!MthpOIxqJhTgrMNxDS:nixos.org

NixOS ACME / LetsEncrypt

92 Members
Another day, another cert renewal43 Servers

Load older messages


SenderMessageTime
2 Feb 2023
@hexa:lossy.networkhexarestarting17:44:32
@k900:0upti.meK900Saved the log to https://termbin.com/nrjp17:45:03
@hexa:lossy.networkhexathanks17:45:23
@hexa:lossy.networkhexaprobably as helpful as ever17:45:32
@raitobezarius:matrix.orgraitobezarius
In reply to @winterqt:nixos.dev
m1cr0man: Would you say the best way to guide users wrt DynamicUser services and permissions would be to have them set SupplementalGroups to whatever owns the given cert?
I personally do that
17:58:55
@winterqt:nixos.devWinter (she/her)
In reply to@hexa:lossy.network
probably as helpful as ever

you'd be right :)

```

22:42:18
@winterqt:nixos.devWinter (she/her)
In reply to@hexa:lossy.network
probably as helpful as ever
*

you'd be right :)

webserver: waiting for unit acme-finished-http.example.test.target
Test "Can request certificate with Lego's built in web server" failed with error: "unit "acme-finished-http.example.test.target" is inactive and there are no pending jobs"
22:42:21
@hexa:lossy.networkhexa
In reply to @raitobezarius:matrix.org
I personally do that
alternatively LoadCredentials=, but generally SupplementaryGroups=
22:43:20
@hexa:lossy.networkhexa hey and what about TemporaryFilesystem= and BindPath= 22:46:40
@hexa:lossy.networkhexa * hey and what about TemporaryFilesystem= and BindPaths= 22:46:55
@hexa:lossy.networkhexachoices!22:47:04
@hexa:lossy.networkhexa * hey and what about TemporaryFilesystem= and BindReadOnlyPaths= 22:47:58
@raitobezarius:matrix.orgraitobezarius can BindReadOnlyPaths work hexa 23:40:14
@raitobezarius:matrix.orgraitobezariusI thought it was supposed to honor the classical permissions23:40:22
@raitobezarius:matrix.orgraitobezariusSo even if you bind it, you cannot read it because it's not a+r or you're not in the group (or it's not g+r, whatever)23:40:42
@raitobezarius:matrix.orgraitobezariusOr am I confusing it with ReadOnlyPaths23:40:50
@hexa:lossy.networkhexaI don't think you need extra permissions, when systemd provides the mount for the service23:49:16
3 Feb 2023
@hexa:lossy.networkhexa hm, nvm. I did indeed add SupplementaryGroup with BindPaths 00:15:39
@m1cr0man:m1cr0man.comm1cr0manLoadCredentials isn't the best option unfortunately because it means you must always restart the service, as a reload won't reload the creds from disk.21:42:13
@m1cr0man:m1cr0man.comm1cr0manTemporaryFilesystem suffers the same caveat21:42:23
@m1cr0man:m1cr0man.comm1cr0manFor things where restart is viable/standard, then LoadCredential can work quite well21:42:39
@hexa:lossy.networkhexayeah, LoadCredential= would need to inotify the original file and sighup the process or something to be useful22:47:36
@m1cr0man:m1cr0man.comm1cr0man Or systemd needs to provide a mechanism for reloading credential files in cases where the application will auto-reload all files itself. Like, if I could do systemctl reload httpd --credentials that would do the trick so long as credentials are reloaded before the process itself 22:51:31
@hexa:lossy.networkhexahow does BindPaths suffer from the same caveat, then its just a bind mount?22:55:13
@hexa:lossy.networkhexa * how does BindPaths suffer from the same caveat, when its just a bind mount?22:55:35
4 Feb 2023
@m1cr0man:m1cr0man.comm1cr0manI was only referring to LoadCredentials. BindPaths is fine if you are also ok with extending the service user's groups in some fashion.11:47:57
7 Feb 2023
@m1cr0man:m1cr0man.comm1cr0manI just saw #215124, will look into it tonight15:19:02
@m1cr0man:m1cr0man.comm1cr0man Exit code 11 means that renew was attempted with lego but failed, and renewal is definitely required (the cert is expired). I should add an error message there instead of just exiting with a unique code. I've asked the reporter to scroll up + check the rest of their logs as it probably contains a lego failure that has been happening for > 30 days. This is however a prime example of why we set -x :) 21:11:51
9 Feb 2023
@m1cr0man:m1cr0man.comm1cr0manhttps://github.com/NixOS/nixpkgs/pull/199033 hm, this person is being a little awkward. I still just want to close that PR, the changes aren't worthwhile19:07:20
@winterqt:nixos.devWinter (she/her) so reiterate it and close it m1cr0man 19:43:58

Show newer messages


Back to Room ListRoom Version: 6