!MthpOIxqJhTgrMNxDS:nixos.org

NixOS ACME / LetsEncrypt

103 Members
Another day, another cert renewal42 Servers

You have reached the beginning of time (for this room).


SenderMessageTime
31 Oct 2023
@k900:0upti.meK900The "unit "acme-finished-http.example.test.target" is inactive and there are no pending jobs" flake is back07:59:43
15 Nov 2023
@grahamc:nixos.org@grahamc:nixos.orgchanged room power levels.16:15:02
@grahamc:nixos.org@grahamc:nixos.org left the room.16:15:02
@mjolnir:nixos.orgNixOS Moderation Botchanged room power levels.18:12:01
19 Nov 2023
@pederbs:pvv.ntnu.no@pederbs:pvv.ntnu.no changed their display name from pbsds to pbsds (federation borken, may not see reply).03:35:17
@zxgu:matrix.orgZXGU joined the room.11:02:31
@pederbs:pvv.ntnu.no@pederbs:pvv.ntnu.no changed their display name from pbsds (federation borken, may not see reply) to pbsds.20:38:37
20 Nov 2023
@chayleaf:matrix.pavluk.orgchayleaf joined the room.18:15:07
28 Nov 2023
@chayleaf:matrix.pavluk.orgchayleaf what do people here think of adding certspotter integration? I'm currently using the following certspotter config, and I thought it would be nice if something like this got added to something like security.acme.certspotter.enable = true 01:19:45
@chayleaf:matrix.pavluk.orgchayleaf * what do people here think of adding certspotter integration? I'm currently using the following certspotter config, and I thought it would be nice if something like security.acme.certspotter.enable = true got added 01:20:11
@hexa:lossy.networkhexa

Certificate Transparency Log Monitor

14:16:18
@hexa:lossy.networkhexa I don't think we need to tie it into security.acme 14:16:52
@hexa:lossy.networkhexa * I don't think we should add it into security.acme 14:17:30
@hexa:lossy.networkhexa it can live in services.certspotter and you can still common names and san from security.acme 14:19:00

Show newer messages


Back to Room ListRoom Version: 6