!MthpOIxqJhTgrMNxDS:nixos.org

NixOS ACME / LetsEncrypt

104 Members
Another day, another cert renewal44 Servers

Load older messages


SenderMessageTime
26 Dec 2021
@m1cr0man:m1cr0man.comm1cr0manyeah absolutely16:30:05
@m1cr0man:m1cr0man.comm1cr0manit's in scope, we maintain it :)16:30:15
@winterqt:nixos.devWinter (she/her)

https://github.com/NixOS/nixpkgs/blob/b0f154fd440bdf43a483b8ca46020d7d6cec5fbf/nixos/modules/services/web-servers/nginx/default.nix#L952

Why is mkDefault used here, in what scenario would this value need to be changed from the Nginx group?

17:03:56
@m1cr0man:m1cr0man.comm1cr0man good question! It's very simple. we want security.acme.defaults.group or security.acme.certs.<cert>.group to take precedence 17:08:11
@m1cr0man:m1cr0man.comm1cr0manactually, defaults.group won't override it I don't think, but the <cert>.group definitely will17:09:16
@m1cr0man:m1cr0man.comm1cr0manIt gets even wilder in the next PR ;) https://github.com/NixOS/nixpkgs/pull/147784/files#diff-9b5561c4bb76ed61cd945467b6ccacb8343bb8ed8d2ad8a1e43505db34352722R943-R94917:10:21
@winterqt:nixos.devWinter (she/her)oh no.17:10:47
@winterqt:nixos.devWinter (she/her)lol17:10:49
@winterqt:nixos.devWinter (she/her) where is security.acme.defaults even defined? can’t find that anywhere >.< 17:11:10
@m1cr0man:m1cr0man.comm1cr0manit's in that PR17:11:14
@m1cr0man:m1cr0man.comm1cr0manit's not in master yet17:11:19
@winterqt:nixos.devWinter (she/her)ahh17:11:30
@m1cr0man:m1cr0man.comm1cr0manit's also fully doc'd in that PR, in case you were looking for docs too lol17:11:38
@m1cr0man:m1cr0man.comm1cr0manI specifically document how to make use of the nginx vhost stuff for DNS-01 validation, which includes making use of that webroot logic17:12:27
@m1cr0man:m1cr0man.comm1cr0manWrote a test for caddy to cover https://github.com/NixOS/nixpkgs/pull/147973 . Once it passes I'll push + we'll be good for merge17:24:13
@winterqt:nixos.devWinter (she/her)Is there any reason the acme user doesn’t have a preset UID/GID like other modules’ users do?20:01:48
@hexa:lossy.networkhexabecause it doesn't really matter? It is always referenced by name.20:11:20
@winterqt:nixos.devWinter (she/her)that’s fair20:20:50
@m1cr0man:m1cr0man.comm1cr0manIt did up until recently, but then some other maintainer removed its fixed UID. I was not against it - for the reason hexa says but also you're not transporting certs between systems anyway and the UID will never change when randomly picked.20:34:44
@m1cr0man:m1cr0man.comm1cr0man * It did up until recently, but then some other maintainer removed its fixed UID. I was not against it - for the reason hexa says but also you're not transporting certs between systems anyway and the UID will never change once randomly picked.20:34:50
@m1cr0man:m1cr0man.comm1cr0manso it turns out my tests found a bug in caddy ;D 20:35:11
@winterqt:nixos.devWinter (she/her)
In reply to @m1cr0man:m1cr0man.com
It did up until recently, but then some other maintainer removed its fixed UID. I was not against it - for the reason hexa says but also you're not transporting certs between systems anyway and the UID will never change once randomly picked.

the UID will never change once randomly picked.
unless you’re wiping your rootdir on every boot (hi), which regenerates /etc/passwd, so then you’re at the mercy of JSON ordering

21:07:07
@winterqt:nixos.devWinter (she/her) *
In reply to @m1cr0man:m1cr0man.com
It did up until recently, but then some other maintainer removed its fixed UID. I was not against it - for the reason hexa says but also you're not transporting certs between systems anyway and the UID will never change once randomly picked.

the UID will never change once randomly picked.
unless you’re wiping your rootdir on every boot (hi), which regenerates /etc/passwd, so then you’re at the mercy of JSON ordering

21:07:14
@winterqt:nixos.devWinter (she/her) *
In reply to @m1cr0man:m1cr0man.com
It did up until recently, but then some other maintainer removed its fixed UID. I was not against it - for the reason hexa says but also you're not transporting certs between systems anyway and the UID will never change once randomly picked.

the UID will never change once randomly picked.

unless you’re wiping your rootdir on every boot (hi), which regenerates /etc/passwd, so then you’re at the mercy of JSON ordering

21:07:23
@m1cr0man:m1cr0man.comm1cr0manyou can always set your own UID :)21:07:36
@m1cr0man:m1cr0man.comm1cr0manjust set user.users.acme.uid = 123;21:07:48
@hexa:lossy.networkhexayeah, I'm reluctant to spend fixed uids on something if we don't have to 🙂21:08:06
@m1cr0man:m1cr0man.comm1cr0manWe also can't solve for every case, which is a lesson I've learned the hard way with this module21:08:29
@hexa:lossy.networkhexabingo21:08:47
@winterqt:nixos.devWinter (she/her)
In reply to @m1cr0man:m1cr0man.com
you can always set your own UID :)
yeah of course
21:10:14

Show newer messages


Back to Room ListRoom Version: 6