back interdiff of round #2 and #1

fix(server): disable zsh new user welcome #71

merged
opened by a.starrysky.fyi targeting main from private/minion/push-ksqmwrryxmky
ERROR
packetmix/systems/server/zsh.nix

Failed to calculate interdiff for this file.

ERROR
packetmix/workspace.josh.license

Failed to calculate interdiff for this file.

NEW
packetmix/systems/umber/acme.nix
···
+
# SPDX-FileCopyrightText: 2025 FreshlyBakedCake
+
#
+
# SPDX-License-Identifier: MIT
+
+
{
+
security.acme = {
+
acceptTerms = true;
+
defaults = {
+
email = "acme@starrysky.fyi";
+
dnsProvider = "cloudflare";
+
environmentFile = "/secrets/acme/environmentFile";
+
};
+
};
+
+
clicks.storage.impermanence.persist.directories = [ "/var/lib/acme" ];
+
}
NEW
packetmix/systems/umber/silverbullet.nix
···
+
# SPDX-FileCopyrightText: 2025 FreshlyBakedCake
+
#
+
# SPDX-License-Identifier: MIT
+
+
{
+
project,
+
system,
+
config,
+
...
+
}:
+
{
+
clicks.storage.impermanence.persist.directories = [
+
{
+
directory = config.services.silverbullet.spaceDir;
+
mode = "0700";
+
defaultPerms.mode = "0700";
+
}
+
];
+
+
services.silverbullet = {
+
enable = true;
+
listenPort = 1024;
+
listenAddress = "127.0.0.1";
+
package = project.inputs.nixos-unstable.result.${system}.silverbullet;
+
};
+
+
services.nginx.enable = true;
+
services.nginx.virtualHosts."silverbullet.starrysky.fyi" = {
+
listenAddresses = [ "localhost.tailscale" ];
+
+
addSSL = true;
+
enableACME = true;
+
acmeRoot = null;
+
+
serverAliases = [ "umber.clicks.domains" ];
+
+
locations."/" = {
+
proxyPass = "http://$silverbullet_upstream_minion_only";
+
recommendedProxySettings = true;
+
};
+
};
+
+
services.nginx.virtualHosts."silverbullet_access_denied" = {
+
listen = [
+
{
+
addr = "127.0.0.1";
+
port = 403;
+
}
+
];
+
locations."/".return =
+
''403 '403 - Access Denied: Your device is logged on to tailscale as '$http_x_webauth_user'. Unfortunately, this is a private silverbullet instance for 'minion', please use https://silverbullet.clicks.codes instead' '';
+
};
+
+
services.nginx.commonHttpConfig = ''
+
map $auth_user $silverbullet_upstream_minion_only {
+
default 127.0.0.1:403;
+
minion 127.0.0.1:1024;
+
}
+
'';
+
+
services.nginx.tailscaleAuth = {
+
enable = true;
+
virtualHosts = [ "silverbullet.starrysky.fyi" ];
+
};
+
}
NEW
packetmix/systems/umber/tailscale.nix
···
+
# SPDX-FileCopyrightText: 2025 FreshlyBakedCake
+
#
+
# SPDX-License-Identifier: MIT
+
+
{
+
networking.hosts."100.64.0.48" = [ "localhost.tailscale" ];
+
+
services.nginx.defaultListenAddresses = [
+
"0.0.0.0"
+
"[::0]"
+
"localhost.tailscale"
+
];
+
}