NixOS ACME / LetsEncrypt | 103 Members | |
| Another day, another cert renewal | 42 Servers |
| Sender | Message | Time |
|---|---|---|
| 27 Nov 2021 | ||
| I'll have PR to fix like 5 issues tomorrow | 01:38:48 | |
| m1cr0man: don't get hit by a truck! 😄 | 01:42:18 | |
| For those that might miss it: Long discussion about how to handle https://github.com/NixOS/nixpkgs/issues/138478 and I was convinced on a security.acme.defaults + security.acme.certs.<cert>.useDefault toggleable in the main Nix channel. | 16:24:10 | |
| https://matrix.to/#/!KqkRjyTEzAGRiZFBYT:nixos.org/$-6c8VrmpZ_1aoWLNFyo-PXpAzkH4Z-ekCCaMgTY7n8M?via=nixos.org&via=matrix.org&via=tchncs.de | 16:24:23 | |
| 28 Nov 2021 | ||
nice. we have a bunch of bespoke default options (e.g. defaultKeyType, defaultDnsProvider) in our fork of the module, because we kin d of needed them, but I never got around to upstreaming them. the more generic approach you suggested seems much better though, so I'm all in favor of that. | 15:49:37 | |
* nice. we have a bunch of bespoke default options (e.g. defaultKeyType, defaultDnsProvider) in our fork of the module, because we kind of needed them, but I never got around to upstreaming them. the more generic approach you suggested seems much better though, so I'm all in favor of that. | 15:49:44 | |
| Glad to hear it! :D The more people the design helps the better. | 15:56:22 | |
Lol, look what I just reproduced ;) | 22:18:35 | |
| in the test suite no less | 22:18:42 | |
| Added StartLimitIntervalSec=0 with all ConditionPathExists and sure enough it's fine now. It only happens on some runs, which is baffling, but oh well life's too short to debug systemd ;) | 22:47:26 | |
| https://github.com/NixOS/nixpkgs/pull/147784 started a draft PR for the work so far, just so ticket creators know what's up | 23:17:03 | |
also yous can check out security.acme.defaults ;) | 23:17:12 | |
| 3 Dec 2021 | ||
| 13:01:15 | ||
| Hi there, I'm trying to set up Nginx reverse proxy with DNS-01 challenge, but I can't Can you help me with that? I've described it better on reddit -> https://www.reddit.com/r/NixOS/comments/r7y5vy/nginx_reverse_proxy_with_dns01_challenge/ | 13:54:30 | |
instead of enableACME = true; use useACMEHost | 14:32:44 | |
* instead of enableACME = true; use useACMEHost = "gitea.domain.org"; | 14:33:27 | |
* Patryk Gronkiewicz: instead of enableACME = true; use useACMEHost = "gitea.domain.org"; | 14:33:36 | |
In reply to @hexa:lossy.networkI can't finish rebuild then - nginx crashes and something else just hangs (I don't know what, but I can wait indefinitely and nothing changes) | 15:01:56 | |
| well, can't help you when you can't apply the config 😲 | 15:13:56 | |
| 4 Dec 2021 | ||
In reply to @pgronkievitz:matrix.orgCheck that you have assigned the security.acme.certs."gitea.domain.org".group to nginx or added nginx to the acme group | 16:36:30 | |
| https://github.com/NixOS/nixpkgs/pull/147784 ready for review for real now :) | 19:06:13 | |
| 7 ticket closures in one :D that always feels good | 19:07:16 | |
| 11 Dec 2021 | ||
| Systemd 250 notes from Phoronix:
| 12:05:15 | |
| It seems to kind of be like ansible-vault, where decryption happens when the service is started. Kind of neat because it can/will use a TPM module | 13:53:17 | |
| ohhhh | 14:02:23 | |
| I wish element had a sensible forwarding mode … for #tpm:nixos.org | 14:02:57 | |
| where the general consensus was, that tpm tooling on linux is abysmal | 14:03:20 | |
| Oh yeah, I know that XD Tried to set up my server's ZFS to unlock via the TPM once. Did not find a workable solution :P | 14:04:29 | |
| There's some other nice stuff in here that seems generally applicable too. The systemd-homed updates are super intriguing. I've always wondered if it would be possible to set up on-demand services for users via homed (namely jupyter notebooks) and safe SSH environments for student-esque use with it. Seems like a lot of these things would make that a bit easier | 14:06:52 | |
| The TPM tooling is "by spec" and that is probably the issue. The spec is horible and allows everything but isn't tailored for 99% of the usecases. | 15:03:41 | |