!MthpOIxqJhTgrMNxDS:nixos.org

NixOS ACME / LetsEncrypt

117 Members
Another day, another cert renewal51 Servers

Load older messages


SenderMessageTime
4 Jul 2025
@ctheune:matrix.flyingcircus.ioTheuni *
  1. the assurance: the files referenced in your config file are now available and are (syntactically) valid ssl certificates. Go forth and start!
06:39:57
@ctheune:matrix.flyingcircus.ioTheuniThat inversion makes the dependencies muddied again. I could split it up in more units, moving the post-processing code in a separate unit, or just use a shared (execstartpost) script (or partial). 06:42:16
@ctheune:matrix.flyingcircus.ioTheuniHmm. Consolidating multiple certificates renewing at the same time isn't much of an issue I guess as we distribute the renewal timers over time anyway.06:43:05
@ctheune:matrix.flyingcircus.ioTheuni* Hmm. Consolidating client reload signals for multiple certificates renewing at the same time isn't much of an issue I guess as we distribute the renewal timers over time anyway.06:43:18
@ctheune:matrix.flyingcircus.ioTheuniSo. I guess two units would suffice: 1st unit (acme-${cert}) is what clients depend via want/after on, which guarantees a syntactically valid certificate is there - which updates the certificate parameters when the config changes. Interestingly, the last part isn't really needed for the assurance itself. 2nd unit to issue ACME renewals. 06:46:40
@ctheune:matrix.flyingcircus.ioTheuniI wonder whether the "update the parameters" (which requires an active unit to trigger selectively) could/should move elsewhere. It can't be merged with the 2nd unit because that conflicts with the timer requirement.06:47:22
@ctheune:matrix.flyingcircus.ioTheuni The renewal itself does depend on the order being current/successful, though as hexa noted. 06:48:05
@ctheune:matrix.flyingcircus.ioTheuniScreenshot 2025-07-04 at 10.12.07.png
Download Screenshot 2025-07-04 at 10.12.07.png
08:12:46
@ctheune:matrix.flyingcircus.ioTheuniAlright. Some discussion with leona and max lead to this ^^08:12:49
@ctheune:matrix.flyingcircus.ioTheuniI'll put that into code and see how that works.08:13:00
@ctheune:matrix.flyingcircus.ioTheunisomething that doesn't fit in there is that preliminary self signed certificates can be turned off currently. 08:22:52
@ctheune:matrix.flyingcircus.ioTheunithis setup would always introduce (temporary) self-signed certificates. (currently if you turn off preliminary self signed certificates and lets encrypt doesn't work for some reason, we don't start the consumer service at all because the configs will be invalid)08:23:50
@ctheune:matrix.flyingcircus.ioTheunii would consider it an acceptable shift in detail wrt to reduced overall complexity. 08:24:40
@ctheune:matrix.flyingcircus.ioTheuni* i would consider it an acceptable tradeoff with the benefit of reduced complexity.08:25:11
@ctheune:matrix.flyingcircus.ioTheuniotoh if someone runs dns-01 everywhere and doesn't ever need to show self signed certificates and wants to reduce the risk of exposing users to those ... 08:26:12
@ctheune:matrix.flyingcircus.ioTheunihmpf.08:26:15
@ctheune:matrix.flyingcircus.ioTheunihowever, if you have a more complex service that acts as a "nexus" then maybe only one of multiple vhosts uses dns-01, others might be using http-01 or tls-01 and need the self-signed certificates anyway and then you get unpredictable behaviour.08:29:06
@ctheune:matrix.flyingcircus.ioTheuniin that sense, the tradeoff seems even more beneficial: reduced complexity and more predictable behaviour.08:29:26
@ctheune:matrix.flyingcircus.ioTheuniwe originally added it as an option when creating self-signed certificates wasn't supported yet, so ... i guess it was created as an option ... because we can?08:30:28
@ctheune:matrix.flyingcircus.ioTheunii'll turn into coding mode now and see how this works out.08:30:38
@leona:leona.isleona joined the room.08:31:15
@ctheune:matrix.flyingcircus.ioTheuni👋08:31:20
@ma27:nicht-so.sexyma27 joined the room.08:31:24
@emilazy:matrix.orgemilyI say this every time our ACME module fails to scale for someone, but ACME issuance really wants to be a proper service rather than scripted out of systemd bits and you might want to consider trying something like Caddy for an issuance daemon :)09:42:56
@emilazy:matrix.orgemily(not that I don't welcome improvements especially if they simplify the code)09:43:10
@ctheune:matrix.flyingcircus.ioTheuniyeah, our stack is already interesting, so i'd rather not use caddy (and we have non-http requirements anyway) and the overall integration is quite nice - it's a lot more advanced than what others have, so ... yeah. I was considering replacing the scripted stuff but it's not obvious to be better as a replacement when trying to start from the ground up ... 🙂10:00:53
@ctheune:matrix.flyingcircus.ioTheunii started this week with the assumption of "lets make it a proper service" but then the dependency management around it for consumers is quite complex anyway and this means doing stuff in "systemd land" isn't going away either ... 10:01:33
@ctheune:matrix.flyingcircus.ioTheuniso, at the moment: this makes me understand the code base much better and maybe we can turn it into a proper service at another point in time. lego as the client is quite valuable, so traefik would be an option, but then it gets in the way with other http stuff or needs more layering)10:02:35
@emilazy:matrix.orgemilyto be clear, you can use Caddy as an "issue TLS certs to files" daemon, for HTTP-01, TLS-ALPN-01, and DNS-0110:21:59
@emilazy:matrix.orgemily without any HTTP server component (beyond serving .well-known/acme-challenge if you use HTTP-01) 10:22:10

Show newer messages


Back to Room ListRoom Version: 6