Commit Graph

345 Commits

Author SHA1 Message Date
5a381d314e Pin mcp user UID/GID to 850
UID 995 conflicted with sshd on orion. Pin to 850 (the 800-899 range
is unused on all nodes and well below NixOS auto-assign range).
Pin GID to 850 as well for consistency.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-04-03 01:38:45 -07:00
53addc0ed1 Remove pinned UID for mcp user
UID 995 conflicted with sshd on orion. Let NixOS auto-assign the UID
for the mcp system user. Use systemd's %U specifier for XDG_RUNTIME_DIR
instead of the hardcoded UID.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-04-03 01:33:37 -07:00
755450e72e fix orion: remove bogus "crypted" LUKS device reference
The FIDO2 crypttab options are already on the correct UUID-named device
in hardware-configuration.nix; the "crypted" name only applies to
disko-provisioned hosts (rift).

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-04-03 01:00:19 -07:00
5fd00af73c fix orion: remove duplicate top-level networking/services attrs
The module used explicit `config = { ... }` but also had duplicate
networking.nameservers and services.resolved.domains at the top level,
causing a NixOS module evaluation error. Merged the Tailscale nameserver
into the config block and removed the duplicates.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-04-03 00:03:58 -07:00
6a65e73200 Remove mcp-master systemd unit (now containerized)
The master runs as an MCP-managed container, deployed via
mcp deploy mcp-master --direct. The systemd unit was a temporary
bootstrap mechanism.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-04-02 22:56:08 -07:00
b26478d47b Add mcp-master systemd service
Runs the MCP v2 master as a systemd service on rift. Uses
ConditionPathExists so the unit is a no-op on worker nodes
(like orion) that import mcp.nix but don't have the binary.

Starts after mcp-agent.service. Security hardened like the agent
but with ProtectHome=true (master doesn't need /run/user).

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-04-02 20:43:38 -07:00
dba2fb00eb update mc packages 2026-04-02 20:43:38 -07:00
246674369d updated packages 2026-04-02 20:33:24 -07:00
63bb945506 add opencode to full desktop packages 2026-04-02 17:10:04 -07:00
9be8f2d8d1 syncthing should run as a user 2026-04-02 16:07:59 -07:00
9972422fe6 package cleanup 2026-04-02 12:53:17 -07:00
9310dc0041 add new framework config 2026-04-02 12:43:06 -07:00
de5178747d add straylight emergency recovery script
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-04-02 00:23:04 -07:00
453947ac7b fix straylight /home LUKS: use initrd instead of crypttab
Replace fragile environment.etc.crypttab.text with
boot.initrd.luks.devices for the second SSD, matching
the pattern used for the root drive.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-04-02 00:12:14 -07:00
a8e43936cf pass #2
following random blogs doesn't always work
2026-04-01 23:53:00 -07:00
0e9f6d890e straylight hardware 2026-04-01 20:32:08 -07:00
33f364f12f update mcr 2026-04-01 19:41:41 -07:00
8ac759b1cf update mcr (for mcrctl) 2026-04-01 18:58:52 -07:00
0f1f0dcc78 Adding straylight. 2026-04-01 12:39:44 -07:00
fdd7104504 update kte and lector 2026-03-31 14:22:05 -07:00
101151cdb8 exfatprogs 2026-03-30 22:12:54 -07:00
16f1d0829c add easytag 2026-03-30 20:36:18 -07:00
5a0c22f0f7 update mcp 2026-03-30 17:46:40 -07:00
2abcc39539 really undunst 2026-03-30 17:33:26 -07:00
316b00cda3 update mcp 2026-03-30 17:32:00 -07:00
194e36c5de ntfy support 2026-03-30 14:59:35 -07:00
c268ff48b4 adding gvfs 2026-03-30 13:28:15 -07:00
c26f5b9a87 ignore power key on vade 2026-03-30 13:04:53 -07:00
ab66200fe1 update sgard 2026-03-30 09:54:22 -07:00
62e56188b2 dumbo 2026-03-30 09:19:19 -07:00
e538aa083b moving deja-dup 2026-03-30 09:17:38 -07:00
7ac4f2e3f2 enable dconf 2026-03-30 09:16:49 -07:00
66900d9ce6 add deja-dup 2026-03-30 08:23:04 -07:00
efeefb51b3 update mcp 2026-03-29 19:12:03 -07:00
95e6315ddf update mcp 2026-03-29 18:55:42 -07:00
c2882fcd8b allow mcp to read systemd logs 2026-03-29 18:00:48 -07:00
07a9463097 update mcp 2026-03-29 17:51:19 -07:00
c9e061d319 update mcp 2026-03-29 17:38:15 -07:00
5a7164bd20 update mcp 2026-03-29 17:37:45 -07:00
8f49ba4cf2 update mcp 2026-03-29 17:37:45 -07:00
4827c6aa20 update mcp 2026-03-29 17:37:45 -07:00
6238a33b60 Updating README. 2026-03-29 14:58:38 -07:00
d145c69932 update mcp 2026-03-28 19:24:40 -07:00
947f895bc5 update mcp 2026-03-28 18:24:06 -07:00
495d715ed7 update mcp 2026-03-28 18:05:28 -07:00
ec01be81d3 update mcp 2026-03-28 17:20:47 -07:00
34b2a01f1a Use /srv/mcp/mcp-agent binary instead of Nix flake input
The agent binary is now managed by the operator (scp + install to
/srv/mcp/mcp-agent), not by the Nix flake. This allows agent upgrades
without a full NixOS rebuild.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-28 16:12:51 -07:00
59ac363c45 Trust WNTRMUTE CA for podman registry connections
Podman/skopeo don't use the system CA bundle for registry TLS — they
use /etc/containers/certs.d/<host:port>/ca.crt. Add the WNTRMUTE CA
there so podman push/pull to MCR works without --tls-verify=false.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-28 16:01:47 -07:00
2b8d2b980c update mcp 2026-03-28 16:01:46 -07:00
a4104eb602 Update MCP to v0.6.0+1 (uptime fix) 2026-03-27 22:57:05 -07:00