NixOS ACME / LetsEncrypt | 105 Members | |
| Another day, another cert renewal | 43 Servers |
| Sender | Message | Time |
|---|---|---|
| 26 Dec 2021 | ||
In reply to @arianvp:matrix.orgAh, makes sense. Why does this require the /var/lib/acme path to be hardcoded, though? Just to make things simpler on the module side? | 15:22:19 | |
| 15:45:30 | ||
| @Winter On top of what Arian said, there's two other reasons for acme-fixperms service and other various chgrp/chmods. The first is to fix permission changes that happened back in 19.09 (I think) where we went from root-owned to acme-owned certs. The second is for supporting changes of the group of an active cert. Additionally, in the new PR, it'll also support toggling useRoot. | 16:20:48 | |
| hexa: thanks I'll do that rebase now | 16:20:59 | |
| Got it. | 16:21:48 | |
| If you have any other questions feel free to ask. I'm trying to ensure that the test suite has 100% coverage of all use cases and features at all times. If you are ever wondering something technical it might help to give those a read and see what we're testing for. | 16:23:25 | |
| Can I ask questions that relate to the Nginx’s module’s ACME integration? I assume that’s in scope of this channel, but let me know if it’s not. | 16:27:30 | |
| yeah absolutely | 16:30:05 | |
| it's in scope, we maintain it :) | 16:30:15 | |
| https://github.com/NixOS/nixpkgs/blob/b0f154fd440bdf43a483b8ca46020d7d6cec5fbf/nixos/modules/services/web-servers/nginx/default.nix#L952 Why is | 17:03:56 | |
good question! It's very simple. we want security.acme.defaults.group or security.acme.certs.<cert>.group to take precedence | 17:08:11 | |
| actually, defaults.group won't override it I don't think, but the <cert>.group definitely will | 17:09:16 | |
| It gets even wilder in the next PR ;) https://github.com/NixOS/nixpkgs/pull/147784/files#diff-9b5561c4bb76ed61cd945467b6ccacb8343bb8ed8d2ad8a1e43505db34352722R943-R949 | 17:10:21 | |
| oh no. | 17:10:47 | |
| lol | 17:10:49 | |
| where is security.acme.defaults even defined? can’t find that anywhere >.< | 17:11:10 | |
| it's in that PR | 17:11:14 | |
| it's not in master yet | 17:11:19 | |
| ahh | 17:11:30 | |
| it's also fully doc'd in that PR, in case you were looking for docs too lol | 17:11:38 | |
| I specifically document how to make use of the nginx vhost stuff for DNS-01 validation, which includes making use of that webroot logic | 17:12:27 | |
| Wrote a test for caddy to cover https://github.com/NixOS/nixpkgs/pull/147973 . Once it passes I'll push + we'll be good for merge | 17:24:13 | |
| Is there any reason the acme user doesn’t have a preset UID/GID like other modules’ users do? | 20:01:48 | |
| because it doesn't really matter? It is always referenced by name. | 20:11:20 | |
| that’s fair | 20:20:50 | |
| It did up until recently, but then some other maintainer removed its fixed UID. I was not against it - for the reason hexa says but also you're not transporting certs between systems anyway and the UID will never change when randomly picked. | 20:34:44 | |
| * It did up until recently, but then some other maintainer removed its fixed UID. I was not against it - for the reason hexa says but also you're not transporting certs between systems anyway and the UID will never change once randomly picked. | 20:34:50 | |
| so it turns out my tests found a bug in caddy ;D | 20:35:11 | |
In reply to @m1cr0man:m1cr0man.com
| 21:07:07 | |
* In reply to @m1cr0man:m1cr0man.com
| 21:07:14 | |