Commit message (Collapse) | Author | ||
---|---|---|---|
2023-08-11 | Fix(system/services/invidious): Specifiy database host | sils | |
2023-08-11 | Feat(system): Add invidious | sils | |
2023-08-11 | Refactor(system/secrets/secrets.nix): Remove redundant secretlist | sils | |
2023-08-04 | chore(version): v0.7.0 v0.7.0 | sils | |
2023-08-04 | Fix(system/users): declare nixremote as normal user | sils | |
2023-08-04 | Feat(system/users): Add nixremote | sils | |
This user is intended to be used for remote-builds | |||
2023-08-02 | Feat(system/services/snapper): Add | Soispha | |
2023-08-02 | Build(flake): Update | Soispha | |
2023-08-02 | Fix(system/services/nix-sync): Remove timeout on build | Soispha | |
The unit had the potential to fail, if the build took longer than the default timeout. This is obviously not ideal, so the timeout was removed, as all nix builds should be safe enough not to devour resources. | |||
2023-08-02 | Fix(system/services/nix-sync): Rebase on pulls, to allow for force pushes | Soispha | |
As the nix-sync service should _never_ commit new stuff, this rebase should always be a fast-forward, i.e. it works without manual intervention. Without the rebase as argument, this services would break, when the history gets rewritten, for example on a amended commit. | |||
2023-08-02 | Fix(system/services/nix-sync): Make the timer relative to the unit start | Soispha | |
The timer before hand started `repo.interval` after it self was started, i.e., it was a oneshot timer. This change now fixes this by make the point the timer activates relative to the time elapsed, since the associated unit was last started. | |||
2023-07-31 | Feat(system/services/nginx/hosts): Add another domain | Soispha | |
2023-07-28 | chore(version): v0.6.0 v0.6.0 | Soispha | |
2023-07-28 | Fix(treewide): Use correct function argument specification | Soispha | |
2023-07-28 | Feat(system/services/mail/users): Add mailusers | Soispha | |
2023-07-28 | Refactor(system/services/nginx): Reduce encrypted stuff to a minimum | Soispha | |
2023-07-28 | chore(version): v0.5.1 v0.5.1 | sils | |
2023-07-28 | Fix(system/services/mail): Update mail users | sils | |
2023-07-27 | chore(version): v0.5.0 v0.5.0 | Soispha | |
2023-07-27 | Fix(system/services/matrix/bridges/m-wa): Use own database | Soispha | |
2023-07-27 | Fix(system/services/matrix/bridges/m-wa): Correct postgresql uri | Soispha | |
2023-07-27 | Fix(system/impermanence): Keycloak was actually postgresql | Soispha | |
2023-07-27 | Feat(system/services/matrix/bridges): Add mautrix-whatsapp bridge | Soispha | |
2023-07-26 | Fix(system/mail): Add User | sils | |
2023-07-25 | chore(version): v0.4.1 v0.4.1 | sils | |
2023-07-25 | Build(flake): Update | sils | |
2023-07-25 | Fix(system/services/mail): Add new user | sils | |
2023-07-22 | chore(version): v0.4.0 v0.4.0 | sils | |
2023-07-22 | Fix(system/services/matrix): Change registration_shared_secret_path to | sils | |
age secret | |||
2023-07-22 | Feat(system/secrets): Add matrix-synapse_registration_shared_secret | sils | |
2023-07-22 | Fix(system/services/matrix): Add registration_shared_secret to register | sils | |
users | |||
2023-07-22 | Fix(system/services/matrix): Move persisting files ctrl to impermanence | Soispha | |
2023-07-22 | Fix(system/services/matrix): Fix extra " =" in locations path | Soispha | |
2023-07-19 | Chore(system/secrets): Rekey to support new public key | Soispha | |
2023-07-19 | Style(treewide): Format after removing vim lines | Soispha | |
2023-07-19 | Feat(.editorconfig): Add the configuration for all files | Soispha | |
This sets some formatting option based on the file. In comparison to the vim lines, this should be supported by more editors. | |||
2023-07-19 | Chore(system/secrets): Add sils' public key | sils | |
2023-07-10 | chore(version): v0.3.0 v0.3.0 | Soispha | |
2023-07-08 | Fix(system/secrets): Update after redeploy | Soispha | |
2023-07-08 | Fix(system/secrets): Ensure that ssh host key is available in stage 2 | Soispha | |
The `/var/lib/sshd` directory is only mounted _after_ the stage 2 init, thus also after the system activation. Agenix, which runs in the system activation needs the hostkey however to decrypt the secrets needed for some units (as of right now only keycloak). Alas the only way I see to achieve that is to store the ssh hostkey directly on /srv, which is mounted before (it's marked as 'neededForBoot' after all) the stage 2 init. It should be possible to achieve this with impermanence however, as `/var/log` is mounted in the stage 1 init; The problem is that I have no idea _why_ only this is the only directory mounted and nothing else. | |||
2023-07-08 | Fix(system/services/keycloak): Use agenix to store passwd | Soispha | |
2023-07-08 | Feat(flake): Add agenix module | Soispha | |
2023-07-08 | Fix(system/services/nix-sync): Nix build needs access to /proc/stat | Soispha | |
2023-07-08 | Fix(system/impermanence/m/mail): Add rspamd dir | Soispha | |
2023-07-08 | Fix(system/impermanence/m/ |