <rg <at> raghavgururajan.name>:
You have taken responsibility. (Wed, 23 Jun 2021 17:00:02 GMT) Full text and rfc822 format available.

Notification sent to Raghav Gururajan <rg <at> raghavgururajan.name>:
bug acknowledged by developer. (Wed, 23 Jun 2021 17:00:02 GMT) Full text and rfc822 format available.

Message #13 received at 47840-done <at> debbugs.gnu.org (full text, mbox):

From: Raghav Gururajan <rg <at> raghavgururajan.name>
To: 47840-done <at> debbugs.gnu.org
Date: Wed, 23 Jun 2021 12:59:05 -0400
[Message part 1 (text/plain, inline)]
Pushed as 620669fd17..acfa55a581.

[OpenPGP_signature (application/pgp-signature, attachment)]

bug archived. Request was from Debbugs Internal Request <help-debbugs <at> gnu.org> to internal_control <at> debbugs.gnu.org. (Thu, 22 Jul 2021 11:24:05 GMT) Full text and rfc822 format available.

This bug report was last modified 2 years and 278 days ago.

Previous Next


GNU bug tracking system
Copyright (C) 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson.