NixOS ACME / LetsEncrypt | 107 Members | |
| Another day, another cert renewal | 43 Servers |
| Sender | Message | Time |
|---|---|---|
| 28 Nov 2021 | ||
nice. we have a bunch of bespoke default options (e.g. defaultKeyType, defaultDnsProvider) in our fork of the module, because we kin d of needed them, but I never got around to upstreaming them. the more generic approach you suggested seems much better though, so I'm all in favor of that. | 15:49:37 | |
* nice. we have a bunch of bespoke default options (e.g. defaultKeyType, defaultDnsProvider) in our fork of the module, because we kind of needed them, but I never got around to upstreaming them. the more generic approach you suggested seems much better though, so I'm all in favor of that. | 15:49:44 | |
| Glad to hear it! :D The more people the design helps the better. | 15:56:22 | |
Lol, look what I just reproduced ;) | 22:18:35 | |
| in the test suite no less | 22:18:42 | |
| Added StartLimitIntervalSec=0 with all ConditionPathExists and sure enough it's fine now. It only happens on some runs, which is baffling, but oh well life's too short to debug systemd ;) | 22:47:26 | |
| https://github.com/NixOS/nixpkgs/pull/147784 started a draft PR for the work so far, just so ticket creators know what's up | 23:17:03 | |
also yous can check out security.acme.defaults ;) | 23:17:12 | |
| 3 Dec 2021 | ||
| 13:01:15 | ||
| Hi there, I'm trying to set up Nginx reverse proxy with DNS-01 challenge, but I can't Can you help me with that? I've described it better on reddit -> https://www.reddit.com/r/NixOS/comments/r7y5vy/nginx_reverse_proxy_with_dns01_challenge/ | 13:54:30 | |
instead of enableACME = true; use useACMEHost | 14:32:44 | |
* instead of enableACME = true; use useACMEHost = "gitea.domain.org"; | 14:33:27 | |
* Patryk Gronkiewicz: instead of enableACME = true; use useACMEHost = "gitea.domain.org"; | 14:33:36 | |
In reply to @hexa:lossy.networkI can't finish rebuild then - nginx crashes and something else just hangs (I don't know what, but I can wait indefinitely and nothing changes) | 15:01:56 | |
| well, can't help you when you can't apply the config 😲 | 15:13:56 | |
| 4 Dec 2021 | ||
In reply to @pgronkievitz:matrix.orgCheck that you have assigned the security.acme.certs."gitea.domain.org".group to nginx or added nginx to the acme group | 16:36:30 | |
| https://github.com/NixOS/nixpkgs/pull/147784 ready for review for real now :) | 19:06:13 | |
| 7 ticket closures in one :D that always feels good | 19:07:16 | |
| 11 Dec 2021 | ||
| Systemd 250 notes from Phoronix:
| 12:05:15 | |
| It seems to kind of be like ansible-vault, where decryption happens when the service is started. Kind of neat because it can/will use a TPM module | 13:53:17 | |
| ohhhh | 14:02:23 | |
| I wish element had a sensible forwarding mode … for #tpm:nixos.org | 14:02:57 | |
| where the general consensus was, that tpm tooling on linux is abysmal | 14:03:20 | |
| Oh yeah, I know that XD Tried to set up my server's ZFS to unlock via the TPM once. Did not find a workable solution :P | 14:04:29 | |
| There's some other nice stuff in here that seems generally applicable too. The systemd-homed updates are super intriguing. I've always wondered if it would be possible to set up on-demand services for users via homed (namely jupyter notebooks) and safe SSH environments for student-esque use with it. Seems like a lot of these things would make that a bit easier | 14:06:52 | |
| The TPM tooling is "by spec" and that is probably the issue. The spec is horible and allows everything but isn't tailored for 99% of the usecases. | 15:03:41 | |
| 13 Dec 2021 | ||
| Trying to rebase my PR and write a test for listenHTTP. Found a bug in the log for handling ports < 1024, even when running as root. Not sure why yet. It must be one of the systemd protection flags on the service but I haven't narrowed down which one. It's not SystemCallFilters | 23:12:06 | |
| The capabilities one? | 23:44:31 | |
| 14 Dec 2021 | ||
To be specific, lego is giving bind: permission denied even when running as root. I haven't looked into it any further, just reread that msg I sent and realised how unclear it was :P | 22:39:49 | |
| need to see the systemd unit to make a proper statement on the matter - but the first thing is … privateusers will prevent passing of capabiltiies | 23:56:33 | |