Home Explore Blog Models CI



nixpkgs

2nd chunk of `nixos/modules/services/misc/taskserver/default.md`
f6e5cb0b6f1b146bf021813fe412dd3989cb95e80431e7790000000100000c67
called {command}`nixos-taskserver` which manages the custom CA along
with Taskserver organisations, users and groups.

While the client certificates in Taskserver only authenticate whether a user
is allowed to connect, every user has its own UUID which identifies it as an
entity.

With {command}`nixos-taskserver` the client certificate is created
along with the UUID of the user, so it handles all of the credentials needed
in order to setup the Taskwarrior 2 client to work with a Taskserver.

## The nixos-taskserver tool {#module-services-taskserver-nixos-taskserver-tool}

Because Taskserver by default only provides scripts to setup users
imperatively, the {command}`nixos-taskserver` tool is used for
addition and deletion of organisations along with users and groups defined
by [](#opt-services.taskserver.organisations) and as well for
imperative set up.

The tool is designed to not interfere if the command is used to manually set
up some organisations, users or groups.

For example if you add a new organisation using {command}`nixos-taskserver
org add foo`, the organisation is not modified and deleted no
matter what you define in
{option}`services.taskserver.organisations`, even if you're adding
the same organisation in that option.

The tool is modelled to imitate the official {command}`taskd`
command, documentation for each subcommand can be shown by using the
{option}`--help` switch.

## Declarative/automatic CA management {#module-services-taskserver-declarative-ca-management}

Everything is done according to what you specify in the module options,
however in order to set up a Taskwarrior 2 client for synchronisation with a
Taskserver instance, you have to transfer the keys and certificates to the
client machine.

This is done using {command}`nixos-taskserver user export $orgname
$username` which is printing a shell script fragment to stdout
which can either be used verbatim or adjusted to import the user on the
client machine.

For example, let's say you have the following configuration:
```ShellSession
{
  services.taskserver.enable = true;
  services.taskserver.fqdn = "server";
  services.taskserver.listenHost = "::";
  services.taskserver.organisations.my-company.users = [ "alice" ];
}
```
This creates an organisation called `my-company` with the
user `alice`.

Now in order to import the `alice` user to another machine
`alicebox`, all we need to do is something like this:
```ShellSession
$ ssh server nixos-taskserver user export my-company alice | sh
```
Of course, if no SSH daemon is available on the server you can also copy
& paste it directly into a shell.

After this step the user should be set up and you can start synchronising
your tasks for the first time with {command}`task sync init` on
`alicebox`.

Subsequent synchronisation requests merely require the command {command}`task
sync` after that stage.

## Manual CA management {#module-services-taskserver-manual-ca-management}

If you set any options within
[service.taskserver.pki.manual](#opt-services.taskserver.pki.manual.ca.cert).*,
{command}`nixos-taskserver` won't issue certificates, but you can
still use it for adding or removing user accounts.

Title: nixos-taskserver Tool and CA Management for Taskserver
Summary
This section details the `nixos-taskserver` helper tool, which streamlines the management of Taskserver organizations, users, and groups, handling client certificate and user UUID generation for Taskwarrior 2 clients. It supports both declarative configurations via module options (e.g., `services.taskserver.organisations`) and imperative setup, ensuring it doesn't conflict with manual changes. The document explains declarative CA management, demonstrating how to export user credentials as a shell script for client setup. It also notes that if manual PKI options are configured, `nixos-taskserver` will manage user accounts but not issue certificates.