| 31 Oct 2023 |
K900 | The "unit "acme-finished-http.example.test.target" is inactive and there are no pending jobs" flake is back | 07:59:43 |
| 15 Nov 2023 |
| @grahamc:nixos.orgchanged room power levels. | 16:15:02 |
| @grahamc:nixos.org left the room. | 16:15:02 |
| NixOS Moderation Botchanged room power levels. | 18:12:01 |
| 19 Nov 2023 |
| @pederbs:pvv.ntnu.no changed their display name from pbsds to pbsds (federation borken, may not see reply). | 03:35:17 |
| ZXGU joined the room. | 11:02:31 |
| @pederbs:pvv.ntnu.no changed their display name from pbsds (federation borken, may not see reply) to pbsds. | 20:38:37 |
| 20 Nov 2023 |
| chayleaf joined the room. | 18:15:07 |
| 28 Nov 2023 |
chayleaf | what do people here think of adding certspotter integration? I'm currently using the following certspotter config, and I thought it would be nice if something like this got added to something like security.acme.certspotter.enable = true | 01:19:45 |
chayleaf | * what do people here think of adding certspotter integration? I'm currently using the following certspotter config, and I thought it would be nice if something like security.acme.certspotter.enable = true got added | 01:20:11 |
hexa |
Certificate Transparency Log Monitor
| 14:16:18 |
hexa | I don't think we need to tie it into security.acme | 14:16:52 |
hexa | * I don't think we should add it into security.acme | 14:17:30 |
hexa | it can live in services.certspotter and you can still common names and san from security.acme | 14:19:00 |