NixOS ACME / LetsEncrypt | 99 Members | |
| Another day, another cert renewal | 40 Servers |
| Sender | Message | Time |
|---|---|---|
| 24 Dec 2025 | ||
| * oh, I think the profile option was backported, so that can be shortened to | 00:44:34 | |
| 00:44:37 | |
| 9 Jan 2026 | ||
| 01:05:23 | ||
| i just noticed the validMinDays=30 default after looking at crt.sh | 01:08:41 | |
| maybe the validMinDays default should be made conditional based upon the profile option? | 01:10:53 | |
| otoh it would be probably better figuring out how to it all based upon a percent remaining value | 01:13:52 | |
| * otoh it would be probably better figuring out how to do it based upon a percent remaining value | 01:15:19 | |
https://letsencrypt.org/docs/integration-guide/#when-to-renew | 12:16:31 | |
| 11 Jan 2026 | ||
| 01:56:24 | ||
| I just read in the lego changelog, that a mail is no longer required. https://github.com/go-acme/lego/releases/tag/v4.31.0 Should we adapt to that? | 09:25:26 | |
| LE also doesn't really use the account email anymore: https://letsencrypt.org/2025/06/26/expiration-notification-service-has-ended | 11:06:52 | |
we hardcode RandomizedDelaySec=24h, which means my 6 hour interval gets stretched by up to 24 hours | 16:05:14 | |
| le sigh | 16:05:31 | |
| 16:07:25 | |
| 16:07:40 | |
| so between 6 and 24 hours | 16:08:07 | |
| AFAIK there also is some sort of problem with minica not beeing able to generate placeholder certs for IPv6 addresses. but haven't dug deeper then noticing that there seems to be a a problem in that area | 16:14:55 | |
| ah, the problem might not be minica but how it's beeing used | 16:21:19 | |
| https://github.com/NixOS/nixpkgs/blob/05f7778bc209d5579d5976cc0e7dc02afa21d1e4/nixos/modules/security/acme/default.nix#L390-L393
| 16:41:14 | |
In reply to @hexa:lossy.networkLol oops | 18:19:52 | |
| 12 Jan 2026 | ||
| 00:38:09 | |
| --dynamic as the new default if validMinDays isn't set? | 00:40:56 | |
| wip | 00:42:42 | |
| Redacted or Malformed Event | 00:46:44 | |
| emily: imo skipping based on the remaining time can't work with ari | 00:56:58 | |
| but we already renew "silently" and that should trigger ari based renewals | 00:57:43 | |
and if we default to --dynamic we have nothing to compare against in the is_expiration_skippable function | 00:59:49 | |
| but we could try to replicate the logic used in lego when to pick 1/3 and 1/2 of the remainder | 01:00:24 | |
| and then determine the total duration from the certificate | 01:01:04 | |
| * and then determine the total duration from the certificate instead | 01:01:08 | |