Skip to content

Login server fixes#254

Open
jaysa68 wants to merge 13 commits intomainfrom
login-server-fixes
Open

Login server fixes#254
jaysa68 wants to merge 13 commits intomainfrom
login-server-fixes

Conversation

@jaysa68
Copy link
Copy Markdown
Member

@jaysa68 jaysa68 commented Apr 13, 2026

see #241

  • added some web hosting packages
  • tsch and csh login shells
  • ttyd as shell in a box replacement on carp
  • rekeyed keytab secret on carp
  • added ulimits on carp
  • makemysql script fixed??

@jaysa68 jaysa68 force-pushed the login-server-fixes branch 2 times, most recently from a9a2226 to 536a7f4 Compare April 14, 2026 11:56
@jaysa68 jaysa68 enabled auto-merge (squash) April 14, 2026 13:49
@24apricots 24apricots requested review from Storce and sophiebsw April 14, 2026 14:16
@24apricots
Copy link
Copy Markdown
Member

i think its fine. mostly just cleanup stuff. i can do this later today if needed

@24apricots
Copy link
Copy Markdown
Member

side note id prefer if this 500 line change was not squashed into one commit that does a bunch of different changes. it should be commits for each specific part under a login server fixes merge commit...

@jaysa68 jaysa68 force-pushed the login-server-fixes branch from 0cd644a to 6557858 Compare April 16, 2026 06:30
Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
mcaselector

# windows compat
wine
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

wait how was this relevant to fixing login server. you mentioned it but i forgot

Comment thread hosts/servers/koi.nix
lastOctet = 129;
};

deployment.allowLocalDeployment = true;
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

are we not building koi on spike?

Comment thread modules/ttyd.nix
};
};

"ttyd-force-ssl" = {
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

forcing ssl for ttyd is good👍

Comment thread modules/user-packages.nix
enable = lib.mkEnableOption "user-facing packages for login servers";
};

config = lib.mkIf config.ocf.userPackages.enable {
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

as i mentioned in lab, it might be good to have a module for cli related tools that would be useful on servers that are meant to be "interactive shell hosts". rn ive been sticking it in ocf.graphical.apps.* but its better to probably consolidate it so that the same utilities are loaded from desktops and login servers. i can work on this later but this is good for now :)

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

(which is exactly what the userPackages module you created does, i mainly mean cleaning up the stuff that has been littered around everywhere else and consolidating it to this new module; and possibly creating an interactive shell server profile maybe)

Comment thread profiles/base.nix
pigz
ranger
ncdu
molly-guard
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

i dont think molly-guard would really be effective given that it doesnt affect systemctl * iirc. other than that, these are some good packages that i use too that should be added (sometimes i forget about them until i need it and realize they arent installed, so i have to run them through comma).

Comment thread flake.nix
import nixpkgs {
inherit overlays system;
config = {
permittedInsecurepackages = [ "unifi-controller-9.5.21" ];
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

i thought unifi controller was just going to be removed since @sophiebsw said it was not needed iirc?. it has a pretty nasty cve...

Comment thread hosts/servers/koi.nix Outdated
ocf.userPackages.enable = true;

services.openssh.settings.AllowGroups = [ "ocfstaff" ];
services.openssh.settings.AllowUsers = [ "ocf-nix-deploy-user" ];
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

set services.openssh.settings.AllowUsers = [ "ocf-nix-deploy-user" ]; globally in the managed-deployment module?

Comment thread modules/auth.nix
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@sophiebsw do you want to double check this

@24apricots
Copy link
Copy Markdown
Member

sent my review from three days ago just now oops

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants