Infrastructure for Auxolotl
Go to file
Samuel Shuert 842f2b8371 fix: Update nixpkgs to pull in CVE-2024-6387 fix
Openssh had a security vulnerability that allowed RCE as root, this
flake update includes a openssh patch for said CVE

Change-Id: Ic7a3b58d9f3bc32d952b34e1995ed2ab740af76c
2024-07-02 18:06:39 -04:00
.reuse feat(license): Switch to REUSE 2024-05-28 23:58:52 +00:00
lib/deploy feat(license): Switch to REUSE 2024-05-28 23:58:52 +00:00
LICENSES fix(forgejo): Patch to stop 500s on import+review 2024-05-28 23:58:52 +00:00
modules/nixos/auxolotl feat(keys): Add coded SSH keys for infra 2024-06-29 13:42:49 -04:00
overlays fix(forgejo): Patch to stop 500s on import+review 2024-05-28 23:58:52 +00:00
shells/default feat(license): Switch to REUSE 2024-05-28 23:58:52 +00:00
systems/x86_64-linux feat(license): Switch to REUSE 2024-05-28 23:58:52 +00:00
.gitignore feat(license): Switch to REUSE 2024-05-28 23:58:52 +00:00
CONTRIBUTORS.md feat(license): Switch to REUSE 2024-05-28 23:58:52 +00:00
flake.lock fix: Update nixpkgs to pull in CVE-2024-6387 fix 2024-07-02 18:06:39 -04:00
flake.lock.license feat(license): Switch to REUSE 2024-05-28 23:58:52 +00:00
flake.nix feat(license): Switch to REUSE 2024-05-28 23:58:52 +00:00
README.md feat(license): Switch to REUSE 2024-05-28 23:58:52 +00:00

Auxolotl - Infrastructure

This repository contains system configuration for Auxolotl's infrastructure.

Access

To gain access to a system for administration, create a pull request adding your public SSH key to the known keys list for the infra user. The pull request description should include information explaining why you need direct access to the machine.

Once your pull request has been accepted you can access the machine by running ssh infra@<ip> where the IP can be found in the following section's systems list.

Systems

System Description IP
axol Primary server hosting auxolotl.org and chat.auxolotl.org 137.184.177.239
baxter Hosts git.auxolotl.org 209.38.149.197