!MthpOIxqJhTgrMNxDS:nixos.org

NixOS ACME / LetsEncrypt

102 Members
Another day, another cert renewal41 Servers

Load older messages


SenderMessageTime
26 Nov 2021
@hexa:lossy.networkhexasaves rebase headaches between pr's possibly22:01:45
@m1cr0man:m1cr0man.comm1cr0manyeah, cool.22:06:27
@m1cr0man:m1cr0man.comm1cr0manI also just found that It would be silly (and require a rebase) to fix one of these issues and not the other in one commit :P22:06:45
@m1cr0man:m1cr0man.comm1cr0manBtw turns out separating domain hash from the certsDir hash was a great idea - because now i can safely remove domainhash entirely and fix your issue. Btw, can you open a ticket for that, just so that we can track the change reasoning against it?22:07:27
@hexa:lossy.networkhexahttps://github.com/NixOS/nixpkgs/issues/14754022:12:30
@hexa:lossy.networkhexahere we go22:12:31
@m1cr0man:m1cr0man.comm1cr0manty#22:12:39
@m1cr0man:m1cr0man.comm1cr0man * ty22:12:40
@m1cr0man:m1cr0man.comm1cr0man

ugh no you know what, I'm at a crossroads here with domainhash:

  • If I remove it, since extraDomains + domain aren't in the certDir hash, I would have to add them otherwise a change in domains wouldn't change the certs on disk
  • If I add the domains to certDir I'll regenerate everyone's certificates, so I would have to use domainhash.txt to check if I should do a "lego run" instead.

In the past changing hashData has been met with some backlash, so I think I am stuck with option 2

22:18:20
@m1cr0man:m1cr0man.comm1cr0manIs this our problem actually? Maybe we should open a bug report upstream to lego22:24:23
@m1cr0man:m1cr0man.comm1cr0manhttps://github.com/go-acme/lego/issues/1532 lol22:26:56
@m1cr0man:m1cr0man.comm1cr0man3 days ago22:26:58
@m1cr0man:m1cr0man.comm1cr0manthat's some oddly close timing πŸ˜…22:27:04
@m1cr0man:m1cr0man.comm1cr0manOk fantastic, if upstream fixes that issue as I described in the comment, we can safely remove domainHash entirely :) 22:32:07
@hexa:lossy.networkhexafun fact: I ported some portions of our acme logic to an ansible role we use at work with ubuntu22:49:50
@hexa:lossy.networkhexathe hash part is crucial there as well22:49:56
@hexa:lossy.networkhexathough I don't actually hash stuff, I just remember the previously used args22:50:48
@m1cr0man:m1cr0man.comm1cr0manheh nice :) 22:52:11
@m1cr0man:m1cr0man.comm1cr0manwish I could use nixos or acme at my place 😭 πŸ˜›22:52:34
@m1cr0man:m1cr0man.comm1cr0manstuck with ansible + paid wildcard certs22:52:54
@m1cr0man:m1cr0man.comm1cr0man [ -e "$CERT" ] && ! cmp -s "$CERT" out/fullchain.pem why did I check for existence before cmp? if it doesn't exist, cmp will exit non-0 anyway :P 22:53:51
@m1cr0man:m1cr0man.comm1cr0manI did this in like 3 places22:53:55
@m1cr0man:m1cr0man.comm1cr0man * I did this in like 2 places22:54:24
@hexa:lossy.networkhexa
In reply to @m1cr0man:m1cr0man.com
wish I could use nixos or acme at my place 😭 πŸ˜›
same.
22:56:27
27 Nov 2021
@m1cr0man:m1cr0man.comm1cr0man https://github.com/NixOS/nixpkgs/issues/140709#issuecomment-980482912 thoughts? I kinda hope someone counter argues against it but honestly I can't think of a good reason we can't support this other than the work involved (which isn't even that bad, from a glance, but ill need to write some tests for it) 01:38:34
@m1cr0man:m1cr0man.comm1cr0manI'll have PR to fix like 5 issues tomorrow01:38:48
@aanderse:nixos.devaanderse m1cr0man: don't get hit by a truck! πŸ˜„ 01:42:18
@m1cr0man:m1cr0man.comm1cr0manFor those that might miss it: Long discussion about how to handle https://github.com/NixOS/nixpkgs/issues/138478 and I was convinced on a security.acme.defaults + security.acme.certs.<cert>.useDefault toggleable in the main Nix channel.16:24:10
@m1cr0man:m1cr0man.comm1cr0manhttps://matrix.to/#/!KqkRjyTEzAGRiZFBYT:nixos.org/$-6c8VrmpZ_1aoWLNFyo-PXpAzkH4Z-ekCCaMgTY7n8M?via=nixos.org&via=matrix.org&via=tchncs.de16:24:23
28 Nov 2021
@andreas.schraegle:helsinki-systems.deAndreas SchrΓ€gle nice. we have a bunch of bespoke default options (e.g. defaultKeyType, defaultDnsProvider) in our fork of the module, because we kin d of needed them, but I never got around to upstreaming them. the more generic approach you suggested seems much better though, so I'm all in favor of that. 15:49:37

Show newer messages


Back to Room ListRoom Version: 6