summary refs log tree commit diff stats
path: root/system/services (follow)
Commit message (Collapse)AuthorAge
...
* fix(system/services/invidious-router): change allowed_status_codes type to intsils2024-02-21
|
* fix(system/services/invidious-router): bind to 127.0.0.1sils2024-02-21
|
* fix(system/services/invidious-router): correct typosils2024-02-21
|
* feat(system/services/invidious-router): add extraDomainssils2024-02-19
|
* feat(system/services/invidious-router): add configurationsils2024-02-19
|
* fix: update mastodonsils2024-02-15
| | | | | This uses the mastodon package from nixos-unstable-small because backporting of a security release failed and we can't afford to wait.
* feat: remove keycloaksils2024-02-11
|
* fix(system/services/invidious-router): fix typo in domainsils2024-02-10
|
* feat: add invidious-routersils2024-02-10
|
* fix(system/services/restic): create /srv/snapshots if non-existentsils2024-01-19
|
* fix(sys/services/restic): Set the system start time to 'daily'Soispha2024-01-14
| | | | | | Considering that the db dump takes longer than an hour, an hourly service start time could lead to multiple dumps happening concurrently. This should reduce this risk
* fix(sys/services/restic): Include a db dump of PostgreSQLSoispha2024-01-14
| | | | | | | | | | | | | | | Including this dump should remove the risk of a backup with a corrupt PostgreSQL database. Initial test showed that the backup takes around 32 GB and runs in under 3 hours. There is one big oversight not yet included in this commit: All services running a SQLite database are not included in this dump and thus can not be safely recovered. At present these are: - etebase-server (db.sqlite3) - murmur (murmur.sqlite) (This is list was generated with `sudo fd sqlite /srv/`)
* fix(system/services): import restic configsils2024-01-07
|
* feat(system): add resticsils2024-01-07
|
* feat(system/services/mastodon): define streamingProcessessils2024-01-06
|
* feat(system/services/fail2ban): define config in daemonSettingssils2024-01-06
| | | | This isn't strictly necessary as we define the default config
* feat(system/services/matrix): use mautrix-whatsapp module provided bysils2024-01-06
| | | | nixpkgs
* chore(merge): branch 'redirect'sils2023-12-12
|\
| * fix(system/services/nginx/redirects): Enable ssl for the domainsSoispha2023-11-03
| | | | | | | | | | | | Although the page does not actually serve any content, many browsers will still refuse to access it at all, if they have the 'https-only' mode activated.
* | refactor(system/services/etebase): explain outcommented static filessils2023-11-30
| |
* | fix(system/services/etebase): don't serve static filessils2023-11-27
| | | | | | | | This doesn't work as nginx doesn't have the right permissions.
* | fix(system/services/etebase): serve static_rootsils2023-11-27
| |
* | fix(system/services/etebase): micellanous changes to make it worksils2023-11-27
| |
* | Merge branch 'main' into etebase_newsils2023-11-27
|\ \
| * | fix(system/services/nix): add nixremote to trusted-userssils2023-11-20
| | |
* | | refactor(system/services/etebase): Use a reference to the port numberSoispha2023-11-18
| | |
* | | fix(system/services/etebase): Use the correct subdomainsSoispha2023-11-18
| | | | | | | | | | | | This is done to comply with the naming scheme employed at `vhack.eu`.
* | | fix(system/services/etebase): Hard-code localhost ipSoispha2023-11-18
| | | | | | | | | | | | | | | Otherwise, etebase might use the ipv6 ip, whilst nginx uses the ipv4 version. This prevents this issue
* | | Fix(system/services/etebase): Add proxy parameterssils2023-11-18
| | |
* | | Fix(system/services/etebase): Proxy ipv4sils2023-11-18
| | |
* | | Refactor(system/services/etebase): Formatsils2023-11-18
| | |
* | | Fix(system/services/etebase-server): Use nginxsils2023-11-18
| | |
* | | Feat(system/services): Add etebase-serversils2023-11-18
|/ /
* | docs(system/services/taskserver): Add docs about expectations to runtimeSoispha2023-11-18
| |
* | fix(system/services/taskserver): Support both ipv4 and ipv6Soispha2023-11-18
| |
* | fix(system/services/taskserver/certs): Move cert generation to scriptSoispha2023-11-07
|/ | | | | | This fully removes the human-factor and allows it to just run `./generate` to generate all required certificates and keys (with the needed extra keys and certificates)
* feat(system/services/taskserver): Add a way to connect users togetherSoispha2023-10-17
|
* fix(system/services/taskserver): Disable debugSoispha2023-10-17
|
* fix(system/services/taskserver): Activate debugSoispha2023-10-16
|
* fix(system/services/taskserver): Use correct key name (`key.pem`)Soispha2023-10-16
|
* fix(system/services/taskserver): Switch to strings instead of pathsSoispha2023-10-16
|
* feat(system/services/taskserver): Integrate Let's Encrypt certificatesSoispha2023-10-16
| | | | | | | | | | | | The current setup now runs the `taskserver.vhack.eu` domain with a Let's Encrypt certificate and additionally uses a self-signed CA certificate to validate clients. The shell scripts used to generate the CA certificate and the derived client certificate (and keys) are taken nearly unmodified from the upstream repository [1]. [1]: https://github.com/GothenburgBitFactory/taskserver/tree/9794cff61e56bdfb193c6aa4cebb57970ac68aef/pki
* fix(system/services/taskserver): declare certs/keys in pki.manualsils2023-10-16
|
* feat(system/services/taskserver): change ca to letsencryptsils2023-10-16
|
* fix(system/services/taskserver): Hide organisationsSoispha2023-10-16
|
* refactor(system/services/redirects): Move under the nginx directorySoispha2023-10-14
|
* fix(system/services/redirects): disable sslsils2023-10-14
|
* Feat(system/services/redirects): Build up the base to comply with the AGPLSoispha2023-10-14
|
* Style(treewide): Merge attrs togetherSoispha2023-10-14
|
* fix(system/services/miniflux): Set correct subdomain, but leave aliasSoispha2023-10-13
|