Commit Graph

73 Commits

Author SHA1 Message Date
e2b93fa6df
nixos/services/ctrld: init 2024-08-22 19:45:15 +08:00
26c5383fc9
nixos/services/yt-dlp: update handling of download paths
This also includes different paths for different metadata files.
2024-08-22 17:59:45 +08:00
23b2be907f
nixos/services/yt-dlp: create job-specific archivePath 2024-08-21 18:14:31 +08:00
e4b63c084a
nixos/services: update dependency options for network-required services 2024-08-21 18:11:31 +08:00
77411ba102
nixos/services/uxplay: update systemd service config 2024-08-06 11:20:15 +08:00
456ca00636
modules: update comments and description 2024-07-31 13:29:51 +08:00
6b7b2ee9cd
nixos/services/uxplay: init 2024-07-29 19:14:15 +08:00
6f8e19ae88
nixos/services/archivebox: fix Service.ExecStart directive 2024-07-29 19:05:58 +08:00
3714f843d0
chore: reformat codebase 2023-12-13 11:28:45 +08:00
3c6f443580
services/wezterm-mux-server: add user shell
The service is experimental at this point since I use something like
Mosh and Eternal Terminal. Domain multiplexing is pretty nice feature
with Wezterm, though.
2023-11-12 10:52:04 +08:00
2be753489e
services/archivebox: escape extraArgs properly 2023-11-08 21:09:05 +08:00
ad710cdb9d
services/archivebox: harden services 2023-11-07 20:53:45 +08:00
8b812a34c9
services/archivebox: add dedicated service user and group 2023-11-07 20:53:15 +08:00
cee845a94b
services/archivebox: replace withDependencies option with extraPackages
We also added a package option for ArchiveBox alongside it.
2023-11-07 20:51:47 +08:00
edfc8f8cc3
services/archivebox: update module examples and descriptions 2023-11-07 20:50:37 +08:00
aeac081cd2
services/archivebox: update job service name generation 2023-11-07 20:47:22 +08:00
534a300768
services/archivebox: remove archivePath option
It is quite limiting to what workflow it allows. Though, this iteration
now enforces it to be in `/var/lib/archivebox`, setting an arbitrary
option is less desirable.
2023-11-07 20:38:00 +08:00
9ddddcf1e3
services/yt-dlp: remove persistent option 2023-10-27 13:25:08 +08:00
eab8631e9b
services/gallery-dl: remove persistent option 2023-10-27 13:24:21 +08:00
52871b4fa3
services/archivebox: refactor and remove persistent option 2023-10-27 13:23:37 +08:00
479166c78d
services/vouch-proxy: add wantedBy for systemd service
Forgot to add that which is why there's no enabled service.
2023-10-20 15:33:16 +08:00
8fb9770882
services/vouch-proxy: escape service names for systemd 2023-10-17 18:33:02 +08:00
ec0fe7dec8
services/vouch-proxy: fix permissions for generated secrets 2023-10-14 14:03:40 +08:00
5657a5e023
services/vouch-proxy: use system user for service
This enables integration with secrets such as sops-nix instead of the
previous service config of being a dynamic user.
2023-10-14 11:06:23 +08:00
d43708983a
services/wezterm-mux-server: update service hardening options
It should be less strict overall with the ProtectHome= settings.
2023-10-14 11:05:46 +08:00
6012556a3d
services/wezterm-mux-server: revert to system user for service
I don't know how to completely make it isolated AND working.
2023-10-14 11:05:17 +08:00
7daea6c427
services/vouch-proxy: update service config 2023-10-13 14:24:44 +08:00
3ee04bb812
chore: reformat codebase 2023-10-09 20:48:01 +08:00
7d55e45f70
services/vouch-proxy: add some more hardening options 2023-10-09 20:46:06 +08:00
2dbb3ed68c
services/vouch-proxy: restructure for multiple instances
This resolves some cases where the admin does not have all of their
users within the protected domain and some in others.
2023-10-09 20:43:13 +08:00
5152bae032
services/vouch-proxy: add more systemd directives 2023-10-09 22:31:27 +08:00
b4b64fa50b
services/vouch-proxy: improve conditional settings file option 2023-10-07 20:42:52 +08:00
069723d38a
services/wezterm-mux-server: hardcode user and group
With DynamicUser directive, it should be easy to make this usable.
2023-10-06 13:48:12 +08:00
86d8878fab
services/vouch-proxy: init 2023-10-07 20:41:14 +08:00
12bb71be20
services/wezterm-mux-server: improve code 2023-10-05 10:23:09 +08:00
c410ece05a
treewide: remove options attribute for modules 2023-10-02 14:26:11 +08:00
ac39b4cc58
services/wezterm-mux-server: add user and group option
The errors are most likely from wezterm-mux-server trying to start a
shell. This could be configured but it is better to treat this service
similarly to SSH servers.
2023-07-28 08:35:07 +08:00
f34d793bb6
services/wezterm-mux-server: update hardening settings 2023-07-27 22:21:30 +08:00
9d75a4101f
services/wezterm-mux-server: update service dependency 2023-07-27 13:35:38 +08:00
3c4aef00d4
modules: convert module description to RFC0072-style 2023-07-27 11:13:39 +08:00
44ccbea7e1
services/wezterm-mux-server: init module 2023-07-20 10:40:04 +08:00
Gabriel Arazas
3a7816a901 chore: reformat codebase 2022-11-19 11:32:29 +08:00
Gabriel Arazas
ae0cb8596a config: refactor and update 2022-10-10 11:45:22 +08:00
Gabriel Arazas
d20b192c41 services: refactor 2022-09-12 17:36:22 +08:00
Gabriel Arazas
767bfddead services/yt-dlp: update config to log to journal
Apparently, it doesn't really log the errors in the journal so it can
make the service failed for no reason. It can be configured to redirect
it to journal.
2022-08-31 14:37:58 +08:00
Gabriel Arazas
36909a281f services/yt-dlp: refactor 2022-08-11 09:43:17 +08:00
Gabriel Arazas
631b14f8b5 services/archivebox: add job-specific service persistence 2022-08-06 14:04:21 +08:00
Gabriel Arazas
4dd2acfe7f services/archivebox: change jobs.<name>.links to jobs.<name>.urls 2022-07-31 14:44:29 +08:00
Gabriel Arazas
8fdd60098f services: fix correct module documentation 2022-07-30 16:22:24 +08:00
Gabriel Arazas
906ea48993 services: change dependency requirement
I didn't realize `network.target` is very ambiguous. The next best thing
for booting up the service after the system is up is `default.target`
but we're being explicit here for NixOS services just to make sure.
2022-07-22 15:02:30 +08:00