!MthpOIxqJhTgrMNxDS:nixos.org

NixOS ACME / LetsEncrypt

106 Members
Another day, another cert renewal44 Servers

Load older messages


SenderMessageTime
26 Dec 2021
@m1cr0man:m1cr0man.comm1cr0man@Winter On top of what Arian said, there's two other reasons for acme-fixperms service and other various chgrp/chmods. The first is to fix permission changes that happened back in 19.09 (I think) where we went from root-owned to acme-owned certs. The second is for supporting changes of the group of an active cert. Additionally, in the new PR, it'll also support toggling useRoot. 16:20:48
@m1cr0man:m1cr0man.comm1cr0man hexa: thanks I'll do that rebase now 16:20:59
@winterqt:nixos.devWinter (she/her)Got it.16:21:48
@m1cr0man:m1cr0man.comm1cr0manIf you have any other questions feel free to ask. I'm trying to ensure that the test suite has 100% coverage of all use cases and features at all times. If you are ever wondering something technical it might help to give those a read and see what we're testing for.16:23:25
@winterqt:nixos.devWinter (she/her)Can I ask questions that relate to the Nginx’s module’s ACME integration? I assume that’s in scope of this channel, but let me know if it’s not.16:27:30
@m1cr0man:m1cr0man.comm1cr0manyeah absolutely16:30:05
@m1cr0man:m1cr0man.comm1cr0manit's in scope, we maintain it :)16:30:15
@winterqt:nixos.devWinter (she/her)

https://github.com/NixOS/nixpkgs/blob/b0f154fd440bdf43a483b8ca46020d7d6cec5fbf/nixos/modules/services/web-servers/nginx/default.nix#L952

Why is mkDefault used here, in what scenario would this value need to be changed from the Nginx group?

17:03:56
@m1cr0man:m1cr0man.comm1cr0man good question! It's very simple. we want security.acme.defaults.group or security.acme.certs.<cert>.group to take precedence 17:08:11
@m1cr0man:m1cr0man.comm1cr0manactually, defaults.group won't override it I don't think, but the <cert>.group definitely will17:09:16
@m1cr0man:m1cr0man.comm1cr0manIt gets even wilder in the next PR ;) https://github.com/NixOS/nixpkgs/pull/147784/files#diff-9b5561c4bb76ed61cd945467b6ccacb8343bb8ed8d2ad8a1e43505db34352722R943-R94917:10:21
@winterqt:nixos.devWinter (she/her)oh no.17:10:47
@winterqt:nixos.devWinter (she/her)lol17:10:49
@winterqt:nixos.devWinter (she/her) where is security.acme.defaults even defined? can’t find that anywhere >.< 17:11:10
@m1cr0man:m1cr0man.comm1cr0manit's in that PR17:11:14
@m1cr0man:m1cr0man.comm1cr0manit's not in master yet17:11:19
@winterqt:nixos.devWinter (she/her)ahh17:11:30
@m1cr0man:m1cr0man.comm1cr0manit's also fully doc'd in that PR, in case you were looking for docs too lol17:11:38
@m1cr0man:m1cr0man.comm1cr0manI specifically document how to make use of the nginx vhost stuff for DNS-01 validation, which includes making use of that webroot logic17:12:27
@m1cr0man:m1cr0man.comm1cr0manWrote a test for caddy to cover https://github.com/NixOS/nixpkgs/pull/147973 . Once it passes I'll push + we'll be good for merge17:24:13
@winterqt:nixos.devWinter (she/her)Is there any reason the acme user doesn’t have a preset UID/GID like other modules’ users do?20:01:48
@hexa:lossy.networkhexabecause it doesn't really matter? It is always referenced by name.20:11:20
@winterqt:nixos.devWinter (she/her)that’s fair20:20:50
@m1cr0man:m1cr0man.comm1cr0manIt did up until recently, but then some other maintainer removed its fixed UID. I was not against it - for the reason hexa says but also you're not transporting certs between systems anyway and the UID will never change when randomly picked.20:34:44
@m1cr0man:m1cr0man.comm1cr0man * It did up until recently, but then some other maintainer removed its fixed UID. I was not against it - for the reason hexa says but also you're not transporting certs between systems anyway and the UID will never change once randomly picked.20:34:50
@m1cr0man:m1cr0man.comm1cr0manso it turns out my tests found a bug in caddy ;D 20:35:11
@winterqt:nixos.devWinter (she/her)
In reply to @m1cr0man:m1cr0man.com
It did up until recently, but then some other maintainer removed its fixed UID. I was not against it - for the reason hexa says but also you're not transporting certs between systems anyway and the UID will never change once randomly picked.

the UID will never change once randomly picked.
unless you’re wiping your rootdir on every boot (hi), which regenerates /etc/passwd, so then you’re at the mercy of JSON ordering

21:07:07
@winterqt:nixos.devWinter (she/her) *
In reply to @m1cr0man:m1cr0man.com
It did up until recently, but then some other maintainer removed its fixed UID. I was not against it - for the reason hexa says but also you're not transporting certs between systems anyway and the UID will never change once randomly picked.

the UID will never change once randomly picked.
unless you’re wiping your rootdir on every boot (hi), which regenerates /etc/passwd, so then you’re at the mercy of JSON ordering

21:07:14
@winterqt:nixos.devWinter (she/her) *
In reply to @m1cr0man:m1cr0man.com
It did up until recently, but then some other maintainer removed its fixed UID. I was not against it - for the reason hexa says but also you're not transporting certs between systems anyway and the UID will never change once randomly picked.

the UID will never change once randomly picked.

unless you’re wiping your rootdir on every boot (hi), which regenerates /etc/passwd, so then you’re at the mercy of JSON ordering

21:07:23
@m1cr0man:m1cr0man.comm1cr0manyou can always set your own UID :)21:07:36

Show newer messages


Back to Room ListRoom Version: 6