+2
nixos/doc/manual/release-notes/rl-2505.section.md
+2
nixos/doc/manual/release-notes/rl-2505.section.md
···They are still expected to be working until future version 5.0.0, but will generate warnings in logs.Read the [release notes](https://www.authelia.com/blog/4.39-release-notes/) for human readable summaries of the changes.
···They are still expected to be working until future version 5.0.0, but will generate warnings in logs.Read the [release notes](https://www.authelia.com/blog/4.39-release-notes/) for human readable summaries of the changes.+- `security.acme` now supports renewal using CSRs (Certificate Signing Request) through the options `security.acme.*.csr` and `security.acme.*.csrKey`.
+47
-13
nixos/modules/security/acme/default.nix
+47
-13
nixos/modules/security/acme/default.nix
·········lib.unique (builtins.map (certAttrs: certAttrs.webroot) (lib.attrValues config.security.acme.certs))···-if cmp -s domainhash.txt certificates/domainhash.txt && [ -e 'certificates/${keyName}.key' ] && [ -e 'certificates/${keyName}.crt' ] && [ -n "$(find accounts -name '${data.email}.key')" ]; then·········
·········lib.unique (builtins.map (certAttrs: certAttrs.webroot) (lib.attrValues config.security.acme.certs))+certificateKey = if data.csrKey != null then "${data.csrKey}" else "certificates/${keyName}.key";···+if cmp -s domainhash.txt certificates/domainhash.txt && [ -e '${certificateKey}' ] && [ -e 'certificates/${keyName}.crt' ] && [ -n "$(find accounts -name '${data.email}.key')" ]; then······+description = "Path to a certificate signing request to apply when fetching the certificate.";···+When passing a certificate signing request both `security.acme.certs.${cert}.csr` and `security.acme.certs.${cert}.csrKey` need to be set.
+44
nixos/tests/acme/http01-builtin.nix
+44
nixos/tests/acme/http01-builtin.nix
······