!MthpOIxqJhTgrMNxDS:nixos.org

NixOS ACME / LetsEncrypt

105 Members
Another day, another cert renewal43 Servers

Load older messages


SenderMessageTime
2 Feb 2023
@hexa:lossy.networkhexa * hey and what about TemporaryFilesystem= and BindReadOnlyPaths= 22:47:58
@raitobezarius:matrix.orgraitobezarius can BindReadOnlyPaths work hexa 23:40:14
@raitobezarius:matrix.orgraitobezariusI thought it was supposed to honor the classical permissions23:40:22
@raitobezarius:matrix.orgraitobezariusSo even if you bind it, you cannot read it because it's not a+r or you're not in the group (or it's not g+r, whatever)23:40:42
@raitobezarius:matrix.orgraitobezariusOr am I confusing it with ReadOnlyPaths23:40:50
@hexa:lossy.networkhexaI don't think you need extra permissions, when systemd provides the mount for the service23:49:16
3 Feb 2023
@hexa:lossy.networkhexa hm, nvm. I did indeed add SupplementaryGroup with BindPaths 00:15:39
@m1cr0man:m1cr0man.comm1cr0manLoadCredentials isn't the best option unfortunately because it means you must always restart the service, as a reload won't reload the creds from disk.21:42:13
@m1cr0man:m1cr0man.comm1cr0manTemporaryFilesystem suffers the same caveat21:42:23
@m1cr0man:m1cr0man.comm1cr0manFor things where restart is viable/standard, then LoadCredential can work quite well21:42:39
@hexa:lossy.networkhexayeah, LoadCredential= would need to inotify the original file and sighup the process or something to be useful22:47:36
@m1cr0man:m1cr0man.comm1cr0man Or systemd needs to provide a mechanism for reloading credential files in cases where the application will auto-reload all files itself. Like, if I could do systemctl reload httpd --credentials that would do the trick so long as credentials are reloaded before the process itself 22:51:31
@hexa:lossy.networkhexahow does BindPaths suffer from the same caveat, then its just a bind mount?22:55:13
@hexa:lossy.networkhexa * how does BindPaths suffer from the same caveat, when its just a bind mount?22:55:35
4 Feb 2023
@m1cr0man:m1cr0man.comm1cr0manI was only referring to LoadCredentials. BindPaths is fine if you are also ok with extending the service user's groups in some fashion.11:47:57
7 Feb 2023
@m1cr0man:m1cr0man.comm1cr0manI just saw #215124, will look into it tonight15:19:02
@m1cr0man:m1cr0man.comm1cr0man Exit code 11 means that renew was attempted with lego but failed, and renewal is definitely required (the cert is expired). I should add an error message there instead of just exiting with a unique code. I've asked the reporter to scroll up + check the rest of their logs as it probably contains a lego failure that has been happening for > 30 days. This is however a prime example of why we set -x :) 21:11:51
9 Feb 2023
@m1cr0man:m1cr0man.comm1cr0manhttps://github.com/NixOS/nixpkgs/pull/199033 hm, this person is being a little awkward. I still just want to close that PR, the changes aren't worthwhile19:07:20
@winterqt:nixos.devWinter (she/her) so reiterate it and close it m1cr0man 19:43:58
@winterqt:nixos.devWinter (she/her)your judgement is trusted for a reason, and it seems that theyre not even responding to (or understanding?) your claims19:44:24
@m1cr0man:m1cr0man.comm1cr0manOkay yeah, I'll do that. Thanks :) 19:44:48
10 Feb 2023
@andreas.schraegle:helsinki-systems.deAndreas SchrägleHuh, I guessed correctly who that was before opening it. He's... not always easy to deal with, which kind of sucks, because he does sometimes contribute quite useful stuff.13:54:55
@hexa:lossy.networkhexayou would think there is a language barrier16:11:40
@hexa:lossy.networkhexabut sometimes the communication works quite flawlessly16:11:48
12 Feb 2023
@m1cr0man:m1cr0man.comm1cr0man:( They are not happy about me closing the PR18:18:54
@m1cr0man:m1cr0man.comm1cr0man I'm trying to figure out if it would solve this but I don't think it does. At least then it has some technical merit beyond "keep the generated config cleaner" 18:25:07
@m1cr0man:m1cr0man.comm1cr0manOh right I finally understand 180980 properly, better than I did in September :P 18:31:20
@m1cr0man:m1cr0man.comm1cr0manThere, I left a big reply in 199033, I did out a truth table for his proposal, which a) took way too long to figure out the implications and b) turned out to be needlessly complicated and I would think harmful to some existing configs.20:25:04
16 Feb 2023
@m1cr0man:m1cr0man.comm1cr0manHm, interesting https://github.com/NixOS/nixpkgs/issues/216487 I'll do my best to explain why it exists.09:29:55
@m1cr0man:m1cr0man.comm1cr0manTldr the conditionPathExists is needed to ensure successful reload when vhosts with new certs are added, and it performs batching too09:32:27

Show newer messages


Back to Room ListRoom Version: 6