+10
maintainers/maintainer-list.nix
+10
maintainers/maintainer-list.nix
···
+1
nixos/modules/module-list.nix
+1
nixos/modules/module-list.nix
+134
nixos/modules/services/security/step-ca.nix
+134
nixos/modules/services/security/step-ca.nix
···
···+This combined with <option>services.step-ca.port</option> overrides <option>services.step-ca.settings.address</option>.+This combined with <option>services.step-ca.address</option> overrides <option>services.step-ca.settings.address</option>.+<link xlink:href="https://smallstep.com/docs/step-cli/basic-crypto-operations#run-an-offline-x509-certificate-authority">This article</link>+"${cfg.package}/bin/step-ca /etc/smallstep/ca.json --password-file \${CREDENTIALS_DIRECTORY}/intermediate_password"+# PrivateUsers = true; # doesn't work with privileged ports therefore not supported by upstream
+21
-7
pkgs/tools/security/step-ca/default.nix
+21
-7
pkgs/tools/security/step-ca/default.nix
···# panic: httptest: failed to listen on a port: listen tcp6 [::1]:0: bind: operation not permitted [recovered]···description = "A private certificate authority (X.509 & SSH) & ACME server for secure automated certificate management, so you can use TLS everywhere & SSO for SSH";
···# panic: httptest: failed to listen on a port: listen tcp6 [::1]:0: bind: operation not permitted [recovered]···description = "A private certificate authority (X.509 & SSH) & ACME server for secure automated certificate management, so you can use TLS everywhere & SSO for SSH";