Commit Graph

342 Commits

Author SHA1 Message Date
5fd00af73c fix orion: remove duplicate top-level networking/services attrs
The module used explicit `config = { ... }` but also had duplicate
networking.nameservers and services.resolved.domains at the top level,
causing a NixOS module evaluation error. Merged the Tailscale nameserver
into the config block and removed the duplicates.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-04-03 00:03:58 -07:00
6a65e73200 Remove mcp-master systemd unit (now containerized)
The master runs as an MCP-managed container, deployed via
mcp deploy mcp-master --direct. The systemd unit was a temporary
bootstrap mechanism.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-04-02 22:56:08 -07:00
b26478d47b Add mcp-master systemd service
Runs the MCP v2 master as a systemd service on rift. Uses
ConditionPathExists so the unit is a no-op on worker nodes
(like orion) that import mcp.nix but don't have the binary.

Starts after mcp-agent.service. Security hardened like the agent
but with ProtectHome=true (master doesn't need /run/user).

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-04-02 20:43:38 -07:00
dba2fb00eb update mc packages 2026-04-02 20:43:38 -07:00
246674369d updated packages 2026-04-02 20:33:24 -07:00
63bb945506 add opencode to full desktop packages 2026-04-02 17:10:04 -07:00
9be8f2d8d1 syncthing should run as a user 2026-04-02 16:07:59 -07:00
9972422fe6 package cleanup 2026-04-02 12:53:17 -07:00
9310dc0041 add new framework config 2026-04-02 12:43:06 -07:00
de5178747d add straylight emergency recovery script
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-04-02 00:23:04 -07:00
453947ac7b fix straylight /home LUKS: use initrd instead of crypttab
Replace fragile environment.etc.crypttab.text with
boot.initrd.luks.devices for the second SSD, matching
the pattern used for the root drive.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-04-02 00:12:14 -07:00
a8e43936cf pass #2
following random blogs doesn't always work
2026-04-01 23:53:00 -07:00
0e9f6d890e straylight hardware 2026-04-01 20:32:08 -07:00
33f364f12f update mcr 2026-04-01 19:41:41 -07:00
8ac759b1cf update mcr (for mcrctl) 2026-04-01 18:58:52 -07:00
0f1f0dcc78 Adding straylight. 2026-04-01 12:39:44 -07:00
fdd7104504 update kte and lector 2026-03-31 14:22:05 -07:00
101151cdb8 exfatprogs 2026-03-30 22:12:54 -07:00
16f1d0829c add easytag 2026-03-30 20:36:18 -07:00
5a0c22f0f7 update mcp 2026-03-30 17:46:40 -07:00
2abcc39539 really undunst 2026-03-30 17:33:26 -07:00
316b00cda3 update mcp 2026-03-30 17:32:00 -07:00
194e36c5de ntfy support 2026-03-30 14:59:35 -07:00
c268ff48b4 adding gvfs 2026-03-30 13:28:15 -07:00
c26f5b9a87 ignore power key on vade 2026-03-30 13:04:53 -07:00
ab66200fe1 update sgard 2026-03-30 09:54:22 -07:00
62e56188b2 dumbo 2026-03-30 09:19:19 -07:00
e538aa083b moving deja-dup 2026-03-30 09:17:38 -07:00
7ac4f2e3f2 enable dconf 2026-03-30 09:16:49 -07:00
66900d9ce6 add deja-dup 2026-03-30 08:23:04 -07:00
efeefb51b3 update mcp 2026-03-29 19:12:03 -07:00
95e6315ddf update mcp 2026-03-29 18:55:42 -07:00
c2882fcd8b allow mcp to read systemd logs 2026-03-29 18:00:48 -07:00
07a9463097 update mcp 2026-03-29 17:51:19 -07:00
c9e061d319 update mcp 2026-03-29 17:38:15 -07:00
5a7164bd20 update mcp 2026-03-29 17:37:45 -07:00
8f49ba4cf2 update mcp 2026-03-29 17:37:45 -07:00
4827c6aa20 update mcp 2026-03-29 17:37:45 -07:00
6238a33b60 Updating README. 2026-03-29 14:58:38 -07:00
d145c69932 update mcp 2026-03-28 19:24:40 -07:00
947f895bc5 update mcp 2026-03-28 18:24:06 -07:00
495d715ed7 update mcp 2026-03-28 18:05:28 -07:00
ec01be81d3 update mcp 2026-03-28 17:20:47 -07:00
34b2a01f1a Use /srv/mcp/mcp-agent binary instead of Nix flake input
The agent binary is now managed by the operator (scp + install to
/srv/mcp/mcp-agent), not by the Nix flake. This allows agent upgrades
without a full NixOS rebuild.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-28 16:12:51 -07:00
59ac363c45 Trust WNTRMUTE CA for podman registry connections
Podman/skopeo don't use the system CA bundle for registry TLS — they
use /etc/containers/certs.d/<host:port>/ca.crt. Add the WNTRMUTE CA
there so podman push/pull to MCR works without --tls-verify=false.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-28 16:01:47 -07:00
2b8d2b980c update mcp 2026-03-28 16:01:46 -07:00
a4104eb602 Update MCP to v0.6.0+1 (uptime fix) 2026-03-27 22:57:05 -07:00
a34b3e96f7 dos2unix 2026-03-27 22:39:27 -07:00
47f9e48346 add tools for dealing with corrupt (color) text 2026-03-27 22:26:53 -07:00
d70a0d667c update mc tools 2026-03-27 21:56:33 -07:00