Commit graph

38 commits

Author SHA1 Message Date
c0a1443ba9 feat(vm): configure initial password for users to allow login 2024-08-13 08:47:02 +02:00
e64cf18222 feat(backup): first borgbackup module test
https://xeiaso.net/blog/borg-backup-2021-01-09/
2024-08-12 16:58:39 +02:00
1c362fbf82 feat(openssh): enable openssh server 2024-08-12 14:42:14 +02:00
dabd4298a6 fix(sourcehut): actually environment.variables do not affect systemd services, trying another way 2024-08-12 14:17:05 +02:00
b895943359 fix(sourcehut): make python's requests use global ca-certificates store 2024-08-12 13:50:42 +02:00
406d1cc6ca chore(sourcehut): remove all traces of custom cacert package fuckery
I found out that you can set an env variable to make python's request
use the global cert store, this sidesteps the issue I have been having
with sourcehut.
2024-08-12 13:49:37 +02:00
57dacc328b fix(sourcehut): try using patched cacert using a module?
Let's see if this works
2024-08-12 13:07:43 +02:00
9ed7765667 chore: remove ssh configuration
Actually, I misread the tutorial, this configuration should be done on
the remote machine.
2024-08-11 17:35:33 +02:00
332a0cc4c8 fix(ssh config): actually use the correct options 2024-08-11 17:18:50 +02:00
6327f0cdc0 fix: remove nonexistent option 2024-08-11 17:17:28 +02:00
9cc3b74f34 wip(overlays): temporarily disable the cacert overlay
I don't want it to rebuild 1000 packages again
2024-08-11 17:17:00 +02:00
687f517370 fix(remote build): actually the config needs to be systemwide
This makes some amount of sense, since it would probably be the nix
daemon that is connecting to the remote build machine.
2024-08-11 17:15:23 +02:00
8d0a36614c feat(certs): override the cacert package to always trust my own CA 2024-08-11 14:07:27 +02:00
c79262d95c fix(sourcehut): try and make it use http for internal communication
None of my previous changes could have worked, because nginx
automatically redirects http to https. I think this is the setting I
need to change so that pure http works as well.
2024-08-11 12:24:38 +02:00
2dc710091d fix(sourcehut): Maybe the onboarding-redirect needs to be http? 2024-08-11 12:23:23 +02:00
a5d00e6339 fix(sourcehut): try setting the origin string for each server
Same as before, I'm trying to force sourcehut to use http for internal
communication instead of https, to bypass the problem that the python
package used by sourcehut does not inherit my own CA
2024-08-11 12:21:54 +02:00
fc7c524e0b fix(sourcehut): use http for origin
Maybe this will force sourcehut to use http instad of https, which will
allow me to sidestep the certificate problem?
2024-08-11 12:16:40 +02:00
933e10847f fix(sourcehut): update oauth-client-id
This time I'm trying to sidestep the ssl certificate issue by accessing
internal services using http.

Using this as a redirect URL:
http://git.sourcehut.nixos.local/oauth/callback
2024-08-11 12:06:53 +02:00
ab3017c4e0 fix(sourcehut): do not set default virtualHost 2024-08-11 11:21:48 +02:00
b973ea33bc fix(sourcehut): wrong port for ipv6 listen 2024-08-11 11:12:43 +02:00
6efc6e012f fix(sourcehut): gitsrht & mansrht: listen on ipv6 as well as ipv4 2024-08-11 11:10:15 +02:00
cf859e2c33 fix: CA pem path incorrect 2024-08-11 11:02:04 +02:00
bb4e8d70b9 feat(sourcehut): install sourcehut
I didn't commit earlier config changes, I should have
2024-08-11 11:00:55 +02:00
3a6d7bd4e5 feat(virt): enable docker (podman) 2024-08-10 13:57:11 +02:00
5420786f5b dolphin: fix file associations not working 2024-08-07 18:02:34 +02:00
68f0b61837 stylix(fonts): set default fonts (systemwide) 2024-08-07 12:21:58 +02:00
a98e69571f manpages: install dev manpages 2024-08-06 12:54:05 +02:00
44d314ac6d books: add books smb share 2024-08-05 11:42:50 +02:00
39f1887073 guest: add guest user 2024-08-05 11:40:18 +02:00
31fd5d3f77 wluma: add systemd user service 2024-07-30 14:59:19 +02:00
9eba1a0ba6 wluma: set env variable to allow it to work
see:
https://github.com/maximbaz/wluma/issues/8
2024-07-30 09:46:43 +02:00
faee4d96b7 tailscale: disable default ssh deamon, see if that helps
the probelm i'm trying to solve is that tailscale auth for ssh does not
work
2024-07-29 12:39:40 +02:00
966d14a219 tailscale: allow use of and as an exit node 2024-07-29 12:35:03 +02:00
bdc1cd68c4 tailscale: enable ssh daemon 2024-07-29 12:22:12 +02:00
6ef6d633c7 enable ssh daemon 2024-07-29 12:10:10 +02:00
5f441a4be1 wm: river setup 2024-07-28 23:30:50 +02:00
b0ff987c16 fingerprint: non-working try 2024-07-28 14:09:28 +02:00
70131093c3 chore: separate nixos & home-manager configuration into own directories 2024-07-28 10:15:03 +02:00
Renamed from configuration.nix (Browse further)