!MthpOIxqJhTgrMNxDS:nixos.org

NixOS ACME / LetsEncrypt

105 Members
Another day, another cert renewal45 Servers

Load older messages


SenderMessageTime
26 Dec 2021
@winterqt:nixos.devWinter (she/her) *
In reply to @m1cr0man:m1cr0man.com
It did up until recently, but then some other maintainer removed its fixed UID. I was not against it - for the reason hexa says but also you're not transporting certs between systems anyway and the UID will never change once randomly picked.

the UID will never change once randomly picked.

unless you’re wiping your rootdir on every boot (hi), which regenerates /etc/passwd, so then you’re at the mercy of JSON ordering

21:07:23
@m1cr0man:m1cr0man.comm1cr0manyou can always set your own UID :)21:07:36
@m1cr0man:m1cr0man.comm1cr0manjust set user.users.acme.uid = 123;21:07:48
@hexa:lossy.networkhexayeah, I'm reluctant to spend fixed uids on something if we don't have to πŸ™‚21:08:06
@m1cr0man:m1cr0man.comm1cr0manWe also can't solve for every case, which is a lesson I've learned the hard way with this module21:08:29
@hexa:lossy.networkhexabingo21:08:47
@winterqt:nixos.devWinter (she/her)
In reply to @m1cr0man:m1cr0man.com
you can always set your own UID :)
yeah of course
21:10:14
@m1cr0man:m1cr0man.comm1cr0manMy logic at this point is if it can be done easily, we don't need to reimplement it. This is a case like that. If someone was trying to override the user itself, that would be more complex (and why I added useRoot in the PR, lol)21:12:15
@m1cr0man:m1cr0man.comm1cr0manspeaking of the PR21:12:17
@m1cr0man:m1cr0man.comm1cr0manfinally rebased :D21:13:17
@hexa:lossy.networkhexawaiting for aanderse to take a look πŸ™‚21:49:11
@m1cr0man:m1cr0man.comm1cr0manok21:49:38
@aanderse:nixos.devaandersewhich one?21:49:44
@m1cr0man:m1cr0man.comm1cr0manthis one https://github.com/NixOS/nixpkgs/pull/14778421:53:39
@m1cr0man:m1cr0man.comm1cr0manI found an issue with caddy, at least I'm 80% sure I did21:53:49
@aanderse:nixos.devaandersethanks! I'll look tonight21:54:41
@aanderse:nixos.devaanderse hmmm ok
my cert takes 30 minutes to renew (no, I'm not being sarcastic at all ... between 20 and 30 minutes) so i actually haven't tested that it worked - i cannot properly
21:56:28
@winterqt:nixos.devWinter (she/her)tf lol21:59:24
@winterqt:nixos.devWinter (she/her)is that on the server side?21:59:42
@m1cr0man:m1cr0man.comm1cr0man
In reply to @aanderse:nixos.dev
hmmm ok
my cert takes 30 minutes to renew (no, I'm not being sarcastic at all ... between 20 and 30 minutes) so i actually haven't tested that it worked - i cannot properly
You can nix-build the test suite now if you need a quick testing solution. Just comment out all the other subtests ;)
22:14:59
@aanderse:nixos.devaanderse Winter: yes
i like my dns provider because they have an awesome feature set and are a good price
i do not like how it takes 30 minutes for my wildcard to renew πŸ˜‘
22:16:24
@aanderse:nixos.devaandersebut since it's a wildcard i only need to do the one cert22:16:52
@aanderse:nixos.devaandersethat happens on a timer so it's not a practical issue22:17:24
@m1cr0man:m1cr0man.comm1cr0manIf your config is based on master/your own PR, you should be able to tell if renew has worked based on the age of the cert your caddy server is giving out right?22:20:36
@aanderse:nixos.devaandersethat sounds right22:37:08
@hexa:lossy.networkhexaI use rfc2316 with my own authoritative server and by default lego waits a minute between each SAN22:42:48
@hexa:lossy.networkhexaif I reduce that time to ~10s it fails sometimes22:43:06
@hexa:lossy.networkhexawhich is worrying22:43:13
@hexa:lossy.networkhexalike … why wouldn't 10 seconds work for a dynamic dns update πŸ˜•22:43:22
@winterqt:nixos.devWinter (she/her)
In reply to @aanderse:nixos.dev
Winter: yes
i like my dns provider because they have an awesome feature set and are a good price
i do not like how it takes 30 minutes for my wildcard to renew πŸ˜‘
what DNS provider if I may ask?
22:55:50

Show newer messages


Back to Room ListRoom Version: 6