Commit message (Collapse) | Author | Age | |
---|---|---|---|
* | fix(system/services/taskserver): Use correct key name (`key.pem`) | Soispha | 2023-10-16 |
| | |||
* | fix(system/services/taskserver): Switch to strings instead of paths | Soispha | 2023-10-16 |
| | |||
* | feat(system/services/taskserver): Integrate Let's Encrypt certificates | Soispha | 2023-10-16 |
| | | | | | | | | | | | | The current setup now runs the `taskserver.vhack.eu` domain with a Let's Encrypt certificate and additionally uses a self-signed CA certificate to validate clients. The shell scripts used to generate the CA certificate and the derived client certificate (and keys) are taken nearly unmodified from the upstream repository [1]. [1]: https://github.com/GothenburgBitFactory/taskserver/tree/9794cff61e56bdfb193c6aa4cebb57970ac68aef/pki | ||
* | fix(system/services/taskserver): declare certs/keys in pki.manual | sils | 2023-10-16 |
| | |||
* | feat(system/services/taskserver): change ca to letsencrypt | sils | 2023-10-16 |
| | |||
* | fix(system/services/taskserver): Hide organisations | Soispha | 2023-10-16 |
| | |||
* | refactor(system/services/redirects): Move under the nginx directory | Soispha | 2023-10-14 |
| | |||
* | fix(system/services/redirects): disable ssl | sils | 2023-10-14 |
| | |||
* | Feat(system/services/redirects): Build up the base to comply with the AGPL | Soispha | 2023-10-14 |
| | |||
* | Style(treewide): Merge attrs together | Soispha | 2023-10-14 |
| | |||
* | fix(system/services/miniflux): Set correct subdomain, but leave alias | Soispha | 2023-10-13 |
| | |||
* | fix(system/services/mastodon): Correctly avoid string casts | Soispha | 2023-10-13 |
| | |||
* | Revert "fix(system/services/mastodon): remove unneccessary stringcasts" | sils | 2023-10-13 |
| | | | | | | These stringcasts were mandatory. This reverts commit cfdd2e350ff5df55beef4fa5b7bc11e9ff5e23c1. | ||
* | fix(system/services/mastodon): remove unneccessary stringcasts | sils | 2023-10-13 |
| | |||
* | fix(system/services/mastodon): change string to list of string | sils | 2023-10-12 |
| | |||
* | fix(system/services/mastodon): add nginx to group 'mastodon' | sils | 2023-10-12 |
| | |||
* | fix(system/services/mastodon): allow registration only with vhack.eu/sils.li ↵ | sils | 2023-10-12 |
| | | | | |||
* | fix(system/services/mastodon): separate domains for user handles and ↵ | sils | 2023-10-12 |
| | | | | webinterface | ||
* | feat(system/services): actually import mastodon | sils | 2023-10-12 |
| | |||
* | fix(system/services/mastodon): correct age secret path | sils | 2023-10-12 |
| | |||
* | feat(treewide): add mastodon | sils | 2023-10-12 |
| | |||
* | feat(system/services/nix): add wheel group to trusted-users | sils | 2023-10-11 |
| | |||
* | fix(system/services/murmur): Allow murmur's user to read certs | Soispha | 2023-10-03 |
| | |||
* | feat(system/services/murmur): Initialize | Soispha | 2023-10-03 |
| | |||
* | fix(system/services/miniflux): Correctly specify secret path | Soispha | 2023-10-03 |
| | |||
* | feat(system/services/miniflux): Init | Soispha | 2023-10-03 |
| | |||
* | fix(system/services/taskserver): Use strict certificate validation | Soispha | 2023-10-02 |
| | |||
* | fix(system/services/taskserver): Specify domain to listen on | Soispha | 2023-10-01 |
| | |||
* | feat(system/services/taskserver): Init | Soispha | 2023-10-01 |
| | | | | | This is the server part used in combination with Taskwarrior to regain control over the unwieldy amount of task, that accumulate over the day. | ||
* | Fix(system/services/nginx): Update hosts | Soispha | 2023-08-18 |
| | |||
* | Fix(system/services/libreddit): Don't open firewall | Soispha | 2023-08-18 |
| | |||
* | Fix(system/services/libreddit): Actually proxy services via nginx | Soispha | 2023-08-18 |
| | |||
* | Feat(system/services/libreddit): Init | Soispha | 2023-08-18 |
| | |||
* | chore(version): v0.8.0 | Soispha | 2023-08-11 |
| | |||
* | Chore(Merge): Branch 'invidious' | Soispha | 2023-08-11 |
|\ | |||
| * | Fix(system/services/invidious): Add interpreter to start script | Soispha | 2023-08-11 |
| | | |||
| * | Fix(system/services/invidious): Force the new script option to be applied | Soispha | 2023-08-11 |
| | | |||
| * | Fix(system/service/invidious): Copy their script, to remove shell escape | Soispha | 2023-08-11 |
| | | | | | | | | | | | | | | The default ExecStart implementation in the module, escapes all stings. This does not work for us because we need to use the `$CREDENTIALS_DIR` environment variable, for the credentials deployed in den `LoadCredential` option | ||
| * | Fix(system/services/invidious): Set correct access permissions on hmac | Soispha | 2023-08-11 |
| | | |||
| * | Fix(system/services/invidious): Check tables on startup | Soispha | 2023-08-11 |
| | | |||
| * | Refactor(system/secrets/invidious): Remove unneeded files and improve names | Soispha | 2023-08-11 |
| | | |||
| * | Fix(system): Binary substitution for debugging | sils | 2023-08-11 |
| | | |||
| * | Fix(system/services/invidious): Specifiy database host | sils | 2023-08-11 |
| | | |||
| * | Feat(system): Add invidious | sils | 2023-08-11 |
| | | |||
* | | chore(version): v0.8.0 v0.8.0 | Soispha | 2023-08-11 |
|/ | |||
* | Feat(system/services/snapper): Add | Soispha | 2023-08-02 |
| | |||
* | Fix(system/services/nix-sync): Remove timeout on build | Soispha | 2023-08-02 |
| | | | | | | | The unit had the potential to fail, if the build took longer than the default timeout. This is obviously not ideal, so the timeout was removed, as all nix builds should be safe enough not to devour resources. | ||
* | Fix(system/services/nix-sync): Rebase on pulls, to allow for force pushes | Soispha | 2023-08-02 |
| | | | | | | | | As the nix-sync service should _never_ commit new stuff, this rebase should always be a fast-forward, i.e. it works without manual intervention. Without the rebase as argument, this services would break, when the history gets rewritten, for example on a amended commit. | ||
* | Fix(system/services/nix-sync): Make the timer relative to the unit start | Soispha | 2023-08-02 |
| | | | | | | | The timer before hand started `repo.interval` after it self was started, i.e., it was a oneshot timer. This change now fixes this by make the point the timer activates relative to the time elapsed, since the associated unit was last started. | ||
* | Feat(system/services/nginx/hosts): Add another domain | Soispha | 2023-07-31 |
| |