!MthpOIxqJhTgrMNxDS:nixos.org

NixOS ACME / LetsEncrypt

104 Members
Another day, another cert renewal45 Servers

Load older messages


SenderMessageTime
26 Nov 2021
@hexa:lossy.networkhexathough I don't actually hash stuff, I just remember the previously used args22:50:48
@m1cr0man:m1cr0man.comm1cr0manheh nice :) 22:52:11
@m1cr0man:m1cr0man.comm1cr0manwish I could use nixos or acme at my place 😭 😛22:52:34
@m1cr0man:m1cr0man.comm1cr0manstuck with ansible + paid wildcard certs22:52:54
@m1cr0man:m1cr0man.comm1cr0man [ -e "$CERT" ] && ! cmp -s "$CERT" out/fullchain.pem why did I check for existence before cmp? if it doesn't exist, cmp will exit non-0 anyway :P 22:53:51
@m1cr0man:m1cr0man.comm1cr0manI did this in like 3 places22:53:55
@m1cr0man:m1cr0man.comm1cr0man * I did this in like 2 places22:54:24
@hexa:lossy.networkhexa
In reply to @m1cr0man:m1cr0man.com
wish I could use nixos or acme at my place 😭 😛
same.
22:56:27
27 Nov 2021
@m1cr0man:m1cr0man.comm1cr0man https://github.com/NixOS/nixpkgs/issues/140709#issuecomment-980482912 thoughts? I kinda hope someone counter argues against it but honestly I can't think of a good reason we can't support this other than the work involved (which isn't even that bad, from a glance, but ill need to write some tests for it) 01:38:34
@m1cr0man:m1cr0man.comm1cr0manI'll have PR to fix like 5 issues tomorrow01:38:48
@aanderse:nixos.devaanderse m1cr0man: don't get hit by a truck! 😄 01:42:18
@m1cr0man:m1cr0man.comm1cr0manFor those that might miss it: Long discussion about how to handle https://github.com/NixOS/nixpkgs/issues/138478 and I was convinced on a security.acme.defaults + security.acme.certs.<cert>.useDefault toggleable in the main Nix channel.16:24:10
@m1cr0man:m1cr0man.comm1cr0manhttps://matrix.to/#/!KqkRjyTEzAGRiZFBYT:nixos.org/$-6c8VrmpZ_1aoWLNFyo-PXpAzkH4Z-ekCCaMgTY7n8M?via=nixos.org&via=matrix.org&via=tchncs.de16:24:23
28 Nov 2021
@andreas.schraegle:helsinki-systems.deAndreas Schrägle nice. we have a bunch of bespoke default options (e.g. defaultKeyType, defaultDnsProvider) in our fork of the module, because we kin d of needed them, but I never got around to upstreaming them. the more generic approach you suggested seems much better though, so I'm all in favor of that. 15:49:37
@andreas.schraegle:helsinki-systems.deAndreas Schrägle * nice. we have a bunch of bespoke default options (e.g. defaultKeyType, defaultDnsProvider) in our fork of the module, because we kind of needed them, but I never got around to upstreaming them. the more generic approach you suggested seems much better though, so I'm all in favor of that. 15:49:44
@m1cr0man:m1cr0man.comm1cr0manGlad to hear it! :D The more people the design helps the better.15:56:22
@m1cr0man:m1cr0man.comm1cr0man
webserver # Nov 28 22:15:41 webserver systemd[1]: Condition check resulted in Generate self-signed certificate authority being skipped.
webserver # Nov 28 22:15:41 webserver systemd[1]: acme-selfsigned-ca.service: Start request repeated too quickly.
webserver # Nov 28 22:15:41 webserver systemd[1]: acme-selfsigned-ca.service: Failed with result 'start-limit-hit'.

Lol, look what I just reproduced ;)

22:18:35
@m1cr0man:m1cr0man.comm1cr0manin the test suite no less22:18:42
@m1cr0man:m1cr0man.comm1cr0manAdded StartLimitIntervalSec=0 with all ConditionPathExists and sure enough it's fine now. It only happens on some runs, which is baffling, but oh well life's too short to debug systemd ;)22:47:26
@m1cr0man:m1cr0man.comm1cr0manhttps://github.com/NixOS/nixpkgs/pull/147784 started a draft PR for the work so far, just so ticket creators know what's up23:17:03
@m1cr0man:m1cr0man.comm1cr0man also yous can check out security.acme.defaults ;) 23:17:12
3 Dec 2021
@pgronkievitz:matrix.orgPatryk Gronkiewicz joined the room.13:01:15
@pgronkievitz:matrix.orgPatryk GronkiewiczHi there, I'm trying to set up Nginx reverse proxy with DNS-01 challenge, but I can't Can you help me with that? I've described it better on reddit -> https://www.reddit.com/r/NixOS/comments/r7y5vy/nginx_reverse_proxy_with_dns01_challenge/13:54:30
@hexa:lossy.networkhexa instead of enableACME = true; use useACMEHost 14:32:44
@hexa:lossy.networkhexa * instead of enableACME = true; use useACMEHost = "gitea.domain.org"; 14:33:27
@hexa:lossy.networkhexa * Patryk Gronkiewicz: instead of enableACME = true; use useACMEHost = "gitea.domain.org"; 14:33:36
@pgronkievitz:matrix.orgPatryk Gronkiewicz
In reply to @hexa:lossy.network
Patryk Gronkiewicz: instead of enableACME = true; use useACMEHost = "gitea.domain.org";
I can't finish rebuild then - nginx crashes and something else just hangs (I don't know what, but I can wait indefinitely and nothing changes)
15:01:56
@hexa:lossy.networkhexawell, can't help you when you can't apply the config 😲15:13:56
4 Dec 2021
@m1cr0man:m1cr0man.comm1cr0man
In reply to @pgronkievitz:matrix.org
I can't finish rebuild then - nginx crashes and something else just hangs (I don't know what, but I can wait indefinitely and nothing changes)
Check that you have assigned the security.acme.certs."gitea.domain.org".group to nginx or added nginx to the acme group
16:36:30
@m1cr0man:m1cr0man.comm1cr0manhttps://github.com/NixOS/nixpkgs/pull/147784 ready for review for real now :) 19:06:13

Show newer messages


Back to Room ListRoom Version: 6