5221aef821
nixos/services/archivebox: update systemd service dependency
2024-10-04 16:10:43 +08:00
b02896bf15
nixos/services/crowdsec: update systemd service unit config
2024-09-22 18:05:05 +08:00
ab38c4604e
nixos/services/crowdsec: update default method for setting service config
2024-09-22 10:54:51 +08:00
abfa06a0c3
nixos/services/crowdsec: update plugins
to notificationPlugins
...
Just to be more specific for the FUTURE!
2024-09-18 09:51:15 +08:00
c5eac6f3f9
nixos/services/crowdsec: add data sources option
2024-09-18 09:49:03 +08:00
9b1c1132b8
nixos/services/crowdsec: init
2024-09-18 09:25:39 +08:00
83bb89b33a
nixos/services/gallery-dl: refactor module for its settings merging
...
Instead of duplicating the options where the application selects those
options, we let the nixpkgs module system do that instead.
2024-09-11 13:05:21 +08:00
e0d82441a0
nixos/services/yt-dlp: fix values for systemd services
2024-08-25 19:11:30 +08:00
e2b93fa6df
nixos/services/ctrld: init
2024-08-22 19:45:15 +08:00
26c5383fc9
nixos/services/yt-dlp: update handling of download paths
...
This also includes different paths for different metadata files.
2024-08-22 17:59:45 +08:00
23b2be907f
nixos/services/yt-dlp: create job-specific archivePath
2024-08-21 18:14:31 +08:00
e4b63c084a
nixos/services: update dependency options for network-required services
2024-08-21 18:11:31 +08:00
77411ba102
nixos/services/uxplay: update systemd service config
2024-08-06 11:20:15 +08:00
456ca00636
modules: update comments and description
2024-07-31 13:29:51 +08:00
6b7b2ee9cd
nixos/services/uxplay: init
2024-07-29 19:14:15 +08:00
6f8e19ae88
nixos/services/archivebox: fix Service.ExecStart
directive
2024-07-29 19:05:58 +08:00
3714f843d0
chore: reformat codebase
2023-12-13 11:28:45 +08:00
3c6f443580
services/wezterm-mux-server: add user shell
...
The service is experimental at this point since I use something like
Mosh and Eternal Terminal. Domain multiplexing is pretty nice feature
with Wezterm, though.
2023-11-12 10:52:04 +08:00
2be753489e
services/archivebox: escape extraArgs
properly
2023-11-08 21:09:05 +08:00
ad710cdb9d
services/archivebox: harden services
2023-11-07 20:53:45 +08:00
8b812a34c9
services/archivebox: add dedicated service user and group
2023-11-07 20:53:15 +08:00
cee845a94b
services/archivebox: replace withDependencies
option with extraPackages
...
We also added a package option for ArchiveBox alongside it.
2023-11-07 20:51:47 +08:00
edfc8f8cc3
services/archivebox: update module examples and descriptions
2023-11-07 20:50:37 +08:00
aeac081cd2
services/archivebox: update job service name generation
2023-11-07 20:47:22 +08:00
534a300768
services/archivebox: remove archivePath
option
...
It is quite limiting to what workflow it allows. Though, this iteration
now enforces it to be in `/var/lib/archivebox`, setting an arbitrary
option is less desirable.
2023-11-07 20:38:00 +08:00
9ddddcf1e3
services/yt-dlp: remove persistent option
2023-10-27 13:25:08 +08:00
eab8631e9b
services/gallery-dl: remove persistent option
2023-10-27 13:24:21 +08:00
52871b4fa3
services/archivebox: refactor and remove persistent option
2023-10-27 13:23:37 +08:00
479166c78d
services/vouch-proxy: add wantedBy for systemd service
...
Forgot to add that which is why there's no enabled service.
2023-10-20 15:33:16 +08:00
8fb9770882
services/vouch-proxy: escape service names for systemd
2023-10-17 18:33:02 +08:00
ec0fe7dec8
services/vouch-proxy: fix permissions for generated secrets
2023-10-14 14:03:40 +08:00
5657a5e023
services/vouch-proxy: use system user for service
...
This enables integration with secrets such as sops-nix instead of the
previous service config of being a dynamic user.
2023-10-14 11:06:23 +08:00
d43708983a
services/wezterm-mux-server: update service hardening options
...
It should be less strict overall with the ProtectHome= settings.
2023-10-14 11:05:46 +08:00
6012556a3d
services/wezterm-mux-server: revert to system user for service
...
I don't know how to completely make it isolated AND working.
2023-10-14 11:05:17 +08:00
7daea6c427
services/vouch-proxy: update service config
2023-10-13 14:24:44 +08:00
3ee04bb812
chore: reformat codebase
2023-10-09 20:48:01 +08:00
7d55e45f70
services/vouch-proxy: add some more hardening options
2023-10-09 20:46:06 +08:00
2dbb3ed68c
services/vouch-proxy: restructure for multiple instances
...
This resolves some cases where the admin does not have all of their
users within the protected domain and some in others.
2023-10-09 20:43:13 +08:00
5152bae032
services/vouch-proxy: add more systemd directives
2023-10-09 22:31:27 +08:00
b4b64fa50b
services/vouch-proxy: improve conditional settings file option
2023-10-07 20:42:52 +08:00
069723d38a
services/wezterm-mux-server: hardcode user and group
...
With DynamicUser directive, it should be easy to make this usable.
2023-10-06 13:48:12 +08:00
86d8878fab
services/vouch-proxy: init
2023-10-07 20:41:14 +08:00
12bb71be20
services/wezterm-mux-server: improve code
2023-10-05 10:23:09 +08:00
c410ece05a
treewide: remove options
attribute for modules
2023-10-02 14:26:11 +08:00
ac39b4cc58
services/wezterm-mux-server: add user and group option
...
The errors are most likely from wezterm-mux-server trying to start a
shell. This could be configured but it is better to treat this service
similarly to SSH servers.
2023-07-28 08:35:07 +08:00
f34d793bb6
services/wezterm-mux-server: update hardening settings
2023-07-27 22:21:30 +08:00
9d75a4101f
services/wezterm-mux-server: update service dependency
2023-07-27 13:35:38 +08:00
3c4aef00d4
modules: convert module description to RFC0072-style
2023-07-27 11:13:39 +08:00
44ccbea7e1
services/wezterm-mux-server: init module
2023-07-20 10:40:04 +08:00
Gabriel Arazas
3a7816a901
chore: reformat codebase
2022-11-19 11:32:29 +08:00