NixOS ACME / LetsEncrypt | 105 Members | |
| Another day, another cert renewal | 44 Servers |
| Sender | Message | Time |
|---|---|---|
| 9 Nov 2024 | ||
| https://github.com/NixOS/nixpkgs/pull/354629 | 06:50:27 | |
| I added a commit that makes it work for now | 06:50:34 | |
| 08:03:11 | |
| You fucking what | 08:03:13 | |
| https://hydra.nixos.org/build/278094707/log | 08:05:12 | |
| Also this thing | 08:05:13 | |
| What is even happening anymore | 08:05:18 | |
| OK looks like that machine is just hella overloaded | 08:06:32 | |
| Looking into that ^ The acme-lockfiles.service is configured in a less than stellar manner. Working directory is /run/acme, but it is managed by tmpfiles instead of RuntimeDirectory, despite being RemainAfterExit (so the runtime dir should not get deleted). Gonna fix all of this now. | 21:06:42 | |
| https://hydra.nixos.org/eval/1809873 | 21:57:20 | |
| More ordering nonsense | 21:57:24 | |
| If anyone wants to look into it | 21:57:30 | |
| It's funny how adding more synchronization uncovers more and more weird behaviors | 21:58:31 | |
| Just because tests that used to insta-fail on slow machines don't anymore | 21:58:43 | |
| Did I miss it? Looks like it passed | 22:20:42 | |
| I restarted it | 22:21:12 | |
| Without really thinking | 22:21:43 | |
| My bad | 22:21:44 | |
| No worries. What was the gist of it? | 22:24:00 | |
| Two different failures | 22:24:33 | |
| On aarch64 and x86_64 | 22:24:41 | |
| Did not look closely | 22:24:44 | |
| ok fair enough | 22:24:59 | |
| I think it's just ordering being off again | 22:28:34 | |
| But I don't have a good mental model | 22:28:39 | |
| Just looking over the maxConcurrentRenewals implementation, and the options/discussion from last year. I'm really starting to feel that the systemd dependency approach would have been more straightforward. I couldn't convince folks at the time, and there was lengthly discussion in which it really needed feedback from another maintainer. I went with the current solution because I felt there wasn't much between them and that it may lend to more ACME contributors, but I'm seeing now that it's a heavy bit of complexity and we're still limited on maintainers. | 22:29:59 | |
In reply to @k900:0upti.me An idea for fixing this: I could add more targets in the ACME module to simplify the config and dependencies in the webserver + other downstream modules, and potentially help resolve this issue also:
Honestly, I'm trying to think of reasons I haven't done this until now. I could add targets for other renewal types with the intention to allow DNS server startups in the same way. I could even go further and add targets for | 23:09:17 | |
In reply to @k900:0upti.me* An idea for fixing this: I could add more targets in the ACME module to simplify the config and dependencies in the webserver + other downstream modules, and potentially help resolve this issue also:
Honestly, I'm trying to think of reasons I haven't done this until now. I could add targets for other renewal types with the intention to allow DNS server startups in the same way. I could even go further and add targets for | 23:23:15 | |
| 10 Nov 2024 | ||
In reply to @m1cr0man:m1cr0man.comAnother thing about this - we already use systemd dependency ordering to do something very similar with how we handle account creation, where one cert is elected as a leader. It just feels unnecessary to have locks implemented on disk for this other use case. | 00:08:54 | |
| I forget what side I was on but we should go with that one 😂 | 00:41:44 | |