summary refs log tree commit diff stats
Commit message (Collapse)AuthorAge
* Revert: "Fix(system/services/nix-sync): Remove the last access to the file ↵ nix-syncSoispha2023-08-04
| | | | | | | system" This reverts commit 89695f07d3a82fa7651b3c599b2b9327ecb6d097 because it did not do anything, besides cause `nix` to spit some warnings.
* Fix(system/services/nix-sync): Remove the last access to the file systemSoispha2023-08-04
|
* Feat(system/services/nginx/hosts): Add another hostSoispha2023-08-04
|
* chore(version): v0.7.0 v0.7.0sils2023-08-04
|
* Fix(system/users): declare nixremote as normal usersils2023-08-04
|
* Feat(system/users): Add nixremotesils2023-08-04
| | | | This user is intended to be used for remote-builds
* Build(flake): UpdateSoispha2023-08-02
|
* Fix(system/services/nix-sync): Remove timeout on buildSoispha2023-08-02
| | | | | | | The unit had the potential to fail, if the build took longer than the default timeout. This is obviously not ideal, so the timeout was removed, as all nix builds should be safe enough not to devour resources.
* Fix(system/services/nix-sync): Rebase on pulls, to allow for force pushesSoispha2023-08-02
| | | | | | | | As the nix-sync service should _never_ commit new stuff, this rebase should always be a fast-forward, i.e. it works without manual intervention. Without the rebase as argument, this services would break, when the history gets rewritten, for example on a amended commit.
* Fix(system/services/nix-sync): Make the timer relative to the unit startSoispha2023-08-02
| | | | | | | The timer before hand started `repo.interval` after it self was started, i.e., it was a oneshot timer. This change now fixes this by make the point the timer activates relative to the time elapsed, since the associated unit was last started.
* Feat(system/services/nginx/hosts): Add another domainSoispha2023-07-31
|
* chore(version): v0.6.0 v0.6.0Soispha2023-07-28
|
* Fix(treewide): Use correct function argument specificationSoispha2023-07-28
|
* Feat(system/services/mail/users): Add mailusersSoispha2023-07-28
|
* Refactor(system/services/nginx): Reduce encrypted stuff to a minimumSoispha2023-07-28
|
* chore(version): v0.5.1 v0.5.1sils2023-07-28
|
* Fix(system/services/mail): Update mail userssils2023-07-28
|
* chore(version): v0.5.0 v0.5.0Soispha2023-07-27
|
* Fix(system/services/matrix/bridges/m-wa): Use own databaseSoispha2023-07-27
|
* Fix(system/services/matrix/bridges/m-wa): Correct postgresql uriSoispha2023-07-27
|
* Fix(system/impermanence): Keycloak was actually postgresqlSoispha2023-07-27
|
* Feat(system/services/matrix/bridges): Add mautrix-whatsapp bridgeSoispha2023-07-27
|
* Fix(system/mail): Add Usersils2023-07-26
|
* chore(version): v0.4.1 v0.4.1sils2023-07-25
|
* Build(flake): Updatesils2023-07-25
|
* Merge branch 'new_mailuser'sils2023-07-25
|\
| * Fix(system/services/mail): Add new usersils2023-07-25
|/
* chore(version): v0.4.0 v0.4.0sils2023-07-22
|
* Fix(system/services/matrix): Change registration_shared_secret_path tosils2023-07-22
| | | | age secret
* Feat(system/secrets): Add matrix-synapse_registration_shared_secretsils2023-07-22
|
* Fix(system/services/matrix): Add registration_shared_secret to registersils2023-07-22
| | | | users
* Fix(system/services/matrix): Move persisting files ctrl to impermanenceSoispha2023-07-22
|
* Fix(system/services/matrix): Fix extra " =" in locations pathSoispha2023-07-22
|
* Feat(system): Add matrix-synapsesils2023-07-20
|\
| * Feat(system/services): Add matrix synapsesils2023-06-19
| |
* | Chore(system/secrets): Rekey to support new public keySoispha2023-07-19
| |
* | Merge: Branch 'streamline'Soispha2023-07-19
|\ \
| * | Style(treewide): Format after removing vim linesSoispha2023-07-19
| | |
| * | Feat(.editorconfig): Add the configuration for all filesSoispha2023-07-19
| | | | | | | | | | | | | | | This sets some formatting option based on the file. In comparison to the vim lines, this should be supported by more editors.
* | | Merge: Branch 'update'Soispha2023-07-19
|\ \ \ | |/ / |/| |
| * | Build(flake): UpdateSoispha2023-07-03
| | |
* | | Chore(system/secrets): Add sils' public keysils2023-07-19
| | |
* | | chore(version): v0.3.0 v0.3.0Soispha2023-07-10
| | |
* | | Fix(system/secrets): Update after redeploySoispha2023-07-08
| | |
* | | Fix(system/secrets): Ensure that ssh host key is available in stage 2Soispha2023-07-08
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The `/var/lib/sshd` directory is only mounted _after_ the stage 2 init, thus also after the system activation. Agenix, which runs in the system activation needs the hostkey however to decrypt the secrets needed for some units (as of right now only keycloak). Alas the only way I see to achieve that is to store the ssh hostkey directly on /srv, which is mounted before (it's marked as 'neededForBoot' after all) the stage 2 init. It should be possible to achieve this with impermanence however, as `/var/log` is mounted in the stage 1 init; The problem is that I have no idea _why_ only this is the only directory mounted and nothing else.
* | | Fix(system/services/keycloak): Use agenix to store passwdSoispha2023-07-08
| | |
* | | Feat(flake): Add agenix moduleSoispha2023-07-08
| | |
* | | Fix(system/services/nix-sync): Nix build needs access to /proc/statSoispha2023-07-08
| | |
* | | Fix(system/impermanence/m/mail): Add rspamd dirSoispha2023-07-08
| | |
* | | Fix(system/impermanence/m/users): Make /home readableSoispha2023-07-08
| | |