aboutsummaryrefslogtreecommitdiff
path: root/vps.scm (follow)
Commit message (Expand)AuthorAgeFilesLines
* vps.scm: Working machine declaration with Guix DeployEuAndreh2021-01-151-28/+37
* vps.scm: WIP start adding (machine ...) configurationEuAndreh2021-01-151-0/+12
* vps.scm: Move host-name to variableEuAndreh2021-01-151-3/+3
* vps.scm: Attribute (operating-system ...) expression to "system" variableEuAndreh2021-01-151-125/+128
* Move sync/* to .EuAndreh2021-01-151-0/+472
* rsync the full folder to home instead of file by fileEuAndreh2020-11-161-52/+0
* vps.scm: Remove comment from generated OS configurationEuAndreh2020-11-161-3/+0
* vps.scm: Stop inlining content of sudoers fileEuAndreh2020-11-161-3/+5
* Add base Guix configuration and start switching to it•••- remove NixOS stateVersion from .envrc; - add guix-reconfigure.sh; - add vps.scm with initial Guix system configuration; - update vps.tf to use the new "base-guix" snapshot. The "base-guix" image doesn't need a password. The "andreh" users has one, but it is configured for not requiring it when running commands as "sudo". The expected minimal steps one has to go through for privilege scalation is via the SSH private key, and accessing the VPS via SSH. Since password login is disabled and root can't login via SSH either, only the private SSH key allows access to the server. After that, the attacker will be able to run commands as root. EuAndreh2020-11-161-0/+53