!MthpOIxqJhTgrMNxDS:nixos.org

NixOS ACME / LetsEncrypt

105 Members
Another day, another cert renewal46 Servers

Load older messages


SenderMessageTime
24 Nov 2021
@m1cr0man:m1cr0man.comm1cr0man oh look echo 1>&2 "certificate domain(s) have changed; will renew now" 22:22:04
@m1cr0man:m1cr0man.comm1cr0manhttps://github.com/m1cr0man/nixpkgs/commit/34b5c5c1a408d105beb9b92b9ed5b1565135e75e "Allow for key reuse when domains are the only thing that changed!" Aha.22:23:01
@hexa:lossy.networkhexa ah, we lost extraDomains /o\ 22:23:34
@m1cr0man:m1cr0man.comm1cr0manok so the question is, can I delete the cert files and not the key and will lego do a renew22:23:47
@hexa:lossy.networkhexaI can give that a try22:24:22
@hexa:lossy.networkhexathe certificate is likely the only place that has the info about the old san22:24:50
@hexa:lossy.networkhexado you need me to test something or can I just go ahead and purge this mess?22:38:14
@hexa:lossy.networkhexa m1cr0man: ^ 22:44:13
@m1cr0man:m1cr0man.comm1cr0mansorry - go ahead and purge22:53:27
25 Nov 2021
@m1cr0man:m1cr0man.comm1cr0manI think I simply overlooked testing removing a domain from existing domains. I'm going to add this to the test suite and then work on fixing it plus working on another ticket I saw (allowing setting more cert options at the sercurity.acme level)00:14:59
@m1cr0man:m1cr0man.comm1cr0manit's an easy enough thing to fix - but it's hard to fix without triggering mass renewals which is always a concern with ACME stuff00:15:29
@m1cr0man:m1cr0man.comm1cr0manhttps://github.com/NixOS/nixpkgs/issues/108237 also this one is interesting. The easy solution here is to add a message explaining that "If you are reading this after a nixos-rebuild - don't panic! This is just a certificate renewal failure and self-signed certs will be in place" (or something along those lines), but that would have to appear for all failures not just on rebuild. If anyone has suggestions feel free to shout them out. I'm off for now but will be working towards a PR by the weekend00:20:59
26 Nov 2021
@m1cr0man:m1cr0man.comm1cr0manIf I'm doing some work to fix multiple issues, should I make a PR for each issue or do what I normally do and make one PR for all of them? I always make separate commits for each fix regardless.21:50:07
@hexa:lossy.networkhexathe latter should be fine given they're separate commits22:01:35
@hexa:lossy.networkhexasaves rebase headaches between pr's possibly22:01:45
@m1cr0man:m1cr0man.comm1cr0manyeah, cool.22:06:27
@m1cr0man:m1cr0man.comm1cr0manI also just found that It would be silly (and require a rebase) to fix one of these issues and not the other in one commit :P22:06:45
@m1cr0man:m1cr0man.comm1cr0manBtw turns out separating domain hash from the certsDir hash was a great idea - because now i can safely remove domainhash entirely and fix your issue. Btw, can you open a ticket for that, just so that we can track the change reasoning against it?22:07:27
@hexa:lossy.networkhexahttps://github.com/NixOS/nixpkgs/issues/14754022:12:30
@hexa:lossy.networkhexahere we go22:12:31
@m1cr0man:m1cr0man.comm1cr0manty#22:12:39
@m1cr0man:m1cr0man.comm1cr0man * ty22:12:40
@m1cr0man:m1cr0man.comm1cr0man

ugh no you know what, I'm at a crossroads here with domainhash:

  • If I remove it, since extraDomains + domain aren't in the certDir hash, I would have to add them otherwise a change in domains wouldn't change the certs on disk
  • If I add the domains to certDir I'll regenerate everyone's certificates, so I would have to use domainhash.txt to check if I should do a "lego run" instead.

In the past changing hashData has been met with some backlash, so I think I am stuck with option 2

22:18:20
@m1cr0man:m1cr0man.comm1cr0manIs this our problem actually? Maybe we should open a bug report upstream to lego22:24:23
@m1cr0man:m1cr0man.comm1cr0manhttps://github.com/go-acme/lego/issues/1532 lol22:26:56
@m1cr0man:m1cr0man.comm1cr0man3 days ago22:26:58
@m1cr0man:m1cr0man.comm1cr0manthat's some oddly close timing 😅22:27:04
@m1cr0man:m1cr0man.comm1cr0manOk fantastic, if upstream fixes that issue as I described in the comment, we can safely remove domainHash entirely :) 22:32:07
@hexa:lossy.networkhexafun fact: I ported some portions of our acme logic to an ansible role we use at work with ubuntu22:49:50
@hexa:lossy.networkhexathe hash part is crucial there as well22:49:56

Show newer messages


Back to Room ListRoom Version: 6