!MthpOIxqJhTgrMNxDS:nixos.org

NixOS ACME / LetsEncrypt

86 Members
Another day, another cert renewal39 Servers

Load older messages


SenderMessageTime
3 Jun 2024
@k900:0upti.meK900Or we might break them AGAIN08:16:17
@arianvp:matrix.orgArianyeh. Cat is out of the bag 08:16:52
@arianvp:matrix.orgArianso I guess stateVersion also doesnt work.. as this release is already out08:17:02
@arianvp:matrix.orgArianI like the ExecStartPre idea08:17:34
@arianvp:matrix.orgArian K900: you wanna prepare a patch with that? 08:18:02
@k900:0upti.meK900No08:18:21
@arianvp:matrix.orgArianokay then i'll give it a shot later08:18:27
@arianvp:matrix.orgArianthanks for the idea though! :) 08:18:30
@k900:0upti.meK900I've got pretty bad brain fog from the cold still, I don't trust myself to not fuck this up08:18:44
@arianvp:matrix.orgArianYeh load-bearing bash is fun :D08:19:11
@stephank:stephank.nlStéphan joined the room.08:44:56
@stephank:stephank.nlStéphanBy no means a good attempt, but I hacked away on this: https://github.com/NixOS/nixpkgs/compare/master...stephank:nixpkgs:fix-acme?w=108:48:56
@stephank:stephank.nlStéphanI just have no idea how to test it08:49:04
@stephank:stephank.nlStéphanI reused the fixperms service, because I was worried about bind mounts. I'm not sure if bind mounts are preserved from ExecStartPre to ExecStart, or if they are recreated correctly when the underlying directory changed.08:50:13
@stephank:stephank.nlStéphan Now that I think about it, maybe a simple -e or -d check won't work because the $newHash directory will always be created via BindPaths? 08:51:01
@stephank:stephank.nlStéphanLooks like it's always created: https://www.freedesktop.org/software/systemd/man/latest/systemd.exec.html#BindPaths=08:51:59
@stephank:stephank.nlStéphanOh wait, the fixperms / migration service doesn't use BindPaths. So what I cooked up there may work.08:55:41
@arianvp:matrix.orgArianWe have quite an extensive NixOS test which we could change. But doing NixOS tests for "transitions" is always a bit tricky 09:22:26
@arianvp:matrix.orgArian Stéphan: dont this based on stateVersion wont work 09:24:03
@arianvp:matrix.orgArian * Stéphan: doing this based on stateVersion wont work I think 09:24:23
@arianvp:matrix.orgArianah no nvm forget what I said09:26:04
@arianvp:matrix.orgArianHmm how do we handle people who rollback boot into a 23.11 configuration ? :/ 09:29:01
@arianvp:matrix.orgArianmaybe we should symlink or copy the directory instead of moving? idk. Maybe it's not worth it supporting rollbacks. Just thinking out loud of another failure mode here09:29:39
@stephank:stephank.nlStéphanI like that idea, but no idea if a symlink works09:31:44
@arianvp:matrix.orgArian

urgh I feel bad that this shipped. The whole reason we created the ACME Team was to catch these kind of things :(

I’m kind of confused why automation didnt tag us for review. Given we’re set up as meta.maintainers for that module. maybe that automation doesn’t exist for NixOS? only for nixpkgs?

09:34:37
@stephank:stephank.nlStéphan I think BindPaths should follow a symlink, because I found this, which says not following a symlink is something you otherwise need to specify explicitely: https://github.com/systemd/systemd/issues/32366 09:35:27
@stephank:stephank.nlStéphan
In reply to @arianvp:matrix.org

urgh I feel bad that this shipped. The whole reason we created the ACME Team was to catch these kind of things :(

I’m kind of confused why automation didnt tag us for review. Given we’re set up as meta.maintainers for that module. maybe that automation doesn’t exist for NixOS? only for nixpkgs?

See: https://github.com/NixOS/nixpkgs/pull/270221#issuecomment-2144652323
09:36:12
@arianvp:matrix.orgArianah awesome09:36:19
@arianvp:matrix.orgArianOh well no hard feelings. we’re all human. just makes my blood pressure go up to know I’m breaking people’s TLS setup :’) 09:37:15
@arianvp:matrix.orgArianAdded a WIP PR to add the team to code-owners: https://github.com/NixOS/nixpkgs/pull/316854 09:45:09

Show newer messages


Back to Room ListRoom Version: 6