6dd0a1f9c8
fix(fprintd): make nixos-06cb-009a-fingerprint-sensor follow nixpkgs
...
This may speed up evaluation times
2024-08-13 09:22:26 +02:00
87a8507834
feat(apply): update apply.sh
...
NIXOS_LABEL does not seem to work, so I'm removing it.
I'm also launching gitu, to encourage frequent commits.
2024-08-13 09:16:35 +02:00
c0a1443ba9
feat(vm): configure initial password for users to allow login
2024-08-13 08:47:02 +02:00
e64cf18222
feat(backup): first borgbackup module test
...
https://xeiaso.net/blog/borg-backup-2021-01-09/
2024-08-12 16:58:39 +02:00
1c362fbf82
feat(openssh): enable openssh server
2024-08-12 14:42:14 +02:00
82fa9c473b
feat(apply.sh): launch gitu before rebuilding config, to encourage committing
2024-08-12 14:18:40 +02:00
dabd4298a6
fix(sourcehut): actually environment.variables do not affect systemd services, trying another way
2024-08-12 14:17:05 +02:00
b895943359
fix(sourcehut): make python's requests use global ca-certificates store
2024-08-12 13:50:42 +02:00
406d1cc6ca
chore(sourcehut): remove all traces of custom cacert package fuckery
...
I found out that you can set an env variable to make python's request
use the global cert store, this sidesteps the issue I have been having
with sourcehut.
2024-08-12 13:49:37 +02:00
57dacc328b
fix(sourcehut): try using patched cacert using a module?
...
Let's see if this works
2024-08-12 13:07:43 +02:00
9ed7765667
chore: remove ssh configuration
...
Actually, I misread the tutorial, this configuration should be done on
the remote machine.
2024-08-11 17:35:33 +02:00
332a0cc4c8
fix(ssh config): actually use the correct options
2024-08-11 17:18:50 +02:00
6327f0cdc0
fix: remove nonexistent option
2024-08-11 17:17:28 +02:00
9cc3b74f34
wip(overlays): temporarily disable the cacert overlay
...
I don't want it to rebuild 1000 packages again
2024-08-11 17:17:00 +02:00
687f517370
fix(remote build): actually the config needs to be systemwide
...
This makes some amount of sense, since it would probably be the nix
daemon that is connecting to the remote build machine.
2024-08-11 17:15:23 +02:00
8d0a36614c
feat(certs): override the cacert package to always trust my own CA
2024-08-11 14:07:27 +02:00
c79262d95c
fix(sourcehut): try and make it use http for internal communication
...
None of my previous changes could have worked, because nginx
automatically redirects http to https. I think this is the setting I
need to change so that pure http works as well.
2024-08-11 12:24:38 +02:00
2dc710091d
fix(sourcehut): Maybe the onboarding-redirect needs to be http?
2024-08-11 12:23:23 +02:00
a5d00e6339
fix(sourcehut): try setting the origin string for each server
...
Same as before, I'm trying to force sourcehut to use http for internal
communication instead of https, to bypass the problem that the python
package used by sourcehut does not inherit my own CA
2024-08-11 12:21:54 +02:00
fc7c524e0b
fix(sourcehut): use http for origin
...
Maybe this will force sourcehut to use http instad of https, which will
allow me to sidestep the certificate problem?
2024-08-11 12:16:40 +02:00
933e10847f
fix(sourcehut): update oauth-client-id
...
This time I'm trying to sidestep the ssl certificate issue by accessing
internal services using http.
Using this as a redirect URL:
http://git.sourcehut.nixos.local/oauth/callback
2024-08-11 12:06:53 +02:00
ab3017c4e0
fix(sourcehut): do not set default virtualHost
2024-08-11 11:21:48 +02:00
b973ea33bc
fix(sourcehut): wrong port for ipv6 listen
2024-08-11 11:12:43 +02:00
6efc6e012f
fix(sourcehut): gitsrht & mansrht: listen on ipv6 as well as ipv4
2024-08-11 11:10:15 +02:00
cf859e2c33
fix: CA pem path incorrect
2024-08-11 11:02:04 +02:00
bb4e8d70b9
feat(sourcehut): install sourcehut
...
I didn't commit earlier config changes, I should have
2024-08-11 11:00:55 +02:00
3a6d7bd4e5
feat(virt): enable docker (podman)
2024-08-10 13:57:11 +02:00
3ff0d7258d
chore: add script to nixos-rebuild switch with custom label
2024-08-07 18:03:05 +02:00
5420786f5b
dolphin: fix file associations not working
2024-08-07 18:02:34 +02:00
68f0b61837
stylix(fonts): set default fonts (systemwide)
2024-08-07 12:21:58 +02:00
a98e69571f
manpages: install dev manpages
2024-08-06 12:54:05 +02:00
44d314ac6d
books: add books smb share
2024-08-05 11:42:50 +02:00
39f1887073
guest: add guest user
2024-08-05 11:40:18 +02:00
31fd5d3f77
wluma: add systemd user service
2024-07-30 14:59:19 +02:00
9eba1a0ba6
wluma: set env variable to allow it to work
...
see:
https://github.com/maximbaz/wluma/issues/8
2024-07-30 09:46:43 +02:00
faee4d96b7
tailscale: disable default ssh deamon, see if that helps
...
the probelm i'm trying to solve is that tailscale auth for ssh does not
work
2024-07-29 12:39:40 +02:00
966d14a219
tailscale: allow use of and as an exit node
2024-07-29 12:35:03 +02:00
bdc1cd68c4
tailscale: enable ssh daemon
2024-07-29 12:22:12 +02:00
6ef6d633c7
enable ssh daemon
2024-07-29 12:10:10 +02:00
5f441a4be1
wm: river setup
2024-07-28 23:30:50 +02:00
b0ff987c16
fingerprint: non-working try
2024-07-28 14:09:28 +02:00
b2f226cf49
nixos: switch to a flake + change /boot part uuid
2024-07-28 11:36:51 +02:00
70131093c3
chore: separate nixos & home-manager configuration into own directories
2024-07-28 10:15:03 +02:00